public inbox for development@lists.ipfire.org
 help / color / mirror / Atom feed
From: Adolf Belka <adolf.belka@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] Core Update 168: Hard-code kernel version to 5.15.35
Date: Thu, 12 May 2022 21:53:48 +0200	[thread overview]
Message-ID: <5aa2b8de-0c1d-4540-fff5-e64dc9b67f1c@ipfire.org> (raw)
In-Reply-To: <3154bd2f-76b2-16dc-90cb-823e18495a3e@ipfire.org>

[-- Attachment #1: Type: text/plain, Size: 4140 bytes --]

Hi Peter,

On 12/05/2022 21:33, Peter Müller wrote:
> Hello Jon,
>
> thanks for your reply.
>
> Usually, I do push fixes to Core Updates straight into "next". However, I do not have
> permission to push into "master" (Michael or Arne need to do this for me), and as soon
> as a patch lands there _and_ the nightly builds ran successfully, it is available to
> the "testing" channel of upcoming Core Updates.
>
> However, I do not feel sufficiently confident with this patch, which is why I sent it
> to the mailing list, and wait for feedback on it before amending.
>
> On a general notice: Any IPFire installation that ran Core Update 167 from the "stable"
> channel before (and has been rebooted at least once ever since) can, to my knowledge,
> update to Core Update 168 without all the hiccups Adolf and Rob observed. (Please do
> let me know if this is wrong.)
>
I am afraid that I am going to be disappointing you. I have a running vm with the current stable CU, currently CU167. It will only ever get updated with the next fully released CU.

When a Testing release is issued I create a clone of the running stable CU and then do the upgrade and evaluation on that vm. When the CU is released as a full stable one then I delete that Testing vm and update the existing stable vm.

That is how I have been doing it for a long time now.

Regards,

Adolf.

> Therefore, you do not necessarily have to wait for this patch to land in "master",
> presumed your systems ran on Core Update 167 from the "stable" channel before.
>
> Thanks, and best regards,
> Peter Müller
>
>
>> Peter,
>>
>> How do I tell when this makes it into the CU 168 testing build? (The one that Pakfire will pickup & install)
>>
>> I will can test this on the Raspberry Pi RPi4B and on the FriendlyArm R2S
>>
>>
>> Jon
>>
>>
>>> On May 12, 2022, at 12:41 PM, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>
>>> On systems that have previously running on testing, kernel 5.15.32 might
>>> still be installed. dracut being called with ${KVER} will then build an
>>> inital ramdisk for the wrong kernel, as 5.15.32 might still be running,
>>> albeit 5.15.35 has been installed due to the Pakfire procedure when
>>> upgrading on testing.
>>>
>>> Due to lack of hardware, this patch is untested on ARM.
>>>
>>> https://lists.ipfire.org/pipermail/development/2022-May/013433.html
>>>
>>> Reported-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>> ---
>>> config/rootfiles/core/168/update.sh | 8 ++++----
>>> 1 file changed, 4 insertions(+), 4 deletions(-)
>>>
>>> diff --git a/config/rootfiles/core/168/update.sh b/config/rootfiles/core/168/update.sh
>>> index d21f648dd..7cc8800b2 100644
>>> --- a/config/rootfiles/core/168/update.sh
>>> +++ b/config/rootfiles/core/168/update.sh
>>> @@ -107,14 +107,14 @@ chmod -v 750 /etc/sudoers.d
>>> chmod -v 640 /etc/sudoers.d/*
>>>
>>> # Rebuild initial ramdisk to apply microcode updates
>>> -dracut --regenerate-all --force
>>> +dracut --kver="5.15.35-ipfire" --regenerate-all --force
>>> case "$(uname -m)" in
>>>          armv*)
>>> -                mkimage -A arm -T ramdisk -C lzma -d /boot/initramfs-${KVER}-ipfire.img /boot/uInit-${KVER}-ipfire
>>> -                rm /boot/initramfs-${KVER}-ipfire.img
>>> +                mkimage -A arm -T ramdisk -C lzma -d /boot/initramfs-5.15.35-ipfire.img /boot/uInit-5.15.35-ipfire
>>> +                rm /boot/initramfs-5.15.35-ipfire.img
>>>                  ;;
>>>          aarch64)
>>> -                mkimage -A arm64 -T ramdisk -C lzma -d /boot/initramfs-${KVER}-ipfire.img /boot/uInit-${KVER}-ipfire
>>> +                mkimage -A arm64 -T ramdisk -C lzma -d /boot/initramfs-5.15.35-ipfire.img /boot/uInit-5.15.35-ipfire
>>>                  # dont remove initramfs because grub need this to boot.
>>>                  ;;
>>> esac
>>> -- 
>>> 2.35.3
>>

  reply	other threads:[~2022-05-12 19:53 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-05-12 17:41 Peter Müller
2022-05-12 18:10 ` Jon Murphy
2022-05-12 19:33   ` Peter Müller
2022-05-12 19:53     ` Adolf Belka [this message]
2022-05-12 20:00       ` Peter Müller
2022-05-12 20:11         ` Adolf Belka
2022-05-13 10:11 ` Michael Tremer

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5aa2b8de-0c1d-4540-fff5-e64dc9b67f1c@ipfire.org \
    --to=adolf.belka@ipfire.org \
    --cc=development@lists.ipfire.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox