Hi Steve

I have checked the -9 version and it do not apply cleanly. However
it is just a few files that have problems.

When we update the patch, is it important that the patch just
contain a few changes so it is easy to verify, or can it be
as big as the difference between 028test006.3 and 028test007.1?

Regards,

// Ola

On Fri, Jan 26, 2007 at 01:42:07AM -0800, Steve Langasek wrote:
> On Mon, Jan 22, 2007 at 10:35:04AM +0100, Ola Lundqvist wrote:
> > On Mon, Jan 22, 2007 at 12:33:33AM -0800, Steve Langasek wrote:
> > > On Mon, Jan 22, 2007 at 08:45:21AM +0100, Ola Lundqvist wrote:
> > > > Do you know if there will be more updates to the kernel after -8?
> 
> > > Yes, there will.
> 
> > Ok, good to know. Upsream and I are subscribed to the package
> > tracking system for such uploads so we should be informed quite quickly.
> 
> You've probably seen by now that -9 has been uploaded.  There will
> definitely be a -10 as well for etch, there are still outstanding RC bugs
> that need fixing; but -9 needs to be the final ABI and therefore shouldn't
> (I hope) be including any more large upstream merges.
> 
> > > > If so I need to be prepared as that will probably break this patch.
> 
> > > Why is this patch so fragile?  If it breaks that easily, it hardly seems
> > > releasable -- how do we protect against it being broken by security 
> > > updates?
> 
> > the patch is very big (about 700k) and applies to huge amount of places in 
> > the
> > kernel. From 2.6.19 somekind of hook functionality is in place as
> > far as I understand, but for 2.6.18 it is not possible to use that. I do not
> > know if it solves all the problems though.
> 
> > The problem have arized everytime the kernel team change from
> > 2.6.18 to 2.6.18.3 and then to 2.6.18.6. I do not think a problem have
> > arized when just doing minor updates, but I do not know for sure and it
> > depends on the update.
> 
> Well, the lack of surety is what has me concerned.
> 
> > But security updates may need to be coordinated.
> 
> Is the security team aware that this is the case?
> 
> > I assume that same problem can arize for vserver and xen patch, but those
> > patches are a part of the kernel source nowdays.
> 
> Yes, which means any problems with those patches are detected at build time
> for the linux-2.6 package -- clearly not the case for openvz right now.
> 
> On Mon, Jan 22, 2007 at 02:10:02PM +0300, Kir Kolyshkin wrote:
> > One failed hunk in net/ipv6/udp.c -- looks like the patch from 2.6.18.5 
> > is not applied to linux-source-2.6.18-7:
> > * http://tinyurl.com/2n9554
> 
> > Six failed hunks in net/ipv4/ip_tables.c -- same, looks like a few 
> > patches from 2.6.18.y-stable are not applied to linux-source-2.6.18-7. I 
> > see at least the following ones:
> > * http://tinyurl.com/2l5sae
> > * http://tinyurl.com/38bgxa
> > * http://tinyurl.com/2wx9jz
> 
> > I have just checked that after applying four patches linked above, 
> > kernel-patch-openvz-028test007.1 applies cleanly on top of 
> > linux-source-2.6.18-2.6.18-7.
> 
> > Thus the question: are you tracking the -stable tree, and how closely do 
> > you follow it?
> 
> This bug was re-reported because the current version of the openvz patch
> package doesn't apply against the /previous/ version of the linux-2.6
> package.  The common case here has been that the openvz patch hasn't been
> updated to apply to the current version of the linux-2.6 package.
> 
> -- 
> Steve Langasek                   Give me a lever long enough and a Free OS
> Debian Developer                   to set it on, and I can move the world.
> [EMAIL PROTECTED]                                   http://www.debian.org/
> 
> 

-- 
 --------------------- Ola Lundqvist ---------------------------
/  [EMAIL PROTECTED]                     Annebergsslingan 37      \
|  [EMAIL PROTECTED]                     654 65 KARLSTAD          |
|  +46 (0)54-10 14 30                  +46 (0)70-332 1551       |
|  http://opalsys.net/                 UIN/icq: 4912500         |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36  4FE4 18A1 B1CF 0FE5 3DD9 /
 ---------------------------------------------------------------


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to