All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Tian, Kevin" <kevin.tian@intel.com>
To: Jason Gunthorpe <jgg@nvidia.com>,
	Alex Williamson <alex.williamson@redhat.com>,
	Cornelia Huck <cohuck@redhat.com>,
	"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
	Paolo Bonzini <pbonzini@redhat.com>
Cc: Eric Auger <eric.auger@redhat.com>,
	Christoph Hellwig <hch@lst.de>, "Liu, Yi L" <yi.l.liu@intel.com>
Subject: RE: [PATCH 01/10] kvm/vfio: Move KVM_DEV_VFIO_GROUP_* ioctls into functions
Date: Fri, 15 Apr 2022 03:36:17 +0000	[thread overview]
Message-ID: <BN9PR11MB52760E3E75F94AB2E8897D938CEE9@BN9PR11MB5276.namprd11.prod.outlook.com> (raw)
In-Reply-To: <1-v1-33906a626da1+16b0-vfio_kvm_no_group_jgg@nvidia.com>

> From: Jason Gunthorpe <jgg@nvidia.com>
> Sent: Friday, April 15, 2022 2:46 AM
> 
> To make it easier to read and change in following patches.
> 
> Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>

Reviewed-by: Kevin Tian <kevin.tian@intel.com>

> ---
>  virt/kvm/vfio.c | 271 ++++++++++++++++++++++++++----------------------
>  1 file changed, 146 insertions(+), 125 deletions(-)
> 
> This is best viewed using 'git diff -b' to ignore the whitespace change.
> 
> diff --git a/virt/kvm/vfio.c b/virt/kvm/vfio.c
> index 8fcbc50221c2d2..a1167ab7a2246f 100644
> --- a/virt/kvm/vfio.c
> +++ b/virt/kvm/vfio.c
> @@ -181,149 +181,170 @@ static void kvm_vfio_update_coherency(struct
> kvm_device *dev)
>  	mutex_unlock(&kv->lock);
>  }
> 
> -static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> +static int kvm_vfio_group_add(struct kvm_device *dev, unsigned int fd)
>  {
>  	struct kvm_vfio *kv = dev->private;
>  	struct vfio_group *vfio_group;
>  	struct kvm_vfio_group *kvg;
> -	int32_t __user *argp = (int32_t __user *)(unsigned long)arg;
>  	struct fd f;
> -	int32_t fd;
>  	int ret;
> 
> +	f = fdget(fd);
> +	if (!f.file)
> +		return -EBADF;
> +
> +	vfio_group = kvm_vfio_group_get_external_user(f.file);
> +	fdput(f);
> +
> +	if (IS_ERR(vfio_group))
> +		return PTR_ERR(vfio_group);
> +
> +	mutex_lock(&kv->lock);
> +
> +	list_for_each_entry(kvg, &kv->group_list, node) {
> +		if (kvg->vfio_group == vfio_group) {
> +			ret = -EEXIST;
> +			goto err_unlock;
> +		}
> +	}
> +
> +	kvg = kzalloc(sizeof(*kvg), GFP_KERNEL_ACCOUNT);
> +	if (!kvg) {
> +		ret = -ENOMEM;
> +		goto err_unlock;
> +	}
> +
> +	list_add_tail(&kvg->node, &kv->group_list);
> +	kvg->vfio_group = vfio_group;
> +
> +	kvm_arch_start_assignment(dev->kvm);
> +
> +	mutex_unlock(&kv->lock);
> +
> +	kvm_vfio_group_set_kvm(vfio_group, dev->kvm);
> +	kvm_vfio_update_coherency(dev);
> +
> +	return 0;
> +err_unlock:
> +	mutex_unlock(&kv->lock);
> +	kvm_vfio_group_put_external_user(vfio_group);
> +	return ret;
> +}
> +
> +static int kvm_vfio_group_del(struct kvm_device *dev, unsigned int fd)
> +{
> +	struct kvm_vfio *kv = dev->private;
> +	struct kvm_vfio_group *kvg;
> +	struct fd f;
> +	int ret;
> +
> +	f = fdget(fd);
> +	if (!f.file)
> +		return -EBADF;
> +
> +	ret = -ENOENT;
> +
> +	mutex_lock(&kv->lock);
> +
> +	list_for_each_entry(kvg, &kv->group_list, node) {
> +		if (!kvm_vfio_external_group_match_file(kvg->vfio_group,
> +							f.file))
> +			continue;
> +
> +		list_del(&kvg->node);
> +		kvm_arch_end_assignment(dev->kvm);
> +#ifdef CONFIG_SPAPR_TCE_IOMMU
> +		kvm_spapr_tce_release_vfio_group(dev->kvm, kvg-
> >vfio_group);
> +#endif
> +		kvm_vfio_group_set_kvm(kvg->vfio_group, NULL);
> +		kvm_vfio_group_put_external_user(kvg->vfio_group);
> +		kfree(kvg);
> +		ret = 0;
> +		break;
> +	}
> +
> +	mutex_unlock(&kv->lock);
> +
> +	fdput(f);
> +
> +	kvm_vfio_update_coherency(dev);
> +
> +	return ret;
> +}
> +
> +#ifdef CONFIG_SPAPR_TCE_IOMMU
> +static int kvm_vfio_group_set_spapr_tce(struct kvm_device *dev,
> +					void __user *arg)
> +{
> +	struct kvm_vfio_spapr_tce param;
> +	struct kvm_vfio *kv = dev->private;
> +	struct vfio_group *vfio_group;
> +	struct kvm_vfio_group *kvg;
> +	struct fd f;
> +	struct iommu_group *grp;
> +	int ret;
> +
> +	if (copy_from_user(&param, arg, sizeof(struct kvm_vfio_spapr_tce)))
> +		return -EFAULT;
> +
> +	f = fdget(param.groupfd);
> +	if (!f.file)
> +		return -EBADF;
> +
> +	vfio_group = kvm_vfio_group_get_external_user(f.file);
> +	fdput(f);
> +
> +	if (IS_ERR(vfio_group))
> +		return PTR_ERR(vfio_group);
> +
> +	grp = kvm_vfio_group_get_iommu_group(vfio_group);
> +	if (WARN_ON_ONCE(!grp)) {
> +		ret = -EIO;
> +		goto err_put_external;
> +	}
> +
> +	ret = -ENOENT;
> +
> +	mutex_lock(&kv->lock);
> +
> +	list_for_each_entry(kvg, &kv->group_list, node) {
> +		if (kvg->vfio_group != vfio_group)
> +			continue;
> +
> +		ret = kvm_spapr_tce_attach_iommu_group(dev->kvm,
> param.tablefd,
> +						       grp);
> +		break;
> +	}
> +
> +	mutex_unlock(&kv->lock);
> +
> +	iommu_group_put(grp);
> +err_put_external:
> +	kvm_vfio_group_put_external_user(vfio_group);
> +	return ret;
> +}
> +#endif
> +
> +static int kvm_vfio_set_group(struct kvm_device *dev, long attr, u64 arg)
> +{
> +	int32_t __user *argp = (int32_t __user *)(unsigned long)arg;
> +	int32_t fd;
> +
>  	switch (attr) {
>  	case KVM_DEV_VFIO_GROUP_ADD:
>  		if (get_user(fd, argp))
>  			return -EFAULT;
> -
> -		f = fdget(fd);
> -		if (!f.file)
> -			return -EBADF;
> -
> -		vfio_group = kvm_vfio_group_get_external_user(f.file);
> -		fdput(f);
> -
> -		if (IS_ERR(vfio_group))
> -			return PTR_ERR(vfio_group);
> -
> -		mutex_lock(&kv->lock);
> -
> -		list_for_each_entry(kvg, &kv->group_list, node) {
> -			if (kvg->vfio_group == vfio_group) {
> -				mutex_unlock(&kv->lock);
> -
> 	kvm_vfio_group_put_external_user(vfio_group);
> -				return -EEXIST;
> -			}
> -		}
> -
> -		kvg = kzalloc(sizeof(*kvg), GFP_KERNEL_ACCOUNT);
> -		if (!kvg) {
> -			mutex_unlock(&kv->lock);
> -			kvm_vfio_group_put_external_user(vfio_group);
> -			return -ENOMEM;
> -		}
> -
> -		list_add_tail(&kvg->node, &kv->group_list);
> -		kvg->vfio_group = vfio_group;
> -
> -		kvm_arch_start_assignment(dev->kvm);
> -
> -		mutex_unlock(&kv->lock);
> -
> -		kvm_vfio_group_set_kvm(vfio_group, dev->kvm);
> -
> -		kvm_vfio_update_coherency(dev);
> -
> -		return 0;
> +		return kvm_vfio_group_add(dev, fd);
> 
>  	case KVM_DEV_VFIO_GROUP_DEL:
>  		if (get_user(fd, argp))
>  			return -EFAULT;
> +		return kvm_vfio_group_del(dev, fd);
> 
> -		f = fdget(fd);
> -		if (!f.file)
> -			return -EBADF;
> -
> -		ret = -ENOENT;
> -
> -		mutex_lock(&kv->lock);
> -
> -		list_for_each_entry(kvg, &kv->group_list, node) {
> -			if (!kvm_vfio_external_group_match_file(kvg-
> >vfio_group,
> -								f.file))
> -				continue;
> -
> -			list_del(&kvg->node);
> -			kvm_arch_end_assignment(dev->kvm);
>  #ifdef CONFIG_SPAPR_TCE_IOMMU
> -			kvm_spapr_tce_release_vfio_group(dev->kvm,
> -							 kvg->vfio_group);
> +	case KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE:
> +		return kvm_vfio_group_set_spapr_tce(dev, (void __user
> *)arg);
>  #endif
> -			kvm_vfio_group_set_kvm(kvg->vfio_group, NULL);
> -			kvm_vfio_group_put_external_user(kvg->vfio_group);
> -			kfree(kvg);
> -			ret = 0;
> -			break;
> -		}
> -
> -		mutex_unlock(&kv->lock);
> -
> -		fdput(f);
> -
> -		kvm_vfio_update_coherency(dev);
> -
> -		return ret;
> -
> -#ifdef CONFIG_SPAPR_TCE_IOMMU
> -	case KVM_DEV_VFIO_GROUP_SET_SPAPR_TCE: {
> -		struct kvm_vfio_spapr_tce param;
> -		struct kvm_vfio *kv = dev->private;
> -		struct vfio_group *vfio_group;
> -		struct kvm_vfio_group *kvg;
> -		struct fd f;
> -		struct iommu_group *grp;
> -
> -		if (copy_from_user(&param, (void __user *)arg,
> -				sizeof(struct kvm_vfio_spapr_tce)))
> -			return -EFAULT;
> -
> -		f = fdget(param.groupfd);
> -		if (!f.file)
> -			return -EBADF;
> -
> -		vfio_group = kvm_vfio_group_get_external_user(f.file);
> -		fdput(f);
> -
> -		if (IS_ERR(vfio_group))
> -			return PTR_ERR(vfio_group);
> -
> -		grp = kvm_vfio_group_get_iommu_group(vfio_group);
> -		if (WARN_ON_ONCE(!grp)) {
> -			kvm_vfio_group_put_external_user(vfio_group);
> -			return -EIO;
> -		}
> -
> -		ret = -ENOENT;
> -
> -		mutex_lock(&kv->lock);
> -
> -		list_for_each_entry(kvg, &kv->group_list, node) {
> -			if (kvg->vfio_group != vfio_group)
> -				continue;
> -
> -			ret = kvm_spapr_tce_attach_iommu_group(dev-
> >kvm,
> -					param.tablefd, grp);
> -			break;
> -		}
> -
> -		mutex_unlock(&kv->lock);
> -
> -		iommu_group_put(grp);
> -		kvm_vfio_group_put_external_user(vfio_group);
> -
> -		return ret;
> -	}
> -#endif /* CONFIG_SPAPR_TCE_IOMMU */
>  	}
> 
>  	return -ENXIO;
> --
> 2.35.1


  reply	other threads:[~2022-04-15  3:36 UTC|newest]

Thread overview: 47+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-04-14 18:45 [PATCH 00/10] Remove vfio_group from the struct file facing VFIO API Jason Gunthorpe
2022-04-14 18:46 ` [PATCH 01/10] kvm/vfio: Move KVM_DEV_VFIO_GROUP_* ioctls into functions Jason Gunthorpe
2022-04-15  3:36   ` Tian, Kevin [this message]
2022-04-15  7:18   ` Christoph Hellwig
2022-04-14 18:46 ` [PATCH 02/10] kvm/vfio: Reduce the scope of PPC #ifdefs Jason Gunthorpe
2022-04-15  4:47   ` Christoph Hellwig
2022-04-15 12:13     ` Jason Gunthorpe
2022-04-15 12:35       ` Jason Gunthorpe
2022-04-15 14:36         ` Christoph Hellwig
2022-04-14 18:46 ` [PATCH 03/10] kvm/vfio: Store the struct file in the kvm_vfio_group Jason Gunthorpe
2022-04-15  3:44   ` Tian, Kevin
2022-04-15 22:24     ` Jason Gunthorpe
2022-04-15  7:20   ` Christoph Hellwig
2022-04-19 19:24     ` Jason Gunthorpe
2022-04-14 18:46 ` [PATCH 04/10] vfio: Use a struct of function pointers instead of a many symbol_get()'s Jason Gunthorpe
2022-04-15  3:57   ` Tian, Kevin
2022-04-15 21:54     ` Jason Gunthorpe
2022-04-16  0:00       ` Tian, Kevin
2022-04-16  1:33         ` Jason Gunthorpe
2022-04-18  3:56           ` Tian, Kevin
2022-04-19 12:16             ` Jason Gunthorpe
2022-04-15  4:45   ` Christoph Hellwig
2022-04-15 12:13     ` Jason Gunthorpe
2022-04-15 14:36       ` Christoph Hellwig
2022-04-15 15:31         ` Jason Gunthorpe
2022-04-14 18:46 ` [PATCH 05/10] vfio: Move vfio_external_user_iommu_id() to vfio_file_ops Jason Gunthorpe
2022-04-15  3:59   ` Tian, Kevin
2022-04-15  7:31   ` Christoph Hellwig
2022-04-15 12:25     ` Jason Gunthorpe
2022-04-15 14:37       ` Christoph Hellwig
2022-04-14 18:46 ` [PATCH 06/10] vfio: Remove vfio_external_group_match_file() Jason Gunthorpe
2022-04-15  4:02   ` Tian, Kevin
2022-04-15  7:32   ` Christoph Hellwig
2022-04-14 18:46 ` [PATCH 07/10] vfio: Move vfio_external_check_extension() to vfio_file_ops Jason Gunthorpe
2022-04-15  4:07   ` Tian, Kevin
2022-04-19 19:23     ` Jason Gunthorpe
2022-04-20  3:05       ` Tian, Kevin
2022-04-15  4:48   ` Christoph Hellwig
2022-04-14 18:46 ` [PATCH 08/10] vfio: Move vfio_group_set_kvm() into vfio_file_ops Jason Gunthorpe
2022-04-15  4:09   ` Tian, Kevin
2022-04-14 18:46 ` [PATCH 09/10] kvm/vfio: Remove vfio_group from kvm Jason Gunthorpe
2022-04-15  4:21   ` Tian, Kevin
2022-04-15 21:56     ` Jason Gunthorpe
2022-04-16  0:42       ` Tian, Kevin
2022-04-16  1:34         ` Jason Gunthorpe
2022-04-18  6:09           ` Tian, Kevin
2022-04-14 18:46 ` [PATCH 10/10] vfio/pci: Use the struct file as the handle not the vfio_group Jason Gunthorpe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=BN9PR11MB52760E3E75F94AB2E8897D938CEE9@BN9PR11MB5276.namprd11.prod.outlook.com \
    --to=kevin.tian@intel.com \
    --cc=alex.williamson@redhat.com \
    --cc=cohuck@redhat.com \
    --cc=eric.auger@redhat.com \
    --cc=hch@lst.de \
    --cc=jgg@nvidia.com \
    --cc=kvm@vger.kernel.org \
    --cc=pbonzini@redhat.com \
    --cc=yi.l.liu@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.