/srv/irclogs.ubuntu.com/2015/03/06/#ubuntu-kernel.txt

=== diwic__ is now known as diwic
=== diwic is now known as diwic_
stepjohnI've just checked out the kernel source from git and there isn't debian/patches dir. Where are the custom kernel patches stored for the ubuntu kernel?? Am I wrong in thinking that you patch the kernel?13:00
diwic_stepjohn, patches are applied to the kernel, but as git commits, not as added files in debian/patches13:02
stepjohndiwic_: Arrrrr OK now I totally get it 13:03
stepjohndiwic_: branch apply patch, update changelog, tag , build 13:03
alexbligh1Am I correct that CVE-2015-0239 / usn-2516-3 per http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0239.html is fixed in the HWE kernel for trusty (i.e. linux-image-generic-lts-utopic) in 3.16.0-31.41~14.04.1 which (despite what it says on the page) is not released, the latest version being 3.16.0.31.24? If so, when would one expect 3.16.0-31.41?14:17
alexbligh1I'm confused as it appears to be in utopic-security but not precise14:21
henrixalexbligh1: where do you see that 3.16.0-31.41 isn't yet released?14:24
alexbligh1henrix, http://packages.ubuntu.com/trusty-updates/linux-generic-lts-utopic and 'apt-get update'14:24
henrixalexbligh1: you're looking at the -meta package.  here's the correct link: http://packages.ubuntu.com/trusty-updates/kernel/linux-image-3.16.0-31-generic14:26
alexbligh1henrix, thanks - all very peculiar. I better find out why it's not installing then14:30
alexbligh1henrix, a fresh install this morning didn't pull it in.14:31
henrixalexbligh1: after the 'apt-get update', a 'apt-get dist-upgrade' should do the job14:31
alexbligh1henrix, we used 'aptitude full-upgrade'. I'll try that too. It's also not appearing in a debootstrap build. Something odd is going on.14:32
infinityalexbligh1: It's been upgraded just fine.14:37
infinityalexbligh1: If you have linux-generic-lts-utopic 3.16.0.31.24, that depends on linux-image-3.16.0-31-generic14:38
alexbligh1infinity, henrix: DaGoaty and I are currently working on a PEBCAK error14:38
infinityalexbligh1: You can't have one without the other.14:38
alexbligh1henrix, infinity sorry for the noise. Looks like what happened was we expected an update as of the CVE date, but it would appear we'd already got the update earlier. Then we looked at the meta package version not the image version when we didn't see another update. Sigh.14:40
henrixalexbligh1: no prob!14:41
tinocohey guys15:13
tinocooops wrong #15:13
slangaseksmb: hi - question regarding nfs kernel interfaces17:57
smbslangasek, you may try your luck...17:59
slangaseksmb: after switching to the nfs-utils systemd units, I noticed that rpc.idmapd wasn't being started on clients, only on servers; it turns out that, according to upstream, it's superseded by an upcall to /usr/sbin/nfsidmap17:59
slangaseksmb: can you help me figure out what kernel introduced support for this upcall?  I know that it was there at least in Linux 3.5 (http://serverfault.com/questions/415908/nfs4-rpc-idmapd-or-nfs-idmap-upcall)18:00
slangasekthat's obviously enough to cover us for LTS upgrades, but in the unlikely event that we had someone wanting to support NFS on an android kernel :P, I'd like to know what our story is18:00
smbslangasek, I can try... give me a few minutes18:01
slangaseksmb: cheers18:01
smbslangasek, So it seems the "new" method was introduced (added to Documentation/filesystems/nfs/idmapper.txt) with 2.6.37. However for a while (until 3.4) it required an option (NFS_USE_NEW_IDMAPPER) to be set at compile time. Which we did not do in Precise (3.2). Starting with 3.4 this was replaced by making new the default but automatically fall back (e6499c6f4b5f56a16f8b8ef60529c1da28b13aea NFS: Fall back on old 18:16
smbidmapper if request_key() fails)18:16
smbslangasek, Is that enough to help you?18:16
slangaseksmb: yes, thanks18:17

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!