Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp429278ybz; Tue, 21 Apr 2020 11:47:32 -0700 (PDT) X-Google-Smtp-Source: APiQypLjvLh4ChQHstP8FREke9TI76PtDsqHVrRfzcT1/WVNG8yxFECiZcBKXE8xsleoKGYDBeHp X-Received: by 2002:a17:906:cd0d:: with SMTP id oz13mr22643224ejb.82.1587494852496; Tue, 21 Apr 2020 11:47:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587494852; cv=none; d=google.com; s=arc-20160816; b=HRY5jspHmqpzpooovrN7OqlidBYTDhMpPdtQupiqEThxCYXYq6DtAnLHkh3uI1nSVK tTJedi2eBVAynpuDdsPVZYZn5QFOPv3a1XfFeEVA2KWy3uRRU+7ixJRZAkh0Hat4czJ2 yYbCp5UdCppOiF4aJgnV/mQ/GaR4URk2VyDXR4MA/FYhXghClZVdgXV+35qh8UP0KNdw Xb4z6IP2iNX+X/nq3fF3K/bx6vUVH7ygH9l4niCShLF5Gsf3lmPOvqAZyI5XvquVOZSk XM6RXuVKkGrhgcmhEmHIvyy4QtzHIUTz98b4TE7Tx0Kdp4z6DK0gWVTef5J4N017Ld+V csNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:dkim-signature; bh=vsbWuzgjSRqPVgjOvuPHmqAcGQpcFjP8Gy0kRb8w6Sg=; b=yGk6C6rDXAhPXJOK7IJxuZ6axCpY8MCP3m9hBrdHOjZK9b2z6N4M6owcWLJiUKJoWr NHdA676MvwcMtl5AUwyequDD3PG0FbtQTCela0Wifz0Gymya/SqyzWaE4muhemEit3Bx URhcpkgYJa8PNIPqrxvjrE3vhBbSODQpYcYzXsgyLisZHBzuid0/Igt//1wNWI9LWMNA UzS1oQLP9+/OGouwOUxN8F9c38b14FgqgWN+4FeTYu1LWn04BVtXnayPHZx8UF0t+wPv fgQPDhRkM6ROiEXE7mcSzrRPI0YnU0qbYpLrZ/xQb2tt9Vd/3bQkDHs3BpbJMDpiRVPI 1vzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=Wv3a2NFU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a16si2020071ejt.100.2020.04.21.11.47.08; Tue, 21 Apr 2020 11:47:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.com header.s=amazon201209 header.b=Wv3a2NFU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729611AbgDUSn0 (ORCPT + 99 others); Tue, 21 Apr 2020 14:43:26 -0400 Received: from smtp-fw-33001.amazon.com ([207.171.190.10]:62396 "EHLO smtp-fw-33001.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729540AbgDUSnQ (ORCPT ); Tue, 21 Apr 2020 14:43:16 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1587494597; x=1619030597; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=vsbWuzgjSRqPVgjOvuPHmqAcGQpcFjP8Gy0kRb8w6Sg=; b=Wv3a2NFUSwqgumKKuvgYjN+Q4+hPCE7twqQv1ZHn6M+KyX+Qh4jibtah ehg9eUBrJe36Nr9/UoccXkU9Rbtr15UWma/DzYnQsqXT8oLWlVTo6W/P9 T6IyIM80h0/ZrOdiEx1LxZsyRsf66DVOUCgMTHDudHYIbxKBA0VC1x9zc I=; IronPort-SDR: PltIrDIistU/XYafnYcpmG7MXZt7LkYZ3U8tHqeItECEmLtdhAfmS0mSZfK+ROttI+pgmP4Hg0 n2vfmYCGWDRw== X-IronPort-AV: E=Sophos;i="5.72,411,1580774400"; d="scan'208";a="39978516" Received: from sea32-co-svc-lb4-vlan3.sea.corp.amazon.com (HELO email-inbound-relay-2a-e7be2041.us-west-2.amazon.com) ([10.47.23.38]) by smtp-border-fw-out-33001.sea14.amazon.com with ESMTP; 21 Apr 2020 18:43:16 +0000 Received: from EX13MTAUEA002.ant.amazon.com (pdx4-ws-svc-p6-lb7-vlan2.pdx.amazon.com [10.170.41.162]) by email-inbound-relay-2a-e7be2041.us-west-2.amazon.com (Postfix) with ESMTPS id B7613A22FD; Tue, 21 Apr 2020 18:43:15 +0000 (UTC) Received: from EX13D16EUB003.ant.amazon.com (10.43.166.99) by EX13MTAUEA002.ant.amazon.com (10.43.61.77) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 21 Apr 2020 18:43:15 +0000 Received: from 38f9d34ed3b1.ant.amazon.com (10.43.160.90) by EX13D16EUB003.ant.amazon.com (10.43.166.99) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 21 Apr 2020 18:43:06 +0000 From: Andra Paraschiv To: CC: Anthony Liguori , Benjamin Herrenschmidt , Colm MacCarthaigh , Bjoern Doebel , David Woodhouse , Frank van der Linden , Alexander Graf , Martin Pohlack , Matt Wilson , Paolo Bonzini , Balbir Singh , Stewart Smith , Uwe Dannowski , , , Andra Paraschiv Subject: [PATCH v1 08/15] nitro_enclaves: Add logic for enclave vm creation Date: Tue, 21 Apr 2020 21:41:43 +0300 Message-ID: <20200421184150.68011-9-andraprs@amazon.com> X-Mailer: git-send-email 2.20.1 (Apple Git-117) In-Reply-To: <20200421184150.68011-1-andraprs@amazon.com> References: <20200421184150.68011-1-andraprs@amazon.com> MIME-Version: 1.0 X-Originating-IP: [10.43.160.90] X-ClientProxiedBy: EX13D37UWC004.ant.amazon.com (10.43.162.212) To EX13D16EUB003.ant.amazon.com (10.43.166.99) Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add ioctl command logic for enclave VM creation. It triggers a slot allocation. The enclave resources will be associated with this slot and it will be used as an identifier for triggering enclave run. Return a file descriptor, namely enclave fd. This is further used by the associated user space enclave process to set enclave resources and trigger enclave termination. The poll function is implemented in order to notify the enclave process when an enclave exits without a specific enclave termination command trigger e.g. when an enclave crashes. Signed-off-by: Alexandru Vasile Signed-off-by: Andra Paraschiv --- .../virt/amazon/nitro_enclaves/ne_misc_dev.c | 166 ++++++++++++++++++ 1 file changed, 166 insertions(+) diff --git a/drivers/virt/amazon/nitro_enclaves/ne_misc_dev.c b/drivers/virt/amazon/nitro_enclaves/ne_misc_dev.c index d22a76ed07e5..abbebc7718c2 100644 --- a/drivers/virt/amazon/nitro_enclaves/ne_misc_dev.c +++ b/drivers/virt/amazon/nitro_enclaves/ne_misc_dev.c @@ -60,6 +60,145 @@ static struct ne_cpu_pool ne_cpu_pool; static struct mutex ne_cpu_pool_mutex; +static int ne_enclave_open(struct inode *node, struct file *file) +{ + return 0; +} + +static long ne_enclave_ioctl(struct file *file, unsigned int cmd, + unsigned long arg) +{ + switch (cmd) { + default: + return -ENOTTY; + } + + return 0; +} + +static int ne_enclave_release(struct inode *inode, struct file *file) +{ + return 0; +} + +static __poll_t ne_enclave_poll(struct file *file, poll_table *wait) +{ + __poll_t mask = 0; + struct ne_enclave *ne_enclave = file->private_data; + + poll_wait(file, &ne_enclave->eventq, wait); + + if (!ne_enclave->has_event) + return mask; + + mask = POLLHUP; + + return mask; +} + +static const struct file_operations ne_enclave_fops = { + .owner = THIS_MODULE, + .llseek = noop_llseek, + .poll = ne_enclave_poll, + .unlocked_ioctl = ne_enclave_ioctl, + .open = ne_enclave_open, + .release = ne_enclave_release, +}; + +/** + * ne_create_vm_ioctl - Alloc slot to be associated with an enclave. Create + * enclave file descriptor to be further used for enclave resources handling + * e.g. memory regions and CPUs. + * + * This function gets called with the ne_pci_dev enclave mutex held. + * + * @pdev: PCI device used for enclave lifetime management. + * @ne_pci_dev: private data associated with the PCI device. + * @type: type of the virtual machine to be created. + * + * @returns: enclave fd on success, negative return value on failure. + */ +static int ne_create_vm_ioctl(struct pci_dev *pdev, + struct ne_pci_dev *ne_pci_dev, unsigned long type) +{ + struct ne_pci_dev_cmd_reply cmd_reply = {}; + int fd = 0; + struct file *file = NULL; + struct ne_enclave *ne_enclave = NULL; + int rc = -EINVAL; + struct slot_alloc_req slot_alloc_req = {}; + + BUG_ON(!pdev); + BUG_ON(!ne_pci_dev); + + ne_enclave = kzalloc(sizeof(*ne_enclave), GFP_KERNEL); + if (!ne_enclave) + return -ENOMEM; + + if (!zalloc_cpumask_var(&ne_enclave->cpu_siblings, GFP_KERNEL)) { + kzfree(ne_enclave); + + return -ENOMEM; + } + + fd = get_unused_fd_flags(O_CLOEXEC); + if (fd < 0) { + rc = fd; + + pr_err_ratelimited("Failure in getting unused fd [rc=%d]\n", + rc); + + goto err_get_unused_fd; + } + + file = anon_inode_getfile("ne-vm", &ne_enclave_fops, ne_enclave, + O_RDWR); + if (IS_ERR(file)) { + rc = PTR_ERR(file); + + pr_err_ratelimited("Failure in anon inode get file [rc=%d]\n", + rc); + + goto err_anon_inode_getfile; + } + + ne_enclave->pdev = pdev; + + rc = ne_do_request(ne_enclave->pdev, SLOT_ALLOC, &slot_alloc_req, + sizeof(slot_alloc_req), &cmd_reply, + sizeof(cmd_reply)); + if (rc < 0) { + pr_err_ratelimited("Failure in slot alloc [rc=%d]\n", rc); + + goto err_slot_alloc; + } + + init_waitqueue_head(&ne_enclave->eventq); + ne_enclave->has_event = false; + mutex_init(&ne_enclave->enclave_info_mutex); + ne_enclave->max_mem_regions = cmd_reply.mem_regions; + INIT_LIST_HEAD(&ne_enclave->mem_regions_list); + ne_enclave->mm = current->mm; + ne_enclave->slot_uid = cmd_reply.slot_uid; + ne_enclave->state = NE_STATE_INIT; + INIT_LIST_HEAD(&ne_enclave->vcpu_ids_list); + + list_add(&ne_enclave->enclave_list_entry, &ne_pci_dev->enclaves_list); + + fd_install(fd, file); + + return fd; + +err_slot_alloc: + fput(file); +err_anon_inode_getfile: + put_unused_fd(fd); +err_get_unused_fd: + free_cpumask_var(ne_enclave->cpu_siblings); + kzfree(ne_enclave); + return rc; +} + static int ne_open(struct inode *node, struct file *file) { return 0; @@ -67,7 +206,34 @@ static int ne_open(struct inode *node, struct file *file) static long ne_ioctl(struct file *file, unsigned int cmd, unsigned long arg) { + struct ne_pci_dev *ne_pci_dev = NULL; + struct pci_dev *pdev = pci_get_device(PCI_VENDOR_ID_AMAZON, + PCI_DEVICE_ID_NE, NULL); + + BUG_ON(!pdev); + + ne_pci_dev = pci_get_drvdata(pdev); + BUG_ON(!ne_pci_dev); + switch (cmd) { + case KVM_CREATE_VM: { + int rc = -EINVAL; + unsigned long type = 0; + + if (copy_from_user(&type, (void *)arg, sizeof(type))) { + pr_err_ratelimited("Failure in copy from user\n"); + + return -EFAULT; + } + + mutex_lock(&ne_pci_dev->enclaves_list_mutex); + + rc = ne_create_vm_ioctl(pdev, ne_pci_dev, type); + + mutex_unlock(&ne_pci_dev->enclaves_list_mutex); + + return rc; + } default: return -ENOTTY; -- 2.20.1 (Apple Git-117) Amazon Development Center (Romania) S.R.L. registered office: 27A Sf. Lazar Street, UBC5, floor 2, Iasi, Iasi County, 700045, Romania. Registered in Romania. Registration number J22/2621/2005.