Re: [PATCH v8 11/18] KVM: x86: Introduce KVM_SET_PAGE_ENC_BITMAP ioctl

2020-05-29 Thread Steve Rutherford
On Tue, May 5, 2020 at 2:18 PM Ashish Kalra  wrote:
>
> From: Brijesh Singh 
>
> The ioctl can be used to set page encryption bitmap for an
> incoming guest.
>
> Cc: Thomas Gleixner 
> Cc: Ingo Molnar 
> Cc: "H. Peter Anvin" 
> Cc: Paolo Bonzini 
> Cc: "Radim Krčmář" 
> Cc: Joerg Roedel 
> Cc: Borislav Petkov 
> Cc: Tom Lendacky 
> Cc: x...@kernel.org
> Cc: k...@vger.kernel.org
> Cc: linux-kernel@vger.kernel.org
> Reviewed-by: Venu Busireddy 
> Signed-off-by: Brijesh Singh 
> Signed-off-by: Ashish Kalra 
> ---
>  Documentation/virt/kvm/api.rst  | 44 +
>  arch/x86/include/asm/kvm_host.h |  2 ++
>  arch/x86/kvm/svm/sev.c  | 50 +
>  arch/x86/kvm/svm/svm.c  |  1 +
>  arch/x86/kvm/svm/svm.h  |  1 +
>  arch/x86/kvm/x86.c  | 12 
>  include/uapi/linux/kvm.h|  1 +
>  7 files changed, 111 insertions(+)
>
> diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst
> index ecad84086892..fa70017ee693 100644
> --- a/Documentation/virt/kvm/api.rst
> +++ b/Documentation/virt/kvm/api.rst
> @@ -4663,6 +4663,28 @@ or shared. The bitmap can be used during the guest 
> migration. If the page
>  is private then the userspace need to use SEV migration commands to transmit
>  the page.
>
> +4.126 KVM_SET_PAGE_ENC_BITMAP (vm ioctl)
> +---
> +
> +:Capability: basic
> +:Architectures: x86
> +:Type: vm ioctl
> +:Parameters: struct kvm_page_enc_bitmap (in/out)
> +:Returns: 0 on success, -1 on error
> +
> +/* for KVM_SET_PAGE_ENC_BITMAP */
> +struct kvm_page_enc_bitmap {
> +   __u64 start_gfn;
> +   __u64 num_pages;
> +   union {
> +   void __user *enc_bitmap; /* one bit per page */
> +   __u64 padding2;
> +   };
> +};
> +
> +During the guest live migration the outgoing guest exports its page 
> encryption
> +bitmap, the KVM_SET_PAGE_ENC_BITMAP can be used to build the page encryption
> +bitmap for an incoming guest.
>
>  4.125 KVM_S390_PV_COMMAND
>  -
> @@ -4717,6 +4739,28 @@ KVM_PV_VM_VERIFY
>Verify the integrity of the unpacked image. Only if this succeeds,
>KVM is allowed to start protected VCPUs.
>
> +4.126 KVM_SET_PAGE_ENC_BITMAP (vm ioctl)
> +---
> +
> +:Capability: basic
> +:Architectures: x86
> +:Type: vm ioctl
> +:Parameters: struct kvm_page_enc_bitmap (in/out)
> +:Returns: 0 on success, -1 on error
> +
> +/* for KVM_SET_PAGE_ENC_BITMAP */
> +struct kvm_page_enc_bitmap {
> +   __u64 start_gfn;
> +   __u64 num_pages;
> +   union {
> +   void __user *enc_bitmap; /* one bit per page */
> +   __u64 padding2;
> +   };
> +};
> +
> +During the guest live migration the outgoing guest exports its page 
> encryption
> +bitmap, the KVM_SET_PAGE_ENC_BITMAP can be used to build the page encryption
> +bitmap for an incoming guest.
>
>  5. The kvm_run structure
>  
> diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
> index 9e428befb6a4..fc74144d5ab0 100644
> --- a/arch/x86/include/asm/kvm_host.h
> +++ b/arch/x86/include/asm/kvm_host.h
> @@ -1258,6 +1258,8 @@ struct kvm_x86_ops {
>   unsigned long sz, unsigned long mode);
> int (*get_page_enc_bitmap)(struct kvm *kvm,
> struct kvm_page_enc_bitmap *bmap);
> +   int (*set_page_enc_bitmap)(struct kvm *kvm,
> +   struct kvm_page_enc_bitmap *bmap);
>  };
>
>  struct kvm_x86_init_ops {
> diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
> index 387045902470..30efc1068707 100644
> --- a/arch/x86/kvm/svm/sev.c
> +++ b/arch/x86/kvm/svm/sev.c
> @@ -1504,6 +1504,56 @@ int svm_get_page_enc_bitmap(struct kvm *kvm,
> return ret;
>  }
>
> +int svm_set_page_enc_bitmap(struct kvm *kvm,
> +  struct kvm_page_enc_bitmap *bmap)
> +{
> +   struct kvm_sev_info *sev = _kvm_svm(kvm)->sev_info;
> +   unsigned long gfn_start, gfn_end;
> +   unsigned long *bitmap;
> +   unsigned long sz;
> +   int ret;
> +
> +   if (!sev_guest(kvm))
> +   return -ENOTTY;
> +   /* special case of resetting the complete bitmap */
> +   if (!bmap->enc_bitmap) {
> +   mutex_lock(>lock);
> +   /* by default all pages are marked encrypted */
> +   if (sev->page_enc_bmap_size)
> +   bitmap_fill(sev->page_enc_bmap,
> +   sev->page_enc_bmap_size);
> +   mutex_unlock(>lock);
> +   return 0;
> +   }
>
> +
> +   gfn_start = bmap->start_gfn;
> +   gfn_end = gfn_start + bmap->num_pages;
> +
> +   sz = ALIGN(bmap->num_pages, BITS_PER_LONG) / 8;
> +   bitmap = kmalloc(sz, GFP_KERNEL);
> +   if (!bitmap)
> +   return -ENOMEM;
> +
> +   ret = 

[PATCH v8 11/18] KVM: x86: Introduce KVM_SET_PAGE_ENC_BITMAP ioctl

2020-05-05 Thread Ashish Kalra
From: Brijesh Singh 

The ioctl can be used to set page encryption bitmap for an
incoming guest.

Cc: Thomas Gleixner 
Cc: Ingo Molnar 
Cc: "H. Peter Anvin" 
Cc: Paolo Bonzini 
Cc: "Radim Krčmář" 
Cc: Joerg Roedel 
Cc: Borislav Petkov 
Cc: Tom Lendacky 
Cc: x...@kernel.org
Cc: k...@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Reviewed-by: Venu Busireddy 
Signed-off-by: Brijesh Singh 
Signed-off-by: Ashish Kalra 
---
 Documentation/virt/kvm/api.rst  | 44 +
 arch/x86/include/asm/kvm_host.h |  2 ++
 arch/x86/kvm/svm/sev.c  | 50 +
 arch/x86/kvm/svm/svm.c  |  1 +
 arch/x86/kvm/svm/svm.h  |  1 +
 arch/x86/kvm/x86.c  | 12 
 include/uapi/linux/kvm.h|  1 +
 7 files changed, 111 insertions(+)

diff --git a/Documentation/virt/kvm/api.rst b/Documentation/virt/kvm/api.rst
index ecad84086892..fa70017ee693 100644
--- a/Documentation/virt/kvm/api.rst
+++ b/Documentation/virt/kvm/api.rst
@@ -4663,6 +4663,28 @@ or shared. The bitmap can be used during the guest 
migration. If the page
 is private then the userspace need to use SEV migration commands to transmit
 the page.
 
+4.126 KVM_SET_PAGE_ENC_BITMAP (vm ioctl)
+---
+
+:Capability: basic
+:Architectures: x86
+:Type: vm ioctl
+:Parameters: struct kvm_page_enc_bitmap (in/out)
+:Returns: 0 on success, -1 on error
+
+/* for KVM_SET_PAGE_ENC_BITMAP */
+struct kvm_page_enc_bitmap {
+   __u64 start_gfn;
+   __u64 num_pages;
+   union {
+   void __user *enc_bitmap; /* one bit per page */
+   __u64 padding2;
+   };
+};
+
+During the guest live migration the outgoing guest exports its page encryption
+bitmap, the KVM_SET_PAGE_ENC_BITMAP can be used to build the page encryption
+bitmap for an incoming guest.
 
 4.125 KVM_S390_PV_COMMAND
 -
@@ -4717,6 +4739,28 @@ KVM_PV_VM_VERIFY
   Verify the integrity of the unpacked image. Only if this succeeds,
   KVM is allowed to start protected VCPUs.
 
+4.126 KVM_SET_PAGE_ENC_BITMAP (vm ioctl)
+---
+
+:Capability: basic
+:Architectures: x86
+:Type: vm ioctl
+:Parameters: struct kvm_page_enc_bitmap (in/out)
+:Returns: 0 on success, -1 on error
+
+/* for KVM_SET_PAGE_ENC_BITMAP */
+struct kvm_page_enc_bitmap {
+   __u64 start_gfn;
+   __u64 num_pages;
+   union {
+   void __user *enc_bitmap; /* one bit per page */
+   __u64 padding2;
+   };
+};
+
+During the guest live migration the outgoing guest exports its page encryption
+bitmap, the KVM_SET_PAGE_ENC_BITMAP can be used to build the page encryption
+bitmap for an incoming guest.
 
 5. The kvm_run structure
 
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index 9e428befb6a4..fc74144d5ab0 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
@@ -1258,6 +1258,8 @@ struct kvm_x86_ops {
  unsigned long sz, unsigned long mode);
int (*get_page_enc_bitmap)(struct kvm *kvm,
struct kvm_page_enc_bitmap *bmap);
+   int (*set_page_enc_bitmap)(struct kvm *kvm,
+   struct kvm_page_enc_bitmap *bmap);
 };
 
 struct kvm_x86_init_ops {
diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c
index 387045902470..30efc1068707 100644
--- a/arch/x86/kvm/svm/sev.c
+++ b/arch/x86/kvm/svm/sev.c
@@ -1504,6 +1504,56 @@ int svm_get_page_enc_bitmap(struct kvm *kvm,
return ret;
 }
 
+int svm_set_page_enc_bitmap(struct kvm *kvm,
+  struct kvm_page_enc_bitmap *bmap)
+{
+   struct kvm_sev_info *sev = _kvm_svm(kvm)->sev_info;
+   unsigned long gfn_start, gfn_end;
+   unsigned long *bitmap;
+   unsigned long sz;
+   int ret;
+
+   if (!sev_guest(kvm))
+   return -ENOTTY;
+   /* special case of resetting the complete bitmap */
+   if (!bmap->enc_bitmap) {
+   mutex_lock(>lock);
+   /* by default all pages are marked encrypted */
+   if (sev->page_enc_bmap_size)
+   bitmap_fill(sev->page_enc_bmap,
+   sev->page_enc_bmap_size);
+   mutex_unlock(>lock);
+   return 0;
+   }
+
+   gfn_start = bmap->start_gfn;
+   gfn_end = gfn_start + bmap->num_pages;
+
+   sz = ALIGN(bmap->num_pages, BITS_PER_LONG) / 8;
+   bitmap = kmalloc(sz, GFP_KERNEL);
+   if (!bitmap)
+   return -ENOMEM;
+
+   ret = -EFAULT;
+   if (copy_from_user(bitmap, bmap->enc_bitmap, sz))
+   goto out;
+
+   mutex_lock(>lock);
+   ret = sev_resize_page_enc_bitmap(kvm, gfn_end);
+   if (ret)
+   goto unlock;
+
+   bitmap_copy(sev->page_enc_bmap + BIT_WORD(gfn_start), bitmap,
+   (gfn_end - gfn_start));