[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[RFC PATCH v2 01/12] migration: Add helpers to save confidential RAM
From: |
Dov Murik |
Subject: |
[RFC PATCH v2 01/12] migration: Add helpers to save confidential RAM |
Date: |
Mon, 23 Aug 2021 10:16:25 -0400 |
QEMU cannot read the memory of memory-encrypted guests, which is
required for sending RAM to the migration target. Instead, QEMU asks a
migration helper running on an auxiliary vcpu in the guest to extract
pages from memory; these pages are encrypted with a transfer key that is
known to the source and target guests, but not to both QEMUs.
The interaction with the guest migration helper is performed using two
shared (unencrypted) pages which both QEMU and guest can read from and
write to. The details of the mailbox protocol are described in
migration/confidential-ram.c.
Signed-off-by: Dov Murik <dovmurik@linux.ibm.com>
---
migration/confidential-ram.h | 17 ++++
migration/confidential-ram.c | 184 +++++++++++++++++++++++++++++++++++
migration/meson.build | 2 +-
migration/trace-events | 3 +
4 files changed, 205 insertions(+), 1 deletion(-)
create mode 100644 migration/confidential-ram.h
create mode 100644 migration/confidential-ram.c
diff --git a/migration/confidential-ram.h b/migration/confidential-ram.h
new file mode 100644
index 0000000000..0d49718d31
--- /dev/null
+++ b/migration/confidential-ram.h
@@ -0,0 +1,17 @@
+/*
+ * QEMU migration for confidential guest's RAM
+ */
+
+#ifndef QEMU_CONFIDENTIAL_RAM_H
+#define QEMU_CONFIDENTIAL_RAM_H
+
+#include "exec/cpu-common.h"
+#include "qemu-file.h"
+
+void cgs_mh_init(void);
+void cgs_mh_cleanup(void);
+
+int cgs_mh_save_encrypted_page(QEMUFile *f, ram_addr_t src_gpa, uint32_t size,
+ uint64_t *bytes_sent);
+
+#endif
diff --git a/migration/confidential-ram.c b/migration/confidential-ram.c
new file mode 100644
index 0000000000..65a588e7f6
--- /dev/null
+++ b/migration/confidential-ram.c
@@ -0,0 +1,184 @@
+#include "qemu/osdep.h"
+#include "cpu.h"
+#include "qemu/osdep.h"
+#include "qemu/error-report.h"
+#include "qemu/rcu.h"
+#include "qemu/coroutine.h"
+#include "qemu/timer.h"
+#include "io/channel.h"
+#include "qapi/error.h"
+#include "exec/memory.h"
+#include "trace.h"
+#include "confidential-ram.h"
+
+enum cgs_mig_helper_cmd {
+ /* Initialize migration helper in guest */
+ CGS_MIG_HELPER_CMD_INIT = 0,
+
+ /*
+ * Fetch a page from gpa, encrypt it, and save result into the shared page
+ */
+ CGS_MIG_HELPER_CMD_ENCRYPT,
+
+ /* Read the shared page, decrypt it, and save result into gpa */
+ CGS_MIG_HELPER_CMD_DECRYPT,
+
+ /* Reset migration helper in guest */
+ CGS_MIG_HELPER_CMD_RESET,
+
+ CGS_MIG_HELPER_CMD_MAX
+};
+
+struct QEMU_PACKED CGSMigHelperCmdParams {
+ uint64_t cmd_type;
+ uint64_t gpa;
+ int32_t prefetch;
+ int32_t ret;
+ int32_t go;
+ int32_t done;
+};
+typedef struct CGSMigHelperCmdParams CGSMigHelperCmdParams;
+
+struct QEMU_PACKED CGSMigHelperPageHeader {
+ uint32_t len;
+ uint8_t data[0];
+};
+typedef struct CGSMigHelperPageHeader CGSMigHelperPageHeader;
+
+struct CGSMigHelperState {
+ CGSMigHelperCmdParams *cmd_params;
+ CGSMigHelperPageHeader *io_page_hdr;
+ uint8_t *io_page;
+ bool initialized;
+};
+typedef struct CGSMigHelperState CGSMigHelperState;
+
+static CGSMigHelperState cmhs = {0};
+
+#define MH_BUSYLOOP_TIMEOUT 100000000LL
+#define MH_REQUEST_TIMEOUT_MS 100
+#define MH_REQUEST_TIMEOUT_NS (MH_REQUEST_TIMEOUT_MS * 1000 * 1000)
+
+/*
+ * The migration helper shared area is hard-coded at gpa 0x820000 with size of
+ * 2 pages (0x2000 bytes). Instead of hard-coding, the address and size may be
+ * fetched from OVMF itself using a pc_system_ovmf_table_find call to query
+ * OVMF's GUIDed structure for a migration helper GUID.
+ */
+#define MH_SHARED_CMD_PARAMS_ADDR 0x820000
+#define MH_SHARED_IO_PAGE_HDR_ADDR (MH_SHARED_CMD_PARAMS_ADDR + 0x800)
+#define MH_SHARED_IO_PAGE_ADDR (MH_SHARED_CMD_PARAMS_ADDR + 0x1000)
+
+void cgs_mh_init(void)
+{
+ RCU_READ_LOCK_GUARD();
+ cmhs.cmd_params = qemu_map_ram_ptr(NULL, MH_SHARED_CMD_PARAMS_ADDR);
+ cmhs.io_page_hdr = qemu_map_ram_ptr(NULL, MH_SHARED_IO_PAGE_HDR_ADDR);
+ cmhs.io_page = qemu_map_ram_ptr(NULL, MH_SHARED_IO_PAGE_ADDR);
+}
+
+static int send_command_to_cgs_mig_helper(uint64_t cmd_type, uint64_t gpa)
+{
+ /*
+ * The cmd_params struct is on a page shared with the guest migration
+ * helper. We use a volatile struct to force writes to memory so that the
+ * guest can see them.
+ */
+ volatile CGSMigHelperCmdParams *params = cmhs.cmd_params;
+ int64_t counter, request_timeout_at;
+
+ /*
+ * At this point io_page and io_page_hdr should be already filled according
+ * to the requested cmd_type.
+ */
+
+ params->cmd_type = cmd_type;
+ params->gpa = gpa;
+ params->prefetch = 0;
+ params->ret = -1;
+ params->done = 0;
+
+ /*
+ * Force writes of all command parameters before writing the 'go' flag.
+ * The guest migration handler waits for the go flag and then reads the
+ * command parameters.
+ */
+ smp_wmb();
+
+ /* Tell the migration helper to start working on this command */
+ params->go = 1;
+
+ /*
+ * Wait for the guest migration helper to process the command and mark the
+ * done flag
+ */
+ request_timeout_at = qemu_clock_get_ns(QEMU_CLOCK_REALTIME) +
+ MH_REQUEST_TIMEOUT_NS;
+ do {
+ counter = 0;
+ while (!params->done && (counter < MH_BUSYLOOP_TIMEOUT)) {
+ counter++;
+ }
+ } while (!params->done &&
+ qemu_clock_get_ns(QEMU_CLOCK_REALTIME) < request_timeout_at);
+
+ if (!params->done) {
+ error_report("Migration helper command %" PRIu64 " timed-out for "
+ "gpa 0x%" PRIx64, cmd_type, gpa);
+ return -EIO;
+ }
+
+ return params->ret;
+}
+
+static void init_cgs_mig_helper_if_needed(void)
+{
+ int ret;
+
+ if (cmhs.initialized) {
+ return;
+ }
+
+ ret = send_command_to_cgs_mig_helper(CGS_MIG_HELPER_CMD_INIT, 0);
+ if (ret == 0) {
+ cmhs.initialized = true;
+ }
+}
+
+void cgs_mh_cleanup(void)
+{
+ send_command_to_cgs_mig_helper(CGS_MIG_HELPER_CMD_RESET, 0);
+}
+
+int cgs_mh_save_encrypted_page(QEMUFile *f, ram_addr_t src_gpa, uint32_t size,
+ uint64_t *bytes_sent)
+{
+ int ret;
+
+ init_cgs_mig_helper_if_needed();
+
+ /* Ask the migration helper to encrypt the page at src_gpa */
+ trace_encrypted_ram_save_page(size, src_gpa);
+ ret = send_command_to_cgs_mig_helper(CGS_MIG_HELPER_CMD_ENCRYPT, src_gpa);
+ if (ret) {
+ error_report("Error cgs_mh_save_encrypted_page ret=%d", ret);
+ return -1;
+ }
+
+ /* Sanity check for response header */
+ if (cmhs.io_page_hdr->len > 1024) {
+ error_report("confidential-ram: migration helper response is too large
"
+ "(len=%u)", cmhs.io_page_hdr->len);
+ return -EINVAL;
+ }
+
+ qemu_put_be32(f, cmhs.io_page_hdr->len);
+ qemu_put_buffer(f, cmhs.io_page_hdr->data, cmhs.io_page_hdr->len);
+ *bytes_sent = 4 + cmhs.io_page_hdr->len;
+
+ qemu_put_be32(f, size);
+ qemu_put_buffer(f, cmhs.io_page, size);
+ *bytes_sent += 4 + size;
+
+ return ret;
+}
diff --git a/migration/meson.build b/migration/meson.build
index f8714dcb15..774223c1a3 100644
--- a/migration/meson.build
+++ b/migration/meson.build
@@ -32,4 +32,4 @@ softmmu_ss.add(when: 'CONFIG_LIVE_BLOCK_MIGRATION', if_true:
files('block.c'))
softmmu_ss.add(when: zstd, if_true: files('multifd-zstd.c'))
specific_ss.add(when: 'CONFIG_SOFTMMU',
- if_true: files('dirtyrate.c', 'ram.c', 'target.c'))
+ if_true: files('dirtyrate.c', 'ram.c', 'target.c',
'confidential-ram.c'))
diff --git a/migration/trace-events b/migration/trace-events
index a1c0f034ab..3d442a767f 100644
--- a/migration/trace-events
+++ b/migration/trace-events
@@ -344,3 +344,6 @@ migration_block_save_pending(uint64_t pending) "Enter save
live pending %" PRIu
# page_cache.c
migration_pagecache_init(int64_t max_num_items) "Setting cache buckets to %"
PRId64
migration_pagecache_insert(void) "Error allocating page"
+
+# confidential-ram.c
+encrypted_ram_save_page(uint32_t size, uint64_t gpa) "size: %u, gpa: 0x%"
PRIx64
--
2.20.1
- [RFC PATCH v2 00/12] Confidential guest-assisted live migration, Dov Murik, 2021/08/23
- [RFC PATCH v2 03/12] migration: Introduce gpa_inside_migration_helper_shared_area, Dov Murik, 2021/08/23
- [RFC PATCH v2 02/12] migration: Add helpers to load confidential RAM, Dov Murik, 2021/08/23
- [RFC PATCH v2 06/12] migration: Skip ROM, non-RAM, and vga.vram memory region during RAM migration, Dov Murik, 2021/08/23
- [RFC PATCH v2 10/12] migration: Add start-migrate-incoming QMP command, Dov Murik, 2021/08/23
- [RFC PATCH v2 05/12] migration: Load confidential guest RAM using migration helper, Dov Murik, 2021/08/23
- [RFC PATCH v2 09/12] migration: Add QMP command start-migration-handler, Dov Murik, 2021/08/23
- [RFC PATCH v2 07/12] i386/kvm: Exclude mirror vcpu in kvm_synchronize_all_tsc, Dov Murik, 2021/08/23
- [RFC PATCH v2 04/12] migration: Save confidential guest RAM using migration helper, Dov Murik, 2021/08/23
- [RFC PATCH v2 08/12] migration: Allow resetting the mirror vcpu to the MH entry point, Dov Murik, 2021/08/23
- [RFC PATCH v2 01/12] migration: Add helpers to save confidential RAM,
Dov Murik <=
- [RFC PATCH v2 12/12] docs: Add confidential guest live migration documentation, Dov Murik, 2021/08/23
- [RFC PATCH v2 11/12] hw/isa/lpc_ich9: Allow updating an already-running VM, Dov Murik, 2021/08/23