On 5/10/2021 1:33 PM, Chuck Zmudzinski wrote:
Package: src:linux
Version: 5.10.28-1
Severity: normal
Tags: upstream
Dear Maintainer,
I have been using Xen's PCI and VGA passthrough feature since wheezy and jessie
were the stable versions, and back then both Windows HVMs and Linux HVMs
This corrects typos - I referenced the wrong bug # in
a few places.
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
Since the purpose of the bug reports is to find and diagnose bugs, I did
a bit of experimentation and made some observations.
I checked out the Debian Xen source via git. I got t
ra three
commits. Perhaps it depends on differences in the BIOS or EFI, or
maybe systemd vs. sysv.
I share this result in case it is of help to you.
Regards,
Chuck Zmudzinski
On 9/26/2021 8:46 AM, Chuck Zmudzinski wrote:
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
Unfortunately I was too quick at installing the rebuilt 4.14.3-1 and I
missed trying the vanilla Debian 4.14.2+25-gb6a8c4f72d-2 with
Linux 4.19.181-1. I believe this combination would have hung during
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
Unfortunately I was too quick at installing the rebuilt 4.14.3-1 and I
missed trying the vanilla Debian 4.14.2+25-gb6a8c4f72d-2 with
Linux 4.19.181-1. I believe this combination would have hung during
reboot.
In light of what I discovered while
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
The second we seem to have a fix. The only question is how many patches
to cherry pick? bc141e8ca562 is non-urgent as it is merely superficial
and not needed for functionality.
5a4087004d1a is a workaround for Linux kernel breakage, but how likely
On 9/25/2021 11:27 PM, Elliott Mitchell wrote:
On Tue, Sep 21, 2021 at 06:33:20AM -0400, Chuck Zmudzinski wrote:
I presume you are suggesting I try booting 4.19.181-1 on the
current version of Xen-4.14 for bullseye as a dom0. I am not
inclined to try it until an official Debian developer
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
On Tue, Aug 24, 2021 at 03:27:19PM -0400, Phillip Susi wrote:
Ben Hutchings writes:
I think a proper fix would be one of:
a. If the Xen virtual keyboard driver is advertising capabilities it
doesn't have, stop it doing that.
b. Change the implem
On 9/21/2021 9:13 AM, Chuck Zmudzinski wrote:
On 9/20/2021 10:37 PM, Elliott Mitchell wrote:
On Mon, Sep 20, 2021 at 10:23:39PM -0400, Chuck Zmudzinski wrote:
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path
On 9/20/2021 10:37 PM, Elliott Mitchell wrote:
On Mon, Sep 20, 2021 at 10:23:39PM -0400, Chuck Zmudzinski wrote:
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path is a sufficiently strong indicator for me to
On 9/21/21 7:22 AM, Fr. Chuck Zmudzinski, C.P.M. wrote:
On Sat, 7 Aug 2021 08:40:14 +0200 Salvatore Bonaccorso
wrote:
> Control: tags -1 + moreinfo
>
> Hi,
>
> On Fri, Aug 06, 2021 at 11:50:54AM -0700, Elliott Mitchell wrote:
> > Package: src:linux
> > Vers
On 9/20/21 10:12 PM, Chuck Zmudzinski wrote:
On 9/20/21 6:29 PM, Chuck Zmudzinski wrote:
On 9/20/21 1:43 PM, Chuck Zmudzinski wrote:
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit
On 9/20/21 10:37 PM, Elliott Mitchell wrote:
On Mon, Sep 20, 2021 at 10:23:39PM -0400, Chuck Zmudzinski wrote:
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path is a sufficiently strong indicator for me to
s as a bug in src:xen, since the original reporter
has not been able to identify a commit in src:linux that caused
the bug and no one has been able to reproduce the bug on
Xen-4.11/Linux-4.19.194-3.
Regards,
Chuck Zmudzinski
On 9/20/21 7:39 PM, Diederik de Haas wrote:
On dinsdag 21 september 2021 01:15:15 CEST Elliott Mitchell wrote:
Merely having the path is a sufficiently strong indicator for me to
simply wave it past. I though would suggest Debian should instead
cherry-pick commit 0f089bbf43ecce6f27576cb548ba4
On 9/20/21 6:29 PM, Chuck Zmudzinski wrote:
On 9/20/21 1:43 PM, Chuck Zmudzinski wrote:
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit for problems
shutting down on the amd64
On 9/20/21 1:43 PM, Chuck Zmudzinski wrote:
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit for problems
shutting down on the amd64 architecture:
0030-xen-acpi-Rework
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I suspect the following patch is the culprit for problems
shutting down on the amd64 architecture:
0030-xen-acpi-Rework-acpi_os_map_memory-and-acpi_os_unmap.patch
This patch does
On 9/20/21 12:27 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
xen hypervisor version: 4.14.2+25-gb6a8c4f72d-2, amd64
linux kernel version: 5.10.46-4 (the current amd64 kernel
for bullseye)
Boot system: EFI, not using secure boot, booting xen
On 9/19/2021 9:30 PM, Chuck Zmudzinski wrote:
On 9/19/2021 4:53 PM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 03:54:01PM -0400, Chuck Zmudzinski wrote:
On 9/19/2021 1:29 PM, Elliott Mitchell wrote:
Have you tried memory ballooning with PVH or HVM domains?
That combination has been
On 9/19/2021 4:53 PM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 03:54:01PM -0400, Chuck Zmudzinski wrote:
On 9/19/2021 1:29 PM, Elliott Mitchell wrote:
Have you tried memory ballooning with PVH or HVM domains?
That combination has been reliably crashing Xen for me for a while
On 9/19/2021 1:29 PM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
I noticed this bug on bullseye ever since I have been
running bullseye as a dom0, but my testing indicates
there is no problem with src:linux but the problem
appeared in src:xen with
On 9/19/2021 10:56 AM, Elliott Mitchell wrote:
On Sun, Sep 19, 2021 at 01:05:56AM -0400, Chuck Zmudzinski wrote:
On Sat, 11 Sep 2021 13:29:12 +0200 Salvatore Bonaccorso
wrote:
>
> On Fri, Sep 10, 2021 at 06:47:12PM -0700, Elliott Mitchell wrote:
> > An experiment lead to
On 9/19/2021 1:05 AM, Chuck Zmudzinski wrote:
Hello Elliott and Salvatore,
I noticed this bug on bullseye ever since I have been
running bullseye as a dom0, but my testing indicates
there is no problem with src:linux but the problem
appeared in src:xen with the 4.14 version of xen on
bullseye
s a bug in src:xen.
I also would inquire with the Debian Xen Team about why they
are backporting patches from the upstream xen unstable
branch into Debian's 4.14 package that is currently shipping
on Debian stable (bullseye). IMHO, the aforementioned
patches that are not in the stable 4.14 bra
On 8/26/2021 8:01 AM, Chuck Zmudzinski wrote:
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
The current limit on the environment of a uevent appears to be 2 KB
(UEVENT_BUFFER_SIZE defined in ).� That seems like it
*might* be easier to change, so long as user-space doesn't have a
similar
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
The current limit on the environment of a uevent appears to be 2 KB
(UEVENT_BUFFER_SIZE defined in ). That seems like it
*might* be easier to change, so long as user-space doesn't have a
similar limit.
I looked into systemd/udev, and it seems to use a
On 8/25/2021 4:16 PM, Phillip Susi wrote:
Chuck Zmudzinski writes:
If it doesn't work, I am also willing to try approach a by patching
the Linux kernel xen-kbdfront driver by removing the for loops that
advertise those 654 keys. I tend to agree with Philip that this is
totally unnecessary
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
Text-based sysfs attributes are limited to a page, but udev receives
uevents through netlink, not sysfs.
The current limit on the environment of a uevent appears to be 2 KB
(UEVENT_BUFFER_SIZE defined in ). That seems like it
*might* be easier to chan
On 8/25/2021 12:45 PM, Chuck Zmudzinski wrote:
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
On Tue, Aug 24, 2021 at 03:27:19PM -0400, Phillip Susi wrote:
Ben Hutchings writes:
I think a proper fix would be one of:
a. If the Xen virtual keyboard driver is advertising capabilities it
��ï
On 8/24/2021 7:12 PM, Ben Hutchings wrote:
On Tue, Aug 24, 2021 at 03:27:19PM -0400, Phillip Susi wrote:
Ben Hutchings writes:
I think a proper fix would be one of:
a. If the Xen virtual keyboard driver is advertising capabilities it
doesn't have, stop it doing that.
b. Change the implem
On 8/25/2021 10:54 AM, Ben Hutchings wrote:
On Tue, 2021-08-24 at 15:19 -0400, Chuck Zmudzinski wrote:
On 8/24/2021 1:12 PM, Ben Hutchings wrote:
[...]
I think a proper fix would be one of:
a. If the Xen virtual keyboard driver is advertising capabilities it
doesn't have, stop it
On 8/24/2021 1:12 PM, Ben Hutchings wrote:
On Tue, 2021-08-24 at 10:56 -0400, Chuck Zmudzinski wrote:
On 5/24/2021 3:30 AM, Michael Biebl wrote:
Hi Phillip
Am 24.05.2021 um 06:19 schrieb Cyril Brulebois:
trigger to cold plug all devices. Both scripts are set -e. The Xen
Virtual Keyboard
to
update old device drivers so they are compatible with the
modern version? Does the Xen virtual keyboard need to be
managed by udev? Is there a simple way to disable incompatible
devices so udev ignores them?
Chuck Zmudzinski
on media is for.
Chuck Zmudzinski
Package: src:linux
Version: 5.10.28-1
Severity: normal
Tags: upstream
Dear Maintainer,
I have been using Xen's PCI and VGA passthrough feature since wheezy and jessie
were the stable versions, and back then both Windows HVMs and Linux HVMs would
function with the Intel Integrated Graphics Devic
36 matches
Mail list logo