[Debian] [vorlon@debian.org: Bug#400675: kernel-patch-openvz: patch still not applying cleanly]

Ola Lundqvist opal at debian.org
Fri Jan 26 12:57:10 EST 2007


Hi

New versions of the kernel will be made as it has serious bugs. I'll check
if it applies during the weekend.

Regards,

// Ola

----- Forwarded message from Steve Langasek <vorlon at debian.org> -----

Envelope-to: ola at opalsys.net
Delivery-date: Fri, 26 Jan 2007 10:46:27 +0100
Subject: Bug#400675: kernel-patch-openvz: patch still not applying cleanly
Reply-To: Steve Langasek <vorlon at debian.org>, 400675 at bugs.debian.org
Resent-From: Steve Langasek <vorlon at debian.org>
Resent-To: debian-bugs-dist at lists.debian.org
Resent-CC: Ola Lundqvist <opal at debian.org>
Resent-Date: Fri, 26 Jan 2007 09:48:14 +0000
Resent-Message-ID: <handler.400675.B400675.11698045303564 at bugs.debian.org>
X-Debian-PR-Message: report 400675
X-Debian-PR-Package: kernel-patch-openvz
X-Debian-PR-Keywords: 
X-Debian-PR-Source: kernel-patch-openvz
From: Steve Langasek <vorlon at debian.org>
To: Ola Lundqvist <ola at opalsys.net>, Kir Kolyshkin <kir at openvz.org>,
	400675 at bugs.debian.org
Cc: opal at debian.org, dev at openvz.org, dim at openvz.org, vtaras at openvz.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
Resent-Sender: Debian BTS <debbugs at bugs.debian.org>
Resent-Date: Fri, 26 Jan 2007 01:48:15 -0800
X-Spam-Score: 0.0 (/)
X-Spamcheck-provider: Checked for spam by opalsys.net, postmaster at opalsys.net

On Mon, Jan 22, 2007 at 10:35:04AM +0100, Ola Lundqvist wrote:
> On Mon, Jan 22, 2007 at 12:33:33AM -0800, Steve Langasek wrote:
> > On Mon, Jan 22, 2007 at 08:45:21AM +0100, Ola Lundqvist wrote:
> > > Do you know if there will be more updates to the kernel after -8?

> > Yes, there will.

> Ok, good to know. Upsream and I are subscribed to the package
> tracking system for such uploads so we should be informed quite quickly.

You've probably seen by now that -9 has been uploaded.  There will
definitely be a -10 as well for etch, there are still outstanding RC bugs
that need fixing; but -9 needs to be the final ABI and therefore shouldn't
(I hope) be including any more large upstream merges.

> > > If so I need to be prepared as that will probably break this patch.

> > Why is this patch so fragile?  If it breaks that easily, it hardly seems
> > releasable -- how do we protect against it being broken by security updates?

> the patch is very big (about 700k) and applies to huge amount of places in the
> kernel. From 2.6.19 somekind of hook functionality is in place as
> far as I understand, but for 2.6.18 it is not possible to use that. I do not
> know if it solves all the problems though.

> The problem have arized everytime the kernel team change from
> 2.6.18 to 2.6.18.3 and then to 2.6.18.6. I do not think a problem have
> arized when just doing minor updates, but I do not know for sure and it
> depends on the update.

Well, the lack of surety is what has me concerned.

> But security updates may need to be coordinated.

Is the security team aware that this is the case?

> I assume that same problem can arize for vserver and xen patch, but those
> patches are a part of the kernel source nowdays.

Yes, which means any problems with those patches are detected at build time
for the linux-2.6 package -- clearly not the case for openvz right now.

On Mon, Jan 22, 2007 at 02:10:02PM +0300, Kir Kolyshkin wrote:
> One failed hunk in net/ipv6/udp.c -- looks like the patch from 2.6.18.5 
> is not applied to linux-source-2.6.18-7:
> * http://tinyurl.com/2n9554

> Six failed hunks in net/ipv4/ip_tables.c -- same, looks like a few 
> patches from 2.6.18.y-stable are not applied to linux-source-2.6.18-7. I 
> see at least the following ones:
> * http://tinyurl.com/2l5sae
> * http://tinyurl.com/38bgxa
> * http://tinyurl.com/2wx9jz

> I have just checked that after applying four patches linked above, 
> kernel-patch-openvz-028test007.1 applies cleanly on top of 
> linux-source-2.6.18-2.6.18-7.

> Thus the question: are you tracking the -stable tree, and how closely do 
> you follow it?

This bug was re-reported because the current version of the openvz patch
package doesn't apply against the /previous/ version of the linux-2.6
package.  The common case here has been that the openvz patch hasn't been
updated to apply to the current version of the linux-2.6 package.

-- 
Steve Langasek                   Give me a lever long enough and a Free OS
Debian Developer                   to set it on, and I can move the world.
vorlon at debian.org                                   http://www.debian.org/



----- End forwarded message -----

-- 
 --------------------- Ola Lundqvist ---------------------------
/  opal at debian.org                     Annebergsslingan 37      \
|  ola at opalsys.net                     654 65 KARLSTAD          |
|  +46 (0)54-10 14 30                  +46 (0)70-332 1551       |
|  http://opalsys.net/                 UIN/icq: 4912500         |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36  4FE4 18A1 B1CF 0FE5 3DD9 /
 ---------------------------------------------------------------


More information about the Debian mailing list