Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp2504725ybg; Fri, 31 Jul 2020 01:24:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzemN4MpXBuT6DwTg7jY0CO2w0M3xFlFlW+hc89twbqZgy+NHJ+uvKAD424eYA/nKp1IxTy X-Received: by 2002:a17:906:d057:: with SMTP id bo23mr2920099ejb.210.1596183897651; Fri, 31 Jul 2020 01:24:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596183897; cv=none; d=google.com; s=arc-20160816; b=jPSANY9dQT+fnpIwgZ5l9PvH9ZWala81dG1FbbaEN9mYwsVAHxxISjBRT5qsys1YUB gvqPA6IzYExlYjuy9FT/u7X/HzG+yJViKxVOtmyhhvi//Lq7OYigOXU5DUObtaL952OZ UHHfZRNu4GpgnVq01o31y3QCSf/eLbbZdu5v+Rtd+OdEapAvpeDlwbjWRd9d+m1vnYey +1bHFBDhB0DCIOGFSMB3oE1d24mZGsOlfcy1qmIwfhHYMK5ri/98V+WJ1DHKuOZolYpV ERSVEPeEUzVAX5Rur9SiJsVEZmGAk4c/pbfQCaJh1MupYGRlG6rmux/shuHrDAXUf//z Th+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=wIz7SsJXRvpEhI3EX/mBs4/N+xGXjmhCcVUXs+iDLdI=; b=va5D7RNiE/n8YYUMppCU41leahEQRZYGyiTC/s+EggnANgY9U9294GyProEs9yrTDu KB+tDSt2r5ByGnHGHjUbrnyuAuwfVmD/09To1k6HtATzt5JpVZK0MqqCw9VE3tKx3VZ0 TliAXb/e16l8cwB14/A28M5ef8TaK+zqS1T+WBnLRNVkix92+JvSjXOZgs9FpDfSx/bm S9+jDwf2tpQtJgcKyCcdsYIoF1m40X2ZFccincPkZr/pghrF2MRWY4sXe99WsXAbkO6w o2iuaKj3W+yxxditQsHkhFutkC/9nl0V3ql3DJHgma2XHtigX79lGLyVpmcnn3R4liX4 IgeA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dk2si4704733edb.542.2020.07.31.01.24.35; Fri, 31 Jul 2020 01:24:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731941AbgGaIVv (ORCPT + 99 others); Fri, 31 Jul 2020 04:21:51 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:9306 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1731823AbgGaIVv (ORCPT ); Fri, 31 Jul 2020 04:21:51 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id C5B815532107EB983132; Fri, 31 Jul 2020 16:21:48 +0800 (CST) Received: from [127.0.0.1] (10.174.186.173) by DGGEMS402-HUB.china.huawei.com (10.3.19.202) with Microsoft SMTP Server id 14.3.487.0; Fri, 31 Jul 2020 16:21:41 +0800 Subject: Re: [Question] the check of ioeventfd collision in kvm_*assign_ioeventfd_idx To: Paolo Bonzini CC: "S. Tsirkin, Michael" , , , , , , Xiexiangyou References: <4aa75d90-f2d2-888c-8970-02a41f3733e4@huawei.com> From: Zhenyu Ye Message-ID: <18baa777-7f28-8f57-e815-11175bf4c59a@huawei.com> Date: Fri, 31 Jul 2020 16:21:40 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.3.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.186.173] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/7/31 14:44, Paolo Bonzini wrote: > On 31/07/20 08:39, Zhenyu Ye wrote: >> On 2020/7/31 2:03, Paolo Bonzini wrote: >>> Yes, I think it's not needed. Probably the deassign check can be turned into an assertion? >>> >>> Paolo >>> >> >> I think we can do this in the same function, and turnt he check of >> p->eventfd into assertion in kvm_deassign_ioeventfd_idx(). Just like: >> >> ---8<--- >> static inline struct _ioeventfd * >> get_ioeventfd(struct kvm *kvm, enum kvm_bus bus_idx, >> struct kvm_ioeventfd *args) >> { >> static struct _ioeventfd *_p; >> bool wildcard = !(args->flags & KVM_IOEVENTFD_FLAG_DATAMATCH); >> >> list_for_each_entry(_p, &kvm->ioeventfds, list) >> if (_p->bus_idx == bus_idx && >> _p->addr == args->addr && >> (!_p->length || !args->len || >> (_p->length == args->len && >> (_p->wildcard || wildcard || >> _p->datamatch == args->datamatch)))) >> return _p; >> >> return NULL; >> } >> >> kvm_deassign_ioeventfd_idx() { >> ... >> p = get_ioeventfd(kvm, bus_idx, args); >> if (p) { >> assert(p->eventfd == eventfd); >> ... >> } >> >> ---8<---- >> >> This may be easier to understand (keep the same logic in assign/deassign). > > I think you should also warn if: > > 1) p->length != args->len > > 2) p->wildcard != args->wildcard if p->length > > 3) p->datamatch != args->datamatch if p->length && !p->wildcard > > but yeah it sounds like a plan. > I will try to do this. :) Zhenyu