Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1250974imm; Fri, 29 Jun 2018 14:23:13 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLvLlTqqTRLzlpCIyuXGfo1u/ZrCQoEovbYInVqMn4a34Z8nkPgwMng37URpqaLLJdRp7A1 X-Received: by 2002:a17:902:6f02:: with SMTP id w2-v6mr16153784plk.216.1530307393773; Fri, 29 Jun 2018 14:23:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530307393; cv=none; d=google.com; s=arc-20160816; b=sXHq2c3ds5Q7NpjsXj7xhDMitJrsZFY+ceqNhKGYA8BpTPE6a39PEmo+FDeJGQtR6h mCVXSDjcRWDhyvG8obGIGxA9Pw92zoDyEnyu3FlB6mtap6LEtqY04D0G/Smt+SsWL0QA slzTUNCAttRwqMlgotrHlMBxgDIc6imwUbY4hgExeJ3tDo1OCtAW52+e8vKfjPDpNgWE FK8p11O3S2o8y7KwKqhFcylDYMVidVG1BbuI/IYmos628ToxSKTWZi6NRHd6/AI4crhf Hsnr4Zla89zVJpcdDiSyvnsIS7qLPT11utwwYvFAyJVUoKd9mVAS9Gm+pl1EOr5I60fH g4kA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from:arc-authentication-results; bh=4QAJPh9H9v6DYPLr+vC/QJoZevhnlpTtC5oLCVp8eJI=; b=OjPZGI+9GaB+u4ueYrsm+0SPcmmqpFo4ODerYUVuqlpKtZfyuZhXU6kclP2qiMKK1x F/E2kNz82yc+Pf0Pza90O2NIMqSgu1XtZSkAeeWxnY/Wh50RLjG/sOHKZsGttaONHU06 kxzS6981U4ir+Xl8pJkv04sdgp7Him8BS7lHtGOIwqPNHedpQPUBcrF6rbNJjbs044T7 nB3St2w6h+0O4FWcjiaWWWZr8qRphWUmbcJeMThE7ck6TR14xBh8MvGme2xwjsYWMSGV dQQlWQh4ejM4TPUlErTWQVLLQ6P1+oCdok6r4eR/u6V3GKf2pgWCy4bVTFfsQHcLwnic 6EmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x69-v6si9590133pgd.635.2018.06.29.14.22.59; Fri, 29 Jun 2018 14:23:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966128AbeF2VMO (ORCPT + 99 others); Fri, 29 Jun 2018 17:12:14 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:55550 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754336AbeF2VMJ (ORCPT ); Fri, 29 Jun 2018 17:12:09 -0400 Received: from pps.filterd (m0098399.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5TL9Crj074550 for ; Fri, 29 Jun 2018 17:12:08 -0400 Received: from e12.ny.us.ibm.com (e12.ny.us.ibm.com [129.33.205.202]) by mx0a-001b2d01.pphosted.com with ESMTP id 2jwujk9shh-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 29 Jun 2018 17:12:08 -0400 Received: from localhost by e12.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 29 Jun 2018 17:12:06 -0400 Received: from b01cxnp22036.gho.pok.ibm.com (9.57.198.26) by e12.ny.us.ibm.com (146.89.104.199) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 29 Jun 2018 17:12:02 -0400 Received: from b01ledav002.gho.pok.ibm.com (b01ledav002.gho.pok.ibm.com [9.57.199.107]) by b01cxnp22036.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w5TLC0PR8716766 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 29 Jun 2018 21:12:00 GMT Received: from b01ledav002.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 52BCD124055; Fri, 29 Jun 2018 18:13:29 -0400 (EDT) Received: from b01ledav002.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 48D92124052; Fri, 29 Jun 2018 18:13:28 -0400 (EDT) Received: from localhost.localdomain (unknown [9.85.157.42]) by b01ledav002.gho.pok.ibm.com (Postfix) with ESMTPS; Fri, 29 Jun 2018 18:13:28 -0400 (EDT) From: Tony Krowiak To: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, cohuck@redhat.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, akrowiak@linux.vnet.ibm.com, Tony Krowiak Subject: [PATCH v6 15/21] s390: vfio-ap: configure the guest's AP matrix Date: Fri, 29 Jun 2018 17:11:17 -0400 X-Mailer: git-send-email 1.7.1 In-Reply-To: <1530306683-7270-1-git-send-email-akrowiak@linux.vnet.ibm.com> References: <1530306683-7270-1-git-send-email-akrowiak@linux.vnet.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 18062921-0060-0000-0000-00000284A47B X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009279; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000266; SDB=6.01054189; UDB=6.00540581; IPR=6.00832111; MB=3.00021933; MTD=3.00000008; XFM=3.00000015; UTC=2018-06-29 21:12:04 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18062921-0061-0000-0000-0000459F27CA Message-Id: <1530306683-7270-16-git-send-email-akrowiak@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-06-29_10:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1806290224 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tony Krowiak Configures the AP adapters, usage domains and control domains for the KVM guest from the matrix configured via the mediated matrix device's sysfs attribute files. The guest's SIE state description has a satellite structure called the Crypto Control Block (CRYCB) containing three bitmask fields identifying the adapters, queues (domains) and control domains assigned to the KVM guest: * The AP Adapter Mask (APM) field identifies the AP adapters assigned to the KVM guest * The AP Queue Mask (AQM) field identifies the AP queues assigned to the KVM guest. Each AP queue is connected to a usage domain within an AP adapter. * The AP Domain Mask (ADM) field identifies the control domains assigned to the KVM guest. Each adapter, queue (usage domain) and control domain are identified by a number from 0 to 255. The bits in each mask, from most significant to least significant bit, correspond to the numbers 0-255. When a bit is set, the corresponding adapter, queue (usage domain) or control domain is assigned to the KVM guest. This patch will set the bits in the APM, AQM and ADM fields of the CRYCB referenced by the KVM guest's SIE state description. The process used is: 1. Verify that the bits to be set do not exceed the maximum bit number for the given mask. 2. Verify that the APQNs that can be derived from the cross product of the bits set in the APM and AQM fields of the KVM guest's CRYCB are not assigned to any other KVM guest running on the same linux host. 3. Set the APM, AQM and ADM in the CRYCB according to the matrix configured for the mediated matrix device via its sysfs assign_adapter, assign_domain and assign_control domain attribute files respectively. Signed-off-by: Tony Krowiak --- arch/s390/include/asm/kvm_host.h | 1 + drivers/s390/crypto/vfio_ap_ops.c | 201 +++++++++++++++++++++++++++++++++++++ 2 files changed, 202 insertions(+), 0 deletions(-) diff --git a/arch/s390/include/asm/kvm_host.h b/arch/s390/include/asm/kvm_host.h index d44e0d5..79b2ccf 100644 --- a/arch/s390/include/asm/kvm_host.h +++ b/arch/s390/include/asm/kvm_host.h @@ -257,6 +257,7 @@ struct kvm_s390_sie_block { __u64 tecmc; /* 0x00e8 */ __u8 reservedf0[12]; /* 0x00f0 */ #define CRYCB_FORMAT_MASK 0x00000003 +#define CRYCB_FORMAT0 0x00000000 #define CRYCB_FORMAT1 0x00000001 #define CRYCB_FORMAT2 0x00000003 __u32 crycbd; /* 0x00fc */ diff --git a/drivers/s390/crypto/vfio_ap_ops.c b/drivers/s390/crypto/vfio_ap_ops.c index 58be495..98bd0a1 100644 --- a/drivers/s390/crypto/vfio_ap_ops.c +++ b/drivers/s390/crypto/vfio_ap_ops.c @@ -770,6 +770,201 @@ static int kvm_ap_validate_crypto_setup(struct kvm *kvm) return -EOPNOTSUPP; } +static inline unsigned long * +kvm_ap_get_crycb_apm(struct ap_matrix_mdev *matrix_mdev) +{ + unsigned long *apm; + struct kvm *kvm = matrix_mdev->kvm; + + switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) { + case CRYCB_FORMAT2: + apm = (unsigned long *)kvm->arch.crypto.crycb->apcb1.apm; + break; + case CRYCB_FORMAT1: + case CRYCB_FORMAT0: + default: + apm = (unsigned long *)kvm->arch.crypto.crycb->apcb0.apm; + break; + } + + return apm; +} + +static inline unsigned long * +kvm_ap_get_crycb_aqm(struct ap_matrix_mdev *matrix_mdev) +{ + unsigned long *aqm; + struct kvm *kvm = matrix_mdev->kvm; + + switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) { + case CRYCB_FORMAT2: + aqm = (unsigned long *)kvm->arch.crypto.crycb->apcb1.aqm; + break; + case CRYCB_FORMAT1: + case CRYCB_FORMAT0: + default: + aqm = (unsigned long *)kvm->arch.crypto.crycb->apcb0.aqm; + break; + } + + return aqm; +} + +static inline unsigned long * +kvm_ap_get_crycb_adm(struct ap_matrix_mdev *matrix_mdev) +{ + unsigned long *adm; + struct kvm *kvm = matrix_mdev->kvm; + + switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) { + case CRYCB_FORMAT2: + adm = (unsigned long *)kvm->arch.crypto.crycb->apcb1.adm; + break; + case CRYCB_FORMAT1: + case CRYCB_FORMAT0: + default: + adm = (unsigned long *)kvm->arch.crypto.crycb->apcb0.adm; + break; + } + + return adm; +} + +static inline void kvm_ap_clear_crycb_masks(struct ap_matrix_mdev *matrix_mdev) +{ + memset(&matrix_mdev->kvm->arch.crypto.crycb->apcb0, 0, + sizeof(matrix_mdev->kvm->arch.crypto.crycb->apcb0)); + memset(&matrix_mdev->kvm->arch.crypto.crycb->apcb1, 0, + sizeof(matrix_mdev->kvm->arch.crypto.crycb->apcb1)); +} + +static void kvm_ap_set_crycb_masks(struct ap_matrix_mdev *matrix_mdev) +{ + int nbytes; + unsigned long *apm, *aqm, *adm; + + kvm_ap_clear_crycb_masks(matrix_mdev); + + apm = kvm_ap_get_crycb_apm(matrix_mdev); + aqm = kvm_ap_get_crycb_aqm(matrix_mdev); + adm = kvm_ap_get_crycb_adm(matrix_mdev); + + nbytes = KVM_AP_MASK_BYTES(matrix_mdev->matrix.apm_max + 1); + memcpy(apm, matrix_mdev->matrix.apm, nbytes); + + nbytes = KVM_AP_MASK_BYTES(matrix_mdev->matrix.aqm_max + 1); + memcpy(aqm, matrix_mdev->matrix.aqm, nbytes); + + /* + * Merge the AQM and ADM since the ADM is a superset of the + * AQM by agreed-upon convention. + */ + bitmap_or(adm, matrix_mdev->matrix.adm, matrix_mdev->matrix.aqm, + matrix_mdev->matrix.adm_max + 1); +} + +static void kvm_ap_log_sharing_err(struct ap_matrix_mdev *matrix_mdev, + unsigned long apid, unsigned long apqi) +{ + pr_err("%s: AP queue %02lx.%04lx is assigned to %s device", __func__, + apid, apqi, matrix_mdev->name); +} + +static int kvm_ap_find_matching_bits(unsigned long *dst, unsigned long *src1, + unsigned long *src2, unsigned long nbits) +{ + unsigned long nbit; + + for_each_set_bit_inv(nbit, src1, nbits) { + if (test_bit_inv(nbit, src2)) + set_bit_inv(nbit, dst); + } + + return find_first_bit_inv(dst, nbit) < nbits; +} + +/** + * kvm_ap_validate_queue_sharing + * + * Verifies that the APQNs derived from the cross product of the AP adapter IDs + * and AP queue indexes comprising the AP matrix are not configured for + * another guest. AP queue sharing is not allowed. + * + * @kvm: the KVM guest + * @matrix: the AP matrix + * + * Returns 0 if the APQNs are valid, otherwise; returns -EBUSY. + */ +static int kvm_ap_validate_queue_sharing(struct ap_matrix_mdev *matrix_mdev) +{ + int ret; + struct ap_matrix_mdev *lstdev; + unsigned long apid, apqi; + unsigned long apm[BITS_TO_LONGS(matrix_mdev->matrix.apm_max + 1)]; + unsigned long aqm[BITS_TO_LONGS(matrix_mdev->matrix.aqm_max + 1)]; + + spin_lock_bh(&mdev_list_lock); + + list_for_each_entry(lstdev, &mdev_list, list) { + if (matrix_mdev == lstdev) + continue; + + memset(apm, 0, BITS_TO_LONGS(matrix_mdev->matrix.apm_max + 1) * + sizeof(unsigned long)); + memset(aqm, 0, BITS_TO_LONGS(matrix_mdev->matrix.aqm_max + 1) * + sizeof(unsigned long)); + + if (!kvm_ap_find_matching_bits(apm, matrix_mdev->matrix.apm, + lstdev->matrix.apm, + matrix_mdev->matrix.apm_max + 1)) + continue; + + if (!kvm_ap_find_matching_bits(aqm, matrix_mdev->matrix.aqm, + lstdev->matrix.aqm, + matrix_mdev->matrix.aqm_max + 1)) + continue; + + for_each_set_bit_inv(apid, apm, matrix_mdev->matrix.apm_max + 1) + for_each_set_bit_inv(apqi, aqm, + matrix_mdev->matrix.aqm_max + 1) + kvm_ap_log_sharing_err(lstdev, apid, apqi); + + ret = -EBUSY; + goto done; + } + + ret = 0; + +done: + spin_unlock_bh(&mdev_list_lock); + return ret; +} + +static int kvm_ap_configure_matrix(struct ap_matrix_mdev *matrix_mdev) +{ + int ret = 0; + + mutex_lock(&matrix_mdev->kvm->lock); + + ret = kvm_ap_validate_queue_sharing(matrix_mdev); + if (ret) + goto done; + + kvm_ap_set_crycb_masks(matrix_mdev); + +done: + mutex_unlock(&matrix_mdev->kvm->lock); + + return ret; +} + +void kvm_ap_deconfigure_matrix(struct ap_matrix_mdev *matrix_mdev) +{ + mutex_lock(&matrix_mdev->kvm->lock); + kvm_ap_clear_crycb_masks(matrix_mdev); + mutex_unlock(&matrix_mdev->kvm->lock); +} + static int vfio_ap_mdev_group_notifier(struct notifier_block *nb, unsigned long action, void *data) { @@ -852,6 +1047,10 @@ static int vfio_ap_mdev_open(struct mdev_device *mdev) if (ret) goto out_kvm_err; + ret = kvm_ap_configure_matrix(matrix_mdev); + if (ret) + goto out_kvm_err; + return 0; out_kvm_err: @@ -868,6 +1067,8 @@ static void vfio_ap_mdev_release(struct mdev_device *mdev) { struct ap_matrix_mdev *matrix_mdev = mdev_get_drvdata(mdev); + kvm_ap_deconfigure_matrix(matrix_mdev); + vfio_unregister_notifier(mdev_dev(mdev), VFIO_GROUP_NOTIFY, &matrix_mdev->group_notifier); matrix_mdev->kvm = NULL; -- 1.7.1