Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp131894yba; Thu, 11 Apr 2019 23:55:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqxqmGGXxtYxaZX1GVnIH6Gu39/h2dgHwngQMN7tU0GXhBt+jcqZSu10ZKcnVUIJYhTuxrRE X-Received: by 2002:a63:fd49:: with SMTP id m9mr52018777pgj.16.1555052156896; Thu, 11 Apr 2019 23:55:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555052156; cv=none; d=google.com; s=arc-20160816; b=ZApD2vPQlaE/1xcdAs4PveT2SD+BVhbWYTPGXBzcKPasGy6iZoBUp5vqT+jV/7Y13P 4KvhTAD0Qkxq2pUPOwDsz90zwagFnqnHq9Tj7nDHjmqW4HKDunnTmiqwYk2px6kxB6Vp FBpm5zbgUEeO3hEDfSDM9g8nKEAC+ABbFJn3DVSPGA5R6UByRXxUDKh+Z4ycwb8k1b8t j1QEK4pOYBOZ2ZMTNZrvhY22Eu1sHndhgX3Q/zMT28vI1AcotIrFYad+B5tIffDcwbpY quiwC8pEGuwJ7KpguyRXCRWZQmFGbdrR1I7fE40MskcuO9Q7db3X/N4OGpzcWYM2kfAi nMpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject; bh=DCtnOJM2UifHJeQgmrbLw/mckfsXxzkwqbh+zwHWyfw=; b=HAFHdbBB+0/4+7zziWAAcK7/zoLoOGFQoCmQQeiyy6zBm70+U55E9lN9ss640CkUq4 AVjnmC97FhLAzbGyZfcyigGOEfrfA8Fb1Fkr1ncmZkTKhSkEyOAmcqRKtlcCo1WymGOl a/KSzuVIxkZqDkPI7m/KIBOV9MBX1FWHdVtwlxjreRAzJCriSeF05NKVWzbME3daSf6T 98NvXMBfYDE8MoGs8p+RxuPMXKMdNBIiXORwQJIEj9/qET5CM4apI4JbBCRj6HmuduDs ov3m9XvOGGxdIcmIGLsUo6AlTtSwj2j/GnqsH0uOoC89QKUs6cqang8CUxQU95sCuuJ1 c0Ow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k19si37992484pfb.139.2019.04.11.23.55.40; Thu, 11 Apr 2019 23:55:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726962AbfDLGzE (ORCPT + 99 others); Fri, 12 Apr 2019 02:55:04 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:60178 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726720AbfDLGzE (ORCPT ); Fri, 12 Apr 2019 02:55:04 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x3C6i90H072363 for ; Fri, 12 Apr 2019 02:55:03 -0400 Received: from e06smtp05.uk.ibm.com (e06smtp05.uk.ibm.com [195.75.94.101]) by mx0a-001b2d01.pphosted.com with ESMTP id 2rtj3rqqqg-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 12 Apr 2019 02:55:02 -0400 Received: from localhost by e06smtp05.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 12 Apr 2019 07:55:00 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp05.uk.ibm.com (192.168.101.135) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 12 Apr 2019 07:54:57 +0100 Received: from d06av24.portsmouth.uk.ibm.com (mk.ibm.com [9.149.105.60]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x3C6suQr50266140 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 12 Apr 2019 06:54:56 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 3A6EA42041; Fri, 12 Apr 2019 06:54:56 +0000 (GMT) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 3B92D4203F; Fri, 12 Apr 2019 06:54:55 +0000 (GMT) Received: from [10.0.2.15] (unknown [9.145.19.216]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 12 Apr 2019 06:54:55 +0000 (GMT) Subject: Re: [PATCH 1/7] s390: zcrypt: driver callback to indicate resource in use To: Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Reinhard Buendgen Cc: borntraeger@de.ibm.com, cohuck@redhat.com, frankja@linux.ibm.com, david@redhat.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, pmorel@linux.ibm.com, pasic@linux.ibm.com, alex.williamson@redhat.com, kwankhede@nvidia.com References: <1555016604-2008-1-git-send-email-akrowiak@linux.ibm.com> <1555016604-2008-2-git-send-email-akrowiak@linux.ibm.com> From: Harald Freudenberger Date: Fri, 12 Apr 2019 08:54:54 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <1555016604-2008-2-git-send-email-akrowiak@linux.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-TM-AS-GCONF: 00 x-cbid: 19041206-0020-0000-0000-0000032F01FE X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19041206-0021-0000-0000-00002181360E Message-Id: <223c82c7-6a75-7209-3652-c2341c83878f@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-04-12_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1904120046 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11.04.19 23:03, Tony Krowiak wrote: > Introduces a new driver callback to prevent a root user from unbinding > an AP queue from its device driver if the queue is in use. This prevents > a root user from inadvertently taking a queue away from a guest and > giving it to the host, or vice versa. The callback will be invoked > whenever a change to the AP bus's apmask or aqmask sysfs interfaces may > result in one or more AP queues being removed from its driver. If the > callback responds in the affirmative for any driver queried, the change > to the apmask or aqmask will be rejected with a device in use error. > > For this patch, only non-default drivers will be queried. Currently, > there is only one non-default driver, the vfio_ap device driver. The > vfio_ap device driver manages AP queues passed through to one or more > guests and we don't want to unexpectedly take AP resources away from > guests which are most likely independently administered. > > Signed-off-by: Tony Krowiak Hello Tony you are going out with your patches but ... what is the result of the discussions we had in the past ? Do we have a common understanding that we want to have it this way ? A driver which is able to claim resources and the bus code has lower precedence ? > --- > drivers/s390/crypto/ap_bus.c | 138 +++++++++++++++++++++++++++++++++++++++++-- > drivers/s390/crypto/ap_bus.h | 3 + > 2 files changed, 135 insertions(+), 6 deletions(-) > > diff --git a/drivers/s390/crypto/ap_bus.c b/drivers/s390/crypto/ap_bus.c > index 1546389d71db..66a5a9d9fae6 100644 > --- a/drivers/s390/crypto/ap_bus.c > +++ b/drivers/s390/crypto/ap_bus.c > @@ -35,6 +35,7 @@ > #include > #include > #include > +#include > > #include "ap_bus.h" > #include "ap_debug.h" > @@ -980,9 +981,11 @@ int ap_parse_mask_str(const char *str, > newmap = kmalloc(size, GFP_KERNEL); > if (!newmap) > return -ENOMEM; > - if (mutex_lock_interruptible(lock)) { > - kfree(newmap); > - return -ERESTARTSYS; > + if (lock) { > + if (mutex_lock_interruptible(lock)) { > + kfree(newmap); > + return -ERESTARTSYS; > + } > } > > if (*str == '+' || *str == '-') { > @@ -994,7 +997,10 @@ int ap_parse_mask_str(const char *str, > } > if (rc == 0) > memcpy(bitmap, newmap, size); > - mutex_unlock(lock); > + > + if (lock) > + mutex_unlock(lock); > + > kfree(newmap); > return rc; > } > @@ -1181,12 +1187,72 @@ static ssize_t apmask_show(struct bus_type *bus, char *buf) > return rc; > } > > +static int __verify_card_reservations(struct device_driver *drv, void *data) > +{ > + int rc = 0; > + struct ap_driver *ap_drv = to_ap_drv(drv); > + unsigned long *newapm = (unsigned long *)data; > + > + /* > + * If the reserved bits do not identify cards reserved for use by the > + * non-default driver, there is no need to verify the driver is using > + * the queues. > + */ > + if (ap_drv->flags & AP_DRIVER_FLAG_DEFAULT) > + return 0; > + > + /* Pin the driver's module code */ > + if (!try_module_get(drv->owner)) > + return 0; > + > + if (ap_drv->in_use) > + if (ap_drv->in_use(newapm, ap_perms.aqm)) > + rc = -EADDRINUSE; > + > + module_put(drv->owner); > + > + return rc; > +} > + > +static int apmask_commit(unsigned long *newapm) > +{ > + int rc; > + unsigned long reserved[BITS_TO_LONGS(AP_DEVICES)]; > + > + /* > + * Check if any bits in the apmask have been set which will > + * result in queues being removed from non-default drivers > + */ > + if (bitmap_andnot(reserved, newapm, ap_perms.apm, AP_DEVICES)) { > + rc = (bus_for_each_drv(&ap_bus_type, NULL, reserved, > + __verify_card_reservations)); > + if (rc) > + return rc; > + } > + > + memcpy(ap_perms.apm, newapm, APMASKSIZE); > + > + return 0; > +} > + > static ssize_t apmask_store(struct bus_type *bus, const char *buf, > size_t count) > { > int rc; > + unsigned long newapm[BITS_TO_LONGS(AP_DEVICES)]; > + > + memcpy(newapm, ap_perms.apm, APMASKSIZE); > + > + rc = ap_parse_mask_str(buf, newapm, AP_DEVICES, NULL); > + if (rc) > + return rc; > + > + if (mutex_lock_interruptible(&ap_perms_mutex)) > + return -ERESTARTSYS; > + > + rc = apmask_commit(newapm); > + mutex_unlock(&ap_perms_mutex); > > - rc = ap_parse_mask_str(buf, ap_perms.apm, AP_DEVICES, &ap_perms_mutex); > if (rc) > return rc; > > @@ -1212,12 +1278,72 @@ static ssize_t aqmask_show(struct bus_type *bus, char *buf) > return rc; > } > > +static int __verify_queue_reservations(struct device_driver *drv, void *data) > +{ > + int rc = 0; > + struct ap_driver *ap_drv = to_ap_drv(drv); > + unsigned long *newaqm = (unsigned long *)data; > + > + /* > + * If the reserved bits do not identify queues reserved for use by the > + * non-default driver, there is no need to verify the driver is using > + * the queues. > + */ > + if (ap_drv->flags & AP_DRIVER_FLAG_DEFAULT) > + return 0; > + > + /* Pin the driver's module code */ > + if (!try_module_get(drv->owner)) > + return 0; > + > + if (ap_drv->in_use) > + if (ap_drv->in_use(ap_perms.apm, newaqm)) > + rc = -EADDRINUSE; > + > + module_put(drv->owner); > + > + return rc; > +} > + > +static int aqmask_commit(unsigned long *newaqm) > +{ > + int rc; > + unsigned long reserved[BITS_TO_LONGS(AP_DOMAINS)]; > + > + /* > + * Check if any bits in the aqmask have been set which will > + * result in queues being removed from non-default drivers > + */ > + if (bitmap_andnot(reserved, newaqm, ap_perms.aqm, AP_DOMAINS)) { > + rc = (bus_for_each_drv(&ap_bus_type, NULL, reserved, > + __verify_queue_reservations)); > + if (rc) > + return rc; > + } > + > + memcpy(ap_perms.aqm, newaqm, APMASKSIZE); > + > + return 0; > +} > + > static ssize_t aqmask_store(struct bus_type *bus, const char *buf, > size_t count) > { > int rc; > + unsigned long newaqm[BITS_TO_LONGS(AP_DOMAINS)]; > + > + memcpy(newaqm, ap_perms.aqm, AQMASKSIZE); > + > + rc = ap_parse_mask_str(buf, newaqm, AP_DOMAINS, NULL); > + if (rc) > + return rc; > + > + if (mutex_lock_interruptible(&ap_perms_mutex)) > + return -ERESTARTSYS; > + > + rc = aqmask_commit(newaqm); > + mutex_unlock(&ap_perms_mutex); > > - rc = ap_parse_mask_str(buf, ap_perms.aqm, AP_DOMAINS, &ap_perms_mutex); > if (rc) > return rc; > > diff --git a/drivers/s390/crypto/ap_bus.h b/drivers/s390/crypto/ap_bus.h > index 15a98a673c5c..b00952d5fdbb 100644 > --- a/drivers/s390/crypto/ap_bus.h > +++ b/drivers/s390/crypto/ap_bus.h > @@ -137,6 +137,7 @@ struct ap_driver { > void (*remove)(struct ap_device *); > void (*suspend)(struct ap_device *); > void (*resume)(struct ap_device *); > + bool (*in_use)(unsigned long *apm, unsigned long *aqm); > }; > > #define to_ap_drv(x) container_of((x), struct ap_driver, driver) > @@ -262,6 +263,8 @@ void ap_queue_reinit_state(struct ap_queue *aq); > struct ap_card *ap_card_create(int id, int queue_depth, int raw_device_type, > int comp_device_type, unsigned int functions); > > +#define APMASKSIZE (BITS_TO_LONGS(AP_DEVICES) * sizeof(unsigned long)) > +#define AQMASKSIZE (BITS_TO_LONGS(AP_DOMAINS) * sizeof(unsigned long)) > struct ap_perms { > unsigned long ioctlm[BITS_TO_LONGS(AP_IOCTLS)]; > unsigned long apm[BITS_TO_LONGS(AP_DEVICES)];