=== sconklin-gone is now known as sconklin === sconklin is now known as sconklin-gone === michaelh1 is now known as michaelh1|away === skaet_ is now known as skaet [09:11] Just one hour later and I hopefully did catch up with most of the accumulated mailbox.. :-P === michaelh1|away is now known as michaelh1 === TeTeT_ is now known as TeTeT [10:11] smb, heh [10:12] apw, You took the same time? :) [10:14] smb, ENOPARSE [10:15] apw, I had been saying I took about an hour for email, you said heh and since it is now about one hour since you been up first and you started to respond here I was guessing you just emerged from your pile. [10:16] heh you know i don't read mine at all :) [10:16] Of course! :) Well it also takes some time to delete it. ;) [10:27] hi all [10:28] hey [10:28] it seems that there are speakup modules on the natty cd, and also built into the kernel [10:28] just been discussing in -accessibility [10:28] in drivers/staging/speakup [10:29] apparently it doesn't need to be there as a module as it is in the kernel from .37 [10:32] pgraner, glxinfo -l | grep GL_MAX_TEXTURE_SIZE [10:32] AlanBell, ? you are saying we are carrying .ko's and its built in? [10:37] apw: yeah [10:37] actually I am passing on the message, I barely understand it myself [10:38] a blind user who uses speakup and knows way more about it than me pointed it out [10:48] AlanBell, where can i get more information :) [10:50] apw: join #ubuntu-accessibility and ask webczat [11:09] smb, seems that the vmscan patch does not help either, but it was worth a try === michaelh1 is now known as michaelh1|away [12:56] cking, a pity, but yeah it sounded worth it [12:59] always worth a spin [13:55] sconklin-gone, bjf[afk]: why does your bot SPAM stable release tracking bugs? for example, bug #736234 [13:55] Launchpad bug 736234 in linux "Lucid update to 2.6.32.32.15 stable release" [Undecided,Fix committed] https://launchpad.net/bugs/736234 [14:15] * ogasawara back in 20 === hito_jp0 is now known as hito_jp === sconklin-gone is now known as sconklin [14:41] tgardner: this round was done manually and not by a bot, and that one was just a mistake [14:42] sconklin, ack === diwic is now known as diwic_afk [15:28] * cking grabs a coffee === herton is now known as herton_lunch === bjf[afk] is now known as bjf [15:36] tgardner, it was a bug in the sconklin bot === fairuz is now known as fairuz-away === herton_lunch is now known as herton [16:39] apw, you mind kicking the cve report bot ? [16:41] bjf kicked in the nads [16:41] :-/ [16:41] poor bot [16:42] indeed [16:42] apw, just what it deserved [16:42] ValueError: active/CVE-2011-0463: dapper_linux-source-2.6.15 has unknown state: 'N/A' [16:42] active/CVE-2011-0463: karmic_linux has unknown state: 'N/A' [16:42] apw: The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by reading a file. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0463) [16:42] apw: The ocfs2_prepare_page_for_write function in fs/ocfs2/aops.c in the Oracle Cluster File System 2 (OCFS2) subsystem in the Linux kernel before 2.6.39-rc1 does not properly handle holes that cross page boundaries, which allows local users to obtain potentially sensitive information from uninitialized disk locations by reading a file. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0463) [16:43] bjf, whoever changes that one did it wrong :/ [16:43] apw, in the README it looked like N/A was an acceptable value [16:43] not-affected i think is the appropriate string [16:43] apw, i can change it to something else, but there is no, "won't fix" [16:43] oh i see [16:43] hmm [16:44] just leave it needed i guess [16:44] apw, i'll try something else [16:44] kees would be the one to ask then, but any invalid thingy will break it [16:44] (annoyingly) [16:48] tgardner, did the cve-2011-0695 patch get two acks ? [16:48] bjf: Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote attackers to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which triggers an invalid pointer dereference. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0695) [16:50] bjf, checking [16:51] bjf, that was the one already applied to Maverick, right? [16:51] tgardner, looks like it got applied to dapper master-next, that's all i wanted [16:51] tgardner, yes [16:52] bjf, what about Lucid ? [16:52] tgardner, got picked up via a stable release [16:52] tgardner, i'll double check [16:53] bjf, dapper was acked by ogasawara and myself [16:53] tgardner, ok, i guess i missed that [16:54] tgardner, yes, lucid already has it [16:55] bjf, its also applied to hardy with appropriate acks [16:58] apw, i've pushed changes to the cve status, can you kick it in the nads again ? [17:00] ## [17:00] ## Kernel team meeting in one hour [17:00] ## [17:01] bjf: do you need nominations in bug 769182 approved? [17:01] Launchpad bug 769182 in linux-ti-omap4 "CVE-2010-4249" [Undecided,Invalid] https://launchpad.net/bugs/769182 [17:02] bdmurray, thanks, i now have god like powers and can approve them myself, thanks for noticing that it needs to be done though [17:12] bjf: generally a "we're not fixing it" is either "needed" or "ignored". what's the situation; maybe I can help pick? [17:14] kees, i just changed it to "ignored" and pushed the change [17:14] kees, note the README says that 'N/A' is allowed [17:16] bjf: ooh, so it does! I'll change that. === yofel_ is now known as yofel [17:55] ## [17:55] ## Kernel team meeting in 5 minutes [17:55] ## [18:01] apw, meeting ? [18:01] here [18:25] anyone want to give this a thorough answer? : http://askubuntu.com/questions/37147/what-are-the-differences-between-the-ubuntu-shipped-kernel-and-the-upstream-kerne [18:29] JFo: point em to our delta review spec [18:29] ok === bjf changed the topic of #ubuntu-kernel to: Home: https://wiki.ubuntu.com/Kernel/ || Natty Kernel Version: 2.6.38 (Kernel is Frozen) || Ubuntu Kernel Team Meeting - May-17 - 17:00 UTC || If you have a question just ask, and do wait around for an answer! [18:44] <-need food. back soon [18:56] * tgardner --> lunch [20:21] ogasawara, gcc 4.6 builds the oneiric kernel OK, though there are a lot on new warnings about unused variables. [20:22] tgardner: cool [20:23] tgardner: I'm gonna be away on Friday, so if you get antsy and want to upload Oneiric to the archive, feel free. [20:24] ogasawara, antsy huh? :) I'll have to upload fairly soon to get libc-dev built. [20:24] tgardner: there was some recent discussion on lkml about these new warnings (https://lkml.org/lkml/2011/4/21/324) [20:25] herton, yep, saw those. I think they are now disabled? [20:25] or soon will be [20:25] tgardner: yep, from what I remember under make W=1 or more [20:26] (that is, disabled by default, can enable again with W=1 etc.) [20:27] right [20:28] * jjohansen -> lunch === michaelh1|away is now known as michaelh1 [20:47] any chance that oneiric will fit the window for 2.6.40? nvidia optimus support might make it in provided that xserver 1.11 also makes it. [20:48] LLStarks: I suspect it'll be 2.6.40, but we'll officially discuss this at UDS in 2 weeks [21:08] hi everyone, 5 channels later I'm here [21:08] I'm trying to track down what I believe to be a kernel issue - is anyone around for me to poke if I have issues? [21:08] in short when I copy a file (locally or over ethernet) after a certain percentage- my box freezes and my mouse etc becomes unresponsive [21:08] when I did: wget -c http://192.168.x.x/ubuntu.iso my box would freeze after 82%. When I did: unsquashfs on filesystem.squashfs (cp'ed from /casper on the install iso) - after 2% it always hangs [21:09] mick_laptop: on bare metal, or in a vm? [21:09] hallyn: bare, fresh 10.10 install [21:10] jinkeys [21:10] have you ran the memory test (from the grub menu)? [21:11] mick_laptop, get subscribed to -proposed and make sure this issue hasn't already been fixed by the latest kernel. [21:11] no, I'm trying to get a vanilla kernel going to see if it happens on a non-ubuntufied kernel :) [21:11] tgardner: -proposed a ml? [21:12] mick_laptop, no, in your apt repository settings. [21:13] ok, what should i try first? check ram, -proposed, or try other kernel? (I'm in the middle of a "make") [21:14] tgardner: ok, so where do i add that, in /etc/apt/sources.list ? [21:15] mick_laptop, we've also got prebuilt packages for mainline. [21:15] mick_laptop, re: /etc/apt/sources.list: yes [21:15] on what line? - maverick-updates ? [21:16] mick_laptop, duplicate that line, then change updates to proposed [21:16] mick_laptop, mainline builds are described here: https://wiki.ubuntu.com/Kernel/MainlineBuilds?action=show&redirect=KernelMainlineBuilds [21:17] thanks [21:38] kees, there is no comment for CVE-2010-4656 to match up with the supposed upstream patch [21:38] bjf: ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4656) [21:39] how do i know what kernel to d/l? [21:41] i guess +0.1 from uname -r [21:43] mick_laptop, Maverick? http://kernel.ubuntu.com/~kernel-ppa/mainline/v2.6.35.12-maverick [21:47] thanks [21:52] bjf: let me go look, one sec [21:54] bjf: ah, I can add the oss-security url where the CVE was assigned. http://www.openwall.com/lists/oss-security/2011/01/25/5 [21:55] kees, you may also want to look at the mailing list where we are discussing if the patch for 1017 is really the correct one [21:56] * kees looks [22:03] bjf: it seems like that thread got resolved? c340b1d640001c8c9ecff74f68fd90422ae2448a is for CVE-2011-1017 etc [22:03] kees: Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1017) [22:04] bjf: based on the oss-security thread, that's correct, and the other 2 tardner found are for the other two CVEs. [22:04] so far no crash [22:04] looking good [22:04] kees, there is no direct connection between the commit and the CVE, there is a question by tgardner on the specific patch submitted to the ubuntu-kernel-mailing list [22:05] oh, I was reading the SRU thread. the connection I found is this: http://openwall.com/lists/oss-security/2011/04/12/6 [22:06] that's the oss-security thread linked to from the mitre CVE [22:09] bjf: should I reply to the kernel-team thread with that oss-security link? [22:09] kees, i just did, thanks for looking at it [22:10] bjf: ah, cool, okay. [22:35] it just crashed again [22:35] shit [22:35] someone mind helping me triage this? [22:35] hallyn: I guess I'll start w/ the memory test [22:37] hallyn: how do i get grub to come up [22:37] it seems to be skipped, I guess I'll check the grub configuration [22:39] mick_laptop: i think you hold down 'shift' while it's rebooting [22:40] trying that... [22:41] nope [22:41] not it [22:52] i'm trying to find the thing that pauses it under /boot/grub/grub.cfg [22:53] i made it show, but it went away in a second [22:53] * mick_laptop tries again [22:53] mick_laptop, hold down the left shift key when you reboot [22:53] i did [22:53] didn't help [22:53] mick_laptop, i should say, as it is booting [22:54] let me reitterate... i did [22:54] i think it is grub_hidden_timeout (in caps) that is the right var... [22:59] ok, i'm in doing memtest [23:00] ok, so if the memtest comes back ok - where do i go from there? [23:01] it seems like the kernel isn't logging the crashes [23:01] nothing obvious in files under /var/log or dmesg [23:02] is there some type of a debug flag that i can set? [23:02] or a howto triage potential kernel issues? [23:02] howto on triaging* [23:03] mick_laptop: https://wiki.ubuntu.com/Kernel [23:06] ok, after a bunch of reading.... apt-get install linux-crashdump [23:06] i'll rtfm (manpage) and go from there === bjf is now known as bjf[afk] [23:46] i wonder if it is a kernel issue or faulty hw