From: "Peter Müller" <peter.mueller@ipfire.org>
To: development@lists.ipfire.org
Subject: Re: [PATCH] Core Update 168: Hard-code kernel version to 5.15.35
Date: Thu, 12 May 2022 20:00:29 +0000 [thread overview]
Message-ID: <b47e7cf5-71bd-e082-cbd2-8fd581f9e939@ipfire.org> (raw)
In-Reply-To: <5aa2b8de-0c1d-4540-fff5-e64dc9b67f1c@ipfire.org>
[-- Attachment #1: Type: text/plain, Size: 4678 bytes --]
Hello Adolf,
thanks for your reply.
This changes things then, and this patch can be dropped.
As for your issue, the only thing I can think of so far is the linux-firmware update.
I will go through the delta and look for anything suspicious, since I am not going to
be able to do some VM-based testing myself before next week.
Which VM setup are you running on? VirtualBox?
Thanks, and best regards,
Peter Müller
> Hi Peter,
>
> On 12/05/2022 21:33, Peter Müller wrote:
>> Hello Jon,
>>
>> thanks for your reply.
>>
>> Usually, I do push fixes to Core Updates straight into "next". However, I do not have
>> permission to push into "master" (Michael or Arne need to do this for me), and as soon
>> as a patch lands there _and_ the nightly builds ran successfully, it is available to
>> the "testing" channel of upcoming Core Updates.
>>
>> However, I do not feel sufficiently confident with this patch, which is why I sent it
>> to the mailing list, and wait for feedback on it before amending.
>>
>> On a general notice: Any IPFire installation that ran Core Update 167 from the "stable"
>> channel before (and has been rebooted at least once ever since) can, to my knowledge,
>> update to Core Update 168 without all the hiccups Adolf and Rob observed. (Please do
>> let me know if this is wrong.)
>>
> I am afraid that I am going to be disappointing you. I have a running vm with the current stable CU, currently CU167. It will only ever get updated with the next fully released CU.
>
> When a Testing release is issued I create a clone of the running stable CU and then do the upgrade and evaluation on that vm. When the CU is released as a full stable one then I delete that Testing vm and update the existing stable vm.
>
> That is how I have been doing it for a long time now.
>
> Regards,
>
> Adolf.
>
>> Therefore, you do not necessarily have to wait for this patch to land in "master",
>> presumed your systems ran on Core Update 167 from the "stable" channel before.
>>
>> Thanks, and best regards,
>> Peter Müller
>>
>>
>>> Peter,
>>>
>>> How do I tell when this makes it into the CU 168 testing build? (The one that Pakfire will pickup & install)
>>>
>>> I will can test this on the Raspberry Pi RPi4B and on the FriendlyArm R2S
>>>
>>>
>>> Jon
>>>
>>>
>>>> On May 12, 2022, at 12:41 PM, Peter Müller <peter.mueller(a)ipfire.org> wrote:
>>>>
>>>> On systems that have previously running on testing, kernel 5.15.32 might
>>>> still be installed. dracut being called with ${KVER} will then build an
>>>> inital ramdisk for the wrong kernel, as 5.15.32 might still be running,
>>>> albeit 5.15.35 has been installed due to the Pakfire procedure when
>>>> upgrading on testing.
>>>>
>>>> Due to lack of hardware, this patch is untested on ARM.
>>>>
>>>> https://lists.ipfire.org/pipermail/development/2022-May/013433.html
>>>>
>>>> Reported-by: Stefan Schantl <stefan.schantl(a)ipfire.org>
>>>> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
>>>> ---
>>>> config/rootfiles/core/168/update.sh | 8 ++++----
>>>> 1 file changed, 4 insertions(+), 4 deletions(-)
>>>>
>>>> diff --git a/config/rootfiles/core/168/update.sh b/config/rootfiles/core/168/update.sh
>>>> index d21f648dd..7cc8800b2 100644
>>>> --- a/config/rootfiles/core/168/update.sh
>>>> +++ b/config/rootfiles/core/168/update.sh
>>>> @@ -107,14 +107,14 @@ chmod -v 750 /etc/sudoers.d
>>>> chmod -v 640 /etc/sudoers.d/*
>>>>
>>>> # Rebuild initial ramdisk to apply microcode updates
>>>> -dracut --regenerate-all --force
>>>> +dracut --kver="5.15.35-ipfire" --regenerate-all --force
>>>> case "$(uname -m)" in
>>>> armv*)
>>>> - mkimage -A arm -T ramdisk -C lzma -d /boot/initramfs-${KVER}-ipfire.img /boot/uInit-${KVER}-ipfire
>>>> - rm /boot/initramfs-${KVER}-ipfire.img
>>>> + mkimage -A arm -T ramdisk -C lzma -d /boot/initramfs-5.15.35-ipfire.img /boot/uInit-5.15.35-ipfire
>>>> + rm /boot/initramfs-5.15.35-ipfire.img
>>>> ;;
>>>> aarch64)
>>>> - mkimage -A arm64 -T ramdisk -C lzma -d /boot/initramfs-${KVER}-ipfire.img /boot/uInit-${KVER}-ipfire
>>>> + mkimage -A arm64 -T ramdisk -C lzma -d /boot/initramfs-5.15.35-ipfire.img /boot/uInit-5.15.35-ipfire
>>>> # dont remove initramfs because grub need this to boot.
>>>> ;;
>>>> esac
>>>> --
>>>> 2.35.3
>>>
next prev parent reply other threads:[~2022-05-12 20:00 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-12 17:41 Peter Müller
2022-05-12 18:10 ` Jon Murphy
2022-05-12 19:33 ` Peter Müller
2022-05-12 19:53 ` Adolf Belka
2022-05-12 20:00 ` Peter Müller [this message]
2022-05-12 20:11 ` Adolf Belka
2022-05-13 10:11 ` Michael Tremer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=b47e7cf5-71bd-e082-cbd2-8fd581f9e939@ipfire.org \
--to=peter.mueller@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox