mirror of
https://github.com/projectacrn/acrn-hypervisor.git
synced 2025-09-21 08:50:27 +00:00
hv: the VM can only deinit its own devices
VM needs to check if it owns this device before deiniting it. Tracked-On: #4433 Signed-off-by: Yuan Liu <yuan1.liu@intel.com> Signed-off-by: Yin Fengwei <fengwei.yin@intel.com> Acked-by: Eddie Dong <eddie.dong@intel.com>
This commit is contained in:
@@ -637,7 +637,10 @@ static void deinit_prelaunched_vm_vpci(struct acrn_vm *vm)
|
||||
for (i = 0U; i < vm->vpci.pci_vdev_cnt; i++) {
|
||||
vdev = (struct pci_vdev *) &(vm->vpci.pci_vdevs[i]);
|
||||
|
||||
vdev->vdev_ops->deinit_vdev(vdev);
|
||||
/* Only deinit the VM's own devices */
|
||||
if (is_own_device(vm, vdev)) {
|
||||
vdev->vdev_ops->deinit_vdev(vdev);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -669,7 +672,8 @@ static void deinit_postlaunched_vm_vpci(struct acrn_vm *vm)
|
||||
for (i = 0U; i < sos_vm->vpci.pci_vdev_cnt; i++) {
|
||||
vdev = (struct pci_vdev *)&(sos_vm->vpci.pci_vdevs[i]);
|
||||
|
||||
if (vdev->vpci->vm == vm) {
|
||||
/* Only deinit the VM's own devices */
|
||||
if (is_own_device(vm, vdev)) {
|
||||
spinlock_obtain(&vm->vpci.lock);
|
||||
target_vdev = vdev->new_owner;
|
||||
ret = move_pt_device(vm->iommu, sos_vm->iommu, (uint8_t)target_vdev->pdev->bdf.bits.b,
|
||||
@@ -716,7 +720,7 @@ int32_t vpci_assign_pcidev(struct acrn_vm *tgt_vm, struct acrn_assign_pcidev *pc
|
||||
*
|
||||
* For now, we don't support assignment of PF to a UOS.
|
||||
*/
|
||||
if ((vdev_in_sos != NULL) && (vdev_in_sos->vpci->vm == sos_vm) && (vdev_in_sos->pdev != NULL) && (!has_sriov_cap(vdev_in_sos))) {
|
||||
if ((vdev_in_sos != NULL) && is_own_device(sos_vm, vdev_in_sos) && (vdev_in_sos->pdev != NULL) && (!has_sriov_cap(vdev_in_sos))) {
|
||||
/* ToDo: Each PT device must support one type reset */
|
||||
if (!vdev_in_sos->pdev->has_pm_reset && !vdev_in_sos->pdev->has_flr &&
|
||||
!vdev_in_sos->pdev->has_af_flr) {
|
||||
@@ -781,7 +785,7 @@ int32_t vpci_deassign_pcidev(struct acrn_vm *tgt_vm, struct acrn_assign_pcidev *
|
||||
sos_vm = get_sos_vm();
|
||||
spinlock_obtain(&sos_vm->vpci.lock);
|
||||
vdev_in_sos = pci_find_vdev(&sos_vm->vpci, bdf);
|
||||
if ((vdev_in_sos != NULL) && (vdev_in_sos->vpci->vm == tgt_vm) && (vdev_in_sos->pdev != NULL)) {
|
||||
if ((vdev_in_sos != NULL) && is_own_device(tgt_vm, vdev_in_sos) && (vdev_in_sos->pdev != NULL)) {
|
||||
vdev = vdev_in_sos->new_owner;
|
||||
|
||||
spinlock_obtain(&tgt_vm->vpci.lock);
|
||||
|
@@ -207,8 +207,9 @@ static void enable_vfs(struct pci_vdev *pf_vdev)
|
||||
create_vf(pf_vdev, vf_bdf, idx);
|
||||
} else {
|
||||
/* Re-activate a zombie VF */
|
||||
if (vf_vdev->vpci == NULL) {
|
||||
if (is_zombie_vf(vf_vdev)) {
|
||||
vf_vdev->vpci = pf_vdev->vpci;
|
||||
vf_vdev->vdev_ops->init_vdev(vf_vdev);
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -250,8 +251,9 @@ static void disable_vfs(struct pci_vdev *pf_vdev)
|
||||
bdf.fields.bus = get_vf_bus(pf_vdev, first, stride, idx);
|
||||
bdf.fields.devfun = get_vf_devfun(pf_vdev, first, stride, idx);
|
||||
vf_vdev = pci_find_vdev(&pf_vdev->vpci->vm->vpci, bdf);
|
||||
if (vf_vdev != NULL) {
|
||||
if ((vf_vdev != NULL) && (!is_zombie_vf(vf_vdev))) {
|
||||
/* set disabled VF as zombie vdev instance */
|
||||
vf_vdev->vdev_ops->deinit_vdev(vf_vdev);
|
||||
vf_vdev->vpci = NULL;
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user