Received: by 2002:a05:6500:1b41:b0:1fb:d597:ff75 with SMTP id cz1csp272464lqb; Tue, 4 Jun 2024 10:49:20 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWsP+f+0dQxpsTG/SlhDE8TqqLy/iJMCvMzt7ep+fWgNu+F4MuwpGawYFhU1NMN/TY0Ghhx3hKGDlh7yRPp0QFgEKV41rlFjMwfE5f8/w== X-Google-Smtp-Source: AGHT+IEfX+28OKkyw2htThAjmSF87j0RNuLePEBlQUIO1Ekh4Hl22G1kOXeAGB/Q3LOydhIHK10y X-Received: by 2002:a92:c26a:0:b0:374:7fb7:7e56 with SMTP id e9e14a558f8ab-374b1e13c87mr274945ab.0.1717523359977; Tue, 04 Jun 2024 10:49:19 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717523359; cv=pass; d=google.com; s=arc-20160816; b=mvL/+UiDJ2KM/3A08SAOqZPblWdz8pIlG8wSLPgaqxso7aIUXLPhZ+y57Aw6kijeoB YXkdmTRf4XowJSMMq2Gajz4huqFMBVGPa5BBp/UwDDtYn3VPbu1+gk3JUFRAqe+S7584 pAlw93UEIBDyBOE3Hhms+RGsneAByiFaampfHE/FlY8+MKukZxlHKLgzRDdoewA6jdTV api/I2Zb3fNDbRi+BRqNzzX0vK/KUcBWHfGrhqIH24U2VP3YM+HZcX7Aj2eYWRwP4Vfs 3Q93M8Yjn+ztqX+G//6GXjWys8AKvOUI2XBWnJlBmUnXaCLNGAdIBujEqAJ4HBJPeuP/ A4Ng== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :dkim-signature; bh=AXBrPHo4Ta0V3OAenL31koW6QDCKI8Gbni0yTF0637E=; fh=GUah4SkriN0Z+7bGMmOV21IWSyeiBUawgacExzW3vd0=; b=fpWfUZbT7923Xqo/fSqyn27VLthEd7Bqs4H7Xi8VJtzF0wy/dEWaRa7mA6Vx6JqY5z ndO0ytYDW+P/OX/V1ZF7XNue6LP/VMQfXPpfWSpcsazWmE2n5zS2yZgIekJ+Oul50Dcy Dwl/w7G9V0XGQmtXnrsDRG9tElpshPf6TNLk+6TGcWt4pM9GFA0OIISKGIsh9+lBAJjW jbb8rDNbGcVhFKOpQQFBnPGvQGAKij8V3l3PEBg6QJrRioel8N7WK3SIS68ISW3vw//6 u0dImnKFrok+E29Q5SxQadAgg54iNbOMNvOMS+lnQ25JuRWIjrhyNr/9xmSZ4Kb5TkeC GiDg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mewng6sf; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-201158-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-201158-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id 41be03b00d2f7-6c37fad0bb5si8333506a12.248.2024.06.04.10.49.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Jun 2024 10:49:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-201158-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Mewng6sf; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-201158-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-201158-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 4930F2880B1 for ; Tue, 4 Jun 2024 17:28:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 4F71C14884D; Tue, 4 Jun 2024 17:28:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Mewng6sf" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 029BE13E030; Tue, 4 Jun 2024 17:28:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717522088; cv=none; b=LbrVX5tMhK5lJ0wdfwMYBdWkhV7uhuhGc1aoOPjYPSifaOtS9YCQ72aST7o7qUwB//P/kIlym0BLzun8I8m263CSrKiaJeLkKt0EU3+0zJ6LDmcI951SYEobyaJNtwCzSPX5RL2njsY8I8nRdAZ6OMLmNgTfSG04PYQzsLqynzo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717522088; c=relaxed/simple; bh=Hq7jDuDAZuNVQvwyzMy9LQ/uIpB/beFQlGAvgABevb0=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=utcn16/w307OzwBE7KiINPzFRU7XOt4WvZou2c0sObHVfPOYWV9t7LwZOaV+288ZvaE9rKqgDl6+MsXr72qSzsBSsmnddGmhTRf2Bj7uKXodBiKvyEjgU3lS1jAg89oRzJDxV9a8uP4a0VCLo1NAXRYixBeO0DDmVOOIgFtJU64= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Mewng6sf; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 64CAAC32786; Tue, 4 Jun 2024 17:28:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1717522087; bh=Hq7jDuDAZuNVQvwyzMy9LQ/uIpB/beFQlGAvgABevb0=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Mewng6sff4Q3oHOO3u97/PHwvW1/PQKVsHvj+tNZgI+goJF98V+8mWUg7oaMAUl1u NWcPI3f518914FmCk0FQc+b87p2LBoHmKN/RQlmqtsfCVBjKfeiwXOy2RPK/9tSPEC Jcs2eM54eLIP8x40IKPpwHfmgWaqj+eeFvMbSd3UMCrlu1lAENkTGbGe7ZaC895gWJ diiui7vM3gEClN0mIa1zS2L2NybEFjzYl732Z7SR/EY/3LcbkRS6i9Pt67nXRrNIhI ComB5C0GpjIr9clPbsOuGADQsN7Uy9Vq/TorEzxHZil1m67OeHep7FfcbmS+kwRhxi THugSpYp7q+fg== Received: by mail-lj1-f172.google.com with SMTP id 38308e7fff4ca-2eaa89464a3so32981871fa.3; Tue, 04 Jun 2024 10:28:07 -0700 (PDT) X-Forwarded-Encrypted: i=1; AJvYcCVQP4DBmbEcE7IWsvFAwRbI9Z8A3m1GcbrUoE6SAFSF1B33RO4WO089pmUgZnN6RsmpzNsNLLJhRb1tOhpkhBGdpLR2sRVsEjBTEJMbCoIlN6jTd88gl8cjJ1/sziBOp2GB11XVA74vvU3m3wiiOkqL+f6N+1YvGq0WSx98+BzzGp4HMIorInGtzk+k+SCQfxTbS9pvxGTiVgpKhLxKbVdqoM5s X-Gm-Message-State: AOJu0YyqVJ7J69mO5WNdB8pCAIWzqvTnaqtFAlIDZzUiN1wDzPEZq/Ln 2+wsrJ23fnuX7n99k5fLvl36Cp0nvBPmOwCiOuvjDk9IZSfLhcVowi/XlMw9BaQDrjrOexjrULB O7FfkW8DjSI80jgXkB5PVzbvY3Ok= X-Received: by 2002:a2e:90d8:0:b0:2df:b0e3:b548 with SMTP id 38308e7fff4ca-2ea951ace3cmr74448021fa.42.1717522085743; Tue, 04 Jun 2024 10:28:05 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240531010331.134441-1-ross.philipson@oracle.com> <20240531010331.134441-9-ross.philipson@oracle.com> <5bffa507-75e8-4cce-ac0c-fe13d6efd3bb@oracle.com> In-Reply-To: <5bffa507-75e8-4cce-ac0c-fe13d6efd3bb@oracle.com> From: Ard Biesheuvel Date: Tue, 4 Jun 2024 19:27:53 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v9 08/19] x86: Secure Launch kernel early boot stub To: ross.philipson@oracle.com Cc: linux-kernel@vger.kernel.org, x86@kernel.org, linux-integrity@vger.kernel.org, linux-doc@vger.kernel.org, linux-crypto@vger.kernel.org, kexec@lists.infradead.org, linux-efi@vger.kernel.org, iommu@lists.linux-foundation.org, dpsmith@apertussolutions.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, dave.hansen@linux.intel.com, mjg59@srcf.ucam.org, James.Bottomley@hansenpartnership.com, peterhuewe@gmx.de, jarkko@kernel.org, jgg@ziepe.ca, luto@amacapital.net, nivedita@alum.mit.edu, herbert@gondor.apana.org.au, davem@davemloft.net, corbet@lwn.net, ebiederm@xmission.com, dwmw2@infradead.org, baolu.lu@linux.intel.com, kanth.ghatraju@oracle.com, andrew.cooper3@citrix.com, trenchboot-devel@googlegroups.com Content-Type: text/plain; charset="UTF-8" On Tue, 4 Jun 2024 at 19:24, wrote: > > On 5/31/24 6:33 AM, Ard Biesheuvel wrote: > > On Fri, 31 May 2024 at 13:00, Ard Biesheuvel wrote: > >> > >> Hello Ross, > >> > >> On Fri, 31 May 2024 at 03:32, Ross Philipson wrote: > >>> > >>> The Secure Launch (SL) stub provides the entry point for Intel TXT (and > >>> later AMD SKINIT) to vector to during the late launch. The symbol > >>> sl_stub_entry is that entry point and its offset into the kernel is > >>> conveyed to the launching code using the MLE (Measured Launch > >>> Environment) header in the structure named mle_header. The offset of the > >>> MLE header is set in the kernel_info. The routine sl_stub contains the > >>> very early late launch setup code responsible for setting up the basic > >>> environment to allow the normal kernel startup_32 code to proceed. It is > >>> also responsible for properly waking and handling the APs on Intel > >>> platforms. The routine sl_main which runs after entering 64b mode is > >>> responsible for measuring configuration and module information before > >>> it is used like the boot params, the kernel command line, the TXT heap, > >>> an external initramfs, etc. > >>> > >>> Signed-off-by: Ross Philipson > >>> --- > >>> Documentation/arch/x86/boot.rst | 21 + > >>> arch/x86/boot/compressed/Makefile | 3 +- > >>> arch/x86/boot/compressed/head_64.S | 30 + > >>> arch/x86/boot/compressed/kernel_info.S | 34 ++ > >>> arch/x86/boot/compressed/sl_main.c | 577 ++++++++++++++++++++ > >>> arch/x86/boot/compressed/sl_stub.S | 725 +++++++++++++++++++++++++ > >>> arch/x86/include/asm/msr-index.h | 5 + > >>> arch/x86/include/uapi/asm/bootparam.h | 1 + > >>> arch/x86/kernel/asm-offsets.c | 20 + > >>> 9 files changed, 1415 insertions(+), 1 deletion(-) > >>> create mode 100644 arch/x86/boot/compressed/sl_main.c > >>> create mode 100644 arch/x86/boot/compressed/sl_stub.S > >>> > >>> diff --git a/Documentation/arch/x86/boot.rst b/Documentation/arch/x86/boot.rst > >>> index 4fd492cb4970..295cdf9bcbdb 100644 > >>> --- a/Documentation/arch/x86/boot.rst > >>> +++ b/Documentation/arch/x86/boot.rst > >>> @@ -482,6 +482,14 @@ Protocol: 2.00+ > >>> - If 1, KASLR enabled. > >>> - If 0, KASLR disabled. > >>> > >>> + Bit 2 (kernel internal): SLAUNCH_FLAG > >>> + > >>> + - Used internally by the setup kernel to communicate > >>> + Secure Launch status to kernel proper. > >>> + > >>> + - If 1, Secure Launch enabled. > >>> + - If 0, Secure Launch disabled. > >>> + > >>> Bit 5 (write): QUIET_FLAG > >>> > >>> - If 0, print early messages. > >>> @@ -1028,6 +1036,19 @@ Offset/size: 0x000c/4 > >>> > >>> This field contains maximal allowed type for setup_data and setup_indirect structs. > >>> > >>> +============ ================= > >>> +Field name: mle_header_offset > >>> +Offset/size: 0x0010/4 > >>> +============ ================= > >>> + > >>> + This field contains the offset to the Secure Launch Measured Launch Environment > >>> + (MLE) header. This offset is used to locate information needed during a secure > >>> + late launch using Intel TXT. If the offset is zero, the kernel does not have > >>> + Secure Launch capabilities. The MLE entry point is called from TXT on the BSP > >>> + following a success measured launch. The specific state of the processors is > >>> + outlined in the TXT Software Development Guide, the latest can be found here: > >>> + https://urldefense.com/v3/__https://www.intel.com/content/dam/www/public/us/en/documents/guides/intel-txt-software-development-guide.pdf__;!!ACWV5N9M2RV99hQ!Mng0gnPhOYZ8D02t1rYwQfY6U3uWaypJyd1T2rsWz3QNHr9GhIZ9ANB_-cgPExxX0e0KmCpda-3VX8Fj$ > >>> + > >>> > >> > >> Could we just repaint this field as the offset relative to the start > >> of kernel_info rather than relative to the start of the image? That > >> way, there is no need for patch #1, and given that the consumer of > >> this field accesses it via kernel_info, I wouldn't expect any issues > >> in applying this offset to obtain the actual address. > >> > >> > >>> The Image Checksum > >>> ================== > >>> diff --git a/arch/x86/boot/compressed/Makefile b/arch/x86/boot/compressed/Makefile > >>> index 9189a0e28686..9076a248d4b4 100644 > >>> --- a/arch/x86/boot/compressed/Makefile > >>> +++ b/arch/x86/boot/compressed/Makefile > >>> @@ -118,7 +118,8 @@ vmlinux-objs-$(CONFIG_EFI) += $(obj)/efi.o > >>> vmlinux-objs-$(CONFIG_EFI_MIXED) += $(obj)/efi_mixed.o > >>> vmlinux-objs-$(CONFIG_EFI_STUB) += $(objtree)/drivers/firmware/efi/libstub/lib.a > >>> > >>> -vmlinux-objs-$(CONFIG_SECURE_LAUNCH) += $(obj)/early_sha1.o $(obj)/early_sha256.o > >>> +vmlinux-objs-$(CONFIG_SECURE_LAUNCH) += $(obj)/early_sha1.o $(obj)/early_sha256.o \ > >>> + $(obj)/sl_main.o $(obj)/sl_stub.o > >>> > >>> $(obj)/vmlinux: $(vmlinux-objs-y) FORCE > >>> $(call if_changed,ld) > >>> diff --git a/arch/x86/boot/compressed/head_64.S b/arch/x86/boot/compressed/head_64.S > >>> index 1dcb794c5479..803c9e2e6d85 100644 > >>> --- a/arch/x86/boot/compressed/head_64.S > >>> +++ b/arch/x86/boot/compressed/head_64.S > >>> @@ -420,6 +420,13 @@ SYM_CODE_START(startup_64) > >>> pushq $0 > >>> popfq > >>> > >>> +#ifdef CONFIG_SECURE_LAUNCH > >>> + /* Ensure the relocation region is coverd by a PMR */ > >> > >> covered > >> > >>> + movq %rbx, %rdi > >>> + movl $(_bss - startup_32), %esi > >>> + callq sl_check_region > >>> +#endif > >>> + > >>> /* > >>> * Copy the compressed kernel to the end of our buffer > >>> * where decompression in place becomes safe. > >>> @@ -462,6 +469,29 @@ SYM_FUNC_START_LOCAL_NOALIGN(.Lrelocated) > >>> shrq $3, %rcx > >>> rep stosq > >>> > >>> +#ifdef CONFIG_SECURE_LAUNCH > >>> + /* > >>> + * Have to do the final early sl stub work in 64b area. > >>> + * > >>> + * *********** NOTE *********** > >>> + * > >>> + * Several boot params get used before we get a chance to measure > >>> + * them in this call. This is a known issue and we currently don't > >>> + * have a solution. The scratch field doesn't matter. There is no > >>> + * obvious way to do anything about the use of kernel_alignment or > >>> + * init_size though these seem low risk with all the PMR and overlap > >>> + * checks in place. > >>> + */ > >>> + movq %r15, %rdi > >>> + callq sl_main > >>> + > >>> + /* Ensure the decompression location is covered by a PMR */ > >>> + movq %rbp, %rdi > >>> + movq output_len(%rip), %rsi > >>> + callq sl_check_region > >>> +#endif > >>> + > >>> + pushq %rsi > >> > >> This looks like a rebase error. > >> > >>> call load_stage2_idt > >>> > >>> /* Pass boot_params to initialize_identity_maps() */ > >>> diff --git a/arch/x86/boot/compressed/kernel_info.S b/arch/x86/boot/compressed/kernel_info.S > >>> index c18f07181dd5..e199b87764e9 100644 > >>> --- a/arch/x86/boot/compressed/kernel_info.S > >>> +++ b/arch/x86/boot/compressed/kernel_info.S > >>> @@ -28,6 +28,40 @@ SYM_DATA_START(kernel_info) > >>> /* Maximal allowed type for setup_data and setup_indirect structs. */ > >>> .long SETUP_TYPE_MAX > >>> > >>> + /* Offset to the MLE header structure */ > >>> +#if IS_ENABLED(CONFIG_SECURE_LAUNCH) > >>> + .long rva(mle_header) > >> > >> ... so this could just be mle_header - kernel_info, and the consumer > >> can do the math instead. > >> > >>> +#else > >>> + .long 0 > >>> +#endif > >>> + > >>> kernel_info_var_len_data: > >>> /* Empty for time being... */ > >>> SYM_DATA_END_LABEL(kernel_info, SYM_L_LOCAL, kernel_info_end) > >>> + > >>> +#if IS_ENABLED(CONFIG_SECURE_LAUNCH) > >>> + /* > >>> + * The MLE Header per the TXT Specification, section 2.1 > >>> + * MLE capabilities, see table 4. Capabilities set: > >>> + * bit 0: Support for GETSEC[WAKEUP] for RLP wakeup > >>> + * bit 1: Support for RLP wakeup using MONITOR address > >>> + * bit 2: The ECX register will contain the pointer to the MLE page table > >>> + * bit 5: TPM 1.2 family: Details/authorities PCR usage support > >>> + * bit 9: Supported format of TPM 2.0 event log - TCG compliant > >>> + */ > >>> +SYM_DATA_START(mle_header) > >>> + .long 0x9082ac5a /* UUID0 */ > >>> + .long 0x74a7476f /* UUID1 */ > >>> + .long 0xa2555c0f /* UUID2 */ > >>> + .long 0x42b651cb /* UUID3 */ > >>> + .long 0x00000034 /* MLE header size */ > >>> + .long 0x00020002 /* MLE version 2.2 */ > >>> + .long rva(sl_stub_entry) /* Linear entry point of MLE (virt. address) */ > >> > >> and these should perhaps be relative to mle_header? > >> > >>> + .long 0x00000000 /* First valid page of MLE */ > >>> + .long 0x00000000 /* Offset within binary of first byte of MLE */ > >>> + .long rva(_edata) /* Offset within binary of last byte + 1 of MLE */ > >> > >> and here > >> > > > > Ugh never mind - these are specified externally. > > Can you clarify your follow on comment here? > I noticed that -as you pointed out in your previous reply- these fields cannot be repainted at will, as they are defined by an external specification. I'll play a bit more with this code tomorrow - I would *really* like to avoid the need for patch #1, as it adds another constraint on how we construct the boot image, and this is already riddled with legacy and other complications.