1 /* 2 * QEMU SEV support 3 * 4 * Copyright Advanced Micro Devices 2016-2018 5 * 6 * Author: 7 * Brijesh Singh <brijesh.singh@amd.com> 8 * 9 * This work is licensed under the terms of the GNU GPL, version 2 or later. 10 * See the COPYING file in the top-level directory. 11 * 12 */ 13 14 #include "qemu/osdep.h" 15 16 #include <linux/kvm.h> 17 #include <linux/psp-sev.h> 18 19 #include <sys/ioctl.h> 20 21 #include "qapi/error.h" 22 #include "qom/object_interfaces.h" 23 #include "qemu/base64.h" 24 #include "qemu/module.h" 25 #include "qemu/uuid.h" 26 #include "sysemu/kvm.h" 27 #include "sev_i386.h" 28 #include "sysemu/sysemu.h" 29 #include "sysemu/runstate.h" 30 #include "trace.h" 31 #include "migration/blocker.h" 32 #include "qom/object.h" 33 #include "monitor/monitor.h" 34 #include "exec/confidential-guest-support.h" 35 #include "hw/i386/pc.h" 36 37 #define TYPE_SEV_GUEST "sev-guest" 38 OBJECT_DECLARE_SIMPLE_TYPE(SevGuestState, SEV_GUEST) 39 40 41 /** 42 * SevGuestState: 43 * 44 * The SevGuestState object is used for creating and managing a SEV 45 * guest. 46 * 47 * # $QEMU \ 48 * -object sev-guest,id=sev0 \ 49 * -machine ...,memory-encryption=sev0 50 */ 51 struct SevGuestState { 52 ConfidentialGuestSupport parent_obj; 53 54 /* configuration parameters */ 55 char *sev_device; 56 uint32_t policy; 57 char *dh_cert_file; 58 char *session_file; 59 uint32_t cbitpos; 60 uint32_t reduced_phys_bits; 61 62 /* runtime state */ 63 uint32_t handle; 64 uint8_t api_major; 65 uint8_t api_minor; 66 uint8_t build_id; 67 uint64_t me_mask; 68 int sev_fd; 69 SevState state; 70 gchar *measurement; 71 72 uint32_t reset_cs; 73 uint32_t reset_ip; 74 bool reset_data_valid; 75 }; 76 77 #define DEFAULT_GUEST_POLICY 0x1 /* disable debug */ 78 #define DEFAULT_SEV_DEVICE "/dev/sev" 79 80 #define SEV_INFO_BLOCK_GUID "00f771de-1a7e-4fcb-890e-68c77e2fb44e" 81 typedef struct __attribute__((__packed__)) SevInfoBlock { 82 /* SEV-ES Reset Vector Address */ 83 uint32_t reset_addr; 84 } SevInfoBlock; 85 86 static SevGuestState *sev_guest; 87 static Error *sev_mig_blocker; 88 89 static const char *const sev_fw_errlist[] = { 90 [SEV_RET_SUCCESS] = "", 91 [SEV_RET_INVALID_PLATFORM_STATE] = "Platform state is invalid", 92 [SEV_RET_INVALID_GUEST_STATE] = "Guest state is invalid", 93 [SEV_RET_INAVLID_CONFIG] = "Platform configuration is invalid", 94 [SEV_RET_INVALID_LEN] = "Buffer too small", 95 [SEV_RET_ALREADY_OWNED] = "Platform is already owned", 96 [SEV_RET_INVALID_CERTIFICATE] = "Certificate is invalid", 97 [SEV_RET_POLICY_FAILURE] = "Policy is not allowed", 98 [SEV_RET_INACTIVE] = "Guest is not active", 99 [SEV_RET_INVALID_ADDRESS] = "Invalid address", 100 [SEV_RET_BAD_SIGNATURE] = "Bad signature", 101 [SEV_RET_BAD_MEASUREMENT] = "Bad measurement", 102 [SEV_RET_ASID_OWNED] = "ASID is already owned", 103 [SEV_RET_INVALID_ASID] = "Invalid ASID", 104 [SEV_RET_WBINVD_REQUIRED] = "WBINVD is required", 105 [SEV_RET_DFFLUSH_REQUIRED] = "DF_FLUSH is required", 106 [SEV_RET_INVALID_GUEST] = "Guest handle is invalid", 107 [SEV_RET_INVALID_COMMAND] = "Invalid command", 108 [SEV_RET_ACTIVE] = "Guest is active", 109 [SEV_RET_HWSEV_RET_PLATFORM] = "Hardware error", 110 [SEV_RET_HWSEV_RET_UNSAFE] = "Hardware unsafe", 111 [SEV_RET_UNSUPPORTED] = "Feature not supported", 112 [SEV_RET_INVALID_PARAM] = "Invalid parameter", 113 [SEV_RET_RESOURCE_LIMIT] = "Required firmware resource depleted", 114 [SEV_RET_SECURE_DATA_INVALID] = "Part-specific integrity check failure", 115 }; 116 117 #define SEV_FW_MAX_ERROR ARRAY_SIZE(sev_fw_errlist) 118 119 static int 120 sev_ioctl(int fd, int cmd, void *data, int *error) 121 { 122 int r; 123 struct kvm_sev_cmd input; 124 125 memset(&input, 0x0, sizeof(input)); 126 127 input.id = cmd; 128 input.sev_fd = fd; 129 input.data = (__u64)(unsigned long)data; 130 131 r = kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_OP, &input); 132 133 if (error) { 134 *error = input.error; 135 } 136 137 return r; 138 } 139 140 static int 141 sev_platform_ioctl(int fd, int cmd, void *data, int *error) 142 { 143 int r; 144 struct sev_issue_cmd arg; 145 146 arg.cmd = cmd; 147 arg.data = (unsigned long)data; 148 r = ioctl(fd, SEV_ISSUE_CMD, &arg); 149 if (error) { 150 *error = arg.error; 151 } 152 153 return r; 154 } 155 156 static const char * 157 fw_error_to_str(int code) 158 { 159 if (code < 0 || code >= SEV_FW_MAX_ERROR) { 160 return "unknown error"; 161 } 162 163 return sev_fw_errlist[code]; 164 } 165 166 static bool 167 sev_check_state(const SevGuestState *sev, SevState state) 168 { 169 assert(sev); 170 return sev->state == state ? true : false; 171 } 172 173 static void 174 sev_set_guest_state(SevGuestState *sev, SevState new_state) 175 { 176 assert(new_state < SEV_STATE__MAX); 177 assert(sev); 178 179 trace_kvm_sev_change_state(SevState_str(sev->state), 180 SevState_str(new_state)); 181 sev->state = new_state; 182 } 183 184 static void 185 sev_ram_block_added(RAMBlockNotifier *n, void *host, size_t size, 186 size_t max_size) 187 { 188 int r; 189 struct kvm_enc_region range; 190 ram_addr_t offset; 191 MemoryRegion *mr; 192 193 /* 194 * The RAM device presents a memory region that should be treated 195 * as IO region and should not be pinned. 196 */ 197 mr = memory_region_from_host(host, &offset); 198 if (mr && memory_region_is_ram_device(mr)) { 199 return; 200 } 201 202 range.addr = (__u64)(unsigned long)host; 203 range.size = max_size; 204 205 trace_kvm_memcrypt_register_region(host, max_size); 206 r = kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_REG_REGION, &range); 207 if (r) { 208 error_report("%s: failed to register region (%p+%#zx) error '%s'", 209 __func__, host, max_size, strerror(errno)); 210 exit(1); 211 } 212 } 213 214 static void 215 sev_ram_block_removed(RAMBlockNotifier *n, void *host, size_t size, 216 size_t max_size) 217 { 218 int r; 219 struct kvm_enc_region range; 220 ram_addr_t offset; 221 MemoryRegion *mr; 222 223 /* 224 * The RAM device presents a memory region that should be treated 225 * as IO region and should not have been pinned. 226 */ 227 mr = memory_region_from_host(host, &offset); 228 if (mr && memory_region_is_ram_device(mr)) { 229 return; 230 } 231 232 range.addr = (__u64)(unsigned long)host; 233 range.size = max_size; 234 235 trace_kvm_memcrypt_unregister_region(host, max_size); 236 r = kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_UNREG_REGION, &range); 237 if (r) { 238 error_report("%s: failed to unregister region (%p+%#zx)", 239 __func__, host, max_size); 240 } 241 } 242 243 static struct RAMBlockNotifier sev_ram_notifier = { 244 .ram_block_added = sev_ram_block_added, 245 .ram_block_removed = sev_ram_block_removed, 246 }; 247 248 static void 249 sev_guest_finalize(Object *obj) 250 { 251 } 252 253 static char * 254 sev_guest_get_session_file(Object *obj, Error **errp) 255 { 256 SevGuestState *s = SEV_GUEST(obj); 257 258 return s->session_file ? g_strdup(s->session_file) : NULL; 259 } 260 261 static void 262 sev_guest_set_session_file(Object *obj, const char *value, Error **errp) 263 { 264 SevGuestState *s = SEV_GUEST(obj); 265 266 s->session_file = g_strdup(value); 267 } 268 269 static char * 270 sev_guest_get_dh_cert_file(Object *obj, Error **errp) 271 { 272 SevGuestState *s = SEV_GUEST(obj); 273 274 return g_strdup(s->dh_cert_file); 275 } 276 277 static void 278 sev_guest_set_dh_cert_file(Object *obj, const char *value, Error **errp) 279 { 280 SevGuestState *s = SEV_GUEST(obj); 281 282 s->dh_cert_file = g_strdup(value); 283 } 284 285 static char * 286 sev_guest_get_sev_device(Object *obj, Error **errp) 287 { 288 SevGuestState *sev = SEV_GUEST(obj); 289 290 return g_strdup(sev->sev_device); 291 } 292 293 static void 294 sev_guest_set_sev_device(Object *obj, const char *value, Error **errp) 295 { 296 SevGuestState *sev = SEV_GUEST(obj); 297 298 sev->sev_device = g_strdup(value); 299 } 300 301 static void 302 sev_guest_class_init(ObjectClass *oc, void *data) 303 { 304 object_class_property_add_str(oc, "sev-device", 305 sev_guest_get_sev_device, 306 sev_guest_set_sev_device); 307 object_class_property_set_description(oc, "sev-device", 308 "SEV device to use"); 309 object_class_property_add_str(oc, "dh-cert-file", 310 sev_guest_get_dh_cert_file, 311 sev_guest_set_dh_cert_file); 312 object_class_property_set_description(oc, "dh-cert-file", 313 "guest owners DH certificate (encoded with base64)"); 314 object_class_property_add_str(oc, "session-file", 315 sev_guest_get_session_file, 316 sev_guest_set_session_file); 317 object_class_property_set_description(oc, "session-file", 318 "guest owners session parameters (encoded with base64)"); 319 } 320 321 static void 322 sev_guest_instance_init(Object *obj) 323 { 324 SevGuestState *sev = SEV_GUEST(obj); 325 326 sev->sev_device = g_strdup(DEFAULT_SEV_DEVICE); 327 sev->policy = DEFAULT_GUEST_POLICY; 328 object_property_add_uint32_ptr(obj, "policy", &sev->policy, 329 OBJ_PROP_FLAG_READWRITE); 330 object_property_add_uint32_ptr(obj, "handle", &sev->handle, 331 OBJ_PROP_FLAG_READWRITE); 332 object_property_add_uint32_ptr(obj, "cbitpos", &sev->cbitpos, 333 OBJ_PROP_FLAG_READWRITE); 334 object_property_add_uint32_ptr(obj, "reduced-phys-bits", 335 &sev->reduced_phys_bits, 336 OBJ_PROP_FLAG_READWRITE); 337 } 338 339 /* sev guest info */ 340 static const TypeInfo sev_guest_info = { 341 .parent = TYPE_CONFIDENTIAL_GUEST_SUPPORT, 342 .name = TYPE_SEV_GUEST, 343 .instance_size = sizeof(SevGuestState), 344 .instance_finalize = sev_guest_finalize, 345 .class_init = sev_guest_class_init, 346 .instance_init = sev_guest_instance_init, 347 .interfaces = (InterfaceInfo[]) { 348 { TYPE_USER_CREATABLE }, 349 { } 350 } 351 }; 352 353 bool 354 sev_enabled(void) 355 { 356 return !!sev_guest; 357 } 358 359 bool 360 sev_es_enabled(void) 361 { 362 return sev_enabled() && (sev_guest->policy & SEV_POLICY_ES); 363 } 364 365 uint64_t 366 sev_get_me_mask(void) 367 { 368 return sev_guest ? sev_guest->me_mask : ~0; 369 } 370 371 uint32_t 372 sev_get_cbit_position(void) 373 { 374 return sev_guest ? sev_guest->cbitpos : 0; 375 } 376 377 uint32_t 378 sev_get_reduced_phys_bits(void) 379 { 380 return sev_guest ? sev_guest->reduced_phys_bits : 0; 381 } 382 383 SevInfo * 384 sev_get_info(void) 385 { 386 SevInfo *info; 387 388 info = g_new0(SevInfo, 1); 389 info->enabled = sev_enabled(); 390 391 if (info->enabled) { 392 info->api_major = sev_guest->api_major; 393 info->api_minor = sev_guest->api_minor; 394 info->build_id = sev_guest->build_id; 395 info->policy = sev_guest->policy; 396 info->state = sev_guest->state; 397 info->handle = sev_guest->handle; 398 } 399 400 return info; 401 } 402 403 static int 404 sev_get_pdh_info(int fd, guchar **pdh, size_t *pdh_len, guchar **cert_chain, 405 size_t *cert_chain_len, Error **errp) 406 { 407 guchar *pdh_data = NULL; 408 guchar *cert_chain_data = NULL; 409 struct sev_user_data_pdh_cert_export export = {}; 410 int err, r; 411 412 /* query the certificate length */ 413 r = sev_platform_ioctl(fd, SEV_PDH_CERT_EXPORT, &export, &err); 414 if (r < 0) { 415 if (err != SEV_RET_INVALID_LEN) { 416 error_setg(errp, "failed to export PDH cert ret=%d fw_err=%d (%s)", 417 r, err, fw_error_to_str(err)); 418 return 1; 419 } 420 } 421 422 pdh_data = g_new(guchar, export.pdh_cert_len); 423 cert_chain_data = g_new(guchar, export.cert_chain_len); 424 export.pdh_cert_address = (unsigned long)pdh_data; 425 export.cert_chain_address = (unsigned long)cert_chain_data; 426 427 r = sev_platform_ioctl(fd, SEV_PDH_CERT_EXPORT, &export, &err); 428 if (r < 0) { 429 error_setg(errp, "failed to export PDH cert ret=%d fw_err=%d (%s)", 430 r, err, fw_error_to_str(err)); 431 goto e_free; 432 } 433 434 *pdh = pdh_data; 435 *pdh_len = export.pdh_cert_len; 436 *cert_chain = cert_chain_data; 437 *cert_chain_len = export.cert_chain_len; 438 return 0; 439 440 e_free: 441 g_free(pdh_data); 442 g_free(cert_chain_data); 443 return 1; 444 } 445 446 SevCapability * 447 sev_get_capabilities(Error **errp) 448 { 449 SevCapability *cap = NULL; 450 guchar *pdh_data = NULL; 451 guchar *cert_chain_data = NULL; 452 size_t pdh_len = 0, cert_chain_len = 0; 453 uint32_t ebx; 454 int fd; 455 456 if (!kvm_enabled()) { 457 error_setg(errp, "KVM not enabled"); 458 return NULL; 459 } 460 if (kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_OP, NULL) < 0) { 461 error_setg(errp, "SEV is not enabled in KVM"); 462 return NULL; 463 } 464 465 fd = open(DEFAULT_SEV_DEVICE, O_RDWR); 466 if (fd < 0) { 467 error_setg_errno(errp, errno, "Failed to open %s", 468 DEFAULT_SEV_DEVICE); 469 return NULL; 470 } 471 472 if (sev_get_pdh_info(fd, &pdh_data, &pdh_len, 473 &cert_chain_data, &cert_chain_len, errp)) { 474 goto out; 475 } 476 477 cap = g_new0(SevCapability, 1); 478 cap->pdh = g_base64_encode(pdh_data, pdh_len); 479 cap->cert_chain = g_base64_encode(cert_chain_data, cert_chain_len); 480 481 host_cpuid(0x8000001F, 0, NULL, &ebx, NULL, NULL); 482 cap->cbitpos = ebx & 0x3f; 483 484 /* 485 * When SEV feature is enabled, we loose one bit in guest physical 486 * addressing. 487 */ 488 cap->reduced_phys_bits = 1; 489 490 out: 491 g_free(pdh_data); 492 g_free(cert_chain_data); 493 close(fd); 494 return cap; 495 } 496 497 SevAttestationReport * 498 sev_get_attestation_report(const char *mnonce, Error **errp) 499 { 500 struct kvm_sev_attestation_report input = {}; 501 SevAttestationReport *report = NULL; 502 SevGuestState *sev = sev_guest; 503 guchar *data; 504 guchar *buf; 505 gsize len; 506 int err = 0, ret; 507 508 if (!sev_enabled()) { 509 error_setg(errp, "SEV is not enabled"); 510 return NULL; 511 } 512 513 /* lets decode the mnonce string */ 514 buf = g_base64_decode(mnonce, &len); 515 if (!buf) { 516 error_setg(errp, "SEV: failed to decode mnonce input"); 517 return NULL; 518 } 519 520 /* verify the input mnonce length */ 521 if (len != sizeof(input.mnonce)) { 522 error_setg(errp, "SEV: mnonce must be %zu bytes (got %" G_GSIZE_FORMAT ")", 523 sizeof(input.mnonce), len); 524 g_free(buf); 525 return NULL; 526 } 527 528 /* Query the report length */ 529 ret = sev_ioctl(sev->sev_fd, KVM_SEV_GET_ATTESTATION_REPORT, 530 &input, &err); 531 if (ret < 0) { 532 if (err != SEV_RET_INVALID_LEN) { 533 error_setg(errp, "failed to query the attestation report length " 534 "ret=%d fw_err=%d (%s)", ret, err, fw_error_to_str(err)); 535 g_free(buf); 536 return NULL; 537 } 538 } 539 540 data = g_malloc(input.len); 541 input.uaddr = (unsigned long)data; 542 memcpy(input.mnonce, buf, sizeof(input.mnonce)); 543 544 /* Query the report */ 545 ret = sev_ioctl(sev->sev_fd, KVM_SEV_GET_ATTESTATION_REPORT, 546 &input, &err); 547 if (ret) { 548 error_setg_errno(errp, errno, "Failed to get attestation report" 549 " ret=%d fw_err=%d (%s)", ret, err, fw_error_to_str(err)); 550 goto e_free_data; 551 } 552 553 report = g_new0(SevAttestationReport, 1); 554 report->data = g_base64_encode(data, input.len); 555 556 trace_kvm_sev_attestation_report(mnonce, report->data); 557 558 e_free_data: 559 g_free(data); 560 g_free(buf); 561 return report; 562 } 563 564 static int 565 sev_read_file_base64(const char *filename, guchar **data, gsize *len) 566 { 567 gsize sz; 568 gchar *base64; 569 GError *error = NULL; 570 571 if (!g_file_get_contents(filename, &base64, &sz, &error)) { 572 error_report("failed to read '%s' (%s)", filename, error->message); 573 g_error_free(error); 574 return -1; 575 } 576 577 *data = g_base64_decode(base64, len); 578 return 0; 579 } 580 581 static int 582 sev_launch_start(SevGuestState *sev) 583 { 584 gsize sz; 585 int ret = 1; 586 int fw_error, rc; 587 struct kvm_sev_launch_start *start; 588 guchar *session = NULL, *dh_cert = NULL; 589 590 start = g_new0(struct kvm_sev_launch_start, 1); 591 592 start->handle = sev->handle; 593 start->policy = sev->policy; 594 if (sev->session_file) { 595 if (sev_read_file_base64(sev->session_file, &session, &sz) < 0) { 596 goto out; 597 } 598 start->session_uaddr = (unsigned long)session; 599 start->session_len = sz; 600 } 601 602 if (sev->dh_cert_file) { 603 if (sev_read_file_base64(sev->dh_cert_file, &dh_cert, &sz) < 0) { 604 goto out; 605 } 606 start->dh_uaddr = (unsigned long)dh_cert; 607 start->dh_len = sz; 608 } 609 610 trace_kvm_sev_launch_start(start->policy, session, dh_cert); 611 rc = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_START, start, &fw_error); 612 if (rc < 0) { 613 error_report("%s: LAUNCH_START ret=%d fw_error=%d '%s'", 614 __func__, ret, fw_error, fw_error_to_str(fw_error)); 615 goto out; 616 } 617 618 sev_set_guest_state(sev, SEV_STATE_LAUNCH_UPDATE); 619 sev->handle = start->handle; 620 ret = 0; 621 622 out: 623 g_free(start); 624 g_free(session); 625 g_free(dh_cert); 626 return ret; 627 } 628 629 static int 630 sev_launch_update_data(SevGuestState *sev, uint8_t *addr, uint64_t len) 631 { 632 int ret, fw_error; 633 struct kvm_sev_launch_update_data update; 634 635 if (!addr || !len) { 636 return 1; 637 } 638 639 update.uaddr = (__u64)(unsigned long)addr; 640 update.len = len; 641 trace_kvm_sev_launch_update_data(addr, len); 642 ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_UPDATE_DATA, 643 &update, &fw_error); 644 if (ret) { 645 error_report("%s: LAUNCH_UPDATE ret=%d fw_error=%d '%s'", 646 __func__, ret, fw_error, fw_error_to_str(fw_error)); 647 } 648 649 return ret; 650 } 651 652 static int 653 sev_launch_update_vmsa(SevGuestState *sev) 654 { 655 int ret, fw_error; 656 657 ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_UPDATE_VMSA, NULL, &fw_error); 658 if (ret) { 659 error_report("%s: LAUNCH_UPDATE_VMSA ret=%d fw_error=%d '%s'", 660 __func__, ret, fw_error, fw_error_to_str(fw_error)); 661 } 662 663 return ret; 664 } 665 666 static void 667 sev_launch_get_measure(Notifier *notifier, void *unused) 668 { 669 SevGuestState *sev = sev_guest; 670 int ret, error; 671 guchar *data; 672 struct kvm_sev_launch_measure *measurement; 673 674 if (!sev_check_state(sev, SEV_STATE_LAUNCH_UPDATE)) { 675 return; 676 } 677 678 if (sev_es_enabled()) { 679 /* measure all the VM save areas before getting launch_measure */ 680 ret = sev_launch_update_vmsa(sev); 681 if (ret) { 682 exit(1); 683 } 684 } 685 686 measurement = g_new0(struct kvm_sev_launch_measure, 1); 687 688 /* query the measurement blob length */ 689 ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_MEASURE, 690 measurement, &error); 691 if (!measurement->len) { 692 error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'", 693 __func__, ret, error, fw_error_to_str(errno)); 694 goto free_measurement; 695 } 696 697 data = g_new0(guchar, measurement->len); 698 measurement->uaddr = (unsigned long)data; 699 700 /* get the measurement blob */ 701 ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_MEASURE, 702 measurement, &error); 703 if (ret) { 704 error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'", 705 __func__, ret, error, fw_error_to_str(errno)); 706 goto free_data; 707 } 708 709 sev_set_guest_state(sev, SEV_STATE_LAUNCH_SECRET); 710 711 /* encode the measurement value and emit the event */ 712 sev->measurement = g_base64_encode(data, measurement->len); 713 trace_kvm_sev_launch_measurement(sev->measurement); 714 715 free_data: 716 g_free(data); 717 free_measurement: 718 g_free(measurement); 719 } 720 721 char * 722 sev_get_launch_measurement(void) 723 { 724 if (sev_guest && 725 sev_guest->state >= SEV_STATE_LAUNCH_SECRET) { 726 return g_strdup(sev_guest->measurement); 727 } 728 729 return NULL; 730 } 731 732 static Notifier sev_machine_done_notify = { 733 .notify = sev_launch_get_measure, 734 }; 735 736 static void 737 sev_launch_finish(SevGuestState *sev) 738 { 739 int ret, error; 740 Error *local_err = NULL; 741 742 trace_kvm_sev_launch_finish(); 743 ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_FINISH, 0, &error); 744 if (ret) { 745 error_report("%s: LAUNCH_FINISH ret=%d fw_error=%d '%s'", 746 __func__, ret, error, fw_error_to_str(error)); 747 exit(1); 748 } 749 750 sev_set_guest_state(sev, SEV_STATE_RUNNING); 751 752 /* add migration blocker */ 753 error_setg(&sev_mig_blocker, 754 "SEV: Migration is not implemented"); 755 ret = migrate_add_blocker(sev_mig_blocker, &local_err); 756 if (local_err) { 757 error_report_err(local_err); 758 error_free(sev_mig_blocker); 759 exit(1); 760 } 761 } 762 763 static void 764 sev_vm_state_change(void *opaque, bool running, RunState state) 765 { 766 SevGuestState *sev = opaque; 767 768 if (running) { 769 if (!sev_check_state(sev, SEV_STATE_RUNNING)) { 770 sev_launch_finish(sev); 771 } 772 } 773 } 774 775 int sev_kvm_init(ConfidentialGuestSupport *cgs, Error **errp) 776 { 777 SevGuestState *sev 778 = (SevGuestState *)object_dynamic_cast(OBJECT(cgs), TYPE_SEV_GUEST); 779 char *devname; 780 int ret, fw_error, cmd; 781 uint32_t ebx; 782 uint32_t host_cbitpos; 783 struct sev_user_data_status status = {}; 784 785 if (!sev) { 786 return 0; 787 } 788 789 ret = ram_block_discard_disable(true); 790 if (ret) { 791 error_report("%s: cannot disable RAM discard", __func__); 792 return -1; 793 } 794 795 sev_guest = sev; 796 sev->state = SEV_STATE_UNINIT; 797 798 host_cpuid(0x8000001F, 0, NULL, &ebx, NULL, NULL); 799 host_cbitpos = ebx & 0x3f; 800 801 if (host_cbitpos != sev->cbitpos) { 802 error_setg(errp, "%s: cbitpos check failed, host '%d' requested '%d'", 803 __func__, host_cbitpos, sev->cbitpos); 804 goto err; 805 } 806 807 if (sev->reduced_phys_bits < 1) { 808 error_setg(errp, "%s: reduced_phys_bits check failed, it should be >=1," 809 " requested '%d'", __func__, sev->reduced_phys_bits); 810 goto err; 811 } 812 813 sev->me_mask = ~(1UL << sev->cbitpos); 814 815 devname = object_property_get_str(OBJECT(sev), "sev-device", NULL); 816 sev->sev_fd = open(devname, O_RDWR); 817 if (sev->sev_fd < 0) { 818 error_setg(errp, "%s: Failed to open %s '%s'", __func__, 819 devname, strerror(errno)); 820 g_free(devname); 821 goto err; 822 } 823 g_free(devname); 824 825 ret = sev_platform_ioctl(sev->sev_fd, SEV_PLATFORM_STATUS, &status, 826 &fw_error); 827 if (ret) { 828 error_setg(errp, "%s: failed to get platform status ret=%d " 829 "fw_error='%d: %s'", __func__, ret, fw_error, 830 fw_error_to_str(fw_error)); 831 goto err; 832 } 833 sev->build_id = status.build; 834 sev->api_major = status.api_major; 835 sev->api_minor = status.api_minor; 836 837 if (sev_es_enabled()) { 838 if (!kvm_kernel_irqchip_allowed()) { 839 error_report("%s: SEV-ES guests require in-kernel irqchip support", 840 __func__); 841 goto err; 842 } 843 844 if (!(status.flags & SEV_STATUS_FLAGS_CONFIG_ES)) { 845 error_report("%s: guest policy requires SEV-ES, but " 846 "host SEV-ES support unavailable", 847 __func__); 848 goto err; 849 } 850 cmd = KVM_SEV_ES_INIT; 851 } else { 852 cmd = KVM_SEV_INIT; 853 } 854 855 trace_kvm_sev_init(); 856 ret = sev_ioctl(sev->sev_fd, cmd, NULL, &fw_error); 857 if (ret) { 858 error_setg(errp, "%s: failed to initialize ret=%d fw_error=%d '%s'", 859 __func__, ret, fw_error, fw_error_to_str(fw_error)); 860 goto err; 861 } 862 863 ret = sev_launch_start(sev); 864 if (ret) { 865 error_setg(errp, "%s: failed to create encryption context", __func__); 866 goto err; 867 } 868 869 ram_block_notifier_add(&sev_ram_notifier); 870 qemu_add_machine_init_done_notifier(&sev_machine_done_notify); 871 qemu_add_vm_change_state_handler(sev_vm_state_change, sev); 872 873 cgs->ready = true; 874 875 return 0; 876 err: 877 sev_guest = NULL; 878 ram_block_discard_disable(false); 879 return -1; 880 } 881 882 int 883 sev_encrypt_flash(uint8_t *ptr, uint64_t len, Error **errp) 884 { 885 if (!sev_guest) { 886 return 0; 887 } 888 889 /* if SEV is in update state then encrypt the data else do nothing */ 890 if (sev_check_state(sev_guest, SEV_STATE_LAUNCH_UPDATE)) { 891 int ret = sev_launch_update_data(sev_guest, ptr, len); 892 if (ret < 0) { 893 error_setg(errp, "failed to encrypt pflash rom"); 894 return ret; 895 } 896 } 897 898 return 0; 899 } 900 901 int sev_inject_launch_secret(const char *packet_hdr, const char *secret, 902 uint64_t gpa, Error **errp) 903 { 904 struct kvm_sev_launch_secret input; 905 g_autofree guchar *data = NULL, *hdr = NULL; 906 int error, ret = 1; 907 void *hva; 908 gsize hdr_sz = 0, data_sz = 0; 909 MemoryRegion *mr = NULL; 910 911 if (!sev_guest) { 912 error_setg(errp, "SEV: SEV not enabled."); 913 return 1; 914 } 915 916 /* secret can be injected only in this state */ 917 if (!sev_check_state(sev_guest, SEV_STATE_LAUNCH_SECRET)) { 918 error_setg(errp, "SEV: Not in correct state. (LSECRET) %x", 919 sev_guest->state); 920 return 1; 921 } 922 923 hdr = g_base64_decode(packet_hdr, &hdr_sz); 924 if (!hdr || !hdr_sz) { 925 error_setg(errp, "SEV: Failed to decode sequence header"); 926 return 1; 927 } 928 929 data = g_base64_decode(secret, &data_sz); 930 if (!data || !data_sz) { 931 error_setg(errp, "SEV: Failed to decode data"); 932 return 1; 933 } 934 935 hva = gpa2hva(&mr, gpa, data_sz, errp); 936 if (!hva) { 937 error_prepend(errp, "SEV: Failed to calculate guest address: "); 938 return 1; 939 } 940 941 input.hdr_uaddr = (uint64_t)(unsigned long)hdr; 942 input.hdr_len = hdr_sz; 943 944 input.trans_uaddr = (uint64_t)(unsigned long)data; 945 input.trans_len = data_sz; 946 947 input.guest_uaddr = (uint64_t)(unsigned long)hva; 948 input.guest_len = data_sz; 949 950 trace_kvm_sev_launch_secret(gpa, input.guest_uaddr, 951 input.trans_uaddr, input.trans_len); 952 953 ret = sev_ioctl(sev_guest->sev_fd, KVM_SEV_LAUNCH_SECRET, 954 &input, &error); 955 if (ret) { 956 error_setg(errp, "SEV: failed to inject secret ret=%d fw_error=%d '%s'", 957 ret, error, fw_error_to_str(error)); 958 return ret; 959 } 960 961 return 0; 962 } 963 964 static int 965 sev_es_parse_reset_block(SevInfoBlock *info, uint32_t *addr) 966 { 967 if (!info->reset_addr) { 968 error_report("SEV-ES reset address is zero"); 969 return 1; 970 } 971 972 *addr = info->reset_addr; 973 974 return 0; 975 } 976 977 static int 978 sev_es_find_reset_vector(void *flash_ptr, uint64_t flash_size, 979 uint32_t *addr) 980 { 981 QemuUUID info_guid, *guid; 982 SevInfoBlock *info; 983 uint8_t *data; 984 uint16_t *len; 985 986 /* 987 * Initialize the address to zero. An address of zero with a successful 988 * return code indicates that SEV-ES is not active. 989 */ 990 *addr = 0; 991 992 /* 993 * Extract the AP reset vector for SEV-ES guests by locating the SEV GUID. 994 * The SEV GUID is located on its own (original implementation) or within 995 * the Firmware GUID Table (new implementation), either of which are 996 * located 32 bytes from the end of the flash. 997 * 998 * Check the Firmware GUID Table first. 999 */ 1000 if (pc_system_ovmf_table_find(SEV_INFO_BLOCK_GUID, &data, NULL)) { 1001 return sev_es_parse_reset_block((SevInfoBlock *)data, addr); 1002 } 1003 1004 /* 1005 * SEV info block not found in the Firmware GUID Table (or there isn't 1006 * a Firmware GUID Table), fall back to the original implementation. 1007 */ 1008 data = flash_ptr + flash_size - 0x20; 1009 1010 qemu_uuid_parse(SEV_INFO_BLOCK_GUID, &info_guid); 1011 info_guid = qemu_uuid_bswap(info_guid); /* GUIDs are LE */ 1012 1013 guid = (QemuUUID *)(data - sizeof(info_guid)); 1014 if (!qemu_uuid_is_equal(guid, &info_guid)) { 1015 error_report("SEV information block/Firmware GUID Table block not found in pflash rom"); 1016 return 1; 1017 } 1018 1019 len = (uint16_t *)((uint8_t *)guid - sizeof(*len)); 1020 info = (SevInfoBlock *)(data - le16_to_cpu(*len)); 1021 1022 return sev_es_parse_reset_block(info, addr); 1023 } 1024 1025 void sev_es_set_reset_vector(CPUState *cpu) 1026 { 1027 X86CPU *x86; 1028 CPUX86State *env; 1029 1030 /* Only update if we have valid reset information */ 1031 if (!sev_guest || !sev_guest->reset_data_valid) { 1032 return; 1033 } 1034 1035 /* Do not update the BSP reset state */ 1036 if (cpu->cpu_index == 0) { 1037 return; 1038 } 1039 1040 x86 = X86_CPU(cpu); 1041 env = &x86->env; 1042 1043 cpu_x86_load_seg_cache(env, R_CS, 0xf000, sev_guest->reset_cs, 0xffff, 1044 DESC_P_MASK | DESC_S_MASK | DESC_CS_MASK | 1045 DESC_R_MASK | DESC_A_MASK); 1046 1047 env->eip = sev_guest->reset_ip; 1048 } 1049 1050 int sev_es_save_reset_vector(void *flash_ptr, uint64_t flash_size) 1051 { 1052 CPUState *cpu; 1053 uint32_t addr; 1054 int ret; 1055 1056 if (!sev_es_enabled()) { 1057 return 0; 1058 } 1059 1060 addr = 0; 1061 ret = sev_es_find_reset_vector(flash_ptr, flash_size, 1062 &addr); 1063 if (ret) { 1064 return ret; 1065 } 1066 1067 if (addr) { 1068 sev_guest->reset_cs = addr & 0xffff0000; 1069 sev_guest->reset_ip = addr & 0x0000ffff; 1070 sev_guest->reset_data_valid = true; 1071 1072 CPU_FOREACH(cpu) { 1073 sev_es_set_reset_vector(cpu); 1074 } 1075 } 1076 1077 return 0; 1078 } 1079 1080 static void 1081 sev_register_types(void) 1082 { 1083 type_register_static(&sev_guest_info); 1084 } 1085 1086 type_init(sev_register_types); 1087