Received: by 2002:a05:7412:f589:b0:e2:908c:2ebd with SMTP id eh9csp722851rdb; Tue, 31 Oct 2023 23:57:15 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGDbT/QmgolMNy6GMeO29hAJ0JvcZfQsxLrgGRwFe+QUOM/+FvEodcw76iwn+cvqQXWAV48 X-Received: by 2002:a05:6871:741f:b0:1bf:6ec:dd4d with SMTP id nw31-20020a056871741f00b001bf06ecdd4dmr18109496oac.28.1698821835168; Tue, 31 Oct 2023 23:57:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698821835; cv=none; d=google.com; s=arc-20160816; b=w+iq4K5gK1gQltQjsSkqxzLva/OBvkC/IaXXOoQE2I37BvkHxW47xyK6Vml/wMA8pI ABrGksO2cB1Z8LYaQ/26JdcXvNeoAeKs2FWABUtTQByj2uxgBfGFzvJAVjKo6SY7DZ18 OOlmLQmWLrJvgcvdLI4nitA3a3mlLhHjj+L4xvIzw+vAwBawdbbv/veRfuM4ndLhAOja 6V9lPAsQRI88kaZUvpzBP0ojky+xvXv8jQ3nHytDXZ8YnCnQGXJ0f+G+APqQh+Rc6Mm9 xHrTVsMX9kDcT9IGBiEPaCF7cvtYvx9UkhAHx83K73QBL0HfgfXOIMvNC0Gm+BoG4UWu IiOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=JiYE+Xj7x4Icdjy2k9AFwuhXv474KYc/HzTCbGkS2Gg=; fh=arQD4ENijCFKgLG+ebP2VEyvjX9PaSJEC0S2/Kv0YzU=; b=O5qKR5sV4VTuRyIbm89r/crRwEsDrPGCHPcElhvAuOBpXdP83863F9Ek3YCIOerECX rYbEVflFnLokON4EsX3Igx3hEXmtNV2R4yqiHKfAYdee/nwjZK580C5GMRfjvYICUHko 0E3wt7wKWcBIUlhaSy6czbCIrMCH403GIZXWDJz/+NuvngvzUY3IK+RNiHMPMqmnNK1g GV5e7rFQxf/O5+MGPoFPbMC+kxpemS2bYMuztyJKxKLr8bMR7qhNt1StvQBU2JRndhhM Xg1IXsYWMbF08qhsYp25JFOSYBsy00XEc8CDS2hCzKAw/2ZA479UGCtE/pk1G0BrxAs5 LxsQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=GahnS2a0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id m16-20020a63fd50000000b005660335e26fsi2371699pgj.485.2023.10.31.23.57.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 23:57:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=GahnS2a0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 47080803D016; Tue, 31 Oct 2023 23:57:10 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344994AbjKAG44 (ORCPT + 99 others); Wed, 1 Nov 2023 02:56:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37704 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230252AbjKAG4z (ORCPT ); Wed, 1 Nov 2023 02:56:55 -0400 Received: from mail-ej1-x62d.google.com (mail-ej1-x62d.google.com [IPv6:2a00:1450:4864:20::62d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 97F0098 for ; Tue, 31 Oct 2023 23:56:49 -0700 (PDT) Received: by mail-ej1-x62d.google.com with SMTP id a640c23a62f3a-9d2c54482fbso528237866b.2 for ; Tue, 31 Oct 2023 23:56:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1698821808; x=1699426608; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=JiYE+Xj7x4Icdjy2k9AFwuhXv474KYc/HzTCbGkS2Gg=; b=GahnS2a0RWe0U0OVjmDeIZ/vGOWhhCFCRQ9Wvly4xDzC2Hr0oca8/x7yLi+E7WngKj C82s4hJ8yExtJTPgr9AlIDIwgkU37OVvnaMBLNOCwXmvQcTmn2NtAt6rsAN0f59MKJ+O jNbzub+aPYuNTp63Br2E2ABpWWdYm7MCM9F/B3ow22PuRFh/82J/GZ2OeZyfTZA8NE/9 aMH3oz0scPQZOvLcDr/DPqY8DzJrIzDZe8nONG/gcClZT+tzs7UqtUi0pbTrxdX5WZPE 1B8yVbQ9D8Q/Ws0YGroJORHEnx4o1rp41C/saqA0Ibt+km6G4ljdY+A1rcM4u7SthdYh fy7g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698821808; x=1699426608; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=JiYE+Xj7x4Icdjy2k9AFwuhXv474KYc/HzTCbGkS2Gg=; b=AXZQ2YwhIbDk3Hb9aSz+t1gEOLeVzQaKxs6irjR+CaQCQbnWVvt0jKaTpYuKNDBrqp ykUWim7Ff3XET1/33mFeGKU8jptUQ69YNvoJeP9/XfOHDWUnvoDfMFlIhmNG1UA/pAoV honr8EYBiPtuzLNaylA+IC+6kzj5ugDZsNfqpcQxSroroMOm1ErVoH5EhFvkzlr4pTLP QW+JBLDmmsWX3NlPRafRxlJnM/Cy4s6YgJNcHIxngw77nE3znnyQm/TQ+ACPloMLQN+S Dt95z8nenp9KcV/55RZsARDSYFIkFUeX2kzlHUl44YdMjzBD2H7sfx5pKiZXUkbDSe2f IjSw== X-Gm-Message-State: AOJu0Yx5m9be2asENlMpLeiTGlXOxhYooiMFsm80IYlovD8NVVJAiR6Y oaFWdOErpH4O34jo0Xje94nNcg== X-Received: by 2002:a17:906:d54b:b0:9a5:b878:7336 with SMTP id cr11-20020a170906d54b00b009a5b8787336mr1175194ejc.7.1698821807927; Tue, 31 Oct 2023 23:56:47 -0700 (PDT) Received: from hades (ppp046103219117.access.hol.gr. [46.103.219.117]) by smtp.gmail.com with ESMTPSA id me7-20020a170906aec700b009c3f1b3e988sm2047291ejb.90.2023.10.31.23.56.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 31 Oct 2023 23:56:47 -0700 (PDT) Date: Wed, 1 Nov 2023 08:56:44 +0200 From: Ilias Apalodimas To: Masahisa Kojima Cc: Ard Biesheuvel , Jens Wiklander , Jan Kiszka , Sumit Garg , linux-kernel@vger.kernel.org, op-tee@lists.trustedfirmware.org, Johan Hovold , Randy Dunlap , Heinrich Schuchardt , Jonathan Cameron Subject: Re: [PATCH v9 0/6] introduce tee-based EFI Runtime Variable Service Message-ID: References: <20231013074540.8980-1-masahisa.kojima@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Tue, 31 Oct 2023 23:57:10 -0700 (PDT) Kojima-san On Fri, Oct 27, 2023 at 04:26:50PM +0900, Masahisa Kojima wrote: > Hi Ilias, > > On Wed, 18 Oct 2023 at 20:35, Ilias Apalodimas > wrote: > > > > Kojima-san, > > > > I found some time to do some extended testing here's what I found > > > > Switching the permissions from RO->RW when the supplicant is started works > > correctly > > # mount | grep efiv > > efivarfs on /sys/firmware/efi/efivars type efivarfs (ro,nosuid,nodev,noexec,relatime) > > # tee-supplicant -d > > [ 77.374878] efivars: Unregistered efivars operations > > [ 77.381604] Use tee-based EFI runtime variable services > > [ 77.386862] efivars: Registered efivars operations > > # mount | grep efiv > > efivarfs on /sys/firmware/efi/efivars type efivarfs (rw,nosuid,nodev,noexec,relatime) > > I didn't test unbinding yet, but I assume it's going to work fine and > > remove the efivar ops. > > > > Reading an writing non-authenticated EFI variables seems to work fine. > > I verified this with U-Boot and the BootOrder changed correctly. > > # efibootmgr -o 0001,0002,0000 > > BootCurrent: 0002 > > BootOrder: 0001,0002,0000 > > Boot0000* nvme 0:1 > > Boot0001* nvme 0:2 > > Boot0002* debian > > # efibootmgr -o 0002,0000,0001 > > BootCurrent: 0002 > > BootOrder: 0002,0000,0001 > > Boot0000* nvme 0:1 > > Boot0001* nvme 0:2 > > Boot0002* debian > > > > Writing authenticated EFI variables works the first time. > > I also dumped those variables from both Linux and U-Boot and they matched > > # efi-updatevar -f PK.auth PK > > # efi-updatevar -f KEK.auth KEK > > # efi-updatevar -f db.auth db > > > > But removing the PK at runtime fails. > > # efi-updatevar -f noPK.auth PK > > # Failed to update PK: Operation not permitted > > My guess is that the EDK2 code prohibits that, but we need to check why > > this is happening. I also got similar failures trying to update KEK and db. > > "# efi-updatevar -f noPK.auth PK" does not reach the kernel efivarfs code. > With strace, error occurs when efi-updatevar tries to open > /sys/firmware/efi/efivars/KEK-*** file. > I guess O_TRUNC option in open() is not required? > > openat(AT_FDCWD, > "/sys/firmware/efi/efivars/KEK-8be4df61-93ca-11d2-aa0d-00e098032b8c", > O_RDWR|O_CREAT|O_TRUNC, 0644) = -1 EPERM (Operation not permitted) > write(2, "Failed to update KEK: ", 22Failed to update KEK: ) = 22 > write(2, "Operation not permitted\n", 24Operation not permitted > ) = 24 > exit_group(1) = ? > +++ exited with 1 +++ > > We can use "efivar" instead to remove the keys. It also works for KEK and db. > # efi-updatevar -f PK.auth PK > # efi-updatevar -f noPK.auth PK <--- it does not work > # efivar -w -n 8be4df61-93ca-11d2-aa0d-00e098032b8c-PK -f noPK.auth > <--- it works Ok that's fine then. Thanks for verifying it > > > > > But the most worrying thing is this. From Linux program KEK and db > > # efi-updatevar -f KEK.auth KEK > > # efi-updatevar -f db.auth db > > > > Reboot the machine and U-Boot complains when it tries to populate the > > runtime vars with: > > Loading Linux 6.6.0-rc2-00654-g82a013b37495 ... > > Loading initial ramdisk ... > > EFI stub: Booting Linux Kernel... > > EFI stub: Using DTB from configuration table > > EFI stub: Exiting boot services... > > Can't populate EFI variables. No runtime variables will be available <-- This > > I could not reproduce this issue. > I tried the following command then reboot the board. Linux boots fine. > # efi-updatevar -f KEK.auth KEK > # efi-updatevar -f db.auth db > > I also enroll the PK, then UEFI secure boot works. > Signed grub and signed kernel boot in UEFI secure boot enabled. > > Are there any additional steps to reproduce? We discussed this offline, and this is not a driver bug indeed. It's linked to how u-boot populates runtime variables. When SHIM gets in the mix it adds a bunch of volatile RT variables. The runtime memory that u-boot uses to store these variables is a Kconfig options, so it's just a matter of bumping that size. Thanks /Ilias > > Thanks, > Masahisa Kojima > > > > > If you rewrite those vars from the U-Boot shell everything seems to come > > back to normal > > => tftp $loadaddr 192.168.49.5:noKEK.auth && setenv -e -nv -bs -rt -at -i $loadaddr:$filesize KEK > > => tftp $loadaddr 192.168.49.5:nodb.auth && setenv -e -nv -bs -rt -at -i $loadaddr:$filesize db > > => tftp $loadaddr 192.168.49.5:KEK.auth && setenv -e -nv -bs -rt -at -i $loadaddr:$filesize KEK > > => tftp $loadaddr 192.168.49.5:db.auth && setenv -e -nv -bs -rt -at -i $loadaddr:$filesize db > > > > Loading Linux 6.6.0-rc2-00654-g82a013b37495 ... > > Loading initial ramdisk ... > > EFI stub: Booting Linux Kernel... > > EFI stub: Using DTB from configuration table > > EFI stub: Exiting boot services... > > > > Let me know if you need any more information > > > > Regards > > /Ilias > > On Fri, Oct 13, 2023 at 04:45:33PM +0900, Masahisa Kojima wrote: > > > This series introduces the tee based EFI Runtime Variable Service. > > > > > > The eMMC device is typically owned by the non-secure world(linux in > > > this case). There is an existing solution utilizing eMMC RPMB partition > > > for EFI Variables, it is implemented by interacting with > > > OP-TEE, StandaloneMM(as EFI Variable Service Pseudo TA), eMMC driver > > > and tee-supplicant. The last piece is the tee-based variable access > > > driver to interact with OP-TEE and StandaloneMM. > > > > > > Changelog: > > > v8 -> v9 > > > - patch #6 "tee: optee: restore efivars ops when tee-supplicant stops" > > > is newly added > > > - remove !EFI_VARS_PSTORE Kconfig dependency, we have added a non-blocking > > > set_variable and it just returns EFI_UNSUPPORTED. > > > - remove obvious comments > > > > > > v7 -> v8 > > > Only patch #3 "efi: Add tee-based EFI variable driver" is updated. > > > - fix typos > > > - refactor error handling, direct return if applicable > > > - use devm_add_action_or_reset() for closing of tee context/session > > > - remove obvious comment > > > > > > v6 -> v7 > > > Patch #1-#4 are not updated. > > > Patch #5 is added into this series, original patch is here: > > > https://lore.kernel.org/all/20230609094532.562934-1-ilias.apalodimas@linaro.org/ > > > > > > There are two issues in the v6 series and v7 series addresses those. > > > > > > 1) efivar ops is not restored when the tee-supplicant daemon terminates. > > > -> As the following patch says, user must remove the device before > > > terminating tee-supplicant daemon. > > > https://lore.kernel.org/all/20230728134832.326467-1-sumit.garg@linaro.org/ > > > > > > 2) cause panic when someone remounts the efivarfs as RW even if > > > SetVariable is not supported > > > -> The fifth patch addresses this issue. > > > "[PATCH v7 5/5] efivarfs: force RO when remounting if SetVariable is > > > not supported" > > > > > > v5 -> v6 > > > - new patch #4 is added in this series, #1-#3 patches are unchanged. > > > automatically update super block flag when the efivarops support > > > SetVariable runtime service, so that user does not need to manually > > > remount the efivarfs as RW. > > > > > > v4 -> v5 > > > - rebase to efi-next based on v6.4-rc1 > > > - set generic_ops.query_variable_info, it works as expected as follows. > > > $ df -h /sys/firmware/efi/efivars/ > > > Filesystem Size Used Avail Use% Mounted on > > > efivarfs 16K 1.3K 15K 8% /sys/firmware/efi/efivars > > > > > > v3 -> v4: > > > - replace the reference from EDK2 to PI Specification > > > - remove EDK2 source code reference comments > > > - prepare nonblocking variant of set_variable, it just returns > > > EFI_UNSUPPORTED > > > - remove redundant buffer size check > > > - argument name change in mm_communicate > > > - function interface changes in setup_mm_hdr to remove (void **) cast > > > > > > v2 -> v3: > > > - add CONFIG_EFI dependency to TEE_STMM_EFI > > > - add missing return code check for tee_client_invoke_func() > > > - directly call efivars_register/unregister from tee_stmm_efi.c > > > > > > rfc v1 -> v2: > > > - split patch into three patches, one for drivers/tee, > > > one for include/linux/efi.h, and one for the driver/firmware/efi/stmm > > > - context/session management into probe() and remove() same as other tee > > > client driver > > > - StMM variable driver is moved from driver/tee/optee to driver/firmware/efi > > > - use "tee" prefix instead of "optee" in driver/firmware/efi/stmm/tee_stmm_efi.c, > > > this file does not contain op-tee specific code, abstracted by tee layer and > > > StMM variable driver will work on other tee implementation. > > > - PTA_STMM_CMD_COMMUNICATE -> PTA_STMM_CMD_COMMUNICATE > > > - implement query_variable_store() but currently not used > > > - no use of TEEC_SUCCESS, it is defined in driver/tee/optee/optee_private.h. > > > Other tee client drivers use 0 instead of using TEEC_SUCCESS > > > - remove TEEC_ERROR_EXCESS_DATA status, it is referred just to output > > > error message > > > > > > Ilias Apalodimas (1): > > > efivarfs: force RO when remounting if SetVariable is not supported > > > > > > Masahisa Kojima (5): > > > efi: expose efivar generic ops register function > > > efi: Add EFI_ACCESS_DENIED status code > > > efi: Add tee-based EFI variable driver > > > efivarfs: automatically update super block flag > > > tee: optee: restore efivars ops when tee-supplicant stops > > > > > > drivers/firmware/efi/Kconfig | 15 + > > > drivers/firmware/efi/Makefile | 1 + > > > drivers/firmware/efi/efi.c | 18 + > > > drivers/firmware/efi/stmm/mm_communication.h | 236 +++++++ > > > drivers/firmware/efi/stmm/tee_stmm_efi.c | 617 +++++++++++++++++++ > > > drivers/firmware/efi/vars.c | 8 + > > > drivers/tee/optee/supp.c | 4 + > > > fs/efivarfs/super.c | 45 ++ > > > include/linux/efi.h | 13 + > > > 9 files changed, 957 insertions(+) > > > create mode 100644 drivers/firmware/efi/stmm/mm_communication.h > > > create mode 100644 drivers/firmware/efi/stmm/tee_stmm_efi.c > > > > > > > > > base-commit: b691118f2c44d16b84fc65b8147b33620eb18cac > > > -- > > > 2.30.2 > > >