Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Dan J Williams | 1721 | 100.00% | 1 | 100.00% |
Total | 1721 | 1 |
// SPDX-License-Identifier: GPL-2.0-only /* Copyright(c) 2023 Intel Corporation. All rights reserved. */ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt #include <linux/tsm.h> #include <linux/err.h> #include <linux/slab.h> #include <linux/rwsem.h> #include <linux/string.h> #include <linux/module.h> #include <linux/cleanup.h> #include <linux/configfs.h> static struct tsm_provider { const struct tsm_ops *ops; const struct config_item_type *type; void *data; } provider; static DECLARE_RWSEM(tsm_rwsem); /** * DOC: Trusted Security Module (TSM) Attestation Report Interface * * The TSM report interface is a common provider of blobs that facilitate * attestation of a TVM (confidential computing guest) by an attestation * service. A TSM report combines a user-defined blob (likely a public-key with * a nonce for a key-exchange protocol) with a signed attestation report. That * combined blob is then used to obtain secrets provided by an agent that can * validate the attestation report. The expectation is that this interface is * invoked infrequently, however configfs allows for multiple agents to * own their own report generation instances to generate reports as * often as needed. * * The attestation report format is TSM provider specific, when / if a standard * materializes that can be published instead of the vendor layout. Until then * the 'provider' attribute indicates the format of 'outblob', and optionally * 'auxblob'. */ struct tsm_report_state { struct tsm_report report; unsigned long write_generation; unsigned long read_generation; struct config_item cfg; }; enum tsm_data_select { TSM_REPORT, TSM_CERTS, }; static struct tsm_report *to_tsm_report(struct config_item *cfg) { struct tsm_report_state *state = container_of(cfg, struct tsm_report_state, cfg); return &state->report; } static struct tsm_report_state *to_state(struct tsm_report *report) { return container_of(report, struct tsm_report_state, report); } static int try_advance_write_generation(struct tsm_report *report) { struct tsm_report_state *state = to_state(report); lockdep_assert_held_write(&tsm_rwsem); /* * Malicious or broken userspace has written enough times for * read_generation == write_generation by modular arithmetic without an * interim read. Stop accepting updates until the current report * configuration is read. */ if (state->write_generation == state->read_generation - 1) return -EBUSY; state->write_generation++; return 0; } static ssize_t tsm_report_privlevel_store(struct config_item *cfg, const char *buf, size_t len) { struct tsm_report *report = to_tsm_report(cfg); unsigned int val; int rc; rc = kstrtouint(buf, 0, &val); if (rc) return rc; /* * The valid privilege levels that a TSM might accept, if it accepts a * privilege level setting at all, are a max of TSM_PRIVLEVEL_MAX (see * SEV-SNP GHCB) and a minimum of a TSM selected floor value no less * than 0. */ if (provider.ops->privlevel_floor > val || val > TSM_PRIVLEVEL_MAX) return -EINVAL; guard(rwsem_write)(&tsm_rwsem); rc = try_advance_write_generation(report); if (rc) return rc; report->desc.privlevel = val; return len; } CONFIGFS_ATTR_WO(tsm_report_, privlevel); static ssize_t tsm_report_privlevel_floor_show(struct config_item *cfg, char *buf) { guard(rwsem_read)(&tsm_rwsem); return sysfs_emit(buf, "%u\n", provider.ops->privlevel_floor); } CONFIGFS_ATTR_RO(tsm_report_, privlevel_floor); static ssize_t tsm_report_inblob_write(struct config_item *cfg, const void *buf, size_t count) { struct tsm_report *report = to_tsm_report(cfg); int rc; guard(rwsem_write)(&tsm_rwsem); rc = try_advance_write_generation(report); if (rc) return rc; report->desc.inblob_len = count; memcpy(report->desc.inblob, buf, count); return count; } CONFIGFS_BIN_ATTR_WO(tsm_report_, inblob, NULL, TSM_INBLOB_MAX); static ssize_t tsm_report_generation_show(struct config_item *cfg, char *buf) { struct tsm_report *report = to_tsm_report(cfg); struct tsm_report_state *state = to_state(report); guard(rwsem_read)(&tsm_rwsem); return sysfs_emit(buf, "%lu\n", state->write_generation); } CONFIGFS_ATTR_RO(tsm_report_, generation); static ssize_t tsm_report_provider_show(struct config_item *cfg, char *buf) { guard(rwsem_read)(&tsm_rwsem); return sysfs_emit(buf, "%s\n", provider.ops->name); } CONFIGFS_ATTR_RO(tsm_report_, provider); static ssize_t __read_report(struct tsm_report *report, void *buf, size_t count, enum tsm_data_select select) { loff_t offset = 0; ssize_t len; u8 *out; if (select == TSM_REPORT) { out = report->outblob; len = report->outblob_len; } else { out = report->auxblob; len = report->auxblob_len; } /* * Recall that a NULL @buf is configfs requesting the size of * the buffer. */ if (!buf) return len; return memory_read_from_buffer(buf, count, &offset, out, len); } static ssize_t read_cached_report(struct tsm_report *report, void *buf, size_t count, enum tsm_data_select select) { struct tsm_report_state *state = to_state(report); guard(rwsem_read)(&tsm_rwsem); if (!report->desc.inblob_len) return -EINVAL; /* * A given TSM backend always fills in ->outblob regardless of * whether the report includes an auxblob or not. */ if (!report->outblob || state->read_generation != state->write_generation) return -EWOULDBLOCK; return __read_report(report, buf, count, select); } static ssize_t tsm_report_read(struct tsm_report *report, void *buf, size_t count, enum tsm_data_select select) { struct tsm_report_state *state = to_state(report); const struct tsm_ops *ops; ssize_t rc; /* try to read from the existing report if present and valid... */ rc = read_cached_report(report, buf, count, select); if (rc >= 0 || rc != -EWOULDBLOCK) return rc; /* slow path, report may need to be regenerated... */ guard(rwsem_write)(&tsm_rwsem); ops = provider.ops; if (!ops) return -ENOTTY; if (!report->desc.inblob_len) return -EINVAL; /* did another thread already generate this report? */ if (report->outblob && state->read_generation == state->write_generation) goto out; kvfree(report->outblob); kvfree(report->auxblob); report->outblob = NULL; report->auxblob = NULL; rc = ops->report_new(report, provider.data); if (rc < 0) return rc; state->read_generation = state->write_generation; out: return __read_report(report, buf, count, select); } static ssize_t tsm_report_outblob_read(struct config_item *cfg, void *buf, size_t count) { struct tsm_report *report = to_tsm_report(cfg); return tsm_report_read(report, buf, count, TSM_REPORT); } CONFIGFS_BIN_ATTR_RO(tsm_report_, outblob, NULL, TSM_OUTBLOB_MAX); static ssize_t tsm_report_auxblob_read(struct config_item *cfg, void *buf, size_t count) { struct tsm_report *report = to_tsm_report(cfg); return tsm_report_read(report, buf, count, TSM_CERTS); } CONFIGFS_BIN_ATTR_RO(tsm_report_, auxblob, NULL, TSM_OUTBLOB_MAX); #define TSM_DEFAULT_ATTRS() \ &tsm_report_attr_generation, \ &tsm_report_attr_provider static struct configfs_attribute *tsm_report_attrs[] = { TSM_DEFAULT_ATTRS(), NULL, }; static struct configfs_attribute *tsm_report_extra_attrs[] = { TSM_DEFAULT_ATTRS(), &tsm_report_attr_privlevel, &tsm_report_attr_privlevel_floor, NULL, }; #define TSM_DEFAULT_BIN_ATTRS() \ &tsm_report_attr_inblob, \ &tsm_report_attr_outblob static struct configfs_bin_attribute *tsm_report_bin_attrs[] = { TSM_DEFAULT_BIN_ATTRS(), NULL, }; static struct configfs_bin_attribute *tsm_report_bin_extra_attrs[] = { TSM_DEFAULT_BIN_ATTRS(), &tsm_report_attr_auxblob, NULL, }; static void tsm_report_item_release(struct config_item *cfg) { struct tsm_report *report = to_tsm_report(cfg); struct tsm_report_state *state = to_state(report); kvfree(report->auxblob); kvfree(report->outblob); kfree(state); } static struct configfs_item_operations tsm_report_item_ops = { .release = tsm_report_item_release, }; const struct config_item_type tsm_report_default_type = { .ct_owner = THIS_MODULE, .ct_bin_attrs = tsm_report_bin_attrs, .ct_attrs = tsm_report_attrs, .ct_item_ops = &tsm_report_item_ops, }; EXPORT_SYMBOL_GPL(tsm_report_default_type); const struct config_item_type tsm_report_extra_type = { .ct_owner = THIS_MODULE, .ct_bin_attrs = tsm_report_bin_extra_attrs, .ct_attrs = tsm_report_extra_attrs, .ct_item_ops = &tsm_report_item_ops, }; EXPORT_SYMBOL_GPL(tsm_report_extra_type); static struct config_item *tsm_report_make_item(struct config_group *group, const char *name) { struct tsm_report_state *state; guard(rwsem_read)(&tsm_rwsem); if (!provider.ops) return ERR_PTR(-ENXIO); state = kzalloc(sizeof(*state), GFP_KERNEL); if (!state) return ERR_PTR(-ENOMEM); config_item_init_type_name(&state->cfg, name, provider.type); return &state->cfg; } static struct configfs_group_operations tsm_report_group_ops = { .make_item = tsm_report_make_item, }; static const struct config_item_type tsm_reports_type = { .ct_owner = THIS_MODULE, .ct_group_ops = &tsm_report_group_ops, }; static const struct config_item_type tsm_root_group_type = { .ct_owner = THIS_MODULE, }; static struct configfs_subsystem tsm_configfs = { .su_group = { .cg_item = { .ci_namebuf = "tsm", .ci_type = &tsm_root_group_type, }, }, .su_mutex = __MUTEX_INITIALIZER(tsm_configfs.su_mutex), }; int tsm_register(const struct tsm_ops *ops, void *priv, const struct config_item_type *type) { const struct tsm_ops *conflict; if (!type) type = &tsm_report_default_type; if (!(type == &tsm_report_default_type || type == &tsm_report_extra_type)) return -EINVAL; guard(rwsem_write)(&tsm_rwsem); conflict = provider.ops; if (conflict) { pr_err("\"%s\" ops already registered\n", conflict->name); return -EBUSY; } provider.ops = ops; provider.data = priv; provider.type = type; return 0; } EXPORT_SYMBOL_GPL(tsm_register); int tsm_unregister(const struct tsm_ops *ops) { guard(rwsem_write)(&tsm_rwsem); if (ops != provider.ops) return -EBUSY; provider.ops = NULL; provider.data = NULL; provider.type = NULL; return 0; } EXPORT_SYMBOL_GPL(tsm_unregister); static struct config_group *tsm_report_group; static int __init tsm_init(void) { struct config_group *root = &tsm_configfs.su_group; struct config_group *tsm; int rc; config_group_init(root); rc = configfs_register_subsystem(&tsm_configfs); if (rc) return rc; tsm = configfs_register_default_group(root, "report", &tsm_reports_type); if (IS_ERR(tsm)) { configfs_unregister_subsystem(&tsm_configfs); return PTR_ERR(tsm); } tsm_report_group = tsm; return 0; } module_init(tsm_init); static void __exit tsm_exit(void) { configfs_unregister_default_group(tsm_report_group); configfs_unregister_subsystem(&tsm_configfs); } module_exit(tsm_exit); MODULE_LICENSE("GPL"); MODULE_DESCRIPTION("Provide Trusted Security Module attestation reports via configfs");
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1