We currently use the Ubuntu kernel sources, available from:
- http://kernel.ubuntu.com/git/ubuntu/ubuntu-vivid.git
-
+ http://kernel.ubuntu.com/git/ubuntu/ubuntu-xenial.git/
+
+Ubuntu will maintain those kernels till:
+
+ https://wiki.ubuntu.com/Kernel/Dev/ExtendedStable
+
Additional/Updated Modules:
---------------------------
-- include latest ixgbe driver from intel/sourceforge
+- include latest e1000e driver from intel/sourceforge
-- include latest igb driver from intel/sourceforge
+- include latest ixgbe driver from intel/sourceforge
-- include latest HPSA driver (HP Smart Array)
+ - include latest igb driver from intel/sourceforge
- * http://sourceforge.net/projects/cciss/
+# Note: hpsa does not compile with kernel 3.19.8
+#- include latest HPSA driver (HP Smart Array)
+#
+# * http://sourceforge.net/projects/cciss/
- include native OpenZFS filesystem kernel modules for Linux
of bridge device, then address won't change. So we could omit
that patch, requiring to set hwaddress in /etc/network/interfaces.
+Watchdog blacklist
+------------------
+
+By default, all watchdog modules are black-listed because it is totally undefined
+which device is actually used for /dev/watchdog.
+We ship this list in /lib/modprobe.d/blacklist_pve-kernel-<VERSION>.conf
+The user typically edit /etc/modules to enable a specific watchdog device.
Additional information
----------------------
- enable CONFIG_CEPH_FS=m (request from user)
- enable common CONFIG_BLK_DEV_XXX to avoid hardware detection
- problems (udev, undate-initramfs hav serious problems without that)
+ problems (udev, undate-initramfs have serious problems without that)
CONFIG_BLK_DEV_SD=y
CONFIG_BLK_DEV_SR=y
CONFIG_BLK_DEV_DM=y
+- add workaround for Debian bug #807000 (see
+ https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807000)
+
+ CONFIG_BLK_DEV_NVME=y
+
- compile NBD and RBD modules
CONFIG_BLK_DEV_NBD=m
CONFIG_BLK_DEV_RBD=m
This is the suggested setting for KVM. We also measure bad fsync
performance with ext4 and cfq.
+- disable CONFIG_INPUT_EVBUG
+
+ Module evbug is not blacklisted on debian, so we simply disable it
+ to avoid key-event logs (which is a big security problem)
+
Testing final kernel with kvm
-----------------------------