[16:03] remove my bann in ubuntu [16:04] i am Dreaman [16:04] this i secand nickname [16:10] Blade: so, we ask again: are you going to behave according to the IRC guidelines? [16:11] evry one week ask [16:11] 2 months bann [16:11] Blade: asking every one week will not help. Please answer my question [16:12] hggdh i joint easy [16:12] this is not good idea [16:12] join and ask [16:12] normal [16:12] joint [16:12] if i may, Blade, you have two choices: [16:12] 1. answer yes to the question and make sure that you do it [16:13] 2. do anything else and be completely and totally ignored [16:13] remove bann and mute mute me [16:13] *anything* [16:13] normal [16:13] ok, you've chosen #2 [16:14] Blade: the ban will NOT be removed as of now. Please /part the channel, and ONLY return when you are willing to talk with us. [16:14] ok thanks [16:14] …or rather when you're willing to say that you agree to behave according to the IRC guidelines. [16:15] @mark #ubuntu-ops Dreaman [16:15] The operation succeeded. [16:16] @comment 77462 again did not remove the ban; user still refuses to answer our questions. [16:16] Comment added. [16:19] we would probably profit from having someone speaking his native language (whatever that is) [16:20] as was said before, he's perfectly capable of understanding english well enough to answer a yes/no question [16:23] still, bnefit of doubt, and all... [17:42] bulgarian [18:14] wxl called the ops in #kubuntu-offtopic () [18:16] handled ^ [18:18] thx dax [18:20] weird, didn't even touch #ubuntu this time [18:25] also hit #ubuntu-arm [18:28] dax: perhaps Sigyn could also be deployed on #u-arm? [18:29] oh, i'm even in there and didn't notice [18:32] oh, i see why [18:32] hggdh: no it didn't, that was yesterday [18:36] yep, looked at the dates (finally). But it probably could get Sigyn, anyway. [18:41] ubottu: ops-#kubuntu-offtopic s/tsimpson/tsimpson, genii, acheronuk/ [18:41] dax: I am only a bot, please don't think I'm intelligent :) [18:41] ubottu: ops-#kubuntu-offtopic =~ s/tsimpson/tsimpson, genii, acheronuk/ [18:41] I'll remember that dax [18:47] dax: Thanks. Work is busy today [18:47] np [21:09] !kpti is The Linux community is working on a patchset for a hardening technique named KPTI that addresses recently-disclosed issues in Intel processors. Once finished, updates containing this patchset will be released through the normal Ubuntu security update process. See http://www.ubuntu.com/usn if you are interested in receiving all Ubuntu security update notifications. [21:09] I'll remember that, dax [21:10] !kaiser is kpti [21:10] I'll remember that, dax [22:11] :( [22:44] technical disclosure for the above just came out: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html [22:45] according to -discuss, Ubuntu (and other distros') kernel configs mean that PoC #2 in there affects AMD on Ubuntu too [22:46] luckily the fix is in 4.15rc6, the same kernel we're suggesting to fix computers affected by the Intel SPI bug that hit 17.10 [22:46] i assume from mainline PPA? [22:47] yup [22:47] so i imagine the goal will be try to release 18.04 with it [22:47] yeah, 18.04's targeting 4.15 [22:47] thats interesting, its only referencing xeons as test platforms [22:47] and haswell [22:47] the patches for the KPTI fix are so freaking huge it's probably not even worth backporting [22:47] ikonia: it affects others, that's just the hardware they tested with [22:48] yeah, but I'm curious to how wide the offical range is [22:48] ikonia: ah [22:48] I'd not considered (yet) the range of products it would impact [22:53] https://lwn.net/Articles/742744 [22:56] !spectre is kpti [22:56] I'll remember that, dax [22:56] !meltdown is kpti [22:56] I'll remember that, dax [22:57] !kpti =~ s#$# For more information on the relevant bugs, see https://spectreattack.com/# [22:57] I'll remember that dax [22:57] !kpti =~ s/Intel/most modern/ [22:57] I'll remember that dax [22:59] maybe add one for kaiser and that it's called kpti now? :) [22:59] kaiser's already an alias to it, kpti is mentioned in the factoid already [23:00] !kpti [23:00] The Linux community is working on a patchset for a hardening technique named KPTI that addresses recently-disclosed issues in most modern processors. Once finished, updates containing this patchset will be released through the normal Ubuntu security update process. See http://www.ubuntu.com/usn if you are interested in receiving all Ubuntu security update notifications. For more information on the relevant bugs, see https://spectreattack.com/ [23:00] what about the other names they proposed? XD [23:00] no. [23:01] i don't know. user address space separation is pretty good.