Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp307949pxp; Wed, 16 Mar 2022 06:19:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxGiTBWhOAR6RI7lCj4DupQlfpbUhUxHw/j46hAskKoA7GbezNnz3cb8RaogzeVw7z0XSri X-Received: by 2002:a17:906:a1c8:b0:6da:a635:e402 with SMTP id bx8-20020a170906a1c800b006daa635e402mr27839595ejb.598.1647436786747; Wed, 16 Mar 2022 06:19:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647436786; cv=none; d=google.com; s=arc-20160816; b=An1Q8OOW0booAfeiHRyYTpEOUgu8WusrSn935mj+9WBrk4q4gU+hA193grqpI/CTJO fK0CqAACDQanAPTu0ByTpkrQHp/53Z0COpxGTs6eHSbPQVWem7Lcpz7sujh/lAaCSICa 44EtopS2lpi+BtRf48c1STZqaRRmkeuGvWXVqbvIIZQbD5HSTi4zAAmEsRBurzDiPnOK Om7iA8oGfnoBOkVv6+XKBGer9qSjLP/SJzRzDJrKO3G2+hCDPJIwRArwJom55CkvQHwk +WtdCzAXU6MLObqDZ3kDNDANe9Hhu4G5HDZFYKxqgGPj22Uooym7JoisETM9j8moz4jO W2zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=gk7y81xtySAADjBmQ2aZ9Jlj0/FFPEM/n7BNNzyxMd0=; b=i+YQusG4a2YKchB3CHE5qo6kpH7CBxF5lVOFKHvFIC1zPhM4wpPCxlNdMIOlu2DsKq OQJjOeZHHmKIlB4CWtDbSVqmmbKWZ7CCy0YSVcOKYkAsLrS72cOR6PUZaQ1fseO3SNyU qxxktYpelDPySIBicNMVnAvqO8Fj09psP23O+2XAUb1nLp+O3fSvL4vzVITynClPPNL3 IHlTcAd0ua3Iml0D7SrN3f93j1DomdJTezHjReNaePFHhJFFfGyARZEtXlrX3lsGz5EU N3NcnoDF5BsKc19h9XpgS1TX32t6AiPDyvPBh5tRaqTGMU08i+8eqtbVA/yIfAtphasz e7BA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=P2NpjhK+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qf23-20020a1709077f1700b006da6e0e6fa4si1301983ejc.288.2022.03.16.06.19.19; Wed, 16 Mar 2022 06:19:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=P2NpjhK+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1354781AbiCPJDs (ORCPT + 99 others); Wed, 16 Mar 2022 05:03:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44292 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242697AbiCPJDq (ORCPT ); Wed, 16 Mar 2022 05:03:46 -0400 Received: from mx0a-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5923D6516D; Wed, 16 Mar 2022 02:02:32 -0700 (PDT) Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 22G7cTcF010879; Wed, 16 Mar 2022 09:02:29 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=gk7y81xtySAADjBmQ2aZ9Jlj0/FFPEM/n7BNNzyxMd0=; b=P2NpjhK+O5lRv8aRzxmFU5QxJ5SzGYvsU0qAf7K33tuSPU1238ZFJEBuQ/1FSibHWksy CocMrqsUfHHqAHgoPi+UlQ2of4jXTZ1Yv5jZTosvb+TO1jiQSl8t03KoR9CH2rUQ3P2f 14PBWL96oPykINs2vvjYpyjPjf/yyVAFBqW585FZtnpOvO2tzvbl0ZI8HEp7drD7VRP8 VyIod29n4FRtWk4rUIlrO4NH8LUlVqeVNg9yB8S6mLAGar73ljh9pmOUcG8Oom2oN3Vv 2uXhFqnr1fAgb8q1tjjQUrlg6ZgDYDk7OfJblIaLko/I7Jqct2ycXnSQTfc++sfBxnq1 LQ== Received: from pps.reinject (localhost [127.0.0.1]) by mx0b-001b2d01.pphosted.com with ESMTP id 3eu9aevad4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 16 Mar 2022 09:02:28 +0000 Received: from m0098416.ppops.net (m0098416.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 22G8xbQj018430; Wed, 16 Mar 2022 09:02:28 GMT Received: from ppma06fra.de.ibm.com (48.49.7a9f.ip4.static.sl-reverse.com [159.122.73.72]) by mx0b-001b2d01.pphosted.com with ESMTP id 3eu9aevacg-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 16 Mar 2022 09:02:27 +0000 Received: from pps.filterd (ppma06fra.de.ibm.com [127.0.0.1]) by ppma06fra.de.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 22G8vUqx005604; Wed, 16 Mar 2022 09:02:26 GMT Received: from b06cxnps3074.portsmouth.uk.ibm.com (d06relay09.portsmouth.uk.ibm.com [9.149.109.194]) by ppma06fra.de.ibm.com with ESMTP id 3erjshqaw3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 16 Mar 2022 09:02:25 +0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06cxnps3074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 22G92M7622216968 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 16 Mar 2022 09:02:22 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id AF0E9A405F; Wed, 16 Mar 2022 09:02:22 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 093F6A4054; Wed, 16 Mar 2022 09:02:22 +0000 (GMT) Received: from [9.145.38.138] (unknown [9.145.38.138]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 16 Mar 2022 09:02:21 +0000 (GMT) Message-ID: Date: Wed, 16 Mar 2022 10:02:21 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.6.2 Subject: Re: [PATCH v3 1/4] drivers/s390/char: Add Ultravisor io device Content-Language: en-US To: Steffen Eiden , linux-s390@vger.kernel.org Cc: Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Alexander Gordeev , David Hildenbrand , Claudio Imbrenda , Shuah Khan , Nico Boehr , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org References: <20220304141141.32767-1-seiden@linux.ibm.com> <20220304141141.32767-2-seiden@linux.ibm.com> From: Janosch Frank In-Reply-To: <20220304141141.32767-2-seiden@linux.ibm.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: 6FMQGBGUjJOteVDs-uuyM0CF2T92tnCH X-Proofpoint-GUID: TD951JBLvRD7rI24mpxmJ9e8dL0dLOZd X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.850,Hydra:6.0.425,FMLib:17.11.64.514 definitions=2022-03-16_02,2022-03-15_01,2022-02-23_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 priorityscore=1501 adultscore=0 malwarescore=0 phishscore=0 suspectscore=0 clxscore=1015 bulkscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 lowpriorityscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2202240000 definitions=main-2203160056 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_MSPIKE_H4, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/4/22 15:11, Steffen Eiden wrote: > This patch adds a new miscdevice to expose some Ultravisor functions > to userspace. Userspace can send IOCTLs to the uvdevice that will then > emit a corresponding Ultravisor Call and hands the result over to > userspace. The uvdevice is available if the Ultravisor Call facility is > present. > Userspace can call call the Retrieve Attestation Measurement Checkpatch is unhappy about the repeating of "call". > Ultravisor Call using IOCTLs on the uvdevice. > > The uvdevice will do some sanity checks first. > Then, copy the request data to kernel space, build the UVCB, > perform the UV call, and copy the result back to userspace. > > Signed-off-by: Steffen Eiden > --- > MAINTAINERS | 2 + > arch/s390/include/asm/uv.h | 23 ++- > arch/s390/include/uapi/asm/uvdevice.h | 51 +++++ > drivers/s390/char/Kconfig | 10 + > drivers/s390/char/Makefile | 1 + > drivers/s390/char/uvdevice.c | 264 ++++++++++++++++++++++++++ > 6 files changed, 350 insertions(+), 1 deletion(-) > create mode 100644 arch/s390/include/uapi/asm/uvdevice.h > create mode 100644 drivers/s390/char/uvdevice.c > > diff --git a/MAINTAINERS b/MAINTAINERS > index 777cd6fa2b3d..f32e876f45c2 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -10577,9 +10577,11 @@ F: Documentation/virt/kvm/s390* > F: arch/s390/include/asm/gmap.h > F: arch/s390/include/asm/kvm* > F: arch/s390/include/uapi/asm/kvm* > +F: arch/s390/include/uapi/asm/uvdevice.h > F: arch/s390/kernel/uv.c > F: arch/s390/kvm/ > F: arch/s390/mm/gmap.c > +F: drivers/s390/char/uvdevice.c > F: tools/testing/selftests/kvm/*/s390x/ > F: tools/testing/selftests/kvm/s390x/ > > diff --git a/arch/s390/include/asm/uv.h b/arch/s390/include/asm/uv.h > index 86218382d29c..760dda4024b9 100644 > --- a/arch/s390/include/asm/uv.h > +++ b/arch/s390/include/asm/uv.h > @@ -2,7 +2,7 @@ > /* > * Ultravisor Interfaces > * > - * Copyright IBM Corp. 2019 > + * Copyright IBM Corp. 2019, 2022 > * > * Author(s): > * Vasily Gorbik > @@ -52,6 +52,7 @@ > #define UVC_CMD_UNPIN_PAGE_SHARED 0x0342 > #define UVC_CMD_SET_SHARED_ACCESS 0x1000 > #define UVC_CMD_REMOVE_SHARED_ACCESS 0x1001 > +#define UVC_CMD_RETR_ATTEST 0x1020 > > /* Bits in installed uv calls */ > enum uv_cmds_inst { > @@ -76,6 +77,7 @@ enum uv_cmds_inst { > BIT_UVC_CMD_UNSHARE_ALL = 20, > BIT_UVC_CMD_PIN_PAGE_SHARED = 21, > BIT_UVC_CMD_UNPIN_PAGE_SHARED = 22, > + BIT_UVC_CMD_RETR_ATTEST = 28, > }; > > enum uv_feat_ind { > @@ -218,6 +220,25 @@ struct uv_cb_share { > u64 reserved28; > } __packed __aligned(8); > > +/* Retrieve Attestation Measurement */ > +struct uv_cb_attest { > + struct uv_cb_header header; /* 0x0000 */ > + u64 reserved08[2]; /* 0x0008 */ > + u64 arcb_addr; /* 0x0018 */ > + u64 cont_token; /* 0x0020 */ > + u8 reserved28[6]; /* 0x0028 */ > + u16 user_data_len; /* 0x002e */ > + u8 user_data[256]; /* 0x0030 */ > + u32 reserved130[3]; /* 0x0130 */ > + u32 meas_len; /* 0x013c */ > + u64 meas_addr; /* 0x0140 */ > + u8 config_uid[16]; /* 0x0148 */ > + u32 reserved158; /* 0x0158 */ > + u32 add_data_len; /* 0x015c */ > + u64 add_data_addr; /* 0x0160 */ > + u64 reserved168[4]; /* 0x0168 */ > +} __packed __aligned(8); > + > static inline int __uv_call(unsigned long r1, unsigned long r2) > { > int cc; > diff --git a/arch/s390/include/uapi/asm/uvdevice.h b/arch/s390/include/uapi/asm/uvdevice.h > new file mode 100644 > index 000000000000..d40f69345c75 > --- /dev/null > +++ b/arch/s390/include/uapi/asm/uvdevice.h > @@ -0,0 +1,51 @@ > +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ > +/* > + * Copyright IBM Corp. 2022 > + * Author(s): Steffen Eiden > + */ > +#ifndef __S390X_ASM_UVDEVICE_H > +#define __S390X_ASM_UVDEVICE_H > + > +#include > + > +struct uvio_ioctl_cb { > + __u32 flags; > + __u16 uv_rc; /* UV header rc value */ > + __u16 uv_rrc; /* UV header rrc value */ > + __u64 argument_addr; /* Userspace address of uvio argument */ > + __u32 argument_len; > + __u8 reserved14[0x40 - 0x14]; /* must be zero */ > +}; > + > +#define UVIO_ATT_USER_DATA_LEN 0x100 > +#define UVIO_ATT_UID_LEN 0x10 > +struct uvio_attest { > + __u64 arcb_addr; /* 0x0000 */ > + __u64 meas_addr; /* 0x0008 */ > + __u64 add_data_addr; /* 0x0010 */ > + __u8 user_data[UVIO_ATT_USER_DATA_LEN]; /* 0x0018 */ > + __u8 config_uid[UVIO_ATT_UID_LEN]; /* 0x0118 */ > + __u32 arcb_len; /* 0x0128 */ > + __u32 meas_len; /* 0x012c */ > + __u32 add_data_len; /* 0x0130 */ > + __u16 user_data_len; /* 0x0134 */ > + __u16 reserved136; /* 0x0136 */ > +}; > + > +/* > + * The following max values define an upper length for the IOCTL in/out buffers. > + * However, they do not represent the maximum the Ultravisor allows which is > + * often way smaller. By allowing larger buffer sizes we hopefully do not need > + * to update the code with every machine update. It is therefore possible for > + * userspace to request more memory than actually used by kernel/UV. > + */ > +#define UVIO_ATT_ARCB_MAX_LEN 0x100000 > +#define UVIO_ATT_MEASUREMENT_MAX_LEN 0x8000 > +#define UVIO_ATT_ADDITIONAL_MAX_LEN 0x8000 > + > +#define UVIO_DEVICE_NAME "uv" > +#define UVIO_TYPE_UVC 'u' > + > +#define UVIO_IOCTL_ATT _IOWR(UVIO_TYPE_UVC, 0x01, struct uvio_ioctl_cb) > + > +#endif /* __S390X_ASM_UVDEVICE_H */ > diff --git a/drivers/s390/char/Kconfig b/drivers/s390/char/Kconfig > index 6cc4b19acf85..c8fa466815ac 100644 > --- a/drivers/s390/char/Kconfig > +++ b/drivers/s390/char/Kconfig > @@ -184,3 +184,13 @@ config S390_VMUR > depends on S390 > help > Character device driver for z/VM reader, puncher and printer. > + > +config S390_UV_UAPI > + def_tristate y > + prompt "Ultravisor userspace API" > + help > + Selecting exposes parts of the UV interface to userspace > + by providing a misc character device at /dev/uv. > + Using IOCTLs one can interact with the UV. > + The device is only available if the Ultravisor > + Facility (158) is present. > diff --git a/drivers/s390/char/Makefile b/drivers/s390/char/Makefile > index c6fdb81a068a..ce32270082f5 100644 > --- a/drivers/s390/char/Makefile > +++ b/drivers/s390/char/Makefile > @@ -48,6 +48,7 @@ obj-$(CONFIG_MONREADER) += monreader.o > obj-$(CONFIG_MONWRITER) += monwriter.o > obj-$(CONFIG_S390_VMUR) += vmur.o > obj-$(CONFIG_CRASH_DUMP) += sclp_sdias.o zcore.o > +obj-$(CONFIG_S390_UV_UAPI) += uvdevice.o > > hmcdrv-objs := hmcdrv_mod.o hmcdrv_dev.o hmcdrv_ftp.o hmcdrv_cache.o diag_ftp.o sclp_ftp.o > obj-$(CONFIG_HMC_DRV) += hmcdrv.o > diff --git a/drivers/s390/char/uvdevice.c b/drivers/s390/char/uvdevice.c > new file mode 100644 > index 000000000000..b720dc8d0bd9 > --- /dev/null > +++ b/drivers/s390/char/uvdevice.c > @@ -0,0 +1,264 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * Copyright IBM Corp. 2022 > + * Author(s): Steffen Eiden > + * > + * This file provides a Linux misc device to give userspace access to some > + * Ultravisor (UV) functions. The device only accepts IOCTLs and will only > + * be present if the Ultravisor facility (158) is present. > + * > + * When userspace sends a valid IOCTL uvdevice will copy the input data to > + * kernel space, do some basic validity checks to avoid kernel/system > + * corruption. Any other check that the Ultravisor does will not be done by > + * the uvdevice to keep changes minimal when adding new functionalities > + * to existing UV-calls. > + * After the checks uvdevice builds a corresponding > + * Ultravisor Call Control Block, and sends the request to the Ultravisor. > + * Then, it copies the response, including the return codes, back to userspace. > + * It is the responsibility of the userspace to check for any error issued > + * by UV and to interpret the UV response. The uvdevice acts as a communication > + * channel for userspace to the Ultravisor. > + */ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +#include > +#include > + > +static int uvio_build_uvcb_attest(struct uv_cb_attest *uvcb_attest, u8 *arcb, > + u8 *meas, u8 *add_data, struct uvio_attest *uvio_attest) > +{ > + void __user *user_buf_arcb = (void __user *)uvio_attest->arcb_addr; > + > + if (copy_from_user(arcb, user_buf_arcb, uvio_attest->arcb_len)) > + return -EFAULT; > + > + uvcb_attest->header.len = sizeof(*uvcb_attest); > + uvcb_attest->header.cmd = UVC_CMD_RETR_ATTEST; > + uvcb_attest->arcb_addr = (u64)arcb; > + uvcb_attest->cont_token = 0; > + uvcb_attest->user_data_len = uvio_attest->user_data_len; > + memcpy(uvcb_attest->user_data, uvio_attest->user_data, sizeof(uvcb_attest->user_data)); > + uvcb_attest->meas_len = uvio_attest->meas_len; > + uvcb_attest->meas_addr = (u64)meas; > + uvcb_attest->add_data_len = uvio_attest->add_data_len; > + uvcb_attest->add_data_addr = (u64)add_data; > + > + return 0; > +} > + > +static int uvio_copy_attest_result_to_user(struct uv_cb_attest *uvcb_attest, > + struct uvio_ioctl_cb *uv_ioctl, > + u8 *measurement, u8 *add_data, > + struct uvio_attest *uvio_attest) > +{ > + struct uvio_attest __user *user_uvio_attest = (void __user *)uv_ioctl->argument_addr; > + void __user *user_buf_add = (void __user *)uvio_attest->add_data_addr; > + void __user *user_buf_meas = (void __user *)uvio_attest->meas_addr; > + void __user *user_buf_uid = &user_uvio_attest->config_uid; > + > + if (copy_to_user(user_buf_meas, measurement, uvio_attest->meas_len)) > + return -EFAULT; > + if (add_data && copy_to_user(user_buf_add, add_data, uvio_attest->add_data_len)) > + return -EFAULT; > + if (copy_to_user(user_buf_uid, uvcb_attest->config_uid, sizeof(uvcb_attest->config_uid))) > + return -EFAULT; > + return 0; > +} > + > +static int get_uvio_attest(struct uvio_ioctl_cb *uv_ioctl, struct uvio_attest *uvio_attest) > +{ > + u8 __user *user_arg_buf = (u8 __user *)uv_ioctl->argument_addr; > + > + if (copy_from_user(uvio_attest, user_arg_buf, sizeof(*uvio_attest))) > + return -EFAULT; > + > + if (uvio_attest->arcb_len > UVIO_ATT_ARCB_MAX_LEN) > + return -EINVAL; > + if (uvio_attest->arcb_len == 0) > + return -EINVAL; > + if (uvio_attest->meas_len > UVIO_ATT_MEASUREMENT_MAX_LEN) > + return -EINVAL; > + if (uvio_attest->meas_len == 0) > + return -EINVAL; > + if (uvio_attest->add_data_len > UVIO_ATT_ADDITIONAL_MAX_LEN) > + return -EINVAL; > + if (uvio_attest->reserved136) > + return -EINVAL; > + return 0; > +} > + > +/** > + * uvio_attestation() - Perform a Retrieve Attestation Measurement UVC. > + * > + * uv_ioctl: ioctl control block > + * > + * uvio_attestation() does a Retrieve Attestation Measurement Ultravisor Call. > + * It verifies that the given userspace addresses are valid and request sizes > + * are sane. Every other check is made by the Ultravisor (UV) and won't result > + * in a negative return value. It copies the input to kernelspace, builds the > + * request, sends the UV-call, and copies the result to userspace. > + * > + * The Attestation Request has two input and two outputs. > + * ARCB and User Data are inputs for the UV generated by userspace. > + * Measurement and Additional Data are outputs for userspace generated by UV. > + * > + * The Attestation Request Control Block (ARCB) is a cryptographically verified > + * and secured request to UV and User Data is some plaintext data which is > + * going to be included in the Attestation Measurement calculation. > + * > + * Measurement is a cryptographic measurement of the callers properties, > + * optional data configured by the ARCB and the user data. If specified by the > + * ARCB, UV will add some Additional Data to the measurement calculation. > + * This Additional Data is then returned as well. > + * > + * If the Retrieve Attestation Measurement UV facility is not present, > + * UV will return invalid command rc. This won't be fenced in the driver > + * and does not result in a negative return value. > + * > + * Context: might sleep > + * > + * Return: 0 on success or a negative error code on error. > + */ > +static int uvio_attestation(struct uvio_ioctl_cb *uv_ioctl) > +{ > + struct uv_cb_attest *uvcb_attest = NULL; > + struct uvio_attest *uvio_attest = NULL; > + u8 *measurement = NULL; > + u8 *add_data = NULL; > + u8 *arcb = NULL; > + int ret; > + > + ret = -EINVAL; > + if (uv_ioctl->argument_len != sizeof(*uvio_attest)) > + goto out; > + > + ret = -ENOMEM; > + uvio_attest = kzalloc(sizeof(*uvio_attest), GFP_KERNEL); > + if (!uvio_attest) > + goto out; > + > + ret = get_uvio_attest(uv_ioctl, uvio_attest); > + if (ret) > + goto out; > + > + ret = -ENOMEM; > + arcb = kvzalloc(uvio_attest->arcb_len, GFP_KERNEL); > + measurement = kvzalloc(uvio_attest->meas_len, GFP_KERNEL); > + if (!arcb || !measurement) > + goto out; > + > + if (uvio_attest->add_data_len) { > + add_data = kvzalloc(uvio_attest->add_data_len, GFP_KERNEL); > + if (!add_data) > + goto out; > + } > + > + uvcb_attest = kzalloc(sizeof(*uvcb_attest), GFP_KERNEL); > + if (!uvcb_attest) > + goto out; > + > + ret = uvio_build_uvcb_attest(uvcb_attest, arcb, measurement, add_data, uvio_attest); > + if (ret) > + goto out; > + > + uv_call_sched(0, (u64)uvcb_attest); > + > + uv_ioctl->uv_rc = uvcb_attest->header.rc; > + uv_ioctl->uv_rrc = uvcb_attest->header.rrc; > + > + ret = uvio_copy_attest_result_to_user(uvcb_attest, uv_ioctl, measurement, add_data, > + uvio_attest); > +out: > + kvfree(arcb); > + kvfree(measurement); > + kvfree(add_data); > + kfree(uvio_attest); > + kfree(uvcb_attest); > + return ret; > +} > + > +static int uvio_copy_and_check_ioctl(struct uvio_ioctl_cb *ioctl, void __user *argp) > +{ > + if (copy_from_user(ioctl, argp, sizeof(*ioctl))) > + return -EFAULT; > + if (ioctl->flags != 0) > + return -EINVAL; > + if (memchr_inv(ioctl->reserved14, 0, sizeof(ioctl->reserved14))) > + return -EINVAL; > + > + return 0; > +} > + > +/* > + * IOCTL entry point for the Ultravisor device. > + */ > +static long uvio_ioctl(struct file *filp, unsigned int cmd, unsigned long arg) > +{ > + void __user *argp = (void __user *)arg; > + struct uvio_ioctl_cb *uv_ioctl; > + long ret; > + > + ret = -ENOMEM; > + uv_ioctl = vzalloc(sizeof(*uv_ioctl)); > + if (!uv_ioctl) > + goto out; > + > + switch (cmd) { > + case UVIO_IOCTL_ATT: > + ret = uvio_copy_and_check_ioctl(uv_ioctl, argp); > + if (ret) > + goto out; > + ret = uvio_attestation(uv_ioctl); > + break; > + default: > + ret = -ENOIOCTLCMD; > + break; > + } > + if (ret) > + goto out; > + > + if (copy_to_user(argp, uv_ioctl, sizeof(*uv_ioctl))) > + ret = -EFAULT; > + > + out: > + vfree(uv_ioctl); > + return ret; > +} > + > +static const struct file_operations uvio_dev_fops = { > + .owner = THIS_MODULE, > + .unlocked_ioctl = uvio_ioctl, > + .llseek = no_llseek, > +}; > + > +static struct miscdevice uvio_dev_miscdev = { > + .minor = MISC_DYNAMIC_MINOR, > + .name = UVIO_DEVICE_NAME, > + .fops = &uvio_dev_fops, > +}; > + > +static void __exit uvio_dev_exit(void) > +{ > + misc_deregister(&uvio_dev_miscdev); > +} > + > +static int __init uvio_dev_init(void) > +{ > + if (!test_facility(158)) > + return -ENXIO; > + return misc_register(&uvio_dev_miscdev); > +} > + > +module_init(uvio_dev_init); > +module_exit(uvio_dev_exit); > + > +MODULE_AUTHOR("IBM Corporation"); > +MODULE_LICENSE("GPL"); > +MODULE_DESCRIPTION("Ultravisor UAPI driver");