[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [RFC PATCH 0/6] Add AMD Secure Nested Paging (SEV-SNP) support
|
From: |
Tom Lendacky |
|
Subject: |
Re: [RFC PATCH 0/6] Add AMD Secure Nested Paging (SEV-SNP) support |
|
Date: |
Mon, 12 Jul 2021 12:00:20 -0500 |
|
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 |
On 7/9/21 4:55 PM, Brijesh Singh wrote:
> SEV-SNP builds upon existing SEV and SEV-ES functionality while adding
> new hardware-based memory protections. SEV-SNP adds strong memory integrity
> protection to help prevent malicious hypervisor-based attacks like data
> replay, memory re-mapping and more in order to create an isolated memory
> encryption environment.
>
> The patches to support the SEV-SNP in Linux kernel and OVMF are available:
> https://lore.kernel.org/kvm/20210707181506.30489-1-brijesh.singh@amd.com/
> https://lore.kernel.org/kvm/20210707183616.5620-1-brijesh.singh@amd.com/
> https://edk2.groups.io/g/devel/message/77335?p=,,,20,0,0,0::Created,,posterid%3A5969970,20,2,20,83891508
>
> The Qemu patches uses the command id added by the SEV-SNP hypervisor
> patches to bootstrap the SEV-SNP VMs.
>
> TODO:
> * Add support to filter CPUID values through the PSP.
>
> Additional resources
> ---------------------
> SEV-SNP whitepaper
> https://www.amd.com/system/files/TechDocs/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf
>
> APM 2: https://www.amd.com/system/files/TechDocs/24593.pdf (section 15.36)
>
> GHCB spec:
> https://developer.amd.com/wp-content/resources/56421.pdf
>
> SEV-SNP firmware specification:
> https://www.amd.com/system/files/TechDocs/56860.pdf
>
> Brijesh Singh (6):
> linux-header: add the SNP specific command
> i386/sev: extend sev-guest property to include SEV-SNP
> i386/sev: initialize SNP context
> i386/sev: add the SNP launch start context
> i386/sev: add support to encrypt BIOS when SEV-SNP is enabled
> i386/sev: populate secrets and cpuid page and finalize the SNP launch
>
> docs/amd-memory-encryption.txt | 81 +++++-
> linux-headers/linux/kvm.h | 47 ++++
> qapi/qom.json | 6 +
> target/i386/sev.c | 498 ++++++++++++++++++++++++++++++++-
> target/i386/sev_i386.h | 1 +
> target/i386/trace-events | 4 +
> 6 files changed, 628 insertions(+), 9 deletions(-)
Don't forget to update target/i386/sev-stub.c as appropriate, too.
Thanks,
Tom
>