flight 112505 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112505/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ws16-amd64 7 xen-boot fail REGR. vs. 112490
test-amd64-i386-xl-q
On 28/07/17 12:23, Juergen Gross wrote:
> This patch series fixes a regression introduced in 4.13-rc1: A Xen
> HVM guest with KASLR enabled wouldn't boot any longer due to the usage
> of __va() before kernel_randomize_memory() was called.
>
> Changes in V2:
> - patch 1: test for x86_hyper being no
hi sir.
I have board of renesas r car h3 start kit . is it supporting for the
xen arm development ?? and please tell me the differnce between the renesas
r car h3 starter kit and salvator x board. which one is good.
with regards
raviprasad
___
Xen-de
On 08/07/2017 06:14 PM, Oleksandr Andrushchenko wrote:
On 08/07/2017 04:55 PM, Clemens Ladisch wrote:
Oleksandr Andrushchenko wrote:
On 08/07/2017 04:11 PM, Clemens Ladisch wrote:
How does that interface work?
For the buffer received in .copy_user/.copy_kernel we send
a request to the backen
flight 112506 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112506/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-win7-amd64 16 guest-localmigrate/x10 fail REGR. vs.
112456
Regression
Xen's raw SYSCALL entries are much less weird than native. Rather
than fudging them to look like native entries, use the Xen-provided
stack frame directly.
This lets us eliminate entry_SYSCALL_64_after_swapgs and two uses of
the SWAPGS_UNSAFE_STACK paravirt hook. The SYSENTER code would
benefit
This run is configured for baseline tests only.
flight 71948 linux-4.1 real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71948/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-xsm 6 xen-build
On Mon, Aug 7, 2017 at 1:56 PM, Boris Ostrovsky
wrote:
>
>> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
>> index 811e4ddb3f37..a3dcd83187ce 100644
>> --- a/arch/x86/xen/enlighten_pv.c
>> +++ b/arch/x86/xen/enlighten_pv.c
>> @@ -579,6 +579,71 @@ static void xen_write_ldt_
flight 112504 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112504/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-examine 7 reboot fail REGR. vs. 110515
test-amd64-amd64-xl
When a guest is created, register the AER event handler to handle the
AER errors. When an AER error occurs, the handler will forcibly remove
the erring PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/xl/xl_vmcontrol.c | 9 +
1 file changed, 9 insertions(+)
diff --git
Implement the callback function to handle unrecoverable AER errors, and
also the public APIs that can be used to register/unregister the handler.
When an AER error occurs, the handler will forcibly remove the erring
PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/libxl/libxl.
This patch set is part of a set of patches that together allow containment
of unrecoverable AER errors from PCIe devices assigned to guests in
passthrough mode. The containment is achieved by forcibly removing the
erring PCIe device from the guest.
The original xen-pciback patch corresponding to t
When a guest is created, register the AER event handler to handle the
AER errors. When an AER error occurs, the handler will forcibly remove
the erring PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/xl/xl_vmcontrol.c | 9 +
1 file changed, 9 insertions(+)
diff --git
Implement the callback function to handle unrecoverable AER errors, and
also the public APIs that can be used to register/unregister the handler.
When an AER error occurs, the handler will forcibly remove the erring
PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/libxl/libxl.
This patch set is part of a set of patches that together allow containment
of unrecoverable AER errors from PCIe devices assigned to guests in
passthrough mode. The containment is achieved by forcibly removing the
erring PCIe device from the guest.
The original xen-pciback patch corresponding to t
This patch set is part of a set of patches that together allow containment
of unrecoverable AER errors from PCIe devices assigned to guests in
passthrough mode. The containment is achieved by forcibly removing the
erring PCIe device from the guest.
Changes in v3:
* Made the following changes sug
When a guest is created, register the AER event handler to handle the
AER errors. When an AER error occurs, the handler will forcibly remove
the erring PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/xl/xl_vmcontrol.c | 9 +
1 file changed, 9 insertions(+)
diff --git
Implement the callback function to handle unrecoverable AER errors, and
also the public APIs that can be used to register/unregister the handler.
When an AER error occurs, the handler will forcibly remove the erring
PCIe device from the guest.
Signed-off-by: Venu Busireddy
---
tools/libxl/libxl.
flight 112503 linux-4.1 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112503/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-xsm 15 guest-stop fail in 112491 pass in 112503
test-amd64-amd64-xl-qemut-win7-amd6
> diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c
> index 811e4ddb3f37..a3dcd83187ce 100644
> --- a/arch/x86/xen/enlighten_pv.c
> +++ b/arch/x86/xen/enlighten_pv.c
> @@ -579,6 +579,71 @@ static void xen_write_ldt_entry(struct desc_struct *dt,
> int entrynum,
> preempt
flight 112497 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112497/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-arndale 5 host-ping-check-native fail REGR. vs. 112405
Tests which did not s
This run is configured for baseline tests only.
flight 71947 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71947/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8853c2afc51c2cab862acbef308f2588264e188b
baseline v
On Mon, Aug 7, 2017 at 3:14 PM, Dario Faggioli
wrote:
> On Mon, 2017-08-07 at 14:27 -0400, Meng Xu wrote:
>> On Mon, Aug 7, 2017 at 1:35 PM, Dario Faggioli
>>
>> > Is this wanted or expected?
>>
>> It is wanted.
>>
>> A VCPU i that has already got budget_i * priority_level_i time has
>> higher pri
On Mon, 2017-08-07 at 14:27 -0400, Meng Xu wrote:
> On Mon, Aug 7, 2017 at 1:35 PM, Dario Faggioli
>
> > Is this wanted or expected?
>
> It is wanted.
>
> A VCPU i that has already got budget_i * priority_level_i time has
> higher priority than another VCPU j that got budget_j *
> priority_level
On Mon, Aug 7, 2017 at 1:35 PM, Dario Faggioli
wrote:
> On Sat, 2017-08-05 at 17:35 -0400, Meng Xu wrote:
>> >
>> > > @@ -966,8 +1001,16 @@ burn_budget(const struct scheduler *ops,
>> > > struct
>> > > rt_vcpu *svc, s_time_t now)
>> > >
>> > > if ( svc->cur_budget <= 0 )
>> > > {
>> > >
On Sat, 2017-08-05 at 17:35 -0400, Meng Xu wrote:
> >
> > > @@ -966,8 +1001,16 @@ burn_budget(const struct scheduler *ops,
> > > struct
> > > rt_vcpu *svc, s_time_t now)
> > >
> > > if ( svc->cur_budget <= 0 )
> > > {
> > > -svc->cur_budget = 0;
> > > -__set_bit(__RTDS_d
flight 112501 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112501/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 8853c2afc51c2cab862acbef308f2588264e188b
baseline version:
ovmf 97c567efd303f610ac16e
>>
>> Switching to bitfields was, btw, suggested by Jan at some point so if
>> the two of you agree on how to proceed I can go either way (but by
>> preference is to keep it as a single-bit bitfield).
>
> If you use a single-bit bitfield of bool (i.e bool need_flush : 1) you
> would address both J
On 07/08/17 17:49, Boris Ostrovsky wrote:
> On 08/07/2017 12:20 PM, Andrew Cooper wrote:
>> On 07/08/17 17:06, Jan Beulich wrote:
>> Andrew Cooper 08/07/17 5:40 PM >>>
On 07/08/17 16:38, Jan Beulich wrote:
> So a single NIC drove the system out of vectors? That's insane, I would
>
Hi Florian,
On 03/08/17 17:00, Florian Jakobsmeier wrote:
> regarding your previous mails. I was able to single step every instruction
> of my module. The problem (or rather the solution) was to _disable_ the IRQ
> interrupts from within my guest module. This solves the problem of
> singlestepping
On 07/08/17 17:57, Boris Ostrovsky wrote:
diff --git a/xen/include/asm-arm/mm.h b/xen/include/asm-arm/mm.h
index ef84b72..d26b232 100644
--- a/xen/include/asm-arm/mm.h
+++ b/xen/include/asm-arm/mm.h
@@ -44,7 +44,16 @@ struct page_info
/* Page is on a free list: ((count_info & PGC_c
>>>
diff --git a/xen/include/asm-arm/mm.h b/xen/include/asm-arm/mm.h
index ef84b72..d26b232 100644
--- a/xen/include/asm-arm/mm.h
+++ b/xen/include/asm-arm/mm.h
@@ -44,7 +44,16 @@ struct page_info
/* Page is on a free list: ((count_info & PGC_count_mask) ==
>
On 08/07/2017 12:20 PM, Andrew Cooper wrote:
> On 07/08/17 17:06, Jan Beulich wrote:
> Andrew Cooper 08/07/17 5:40 PM >>>
>>> On 07/08/17 16:38, Jan Beulich wrote:
So a single NIC drove the system out of vectors? That's insane, I would
say, i.e. I'd call this a misconfigured system.
On 07/08/17 17:06, Jan Beulich wrote:
Andrew Cooper 08/07/17 5:40 PM >>>
>> On 07/08/17 16:38, Jan Beulich wrote:
>>> So a single NIC drove the system out of vectors? That's insane, I would
>>> say, i.e. I'd call this a misconfigured system. But yeah, if we really want
>>> to get such a thing
>>> Andrew Cooper 08/07/17 5:40 PM >>>
>On 07/08/17 16:38, Jan Beulich wrote:
>> So a single NIC drove the system out of vectors? That's insane, I would
>> say, i.e. I'd call this a misconfigured system. But yeah, if we really want
>> to get such a thing to work despite the insanity ...
>
>No. Th
flight 112499 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112499/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
build-arm64-libvirt 1 build-check(1)
>>> George Dunlap 08/07/17 12:27 PM >>>
>So it seems that people are still not quite clear about what I'm proposing.
And indeed your examples helped me understand better what you mean
(or at least I hope they did).
>Suppose someone builds a livepatch with the correct compiler, with a
>correct pa
On 07/08/17 16:38, Jan Beulich wrote:
Boris Ostrovsky 08/07/17 5:12 PM >>>
>> On 08/07/2017 10:52 AM, Jan Beulich wrote:
>> Andrew Cooper 08/07/17 4:39 PM >>>
On 07/08/17 09:18, Jan Beulich wrote:
> Wouldn't it be sufficient for people running into vector shortage due to
> s
>>> Boris Ostrovsky 08/07/17 5:12 PM >>>
>On 08/07/2017 10:52 AM, Jan Beulich wrote:
> Andrew Cooper 08/07/17 4:39 PM >>>
>>> On 07/08/17 09:18, Jan Beulich wrote:
Wouldn't it be sufficient for people running into vector shortage due to
sharing to specify "x2apic_phys" on the comman
>>> Boris Ostrovsky 08/07/17 5:06 PM >>>
> --- a/xen/include/asm-x86/mach-generic/mach_apic.h
> +++ b/xen/include/asm-x86/mach-generic/mach_apic.h
> @@ -13,10 +13,11 @@
> #define INT_DELIVERY_MODE (genapic->int_delivery_mode)
> #define INT_DEST_MODE (genapic->int_dest_mode)
>>>
>>> Boris Ostrovsky 08/07/17 4:56 PM >>>
>On 08/07/2017 10:37 AM, Jan Beulich wrote:
>> Boris Ostrovsky 08/07/17 4:16 PM >>>
>>> On 08/06/2017 01:41 PM, Jan Beulich wrote:
>>> Boris Ostrovsky 08/04/17 7:03 PM >>>
> +/* See if any of the pages indeed need scrubbing. */
Hi,
On 07/08/17 15:46, Boris Ostrovsky wrote:
On 08/07/2017 06:45 AM, Julien Grall wrote:
Hi Boris,
I would have appreciated to be CCed as maintainer of the ARM bits...
Please use scripts/get_maintainers.pl in the future.
Ugh, sorry about that. (I did test builds for both ARM64 and ARM32, if
On 08/07/2017 04:55 PM, Clemens Ladisch wrote:
Oleksandr Andrushchenko wrote:
On 08/07/2017 04:11 PM, Clemens Ladisch wrote:
How does that interface work?
For the buffer received in .copy_user/.copy_kernel we send
a request to the backend and get response back (async) when it has copied
the b
On 08/07/2017 10:52 AM, Jan Beulich wrote:
Andrew Cooper 08/07/17 4:39 PM >>>
>> On 07/08/17 09:18, Jan Beulich wrote:
>>> Wouldn't it be sufficient for people running into vector shortage due to
>>> sharing to specify "x2apic_phys" on the command line?
>> Had XenServer noticed this change in
@@ -72,9 +73,13 @@ static void __init clustered_apic_check_x2apic(void)
{
}
>>> >
-static const cpumask_t *vector_allocation_cpumask_x2apic_cluster(int cpu)
+static const cpumask_t *vector_allocation_cpumask_x2apic_cluster(int cpu,
+const cpumask_t *cpumask)
On 08/07/2017 10:37 AM, Jan Beulich wrote:
> Boris Ostrovsky 08/07/17 4:16 PM >>>
>> On 08/06/2017 01:41 PM, Jan Beulich wrote:
>> Boris Ostrovsky 08/04/17 7:03 PM >>>
+/* See if any of the pages indeed need scrubbing. */
+if ( first_dirty != INVA
>>> Andrew Cooper 08/07/17 4:39 PM >>>
>On 07/08/17 09:18, Jan Beulich wrote:
>> Wouldn't it be sufficient for people running into vector shortage due to
>> sharing to specify "x2apic_phys" on the command line?
>
>Had XenServer noticed this change in default earlier, I would have
>insisted that yo
On 08/07/2017 06:45 AM, Julien Grall wrote:
> Hi Boris,
>
> I would have appreciated to be CCed as maintainer of the ARM bits...
> Please use scripts/get_maintainers.pl in the future.
Ugh, sorry about that. (I did test builds for both ARM64 and ARM32, if
this make my transgression any less serious
>>> Boris Ostrovsky 08/07/17 4:32 PM >>>
>On 08/07/2017 04:18 AM, Jan Beulich wrote:
> Boris Ostrovsky 07/31/17 10:03 PM >>>
>>> We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
>>> vectors that are available to each processor. Currently, when x2apic
>>> cluster mode is u
On 07/08/17 09:18, Jan Beulich wrote:
Boris Ostrovsky 07/31/17 10:03 PM >>>
>> We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
>> vectors that are available to each processor. Currently, when x2apic
>> cluster mode is used (which is default), each vector is shared among
Boris Ostrovsky 08/07/17 4:16 PM >>>
>On 08/06/2017 01:41 PM, Jan Beulich wrote:
> Boris Ostrovsky 08/04/17 7:03 PM >>>
>>> +/* See if any of the pages indeed need scrubbing. */
>>> +if ( first_dirty != INVALID_DIRTY_IDX )
>>> +{
>>> +
On 08/07/2017 04:18 AM, Jan Beulich wrote:
Boris Ostrovsky 07/31/17 10:03 PM >>>
>> We have limited number (slightly under NR_DYNAMIC_VECTORS=192) of IRQ
>> vectors that are available to each processor. Currently, when x2apic
>> cluster mode is used (which is default), each vector is shared a
flight 112510 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112510/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-xl-xsm 1 build-check(1) blocked n/a
build-arm64-pvops 2 hos
On 08/06/2017 01:41 PM, Jan Beulich wrote:
Boris Ostrovsky 08/04/17 7:03 PM >>>
>> @@ -873,6 +916,8 @@ static int reserve_offlined_page(struct page_info *head)
> >
>> while ( cur_order < head_order )
>> {
>> +unsigned int idx = INVALID_DIRTY_IDX;
> Is it correct for the variable
On Fri, 2017-08-04 at 13:05 -0400, Boris Ostrovsky wrote:
> Instead of scrubbing pages during guest destruction (from
> free_heap_pages()) do this opportunistically, from the idle loop.
>
> We might come to scrub_free_pages()from idle loop while another CPU
> uses mapcache override, resulting in a
Oleksandr Andrushchenko wrote:
> On 08/07/2017 04:11 PM, Clemens Ladisch wrote:
>> How does that interface work?
>
> For the buffer received in .copy_user/.copy_kernel we send
> a request to the backend and get response back (async) when it has copied
> the bytes into HW/mixer/etc, so the buffer at
On 08/07/2017 04:11 PM, Clemens Ladisch wrote:
Oleksandr Andrushchenko wrote:
On 08/07/2017 01:27 PM, Clemens Ladisch wrote:
You have to implement period interrupts (and the .pointer callback)
based on when the samples are actually moved from/to the backend.
Do you think I can implement this i
Oleksandr Andrushchenko wrote:
> On 08/07/2017 01:27 PM, Clemens Ladisch wrote:
>> You have to implement period interrupts (and the .pointer callback)
>> based on when the samples are actually moved from/to the backend.
>
> Do you think I can implement this in a slightly different way,
> without a
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 04 August 2017 13:16
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> Wei Liu
> Subject: Re: [PATCH 4/5] tools/libxenforeignmemory: add support for
> resource mapping
>
> On Wed, Aug 02, 201
> -Original Message-
> From: Marek Marczykowski-Górecki
> [mailto:marma...@invisiblethingslab.com]
> Sent: 04 August 2017 14:02
> To: Wei Liu
> Cc: Paul Durrant ; xen-de...@lists.xenproject.org;
> Ian Jackson
> Subject: Re: [PATCH 5/5] tools/libxenctrl: use new xenforeignmemory API to
> s
> -Original Message-
> From: Wei Liu [mailto:wei.l...@citrix.com]
> Sent: 04 August 2017 13:26
> To: Paul Durrant
> Cc: xen-de...@lists.xenproject.org; Ian Jackson ;
> Wei Liu ; Marek Marczykowski-Górecki
>
> Subject: Re: [PATCH 5/5] tools/libxenctrl: use new xenforeignmemory API to
> see
On 08/07/2017 03:30 PM, Takashi Sakamoto wrote:
On Aug 7 2017 21:18, Oleksandr Andrushchenko wrote:
Your first patch includes code difference under line 26, thus it
expects existence of a file 'sound/drivers/xen-front.c' in tree.
However, the file is not introduced in any upstream yet; at lea
On Aug 7 2017 21:18, Oleksandr Andrushchenko wrote:
Your first patch includes code difference under line 26, thus it
expects existence of a file 'sound/drivers/xen-front.c' in tree.
However, the file is not introduced in any upstream yet; at least,
Linus's tree and Iwai-san's tree.
I missed th
From: Oleksandr Andrushchenko
Front sound driver has no real interrupts, so
playback/capture period passed interrupt needs to be emulated:
this is done via timer. Add required timer operations,
this is based on sound/drivers/dummy.c.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen
From: Oleksandr Andrushchenko
Implement shared buffer handling according to the
para-virtualized sound device protocol at xen/interface/io/sndif.h:
- manage buffer memory
- handle granted references
- handle page directories
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c
From: Oleksandr Andrushchenko
Implement essential initialization of the sound driver:
- introduce required data structures
- handle driver registration
- handle sound card registration
- register sound driver on backend connection
- remove sound driver on backend disconnect
Signed-off-by: Oleksa
From: Oleksandr Andrushchenko
Implement ALSA driver operations including:
- start/stop period interrupt emulation
- manage frontend/backend shraed buffers
- manage Xen bus event channel state
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 175 +++
From: Oleksandr Andrushchenko
Initialize virtual sound card with streams according to the
Xen store configuration.
Add stubs for stream PCM operations.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 232 ++
1 file changed, 232
From: Oleksandr Andrushchenko
Introduce Kconfig option to enable Xen para-virtualized sound
frontend driver. Also add sound frontend to the Makefile.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/Kconfig | 12
sound/drivers/Makefile | 2 ++
2 files changed, 14 inserti
From: Oleksandr Andrushchenko
Implement frontend to backend communication according to
the para-virtualized sound protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 302 +++---
1 file changed, 288 i
From: Oleksandr Andrushchenko
Initial handling for Xen bus states: implement
Xen bus state machine for the front driver according to
the state diagram and recovery flow from sound para-virtualized
protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-
From: Oleksandr Andrushchenko
1. Create event channels for all configured streams and publish
corresponding ring references and event channels in Xen store,
so backend can connect.
2. Implement event channel interrupt handler.
3. Create and destroy event channels with respect to Xen bus state.
S
From: Oleksandr Andrushchenko
Add essential driver private info structure, initialize
locks and implement probe/remove of the Xen frontend
driver.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 27 +++
1 file changed, 27 insertions(+)
diff --git
From: Oleksandr Andrushchenko
Read configuration values from Xen store according
to xen/interface/io/sndif.h protocol:
- introduce configuration structures for different
components, e.g. sound card, device, stream
- read PCM HW parameters, e.g rate, format etc.
- detect stream type (capture/pla
From: Oleksandr Andrushchenko
Introduce skeleton of the para-virtualized Xen sound
frontend driver. This patch only adds required
essential stubs.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 78 +++
1 file changed, 78 inser
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following limitations:
- mute/unmute is not supported
- get/set volume is not supported
Volume control is not
flight 112496 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112496/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-arm64-arm64-libvirt-xsm 1 build-check(1) blocked n/a
test-arm64-arm64-xl 1 build-che
On 08/07/2017 03:09 PM, Takashi Sakamoto wrote:
Hi,
On Aug 7 2017 20:50, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the fo
Hi,
On Aug 7 2017 20:50, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following limitations:
- mute/unmute is not support
From: Oleksandr Andrushchenko
Implement frontend to backend communication according to
the para-virtualized sound protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 302 +++---
1 file changed, 288 i
From: Oleksandr Andrushchenko
1. Create event channels for all configured streams and publish
corresponding ring references and event channels in Xen store,
so backend can connect.
2. Implement event channel interrupt handler.
3. Create and destroy event channels with respect to Xen bus state.
S
From: Oleksandr Andrushchenko
Implement essential initialization of the sound driver:
- introduce required data structures
- handle driver registration
- handle sound card registration
- register sound driver on backend connection
- remove sound driver on backend disconnect
Signed-off-by: Oleksa
From: Oleksandr Andrushchenko
Initial handling for Xen bus states: implement
Xen bus state machine for the front driver according to
the state diagram and recovery flow from sound para-virtualized
protocol: xen/interface/io/sndif.h.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-
From: Oleksandr Andrushchenko
Implement shared buffer handling according to the
para-virtualized sound device protocol at xen/interface/io/sndif.h:
- manage buffer memory
- handle granted references
- handle page directories
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c
From: Oleksandr Andrushchenko
Add essential driver private info structure, initialize
locks and implement probe/remove of the Xen frontend
driver.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 27 +++
1 file changed, 27 insertions(+)
diff --git
From: Oleksandr Andrushchenko
Initialize virtual sound card with streams according to the
Xen store configuration.
Add stubs for stream PCM operations.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 232 ++
1 file changed, 232
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following limitations:
- mute/unmute is not supported
- get/set volume is not supported
Volume control is not
From: Oleksandr Andrushchenko
Front sound driver has no real interrupts, so
playback/capture period passed interrupt needs to be emulated:
this is done via timer. Add required timer operations,
this is based on sound/drivers/dummy.c.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen
From: Oleksandr Andrushchenko
Read configuration values from Xen store according
to xen/interface/io/sndif.h protocol:
- introduce configuration structures for different
components, e.g. sound card, device, stream
- read PCM HW parameters, e.g rate, format etc.
- detect stream type (capture/pla
From: Oleksandr Andrushchenko
Implement ALSA driver operations including:
- start/stop period interrupt emulation
- manage frontend/backend shraed buffers
- manage Xen bus event channel state
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/xen-front.c | 175 +++
From: Oleksandr Andrushchenko
Introduce Kconfig option to enable Xen para-virtualized sound
frontend driver. Also add sound frontend to the Makefile.
Signed-off-by: Oleksandr Andrushchenko
---
sound/drivers/Kconfig | 12
sound/drivers/Makefile | 2 ++
2 files changed, 14 inserti
Hi,
On Aug 7 2017 16:43, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with the following limitations:
- mute/unmute is not support
Hi,
On 08/07/2017 02:28 PM, Takashi Sakamoto wrote:
Hi,
On Aug 7 2017 16:43, Oleksandr Andrushchenko wrote:
From: Oleksandr Andrushchenko
This patch series adds support for Xen [1] para-virtualized
sound frontend driver. It implements the protocol from
include/xen/interface/io/sndif.h with t
Hi, Clemens!
On 08/07/2017 01:27 PM, Clemens Ladisch wrote:
Oleksandr Andrushchenko wrote:
Front sound driver has no real interrupts, so
playback/capture period passed interrupt needs to be emulated:
this is done via timer. Add required timer operations,
this is based on sound/drivers/dummy.c.
flight 112507 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/112507/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-i386 10 debian-hvm-install fail REGR. vs.
112402
test-
Please avoid dropping xen-devel...
On 07/08/17 11:52, Raviprasad Gurikar wrote:
hii
i am not able to run the xen on fastmodel...please solve my problem.
I will not be able to help until you provide the details I asked below.
Cheers,
On Mon, Aug 7, 2017 at 4:19 PM, Julien Grall mailto:julie
On 04/08/17 07:41, Raviprasad Gurikar wrote:
hi sir
Hello,
I am student doing project on the arm virtualization using the xen
hypervisor i not able run the xen on the foundation model v8. i have
follow the xen arm crosscompilation and the xen arm rootfilesystem then
i follwed the xen arm i
On Mon, Aug 07, 2017 at 11:19:09AM +0100, Wei Liu wrote:
> Can we see about committing this patch as soon as possible? This is
> blocking osstest pushgate.
Andrew prodded me on irc to commit this patch. I have done so, along
with the doc patch.
___
Xen-
Hi Boris,
I would have appreciated to be CCed as maintainer of the ARM bits...
Please use scripts/get_maintainers.pl in the future.
On 04/08/17 18:05, Boris Ostrovsky wrote:
. so that it's easy to find pages that need to be scrubbed (those pages are
Pointless .
diff --git a/xen/include/as
Oleksandr Andrushchenko wrote:
> Front sound driver has no real interrupts, so
> playback/capture period passed interrupt needs to be emulated:
> this is done via timer. Add required timer operations,
> this is based on sound/drivers/dummy.c.
A 'real' sound card use the interrupt to synchronize th
1 - 100 of 159 matches
Mail list logo