Thanks, you could try this version and install it. This version is in the pool for testing since GPU stuff is not running quite well. But other features are good IMO.
http://ppa.linuxfactory.or.kr/pool/test ... _arm64.deb
Thanks, you could try this version and install it. This version is in the pool for testing since GPU stuff is not running quite well. But other features are good IMO.
I think it should be safe to roll out as emergency security fix, the change is very minimal and can do nothing but goodtobetter wrote: ↑Sat Mar 12, 2022 1:19 amI am afraid it is and have been updated/requested if the patch can be included in the next kernel update. I need to study about the issue and patch, then will run the build queue this weekend for testing.alphahere wrote: ↑Sat Mar 12, 2022 12:19 amQuick question currently running.
Does this kernel address the dirty-pipes security issue?Code: Select all
Linux odroid 5.15.0-odroid-arm64 #1 SMP PREEMPT Ubuntu 5.15.7-202112090258~focal (2021-12-08) aarch64 aarch64 aarch64 GNU/Linux
https://www.cisa.gov/uscert/ncas/curren ... lity-linux
Thanks
viewtopic.php?p=344757#p344757
I've tested the below kernel packages on an N2+ and can confirm that they're not vulnerable against “Dirty Pipe” (CVE-2022-0847) any more (read: while I successfully managed to use the exploit 100 times in a row with an unpatched kernel—e.g., 5.16.4-202202170017~focal—for comparison, it wouldn't work once in 10,000 tries using below kernels):tobetter wrote: ↑Sun Mar 13, 2022 7:20 amThanks, you could try this version and install it. This version is in the pool for testing since GPU stuff is not running quite well. But other features are good IMO.
http://ppa.linuxfactory.or.kr/pool/test ... _arm64.deb
Code: Select all
VERSION POOL RESULT
5.10.105-202203131842~focal focal/main passed
5.13.16-202203131815~focal focal/main passed
5.14.18-202203120256~focal testing passed
5.15.28-202203121651~focal testing passed*
5.16.14-202203120256~focal testing passed*
*
I noticed that the system time got set to "Mon Jan 10 05:5x:xx CET 2022" though Chrony 4.1-4/4.2-2ubuntu2 works flawlessly with my 5.14.18-custom kernel as well as with kernels 5.10.105, 5.13.16, 5.14.18 above.)linux-image-5.11.0-odroid-arm64
(5.11.18-202107261522~focal) as well?Thank you for testing and confirmation, I believe 5.14.18 / 5.15.28 / 5.16.14 are all in main pool already with the patch...let me double check them anyway.m_ueberall wrote: ↑Mon Mar 14, 2022 9:35 pmI've tested the below kernel packages on an N2+ and can confirm that they're not vulnerable against “Dirty Pipe” (CVE-2022-0847) any more (read: while I successfully managed to use the exploit 100 times in a row with an unpatched kernel—e.g., 5.16.4-202202170017~focal—for comparison, it wouldn't work once in 10,000 tries using below kernels):tobetter wrote: ↑Sun Mar 13, 2022 7:20 amThanks, you could try this version and install it. This version is in the pool for testing since GPU stuff is not running quite well. But other features are good IMO.
http://ppa.linuxfactory.or.kr/pool/test ... _arm64.debCode: Select all
VERSION POOL RESULT 5.10.105-202203131842~focal focal/main passed 5.13.16-202203131815~focal focal/main passed 5.14.18-202203120256~focal testing passed 5.15.28-202203121651~focal testing passed* 5.16.14-202203120256~focal testing passed*
5.11.0 package is in testing pool, will be published to main later.(EDIT:*
I noticed that the system time got set to "Mon Jan 10 05:5x:xx CET 2022" though Chrony 4.1-4/4.2-2ubuntu2 works flawlessly with my 5.14.18-custom kernel as well as with kernels 5.10.105, 5.13.16, 5.14.18 above.)
@tobetter, do you plan to updatelinux-image-5.11.0-odroid-arm64
(5.11.18-202107261522~focal) as well?
Do you mean the flashing image to a memory card?
That's flashing two different OS unless I'm not understanding you? Not ideal if so. But yes that's what I mean, that modified etcher functionality directly from petitboot.mad_ady wrote:@rooted You can use petitboot to netboot a small image that runs Odroid Etcher that allows you to download and flash an image. But I think only official HK images + meveric's Debian + Voodik's Android are supported. Not sure if tobetter's images are on the list.
So yes, it could do this way before the pi could.
You already know this thread regard ODROID Etcher, it can be launched in Petitboot through network and it can flash an image to a storage on N2 directly after downloading.rooted wrote: ↑Wed Mar 16, 2022 5:29 pmThat's flashing two different OS unless I'm not understanding you? Not ideal if so. But yes that's what I mean, that modified etcher functionality directly from petitboot.mad_ady wrote:@rooted You can use petitboot to netboot a small image that runs Odroid Etcher that allows you to download and flash an image. But I think only official HK images + meveric's Debian + Voodik's Android are supported. Not sure if tobetter's images are on the list.
So yes, it could do this way before the pi could.
@tobetter Yes flashing OS images to media.
Nope. Odroid etcher runs from a ram drive. It's very convenient. The only complication is having to exit to shell and running netboot first.That's flashing two different OS unless I'm not understanding you?
Thanks! In the meantime, I managed to verify that kernel 5.11.18[-202203152140~focal] intobetter wrote: ↑Tue Mar 15, 2022 6:55 pm5.11.0 package is in testing pool, will be published to main later.
http://ppa.linuxfactory.or.kr/pool/test ... _arm64.deb
focal/main
is also not vulnerable against “Dirty Pipe” (CVE-2022-0847) any more. Code: Select all
% curl -s http://ppa.linuxfactory.or.kr/pool/main/l/linux/ | grep -E "linux-image-5.1[56].*-202203.*~.*_arm64.deb" | sed -e 's|</a.*||g' -e 's|.*>||g'
linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~bookworm_arm64.deb
linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~bullseye_arm64.deb
linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~buster_arm64.deb
linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~hirsute_arm64.deb
linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~impish_arm64.deb
linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~jammy_arm64.deb
linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~bookworm_arm64.deb
linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~bullseye_arm64.deb
linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~buster_arm64.deb
linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~hirsute_arm64.deb
linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~impish_arm64.deb
linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~jammy_arm64.deb
Wow...never thought anyone discover the packages like this.m_ueberall wrote: ↑Wed Mar 16, 2022 7:45 pmThanks! In the meantime, I managed to verify that kernel 5.11.18[-202203152140~focal] intobetter wrote: ↑Tue Mar 15, 2022 6:55 pm5.11.0 package is in testing pool, will be published to main later.
http://ppa.linuxfactory.or.kr/pool/test ... _arm64.debfocal/main
is also not vulnerable against “Dirty Pipe” (CVE-2022-0847) any more.
However, the Ubuntu Focal packages for kernels 5.15.28, 5.16.14 have not yet been pushed to the aforementioned pool (kernels 5.15.7, 5.16.4 therein are still vulnerable):Code: Select all
% curl -s http://ppa.linuxfactory.or.kr/pool/main/l/linux/ | grep -E "linux-image-5.1[56].*-202203.*~.*_arm64.deb" | sed -e 's|</a.*||g' -e 's|.*>||g' linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~bookworm_arm64.deb linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~bullseye_arm64.deb linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~buster_arm64.deb linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~hirsute_arm64.deb linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~impish_arm64.deb linux-image-5.15.0-odroid-arm64_5.15.28-202203131840~jammy_arm64.deb linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~bookworm_arm64.deb linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~bullseye_arm64.deb linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~buster_arm64.deb linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~hirsute_arm64.deb linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~impish_arm64.deb linux-image-5.16.0-odroid-arm64_5.16.14-202203131816~jammy_arm64.deb
Well...not have this feature as of now. Had tried similiar earlier but didn't work.mad_ady wrote: ↑Wed Mar 16, 2022 6:06 pmNope. Odroid etcher runs from a ram drive. It's very convenient. The only complication is having to exit to shell and running netboot first.That's flashing two different OS unless I'm not understanding you?
@tobetter it might be more user-friendly to run the netboot command automatically if your parser can't find any valid OS attached. Not sure if this happens at the moment.
Well that's awesome, somewhere along the way I misunderstood this.mad_ady wrote:Nope. Odroid etcher runs from a ram drive. It's very convenient. The only complication is having to exit to shell and running netboot first.That's flashing two different OS unless I'm not understanding you?
@tobetter it might be more user-friendly to run the netboot command automatically if your parser can't find any valid OS attached. Not sure if this happens at the moment.
For my problem I'm still waiting an advice how to fix. Can you guide me how to fix this ?wolfyDrg wrote: ↑Sun Feb 27, 2022 12:11 amThis one is good ?
Any info how to fix ?Code: Select all
==> /var/log/apt/term.log <== (Reading database ... 371848 files and directories currently installed.) Preparing to unpack .../odroid-base_5%3a21.08+202202190040~bullseye_arm64.deb ... Unpacking odroid-base (5:21.08+202202190040~bullseye) over (5:21.08+202202190040~bullseye) ... Setting up odroid-base (5:21.08+202202190040~bullseye) ... Setting up odroid-alsa (5:21.08+202202190040~bullseye) ... amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory amixer: Mixer attach default error: No such file or directory dpkg: error processing package odroid-alsa (--configure): installed odroid-alsa package post-installation script subprocess returned error exit status 1 Errors were encountered while processing: odroid-alsa Log ended: 2022-02-26 17:10:13 ==> /var/log/apt/history.log <== Error: Sub-process /usr/bin/dpkg returned an error code (1) End-Date: 2022-02-26 17:10:13
Netboot Installer in Petitboot is ready to install, a thread for 22.04 is already started.
Yes, you can. When you start the Netboot Installer, you will be asked to set up partitions. Then allocate a partition as much as you want for the first OS, later install another OS to the rest space. The procedure to install an OS is same for Debian/Ubuntu.
It's good to install CoreELEC to SD and Android to eMMC, then install Ubuntu to the USB storage.
If you are going to reinstall everything on an empty SD card, I recommend installing CE first. Afterwards, shrink the Storage partition of the SD card you installed CE with Gparted or Disks program and install Ubuntu with Netboot-Instaler on the remaining part.
Netboot Installer only supports Debian/Ubuntu OS images. Most other OS are image-based, so need to flash it to a memory card using a tool like balenaEtcher.
1080p with internet browser is not bad. smplayer, vlc etc. 1080p videos are flawless.
While you're at ittobetter wrote: ↑Wed Mar 16, 2022 8:51 pm[…] I am testing a bit of features with 5.15 and 5.16, then they will be published in a couple of days. […]m_ueberall wrote: ↑Wed Mar 16, 2022 7:45 pmThanks! In the meantime, I managed to verify that kernel 5.11.18[-202203152140~focal] intobetter wrote: ↑Tue Mar 15, 2022 6:55 pm5.11.0 package is in testing pool, will be published to main later.
http://ppa.linuxfactory.or.kr/pool/test ... _arm64.debfocal/main
is also not vulnerable against “Dirty Pipe” (CVE-2022-0847) any more.
However, the Ubuntu Focal packages for kernels 5.15.28, 5.16.14 have not yet been pushed to the aforementioned pool (kernels 5.15.7, 5.16.4 therein are still vulnerable):Code: Select all
% curl -s http://ppa.linuxfactory.or.kr/pool/main/l/linux/ | grep -E "linux-image-5.1[56].*-202203.*~.*_arm64.deb" | sed -e 's|</a.*||g' -e 's|.*>||g' […]
lxd
?
Code: Select all
# diff -U /boot/config-5.15.0-odroid-arm64 /boot/config-5.15.37-custom
[…]
-# CONFIG_VHOST_SCSI is not set
-# CONFIG_VHOST_VSOCK is not set
+CONFIG_VHOST_SCSI=m
+CONFIG_VHOST_VSOCK=m
[…]
They can be added this week.m_ueberall wrote: ↑Mon Jun 06, 2022 3:35 pmWhile you're at it, would it be possible to build the following two modules by default for all future kernels which are required to run a VM (as opposed to a container) using, e.g.,
lxd
?Code: Select all
# diff -U /boot/config-5.15.0-odroid-arm64 /boot/config-5.15.37-custom […] -# CONFIG_VHOST_SCSI is not set -# CONFIG_VHOST_VSOCK is not set +CONFIG_VHOST_SCSI=m +CONFIG_VHOST_VSOCK=m […]
Do you mean you are able to boot from SD card with Ubuntu 22.04 installed while SSD does not?nguyenduchuu377 wrote: ↑Sun Jun 19, 2022 11:33 pmI can write to ssd and petitboot can see it, but when booting screen is blank and cannot boot, sd card boot normally.
Qt5 on Ubuntu 22.04 comes from Canonical without a change for ODROID and it works with H/W acceleration.
Cool! Does it use panfrost or birfrost blobs? Where can I download the image for my N2?
Ubuntu 22.04 for ODROID-N2 uses Panfrost,
Thank you! It is possiable to use bifrost blobs? Could you share the instruntions about build QT5 with wayland support on Ubuntu 20.04?tobetter wrote: ↑Mon Jun 20, 2022 10:01 amUbuntu 22.04 for ODROID-N2 uses Panfrost,
viewtopic.php?f=52&t=44177
@tobetter Any update?hello123 wrote: ↑Mon Jun 20, 2022 12:20 pmThank you! It is possiable to use bifrost blobs? Could you share the instruntions about build QT5 with wayland support on Ubuntu 20.04?tobetter wrote: ↑Mon Jun 20, 2022 10:01 amUbuntu 22.04 for ODROID-N2 uses Panfrost,
viewtopic.php?f=52&t=44177
Users browsing this forum: No registered users and 3 guests