Fix an unguarded d->arch.hvm access in assign_device(). Signed-off-by: Jan Beulich <jbeul...@suse.com> --- Split from now withdrawn "x86/HVM: p2m_ram_ro is incompatible with device pass-through".
--- a/xen/drivers/passthrough/pci.c +++ b/xen/drivers/passthrough/pci.c @@ -1488,7 +1488,8 @@ static int assign_device(struct domain * /* Prevent device assign if mem paging or mem sharing have been * enabled for this domain */ - if ( unlikely(d->arch.hvm.mem_sharing_enabled || + if ( unlikely((is_hvm_domain(d) && + d->arch.hvm.mem_sharing_enabled) || vm_event_check_ring(d->vm_event_paging) || p2m_get_hostp2m(d)->global_logdirty) ) return -EXDEV; _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel