 00a238b1a8
			
		
	
	
		00a238b1a8
		
	
	
	
	
		
			
			Use the unified interface to call confidential guest related kvm_init() and kvm_reset(), to avoid exposing pef specific functions. As a bonus, pef.h goes away since there is no direct call from sPAPR board code to PEF code anymore. Signed-off-by: Xiaoyao Li <xiaoyao.li@intel.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
		
			
				
	
	
		
			146 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			146 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * PEF (Protected Execution Facility) for POWER support
 | |
|  *
 | |
|  * Copyright Red Hat.
 | |
|  *
 | |
|  * This work is licensed under the terms of the GNU GPL, version 2 or later.
 | |
|  * See the COPYING file in the top-level directory.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #include "qemu/osdep.h"
 | |
| 
 | |
| #include "qapi/error.h"
 | |
| #include "qom/object_interfaces.h"
 | |
| #include "sysemu/kvm.h"
 | |
| #include "migration/blocker.h"
 | |
| #include "exec/confidential-guest-support.h"
 | |
| 
 | |
| #define TYPE_PEF_GUEST "pef-guest"
 | |
| OBJECT_DECLARE_SIMPLE_TYPE(PefGuest, PEF_GUEST)
 | |
| 
 | |
| typedef struct PefGuest PefGuest;
 | |
| typedef struct PefGuestClass PefGuestClass;
 | |
| 
 | |
| struct PefGuestClass {
 | |
|     ConfidentialGuestSupportClass parent_class;
 | |
| };
 | |
| 
 | |
| /**
 | |
|  * PefGuest:
 | |
|  *
 | |
|  * The PefGuest object is used for creating and managing a PEF
 | |
|  * guest.
 | |
|  *
 | |
|  * # $QEMU \
 | |
|  *         -object pef-guest,id=pef0 \
 | |
|  *         -machine ...,confidential-guest-support=pef0
 | |
|  */
 | |
| struct PefGuest {
 | |
|     ConfidentialGuestSupport parent_obj;
 | |
| };
 | |
| 
 | |
| static int kvmppc_svm_init(ConfidentialGuestSupport *cgs, Error **errp)
 | |
| {
 | |
| #ifdef CONFIG_KVM
 | |
|     static Error *pef_mig_blocker;
 | |
| 
 | |
|     if (!kvm_check_extension(kvm_state, KVM_CAP_PPC_SECURE_GUEST)) {
 | |
|         error_setg(errp,
 | |
|                    "KVM implementation does not support Secure VMs (is an ultravisor running?)");
 | |
|         return -1;
 | |
|     } else {
 | |
|         int ret = kvm_vm_enable_cap(kvm_state, KVM_CAP_PPC_SECURE_GUEST, 0, 1);
 | |
| 
 | |
|         if (ret < 0) {
 | |
|             error_setg(errp,
 | |
|                        "Error enabling PEF with KVM");
 | |
|             return -1;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /* add migration blocker */
 | |
|     error_setg(&pef_mig_blocker, "PEF: Migration is not implemented");
 | |
|     /* NB: This can fail if --only-migratable is used */
 | |
|     migrate_add_blocker(&pef_mig_blocker, &error_fatal);
 | |
| 
 | |
|     cgs->ready = true;
 | |
| 
 | |
|     return 0;
 | |
| #else
 | |
|     g_assert_not_reached();
 | |
| #endif
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * Don't set error if KVM_PPC_SVM_OFF ioctl is invoked on kernels
 | |
|  * that don't support this ioctl.
 | |
|  */
 | |
| static int kvmppc_svm_off(Error **errp)
 | |
| {
 | |
| #ifdef CONFIG_KVM
 | |
|     int rc;
 | |
| 
 | |
|     rc = kvm_vm_ioctl(KVM_STATE(current_accel()), KVM_PPC_SVM_OFF);
 | |
|     if (rc && rc != -ENOTTY) {
 | |
|         error_setg_errno(errp, -rc, "KVM_PPC_SVM_OFF ioctl failed");
 | |
|         return rc;
 | |
|     }
 | |
|     return 0;
 | |
| #else
 | |
|     g_assert_not_reached();
 | |
| #endif
 | |
| }
 | |
| 
 | |
| static int pef_kvm_init(ConfidentialGuestSupport *cgs, Error **errp)
 | |
| {
 | |
|     if (!object_dynamic_cast(OBJECT(cgs), TYPE_PEF_GUEST)) {
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     if (!kvm_enabled()) {
 | |
|         error_setg(errp, "PEF requires KVM");
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     return kvmppc_svm_init(cgs, errp);
 | |
| }
 | |
| 
 | |
| static int pef_kvm_reset(ConfidentialGuestSupport *cgs, Error **errp)
 | |
| {
 | |
|     if (!object_dynamic_cast(OBJECT(cgs), TYPE_PEF_GUEST)) {
 | |
|         return 0;
 | |
|     }
 | |
| 
 | |
|     /*
 | |
|      * If we don't have KVM we should never have been able to
 | |
|      * initialize PEF, so we should never get this far
 | |
|      */
 | |
|     assert(kvm_enabled());
 | |
| 
 | |
|     return kvmppc_svm_off(errp);
 | |
| }
 | |
| 
 | |
| OBJECT_DEFINE_TYPE_WITH_INTERFACES(PefGuest,
 | |
|                                    pef_guest,
 | |
|                                    PEF_GUEST,
 | |
|                                    CONFIDENTIAL_GUEST_SUPPORT,
 | |
|                                    { TYPE_USER_CREATABLE },
 | |
|                                    { NULL })
 | |
| 
 | |
| static void pef_guest_class_init(ObjectClass *oc, void *data)
 | |
| {
 | |
|     ConfidentialGuestSupportClass *klass = CONFIDENTIAL_GUEST_SUPPORT_CLASS(oc);
 | |
| 
 | |
|     klass->kvm_init = pef_kvm_init;
 | |
|     klass->kvm_reset = pef_kvm_reset;
 | |
| }
 | |
| 
 | |
| static void pef_guest_init(Object *obj)
 | |
| {
 | |
| }
 | |
| 
 | |
| static void pef_guest_finalize(Object *obj)
 | |
| {
 | |
| }
 |