[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 2/3] svm: iommu: Only call guest_iommu_init() after initialized HVM domain
> -----Original Message----- > From: suravee.suthikulpanit@xxxxxxx > [mailto:suravee.suthikulpanit@xxxxxxx] > Sent: 22 May 2016 00:43 > To: xen-devel@xxxxxxxxxxxxx; Paul Durrant; jbeulich@xxxxxxxx; George > Dunlap > Cc: Keir (Xen.org); Suravee Suthikulpanit > Subject: [PATCH v3 2/3] svm: iommu: Only call guest_iommu_init() after > initialized HVM domain > > From: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> > > The guest_iommu_init() is currently called by the following code path: > > arch/x86/domain.c: arch_domain_create() > ]- drivers/passthrough/iommu.c: iommu_domain_init() > |- drivers/passthrough/amd/pci_amd_iommu.c: > amd_iommu_domain_init(); > |- drivers/passthrough/amd/iommu_guest.c: guest_iommu_init() > > At this point, the hvm_domain_initialised() has not been called. > So register_mmio_handler() in guest_iommu_init() silently fails. > This patch moves the iommu_domain_init() to a later point after the > hvm_domain_intialise() instead. > > Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx> > --- > xen/arch/x86/domain.c | 9 ++++++--- > 1 file changed, 6 insertions(+), 3 deletions(-) > > diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c > index 5af2cc5..0260e01 100644 > --- a/xen/arch/x86/domain.c > +++ b/xen/arch/x86/domain.c > @@ -642,9 +642,6 @@ int arch_domain_create(struct domain *d, unsigned > int domcr_flags, > > if ( (rc = init_domain_irq_mapping(d)) != 0 ) > goto fail; > - > - if ( (rc = iommu_domain_init(d)) != 0 ) > - goto fail; > } > spin_lock_init(&d->arch.e820_lock); > > @@ -660,6 +657,9 @@ int arch_domain_create(struct domain *d, unsigned > int domcr_flags, > /* 64-bit PV guest by default. */ > d->arch.is_32bit_pv = d->arch.has_32bit_shinfo = 0; > > + if ( !is_idle_domain(d) && (rc = iommu_domain_init(d)) != 0 ) > + goto fail_1; > + > /* initialize default tsc behavior in case tools don't */ > tsc_set_info(d, TSC_MODE_DEFAULT, 0UL, 0, 0); > spin_lock_init(&d->arch.vtsc_lock); > @@ -675,6 +675,9 @@ int arch_domain_create(struct domain *d, unsigned > int domcr_flags, > > return 0; > > + fail_1: > + if ( has_hvm_container_domain(d) ) > + hvm_domain_destroy(d); > fail: > d->is_dying = DOMDYING_dead; > psr_domain_free(d); > -- > 1.9.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |