Message ID | ebdcefb5ab4b9053dee7c090b4e6562e597b3474.1592151144.git.gorbak25@gmail.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | libxl: tooling expects wrong errno | expand |
Grzegorz Uriasz writes ("[PATCH] libxl: tooling expects wrong errno"): > When iommu is not enabled for a given domain then pci passthrough > hypercalls such as xc_test_assign_device return EOPNOTSUPP. > The code responsible for this is in "iommu_do_domctl" inside > xen/drivers/passthrough/iommu.c > This patch fixes the error message reported by libxl when assigning > pci devices to domains without iommu. > > Signed-off-by: Grzegorz Uriasz <gorbak25@gmail.com> > Tested-by: Grzegorz Uriasz <gorbak25@gmail.com> > --- > tools/libxl/libxl_pci.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c > index 957ff5c8e9..bc5843b137 100644 > --- a/tools/libxl/libxl_pci.c > +++ b/tools/libxl/libxl_pci.c > @@ -1561,7 +1561,7 @@ void libxl__device_pci_add(libxl__egc *egc, uint32_t domid, > LOGD(ERROR, domid, > "PCI device %04x:%02x:%02x.%u %s?", > pcidev->domain, pcidev->bus, pcidev->dev, pcidev->func, > - errno == ENOSYS ? "cannot be assigned - no IOMMU" > + errno == EOPNOTSUPP ? "cannot be assigned - no IOMMU" > : "already assigned to a different guest"); > goto out; > } Thanks. I have addressed some Xen IOMMU maintainers. Can you confirm whether this is right ? Regards, Ian.
On Mon, Jun 15, 2020 at 03:59:50PM +0100, Ian Jackson wrote: > Grzegorz Uriasz writes ("[PATCH] libxl: tooling expects wrong errno"): > > When iommu is not enabled for a given domain then pci passthrough > > hypercalls such as xc_test_assign_device return EOPNOTSUPP. > > The code responsible for this is in "iommu_do_domctl" inside > > xen/drivers/passthrough/iommu.c > > This patch fixes the error message reported by libxl when assigning > > pci devices to domains without iommu. > > > > Signed-off-by: Grzegorz Uriasz <gorbak25@gmail.com> > > Tested-by: Grzegorz Uriasz <gorbak25@gmail.com> > > --- > > tools/libxl/libxl_pci.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c > > index 957ff5c8e9..bc5843b137 100644 > > --- a/tools/libxl/libxl_pci.c > > +++ b/tools/libxl/libxl_pci.c > > @@ -1561,7 +1561,7 @@ void libxl__device_pci_add(libxl__egc *egc, uint32_t domid, > > LOGD(ERROR, domid, > > "PCI device %04x:%02x:%02x.%u %s?", > > pcidev->domain, pcidev->bus, pcidev->dev, pcidev->func, > > - errno == ENOSYS ? "cannot be assigned - no IOMMU" > > + errno == EOPNOTSUPP ? "cannot be assigned - no IOMMU" > > : "already assigned to a different guest"); > > goto out; > > } > > Thanks. I have addressed some Xen IOMMU maintainers. Can you confirm > whether this is right ? Not an IOMMU maintainer myself, but I've taken a look at the code and I think Grzegorz is right. iommu_do_domctl will return -EOPNOTSUPP if the IOMMU is not enabled for the domain. Another option would be to check for EBUSY (which will certainly be returned when the device is busy) and log the error code with a message when it's different than EBUSY? There are many possible error here, for example the device itself might not be behind an IOMMU, in which case Xen will return -ENODEV at least on the Intel case. Thanks, Roger.
> -----Original Message----- > From: Roger Pau Monné <roger.pau@citrix.com> > Sent: 15 June 2020 16:57 > To: Ian Jackson <ian.jackson@citrix.com> > Cc: Grzegorz Uriasz <gorbak25@gmail.com>; Jan Beulich <jbeulich@suse.com>; Andrew Cooper > <andrew.cooper3@citrix.com>; Kevin Tian <kevin.tian@intel.com>; Paul Durrant <paul@xen.org>; Wei Liu > <wl@xen.org>; jakub@bartmin.ski; marmarek@invisiblethingslab.com; j.nowak26@student.uw.edu.pl; Anthony > Perard <anthony.perard@citrix.com>; xen-devel@lists.xenproject.org; contact@puzio.waw.pl > Subject: Re: [PATCH] libxl: tooling expects wrong errno > > On Mon, Jun 15, 2020 at 03:59:50PM +0100, Ian Jackson wrote: > > Grzegorz Uriasz writes ("[PATCH] libxl: tooling expects wrong errno"): > > > When iommu is not enabled for a given domain then pci passthrough > > > hypercalls such as xc_test_assign_device return EOPNOTSUPP. > > > The code responsible for this is in "iommu_do_domctl" inside > > > xen/drivers/passthrough/iommu.c > > > This patch fixes the error message reported by libxl when assigning > > > pci devices to domains without iommu. > > > > > > Signed-off-by: Grzegorz Uriasz <gorbak25@gmail.com> > > > Tested-by: Grzegorz Uriasz <gorbak25@gmail.com> > > > --- > > > tools/libxl/libxl_pci.c | 2 +- > > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > > > diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c > > > index 957ff5c8e9..bc5843b137 100644 > > > --- a/tools/libxl/libxl_pci.c > > > +++ b/tools/libxl/libxl_pci.c > > > @@ -1561,7 +1561,7 @@ void libxl__device_pci_add(libxl__egc *egc, uint32_t domid, > > > LOGD(ERROR, domid, > > > "PCI device %04x:%02x:%02x.%u %s?", > > > pcidev->domain, pcidev->bus, pcidev->dev, pcidev->func, > > > - errno == ENOSYS ? "cannot be assigned - no IOMMU" > > > + errno == EOPNOTSUPP ? "cannot be assigned - no IOMMU" > > > : "already assigned to a different guest"); > > > goto out; > > > } > > > > Thanks. I have addressed some Xen IOMMU maintainers. Can you confirm > > whether this is right ? > > Not an IOMMU maintainer myself, but I've taken a look at the code and > I think Grzegorz is right. iommu_do_domctl will return -EOPNOTSUPP if > the IOMMU is not enabled for the domain. Another option would be to > check for EBUSY (which will certainly be returned when the device is > busy) and log the error code with a message when it's different than > EBUSY? > > There are many possible error here, for example the device itself > might not be behind an IOMMU, in which case Xen will return -ENODEV at > least on the Intel case. ENOSYS is certainly wrong; it should only be used to indicate an unimplemented hypercall. I think Roger's suggestion of avoiding EBUSY and use LOGED would be better though. Paul > > Thanks, Roger.
Roger Pau Monne writes ("Re: [PATCH] libxl: tooling expects wrong errno"): > On Mon, Jun 15, 2020 at 03:59:50PM +0100, Ian Jackson wrote: > > Grzegorz Uriasz writes ("[PATCH] libxl: tooling expects wrong errno"): > > > When iommu is not enabled for a given domain then pci passthrough > > > hypercalls such as xc_test_assign_device return EOPNOTSUPP. > > > The code responsible for this is in "iommu_do_domctl" inside > > > xen/drivers/passthrough/iommu.c > > > This patch fixes the error message reported by libxl when assigning > > > pci devices to domains without iommu. > > > > > > Signed-off-by: Grzegorz Uriasz <gorbak25@gmail.com> > > > Tested-by: Grzegorz Uriasz <gorbak25@gmail.com> > > > --- > > > tools/libxl/libxl_pci.c | 2 +- > > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > > > diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c > > > index 957ff5c8e9..bc5843b137 100644 > > > --- a/tools/libxl/libxl_pci.c > > > +++ b/tools/libxl/libxl_pci.c > > > @@ -1561,7 +1561,7 @@ void libxl__device_pci_add(libxl__egc *egc, uint32_t domid, > > > LOGD(ERROR, domid, > > > "PCI device %04x:%02x:%02x.%u %s?", > > > pcidev->domain, pcidev->bus, pcidev->dev, pcidev->func, > > > - errno == ENOSYS ? "cannot be assigned - no IOMMU" > > > + errno == EOPNOTSUPP ? "cannot be assigned - no IOMMU" > > > : "already assigned to a different guest"); > > > goto out; > > > } > > > > Thanks. I have addressed some Xen IOMMU maintainers. Can you confirm > > whether this is right ? > > Not an IOMMU maintainer myself, but I've taken a look at the code and > I think Grzegorz is right. iommu_do_domctl will return -EOPNOTSUPP if > the IOMMU is not enabled for the domain. Another option would be to > check for EBUSY (which will certainly be returned when the device is > busy) and log the error code with a message when it's different than > EBUSY? > > There are many possible error here, for example the device itself > might not be behind an IOMMU, in which case Xen will return -ENODEV at > least on the Intel case. Thanks for the analysis. So: Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> This would seem to be a backport candidate. AFAICT check has been there, looking for ENOSYS, since this code was introduced in 826eb17271d3c647516d9944c47b0779afedea25 libxl: suppress device assignment to HVM guest when there is no IOMMU ? But that commit has a Tested-by. Maybe Xen changed its error return at some point ? Ian.
> -----Original Message----- > From: Ian Jackson <ian.jackson@citrix.com> > Sent: 15 June 2020 17:38 > To: Roger Pau Monne <roger.pau@citrix.com> > Cc: Grzegorz Uriasz <gorbak25@gmail.com>; Jan Beulich <jbeulich@suse.com>; Andrew Cooper > <Andrew.Cooper3@citrix.com>; Kevin Tian <kevin.tian@intel.com>; Paul Durrant <paul@xen.org>; Wei Liu > <wl@xen.org>; jakub@bartmin.ski; marmarek@invisiblethingslab.com; j.nowak26@student.uw.edu.pl; Anthony > Perard <anthony.perard@citrix.com>; xen-devel@lists.xenproject.org; contact@puzio.waw.pl > Subject: Re: [PATCH] libxl: tooling expects wrong errno > > Roger Pau Monne writes ("Re: [PATCH] libxl: tooling expects wrong errno"): > > On Mon, Jun 15, 2020 at 03:59:50PM +0100, Ian Jackson wrote: > > > Grzegorz Uriasz writes ("[PATCH] libxl: tooling expects wrong errno"): > > > > When iommu is not enabled for a given domain then pci passthrough > > > > hypercalls such as xc_test_assign_device return EOPNOTSUPP. > > > > The code responsible for this is in "iommu_do_domctl" inside > > > > xen/drivers/passthrough/iommu.c > > > > This patch fixes the error message reported by libxl when assigning > > > > pci devices to domains without iommu. > > > > > > > > Signed-off-by: Grzegorz Uriasz <gorbak25@gmail.com> > > > > Tested-by: Grzegorz Uriasz <gorbak25@gmail.com> > > > > --- > > > > tools/libxl/libxl_pci.c | 2 +- > > > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > > > > > diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c > > > > index 957ff5c8e9..bc5843b137 100644 > > > > --- a/tools/libxl/libxl_pci.c > > > > +++ b/tools/libxl/libxl_pci.c > > > > @@ -1561,7 +1561,7 @@ void libxl__device_pci_add(libxl__egc *egc, uint32_t domid, > > > > LOGD(ERROR, domid, > > > > "PCI device %04x:%02x:%02x.%u %s?", > > > > pcidev->domain, pcidev->bus, pcidev->dev, pcidev->func, > > > > - errno == ENOSYS ? "cannot be assigned - no IOMMU" > > > > + errno == EOPNOTSUPP ? "cannot be assigned - no IOMMU" > > > > : "already assigned to a different guest"); > > > > goto out; > > > > } > > > > > > Thanks. I have addressed some Xen IOMMU maintainers. Can you confirm > > > whether this is right ? > > > > Not an IOMMU maintainer myself, but I've taken a look at the code and > > I think Grzegorz is right. iommu_do_domctl will return -EOPNOTSUPP if > > the IOMMU is not enabled for the domain. Another option would be to > > check for EBUSY (which will certainly be returned when the device is > > busy) and log the error code with a message when it's different than > > EBUSY? > > > > There are many possible error here, for example the device itself > > might not be behind an IOMMU, in which case Xen will return -ENODEV at > > least on the Intel case. > > Thanks for the analysis. So: > > Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> > > This would seem to be a backport candidate. AFAICT check has been > there, looking for ENOSYS, since this code was introduced in > 826eb17271d3c647516d9944c47b0779afedea25 > libxl: suppress device assignment to HVM guest when there is no IOMMU > ? > > But that commit has a Tested-by. Maybe Xen changed its error return > at some point ? > Yes, it happened in 71e617a6b8f69849c70eda1b3c58f1ff6b244e5a use is_iommu_enabled() where appropriate... Paul > Ian.
Paul Durrant writes ("RE: [PATCH] libxl: tooling expects wrong errno"): > > -----Original Message----- > > From: Ian Jackson <ian.jackson@citrix.com> > > Thanks for the analysis. So: > > > > Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> > > > > This would seem to be a backport candidate. AFAICT check has been > > there, looking for ENOSYS, since this code was introduced in > > 826eb17271d3c647516d9944c47b0779afedea25 > > libxl: suppress device assignment to HVM guest when there is no IOMMU > > ? > > > > But that commit has a Tested-by. Maybe Xen changed its error return > > at some point ? > > > > Yes, it happened in 71e617a6b8f69849c70eda1b3c58f1ff6b244e5a > use is_iommu_enabled() where appropriate... So, Backport: 4.13 Thanks! Ian.
On Mon, Jun 15, 2020 at 06:39:30PM +0100, Ian Jackson wrote: > Paul Durrant writes ("RE: [PATCH] libxl: tooling expects wrong errno"): > > > -----Original Message----- > > > From: Ian Jackson <ian.jackson@citrix.com> > > > Thanks for the analysis. So: > > > > > > Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> > > > > > > This would seem to be a backport candidate. AFAICT check has been > > > there, looking for ENOSYS, since this code was introduced in > > > 826eb17271d3c647516d9944c47b0779afedea25 > > > libxl: suppress device assignment to HVM guest when there is no IOMMU > > > ? > > > > > > But that commit has a Tested-by. Maybe Xen changed its error return > > > at some point ? > > > > > > > Yes, it happened in 71e617a6b8f69849c70eda1b3c58f1ff6b244e5a > > use is_iommu_enabled() where appropriate... > > So, > > Backport: 4.13 > > Thanks! This is not yet committed. Paul, can I get a release ack from you? Wei. > > Ian.
> -----Original Message----- > From: Wei Liu <wl@xen.org> > Sent: 26 June 2020 12:25 > To: Ian Jackson <ian.jackson@citrix.com> > Cc: paul@xen.org; Roger Pau Monne <roger.pau@citrix.com>; 'Grzegorz Uriasz' <gorbak25@gmail.com>; 'Jan > Beulich' <jbeulich@suse.com>; Andrew Cooper <Andrew.Cooper3@citrix.com>; Kevin Tian > <kevin.tian@intel.com>; 'Wei Liu' <wl@xen.org>; jakub@bartmin.ski; marmarek@invisiblethingslab.com; > j.nowak26@student.uw.edu.pl; Anthony Perard <anthony.perard@citrix.com>; xen- > devel@lists.xenproject.org; contact@puzio.waw.pl > Subject: Re: [PATCH] libxl: tooling expects wrong errno > > On Mon, Jun 15, 2020 at 06:39:30PM +0100, Ian Jackson wrote: > > Paul Durrant writes ("RE: [PATCH] libxl: tooling expects wrong errno"): > > > > -----Original Message----- > > > > From: Ian Jackson <ian.jackson@citrix.com> > > > > Thanks for the analysis. So: > > > > > > > > Acked-by: Ian Jackson <ian.jackson@eu.citrix.com> > > > > > > > > This would seem to be a backport candidate. AFAICT check has been > > > > there, looking for ENOSYS, since this code was introduced in > > > > 826eb17271d3c647516d9944c47b0779afedea25 > > > > libxl: suppress device assignment to HVM guest when there is no IOMMU > > > > ? > > > > > > > > But that commit has a Tested-by. Maybe Xen changed its error return > > > > at some point ? > > > > > > > > > > Yes, it happened in 71e617a6b8f69849c70eda1b3c58f1ff6b244e5a > > > use is_iommu_enabled() where appropriate... > > > > So, > > > > Backport: 4.13 > > > > Thanks! > > This is not yet committed. Paul, can I get a release ack from you? > > Wei. Yes. Release-acked-by: Paul Durrant <paul@xen.org> > > > > > Ian.
diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c index 957ff5c8e9..bc5843b137 100644 --- a/tools/libxl/libxl_pci.c +++ b/tools/libxl/libxl_pci.c @@ -1561,7 +1561,7 @@ void libxl__device_pci_add(libxl__egc *egc, uint32_t domid, LOGD(ERROR, domid, "PCI device %04x:%02x:%02x.%u %s?", pcidev->domain, pcidev->bus, pcidev->dev, pcidev->func, - errno == ENOSYS ? "cannot be assigned - no IOMMU" + errno == EOPNOTSUPP ? "cannot be assigned - no IOMMU" : "already assigned to a different guest"); goto out; }