Juergen, Boris,
can we please merge these via Xen Linux tree as I have collected enough Ack/R-b?
The series has DRM patches, but those anyway are Xen related, so I think
this should be fine from DRI point of view.
Thank you,
Oleksandr
On 8/13/20 9:21 AM, Oleksandr Andrushchenko wrote:
> From:
From: Oleksandr Andrushchenko
While importing a dmabuf it is possible that the data of the buffer
is put with offset which is indicated by the SGT offset.
Respect the offset value and forward it to the backend.
Signed-off-by: Oleksandr Andrushchenko
Acked-by: Noralf Trønnes
---
drivers/gpu/dr
From: Oleksandr Andrushchenko
Add YUYV to supported formats, so the frontend can work with the
formats used by cameras and other HW.
Signed-off-by: Oleksandr Andrushchenko
Acked-by: Noralf Trønnes
---
drivers/gpu/drm/xen/xen_drm_front_conn.c | 1 +
1 file changed, 1 insertion(+)
diff --git a
From: Oleksandr Andrushchenko
This is the sync up with the canonical definition of the
display protocol in Xen.
1. Add protocol version as an integer
Version string, which is in fact an integer, is hard to handle in the
code that supports different protocol versions. To simplify that
also add t
From: Oleksandr Andrushchenko
Hello,
This series contains an assorted set of fixes and improvements for
the Xen para-virtualized display driver and grant device driver which
I have collected over the last couple of months:
1. Minor fixes to grant device driver and drm/xen-front.
2. New format
From: Oleksandr Andrushchenko
The patch c575b7eeb89f: "drm/xen-front: Add support for Xen PV
display frontend" from Apr 3, 2018, leads to the following static
checker warning:
drivers/gpu/drm/xen/xen_drm_front_gem.c:140 xen_drm_front_gem_create()
warn: passing zero to 'ERR_CAST'
From: Oleksandr Andrushchenko
It is possible that the scatter-gather table during dmabuf import has
non-zero offset of the data, but user-space doesn't expect that.
Fix this by failing the import, so user-space doesn't access wrong data.
Fixes: bf8dc55b1358 ("xen/gntdev: Implement dma-buf import
flight 152566 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152566/
Failures :-/ but no regressions.
Tests which are failing intermittently (not blocking):
test-armhf-armhf-xl-rtds 16 guest-start/debian.repeat fail pass in 152559
test-amd64-amd64-xl-qemut-debian
On 12/08/2020 20:06, Trammell Hudson wrote:
> On Wednesday, August 12, 2020 8:16 PM, Andrew Cooper
> wrote:
>
>> However, the use of LINE creates problems for livepatch builds, as
>> it causes the binary diffing tools to believe these changed, based on a
>> change earlier in the file.
> Ah, I had
On Wed, 12 Aug 2020, Oleksandr wrote:
> On 12.08.20 01:47, Stefano Stabellini wrote:
> > On Tue, 11 Aug 2020, Oleksandr wrote:
> > > On 11.08.20 12:19, Julien Grall wrote:
> > > > On 11/08/2020 00:34, Stefano Stabellini wrote:
> > > > > On Mon, 10 Aug 2020, Oleksandr wrote:
> > > > > > On 08.08.20
On 12/08/2020 18:42, Trammell Hudson wrote:
> There are parameters in xen/arch/x86/boot/cmdline.c that
> are only used early in the boot process, so handlers are
> necessary to avoid an "Unknown command line option" in
> dmesg.
>
> This also updates ignore_param() to generate a temporary
> variable
On Wednesday, August 12, 2020 8:16 PM, Andrew Cooper
wrote:
> However, the use of LINE creates problems for livepatch builds, as
> it causes the binary diffing tools to believe these changed, based on a
> change earlier in the file.
Ah, I hadn't considered that. Makes sense that the
determinis
osstest's infrastructure hosts need upgrading to Debian "buster" (aka
Debian "stable"). We are planning to do this on Monday the 17th of
August.
This will involve telling osstest to start draining its queues some
time around the 15th of August. If all goes well, it will be back in
operation late
Sorry for not replying earlier, wanted to finish something first.
On Tue, Aug 11, 2020 at 02:25:16PM +0100, David Woodhouse wrote:
> Resending this straw man patch at Roger's request, to restart discussion.
>
> Redux: In order to cope with the relatively rare case of unmaskable
> legacy MSIs, eac
There are parameters in xen/arch/x86/boot/cmdline.c that
are only used early in the boot process, so handlers are
necessary to avoid an "Unknown command line option" in
dmesg.
This also updates ignore_param() to generate a temporary
variable name so that the macro can be used more than once
per fi
flight 152565 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152565/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-ws16-amd64 7 xen-boot fail REGR. vs. 152332
test-amd64-i386-qem
Change the last parameter of the update_eoi_exit_bitmap helper to be a
set/clear boolean instead of a triggering field. This is already
inline with how the function is implemented, and will allow deciding
whether an exit is required by the higher layers that call into
update_eoi_exit_bitmap. Note t
Add a new vlapic_set_irq_callback helper in order to inject a vector
and set a callback to be executed when the guest performs the end of
interrupt acknowledgment.
Such functionality will be used to migrate the current ad hoc handling
done in vlapic_handle_EOI for the vectors that require some log
Switch the emulated IO-APIC code to use the local APIC EOI callback
mechanism. This allows to remove the last hardcoded callback from
vlapic_handle_EOI.
Move and rename the vioapic_update_EOI now that it can be made static.
Signed-off-by: Roger Pau Monné
---
xen/arch/x86/hvm/vioapic.c | 90
Hello,
The following series attempts to implement EOI callbacks for vlapic
injected vectors, this allows to remove the hardcoded callbacks in
vlapic_handle_EOI. Instead a new vlapic vector injection helper is
provided, that takes two extra parameters in order to pass a callback and
an opaque data
Remove the unconditional call to hvm_dpci_msi_eoi in vlapic_handle_EOI
and instead use the newly introduced EOI callback mechanism in order
to register a callback for MSI vectors injected from passed through
devices.
Signed-off-by: Roger Pau Monné
---
xen/arch/x86/hvm/vlapic.c| 2 --
xen/ar
Switch synic interrupts to use an EOI callback in order to execute the
logic tied to the end of interrupt. This allows to remove the synic
call in vlapic_handle_EOI.
Move and rename viridian_synic_ack_sint now that it can be made
static.
Signed-off-by: Roger Pau Monné
---
I'm unsure about the lo
flight 152569 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152569/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 151777
build-i386-libvirt
Hi Julien
@@ -2275,6 +2282,16 @@ static void check_for_vcpu_work(void)
*/
void leave_hypervisor_to_guest(void)
{
+#ifdef CONFIG_IOREQ_SERVER
+ /*
+ * XXX: Check the return. Shall we call that in
+ * continue_running and context_switch instead?
+ * The benefits would b
On 12.08.20 01:47, Stefano Stabellini wrote:
Hi Stefano
On Tue, 11 Aug 2020, Oleksandr wrote:
On 11.08.20 12:19, Julien Grall wrote:
On 11/08/2020 00:34, Stefano Stabellini wrote:
On Mon, 10 Aug 2020, Oleksandr wrote:
On 08.08.20 01:19, Oleksandr wrote:
On 08.08.20 00:50, Stefano Stabell
> -Original Message-
> From: Jan Beulich
> Sent: 06 August 2020 13:54
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ; Kevin
> Tian
>
> Subject: Re: [PATCH v4 14/14] vtd: use a bit field for dma_pte
>
> On 04.08.2020 15:42, Paul Durrant wrote:
> > --- a/xen/drive
> -Original Message-
> From: Jan Beulich
> Sent: 06 August 2020 13:47
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Paul Durrant ; Kevin
> Tian
>
> Subject: Re: [PATCH v4 13/14] vtd: use a bit field for context_entry
>
> On 04.08.2020 15:42, Paul Durrant wrote:
> > @@ -208,3
flight 152571 xen-unstable-smoke real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152571/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-libvirt 13 migrate-support-checkfail never pass
test-arm64-arm64-xl-xsm 1
> -Original Message-
> From: Jan Beulich
> Sent: 06 August 2020 13:34
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Durrant, Paul ;
> Kevin Tian
>
> Subject: RE: [EXTERNAL] [PATCH v4 12/14] vtd: use a bit field for root_entry
>
> CAUTION: This email originated from outside o
flight 152563 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152563/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-xl-qemuu-debianhvm-i386-xsm 18 guest-start/debianhvm.repeat
fail REGR. vs. 15249
On Wed, Aug 12, 2020 at 09:28:45AM +0200, Jürgen Groß wrote:
> On 11.08.20 11:44, Roger Pau Monne wrote:
> > To be used in order to create foreign mappings. This is based on the
> > ZONE_DEVICE facility which is used by persistent memory devices in
> > order to create struct pages and kernel virtua
flight 152570 xen-unstable-coverity real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152570/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xen 7a4dd361d10718608ad37f969df0a3cf5bc17b12
baseline version:
xen 90c7
flight 152564 xtf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152564/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
xtf 17d372b763cb0b2e2e6b5a637c11f3997d2533fa
baseline version:
xtf ba5923110c2f562170b82f
Signed-off-by: Wei Liu
---
tools/libfsimage/common/Makefile | 2 +-
tools/libvchan/Makefile | 2 +-
tools/libxc/Makefile | 2 +-
tools/libxl/Makefile | 4 ++--
tools/xenstat/libxenstat/Makefile | 2 +-
5 files changed, 6 insertions(+), 6 deletions(-)
diff --g
Signed-off-by: Wei Liu
---
Config.mk | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Config.mk b/Config.mk
index 4093dcb9e366..3603cf4ca58d 100644
--- a/Config.mk
+++ b/Config.mk
@@ -244,7 +244,7 @@ QEMU_TRADITIONAL_URL ?=
git://xenbits.xen.org/qemu-xen-traditional.git
SEABI
> -Original Message-
> From: Jan Beulich
> Sent: 06 August 2020 11:29
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Durrant, Paul ;
> Andrew Cooper
> ; Wei Liu ; Roger Pau Monné
> ; George
> Dunlap ; Ian Jackson ;
> Julien Grall
> ; Stefano Stabellini ; Jun Nakajima
> ;
> K
flight 152562 linux-5.4 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/152562/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-armhf-armhf-xl-rtds 16 guest-start/debian.repeatfail like 152514
test-amd64-i386-xl-pvshim12 guest-s
Hi,
On 11/08/2020 23:48, Stefano Stabellini wrote:
I have the impression that we disagree in what the Device Emulator is meant to
do. IHMO, the goal of the device emulator is to emulate a device in an
arch-agnostic way.
That would be great in theory but I am not sure it is achievable: if we
us
On 11.08.20 11:44, Roger Pau Monne wrote:
To be used in order to create foreign mappings. This is based on the
ZONE_DEVICE facility which is used by persistent memory devices in
order to create struct pages and kernel virtual mappings for the IOMEM
areas of such devices. Note that on kernels with
39 matches
Mail list logo