/srv/irclogs.ubuntu.com/2014/06/30/#ubuntu-kernel.txt

=== Guest49128 is now known as fmasi
=== davmor2_ is now known as davmor2
=== lool- is now known as lool
morkanyone here?10:32
apwyes ... not you, but yes10:51
davmor2mork This is Awson 10:53
apwheh10:57
=== gmb` is now known as gmb
apwsmb, so i think the ip6_hold locking there is still ok, but you seem to have a point about RCU on the second existing caller.12:59
apwsmb, i've replied on the mail thread with my reasoning12:59
smbapw, Hm, I just read one reply which seemed to concern only the locking13:00
smbAh here comes number 213:00
apwsmb, yeah that was to tim's query.13:00
rtgI've kind of lost the thread on that patch. On the other hand. the author has not replied in 2 weeks, so maybe nobody really cares ?13:04
smbapw, Yeah ok looking at it that way it should be safe through holding that reference in the timer case. But the unlocked function is also called from those two changing functions now13:04
smbrtg, it could be that ipv6 is still rather rarely cared about (except by apw maybe... ;)) 13:06
apwi don't really know why anyone would bother to switch that option, let alone care about it admittedly incorrectly dropping the addresses and putting them back13:06
apwi also will note that in the current kerenel it doesn't drop the addresses at all as you might be using them, and ismply lets them expire naturally13:07
rtgapw, I'm inclined to just let it die unless someone who cares appears.13:08
apwrtg, tend to agree.  i suspect that the fix is safe, for non-lowlatency kernels just because rcu lock is baslically a noop13:08
smbI would agree especially since I have the feeling the locking / ref-counting is not right13:09
rtgalright, consider it ignored13:09
smbapw, Should we care to add a note abotu that in the bug report?13:11
apwsmb, i think you just volunteered13:12
smbapw, And with we I mean you, so the comment is parsable and not accidentally rude13:12
apwdamn you13:18
apwok done, though i was terse :)13:26
smbapw, at least not _accidentally_ rude. :D13:26
=== tyhicks` is now known as tyhicks
tseliotrtg: I've just uploaded a fixed nvidia 173. I think all my packages should ready now14:55
rtgtseliot, thanks14:55
=== bdmurray_ is now known as bdmurray
=== chiluk` is now known as chiluk
argesIf I do this: echo '<2>testing' | sudo tee /dev/kmsg  ... I should expect a priority 2 message exposed via 'dmesg -r' right?15:56
argesrtg: bug 127444416:00
ubot5bug 1274444 in linux (Ubuntu) "echo string to /dev/kmsg fails to appear on /var/log/syslog" [Medium,In progress] https://launchpad.net/bugs/127444416:00
pkernThe ABI guarantee is that an old version of the module works with a new kernel of the same ABI. Is that actually true with precise w/ lts-trusty -> trusty upgrade? Does the newly built kernel (higher version) share the same ABI?16:05
rtgpkern, nope, different toolchain16:06
infinityChanging toolchain shouldn't (usually) change ABI, though.16:07
infinityBut I guess we also don't attempt to test/verify that lts == master.16:07
sforsheesmb: since you're an skb expert now would you mind giving http://paste.ubuntu.com/7727065/ a review?16:08
sforsheeI think you looked at it once before, but I made a couple of changes16:08
smbsforshee, Sure (though I would never dare to call me anything near an expert when it comes to that skb stuff)16:09
sforsheesmb: well, more expert than me at least16:10
smbsforshee, Huh, I am not the one that writes patches for it. :)16:10
pkernrtg, infinity: So that breaks the upgrade assumption and does not trigger dkms rebuilds?16:11
infinitypkern: Quite possibly, yeah.  I'd be willing to bet the ABI doesn't actually change, but we definitely don't test for the truth of that.16:57
infinitypkern: For in-archive dkms modules, they'd tend to be upgraded too, so it might just be self-solving, depending on apt ordering, but local modules wouldn't be so lucky.16:57
infinitypkern: Possibly too late to think about clever hacks and workaround for precise->trusty, but perhaps worth a long, hard think for trusty->16.0416:58
pkerninfinity: Yeah, it's a local module that had some trouble.17:16
mjg59Anyone know when overlayfs got xattr support in Ubuntu?18:37
rtgapw, ^18:40
apwmjg59, at least precise20:08
mjg59apw: Ok. So it's some other layer that's giving me EOPNOTSUPP on lsetxattr().20:11
mjg59(sigh selinux)20:11
hans109hJust a reminder that it would be nice if the fix in https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1313981 was packaged into a commit....please...22:38
ubot5Ubuntu bug 1313981 in linux (Ubuntu) "Kernel disabling serial port ttyS0 on boot" [Medium,Confirmed]22:38
infinityapw: ^-- Looks like you have the most recent context on this.22:41

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!