[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-4.0-testing] passthrough: release assigned PCI devices earlier during domain



# HG changeset patch
# User Jan Beulich <jbeulich@xxxxxxxx>
# Date 1331111345 0
# Node ID c62e9965b3950a423b5e5dc2fb9b9495d535dc35
# Parent  26bf0e10596e0058529aa525d8e154aa67afe7d2
passthrough: release assigned PCI devices earlier during domain
shutdown

At least with xend, where there's not even a tool stack side attempt
to de-assign devices during domain shutdown, this allows immediate re-
starts of a domain to work reliably. (There's no apparent reason why
c/s 18010:c1577f094ae4 chose to put this in the asynchronous part of
domain destruction).

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
Acked-by: Keir Fraser <keir@xxxxxxx>
xen-unstable changeset:   24888:71159fb049f2
xen-unstable date:        Fri Feb 24 11:46:32 2012 +0100
---


diff -r 26bf0e10596e -r c62e9965b395 xen/arch/ia64/xen/domain.c
--- a/xen/arch/ia64/xen/domain.c        Wed Mar 07 09:05:20 2012 +0000
+++ b/xen/arch/ia64/xen/domain.c        Wed Mar 07 09:09:05 2012 +0000
@@ -669,10 +669,8 @@
                free_xenheap_pages(d->shared_info,
                                   get_order_from_shift(XSI_SHIFT));
 
-       if ( iommu_enabled && need_iommu(d) )   {
-               pci_release_devices(d);
+       if ( iommu_enabled && need_iommu(d) )
                iommu_domain_destroy(d);
-       }
 
        tlb_track_destroy(d);
 
@@ -1717,6 +1715,8 @@
 
        switch (d->arch.relres) {
        case RELRES_not_started:
+               pci_release_devices(d);
+
                /* Relinquish guest resources for VT-i domain. */
                if (is_hvm_domain(d))
                        vmx_relinquish_guest_resources(d);
diff -r 26bf0e10596e -r c62e9965b395 xen/arch/x86/domain.c
--- a/xen/arch/x86/domain.c     Wed Mar 07 09:05:20 2012 +0000
+++ b/xen/arch/x86/domain.c     Wed Mar 07 09:09:05 2012 +0000
@@ -565,7 +565,6 @@
     if ( is_hvm_domain(d) )
         hvm_domain_destroy(d);
 
-    pci_release_devices(d);
     free_domain_pirqs(d);
     if ( !is_idle_domain(d) )
         iommu_domain_destroy(d);
@@ -1967,6 +1966,8 @@
     switch ( d->arch.relmem )
     {
     case RELMEM_not_started:
+        pci_release_devices(d);
+
         /* Tear down paging-assistance stuff. */
         paging_teardown(d);
 
diff -r 26bf0e10596e -r c62e9965b395 xen/arch/x86/domctl.c
--- a/xen/arch/x86/domctl.c     Wed Mar 07 09:05:20 2012 +0000
+++ b/xen/arch/x86/domctl.c     Wed Mar 07 09:09:05 2012 +0000
@@ -832,6 +832,9 @@
             break;
         }
 
+        if ( d->is_dying )
+            goto assign_device_out;
+
         ret = xsm_assign_device(d, domctl->u.assign_device.machine_bdf);
         if ( ret )
             goto assign_device_out;

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.