Re: Bug#1062678: amd64-microcode: Package upstream's amdtee dir in amd64-microcode?

2024-02-15 Thread Henrique de Moraes Holschuh
On Thu, Feb 15, 2024, at 15:45, Mario Limonciello wrote:
> On 2/15/2024 12:39, Henrique de Moraes Holschuh wrote:
>> While adding linux-firmware's amdtee/ directory to the Debian 
>> amd64-microcode package, I have noticed that  the linux-firmware WHENCE file 
>> mentions a symbolic link that is not present in the git repository.
>> 
>> The missing symlink is:
>> amdtee/amd_pmf_v3.bin -> 773bd96f-b83f-4d52-b12dc529b13d8543.bin
>> 
>> Is the amd_pmf driver functional without that symlink ?
>> 
>
> symlinks are created by copy-firmware.sh

Thanks. I have to take that into account, then.  Hopefully this is the first 
instance of that bug in the amd64-microcode packaging, I will check every other 
file in there to ensure no links were missed.

-- 
  Henrique de Moraes Holschuh 



Re: Bug#1062678: amd64-microcode: Package upstream's amdtee dir in amd64-microcode?

2024-02-15 Thread Henrique de Moraes Holschuh
While adding linux-firmware's amdtee/ directory to the Debian amd64-microcode 
package, I have noticed that  the linux-firmware WHENCE file mentions a 
symbolic link that is not present in the git repository.

The missing symlink is:
amdtee/amd_pmf_v3.bin -> 773bd96f-b83f-4d52-b12dc529b13d8543.bin

Is the amd_pmf driver functional without that symlink ?

-- 
  Henrique de Moraes Holschuh 



Re: Bug#1062678: amd64-microcode: Package upstream's amdtee dir in amd64-microcode?

2024-02-15 Thread Henrique de Moraes Holschuh
On Tue, Feb 13, 2024, at 17:04, Diederik de Haas wrote:
> I'll add the `amdtee` dir to `Files-Excluded` in firmware-nonfree and 
> Henrique 
> can add those files to the amd64-microcode package.

Agreed.   For now, let's have amd64-microcode package to be the 
"SoC-and-CPU-related" firmware distribution for AMD, and keep the firmware for 
other AMD hardware, such as GPU adapter cards in the other firmware packages.

Since Diederik confirmed that amd-tee has never been shipped in a firmware-* 
package in Debian, it will not cause issues for amd64-microcode backports.  
Good, I can just have it on every branch, then.

I am currently waiting my updated gpg subkey to be activated (it is already in 
keyring.d.o, but it needs to wait for the monthly push).  It should happen in 
about 10 days, and then I will upload the new packages to unstable.

Meanwhile, I will prepare the updated packages in salsa.debian.org, if there's 
a need for a faster upload, we can ask someone to sponsor it next week.

PS: Mario, we're considering the newer AMD processor microcode sitting in 
linux-firmware to be a non-critical functional update since nobody was informed 
otherwise AFAIK, and I could not find the newer revisions listed in any AMD 
advisories.   If you know otherwise, drop us a note privately (e.g. inform the 
Debian security team, or inform me directly) and we will issue it as a security 
update.

-- 
  Henrique de Moraes Holschuh 



Re: Please add AMD-SEV firmware files (amd-folder) to close CVE-2019-9836 on specific EPYC-CPUs

2021-01-29 Thread Henrique de Moraes Holschuh
On Tue, 26 Jan 2021, Debian Bug Tracking System wrote:
> > reassign 970395 amd64-microcode
> Bug #970395 [src:firmware-nonfree] firmware-nonfree: Please add AMD-SEV 
> firmware files (amd-folder) to close CVE-2019-9836 on specific EPYC-CPUs
> Bug reassigned from package 'src:firmware-nonfree' to 'amd64-microcode'.
> Ignoring request to alter found versions of bug #970395 to the same values 
> previously set
> Ignoring request to alter fixed versions of bug #970395 to the same values 
> previously set
> > # please update to latest bc9cd0b7b0e96038ccc041ff409948d8f176142d
> > # 20/11/2020 in linux-firmware
> > done
> Unknown command or malformed arguments to command.
> > bc9cd0b7b0e96038ccc041ff409948d8f176142d has:
> Unknown command or malformed arguments to command.
> >Update AMD SEV firmware to version 0.17 build 44 for AMD family 17h
> Unknown command or malformed arguments to command.
> > processors with models in the range 00h to 0fh.
> Unknown command or malformed arguments to command.
> > Update AMD SEV firmware to version 0.24 build 7 for AMD family 17h
> Unknown command or malformed arguments to command.
> Too many unknown commands, stopping here.

I will look into this soon, probably this weekend.

I will direct any questions I have to the submitters and to this bug
report.

However, I have to find out if these firmware data files should go into
the early initramfs like the microcode (and *how*: naming, packaging
into a single file? the early initramfs works differently than normal
firmware loading).  Or should it go into the normal initramfs ?  Or
both?

If you have the answer to these questions and can follow up with them,
it will hasten the fix since I will not have to spend time looking for
the answers.

-- 
  Henrique Holschuh



Re: Bug#970395: firmware-nonfree: Please add AMD-SEV firmware files (amd-folder) to close CVE-2019-9836 on specific EPYC-CPUs

2020-10-01 Thread Henrique de Moraes Holschuh
On Sun, Sep 27, 2020, at 18:27, Ben Hutchings wrote:
> On Sun, 2020-09-27 at 13:43 -0300, Henrique de Moraes Holschuh wrote:
> > Answering from my phone, please excuse brevity and other netiquete
> > issues such as poor quoting cleanup.

This is still true :(

> However, we normally take all changes from linux-firmware.git up to a
> specific tag, and that might not be appropriate for the AMD microcode
> given the potential for system-breaking regressions.

So, until a more workable solution is found, if you need amd64-microcode to 
carry any other data files, please file a bug.  If I am behind an update for 
any reason, please file a bug.  I will see it and act on it. You don't need to 
wait to see if I noticed the upstream update or not, file the bug as soon as 
you're prepared to.

There was a mention about a pending security update of SES firmware in this 
thread.  If this needs an amd64-microcode release and if the ses firmware 
should go into that release, please explicitly say so, preferably in a new bug 
report, so that we can keep this one open until a final decision is done 
whether we should drop amd64-microcode as a separate package or keep it just 
for scripts, or keep the status-quo.

-- 
  Henrique de Moraes Holschuh 



Re: Bug#970395: firmware-nonfree: Please add AMD-SEV firmware files (amd-folder) to close CVE-2019-9836 on specific EPYC-CPUs

2020-09-27 Thread Henrique de Moraes Holschuh
Answering from my phone, please excuse brevity and other netiquete issues such 
as poor quoting cleanup.

On Fri, Sep 25, 2020, at 09:14, maximilian attems wrote:
> Dear Henrique,
> 
> It be great to get your input, hence repinging (;
> 
> Especially as linux-firmware is the common upstream source, it be ideal to 
> ship
> the amd64 mircrocode out of our firmware packages.

We can ship the ucode and other related data files in linux-firmware-nonfree, 
yes.  But the initramsfs glue needs.to go somewhere.  Either it can stick in 
the older package, and a depends ensures it gets installed, or 
linux-firmware-nonfree must carry it as debian packaging.

I.e. I am not opposed.  But there is more than a bunch of data files involved: 
the initramsfs integration must be somehow handled by whatever ships the data 
files.

However, you can also try opening a bug against amd64-microcode with a pointer 
to new upstream releases should I miss any for longer than a week, or asking 
for more files to be switched to amd64-microcode, e.g. if the ses datafiles 
should be in there along with the ucode ones, this could be done.

Either way is fine, what does the majority of the maintainers of 
linux-firmware-nonfree think about it ?

> On Sun, Sep 20, 2020 at 10:36:12AM +0200, maximilian attems wrote:
> > Dear Henrique, dear debian kernel maintainers, Cc: Michael,
> > 
> > Would you agree to generate the amd64-firmware packages directly out of the 
> > debian
> > linux-firmware source package?
> > 
> > This way the microcode would be updated on every linux-firmware non-free 
> > upload?

If you guys think this will improve update delivery latency in Debian, I am not 
opposed.  But ucode updates go to security, backports and stable unless there 
is too little feedback to gauge regression risk.

  Is that viable for the whole of linux-firmware-nonfree ?  If not, it would 
make sense to keep the amd64 ucode in a separate package.

> > I am asking as it keeps nugging me to have to outcomment the updates of that
> > microcode in the changelog (there is again a new one for the upcoming 
> > 20200918).

This should be very very easy to automate, but...

> > Would you want to be added in counterpart to the uploaders of 
> > firmware-nonfree?

I can do it myself if there is a need to upload a new release and I have to do 
that upload, but if you guys are using salsa, I'd need to be in the salsa group 
you're using.

> > Thank you very much for your amd64 microcode work.
> > 
> > kind regards,
> > maximilian
> > 
> > On Tue, Sep 15, 2020 at 04:55:43PM +0200, Michael Musenbrock wrote:
> > > Source: firmware-nonfree
> > > Severity: important
> > > 
> > > Dear maintainer,
> > > 
> > > first of all thanks for maintaining and packaging the linux-firmware 
> > > files repository as debian packages.
> > > 
> > > We currently need to manually obtain the 
> > > linux-firmware.git:amd/amd_sev_fam17h_model3xh.sbin [1] file on
> > > our AMD EPYC servers. The firmware files containing the AMD SEV firmware 
> > > closing security vulnerabilities [2]
> > > and fixes bugs and adds improvements to the AMD SEV implementation.
> > > 
> > > I'm most likely unqualified for legal questions but the LICENSE.amd-sev 
> > > [3] reads quite similar to the already
> > > added amdgpu license [4]. So I hope this is not the reason, why those 
> > > files were not added in the past.
> > > 
> > > The severity was choosen because it fixes a security vulnerability, 
> > > please change accordingly if you think
> > > it is wrong.
> > > 
> > > Thanks in advance. Best regards,
> > > michael
> > > 
> > > [1] 
> > > https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tree/amd
> > > [2] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9836
> > > [3] 
> > > https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tree/LICENSE.amd-sev
> > > [4] 
> > > https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/tree/LICENSE.amdgpu

-- 
  Henrique de Moraes Holschuh 



Re: Updating x86 microcode in stable

2018-05-16 Thread Henrique de Moraes Holschuh
On Tue, 15 May 2018, Ben Hutchings wrote:
> I notice that amd64-microcode and intel-microcode haven't been updated
> in stable this year.  (Indeed, amd64-microcode hasn't been updated at
> all this year, but I know AMD has issued an update!)

AMD did not issue any public updates AFAIK(!), the one we have [which is
not in stable] is only for EPYC processors, and came from SuSE...

So far we do not have a *single* report from someone with an EPYC box
whether it works or not, as far as I know.  I am not confortable with
proposing a stable update for this one unless we get such a report,
since that microcode update is *still* not available in linux-firmware
upstream...

If I am wrong about this, please correct me (and point me to the AMD
microcode release) and I will fix it ASAP.

> You have updated intel-microcode in backports suites instead.  What's
> the reasoning behind this?  I would expect all microcode updates to

One of the stable release managers suggested to be more careful with
this recent crop of microcode updates...

Given the fact that it triggered a number of issues in the kernels of
some vendors (kernel bug, not microcode bug), I agree with their
reasoning, so I did not send a SPU request after an one-month wait.

However, I don't see any reason why we could not start the process for
an upload of intel-microcode to stable right now.  It has been tested
widely enough by Debian users and other distros by now, and the only
kernels that regressed were Ubuntu's (related to apparmor and IBPB
support, worked around by noibpb), AFAIK.

> As you probably know, updated microcode is needed to mitigate against
> Spectre v2 when running code that has not been rebuilt with the
> "retpoline" mitigation, such as when making BIOS/UEFI calls.  I think
> it's also needed to support Spectre v2 mitigation in KVM guests running
> Windows.

Yes, that's correct.

> The Linux kernel in stretch has had support for the microcode-based
> mitigation since version 4.9.82-1+deb9u1.  I'm currently working on
> backporting these changes to jessie, so microcode updates would be
> useful there too.

ACK.  I usually send spu and ospu requests at the same time anyway,
since the criteria for acceptance is mostly the same.

-- 
  Henrique Holschuh



Bug#864716: modules and custom kernels

2017-06-13 Thread Henrique de Moraes Holschuh
It is recommended that users building their own kernels never configure
as a module any driver that Debian doesn't configure as a module.

Anyway, essential modules for system operation should preferably be
added to /etc/modules.  They will be early-loaded by whatever gets to
them first (be it the initramfs, or systemd, or sysvinit).  Both
initramfs-tools and dracut know to always add modules present in
/etc/modules to the initramfs, and attempt to manually load them.

Adding essential modules to /etc/initramfs-tools/modules works, but it
is specific to initramfs-tools.

-- 
  Henrique Holschuh



Bug#815915: lsinitramfs fails to properly skip the padding after each cpio archive

2016-04-17 Thread Henrique de Moraes Holschuh
On Sat, 16 Apr 2016, Ben Hutchings wrote:
> On Wed, 30 Mar 2016 14:33:52 -0300 Henrique de Moraes Holschuh 
>  wrote:
> > (note: I am not subscribed to this bug report. If you want a reply from
> > me, please keep me Cc'd).
> [...]
> > Now, to the root cause of the breakage:
> > 
> > The heuristics initramfs-tools "lsinitramfs" uses (used?) to locate the
> > next initramfs are incomplete (it does not skip over the padding at the
> > end of each initramfs)
> 
> Nope.
> 
> [...]
> > lsinitramfs needs to skip all zero bytes (or dwords) to locate the next
> > initramfs segment, instead of assuming a cpio block size of 512 bytes.
> [...]
> 
> That is exactly what it does.
> 
> Please don't guess what the 'root cause' is, actually do the research.

Eh, unfortunately I actually did it (sometime ago, for the Ubuntu bug
report), and evidently got it completely wrong.  Then, I copied my (faulty)
anaylsis from the Ubuntu bug report to the Debian bug report without
attempting to re-verify it.

So, it was actually even worse than not doing the research: it was doing it
incorrectly in the first place, and not revalidating it sometime later.  I
apologise for that.

Here is a data file that triggers the zcat crash, from one of the Ubuntu bug
reports:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1507443/+attachment/4499699/+files/initrd.img-4.2.0-16-generic.bak

Instrumenting lsinitramfs, we get the correct offset (0x2c00) for the next
segment start offset, and the temporary file (subarchive) is also correct.
So, lsinitramfs indeed skips the uncompressed initramfs properly.

Changing lsinitramfs to keep the temporary subarchive makes it simple to
check it and to test it against zcat.

A hexdump of the subarchive looks fine.  gzip -d will process it very
happily, no errors at all.  So will cat (subarchive) | gzip -d | cpio -t.

zcat either works or crashes depending on how you call it on the resulting
subarchive:

zcat -t (subarchive) >/dev/null crashes.

zcat (subarchive) | cpio -t, and zcat (subarchive) >/dev/null both work
fine.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



Bug#815915: lsinitramfs fails to properly skip the padding after each cpio archive

2016-03-30 Thread Henrique de Moraes Holschuh
(note: I am not subscribed to this bug report. If you want a reply from
me, please keep me Cc'd).

The padding between the component initramfs images that make up a
"hybrid initramfs" is a sequence of zeros, and it is aligned to the cpio
block/record size boundary.  There are several valid block sizes for
cpio, e.g. 512 (used by iucode v1.0 and earlier, and cpio default) or
1024, which iucode-tool v1.1 and later uses (as a defensive measure).

I can revert the 1024-byte block size in iucode-tool to 512 bytes, but
that's neither here nor there: it would just work around the bug in
lsinitramfs.  It would be better to fix lsinitramfs (assuming this isn't
fixed already in unstable).


Now, to the root cause of the breakage:

The heuristics initramfs-tools "lsinitramfs" uses (used?) to locate the
next initramfs are incomplete (it does not skip over the padding at the
end of each initramfs) and causes zcat to crash (which is likely a bug
in zcat itself).  It will work fine for 512-byte cpio block size, but
not for 1024-byte block size (and also likely not for other block
sizes).

lsinitramfs needs to skip all zero bytes (or dwords) to locate the next
initramfs segment, instead of assuming a cpio block size of 512 bytes.

And zcat should not crash if it gets a file that begins with a lot of
zeroes before the compressed data... it should either abort with an
error (invalid file), or skip the zeroes without crashing.  But that's a
separate bug.


For the record, a full account of how the kernel parses and loads an
initramfs (which is how lsinitramfs should behave in an ideal world):


EARLY cpio loader (lib/earlycpio.c, loads the microcode data and ACPI
table override data): always skips zero DWORDs (4 bytes) before any cpio
header, including the first.  So, it will just concatenate every
non-compressed cpio archive and skip any dword-aligned zero padding
before, after, or between cpio archive headers (and, therefore, also
between cpio archives).

Note: the early cpio loader does not care for subdirectories, it can
find data by the whole path, and that's how microcode is loaded. This
means the cpio archive with microcode does not need to have any of the
subdirectories inside, it doesn't matter to the kernel. I didn't check
how the ACPI table override loader behaves.

LATE cpio loader (init/initramfs.c, loads the real initramfs):
  1. Skips any zero bytes before the compressed or uncompressed data
  (thus, skips any padding between cpio archives).

  2. Unpacks any compressed or uncompressed cpio archive it finds,
  concatenating the contents (thus, it *will* also unpack
  the microcode in the first cpio archive, and this file will be
  available inside the initramfs).

  3. It *depends* on subdirectories being created *first* before any
  files inside them. If this is not done, it will ignore the file
  (so you could have data in the early initramfs that is "invisible"
  for the late cpio loader).

  4. It does NOT skip inital zero-padding on the *decompressed* data
  (i.e. if you compress a cpio archive, it must not have
  any initial zero padding).

  5. It skips any zero padding at the end (compressed or not), but the
  zeros must *end* at a DWORD boundary.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique de Moraes Holschuh 



Re: Bug#775812: base: HP EliteBook 840 G1 laptop fails to halt/poweroff after 15/12/2015 upgrade

2015-03-31 Thread Henrique de Moraes Holschuh
reassign 775812 linux
retitle 775812 linux-image-3.16.0-4-amd64: HP EliteBook 840 G1 laptop
fails to halt/poweroff after 3.16.7-ckt2-1 upgrade
thanks

For the kernel maintainers: according to the user's report and his
aptitude update log:

Last known-good version: 3.16.7-2
First known-bad  version: 3.16.7-ckt2-1

Synopsis: System will not power down if WoWLAN is enabled in BIOS/UEFI
(platform default!). System will properly power down if WoWLAN is
disabled in BIOS/UEFI.  This is a regression in the CKT stable kernels.

On Tue, Mar 31, 2015, at 05:40, Miguel Ortiz Lombardía wrote:
> Attached a file listing what was upgraded via apt on December 15, the
> day I first noticed the problem. I halt the computer every day, so that
> should be in principle the first day it refused to do so properly.

Thank you.

It was a quite large update run, but you did update the kernel, which is
the main suspect for this type of regression, anyway... so that's likely
it.

Other suspects (but very unlikely ones) from your update log: packagekit
and grub2-pc.

I will reassign this bug report to the kernel.  It is likely caused by
some change in either the shutdown path, or the wlan driver or
subsystem.

If it at all possible, please attach to this bug report the kernel boot
logs of 2014-12-14, 15 and 16.  They're usually either in
/var/log/dmesg* (if they have not been rotated out yet), or you'll need
to extract the relevant sections of /var/log/kern.log*.

Please also attach the output of "lspci -v -v" (run as root).

Let's hope the kernel guys can track down the problem and fix it. I
understand it would be easy for you to reproduce the problem if they
need more data.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique de Moraes Holschuh 


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/1427800262.539311.247482813.6f68f...@webmail.messagingengine.com



Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-15 Thread Henrique de Moraes Holschuh
On Sun, 15 Dec 2013, Robert Millan wrote:
> > Backporting the fix to these kernels might be a good idea, probably best
> > routed through an stable update upload (and not a security upload).
> 
> This might be a bit complicated due to significant changes in internal
> APIs. I'm also unsure if the yarrow algorithms used in those versions
> are good enough for the task.
> 
> Perhaps we should just disable Via chipset from sys/dev/random/probe.c.
> Would this be a terrible loss for a Technology Preview release?

I don't think it would be a terrible loss.

OTOH, I wouldn't lose any sleep over a VIA PadLock HRNG driving /dev/random
in a tech preview release.

I am not sure VIA ever updated the design with CPRNGs, but the original
one-HRNG and the following two-HRNG designs are very audit-friendly.

Just make sure you give xstore (the new instruction used to read the VIA
PadLock HRNG) a full cacheline worth of buffer (which must also be
cacheline-aligned), due to CPU errata... you'll get memory corruption of
nearby data otherwise.  You also have to audit (or otherwise lock down) the
HRNG configuration, or assume it is operating in its worst mode while
post-processing.  The VIA PadLock RNG *is* a single MSR-write away from
being misconfigured.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131216004912.ga7...@khazad-dum.debian.net



Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-14 Thread Henrique de Moraes Holschuh
On Sat, 14 Dec 2013, Steven Chamberlain wrote:
> On 14/12/13 01:08, Henrique de Moraes Holschuh wrote:
> > Yeah, I think Linux went through similar blindness braindamage sometime ago,
> > but blind trust on rdrand has been fixed for a long time now, and it never
> > trusted any of the other HRNGs (or used them for anything at all without a
> > trip through "rng-tools" userspace until v3.12).
> 
> I seem to remember that Ted T'so's committed the fix for this only after
> the release of Linux 3.2, so I assuemd wheezy's kernels might be still
> affected?

I'd need to check it througoutly, but almost all important /dev/random
changes in Linux were backported to all stable kernels, and thus eventually
migrated into the Debian kernel (which is based on 3.2.y-stable plus lots of
other backports).

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131214210047.ga29...@khazad-dum.debian.net



Re: possible /dev/random compromise (misplaced trust in RDRAND / Padlock entropy sources)

2013-12-13 Thread Henrique de Moraes Holschuh
On Sat, 14 Dec 2013, Robert Millan wrote:
> "we are going to backtrack and remove RDRAND and Padlock backends and feed
> them into Yarrow instead of delivering their output directly to /dev/random.

Yeah, I think Linux went through similar blindness braindamage sometime ago,
but blind trust on rdrand has been fixed for a long time now, and it never
trusted any of the other HRNGs (or used them for anything at all without a
trip through "rng-tools" userspace until v3.12).

> Advice from Security Team would be appreciated in order to determine which
> action needs to be taken in Debian.

IMO, Debian kernels ought to never blindly trust RDRAND, or any other HRNG,
for anything related to /dev/random.

Note that the kernel can trust such in-cpu, high-bandwidth/low-latency HRNGs
for other uses that are not related to key material (such as to implement
ASLR).

> kfreebsd 8.3 and 9.0 (wheezy):
>   Sets Via chipset to serve /dev/random unconditionally whenever detected,
>   but only on i386 (not amd64). Does not support Intel entropy source.
>   (see sys/dev/random/probe.c)

Backporting the fix to these kernels might be a good idea, probably best
routed through an stable update upload (and not a security upload).

> kfreebsd 9.2 (jessie / sid):
>   Sets Via or Intel chipset to serve /dev/random when detected,
>   unless hw.nehemiah_rng_enable or hw.ivy_rng_enable are set to zero
>   to disable them.

Remove, switch to kfreebsd 10.  Either that, or backport the fix from
kfreebsd 10.

> kfreebsd 10~ (sid):
>   All versions in Debian already have the fixed code, which replaces
>   random_adaptor_register() with live_entropy_source_register(), thereby
>   registering Via and Intel chips as "entropy sources" to be post
>   processed by Yarrow, rather than directly as "random adaptors".

Quite acceptable, as it means we'd have the same policy across Linux and
kFreeBSD.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131214010823.gc26...@khazad-dum.debian.net



Bug#728975: linux: [ARM] CONFIG_OABI_COMPAT harmful (slower, unsafe, breaks at least seccomp and audit)

2013-11-07 Thread Henrique de Moraes Holschuh
Package: linux
Severity: normal
Tags: security

Please refer to:
https://lkml.org/lkml/2013/11/5/448
https://lkml.org/lkml/2013/11/6/633

The issue is not yet closed in LKML, but basically OABI_COMPAT enabled seems
to be a danger: at least seccomp and audit should not be used with OABI, and
to top it off it is not "free" as far as performance goes, either: a fair
amount of added complexity, and an extra D-cache miss on every syscall.

-- System Information:
Debian Release: 7.2
  APT prefers proposed-updates
  APT policy: (990, 'proposed-updates'), (990, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.4.68+ (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20131107124637.ga4...@khazad-dum.debian.net



Bug#719944: intel-microcode stable backport upload waiting for the initramfs-tools backport upload

2013-08-22 Thread Henrique de Moraes Holschuh
Ben,

I have the intel-microcode wheezy-backport update tested, and ready for upload.

Do you have any timeframe for the initramfs-tools backport upload (of v0.113)?  
The intel-microcode backport really wants it, so it is best to have 
initramfs-tools in bpo70 before I upload the intel-microcode backport...

Thanks!

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique de Moraes Holschuh 


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1377176476.31560.12854713.02633...@webmail.messagingengine.com



Bug#719944: initramfs-tools: backport of prepend_earlyinitramfs() to Wheezy

2013-08-17 Thread Henrique de Moraes Holschuh
On Sat, 17 Aug 2013, Ben Hutchings wrote:
> There should be no changes to make in initramfs-tools, other than adding
> a changelog entry.  Please test 
> git://git.debian.org/git/kernel/initramfs-tools.git#wheezy-backports
> with the backported microcode patches, then I can upload if you confirm
> that the combination works.

Yes, it works just fine.

Thank you!

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130818013902.ga21...@khazad-dum.debian.net



Bug#719944: initramfs-tools: backport of prepend_earlyinitramfs() to Wheezy

2013-08-17 Thread Henrique de Moraes Holschuh
On Sat, 17 Aug 2013, Ben Hutchings wrote:
> You'll need to fix the initramfs-tools version dependency on the
> microcode patches (i.e. append a ~ to the minimum version).  Please do
> that in unstable as well as wheezy-backports.

Unstable currently depends on (>= 0.113), is there a pressing need for a new
upload to unstable just to change that versioned dependency to (>= 0.113~) ?
Otherwise, I will left that change pending for the next upload instead of
uploading a new package to unstable immediately.

I will make sure the stable-backports packages depend on initramfs-tools (>=
0.113~), of course.

> There should be no changes to make in initramfs-tools, other than adding
> a changelog entry.  Please test 
> git://git.debian.org/git/kernel/initramfs-tools.git#wheezy-backports
> with the backported microcode patches, then I can upload if you confirm
> that the combination works.

I will test that now.  Thanks.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130817192923.ga6...@khazad-dum.debian.net



Bug#719944: initramfs-tools: backport of prepend_earlyinitramfs() to Wheezy

2013-08-17 Thread Henrique de Moraes Holschuh
On Sat, 17 Aug 2013, Ben Hutchings wrote:
> > I can do it, it will be somewhat annoying due to version numbering dances,
> > but it is not difficult at all.  However, we could really enhance the
> > support of out-of-the-box wheezy for newer kernels with a no-risk stable
> > update of initramfs-tools v0.113...
> 
> This is not 'out-of-the-box wheezy' any more then... whichever
> administrator is customising with a new kernel package can also add the
> new initramfs-tools package.  There is no point in adding just one of
> them to wheezy.

Ok.  Could you please backport v0.113 to wheezy-backports, then?  I will
have to prepare both a stable update (without early fw support) and a wheezy
backport (with early fw support) of intel-microcode.

I could also upload an initramfs-tools v0.113 backport to wheezy-backports
if you're too busy right now, but it is always best when the maintainer does
a backport, instead of some other DD...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130817134107.ga18...@khazad-dum.debian.net



Bug#719944: initramfs-tools: backport of prepend_earlyinitramfs() to Wheezy

2013-08-17 Thread Henrique de Moraes Holschuh
On Sat, 17 Aug 2013, Ben Hutchings wrote:
> On Sat, 2013-08-17 at 00:22 -0300, Henrique de Moraes Holschuh wrote:
> [...]
> > People do use the LTS 3.10 kernel with Debian wheezy, it would be a very
> > good thing to be able to better support this kernel, and support early
> > firmware updates for those people out-of-the-box.  It will also come on very
> > handy for wheezy-and-a-half (updated kernel) if we decide to release it.
> [...]
> 
> We have wheezy-backports for this.  I don't see any need to change the
> wheezy version.

So, I should do a stable update for intel-microcode that doesn't support
early firmware mode?  And anyone trying a 3.10 kernel on wheezy with
encrypted root will get stuck without a keyboard and no way to boot because
they need initramfs-tools v0.112 or later?

I can do it, it will be somewhat annoying due to version numbering dances,
but it is not difficult at all.  However, we could really enhance the
support of out-of-the-box wheezy for newer kernels with a no-risk stable
update of initramfs-tools v0.113...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130817124520.gc16...@khazad-dum.debian.net



Bug#719944: initramfs-tools: backport of prepend_earlyinitramfs() to Wheezy

2013-08-16 Thread Henrique de Moraes Holschuh
Package: initramfs-tools
Version: 0.109.1
Severity: wishlist

I'd like to backport the prepend_earlyinitramfs() support to a stable
update of initramfs-tools.

The two patches in 0.112..0.113 apply directly on top of 0.109.1, and are
apropriate to 0.109.1.  The feature has been in unstable and testing for
some time now, and no bugs were reported.

Alternatively, we could backport v0.113 as is to stable, as it fixes some
real bugs that can cause trouble for stable users that use new kernels (such
as #700572), and doesn't introduce any risky changes.

A stable update of initramfs-tools adding prepend_earlyinitramfs() support
to wheezy would make it possible to do a stable update of intel-microcode
(which will be required anyway due to critical fixes recently issued by
Intel for several processors) that can support early firmware updates.

People do use the LTS 3.10 kernel with Debian wheezy, it would be a very
good thing to be able to better support this kernel, and support early
firmware updates for those people out-of-the-box.  It will also come on very
handy for wheezy-and-a-half (updated kernel) if we decide to release it.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130817032205.ga28...@khazad-dum.debian.net



Bug#712521: initramfs-tools: please add early-initramfs support for ucode update

2013-06-17 Thread Henrique de Moraes Holschuh
On Mon, 17 Jun 2013, Michael Prokop wrote:
> * Henrique de Moraes Holschuh [Sun Jun 16, 2013 at 03:42:45PM -0300]:
> > Enclosed you will find two patches to add early-initramfs support to
> > initramfs-tools.
> 
> > It adds, and properly documents, a hook function that allows packages
> > to _prepend_ data to the main initramfs archive.
> [...]
> > Please review and comment.  If it is OK, please apply.
> > git tree for git merge available upon request.
> 
> Thanks! I just applied it after reviewing it together with maks and
> pushed it to master.

Thank you.  I have the intel-microcode side ready and tested, do you have
any tentative time-frame for the initramfs-tools upload?

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130617211227.ga22...@khazad-dum.debian.net



Bug#712521: initramfs-tools: please add early-initramfs support for ucode update

2013-06-16 Thread Henrique de Moraes Holschuh
Package: initramfs-tools
Version: 0.112+nmu1
Severity: wishlist
Tags: patch

Enclosed you will find two patches to add early-initramfs support to
initramfs-tools.

It adds, and properly documents, a hook function that allows packages
to _prepend_ data to the main initramfs archive.

It will be used by intel-microcode and amd64-microcode to supply an early
initramfs with microcode data for the kernel.  This is extremely important
to properly work around bugs that would otherwise force the kernel to
disable important functionality (such as the ones in the Atom that requires
disabling PME, which previously required a bios update or the use of Intel
BITS to work around.  We have several documented cases of Debian users that
cannot use either method).

Please review and comment.  If it is OK, please apply.
git tree for git merge available upon request.

-- no debconf information

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh
>From 53852844059e8dac529618acfeffc285b32a3ee5 Mon Sep 17 00:00:00 2001
From: Henrique de Moraes Holschuh 
Date: Fri, 31 May 2013 22:16:44 -0300
Subject: [PATCH 1/2] implement early initramfs support

Add a new hook function, prepend_earlyinitramfs(), which prepends
the content of the file passed as a parameter to the initramfs
that will be generated.

This will be used to pass system processor microcode and ACPI table
overrides to the kernel (requires Linux kernel v3.9 or later).

Signed-off-by: Henrique de Moraes Holschuh 
---
 hook-functions|   10 ++
 initramfs-tools.8 |   14 ++
 mkinitramfs   |   19 ---
 3 files changed, 40 insertions(+), 3 deletions(-)

diff --git a/hook-functions b/hook-functions
index 817d06c..e751021 100644
--- a/hook-functions
+++ b/hook-functions
@@ -10,6 +10,16 @@ catenate_cpiogz() {
 	cat "${1}" >>"${__TMPCPIOGZ}"
 }
 
+prepend_earlyinitramfs() {
+	# Sanity check
+	if [ ! -e "${1}" ]; then
+		echo "W: prepend_earlyinitramfs: arg1='${1}' does not exist." >&2
+		return
+	fi
+
+	cat "${1}" >>"${__TMPEARLYCPIO}"
+}
+
 # force_load module [args...]
 force_load()
 {
diff --git a/initramfs-tools.8 b/initramfs-tools.8
index 375e5c1..546bb01 100644
--- a/initramfs-tools.8
+++ b/initramfs-tools.8
@@ -240,6 +240,20 @@ and copy them to the initramfs. This means that most executables, unless
 compiled with klibc, will automatically include glibc in the image which will
 increase its size by several hundred kilobytes.
 
+.SS Including a system firmware preimage (early initramfs)
+If you need to prepend data to the initramfs image, you need to prepare it
+in a file, and call the \fB\fIprepend_earlyinitramfs\fR function.  The file
+can be disposed of as soon as the function returns.
+
+.B Example:
+.nf
+TEMP_FILE=$(mktemp ...)
+  ...
+prepend_earlyinitramfs ${TEMP_FILE}
+rm -f ${TEMP_FILE}
+
+.RE
+
 .SS Exported variables
 mkinitramfs sets several variables for the hook scripts environment.
 
diff --git a/mkinitramfs b/mkinitramfs
index d9a54e2..cdec420 100755
--- a/mkinitramfs
+++ b/mkinitramfs
@@ -175,6 +175,7 @@ if [ -n "$fs" ] && mount | grep -q "on $fs .*noexec" ; then
 fi
 
 __TMPCPIOGZ="$(mktemp ${TMPDIR:-/var/tmp}/mkinitramfs-OL_XX)" || exit 1
+__TMPEARLYCPIO="$(mktemp ${TMPDIR:-/var/tmp}/mkinitramfs-FW_XX)" || exit 1
 
 DPKG_ARCH=`dpkg --print-architecture`
 
@@ -193,6 +194,9 @@ export BUSYBOX
 # Private, used by 'catenate_cpiogz'.
 export __TMPCPIOGZ
 
+# Private, used by 'prepend_earlyinitramfs'.
+export __TMPEARLYCPIO
+
 for d in bin conf/conf.d etc lib/modules run sbin scripts ${MODULESDIR}; do
 	mkdir -p "${DESTDIR}/${d}"
 done
@@ -331,9 +335,17 @@ if [ "$DPKG_ARCH" = armhf ]; then
 fi
 
 [ "${verbose}" = y ] && echo "Building cpio ${outfile} initramfs"
+
+if [ -s "${__TMPEARLYCPIO}" ]; then
+	cat "${__TMPEARLYCPIO}" >"${outfile}" || exit 1
+else
+	# truncate
+	> "${outfile}"
+fi
+
 (
 # work around lack of "set -o pipefail" for the following pipe:
-# cd "${DESTDIR}" && find . | cpio --quiet -R 0:0 -o -H newc | gzip >"${outfile}" || exit 1
+# cd "${DESTDIR}" && find . | cpio --quiet -R 0:0 -o -H newc | gzip >>"${outfile}" || exit 1
 exec 3>&1
 eval `
 	# http://cfaj.freeshell.org/shell/cus-faq-2.html
@@ -343,7 +355,7 @@ eval `
 		find . 4>&-; echo "ec1=$?;" >&4
 	} | {
 		cpio --quiet -R 0:0 -o -H newc 4>&-; echo "ec2=$?;" >&4
-	} | ${compress} >"${outfile}"
+	} | ${compress} >>"${outfile}"
 	echo 

Updating processor microcode in stable (squeeze)

2013-01-28 Thread Henrique de Moraes Holschuh
Please refer to the relevant history at the bottom of this email.

Summary for debian-release:

1. We have AMD and Intel microcode update packages in Wheezy and also in
   stable-backports.  These packages have been available for a reasonable
   amount of time (~two months for AMD, ~three months for Intel), without any
   relevant issues (i.e. they're field-tested).

2. Uptake of these packages was low, and only picked up a bit after an
   announcement to some Debian MLs.  However, once they started being
   recommended by the linux-firmware-nonfree packages in Wheeze, there was
   an extreme increase of uptake, as far as popcon data can tell
   us[1][2][3].

3. These packages fix very relevant, system-crash-class issues as well as
   feature issues (such as perf support, power management) for both Intel
   and AMD processors.  The less tech-savy the user is, the higher the
   probability of these packages being useful to the user (due to lack of
   BIOS/EFI updates being applied).

4. The microcode packages in stable (squeeze) only cover Intel processors,
   and it is also very outdated.  Just updating the intel-microcode package
   in squeeze would not address the issues of AMD users at all.

5. AMD microcode updates are not easily available in any other way than
   distro packages right now.  AMD upstream said in LKML that they will sort
   it out by the time the next update needs to be published, and likely do
   it through the linux-firware.git tree now that amd64.org is no more.

Therefore, I'd like to propose that the packages in debian-backports
(iucode-tool, amd64-microcode, intel-microcode) be uploaded to
stable-proposed-updates.  This would add one package to contrib stable
(iucode-tool), add one package to non-free stable (amd64-microcode), and
update one package in non-free stable (intel-microcode).

I'd also propose that the firmware-linux-nonfree package in stable be
updated to "recommends: intel-microcode | amd64-microcode".

If this request is approved by the stable release manager, I'll rebuild the
backport packages with a stable-compatible version before the upload.  They
will superseed the backported packages, but still sort before the wheezy
packages to not cause issues with the upgrade path.

Thank you!

[1] http://packages.qa.debian.org/i/intel-microcode.html,
http://qa.debian.org/popcon.php?package=intel-microcode
[2] http://packages.qa.debian.org/a/amd64-microcode.html,
http://qa.debian.org/popcon.php?package=amd64-microcode
[3] http://packages.qa.debian.org/i/iucode-tool.html,
http://qa.debian.org/popcon.php?package=iucode-tool

On Thu, 24 Jan 2013, Ben Hutchings wrote:
> On Thu, 2013-01-24 at 01:00 -0200, Henrique de Moraes Holschuh wrote:
> > On Wed, 23 Jan 2013, Ben Hutchings wrote:
> > > On Wed, Jan 23, 2013 at 11:15:37PM +0200, Touko Korpela wrote:
> > > > When using squeeze system, with wheezy (backports) of kernel and 
> > > > firmware,
> > > > recently firmware-linux started to recommend intel-microcode and
> > > > amd64-microcode packages.
> > > > I think that intel-microcode recommends can be versioned, so that it 
> > > > prefers
> > > > reworked versions (1.20120606.1 or newer) instead of old squeeze 
> > > > version.
> > > 
> > > I don't think a versioned Recommends will have the effect you're
> > > hoping for.
> > > 
> > > Also if there have been important bug fixes to the microcode then they
> > > should be included in stable-updates, not just squeeze-backports.
> > 
> > Ideally, we should get iucode-tool (which would be adding *new* package to
> > stable, something that is extremely rarely done) and the new versions of
> > amd64-microcode (also a new package for stable) and intel-microcode to
> > stable-updates.
> > 
> > I can certainly create an old-style intel-microcode package for
> > stable-updates, and that will give non-broken hardware counters for stable
> > Intel users [that run with a custom kernel, stable's doesn't support perf
> > AFAIK]
> 
> It does.
> 
> > and some nasty bugs removed.  But AMD users would still run with
> > microcode that screws up power management, has none/broken hardware counter
> > support, and some nasty bugs that hit rarely.
> > 
> > BTW, currently you cannot get AMD microcode updates from anywhere else other
> > than the distros and the internet archive.  Makes it somewhat more important
> > to add the package to stable proper, IMHO.
> > 
> > Should we take this to the stable release manager?
> 
> Please do.
> 
> > Good, up-to-date packages *are* available in stable-backports, though.
> > Sending word to the users to install those might make more sense and gi

Re: Should intel-microcode recommends be versioned (firmware-linux)?

2013-01-23 Thread Henrique de Moraes Holschuh
On Wed, 23 Jan 2013, Ben Hutchings wrote:
> On Wed, Jan 23, 2013 at 11:15:37PM +0200, Touko Korpela wrote:
> > When using squeeze system, with wheezy (backports) of kernel and firmware,
> > recently firmware-linux started to recommend intel-microcode and
> > amd64-microcode packages.
> > I think that intel-microcode recommends can be versioned, so that it prefers
> > reworked versions (1.20120606.1 or newer) instead of old squeeze version.
> 
> I don't think a versioned Recommends will have the effect you're
> hoping for.
> 
> Also if there have been important bug fixes to the microcode then they
> should be included in stable-updates, not just squeeze-backports.

Ideally, we should get iucode-tool (which would be adding *new* package to
stable, something that is extremely rarely done) and the new versions of
amd64-microcode (also a new package for stable) and intel-microcode to
stable-updates.

I can certainly create an old-style intel-microcode package for
stable-updates, and that will give non-broken hardware counters for stable
Intel users [that run with a custom kernel, stable's doesn't support perf
AFAIK] and some nasty bugs removed.  But AMD users would still run with
microcode that screws up power management, has none/broken hardware counter
support, and some nasty bugs that hit rarely.

BTW, currently you cannot get AMD microcode updates from anywhere else other
than the distros and the internet archive.  Makes it somewhat more important
to add the package to stable proper, IMHO.

Should we take this to the stable release manager?

Good, up-to-date packages *are* available in stable-backports, though.
Sending word to the users to install those might make more sense and give
better results, as people don't install these microcode packages by
themselves.  I've seen an absurd increase of popcon results for the two
microcode packages since the Recommends was added to firmware-linux.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20130124030051.ga18...@khazad-dum.debian.net



Bug#696059: linux: PATCH required for server interrupt load balancing/irqbalance (tested)

2012-12-17 Thread Henrique de Moraes Holschuh
On Sun, 16 Dec 2012, Ben Hutchings wrote:
> On Sun, 2012-12-16 at 11:24 -0200, Henrique de Moraes Holschuh wrote:
> > Package: linux
> > Version: 3.2.35-1
> > Severity: important
> > Tags: patch
> > 
> > Please include the attached patch in Wheezy, without it, irqbalance fails to
> > do its job properly on any server (actually any multi-core system with
> > MSI/MSI-X irqs).
> >
> > It is important to have irqbalance work properly out-of-the-box, since it is
> > the only trivial way to get better network/storage behaviour out of the
> > MSI-X capable NUMA systems that are >95% of the post-2010 server market.
> 
> Would be nice, but it has been broken for so long that 'everyone knows'
> to disable irqbalance.

Yeah, and nobody knows how to use hwloc either, so they probably leave it at
whatever the kernel/BIOS/EFI default mapping is.  And since the kernel
doesn't irqbalance by itself anymore, it will either be round-robin if
you're lucky, or all-in-the-first-core if you're unlucky...

> > I've tested the attached patch on stock (kernel.org) 3.2.34 on production,
> > and it works fine.  The patch is very simple, it just publishes the MSI
> > IRQ vector information to sysfs, which irqbalance uses.
> 
> Changes ABI, so will have to wait if we apply it at all.

It is a new ABI, actually, so it has no ill effects on existing
applications.  And this new ABI is already stable, too.

> > git commit upstream: b50cac55bf859d5b2fdcc1803a553a251b703456
> > 
> > Alternatively, we might want to add it to -stable series upstream, on the
> > grounds that it is widely desired functionality (i.e. useful for all
> > distros).
> 
> This doesn't suddenly become urgent because you just noticed it.

I don't recall claiming for urgency anywhere, unless you mean the request
that it should be added to the Wheezy kernel.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121217183738.gb32...@khazad-dum.debian.net



Bug#696059: linux: PATCH required for server interrupt load balancing/irqbalance (tested)

2012-12-16 Thread Henrique de Moraes Holschuh
Package: linux
Version: 3.2.35-1
Severity: important
Tags: patch

Please include the attached patch in Wheezy, without it, irqbalance fails to
do its job properly on any server (actually any multi-core system with
MSI/MSI-X irqs).

It is important to have irqbalance work properly out-of-the-box, since it is
the only trivial way to get better network/storage behaviour out of the
MSI-X capable NUMA systems that are >95% of the post-2010 server market.

I've tested the attached patch on stock (kernel.org) 3.2.34 on production,
and it works fine.  The patch is very simple, it just publishes the MSI
IRQ vector information to sysfs, which irqbalance uses.

git commit upstream: b50cac55bf859d5b2fdcc1803a553a251b703456

Alternatively, we might want to add it to -stable series upstream, on the
grounds that it is widely desired functionality (i.e. useful for all
distros).

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'testing-proposed-updates'), (500, 
'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 3.2.35+ (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh
>From b50cac55bf859d5b2fdcc1803a553a251b703456 Mon Sep 17 00:00:00 2001
From: Neil Horman 
Date: Thu, 6 Oct 2011 14:08:18 -0400
Subject: [PATCH] PCI/sysfs: add per pci device msi[x] irq listing (v5)

This patch adds a per-pci-device subdirectory in sysfs called:
/sys/bus/pci/devices//msi_irqs

This sub-directory exports the set of msi vectors allocated by a given
pci device, by creating a numbered sub-directory for each vector beneath
msi_irqs.  For each vector various attributes can be exported.
Currently the only attribute is called mode, which tracks the
operational mode of that vector (msi vs. msix)

Acked-by: Greg Kroah-Hartman 
Signed-off-by: Jesse Barnes 
---
 Documentation/ABI/testing/sysfs-bus-pci |   18 +
 drivers/pci/msi.c   |  111 +++
 include/linux/msi.h |3 +
 include/linux/pci.h |1 +
 4 files changed, 133 insertions(+)

diff --git a/Documentation/ABI/testing/sysfs-bus-pci b/Documentation/ABI/testing/sysfs-bus-pci
index 349ecf2..34f5110 100644
--- a/Documentation/ABI/testing/sysfs-bus-pci
+++ b/Documentation/ABI/testing/sysfs-bus-pci
@@ -66,6 +66,24 @@ Description:
 		re-discover previously removed devices.
 		Depends on CONFIG_HOTPLUG.
 
+What:		/sys/bus/pci/devices/.../msi_irqs/
+Date:		September, 2011
+Contact:	Neil Horman 
+Description:
+		The /sys/devices/.../msi_irqs directory contains a variable set
+		of sub-directories, with each sub-directory being named after a
+		corresponding msi irq vector allocated to that device.  Each
+		numbered sub-directory N contains attributes of that irq.
+		Note that this directory is not created for device drivers which
+		do not support msi irqs
+
+What:		/sys/bus/pci/devices/.../msi_irqs//mode
+Date:		September 2011
+Contact:	Neil Horman 
+Description:
+		This attribute indicates the mode that the irq vector named by
+		the parent directory is in (msi vs. msix)
+
 What:		/sys/bus/pci/devices/.../remove
 Date:		January 2009
 Contact:	Linux PCI developers 
diff --git a/drivers/pci/msi.c b/drivers/pci/msi.c
index 0e6d04d..e6b6b9c 100644
--- a/drivers/pci/msi.c
+++ b/drivers/pci/msi.c
@@ -323,6 +323,8 @@ static void free_msi_irqs(struct pci_dev *dev)
 			if (list_is_last(&entry->list, &dev->msi_list))
 iounmap(entry->mask_base);
 		}
+		kobject_del(&entry->kobj);
+		kobject_put(&entry->kobj);
 		list_del(&entry->list);
 		kfree(entry);
 	}
@@ -403,6 +405,98 @@ void pci_restore_msi_state(struct pci_dev *dev)
 }
 EXPORT_SYMBOL_GPL(pci_restore_msi_state);
 
+
+#define to_msi_attr(obj) container_of(obj, struct msi_attribute, attr)
+#define to_msi_desc(obj) container_of(obj, struct msi_desc, kobj)
+
+struct msi_attribute {
+	struct attributeattr;
+	ssize_t (*show)(struct msi_desc *entry, struct msi_attribute *attr,
+			char *buf);
+	ssize_t (*store)(struct msi_desc *entry, struct msi_attribute *attr,
+			 const char *buf, size_t count);
+};
+
+static ssize_t show_msi_mode(struct msi_desc *entry, struct msi_attribute *atr,
+			 char *buf)
+{
+	return sprintf(buf, "%s\n", entry->msi_attrib.is_msix ? "msix" : "msi");
+}
+
+static ssize_t msi_irq_attr_show(struct kobject *kobj,
+ struct attribute *attr, char *buf)
+{
+	struct msi_attribute *attribute = to_msi_attr(attr);
+	struct msi_desc *entry = to_msi_desc(kobj);
+
+	if (!attribute->show)
+		return -EIO;
+
+	return attribute->show(entry, attribute, buf);
+}
+
+static const struct sysfs_ops msi_irq_sysfs_ops = {
+	.show = msi_irq_attr_show,
+};
+
+stati

Bug#692604: firmware-linux-nonfree: please recommend amd64-microcode, intel-microcode

2012-11-07 Thread Henrique de Moraes Holschuh
On Wed, 07 Nov 2012, Ben Hutchings wrote:
> On Wed, Nov 07, 2012 at 05:55:48PM -0200, Henrique de Moraes Holschuh wrote:
> > Package: firmware-linux-nonfree
> 
> I think the firmware-linux metapackage would be more appropriate.

Sure, that would work as well.

> > Please recommend amd64-microcode | intel-microcode for Wheezy.  It would be
> > best if the majority of our users run with up-to-date microcode...
> 
> And you think that the package manager will somehow pick the right
> one just by luck? ;-)

Heh, you're right.  We can recommend both packages at the same time, then.
They can be co-installed, and will do the right thing.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121108004025.ga18...@khazad-dum.debian.net



Bug#692604: firmware-linux-nonfree: please recommend amd64-microcode, intel-microcode

2012-11-07 Thread Henrique de Moraes Holschuh
Package: firmware-linux-nonfree
Version: 0.36
Severity: wishlist

Please recommend amd64-microcode | intel-microcode for Wheezy.  It would be
best if the majority of our users run with up-to-date microcode...

Unfortunately, since these packages are arch-specific, this recommendation
cannot be met on arches other than i386 and amd64.  AFAIK, this shouldn't
cause any operational problems, though.

-- System Information:
Debian Release: wheezy/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'testing-proposed-updates'), (500, 
'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.33+ (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

firmware-linux-nonfree depends on no packages.

firmware-linux-nonfree recommends no packages.

Versions of packages firmware-linux-nonfree suggests:
ii  initramfs-tools  0.109
ii  linux-image-3.2.0-3-amd64 [linux-image]  3.2.23-1

-- no debconf information

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121107195548.ga7...@khazad-dum.debian.net



Bug#688794: Circular dependancy after reboot when..

2012-10-09 Thread Henrique de Moraes Holschuh
On Tue, 09 Oct 2012, maximilian attems wrote:
> > On Tue, 09 Oct 2012, maximilian attems wrote:
> > > On Mon, Oct 08, 2012 at 06:03:20PM -0300, Henrique de Moraes Holschuh 
> > > wrote:
> > > > Well, I don't mind changing the name of the initramfs-tools helper 
> > > > scripts
> > > > in the *-microcode packages,
> > > 
> > > please do so.
> > 
> > As long as the release managers agree.  I will try.
> 
> Of course they will as it only your package that triggers this bug.

For now.  "-" is common in package names, much more than "_".  It *will*
happen again if left as-is.

If anything at all (update-initramfs, documentation or even lintian) either
mentioned or warned about this pitfall, it wouldn't have happened to
intel-microcode and amd64-microcode.

FWIW, I have already uploaded intel-microcode and amd64-microcode packages
that work around the bug, and I will bug the Wheezy release-managers about
it 10 days from now.  I definately own them a beer or two already.  And I
have to bug the Ubuntu release-managers for a freeze exception there too :-(

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121009141912.ga15...@khazad-dum.debian.net



Bug#688794: Circular dependancy after reboot when..

2012-10-09 Thread Henrique de Moraes Holschuh
On Tue, 09 Oct 2012, maximilian attems wrote:
> On Mon, Oct 08, 2012 at 06:03:20PM -0300, Henrique de Moraes Holschuh wrote:
> > Well, I don't mind changing the name of the initramfs-tools helper scripts
> > in the *-microcode packages,
> 
> please do so.

As long as the release managers agree.  I will try.

> > but this _really_ needs to be documented in the
> > initramfs-tools manpages, AND it needs to generate an warning on
> > update-initramfs time.  It is really non-obvious.
> 
> The corner case infact involves a noexec /var/tmp, which is why allmost
> no one sees it.

This makes it worse.  Please document this now, an upload that only changes
manpages and static docs in /usr/share/doc is not going to endanger the
freeze.

> > However, I do propose that instead of changing intel-microcode,
> > amd64-microcode, and any other packages present and future that might run
> > afoul of this restriction, the initramfs scripts should suitably transform
> > all valid script names so that they can be valid variable names.
> 
> well oh well progress, we did issue a warning, but it went away,
> because in the common cases it does work.

?!!

> > Also, I suggest that initramfs-tools should either provide tsort inside the
> > initramfs, or drop the code that conditionally uses it.  That codepath could
> > be hiding landmines as well.
> 
> The landmines are that this codepath is real crap, still dating jbailey.
> No way we going to touch that at this point of the release.

You're aware that post-freeze or not, the fix for this kind of crap needs to
go to stable, I hope.  So it is either fix it during the freeze, or fix it
through stable-proposed-updates.

>From what I can see, the only fix that is not going to over-complicate
things is to make sure update-initramfs will ALWAYS create the ORDER file,
and remove the other two codepaths from scripts/functions.  If the ORDER
file is missing, the initramfs code should try to run things in C collation
order, as that has at least a non-zero chance of working, and therefore it
is MUCH better than dying with an error message *during boot*.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121009102647.ga28...@khazad-dum.debian.net



Bug#688794: Circular dependancy after reboot when..

2012-10-08 Thread Henrique de Moraes Holschuh
On Mon, 08 Oct 2012, maximilian attems wrote:
> "Variables set by the user must have a name consisting solely of alphabet‐
> ics, numerics, and underscores - the first of which must not be numeric."
> - dash.1
> 
> it seems the initramfs-tools manpage added the "dash" along
> the lines, which is wrong for this cornercase of /tmp noexec and
> no busybox.
> Then scripts are unfortunately variable names and thus should not
> have dash in their names.

Well, I don't mind changing the name of the initramfs-tools helper scripts
in the *-microcode packages, but this _really_ needs to be documented in the
initramfs-tools manpages, AND it needs to generate an warning on
update-initramfs time.  It is really non-obvious.

However, I do propose that instead of changing intel-microcode,
amd64-microcode, and any other packages present and future that might run
afoul of this restriction, the initramfs scripts should suitably transform
all valid script names so that they can be valid variable names.

Maybe it could internally replace all characters that are valid for package
names but not for variables with "_", or just skip any characters outside of
[a-zA-Z0-9_].  This has the advantage of being a central fix, and also
avoiding a very nasty breakage on a fallback mode of the initramfs that is
rarely exercised.

Also, I suggest that initramfs-tools should either provide tsort inside the
initramfs, or drop the code that conditionally uses it.  That codepath could
be hiding landmines as well.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


--
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20121008210320.ga25...@khazad-dum.debian.net



Bug#684569: microcode module loaded on Celeron CPU

2012-08-13 Thread Henrique de Moraes Holschuh
On Mon, 13 Aug 2012, Jonathan Nieder wrote:
> You can see why an OS distributor would be stuck in this situation,
> though.  If the microcode updates are installed by default, Debian is
> taking responsibility for their effect (in the sense of receiving bug
> reports and providing updates when appropriate to address them).  And
> that is very hard to do without the corresponding source code.

It is not the lack of "source code"[1] that is the problem.  It is the
absolute lack of any sort of release guidance whatsoever from Intel when a
new microcode update is made available.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120813183119.gc3...@khazad-dum.debian.net



Bug#684569: linux-image-3.5-trunk-686-pae: microcode module loaded on Celeron CPU

2012-08-13 Thread Henrique de Moraes Holschuh
On Mon, 13 Aug 2012, Paul Menzel wrote:
> Looking into this some more, this seems unlikely in Debian because the
> microcode packages are in non-free [1] and therefore not available for
> Debian users not having enabled non-free repositories.
> 
> Because of that the microcode packages are also non-essential, that
> means not installed by default even when non-free packages are allowed.
> And normal users will never install them by themselves.
> 
> So currently I am pretty sure 99, % of Debian users do not have it
> installed.

That is correct, yes.  We may change the Debian installer to offer to
install the microcode packages for AMD and/or Intel to users that enable
non-free.  We could also document the availability of the microcode packages
in the release documentation, I suppose.  But Debian really isn't big on the
non-free stuff.

> > With the latest mainline kernel the microcode driver should be automatically
> > loaded by CPUID probing through udev.
> 
> How can I find out, if the microcode provided by my BIOS is older than
> the one provided by the processor vendor? I am pretty sure, that for
> example Intel does not release any updates for the Celeron CPU in my
> ASUS Eee PC 701 4G.

The easiest way, by far, is to attempt to update to the latest microcode in
the microcode distribution.

Assuming you're using Debian testing/unstable, install the intel-microcode
package (in unstable, install also package iucode-tool to avoid bloating the
initramfs).  Then grep for "microcode" in the kernel logs.  The 3.2 kernel
will log the fact that it had to update the processor microcode.  If it
doesn't log anything, either no microcode for that processor model is
available, or you're already running newer microcode.

In Debian stable, it works the same way but I am not sure the kernel will
log anything of value.

If you want to do it the hard way:

"iucode-tool --scan-system" will tell you your processor's signature
(requires the cpuid module to be loaded first).  If you're running Debian
stable, wait a few days for the Squeeze backport to hit the mirrors.

You can get the pf_mask and current version of microcode on each core from
/sys/devices/system/cpu/cpu*/microcode/, and you can check the
intel-microcode package changelog for your processor's signature to see if a
higher revision is available.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120813163215.ga3...@khazad-dum.debian.net



Bug#678519: after about a month, routing gets wedged

2012-07-28 Thread Henrique de Moraes Holschuh
On Sat, 28 Jul 2012, Rudy Zijlstra wrote:
> stopping aiccu, rmmod sit and tunnel4 and then reloading and
> restarting aiccu did solve it
> 
> Next time i will start with restarting aiccu, and not rmmoding the
> related modules

Hmm, okay.  That should help narrow it down a lot.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120729023827.gb3...@khazad-dum.debian.net



Bug#681418: debugfs is a big security hole

2012-07-13 Thread Henrique de Moraes Holschuh
On Fri, 13 Jul 2012, Ben Hutchings wrote:
> I certainly consider mounting of debugfs to be significant security
> liability.  I'm not at all happy that people use it as the basis for

Seconded.  I know of at least three ways to hardcrash boxes through
debugfs (system specific, not a kernel bug), and the unfortunate naming
DOES help kernel maintainers take an even more irresponsible instance
regarding security than what is already [unfortunately] normal.  e.g.
missing calls to capable() in debugfs handlers.

It really should be called "advcfgfs".  Either that, or it should taint
the kernel when mounted, and any production stuff would be forced to
"graduate" to a proper peer-reviewed interface.

> I would like to address this by backporting this feature:
> 
> commit d6e486868cde585842d55ba3b6ec57af090fc343
> Author: Ludwig Nussel 
> Date:   Wed Jan 25 11:52:28 2012 +0100
> 
> debugfs: add mode, uid and gid options
> 
> and then changing the default mode (mask) to be 0700.  This should
> leave debugfs functional (most such applications will require root
> anyway) and allow users to relax permissions if they really don't
> care about the security problems.

Actually, it would be best if we could set mode, uid and gid per
inode/dentry, with defaults to the ones in the mount command (or
root:root 700).  Just like tmpfs does.

> However, currently there is not a single place for the user options.
> I think that either (1) debugfs should be mounted by default in a
> similar way to other pseudo-filesystems, or (2) debugfs should have a
> noauto entry in /etc/fstab where users can set options, and packages
> may use 'mount /sys/kernel/debug' to mount debugfs with those options
> (not 'mount -t debugfs debugfs /sys/kernel/debug', as now).

Both ideas would work.  Can you provide a patch for the relevant
initscripts?

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120713134317.gb7...@khazad-dum.debian.net



Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-24 Thread Henrique de Moraes Holschuh
On Sun, 24 Jun 2012, Ben Hutchings wrote:
> On Sun, 2012-06-24 at 12:21 -0300, Henrique de Moraes Holschuh wrote:
> > On Sat, 23 Jun 2012, Ben Hutchings wrote:
> > > > > The package template system currently only supports one optional
> > > > > postinst action, but it wouldn't be hard to extend to add others.
> > 
> > Ok, I tried to ship the microcode for amd processors using firmware-nonfree.
> > There are a few problems:
> > 
> > 1. firmware-nonfree seems to be very tightly tied to module names.  We'd
> > need to join all microcode upstream packages under "microcode" which is the
> > module name.  This is not a good thing IMO.
> 
> No such tying is required.

Uh? I failed at attempting it, it aborts complaining that it cannot find
something in (base, microcode), (base, cpu-x86-amd), etc.  And it only runs
after I install the -support package, as it wants python modules that are in
there.

> > 2. firmware-nonfree simply doesn't want to work without MODULE_FIRMWARE
> > support in the official kernel-image, that somehow migrates to magic binary
> > dumps in the -support package for that image, that gets used by
> > firmware-nonfree to generate its own metadata.  Yikes!
> 
> I don't know where you get this idea, as there is no such information in
> linux-support-.  The set of files to be included in
> firmware-foo is specified by foo/defines.

It was not enough to get it to run, but maybe I did something wrong.  Help
is appreciated (or a pointer to the documentation for how to work with
firmware-nonfree).

> > 3. firmware-nonfree _really_ needs a README.source :-)
> 
> Yeah.
> 
> > So, I am stumped.  Assuming it is simply not a matter of me not groking how
> > to shoehorn firmware-nonfree to do what I need, at this point, it either
> > means we need some changes to firmware-nonfree so that it can ALSO work as a
> > generic multi-upstream dumping ground for stuff that does not benefit from
> > (or actively gets harmed by) the automation it currently does, or that we
> > should have separate source packages for such stuff, and leave
> > firmware-nonfree for regular firmware that fits well with the automation it
> > currently implements.
> > 
> > Any ideas?
> 
> I think it might be better in the long term to split up firmware-nonfree
> and provide a dh_firmware used by multiple source packages.
> 
> But I think you are seeing obstacles that don't exist.

Other than the lack of a README.source to avoid it?  Maybe.  But at the end
of the day, the fact is that I still don't know how to get firmware-nonfree
to do what I need it to :-(

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120624160531.ga3...@khazad-dum.debian.net



Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-24 Thread Henrique de Moraes Holschuh
On Sat, 23 Jun 2012, Ben Hutchings wrote:
> > > The package template system currently only supports one optional
> > > postinst action, but it wouldn't be hard to extend to add others.

Ok, I tried to ship the microcode for amd processors using firmware-nonfree.
There are a few problems:

1. firmware-nonfree seems to be very tightly tied to module names.  We'd
need to join all microcode upstream packages under "microcode" which is the
module name.  This is not a good thing IMO.

2. firmware-nonfree simply doesn't want to work without MODULE_FIRMWARE
support in the official kernel-image, that somehow migrates to magic binary
dumps in the -support package for that image, that gets used by
firmware-nonfree to generate its own metadata.  Yikes!

3. firmware-nonfree _really_ needs a README.source :-)

So, I am stumped.  Assuming it is simply not a matter of me not groking how
to shoehorn firmware-nonfree to do what I need, at this point, it either
means we need some changes to firmware-nonfree so that it can ALSO work as a
generic multi-upstream dumping ground for stuff that does not benefit from
(or actively gets harmed by) the automation it currently does, or that we
should have separate source packages for such stuff, and leave
firmware-nonfree for regular firmware that fits well with the automation it
currently implements.

Any ideas?

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120624152154.ge24...@khazad-dum.debian.net



Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-23 Thread Henrique de Moraes Holschuh
On Sat, 23 Jun 2012, Ben Hutchings wrote:
> On Fri, 2012-06-22 at 23:49 -0300, Henrique de Moraes Holschuh wrote:
> > On Sat, 23 Jun 2012, Ben Hutchings wrote:
> > > On Fri, 2012-06-22 at 16:03 -0300, Henrique de Moraes Holschuh wrote:
> > > > On Fri, 22 Jun 2012, Ben Hutchings wrote:
> > > > > On Sat, 2012-06-16 at 15:08 -0300, Henrique de Moraes Holschuh wrote:
> > > > > > They have to:
> > > > > > 
> > > > > > 1. Issue sysfs commands to refresh running microcode
> > > > > 
> > > > > With a current kernel, udev will load the firmware just as for any 
> > > > > other
> > > > > device.
> > > > 
> > > > Yes, it will.  At boot.  And only if the driver is modular.  And only if
> > > > something specifically modprobes microcode, because it has no 
> > > > autoloading
> > > > support in kernel 3.2 and earlier (I think that support was to land in 
> > > > 3.5,
> > > > but it might already have landed in 3.4).
> > > >
> > > > So, Microcode needs to be refreshed when you upgrade the data files, and
> > > > also when the driver is not modular (at least last time I tested it in 
> > > > a 3.0
> > > > kernel for Intel), and that requires postinst and initramfs specific 
> > > > magic
> > > > (quite a lot for Intel, nearly none for AMD).
> > > 
> > > > Backporting the autoload code is not straigthforward.
> > > 
> > > I backported the general support for x86 CPU module autoloading in
> > > 3.2.21-1.  The rest should be easy, shouldn't it?
> > 
> > Probably yes.
> > 
> > However, the microcode core also went through a large code change
> > because it was ported from half-braindead sysdev to a full blown device.
> > I am not sure if you can do the autoloading properly without that
> > conversion, it depends on whether the code in 3.2 generates the required
> > uevents and sysfs attributes, or not.
> > 
> > Do we have a git tree with the Debian kernel somewhere?
> 
> The source package is currently still in svn, but there is a git mirror
> of the patched source at
> <http://anonscm.debian.org/gitweb/?p=kernel/linux.git>.
> 
> > > > > > and update the initramfs when updated/installed.
> > > > > 
> > > > > firmware-nonfree can do that (some network drivers need firmware).
> > > > 
> > > > Is it amicable to special postinst code?  If it is, it can take care of
> > > > amd64-microcode.
> > > 
> > > The package template system currently only supports one optional
> > > postinst action, but it wouldn't be hard to extend to add others.
> > 
> > Let's see if I can get that to work over the weekend.  I will be unable to
> > do any Debian work next week, which is rather unfortunate given the freeze
> > deadline.
> 
> It's not a hard deadline for package updates.
> 
> [...]
> > > Why is this 'needed'; are future processors expected to be particularly
> > > buggy?
> > 
> > A few current ones already are, and there is no reason to believe it
> > won't happen again in the future.  "buggy" here means something the
> > kernel wants (or cannot afford not to) to test for only once, and
> > disable functionality if the relevant microcode update is not already
> > installed in the processor.
> 
> Right, good point.
> 
> > Anyway, we will need to update the userspace microcode facilities for
> > new kernels, as early-init microcode update support should land in 3.6
> > or 3.7 and will require changes on how it interacts with the initramfs.
> > I'd rather this was something simple to do for wheezy-stable through
> > either a stable update, or a backport or a single simple package.
> [...]
> 
> I don't see why that should be included in wheezy.

Maybe as a backport at first.  People do like to use more recent kernels
than the stable one with stable userspace...  and it would be useful for
wheezy-and-a-half if it comes to happen.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120623160840.gb9...@khazad-dum.debian.net



Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-22 Thread Henrique de Moraes Holschuh
On Sat, 23 Jun 2012, Ben Hutchings wrote:
> On Fri, 2012-06-22 at 16:03 -0300, Henrique de Moraes Holschuh wrote:
> > On Fri, 22 Jun 2012, Ben Hutchings wrote:
> > > On Sat, 2012-06-16 at 15:08 -0300, Henrique de Moraes Holschuh wrote:
> > > > They have to:
> > > > 
> > > > 1. Issue sysfs commands to refresh running microcode
> > > 
> > > With a current kernel, udev will load the firmware just as for any other
> > > device.
> > 
> > Yes, it will.  At boot.  And only if the driver is modular.  And only if
> > something specifically modprobes microcode, because it has no autoloading
> > support in kernel 3.2 and earlier (I think that support was to land in 3.5,
> > but it might already have landed in 3.4).
> >
> > So, Microcode needs to be refreshed when you upgrade the data files, and
> > also when the driver is not modular (at least last time I tested it in a 3.0
> > kernel for Intel), and that requires postinst and initramfs specific magic
> > (quite a lot for Intel, nearly none for AMD).
> 
> > Backporting the autoload code is not straigthforward.
> 
> I backported the general support for x86 CPU module autoloading in
> 3.2.21-1.  The rest should be easy, shouldn't it?

Probably yes.

However, the microcode core also went through a large code change
because it was ported from half-braindead sysdev to a full blown device.
I am not sure if you can do the autoloading properly without that
conversion, it depends on whether the code in 3.2 generates the required
uevents and sysfs attributes, or not.

Do we have a git tree with the Debian kernel somewhere?

> > > > and update the initramfs when updated/installed.
> > > 
> > > firmware-nonfree can do that (some network drivers need firmware).
> > 
> > Is it amicable to special postinst code?  If it is, it can take care of
> > amd64-microcode.
> 
> The package template system currently only supports one optional
> postinst action, but it wouldn't be hard to extend to add others.

Let's see if I can get that to work over the weekend.  I will be unable to
do any Debian work next week, which is rather unfortunate given the freeze
deadline.

> > > > 2. Ensure that the microcode module and processor microcode will be 
> > > > added
> > > > to the initramfs.
> > > 
> > > Can be done by initramfs-tools.
> > 
> > Yes, it can.  But initramfs-tools has no specific code other than some NFS
> > stuff, so we would probably benefit from a firmware-cpu-tools or whatever,
> > which could drop the initramfs helper, dpkg triggers and helper scripts to
> > get things done for both amd and intel microcode.
> > 
> > I'd rather not duplicate this code for Intel and AMD, so it would need to
> > end up in a -common/-util package of some sort (or in intramfs-tools
> > directly, but I don't think that's a good idea):  soon we will also need a
> > new type of hook to piggyback the microcode using a initramfs-like
> > container, either to the initramfs itself, or to the kernel image (I am not
> > clear on that detail yet), and the microcode will be loaded on the BSP very
> > very early, and on other cores BEFORE they're activated.
> 
> Why is this 'needed'; are future processors expected to be particularly
> buggy?

A few current ones already are, and there is no reason to believe it
won't happen again in the future.  "buggy" here means something the
kernel wants (or cannot afford not to) to test for only once, and
disable functionality if the relevant microcode update is not already
installed in the processor.

Anyway, we will need to update the userspace microcode facilities for
new kernels, as early-init microcode update support should land in 3.6
or 3.7 and will require changes on how it interacts with the initramfs.
I'd rather this was something simple to do for wheezy-stable through
either a stable update, or a backport or a single simple package.

> Named firmware files can generally be included in the kernel image, but
> of course we won't do that in official Debian packages.

It won't go through the firmware interface, that thing is not available
early enough... the microcode update needs to be available during the
bootstrap processor init.  So far, it looks like it will be something
initramfs-like that gets either added to the real initramfs or to the
kernel image (I am not sure of the details), and has files with specific
names inside with the relevant data blobs.

Anyway, it will require updated userland to be used to its full
functionality, so I'd prefer to have all userland logic in a single
place that we can update and backport, instead o

Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-22 Thread Henrique de Moraes Holschuh
On Fri, 22 Jun 2012, Ben Hutchings wrote:
> On Sat, 2012-06-16 at 15:08 -0300, Henrique de Moraes Holschuh wrote:
> > On Tue, 12 Jun 2012, Daniel Baumann wrote:
> > > On 06/12/2012 06:04 PM, Henrique de Moraes Holschuh wrote:
> > > > I don't care as long as nobody is going to get in the way of an
> > > > urgency=high upload of firmware-nonfree to stable-proposed-updates or
> > > > stable-updates.
> > > 
> > > there have been updates of firmware-* packages in the past and more
> > > recently for squeeze too, so i don't think that's a problem.
> > > 
> > > > Well, the amd64-microcode has not cleared NEW yet.  How should we 
> > > > proceed?
> > > 
> > > in my personal opinion, i'd prefere having it integrated into
> > > firmware-nonfree. but it's not my call but the kernel team to decide.
> > 
> > Ok, I've looked into firmware-nonfree.
> > 
> > The intel and amd64 microcode packages are not simple static data-drop
> > packages (next upload of amd64-microcode will add the required postinst
> > bits).
> > 
> > They have to:
> > 
> > 1. Issue sysfs commands to refresh running microcode
> 
> With a current kernel, udev will load the firmware just as for any other
> device.

Yes, it will.  At boot.  And only if the driver is modular.  And only if
something specifically modprobes microcode, because it has no autoloading
support in kernel 3.2 and earlier (I think that support was to land in 3.5,
but it might already have landed in 3.4).

So, Microcode needs to be refreshed when you upgrade the data files, and
also when the driver is not modular (at least last time I tested it in a 3.0
kernel for Intel), and that requires postinst and initramfs specific magic
(quite a lot for Intel, nearly none for AMD).

Backporting the autoload code is not straigthforward.  Adding
MODULE_FIRMWARE() to the amd microcode driver is trivial and I think we
should do it anyway.  MODULE_FIRMWARE() is currently impossible for Intel
and unless we want to possibly deviate from upstream, there is no way we can
fix that right now.

> > and update the initramfs when updated/installed.
> 
> firmware-nonfree can do that (some network drivers need firmware).

Is it amicable to special postinst code?  If it is, it can take care of
amd64-microcode.

> > 2. Ensure that the microcode module and processor microcode will be added
> > to the initramfs.
> 
> Can be done by initramfs-tools.

Yes, it can.  But initramfs-tools has no specific code other than some NFS
stuff, so we would probably benefit from a firmware-cpu-tools or whatever,
which could drop the initramfs helper, dpkg triggers and helper scripts to
get things done for both amd and intel microcode.

I'd rather not duplicate this code for Intel and AMD, so it would need to
end up in a -common/-util package of some sort (or in intramfs-tools
directly, but I don't think that's a good idea):  soon we will also need a
new type of hook to piggyback the microcode using a initramfs-like
container, either to the initramfs itself, or to the kernel image (I am not
clear on that detail yet), and the microcode will be loaded on the BSP very
very early, and on other cores BEFORE they're activated.

This functionality has not landed in the kernel yet, but since we do know it
is coming, we better make sure we will be able to take advantage of it
without too much packaging rework.  A -common/-util package is probably best
for that, and I intend to upload something to that effort this weekend.

> > This doesn't integrate automatically with firmware-nonfree right now, and I
> > really don't have the time to add support to figure out everything in
> > firmware-nonfree and add these operations to firmware-nonfree right before
> > the freeze,
> [...]
> 
> Why don't you upload your package somewhere I can look at it?  So far I
> don't see any reason to add a new source package.

Here:
http://people.debian.org/~hmh/microcode/

as one cannot download from the NEW queue, where it is currently.

The -1 packages are lacking the postinst snippet to refresh microcode, as
that area was in flux over the last few days and I was actively
participating on the thread in LKML to make sure we got something sane for
userspace as the result.

I was going to add the code to -2, now that the new sysfs nodes are set. It
is in my laptop at home, and I can send it in later today.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120622190334.ga32...@khazad-dum.debian.net



Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-16 Thread Henrique de Moraes Holschuh
On Tue, 12 Jun 2012, Daniel Baumann wrote:
> On 06/12/2012 06:04 PM, Henrique de Moraes Holschuh wrote:
> > I don't care as long as nobody is going to get in the way of an
> > urgency=high upload of firmware-nonfree to stable-proposed-updates or
> > stable-updates.
> 
> there have been updates of firmware-* packages in the past and more
> recently for squeeze too, so i don't think that's a problem.
> 
> > Well, the amd64-microcode has not cleared NEW yet.  How should we proceed?
> 
> in my personal opinion, i'd prefere having it integrated into
> firmware-nonfree. but it's not my call but the kernel team to decide.

Ok, I've looked into firmware-nonfree.

The intel and amd64 microcode packages are not simple static data-drop
packages (next upload of amd64-microcode will add the required postinst
bits).

They have to:

1. Issue sysfs commands to refresh running microcode and update the
initramfs when updated/installed.

2. Ensure that the microcode module and processor microcode will be added
to the initramfs.

This doesn't integrate automatically with firmware-nonfree right now, and I
really don't have the time to add support to figure out everything in
firmware-nonfree and add these operations to firmware-nonfree right before
the freeze, while I have 95% of that work already done and tested for the
intel-microcode and amd64-microcode packages.  I am just waiting the
amd64-microcode package to get past NEW to upload the required changes to
intel-microcode.

So, please approve the amd64-microcode package ASAP.  I will make sure to
provide a forward migration path to get both Intel and AMD64 microcodes
integrated in firmware-nonfree for at least amd64-microcode, and if we get
to a concensus that it makes sense to do so, also for intel-microcode.
But I'd really prefer to defer that work to post-freeze.

For Wheezy, we can just add suggests or recommends to firmware non-free for
the amd64 and i386 arches, pointing to "intel-firmware | amd64-firmware".

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120616180842.ga32...@khazad-dum.debian.net



Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-12 Thread Henrique de Moraes Holschuh
On Tue, 12 Jun 2012, Daniel Baumann wrote:
> > so what is the point of adding it to firmware-nonfree?
> 
> it would be nice to have everything in one place (= one src package),
> than to have things split over several, make the firmware stuff be
> updated all at once, and better integrated (by using '^-firmware' prefix).

Well, I am really not sure about the "update all at once", especially if you
take into account that stable updates are needed for processor microcode (we
didn't do it for Intel because Intel's public microcode release management
is a joke that is not even remotely funny.  This _does not_ apply to AMD
microcode, which has proper changelogs).

But I don't care as long as nobody is going to get in the way of an
urgency=high upload of firmware-nonfree to stable-proposed-updates or
stable-updates.  If this sort of upload is not a good idea for
firmware-nonfree, then the processor microcodes would be better off in a
separate package.

> > We could make firmware-nonfree "recommend intel-microcode |
> > amd64-microcode" on [i386, amd64], though.  That sounds like a good
> > idea to help people install the microcode updates.
> 
> ack.

Well, the amd64-microcode has not cleared NEW yet.  How should we proceed?

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120612160430.ga17...@khazad-dum.debian.net



Re: Bug#676921: ITP: amd64-microcode -- Processor microcode firmware for AMD CPUs

2012-06-12 Thread Henrique de Moraes Holschuh
On Mon, 11 Jun 2012, Daniel Baumann wrote:
> On 06/10/2012 04:31 PM, Henrique de Moraes Holschuh wrote:
> > The microcode data file for Linux contains the latest microcode definitions
> > for all AMD AMD64 processors.
> 
> i'm aware that there's the intel-microcode package, however, why not
> integrate this into firmware-nonfree (as firmware-amd-microcode or
> something) and keep all this stuff at one place?

intel-microcode will be some trouble to integrate, at least at this
time, so I'd rather not do it for Wheezy.  amd64-microcode could be
integrated into firmware-nonfree without trouble.

However, amd64-microcode has a different upstream, and it would already
have to generate a separate binary package anyway for license reasons,
so what is the point of adding it to firmware-nonfree?

We could make firmware-nonfree "recommend intel-microcode |
amd64-microcode" on [i386, amd64], though.  That sounds like a good
idea to help people install the microcode updates.

After all, just about every new Intel and AMD processor has microcode
patches issued, and both people and vendors are still as bad as they
have always been at keeping their BIOS/EFI up-to-date...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120612113426.ga26...@khazad-dum.debian.net



Re: Linux kernel hardening - link restrictions

2012-03-02 Thread Henrique de Moraes Holschuh
On Fri, 02 Mar 2012, Ben Hutchings wrote:
> We know that these are going to break some programs, most notably
> 'at' (#597130, fixed in wheezy/sid).  But of course it's possible

Please consider pushing for a stable update of "at" to address this.  It is
extremely common to run Debian stable userspace with a newer kernel, and a
lot of people will run Squeeze+3.x for a while yet...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20120303024125.ga30...@khazad-dum.debian.net



Re: Bug#652026: amavisd-new: Init-script not working (stop/restart)

2011-12-16 Thread Henrique de Moraes Holschuh
reassign 652026 amavisd-new
thanks

On Fri, 16 Dec 2011, Ben Hutchings wrote:
> > What are those changes exactly?
> [...]
> 
> Whatever they are, they're not in the kernel.

Hmm, I noticed /proc//stat was different on a 3.0 kernel, but it was a
system that was not yet upgraded to perl 5.14.  I recalled (possibly
incorrectly) some talks about prctl changes in LKML.

Obviously I should have tested this in a up-to-date chroot... I apologise
for that.

> It is possible to change command names stored by the kernel, by writing
> to /proc//tasks//comm or by calling prctl(PR_SET_NAME, ...)
> within the process.  A quick grep doesn't show amavis using those
> explicitly; it just sets $0.
> 
> Sure enough, this is a documented change in Perl 5.14:
> 
> Assignment to $0 sets the legacy process name with prctl() on
> Linux
> 
> On Linux the legacy process name is now set with prctl(2), in
> addition to altering the POSIX name via argv[0], as Perl has
> done since version 4.000. Now system utilities that read the
> legacy process name such as ps, top, and killall recognize the
> name you set when assigning to $0. The string you supply is
> truncated at 16 bytes; this limitation is imposed by Linux.

Hmm, this means we _will_ have to drop the use of --name in amavisd-new, no
way around it.  I wish I could use -u and -g, but that requires actually
parsing the config files the same way amavisd-new does.

Reassiging back to amavisd-new.  I will file a wishlist bug for a --namere
parameter for start-stop-daemon later, if we cannot find a better way to do
it in amavisd-new.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20111216233646.ga9...@khazad-dum.debian.net



Re: [Pkg-sysvinit-devel] system hangs during shutdown...

2011-07-25 Thread Henrique de Moraes Holschuh
On Sun, 24 Jul 2011, Bruce Sass wrote:
> On July 23, 2011 06:56:44 AM Henrique de Moraes Holschuh wrote:
> > On Thu, 21 Jul 2011, Bruce Sass wrote:
> > > > This is not a bug.  NFS clients are supposed to keep on trying to reach
> > > > the server, by default.  You should have unmounted the directory from
> > > > the NFS client(s) before shutting down the server.
> > > > 
> > > > Ben.
> > > 
> > > Sounds like a desirable behaviour when the system is coming up, but
> > > having the client hang when *going down* because a server disappeared
> > > doesn't seem right.
> > 
> > Don't use NFS, then.  It does NOT tolerate servers going away.  Maybe
> > NFSv4 is a bit better, but v3 does not let you get away with it (maybe
> > it should for read-only mounts).
> 
> It looks like NFSv4 doesn't like that happening either.
> 
> Well, that kinda sucks,..
> 
> ...I'm thinking that initscripts should be smarter in that it should 
> recognize 
> hopeless cases and set a limit on how long the system will wait before 
> shutting down. Fully configurable, of course.

The kernel will hang the umount command.

Maybe a cluster filesystem would be a better fit for your needs?  They
tolerate that sort of thing a lot better.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/2011072526.ga28...@khazad-dum.debian.net



Re: [Pkg-sysvinit-devel] system hangs during shutdown...

2011-07-23 Thread Henrique de Moraes Holschuh
On Thu, 21 Jul 2011, Bruce Sass wrote:
> > This is not a bug.  NFS clients are supposed to keep on trying to reach
> > the server, by default.  You should have unmounted the directory from
> > the NFS client(s) before shutting down the server.
> > 
> > Ben.
> 
> Sounds like a desirable behaviour when the system is coming up, but having 
> the 
> client hang when *going down* because a server disappeared doesn't seem right.

Don't use NFS, then.  It does NOT tolerate servers going away.  Maybe
NFSv4 is a bit better, but v3 does not let you get away with it (maybe
it should for read-only mounts).

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110723125644.gb26...@khazad-dum.debian.net



Re: Linux 3.0

2011-05-31 Thread Henrique de Moraes Holschuh
On Mon, 30 May 2011, Marco d'Itri wrote:
> On May 30, Ben Hutchings  wrote:
> > There are likely to be many programs and build scripts that test for a
> > kernel version prefix of '2.6' vs '2.4' and will behave incorrectly when
> > they find '3.0'.  Others require that there are at least 3 numeric
> Expect module-init-tools and three udev scripts to break, for a start.
> I will fix them in the next upload.
> 
> This is hugely annoying, because it means that squeeze installs will
> not work with the kernel from wheezy.

Can't we fix that in a point release, by backporting fixes?

> (How much difficult would it be to add some knob to the kernel or the
> libc to make it report to userspace version 2.6.40? :-) )

That way lies madness :-)

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110531140301.gd8...@khazad-dum.debian.net



Bug#600384: dm-crypt: please backport support for plain64 IV

2010-10-16 Thread Henrique de Moraes Holschuh
Package: linux-2.6
Version: 2.6.32-25
Severity: important

Please backport commit 61afef614b013ee1b767cdd10325acae1db1f4d2
"dm crypt: add plain64 iv" from upstream.  It should be a clean
cherry-pick.

Without it, Debian squeeze users might not be able to use dm-crypt
volumes created on newer kernels using *-xts-plain64, nor will be able
to create such volumes.

Using "plain" for IVs on block devices with more than 2^32 blocks will
cause the same IV to be used twice due to roll-over.  This is not a good
thing, although it might be not bad enough to matter much (or it could
be a terrible problem.  Someone who groks crypto for real would have to
answer that).

One cannot fix the "plain" IV to not warp at 2^32, or data after the
roll-over point becomes unreadable on any already-existing devices.
Thus, the only solution was to add a new IV ("plain64").  For devices
smaller than 2^32 512 byte blocks, plain and plain64 are equivalent.

Userspace and docs are already beggining to tell users to use
aes-xts-plain64 and not aes-xts-plain.  They will use them in their
portable HDs, possibly on other distros, and then will not be able to
read them back in squeeze.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.32.23 (SMP w/8 CPU cores)
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/20101016165729.32565.38223.report...@khazad-dum2.khazad-dum.debian.net



Re: CVE 2010-3081 changes internal API

2010-09-22 Thread Henrique de Moraes Holschuh
Of course, it helps if I actually use the correct address for the
debian-kernel ML...

On Wed, 22 Sep 2010, Henrique de Moraes Holschuh wrote:
> On Wed, 22 Sep 2010, Dan Serban wrote:
> > On 09/22/10 07:54, Henrique de Moraes Holschuh wrote:
> > >On Wed, 22 Sep 2010, Dan Serban wrote:
> > >>[1012115.235704] ipmi_devintf: Unknown symbol compat_alloc_user_space
> > >This module and the running kernel are not compatible with each other.
> > 
> > 
> > 
> > So what you're telling me then, is that a bug needs to be filed
> > against the stable kernel?  I can't see stable being stable when
> > modules won't load due to a security update.  At least I'd assume
> > that a broken kernel implementation needs to be fixed.
> 
> compat_alloc_user_space() is only used for syscalls AFAIK.  The rule is: you
> do that, you have to track the kernel.  In fact, it is now GPL-only (so, for
> example, fglrx needs to be modified as it is forbidden from using
> compat_alloc_user_space()).
> 
> I'm adding a CC for the Debian kernel ML, just in case.
> 
> Summary:
>   compat_alloc_user_space() is now EXPORT_SYMBOL_GPL
>   * cannot be used by fglrx and other non-GPL modules
> * using arch_compat_alloc_user_space() may reopen CVE-2010-3081
>   if the non-GPL module doesn't do access_ok by itself
> 
>   compat_alloc_user_space() moved from asm/compat.h to linux/compat.h
> * requires #include changes on out-of-tree modules that use
>   compat_alloc_user_space() for them to build
> 
> > OT: I've found about 4 major bugs with the lenny implementation
> > running in different server roles.  Mainly things that have been
> 
> File bugs.  Provide as much information as you can, the most useful being
> the commits that you want backported, but if you don't know that, at least
> full descriptions of the problem, how to reproduce, and what kernel version
> you know fixed it would be helpful.
> 
> > While I do understand and agree with the "no need to fix it if it
> > a'int broken" mentality, does that mean that lenny does not get
> > patched/bugfixed... just security updates?
> 
> No.  It does get patched/bugfixed.  That's why we have "point releases", and
> that's why it is at 5.0.6 (sixth point release) right now.  But you usually
> have to prod maintainers to fix something on stable, unless it is a very big
> issue or a security issue.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100923004650.gb16...@khazad-dum.debian.net



Bug#565790: [stable] [ltp] Re: Bug#565790: cat /proc/acpi/ibm/video and must press power button

2010-03-19 Thread Henrique de Moraes Holschuh
On Thu, 18 Mar 2010, Greg KH wrote:
> On Wed, Mar 10, 2010 at 05:29:42PM -0300, Henrique de Moraes Holschuh wrote:
> > On Tue, 09 Mar 2010, Moritz Muehlenhoff wrote:
> > > On Mon, Feb 08, 2010 at 09:53:57PM -0200, Henrique de Moraes Holschuh 
> > > wrote:
> > > > On Wed, 27 Jan 2010, jida...@jidanni.org wrote:
> > > > > go reading /proc/acpi/ibm/video every day. But the curious user should
> > > > > have to resort to the power button if he steps on this landmine.
> > > > 
> > > > Sure.  I limited it to CAP_SYS_ADMIN now, which usually means root.
> > > > 
> > > > The patch will be sent for merging, but I can't promise it will be 
> > > > merged
> > > > before the next merge window for 2.6.34, and only after that will it be
> > > > a cantidade for a 2.6.32.y stable.
> > > > 
> > > > Patch attached for reference.
> > > 
> > > Adding sta...@kernel.org to CC. Please apply for 2.6.32.x :
> > > This was merged in Linus' git as b525c06cdbd8a3963f0173ccd23f9147d4c384b5
> > 
> > They should already have it somewhere in their queue, since I have Cc'd them
> > in the git commit message, which I understand is automatically parsed when
> > the commit gets merged in mainline.
> 
> Yes, I applied it to the .33.1 release.  But it does not apply cleanly
> to the .32 kernel.  If you wish to see it there, please, can someone
> provide me with a backported version?

Will do, it will be in the next batch of -stable thinkpad-acpi fixes.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100319133114.gb16...@khazad-dum.debian.net



Bug#565790: [ltp] Re: Bug#565790: cat /proc/acpi/ibm/video and must press power button

2010-03-10 Thread Henrique de Moraes Holschuh
On Tue, 09 Mar 2010, Moritz Muehlenhoff wrote:
> On Mon, Feb 08, 2010 at 09:53:57PM -0200, Henrique de Moraes Holschuh wrote:
> > On Wed, 27 Jan 2010, jida...@jidanni.org wrote:
> > > go reading /proc/acpi/ibm/video every day. But the curious user should
> > > have to resort to the power button if he steps on this landmine.
> > 
> > Sure.  I limited it to CAP_SYS_ADMIN now, which usually means root.
> > 
> > The patch will be sent for merging, but I can't promise it will be merged
> > before the next merge window for 2.6.34, and only after that will it be
> > a cantidade for a 2.6.32.y stable.
> > 
> > Patch attached for reference.
> 
> Adding sta...@kernel.org to CC. Please apply for 2.6.32.x :
> This was merged in Linus' git as b525c06cdbd8a3963f0173ccd23f9147d4c384b5

They should already have it somewhere in their queue, since I have Cc'd them
in the git commit message, which I understand is automatically parsed when
the commit gets merged in mainline.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20100310202941.gb21...@khazad-dum.debian.net



Bug#565790: [ltp] Re: Bug#565790: cat /proc/acpi/ibm/video and must press power button

2010-02-08 Thread Henrique de Moraes Holschuh
On Wed, 27 Jan 2010, jida...@jidanni.org wrote:
> go reading /proc/acpi/ibm/video every day. But the curious user should
> have to resort to the power button if he steps on this landmine.

Sure.  I limited it to CAP_SYS_ADMIN now, which usually means root.

The patch will be sent for merging, but I can't promise it will be merged
before the next merge window for 2.6.34, and only after that will it be
a cantidade for a 2.6.32.y stable.

Patch attached for reference.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh
commit 72772159f8105d2bfa8306ba079e0b2878b32e93
Author: Henrique de Moraes Holschuh 
Date:   Sun Feb 7 20:03:24 2010 -0200

thinkpad-acpi: lock down video output state access

Given the right combination of ThinkPad and X.org, just reading the
video output control state is enough to hard-crash X.org.

Until the day I somehow find out a model or BIOS cut date to not
provide this feature to ThinkPads that can do video switching through
X RandR, change permissions so that only processes with CAP_SYS_ADMIN
can access any sort of video output control state.

Reported-by: Jidanni 
Signed-off-by: Henrique de Moraes Holschuh 

diff --git a/Documentation/laptops/thinkpad-acpi.txt b/Documentation/laptops/thinkpad-acpi.txt
index 75afa12..39c0a09 100644
--- a/Documentation/laptops/thinkpad-acpi.txt
+++ b/Documentation/laptops/thinkpad-acpi.txt
@@ -650,6 +650,10 @@ LCD, CRT or DVI (if available). The following commands are available:
 	echo expand_toggle > /proc/acpi/ibm/video
 	echo video_switch > /proc/acpi/ibm/video
 
+NOTE: Access to this feature is restricted to processes owning the
+CAP_SYS_ADMIN capability for safety reasons, as it can interact badly
+enough with some versions of X.org to crash it.
+
 Each video output device can be enabled or disabled individually.
 Reading /proc/acpi/ibm/video shows the status of each device.
 
diff --git a/drivers/platform/x86/Kconfig b/drivers/platform/x86/Kconfig
index 7e9cb67..dd7d286 100644
--- a/drivers/platform/x86/Kconfig
+++ b/drivers/platform/x86/Kconfig
@@ -319,9 +319,15 @@ config THINKPAD_ACPI_VIDEO
 	  server running, phase of the moon, and the current mood of
 	  Schroedinger's cat.  If you can use X.org's RandR to control
 	  your ThinkPad's video output ports instead of this feature,
-	  don't think twice: do it and say N here to save some memory.
+	  don't think twice: do it and say N here to save memory and avoid
+	  bad interactions with X.org.
 
-	  If you are not sure, say Y here.
+	  NOTE: access to this feature is limited to processes with the
+	  CAP_SYS_ADMIN capability, to avoid local DoS issues in platforms
+	  where it interacts badly with X.org.
+
+	  If you are not sure, say Y here but do try to check if you could
+	  be using X.org RandR instead.
 
 config THINKPAD_ACPI_HOTKEY_POLL
 	bool "Support NVRAM polling for hot keys"
diff --git a/drivers/platform/x86/thinkpad_acpi.c b/drivers/platform/x86/thinkpad_acpi.c
index 0c40713..d12b61b 100644
--- a/drivers/platform/x86/thinkpad_acpi.c
+++ b/drivers/platform/x86/thinkpad_acpi.c
@@ -286,6 +286,7 @@ struct ibm_init_struct {
 	char param[32];
 
 	int (*init) (struct ibm_init_struct *);
+	mode_t base_procfs_mode;
 	struct ibm_struct *data;
 };
 
@@ -4625,6 +4626,10 @@ static int video_read(struct seq_file *m)
 		return 0;
 	}
 
+	/* Even reads can crash X.org, so... */
+	if (!capable(CAP_SYS_ADMIN))
+		return -EPERM;
+
 	status = video_outputsw_get();
 	if (status < 0)
 		return status;
@@ -4658,6 +4663,10 @@ static int video_write(char *buf)
 	if (video_supported == TPACPI_VIDEO_NONE)
 		return -ENODEV;
 
+	/* Even reads can crash X.org, let alone writes... */
+	if (!capable(CAP_SYS_ADMIN))
+		return -EPERM;
+
 	enable = 0;
 	disable = 0;
 
@@ -8483,9 +8492,10 @@ static int __init ibm_init(struct ibm_init_struct *iibm)
 		"%s installed\n", ibm->name);
 
 	if (ibm->read) {
-		mode_t mode;
+		mode_t mode = iibm->base_procfs_mode;
 
-		mode = S_IRUGO;
+		if (!mode)
+			mode = S_IRUGO;
 		if (ibm->write)
 			mode |= S_IWUSR;
 		entry = proc_create_data(ibm->name, mode, proc_dir,
@@ -8676,6 +8686,7 @@ static struct ibm_init_struct ibms_init[] __initdata = {
 #ifdef CONFIG_THINKPAD_ACPI_VIDEO
 	{
 		.init = video_init,
+		.base_procfs_mode = S_IRUSR,
 		.data = &video_driver_data,
 	},
 #endif


Bug#565789: [ltp] Re: Bug#565789: say what the current Thinkpad BIOS/Firmware should be

2010-01-20 Thread Henrique de Moraes Holschuh
On Thu, 21 Jan 2010, jida...@jidanni.org wrote:
> >>>>> "H" == Henrique de Moraes Holschuh  writes:
> The warning to upgrade comes with the users current version number.

The driver always logs the current version number at INFO priority at
startup, because otherwise I don't know what firmware is in a thinkpad when
I request the logs from someone.

That is NOT part of the warning. It is not even in the same priority level.

> I looked for the small file that corresponds to
> drivers/platform/x86/thinkpad_acpi.ko
> 
> Maybe it is somewhere on
> http://repo.or.cz/w/linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git/
> 
> I can't find it.

You'd need to get it from one of the recent "release/*" branches.  It will
be easier if you just look at whatever is in Linus main kernel tree (the URL
I sent you).

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#565789: [ltp] Re: Bug#565789: say what the current Thinkpad BIOS/Firmware should be

2010-01-20 Thread Henrique de Moraes Holschuh
On Thu, 21 Jan 2010, jida...@jidanni.org wrote:
> Candidate out of your binary. So I needn't download the whole kernel
> source tar just to extract that one number each time I want to know what

Go to
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=tree

and navigate to drivers/platform/x86/thinkpad_acpi.c

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#565789: say what the current Thinkpad BIOS/Firmware should be

2010-01-20 Thread Henrique de Moraes Holschuh
On Thu, 21 Jan 2010, jida...@jidanni.org wrote:
> Indeed, why tease the user with any version numbers in the first place,

I don't.

> if there is no way provided for him to pry the other half out of your
> binary.

If you care so much, go read the source code, which incidently is the ONLY
thing I provide to anyone.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#565789: [ltp] Re: Bug#565789: say what the current Thinkpad BIOS/Firmware should be

2010-01-20 Thread Henrique de Moraes Holschuh
On Wed, 20 Jan 2010, jida...@jidanni.org wrote:
> >>>>> "H" == Henrique de Moraes Holschuh  writes:
> 
> H> The version the driver thinks you should use is the latest that was
> H> available when I wasted a few hours tracking them all.
> 
> Yes, but in addition to giving the message
> "Your version 1234 is out of date".
> 
> You need to say "we believe the current version is 1236".

No, I don't.  You will either update or you will not update when you see
that message.

If you are going to try to update, you will need to download the firmware,
and the web page where you can download it will give you the latest
firmware.

So, any version information is pointless, and it would look like I recommend
a certain version instead of whatever is the latest.

> And you need to say "this is based on information from
> http://www.thinkwiki.org/wiki/BIOS_Upgrade ".

No, because it is not.  When I decide a BIOS type needs to be added to that
table, I track down the lenovo page for that model and get the information
from there.  Whether a BIOS type will be added depends on it being stable
(no updates for a long time), what the changelog says it fixes, and whether
it fixes some problem I got a report for.  It is not automatic.

I also happen to take the opportunity to update thinkwiki, since I consider
thinkwiki to be a really important resource, but that's orthogonal to the
issue.  And the canonical location IS the lenovo/IBM site.

> Or else each user
> 1. Will spend even more hours than the ones you mentioned, trying to track
> down what you are warning him about. He will end up all over the

You're the first one I know of that had so much trouble to locate it.  I
guess most people just ask in the thinkpad or lenovo forums (which I don't
monitor).  Some ask how to upgrade the bios in one of the two thinkpad MLs,
and get told to look in thinkwiki.  And some won't have much trouble
locating it through the Lenovo site.

> 2. He will be unable to write down on paper "don't worry about 1236. It's

The "public changelog" is NOT complete, and I have received that information
from official sources.

> 3. Perhaps consider allowing the user to put the BIOS etc. numbers he is
> happy with in some file that could be checked, so he could say "don't
> warn me about anything up thru 1238 (even though he really has only 1236
> installed.)

Well, you could just tell whatever tool you use to check the system logs to
ignore it.  It is logged only once per boot for most users (which don't
rmmod/modprobe thinkpad-acpi once the system is running).

Now, if it is causing a massive ruckus because of some widespread tool that
looks in the kernel log for LOG_WARNING and scares the heck out of the users
with warning sirens, that's a different deal.  In that case I could be
persuaded to lower the severity from LOG_WARN to LOG_NOTICE as a stopgap
measure.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: Xen support on Squeeze

2010-01-07 Thread Henrique de Moraes Holschuh
On Sun, 03 Jan 2010, William Pitcock wrote:
> > That was opposed quite strongly by the kernel folks last time it was
> > attempted. Were there any fundamental changes in the Xen dom0 patches
> > since then?
> 
> Only by the kernel folks which believe all of the crap that the KVM
> guys say about Xen.  There are plenty of kernel developers willing
> to see the patches merged.

Hmm, you have a problem there.

Linus is very likely going to cheerfully tell the Xen and KVM developers to
duke it out in a bloodbath, and to not forget to bring AlacrityVM into the
fray either.  He could care less for virtualization, and he is likely to
refuse to merge anything non-trivial until the "virtualization crazy people"
manage to reach a consensus on a sane API.  Look for the AlacrityVM threads
in LKML if you doubt me.

Note: I am not defending KVM.  I don't agree with their main ideology (that
their hardware-emulating approach is the One True Way).  But I can well see
why Linus decided to take that instance.

Xen's track record from hell on getting their act cleaned up for upstream
merging is also going to get in the way.  Some people have long memories.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#521279: Bug#521280: acpid does support netlink, so the problem only affects thinkpad-acpi

2009-05-22 Thread Henrique de Moraes Holschuh
On Thu, 21 May 2009, Michael Meskes wrote:
> On Thu, Mar 26, 2009 at 12:44:32PM -0300, Henrique de Moraes Holschuh wrote:
> > never had to look back at, before writing something.  The non-hotkey events
> > go over netlink, yes.  But hotkeys go only over the input device, where they
> > belong, and there is no driver switch to mess with that.
> 
> Could anyone enlighten me please, where these events are to be found? acpid 
> does
> not just read the netlink inteface but also the input layer and thus is
> *supposed* to also get events coming over an input device. You can use 
> kacpimon
> to try it out.

I very much doubt it processes input events like KEY_FN_F1, or
KEY_BLUETOOTH by default...  and it shouldn't, either.  No bugs on acpid
here.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#521279: acpid does support netlink, so the problem only affects thinkpad-acpi

2009-03-26 Thread Henrique de Moraes Holschuh
Well, I just looked at the most up-to-date acpid, and it supports netlink.

Therefore, the issue is just that thinkpad-acpi wants you to get hotkeys
from the input layer since kernel 2.6.23, and now finally the borrowed time
is over in Debian installs, with the procfs event delivery being shut off.

What I wrote about a thinkpad-apci backwards compatibility mode was slightly
incorrect...  teaches me to trust memories over one year old about stuff I
never had to look back at, before writing something.  The non-hotkey events
go over netlink, yes.  But hotkeys go only over the input device, where they
belong, and there is no driver switch to mess with that.

This means that all configs that use acpid to process thinkpad-acpi hotkeys
will break, and need to be ported over to HAL or something else that binds
to input devices.

I think these bugs can be tagged "wontfix", and we just deal with it as the
usual perils of using "unstable" and "testing".  It is probably a good idea
to leave them open in the BTS for a while, in hopes that people will read
them before filing more bugs.

I don't think it affects any Debian standard config, but it will affect most
of the local configs by end-users.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Bug#485465: reboot(8) messes with Thinkpad brightness

2008-08-07 Thread Henrique de Moraes Holschuh
On Fri, 08 Aug 2008, [EMAIL PROTECTED] wrote:
> Dear HMH, I have continued my observations. It seems the only time I
> have to still hit Fn End to bring the brightness back down is after a
> reboot: using reboot(8) brings one to a super bright Lilo screen.
> 
> And 'shutdown -h now' also will give a bright Lilo screen upon next
> power up. (It is what I usually use, and each time the next day I have
> to hit Fn End a few times there at the Lilo prompt before hitting RET
> to enter GNU/Linux.)
> 
> OK, as an experiment at the above Lilo screens, I did my usual Fn Ends
> to bring the brightness down to the minimum, but then instead of
> hitting RET to enter GNU/Linux (image=/boot/vmlinuz-2.6.25-2-686), I
> hit ALT-CTRL-DEL to reboot without the "help" of the reboot(8)
> command. I was back sitting at the Lilo prompt with no brightness
> problems this time. At this point I hit the power off button. The next
> day powering back on also saw no brightness problem sitting there at
> the Lilo prompt.
> 
> I conclude that my workaround,
># cat .bash_profile
>case [EMAIL PROTECTED](hostname) in
>[EMAIL PROTECTED])
>j=/tmp/.jidanni_thinkpad_brightness #/tmp gone at boot
>! test -f $j && ! pidof xdm > /dev/null &&
>/sbin/rmmod thinkpad-acpi &&
>/sbin/modprobe thinkpad-acpi brightness_mode=2 &&
>touch $j;; [EMAIL PROTECTED]
>esac
> works great except that it does not cover the effects of reboot(8) and
> shutdown(8). Therefore I would hope HMH would "neuter" them to not
> mess with the brightness seen on the next boot! Thanks.

I would, if I knew WHAT is screwing up with the brightness.  I hope to have
some time to hunt it down in Debconf 8.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485465: sometimes brightness OK (lowest) at boot

2008-07-22 Thread Henrique de Moraes Holschuh
On Tue, 22 Jul 2008, [EMAIL PROTECTED] wrote:
> Today I powered up and found brightness was already at its lowest.
> 
> So sometimes brightness levels are remembered through boot for me,
> but not always.
> 
> Maybe a burglar alarm can be attached to the brightness, so that
> whenever it is tampered with, a syslog entry will be made, so we can
> tell what programs try to meddle with the brightness setting.

If you are confortable recompiling the kernel, I can send you a patch with
that "burgar alarm".  Just tell me exactly which kernel you're using.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485465: battle for the brightness

2008-07-18 Thread Henrique de Moraes Holschuh
On Fri, 18 Jul 2008, [EMAIL PROTECTED] wrote:
> OK, some results:
> Before shutdown -h I checked with Fn End that I was already in the
> dimmest state.
> 
> However, at the next power-up, sitting at the Lilo prompt, I could use
> several Fn Ends to make the screen dimmer.

Is the BIOS backlight control set to "normal"?  It definately works on my
T43...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#485465: battle for the brightness

2008-07-14 Thread Henrique de Moraes Holschuh
On Tue, 15 Jul 2008, [EMAIL PROTECTED] wrote:
> H> Do I understand correctly, and now that you're using brightness_mode=2, you
> H> see no weird brightness changes when you lauch xdm, and your brightness 
> keys
> H> work just fine?
> Yes, and yes.
> 
> (I am still observing how well brightness settings last through boots.
> I will mail back if they don't.)

They will, no worries about that.  The issue you can still have is that
something might decide to change the brightness just before shutdown, and
THAT changed brightness would be the one you'd get when you power up.

But apparently, nobody broke things that much yet ;-)

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#335814: udevd: get_netlink_msg: no ACTION in payload found

2005-10-26 Thread Henrique de Moraes Holschuh
On Wed, 26 Oct 2005, Rogério Brito wrote:
> On Oct 26 2005, Henrique de Moraes Holschuh wrote:
> > I see it on mounts caused by automount.  I don't see it on mounts
> > caused by mount.  So, we have one possible culprit.
> 
> I see it with manual mounting of removable media (e.g., CDs).

Hmm... come to think of it, that's what I use automout for. It could be
removable media, then.

Anyway, I can't reproduce it anymore, since 8 days ago:
daemon.log.0:Oct 18 00:47:44 khazad-dum udevd[14729]: get_netlink_msg: no
ACTION in payload found, skip event 'umount'

It was not the kernel upgrade, that happened on Oct 11 (previously I was
running stock 2.6.13.3 and warnings did show).  It was not an udev upgrade
on that day either, according to aptitude logs. 

Log shows that I did an init 1 approximately at that time, so it could have
been a clean restart of automount or udev (I often kill udevd when I go to
single-user mode).  If it was a restart of udevd that fixed it, then the
upgrade from 0.070-4 to 0.070-5 could be of significance.  There are no
automount upgrades in the logs.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh



Bug#301799: kernel-tree-2.6.11: new upstream source available: 2.6.11.6

2005-04-04 Thread Henrique de Moraes Holschuh
On Mon, 04 Apr 2005, Sven Luther wrote:
> No, the packages would still be kernel-*-2.6.11, but the version number would
> be 2.6.11.6-, yiedling stuff like : 
> 
>   kernel-source-2.6.11_2.6.11.6-1_all.deb
> 
> Which is ok, and doesn't trigger NEW. I vote for that.

Which is what I thought would happen.  

PLEASE accept this bug and number the kernel versions accordingly.  We have
two seconds now for this proposal, and no valid complains against it ;-)

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#301799: kernel-tree-2.6.11: new upstream source available: 2.6.11.6

2005-03-30 Thread Henrique de Moraes Holschuh
On Wed, 30 Mar 2005, Horms wrote:
> > It is much more user-friendly, and it readly provides information on the
> > most up-to-date tree it was synced with, in aptitude/dselect/synaptic...
> 
> Yes, but the problem is that each time it changes backages
> have to go through a NEW cycle.

I assume you mean for the binary packages? I was only paying attention to
the kernel-source, kernel-patch and kernel-tree packages...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#301799: kernel-tree-2.6.11: new upstream source available: 2.6.11.6

2005-03-30 Thread Henrique de Moraes Holschuh
On Wed, 30 Mar 2005, Horms wrote:
> > with 2.6.11.X, including the numbering (i.e. next upload should be
> > kernel-source-2.6.11, package version 2.6.11.6-1).
> 
> I agree it would be good to sync up the patches,
> but I don't think there is any need to include the
> .6 in the debian version as we never did this for 2.6.8.

It is much more user-friendly, and it readly provides information on the
most up-to-date tree it was synced with, in aptitude/dselect/synaptic...

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#301799: kernel-tree-2.6.11: new upstream source available: 2.6.11.6

2005-03-30 Thread Henrique de Moraes Holschuh
On Wed, 30 Mar 2005, Horms wrote:
> With the exception of the load_elf_library problem,
> which I will check on now, I believe I have patches for
> the rest in SVN as neccessary for:

I have checked 2.6.11 (looked it over, I am not running 2.6.11 here yet),
and it looks OK.  It would be a very good thing if we kept 2.6.11 in sync
with 2.6.11.X, including the numbering (i.e. next upload should be
kernel-source-2.6.11, package version 2.6.11.6-1).

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Bug#301799: kernel-tree-2.6.11: new upstream source available: 2.6.11.6

2005-03-28 Thread Henrique de Moraes Holschuh
Package: kernel-tree-2.6.11
Version: 2.6.11-1
Severity: grave
Tags: security
Justification: user security hole

As usual.  I feel weird filling what used to be a wishlist-level report as
grave, but...

Summary of changes from v2.6.11.5 to v2.6.11.6
==

Chris Wright:
  o isofs: more defensive checks against corrupt isofs images
  o Linux 2.6.11.6

Herbert Xu:
  o Potential DOS in load_elf_library

Linus Torvalds:
  o isofs: Handle corupted rock-ridge info slightly better
  o isofs: more "corrupted iso image" error cases

Marcel Holtmann:
  o Fix signedness problem at socket creation

Mathieu Lafon:
  o Suspected information leak (mem pages) in ext2

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (990, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-debian6+libata9dev1+bluesmoke
Locale: LANG=pt_BR.ISO-8859-1, LC_CTYPE=pt_BR.ISO-8859-1 (charmap=ISO-8859-1)

Versions of packages kernel-tree-2.6.11 depends on:
ii  kernel-patch-debian-2.6.112.6.11-1   Debian patches to Linux 2.6.11
ii  kernel-source-2.6.11  2.6.11-1   Linux kernel source for version 2.

-- no debconf information

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: lvm2 crashes and burns with 2.6.10-4 (svn snapshot 2298)

2005-01-17 Thread Henrique de Moraes Holschuh
On Sun, 16 Jan 2005, Henrique de Moraes Holschuh wrote:
> Tracked down to 033-rlimit_memlock_check.dpatch.  I did not check whether
> 034-stack_resize_exploit.dpatch also causes problems, since it does not
> apply without 033.

Curiously enough, something IS setting a 32kbyte limit on locked memory even
on the emergency shell (i.e. these limits are active during the early boot
sequence).  That caused the segfault, as the above patches were enforcing
that limit.  I am pretty sure I have not asked for such a draconian limit
anywhere (and all greps I could think of seem to agree with me) -- and such
a limit is cleary something we would be better off without at the early boot
sequence.  

I will see if I can track down the culprit to make sure it is something
stupid *I* did, as opposed to something higly stupid sysv-init or the kernel
itself is doing, and file bugs accordingly depending on what I find.

Anyway, apparently such limit enforcement is considered a bug (regardless of
the fact that there should be no limit to be enforced in the first place),
and Herbert Xu sent me a patch that fixes the issue.  Thanks, Herbert!
Maybe that patch should make it to the SVN tree?

PS: Herbert, my provider seems to have screwed up again, and my static IP is
being blacklisted by your server, so my replies to you were probably
discarded.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: lvm2 crashes and burns with 2.6.10-4 (svn snapshot 2298)

2005-01-16 Thread Henrique de Moraes Holschuh
On Sun, 16 Jan 2005, Henrique de Moraes Holschuh wrote:
> What happens is that vgchange -a y  segfaults under 2.6.10-4, just after
> mlockall(MLC_CURRENT|MLC_FUTURE) returns with a 0 state.  At that point,
> under 2.6.10-3, vgchange would brk(0).  Under 2.6.10-4, it just segfaults.

Tracked down to 033-rlimit_memlock_check.dpatch.  I did not check whether
034-stack_resize_exploit.dpatch also causes problems, since it does not
apply without 033.

It may be my own fault (8MB limit on locked memory is active), in which case
the kernel patch is OK and lvm2 has crappy code that goes bonkers when
memalloc fails (what else is new...) instead of aborting with an error.  I
will test futher, and post back to this thread.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: lvm2 crashes and burns with 2.6.10-4 (svn snapshot 2298)

2005-01-16 Thread Henrique de Moraes Holschuh
On Sun, 16 Jan 2005, Henrique de Moraes Holschuh wrote:
> This is apparently related to #281831, so I am directing it there.

Well, it turns out it is not.  vgscan is just being obnoxious as ever, but
it has no bearing on the lvm crash with 2.6.10-4.  I am cc'ing 281831 just
to not leave a misleading note in there.

What happens is that vgchange -a y  segfaults under 2.6.10-4, just after
mlockall(MLC_CURRENT|MLC_FUTURE) returns with a 0 state.  At that point,
under 2.6.10-3, vgchange would brk(0).  Under 2.6.10-4, it just segfaults.

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



lvm2 crashes and burns with 2.6.10-4 (svn snapshot 2298)

2005-01-16 Thread Henrique de Moraes Holschuh
This is apparently related to #281831, so I am directing it there.

The "opendir failed" messages might be "harmless" on 2.6.10-3 and before,
but after I applied the patches in queue for 2.6.10-4, it causes lvm to
fail completely (thus, I am Cc'ing debian-kernel as well, so that they are
aware of the issue).

Unfortunately, I can't easily debug why, since at that time, I don't have
even strace working (because just about everything is on lvm...)

If this is not an issue with 2.6.10-4 (e.g. it is actually caused by lvm2
doing something really braindead -- which IS likely since it is doing
something stupid on the other kernels as well), then #281831 will have to be
raised to grave or critical.

vgscan --mknodes unlinks /dev/vg_raid1 (the VG where my LVM lvs live), but
apparently it fails to create it back.

/dev is udev-based (tmpfs).  Manually poking around it (mkdir, etc) works
just fine.

This same setup, with the exact same .config worked in 2.6.10-3.  Maybe one
of the new security clamps is hosing something lvm2 is trying to do?

-- 
  "One disk to rule them all, One disk to find them. One disk to bring
  them all and in the darkness grind them. In the Land of Redmond
  where the shadows lie." -- The Silicon Valley Tarot
  Henrique Holschuh


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]