[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v3 0/7] vTPM: Xen stubdom vTPM for HVM virtual machine
This patch series are only the Xen part to enable stubdom vTPM for HVM virtual machine. it will work w/ Qemu patch series and seaBios patch series. Change QEMU_STUBDOM_VTPM compile option from 'n' to 'y', when the Qemu/SeaBios patch series are merged. ======================== *INTRODUCTION* ======================== The goal of virtual Trusted Platform Module (vTPM) is to provide a TPM functionality to virtual machines (Fedora, Ubuntu, Redhat, Windows .etc). This allows programs to interact with a TPM in a virtual machine the same way they interact with a TPM on the physical system. Each virtual machine gets its own unique, emulated, software TPM. Each major component of vTPM is implemented as a stubdom, providing secure separation guaranteed by the hypervisor. The vTPM stubdom is a Xen mini-OS domain that emulates a TPM for the virtual machine to use. It is a small wrapper around the Berlios TPM emulator. TPM commands are passed from mini-os TPM backend driver. ======================== *ARCHITECTURE* ======================== The architecture of stubdom vTPM for HVM virtual machine: +--------------------+ | Windows/Linux DomU | ... | | ^ | | v | | | Qemu tpm1.2 Tis | | | ^ | | v | | | XenStubdoms backend| +--------------------+ | ^ v | +--------------------+ | XenDevOps | +--------------------+ | ^ v | +--------------------+ | mini-os/tpmback | | | ^ | | v | | | vtpm-stubdom | ... | | ^ | | v | | | mini-os/tpmfront | +--------------------+ | ^ v | +--------------------+ | mini-os/tpmback | | | ^ | | v | | | vtpmmgr-stubdom | | | ^ | | v | | | mini-os/tpm_tis | +--------------------+ | ^ v | +--------------------+ | Hardware TPM | +--------------------+ * Windows/Linux DomU: The HVM based guest that wants to use a vTPM. There may be more than one of these. * Qemu tpm1.2 Tis: Implementation of the tpm1.2 Tis interface for HVM virtual machines. It is Qemu emulation device. * vTPM xenstubdoms driver: Qemu vTPM driver. This driver provides vtpm initialization and sending data and commends to a para-virtualized vtpm stubdom. * XenDevOps: Register Xen stubdom vTPM frontend driver, and transfer any request/repond between TPM xenstubdoms driver and Xen vTPM stubdom. Facilitate communications between Xen vTPM stubdom and vTPM xenstubdoms driver. * mini-os/tpmback: Mini-os TPM backend driver. The Linux frontend driver connects to this backend driver to facilitate communications between the Linux DomU and its vTPM. This driver is also used by vtpmmgr stubdom to communicate with vtpm-stubdom. * vtpm-stubdom: A mini-os stub domain that implements a vTPM. There is a one to one mapping between running vtpm-stubdom instances and logical vtpms on the system. The vTPM Platform Configuration Registers (PCRs) are all initialized to zero. * mini-os/tpmfront: Mini-os TPM frontend driver. The vTPM mini-os domain vtpm stubdom uses this driver to communicate with vtpmmgr-stubdom. This driver could also be used separately to implement a mini-os domain that wishes to use a vTPM of its own. * vtpmmgr-stubdom: A mini-os domain that implements the vTPM manager. There is only one vTPM manager and it should be running during the entire lifetime of the machine. vtpmmgr domain securely stores encryption keys for each of the vtpms and accesses to the hardware TPM to get the root of trust for the entire system. * mini-os/tpm_tis: Mini-os TPM version 1.2 TPM Interface Specification (TIS) driver. This driver used by vtpmmgr-stubdom to talk directly to the hardware TPM. Communication is facilitated by mapping hardware memory pages into vtpmmgr stubdom. * Hardware TPM: The physical TPM 1.2 that is soldered onto the motherboard. ======================== *BUILD & TEST* ======================== The following steps are how to build and test it: 1. SeaBios with my patch against upstream seabios is not submitted. I will submit seabios patch later. Now I archive my seabios patch against upstream seabios in Github: https://github.com/virt2x/seabios2 , try to build it for test. Configure it with Xen, --- <Xen> Config.mk -SEABIOS_UPSTREAM_URL ?= git://xenbits.xen.org/seabios.git +SEABIOS_UPSTREAM_URL ?= https://github.com/virt2x/seabios2 [...] -SEABIOS_UPSTREAM_REVISION ?= rel-1.7.5 +SEABIOS_UPSTREAM_REVISION ?= ea94c083cc15875f46f0bf288b6531154b866f5a 2. QEMU with my patch against upstream QEMU is '[PATCH v3 0/5] QEMU:Xen stubdom vTPM for HVM virtual machine'. I archive my QEMU patch series again Upstream QEMU in github: https://github.com/virt2x/qemu-xen-unstable2 Configure it with Xen, --- <Xen> Config.mk -QEMU_UPSTREAM_URL ?= git://xenbits.xen.org/qemu-upstream-unstable.git +QEMU_UPSTREAM_URL ?= https://github.com/virt2x/qemu-xen-unstable2 -QEMU_UPSTREAM_REVISION ?= qemu-xen-4.5.0-rc1 +QEMU_UPSTREAM_REVISION ?= 9acbbde6c0ecb2b142998ff79af17ce69d0e190c 3. build/install Xen Change QEMU_STUBDOM_VTPM option from 'n' to 'y' QEMU_STUBDOM_VTPM ?= y ./configure --prefix=/usr make dist make install 4. try to launch vtpmmgr / vtpm domain via <Xen>/docs/misc/vtpm-platforms.txt. The reader is assumed to have familiarity with building and installing Xen, Linux, and a basic understanding of the TPM and vTPM concepts. The Linux / Windows HVM guest configuration file needs to be modified to include the following line: [..] vtpm=["backend=domu-vtpm"] device_model_version = 'qemu-xen' acpi = 1 [..] #(domu-vtpm is the name vtpm domain, A mini-os stub domain that implements a vTPM) 5. enable native TPM 1.2 drvier in HVM virtual machine. for example enable tpm_tis.ko in Linux HVM virtual machine. If you have trousers and tpm_tools installed on the guest, the tpm_version command should return the following: The version command should return the following: TPM 1.2 Version Info: Chip Version: 1.2.0.7 Spec Level: 2 Errata Revision: 1 TPM Vendor ID: ETHZ TPM Version: 01010000 Manufacturer Info: 4554485a Or check it with sysfs, /sys/class/misc/tpm0 --Changes in v2: -Delete HVM_PARAM_STUBDOM_VTPM parameter, QEMU Reads Xen vTPM status via XenStore. --Changes in v3: -Code style enhancement -Remove the redundant parameter 'num_vtpms' in libxl_domain_build_info{} -Change hardcode vtpm ID from xenvtpm0 to xenvtpm%{DomainID} -Move libxl__device_hvm_vtpm_add from libxl__spawn_local_dm() to domcreate_launch_dm() -Redesign vtpm xensotre for HVM virtual machine -Delete the domain type reading for domid -refactor libxl__device_vtpm_add() -rename libxl__device_hvm_vtpm_add() to libxl__device_vtpm_add_hvm() Quan Xu (7): vTPM: event channel bind interdomain with para/hvm virtual machine vTPM: limit libxl__add_vtpms() function to para virtual machine vTPM: add TPM TCPA and SSDT for HVM virtual machine when vTPM is added vTPM: add vTPM device for HVM virtual machine vTPM: Delete the xenstore directory of frontend device vTPM: Parse envent string from QEMU frontend vTPM: add QEMU_STUBDOM_VTPM compile option Config.mk | 4 + extras/mini-os/tpmback.c | 46 +++++---- tools/Makefile | 7 ++ tools/firmware/hvmloader/acpi/build.c | 7 +- tools/libxl/libxl.c | 176 ++++++++++++++++++++++++++++++++-- tools/libxl/libxl.h | 7 +- tools/libxl/libxl_create.c | 30 +++++- tools/libxl/libxl_device.c | 99 ++++++++++++++++++- tools/libxl/libxl_dm.c | 12 +++ tools/libxl/libxl_internal.h | 6 +- tools/libxl/xl_cmdimpl.c | 4 +- 11 files changed, 359 insertions(+), 39 deletions(-) -- 1.8.3.2 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |