|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] libxl: tooling expects wrong errno
Roger Pau Monne writes ("Re: [PATCH] libxl: tooling expects wrong errno"):
> On Mon, Jun 15, 2020 at 03:59:50PM +0100, Ian Jackson wrote:
> > Grzegorz Uriasz writes ("[PATCH] libxl: tooling expects wrong errno"):
> > > When iommu is not enabled for a given domain then pci passthrough
> > > hypercalls such as xc_test_assign_device return EOPNOTSUPP.
> > > The code responsible for this is in "iommu_do_domctl" inside
> > > xen/drivers/passthrough/iommu.c
> > > This patch fixes the error message reported by libxl when assigning
> > > pci devices to domains without iommu.
> > >
> > > Signed-off-by: Grzegorz Uriasz <gorbak25@xxxxxxxxx>
> > > Tested-by: Grzegorz Uriasz <gorbak25@xxxxxxxxx>
> > > ---
> > > tools/libxl/libxl_pci.c | 2 +-
> > > 1 file changed, 1 insertion(+), 1 deletion(-)
> > >
> > > diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c
> > > index 957ff5c8e9..bc5843b137 100644
> > > --- a/tools/libxl/libxl_pci.c
> > > +++ b/tools/libxl/libxl_pci.c
> > > @@ -1561,7 +1561,7 @@ void libxl__device_pci_add(libxl__egc *egc,
> > > uint32_t domid,
> > > LOGD(ERROR, domid,
> > > "PCI device %04x:%02x:%02x.%u %s?",
> > > pcidev->domain, pcidev->bus, pcidev->dev, pcidev->func,
> > > - errno == ENOSYS ? "cannot be assigned - no IOMMU"
> > > + errno == EOPNOTSUPP ? "cannot be assigned - no IOMMU"
> > > : "already assigned to a different guest");
> > > goto out;
> > > }
> >
> > Thanks. I have addressed some Xen IOMMU maintainers. Can you confirm
> > whether this is right ?
>
> Not an IOMMU maintainer myself, but I've taken a look at the code and
> I think Grzegorz is right. iommu_do_domctl will return -EOPNOTSUPP if
> the IOMMU is not enabled for the domain. Another option would be to
> check for EBUSY (which will certainly be returned when the device is
> busy) and log the error code with a message when it's different than
> EBUSY?
>
> There are many possible error here, for example the device itself
> might not be behind an IOMMU, in which case Xen will return -ENODEV at
> least on the Intel case.
Thanks for the analysis. So:
Acked-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
This would seem to be a backport candidate. AFAICT check has been
there, looking for ENOSYS, since this code was introduced in
826eb17271d3c647516d9944c47b0779afedea25
libxl: suppress device assignment to HVM guest when there is no IOMMU
?
But that commit has a Tested-by. Maybe Xen changed its error return
at some point ?
Ian.
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |