* [gentoo-user] old kernels are installed during the upgrade @ 2018-01-02 11:54 Kruglov Sergey 2018-01-02 12:03 ` Alexander Kapshuk ` (2 more replies) 0 siblings, 3 replies; 40+ messages in thread From: Kruglov Sergey @ 2018-01-02 11:54 UTC (permalink / raw To: gentoo-user-list [-- Attachment #1: Type: text/plain, Size: 316 bytes --] Hello, All! Now I have gentoo-sources-4.14.8-r1 installed. After "emerge --ask --update --deep --with-bdeps=y --newuse @world" command emerge installs old kernel in NS (after first update 4.12.12, after second update 4.9.49-r1). How can I fix it? There is sys-kernel/gentoo-sources in my world set. [-- Attachment #2: Type: text/html, Size: 952 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-02 11:54 [gentoo-user] old kernels are installed during the upgrade Kruglov Sergey @ 2018-01-02 12:03 ` Alexander Kapshuk 2018-01-02 12:42 ` Mick 2018-01-02 19:26 ` [gentoo-user] " Stroller 2018-01-02 19:44 ` Neil Bothwick 2 siblings, 1 reply; 40+ messages in thread From: Alexander Kapshuk @ 2018-01-02 12:03 UTC (permalink / raw To: Gentoo mailing list On Tue, Jan 2, 2018 at 1:54 PM, Kruglov Sergey <kr_serge@hotmail.com> wrote: > Hello, All! > > > Now I have gentoo-sources-4.14.8-r1 installed. > > After "emerge --ask --update --deep --with-bdeps=y --newuse @world" command > emerge installs old kernel in NS (after first update 4.12.12, after second > update 4.9.49-r1). > How can I fix it? > There is sys-kernel/gentoo-sources in my world set. > > There was a discussion about this on the gentoo-dev mailing list. See the link below for details: https://archives.gentoo.org/gentoo-dev/message/1d2f3f98c2485fa53ed602bc8285054c ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-02 12:03 ` Alexander Kapshuk @ 2018-01-02 12:42 ` Mick 2018-01-02 15:59 ` [gentoo-user] " Nikos Chantziaras 0 siblings, 1 reply; 40+ messages in thread From: Mick @ 2018-01-02 12:42 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1207 bytes --] On Tuesday, 2 January 2018 12:03:24 GMT Alexander Kapshuk wrote: > On Tue, Jan 2, 2018 at 1:54 PM, Kruglov Sergey <kr_serge@hotmail.com> wrote: > > Hello, All! > > > > > > Now I have gentoo-sources-4.14.8-r1 installed. > > > > After "emerge --ask --update --deep --with-bdeps=y --newuse @world" > > command emerge installs old kernel in NS (after first update 4.12.12, > > after second update 4.9.49-r1). > > How can I fix it? > > There is sys-kernel/gentoo-sources in my world set. > > There was a discussion about this on the gentoo-dev mailing list. See > the link below for details: > https://archives.gentoo.org/gentoo-dev/message/1d2f3f98c2485fa53ed602bc82850 > 54c Alan copied a message from the devs list a few days ago, explaining that kernel 4.14 release has caused a lot of breakage and was keyworded for this reason. Reverting to earlier releases is meant to address this. That said, I've been running gentoo-sources-4.14.8-r1 here too, on 3 different boxen and thought it was doing fine, thanks. Then I discovered KVM images failed to boot with this error: kernel: kvm [5499]: vcpu0, guest rIP: 0xffffffffbbe67be4 disabled perfctr wrmsr: 0xc2 data 0xffff :-/ -- Regards, Mick [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-02 12:42 ` Mick @ 2018-01-02 15:59 ` Nikos Chantziaras 0 siblings, 0 replies; 40+ messages in thread From: Nikos Chantziaras @ 2018-01-02 15:59 UTC (permalink / raw To: gentoo-user On 02/01/18 14:42, Mick wrote: > On Tuesday, 2 January 2018 12:03:24 GMT Alexander Kapshuk wrote: >> On Tue, Jan 2, 2018 at 1:54 PM, Kruglov Sergey <kr_serge@hotmail.com> wrote: >>> [...] >>> Now I have gentoo-sources-4.14.8-r1 installed. >>> >>> After "emerge --ask --update --deep --with-bdeps=y --newuse @world" >>> command emerge installs old kernel in NS (after first update 4.12.12, >>> after second update 4.9.49-r1). >>> How can I fix it? >>> [...] >> >> There was a discussion about this on the gentoo-dev mailing list. See >> the link below for details: >> https://archives.gentoo.org/gentoo-dev/message/1d2f3f98c2485fa53ed602bc82850 >> 54c > > [...] > That said, I've been running gentoo-sources-4.14.8-r1 here too, on 3 different > boxen and thought it was doing fine, thanks. Then I discovered KVM images > failed to boot with this error: > > kernel: kvm [5499]: vcpu0, guest rIP: 0xffffffffbbe67be4 disabled perfctr > wrmsr: 0xc2 data 0xffff The core issue seems to have been finally fixed in 4.14.10-r1. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-02 11:54 [gentoo-user] old kernels are installed during the upgrade Kruglov Sergey 2018-01-02 12:03 ` Alexander Kapshuk @ 2018-01-02 19:26 ` Stroller 2018-01-02 19:47 ` Wols Lists 2018-01-02 20:20 ` [gentoo-user] " Kai Krakow 2018-01-02 19:44 ` Neil Bothwick 2 siblings, 2 replies; 40+ messages in thread From: Stroller @ 2018-01-02 19:26 UTC (permalink / raw To: gentoo-user > On 2 Jan 2018, at 11:54, Kruglov Sergey <kr_serge@hotmail.com> wrote: > > Now I have gentoo-sources-4.14.8-r1 installed. > After "emerge --ask --update --deep --with-bdeps=y --newuse @world" command emerge installs old kernel in NS (after first update 4.12.12, after second update 4.9.49-r1). > How can I fix it? > There is sys-kernel/gentoo-sources in my world set. Remove sys-kernel/gentoo-sources from your world file - I believe you can do this using the emerge command, but am unsure of the right syntax; you can just edit /var/lib/portage/world and delete the appropriate line.D Now `emerge -n =sys-kernel/gentoo-sources-4.14.8-r1` - "This option can be used to update the world file without rebuilding the packages." This pins your kernel version at 4.14.8-r1 and you can update when, in future, you decide it's time to update your kernel, without being nagged about it every time a new version is release or you emerge world. For this reason it's always best to emerge kernels with an equals sign, pinning them at some specific version, IMO. This suggestion may provoke responses that the kernel is important and you should update it to ensure you get security updates - look at the attack vectors, you're probably sitting behind a NAT router, with very few ports exposed to the internet. It's adequate to update your kernel every 3 months. Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-02 19:26 ` [gentoo-user] " Stroller @ 2018-01-02 19:47 ` Wols Lists 2018-01-03 21:39 ` Stroller 2018-01-02 20:20 ` [gentoo-user] " Kai Krakow 1 sibling, 1 reply; 40+ messages in thread From: Wols Lists @ 2018-01-02 19:47 UTC (permalink / raw To: gentoo-user On 02/01/18 19:26, Stroller wrote: > >> On 2 Jan 2018, at 11:54, Kruglov Sergey <kr_serge@hotmail.com> wrote: >> >> Now I have gentoo-sources-4.14.8-r1 installed. >> After "emerge --ask --update --deep --with-bdeps=y --newuse @world" command emerge installs old kernel in NS (after first update 4.12.12, after second update 4.9.49-r1). >> How can I fix it? >> There is sys-kernel/gentoo-sources in my world set. > > Remove sys-kernel/gentoo-sources from your world file - I believe you can do this using the emerge command, but am unsure of the right syntax; you can just edit /var/lib/portage/world and delete the appropriate line.D > > Now `emerge -n =sys-kernel/gentoo-sources-4.14.8-r1` - "This option can be used to update the world file without rebuilding the packages." > > This pins your kernel version at 4.14.8-r1 and you can update when, in future, you decide it's time to update your kernel, without being nagged about it every time a new version is release or you emerge world. > > For this reason it's always best to emerge kernels with an equals sign, pinning them at some specific version, IMO. > Why??? > This suggestion may provoke responses that the kernel is important and you should update it to ensure you get security updates - look at the attack vectors, you're probably sitting behind a NAT router, with very few ports exposed to the internet. > > It's adequate to update your kernel every 3 months. > You should also check the CVEs every time there's a new kernel! What this completely misses, is that gentoo-sources merely DOWNLOADS THE LATEST KERNEL SOURCE. So updating gentoo-sources every time does nothing to change the kernel you are running. Just leave gentoo-sources in your world file, and don't necessarily compile and update your running kernel just because gentoo-sources has had an update. I normally do not clean out kernels from my grub.conf until I've built up enough to be annoying, so downgrading a broken kernel is just a quick edit away ... Cheers, Wol ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-02 19:47 ` Wols Lists @ 2018-01-03 21:39 ` Stroller 2018-01-03 21:55 ` Wols Lists 0 siblings, 1 reply; 40+ messages in thread From: Stroller @ 2018-01-03 21:39 UTC (permalink / raw To: gentoo-user > On 2 Jan 2018, at 19:47, Wols Lists <antlists@youngman.org.uk> wrote: > > You should also check the CVEs every time there's a new kernel! Who the heck's got time for that? Really? I have a life, mate. And that means I have better things to do with my time. Translation of what you just said: you should buy a Mac, because Linux is so much work you have to check security bulletins all the time. > What this completely misses, is that gentoo-sources merely DOWNLOADS THE > LATEST KERNEL SOURCE. So updating gentoo-sources every time does nothing > to change the kernel you are running. I don't know why you think I missed that. If you `emerge gentoo-sources` then updates of them will appear every time you --pretend update world until you allow them to be emerged, hence my use of the word "nagged". If you want to install them, that's your prerogative, but just allowing them to be automatically emerged fills up your system with unwanted uncompressed kernel sources, consuming huge amounts of space. 20GB should be ample space for an operating system IMO, but between /usr/src and /usr/portage it's pretty easy to consume a quarter of that. I'm happy to do things your way if you're contributing to my hosting bill, but from the sounds of it this is about the way YOU choose to administer YOUR systems, and that you think I should be deferential to that. Do you not think, in my nearly 20 years of using *nix systems and reading *nix related mailing lists, I've never heard someone advocate these kind of security principles before? These kind of arguments are theoretical. In the real world, there are millions of people still running Windows XP and now-obsolete versions of Android on their phones. A kernel that's a few months old is hardly likely to hurt me. Stroller. D ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:39 ` Stroller @ 2018-01-03 21:55 ` Wols Lists 2018-01-03 22:02 ` Stroller 0 siblings, 1 reply; 40+ messages in thread From: Wols Lists @ 2018-01-03 21:55 UTC (permalink / raw To: gentoo-user On 03/01/18 21:39, Stroller wrote: >> What this completely misses, is that gentoo-sources merely DOWNLOADS THE >> > LATEST KERNEL SOURCE. So updating gentoo-sources every time does nothing >> > to change the kernel you are running. > I don't know why you think I missed that. Because you're banging on like downloading the source is the same thing as installing a new kernel - which it's not. > > If you `emerge gentoo-sources` then updates of them will appear every time you --pretend update world until you allow them to be emerged, hence my use of the word "nagged". > Which is why I just let them appear and clutter up /usr/src :-) > If you want to install them, that's your prerogative, but just allowing them to be automatically emerged fills up your system with unwanted uncompressed kernel sources, consuming huge amounts of space. > I take your point - you're paying for storage by the meg, and a quick du -sh tells me a kernel is approx 1G - ouch. But is the OP like you, or like me - about to upgrade from a home system that already has 6TB of storage ... > 20GB should be ample space for an operating system IMO, but between /usr/src and /usr/portage it's pretty easy to consume a quarter of that. I remember when it fitted on an 8" floppy :-) It was bad enough installing Slack from a 30-floppy set ... What would be nice, would be if "emerge --depclean" had the smarts to recognise that /usr/src/linux pointed to the current active kernel, and didn't wipe that when it cleaned out everything else :-) That way, at most you could have the current and latest kernel sources available pretty easily. Cheers, Wol ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:55 ` Wols Lists @ 2018-01-03 22:02 ` Stroller 2018-01-03 22:09 ` Alan McKinnon 2018-01-03 23:43 ` Neil Bothwick 0 siblings, 2 replies; 40+ messages in thread From: Stroller @ 2018-01-03 22:02 UTC (permalink / raw To: gentoo-user > On 3 Jan 2018, at 21:55, Wols Lists <antlists@youngman.org.uk> wrote: > > What would be nice, would be if "emerge --depclean" had the smarts to > recognise that /usr/src/linux pointed to the current active kernel, and > didn't wipe that when it cleaned out everything else :-) That way, at > most you could have the current and latest kernel sources available > pretty easily. You've jogged a long-hibernating memory - the accidental removal of the current sources tree in an accident like this may be the exact reason why I refuse to allow kernel versions to be actively emerged. Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:02 ` Stroller @ 2018-01-03 22:09 ` Alan McKinnon 2018-01-04 6:40 ` Wols Lists 2018-01-03 23:43 ` Neil Bothwick 1 sibling, 1 reply; 40+ messages in thread From: Alan McKinnon @ 2018-01-03 22:09 UTC (permalink / raw To: gentoo-user On 04/01/2018 00:02, Stroller wrote: > >> On 3 Jan 2018, at 21:55, Wols Lists <antlists@youngman.org.uk> wrote: >> >> What would be nice, would be if "emerge --depclean" had the smarts to >> recognise that /usr/src/linux pointed to the current active kernel, and >> didn't wipe that when it cleaned out everything else :-) That way, at >> most you could have the current and latest kernel sources available >> pretty easily. > > You've jogged a long-hibernating memory - the accidental removal of the current sources tree in an accident like this may be the exact reason why I refuse to allow kernel versions to be actively emerged. I think that's a mountain and a molehill. You still have the image in /boot, config in /boot or in the running kernel, libs in /lib/modules and the bootloader is intact. Delete the sources? - Re-emerge them. 90 seconds. - Re-compile using existing config. 20 minutes So deleting the sources for the running kernel is a doh! moment. But no biggie, and certainly not cause for changing your routine (all in my own not at all humble opinion, of course) -- Alan McKinnon alan.mckinnon@gmail.com ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:09 ` Alan McKinnon @ 2018-01-04 6:40 ` Wols Lists 2018-01-04 8:48 ` Alan McKinnon 0 siblings, 1 reply; 40+ messages in thread From: Wols Lists @ 2018-01-04 6:40 UTC (permalink / raw To: gentoo-user On 03/01/18 22:09, Alan McKinnon wrote: > On 04/01/2018 00:02, Stroller wrote: >> >>> On 3 Jan 2018, at 21:55, Wols Lists <antlists@youngman.org.uk> wrote: >>> >>> What would be nice, would be if "emerge --depclean" had the smarts to >>> recognise that /usr/src/linux pointed to the current active kernel, and >>> didn't wipe that when it cleaned out everything else :-) That way, at >>> most you could have the current and latest kernel sources available >>> pretty easily. >> >> You've jogged a long-hibernating memory - the accidental removal of the current sources tree in an accident like this may be the exact reason why I refuse to allow kernel versions to be actively emerged. > > I think that's a mountain and a molehill. You still have the image in > /boot, config in /boot or in the running kernel, libs in /lib/modules > and the bootloader is intact. > > Delete the sources? > - Re-emerge them. 90 seconds. > - Re-compile using existing config. 20 minutes > > So deleting the sources for the running kernel is a doh! moment. But no > biggie, and certainly not cause for changing your routine (all in my own > not at all humble opinion, of course) > But it's a royal pain, especially if you don't realise that's what's happened, because a general emerge is likely to have a lot of grief. Dunno how many ebuilds actually refer to /usr/src/linux for some of their header files, but I doubt it's negligible. It's certainly caused me grief in the past. (Yes I think they're not supposed to, but what's that saying about theory and practice?) I don't like it when well-known problems cause general breakage that is likely to cause havoc for unsuspecting users... Cheers, Wol ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-04 6:40 ` Wols Lists @ 2018-01-04 8:48 ` Alan McKinnon 0 siblings, 0 replies; 40+ messages in thread From: Alan McKinnon @ 2018-01-04 8:48 UTC (permalink / raw To: gentoo-user On 04/01/2018 08:40, Wols Lists wrote: > On 03/01/18 22:09, Alan McKinnon wrote: >> On 04/01/2018 00:02, Stroller wrote: >>> >>>> On 3 Jan 2018, at 21:55, Wols Lists <antlists@youngman.org.uk> wrote: >>>> >>>> What would be nice, would be if "emerge --depclean" had the smarts to >>>> recognise that /usr/src/linux pointed to the current active kernel, and >>>> didn't wipe that when it cleaned out everything else :-) That way, at >>>> most you could have the current and latest kernel sources available >>>> pretty easily. >>> >>> You've jogged a long-hibernating memory - the accidental removal of the current sources tree in an accident like this may be the exact reason why I refuse to allow kernel versions to be actively emerged. >> >> I think that's a mountain and a molehill. You still have the image in >> /boot, config in /boot or in the running kernel, libs in /lib/modules >> and the bootloader is intact. >> >> Delete the sources? >> - Re-emerge them. 90 seconds. >> - Re-compile using existing config. 20 minutes >> >> So deleting the sources for the running kernel is a doh! moment. But no >> biggie, and certainly not cause for changing your routine (all in my own >> not at all humble opinion, of course) >> > But it's a royal pain, especially if you don't realise that's what's > happened, because a general emerge is likely to have a lot of grief. Yes there is that > > Dunno how many ebuilds actually refer to /usr/src/linux for some of > their header files, but I doubt it's negligible. It's certainly caused > me grief in the past. It's a decidedly non-trivial number of ebuilds. On Gentoo /usr/src is a symlink to the *configured* kernel sources, on binary distros the same dir usually contains headers for the running kernel > (Yes I think they're not supposed to, but what's that saying about > theory and practice?) I don't know of any documentation in Gentoo that says ebuilds shouldn't do that but I can't think of any realistic alternatives. Gentoo needs access to the kernel config not just the sources and we can't rely on a config being present in /boot like binary distros can > > I don't like it when well-known problems cause general breakage that is > likely to cause havoc for unsuspecting users... Gentoo has always had a fallback excuse position for devs: By running Gentoo you give up all right to claiming to be an "unsuspecting user" Harsh I know, and sucky when it hits you, but it is what it is. Gentoo is not for the faint-hearted -- Alan McKinnon alan.mckinnon@gmail.com ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:02 ` Stroller 2018-01-03 22:09 ` Alan McKinnon @ 2018-01-03 23:43 ` Neil Bothwick 1 sibling, 0 replies; 40+ messages in thread From: Neil Bothwick @ 2018-01-03 23:43 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 442 bytes --] On Wed, 3 Jan 2018 22:02:37 +0000, Stroller wrote: > You've jogged a long-hibernating memory - the accidental removal of the > current sources tree in an accident like this may be the exact reason > why I refuse to allow kernel versions to be actively emerged. It's not a big deal, as Alan explained, but I use a set to prevent any kernel sources being depcleaned. -- Neil Bothwick Grow your own dope, plant a politician! [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-02 19:26 ` [gentoo-user] " Stroller 2018-01-02 19:47 ` Wols Lists @ 2018-01-02 20:20 ` Kai Krakow 2018-01-02 20:28 ` Rich Freeman 2018-01-03 21:21 ` [gentoo-user] " Stroller 1 sibling, 2 replies; 40+ messages in thread From: Kai Krakow @ 2018-01-02 20:20 UTC (permalink / raw To: gentoo-user Am Tue, 02 Jan 2018 19:26:44 +0000 schrieb Stroller: >> On 2 Jan 2018, at 11:54, Kruglov Sergey <kr_serge@hotmail.com> wrote: >> >> Now I have gentoo-sources-4.14.8-r1 installed. >> After "emerge --ask --update --deep --with-bdeps=y --newuse @world" >> command emerge installs old kernel in NS (after first update 4.12.12, >> after second update 4.9.49-r1). >> How can I fix it? >> There is sys-kernel/gentoo-sources in my world set. > > Remove sys-kernel/gentoo-sources from your world file - I believe you > can do this using the emerge command, but am unsure of the right syntax; > you can just edit /var/lib/portage/world and delete the appropriate > line.D It is "emerge --deselect ...". > Now `emerge -n =sys-kernel/gentoo-sources-4.14.8-r1` - "This option can > be used to update the world file without rebuilding the packages." I don't think this is how it works. While technically correct, the outcome is different to what you're trying to achieve. > This pins your kernel version at 4.14.8-r1 and you can update when, in > future, you decide it's time to update your kernel, without being nagged > about it every time a new version is release or you emerge world. The equal sign doesn't pin versions, at least not that I remember. Package are pinned by slot in the world file. Coincidence may be that the version you selected happens to be exclusively the only slot, too. If you intend to pin a package, either emerge by slot, or use package.mask and package.unmask. > For this reason it's always best to emerge kernels with an equals sign, > pinning them at some specific version, IMO. Makes no sense if my above answer is correct. > This suggestion may provoke responses that the kernel is important and > you should update it to ensure you get security updates - look at the > attack vectors, you're probably sitting behind a NAT router, with very > few ports exposed to the internet. The attack vector is probably not the network facing surface of the kernel... Which makes your argument misleading at best... It is more likely that your kernel is attacked by something you did from the browser, or by running a server on one of the "few ports exposed" which is vulnerable, and that is the attack vector: A local privilege escalation or buffer overflow allowing the attacker to gain control of a process, and only then attacking the kernel. This is why you first should keep your software updated and secured, and for the rest just stick to gentoo-sources stable. Keep in mind that gentoo-sources back-ports some security fixes early. Also stable uses LTS kernels mostly which have long-term security maintenance. > It's adequate to update your kernel every 3 months. It's adequate to update your password every 3 months. It's adequate to update your software every 3 months. Really? No... It's adequate to update your software when a security hole was fixed - on the point. Not two or three months later... It gives a false impression of safety if you recommend such things. Just my two cents... ;-) -- Regards, Kai Replies to list-only preferred. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-02 20:20 ` [gentoo-user] " Kai Krakow @ 2018-01-02 20:28 ` Rich Freeman 2018-01-02 22:58 ` Adam Carter 2018-01-03 21:21 ` [gentoo-user] " Stroller 1 sibling, 1 reply; 40+ messages in thread From: Rich Freeman @ 2018-01-02 20:28 UTC (permalink / raw To: gentoo-user On Tue, Jan 2, 2018 at 3:20 PM, Kai Krakow <hurikhan77@gmail.com> wrote: > > It's adequate to update your software when a security hole was fixed - on > the point. Not two or three months later... > And on that note I see that upstream just released 4.14.11 containing what is widely speculated as a fix for an Intel CPU security vulnerability. I noticed that it doesn't disable the performance-impacting setting on AMD CPUs. Though, right now only AMD could say whether this is necessary (their lkml post suggests it is not). This is an upstream release - I don't know when Gentoo plans to release it. I'm sure it will be making the rounds in the various news sites any day. -- Rich ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-02 20:28 ` Rich Freeman @ 2018-01-02 22:58 ` Adam Carter 2018-01-03 20:35 ` Wols Lists 0 siblings, 1 reply; 40+ messages in thread From: Adam Carter @ 2018-01-02 22:58 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1070 bytes --] > > And on that note I see that upstream just released 4.14.11 containing > what is widely speculated as a fix for an Intel CPU security > vulnerability. I noticed that it doesn't disable the > performance-impacting setting on AMD CPUs. Though, right now only AMD > could say whether this is necessary (their lkml post suggests it is > not). This is an upstream release - I don't know when Gentoo plans to > release it. I'm sure it will be making the rounds in the various news > sites any day. > https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ "The effects are still being benchmarked, however we're looking at a ballpark figure of five to 30 per cent slow down, depending on the task and the processor model. More recent Intel chips have features – specifically, PCID <http://forum.osdev.org/viewtopic.php?f=1&t=29935> – to reduce the performance hit." AMD coder's patch to disable the new code (to avoid the performance hit) where he states the issue doesnt exist on AMD processors; https://lkml.org/lkml/2017/12/27/2 [-- Attachment #2: Type: text/html, Size: 1824 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-02 22:58 ` Adam Carter @ 2018-01-03 20:35 ` Wols Lists 2018-01-03 20:53 ` Rich Freeman 0 siblings, 1 reply; 40+ messages in thread From: Wols Lists @ 2018-01-03 20:35 UTC (permalink / raw To: gentoo-user On 02/01/18 22:58, Adam Carter wrote: > AMD coder's patch to disable the new code (to avoid the performance hit) > where he states the issue doesnt exist on AMD processors; > https://lkml.org/lkml/2017/12/27/2 Read LWN, specifically the links to the people who covered the bug. It's a flaw in speculative forward processing, where the security does not travel with the speculative processing. So user code can trigger a page fault that references kernel code, causing that page to be retrieved. OOPPSSSS. AMD keeps security context with the code, causing an attempt to exploit the bug to fail with "invalid security context". And as I understand it the code can be disabled with either a compile time option or command line switch to the kernel. The relevant code is called KAISER, which forces kernel and user address space into different contexts, and causes a nasty context-switching overhead on both Intel and AMD cpus. Cheers, Wol ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-03 20:35 ` Wols Lists @ 2018-01-03 20:53 ` Rich Freeman 2018-01-03 21:50 ` Neil Bothwick 2018-01-04 16:02 ` Holger Hoffstätte 0 siblings, 2 replies; 40+ messages in thread From: Rich Freeman @ 2018-01-03 20:53 UTC (permalink / raw To: gentoo-user On Wed, Jan 3, 2018 at 3:35 PM, Wols Lists <antlists@youngman.org.uk> wrote: > > And as I understand it the code can be disabled with either a compile > time option or command line switch to the kernel. I suspect the compile-time option is PAGE_TABLE_ISOLATION (which was newly added in 4.14.11). The command line option nopti will disable it at runtime. Rumor has it that it will be disabled on AMD CPUs in 4.14.12, but I can't point to anywhere authoritative for that news so I'd consider it a rumor. I've also heard that Arch has deployed it early to 4.14.11, and I wouldn't be surprised if many distros do this if it is intended to go into the next stable, as there would be no point subjecting AMD users to performance issues. I haven't spoken to the Gentoo kernel team about what their plans are for it. In any case, nopti on the command line is probably the cleanest solution. I personally avoided disabling the feature in the compiled kernel because I don't want to be using the same config file on an Intel CPU in a year or two and forget I have it forced off. > The relevant code is > called KAISER, which forces kernel and user address space into different > contexts, and causes a nasty context-switching overhead on both Intel > and AMD cpus. > I believe the kernel went with "Page Table Isolation (PTI)" rather that KAISER, probably to avoid ethnic issues. Apparently this was deemed to have a more acceptable acronym than Forcefully Unmap Complete Kernel With Interrupt Trampolines. -- Rich ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-03 20:53 ` Rich Freeman @ 2018-01-03 21:50 ` Neil Bothwick 2018-01-04 16:02 ` Holger Hoffstätte 1 sibling, 0 replies; 40+ messages in thread From: Neil Bothwick @ 2018-01-03 21:50 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 456 bytes --] On Wed, 3 Jan 2018 15:53:07 -0500, Rich Freeman wrote: > I believe the kernel went with "Page Table Isolation (PTI)" rather > that KAISER, probably to avoid ethnic issues. Apparently this was > deemed to have a more acceptable acronym than Forcefully Unmap > Complete Kernel With Interrupt Trampolines. ROFL! -- Neil Bothwick Q: How many accountants does it take to screw in a light bulb? A: What kind of answer did you have in mind? [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-03 20:53 ` Rich Freeman 2018-01-03 21:50 ` Neil Bothwick @ 2018-01-04 16:02 ` Holger Hoffstätte 2018-01-04 16:10 ` Rich Freeman 1 sibling, 1 reply; 40+ messages in thread From: Holger Hoffstätte @ 2018-01-04 16:02 UTC (permalink / raw To: gentoo-user On Wed, 03 Jan 2018 15:53:07 -0500, Rich Freeman wrote: > On Wed, Jan 3, 2018 at 3:35 PM, Wols Lists <antlists@youngman.org.uk> wrote: >> >> And as I understand it the code can be disabled with either a compile >> time option or command line switch to the kernel. > > I suspect the compile-time option is PAGE_TABLE_ISOLATION (which was > newly added in 4.14.11). The command line option nopti will disable > it at runtime. > > Rumor has it that it will be disabled on AMD CPUs in 4.14.12, but I That's not a rumor and it can be easily verified either here: https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-4.14/x86-cpu-x86-pti-do-not-enable-pti-on-amd-processors.patch or in mainline git, respectively. -h ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-04 16:02 ` Holger Hoffstätte @ 2018-01-04 16:10 ` Rich Freeman 2018-01-05 2:12 ` Walter Dnes 0 siblings, 1 reply; 40+ messages in thread From: Rich Freeman @ 2018-01-04 16:10 UTC (permalink / raw To: gentoo-user On Thu, Jan 4, 2018 at 11:02 AM, Holger Hoffstätte <holger@applied-asynchrony.com> wrote: > On Wed, 03 Jan 2018 15:53:07 -0500, Rich Freeman wrote: > >> On Wed, Jan 3, 2018 at 3:35 PM, Wols Lists <antlists@youngman.org.uk> wrote: >>> >>> And as I understand it the code can be disabled with either a compile >>> time option or command line switch to the kernel. >> >> I suspect the compile-time option is PAGE_TABLE_ISOLATION (which was >> newly added in 4.14.11). The command line option nopti will disable >> it at runtime. >> >> Rumor has it that it will be disabled on AMD CPUs in 4.14.12, but I > > That's not a rumor and it can be easily verified either here: > > https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-4.14/x86-cpu-x86-pti-do-not-enable-pti-on-amd-processors.patch > > or in mainline git, respectively. > Not back when I made my post, as is evident from the timestamps. All the info around these vulnerabilities is rapidly evolving, so take anything you hear with some skepticism until the dust settles... -- Rich ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-04 16:10 ` Rich Freeman @ 2018-01-05 2:12 ` Walter Dnes 2018-01-05 2:25 ` Rich Freeman 0 siblings, 1 reply; 40+ messages in thread From: Walter Dnes @ 2018-01-05 2:12 UTC (permalink / raw To: gentoo-user On Thu, Jan 04, 2018 at 11:10:01AM -0500, Rich Freeman wrote > On Thu, Jan 4, 2018 at 11:02 AM, Holger Hoffstätte > <holger@applied-asynchrony.com> wrote: > > On Wed, 03 Jan 2018 15:53:07 -0500, Rich Freeman wrote: > > > >> On Wed, Jan 3, 2018 at 3:35 PM, Wols Lists <antlists@youngman.org.uk> wrote: > >>> > >>> And as I understand it the code can be disabled with either a compile > >>> time option or command line switch to the kernel. > >> > >> I suspect the compile-time option is PAGE_TABLE_ISOLATION (which was > >> newly added in 4.14.11). The command line option nopti will disable > >> it at runtime. > >> > >> Rumor has it that it will be disabled on AMD CPUs in 4.14.12, but I > > > > That's not a rumor and it can be easily verified either here: > > > > https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-4.14/x86-cpu-x86-pti-do-not-enable-pti-on-amd-processors.patch > > > > or in mainline git, respectively. > > > > Not back when I made my post, as is evident from the timestamps. > > All the info around these vulnerabilities is rapidly evolving, so take > anything you hear with some skepticism until the dust settles... There are 2 vulnerabities at play here, both caused by speculative execution... 1) "Meltdown" is the reading, by userland processes, of kernel memory. This includes stuff like passwords, ssh and gpg keys, and other similar sensitive stuff. Intel is vulnerable; AMD is not, thanks to AMD's ring-level permission checking. 2) "Spectre" is the reading, by one userland process, of memory belonging to another userland process. Since this does not require jumping to kernel privilege level, AMD's ring-level permission checking is not invoked, and AMD cpus are vulnerable. Think "cross-site-scripting on steroids", or "cross-process memory access" on your PC. The most obvious attack vector would be web assembler or java plugin or javascript, executing a 3rd-party ad in your browser. By the way, Adobe Flash is scripted by "Ecmascript", a variant of javascript. This is a problem that's associated with "speculative execution". I wonder how much of a performance hit it would be to turn off speculative execution. That would probably require at least a microcode/firmware update, if not a new cpu. -- Walter Dnes <waltdnes@waltdnes.org> I don't run "desktop environments"; I run useful applications ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-05 2:12 ` Walter Dnes @ 2018-01-05 2:25 ` Rich Freeman 2018-01-05 12:34 ` Walter Dnes 0 siblings, 1 reply; 40+ messages in thread From: Rich Freeman @ 2018-01-05 2:25 UTC (permalink / raw To: gentoo-user On Thu, Jan 4, 2018 at 9:12 PM, Walter Dnes <waltdnes@waltdnes.org> wrote: > > There are 2 vulnerabities at play here, both caused by speculative > execution... Actually, there are 3 related ones, with two names between them. Can't imagine why there is so much confusion... > 2) "Spectre" is the reading, by one userland process, of memory > belonging to another userland process. Since this does not require > jumping to kernel privilege level, AMD's ring-level permission checking > is not invoked, and AMD cpus are vulnerable. Think "cross-site-scripting > on steroids", or "cross-process memory access" on your PC. Spectre describes two variants. It can be used from userland to kernel, or between two userland processes. However, it doesn't require jumping priv levels - it is a side-channel leak. Variant 1 requires that code be executed in the context of the process being attacked. So, there isn't a cross-priv issue here - just a "skipped" bounds check. When the out-of-bounds memory is accessed the CPU sees that it is running in the correct priv level, which is probably why AMD is vulnerable. I'm a little hazy on variant 2, but I believe that this also requires execution in the target context. I suspect it doesn't run on AMD64 due to some details of how its CPUs actually work - it might not speculatively do an indirect call, or it might not get far enough into it to affect the cache. > This is a problem that's associated with "speculative execution". I > wonder how much of a performance hit it would be to turn off speculative > execution. That would probably require at least a microcode/firmware > update, if not a new cpu. Turning it off entirely would be a huge performance hit. However, Intel announced that they're going to add instructions to selectively turn it off, presumably so that compilers can use this in situations where Spectre is possible. That will require a microcode change. It sounds like there are also workarounds. For example, Intel suggests doing an lfence after a bounds check to defeat variant 1, and I've seen comments that suggest this works for some Intel users. It doesn't seem to work on my Phenom II or Ryzen 5. Go figure, Intel promoting an Intel-specific fix, though to be fair this is all rushed and they might not even realize it doesn't work on AMD, or maybe I'm doing it wrong. (My code is at: https://gist.github.com/rich0/056eebebc1f88a624e36680e0de36011 ). -- Rich ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-05 2:25 ` Rich Freeman @ 2018-01-05 12:34 ` Walter Dnes 2018-01-05 13:08 ` Rich Freeman 0 siblings, 1 reply; 40+ messages in thread From: Walter Dnes @ 2018-01-05 12:34 UTC (permalink / raw To: gentoo-user The most heavily exposed application will be your web browser. It runs various foreign code directly on your machine... * web assembler * java * javascript * ecmascript (part of Adobe Flash) I wonder if it's possible to compile a web browser with protection against the exploits, but turn it off for other apps. That would protect against external attacks, while not hurting local app speed. -- Walter Dnes <waltdnes@waltdnes.org> I don't run "desktop environments"; I run useful applications ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] Re: old kernels are installed during the upgrade 2018-01-05 12:34 ` Walter Dnes @ 2018-01-05 13:08 ` Rich Freeman 0 siblings, 0 replies; 40+ messages in thread From: Rich Freeman @ 2018-01-05 13:08 UTC (permalink / raw To: gentoo-user On Fri, Jan 5, 2018 at 7:34 AM, Walter Dnes <waltdnes@waltdnes.org> wrote: > > I wonder if it's possible to compile a web browser with protection > against the exploits, but turn it off for other apps. That would > protect against external attacks, while not hurting local app speed. > There are three exploits, all requiring different solutions. Only exploit 3 has a solution which impacts speed. Trying to fix exploit 3 in the browser seems dubious. You'd need to detect code patterns that could be trying to trigger the exploit before they're run, because the CPU itself isn't going to provide any protection here. Exploit 3 is the only exploit that doesn't require some kind of underlying vulnerability in a piece of software that is being attacked (in addition to the CPU vulnerability). Exploits 1/2 do require fixes in the browser already, but those don't significantly impact performance. Those fixes are also still being worked on. -- Rich ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-02 20:20 ` [gentoo-user] " Kai Krakow 2018-01-02 20:28 ` Rich Freeman @ 2018-01-03 21:21 ` Stroller 2018-01-03 21:31 ` Wols Lists ` (2 more replies) 1 sibling, 3 replies; 40+ messages in thread From: Stroller @ 2018-01-03 21:21 UTC (permalink / raw To: gentoo-user > On 2 Jan 2018, at 20:20, Kai Krakow <hurikhan77@gmail.com> wrote: > > >> Now `emerge -n =sys-kernel/gentoo-sources-4.14.8-r1` - "This option can >> be used to update the world file without rebuilding the packages." > > I don't think this is how it works. While technically correct, the > outcome is different to what you're trying to achieve. > > >> This pins your kernel version at 4.14.8-r1 and you can update when, in >> future, you decide it's time to update your kernel, without being nagged >> about it every time a new version is release or you emerge world. > > The equal sign doesn't pin versions, at least not that I remember. > Package are pinned by slot in the world file. Coincidence may be that the > version you selected happens to be exclusively the only slot, too. It installs exactly that version, and that exact version is recorded in the world file. $ grep -e source /var/lib/portage/world sys-kernel/gentoo-sources:4.9.34 $ > It's adequate to update your software when a security hole was fixed - on > the point. Not two or three months later... > > It gives a false impression of safety if you recommend such things. We could spend every day updating our systems - IDK about you, but I have better things to do. If the kernel devs cared to announce when they were patching exploits then we could take each one under consideration individually. But the kernel devs are secretive about kernel exploits, because they know there are literally millions of systems out there on the internet with kernels months and years old. You're right about the attack vectors, which is why I prioritise the apps and servers I run - an attacker has to get past those before it can exploit those. I updated OpenSSH and openssl the day I leaned of the HeartBleed attack for example. Meanwhile, I've seen security vulnerabilities go unfixed for literally weeks in the bug tracker, so I don't see the significance of a vulnerability an attacker is unlikely to be able to reach. The sites I visit do not make me fear my kernel being attacked via the browser. This thread is not for arguing about security, which is an old discussion and which has been done to death. Everyone has their own opinions, and I'm not going to add any more. This thread is about how to fix OP's problem, and that's what I addressed. If you install kernels by specific version, as I suggest, then you're free to update them manually as often as you wish. Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:21 ` [gentoo-user] " Stroller @ 2018-01-03 21:31 ` Wols Lists 2018-01-03 21:43 ` Stroller 2018-01-03 21:49 ` Dale 2018-01-03 21:48 ` Rich Freeman 2018-01-03 21:53 ` Neil Bothwick 2 siblings, 2 replies; 40+ messages in thread From: Wols Lists @ 2018-01-03 21:31 UTC (permalink / raw To: gentoo-user On 03/01/18 21:21, Stroller wrote: > Meanwhile, I've seen security vulnerabilities go unfixed for literally weeks in the bug tracker, so I don't see the significance of a vulnerability an attacker is unlikely to be able to reach. The sites I visit do not make me fear my kernel being attacked via the browser. > > This thread is not for arguing about security, which is an old discussion and which has been done to death. Everyone has their own opinions, and I'm not going to add any more. > > This thread is about how to fix OP's problem, and that's what I addressed. If you install kernels by specific version, as I suggest, then you're free to update them manually as often as you wish. And heaven help you if you think emerging a specific version of gentoo-sources will update the kernel you're running. Because Linux certainly won't. Hint: changing the current version of gentoo-sources does ABSOLUTELY NOTHING to your running system, so why not emerge them all? Cheers, Wol ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:31 ` Wols Lists @ 2018-01-03 21:43 ` Stroller 2018-01-03 21:49 ` Dale 1 sibling, 0 replies; 40+ messages in thread From: Stroller @ 2018-01-03 21:43 UTC (permalink / raw To: gentoo-user > On 3 Jan 2018, at 21:31, Wols Lists <antlists@youngman.org.uk> wrote: > > And heaven help you if you think emerging a specific version of > gentoo-sources will update the kernel you're running. Because Linux > certainly won't. Heaven help me? Could you possibly clarify, please? Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:31 ` Wols Lists 2018-01-03 21:43 ` Stroller @ 2018-01-03 21:49 ` Dale 1 sibling, 0 replies; 40+ messages in thread From: Dale @ 2018-01-03 21:49 UTC (permalink / raw To: gentoo-user Wols Lists wrote: > On 03/01/18 21:21, Stroller wrote: >> Meanwhile, I've seen security vulnerabilities go unfixed for literally weeks in the bug tracker, so I don't see the significance of a vulnerability an attacker is unlikely to be able to reach. The sites I visit do not make me fear my kernel being attacked via the browser. >> >> This thread is not for arguing about security, which is an old discussion and which has been done to death. Everyone has their own opinions, and I'm not going to add any more. >> >> This thread is about how to fix OP's problem, and that's what I addressed. If you install kernels by specific version, as I suggest, then you're free to update them manually as often as you wish. > And heaven help you if you think emerging a specific version of > gentoo-sources will update the kernel you're running. Because Linux > certainly won't. > > Hint: changing the current version of gentoo-sources does ABSOLUTELY > NOTHING to your running system, so why not emerge them all? > > Cheers, > Wol > > My question would be the opposite. Why emerge kernels you are not going to build anyway? The only kernels I have installed here are the ones I have emerged, built and installed for either current or future use. There is no reason to have sources for kernels that I know I will never use. The same could apply to others as well. Dale :-) :-) ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:21 ` [gentoo-user] " Stroller 2018-01-03 21:31 ` Wols Lists @ 2018-01-03 21:48 ` Rich Freeman 2018-01-03 21:53 ` Neil Bothwick 2 siblings, 0 replies; 40+ messages in thread From: Rich Freeman @ 2018-01-03 21:48 UTC (permalink / raw To: gentoo-user On Wed, Jan 3, 2018 at 4:21 PM, Stroller <stroller@stellar.eclipse.co.uk> wrote: > > If the kernel devs cared to announce when they were patching exploits then we could take each > one under consideration individually. But the kernel devs are secretive about kernel exploits, because > they know there are literally millions of systems out there on the internet with kernels months and years old. > I'm skeptical of that claim. I think it is more that they don't want to try to track which commits are associated with CVEs. I believe they've said as much publicly. They're not particularly secretive about exploits except when they're under embargo (such as at the present moment). -- Rich ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:21 ` [gentoo-user] " Stroller 2018-01-03 21:31 ` Wols Lists 2018-01-03 21:48 ` Rich Freeman @ 2018-01-03 21:53 ` Neil Bothwick 2018-01-03 22:07 ` Stroller 2 siblings, 1 reply; 40+ messages in thread From: Neil Bothwick @ 2018-01-03 21:53 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1067 bytes --] On Wed, 3 Jan 2018 21:21:30 +0000, Stroller wrote: > >> This pins your kernel version at 4.14.8-r1 and you can update when, > >> in future, you decide it's time to update your kernel, without being > >> nagged about it every time a new version is release or you emerge > >> world. > > > > The equal sign doesn't pin versions, at least not that I remember. > > Package are pinned by slot in the world file. Coincidence may be that > > the version you selected happens to be exclusively the only slot, > > too. > > It installs exactly that version, and that exact version is recorded in > the world file. > > $ grep -e source /var/lib/portage/world > sys-kernel/gentoo-sources:4.9.34 That's not a version, it's a slot. Whilst kernels are currently slotted with the version number, nothing else is and there is no guarantee that this will also hold for kernels. If you do want to use versions, I'd recommend using ~ rather than = to pick up patch-level updates. -- Neil Bothwick I backed up my hard drive and ran into a bus. [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 21:53 ` Neil Bothwick @ 2018-01-03 22:07 ` Stroller 2018-01-03 22:11 ` Alan McKinnon 2018-01-03 23:41 ` Neil Bothwick 0 siblings, 2 replies; 40+ messages in thread From: Stroller @ 2018-01-03 22:07 UTC (permalink / raw To: gentoo-user > On 3 Jan 2018, at 21:53, Neil Bothwick <neil@digimed.co.uk> wrote: >> >> It installs exactly that version, and that exact version is recorded in >> the world file. >> >> $ grep -e source /var/lib/portage/world >> sys-kernel/gentoo-sources:4.9.34 > > That's not a version, it's a slot. Whilst kernels are currently slotted > with the version number, nothing else is and there is no guarantee that > this will also hold for kernels. Fair enough, but there's nothing else I need to treat this way. I guess this risks that emerge will try to install 4.9.34-r1 during a future update, but I don't believe I've ever experienced that. > If you do want to use versions, I'd recommend using ~ rather than = to > pick up patch-level updates. What do you mean by this exactly, please? Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:07 ` Stroller @ 2018-01-03 22:11 ` Alan McKinnon 2018-01-03 22:41 ` Stroller 2018-01-03 23:41 ` Neil Bothwick 1 sibling, 1 reply; 40+ messages in thread From: Alan McKinnon @ 2018-01-03 22:11 UTC (permalink / raw To: gentoo-user On 04/01/2018 00:07, Stroller wrote: > >> On 3 Jan 2018, at 21:53, Neil Bothwick <neil@digimed.co.uk> wrote: >>> >>> It installs exactly that version, and that exact version is recorded in >>> the world file. >>> >>> $ grep -e source /var/lib/portage/world >>> sys-kernel/gentoo-sources:4.9.34 >> >> That's not a version, it's a slot. Whilst kernels are currently slotted >> with the version number, nothing else is and there is no guarantee that >> this will also hold for kernels. > > Fair enough, but there's nothing else I need to treat this way. > > I guess this risks that emerge will try to install 4.9.34-r1 during a future update, but I don't believe I've ever experienced that. Only if the highest-versioned emerged sources are <4.9.34-r1 > >> If you do want to use versions, I'd recommend using ~ rather than = to >> pick up patch-level updates. > > What do you mean by this exactly, please? =4.9.34 selects that exact version and only that specific version ~4.9.34 select that version and also 4.9.34-r1. There might need to be a * on the end of ~4.9.34, I don;t quite recall. Answer in portage's man pages -- Alan McKinnon alan.mckinnon@gmail.com ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:11 ` Alan McKinnon @ 2018-01-03 22:41 ` Stroller 2018-01-03 22:47 ` Alan McKinnon 2018-01-03 22:51 ` Herminio Hernandez, Jr. 0 siblings, 2 replies; 40+ messages in thread From: Stroller @ 2018-01-03 22:41 UTC (permalink / raw To: gentoo-user > On 3 Jan 2018, at 22:11, Alan McKinnon <alan.mckinnon@gmail.com> wrote: > >>>> >>>> $ grep -e source /var/lib/portage/world >>>> sys-kernel/gentoo-sources:4.9.34 >>> ... >> >> I guess this risks that emerge will try to install 4.9.34-r1 during a future update, but I don't believe I've ever experienced that. > > Only if the highest-versioned emerged sources are <4.9.34-r1 Yes, in the quoted example above I grepped my world file for sources and 4.9.34 is currently installed. >> >>> If you do want to use versions, I'd recommend using ~ rather than = to >>> pick up patch-level updates. >> >> What do you mean by this exactly, please? > > =4.9.34 selects that exact version and only that specific version > ~4.9.34 select that version and also 4.9.34-r1. There might need to be a > * on the end of ~4.9.34, I don;t quite recall. Answer in portage's man pages I thought it was something like that, but searched `man portage` for "~" more than one way, and didn't find reference to this. Am I blind? Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:41 ` Stroller @ 2018-01-03 22:47 ` Alan McKinnon 2018-01-04 2:18 ` Stroller 2018-01-03 22:51 ` Herminio Hernandez, Jr. 1 sibling, 1 reply; 40+ messages in thread From: Alan McKinnon @ 2018-01-03 22:47 UTC (permalink / raw To: gentoo-user On 04/01/2018 00:41, Stroller wrote: > >> On 3 Jan 2018, at 22:11, Alan McKinnon <alan.mckinnon@gmail.com> wrote: >> >>>>> >>>>> $ grep -e source /var/lib/portage/world >>>>> sys-kernel/gentoo-sources:4.9.34 >>>> ... >>> >>> I guess this risks that emerge will try to install 4.9.34-r1 during a future update, but I don't believe I've ever experienced that. >> >> Only if the highest-versioned emerged sources are <4.9.34-r1 > > Yes, in the quoted example above I grepped my world file for sources and 4.9.34 is currently installed. > >>> >>>> If you do want to use versions, I'd recommend using ~ rather than = to >>>> pick up patch-level updates. >>> >>> What do you mean by this exactly, please? >> >> =4.9.34 selects that exact version and only that specific version >> ~4.9.34 select that version and also 4.9.34-r1. There might need to be a >> * on the end of ~4.9.34, I don;t quite recall. Answer in portage's man pages > > I thought it was something like that, but searched `man portage` for "~" more than one way, and didn't find reference to this. Am I blind? man 5 ebuild Section "Extended Atom Prefixes", it is near the top, probably first page on most screen sizes. The location is very non-obvious, I only know of it because I refr to it often once I found it -- Alan McKinnon alan.mckinnon@gmail.com ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:47 ` Alan McKinnon @ 2018-01-04 2:18 ` Stroller 0 siblings, 0 replies; 40+ messages in thread From: Stroller @ 2018-01-04 2:18 UTC (permalink / raw To: gentoo-user > On 3 Jan 2018, at 22:47, Alan McKinnon <alan.mckinnon@gmail.com> wrote: > >>>> >>>> What do you mean by this exactly, please? >>> >>> =4.9.34 selects that exact version and only that specific version >>> ~4.9.34 select that version and also 4.9.34-r1. There might need to be a >>> * on the end of ~4.9.34, I don;t quite recall. Answer in portage's man pages >> >> I thought it was something like that, but searched `man portage` for "~" more than one way, and didn't find reference to this. Am I blind? > > man 5 ebuild > > Section "Extended Atom Prefixes", it is near the top, probably first > page on most screen sizes. > > The location is very non-obvious, I only know of it because I refr to it > often once I found it The ability to block atoms looks interesting, although I can't think when I'd use it. Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:41 ` Stroller 2018-01-03 22:47 ` Alan McKinnon @ 2018-01-03 22:51 ` Herminio Hernandez, Jr. 1 sibling, 0 replies; 40+ messages in thread From: Herminio Hernandez, Jr. @ 2018-01-03 22:51 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 1257 bytes --] I found this helpful in managing kernel versions https://www.youtube.com/watch?v=UwvV2wf-Gk0 On Wed, Jan 3, 2018 at 3:41 PM, Stroller <stroller@stellar.eclipse.co.uk> wrote: > > > On 3 Jan 2018, at 22:11, Alan McKinnon <alan.mckinnon@gmail.com> wrote: > > > >>>> > >>>> $ grep -e source /var/lib/portage/world > >>>> sys-kernel/gentoo-sources:4.9.34 > >>> ... > >> > >> I guess this risks that emerge will try to install 4.9.34-r1 during a > future update, but I don't believe I've ever experienced that. > > > > Only if the highest-versioned emerged sources are <4.9.34-r1 > > Yes, in the quoted example above I grepped my world file for sources and > 4.9.34 is currently installed. > > >> > >>> If you do want to use versions, I'd recommend using ~ rather than = to > >>> pick up patch-level updates. > >> > >> What do you mean by this exactly, please? > > > > =4.9.34 selects that exact version and only that specific version > > ~4.9.34 select that version and also 4.9.34-r1. There might need to be a > > * on the end of ~4.9.34, I don;t quite recall. Answer in portage's man > pages > > I thought it was something like that, but searched `man portage` for "~" > more than one way, and didn't find reference to this. Am I blind? > > Stroller. > > > [-- Attachment #2: Type: text/html, Size: 2061 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 22:07 ` Stroller 2018-01-03 22:11 ` Alan McKinnon @ 2018-01-03 23:41 ` Neil Bothwick 2018-01-04 2:20 ` Stroller 1 sibling, 1 reply; 40+ messages in thread From: Neil Bothwick @ 2018-01-03 23:41 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 476 bytes --] On Wed, 3 Jan 2018 22:07:22 +0000, Stroller wrote: > > If you do want to use versions, I'd recommend using ~ rather than = to > > pick up patch-level updates. > > What do you mean by this exactly, please? If you have =foo-1.0 matches only foo-1.0, if a patched version is released as foo-1.0-r1, you won't get it. With ~foo-1.0 you will. Neither will match foo-1.1 It's all in man portage. -- Neil Bothwick Only an idiot actually READS taglines. [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-03 23:41 ` Neil Bothwick @ 2018-01-04 2:20 ` Stroller 0 siblings, 0 replies; 40+ messages in thread From: Stroller @ 2018-01-04 2:20 UTC (permalink / raw To: gentoo-user > On 3 Jan 2018, at 23:41, Neil Bothwick <neil@digimed.co.uk> wrote: > > On Wed, 3 Jan 2018 22:07:22 +0000, Stroller wrote: > >>> If you do want to use versions, I'd recommend using ~ rather than = to >>> pick up patch-level updates. >> >> What do you mean by this exactly, please? > > If you have =foo-1.0 matches only foo-1.0, if a patched version is > released as foo-1.0-r1, you won't get it. With ~foo-1.0 you will. > > Neither will match foo-1.1 I would have guessed "~" means "approximate", but this is what I don't want. If I want to recompile my kernel I'll choose the latest version and download the full sources. Stroller. ^ permalink raw reply [flat|nested] 40+ messages in thread
* Re: [gentoo-user] old kernels are installed during the upgrade 2018-01-02 11:54 [gentoo-user] old kernels are installed during the upgrade Kruglov Sergey 2018-01-02 12:03 ` Alexander Kapshuk 2018-01-02 19:26 ` [gentoo-user] " Stroller @ 2018-01-02 19:44 ` Neil Bothwick 2 siblings, 0 replies; 40+ messages in thread From: Neil Bothwick @ 2018-01-02 19:44 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 604 bytes --] On Tue, 2 Jan 2018 11:54:50 +0000, Kruglov Sergey wrote: > Now I have gentoo-sources-4.14.8-r1 installed. > > After "emerge --ask --update --deep --with-bdeps=y --newuse @world" > command emerge installs old kernel in NS (after first update 4.12.12, > after second update 4.9.49-r1). How can I fix it? There is > sys-kernel/gentoo-sources in my world set. It's been keyworded because of issues discussed previously. Simply add "=sys-kernel/gentoo-sources-4.14.8-r1" (or .10-r1) to /etc/portage/package.accept_keywords. -- Neil Bothwick Plagarism prohibited. Derive carefully. [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 833 bytes --] ^ permalink raw reply [flat|nested] 40+ messages in thread
end of thread, other threads:[~2018-01-05 13:08 UTC | newest] Thread overview: 40+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2018-01-02 11:54 [gentoo-user] old kernels are installed during the upgrade Kruglov Sergey 2018-01-02 12:03 ` Alexander Kapshuk 2018-01-02 12:42 ` Mick 2018-01-02 15:59 ` [gentoo-user] " Nikos Chantziaras 2018-01-02 19:26 ` [gentoo-user] " Stroller 2018-01-02 19:47 ` Wols Lists 2018-01-03 21:39 ` Stroller 2018-01-03 21:55 ` Wols Lists 2018-01-03 22:02 ` Stroller 2018-01-03 22:09 ` Alan McKinnon 2018-01-04 6:40 ` Wols Lists 2018-01-04 8:48 ` Alan McKinnon 2018-01-03 23:43 ` Neil Bothwick 2018-01-02 20:20 ` [gentoo-user] " Kai Krakow 2018-01-02 20:28 ` Rich Freeman 2018-01-02 22:58 ` Adam Carter 2018-01-03 20:35 ` Wols Lists 2018-01-03 20:53 ` Rich Freeman 2018-01-03 21:50 ` Neil Bothwick 2018-01-04 16:02 ` Holger Hoffstätte 2018-01-04 16:10 ` Rich Freeman 2018-01-05 2:12 ` Walter Dnes 2018-01-05 2:25 ` Rich Freeman 2018-01-05 12:34 ` Walter Dnes 2018-01-05 13:08 ` Rich Freeman 2018-01-03 21:21 ` [gentoo-user] " Stroller 2018-01-03 21:31 ` Wols Lists 2018-01-03 21:43 ` Stroller 2018-01-03 21:49 ` Dale 2018-01-03 21:48 ` Rich Freeman 2018-01-03 21:53 ` Neil Bothwick 2018-01-03 22:07 ` Stroller 2018-01-03 22:11 ` Alan McKinnon 2018-01-03 22:41 ` Stroller 2018-01-03 22:47 ` Alan McKinnon 2018-01-04 2:18 ` Stroller 2018-01-03 22:51 ` Herminio Hernandez, Jr. 2018-01-03 23:41 ` Neil Bothwick 2018-01-04 2:20 ` Stroller 2018-01-02 19:44 ` Neil Bothwick
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox