qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Laszlo Ersek <lersek@redhat.com>
To: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Stefan Berger <stefanb@us.ibm.com>,
	qemu-devel@nongnu.org, Stefan Berger <stefanb@linux.vnet.ibm.com>
Subject: Re: [Qemu-devel] [PATCH v2] Add ACPI tables for TPM
Date: Wed, 30 Jul 2014 18:07:28 +0200	[thread overview]
Message-ID: <53D91840.5030409@redhat.com> (raw)
In-Reply-To: <20140730155240.GB27451@redhat.com>

On 07/30/14 17:52, Michael S. Tsirkin wrote:
> On Wed, Jul 30, 2014 at 05:37:26PM +0200, Laszlo Ersek wrote:
>> On 07/30/14 17:10, Stefan Berger wrote:
>>> Laszlo Ersek <lersek@redhat.com> wrote on 07/30/2014 10:36:38 AM:
>>>
>>>> From: Laszlo Ersek <lersek@redhat.com>
>>>> To: "Michael S. Tsirkin" <mst@redhat.com>, Stefan Berger/Watson/IBM@IBMUS
>>>> Cc: qemu-devel@nongnu.org, Stefan Berger <stefanb@linux.vnet.ibm.com>
>>>> Date: 07/30/2014 10:36 AM
>>>> Subject: Re: [PATCH v2] Add ACPI tables for TPM
>>>>
>>>> On 07/30/14 15:20, Michael S. Tsirkin wrote:
>>>>> On Tue, Jul 29, 2014 at 06:52:19AM -0400, Stefan Berger wrote:
>>>>>> From: Stefan Berger <stefanb@linux.vnet.ibm.com>
>>>>>>
>>>>>> Add an SSDT ACPI table for the TPM device.
>>>>>> Add a TCPA table for BIOS logging area when a TPM is being used.
>>>>>>
>>>>>> The latter follows this spec here:
>>>>>>
>>>>>> http://www.trustedcomputinggroup.org/files/static_page_files/
>>>> DCD4188E-1A4B-B294-D050A155FB6F7385/
>>>> TCG_ACPIGeneralSpecification_PublicReview.pdf
>>>>
>>>> (Thanks for CC'ing me, Michael.)
>>>>
>>>> I skimmed this spec.
>>>>
>>>>>> +static void
>>>>>> +build_tpm_tcpa(GArray *table_data, GArray *linker)
>>>>>> +{
>>>>>> +    Acpi20Tcpa *tcpa;
>>>>>> +    uint32_t log_area_minimum_length = TPM_LOG_AREA_MINIMUM_SIZE;
>>>>>> +    uint64_t log_area_start_address;
>>>>>> +    size_t len = log_area_minimum_length + sizeof(*tcpa);
>>>>>> +
>>>>>> +    log_area_start_address = table_data->len + sizeof(*tcpa);
>>>>>> +
>>>>>> +    tcpa = acpi_data_push(table_data, len);
>>>>>> +
>>>>>> +    tcpa->platform_class = cpu_to_le16(TPM_TCPA_ACPI_CLASS_CLIENT);
>>>>>> +    tcpa->log_area_minimum_length =
>>> cpu_to_le32(log_area_minimum_length);
>>>>>> +    tcpa->log_area_start_address =
>>> cpu_to_le64(log_area_start_address);
>>>>>> +
>>>>>> +    /* LASA address to be filled by Guest linker */
>>>>>
>>>>> Hmm, you are simply allocating log area as part of the ACPI table.  It
>>>>> works because bios happens to allocate tables from high memory.
>>>>> But I think this is a problem in practice because
>>>>> bios is allowed to allocate acpi memory differently.
>>>>> On the other hand log presumably needs to reside in
>>>>> physical memory somewhere.
>>>>>
>>>>> If you need bios to allocate this memory, then we will
>>>>> need a new allocation type for this, add it to linker
>>>>> in bios and qemu.
>>>>>
>>>>> Alternatively, find some other way to get hold of
>>>>> physical memory.
>>>>> Is there a way to disable the log completely?
>>>>> As defined in your patch, I doubt there's anything there, ever ..
>>>>>
>>>>>
>>>>>
>>>>>> +    bios_linker_loader_add_pointer(linker, ACPI_BUILD_TABLE_FILE,
>>>>>> +                                   ACPI_BUILD_TABLE_FILE,
>>>>>> +                                   table_data,
>>>> &tcpa->log_area_start_address,
>>>>>> +                                  
>>> sizeof(tcpa->log_area_start_address));
>>>>>> +    build_header(linker, table_data,
>>>>>> +                 (void *)tcpa, "TCPA", sizeof(*tcpa), 2);
>>>>>> +}
>>>>
>>>> So here's my understanding. The spec referenced above describes three
>>>> ACPI tables: two (client vs. server) for TPM 1.2, and a third one
>>>> (usable by both client & server platforms) for TPM 2.0.
>>>>
>>>> The code above prepares a TPM 1.2 table. (Signature: "TCPA".)
>>>>
>>>> This table has a field called LASA (Log Area Start Address) which points
>>>> to somewhere in (guest-)physical memory. The patch adds a "dummy range"
>>>> to the end of the TCPA table itself, and asks the linker to set LASA to
>>>> the beginning of that range.
>>>>
>>>> This won't work in OVMF, and not just because of the reason that Michael
>>>> mentions (ie. because the firmware, in particular SeaBIOS, might
>>>> allocate the TCPA table in an area that is unsuitable as LASA target).
>>>>
>>>> Rather, in OVMF this won't work because OVMF doesn't implement the
>>>> linking part of the linker. The *generic* edk2 protocol
>>>> (EFI_ACPI_TABLE_PROTOCOL, which is coded outside of OVMF) that OVMF uses
>>>> (as a client) to install ACPI tables in guest-phys memory requires
>>>> tables to be passed in one-by-one.
>>>>
>>>> The EFI_ACPI_TABLE_PROTOCOL implementation in edk2 handles *some*
>>>> well-known tables specially. It has knowledge of their internal
>>>> pointers, and when you install an ACPI table, EFI_ACPI_TABLE_PROTOCOL
>>>> updates pointers automatically. (For example when you install the FACS,
>>>> the protocol links it automatically into FACP.)
>>>>
>>>> The EFI_ACPI_TABLE_PROTOCOL implementation in edk2 doesn't seem to know
>>>> anything about the TCPA table, let alone the unstructured (?) TCG event
>>>> log that is pointed-to by TCPA.LASA.
>>>>
>>>> (I grepped for the TCPA signature,
>>>>
>>> EFI_ACPI_5_0_TRUSTED_COMPUTING_PLATFORM_ALLIANCE_CAPABILITIES_TABLE_SIGNATURE.)
>>>>
>>>> This means that if you pass down a TCPA table, OVMF will install it
>>>> right now, but TCPA.LASA will be bogus.
>>>>
>>>> If I wanted to implement the complete linker as Michael envisioned it,
>>>> then I'd have to avoid edk2's EFI_ACPI_TABLE_PROTOCOL, and implement
>>>> ACPI table installation from zero, trying to mimic the SeaBIOS client
>>>> code, but in a way that matches the UEFI environment. I'm not ready to
>>>> do that. Definitely not without an "official" human-language
>>>> specification of the linker-loader interface.
>>>>
>>>> I skimmed the patch but I'm not sure what exactly the TPM emulation in
>>>> qemu depends on. Is it a command line option? Is it default for some
>>>> machine types?
>>>>
>>>> Alternatively, I could recognize the TCPA signature in OVMF when parsing
>>>> the ACPI blobs for table headers, and filter it out.
>>>
>>> This is the code for what I would call 'pointer relocation'. The TCPA
>>> table is not the only place where this is used, but why is it an issue
>>> there while not with the following?
>>>
>>>     fadt->firmware_ctrl = cpu_to_le32(facs);
>>>     /* FACS address to be filled by Guest linker */
>>>     bios_linker_loader_add_pointer(linker, ACPI_BUILD_TABLE_FILE,  
>>>                                    ACPI_BUILD_TABLE_FILE,
>>>                                    table_data, &fadt->firmware_ctrl,
>>>                                    sizeof fadt->firmware_ctrl);
>>
>> (Responding wrt. to OVMF:) because EFI_ACPI_TABLE_PROTOCOL special cases
>> the installation of FACS. This is visible both in the UEFI
>> specification, and in the edk2 implementation.
>>
>> That is, OVMF can avoid relocating the "fadt->firmware_ctrl" pointer,
>> because edk2's EFI_ACPI_TABLE_PROTOCOL will do that automatically, when
>> OVMF requests the installation of FACS.
>>
>> No such special case exists for the installation of the TCG event log
>> area (which is by itself not even an ACPI table as I gather). *If* the
>> TCG event log were an ACPI table in its own right, *and* edk2's
>> EFI_ACPI_TABLE_PROTOCOL implementation had a special case for it, then
>> when OVMF installed the event log, EFI_ACPI_TABLE_PROTOCOL would update
>> TCPA.LASA to it.
>>
>> Thanks
>> Laszlo
> 
> How does EFI want to handle TCPA? Does caller allocate it
> log and fill in the address?

TPM 1.2 seems to be completely absent from edk2, so I have no clue. TPM
2.0 appears to be supported, but I already grepped edk2 for how it
handles the related ACPI table(s), and it doesn't. As far as I can see.

In the long term, if you can find a way to make it work with SeaBIOS,
inside the linker/loader framework, that should work under OVMF as well.
I hope. Famous last words.

Laszlo

  reply	other threads:[~2014-07-30 16:07 UTC|newest]

Thread overview: 40+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-07-29 10:52 [Qemu-devel] [PATCH v2] Add ACPI tables for TPM Stefan Berger
2014-07-30 11:17 ` Michael S. Tsirkin
2014-07-30 13:34   ` Stefan Berger
2014-07-30 13:20 ` Michael S. Tsirkin
2014-07-30 14:36   ` Laszlo Ersek
2014-07-30 14:46     ` Michael S. Tsirkin
2014-07-30 15:15       ` Laszlo Ersek
2014-07-30 15:37         ` Michael S. Tsirkin
2014-07-30 16:02           ` Laszlo Ersek
2014-07-30 16:07             ` Michael S. Tsirkin
2014-07-30 16:22               ` Laszlo Ersek
2014-07-30 15:03     ` Igor Mammedov
2014-07-30 15:29       ` Laszlo Ersek
2014-07-30 15:10     ` Stefan Berger
2014-07-30 15:20       ` Michael S. Tsirkin
2014-07-30 15:29         ` Stefan Berger
2014-07-30 15:41           ` Laszlo Ersek
2014-07-30 15:44             ` Stefan Berger
2014-07-30 15:58               ` Laszlo Ersek
2014-07-30 16:03                 ` Stefan Berger
2014-07-30 16:10                   ` Michael S. Tsirkin
2014-07-30 16:18                     ` Laszlo Ersek
2014-07-30 16:35                       ` Stefan Berger
2014-07-30 17:18                         ` Laszlo Ersek
2014-07-30 15:50           ` Michael S. Tsirkin
2014-07-30 15:59             ` Stefan Berger
2014-07-30 16:05               ` Michael S. Tsirkin
2014-07-30 16:14                 ` Laszlo Ersek
2014-07-30 16:19                 ` Stefan Berger
2014-07-30 15:37       ` Laszlo Ersek
2014-07-30 15:52         ` Michael S. Tsirkin
2014-07-30 16:07           ` Laszlo Ersek [this message]
2014-07-30 16:11             ` Stefan Berger
2014-07-30 16:11             ` Michael S. Tsirkin
2014-07-30 16:24               ` Laszlo Ersek
2014-07-30 14:54   ` Stefan Berger
2014-07-30 15:07     ` Michael S. Tsirkin
2014-07-30 15:13       ` Stefan Berger
2014-07-30 15:25         ` Michael S. Tsirkin
2014-07-30 15:36           ` Stefan Berger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=53D91840.5030409@redhat.com \
    --to=lersek@redhat.com \
    --cc=mst@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=stefanb@linux.vnet.ibm.com \
    --cc=stefanb@us.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).