Message ID | 1669951831-4180-1-git-send-email-mikelley@microsoft.com (mailing list archive) |
---|---|
Headers | show |
Series | Add PCI pass-thru support to Hyper-V Confidential VMs | expand |
On Thu, Dec 01, 2022 at 07:30:18PM -0800, Michael Kelley wrote: > This patch series adds support for PCI pass-thru devices to Hyper-V > Confidential VMs (also called "Isolation VMs"). But in preparation, it > first changes how private (encrypted) vs. shared (decrypted) memory is > handled in Hyper-V SEV-SNP guest VMs. The new approach builds on the > confidential computing (coco) mechanisms introduced in the 5.19 kernel > for TDX support and significantly reduces the amount of Hyper-V specific > code. Furthermore, with this new approach a proposed RFC patch set for > generic DMA layer functionality[1] is no longer necessary. In any case, this is starting to get ready - how do we merge this? I apply the x86 bits and give Wei an immutable branch to add the rest of the HyperV stuff ontop?
From: Borislav Petkov <bp@alien8.de> Sent: Monday, January 9, 2023 10:47 AM > > On Thu, Dec 01, 2022 at 07:30:18PM -0800, Michael Kelley wrote: > > This patch series adds support for PCI pass-thru devices to Hyper-V > > Confidential VMs (also called "Isolation VMs"). But in preparation, it > > first changes how private (encrypted) vs. shared (decrypted) memory is > > handled in Hyper-V SEV-SNP guest VMs. The new approach builds on the > > confidential computing (coco) mechanisms introduced in the 5.19 kernel > > for TDX support and significantly reduces the amount of Hyper-V specific > > code. Furthermore, with this new approach a proposed RFC patch set for > > generic DMA layer functionality[1] is no longer necessary. > > In any case, this is starting to get ready - how do we merge this? > > I apply the x86 bits and give Wei an immutable branch to add the rest of the > HyperV stuff ontop? > > -- > Regards/Gruss, > Boris. > I'll let Wei respond on handling the merging. I'll spin a v5 in a few days. Changes will be: * Address your comments * Use PAGE_KERNEL in the arch independent Hyper-V code instead of PAGE_KERNEL_NOENC. PAGE_KERNEL_NOENC doesn't exist for ARM64, so it causes compile errors when building for ARM64. Using PAGE_KERNEL means getting sme_me_mask when on x86, but that value will be zero for vTOM VMs. * Fix a problem with the virtual TPM device getting mapped decrypted. Like the IOAPIC, the vTPM is provided by the paravisor, and needs to be mapped encrypted. My thinking is to allow hypervisor initialization code to specify a guest physical address range to be treated as encrypted, and add a check against that range in __ioremap_check_other(), similar to what is done for EFI memory. Thoughts? I don't want to change the vTPM driver, and the devm_* interfaces it uses don't provide an option to map encrypted anyway. But I'm open to other ideas. Thanks for the review! Michael
On Mon, Jan 09, 2023 at 07:47:08PM +0100, Borislav Petkov wrote: > On Thu, Dec 01, 2022 at 07:30:18PM -0800, Michael Kelley wrote: > > This patch series adds support for PCI pass-thru devices to Hyper-V > > Confidential VMs (also called "Isolation VMs"). But in preparation, it > > first changes how private (encrypted) vs. shared (decrypted) memory is > > handled in Hyper-V SEV-SNP guest VMs. The new approach builds on the > > confidential computing (coco) mechanisms introduced in the 5.19 kernel > > for TDX support and significantly reduces the amount of Hyper-V specific > > code. Furthermore, with this new approach a proposed RFC patch set for > > generic DMA layer functionality[1] is no longer necessary. > > In any case, this is starting to get ready - how do we merge this? > > I apply the x86 bits and give Wei an immutable branch to add the rest of the > HyperV stuff ontop? I can take all the patches if that's easier for you. I don't think anyone else is depending on the x86 patches in this series. Giving me an immutable branch works too. Thanks, Wei. > > -- > Regards/Gruss, > Boris. > > https://people.kernel.org/tglx/notes-about-netiquette
> From: Wei Liu <wei.liu@kernel.org> > Sent: Thursday, January 12, 2023 6:04 AM > To: Borislav Petkov <bp@alien8.de> > [...] > On Mon, Jan 09, 2023 at 07:47:08PM +0100, Borislav Petkov wrote: > > On Thu, Dec 01, 2022 at 07:30:18PM -0800, Michael Kelley wrote: > > > This patch series adds support for PCI pass-thru devices to Hyper-V > > > Confidential VMs (also called "Isolation VMs"). But in preparation, it > > > first changes how private (encrypted) vs. shared (decrypted) memory is > > > handled in Hyper-V SEV-SNP guest VMs. The new approach builds on the > > > confidential computing (coco) mechanisms introduced in the 5.19 kernel > > > for TDX support and significantly reduces the amount of Hyper-V specific > > > code. Furthermore, with this new approach a proposed RFC patch set for > > > generic DMA layer functionality[1] is no longer necessary. > > > > In any case, this is starting to get ready - how do we merge this? > > > > I apply the x86 bits and give Wei an immutable branch to add the rest of the > > HyperV stuff ontop? > > I can take all the patches if that's easier for you. I don't think > anyone else is depending on the x86 patches in this series. > > Giving me an immutable branch works too. > > Thanks, > Wei. > > -- > > Regards/Gruss, > > Boris. Hi Boris, Wei, any news on this?
On Thu, Jan 12, 2023 at 02:03:35PM +0000, Wei Liu wrote: > I can take all the patches if that's easier for you. I don't think > anyone else is depending on the x86 patches in this series. But we have a bunch of changes in tip so I'd prefer if all were in one place. > Giving me an immutable branch works too. Yap, lemme do that after applying. Thx.
On Fri, Jan 20, 2023 at 12:58:29PM +0100, Borislav Petkov wrote: > On Thu, Jan 12, 2023 at 02:03:35PM +0000, Wei Liu wrote: > > I can take all the patches if that's easier for you. I don't think > > anyone else is depending on the x86 patches in this series. > > But we have a bunch of changes in tip so I'd prefer if all were in one place. > > > Giving me an immutable branch works too. > > Yap, lemme do that after applying. > Ack. Thanks! Wei.