<mnutt_>
is it expected that ekam will always trigger a rebuild when files are changed? is anyone using it while developing through the vagrant nfs bridge?
<kentonv>
XgF: Thanks but Mark Seaborn, the Google Chrome security engineer who actually made a working exploit out of rowhammer, disagrees. In their tests they were unable to trigger rowhammer in ECC RAM.
<kentonv>
XgF: that said, yes, I plan to buy DDR4. ECC is "defense in depth".
sasattack-deskto has joined #sandstorm
<kentonv>
mnutt_: In continuous mode it should trigger rebuilds any time something in the source tree changes (but it doesn't watch installed files, etc.). It's entirely possible that it doesn't work well on non-local filesystems since sometimes they don't support inotify correctly.
<mnutt_>
kentonv: thanks, good to know. I’m guessing it’s something to do with the nfs bridge.
<kentonv>
mnutt_: I think what you want is somehow for the guest machine to be the host of the filesystem, and for the host machine to access said filesystem over network to the guest.
<kentonv>
mnutt_: Because the guest machine is the one running ekam so needs to know about all changes.
<mnutt_>
yeah, I think you’re right. for the time being I’ll probably just touch the files from the guest when I need a rebuild
erikoeurch has quit [Ping timeout: 246 seconds]
<XgF>
kentonv: the person who demonstrated the Chrome exploit did so on ECC systems
<XgF>
kentonv: ECC repairs aren't done regularly enough to compensate for rowhammer
<kentonv>
XgF: do you have a reference for that?
<XgF>
This was a discussion I had with them on another channel
<kentonv>
I'll ask Mark next time I see him but the last time I talked to him he said ECC got the job done in practice (even if not theoretically foolproof).