License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 14:07:57 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2017-03-17 03:17:32 +00:00
|
|
|
/*
|
|
|
|
* channel program interfaces
|
|
|
|
*
|
|
|
|
* Copyright IBM Corp. 2017
|
|
|
|
*
|
|
|
|
* Author(s): Dong Jia Shi <bjsdjshi@linux.vnet.ibm.com>
|
|
|
|
* Xiao Feng Ren <renxiaof@linux.vnet.ibm.com>
|
|
|
|
*/
|
|
|
|
|
2020-05-06 21:24:40 +00:00
|
|
|
#include <linux/ratelimit.h>
|
2017-03-17 03:17:32 +00:00
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/iommu.h>
|
|
|
|
#include <linux/vfio.h>
|
|
|
|
#include <asm/idals.h>
|
|
|
|
|
|
|
|
#include "vfio_ccw_cp.h"
|
2022-05-11 19:12:59 +00:00
|
|
|
#include "vfio_ccw_private.h"
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
struct page_array {
|
|
|
|
/* Array that stores pages need to pin. */
|
|
|
|
dma_addr_t *pa_iova;
|
2018-05-23 02:56:42 +00:00
|
|
|
/* Array that receives PFNs of the pages pinned. */
|
2017-03-17 03:17:32 +00:00
|
|
|
unsigned long *pa_pfn;
|
2018-05-23 02:56:43 +00:00
|
|
|
/* Number of pages pinned from @pa_iova. */
|
2017-03-17 03:17:32 +00:00
|
|
|
int pa_nr;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ccwchain {
|
|
|
|
struct list_head next;
|
|
|
|
struct ccw1 *ch_ccw;
|
|
|
|
/* Guest physical address of the current chain. */
|
|
|
|
u64 ch_iova;
|
|
|
|
/* Count of the valid ccws in chain. */
|
|
|
|
int ch_len;
|
|
|
|
/* Pinned PAGEs for the original data. */
|
2022-07-23 02:02:53 +00:00
|
|
|
struct page_array *ch_pa;
|
2017-03-17 03:17:32 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
2022-07-23 02:02:53 +00:00
|
|
|
* page_array_alloc() - alloc memory for page array
|
|
|
|
* @pa: page_array on which to perform the operation
|
2018-05-23 02:56:43 +00:00
|
|
|
* @iova: target guest physical address
|
|
|
|
* @len: number of bytes that should be pinned from @iova
|
2017-03-17 03:17:32 +00:00
|
|
|
*
|
2022-07-23 02:02:53 +00:00
|
|
|
* Attempt to allocate memory for page array.
|
2017-03-17 03:17:32 +00:00
|
|
|
*
|
2022-07-23 02:02:53 +00:00
|
|
|
* Usage of page_array:
|
|
|
|
* We expect (pa_nr == 0) and (pa_iova == NULL), any field in
|
2018-05-23 02:56:43 +00:00
|
|
|
* this structure will be filled in by this function.
|
2017-03-17 03:17:32 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
2022-07-23 02:02:53 +00:00
|
|
|
* 0 if page array is allocated
|
|
|
|
* -EINVAL if pa->pa_nr is not initially zero, or pa->pa_iova is not NULL
|
2019-05-14 23:42:44 +00:00
|
|
|
* -ENOMEM if alloc failed
|
2017-03-17 03:17:32 +00:00
|
|
|
*/
|
2022-07-23 02:02:53 +00:00
|
|
|
static int page_array_alloc(struct page_array *pa, u64 iova, unsigned int len)
|
2017-03-17 03:17:32 +00:00
|
|
|
{
|
2019-05-14 23:42:44 +00:00
|
|
|
int i;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
if (pa->pa_nr || pa->pa_iova)
|
2017-03-17 03:17:32 +00:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
pa->pa_nr = ((iova & ~PAGE_MASK) + len + (PAGE_SIZE - 1)) >> PAGE_SHIFT;
|
|
|
|
if (!pa->pa_nr)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
pa->pa_iova = kcalloc(pa->pa_nr,
|
|
|
|
sizeof(*pa->pa_iova) + sizeof(*pa->pa_pfn),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (unlikely(!pa->pa_iova)) {
|
2019-07-11 14:28:53 +00:00
|
|
|
pa->pa_nr = 0;
|
2017-03-17 03:17:32 +00:00
|
|
|
return -ENOMEM;
|
2019-07-11 14:28:53 +00:00
|
|
|
}
|
2022-07-23 02:02:53 +00:00
|
|
|
pa->pa_pfn = (unsigned long *)&pa->pa_iova[pa->pa_nr];
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
pa->pa_iova[0] = iova;
|
2019-05-14 23:42:45 +00:00
|
|
|
pa->pa_pfn[0] = -1ULL;
|
|
|
|
for (i = 1; i < pa->pa_nr; i++) {
|
2022-07-23 02:02:53 +00:00
|
|
|
pa->pa_iova[i] = pa->pa_iova[i - 1] + PAGE_SIZE;
|
2019-05-14 23:42:45 +00:00
|
|
|
pa->pa_pfn[i] = -1ULL;
|
|
|
|
}
|
2018-05-23 02:56:43 +00:00
|
|
|
|
2019-05-14 23:42:44 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-07-23 02:02:50 +00:00
|
|
|
/*
|
2022-07-23 02:02:53 +00:00
|
|
|
* page_array_unpin() - Unpin user pages in memory
|
|
|
|
* @pa: page_array on which to perform the operation
|
2022-07-23 02:02:50 +00:00
|
|
|
* @vdev: the vfio device to perform the operation
|
|
|
|
* @pa_nr: number of user pages to unpin
|
|
|
|
*
|
|
|
|
* Only unpin if any pages were pinned to begin with, i.e. pa_nr > 0,
|
|
|
|
* otherwise only clear pa->pa_nr
|
|
|
|
*/
|
2022-07-23 02:02:53 +00:00
|
|
|
static void page_array_unpin(struct page_array *pa,
|
|
|
|
struct vfio_device *vdev, int pa_nr)
|
2022-07-23 02:02:50 +00:00
|
|
|
{
|
|
|
|
int unpinned = 0, npage = 1;
|
|
|
|
|
|
|
|
while (unpinned < pa_nr) {
|
2022-07-23 02:02:53 +00:00
|
|
|
dma_addr_t *first = &pa->pa_iova[unpinned];
|
|
|
|
dma_addr_t *last = &first[npage];
|
2022-07-23 02:02:50 +00:00
|
|
|
|
|
|
|
if (unpinned + npage < pa_nr &&
|
2022-07-23 02:02:53 +00:00
|
|
|
*first + npage * PAGE_SIZE == *last) {
|
2022-07-23 02:02:50 +00:00
|
|
|
npage++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
vfio_unpin_pages(vdev, *first, npage);
|
2022-07-23 02:02:50 +00:00
|
|
|
unpinned += npage;
|
|
|
|
npage = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pa->pa_nr = 0;
|
|
|
|
}
|
|
|
|
|
2019-05-14 23:42:44 +00:00
|
|
|
/*
|
2022-07-23 02:02:53 +00:00
|
|
|
* page_array_pin() - Pin user pages in memory
|
|
|
|
* @pa: page_array on which to perform the operation
|
2019-05-14 23:42:44 +00:00
|
|
|
* @mdev: the mediated device to perform pin operations
|
|
|
|
*
|
|
|
|
* Returns number of pages pinned upon success.
|
|
|
|
* If the pin request partially succeeds, or fails completely,
|
|
|
|
* all pages are left unpinned and a negative error value is returned.
|
|
|
|
*/
|
2022-07-23 02:02:53 +00:00
|
|
|
static int page_array_pin(struct page_array *pa, struct vfio_device *vdev)
|
2019-05-14 23:42:44 +00:00
|
|
|
{
|
2022-07-23 02:02:50 +00:00
|
|
|
int pinned = 0, npage = 1;
|
2019-05-14 23:42:44 +00:00
|
|
|
int ret = 0;
|
|
|
|
|
2022-07-23 02:02:50 +00:00
|
|
|
while (pinned < pa->pa_nr) {
|
2022-07-23 02:02:53 +00:00
|
|
|
dma_addr_t *first = &pa->pa_iova[pinned];
|
|
|
|
dma_addr_t *last = &first[npage];
|
2022-07-23 02:02:50 +00:00
|
|
|
|
|
|
|
if (pinned + npage < pa->pa_nr &&
|
2022-07-23 02:02:53 +00:00
|
|
|
*first + npage * PAGE_SIZE == *last) {
|
2022-07-23 02:02:50 +00:00
|
|
|
npage++;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
ret = vfio_pin_pages(vdev, *first, npage,
|
2022-07-23 02:02:50 +00:00
|
|
|
IOMMU_READ | IOMMU_WRITE,
|
|
|
|
&pa->pa_pfn[pinned]);
|
|
|
|
if (ret < 0) {
|
|
|
|
goto err_out;
|
|
|
|
} else if (ret > 0 && ret != npage) {
|
|
|
|
pinned += ret;
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err_out;
|
|
|
|
}
|
|
|
|
pinned += npage;
|
|
|
|
npage = 1;
|
2018-05-23 02:56:43 +00:00
|
|
|
}
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2018-05-23 02:56:43 +00:00
|
|
|
return ret;
|
|
|
|
|
|
|
|
err_out:
|
2022-07-23 02:02:53 +00:00
|
|
|
page_array_unpin(pa, vdev, pinned);
|
2017-03-17 03:17:32 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2018-05-23 02:56:43 +00:00
|
|
|
/* Unpin the pages before releasing the memory. */
|
2022-07-23 02:02:53 +00:00
|
|
|
static void page_array_unpin_free(struct page_array *pa, struct vfio_device *vdev)
|
2018-05-23 02:56:43 +00:00
|
|
|
{
|
2022-07-23 02:02:53 +00:00
|
|
|
page_array_unpin(pa, vdev, pa->pa_nr);
|
|
|
|
kfree(pa->pa_iova);
|
2018-05-23 02:56:43 +00:00
|
|
|
}
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
static bool page_array_iova_pinned(struct page_array *pa, unsigned long iova)
|
2017-03-17 03:17:32 +00:00
|
|
|
{
|
2019-06-06 20:28:29 +00:00
|
|
|
int i;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2019-06-06 20:28:29 +00:00
|
|
|
for (i = 0; i < pa->pa_nr; i++)
|
2022-07-23 02:02:53 +00:00
|
|
|
if (pa->pa_iova[i] == iova)
|
2019-06-06 20:28:29 +00:00
|
|
|
return true;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2022-07-23 02:02:53 +00:00
|
|
|
/* Create the list of IDAL words for a page_array. */
|
|
|
|
static inline void page_array_idal_create_words(struct page_array *pa,
|
|
|
|
unsigned long *idaws)
|
2017-03-17 03:17:32 +00:00
|
|
|
{
|
2019-06-06 20:28:29 +00:00
|
|
|
int i;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Idal words (execept the first one) rely on the memory being 4k
|
|
|
|
* aligned. If a user virtual address is 4K aligned, then it's
|
|
|
|
* corresponding kernel physical address will also be 4K aligned. Thus
|
|
|
|
* there will be no problem here to simply use the phys to create an
|
|
|
|
* idaw.
|
|
|
|
*/
|
2019-06-06 20:28:29 +00:00
|
|
|
|
|
|
|
for (i = 0; i < pa->pa_nr; i++)
|
|
|
|
idaws[i] = pa->pa_pfn[i] << PAGE_SHIFT;
|
2019-06-06 20:28:28 +00:00
|
|
|
|
|
|
|
/* Adjust the first IDAW, since it may not start on a page boundary */
|
2022-07-23 02:02:53 +00:00
|
|
|
idaws[0] += pa->pa_iova[0] & (PAGE_SIZE - 1);
|
2017-03-17 03:17:32 +00:00
|
|
|
}
|
|
|
|
|
2019-06-24 09:07:21 +00:00
|
|
|
static void convert_ccw0_to_ccw1(struct ccw1 *source, unsigned long len)
|
2019-06-18 20:23:51 +00:00
|
|
|
{
|
|
|
|
struct ccw0 ccw0;
|
|
|
|
struct ccw1 *pccw1 = source;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
ccw0 = *(struct ccw0 *)pccw1;
|
|
|
|
if ((pccw1->cmd_code & 0x0f) == CCW_CMD_TIC) {
|
|
|
|
pccw1->cmd_code = CCW_CMD_TIC;
|
|
|
|
pccw1->flags = 0;
|
|
|
|
pccw1->count = 0;
|
|
|
|
} else {
|
|
|
|
pccw1->cmd_code = ccw0.cmd_code;
|
|
|
|
pccw1->flags = ccw0.flags;
|
|
|
|
pccw1->count = ccw0.count;
|
|
|
|
}
|
|
|
|
pccw1->cda = ccw0.cda;
|
|
|
|
pccw1++;
|
|
|
|
}
|
|
|
|
}
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Within the domain (@mdev), copy @n bytes from a guest physical
|
|
|
|
* address (@iova) to a host physical address (@to).
|
|
|
|
*/
|
2022-05-11 19:12:59 +00:00
|
|
|
static long copy_from_iova(struct vfio_device *vdev, void *to, u64 iova,
|
2017-03-17 03:17:32 +00:00
|
|
|
unsigned long n)
|
|
|
|
{
|
2022-07-23 02:02:53 +00:00
|
|
|
struct page_array pa = {0};
|
2017-03-17 03:17:32 +00:00
|
|
|
u64 from;
|
|
|
|
int i, ret;
|
|
|
|
unsigned long l, m;
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
ret = page_array_alloc(&pa, iova, n);
|
2019-05-14 23:42:44 +00:00
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
ret = page_array_pin(&pa, vdev);
|
2019-05-14 23:42:44 +00:00
|
|
|
if (ret < 0) {
|
2022-07-23 02:02:53 +00:00
|
|
|
page_array_unpin_free(&pa, vdev);
|
2017-03-17 03:17:32 +00:00
|
|
|
return ret;
|
2019-05-14 23:42:44 +00:00
|
|
|
}
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
l = n;
|
|
|
|
for (i = 0; i < pa.pa_nr; i++) {
|
|
|
|
from = pa.pa_pfn[i] << PAGE_SHIFT;
|
|
|
|
m = PAGE_SIZE;
|
|
|
|
if (i == 0) {
|
|
|
|
from += iova & (PAGE_SIZE - 1);
|
|
|
|
m -= iova & (PAGE_SIZE - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
m = min(l, m);
|
|
|
|
memcpy(to + (n - l), (void *)from, m);
|
|
|
|
|
|
|
|
l -= m;
|
|
|
|
if (l == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
page_array_unpin_free(&pa, vdev);
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
return l;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Helpers to operate ccwchain.
|
|
|
|
*/
|
s390/cio: Don't pin vfio pages for empty transfers
The skip flag of a CCW offers the possibility of data not being
transferred, but is only meaningful for certain commands.
Specifically, it is only applicable for a read, read backward, sense,
or sense ID CCW and will be ignored for any other command code
(SA22-7832-11 page 15-64, and figure 15-30 on page 15-75).
(A sense ID is xE4, while a sense is x04 with possible modifiers in the
upper four bits. So we will cover the whole "family" of sense CCWs.)
For those scenarios, since there is no requirement for the target
address to be valid, we should skip the call to vfio_pin_pages() and
rely on the IDAL address we have allocated/built for the channel
program. The fact that the individual IDAWs within the IDAL are
invalid is fine, since they aren't actually checked in these cases.
Set pa_nr to zero when skipping the pfn_array_pin() call, since it is
defined as the number of pages pinned and is used to determine
whether to call vfio_unpin_pages() upon cleanup.
The pfn_array_pin() routine returns the number of pages that were
pinned, but now might be skipped for some CCWs. Thus we need to
calculate the expected number of pages ourselves such that we are
guaranteed to allocate a reasonable number of IDAWs, which will
provide a valid address in CCW.CDA regardless of whether the IDAWs
are filled in with pinned/translated addresses or not.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-2-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:01 +00:00
|
|
|
#define ccw_is_read(_ccw) (((_ccw)->cmd_code & 0x03) == 0x02)
|
|
|
|
#define ccw_is_read_backward(_ccw) (((_ccw)->cmd_code & 0x0F) == 0x0C)
|
|
|
|
#define ccw_is_sense(_ccw) (((_ccw)->cmd_code & 0x0F) == CCW_CMD_BASIC_SENSE)
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
#define ccw_is_noop(_ccw) ((_ccw)->cmd_code == CCW_CMD_NOOP)
|
|
|
|
|
|
|
|
#define ccw_is_tic(_ccw) ((_ccw)->cmd_code == CCW_CMD_TIC)
|
|
|
|
|
|
|
|
#define ccw_is_idal(_ccw) ((_ccw)->flags & CCW_FLAG_IDA)
|
s390/cio: Don't pin vfio pages for empty transfers
The skip flag of a CCW offers the possibility of data not being
transferred, but is only meaningful for certain commands.
Specifically, it is only applicable for a read, read backward, sense,
or sense ID CCW and will be ignored for any other command code
(SA22-7832-11 page 15-64, and figure 15-30 on page 15-75).
(A sense ID is xE4, while a sense is x04 with possible modifiers in the
upper four bits. So we will cover the whole "family" of sense CCWs.)
For those scenarios, since there is no requirement for the target
address to be valid, we should skip the call to vfio_pin_pages() and
rely on the IDAL address we have allocated/built for the channel
program. The fact that the individual IDAWs within the IDAL are
invalid is fine, since they aren't actually checked in these cases.
Set pa_nr to zero when skipping the pfn_array_pin() call, since it is
defined as the number of pages pinned and is used to determine
whether to call vfio_unpin_pages() upon cleanup.
The pfn_array_pin() routine returns the number of pages that were
pinned, but now might be skipped for some CCWs. Thus we need to
calculate the expected number of pages ourselves such that we are
guaranteed to allocate a reasonable number of IDAWs, which will
provide a valid address in CCW.CDA regardless of whether the IDAWs
are filled in with pinned/translated addresses or not.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-2-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:01 +00:00
|
|
|
#define ccw_is_skip(_ccw) ((_ccw)->flags & CCW_FLAG_SKIP)
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
#define ccw_is_chain(_ccw) ((_ccw)->flags & (CCW_FLAG_CC | CCW_FLAG_DC))
|
|
|
|
|
s390/cio: Don't pin vfio pages for empty transfers
The skip flag of a CCW offers the possibility of data not being
transferred, but is only meaningful for certain commands.
Specifically, it is only applicable for a read, read backward, sense,
or sense ID CCW and will be ignored for any other command code
(SA22-7832-11 page 15-64, and figure 15-30 on page 15-75).
(A sense ID is xE4, while a sense is x04 with possible modifiers in the
upper four bits. So we will cover the whole "family" of sense CCWs.)
For those scenarios, since there is no requirement for the target
address to be valid, we should skip the call to vfio_pin_pages() and
rely on the IDAL address we have allocated/built for the channel
program. The fact that the individual IDAWs within the IDAL are
invalid is fine, since they aren't actually checked in these cases.
Set pa_nr to zero when skipping the pfn_array_pin() call, since it is
defined as the number of pages pinned and is used to determine
whether to call vfio_unpin_pages() upon cleanup.
The pfn_array_pin() routine returns the number of pages that were
pinned, but now might be skipped for some CCWs. Thus we need to
calculate the expected number of pages ourselves such that we are
guaranteed to allocate a reasonable number of IDAWs, which will
provide a valid address in CCW.CDA regardless of whether the IDAWs
are filled in with pinned/translated addresses or not.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-2-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:01 +00:00
|
|
|
/*
|
|
|
|
* ccw_does_data_transfer()
|
|
|
|
*
|
|
|
|
* Determine whether a CCW will move any data, such that the guest pages
|
|
|
|
* would need to be pinned before performing the I/O.
|
|
|
|
*
|
|
|
|
* Returns 1 if yes, 0 if no.
|
|
|
|
*/
|
|
|
|
static inline int ccw_does_data_transfer(struct ccw1 *ccw)
|
|
|
|
{
|
s390/cio: Allow zero-length CCWs in vfio-ccw
It is possible that a guest might issue a CCW with a length of zero,
and will expect a particular response. Consider this chain:
Address Format-1 CCW
-------- -----------------
0 33110EC0 346022CC 33177468
1 33110EC8 CF200000 3318300C
CCW[0] moves a little more than two pages, but also has the
Suppress Length Indication (SLI) bit set to handle the expectation
that considerably less data will be moved. CCW[1] also has the SLI
bit set, and has a length of zero. Once vfio-ccw does its magic,
the kernel issues a start subchannel on behalf of the guest with this:
Address Format-1 CCW
-------- -----------------
0 021EDED0 346422CC 021F0000
1 021EDED8 CF240000 3318300C
Both CCWs were converted to an IDAL and have the corresponding flags
set (which is by design), but only the address of the first data
address is converted to something the host is aware of. The second
CCW still has the address used by the guest, which happens to be (A)
(probably) an invalid address for the host, and (B) an invalid IDAW
address (doubleword boundary, etc.).
While the I/O fails, it doesn't fail correctly. In this example, we
would receive a program check for an invalid IDAW address, instead of
a unit check for an invalid command.
To fix this, revert commit 4cebc5d6a6ff ("vfio: ccw: validate the
count field of a ccw before pinning") and allow the individual fetch
routines to process them like anything else. We'll make a slight
adjustment to our allocation of the pfn_array (for direct CCWs) or
IDAL (for IDAL CCWs) memory, so that we have room for at least one
address even though no guest memory will be pinned and thus the
IDAW will not be populated with a host address.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-3-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:02 +00:00
|
|
|
/* If the count field is zero, then no data will be transferred */
|
|
|
|
if (ccw->count == 0)
|
|
|
|
return 0;
|
|
|
|
|
2019-05-16 16:14:03 +00:00
|
|
|
/* If the command is a NOP, then no data will be transferred */
|
|
|
|
if (ccw_is_noop(ccw))
|
|
|
|
return 0;
|
|
|
|
|
s390/cio: Don't pin vfio pages for empty transfers
The skip flag of a CCW offers the possibility of data not being
transferred, but is only meaningful for certain commands.
Specifically, it is only applicable for a read, read backward, sense,
or sense ID CCW and will be ignored for any other command code
(SA22-7832-11 page 15-64, and figure 15-30 on page 15-75).
(A sense ID is xE4, while a sense is x04 with possible modifiers in the
upper four bits. So we will cover the whole "family" of sense CCWs.)
For those scenarios, since there is no requirement for the target
address to be valid, we should skip the call to vfio_pin_pages() and
rely on the IDAL address we have allocated/built for the channel
program. The fact that the individual IDAWs within the IDAL are
invalid is fine, since they aren't actually checked in these cases.
Set pa_nr to zero when skipping the pfn_array_pin() call, since it is
defined as the number of pages pinned and is used to determine
whether to call vfio_unpin_pages() upon cleanup.
The pfn_array_pin() routine returns the number of pages that were
pinned, but now might be skipped for some CCWs. Thus we need to
calculate the expected number of pages ourselves such that we are
guaranteed to allocate a reasonable number of IDAWs, which will
provide a valid address in CCW.CDA regardless of whether the IDAWs
are filled in with pinned/translated addresses or not.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-2-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:01 +00:00
|
|
|
/* If the skip flag is off, then data will be transferred */
|
|
|
|
if (!ccw_is_skip(ccw))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the skip flag is on, it is only meaningful if the command
|
|
|
|
* code is a read, read backward, sense, or sense ID. In those
|
|
|
|
* cases, no data will be transferred.
|
|
|
|
*/
|
|
|
|
if (ccw_is_read(ccw) || ccw_is_read_backward(ccw))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (ccw_is_sense(ccw))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* The skip flag is on, but it is ignored for this command code. */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
s390/cio: Fix vfio-ccw handling of recursive TICs
The routine ccwchain_calc_length() is tasked with looking at a
channel program, seeing how many CCWs are chained together by
the presence of the Chain-Command flag, and returning a count
to the caller.
Previously, it also considered a Transfer-in-Channel CCW as being
an appropriate mechanism for chaining. The problem at the time
was that the TIC CCW will almost certainly not go to the next CCW
in memory (because the CC flag would be sufficient), and so
advancing to the next 8 bytes will cause us to read potentially
invalid memory. So that comparison was removed, and the target
of the TIC is processed as a new chain.
This is fine when a TIC goes to a new chain (consider a NOP+TIC to
a channel program that is being redriven), but there is another
scenario where this falls apart. A TIC can be used to "rewind"
a channel program, for example to find a particular record on a
disk with various orientation CCWs. In this case, we DO want to
consider the memory after the TIC since the TIC will be skipped
once the requested criteria is met. This is due to the Status
Modifier presented by the device, though software doesn't need to
operate on it beyond understanding the behavior change of how the
channel program is executed.
So to handle this, we will re-introduce the check for a TIC CCW
but limit it by examining the target of the TIC. If the TIC
doesn't go back into the current chain, then current behavior
applies; we should stop counting CCWs and let the target of the
TIC be handled as a new chain. But, if the TIC DOES go back into
the current chain, then we need to keep looking at the memory after
the TIC for when the channel breaks out of the TIC loop. We can't
use tic_target_chain_exists() because the chain in question hasn't
been built yet, so we will redefine that comparison with some small
functions to make it more readable and to permit refactoring later.
Fixes: 405d566f98ae ("vfio-ccw: Don't assume there are more ccws after a TIC")
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190222183941.29596-2-farman@linux.ibm.com>
Reviewed-by: Halil Pasic <pasic@linux.ibm.com>
Reviewed-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-02-22 18:39:40 +00:00
|
|
|
/*
|
|
|
|
* is_cpa_within_range()
|
|
|
|
*
|
|
|
|
* @cpa: channel program address being questioned
|
|
|
|
* @head: address of the beginning of a CCW chain
|
|
|
|
* @len: number of CCWs within the chain
|
|
|
|
*
|
|
|
|
* Determine whether the address of a CCW (whether a new chain,
|
|
|
|
* or the target of a TIC) falls within a range (including the end points).
|
|
|
|
*
|
|
|
|
* Returns 1 if yes, 0 if no.
|
|
|
|
*/
|
|
|
|
static inline int is_cpa_within_range(u32 cpa, u32 head, int len)
|
|
|
|
{
|
|
|
|
u32 tail = head + (len - 1) * sizeof(struct ccw1);
|
|
|
|
|
|
|
|
return (head <= cpa && cpa <= tail);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int is_tic_within_range(struct ccw1 *ccw, u32 head, int len)
|
|
|
|
{
|
|
|
|
if (!ccw_is_tic(ccw))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return is_cpa_within_range(ccw->cda, head, len);
|
|
|
|
}
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
static struct ccwchain *ccwchain_alloc(struct channel_program *cp, int len)
|
|
|
|
{
|
|
|
|
struct ccwchain *chain;
|
|
|
|
void *data;
|
|
|
|
size_t size;
|
|
|
|
|
|
|
|
/* Make ccw address aligned to 8. */
|
|
|
|
size = ((sizeof(*chain) + 7L) & -8L) +
|
|
|
|
sizeof(*chain->ch_ccw) * len +
|
2019-06-06 20:28:29 +00:00
|
|
|
sizeof(*chain->ch_pa) * len;
|
2017-03-17 03:17:32 +00:00
|
|
|
chain = kzalloc(size, GFP_DMA | GFP_KERNEL);
|
|
|
|
if (!chain)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
data = (u8 *)chain + ((sizeof(*chain) + 7L) & -8L);
|
|
|
|
chain->ch_ccw = (struct ccw1 *)data;
|
|
|
|
|
|
|
|
data = (u8 *)(chain->ch_ccw) + sizeof(*chain->ch_ccw) * len;
|
2022-07-23 02:02:53 +00:00
|
|
|
chain->ch_pa = (struct page_array *)data;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
chain->ch_len = len;
|
|
|
|
|
|
|
|
list_add_tail(&chain->next, &cp->ccwchain_list);
|
|
|
|
|
|
|
|
return chain;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ccwchain_free(struct ccwchain *chain)
|
|
|
|
{
|
|
|
|
list_del(&chain->next);
|
|
|
|
kfree(chain);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Free resource for a ccw that allocated memory for its cda. */
|
|
|
|
static void ccwchain_cda_free(struct ccwchain *chain, int idx)
|
|
|
|
{
|
|
|
|
struct ccw1 *ccw = chain->ch_ccw + idx;
|
|
|
|
|
2019-05-16 16:14:03 +00:00
|
|
|
if (ccw_is_tic(ccw))
|
2017-11-07 15:22:32 +00:00
|
|
|
return;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
kfree((void *)(u64)ccw->cda);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ccwchain_calc_length - calculate the length of the ccw chain.
|
|
|
|
* @iova: guest physical address of the target ccw chain
|
|
|
|
* @cp: channel_program on which to perform the operation
|
|
|
|
*
|
|
|
|
* This is the chain length not considering any TICs.
|
|
|
|
* You need to do a new round for each TIC target.
|
|
|
|
*
|
2018-05-16 17:33:42 +00:00
|
|
|
* The program is also validated for absence of not yet supported
|
|
|
|
* indirect data addressing scenarios.
|
|
|
|
*
|
2017-03-17 03:17:32 +00:00
|
|
|
* Returns: the length of the ccw chain or -errno.
|
|
|
|
*/
|
|
|
|
static int ccwchain_calc_length(u64 iova, struct channel_program *cp)
|
|
|
|
{
|
2019-06-18 20:23:48 +00:00
|
|
|
struct ccw1 *ccw = cp->guest_cp;
|
2019-06-18 20:23:50 +00:00
|
|
|
int cnt = 0;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
do {
|
|
|
|
cnt++;
|
|
|
|
|
2018-05-16 17:33:42 +00:00
|
|
|
/*
|
|
|
|
* As we don't want to fail direct addressing even if the
|
|
|
|
* orb specified one of the unsupported formats, we defer
|
|
|
|
* checking for IDAWs in unsupported formats to here.
|
|
|
|
*/
|
2019-06-18 20:23:48 +00:00
|
|
|
if ((!cp->orb.cmd.c64 || cp->orb.cmd.i2k) && ccw_is_idal(ccw))
|
2018-05-16 17:33:42 +00:00
|
|
|
return -EOPNOTSUPP;
|
|
|
|
|
s390/cio: Fix vfio-ccw handling of recursive TICs
The routine ccwchain_calc_length() is tasked with looking at a
channel program, seeing how many CCWs are chained together by
the presence of the Chain-Command flag, and returning a count
to the caller.
Previously, it also considered a Transfer-in-Channel CCW as being
an appropriate mechanism for chaining. The problem at the time
was that the TIC CCW will almost certainly not go to the next CCW
in memory (because the CC flag would be sufficient), and so
advancing to the next 8 bytes will cause us to read potentially
invalid memory. So that comparison was removed, and the target
of the TIC is processed as a new chain.
This is fine when a TIC goes to a new chain (consider a NOP+TIC to
a channel program that is being redriven), but there is another
scenario where this falls apart. A TIC can be used to "rewind"
a channel program, for example to find a particular record on a
disk with various orientation CCWs. In this case, we DO want to
consider the memory after the TIC since the TIC will be skipped
once the requested criteria is met. This is due to the Status
Modifier presented by the device, though software doesn't need to
operate on it beyond understanding the behavior change of how the
channel program is executed.
So to handle this, we will re-introduce the check for a TIC CCW
but limit it by examining the target of the TIC. If the TIC
doesn't go back into the current chain, then current behavior
applies; we should stop counting CCWs and let the target of the
TIC be handled as a new chain. But, if the TIC DOES go back into
the current chain, then we need to keep looking at the memory after
the TIC for when the channel breaks out of the TIC loop. We can't
use tic_target_chain_exists() because the chain in question hasn't
been built yet, so we will redefine that comparison with some small
functions to make it more readable and to permit refactoring later.
Fixes: 405d566f98ae ("vfio-ccw: Don't assume there are more ccws after a TIC")
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190222183941.29596-2-farman@linux.ibm.com>
Reviewed-by: Halil Pasic <pasic@linux.ibm.com>
Reviewed-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-02-22 18:39:40 +00:00
|
|
|
/*
|
|
|
|
* We want to keep counting if the current CCW has the
|
|
|
|
* command-chaining flag enabled, or if it is a TIC CCW
|
|
|
|
* that loops back into the current chain. The latter
|
|
|
|
* is used for device orientation, where the CCW PRIOR to
|
|
|
|
* the TIC can either jump to the TIC or a CCW immediately
|
|
|
|
* after the TIC, depending on the results of its operation.
|
|
|
|
*/
|
|
|
|
if (!ccw_is_chain(ccw) && !is_tic_within_range(ccw, iova, cnt))
|
2017-03-17 03:17:32 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
ccw++;
|
|
|
|
} while (cnt < CCWCHAIN_LEN_MAX + 1);
|
|
|
|
|
|
|
|
if (cnt == CCWCHAIN_LEN_MAX + 1)
|
|
|
|
cnt = -EINVAL;
|
|
|
|
|
|
|
|
return cnt;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int tic_target_chain_exists(struct ccw1 *tic, struct channel_program *cp)
|
|
|
|
{
|
|
|
|
struct ccwchain *chain;
|
2019-02-22 18:39:41 +00:00
|
|
|
u32 ccw_head;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
list_for_each_entry(chain, &cp->ccwchain_list, next) {
|
|
|
|
ccw_head = chain->ch_iova;
|
2019-02-22 18:39:41 +00:00
|
|
|
if (is_cpa_within_range(tic->cda, ccw_head, chain->ch_len))
|
2017-03-17 03:17:32 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ccwchain_loop_tic(struct ccwchain *chain,
|
|
|
|
struct channel_program *cp);
|
|
|
|
|
2019-06-06 20:28:25 +00:00
|
|
|
static int ccwchain_handle_ccw(u32 cda, struct channel_program *cp)
|
2017-03-17 03:17:32 +00:00
|
|
|
{
|
2022-05-11 19:12:59 +00:00
|
|
|
struct vfio_device *vdev =
|
|
|
|
&container_of(cp, struct vfio_ccw_private, cp)->vdev;
|
2017-03-17 03:17:32 +00:00
|
|
|
struct ccwchain *chain;
|
2019-07-11 14:28:52 +00:00
|
|
|
int len, ret;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2019-06-18 20:23:50 +00:00
|
|
|
/* Copy 2K (the most we support today) of possible CCWs */
|
2022-05-11 19:12:59 +00:00
|
|
|
len = copy_from_iova(vdev, cp->guest_cp, cda,
|
2019-06-18 20:23:52 +00:00
|
|
|
CCWCHAIN_LEN_MAX * sizeof(struct ccw1));
|
2019-06-18 20:23:50 +00:00
|
|
|
if (len)
|
|
|
|
return len;
|
|
|
|
|
2019-06-18 20:23:51 +00:00
|
|
|
/* Convert any Format-0 CCWs to Format-1 */
|
|
|
|
if (!cp->orb.cmd.fmt)
|
2019-07-02 18:09:28 +00:00
|
|
|
convert_ccw0_to_ccw1(cp->guest_cp, CCWCHAIN_LEN_MAX);
|
2019-06-18 20:23:51 +00:00
|
|
|
|
2019-06-18 20:23:50 +00:00
|
|
|
/* Count the CCWs in the current chain */
|
2019-06-06 20:28:25 +00:00
|
|
|
len = ccwchain_calc_length(cda, cp);
|
2017-03-17 03:17:32 +00:00
|
|
|
if (len < 0)
|
|
|
|
return len;
|
|
|
|
|
|
|
|
/* Need alloc a new chain for this one. */
|
|
|
|
chain = ccwchain_alloc(cp, len);
|
|
|
|
if (!chain)
|
|
|
|
return -ENOMEM;
|
2019-06-06 20:28:25 +00:00
|
|
|
chain->ch_iova = cda;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2019-06-18 20:23:49 +00:00
|
|
|
/* Copy the actual CCWs into the new chain */
|
|
|
|
memcpy(chain->ch_ccw, cp->guest_cp, len * sizeof(struct ccw1));
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
/* Loop for tics on this new chain. */
|
2019-07-11 14:28:52 +00:00
|
|
|
ret = ccwchain_loop_tic(chain, cp);
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
ccwchain_free(chain);
|
|
|
|
|
|
|
|
return ret;
|
2017-03-17 03:17:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Loop for TICs. */
|
|
|
|
static int ccwchain_loop_tic(struct ccwchain *chain, struct channel_program *cp)
|
|
|
|
{
|
|
|
|
struct ccw1 *tic;
|
|
|
|
int i, ret;
|
|
|
|
|
|
|
|
for (i = 0; i < chain->ch_len; i++) {
|
|
|
|
tic = chain->ch_ccw + i;
|
|
|
|
|
|
|
|
if (!ccw_is_tic(tic))
|
|
|
|
continue;
|
|
|
|
|
2019-06-06 20:28:24 +00:00
|
|
|
/* May transfer to an existing chain. */
|
|
|
|
if (tic_target_chain_exists(tic, cp))
|
|
|
|
continue;
|
|
|
|
|
2019-06-06 20:28:25 +00:00
|
|
|
/* Build a ccwchain for the next segment */
|
|
|
|
ret = ccwchain_handle_ccw(tic->cda, cp);
|
2017-03-17 03:17:32 +00:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ccwchain_fetch_tic(struct ccwchain *chain,
|
|
|
|
int idx,
|
|
|
|
struct channel_program *cp)
|
|
|
|
{
|
|
|
|
struct ccw1 *ccw = chain->ch_ccw + idx;
|
|
|
|
struct ccwchain *iter;
|
2019-02-22 18:39:41 +00:00
|
|
|
u32 ccw_head;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
list_for_each_entry(iter, &cp->ccwchain_list, next) {
|
|
|
|
ccw_head = iter->ch_iova;
|
2019-02-22 18:39:41 +00:00
|
|
|
if (is_cpa_within_range(ccw->cda, ccw_head, iter->ch_len)) {
|
2017-07-21 01:14:36 +00:00
|
|
|
ccw->cda = (__u32) (addr_t) (((char *)iter->ch_ccw) +
|
2017-03-17 03:17:32 +00:00
|
|
|
(ccw->cda - ccw_head));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ccwchain_fetch_direct(struct ccwchain *chain,
|
|
|
|
int idx,
|
|
|
|
struct channel_program *cp)
|
|
|
|
{
|
2022-05-11 19:12:59 +00:00
|
|
|
struct vfio_device *vdev =
|
|
|
|
&container_of(cp, struct vfio_ccw_private, cp)->vdev;
|
2017-03-17 03:17:32 +00:00
|
|
|
struct ccw1 *ccw;
|
2022-07-23 02:02:53 +00:00
|
|
|
struct page_array *pa;
|
2019-06-06 20:28:31 +00:00
|
|
|
u64 iova;
|
2017-03-17 03:17:32 +00:00
|
|
|
unsigned long *idaws;
|
2018-05-23 02:56:44 +00:00
|
|
|
int ret;
|
s390/cio: Allow zero-length CCWs in vfio-ccw
It is possible that a guest might issue a CCW with a length of zero,
and will expect a particular response. Consider this chain:
Address Format-1 CCW
-------- -----------------
0 33110EC0 346022CC 33177468
1 33110EC8 CF200000 3318300C
CCW[0] moves a little more than two pages, but also has the
Suppress Length Indication (SLI) bit set to handle the expectation
that considerably less data will be moved. CCW[1] also has the SLI
bit set, and has a length of zero. Once vfio-ccw does its magic,
the kernel issues a start subchannel on behalf of the guest with this:
Address Format-1 CCW
-------- -----------------
0 021EDED0 346422CC 021F0000
1 021EDED8 CF240000 3318300C
Both CCWs were converted to an IDAL and have the corresponding flags
set (which is by design), but only the address of the first data
address is converted to something the host is aware of. The second
CCW still has the address used by the guest, which happens to be (A)
(probably) an invalid address for the host, and (B) an invalid IDAW
address (doubleword boundary, etc.).
While the I/O fails, it doesn't fail correctly. In this example, we
would receive a program check for an invalid IDAW address, instead of
a unit check for an invalid command.
To fix this, revert commit 4cebc5d6a6ff ("vfio: ccw: validate the
count field of a ccw before pinning") and allow the individual fetch
routines to process them like anything else. We'll make a slight
adjustment to our allocation of the pfn_array (for direct CCWs) or
IDAL (for IDAL CCWs) memory, so that we have room for at least one
address even though no guest memory will be pinned and thus the
IDAW will not be populated with a host address.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-3-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:02 +00:00
|
|
|
int bytes = 1;
|
2019-06-06 20:28:31 +00:00
|
|
|
int idaw_nr, idal_len;
|
|
|
|
int i;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
ccw = chain->ch_ccw + idx;
|
|
|
|
|
2019-06-06 20:28:30 +00:00
|
|
|
if (ccw->count)
|
s390/cio: Allow zero-length CCWs in vfio-ccw
It is possible that a guest might issue a CCW with a length of zero,
and will expect a particular response. Consider this chain:
Address Format-1 CCW
-------- -----------------
0 33110EC0 346022CC 33177468
1 33110EC8 CF200000 3318300C
CCW[0] moves a little more than two pages, but also has the
Suppress Length Indication (SLI) bit set to handle the expectation
that considerably less data will be moved. CCW[1] also has the SLI
bit set, and has a length of zero. Once vfio-ccw does its magic,
the kernel issues a start subchannel on behalf of the guest with this:
Address Format-1 CCW
-------- -----------------
0 021EDED0 346422CC 021F0000
1 021EDED8 CF240000 3318300C
Both CCWs were converted to an IDAL and have the corresponding flags
set (which is by design), but only the address of the first data
address is converted to something the host is aware of. The second
CCW still has the address used by the guest, which happens to be (A)
(probably) an invalid address for the host, and (B) an invalid IDAW
address (doubleword boundary, etc.).
While the I/O fails, it doesn't fail correctly. In this example, we
would receive a program check for an invalid IDAW address, instead of
a unit check for an invalid command.
To fix this, revert commit 4cebc5d6a6ff ("vfio: ccw: validate the
count field of a ccw before pinning") and allow the individual fetch
routines to process them like anything else. We'll make a slight
adjustment to our allocation of the pfn_array (for direct CCWs) or
IDAL (for IDAL CCWs) memory, so that we have room for at least one
address even though no guest memory will be pinned and thus the
IDAW will not be populated with a host address.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-3-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:02 +00:00
|
|
|
bytes = ccw->count;
|
2019-06-06 20:28:30 +00:00
|
|
|
|
|
|
|
/* Calculate size of IDAL */
|
2019-06-06 20:28:31 +00:00
|
|
|
if (ccw_is_idal(ccw)) {
|
|
|
|
/* Read first IDAW to see if it's 4K-aligned or not. */
|
|
|
|
/* All subsequent IDAws will be 4K-aligned. */
|
2022-05-11 19:12:59 +00:00
|
|
|
ret = copy_from_iova(vdev, &iova, ccw->cda, sizeof(iova));
|
2019-06-06 20:28:31 +00:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
} else {
|
|
|
|
iova = ccw->cda;
|
|
|
|
}
|
|
|
|
idaw_nr = idal_nr_words((void *)iova, bytes);
|
|
|
|
idal_len = idaw_nr * sizeof(*idaws);
|
2019-06-06 20:28:30 +00:00
|
|
|
|
|
|
|
/* Allocate an IDAL from host storage */
|
|
|
|
idaws = kcalloc(idaw_nr, sizeof(*idaws), GFP_DMA | GFP_KERNEL);
|
|
|
|
if (!idaws) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out_init;
|
2017-10-11 02:38:22 +00:00
|
|
|
}
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
/*
|
2022-07-23 02:02:53 +00:00
|
|
|
* Allocate an array of pages to pin/translate.
|
2019-06-06 20:28:31 +00:00
|
|
|
* The number of pages is actually the count of the idaws
|
|
|
|
* required for the data transfer, since we only only support
|
|
|
|
* 4K IDAWs today.
|
2017-03-17 03:17:32 +00:00
|
|
|
*/
|
2019-06-06 20:28:29 +00:00
|
|
|
pa = chain->ch_pa + idx;
|
2022-07-23 02:02:53 +00:00
|
|
|
ret = page_array_alloc(pa, iova, bytes);
|
2019-05-14 23:42:44 +00:00
|
|
|
if (ret < 0)
|
2019-06-06 20:28:30 +00:00
|
|
|
goto out_free_idaws;
|
2019-05-14 23:42:44 +00:00
|
|
|
|
2019-06-06 20:28:31 +00:00
|
|
|
if (ccw_is_idal(ccw)) {
|
|
|
|
/* Copy guest IDAL into host IDAL */
|
2022-05-11 19:12:59 +00:00
|
|
|
ret = copy_from_iova(vdev, idaws, ccw->cda, idal_len);
|
2019-06-06 20:28:31 +00:00
|
|
|
if (ret)
|
|
|
|
goto out_unpin;
|
|
|
|
|
|
|
|
/*
|
2022-07-23 02:02:53 +00:00
|
|
|
* Copy guest IDAWs into page_array, in case the memory they
|
2019-06-06 20:28:31 +00:00
|
|
|
* occupy is not contiguous.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < idaw_nr; i++)
|
2022-07-23 02:02:53 +00:00
|
|
|
pa->pa_iova[i] = idaws[i];
|
2019-06-06 20:28:31 +00:00
|
|
|
} else {
|
|
|
|
/*
|
2022-07-23 02:02:53 +00:00
|
|
|
* No action is required here; the iova addresses in page_array
|
|
|
|
* were initialized sequentially in page_array_alloc() beginning
|
2019-06-06 20:28:31 +00:00
|
|
|
* with the contents of ccw->cda.
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
|
s390/cio: Don't pin vfio pages for empty transfers
The skip flag of a CCW offers the possibility of data not being
transferred, but is only meaningful for certain commands.
Specifically, it is only applicable for a read, read backward, sense,
or sense ID CCW and will be ignored for any other command code
(SA22-7832-11 page 15-64, and figure 15-30 on page 15-75).
(A sense ID is xE4, while a sense is x04 with possible modifiers in the
upper four bits. So we will cover the whole "family" of sense CCWs.)
For those scenarios, since there is no requirement for the target
address to be valid, we should skip the call to vfio_pin_pages() and
rely on the IDAL address we have allocated/built for the channel
program. The fact that the individual IDAWs within the IDAL are
invalid is fine, since they aren't actually checked in these cases.
Set pa_nr to zero when skipping the pfn_array_pin() call, since it is
defined as the number of pages pinned and is used to determine
whether to call vfio_unpin_pages() upon cleanup.
The pfn_array_pin() routine returns the number of pages that were
pinned, but now might be skipped for some CCWs. Thus we need to
calculate the expected number of pages ourselves such that we are
guaranteed to allocate a reasonable number of IDAWs, which will
provide a valid address in CCW.CDA regardless of whether the IDAWs
are filled in with pinned/translated addresses or not.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-2-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:01 +00:00
|
|
|
if (ccw_does_data_transfer(ccw)) {
|
2022-07-23 02:02:53 +00:00
|
|
|
ret = page_array_pin(pa, vdev);
|
s390/cio: Don't pin vfio pages for empty transfers
The skip flag of a CCW offers the possibility of data not being
transferred, but is only meaningful for certain commands.
Specifically, it is only applicable for a read, read backward, sense,
or sense ID CCW and will be ignored for any other command code
(SA22-7832-11 page 15-64, and figure 15-30 on page 15-75).
(A sense ID is xE4, while a sense is x04 with possible modifiers in the
upper four bits. So we will cover the whole "family" of sense CCWs.)
For those scenarios, since there is no requirement for the target
address to be valid, we should skip the call to vfio_pin_pages() and
rely on the IDAL address we have allocated/built for the channel
program. The fact that the individual IDAWs within the IDAL are
invalid is fine, since they aren't actually checked in these cases.
Set pa_nr to zero when skipping the pfn_array_pin() call, since it is
defined as the number of pages pinned and is used to determine
whether to call vfio_unpin_pages() upon cleanup.
The pfn_array_pin() routine returns the number of pages that were
pinned, but now might be skipped for some CCWs. Thus we need to
calculate the expected number of pages ourselves such that we are
guaranteed to allocate a reasonable number of IDAWs, which will
provide a valid address in CCW.CDA regardless of whether the IDAWs
are filled in with pinned/translated addresses or not.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-2-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:01 +00:00
|
|
|
if (ret < 0)
|
|
|
|
goto out_unpin;
|
|
|
|
} else {
|
2019-06-06 20:28:29 +00:00
|
|
|
pa->pa_nr = 0;
|
s390/cio: Don't pin vfio pages for empty transfers
The skip flag of a CCW offers the possibility of data not being
transferred, but is only meaningful for certain commands.
Specifically, it is only applicable for a read, read backward, sense,
or sense ID CCW and will be ignored for any other command code
(SA22-7832-11 page 15-64, and figure 15-30 on page 15-75).
(A sense ID is xE4, while a sense is x04 with possible modifiers in the
upper four bits. So we will cover the whole "family" of sense CCWs.)
For those scenarios, since there is no requirement for the target
address to be valid, we should skip the call to vfio_pin_pages() and
rely on the IDAL address we have allocated/built for the channel
program. The fact that the individual IDAWs within the IDAL are
invalid is fine, since they aren't actually checked in these cases.
Set pa_nr to zero when skipping the pfn_array_pin() call, since it is
defined as the number of pages pinned and is used to determine
whether to call vfio_unpin_pages() upon cleanup.
The pfn_array_pin() routine returns the number of pages that were
pinned, but now might be skipped for some CCWs. Thus we need to
calculate the expected number of pages ourselves such that we are
guaranteed to allocate a reasonable number of IDAWs, which will
provide a valid address in CCW.CDA regardless of whether the IDAWs
are filled in with pinned/translated addresses or not.
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Message-Id: <20190516161403.79053-2-farman@linux.ibm.com>
Acked-by: Farhan Ali <alifm@linux.ibm.com>
Signed-off-by: Cornelia Huck <cohuck@redhat.com>
2019-05-16 16:14:01 +00:00
|
|
|
}
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
ccw->cda = (__u32) virt_to_phys(idaws);
|
|
|
|
ccw->flags |= CCW_FLAG_IDA;
|
|
|
|
|
2022-07-23 02:02:53 +00:00
|
|
|
/* Populate the IDAL with pinned/translated addresses from page */
|
|
|
|
page_array_idal_create_words(pa, idaws);
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
return 0;
|
2018-05-23 02:56:44 +00:00
|
|
|
|
|
|
|
out_unpin:
|
2022-07-23 02:02:53 +00:00
|
|
|
page_array_unpin_free(pa, vdev);
|
2019-06-06 20:28:30 +00:00
|
|
|
out_free_idaws:
|
|
|
|
kfree(idaws);
|
2018-05-23 02:56:44 +00:00
|
|
|
out_init:
|
|
|
|
ccw->cda = 0;
|
|
|
|
return ret;
|
2017-03-17 03:17:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Fetch one ccw.
|
|
|
|
* To reduce memory copy, we'll pin the cda page in memory,
|
|
|
|
* and to get rid of the cda 2G limitiaion of ccw1, we'll translate
|
|
|
|
* direct ccws to idal ccws.
|
|
|
|
*/
|
|
|
|
static int ccwchain_fetch_one(struct ccwchain *chain,
|
|
|
|
int idx,
|
|
|
|
struct channel_program *cp)
|
|
|
|
{
|
|
|
|
struct ccw1 *ccw = chain->ch_ccw + idx;
|
|
|
|
|
|
|
|
if (ccw_is_tic(ccw))
|
|
|
|
return ccwchain_fetch_tic(chain, idx, cp);
|
|
|
|
|
|
|
|
return ccwchain_fetch_direct(chain, idx, cp);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cp_init() - allocate ccwchains for a channel program.
|
|
|
|
* @cp: channel_program on which to perform the operation
|
|
|
|
* @mdev: the mediated device to perform pin/unpin operations
|
|
|
|
* @orb: control block for the channel program from the guest
|
|
|
|
*
|
|
|
|
* This creates one or more ccwchain(s), and copies the raw data of
|
|
|
|
* the target channel program from @orb->cmd.iova to the new ccwchain(s).
|
|
|
|
*
|
|
|
|
* Limitations:
|
2020-05-06 21:24:40 +00:00
|
|
|
* 1. Supports idal(c64) ccw chaining.
|
|
|
|
* 2. Supports 4k idaw.
|
2017-03-17 03:17:32 +00:00
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* %0 on success and a negative error value on failure.
|
|
|
|
*/
|
2022-05-11 19:12:59 +00:00
|
|
|
int cp_init(struct channel_program *cp, union orb *orb)
|
2017-03-17 03:17:32 +00:00
|
|
|
{
|
2022-05-11 19:12:59 +00:00
|
|
|
struct vfio_device *vdev =
|
|
|
|
&container_of(cp, struct vfio_ccw_private, cp)->vdev;
|
2020-05-06 21:24:40 +00:00
|
|
|
/* custom ratelimit used to avoid flood during guest IPL */
|
|
|
|
static DEFINE_RATELIMIT_STATE(ratelimit_state, 5 * HZ, 1);
|
2019-06-06 20:28:26 +00:00
|
|
|
int ret;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2021-05-11 19:56:29 +00:00
|
|
|
/* this is an error in the caller */
|
|
|
|
if (cp->initialized)
|
|
|
|
return -EBUSY;
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
/*
|
2020-05-06 21:24:40 +00:00
|
|
|
* We only support prefetching the channel program. We assume all channel
|
|
|
|
* programs executed by supported guests likewise support prefetching.
|
|
|
|
* Executing a channel program that does not specify prefetching will
|
|
|
|
* typically not cause an error, but a warning is issued to help identify
|
|
|
|
* the problem if something does break.
|
2017-03-17 03:17:32 +00:00
|
|
|
*/
|
2020-05-06 21:24:40 +00:00
|
|
|
if (!orb->cmd.pfch && __ratelimit(&ratelimit_state))
|
2022-05-11 19:12:59 +00:00
|
|
|
dev_warn(
|
|
|
|
vdev->dev,
|
|
|
|
"Prefetching channel program even though prefetch not specified in ORB");
|
2017-03-17 03:17:32 +00:00
|
|
|
|
|
|
|
INIT_LIST_HEAD(&cp->ccwchain_list);
|
|
|
|
memcpy(&cp->orb, orb, sizeof(*orb));
|
|
|
|
|
2019-06-06 20:28:26 +00:00
|
|
|
/* Build a ccwchain for the first CCW segment */
|
|
|
|
ret = ccwchain_handle_ccw(orb->cmd.cpa, cp);
|
|
|
|
|
2019-07-11 14:28:51 +00:00
|
|
|
if (!ret) {
|
2019-01-21 08:55:18 +00:00
|
|
|
cp->initialized = true;
|
|
|
|
|
2019-07-11 14:28:51 +00:00
|
|
|
/* It is safe to force: if it was not set but idals used
|
|
|
|
* ccwchain_calc_length would have returned an error.
|
|
|
|
*/
|
|
|
|
cp->orb.cmd.c64 = 1;
|
|
|
|
}
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cp_free() - free resources for channel program.
|
|
|
|
* @cp: channel_program on which to perform the operation
|
|
|
|
*
|
|
|
|
* This unpins the memory pages and frees the memory space occupied by
|
|
|
|
* @cp, which must have been returned by a previous call to cp_init().
|
|
|
|
* Otherwise, undefined behavior occurs.
|
|
|
|
*/
|
|
|
|
void cp_free(struct channel_program *cp)
|
|
|
|
{
|
2022-05-11 19:12:59 +00:00
|
|
|
struct vfio_device *vdev =
|
|
|
|
&container_of(cp, struct vfio_ccw_private, cp)->vdev;
|
2019-06-06 20:28:23 +00:00
|
|
|
struct ccwchain *chain, *temp;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!cp->initialized)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp->initialized = false;
|
|
|
|
list_for_each_entry_safe(chain, temp, &cp->ccwchain_list, next) {
|
|
|
|
for (i = 0; i < chain->ch_len; i++) {
|
2022-07-23 02:02:53 +00:00
|
|
|
page_array_unpin_free(chain->ch_pa + i, vdev);
|
2019-06-06 20:28:23 +00:00
|
|
|
ccwchain_cda_free(chain, i);
|
|
|
|
}
|
|
|
|
ccwchain_free(chain);
|
|
|
|
}
|
2017-03-17 03:17:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cp_prefetch() - translate a guest physical address channel program to
|
|
|
|
* a real-device runnable channel program.
|
|
|
|
* @cp: channel_program on which to perform the operation
|
|
|
|
*
|
|
|
|
* This function translates the guest-physical-address channel program
|
|
|
|
* and stores the result to ccwchain list. @cp must have been
|
|
|
|
* initialized by a previous call with cp_init(). Otherwise, undefined
|
|
|
|
* behavior occurs.
|
2018-04-24 11:26:56 +00:00
|
|
|
* For each chain composing the channel program:
|
|
|
|
* - On entry ch_len holds the count of CCWs to be translated.
|
|
|
|
* - On exit ch_len is adjusted to the count of successfully translated CCWs.
|
|
|
|
* This allows cp_free to find in ch_len the count of CCWs to free in a chain.
|
2017-03-17 03:17:32 +00:00
|
|
|
*
|
|
|
|
* The S/390 CCW Translation APIS (prefixed by 'cp_') are introduced
|
|
|
|
* as helpers to do ccw chain translation inside the kernel. Basically
|
|
|
|
* they accept a channel program issued by a virtual machine, and
|
|
|
|
* translate the channel program to a real-device runnable channel
|
|
|
|
* program.
|
|
|
|
*
|
|
|
|
* These APIs will copy the ccws into kernel-space buffers, and update
|
|
|
|
* the guest phsical addresses with their corresponding host physical
|
|
|
|
* addresses. Then channel I/O device drivers could issue the
|
|
|
|
* translated channel program to real devices to perform an I/O
|
|
|
|
* operation.
|
|
|
|
*
|
|
|
|
* These interfaces are designed to support translation only for
|
|
|
|
* channel programs, which are generated and formatted by a
|
|
|
|
* guest. Thus this will make it possible for things like VFIO to
|
|
|
|
* leverage the interfaces to passthrough a channel I/O mediated
|
|
|
|
* device in QEMU.
|
|
|
|
*
|
|
|
|
* We support direct ccw chaining by translating them to idal ccws.
|
|
|
|
*
|
|
|
|
* Returns:
|
|
|
|
* %0 on success and a negative error value on failure.
|
|
|
|
*/
|
|
|
|
int cp_prefetch(struct channel_program *cp)
|
|
|
|
{
|
|
|
|
struct ccwchain *chain;
|
|
|
|
int len, idx, ret;
|
|
|
|
|
2019-01-21 08:55:18 +00:00
|
|
|
/* this is an error in the caller */
|
|
|
|
if (!cp->initialized)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
list_for_each_entry(chain, &cp->ccwchain_list, next) {
|
|
|
|
len = chain->ch_len;
|
|
|
|
for (idx = 0; idx < len; idx++) {
|
|
|
|
ret = ccwchain_fetch_one(chain, idx, cp);
|
|
|
|
if (ret)
|
2018-04-24 11:26:56 +00:00
|
|
|
goto out_err;
|
2017-03-17 03:17:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2018-04-24 11:26:56 +00:00
|
|
|
out_err:
|
|
|
|
/* Only cleanup the chain elements that were actually translated. */
|
|
|
|
chain->ch_len = idx;
|
|
|
|
list_for_each_entry_continue(chain, &cp->ccwchain_list, next) {
|
|
|
|
chain->ch_len = 0;
|
|
|
|
}
|
|
|
|
return ret;
|
2017-03-17 03:17:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cp_get_orb() - get the orb of the channel program
|
|
|
|
* @cp: channel_program on which to perform the operation
|
|
|
|
* @intparm: new intparm for the returned orb
|
|
|
|
* @lpm: candidate value of the logical-path mask for the returned orb
|
|
|
|
*
|
|
|
|
* This function returns the address of the updated orb of the channel
|
|
|
|
* program. Channel I/O device drivers could use this orb to issue a
|
|
|
|
* ssch.
|
|
|
|
*/
|
|
|
|
union orb *cp_get_orb(struct channel_program *cp, u32 intparm, u8 lpm)
|
|
|
|
{
|
|
|
|
union orb *orb;
|
|
|
|
struct ccwchain *chain;
|
|
|
|
struct ccw1 *cpa;
|
|
|
|
|
2019-01-21 08:55:18 +00:00
|
|
|
/* this is an error in the caller */
|
|
|
|
if (!cp->initialized)
|
|
|
|
return NULL;
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
orb = &cp->orb;
|
|
|
|
|
|
|
|
orb->cmd.intparm = intparm;
|
|
|
|
orb->cmd.fmt = 1;
|
|
|
|
orb->cmd.key = PAGE_DEFAULT_KEY >> 4;
|
|
|
|
|
|
|
|
if (orb->cmd.lpm == 0)
|
|
|
|
orb->cmd.lpm = lpm;
|
|
|
|
|
|
|
|
chain = list_first_entry(&cp->ccwchain_list, struct ccwchain, next);
|
|
|
|
cpa = chain->ch_ccw;
|
|
|
|
orb->cmd.cpa = (__u32) __pa(cpa);
|
|
|
|
|
|
|
|
return orb;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cp_update_scsw() - update scsw for a channel program.
|
|
|
|
* @cp: channel_program on which to perform the operation
|
|
|
|
* @scsw: I/O results of the channel program and also the target to be
|
|
|
|
* updated
|
|
|
|
*
|
|
|
|
* @scsw contains the I/O results of the channel program that pointed
|
|
|
|
* to by @cp. However what @scsw->cpa stores is a host physical
|
|
|
|
* address, which is meaningless for the guest, which is waiting for
|
|
|
|
* the I/O results.
|
|
|
|
*
|
|
|
|
* This function updates @scsw->cpa to its coressponding guest physical
|
|
|
|
* address.
|
|
|
|
*/
|
|
|
|
void cp_update_scsw(struct channel_program *cp, union scsw *scsw)
|
|
|
|
{
|
|
|
|
struct ccwchain *chain;
|
|
|
|
u32 cpa = scsw->cmd.cpa;
|
2019-02-22 18:39:41 +00:00
|
|
|
u32 ccw_head;
|
2017-03-17 03:17:32 +00:00
|
|
|
|
2019-01-21 08:55:18 +00:00
|
|
|
if (!cp->initialized)
|
|
|
|
return;
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
/*
|
|
|
|
* LATER:
|
|
|
|
* For now, only update the cmd.cpa part. We may need to deal with
|
|
|
|
* other portions of the schib as well, even if we don't return them
|
|
|
|
* in the ioctl directly. Path status changes etc.
|
|
|
|
*/
|
|
|
|
list_for_each_entry(chain, &cp->ccwchain_list, next) {
|
|
|
|
ccw_head = (u32)(u64)chain->ch_ccw;
|
2019-05-14 23:42:42 +00:00
|
|
|
/*
|
|
|
|
* On successful execution, cpa points just beyond the end
|
|
|
|
* of the chain.
|
|
|
|
*/
|
|
|
|
if (is_cpa_within_range(cpa, ccw_head, chain->ch_len + 1)) {
|
2017-03-17 03:17:32 +00:00
|
|
|
/*
|
|
|
|
* (cpa - ccw_head) is the offset value of the host
|
|
|
|
* physical ccw to its chain head.
|
|
|
|
* Adding this value to the guest physical ccw chain
|
|
|
|
* head gets us the guest cpa.
|
|
|
|
*/
|
|
|
|
cpa = chain->ch_iova + (cpa - ccw_head);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
scsw->cmd.cpa = cpa;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* cp_iova_pinned() - check if an iova is pinned for a ccw chain.
|
2018-01-29 11:55:29 +00:00
|
|
|
* @cp: channel_program on which to perform the operation
|
2017-03-17 03:17:32 +00:00
|
|
|
* @iova: the iova to check
|
|
|
|
*
|
|
|
|
* If the @iova is currently pinned for the ccw chain, return true;
|
|
|
|
* else return false.
|
|
|
|
*/
|
|
|
|
bool cp_iova_pinned(struct channel_program *cp, u64 iova)
|
|
|
|
{
|
|
|
|
struct ccwchain *chain;
|
|
|
|
int i;
|
|
|
|
|
2019-01-21 08:55:18 +00:00
|
|
|
if (!cp->initialized)
|
|
|
|
return false;
|
|
|
|
|
2017-03-17 03:17:32 +00:00
|
|
|
list_for_each_entry(chain, &cp->ccwchain_list, next) {
|
|
|
|
for (i = 0; i < chain->ch_len; i++)
|
2022-07-23 02:02:53 +00:00
|
|
|
if (page_array_iova_pinned(chain->ch_pa + i, iova))
|
2017-03-17 03:17:32 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|