[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[qemu-s390x] [RFC 5/5] s390x/docs: documentation for ap-matrix
From: |
Tony Krowiak |
Subject: |
[qemu-s390x] [RFC 5/5] s390x/docs: documentation for ap-matrix |
Date: |
Thu, 26 Oct 2017 11:54:54 -0400 |
Signed-off-by: Tony Krowiak <address@hidden>
---
docs/ap_matrix.txt | 529 ++++++++++++++++++++++++++++++++++++++++++++++++++++
1 files changed, 529 insertions(+), 0 deletions(-)
create mode 100644 docs/ap_matrix.txt
diff --git a/docs/ap_matrix.txt b/docs/ap_matrix.txt
new file mode 100644
index 0000000..ec7bd44
--- /dev/null
+++ b/docs/ap_matrix.txt
@@ -0,0 +1,529 @@
+Adjunct Processor (AP) Matrix Devices
+=====================================
+
+Contents:
+=========
+* Introduction
+* AP Architectural Overview
+* Start Interpretive Execution (SIE) Instruction
+* AP Matrix Configuration on Linux Host
+* AP Matrix Configuration for a Linux Guest
+* Starting a Linux Guest Configured with an AP Matrix
+* Example: Configure AP Matrices for Two Linux Guests
+
+Introduction:
+============
+The IBM Adjunct Processor (AP) Cryptographic Facility is comprised
+of three AP instructions and from 1 to 256 PCIe cryptographic adapter cards.
+These AP devices provide cryptographic functions to all CPUs assigned to a
+linux system running in an IBM Z system LPAR.
+
+The intent of this document is to provide administrators with the basic
+knowledge needed to provide a linux guest with direct access to one or more AP
+adapters available to the host linux system using an AP matrix device
+
+AP Architectural Overview:
+=========================
+In order understand the terminology used in the rest of this document, let's
+start with some definitions:
+
+* AP adapter
+
+ An AP adapter is a PCIe cryptographic adapter that can perform cryptographic
+ functions. There can be from 0 to 256 AP adapters assigned to an LPAR.
+ Each adapter is identified by a number from 0 to 255. When
+ installed, an AP is accessed by AP instructions executed by any CPU.
+
+* AP domain
+
+ An adapter is partitioned into domains. Each domain can be thought of as
+ a set of hardware registers dedicated to an active LPAR. An adapter can hold
+ up to 256 domains. Each domain is identified by a number from 0 to 255.
+ Domains can be further classified into two types:
+
+ * Usage domains are domains that can be accessed directly to process AP
+ commands
+
+ * Control domains are domains that are accessed indirectly by AP
+ commands sent to a usage domain to control or change the domain, for
+ example; to specify a private key that can be used by the domain to
+ perform cryptographic functions.
+
+* AP Queue
+
+ An AP queue is the means by which an AP command is sent to an
+ AP usage domain inside a specific AP. An AP queue is identified by a tuple
+ comprised of an AP adapter ID and a usage domain index. The index corresponds
+ to a given usage domain within the adapter. This tuple forms an AP Queue
+ Number (APQN). AP instructions specify an APQN to identify the AP Queue
+ to which an AP command-request message is to be sent, or from which a
+ command-reply message is to be received. An APQN is specified in this
+ document with one of two formats: APQN (xx,yyyy) or simply xx.yyyy, where
+ xx is an adapter number and yyyy is a domain number. Both numbers will be
+ specified in hexidecimal format.
+
+* AP Instructions:
+
+ There are three AP instructions:
+
+ * NQAP: to enqueue an AP command-request message to an AP queue
+ * DQAP: to dequeue an AP command-reply message from an AP queue
+ * PQAP: to administer an AP queue
+
+Start Interpretive Execution (SIE) Instruction
+==============================================
+A linux guest running on an IBM Z system is started under KVM by executing the
+Start Interpretive Execution (SIE) instruction. The SIE state description is a
+control block that contains the state information for a KVM guest and is
+supplied as input to the SIE instruction. The SIE state description contains a
+field that references a Crypto Control Block (CRYCB) containing three
+fields to identify the AP adapters, usage domains and control domains assigned
+to the KVM guest:
+
+* The AP Mask (APM) field specifies the AP adapter numbers assigned to the
+ KVM guest. The APM controls which adapters are valid for the KVM guest.
+
+* The AP Queue Mask (AQM) field specifies the AP usage domain numbers assigned
+ to the KVM guest. The AQM controls which usage domains are valid for the
+ KVM guest.
+
+* The AP Domain Mask field specifies the AP control domains assigned to the
+ KVM guest. The ADM controls which control domains are valid for the
+ KVM guest.
+
+These three fields comprise the AP matrix for the guest. The APQNs accessible
+to the guest is the intersection of all assigned adapter numbers (APM) and
+all assigned usage domain numbers (AQM). For example, if adapters 1 and 2 and
+usage domains 5 and 6 are assigned to a guest, the APQNs (1,5), (1,6), (2,5)
and
+(2,6) will be valid for AP instructions executed on the guest.
+
+The SIE instruction is run in interpretive execution mode which means the
+AP instructions executed on the guest are interpreted by the hardware. This
+allows a guest direct access to the AP adapter cards. Since each domain within
+a given adapter holds the master key used in the cryptographic functions it
+supports, each APQN must be assigned to at most one guest.
+
+ Example 1: Valid configuration for two guests:
+ ---------------------------------------------
+ Guest1: adapters 1,2 domains 5,6
+ Guest2: adapter 1,2 domain 7
+
+ This is valid because both guests have a unique set of APQNs: Guest1 has
+ APQNs (1,5), (1,6), (2,5) and (2,6); Guest2 has APQN (1,7) and (2,7). There
+ is not overlap.
+
+ Example 2: Invalid configuration for two guests:
+ -----------------------------------------------
+ Guest1: adapters 1,2 domains 5,6
+ Guest2: adapter 1 domains 6,7
+
+ This is an invalid configuration because both guests have access to
+ APQNs (1,6).
+
+AP Matrix Configuration on Linux Host:
+=====================================
+A linux system is a guest of the LPAR in which it is running and has access to
+the AP resources configured for the LPAR. The LPAR's AP matrix is
+configured using the 'Customize/Delete Activation Profiles' dialog from the
HMC.
+This dialog displays the activation profiles configured for the linux system.
+Selecting the specific activation profile to be edited and clicking the
+'Customize Profile' button will open the 'Customize Image Profiles' dialog.
+Selecting the 'Crypto' link in the tree view on the left hand side of the
dialog
+will display the AP matrix configuration in the right hand panel. There, one
can
+assign AP adapters - called Cryptos - and domains to the LPAR. When the linux
+system is started using this activation profile, it will have access to the
+AP matrix configured via the activation profile.
+
+When the linux system is started, the AP adapter devices will be connected to
+the AP bus and the following AP matrix interfaces will be created in sysfs:
+
+/sys/bus/ap
+... [devices]
+...... xx.yyyy
+...... ...
+...... cardxx
+...... ...
+
+Where:
+ cardxx is adapter number xx (in hex)
+ yyyy is a usage domain number yyyy (in hex)
+....xx.yyyy is APQN (xx,yyyy)
+
+For example, if AP adapters 5 and 6 and domains 4 and 71 are configured for the
+LPAR, the sysfs representation on the linux system would look like this:
+
+/sys/bus/ap
+... [devices]
+...... 05.0004
+...... 05.0047
+...... 06.0004
+...... 06.0047
+...... card05
+...... card06
+
+There will also be AP device drivers created to control each type of AP matrix
+interface available to the IBM Z system:
+
+/sys/bus/ap
+... [drivers]
+...... [cex2acard] for Crypto Express 2/3 accelerator cards
+...... [cex2aqueue] for AP queues served by Crypto Express 2/3
+ accelerator cards
+...... [cex4card] for Crypto Express 4/5/6 accelerator and coprocessor
+ cards
+...... [cex4queue] for AP queues served by Crypto Express 4/5/6
+ accelerator and coprocessor cards
+...... [pcixcccard] for Crypto Express 2/3 coprocessor cards
+...... [pcixccqueue] for AP queues served by Crypto Express 2/3
+ coprocessor cards
+
+Links to the AP interfaces controlled by each AP device driver will be created
+in the device driver's sysfs directory. For example, if AP adapter 5 and
domains
+4 and 71 (0x47) are assigned to the LPAR and adapter 5 is a CEX5 card, the
+following links will be created in the CEX5 drivers' sysfs directories:
+
+/sys/bus/ap
+... [drivers]
+...... [cex4card]
+......... [card05]
+...... [cex4queue]
+......... [05.0004]
+......... [05.0047]
+
+AP Matrix Configuration for a Linux Guest:
+=========================================
+In order to configure the AP matrix for a guest, the adapters, usage domains
+and control domains to be used by the guest must be identified. This section
+describes how to configure a guest's AP matrix.
+
+When the linux host is booted, an AP matrix bus will be initialized. When
+initialized, the AP matrix bus creates a single AP matrix device to
+hold the APQNs to be made available to guests:
+
+/sys/bus/ap_matrix
+... [devices]
+......[matrix] symlink to the AP matrix device directory
+
+/sys/devices
+... [ap_matrix]
+......[matrix] the AP matrix device directory
+
+The kernel interfaces for configuring an AP matrix for a linux guest are built
+on the VFIO mediated device framework and are provided by the vfio_ap_matrix
+kernel module. The dependency chain for the vfio_ap_matrix module is:
+
+* vfio
+* mdev
+* vfio_mdev
+* vfio_ap_matrix
+
+When the vfio_ap_matrix module is loaded, it will create the following sysfs
+interfaces:
+
+/sys/bus/ap
+... [drivers]
+...... [vfio_ap_matrix]
+......... bind
+
+The vfio_ap_matrix device driver is created to provide an interface for
securing
+APQNs from use by the host linux system. This is accomplished by unbinding the
+APQNs from the host device driver and binding them to the vfio_ap_matrix
+device driver. For example, suppose we want to secure APQN (05,0004). Assuming
+for this example that AP adapter card 5 is a CEX5 coprocessor card:
+
+ echo 05.0004 > /sys/bus/ap/drivers/cex4queue/unbind
+ echo 05.0004 > /sys/bus/ap/drivers/vfio_ap_matrix/bind
+
+This action will store the APQN in the /sys/devices/ap_matrix/matrix device
+which makes it available for use by a linux guest.
+
+Another side effect of loading the vfio_ap_matrix module is the creation of the
+sysfs interfaces for configuring an AP matrix for a linux guest. These sysfs
+interfaces are built on the VFIO mediated device framework. To configure an AP
+matrix for a guest, a mediated matrix device must be created for the
+/sys/devices/ap_matrix/matrix device. A mediated matrix device must be created
+for each guest that needs access to one or more AP queues. The sysfs interface
+for creating a mediated matrix device is in:
+
+/sys/devices
+... [ap_matrix]
+......[matrix]
+......... [mdev_supported_types]
+............ [ap_matrix-passthrough]
+............... create
+............... [devices]
+
+A mediated AP matrix device is created by writing a UUID to the attribute
+file named 'create', for example:
+
+ uuidgen > create
+
+When a mediated AP matrix device is created, a sysfs directory named after
+the UUID will be created in the devices subdirectory:
+
+/sys/devices
+... [ap_matrix]
+......[matrix]
+......... [mdev_supported_types]
+............ [ap_matrix-passthrough]
+............... create
+............... [devices]
+.................. [$uuid]
+..................... adapters
+..................... assign_adapter
+..................... assign_control_domain
+..................... assign_domain
+..................... control_domains
+..................... domains
+..................... remove
+..................... unassign_adapter
+..................... unassign_control_domain
+..................... unassign_domain
+
+There will also be three sets of attribute files created in the mediated
matrix
+device's sysfs directory:
+
+1 Adapter assignment
+ * An adapter is assigned by writing the adapter's number into the
+ 'assign_adapter' file. This may be repeated multiple times to assign
+ multiple adapters. For example, to assign adapters 5 and 6 to mediated
+ matrix device $uuid:
+
+ echo 5 > assign_adapter
+ echo 6 > assign_adapter
+
+ * An adapter may be unassigned by writing the adapter's number into the
+ 'unassign_adapter' file. This may also be done multiple times to
+ unassign multiple adapters.
+
+ * To view the adapter numbers assigned to the AP matrix mediated device,
+ print the 'adapters' file:
+
+ cat adapters
+
+1 Usage Domain assignment
+ * A usage domain is assigned by writing the usage domain's number into the
+ 'assign_domain' file. This may be repeated multiple times to assign
+ multiple usage domains. For example, to assign usage domains 4 and
+ 71 (0x47) to mediated matrix device $uuid:
+
+ echo 4 > assign_domain
+ echo 47 > assign_domain
+
+ * A domain may be unassigned by writing the usage domain's number into the
+ 'unassign_domain' file. This may be repeated multiple times to unassign
+ multiple usage domains.
+
+ * To view the usage domain numbers assigned to the AP matrix mediated
+ device, print the 'domains' file:
+
+ cat domains
+
+1 Control domain assignment
+ * A control domain is assigned by writing the control domain's number into
+ the 'assign_control_domain' file. This may be repeated multiple times to
+ assign multiple control domains. It is not necessary to assign
+ usage domain numbers as control domains, that is done automatically by
+ default. To assign control domains 4 and 37 (0x35) to mediated matrix
+ device $uuid:
+
+ echo 4 > assign_control_domain
+ echo 25 > assign_control_domain
+
+ * A control domain may be unassigned by writing the control domain's
number
+ into the 'unassign_control_domain' file. This may be repeated multiple
+ times to unassign multiple control domains.
+
+ * To view the control domain numbers assigned to the AP matrix mediated
+ device, print the 'control_domains' file:
+
+ cat control_domains
+
+Note: Hot plug/unplug is not currently supported for mediated AP matrix
devices,
+ so the AP matrix resulting from assignment and/or unassignment of AP
+ adapters, usage domains and control domains to a mediated AP matrix
device
+ will not take affect until the linux guest is rebooted.
+
+Starting a Linux Guest Configured with an AP Matrix:
+===================================================
+In addition to providing the sysfs interfaces for configuring the AP matrix
for
+a linux guest, a mediated AP matrix device also acts as a communication
pathway
+between QEMU and the vfio_ap_matrix device driver. To gain access to the
+device driver, the following option must be specified on the QEMU command line:
+
+-device vfio_ap_matrix,sysfsdev=$path-to-mdev
+
+The sysfsdev parameter specifies the path to the mediated matrix device.
+There are a number of ways to specify this path:
+
+/sys/devices/ap_matrix/matrix/$uuid
+/sys/bus/mdev/devices/$uuid
+/sys/bus/mdev/drivers/vfio_mdev/$uuid
+/sys/devices/ap_matrix/matrix/mdev_supported_types/ap_matrix-passthrough/devices/$uuid
+
+When the linux guest is subsequently started, the guest will open the mediated
+matrix device's file descriptor to issue the command instructing the device
+driver to configure the AP matrix for the linux guest. In response, the
+vfio_ap_matrix device driver will update the APM, AQM, and ADM fields in the
+guest's CRYCB with the adapter, usage domain and control domain numbers
+specified via the mediated matrix device's sysfs attribute files. Programs
+running on the linux guest will then:
+
+1. Have access to the APQNs derived from the intersection of the AP adapter and
+ usage domain numbers specified in the APM and AQM respectively
+
+2. Have authorization to process AP commands to change a control domains
+ identified in an AP instruction sent to a valid APQN.
+
+Example: Configure AP Matrices for Two Linux Guests:
+===================================================
+Let's now provide an example to illustrate how KVM guests may be given
+direct access to APQNs. For this example, we will illustrate how to configure
+two guests such that executing the lszcrypt command on the guests would
+look like this:
+
+Guest1
+------
+CARD.DOMAIN TYPE MODE
+------------------------------
+05 CEX5C CCA-Coproc
+05.0004 CEX5C CCA-Coproc
+05.00ab CEX5C CCA-Coproc
+06 CEX5A Accelerator
+06.0004 CEX5A Accelerator
+06.00ab CEX5C CCA-Coproc
+
+Guest2
+------
+CARD.DOMAIN TYPE MODE
+------------------------------
+05 CEX5A Accelerator
+05.0047 CEX5A Accelerator
+05.00ff CEX5A Accelerator
+
+These are the steps for configuring Guest1 and Guest2:
+
+1. The first thing that needs to be done is to unbind each AP Queue device from
+ its respective AP device driver to prevent access from the host linux system
+ and to reserve it for use by a linux guest. For our example, let's assume
+ the AP queues are bound to the cex4queue driver.
+
+ /sys/bus/ap
+ --- [drivers]
+ ------ [cex4queue]
+ --------- [05.0004]
+ --------- [05.0047]
+ --------- [05.00ab]
+ --------- [05.00ff]
+ --------- [06.0004]
+ --------- [06.00ab]
+ --------- unbind
+
+ To unbind AP queue 05.0004 from the cex4queue device driver:
+
+ echo 05.0004 > unbind
+
+ This must also be done for AP queues 05.00ab, 05.0047, 05.00ff, 06.0004,
+ and 06.00ab.
+
+2. The next step is to reserve the queues for use by the two KVM guests.
+ This is accomplished by binding them to the VFIO AP matrix device driver:
+
+ /sys/bus/ap
+ ---[drivers]
+ ------ [vfio_ap_matrix]
+ ---------- bind
+
+ For Guest1:
+
+ echo 05.0004 > bind
+ echo 05.00ab > bind
+ echo 06.0004 > bind
+ echo 06.00ab > bind
+
+ For Guest2:
+
+ echo 05.0047 > bind
+ echo 05.00ff > bind
+
+3. Create the mediated matrix devices needed to configure the AP matrices for
+ and to provide an interface to the vfio_ap_matrix driver for use by the
+ two guests:
+
+ /sys/devices/
+ --- [ap_matrix]
+ ------ [matrix] (this is the AP matrix device)
+ --------- [mdev_supported_types]
+ ------------ [ap_matrix-passthrough] (the mediated device type)
+ --------------- create
+ --------------- [devices]
+
+ To create the mediated devices for the two guests:
+
+ uuidgen > create
+ uuidgen > create
+
+ This will create two mediated devices in the [devices] subdirectory named
+ with the UUID written to the create attribute file. We call them $uuid1
+ and $uuid2:
+
+ /sys/devices/
+ --- [ap_matrix]
+ ------ [matrix]
+ --------- [mdev_supported_types]
+ ------------ [ap_matrix-passthrough]
+ --------------- [devices]
+ ------------------ [$uuid1]
+ --------------------- adapters
+ --------------------- assign_adapter
+ --------------------- assign_control_domain
+ --------------------- assign_domain
+ --------------------- control_domains
+ --------------------- domains
+ --------------------- unassign_adapter
+ --------------------- unassign_control_domain
+ --------------------- unassign_domain
+ ------------------ [$uuid2]
+ --------------------- adapters
+ --------------------- assign_adapter
+ --------------------- assign_control_domain
+ --------------------- assign_domain
+ --------------------- control_domains
+ --------------------- domains
+ --------------------- unassign_adapter
+ --------------------- unassign_control_domain
+ --------------------- unassign_domain
+
+4. The administrator now needs to configure the matrices for mediated
+ devices $uuid1 (for Guest1) and $uuid2 (for Guest2).
+
+ For Guest1:
+ cd /sys/devices/ap_matrix/matrix/mdev_supported_types/ap_matrix_passthrough
+ cd ./devices/$uuid1:
+
+ echo 5 > assign_adapter
+ echo 6 > assign_adapter
+ echo 4 > assign_domain
+ echo ab > assign_domain
+
+ For Guest2:
+ cd /sys/devices/ap_matrix/matrix/mdev_supported_types/ap_matrix_passthrough
+ cd ./devices/$uuid2:
+
+ echo 5 > assign_adapter
+ echo 47 > assign_domain
+ echo ff > assign_domain
+
+ By architectural convention, all usage domains - i.e., domains assigned
+ via the assign_domain attribute file - will also be configured in the ADM
+ field of the KVM guest's CRYCB, so there is no need to assign control
+ domains here unless you want to assign control domains that are not
+ assigned as usage domains.
+
+5. Start Guest1
+
+ /usr/bin/qemu-system-s390x ... -device
vfio_ap_matrix,sysfsdev=/sys/devices/ap_matrix/matrix/$uuid1 ...
+
+6. Start Guest2
+
+ /usr/bin/qemu-system-s390x ... -device
vfio_ap_matrix,sysfsdev=/sys/devices/ap_matrix/matrix/$uuid2 ...
\ No newline at end of file
--
1.7.1