Message ID | 20220415220109.282834-2-sathyanarayanan.kuppuswamy@linux.intel.com (mailing list archive) |
---|---|
State | Deferred, archived |
Headers | show |
Series | Add TDX Guest Attestation support | expand |
On Fri, 2022-04-15 at 15:01 -0700, Kuppuswamy Sathyanarayanan wrote: > In TDX guest, attestation is mainly used to verify the trustworthiness > of a TD to the 3rd party key servers. > "key servers" is only a use case of using the attestation service. This sentence looks not accurate. > First step in attestation process > is to get the TDREPORT data and the generated data is further used in > subsequent steps of the attestation process. TDREPORT data contains > details like TDX module version information, measurement of the TD, > along with a TD-specified nonce > > Add a wrapper function (tdx_mcall_tdreport()) to get the TDREPORT from > the TDX Module. > > More details about the TDREPORT TDCALL can be found in TDX Guest-Host > Communication Interface (GHCI) for Intel TDX 1.5, section titled > "TDCALL [MR.REPORT]". Attestation is a must for TDX architecture, so The TDCALL[MR.REPORT] is available in TDX 1.0. I don't think we should use TDX 1.5 here. And this TDCALL is defined in the TDX module spec 1.0. You can find it in the public TDX module 1.0 spec (22.3.3. TDG.MR.REPORT Leaf): https://www.intel.com/content/dam/develop/external/us/en/documents/tdx-module-1.0-public-spec-v0.931.pdf > > Steps involved in attestation process can be found in TDX Guest-Host > Communication Interface (GHCI) for Intel TDX 1.5, section titled > "TD attestation" It's strange we need to use GHCI for TDX 1.5 to get some idea about the attestation process. Looking at the GHCI 1.0 spec, it seems it already has one section to talk about attestation process (5.4 TD attestation). > > This API will be mainly used by the attestation driver. Attestation > driver support will be added by upcoming patches. > > Reviewed-by: Tony Luck <tony.luck@intel.com> > Reviewed-by: Andi Kleen <ak@linux.intel.com> > Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com> > Signed-off-by: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@linux.intel.com> > --- > arch/x86/coco/tdx/tdx.c | 46 ++++++++++++++++++++++++++++++++++++++ > arch/x86/include/asm/tdx.h | 2 ++ > 2 files changed, 48 insertions(+) > > diff --git a/arch/x86/coco/tdx/tdx.c b/arch/x86/coco/tdx/tdx.c > index 03deb4d6920d..3e409b618d3f 100644 > --- a/arch/x86/coco/tdx/tdx.c > +++ b/arch/x86/coco/tdx/tdx.c > @@ -11,10 +11,12 @@ > #include <asm/insn.h> > #include <asm/insn-eval.h> > #include <asm/pgtable.h> > +#include <asm/io.h> > > /* TDX module Call Leaf IDs */ > #define TDX_GET_INFO 1 > #define TDX_GET_VEINFO 3 > +#define TDX_GET_REPORT 4 > #define TDX_ACCEPT_PAGE 6 > > /* TDX hypercall Leaf IDs */ > @@ -34,6 +36,10 @@ > #define VE_GET_PORT_NUM(e) ((e) >> 16) > #define VE_IS_IO_STRING(e) ((e) & BIT(4)) > > +/* TDX Module call error codes */ > +#define TDCALL_RETURN_CODE_MASK 0xffffffff00000000 > +#define TDCALL_RETURN_CODE(a) ((a) & TDCALL_RETURN_CODE_MASK) > + > /* > * Wrapper for standard use of __tdx_hypercall with no output aside from > * return code. > @@ -98,6 +104,46 @@ static inline void tdx_module_call(u64 fn, u64 rcx, u64 rdx, u64 r8, u64 r9, > panic("TDCALL %lld failed (Buggy TDX module!)\n", fn); > } > > +/* > + * tdx_mcall_tdreport() - Generate TDREPORT_STRUCT using TDCALL. > + * > + * @data : Address of 1024B aligned data to store > + * TDREPORT_STRUCT. > + * @reportdata : Address of 64B aligned report data > + * > + * return 0 on success or failure error number. > + */ > +long tdx_mcall_tdreport(void *data, void *reportdata) > +{ > + u64 ret; > + > + /* > + * Check for a valid TDX guest to ensure this API is only > + * used by TDX guest platform. Also make sure "data" and > + * "reportdata" pointers are valid. > + */ > + if (!data || !reportdata || !cpu_feature_enabled(X86_FEATURE_TDX_GUEST)) > + return -EINVAL; Do we need to manually check the alignment since it is mentioned in the comment of this function? > + > + /* > + * Pass the physical address of user generated reportdata > + * and the physical address of out pointer to store the > + * TDREPORT data to the TDX module to generate the > + * TD report. Generated data contains measurements/configuration > + * data of the TD guest. More info about ABI can be found in TDX > + * Guest-Host-Communication Interface (GHCI), sec titled > + * "TDG.MR.REPORT". If you agree with my above comments, then this comment should be updated too: TDG.MR.REPORT is defined in TDX module 1.0 spec. > + */ > + ret = __tdx_module_call(TDX_GET_REPORT, virt_to_phys(data), > + virt_to_phys(reportdata), 0, 0, NULL); > + > + if (ret) > + return TDCALL_RETURN_CODE(ret); > + > + return 0; > +} > +EXPORT_SYMBOL_GPL(tdx_mcall_tdreport); > + > static u64 get_cc_mask(void) > { > struct tdx_module_output out; > diff --git a/arch/x86/include/asm/tdx.h b/arch/x86/include/asm/tdx.h > index 020c81a7c729..a151f69dd6ef 100644 > --- a/arch/x86/include/asm/tdx.h > +++ b/arch/x86/include/asm/tdx.h > @@ -67,6 +67,8 @@ void tdx_safe_halt(void); > > bool tdx_early_handle_ve(struct pt_regs *regs); > > +long tdx_mcall_tdreport(void *data, void *reportdata); > + > #else > > static inline void tdx_early_init(void) { };
On 4/18/22 7:29 PM, Kai Huang wrote: > On Fri, 2022-04-15 at 15:01 -0700, Kuppuswamy Sathyanarayanan wrote: >> In TDX guest, attestation is mainly used to verify the trustworthiness >> of a TD to the 3rd party key servers. >> > > "key servers" is only a use case of using the attestation service. This sentence > looks not accurate. I thought it is mainly used for this use case. If it is not accurate, how about following? Attestation is used to verify the trustworthiness of a TD to the other 3rd party entities (like key servers) before exchanging sensitive information. > >> First step in attestation process >> is to get the TDREPORT data and the generated data is further used in >> subsequent steps of the attestation process. TDREPORT data contains >> details like TDX module version information, measurement of the TD, >> along with a TD-specified nonce >> >> Add a wrapper function (tdx_mcall_tdreport()) to get the TDREPORT from >> the TDX Module. >> >> More details about the TDREPORT TDCALL can be found in TDX Guest-Host >> Communication Interface (GHCI) for Intel TDX 1.5, section titled >> "TDCALL [MR.REPORT]". > > Attestation is a must for TDX architecture, so The TDCALL[MR.REPORT] is > available in TDX 1.0. I don't think we should use TDX 1.5 here. And this Yes. It is also part of v1.0. Since the feature is similar between v1.0 and v1.5, I have included one link. If v1.0 reference is preferred, I will update it. > TDCALL is defined in the TDX module spec 1.0. You can find it in the public TDX > module 1.0 spec (22.3.3. TDG.MR.REPORT Leaf): It looks like in the latest update, they have moved this section from ABI spec. I will update the specification reference. > > https://www.intel.com/content/dam/develop/external/us/en/documents/tdx-module-1.0-public-spec-v0.931.pdf > >> >> Steps involved in attestation process can be found in TDX Guest-Host >> Communication Interface (GHCI) for Intel TDX 1.5, section titled >> "TD attestation" > > It's strange we need to use GHCI for TDX 1.5 to get some idea about the > attestation process. Looking at the GHCI 1.0 spec, it seems it already has one > section to talk about attestation process (5.4 TD attestation). Both are same. I will change it to 1.0 reference. > >> >> This API will be mainly used by the attestation driver. Attestation >> driver support will be added by upcoming patches. >> >> Reviewed-by: Tony Luck <tony.luck@intel.com> >> Reviewed-by: Andi Kleen <ak@linux.intel.com> >> Acked-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com> >> Signed-off-by: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@linux.intel.com> >> --- >> arch/x86/coco/tdx/tdx.c | 46 ++++++++++++++++++++++++++++++++++++++ >> arch/x86/include/asm/tdx.h | 2 ++ >> 2 files changed, 48 insertions(+) >> >> diff --git a/arch/x86/coco/tdx/tdx.c b/arch/x86/coco/tdx/tdx.c >> index 03deb4d6920d..3e409b618d3f 100644 >> --- a/arch/x86/coco/tdx/tdx.c >> +++ b/arch/x86/coco/tdx/tdx.c >> @@ -11,10 +11,12 @@ >> #include <asm/insn.h> >> #include <asm/insn-eval.h> >> #include <asm/pgtable.h> >> +#include <asm/io.h> >> >> /* TDX module Call Leaf IDs */ >> #define TDX_GET_INFO 1 >> #define TDX_GET_VEINFO 3 >> +#define TDX_GET_REPORT 4 >> #define TDX_ACCEPT_PAGE 6 >> >> /* TDX hypercall Leaf IDs */ >> @@ -34,6 +36,10 @@ >> #define VE_GET_PORT_NUM(e) ((e) >> 16) >> #define VE_IS_IO_STRING(e) ((e) & BIT(4)) >> >> +/* TDX Module call error codes */ >> +#define TDCALL_RETURN_CODE_MASK 0xffffffff00000000 >> +#define TDCALL_RETURN_CODE(a) ((a) & TDCALL_RETURN_CODE_MASK) >> + >> /* >> * Wrapper for standard use of __tdx_hypercall with no output aside from >> * return code. >> @@ -98,6 +104,46 @@ static inline void tdx_module_call(u64 fn, u64 rcx, u64 rdx, u64 r8, u64 r9, >> panic("TDCALL %lld failed (Buggy TDX module!)\n", fn); >> } >> >> +/* >> + * tdx_mcall_tdreport() - Generate TDREPORT_STRUCT using TDCALL. >> + * >> + * @data : Address of 1024B aligned data to store >> + * TDREPORT_STRUCT. >> + * @reportdata : Address of 64B aligned report data >> + * >> + * return 0 on success or failure error number. >> + */ >> +long tdx_mcall_tdreport(void *data, void *reportdata) >> +{ >> + u64 ret; >> + >> + /* >> + * Check for a valid TDX guest to ensure this API is only >> + * used by TDX guest platform. Also make sure "data" and >> + * "reportdata" pointers are valid. >> + */ >> + if (!data || !reportdata || !cpu_feature_enabled(X86_FEATURE_TDX_GUEST)) >> + return -EINVAL; > > Do we need to manually check the alignment since it is mentioned in the comment > of this function? Users are responsible to allocate aligned data. I don't think we need to add a check for it. If it is unaligned, TDCALL will return error. > >> + >> + /* >> + * Pass the physical address of user generated reportdata >> + * and the physical address of out pointer to store the >> + * TDREPORT data to the TDX module to generate the >> + * TD report. Generated data contains measurements/configuration >> + * data of the TD guest. More info about ABI can be found in TDX >> + * Guest-Host-Communication Interface (GHCI), sec titled >> + * "TDG.MR.REPORT". > > If you agree with my above comments, then this comment should be updated too: > TDG.MR.REPORT is defined in TDX module 1.0 spec. Ok. will change it.
On Mon, 2022-04-18 at 20:37 -0700, Sathyanarayanan Kuppuswamy wrote: > > On 4/18/22 7:29 PM, Kai Huang wrote: > > On Fri, 2022-04-15 at 15:01 -0700, Kuppuswamy Sathyanarayanan wrote: > > > In TDX guest, attestation is mainly used to verify the trustworthiness > > > of a TD to the 3rd party key servers. > > > > > > > "key servers" is only a use case of using the attestation service. This sentence > > looks not accurate. > > I thought it is mainly used for this use case. If it is not accurate, > how about following? > > Attestation is used to verify the trustworthiness of a TD to the other > 3rd party entities (like key servers) before exchanging sensitive > information. Fine to me, although not sure whether you need to mention key servers. We Intel guys has some first impression of what does "key servers" mean mainly because we defined some use cases around here using attestation. However for other people "key servers" can be very generic and may not be the case we defined. > > > > > > First step in attestation process > > > is to get the TDREPORT data and the generated data is further used in > > > subsequent steps of the attestation process. TDREPORT data contains > > > details like TDX module version information, measurement of the TD, > > > along with a TD-specified nonce > > > > > > Add a wrapper function (tdx_mcall_tdreport()) to get the TDREPORT from > > > the TDX Module. > > > > > > More details about the TDREPORT TDCALL can be found in TDX Guest-Host > > > Communication Interface (GHCI) for Intel TDX 1.5, section titled > > > "TDCALL [MR.REPORT]". > > > > Attestation is a must for TDX architecture, so The TDCALL[MR.REPORT] is > > available in TDX 1.0. I don't think we should use TDX 1.5 here. And this > > Yes. It is also part of v1.0. Since the feature is similar between v1.0 > and v1.5, I have included one link. If v1.0 reference is preferred, I > will update it. I think we should use 1.0. Attestation is a essential part for TDX, which means it must be included in TDX1.0, therefore it doesn't make sense to use TDX1.5 to reference it. [...] > > > +/* > > > + * tdx_mcall_tdreport() - Generate TDREPORT_STRUCT using TDCALL. > > > + * > > > + * @data : Address of 1024B aligned data to store > > > + * TDREPORT_STRUCT. > > > + * @reportdata : Address of 64B aligned report data > > > + * > > > + * return 0 on success or failure error number. > > > + */ > > > +long tdx_mcall_tdreport(void *data, void *reportdata) > > > +{ > > > + u64 ret; > > > + > > > + /* > > > + * Check for a valid TDX guest to ensure this API is only > > > + * used by TDX guest platform. Also make sure "data" and > > > + * "reportdata" pointers are valid. > > > + */ > > > + if (!data || !reportdata || !cpu_feature_enabled(X86_FEATURE_TDX_GUEST)) > > > + return -EINVAL; > > > > Do we need to manually check the alignment since it is mentioned in the comment > > of this function? > > Users are responsible to allocate aligned data. I don't think we need > to add a check for it. If it is unaligned, TDCALL will return error. Actually this is the kernel memory, but not user memory. Otherwise virt_to_phys() doesn't make sense. You copied the user data to kernel memory in the last patch. So whether user memory is aligned doesn't matter, and in last patch, you have guaranteed the alignment is met during kernel memory allocation. Anyway like you said the TDCALL will fail if alignment doesn't meet, so I guess is fine.
On 4/18/22 8:51 PM, Kai Huang wrote: >> Users are responsible to allocate aligned data. I don't think we need >> to add a check for it. If it is unaligned, TDCALL will return error. > Actually this is the kernel memory, but not user memory. Otherwise > virt_to_phys() doesn't make sense. You copied the user data to kernel memory in > the last patch. So whether user memory is aligned doesn't matter, and in last > patch, you have guaranteed the alignment is met during kernel memory allocation. I mean't user of this API (not user space). But I agree with your comments.
diff --git a/arch/x86/coco/tdx/tdx.c b/arch/x86/coco/tdx/tdx.c index 03deb4d6920d..3e409b618d3f 100644 --- a/arch/x86/coco/tdx/tdx.c +++ b/arch/x86/coco/tdx/tdx.c @@ -11,10 +11,12 @@ #include <asm/insn.h> #include <asm/insn-eval.h> #include <asm/pgtable.h> +#include <asm/io.h> /* TDX module Call Leaf IDs */ #define TDX_GET_INFO 1 #define TDX_GET_VEINFO 3 +#define TDX_GET_REPORT 4 #define TDX_ACCEPT_PAGE 6 /* TDX hypercall Leaf IDs */ @@ -34,6 +36,10 @@ #define VE_GET_PORT_NUM(e) ((e) >> 16) #define VE_IS_IO_STRING(e) ((e) & BIT(4)) +/* TDX Module call error codes */ +#define TDCALL_RETURN_CODE_MASK 0xffffffff00000000 +#define TDCALL_RETURN_CODE(a) ((a) & TDCALL_RETURN_CODE_MASK) + /* * Wrapper for standard use of __tdx_hypercall with no output aside from * return code. @@ -98,6 +104,46 @@ static inline void tdx_module_call(u64 fn, u64 rcx, u64 rdx, u64 r8, u64 r9, panic("TDCALL %lld failed (Buggy TDX module!)\n", fn); } +/* + * tdx_mcall_tdreport() - Generate TDREPORT_STRUCT using TDCALL. + * + * @data : Address of 1024B aligned data to store + * TDREPORT_STRUCT. + * @reportdata : Address of 64B aligned report data + * + * return 0 on success or failure error number. + */ +long tdx_mcall_tdreport(void *data, void *reportdata) +{ + u64 ret; + + /* + * Check for a valid TDX guest to ensure this API is only + * used by TDX guest platform. Also make sure "data" and + * "reportdata" pointers are valid. + */ + if (!data || !reportdata || !cpu_feature_enabled(X86_FEATURE_TDX_GUEST)) + return -EINVAL; + + /* + * Pass the physical address of user generated reportdata + * and the physical address of out pointer to store the + * TDREPORT data to the TDX module to generate the + * TD report. Generated data contains measurements/configuration + * data of the TD guest. More info about ABI can be found in TDX + * Guest-Host-Communication Interface (GHCI), sec titled + * "TDG.MR.REPORT". + */ + ret = __tdx_module_call(TDX_GET_REPORT, virt_to_phys(data), + virt_to_phys(reportdata), 0, 0, NULL); + + if (ret) + return TDCALL_RETURN_CODE(ret); + + return 0; +} +EXPORT_SYMBOL_GPL(tdx_mcall_tdreport); + static u64 get_cc_mask(void) { struct tdx_module_output out; diff --git a/arch/x86/include/asm/tdx.h b/arch/x86/include/asm/tdx.h index 020c81a7c729..a151f69dd6ef 100644 --- a/arch/x86/include/asm/tdx.h +++ b/arch/x86/include/asm/tdx.h @@ -67,6 +67,8 @@ void tdx_safe_halt(void); bool tdx_early_handle_ve(struct pt_regs *regs); +long tdx_mcall_tdreport(void *data, void *reportdata); + #else static inline void tdx_early_init(void) { };