[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH V2] xen: Fix BUFIOREQ evtchn init for a stubdom.
On Tue, 2012-06-26 at 16:21 +0100, Anthony PERARD wrote: > This is a missing part from the previous patch that add the BUFIOREQ_EVTCHN > parameter. This patch changes the ownership of the buifioreq event channel to > the stubdom (when HVM_PARAM_DM_DOMAIN is set within the stubdom). > > This patch introduces an helper to replace a xen port. > > This fix the initialization of QEMU inside the stubdomain. > > Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx> Thought I'd already acked this but apparently not. This fixes stub domains for me. Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> Tested-by: Ian Campbell <ian.campbell@xxxxxxxxxx> CCing Hypervisor maintainers... > --- > Change: > - an helper > - the replacement of the buferioreq evtchn is inside iorp->lock now. > > xen/arch/x86/hvm/hvm.c | 37 ++++++++++++++++++++++++++++--------- > 1 files changed, 28 insertions(+), 9 deletions(-) > > diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c > index e0d495d..e8e86c0 100644 > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -3664,6 +3664,21 @@ static int hvmop_flush_tlb_all(void) > return 0; > } > > +static int hvm_replace_event_channel(struct vcpu *v, uint64_t remote_domid, > + int *port) > +{ > + int old_port, new_port; > + > + new_port = alloc_unbound_xen_event_channel(v, remote_domid, NULL); > + if ( new_port < 0 ) > + return new_port; > + > + /* xchg() ensures that only we free_xen_event_channel() */ > + old_port = xchg(port, new_port); > + free_xen_event_channel(v, old_port); > + return 0; > +} > + > long do_hvm_op(unsigned long op, XEN_GUEST_HANDLE(void) arg) > > { > @@ -3777,17 +3792,21 @@ long do_hvm_op(unsigned long op, > XEN_GUEST_HANDLE(void) arg) > iorp = &d->arch.hvm_domain.ioreq; > for_each_vcpu ( d, v ) > { > - int old_port, new_port; > - new_port = alloc_unbound_xen_event_channel( > - v, a.value, NULL); > - if ( new_port < 0 ) > - { > - rc = new_port; > + rc = hvm_replace_event_channel(v, a.value, > + > &v->arch.hvm_vcpu.xen_port); > + if ( rc ) > break; > + > + if ( v->vcpu_id == 0 ) > + { > + spin_lock(&iorp->lock); > + rc = hvm_replace_event_channel(v, a.value, > + > (int*)&v->domain->arch.hvm_domain.params[HVM_PARAM_BUFIOREQ_EVTCHN]); > + spin_unlock(&iorp->lock); > + if ( rc ) > + break; > } > - /* xchg() ensures that only we free_xen_event_channel() > */ > - old_port = xchg(&v->arch.hvm_vcpu.xen_port, new_port); > - free_xen_event_channel(v, old_port); > + > spin_lock(&iorp->lock); > if ( iorp->va != NULL ) > get_ioreq(v)->vp_eport = v->arch.hvm_vcpu.xen_port; _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |