Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp970510imm; Wed, 15 Aug 2018 09:09:35 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwLPmldoWy91aCIIPZhe2h+JL/upS/4o+wLvEOw5a9bacJqLqKZNR6YegrYgi7PjHFql8Dl X-Received: by 2002:a62:bd4:: with SMTP id 81-v6mr28458419pfl.67.1534349375842; Wed, 15 Aug 2018 09:09:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534349375; cv=none; d=google.com; s=arc-20160816; b=aGeFIlEdkJLfcj2kptI+56A5k+0xqh5xfDzujjDSUzLJS6pUf3l7VYk1WEtT75kMBV YDxgPoAydsfZsoshmEpcmTKqkjKTWX9xkjnw+17JOL3BPVQAeTlkm7X2iH1P4IeVgHUd /9BMgZPyJ8nzVkKgxzSwXx81aOcJGWa6YQFKEy0y+qxR2uBEI2O78KJoHhtYYGuIs/EJ STGMA/h9glwKom1/zBRGRY40mQjQlX4DY7DpLwQ/6XzgMIbkxV5hP381C/JIXNqV44yD q7AZGPQtUo0uS01amUNrMw9H6wNQgY+n40hh3nxgkdT+zNq+YpGN/8HMFT5e2xfU2w8+ IgFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=SgIPVzsV+2OZsRoqEE0+UqSOQiWT6NVUzYlESiiA8HU=; b=Cb1lTdci+DmFEIP1KROZgIP3uwQ8wlbdOy4mBnB8ggW4qZGGu0lGarMLLKy5mvRK6P eTfoPGC7Nu37W7njfO22+q2qkyU3U20pw2begCgysMPGG7r/sIK95xMh3OEYd0W/yI9V hRYRcaTYF8VFIjiO0b2ZAFvIiE/pi4jtZ+asXR/g5HBvQLssVRl2t95i4n3ng98M8fD4 kj2CSaQTDqq1t8UOzJxxiUnehkE42NwjWCSvwqr744kTQ67ehmiNOXaxecAK6oYV3Y6J DbLulJRKAaZ/ALRc/aGvdL+LS0QaTeFHpjQlV0rkpw1nBmPX4IunMxhQxDQf2zLRu1+z jUSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t10-v6si9031629plh.98.2018.08.15.09.09.20; Wed, 15 Aug 2018 09:09:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729499AbeHOTBF (ORCPT + 99 others); Wed, 15 Aug 2018 15:01:05 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:34274 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729347AbeHOTBF (ORCPT ); Wed, 15 Aug 2018 15:01:05 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C9B434021FC2; Wed, 15 Aug 2018 16:08:19 +0000 (UTC) Received: from gondolin (dhcp-192-222.str.redhat.com [10.33.192.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id 5FE452026D7E; Wed, 15 Aug 2018 16:08:16 +0000 (UTC) Date: Wed, 15 Aug 2018 18:08:14 +0200 From: Cornelia Huck To: Tony Krowiak Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, frankja@linux.ibm.com, Tony Krowiak Subject: Re: [PATCH v9 15/22] s390: vfio-ap: implement mediated device open callback Message-ID: <20180815180814.5985e3f0.cohuck@redhat.com> In-Reply-To: <1534196899-16987-16-git-send-email-akrowiak@linux.vnet.ibm.com> References: <1534196899-16987-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1534196899-16987-16-git-send-email-akrowiak@linux.vnet.ibm.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Wed, 15 Aug 2018 16:08:19 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Wed, 15 Aug 2018 16:08:19 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'cohuck@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 13 Aug 2018 17:48:12 -0400 Tony Krowiak wrote: > From: Tony Krowiak > > Implements the open callback on the mediated matrix device. > The function registers a group notifier to receive notification > of the VFIO_GROUP_NOTIFY_SET_KVM event. When notified, > the vfio_ap device driver will get access to the guest's > kvm structure. The open callback must ensure that only one > mediated device shall be opened per guest. > > Signed-off-by: Tony Krowiak > Acked-by: Halil Pasic > Tested-by: Michael Mueller > Tested-by: Farhan Ali > Tested-by: Pierre Morel > Acked-by: Pierre Morel > Signed-off-by: Christian Borntraeger > --- > drivers/s390/crypto/vfio_ap_ops.c | 174 ++++++++++++++++++++++++++++++++- > drivers/s390/crypto/vfio_ap_private.h | 2 + > 2 files changed, 175 insertions(+), 1 deletions(-) > @@ -602,7 +633,6 @@ static ssize_t matrix_show(struct device *dev, struct device_attribute *attr, > } > DEVICE_ATTR_RO(matrix); > > - Nit: whitespace change > static struct attribute *vfio_ap_mdev_attrs[] = { > &dev_attr_assign_adapter.attr, > &dev_attr_unassign_adapter.attr, (...) > +/** > + * vfio_ap_mdev_open_once > + * > + * @matrix_mdev: a mediated matrix device > + * > + * Return 0 if no other mediated matrix device has been opened for the > + * KVM guest assigned to @matrix_mdev; otherwise, returns an error. > + */ > +static int vfio_ap_mdev_open_once(struct ap_matrix_mdev *matrix_mdev, > + struct kvm *kvm) You're passing kvm in here, but do not use it. > +{ > + struct ap_matrix_mdev *m; > + > + mutex_lock(&matrix_dev.lock); > + > + list_for_each_entry(m, &matrix_dev.mdev_list, list) { > + if ((m != matrix_mdev) && (m->kvm == matrix_mdev->kvm)) { If you used it here instead of matrix_mdev->kvm... > + mutex_unlock(&matrix_dev.lock); > + return -EPERM; > + } > + } > + > + mutex_unlock(&matrix_dev.lock); > + > + return 0; > +} > + > +static int vfio_ap_mdev_group_notifier(struct notifier_block *nb, > + unsigned long action, void *data) > +{ > + int ret; > + struct ap_matrix_mdev *matrix_mdev; > + > + if (action != VFIO_GROUP_NOTIFY_SET_KVM) > + return NOTIFY_OK; > + > + matrix_mdev = container_of(nb, struct ap_matrix_mdev, group_notifier); > + > + matrix_mdev->kvm = data; > + if (data == NULL) > + return NOTIFY_OK; > + > + ret = vfio_ap_mdev_open_once(matrix_mdev, data); ...you could move this up to before overwriting matrix_mdev->kvm and bailing out when the check failed, which makes more sense to me. > + if (ret) > + return ret; > + > + ret = kvm_ap_validate_crypto_setup(matrix_mdev->kvm); > + if (ret) > + return ret; It probably makes more sense to return NOTIFY_DONE in the error case (NOTIFY_BAD does not sound like a good idea as it would stop processing the notifier chain). > + > + vfio_ap_mdev_copy_masks(matrix_mdev); > + > + return NOTIFY_OK; > +} Otherwise, looks sane.