Re: [PATCH v12 12/22] vfio: Add notifier callback to parent's ops structure of mdev
From: Jike Song
Date: Wed Nov 16 2016 - 00:56:56 EST
On 11/15/2016 11:19 PM, Alex Williamson wrote:
> On Tue, 15 Nov 2016 14:45:42 +0800
> Jike Song <jike.song@xxxxxxxxx> wrote:
>
>> On 11/14/2016 11:42 PM, Kirti Wankhede wrote:
>>> Add a notifier calback to parent's ops structure of mdev device so that per
>>> device notifer for vfio module is registered through vfio_mdev module.
>>>
>>> Signed-off-by: Kirti Wankhede <kwankhede@xxxxxxxxxx>
>>> Signed-off-by: Neo Jia <cjia@xxxxxxxxxx>
>>> Change-Id: Iafa6f1721aecdd6e50eb93b153b5621e6d29b637
>>> ---
>>> drivers/vfio/mdev/vfio_mdev.c | 19 +++++++++++++++++++
>>> include/linux/mdev.h | 9 +++++++++
>>> 2 files changed, 28 insertions(+)
>>>
>>> diff --git a/drivers/vfio/mdev/vfio_mdev.c b/drivers/vfio/mdev/vfio_mdev.c
>>> index ffc36758cb84..1694b1635607 100644
>>> --- a/drivers/vfio/mdev/vfio_mdev.c
>>> +++ b/drivers/vfio/mdev/vfio_mdev.c
>>> @@ -24,6 +24,15 @@
>>> #define DRIVER_AUTHOR "NVIDIA Corporation"
>>> #define DRIVER_DESC "VFIO based driver for Mediated device"
>>>
>>> +static int vfio_mdev_notifier(struct notifier_block *nb, unsigned long action,
>>> + void *data)
>>> +{
>>> + struct mdev_device *mdev = container_of(nb, struct mdev_device, nb);
>>> + struct parent_device *parent = mdev->parent;
>>> +
>>> + return parent->ops->notifier(mdev, action, data);
>>> +}
>>> +
>>> static int vfio_mdev_open(void *device_data)
>>> {
>>> struct mdev_device *mdev = device_data;
>>> @@ -40,6 +49,11 @@ static int vfio_mdev_open(void *device_data)
>>> if (ret)
>>> module_put(THIS_MODULE);
>>>
>>> + if (likely(parent->ops->notifier)) {
>>> + mdev->nb.notifier_call = vfio_mdev_notifier;
>>> + if (vfio_register_notifier(&mdev->dev, &mdev->nb))
>>> + pr_err("Failed to register notifier for mdev\n");
>>> + }
>>
>> Hi Kirti,
>>
>> Could you please move the notifier registration before parent->ops->open()?
>> as you might know, I'm extending your vfio_register_notifier to also include
>> the attaching/detaching events of vfio_group and kvm. Basically if vfio_group
>> not attached to any kvm instance, the parent->ops->open() should return -ENODEV
>> to indicate the failure, but to know whether kvm is available in open(), the
>> notifier registration should be earlier.
>
> It seems like you're giving general guidance for how a vendor driver
> open() function should work, yet a hard dependency on KVM should be
> discouraged. You're making a choice for your vendor driver alone.
I apologize for any confusion, but all I meant here was, if the real
world requires a vendor driver to indicate errors instead of false
success, it has to know some information before making the choice.
> I would also be very cautious about the coherency of signaling the KVM
> association relative to the user of the group. Is it possible that the
> association of one KVM instance by a user of the group can leak to the
> next user? Does vfio need to seen a gratuitous un-set of the KVM
> association on group close()? etc. Thanks,
I failed to see how this is possible, per my understanding the
vfio_group_set_kvm gets called twice (once with kvm, another with NULL)
during kvm's holding the group reference.
Would you elaborate a bit more?
--
Thanks,
Jike