/srv/irclogs.ubuntu.com/2015/07/10/#ubuntu-kernel.txt

=== sturmflut_ is now known as sturmflut
apwSturmFlut, i am sure someone was somewhere in the world07:43
sturmflutHaha07:44
sturmflutI've debugged most of the problem and filed a bug report in the meantime, looks like the original problem is in ModemManager, but might affect the kernel as well in the end.07:51
ogra_sturmflut, but not a kernel anyone in here maintains :) 07:53
sturmflutogra_: Shouldn't the cdc_acm module of my desktop kernel blacklist that specific USB ID, because it will never work anyways and just confuse the russians?07:55
ogra_dont underestimate the cleverness of the russians :) 07:55
ogra_and i'm not sure its a kernel thing ... did you check that modemmanager doesnt ship udev rules that cause the loading ? 07:56
sturmflutHmm, now how does this udev stuff work with systemd...07:57
ogra_heh, te same as with other init systems :) 07:58
ogra_(i dont think systemd comes into play here ... but i guess modemmanager ships udev rules that react to uevents related to serial) 07:58
sturmflutModemManager ships some rules, not to load the module for this device, but to tell itself to blacklist a lot of similar cases. So the simple solution would be to at least add the device there, then cdc_acm gets still loaded and fails, but ModemManager does no longer claim the device.08:08
sturmflutNot pretty, but I can live with that.08:08
rtgapw, ogasawara_ upstream discussion on CONFIG_VM86 http://thread.gmane.org/gmane.linux.kernel/199102012:41
rtgkees suggests we turn it off12:42
apwrtg, yeah someone claims we have it off already, but it looks to be on to me12:48
rtgyup, their claim was erroneous12:48
apwrtg, it sounds like a security disaster in the making, so ripping it in wily and seeing if anything explodes seems good12:48
ogasawara_rtg: ack, do you already have a patch to push to wily to turn it off?12:48
rtgogasawara_, I was just disabling it in unstable12:48
rtgogasawara_, I can do wily master-next as well12:49
ogasawara_rtg: ack12:49
infinityDidn't we just turn that on in an SRU a few months back or something?12:50
infinityIt seems awfully familiar.12:50
infinityMaybe I'm thinking of something else with a similar-sounding name.12:53
rtginfinity, not finding any CONFIG_VM86 changes in trusty12:55
infinityrtg: Ahh, yeah, I was thinking of CONFIG_X86_16BIT, nevermind.12:55
infinitySo, VM86 seems scary and evil as all hell, I'm inclined to agree, but we need to make sure we don't need it for any old skool X drivers (vmware, vbox, etc)12:56
infinityOh, but if it doesn't even work on x86_64, my carefactor just went down.12:58
* infinity catches up on the rest of the thread.12:58
rtginfinity, it was 32 bit only in our configs12:59
infinityrtg: Yeah.  I'd be inclined to say we should disable it across all stable kernels too, then, as a pre-emptive security feature.12:59
infinityrtg: If no one was hunting for holes in it before, you can bet that thread will make grey hats start looking.13:00
infinityrtg: There are one or two X drivers that are i386-only.  If we can verify that they don't need VM86, I'd say the impact is minimal-to-none and worth the risk.13:01
rtginfinity, agreed, though the attack surface is much smaller given that it is only applicable to 32 bit machines. 13:01
rtginfinity, I'll run this by jjohansen and tyhicks as well13:02
rtgperhaps 32 bit cloud VMs are vulnerable13:03
infinityrtg: 32-bit still has an astoundingly large install base.13:04
infinityrtg: And certainly true going back to precise, where it was still our recommended image download.13:05
rtgyeah, I'd be willing to bet there are a lot of 32 bit instances in the cloud13:05
infinityrtg: Probably fewer than there should be (ie: I'd argue that most "tiny" and "small" instances should be i386, even if backed by amd64 hardware), but yeah, there are certainly some.13:06
rtginfinity, working on an SRU13:07
infinityrtg: I think we need a userspace impact analysis before we SRU it, but my hope is the impact is "none".13:08
infinityrtg: My only concern is ancient X drivers that haven't seen significant work in the last decade, and I think we only ship a couple of those.13:09
rtginfinity, it seems our choice is to orphan some vanishingly rare drivers, or expose possible vulnerabilities to every 32 bit user.13:10
rtgorphan -> regress13:11
infinityrtg: Hrm.  And vbetool.  That might need a looking at as well.13:11
rtgI'll make that part of the SRU discussion13:11
infinityrtg: But yes, we're on the same page.  I think the goal should be disabling VM86, we should just sort out the impact and see if we can minimize damage.13:11
infinityrtg: http://codesearch.debian.net/results/sys%2Fvm86.h13:14
infinityrtg: and http://codesearch.debian.net/results/asm%2Fvm86.h13:15
infinityrtg: Some might be false positives that we don't enable, others are probably build-time detected and would be broken if we regress the kernel support.13:16
rtginfinity, I guess Linus will howl if Lutomirski starts breaking user space13:18
infinityrtg: Well, it's never been a required kernel option, so it doesn't break userspace to disable it by default, by Linus's definition of break.13:20
infinityrtg: But distributions need to be aware of impact on already-shipped software if they disable features they used to enable.  That's where it gets sticky.13:21
rtginfinity, is userspace supposed to fall back into an emulation mode ?13:21
infinityrtg: I'd have to look at the glibc syscall wrapper.  It's possible that people using the abstracted sys/vm86.h are safe.13:22
infinityrtg: People using asm/vm86.h directly, though, are definitely broken if they don't have their own fallbacks in place.13:22
infinityrtg: I highly doubt we have an 8086 emulator in glibc though (in fact, I'm sure we don't), so in either case, if people are relying on the syscall without a fallback option, they'd explode regardless, I think.13:24
rtginfinity, would they explode at runtime or build time, or both ?13:25
infinityrtg: I'd assume just runtime, if the headers are still exposed when the option is off.13:25
infinityrtg: If the headers go away completely, then build time, but given the number of things that include the headers, I suspect that's not intended to happen.13:26
rtgthank you LP for blowing up and _not_ accepting my bug report.13:26
infinityrtg: LP is suffering some major infra mojo right now.13:27
rtginfinity, bug #147344713:27
ubot5bug 1473447 in linux (Ubuntu) "linux: VM86 should be disabled" [Undecided,New] https://launchpad.net/bugs/147344713:27
rtginfinity, we've got it disabled in Wily (4.1+), so we can experiment with the fallout13:28
infinityrtg: Yeahp, that seems like the safe approach for now.  We can abuse wily userspace a bit, cross-referencing with codesearch (which should have 100% coverage for what we care about, I'd be VERY shocked if we ship anything Ubuntu-only that uses vm86), and then sort out conclusions.13:29
infinityrtg: codesearch's only failure here is that it's only search unstable, so doesn't give us a clear view of the possibility that precise might be more broken than trusty or wily.13:31
infinityrtg: But it's a start anyway.13:31
infinityI really think we need to set up an Ubuntu codesearch instance that covers all supported series'... It's crazy useful.13:32
rtginfinity, seems like we should certainly have it disabled by 16.04, so experimenting on 15.10 makes sense13:32
infinityrtg: Yeahp, and in 15.10/16.04, I have zero issues with the idea that if some bits of userspace break without it, we can just deprecate/remove them if they're not fixable.13:33
infinityrtg: But that's a harder pill to swallow for precise and trusty.13:33
rtgagreed13:33
* cking wonders why the watchdogs are going nuts: https://pastebin.canonical.com/135040/13:48
infinitycking: That's... Impressive.14:02
infinitycking: I've never seen a kernel try so hard to starve userspace.14:02
ckinginfinity, it did have some repercussions: https://pastebin.canonical.com/135045/14:04
pointertonullvalHey guys I'm building my own embedded device and it will connect over usb to a computer. How I can start writing a linux driver? Is a kernel level problem or more high level? Thanks14:10
apwusb is interesting because there is a userspace library interface iirc, so you can write things out of the kernel14:11
TJ-pointertonullval: Look at the USB 'gadget' interface14:12
pointertonullvalapw, TJ- thanks! something like this? http://www.linux-usb.org/gadget/14:15
unixabgapw: it appears that casper does not like the multiple squashfs files on boot. But i am fairly 14:34
unixabgconfident that is sees them since it does make the mount points and then fails (I think on 14:35
unixabggetting the overlay right).14:35
apwit is possible that casper is trying to lay down multiple layers of overlayfs and not using the multiple layer support14:39
apwfor which there likely is no way to figure out if the functionality exists in the kernel ... hmm14:39
infinityapw: Does casper have support for multiple layers at all?  That would seem odd, if it's a new kernel feature.14:41
apwinfinity, it has some support in the sense they are layerable, ie mount the bottom two together, then mount the results with the next layer up14:43
apwthough you soon hit the stack depth limit in the kernel, so i think we bust on overlayfs at two mount layers, ie 3 layers14:43
apwunixabg, how many layers are there ?14:43
infinityapw: Anyhow, sorting out if functionality exists should be a non-issue, casper isn't the sort of tool one uses "blindly".  It should just do what you ask it to do, and if you're using a kernel that can't support that, you get to keep both pieces.14:45
apwthoug in a sense we have some way to do it two ways with differnet limits in each case14:46
apwand the second way only if you have a newer kernel, which doesn't tell you it can do it, though i guess for casper at least we kinda know what its built with14:47
infinityapw: If it's a question of mount options changing to support way 1 and way 2, and there's a distinct upstream version cutoff to go from 1 to 2, you could case uname -r.14:48
infinityOr, not case, but convert-and-compare, probably.14:49
unixabgapw: on my test with wily it fails by just adding a second layer. It may be helpful if I outline14:49
unixabghow I am testing, I basically am doing a quick remaster and I am generating my partial squashfs14:49
apwinfinity, ugg you are not putting me in my happy place14:50
unixabgfiles with live-partial-squashfs-updates:14:50
unixabghttp://live.debian.net/gitweb/?p=live-tools.git;a=blob_plain;f=bin/live-partial-squashfs-updates;hb=refs/heads/debian-next14:50
infinityapw: Do I ever?14:51
unixabgonce I generate a partial-squashfs-update (psu) against the filesystem.squashfs then I button14:51
apwinfinity, those days you offer to take me to the pub, yes14:51
unixabgthe image back together and boot it. But it is not working. I did test one layer was working on 14:51
unixabglinuxmin17.1 I think, mom to check that,14:52
unixabgyes that is correct, but any more than filesystem.squashfs and psu1.squashfs caused failure.14:53
unixabgLet me run one more quick test, since late yesterday and I had many tests going I do believe that now14:54
unixabgI can not even stack on one psu.squashfs. Be back in a short bit...14:54
unixabgapw: ok wily failed when I tried to add only one psu.squashfs along with filesystem.squashfs, next testing14:58
unixabglinuxmint17.214:58
apwunixabg, can't look at it right now, but it would be good to get a dmesg if you can to see if it is throwing a depth limit in there somewhere15:07
apwreport any testing here and i'll see if i can figure it out15:07
unixabgapw: humble appreciation. Ok now I just booted linuxmint17.2 + 1psu.squashfs and it is ok.15:13
unixabgs/and/and remastered and booted live,/g15:14
apwunixabg, whihc kernel does that have in it15:16
unixabgapw: uname -r produces 3.19.0-20-generic15:18
unixabgapw: dmesg in an image: http://fyeox.com/downloads/20150710-loop1fail-wily.png15:20
unixabgIt could be that it does not have the correct kernel version or something. Anyhow I am willing to15:22
unixabgassist however I can. I want the multiple squashfs to work well.15:22
brainwashcking: hey, I noticed bug 1470845 too. should this be forwarded somewhere upstream?15:44
ubot5bug 1470845 in systemd (Ubuntu) "systemd on wily desktop generating short lived threads every second in a quiet system" [Undecided,New] https://launchpad.net/bugs/147084515:44
brainwashinstalled forkstat some minutes ago15:45
ckingbrainwash, I was hoping it would get some triaging and attention on the ubuntu side of things, it maybe the way it's configured at the moment and is a temporary issue15:45
brainwashcking: it? what could be misconfigured?15:48
ckingbrainwash, i don't know, that's why I filed the bug15:48
brainwashok :) sadly, I only have access to ubuntu wily right now15:49
brainwashand I've never used forkstat before15:49
infinitycking: Did that happen before 222?15:49
ckinginfinity, I don't know either15:49
brainwash222 was pushed just recently15:50
ckingit's the "oh, I've noticed something that looks suspect and I don't know why or when it happened" kinda bug15:50
brainwashyeah, I don't understand this, but it made me wonder15:50
kees(rtg offline?) apw: in the past, usplash needed VM86, but it shouldn't be hard to deal with if that still an issue18:25
infinitykees: usplash was many, many years ago. :P20:26
mjg59Yeah sorry about that20:36
ogra_lol20:38
jdstrandogasawara: hey20:40
jdstrand$ cat /proc/version_signature 20:40
jdstrandUbuntu 4.1.0-1.1~dogfoodv1-generic 4.1.020:40
jdstrandogasawara: mic does not work20:40
jdstrandogasawara: for a data point, 4.0 that is in wily with the two commits I mentioned yesterday does work20:41
smoserhey. question on https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/147352720:42
ubot5Launchpad bug 1473527 in cloud-init (Ubuntu) "module ssh-authkey-fingerprints fails Input/output error: /dev/console" [Undecided,New]20:42
smoseris there any reason that that should happen ? (IO error on /dev/console)20:43
smoserwhere cmdline: console=ttyS1,11520020:43
smoserand the ttyS1 is seemingly fine (watching it from an ipmi)20:43
smoseranyone think of some reason that such a thing would occur 20:44
ogasawarajdstrand: care to file me a bug for tracking?  I think that sforshee on my team (possibly even ppisati) have your same system.  I'll see if they can reproduce.  If not, I'll have jsalisbury walk through a bisect with you when he's back on Mon.20:44
jdstrandogasawara: ok20:47
jdstrandogasawara: ubuntu-bug linux?20:47
ogasawarajdstrand: yes please20:47
jdstrandogasawara: is it worth updating linux-firmware to what is in wily too?20:48
ogasawarajdstrand: I don't believe so, has it even been updated for wily?20:48
jdstrandyes20:49
jdstrandit doesn't look like there is anything in there that would help this, but there are some other things. I'll update, reboot, retry and file20:53
jdstrandogasawara: hrmm, it said it wasn't an official Ubuntu package. how do people normally report against these ppa kernels?21:01
ogasawarajdstrand: ah shoot, we don't typically have high volume of bug reports against the kernels we push to that ppa21:02
ogasawarajdstrand: I'd say run the 4.0 kernel which was working to run ubuntu-bug linux (just to gather the system details)21:03
ogasawarajdstrand: and in the description note the regression with 4.121:03
jdstrandactually, I see there are some files in /etc/apport for firefox. let me try a few things21:03
jdstrandwell, my 4.0 would fail too I think (I recompiled it with those two patches)21:04
jdstrandbut yeah, I'll figure out how to report this thing :)21:04
ogasawaraoh right21:04
ogasawarajdstrand: if all else fails, manually file and I'll still make sure we get eyes on it21:05
jdstrandok, thanks21:06
jdstrandogasawara: heh, after reading the apport source: APPORT_DISABLE_DISTRO_CHECK=1 ubuntu-bug linux21:11
jdstrandogasawara: it still throws up a message about how it is unofficial, but it opens the browser to create the report21:12
ogasawarajdstrand: oh nice, I'll have to remember that.  I assume it does indeed attach the standard logs to the bug?21:13
jdstrandit says it will. I'll know in a moment once I finish the description21:14
jdstrandogasawara: looks like it: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/147356021:16
ubot5Launchpad bug 1473560 in linux (Ubuntu) "microphone regression on 4.1" [Undecided,Confirmed]21:16
ogasawarajdstrand: great, thanks.  I'll take it from here.21:17
jdstrandogasawara: thanks!21:18
keesinfinity: yeah, totally, but just in case there were other sneaky things like that still floating around21:39
infinitykees: As noted in the bug, codesearch.debian.net certainly shows a fair few references to vm86.h, the question is how many have fallback modes or are ifdeffed to oblivion, etc.21:40
infinitykees: So, it needs a bit of investigation.21:40
keesinfinity: yeah. fwiw, dosemu is fine. ;)21:48
lamonthttp://paste.ubuntu.com/11858310/ <-- lazy brain question... is that trace consistent with a "DO NOT BLOCK" kmalloc call?21:55
lamonttrusty kernel21:57
* lamont stands answered22:34

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!