/srv/irclogs.ubuntu.com/2013/11/26/#ubuntu-kernel.txt

=== philipballew is now known as philip
* apw yawns09:00
* smb notes the world is brighter outside today09:03
smbMust be that white stuff that suddenly appeared09:04
apwheh .. we may have a sunny day here for the first time in at least a month09:06
smbWe had some of that too until today, which is dry but cold. Soon it is supposed to get warmer again and wet...09:09
* apw wills the grass to grow09:11
=== Guest46324 is now known as med_
=== med_ is now known as medberry
=== ara is now known as Guest1754
=== ara_ is now known as ara
=== ara is now known as Guest55288
=== Guest55288 is now known as ara_
zequenceinfinity: Hi. Will do right away. Been away for a couple of days14:01
TooLmaNHi guys.  I'm building my first Core system.  What 12.04 kernel file should I grab from packages.ubuntu.com/precise/kernel/?  The test unit only has 1GB RAM so I'm guessing 'linux-generic'?  Thanks14:46
TooLmaNThe kernel file is only a 1.7KB .DEB.  Is that correct?14:51
TooLmaNseems way too small14:51
TooLmaNok found a 35MB file that seems the right size.  linux-image-3.2.0-56-generic-pae_i38614:54
apwTooLmaN, linux-generic is the meta package not eh kernel itself14:54
TooLmaNapw: well that would make sense  lol14:55
TooLmaNfollowing https://wiki.ubuntu.com/Core/InstallationExample.  It just says to grab a kernel from packages.ubuntu.com.  Pretty vague to me14:55
apwTooLmaN, yeah it makes sense when you know what you are writing, but not to a new person, it is a wiki so if you have better words do change it, or add an example or something14:59
TooLmaNapw: I'll get it working before I try to change the wiki.  Thanks for the info.15:00
apwTooLmaN, sure, just do fix it if it is confusing, as the next one will glad of it15:01
TooLmaNapw, will do.  Trying to revive some older Wyse terminals as minimal Ubu boxes.15:03
* ppisati disappears for a bit15:05
=== ara_ is now known as ara
sforsheertg: I've been messing with this module signing thing some more, and when I build the package the modules are all signed15:26
rtgsforshee, thats what I found. I'm just downloading from the archive to check those packages15:26
sforsheertg: I'm pretty sure I did that yesterday and found that they really aren't signed15:27
rtgsforshee, well, what extra step does the buildd perform ? I wonder if an sbuilder could reproduce this ?15:27
apwsforshee, what not working with signing for you ?15:28
apwrtg, ^^15:28
sforsheeapw: all the modules that come from the kernel package (i.e. not in -extras) are lacking signatures15:28
apwif you build it locally?15:28
sforsheeno, they're there if I build locally15:29
rtgapw, and I just confirmed that.15:29
rtghow odd15:30
rtgapw, is that signed bullshit ?15:30
rtgis this*15:31
sforsheehuh, actually if I download the package and unpack it the signatures are there15:31
apwwhich files are you checking if not hte ones in the package ?15:31
rtgsforshee, I'm not finding _any_ signatures in linux-image-3.12.0-4-generic_3.12.0-4.10_amd64.deb15:32
rtgdpkg -x linux-image-3.12.0-4-generic_3.12.0-4.10_amd64.deb tmp;find . -name "*.ko"|while read f;do if ! egrep -q "Module signature appended" $f;then echo $f;fi;done15:32
sforsheertg: you're right, I checked the wrong file15:32
rtgapw, so, I'll bet this has something to do with the way the signed kernel is built, huh ?15:33
apwrtg, i think we have no problem :)15:41
rtgapw, explain ?15:41
infinityAre you stripping one package differently from the other?15:43
infinityCan't see how it would relate to the signed kernel, since that happens in an entirely different package, and is just vmlinux.15:44
rtginfinity, well, it doesn't happen with a local build. linux-image from the archive has no signatures. therefore, it seems that it must be something that happens on the builder (like the signing process).15:45
infinityThe module signing process, perhaps, but not the kernel signing process.15:46
infinityIt has to be something that happens during the linux build, not any other package.15:46
infinityAnd if it can't be reproduced locally, your local setup might not be as close to a proper package build as you think.15:47
* infinity grabs the source to test.15:47
rtginfinity, all modules are signed the same way regardless of the package they ultimately end up in.15:47
infinityrtg: Yes, and then some are being "unsigned".  But that can only be happening during the package build, as we don't touch the packages once the buildd has given us a hash of all the debs it just created. :P15:48
rtginfinity, don't you have to touch linux-image in order to sign vmlinuz ?15:49
infinityrtg: No, vmlinuz isn't signed in linux-image.15:50
infinityrtg: Only in linux-signed-image.  Which pulls a copy of vmlinuz to sign it.  But certainly doesn't do ANYTHING to the original package.15:50
infinity(Not that we could even if we wanted to)15:50
apwright (sorry had a contractor here)15:58
apwmodule and kernle signing is separate15:58
apwyou are saying some modules are unsigned, which ones15:58
rtgapw, yep, I see that signing _is_ separate15:59
rtgapw, so, even on ckt this is happening. linux-image modules are unsigned, whereas linux-image-extra _are_ signed.15:59
apwrtg, and yet in the main archive not ?  (i assume it must be the same in the main as well)16:00
apwwhich version are you checking16:00
rtgapw, yes, it is the same in the main archive as well16:00
apwthat seems unexpected as we make the extra package by making the main package as normal16:01
rtgapw, I've been looking at trusty in ckt (but I don't think version really matters)16:01
apwand hten moving the modules from the install to a new package16:01
infinityVersion matters, as this is a recently-introduced bug.16:01
rtginfinity, actually, its been going on for awhile16:02
infinityHow far back?16:02
rtgat least saucy for sure16:02
infinityWhat's the LP bug again?16:02
apwso give me a module which is in main so i can check on my saucy box16:02
rtgapw, lib/modules/3.13.0-0-generic/kernel/sound/pci/snd-ens1370.ko16:02
infinityapw: dpkg -L linux-image-$(uname -r) | grep modules16:03
jsalisbury**16:04
jsalisbury** Ubuntu Kernel Team Meeting - Today @ 17:00 UTC - #ubuntu-meeting16:04
jsalisbury**16:04
apwrtg, and how are we confirming they are unsigned16:04
sforsheeapw: I'm looking for the string "Module signature appended" at the end16:05
rtgapw, find /lib/modules/`uname -r` -name "*.ko"|while read f;do if ! egrep -q "Module signature appended" $f;then echo $f;fi;done16:05
rtgapw, make sure you installed from the archive and not some local crack16:05
sforsheeapw: I've got a saucy install here which seems to have the same results as with trusty16:06
infinitySo, yeah, definitely unsigned in image and signed in image-extra here on 3.11.0-13-generic16:07
infinityWeeeeird.16:07
infinityWould be nice to figure out when this started being true.16:07
apwso that makes some sense, as extra is the 'left overs' from a proper install16:08
apwi can only assume we are stripping them as we move them over16:08
apwthough i thought we used mv16:08
rtgapw, we're not as far as I can tell16:08
rtgI mean, we _are_ using mv16:08
apwyeah, we are  ... so it is some post processing on linux-image which differs16:09
apwthe package processing is the same too ?16:10
rtgskipdbg ?16:10
apwskipbdg ?16:11
apwwe do run depmod on the ones in the main package16:11
apwand not on the ones in the other16:12
rtgapw, depmod isn't supposed to update anything.16:12
apwright i assume it is not but i was looking for differnces16:12
apwfor 'skipdbg' we are makgin a separate version16:13
apwa separate install out of the kernel tree16:13
rtgapw, yeah, we're also doing an objcopy.16:13
apwyeah just saw that and yep i bet that is breaking it16:14
apwwho got us to add that, kamal maybe16:14
infinitySo, extra is definitely built in a "special" way.  I imagine linux-image is getting stripped, and extra not.16:14
rtglemme build with skipdbg=false16:14
apwinfinity, no i think this is the objlink thing16:14
kamalapw, we're talking about what now?16:15
rtginfinity, I think its a post processing step that only happens on the buildds 'cause skipdbg keeps us from locally building a _giant_ debug file16:15
rtgkamal, we're pretty sure its your fault16:15
kamalrtg, well obviously, but it doesn't ring a bell to me16:15
kamal(not that that means much)16:16
rtgactually, this may go back a long ways. perhaps feisty.16:16
kamalsoooo before my time16:16
rtgyeah, we're just yanking your chain.16:17
kamalyup16:17
apwrtg, so if the key has not been wacked when we package you might be able to do this again:16:30
apwMakefile:mod_sign_cmd = perl $(srctree)/scripts/sign-file $(CONFIG_MODULE_SIG_HASH) $(MODSECKEY) $(MODPUBKEY)16:30
rtgapw, yep, just looking at that file16:31
apwif we can resign them then it might be easier16:31
apwrather than changing the the main kernel makefiles16:31
apwand if it is there we should once we are finished make sure it is wacked16:32
rtgapw, yep, that is my thinking16:32
apwrtg, great16:35
rtgapw, starting a V=1 build with skipdbg=false. it'll take a bit, but I should have sufficient log to figure out the key business.16:36
apwyeah sometimes it is just work letting gomeisa take the strain16:38
jsalisbury##16:50
jsalisbury## Kernel team meeting in 10 minutes16:50
jsalisbury##16:50
=== jsalisbury changed the topic of #ubuntu-kernel to: Home: https://wiki.ubuntu.com/Kernel/ || Ubuntu Kernel Team Meeting - Tues December 3rd, 2013 - 17:00 UTC || If you have a question just ask, and do wait around for an answer!
lfaraoneapw: re 1206387 , the package currently in the queue restores OpenAFS functionality on 3.11 , so we're current through linux-lts-saucy, but that SRU does not contain the fix for trusty's config  (bug 1246675) 17:35
ubot2Launchpad bug 1246675 in openafs (Ubuntu) "OpenAFS fails to build on trusty kernel 3.12 [openafs-modules-dkms 1.6.5.1-1: openafs kernel module failed to build]" [High,Fix released] https://launchpad.net/bugs/124667517:35
lfaraonebug 120638717:35
ubot2Launchpad bug 1206387 in openafs (Ubuntu Precise) "openafs-modules-dkms 1.6.1-1+ubuntu0.2: module FTBFS on 3.8.0" [High,Confirmed] https://launchpad.net/bugs/120638717:35
lfaraoneapw: Ideally I'd like the current package accepted and we'll just update for trusty's kernel once it gets closer to release. 17:35
apwlfaraone, yeah that is an appropriate approach as we won't have 3.12 for very long17:39
lfaraonethe only reason I bothered to introduce a delta this early in the cycle for openafs is because I'm running trusty on my laptop, and (some of) my email is in AFS maildirs. :P17:41
apwheh :)17:45
apwlfaraone, am i correct in thinking that we have released all of the versions you have penidng17:48
apwlfaraone, that reminds me, if you want to get a preview of the 3.13 kernel we have early (-rc1 ish) kernles in our PPA: https://launchpad.net/~canonical-kernel-team/+archive/ppa/+packages17:50
lfaraoneapw: no, 1.6.5.1-1ubuntu0.12.04.1 is still waiting to get accepted to precise-proposed 17:53
apwlfaraone, /me wonders why queue isn't showing it to him17:53
lfaraonesory 1.6.5.1-1~ubuntu0.12.04.117:53
apwahh there it is, finger fail on my side.  thanks17:54
lfaraoneI messed up the first upload's version number, so I requested that it be rejected.17:54
apwahh thats what it is17:55
apwlfaraone, i assume you are tyring to commonise the version here with that in trusty ?17:56
lfaraoneapw:  1.6.5.1-1~ubuntu0.12.04.1 is a backport of  1.6.5.1-1 , which is in Saucy.17:57
apwlfaraone, is it a backport of 1.6.5.1-1ubuntu1 ?17:58
lfaraoneapw: No. 17:58
apwso i think the number might be a litle odd, i am unsure that the ~ would be neeed, as ubuntu0 is before ubuntu1 but, as long as it is 'before' i assume it is ok17:59
lfaraoneapw: right, I uploaded the SRU before I uploaded the new verison in trusty.18:00
apwbut i assume your version isn't newer than 1.6.5.1-1 which is what your currnet number implies, but ... not sure its a problem18:02
lfaraoneapw: the SRU is the same code as 1.6.5.1-1, but if you upgrade your system should install the 1.6.5.1-1 package replacing the backported version. So, we need to make the SRU less than the version in the development release. 18:04
lfaraone1.6.5.1-1~ubuntu0.12.04.1 is less than 1.6.5.1-1 , the latter of which was previously in trusty. Its also less than 1.6.5.1-1ubuntu1, so upgrades will still work. 18:05
apwahh i see, got you18:05
apwlfaraone, there is a heap of change between what is applied in trusty (1.6.5.1-1 not th ubuntuN versions) and what was backported, in debian/rules which i thought i might have seen an upload to undo, but cannot find now18:32
lfaraoneapw: the debian/rules changes were in Anders' original debdiff as changes needed to build on precise, I believe. 18:33
apwhmmm, ok18:34
lfaraoneapw: in any case, it just moves logic from override_dh_install-arch to override_dh_install18:36
lfaraoneand removes override_dh_install-arch. Perhaps the disntinction between override_dh_install-arch and override_dh_install-indep didn't exist in precise's debhelper?18:37
apwyeah that is believeable18:37
lfaraonehttps://lists.debian.org/debian-devel/2011/12/msg00092.html implies the options were new in Debian in late 2011, so I imagine they may not have made it to precise before DIF / FF18:38
apwyeah thanks18:38
infinityCould relate to this:18:47
infinitydebhelper (9.20120608) unstable; urgency=low18:47
infinity  * dh: When there's an -indep override target without -arch, or vice versa,18:47
infinity    avoid acting on packages covered by the override target when running18:47
infinity    the command for packages not covered by it. Closes: #67646218:48
infinity -- Joey Hess <joeyh@debian.org>  Fri, 08 Jun 2012 13:15:48 -040018:48
apwnnng what language is that written in18:48
infinityapw: I think it's saying that if you have "foo-indep", "foo" would run for those same packages again, unless you also have a "foo-arch".18:50
infinity(In which case, "foo" wouldn't happen at all, just the two overrides)18:50
infinitySo, the fix could be to simply add an override_dh_install-indep that calls dh_install -i18:51
infinityBut I haven't looked at the diff, as long as it's sane, I don't care.18:51
apwswitches to the omre normal overrides18:53
apwlfaraone, i asusme this has been tested with at least the P and S kernels as it seems to carry a bump for everything19:00
apwlfaraone, i wonder when we went to 3.5 we just plled in the updates for the kernel componet, not the test of it, why are we not doing the same for this one?19:03
lfaraoneapw: the cherrypick needed would be really bit, ref https://bugs.launchpad.net/ubuntu/+source/openafs/+bug/1206387/comments/219:11
ubot2Launchpad bug 1206387 in openafs (Ubuntu Precise) "openafs-modules-dkms 1.6.1-1+ubuntu0.2: module FTBFS on 3.8.0" [High,Confirmed]19:11
lfaraone*big19:11
lfaraoneapw: this has been in the OpenAFS PPA for a month, and I believe is in use by everyone at MIT running the HWE kernels. I had installed the packages on my system running non-HWE and they worked for me. 19:15
lfaraoneI believe CMU is also running 1.6.5.1 on Precise via the PPA.19:16
apwif my memory of hte main users of afs that might well be pretty much all of them ...19:16
apwlfaraone, and i guess we get more change for 3.12 and likely again for 3.1319:16
infinityThe more important question isn't "does this work on 3.8", but "does it break on 3.2"?19:17
apwi think we do need to know it has been tested in all the valid combinations P P+Q P+R P+S19:17
lfaraoneapw: is P+Q supported, still? 19:18
apwlfaraone, not for much longer i suspect indeed19:18
apwi do so wish the HWE backports were in per series PPAs and not in the archive19:18
infinityAll of them are supported until after 14.04 comes out.19:19
lfaraoneapw: yeah… me too. 19:19
infinityBut it seems unlikely that you'd craft a kernel module that works on 3.2 and 3.8 but not 3.5...19:19
apwinfinity, yeah that19:19
lfaraoneAnyway, I can install ALL the kernels in a VM and double check.19:19
apwlfaraone, that would be great19:20
stgraberrtg: ping19:24
rtgstgraber, on the phone19:24
stgraberrtg: ok. When you're back, can you let me know what package your verification-done-precise applies to in https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1205284?19:25
ubot2Launchpad bug 1205284 in linux (Ubuntu Precise) "linux-tools naming is not scalable to multiple source packages" [Medium,Fix committed]19:25
stgraberrtg: if that's apt, then I'll release it to -updates. The rest will go through the standard kernel SRU process.19:25
rtgstgraber, bug apw about that19:25
apwstgraber, hi ... which package are you considering the bug for sru wise19:28
stgraberapw: apt19:29
stgraberapw: the sru report says apt has been in -proposed for long enough and if rtg's verification-done-precise tag applies to it, then I can release it, but due to the high number of sources linked to that bug and lack of comment, I can't know whether the tag was meant for apt or for some of those linux sources...19:30
bjfstgraber, i believe rtg was responding to the previous comment from my bug spamming asking for testing/verification19:31
bjfstgraber, that would make it (the rtg tag) applicable to the linux package19:31
apwi don't expect rtg's does apply there... infinity your apt update for that linux-tools bug was about getting the apt "mark as autoinstalled" stuff right for toosl right ?19:31
apwinfinity, if so i can veryify that ...19:31
apwstgraber, and yeah these tags are uttrely usless on these bugs, can we get them fixed somehow to include the package where there is more than one/19:32
apw?19:32
rtgyeah, my change to the tag would have been for linux, not apt19:32
apwstgraber, i believe i understnad that apt change and can verify it19:34
stgraberapw: I guess we could extend the syntax to be verification-done[-<source name>][-<series name>] which should work for those cases (at least so long as we don't have source package names that match series name ;))19:34
stgraberapw: that'd be great!19:34
stgraberbdmurray: ^19:34
bjfstgraber, does anyone other that the kernel team use those verification tags?19:35
stgraberbjf: sure, all SRUs do19:35
bjfhuh19:35
bjfi don't remember using that as an example but I must have19:36
stgraberand that usually ends up being a bit of a mess when multiple sources are concerned as we need to differentiate which have been tested and which haven't :)19:36
=== thomi_ is now known as thomi
infinityapw, stgraber: I can verify that apt change DTRT... When you have tools installed with the new naming scheme.19:51
infinity(Which is only lts-saucy at this point, isn't it?... I don't recall now)19:51
stgraberinfinity: the bug report lists linux-lts-saucy and linux as affected for precise19:52
infinitystgraber: Well, it's not fixed in the current precise-proposed...19:55
infinityLooks like the bug ref in the changelog was just about updating the wrappers, not about the packaging.19:56
infinityapw: ^19:56
apwinfinity, linux is affected as it carries the new wrappers for all releases, but does not get switched to that form19:57
apwstgraber, ^19:57
infinityapw: Did we intent to switch the package names for linux/precise too, or just leave it be?19:57
infinitys/intent/intend/19:57
apwonly linux-lts-saucy is using the new form indeed, so the apt changes only affect there19:57
apwi was not intending on changing the older releases unless somone whined no19:58
* infinity nods.19:58
* rtg -> lunch20:05
apwinfinity, so are you or am i, verifying this apt thingy20:11
apwinfinity, i have a vm availble to do it20:12
infinityapw: Go nuts, if you're all set up to verify.20:17
rtgogasawara, re: bug #1255297 - were you gonna send a patch to the list ? Its been at least 15 minutes.20:39
ubot2Launchpad bug 1255297 in linux (Ubuntu Saucy) "XPS 15 SD Card Reader Support" [Medium,In progress] https://launchpad.net/bugs/125529720:39
ogasawarartg: sheesh, I'm about to hit send20:40
rtg:)20:41
bjfogasawara, it looks like the next SRU cycles kernels will be the one for 12.04.421:06
ogasawarabjf: ack, I figured it would be21:07
ogasawarabjf: can we make sure that patch for 1255297 lands in it21:07
bjfogasawara, i'm thinking this next cycle is going to be kinda long given holidays and release prep21:07
bjfogasawara, as long as it doesn't cause any regressions i don't see why it won't make it21:08
ogasawarabjf: ack21:08
ogasawarabjf: and ack on making this next cycle a little longer21:08
bjfogasawara, but just for you i can make sure that commit gets in :-)21:09
ogasawarabjf: heh, thanks :)21:09
apwstgraber, ok i've confired the apt changes (added same to the bug) and vairous other bits21:16
stgraberapw: cool, thanks. I'll release the apt SRU then.21:41
apwstgraber, wonderful thanks21:42
apwrtg, that sign fix turned out nice and simple, and the where of its occurance says why i have never seen it, as i nearly always am running your latest shiney kernel hand compiled21:50
rtgapw, yep, though I'm still struggling to get a trusty upload to build so that I can be absolutely sure.21:51
rtgFTBS: make[2]: Leaving directory `/build/buildd/linux-3.12.0/debian/build/tools-perarch/tools/lib/traceevent'21:51
rtg    LINK perf21:51
rtg/usr/bin/ld: cannot find -liberty21:51
rtgapw, I think 'UBUNTU: [Config] switch build-depends to libiberty-dev' fixes the FTBS (buils testing as we speak)21:52
rtgbuild*21:52
apwahh i didn't realise he was wacking it from the old place ...21:53
rtgyeah, its gone21:53
apwthat was rather quick :)21:53
apwi figured we had as long as it took to get 3.13 in, seems i was wrong21:54
* rtg -> EOD22:31
=== medberry is now known as med_

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!