[06:22] <android> !which kernel has 16.04.2
[07:47] <apw> android, the media would have had 4.8 i believe
[07:52] <tjaalton> apw: is the current xenial sru cycle still on target (release on aug 7th)
[07:52] <apw> tjaalton, as far as i know yes, why ?
[07:53] <apw> we are somewhat backed up but we are catching up
[07:53] <apw> we try not to slip release the candance even when we are slipping individual releases
[07:53] <tjaalton> apw: there's a oneliner for i915 pciids that would like to get in if there's a respin, but not necessarily needs one just for this
[07:54] <apw> tjaalton, if you get the patch to the list asap, i'll get it on the "if there is a respin" list
[07:54] <apw> smb, ^
[07:54] <tjaalton> sure
[07:54] <apw> klebers, ^
[07:55] <smb> yeah klebers. I pretend to know nutting bout anyting
[07:57] <klebers> xenial cycle already started and for now it's kind of on track
[07:58] <klebers> I will make sure we include it if we have a re-spin (given that it's sent to ML and ack'ed)
[07:58] <apw> klebers, we have a column for that i tink
[07:59] <klebers> apw, not on the sru board, but I will create it
[08:02] <apw> klebers, oh yeah, wrong board, good plan
[09:59] <android> doea the 4.4 ubuntu16 kernel have in kernel encryption certificates?
[10:01] <apw> android, certificates for what ?
[10:09] <android> anything this is a security audit, crypto needs to be capable of being switched off
[10:10] <apw> the kernel almost cirtainly contains certificates to validate its own modules
[10:10] <android> apw
[10:12] <android> this is with conscern to networking
[10:13] <android> say it is on a lan the ssl and any crypto is turned off is there anthing in kernelspace
[10:14] <apw> all network related crypto is loaded from userspace, there are no default keys that i know of
[10:14] <android> Is it better to go with fedora for lan?
[10:14] <apw> does that question even make sense?
[10:15] <android> ubuntu works great online
[10:15] <android> better than any os except possibly windows
[10:16] <android> for local business lan I need to be able to audit all com lines
[10:17] <android> crypto makrs it not possible omline ssl comea from rsa
[10:17] <apw> and if you don't support ssl you won't be able to talk to an increasing section of the internet
[10:17] <android> and has evolved into a big blob of somebody elses authority
[10:18] <android> yes apw I agree
[10:18] <android> google is taking over
[10:18] <apw> anyhow, the kernel does not do any encrypted communications itself, only on request from userspace
[10:19] <apw> privacy is increasing is probabally a fairer statement
[10:20] <android> no more dual booting
[10:20] <android> screws everything up
[10:23] <android> npw if I want to invite guests on my network can you make a page ise facebook for login?
[10:23] <android> something fairly unbiquitis
[10:24] <android> there are so many captuve portals now
[10:24] <android> I do want to be kind to strangers
[10:25] <apw> android, why not have a separate guest network (vlan whatever) and print the password on your wall
[10:25] <android> let them access through my network without a oruvate password
[10:26] <apw> have a private password which you give them, but have it easy to find when they are local
[10:26] <android> the password is then not unique
[10:26] <apw> indeed
[10:26] <android> facebook is
[10:26] <apw> i am sure you can do that if you wanted to, i have no knowledge in this space
[10:26] <apw> recording people who come just means you have more data you need to keep safe
[10:27] <apw> just don't let them on the bit you have to audit, keep it utterly separate
[10:28] <apw> i even do that at my home
[11:24] <patrik> Hi! I'm debugging a driver and expect it to dump to /sys/devices/virtual/devcoredump but "udevadm monitor" shows that kernel and udev adds and removes them. I've been researching enabling apport to handle it and even overriding the default "core_pattern" settings to avoid apport but I still can't capture it. In 1704. Any ideas?
[11:42] <android> patrik what command do you run for this expectation?
[11:43] <android> there is a debug option usually activated at boot with grub modesettings
[21:24] <nomego> Hi, I'm debugging a kernel driver and is trying to make it device core dump, but udevadm monitor shows that it's getting deleted instantly. Any tips? I've tried enabling apport, setting ulimit -c, even overriding the core_pattern to avoid using apport but nothing seems to work. Something fundamental I've missed?