Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-10 Thread Konrad Rzeszutek Wilk
On Tue, Jun 02, 2015 at 04:48:25PM +0100, Malcolm Crossley wrote:
> On 02/06/15 15:34, Konrad Rzeszutek Wilk wrote:
> > On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote:
> >> On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
> >>> On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
>  On 01/06/15 16:43, Ross Lagerwall wrote:
> > On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
> >> On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> >>> When doing passthrough of a PCI device for an HVM guest, don't insert
> >>> the device into xenstore, otherwise pciback attempts to use it which
> >>> conflicts with QEMU.
> >>
> >> How does it conflict?
> >
> > It doesn't work with repeated use. See below.
> >
> >>>
> >>> This manifests itself such that the first time a device is passed to a
> >>> domain, it succeeds. Subsequent attempts fail unless the device is
> >>> unbound from pciback or the machine rebooted.
> >>
> >> Can you be more specific please? What are the issues? Why does it
> >> fail?
> >
> > Without this patch, if a device (e.g. a GPU) is bound to pciback and
> > then passed through to a guest using xl pci-attach, it appears in the
> > guest and works fine. If the guest is rebooted, and the device is again
> > passed through with xl pci-attach, it appears in the guest as before but
> > does not work. In Windows, it gets something like Error Code 43 and on
> > Linux, the Nouveau driver fails to initialize the device (with error -22
> > or something). The only way to get the device to work again is to reboot
> > the host or unbind and rebind it to pciback.
> >
> > With this patch, it works as expected. The device is bound to pciback
> > and works after being passed through, even after the VM is rebooted.
> >
> >>
> >> There are certain things that pciback does to "prepare" an PCI device
> >> which QEMU also does. Some of them - such as saving the configuration
> >> registers (And then restoring them after the device has been detached) 
> >> -
> >> is something that QEMU does not do.
> >>
> >
> > I really have no idea what the correct thing to do is, but the current
> > code with qemu-trad doesn't seem to work (for me).
> > 
> > I think I know what the problem is. Do you by any chance have the 
> > XSA133-addenum
> > patch in? If not could you apply it and tell me if it works?

Ping?

It was XSA120-addendum.

> > 
> 
>  The pciback pci_stub.c implements the pciback.hide and the device reset
>  logic.
> 
>  The rest of pciback implements the pciback xenbus device which PV guests
>  need in order to map/unmap MSI interrupts and access PCI config space.
> 
>  QEMU emulates and handles the MSI interrupt capabilities and PCI config
>  space directly.
> >>>
> >>> Right..
> 
>  This is why a pciback xenbus device should not be created for
>  passthrough PCI device being handled by QEMU.
> >>>
> >>> To me that sounds that we should not have PV drivers because QEMU
> >>> emulates IDE or network devices.
> >>
> >> That is different. We first boot with QEMU handling the devices and then
> >> we explictly unplug QEMU's handling of IDE and network devices.
> >>
> >> That handover protocol does not currently exist for PCI passthrough
> >> devices so we have to chose one mechanism or the other to manage the
> >> passed through PCI device at boot time. Otherwise a HVM guest could load
> >> pcifront and cause's all kinds of chaos with interrupt management or
> >> outbound MMIO window management.
> > 
> > Which would be fun! :-)
> >>
> >>>
> >>> The crux here is that none of the operations that pciback performs
> >>> should affect QEMU or guests. But it does - so there is a bug.
> >>
> >> I agree there is a bug but should we try to fix it based upon my
> >> comments above?
> > 
> > I am still thinking about it. I do like certain things that pciback
> > does as part of it being notified that a device is to be used by
> > a guest and performing the configuration save/reset (see
> > pcistub_put_pci_dev in the pciback).
> > 
> > If somehow that can still be done by libxl (or QEMU) via SysFS
> > that would be good.
> > 
> > Just to clarify:
> >  - I concur with you that having xen-pcifront loaded in HVM
> >guest and doing odd things behind QEMU is not good.
> >  - I like the fact that xen-pciback does a bunch of safety
> >things with the PCI device to prepare it for a guest.
> >  - Currently these 'safety things'  are done when you
> >'unbind' or 'bind' the device to pciback.
> >  - Or when the guest is shutdown and via XenBus we are told
> >and can do the 'safety things'. This is the crux - if there
> >is a way to do this via SysFS this would be super.
> > 
> >Or perhaps xenpciback can figure out that the guest is HVM
> >and ignore any XenBus actions?

Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-02 Thread Malcolm Crossley
On 02/06/15 15:34, Konrad Rzeszutek Wilk wrote:
> On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote:
>> On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
>>> On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
 On 01/06/15 16:43, Ross Lagerwall wrote:
> On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
>> On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
>>> When doing passthrough of a PCI device for an HVM guest, don't insert
>>> the device into xenstore, otherwise pciback attempts to use it which
>>> conflicts with QEMU.
>>
>> How does it conflict?
>
> It doesn't work with repeated use. See below.
>
>>>
>>> This manifests itself such that the first time a device is passed to a
>>> domain, it succeeds. Subsequent attempts fail unless the device is
>>> unbound from pciback or the machine rebooted.
>>
>> Can you be more specific please? What are the issues? Why does it
>> fail?
>
> Without this patch, if a device (e.g. a GPU) is bound to pciback and
> then passed through to a guest using xl pci-attach, it appears in the
> guest and works fine. If the guest is rebooted, and the device is again
> passed through with xl pci-attach, it appears in the guest as before but
> does not work. In Windows, it gets something like Error Code 43 and on
> Linux, the Nouveau driver fails to initialize the device (with error -22
> or something). The only way to get the device to work again is to reboot
> the host or unbind and rebind it to pciback.
>
> With this patch, it works as expected. The device is bound to pciback
> and works after being passed through, even after the VM is rebooted.
>
>>
>> There are certain things that pciback does to "prepare" an PCI device
>> which QEMU also does. Some of them - such as saving the configuration
>> registers (And then restoring them after the device has been detached) -
>> is something that QEMU does not do.
>>
>
> I really have no idea what the correct thing to do is, but the current
> code with qemu-trad doesn't seem to work (for me).
> 
> I think I know what the problem is. Do you by any chance have the 
> XSA133-addenum
> patch in? If not could you apply it and tell me if it works?
> 

 The pciback pci_stub.c implements the pciback.hide and the device reset
 logic.

 The rest of pciback implements the pciback xenbus device which PV guests
 need in order to map/unmap MSI interrupts and access PCI config space.

 QEMU emulates and handles the MSI interrupt capabilities and PCI config
 space directly.
>>>
>>> Right..

 This is why a pciback xenbus device should not be created for
 passthrough PCI device being handled by QEMU.
>>>
>>> To me that sounds that we should not have PV drivers because QEMU
>>> emulates IDE or network devices.
>>
>> That is different. We first boot with QEMU handling the devices and then
>> we explictly unplug QEMU's handling of IDE and network devices.
>>
>> That handover protocol does not currently exist for PCI passthrough
>> devices so we have to chose one mechanism or the other to manage the
>> passed through PCI device at boot time. Otherwise a HVM guest could load
>> pcifront and cause's all kinds of chaos with interrupt management or
>> outbound MMIO window management.
> 
> Which would be fun! :-)
>>
>>>
>>> The crux here is that none of the operations that pciback performs
>>> should affect QEMU or guests. But it does - so there is a bug.
>>
>> I agree there is a bug but should we try to fix it based upon my
>> comments above?
> 
> I am still thinking about it. I do like certain things that pciback
> does as part of it being notified that a device is to be used by
> a guest and performing the configuration save/reset (see
> pcistub_put_pci_dev in the pciback).
> 
> If somehow that can still be done by libxl (or QEMU) via SysFS
> that would be good.
> 
> Just to clarify:
>  - I concur with you that having xen-pcifront loaded in HVM
>guest and doing odd things behind QEMU is not good.
>  - I like the fact that xen-pciback does a bunch of safety
>things with the PCI device to prepare it for a guest.
>  - Currently these 'safety things'  are done when you
>'unbind' or 'bind' the device to pciback.
>  - Or when the guest is shutdown and via XenBus we are told
>and can do the 'safety things'. This is the crux - if there
>is a way to do this via SysFS this would be super.
> 
>Or perhaps xenpciback can figure out that the guest is HVM
>and ignore any XenBus actions?
> 

Xenserver toolstack currently bind/unbinds the device to pciback and
manually triggers the reset on the device. It then uses xenstore keys to
communicate with the QEMU hotplug mechanism.

A complete description is here:

"Xenopsd performs the following steps for HVM PCI passthrough (for each
PCI device):

write

Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-02 Thread Konrad Rzeszutek Wilk
On Tue, Jun 02, 2015 at 11:06:26AM +0100, Malcolm Crossley wrote:
> On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
> > On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
> >> On 01/06/15 16:43, Ross Lagerwall wrote:
> >>> On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
>  On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> > When doing passthrough of a PCI device for an HVM guest, don't insert
> > the device into xenstore, otherwise pciback attempts to use it which
> > conflicts with QEMU.
> 
>  How does it conflict?
> >>>
> >>> It doesn't work with repeated use. See below.
> >>>
> >
> > This manifests itself such that the first time a device is passed to a
> > domain, it succeeds. Subsequent attempts fail unless the device is
> > unbound from pciback or the machine rebooted.
> 
>  Can you be more specific please? What are the issues? Why does it
>  fail?
> >>>
> >>> Without this patch, if a device (e.g. a GPU) is bound to pciback and
> >>> then passed through to a guest using xl pci-attach, it appears in the
> >>> guest and works fine. If the guest is rebooted, and the device is again
> >>> passed through with xl pci-attach, it appears in the guest as before but
> >>> does not work. In Windows, it gets something like Error Code 43 and on
> >>> Linux, the Nouveau driver fails to initialize the device (with error -22
> >>> or something). The only way to get the device to work again is to reboot
> >>> the host or unbind and rebind it to pciback.
> >>>
> >>> With this patch, it works as expected. The device is bound to pciback
> >>> and works after being passed through, even after the VM is rebooted.
> >>>
> 
>  There are certain things that pciback does to "prepare" an PCI device
>  which QEMU also does. Some of them - such as saving the configuration
>  registers (And then restoring them after the device has been detached) -
>  is something that QEMU does not do.
> 
> >>>
> >>> I really have no idea what the correct thing to do is, but the current
> >>> code with qemu-trad doesn't seem to work (for me).

I think I know what the problem is. Do you by any chance have the XSA133-addenum
patch in? If not could you apply it and tell me if it works?

> >>
> >> The pciback pci_stub.c implements the pciback.hide and the device reset
> >> logic.
> >>
> >> The rest of pciback implements the pciback xenbus device which PV guests
> >> need in order to map/unmap MSI interrupts and access PCI config space.
> >>
> >> QEMU emulates and handles the MSI interrupt capabilities and PCI config
> >> space directly.
> > 
> > Right..
> >>
> >> This is why a pciback xenbus device should not be created for
> >> passthrough PCI device being handled by QEMU.
> > 
> > To me that sounds that we should not have PV drivers because QEMU
> > emulates IDE or network devices.
> 
> That is different. We first boot with QEMU handling the devices and then
> we explictly unplug QEMU's handling of IDE and network devices.
> 
> That handover protocol does not currently exist for PCI passthrough
> devices so we have to chose one mechanism or the other to manage the
> passed through PCI device at boot time. Otherwise a HVM guest could load
> pcifront and cause's all kinds of chaos with interrupt management or
> outbound MMIO window management.

Which would be fun! :-)
> 
> > 
> > The crux here is that none of the operations that pciback performs
> > should affect QEMU or guests. But it does - so there is a bug.
> 
> I agree there is a bug but should we try to fix it based upon my
> comments above?

I am still thinking about it. I do like certain things that pciback
does as part of it being notified that a device is to be used by
a guest and performing the configuration save/reset (see
pcistub_put_pci_dev in the pciback).

If somehow that can still be done by libxl (or QEMU) via SysFS
that would be good.

Just to clarify:
 - I concur with you that having xen-pcifront loaded in HVM
   guest and doing odd things behind QEMU is not good.
 - I like the fact that xen-pciback does a bunch of safety
   things with the PCI device to prepare it for a guest.
 - Currently these 'safety things'  are done when you
   'unbind' or 'bind' the device to pciback.
 - Or when the guest is shutdown and via XenBus we are told
   and can do the 'safety things'. This is the crux - if there
   is a way to do this via SysFS this would be super.

   Or perhaps xenpciback can figure out that the guest is HVM
   and ignore any XenBus actions?

> > 
> > I would like to understand which ones do it so I can fix in
> > pciback - as it might be also be a problem with PV.
> > 
> > Unless... are you by any chance using extra patches on top of the
> > native pciback?
> 
> We do have extra patches but they only allow us to do a SBR on PCI
> device's which require it. They failure listed above occurs on devices
> with device specific resets (e.g. FLR,D3) as well so those extra pat

Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-02 Thread Malcolm Crossley
On 01/06/15 18:55, Konrad Rzeszutek Wilk wrote:
> On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
>> On 01/06/15 16:43, Ross Lagerwall wrote:
>>> On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
 On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> When doing passthrough of a PCI device for an HVM guest, don't insert
> the device into xenstore, otherwise pciback attempts to use it which
> conflicts with QEMU.

 How does it conflict?
>>>
>>> It doesn't work with repeated use. See below.
>>>
>
> This manifests itself such that the first time a device is passed to a
> domain, it succeeds. Subsequent attempts fail unless the device is
> unbound from pciback or the machine rebooted.

 Can you be more specific please? What are the issues? Why does it
 fail?
>>>
>>> Without this patch, if a device (e.g. a GPU) is bound to pciback and
>>> then passed through to a guest using xl pci-attach, it appears in the
>>> guest and works fine. If the guest is rebooted, and the device is again
>>> passed through with xl pci-attach, it appears in the guest as before but
>>> does not work. In Windows, it gets something like Error Code 43 and on
>>> Linux, the Nouveau driver fails to initialize the device (with error -22
>>> or something). The only way to get the device to work again is to reboot
>>> the host or unbind and rebind it to pciback.
>>>
>>> With this patch, it works as expected. The device is bound to pciback
>>> and works after being passed through, even after the VM is rebooted.
>>>

 There are certain things that pciback does to "prepare" an PCI device
 which QEMU also does. Some of them - such as saving the configuration
 registers (And then restoring them after the device has been detached) -
 is something that QEMU does not do.

>>>
>>> I really have no idea what the correct thing to do is, but the current
>>> code with qemu-trad doesn't seem to work (for me).
>>
>> The pciback pci_stub.c implements the pciback.hide and the device reset
>> logic.
>>
>> The rest of pciback implements the pciback xenbus device which PV guests
>> need in order to map/unmap MSI interrupts and access PCI config space.
>>
>> QEMU emulates and handles the MSI interrupt capabilities and PCI config
>> space directly.
> 
> Right..
>>
>> This is why a pciback xenbus device should not be created for
>> passthrough PCI device being handled by QEMU.
> 
> To me that sounds that we should not have PV drivers because QEMU
> emulates IDE or network devices.

That is different. We first boot with QEMU handling the devices and then
we explictly unplug QEMU's handling of IDE and network devices.

That handover protocol does not currently exist for PCI passthrough
devices so we have to chose one mechanism or the other to manage the
passed through PCI device at boot time. Otherwise a HVM guest could load
pcifront and cause's all kinds of chaos with interrupt management or
outbound MMIO window management.

> 
> The crux here is that none of the operations that pciback performs
> should affect QEMU or guests. But it does - so there is a bug.

I agree there is a bug but should we try to fix it based upon my
comments above?
> 
> I would like to understand which ones do it so I can fix in
> pciback - as it might be also be a problem with PV.
> 
> Unless... are you by any chance using extra patches on top of the
> native pciback?

We do have extra patches but they only allow us to do a SBR on PCI
device's which require it. They failure listed above occurs on devices
with device specific resets (e.g. FLR,D3) as well so those extra patches
aren't being used.

> 
>>
>> Malcolm
>>
>>>
>>> Regards
>>


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-01 Thread Konrad Rzeszutek Wilk
On Mon, Jun 01, 2015 at 05:03:14PM +0100, Malcolm Crossley wrote:
> On 01/06/15 16:43, Ross Lagerwall wrote:
> > On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
> >> On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> >>> When doing passthrough of a PCI device for an HVM guest, don't insert
> >>> the device into xenstore, otherwise pciback attempts to use it which
> >>> conflicts with QEMU.
> >>
> >> How does it conflict?
> > 
> > It doesn't work with repeated use. See below.
> > 
> >>>
> >>> This manifests itself such that the first time a device is passed to a
> >>> domain, it succeeds. Subsequent attempts fail unless the device is
> >>> unbound from pciback or the machine rebooted.
> >>
> >> Can you be more specific please? What are the issues? Why does it
> >> fail?
> > 
> > Without this patch, if a device (e.g. a GPU) is bound to pciback and
> > then passed through to a guest using xl pci-attach, it appears in the
> > guest and works fine. If the guest is rebooted, and the device is again
> > passed through with xl pci-attach, it appears in the guest as before but
> > does not work. In Windows, it gets something like Error Code 43 and on
> > Linux, the Nouveau driver fails to initialize the device (with error -22
> > or something). The only way to get the device to work again is to reboot
> > the host or unbind and rebind it to pciback.
> > 
> > With this patch, it works as expected. The device is bound to pciback
> > and works after being passed through, even after the VM is rebooted.
> > 
> >>
> >> There are certain things that pciback does to "prepare" an PCI device
> >> which QEMU also does. Some of them - such as saving the configuration
> >> registers (And then restoring them after the device has been detached) -
> >> is something that QEMU does not do.
> >>
> > 
> > I really have no idea what the correct thing to do is, but the current
> > code with qemu-trad doesn't seem to work (for me).
> 
> The pciback pci_stub.c implements the pciback.hide and the device reset
> logic.
> 
> The rest of pciback implements the pciback xenbus device which PV guests
> need in order to map/unmap MSI interrupts and access PCI config space.
> 
> QEMU emulates and handles the MSI interrupt capabilities and PCI config
> space directly.

Right..
> 
> This is why a pciback xenbus device should not be created for
> passthrough PCI device being handled by QEMU.

To me that sounds that we should not have PV drivers because QEMU
emulates IDE or network devices.

The crux here is that none of the operations that pciback performs
should affect QEMU or guests. But it does - so there is a bug.

I would like to understand which ones do it so I can fix in
pciback - as it might be also be a problem with PV.

Unless... are you by any chance using extra patches on top of the
native pciback?

> 
> Malcolm
> 
> > 
> > Regards
> 

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-01 Thread Malcolm Crossley
On 01/06/15 16:43, Ross Lagerwall wrote:
> On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
>> On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
>>> When doing passthrough of a PCI device for an HVM guest, don't insert
>>> the device into xenstore, otherwise pciback attempts to use it which
>>> conflicts with QEMU.
>>
>> How does it conflict?
> 
> It doesn't work with repeated use. See below.
> 
>>>
>>> This manifests itself such that the first time a device is passed to a
>>> domain, it succeeds. Subsequent attempts fail unless the device is
>>> unbound from pciback or the machine rebooted.
>>
>> Can you be more specific please? What are the issues? Why does it
>> fail?
> 
> Without this patch, if a device (e.g. a GPU) is bound to pciback and
> then passed through to a guest using xl pci-attach, it appears in the
> guest and works fine. If the guest is rebooted, and the device is again
> passed through with xl pci-attach, it appears in the guest as before but
> does not work. In Windows, it gets something like Error Code 43 and on
> Linux, the Nouveau driver fails to initialize the device (with error -22
> or something). The only way to get the device to work again is to reboot
> the host or unbind and rebind it to pciback.
> 
> With this patch, it works as expected. The device is bound to pciback
> and works after being passed through, even after the VM is rebooted.
> 
>>
>> There are certain things that pciback does to "prepare" an PCI device
>> which QEMU also does. Some of them - such as saving the configuration
>> registers (And then restoring them after the device has been detached) -
>> is something that QEMU does not do.
>>
> 
> I really have no idea what the correct thing to do is, but the current
> code with qemu-trad doesn't seem to work (for me).

The pciback pci_stub.c implements the pciback.hide and the device reset
logic.

The rest of pciback implements the pciback xenbus device which PV guests
need in order to map/unmap MSI interrupts and access PCI config space.

QEMU emulates and handles the MSI interrupt capabilities and PCI config
space directly.

This is why a pciback xenbus device should not be created for
passthrough PCI device being handled by QEMU.

Malcolm

> 
> Regards


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-01 Thread Sander Eikelenboom

Monday, June 1, 2015, 5:43:53 PM, you wrote:

> On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
>> On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
>>> When doing passthrough of a PCI device for an HVM guest, don't insert
>>> the device into xenstore, otherwise pciback attempts to use it which
>>> conflicts with QEMU.
>>
>> How does it conflict?

> It doesn't work with repeated use. See below.

>>>
>>> This manifests itself such that the first time a device is passed to a
>>> domain, it succeeds. Subsequent attempts fail unless the device is
>>> unbound from pciback or the machine rebooted.
>>
>> Can you be more specific please? What are the issues? Why does it
>> fail?

> Without this patch, if a device (e.g. a GPU) is bound to pciback and 
> then passed through to a guest using xl pci-attach, it appears in the 
> guest and works fine. If the guest is rebooted, and the device is again 
> passed through with xl pci-attach, it appears in the guest as before but 
> does not work. In Windows, it gets something like Error Code 43 and on 
> Linux, the Nouveau driver fails to initialize the device (with error -22 
> or something). The only way to get the device to work again is to reboot 
> the host or unbind and rebind it to pciback.

> With this patch, it works as expected. The device is bound to pciback 
> and works after being passed through, even after the VM is rebooted.

>>
>> There are certain things that pciback does to "prepare" an PCI device
>> which QEMU also does. Some of them - such as saving the configuration
>> registers (And then restoring them after the device has been detached) -
>> is something that QEMU does not do.
>>

> I really have no idea what the correct thing to do is, but the current 
> code with qemu-trad doesn't seem to work (for me).

> Regards

The Konrad's "do_flr" patch that David NACKed works fine for me. It makes it 
possible to
do VGA passthrough and reboot endlessly. 
But is has to be refactored into something that is acceptable upstream.
(and possibly be self contained and not rely on the do_flr sysfs trigger to 
work 
around some locking issue, that would make most part of the NACK (the naming of 
the option) also go away. )

--
Sander


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-01 Thread Konrad Rzeszutek Wilk
On Mon, Jun 01, 2015 at 04:43:53PM +0100, Ross Lagerwall wrote:
> On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:
> >On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> >>When doing passthrough of a PCI device for an HVM guest, don't insert
> >>the device into xenstore, otherwise pciback attempts to use it which
> >>conflicts with QEMU.
> >
> >How does it conflict?
> 
> It doesn't work with repeated use. See below.
> 
> >>
> >>This manifests itself such that the first time a device is passed to a
> >>domain, it succeeds. Subsequent attempts fail unless the device is
> >>unbound from pciback or the machine rebooted.
> >
> >Can you be more specific please? What are the issues? Why does it
> >fail?
> 
> Without this patch, if a device (e.g. a GPU) is bound to pciback and then
> passed through to a guest using xl pci-attach, it appears in the guest and
> works fine. If the guest is rebooted, and the device is again passed through
> with xl pci-attach, it appears in the guest as before but does not work. In
> Windows, it gets something like Error Code 43 and on Linux, the Nouveau
> driver fails to initialize the device (with error -22 or something). The
> only way to get the device to work again is to reboot the host or unbind and
> rebind it to pciback.
> 
> With this patch, it works as expected. The device is bound to pciback and
> works after being passed through, even after the VM is rebooted.

That would imply that the logic to 'prepare' the device is not working
as expected when the device is unplugged and replugged.

Can you provide an output from 'lspci - - ' for the device
before you do 'xl pci-attach', after (When it is running in the guest),
and after you do the second 'pci-attach' after the guest has been
rebooted?
> 
> >
> >There are certain things that pciback does to "prepare" an PCI device
> >which QEMU also does. Some of them - such as saving the configuration
> >registers (And then restoring them after the device has been detached) -
> >is something that QEMU does not do.
> >
> 
> I really have no idea what the correct thing to do is, but the current code
> with qemu-trad doesn't seem to work (for me).

> 
> Regards
> -- 
> Ross Lagerwall

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-01 Thread Ross Lagerwall

On 06/01/2015 04:26 PM, Konrad Rzeszutek Wilk wrote:

On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:

When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.


How does it conflict?


It doesn't work with repeated use. See below.



This manifests itself such that the first time a device is passed to a
domain, it succeeds. Subsequent attempts fail unless the device is
unbound from pciback or the machine rebooted.


Can you be more specific please? What are the issues? Why does it
fail?


Without this patch, if a device (e.g. a GPU) is bound to pciback and 
then passed through to a guest using xl pci-attach, it appears in the 
guest and works fine. If the guest is rebooted, and the device is again 
passed through with xl pci-attach, it appears in the guest as before but 
does not work. In Windows, it gets something like Error Code 43 and on 
Linux, the Nouveau driver fails to initialize the device (with error -22 
or something). The only way to get the device to work again is to reboot 
the host or unbind and rebind it to pciback.


With this patch, it works as expected. The device is bound to pciback 
and works after being passed through, even after the VM is rebooted.




There are certain things that pciback does to "prepare" an PCI device
which QEMU also does. Some of them - such as saving the configuration
registers (And then restoring them after the device has been detached) -
is something that QEMU does not do.



I really have no idea what the correct thing to do is, but the current 
code with qemu-trad doesn't seem to work (for me).


Regards
--
Ross Lagerwall

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-01 Thread Konrad Rzeszutek Wilk
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> When doing passthrough of a PCI device for an HVM guest, don't insert
> the device into xenstore, otherwise pciback attempts to use it which
> conflicts with QEMU.

How does it conflict?
> 
> This manifests itself such that the first time a device is passed to a
> domain, it succeeds. Subsequent attempts fail unless the device is
> unbound from pciback or the machine rebooted.

Can you be more specific please? What are the issues? Why does it
fail?

There are certain things that pciback does to "prepare" an PCI device
which QEMU also does. Some of them - such as saving the configuration
registers (And then restoring them after the device has been detached) -
is something that QEMU does not do.

> 
> Signed-off-by: Ross Lagerwall 
> ---
>  tools/libxl/libxl_pci.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c
> index e0743f8..2552889 100644
> --- a/tools/libxl/libxl_pci.c
> +++ b/tools/libxl/libxl_pci.c
> @@ -994,7 +994,7 @@ out:
>  }
>  }
>  
> -if (!starting)
> +if (!starting && type == LIBXL_DOMAIN_TYPE_PV)
>  rc = libxl__device_pci_add_xenstore(gc, domid, pcidev, starting);
>  else
>  rc = 0;
> -- 
> 2.1.0
> 
> 
> ___
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-06-01 Thread George Dunlap
On Fri, May 29, 2015 at 8:59 AM, Ross Lagerwall
 wrote:
> When doing passthrough of a PCI device for an HVM guest, don't insert
> the device into xenstore, otherwise pciback attempts to use it which
> conflicts with QEMU.
>
> This manifests itself such that the first time a device is passed to a
> domain, it succeeds. Subsequent attempts fail unless the device is
> unbound from pciback or the machine rebooted.
>
> Signed-off-by: Ross Lagerwall 
> ---
>  tools/libxl/libxl_pci.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c
> index e0743f8..2552889 100644
> --- a/tools/libxl/libxl_pci.c
> +++ b/tools/libxl/libxl_pci.c
> @@ -994,7 +994,7 @@ out:
>  }
>  }
>
> -if (!starting)
> +if (!starting && type == LIBXL_DOMAIN_TYPE_PV)
>  rc = libxl__device_pci_add_xenstore(gc, domid, pcidev, starting);

It looks like device_pci_list reads backend/pci/ for the list of
assigned devices.  Does "libxl__device_pci_list()" still work after
this change?

 -George

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-05-29 Thread Wei Liu
On Fri, May 29, 2015 at 10:54:09AM +0100, Ross Lagerwall wrote:
> On 05/29/2015 10:50 AM, Wei Liu wrote:
> >On Fri, May 29, 2015 at 10:43:08AM +0100, Ross Lagerwall wrote:
> >>On 05/29/2015 10:41 AM, Wei Liu wrote:
> >>>On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> When doing passthrough of a PCI device for an HVM guest, don't insert
> the device into xenstore, otherwise pciback attempts to use it which
> conflicts with QEMU.
> 
> This manifests itself such that the first time a device is passed to a
> domain, it succeeds. Subsequent attempts fail unless the device is
> unbound from pciback or the machine rebooted.
> 
> >>>
> >>>The commit message looks sensible to me. However this might break
> >>>qemu-trad PCI passthrough if I'm not mistaken. What QEMU version are you
> >>>using?  Upstream or trad? Have you tested both of them?
> >>>
> >>
> >>qemu-trad. I haven't tested with qemu-upstream.
> >>
> >
> >I don't quite get this. Doesn't qemu-trad depends on those xenstore
> >nodes for PCI passthrough information?  What did I miss?
> >
> 
> A different set of xenstore keys are used for communication between libxl
> and QEMU. The communication between libxl and QEMU happens further up in the
> same function:
> http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=tools/libxl/libxl_pci.c;h=e0743f8112689b340ba7de88bc8895b62105aaba;hb=HEAD#l901
> 

OK. Now I get the idea. IMHO this piece of code is not in a very good
state. The problem is the way it works is very fragile. Now we have
three functions, each of which has partial responsibility of writing
some xenstore nodes. This is not your fault.

Acked-by: Wei Liu 

> Regards,
> -- 
> Ross Lagerwall

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-05-29 Thread Ross Lagerwall

On 05/29/2015 10:50 AM, Wei Liu wrote:

On Fri, May 29, 2015 at 10:43:08AM +0100, Ross Lagerwall wrote:

On 05/29/2015 10:41 AM, Wei Liu wrote:

On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:

When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.

This manifests itself such that the first time a device is passed to a
domain, it succeeds. Subsequent attempts fail unless the device is
unbound from pciback or the machine rebooted.



The commit message looks sensible to me. However this might break
qemu-trad PCI passthrough if I'm not mistaken. What QEMU version are you
using?  Upstream or trad? Have you tested both of them?



qemu-trad. I haven't tested with qemu-upstream.



I don't quite get this. Doesn't qemu-trad depends on those xenstore
nodes for PCI passthrough information?  What did I miss?



A different set of xenstore keys are used for communication between 
libxl and QEMU. The communication between libxl and QEMU happens further 
up in the same function:

http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=tools/libxl/libxl_pci.c;h=e0743f8112689b340ba7de88bc8895b62105aaba;hb=HEAD#l901

Regards,
--
Ross Lagerwall

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-05-29 Thread Wei Liu
On Fri, May 29, 2015 at 10:43:08AM +0100, Ross Lagerwall wrote:
> On 05/29/2015 10:41 AM, Wei Liu wrote:
> >On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> >>When doing passthrough of a PCI device for an HVM guest, don't insert
> >>the device into xenstore, otherwise pciback attempts to use it which
> >>conflicts with QEMU.
> >>
> >>This manifests itself such that the first time a device is passed to a
> >>domain, it succeeds. Subsequent attempts fail unless the device is
> >>unbound from pciback or the machine rebooted.
> >>
> >
> >The commit message looks sensible to me. However this might break
> >qemu-trad PCI passthrough if I'm not mistaken. What QEMU version are you
> >using?  Upstream or trad? Have you tested both of them?
> >
> 
> qemu-trad. I haven't tested with qemu-upstream.
> 

I don't quite get this. Doesn't qemu-trad depends on those xenstore
nodes for PCI passthrough information?  What did I miss?

Wei.

> -- 
> Ross Lagerwall

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-05-29 Thread Ross Lagerwall

On 05/29/2015 10:41 AM, Wei Liu wrote:

On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:

When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.

This manifests itself such that the first time a device is passed to a
domain, it succeeds. Subsequent attempts fail unless the device is
unbound from pciback or the machine rebooted.



The commit message looks sensible to me. However this might break
qemu-trad PCI passthrough if I'm not mistaken. What QEMU version are you
using?  Upstream or trad? Have you tested both of them?



qemu-trad. I haven't tested with qemu-upstream.

--
Ross Lagerwall

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


Re: [Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-05-29 Thread Wei Liu
On Fri, May 29, 2015 at 08:59:45AM +0100, Ross Lagerwall wrote:
> When doing passthrough of a PCI device for an HVM guest, don't insert
> the device into xenstore, otherwise pciback attempts to use it which
> conflicts with QEMU.
> 
> This manifests itself such that the first time a device is passed to a
> domain, it succeeds. Subsequent attempts fail unless the device is
> unbound from pciback or the machine rebooted.
> 

The commit message looks sensible to me. However this might break
qemu-trad PCI passthrough if I'm not mistaken. What QEMU version are you
using?  Upstream or trad? Have you tested both of them?

Wei.

> Signed-off-by: Ross Lagerwall 
> ---
>  tools/libxl/libxl_pci.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c
> index e0743f8..2552889 100644
> --- a/tools/libxl/libxl_pci.c
> +++ b/tools/libxl/libxl_pci.c
> @@ -994,7 +994,7 @@ out:
>  }
>  }
>  
> -if (!starting)
> +if (!starting && type == LIBXL_DOMAIN_TYPE_PV)
>  rc = libxl__device_pci_add_xenstore(gc, domid, pcidev, starting);
>  else
>  rc = 0;
> -- 
> 2.1.0

___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel


[Xen-devel] [PATCH] libxl: Don't insert PCI device into xenstore for HVM guests

2015-05-29 Thread Ross Lagerwall
When doing passthrough of a PCI device for an HVM guest, don't insert
the device into xenstore, otherwise pciback attempts to use it which
conflicts with QEMU.

This manifests itself such that the first time a device is passed to a
domain, it succeeds. Subsequent attempts fail unless the device is
unbound from pciback or the machine rebooted.

Signed-off-by: Ross Lagerwall 
---
 tools/libxl/libxl_pci.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tools/libxl/libxl_pci.c b/tools/libxl/libxl_pci.c
index e0743f8..2552889 100644
--- a/tools/libxl/libxl_pci.c
+++ b/tools/libxl/libxl_pci.c
@@ -994,7 +994,7 @@ out:
 }
 }
 
-if (!starting)
+if (!starting && type == LIBXL_DOMAIN_TYPE_PV)
 rc = libxl__device_pci_add_xenstore(gc, domid, pcidev, starting);
 else
 rc = 0;
-- 
2.1.0


___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel