From nobody Wed May 15 05:12:51 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=reject dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1683222773; cv=none; d=zohomail.com; s=zohoarc; b=E6/yjpMqWdbn6y4GuyMzAqDV+vumOaqNop1E8uK0Pd5S2OpzQRhSkR6Ks/vFCHdtCb1FywFtxWI5TBTjnPkbUb3hyy43D5H+/Oa9Q9YnVyS2raIHPQ50PuaJTmc3wYDQft5lrOCFgndg4fvuIUmYzMtzYUepbSR70pvN1La5zaA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1683222773; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=A4wRqqvYaf2KNyTEsk6w/PKFhD6Sif/M23cX//M4VLs=; b=Vrlvgb6TS1N44rPWOXa0pCFaEiiK//SZ7a7d1YmPnhwZxjvcuwmkTER97DVZXQjZKQhfJFQzrTR8F7x/g8r44iWMbdQ68kYmkauTx1FmN1imPp0GlWjWRILlocytF+alIaf+7t3Mn3sxAKiXiuAMXQew4eMlRKvRfcYH6ANpH1A= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1683222773343289.7032482538724; Thu, 4 May 2023 10:52:53 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.529860.824763 (Exim 4.92) (envelope-from ) id 1pud7w-0002Dr-QE; Thu, 04 May 2023 17:52:24 +0000 Received: by outflank-mailman (output) from mailman id 529860.824763; Thu, 04 May 2023 17:52:24 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1pud7w-0002Dk-Ne; Thu, 04 May 2023 17:52:24 +0000 Received: by outflank-mailman (input) for mailman id 529860; Thu, 04 May 2023 17:52:23 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1pud7v-0002DN-EY for xen-devel@lists.xenproject.org; Thu, 04 May 2023 17:52:23 +0000 Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 69803ca4-eaa4-11ed-8611-37d641c3527e; Thu, 04 May 2023 19:52:20 +0200 (CEST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 69803ca4-eaa4-11ed-8611-37d641c3527e DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1683222740; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=5qFBWRn+htczPnXVdTK5WICwefSMT3Q2LMY9OHfchM4=; b=di6sE8CNnl09xf4LGxLiO+Kzt+0Aus/H6DQs5PSKnFT+lfi/wK82A32s y537SKQsYts/4NF03aJ7KmYegZiknnTjCuaBD0Nc/8up1TKY/HiWaIU4E qGgSY8XZ8wNjJx/kZtrB6NH0GtRpLQo86GFKvf0+u0+9rq2Dbujb3FZkC o=; Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none X-SBRS: 4.0 X-MesageID: 107227937 X-Ironport-Server: esa6.hc3370-68.iphmx.com X-Remote-IP: 162.221.156.123 X-Policy: $RELAYED IronPort-Data: A9a23:geWnQaqe30qjIUNIurtNiu97iL1eBmJjZRIvgKrLsJaIsI4StFCzt garIBmPOKmOZGb0eYx2O9+0o0MC68ODn9FmQQpp/i8zEStGopuZCYyVIHmrMnLJJKUvbq7FA +Y2MYCccZ9uHhcwgj/3b9ANeFEljfngqoLUUbKCYWYpA1c/Ek/NsDo788YhmIlknNOlNA2Ev NL2sqX3NUSsnjV5KQr40YrawP9UlKm06WJwUmAWP6gR5weDzyVNVvrzGInqR5fGatgMdgKFb 76rIIGRpgvx4xorA9W5pbf3GmVirmn6ZFXmZtJ+AsBOszAazsAA+v9T2Mk0MC+7vw6hjdFpo OihgLTrIesf0g8gr8xGO/VQO3kW0aSrY9YrK1Dn2SCY5xWun3cBX5yCpaz5VGEV0r8fPI1Ay RAXABdUVkimuf2Q+p74VcdVlNoKN8LpNoxK7xmMzRmBZRonaZXKQqGM7t5ExjYgwMtJGJ4yZ eJAN2ApNk6ZJUQSZBFOUslWcOSA3xETdxVapVSTpKQ6+S7TwRZ73aLxGNHUZsaLVYNemUPwS mfupjymWEtFZYfAodaD2kD1p+iMpyHEZLk9Gp622v56jEaK1mNGXXX6UnPk+KLk2yZSQel3O 0ESvyYjs6U23EiqVcXmGQ21pmaeuRwRUMYWFPc1gCmPwKfJ5weSBkAfUyVMLtchsaceRzUs2 kWYgtDBCjlmsbnTQnWYnop4thvrZ3JTdzVbI3ZZE01cuYKLTJwPYgznaY9bSIuLkfvPNXLv7 QmYsgEljLcZgptev0mkxmwrkw5At7CQEF5uvlyNDj36hu9qTNX7PtL1sDA3+d4Fdd/EFQfZ4 RDojuDEtIgz4YexeDthqQnnNJWg/L67PTLVmjaD9LFxpm32qxZPkW29iQySxXuF0e5eI1cFm GeJ5WtsCGZ7ZRNGl5NfbYOrENgNxqP9D9njXf28RoMQMsMoKFfepHkxNBP4M4XRraTRuftnZ cfznTiEVB729piLPBLpHrxAgNfHNwg1xH/JRICT8ilLJYG2PSbPIZ9caQvmUwzMxP/cyOkj2 4oFZpTiJtQ2eLGWXxQ7BqZKdAhacSRiWMGvwyGVH8baSjdb9KgaI6e56dscl0ZNxcy5Ss+gE qmBZ3Jl IronPort-HdrOrdr: A9a23:TJyWZa2jJP94q5K3v9H7AgqjBHokLtp133Aq2lEZdPU1SL3kqy nKpp8mPHDP5gr5NEtMpTnCAsm9qArnhPhICNAqTM6ftWrd2VdATrsSl7cKqgeIc0fDH4hmpN xdmsNFZ+EYY2IXsS+02njaL/8QhPSK9aC2ifzPpk0dKD2DDMlbnn9E46ugYylLrU19dP0EPY vZ4sZcvTKvdVYafq2Adxs4Y9Q= X-Talos-CUID: =?us-ascii?q?9a23=3AN3k39Wo/6zK/wCVBvO1ZGb3mUed8SiX48mj2GWP?= =?us-ascii?q?7FkhQWqO8UlSS8qwxxg=3D=3D?= X-Talos-MUID: 9a23:1KeTzgWZMAshFj7q/A21pTYhDsVX35+BBmMDvZUWt9KdJSMlbg== X-IronPort-AV: E=Sophos;i="5.99,250,1677560400"; d="scan'208";a="107227937" From: Jennifer Herbert To: Xen-devel CC: Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Jason Andryuk , Jennifer Herbert Subject: [PATCH v4 1/2] acpi: Make TPM version configurable. Date: Thu, 4 May 2023 17:51:45 +0000 Message-ID: <20230504175146.208936-2-jennifer.herbert@citrix.com> X-Mailer: git-send-email 2.39.1 In-Reply-To: <20230504175146.208936-1-jennifer.herbert@citrix.com> References: <20230504175146.208936-1-jennifer.herbert@citrix.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @citrix.com) X-ZM-MESSAGEID: 1683222775924100001 This patch makes the TPM version, for which the ACPI library probes, config= urable. If acpi_config.tpm_verison is set to 1, it indicates that 1.2 (TCPA) should= be probed. I have also added to hvmloader an option to allow setting this new config, = which can be triggered by setting the platform/tpm_verion xenstore key. Signed-off-by: Jennifer Herbert Reviewed-by: Jason Andryuk Acked-by: Jan Beulich --- CC: Jan Beulich CC: Andrew Cooper CC: Roger Pau Monn=C3=A9 CC: Jason Andryuk v4: * Omit tpm_version 0 case, to fallback to 1.2, previously intended for compatibility for unknown code. * Add checks for xenstore tpm_version field. * Minor code style fixes. v3: * Default to probing for 1.2 TPM, if xenstore tpm_version field missing or tpm flag set, but not the TPM version. (Functional revert change in v= 2) * Correct TPM flag setting v2: * Split patch into two. * Default not to probe a TPM, unless tpm_version xenstore field set. * Minor code style fixes. --- docs/misc/xenstore-paths.pandoc | 9 +++++ tools/firmware/hvmloader/util.c | 28 ++++++++++---- tools/libacpi/build.c | 68 ++++++++++++++++++--------------- tools/libacpi/libacpi.h | 3 +- 4 files changed, 70 insertions(+), 38 deletions(-) diff --git a/docs/misc/xenstore-paths.pandoc b/docs/misc/xenstore-paths.pan= doc index 5cd5c8a3b9..e67e164855 100644 --- a/docs/misc/xenstore-paths.pandoc +++ b/docs/misc/xenstore-paths.pandoc @@ -269,6 +269,15 @@ at the guest physical address in HVM_PARAM_VM_GENERATI= ON_ID_ADDR. See Microsoft's "Virtual Machine Generation ID" specification for the circumstances where the generation ID needs to be changed. =20 + +#### ~/platform/tpm_version =3D INTEGER [HVM,INTERNAL] + +The TPM version to be probed for. + +A value of 1 indicates to probe for TPM 1.2. +A value of 0 or an invalid value will result in no TPM being probed. +If unset, a default of 1 is assumed. + ### Frontend device paths =20 Paravirtual device frontends are generally specified by their own diff --git a/tools/firmware/hvmloader/util.c b/tools/firmware/hvmloader/uti= l.c index 581b35e5cf..1b733a3091 100644 --- a/tools/firmware/hvmloader/util.c +++ b/tools/firmware/hvmloader/util.c @@ -920,6 +920,8 @@ void hvmloader_acpi_build_tables(struct acpi_config *co= nfig, { const char *s; struct acpi_ctxt ctxt; + long long tpm_version =3D 0; + char *end; =20 /* Allocate and initialise the acpi info area. */ mem_hole_populate_ram(ACPI_INFO_PHYSICAL_ADDRESS >> PAGE_SHIFT, 1); @@ -967,8 +969,6 @@ void hvmloader_acpi_build_tables(struct acpi_config *co= nfig, s =3D xenstore_read("platform/generation-id", "0:0"); if ( s ) { - char *end; - config->vm_gid[0] =3D strtoll(s, &end, 0); config->vm_gid[1] =3D 0; if ( end && end[0] =3D=3D ':' ) @@ -994,13 +994,27 @@ void hvmloader_acpi_build_tables(struct acpi_config *= config, if ( !strncmp(xenstore_read("platform/acpi_laptop_slate", "0"), "1", 1= ) ) config->table_flags |=3D ACPI_HAS_SSDT_LAPTOP_SLATE; =20 - config->table_flags |=3D (ACPI_HAS_TCPA | ACPI_HAS_IOAPIC | - ACPI_HAS_WAET | ACPI_HAS_PMTIMER | - ACPI_HAS_BUTTONS | ACPI_HAS_VGA | - ACPI_HAS_8042 | ACPI_HAS_CMOS_RTC); + config->table_flags |=3D (ACPI_HAS_IOAPIC | ACPI_HAS_WAET | + ACPI_HAS_PMTIMER | ACPI_HAS_BUTTONS | + ACPI_HAS_VGA | ACPI_HAS_8042 | + ACPI_HAS_CMOS_RTC); config->acpi_revision =3D 4; =20 - config->tis_hdr =3D (uint16_t *)ACPI_TIS_HDR_ADDRESS; + config->tpm_version =3D 0; + s =3D xenstore_read("platform/tpm_version", "1"); + tpm_version =3D strtoll(s, &end, 0); + + if ( end && end[0] =3D=3D '\0' ) + { + switch ( tpm_version ) + { + case 1: + config->table_flags |=3D ACPI_HAS_TPM; + config->tis_hdr =3D (uint16_t *)ACPI_TIS_HDR_ADDRESS; + config->tpm_version =3D 1; + break; + } + } =20 config->numa.nr_vmemranges =3D nr_vmemranges; config->numa.nr_vnodes =3D nr_vnodes; diff --git a/tools/libacpi/build.c b/tools/libacpi/build.c index fe2db66a62..bb0d0557d4 100644 --- a/tools/libacpi/build.c +++ b/tools/libacpi/build.c @@ -409,38 +409,46 @@ static int construct_secondary_tables(struct acpi_ctx= t *ctxt, memcpy(ssdt, ssdt_laptop_slate, sizeof(ssdt_laptop_slate)); table_ptrs[nr_tables++] =3D ctxt->mem_ops.v2p(ctxt, ssdt); } - - /* TPM TCPA and SSDT. */ - if ( (config->table_flags & ACPI_HAS_TCPA) && - (config->tis_hdr[0] !=3D 0 && config->tis_hdr[0] !=3D 0xffff) && - (config->tis_hdr[1] !=3D 0 && config->tis_hdr[1] !=3D 0xffff) ) + /* TPM and its SSDT. */ + if ( config->table_flags & ACPI_HAS_TPM ) { - ssdt =3D ctxt->mem_ops.alloc(ctxt, sizeof(ssdt_tpm), 16); - if (!ssdt) return -1; - memcpy(ssdt, ssdt_tpm, sizeof(ssdt_tpm)); - table_ptrs[nr_tables++] =3D ctxt->mem_ops.v2p(ctxt, ssdt); - - tcpa =3D ctxt->mem_ops.alloc(ctxt, sizeof(struct acpi_20_tcpa), 16= ); - if (!tcpa) return -1; - memset(tcpa, 0, sizeof(*tcpa)); - table_ptrs[nr_tables++] =3D ctxt->mem_ops.v2p(ctxt, tcpa); - - tcpa->header.signature =3D ACPI_2_0_TCPA_SIGNATURE; - tcpa->header.length =3D sizeof(*tcpa); - tcpa->header.revision =3D ACPI_2_0_TCPA_REVISION; - fixed_strcpy(tcpa->header.oem_id, ACPI_OEM_ID); - fixed_strcpy(tcpa->header.oem_table_id, ACPI_OEM_TABLE_ID); - tcpa->header.oem_revision =3D ACPI_OEM_REVISION; - tcpa->header.creator_id =3D ACPI_CREATOR_ID; - tcpa->header.creator_revision =3D ACPI_CREATOR_REVISION; - if ( (lasa =3D ctxt->mem_ops.alloc(ctxt, ACPI_2_0_TCPA_LAML_SIZE, = 16)) !=3D NULL ) + switch ( config->tpm_version ) { - tcpa->lasa =3D ctxt->mem_ops.v2p(ctxt, lasa); - tcpa->laml =3D ACPI_2_0_TCPA_LAML_SIZE; - memset(lasa, 0, tcpa->laml); - set_checksum(tcpa, - offsetof(struct acpi_header, checksum), - tcpa->header.length); + case 1: + if ( config->tis_hdr[0] =3D=3D 0 || config->tis_hdr[0] =3D=3D = 0xffff || + config->tis_hdr[1] =3D=3D 0 || config->tis_hdr[1] =3D=3D = 0xffff ) + break; + + ssdt =3D ctxt->mem_ops.alloc(ctxt, sizeof(ssdt_tpm), 16); + if (!ssdt) return -1; + memcpy(ssdt, ssdt_tpm, sizeof(ssdt_tpm)); + table_ptrs[nr_tables++] =3D ctxt->mem_ops.v2p(ctxt, ssdt); + + tcpa =3D ctxt->mem_ops.alloc(ctxt, sizeof(struct acpi_20_tcpa)= , 16); + if (!tcpa) return -1; + memset(tcpa, 0, sizeof(*tcpa)); + table_ptrs[nr_tables++] =3D ctxt->mem_ops.v2p(ctxt, tcpa); + + tcpa->header.signature =3D ACPI_2_0_TCPA_SIGNATURE; + tcpa->header.length =3D sizeof(*tcpa); + tcpa->header.revision =3D ACPI_2_0_TCPA_REVISION; + fixed_strcpy(tcpa->header.oem_id, ACPI_OEM_ID); + fixed_strcpy(tcpa->header.oem_table_id, ACPI_OEM_TABLE_ID); + tcpa->header.oem_revision =3D ACPI_OEM_REVISION; + tcpa->header.creator_id =3D ACPI_CREATOR_ID; + tcpa->header.creator_revision =3D ACPI_CREATOR_REVISION; + + lasa =3D ctxt->mem_ops.alloc(ctxt, ACPI_2_0_TCPA_LAML_SIZE, 16= ); + if ( lasa ) + { + tcpa->lasa =3D ctxt->mem_ops.v2p(ctxt, lasa); + tcpa->laml =3D ACPI_2_0_TCPA_LAML_SIZE; + memset(lasa, 0, tcpa->laml); + set_checksum(tcpa, + offsetof(struct acpi_header, checksum), + tcpa->header.length); + } + break; } } =20 diff --git a/tools/libacpi/libacpi.h b/tools/libacpi/libacpi.h index a2efd23b0b..f69452401f 100644 --- a/tools/libacpi/libacpi.h +++ b/tools/libacpi/libacpi.h @@ -27,7 +27,7 @@ #define ACPI_HAS_SSDT_PM (1<<4) #define ACPI_HAS_SSDT_S3 (1<<5) #define ACPI_HAS_SSDT_S4 (1<<6) -#define ACPI_HAS_TCPA (1<<7) +#define ACPI_HAS_TPM (1<<7) #define ACPI_HAS_IOAPIC (1<<8) #define ACPI_HAS_WAET (1<<9) #define ACPI_HAS_PMTIMER (1<<10) @@ -66,6 +66,7 @@ struct acpi_config { =20 uint32_t table_flags; uint8_t acpi_revision; + uint8_t tpm_version; =20 uint64_t vm_gid[2]; unsigned long vm_gid_addr; /* OUT parameter */ --=20 2.39.1 From nobody Wed May 15 05:12:51 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=reject dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1683222776; cv=none; d=zohomail.com; s=zohoarc; b=AL3qfLRSdZmJ+21TQ/ngvmobitfW5D8MIsq1ZaGj+9PT5ITwQIPXm/Aqiqn/+7ldL5F/GyQ483CJfsv66jBZkwR0fRAPnB6nUT+OQSUI7CXBiCY5xcC7qzU2ljn+PcxRrvmQJVozMlH5DB+weiDcBXTM2OxqpR5hjX+ABhLHgE4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1683222776; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=D4wha4mFplSbpy/ZhOzlWI1Ht1wpO+bIHkaixlsaRQI=; b=Hdnwzy4Rnh9MS92wDly6cH5txnh3osYEpHabBHQzssKiCYcFPyYqO22AThYen6R24FzJDFiLry+tGST4jROjTr/z40jmTdZVEa32Y/d863pFLfUOQRhJUnnA5zCrPgU1fbbjPJANJM3zsZZg7gEvwJz/07zA3YUw64FYZK/ChCc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1683222776195293.60818620152077; Thu, 4 May 2023 10:52:56 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.529861.824773 (Exim 4.92) (envelope-from ) id 1pud80-0002WD-6Q; Thu, 04 May 2023 17:52:28 +0000 Received: by outflank-mailman (output) from mailman id 529861.824773; Thu, 04 May 2023 17:52:28 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1pud80-0002W6-1x; Thu, 04 May 2023 17:52:28 +0000 Received: by outflank-mailman (input) for mailman id 529861; Thu, 04 May 2023 17:52:26 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1pud7y-0002DN-1r for xen-devel@lists.xenproject.org; Thu, 04 May 2023 17:52:26 +0000 Received: from esa6.hc3370-68.iphmx.com (esa6.hc3370-68.iphmx.com [216.71.155.175]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id 6c357424-eaa4-11ed-8611-37d641c3527e; Thu, 04 May 2023 19:52:23 +0200 (CEST) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 6c357424-eaa4-11ed-8611-37d641c3527e DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1683222743; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=klOQO+gsr7z/KUFFtFG4HRRQMfRqAfQQnRF3fO14M6U=; b=aGrciT4Iyq2pK/SSWBJiIddXNqz2gGnHXeGji9TGW6BhfvKSBP5Nwucf OySzCWHvmSSMq+hi3xlbOFtWXomidDQofRd3uvt3esu8MR5rMz5Nb0ix6 BnwnrNDvLjPdvEKwq0qfoLB8Jr3Bnk5v4Gd62ZsDGturhtMXWz4uG6OOV Y=; Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none X-SBRS: 4.0 X-MesageID: 107227938 X-Ironport-Server: esa6.hc3370-68.iphmx.com X-Remote-IP: 162.221.156.123 X-Policy: $RELAYED IronPort-Data: A9a23:3MzBS6jCoJ3/JB+af6sWYyb2X161GxAKZh0ujC45NGQN5FlHY01je htvWWGFPfzZamXwc9FwbY63oE8P65CGzNNjSgBrpClgFHgb9cadCdqndUqhZCn6wu8v7q5Ex 55HNoSfdpBcolv0/ErF3m3J9CEkvU2wbuOgTrWCYmYpHlUMpB4J0XpLg/Q+jpNjne+3CgaMv cKai8DEMRqu1iUc3lg8sspvkzsy+qWj0N8klgZmP6sT4QeCzyN94K83fsldEVOpGuG4IcbiL wrz5OnR1n/U+R4rFuSknt7TGqHdauePVeQmoiM+t5mK2nCulARrukoIHKN0hXNsoyeIh7hMJ OBl7vRcf+uL0prkw4zxWzEAe8130DYvFLXveRBTuuTLp6HKnueFL1yDwyjaMKVBktubD12i+ tQ/cQhVSy6codiag62Vc/tyr98oLsPkadZ3VnFIlVk1DN4jSJHHBa7L+cVZzHE7gcUm8fT2P pRDL2A1NVKZPkMJYw1MYH49tL7Aan3XcTBerlObqLBx42XJxgFrzJDmMcbPe8zMTsJQ9qqdj jueoD6jXUBBZLRzzxKg1ViwnPSQkx/aG9o3TZe2sdwzrV2Mkzl75Bo+CgLg/KjRZlSFc8JSL QkY9zQjqYA29Ve3VZ/tUhugunmGsxUAHd1KHIUS6guA167V6AaxHXUfQ3hKb9lOnM0/QzAwx 0KKt9zsDD1r9raSTBqgGqy89G3of3JPdClbOHFCFFFeizX+nG0tpjWWdo5GLrGTtPG2Bh/J0 S6jtyM8jbpG2KbnyJ6HEUD7byOE/8aZFVZsvFWIAQpJ/SsiOtf7OtXABUzzqK8Zcd3HFgTpU G0swZD20QwYMX2aeMVhqs0pFarh2fuKOSa0bbVHT8h4rGTFF5JOkOltDNBCyKRBaJxslcfBO hO7hO+ozMY70IGWRaF2eZmtLM8h0LLtE9/oPtiNMIoVO8QpLVffo3AzDaJ1410BbWB2yf1vU XtlWZ/E4Ykm5VRPk2PtGrZ1PU4DzSEi32LDLa3GI+Cc+ePGPha9EO5VWGZim8hltMtoVi2Jq YcAXyZLoj0DONDDjt7/qNdLfQxWdCVqXPgbaaV/L4a+H+avI0l5Y9e5/F/rU9UNc3h9/gsQw kyAZw== IronPort-HdrOrdr: A9a23:nNu1qK+EDAiDNGvraoZuk+AQI+orL9Y04lQ7vn2ZKCYlD/Bw8v rEoB1173HJYVoqNU3I2urhBED4ewK7yXct2/hpAV7AZmjbUQmTXftfBOLZqlWLJ8SZzJ8n6U 4KScdD4bPLYWSSwvyKgzWQIpIMzNyG76yylY7lvhJQpWYDUdAZ0+7VMHf+LqQzfnggObMpUJ 6R/NBOqTaDdWR/VLXYOkU4 X-Talos-CUID: 9a23:kkGBPm/Zf6fBDyKU6VmVv2lNIpgATGL79luTPGGBG3hAU7aXQ1DFrQ== X-Talos-MUID: 9a23:4n35UQrnAxRonG6SXn4ezxRFHtty+PugNGFOybBfkcfDF3VdOyjI2Q== X-IronPort-AV: E=Sophos;i="5.99,250,1677560400"; d="scan'208";a="107227938" From: Jennifer Herbert To: Xen-devel CC: Jan Beulich , Andrew Cooper , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Jason Andryuk , Jennifer Herbert Subject: [PATCH v4 2/2] acpi: Add TPM2 interface definition. Date: Thu, 4 May 2023 17:51:46 +0000 Message-ID: <20230504175146.208936-3-jennifer.herbert@citrix.com> X-Mailer: git-send-email 2.39.1 In-Reply-To: <20230504175146.208936-1-jennifer.herbert@citrix.com> References: <20230504175146.208936-1-jennifer.herbert@citrix.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @citrix.com) X-ZM-MESSAGEID: 1683222777860100003 This patch introduces an optional TPM 2 interface definition to the ACPI ta= ble, which is to be used as part of a vTPM 2 implementation. Signed-off-by: Jennifer Herbert Reviewed-by: Jason Andryuk Acked-by: Jan Beulich --- CC: Jan Beulich CC: Andrew Cooper CC: Roger Pau Monn=C3=A9 CC: Jason Andryuk v4: * Convert copyright header to SPDX * Continuation from patch 1 change of xenstore tpm_version field checking. * Minor code style fixes. v3: * Renamed TPM_CRB constants to better match the TPM specification. * Moved some ACPI register locations to acpi2_0.h to such that both TPM register offsets are defined together, with clearer relation. * Added additional comments to explain new constants. * Minor code style fixes. v2: * Patch split into two. * Move TPM log to 0xFED50000 * Minor code style fixes. --- docs/misc/xenstore-paths.pandoc | 3 ++- tools/firmware/hvmloader/util.c | 10 +++++++++ tools/libacpi/Makefile | 3 ++- tools/libacpi/acpi2_0.h | 33 +++++++++++++++++++++++++++ tools/libacpi/build.c | 40 +++++++++++++++++++++++++++++++++ tools/libacpi/libacpi.h | 1 + tools/libacpi/ssdt_tpm2.asl | 27 ++++++++++++++++++++++ 7 files changed, 115 insertions(+), 2 deletions(-) create mode 100644 tools/libacpi/ssdt_tpm2.asl diff --git a/docs/misc/xenstore-paths.pandoc b/docs/misc/xenstore-paths.pan= doc index e67e164855..bffb8ea544 100644 --- a/docs/misc/xenstore-paths.pandoc +++ b/docs/misc/xenstore-paths.pandoc @@ -274,7 +274,8 @@ circumstances where the generation ID needs to be chang= ed. =20 The TPM version to be probed for. =20 -A value of 1 indicates to probe for TPM 1.2. +A value of 1 indicates to probe for TPM 1.2, whereas a value of 2 +indicates that a TPM 2.0 using CRB should be probed. A value of 0 or an invalid value will result in no TPM being probed. If unset, a default of 1 is assumed. =20 diff --git a/tools/firmware/hvmloader/util.c b/tools/firmware/hvmloader/uti= l.c index 1b733a3091..b573a9c3cd 100644 --- a/tools/firmware/hvmloader/util.c +++ b/tools/firmware/hvmloader/util.c @@ -1013,6 +1013,16 @@ void hvmloader_acpi_build_tables(struct acpi_config = *config, config->tis_hdr =3D (uint16_t *)ACPI_TIS_HDR_ADDRESS; config->tpm_version =3D 1; break; + + case 2: + config->table_flags |=3D ACPI_HAS_TPM; + config->crb_id =3D (uint16_t *)TPM_CRB_INTF_ID; + + mem_hole_populate_ram(TPM_LOG_AREA_ADDRESS >> PAGE_SHIFT, + TPM_LOG_SIZE >> PAGE_SHIFT); + memset((void *)TPM_LOG_AREA_ADDRESS, 0, TPM_LOG_SIZE); + config->tpm_version =3D 2; + break; } } =20 diff --git a/tools/libacpi/Makefile b/tools/libacpi/Makefile index 60860eaa00..23278f6a61 100644 --- a/tools/libacpi/Makefile +++ b/tools/libacpi/Makefile @@ -25,7 +25,8 @@ C_SRC-$(CONFIG_X86) =3D dsdt_anycpu.c dsdt_15cpu.c dsdt_a= nycpu_qemu_xen.c dsdt_pvh C_SRC-$(CONFIG_ARM_64) =3D dsdt_anycpu_arm.c DSDT_FILES ?=3D $(C_SRC-y) C_SRC =3D $(addprefix $(ACPI_BUILD_DIR)/, $(DSDT_FILES)) -H_SRC =3D $(addprefix $(ACPI_BUILD_DIR)/, ssdt_s3.h ssdt_s4.h ssdt_pm.h ss= dt_tpm.h ssdt_laptop_slate.h) +H_SRC =3D $(addprefix $(ACPI_BUILD_DIR)/, ssdt_s3.h ssdt_s4.h ssdt_pm.h) +H_SRC +=3D $(addprefix $(ACPI_BUILD_DIR)/, ssdt_tpm.h ssdt_tpm2.h ssdt_lap= top_slate.h) =20 MKDSDT_CFLAGS-$(CONFIG_ARM_64) =3D -DCONFIG_ARM_64 MKDSDT_CFLAGS-$(CONFIG_X86) =3D -DCONFIG_X86 diff --git a/tools/libacpi/acpi2_0.h b/tools/libacpi/acpi2_0.h index 2619ba32db..3503eb3cfa 100644 --- a/tools/libacpi/acpi2_0.h +++ b/tools/libacpi/acpi2_0.h @@ -121,6 +121,37 @@ struct acpi_20_tcpa { }; #define ACPI_2_0_TCPA_LAML_SIZE (64*1024) =20 +/* + * TPM2 + */ +struct acpi_20_tpm2 { + struct acpi_header header; + uint16_t platform_class; + uint16_t reserved; + uint64_t control_area_address; + uint32_t start_method; + uint8_t start_method_params[12]; + uint32_t log_area_minimum_length; + uint64_t log_area_start_address; +}; +#define TPM2_ACPI_CLASS_CLIENT 0 +#define TPM2_START_METHOD_CRB 7 + +/* + * TPM register I/O Mapped region, location of which defined in the + * TCG PC Client Platform TPM Profile Specification for TPM 2.0. + * See table 9 - Only Locality 0 is used here. This is emulated by QEMU. + * Definition of Register space is found in table 12. + */ +#define TPM_REGISTER_BASE 0xFED40000 +#define TPM_CRB_CTRL_REQ (TPM_REGISTER_BASE + 0x40) +#define TPM_CRB_INTF_ID (TPM_REGISTER_BASE + 0x30) + +#define TPM_LOG_AREA_ADDRESS 0xFED50000 + +#define TPM_LOG_AREA_MINIMUM_SIZE (64 << 10) +#define TPM_LOG_SIZE (64 << 10) + /* * Fixed ACPI Description Table Structure (FADT) in ACPI 1.0. */ @@ -431,6 +462,7 @@ struct acpi_20_slit { #define ACPI_2_0_RSDT_SIGNATURE ASCII32('R','S','D','T') #define ACPI_2_0_XSDT_SIGNATURE ASCII32('X','S','D','T') #define ACPI_2_0_TCPA_SIGNATURE ASCII32('T','C','P','A') +#define ACPI_2_0_TPM2_SIGNATURE ASCII32('T','P','M','2') #define ACPI_2_0_HPET_SIGNATURE ASCII32('H','P','E','T') #define ACPI_2_0_WAET_SIGNATURE ASCII32('W','A','E','T') #define ACPI_2_0_SRAT_SIGNATURE ASCII32('S','R','A','T') @@ -444,6 +476,7 @@ struct acpi_20_slit { #define ACPI_2_0_RSDT_REVISION 0x01 #define ACPI_2_0_XSDT_REVISION 0x01 #define ACPI_2_0_TCPA_REVISION 0x02 +#define ACPI_2_0_TPM2_REVISION 0x04 #define ACPI_2_0_HPET_REVISION 0x01 #define ACPI_2_0_WAET_REVISION 0x01 #define ACPI_1_0_FADT_REVISION 0x01 diff --git a/tools/libacpi/build.c b/tools/libacpi/build.c index bb0d0557d4..401113503c 100644 --- a/tools/libacpi/build.c +++ b/tools/libacpi/build.c @@ -19,6 +19,7 @@ #include "ssdt_s3.h" #include "ssdt_s4.h" #include "ssdt_tpm.h" +#include "ssdt_tpm2.h" #include "ssdt_pm.h" #include "ssdt_laptop_slate.h" #include @@ -350,6 +351,7 @@ static int construct_secondary_tables(struct acpi_ctxt = *ctxt, struct acpi_20_hpet *hpet; struct acpi_20_waet *waet; struct acpi_20_tcpa *tcpa; + struct acpi_20_tpm2 *tpm2; unsigned char *ssdt; void *lasa; =20 @@ -449,6 +451,44 @@ static int construct_secondary_tables(struct acpi_ctxt= *ctxt, tcpa->header.length); } break; + + case 2: + /* + * Check VID stored in bits 37:32 (3rd 16 bit word) of CRB + * identifier register. See table 16 of TCG PC client platform + * TPM profile specification for TPM 2.0. + */ + if ( config->crb_id[2] =3D=3D 0 || config->crb_id[2] =3D=3D 0x= ffff ) + break; + + ssdt =3D ctxt->mem_ops.alloc(ctxt, sizeof(ssdt_tpm2), 16); + if (!ssdt) return -1; + memcpy(ssdt, ssdt_tpm2, sizeof(ssdt_tpm2)); + table_ptrs[nr_tables++] =3D ctxt->mem_ops.v2p(ctxt, ssdt); + + tpm2 =3D ctxt->mem_ops.alloc(ctxt, sizeof(struct acpi_20_tpm2)= , 16); + if (!tpm2) return -1; + memset(tpm2, 0, sizeof(*tpm2)); + table_ptrs[nr_tables++] =3D ctxt->mem_ops.v2p(ctxt, tpm2); + + tpm2->header.signature =3D ACPI_2_0_TPM2_SIGNATURE; + tpm2->header.length =3D sizeof(*tpm2); + tpm2->header.revision =3D ACPI_2_0_TPM2_REVISION; + fixed_strcpy(tpm2->header.oem_id, ACPI_OEM_ID); + fixed_strcpy(tpm2->header.oem_table_id, ACPI_OEM_TABLE_ID); + tpm2->header.oem_revision =3D ACPI_OEM_REVISION; + tpm2->header.creator_id =3D ACPI_CREATOR_ID; + tpm2->header.creator_revision =3D ACPI_CREATOR_REVISION; + tpm2->platform_class =3D TPM2_ACPI_CLASS_CLIENT; + tpm2->control_area_address =3D TPM_CRB_CTRL_REQ; + tpm2->start_method =3D TPM2_START_METHOD_CRB; + tpm2->log_area_minimum_length =3D TPM_LOG_AREA_MINIMUM_SIZE; + tpm2->log_area_start_address =3D TPM_LOG_AREA_ADDRESS; + + set_checksum(tpm2, + offsetof(struct acpi_header, checksum), + tpm2->header.length); + break; } } =20 diff --git a/tools/libacpi/libacpi.h b/tools/libacpi/libacpi.h index f69452401f..0d19f9fc4d 100644 --- a/tools/libacpi/libacpi.h +++ b/tools/libacpi/libacpi.h @@ -80,6 +80,7 @@ struct acpi_config { const struct hvm_info_table *hvminfo; =20 const uint16_t *tis_hdr; + const uint16_t *crb_id; =20 /* * Address where acpi_info should be placed. diff --git a/tools/libacpi/ssdt_tpm2.asl b/tools/libacpi/ssdt_tpm2.asl new file mode 100644 index 0000000000..3df9d70556 --- /dev/null +++ b/tools/libacpi/ssdt_tpm2.asl @@ -0,0 +1,27 @@ +/* SPDX-License-Identifier: LGPL-2.1 */ +/* + * ssdt_tpm2.asl + * + * Copyright (c) 2018-2022, Citrix Systems, Inc. + */ + +/* SSDT for TPM CRB Interface for Xen with Qemu device model. */ + +DefinitionBlock ("SSDT_TPM2.aml", "SSDT", 2, "Xen", "HVM", 0) +{ + Device (TPM) + { + Name (_HID, "MSFT0101" /* TPM 2.0 Security Device */) // _HID: Ha= rdware ID + Name (_CRS, ResourceTemplate () // _CRS: Current Resource Settings + { + Memory32Fixed (ReadWrite, + 0xFED40000, // Address Base + 0x00001000, // Address Length + ) + }) + Method (_STA, 0, NotSerialized) // _STA: Status + { + Return (0x0F) + } + } +} --=20 2.39.1