From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:46067) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1bn5NJ-000176-FC for qemu-devel@nongnu.org; Thu, 22 Sep 2016 10:53:25 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1bn5NE-0007vj-9B for qemu-devel@nongnu.org; Thu, 22 Sep 2016 10:53:20 -0400 Received: from mail-sn1nam01on0048.outbound.protection.outlook.com ([104.47.32.48]:32564 helo=NAM01-SN1-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1bn5NE-0007vR-1a for qemu-devel@nongnu.org; Thu, 22 Sep 2016 10:53:16 -0400 From: Brijesh Singh Date: Thu, 22 Sep 2016 10:53:10 -0400 Message-ID: <147455599045.8519.7374631726432800452.stgit@brijesh-build-machine> In-Reply-To: <147455590865.8519.11191009507297313736.stgit@brijesh-build-machine> References: <147455590865.8519.11191009507297313736.stgit@brijesh-build-machine> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Subject: [Qemu-devel] [RFC PATCH v2 08/16] core: loader: create memory encryption context before copying data List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: ehabkost@redhat.com, crosthwaite.peter@gmail.com, armbru@redhat.com, mst@redhat.com, p.fedin@samsung.com, qemu-devel@nongnu.org, lcapitulino@redhat.com, pbonzini@redhat.com, rth@twiddle.net During system boot, rom_reset copies bios binary from internal PC.BIOS ROM to guest RAM (PC.RAM). If memory encryption is enabled then we need to ensure that encryption context is created before we start the copy process. When encryption is enabled any data copy from PC.BIOS ROM to guest RAM will go through the encryption routines which will encrypt the data as it copies into guest memory. Similarly after we are done with copying destory the encryption context. Signed-off-by: Brijesh Singh --- hw/core/loader.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/hw/core/loader.c b/hw/core/loader.c index 53e0e41..6e0be34 100644 --- a/hw/core/loader.c +++ b/hw/core/loader.c @@ -55,6 +55,7 @@ #include "exec/address-spaces.h" #include "hw/boards.h" #include "qemu/cutils.h" +#include "sysemu/kvm.h" #include @@ -997,6 +998,13 @@ static void rom_reset(void *unused) { Rom *rom; + /* create the memory encryption context before we copy any data + * from internal ROM to guest RAM. + */ + if (kvm_memory_encryption_enabled()) { + kvm_memory_encryption_start(); + } + QTAILQ_FOREACH(rom, &roms, next) { if (rom->fw_file) { continue; @@ -1024,6 +1032,11 @@ static void rom_reset(void *unused) */ cpu_flush_icache_range(rom->addr, rom->datasize); } + + /* delete the memory encryption context after we are done with copying */ + if (kvm_memory_encryption_enabled()) { + kvm_memory_encryption_finish(); + } } int rom_check_and_register_reset(void)