Message ID | 7558961d3dff6311c7872f57ac5bd6727f21e140.1666824663.git.kai.huang@intel.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp534166wru; Wed, 26 Oct 2022 16:24:34 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6l81e/3pp7s9RChISINR3udQTRqTQ0tHkYAfIhVEKG5d0KV5Jde2XPCU4jtrmxUTukAxBs X-Received: by 2002:a17:907:75ed:b0:78d:97ed:2894 with SMTP id jz13-20020a17090775ed00b0078d97ed2894mr38421548ejc.739.1666826674461; Wed, 26 Oct 2022 16:24:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666826674; cv=none; d=google.com; s=arc-20160816; b=voEpfvsnyzXN69D/a1rzfh/0/X2X/vrutY6h6Qz8n4pIxx2rp1ytNZdgFvFwiBwbmP VBehQgrksr6v4oG0ujeTM2Hlsae+thUx9kEruCYVOnHt8qxqKH3S2K0Ajc9dU1ZOVicg lMCg6mIDrq8knd0AoK71l89gn+s205cKlscl8kEv+sZzBiltYQTRcueEh3ibDTHDBWGl /MhLPgSkE7GZ3mp//3WuuK+uMlGDcq3OSqqBlylF1mMI0YKh4BJ8GygFJMuGDrTz5n4C OvbVRcfmr0YcK5Bl8YjC0dBRCNJbYCYLB8uY3VTHIg0DrrCSViD5Wg5qyrYJq1s9vLCc SyMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=NzPhTO39hdVi1srg41p6qw0WxFPtXGNHta0iCLXng3M=; b=B7SjQ+0EH9nmENVP+oJZLOxyDWsyH13AjjP1dBjECy9JuxP0IrR/wfTXSpBRWiB0t9 AdNhJNv9mq9ZQFnOx3P7zDbj8nc0mpghfjtN87Dt2AZ9YOwhaUKjfWjTMBvc2dl1F5G4 2QQFez9diFCW1RZEz3v9Bz0R4FNnYoyG7TwKrQURXPp7CtGkqc8eV6a5SoENTo3UcLQI naIWPlx6wz2UYMsAPD6Vn2s1/BoRDy+iibLUK71FlQ8cN4QYLpzjxLbLDRh8TEjKQDCd DCJRfK4mWuBzwH1UjG/J2oiVQwUdQe7nAuAeZOAlSYujsdDBkbDikmonoFd7Bpoy1r/A kX3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PrTdKCn9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g7-20020a1709063b0700b0078d9c0e896bsi5713033ejf.525.2022.10.26.16.24.10; Wed, 26 Oct 2022 16:24:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PrTdKCn9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234314AbiJZXTc (ORCPT <rfc822;pwkd43@gmail.com> + 99 others); Wed, 26 Oct 2022 19:19:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59744 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234068AbiJZXSw (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Wed, 26 Oct 2022 19:18:52 -0400 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EC5B5C8958; Wed, 26 Oct 2022 16:18:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1666826287; x=1698362287; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=B9+BH03JuRueFuPcbZL8eGNw4YMtDKBJepkCjrMD21g=; b=PrTdKCn93unGu6SccpXW9Xme3pjAgZ+QJ4aISJotCNoaMWSMr+V+1IFY GbAdAlJkiTdS3Eeh5/LGaM7jf4mBfL+wgk0t8QCNP7E7ztN0FOLdkgYfz IK8sqBa8jKTQoswzInW68nDgRpxmxk86kvsS/kPhvSy8LvXYuX6UaoNrw M8vIW8aU5LeAmNczP71UCVHJc3H4v2nn5/t8zOd7eXC8hV7ZZZW3WRPRM bYdevSKXm6+fciD/m649b4d9QqxCD3eL0UarlQhey9n1xUbYOk3jLYp2H /XCE0nYNhZKQhx6ruSgf8LmXviJlhsKNj2Z/3sHccbHcU6TcAYE+R3Fwc g==; X-IronPort-AV: E=McAfee;i="6500,9779,10512"; a="309175633" X-IronPort-AV: E=Sophos;i="5.95,215,1661842800"; d="scan'208";a="309175633" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Oct 2022 16:18:06 -0700 X-IronPort-AV: E=McAfee;i="6500,9779,10512"; a="737446496" X-IronPort-AV: E=Sophos;i="5.95,215,1661842800"; d="scan'208";a="737446496" Received: from fordon1x-mobl.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.212.24.177]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Oct 2022 16:18:02 -0700 From: Kai Huang <kai.huang@intel.com> To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: linux-mm@kvack.org, seanjc@google.com, pbonzini@redhat.com, dave.hansen@intel.com, dan.j.williams@intel.com, rafael.j.wysocki@intel.com, kirill.shutemov@linux.intel.com, reinette.chatre@intel.com, len.brown@intel.com, tony.luck@intel.com, peterz@infradead.org, ak@linux.intel.com, isaku.yamahata@intel.com, chao.gao@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, bagasdotme@gmail.com, sagis@google.com, imammedo@redhat.com, kai.huang@intel.com Subject: [PATCH v6 16/21] x86/virt/tdx: Reserve TDX module global KeyID Date: Thu, 27 Oct 2022 12:16:15 +1300 Message-Id: <7558961d3dff6311c7872f57ac5bd6727f21e140.1666824663.git.kai.huang@intel.com> X-Mailer: git-send-email 2.37.3 In-Reply-To: <cover.1666824663.git.kai.huang@intel.com> References: <cover.1666824663.git.kai.huang@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1747794447053952444?= X-GMAIL-MSGID: =?utf-8?q?1747794447053952444?= |
Series |
TDX host kernel support
|
|
Commit Message
Kai Huang
Oct. 26, 2022, 11:16 p.m. UTC
TDX module initialization requires to use one TDX private KeyID as the global KeyID to protect the TDX module metadata. The global KeyID is configured to the TDX module along with TDMRs. Just reserve the first TDX private KeyID as the global KeyID. Keep the global KeyID as a static variable as KVM will need to use it too. Reviewed-by: Isaku Yamahata <isaku.yamahata@intel.com> Signed-off-by: Kai Huang <kai.huang@intel.com> --- arch/x86/virt/vmx/tdx/tdx.c | 9 +++++++++ 1 file changed, 9 insertions(+)
Comments
On 10/26/2022 4:16 PM, Kai Huang wrote: > TDX module initialization requires to use one TDX private KeyID as the > global KeyID to protect the TDX module metadata. The global KeyID is > configured to the TDX module along with TDMRs. > > Just reserve the first TDX private KeyID as the global KeyID. Keep the > global KeyID as a static variable as KVM will need to use it too. > > Reviewed-by: Isaku Yamahata <isaku.yamahata@intel.com> > Signed-off-by: Kai Huang <kai.huang@intel.com> > --- > arch/x86/virt/vmx/tdx/tdx.c | 9 +++++++++ > 1 file changed, 9 insertions(+) > > diff --git a/arch/x86/virt/vmx/tdx/tdx.c b/arch/x86/virt/vmx/tdx/tdx.c > index 5d74ada072ca..0820ba781f97 100644 > --- a/arch/x86/virt/vmx/tdx/tdx.c > +++ b/arch/x86/virt/vmx/tdx/tdx.c > @@ -62,6 +62,9 @@ static struct tdsysinfo_struct tdx_sysinfo; > static struct cmr_info tdx_cmr_array[MAX_CMRS] __aligned(CMR_INFO_ARRAY_ALIGNMENT); > static int tdx_cmr_num; > > +/* TDX module global KeyID. Used in TDH.SYS.CONFIG ABI. */ > +static u32 tdx_global_keyid; Comment how this is serialized (or doesn't need it)
On Thu, 2022-10-27 at 05:40 -0700, Andi Kleen wrote: > On 10/26/2022 4:16 PM, Kai Huang wrote: > > TDX module initialization requires to use one TDX private KeyID as the > > global KeyID to protect the TDX module metadata. The global KeyID is > > configured to the TDX module along with TDMRs. > > > > Just reserve the first TDX private KeyID as the global KeyID. Keep the > > global KeyID as a static variable as KVM will need to use it too. > > > > Reviewed-by: Isaku Yamahata <isaku.yamahata@intel.com> > > Signed-off-by: Kai Huang <kai.huang@intel.com> > > --- > > arch/x86/virt/vmx/tdx/tdx.c | 9 +++++++++ > > 1 file changed, 9 insertions(+) > > > > diff --git a/arch/x86/virt/vmx/tdx/tdx.c b/arch/x86/virt/vmx/tdx/tdx.c > > index 5d74ada072ca..0820ba781f97 100644 > > --- a/arch/x86/virt/vmx/tdx/tdx.c > > +++ b/arch/x86/virt/vmx/tdx/tdx.c > > @@ -62,6 +62,9 @@ static struct tdsysinfo_struct tdx_sysinfo; > > static struct cmr_info tdx_cmr_array[MAX_CMRS] __aligned(CMR_INFO_ARRAY_ALIGNMENT); > > static int tdx_cmr_num; > > > > +/* TDX module global KeyID. Used in TDH.SYS.CONFIG ABI. */ > > +static u32 tdx_global_keyid; > > > Comment how this is serialized (or doesn't need it) > > TDH.SYS.CONFIG, which takes 'tdx_global_keyid' as input, only needs to be called once on any cpu, so no serialization is needed. TDH.SYS.KEY.CONFIG, which doesn't take 'tdx_global_keyid' as input but internally programs it, does require some serialization as this SEAMCALL must be called on one cpu for each package, and it cannot run concurrently on different cpus. How about adding the comment in the patch which does TDH.SYS.KEY.CONFIG? How about below (taken from patch 18 "x86/virt/tdx: Configure global KeyID on all packages", but added "in serialized way as it cannot run concurrently on different cpus" at the end of the first sentence in the comment)? static int config_global_keyid(void) { struct seamcall_ctx sc = { .fn = TDH_SYS_KEY_CONFIG }; /* * Configure the key of the global KeyID on all packages by * calling TDH.SYS.KEY.CONFIG on all packages in serialized * way as it cannot run concurrently on different cpus. * * ...... */ return seamcall_on_each_package_serialized(&sc); }
diff --git a/arch/x86/virt/vmx/tdx/tdx.c b/arch/x86/virt/vmx/tdx/tdx.c index 5d74ada072ca..0820ba781f97 100644 --- a/arch/x86/virt/vmx/tdx/tdx.c +++ b/arch/x86/virt/vmx/tdx/tdx.c @@ -62,6 +62,9 @@ static struct tdsysinfo_struct tdx_sysinfo; static struct cmr_info tdx_cmr_array[MAX_CMRS] __aligned(CMR_INFO_ARRAY_ALIGNMENT); static int tdx_cmr_num; +/* TDX module global KeyID. Used in TDH.SYS.CONFIG ABI. */ +static u32 tdx_global_keyid; + /* * Detect TDX private KeyIDs to see whether TDX has been enabled by the * BIOS. Both initializing the TDX module and running TDX guest require @@ -1113,6 +1116,12 @@ static int init_tdx_module(void) if (ret) goto out_free_tdmrs; + /* + * Reserve the first TDX KeyID as global KeyID to protect + * TDX module metadata. + */ + tdx_global_keyid = tdx_keyid_start; + /* * Return -EINVAL until all steps of TDX module initialization * process are done.