From: "Michael S. Tsirkin" <mst@redhat.com>
To: Anthony Liguori <anthony@codemonkey.ws>
Cc: kernel@vger.kernel.org, Matt Wilson <msw@amazon.com>,
Anthony Liguori <aliguori@amazon.com>,
virtualization@lists.linux-foundation.org
Subject: Re: [PATCH] virtio_pci: properly clean up MSI-X state when initialization fails
Date: Mon, 15 Sep 2014 11:32:20 +0300 [thread overview]
Message-ID: <20140915083220.GC6480@redhat.com> (raw)
In-Reply-To: <1410751406-10039-1-git-send-email-anthony@codemonkey.ws>
On Sun, Sep 14, 2014 at 08:23:26PM -0700, Anthony Liguori wrote:
> From: Anthony Liguori <aliguori@amazon.com>
>
> If MSI-X initialization fails after setting msix_enabled = 1, then
> the device is left in an inconsistent state. This would normally
> only happen if there was a bug in the device emulation but it still
> should be handled correctly.
This might happen if host runs out of resources when trying
to map VQs to vectors, so doesn't have to be a bug.
But I don't see what the problem is:
msix_used_vectors reflects the number of used vectors
and msix_enabled is set, thus vp_free_vectors
will free all IRQs and then disable MSIX.
Where is the inconsistency you speak about?
>
> Cc: Matt Wilson <msw@amazon.com>
> Cc: Rusty Russell <rusty@rustcorp.com.au>
> Cc: Michael Tsirkin <mst@redhat.com>
> Signed-off-by: Anthony Liguori <aliguori@amazon.com>
> ---
> drivers/virtio/virtio_pci.c | 8 ++++++--
> 1 file changed, 6 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/virtio/virtio_pci.c b/drivers/virtio/virtio_pci.c
> index 9cbac33..3d2c2a5 100644
> --- a/drivers/virtio/virtio_pci.c
> +++ b/drivers/virtio/virtio_pci.c
> @@ -357,7 +357,7 @@ static int vp_request_msix_vectors(struct virtio_device *vdev, int nvectors,
> v = ioread16(vp_dev->ioaddr + VIRTIO_MSI_CONFIG_VECTOR);
> if (v == VIRTIO_MSI_NO_VECTOR) {
> err = -EBUSY;
> - goto error;
> + goto error_msix_used;
> }
>
> if (!per_vq_vectors) {
> @@ -369,11 +369,15 @@ static int vp_request_msix_vectors(struct virtio_device *vdev, int nvectors,
> vp_vring_interrupt, 0, vp_dev->msix_names[v],
> vp_dev);
> if (err)
> - goto error;
> + goto error_msix_used;
> ++vp_dev->msix_used_vectors;
> }
> return 0;
> +error_msix_used:
> + v = --vp_dev->msix_used_vectors;
> + free_irq(vp_dev->msix_entries[v].vector, vp_dev);
> error:
> + vp_dev->msix_enabled = 0;
As far as I can see, if you do this, guest will not call
pci_disable_msix thus leaving the device with MSIX enabled.
I'm not sure this won't break drivers if they then
try to use the device without MSIX, and it
definitely seems less elegant than reverting the
device to the original state.
> vp_free_vectors(vdev);
> return err;
> }
> --
> 1.7.9.5
next prev parent reply other threads:[~2014-09-15 8:32 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-15 3:23 [PATCH] virtio_pci: properly clean up MSI-X state when initialization fails Anthony Liguori
2014-09-15 3:43 ` Matt Wilson
2014-09-15 8:32 ` Michael S. Tsirkin [this message]
2014-09-15 14:10 ` Anthony Liguori
2014-09-15 14:39 ` Michael S. Tsirkin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140915083220.GC6480@redhat.com \
--to=mst@redhat.com \
--cc=aliguori@amazon.com \
--cc=anthony@codemonkey.ws \
--cc=kernel@vger.kernel.org \
--cc=msw@amazon.com \
--cc=virtualization@lists.linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).