Lines Matching refs:group
26 static struct vfio_device *vfio_device_get_from_name(struct vfio_group *group,
31 mutex_lock(&group->device_lock);
32 list_for_each_entry(it, &group->device_list, group_next) {
50 mutex_unlock(&group->device_lock);
58 static bool vfio_group_has_iommu(struct vfio_group *group)
60 lockdep_assert_held(&group->group_lock);
65 WARN_ON(!group->container != !group->container_users);
67 return group->container || group->iommufd;
73 * the group, we know that still exists, therefore the only valid
76 static int vfio_group_ioctl_unset_container(struct vfio_group *group)
80 mutex_lock(&group->group_lock);
81 if (!vfio_group_has_iommu(group)) {
85 if (group->container) {
86 if (group->container_users != 1) {
90 vfio_group_detach_container(group);
92 if (group->iommufd) {
93 iommufd_ctx_put(group->iommufd);
94 group->iommufd = NULL;
98 mutex_unlock(&group->group_lock);
102 static int vfio_group_ioctl_set_container(struct vfio_group *group,
118 mutex_lock(&group->group_lock);
119 if (vfio_group_has_iommu(group)) {
123 if (!group->iommu_group) {
130 ret = vfio_container_attach_group(container, group);
137 group->type == VFIO_NO_IOMMU)
147 group->iommufd = iommufd;
155 mutex_unlock(&group->group_lock);
162 spin_lock(&device->group->kvm_ref_lock);
163 vfio_device_get_kvm_safe(device, device->group->kvm);
164 spin_unlock(&device->group->kvm_ref_lock);
172 mutex_lock(&device->group->group_lock);
173 if (!vfio_group_has_iommu(device->group)) {
182 * associated with the group (if there is one) and obtain a reference
189 df->iommufd = device->group->iommufd;
221 mutex_unlock(&device->group->group_lock);
232 mutex_unlock(&device->group->group_lock);
240 mutex_lock(&device->group->group_lock);
250 mutex_unlock(&device->group->group_lock);
265 df->group = device->group;
289 if (device->group->type == VFIO_NO_IOMMU)
306 static int vfio_group_ioctl_get_device_fd(struct vfio_group *group,
319 device = vfio_device_get_from_name(group, buf);
346 static int vfio_group_ioctl_get_status(struct vfio_group *group,
360 mutex_lock(&group->group_lock);
361 if (!group->iommu_group) {
362 mutex_unlock(&group->group_lock);
373 if (vfio_group_has_iommu(group))
376 else if (!iommu_group_dma_owner_claimed(group->iommu_group))
378 mutex_unlock(&group->group_lock);
388 struct vfio_group *group = filep->private_data;
393 return vfio_group_ioctl_get_device_fd(group, uarg);
395 return vfio_group_ioctl_get_status(group, uarg);
397 return vfio_group_ioctl_set_container(group, uarg);
399 return vfio_group_ioctl_unset_container(group);
407 struct vfio_group *group = device->group;
410 mutex_lock(&group->group_lock);
411 if (group->opened_file) {
416 group->cdev_device_open_cnt++;
419 mutex_unlock(&group->group_lock);
425 struct vfio_group *group = device->group;
427 mutex_lock(&group->group_lock);
428 group->cdev_device_open_cnt--;
429 mutex_unlock(&group->group_lock);
434 struct vfio_group *group =
438 mutex_lock(&group->group_lock);
442 * will be stable at 0 under the group rwsem
444 if (refcount_read(&group->drivers) == 0) {
449 if (group->type == VFIO_NO_IOMMU && !capable(CAP_SYS_RAWIO)) {
454 if (group->cdev_device_open_cnt) {
460 * Do we need multiple instances of the group open? Seems not.
462 if (group->opened_file) {
466 group->opened_file = filep;
467 filep->private_data = group;
470 mutex_unlock(&group->group_lock);
476 struct vfio_group *group = filep->private_data;
480 mutex_lock(&group->group_lock);
482 * Device FDs hold a group file reference, therefore the group release
485 WARN_ON(group->notifier.head);
486 if (group->container)
487 vfio_group_detach_container(group);
488 if (group->iommufd) {
489 iommufd_ctx_put(group->iommufd);
490 group->iommufd = NULL;
492 group->opened_file = NULL;
493 mutex_unlock(&group->group_lock);
511 struct vfio_group *group;
516 * group->iommu_group from the vfio.group_list cannot be NULL
519 list_for_each_entry(group, &vfio.group_list, vfio_next) {
520 if (group->iommu_group == iommu_group)
521 return group;
528 struct vfio_group *group = container_of(dev, struct vfio_group, dev);
530 mutex_destroy(&group->device_lock);
531 mutex_destroy(&group->group_lock);
532 WARN_ON(group->iommu_group);
533 WARN_ON(group->cdev_device_open_cnt);
534 ida_free(&vfio.group_ida, MINOR(group->dev.devt));
535 kfree(group);
541 struct vfio_group *group;
544 group = kzalloc(sizeof(*group), GFP_KERNEL);
545 if (!group)
550 kfree(group);
554 device_initialize(&group->dev);
555 group->dev.devt = MKDEV(MAJOR(vfio.group_devt), minor);
556 group->dev.class = vfio.class;
557 group->dev.release = vfio_group_release;
558 cdev_init(&group->cdev, &vfio_group_fops);
559 group->cdev.owner = THIS_MODULE;
561 refcount_set(&group->drivers, 1);
562 mutex_init(&group->group_lock);
563 spin_lock_init(&group->kvm_ref_lock);
564 INIT_LIST_HEAD(&group->device_list);
565 mutex_init(&group->device_lock);
566 group->iommu_group = iommu_group;
569 group->type = type;
570 BLOCKING_INIT_NOTIFIER_HEAD(&group->notifier);
572 return group;
578 struct vfio_group *group;
584 group = vfio_group_alloc(iommu_group, type);
585 if (IS_ERR(group))
586 return group;
588 err = dev_set_name(&group->dev, "%s%d",
589 group->type == VFIO_NO_IOMMU ? "noiommu-" : "",
596 err = cdev_device_add(&group->cdev, &group->dev);
602 list_add(&group->vfio_next, &vfio.group_list);
604 return group;
607 put_device(&group->dev);
615 struct vfio_group *group;
630 group = vfio_create_group(iommu_group, type);
632 if (IS_ERR(group)) {
633 ret = PTR_ERR(group);
637 return group;
646 static bool vfio_group_has_device(struct vfio_group *group, struct device *dev)
650 mutex_lock(&group->device_lock);
651 list_for_each_entry(device, &group->device_list, group_next) {
653 mutex_unlock(&group->device_lock);
657 mutex_unlock(&group->device_lock);
664 struct vfio_group *group;
669 * With noiommu enabled, create an IOMMU group for devices that
674 group = vfio_noiommu_group_alloc(dev, VFIO_NO_IOMMU);
675 if (!IS_ERR(group)) {
677 dev_warn(dev, "Adding kernel taint for vfio-noiommu group on device\n");
679 return group;
686 group = vfio_group_find_from_iommu(iommu_group);
687 if (group) {
688 if (WARN_ON(vfio_group_has_device(group, dev)))
689 group = ERR_PTR(-EINVAL);
691 refcount_inc(&group->drivers);
693 group = vfio_create_group(iommu_group, VFIO_IOMMU);
699 return group;
705 struct vfio_group *group;
708 group = vfio_group_find_or_alloc(device->dev);
710 group = vfio_noiommu_group_alloc(device->dev, type);
712 if (IS_ERR(group))
713 return PTR_ERR(group);
715 /* Our reference on group is moved to the device */
716 device->group = group;
722 struct vfio_group *group = device->group;
725 if (group->type == VFIO_NO_IOMMU || group->type == VFIO_EMULATED_IOMMU)
729 if (!refcount_dec_and_mutex_lock(&group->drivers, &vfio.group_lock))
731 list_del(&group->vfio_next);
734 * We could concurrently probe another driver in the group that might
739 cdev_device_del(&group->cdev, &group->dev);
741 mutex_lock(&group->group_lock);
746 * properly hold the group reference.
748 WARN_ON(!list_empty(&group->device_list));
749 WARN_ON(group->notifier.head);
752 * Revoke all users of group->iommu_group. At this point we know there
756 if (group->container)
757 vfio_group_detach_container(group);
758 iommu_group = group->iommu_group;
759 group->iommu_group = NULL;
760 mutex_unlock(&group->group_lock);
764 put_device(&group->dev);
769 mutex_lock(&device->group->device_lock);
770 list_add(&device->group_next, &device->group->device_list);
771 mutex_unlock(&device->group->device_lock);
776 mutex_lock(&device->group->device_lock);
778 mutex_unlock(&device->group->device_lock);
783 struct vfio_group *group = device->group;
786 lockdep_assert_held(&group->group_lock);
788 if (WARN_ON(!group->container))
791 ret = vfio_group_use_container(group);
800 struct vfio_group *group = device->group;
802 lockdep_assert_held(&group->group_lock);
804 if (WARN_ON(!group->container))
808 vfio_group_unuse_container(group);
813 return device->group->container;
818 struct vfio_group *group = file->private_data;
822 return group;
826 * vfio_file_iommu_group - Return the struct iommu_group for the vfio group file
827 * @file: VFIO group file
830 * returns a reference on the group. This function is deprecated, only the SPAPR
835 struct vfio_group *group = vfio_group_from_file(file);
841 if (!group)
844 mutex_lock(&group->group_lock);
845 if (group->iommu_group) {
846 iommu_group = group->iommu_group;
849 mutex_unlock(&group->group_lock);
855 * vfio_file_is_group - True if the file is a vfio group file
856 * @file: VFIO group file
864 bool vfio_group_enforced_coherent(struct vfio_group *group)
872 * is set then the iommu_domain eventually attached to the device/group
875 mutex_lock(&group->device_lock);
876 list_for_each_entry(device, &group->device_list, group_next) {
883 mutex_unlock(&group->device_lock);
887 void vfio_group_set_kvm(struct vfio_group *group, struct kvm *kvm)
889 spin_lock(&group->kvm_ref_lock);
890 group->kvm = kvm;
891 spin_unlock(&group->kvm_ref_lock);
903 struct vfio_group *group = vfio_group_from_file(file);
905 if (!group)
908 return group == device->group;