Closed cfm closed 1 year ago
See https://github.com/freedomofpress/securedrop-apt-test/pull/202#issuecomment-1709117337 : I just realized we forgot one step, which is to revert the manual dependency on the 5.15.89-kernel that we were previously using in order to keep 2 extra versions around.
(See https://github.com/freedomofpress/kernel-builder/pull/38)
Thanks for catching this, @rocodes. I confirm that this is blocked on new packages, which will be available tomorrow.
Unblocked by freedomofpress/securedrop-apt-test#203. We're hoping to complete testing in time to promote to securedrop-apt-prod
on Monday.
Installed the 5.15.131 package on a staging vm that hadn't received yesterday's build (so was at 5.15.123) - and also on one that did receive the 130 kernel yesterday - no problems, unattended upgrade completes happily, kernel boots, and 5.15.89 kernel is not a dependency :)
Everything checks out on my NUC11s.
NB. In the new versioning scheme, so far one old kernel is available to be retained, for two available to boot:
root@mon:/home/sdadmin# ls /boot/vmlinuz*
/boot/vmlinuz
/boot/vmlinuz-5.15.123-1-grsec-securedrop # August
/boot/vmlinuz-5.15.131-1-grsec-securedrop # September
/boot/vmlinuz.old
That's confusing based on https://github.com/freedomofpress/securedrop/issues/6762#issuecomment-1520569189, which intended that freedomofpress/kernel-builder#38 would ship in June. This is the intended behavior on our actual (as opposed to that intended) timeline.
Spoke to @legoktm yesterday morning and he indicated that yes, this is the expected behaviour; apt
itself now controls the number of kernels to protect, which is 2 most of the time, and that the number of kernels to be retained is not obviously configurable since it now lives in apt
. So we'd either keep all of them, keep the number that apt suggests (2 generally, 3 while booting into the new kernel), or we'd have to mark a dependency on older kernels manually each time as we did with the 5.15.89 one, which seems clunky.
Nuc10:
Nuc8:
Thanks, @zenmonkeykstop. Re: (cleaned up):
CVE-2020-0543 aka 'Special Register Buffer Data Sampling (SRBDS)' * Mitigated according to the /sys interface: YES (Mitigation: Microcode) * SRBDS mitigation control is supported by the kernel: YES (found SRBDS implementation evidence in kernel image. Your kernel is up to date for SRBDS mitigation) * SRBDS mitigation control is enabled and active: YES (Mitigation: Microcode) STATUS: VULNERABLE (Your microcode and kernel are both up to date for SRBDS mitigation control. Mitigation is disabled)
I don't understand how mitigation control is enabled
and Mitigation is disabled
can both be true.
Can you rerun meltdown.sh -v -v -v
on the previous kernel and then again on this one, to isolate whether this result is (a) a kernel flaw or (b) an instrumentation bug on your NUC10 hardware (per https://github.com/speed47/spectre-meltdown-checker/issues/472#issuecomment-1678651753)?
Looks like this is indeed an issue with the checker script. Confirmed as requested. Good to go
uname -r
: 5.15.131-1-grsec-securedroppaxtest blackhat
reports expected results
Being done in coordination with freedomofpress/securedrop-workstation#916.
Checklist
build-logs
apt-test.freedom.press
apt.freedom.press
and releasedTesting matrix
Instructions on testing procedure
To update to the new kernel, please use
sudo apt-get update && sudo unattended-upgrades -d
(notsudo apt-get upgrade
) OR wait 24h for the automatic update to happen.Make sure you're using the most recent version of the spectre-meltdown-checker, which just had a new release for Zenbleed support. You should see "Zenbleed mitigation is supported by kernel: YES (found zenbleed message in kernel image)" in the output (near the very end).
Test plan
[ ] Per https://github.com/freedomofpress/securedrop/issues/6762#issuecomment-1520569189: