xen/pciback: Add flag indicating device has been assigned by Xen

Device drivers that create and destroy SR-IOV virtual functions via
calls to pci_enable_sriov() and pci_disable_sriov can cause catastrophic
failures if they attempt to destroy VFs while they are assigned to
guest virtual machines.  By adding a flag for use by the Xen PCI back
to indicate that a device is assigned a device driver can check that
flag and avoid destroying VFs while they are assigned and avoid system
failures.

Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
Konrad Rzeszutek Wilk 2011-09-26 12:22:01 -04:00 committed by David S. Miller
parent 2aefcad866
commit cf177fd049
1 changed files with 2 additions and 0 deletions

View File

@ -249,6 +249,7 @@ static int xen_pcibk_export_device(struct xen_pcibk_device *pdev,
goto out; goto out;
dev_dbg(&dev->dev, "registering for %d\n", pdev->xdev->otherend_id); dev_dbg(&dev->dev, "registering for %d\n", pdev->xdev->otherend_id);
dev->dev_flags |= PCI_DEV_FLAGS_ASSIGNED;
if (xen_register_device_domain_owner(dev, if (xen_register_device_domain_owner(dev,
pdev->xdev->otherend_id) != 0) { pdev->xdev->otherend_id) != 0) {
dev_err(&dev->dev, "device has been assigned to another " \ dev_err(&dev->dev, "device has been assigned to another " \
@ -288,6 +289,7 @@ static int xen_pcibk_remove_device(struct xen_pcibk_device *pdev,
} }
dev_dbg(&dev->dev, "unregistering for %d\n", pdev->xdev->otherend_id); dev_dbg(&dev->dev, "unregistering for %d\n", pdev->xdev->otherend_id);
dev->dev_flags &= ~PCI_DEV_FLAGS_ASSIGNED;
xen_unregister_device_domain_owner(dev); xen_unregister_device_domain_owner(dev);
xen_pcibk_release_pci_dev(pdev, dev); xen_pcibk_release_pci_dev(pdev, dev);