Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754580AbcDVQsJ (ORCPT ); Fri, 22 Apr 2016 12:48:09 -0400 Received: from mga14.intel.com ([192.55.52.115]:61131 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753955AbcDVQsG (ORCPT ); Fri, 22 Apr 2016 12:48:06 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.24,517,1455004800"; d="scan'208";a="950860589" Date: Fri, 22 Apr 2016 19:47:57 +0300 From: Jarkko Sakkinen To: Stefan Berger Cc: tpmdd-devel@lists.sourceforge.net, jgunthorpe@obsidianresearch.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-api@vger.kernel.org Subject: Re: [PATCH v11 4/4] tpm: Add documentation for the tpm_vtpm_proxy device driver Message-ID: <20160422164757.GC22741@intel.com> References: <1461000376-2888-1-git-send-email-stefanb@linux.vnet.ibm.com> <1461000376-2888-5-git-send-email-stefanb@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1461000376-2888-5-git-send-email-stefanb@linux.vnet.ibm.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4878 Lines: 115 On Mon, Apr 18, 2016 at 01:26:16PM -0400, Stefan Berger wrote: > Add documentation for the tpm_vtpm device driver that implements > support for providing TPM functionality to Linux containers. > > Parts of this documentation were recycled from the Xen vTPM > device driver documentation. > > Update the documentation for the ioctl numbers. > > Signed-off-by: Stefan Berger > Reviewed-by: Jarkko Sakkinen Tested-by: Jarkko Sakkinen > CC: linux-kernel@vger.kernel.org > CC: linux-doc@vger.kernel.org > CC: linux-api@vger.kernel.org > --- > Documentation/ioctl/ioctl-number.txt | 1 + > Documentation/tpm/tpm_vtpm_proxy.txt | 71 ++++++++++++++++++++++++++++++++++++ > 2 files changed, 72 insertions(+) > create mode 100644 Documentation/tpm/tpm_vtpm_proxy.txt > > diff --git a/Documentation/ioctl/ioctl-number.txt b/Documentation/ioctl/ioctl-number.txt > index 91261a3..7dbec90 100644 > --- a/Documentation/ioctl/ioctl-number.txt > +++ b/Documentation/ioctl/ioctl-number.txt > @@ -303,6 +303,7 @@ Code Seq#(hex) Include File Comments > > 0xA0 all linux/sdp/sdp.h Industrial Device Project > > +0xA1 0 linux/vtpm_proxy.h TPM Emulator Proxy Driver > 0xA2 00-0F arch/tile/include/asm/hardwall.h > 0xA3 80-8F Port ACL in development: > > diff --git a/Documentation/tpm/tpm_vtpm_proxy.txt b/Documentation/tpm/tpm_vtpm_proxy.txt > new file mode 100644 > index 0000000..30d1902 > --- /dev/null > +++ b/Documentation/tpm/tpm_vtpm_proxy.txt > @@ -0,0 +1,71 @@ > +Virtual TPM Proxy Driver for Linux Containers > + > +Authors: Stefan Berger (IBM) > + > +This document describes the virtual Trusted Platform Module (vTPM) > +proxy device driver for Linux containers. > + > +INTRODUCTION > +------------ > + > +The goal of this work is to provide TPM functionality to each Linux > +container. This allows programs to interact with a TPM in a container > +the same way they interact with a TPM on the physical system. Each > +container gets its own unique, emulated, software TPM. > + > + > +DESIGN > +------ > + > +To make an emulated software TPM available to each container, the container > +management stack needs to create a device pair consisting of a client TPM > +character device /dev/tpmX (with X=0,1,2...) and a 'server side' file > +descriptor. The former is moved into the container by creating a character > +device with the appropriate major and minor numbers while the file descriptor > +is passed to the TPM emulator. Software inside the container can then send > +TPM commands using the character device and the emulator will receive the > +commands via the file descriptor and use it for sending back responses. > + > +To support this, the virtual TPM proxy driver provides a device /dev/vtpmx > +that is used to create device pairs using an ioctl. The ioctl takes as > +an input flags for configuring the device. The flags for example indicate > +whether TPM 1.2 or TPM 2 functionality is supported by the TPM emulator. > +The result of the ioctl are the file descriptor for the 'server side' > +as well as the major and minor numbers of the character device that was created. > +Besides that the number of the TPM character device is return. If for > +example /dev/tpm10 was created, the number (dev_num) 10 is returned. > + > +The following is the data structure of the TPM_PROXY_IOC_NEW_DEV ioctl: > + > +struct vtpm_proxy_new_dev { > + __u32 flags; /* input */ > + __u32 tpm_num; /* output */ > + __u32 fd; /* output */ > + __u32 major; /* output */ > + __u32 minor; /* output */ > +}; > + > +Note that if unsupported flags are passed to the device driver, the ioctl will > +fail and errno will be set to EOPNOTSUPP. Similarly, if an unsupported ioctl is > +called on the device driver, the ioctl will fail and errno will be set to > +ENOTTY. > + > +See /usr/include/linux/vtpm_proxy.h for definitions related to the public interface > +of this vTPM device driver. > + > +Once the device has been created, the driver will immediately try to talk > +to the TPM. All commands from the driver can be read from the file descriptor > +returned by the ioctl. The commands should be responded to immediately. > + > +Depending on the version of TPM the following commands will be sent by the > +driver: > + > +- TPM 1.2: > + - the driver will send a TPM_Startup command to the TPM emulator > + - the driver will send commands to read the command durations and > + interface timeouts from the TPM emulator > +- TPM 2: > + - the driver will send a TPM2_Startup command to the TPM emulator > + > +The TPM device /dev/tpmX will only appear if all of the relevant commands > +were responded to properly. > -- > 2.4.3 >