Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp9968182rwl; Wed, 11 Jan 2023 12:31:29 -0800 (PST) X-Google-Smtp-Source: AMrXdXvNTv3tU2GBiseciylHbvBo7f7pZN9No/YHcyQ1FMlKUqpTlw9JEXxTgQC+Yi93ni7uq3a9 X-Received: by 2002:a17:90b:4ad1:b0:226:589d:fd13 with SMTP id mh17-20020a17090b4ad100b00226589dfd13mr39204633pjb.6.1673469089048; Wed, 11 Jan 2023 12:31:29 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1673469089; cv=pass; d=google.com; s=arc-20160816; b=W5B3Y94m/L+GrBp7L+ZwIKvj4zywG2/fS5bSIvRpSTx/Uryq25JhzEDGjKeDLoM0PF 5hpzFAdivRSwisT93oeyXxmiT8gJlpp0rE3PzkN2rit3m1LUoDWOMvS18PFghORFWy/y HAG+6CeLye0PVq45Jv56zDwuVZKSJb/EJeP+nvrhwi38ouaj8F/jzXUTXsdWjBfnhHn7 0s+OTxpoahMRDbPamygj+SArgbHcChYBx9l7jI9XhA9dSBVUyqYITP5iaOKdQrBqTzmp BoSlrlaRMTak6f00wux0wSYCrpm5rQx+ocqNhKBcNkMhflnu6dMc3TlX3qOE29Ayb064 VsOQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:in-reply-to:content-disposition :references:message-id:subject:cc:to:from:date:dkim-signature; bh=xt2ukDMVqYKWAhqLxCmKVvcA4i4CxMbXPvDlZL7FZy0=; b=liiYSyc4CyC9zzFjgz4MzCfA8UnhS5JGIip6CxM790z+EcEWHHNmKysP1GNkvSvOeO tzYjEkD128zjarehqw1JiweMoUwBrQrba4V0ZH1FGq+Yj0QS/yTuS2HGi20g3sxJpjR+ +kuTGgJck3djE8Z9r0wcKWzPuDzScjMsptr/fIDCbcgquUDUK2Xtt09jDQjiQhhNPtCd GIJckmhzjXWZukiQna1aONDwpvAAKX7lt9NgkweXpn9TqBsklhZ/x4TwryFx9i5sPVcx r9yANQRGz4s5HVmyHZopW0jEZGLvvQgy0nAruT1jqxr3hW+65qI5YCCm4aUXIRUk99SL djqw== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=W1QsvQ4w; arc=pass (i=1 spf=pass spfdomain=nvidia.com dkim=pass dkdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j6-20020a632306000000b004b484eb6657si7388445pgj.576.2023.01.11.12.31.22; Wed, 11 Jan 2023 12:31:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@Nvidia.com header.s=selector2 header.b=W1QsvQ4w; arc=pass (i=1 spf=pass spfdomain=nvidia.com dkim=pass dkdomain=nvidia.com dmarc=pass fromdomain=nvidia.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239731AbjAKUHb (ORCPT + 51 others); Wed, 11 Jan 2023 15:07:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37398 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239709AbjAKUG4 (ORCPT ); Wed, 11 Jan 2023 15:06:56 -0500 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2083.outbound.protection.outlook.com [40.107.93.83]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2F1BF1A831; Wed, 11 Jan 2023 12:05:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A6HuHcRWfy8ZhtRYJvIrWxISfgtcR1AZ8o1FB14pJMLhMwemiqkBhbOPmGDu2/68i6pin2S14nU3tql59cWuN06DvNG+G0yQqRaL+EIA+FFvLInFInNDtg8e/xuOJtox6983yEPBE4Bk5bNJZgHn/xewEhpVx8MPabTlY4CK77f9llTYf6xeg4OZvvSUz2WWZK98YUA+K/mYgbZicuatn0hGcknzUkTl8un0TG9C3q26nB176kUU2XIwoM6gCWfqDqBtbRrkXIXOyFLAXYYgmetAga3SV32GG9rJRYSRLqYDzICE3H50j1+p9h/zsWwDsTu1g8zSRJp6C6ELOJVpAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xt2ukDMVqYKWAhqLxCmKVvcA4i4CxMbXPvDlZL7FZy0=; b=Ae2lGpy0rsb+OKvUhIGR6zl+okV3mOaEnnvKlSWH0tqVKkNHhMq64OgFTOXIEfGrxJqGIznpChMEdQQMSnyXlULAM8YxaLwXkQ1GPOI7F/z8mR7P+WeoAO1dJ5vPsRrT2fziMaXIlZQprQvilcioXovpLGvGVHhP33n48Q52EjK2q9kY69xXDDWRddOEu4fF89gn3Ly26AdIFVGReKOonAWLbdg1id7gihqaB+44EsZ2bFsm72asoOP23/HNZYj12D1LQ23Ez0h1uk3ea+fUoXFvH+Lfzesnd5H4J9KxappAP2UwAs2g26yykM6NYWv0yBl8zRgR99ZjGDCXdZQABQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nvidia.com; dmarc=pass action=none header.from=nvidia.com; dkim=pass header.d=nvidia.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xt2ukDMVqYKWAhqLxCmKVvcA4i4CxMbXPvDlZL7FZy0=; b=W1QsvQ4wloskNfc7z9yKI9kcrbUv9NDiFhpXYwY93wsPkX5VXR9oK1yIKYLvEkN94zT6HjKcONFf6PJ8iuVtcVe5NsOfh9s70swAFYPhSWJ8+Tj6xIMu0VosspMWzpXWB5JIoUgiqYYA4WeCWJil0BJe1xQMji9GOIm8B4K1RZUm5NQXJxfdkq73sOMHH851xgmiQHtDyHd9m4atr1auR0nxM7m8FUafxKivtj3aVwunQRgLurjmRKxf3Yqfe3JDOlB18AZV7mKg1AolEzWKy2uL+3Asmnlabx3hTI8pxN0nVbO3wM6QjVAsYsE03+RONhCx//SmLz/Y/tWt0bML8g== Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nvidia.com; Received: from LV2PR12MB5869.namprd12.prod.outlook.com (2603:10b6:408:176::16) by BY5PR12MB4935.namprd12.prod.outlook.com (2603:10b6:a03:1d9::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5986.18; Wed, 11 Jan 2023 20:05:41 +0000 Received: from LV2PR12MB5869.namprd12.prod.outlook.com ([fe80::f8b0:df13:5f8d:12a]) by LV2PR12MB5869.namprd12.prod.outlook.com ([fe80::f8b0:df13:5f8d:12a%9]) with mapi id 15.20.6002.013; Wed, 11 Jan 2023 20:05:41 +0000 Date: Wed, 11 Jan 2023 16:05:39 -0400 From: Jason Gunthorpe To: Sean Christopherson Cc: Matthew Rosato , alex.williamson@redhat.com, pbonzini@redhat.com, cohuck@redhat.com, farman@linux.ibm.com, pmorel@linux.ibm.com, borntraeger@linux.ibm.com, frankja@linux.ibm.com, imbrenda@linux.ibm.com, david@redhat.com, akrowiak@linux.ibm.com, jjherne@linux.ibm.com, pasic@linux.ibm.com, zhenyuw@linux.intel.com, zhi.a.wang@intel.com, linux-s390@vger.kernel.org, kvm@vger.kernel.org, intel-gvt-dev@lists.freedesktop.org, intel-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/2] KVM: async kvm_destroy_vm for vfio devices Message-ID: References: <20230109201037.33051-1-mjrosato@linux.ibm.com> <20230109201037.33051-2-mjrosato@linux.ibm.com> Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-ClientProxiedBy: BL1PR13CA0374.namprd13.prod.outlook.com (2603:10b6:208:2c0::19) To LV2PR12MB5869.namprd12.prod.outlook.com (2603:10b6:408:176::16) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: LV2PR12MB5869:EE_|BY5PR12MB4935:EE_ X-MS-Office365-Filtering-Correlation-Id: fb4e6071-8626-46ef-398a-08daf40f36ca X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:LV2PR12MB5869.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(4636009)(396003)(376002)(346002)(39860400002)(366004)(136003)(451199015)(86362001)(6506007)(186003)(26005)(6512007)(36756003)(316002)(38100700002)(478600001)(6916009)(2906002)(6486002)(83380400001)(41300700001)(2616005)(7416002)(5660300002)(4744005)(66946007)(4326008)(66556008)(66476007)(8676002)(8936002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?hr7sYkZK7JmRPuF7AOi7inrJDuFi1goWnynUV1yL0JDKPgP7M849xtWUOqh+?= =?us-ascii?Q?LPu6SaJdqFzJRTeKrKQM+WEz7+aqMoPcimQ9kTQKKx9poInCiXlzbNtYuZQp?= =?us-ascii?Q?3dpAeA1XTMZVpWjenSNipp/HNF3FNLWCz97FVg83ZO3Y+br5Y6NOEpm4nNa1?= =?us-ascii?Q?vc4Q+64t1ji6TXrHIv6SkfAnMO1Hxpb/Se0BPxtqcd0myMI72ZSDenZLz6mK?= =?us-ascii?Q?3GKrZlTS9/24NSm7WteHM7EW76Hp9Z2x8vggI/YlsLXl8qcreXT2s7+r3lYn?= =?us-ascii?Q?XmuFnp5ZRZd2bu+h6Nit1fBRS5QmDRCSv+Hof5DIgWYHUd6831WLdCS/gDfX?= =?us-ascii?Q?1j/RPqaNqhMv4SrDCco+6dfm5VmOCw8wEOQzDzuQduc/0c+FVR99P0BVEkCL?= =?us-ascii?Q?ayohBwRNQXLham/epi7TT8YUy6eb3VoVwhzrW85drHj+deZzuqFk9QsFdlQW?= =?us-ascii?Q?+L6Fs8PtkSV1wU0VWNHEEpwHMLr3EYe8NUTqhKkIk1v37eI9O979T4TzTkiB?= =?us-ascii?Q?tX0aojsIRg2U1Z/5g2cHUltF5bZ4T4WgI48Zyb8Vp8sU1CXJe8PUIJwzjiqU?= =?us-ascii?Q?h1h5+jchRQYsiaLd//xDE+YVGWDqJVemKtIKUW439W9OklMWadgcas4LcDek?= =?us-ascii?Q?g6F56ROD3xU45wftQi93LOu8SD79qSo5bPr3eW2P2dg8cVBWjukpYDqObBGv?= =?us-ascii?Q?JQY8zaC5r3XGiSpjcxUZbENblaDLUre3HkL35seC2qe8rIdIsclRPIFCS5bj?= =?us-ascii?Q?UZsC4FaKdxyE5XEKjKCzp7VayoKhlrHyIt/TMrFcN3jcF7HigBxdcmuhGqQ7?= =?us-ascii?Q?zWJZeT2mqfobagqQ5QWfheruq47yklr24RCf98xbqhuSnajFi2zf6+FGEB02?= =?us-ascii?Q?gl/5x1GTstXErIViyQtoQt/q/p3MeBrKlbsd5u1WDuaGWwnPAuRVwRqdXz5a?= =?us-ascii?Q?xkzOJLIXnD+YM9uUPl625zc/1p32bTAdZvOZ9/rct9jsSdnOIhpFBeExsVfM?= =?us-ascii?Q?hdf3r7jKw7rzQpQy7uYsP/GIMk4ivZjoZpg73k2FP8j7RJWc5lxH+XJFMANl?= =?us-ascii?Q?h+n7QNez/ta2qz49nlLvmiaMpBbN+OjP/DUSjnvrK0mjOTwS4qxOQpQX49IZ?= =?us-ascii?Q?mAz7cX1YjAjd+aZdtz3Leg6H73Ds0nItogI8EZF6LSlzEcHKh1+RQTheI6o4?= =?us-ascii?Q?+DpBei/QLQm+xcrc62SRKWQFeOvGM+u15igIGo6LfnImuUU22E/Wjn1A7yYE?= =?us-ascii?Q?rpC47+JnNNbMQbj/eM393NnUG8oXo8qBniBQVLlO2e/SwpmWJdN811hX9gw3?= =?us-ascii?Q?OjdX/NMd5b1kX4GhM3uyok17zxgJ+kfCP2Rg/20yVnq8hzmJ8503Huze0gkU?= =?us-ascii?Q?vUNpyNnLbPgUMjILcb07nEF9oEcd/kWAOJ2YOl4YsObXbz7HYIhlknuo74Tv?= =?us-ascii?Q?RDex7L2wmgMIZLQveBM+hwyfKwsEYpNBfY7lsf0TUyQNvls4ZS2dbHUDWrO1?= =?us-ascii?Q?+NItz4VCkPgf5neYvxqfzy9LcXuEtJW/j766xflwekWN7T5/v203v19oNhi7?= =?us-ascii?Q?SZMjbPQCmkigiAeilW3EUF6k3U+Gres0f9vZWTMz?= X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-Network-Message-Id: fb4e6071-8626-46ef-398a-08daf40f36ca X-MS-Exchange-CrossTenant-AuthSource: LV2PR12MB5869.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Jan 2023 20:05:40.9286 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 2amaGh9cLYLxLHhDrwLRXuqsnwMeboU0vUKiM+cDrZ5uJZ7BA70JF0V+9GR7/ewI X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR12MB4935 X-Spam-Status: No, score=-1.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FORGED_SPF_HELO, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_NONE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 11, 2023 at 07:54:51PM +0000, Sean Christopherson wrote: > Something feels off. If KVM's refcount is 0, then accessing device->group->kvm > in vfio_device_open() can't happen unless there's a refcounting bug somewhere. The problem is in close, not open. Specifically it would be very hard to avoid holding the group_lock during close which is when the put is done. > Rather than force devices to get KVM references, why not handle that in common > VFIO code and drop KVM refcountin from devices? Worst case scenario KVM is pinned > by a device that doesn't need KVM but is in a group associated with KVM. If that's > a concern, it seems easy enough to add a flag to vfio_device_ops to enumerate > whether or not the device depends on KVM. We can't make cross-dependencies between kvm and core VFIO - it is why so much of this is soo ugly. The few device drivers that unavoidably have KVM involvment already have a KVM module dependency, so they can safely do the get/put Jason