|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [RFC PATCH 00/16] Confidential computing and AMD SEV support
Hello,
This series introduce support for confidential computing along with a
AMD SEV implementation. It also bundles some of the functional
requirements (ASID scheme, ABI, ...) which could be separated if needed.
(I bundled everything in this serie to have a complete coherent serie)
This work receives funding by the Hyper Open X consortium (France 2030).
# Concepts
A confidential guest is a bit special as :
- its memory is by default encrypted or not directly accessible by the
hypervisor, thus other domains/dom0 as well; it must be explicitely
shared by the guest itself
- so its page-tables are also not accessible
# Implementation
Confidential computing is exposed in a uniform way regardless of actual
implementation (SEV, TDX, RME, ...) through the coco_op hypercall (mostly
for use by the Dom0 toolstack). This interface provides a way to query
informations on the coco platform (support status, features (un)safety,
...), and prepare initial guest memory.
Only HVM domains have support for confidential computing.
(in the future, we may want to have attestation support)
In order to create a confidential computing domain, the process is follow :
- create a HVM/PVH domain with XEN_DOMCTL_CDF_coco
- populate initial memory as usual
- apply coco_prepare_initial_mem on all initial pages
(under SEV, this will encrypt memory)
Under xl, it is exposed through the `coco` parameter ("coco = 1").
Xen hypercalls usually use virtual addresses as parameter, which causes issues
when issuing them from a confidential guest (where its memory is usually not
available to the hypervisor e.g encryted). This problem is solved by introducing
a new experimental hypercall ABI ("Physical Address ABI") which don't use
virtual
addresses anymore, of course it needs explicit guest support.
## SEV Implementation
Currently, only plain SEV (no ES) is implemented. I would prefer to use SEV-ES
as plain SEV has several flaws like having non-trivial emulation paths and the
hypervisor can break the guest encryption by manipulating its registers (unlike
SEV-ES where the hypervisor has a very controlled view on guest registers).
# Series organization
The first part introduce some non-coco/SEV specific bits.
The second part introduce a physical address ABI, that is required to
make proper hypercalls under a confidential computing guest. That's
something that we should discuss more, but for now, it allows some
minimal guest hypercall support in confidential computing guest.
A patch introduce a ASID management rework (based on Vaishali's work)
required to make SEV work, as in this case the ASID is tied to the guest
encryption key. Which also includes a rework on TLB flushing logic.
Then a general confidential computing infrastructure (not SEV-specific)
along with the AMD SEV implementation.
And some extra patches to workaround some limitations (DF_FLUSH support
and temporary debug tools).
You can find Linux branches with early SEV support (more or less working)
https://github.com/xcp-ng/linux/tree/xen-sev-6.6/
https://github.com/xcp-ng/linux/tree/xen-sev-6.14/
Teddy Astie (16):
x86/msr: Introduce SYSCFG_MEM_ENCRYPT MSR.
x86/svm: Move svm_domain structure to svm.h
x86/hvm: Add support for physical address ABI
x86/public: Expose physaddr_abi through Xen HVM CPUID leaf
docs/x86: Document HVM Physical Addresss ABI
vmx: Introduce vcpu single context VPID invalidation
x86/hvm: Introduce Xen-wide ASID allocator
x86/crypto: Introduce AMD PSP driver for SEV
common: Introduce confidential computing infrastructure
xl/coco: Introduce confidential computing support
x86/svm: Introduce NPCTRL VMCB bits
x86/cpufeature: Introduce SME and SEV-related CPU features
x86/coco: Introduce AMD-SEV support
sev/emulate: Handle some non-emulable HVM paths
HACK: coco: Leak ASID for coco guests
HACK: Add sev_console hypercall
docs/guest-guide/x86/hypercall-abi.rst | 4 +
tools/include/libxl.h | 5 +
tools/include/xenctrl.h | 4 +
tools/include/xenguest.h | 1 +
tools/libs/ctrl/xc_domain.c | 36 +
tools/libs/guest/Makefile.common | 2 +
tools/libs/guest/xg_dom_boot.c | 33 +
tools/libs/guest/xg_dom_coco.c | 35 +
tools/libs/guest/xg_dom_coco.h | 39 +
tools/libs/guest/xg_dom_x86.c | 1 +
tools/libs/light/libxl_cpuid.c | 1 +
tools/libs/light/libxl_create.c | 4 +
tools/libs/light/libxl_dom.c | 1 +
tools/libs/light/libxl_types.idl | 1 +
tools/libs/util/libxlu_disk_l.c | 13 +-
tools/libs/util/libxlu_disk_l.h | 7 +-
tools/misc/xen-cpuid.c | 1 +
tools/ocaml/libs/xc/xenctrl.ml | 1 +
tools/ocaml/libs/xc/xenctrl.mli | 1 +
tools/xl/xl_parse.c | 2 +
xen/arch/x86/Makefile | 1 +
xen/arch/x86/coco/Makefile | 1 +
xen/arch/x86/coco/sev.c | 262 ++++++
xen/arch/x86/cpu/amd.c | 10 +
xen/arch/x86/cpu/common.c | 2 +
xen/arch/x86/cpuid.c | 7 +
xen/arch/x86/domain.c | 4 +
xen/arch/x86/flushtlb.c | 7 +-
xen/arch/x86/hvm/Kconfig | 10 +
xen/arch/x86/hvm/asid.c | 170 ++--
xen/arch/x86/hvm/emulate.c | 139 +++-
xen/arch/x86/hvm/hvm.c | 55 +-
xen/arch/x86/hvm/hypercall.c | 17 +-
xen/arch/x86/hvm/nestedhvm.c | 7 +-
xen/arch/x86/hvm/svm/asid.c | 77 +-
xen/arch/x86/hvm/svm/nestedsvm.c | 2 +-
xen/arch/x86/hvm/svm/svm.c | 43 +-
xen/arch/x86/hvm/svm/svm.h | 4 -
xen/arch/x86/hvm/svm/vmcb.c | 17 +-
xen/arch/x86/hvm/vmx/vmcs.c | 6 +-
xen/arch/x86/hvm/vmx/vmx.c | 68 +-
xen/arch/x86/hvm/vmx/vvmx.c | 5 +-
xen/arch/x86/include/asm/coco.h | 8 +
xen/arch/x86/include/asm/cpufeature.h | 4 +
xen/arch/x86/include/asm/hvm/asid.h | 26 +-
xen/arch/x86/include/asm/hvm/domain.h | 2 +
xen/arch/x86/include/asm/hvm/hvm.h | 15 +-
xen/arch/x86/include/asm/hvm/svm/sev.h | 14 +
xen/arch/x86/include/asm/hvm/svm/svm.h | 32 +
xen/arch/x86/include/asm/hvm/svm/vmcb.h | 22 +-
xen/arch/x86/include/asm/hvm/vcpu.h | 10 +-
xen/arch/x86/include/asm/hvm/vmx/vmx.h | 19 +-
xen/arch/x86/include/asm/msr-index.h | 1 +
xen/arch/x86/include/asm/psp-sev.h | 655 +++++++++++++++
xen/arch/x86/mm/hap/hap.c | 7 +-
xen/arch/x86/mm/p2m.c | 7 +-
xen/arch/x86/mm/paging.c | 2 +-
xen/arch/x86/mm/shadow/hvm.c | 1 +
xen/arch/x86/mm/shadow/multi.c | 1 +
xen/common/Kconfig | 5 +
xen/common/Makefile | 1 +
xen/common/coco.c | 140 ++++
xen/common/domain.c | 41 +-
xen/drivers/Kconfig | 2 +
xen/drivers/Makefile | 1 +
xen/drivers/crypto/Kconfig | 10 +
xen/drivers/crypto/Makefile | 1 +
xen/drivers/crypto/asp.c | 830 ++++++++++++++++++++
xen/include/hypercall-defs.c | 4 +
xen/include/public/arch-x86/cpufeatureset.h | 5 +
xen/include/public/arch-x86/cpuid.h | 2 +
xen/include/public/domctl.h | 5 +-
xen/include/public/hvm/coco.h | 65 ++
xen/include/public/xen.h | 2 +
xen/include/xen/coco.h | 88 +++
xen/include/xen/lib/x86/cpu-policy.h | 9 +-
xen/include/xen/sched.h | 14 +
77 files changed, 2859 insertions(+), 298 deletions(-)
create mode 100644 tools/libs/guest/xg_dom_coco.c
create mode 100644 tools/libs/guest/xg_dom_coco.h
create mode 100644 xen/arch/x86/coco/Makefile
create mode 100644 xen/arch/x86/coco/sev.c
create mode 100644 xen/arch/x86/include/asm/coco.h
create mode 100644 xen/arch/x86/include/asm/hvm/svm/sev.h
create mode 100644 xen/arch/x86/include/asm/psp-sev.h
create mode 100644 xen/common/coco.c
create mode 100644 xen/drivers/crypto/Kconfig
create mode 100644 xen/drivers/crypto/Makefile
create mode 100644 xen/drivers/crypto/asp.c
create mode 100644 xen/include/public/hvm/coco.h
create mode 100644 xen/include/xen/coco.h
--
2.49.0
Teddy Astie | Vates XCP-ng Developer
XCP-ng & Xen Orchestra - Vates solutions
web: https://vates.tech
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |