13:02:33 #startmeeting CIP IRC weekly meeting 13:02:33 Meeting started Thu Aug 22 13:02:33 2024 UTC and is due to finish in 60 minutes. The chair is jki. Information about MeetBot at http://wiki.debian.org/MeetBot. 13:02:33 Useful Commands: #action #agreed #help #info #idea #link #topic #startvote. 13:02:33 The meeting name has been set to 'cip_irc_weekly_meeting' 13:02:37 #topic AI review 13:02:42 - prepare blog entry on SLTS kernel state and challenges [Jan] 13:02:49 unfortunately still no news 13:02:55 - look into CVE triage tool [iwamatsu-san] 13:03:04 I have used this tool. 13:03:21 This is a tool to identify the CVEs involved in a given kernel config. 13:03:43 yes, or to rule CVEs out based on a config 13:03:53 I think this is a good tool to determine which CVEs are related to our kernel configurations. However, it takes a long time to process and this needs to be improved. In my environment, it took about 25 minutes per run. 13:04:29 The time can be reduced by having the program support parallel processing. 13:05:06 I suppose there are ways to optmize its runtime 13:05:17 did you also check the accuracy, at least for some examples? 13:06:54 Yes, I have also checked some for accuracy. I have only checked three kernel versions, but so far I have not found any problems. 13:07:11 And Since the results are output in JSON, the information can be filtered by processing the JSON. Currently, report-overview.py is provided as a simple tool for this. 13:07:36 At this time, it is necessary to look at the JSON to see which CVEs have been fixed, so report-overview.py and others need to be improved. 13:08:48 makes sense 13:09:13 but this sounds to me like we should continue to drive this, improve useability and eventually actually hook it into our workflow, right? 13:10:07 Yes,  I agree. 13:10:54 perfect, already informed Christoph :) 13:11:07 then next item 13:11:13 - clarify role of linux-6.1.y-cip-rebase tag [iwamatsu-san] 13:11:22 was this resolved? 13:12:09 Reference would be 13:12:11 Date: Tue, 13 Aug 2024 17:47:59 +0200 13:12:15 Subject: Re: [cip-dev] [ANNOUNCE] v6.1.102-cip26 13:12:27 https://git.kernel.org/pub/scm/linux/kernel/git/cip/linux-cip.git/tag/?h=linux-6.1.y-cip-rebase 13:12:27 This is _tag_ linux-6.1.y-cip-rebase. We also have a branch 13:12:28 linux-6.1.y-cip-rebase. IMO the tag is a mistake. 13:13:51 iwamatsu__:? 13:14:21 I am aware of this problem and try to erase it from the repository in my scripts every time. But I will check again. 13:14:47 so, this tag is re-created by a release script? 13:16:00 No, I don't think it was created by my script.... 13:16:17 But I will recheck . 13:16:23 ok, thanks 13:16:35 would be good to understand if this is recurring 13:17:02 other AIs I don't have, so... 13:17:05 5 13:17:07 4 13:17:08 3 13:17:10 2 13:17:11 1 13:17:13 #topic Kernel maintenance updates 13:17:30 This week reported 187 new CVEs and 11 updated CVEs. 13:17:32 been reviewing 6.1.103 13:17:53 I'm doing reviews, 6.1.103, .106 and AUTOSEL. 13:18:34 I reviewed 6.1.106. 13:19:34 anything else? 13:20:09 5 13:20:10 4 13:20:11 3 13:20:13 2 13:20:14 1 13:20:15 #topic Kernel release status 13:20:23 all green this time :) 13:20:30 nice 13:20:37 any issues ahead? 13:20:52 kci-dev as became an official kernelci project 13:21:08 but no updates on terms of functionality 13:21:18 you are already at "testing" :) 13:21:20 so 13:21:22 #topic Kernel testing 13:21:29 sorry 13:21:33 Sep 9th should see 3 -rt releases in 3 days. But no problem foreseen. 13:21:39 thanks 13:22:06 arisut: congrats for the project promotion 13:22:14 jki, thanks :) 13:22:29 now just finish it ;) 13:22:37 right :) 13:23:08 we had some issues with the qemu runner in the siemens-lab, should be resolved now 13:23:27 thaks for fixing it 13:23:53 seems it got quite some attention - unluckily 13:23:54 It would be nice to monitor dmesg for any backtraces, 13:24:08 in case it returns, 13:24:20 or if similar issue should appear. 13:24:42 should be possible, we did that in some other setup, but don't ask me for the details 13:26:31 anything else on testing? 13:26:46 The problem was on the host this time, quite hard to automatically monitor that from the test infrastructure / LAVA 13:27:25 why not using lava-docker ? 13:27:49 how would that help in case the host has a problem? 13:27:50 we are using that, but that does not protect you from hw issues of your host 13:28:00 having lava on docker should make errors better reproducibility 13:28:14 despite rumors, you still need real hardware somewhere to run containers ;) 13:28:25 sure hw issue are a different beast 13:28:38 :D 13:28:54 despite rumors lol 13:29:43 but are we catching kernel warnings of the target in lava already, or not? 13:32:08 is kernelci filtering them out? I would expect that 13:32:40 you mean host errors? 13:33:00 or board errors? 13:33:44 board errors 13:34:58 yes they are filtered with the testing system 13:35:13 ok, good 13:35:20 mostly depends on which tests are executed 13:35:30 or allowed to be executed 13:35:58 well, they should always be filtered and reported - unless the test case is to test WARN_ON 13:36:27 yes they should be reported 13:36:56 good, then move on... 13:36:58 5 13:37:00 4 13:37:01 3 13:37:03 2 13:37:05 1 13:37:06 #topic AOB 13:37:33 anything else for today? 13:38:13 I have some questions about the triage tool 13:38:23 First of all thank you for checking it out :) 13:38:40 What would you like to have in the overview tool? Which CVE the tool deemed relevant? 13:40:37 iwamatsu__:? 13:41:15 I would be happy to see a list of the CVEs involved and the status of the CVEs and commit ID. 13:41:49 That can be done 13:42:30 cool 13:42:42 nice 13:43:07 About the performance: did you cache the kmax formulas for each kernel version? 13:43:14 Generating them takes about 5 to 10 minutes on my machine 13:44:27 The checks can be parallelized too I think, which should give us some improvements too 13:45:21 I create them every time. I do not use cache. I understand that using a cache can be mitigating. 13:46:26 will those 15-25 min. run be per CVE? 13:47:05 per a kernel config. 13:47:23 No, once the kmax formulas are there, which only has to be done once for each kernel version, it takes about 10 seconds per CVE 13:47:33 or shorter, when we do not need to run all checks 13:47:37 ok, that is better 13:48:55 anything else? 13:49:23 5 13:49:24 4 13:49:26 3 13:49:27 2 13:49:29 1 13:49:30 #endmeeting