Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-26 Thread Alexander Graf



On 26.10.21 10:42, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 09:45:35PM +0200, Alexander Graf wrote:

On 25.10.21 17:10, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 04:53:57PM +0200, Alexander Graf wrote:

On 25.10.21 16:47, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 04:42:22PM +0200, Alexander Graf wrote:

On 25.10.21 16:22, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:

On 22.10.21 18:14, Vladislav Yaroshchuk wrote:

On Apple hosts we can read AppleSMC OSK key directly from host's
SMC and forward this value to QEMU Guest.

Usage:
`-device isa-applesmc,hostosk=on`

Apple licence allows use and run up to two additional copies
or instances of macOS operating within virtual operating system
environments on each Apple-branded computer that is already running
the Apple Software, for purposes of:
- software development
- testing during software development
- using macOS Server
- personal, non-commercial use

Guest macOS requires AppleSMC with correct OSK. The most legal
way to pass it to the Guest is to forward the key from host SMC
without any value exposion.

Based on 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/

Signed-off-by: Vladislav Yaroshchuk 
@@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState *dev, Error 
**errp)
  isa_register_ioport(>parent_obj, >io_err,
  s->iobase + APPLESMC_ERR_PORT);
+if (s->hostosk_flag) {
+/*
+ * Property 'hostosk' has higher priority than 'osk'
+ * and shadows it.
+ * Free user-provided 'osk' property value
+ */
+if (s->osk) {
+warn_report("isa-applesmc.osk is shadowed "
+"by isa-applesmc.hostosk");
+g_free(s->osk);
+}
+
+if (!applesmc_read_host_osk(>osk, )) {
+/* On host OSK retrieval error report a warning */
+error_report_err(err);
+s->osk = default_osk;
+}
+}

This part is yucky. A few things:

1) QEMU in general does not fail user requested operations silently. If the
user explicitly asked to read the host OSK and we couldn't, it must
propagate that error.
2) In tandem to the above, I think the only consistent CX is to make both
options mutually exclusive. The easiest way to achieve that IMHO would be to
overload the "osk" property. If it is "host", then use the host one.
3) Should we make "osk"="host" the default on macOS as well then? Of course,
that one should *not* fail hard when it can't read the key, because it's an
implicit request rather than an explicit one.

The problem with using a magic string value for the existing "osk"
parameter is that this is not introspectable by management apps.

What introspectability would you like to have?

Essentially to answer the question

 "Does this QEMU support OSK passthrough from the host"

Mgmt apps like libvirt introspect using various query-XXX QMP commands.
For devices, the typical approach is to ask for the list of properties
the device supports. If we're just accepting a new magic value on an
existing property there is no way to query for existance of that feature.
If we add a "host-osk=bool" parameter introspectability is trivially
satisfied.

Ok, the only flow that remains sensible in that case to me sounds like the
following:

Just need an extra check upfront:

   if (s->osk && s->use_hoist_osk)
   error_setg(errp, ...)
   else

if (s->osk) {
      /* Use osk */

This should fail hard if the provided value is the wrong length - currently
it falls back with a warning IIUC.


} else if (s->use_host_osk) {
      /* Use host OSK. Fail hard if we can't find it */
} else if (can_use_host_osk) {
      /* See if we can extract the key from the host. If not, fall back to old
behavior */
} else {
      /* Old fallback behavior */

Was this old fallback behaviour actually useful ? IIUC it means it is using


static char default_osk[64] = "This is a dummy key. Enter the real key "
  "using the -osk parameter";

which obviously isn't a valid key that will work with any gust OS that
cares. I guess it at least let QEMU startup, but any the guest OS that
checks the key will be unhappy.

If if don't think default_osk is actually useful, then we could simplify
further to

   if (s->osk && s->use_host_osk) {
   error_setg(errp, ...)
   } else if (s->osk) {
  /* Use osk. Fail hard if invalid (ie wrong length) */
   } else if (s->use_host_osk) {
  /* Use host OSK. Fail hard if we can't find it */
   } else {
  /* try to use host OSK, fail hard if we can't find it or non-OS-X build */
   }


In the example above, use_host_osk=on and use_host_osk=off yield the exact
same behavior, so we don't need the switch, no?

Hmm, I forgot about machine type back compat. From a strict pov, if we
change the default it should only be for the 6.2.0 machine type, with
old 

Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-26 Thread Daniel P . Berrangé
On Mon, Oct 25, 2021 at 09:45:35PM +0200, Alexander Graf wrote:
> 
> On 25.10.21 17:10, Daniel P. Berrangé wrote:
> > On Mon, Oct 25, 2021 at 04:53:57PM +0200, Alexander Graf wrote:
> > > On 25.10.21 16:47, Daniel P. Berrangé wrote:
> > > > On Mon, Oct 25, 2021 at 04:42:22PM +0200, Alexander Graf wrote:
> > > > > On 25.10.21 16:22, Daniel P. Berrangé wrote:
> > > > > > On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:
> > > > > > > On 22.10.21 18:14, Vladislav Yaroshchuk wrote:
> > > > > > > > On Apple hosts we can read AppleSMC OSK key directly from host's
> > > > > > > > SMC and forward this value to QEMU Guest.
> > > > > > > > 
> > > > > > > > Usage:
> > > > > > > > `-device isa-applesmc,hostosk=on`
> > > > > > > > 
> > > > > > > > Apple licence allows use and run up to two additional copies
> > > > > > > > or instances of macOS operating within virtual operating system
> > > > > > > > environments on each Apple-branded computer that is already 
> > > > > > > > running
> > > > > > > > the Apple Software, for purposes of:
> > > > > > > > - software development
> > > > > > > > - testing during software development
> > > > > > > > - using macOS Server
> > > > > > > > - personal, non-commercial use
> > > > > > > > 
> > > > > > > > Guest macOS requires AppleSMC with correct OSK. The most legal
> > > > > > > > way to pass it to the Guest is to forward the key from host SMC
> > > > > > > > without any value exposion.
> > > > > > > > 
> > > > > > > > Based on 
> > > > > > > > https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
> > > > > > > > 
> > > > > > > > Signed-off-by: Vladislav Yaroshchuk 
> > > > > > > > @@ -331,6 +464,25 @@ static void 
> > > > > > > > applesmc_isa_realize(DeviceState *dev, Error **errp)
> > > > > > > >  isa_register_ioport(>parent_obj, >io_err,
> > > > > > > >  s->iobase + APPLESMC_ERR_PORT);
> > > > > > > > +if (s->hostosk_flag) {
> > > > > > > > +/*
> > > > > > > > + * Property 'hostosk' has higher priority than 'osk'
> > > > > > > > + * and shadows it.
> > > > > > > > + * Free user-provided 'osk' property value
> > > > > > > > + */
> > > > > > > > +if (s->osk) {
> > > > > > > > +warn_report("isa-applesmc.osk is shadowed "
> > > > > > > > +"by isa-applesmc.hostosk");
> > > > > > > > +g_free(s->osk);
> > > > > > > > +}
> > > > > > > > +
> > > > > > > > +if (!applesmc_read_host_osk(>osk, )) {
> > > > > > > > +/* On host OSK retrieval error report a warning */
> > > > > > > > +error_report_err(err);
> > > > > > > > +s->osk = default_osk;
> > > > > > > > +}
> > > > > > > > +}
> > > > > > > This part is yucky. A few things:
> > > > > > > 
> > > > > > > 1) QEMU in general does not fail user requested operations 
> > > > > > > silently. If the
> > > > > > > user explicitly asked to read the host OSK and we couldn't, it 
> > > > > > > must
> > > > > > > propagate that error.
> > > > > > > 2) In tandem to the above, I think the only consistent CX is to 
> > > > > > > make both
> > > > > > > options mutually exclusive. The easiest way to achieve that IMHO 
> > > > > > > would be to
> > > > > > > overload the "osk" property. If it is "host", then use the host 
> > > > > > > one.
> > > > > > > 3) Should we make "osk"="host" the default on macOS as well then? 
> > > > > > > Of course,
> > > > > > > that one should *not* fail hard when it can't read the key, 
> > > > > > > because it's an
> > > > > > > implicit request rather than an explicit one.
> > > > > > The problem with using a magic string value for the existing "osk"
> > > > > > parameter is that this is not introspectable by management apps.
> > > > > What introspectability would you like to have?
> > > > Essentially to answer the question
> > > > 
> > > > "Does this QEMU support OSK passthrough from the host"
> > > > 
> > > > Mgmt apps like libvirt introspect using various query-XXX QMP commands.
> > > > For devices, the typical approach is to ask for the list of properties
> > > > the device supports. If we're just accepting a new magic value on an
> > > > existing property there is no way to query for existance of that 
> > > > feature.
> > > > If we add a "host-osk=bool" parameter introspectability is trivially
> > > > satisfied.
> > > 
> > > Ok, the only flow that remains sensible in that case to me sounds like the
> > > following:
> > Just need an extra check upfront:
> > 
> >   if (s->osk && s->use_hoist_osk)
> >   error_setg(errp, ...)
> >   else
> > > if (s->osk) {
> > >      /* Use osk */
> > This should fail hard if the provided value is the wrong length - currently
> > it falls back with a warning IIUC.
> > 
> > > } else if (s->use_host_osk) {
> > >      /* Use host OSK. Fail hard if we can't find it */
> > > } else if (can_use_host_osk) {
> > >      /* See if we can 

Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Alexander Graf



On 25.10.21 17:10, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 04:53:57PM +0200, Alexander Graf wrote:

On 25.10.21 16:47, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 04:42:22PM +0200, Alexander Graf wrote:

On 25.10.21 16:22, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:

On 22.10.21 18:14, Vladislav Yaroshchuk wrote:

On Apple hosts we can read AppleSMC OSK key directly from host's
SMC and forward this value to QEMU Guest.

Usage:
`-device isa-applesmc,hostosk=on`

Apple licence allows use and run up to two additional copies
or instances of macOS operating within virtual operating system
environments on each Apple-branded computer that is already running
the Apple Software, for purposes of:
- software development
- testing during software development
- using macOS Server
- personal, non-commercial use

Guest macOS requires AppleSMC with correct OSK. The most legal
way to pass it to the Guest is to forward the key from host SMC
without any value exposion.

Based on 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/

Signed-off-by: Vladislav Yaroshchuk 
@@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState *dev, Error 
**errp)
 isa_register_ioport(>parent_obj, >io_err,
 s->iobase + APPLESMC_ERR_PORT);
+if (s->hostosk_flag) {
+/*
+ * Property 'hostosk' has higher priority than 'osk'
+ * and shadows it.
+ * Free user-provided 'osk' property value
+ */
+if (s->osk) {
+warn_report("isa-applesmc.osk is shadowed "
+"by isa-applesmc.hostosk");
+g_free(s->osk);
+}
+
+if (!applesmc_read_host_osk(>osk, )) {
+/* On host OSK retrieval error report a warning */
+error_report_err(err);
+s->osk = default_osk;
+}
+}

This part is yucky. A few things:

1) QEMU in general does not fail user requested operations silently. If the
user explicitly asked to read the host OSK and we couldn't, it must
propagate that error.
2) In tandem to the above, I think the only consistent CX is to make both
options mutually exclusive. The easiest way to achieve that IMHO would be to
overload the "osk" property. If it is "host", then use the host one.
3) Should we make "osk"="host" the default on macOS as well then? Of course,
that one should *not* fail hard when it can't read the key, because it's an
implicit request rather than an explicit one.

The problem with using a magic string value for the existing "osk"
parameter is that this is not introspectable by management apps.

What introspectability would you like to have?

Essentially to answer the question

"Does this QEMU support OSK passthrough from the host"

Mgmt apps like libvirt introspect using various query-XXX QMP commands.
For devices, the typical approach is to ask for the list of properties
the device supports. If we're just accepting a new magic value on an
existing property there is no way to query for existance of that feature.
If we add a "host-osk=bool" parameter introspectability is trivially
satisfied.


Ok, the only flow that remains sensible in that case to me sounds like the
following:

Just need an extra check upfront:

  if (s->osk && s->use_hoist_osk)
  error_setg(errp, ...)
  else
  

if (s->osk) {
     /* Use osk */

This should fail hard if the provided value is the wrong length - currently
it falls back with a warning IIUC.


} else if (s->use_host_osk) {
     /* Use host OSK. Fail hard if we can't find it */
} else if (can_use_host_osk) {
     /* See if we can extract the key from the host. If not, fall back to old
behavior */
} else {
     /* Old fallback behavior */

Was this old fallback behaviour actually useful ? IIUC it means it is using


   static char default_osk[64] = "This is a dummy key. Enter the real key "
 "using the -osk parameter";

which obviously isn't a valid key that will work with any gust OS that
cares. I guess it at least let QEMU startup, but any the guest OS that
checks the key will be unhappy.

If if don't think default_osk is actually useful, then we could simplify
further to

  if (s->osk && s->use_host_osk) {
  error_setg(errp, ...)
  } else if (s->osk) {
 /* Use osk. Fail hard if invalid (ie wrong length) */
  } else if (s->use_host_osk) {
 /* Use host OSK. Fail hard if we can't find it */
  } else {
 /* try to use host OSK, fail hard if we can't find it or non-OS-X build */
  }



In the example above, use_host_osk=on and use_host_osk=off yield the 
exact same behavior, so we don't need the switch, no?


Alex




Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Daniel P . Berrangé
On Mon, Oct 25, 2021 at 04:53:57PM +0200, Alexander Graf wrote:
> 
> On 25.10.21 16:47, Daniel P. Berrangé wrote:
> > On Mon, Oct 25, 2021 at 04:42:22PM +0200, Alexander Graf wrote:
> > > On 25.10.21 16:22, Daniel P. Berrangé wrote:
> > > > On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:
> > > > > On 22.10.21 18:14, Vladislav Yaroshchuk wrote:
> > > > > > On Apple hosts we can read AppleSMC OSK key directly from host's
> > > > > > SMC and forward this value to QEMU Guest.
> > > > > > 
> > > > > > Usage:
> > > > > > `-device isa-applesmc,hostosk=on`
> > > > > > 
> > > > > > Apple licence allows use and run up to two additional copies
> > > > > > or instances of macOS operating within virtual operating system
> > > > > > environments on each Apple-branded computer that is already running
> > > > > > the Apple Software, for purposes of:
> > > > > > - software development
> > > > > > - testing during software development
> > > > > > - using macOS Server
> > > > > > - personal, non-commercial use
> > > > > > 
> > > > > > Guest macOS requires AppleSMC with correct OSK. The most legal
> > > > > > way to pass it to the Guest is to forward the key from host SMC
> > > > > > without any value exposion.
> > > > > > 
> > > > > > Based on 
> > > > > > https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
> > > > > > 
> > > > > > Signed-off-by: Vladislav Yaroshchuk 
> > > > > > @@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState 
> > > > > > *dev, Error **errp)
> > > > > > isa_register_ioport(>parent_obj, >io_err,
> > > > > > s->iobase + APPLESMC_ERR_PORT);
> > > > > > +if (s->hostosk_flag) {
> > > > > > +/*
> > > > > > + * Property 'hostosk' has higher priority than 'osk'
> > > > > > + * and shadows it.
> > > > > > + * Free user-provided 'osk' property value
> > > > > > + */
> > > > > > +if (s->osk) {
> > > > > > +warn_report("isa-applesmc.osk is shadowed "
> > > > > > +"by isa-applesmc.hostosk");
> > > > > > +g_free(s->osk);
> > > > > > +}
> > > > > > +
> > > > > > +if (!applesmc_read_host_osk(>osk, )) {
> > > > > > +/* On host OSK retrieval error report a warning */
> > > > > > +error_report_err(err);
> > > > > > +s->osk = default_osk;
> > > > > > +}
> > > > > > +}
> > > > > This part is yucky. A few things:
> > > > > 
> > > > > 1) QEMU in general does not fail user requested operations silently. 
> > > > > If the
> > > > > user explicitly asked to read the host OSK and we couldn't, it must
> > > > > propagate that error.
> > > > > 2) In tandem to the above, I think the only consistent CX is to make 
> > > > > both
> > > > > options mutually exclusive. The easiest way to achieve that IMHO 
> > > > > would be to
> > > > > overload the "osk" property. If it is "host", then use the host one.
> > > > > 3) Should we make "osk"="host" the default on macOS as well then? Of 
> > > > > course,
> > > > > that one should *not* fail hard when it can't read the key, because 
> > > > > it's an
> > > > > implicit request rather than an explicit one.
> > > > The problem with using a magic string value for the existing "osk"
> > > > parameter is that this is not introspectable by management apps.
> > > 
> > > What introspectability would you like to have?
> > Essentially to answer the question
> > 
> >"Does this QEMU support OSK passthrough from the host"
> > 
> > Mgmt apps like libvirt introspect using various query-XXX QMP commands.
> > For devices, the typical approach is to ask for the list of properties
> > the device supports. If we're just accepting a new magic value on an
> > existing property there is no way to query for existance of that feature.
> > If we add a "host-osk=bool" parameter introspectability is trivially
> > satisfied.
> 
> 
> Ok, the only flow that remains sensible in that case to me sounds like the
> following:

Just need an extra check upfront:

 if (s->osk && s->use_hoist_osk)
 error_setg(errp, ...)
 else
 
> if (s->osk) {
>     /* Use osk */

This should fail hard if the provided value is the wrong length - currently
it falls back with a warning IIUC.

> } else if (s->use_host_osk) {
>     /* Use host OSK. Fail hard if we can't find it */
> } else if (can_use_host_osk) {
>     /* See if we can extract the key from the host. If not, fall back to old
> behavior */
> } else {
>     /* Old fallback behavior */

Was this old fallback behaviour actually useful ? IIUC it means it is using


  static char default_osk[64] = "This is a dummy key. Enter the real key "
"using the -osk parameter";

which obviously isn't a valid key that will work with any gust OS that
cares. I guess it at least let QEMU startup, but any the guest OS that
checks the key will be unhappy.

If if don't think default_osk is actually useful, 

Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Alexander Graf



On 25.10.21 16:47, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 04:42:22PM +0200, Alexander Graf wrote:

On 25.10.21 16:22, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:

On 22.10.21 18:14, Vladislav Yaroshchuk wrote:

On Apple hosts we can read AppleSMC OSK key directly from host's
SMC and forward this value to QEMU Guest.

Usage:
`-device isa-applesmc,hostosk=on`

Apple licence allows use and run up to two additional copies
or instances of macOS operating within virtual operating system
environments on each Apple-branded computer that is already running
the Apple Software, for purposes of:
- software development
- testing during software development
- using macOS Server
- personal, non-commercial use

Guest macOS requires AppleSMC with correct OSK. The most legal
way to pass it to the Guest is to forward the key from host SMC
without any value exposion.

Based on 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/

Signed-off-by: Vladislav Yaroshchuk 
@@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState *dev, Error 
**errp)
isa_register_ioport(>parent_obj, >io_err,
s->iobase + APPLESMC_ERR_PORT);
+if (s->hostosk_flag) {
+/*
+ * Property 'hostosk' has higher priority than 'osk'
+ * and shadows it.
+ * Free user-provided 'osk' property value
+ */
+if (s->osk) {
+warn_report("isa-applesmc.osk is shadowed "
+"by isa-applesmc.hostosk");
+g_free(s->osk);
+}
+
+if (!applesmc_read_host_osk(>osk, )) {
+/* On host OSK retrieval error report a warning */
+error_report_err(err);
+s->osk = default_osk;
+}
+}

This part is yucky. A few things:

1) QEMU in general does not fail user requested operations silently. If the
user explicitly asked to read the host OSK and we couldn't, it must
propagate that error.
2) In tandem to the above, I think the only consistent CX is to make both
options mutually exclusive. The easiest way to achieve that IMHO would be to
overload the "osk" property. If it is "host", then use the host one.
3) Should we make "osk"="host" the default on macOS as well then? Of course,
that one should *not* fail hard when it can't read the key, because it's an
implicit request rather than an explicit one.

The problem with using a magic string value for the existing "osk"
parameter is that this is not introspectable by management apps.


What introspectability would you like to have?

Essentially to answer the question

   "Does this QEMU support OSK passthrough from the host"

Mgmt apps like libvirt introspect using various query-XXX QMP commands.
For devices, the typical approach is to ask for the list of properties
the device supports. If we're just accepting a new magic value on an
existing property there is no way to query for existance of that feature.
If we add a "host-osk=bool" parameter introspectability is trivially
satisfied.



Ok, the only flow that remains sensible in that case to me sounds like 
the following:


if (s->osk) {
    /* Use osk */
} else if (s->use_host_osk) {
    /* Use host OSK. Fail hard if we can't find it */
} else if (can_use_host_osk) {
    /* See if we can extract the key from the host. If not, fall back 
to old behavior */

} else {
    /* Old fallback behavior */
}


Alex




Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Alexander Graf



On 25.10.21 16:22, Daniel P. Berrangé wrote:

On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:

On 22.10.21 18:14, Vladislav Yaroshchuk wrote:

On Apple hosts we can read AppleSMC OSK key directly from host's
SMC and forward this value to QEMU Guest.

Usage:
`-device isa-applesmc,hostosk=on`

Apple licence allows use and run up to two additional copies
or instances of macOS operating within virtual operating system
environments on each Apple-branded computer that is already running
the Apple Software, for purposes of:
- software development
- testing during software development
- using macOS Server
- personal, non-commercial use

Guest macOS requires AppleSMC with correct OSK. The most legal
way to pass it to the Guest is to forward the key from host SMC
without any value exposion.

Based on 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/

Signed-off-by: Vladislav Yaroshchuk 



@@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState *dev, Error 
**errp)
   isa_register_ioport(>parent_obj, >io_err,
   s->iobase + APPLESMC_ERR_PORT);
+if (s->hostosk_flag) {
+/*
+ * Property 'hostosk' has higher priority than 'osk'
+ * and shadows it.
+ * Free user-provided 'osk' property value
+ */
+if (s->osk) {
+warn_report("isa-applesmc.osk is shadowed "
+"by isa-applesmc.hostosk");
+g_free(s->osk);
+}
+
+if (!applesmc_read_host_osk(>osk, )) {
+/* On host OSK retrieval error report a warning */
+error_report_err(err);
+s->osk = default_osk;
+}
+}


This part is yucky. A few things:

1) QEMU in general does not fail user requested operations silently. If the
user explicitly asked to read the host OSK and we couldn't, it must
propagate that error.
2) In tandem to the above, I think the only consistent CX is to make both
options mutually exclusive. The easiest way to achieve that IMHO would be to
overload the "osk" property. If it is "host", then use the host one.
3) Should we make "osk"="host" the default on macOS as well then? Of course,
that one should *not* fail hard when it can't read the key, because it's an
implicit request rather than an explicit one.

The problem with using a magic string value for the existing "osk"
parameter is that this is not introspectable by management apps.



What introspectability would you like to have?



IMHO, using an explicit separate parameter is the right approach.

We just need to make sure we report an error properly via the
'Error **errp' parameter to this method instead of warn_report
or error_report_err, when the user gives a non-sensible combination,
or if reading the host value fails.



How about we change the default behavior altogether? Either you pass osk 
as argument, then that takes precedence. Or you don't, then we'll try to 
grab it from the host. If that fails, we error out (instead of the warn 
today).


That's a slight behavioral change, but I don't think anyone really wants 
to run the applesmc device without OSK in the first place. And at least 
we wouldn't break users that have working osk= configs.



Alex





Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Daniel P . Berrangé
On Mon, Oct 25, 2021 at 04:42:22PM +0200, Alexander Graf wrote:
> 
> On 25.10.21 16:22, Daniel P. Berrangé wrote:
> > On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:
> > > On 22.10.21 18:14, Vladislav Yaroshchuk wrote:
> > > > On Apple hosts we can read AppleSMC OSK key directly from host's
> > > > SMC and forward this value to QEMU Guest.
> > > > 
> > > > Usage:
> > > > `-device isa-applesmc,hostosk=on`
> > > > 
> > > > Apple licence allows use and run up to two additional copies
> > > > or instances of macOS operating within virtual operating system
> > > > environments on each Apple-branded computer that is already running
> > > > the Apple Software, for purposes of:
> > > > - software development
> > > > - testing during software development
> > > > - using macOS Server
> > > > - personal, non-commercial use
> > > > 
> > > > Guest macOS requires AppleSMC with correct OSK. The most legal
> > > > way to pass it to the Guest is to forward the key from host SMC
> > > > without any value exposion.
> > > > 
> > > > Based on 
> > > > https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
> > > > 
> > > > Signed-off-by: Vladislav Yaroshchuk 
> > 
> > > > @@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState *dev, 
> > > > Error **errp)
> > > >isa_register_ioport(>parent_obj, >io_err,
> > > >s->iobase + APPLESMC_ERR_PORT);
> > > > +if (s->hostosk_flag) {
> > > > +/*
> > > > + * Property 'hostosk' has higher priority than 'osk'
> > > > + * and shadows it.
> > > > + * Free user-provided 'osk' property value
> > > > + */
> > > > +if (s->osk) {
> > > > +warn_report("isa-applesmc.osk is shadowed "
> > > > +"by isa-applesmc.hostosk");
> > > > +g_free(s->osk);
> > > > +}
> > > > +
> > > > +if (!applesmc_read_host_osk(>osk, )) {
> > > > +/* On host OSK retrieval error report a warning */
> > > > +error_report_err(err);
> > > > +s->osk = default_osk;
> > > > +}
> > > > +}
> > > 
> > > This part is yucky. A few things:
> > > 
> > > 1) QEMU in general does not fail user requested operations silently. If 
> > > the
> > > user explicitly asked to read the host OSK and we couldn't, it must
> > > propagate that error.
> > > 2) In tandem to the above, I think the only consistent CX is to make both
> > > options mutually exclusive. The easiest way to achieve that IMHO would be 
> > > to
> > > overload the "osk" property. If it is "host", then use the host one.
> > > 3) Should we make "osk"="host" the default on macOS as well then? Of 
> > > course,
> > > that one should *not* fail hard when it can't read the key, because it's 
> > > an
> > > implicit request rather than an explicit one.
> > The problem with using a magic string value for the existing "osk"
> > parameter is that this is not introspectable by management apps.
> 
> 
> What introspectability would you like to have?

Essentially to answer the question

  "Does this QEMU support OSK passthrough from the host"

Mgmt apps like libvirt introspect using various query-XXX QMP commands.
For devices, the typical approach is to ask for the list of properties
the device supports. If we're just accepting a new magic value on an
existing property there is no way to query for existance of that feature.
If we add a "host-osk=bool" parameter introspectability is trivially
satisfied.

> > IMHO, using an explicit separate parameter is the right approach.
> > 
> > We just need to make sure we report an error properly via the
> > 'Error **errp' parameter to this method instead of warn_report
> > or error_report_err, when the user gives a non-sensible combination,
> > or if reading the host value fails.
> 
> 
> How about we change the default behavior altogether? Either you pass osk as
> argument, then that takes precedence. Or you don't, then we'll try to grab
> it from the host. If that fails, we error out (instead of the warn today).
> 
> That's a slight behavioral change, but I don't think anyone really wants to
> run the applesmc device without OSK in the first place. And at least we
> wouldn't break users that have working osk= configs.



Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|




Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Daniel P . Berrangé
On Mon, Oct 25, 2021 at 12:13:32PM +0200, Alexander Graf wrote:
> 
> On 22.10.21 18:14, Vladislav Yaroshchuk wrote:
> > On Apple hosts we can read AppleSMC OSK key directly from host's
> > SMC and forward this value to QEMU Guest.
> > 
> > Usage:
> > `-device isa-applesmc,hostosk=on`
> > 
> > Apple licence allows use and run up to two additional copies
> > or instances of macOS operating within virtual operating system
> > environments on each Apple-branded computer that is already running
> > the Apple Software, for purposes of:
> > - software development
> > - testing during software development
> > - using macOS Server
> > - personal, non-commercial use
> > 
> > Guest macOS requires AppleSMC with correct OSK. The most legal
> > way to pass it to the Guest is to forward the key from host SMC
> > without any value exposion.
> > 
> > Based on 
> > https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
> > 
> > Signed-off-by: Vladislav Yaroshchuk 


> > @@ -331,6 +464,25 @@ static void applesmc_isa_realize(DeviceState *dev, 
> > Error **errp)
> >   isa_register_ioport(>parent_obj, >io_err,
> >   s->iobase + APPLESMC_ERR_PORT);
> > +if (s->hostosk_flag) {
> > +/*
> > + * Property 'hostosk' has higher priority than 'osk'
> > + * and shadows it.
> > + * Free user-provided 'osk' property value
> > + */
> > +if (s->osk) {
> > +warn_report("isa-applesmc.osk is shadowed "
> > +"by isa-applesmc.hostosk");
> > +g_free(s->osk);
> > +}
> > +
> > +if (!applesmc_read_host_osk(>osk, )) {
> > +/* On host OSK retrieval error report a warning */
> > +error_report_err(err);
> > +s->osk = default_osk;
> > +}
> > +}
> 
> 
> This part is yucky. A few things:
> 
> 1) QEMU in general does not fail user requested operations silently. If the
> user explicitly asked to read the host OSK and we couldn't, it must
> propagate that error.
> 2) In tandem to the above, I think the only consistent CX is to make both
> options mutually exclusive. The easiest way to achieve that IMHO would be to
> overload the "osk" property. If it is "host", then use the host one.
> 3) Should we make "osk"="host" the default on macOS as well then? Of course,
> that one should *not* fail hard when it can't read the key, because it's an
> implicit request rather than an explicit one.

The problem with using a magic string value for the existing "osk"
parameter is that this is not introspectable by management apps.

IMHO, using an explicit separate parameter is the right approach.

We just need to make sure we report an error properly via the
'Error **errp' parameter to this method instead of warn_report
or error_report_err, when the user gives a non-sensible combination,
or if reading the host value fails.


Regards,
Daniel
-- 
|: https://berrange.com  -o-https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org -o-https://fstop138.berrange.com :|
|: https://entangle-photo.org-o-https://www.instagram.com/dberrange :|




Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Vladislav Yaroshchuk
пн, 25 окт. 2021 г. в 13:13, Alexander Graf :

>
> On 22.10.21 18:14, Vladislav Yaroshchuk wrote:
> > On Apple hosts we can read AppleSMC OSK key directly from host's
> > SMC and forward this value to QEMU Guest.
> >
> > Usage:
> > `-device isa-applesmc,hostosk=on`
> >
> > Apple licence allows use and run up to two additional copies
> > or instances of macOS operating within virtual operating system
> > environments on each Apple-branded computer that is already running
> > the Apple Software, for purposes of:
> > - software development
> > - testing during software development
> > - using macOS Server
> > - personal, non-commercial use
> >
> > Guest macOS requires AppleSMC with correct OSK. The most legal
> > way to pass it to the Guest is to forward the key from host SMC
> > without any value exposion.
> >
> > Based on
> https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
> >
> > Signed-off-by: Vladislav Yaroshchuk 
>
>
> There was a similar proposal on the mailing list by Pedro Torres
> recently. Please copy everyone who contributed to that email thread in
> your patch submission in addition to everyone who commented on previous
> versions of your own submission.
>
>
I understood that I'd missed the already submitted patch by Pedro
Torres. I should have queried 'applesmc' instead of 'isa-applesmc' to find
his patch. I've checked the mailing discussion and found some useful things
to fix, thank you.


> Also, this is definitely not "trivial" material. Trivial means spelling
> or super obvious fixes. This one is an actual feature :). I've removed
> qemu-trivial@ from the copy list.
>
> My mistake, won't make the same next time :)

>
> > ---
> >   hw/misc/applesmc.c | 155 -
> >   1 file changed, 154 insertions(+), 1 deletion(-)
> >
> > diff --git a/hw/misc/applesmc.c b/hw/misc/applesmc.c
> > index 1b9acaf1d3..6bdec0063b 100644
> > --- a/hw/misc/applesmc.c
> > +++ b/hw/misc/applesmc.c
> > @@ -37,6 +37,11 @@
> >   #include "qemu/module.h"
> >   #include "qemu/timer.h"
> >   #include "qom/object.h"
> > +#include "qapi/error.h"
> > +
> > +#if defined(__APPLE__)
> > +#include 
> > +#endif
> >
> >   /* #define DEBUG_SMC */
> >
> > @@ -108,6 +113,7 @@ struct AppleSMCState {
> >   uint8_t data_len;
> >   uint8_t data_pos;
> >   uint8_t data[255];
> > +bool hostosk_flag;
> >   char *osk;
> >   QLIST_HEAD(, AppleSMCData) data_def;
> >   };
> > @@ -312,9 +318,136 @@ static const MemoryRegionOps applesmc_err_io_ops =
> {
> >   },
> >   };
> >
> > +#if defined(__APPLE__)
> > +/*
> > + * Based on
> > + *
> https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
> > + */
> > +enum {
> > +SMC_CLIENT_OPEN  = 0,
> > +SMC_CLIENT_CLOSE = 1,
> > +SMC_HANDLE_EVENT = 2,
> > +SMC_READ_KEY = 5
> > +};
> > +
> > +struct AppleSMCParam {
> > +uint32_tkey;
> > +uint8_t pad0[22];
> > +IOByteCount data_size;
> > +uint8_t pad1[10];
> > +uint8_t command;
> > +uint32_tpad2;
> > +uint8_t bytes[32];
> > +};
> > +
> > +static bool applesmc_read_host_osk(char **host_osk, Error **errp)
>
>
> Please just provide a buffer to write the OSK into (char *host_osk) to
> the function.
>
>
Thank you, I will fix this.

>
> > +{
> > +assert(host_osk != NULL);
> > +
> > +io_service_thostsmc_service = IO_OBJECT_NULL;
> > +io_connect_thostsmc_connect = IO_OBJECT_NULL;
> > +size_t  out_size = sizeof(struct AppleSMCParam);
> > +IOReturnstatus = kIOReturnError;
> > +struct AppleSMCParamin = {0};
> > +struct AppleSMCParamout = {0};
>
>
> Can in and out be the same variable?
>
>
Checked, we can use one variable for in and out.


> > +
> > +/* OSK key size + '\0' */
> > +*host_osk = g_malloc0(65);
> > +(*host_osk)[64] = '\0';
> > +
> > +hostsmc_service = IOServiceGetMatchingService(kIOMasterPortDefault,
> > +
> IOServiceMatching("AppleSMC"));
> > +if (hostsmc_service == IO_OBJECT_NULL) {
> > +error_setg(errp, "Unable to get host-AppleSMC service");
> > +goto error_osk_buffer_free;
> > +}
> > +
> > +status = IOServiceOpen(hostsmc_service,
> > +   mach_task_self(),
> > +   1,
> > +   _connect);
> > +if (status != kIOReturnSuccess || hostsmc_connect ==
> IO_OBJECT_NULL) {
> > +error_setg(errp, "Unable to open host-AppleSMC service");
> > +goto error_osk_buffer_free;
> > +}
> > +
> > +status = IOConnectCallMethod(
> > +hostsmc_connect,
> > +SMC_CLIENT_OPEN,
> > +NULL, 0, NULL, 0, NULL, NULL, NULL, NULL
> > +);
> > +if (status != kIOReturnSuccess) {
> > +error_setg(errp, "Unable to connect to host-AppleSMC");
> > +goto error_ioservice_close;
> > +}
> > +
> > +

Re: [PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-25 Thread Alexander Graf



On 22.10.21 18:14, Vladislav Yaroshchuk wrote:

On Apple hosts we can read AppleSMC OSK key directly from host's
SMC and forward this value to QEMU Guest.

Usage:
`-device isa-applesmc,hostosk=on`

Apple licence allows use and run up to two additional copies
or instances of macOS operating within virtual operating system
environments on each Apple-branded computer that is already running
the Apple Software, for purposes of:
- software development
- testing during software development
- using macOS Server
- personal, non-commercial use

Guest macOS requires AppleSMC with correct OSK. The most legal
way to pass it to the Guest is to forward the key from host SMC
without any value exposion.

Based on 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/

Signed-off-by: Vladislav Yaroshchuk 



There was a similar proposal on the mailing list by Pedro Torres 
recently. Please copy everyone who contributed to that email thread in 
your patch submission in addition to everyone who commented on previous 
versions of your own submission.


Also, this is definitely not "trivial" material. Trivial means spelling 
or super obvious fixes. This one is an actual feature :). I've removed 
qemu-trivial@ from the copy list.




---
  hw/misc/applesmc.c | 155 -
  1 file changed, 154 insertions(+), 1 deletion(-)

diff --git a/hw/misc/applesmc.c b/hw/misc/applesmc.c
index 1b9acaf1d3..6bdec0063b 100644
--- a/hw/misc/applesmc.c
+++ b/hw/misc/applesmc.c
@@ -37,6 +37,11 @@
  #include "qemu/module.h"
  #include "qemu/timer.h"
  #include "qom/object.h"
+#include "qapi/error.h"
+
+#if defined(__APPLE__)
+#include 
+#endif
  
  /* #define DEBUG_SMC */
  
@@ -108,6 +113,7 @@ struct AppleSMCState {

  uint8_t data_len;
  uint8_t data_pos;
  uint8_t data[255];
+bool hostosk_flag;
  char *osk;
  QLIST_HEAD(, AppleSMCData) data_def;
  };
@@ -312,9 +318,136 @@ static const MemoryRegionOps applesmc_err_io_ops = {
  },
  };
  
+#if defined(__APPLE__)

+/*
+ * Based on
+ * 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
+ */
+enum {
+SMC_CLIENT_OPEN  = 0,
+SMC_CLIENT_CLOSE = 1,
+SMC_HANDLE_EVENT = 2,
+SMC_READ_KEY = 5
+};
+
+struct AppleSMCParam {
+uint32_tkey;
+uint8_t pad0[22];
+IOByteCount data_size;
+uint8_t pad1[10];
+uint8_t command;
+uint32_tpad2;
+uint8_t bytes[32];
+};
+
+static bool applesmc_read_host_osk(char **host_osk, Error **errp)



Please just provide a buffer to write the OSK into (char *host_osk) to 
the function.




+{
+assert(host_osk != NULL);
+
+io_service_thostsmc_service = IO_OBJECT_NULL;
+io_connect_thostsmc_connect = IO_OBJECT_NULL;
+size_t  out_size = sizeof(struct AppleSMCParam);
+IOReturnstatus = kIOReturnError;
+struct AppleSMCParamin = {0};
+struct AppleSMCParamout = {0};



Can in and out be the same variable?



+
+/* OSK key size + '\0' */
+*host_osk = g_malloc0(65);
+(*host_osk)[64] = '\0';
+
+hostsmc_service = IOServiceGetMatchingService(kIOMasterPortDefault,
+  IOServiceMatching("AppleSMC"));
+if (hostsmc_service == IO_OBJECT_NULL) {
+error_setg(errp, "Unable to get host-AppleSMC service");
+goto error_osk_buffer_free;
+}
+
+status = IOServiceOpen(hostsmc_service,
+   mach_task_self(),
+   1,
+   _connect);
+if (status != kIOReturnSuccess || hostsmc_connect == IO_OBJECT_NULL) {
+error_setg(errp, "Unable to open host-AppleSMC service");
+goto error_osk_buffer_free;
+}
+
+status = IOConnectCallMethod(
+hostsmc_connect,
+SMC_CLIENT_OPEN,
+NULL, 0, NULL, 0, NULL, NULL, NULL, NULL
+);
+if (status != kIOReturnSuccess) {
+error_setg(errp, "Unable to connect to host-AppleSMC");
+goto error_ioservice_close;
+}
+
+in.key = ('OSK0');
+in.data_size = sizeof(out.bytes);
+in.command = SMC_READ_KEY;



Since you know all these beforehand, can't you just create two struct 
AppleSMCParam - one for osk0 and one for osk1? Then just shoot them off 
here:


struct AppleSMCParam cmd[2] = {
{
.key = ('OSK0'),
.data_size = sizeof(cmd[0].bytes),
.command = SMC_READ_KEY,
}, {
.key = ('OSK1'),
.data_size = sizeof(cmd[0].bytes),
.command = SMC_READ_KEY,
},
};


for (i = 0; i < ARRAY_SIZE(in); i++) {
    IOConnectCallStructMethod(hostsmc_connect, SMC_HANDLE_EVENT, 
cmd[i], sizeof(cmd[i]), cmd[i], _size);

    if (out_size != sizeof(cmd[i])) {
    goto err;
    }
}


+status = IOConnectCallStructMethod(
+hostsmc_connect,
+SMC_HANDLE_EVENT,
+,
+sizeof(struct 

[PATCH v4] isa-applesmc: provide OSK forwarding on Apple hosts

2021-10-22 Thread Vladislav Yaroshchuk
On Apple hosts we can read AppleSMC OSK key directly from host's
SMC and forward this value to QEMU Guest.

Usage:
`-device isa-applesmc,hostosk=on`

Apple licence allows use and run up to two additional copies
or instances of macOS operating within virtual operating system
environments on each Apple-branded computer that is already running
the Apple Software, for purposes of:
- software development
- testing during software development
- using macOS Server
- personal, non-commercial use

Guest macOS requires AppleSMC with correct OSK. The most legal
way to pass it to the Guest is to forward the key from host SMC
without any value exposion.

Based on 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/

Signed-off-by: Vladislav Yaroshchuk 
---
 hw/misc/applesmc.c | 155 -
 1 file changed, 154 insertions(+), 1 deletion(-)

diff --git a/hw/misc/applesmc.c b/hw/misc/applesmc.c
index 1b9acaf1d3..6bdec0063b 100644
--- a/hw/misc/applesmc.c
+++ b/hw/misc/applesmc.c
@@ -37,6 +37,11 @@
 #include "qemu/module.h"
 #include "qemu/timer.h"
 #include "qom/object.h"
+#include "qapi/error.h"
+
+#if defined(__APPLE__)
+#include 
+#endif
 
 /* #define DEBUG_SMC */
 
@@ -108,6 +113,7 @@ struct AppleSMCState {
 uint8_t data_len;
 uint8_t data_pos;
 uint8_t data[255];
+bool hostosk_flag;
 char *osk;
 QLIST_HEAD(, AppleSMCData) data_def;
 };
@@ -312,9 +318,136 @@ static const MemoryRegionOps applesmc_err_io_ops = {
 },
 };
 
+#if defined(__APPLE__)
+/*
+ * Based on
+ * 
https://web.archive.org/web/20200103161737/osxbook.com/book/bonus/chapter7/tpmdrmmyth/
+ */
+enum {
+SMC_CLIENT_OPEN  = 0,
+SMC_CLIENT_CLOSE = 1,
+SMC_HANDLE_EVENT = 2,
+SMC_READ_KEY = 5
+};
+
+struct AppleSMCParam {
+uint32_tkey;
+uint8_t pad0[22];
+IOByteCount data_size;
+uint8_t pad1[10];
+uint8_t command;
+uint32_tpad2;
+uint8_t bytes[32];
+};
+
+static bool applesmc_read_host_osk(char **host_osk, Error **errp)
+{
+assert(host_osk != NULL);
+
+io_service_thostsmc_service = IO_OBJECT_NULL;
+io_connect_thostsmc_connect = IO_OBJECT_NULL;
+size_t  out_size = sizeof(struct AppleSMCParam);
+IOReturnstatus = kIOReturnError;
+struct AppleSMCParamin = {0};
+struct AppleSMCParamout = {0};
+
+/* OSK key size + '\0' */
+*host_osk = g_malloc0(65);
+(*host_osk)[64] = '\0';
+
+hostsmc_service = IOServiceGetMatchingService(kIOMasterPortDefault,
+  IOServiceMatching("AppleSMC"));
+if (hostsmc_service == IO_OBJECT_NULL) {
+error_setg(errp, "Unable to get host-AppleSMC service");
+goto error_osk_buffer_free;
+}
+
+status = IOServiceOpen(hostsmc_service,
+   mach_task_self(),
+   1,
+   _connect);
+if (status != kIOReturnSuccess || hostsmc_connect == IO_OBJECT_NULL) {
+error_setg(errp, "Unable to open host-AppleSMC service");
+goto error_osk_buffer_free;
+}
+
+status = IOConnectCallMethod(
+hostsmc_connect,
+SMC_CLIENT_OPEN,
+NULL, 0, NULL, 0, NULL, NULL, NULL, NULL
+);
+if (status != kIOReturnSuccess) {
+error_setg(errp, "Unable to connect to host-AppleSMC");
+goto error_ioservice_close;
+}
+
+in.key = ('OSK0');
+in.data_size = sizeof(out.bytes);
+in.command = SMC_READ_KEY;
+status = IOConnectCallStructMethod(
+hostsmc_connect,
+SMC_HANDLE_EVENT,
+,
+sizeof(struct AppleSMCParam),
+,
+_size
+);
+
+if (status != kIOReturnSuccess) {
+error_setg(errp, "Unable to read OSK0 from host-AppleSMC");
+goto error_ioconnect_close;
+}
+strncpy(*host_osk, (const char *) out.bytes, 32);
+
+in.key = ('OSK1');
+in.data_size = sizeof(out.bytes);
+in.command = SMC_READ_KEY;
+status = IOConnectCallStructMethod(
+hostsmc_connect,
+SMC_HANDLE_EVENT,
+,
+sizeof(struct AppleSMCParam),
+,
+_size
+);
+if (status != kIOReturnSuccess) {
+error_setg(errp, "Unable to read OSK1 from host-AppleSMC");
+goto error_ioconnect_close;
+}
+strncpy((*host_osk) + 32, (const char *) out.bytes, 32);
+
+IOConnectCallMethod(
+hostsmc_connect,
+SMC_CLIENT_CLOSE,
+NULL, 0, NULL, 0, NULL, NULL, NULL, NULL);
+IOServiceClose(hostsmc_connect);
+return true;
+
+error_ioconnect_close:
+IOConnectCallMethod(
+hostsmc_connect,
+SMC_CLIENT_CLOSE,
+NULL, 0, NULL, 0, NULL, NULL, NULL, NULL);
+error_ioservice_close:
+IOServiceClose(hostsmc_connect);
+
+error_osk_buffer_free:
+g_free(*host_osk);
+return false;
+}
+#else
+static bool applesmc_read_host_osk(char