=== mamarley is now known as Guest22518 === mamarley_ is now known as mamarley === yofel_ is now known as yofel [13:40] cyphermox, should be all the UEFI kernels you need in ppa:canonical-kernel-team/unstable [13:41] ack === adrian is now known as alvesadrian_ === alvesadrian is now known as adrian === alvesadrian_ is now known as alvesadrian [18:22] hey - apparently during the previous decade quite a few people were doing kernel modules to help find/blacklist bad memory. Did anything become 'standard' in the ubuntu kernel? [18:22] (i.e. badmem, badram, memmap, etc) [18:34] Q1 - Is there a slack channel for Ubuntu kernel dev? [18:35] i hope not [18:35] Q2. I'm having a hard time on the ubuntu pages pulling out the simple change log between 3.19.0-25-generic #26~14.04.1 & 3.19.0-33-generic #38~14.04.1 [18:36] We have a kernel feature (tc qdisc) that failed on the 0-25 but work on the -33 and are trying to figure out why [18:36] So my first thought was to see if anything was checked in the kernel between those versions [18:36] but I'm struggling to find summary/announce page with the changes. [18:39] and patches accepted on here http://patchwork.ozlabs.org/project/ubuntu-kernel/list/? stop at 2011 [18:41] blue_coon, you probabally want to look at the git repository respresnting the release [18:47] apw: haven't tried git yet [18:47] blue_coon, otherwise any discussion would be on the kernel-team@ list [18:48] and in its archives, though the git repo is more easily understood relative to release tags [18:49] any pointers to the git that would refer to the kernel with the naming I see? is 3.19.0-25 a branch somewhere? [18:50] Just searched for kernel and came up with a bunch of kernel gits on ubuntu git server [18:51] blue_coon, which release are you looking for kernls for [18:54] 14.04.1 [18:54] This is from uname on both of them: 3.19.0-25-generic #26~14.04.1 & 3.19.0-33-generic #38~14.04.1 [18:56] So i intepret that as linux kernel 3.19 the generic config on ubuntu 14.04.1. Not entirely sure what the #26 #38 refer to [18:58] blue_coon, you can decode a tag from thoe version numbers, e.g., Ubuntu-3.19.0-25.26 and Ubuntu-3.19.0-33.38 [18:58] so that then is the lts kernel [18:58] as well as find them in the commit subject [18:58] and is in the trusty repository [18:58] so ubuntu/ubuntu-trusty.git [18:59] Got it. Thx. [18:59] apw: do you know whatever happened to the 'badram' kernel patch? [19:00] hallyn, i do not recall that patch no [19:00] drat [19:00] hallyn, I have vague memories of that patch. What is the last kernel in which it appeared ? [19:01] rtg: sigh it's even older thani was thinking - http://www.linuxjournal.com/article/4489?page=0,1 2001 apparently [19:01] i'm just looking for something to lock out the bad ram until a new dimm or laptop magically arrives [19:02] wow, that is kind of a hack [19:02] :) [19:02] a useful hack [19:03] hallyn, some arches let you say what regions of ram you do have, rather than just a size, not sure if that applied to i386 [19:03] hallyn: Nothing ever went mainline, but I believe you can pass a kernel command line that excludes a range [19:04] hallyn: Ah yeah you can do it with memmap [19:05] hallyn: memmap=1M$0xdeadbeef will reserve a megabyte at that address [19:11] mjg59: thanks, yeah, i saw a few mentoins of that, wasn't sure (haven't rebooted yet) whether that was mainline or also old, since all mentions are circa 2008 :) [19:12] the constant segvs have my mind a bit rattled, so trying to make sense of the memtester reviews :) [19:12] uh, s/reviews/output/ [19:21] well the values reported by memtester change every time [19:43] rtg: the ppa will be missing the linux-meta-lts* packages too I think, since those probably need updating so upgrades work correctly. [19:43] There is no frustration greater than bad memory [19:46] cyphermox, you can't just install kernels by hand ? as soon as I upload a meta package they'll be out of date as the SRU cadence rolls forward [19:55] of course we can install by hand, but like I said if you want to make sure everything works, you can't just install by hand, you want to pick from the archive + PPA, upgrade, and see that all is well [19:56] I'll just do my own in my PPA [20:11] cyphermox, hmm, you'll probably run into linux-signed issues as well. dangit. [20:12] rtg, linux-signed issues ? [20:12] apw, missing packages in the PPA [20:13] guess I'd better do those to [20:15] right, kernel ought to be signed by some key; I can enroll the hash afterwards or something [20:16] cyphermox, alright, gimme a bit [20:17] cyphermox, when the primary packages publish (linux) a key will be generated for the PPA is there is not yet one [20:18] cyphermox, you'll likely have to sign the kernels by hand (which is what I had to do for testing) [20:19] apw: indeed. [20:19] yeah, or I can extract the signature and add it in MokManager, I think [20:23] hrm, isn't linux-lts-wily supposed to not allow me to load a dkms module? [20:24] I just double-checked, shim validation is active here on trusty, and I install bbswitch-dkms, which loads fine (mentions tainting in dmesg, but is otherwise fine) [20:25] cyphermox, 'dmesg|grep Secure' [20:26] nothing [20:26] then secure boot is not enabled [20:26] I'm running 4.2.0-38-generic [20:26] err, it is [20:26] I trust the BIOS more than the kernel on this matter. [20:26] hallyn: if the location changes, it can also be a memory controller / motherboard issue... (I hope not!) [20:27] cyphermox, not so far as the kernel is concerned. lemme get my laptop fired up which has those virt instances installed [20:28] ok [20:28] JanC: yeah, that's hwy i haven't bought new ram just yet - i'm thinking it might be that. [20:29] for now i juts booted with mem=8G and actually no crashes yet. will see how that goes through the day [20:29] (i was working in an incredibly dusty environment last week - it's possible i can just blow some compressed air around and get it stable again, but doubt it) [20:30] cyphermox, in fact, gimme until tomorrow and I'll run through all of these packages again and make sure they are right. [20:30] ok [20:31] that was for trusty [20:31] xenial looked good before, but I'm going to get back to it now to re-check everything [20:40] cyphermox, ok, all of the Trusty linux-meta and linux-signed variants have been upload to ppa:canonical-kernel-team/unstable [20:41] ack