On Sun, 11 Feb 2018 20:04:27 -0800, Daniel Frey wrote:
> After a little bit of fiddling around, I found out you can get an
> application window to remember its size and position (which is great,
> at least the option is there.)
>
> Not so nice is that I have to tell every new window I open (well
$ grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic
retpoline
wrote:
> On 02/09 10:02, Andreas K. Huettel wrote:
> > Am Sonntag, 4. Februar 2018, 15:03:28 CET schrieb tu...@posteo.de:
> > > Hi,
> > >
> > > I still have the problem of failed builds due to an
> > > 'undefined reference to `__alloca''. I recompiled
> > > gcc/glibc and I am using linux-4.15.1
On Mon, Feb 5, 2018 at 4:00 PM, Magnus Johansson wrote:
>>>
>>> I've got a fresh Gentoo installation that does not boot. I just end up in
>>> the Grub2 shell.
>>>
>>> However when there if I do 'set root=(md/0)' and 'configfile /grub/grub.cfg'
>>> I do get to the Grub2 menu where Gentoo boots just
On Sat, Feb 10, 2018 at 10:28 AM, Magnus Johansson wrote:
> 2018-02-07 18:50 GMT+01:00 Steven Lembark :
>> On Mon, 5 Feb 2018 22:00:39 +0100
>> Magnus Johansson wrote:
>>
>> From my grub.cfg:
>>
>> insmod gzio
>> insmod part_msdos
>> insmod diskfilter
>> insmod mdraid1x
>> ins
On 02/12/18 01:20, Neil Bothwick wrote:
> On Sun, 11 Feb 2018 20:04:27 -0800, Daniel Frey wrote:
>
>> After a little bit of fiddling around, I found out you can get an
>> application window to remember its size and position (which is great,
>> at least the option is there.)
>>
>> Not so nice is t
I've got a fresh Gentoo installation that does not boot. I just end up in
the Grub2 shell.
However when there if I do 'set root=(md/0)' and 'configfile
/grub/grub.cfg'
I do get to the Grub2 menu where Gentoo boots just fine.
/boot and / are both on mdadm dev
you need to include the punctuation, specifically the ":"s, which usually are a
"-", mac addresses use the ":" but unless the syntax has changed/broadened you
have to have the "-" for seperating the fields in a uuid. The punctuation is
part of the syntax (besides breaking the uuid into sectio
On Sunday, 11 February 2018 05:41:28 GMT 80x24 wrote:
> On Sun, Feb 11, 2018 at 12:47 AM,
> Peter Humphrey wrote:
> > [drm:dce_v11_0_afmt_setmode] *ERROR* Couldn't read SADs: 0
> > [...]
> > traps: plugin-containe[6833] general protection ip:7f0a2e1711b1
> > sp:7fff6f64dc30 error:0 in ld-2.25.so[7
On 2018.02.12 19:57, Peter Humphrey wrote:
On Sunday, 11 February 2018 05:41:28 GMT 80x24 wrote:
> On Sun, Feb 11, 2018 at 12:47 AM,
> Peter Humphrey wrote:
> > [drm:dce_v11_0_afmt_setmode] *ERROR* Couldn't read SADs: 0
> > [...]
> > traps: plugin-containe[6833] general protection ip:7f0a2e1711b
On 12/02/18 11:51, Adam Carter wrote:
$ grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user
pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:
On 2018-02-13 03:13, Nikos Chantziaras wrote:
> Apparently, and contrary to what people (me included) wrote here in
> the past, BPF JIT is the secure option, and the interpreter is the
> insecure one.
Do you have a reference for this? It sounds strange indeed.
--
Please don't Cc: me privately
On 13/02/18 03:31, Ian Zimmerman wrote:
On 2018-02-13 03:13, Nikos Chantziaras wrote:
Apparently, and contrary to what people (me included) wrote here in
the past, BPF JIT is the secure option, and the interpreter is the
insecure one.
Do you have a reference for this? It sounds strange indee
On 09/12/17 05:13, Michael Palimaka wrote:
> On 09/12/2017 05:04 AM, Daniel Frey wrote:
>> According to a comment in the bug, you can try to figure out which
>> session it is (ck-list-sessions) and look for the X11 display property
>> set. This will not work (or could be difficult) if you have seve
I've read online that there should be vulnerability info (Meltdown,
Spectre) in /sys under /sys/devices/system/cpu/vulnerabilities but this
doesn't exist on my PC.
Another place is in /proc/cpuinfo, no info on meltdown/spectre in there
either.
Yet another place is in dmesg, (grep 'page tables iso
On 2018-02-12 19:24, Daniel Frey wrote:
> I've read online that there should be vulnerability info (Meltdown,
> Spectre) in /sys under /sys/devices/system/cpu/vulnerabilities but this
> doesn't exist on my PC.
> I've updated to gentoo-sources-4.9.76-r1, shouldn't this info be present?
>
> $ unam
On 02/12 11:31, Joerg Schilling wrote:
> wrote:
>
> > On 02/09 10:02, Andreas K. Huettel wrote:
> > > Am Sonntag, 4. Februar 2018, 15:03:28 CET schrieb tu...@posteo.de:
> > > > Hi,
> > > >
> > > > I still have the problem of failed builds due to an
> > > > 'undefined reference to `__alloca''. I
17 matches
Mail list logo