From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933484AbdKAVQv (ORCPT ); Wed, 1 Nov 2017 17:16:51 -0400 Received: from mail-bn3nam01on0043.outbound.protection.outlook.com ([104.47.33.43]:12256 "EHLO NAM01-BN3-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933454AbdKAVQn (ORCPT ); Wed, 1 Nov 2017 17:16:43 -0400 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; From: Brijesh Singh To: kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: bp@alien8.de, Brijesh Singh , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Joerg Roedel , Borislav Petkov , Tom Lendacky , Herbert Xu , "David S . Miller" , Gary Hook , x86@kernel.org, linux-crypto@vger.kernel.org Subject: [Part2 PATCH v7 00/38] x86: Secure Encrypted Virtualization (AMD) Date: Wed, 1 Nov 2017 16:15:45 -0500 Message-Id: <20171101211623.71496-1-brijesh.singh@amd.com> X-Mailer: git-send-email 2.9.5 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: DM5PR06CA0064.namprd06.prod.outlook.com (2603:10b6:3:37::26) To DM2PR12MB0155.namprd12.prod.outlook.com (2a01:111:e400:50ce::18) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 5d930f53-d1bd-42a6-116f-08d5216dd56a X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(48565401081)(4534020)(4602075)(2017052603199);SRVR:DM2PR12MB0155; X-Microsoft-Exchange-Diagnostics: 1;DM2PR12MB0155;3:/fHYCcCy9H/gm+uniEe9hP1DESGDpEl+7fUeJb62KRkFAe3Pr2tB2ivwG2hRdvZleUBQZIR1Xu18P6rpv/RXkYRL7z4J3hz3NRWFgwWrMwSkTpYRgtZQ8TfWMBJLVzyRIWSHPkvVxQNg4Mild/uMtxn4agu4crMgVhVtcFW52igxLD+c+AOT1MbgHe7ak+jw5+tD5ddOu8xV6oRff1ZbF00lyxtHMpiL0jwZk7wjytBQHAv3jTUyAcHPyqxcO8NU;25:Q0eZYzJgXdwA1jNLegZUjWYMAbI7mM5DJgpPH1uHHerwR2xPIrSKXwdTUMtFLvh2rBOdOu9UxIgFpBgL8h+9dhjETqnm2XWGY+PQLE/cqm0TSK6Rypc2UZ6WvPHTb+9doLB+ZFYToXhXX/oVps/btv6AJGE8OlJxzgGpMJpnfwmFlhqSYUUOrRhk9haceNCZvLM5CuSENo1Lu4hlRpzpZ7hRObUi796YoS26is6kdboPbzzS0rjICh57UM7OXDXKIJ5OpB9qOXOhsTSicFaZoKS3VcnNHaXfVpHe1a1ZAqctI9Nh4zFpryDT9SRVN7XrrJgGE8Da2jtIbtkLXYt6+w==;31:6vqQbVn7r2KV5uVSggKkIowtPMGf7SGYwhc8rOiqDfOQvxYuuyGm7s5IkmNT9D6pcUBAFCEXsi4unXdErPXRfAbl8uj3pvVEdAjnXjN09rcvhq8tUmQtt/4ZvPodVB7LBKnSmXobG2eeFJymtKJiPe2EjjCGlmVTVmaT56ju73p20K7xCqRWnia4XLwxgj7u4GciwG4B+HdC16Du/hWLlnwDIaPcC1ktC/RLd5dJGC8= X-MS-TrafficTypeDiagnostic: DM2PR12MB0155: X-Microsoft-Exchange-Diagnostics: 1;DM2PR12MB0155;20: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 X-Exchange-Antispam-Report-Test: UriScan:(20558992708506)(166708455590820)(192374486261705)(9452136761055)(767451399110); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(8121501046)(5005006)(100000703101)(100105400095)(3231020)(10201501046)(93006095)(93001095)(3002001)(6055026)(6041248)(20161123560025)(20161123555025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123558100)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);SRVR:DM2PR12MB0155;BCL:0;PCL:0;RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);SRVR:DM2PR12MB0155; X-Microsoft-Exchange-Diagnostics: 1;DM2PR12MB0155;4:4tFgmfjZi4Jcyk5OSNCqEWPf1m8JYAfc4bgF2xK1yesRikV0699tBQk6zkdgXJZn9RKcBW3rXHhFTOEzhols/WLz6q5A6JVnBk4bknlNagWaVpOc1ui5sHqZdSxra6g//1n2bwUtkYztnSy1rVGlrjvsenjsQR+6YUL4lzpr4PjssZUqmr+I4jLUu/3HODkqaLtgRia4w1di5qUA5NnitukeBUYIxD2zcvEwh7I5/y0PcSSNpSZEtAGrvjXi7RvOhs2tzg8BQLqK2uWKZlFxxSe3VyySDxdmkZuAIik9GfJARl1Z1UK8DwbuHMOf3m13pEojZQAY/lRicKTHvu8Tg5K7jCikL1O7pCME2LRM88SVxOzN21ygU5p0kqqZGD1D23BJKQxkRN5qPsbwfUpKDZ1Q7tx1uWVs0CKkyufuQF0BMUPT+Jb/ZbSxbxPhVpbh X-Forefront-PRVS: 0478C23FE0 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(6009001)(39860400002)(376002)(346002)(189002)(199003)(1076002)(6116002)(97736004)(66066001)(50466002)(3846002)(25786009)(6306002)(4326008)(54906003)(966005)(316002)(8676002)(47776003)(36756003)(23676003)(50986999)(478600001)(7416002)(81156014)(81166006)(105586002)(53416004)(53936002)(189998001)(106356001)(2906002)(16526018)(2870700001)(33646002)(305945005)(1720100001)(7736002)(86362001)(5660300001)(6486002)(101416001)(50226002)(68736007)(8936002)(6666003)(6606295002);DIR:OUT;SFP:1101;SCL:1;SRVR:DM2PR12MB0155;H:wsp141597wss.amd.com;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtETTJQUjEyTUIwMTU1OzIzOnZHL3MxVzMrQklSL3RBL1ViTDdHMlpGN2s4?= =?utf-8?B?MnRKUUNwRlU1a3lneTZ4QW1NZHpRNWlhZHY2dGtmME1pakRGWVlaR2w5SGxW?= =?utf-8?B?bkMwRTRzZDMzZlNlMHJnV1JDbHVsUHhialVqaXdTa3gvZ1k3dDFQMVI3dlJx?= =?utf-8?B?ZHgrUEIzbTE4elVUWU9DUmRudW9wc3M0SHhiYWVER2l0L3Y1aFFmN0E1UzN6?= =?utf-8?B?KzJOVWlZQzd4T0w3NUFHbGdjMHJ2QjI5NHk1am5TMy8yeWNwcWNDSU1Ld2JU?= =?utf-8?B?Ty9TZjh2RFRYalpQdGFhV3BiRU9XYWZNVEI5bmtERXlnN0YyNWVGM0dyeUhu?= =?utf-8?B?dUJpck9LaFdQYXFPck9qMitBMXUzbno5Q3NXTTIvTFpyWUhXcllSUGNudGhP?= =?utf-8?B?MGhmOUZBU1NhZmwvWVJSN2h6aHUwWlpwOWNaUXY5TXRKRDdiV1g5RnlPaERa?= =?utf-8?B?aFhvVEtNS2FkY2Q3d05JcUJKNW5JRUY1Z09Qb2VrVWpMcjcrd2JJbmptWVZa?= =?utf-8?B?ZzFNK2hmUEhyRklxdnlHUkNUa01sakhFNTFYY1pkM09GbDA4Z1JsUlJLcVFD?= =?utf-8?B?b3NHR2g5bkovMUFlc3U1bkpPUE10Y2F0YkZ1MGE5U3ZiT1d4NlRibE9nU2Yz?= =?utf-8?B?RWhGR1pIOGY3ZlhRUTk4SGVLaUdwOFE4SFZFQi9QUlo5M1poYjBqM29zYnNO?= =?utf-8?B?bHV0YkZIMXI0Si9zcXdTZVB6TzlzamZDaUNmcDdQK0xIUEZpVXVzVDlZSTBK?= =?utf-8?B?UktRVEdIOXRKVnJRR212TjhNczlScUpNMjVPV0F6Z04zRGliOWJYdFlaY1RR?= =?utf-8?B?eVFIbHRaYmV5MkgxS3U5MmxGbEswZWtMU2I5SkNPTHBkUjVSZlVJSnRPUm1H?= =?utf-8?B?c2FxWGdNVXkrQ25NL3F4ZWxVR0lHOEVzZG5BYTQ4eVZwWU5KYVAwZnBlUVQ5?= =?utf-8?B?UVNCek1iYTlYUDZXY2o2ZDJrbzhBTkZzYkhFTkpzbGVHYm5LdjFKQnVTN0hL?= =?utf-8?B?a2ZRMjFPdDZFckxVb2s0VHlXZWRlc0tNeS9JaXk3UUxqeThLVXdmQ1MvY1lX?= =?utf-8?B?WldjU25GcklxcVJURzVTK0h6RUR3aW5wQ3NWS21vdFNvaUZNOHMrQ0hIcHRR?= =?utf-8?B?UC84akxGTi9tdytmT2QzYlUwUW1KSWIxQmVHMUdjMCtXYkQrQ1lKKzFDNyt0?= =?utf-8?B?ajJVUmhFbHM2WWhUYmF4Q0t1TFY5alJxelNHS0NQcnBpUmV1d3VRc3RFOVF4?= =?utf-8?B?VHZkbHlmbklud2FuMzJBYzVyZ2U5UnhpVTM4RGFZdWJmV0o1L050clBQNUkw?= =?utf-8?B?bE5mZE5rMVhKLy9jOWEvQ3N2YisyZmxJTEVFbHdmV2lZUjFXblZ1citqS2R2?= =?utf-8?B?RnhrMVVUMUpaUFI5UDU0ZFJtMWJ2QzExV0JYZlQ3eHVPa2syejdBejRFYjI5?= =?utf-8?B?UkdiNUxqd2NaZVNoTVVzWDEwbzcrMXpQT1oyLzNhOXhEOXVLR20xVk82RzBN?= =?utf-8?Q?qN+ZRShPiDXy3BCxcAVCg8ad8=3D?= X-Microsoft-Exchange-Diagnostics: 1;DM2PR12MB0155;6:v64RkulDOx+Ks1h6Fb1fZcJmlpn3u/0JLOJJQ5XoNu4mcpYCqgerb9xFw8IW+HGkqczbQ+sneLIPeyI1gyCw7EEWgR9g5ifgL0BSwOBI6XmDFpjYFwIGrLYH1MDvL7ahDJkaeAWlcv619BehY5xlStEFk9mCKFIA4KzoAzAImLUvDIZ7nQkZF/cmaGAV8HKz3MytllAWV45PFQX8blHDkfDpAOP6nnTnjgNMTk6W9g9WCroWkNjim6qTHd7zJtKgfuM6P0/v8HMFo+v8Kn3bZ8BqMw1V7apgZsBxY7wVRtLltACMfeBusK0nRm/05hGlXreSLAeOlEjk7p9rxmJNe/DkMEVvHYrALZWDtou0YxQ=;5:VoS6LObIWY0HXRFzAc8AbPydTF/2lAAwXyBJ4inI/0QiWVEFkV4nZxtnJo5enmOaAqjMrMZzHpRZ7YEtCOMBX++fb9bwPXyo26z3S/drArTbIP6wL0qpmlci1MMDNQLErHFOOZhaqnPdpz98Vz/YG0z22ICy4DnGhWVH1oIRYSg=;24:TMFElD9Uhidz1Lz/TbG4vbhbpSSBLA1/XXn5Dnuq2qsW055bsObxjZk13yo21u3PMWpphfh1vOYf3hBttkbfHzAIIGz4EoXyKjcI9IxJvn8=;7:LnaWAmdk11RuYzuP5DWRjRonVosp3nrbhMKFOv8BDbrteEt4g2RZoMUeYkFqk6O4JBOjZM/mKFbQXxU1UW6vq4YQO/v4hOl8B4gc54o7mhLXxxc2jEgR6uEcONU/0NT94fzIjZ8rPL7qjH62dnQOiOwt0Y6AZ3cqlgw4VMatA40mplnoof2tyt/HP8JuNA/feNFujHqYaxUEwfBa5mJRQkOUxrf7NFMo+pGgs2FvWqKD/xtqud7q8XiJUS/271fc SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;DM2PR12MB0155;20:u8cKh3fcORhyqfgi/wmWCHMbobsJ7+F0A+vHHwRGfrvjTH0geYYtS3bTUxM9VRIYK3eV368Fb+oFEsxgJuHNz5IH+lruxO5meKfnXsmiUjavAIVdzAlp+Oh5+RAvhWEYt7zbTeZzZdwyOf77zO6JtgFl495g6PsrXiPCgYF+Ty057e2YmCcVFnoGm7Qw8A9qjcO8cDfPKyPdC5ynzKmatqBPDNBBHU5vWQiGJeYlWc5f+a34xHrvDLTo07uTzQcI X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Nov 2017 21:16:35.3599 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5d930f53-d1bd-42a6-116f-08d5216dd56a X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR12MB0155 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This part of Secure Encrypted Virtualization (SEV) patch series focuses on KVM changes required to create and manage SEV guests. SEV is an extension to the AMD-V architecture which supports running encrypted virtual machine (VMs) under the control of a hypervisor. Encrypted VMs have their pages (code and data) secured such that only the guest itself has access to unencrypted version. Each encrypted VM is associated with a unique encryption key; if its data is accessed to a different entity using a different key the encrypted guest's data will be incorrectly decrypted, leading to unintelligible data. This security model ensures that hypervisor will no longer able to inspect or alter any guest code or data. The key management of this feature is handled by a separate processor known as the AMD Secure Processor (AMD-SP) which is present on AMD SOCs. The SEV Key Management Specification (see below) provides a set of commands which can be used by hypervisor to load virtual machine keys through the AMD-SP driver. The patch series adds a new ioctl in KVM driver (KVM_MEMORY_ENCRYPTION_OP). The ioctl will be used by qemu to issue SEV guest-specific commands defined in Key Management Specification. The following links provide additional details: AMD Memory Encryption white paper: http://amd-dev.wpengine.netdna-cdn.com/wordpress/media/2013/12/AMD_Memory_Encryption_Whitepaper_v7-Public.pdf AMD64 Architecture Programmer's Manual: http://support.amd.com/TechDocs/24593.pdf SME is section 7.10 SEV is section 15.34 SEV Key Management: http://support.amd.com/TechDocs/55766_SEV-KM API_Specification.pdf KVM Forum Presentation: http://www.linux-kvm.org/images/7/74/02x08A-Thomas_Lendacky-AMDs_Virtualizatoin_Memory_Encryption_Technology.pdf SEV Guest BIOS support: SEV support has been add to EDKII/OVMF BIOS https://github.com/tianocore/edk2 SEV Part 1 patch series: https://marc.info/?l=linux-kernel&m=150851036113575&w=2 -- The series is based on kvm/master commit : cc9085b68753 (Merge branch \ 'kvm-ppc-fixes') Complete tree is available at: repo: https://github.com/codomania/kvm.git branch: sev-v7-p2 TODO: * Add SEV guest migration command support Cc: Thomas Gleixner Cc: Ingo Molnar Cc: "H. Peter Anvin" Cc: Paolo Bonzini Cc: "Radim Krčmář" Cc: Joerg Roedel Cc: Borislav Petkov Cc: Tom Lendacky Cc: Herbert Xu Cc: David S. Miller Cc: Gary Hook Cc: x86@kernel.org Cc: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org Cc: linux-crypto@vger.kernel.org Changes since v6: * (ccp): Extend psp_device structure to track the FW INIT and SHUTDOWN states. * (ccp): Init and Uninit SEV FW during module load/unload * (ccp): Avoid repeated k*alloc() for init and status command buffer * (kvm): Rework DBG command to fix the compilation warning seen with gcc7.x * (kvm): Convert the SEV doc in rst format Changes since v5: * split the PSP driver support into multiple patches * multiple improvements from Boris * remove mem_enc_enabled() ops Changes since v4: * Fixes to address kbuild robot errors * Add 'sev' module params to allow enable/disable SEV feature * Update documentation * Multiple fixes to address v4 feedbacks * Some coding style changes to address checkpatch reports Changes since v3: * Re-design the PSP interface support patch * Rename the ioctls based on the feedbacks * Improve documentation * Fix i386 build issues * Add LAUNCH_SECRET command * Add new Kconfig option to enable SEV support * Changes to address v3 feedbacks. Changes since v2: * Add KVM_MEMORY_ENCRYPT_REGISTER/UNREGISTER_RAM ioct to register encrypted memory ranges (recommend by Paolo) * Extend kvm_x86_ops to provide new memory_encryption_enabled ops * Enhance DEBUG DECRYPT/ENCRYPT commands to work with more than one page \ (recommended by Paolo) * Optimize LAUNCH_UPDATE command to reduce the number of calls to AMD-SP driver * Changes to address v2 feedbacks Borislav Petkov (1): crypto: ccp: Build the AMD secure processor driver only with AMD CPU support Brijesh Singh (34): Documentation/virtual/kvm: Add AMD Secure Encrypted Virtualization (SEV) KVM: SVM: Prepare to reserve asid for SEV guest KVM: X86: Extend CPUID range to include new leaf KVM: Introduce KVM_MEMORY_ENCRYPT_OP ioctl KVM: Introduce KVM_MEMORY_ENCRYPT_{UN,}REG_REGION ioctl crypto: ccp: Define SEV userspace ioctl and command id crypto: ccp: Define SEV key management command id crypto: ccp: Add Platform Security Processor (PSP) device support crypto: ccp: Add Secure Encrypted Virtualization (SEV) command support crypto: ccp: Implement SEV_FACTORY_RESET ioctl command crypto: ccp: Implement SEV_PLATFORM_STATUS ioctl command crypto: ccp: Implement SEV_PEK_GEN ioctl command crypto: ccp: Implement SEV_PDH_GEN ioctl command crypto: ccp: Implement SEV_PEK_CSR ioctl command crypto: ccp: Implement SEV_PEK_CERT_IMPORT ioctl command crypto: ccp: Implement SEV_PDH_CERT_EXPORT ioctl command KVM: X86: Add CONFIG_KVM_AMD_SEV KVM: SVM: Add sev module_param KVM: SVM: Reserve ASID range for SEV guest KVM: Define SEV key management command id KVM: SVM: Add KVM_SEV_INIT command KVM: SVM: VMRUN should use associated ASID when SEV is enabled KVM: SVM: Add support for KVM_SEV_LAUNCH_START command KVM: SVM: Add support for KVM_SEV_LAUNCH_UPDATE_DATA command KVM: SVM: Add support for KVM_SEV_LAUNCH_MEASURE command KVM: SVM: Add support for SEV LAUNCH_FINISH command KVM: SVM: Add support for SEV GUEST_STATUS command KVM: SVM: Add support for SEV DEBUG_DECRYPT command KVM: SVM: Add support for SEV DEBUG_ENCRYPT command KVM: SVM: Add support for SEV LAUNCH_SECRET command KVM: SVM: Pin guest memory when SEV is active KVM: SVM: Clear C-bit from the page fault address KVM: SVM: Do not install #UD intercept when SEV is enabled KVM: X86: Restart the guest when insn_len is zero and SEV is enabled Tom Lendacky (3): x86/CPU/AMD: Add the Secure Encrypted Virtualization CPU feature kvm: svm: prepare for new bit definition in nested_ctl kvm: svm: Add SEV feature definitions to KVM Documentation/virtual/kvm/00-INDEX | 3 + .../virtual/kvm/amd-memory-encryption.rst | 247 +++++ Documentation/virtual/kvm/api.txt | 50 + arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/kvm_host.h | 15 + arch/x86/include/asm/msr-index.h | 2 + arch/x86/include/asm/svm.h | 3 + arch/x86/kernel/cpu/amd.c | 66 +- arch/x86/kernel/cpu/scattered.c | 1 + arch/x86/kvm/Kconfig | 10 + arch/x86/kvm/cpuid.c | 2 +- arch/x86/kvm/mmu.c | 10 + arch/x86/kvm/svm.c | 1135 +++++++++++++++++++- arch/x86/kvm/x86.c | 30 + drivers/crypto/ccp/Kconfig | 12 + drivers/crypto/ccp/Makefile | 1 + drivers/crypto/ccp/psp-dev.c | 807 ++++++++++++++ drivers/crypto/ccp/psp-dev.h | 83 ++ drivers/crypto/ccp/sp-dev.c | 35 + drivers/crypto/ccp/sp-dev.h | 28 +- drivers/crypto/ccp/sp-pci.c | 52 + include/linux/psp-sev.h | 641 +++++++++++ include/uapi/linux/kvm.h | 90 ++ include/uapi/linux/psp-sev.h | 113 ++ 24 files changed, 3407 insertions(+), 30 deletions(-) create mode 100644 Documentation/virtual/kvm/amd-memory-encryption.rst create mode 100644 drivers/crypto/ccp/psp-dev.c create mode 100644 drivers/crypto/ccp/psp-dev.h create mode 100644 include/linux/psp-sev.h create mode 100644 include/uapi/linux/psp-sev.h -- 2.9.5