1 =============================== 2 Adjunct Processor (AP) facility 3 =============================== 4 5 6 Introduction 7 ============ 8 The Adjunct Processor (AP) facility is an IBM Z cryptographic facility comprised 9 of three AP instructions and from 1 up to 256 PCIe cryptographic adapter cards. 10 The AP devices provide cryptographic functions to all CPUs assigned to a 11 linux system running in an IBM Z system LPAR. 12 13 The AP adapter cards are exposed via the AP bus. The motivation for vfio-ap 14 is to make AP cards available to KVM guests using the VFIO mediated device 15 framework. This implementation relies considerably on the s390 virtualization 16 facilities which do most of the hard work of providing direct access to AP 17 devices. 18 19 AP Architectural Overview 20 ========================= 21 To facilitate the comprehension of the design, let's start with some 22 definitions: 23 24 * AP adapter 25 26 An AP adapter is an IBM Z adapter card that can perform cryptographic 27 functions. There can be from 0 to 256 adapters assigned to an LPAR. Adapters 28 assigned to the LPAR in which a linux host is running will be available to 29 the linux host. Each adapter is identified by a number from 0 to 255; however, 30 the maximum adapter number is determined by machine model and/or adapter type. 31 When installed, an AP adapter is accessed by AP instructions executed by any 32 CPU. 33 34 The AP adapter cards are assigned to a given LPAR via the system's Activation 35 Profile which can be edited via the HMC. When the linux host system is IPL'd 36 in the LPAR, the AP bus detects the AP adapter cards assigned to the LPAR and 37 creates a sysfs device for each assigned adapter. For example, if AP adapters 38 4 and 10 (0x0a) are assigned to the LPAR, the AP bus will create the following 39 sysfs device entries:: 40 41 /sys/devices/ap/card04 42 /sys/devices/ap/card0a 43 44 Symbolic links to these devices will also be created in the AP bus devices 45 sub-directory:: 46 47 /sys/bus/ap/devices/[card04] 48 /sys/bus/ap/devices/[card04] 49 50 * AP domain 51 52 An adapter is partitioned into domains. An adapter can hold up to 256 domains 53 depending upon the adapter type and hardware configuration. A domain is 54 identified by a number from 0 to 255; however, the maximum domain number is 55 determined by machine model and/or adapter type.. A domain can be thought of 56 as a set of hardware registers and memory used for processing AP commands. A 57 domain can be configured with a secure private key used for clear key 58 encryption. A domain is classified in one of two ways depending upon how it 59 may be accessed: 60 61 * Usage domains are domains that are targeted by an AP instruction to 62 process an AP command. 63 64 * Control domains are domains that are changed by an AP command sent to a 65 usage domain; for example, to set the secure private key for the control 66 domain. 67 68 The AP usage and control domains are assigned to a given LPAR via the system's 69 Activation Profile which can be edited via the HMC. When a linux host system 70 is IPL'd in the LPAR, the AP bus module detects the AP usage and control 71 domains assigned to the LPAR. The domain number of each usage domain and 72 adapter number of each AP adapter are combined to create AP queue devices 73 (see AP Queue section below). The domain number of each control domain will be 74 represented in a bitmask and stored in a sysfs file 75 /sys/bus/ap/ap_control_domain_mask. The bits in the mask, from most to least 76 significant bit, correspond to domains 0-255. 77 78 * AP Queue 79 80 An AP queue is the means by which an AP command is sent to a usage domain 81 inside a specific adapter. An AP queue is identified by a tuple 82 comprised of an AP adapter ID (APID) and an AP queue index (APQI). The 83 APQI corresponds to a given usage domain number within the adapter. This tuple 84 forms an AP Queue Number (APQN) uniquely identifying an AP queue. AP 85 instructions include a field containing the APQN to identify the AP queue to 86 which the AP command is to be sent for processing. 87 88 The AP bus will create a sysfs device for each APQN that can be derived from 89 the cross product of the AP adapter and usage domain numbers detected when the 90 AP bus module is loaded. For example, if adapters 4 and 10 (0x0a) and usage 91 domains 6 and 71 (0x47) are assigned to the LPAR, the AP bus will create the 92 following sysfs entries:: 93 94 /sys/devices/ap/card04/04.0006 95 /sys/devices/ap/card04/04.0047 96 /sys/devices/ap/card0a/0a.0006 97 /sys/devices/ap/card0a/0a.0047 98 99 The following symbolic links to these devices will be created in the AP bus 100 devices subdirectory:: 101 102 /sys/bus/ap/devices/[04.0006] 103 /sys/bus/ap/devices/[04.0047] 104 /sys/bus/ap/devices/[0a.0006] 105 /sys/bus/ap/devices/[0a.0047] 106 107 * AP Instructions: 108 109 There are three AP instructions: 110 111 * NQAP: to enqueue an AP command-request message to a queue 112 * DQAP: to dequeue an AP command-reply message from a queue 113 * PQAP: to administer the queues 114 115 AP instructions identify the domain that is targeted to process the AP 116 command; this must be one of the usage domains. An AP command may modify a 117 domain that is not one of the usage domains, but the modified domain 118 must be one of the control domains. 119 120 AP and SIE 121 ========== 122 Let's now take a look at how AP instructions executed on a guest are interpreted 123 by the hardware. 124 125 A satellite control block called the Crypto Control Block (CRYCB) is attached to 126 our main hardware virtualization control block. The CRYCB contains an AP Control 127 Block (APCB) that has three fields to identify the adapters, usage domains and 128 control domains assigned to the KVM guest: 129 130 * The AP Mask (APM) field is a bit mask that identifies the AP adapters assigned 131 to the KVM guest. Each bit in the mask, from left to right, corresponds to 132 an APID from 0-255. If a bit is set, the corresponding adapter is valid for 133 use by the KVM guest. 134 135 * The AP Queue Mask (AQM) field is a bit mask identifying the AP usage domains 136 assigned to the KVM guest. Each bit in the mask, from left to right, 137 corresponds to an AP queue index (APQI) from 0-255. If a bit is set, the 138 corresponding queue is valid for use by the KVM guest. 139 140 * The AP Domain Mask field is a bit mask that identifies the AP control domains 141 assigned to the KVM guest. The ADM bit mask controls which domains can be 142 changed by an AP command-request message sent to a usage domain from the 143 guest. Each bit in the mask, from left to right, corresponds to a domain from 144 0-255. If a bit is set, the corresponding domain can be modified by an AP 145 command-request message sent to a usage domain. 146 147 If you recall from the description of an AP Queue, AP instructions include 148 an APQN to identify the AP queue to which an AP command-request message is to be 149 sent (NQAP and PQAP instructions), or from which a command-reply message is to 150 be received (DQAP instruction). The validity of an APQN is defined by the matrix 151 calculated from the APM and AQM; it is the Cartesian product of all assigned 152 adapter numbers (APM) with all assigned queue indexes (AQM). For example, if 153 adapters 1 and 2 and usage domains 5 and 6 are assigned to a guest, the APQNs 154 (1,5), (1,6), (2,5) and (2,6) will be valid for the guest. 155 156 The APQNs can provide secure key functionality - i.e., a private key is stored 157 on the adapter card for each of its domains - so each APQN must be assigned to 158 at most one guest or to the linux host:: 159 160 Example 1: Valid configuration: 161 ------------------------------ 162 Guest1: adapters 1,2 domains 5,6 163 Guest2: adapter 1,2 domain 7 164 165 This is valid because both guests have a unique set of APQNs: 166 Guest1 has APQNs (1,5), (1,6), (2,5), (2,6); 167 Guest2 has APQNs (1,7), (2,7) 168 169 Example 2: Valid configuration: 170 ------------------------------ 171 Guest1: adapters 1,2 domains 5,6 172 Guest2: adapters 3,4 domains 5,6 173 174 This is also valid because both guests have a unique set of APQNs: 175 Guest1 has APQNs (1,5), (1,6), (2,5), (2,6); 176 Guest2 has APQNs (3,5), (3,6), (4,5), (4,6) 177 178 Example 3: Invalid configuration: 179 -------------------------------- 180 Guest1: adapters 1,2 domains 5,6 181 Guest2: adapter 1 domains 6,7 182 183 This is an invalid configuration because both guests have access to 184 APQN (1,6). 185 186 The Design 187 ========== 188 The design introduces three new objects: 189 190 1. AP matrix device 191 2. VFIO AP device driver (vfio_ap.ko) 192 3. VFIO AP mediated pass-through device 193 194 The VFIO AP device driver 195 ------------------------- 196 The VFIO AP (vfio_ap) device driver serves the following purposes: 197 198 1. Provides the interfaces to secure APQNs for exclusive use of KVM guests. 199 200 2. Sets up the VFIO mediated device interfaces to manage a vfio_ap mediated 201 device and creates the sysfs interfaces for assigning adapters, usage 202 domains, and control domains comprising the matrix for a KVM guest. 203 204 3. Configures the APM, AQM and ADM in the APCB contained in the CRYCB referenced 205 by a KVM guest's SIE state description to grant the guest access to a matrix 206 of AP devices 207 208 Reserve APQNs for exclusive use of KVM guests 209 --------------------------------------------- 210 The following block diagram illustrates the mechanism by which APQNs are 211 reserved:: 212 213 +------------------+ 214 7 remove | | 215 +--------------------> cex4queue driver | 216 | | | 217 | +------------------+ 218 | 219 | 220 | +------------------+ +----------------+ 221 | 5 register driver | | 3 create | | 222 | +----------------> Device core +----------> matrix device | 223 | | | | | | 224 | | +--------^---------+ +----------------+ 225 | | | 226 | | +-------------------+ 227 | | +-----------------------------------+ | 228 | | | 4 register AP driver | | 2 register device 229 | | | | | 230 +--------+---+-v---+ +--------+-------+-+ 231 | | | | 232 | ap_bus +--------------------- > vfio_ap driver | 233 | | 8 probe | | 234 +--------^---------+ +--^--^------------+ 235 6 edit | | | 236 apmask | +-----------------------------+ | 11 mdev create 237 aqmask | | 1 modprobe | 238 +--------+-----+---+ +----------------+-+ +----------------+ 239 | | | |10 create| mediated | 240 | admin | | VFIO device core |---------> matrix | 241 | + | | | device | 242 +------+-+---------+ +--------^---------+ +--------^-------+ 243 | | | | 244 | | 9 create vfio_ap-passthrough | | 245 | +------------------------------+ | 246 +-------------------------------------------------------------+ 247 12 assign adapter/domain/control domain 248 249 The process for reserving an AP queue for use by a KVM guest is: 250 251 1. The administrator loads the vfio_ap device driver 252 2. The vfio-ap driver during its initialization will register a single 'matrix' 253 device with the device core. This will serve as the parent device for 254 all vfio_ap mediated devices used to configure an AP matrix for a guest. 255 3. The /sys/devices/vfio_ap/matrix device is created by the device core 256 4. The vfio_ap device driver will register with the AP bus for AP queue devices 257 of type 10 and higher (CEX4 and newer). The driver will provide the vfio_ap 258 driver's probe and remove callback interfaces. Devices older than CEX4 queues 259 are not supported to simplify the implementation by not needlessly 260 complicating the design by supporting older devices that will go out of 261 service in the relatively near future, and for which there are few older 262 systems around on which to test. 263 5. The AP bus registers the vfio_ap device driver with the device core 264 6. The administrator edits the AP adapter and queue masks to reserve AP queues 265 for use by the vfio_ap device driver. 266 7. The AP bus removes the AP queues reserved for the vfio_ap driver from the 267 default zcrypt cex4queue driver. 268 8. The AP bus probes the vfio_ap device driver to bind the queues reserved for 269 it. 270 9. The administrator creates a passthrough type vfio_ap mediated device to be 271 used by a guest 272 10. The administrator assigns the adapters, usage domains and control domains 273 to be exclusively used by a guest. 274 275 Set up the VFIO mediated device interfaces 276 ------------------------------------------ 277 The VFIO AP device driver utilizes the common interfaces of the VFIO mediated 278 device core driver to: 279 280 * Register an AP mediated bus driver to add a vfio_ap mediated device to and 281 remove it from a VFIO group. 282 * Create and destroy a vfio_ap mediated device 283 * Add a vfio_ap mediated device to and remove it from the AP mediated bus driver 284 * Add a vfio_ap mediated device to and remove it from an IOMMU group 285 286 The following high-level block diagram shows the main components and interfaces 287 of the VFIO AP mediated device driver:: 288 289 +-------------+ 290 | | 291 | +---------+ | mdev_register_driver() +--------------+ 292 | | Mdev | +<-----------------------+ | 293 | | bus | | | vfio_mdev.ko | 294 | | driver | +----------------------->+ |<-> VFIO user 295 | +---------+ | probe()/remove() +--------------+ APIs 296 | | 297 | MDEV CORE | 298 | MODULE | 299 | mdev.ko | 300 | +---------+ | mdev_register_parent() +--------------+ 301 | |Physical | +<-----------------------+ | 302 | | device | | | vfio_ap.ko |<-> matrix 303 | |interface| +----------------------->+ | device 304 | +---------+ | callback +--------------+ 305 +-------------+ 306 307 During initialization of the vfio_ap module, the matrix device is registered 308 with an 'mdev_parent_ops' structure that provides the sysfs attribute 309 structures, mdev functions and callback interfaces for managing the mediated 310 matrix device. 311 312 * sysfs attribute structures: 313 314 supported_type_groups 315 The VFIO mediated device framework supports creation of user-defined 316 mediated device types. These mediated device types are specified 317 via the 'supported_type_groups' structure when a device is registered 318 with the mediated device framework. The registration process creates the 319 sysfs structures for each mediated device type specified in the 320 'mdev_supported_types' sub-directory of the device being registered. Along 321 with the device type, the sysfs attributes of the mediated device type are 322 provided. 323 324 The VFIO AP device driver will register one mediated device type for 325 passthrough devices: 326 327 /sys/devices/vfio_ap/matrix/mdev_supported_types/vfio_ap-passthrough 328 329 Only the read-only attributes required by the VFIO mdev framework will 330 be provided:: 331 332 ... name 333 ... device_api 334 ... available_instances 335 ... device_api 336 337 Where: 338 339 * name: 340 specifies the name of the mediated device type 341 * device_api: 342 the mediated device type's API 343 * available_instances: 344 the number of vfio_ap mediated passthrough devices 345 that can be created 346 * device_api: 347 specifies the VFIO API 348 mdev_attr_groups 349 This attribute group identifies the user-defined sysfs attributes of the 350 mediated device. When a device is registered with the VFIO mediated device 351 framework, the sysfs attribute files identified in the 'mdev_attr_groups' 352 structure will be created in the vfio_ap mediated device's directory. The 353 sysfs attributes for a vfio_ap mediated device are: 354 355 assign_adapter / unassign_adapter: 356 Write-only attributes for assigning/unassigning an AP adapter to/from the 357 vfio_ap mediated device. To assign/unassign an adapter, the APID of the 358 adapter is echoed into the respective attribute file. 359 assign_domain / unassign_domain: 360 Write-only attributes for assigning/unassigning an AP usage domain to/from 361 the vfio_ap mediated device. To assign/unassign a domain, the domain 362 number of the usage domain is echoed into the respective attribute 363 file. 364 matrix: 365 A read-only file for displaying the APQNs derived from the Cartesian 366 product of the adapter and domain numbers assigned to the vfio_ap mediated 367 device. 368 guest_matrix: 369 A read-only file for displaying the APQNs derived from the Cartesian 370 product of the adapter and domain numbers assigned to the APM and AQM 371 fields respectively of the KVM guest's CRYCB. This may differ from the 372 the APQNs assigned to the vfio_ap mediated device if any APQN does not 373 reference a queue device bound to the vfio_ap device driver (i.e., the 374 queue is not in the host's AP configuration). 375 assign_control_domain / unassign_control_domain: 376 Write-only attributes for assigning/unassigning an AP control domain 377 to/from the vfio_ap mediated device. To assign/unassign a control domain, 378 the ID of the domain to be assigned/unassigned is echoed into the 379 respective attribute file. 380 control_domains: 381 A read-only file for displaying the control domain numbers assigned to the 382 vfio_ap mediated device. 383 ap_config: 384 A read/write file that, when written to, allows all three of the 385 vfio_ap mediated device's ap matrix masks to be replaced in one shot. 386 Three masks are given, one for adapters, one for domains, and one for 387 control domains. If the given state cannot be set then no changes are 388 made to the vfio-ap mediated device. 389 390 The format of the data written to ap_config is as follows: 391 {amask},{dmask},{cmask}\n 392 393 \n is a newline character. 394 395 amask, dmask, and cmask are masks identifying which adapters, domains, 396 and control domains should be assigned to the mediated device. 397 398 The format of a mask is as follows: 399 0xNN..NN 400 401 Where NN..NN is 64 hexadecimal characters representing a 256-bit value. 402 The leftmost (highest order) bit represents adapter/domain 0. 403 404 For an example set of masks that represent your mdev's current 405 configuration, simply cat ap_config. 406 407 Setting an adapter or domain number greater than the maximum allowed for 408 the system will result in an error. 409 410 This attribute is intended to be used by automation. End users would be 411 better served using the respective assign/unassign attributes for 412 adapters, domains, and control domains. 413 414 * functions: 415 416 create: 417 allocates the ap_matrix_mdev structure used by the vfio_ap driver to: 418 419 * Store the reference to the KVM structure for the guest using the mdev 420 * Store the AP matrix configuration for the adapters, domains, and control 421 domains assigned via the corresponding sysfs attributes files 422 * Store the AP matrix configuration for the adapters, domains and control 423 domains available to a guest. A guest may not be provided access to APQNs 424 referencing queue devices that do not exist, or are not bound to the 425 vfio_ap device driver. 426 427 remove: 428 deallocates the vfio_ap mediated device's ap_matrix_mdev structure. 429 This will be allowed only if a running guest is not using the mdev. 430 431 * callback interfaces 432 433 open_device: 434 The vfio_ap driver uses this callback to register a 435 VFIO_GROUP_NOTIFY_SET_KVM notifier callback function for the matrix mdev 436 devices. The open_device callback is invoked by userspace to connect the 437 VFIO iommu group for the matrix mdev device to the MDEV bus. Access to the 438 KVM structure used to configure the KVM guest is provided via this callback. 439 The KVM structure, is used to configure the guest's access to the AP matrix 440 defined via the vfio_ap mediated device's sysfs attribute files. 441 442 close_device: 443 unregisters the VFIO_GROUP_NOTIFY_SET_KVM notifier callback function for the 444 matrix mdev device and deconfigures the guest's AP matrix. 445 446 ioctl: 447 this callback handles the VFIO_DEVICE_GET_INFO and VFIO_DEVICE_RESET ioctls 448 defined by the vfio framework. 449 450 Configure the guest's AP resources 451 ---------------------------------- 452 Configuring the AP resources for a KVM guest will be performed when the 453 VFIO_GROUP_NOTIFY_SET_KVM notifier callback is invoked. The notifier 454 function is called when userspace connects to KVM. The guest's AP resources are 455 configured via its APCB by: 456 457 * Setting the bits in the APM corresponding to the APIDs assigned to the 458 vfio_ap mediated device via its 'assign_adapter' interface. 459 * Setting the bits in the AQM corresponding to the domains assigned to the 460 vfio_ap mediated device via its 'assign_domain' interface. 461 * Setting the bits in the ADM corresponding to the domain dIDs assigned to the 462 vfio_ap mediated device via its 'assign_control_domains' interface. 463 464 The linux device model precludes passing a device through to a KVM guest that 465 is not bound to the device driver facilitating its pass-through. Consequently, 466 an APQN that does not reference a queue device bound to the vfio_ap device 467 driver will not be assigned to a KVM guest's matrix. The AP architecture, 468 however, does not provide a means to filter individual APQNs from the guest's 469 matrix, so the adapters, domains and control domains assigned to vfio_ap 470 mediated device via its sysfs 'assign_adapter', 'assign_domain' and 471 'assign_control_domain' interfaces will be filtered before providing the AP 472 configuration to a guest: 473 474 * The APIDs of the adapters, the APQIs of the domains and the domain numbers of 475 the control domains assigned to the matrix mdev that are not also assigned to 476 the host's AP configuration will be filtered. 477 478 * Each APQN derived from the Cartesian product of the APIDs and APQIs assigned 479 to the vfio_ap mdev is examined and if any one of them does not reference a 480 queue device bound to the vfio_ap device driver, the adapter will not be 481 plugged into the guest (i.e., the bit corresponding to its APID will not be 482 set in the APM of the guest's APCB). 483 484 The CPU model features for AP 485 ----------------------------- 486 The AP stack relies on the presence of the AP instructions as well as three 487 facilities: The AP Facilities Test (APFT) facility; the AP Query 488 Configuration Information (QCI) facility; and the AP Queue Interruption Control 489 facility. These features/facilities are made available to a KVM guest via the 490 following CPU model features: 491 492 1. ap: Indicates whether the AP instructions are installed on the guest. This 493 feature will be enabled by KVM only if the AP instructions are installed 494 on the host. 495 496 2. apft: Indicates the APFT facility is available on the guest. This facility 497 can be made available to the guest only if it is available on the host (i.e., 498 facility bit 15 is set). 499 500 3. apqci: Indicates the AP QCI facility is available on the guest. This facility 501 can be made available to the guest only if it is available on the host (i.e., 502 facility bit 12 is set). 503 504 4. apqi: Indicates AP Queue Interruption Control faclity is available on the 505 guest. This facility can be made available to the guest only if it is 506 available on the host (i.e., facility bit 65 is set). 507 508 Note: If the user chooses to specify a CPU model different than the 'host' 509 model to QEMU, the CPU model features and facilities need to be turned on 510 explicitly; for example:: 511 512 /usr/bin/qemu-system-s390x ... -cpu z13,ap=on,apqci=on,apft=on,apqi=on 513 514 A guest can be precluded from using AP features/facilities by turning them off 515 explicitly; for example:: 516 517 /usr/bin/qemu-system-s390x ... -cpu host,ap=off,apqci=off,apft=off,apqi=off 518 519 Note: If the APFT facility is turned off (apft=off) for the guest, the guest 520 will not see any AP devices. The zcrypt device drivers on the guest that 521 register for type 10 and newer AP devices - i.e., the cex4card and cex4queue 522 device drivers - need the APFT facility to ascertain the facilities installed on 523 a given AP device. If the APFT facility is not installed on the guest, then no 524 adapter or domain devices will get created by the AP bus running on the 525 guest because only type 10 and newer devices can be configured for guest use. 526 527 Example 528 ======= 529 Let's now provide an example to illustrate how KVM guests may be given 530 access to AP facilities. For this example, we will show how to configure 531 three guests such that executing the lszcrypt command on the guests would 532 look like this: 533 534 Guest1 535 ------ 536 =========== ===== ============ 537 CARD.DOMAIN TYPE MODE 538 =========== ===== ============ 539 05 CEX5C CCA-Coproc 540 05.0004 CEX5C CCA-Coproc 541 05.00ab CEX5C CCA-Coproc 542 06 CEX5A Accelerator 543 06.0004 CEX5A Accelerator 544 06.00ab CEX5A Accelerator 545 =========== ===== ============ 546 547 Guest2 548 ------ 549 =========== ===== ============ 550 CARD.DOMAIN TYPE MODE 551 =========== ===== ============ 552 05 CEX5C CCA-Coproc 553 05.0047 CEX5C CCA-Coproc 554 05.00ff CEX5C CCA-Coproc 555 =========== ===== ============ 556 557 Guest3 558 ------ 559 =========== ===== ============ 560 CARD.DOMAIN TYPE MODE 561 =========== ===== ============ 562 06 CEX5A Accelerator 563 06.0047 CEX5A Accelerator 564 06.00ff CEX5A Accelerator 565 =========== ===== ============ 566 567 These are the steps: 568 569 1. Install the vfio_ap module on the linux host. The dependency chain for the 570 vfio_ap module is: 571 * iommu 572 * s390 573 * zcrypt 574 * vfio 575 * vfio_mdev 576 * vfio_mdev_device 577 * KVM 578 579 To build the vfio_ap module, the kernel build must be configured with the 580 following Kconfig elements selected: 581 * IOMMU_SUPPORT 582 * S390 583 * AP 584 * VFIO 585 * KVM 586 587 If using make menuconfig select the following to build the vfio_ap module:: 588 589 -> Device Drivers 590 -> IOMMU Hardware Support 591 select S390 AP IOMMU Support 592 -> VFIO Non-Privileged userspace driver framework 593 -> Mediated device driver frramework 594 -> VFIO driver for Mediated devices 595 -> I/O subsystem 596 -> VFIO support for AP devices 597 598 2. Secure the AP queues to be used by the three guests so that the host can not 599 access them. To secure them, there are two sysfs files that specify 600 bitmasks marking a subset of the APQN range as usable only by the default AP 601 queue device drivers. All remaining APQNs are available for use by 602 any other device driver. The vfio_ap device driver is currently the only 603 non-default device driver. The location of the sysfs files containing the 604 masks are:: 605 606 /sys/bus/ap/apmask 607 /sys/bus/ap/aqmask 608 609 The 'apmask' is a 256-bit mask that identifies a set of AP adapter IDs 610 (APID). Each bit in the mask, from left to right, corresponds to an APID from 611 0-255. If a bit is set, the APID belongs to the subset of APQNs marked as 612 available only to the default AP queue device drivers. 613 614 The 'aqmask' is a 256-bit mask that identifies a set of AP queue indexes 615 (APQI). Each bit in the mask, from left to right, corresponds to an APQI from 616 0-255. If a bit is set, the APQI belongs to the subset of APQNs marked as 617 available only to the default AP queue device drivers. 618 619 The Cartesian product of the APIDs corresponding to the bits set in the 620 apmask and the APQIs corresponding to the bits set in the aqmask comprise 621 the subset of APQNs that can be used only by the host default device drivers. 622 All other APQNs are available to the non-default device drivers such as the 623 vfio_ap driver. 624 625 Take, for example, the following masks:: 626 627 apmask: 628 0x7d00000000000000000000000000000000000000000000000000000000000000 629 630 aqmask: 631 0x8000000000000000000000000000000000000000000000000000000000000000 632 633 The masks indicate: 634 635 * Adapters 1, 2, 3, 4, 5, and 7 are available for use by the host default 636 device drivers. 637 638 * Domain 0 is available for use by the host default device drivers 639 640 * The subset of APQNs available for use only by the default host device 641 drivers are: 642 643 (1,0), (2,0), (3,0), (4.0), (5,0) and (7,0) 644 645 * All other APQNs are available for use by the non-default device drivers. 646 647 The APQN of each AP queue device assigned to the linux host is checked by the 648 AP bus against the set of APQNs derived from the Cartesian product of APIDs 649 and APQIs marked as available to the default AP queue device drivers. If a 650 match is detected, only the default AP queue device drivers will be probed; 651 otherwise, the vfio_ap device driver will be probed. 652 653 By default, the two masks are set to reserve all APQNs for use by the default 654 AP queue device drivers. There are two ways the default masks can be changed: 655 656 1. The sysfs mask files can be edited by echoing a string into the 657 respective sysfs mask file in one of two formats: 658 659 * An absolute hex string starting with 0x - like "0x12345678" - sets 660 the mask. If the given string is shorter than the mask, it is padded 661 with 0s on the right; for example, specifying a mask value of 0x41 is 662 the same as specifying:: 663 664 0x4100000000000000000000000000000000000000000000000000000000000000 665 666 Keep in mind that the mask reads from left to right, so the mask 667 above identifies device numbers 1 and 7 (01000001). 668 669 If the string is longer than the mask, the operation is terminated with 670 an error (EINVAL). 671 672 * Individual bits in the mask can be switched on and off by specifying 673 each bit number to be switched in a comma separated list. Each bit 674 number string must be prepended with a ('+') or minus ('-') to indicate 675 the corresponding bit is to be switched on ('+') or off ('-'). Some 676 valid values are: 677 678 - "+0" switches bit 0 on 679 - "-13" switches bit 13 off 680 - "+0x41" switches bit 65 on 681 - "-0xff" switches bit 255 off 682 683 The following example: 684 685 +0,-6,+0x47,-0xf0 686 687 Switches bits 0 and 71 (0x47) on 688 689 Switches bits 6 and 240 (0xf0) off 690 691 Note that the bits not specified in the list remain as they were before 692 the operation. 693 694 2. The masks can also be changed at boot time via parameters on the kernel 695 command line like this: 696 697 ap.apmask=0xffff ap.aqmask=0x40 698 699 This would create the following masks:: 700 701 apmask: 702 0xffff000000000000000000000000000000000000000000000000000000000000 703 704 aqmask: 705 0x4000000000000000000000000000000000000000000000000000000000000000 706 707 Resulting in these two pools:: 708 709 default drivers pool: adapter 0-15, domain 1 710 alternate drivers pool: adapter 16-255, domains 0, 2-255 711 712 **Note:** 713 Changing a mask such that one or more APQNs will be taken from a vfio_ap 714 mediated device (see below) will fail with an error (EBUSY). A message 715 is logged to the kernel ring buffer which can be viewed with the 'dmesg' 716 command. The output identifies each APQN flagged as 'in use' and identifies 717 the vfio_ap mediated device to which it is assigned; for example: 718 719 Userspace may not re-assign queue 05.0054 already assigned to 62177883-f1bb-47f0-914d-32a22e3a8804 720 Userspace may not re-assign queue 04.0054 already assigned to cef03c3c-903d-4ecc-9a83-40694cb8aee4 721 722 Securing the APQNs for our example 723 ---------------------------------- 724 To secure the AP queues 05.0004, 05.0047, 05.00ab, 05.00ff, 06.0004, 06.0047, 725 06.00ab, and 06.00ff for use by the vfio_ap device driver, the corresponding 726 APQNs can be removed from the default masks using either of the following 727 commands:: 728 729 echo -5,-6 > /sys/bus/ap/apmask 730 731 echo -4,-0x47,-0xab,-0xff > /sys/bus/ap/aqmask 732 733 Or the masks can be set as follows:: 734 735 echo 0xf9ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff \ 736 > apmask 737 738 echo 0xf7fffffffffffffffeffffffffffffffffffffffffeffffffffffffffffffffe \ 739 > aqmask 740 741 This will result in AP queues 05.0004, 05.0047, 05.00ab, 05.00ff, 06.0004, 742 06.0047, 06.00ab, and 06.00ff getting bound to the vfio_ap device driver. The 743 sysfs directory for the vfio_ap device driver will now contain symbolic links 744 to the AP queue devices bound to it:: 745 746 /sys/bus/ap 747 ... [drivers] 748 ...... [vfio_ap] 749 ......... [05.0004] 750 ......... [05.0047] 751 ......... [05.00ab] 752 ......... [05.00ff] 753 ......... [06.0004] 754 ......... [06.0047] 755 ......... [06.00ab] 756 ......... [06.00ff] 757 758 Keep in mind that only type 10 and newer adapters (i.e., CEX4 and later) 759 can be bound to the vfio_ap device driver. The reason for this is to 760 simplify the implementation by not needlessly complicating the design by 761 supporting older devices that will go out of service in the relatively near 762 future and for which there are few older systems on which to test. 763 764 The administrator, therefore, must take care to secure only AP queues that 765 can be bound to the vfio_ap device driver. The device type for a given AP 766 queue device can be read from the parent card's sysfs directory. For example, 767 to see the hardware type of the queue 05.0004: 768 769 cat /sys/bus/ap/devices/card05/hwtype 770 771 The hwtype must be 10 or higher (CEX4 or newer) in order to be bound to the 772 vfio_ap device driver. 773 774 3. Create the mediated devices needed to configure the AP matrixes for the 775 three guests and to provide an interface to the vfio_ap driver for 776 use by the guests:: 777 778 /sys/devices/vfio_ap/matrix/ 779 --- [mdev_supported_types] 780 ------ [vfio_ap-passthrough] (passthrough vfio_ap mediated device type) 781 --------- create 782 --------- [devices] 783 784 To create the mediated devices for the three guests:: 785 786 uuidgen > create 787 uuidgen > create 788 uuidgen > create 789 790 or 791 792 echo $uuid1 > create 793 echo $uuid2 > create 794 echo $uuid3 > create 795 796 This will create three mediated devices in the [devices] subdirectory named 797 after the UUID written to the create attribute file. We call them $uuid1, 798 $uuid2 and $uuid3 and this is the sysfs directory structure after creation:: 799 800 /sys/devices/vfio_ap/matrix/ 801 --- [mdev_supported_types] 802 ------ [vfio_ap-passthrough] 803 --------- [devices] 804 ------------ [$uuid1] 805 --------------- assign_adapter 806 --------------- assign_control_domain 807 --------------- assign_domain 808 --------------- matrix 809 --------------- unassign_adapter 810 --------------- unassign_control_domain 811 --------------- unassign_domain 812 813 ------------ [$uuid2] 814 --------------- assign_adapter 815 --------------- assign_control_domain 816 --------------- assign_domain 817 --------------- matrix 818 --------------- unassign_adapter 819 ----------------unassign_control_domain 820 ----------------unassign_domain 821 822 ------------ [$uuid3] 823 --------------- assign_adapter 824 --------------- assign_control_domain 825 --------------- assign_domain 826 --------------- matrix 827 --------------- unassign_adapter 828 ----------------unassign_control_domain 829 ----------------unassign_domain 830 831 Note *****: The vfio_ap mdevs do not persist across reboots unless the 832 mdevctl tool is used to create and persist them. 833 834 4. The administrator now needs to configure the matrixes for the mediated 835 devices $uuid1 (for Guest1), $uuid2 (for Guest2) and $uuid3 (for Guest3). 836 837 This is how the matrix is configured for Guest1:: 838 839 echo 5 > assign_adapter 840 echo 6 > assign_adapter 841 echo 4 > assign_domain 842 echo 0xab > assign_domain 843 844 Control domains can similarly be assigned using the assign_control_domain 845 sysfs file. 846 847 If a mistake is made configuring an adapter, domain or control domain, 848 you can use the unassign_xxx files to unassign the adapter, domain or 849 control domain. 850 851 To display the matrix configuration for Guest1:: 852 853 cat matrix 854 855 To display the matrix that is or will be assigned to Guest1:: 856 857 cat guest_matrix 858 859 This is how the matrix is configured for Guest2:: 860 861 echo 5 > assign_adapter 862 echo 0x47 > assign_domain 863 echo 0xff > assign_domain 864 865 This is how the matrix is configured for Guest3:: 866 867 echo 6 > assign_adapter 868 echo 0x47 > assign_domain 869 echo 0xff > assign_domain 870 871 In order to successfully assign an adapter: 872 873 * The adapter number specified must represent a value from 0 up to the 874 maximum adapter number configured for the system. If an adapter number 875 higher than the maximum is specified, the operation will terminate with 876 an error (ENODEV). 877 878 Note: The maximum adapter number can be obtained via the sysfs 879 /sys/bus/ap/ap_max_adapter_id attribute file. 880 881 * Each APQN derived from the Cartesian product of the APID of the adapter 882 being assigned and the APQIs of the domains previously assigned: 883 884 - Must only be available to the vfio_ap device driver as specified in the 885 sysfs /sys/bus/ap/apmask and /sys/bus/ap/aqmask attribute files. If even 886 one APQN is reserved for use by the host device driver, the operation 887 will terminate with an error (EADDRNOTAVAIL). 888 889 - Must NOT be assigned to another vfio_ap mediated device. If even one APQN 890 is assigned to another vfio_ap mediated device, the operation will 891 terminate with an error (EBUSY). 892 893 - Must NOT be assigned while the sysfs /sys/bus/ap/apmask and 894 sys/bus/ap/aqmask attribute files are being edited or the operation may 895 terminate with an error (EBUSY). 896 897 In order to successfully assign a domain: 898 899 * The domain number specified must represent a value from 0 up to the 900 maximum domain number configured for the system. If a domain number 901 higher than the maximum is specified, the operation will terminate with 902 an error (ENODEV). 903 904 Note: The maximum domain number can be obtained via the sysfs 905 /sys/bus/ap/ap_max_domain_id attribute file. 906 907 * Each APQN derived from the Cartesian product of the APQI of the domain 908 being assigned and the APIDs of the adapters previously assigned: 909 910 - Must only be available to the vfio_ap device driver as specified in the 911 sysfs /sys/bus/ap/apmask and /sys/bus/ap/aqmask attribute files. If even 912 one APQN is reserved for use by the host device driver, the operation 913 will terminate with an error (EADDRNOTAVAIL). 914 915 - Must NOT be assigned to another vfio_ap mediated device. If even one APQN 916 is assigned to another vfio_ap mediated device, the operation will 917 terminate with an error (EBUSY). 918 919 - Must NOT be assigned while the sysfs /sys/bus/ap/apmask and 920 sys/bus/ap/aqmask attribute files are being edited or the operation may 921 terminate with an error (EBUSY). 922 923 In order to successfully assign a control domain: 924 925 * The domain number specified must represent a value from 0 up to the maximum 926 domain number configured for the system. If a control domain number higher 927 than the maximum is specified, the operation will terminate with an 928 error (ENODEV). 929 930 5. Start Guest1:: 931 932 /usr/bin/qemu-system-s390x ... -cpu host,ap=on,apqci=on,apft=on,apqi=on \ 933 -device vfio-ap,sysfsdev=/sys/devices/vfio_ap/matrix/$uuid1 ... 934 935 7. Start Guest2:: 936 937 /usr/bin/qemu-system-s390x ... -cpu host,ap=on,apqci=on,apft=on,apqi=on \ 938 -device vfio-ap,sysfsdev=/sys/devices/vfio_ap/matrix/$uuid2 ... 939 940 7. Start Guest3:: 941 942 /usr/bin/qemu-system-s390x ... -cpu host,ap=on,apqci=on,apft=on,apqi=on \ 943 -device vfio-ap,sysfsdev=/sys/devices/vfio_ap/matrix/$uuid3 ... 944 945 When the guest is shut down, the vfio_ap mediated devices may be removed. 946 947 Using our example again, to remove the vfio_ap mediated device $uuid1:: 948 949 /sys/devices/vfio_ap/matrix/ 950 --- [mdev_supported_types] 951 ------ [vfio_ap-passthrough] 952 --------- [devices] 953 ------------ [$uuid1] 954 --------------- remove 955 956 :: 957 958 echo 1 > remove 959 960 This will remove all of the matrix mdev device's sysfs structures including 961 the mdev device itself. To recreate and reconfigure the matrix mdev device, 962 all of the steps starting with step 3 will have to be performed again. Note 963 that the remove will fail if a guest using the vfio_ap mdev is still running. 964 965 It is not necessary to remove a vfio_ap mdev, but one may want to 966 remove it if no guest will use it during the remaining lifetime of the linux 967 host. If the vfio_ap mdev is removed, one may want to also reconfigure 968 the pool of adapters and queues reserved for use by the default drivers. 969 970 Hot plug/unplug support: 971 ======================== 972 An adapter, domain or control domain may be hot plugged into a running KVM 973 guest by assigning it to the vfio_ap mediated device being used by the guest if 974 the following conditions are met: 975 976 * The adapter, domain or control domain must also be assigned to the host's 977 AP configuration. 978 979 * Each APQN derived from the Cartesian product comprised of the APID of the 980 adapter being assigned and the APQIs of the domains assigned must reference a 981 queue device bound to the vfio_ap device driver. 982 983 * To hot plug a domain, each APQN derived from the Cartesian product 984 comprised of the APQI of the domain being assigned and the APIDs of the 985 adapters assigned must reference a queue device bound to the vfio_ap device 986 driver. 987 988 An adapter, domain or control domain may be hot unplugged from a running KVM 989 guest by unassigning it from the vfio_ap mediated device being used by the 990 guest. 991 992 Over-provisioning of AP queues for a KVM guest: 993 =============================================== 994 Over-provisioning is defined herein as the assignment of adapters or domains to 995 a vfio_ap mediated device that do not reference AP devices in the host's AP 996 configuration. The idea here is that when the adapter or domain becomes 997 available, it will be automatically hot-plugged into the KVM guest using 998 the vfio_ap mediated device to which it is assigned as long as each new APQN 999 resulting from plugging it in references a queue device bound to the vfio_ap 1000 device driver. 1001 1002 Driver Features 1003 =============== 1004 The vfio_ap driver exposes a sysfs file containing supported features. 1005 This exists so third party tools (like Libvirt and mdevctl) can query the 1006 availability of specific features. 1007 1008 The features list can be found here: /sys/bus/matrix/devices/matrix/features 1009 1010 Entries are space delimited. Each entry consists of a combination of 1011 alphanumeric and underscore characters. 1012 1013 Example: 1014 cat /sys/bus/matrix/devices/matrix/features 1015 guest_matrix dyn ap_config 1016 1017 the following features are advertised: 1018 1019 ---------------+---------------------------------------------------------------+ 1020 | Flag | Description | 1021 +==============+===============================================================+ 1022 | guest_matrix | guest_matrix attribute exists. It reports the matrix of | 1023 | | adapters and domains that are or will be passed through to a | 1024 | | guest when the mdev is attached to it. | 1025 +--------------+---------------------------------------------------------------+ 1026 | dyn | Indicates hot plug/unplug of AP adapters, domains and control | 1027 | | domains for a guest to which the mdev is attached. | 1028 +------------+-----------------------------------------------------------------+ 1029 | ap_config | ap_config interface for one-shot modifications to mdev config | 1030 +--------------+---------------------------------------------------------------+ 1031 1032 Limitations 1033 =========== 1034 Live guest migration is not supported for guests using AP devices without 1035 intervention by a system administrator. Before a KVM guest can be migrated, 1036 the vfio_ap mediated device must be removed. Unfortunately, it can not be 1037 removed manually (i.e., echo 1 > /sys/devices/vfio_ap/matrix/$UUID/remove) while 1038 the mdev is in use by a KVM guest. If the guest is being emulated by QEMU, 1039 its mdev can be hot unplugged from the guest in one of two ways: 1040 1041 1. If the KVM guest was started with libvirt, you can hot unplug the mdev via 1042 the following commands: 1043 1044 virsh detach-device <guestname> <path-to-device-xml> 1045 1046 For example, to hot unplug mdev 62177883-f1bb-47f0-914d-32a22e3a8804 from 1047 the guest named 'my-guest': 1048 1049 virsh detach-device my-guest ~/config/my-guest-hostdev.xml 1050 1051 The contents of my-guest-hostdev.xml: 1052 1053 .. code-block:: xml 1054 1055 <hostdev mode='subsystem' type='mdev' managed='no' model='vfio-ap'> 1056 <source> 1057 <address uuid='62177883-f1bb-47f0-914d-32a22e3a8804'/> 1058 </source> 1059 </hostdev> 1060 1061 1062 virsh qemu-monitor-command <guest-name> --hmp "device-del <device-id>" 1063 1064 For example, to hot unplug the vfio_ap mediated device identified on the 1065 qemu command line with 'id=hostdev0' from the guest named 'my-guest': 1066 1067 .. code-block:: sh 1068 1069 virsh qemu-monitor-command my-guest --hmp "device_del hostdev0" 1070 1071 2. A vfio_ap mediated device can be hot unplugged by attaching the qemu monitor 1072 to the guest and using the following qemu monitor command: 1073 1074 (QEMU) device-del id=<device-id> 1075 1076 For example, to hot unplug the vfio_ap mediated device that was specified 1077 on the qemu command line with 'id=hostdev0' when the guest was started: 1078 1079 (QEMU) device-del id=hostdev0 1080 1081 After live migration of the KVM guest completes, an AP configuration can be 1082 restored to the KVM guest by hot plugging a vfio_ap mediated device on the target 1083 system into the guest in one of two ways: 1084 1085 1. If the KVM guest was started with libvirt, you can hot plug a matrix mediated 1086 device into the guest via the following virsh commands: 1087 1088 virsh attach-device <guestname> <path-to-device-xml> 1089 1090 For example, to hot plug mdev 62177883-f1bb-47f0-914d-32a22e3a8804 into 1091 the guest named 'my-guest': 1092 1093 virsh attach-device my-guest ~/config/my-guest-hostdev.xml 1094 1095 The contents of my-guest-hostdev.xml: 1096 1097 .. code-block:: xml 1098 1099 <hostdev mode='subsystem' type='mdev' managed='no' model='vfio-ap'> 1100 <source> 1101 <address uuid='62177883-f1bb-47f0-914d-32a22e3a8804'/> 1102 </source> 1103 </hostdev> 1104 1105 1106 virsh qemu-monitor-command <guest-name> --hmp \ 1107 "device_add vfio-ap,sysfsdev=<path-to-mdev>,id=<device-id>" 1108 1109 For example, to hot plug the vfio_ap mediated device 1110 62177883-f1bb-47f0-914d-32a22e3a8804 into the guest named 'my-guest' with 1111 device-id hostdev0: 1112 1113 virsh qemu-monitor-command my-guest --hmp \ 1114 "device_add vfio-ap,\ 1115 sysfsdev=/sys/devices/vfio_ap/matrix/62177883-f1bb-47f0-914d-32a22e3a8804,\ 1116 id=hostdev0" 1117 1118 2. A vfio_ap mediated device can be hot plugged by attaching the qemu monitor 1119 to the guest and using the following qemu monitor command: 1120 1121 (qemu) device_add "vfio-ap,sysfsdev=<path-to-mdev>,id=<device-id>" 1122 1123 For example, to plug the vfio_ap mediated device 1124 62177883-f1bb-47f0-914d-32a22e3a8804 into the guest with the device-id 1125 hostdev0: 1126 1127 (QEMU) device-add "vfio-ap,\ 1128 sysfsdev=/sys/devices/vfio_ap/matrix/62177883-f1bb-47f0-914d-32a22e3a8804,\ 1129 id=hostdev0"
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.