lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <cover.1734188033.git.kai.huang@intel.com>
Date: Sun, 15 Dec 2024 04:15:41 +1300
From: Kai Huang <kai.huang@...el.com>
To: dave.hansen@...el.com,
	kirill.shutemov@...ux.intel.com,
	tglx@...utronix.de,
	bp@...en8.de,
	peterz@...radead.org,
	mingo@...hat.com,
	hpa@...or.com,
	dan.j.williams@...el.com,
	seanjc@...gle.com,
	pbonzini@...hat.com
Cc: x86@...nel.org,
	linux-kernel@...r.kernel.org,
	rick.p.edgecombe@...el.com,
	isaku.yamahata@...el.com,
	adrian.hunter@...el.com,
	nik.borisov@...e.com,
	kai.huang@...el.com
Subject: [PATCH v9 0/6] TDX host: metadata reading tweaks and feature mandate

This series replaces the existing TDX module metadata reading code with
a new auto-generated global metadata infrastructure for basic KVM TDX
support:

1) read "TDX_FEATURES0" field to mandate the "not clobbering RBP when
   exiting from TDX guest" feature is supported during the module
   initialization.

   Some old modules can clobber host's RBP when exiting from the TDX
   guest, and currently they can be initialized successfully.  We don't
   want to run TDX guests using such modules.  We should just fail to
   initialize them to avoid memory/CPU cycle cost of initializing TDX
   module [1].

2) provide metadata reading infrastructure which is required to read
   more metadata fields to support KVM TDX.  The patches which do so
   can be found at [2][3].

Hi Dave,

This series targets x86 tip.  This is the bare minimum pre-work to
support KVM TDX.  I appreciate if you could review and take this as we
think we have addressed all the comments.

This series has dropped all changes that are not required for TDX KVM
base support.  It includes only:
 - Host metadata infrastructure, which will be used by the KVM patches
   to get TDX module information to boot a TD.
 - The NO_RBP_MOD enforcement, which is required to avoid clobbering
   RBP when running TDX guests using old TDX modules.

The script used to auto-generate the metadata reading code in patch 3
can be found in [4].

History:

v8 -> v9:
 - Take out the "running out of reserved areas" bugfix:
   - Remove CMR reading code in patch 3.
   - Remove patch 7-8.
 - Take out the patch 5 which adds nice-to-have header file inclusions
   but it is not mandatory for KVM TDX.
 - Minor changelog improvement suggested by Rick and Reinette.
 - Rebase to tip/x86/tdx.

 v8: https://lore.kernel.org/lkml/cover.1731498635.git.kai.huang@intel.com/

v7 -> v8:
 - Address Dave's comments to remove the code to print module version
   and CMRs:
   - Remove the code which reads module version in the auto-generated
     code.
   - Remove the patch which prints module version (patch 10 in v7)
   - Remove the code which prints CMRs in patch 7.
   - Update the changelog of some patches that mentioned "reading module
     version" and "print CMRs".
 - Collect Nikolay's tag.

Previous versions and more background info please see:

 - https://lore.kernel.org/kvm/6ab90fd332bccdec7b64e5909cb4637732d6bb01.1731318868.git.kai.huang@intel.com/T/

[1]: https://lore.kernel.org/fc0e8ab7-86d4-4428-be31-82e1ece6dd21@intel.com/
[2]: https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?h=kvm-coco-queue&id=594fc3256733fe2c5b8bd9007effea2083431861
[3]: https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?h=kvm-coco-queue&id=8bb81c97ec53b8a3dea29572cdb6ecfa4ff3a181
[4]: https://lore.kernel.org/762a50133300710771337398284567b299a86f67.camel@intel.com/




Kai Huang (5):
  x86/virt/tdx: Rename 'struct tdx_tdmr_sysinfo' to reflect the spec
    better
  x86/virt/tdx: Start to track all global metadata in one structure
  x86/virt/tdx: Use dedicated struct members for PAMT entry sizes
  x86/virt/tdx: Switch to use auto-generated global metadata reading
    code
  x86/virt/tdx: Require the module to assert it has the NO_RBP_MOD
    mitigation

Paolo Bonzini (1):
  x86/virt/tdx: Use auto-generated code to read global metadata

 arch/x86/virt/vmx/tdx/tdx.c                 | 95 +++++++--------------
 arch/x86/virt/vmx/tdx/tdx.h                 | 40 +--------
 arch/x86/virt/vmx/tdx/tdx_global_metadata.c | 48 +++++++++++
 arch/x86/virt/vmx/tdx/tdx_global_metadata.h | 25 ++++++
 4 files changed, 108 insertions(+), 100 deletions(-)
 create mode 100644 arch/x86/virt/vmx/tdx/tdx_global_metadata.c
 create mode 100644 arch/x86/virt/vmx/tdx/tdx_global_metadata.h


base-commit: 564ea84c8c14b007d7838bfb1327295b873573be
-- 
2.47.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ