Register a Link TSM instance to support host side TSM operations for TDISP, when the TDX Connect support bit is set by TDX Module in tdx_feature0. This is the main purpose of an independent tdx-host module out of TDX core. Recall that a TEE Security Manager (TSM) is a platform agent that speaks the TEE Device Interface Security Protocol (TDISP) to PCIe devices and manages private memory resources for the platform. An independent tdx-host module allows for device-security enumeration and initialization flows to be deferred from other TDX Module initialization requirements. Crucially, when / if TDX Module init moves earlier in x86 initialization flow this driver is still guaranteed to run after IOMMU and PCI init (i.e. subsys_initcall() vs device_initcall()). The ability to unload the module, or unbind the driver is also useful for debug and coarse grained transitioning between PCI TSM operation and PCI CMA operation (native kernel PCI device authentication). For now this is the basic boilerplate with operation flows to be added later. Signed-off-by: Xu Yilun Co-developed-by: Dan Williams Signed-off-by: Dan Williams --- drivers/virt/coco/tdx-host/Kconfig | 6 + arch/x86/include/asm/tdx.h | 1 + drivers/virt/coco/tdx-host/tdx-host.c | 154 +++++++++++++++++++++++++- 3 files changed, 160 insertions(+), 1 deletion(-) diff --git a/drivers/virt/coco/tdx-host/Kconfig b/drivers/virt/coco/tdx-host/Kconfig index bf6be0fc0879..026b7d5ea4fa 100644 --- a/drivers/virt/coco/tdx-host/Kconfig +++ b/drivers/virt/coco/tdx-host/Kconfig @@ -8,3 +8,9 @@ config TDX_HOST_SERVICES Say y or m if enabling support for confidential virtual machine support (CONFIG_INTEL_TDX_HOST). The module is called tdx_host.ko + +config TDX_CONNECT + bool + depends on TDX_HOST_SERVICES + depends on PCI_TSM + default TDX_HOST_SERVICES diff --git a/arch/x86/include/asm/tdx.h b/arch/x86/include/asm/tdx.h index b6961e137450..ff77900f067b 100644 --- a/arch/x86/include/asm/tdx.h +++ b/arch/x86/include/asm/tdx.h @@ -148,6 +148,7 @@ static __always_inline u64 sc_retry(sc_func_t func, u64 fn, const char *tdx_dump_mce_info(struct mce *m); /* Bit definitions of TDX_FEATURES0 metadata field */ +#define TDX_FEATURES0_TDXCONNECT BIT_ULL(6) #define TDX_FEATURES0_NO_RBP_MOD BIT_ULL(18) const struct tdx_sys_info *tdx_get_sysinfo(void); diff --git a/drivers/virt/coco/tdx-host/tdx-host.c b/drivers/virt/coco/tdx-host/tdx-host.c index ced1c980dc6f..6f21bb2dbeb9 100644 --- a/drivers/virt/coco/tdx-host/tdx-host.c +++ b/drivers/virt/coco/tdx-host/tdx-host.c @@ -7,8 +7,13 @@ #include #include +#include +#include +#include #include #include +#include +#include static const struct x86_cpu_id tdx_host_ids[] = { X86_MATCH_FEATURE(X86_FEATURE_TDX_HOST_PLATFORM, NULL), @@ -16,6 +21,153 @@ static const struct x86_cpu_id tdx_host_ids[] = { }; MODULE_DEVICE_TABLE(x86cpu, tdx_host_ids); +/* + * The scope of this pointer is for TDX Connect. + * Every feature should evaluate how to get tdx_sysinfo. TDX Connect expects no + * tdx_sysinfo change after TDX Module update so could cache it. TDX version + * sysfs expects change so should call tdx_get_sysinfo() every time. + * + * Maybe move TDX Connect to a separate file makes thing clearer. + */ +static const struct tdx_sys_info *tdx_sysinfo; + +struct tdx_link { + struct pci_tsm_pf0 pci; +}; + +static struct tdx_link *to_tdx_link(struct pci_tsm *tsm) +{ + return container_of(tsm, struct tdx_link, pci.base_tsm); +} + +static int tdx_link_connect(struct pci_dev *pdev) +{ + return -ENXIO; +} + +static void tdx_link_disconnect(struct pci_dev *pdev) +{ +} + +static struct pci_tsm *tdx_link_pf0_probe(struct tsm_dev *tsm_dev, + struct pci_dev *pdev) +{ + int rc; + + struct tdx_link *tlink __free(kfree) = + kzalloc(sizeof(*tlink), GFP_KERNEL); + if (!tlink) + return NULL; + + rc = pci_tsm_pf0_constructor(pdev, &tlink->pci, tsm_dev); + if (rc) + return NULL; + + return &no_free_ptr(tlink)->pci.base_tsm; +} + +static void tdx_link_pf0_remove(struct pci_tsm *tsm) +{ + struct tdx_link *tlink = to_tdx_link(tsm); + + pci_tsm_pf0_destructor(&tlink->pci); + kfree(tlink); +} + +static struct pci_tsm *tdx_link_fn_probe(struct tsm_dev *tsm_dev, + struct pci_dev *pdev) +{ + int rc; + + struct pci_tsm *pci_tsm __free(kfree) = + kzalloc(sizeof(*pci_tsm), GFP_KERNEL); + if (!pci_tsm) + return NULL; + + rc = pci_tsm_link_constructor(pdev, pci_tsm, tsm_dev); + if (rc) + return NULL; + + return no_free_ptr(pci_tsm); +} + +static struct pci_tsm *tdx_link_probe(struct tsm_dev *tsm_dev, struct pci_dev *pdev) +{ + if (is_pci_tsm_pf0(pdev)) + return tdx_link_pf0_probe(tsm_dev, pdev); + + return tdx_link_fn_probe(tsm_dev, pdev); +} + +static void tdx_link_remove(struct pci_tsm *tsm) +{ + if (is_pci_tsm_pf0(tsm->pdev)) { + tdx_link_pf0_remove(tsm); + return; + } + + /* for sub-functions */ + kfree(tsm); +} + +static struct pci_tsm_ops tdx_link_ops = { + .probe = tdx_link_probe, + .remove = tdx_link_remove, + .connect = tdx_link_connect, + .disconnect = tdx_link_disconnect, +}; + +static void unregister_link_tsm(void *link) +{ + tsm_unregister(link); +} + +static int __maybe_unused tdx_connect_init(struct device *dev) +{ + struct tsm_dev *link; + + if (!IS_ENABLED(CONFIG_TDX_CONNECT)) + return 0; + + /* + * With this errata, TDX should use movdir64b to clear private pages + * when reclaiming them. See tdx_clear_page(). + * + * Don't expect this errata on any TDX Connect supported platform. TDX + * Connect will never call tdx_clear_page(). + */ + if (boot_cpu_has_bug(X86_BUG_TDX_PW_MCE)) + return -ENXIO; + + tdx_sysinfo = tdx_get_sysinfo(); + if (!tdx_sysinfo) + return -ENXIO; + + if (!(tdx_sysinfo->features.tdx_features0 & TDX_FEATURES0_TDXCONNECT)) + return 0; + + link = tsm_register(dev, &tdx_link_ops); + if (IS_ERR(link)) + return dev_err_probe(dev, PTR_ERR(link), + "failed to register TSM\n"); + + return devm_add_action_or_reset(dev, unregister_link_tsm, link); +} + +static int tdx_host_probe(struct faux_device *fdev) +{ + /* + * Only support TDX Connect now. More TDX features could be added here. + * + * TODO: do tdx_connect_init() when it is fully implemented. + */ + return 0; +} + +static struct faux_device_ops tdx_host_ops = { + .probe = tdx_host_probe, +}; + static struct faux_device *fdev; static int __init tdx_host_init(void) @@ -23,7 +175,7 @@ static int __init tdx_host_init(void) if (!x86_match_cpu(tdx_host_ids)) return -ENODEV; - fdev = faux_device_create(KBUILD_MODNAME, NULL, NULL); + fdev = faux_device_create(KBUILD_MODNAME, NULL, &tdx_host_ops); if (!fdev) return -ENODEV; -- 2.25.1