mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-01-08 14:23:19 +00:00
0cc00c8d40
This patch fixes a lockdep splat introduced by commitf21916ec48
("s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated"). The lockdep splat only occurs when starting a Secure Execution guest. Crypto virtualization (vfio_ap) is not yet supported for SE guests; however, in order to avoid this problem when support becomes available, this fix is being provided. The circular locking dependency was introduced when the setting of the masks in the guest's APCB was executed while holding the matrix_dev->lock. While the lock is definitely needed to protect the setting/unsetting of the matrix_mdev->kvm pointer, it is not necessarily critical for setting the masks; so, the matrix_dev->lock will be released while the masks are being set or cleared. Keep in mind, however, that another process that takes the matrix_dev->lock can get control while the masks in the guest's APCB are being set or cleared as a result of the driver being notified that the KVM pointer has been set or unset. This could result in invalid access to the matrix_mdev->kvm pointer by the intervening process. To avoid this scenario, two new fields are being added to the ap_matrix_mdev struct: struct ap_matrix_mdev { ... bool kvm_busy; wait_queue_head_t wait_for_kvm; ... }; The functions that handle notification that the KVM pointer value has been set or cleared will set the kvm_busy flag to true until they are done processing at which time they will set it to false and wake up the tasks on the matrix_mdev->wait_for_kvm wait queue. Functions that require access to matrix_mdev->kvm will sleep on the wait queue until they are awakened at which time they can safely access the matrix_mdev->kvm field. Fixes:f21916ec48
("s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated") Cc: stable@vger.kernel.org Signed-off-by: Tony Krowiak <akrowiak@linux.ibm.com> Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
107 lines
3.2 KiB
C
107 lines
3.2 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
/*
|
|
* Private data and functions for adjunct processor VFIO matrix driver.
|
|
*
|
|
* Author(s): Tony Krowiak <akrowiak@linux.ibm.com>
|
|
* Halil Pasic <pasic@linux.ibm.com>
|
|
* Pierre Morel <pmorel@linux.ibm.com>
|
|
*
|
|
* Copyright IBM Corp. 2018
|
|
*/
|
|
|
|
#ifndef _VFIO_AP_PRIVATE_H_
|
|
#define _VFIO_AP_PRIVATE_H_
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/device.h>
|
|
#include <linux/mdev.h>
|
|
#include <linux/delay.h>
|
|
#include <linux/mutex.h>
|
|
#include <linux/kvm_host.h>
|
|
|
|
#include "ap_bus.h"
|
|
|
|
#define VFIO_AP_MODULE_NAME "vfio_ap"
|
|
#define VFIO_AP_DRV_NAME "vfio_ap"
|
|
|
|
/**
|
|
* ap_matrix_dev - the AP matrix device structure
|
|
* @device: generic device structure associated with the AP matrix device
|
|
* @available_instances: number of mediated matrix devices that can be created
|
|
* @info: the struct containing the output from the PQAP(QCI) instruction
|
|
* mdev_list: the list of mediated matrix devices created
|
|
* lock: mutex for locking the AP matrix device. This lock will be
|
|
* taken every time we fiddle with state managed by the vfio_ap
|
|
* driver, be it using @mdev_list or writing the state of a
|
|
* single ap_matrix_mdev device. It's quite coarse but we don't
|
|
* expect much contention.
|
|
*/
|
|
struct ap_matrix_dev {
|
|
struct device device;
|
|
atomic_t available_instances;
|
|
struct ap_config_info info;
|
|
struct list_head mdev_list;
|
|
struct mutex lock;
|
|
struct ap_driver *vfio_ap_drv;
|
|
};
|
|
|
|
extern struct ap_matrix_dev *matrix_dev;
|
|
|
|
/**
|
|
* The AP matrix is comprised of three bit masks identifying the adapters,
|
|
* queues (domains) and control domains that belong to an AP matrix. The bits i
|
|
* each mask, from least significant to most significant bit, correspond to IDs
|
|
* 0 to 255. When a bit is set, the corresponding ID belongs to the matrix.
|
|
*
|
|
* @apm_max: max adapter number in @apm
|
|
* @apm identifies the AP adapters in the matrix
|
|
* @aqm_max: max domain number in @aqm
|
|
* @aqm identifies the AP queues (domains) in the matrix
|
|
* @adm_max: max domain number in @adm
|
|
* @adm identifies the AP control domains in the matrix
|
|
*/
|
|
struct ap_matrix {
|
|
unsigned long apm_max;
|
|
DECLARE_BITMAP(apm, 256);
|
|
unsigned long aqm_max;
|
|
DECLARE_BITMAP(aqm, 256);
|
|
unsigned long adm_max;
|
|
DECLARE_BITMAP(adm, 256);
|
|
};
|
|
|
|
/**
|
|
* struct ap_matrix_mdev - the mediated matrix device structure
|
|
* @list: allows the ap_matrix_mdev struct to be added to a list
|
|
* @matrix: the adapters, usage domains and control domains assigned to the
|
|
* mediated matrix device.
|
|
* @group_notifier: notifier block used for specifying callback function for
|
|
* handling the VFIO_GROUP_NOTIFY_SET_KVM event
|
|
* @kvm: the struct holding guest's state
|
|
*/
|
|
struct ap_matrix_mdev {
|
|
struct list_head node;
|
|
struct ap_matrix matrix;
|
|
struct notifier_block group_notifier;
|
|
struct notifier_block iommu_notifier;
|
|
bool kvm_busy;
|
|
wait_queue_head_t wait_for_kvm;
|
|
struct kvm *kvm;
|
|
struct kvm_s390_module_hook pqap_hook;
|
|
struct mdev_device *mdev;
|
|
};
|
|
|
|
struct vfio_ap_queue {
|
|
struct ap_matrix_mdev *matrix_mdev;
|
|
unsigned long saved_pfn;
|
|
int apqn;
|
|
#define VFIO_AP_ISC_INVALID 0xff
|
|
unsigned char saved_isc;
|
|
};
|
|
|
|
int vfio_ap_mdev_register(void);
|
|
void vfio_ap_mdev_unregister(void);
|
|
int vfio_ap_mdev_reset_queue(struct vfio_ap_queue *q,
|
|
unsigned int retry);
|
|
|
|
#endif /* _VFIO_AP_PRIVATE_H_ */
|