|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v7 7/8] vpci/msi: Free MSI resources when init_msi() fails
On 23.07.2025 09:54, Chen, Jiqian wrote:
> On 2025/7/22 00:21, Roger Pau Monné wrote:
>> On Fri, Jul 04, 2025 at 03:08:02PM +0800, Jiqian Chen wrote:
>>> When init_msi() fails, current logic return fail and free MSI-related
>>> resources in vpci_deassign_device(). But the previous new changes will
>>> hide MSI capability and return success, it can't reach
>>> vpci_deassign_device() to remove resources if hiding success, so those
>>> resources must be removed in cleanup function of MSI.
>>>
>>> To do that, implement cleanup function for MSI.
>>>
>>> Signed-off-by: Jiqian Chen <Jiqian.Chen@xxxxxxx>
>>> ---
>>> cc: "Roger Pau Monné" <roger.pau@xxxxxxxxxx>
>>> ---
>>> v6->v7 changes:
>>> * Change the pointer parameter of cleanup_msi() to be const.
>>> * When vpci_remove_registers() in cleanup_msi() fails, not to return
>>> directly, instead try to free msi and re-add ctrl handler.
>>> * Pass pdev->vpci into vpci_add_register() instead of pdev->vpci->msi in
>>> init_msi() since we need that every handler realize that msi is NULL
>>> when msi is free but handlers are still in there.
>>>
>>> v5->v6 changes:
>>> No.
>>>
>>> v4->v5 changes:
>>> * Change definition "static void cleanup_msi" to "static int cf_check
>>> cleanup_msi"
>>> since cleanup hook is changed to be int.
>>> * Add a read-only register for MSI Control Register in the end of
>>> cleanup_msi.
>>>
>>> v3->v4 changes:
>>> * Change function name from fini_msi() to cleanup_msi().
>>> * Remove unnecessary comment.
>>> * Change to use XFREE to free vpci->msi.
>>>
>>> v2->v3 changes:
>>> * Remove all fail path, and use fini_msi() hook instead.
>>> * Change the method to calculating the size of msi registers.
>>>
>>> v1->v2 changes:
>>> * Added a new function fini_msi to free all MSI resources instead of using
>>> an array
>>> to record registered registers.
>>>
>>> Best regards,
>>> Jiqian Chen.
>>> ---
>>> xen/drivers/vpci/msi.c | 111 ++++++++++++++++++++++++++++++++++-------
>>> 1 file changed, 94 insertions(+), 17 deletions(-)
>>>
>>> diff --git a/xen/drivers/vpci/msi.c b/xen/drivers/vpci/msi.c
>>> index c3eba4e14870..09b91a685df5 100644
>>> --- a/xen/drivers/vpci/msi.c
>>> +++ b/xen/drivers/vpci/msi.c
>>> @@ -25,7 +25,11 @@
>>> static uint32_t cf_check control_read(
>>> const struct pci_dev *pdev, unsigned int reg, void *data)
>>> {
>>> - const struct vpci_msi *msi = data;
>>> + const struct vpci *vpci = data;
>>> + const struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return pci_conf_read16(pdev->sbdf, reg);
>>>
>>> return MASK_INSR(fls(pdev->msi_maxvec) - 1, PCI_MSI_FLAGS_QMASK) |
>>> MASK_INSR(fls(msi->vectors) - 1, PCI_MSI_FLAGS_QSIZE) |
>>> @@ -37,12 +41,16 @@ static uint32_t cf_check control_read(
>>> static void cf_check control_write(
>>> const struct pci_dev *pdev, unsigned int reg, uint32_t val, void *data)
>>> {
>>> - struct vpci_msi *msi = data;
>>> + struct vpci *vpci = data;
>>> + struct vpci_msi *msi = vpci->msi;
>>> unsigned int vectors = min_t(uint8_t,
>>> 1u << MASK_EXTR(val, PCI_MSI_FLAGS_QSIZE),
>>> pdev->msi_maxvec);
>>> bool new_enabled = val & PCI_MSI_FLAGS_ENABLE;
>>>
>>> + if ( !msi )
>>> + return;
>>> +
>>> /*
>>> * No change if the enable field and the number of vectors is
>>> * the same or the device is not enabled, in which case the
>>> @@ -101,7 +109,11 @@ static void update_msi(const struct pci_dev *pdev,
>>> struct vpci_msi *msi)
>>> static uint32_t cf_check address_read(
>>> const struct pci_dev *pdev, unsigned int reg, void *data)
>>> {
>>> - const struct vpci_msi *msi = data;
>>> + const struct vpci *vpci = data;
>>> + const struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return ~(uint32_t)0;
>>>
>>> return msi->address;
>>> }
>>> @@ -109,7 +121,11 @@ static uint32_t cf_check address_read(
>>> static void cf_check address_write(
>>> const struct pci_dev *pdev, unsigned int reg, uint32_t val, void *data)
>>> {
>>> - struct vpci_msi *msi = data;
>>> + struct vpci *vpci = data;
>>> + struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return;
>>>
>>> /* Clear low part. */
>>> msi->address &= ~0xffffffffULL;
>>> @@ -122,7 +138,11 @@ static void cf_check address_write(
>>> static uint32_t cf_check address_hi_read(
>>> const struct pci_dev *pdev, unsigned int reg, void *data)
>>> {
>>> - const struct vpci_msi *msi = data;
>>> + const struct vpci *vpci = data;
>>> + const struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return ~(uint32_t)0;
>>>
>>> return msi->address >> 32;
>>> }
>>> @@ -130,7 +150,11 @@ static uint32_t cf_check address_hi_read(
>>> static void cf_check address_hi_write(
>>> const struct pci_dev *pdev, unsigned int reg, uint32_t val, void *data)
>>> {
>>> - struct vpci_msi *msi = data;
>>> + struct vpci *vpci = data;
>>> + struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return;
>>>
>>> /* Clear and update high part. */
>>> msi->address = (uint32_t)msi->address;
>>> @@ -143,7 +167,11 @@ static void cf_check address_hi_write(
>>> static uint32_t cf_check data_read(
>>> const struct pci_dev *pdev, unsigned int reg, void *data)
>>> {
>>> - const struct vpci_msi *msi = data;
>>> + const struct vpci *vpci = data;
>>> + const struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return ~(uint32_t)0;
>>>
>>> return msi->data;
>>> }
>>> @@ -151,7 +179,11 @@ static uint32_t cf_check data_read(
>>> static void cf_check data_write(
>>> const struct pci_dev *pdev, unsigned int reg, uint32_t val, void *data)
>>> {
>>> - struct vpci_msi *msi = data;
>>> + struct vpci *vpci = data;
>>> + struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return;
>>>
>>> msi->data = val;
>>>
>>> @@ -162,7 +194,11 @@ static void cf_check data_write(
>>> static uint32_t cf_check mask_read(
>>> const struct pci_dev *pdev, unsigned int reg, void *data)
>>> {
>>> - const struct vpci_msi *msi = data;
>>> + const struct vpci *vpci = data;
>>> + const struct vpci_msi *msi = vpci->msi;
>>> +
>>> + if ( !msi )
>>> + return ~(uint32_t)0;
>>>
>>> return msi->mask;
>>> }
>>> @@ -170,9 +206,14 @@ static uint32_t cf_check mask_read(
>>> static void cf_check mask_write(
>>> const struct pci_dev *pdev, unsigned int reg, uint32_t val, void *data)
>>> {
>>> - struct vpci_msi *msi = data;
>>> - uint32_t dmask = msi->mask ^ val;
>>> + struct vpci *vpci = data;
>>> + struct vpci_msi *msi = vpci->msi;
>>> + uint32_t dmask;
>>> +
>>> + if ( !msi )
>>> + return;
>>>
>>> + dmask = msi->mask ^ val;
>>> if ( !dmask )
>>> return;
>>>
>>> @@ -193,6 +234,42 @@ static void cf_check mask_write(
>>> msi->mask = val;
>>> }
>>>
>>> +static int cf_check cleanup_msi(const struct pci_dev *pdev)
>>> +{
>>> + int rc;
>>> + unsigned int end;
>>> + struct vpci *vpci = pdev->vpci;
>>> + const unsigned int msi_pos = pdev->msi_pos;
>>> + const unsigned int ctrl = msi_control_reg(msi_pos);
>>> +
>>> + if ( !msi_pos || !vpci->msi )
>>> + return 0;
>>> +
>>> + if ( vpci->msi->masking )
>>> + end = msi_pending_bits_reg(msi_pos, vpci->msi->address64);
>>> + else
>>> + end = msi_mask_bits_reg(msi_pos, vpci->msi->address64) - 2;
>>> +
>>> + rc = vpci_remove_registers(vpci, ctrl, end - ctrl);
>>> + if ( rc )
>>> + printk(XENLOG_WARNING "%pd %pp: fail to remove MSI handlers
>>> rc=%d\n",
>>> + pdev->domain, &pdev->sbdf, rc);
>>
>> I think you could possibly do this as:
>>
>> if ( rc )
>> {
>> printk(...);
>> ASSERT_UNREACHABLE();
>> return rc;
>> }
>>
>> Given the code in vpci_remove_registers() an error in the removal of
>> registers would likely imply memory corruption, at which point it's
>> best to fully disable the device. That would allow you having to
>> modify all the handlers to pass vpci instead of msi structs.
>>
>> That will avoid a lot of the extra code churn of having to change the
>> handler parameters.
> OK, got it.
> Since Jan proposed this consideration in v6, I need to ask for his opinion.
> Hi Jan, do you fine with this change?
If that's what Roger prefers, so be it. (Imo if we suspected memory
corruption, we'd better halt the system. I agree though that in
practice vpci_remove_registers() shouldn't fail here.)
Jan
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |