Hi Dan,
On 6/12/23 12:03 PM, Dan Williams wrote:
[ add David, Brijesh, and Atish]
Kuppuswamy Sathyanarayanan wrote:
In TDX guest, the second stage of the attestation process is Quote generation. This process is required to convert the locally generated TDREPORT into a remotely verifiable Quote. It involves sending the TDREPORT data to a Quoting Enclave (QE) which will verify the integrity of the TDREPORT and sign it with an attestation key.
Intel's TDX attestation driver exposes TDX_CMD_GET_QUOTE IOCTL to allow the user agent to get the TD Quote.
Add a kernel selftest module to verify the Quote generation feature.
TD Quote generation involves following steps:
- Get the TDREPORT data using TDX_CMD_GET_REPORT IOCTL.
- Embed the TDREPORT data in quote buffer and request for quote generation via TDX_CMD_GET_QUOTE IOCTL request.
- Upon completion of the GetQuote request, check for non zero value in the status field of Quote header to make sure the generated quote is valid.
What this cover letter does not say is that this is adding another instance of the similar pattern as SNP_GET_REPORT.
Linux is best served when multiple vendors trying to do similar operations are brought together behind a common ABI. We see this in the history of wrangling SCSI vendors behind common interfaces. Now multiple confidential computing vendors trying to develop similar flows with differentiated formats where that differentiation need not leak over the ABI boundary.
My observation of SNP_GET_REPORT and TDX_CMD_GET_REPORT is that they are both passing blobs across the user/kernel and platform/kernel boundary for the purposes of unlocking other resources. To me that is a flow that the Keys subsystem has infrastructure to handle. It has the concept of upcalls and asynchronous population of blobs by handles and mechanisms to protect and cache those communications. Linux / the Keys subsystem could benefit from the enhancements it would need to cover these 2 cases. Specifically, the benefit that when ARM and RISC-V arrive with similar communications with platform TSMs (Trusted Security Module) they can build upon the same infrastructure.
David, am I reaching with that association? My strawman mapping of TDX_CMD_GET_QUOTE to request_key() is something like:
request_key(coco_quote, "description", "<uuencoded tdreport>")
Where this is a common key_type for all vendors, but the description and arguments have room for vendor differentiation when doing the upcall to the platform TSM, but userspace never needs to contend with the different vendor formats, that is all handled internally to the kernel.
At this point I am just looking for confirmation that the "every vendor invent a new character device + ioctl" does not scale and a deeper conversation is needed. Keys is a plausible solution to that ABI proliferation problem.
I agree that vendor-specific interfaces do not scale, and the ABI generalization will benefit future vendors who require similar feature support. However, such generalization, in my opinion, will make more sense if the requirements at the top level are also generalized. Currently, each vendor has their own attestation flow, and the user ABI they introduced includes a lot of vendor-specific information to support it. IMO, it is difficult to hide these vendor-specific information from the user without generalizing the high level attestation flow.
I have included the attestation IOCTL interfaces used by S390, AMD SEV and TDX below for reference. As you can see, each of these ARCHs uses very different input and output data formats. It contains a lot of vendor-specific information (like the vmpl field in struct snp_report_req or the meas_addr, arcb_adr in struct uvio_attest). The only thing I see in common is the use of input and output blobs.
Even if we just generalize the ABI now, I'm not sure if the unified ABI we create now will meet the requirements of RISC-v or ARM platforms when they introduce their own attestation flow in the future. My thinking is that without some sort of arch-agnostic high-level attestation workflow, ABI generalization has very little benefit.
====================================================================== // Following are S390 specific attestation struct drivers/s390/char/uvdevice.c
struct uvio_ioctl_cb { __u32 flags; __u16 uv_rc; /* UV header rc value */ __u16 uv_rrc; /* UV header rrc value */ __u64 argument_addr; /* Userspace address of uvio argument */ __u32 argument_len; __u8 reserved14[0x40 - 0x14]; /* must be zero */ };
#define UVIO_ATT_USER_DATA_LEN 0x100 #define UVIO_ATT_UID_LEN 0x10
struct uvio_attest { __u64 arcb_addr; /* 0x0000 */ __u64 meas_addr; /* 0x0008 */ __u64 add_data_addr; /* 0x0010 */ __u8 user_data[UVIO_ATT_USER_DATA_LEN]; /* 0x0018 */ __u8 config_uid[UVIO_ATT_UID_LEN]; /* 0x0118 */ __u32 arcb_len; /* 0x0128 */ __u32 meas_len; /* 0x012c */ __u32 add_data_len; /* 0x0130 */ __u16 user_data_len; /* 0x0134 */ __u16 reserved136; /* 0x0136 */ };
#define UVIO_DEVICE_NAME "uv" #define UVIO_TYPE_UVC 'u'
#define UVIO_IOCTL_ATT _IOWR(UVIO_TYPE_UVC, 0x01, struct uvio_ioctl_cb)
// Following are TDX specific interfaces drivers/virt/coco/tdx-guest/tdx-guest.c
/** * struct tdx_report_req - Request struct for TDX_CMD_GET_REPORT0 IOCTL. * * @reportdata: User buffer with REPORTDATA to be included into TDREPORT. * Typically it can be some nonce provided by attestation * service, so the generated TDREPORT can be uniquely verified. * @tdreport: User buffer to store TDREPORT output from TDCALL[TDG.MR.REPORT]. */ struct tdx_report_req { __u8 reportdata[TDX_REPORTDATA_LEN]; __u8 tdreport[TDX_REPORT_LEN]; };
/* struct tdx_quote_buf: Format of Quote request buffer. * @version: Quote format version, filled by TD. * @status: Status code of Quote request, filled by VMM. * @in_len: Length of TDREPORT, filled by TD. * @out_len: Length of Quote data, filled by VMM. * @data: Quote data on output or TDREPORT on input. * * More details of Quote request buffer can be found in TDX * Guest-Host Communication Interface (GHCI) for Intel TDX 1.0, * section titled "TDG.VP.VMCALL<GetQuote>" */ struct tdx_quote_buf { __u64 version; __u64 status; __u32 in_len; __u32 out_len; __u64 data[]; };
/* struct tdx_quote_req: Request struct for TDX_CMD_GET_QUOTE IOCTL. * @buf: Address of user buffer in the format of struct tdx_quote_buf. * Upon successful completion of IOCTL, output is copied back to * the same buffer (in struct tdx_quote_buf.data). * @len: Length of the Quote buffer. */ struct tdx_quote_req { __u64 buf; __u64 len; };
/* * TDX_CMD_GET_REPORT0 - Get TDREPORT0 (a.k.a. TDREPORT subtype 0) using * TDCALL[TDG.MR.REPORT] * * Return 0 on success, -EIO on TDCALL execution failure, and * standard errno on other general error cases. */ #define TDX_CMD_GET_REPORT0 _IOWR('T', 1, struct tdx_report_req)
/* * TDX_CMD_GET_QUOTE - Get TD Guest Quote from QE/QGS using GetQuote * TDVMCALL. * * Returns 0 on success or standard errno on other failures. */ #define TDX_CMD_GET_QUOTE _IOWR('T', 2, struct tdx_quote_req)
// Following are AMD SEV specific interfaces drivers/virt/coco/sev-guest/sev-guest.c
struct snp_report_req { /* user data that should be included in the report */ __u8 user_data[64];
/* The vmpl level to be included in the report */ __u32 vmpl;
/* Must be zero filled */ __u8 rsvd[28]; };
struct snp_report_resp { /* response data, see SEV-SNP spec for the format */ __u8 data[4000]; };
struct snp_guest_request_ioctl { /* message version number (must be non-zero) */ __u8 msg_version;
/* Request and response structure address */ __u64 req_data; __u64 resp_data;
/* bits[63:32]: VMM error code, bits[31:0] firmware error code (see psp-sev.h) */ union { __u64 exitinfo2; struct { __u32 fw_error; __u32 vmm_error; }; }; };
/* Get SNP attestation report */ #define SNP_GET_REPORT _IOWR(SNP_GUEST_REQ_IOC_TYPE, 0x0, struct snp_guest_request_ioctl) ======================================================================
In addition to GetReport support, each of these guest attestation drivers includes IOCTLs to handle vendor-specific needs (such as Derived key support in the SEV driver or RTMR Extend support in the TDX guest driver). So we cannot completely unify all IOCTL interfaces in these drivers.