Re: [XEN v3 3/3] xen/arm: arm32: Add emulation of Debug Data Transfer Registers

2024-01-07 Thread Michal Orzel
Hi Ayan, On 05/01/2024 12:21, Ayan Kumar Halder wrote: > DBGOSLSR is emulated in the same way as its AArch64 variant (ie OSLSR_EL1). > This is to ensure that DBGOSLSR.OSLK is 0, thus MDSCR_EL1.TXfull is treated > as UNK/SBZP. No need for this dot and yet another thus (it reads difficult). You

Re: [XEN v3 2/3] xen/arm: arm64: Add emulation of Debug Data Transfer Registers

2024-01-07 Thread Michal Orzel
Hi Ayan, On 05/01/2024 12:21, Ayan Kumar Halder wrote: > From: Michal Orzel > > Currently if user enables HVC_DCC config option in Linux, it invokes access > to debug data transfer registers (ie DBGDTRTX_EL0 on arm64, DBGDTRTXINT on > arm32). As these registers are not emulated, Xen injects an

Re: [XEN v3 1/3] xen/arm: Introduce CONFIG_PARTIAL_EMULATION and "partial-emulation" cmd option

2024-01-07 Thread Michal Orzel
Hi Ayan, On 05/01/2024 12:21, Ayan Kumar Halder wrote: > > > There can be situations when the registers cannot be emulated to their full > functionality. This can be due to the complexity involved. In such cases, one > can emulate those registers as RAZ/WI. We call them as partial emulation. I

[ovmf test] 184272: all pass - PUSHED

2024-01-07 Thread osstest service owner
flight 184272 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/184272/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf ff1305c9fb171ad51bfc149c544e3ab5a0edf521 baseline version: ovmf

Re: [RFC XEN PATCH v4 5/5] libxl: Use gsi instead of irq for mapping pirq

2024-01-07 Thread Chen, Jiqian
On 2024/1/6 09:11, Stefano Stabellini wrote: > On Fri, 5 Jan 2024, Jiqian Chen wrote: >> In PVH dom0, it uses the linux local interrupt mechanism, >> when it allocs irq for a gsi, it is dynamic, and follow >> the principle of applying first, distributing first. And >> the irq number is alloced

[linux-linus test] 184270: tolerable FAIL - PUSHED

2024-01-07 Thread osstest service owner
flight 184270 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/184270/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-armhf-armhf-libvirt-raw 15 saverestore-support-check fail blocked in 184268

Re: [RFC XEN PATCH v4 4/5] domctl: Use gsi to grant/revoke irq permission

2024-01-07 Thread Chen, Jiqian
On 2024/1/6 09:08, Stefano Stabellini wrote: > On Fri, 5 Jan 2024, Jiqian Chen wrote: >> Some type of domain don't have PIRQ, like PVH, current >> implementation is not suitable for those domain. >> >> When passthrough a device to guest on PVH dom0, this >>

!qemu_in_coroutine() assert on ARM64 XEN

2024-01-07 Thread Peng Fan
Hi All, When enabling virtio disk and virtio net on Xen, I could see qemu blk assert and being killed sometimes, This is not 100% reproducible. I am using qemu master branch 7425b6277f12e82952cede1f531bfc689bf77fb1 (HEAD -> dummy, origin/staging, origin/master, origin/HEAD, master) Merge tag

[PATCH] hw/i386/pc_piix: Make piix_intx_routing_notifier_xen() more device independent

2024-01-07 Thread Bernhard Beschow
This is a follow-up on commit 89965db43cce "hw/isa/piix3: Avoid Xen-specific variant of piix3_write_config()" which introduced piix_intx_routing_notifier_xen(). This function is implemented in board code but accesses the PCI configuration space of the PIIX ISA function to determine the PCI

[linux-linus test] 184268: tolerable FAIL - PUSHED

2024-01-07 Thread osstest service owner
flight 184268 linux-linus real [real] flight 184269 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/184268/ http://logs.test-lab.xenproject.org/osstest/logs/184269/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking):

xen | Successful pipeline for staging | 5a3ace21

2024-01-07 Thread GitLab
Pipeline #1129775950 has passed! Project: xen ( https://gitlab.com/xen-project/xen ) Branch: staging ( https://gitlab.com/xen-project/xen/-/commits/staging ) Commit: 5a3ace21 ( https://gitlab.com/xen-project/xen/-/commit/5a3ace21f3d779b291a2d305824b2820d88de7f1 ) Commit Message: xen/arm:

[PATCH v2] xen/gntdev: Fix the abuse of underlying struct page in DMA-buf import

2024-01-07 Thread Oleksandr Tyshchenko
From: Oleksandr Tyshchenko DO NOT access the underlying struct page of an sg table exported by DMA-buf in dmabuf_imp_to_refs(), this is not allowed. Please see drivers/dma-buf/dma-buf.c:mangle_sg_table() for details. Fortunately, here (for special Xen device) we can avoid using pages and

[xen-unstable test] 184267: tolerable FAIL

2024-01-07 Thread osstest service owner
flight 184267 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/184267/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-armhf-xl-vhd 17 guest-start/debian.repeat fail pass in 184264 Tests which did not succeed,