drm/amdgpu: enable PSP IP v13.0.11 support
[platform/kernel/linux-starfive.git] / drivers / s390 / cio / vfio_ccw_ops.c
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * Physical device callbacks for vfio_ccw
4  *
5  * Copyright IBM Corp. 2017
6  * Copyright Red Hat, Inc. 2019
7  *
8  * Author(s): Dong Jia Shi <bjsdjshi@linux.vnet.ibm.com>
9  *            Xiao Feng Ren <renxiaof@linux.vnet.ibm.com>
10  *            Cornelia Huck <cohuck@redhat.com>
11  */
12
13 #include <linux/vfio.h>
14 #include <linux/nospec.h>
15 #include <linux/slab.h>
16
17 #include "vfio_ccw_private.h"
18
19 static const struct vfio_device_ops vfio_ccw_dev_ops;
20
21 static int vfio_ccw_mdev_reset(struct vfio_ccw_private *private)
22 {
23         /*
24          * If the FSM state is seen as Not Operational after closing
25          * and re-opening the mdev, return an error.
26          */
27         vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_CLOSE);
28         vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_OPEN);
29         if (private->state == VFIO_CCW_STATE_NOT_OPER)
30                 return -EINVAL;
31
32         return 0;
33 }
34
35 static void vfio_ccw_dma_unmap(struct vfio_device *vdev, u64 iova, u64 length)
36 {
37         struct vfio_ccw_private *private =
38                 container_of(vdev, struct vfio_ccw_private, vdev);
39
40         /* Drivers MUST unpin pages in response to an invalidation. */
41         if (!cp_iova_pinned(&private->cp, iova, length))
42                 return;
43
44         vfio_ccw_mdev_reset(private);
45 }
46
47 static int vfio_ccw_mdev_init_dev(struct vfio_device *vdev)
48 {
49         struct vfio_ccw_private *private =
50                 container_of(vdev, struct vfio_ccw_private, vdev);
51
52         init_completion(&private->release_comp);
53         return 0;
54 }
55
56 static int vfio_ccw_mdev_probe(struct mdev_device *mdev)
57 {
58         struct vfio_ccw_private *private = dev_get_drvdata(mdev->dev.parent);
59         int ret;
60
61         if (private->state == VFIO_CCW_STATE_NOT_OPER)
62                 return -ENODEV;
63
64         ret = vfio_init_device(&private->vdev, &mdev->dev, &vfio_ccw_dev_ops);
65         if (ret)
66                 return ret;
67
68         VFIO_CCW_MSG_EVENT(2, "sch %x.%x.%04x: create\n",
69                            private->sch->schid.cssid,
70                            private->sch->schid.ssid,
71                            private->sch->schid.sch_no);
72
73         ret = vfio_register_emulated_iommu_dev(&private->vdev);
74         if (ret)
75                 goto err_put_vdev;
76         dev_set_drvdata(&mdev->dev, private);
77         return 0;
78
79 err_put_vdev:
80         vfio_put_device(&private->vdev);
81         return ret;
82 }
83
84 static void vfio_ccw_mdev_release_dev(struct vfio_device *vdev)
85 {
86         struct vfio_ccw_private *private =
87                 container_of(vdev, struct vfio_ccw_private, vdev);
88
89         /*
90          * We cannot free vfio_ccw_private here because it includes
91          * parent info which must be free'ed by css driver.
92          *
93          * Use a workaround by memset'ing the core device part and
94          * then notifying the remove path that all active references
95          * to this device have been released.
96          */
97         memset(vdev, 0, sizeof(*vdev));
98         complete(&private->release_comp);
99 }
100
101 static void vfio_ccw_mdev_remove(struct mdev_device *mdev)
102 {
103         struct vfio_ccw_private *private = dev_get_drvdata(mdev->dev.parent);
104
105         VFIO_CCW_MSG_EVENT(2, "sch %x.%x.%04x: remove\n",
106                            private->sch->schid.cssid,
107                            private->sch->schid.ssid,
108                            private->sch->schid.sch_no);
109
110         vfio_unregister_group_dev(&private->vdev);
111
112         vfio_put_device(&private->vdev);
113         /*
114          * Wait for all active references on mdev are released so it
115          * is safe to defer kfree() to a later point.
116          *
117          * TODO: the clean fix is to split parent/mdev info from ccw
118          * private structure so each can be managed in its own life
119          * cycle.
120          */
121         wait_for_completion(&private->release_comp);
122 }
123
124 static int vfio_ccw_mdev_open_device(struct vfio_device *vdev)
125 {
126         struct vfio_ccw_private *private =
127                 container_of(vdev, struct vfio_ccw_private, vdev);
128         int ret;
129
130         /* Device cannot simply be opened again from this state */
131         if (private->state == VFIO_CCW_STATE_NOT_OPER)
132                 return -EINVAL;
133
134         ret = vfio_ccw_register_async_dev_regions(private);
135         if (ret)
136                 return ret;
137
138         ret = vfio_ccw_register_schib_dev_regions(private);
139         if (ret)
140                 goto out_unregister;
141
142         ret = vfio_ccw_register_crw_dev_regions(private);
143         if (ret)
144                 goto out_unregister;
145
146         vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_OPEN);
147         if (private->state == VFIO_CCW_STATE_NOT_OPER) {
148                 ret = -EINVAL;
149                 goto out_unregister;
150         }
151
152         return ret;
153
154 out_unregister:
155         vfio_ccw_unregister_dev_regions(private);
156         return ret;
157 }
158
159 static void vfio_ccw_mdev_close_device(struct vfio_device *vdev)
160 {
161         struct vfio_ccw_private *private =
162                 container_of(vdev, struct vfio_ccw_private, vdev);
163
164         vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_CLOSE);
165         vfio_ccw_unregister_dev_regions(private);
166 }
167
168 static ssize_t vfio_ccw_mdev_read_io_region(struct vfio_ccw_private *private,
169                                             char __user *buf, size_t count,
170                                             loff_t *ppos)
171 {
172         loff_t pos = *ppos & VFIO_CCW_OFFSET_MASK;
173         struct ccw_io_region *region;
174         int ret;
175
176         if (pos + count > sizeof(*region))
177                 return -EINVAL;
178
179         mutex_lock(&private->io_mutex);
180         region = private->io_region;
181         if (copy_to_user(buf, (void *)region + pos, count))
182                 ret = -EFAULT;
183         else
184                 ret = count;
185         mutex_unlock(&private->io_mutex);
186         return ret;
187 }
188
189 static ssize_t vfio_ccw_mdev_read(struct vfio_device *vdev,
190                                   char __user *buf,
191                                   size_t count,
192                                   loff_t *ppos)
193 {
194         struct vfio_ccw_private *private =
195                 container_of(vdev, struct vfio_ccw_private, vdev);
196         unsigned int index = VFIO_CCW_OFFSET_TO_INDEX(*ppos);
197
198         if (index >= VFIO_CCW_NUM_REGIONS + private->num_regions)
199                 return -EINVAL;
200
201         switch (index) {
202         case VFIO_CCW_CONFIG_REGION_INDEX:
203                 return vfio_ccw_mdev_read_io_region(private, buf, count, ppos);
204         default:
205                 index -= VFIO_CCW_NUM_REGIONS;
206                 return private->region[index].ops->read(private, buf, count,
207                                                         ppos);
208         }
209
210         return -EINVAL;
211 }
212
213 static ssize_t vfio_ccw_mdev_write_io_region(struct vfio_ccw_private *private,
214                                              const char __user *buf,
215                                              size_t count, loff_t *ppos)
216 {
217         loff_t pos = *ppos & VFIO_CCW_OFFSET_MASK;
218         struct ccw_io_region *region;
219         int ret;
220
221         if (pos + count > sizeof(*region))
222                 return -EINVAL;
223
224         if (!mutex_trylock(&private->io_mutex))
225                 return -EAGAIN;
226
227         region = private->io_region;
228         if (copy_from_user((void *)region + pos, buf, count)) {
229                 ret = -EFAULT;
230                 goto out_unlock;
231         }
232
233         vfio_ccw_fsm_event(private, VFIO_CCW_EVENT_IO_REQ);
234         ret = (region->ret_code != 0) ? region->ret_code : count;
235
236 out_unlock:
237         mutex_unlock(&private->io_mutex);
238         return ret;
239 }
240
241 static ssize_t vfio_ccw_mdev_write(struct vfio_device *vdev,
242                                    const char __user *buf,
243                                    size_t count,
244                                    loff_t *ppos)
245 {
246         struct vfio_ccw_private *private =
247                 container_of(vdev, struct vfio_ccw_private, vdev);
248         unsigned int index = VFIO_CCW_OFFSET_TO_INDEX(*ppos);
249
250         if (index >= VFIO_CCW_NUM_REGIONS + private->num_regions)
251                 return -EINVAL;
252
253         switch (index) {
254         case VFIO_CCW_CONFIG_REGION_INDEX:
255                 return vfio_ccw_mdev_write_io_region(private, buf, count, ppos);
256         default:
257                 index -= VFIO_CCW_NUM_REGIONS;
258                 return private->region[index].ops->write(private, buf, count,
259                                                          ppos);
260         }
261
262         return -EINVAL;
263 }
264
265 static int vfio_ccw_mdev_get_device_info(struct vfio_ccw_private *private,
266                                          struct vfio_device_info *info)
267 {
268         info->flags = VFIO_DEVICE_FLAGS_CCW | VFIO_DEVICE_FLAGS_RESET;
269         info->num_regions = VFIO_CCW_NUM_REGIONS + private->num_regions;
270         info->num_irqs = VFIO_CCW_NUM_IRQS;
271
272         return 0;
273 }
274
275 static int vfio_ccw_mdev_get_region_info(struct vfio_ccw_private *private,
276                                          struct vfio_region_info *info,
277                                          unsigned long arg)
278 {
279         int i;
280
281         switch (info->index) {
282         case VFIO_CCW_CONFIG_REGION_INDEX:
283                 info->offset = 0;
284                 info->size = sizeof(struct ccw_io_region);
285                 info->flags = VFIO_REGION_INFO_FLAG_READ
286                               | VFIO_REGION_INFO_FLAG_WRITE;
287                 return 0;
288         default: /* all other regions are handled via capability chain */
289         {
290                 struct vfio_info_cap caps = { .buf = NULL, .size = 0 };
291                 struct vfio_region_info_cap_type cap_type = {
292                         .header.id = VFIO_REGION_INFO_CAP_TYPE,
293                         .header.version = 1 };
294                 int ret;
295
296                 if (info->index >=
297                     VFIO_CCW_NUM_REGIONS + private->num_regions)
298                         return -EINVAL;
299
300                 info->index = array_index_nospec(info->index,
301                                                  VFIO_CCW_NUM_REGIONS +
302                                                  private->num_regions);
303
304                 i = info->index - VFIO_CCW_NUM_REGIONS;
305
306                 info->offset = VFIO_CCW_INDEX_TO_OFFSET(info->index);
307                 info->size = private->region[i].size;
308                 info->flags = private->region[i].flags;
309
310                 cap_type.type = private->region[i].type;
311                 cap_type.subtype = private->region[i].subtype;
312
313                 ret = vfio_info_add_capability(&caps, &cap_type.header,
314                                                sizeof(cap_type));
315                 if (ret)
316                         return ret;
317
318                 info->flags |= VFIO_REGION_INFO_FLAG_CAPS;
319                 if (info->argsz < sizeof(*info) + caps.size) {
320                         info->argsz = sizeof(*info) + caps.size;
321                         info->cap_offset = 0;
322                 } else {
323                         vfio_info_cap_shift(&caps, sizeof(*info));
324                         if (copy_to_user((void __user *)arg + sizeof(*info),
325                                          caps.buf, caps.size)) {
326                                 kfree(caps.buf);
327                                 return -EFAULT;
328                         }
329                         info->cap_offset = sizeof(*info);
330                 }
331
332                 kfree(caps.buf);
333
334         }
335         }
336         return 0;
337 }
338
339 static int vfio_ccw_mdev_get_irq_info(struct vfio_irq_info *info)
340 {
341         switch (info->index) {
342         case VFIO_CCW_IO_IRQ_INDEX:
343         case VFIO_CCW_CRW_IRQ_INDEX:
344         case VFIO_CCW_REQ_IRQ_INDEX:
345                 info->count = 1;
346                 info->flags = VFIO_IRQ_INFO_EVENTFD;
347                 break;
348         default:
349                 return -EINVAL;
350         }
351
352         return 0;
353 }
354
355 static int vfio_ccw_mdev_set_irqs(struct vfio_ccw_private *private,
356                                   uint32_t flags,
357                                   uint32_t index,
358                                   void __user *data)
359 {
360         struct eventfd_ctx **ctx;
361
362         if (!(flags & VFIO_IRQ_SET_ACTION_TRIGGER))
363                 return -EINVAL;
364
365         switch (index) {
366         case VFIO_CCW_IO_IRQ_INDEX:
367                 ctx = &private->io_trigger;
368                 break;
369         case VFIO_CCW_CRW_IRQ_INDEX:
370                 ctx = &private->crw_trigger;
371                 break;
372         case VFIO_CCW_REQ_IRQ_INDEX:
373                 ctx = &private->req_trigger;
374                 break;
375         default:
376                 return -EINVAL;
377         }
378
379         switch (flags & VFIO_IRQ_SET_DATA_TYPE_MASK) {
380         case VFIO_IRQ_SET_DATA_NONE:
381         {
382                 if (*ctx)
383                         eventfd_signal(*ctx, 1);
384                 return 0;
385         }
386         case VFIO_IRQ_SET_DATA_BOOL:
387         {
388                 uint8_t trigger;
389
390                 if (get_user(trigger, (uint8_t __user *)data))
391                         return -EFAULT;
392
393                 if (trigger && *ctx)
394                         eventfd_signal(*ctx, 1);
395                 return 0;
396         }
397         case VFIO_IRQ_SET_DATA_EVENTFD:
398         {
399                 int32_t fd;
400
401                 if (get_user(fd, (int32_t __user *)data))
402                         return -EFAULT;
403
404                 if (fd == -1) {
405                         if (*ctx)
406                                 eventfd_ctx_put(*ctx);
407                         *ctx = NULL;
408                 } else if (fd >= 0) {
409                         struct eventfd_ctx *efdctx;
410
411                         efdctx = eventfd_ctx_fdget(fd);
412                         if (IS_ERR(efdctx))
413                                 return PTR_ERR(efdctx);
414
415                         if (*ctx)
416                                 eventfd_ctx_put(*ctx);
417
418                         *ctx = efdctx;
419                 } else
420                         return -EINVAL;
421
422                 return 0;
423         }
424         default:
425                 return -EINVAL;
426         }
427 }
428
429 int vfio_ccw_register_dev_region(struct vfio_ccw_private *private,
430                                  unsigned int subtype,
431                                  const struct vfio_ccw_regops *ops,
432                                  size_t size, u32 flags, void *data)
433 {
434         struct vfio_ccw_region *region;
435
436         region = krealloc(private->region,
437                           (private->num_regions + 1) * sizeof(*region),
438                           GFP_KERNEL);
439         if (!region)
440                 return -ENOMEM;
441
442         private->region = region;
443         private->region[private->num_regions].type = VFIO_REGION_TYPE_CCW;
444         private->region[private->num_regions].subtype = subtype;
445         private->region[private->num_regions].ops = ops;
446         private->region[private->num_regions].size = size;
447         private->region[private->num_regions].flags = flags;
448         private->region[private->num_regions].data = data;
449
450         private->num_regions++;
451
452         return 0;
453 }
454
455 void vfio_ccw_unregister_dev_regions(struct vfio_ccw_private *private)
456 {
457         int i;
458
459         for (i = 0; i < private->num_regions; i++)
460                 private->region[i].ops->release(private, &private->region[i]);
461         private->num_regions = 0;
462         kfree(private->region);
463         private->region = NULL;
464 }
465
466 static ssize_t vfio_ccw_mdev_ioctl(struct vfio_device *vdev,
467                                    unsigned int cmd,
468                                    unsigned long arg)
469 {
470         struct vfio_ccw_private *private =
471                 container_of(vdev, struct vfio_ccw_private, vdev);
472         int ret = 0;
473         unsigned long minsz;
474
475         switch (cmd) {
476         case VFIO_DEVICE_GET_INFO:
477         {
478                 struct vfio_device_info info;
479
480                 minsz = offsetofend(struct vfio_device_info, num_irqs);
481
482                 if (copy_from_user(&info, (void __user *)arg, minsz))
483                         return -EFAULT;
484
485                 if (info.argsz < minsz)
486                         return -EINVAL;
487
488                 ret = vfio_ccw_mdev_get_device_info(private, &info);
489                 if (ret)
490                         return ret;
491
492                 return copy_to_user((void __user *)arg, &info, minsz) ? -EFAULT : 0;
493         }
494         case VFIO_DEVICE_GET_REGION_INFO:
495         {
496                 struct vfio_region_info info;
497
498                 minsz = offsetofend(struct vfio_region_info, offset);
499
500                 if (copy_from_user(&info, (void __user *)arg, minsz))
501                         return -EFAULT;
502
503                 if (info.argsz < minsz)
504                         return -EINVAL;
505
506                 ret = vfio_ccw_mdev_get_region_info(private, &info, arg);
507                 if (ret)
508                         return ret;
509
510                 return copy_to_user((void __user *)arg, &info, minsz) ? -EFAULT : 0;
511         }
512         case VFIO_DEVICE_GET_IRQ_INFO:
513         {
514                 struct vfio_irq_info info;
515
516                 minsz = offsetofend(struct vfio_irq_info, count);
517
518                 if (copy_from_user(&info, (void __user *)arg, minsz))
519                         return -EFAULT;
520
521                 if (info.argsz < minsz || info.index >= VFIO_CCW_NUM_IRQS)
522                         return -EINVAL;
523
524                 ret = vfio_ccw_mdev_get_irq_info(&info);
525                 if (ret)
526                         return ret;
527
528                 if (info.count == -1)
529                         return -EINVAL;
530
531                 return copy_to_user((void __user *)arg, &info, minsz) ? -EFAULT : 0;
532         }
533         case VFIO_DEVICE_SET_IRQS:
534         {
535                 struct vfio_irq_set hdr;
536                 size_t data_size;
537                 void __user *data;
538
539                 minsz = offsetofend(struct vfio_irq_set, count);
540
541                 if (copy_from_user(&hdr, (void __user *)arg, minsz))
542                         return -EFAULT;
543
544                 ret = vfio_set_irqs_validate_and_prepare(&hdr, 1,
545                                                          VFIO_CCW_NUM_IRQS,
546                                                          &data_size);
547                 if (ret)
548                         return ret;
549
550                 data = (void __user *)(arg + minsz);
551                 return vfio_ccw_mdev_set_irqs(private, hdr.flags, hdr.index,
552                                               data);
553         }
554         case VFIO_DEVICE_RESET:
555                 return vfio_ccw_mdev_reset(private);
556         default:
557                 return -ENOTTY;
558         }
559 }
560
561 /* Request removal of the device*/
562 static void vfio_ccw_mdev_request(struct vfio_device *vdev, unsigned int count)
563 {
564         struct vfio_ccw_private *private =
565                 container_of(vdev, struct vfio_ccw_private, vdev);
566         struct device *dev = vdev->dev;
567
568         if (private->req_trigger) {
569                 if (!(count % 10))
570                         dev_notice_ratelimited(dev,
571                                                "Relaying device request to user (#%u)\n",
572                                                count);
573
574                 eventfd_signal(private->req_trigger, 1);
575         } else if (count == 0) {
576                 dev_notice(dev,
577                            "No device request channel registered, blocked until released by user\n");
578         }
579 }
580
581 static const struct vfio_device_ops vfio_ccw_dev_ops = {
582         .init = vfio_ccw_mdev_init_dev,
583         .release = vfio_ccw_mdev_release_dev,
584         .open_device = vfio_ccw_mdev_open_device,
585         .close_device = vfio_ccw_mdev_close_device,
586         .read = vfio_ccw_mdev_read,
587         .write = vfio_ccw_mdev_write,
588         .ioctl = vfio_ccw_mdev_ioctl,
589         .request = vfio_ccw_mdev_request,
590         .dma_unmap = vfio_ccw_dma_unmap,
591 };
592
593 struct mdev_driver vfio_ccw_mdev_driver = {
594         .device_api = VFIO_DEVICE_API_CCW_STRING,
595         .max_instances = 1,
596         .driver = {
597                 .name = "vfio_ccw_mdev",
598                 .owner = THIS_MODULE,
599                 .mod_name = KBUILD_MODNAME,
600         },
601         .probe = vfio_ccw_mdev_probe,
602         .remove = vfio_ccw_mdev_remove,
603 };