Thursday, 2024-03-14

*** monstr <monstr!~monstr@nat-35.starnet.cz> has joined #cip05:52
*** rajm <rajm!~robert@82.27.50.32> has joined #cip06:59
*** frieder <frieder!~frieder@40-179-142-46.pool.kielnet.net> has joined #cip07:43
*** prabhakalad <prabhakalad!~prabhakar@147.161.225.85> has quit IRC (Remote host closed the connection)09:07
*** prabhakalad <prabhakalad!~prabhakar@147.161.225.85> has joined #cip09:07
*** shoragan_ is now known as shoragan10:33
*** monstr <monstr!~monstr@nat-35.starnet.cz> has quit IRC (Ping timeout: 252 seconds)11:56
*** iwamatsu__ <iwamatsu__!~iwamatsu_@2405:6581:5360:1800:7a44:f1a9:81f2:2da2> has joined #cip12:57
*** jki <jki!~jki@62.156.206.8> has joined #cip13:02
jkihi all13:02
jkisorry for the delay...13:02
ulihello13:02
arisuthi13:02
pave1Hi!13:02
iwamatsu__hi13:03
jkiok, let's start13:04
jki#startmeeting CIP IRC weekly meeting13:04
collab-meetbot`Meeting started Thu Mar 14 13:04:30 2024 UTC and is due to finish in 60 minutes.  The chair is jki. Information about MeetBot at http://wiki.debian.org/MeetBot.13:04
collab-meetbot`Useful Commands: #action #agreed #help #info #idea #link #topic #startvote.13:04
collab-meetbot`The meeting name has been set to 'cip_irc_weekly_meeting'13:04
*** collab-meetbot` changes topic to " (Meeting topic: CIP IRC weekly meeting)"13:04
jki#topic AI review13:04
*** collab-meetbot` changes topic to "AI review (Meeting topic: CIP IRC weekly meeting)"13:04
jki- prepare blog entry on SLTS kernel state and challenges [Jan]13:04
jkino relevant progress yet :(13:05
jki- migrate kernelci bot reports away from cip-dev [Chris]13:05
*** masami <masami!~masami@FL1-219-107-72-235.tky.mesh.ad.jp> has joined #cip13:05
jkilooks to me like they are really off now13:05
masamihi.13:05
jkimaybe chris will join later13:05
jkiother AIs?13:06
jki513:06
jki413:06
jki313:06
jki213:06
jki113:06
jki#topic Kernel maintenance updates13:06
*** collab-meetbot` changes topic to "Kernel maintenance updates (Meeting topic: CIP IRC weekly meeting)"13:06
ulii released 4.4-cip85 and reviewed 6.1.8013:06
masamiThis week reported 5 new CVEs and 8 updated CVEs.13:06
iwamatsu__I reviewed 6.1.80, and reviewing 6.1.81.13:06
pave1I'm doing reviews -- 6.1.81 and .82.13:07
jkiso few CVEs - something broken in the new process?? :)13:07
masaminot sure :(13:08
pave1And useful CVEs, wow.13:08
*** fbezdeka <fbezdeka!~flo@2a02:810d:8780:7fc:714b:7d2b:a26b:4d1a> has joined #cip13:08
pave1Anyway, I believe we should not get too used to it.13:08
jkiwe need to observe closely, yes13:09
jkiwe can't draw final conclusions yet, that is for sure13:09
masamifyi: https://lore.kernel.org/all/20240311150054.2945210-2-vegard.nossum@oracle.com/13:10
jkineed to read, looks interesting13:11
pave1masami: I seen that one, but I am not really sure what it means.13:11
masamiit will describe what is vulnerability so I hope it improves kernel cve process.13:13
jkican we actively (and visibly) contribute to it?13:14
pave1This might be good place to someone from security team to take a look.13:15
jkiworth at least a try, but I'm already afraid they won't have the bandwidth13:16
patersoncI saw an interesting CVE this week...13:16
patersonchttps://lore.kernel.org/linux-cve-announce/2024022840-CVE-2021-47050-5ba5@gregkh/T/13:16
patersoncIt was released e/Feb13:16
patersoncBut the original issue was fixed a couple of years ago13:16
patersoncAre they now going through every bug in history?13:16
pave1Yes, basically.13:16
jkiseems like - would explain the initial peak13:17
patersoncBut surely there would be thousands and thousands? Not just hundereds?13:17
pave1Notice that:13:17
pave1They don't describe the vulnerability.13:17
pave1Sentence in description is incomplete.13:17
pave1And this is not security vulnerability by any means.13:18
*** prabhakalad <prabhakalad!~prabhakar@147.161.225.85> has quit IRC (Ping timeout: 260 seconds)13:18
patersoncInterestingly as well, this issue actually affects CIP 4.1913:19
patersoncSo there was some value in this - we wouldn't have realised otherwise13:19
*** prabhakalad <prabhakalad!~prabhakar@147.161.225.85> has joined #cip13:20
pave1What value do you see?13:20
pave1This is robustness against bad device tree. Not any kind of security hole.13:20
patersoncWell, we have a NULL pointer dereference we can fix13:20
patersoncThe point is, we're not picking up bug fixes in the CIP kernels that are fixed in LTS etc. Isn't that the point of CIP SLTS?13:21
pave11) this does not fix anything13:22
pave12) it may even be buggy. How does it fix the null deref?13:22
pave13) we can't really backport all the ... that gets put into the stable tree.13:22
pave14) now we'll have to explain people (as I'm now explaining to you) that some CVEs are jun13:22
pave1junk13:22
pave1:-(.13:22
patersoncSo are we not monitoring upstream or LTS for (potential) bug fixes that affect the code we have in SLTS? Or are you saying that this patch has already been evaluated and deemed not valid for CIP?13:24
pave1We are not evaluating patches to backport between 5.10 and 4.19.13:24
pave1(And besides, after short evaluation, the patch is junk).13:24
jkinot scanning for LTS-only patches may actually be a current gap13:25
jkiwill become smaller when LTS gets shorted, but we should think about that13:25
pave1We relly on -stable team to do the evaluations, and they clearly did not do good job there.13:25
pave1This patch should not have been in -stable in the first place.13:25
jkiyes, don't disagree on the concrete patch13:26
jkiit's more about the general process13:26
patersoncindeed13:26
pave1But about 30% of patches in stable are "this does not fix anything"13:26
jkiare we sure we will most likely catch all LTS patches for our own kernels, even if they enter later in LTS?13:26
pave1and Greg does not really listen to feedback unless patch is obviously broken.13:27
pave1Feel free to get him to revert this one :-).13:27
patersoncIf we don't trust LTS at all, shouldn't we be monitoring all of the bug fixes etc. going into mainline to determine what's "correct" for CIP?13:27
pave1That's what SUSE does. They get much less patches to work with. But the CVE numbers will make their job harder.13:28
pave1jki: ?13:28
pave1jki: We rely on stable team to maintain 6.1, 5.10 and 4.1913:28
pave1jki: Between 4.19 and 4.4, we apply "whatever applies" without much review13:29
pave1jki: And then take manual look at the rest.13:29
jkiok13:29
pave1But this patch is a) bad, and b) much less severity than we would bother manually backporting it.13:29
patersoncOkay.13:30
pave1Its actually not okay,13:30
patersoncBut then it circles back to the original issue - there are now unresolved CVEs for SLTS that users will want to know why aren't fixed...13:30
pave1because now we'll have much more questions "why do do you have CVE-x-y unfixed".13:31
patersoncheh13:31
jkiyes, our (CIP in general) effort will likely shift a bit (or more) from doing to explaining/documenting13:31
pave1patersonc: Yes. And I guess someone should do a blog post13:31
pave1"Greg is spamming CVE numbers with junk, that's why you see so many unfixed CVEs".13:31
pave1Even better would be to contest junk CVEs such as this one.13:32
pave1It might be worth using our LF contacts to stop junk comming into CVE database in the first place.13:33
pave1Because I somehow suspect contesting the CVEs will nto be easy.13:34
jkiwe still need to wait a bit to let the system settle13:34
jkiyes, these discussions at least cost a lot of time13:34
patersoncRegardless of the CVEs and LTS, pave1 are you suggesting that that commit shouldn't have been accepted upstream to start with? Wouldn't that solve the whole loop (going forward..)13:35
pave1jki: I guess it is more diplomatic to wait. But we'll have few thousand CVEs people will ask about.13:35
pave1patersonc: Yes, upstream should have rejected.13:36
pave1But I don't see how that helps us.13:36
pave1Plus of course -stable team should have rejected it.13:36
jkicollect data, persistent examples (the original ones are not rejected), and then we may act13:36
pave1And then they should realized this should not have CVE...13:37
pave1But I'm under impression that -stable team would not revert the patch even after feedback -- because it is already in and does not hurt.13:37
patersoncAnd it would really break the CVEs to revert the "fixes" to the CVEs :P13:38
jkiwe can't argue based on impressions, we will need facts13:38
pave1Not sure. I don't have experience with that part.13:38
patersoncjki: Sure13:39
pave1jki: I guess we should take someone experienced in security to do the analysis, so that it can't be easily brushed out with 'but Greg believes otherwise'.13:39
jkifolks, I'm getting an urgent call - give me 5 min.13:40
pave1jki: This is going to be huge problem for the security team in the long run...13:40
pave1(or with "but it is better to err on side of caution").13:42
jkiback13:45
jkiyes, I'm still scouting for comments internally, but also those folks will need more datapoints than what we have after only 3 weeks13:46
pave1Ok. So should I spend say 10 hours13:47
pave1trying to randomly pick some "new" CVEs and analyze them?13:47
jkiyes, I think we should invest this (after the next pending -rt release ;-) )13:48
pave1Or would it be more valuable to pick the "worst" CVEs?13:48
jkithe more data, the better13:48
pave1Ok ;-).13:48
jkibad examples help, but their share in the overall number as well13:48
jkiok, clock is ticking for today - should we move on?13:49
jki513:49
jki413:49
jki313:49
jki213:49
jki113:50
jki#topic Kernel release status13:50
*** collab-meetbot` changes topic to "Kernel release status (Meeting topic: CIP IRC weekly meeting)"13:50
jki4.4-rt is late, rest on time13:50
pave1I need to do 4.4-rt.13:50
jkiany blockers?13:50
pave1Not really. I was waiting for 4.4.x.13:50
jkigood13:50
jkithen move on13:50
jki#topic Kernel testing13:50
*** collab-meetbot` changes topic to "Kernel testing (Meeting topic: CIP IRC weekly meeting)"13:50
arisutstill investigating in the kernelci core api but not updates yet13:51
pave16.8 is out. Would be good to start testing 6.8-stable.13:51
arisutkernelci is also in a bit of a change phase13:52
patersoncpave1: I'll set it up when the first -rc is out (it wasn't when I last checked)13:52
pave1-rc1 is now out.13:52
patersoncpave1: Okay13:52
pave1Thank you!13:53
patersoncIn the last "test report" email I sent I linked to Sietze's work on test reporting, did anyone see it?13:54
patersonchttps://cip-playground.gitlab.io/squad-hacking/cip-release-reports/13:54
patersoncEach build done gets a pretty/easy html page with a summary13:54
patersoncStill WIP, but a good starting point13:54
patersonce.g. https://cip-playground.gitlab.io/squad-hacking/cip-release-reports/linux-cip/linux-4.19.y-cip/4.19.306-cip107_800dfc28d.html13:55
pave1We currently have "There are failed tests" and "there are no failed tests".13:55
pave1More different messages would be now.13:55
pave1be nice.13:56
pave1And 4.19 is failing a lot -- is that expected? https://cip-playground.gitlab.io/squad-hacking/cip-release-reports/linux-cip/linux-4.19.y-cip/4.19.309-cip107_bae57856d.html13:56
patersoncDo the red cross and green tick not help?13:56
patersoncThere are lots of errors for LTP, always have been. We still need to work if they are meant to be failing or not. At least with squad we can now work out if there are any changes in the lists13:57
pave1Dunno. Negative sentences can be confusing. Green tick makes it better.13:58
pave1"All ok" would be even better :-).13:58
patersoncPlease add feedback to the gitlab issue: https://gitlab.com/cip-project/cip-testing/testing/-/issues/21113:58
pave1And "incomplete tests" is something for you to investigate, too?13:59
patersoncSure14:00
jkiokay - need to leave soon - more testing topics?14:01
jki514:02
jki414:02
jki314:02
jki214:02
jki114:02
jki#topic AOB14:02
*** collab-meetbot` changes topic to "AOB (Meeting topic: CIP IRC weekly meeting)"14:02
pave16.1.81 was kind of strange, having series of nfs and x86 changes.14:03
pave1It looks like this was due to CVEs... and it seems we have another x86 CPU bug.14:03
pave1This time it effects Atom, so it may be more relevant to us.14:03
pave1I've seen Intel information, still if someone had better explanation what is going on  there, it would be nice.14:04
jkiyeah, another HW vul14:04
jkiregister content leakage on context switch, but I didn't look into all details14:04
jkibut it can become an interesting topic if the mitigation is hard to backport14:04
pave1Yes, they seem to have some kind of "quick store forwarding" circuit, or something.14:04
jkiwe will need to check correlation of affected cores, their age, and CIP kernel usage for them (to the degree that's guessable)14:05
pave1-stable has backports of the fix for 6.1, but not 5.1014:06
gregkhGreg is not spamming anything, he is doing exactly what the cve board told him to do, pave1 please stop spraying lies14:06
pave1Oh, welcome.14:06
pave1gregkh: Obviously I don't know what they told you, but the end result looks suspiciously like a spam.14:07
gregkhI've always been here :)14:07
pave1gregkh: So... how long have you been analysing CVE-2021-47050 ?14:07
gregkhpave1: if you are upset at what we are required to do, please take it up with the cve group, as we are doing what they required us to do14:08
pave1gregkh: Are you required to submit non-bugs as a CVEs?14:08
pave1gregkh: how long have you been analysing CVE-2021-47050 ?14:08
gregkhThat came from the gsd import into cave, still ongoing will take a few months14:09
gregkh*cve, autocorrect...14:09
gregkhAnyway again if people have questions email us please14:09
pave1gregkh: Yes, and it has your name on it, so I assume you have analysed it. Did you?14:10
gregkhI must have, along with others, but I'm on vacation now, and can't remember specifics, if you have questions, again, email14:12
patersoncThanks Greg14:13
jkigood that we are talking :)14:13
jkithanks!14:13
pave1gregkh: I don't have questions. I'm complaining about changelogs being copy pasted into CVEs without analysis. I believe "spam" is quite suitable word for that.14:13
gregkhAnd in reading that record, looks real to me, if anyone doesnt think so, again, email14:13
gregkhWe take the log message directly, that's how we create cves14:14
gregkhThat's how we do for all kernel CVe records14:14
pave1gregkh: Yes, and that's a part of the problem. Because CVEs created that way don't make sense.14:14
pave1In the Linux kernel, the following vulnerability has been resolved:14:15
pave1memory: renesas-rpc-if: fix possible NULL pointer dereference of resource14:15
pave1Vulnerability would be "Malicious dts could lead to system crash".14:16
pave1Patch title is not vulnerability description.14:16
jkifolks, don't need to stop discussions, but I would close the irc call for this week now14:18
pave1Yep, lets do that.14:18
jkimaybe best to actually use email for this particular CVE and discuss that way further14:18
jki#endmeeting14:19
collab-meetbot`Meeting ended Thu Mar 14 14:19:00 2024 UTC.  Information about MeetBot at http://wiki.debian.org/MeetBot . (v 0.1.4)14:19
collab-meetbot`Minutes:        http://ircbot.wl.linuxfoundation.org/meetings/cip/2024/03/cip.2024-03-14-13.04.html14:19
collab-meetbot`Minutes (text): http://ircbot.wl.linuxfoundation.org/meetings/cip/2024/03/cip.2024-03-14-13.04.txt14:19
collab-meetbot`Log:            http://ircbot.wl.linuxfoundation.org/meetings/cip/2024/03/cip.2024-03-14-13.04.log.html14:19
*** collab-meetbot` changes topic to "Civil Infrastructure Platform Project. CIP mailing list at https://lists.cip-project.org/g/cip-dev | CIP kernel meeting every Thursday at 13:00 UTC | Find the meeting logs at https://ircbot.wl.linuxfoundation.org/meetings/cip/ and chat logs at https://ircbot.wl.linuxfoundation.org/logs/%23cip/"14:19
jkithanks all!14:19
iwamatsu__thank you14:19
ulithanks14:19
masamithank you14:19
pave1jki: Thank you.14:19
arisutthanks14:19
*** masami <masami!~masami@FL1-219-107-72-235.tky.mesh.ad.jp> has quit IRC (Quit: Leaving)14:19
arisutthanks gregkh :)14:19
arisuthave a nice vacation !14:20
pave1jki: I don't see how taking this out to email is going to help anything... Creating new CVEs is clearly easier than taking them down :-(.14:21
jkipavel: complain once you tried and failed, don't do that based on "I will fail"14:22
pave1jki: I don't expect to "fail". I'm pretty sure bad CVEs can be taken down with enough effort. But it feels wrong to invest hour into taking down CVE someone created in a minute.14:25
jkido it one, twice, maybe three times at most, then extrapolate14:25
pave1jki: Ok, I can do that. Still would prefer someone from security team to do this, as presumably they have experience how CVEs are expected to look and how CNA is expected to behave.14:27
jkiit takes both: process knowlegde and expertise in analysing the actual issues - that makes it hard14:31
pave1jki: I'm willing to do the technical analysis, but like the help with the process knowledge. Anyway, let's take down three CVEs and see how it goes.14:32
jkipavel: TIA!14:32
*** jki <jki!~jki@62.156.206.8> has quit IRC (Quit: Leaving)14:32
pave1jki :-).14:33
*** iwamatsu__ <iwamatsu__!~iwamatsu_@2405:6581:5360:1800:7a44:f1a9:81f2:2da2> has quit IRC (Quit: Client closed)15:13
*** fbezdeka <fbezdeka!~flo@2a02:810d:8780:7fc:714b:7d2b:a26b:4d1a> has left #cip16:06
*** gregkh_ <gregkh_!sid42031@id-42031.ilkley.irccloud.com> has joined #cip18:10
*** gregkh <gregkh!sid42031@id-42031.ilkley.irccloud.com> has quit IRC (Ping timeout: 264 seconds)18:12
*** gregkh_ is now known as gregkh18:12
*** frieder <frieder!~frieder@40-179-142-46.pool.kielnet.net> has quit IRC (Remote host closed the connection)21:46
*** rajm <rajm!~robert@82.27.50.32> has quit IRC (Ping timeout: 272 seconds)22:45

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!