diff options
author | Paolo Bonzini | 2015-02-10 18:25:44 +0100 |
---|---|---|
committer | Alex Williamson | 2015-02-10 18:25:44 +0100 |
commit | 77a10d04d033484a913a5ee76eed31a9acc57bae (patch) | |
tree | a0d2f43bccfa7b01a66b8111f0192d588a535e4f /hw/vfio/pci.c | |
parent | vfio: cleanup vfio_get_device error path, remove vfio_populate_device callback (diff) | |
download | qemu-77a10d04d033484a913a5ee76eed31a9acc57bae.tar.gz qemu-77a10d04d033484a913a5ee76eed31a9acc57bae.tar.xz qemu-77a10d04d033484a913a5ee76eed31a9acc57bae.zip |
vfio: free dynamically-allocated data in instance_finalize
In order to enable out-of-BQL address space lookup, destruction of
devices needs to be split in two phases.
Unrealize is the first phase; once it complete no new accesses will
be started, but there may still be pending memory accesses can still
be completed.
The second part is freeing the device, which only happens once all memory
accesses are complete. At this point the reference count has dropped to
zero, an RCU grace period must have completed (because the RCU-protected
FlatViews hold a reference to the device via memory_region_ref). This is
when instance_finalize is called.
Freeing data belongs in an instance_finalize callback, because the
dynamically allocated memory can still be used after unrealize by the
pending memory accesses.
This starts the process by creating an instance_finalize callback and
freeing most of the dynamically-allocated data in instance_finalize.
Because instance_finalize is also called on error paths or also when
the device is actually not realized, the common code needs some changes
to be ready for this. The error path in vfio_initfn can be simplified too.
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Alex Williamson <alex.williamson@redhat.com>
Diffstat (limited to 'hw/vfio/pci.c')
-rw-r--r-- | hw/vfio/pci.c | 24 |
1 files changed, 14 insertions, 10 deletions
diff --git a/hw/vfio/pci.c b/hw/vfio/pci.c index 23fe9fa030..0271c801b6 100644 --- a/hw/vfio/pci.c +++ b/hw/vfio/pci.c @@ -3248,7 +3248,7 @@ static int vfio_initfn(PCIDevice *pdev) ret = vfio_populate_device(vdev); if (ret) { - goto out_put; + return ret; } /* Get a copy of config space */ @@ -3258,7 +3258,7 @@ static int vfio_initfn(PCIDevice *pdev) if (ret < (int)MIN(pci_config_size(&vdev->pdev), vdev->config_size)) { ret = ret < 0 ? -errno : -EFAULT; error_report("vfio: Failed to read device config space"); - goto out_put; + return ret; } /* vfio emulates a lot for us, but some bits need extra love */ @@ -3290,7 +3290,7 @@ static int vfio_initfn(PCIDevice *pdev) ret = vfio_early_setup_msix(vdev); if (ret) { - goto out_put; + return ret; } vfio_map_bars(vdev); @@ -3329,17 +3329,24 @@ out_teardown: pci_device_set_intx_routing_notifier(&vdev->pdev, NULL); vfio_teardown_msi(vdev); vfio_unmap_bars(vdev); -out_put: + return ret; +} + +static void vfio_instance_finalize(Object *obj) +{ + PCIDevice *pci_dev = PCI_DEVICE(obj); + VFIOPCIDevice *vdev = DO_UPCAST(VFIOPCIDevice, pdev, pci_dev); + VFIOGroup *group = vdev->vbasedev.group; + g_free(vdev->emulated_config_bits); + g_free(vdev->rom); vfio_put_device(vdev); vfio_put_group(group); - return ret; } static void vfio_exitfn(PCIDevice *pdev) { VFIOPCIDevice *vdev = DO_UPCAST(VFIOPCIDevice, pdev, pdev); - VFIOGroup *group = vdev->vbasedev.group; vfio_unregister_err_notifier(vdev); pci_device_set_intx_routing_notifier(&vdev->pdev, NULL); @@ -3349,10 +3356,6 @@ static void vfio_exitfn(PCIDevice *pdev) } vfio_teardown_msi(vdev); vfio_unmap_bars(vdev); - g_free(vdev->emulated_config_bits); - g_free(vdev->rom); - vfio_put_device(vdev); - vfio_put_group(group); } static void vfio_pci_reset(DeviceState *dev) @@ -3440,6 +3443,7 @@ static const TypeInfo vfio_pci_dev_info = { .instance_size = sizeof(VFIOPCIDevice), .class_init = vfio_pci_dev_class_init, .instance_init = vfio_instance_init, + .instance_finalize = vfio_instance_finalize, }; static void register_vfio_pci_dev_type(void) |