commit 7522dca83c8bd76c068ed4d1110cb7032088e1a4
parent 89ad69afdb9051bdf098e0e05a47e2f62ff6a3f1
Author: Louis Burda <quent.burda@gmail.com>
Date: Tue, 30 Aug 2022 22:28:28 +0200
sev.c now works until KVM_SEV_LAUNCH_FINISH
Diffstat:
M | Makefile | | | 2 | +- |
A | test/sev.c | | | 524 | +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ |
2 files changed, 525 insertions(+), 1 deletion(-)
diff --git a/Makefile b/Makefile
@@ -3,7 +3,7 @@ PWD := $(shell pwd)
.PHONY: all reset clean prepare build
-all: reset clean prepare build test/eviction test/access test/kvm
+all: reset clean prepare build test/eviction test/access test/kvm test/sev
clean:
$(MAKE) -C $(KERNEL_SOURCE) SUBDIRS=arch/x86/kvm clean
diff --git a/test/sev.c b/test/sev.c
@@ -0,0 +1,524 @@
+/* for CPU_ZERO macros.. */
+#define _GNU_SOURCE
+
+#include "cachepc_user.h"
+
+#include <linux/kvm.h>
+#include <sys/syscall.h>
+#include <sys/ioctl.h>
+#include <sys/user.h>
+#include <sys/wait.h>
+#include <sys/ioctl.h>
+#include <sys/mman.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+#include <unistd.h>
+#include <signal.h>
+#include <dirent.h>
+#include <assert.h>
+#include <errno.h>
+#include <err.h>
+#include <fcntl.h>
+#include <sched.h>
+#include <string.h>
+#include <stdbool.h>
+#include <stdlib.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <stdarg.h>
+
+#define ARRLEN(x) (sizeof(x) / sizeof((x)[0]))
+#define MIN(a,b) ((a) > (b) ? (b) : (a))
+
+#define SAMPLE_COUNT 100
+
+#define TARGET_CORE 2
+#define SECONDARY_CORE 3
+
+struct kvm {
+ int fd;
+ int vmfd;
+ int vcpufd;
+ void *mem;
+};
+
+/* start and end for guest assembly */
+extern uint8_t __start_guest_with[];
+extern uint8_t __stop_guest_with[];
+extern uint8_t __start_guest_without[];
+extern uint8_t __stop_guest_without[];
+
+static bool ready = false;
+static bool processed = false;
+
+static ssize_t sysret;
+static pid_t victim_pid;
+
+static struct kvm kvm;
+static struct kvm_run *kvm_run;
+
+static int cachepc_fd;
+
+#define TARGET_CACHE_LINESIZE 64
+#define TARGET_SET 15
+
+__attribute__((section("guest_with"))) void
+vm_guest_with(void)
+{
+ while (1) {
+ asm volatile("mov (%[v]), %%bl"
+ : : [v] "r" (TARGET_CACHE_LINESIZE * TARGET_SET));
+ asm volatile("out %%al, (%%dx)" : : );
+ }
+}
+
+__attribute__((section("guest_without"))) void
+vm_guest_without(void)
+{
+ while (1) {
+ asm volatile("out %%al, (%%dx)" : : );
+ }
+}
+
+bool
+pin_process(pid_t pid, int cpu, bool assert)
+{
+ cpu_set_t cpuset;
+ int status;
+
+ CPU_ZERO(&cpuset);
+ CPU_SET(cpu, &cpuset);
+ status = sched_setaffinity(pid, sizeof(cpu_set_t), &cpuset);
+ if (status < 0) {
+ if (assert) err(1, "sched_setaffinity");
+ return false;
+ }
+
+ return true;
+}
+
+int
+read_stat_core(pid_t pid)
+{
+ char path[256];
+ char line[2048];
+ FILE *file;
+ char *p;
+ int i, cpu;
+
+ snprintf(path, sizeof(path), "/proc/%u/stat", pid);
+ file = fopen(path, "r");
+ if (!file) return -1;
+
+ if (!fgets(line, sizeof(line), file))
+ err(1, "read stat");
+
+ p = line;
+ for (i = 0; i < 38 && (p = strchr(p, ' ')); i++)
+ p += 1;
+
+ if (!p) errx(1, "stat format");
+ cpu = atoi(p);
+
+ fclose(file);
+
+ return cpu;
+}
+
+void
+clear_cores(uint64_t cpu_mask)
+{
+ DIR *proc_dir, *task_dir;
+ struct dirent *proc_ent, *task_ent;
+ char taskpath[256];
+ pid_t pid, tid;
+ bool res;
+ int cpu;
+
+ /* move all processes from the target cpu to secondary */
+
+ proc_dir = opendir("/proc");
+ if (!proc_dir) err(1, "opendir");
+
+ while ((proc_ent = readdir(proc_dir))) {
+ pid = atoi(proc_ent->d_name);
+ if (!pid) continue;
+
+ cpu = read_stat_core(pid);
+ if (cpu >= 0 && (1 << cpu) & cpu_mask) {
+ res = pin_process(pid, SECONDARY_CORE, false);
+ // if (!res) printf("Failed pin %i from %i\n", pid, cpu);
+ if (res) printf("Pinned %i from %i\n", tid, cpu);
+ continue;
+ }
+
+ snprintf(taskpath, sizeof(taskpath), "/proc/%u/task", pid);
+ task_dir = opendir(taskpath);
+ if (!task_dir) err(1, "opendir");
+
+ while ((task_ent = readdir(task_dir))) {
+ tid = atoi(task_ent->d_name);
+ if (!tid || tid == pid) continue;
+
+ cpu = read_stat_core(tid);
+ if (cpu >= 0 && (1 << cpu) & cpu_mask) {
+ res = pin_process(tid, SECONDARY_CORE, false);
+ //if (!res) printf("Failed pin %i from %i\n", tid, cpu);
+ if (res) printf("Pinned thread %i from %i\n", tid, cpu);
+ }
+ }
+
+ closedir(task_dir);
+ }
+
+ closedir(proc_dir);
+}
+
+void
+kvm_init(size_t ramsize, void *code_start, void *code_stop)
+{
+ struct kvm_userspace_memory_region region;
+ struct kvm_regs regs;
+ struct kvm_sregs sregs;
+ int ret;
+
+ kvm.fd = open("/dev/kvm", O_RDWR | O_CLOEXEC);
+ if (kvm.fd < 0) err(1, "/dev/kvm");
+
+ /* Make sure we have the stable version of the API */
+ ret = ioctl(kvm.fd, KVM_GET_API_VERSION, NULL);
+ if (ret == -1) err(1, "KVM_GET_API_VERSION");
+ if (ret != 12) errx(1, "KVM_GET_API_VERSION %d, expected 12", ret);
+
+ kvm.vmfd = ioctl(kvm.fd, KVM_CREATE_VM, 0);
+ if (kvm.vmfd < 0) err(1, "KVM_CREATE_VM");
+
+ /* Allocate one aligned page of guest memory to hold the code. */
+ kvm.mem = mmap(NULL, ramsize, PROT_READ | PROT_WRITE,
+ MAP_SHARED | MAP_ANONYMOUS, -1, 0);
+ if (!kvm.mem) err(1, "allocating guest memory");
+ assert(code_stop - code_start <= ramsize);
+ memcpy(kvm.mem, code_start, code_stop - code_start);
+
+ /* Map it into vm memory */
+ memset(®ion, 0, sizeof(region));
+ region.slot = 0;
+ region.memory_size = ramsize;
+ region.guest_phys_addr = 0x0000;
+ region.userspace_addr = (uint64_t) kvm.mem;
+
+ ret = ioctl(kvm.vmfd, KVM_SET_USER_MEMORY_REGION, ®ion);
+ if (ret < 0) err(1, "KVM_SET_USER_MEMORY_REGION");
+
+ kvm.vcpufd = ioctl(kvm.vmfd, KVM_CREATE_VCPU, 0);
+ if (kvm.vcpufd < 0) err(1, "KVM_CREATE_VCPU");
+
+ /* Map the shared kvm_run structure and following data. */
+ ret = ioctl(kvm.fd, KVM_GET_VCPU_MMAP_SIZE, NULL);
+ if (ret < 0) err(1, "KVM_GET_VCPU_MMAP_SIZE");
+
+ if (ret < sizeof(struct kvm_run))
+ errx(1, "KVM_GET_VCPU_MMAP_SIZE too small");
+ kvm_run = mmap(NULL, ret, PROT_READ | PROT_WRITE,
+ MAP_SHARED, kvm.vcpufd, 0);
+ if (!kvm_run) err(1, "mmap vcpu");
+
+ /* Initialize CS to point at 0, via a read-modify-write of sregs. */
+ memset(&sregs, 0, sizeof(sregs));
+ ret = ioctl(kvm.vcpufd, KVM_GET_SREGS, &sregs);
+ if (ret < 0) err(1, "KVM_GET_SREGS");
+ sregs.cs.base = 0;
+ sregs.cs.selector = 0;
+ ret = ioctl(kvm.vcpufd, KVM_SET_SREGS, &sregs);
+ if (ret < 0) err(1, "KVM_SET_SREGS");
+
+ /* Initialize registers: instruction pointer for our code, addends, and
+ * initial flags required by x86 architecture. */
+ memset(®s, 0, sizeof(regs));
+ regs.rip = 0x0;
+ regs.rsp = ramsize - 1;
+ regs.rbp = ramsize - 1;
+ regs.rax = 0;
+ regs.rdx = 0;
+ regs.rflags = 0x2;
+ ret = ioctl(kvm.vcpufd, KVM_SET_REGS, ®s);
+ if (ret < 0) err(1, "KVM_SET_REGS");
+}
+
+
+int
+kvm_vm_ioctl(int vmfd, int type, ...)
+{
+ va_list ap;
+ void *arg;
+ int ret;
+
+ va_start(ap, type);
+ arg = va_arg(ap, void *);
+ va_end(ap);
+
+ ret = ioctl(vmfd, type, arg);
+ if (ret == -1) {
+ ret = -errno;
+ }
+ return ret;
+}
+
+static int
+sev_ioctl(int fd, int cmd, void *data, int *error)
+{
+ // REF: https://github.dev/OpenChannelSSD/qemu-nvme/blob/master/target/i386/sev.c
+ struct kvm_sev_cmd input;
+ int ret;
+
+ memset(&input, 0, sizeof(input));
+ input.id = cmd;
+ input.sev_fd = fd;
+ input.data = (uint64_t) data;
+
+ ret = kvm_vm_ioctl(kvm.vmfd, KVM_MEMORY_ENCRYPT_OP, &input);
+ if (error) *error = input.error;
+
+ return ret;
+}
+
+void vini_hexdump(unsigned char *data, int len)
+{
+ char *out = (char *)malloc(len * 2 + 1);
+ for (int i = 0; i != len; i++)
+ {
+ sprintf(&out[2 * i], "%02X", data[i]);
+ }
+ out[len * 2] = '\0';
+ printf("###Vincent_hexdump: %s\n", out);
+ free(out);
+}
+
+
+
+static void
+sev_launch_get_measure(int sev_fd)
+{
+ int ret, error;
+ struct kvm_sev_launch_measure measurement;
+ memset(&measurement, 0, sizeof(struct kvm_sev_launch_measure));
+ /* query the measurement blob length */
+ ret = sev_ioctl(sev_fd, KVM_SEV_LAUNCH_MEASURE,
+ &measurement, &error);
+ printf("Measurement len %d\n", measurement.len);
+ if (!measurement.len) {
+ printf("%s: LAUNCH_MEASURE first call ret=%d fw_error=%d",
+ __func__, ret, error);
+ //goto free_measurement;
+ }
+ printf("Measurement len %d\n", measurement.len);
+ char *data = malloc(measurement.len);
+ //data = g_new0(guchar, measurement->len);
+ measurement.uaddr = (unsigned long)data;
+ /* get the measurement blob */
+ ret = sev_ioctl(sev_fd, KVM_SEV_LAUNCH_MEASURE,
+ &measurement, &error);
+ if (ret) {
+ printf("%s: LAUNCH_MEASURE second calll ret=%d fw_error=%d ",
+ __func__, ret, error);
+ goto free_data;
+ }
+ printf("Measurement report \n");
+ printf("######### \n");
+ vini_hexdump(data, measurement.len);
+ printf("############ \n");
+
+
+ //sev_set_guest_state(SEV_STATE_LAUNCH_SECRET);
+
+ /* encode the measurement value and emit the event */
+ //s->measurement = g_base64_encode(data, measurement->len);
+ //trace_kvm_sev_launch_measurement(s->measurement);
+ free_data:
+ free(data);
+}
+
+
+void
+kvm_svm_init(size_t ramsize, void *code_start, void *code_stop)
+{
+ // REF: https://www.amd.com/system/files/TechDocs/55766_SEV-KM_API_Specification.pdf
+ struct kvm_sev_launch_update_data update;
+ struct kvm_sev_launch_start start;
+ struct kvm_regs regs;
+ uint16_t *counts;
+ int sev_fd;
+ int fwerr;
+ int status;
+ int ret;
+
+ /* using cache size for alignment of kvm memory access */
+ kvm_init(ramsize, code_start, code_stop);
+
+ sev_fd = open("/dev/sev", O_RDWR | O_CLOEXEC);
+ if (sev_fd < 0) err(1, "open /dev/sev");
+
+ ret = ioctl(kvm.vmfd, KVM_MEMORY_ENCRYPT_OP, NULL);
+ if (ret < 0) errx(1, "KVM_MEMORY_ENCRYPT_OPT: %i %i", ret, fwerr);
+
+ ret = sev_ioctl(sev_fd, KVM_SEV_INIT, NULL, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_INIT: %i %i", ret, fwerr);
+
+ // REF: https://documentation.suse.com/sles/15-SP1/html/SLES-amd-sev/index.html
+ memset(&start, 0, sizeof(start));
+ start.handle = 0;
+ start.policy = 0;
+ start.policy |= 0 << 2; // disable require sev-es -- we are working with SEV right now
+ // start.policy |= 3 << 32; // minimum fw-version
+ ret = sev_ioctl(sev_fd, KVM_SEV_LAUNCH_START, &start, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_LAUNCH_START: (%s) %i", strerror(errno), fwerr);
+
+ memset(&update, 0, sizeof(update));
+ update.uaddr = (uint64_t) kvm.mem;
+ update.len = ramsize;
+ ret = sev_ioctl(sev_fd, KVM_SEV_LAUNCH_UPDATE_DATA, &update, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_LAUNCH_UPDATE_DATA: %i %i", ret, fwerr);
+ //Get measurement
+ sev_launch_get_measure(sev_fd);
+ ret = sev_ioctl(sev_fd, KVM_SEV_LAUNCH_FINISH, 0, &fwerr);
+ if (ret < 0) errx(1, "KVM_SEV_LAUNCH_UPDATE_DATA: %i %i", ret, fwerr);
+
+
+ //printf("Return code opening /dev/sev %d\n", sev_fd);
+ //printf("Return code %d \n", ioctl(sev_fd, KVM_SEV_ES_INIT, NULL));
+}
+
+uint16_t *
+read_counts()
+{
+ uint16_t *counts = (uint16_t *)malloc(64*sizeof(uint16_t));
+ size_t len;
+
+ lseek(cachepc_fd, 0, SEEK_SET);
+ len = read(cachepc_fd, counts, 64 * sizeof(uint16_t));
+ assert(len == 64 * sizeof(uint16_t));
+
+ return counts;
+}
+
+void
+print_counts(uint16_t *counts)
+{
+ int i;
+
+ for (i = 0; i < 64; i++) {
+ if (i % 16 == 0 && i)
+ printf("\n");
+ if (counts[i] == 1)
+ printf("\x1b[38;5;88m");
+ else if (counts[i] > 1)
+ printf("\x1b[38;5;196m");
+ printf("%2i ", i);
+ if (counts[i] > 0)
+ printf("\x1b[0m");
+ }
+ printf("\n Target Set Count: %d %hu \n", TARGET_SET, counts[TARGET_SET]);
+ printf("\n");
+}
+
+uint16_t *
+collect(const char *prefix, void *code_start, void *code_stop)
+{
+ struct kvm_regs regs;
+ uint16_t *counts;
+ int ret;
+
+ // using cache size for alignment of kvm memory access
+ kvm_init(64 * 64 * 8 * 2, code_start, code_stop);
+
+ /* run vm twice, use count without initial stack setup */
+ ret = ioctl(kvm.vcpufd, KVM_RUN, NULL);
+ ret = ioctl(kvm.vcpufd, KVM_RUN, NULL);
+
+ if (kvm_run->exit_reason == KVM_EXIT_MMIO) {
+ memset(®s, 0, sizeof(regs));
+ ret = ioctl(kvm.vcpufd, KVM_GET_REGS, ®s);
+ if (ret < 0) err(1, "KVM_GET_REGS");
+ errx(1, "Victim access OOB: %lu %08llx => %02X\n",
+ kvm_run->mmio.phys_addr, regs.rip,
+ ((uint8_t*)kvm.mem)[regs.rip]);
+ }
+
+ if (ret < 0 || kvm_run->exit_reason != KVM_EXIT_IO)
+ errx(1, "KVM died: %i %i\n", ret, kvm_run->exit_reason);
+
+ counts = read_counts();
+
+ close(kvm.fd);
+ close(kvm.vmfd);
+ close(kvm.vcpufd);
+
+ return counts;
+}
+
+int
+main(int argc, const char **argv)
+{
+ uint16_t without_access[SAMPLE_COUNT][64];
+ uint16_t with_access[SAMPLE_COUNT][64];
+ uint16_t *counts, *baseline;
+ uint32_t arg;
+ int i, k, ret;
+
+ setvbuf(stdout, NULL, _IONBF, 0);
+
+ clear_cores(1 << TARGET_CORE);
+ pin_process(0, TARGET_CORE, true);
+
+ cachepc_fd = open("/proc/cachepc", O_RDONLY);
+ if (cachepc_fd < 0) err(1, "open /proc/cachepc");
+
+ /* init L1 miss counter */
+ arg = 0x000064D8;
+ ret = ioctl(cachepc_fd, CACHEPC_IOCTL_INIT_PMC, &arg);
+ if (ret == -1) err(1, "ioctl fail");
+
+ baseline = calloc(sizeof(uint16_t), 64);
+ if (!baseline) err(1, "counts");
+ for (k = 0; k < 64; k++)
+ baseline[k] = UINT16_MAX;
+
+ kvm_svm_init(64 * 64 * 8 * 2, __start_guest_with, __stop_guest_with);
+ return 0;
+
+ for (i = 0; i < SAMPLE_COUNT; i++) {
+ counts = collect("without", __start_guest_without, __stop_guest_without);
+ memcpy(without_access[i], counts, 64 * sizeof(uint16_t));
+ free(counts);
+
+ counts = collect("with", __start_guest_with, __stop_guest_with);
+ memcpy(with_access[i], counts, 64 * sizeof(uint16_t));
+ free(counts);
+
+ for (k = 0; k < 64; k++) {
+ baseline[k] = MIN(baseline[k], without_access[i][k]);
+ baseline[k] = MIN(baseline[k], with_access[i][k]);
+ }
+ }
+
+ for (i = 0; i < SAMPLE_COUNT; i++) {
+ for (k = 0; k < 64; k++) {
+ with_access[i][k] -= baseline[k];
+ without_access[i][k] -= baseline[k];
+ }
+
+ printf("Evictions with access:\n");
+ print_counts(with_access[i]);
+
+ printf("Evictions without access:\n");
+ print_counts(without_access[i]);
+ }
+
+ for (i = 0; i < SAMPLE_COUNT; i++) {
+ assert(with_access[i][TARGET_SET] > 0);
+ //assert(without_access[i][TARGET_SET] == 0);
+ }
+
+ close(cachepc_fd);
+}
+