Message ID | 147801560075.18237.6031531546227610619.stgit@brijesh-build-machine (mailing list archive) |
---|---|
State | New, archived |
Headers | show
Return-Path: <qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org> Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 2B5EE60585 for <patchwork-qemu-devel@patchwork.kernel.org>; Tue, 1 Nov 2016 16:06:26 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1DD3920120 for <patchwork-qemu-devel@patchwork.kernel.org>; Tue, 1 Nov 2016 16:06:26 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 108BD29A66; Tue, 1 Nov 2016 16:06:26 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.gnu.org (lists.gnu.org [208.118.235.17]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 4C98429A64 for <patchwork-qemu-devel@patchwork.kernel.org>; Tue, 1 Nov 2016 16:06:25 +0000 (UTC) Received: from localhost ([::1]:48905 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from <qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org>) id 1c1bZw-0007Bz-E6 for patchwork-qemu-devel@patchwork.kernel.org; Tue, 01 Nov 2016 12:06:24 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:57346) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from <brijesh.singh@amd.com>) id 1c1bNU-0005SK-U4 for qemu-devel@nongnu.org; Tue, 01 Nov 2016 11:53:37 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from <brijesh.singh@amd.com>) id 1c1bNQ-0003mF-FX for qemu-devel@nongnu.org; Tue, 01 Nov 2016 11:53:32 -0400 Received: from mail-sn1nam02on0070.outbound.protection.outlook.com ([104.47.36.70]:47881 helo=NAM02-SN1-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from <brijesh.singh@amd.com>) id 1c1bNQ-0003lw-8k for qemu-devel@nongnu.org; Tue, 01 Nov 2016 11:53:28 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=30Cthm6KXcqQXbNocQzYVb2ztLim04LO1ruP8bY0cRY=; b=TIW9rlENR6vRvZhIFn389khLP5JyOBfRH7qdhpyzBSl6BURnxCzs/U0UNaOwtIEcIkjrEPDk1NgZfSLoVRTKQfMlSl6MKD3RKQQBG6IP9AQwofgxeHDKmQe26RfSFsRiQmsZAaJ7I7BzYBAihTbGmse9I2JHBTcdO3MGvGQ2ApE= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; Received: from [127.0.1.1] (165.204.77.1) by BY2PR12MB0663.namprd12.prod.outlook.com (10.163.113.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.693.12; Tue, 1 Nov 2016 15:53:25 +0000 From: Brijesh Singh <brijesh.singh@amd.com> To: <Thomas.Lendacky@amd.com>, <ehabkost@redhat.com>, <crosthwaite.peter@gmail.com>, <armbru@redhat.com>, <mst@redhat.com>, <p.fedin@samsung.com>, <qemu-devel@nongnu.org>, <lcapitulino@redhat.com>, <pbonzini@redhat.com>, <rth@twiddle.net> Date: Tue, 1 Nov 2016 11:53:20 -0400 Message-ID: <147801560075.18237.6031531546227610619.stgit@brijesh-build-machine> In-Reply-To: <147801550845.18237.12915616525154608660.stgit@brijesh-build-machine> References: <147801550845.18237.12915616525154608660.stgit@brijesh-build-machine> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: BLUPR01CA044.prod.exchangelabs.com (10.160.23.34) To BY2PR12MB0663.namprd12.prod.outlook.com (10.163.113.152) X-MS-Office365-Filtering-Correlation-Id: 79d0d309-6f06-4d6b-022b-08d4026f37ad X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0663; 2:hTIlYtg/bZycgNzn9/zqtDAfstgk15wv/C4ab3i3kWWxKUJJofM0zXXpnWA7Fih6mVU5u1JC4Xk1yASi/4VhAfjNCBAwO9mF9DCQDZIj1r/Wl1HBvG+lp9Vf3lmjc7BAy6Cxz3Sn82MpsdPKynLfCfuxbSCsv774EeibwCMbIfhb+vVoahBM9D6gPyl6JQKkowKxiDXpGq7TKkITr1M5Dw==; 3:dd1srynq3aS2+WMo31eJVWjCRtwjDIhEl2/P1ryQeJ64mYiuHrE/Sw3LFSAzIIBg5jsY1c+sWuHkmegKTAacoCxOPFZQBpC7eOfTxENiliRhkYpcEeCl/izmY9FeA3QBpM5jm3AT+GWylEnAoa8Akw== X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY2PR12MB0663; X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0663; 25:pGiFYh/SnB+mIUpV5WP3cAxt0Vb/r9v496s8wNM0J5H2iidaf+/oLWSnV4NvzX4dQLXvIs1cggrC16E5zYPkmhE0XY/aUdN4AI6eE3mjADE+TrMhxPLXZhkgm2e8pbwtdEqtyAESGvBKWZ7XQ8eocEqy1XyC9sfu5ZlXmKMNNYuR+410juAfMSK5Rn1g0KcOidqPWlqruF4K0WzmU+Jn0WzwB9kjWQddNmggfUkWUw7DHpePn+teAbnLpU+vkYYN32Ccr0vINH+nzej8Dyk8l42AAp1CVIR6K4VrRj4zACo7slZ1iwMEDSoWMskatS8LHG48KJ9tC1RRmUO6Vls3BGOlB8tKpT3cIK8KOIvz8MOWBomJwKoT/8vY71fcGnEpLur7BEkCfaqT/OMty7vGt+8hp4p+VZgmvtCY+YeCF55SHQwZLSD5N3yVP0NDHELvta0hDC1pTb6guH+5/s6BeQf4Rq/3BqFTG8I5KEFCVku3YOhPnxDUblpDfFAhJlUqzPjmHpdjESM4SbqChCx+nuHTvzey86e8t8sNp9k8Sq6wQddQpJJSuvQ4WXB8RfCUAy6DMMKVqF3BDXRqMDuMNhLD0LhFFFl0MHlnsj6kkCxD1AmeyzIVZZhvW5+PeSOR/dHRzoFiEQG8x43J2GyyodJOeUtg9AFEwoZ20CHxaeYIAZtnjXcmts3ewzyVD9mdQwTcvbBiLCgTv+sYFazkUqO5ksnWVE6HIIWCV1D6uEI= X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0663; 31:UHCPNM6lTcmTPJv1b9Rc2EeSkEOpbbNzcuN0vSJbl1oTJcxDfbMu1k32GKGuTedmC9WTW6Tngse5sXUas7HrqoqaSWbtD+FQc74S+KfuNCghLDW9dY+rV1oRXaMQBz0Y+5wGEjGmLrxpdwwsfONgRjPjfWxipNvPf4zvlyrgdFyYOS1dGthUW0Trv/K9c/Gbd+4P2LMQz7iXcXodTUZuVMxw7Esu6k/0Ve0H474MslpuMCxVHY2+xPxEqoMBfAiLb195OIEUA6PbUg64OgrKgQ==; 20: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 X-Microsoft-Antispam-PRVS: <BY2PR12MB0663C15428A75521BFC9A76AE5A10@BY2PR12MB0663.namprd12.prod.outlook.com> X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026); SRVR:BY2PR12MB0663; BCL:0; PCL:0; RULEID:; SRVR:BY2PR12MB0663; X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0663; 4:wduAnFTPM3PmXI45SwyAu9BF3KY83bzNh7sCcF1f/xaLF7KnbqogiWKEacNTS2QsFLE21dypklO/kY1eHTkgX3XBsKqXlqwJPFIn8uIs5a6gH9C0WcxlThBT3MQSUsClF+WWwL84RLhNMgOaYMM4oyc9KYK/eHxHn/rD/1429boE9+EP1kr9OADE44ohlpU4Bec4IgNGjHLxhoVS9AC6s643xpC5C4ioYtSCksjuIPPGbWNEkR6ASlOujUxq2wRy4LY4OkSu2rwhucwIoV5c/pvjODMRfqpe1XF7xivelgd+VcOq5EUACYfVt+TBJOgEsNWP1tjWq6Pw2v2DZvCSRusglXjrKVVOVOH48ee9pxBYawpsyRKE3PVXv/ho/Cf8Qm586vQFMiZsn4J+nsb8z8V2lp3Kt4cTK3qqecWyoBFUcDRwd3WO39RMQDmLbToxztNouQI8DLWu4eIN3RkoQg== X-Forefront-PRVS: 01136D2D90 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(4630300001)(6049001)(6009001)(7916002)(199003)(189002)(50986999)(77096005)(83506001)(23676002)(33646002)(8676002)(229853001)(305945005)(68736007)(92566002)(586003)(86362001)(103116003)(42186005)(105586002)(4326007)(106356001)(19580395003)(19580405001)(6666003)(2950100002)(2201001)(81166006)(7416002)(33716001)(6116002)(4001350100001)(97736004)(47776003)(101416001)(230700001)(76176999)(54356999)(189998001)(81156014)(66066001)(5001770100001)(50466002)(5660300001)(7736002)(9686002)(3846002)(2906002)(7846002)(921003)(1121003)(217873001); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR12MB0663; H:[127.0.1.1]; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtCWTJQUjEyTUIwNjYzOzIzOnh3YnY5ZjlMdzdDY1J2ZzR2Z2dRUG5kOFRQ?= =?utf-8?B?SkxtdjRUMkZQNGpJTjRUTGJMMVRxcGErMi9TY0dOWlBmbWU4NE56Uk92Z1J2?= =?utf-8?B?VktqenJCVjQyV0IzNlpTUkpsS2s4Z0Rud3dyKzI2cHZDNmRLSjRpZjduUGFu?= =?utf-8?B?clFWcW1aK0NCa0RBNWx3aTNLTTcyVFF1Y3NpTVo4NXUxdmYrYUJZekNkdXFU?= =?utf-8?B?TUwvY2VkY1MxM2NoZGVpVUdqMjF2V2JqUVhibU4wTDJXeVJyOFNwVFVyQzBU?= =?utf-8?B?MlVpTEFyZGt1aVpESGNhNy96UnJidFdLbnhHZVJPdEJDbWxVZkhGWmEvVU9u?= =?utf-8?B?WmZjRHNvT2hPczhlaVVVd0VCdFo0d0MwWEdWbEVFU1ZrN3RscWc5aGRqMFBG?= =?utf-8?B?QjhldnpkbjR0OVMwU01DUmJteTFJd0V6K1FiWlBDOEpMNWVmMmJsZFl4SlFl?= =?utf-8?B?TThPOEZqV3hFWE43Z2lQT0lQalloSmtraEJWY1pXMWhvU25iOElMMlpHRjRt?= =?utf-8?B?d3BpUFBuQm9tS3FzQmd0dkdKV2xobWhybzVKZ2lCRlQ0WXdJK2FQdWxyRXFZ?= =?utf-8?B?TU5FeWxsV3FKelg5ZGtZNUxwaTJQV2Y2a3pGS3ozeFpBZFZnR2tmck80R0o1?= =?utf-8?B?ZVdTYXVkYWcyMTIrdjlBdHFGR1VyYVJBSjRwNnVSRW90bkNyQ1RYQlYyOWpE?= =?utf-8?B?UzNXNXlibGExZHVZRU8xQ2ErZjRjaGhXUjlDWUJ6bEpBUjZ1REQybVE5eTBB?= =?utf-8?B?QzVTeFRQa2FYT1RjK3pIUURtdms0bktzOVhIUzVQVk5BMGgxY3NRSDdPRnJk?= =?utf-8?B?aDBkblZHUUJSMkpxWkdDUXNRTmZITFRqOGNNNUJSU2tGZFVhV29vdmdtcFF2?= =?utf-8?B?dlFTcHR0QzhlNTVjamw5YlViTjB4STdPd2RGMlY4aEkvWGd6YVhyRVRBWHVt?= =?utf-8?B?UXgxR3hVK052c25TL1pMQkpBVUF2dktJa2ZtTllNSjZvVlI5R2VsdHZ1L2ow?= =?utf-8?B?bWxrRjNPeUZPNEVjSkxjK1pKb0w3ZkhxZGdXdkR6V0NFYlh4eWJkeFNtSnNh?= =?utf-8?B?UHVwYkFZSC90NExESmpXVWR4S3ExcGNIN2tvdERuT0tKeERTWHRYUHgyQ1Rx?= =?utf-8?B?eHhNU28rVlVmeWRoUFpnTlRtYzJmbkZsbzloZDdianpWaW4xNjZTb1dBS3h5?= =?utf-8?B?N0NqMXFJOWhXa3dCNDN1V3d6bEoxOEZNK1lMUmdoVW5lcjNjYnQvMmVTblVp?= =?utf-8?B?aGlyU0t4QUFHemEyVHlNS3hnVzV2UGFuQ2xXY2UrNXR0NkZSZnVDK01YTll6?= =?utf-8?B?c1YxYkNCTytKSlI0akFzMW5UckJKUXgvQVhxTGJLcjQ1VkNOZG5RRDh2bmVs?= =?utf-8?B?YlM1Sy92MXBJcGVVZG9UYittZlBPOHAvNmdtV3N4Q05FV3VDa1JEYVJieUpz?= =?utf-8?B?alBkOUZ3N0xnWWFiUlFWWFZOVXdiYUZmUjhmVldId29PTGwyZ1U4V0NWK1Zx?= =?utf-8?B?eVlVN3hYZnB5dDNGa0Y1eVpnNmpSZFU1M2Z2TnY1RDQwMkhrNzBmdEFOakNz?= =?utf-8?B?cDdyakZCeUxUb3Q3OUQ4OEdUTmZxSm5wWGd1WGo3b2h2VmtnL0Zjc1d1b2Z3?= =?utf-8?B?Q3cyUkplOXFlMWt2NEppNmY1a2p4RmJtSmlPZ2grcTBnbEF2dWNwaC92b1JM?= =?utf-8?B?bGJsVVBWdFFaUDVHRk1XQkQ4WUVEeXdtUXluL3ZXRDRKcTByZ2FpS3hwUFR6?= =?utf-8?B?VFN5Ulk2S3BGZ0g2NWl0UT09?= X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0663; 6:rhPtpmhBx9quIozC1MIcZ671hi4UG1SHKrKdYOdFty5dKoOE01ySRKOs0W6CaACqs9xfgs6r7sVF/vBrsCP/xw6DJErxkS+MBCi50xNbO38s8vqiLtOtoEyKonC/C0xD+1MSoY6dkAOD5bbTdE9y6t0ja9v2oYv7tIei9Fj0SmFM4EQrQAUhv75bgFQWPBo+uXIBUfLWIoJgefqSldsZ81hY0josIxbK2jOsT9945z7BaeX7iswhVcjO6SWVvefqC+QWZhFXqpVPvDkUyMzjCa67Md020FNCbgABU4WbyPoy+9y6sz2FUwdI7fFNVf07EwEoMPXmz+GOgtPPHRCVMpcKCF7ByKhEAL8hkr54r+8=; 5:Co6wQg4x18XSEXs7gFzSAHRDWqb9VWUtRjZU4pN8NZ9C4mhuSRyRwHALrKHFuObcfiz62f/VWnBK9b2l4+zrNF2GsmQEWMv3TeQQPrjqLL5rD5SBi6Gt8+y2+oC0HZgB+/XgydyeywsYtXhkxF5c7w==; 24:tsQ1BYpJmwgvKC3ukGiDeofTj1QicmudIhCKI6LOVTg0y2isDM9JaxC+y5gdzlhljVJd+tfHCfpWi0u1+BpKxiJbSdG+Z1Wgdaj2pEZlTsQ= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; BY2PR12MB0663; 7:RarK7crMHFdCnphcxVNns/bA8oUelRvB53VibjCtjuynKhlwq46F6l9nA55aJgl9nkbJ48D3FFREN4sWIgzf5Se2qFhc8i1MwDFFUZv/aXOibW3r9YixfOSoNJPiVTby3BRUvP+e2nJVnzMCY47czWjVtOVV43+Fmw5UoeohzR+0xK7BGlmEdzXqmMtaghvQtMIRX/vt2FMY8Ys83m8QVW1wnXZ6CuCtvRg0Z8XKV7FE1dIOakzdMGIg/vLYmxYNHHQvUlCQjQmp9XGWyHn4Xo87ub2ELvPCtWA8I4/9+uDhyM+muc+/ltrruHeZjXIf52R/eDvsmrHDz13WTQ4ioK8H/69Ltpg5gWKbUybCy0I=; 20:RMRUBn3G7OEdR8oTGZi6jkbhzt1MtTEsojvXLxQxZpv3rT0Srsi3M9EApqiTGN4aN3ReTMSwtZQr/HpMiB2csPzzoPFQJ5UOKoMzpmv/oqgI+T01w3yvvd6RzLCvmJIepGcILutiasu4z03k0L4tDUbsq2zI7K7OKp6loPWzG+24/e4F1qyGLumwQouhRdhuuX9RGJ3RZhuIhNuRM5daLXEXff7izProZuzdzue75gR8bI83/LFdbKdOHLsVGVSY X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 01 Nov 2016 15:53:25.0791 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR12MB0663 X-detected-operating-system: by eggs.gnu.org: Windows 7 or 8 [fuzzy] X-Received-From: 104.47.36.70 Subject: [Qemu-devel] [RFC PATCH v3 09/18] core: loader: create memory encryption context before copying data X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: <qemu-devel.nongnu.org> List-Unsubscribe: <https://lists.nongnu.org/mailman/options/qemu-devel>, <mailto:qemu-devel-request@nongnu.org?subject=unsubscribe> List-Archive: <http://lists.nongnu.org/archive/html/qemu-devel/> List-Post: <mailto:qemu-devel@nongnu.org> List-Help: <mailto:qemu-devel-request@nongnu.org?subject=help> List-Subscribe: <https://lists.nongnu.org/mailman/listinfo/qemu-devel>, <mailto:qemu-devel-request@nongnu.org?subject=subscribe> Cc: brijesh.ksingh@gmail.com Errors-To: qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org Sender: "Qemu-devel" <qemu-devel-bounces+patchwork-qemu-devel=patchwork.kernel.org@nongnu.org> X-Virus-Scanned: ClamAV using ClamSMTP |
diff --git a/hw/core/loader.c b/hw/core/loader.c index 6e022b5..52c7e2c 100644 --- a/hw/core/loader.c +++ b/hw/core/loader.c @@ -55,6 +55,7 @@ #include "exec/address-spaces.h" #include "hw/boards.h" #include "qemu/cutils.h" +#include "sysemu/kvm.h" #include <zlib.h> @@ -1045,8 +1046,20 @@ int rom_add_option(const char *file, int32_t bootindex) static void rom_reset(void *unused) { + int ret; Rom *rom; + /* create the memory encryption context before we copy any data + * from internal ROM to guest RAM. + */ + if (kvm_memory_encryption_enabled()) { + ret = kvm_memory_encryption_start(); + if (ret) { + fprintf(stderr, "failed to create memory encryption context\n"); + return; + } + } + QTAILQ_FOREACH(rom, &roms, next) { if (rom->fw_file) { continue; @@ -1074,6 +1087,15 @@ static void rom_reset(void *unused) */ cpu_flush_icache_range(rom->addr, rom->datasize); } + + /* delete the memory encryption context after we are done with copying */ + if (kvm_memory_encryption_enabled()) { + ret = kvm_memory_encryption_finish(); + if (ret) { + fprintf(stderr, "failed to destory memory encryption context\n"); + return; + } + } } int rom_check_and_register_reset(void)
During system boot, rom_reset copies bios binary from internal PC.BIOS ROM to guest RAM (PC.RAM). If memory encryption is enabled then we need to ensure that encryption context is created before we start the copy process. When encryption is enabled any data copy from PC.BIOS ROM to guest RAM will go through the encryption routines which will encrypt the data as it copies into guest memory. Similarly after we are done with copying destory the encryption context. Signed-off-by: Brijesh Singh <brijesh.singh@amd.com> --- hw/core/loader.c | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+)