[02:01] PR snapd#10973 opened: interfaces/network-manager-observe: Update for dart applications [05:55] morning [06:32] mborzecki, zyga-mbp: hi! [06:32] hey mardy :) [06:32] mardy: hey [06:42] PR snapd#10859 closed: snap-confine: do not create an additional cgroup [07:03] morning [07:07] hey pstolowski [07:22] mardy: i know you like reviewing C code, can you take a look at https://github.com/snapcore/snapd/pull/10968 ? [07:22] PR #10968: cmd/snap-confine: lazy set up of device cgroup, only when devices were assigned [07:22] pstolowski: zyga-mbp: hey [07:22] hey mborzecki :) [07:23] good morning mborzecki, zyga-mbp and mardy ! [07:23] hey mvo, welcome back [07:23] good luck :) [07:43] PR snapd#10974 opened: packaging: add test format check dependencies [08:01] very simple PR: https://github.com/snapcore/snapd/pull/10966 [08:01] PR #10966: packaging/opensuse: sync with openSUSE packaging, enable AppArmor on 15.3+ [08:17] mvo: hi! [08:59] jamesh: hi, not sure what to do about https://github.com/snapcore/snapd/pull/10867#discussion_r732705276 [08:59] PR #10867: desktop, usersession: observe notifications [09:37] pstolowski: a trivial review? https://github.com/snapcore/snapd/pull/10966 🙂 [09:37] PR #10966: packaging/opensuse: sync with openSUSE packaging, enable AppArmor on 15.3+ [09:37] sure [09:48] PR snapd#10971 closed: tests/main/apparmor-batch-reload: fix fake apparmor_parser to handle --preprocess <⚠ Critical> [09:53] PR snapd#10938 closed: interfaces: skip connection of netlink interface on older systems [09:53] PR snapd#10950 closed: asserts, o/snapstate: honor IgnoreValidation flag when checking installed snaps [10:03] PR snapd#10966 closed: packaging/opensuse: sync with openSUSE packaging, enable AppArmor on 15.3+ [10:40] tests/main/lxd failing again, checking what's going on there [10:40] or maybe broken lxd version just went to stable? [11:05] and it's exactly the same issue again: https://paste.ubuntu.com/p/ZrTpF8cZZq/ [11:09] PR snapd#10959 closed: tests/main/selinux-data-context: use session when performing actions as test user [12:49] PR snapd#10972 closed: tests: skip the interfaces-openvswitch on fedora 33 [13:33] mvo: can you merge this please? https://github.com/snapcore/snapd/pull/10910 failures seem unrelated [13:33] PR #10910: o/snapstate: deduplicate snap names in remove/install/update <⛔ Blocked> [14:44] miguelpires: sure [14:45] PR snapd#10968 closed: cmd/snap-confine: lazy set up of device cgroup, only when devices were assigned [14:50] PR snapd#10910 closed: o/snapstate: deduplicate snap names in remove/install/update <⛔ Blocked> [14:50] PR snapd#10968 opened: cmd/snap-confine: lazy set up of device cgroup, only when devices were assigned === popey0 is now known as popey [17:35] PR snapd#10975 opened: interfaces/microstack-support: set controlsDeviceCgroup to true [22:47] PR snapcraft#3593 opened: lifecycle, providers: skip network operations in offline mode [22:59] Hello. I have a question about Ubuntu Core. I'm doing performance study project on Specter mitigation in OS IoT, and I try Ubuntu Core, I saw that it was possible to emulate with kvm/qemu. Well, I'm thinking about creating two virtualizations, one with mitigation and one without, but I'm having difficulty [23:00] I followed the instructions (https://ubuntu.com/download/kvm), but I don't know if I'm right after. So my question is: to disable these mitigations, do I need to change any files about the kernel, or something outside of emulation? Or after starting with qemu can I disable this mitigation? Because I can't disable it with kernel parameters, because seeing with "cat /sys/devices/system/cpu/vulnerabilities/spectre_v2" it's never [23:00] disabled... Another way I've seen to disable it would be to change the parameters and then update the grub , but with this emulated it has EFI apparently, so I can't disable this mitigation by Ubuntu core, I would like suggestions/help === sarnold_ is now known as ubuntuirccouncil