diff mbox

[v6,18/23] sev: emit the SEV_MEASUREMENT event

Message ID 20180129174132.108925-19-brijesh.singh@amd.com (mailing list archive)
State New, archived
Headers show

Commit Message

Brijesh Singh Jan. 29, 2018, 5:41 p.m. UTC
During machine creation we encrypted the guest bios image, the
LAUNCH_MEASURE command can be used to retrieve the measurement of
the encrypted memory region. Emit the SEV_MEASUREMENT event so that
libvirt can grab the measurement value as soon as we are done with
creating the encrypted machine.

Cc: Daniel P. Berrange <berrange@redhat.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: kvm@vger.kernel.org
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
---
 accel/kvm/sev.c        | 58 ++++++++++++++++++++++++++++++++++++++++++++++++++
 accel/kvm/trace-events |  1 +
 include/sysemu/sev.h   |  1 +
 3 files changed, 60 insertions(+)

Comments

Dr. David Alan Gilbert Jan. 30, 2018, 8:08 p.m. UTC | #1
* Brijesh Singh (brijesh.singh@amd.com) wrote:
> During machine creation we encrypted the guest bios image, the
> LAUNCH_MEASURE command can be used to retrieve the measurement of
> the encrypted memory region. Emit the SEV_MEASUREMENT event so that
> libvirt can grab the measurement value as soon as we are done with
> creating the encrypted machine.

Can you ust clarify what happens if the libvirt has disconnected and
reconnected to qemu and so didn't see the event?  Can the reconnecting
libvirt query it and find out it's ready/not ready yet?

Dave

> Cc: Daniel P. Berrange <berrange@redhat.com>
> Cc: Paolo Bonzini <pbonzini@redhat.com>
> Cc: kvm@vger.kernel.org
> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
> ---
>  accel/kvm/sev.c        | 58 ++++++++++++++++++++++++++++++++++++++++++++++++++
>  accel/kvm/trace-events |  1 +
>  include/sysemu/sev.h   |  1 +
>  3 files changed, 60 insertions(+)
> 
> diff --git a/accel/kvm/sev.c b/accel/kvm/sev.c
> index 1f757df725df..b78cf3144b1d 100644
> --- a/accel/kvm/sev.c
> +++ b/accel/kvm/sev.c
> @@ -19,11 +19,13 @@
>  #include "sysemu/sev.h"
>  #include "sysemu/sysemu.h"
>  #include "trace.h"
> +#include "qapi-event.h"
>  
>  #define DEFAULT_GUEST_POLICY    0x1 /* disable debug */
>  #define DEFAULT_SEV_DEVICE      "/dev/sev"
>  
>  static int sev_fd;
> +static SEVState *sev_state;
>  
>  #define SEV_FW_MAX_ERROR      0x17
>  
> @@ -418,6 +420,59 @@ err:
>      return ret;
>  }
>  
> +static void
> +sev_launch_get_measure(Notifier *notifier, void *unused)
> +{
> +    int ret, error;
> +    guchar *data;
> +    SEVState *s = sev_state;
> +    struct kvm_sev_launch_measure *measurement;
> +
> +    measurement = g_malloc0(sizeof(*measurement));
> +    if (!measurement) {
> +        return;
> +    }
> +
> +    /* query the measurement blob length */
> +    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
> +    if (!measurement->len) {
> +        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
> +                     __func__, ret, error, fw_error_to_str(errno));
> +        goto free_measurement;
> +    }
> +
> +    data = g_malloc(measurement->len);
> +    if (s->measurement) {
> +        goto free_data;
> +    }
> +
> +    measurement->uaddr = (unsigned long)data;
> +
> +    /* get the measurement blob */
> +    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
> +    if (ret) {
> +        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
> +                     __func__, ret, error, fw_error_to_str(errno));
> +        goto free_data;
> +    }
> +
> +    sev_set_guest_state(SEV_STATE_SECRET);
> +
> +    /* encode the measurement value and emit the event */
> +    s->measurement = g_base64_encode(data, measurement->len);
> +    trace_kvm_sev_launch_measurement(s->measurement);
> +    qapi_event_send_sev_measurement(s->measurement, &error_abort);
> +
> +free_data:
> +    g_free(data);
> +free_measurement:
> +    g_free(measurement);
> +}
> +
> +static Notifier sev_machine_done_notify = {
> +    .notify = sev_launch_get_measure,
> +};
> +
>  void *
>  sev_guest_init(const char *id)
>  {
> @@ -461,6 +516,9 @@ sev_guest_init(const char *id)
>      }
>  
>      ram_block_notifier_add(&sev_ram_notifier);
> +    qemu_add_machine_init_done_notifier(&sev_machine_done_notify);
> +
> +    sev_state = s;
>  
>      return s;
>  err:
> diff --git a/accel/kvm/trace-events b/accel/kvm/trace-events
> index c55546f36a25..51df5113ad07 100644
> --- a/accel/kvm/trace-events
> +++ b/accel/kvm/trace-events
> @@ -20,3 +20,4 @@ kvm_memcrypt_unregister_region(void *addr, size_t len) "addr %p len 0x%lu"
>  kvm_sev_change_state(char *old, char *new) "%s -> %s"
>  kvm_sev_launch_start(int policy, void *session, void *pdh) "policy 0x%x session %p pdh %p"
>  kvm_sev_launch_update_data(void *addr, uint64_t len) "addr %p len 0x%" PRIu64
> +kvm_sev_launch_measurement(const char *value) "data %s"
> diff --git a/include/sysemu/sev.h b/include/sysemu/sev.h
> index 839800efdbbf..572120c865ea 100644
> --- a/include/sysemu/sev.h
> +++ b/include/sysemu/sev.h
> @@ -63,6 +63,7 @@ typedef enum {
>  
>  struct SEVState {
>      QSevGuestInfo *sev_info;
> +    gchar *measurement;
>  };
>  
>  typedef struct SEVState SEVState;
> -- 
> 2.9.5
> 
--
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
Brijesh Singh Jan. 30, 2018, 10:13 p.m. UTC | #2
On 1/30/18 2:08 PM, Dr. David Alan Gilbert wrote:
> * Brijesh Singh (brijesh.singh@amd.com) wrote:
>> During machine creation we encrypted the guest bios image, the
>> LAUNCH_MEASURE command can be used to retrieve the measurement of
>> the encrypted memory region. Emit the SEV_MEASUREMENT event so that
>> libvirt can grab the measurement value as soon as we are done with
>> creating the encrypted machine.
> Can you ust clarify what happens if the libvirt has disconnected and
> reconnected to qemu and so didn't see the event?  Can the reconnecting
> libvirt query it and find out it's ready/not ready yet?

Dave,

I have not looked into details between libvirt and qemu interaction to
comment how and when the events will be delivered. Recently, one of my
colleague was implementing libvirt interface for the SEV guest and ran
into somewhat a similar challenge and posted question on libvirt mailing
list [1].

In previous discussion on qemu mailing list, we agreed to implement SEV
MEASUREMENT event which can be seen by libvirt. That's what this patch
is doing.

But during the libvirt implementation it seems that qemu monitor
silently drops all the events before it get the first qmp_capabilities
command. At a quick glance it seems on reconnect, libvirt issues
qmp_capabilities command and any event issued before the
qmp_capabilities command will never to delivered to libvirt. we are
looking for  help from libvirt/qemu monitor experts on how we solve this
problem. Our goal is to provide the measurement to libvirt before
libvirt issues "continue" command. Since event can't be seen by libvirt
before it resumes the guest hence I was wondering if we should we should
drop the SEV measurement event and consider adding a new QMP command to
query the SEV measurement.

[1] https://www.redhat.com/archives/libvir-list/2018-January/msg00602.html

> Dave
>
>> Cc: Daniel P. Berrange <berrange@redhat.com>
>> Cc: Paolo Bonzini <pbonzini@redhat.com>
>> Cc: kvm@vger.kernel.org
>> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
>> ---
>>  accel/kvm/sev.c        | 58 ++++++++++++++++++++++++++++++++++++++++++++++++++
>>  accel/kvm/trace-events |  1 +
>>  include/sysemu/sev.h   |  1 +
>>  3 files changed, 60 insertions(+)
>>
>> diff --git a/accel/kvm/sev.c b/accel/kvm/sev.c
>> index 1f757df725df..b78cf3144b1d 100644
>> --- a/accel/kvm/sev.c
>> +++ b/accel/kvm/sev.c
>> @@ -19,11 +19,13 @@
>>  #include "sysemu/sev.h"
>>  #include "sysemu/sysemu.h"
>>  #include "trace.h"
>> +#include "qapi-event.h"
>>  
>>  #define DEFAULT_GUEST_POLICY    0x1 /* disable debug */
>>  #define DEFAULT_SEV_DEVICE      "/dev/sev"
>>  
>>  static int sev_fd;
>> +static SEVState *sev_state;
>>  
>>  #define SEV_FW_MAX_ERROR      0x17
>>  
>> @@ -418,6 +420,59 @@ err:
>>      return ret;
>>  }
>>  
>> +static void
>> +sev_launch_get_measure(Notifier *notifier, void *unused)
>> +{
>> +    int ret, error;
>> +    guchar *data;
>> +    SEVState *s = sev_state;
>> +    struct kvm_sev_launch_measure *measurement;
>> +
>> +    measurement = g_malloc0(sizeof(*measurement));
>> +    if (!measurement) {
>> +        return;
>> +    }
>> +
>> +    /* query the measurement blob length */
>> +    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
>> +    if (!measurement->len) {
>> +        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
>> +                     __func__, ret, error, fw_error_to_str(errno));
>> +        goto free_measurement;
>> +    }
>> +
>> +    data = g_malloc(measurement->len);
>> +    if (s->measurement) {
>> +        goto free_data;
>> +    }
>> +
>> +    measurement->uaddr = (unsigned long)data;
>> +
>> +    /* get the measurement blob */
>> +    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
>> +    if (ret) {
>> +        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
>> +                     __func__, ret, error, fw_error_to_str(errno));
>> +        goto free_data;
>> +    }
>> +
>> +    sev_set_guest_state(SEV_STATE_SECRET);
>> +
>> +    /* encode the measurement value and emit the event */
>> +    s->measurement = g_base64_encode(data, measurement->len);
>> +    trace_kvm_sev_launch_measurement(s->measurement);
>> +    qapi_event_send_sev_measurement(s->measurement, &error_abort);
>> +
>> +free_data:
>> +    g_free(data);
>> +free_measurement:
>> +    g_free(measurement);
>> +}
>> +
>> +static Notifier sev_machine_done_notify = {
>> +    .notify = sev_launch_get_measure,
>> +};
>> +
>>  void *
>>  sev_guest_init(const char *id)
>>  {
>> @@ -461,6 +516,9 @@ sev_guest_init(const char *id)
>>      }
>>  
>>      ram_block_notifier_add(&sev_ram_notifier);
>> +    qemu_add_machine_init_done_notifier(&sev_machine_done_notify);
>> +
>> +    sev_state = s;
>>  
>>      return s;
>>  err:
>> diff --git a/accel/kvm/trace-events b/accel/kvm/trace-events
>> index c55546f36a25..51df5113ad07 100644
>> --- a/accel/kvm/trace-events
>> +++ b/accel/kvm/trace-events
>> @@ -20,3 +20,4 @@ kvm_memcrypt_unregister_region(void *addr, size_t len) "addr %p len 0x%lu"
>>  kvm_sev_change_state(char *old, char *new) "%s -> %s"
>>  kvm_sev_launch_start(int policy, void *session, void *pdh) "policy 0x%x session %p pdh %p"
>>  kvm_sev_launch_update_data(void *addr, uint64_t len) "addr %p len 0x%" PRIu64
>> +kvm_sev_launch_measurement(const char *value) "data %s"
>> diff --git a/include/sysemu/sev.h b/include/sysemu/sev.h
>> index 839800efdbbf..572120c865ea 100644
>> --- a/include/sysemu/sev.h
>> +++ b/include/sysemu/sev.h
>> @@ -63,6 +63,7 @@ typedef enum {
>>  
>>  struct SEVState {
>>      QSevGuestInfo *sev_info;
>> +    gchar *measurement;
>>  };
>>  
>>  typedef struct SEVState SEVState;
>> -- 
>> 2.9.5
>>
> --
> Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
Dr. David Alan Gilbert Feb. 1, 2018, 5:27 p.m. UTC | #3
* Brijesh Singh (brijesh.singh@amd.com) wrote:
> 
> 
> On 1/30/18 2:08 PM, Dr. David Alan Gilbert wrote:
> > * Brijesh Singh (brijesh.singh@amd.com) wrote:
> >> During machine creation we encrypted the guest bios image, the
> >> LAUNCH_MEASURE command can be used to retrieve the measurement of
> >> the encrypted memory region. Emit the SEV_MEASUREMENT event so that
> >> libvirt can grab the measurement value as soon as we are done with
> >> creating the encrypted machine.
> > Can you ust clarify what happens if the libvirt has disconnected and
> > reconnected to qemu and so didn't see the event?  Can the reconnecting
> > libvirt query it and find out it's ready/not ready yet?
> 
> Dave,
> 
> I have not looked into details between libvirt and qemu interaction to
> comment how and when the events will be delivered. Recently, one of my
> colleague was implementing libvirt interface for the SEV guest and ran
> into somewhat a similar challenge and posted question on libvirt mailing
> list [1].
> 
> In previous discussion on qemu mailing list, we agreed to implement SEV
> MEASUREMENT event which can be seen by libvirt. That's what this patch
> is doing.
> 
> But during the libvirt implementation it seems that qemu monitor
> silently drops all the events before it get the first qmp_capabilities
> command. At a quick glance it seems on reconnect, libvirt issues
> qmp_capabilities command and any event issued before the
> qmp_capabilities command will never to delivered to libvirt. we are
> looking for  help from libvirt/qemu monitor experts on how we solve this
> problem. Our goal is to provide the measurement to libvirt before
> libvirt issues "continue" command. Since event can't be seen by libvirt
> before it resumes the guest hence I was wondering if we should we should
> drop the SEV measurement event and consider adding a new QMP command to
> query the SEV measurement.

Yep, I'll leave it to the libvirt contacts for the best way they'd like
to see that, as Eric says there's nothing wrong with having both the
command and event if useful.  Also keep in mind coping with a guest that
crashes early or that measurement never arrives.

Dave

> [1] https://www.redhat.com/archives/libvir-list/2018-January/msg00602.html
> 
> > Dave
> >
> >> Cc: Daniel P. Berrange <berrange@redhat.com>
> >> Cc: Paolo Bonzini <pbonzini@redhat.com>
> >> Cc: kvm@vger.kernel.org
> >> Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
> >> ---
> >>  accel/kvm/sev.c        | 58 ++++++++++++++++++++++++++++++++++++++++++++++++++
> >>  accel/kvm/trace-events |  1 +
> >>  include/sysemu/sev.h   |  1 +
> >>  3 files changed, 60 insertions(+)
> >>
> >> diff --git a/accel/kvm/sev.c b/accel/kvm/sev.c
> >> index 1f757df725df..b78cf3144b1d 100644
> >> --- a/accel/kvm/sev.c
> >> +++ b/accel/kvm/sev.c
> >> @@ -19,11 +19,13 @@
> >>  #include "sysemu/sev.h"
> >>  #include "sysemu/sysemu.h"
> >>  #include "trace.h"
> >> +#include "qapi-event.h"
> >>  
> >>  #define DEFAULT_GUEST_POLICY    0x1 /* disable debug */
> >>  #define DEFAULT_SEV_DEVICE      "/dev/sev"
> >>  
> >>  static int sev_fd;
> >> +static SEVState *sev_state;
> >>  
> >>  #define SEV_FW_MAX_ERROR      0x17
> >>  
> >> @@ -418,6 +420,59 @@ err:
> >>      return ret;
> >>  }
> >>  
> >> +static void
> >> +sev_launch_get_measure(Notifier *notifier, void *unused)
> >> +{
> >> +    int ret, error;
> >> +    guchar *data;
> >> +    SEVState *s = sev_state;
> >> +    struct kvm_sev_launch_measure *measurement;
> >> +
> >> +    measurement = g_malloc0(sizeof(*measurement));
> >> +    if (!measurement) {
> >> +        return;
> >> +    }
> >> +
> >> +    /* query the measurement blob length */
> >> +    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
> >> +    if (!measurement->len) {
> >> +        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
> >> +                     __func__, ret, error, fw_error_to_str(errno));
> >> +        goto free_measurement;
> >> +    }
> >> +
> >> +    data = g_malloc(measurement->len);
> >> +    if (s->measurement) {
> >> +        goto free_data;
> >> +    }
> >> +
> >> +    measurement->uaddr = (unsigned long)data;
> >> +
> >> +    /* get the measurement blob */
> >> +    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
> >> +    if (ret) {
> >> +        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
> >> +                     __func__, ret, error, fw_error_to_str(errno));
> >> +        goto free_data;
> >> +    }
> >> +
> >> +    sev_set_guest_state(SEV_STATE_SECRET);
> >> +
> >> +    /* encode the measurement value and emit the event */
> >> +    s->measurement = g_base64_encode(data, measurement->len);
> >> +    trace_kvm_sev_launch_measurement(s->measurement);
> >> +    qapi_event_send_sev_measurement(s->measurement, &error_abort);
> >> +
> >> +free_data:
> >> +    g_free(data);
> >> +free_measurement:
> >> +    g_free(measurement);
> >> +}
> >> +
> >> +static Notifier sev_machine_done_notify = {
> >> +    .notify = sev_launch_get_measure,
> >> +};
> >> +
> >>  void *
> >>  sev_guest_init(const char *id)
> >>  {
> >> @@ -461,6 +516,9 @@ sev_guest_init(const char *id)
> >>      }
> >>  
> >>      ram_block_notifier_add(&sev_ram_notifier);
> >> +    qemu_add_machine_init_done_notifier(&sev_machine_done_notify);
> >> +
> >> +    sev_state = s;
> >>  
> >>      return s;
> >>  err:
> >> diff --git a/accel/kvm/trace-events b/accel/kvm/trace-events
> >> index c55546f36a25..51df5113ad07 100644
> >> --- a/accel/kvm/trace-events
> >> +++ b/accel/kvm/trace-events
> >> @@ -20,3 +20,4 @@ kvm_memcrypt_unregister_region(void *addr, size_t len) "addr %p len 0x%lu"
> >>  kvm_sev_change_state(char *old, char *new) "%s -> %s"
> >>  kvm_sev_launch_start(int policy, void *session, void *pdh) "policy 0x%x session %p pdh %p"
> >>  kvm_sev_launch_update_data(void *addr, uint64_t len) "addr %p len 0x%" PRIu64
> >> +kvm_sev_launch_measurement(const char *value) "data %s"
> >> diff --git a/include/sysemu/sev.h b/include/sysemu/sev.h
> >> index 839800efdbbf..572120c865ea 100644
> >> --- a/include/sysemu/sev.h
> >> +++ b/include/sysemu/sev.h
> >> @@ -63,6 +63,7 @@ typedef enum {
> >>  
> >>  struct SEVState {
> >>      QSevGuestInfo *sev_info;
> >> +    gchar *measurement;
> >>  };
> >>  
> >>  typedef struct SEVState SEVState;
> >> -- 
> >> 2.9.5
> >>
> > --
> > Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
> 
--
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
Brijesh Singh Feb. 2, 2018, 3:11 p.m. UTC | #4
On 02/01/2018 11:27 AM, Dr. David Alan Gilbert wrote:
> * Brijesh Singh (brijesh.singh@amd.com) wrote:
>>
>>
>> On 1/30/18 2:08 PM, Dr. David Alan Gilbert wrote:
>>> * Brijesh Singh (brijesh.singh@amd.com) wrote:
>>>> During machine creation we encrypted the guest bios image, the
>>>> LAUNCH_MEASURE command can be used to retrieve the measurement of
>>>> the encrypted memory region. Emit the SEV_MEASUREMENT event so that
>>>> libvirt can grab the measurement value as soon as we are done with
>>>> creating the encrypted machine.
>>> Can you ust clarify what happens if the libvirt has disconnected and
>>> reconnected to qemu and so didn't see the event?  Can the reconnecting
>>> libvirt query it and find out it's ready/not ready yet?
>>
>> Dave,
>>
>> I have not looked into details between libvirt and qemu interaction to
>> comment how and when the events will be delivered. Recently, one of my
>> colleague was implementing libvirt interface for the SEV guest and ran
>> into somewhat a similar challenge and posted question on libvirt mailing
>> list [1].
>>
>> In previous discussion on qemu mailing list, we agreed to implement SEV
>> MEASUREMENT event which can be seen by libvirt. That's what this patch
>> is doing.
>>
>> But during the libvirt implementation it seems that qemu monitor
>> silently drops all the events before it get the first qmp_capabilities
>> command. At a quick glance it seems on reconnect, libvirt issues
>> qmp_capabilities command and any event issued before the
>> qmp_capabilities command will never to delivered to libvirt. we are
>> looking for  help from libvirt/qemu monitor experts on how we solve this
>> problem. Our goal is to provide the measurement to libvirt before
>> libvirt issues "continue" command. Since event can't be seen by libvirt
>> before it resumes the guest hence I was wondering if we should we should
>> drop the SEV measurement event and consider adding a new QMP command to
>> query the SEV measurement.
> 
> Yep, I'll leave it to the libvirt contacts for the best way they'd like
> to see that, as Eric says there's nothing wrong with having both the
> command and event if useful.  Also keep in mind coping with a guest that
> crashes early or that measurement never arrives.
> 

Yep, lets see what libvirt experts say about it.

Hi Daniel,

Do you have any recommendation on whether we should consider adding a 
new QMP to retrieve the measurement or we do event or both? Please note 
that the launch measurement is generate only once for the lifetime of 
the guest. The measurement will be available after qmeu encrypts the 
guest bios during the machine initialization time.

-Brijesh
Daniel P. Berrangé Feb. 2, 2018, 3:16 p.m. UTC | #5
On Fri, Feb 02, 2018 at 09:11:41AM -0600, Brijesh Singh wrote:
> 
> 
> On 02/01/2018 11:27 AM, Dr. David Alan Gilbert wrote:
> > * Brijesh Singh (brijesh.singh@amd.com) wrote:
> > > 
> > > 
> > > On 1/30/18 2:08 PM, Dr. David Alan Gilbert wrote:
> > > > * Brijesh Singh (brijesh.singh@amd.com) wrote:
> > > > > During machine creation we encrypted the guest bios image, the
> > > > > LAUNCH_MEASURE command can be used to retrieve the measurement of
> > > > > the encrypted memory region. Emit the SEV_MEASUREMENT event so that
> > > > > libvirt can grab the measurement value as soon as we are done with
> > > > > creating the encrypted machine.
> > > > Can you ust clarify what happens if the libvirt has disconnected and
> > > > reconnected to qemu and so didn't see the event?  Can the reconnecting
> > > > libvirt query it and find out it's ready/not ready yet?
> > > 
> > > Dave,
> > > 
> > > I have not looked into details between libvirt and qemu interaction to
> > > comment how and when the events will be delivered. Recently, one of my
> > > colleague was implementing libvirt interface for the SEV guest and ran
> > > into somewhat a similar challenge and posted question on libvirt mailing
> > > list [1].
> > > 
> > > In previous discussion on qemu mailing list, we agreed to implement SEV
> > > MEASUREMENT event which can be seen by libvirt. That's what this patch
> > > is doing.
> > > 
> > > But during the libvirt implementation it seems that qemu monitor
> > > silently drops all the events before it get the first qmp_capabilities
> > > command. At a quick glance it seems on reconnect, libvirt issues
> > > qmp_capabilities command and any event issued before the
> > > qmp_capabilities command will never to delivered to libvirt. we are
> > > looking for  help from libvirt/qemu monitor experts on how we solve this
> > > problem. Our goal is to provide the measurement to libvirt before
> > > libvirt issues "continue" command. Since event can't be seen by libvirt
> > > before it resumes the guest hence I was wondering if we should we should
> > > drop the SEV measurement event and consider adding a new QMP command to
> > > query the SEV measurement.
> > 
> > Yep, I'll leave it to the libvirt contacts for the best way they'd like
> > to see that, as Eric says there's nothing wrong with having both the
> > command and event if useful.  Also keep in mind coping with a guest that
> > crashes early or that measurement never arrives.
> > 
> 
> Yep, lets see what libvirt experts say about it.
> 
> Hi Daniel,
> 
> Do you have any recommendation on whether we should consider adding a new
> QMP to retrieve the measurement or we do event or both? Please note that the
> launch measurement is generate only once for the lifetime of the guest. The
> measurement will be available after qmeu encrypts the guest bios during the
> machine initialization time.

IIUC, the measurement event is only required during the initial QEMU
startup sequence. Once the guest CPUs are running this info is not needed
any more.

If libvirtd crashes/restarts in the middle of QEMU startup sequence it is
game over from libvirt's POV. Libvirtd won't try to carry on starting that
guest when it restarts. So I don't think there's a compelling need for a
command to query the measurement from libvirt's POV, the event is fine.

That all said, I think it might be useful to have a command to query the
SEV measurement purely as a debugging aid, if some admin / support person
wants to get hold of this info for some reason...

Regards,
Daniel
Brijesh Singh Feb. 8, 2018, 4:17 p.m. UTC | #6
On Fri, Feb 2, 2018 at 9:16 AM, Daniel P. Berrangé <berrange@redhat.com>
wrote:

> On Fri, Feb 02, 2018 at 09:11:41AM -0600, Brijesh Singh wrote:
> >
> >
> > On 02/01/2018 11:27 AM, Dr. David Alan Gilbert wrote:
> > > * Brijesh Singh (brijesh.singh@amd.com) wrote:
> > > >
> > > >
> > > > On 1/30/18 2:08 PM, Dr. David Alan Gilbert wrote:
> > > > > * Brijesh Singh (brijesh.singh@amd.com) wrote:
> > > > > > During machine creation we encrypted the guest bios image, the
> > > > > > LAUNCH_MEASURE command can be used to retrieve the measurement of
> > > > > > the encrypted memory region. Emit the SEV_MEASUREMENT event so
> that
> > > > > > libvirt can grab the measurement value as soon as we are done
> with
> > > > > > creating the encrypted machine.
> > > > > Can you ust clarify what happens if the libvirt has disconnected
> and
> > > > > reconnected to qemu and so didn't see the event?  Can the
> reconnecting
> > > > > libvirt query it and find out it's ready/not ready yet?
> > > >
> > > > Dave,
> > > >
> > > > I have not looked into details between libvirt and qemu interaction
> to
> > > > comment how and when the events will be delivered. Recently, one of
> my
> > > > colleague was implementing libvirt interface for the SEV guest and
> ran
> > > > into somewhat a similar challenge and posted question on libvirt
> mailing
> > > > list [1].
> > > >
> > > > In previous discussion on qemu mailing list, we agreed to implement
> SEV
> > > > MEASUREMENT event which can be seen by libvirt. That's what this
> patch
> > > > is doing.
> > > >
> > > > But during the libvirt implementation it seems that qemu monitor
> > > > silently drops all the events before it get the first
> qmp_capabilities
> > > > command. At a quick glance it seems on reconnect, libvirt issues
> > > > qmp_capabilities command and any event issued before the
> > > > qmp_capabilities command will never to delivered to libvirt. we are
> > > > looking for  help from libvirt/qemu monitor experts on how we solve
> this
> > > > problem. Our goal is to provide the measurement to libvirt before
> > > > libvirt issues "continue" command. Since event can't be seen by
> libvirt
> > > > before it resumes the guest hence I was wondering if we should we
> should
> > > > drop the SEV measurement event and consider adding a new QMP command
> to
> > > > query the SEV measurement.
> > >
> > > Yep, I'll leave it to the libvirt contacts for the best way they'd like
> > > to see that, as Eric says there's nothing wrong with having both the
> > > command and event if useful.  Also keep in mind coping with a guest
> that
> > > crashes early or that measurement never arrives.
> > >
> >
> > Yep, lets see what libvirt experts say about it.
> >
> > Hi Daniel,
> >
> > Do you have any recommendation on whether we should consider adding a new
> > QMP to retrieve the measurement or we do event or both? Please note that
> the
> > launch measurement is generate only once for the lifetime of the guest.
> The
> > measurement will be available after qmeu encrypts the guest bios during
> the
> > machine initialization time.
>
> IIUC, the measurement event is only required during the initial QEMU
> startup sequence. Once the guest CPUs are running this info is not needed
> any more.
>

That is correct.



>
> If libvirtd crashes/restarts in the middle of QEMU startup sequence it is
> game over from libvirt's POV. Libvirtd won't try to carry on starting that
> guest when it restarts. So I don't think there's a compelling need for a
> command to query the measurement from libvirt's POV, the event is fine.
>
>

Sorry for the late response, somehow this email was never delievered to my
AMD account hence I was not able to see the response on-time.

Anyway, the main issue is event emitted before "qmp_capabilities" are
dropped silently , see [1] . In our case, the measurement event is emitted
during the machine creation time, libvirt was still waiting to reconnect
the monitor when event was emitted hence libvirt never gets the event.
Because of this, I am not able to see any strong reason to emit the event.
Do you see any issue with libvirt issuing a  'query-sev-launch-measure' to
get the measurement on reconnect ?

[1] https://github.com/qemu/qemu/blob/master/monitor.c#L418



That all said, I think it might be useful to have a command to query the
> SEV measurement purely as a debugging aid, if some admin / support person
> wants to get hold of this info for some reason...
>
> Regards,
> Daniel
> --
> |: https://berrange.com      -o-    https://www.flickr.com/photos/
> dberrange :|
> |: https://libvirt.org         -o-
> https://fstop138.berrange.com :|
> |: https://entangle-photo.org    -o-    https://www.instagram.com/
> dberrange :|
>
>
Daniel P. Berrangé Feb. 8, 2018, 4:22 p.m. UTC | #7
On Thu, Feb 08, 2018 at 10:17:28AM -0600, Brijesh Singh wrote:
> 
> Anyway, the main issue is event emitted before "qmp_capabilities" are
> dropped silently , see [1] . In our case, the measurement event is emitted
> during the machine creation time, libvirt was still waiting to reconnect
> the monitor when event was emitted hence libvirt never gets the event.
> Because of this, I am not able to see any strong reason to emit the event.
> Do you see any issue with libvirt issuing a  'query-sev-launch-measure' to
> get the measurement on reconnect ?

Hmm, yes, I see so there can be a race between SEV emitting the event and
libvirtd making the initial monitor connection. In that case, we definitely
to have a QMP command to let libvirt explicitly query it. 


Regards,
Daniel
diff mbox

Patch

diff --git a/accel/kvm/sev.c b/accel/kvm/sev.c
index 1f757df725df..b78cf3144b1d 100644
--- a/accel/kvm/sev.c
+++ b/accel/kvm/sev.c
@@ -19,11 +19,13 @@ 
 #include "sysemu/sev.h"
 #include "sysemu/sysemu.h"
 #include "trace.h"
+#include "qapi-event.h"
 
 #define DEFAULT_GUEST_POLICY    0x1 /* disable debug */
 #define DEFAULT_SEV_DEVICE      "/dev/sev"
 
 static int sev_fd;
+static SEVState *sev_state;
 
 #define SEV_FW_MAX_ERROR      0x17
 
@@ -418,6 +420,59 @@  err:
     return ret;
 }
 
+static void
+sev_launch_get_measure(Notifier *notifier, void *unused)
+{
+    int ret, error;
+    guchar *data;
+    SEVState *s = sev_state;
+    struct kvm_sev_launch_measure *measurement;
+
+    measurement = g_malloc0(sizeof(*measurement));
+    if (!measurement) {
+        return;
+    }
+
+    /* query the measurement blob length */
+    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
+    if (!measurement->len) {
+        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
+                     __func__, ret, error, fw_error_to_str(errno));
+        goto free_measurement;
+    }
+
+    data = g_malloc(measurement->len);
+    if (s->measurement) {
+        goto free_data;
+    }
+
+    measurement->uaddr = (unsigned long)data;
+
+    /* get the measurement blob */
+    ret = sev_ioctl(KVM_SEV_LAUNCH_MEASURE, measurement, &error);
+    if (ret) {
+        error_report("%s: LAUNCH_MEASURE ret=%d fw_error=%d '%s'",
+                     __func__, ret, error, fw_error_to_str(errno));
+        goto free_data;
+    }
+
+    sev_set_guest_state(SEV_STATE_SECRET);
+
+    /* encode the measurement value and emit the event */
+    s->measurement = g_base64_encode(data, measurement->len);
+    trace_kvm_sev_launch_measurement(s->measurement);
+    qapi_event_send_sev_measurement(s->measurement, &error_abort);
+
+free_data:
+    g_free(data);
+free_measurement:
+    g_free(measurement);
+}
+
+static Notifier sev_machine_done_notify = {
+    .notify = sev_launch_get_measure,
+};
+
 void *
 sev_guest_init(const char *id)
 {
@@ -461,6 +516,9 @@  sev_guest_init(const char *id)
     }
 
     ram_block_notifier_add(&sev_ram_notifier);
+    qemu_add_machine_init_done_notifier(&sev_machine_done_notify);
+
+    sev_state = s;
 
     return s;
 err:
diff --git a/accel/kvm/trace-events b/accel/kvm/trace-events
index c55546f36a25..51df5113ad07 100644
--- a/accel/kvm/trace-events
+++ b/accel/kvm/trace-events
@@ -20,3 +20,4 @@  kvm_memcrypt_unregister_region(void *addr, size_t len) "addr %p len 0x%lu"
 kvm_sev_change_state(char *old, char *new) "%s -> %s"
 kvm_sev_launch_start(int policy, void *session, void *pdh) "policy 0x%x session %p pdh %p"
 kvm_sev_launch_update_data(void *addr, uint64_t len) "addr %p len 0x%" PRIu64
+kvm_sev_launch_measurement(const char *value) "data %s"
diff --git a/include/sysemu/sev.h b/include/sysemu/sev.h
index 839800efdbbf..572120c865ea 100644
--- a/include/sysemu/sev.h
+++ b/include/sysemu/sev.h
@@ -63,6 +63,7 @@  typedef enum {
 
 struct SEVState {
     QSevGuestInfo *sev_info;
+    gchar *measurement;
 };
 
 typedef struct SEVState SEVState;