They are going to be deprecated, avoid warnings on stdout while the tests run. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
		
			
				
	
	
		
			525 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
			
		
		
	
	
			525 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			ReStructuredText
		
	
	
	
	
	
===============
 | 
						|
QEMU TPM Device
 | 
						|
===============
 | 
						|
 | 
						|
Guest-side hardware interface
 | 
						|
=============================
 | 
						|
 | 
						|
TIS interface
 | 
						|
-------------
 | 
						|
 | 
						|
The QEMU TPM emulation implements a TPM TIS hardware interface
 | 
						|
following the Trusted Computing Group's specification "TCG PC Client
 | 
						|
Specific TPM Interface Specification (TIS)", Specification Version
 | 
						|
1.3, 21 March 2013. (see the `TIS specification`_, or a later version
 | 
						|
of it).
 | 
						|
 | 
						|
The TIS interface makes a memory mapped IO region in the area
 | 
						|
0xfed40000-0xfed44fff available to the guest operating system.
 | 
						|
 | 
						|
QEMU files related to TPM TIS interface:
 | 
						|
 - ``hw/tpm/tpm_tis_common.c``
 | 
						|
 - ``hw/tpm/tpm_tis_isa.c``
 | 
						|
 - ``hw/tpm/tpm_tis_sysbus.c``
 | 
						|
 - ``hw/tpm/tpm_tis.h``
 | 
						|
 | 
						|
Both an ISA device and a sysbus device are available. The former is
 | 
						|
used with pc/q35 machine while the latter can be instantiated in the
 | 
						|
Arm virt machine.
 | 
						|
 | 
						|
CRB interface
 | 
						|
-------------
 | 
						|
 | 
						|
QEMU also implements a TPM CRB interface following the Trusted
 | 
						|
Computing Group's specification "TCG PC Client Platform TPM Profile
 | 
						|
(PTP) Specification", Family "2.0", Level 00 Revision 01.03 v22, May
 | 
						|
22, 2017. (see the `CRB specification`_, or a later version of it)
 | 
						|
 | 
						|
The CRB interface makes a memory mapped IO region in the area
 | 
						|
0xfed40000-0xfed40fff (1 locality) available to the guest
 | 
						|
operating system.
 | 
						|
 | 
						|
QEMU files related to TPM CRB interface:
 | 
						|
 - ``hw/tpm/tpm_crb.c``
 | 
						|
 | 
						|
SPAPR interface
 | 
						|
---------------
 | 
						|
 | 
						|
pSeries (ppc64) machines offer a tpm-spapr device model.
 | 
						|
 | 
						|
QEMU files related to the SPAPR interface:
 | 
						|
 - ``hw/tpm/tpm_spapr.c``
 | 
						|
 | 
						|
fw_cfg interface
 | 
						|
================
 | 
						|
 | 
						|
The bios/firmware may read the ``"etc/tpm/config"`` fw_cfg entry for
 | 
						|
configuring the guest appropriately.
 | 
						|
 | 
						|
The entry of 6 bytes has the following content, in little-endian:
 | 
						|
 | 
						|
.. code-block:: c
 | 
						|
 | 
						|
    #define TPM_VERSION_UNSPEC          0
 | 
						|
    #define TPM_VERSION_1_2             1
 | 
						|
    #define TPM_VERSION_2_0             2
 | 
						|
 | 
						|
    #define TPM_PPI_VERSION_NONE        0
 | 
						|
    #define TPM_PPI_VERSION_1_30        1
 | 
						|
 | 
						|
    struct FwCfgTPMConfig {
 | 
						|
        uint32_t tpmppi_address;         /* PPI memory location */
 | 
						|
        uint8_t tpm_version;             /* TPM version */
 | 
						|
        uint8_t tpmppi_version;          /* PPI version */
 | 
						|
    };
 | 
						|
 | 
						|
ACPI interface
 | 
						|
==============
 | 
						|
 | 
						|
The TPM device is defined with ACPI ID "PNP0C31". QEMU builds a SSDT
 | 
						|
and passes it into the guest through the fw_cfg device. The device
 | 
						|
description contains the base address of the TIS interface 0xfed40000
 | 
						|
and the size of the MMIO area (0x5000). In case a TPM2 is used by
 | 
						|
QEMU, a TPM2 ACPI table is also provided.  The device is described to
 | 
						|
be used in polling mode rather than interrupt mode primarily because
 | 
						|
no unused IRQ could be found.
 | 
						|
 | 
						|
To support measurement logs to be written by the firmware,
 | 
						|
e.g. SeaBIOS, a TCPA table is implemented. This table provides a 64kb
 | 
						|
buffer where the firmware can write its log into. For TPM 2 only a
 | 
						|
more recent version of the TPM2 table provides support for
 | 
						|
measurements logs and a TCPA table does not need to be created.
 | 
						|
 | 
						|
The TCPA and TPM2 ACPI tables follow the Trusted Computing Group
 | 
						|
specification "TCG ACPI Specification" Family "1.2" and "2.0", Level
 | 
						|
00 Revision 00.37. (see the `ACPI specification`_, or a later version
 | 
						|
of it)
 | 
						|
 | 
						|
ACPI PPI Interface
 | 
						|
------------------
 | 
						|
 | 
						|
QEMU supports the Physical Presence Interface (PPI) for TPM 1.2 and
 | 
						|
TPM 2. This interface requires ACPI and firmware support. (see the
 | 
						|
`PPI specification`_)
 | 
						|
 | 
						|
PPI enables a system administrator (root) to request a modification to
 | 
						|
the TPM upon reboot. The PPI specification defines the operation
 | 
						|
requests and the actions the firmware has to take. The system
 | 
						|
administrator passes the operation request number to the firmware
 | 
						|
through an ACPI interface which writes this number to a memory
 | 
						|
location that the firmware knows. Upon reboot, the firmware finds the
 | 
						|
number and sends commands to the TPM. The firmware writes the TPM
 | 
						|
result code and the operation request number to a memory location that
 | 
						|
ACPI can read from and pass the result on to the administrator.
 | 
						|
 | 
						|
The PPI specification defines a set of mandatory and optional
 | 
						|
operations for the firmware to implement. The ACPI interface also
 | 
						|
allows an administrator to list the supported operations. In QEMU the
 | 
						|
ACPI code is generated by QEMU, yet the firmware needs to implement
 | 
						|
support on a per-operations basis, and different firmwares may support
 | 
						|
a different subset. Therefore, QEMU introduces the virtual memory
 | 
						|
device for PPI where the firmware can indicate which operations it
 | 
						|
supports and ACPI can enable the ones that are supported and disable
 | 
						|
all others. This interface lies in main memory and has the following
 | 
						|
layout:
 | 
						|
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 |  Field      | Length | Offset | Description                               |
 | 
						|
 +=============+========+========+===========================================+
 | 
						|
 | ``func``    |  0x100 |  0x000 | Firmware sets values for each supported   |
 | 
						|
 |             |        |        | operation. See defined values below.      |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``ppin``    |   0x1  |  0x100 | SMI interrupt to use. Set by firmware.    |
 | 
						|
 |             |        |        | Not supported.                            |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``ppip``    |   0x4  |  0x101 | ACPI function index to pass to SMM code.  |
 | 
						|
 |             |        |        | Set by ACPI. Not supported.               |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``pprp``    |   0x4  |  0x105 | Result of last executed operation. Set by |
 | 
						|
 |             |        |        | firmware. See function index 5 for values.|
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``pprq``    |   0x4  |  0x109 | Operation request number to execute. See  |
 | 
						|
 |             |        |        | 'Physical Presence Interface Operation    |
 | 
						|
 |             |        |        | Summary' tables in specs. Set by ACPI.    |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``pprm``    |   0x4  |  0x10d | Operation request optional parameter.     |
 | 
						|
 |             |        |        | Values depend on operation. Set by ACPI.  |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``lppr``    |   0x4  |  0x111 | Last executed operation request number.   |
 | 
						|
 |             |        |        | Copied from pprq field by firmware.       |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``fret``    |   0x4  |  0x115 | Result code from SMM function.            |
 | 
						|
 |             |        |        | Not supported.                            |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``res1``    |  0x40  |  0x119 | Reserved for future use                   |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 |``next_step``|   0x1  |  0x159 | Operation to execute after reboot by      |
 | 
						|
 |             |        |        | firmware. Used by firmware.               |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | ``movv``    |   0x1  |  0x15a | Memory overwrite variable                 |
 | 
						|
 +-------------+--------+--------+-------------------------------------------+
 | 
						|
 | 
						|
The following values are supported for the ``func`` field. They
 | 
						|
correspond to the values used by ACPI function index 8.
 | 
						|
 | 
						|
 +----------+-------------------------------------------------------------+
 | 
						|
 | Value    | Description                                                 |
 | 
						|
 +==========+=============================================================+
 | 
						|
 | 0        | Operation is not implemented.                               |
 | 
						|
 +----------+-------------------------------------------------------------+
 | 
						|
 | 1        | Operation is only accessible through firmware.              |
 | 
						|
 +----------+-------------------------------------------------------------+
 | 
						|
 | 2        | Operation is blocked for OS by firmware configuration.      |
 | 
						|
 +----------+-------------------------------------------------------------+
 | 
						|
 | 3        | Operation is allowed and physically present user required.  |
 | 
						|
 +----------+-------------------------------------------------------------+
 | 
						|
 | 4        | Operation is allowed and physically present user is not     |
 | 
						|
 |          | required.                                                   |
 | 
						|
 +----------+-------------------------------------------------------------+
 | 
						|
 | 
						|
The location of the table is given by the fw_cfg ``tpmppi_address``
 | 
						|
field.  The PPI memory region size is 0x400 (``TPM_PPI_ADDR_SIZE``) to
 | 
						|
leave enough room for future updates.
 | 
						|
 | 
						|
QEMU files related to TPM ACPI tables:
 | 
						|
 - ``hw/i386/acpi-build.c``
 | 
						|
 - ``include/hw/acpi/tpm.h``
 | 
						|
 | 
						|
TPM backend devices
 | 
						|
===================
 | 
						|
 | 
						|
The TPM implementation is split into two parts, frontend and
 | 
						|
backend. The frontend part is the hardware interface, such as the TPM
 | 
						|
TIS interface described earlier, and the other part is the TPM backend
 | 
						|
interface. The backend interfaces implement the interaction with a TPM
 | 
						|
device, which may be a physical or an emulated device. The split
 | 
						|
between the front- and backend devices allows a frontend to be
 | 
						|
connected with any available backend. This enables the TIS interface
 | 
						|
to be used with the passthrough backend or the swtpm backend.
 | 
						|
 | 
						|
QEMU files related to TPM backends:
 | 
						|
 - ``backends/tpm.c``
 | 
						|
 - ``include/sysemu/tpm.h``
 | 
						|
 - ``include/sysemu/tpm_backend.h``
 | 
						|
 | 
						|
The QEMU TPM passthrough device
 | 
						|
-------------------------------
 | 
						|
 | 
						|
In case QEMU is run on Linux as the host operating system it is
 | 
						|
possible to make the hardware TPM device available to a single QEMU
 | 
						|
guest. In this case the user must make sure that no other program is
 | 
						|
using the device, e.g., /dev/tpm0, before trying to start QEMU with
 | 
						|
it.
 | 
						|
 | 
						|
The passthrough driver uses the host's TPM device for sending TPM
 | 
						|
commands and receiving responses from. Besides that it accesses the
 | 
						|
TPM device's sysfs entry for support of command cancellation. Since
 | 
						|
none of the state of a hardware TPM can be migrated between hosts,
 | 
						|
virtual machine migration is disabled when the TPM passthrough driver
 | 
						|
is used.
 | 
						|
 | 
						|
Since the host's TPM device will already be initialized by the host's
 | 
						|
firmware, certain commands, e.g. ``TPM_Startup()``, sent by the
 | 
						|
virtual firmware for device initialization, will fail. In this case
 | 
						|
the firmware should not use the TPM.
 | 
						|
 | 
						|
Sharing the device with the host is generally not a recommended usage
 | 
						|
scenario for a TPM device. The primary reason for this is that two
 | 
						|
operating systems can then access the device's single set of
 | 
						|
resources, such as platform configuration registers
 | 
						|
(PCRs). Applications or kernel security subsystems, such as the Linux
 | 
						|
Integrity Measurement Architecture (IMA), are not expecting to share
 | 
						|
PCRs.
 | 
						|
 | 
						|
QEMU files related to the TPM passthrough device:
 | 
						|
 - ``backends/tpm/tpm_passthrough.c``
 | 
						|
 - ``backends/tpm/tpm_util.c``
 | 
						|
 - ``include/sysemu/tpm_util.h``
 | 
						|
 | 
						|
 | 
						|
Command line to start QEMU with the TPM passthrough device using the host's
 | 
						|
hardware TPM ``/dev/tpm0``:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  qemu-system-x86_64 -display sdl -accel kvm \
 | 
						|
  -m 1024 -boot d -bios bios-256k.bin -boot menu=on \
 | 
						|
  -tpmdev passthrough,id=tpm0,path=/dev/tpm0 \
 | 
						|
  -device tpm-tis,tpmdev=tpm0 test.img
 | 
						|
 | 
						|
 | 
						|
The following commands should result in similar output inside the VM
 | 
						|
with a Linux kernel that either has the TPM TIS driver built-in or
 | 
						|
available as a module:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  # dmesg | grep -i tpm
 | 
						|
  [    0.711310] tpm_tis 00:06: 1.2 TPM (device=id 0x1, rev-id 1)
 | 
						|
 | 
						|
  # dmesg | grep TCPA
 | 
						|
  [    0.000000] ACPI: TCPA 0x0000000003FFD191C 000032 (v02 BOCHS  \
 | 
						|
      BXPCTCPA 0000001 BXPC 00000001)
 | 
						|
 | 
						|
  # ls -l /dev/tpm*
 | 
						|
  crw-------. 1 root root 10, 224 Jul 11 10:11 /dev/tpm0
 | 
						|
 | 
						|
  # find /sys/devices/ | grep pcrs$ | xargs cat
 | 
						|
  PCR-00: 35 4E 3B CE 23 9F 38 59 ...
 | 
						|
  ...
 | 
						|
  PCR-23: 00 00 00 00 00 00 00 00 ...
 | 
						|
 | 
						|
The QEMU TPM emulator device
 | 
						|
----------------------------
 | 
						|
 | 
						|
The TPM emulator device uses an external TPM emulator called 'swtpm'
 | 
						|
for sending TPM commands to and receiving responses from. The swtpm
 | 
						|
program must have been started before trying to access it through the
 | 
						|
TPM emulator with QEMU.
 | 
						|
 | 
						|
The TPM emulator implements a command channel for transferring TPM
 | 
						|
commands and responses as well as a control channel over which control
 | 
						|
commands can be sent. (see the `SWTPM protocol`_ specification)
 | 
						|
 | 
						|
The control channel serves the purpose of resetting, initializing, and
 | 
						|
migrating the TPM state, among other things.
 | 
						|
 | 
						|
The swtpm program behaves like a hardware TPM and therefore needs to
 | 
						|
be initialized by the firmware running inside the QEMU virtual
 | 
						|
machine.  One necessary step for initializing the device is to send
 | 
						|
the TPM_Startup command to it. SeaBIOS, for example, has been
 | 
						|
instrumented to initialize a TPM 1.2 or TPM 2 device using this
 | 
						|
command.
 | 
						|
 | 
						|
QEMU files related to the TPM emulator device:
 | 
						|
 - ``backends/tpm/tpm_emulator.c``
 | 
						|
 - ``backends/tpm/tpm_util.c``
 | 
						|
 - ``include/sysemu/tpm_util.h``
 | 
						|
 | 
						|
The following commands start the swtpm with a UnixIO control channel over
 | 
						|
a socket interface. They do not need to be run as root.
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  mkdir /tmp/mytpm1
 | 
						|
  swtpm socket --tpmstate dir=/tmp/mytpm1 \
 | 
						|
    --ctrl type=unixio,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    --log level=20
 | 
						|
 | 
						|
Command line to start QEMU with the TPM emulator device communicating
 | 
						|
with the swtpm (x86):
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  qemu-system-x86_64 -display sdl -accel kvm \
 | 
						|
    -m 1024 -boot d -bios bios-256k.bin -boot menu=on \
 | 
						|
    -chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    -tpmdev emulator,id=tpm0,chardev=chrtpm \
 | 
						|
    -device tpm-tis,tpmdev=tpm0 test.img
 | 
						|
 | 
						|
In case a pSeries machine is emulated, use the following command line:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  qemu-system-ppc64 -display sdl -machine pseries,accel=kvm \
 | 
						|
    -m 1024 -bios slof.bin -boot menu=on \
 | 
						|
    -nodefaults -device VGA -device pci-ohci -device usb-kbd \
 | 
						|
    -chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    -tpmdev emulator,id=tpm0,chardev=chrtpm \
 | 
						|
    -device tpm-spapr,tpmdev=tpm0 \
 | 
						|
    -device spapr-vscsi,id=scsi0,reg=0x00002000 \
 | 
						|
    -device virtio-blk-pci,scsi=off,bus=pci.0,addr=0x3,drive=drive-virtio-disk0,id=virtio-disk0 \
 | 
						|
    -drive file=test.img,format=raw,if=none,id=drive-virtio-disk0
 | 
						|
 | 
						|
In case an Arm virt machine is emulated, use the following command line:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  qemu-system-aarch64 -machine virt,gic-version=3,accel=kvm \
 | 
						|
    -cpu host -m 4G \
 | 
						|
    -nographic -no-acpi \
 | 
						|
    -chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    -tpmdev emulator,id=tpm0,chardev=chrtpm \
 | 
						|
    -device tpm-tis-device,tpmdev=tpm0 \
 | 
						|
    -device virtio-blk-pci,drive=drv0 \
 | 
						|
    -drive format=qcow2,file=hda.qcow2,if=none,id=drv0 \
 | 
						|
    -drive if=pflash,format=raw,file=flash0.img,readonly=on \
 | 
						|
    -drive if=pflash,format=raw,file=flash1.img
 | 
						|
 | 
						|
In case SeaBIOS is used as firmware, it should show the TPM menu item
 | 
						|
after entering the menu with 'ESC'.
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  Select boot device:
 | 
						|
  1. DVD/CD [ata1-0: QEMU DVD-ROM ATAPI-4 DVD/CD]
 | 
						|
  [...]
 | 
						|
  5. Legacy option rom
 | 
						|
 | 
						|
  t. TPM Configuration
 | 
						|
 | 
						|
The following commands should result in similar output inside the VM
 | 
						|
with a Linux kernel that either has the TPM TIS driver built-in or
 | 
						|
available as a module:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  # dmesg | grep -i tpm
 | 
						|
  [    0.711310] tpm_tis 00:06: 1.2 TPM (device=id 0x1, rev-id 1)
 | 
						|
 | 
						|
  # dmesg | grep TCPA
 | 
						|
  [    0.000000] ACPI: TCPA 0x0000000003FFD191C 000032 (v02 BOCHS  \
 | 
						|
      BXPCTCPA 0000001 BXPC 00000001)
 | 
						|
 | 
						|
  # ls -l /dev/tpm*
 | 
						|
  crw-------. 1 root root 10, 224 Jul 11 10:11 /dev/tpm0
 | 
						|
 | 
						|
  # find /sys/devices/ | grep pcrs$ | xargs cat
 | 
						|
  PCR-00: 35 4E 3B CE 23 9F 38 59 ...
 | 
						|
  ...
 | 
						|
  PCR-23: 00 00 00 00 00 00 00 00 ...
 | 
						|
 | 
						|
Migration with the TPM emulator
 | 
						|
===============================
 | 
						|
 | 
						|
The TPM emulator supports the following types of virtual machine
 | 
						|
migration:
 | 
						|
 | 
						|
- VM save / restore (migration into a file)
 | 
						|
- Network migration
 | 
						|
- Snapshotting (migration into storage like QoW2 or QED)
 | 
						|
 | 
						|
The following command sequences can be used to test VM save / restore.
 | 
						|
 | 
						|
In a 1st terminal start an instance of a swtpm using the following command:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  mkdir /tmp/mytpm1
 | 
						|
  swtpm socket --tpmstate dir=/tmp/mytpm1 \
 | 
						|
    --ctrl type=unixio,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    --log level=20 --tpm2
 | 
						|
 | 
						|
In a 2nd terminal start the VM:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  qemu-system-x86_64 -display sdl -accel kvm \
 | 
						|
    -m 1024 -boot d -bios bios-256k.bin -boot menu=on \
 | 
						|
    -chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    -tpmdev emulator,id=tpm0,chardev=chrtpm \
 | 
						|
    -device tpm-tis,tpmdev=tpm0 \
 | 
						|
    -monitor stdio \
 | 
						|
    test.img
 | 
						|
 | 
						|
Verify that the attached TPM is working as expected using applications
 | 
						|
inside the VM.
 | 
						|
 | 
						|
To store the state of the VM use the following command in the QEMU
 | 
						|
monitor in the 2nd terminal:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  (qemu) migrate "exec:cat > testvm.bin"
 | 
						|
  (qemu) quit
 | 
						|
 | 
						|
At this point a file called ``testvm.bin`` should exists and the swtpm
 | 
						|
and QEMU processes should have ended.
 | 
						|
 | 
						|
To test 'VM restore' you have to start the swtpm with the same
 | 
						|
parameters as before. If previously a TPM 2 [--tpm2] was saved, --tpm2
 | 
						|
must now be passed again on the command line.
 | 
						|
 | 
						|
In the 1st terminal restart the swtpm with the same command line as
 | 
						|
before:
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  swtpm socket --tpmstate dir=/tmp/mytpm1 \
 | 
						|
    --ctrl type=unixio,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    --log level=20 --tpm2
 | 
						|
 | 
						|
In the 2nd terminal restore the state of the VM using the additional
 | 
						|
'-incoming' option.
 | 
						|
 | 
						|
.. code-block:: console
 | 
						|
 | 
						|
  qemu-system-x86_64 -display sdl -accel kvm \
 | 
						|
    -m 1024 -boot d -bios bios-256k.bin -boot menu=on \
 | 
						|
    -chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
 | 
						|
    -tpmdev emulator,id=tpm0,chardev=chrtpm \
 | 
						|
    -device tpm-tis,tpmdev=tpm0 \
 | 
						|
    -incoming "exec:cat < testvm.bin" \
 | 
						|
    test.img
 | 
						|
 | 
						|
Troubleshooting migration
 | 
						|
-------------------------
 | 
						|
 | 
						|
There are several reasons why migration may fail. In case of problems,
 | 
						|
please ensure that the command lines adhere to the following rules
 | 
						|
and, if possible, that identical versions of QEMU and swtpm are used
 | 
						|
at all times.
 | 
						|
 | 
						|
VM save and restore:
 | 
						|
 | 
						|
 - QEMU command line parameters should be identical apart from the
 | 
						|
   '-incoming' option on VM restore
 | 
						|
 | 
						|
 - swtpm command line parameters should be identical
 | 
						|
 | 
						|
VM migration to 'localhost':
 | 
						|
 | 
						|
 - QEMU command line parameters should be identical apart from the
 | 
						|
   '-incoming' option on the destination side
 | 
						|
 | 
						|
 - swtpm command line parameters should point to two different
 | 
						|
   directories on the source and destination swtpm (--tpmstate dir=...)
 | 
						|
   (especially if different versions of libtpms were to be used on the
 | 
						|
   same machine).
 | 
						|
 | 
						|
VM migration across the network:
 | 
						|
 | 
						|
 - QEMU command line parameters should be identical apart from the
 | 
						|
   '-incoming' option on the destination side
 | 
						|
 | 
						|
 - swtpm command line parameters should be identical
 | 
						|
 | 
						|
VM Snapshotting:
 | 
						|
 - QEMU command line parameters should be identical
 | 
						|
 | 
						|
 - swtpm command line parameters should be identical
 | 
						|
 | 
						|
 | 
						|
Besides that, migration failure reasons on the swtpm level may include
 | 
						|
the following:
 | 
						|
 | 
						|
 - the versions of the swtpm on the source and destination sides are
 | 
						|
   incompatible
 | 
						|
 | 
						|
   - downgrading of TPM state may not be supported
 | 
						|
 | 
						|
   - the source and destination libtpms were compiled with different
 | 
						|
     compile-time options and the destination side refuses to accept the
 | 
						|
     state
 | 
						|
 | 
						|
 - different migration keys are used on the source and destination side
 | 
						|
   and the destination side cannot decrypt the migrated state
 | 
						|
   (swtpm ... --migration-key ... )
 | 
						|
 | 
						|
 | 
						|
.. _TIS specification:
 | 
						|
   https://trustedcomputinggroup.org/pc-client-work-group-pc-client-specific-tpm-interface-specification-tis/
 | 
						|
 | 
						|
.. _CRB specification:
 | 
						|
   https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/
 | 
						|
 | 
						|
 | 
						|
.. _ACPI specification:
 | 
						|
   https://trustedcomputinggroup.org/tcg-acpi-specification/
 | 
						|
 | 
						|
.. _PPI specification:
 | 
						|
   https://trustedcomputinggroup.org/resource/tcg-physical-presence-interface-specification/
 | 
						|
 | 
						|
.. _SWTPM protocol:
 | 
						|
   https://github.com/stefanberger/swtpm/blob/master/man/man3/swtpm_ioctls.pod
 |