flight 112504 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112504/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
On Mon, Aug 7, 2017 at 1:56 PM, Boris Ostrovsky
wrote:
>
>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>> index 811e4ddb3f37..a3dcd83187ce 100644
>> --- a/arch/x86/xen/enlighten_pv.c
>> +++ b/arch/x86/xen/enlighten_pv.c
>> @@ -579,6 +579,71
Xen's raw SYSCALL entries are much less weird than native. Rather
than fudging them to look like native entries, use the Xen-provided
stack frame directly.
This lets us eliminate entry_SYSCALL_64_after_swapgs and two uses of
the SWAPGS_UNSAFE_STACK paravirt hook. The SYSENTER code would
benefit
flight 112506 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112506/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112456
This run is configured for baseline tests only.
flight 71948 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71948/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 6 xen-build
When a guest is created, register the AER event handler to handle the
AER errors. When an AER error occurs, the handler will forcibly remove
the erring PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/xl/xl_vmcontrol.c | 9 +
1 file changed,
Implement the callback function to handle unrecoverable AER errors, and
also the public APIs that can be used to register/unregister the handler.
When an AER error occurs, the handler will forcibly remove the erring
PCIe device from the guest.
Signed-off-by: Venu Busireddy
On Mon, Aug 7, 2017 at 1:35 PM, Dario Faggioli
wrote:
> On Sat, 2017-08-05 at 17:35 -0400, Meng Xu wrote:
>> >
>> > > @@ -966,8 +1001,16 @@ burn_budget(const struct scheduler *ops,
>> > > struct
>> > > rt_vcpu *svc, s_time_t now)
>> > >
>> > > if ( svc->cur_budget
On Mon, 2017-08-07 at 14:27 -0400, Meng Xu wrote:
> On Mon, Aug 7, 2017 at 1:35 PM, Dario Faggioli
>
> > Is this wanted or expected?
>
> It is wanted.
>
> A VCPU i that has already got budget_i * priority_level_i time has
> higher priority than another VCPU j that got budget_j *
>
On Mon, Aug 7, 2017 at 3:14 PM, Dario Faggioli
wrote:
> On Mon, 2017-08-07 at 14:27 -0400, Meng Xu wrote:
>> On Mon, Aug 7, 2017 at 1:35 PM, Dario Faggioli
>>
>> > Is this wanted or expected?
>>
>> It is wanted.
>>
>> A VCPU i that has already got budget_i *
This run is configured for baseline tests only.
flight 71947 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71947/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8853c2afc51c2cab862acbef308f2588264e188b
baseline
flight 112497 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112497/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 5 host-ping-check-native fail REGR. vs. 112405
Tests which did not
flight 112503 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112503/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-xsm 15 guest-stop fail in 112491 pass in 112503
> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
> index 811e4ddb3f37..a3dcd83187ce 100644
> --- a/arch/x86/xen/enlighten_pv.c
> +++ b/arch/x86/xen/enlighten_pv.c
> @@ -579,6 +579,71 @@ static void xen_write_ldt_entry(struct desc_struct *dt,
> int entrynum,
>
This patch set is part of a set of patches that together allow containment
of unrecoverable AER errors from PCIe devices assigned to guests in
passthrough mode. The containment is achieved by forcibly removing the
erring PCIe device from the guest.
The original xen-pciback patch corresponding to
This patch set is part of a set of patches that together allow containment
of unrecoverable AER errors from PCIe devices assigned to guests in
passthrough mode. The containment is achieved by forcibly removing the
erring PCIe device from the guest.
Changes in v3:
* Made the following changes
When a guest is created, register the AER event handler to handle the
AER errors. When an AER error occurs, the handler will forcibly remove
the erring PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/xl/xl_vmcontrol.c | 9 +
1 file changed,
Implement the callback function to handle unrecoverable AER errors, and
also the public APIs that can be used to register/unregister the handler.
When an AER error occurs, the handler will forcibly remove the erring
PCIe device from the guest.
Signed-off-by: Venu Busireddy
Implement the callback function to handle unrecoverable AER errors, and
also the public APIs that can be used to register/unregister the handler.
When an AER error occurs, the handler will forcibly remove the erring
PCIe device from the guest.
Signed-off-by: Venu Busireddy
When a guest is created, register the AER event handler to handle the
AER errors. When an AER error occurs, the handler will forcibly remove
the erring PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/xl/xl_vmcontrol.c | 9 +
1 file changed,
This patch set is part of a set of patches that together allow containment
of unrecoverable AER errors from PCIe devices assigned to guests in
passthrough mode. The containment is achieved by forcibly removing the
erring PCIe device from the guest.
The original xen-pciback patch corresponding to
Hi, Clemens!
On 08/07/2017 01:27 PM, Clemens Ladisch wrote:
Oleksandr Andrushchenko wrote:
Front sound driver has no real interrupts, so
playback/capture period passed interrupt needs to be emulated:
this is done via timer. Add required timer operations,
this is based on sound/drivers/dummy.c.
On 08/07/2017 03:09 PM, Takashi Sakamoto wrote:
Hi,
On Aug 7 2017 20:50, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
From: Oleksandr Andrushchenko
Initialize virtual sound card with streams according to the
Xen store configuration.
Add stubs for stream PCM operations.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c |
From: Oleksandr Andrushchenko
Introduce Kconfig option to enable Xen para-virtualized sound
frontend driver. Also add sound frontend to the Makefile.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/Kconfig | 12
From: Oleksandr Andrushchenko
Implement frontend to backend communication according to
the para-virtualized sound protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 302
From: Oleksandr Andrushchenko
Implement shared buffer handling according to the
para-virtualized sound device protocol at xen/interface/io/sndif.h:
- manage buffer memory
- handle granted references
- handle page directories
Signed-off-by: Oleksandr
From: Oleksandr Andrushchenko
Implement essential initialization of the sound driver:
- introduce required data structures
- handle driver registration
- handle sound card registration
- register sound driver on backend connection
- remove sound driver on
From: Oleksandr Andrushchenko
Read configuration values from Xen store according
to xen/interface/io/sndif.h protocol:
- introduce configuration structures for different
components, e.g. sound card, device, stream
- read PCM HW parameters, e.g rate, format
From: Oleksandr Andrushchenko
Introduce skeleton of the para-virtualized Xen sound
frontend driver. This patch only adds required
essential stubs.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 78
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following limitations:
- mute/unmute is not supported
- get/set volume is
flight 112496 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112496/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1
From: Oleksandr Andrushchenko
Front sound driver has no real interrupts, so
playback/capture period passed interrupt needs to be emulated:
this is done via timer. Add required timer operations,
this is based on sound/drivers/dummy.c.
Signed-off-by: Oleksandr
From: Oleksandr Andrushchenko
Implement ALSA driver operations including:
- start/stop period interrupt emulation
- manage frontend/backend shraed buffers
- manage Xen bus event channel state
Signed-off-by: Oleksandr Andrushchenko
From: Oleksandr Andrushchenko
1. Create event channels for all configured streams and publish
corresponding ring references and event channels in Xen store,
so backend can connect.
2. Implement event channel interrupt handler.
3. Create and destroy event
From: Oleksandr Andrushchenko
Add essential driver private info structure, initialize
locks and implement probe/remove of the Xen frontend
driver.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 27
From: Oleksandr Andrushchenko
Initial handling for Xen bus states: implement
Xen bus state machine for the front driver according to
the state diagram and recovery flow from sound para-virtualized
protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr
On Aug 7 2017 21:18, Oleksandr Andrushchenko wrote:
Your first patch includes code difference under line 26, thus it
expects existence of a file 'sound/drivers/xen-front.c' in tree.
However, the file is not introduced in any upstream yet; at least,
Linus's tree and Iwai-san's tree.
I missed
On 08/07/2017 03:30 PM, Takashi Sakamoto wrote:
On Aug 7 2017 21:18, Oleksandr Andrushchenko wrote:
Your first patch includes code difference under line 26, thus it
expects existence of a file 'sound/drivers/xen-front.c' in tree.
However, the file is not introduced in any upstream yet; at
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 04 August 2017 13:16
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> Wei Liu
> Subject: Re: [PATCH 4/5]
Please avoid dropping xen-devel...
On 07/08/17 11:52, Raviprasad Gurikar wrote:
hii
i am not able to run the xen on fastmodel...please solve my problem.
I will not be able to help until you provide the details I asked below.
Cheers,
On Mon, Aug 7, 2017 at 4:19 PM, Julien Grall
flight 112507 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112507/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
Hi,
On Aug 7 2017 16:43, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following
From: Oleksandr Andrushchenko
Implement ALSA driver operations including:
- start/stop period interrupt emulation
- manage frontend/backend shraed buffers
- manage Xen bus event channel state
Signed-off-by: Oleksandr Andrushchenko
From: Oleksandr Andrushchenko
Front sound driver has no real interrupts, so
playback/capture period passed interrupt needs to be emulated:
this is done via timer. Add required timer operations,
this is based on sound/drivers/dummy.c.
Signed-off-by: Oleksandr
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following limitations:
- mute/unmute is not supported
- get/set volume is
From: Oleksandr Andrushchenko
Initialize virtual sound card with streams according to the
Xen store configuration.
Add stubs for stream PCM operations.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c |
From: Oleksandr Andrushchenko
Introduce Kconfig option to enable Xen para-virtualized sound
frontend driver. Also add sound frontend to the Makefile.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/Kconfig | 12
From: Oleksandr Andrushchenko
1. Create event channels for all configured streams and publish
corresponding ring references and event channels in Xen store,
so backend can connect.
2. Implement event channel interrupt handler.
3. Create and destroy event
From: Oleksandr Andrushchenko
Implement essential initialization of the sound driver:
- introduce required data structures
- handle driver registration
- handle sound card registration
- register sound driver on backend connection
- remove sound driver on
From: Oleksandr Andrushchenko
Add essential driver private info structure, initialize
locks and implement probe/remove of the Xen frontend
driver.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 27
From: Oleksandr Andrushchenko
Read configuration values from Xen store according
to xen/interface/io/sndif.h protocol:
- introduce configuration structures for different
components, e.g. sound card, device, stream
- read PCM HW parameters, e.g rate, format
From: Oleksandr Andrushchenko
Implement frontend to backend communication according to
the para-virtualized sound protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 302
From: Oleksandr Andrushchenko
Initial handling for Xen bus states: implement
Xen bus state machine for the front driver according to
the state diagram and recovery flow from sound para-virtualized
protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr
From: Oleksandr Andrushchenko
Implement shared buffer handling according to the
para-virtualized sound device protocol at xen/interface/io/sndif.h:
- manage buffer memory
- handle granted references
- handle page directories
Signed-off-by: Oleksandr
> -Original Message-
> From: Marek Marczykowski-Górecki
> [mailto:marma...@invisiblethingslab.com]
> Sent: 04 August 2017 14:02
> To: Wei Liu
> Cc: Paul Durrant ; xen-de...@lists.xenproject.org;
> Ian Jackson
>
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 04 August 2017 13:26
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> Wei Liu ; Marek Marczykowski-Górecki
>
Hi,
On 08/07/2017 02:28 PM, Takashi Sakamoto wrote:
Hi,
On Aug 7 2017 16:43, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
Hi,
On Aug 7 2017 20:50, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following
Xenconsole functions take domain structure as input. These functions shall be
modified to take console structure as input since these functions typically
perform
console specific operations.
Also the console specific functions starting with prefix "domain_" shall be
modified
to "console_" to
This patch introduces a new maybe_add_console_tty_fd function. This function
adds the tty fd to the list of polled fds.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
---
CC: Ian Jackson
CC: Wei
Xenconsole uses a domain structure which contains console specific fields. This
patch defines a new console structure, which would be used by the xenconsole
functions to perform console specific operations like reading/writing data
from/to
the console ring buffer or reading/writing data from/to
Add a new vuart console node to xenstore. This node is added at
/local/domain/$DOMID/vuart/0.
The node contains information such as the ring-ref, event channel,
buffer limit and type of console.
Xenconsole reads the node information to setup the ring buffer and
event channel for
Add emulation code to emulate read/write access to pl011 registers
and pl011 interrupts:
- Emulate DR read/write by reading and writing from/to the IN
and OUT ring buffers and raising an event to the backend when
there is data in the OUT ring buffer and injecting an interrupt
Rearrange xen header includes in alphabetical order in domctl.c.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Reviewed-by: Julien Grall
---
CC: Stefano Stabellini
CC: Julien
DEFINE_XEN_FLEX_RING(xencons) defines common helper functions such as
xencons_queued() to tell the current size of the ring buffer,
xencons_mask() to mask off the index, which are useful helper functions.
pl011 emulation code will use these helper functions.
io/console.h includes io/ring.h which
SBSA UART emulation for guests in Xen
==
Linaro has published VM System specification for ARM Processors, which
provides a set of guidelines for both guest OS and hypervisor implementations,
such that building OS images according to these guidelines guarantees
This patch introduces a console_open_log console_cleanup function. This function
opens the console log file.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
---
CC: Ian Jackson
CC: Wei Liu
An option is provided in libxl to enable/disable SBSA vuart while
creating a guest domain.
Libxl now supports a generic vuart console and SBSA uart is a specific type.
In future support can be added for multiple vuart of different types.
User can enable SBSA vuart by adding the following line in
This patch introduces a new console_cleanup function. This function
frees up the console resources.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
---
CC: Ian Jackson
CC: Wei Liu
Allocate a new gfn to be used as a ring buffer between xenconsole
and Xen for sending/receiving pl011 console data.
Signed-off-by: Bhupinder Thakur
Acked-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
This patch introduces a console_close_evtchn function. This function closes
the console event channel.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
This patch introduces a new console_init function. This function
initializes the console structure.
Signed-off-by: Bhupinder Thakur
---
CC: Ian Jackson
CC: Wei Liu
CC: Stefano Stabellini
CC:
This patch introduces a new buffer_available function to check if
more data is allowed to be buffered.
Signed-off-by: Bhupinder Thakur
Reviewed-by: Stefano Stabellini
Acked-by: Wei Liu
---
CC: Ian Jackson
>>> Dario Faggioli 07/27/17 10:01 AM >>>
>Instead of having the CPU where a callback is queued, busy
>looping on rcu_pending(), use a timer.
Isn't this rcu_needs_cpu(), according to patch 4?
>--- a/xen/arch/x86/acpi/cpu_idle.c
>+++ b/xen/arch/x86/acpi/cpu_idle.c
>@@
flight 71946 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71946/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-amd64-sid-netboot-pygrub 11 guest-start fail REGR. vs. 71921
>>> Bhupinder Thakur 08/07/17 10:55 AM >>>
>@@ -1148,6 +1149,24 @@ struct xen_domctl_psr_cat_op {
>uint32_t target;/* IN */
>uint64_t data; /* IN/OUT */
>};
>+
>+struct xen_domctl_vuart_op {
>+#define XEN_DOMCTL_VUART_OP_INIT 0
>+uint32_t cmd;
On 08/07/2017 04:18 AM, Jan Beulich wrote:
Boris Ostrovsky 07/31/17 10:03 PM >>>
>> We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
>> vectors that are available to each processor. Currently, when x2apic
>> cluster mode is used (which is
Boris Ostrovsky 08/07/17 4:16 PM >>>
>On 08/06/2017 01:41 PM, Jan Beulich wrote:
> Boris Ostrovsky 08/04/17 7:03 PM >>>
>>> +/* See if any of the pages indeed need scrubbing. */
>>> +if ( first_dirty
On 07/08/17 09:18, Jan Beulich wrote:
Boris Ostrovsky 07/31/17 10:03 PM >>>
>> We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
>> vectors that are available to each processor. Currently, when x2apic
>> cluster mode is used (which is default),
>>> Boris Ostrovsky 08/07/17 4:32 PM >>>
>On 08/07/2017 04:18 AM, Jan Beulich wrote:
> Boris Ostrovsky 07/31/17 10:03 PM >>>
>>> We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
>>> vectors that are available to
On 08/07/2017 06:45 AM, Julien Grall wrote:
> Hi Boris,
>
> I would have appreciated to be CCed as maintainer of the ARM bits...
> Please use scripts/get_maintainers.pl in the future.
Ugh, sorry about that. (I did test builds for both ARM64 and ARM32, if
this make my transgression any less
flight 112502 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112502/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
On Fri, 2017-08-04 at 13:05 -0400, Boris Ostrovsky wrote:
> Instead of scrubbing pages during guest destruction (from
> free_heap_pages()) do this opportunistically, from the idle loop.
>
> We might come to scrub_free_pages()from idle loop while another CPU
> uses mapcache override, resulting in
On 08/06/2017 01:41 PM, Jan Beulich wrote:
Boris Ostrovsky 08/04/17 7:03 PM >>>
>> @@ -873,6 +916,8 @@ static int reserve_offlined_page(struct page_info *head)
> >
>> while ( cur_order < head_order )
>> {
>> +unsigned int idx = INVALID_DIRTY_IDX;
> Is
flight 112510 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112510/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2
Oleksandr Andrushchenko wrote:
> On 08/07/2017 01:27 PM, Clemens Ladisch wrote:
>> You have to implement period interrupts (and the .pointer callback)
>> based on when the samples are actually moved from/to the backend.
>
> Do you think I can implement this in a slightly different way,
> without a
On 08/07/2017 04:11 PM, Clemens Ladisch wrote:
Oleksandr Andrushchenko wrote:
On 08/07/2017 01:27 PM, Clemens Ladisch wrote:
You have to implement period interrupts (and the .pointer callback)
based on when the samples are actually moved from/to the backend.
Do you think I can implement this
Oleksandr Andrushchenko wrote:
> On 08/07/2017 04:11 PM, Clemens Ladisch wrote:
>> How does that interface work?
>
> For the buffer received in .copy_user/.copy_kernel we send
> a request to the backend and get response back (async) when it has copied
> the bytes into HW/mixer/etc, so the buffer
>>> Andrew Cooper 08/07/17 4:39 PM >>>
>On 07/08/17 09:18, Jan Beulich wrote:
>> Wouldn't it be sufficient for people running into vector shortage due to
>> sharing to specify "x2apic_phys" on the command line?
>
>Had XenServer noticed this change in default earlier, I
On 08/07/2017 10:37 AM, Jan Beulich wrote:
> Boris Ostrovsky 08/07/17 4:16 PM >>>
>> On 08/06/2017 01:41 PM, Jan Beulich wrote:
>> Boris Ostrovsky 08/04/17 7:03 PM >>>
+/* See if any of the pages indeed need
@@ -72,9 +73,13 @@ static void __init clustered_apic_check_x2apic(void)
{
}
>>> >
-static const cpumask_t *vector_allocation_cpumask_x2apic_cluster(int cpu)
+static const cpumask_t *vector_allocation_cpumask_x2apic_cluster(int cpu,
+const cpumask_t *cpumask)
On 08/07/2017 04:55 PM, Clemens Ladisch wrote:
Oleksandr Andrushchenko wrote:
On 08/07/2017 04:11 PM, Clemens Ladisch wrote:
How does that interface work?
For the buffer received in .copy_user/.copy_kernel we send
a request to the backend and get response back (async) when it has copied
the
On 08/07/2017 10:52 AM, Jan Beulich wrote:
Andrew Cooper 08/07/17 4:39 PM >>>
>> On 07/08/17 09:18, Jan Beulich wrote:
>>> Wouldn't it be sufficient for people running into vector shortage due to
>>> sharing to specify "x2apic_phys" on the command line?
>> Had
flight 112491 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112491/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemut-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
95
Tests which
flight 112490 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112490/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following limitations:
- mute/unmute is not supported
- get/set volume is
From: Oleksandr Andrushchenko
Initialize virtual sound card with streams according to the
Xen store configuration.
Add stubs for stream PCM operations.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c |
From: Oleksandr Andrushchenko
1. Create event channels for all configured streams and publish
corresponding ring references and event channels in Xen store,
so backend can connect.
2. Implement event channel interrupt handler.
3. Create and destroy event
From: Oleksandr Andrushchenko
Introduce Kconfig option to enable Xen para-virtualized sound
frontend driver. Also add sound frontend to the Makefile.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/Kconfig | 12
1 - 100 of 156 matches
Mail list logo