Re: [PATCH v3] watchdog: Add hook for kicking in kdump path

2013-04-17 Thread Guenter Roeck
On Wed, Apr 17, 2013 at 02:49:59PM -0700, Eric W. Biederman wrote: > Don Zickus writes: > > > A common problem with kdump is that during the boot up of the > > second kernel, the hardware watchdog times out and reboots the > > machine before a vmcore can be captured. > > > > Instead of tellling c

Re: [PATCH] makedumpfile: close the dwfl handle before next invocation of init_dwarf_info()

2013-04-17 Thread Atsushi Kumagai
Hello Mahesh, On Mon, 15 Apr 2013 15:50:52 +0530 Mahesh J Salgaonkar wrote: > From: Mahesh Salgaonkar > > The init_dwarf_info() function initializes "dwarf_info.dwfl" handle everytime > when it is called. The "dwarf_info.dwfl" handle should be freed once we are > done with searching of desired

Re: [PATCH v3] watchdog: Add hook for kicking in kdump path

2013-04-17 Thread Eric W. Biederman
Don Zickus writes: > A common problem with kdump is that during the boot up of the > second kernel, the hardware watchdog times out and reboots the > machine before a vmcore can be captured. > > Instead of tellling customers to disable their hardware watchdog > timers, I hacked up a hook to put i

Re: [PATCH v3] watchdog: Add hook for kicking in kdump path

2013-04-17 Thread Guenter Roeck
On Wed, Apr 17, 2013 at 05:19:56PM -0400, Don Zickus wrote: > A common problem with kdump is that during the boot up of the > second kernel, the hardware watchdog times out and reboots the > machine before a vmcore can be captured. > > Instead of tellling customers to disable their hardware watchd

[PATCH v3] watchdog: Add hook for kicking in kdump path

2013-04-17 Thread Don Zickus
A common problem with kdump is that during the boot up of the second kernel, the hardware watchdog times out and reboots the machine before a vmcore can be captured. Instead of tellling customers to disable their hardware watchdog timers, I hacked up a hook to put in the kdump path that provides o

Re: reserved crash memory above #define DEFAULT_BZIMAGE_ADDR_MAX 0x37FFFFFF

2013-04-17 Thread Yinghai Lu
On Wed, Apr 17, 2013 at 6:52 AM, Thomas Renninger wrote: > Hi, > > while trying to switch to kvm setup with a latest kernel I realized that > blank: > crashkernel=64M > param will reserve this memory area: > 7b00-7eff : Crash kernel > > and kexec does not successfully load the kernel due t

Re: [PATCHv4 0/8] kexec: extend kexec hypercall for use with pv-ops kernels

2013-04-17 Thread Daniel Kiper
On Wed, Apr 17, 2013 at 03:15:39PM +0100, David Vrabel wrote: > On 17/04/13 13:34, Daniel Kiper wrote: > > On Tue, Apr 16, 2013 at 06:13:02PM +0100, David Vrabel wrote: > >> > >> The required patch series for kexec-tools have previously been posted > >> and this series has been rebased on the lates

Re: [PATCHv4 0/8] kexec: extend kexec hypercall for use with pv-ops kernels

2013-04-17 Thread David Vrabel
On 17/04/13 13:34, Daniel Kiper wrote: > On Tue, Apr 16, 2013 at 06:13:02PM +0100, David Vrabel wrote: >> >> The required patch series for kexec-tools have previously been posted >> and this series has been rebased on the latest kexec-tools and is >> available from the xen-v3 branch of: >> >> http

Re: [PATCH 5/5] kexec/xen: directly load images images into Xen

2013-04-17 Thread Daniel Kiper
On Wed, Apr 17, 2013 at 02:53:33PM +0100, David Vrabel wrote: > On 17/04/13 13:56, Daniel Kiper wrote: > > On Tue, Apr 09, 2013 at 11:20:36PM +0200, Daniel Kiper wrote: > >> > >> arch = (kexec_flags & KEXEC_ARCH_MASK) >> 16; > > > > What is wrong with this line? > > Why did not you applied it? > >

Re: [PATCH 5/5] kexec/xen: directly load images images into Xen

2013-04-17 Thread David Vrabel
On 17/04/13 13:56, Daniel Kiper wrote: > On Tue, Apr 09, 2013 at 11:20:36PM +0200, Daniel Kiper wrote: >> >> arch = (kexec_flags & KEXEC_ARCH_MASK) >> 16; > > What is wrong with this line? > Why did not you applied it? I haven't reposted the kexec-tools patches so it's not clear what you are expe

reserved crash memory above #define DEFAULT_BZIMAGE_ADDR_MAX 0x37FFFFFF

2013-04-17 Thread Thomas Renninger
Hi, while trying to switch to kvm setup with a latest kernel I realized that blank: crashkernel=64M param will reserve this memory area: 7b00-7eff : Crash kernel and kexec does not successfully load the kernel due to (hole_max output added myself): Could not find a free area of memory of

Re: [PATCH 5/5] kexec/xen: directly load images images into Xen

2013-04-17 Thread Daniel Kiper
On Tue, Apr 09, 2013 at 11:20:36PM +0200, Daniel Kiper wrote: > On Mon, Apr 08, 2013 at 08:06:54PM +0100, David Vrabel wrote: > > From: David Vrabel > > > > Xen 4.3 has an improvided kexec hypercall ABI that allows images to be > > loaded and executed without any kernel involvement. Use the API >

Re: [PATCH 5/8] kexec: extend hypercall with improved load/unload ops

2013-04-17 Thread Daniel Kiper
On Tue, Apr 16, 2013 at 06:13:07PM +0100, David Vrabel wrote: > From: David Vrabel > > In the existing kexec hypercall, the load and unload ops depend on > internals of the Linux kernel (the page list and code page provided by > the kernel). The code page is used to transition between Xen context

Re: [PATCHv4 0/8] kexec: extend kexec hypercall for use with pv-ops kernels

2013-04-17 Thread Daniel Kiper
On Tue, Apr 16, 2013 at 06:13:02PM +0100, David Vrabel wrote: > The series improves the kexec hypercall by making Xen responsible for > loading and relocating the image. This allows kexec to be usable by > pv-ops kernels and should allow kexec to be usable from a HVM or PVH > privileged domain. >

[PATCH] kexec/uImage: probe to identify a corrupted image

2013-04-17 Thread Suzuki K. Poulose
From: Suzuki K. Poulose Teach uImage_probe_xxx() to return the information about a corrupted image. This is required to prevent the loading of a corrupted ramdisk, where we don't have strict checking for the other formats, unlike the kernel. So, we should abort the operation than causing a proble

Re: [Xen-devel] [PATCH 5/8] kexec: extend hypercall with improved load/unload ops

2013-04-17 Thread Jan Beulich
>>> On 17.04.13 at 12:11, David Vrabel wrote: > On 17/04/13 09:55, Jan Beulich wrote: > On 16.04.13 at 19:13, David Vrabel wrote: >>> -static int kexec_exec(XEN_GUEST_HANDLE_PARAM(void) uarg) >>> +static int kexec_load(XEN_GUEST_HANDLE_PARAM(void) uarg) >>> { >>> -xen_kexec_exec_t exec;

Re: [Xen-devel] [PATCH 5/8] kexec: extend hypercall with improved load/unload ops

2013-04-17 Thread David Vrabel
On 17/04/13 09:55, Jan Beulich wrote: On 16.04.13 at 19:13, David Vrabel wrote: >> -static int kexec_exec(XEN_GUEST_HANDLE_PARAM(void) uarg) >> +static int kexec_load(XEN_GUEST_HANDLE_PARAM(void) uarg) >> { >> -xen_kexec_exec_t exec; >> -xen_kexec_image_t *image; >> -int base, bi

Re: [Xen-devel] [PATCH 5/8] kexec: extend hypercall with improved load/unload ops

2013-04-17 Thread Jan Beulich
>>> On 16.04.13 at 19:13, David Vrabel wrote: > -static int kexec_exec(XEN_GUEST_HANDLE_PARAM(void) uarg) > +static int kexec_load(XEN_GUEST_HANDLE_PARAM(void) uarg) > { > -xen_kexec_exec_t exec; > -xen_kexec_image_t *image; > -int base, bit, pos, ret = -EINVAL; > +xen_kexec_load_

Re: [PATCH] intel-iommu: Synchronize gcmd value with global command register

2013-04-17 Thread Takao Indoh
(2013/04/15 19:18), Joerg Roedel wrote: > On Mon, Apr 15, 2013 at 06:00:13PM +0900, Takao Indoh wrote: >> On DMAR initialization during kdump boot, do you guys agree to change >> order like this? >> >> Current order: >> (1) Disable translation >> (2) PCI initialization >> (3) Make pgtable and enabl