Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp3301554imm; Fri, 25 May 2018 03:23:39 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoOzUpnTmPeQ4UMno9lLgFZA7IQrSarKTm4zabLUoeszTpZ0Artu0MvxdFl1HsAqfvx52Cl X-Received: by 2002:a62:478d:: with SMTP id p13-v6mr1952319pfi.164.1527243819468; Fri, 25 May 2018 03:23:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527243819; cv=none; d=google.com; s=arc-20160816; b=Onq+0XQqzkf07GI0mDdLAoB4CfOvrO2t6SzEOpwuaLB1oxy7ksU4K3/7etrHWRYQqS gUt5USdz47K22iTTid4eFfs5+sJOF3dQ0sb0Nd7LG3kbeQ38XAe2T6on2CGm9t0VOIe/ 2qzne91yfn4Rl+wy6n5q7QJ9qw7AzT4N8vIsDk3kfE0w2IHjsdQBZW6ssZ2eW3yoTBhY mo4yrK7IR/t9YEYIy3cGEHXuLuJUPvgiAw4lCfuEZoYKoUbmG210wThH2Xlz2fkOJzmU DE4/d6SeLY+gLIWRjKo66b6P0/R+HBqg6SFJjNBaV7K+7Nmov86hAu5NRcMMcGFHzRDT 1+wQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from:arc-authentication-results; bh=idbS7QfoB51sLTENZA73PQ5EBDbphIt1CCgUR93WL48=; b=s0vm0pL5dwBNc5kOZ2s6ymIHpja05DKYJH3zfxs4e6SsQ8SVqt8ql7UBubsI7O8WVw aqNyCTfLmM4zJGeYLrM7EFouPvZMh1rYrAnG7yGsx3kV/hXTuyheaGy3m8Oh3zbRx7Wn pt60AY22vrLzfwERtFskXrM7GRIHDI+WDCrWup+dRCn3JHQFn9W4LP3H0Jr0s8sDxhCH g6uHInxWpLyRsxjankn3BuhddryayJvKLV2x1hL/LYdHj20TAMReu9m4hKUIK3F4uf22 49bw0MCSi4XPnAA+c8xCyuy/I2V0mz+UhYdbWbtjNTud+7BuNmh3rtSlGZtT7hb5/aMq RGdg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 89-v6si23569464pfs.362.2018.05.25.03.23.24; Fri, 25 May 2018 03:23:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966161AbeEYKWR (ORCPT + 99 others); Fri, 25 May 2018 06:22:17 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:36324 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S965969AbeEYKVf (ORCPT ); Fri, 25 May 2018 06:21:35 -0400 Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w4P9sLAc194886 for ; Fri, 25 May 2018 06:21:34 -0400 Received: from e06smtp14.uk.ibm.com (e06smtp14.uk.ibm.com [195.75.94.110]) by mx0b-001b2d01.pphosted.com with ESMTP id 2j6es7w7b9-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 25 May 2018 06:21:34 -0400 Received: from localhost by e06smtp14.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 25 May 2018 11:21:32 +0100 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp14.uk.ibm.com (192.168.101.144) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 25 May 2018 11:21:29 +0100 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w4PALSeT4260096 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 25 May 2018 10:21:28 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4E4DFA4059; Fri, 25 May 2018 11:12:46 +0100 (BST) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 19F56A4051; Fri, 25 May 2018 11:12:46 +0100 (BST) Received: from morel-ThinkPad-W530.boeblingen.de.ibm.com (unknown [9.152.224.33]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 25 May 2018 11:12:46 +0100 (BST) From: Pierre Morel To: pasic@linux.vnet.ibm.com, bjsdjshi@linux.vnet.ibm.com Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, cohuck@redhat.com Subject: [PATCH v2 07/10] vfio: ccw: FSM and mediated device initialization Date: Fri, 25 May 2018 12:21:15 +0200 X-Mailer: git-send-email 2.7.4 In-Reply-To: <1527243678-3140-1-git-send-email-pmorel@linux.vnet.ibm.com> References: <1527243678-3140-1-git-send-email-pmorel@linux.vnet.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 18052510-0044-0000-0000-000005569966 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18052510-0045-0000-0000-00002898A120 Message-Id: <1527243678-3140-8-git-send-email-pmorel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-25_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=2 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1805250113 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When the physical device is probed it is existing but should not be able to do any operations since no driver is available until a guest is there. Hence the state is set to VFIO_CCW_STATE_NOT_OPER. When the mediated device is created, nothing is changed for the device, it still stay not operational. When the guest is starting the state machine recieves the VFIO_CCW_EVENT_INIT event which statrts the fsm_init action to bring the state to VFIO_CCW_STATE_STANDBY. The VFIO_DEVICE_RESET command (not part of this patch) will bring the FSM state to VFIO_CCW_STATE_IDLE. Before the mediated device is opened by QEMU, the vfio_private structure is not completely initialized. Let's change the actions for the VFIO_CCW_STATE_NOT_OPER to fsm_nop when vfio_private is not initialized. Signed-off-by: Pierre Morel --- drivers/s390/cio/vfio_ccw_drv.c | 22 ++++++---------------- drivers/s390/cio/vfio_ccw_fsm.c | 25 +++++++++++++++++++++++-- drivers/s390/cio/vfio_ccw_ops.c | 25 +++++++++++++------------ drivers/s390/cio/vfio_ccw_private.h | 1 + 4 files changed, 43 insertions(+), 30 deletions(-) diff --git a/drivers/s390/cio/vfio_ccw_drv.c b/drivers/s390/cio/vfio_ccw_drv.c index 98951d5..6fc7668 100644 --- a/drivers/s390/cio/vfio_ccw_drv.c +++ b/drivers/s390/cio/vfio_ccw_drv.c @@ -114,31 +114,21 @@ static int vfio_ccw_sch_probe(struct subchannel *sch) private = kzalloc(sizeof(*private), GFP_KERNEL | GFP_DMA); if (!private) return -ENOMEM; + + private->state = VFIO_CCW_STATE_NOT_OPER; private->sch = sch; dev_set_drvdata(&sch->dev, private); mutex_init(&private->state_mutex); - - spin_lock_irq(sch->lock); - private->state = VFIO_CCW_STATE_NOT_OPER; - sch->isc = VFIO_CCW_ISC; - ret = cio_enable_subchannel(sch, (u32)(unsigned long)sch); - spin_unlock_irq(sch->lock); - if (ret) - goto out_free; - - ret = vfio_ccw_mdev_reg(sch); - if (ret) - goto out_disable; - INIT_WORK(&private->io_work, vfio_ccw_sch_io_todo); INIT_WORK(&private->event_work, vfio_ccw_sch_event_todo); atomic_set(&private->avail, 1); - private->state = VFIO_CCW_STATE_STANDBY; + + ret = vfio_ccw_mdev_reg(sch); + if (ret) + goto out_free; return 0; -out_disable: - cio_disable_subchannel(sch); out_free: dev_set_drvdata(&sch->dev, NULL); kfree(private); diff --git a/drivers/s390/cio/vfio_ccw_fsm.c b/drivers/s390/cio/vfio_ccw_fsm.c index 077da23..20b909c 100644 --- a/drivers/s390/cio/vfio_ccw_fsm.c +++ b/drivers/s390/cio/vfio_ccw_fsm.c @@ -9,6 +9,7 @@ #include #include +#include #include "ioasm.h" #include "vfio_ccw_private.h" @@ -174,35 +175,55 @@ static int fsm_sch_event(struct vfio_ccw_private *private) return ret; } +static int fsm_init(struct vfio_ccw_private *private) +{ + struct subchannel *sch = private->sch; + int ret = VFIO_CCW_STATE_STANDBY; + + spin_lock_irq(sch->lock); + sch->isc = VFIO_CCW_ISC; + if (cio_enable_subchannel(sch, (u32)(unsigned long)sch)) + ret = VFIO_CCW_STATE_NOT_OPER; + spin_unlock_irq(sch->lock); + + return ret; +} + + /* * Device statemachine */ fsm_func_t *vfio_ccw_jumptable[NR_VFIO_CCW_STATES][NR_VFIO_CCW_EVENTS] = { [VFIO_CCW_STATE_NOT_OPER] = { + [VFIO_CCW_EVENT_INIT] = fsm_init, [VFIO_CCW_EVENT_NOT_OPER] = fsm_nop, - [VFIO_CCW_EVENT_SSCH_REQ] = fsm_io_error, - [VFIO_CCW_EVENT_INTERRUPT] = fsm_disabled_irq, + [VFIO_CCW_EVENT_SSCH_REQ] = fsm_nop, + [VFIO_CCW_EVENT_INTERRUPT] = fsm_nop, [VFIO_CCW_EVENT_SCHIB_CHANGED] = fsm_nop, }, [VFIO_CCW_STATE_STANDBY] = { + [VFIO_CCW_EVENT_INIT] = fsm_nop, [VFIO_CCW_EVENT_NOT_OPER] = fsm_notoper, [VFIO_CCW_EVENT_SSCH_REQ] = fsm_io_error, [VFIO_CCW_EVENT_INTERRUPT] = fsm_irq, [VFIO_CCW_EVENT_SCHIB_CHANGED] = fsm_sch_event, }, [VFIO_CCW_STATE_IDLE] = { + [VFIO_CCW_EVENT_INIT] = fsm_nop, [VFIO_CCW_EVENT_NOT_OPER] = fsm_notoper, [VFIO_CCW_EVENT_SSCH_REQ] = fsm_io_request, [VFIO_CCW_EVENT_INTERRUPT] = fsm_irq, [VFIO_CCW_EVENT_SCHIB_CHANGED] = fsm_sch_event, }, [VFIO_CCW_STATE_BOXED] = { + [VFIO_CCW_EVENT_INIT] = fsm_nop, [VFIO_CCW_EVENT_NOT_OPER] = fsm_notoper, [VFIO_CCW_EVENT_SSCH_REQ] = fsm_io_busy, [VFIO_CCW_EVENT_INTERRUPT] = fsm_irq, [VFIO_CCW_EVENT_SCHIB_CHANGED] = fsm_sch_event, }, [VFIO_CCW_STATE_BUSY] = { + [VFIO_CCW_EVENT_INIT] = fsm_nop, [VFIO_CCW_EVENT_NOT_OPER] = fsm_notoper, [VFIO_CCW_EVENT_SSCH_REQ] = fsm_io_busy, [VFIO_CCW_EVENT_INTERRUPT] = fsm_irq, diff --git a/drivers/s390/cio/vfio_ccw_ops.c b/drivers/s390/cio/vfio_ccw_ops.c index 0206101..ea8fd64 100644 --- a/drivers/s390/cio/vfio_ccw_ops.c +++ b/drivers/s390/cio/vfio_ccw_ops.c @@ -111,14 +111,10 @@ static int vfio_ccw_mdev_create(struct kobject *kobj, struct mdev_device *mdev) struct vfio_ccw_private *private = dev_get_drvdata(mdev_parent_dev(mdev)); - if (private->state == VFIO_CCW_STATE_NOT_OPER) - return -ENODEV; - if (atomic_dec_if_positive(&private->avail) < 0) return -EPERM; private->mdev = mdev; - private->state = VFIO_CCW_STATE_IDLE; return 0; } @@ -128,13 +124,6 @@ static int vfio_ccw_mdev_remove(struct mdev_device *mdev) struct vfio_ccw_private *private = dev_get_drvdata(mdev_parent_dev(mdev)); - if ((private->state != VFIO_CCW_STATE_NOT_OPER) && - (private->state != VFIO_CCW_STATE_STANDBY)) { - if (!vfio_ccw_mdev_reset(mdev)) - private->state = VFIO_CCW_STATE_STANDBY; - /* The state will be NOT_OPER on error. */ - } - private->mdev = NULL; atomic_inc(&private->avail); @@ -146,11 +135,22 @@ static int vfio_ccw_mdev_open(struct mdev_device *mdev) struct vfio_ccw_private *private = dev_get_drvdata(mdev_parent_dev(mdev)); unsigned long events = VFIO_IOMMU_NOTIFY_DMA_UNMAP; + int ret; private->nb.notifier_call = vfio_ccw_mdev_notifier; - return vfio_register_notifier(mdev_dev(mdev), VFIO_IOMMU_NOTIFY, + ret = vfio_register_notifier(mdev_dev(mdev), VFIO_IOMMU_NOTIFY, &events, &private->nb); + if (ret) + return ret; + + vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_INIT); + if (private->state == VFIO_CCW_STATE_STANDBY) + return 0; + + vfio_unregister_notifier(mdev_dev(mdev), VFIO_IOMMU_NOTIFY, + &private->nb); + return -EFAULT; } static void vfio_ccw_mdev_release(struct mdev_device *mdev) @@ -158,6 +158,7 @@ static void vfio_ccw_mdev_release(struct mdev_device *mdev) struct vfio_ccw_private *private = dev_get_drvdata(mdev_parent_dev(mdev)); + vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_NOT_OPER); vfio_unregister_notifier(mdev_dev(mdev), VFIO_IOMMU_NOTIFY, &private->nb); } diff --git a/drivers/s390/cio/vfio_ccw_private.h b/drivers/s390/cio/vfio_ccw_private.h index 241176c..c5455a9 100644 --- a/drivers/s390/cio/vfio_ccw_private.h +++ b/drivers/s390/cio/vfio_ccw_private.h @@ -76,6 +76,7 @@ enum vfio_ccw_state { * Asynchronous events of the device statemachine. */ enum vfio_ccw_event { + VFIO_CCW_EVENT_INIT, VFIO_CCW_EVENT_NOT_OPER, VFIO_CCW_EVENT_SSCH_REQ, VFIO_CCW_EVENT_INTERRUPT, -- 2.7.4