[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v10 4/4] vpci/msix: Free MSIX resources when init_msix() fails
On Wed, Aug 06, 2025 at 10:30:53AM +0200, Jan Beulich wrote: > On 06.08.2025 10:22, Roger Pau Monné wrote: > > On Tue, Aug 05, 2025 at 10:43:09AM +0200, Jan Beulich wrote: > >> On 05.08.2025 05:49, Jiqian Chen wrote: > >>> --- a/xen/drivers/vpci/msix.c > >>> +++ b/xen/drivers/vpci/msix.c > >>> @@ -655,6 +655,48 @@ int vpci_make_msix_hole(const struct pci_dev *pdev) > >>> return 0; > >>> } > >>> > >>> +static int cf_check cleanup_msix(const struct pci_dev *pdev) > >>> +{ > >>> + int rc; > >>> + struct vpci *vpci = pdev->vpci; > >>> + const unsigned int msix_pos = pdev->msix_pos; > >>> + > >>> + if ( !msix_pos ) > >>> + return 0; > >>> + > >>> + rc = vpci_remove_registers(vpci, msix_control_reg(msix_pos), 2); > >>> + if ( rc ) > >>> + { > >>> + printk(XENLOG_ERR "%pd %pp: fail to remove MSIX handlers > >>> rc=%d\n", > >>> + pdev->domain, &pdev->sbdf, rc); > >>> + ASSERT_UNREACHABLE(); > >>> + return rc; > >>> + } > >>> + > >>> + if ( vpci->msix ) > >>> + { > >>> + list_del(&vpci->msix->next); > >>> + for ( unsigned int i = 0; i < ARRAY_SIZE(vpci->msix->table); i++ > >>> ) > >>> + if ( vpci->msix->table[i] ) > >>> + iounmap(vpci->msix->table[i]); > >>> + > >>> + XFREE(vpci->msix); > >>> + } > >>> + > >>> + /* > >>> + * The driver may not traverse the capability list and think device > >>> + * supports MSIX by default. So here let the control register of MSIX > >>> + * be Read-Only is to ensure MSIX disabled. > >>> + */ > >>> + rc = vpci_add_register(vpci, vpci_hw_read16, NULL, > >>> + msix_control_reg(msix_pos), 2, NULL); > >>> + if ( rc ) > >>> + printk(XENLOG_ERR "%pd %pp: fail to add MSIX ctrl handler > >>> rc=%d\n", > >>> + pdev->domain, &pdev->sbdf, rc); > >> > >> Here as well as for MSI: Wouldn't this better be limited to the > >> init-failure > >> case? No point in adding a register hook (and possibly emitting a > >> misleading > >> log message) when we're tearing down anyway. IOW I think the ->cleanup() > >> hook needs a boolean parameter, unless the distinction of the two cases can > >> be (reliably) inferred from some other property. > > > > I don't think we have any signal in pci_dev itself that notices > > whether the device is being deassigned, in which case it does need an > > extra boolean parameter to notice whether to add the r/o handler. > > > > I'm also wondering whether we want to limit this hiding to the > > hardware domain only, and for domUs fail the operation instead, and > > fail to assign the device. That can be adjusted in a later patch > > though. > > Yes, DomU wants handling as you say. Iirc there are other open issues with > DomU support, though. Hence yes, "later" ought to suffice here. Perhaps > worth annotating with a fixme, though, to be able to easily spot all the > places that require adjustment. Sometimes I don't take into account that vPCI is also supposed to be used by domUs in the long run and forget about that aspect when reviewing patches Roger.
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |