1 // SPDX-License-Identifier: GPL-2.0+
3 * Adjunct processor matrix VFIO device driver callbacks.
5 * Copyright IBM Corp. 2018
7 * Author(s): Tony Krowiak <akrowiak@linux.ibm.com>
8 * Halil Pasic <pasic@linux.ibm.com>
9 * Pierre Morel <pmorel@linux.ibm.com>
11 #include <linux/string.h>
12 #include <linux/vfio.h>
13 #include <linux/device.h>
14 #include <linux/list.h>
15 #include <linux/ctype.h>
16 #include <linux/bitops.h>
17 #include <linux/kvm_host.h>
18 #include <linux/module.h>
20 #include <asm/zcrypt.h>
22 #include "vfio_ap_private.h"
24 #define VFIO_AP_MDEV_TYPE_HWVIRT "passthrough"
25 #define VFIO_AP_MDEV_NAME_HWVIRT "VFIO AP Passthrough Device"
27 static int vfio_ap_mdev_reset_queues(struct mdev_device
*mdev
);
29 static int match_apqn(struct device
*dev
, const void *data
)
31 struct vfio_ap_queue
*q
= dev_get_drvdata(dev
);
33 return (q
->apqn
== *(int *)(data
)) ? 1 : 0;
37 * vfio_ap_get_queue: Retrieve a queue with a specific APQN from a list
38 * @matrix_mdev: the associated mediated matrix
39 * @apqn: The queue APQN
41 * Retrieve a queue with a specific APQN from the list of the
42 * devices of the vfio_ap_drv.
43 * Verify that the APID and the APQI are set in the matrix.
45 * Returns the pointer to the associated vfio_ap_queue
47 static struct vfio_ap_queue
*vfio_ap_get_queue(
48 struct ap_matrix_mdev
*matrix_mdev
,
51 struct vfio_ap_queue
*q
;
54 if (!test_bit_inv(AP_QID_CARD(apqn
), matrix_mdev
->matrix
.apm
))
56 if (!test_bit_inv(AP_QID_QUEUE(apqn
), matrix_mdev
->matrix
.aqm
))
59 dev
= driver_find_device(&matrix_dev
->vfio_ap_drv
->driver
, NULL
,
63 q
= dev_get_drvdata(dev
);
64 q
->matrix_mdev
= matrix_mdev
;
71 * vfio_ap_wait_for_irqclear
72 * @apqn: The AP Queue number
74 * Checks the IRQ bit for the status of this APQN using ap_tapq.
75 * Returns if the ap_tapq function succeeded and the bit is clear.
76 * Returns if ap_tapq function failed with invalid, deconfigured or
78 * Otherwise retries up to 5 times after waiting 20ms.
81 static void vfio_ap_wait_for_irqclear(int apqn
)
83 struct ap_queue_status status
;
87 status
= ap_tapq(apqn
, NULL
);
88 switch (status
.response_code
) {
89 case AP_RESPONSE_NORMAL
:
90 case AP_RESPONSE_RESET_IN_PROGRESS
:
91 if (!status
.irq_enabled
)
94 case AP_RESPONSE_BUSY
:
97 case AP_RESPONSE_Q_NOT_AVAIL
:
98 case AP_RESPONSE_DECONFIGURED
:
99 case AP_RESPONSE_CHECKSTOPPED
:
101 WARN_ONCE(1, "%s: tapq rc %02x: %04x\n", __func__
,
102 status
.response_code
, apqn
);
107 WARN_ONCE(1, "%s: tapq rc %02x: %04x could not clear IR bit\n",
108 __func__
, status
.response_code
, apqn
);
112 * vfio_ap_free_aqic_resources
113 * @q: The vfio_ap_queue
115 * Unregisters the ISC in the GIB when the saved ISC not invalid.
116 * Unpin the guest's page holding the NIB when it exist.
117 * Reset the saved_pfn and saved_isc to invalid values.
120 static void vfio_ap_free_aqic_resources(struct vfio_ap_queue
*q
)
122 if (q
->saved_isc
!= VFIO_AP_ISC_INVALID
&& q
->matrix_mdev
)
123 kvm_s390_gisc_unregister(q
->matrix_mdev
->kvm
, q
->saved_isc
);
124 if (q
->saved_pfn
&& q
->matrix_mdev
)
125 vfio_unpin_pages(mdev_dev(q
->matrix_mdev
->mdev
),
128 q
->saved_isc
= VFIO_AP_ISC_INVALID
;
132 * vfio_ap_irq_disable
133 * @q: The vfio_ap_queue
135 * Uses ap_aqic to disable the interruption and in case of success, reset
136 * in progress or IRQ disable command already proceeded: calls
137 * vfio_ap_wait_for_irqclear() to check for the IRQ bit to be clear
138 * and calls vfio_ap_free_aqic_resources() to free the resources associated
139 * with the AP interrupt handling.
141 * In the case the AP is busy, or a reset is in progress,
142 * retries after 20ms, up to 5 times.
144 * Returns if ap_aqic function failed with invalid, deconfigured or
147 struct ap_queue_status
vfio_ap_irq_disable(struct vfio_ap_queue
*q
)
149 struct ap_qirq_ctrl aqic_gisa
= {};
150 struct ap_queue_status status
;
154 status
= ap_aqic(q
->apqn
, aqic_gisa
, NULL
);
155 switch (status
.response_code
) {
156 case AP_RESPONSE_OTHERWISE_CHANGED
:
157 case AP_RESPONSE_NORMAL
:
158 vfio_ap_wait_for_irqclear(q
->apqn
);
160 case AP_RESPONSE_RESET_IN_PROGRESS
:
161 case AP_RESPONSE_BUSY
:
164 case AP_RESPONSE_Q_NOT_AVAIL
:
165 case AP_RESPONSE_DECONFIGURED
:
166 case AP_RESPONSE_CHECKSTOPPED
:
167 case AP_RESPONSE_INVALID_ADDRESS
:
169 /* All cases in default means AP not operational */
170 WARN_ONCE(1, "%s: ap_aqic status %d\n", __func__
,
171 status
.response_code
);
176 WARN_ONCE(1, "%s: ap_aqic status %d\n", __func__
,
177 status
.response_code
);
179 vfio_ap_free_aqic_resources(q
);
180 q
->matrix_mdev
= NULL
;
185 * vfio_ap_setirq: Enable Interruption for a APQN
187 * @dev: the device associated with the ap_queue
188 * @q: the vfio_ap_queue holding AQIC parameters
190 * Pin the NIB saved in *q
191 * Register the guest ISC to GIB interface and retrieve the
192 * host ISC to issue the host side PQAP/AQIC
194 * Response.status may be set to AP_RESPONSE_INVALID_ADDRESS in case the
195 * vfio_pin_pages failed.
197 * Otherwise return the ap_queue_status returned by the ap_aqic(),
198 * all retry handling will be done by the guest.
200 static struct ap_queue_status
vfio_ap_irq_enable(struct vfio_ap_queue
*q
,
204 struct ap_qirq_ctrl aqic_gisa
= {};
205 struct ap_queue_status status
= {};
206 struct kvm_s390_gisa
*gisa
;
208 unsigned long h_nib
, g_pfn
, h_pfn
;
211 g_pfn
= nib
>> PAGE_SHIFT
;
212 ret
= vfio_pin_pages(mdev_dev(q
->matrix_mdev
->mdev
), &g_pfn
, 1,
213 IOMMU_READ
| IOMMU_WRITE
, &h_pfn
);
218 status
.response_code
= AP_RESPONSE_INVALID_ADDRESS
;
222 kvm
= q
->matrix_mdev
->kvm
;
223 gisa
= kvm
->arch
.gisa_int
.origin
;
225 h_nib
= (h_pfn
<< PAGE_SHIFT
) | (nib
& ~PAGE_MASK
);
226 aqic_gisa
.gisc
= isc
;
227 aqic_gisa
.isc
= kvm_s390_gisc_register(kvm
, isc
);
229 aqic_gisa
.gisa
= (uint64_t)gisa
>> 4;
231 status
= ap_aqic(q
->apqn
, aqic_gisa
, (void *)h_nib
);
232 switch (status
.response_code
) {
233 case AP_RESPONSE_NORMAL
:
234 /* See if we did clear older IRQ configuration */
235 vfio_ap_free_aqic_resources(q
);
236 q
->saved_pfn
= g_pfn
;
239 case AP_RESPONSE_OTHERWISE_CHANGED
:
240 /* We could not modify IRQ setings: clear new configuration */
241 vfio_unpin_pages(mdev_dev(q
->matrix_mdev
->mdev
), &g_pfn
, 1);
242 kvm_s390_gisc_unregister(kvm
, isc
);
245 pr_warn("%s: apqn %04x: response: %02x\n", __func__
, q
->apqn
,
246 status
.response_code
);
247 vfio_ap_irq_disable(q
);
255 * handle_pqap: PQAP instruction callback
257 * @vcpu: The vcpu on which we received the PQAP instruction
259 * Get the general register contents to initialize internal variables.
264 * Response.status may be set to following Response Code:
265 * - AP_RESPONSE_Q_NOT_AVAIL: if the queue is not available
266 * - AP_RESPONSE_DECONFIGURED: if the queue is not configured
267 * - AP_RESPONSE_NORMAL (0) : in case of successs
268 * Check vfio_ap_setirq() and vfio_ap_clrirq() for other possible RC.
269 * We take the matrix_dev lock to ensure serialization on queues and
270 * mediated device access.
272 * Return 0 if we could handle the request inside KVM.
273 * otherwise, returns -EOPNOTSUPP to let QEMU handle the fault.
275 static int handle_pqap(struct kvm_vcpu
*vcpu
)
279 struct vfio_ap_queue
*q
;
280 struct ap_queue_status qstatus
= {
281 .response_code
= AP_RESPONSE_Q_NOT_AVAIL
, };
282 struct ap_matrix_mdev
*matrix_mdev
;
284 /* If we do not use the AIV facility just go to userland */
285 if (!(vcpu
->arch
.sie_block
->eca
& ECA_AIV
))
288 apqn
= vcpu
->run
->s
.regs
.gprs
[0] & 0xffff;
289 mutex_lock(&matrix_dev
->lock
);
291 if (!vcpu
->kvm
->arch
.crypto
.pqap_hook
)
293 matrix_mdev
= container_of(vcpu
->kvm
->arch
.crypto
.pqap_hook
,
294 struct ap_matrix_mdev
, pqap_hook
);
296 q
= vfio_ap_get_queue(matrix_mdev
, apqn
);
300 status
= vcpu
->run
->s
.regs
.gprs
[1];
302 /* If IR bit(16) is set we enable the interrupt */
303 if ((status
>> (63 - 16)) & 0x01)
304 qstatus
= vfio_ap_irq_enable(q
, status
& 0x07,
305 vcpu
->run
->s
.regs
.gprs
[2]);
307 qstatus
= vfio_ap_irq_disable(q
);
310 memcpy(&vcpu
->run
->s
.regs
.gprs
[1], &qstatus
, sizeof(qstatus
));
311 vcpu
->run
->s
.regs
.gprs
[1] >>= 32;
312 mutex_unlock(&matrix_dev
->lock
);
316 static void vfio_ap_matrix_init(struct ap_config_info
*info
,
317 struct ap_matrix
*matrix
)
319 matrix
->apm_max
= info
->apxa
? info
->Na
: 63;
320 matrix
->aqm_max
= info
->apxa
? info
->Nd
: 15;
321 matrix
->adm_max
= info
->apxa
? info
->Nd
: 15;
324 static int vfio_ap_mdev_create(struct kobject
*kobj
, struct mdev_device
*mdev
)
326 struct ap_matrix_mdev
*matrix_mdev
;
328 if ((atomic_dec_if_positive(&matrix_dev
->available_instances
) < 0))
331 matrix_mdev
= kzalloc(sizeof(*matrix_mdev
), GFP_KERNEL
);
333 atomic_inc(&matrix_dev
->available_instances
);
337 matrix_mdev
->mdev
= mdev
;
338 vfio_ap_matrix_init(&matrix_dev
->info
, &matrix_mdev
->matrix
);
339 mdev_set_drvdata(mdev
, matrix_mdev
);
340 matrix_mdev
->pqap_hook
.hook
= handle_pqap
;
341 matrix_mdev
->pqap_hook
.owner
= THIS_MODULE
;
342 mutex_lock(&matrix_dev
->lock
);
343 list_add(&matrix_mdev
->node
, &matrix_dev
->mdev_list
);
344 mutex_unlock(&matrix_dev
->lock
);
349 static int vfio_ap_mdev_remove(struct mdev_device
*mdev
)
351 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
353 if (matrix_mdev
->kvm
)
356 mutex_lock(&matrix_dev
->lock
);
357 vfio_ap_mdev_reset_queues(mdev
);
358 list_del(&matrix_mdev
->node
);
359 mutex_unlock(&matrix_dev
->lock
);
362 mdev_set_drvdata(mdev
, NULL
);
363 atomic_inc(&matrix_dev
->available_instances
);
368 static ssize_t
name_show(struct kobject
*kobj
, struct device
*dev
, char *buf
)
370 return sprintf(buf
, "%s\n", VFIO_AP_MDEV_NAME_HWVIRT
);
373 static MDEV_TYPE_ATTR_RO(name
);
375 static ssize_t
available_instances_show(struct kobject
*kobj
,
376 struct device
*dev
, char *buf
)
378 return sprintf(buf
, "%d\n",
379 atomic_read(&matrix_dev
->available_instances
));
382 static MDEV_TYPE_ATTR_RO(available_instances
);
384 static ssize_t
device_api_show(struct kobject
*kobj
, struct device
*dev
,
387 return sprintf(buf
, "%s\n", VFIO_DEVICE_API_AP_STRING
);
390 static MDEV_TYPE_ATTR_RO(device_api
);
392 static struct attribute
*vfio_ap_mdev_type_attrs
[] = {
393 &mdev_type_attr_name
.attr
,
394 &mdev_type_attr_device_api
.attr
,
395 &mdev_type_attr_available_instances
.attr
,
399 static struct attribute_group vfio_ap_mdev_hwvirt_type_group
= {
400 .name
= VFIO_AP_MDEV_TYPE_HWVIRT
,
401 .attrs
= vfio_ap_mdev_type_attrs
,
404 static struct attribute_group
*vfio_ap_mdev_type_groups
[] = {
405 &vfio_ap_mdev_hwvirt_type_group
,
409 struct vfio_ap_queue_reserved
{
418 * @dev: an AP queue device
419 * @data: a struct vfio_ap_queue_reserved reference
421 * Flags whether the AP queue device (@dev) has a queue ID containing the APQN,
422 * apid or apqi specified in @data:
424 * - If @data contains both an apid and apqi value, then @data will be flagged
425 * as reserved if the APID and APQI fields for the AP queue device matches
427 * - If @data contains only an apid value, @data will be flagged as
428 * reserved if the APID field in the AP queue device matches
430 * - If @data contains only an apqi value, @data will be flagged as
431 * reserved if the APQI field in the AP queue device matches
433 * Returns 0 to indicate the input to function succeeded. Returns -EINVAL if
434 * @data does not contain either an apid or apqi.
436 static int vfio_ap_has_queue(struct device
*dev
, void *data
)
438 struct vfio_ap_queue_reserved
*qres
= data
;
439 struct ap_queue
*ap_queue
= to_ap_queue(dev
);
443 if (qres
->apid
&& qres
->apqi
) {
444 qid
= AP_MKQID(*qres
->apid
, *qres
->apqi
);
445 if (qid
== ap_queue
->qid
)
446 qres
->reserved
= true;
447 } else if (qres
->apid
&& !qres
->apqi
) {
448 id
= AP_QID_CARD(ap_queue
->qid
);
449 if (id
== *qres
->apid
)
450 qres
->reserved
= true;
451 } else if (!qres
->apid
&& qres
->apqi
) {
452 id
= AP_QID_QUEUE(ap_queue
->qid
);
453 if (id
== *qres
->apqi
)
454 qres
->reserved
= true;
463 * vfio_ap_verify_queue_reserved
465 * @matrix_dev: a mediated matrix device
466 * @apid: an AP adapter ID
467 * @apqi: an AP queue index
469 * Verifies that the AP queue with @apid/@apqi is reserved by the VFIO AP device
470 * driver according to the following rules:
472 * - If both @apid and @apqi are not NULL, then there must be an AP queue
473 * device bound to the vfio_ap driver with the APQN identified by @apid and
476 * - If only @apid is not NULL, then there must be an AP queue device bound
477 * to the vfio_ap driver with an APQN containing @apid
479 * - If only @apqi is not NULL, then there must be an AP queue device bound
480 * to the vfio_ap driver with an APQN containing @apqi
482 * Returns 0 if the AP queue is reserved; otherwise, returns -EADDRNOTAVAIL.
484 static int vfio_ap_verify_queue_reserved(unsigned long *apid
,
488 struct vfio_ap_queue_reserved qres
;
492 qres
.reserved
= false;
494 ret
= driver_for_each_device(&matrix_dev
->vfio_ap_drv
->driver
, NULL
,
495 &qres
, vfio_ap_has_queue
);
502 return -EADDRNOTAVAIL
;
506 vfio_ap_mdev_verify_queues_reserved_for_apid(struct ap_matrix_mdev
*matrix_mdev
,
511 unsigned long nbits
= matrix_mdev
->matrix
.aqm_max
+ 1;
513 if (find_first_bit_inv(matrix_mdev
->matrix
.aqm
, nbits
) >= nbits
)
514 return vfio_ap_verify_queue_reserved(&apid
, NULL
);
516 for_each_set_bit_inv(apqi
, matrix_mdev
->matrix
.aqm
, nbits
) {
517 ret
= vfio_ap_verify_queue_reserved(&apid
, &apqi
);
526 * vfio_ap_mdev_verify_no_sharing
528 * Verifies that the APQNs derived from the cross product of the AP adapter IDs
529 * and AP queue indexes comprising the AP matrix are not configured for another
530 * mediated device. AP queue sharing is not allowed.
532 * @matrix_mdev: the mediated matrix device
534 * Returns 0 if the APQNs are not shared, otherwise; returns -EADDRINUSE.
536 static int vfio_ap_mdev_verify_no_sharing(struct ap_matrix_mdev
*matrix_mdev
)
538 struct ap_matrix_mdev
*lstdev
;
539 DECLARE_BITMAP(apm
, AP_DEVICES
);
540 DECLARE_BITMAP(aqm
, AP_DOMAINS
);
542 list_for_each_entry(lstdev
, &matrix_dev
->mdev_list
, node
) {
543 if (matrix_mdev
== lstdev
)
546 memset(apm
, 0, sizeof(apm
));
547 memset(aqm
, 0, sizeof(aqm
));
550 * We work on full longs, as we can only exclude the leftover
551 * bits in non-inverse order. The leftover is all zeros.
553 if (!bitmap_and(apm
, matrix_mdev
->matrix
.apm
,
554 lstdev
->matrix
.apm
, AP_DEVICES
))
557 if (!bitmap_and(aqm
, matrix_mdev
->matrix
.aqm
,
558 lstdev
->matrix
.aqm
, AP_DOMAINS
))
568 * assign_adapter_store
570 * @dev: the matrix device
571 * @attr: the mediated matrix device's assign_adapter attribute
572 * @buf: a buffer containing the AP adapter number (APID) to
574 * @count: the number of bytes in @buf
576 * Parses the APID from @buf and sets the corresponding bit in the mediated
577 * matrix device's APM.
579 * Returns the number of bytes processed if the APID is valid; otherwise,
580 * returns one of the following errors:
583 * The APID is not a valid number
586 * The APID exceeds the maximum value configured for the system
589 * An APQN derived from the cross product of the APID being assigned
590 * and the APQIs previously assigned is not bound to the vfio_ap device
591 * driver; or, if no APQIs have yet been assigned, the APID is not
592 * contained in an APQN bound to the vfio_ap device driver.
595 * An APQN derived from the cross product of the APID being assigned
596 * and the APQIs previously assigned is being used by another mediated
599 static ssize_t
assign_adapter_store(struct device
*dev
,
600 struct device_attribute
*attr
,
601 const char *buf
, size_t count
)
605 struct mdev_device
*mdev
= mdev_from_dev(dev
);
606 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
608 /* If the guest is running, disallow assignment of adapter */
609 if (matrix_mdev
->kvm
)
612 ret
= kstrtoul(buf
, 0, &apid
);
616 if (apid
> matrix_mdev
->matrix
.apm_max
)
620 * Set the bit in the AP mask (APM) corresponding to the AP adapter
621 * number (APID). The bits in the mask, from most significant to least
622 * significant bit, correspond to APIDs 0-255.
624 mutex_lock(&matrix_dev
->lock
);
626 ret
= vfio_ap_mdev_verify_queues_reserved_for_apid(matrix_mdev
, apid
);
630 set_bit_inv(apid
, matrix_mdev
->matrix
.apm
);
632 ret
= vfio_ap_mdev_verify_no_sharing(matrix_mdev
);
640 clear_bit_inv(apid
, matrix_mdev
->matrix
.apm
);
642 mutex_unlock(&matrix_dev
->lock
);
646 static DEVICE_ATTR_WO(assign_adapter
);
649 * unassign_adapter_store
651 * @dev: the matrix device
652 * @attr: the mediated matrix device's unassign_adapter attribute
653 * @buf: a buffer containing the adapter number (APID) to be unassigned
654 * @count: the number of bytes in @buf
656 * Parses the APID from @buf and clears the corresponding bit in the mediated
657 * matrix device's APM.
659 * Returns the number of bytes processed if the APID is valid; otherwise,
660 * returns one of the following errors:
661 * -EINVAL if the APID is not a number
662 * -ENODEV if the APID it exceeds the maximum value configured for the
665 static ssize_t
unassign_adapter_store(struct device
*dev
,
666 struct device_attribute
*attr
,
667 const char *buf
, size_t count
)
671 struct mdev_device
*mdev
= mdev_from_dev(dev
);
672 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
674 /* If the guest is running, disallow un-assignment of adapter */
675 if (matrix_mdev
->kvm
)
678 ret
= kstrtoul(buf
, 0, &apid
);
682 if (apid
> matrix_mdev
->matrix
.apm_max
)
685 mutex_lock(&matrix_dev
->lock
);
686 clear_bit_inv((unsigned long)apid
, matrix_mdev
->matrix
.apm
);
687 mutex_unlock(&matrix_dev
->lock
);
691 static DEVICE_ATTR_WO(unassign_adapter
);
694 vfio_ap_mdev_verify_queues_reserved_for_apqi(struct ap_matrix_mdev
*matrix_mdev
,
699 unsigned long nbits
= matrix_mdev
->matrix
.apm_max
+ 1;
701 if (find_first_bit_inv(matrix_mdev
->matrix
.apm
, nbits
) >= nbits
)
702 return vfio_ap_verify_queue_reserved(NULL
, &apqi
);
704 for_each_set_bit_inv(apid
, matrix_mdev
->matrix
.apm
, nbits
) {
705 ret
= vfio_ap_verify_queue_reserved(&apid
, &apqi
);
714 * assign_domain_store
716 * @dev: the matrix device
717 * @attr: the mediated matrix device's assign_domain attribute
718 * @buf: a buffer containing the AP queue index (APQI) of the domain to
720 * @count: the number of bytes in @buf
722 * Parses the APQI from @buf and sets the corresponding bit in the mediated
723 * matrix device's AQM.
725 * Returns the number of bytes processed if the APQI is valid; otherwise returns
726 * one of the following errors:
729 * The APQI is not a valid number
732 * The APQI exceeds the maximum value configured for the system
735 * An APQN derived from the cross product of the APQI being assigned
736 * and the APIDs previously assigned is not bound to the vfio_ap device
737 * driver; or, if no APIDs have yet been assigned, the APQI is not
738 * contained in an APQN bound to the vfio_ap device driver.
741 * An APQN derived from the cross product of the APQI being assigned
742 * and the APIDs previously assigned is being used by another mediated
745 static ssize_t
assign_domain_store(struct device
*dev
,
746 struct device_attribute
*attr
,
747 const char *buf
, size_t count
)
751 struct mdev_device
*mdev
= mdev_from_dev(dev
);
752 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
753 unsigned long max_apqi
= matrix_mdev
->matrix
.aqm_max
;
755 /* If the guest is running, disallow assignment of domain */
756 if (matrix_mdev
->kvm
)
759 ret
= kstrtoul(buf
, 0, &apqi
);
765 mutex_lock(&matrix_dev
->lock
);
767 ret
= vfio_ap_mdev_verify_queues_reserved_for_apqi(matrix_mdev
, apqi
);
771 set_bit_inv(apqi
, matrix_mdev
->matrix
.aqm
);
773 ret
= vfio_ap_mdev_verify_no_sharing(matrix_mdev
);
781 clear_bit_inv(apqi
, matrix_mdev
->matrix
.aqm
);
783 mutex_unlock(&matrix_dev
->lock
);
787 static DEVICE_ATTR_WO(assign_domain
);
791 * unassign_domain_store
793 * @dev: the matrix device
794 * @attr: the mediated matrix device's unassign_domain attribute
795 * @buf: a buffer containing the AP queue index (APQI) of the domain to
797 * @count: the number of bytes in @buf
799 * Parses the APQI from @buf and clears the corresponding bit in the
800 * mediated matrix device's AQM.
802 * Returns the number of bytes processed if the APQI is valid; otherwise,
803 * returns one of the following errors:
804 * -EINVAL if the APQI is not a number
805 * -ENODEV if the APQI exceeds the maximum value configured for the system
807 static ssize_t
unassign_domain_store(struct device
*dev
,
808 struct device_attribute
*attr
,
809 const char *buf
, size_t count
)
813 struct mdev_device
*mdev
= mdev_from_dev(dev
);
814 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
816 /* If the guest is running, disallow un-assignment of domain */
817 if (matrix_mdev
->kvm
)
820 ret
= kstrtoul(buf
, 0, &apqi
);
824 if (apqi
> matrix_mdev
->matrix
.aqm_max
)
827 mutex_lock(&matrix_dev
->lock
);
828 clear_bit_inv((unsigned long)apqi
, matrix_mdev
->matrix
.aqm
);
829 mutex_unlock(&matrix_dev
->lock
);
833 static DEVICE_ATTR_WO(unassign_domain
);
836 * assign_control_domain_store
838 * @dev: the matrix device
839 * @attr: the mediated matrix device's assign_control_domain attribute
840 * @buf: a buffer containing the domain ID to be assigned
841 * @count: the number of bytes in @buf
843 * Parses the domain ID from @buf and sets the corresponding bit in the mediated
844 * matrix device's ADM.
846 * Returns the number of bytes processed if the domain ID is valid; otherwise,
847 * returns one of the following errors:
848 * -EINVAL if the ID is not a number
849 * -ENODEV if the ID exceeds the maximum value configured for the system
851 static ssize_t
assign_control_domain_store(struct device
*dev
,
852 struct device_attribute
*attr
,
853 const char *buf
, size_t count
)
857 struct mdev_device
*mdev
= mdev_from_dev(dev
);
858 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
860 /* If the guest is running, disallow assignment of control domain */
861 if (matrix_mdev
->kvm
)
864 ret
= kstrtoul(buf
, 0, &id
);
868 if (id
> matrix_mdev
->matrix
.adm_max
)
871 /* Set the bit in the ADM (bitmask) corresponding to the AP control
872 * domain number (id). The bits in the mask, from most significant to
873 * least significant, correspond to IDs 0 up to the one less than the
874 * number of control domains that can be assigned.
876 mutex_lock(&matrix_dev
->lock
);
877 set_bit_inv(id
, matrix_mdev
->matrix
.adm
);
878 mutex_unlock(&matrix_dev
->lock
);
882 static DEVICE_ATTR_WO(assign_control_domain
);
885 * unassign_control_domain_store
887 * @dev: the matrix device
888 * @attr: the mediated matrix device's unassign_control_domain attribute
889 * @buf: a buffer containing the domain ID to be unassigned
890 * @count: the number of bytes in @buf
892 * Parses the domain ID from @buf and clears the corresponding bit in the
893 * mediated matrix device's ADM.
895 * Returns the number of bytes processed if the domain ID is valid; otherwise,
896 * returns one of the following errors:
897 * -EINVAL if the ID is not a number
898 * -ENODEV if the ID exceeds the maximum value configured for the system
900 static ssize_t
unassign_control_domain_store(struct device
*dev
,
901 struct device_attribute
*attr
,
902 const char *buf
, size_t count
)
906 struct mdev_device
*mdev
= mdev_from_dev(dev
);
907 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
908 unsigned long max_domid
= matrix_mdev
->matrix
.adm_max
;
910 /* If the guest is running, disallow un-assignment of control domain */
911 if (matrix_mdev
->kvm
)
914 ret
= kstrtoul(buf
, 0, &domid
);
917 if (domid
> max_domid
)
920 mutex_lock(&matrix_dev
->lock
);
921 clear_bit_inv(domid
, matrix_mdev
->matrix
.adm
);
922 mutex_unlock(&matrix_dev
->lock
);
926 static DEVICE_ATTR_WO(unassign_control_domain
);
928 static ssize_t
control_domains_show(struct device
*dev
,
929 struct device_attribute
*dev_attr
,
936 struct mdev_device
*mdev
= mdev_from_dev(dev
);
937 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
938 unsigned long max_domid
= matrix_mdev
->matrix
.adm_max
;
940 mutex_lock(&matrix_dev
->lock
);
941 for_each_set_bit_inv(id
, matrix_mdev
->matrix
.adm
, max_domid
+ 1) {
942 n
= sprintf(bufpos
, "%04lx\n", id
);
946 mutex_unlock(&matrix_dev
->lock
);
950 static DEVICE_ATTR_RO(control_domains
);
952 static ssize_t
matrix_show(struct device
*dev
, struct device_attribute
*attr
,
955 struct mdev_device
*mdev
= mdev_from_dev(dev
);
956 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
962 unsigned long napm_bits
= matrix_mdev
->matrix
.apm_max
+ 1;
963 unsigned long naqm_bits
= matrix_mdev
->matrix
.aqm_max
+ 1;
967 apid1
= find_first_bit_inv(matrix_mdev
->matrix
.apm
, napm_bits
);
968 apqi1
= find_first_bit_inv(matrix_mdev
->matrix
.aqm
, naqm_bits
);
970 mutex_lock(&matrix_dev
->lock
);
972 if ((apid1
< napm_bits
) && (apqi1
< naqm_bits
)) {
973 for_each_set_bit_inv(apid
, matrix_mdev
->matrix
.apm
, napm_bits
) {
974 for_each_set_bit_inv(apqi
, matrix_mdev
->matrix
.aqm
,
976 n
= sprintf(bufpos
, "%02lx.%04lx\n", apid
,
982 } else if (apid1
< napm_bits
) {
983 for_each_set_bit_inv(apid
, matrix_mdev
->matrix
.apm
, napm_bits
) {
984 n
= sprintf(bufpos
, "%02lx.\n", apid
);
988 } else if (apqi1
< naqm_bits
) {
989 for_each_set_bit_inv(apqi
, matrix_mdev
->matrix
.aqm
, naqm_bits
) {
990 n
= sprintf(bufpos
, ".%04lx\n", apqi
);
996 mutex_unlock(&matrix_dev
->lock
);
1000 static DEVICE_ATTR_RO(matrix
);
1002 static struct attribute
*vfio_ap_mdev_attrs
[] = {
1003 &dev_attr_assign_adapter
.attr
,
1004 &dev_attr_unassign_adapter
.attr
,
1005 &dev_attr_assign_domain
.attr
,
1006 &dev_attr_unassign_domain
.attr
,
1007 &dev_attr_assign_control_domain
.attr
,
1008 &dev_attr_unassign_control_domain
.attr
,
1009 &dev_attr_control_domains
.attr
,
1010 &dev_attr_matrix
.attr
,
1014 static struct attribute_group vfio_ap_mdev_attr_group
= {
1015 .attrs
= vfio_ap_mdev_attrs
1018 static const struct attribute_group
*vfio_ap_mdev_attr_groups
[] = {
1019 &vfio_ap_mdev_attr_group
,
1024 * vfio_ap_mdev_set_kvm
1026 * @matrix_mdev: a mediated matrix device
1027 * @kvm: reference to KVM instance
1029 * Verifies no other mediated matrix device has @kvm and sets a reference to
1030 * it in @matrix_mdev->kvm.
1032 * Return 0 if no other mediated matrix device has a reference to @kvm;
1033 * otherwise, returns an -EPERM.
1035 static int vfio_ap_mdev_set_kvm(struct ap_matrix_mdev
*matrix_mdev
,
1038 struct ap_matrix_mdev
*m
;
1040 mutex_lock(&matrix_dev
->lock
);
1042 list_for_each_entry(m
, &matrix_dev
->mdev_list
, node
) {
1043 if ((m
!= matrix_mdev
) && (m
->kvm
== kvm
)) {
1044 mutex_unlock(&matrix_dev
->lock
);
1049 matrix_mdev
->kvm
= kvm
;
1051 kvm
->arch
.crypto
.pqap_hook
= &matrix_mdev
->pqap_hook
;
1052 mutex_unlock(&matrix_dev
->lock
);
1058 * vfio_ap_mdev_iommu_notifier: IOMMU notifier callback
1060 * @nb: The notifier block
1061 * @action: Action to be taken
1062 * @data: data associated with the request
1064 * For an UNMAP request, unpin the guest IOVA (the NIB guest address we
1065 * pinned before). Other requests are ignored.
1068 static int vfio_ap_mdev_iommu_notifier(struct notifier_block
*nb
,
1069 unsigned long action
, void *data
)
1071 struct ap_matrix_mdev
*matrix_mdev
;
1073 matrix_mdev
= container_of(nb
, struct ap_matrix_mdev
, iommu_notifier
);
1075 if (action
== VFIO_IOMMU_NOTIFY_DMA_UNMAP
) {
1076 struct vfio_iommu_type1_dma_unmap
*unmap
= data
;
1077 unsigned long g_pfn
= unmap
->iova
>> PAGE_SHIFT
;
1079 vfio_unpin_pages(mdev_dev(matrix_mdev
->mdev
), &g_pfn
, 1);
1086 static int vfio_ap_mdev_group_notifier(struct notifier_block
*nb
,
1087 unsigned long action
, void *data
)
1090 struct ap_matrix_mdev
*matrix_mdev
;
1092 if (action
!= VFIO_GROUP_NOTIFY_SET_KVM
)
1095 matrix_mdev
= container_of(nb
, struct ap_matrix_mdev
, group_notifier
);
1098 matrix_mdev
->kvm
= NULL
;
1102 ret
= vfio_ap_mdev_set_kvm(matrix_mdev
, data
);
1106 /* If there is no CRYCB pointer, then we can't copy the masks */
1107 if (!matrix_mdev
->kvm
->arch
.crypto
.crycbd
)
1110 kvm_arch_crypto_set_masks(matrix_mdev
->kvm
, matrix_mdev
->matrix
.apm
,
1111 matrix_mdev
->matrix
.aqm
,
1112 matrix_mdev
->matrix
.adm
);
1117 static void vfio_ap_irq_disable_apqn(int apqn
)
1120 struct vfio_ap_queue
*q
;
1122 dev
= driver_find_device(&matrix_dev
->vfio_ap_drv
->driver
, NULL
,
1125 q
= dev_get_drvdata(dev
);
1126 vfio_ap_irq_disable(q
);
1131 int vfio_ap_mdev_reset_queue(unsigned int apid
, unsigned int apqi
,
1134 struct ap_queue_status status
;
1136 int apqn
= AP_MKQID(apid
, apqi
);
1139 status
= ap_zapq(apqn
);
1140 switch (status
.response_code
) {
1141 case AP_RESPONSE_NORMAL
:
1142 while (!status
.queue_empty
&& retry2
--) {
1144 status
= ap_tapq(apqn
, NULL
);
1146 WARN_ON_ONCE(retry2
<= 0);
1148 case AP_RESPONSE_RESET_IN_PROGRESS
:
1149 case AP_RESPONSE_BUSY
:
1153 /* things are really broken, give up */
1161 static int vfio_ap_mdev_reset_queues(struct mdev_device
*mdev
)
1165 unsigned long apid
, apqi
;
1166 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
1168 for_each_set_bit_inv(apid
, matrix_mdev
->matrix
.apm
,
1169 matrix_mdev
->matrix
.apm_max
+ 1) {
1170 for_each_set_bit_inv(apqi
, matrix_mdev
->matrix
.aqm
,
1171 matrix_mdev
->matrix
.aqm_max
+ 1) {
1172 ret
= vfio_ap_mdev_reset_queue(apid
, apqi
, 1);
1174 * Regardless whether a queue turns out to be busy, or
1175 * is not operational, we need to continue resetting
1176 * the remaining queues.
1180 vfio_ap_irq_disable_apqn(AP_MKQID(apid
, apqi
));
1187 static int vfio_ap_mdev_open(struct mdev_device
*mdev
)
1189 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
1190 unsigned long events
;
1194 if (!try_module_get(THIS_MODULE
))
1197 matrix_mdev
->group_notifier
.notifier_call
= vfio_ap_mdev_group_notifier
;
1198 events
= VFIO_GROUP_NOTIFY_SET_KVM
;
1200 ret
= vfio_register_notifier(mdev_dev(mdev
), VFIO_GROUP_NOTIFY
,
1201 &events
, &matrix_mdev
->group_notifier
);
1203 module_put(THIS_MODULE
);
1207 matrix_mdev
->iommu_notifier
.notifier_call
= vfio_ap_mdev_iommu_notifier
;
1208 events
= VFIO_IOMMU_NOTIFY_DMA_UNMAP
;
1209 ret
= vfio_register_notifier(mdev_dev(mdev
), VFIO_IOMMU_NOTIFY
,
1210 &events
, &matrix_mdev
->iommu_notifier
);
1214 vfio_unregister_notifier(mdev_dev(mdev
), VFIO_GROUP_NOTIFY
,
1215 &matrix_mdev
->group_notifier
);
1216 module_put(THIS_MODULE
);
1220 static void vfio_ap_mdev_release(struct mdev_device
*mdev
)
1222 struct ap_matrix_mdev
*matrix_mdev
= mdev_get_drvdata(mdev
);
1224 mutex_lock(&matrix_dev
->lock
);
1225 if (matrix_mdev
->kvm
) {
1226 kvm_arch_crypto_clear_masks(matrix_mdev
->kvm
);
1227 matrix_mdev
->kvm
->arch
.crypto
.pqap_hook
= NULL
;
1228 vfio_ap_mdev_reset_queues(mdev
);
1229 kvm_put_kvm(matrix_mdev
->kvm
);
1230 matrix_mdev
->kvm
= NULL
;
1232 mutex_unlock(&matrix_dev
->lock
);
1234 vfio_unregister_notifier(mdev_dev(mdev
), VFIO_IOMMU_NOTIFY
,
1235 &matrix_mdev
->iommu_notifier
);
1236 vfio_unregister_notifier(mdev_dev(mdev
), VFIO_GROUP_NOTIFY
,
1237 &matrix_mdev
->group_notifier
);
1238 module_put(THIS_MODULE
);
1241 static int vfio_ap_mdev_get_device_info(unsigned long arg
)
1243 unsigned long minsz
;
1244 struct vfio_device_info info
;
1246 minsz
= offsetofend(struct vfio_device_info
, num_irqs
);
1248 if (copy_from_user(&info
, (void __user
*)arg
, minsz
))
1251 if (info
.argsz
< minsz
)
1254 info
.flags
= VFIO_DEVICE_FLAGS_AP
| VFIO_DEVICE_FLAGS_RESET
;
1255 info
.num_regions
= 0;
1258 return copy_to_user((void __user
*)arg
, &info
, minsz
);
1261 static ssize_t
vfio_ap_mdev_ioctl(struct mdev_device
*mdev
,
1262 unsigned int cmd
, unsigned long arg
)
1266 mutex_lock(&matrix_dev
->lock
);
1268 case VFIO_DEVICE_GET_INFO
:
1269 ret
= vfio_ap_mdev_get_device_info(arg
);
1271 case VFIO_DEVICE_RESET
:
1272 ret
= vfio_ap_mdev_reset_queues(mdev
);
1278 mutex_unlock(&matrix_dev
->lock
);
1283 static const struct mdev_parent_ops vfio_ap_matrix_ops
= {
1284 .owner
= THIS_MODULE
,
1285 .supported_type_groups
= vfio_ap_mdev_type_groups
,
1286 .mdev_attr_groups
= vfio_ap_mdev_attr_groups
,
1287 .create
= vfio_ap_mdev_create
,
1288 .remove
= vfio_ap_mdev_remove
,
1289 .open
= vfio_ap_mdev_open
,
1290 .release
= vfio_ap_mdev_release
,
1291 .ioctl
= vfio_ap_mdev_ioctl
,
1294 int vfio_ap_mdev_register(void)
1296 atomic_set(&matrix_dev
->available_instances
, MAX_ZDEV_ENTRIES_EXT
);
1298 return mdev_register_device(&matrix_dev
->device
, &vfio_ap_matrix_ops
);
1301 void vfio_ap_mdev_unregister(void)
1303 mdev_unregister_device(&matrix_dev
->device
);