File d0935478-pcidev2.patch of Package libvirt.1301

commit d09354786aaa7e1d384b0158b446cc783425d0de
Author: Osier Yang <jyang@redhat.com>
Date:   Thu Oct 13 16:30:21 2011 +0800

    qemu: Honor the orginal PCI dev properties when reattaching
    
    BZ# https://bugzilla.redhat.com/show_bug.cgi?id=736214
    
    The problem is caused by the original info of domain's PCI dev is
    maintained by qemu_driver->activePciHostdevs list, (E.g. dev->reprobe,
    which stands for whether need to reprobe driver for the dev when do
    reattachment). The fields (dev->reprobe, dev->unbind_from_stub, and
    dev->remove_slot) are initialized properly when preparing the PCI
    device for managed attachment. However, when do reattachment, it
    construct a complete new "pciDevice" without honoring the original
    dev info, and thus the dev won't get the original driver or can get
    other problem.
    
    This patch is to fix the problem by get the devs from list
    driver->activePciHostdevs.
    
    Tested with following 3 scenarios:
      * the PCI was bound to some driver not pci-stub before attaching
    
        result: the device will be bound to the original driver
    
      * the PCI was bound to pci-stub before attaching
    
        result: no driver reprobing, and still bound to pci-stub
    
      * The PCI was not bound to any driver
    
        result: no driver reprobing, and still not bound to any driver.

Index: libvirt-0.9.6/src/qemu/qemu_hostdev.c
===================================================================
--- libvirt-0.9.6.orig/src/qemu/qemu_hostdev.c
+++ libvirt-0.9.6/src/qemu/qemu_hostdev.c
@@ -69,6 +69,49 @@ qemuGetPciHostDeviceList(virDomainHostde
     return list;
 }
 
+static pciDeviceList *
+qemuGetActivePciHostDeviceList(struct qemud_driver *driver,
+                               virDomainHostdevDefPtr *hostdevs,
+                               int nhostdevs)
+{
+    pciDeviceList *list;
+    int i;
+
+    if (!(list = pciDeviceListNew()))
+        return NULL;
+
+    for (i = 0 ; i < nhostdevs ; i++) {
+        virDomainHostdevDefPtr hostdev = hostdevs[i];
+        pciDevice *dev;
+        pciDevice *activeDev;
+
+        if (hostdev->mode != VIR_DOMAIN_HOSTDEV_MODE_SUBSYS)
+            continue;
+        if (hostdev->source.subsys.type != VIR_DOMAIN_HOSTDEV_SUBSYS_TYPE_PCI)
+            continue;
+
+        dev = pciGetDevice(hostdev->source.subsys.u.pci.domain,
+                           hostdev->source.subsys.u.pci.bus,
+                           hostdev->source.subsys.u.pci.slot,
+                           hostdev->source.subsys.u.pci.function);
+        if (!dev) {
+            pciDeviceListFree(list);
+            return NULL;
+        }
+
+        if ((activeDev = pciDeviceListFind(driver->activePciHostdevs, dev))) {
+            if (pciDeviceListAdd(list, activeDev) < 0) {
+                pciFreeDevice(dev);
+                pciDeviceListFree(list);
+                return NULL;
+            }
+        }
+
+        pciFreeDevice(dev);
+    }
+
+    return list;
+}
 
 int qemuUpdateActivePciHostdevs(struct qemud_driver *driver,
                                 virDomainDefPtr def)
@@ -304,7 +347,9 @@ void qemuDomainReAttachHostdevDevices(st
     pciDeviceList *pcidevs;
     int i;
 
-    if (!(pcidevs = qemuGetPciHostDeviceList(hostdevs, nhostdevs))) {
+    if (!(pcidevs = qemuGetActivePciHostDeviceList(driver,
+                                                   hostdevs,
+                                                   nhostdevs))) {
         virErrorPtr err = virGetLastError();
         VIR_ERROR(_("Failed to allocate pciDeviceList: %s"),
                   err ? err->message : _("unknown error"));
@@ -314,7 +359,6 @@ void qemuDomainReAttachHostdevDevices(st
 
     /* Again 3 loops; mark all devices as inactive before reset
      * them and reset all the devices before re-attach */
-
     for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
         pciDevice *dev = pciDeviceListGet(pcidevs, i);
         pciDevice *activeDev = NULL;
@@ -327,7 +371,8 @@ void qemuDomainReAttachHostdevDevices(st
             STRNEQ_NULLABLE(name, pciDeviceGetUsedBy(activeDev)))
             continue;
 
-        pciDeviceListDel(driver->activePciHostdevs, dev);
+        /* pciDeviceListFree() will take care of freeing the dev. */
+        pciDeviceListSteal(driver->activePciHostdevs, dev);
     }
 
     for (i = 0; i < pciDeviceListCount(pcidevs); i++) {
openSUSE Build Service is sponsored by