Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp857928pxb; Thu, 21 Oct 2021 10:47:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxkKWZh44WJnbddNeQ3hvlB/jpVCcss28K8HeuISiFJqTqD4tz4X43+5/KJUfKtC3xlIpJF X-Received: by 2002:a05:6a00:1706:b0:44d:a354:b273 with SMTP id h6-20020a056a00170600b0044da354b273mr7013264pfc.72.1634838459993; Thu, 21 Oct 2021 10:47:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634838459; cv=none; d=google.com; s=arc-20160816; b=HgBMkfMdZduGVhjOLohrtjGASLi5XobcRyUmvjydItq8ScpDfL83wCDWa+7xFKkmep zQnmtWIxBV6Gt5PVze4HDgURegGthJLzgGrFfGY/3Xz5A3OYffYWSvJVy4K34BNxiLxP ssKEZZPS9XzZtNJEGpLeJ6xI2c4K1v59i5y8w1dzhNpzCUptB02sNKwYQAfMxCfVkNds dB/D3CA51ExwYzbSEx91Dc7LNSpZB3sgVi0mNQs5cpX4V8tFeriEUuai+eNfyXh/u2xf h8SQRwd/TQ7gFbABdG9DVNSfDTTmrPEFzTtR0jdY/04mm7mb9XfeiHXY/ACSPAdSpXd0 YgZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=t2TzXOzaxxpB1r0axVc03dmlkYGdQb1MoD9TI8b+FpM=; b=XeIXTzwwzvUvpkZSe+XkbMylCny4skVhG+QpfxtLeUYKo03/cUst5zipLdisfa3/k0 1wJFfsCbaVUGupA1Dgzf4RtxRjweWbjw+tCvIdRwgPmzM6fTnvixXcFcspNHKvcEV/vQ rTZyPoWsFV6CAz5jp4mBblMRdB6IvEaGnDABp4b1e4BRpRMVmaP6bvA9DpM5oGLcB6mH AGO/I5GIN63+uqQDyfYqAqWcSzfz5mitubPdSHltFW9SAxVN0S7nQV+NTE+nabz/AGTi 41Yn2ahNfaVnA3cavfpR+JEKKKVW5KsjiN/G6tZcXntIWTEUDUHmsQ4N6DT7AnO67rod Xnxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Lo4R0SIA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t11si6403813pgk.290.2021.10.21.10.47.26; Thu, 21 Oct 2021 10:47:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Lo4R0SIA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232292AbhJURsD (ORCPT + 99 others); Thu, 21 Oct 2021 13:48:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57118 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231980AbhJURrK (ORCPT ); Thu, 21 Oct 2021 13:47:10 -0400 Received: from mail-pl1-x649.google.com (mail-pl1-x649.google.com [IPv6:2607:f8b0:4864:20::649]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E9690C061243 for ; Thu, 21 Oct 2021 10:43:12 -0700 (PDT) Received: by mail-pl1-x649.google.com with SMTP id r11-20020a170902be0b00b0013f4f30d71cso527913pls.21 for ; Thu, 21 Oct 2021 10:43:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=t2TzXOzaxxpB1r0axVc03dmlkYGdQb1MoD9TI8b+FpM=; b=Lo4R0SIABnEKWtPLq3zmyvItjcnNmf/4BPykBWra/2dkYB3e+NId5kGorRp0rczI6M mgIzD2od3iMK2q88PR3bqZTZcKEVkUtK2tNIYbnwzDN7GY7/QKh6j+DgGOiVCpIiOmzn bK7seoyUeH75t0Absc4uTTWajK6C4RBcVshkC2REIJI1Xuf5U9Gx1FZoXJkzSgUdmM5n fdpS5RYFrJvhsHJ8gYxhgi+wA7WG5OKmvwHzbTi+ZnZez0tURyNF/XtS4+tIMAw5Dfat Al/LIxYCuenBwX+366tziLIzUp2oC96pUCrX/2G4jPQPYA+SnR0Sni28dPpXRY+wi9mp Y1/w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=t2TzXOzaxxpB1r0axVc03dmlkYGdQb1MoD9TI8b+FpM=; b=oZ1+qr9qaehrX2tI4jH7j49QDCintUKVdX42F8kZWv3dlJcleeg8yIqtLMDfXRfgt/ Y9EFJZUOgMrRG+Qo13f85fvHIOn1EbX+mWy7WFDhyRUraCR7YMbISBq9bPu/cKQQQrA8 M6FJaPezuoBCjPMDhLS6CtKGut8o7Qik3adfALQbDx8jKltNrdtnN0lN/i+CZXSHjkDg dzvSNZExaffIgSIsCjVqqO3Aqg8Q0euSZ6mIFPf0CwUUUPjtj/IGiKGfj5PpqJ6ZCCPV SYUIj77lMzb75Te/Lxd0tFJCxZhHhx2S/2k1BozX3TmkVwmn2tCkL85iQJbc1jX/+pH/ n+9w== X-Gm-Message-State: AOAM5327jHXdtlOSHPiczfIrdIblBN6XSz2UkgwbR66O9sNfpdlvHknq RIWSeiKWZqdNTRaSfp0Z5hgEK+TfZp0= X-Received: from pgonda1.kir.corp.google.com ([2620:15c:29:204:da2d:dcb2:6:add9]) (user=pgonda job=sendgmr) by 2002:a05:6a00:9a2:b0:44c:b979:afe3 with SMTP id u34-20020a056a0009a200b0044cb979afe3mr6941216pfg.61.1634838192336; Thu, 21 Oct 2021 10:43:12 -0700 (PDT) Date: Thu, 21 Oct 2021 10:43:01 -0700 In-Reply-To: <20211021174303.385706-1-pgonda@google.com> Message-Id: <20211021174303.385706-4-pgonda@google.com> Mime-Version: 1.0 References: <20211021174303.385706-1-pgonda@google.com> X-Mailer: git-send-email 2.33.0.1079.g6e70778dc9-goog Subject: [PATCH V11 3/5] KVM: SEV: Add support for SEV-ES intra host migration From: Peter Gonda To: kvm@vger.kernel.org Cc: Peter Gonda , Marc Orr , Paolo Bonzini , Sean Christopherson , David Rientjes , "Dr . David Alan Gilbert" , Brijesh Singh , Tom Lendacky , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For SEV-ES to work with intra host migration the VMSAs, GHCB metadata, and other SEV-ES info needs to be preserved along with the guest's memory. Signed-off-by: Peter Gonda Reviewed-by: Marc Orr Cc: Marc Orr Cc: Paolo Bonzini Cc: Sean Christopherson Cc: David Rientjes Cc: Dr. David Alan Gilbert Cc: Brijesh Singh Cc: Tom Lendacky Cc: Vitaly Kuznetsov Cc: Wanpeng Li Cc: Jim Mattson Cc: Joerg Roedel Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov Cc: "H. Peter Anvin" Cc: kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org --- arch/x86/kvm/svm/sev.c | 50 +++++++++++++++++++++++++++++++++++++++++- 1 file changed, 49 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index 2c2f724c9096..d8ce93fd1129 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -1605,6 +1605,48 @@ static void sev_migrate_from(struct kvm_sev_info *dst, list_replace_init(&src->regions_list, &dst->regions_list); } +static int sev_es_migrate_from(struct kvm *dst, struct kvm *src) +{ + int i; + struct kvm_vcpu *dst_vcpu, *src_vcpu; + struct vcpu_svm *dst_svm, *src_svm; + + if (atomic_read(&src->online_vcpus) != atomic_read(&dst->online_vcpus)) + return -EINVAL; + + kvm_for_each_vcpu(i, src_vcpu, src) { + if (!src_vcpu->arch.guest_state_protected) + return -EINVAL; + } + + kvm_for_each_vcpu(i, src_vcpu, src) { + src_svm = to_svm(src_vcpu); + dst_vcpu = kvm_get_vcpu(dst, i); + dst_svm = to_svm(dst_vcpu); + + /* + * Transfer VMSA and GHCB state to the destination. Nullify and + * clear source fields as appropriate, the state now belongs to + * the destination. + */ + dst_vcpu->vcpu_id = src_vcpu->vcpu_id; + dst_svm->sev_es = src_svm->sev_es; + dst_svm->vmcb->control.ghcb_gpa = + src_svm->vmcb->control.ghcb_gpa; + dst_svm->vmcb->control.vmsa_pa = __pa(dst_svm->sev_es.vmsa); + dst_vcpu->arch.guest_state_protected = true; + + memset(&src_svm->sev_es, 0, sizeof(src_svm->sev_es)); + src_svm->vmcb->control.ghcb_gpa = 0; + src_svm->vmcb->control.vmsa_pa = 0; + src_vcpu->arch.guest_state_protected = false; + } + to_kvm_svm(src)->sev_info.es_active = false; + to_kvm_svm(dst)->sev_info.es_active = true; + + return 0; +} + int svm_vm_migrate_from(struct kvm *kvm, unsigned int source_fd) { struct kvm_sev_info *dst_sev = &to_kvm_svm(kvm)->sev_info; @@ -1633,7 +1675,7 @@ int svm_vm_migrate_from(struct kvm *kvm, unsigned int source_fd) if (ret) goto out_fput; - if (!sev_guest(source_kvm) || sev_es_guest(source_kvm)) { + if (!sev_guest(source_kvm)) { ret = -EINVAL; goto out_source; } @@ -1644,6 +1686,12 @@ int svm_vm_migrate_from(struct kvm *kvm, unsigned int source_fd) if (ret) goto out_source_vcpu; + if (sev_es_guest(source_kvm)) { + ret = sev_es_migrate_from(kvm, source_kvm); + if (ret) + goto out_source_vcpu; + } + sev_migrate_from(dst_sev, &to_kvm_svm(source_kvm)->sev_info); kvm_for_each_vcpu (i, vcpu, source_kvm) { kvm_vcpu_reset(vcpu, /* init_event= */ false); -- 2.33.0.1079.g6e70778dc9-goog