Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Dong Jia Shi | 1053 | 39.92% | 7 | 21.21% |
Cornelia Huck | 869 | 32.94% | 4 | 12.12% |
Jason Gunthorpe | 267 | 10.12% | 6 | 18.18% |
Eric Farman | 263 | 9.97% | 8 | 24.24% |
Kevin Tian | 118 | 4.47% | 1 | 3.03% |
Farhan Ali | 53 | 2.01% | 3 | 9.09% |
Wang Qing | 10 | 0.38% | 1 | 3.03% |
Michael Kawano | 2 | 0.08% | 1 | 3.03% |
Sebastian Ott | 2 | 0.08% | 1 | 3.03% |
Greg Kroah-Hartman | 1 | 0.04% | 1 | 3.03% |
Total | 2638 | 33 |
// SPDX-License-Identifier: GPL-2.0 /* * Physical device callbacks for vfio_ccw * * Copyright IBM Corp. 2017 * Copyright Red Hat, Inc. 2019 * * Author(s): Dong Jia Shi <bjsdjshi@linux.vnet.ibm.com> * Xiao Feng Ren <renxiaof@linux.vnet.ibm.com> * Cornelia Huck <cohuck@redhat.com> */ #include <linux/vfio.h> #include <linux/nospec.h> #include <linux/slab.h> #include "vfio_ccw_private.h" static const struct vfio_device_ops vfio_ccw_dev_ops; static int vfio_ccw_mdev_reset(struct vfio_ccw_private *private) { /* * If the FSM state is seen as Not Operational after closing * and re-opening the mdev, return an error. */ vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_CLOSE); vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_OPEN); if (private->state == VFIO_CCW_STATE_NOT_OPER) return -EINVAL; return 0; } static void vfio_ccw_dma_unmap(struct vfio_device *vdev, u64 iova, u64 length) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); /* Drivers MUST unpin pages in response to an invalidation. */ if (!cp_iova_pinned(&private->cp, iova, length)) return; vfio_ccw_mdev_reset(private); } static int vfio_ccw_mdev_init_dev(struct vfio_device *vdev) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); init_completion(&private->release_comp); return 0; } static int vfio_ccw_mdev_probe(struct mdev_device *mdev) { struct vfio_ccw_private *private = dev_get_drvdata(mdev->dev.parent); int ret; if (private->state == VFIO_CCW_STATE_NOT_OPER) return -ENODEV; ret = vfio_init_device(&private->vdev, &mdev->dev, &vfio_ccw_dev_ops); if (ret) return ret; VFIO_CCW_MSG_EVENT(2, "sch %x.%x.%04x: create\n", private->sch->schid.cssid, private->sch->schid.ssid, private->sch->schid.sch_no); ret = vfio_register_emulated_iommu_dev(&private->vdev); if (ret) goto err_put_vdev; dev_set_drvdata(&mdev->dev, private); return 0; err_put_vdev: vfio_put_device(&private->vdev); return ret; } static void vfio_ccw_mdev_release_dev(struct vfio_device *vdev) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); /* * We cannot free vfio_ccw_private here because it includes * parent info which must be free'ed by css driver. * * Use a workaround by memset'ing the core device part and * then notifying the remove path that all active references * to this device have been released. */ memset(vdev, 0, sizeof(*vdev)); complete(&private->release_comp); } static void vfio_ccw_mdev_remove(struct mdev_device *mdev) { struct vfio_ccw_private *private = dev_get_drvdata(mdev->dev.parent); VFIO_CCW_MSG_EVENT(2, "sch %x.%x.%04x: remove\n", private->sch->schid.cssid, private->sch->schid.ssid, private->sch->schid.sch_no); vfio_unregister_group_dev(&private->vdev); vfio_put_device(&private->vdev); /* * Wait for all active references on mdev are released so it * is safe to defer kfree() to a later point. * * TODO: the clean fix is to split parent/mdev info from ccw * private structure so each can be managed in its own life * cycle. */ wait_for_completion(&private->release_comp); } static int vfio_ccw_mdev_open_device(struct vfio_device *vdev) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); int ret; /* Device cannot simply be opened again from this state */ if (private->state == VFIO_CCW_STATE_NOT_OPER) return -EINVAL; ret = vfio_ccw_register_async_dev_regions(private); if (ret) return ret; ret = vfio_ccw_register_schib_dev_regions(private); if (ret) goto out_unregister; ret = vfio_ccw_register_crw_dev_regions(private); if (ret) goto out_unregister; vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_OPEN); if (private->state == VFIO_CCW_STATE_NOT_OPER) { ret = -EINVAL; goto out_unregister; } return ret; out_unregister: vfio_ccw_unregister_dev_regions(private); return ret; } static void vfio_ccw_mdev_close_device(struct vfio_device *vdev) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_CLOSE); vfio_ccw_unregister_dev_regions(private); } static ssize_t vfio_ccw_mdev_read_io_region(struct vfio_ccw_private *private, char __user *buf, size_t count, loff_t *ppos) { loff_t pos = *ppos & VFIO_CCW_OFFSET_MASK; struct ccw_io_region *region; int ret; if (pos + count > sizeof(*region)) return -EINVAL; mutex_lock(&private->io_mutex); region = private->io_region; if (copy_to_user(buf, (void *)region + pos, count)) ret = -EFAULT; else ret = count; mutex_unlock(&private->io_mutex); return ret; } static ssize_t vfio_ccw_mdev_read(struct vfio_device *vdev, char __user *buf, size_t count, loff_t *ppos) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); unsigned int index = VFIO_CCW_OFFSET_TO_INDEX(*ppos); if (index >= VFIO_CCW_NUM_REGIONS + private->num_regions) return -EINVAL; switch (index) { case VFIO_CCW_CONFIG_REGION_INDEX: return vfio_ccw_mdev_read_io_region(private, buf, count, ppos); default: index -= VFIO_CCW_NUM_REGIONS; return private->region[index].ops->read(private, buf, count, ppos); } return -EINVAL; } static ssize_t vfio_ccw_mdev_write_io_region(struct vfio_ccw_private *private, const char __user *buf, size_t count, loff_t *ppos) { loff_t pos = *ppos & VFIO_CCW_OFFSET_MASK; struct ccw_io_region *region; int ret; if (pos + count > sizeof(*region)) return -EINVAL; if (!mutex_trylock(&private->io_mutex)) return -EAGAIN; region = private->io_region; if (copy_from_user((void *)region + pos, buf, count)) { ret = -EFAULT; goto out_unlock; } vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_IO_REQ); ret = (region->ret_code != 0) ? region->ret_code : count; out_unlock: mutex_unlock(&private->io_mutex); return ret; } static ssize_t vfio_ccw_mdev_write(struct vfio_device *vdev, const char __user *buf, size_t count, loff_t *ppos) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); unsigned int index = VFIO_CCW_OFFSET_TO_INDEX(*ppos); if (index >= VFIO_CCW_NUM_REGIONS + private->num_regions) return -EINVAL; switch (index) { case VFIO_CCW_CONFIG_REGION_INDEX: return vfio_ccw_mdev_write_io_region(private, buf, count, ppos); default: index -= VFIO_CCW_NUM_REGIONS; return private->region[index].ops->write(private, buf, count, ppos); } return -EINVAL; } static int vfio_ccw_mdev_get_device_info(struct vfio_ccw_private *private, struct vfio_device_info *info) { info->flags = VFIO_DEVICE_FLAGS_CCW | VFIO_DEVICE_FLAGS_RESET; info->num_regions = VFIO_CCW_NUM_REGIONS + private->num_regions; info->num_irqs = VFIO_CCW_NUM_IRQS; return 0; } static int vfio_ccw_mdev_get_region_info(struct vfio_ccw_private *private, struct vfio_region_info *info, unsigned long arg) { int i; switch (info->index) { case VFIO_CCW_CONFIG_REGION_INDEX: info->offset = 0; info->size = sizeof(struct ccw_io_region); info->flags = VFIO_REGION_INFO_FLAG_READ | VFIO_REGION_INFO_FLAG_WRITE; return 0; default: /* all other regions are handled via capability chain */ { struct vfio_info_cap caps = { .buf = NULL, .size = 0 }; struct vfio_region_info_cap_type cap_type = { .header.id = VFIO_REGION_INFO_CAP_TYPE, .header.version = 1 }; int ret; if (info->index >= VFIO_CCW_NUM_REGIONS + private->num_regions) return -EINVAL; info->index = array_index_nospec(info->index, VFIO_CCW_NUM_REGIONS + private->num_regions); i = info->index - VFIO_CCW_NUM_REGIONS; info->offset = VFIO_CCW_INDEX_TO_OFFSET(info->index); info->size = private->region[i].size; info->flags = private->region[i].flags; cap_type.type = private->region[i].type; cap_type.subtype = private->region[i].subtype; ret = vfio_info_add_capability(&caps, &cap_type.header, sizeof(cap_type)); if (ret) return ret; info->flags |= VFIO_REGION_INFO_FLAG_CAPS; if (info->argsz < sizeof(*info) + caps.size) { info->argsz = sizeof(*info) + caps.size; info->cap_offset = 0; } else { vfio_info_cap_shift(&caps, sizeof(*info)); if (copy_to_user((void __user *)arg + sizeof(*info), caps.buf, caps.size)) { kfree(caps.buf); return -EFAULT; } info->cap_offset = sizeof(*info); } kfree(caps.buf); } } return 0; } static int vfio_ccw_mdev_get_irq_info(struct vfio_irq_info *info) { switch (info->index) { case VFIO_CCW_IO_IRQ_INDEX: case VFIO_CCW_CRW_IRQ_INDEX: case VFIO_CCW_REQ_IRQ_INDEX: info->count = 1; info->flags = VFIO_IRQ_INFO_EVENTFD; break; default: return -EINVAL; } return 0; } static int vfio_ccw_mdev_set_irqs(struct vfio_ccw_private *private, uint32_t flags, uint32_t index, void __user *data) { struct eventfd_ctx **ctx; if (!(flags & VFIO_IRQ_SET_ACTION_TRIGGER)) return -EINVAL; switch (index) { case VFIO_CCW_IO_IRQ_INDEX: ctx = &private->io_trigger; break; case VFIO_CCW_CRW_IRQ_INDEX: ctx = &private->crw_trigger; break; case VFIO_CCW_REQ_IRQ_INDEX: ctx = &private->req_trigger; break; default: return -EINVAL; } switch (flags & VFIO_IRQ_SET_DATA_TYPE_MASK) { case VFIO_IRQ_SET_DATA_NONE: { if (*ctx) eventfd_signal(*ctx, 1); return 0; } case VFIO_IRQ_SET_DATA_BOOL: { uint8_t trigger; if (get_user(trigger, (uint8_t __user *)data)) return -EFAULT; if (trigger && *ctx) eventfd_signal(*ctx, 1); return 0; } case VFIO_IRQ_SET_DATA_EVENTFD: { int32_t fd; if (get_user(fd, (int32_t __user *)data)) return -EFAULT; if (fd == -1) { if (*ctx) eventfd_ctx_put(*ctx); *ctx = NULL; } else if (fd >= 0) { struct eventfd_ctx *efdctx; efdctx = eventfd_ctx_fdget(fd); if (IS_ERR(efdctx)) return PTR_ERR(efdctx); if (*ctx) eventfd_ctx_put(*ctx); *ctx = efdctx; } else return -EINVAL; return 0; } default: return -EINVAL; } } int vfio_ccw_register_dev_region(struct vfio_ccw_private *private, unsigned int subtype, const struct vfio_ccw_regops *ops, size_t size, u32 flags, void *data) { struct vfio_ccw_region *region; region = krealloc(private->region, (private->num_regions + 1) * sizeof(*region), GFP_KERNEL); if (!region) return -ENOMEM; private->region = region; private->region[private->num_regions].type = VFIO_REGION_TYPE_CCW; private->region[private->num_regions].subtype = subtype; private->region[private->num_regions].ops = ops; private->region[private->num_regions].size = size; private->region[private->num_regions].flags = flags; private->region[private->num_regions].data = data; private->num_regions++; return 0; } void vfio_ccw_unregister_dev_regions(struct vfio_ccw_private *private) { int i; for (i = 0; i < private->num_regions; i++) private->region[i].ops->release(private, &private->region[i]); private->num_regions = 0; kfree(private->region); private->region = NULL; } static ssize_t vfio_ccw_mdev_ioctl(struct vfio_device *vdev, unsigned int cmd, unsigned long arg) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); int ret = 0; unsigned long minsz; switch (cmd) { case VFIO_DEVICE_GET_INFO: { struct vfio_device_info info; minsz = offsetofend(struct vfio_device_info, num_irqs); if (copy_from_user(&info, (void __user *)arg, minsz)) return -EFAULT; if (info.argsz < minsz) return -EINVAL; ret = vfio_ccw_mdev_get_device_info(private, &info); if (ret) return ret; return copy_to_user((void __user *)arg, &info, minsz) ? -EFAULT : 0; } case VFIO_DEVICE_GET_REGION_INFO: { struct vfio_region_info info; minsz = offsetofend(struct vfio_region_info, offset); if (copy_from_user(&info, (void __user *)arg, minsz)) return -EFAULT; if (info.argsz < minsz) return -EINVAL; ret = vfio_ccw_mdev_get_region_info(private, &info, arg); if (ret) return ret; return copy_to_user((void __user *)arg, &info, minsz) ? -EFAULT : 0; } case VFIO_DEVICE_GET_IRQ_INFO: { struct vfio_irq_info info; minsz = offsetofend(struct vfio_irq_info, count); if (copy_from_user(&info, (void __user *)arg, minsz)) return -EFAULT; if (info.argsz < minsz || info.index >= VFIO_CCW_NUM_IRQS) return -EINVAL; ret = vfio_ccw_mdev_get_irq_info(&info); if (ret) return ret; if (info.count == -1) return -EINVAL; return copy_to_user((void __user *)arg, &info, minsz) ? -EFAULT : 0; } case VFIO_DEVICE_SET_IRQS: { struct vfio_irq_set hdr; size_t data_size; void __user *data; minsz = offsetofend(struct vfio_irq_set, count); if (copy_from_user(&hdr, (void __user *)arg, minsz)) return -EFAULT; ret = vfio_set_irqs_validate_and_prepare(&hdr, 1, VFIO_CCW_NUM_IRQS, &data_size); if (ret) return ret; data = (void __user *)(arg + minsz); return vfio_ccw_mdev_set_irqs(private, hdr.flags, hdr.index, data); } case VFIO_DEVICE_RESET: return vfio_ccw_mdev_reset(private); default: return -ENOTTY; } } /* Request removal of the device*/ static void vfio_ccw_mdev_request(struct vfio_device *vdev, unsigned int count) { struct vfio_ccw_private *private = container_of(vdev, struct vfio_ccw_private, vdev); struct device *dev = vdev->dev; if (private->req_trigger) { if (!(count % 10)) dev_notice_ratelimited(dev, "Relaying device request to user (#%u)\n", count); eventfd_signal(private->req_trigger, 1); } else if (count == 0) { dev_notice(dev, "No device request channel registered, blocked until released by user\n"); } } static const struct vfio_device_ops vfio_ccw_dev_ops = { .init = vfio_ccw_mdev_init_dev, .release = vfio_ccw_mdev_release_dev, .open_device = vfio_ccw_mdev_open_device, .close_device = vfio_ccw_mdev_close_device, .read = vfio_ccw_mdev_read, .write = vfio_ccw_mdev_write, .ioctl = vfio_ccw_mdev_ioctl, .request = vfio_ccw_mdev_request, .dma_unmap = vfio_ccw_dma_unmap, }; struct mdev_driver vfio_ccw_mdev_driver = { .device_api = VFIO_DEVICE_API_CCW_STRING, .max_instances = 1, .driver = { .name = "vfio_ccw_mdev", .owner = THIS_MODULE, .mod_name = KBUILD_MODNAME, }, .probe = vfio_ccw_mdev_probe, .remove = vfio_ccw_mdev_remove, };
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1