qemu/target/i386/sev.c
<<
>>
Prefs
   1/*
   2 * QEMU SEV support
   3 *
   4 * Copyright Advanced Micro Devices 2016-2018
   5 *
   6 * Author:
   7 *      Brijesh Singh <brijesh.singh@amd.com>
   8 *
   9 * This work is licensed under the terms of the GNU GPL, version 2 or later.
  10 * See the COPYING file in the top-level directory.
  11 *
  12 */
  13
  14#include "qemu/osdep.h"
  15
  16#include <linux/kvm.h>
  17#include <linux/psp-sev.h>
  18
  19#include <sys/ioctl.h>
  20
  21#include "qapi/error.h"
  22#include "qom/object_interfaces.h"
  23#include "qemu/base64.h"
  24#include "qemu/module.h"
  25#include "qemu/uuid.h"
  26#include "sysemu/kvm.h"
  27#include "sev_i386.h"
  28#include "sysemu/sysemu.h"
  29#include "sysemu/runstate.h"
  30#include "trace.h"
  31#include "migration/blocker.h"
  32#include "qom/object.h"
  33#include "monitor/monitor.h"
  34#include "exec/confidential-guest-support.h"
  35#include "hw/i386/pc.h"
  36
  37#define TYPE_SEV_GUEST "sev-guest"
  38OBJECT_DECLARE_SIMPLE_TYPE(SevGuestState, SEV_GUEST)
  39
  40
  41/**
  42 * SevGuestState:
  43 *
  44 * The SevGuestState object is used for creating and managing a SEV
  45 * guest.
  46 *
  47 * # $QEMU \
  48 *         -object sev-guest,id=sev0 \
  49 *         -machine ...,memory-encryption=sev0
  50 */
  51struct SevGuestState {
  52    ConfidentialGuestSupport parent_obj;
  53
  54    /* configuration parameters */
  55    char *sev_device;
  56    uint32_t policy;
  57    char *dh_cert_file;
  58    char *session_file;
  59    uint32_t cbitpos;
  60    uint32_t reduced_phys_bits;
  61
  62    /* runtime state */
  63    uint32_t handle;
  64    uint8_t api_major;
  65    uint8_t api_minor;
  66    uint8_t build_id;
  67    uint64_t me_mask;
  68    int sev_fd;
  69    SevState state;
  70    gchar *measurement;
  71
  72    uint32_t reset_cs;
  73    uint32_t reset_ip;
  74    bool reset_data_valid;
  75};
  76
  77#define DEFAULT_GUEST_POLICY    0x1 /* disable debug */
  78#define DEFAULT_SEV_DEVICE      "/dev/sev"
  79
  80#define SEV_INFO_BLOCK_GUID     "00f771de-1a7e-4fcb-890e-68c77e2fb44e"
  81typedef struct __attribute__((__packed__)) SevInfoBlock {
  82    /* SEV-ES Reset Vector Address */
  83    uint32_t reset_addr;
  84} SevInfoBlock;
  85
  86static SevGuestState *sev_guest;
  87static Error *sev_mig_blocker;
  88
  89static const char *const sev_fw_errlist[] = {
  90    [SEV_RET_SUCCESS]                = "",
  91    [SEV_RET_INVALID_PLATFORM_STATE] = "Platform state is invalid",
  92    [SEV_RET_INVALID_GUEST_STATE]    = "Guest state is invalid",
  93    [SEV_RET_INAVLID_CONFIG]         = "Platform configuration is invalid",
  94    [SEV_RET_INVALID_LEN]            = "Buffer too small",
  95    [SEV_RET_ALREADY_OWNED]          = "Platform is already owned",
  96    [SEV_RET_INVALID_CERTIFICATE]    = "Certificate is invalid",
  97    [SEV_RET_POLICY_FAILURE]         = "Policy is not allowed",
  98    [SEV_RET_INACTIVE]               = "Guest is not active",
  99    [SEV_RET_INVALID_ADDRESS]        = "Invalid address",
 100    [SEV_RET_BAD_SIGNATURE]          = "Bad signature",
 101    [SEV_RET_BAD_MEASUREMENT]        = "Bad measurement",
 102    [SEV_RET_ASID_OWNED]             = "ASID is already owned",
 103    [SEV_RET_INVALID_ASID]           = "Invalid ASID",
 104    [SEV_RET_WBINVD_REQUIRED]        = "WBINVD is required",
 105    [SEV_RET_DFFLUSH_REQUIRED]       = "DF_FLUSH is required",
 106    [SEV_RET_INVALID_GUEST]          = "Guest handle is invalid",
 107    [SEV_RET_INVALID_COMMAND]        = "Invalid command",
 108    [SEV_RET_ACTIVE]                 = "Guest is active",
 109    [SEV_RET_HWSEV_RET_PLATFORM]     = "Hardware error",
 110    [SEV_RET_HWSEV_RET_UNSAFE]       = "Hardware unsafe",
 111    [SEV_RET_UNSUPPORTED]            = "Feature not supported",
 112    [SEV_RET_INVALID_PARAM]          = "Invalid parameter",
 113    [SEV_RET_RESOURCE_LIMIT]         = "Required firmware resource depleted",
 114    [SEV_RET_SECURE_DATA_INVALID]    = "Part-specific integrity check failure",
 115};
 116
 117#define SEV_FW_MAX_ERROR      ARRAY_SIZE(sev_fw_errlist)
 118
 119static int
 120sev_ioctl(int fd, int cmd, void *data, int *error)
 121{
 122    int r;
 123    struct kvm_sev_cmd input;
 124
 125    memset(&input, 0x0, sizeof(input));
 126
 127    input.id = cmd;
 128    input.sev_fd = fd;
 129    input.data = (__u64)(unsigned long)data;
 130
 131    r = kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_OP, &input);
 132
 133    if (error) {
 134        *error = input.error;
 135    }
 136
 137    return r;
 138}
 139
 140static int
 141sev_platform_ioctl(int fd, int cmd, void *data, int *error)
 142{
 143    int r;
 144    struct sev_issue_cmd arg;
 145
 146    arg.cmd = cmd;
 147    arg.data = (unsigned long)data;
 148    r = ioctl(fd, SEV_ISSUE_CMD, &arg);
 149    if (error) {
 150        *error = arg.error;
 151    }
 152
 153    return r;
 154}
 155
 156static const char *
 157fw_error_to_str(int code)
 158{
 159    if (code < 0 || code >= SEV_FW_MAX_ERROR) {
 160        return "unknown error";
 161    }
 162
 163    return sev_fw_errlist[code];
 164}
 165
 166static bool
 167sev_check_state(const SevGuestState *sev, SevState state)
 168{
 169    assert(sev);
 170    return sev->state == state ? true : false;
 171}
 172
 173static void
 174sev_set_guest_state(SevGuestState *sev, SevState new_state)
 175{
 176    assert(new_state < SEV_STATE__MAX);
 177    assert(sev);
 178
 179    trace_kvm_sev_change_state(SevState_str(sev->state),
 180                               SevState_str(new_state));
 181    sev->state = new_state;
 182}
 183
 184static void
 185sev_ram_block_added(RAMBlockNotifier *n, void *host, size_t size,
 186                    size_t max_size)
 187{
 188    int r;
 189    struct kvm_enc_region range;
 190    ram_addr_t offset;
 191    MemoryRegion *mr;
 192
 193    /*
 194     * The RAM device presents a memory region that should be treated
 195     * as IO region and should not be pinned.
 196     */
 197    mr = memory_region_from_host(host, &offset);
 198    if (mr && memory_region_is_ram_device(mr)) {
 199        return;
 200    }
 201
 202    range.addr = (__u64)(unsigned long)host;
 203    range.size = max_size;
 204
 205    trace_kvm_memcrypt_register_region(host, max_size);
 206    r = kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_REG_REGION, &range);
 207    if (r) {
 208        error_report("%s: failed to register region (%p+%#zx) error '%s'",
 209                     __func__, host, max_size, strerror(errno));
 210        exit(1);
 211    }
 212}
 213
 214static void
 215sev_ram_block_removed(RAMBlockNotifier *n, void *host, size_t size,
 216                      size_t max_size)
 217{
 218    int r;
 219    struct kvm_enc_region range;
 220    ram_addr_t offset;
 221    MemoryRegion *mr;
 222
 223    /*
 224     * The RAM device presents a memory region that should be treated
 225     * as IO region and should not have been pinned.
 226     */
 227    mr = memory_region_from_host(host, &offset);
 228    if (mr && memory_region_is_ram_device(mr)) {
 229        return;
 230    }
 231
 232    range.addr = (__u64)(unsigned long)host;
 233    range.size = max_size;
 234
 235    trace_kvm_memcrypt_unregister_region(host, max_size);
 236    r = kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_UNREG_REGION, &range);
 237    if (r) {
 238        error_report("%s: failed to unregister region (%p+%#zx)",
 239                     __func__, host, max_size);
 240    }
 241}
 242
 243static struct RAMBlockNotifier sev_ram_notifier = {
 244    .ram_block_added = sev_ram_block_added,
 245    .ram_block_removed = sev_ram_block_removed,
 246};
 247
 248static void
 249sev_guest_finalize(Object *obj)
 250{
 251}
 252
 253static char *
 254sev_guest_get_session_file(Object *obj, Error **errp)
 255{
 256    SevGuestState *s = SEV_GUEST(obj);
 257
 258    return s->session_file ? g_strdup(s->session_file) : NULL;
 259}
 260
 261static void
 262sev_guest_set_session_file(Object *obj, const char *value, Error **errp)
 263{
 264    SevGuestState *s = SEV_GUEST(obj);
 265
 266    s->session_file = g_strdup(value);
 267}
 268
 269static char *
 270sev_guest_get_dh_cert_file(Object *obj, Error **errp)
 271{
 272    SevGuestState *s = SEV_GUEST(obj);
 273
 274    return g_strdup(s->dh_cert_file);
 275}
 276
 277static void
 278sev_guest_set_dh_cert_file(Object *obj, const char *value, Error **errp)
 279{
 280    SevGuestState *s = SEV_GUEST(obj);
 281
 282    s->dh_cert_file = g_strdup(value);
 283}
 284
 285static char *
 286sev_guest_get_sev_device(Object *obj, Error **errp)
 287{
 288    SevGuestState *sev = SEV_GUEST(obj);
 289
 290    return g_strdup(sev->sev_device);
 291}
 292
 293static void
 294sev_guest_set_sev_device(Object *obj, const char *value, Error **errp)
 295{
 296    SevGuestState *sev = SEV_GUEST(obj);
 297
 298    sev->sev_device = g_strdup(value);
 299}
 300
 301static void
 302sev_guest_class_init(ObjectClass *oc, void *data)
 303{
 304    object_class_property_add_str(oc, "sev-device",
 305                                  sev_guest_get_sev_device,
 306                                  sev_guest_set_sev_device);
 307    object_class_property_set_description(oc, "sev-device",
 308            "SEV device to use");
 309    object_class_property_add_str(oc, "dh-cert-file",
 310                                  sev_guest_get_dh_cert_file,
 311                                  sev_guest_set_dh_cert_file);
 312    object_class_property_set_description(oc, "dh-cert-file",
 313            "guest owners DH certificate (encoded with base64)");
 314    object_class_property_add_str(oc, "session-file",
 315                                  sev_guest_get_session_file,
 316                                  sev_guest_set_session_file);
 317    object_class_property_set_description(oc, "session-file",
 318            "guest owners session parameters (encoded with base64)");
 319}
 320
 321static void
 322sev_guest_instance_init(Object *obj)
 323{
 324    SevGuestState *sev = SEV_GUEST(obj);
 325
 326    sev->sev_device = g_strdup(DEFAULT_SEV_DEVICE);
 327    sev->policy = DEFAULT_GUEST_POLICY;
 328    object_property_add_uint32_ptr(obj, "policy", &sev->policy,
 329                                   OBJ_PROP_FLAG_READWRITE);
 330    object_property_add_uint32_ptr(obj, "handle", &sev->handle,
 331                                   OBJ_PROP_FLAG_READWRITE);
 332    object_property_add_uint32_ptr(obj, "cbitpos", &sev->cbitpos,
 333                                   OBJ_PROP_FLAG_READWRITE);
 334    object_property_add_uint32_ptr(obj, "reduced-phys-bits",
 335                                   &sev->reduced_phys_bits,
 336                                   OBJ_PROP_FLAG_READWRITE);
 337}
 338
 339/* sev guest info */
 340static const TypeInfo sev_guest_info = {
 341    .parent = TYPE_CONFIDENTIAL_GUEST_SUPPORT,
 342    .name = TYPE_SEV_GUEST,
 343    .instance_size = sizeof(SevGuestState),
 344    .instance_finalize = sev_guest_finalize,
 345    .class_init = sev_guest_class_init,
 346    .instance_init = sev_guest_instance_init,
 347    .interfaces = (InterfaceInfo[]) {
 348        { TYPE_USER_CREATABLE },
 349        { }
 350    }
 351};
 352
 353bool
 354sev_enabled(void)
 355{
 356    return !!sev_guest;
 357}
 358
 359bool
 360sev_es_enabled(void)
 361{
 362    return sev_enabled() && (sev_guest->policy & SEV_POLICY_ES);
 363}
 364
 365uint64_t
 366sev_get_me_mask(void)
 367{
 368    return sev_guest ? sev_guest->me_mask : ~0;
 369}
 370
 371uint32_t
 372sev_get_cbit_position(void)
 373{
 374    return sev_guest ? sev_guest->cbitpos : 0;
 375}
 376
 377uint32_t
 378sev_get_reduced_phys_bits(void)
 379{
 380    return sev_guest ? sev_guest->reduced_phys_bits : 0;
 381}
 382
 383SevInfo *
 384sev_get_info(void)
 385{
 386    SevInfo *info;
 387
 388    info = g_new0(SevInfo, 1);
 389    info->enabled = sev_enabled();
 390
 391    if (info->enabled) {
 392        info->api_major = sev_guest->api_major;
 393        info->api_minor = sev_guest->api_minor;
 394        info->build_id = sev_guest->build_id;
 395        info->policy = sev_guest->policy;
 396        info->state = sev_guest->state;
 397        info->handle = sev_guest->handle;
 398    }
 399
 400    return info;
 401}
 402
 403static int
 404sev_get_pdh_info(int fd, guchar **pdh, size_t *pdh_len, guchar **cert_chain,
 405                 size_t *cert_chain_len, Error **errp)
 406{
 407    guchar *pdh_data = NULL;
 408    guchar *cert_chain_data = NULL;
 409    struct sev_user_data_pdh_cert_export export = {};
 410    int err, r;
 411
 412    /* query the certificate length */
 413    r = sev_platform_ioctl(fd, SEV_PDH_CERT_EXPORT, &export, &err);
 414    if (r < 0) {
 415        if (err != SEV_RET_INVALID_LEN) {
 416            error_setg(errp, "failed to export PDH cert ret=%d fw_err=%d (%s)",
 417                       r, err, fw_error_to_str(err));
 418            return 1;
 419        }
 420    }
 421
 422    pdh_data = g_new(guchar, export.pdh_cert_len);
 423    cert_chain_data = g_new(guchar, export.cert_chain_len);
 424    export.pdh_cert_address = (unsigned long)pdh_data;
 425    export.cert_chain_address = (unsigned long)cert_chain_data;
 426
 427    r = sev_platform_ioctl(fd, SEV_PDH_CERT_EXPORT, &export, &err);
 428    if (r < 0) {
 429        error_setg(errp, "failed to export PDH cert ret=%d fw_err=%d (%s)",
 430                   r, err, fw_error_to_str(err));
 431        goto e_free;
 432    }
 433
 434    *pdh = pdh_data;
 435    *pdh_len = export.pdh_cert_len;
 436    *cert_chain = cert_chain_data;
 437    *cert_chain_len = export.cert_chain_len;
 438    return 0;
 439
 440e_free:
 441    g_free(pdh_data);
 442    g_free(cert_chain_data);
 443    return 1;
 444}
 445
 446SevCapability *
 447sev_get_capabilities(Error **errp)
 448{
 449    SevCapability *cap = NULL;
 450    guchar *pdh_data = NULL;
 451    guchar *cert_chain_data = NULL;
 452    size_t pdh_len = 0, cert_chain_len = 0;
 453    uint32_t ebx;
 454    int fd;
 455
 456    if (!kvm_enabled()) {
 457        error_setg(errp, "KVM not enabled");
 458        return NULL;
 459    }
 460    if (kvm_vm_ioctl(kvm_state, KVM_MEMORY_ENCRYPT_OP, NULL) < 0) {
 461        error_setg(errp, "SEV is not enabled in KVM");
 462        return NULL;
 463    }
 464
 465    fd = open(DEFAULT_SEV_DEVICE, O_RDWR);
 466    if (fd < 0) {
 467        error_setg_errno(errp, errno, "Failed to open %s",
 468                         DEFAULT_SEV_DEVICE);
 469        return NULL;
 470    }
 471
 472    if (sev_get_pdh_info(fd, &pdh_data, &pdh_len,
 473                         &cert_chain_data, &cert_chain_len, errp)) {
 474        goto out;
 475    }
 476
 477    cap = g_new0(SevCapability, 1);
 478    cap->pdh = g_base64_encode(pdh_data, pdh_len);
 479    cap->cert_chain = g_base64_encode(cert_chain_data, cert_chain_len);
 480
 481    host_cpuid(0x8000001F, 0, NULL, &ebx, NULL, NULL);
 482    cap->cbitpos = ebx & 0x3f;
 483
 484    /*
 485     * When SEV feature is enabled, we loose one bit in guest physical
 486     * addressing.
 487     */
 488    cap->reduced_phys_bits = 1;
 489
 490out:
 491    g_free(pdh_data);
 492    g_free(cert_chain_data);
 493    close(fd);
 494    return cap;
 495}
 496
 497SevAttestationReport *
 498sev_get_attestation_report(const char *mnonce, Error **errp)
 499{
 500    struct kvm_sev_attestation_report input = {};
 501    SevAttestationReport *report = NULL;
 502    SevGuestState *sev = sev_guest;
 503    guchar *data;
 504    guchar *buf;
 505    gsize len;
 506    int err = 0, ret;
 507
 508    if (!sev_enabled()) {
 509        error_setg(errp, "SEV is not enabled");
 510        return NULL;
 511    }
 512
 513    /* lets decode the mnonce string */
 514    buf = g_base64_decode(mnonce, &len);
 515    if (!buf) {
 516        error_setg(errp, "SEV: failed to decode mnonce input");
 517        return NULL;
 518    }
 519
 520    /* verify the input mnonce length */
 521    if (len != sizeof(input.mnonce)) {
 522        error_setg(errp, "SEV: mnonce must be %zu bytes (got %" G_GSIZE_FORMAT ")",
 523                sizeof(input.mnonce), len);
 524        g_free(buf);
 525        return NULL;
 526    }
 527
 528    /* Query the report length */
 529    ret = sev_ioctl(sev->sev_fd, KVM_SEV_GET_ATTESTATION_REPORT,
 530            &input, &err);
 531    if (ret < 0) {
 532        if (err != SEV_RET_INVALID_LEN) {
 533            error_setg(errp, "failed to query the attestation report length "
 534                    "ret=%d fw_err=%d (%s)", ret, err, fw_error_to_str(err));
 535            g_free(buf);
 536            return NULL;
 537        }
 538    }
 539
 540    data = g_malloc(input.len);
 541    input.uaddr = (unsigned long)data;
 542    memcpy(input.mnonce, buf, sizeof(input.mnonce));
 543
 544    /* Query the report */
 545    ret = sev_ioctl(sev->sev_fd, KVM_SEV_GET_ATTESTATION_REPORT,
 546            &input, &err);
 547    if (ret) {
 548        error_setg_errno(errp, errno, "Failed to get attestation report"
 549                " ret=%d fw_err=%d (%s)", ret, err, fw_error_to_str(err));
 550        goto e_free_data;
 551    }
 552
 553    report = g_new0(SevAttestationReport, 1);
 554    report->data = g_base64_encode(data, input.len);
 555
 556    trace_kvm_sev_attestation_report(mnonce, report->data);
 557
 558e_free_data:
 559    g_free(data);
 560    g_free(buf);
 561    return report;
 562}
 563
 564static int
 565sev_read_file_base64(const char *filename, guchar **data, gsize *len)
 566{
 567    gsize sz;
 568    gchar *base64;
 569    GError *error = NULL;
 570
 571    if (!g_file_get_contents(filename, &base64, &sz, &error)) {
 572        error_report("failed to read '%s' (%s)", filename, error->message);
 573        g_error_free(error);
 574        return -1;
 575    }
 576
 577    *data = g_base64_decode(base64, len);
 578    return 0;
 579}
 580
 581static int
 582sev_launch_start(SevGuestState *sev)
 583{
 584    gsize sz;
 585    int ret = 1;
 586    int fw_error, rc;
 587    struct kvm_sev_launch_start *start;
 588    guchar *session = NULL, *dh_cert = NULL;
 589
 590    start = g_new0(struct kvm_sev_launch_start, 1);
 591
 592    start->handle = sev->handle;
 593    start->policy = sev->policy;
 594    if (sev->session_file) {
 595        if (sev_read_file_base64(sev->session_file, &session, &sz) < 0) {
 596            goto out;
 597        }
 598        start->session_uaddr = (unsigned long)session;
 599        start->session_len = sz;
 600    }
 601
 602    if (sev->dh_cert_file) {
 603        if (sev_read_file_base64(sev->dh_cert_file, &dh_cert, &sz) < 0) {
 604            goto out;
 605        }
 606        start->dh_uaddr = (unsigned long)dh_cert;
 607        start->dh_len = sz;
 608    }
 609
 610    trace_kvm_sev_launch_start(start->policy, session, dh_cert);
 611    rc = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_START, start, &fw_error);
 612    if (rc < 0) {
 613        error_report("%s: LAUNCH_START ret=%d fw_error=%d '%s'",
 614                __func__, ret, fw_error, fw_error_to_str(fw_error));
 615        goto out;
 616    }
 617
 618    sev_set_guest_state(sev, SEV_STATE_LAUNCH_UPDATE);
 619    sev->handle = start->handle;
 620    ret = 0;
 621
 622out:
 623    g_free(start);
 624    g_free(session);
 625    g_free(dh_cert);
 626    return ret;
 627}
 628
 629static int
 630sev_launch_update_data(SevGuestState *sev, uint8_t *addr, uint64_t len)
 631{
 632    int ret, fw_error;
 633    struct kvm_sev_launch_update_data update;
 634
 635    if (!addr || !len) {
 636        return 1;
 637    }
 638
 639    update.uaddr = (__u64)(unsigned long)addr;
 640    update.len = len;
 641    trace_kvm_sev_launch_update_data(addr, len);
 642    ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_UPDATE_DATA,
 643                    &update, &fw_error);
 644    if (ret) {
 645        error_report("%s: LAUNCH_UPDATE ret=%d fw_error=%d '%s'",
 646                __func__, ret, fw_error, fw_error_to_str(fw_error));
 647    }
 648
 649    return ret;
 650}
 651
 652static int
 653sev_launch_update_vmsa(SevGuestState *sev)
 654{
 655    int ret, fw_error;
 656
 657    ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_UPDATE_VMSA, NULL, &fw_error);
 658    if (ret) {
 659        error_report("%s: LAUNCH_UPDATE_VMSA ret=%d fw_error=%d '%s'",
 660                __func__, ret, fw_error, fw_error_to_str(fw_error));
 661    }
 662
 663    return ret;
 664}
 665
 666static void
 667sev_launch_get_measure(Notifier *notifier, void *unused)
 668{
 669    SevGuestState *sev = sev_guest;
 670    int ret, error;
 671    guchar *data;
 672    struct kvm_sev_launch_measure *measurement;
 673
 674    if (!sev_check_state(sev, SEV_STATE_LAUNCH_UPDATE)) {
 675        return;
 676    }
 677
 678    if (sev_es_enabled()) {
 679        /* measure all the VM save areas before getting launch_measure */
 680        ret = sev_launch_update_vmsa(sev);
 681        if (ret) {
 682            exit(1);
 683        }
 684    }
 685
 686    measurement = g_new0(struct kvm_sev_launch_measure, 1);
 687
 688    /* query the measurement blob length */
 689    ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_MEASURE,
 690                    measurement, &error);
 691    if (!measurement->len) {
 692        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
 693                     __func__, ret, error, fw_error_to_str(errno));
 694        goto free_measurement;
 695    }
 696
 697    data = g_new0(guchar, measurement->len);
 698    measurement->uaddr = (unsigned long)data;
 699
 700    /* get the measurement blob */
 701    ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_MEASURE,
 702                    measurement, &error);
 703    if (ret) {
 704        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
 705                     __func__, ret, error, fw_error_to_str(errno));
 706        goto free_data;
 707    }
 708
 709    sev_set_guest_state(sev, SEV_STATE_LAUNCH_SECRET);
 710
 711    /* encode the measurement value and emit the event */
 712    sev->measurement = g_base64_encode(data, measurement->len);
 713    trace_kvm_sev_launch_measurement(sev->measurement);
 714
 715free_data:
 716    g_free(data);
 717free_measurement:
 718    g_free(measurement);
 719}
 720
 721char *
 722sev_get_launch_measurement(void)
 723{
 724    if (sev_guest &&
 725        sev_guest->state >= SEV_STATE_LAUNCH_SECRET) {
 726        return g_strdup(sev_guest->measurement);
 727    }
 728
 729    return NULL;
 730}
 731
 732static Notifier sev_machine_done_notify = {
 733    .notify = sev_launch_get_measure,
 734};
 735
 736static void
 737sev_launch_finish(SevGuestState *sev)
 738{
 739    int ret, error;
 740    Error *local_err = NULL;
 741
 742    trace_kvm_sev_launch_finish();
 743    ret = sev_ioctl(sev->sev_fd, KVM_SEV_LAUNCH_FINISH, 0, &error);
 744    if (ret) {
 745        error_report("%s: LAUNCH_FINISH ret=%d fw_error=%d '%s'",
 746                     __func__, ret, error, fw_error_to_str(error));
 747        exit(1);
 748    }
 749
 750    sev_set_guest_state(sev, SEV_STATE_RUNNING);
 751
 752    /* add migration blocker */
 753    error_setg(&sev_mig_blocker,
 754               "SEV: Migration is not implemented");
 755    ret = migrate_add_blocker(sev_mig_blocker, &local_err);
 756    if (local_err) {
 757        error_report_err(local_err);
 758        error_free(sev_mig_blocker);
 759        exit(1);
 760    }
 761}
 762
 763static void
 764sev_vm_state_change(void *opaque, bool running, RunState state)
 765{
 766    SevGuestState *sev = opaque;
 767
 768    if (running) {
 769        if (!sev_check_state(sev, SEV_STATE_RUNNING)) {
 770            sev_launch_finish(sev);
 771        }
 772    }
 773}
 774
 775int sev_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)
 776{
 777    SevGuestState *sev
 778        = (SevGuestState *)object_dynamic_cast(OBJECT(cgs), TYPE_SEV_GUEST);
 779    char *devname;
 780    int ret, fw_error, cmd;
 781    uint32_t ebx;
 782    uint32_t host_cbitpos;
 783    struct sev_user_data_status status = {};
 784
 785    if (!sev) {
 786        return 0;
 787    }
 788
 789    ret = ram_block_discard_disable(true);
 790    if (ret) {
 791        error_report("%s: cannot disable RAM discard", __func__);
 792        return -1;
 793    }
 794
 795    sev_guest = sev;
 796    sev->state = SEV_STATE_UNINIT;
 797
 798    host_cpuid(0x8000001F, 0, NULL, &ebx, NULL, NULL);
 799    host_cbitpos = ebx & 0x3f;
 800
 801    if (host_cbitpos != sev->cbitpos) {
 802        error_setg(errp, "%s: cbitpos check failed, host '%d' requested '%d'",
 803                   __func__, host_cbitpos, sev->cbitpos);
 804        goto err;
 805    }
 806
 807    if (sev->reduced_phys_bits < 1) {
 808        error_setg(errp, "%s: reduced_phys_bits check failed, it should be >=1,"
 809                   " requested '%d'", __func__, sev->reduced_phys_bits);
 810        goto err;
 811    }
 812
 813    sev->me_mask = ~(1UL << sev->cbitpos);
 814
 815    devname = object_property_get_str(OBJECT(sev), "sev-device", NULL);
 816    sev->sev_fd = open(devname, O_RDWR);
 817    if (sev->sev_fd < 0) {
 818        error_setg(errp, "%s: Failed to open %s '%s'", __func__,
 819                   devname, strerror(errno));
 820        g_free(devname);
 821        goto err;
 822    }
 823    g_free(devname);
 824
 825    ret = sev_platform_ioctl(sev->sev_fd, SEV_PLATFORM_STATUS, &status,
 826                             &fw_error);
 827    if (ret) {
 828        error_setg(errp, "%s: failed to get platform status ret=%d "
 829                   "fw_error='%d: %s'", __func__, ret, fw_error,
 830                   fw_error_to_str(fw_error));
 831        goto err;
 832    }
 833    sev->build_id = status.build;
 834    sev->api_major = status.api_major;
 835    sev->api_minor = status.api_minor;
 836
 837    if (sev_es_enabled()) {
 838        if (!kvm_kernel_irqchip_allowed()) {
 839            error_report("%s: SEV-ES guests require in-kernel irqchip support",
 840                         __func__);
 841            goto err;
 842        }
 843
 844        if (!(status.flags & SEV_STATUS_FLAGS_CONFIG_ES)) {
 845            error_report("%s: guest policy requires SEV-ES, but "
 846                         "host SEV-ES support unavailable",
 847                         __func__);
 848            goto err;
 849        }
 850        cmd = KVM_SEV_ES_INIT;
 851    } else {
 852        cmd = KVM_SEV_INIT;
 853    }
 854
 855    trace_kvm_sev_init();
 856    ret = sev_ioctl(sev->sev_fd, cmd, NULL, &fw_error);
 857    if (ret) {
 858        error_setg(errp, "%s: failed to initialize ret=%d fw_error=%d '%s'",
 859                   __func__, ret, fw_error, fw_error_to_str(fw_error));
 860        goto err;
 861    }
 862
 863    ret = sev_launch_start(sev);
 864    if (ret) {
 865        error_setg(errp, "%s: failed to create encryption context", __func__);
 866        goto err;
 867    }
 868
 869    ram_block_notifier_add(&sev_ram_notifier);
 870    qemu_add_machine_init_done_notifier(&sev_machine_done_notify);
 871    qemu_add_vm_change_state_handler(sev_vm_state_change, sev);
 872
 873    cgs->ready = true;
 874
 875    return 0;
 876err:
 877    sev_guest = NULL;
 878    ram_block_discard_disable(false);
 879    return -1;
 880}
 881
 882int
 883sev_encrypt_flash(uint8_t *ptr, uint64_t len, Error **errp)
 884{
 885    if (!sev_guest) {
 886        return 0;
 887    }
 888
 889    /* if SEV is in update state then encrypt the data else do nothing */
 890    if (sev_check_state(sev_guest, SEV_STATE_LAUNCH_UPDATE)) {
 891        int ret = sev_launch_update_data(sev_guest, ptr, len);
 892        if (ret < 0) {
 893            error_setg(errp, "failed to encrypt pflash rom");
 894            return ret;
 895        }
 896    }
 897
 898    return 0;
 899}
 900
 901int sev_inject_launch_secret(const char *packet_hdr, const char *secret,
 902                             uint64_t gpa, Error **errp)
 903{
 904    struct kvm_sev_launch_secret input;
 905    g_autofree guchar *data = NULL, *hdr = NULL;
 906    int error, ret = 1;
 907    void *hva;
 908    gsize hdr_sz = 0, data_sz = 0;
 909    MemoryRegion *mr = NULL;
 910
 911    if (!sev_guest) {
 912        error_setg(errp, "SEV: SEV not enabled.");
 913        return 1;
 914    }
 915
 916    /* secret can be injected only in this state */
 917    if (!sev_check_state(sev_guest, SEV_STATE_LAUNCH_SECRET)) {
 918        error_setg(errp, "SEV: Not in correct state. (LSECRET) %x",
 919                     sev_guest->state);
 920        return 1;
 921    }
 922
 923    hdr = g_base64_decode(packet_hdr, &hdr_sz);
 924    if (!hdr || !hdr_sz) {
 925        error_setg(errp, "SEV: Failed to decode sequence header");
 926        return 1;
 927    }
 928
 929    data = g_base64_decode(secret, &data_sz);
 930    if (!data || !data_sz) {
 931        error_setg(errp, "SEV: Failed to decode data");
 932        return 1;
 933    }
 934
 935    hva = gpa2hva(&mr, gpa, data_sz, errp);
 936    if (!hva) {
 937        error_prepend(errp, "SEV: Failed to calculate guest address: ");
 938        return 1;
 939    }
 940
 941    input.hdr_uaddr = (uint64_t)(unsigned long)hdr;
 942    input.hdr_len = hdr_sz;
 943
 944    input.trans_uaddr = (uint64_t)(unsigned long)data;
 945    input.trans_len = data_sz;
 946
 947    input.guest_uaddr = (uint64_t)(unsigned long)hva;
 948    input.guest_len = data_sz;
 949
 950    trace_kvm_sev_launch_secret(gpa, input.guest_uaddr,
 951                                input.trans_uaddr, input.trans_len);
 952
 953    ret = sev_ioctl(sev_guest->sev_fd, KVM_SEV_LAUNCH_SECRET,
 954                    &input, &error);
 955    if (ret) {
 956        error_setg(errp, "SEV: failed to inject secret ret=%d fw_error=%d '%s'",
 957                     ret, error, fw_error_to_str(error));
 958        return ret;
 959    }
 960
 961    return 0;
 962}
 963
 964static int
 965sev_es_parse_reset_block(SevInfoBlock *info, uint32_t *addr)
 966{
 967    if (!info->reset_addr) {
 968        error_report("SEV-ES reset address is zero");
 969        return 1;
 970    }
 971
 972    *addr = info->reset_addr;
 973
 974    return 0;
 975}
 976
 977static int
 978sev_es_find_reset_vector(void *flash_ptr, uint64_t flash_size,
 979                         uint32_t *addr)
 980{
 981    QemuUUID info_guid, *guid;
 982    SevInfoBlock *info;
 983    uint8_t *data;
 984    uint16_t *len;
 985
 986    /*
 987     * Initialize the address to zero. An address of zero with a successful
 988     * return code indicates that SEV-ES is not active.
 989     */
 990    *addr = 0;
 991
 992    /*
 993     * Extract the AP reset vector for SEV-ES guests by locating the SEV GUID.
 994     * The SEV GUID is located on its own (original implementation) or within
 995     * the Firmware GUID Table (new implementation), either of which are
 996     * located 32 bytes from the end of the flash.
 997     *
 998     * Check the Firmware GUID Table first.
 999     */
1000    if (pc_system_ovmf_table_find(SEV_INFO_BLOCK_GUID, &data, NULL)) {
1001        return sev_es_parse_reset_block((SevInfoBlock *)data, addr);
1002    }
1003
1004    /*
1005     * SEV info block not found in the Firmware GUID Table (or there isn't
1006     * a Firmware GUID Table), fall back to the original implementation.
1007     */
1008    data = flash_ptr + flash_size - 0x20;
1009
1010    qemu_uuid_parse(SEV_INFO_BLOCK_GUID, &info_guid);
1011    info_guid = qemu_uuid_bswap(info_guid); /* GUIDs are LE */
1012
1013    guid = (QemuUUID *)(data - sizeof(info_guid));
1014    if (!qemu_uuid_is_equal(guid, &info_guid)) {
1015        error_report("SEV information block/Firmware GUID Table block not found in pflash rom");
1016        return 1;
1017    }
1018
1019    len = (uint16_t *)((uint8_t *)guid - sizeof(*len));
1020    info = (SevInfoBlock *)(data - le16_to_cpu(*len));
1021
1022    return sev_es_parse_reset_block(info, addr);
1023}
1024
1025void sev_es_set_reset_vector(CPUState *cpu)
1026{
1027    X86CPU *x86;
1028    CPUX86State *env;
1029
1030    /* Only update if we have valid reset information */
1031    if (!sev_guest || !sev_guest->reset_data_valid) {
1032        return;
1033    }
1034
1035    /* Do not update the BSP reset state */
1036    if (cpu->cpu_index == 0) {
1037        return;
1038    }
1039
1040    x86 = X86_CPU(cpu);
1041    env = &x86->env;
1042
1043    cpu_x86_load_seg_cache(env, R_CS, 0xf000, sev_guest->reset_cs, 0xffff,
1044                           DESC_P_MASK | DESC_S_MASK | DESC_CS_MASK |
1045                           DESC_R_MASK | DESC_A_MASK);
1046
1047    env->eip = sev_guest->reset_ip;
1048}
1049
1050int sev_es_save_reset_vector(void *flash_ptr, uint64_t flash_size)
1051{
1052    CPUState *cpu;
1053    uint32_t addr;
1054    int ret;
1055
1056    if (!sev_es_enabled()) {
1057        return 0;
1058    }
1059
1060    addr = 0;
1061    ret = sev_es_find_reset_vector(flash_ptr, flash_size,
1062                                   &addr);
1063    if (ret) {
1064        return ret;
1065    }
1066
1067    if (addr) {
1068        sev_guest->reset_cs = addr & 0xffff0000;
1069        sev_guest->reset_ip = addr & 0x0000ffff;
1070        sev_guest->reset_data_valid = true;
1071
1072        CPU_FOREACH(cpu) {
1073            sev_es_set_reset_vector(cpu);
1074        }
1075    }
1076
1077    return 0;
1078}
1079
1080static void
1081sev_register_types(void)
1082{
1083    type_register_static(&sev_guest_info);
1084}
1085
1086type_init(sev_register_types);
1087