[PATCH stable/3.0.x 2/2] x86: cobalt/switchtest: Enable FPU tests unconditionally

2022-06-15 Thread Florian Bezdeka via Xenomai
Parts of the FPU tests were skipped when one of the following config options was enabled, shadowing a real test issue that was triggered by high load on the system. The options: - CONFIG_X86_USE_3DNOW - CONFIG_MD_RAID456 - CONFIG_MD_RAID456_MODULE As the FPU initialization is fixed now, we c

[PATCH stable/3.0.x 1/2] x86: cobalt/switchtest: Fix testing issue due to uninitialized FPU

2022-06-15 Thread Florian Bezdeka via Xenomai
On x86 fp_regs_set() expects that the FPU state was initialized by calling the fninit instruction. When running in kernel space in task context there is no guarantee that the FPU was initialized. Under heavy load / scheduling the test might fail and report a FPU register corruption. The new introd

[PATCH stable/3.0.x 0/2] Backport FPU testing cleanup to 3.0.x

2022-06-15 Thread Florian Bezdeka via Xenomai
Hi all, this is the backport of the previously published FPU testing cleanup series to the stable/3.0.x branch. Patch 1 has been updated to match the supported architectures in the 3.0.x stable branch, Patch 2 is unmodified. Best regards, Florian Florian Bezdeka (2): x86: cobalt/switchtest:

[PATCH stable/3.1.x 2/2] x86: cobalt/switchtest: Enable FPU tests unconditionally

2022-06-15 Thread Florian Bezdeka via Xenomai
Parts of the FPU tests were skipped when one of the following config options was enabled, shadowing a real test issue that was triggered by high load on the system. The options: - CONFIG_X86_USE_3DNOW - CONFIG_MD_RAID456 - CONFIG_MD_RAID456_MODULE As the FPU initialization is fixed now, we c

[PATCH stable/3.1.x 0/2] Backport FPU testing cleanup to 3.1.x

2022-06-15 Thread Florian Bezdeka via Xenomai
Hi all, this is the backport of the previously published FPU testing cleanup series to the stable/3.1.x branch. Patch 1 has been updated to match the supported architectures in the 3.1.x stable branch, Patch 2 is unmodified. Best regards, Florian Florian Bezdeka (2): x86: cobalt/switchtest: F

[PATCH stable/3.1.x 1/2] x86: cobalt/switchtest: Fix testing issue due to uninitialized FPU

2022-06-15 Thread Florian Bezdeka via Xenomai
On x86 fp_regs_set() expects that the FPU state was initialized by calling the fninit instruction. When running in kernel space in task context there is no guarantee that the FPU was initialized. Under heavy load / scheduling the test might fail and report a FPU register corruption. The new introd

[PATCH 1/2] x86: ipipe: Fix testing issue due to uninitialized FPU

2022-05-25 Thread Florian Bezdeka via Xenomai
On x86 fp_regs_set() expects that the FPU state was initialized by calling the fninit instruction. When running the tests in kernel space in task context there is no guarantee that the FPU was initialized so under heavy load / scheduling the test might fail and report a FPU register corruption. Th

[PATCH 2/2] x86: ipipe: Enable FPU tests unconditionally

2022-05-25 Thread Florian Bezdeka via Xenomai
Parts of the FPU tests were skipped when one of the following config options was enabled, shadowing a real test issue that was triggered by high load on the system. The options: - CONFIG_X86_USE_3DNOW - CONFIG_MD_RAID456 - CONFIG_MD_RAID456_MODULE As the FPU initialization is fixed now, we c

[PATCH 0/2] Backport: FPU testing / switchtest issue to 3.2 stable

2022-05-25 Thread Florian Bezdeka via Xenomai
Hi all, this is the backport of the previously pulished FPU testing cleanup. As 3.2 stable branch still supports ipipe and ipipe allows us to use the FPU in kernel space (in user task context) we have to deal with the problem differently. The x86 fpu test relied on getting a clean fpu state (crea

[PATCH] switchtest: Cleanup FPU tests after ipipe -> dovetail transition

2022-05-25 Thread Florian Bezdeka via Xenomai
FPU usage in kernel space was allowed / enabled with ipipe, but is no longer available for dovetail based kernels. That allows us to clean up the FPU related tests of the switchtest utility. fp_kernel_supported() can be removed as all supported architectures returned 0 already. That allows us to r

Re: [PATCH v2] utils/net/rtnet.in: add delay during master configuration

2022-04-23 Thread Florian Bezdeka via Xenomai
Hi all, some minor comments, see below: On 22.04.22 20:58, Mauro S. via Xenomai wrote: > Some cards are slow to get the connection link up after the > "rtifconfig rteth0 up" command, e.g. on an Atom-x5 with an Intel I210 > (rt_igb driver) I detected approximately 3 seconds to get the link up. >

Re: [PATCH v2] x86: dovetail: reinstate I/O bitmap on user entry

2022-04-03 Thread Florian Bezdeka via Xenomai
Hi all, On 03.04.22 19:49, Philippe Gerum via Xenomai wrote: > > Richard Weinberger writes: > >> - Ursprüngliche Mail - >>> Von: "Philippe Gerum" >>> An: "xenomai" >>> CC: "Philippe Gerum" , "Richard Weinberger" >>> >>> Gesendet: Sonntag, 3. April 2022 16:43:48 >>> Betreff: [PATCH v

Re: [I-pipe 4.4] [PATCH v2 1/4] ipipe: x86: Do not call BUG() in case of retriggered APIC vectors

2022-03-01 Thread Florian Bezdeka via Xenomai
On 01.03.22 21:21, Jan Kiszka wrote: > On 01.03.22 13:52, Florian Bezdeka wrote: >> The CPU hotplugging code might re-trigger a vector. In that case the >> vector is in the VECTOR_RETRIGGERED state. With this patch applied ipipe >> does no longer call BUG() for such vectors. >> > > Doesn't this al

Re: [PATCH 3/3] y2038: cobalt: posix/signal: Take care of compat mode for sigtimedwait64

2022-03-01 Thread Florian Bezdeka via Xenomai
On 01.03.22 19:28, Jan Kiszka wrote: > On 21.02.22 14:25, Florian Bezdeka wrote: >> The compat syscall was previously routed to the native entrypoint. >> While the timeout is always based on time64_t the siginfo has to be >> handled different in compat mode. >> >> Signed-off-by: Florian Bezdeka >>

[I-pipe 5.4] [PATCH v2 3/4] ipipe: x86: Fix IRQ migrations, pending migrations were never handled

2022-03-01 Thread Florian Bezdeka via Xenomai
IRQ migrations did not work. Writing a new IRQ SMP affinity into /proc/irq//smp_affinity had no effect. It turned out that the pending migration was never handled. With commit d4637fc8663b ("x86/ipipe: fix chained irq handling") do_IRQ() is bypassed because it is not able to deal with chained IRQs

[I-pipe 4.19] [PATCH v2 4/4] ipipe: x86: Fix IRQ migrations, pending migrations were never handled

2022-03-01 Thread Florian Bezdeka via Xenomai
IRQ migrations did not work. Writing a new IRQ SMP affinity into /proc/irq//smp_affinity had no effect. It turned out that the pending migration was never handled. With commit 2ecf1d517b02 ("x86/ipipe: fix chained irq handling") do_IRQ() is bypassed because it is not able to deal with chained IRQs

[I-pipe 4.4] [PATCH v2 1/4] ipipe: x86: Do not call BUG() in case of retriggered APIC vectors

2022-03-01 Thread Florian Bezdeka via Xenomai
The CPU hotplugging code might re-trigger a vector. In that case the vector is in the VECTOR_RETRIGGERED state. With this patch applied ipipe does no longer call BUG() for such vectors. This is a backport from the 4.19 and 5.4 ipipe branches handling the VECTOR_SHUTDOWN state. The VECTOR_SHUTDOWN

[I-pipe 4.19, 5.4] [PATCH v2 2/4] ipipe: x86: Suppress unexpected trap warning for racing APIC vectors

2022-03-01 Thread Florian Bezdeka via Xenomai
It might happen that the APIC vector in flight has already been shut down by the device driver. In such a race it's still an unexpected trap, but nothing we should warn about. Checking the vector error state upfront avoids confusion. This is what do_IRQ() would do as well, in a slightly simplified

[I-pipe][PATCH v2 0/4] ipipe: x86: Fix IRQ migrations, avoid confusing kernel messages

2022-03-01 Thread Florian Bezdeka via Xenomai
Hi, this are the results from an internal debugging session. We we're facing some problems related to system tunings and some confusing kernel messages related to spurious IRQs. The most important part: IRQ migrations were broken in 4.19 and 5.4 based branches Patch 1 is compile tested only.

[PATCH] ipipe: x86: Suppress unexpected trap warning for racing APIC vectors

2022-02-25 Thread Florian Bezdeka via Xenomai
It might happen that the APIC vector in flight has already been shut down by the device driver. In such a race it's still an unexpected trap, but nothing we should warn about. Checking the vector error state upfront avoids confusion. This is what do_IRQ() would do as well, in a slightly simplified

[PATCH 2/3] y2038: cobalt: rtdm/fd: Take care of compat mode for recvmmsg64

2022-02-21 Thread Florian Bezdeka via Xenomai
The compat syscall was previously routed to the native entrypoint which triggered a failure during mmsghdr validation. Signed-off-by: Florian Bezdeka --- kernel/cobalt/arch/x86/include/asm/xenomai/syscall32-table.h | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/cobalt/arch/x86/includ

[PATCH 3/3] y2038: cobalt: posix/signal: Take care of compat mode for sigtimedwait64

2022-02-21 Thread Florian Bezdeka via Xenomai
The compat syscall was previously routed to the native entrypoint. While the timeout is always based on time64_t the siginfo has to be handled different in compat mode. Signed-off-by: Florian Bezdeka --- kernel/cobalt/arch/x86/include/asm/xenomai/syscall32-table.h | 1 + 1 file changed, 1 insert

[PATCH 1/3] y2038: posix/mqueue: Fix compat case for mq_timedreceive64

2022-02-21 Thread Florian Bezdeka via Xenomai
There is a pointer to ssize_t part of the ABI. The pointer itself is autocorrected by the syscall enter machinery, but when reading/writing we have to care about different sizes between compat and native case. Signed-off-by: Florian Bezdeka --- .../x86/include/asm/xenomai/syscall32-table.h | 1

[PATCH 0/3] y2038: Fixes for compat mode

2022-02-21 Thread Florian Bezdeka via Xenomai
I started testing the compat mode on a Ubuntu based system with glibc 2.34 which supports switching to 64 bit based time_t. These are the fixes for problems observed while testing the kernel / cobalt part. More tests, especially for the libcobalt part will be necessary, especially because the way

[PATCH] cobalt: Fix resource leak of cobalt_monitor

2022-01-17 Thread Florian Bezdeka via Xenomai
We have a test within the smokey testsuite which actually does something like cobalt_monitor_init() cobalt_monitor_wait() cobalt_monitor_enter() -> timeout cobalt_monitor_exit() cobalt_monitor_destroy() If the posix_mutex tests were run right after this scenario th

[PATCH] lib: Fix fallback signature of pthread_mutexattr_setrobust

2022-01-17 Thread Florian Bezdeka via Xenomai
Detected when trying to compile Xenomai on a 32bit system using latest glibc release (2.34) without running autoreconf to regenerate xeno_config.h. The signature of _setrobust was mixed with the signature of _getrobust. Updates https://gitlab.com/Xenomai/xenomai-hacker-space/-/issues/31 Signed-o

[PATCH 6/7] y2038: testsuite/smokey/y2038: Add a missing error handling path

2022-01-05 Thread Florian Bezdeka via Xenomai
Initialization of the mutex used for mutex_timedlock64 tests could fail. We have to abort the test in this case. Signed-off-by: Florian Bezdeka --- testsuite/smokey/y2038/syscall-tests.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/testsuite/smokey/y2038/syscall-tests.c

[PATCH 2/7] cobalt: posix/cond: Add missing __user annotation to user provided ptr

2022-01-05 Thread Florian Bezdeka via Xenomai
Like all other pointers in the cond_wait_prologue interface the error pointer is user-provided and should be annotated accordingly. Signed-off-by: Florian Bezdeka --- kernel/cobalt/posix/cond.c | 8 kernel/cobalt/posix/cond.h | 8 kernel/cobalt/posix/syscall32.c | 4 +

[PATCH 3/7] y2038: lib/cobalt: Dispatch cond_wait_prologue

2022-01-05 Thread Florian Bezdeka via Xenomai
It libc reports time64_t support, cond_wait_prologue is now dispatched to the time64_t based syscall. Signed-off-by: Florian Bezdeka --- lib/cobalt/cond.c | 21 + 1 file changed, 17 insertions(+), 4 deletions(-) diff --git a/lib/cobalt/cond.c b/lib/cobalt/cond.c index 1bf5c7

[PATCH 7/7] cobalt: Protect __xn_get_user() by access_ok()

2022-01-05 Thread Florian Bezdeka via Xenomai
According to the doctype provided by __get_user (which is used by the __xn_get_user() macro) each call should be protected by access_ok(). We missed such a protection at some places. Signed-off-by: Florian Bezdeka --- kernel/cobalt/posix/internal.h | 4 kernel/cobalt/posix/nsem.c | 3

[PATCH 5/7] y2038: testsuite/smokey/y2038: Adding tests for cond_wait_prologue64

2022-01-05 Thread Florian Bezdeka via Xenomai
Extending the smokey testsuite to do some tests for the recently added cond_wait_prologue64 syscall. Signed-off-by: Florian Bezdeka --- testsuite/smokey/y2038/syscall-tests.c | 97 ++ 1 file changed, 97 insertions(+) diff --git a/testsuite/smokey/y2038/syscall-tests.c b

[PATCH 4/7] cobalt: posix/cond: Add missing input validations

2022-01-05 Thread Florian Bezdeka via Xenomai
The following validation issues have been addressed: - __cobalt_cond_wait_prologue() missed validating the supplied pointers after the registry lookup which could fail. That triggered the kernel OOPS dumped below - The check removed from cobalt_cond_timedwait_prologue() is now alr

[PATCH 1/7] y2038: cobalt/posix/cond: Adding cond_wait_prologue64

2022-01-05 Thread Florian Bezdeka via Xenomai
Add a syscall specific for cond_wait_prologue64 with 64bit time_t. Signed-off-by: Florian Bezdeka --- include/cobalt/uapi/syscall.h | 1 + kernel/cobalt/posix/cond.c | 26 ++ kernel/cobalt/posix/cond.h | 13 + kernel/cobalt/posix/syscall3

[PATCH 0/7] y2038: cond_wait_prologue64 and related fixes

2022-01-05 Thread Florian Bezdeka via Xenomai
Hi all, this is the last missing POSIX related y2038 affected syscall in Xenomai. With this applied we have two Xenomai specific syscalls missing: - sc_cobalt_thread_setschedparam_ex - sc_cobalt_thread_getschedparam_ex While adding tests for the introduced cond_wait_prologue64 I hit a kernel

Re: [PATCH 9/9] cobalt/debug: Detect vDSO via absence of vm_file

2022-01-03 Thread Florian Bezdeka via Xenomai
On 13.10.21 13:55, Jan Kiszka via Xenomai wrote: > From: Jan Kiszka > > VM_DENYWRITE was removed in 5.15, so we need a different criteria. > Absence of a file-backing seems to be a good one. Bringing this one up, because we recently had a "report" on the ML regarding VM_DENYWRITE. I scanned the

Re: v5.15-dovetail-rebase compilation fails

2021-12-28 Thread Florian Bezdeka via Xenomai
On 27.12.21 19:50, G.Strobbe via Xenomai wrote: > Hi all, > > The compilation of file xenomai/kernel/cobalt/debug.c > in branch v5.15-dovetail-rebase failed. > The problem is that since kernel vanilla v15.5 > include/linux/mm.h no longer defines VM_DENYWRITE > > It is still used in xndebug_trac

Re: [PATCH] net/drivers: fec: Update fec driver for xenomai 3 + linux kernel 5.10 and add I.MX8 support

2021-12-03 Thread Florian Bezdeka via Xenomai
On 03.12.21 12:12, Jan Kiszka via Xenomai wrote: > On 01.12.21 20:04, Jan Kiszka via Xenomai wrote: >> On 26.11.21 09:02, Jean-Baptiste Trédez via Xenomai wrote: >>> Current fec driver does not build on xenomai 3 and on recent kernel (ex : >>> 5.10). Fec driver was completely rewritten on mainline

[xenomai-images][PATCH v3 6/8] ci: Fail test job when an error occurred during lava job submission

2021-11-15 Thread Florian Bezdeka via Xenomai
It can happen that the LAVA job submission fails. If so, the CI job should be marked as failed. Previously we had something like the following in the log, but the job was still marked as "OK". Log: connect to lava server: https://lava.xenomai.org Deploy artifacts from 'https://xenomai-images-arti

[xenomai-images][PATCH v3 5/8] ci/kas: Skip ssh key regeneration for all ci targets

2021-11-15 Thread Florian Bezdeka via Xenomai
To minimize CI build time, the ssh-regen part will be skipped on all ci / test targets. Signed-off-by: Florian Bezdeka --- opt-ci.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/opt-ci.yml b/opt-ci.yml index 4d1ab60..f90277a 100644 --- a/opt-ci.yml +++ b/opt-ci.yml @@ -27,6 +27,8 @@ re

[xenomai-images][PATCH v3 4/8] isar: Update ISAR to current next

2021-11-15 Thread Florian Bezdeka via Xenomai
Updating to the latest ISAR next revision to avoid carrying ISAR patches. Some adjustments to CI scripts and machine configs were necessary to follow ISAR upstream. - The ssh key generation had some problems on Debian 11. The key generation was started in parallel to the entropy feeding,

[xenomai-images][PATCH v3 7/8] linux-xenomai: arm: Enable CONFIG_ARM_MODULE_PLTS

2021-11-15 Thread Florian Bezdeka via Xenomai
From: Jan Kiszka No reason to turn this off, in fact, we have to turn it on with bullseye's gcc-10 and debug options enabled to avoid relocation range problems when loading modules. Reported-by: Florian Bezdeka Signed-off-by: Jan Kiszka Signed-off-by: Florian Bezdeka --- recipes-kernel/linux

[xenomai-images][PATCH v3 8/8] xenomai-demo: Switch to Debian bullseye

2021-11-15 Thread Florian Bezdeka via Xenomai
Switching from Debian buster to Debian bullseye as base for or xenomai-demo distribution. Signed-off-by: Florian Bezdeka --- conf/distro/xenomai-demo.conf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/conf/distro/xenomai-demo.conf b/conf/distro/xenomai-demo.conf index 1

[xenomai-images][PATCH v3 1/8] ci/kas: Consolidate kas option files, introduce opt-ci.yml

2021-11-15 Thread Florian Bezdeka via Xenomai
Integrate opt-lava-test.yml and opt-ext4-gz.yml into opt-ci.yml. opt-ci.yml now holds all CI specific options: - IMAGE_TYPE adjustments to fulfill LAVA needs - COMPRESS for virtual qemu targets CI configuration has been cleaned up. We only need opt-ci.yml, all board related BUILD_OPTIONS have

[xenomai-images][PATCH v3 3/8] ci/kas: Disable partition expanding during first boot

2021-11-15 Thread Florian Bezdeka via Xenomai
Trying to expand the partition during first boot doesn't make sense as we use NFS for deployment. Removing it helps to reduce the first boot time a bit. Signed-off-by: Florian Bezdeka --- opt-ci.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/opt-ci.yml b/opt-ci.yml index 9df02d0..4d1ab6

[xenomai-images][PATCH v3 2/8] ci/kas: Integrate opt-debug.yml into opt-ci.yml

2021-11-15 Thread Florian Bezdeka via Xenomai
Whenever the kas option file opt-ci.yml is used we want the same build options as the CI uses, which includes setting the debug options. Signed-off-by: Florian Bezdeka --- ci/gitlab-ci-base.yml | 4 ++-- opt-ci.yml| 2 ++ 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a

[xenomai-images][PATCH v3 0/8] Update to Debian 11

2021-11-15 Thread Florian Bezdeka via Xenomai
Hi all, with this series the Xenomai demo image will be based on Debian 11. All Debian 11 related topics that had to be adressed are now merged to all Xenomai branches, stable branches included. CI runs were successfully tested against all branches. Patch 7 made it to the list but has not been a

[dovetail][PATCH] x86: pipeline: Fix vector stall after vector error handling

2021-11-07 Thread Florian Bezdeka via Xenomai
Whenever an IRQ was handled for a vector being NULL or in one of the error states the interrupt was not acknowledged at the APIC. That can happen if a vector is cleaned up by one of the device drivers while there is still one IRQ in flight. This has two effects: - If the affected vector is re-as

[dovetail][RFC PATCH 2/5] kernel/irq/irqdesc: Extend struct irq_desc with a few cpu specific members

2021-11-02 Thread Florian Bezdeka via Xenomai
Extend the struct and make sure all members are initialized / cleaned up properly. All new members will be used by the following patches. Signed-off-by: Florian Bezdeka --- include/linux/irqdesc.h | 11 +++ kernel/irq/irqdesc.c| 24 ++-- 2 files changed, 33 insert

[dovetail][RFC PATCH 1/5] net/sched/sch_generic: Measure the time between watchdog runs

2021-11-02 Thread Florian Bezdeka via Xenomai
Signed-off-by: Florian Bezdeka --- The output looks like that: [36452.934159] dev_watchdog: cpu(6) jiffies(4331120128) jd(5072) ct(36452934152782) ctd(511) [36458.054164] dev_watchdog: cpu(6) jiffies(4331125248) jd(5120) ct(36458054156389) ctd(5120003) [36464.198155] dev_watchdog: cpu(6) j

[dovetail][RFC PATCH 4/5] kernel/irq/proc: Integrate post/pull/merge counters into /proc/interrupts

2021-11-02 Thread Florian Bezdeka via Xenomai
For each CPU the following IRQ information will be shown: - inband post counter - inband pull counter - inband merge counter - Linux accounting (unmodified) - out of band post counter - out of band pull counter - out of band merge counter Signed-off-by: Florian Bezdeka --- The cove

[dovetail][RFC PATCH 3/5] kernel/irq/pipeline: Instrument irq_post_stage and pull_next_irq

2021-11-02 Thread Florian Bezdeka via Xenomai
- Remember how often an IRQ was posted into and pulled from the IRQ log - Measure the time between push and pull - Count how often we merge IRQs (multiple post events before pulling again) Signed-off-by: Florian Bezdeka --- kernel/irq/pipeline.c | 34 ++ 1 f

[dovetail][RFC PATCH 5/5] kernel/irq/proc: Implement /proc/interrupt_log_times

2021-11-02 Thread Florian Bezdeka via Xenomai
Show the maximum time an interrupt stayed in the IRQ log on each CPU. Heavily inspired by show_interrupts(). Both logs (inband as well as out of band) are taken into account and are visible now. Signed-off-by: Florian Bezdeka --- The coverletter has an example of how this file looks like on the

[PATCH] testsuite/xeno-test: Restore timesyncd running state on smokey failure

2021-10-21 Thread Florian Bezdeka via Xenomai
We stop systemd-timesyncd before running the smokey testsuite and start it again once the smokey tests are complete. As xeno-test has a "set -e" we will stop the execution on the first error. So if smokey reports an error systemd-timesyncd is not started again. We don't properly restore the system

[PATCH] y2038: testsuite/smokey: Skip recvmmsg64 test if kernel support is missing

2021-10-20 Thread Florian Bezdeka via Xenomai
It might happen that the kernel does not support the combination of address family and protocol we use for this test. Skip the test and simulate success in such cases. Signed-off-by: Florian Bezdeka --- testsuite/smokey/y2038/syscall-tests.c | 4 1 file changed, 4 insertions(+) diff --git

[xenomai-images][PATCH v2 8/8] ci: Fail test job when an error occurred during lava job submission

2021-10-13 Thread Florian Bezdeka via Xenomai
It can happen that the LAVA job submission fails. If so, the CI job should be marked as failed. Previously we had something like the following in the log, but the job was still marked as "OK". Log: connect to lava server: https://lava.xenomai.org Deploy artifacts from 'https://xenomai-images-arti

[xenomai-images][PATCH v2 7/8] xenomai-demo: Switch to Debian bullseye

2021-10-13 Thread Florian Bezdeka via Xenomai
Switching from Debian buster to Debian bullseye as base for or xenomai-demo distribution. Signed-off-by: Florian Bezdeka --- conf/distro/xenomai-demo.conf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/conf/distro/xenomai-demo.conf b/conf/distro/xenomai-demo.conf index 1

[xenomai-images][PATCH v2 6/8] linux-xenomai: arm: Enable CONFIG_ARM_MODULE_PLTS

2021-10-13 Thread Florian Bezdeka via Xenomai
From: Jan Kiszka No reason to turn this off, in fact, we have to turn it on with bullseye's gcc-10 and debug options enabled to avoid relocation range problems when loading modules. Reported-by: Florian Bezdeka Signed-off-by: Jan Kiszka --- recipes-kernel/linux/files/armhf_defconfig | 1 - 1

[xenomai-images][PATCH v2 4/8] kas: Integrate opt-debug.yml into opt-ci.yml

2021-10-13 Thread Florian Bezdeka via Xenomai
Whenever the kas option file opt-ci.yml is used we want the same build options as the CI does, which includes setting the debug options. Signed-off-by: Florian Bezdeka --- ci/gitlab-ci-base.yml | 4 ++-- opt-ci.yml| 2 ++ 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a

[xenomai-images][PATCH v2 1/8] kas: Rename opt-lava-test.yml to opt-ci-board.yml

2021-10-13 Thread Florian Bezdeka via Xenomai
This kas option file is used for real test / ci boards only. The previous name indicated that it is used for all ci tests including virtual devices like (qemu). Signed-off-by: Florian Bezdeka --- ci/gitlab-ci-base.yml | 6 +++--- opt-lava-test.yml => opt-ci-board.yml | 0 2 files

[xenomai-images][PATCH v2 3/8] kas: Introduce kas option file for CI builds

2021-10-13 Thread Florian Bezdeka via Xenomai
For now the difference between the demo and the "ci image" is the removed sshd-regen-keys. That reduces the (first) boot time especially on low end CI hardware. Helps to stay within LAVA timeouts. CI builds will now use that file. Signed-off-by: Florian Bezdeka --- ci/gitlab-ci-base.yml | 4 ++

[xenomai-images][PATCH v2 2/8] ci: Disable partition expanding for all real test boards

2021-10-13 Thread Florian Bezdeka via Xenomai
Trying to expand the partition during first boot doesn't make sense as we use NFS for deployment. Removing it helps to reduce the first boot time a bit. It is disabled on all qemu machines in the machine config, as we can handle all qemu machines at once there. For real boards we want it to stay,

[xenomai-images][PATCH v2 5/8] demo-image: Fix sshd-regen-keys problems on arm / qemu

2021-10-13 Thread Florian Bezdeka via Xenomai
See patch descriptions for details. The main problem was that the key generation took extremly long and several other services (like the serial consoles) were not started because the configured timeout was reached. Signed-off-by: Florian Bezdeka --- ...Start-key-generation-after-entropy-s.patch

[xenomai-images][PATCH v2 0/8] Update to Debian 11

2021-10-13 Thread Florian Bezdeka via Xenomai
Hi all, with this series the Xenomai demo image will be based on Debian 11. All Debian 11 related topics that had to be adressed are now merged to the Xenomai next branch. The stable branches have not yet been updated so CI will report some failures for such branches. Patch 4 made it to the list

Re: [xenomai-images][PATCH 1/6] ci: Introduce kas option file for CI builds

2021-10-13 Thread Florian Bezdeka via Xenomai
On 13.10.21 10:08, Jan Kiszka wrote: > On 13.10.21 09:50, Florian Bezdeka wrote: >> On 13.10.21 09:26, Jan Kiszka wrote: >>> On 13.10.21 09:18, Florian Bezdeka via Xenomai wrote: >>>> For now the difference between the demo and the "ci image" is: >>>

Re: [xenomai-images][PATCH 1/6] ci: Introduce kas option file for CI builds

2021-10-13 Thread Florian Bezdeka via Xenomai
On 13.10.21 09:50, Florian Bezdeka via Xenomai wrote: > On 13.10.21 09:26, Jan Kiszka wrote: >> On 13.10.21 09:18, Florian Bezdeka via Xenomai wrote: >>> For now the difference between the demo and the "ci image" is: >>> - Removed sshd-regen-keys: Reduce

Re: [xenomai-images][PATCH 1/6] ci: Introduce kas option file for CI builds

2021-10-13 Thread Florian Bezdeka via Xenomai
On 13.10.21 09:50, Florian Bezdeka via Xenomai wrote: > On 13.10.21 09:26, Jan Kiszka wrote: >> On 13.10.21 09:18, Florian Bezdeka via Xenomai wrote: >>> For now the difference between the demo and the "ci image" is: >>> - Removed sshd-regen-keys: Reduce

Re: [xenomai-images][PATCH 6/6] ci: Fail test job when an error occurred during lava job submission

2021-10-13 Thread Florian Bezdeka via Xenomai
On 13.10.21 09:28, Jan Kiszka wrote: > On 13.10.21 09:18, Florian Bezdeka via Xenomai wrote: >> It can happen that the LAVA job submission fails. If so, the CI job >> should be marked as failed. Previously we had something like the >> following in the log, but the job wa

Re: [xenomai-images][PATCH 1/6] ci: Introduce kas option file for CI builds

2021-10-13 Thread Florian Bezdeka via Xenomai
On 13.10.21 09:26, Jan Kiszka wrote: > On 13.10.21 09:18, Florian Bezdeka via Xenomai wrote: >> For now the difference between the demo and the "ci image" is: >> - Removed sshd-regen-keys: Reduces the (first) boot time especially on >>low end CI hardware. Hel

[xenomai-images][PATCH 3/6] demo-image: Fix sshd-regen-keys problems on arm / qemu

2021-10-13 Thread Florian Bezdeka via Xenomai
See patch descriptions for details. The main problem was that the key generation took extremly long and several other services (like the serial consoles) were not started because the configured timeout was reached. Signed-off-by: Florian Bezdeka --- ...Start-key-generation-after-entropy-s.patch

[xenomai-images][PATCH 6/6] ci: Fail test job when an error occurred during lava job submission

2021-10-13 Thread Florian Bezdeka via Xenomai
It can happen that the LAVA job submission fails. If so, the CI job should be marked as failed. Previously we had something like the following in the log, but the job was still marked as "OK". Log: connect to lava server: https://lava.xenomai.org Deploy artifacts from 'https://xenomai-images-arti

[xenomai-images][PATCH 2/6] kas: Integrate opt-debug.yml into opt-ci.yml

2021-10-13 Thread Florian Bezdeka via Xenomai
Whenever the kas option file opt-ci.yml is used we want the same build options as the CI does, which includes setting the debug options. Signed-off-by: Florian Bezdeka --- ci/gitlab-ci-base.yml | 4 ++-- opt-ci.yml| 2 ++ 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a

[xenomai-images][PATCH 5/6] xenomai-demo: Switch to Debian bullseye

2021-10-13 Thread Florian Bezdeka via Xenomai
Switching from Debian buster to Debian bullseye as base for or xenomai-demo distribution. Signed-off-by: Florian Bezdeka --- conf/distro/xenomai-demo.conf | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/conf/distro/xenomai-demo.conf b/conf/distro/xenomai-demo.conf index 1

[xenomai-images][PATCH 4/6] linux-xenomai: arm: Enable CONFIG_ARM_MODULE_PLTS

2021-10-13 Thread Florian Bezdeka via Xenomai
From: Jan Kiszka No reason to turn this off, in fact, we have to turn it on with bullseye's gcc-10 and debug options enabled to avoid relocation range problems when loading modules. Reported-by: Florian Bezdeka Signed-off-by: Jan Kiszka --- recipes-kernel/linux/files/armhf_defconfig | 1 - 1

[xenomai-images][PATCH 1/6] ci: Introduce kas option file for CI builds

2021-10-13 Thread Florian Bezdeka via Xenomai
For now the difference between the demo and the "ci image" is: - Removed sshd-regen-keys: Reduces the (first) boot time especially on low end CI hardware. Helps to stay within LAVA timeouts. - Removed expand-on-first-boot: Doesn't make much sense on CI runs as we don't really use the files

[xenomai-images][PATCH 0/6] Update to Debian 11

2021-10-13 Thread Florian Bezdeka via Xenomai
Hi all, with this series the Xenomai demo image will be based on Debian 11. All Debian 11 related topics that had to be adressed are now merged to the Xenomai next branch. The stable branches have not yet been updated so CI will report some failures for such branches. Patch 4 made it to the list

[PATCH v5 2/3] y2038: lib/cobalt/rtdm: dispatch recvmmg

2021-10-06 Thread Florian Bezdeka via Xenomai
From: Song Chen If libc reports time64_t support, recvmmsg is dispatched to the time64_t based syscall. Signed-off-by: Song Chen Signed-off-by: Florian Bezdeka --- lib/cobalt/rtdm.c | 5 + 1 file changed, 5 insertions(+) diff --git a/lib/cobalt/rtdm.c b/lib/cobalt/rtdm.c index f3fb5d411.

[PATCH v5 1/3] y2038: cobalt/posix/io: Adding recvmmsg64

2021-10-06 Thread Florian Bezdeka via Xenomai
From: Song Chen Add a syscall specific for recvmmsg64 with 64bit time_t. Signed-off-by: Song Chen [Florian: Fixed some style issues] [Florian: Added Song's Signed-off back (malformed patch received)] [Florian: Fixed tracing infrastructure] Signed-off-by: Florian Bezdeka --- include/cobalt/ker

[PATCH v5 3/3] y2038: testsuite/smokey/y2038: testcase for recvmmsg64

2021-10-06 Thread Florian Bezdeka via Xenomai
From: Song Chen Extending the test suite for recvmmsg64 test. Signed-off-by: Song Chen [Florian: Rebased the patch on top of next] [Florian: switched to CLOCK_MONOTONIC] [Florian: Fixed error handling of the socket() call] Signed-off-by: Florian Bezdeka --- testsuite/smokey/y2038/syscall-test

[PATCH v5 0/3] y2038: Adding recvmmsg64

2021-10-06 Thread Florian Bezdeka via Xenomai
Hi, Just another y2038 related syscall, once again based on v4 sent out by Song with the following changes (squashed into the affected patches): - rebased to current next (especially patch 3) - minor code cleanups / reformattings - Added the syscall name to the tracing infrastructure - Switched t

[PATCH] y2038: testsuite/smokey/y2038: Run tests on y2038 safe kernels only

2021-08-27 Thread Florian Bezdeka via Xenomai
Especially 4.19 is not 2038 safe and 32 bit kernels do not have CONFIG_64BIT_TIME set, which ends up in __kernel_timespec being defined in a non y2038 safe way. cobalt_get_timespec64 will copy the upper bytes of the sec field into the nsec field, which is always zero. Testing y2038 syscalls on a

autotune inside qemu: early shot and segfault

2021-08-27 Thread Florian Bezdeka via Xenomai
Hi all, first issue: maybe someone can explain what's going on here. I'm running autotune inside qemu (ARM) on an x86_64 host and get the error below. The kernel in use is 4.19 (ipipe) build with current "next" branch. root@demo:~# autotune2 == auto-tuning started, period=100 ns (may take

[PATCH v2 2/7] cobalt/registry: Initialize refcnt of exported virtual proc files

2021-08-25 Thread Florian Bezdeka via Xenomai
The refcnt field was never initialized and triggered a BUG() in vfile_regular_release (vfile.c) when closing / releasing such a virtual file. Signed-off-by: Florian Bezdeka --- kernel/cobalt/registry.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/cobalt/registry.c b/kernel/cobalt/r

[PATCH v2 5/7] cobalt/posix/semaphore: Export named semaphores to procfs

2021-08-25 Thread Florian Bezdeka via Xenomai
Exporting named semaphores to /proc/xenomai/registry/posix/sem helps to identify resource leaks by making registered semaphores visible. The content of all created virtual files is empty. Removal of such files is not possible and reports "operation not supported". Signed-off-by: Florian Bezdeka -

[PATCH v2 3/7] cobalt/posix/process: Adding a xnptree for exporting registry entries

2021-08-25 Thread Florian Bezdeka via Xenomai
Will be used later for exporting registry entries, namely named semaphores as well as mqueues to /proc/xenomai/registry/posix/{mqueue,sem} Signed-off-by: Florian Bezdeka --- kernel/cobalt/posix/internal.h | 2 ++ kernel/cobalt/posix/process.c | 2 ++ 2 files changed, 4 insertions(+) diff --git

[PATCH v2 7/7] testsuite/smokey/leaks: Adding checks for procfs exports

2021-08-25 Thread Florian Bezdeka via Xenomai
Make sure that named semaphores as well as mqueues are exported to the procfs. Signed-off-by: Florian Bezdeka --- testsuite/smokey/leaks/leaks.c | 27 +++ 1 file changed, 27 insertions(+) diff --git a/testsuite/smokey/leaks/leaks.c b/testsuite/smokey/leaks/leaks.c index

[PATCH v2 1/7] cobalt/registry: Share xnregistry_vfreg_ops with other compile units

2021-08-25 Thread Florian Bezdeka via Xenomai
Allows re-using xnregistry_vfreg_ops. All other file options were already available. Signed-off-by: Florian Bezdeka --- include/cobalt/kernel/registry.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/include/cobalt/kernel/registry.h b/include/cobalt/kernel/registry.h index 624db5a78..a459

[PATCH v2 0/7] Export posix mqueues and named semaphores to procfs

2021-08-25 Thread Florian Bezdeka via Xenomai
Hi all, with this series I'm trying to care about all the feedback I got for RFCs I sent out some days ago. Exporting mqueues and named semaphores to the procfs helps to debug and identify resource leaks. mqueues will be exported to /proc/xenomai/registry/posix/mqueue/ named semaphores

[PATCH v2 6/7] testsuite/smokey/leaks: Fix error reporting from child to parent process

2021-08-25 Thread Florian Bezdeka via Xenomai
The exit code of the child process was never correctly reported to the parent process. Hence, the status code check was wrong at all. The variable previously named subprocess_status was not shared between both processes. Signed-off-by: Florian Bezdeka --- testsuite/smokey/leaks/leaks.c | 41

[PATCH v2 4/7] cobalt/posix/mqueue: Export created mqueues to procfs

2021-08-25 Thread Florian Bezdeka via Xenomai
Exporting created mqueues to /proc/xenomai/registry/posix/mqueue helps to identify resource leaks by making mqueues visible. The content of all created virtual files is empty. Removal of such files is not possible and reports "operation not supported". Signed-off-by: Florian Bezdeka --- kernel/c

[PATCH 3/6] cobalt/registry: Adding a new xnptree for exporting posix entries

2021-08-23 Thread Florian Bezdeka via Xenomai
Will be used later for exporting named semaphores as well as mqueues to /proc/xenomai/registry/posix/{mqueue,sem} Signed-off-by: Florian Bezdeka --- kernel/cobalt/registry.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kernel/cobalt/registry.c b/kernel/cobalt/registry.c index 211e0f76f.

[PATCH 6/6] testsuite/smokey/leaks: Add export checks for mqueues and named semaphores

2021-08-23 Thread Florian Bezdeka via Xenomai
Make sure mqueues and named semaphores are exported to the procfs if the kernel has procfs support activated. While at it: The exit code of the child process was never correctly reported to the parent process. Hence, the status code check was wrong at all. The variable previously named subprocess_

[PATCH 5/6] cobalt/posix/semaphore: Export named semaphores to procfs

2021-08-23 Thread Florian Bezdeka via Xenomai
Exporting named semaphores to /proc/xenomai/registry/posix/sem helps to identify resource leaks by making registered semaphores visible. The content of all created virtual files is empty. Removal of such files is not possible and reports "operation not supported". Signed-off-by: Florian Bezdeka -

[PATCH 4/6] cobalt/posix/mqueue: Export created mqueues to procfs

2021-08-23 Thread Florian Bezdeka via Xenomai
Exporting created mqueues to /proc/xenomai/registry/posix/mqueue helps to identify resource leaks by making mqueues visible. The content of all created virtual files is empty. Removal of such files is not possible and reports "operation not supported". Signed-off-by: Florian Bezdeka --- kernel/c

[PATCH 2/6] cobalt/registry: Initialize refcnt of exported virtual proc files

2021-08-23 Thread Florian Bezdeka via Xenomai
The refcnt field was never initialized and triggered a BUG() in vfile_regular_release (vfile.c) when closing / releasing such a virtual file. Signed-off-by: Florian Bezdeka --- kernel/cobalt/registry.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/cobalt/registry.c b/kernel/cobalt/r

[PATCH 1/6] cobalt/registry: Share xnregistry_vfreg_ops with other compile units

2021-08-23 Thread Florian Bezdeka via Xenomai
Allows re-using xnregistry_vfreg_ops. All other file options were already available. Signed-off-by: Florian Bezdeka --- include/cobalt/kernel/registry.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/include/cobalt/kernel/registry.h b/include/cobalt/kernel/registry.h index 624db5a78..a459

[PATCH 0/6] Export posix mqueues and named semaphores to procfs

2021-08-23 Thread Florian Bezdeka via Xenomai
Hi all, with this series I'm trying to care about all the feedback I got for RFCs I sent out some days ago. Exporting mqueues and named semaphores to the procfs helps to debug and identify resource leaks. mqueues will be exported to /proc/xenomai/registry/posix/mqueue/ named semaphores

[RFC PATCH 2/4] cobalt/registry: Share xnregistry_vfreg_ops with other compile units

2021-08-18 Thread Florian Bezdeka via Xenomai
Allows re-using xnregistry_vfreg_ops. All other file options were already available. Signed-off-by: Florian Bezdeka --- include/cobalt/kernel/registry.h | 2 ++ 1 file changed, 2 insertions(+) diff --git a/include/cobalt/kernel/registry.h b/include/cobalt/kernel/registry.h index 624db5a78..a459

[RFC PATCH 1/4] cobalt/registry: Make the root directory for proc exports optional

2021-08-18 Thread Florian Bezdeka via Xenomai
Previously the root directory was mandatory, which means that exports to the proc file system were forced to be located in /proc/xenomai/registry///. The virtual directory is now optional. If not supplied the root node of is set to registry_vfroot, which represents /proc/xenomai/registry. Signe

[RFC PATCH 4/4] cobalt/mqueue: Export created mqueues to procfs

2021-08-18 Thread Florian Bezdeka via Xenomai
Exporting created mqueues to /proc/xenomai/registry/mqueue helps to identify resource leaks by making mqueues visible. The content of all created virtual files is empty. Removal of such files is not possible and reports "operation not supported". Signed-off-by: Florian Bezdeka --- kernel/cobalt/

[RFC PATCH 0/4] Export mqueues to procfs

2021-08-18 Thread Florian Bezdeka via Xenomai
Hi, this is another try to make registered mqueues visible. This time by exporting them to the procfs, namely to /proc/xenomai/registry/mqueue/ Let me know what you think... I had to rework the existing export machinery a bit to get rid of the so called "root" directory which is normally create

  1   2   3   >