qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Alexander Graf <agraf@csgraf.de>
To: "Daniel P. Berrangé" <berrange@redhat.com>
Cc: "Phil Dennis-Jordan" <phil@philjordan.eu>,
	"Pedro Tôrres" <t0rr3sp3dr0@gmail.com>,
	"Vladislav Yaroshchuk" <yaroshchuk2000@gmail.com>,
	suse@csgraf.de, f4bug@amsat.org, qemu-devel@nongnu.org,
	r.bolshakov@yadro.com, "Gabriel L. Somlo" <gsomlo@gmail.com>,
	"Paolo Bonzini" <pbonzini@redhat.com>,
	laurent@vivier.eu
Subject: Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts
Date: Tue, 26 Oct 2021 12:41:14 +0200	[thread overview]
Message-ID: <b92cbb28-4cfc-159b-319f-0e6431c33a35@csgraf.de> (raw)
In-Reply-To: <YXe/SpwH8Kk96M/g@redhat.com>


On 26.10.21 10:42, Daniel P. Berrangé wrote:
> On Mon, Oct 25, 2021 at 09:45:35PM +0200, Alexander Graf wrote:
>> On 25.10.21 17:10, Daniel P. Berrangé wrote:
>>> On Mon, Oct 25, 2021 at 04:53:57PM +0200, Alexander Graf wrote:
>>>> On 25.10.21 16:47, Daniel P. Berrangé wrote:
>>>>> On Mon, Oct 25, 2021 at 04:42:22PM +0200, Alexander Graf wrote:
>>>>>> On 25.10.21 16:22, Daniel P. Berrangé wrote:
>>>>>>> On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:
>>>>>>>> On 22.10.21 18:14, Vladislav Yaroshchuk wrote:
>>>>>>>>> On Apple hosts we can read AppleSMC OSK key directly from host's
>>>>>>>>> SMC and forward this value to QEMU Guest.
>>>>>>>>>
>>>>>>>>> Usage:
>>>>>>>>> `-device isa-applesmc,hostosk=on`
>>>>>>>>>
>>>>>>>>> Apple licence allows use and run up to two additional copies
>>>>>>>>> or instances of macOS operating within virtual operating system
>>>>>>>>> environments on each Apple-branded computer that is already running
>>>>>>>>> the Apple Software, for purposes of:
>>>>>>>>> - software development
>>>>>>>>> - testing during software development
>>>>>>>>> - using macOS Server
>>>>>>>>> - personal, non-commercial use
>>>>>>>>>
>>>>>>>>> Guest macOS requires AppleSMC with correct OSK. The most legal
>>>>>>>>> way to pass it to the Guest is to forward the key from host SMC
>>>>>>>>> without any value exposion.
>>>>>>>>>
>>>>>>>>> Based on https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
>>>>>>>>>
>>>>>>>>> Signed-off-by: Vladislav Yaroshchuk <yaroshchuk2000@gmail.com>
>>>>>>>>> @@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState *dev, Error **errp)
>>>>>>>>>           isa_register_ioport(&s->parent_obj, &s->io_err,
>>>>>>>>>                               s->iobase + APPLESMC_ERR_PORT);
>>>>>>>>> +    if (s->hostosk_flag) {
>>>>>>>>> +        /*
>>>>>>>>> +         * Property 'hostosk' has higher priority than 'osk'
>>>>>>>>> +         * and shadows it.
>>>>>>>>> +         * Free user-provided 'osk' property value
>>>>>>>>> +         */
>>>>>>>>> +        if (s->osk) {
>>>>>>>>> +            warn_report("isa-applesmc.osk is shadowed "
>>>>>>>>> +                        "by isa-applesmc.hostosk");
>>>>>>>>> +            g_free(s->osk);
>>>>>>>>> +        }
>>>>>>>>> +
>>>>>>>>> +        if (!applesmc_read_host_osk(&s->osk, &err)) {
>>>>>>>>> +            /* On host OSK retrieval error report a warning */
>>>>>>>>> +            error_report_err(err);
>>>>>>>>> +            s->osk = default_osk;
>>>>>>>>> +        }
>>>>>>>>> +    }
>>>>>>>> This part is yucky. A few things:
>>>>>>>>
>>>>>>>> 1) QEMU in general does not fail user requested operations silently. If the
>>>>>>>> user explicitly asked to read the host OSK and we couldn't, it must
>>>>>>>> propagate that error.
>>>>>>>> 2) In tandem to the above, I think the only consistent CX is to make both
>>>>>>>> options mutually exclusive. The easiest way to achieve that IMHO would be to
>>>>>>>> overload the "osk" property. If it is "host", then use the host one.
>>>>>>>> 3) Should we make "osk"="host" the default on macOS as well then? Of course,
>>>>>>>> that one should *not* fail hard when it can't read the key, because it's an
>>>>>>>> implicit request rather than an explicit one.
>>>>>>> The problem with using a magic string value for the existing "osk"
>>>>>>> parameter is that this is not introspectable by management apps.
>>>>>> What introspectability would you like to have?
>>>>> Essentially to answer the question
>>>>>
>>>>>      "Does this QEMU support OSK passthrough from the host"
>>>>>
>>>>> Mgmt apps like libvirt introspect using various query-XXX QMP commands.
>>>>> For devices, the typical approach is to ask for the list of properties
>>>>> the device supports. If we're just accepting a new magic value on an
>>>>> existing property there is no way to query for existance of that feature.
>>>>> If we add a "host-osk=bool" parameter introspectability is trivially
>>>>> satisfied.
>>>> Ok, the only flow that remains sensible in that case to me sounds like the
>>>> following:
>>> Just need an extra check upfront:
>>>
>>>    if (s->osk && s->use_hoist_osk)
>>>        error_setg(errp, ...)
>>>    else
>>>> if (s->osk) {
>>>>       /* Use osk */
>>> This should fail hard if the provided value is the wrong length - currently
>>> it falls back with a warning IIUC.
>>>
>>>> } else if (s->use_host_osk) {
>>>>       /* Use host OSK. Fail hard if we can't find it */
>>>> } else if (can_use_host_osk) {
>>>>       /* See if we can extract the key from the host. If not, fall back to old
>>>> behavior */
>>>> } else {
>>>>       /* Old fallback behavior */
>>> Was this old fallback behaviour actually useful ? IIUC it means it is using
>>>
>>>
>>>     static char default_osk[64] = "This is a dummy key. Enter the real key "
>>>                                   "using the -osk parameter";
>>>
>>> which obviously isn't a valid key that will work with any gust OS that
>>> cares. I guess it at least let QEMU startup, but any the guest OS that
>>> checks the key will be unhappy.
>>>
>>> If if don't think default_osk is actually useful, then we could simplify
>>> further to
>>>
>>>    if (s->osk && s->use_host_osk) {
>>>        error_setg(errp, ...)
>>>    } else if (s->osk) {
>>>       /* Use osk. Fail hard if invalid (ie wrong length) */
>>>    } else if (s->use_host_osk) {
>>>       /* Use host OSK. Fail hard if we can't find it */
>>>    } else {
>>>       /* try to use host OSK, fail hard if we can't find it or non-OS-X build */
>>>    }
>>
>> In the example above, use_host_osk=on and use_host_osk=off yield the exact
>> same behavior, so we don't need the switch, no?
> Hmm, I forgot about machine type back compat. From a strict pov, if we
> change the default it should only be for the 6.2.0 machine type, with
> old machines keeping the current 'default_osk' behaviour.
>
> IOW, for 6.2.0 machine use_host_osk=on as default, and for < 6.2.0,
> use_host_osk=off as default .


Yes, and then the fallback case (no osk, no use_host_osk) would keep 
installing the dummy key.

However, it means that if you create an applesmc VM today with just -M 
pc and then update it to a newer QEMU version, your existing command 
line would no longer work because you then have s->osk && 
s->use_host_osk set.

How about we make the ordering absolutely clear? If you define s->osk, 
that's the one we use. Fallback is either host (default on new instance 
types) or dummy (default for old instance types).

That way we only break existing VM definitions without modeled machine 
version that use -device applesmc without passing in an OSK. That's a 
user base I'm ok breaking.

   if (s->osk) {
      /* Use osk. Fail hard if invalid (ie wrong length) */
   } else if (s->fallback_to_host_osk) {
      /* Use host OSK. Fail hard if we can't find it */
   } else {
      /* Old dummy key behavior */
   }


In addition, new -M pc and -M q35 definitions set 
applesmc.fallback-to-host-osk=on by default.


Alex




      reply	other threads:[~2021-10-26 10:57 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-10-22 16:14 [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts Vladislav Yaroshchuk
2021-10-25 10:13 ` Alexander Graf
2021-10-25 14:14   ` Vladislav Yaroshchuk
2021-10-25 14:22   ` Daniel P. Berrangé
2021-10-25 14:42     ` Alexander Graf
2021-10-25 14:47       ` Daniel P. Berrangé
2021-10-25 14:53         ` Alexander Graf
2021-10-25 15:10           ` Daniel P. Berrangé
2021-10-25 19:45             ` Alexander Graf
2021-10-26  8:42               ` Daniel P. Berrangé
2021-10-26 10:41                 ` Alexander Graf [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=b92cbb28-4cfc-159b-319f-0e6431c33a35@csgraf.de \
    --to=agraf@csgraf.de \
    --cc=berrange@redhat.com \
    --cc=f4bug@amsat.org \
    --cc=gsomlo@gmail.com \
    --cc=laurent@vivier.eu \
    --cc=pbonzini@redhat.com \
    --cc=phil@philjordan.eu \
    --cc=qemu-devel@nongnu.org \
    --cc=r.bolshakov@yadro.com \
    --cc=suse@csgraf.de \
    --cc=t0rr3sp3dr0@gmail.com \
    --cc=yaroshchuk2000@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).