KernelMaintenance
ContentsBRTableOfContents |
This document is geared towards gutsy and later releases. For feisty, please see KernelMaintenanceFeisty.
This is meant as a reference for the kernel team.
Getting the source
Ubuntu kernel source is available via git. More information can be obtained from KernelGitGuide.
Build system breakdown
This requires some knowledge of the Debian build system (including the debian/rules file, etc). The gutsy build system was rewritten from the ground up, to mainly exclude kernel-package as a built tool, since it was getting too heavy and restrictive for our needs. We still use kernel-wedge for udeb creation.
Flavours
Flavours are how we define different types of kernels on the same architecture. Each flavour can be targeted to a specific CPU, or provide some functionality for a specific purpose.
For example, the amd64 (x86_64) architecture has these flavours:
- generic - The default install kernel.
- server - Optimized for server installations.
When building on the amd64 architecture, these are the kernels that are built. In reality, they only differ in slight variations of kernel config options.
Configs
Each flavour is built using a pre-defined configuration file (used by the kernel build system). Each architecture contains it's config files in debian/config/<arch>/. The files are split for each flavour in debian/config/<arch>/config.<flavour>, and common options are shared in debian/config/<arch>/config.
When the kernels are built, the common and flavour specific config files are concatenated together in the build directory.
debian/control
The debian/control file is generated from debian/control.stub by the kernel-wedge command.
The debian/control.stub file is generated from debian/control.stub.in by a debian/rules target. This is populated by files defining the flavours in debian/control.d/vars.*.
The vars files define package descriptions for each flavour.
debian/changelog
The changelog file is where we track all changes made to the repository. This is a standard debian/changelog. However, changes are not added to it manually. Instead, it is done automatically at release time using git-log. See below for process.
ABI
The ABI is probably one of the most important features of the build system. In the kernel package naming, the ABI is the numerical component immediately following the kernel version. E.g.
2.6.22-4-generic
The ABI in the above example is 4. The ABI is represented in the debian/changelog as:
linux-source-2.6.20 (2.6.22-4.10) feisty; urgency=low
The minor version after the ABI is an ever increasing revision. It basically denotes how many uploads have been made for this kernel version.
The kernel ABI is derived from the Modules.symver file produced during the kernel build. Each exported function is given a hash defining the function's arguments and return value, making it easy to detect changes which can break modules built against the kernel (such as our own linux-restricted-modules package).
The ABI files for the previous build are located in debian/abi/<prev-rev>/. The layout is similar to the debian/config/ directory in that each architecture is a subdirectory, and each flavour is a file with the ABI for that flavour in it.
When the kernel build process finishes, it checks each flavour against the prev ABI. If the previous and current ABI's are the same version (e.g. 6), and the ABI has changed, the build will fail. This signifies that an ABI bump is needed (see below).
As of now, a single ABI change in any flavour results in an ABI bump for the entire build. There is no per-flavour or per-architecture ABI number. This is for sanity reasons.
Module lists
Module lists are tracked similarly to the ABI, and are kept in debian/abi/<prev-ver>/<arch>/<flavour>.modules. The file is a basename sorted list, sans .ko extension, of all the modules in a particular flavour. This is checked regardless of ABI, since it's meant to track release-to-release to avoid modules going missing by mistake.
The ABI check will honor debian/abi/<prev-ver>/<arch>/ignore to ignore an entire architecture, or debian/abi/<pre-ver>/<arch>/<flavour>.ignore for a specific kernel flavour. This is useful for architectures that failed to build the last ABI. The module check will honor a list of modules in
This section describes all the steps involved in a common development cycle. That is, the cycles from one upload (release) of the Ubuntu kernel to the next.
To start a new release, you need to download the ABI and module files from the previous release. To do this, use: In the above example, This will download all the previous deb's, and extract the ABI files, and module lists. You may find it easier to do this from a DC machine where the archive is closer (downloading all the kernel deb's is a bandwidth eater).
Immediately after an upload you should run: This will generate a new
Now you can rebase your tree, pull from other branches or apply patches that are going into this update.
As new drivers are added and merges are done with upstream, it becomes necessary to update our configs in This runs silentoldconfig for all flavours, so if any possible config options are unanswered, it will ask you. Alternatively, if you know of a new config option, you can alleviate answering the same question for it on all flavours by appending it to the Once the configs are updated, you simply commit the new changes: If there are lots of changes to the config, it is better to let updateconfig split it for you into common and flavour-specific configs as follows:
Now build the kernel for all archs and flavours
If the build fails because of the ABI checker, this is a sign that the ABI needs to be bumped. If it becomes necessary to increase the ABI, you simply need to edit This will regenerate all of the control files with the appropriate ABI. For example, if the current changelog looks like: And an ABI bump is required, you would change the above line to look like: If an ABI bump is required for the kernel, it is also required for L-U-M and L-R-M git repositories.
In You would use these files in this way: Always commit using The primary one you will use is the
During an Ubuntu development cycles, the kernel is constantly synced against upstream Linux GIT head. This involves merging conflicts, possibly deprecating local patches, and performing test builds. For stable releases, we cherry pick and sometimes outright sync to the 2.6.x.y GIT tree for that particular release. During development cycle, when we are following upstream git very closely, we will use git-rebase to stay synced to upstream. Once upstream version has been released, we no longer rebase. This may cause times where you need to force a GIT pull (because the master of our tree is now rebased).
In prior releases, third party drivers were kept as part of the main kernel tree in the ubuntu/ directory. This has changed in gutsy. Third party drivers are now separate, and in the linux-ubuntu-modules package. This package is available in GIT as well.
Once the tree is ready for upload, follow these steps to complete the package for uploading: Run It may also be a good idea to run Tag the release. The -m option is the message for the tag commit, and matches the actual tag name. or to build _with_ source use: Upload using whatever tools you wish ( It should be noted that for development releases, a new tarball is generated at each upload. However at release time, a .orig.tar.gz is used, which is based on the upstream tarball of the released kernel we are using.
The kernel team should push changes to our repo (see KernelGitGuide for public repo). To make this easy, you can setup a script called For normal pushes, just call the script, but if you need to push a tag, add the tag to the command line, e.g.: NOTE: Each release tree is someone's responsibility. If it's not yours, it's probably best to email patches to kernel-team@lists.ubuntu.com rather than committing yourself.
On occasion, security patches are applied to stable kernels. For these kernels, you will set the archive in The security team generally provides patches in the form of CVE's, with GIT SHA URL's to an upstream patch that fixes the problem. We usually use will fetch from the upstream GIT repo, and The easiest way to fetch the remote repo's objects is to create a remote file such as Then to pull the objects, and cherry pick an SHA, do this: The -e option will bring up an editor to add any Ubuntu related info to the commit (perhaps a bug number, or maybe even add the CVE number). The -x will keep the original GIT SHA in the commit message to track where it came from. Security uploads should be build tested prior to upload (this is the case for any upload, but especially so for security and proposed updates). You and one other person should boot test the resulting kernel. If possible (especially for critical code paths), attempt to reproduce the bug via supplied reproducers (usually from the security team) to verify it actually fixes the bug. Make sure that there are no regressions as well. After upload, notify the security team that you have made the upload and include a copy of the changelog.
A set of scripts to help farm out builds across all supported architectures is described in https://wiki.ubuntu.com/KernelTeam/KernelBuildScripts
Aside from the standard You can add -jX as needed. One other helpful tool for a developer is to install the
To test normal package building, one can use this command from the kernel git repo: This will build every kernel flavour.
You can also do single or multiple specific flavours during the build, using this syntax: So you can change to get the architecture independent headers package. LUM builds are done using: where flavour = generic, ume, rt, xen, etc.
There are several build options, in the form of environment variables and make variables. Make options are passed on the CONCURRENCY_LEVEL=X where X is a number to pass using AUTOBUILD - (can be passed to make as well). Tells the build to create a non-official package with generated ABI. Used for daily builds of the kernel. skipabi=true - Used for test only, causes the build to skip the ABI consistency check. skipmodule=true - Same as above, but for the module check. NOKERNLOG - Used for the insertchanges or printchanges target. Causes git-ubuntu-log to not include upstream kernel changes in changelog output. PRINTSHAS - Include GIT SHAs in printchanges and insertchanges targets. E.g. When trying to avoid "previous or current ABI file missing" and not wanting to do an ABI-bump:
There are several things to do after an upload. These depend greatly on what the upload involved. Usually, for a non-ABI changing upload, you do not need to do anything further. However, for an ABI changing upload, packages need to be rebuilt against the linux-headers. Note that these packages have a extra version who's major matches the ABI of the kernel it is being built against.
This package contains modules that are proprietary. They are distributed separately so that it is easy for users to not have to use them. For an ABI bump, edit Can someone please put up a bit of info on how to get this package from git (and re-build the package), the way KernelGitGuide does? The same for linux-ubuntu-modules. --BogdanButnaru apt-get source linux-restricted-modules-VERSION then look for the Edit: linux-ubuntu-modules are (as far as I can tell) built exactly the same as the kernel, but using git clone git://kernel.ubuntu.com/ubuntu/ubuntu-gutsy-lum.git ubuntu-gutsy-lum for getting the sources, and fakeroot debian/rules binary-modules-generic for building the package. I'm not sure about linux-restricted-modules; it's not in git, is it? --BogdanButnaru
This package is based on the linux-source build system, so shares the same intricacies. Setting the ABI is the same as in linux-source (via
The linux-meta package provides meta packages for easier user upgrades. Because our kernel packages are named with full ABI and flavour, users normally would have to manually upgrade to a new kernel (if it had an ABI bump). The meta packages always point to the latest kernel, so if users install these packages (and they are installed by default on new systems), then upgrades will always pull in everything they need to be current. For an ABI bump, edit
This package is usually empty during development. It is meant for post-release updates of new drivers. It is packages separately from the kernel so that it is easier to provide sometimes untested drivers for new hardware on a stable release. Users do not have this package installed by default. This package is based heavily on
We have some differing processes for different types of uploads. Described here for the sanity challenged.
No differences for this. Uploading to main (the current development release) is the primary target for work.
Technically known as Typical changes in this tree are new drivers, and large updates to support new hardware. The GIT tree is named See the KernelUpdates page for more information.
This is self explanatory, or so it would seem. While the Development cycle
Updating ABI and modules lists
bash debian/scripts/misc/getabis 2.6.22 4.10
Starting a new release
debian/rules startnewrelease
Add new code
Updating configs(optional)
debian/rules updateconfigs
git-update-index debian/config/*/*
git-commit -s -F debian/commit-templates/update-configs
cd <kerneldir>/debian/config/<arch>
cp <path>/<whole-config-for-flavour> config.<flavour>
for cfg in config.*; do
cat config >> $cfg
done
rm config
cd <kerneldir>
debian/rules updateconfigs
Build
Bumping the ABI
debian/rules debian/control.stub
linux-source-2.6.22 (2.6.22-4.11) gutsy; urgency=low
linux-source-2.6.22 (2.6.22-5.11) gutsy; urgency=low
Commit templates
git-commit -s -F debian/commit-templates/<template> -e
Upstream syncing
Third party drivers
Preparing an upload
git-status to be sure you have no outstanding commits, or extraneous files in your local tree. debian/rules insertchanges
<open debian/changelog in an editor to verify release and date>
git-update-index debian/changelog
git-commit -s -F debian/commit-templates/update-configs
git-tag -s -m Ubuntu-2.6.20-6.11 Ubuntu-2.6.20-6.11
dpkg-buildpackage -S -rfakeroot -I.git -I.gitignore -i'\.git.*'
dupload for example). dpkg-buildpackage -S -rfakeroot -I.git -I.gitignore -i'\.git.*' -sa
Pushing to our repo
branches="master"
remotes="zinc.ubuntu.com:/srv/kernel.ubuntu.com/git/ubuntu/ubuntu-gutsy.git"
cd /path/to/your/repo
for repo in $remotes; do
echo "Pushing to: $repo"
git-send-pack $repo $branches $@
echo
done
push-gutsy Ubuntu-2.6.22-4.10
Security and Proposed Updates
URL: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-2.6.20.y.git
Pull: master:upstream-linux-2.6.20
git-fetch upstream-linux-2.6.20
git-cherry-pick -e -x aa1812b3e344dbb2c7f30e1b95661cbd36d0cd2b
Performing builds
Grab the Pre-requisite Tools
$ sudo apt-get install linux-kernel-devel devscripts fakeroot libncurses5-dev ccache
Pre-upload test builds
Quick builds
$ cd ubuntu-gutsy
$ mkdir ../build
$ cat debian/config/i386/config{,.generic} > ../build/.config
$ make O=`pwd`/../build oldconfig
$ make O=`pwd`/../build
Normal full build
fakeroot debian/rules binary-arch
Partial build
fakeroot debian/rules binary-generic
fakeroot debian/rules binary-headers
fakeroot debian/rules binary-modules-<flavour>
Build options
make's -j option. CONCURRENCY_LEVEL=8 fakeroot debian/rules binary-generic binary-headers skipabi=true skipmodule=true
Post upload
linux-restricted-modules
linux-ubuntu-modules
linux-meta
linux-backports-modules
main, proposed and security, OH MY!
main
proposed
security