[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] passthrough: release assigned PCI devices earlier during domain shutdown
# HG changeset patch # User Jan Beulich <jbeulich@xxxxxxxx> # Date 1330080392 -3600 # Node ID 71159fb049f253030c3820c260d092d4aec6b166 # Parent 35d855e520038bf5814f53d105dc4adf58a670f2 passthrough: release assigned PCI devices earlier during domain shutdown At least with xend, where there's not even a tool stack side attempt to de-assign devices during domain shutdown, this allows immediate re- starts of a domain to work reliably. (There's no apparent reason why c/s 18010:c1577f094ae4 chose to put this in the asynchronous part of domain destruction). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Keir Fraser <keir@xxxxxxx> --- diff -r 35d855e52003 -r 71159fb049f2 xen/arch/ia64/xen/domain.c --- a/xen/arch/ia64/xen/domain.c Fri Feb 24 09:07:54 2012 +0100 +++ b/xen/arch/ia64/xen/domain.c Fri Feb 24 11:46:32 2012 +0100 @@ -673,10 +673,8 @@ free_xenheap_pages(d->shared_info, get_order_from_shift(XSI_SHIFT)); - if ( iommu_enabled && need_iommu(d) ) { - pci_release_devices(d); + if ( iommu_enabled && need_iommu(d) ) iommu_domain_destroy(d); - } tlb_track_destroy(d); @@ -1721,6 +1719,8 @@ switch (d->arch.relres) { case RELRES_not_started: + pci_release_devices(d); + /* Relinquish guest resources for VT-i domain. */ if (is_hvm_domain(d)) vmx_relinquish_guest_resources(d); diff -r 35d855e52003 -r 71159fb049f2 xen/arch/x86/domain.c --- a/xen/arch/x86/domain.c Fri Feb 24 09:07:54 2012 +0100 +++ b/xen/arch/x86/domain.c Fri Feb 24 11:46:32 2012 +0100 @@ -657,7 +657,6 @@ xfree(d->arch.pv_domain.e820); vmce_destroy_msr(d); - pci_release_devices(d); free_domain_pirqs(d); if ( !is_idle_domain(d) ) iommu_domain_destroy(d); @@ -2101,6 +2100,8 @@ switch ( d->arch.relmem ) { case RELMEM_not_started: + pci_release_devices(d); + /* Tear down paging-assistance stuff. */ paging_teardown(d); diff -r 35d855e52003 -r 71159fb049f2 xen/drivers/passthrough/iommu.c --- a/xen/drivers/passthrough/iommu.c Fri Feb 24 09:07:54 2012 +0100 +++ b/xen/drivers/passthrough/iommu.c Fri Feb 24 11:46:32 2012 +0100 @@ -574,7 +574,8 @@ break; case XEN_DOMCTL_assign_device: - if ( unlikely((d = get_domain_by_id(domctl->domain)) == NULL) ) + if ( unlikely((d = get_domain_by_id(domctl->domain)) == NULL) || + unlikely(d->is_dying) ) { printk(XENLOG_G_ERR "XEN_DOMCTL_assign_device: get_domain_by_id() failed\n"); _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |