[linux-linus test] 186608: tolerable FAIL - PUSHED

2024-06-30 Thread osstest service owner
flight 186608 linux-linus real [real] flight 186614 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/186608/ http://logs.test-lab.xenproject.org/osstest/logs/186614/ Failures :-/ but no regressions. Tests which are failing intermittently (not blocking): test-armhf-

Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()

2024-06-30 Thread Petr Tesařík
On Mon, 1 Jul 2024 06:36:15 +0200 "h...@lst.de" wrote: > On Sun, Jun 30, 2024 at 02:02:52PM +, Michael Kelley wrote: > > 1) Rename is_swiotlb_buffer() to swiotlb_find_pool(), since it > > now returns a pool. A NULL return value indicates that the > > paddr is not an swiotlb buffer. > > > >

Re: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()

2024-06-30 Thread h...@lst.de
On Sun, Jun 30, 2024 at 02:02:52PM +, Michael Kelley wrote: > 1) Rename is_swiotlb_buffer() to swiotlb_find_pool(), since it > now returns a pool. A NULL return value indicates that the > paddr is not an swiotlb buffer. > > 2) Similarly, rename is_xen_swiotlb_buffer() to > xen_swiotlb_find_po

[ovmf test] 186612: all pass - PUSHED

2024-06-30 Thread osstest service owner
flight 186612 ovmf real [real] http://logs.test-lab.xenproject.org/osstest/logs/186612/ Perfect :-) All tests in this flight passed as required version targeted for testing: ovmf 8c09d862bfb034e00b6b3bc37fe37243c866dd3a baseline version: ovmf 3b2025969e6e8a2f65429

[linux-linus test] 186600: regressions - FAIL

2024-06-30 Thread osstest service owner
flight 186600 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/186600/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 8 xen-bootfail REGR. vs. 186562 Tests which are fai

[linux-linus test] 186594: regressions - FAIL

2024-06-30 Thread osstest service owner
flight 186594 linux-linus real [real] http://logs.test-lab.xenproject.org/osstest/logs/186594/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-armhf-armhf-xl-multivcpu 8 xen-bootfail REGR. vs. 186562 Tests which are fai

RE: [RFC 1/1] swiotlb: Reduce calls to swiotlb_find_pool()

2024-06-30 Thread Michael Kelley
From: h...@lst.de Sent: Saturday, June 29, 2024 10:56 PM > > On Sat, Jun 29, 2024 at 03:55:58PM +, Michael Kelley wrote: > > Unless there is further discussion on this point, I'll just keep the > > original > > "is_swiotlb_buffer()" in v2. > > That is the wrong name for something that retur

Question: xen + vhost user

2024-06-30 Thread Peng Fan
Hi All, I am trying to enable vhost user input with xen hypervisor on i.MX95, using qemu vhost-user-input. But meet " Invalid vring_addr message ". My xen domu cfg: '-chardev', 'socket,path=/tmp/input.sock,id=mouse0', '-device', 'vhost-user-input-pci,chardev=mouse0', Anyone knows what missing?

[XEN PATCH v11 6/8] tools/libxc: Allow gsi be mapped into a free pirq

2024-06-30 Thread Jiqian Chen
Hypercall PHYSDEVOP_map_pirq support to map a gsi into a specific pirq or a free pirq, it depends on the parameter pirq(>0 or <0). But in current xc_physdev_map_pirq, it set *pirq=index when parameter pirq is <0, it causes to force all cases to be mapped to a specific pirq. That has some problems,

[RFC XEN PATCH v11 8/8] tools: Add new function to do PIRQ (un)map on PVH dom0

2024-06-30 Thread Jiqian Chen
When dom0 is PVH, and passthrough a device to dumU, xl will use the gsi number of device to do a pirq mapping, see pci_add_dm_done->xc_physdev_map_pirq, but the gsi number is got from file /sys/bus/pci/devices//irq, that confuses irq and gsi, they are in different space and are not equal, so it wil

[XEN PATCH v11 0/8] Support device passthrough when dom0 is PVH on Xen

2024-06-30 Thread Jiqian Chen
Hi All, This is v11 series to support passthrough when dom0 is PVH v10->v11 changes: * patch#1: Move the curly braces of "case PHYSDEVOP_pci_device_state_reset" to the next line. Delete unnecessary local variables "struct physdev_pci_device *dev". Downgrade printk to dprintk.

[XEN PATCH v11 3/8] x86/pvh: Add PHYSDEVOP_setup_gsi for PVH dom0

2024-06-30 Thread Jiqian Chen
The gsi of a passthrough device must be configured for it to be able to be mapped into a hvm domU. But When dom0 is PVH, the gsis don't get registered, it causes the info of apic, pin and irq not be added into irq_2_pin list, and the handler of irq_desc is not set, then when passthrough a device, s

[XEN PATCH v11 2/8] x86/pvh: Allow (un)map_pirq when dom0 is PVH

2024-06-30 Thread Jiqian Chen
If run Xen with PVH dom0 and hvm domU, hvm will map a pirq for a passthrough device by using gsi, see qemu code xen_pt_realize->xc_physdev_map_pirq and libxl code pci_add_dm_done->xc_physdev_map_pirq. Then xc_physdev_map_pirq will call into Xen, but in hvm_physdev_op, PHYSDEVOP_map_pirq is not allo

[RFC XEN PATCH v11 7/8] tools: Add new function to get gsi from dev

2024-06-30 Thread Jiqian Chen
When passthrough a device to domU, QEMU and xl tools use its gsi number to do pirq mapping, see QEMU code xen_pt_realize->xc_physdev_map_pirq, and xl code pci_add_dm_done->xc_physdev_map_pirq, but the gsi number is got from file /sys/bus/pci/devices//irq, that is wrong, because irq is not equal wit

[XEN PATCH v11 5/8] x86/domctl: Add XEN_DOMCTL_gsi_permission to grant gsi

2024-06-30 Thread Jiqian Chen
Some type of domain don't have PIRQs, like PVH, it doesn't do PHYSDEVOP_map_pirq for each gsi. When passthrough a device to guest base on PVH dom0, callstack pci_add_dm_done->XEN_DOMCTL_irq_permission will fail at function domain_pirq_to_irq, because PVH has no mapping of gsi, pirq and irq on Xen s

[XEN PATCH v11 4/8] x86/physdev: Return pirq that irq was already mapped to

2024-06-30 Thread Jiqian Chen
allocate_pirq is to allocate a pirq for a irq, and it supports to allocate a free pirq(pirq parameter is <0) or a specific pirq (pirq parameter is > 0). For current code, it has four usecases. First, pirq>0 and current_pirq>0, (current_pirq means if irq already has a mapped pirq), if pirq==curren

[XEN PATCH v11 1/8] xen/vpci: Clear all vpci status of device

2024-06-30 Thread Jiqian Chen
When a device has been reset on dom0 side, the vpci on Xen side won't get notification, so the cached state in vpci is all out of date compare with the real device state. To solve that problem, add a new hypercall to clear all vpci device state. When the state of device is reset on dom0 side, dom0

[xen-unstable test] 186588: tolerable FAIL

2024-06-30 Thread osstest service owner
flight 186588 xen-unstable real [real] http://logs.test-lab.xenproject.org/osstest/logs/186588/ Failures :-/ but no regressions. Tests which did not succeed, but are not blocking: test-amd64-amd64-xl-qemut-win7-amd64 19 guest-stopfail like 186568 test-amd64-amd64-xl-qemuu-ws16-amd64

[linux-linus test] 186586: regressions - FAIL

2024-06-30 Thread osstest service owner
flight 186586 linux-linus real [real] flight 186592 linux-linus real-retest [real] http://logs.test-lab.xenproject.org/osstest/logs/186586/ http://logs.test-lab.xenproject.org/osstest/logs/186592/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run