mirror of
https://github.com/cloud-hypervisor/cloud-hypervisor.git
synced 2024-12-22 05:35:20 +00:00
tpm: Add emulator module
Emulator module adds methods required to communicate with swtpm over Ctrl and Data channels. Signed-off-by: Praveen K Paladugu <prapal@linux.microsoft.com> Co-authored-by: Sean Yoo <t-seanyoo@microsoft.com>
This commit is contained in:
parent
58b902d036
commit
19fdf8bc79
465
tpm/src/emulator.rs
Normal file
465
tpm/src/emulator.rs
Normal file
@ -0,0 +1,465 @@
|
||||
// Copyright © 2022, Microsoft Corporation
|
||||
//
|
||||
// SPDX-License-Identifier: Apache-2.0
|
||||
//
|
||||
|
||||
use crate::socket::SocketDev;
|
||||
use crate::{Commands, MemberType, Ptm, PtmCap, PtmEst, PtmInit, PtmResult, PtmSetBufferSize};
|
||||
use crate::{TPM_CRB_BUFFER_MAX, TPM_SUCCESS};
|
||||
use anyhow::anyhow;
|
||||
use libc::c_void;
|
||||
use libc::{sockaddr_storage, socklen_t};
|
||||
use std::convert::TryInto;
|
||||
use std::os::unix::io::RawFd;
|
||||
use std::path::Path;
|
||||
use std::{mem, ptr};
|
||||
use thiserror::Error;
|
||||
|
||||
const TPM_REQ_HDR_SIZE: usize = 10;
|
||||
|
||||
/* capability flags returned by PTM_GET_CAPABILITY */
|
||||
const PTM_CAP_INIT: u64 = 1;
|
||||
const PTM_CAP_SHUTDOWN: u64 = 1 << 1;
|
||||
const PTM_CAP_GET_TPMESTABLISHED: u64 = 1 << 2;
|
||||
const PTM_CAP_SET_LOCALITY: u64 = 1 << 3;
|
||||
const PTM_CAP_CANCEL_TPM_CMD: u64 = 1 << 5;
|
||||
const PTM_CAP_RESET_TPMESTABLISHED: u64 = 1 << 7;
|
||||
const PTM_CAP_STOP: u64 = 1 << 10;
|
||||
const PTM_CAP_SET_DATAFD: u64 = 1 << 12;
|
||||
const PTM_CAP_SET_BUFFERSIZE: u64 = 1 << 13;
|
||||
|
||||
///Check if the input command is selftest
|
||||
///
|
||||
pub fn is_selftest(input: Vec<u8>, in_len: usize) -> bool {
|
||||
if in_len >= TPM_REQ_HDR_SIZE {
|
||||
let ordinal: &[u8; 4] = input[6..6 + 4]
|
||||
.try_into()
|
||||
.expect("slice with incorrect length");
|
||||
|
||||
return u32::from_ne_bytes(*ordinal).to_be() == 0x143;
|
||||
}
|
||||
false
|
||||
}
|
||||
|
||||
#[derive(Error, Debug)]
|
||||
pub enum Error {
|
||||
#[error("Could not initialize emulator's backend: {0}")]
|
||||
InitializeEmulator(#[source] anyhow::Error),
|
||||
#[error("Failed to create data fd to pass to swtpm: {0}")]
|
||||
PrepareDataFd(#[source] anyhow::Error),
|
||||
#[error("Failed to run Control Cmd: {0}")]
|
||||
RunControlCmd(#[source] anyhow::Error),
|
||||
#[error("Emulator doesn't implement min required capabilities: {0}")]
|
||||
CheckCaps(#[source] anyhow::Error),
|
||||
#[error("Emulator failed to deliver request: {0}")]
|
||||
DeliverRequest(#[source] anyhow::Error),
|
||||
#[error("Emulator failed to send/receive msg on data fd: {0}")]
|
||||
SendReceive(#[source] anyhow::Error),
|
||||
#[error("Incorrect response to Self Test: {0}")]
|
||||
SelfTest(#[source] anyhow::Error),
|
||||
}
|
||||
|
||||
type Result<T> = anyhow::Result<T, Error>;
|
||||
|
||||
#[derive(Clone)]
|
||||
pub struct BackendCmd {
|
||||
pub locality: u8,
|
||||
pub input: Vec<u8>,
|
||||
pub input_len: usize,
|
||||
pub output: Vec<u8>,
|
||||
pub output_len: usize,
|
||||
pub selftest_done: bool,
|
||||
}
|
||||
|
||||
pub struct Emulator {
|
||||
cmd: Option<BackendCmd>,
|
||||
caps: PtmCap, /* capabilities of the TPM */
|
||||
control_socket: SocketDev,
|
||||
data_fd: RawFd,
|
||||
established_flag_cached: bool,
|
||||
established_flag: bool,
|
||||
}
|
||||
|
||||
impl Emulator {
|
||||
/// Create Emulator Instance
|
||||
///
|
||||
/// # Arguments
|
||||
///
|
||||
/// * `path` - A path to the Unix Domain Socket swtpm is listening on
|
||||
///
|
||||
pub fn new(path: String) -> Result<Self> {
|
||||
if !Path::new(&path).exists() {
|
||||
return Err(Error::InitializeEmulator(anyhow!(
|
||||
"The input TPM Socket path: {:?} does not exist",
|
||||
path
|
||||
)));
|
||||
}
|
||||
let mut socket = SocketDev::new();
|
||||
socket.init(path).map_err(|e| {
|
||||
Error::InitializeEmulator(anyhow!("Failed while initializing tpm emulator: {:?}", e))
|
||||
})?;
|
||||
|
||||
let mut emulator = Self {
|
||||
cmd: None,
|
||||
caps: 0,
|
||||
control_socket: socket,
|
||||
data_fd: -1,
|
||||
established_flag_cached: false,
|
||||
established_flag: false,
|
||||
};
|
||||
|
||||
emulator.prepare_data_fd()?;
|
||||
|
||||
emulator.probe_caps()?;
|
||||
if !emulator.check_caps() {
|
||||
return Err(Error::InitializeEmulator(anyhow!(
|
||||
"Required capabilities not supported by tpm backend"
|
||||
)));
|
||||
}
|
||||
|
||||
if !emulator.get_established_flag() {
|
||||
return Err(Error::InitializeEmulator(anyhow!(
|
||||
"TPM not in established state"
|
||||
)));
|
||||
}
|
||||
|
||||
Ok(emulator)
|
||||
}
|
||||
|
||||
/// Create socketpair, assign one socket/FD as data_fd to Control Socket
|
||||
/// The other socket/FD will be assigned to msg_fd, which will be sent to swtpm
|
||||
/// via CmdSetDatafd control command
|
||||
fn prepare_data_fd(&mut self) -> Result<()> {
|
||||
let mut res: PtmResult = 0;
|
||||
|
||||
let mut fds = [-1, -1];
|
||||
// Safe because return value of the unsafe call is checked
|
||||
unsafe {
|
||||
let ret = libc::socketpair(libc::AF_UNIX, libc::SOCK_STREAM, 0, fds.as_mut_ptr());
|
||||
if ret == -1 {
|
||||
return Err(Error::PrepareDataFd(anyhow!(
|
||||
"Failed to prepare data fd for tpm emulator. Error Code {:?}",
|
||||
std::io::Error::last_os_error()
|
||||
)));
|
||||
}
|
||||
}
|
||||
self.control_socket.set_msgfd(fds[1]);
|
||||
debug!("data fd to be configured in swtpm = {:?}", fds[1]);
|
||||
self.run_control_cmd(Commands::CmdSetDatafd, &mut res, 0, mem::size_of::<u32>())?;
|
||||
debug!("data fd in cloud-hypervisor = {:?}", fds[0]);
|
||||
self.data_fd = fds[0];
|
||||
self.control_socket.set_datafd(fds[0]);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Gather TPM Capabilities and cache them in Emulator
|
||||
///
|
||||
fn probe_caps(&mut self) -> Result<()> {
|
||||
let mut caps: u64 = 0;
|
||||
self.run_control_cmd(
|
||||
Commands::CmdGetCapability,
|
||||
&mut caps,
|
||||
0,
|
||||
mem::size_of::<u64>(),
|
||||
)?;
|
||||
self.caps = caps;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Check if minimum set of capabitlies are supported
|
||||
fn check_caps(&mut self) -> bool {
|
||||
/* min. required capabilities for TPM 2.0*/
|
||||
let caps: PtmCap = PTM_CAP_INIT
|
||||
| PTM_CAP_SHUTDOWN
|
||||
| PTM_CAP_GET_TPMESTABLISHED
|
||||
| PTM_CAP_SET_LOCALITY
|
||||
| PTM_CAP_RESET_TPMESTABLISHED
|
||||
| PTM_CAP_SET_DATAFD
|
||||
| PTM_CAP_STOP
|
||||
| PTM_CAP_SET_BUFFERSIZE;
|
||||
|
||||
if (self.caps & caps) != caps {
|
||||
return false;
|
||||
}
|
||||
true
|
||||
}
|
||||
|
||||
///
|
||||
/// # Arguments
|
||||
///
|
||||
/// * `cmd` - Control Command to run
|
||||
/// * `msg` - Optional msg to be sent along with Control Command
|
||||
/// * `msg_len_in` - len of 'msg' in bytes, if passed
|
||||
/// * `msg_len_out` - length of expected output from Control Command in bytes
|
||||
///
|
||||
fn run_control_cmd(
|
||||
&mut self,
|
||||
cmd: Commands,
|
||||
msg: &mut dyn Ptm,
|
||||
msg_len_in: usize,
|
||||
msg_len_out: usize,
|
||||
) -> Result<()> {
|
||||
debug!("Control Cmd to send : {:02X?}", cmd);
|
||||
|
||||
let cmd_no = (cmd as u32).to_be_bytes();
|
||||
let n: isize = (mem::size_of::<u32>() + msg_len_in) as isize;
|
||||
|
||||
let converted_req = msg.ptm_to_request();
|
||||
debug!("converted request: {:02X?}", converted_req);
|
||||
|
||||
let mut buf = Vec::<u8>::with_capacity(n as usize);
|
||||
|
||||
buf.extend(cmd_no);
|
||||
buf.extend(converted_req);
|
||||
debug!("full Control request {:02X?}", buf);
|
||||
|
||||
let _res = self.control_socket.write(&buf).map_err(|e| {
|
||||
Error::RunControlCmd(anyhow!(
|
||||
"Failed while running {:02X?} Control Cmd. Error: {:?}",
|
||||
cmd,
|
||||
e
|
||||
))
|
||||
})?;
|
||||
|
||||
let mut output = [0_u8; TPM_CRB_BUFFER_MAX];
|
||||
|
||||
// Every Control Cmd gets atleast a result code in response. Read it
|
||||
let read_size = self.control_socket.read(&mut output).map_err(|e| {
|
||||
Error::RunControlCmd(anyhow!(
|
||||
"Failed while reading response for Control Cmd: {:02X?}. Error: {:?}",
|
||||
cmd,
|
||||
e
|
||||
))
|
||||
})?;
|
||||
|
||||
if msg_len_out != 0 {
|
||||
msg.update_ptm_with_response(&output[0..read_size])
|
||||
.map_err(|e| {
|
||||
Error::RunControlCmd(anyhow!(
|
||||
"Failed while converting response of Control Cmd: {:02X?} to PTM. Error: {:?}",
|
||||
cmd,
|
||||
e
|
||||
))
|
||||
})?;
|
||||
} else {
|
||||
// No response expected, only handle return code
|
||||
msg.set_member_type(MemberType::Response);
|
||||
}
|
||||
|
||||
if msg.get_result_code() != TPM_SUCCESS {
|
||||
return Err(Error::RunControlCmd(anyhow!(
|
||||
"Control Cmd returned error code : {:?}",
|
||||
msg.get_result_code()
|
||||
)));
|
||||
}
|
||||
debug!("Control Cmd Response : {:02X?}", &output[0..read_size]);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn get_established_flag(&mut self) -> bool {
|
||||
let mut est: PtmEst = PtmEst::new();
|
||||
|
||||
if self.established_flag_cached {
|
||||
return self.established_flag;
|
||||
}
|
||||
|
||||
if let Err(e) = self.run_control_cmd(
|
||||
Commands::CmdGetTpmEstablished,
|
||||
&mut est,
|
||||
0,
|
||||
2 * mem::size_of::<u32>(),
|
||||
) {
|
||||
error!(
|
||||
"Failed to run CmdGetTpmEstablished Control Cmd. Error: {:?}",
|
||||
e
|
||||
);
|
||||
return false;
|
||||
}
|
||||
|
||||
self.established_flag_cached = true;
|
||||
if est.resp.bit != 0 {
|
||||
self.established_flag = false;
|
||||
} else {
|
||||
self.established_flag = true;
|
||||
}
|
||||
|
||||
self.established_flag
|
||||
}
|
||||
|
||||
/// Function to write to data socket and read the response from it
|
||||
fn unix_tx_bufs(&mut self) -> Result<()> {
|
||||
let isselftest: bool;
|
||||
// Safe as type "sockaddr_storage" is valid with an all-zero byte-pattern value
|
||||
let mut addr: sockaddr_storage = unsafe { mem::zeroed() };
|
||||
let mut len = mem::size_of::<sockaddr_storage>() as socklen_t;
|
||||
|
||||
if let Some(ref mut cmd) = self.cmd {
|
||||
cmd.selftest_done = false;
|
||||
isselftest = is_selftest(cmd.input.to_vec(), cmd.input_len);
|
||||
|
||||
debug!(
|
||||
"Send cmd: {:02X?} of len {:?} on data_ioc ",
|
||||
cmd.input, cmd.input_len
|
||||
);
|
||||
|
||||
let data_vecs = [libc::iovec {
|
||||
iov_base: cmd.input.as_mut_ptr() as *mut libc::c_void,
|
||||
iov_len: cmd.input.len(),
|
||||
}; 1];
|
||||
|
||||
// Safe because all zero values from the unsafe method are updated before usage
|
||||
let mut msghdr: libc::msghdr = unsafe { mem::zeroed() };
|
||||
msghdr.msg_name = ptr::null_mut();
|
||||
msghdr.msg_namelen = 0;
|
||||
msghdr.msg_iov = data_vecs.as_ptr() as *mut libc::iovec;
|
||||
msghdr.msg_iovlen = data_vecs.len() as _;
|
||||
msghdr.msg_control = ptr::null_mut();
|
||||
msghdr.msg_controllen = 0;
|
||||
msghdr.msg_flags = 0;
|
||||
// Safe as the return value of the unsafe method is checked
|
||||
unsafe {
|
||||
let ret = libc::sendmsg(self.data_fd, &msghdr, 0);
|
||||
if ret == -1 {
|
||||
return Err(Error::SendReceive(anyhow!(
|
||||
"Failed to send tpm command over Data FD. Error Code {:?}",
|
||||
std::io::Error::last_os_error()
|
||||
)));
|
||||
}
|
||||
}
|
||||
|
||||
cmd.output.fill(0);
|
||||
// Safe as return value from unsafe method is checked
|
||||
unsafe {
|
||||
let ret = libc::recvfrom(
|
||||
self.data_fd,
|
||||
cmd.output.as_ptr() as *mut c_void,
|
||||
cmd.output.len(),
|
||||
0,
|
||||
&mut addr as *mut libc::sockaddr_storage as *mut libc::sockaddr,
|
||||
&mut len as *mut socklen_t,
|
||||
);
|
||||
if ret == -1 {
|
||||
return Err(Error::SendReceive(anyhow!(
|
||||
"Failed to receive response for tpm command over Data FD. Error Code {:?}",
|
||||
std::io::Error::last_os_error()
|
||||
)));
|
||||
}
|
||||
cmd.output_len = ret as usize;
|
||||
}
|
||||
debug!(
|
||||
"response = {:02X?} len = {:?} selftest = {:?}",
|
||||
cmd.output, cmd.output_len, isselftest
|
||||
);
|
||||
|
||||
if isselftest {
|
||||
if cmd.output_len < 10 {
|
||||
return Err(Error::SelfTest(anyhow!(
|
||||
"Self test response should have 10 bytes. Only {:?} returned",
|
||||
cmd.output_len
|
||||
)));
|
||||
}
|
||||
let mut errcode: [u8; 4] = [0; 4];
|
||||
errcode.copy_from_slice(&cmd.output[6..6 + 4]);
|
||||
cmd.selftest_done = u32::from_ne_bytes(errcode).to_be() == 0;
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn deliver_request(&mut self, in_cmd: &mut BackendCmd) -> Result<Vec<u8>> {
|
||||
if self.cmd.is_some() {
|
||||
//previous request did not finish cleanly
|
||||
return Err(Error::DeliverRequest(anyhow!(
|
||||
"Cannot deliver tpm Request as previous cmd did not complete."
|
||||
)));
|
||||
}
|
||||
self.cmd = Some(in_cmd.clone());
|
||||
|
||||
self.unix_tx_bufs()?;
|
||||
|
||||
let output = self.cmd.as_ref().unwrap().output.clone();
|
||||
in_cmd.output.fill(0);
|
||||
in_cmd.output.clone_from(&output);
|
||||
|
||||
self.backend_request_completed();
|
||||
Ok(output)
|
||||
}
|
||||
|
||||
pub fn backend_request_completed(&mut self) {
|
||||
self.cmd = None;
|
||||
}
|
||||
|
||||
pub fn cancel_cmd(&mut self) -> Result<()> {
|
||||
let mut res: PtmResult = 0;
|
||||
|
||||
// Check if emulator implements Cancel Cmd
|
||||
if (self.caps & PTM_CAP_CANCEL_TPM_CMD) != PTM_CAP_CANCEL_TPM_CMD {
|
||||
return Err(Error::CheckCaps(anyhow!(
|
||||
"Emulator does not implement 'Cancel Command' Capability"
|
||||
)));
|
||||
}
|
||||
self.run_control_cmd(
|
||||
Commands::CmdCancelTpmCmd,
|
||||
&mut res,
|
||||
0,
|
||||
mem::size_of::<u32>(),
|
||||
)?;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Configure buffersize to use while communicating with swtpm
|
||||
fn set_buffer_size(&mut self, wantedsize: usize, actualsize: &mut usize) -> Result<()> {
|
||||
let mut psbs: PtmSetBufferSize = PtmSetBufferSize::new(wantedsize as u32);
|
||||
|
||||
self.stop_tpm()?;
|
||||
|
||||
self.run_control_cmd(
|
||||
Commands::CmdSetBufferSize,
|
||||
&mut psbs,
|
||||
mem::size_of::<u32>(),
|
||||
4 * mem::size_of::<u32>(),
|
||||
)?;
|
||||
|
||||
*actualsize = psbs.get_bufsize() as usize;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn startup_tpm(&mut self, buffersize: usize) -> Result<()> {
|
||||
let mut init: PtmInit = PtmInit::new();
|
||||
|
||||
let mut actual_size: usize = 0;
|
||||
|
||||
if buffersize != 0 {
|
||||
self.set_buffer_size(buffersize, &mut actual_size)?;
|
||||
debug!("set tpm buffersize to {:?} during Startup", buffersize);
|
||||
}
|
||||
|
||||
self.run_control_cmd(
|
||||
Commands::CmdInit,
|
||||
&mut init,
|
||||
mem::size_of::<u32>(),
|
||||
mem::size_of::<u32>(),
|
||||
)?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fn stop_tpm(&mut self) -> Result<()> {
|
||||
let mut res: PtmResult = 0;
|
||||
|
||||
self.run_control_cmd(Commands::CmdStop, &mut res, 0, mem::size_of::<u32>())?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn get_buffer_size(&mut self) -> Result<usize> {
|
||||
let mut curr_buf_size: usize = 0;
|
||||
|
||||
match self.set_buffer_size(0, &mut curr_buf_size) {
|
||||
Err(_) => Ok(TPM_CRB_BUFFER_MAX),
|
||||
_ => Ok(curr_buf_size),
|
||||
}
|
||||
}
|
||||
}
|
@ -6,6 +6,7 @@
|
||||
#[macro_use]
|
||||
extern crate log;
|
||||
|
||||
pub mod emulator;
|
||||
pub mod socket;
|
||||
|
||||
use anyhow::anyhow;
|
||||
|
Loading…
Reference in New Issue
Block a user