Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp747071img; Fri, 22 Mar 2019 07:45:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqylq65tF/PxC5o3KE/bVTzcu9uE0tPL8HL5fN6Eg8410+x1zvugBOWEys30+OOTxVL2azTf X-Received: by 2002:a63:4342:: with SMTP id q63mr9180111pga.6.1553265942541; Fri, 22 Mar 2019 07:45:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553265942; cv=none; d=google.com; s=arc-20160816; b=MTQn0ax11Pgyqz2NQv4jIN3ihYQ2DDyDCYUo5V0d6FTOEKbOQTvZFqFaixbb8t639E 28eQEPHLNJarlQyG00P+Yt8HETIIWZRdP4uH2r53G8WWbpfsS4wn1ItV4MfmLdJBgOth urU9Ve62BNaSkvN2r29xf43jMF5u5U+UCP9V12/v1T4tAJrpGFw6/AnO93Vj3md+GdC6 RqxidLqXcC7QXMSpV9xGmmn8638VDLzrW9IeeRxkCDzudMRTCboU97Uhz5xgIYlDljAu yvGTj9CvjOjclalkCytCcOufhUVbXCYs1KzRLOu+Zy6O/0XH8mOOvE5WJv13wUMv5G4c x2eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from; bh=GqW6WzWwpPI+JOyB3XpNYpKiNTy6ned4mYVFC6ifGGg=; b=kV9JYlTDCTtSn9FtKfYUpvpK0OG5injE7Zjh3NzNH0lX8l2VFELYnPDIiRjAlRNsZY EtRna62gqR2Y03BppX5mQvBef5T9sF1MnP0kIQcr2IDPlYWTP49g6qAiFGuFrN7YWWWu 0pkHojvK2tyU7JsgEmqJu5UTcj+Vx1+BdWzmajO+6IQ9QKdr6XIBJa8bN/h6fe+WXs2x ZNiXhm/TVQ2+ZdXXrbCQYN+cjDR+3EZpDrZEuiS6eK5lieT5NvUfDLhfwcmj+1aDwWNn Q/DGlIiW/9O49h7wfFKEXumVHcLMXV0/we1EZcQeCRdJGs7eDwp6A0JZTBH5bxpI0XvI N7sQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v2si6971641pgk.123.2019.03.22.07.45.24; Fri, 22 Mar 2019 07:45:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729332AbfCVOoF (ORCPT + 99 others); Fri, 22 Mar 2019 10:44:05 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:41432 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729317AbfCVOoD (ORCPT ); Fri, 22 Mar 2019 10:44:03 -0400 Received: from pps.filterd (m0098413.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x2MEd4aT002590 for ; Fri, 22 Mar 2019 10:44:02 -0400 Received: from e06smtp03.uk.ibm.com (e06smtp03.uk.ibm.com [195.75.94.99]) by mx0b-001b2d01.pphosted.com with ESMTP id 2rd0984kyk-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 22 Mar 2019 10:44:01 -0400 Received: from localhost by e06smtp03.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 22 Mar 2019 14:43:55 -0000 Received: from b06cxnps3074.portsmouth.uk.ibm.com (9.149.109.194) by e06smtp03.uk.ibm.com (192.168.101.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 22 Mar 2019 14:43:51 -0000 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps3074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x2MEhsV050462752 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 22 Mar 2019 14:43:54 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4DF644C044; Fri, 22 Mar 2019 14:43:54 +0000 (GMT) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B52914C040; Fri, 22 Mar 2019 14:43:53 +0000 (GMT) Received: from morel-ThinkPad-W530.boeblingen.de.ibm.com (unknown [9.145.173.187]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 22 Mar 2019 14:43:53 +0000 (GMT) From: Pierre Morel To: borntraeger@de.ibm.com Cc: alex.williamson@redhat.com, cohuck@redhat.com, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, kvm@vger.kernel.org, frankja@linux.ibm.com, akrowiak@linux.ibm.com, pasic@linux.ibm.com, david@redhat.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, freude@linux.ibm.com, mimu@linux.ibm.com Subject: [PATCH v6 3/7] s390: ap: setup relation betwen KVM and mediated device Date: Fri, 22 Mar 2019 15:43:44 +0100 X-Mailer: git-send-email 2.7.4 In-Reply-To: <1553265828-27823-1-git-send-email-pmorel@linux.ibm.com> References: <1553265828-27823-1-git-send-email-pmorel@linux.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 19032214-0012-0000-0000-00000305F826 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19032214-0013-0000-0000-0000213D14EC Message-Id: <1553265828-27823-4-git-send-email-pmorel@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-03-22_08:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=3 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1903220108 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When the mediated device is open we setup the relation with KVM unset it when the mediated device is released. We lock the matrix mediated device to avoid any change until the open is done. We make sure that KVM is present when opening the mediated device otherwise we return an error. Increase kvm's refcount to ensure the KVM structures are still available during the use of the mediated device by the guest. Signed-off-by: Pierre Morel --- drivers/s390/crypto/vfio_ap_ops.c | 143 +++++++++++++++++++++----------------- 1 file changed, 79 insertions(+), 64 deletions(-) diff --git a/drivers/s390/crypto/vfio_ap_ops.c b/drivers/s390/crypto/vfio_ap_ops.c index 77f7bac..bdb36e0 100644 --- a/drivers/s390/crypto/vfio_ap_ops.c +++ b/drivers/s390/crypto/vfio_ap_ops.c @@ -787,74 +787,24 @@ static const struct attribute_group *vfio_ap_mdev_attr_groups[] = { NULL }; -/** - * vfio_ap_mdev_set_kvm - * - * @matrix_mdev: a mediated matrix device - * @kvm: reference to KVM instance - * - * Verifies no other mediated matrix device has @kvm and sets a reference to - * it in @matrix_mdev->kvm. - * - * Return 0 if no other mediated matrix device has a reference to @kvm; - * otherwise, returns an -EPERM. - */ -static int vfio_ap_mdev_set_kvm(struct ap_matrix_mdev *matrix_mdev, - struct kvm *kvm) -{ - struct ap_matrix_mdev *m; - - mutex_lock(&matrix_dev->lock); - - list_for_each_entry(m, &matrix_dev->mdev_list, node) { - if ((m != matrix_mdev) && (m->kvm == kvm)) { - mutex_unlock(&matrix_dev->lock); - return -EPERM; - } - } - - matrix_mdev->kvm = kvm; - mutex_unlock(&matrix_dev->lock); - - return 0; -} - static int vfio_ap_mdev_group_notifier(struct notifier_block *nb, unsigned long action, void *data) { - int ret; struct ap_matrix_mdev *matrix_mdev; if (action != VFIO_GROUP_NOTIFY_SET_KVM) return NOTIFY_OK; matrix_mdev = container_of(nb, struct ap_matrix_mdev, group_notifier); - - if (!data) { - matrix_mdev->kvm = NULL; - return NOTIFY_OK; - } - - ret = vfio_ap_mdev_set_kvm(matrix_mdev, data); - if (ret) - return NOTIFY_DONE; - - /* If there is no CRYCB pointer, then we can't copy the masks */ - if (!matrix_mdev->kvm->arch.crypto.crycbd) - return NOTIFY_DONE; - - kvm_arch_crypto_set_masks(matrix_mdev->kvm, matrix_mdev->matrix.apm, - matrix_mdev->matrix.aqm, - matrix_mdev->matrix.adm); + matrix_mdev->kvm = data; return NOTIFY_OK; } -static int vfio_ap_mdev_reset_queues(struct mdev_device *mdev) +static int vfio_ap_mdev_reset_queues(struct ap_matrix_mdev *matrix_mdev) { int ret; int rc = 0; - struct ap_matrix_mdev *matrix_mdev = mdev_get_drvdata(mdev); struct vfio_ap_queue *q; list_for_each_entry(q, &matrix_mdev->qlist, list) { @@ -871,41 +821,106 @@ static int vfio_ap_mdev_reset_queues(struct mdev_device *mdev) return rc; } +/** + * vfio_ap_mdev_set_kvm + * + * @matrix_mdev: a mediated matrix device + * + * - Verifies that the hook is free and install the PQAP hook + * - Copy the matrix masks inside the CRYCB + * - Increment the KVM rerference count + * + * Return 0 if no other mediated matrix device has a reference to @kvm; + * otherwise, returns an -EPERM. + */ +static int vfio_ap_mdev_set_kvm(struct ap_matrix_mdev *matrix_mdev) +{ + if (matrix_mdev->kvm->arch.crypto.pqap_hook) + return -EPERM; + matrix_mdev->kvm->arch.crypto.pqap_hook = &matrix_mdev->pqap_hook; + + kvm_arch_crypto_set_masks(matrix_mdev->kvm, matrix_mdev->matrix.apm, + matrix_mdev->matrix.aqm, + matrix_mdev->matrix.adm); + + kvm_get_kvm(matrix_mdev->kvm); + return 0; +} + +/** + * vfio_ap_mdev_unset_kvm + * + * @matrix_mdev: a mediated matrix device + * + * - Clears the matrix masks inside the CRYCB + * - Reset the queues before to clear the hook in case IRQ happen during + * reset. + * - Clears the hook + * - Decrement the KVM rerference count + */ +static int vfio_ap_mdev_unset_kvm(struct ap_matrix_mdev *matrix_mdev) +{ + struct kvm *kvm = matrix_mdev->kvm; + + kvm_arch_crypto_clear_masks(matrix_mdev->kvm); + vfio_ap_mdev_reset_queues(matrix_mdev); + matrix_mdev->kvm->arch.crypto.pqap_hook = NULL; + matrix_mdev->kvm = NULL; + kvm_put_kvm(kvm); + return 0; +} + static int vfio_ap_mdev_open(struct mdev_device *mdev) { struct ap_matrix_mdev *matrix_mdev = mdev_get_drvdata(mdev); unsigned long events; int ret; + mutex_lock(&matrix_dev->lock); - if (!try_module_get(THIS_MODULE)) - return -ENODEV; + if (!try_module_get(THIS_MODULE)) { + ret = -ENODEV; + goto unlock; + } matrix_mdev->group_notifier.notifier_call = vfio_ap_mdev_group_notifier; events = VFIO_GROUP_NOTIFY_SET_KVM; ret = vfio_register_notifier(mdev_dev(mdev), VFIO_GROUP_NOTIFY, &events, &matrix_mdev->group_notifier); - if (ret) { - module_put(THIS_MODULE); - return ret; + if (ret) + goto put_unlock; + + /* We do not support opening the mediated device without KVM */ + if (!matrix_mdev->kvm) { + ret = -ENOENT; + goto free_notifier; } - return 0; + ret = vfio_ap_mdev_set_kvm(matrix_mdev); + if (!ret) + goto unlock; + +free_notifier: + vfio_unregister_notifier(mdev_dev(mdev), VFIO_GROUP_NOTIFY, + &matrix_mdev->group_notifier); +put_unlock: + module_put(THIS_MODULE); +unlock: + mutex_unlock(&matrix_dev->lock); + return ret; } static void vfio_ap_mdev_release(struct mdev_device *mdev) { struct ap_matrix_mdev *matrix_mdev = mdev_get_drvdata(mdev); - if (matrix_mdev->kvm) - kvm_arch_crypto_clear_masks(matrix_mdev->kvm); - - matrix_mdev->kvm = NULL; - vfio_ap_mdev_reset_queues(mdev); + mutex_lock(&matrix_dev->lock); + vfio_ap_mdev_unset_kvm(matrix_mdev); vfio_unregister_notifier(mdev_dev(mdev), VFIO_GROUP_NOTIFY, &matrix_mdev->group_notifier); module_put(THIS_MODULE); + mutex_unlock(&matrix_dev->lock); } static int vfio_ap_mdev_get_device_info(unsigned long arg) @@ -939,7 +954,7 @@ static ssize_t vfio_ap_mdev_ioctl(struct mdev_device *mdev, break; case VFIO_DEVICE_RESET: mutex_lock(&matrix_dev->lock); - ret = vfio_ap_mdev_reset_queues(mdev); + ret = vfio_ap_mdev_reset_queues(mdev_get_drvdata(mdev)); mutex_unlock(&matrix_dev->lock); break; default: -- 2.7.4