OK cool:
$ sudo apt dist-upgrade
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Calculating upgrade... Done
#
# You can verify the status of security fixes using the `pro fix` command.
# E.g., a recent Ruby vulnerability can be checked with: `pro fix USN-6219-1`
# For more detail see: https://ubuntu.com/security/notices/USN-6219-1
#
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
$ pro fix
usage: pro fix <CVE-yyyy-nnnn+>|<USN-nnnn-d+> [flags]
the following arguments are required: security_issue
Two common #GNU #make patterns I tend to use often with #Buildroot:
time ( make &> build.txt; )
time ( make 2>&1 | tee build.txt; )
cleaning up tpm_tis
#linux #lkml https://lkml.org/lkml/2023/8/14/1065
i wonder in what state is explicit heap oom handling in #rust today. it was still pretty bad year ago.
especially i’m interested what has been already fixed when mirroring against a great #analysis from #crowstrike’s blog.
linux-tpmdd
pull request for v6.5-rc7: https://lkml.org/lkml/2023/8/11/1305 #linux #kernel #lkml