Still More Slackspot Issues - Patch Included

2019-03-21 Thread Stephen D. Cohen via Xenomai
ave colons in the pathname. + */ + s = fgets(buf, sizeof(buf), fp); + if (s == NULL) + goto bad_output; + s = strrchr(s, ':'); + if (s == NULL) + continue; + *s++ = '\0'; + if (strcmp(buf, "??")) { + l->lineno = atoi(s); + l->file = strdup(buf); + } } + if (ch == '0') + ungetc(ch, fp); } pclose(fp); /\/\/\/\/\ End Patch /\/\/\/\/\ -- next part -- A non-text attachment was scrubbed... Name: fix_slackspot.patch Type: application/octet-stream Size: 5293 bytes Desc: not available URL: <http://xenomai.org/pipermail/xenomai/attachments/20190321/541bd5d0/attachment.obj>

[PATCH 16/16] demo/net: add rtnet tests

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- configure.ac | 1 + demo/Makefile.am | 2 +- demo/net/Makefile.am | 78 demo/net/mcast-receiver.c | 204 demo/net/mcast-sender.c| 151

[PATCH 09/16] net/stack: manager: ratelimit printk when dropping buffers

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/stack/stack_mgr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/drivers/net/stack/stack_mgr.c b/kernel/drivers/net/stack/stack_mgr.c index 4059e7c4c..0e89900b5 100644 ---

[PATCH 12/16] net/drivers: e1000e: enable VLAN filtering

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/drivers/e1000e/netdev.c | 30 +- 1 file changed, 6 insertions(+), 24 deletions(-) diff --git a/kernel/drivers/net/drivers/e1000e/netdev.c b/kernel/drivers/net/drivers/e1000e/netdev.c index

[PATCH 08/16] net/stack: rtskb: increase buffer size

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix The largest packet size an IGB device can handle is 2k. Since we have a fixed buffer size, we need to accomodate for this. Signed-off-by: Philippe Gerum --- kernel/drivers/net/stack/include/rtskb.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git

[PATCH 11/16] net/drivers: e1000e: enable multicast

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/drivers/e1000e/e1000.h| 2 +- kernel/drivers/net/drivers/e1000e/hw.h | 2 +- kernel/drivers/net/drivers/e1000e/lib.c | 7 --- kernel/drivers/net/drivers/e1000e/netdev.c | 8 +---

[PATCH 15/16] net/drivers: igb: enable VLAN filtering

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/drivers/igb/igb_main.c | 23 --- 1 file changed, 16 insertions(+), 7 deletions(-) diff --git a/kernel/drivers/net/drivers/igb/igb_main.c b/kernel/drivers/net/drivers/igb/igb_main.c index

[PATCH 14/16] net/drivers: igb: enable multicast

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/drivers/igb/e1000_mac.c | 6 ++--- kernel/drivers/net/drivers/igb/e1000_mac.h | 2 +- kernel/drivers/net/drivers/igb/igb_main.c | 30 +- 3 files changed, 11 insertions(+), 27 deletions(-)

[PATCH 10/16] net/ipv4: icmp: forward unused packets to proxy

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/stack/ipv4/icmp.c | 18 -- 1 file changed, 16 insertions(+), 2 deletions(-) diff --git a/kernel/drivers/net/stack/ipv4/icmp.c b/kernel/drivers/net/stack/ipv4/icmp.c index 68489709c..556fee869

[PATCH 03/16] utils/net: rtifconfig: display device name untruncated

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- utils/net/rtifconfig.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/utils/net/rtifconfig.c b/utils/net/rtifconfig.c index 8117e127c..9a9abfc4c 100644 --- a/utils/net/rtifconfig.c +++ b/utils/net/rtifconfig.c @@

[PATCH 06/16] net/udp: allow retrieving irq timestamp with SIOCGSTAMP ioctl

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/stack/include/rtnet_socket.h | 2 ++ kernel/drivers/net/stack/ipv4/udp/udp.c | 9 + 2 files changed, 11 insertions(+) diff --git a/kernel/drivers/net/stack/include/rtnet_socket.h

[PATCH 04/16] net/stack: add support for VLAN filtering

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/addons/cap.c | 47 +- kernel/drivers/net/stack/Kconfig | 7 + kernel/drivers/net/stack/Makefile | 2 + kernel/drivers/net/stack/include/rtdev.h | 19 +

[PATCH 07/16] net/udp sendmsg: do not return an error if dest addr is null

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/stack/ipv4/udp/udp.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/kernel/drivers/net/stack/ipv4/udp/udp.c b/kernel/drivers/net/stack/ipv4/udp/udp.c index 8539fe87a..57b642e5c 100644 ---

[PATCH 05/16] utils/net: add VLAN filter configuration tool

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- utils/net/Makefile.am | 1 + utils/net/rtvconfig.c | 257 ++ 2 files changed, 258 insertions(+) create mode 100644 utils/net/rtvconfig.c diff --git a/utils/net/Makefile.am

[PATCH 00/16] multicast, VLAN support for RTnet

2019-03-21 Thread Philippe Gerum via Xenomai
Some time ago, Gilles Chanteperdrix added multicast and VLAN support to the original RTnet code base (0.9.13). iXblue, the company who owns such work, has released this code, with permission to contribute it to the Xenomai project. Many thanks to Stéphane Belot at iXblue for making it possible.

[PATCH 02/16] net/stack: add multicast support

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix Signed-off-by: Philippe Gerum --- kernel/drivers/net/stack/include/ipv4/arp.h | 3 + kernel/drivers/net/stack/include/ipv4/igmp.h | 102 +++ .../drivers/net/stack/include/ipv4/protocol.h | 1 + kernel/drivers/net/stack/include/rtdev.h | 17 +

[PATCH 01/16] net/stack: plan for merging private device flags with netdev_priv_flags

2019-03-21 Thread Philippe Gerum via Xenomai
From: Gilles Chanteperdrix We need to merge regular netdev_priv_flags with our own private device flags for the upcoming VLAN, multicast support. Pick non-conflicting bit positions. Signed-off-by: Philippe Gerum --- kernel/drivers/net/stack/include/rtdev.h | 9 +++-- 1 file changed, 7

Re: x86_64 kernel does not start under qemu

2019-03-21 Thread Jan Kiszka via Xenomai
On 21.03.19 12:57, Richard Weinberger wrote: > Am Donnerstag, 21. März 2019, 12:02:45 CET schrieb Jan Kiszka: >> FWIW, I've just seen this issue as well, with QEMU in KVM mode: I ran into >> that >> lockup when my host was under full load while Xenomai booted in the VM. And >> it >> seems

Re: x86_64 kernel does not start under qemu

2019-03-21 Thread Richard Weinberger via Xenomai
Am Donnerstag, 21. März 2019, 12:02:45 CET schrieb Jan Kiszka: > FWIW, I've just seen this issue as well, with QEMU in KVM mode: I ran into > that > lockup when my host was under full load while Xenomai booted in the VM. And > it > seems reproducible. Debugging... Oh, good to hear that! I

Re: x86_64 kernel does not start under qemu

2019-03-21 Thread Jan Kiszka via Xenomai
On 08.03.19 12:28, Jan Kiszka wrote: On 08.03.19 12:19, Richard Weinberger wrote: Am Mittwoch, 6. März 2019, 17:39:38 CET schrieb Jan Kiszka: On 06.03.19 16:33, Richard Weinberger wrote: Am Mittwoch, 6. März 2019, 14:43:55 CET schrieb Jan Kiszka: On 06.03.19 14:10, Jan Kiszka wrote: On

Re: kvm fpu warning on 4.14.89

2019-03-21 Thread Jan Kiszka via Xenomai
On 21.03.19 08:04, cagnulein wrote: I've got a similar issue even with the 4.9.146 with a kvm guest on and latency on too. It's quite deterministic. Any idea? I didn't trigger your trace yet, but I can know study this splash: [ 140.794470] I-pipe: Detected illicit call from head domain

Re: kvm fpu warning on 4.14.89

2019-03-21 Thread cagnulein via Xenomai
I've got a similar issue even with the 4.9.146 with a kvm guest on and latency on too. It's quite deterministic. Any idea? [ 2071.952650] [ cut here ] [ 2071.952657] WARNING: CPU: 0 PID: 0 at ./arch/x86/include/asm/fpu/internal.h:674 __kernel_fpu_end+0x116/0x120 [