From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4180EC10F0E for ; Mon, 15 Apr 2019 12:37:06 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 1554A2077C for ; Mon, 15 Apr 2019 12:37:06 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727510AbfDOMhE (ORCPT ); Mon, 15 Apr 2019 08:37:04 -0400 Received: from [110.188.70.11] ([110.188.70.11]:13505 "EHLO spam2.hygon.cn" rhost-flags-FAIL-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1727025AbfDOMhE (ORCPT ); Mon, 15 Apr 2019 08:37:04 -0400 Received: from spam2.hygon.cn (localhost [127.0.0.2] (may be forged)) by spam2.hygon.cn with ESMTP id x3FCAr4F059502; Mon, 15 Apr 2019 20:10:53 +0800 (GMT-8) (envelope-from fenghao@hygon.cn) Received: from MK-DB.hygon.cn ([172.23.18.60]) by spam2.hygon.cn with ESMTP id x3FC6aFG059155; Mon, 15 Apr 2019 20:06:36 +0800 (GMT-8) (envelope-from fenghao@hygon.cn) Received: from cncheex02.Hygon.cn ([172.23.18.12]) by MK-DB.hygon.cn with ESMTP id x3FC6RPv053895; Mon, 15 Apr 2019 20:06:27 +0800 (GMT-8) (envelope-from fenghao@hygon.cn) Received: from harry-Inspiron-5675.higon.com (172.23.18.44) by cncheex02.Hygon.cn (172.23.18.12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1466.3; Mon, 15 Apr 2019 20:06:30 +0800 From: Hao Feng To: "'Tom Lendacky '" , "'Gary Hook '" , "'Herbert Xu '" , "' David S. Miller '" , "'Janakarajan Natarajan '" , "'Joerg Roedel '" , "'Paolo Bonzini '" , =?UTF-8?q?=27=20Radim=20Kr=C4=8Dm=C3=A1=C5=99=20=27?= , "'Thomas Gleixner '" , "'Ingo Molnar '" , "'Borislav Petkov '" , "' H. Peter Anvin '" CC: "'Zhaohui Du '" , "'Zhiwei Ying '" , "'Wen Pu '" , Hao Feng , , , , Subject: [PATCH 0/6] Add Hygon SEV support Date: Mon, 15 Apr 2019 20:04:22 +0800 Message-ID: <1555329868-17895-1-git-send-email-fenghao@hygon.cn> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [172.23.18.44] X-ClientProxiedBy: cncheex02.Hygon.cn (172.23.18.12) To cncheex02.Hygon.cn (172.23.18.12) X-MAIL: spam2.hygon.cn x3FC6aFG059155 X-DNSRBL: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hygon SEV follows AMD SEV work flow, but uses China national standard cryptographic algorithms SM2/SM3/SM4 instead of (RSA, ECDSA, ECDH)/SHA/AES. Reuse most AMD SEV code path to support Hygon SEV, also adds 3 new commands(GM_PUBKEY_GEN, GM_GET_DIGEST, GM_VERIFY_DIGEST) to support SM2 key exchange protocol. SM2 is based on ECC(Elliptic Curve Cryptography), and uses a special curve. It can be used in digital signature, key exchange and asymmetric cryptography. For key exchange, SM2 is similar to ECDH, but involves new random key, meaning the two sides need to exchange extra random public key besides their public key, that's why additional APIs are needed to support Hygon SEV. SM3 is a hash algorithm, similar to SHA-256. SM4 is a block cipher algorithm, similar to AES-128. 1. GM_PUBKEY_GEN ---------------- The command is used to get SM2 random public key from SEV firmware to compute share key. Parameters: * GM_KEY_ID_PADDR (in) - Address of key ID for the random public key. * GM_KEY_ID_LEN (in) - Length of key ID. * GM_PUBKEY_PADDR (in) - Address of the random public key. * GM_PUBKEY_LEN (in,out) - Length of the random public key. 2. GM_GET_DIGEST ---------------- The command is used to get key digest from SEV firmware during SM2 key exchange, guest owner can check the digest to see if the key negotiation is successful or not. Parameters: * HANDLE (in) - Guest handle * DIGEST_PADDR (in) - Address of the key digest * DIGEST_LEN (in, out) - Length of the key digest 3. GM_VERIFY_DIGEST ------------------- The command is used to send guest owner's key digest to SEV firmware during SM2 key exchange, firmware can check the digest to see if the negotiation is successful or not. Parameters: * HANDLE (in) - Guest handle * DIGEST_PADDR (in) - Address of the key digest * DIGEST_LEN (in) - Length of the key digest Already tested successfully on Hygon DhyanaPlus processor, also tested successfully on AMD EPYC processor, results show no side effect on current AMD SEV implementation. Hao Feng (6): crypto: ccp: Add Hygon Dhyana support crypto: ccp: Define Hygon SEV commands crypto: ccp: Implement SEV_GM_PUBKEY_GEN ioctl command KVM: Define Hygon SEV commands KVM: SVM: Add support for KVM_SEV_GM_GET_DIGEST command KVM: SVM: Add KVM_SEV_GM_VERIFY_DIGEST command arch/x86/kvm/svm.c | 119 +++++++++++++++++++++++++++++++++++++++++++ drivers/crypto/ccp/psp-dev.c | 86 +++++++++++++++++++++++++++++++ drivers/crypto/ccp/sp-pci.c | 2 + include/linux/psp-sev.h | 49 ++++++++++++++++++ include/uapi/linux/kvm.h | 14 +++++ include/uapi/linux/psp-sev.h | 17 +++++++ 6 files changed, 287 insertions(+) -- 2.7.4