RE: [PATCH V4 1/5] vfio/type1: exclude mdevs from VFIO_UPDATE_VADDR

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> From: Steve Sistare <steven.sistare@xxxxxxxxxx>
> Sent: Thursday, December 15, 2022 5:25 AM
> 
> @@ -861,6 +861,12 @@ static int vfio_iommu_type1_pin_pages(void
> *iommu_data,
> 
>  	mutex_lock(&iommu->lock);
> 
> +	if (WARN_ONCE(iommu->vaddr_invalid_count,
> +		      "mdev not allowed with VFIO_UPDATE_VADDR\n")) {

let's be specific on the operation i.e. pin_pages not allowed...

same for the latter dma_rw.

> +	case VFIO_UPDATE_VADDR:
> +		/*
> +		 * Disable this feature if mdevs are present.  They cannot
> +		 * safely pin/unpin while vaddrs are being updated.

only 'pin' is disallowed?

Except those nits:

Reviewed-by: Kevin Tian <kevin.tian@xxxxxxxxx>




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux