Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1099758imm; Wed, 15 Aug 2018 11:23:23 -0700 (PDT) X-Google-Smtp-Source: AA+uWPxFh3MgcGSMWwl6POExmAh+Wt+g2l/B1bq/lStJrUG17jI+oBB0M6MBn2x3DlfHZmL5us1w X-Received: by 2002:a17:902:8482:: with SMTP id c2-v6mr25666092plo.45.1534357403490; Wed, 15 Aug 2018 11:23:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534357403; cv=none; d=google.com; s=arc-20160816; b=0dT8yIKnRcySVfs6dAmVkBXqUeGXEbH+RfDBWE9YgH+Vox8M8vl3Rimb9J4cPijb5g ZwR16JiRS7EKi2PcAgX/XIna6qP4ctOYz/f7HhwluHPmQshWysPo/0AGLKLKfScL3Xra fIQybt0IlYW7/AibkIsvOIzYjO5eFXpHYrAJ0KAhYmdd1cxW2u/MRE9FLcxjHBGxUM4+ V9LwEE9hmqKoW/S3eR2XyoxbENCiX+rxNHWzX3Yx2Q9jR3MKqsf3LOQsmL6YPty+2bZj KSQv3pmWkuWKIW0YtNnXF2AYfe5YL1k3IyZ2rQTZSPKDMn9UPpIxOQUa9/ssvVj2AWuF AxvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject:arc-authentication-results; bh=P0B/+NTrLH5fYt9VHyNKt2j0P69+TlzL5cin28vo25Q=; b=FEA3zrEaFG8NIFCjJ/DXOHCOwTC2PDxhex6waYaTsjD7XRthOp3dXhLVBVTAJWa7f+ 0834gMnjSb1RGj7kM17Me2GHmAL2wMW2OQxmaeqL4FxQEN0JG5nsdAYgi9huKXkotE/p VnLQSVfVe5Zgq5yMgS9015pvElxinHIdNOgA8++fb/WZop+1xEsje2DwJJGM4ktLtWa/ weCeXixnhZz9/FP7eOtGz+YW/k3DZjeZsgqP23u3hHX4dWUoBgQpWXycnMS92CP9Wng4 kdLFtA3pN6qgahZmFozO9FAZzm3gbs0ipjQ4DT1kRSMopU61KrQlvqdHD+dPBReyu521 ilgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k7-v6si25305845pfb.309.2018.08.15.11.23.07; Wed, 15 Aug 2018 11:23:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728144AbeHOVOx (ORCPT + 99 others); Wed, 15 Aug 2018 17:14:53 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:43890 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725920AbeHOVOx (ORCPT ); Wed, 15 Aug 2018 17:14:53 -0400 Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7FIJttX119270 for ; Wed, 15 Aug 2018 14:21:38 -0400 Received: from e33.co.us.ibm.com (e33.co.us.ibm.com [32.97.110.151]) by mx0b-001b2d01.pphosted.com with ESMTP id 2kvpysx08x-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 15 Aug 2018 14:21:38 -0400 Received: from localhost by e33.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 15 Aug 2018 12:21:37 -0600 Received: from b03cxnp07029.gho.boulder.ibm.com (9.17.130.16) by e33.co.us.ibm.com (192.168.1.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 15 Aug 2018 12:21:34 -0600 Received: from b03ledav002.gho.boulder.ibm.com (b03ledav002.gho.boulder.ibm.com [9.17.130.233]) by b03cxnp07029.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w7FILVEe5702014 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 15 Aug 2018 11:21:31 -0700 Received: from b03ledav002.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 22EE4136051; Wed, 15 Aug 2018 12:21:31 -0600 (MDT) Received: from b03ledav002.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 6433F136055; Wed, 15 Aug 2018 12:21:28 -0600 (MDT) Received: from oc8043147753.ibm.com (unknown [9.85.175.5]) by b03ledav002.gho.boulder.ibm.com (Postfix) with ESMTP; Wed, 15 Aug 2018 12:21:28 -0600 (MDT) Subject: Re: [PATCH v9 15/22] s390: vfio-ap: implement mediated device open callback To: Cornelia Huck , Tony Krowiak Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, frankja@linux.ibm.com References: <1534196899-16987-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1534196899-16987-16-git-send-email-akrowiak@linux.vnet.ibm.com> <20180815180814.5985e3f0.cohuck@redhat.com> From: Tony Krowiak Date: Wed, 15 Aug 2018 14:21:27 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.0 MIME-Version: 1.0 In-Reply-To: <20180815180814.5985e3f0.cohuck@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-TM-AS-GCONF: 00 x-cbid: 18081518-0036-0000-0000-00000A236849 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009550; HX=3.00000242; KW=3.00000007; PH=3.00000004; SC=3.00000266; SDB=6.01073974; UDB=6.00553417; IPR=6.00853933; MB=3.00022737; MTD=3.00000008; XFM=3.00000015; UTC=2018-08-15 18:21:36 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18081518-0037-0000-0000-00004897FDEE Message-Id: <2ba3a6d9-37ef-c614-3525-5f6f3d2c1c2d@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-15_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808150190 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/15/2018 12:08 PM, Cornelia Huck wrote: > On Mon, 13 Aug 2018 17:48:12 -0400 > Tony Krowiak wrote: > >> From: Tony Krowiak >> >> Implements the open callback on the mediated matrix device. >> The function registers a group notifier to receive notification >> of the VFIO_GROUP_NOTIFY_SET_KVM event. When notified, >> the vfio_ap device driver will get access to the guest's >> kvm structure. The open callback must ensure that only one >> mediated device shall be opened per guest. >> >> Signed-off-by: Tony Krowiak >> Acked-by: Halil Pasic >> Tested-by: Michael Mueller >> Tested-by: Farhan Ali >> Tested-by: Pierre Morel >> Acked-by: Pierre Morel >> Signed-off-by: Christian Borntraeger >> --- >> drivers/s390/crypto/vfio_ap_ops.c | 174 ++++++++++++++++++++++++++++++++- >> drivers/s390/crypto/vfio_ap_private.h | 2 + >> 2 files changed, 175 insertions(+), 1 deletions(-) >> @@ -602,7 +633,6 @@ static ssize_t matrix_show(struct device *dev, struct device_attribute *attr, >> } >> DEVICE_ATTR_RO(matrix); >> >> - > Nit: whitespace change A nit, but somebody else will point it out too, so I will fix it. > >> static struct attribute *vfio_ap_mdev_attrs[] = { >> &dev_attr_assign_adapter.attr, >> &dev_attr_unassign_adapter.attr, > (...) > >> +/** >> + * vfio_ap_mdev_open_once >> + * >> + * @matrix_mdev: a mediated matrix device >> + * >> + * Return 0 if no other mediated matrix device has been opened for the >> + * KVM guest assigned to @matrix_mdev; otherwise, returns an error. >> + */ >> +static int vfio_ap_mdev_open_once(struct ap_matrix_mdev *matrix_mdev, >> + struct kvm *kvm) > You're passing kvm in here, but do not use it. I'll fix it. > >> +{ >> + struct ap_matrix_mdev *m; >> + >> + mutex_lock(&matrix_dev.lock); >> + >> + list_for_each_entry(m, &matrix_dev.mdev_list, list) { >> + if ((m != matrix_mdev) && (m->kvm == matrix_mdev->kvm)) { > If you used it here instead of matrix_mdev->kvm... I believe that was the case in a previous patch, but for some reason the code was changed. I'll rework this so it uses the kvm param instead. > >> + mutex_unlock(&matrix_dev.lock); >> + return -EPERM; >> + } >> + } >> + >> + mutex_unlock(&matrix_dev.lock); >> + >> + return 0; >> +} >> + >> +static int vfio_ap_mdev_group_notifier(struct notifier_block *nb, >> + unsigned long action, void *data) >> +{ >> + int ret; >> + struct ap_matrix_mdev *matrix_mdev; >> + >> + if (action != VFIO_GROUP_NOTIFY_SET_KVM) >> + return NOTIFY_OK; >> + >> + matrix_mdev = container_of(nb, struct ap_matrix_mdev, group_notifier); >> + >> + matrix_mdev->kvm = data; >> + if (data == NULL) >> + return NOTIFY_OK; >> + >> + ret = vfio_ap_mdev_open_once(matrix_mdev, data); > ...you could move this up to before overwriting matrix_mdev->kvm and > bailing out when the check failed, which makes more sense to me. That makes more sense to me too. Don't set matrix_mdev->kvm until we know it is okay to do so. > >> + if (ret) >> + return ret; >> + >> + ret = kvm_ap_validate_crypto_setup(matrix_mdev->kvm); >> + if (ret) >> + return ret; > It probably makes more sense to return NOTIFY_DONE in the error case > (NOTIFY_BAD does not sound like a good idea as it would stop processing > the notifier chain). Will do. > >> + >> + vfio_ap_mdev_copy_masks(matrix_mdev); >> + >> + return NOTIFY_OK; >> +} > Otherwise, looks sane. Good!!! >