2023-12-07 16:06:23 +03:00
|
|
|
.. _tpm-device:
|
|
|
|
|
2020-01-21 18:29:35 +03:00
|
|
|
===============
|
|
|
|
QEMU TPM Device
|
|
|
|
===============
|
|
|
|
|
|
|
|
Guest-side hardware interface
|
|
|
|
=============================
|
|
|
|
|
|
|
|
TIS interface
|
|
|
|
-------------
|
|
|
|
|
|
|
|
The QEMU TPM emulation implements a TPM TIS hardware interface
|
|
|
|
following the Trusted Computing Group's specification "TCG PC Client
|
|
|
|
Specific TPM Interface Specification (TIS)", Specification Version
|
|
|
|
1.3, 21 March 2013. (see the `TIS specification`_, or a later version
|
|
|
|
of it).
|
|
|
|
|
|
|
|
The TIS interface makes a memory mapped IO region in the area
|
|
|
|
0xfed40000-0xfed44fff available to the guest operating system.
|
|
|
|
|
|
|
|
QEMU files related to TPM TIS interface:
|
2020-03-05 19:51:46 +03:00
|
|
|
- ``hw/tpm/tpm_tis_common.c``
|
|
|
|
- ``hw/tpm/tpm_tis_isa.c``
|
|
|
|
- ``hw/tpm/tpm_tis_sysbus.c``
|
2023-04-15 01:07:52 +03:00
|
|
|
- ``hw/tpm/tpm_tis_i2c.c``
|
2020-01-21 18:29:35 +03:00
|
|
|
- ``hw/tpm/tpm_tis.h``
|
|
|
|
|
2020-03-05 19:51:46 +03:00
|
|
|
Both an ISA device and a sysbus device are available. The former is
|
|
|
|
used with pc/q35 machine while the latter can be instantiated in the
|
2020-03-10 00:58:18 +03:00
|
|
|
Arm virt machine.
|
2020-03-05 19:51:46 +03:00
|
|
|
|
2023-04-15 01:07:52 +03:00
|
|
|
An I2C device support is also provided which can be instantiated in the Arm
|
|
|
|
based emulation machines. This device only supports the TPM 2 protocol.
|
|
|
|
|
2020-01-21 18:29:35 +03:00
|
|
|
CRB interface
|
|
|
|
-------------
|
|
|
|
|
|
|
|
QEMU also implements a TPM CRB interface following the Trusted
|
|
|
|
Computing Group's specification "TCG PC Client Platform TPM Profile
|
|
|
|
(PTP) Specification", Family "2.0", Level 00 Revision 01.03 v22, May
|
|
|
|
22, 2017. (see the `CRB specification`_, or a later version of it)
|
|
|
|
|
|
|
|
The CRB interface makes a memory mapped IO region in the area
|
|
|
|
0xfed40000-0xfed40fff (1 locality) available to the guest
|
|
|
|
operating system.
|
|
|
|
|
|
|
|
QEMU files related to TPM CRB interface:
|
|
|
|
- ``hw/tpm/tpm_crb.c``
|
|
|
|
|
|
|
|
SPAPR interface
|
|
|
|
---------------
|
|
|
|
|
|
|
|
pSeries (ppc64) machines offer a tpm-spapr device model.
|
|
|
|
|
|
|
|
QEMU files related to the SPAPR interface:
|
|
|
|
- ``hw/tpm/tpm_spapr.c``
|
|
|
|
|
|
|
|
fw_cfg interface
|
|
|
|
================
|
|
|
|
|
|
|
|
The bios/firmware may read the ``"etc/tpm/config"`` fw_cfg entry for
|
|
|
|
configuring the guest appropriately.
|
|
|
|
|
|
|
|
The entry of 6 bytes has the following content, in little-endian:
|
|
|
|
|
|
|
|
.. code-block:: c
|
|
|
|
|
|
|
|
#define TPM_VERSION_UNSPEC 0
|
|
|
|
#define TPM_VERSION_1_2 1
|
|
|
|
#define TPM_VERSION_2_0 2
|
|
|
|
|
|
|
|
#define TPM_PPI_VERSION_NONE 0
|
|
|
|
#define TPM_PPI_VERSION_1_30 1
|
|
|
|
|
|
|
|
struct FwCfgTPMConfig {
|
|
|
|
uint32_t tpmppi_address; /* PPI memory location */
|
|
|
|
uint8_t tpm_version; /* TPM version */
|
|
|
|
uint8_t tpmppi_version; /* PPI version */
|
|
|
|
};
|
|
|
|
|
|
|
|
ACPI interface
|
|
|
|
==============
|
|
|
|
|
|
|
|
The TPM device is defined with ACPI ID "PNP0C31". QEMU builds a SSDT
|
|
|
|
and passes it into the guest through the fw_cfg device. The device
|
|
|
|
description contains the base address of the TIS interface 0xfed40000
|
|
|
|
and the size of the MMIO area (0x5000). In case a TPM2 is used by
|
|
|
|
QEMU, a TPM2 ACPI table is also provided. The device is described to
|
|
|
|
be used in polling mode rather than interrupt mode primarily because
|
|
|
|
no unused IRQ could be found.
|
|
|
|
|
|
|
|
To support measurement logs to be written by the firmware,
|
|
|
|
e.g. SeaBIOS, a TCPA table is implemented. This table provides a 64kb
|
|
|
|
buffer where the firmware can write its log into. For TPM 2 only a
|
|
|
|
more recent version of the TPM2 table provides support for
|
|
|
|
measurements logs and a TCPA table does not need to be created.
|
|
|
|
|
|
|
|
The TCPA and TPM2 ACPI tables follow the Trusted Computing Group
|
|
|
|
specification "TCG ACPI Specification" Family "1.2" and "2.0", Level
|
|
|
|
00 Revision 00.37. (see the `ACPI specification`_, or a later version
|
|
|
|
of it)
|
|
|
|
|
|
|
|
ACPI PPI Interface
|
|
|
|
------------------
|
|
|
|
|
|
|
|
QEMU supports the Physical Presence Interface (PPI) for TPM 1.2 and
|
|
|
|
TPM 2. This interface requires ACPI and firmware support. (see the
|
|
|
|
`PPI specification`_)
|
|
|
|
|
|
|
|
PPI enables a system administrator (root) to request a modification to
|
|
|
|
the TPM upon reboot. The PPI specification defines the operation
|
|
|
|
requests and the actions the firmware has to take. The system
|
|
|
|
administrator passes the operation request number to the firmware
|
|
|
|
through an ACPI interface which writes this number to a memory
|
|
|
|
location that the firmware knows. Upon reboot, the firmware finds the
|
|
|
|
number and sends commands to the TPM. The firmware writes the TPM
|
|
|
|
result code and the operation request number to a memory location that
|
|
|
|
ACPI can read from and pass the result on to the administrator.
|
|
|
|
|
|
|
|
The PPI specification defines a set of mandatory and optional
|
|
|
|
operations for the firmware to implement. The ACPI interface also
|
|
|
|
allows an administrator to list the supported operations. In QEMU the
|
|
|
|
ACPI code is generated by QEMU, yet the firmware needs to implement
|
|
|
|
support on a per-operations basis, and different firmwares may support
|
|
|
|
a different subset. Therefore, QEMU introduces the virtual memory
|
|
|
|
device for PPI where the firmware can indicate which operations it
|
|
|
|
supports and ACPI can enable the ones that are supported and disable
|
|
|
|
all others. This interface lies in main memory and has the following
|
|
|
|
layout:
|
|
|
|
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| Field | Length | Offset | Description |
|
|
|
|
+=============+========+========+===========================================+
|
|
|
|
| ``func`` | 0x100 | 0x000 | Firmware sets values for each supported |
|
|
|
|
| | | | operation. See defined values below. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``ppin`` | 0x1 | 0x100 | SMI interrupt to use. Set by firmware. |
|
|
|
|
| | | | Not supported. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``ppip`` | 0x4 | 0x101 | ACPI function index to pass to SMM code. |
|
|
|
|
| | | | Set by ACPI. Not supported. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``pprp`` | 0x4 | 0x105 | Result of last executed operation. Set by |
|
|
|
|
| | | | firmware. See function index 5 for values.|
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``pprq`` | 0x4 | 0x109 | Operation request number to execute. See |
|
|
|
|
| | | | 'Physical Presence Interface Operation |
|
|
|
|
| | | | Summary' tables in specs. Set by ACPI. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``pprm`` | 0x4 | 0x10d | Operation request optional parameter. |
|
|
|
|
| | | | Values depend on operation. Set by ACPI. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``lppr`` | 0x4 | 0x111 | Last executed operation request number. |
|
|
|
|
| | | | Copied from pprq field by firmware. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``fret`` | 0x4 | 0x115 | Result code from SMM function. |
|
|
|
|
| | | | Not supported. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``res1`` | 0x40 | 0x119 | Reserved for future use |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
|``next_step``| 0x1 | 0x159 | Operation to execute after reboot by |
|
|
|
|
| | | | firmware. Used by firmware. |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
| ``movv`` | 0x1 | 0x15a | Memory overwrite variable |
|
|
|
|
+-------------+--------+--------+-------------------------------------------+
|
|
|
|
|
|
|
|
The following values are supported for the ``func`` field. They
|
|
|
|
correspond to the values used by ACPI function index 8.
|
|
|
|
|
|
|
|
+----------+-------------------------------------------------------------+
|
|
|
|
| Value | Description |
|
|
|
|
+==========+=============================================================+
|
|
|
|
| 0 | Operation is not implemented. |
|
|
|
|
+----------+-------------------------------------------------------------+
|
|
|
|
| 1 | Operation is only accessible through firmware. |
|
|
|
|
+----------+-------------------------------------------------------------+
|
|
|
|
| 2 | Operation is blocked for OS by firmware configuration. |
|
|
|
|
+----------+-------------------------------------------------------------+
|
|
|
|
| 3 | Operation is allowed and physically present user required. |
|
|
|
|
+----------+-------------------------------------------------------------+
|
|
|
|
| 4 | Operation is allowed and physically present user is not |
|
|
|
|
| | required. |
|
|
|
|
+----------+-------------------------------------------------------------+
|
|
|
|
|
|
|
|
The location of the table is given by the fw_cfg ``tpmppi_address``
|
|
|
|
field. The PPI memory region size is 0x400 (``TPM_PPI_ADDR_SIZE``) to
|
|
|
|
leave enough room for future updates.
|
|
|
|
|
|
|
|
QEMU files related to TPM ACPI tables:
|
|
|
|
- ``hw/i386/acpi-build.c``
|
|
|
|
- ``include/hw/acpi/tpm.h``
|
|
|
|
|
|
|
|
TPM backend devices
|
|
|
|
===================
|
|
|
|
|
|
|
|
The TPM implementation is split into two parts, frontend and
|
|
|
|
backend. The frontend part is the hardware interface, such as the TPM
|
|
|
|
TIS interface described earlier, and the other part is the TPM backend
|
|
|
|
interface. The backend interfaces implement the interaction with a TPM
|
|
|
|
device, which may be a physical or an emulated device. The split
|
|
|
|
between the front- and backend devices allows a frontend to be
|
|
|
|
connected with any available backend. This enables the TIS interface
|
|
|
|
to be used with the passthrough backend or the swtpm backend.
|
|
|
|
|
|
|
|
QEMU files related to TPM backends:
|
|
|
|
- ``backends/tpm.c``
|
2020-06-12 11:54:33 +03:00
|
|
|
- ``include/sysemu/tpm.h``
|
2020-01-21 18:29:35 +03:00
|
|
|
- ``include/sysemu/tpm_backend.h``
|
|
|
|
|
|
|
|
The QEMU TPM passthrough device
|
|
|
|
-------------------------------
|
|
|
|
|
|
|
|
In case QEMU is run on Linux as the host operating system it is
|
|
|
|
possible to make the hardware TPM device available to a single QEMU
|
|
|
|
guest. In this case the user must make sure that no other program is
|
|
|
|
using the device, e.g., /dev/tpm0, before trying to start QEMU with
|
|
|
|
it.
|
|
|
|
|
|
|
|
The passthrough driver uses the host's TPM device for sending TPM
|
|
|
|
commands and receiving responses from. Besides that it accesses the
|
|
|
|
TPM device's sysfs entry for support of command cancellation. Since
|
|
|
|
none of the state of a hardware TPM can be migrated between hosts,
|
|
|
|
virtual machine migration is disabled when the TPM passthrough driver
|
|
|
|
is used.
|
|
|
|
|
|
|
|
Since the host's TPM device will already be initialized by the host's
|
|
|
|
firmware, certain commands, e.g. ``TPM_Startup()``, sent by the
|
|
|
|
virtual firmware for device initialization, will fail. In this case
|
|
|
|
the firmware should not use the TPM.
|
|
|
|
|
|
|
|
Sharing the device with the host is generally not a recommended usage
|
|
|
|
scenario for a TPM device. The primary reason for this is that two
|
|
|
|
operating systems can then access the device's single set of
|
|
|
|
resources, such as platform configuration registers
|
|
|
|
(PCRs). Applications or kernel security subsystems, such as the Linux
|
|
|
|
Integrity Measurement Architecture (IMA), are not expecting to share
|
|
|
|
PCRs.
|
|
|
|
|
|
|
|
QEMU files related to the TPM passthrough device:
|
2020-06-12 11:54:44 +03:00
|
|
|
- ``backends/tpm/tpm_passthrough.c``
|
|
|
|
- ``backends/tpm/tpm_util.c``
|
2020-06-12 11:54:43 +03:00
|
|
|
- ``include/sysemu/tpm_util.h``
|
2020-01-21 18:29:35 +03:00
|
|
|
|
|
|
|
|
|
|
|
Command line to start QEMU with the TPM passthrough device using the host's
|
|
|
|
hardware TPM ``/dev/tpm0``:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
qemu-system-x86_64 -display sdl -accel kvm \
|
|
|
|
-m 1024 -boot d -bios bios-256k.bin -boot menu=on \
|
|
|
|
-tpmdev passthrough,id=tpm0,path=/dev/tpm0 \
|
|
|
|
-device tpm-tis,tpmdev=tpm0 test.img
|
|
|
|
|
|
|
|
|
|
|
|
The following commands should result in similar output inside the VM
|
|
|
|
with a Linux kernel that either has the TPM TIS driver built-in or
|
2022-09-27 15:21:46 +03:00
|
|
|
available as a module (assuming a TPM 2 is passed through):
|
2020-01-21 18:29:35 +03:00
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
# dmesg | grep -i tpm
|
2022-09-27 15:21:46 +03:00
|
|
|
[ 0.012560] ACPI: TPM2 0x000000000BFFD1900 00004C (v04 BOCHS \
|
|
|
|
BXPC 0000001 BXPC 00000001)
|
2020-01-21 18:29:35 +03:00
|
|
|
|
|
|
|
# ls -l /dev/tpm*
|
2022-09-27 15:21:46 +03:00
|
|
|
crw-rw----. 1 tss root 10, 224 Sep 6 12:36 /dev/tpm0
|
|
|
|
crw-rw----. 1 tss rss 253, 65536 Sep 6 12:36 /dev/tpmrm0
|
2020-01-21 18:29:35 +03:00
|
|
|
|
2022-09-27 15:21:46 +03:00
|
|
|
Starting with Linux 5.12 there are PCR entries for TPM 2 in sysfs:
|
|
|
|
# find /sys/devices/ -type f | grep pcr-sha
|
|
|
|
...
|
|
|
|
/sys/devices/LNXSYSTEM:00/LNXSYBUS:00/MSFT0101:00/tpm/tpm0/pcr-sha256/1
|
|
|
|
...
|
|
|
|
/sys/devices/LNXSYSTEM:00/LNXSYBUS:00/MSFT0101:00/tpm/tpm0/pcr-sha256/9
|
2020-01-21 18:29:35 +03:00
|
|
|
...
|
|
|
|
|
|
|
|
The QEMU TPM emulator device
|
|
|
|
----------------------------
|
|
|
|
|
|
|
|
The TPM emulator device uses an external TPM emulator called 'swtpm'
|
|
|
|
for sending TPM commands to and receiving responses from. The swtpm
|
|
|
|
program must have been started before trying to access it through the
|
|
|
|
TPM emulator with QEMU.
|
|
|
|
|
|
|
|
The TPM emulator implements a command channel for transferring TPM
|
|
|
|
commands and responses as well as a control channel over which control
|
|
|
|
commands can be sent. (see the `SWTPM protocol`_ specification)
|
|
|
|
|
|
|
|
The control channel serves the purpose of resetting, initializing, and
|
|
|
|
migrating the TPM state, among other things.
|
|
|
|
|
|
|
|
The swtpm program behaves like a hardware TPM and therefore needs to
|
|
|
|
be initialized by the firmware running inside the QEMU virtual
|
|
|
|
machine. One necessary step for initializing the device is to send
|
|
|
|
the TPM_Startup command to it. SeaBIOS, for example, has been
|
|
|
|
instrumented to initialize a TPM 1.2 or TPM 2 device using this
|
|
|
|
command.
|
|
|
|
|
|
|
|
QEMU files related to the TPM emulator device:
|
2020-06-12 11:54:44 +03:00
|
|
|
- ``backends/tpm/tpm_emulator.c``
|
|
|
|
- ``backends/tpm/tpm_util.c``
|
2020-06-12 11:54:43 +03:00
|
|
|
- ``include/sysemu/tpm_util.h``
|
2020-01-21 18:29:35 +03:00
|
|
|
|
|
|
|
The following commands start the swtpm with a UnixIO control channel over
|
|
|
|
a socket interface. They do not need to be run as root.
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
mkdir /tmp/mytpm1
|
|
|
|
swtpm socket --tpmstate dir=/tmp/mytpm1 \
|
|
|
|
--ctrl type=unixio,path=/tmp/mytpm1/swtpm-sock \
|
2022-09-27 15:21:46 +03:00
|
|
|
--tpm2 \
|
2020-01-21 18:29:35 +03:00
|
|
|
--log level=20
|
|
|
|
|
|
|
|
Command line to start QEMU with the TPM emulator device communicating
|
|
|
|
with the swtpm (x86):
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
qemu-system-x86_64 -display sdl -accel kvm \
|
|
|
|
-m 1024 -boot d -bios bios-256k.bin -boot menu=on \
|
|
|
|
-chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
|
|
|
|
-tpmdev emulator,id=tpm0,chardev=chrtpm \
|
|
|
|
-device tpm-tis,tpmdev=tpm0 test.img
|
|
|
|
|
|
|
|
In case a pSeries machine is emulated, use the following command line:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
qemu-system-ppc64 -display sdl -machine pseries,accel=kvm \
|
|
|
|
-m 1024 -bios slof.bin -boot menu=on \
|
|
|
|
-nodefaults -device VGA -device pci-ohci -device usb-kbd \
|
|
|
|
-chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
|
|
|
|
-tpmdev emulator,id=tpm0,chardev=chrtpm \
|
|
|
|
-device tpm-spapr,tpmdev=tpm0 \
|
|
|
|
-device spapr-vscsi,id=scsi0,reg=0x00002000 \
|
2024-06-04 17:40:57 +03:00
|
|
|
-device virtio-blk-pci,bus=pci.0,addr=0x3,drive=drive-virtio-disk0,id=virtio-disk0 \
|
2020-01-21 18:29:35 +03:00
|
|
|
-drive file=test.img,format=raw,if=none,id=drive-virtio-disk0
|
|
|
|
|
2020-03-10 00:58:18 +03:00
|
|
|
In case an Arm virt machine is emulated, use the following command line:
|
2020-03-05 19:51:46 +03:00
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
2024-01-18 13:37:57 +03:00
|
|
|
qemu-system-aarch64 -machine virt,gic-version=3,acpi=off \
|
2020-03-05 19:51:46 +03:00
|
|
|
-cpu host -m 4G \
|
2024-01-18 13:37:57 +03:00
|
|
|
-nographic -accel kvm \
|
2020-03-05 19:51:46 +03:00
|
|
|
-chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
|
|
|
|
-tpmdev emulator,id=tpm0,chardev=chrtpm \
|
|
|
|
-device tpm-tis-device,tpmdev=tpm0 \
|
|
|
|
-device virtio-blk-pci,drive=drv0 \
|
|
|
|
-drive format=qcow2,file=hda.qcow2,if=none,id=drv0 \
|
2020-11-13 11:10:52 +03:00
|
|
|
-drive if=pflash,format=raw,file=flash0.img,readonly=on \
|
2020-03-05 19:51:46 +03:00
|
|
|
-drive if=pflash,format=raw,file=flash1.img
|
|
|
|
|
2023-04-15 01:07:52 +03:00
|
|
|
In case a ast2600-evb bmc machine is emulated and you want to use a TPM device
|
|
|
|
attached to I2C bus, use the following command line:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
qemu-system-arm -M ast2600-evb -nographic \
|
|
|
|
-kernel arch/arm/boot/zImage \
|
|
|
|
-dtb arch/arm/boot/dts/aspeed-ast2600-evb.dtb \
|
|
|
|
-initrd rootfs.cpio \
|
|
|
|
-chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
|
|
|
|
-tpmdev emulator,id=tpm0,chardev=chrtpm \
|
|
|
|
-device tpm-tis-i2c,tpmdev=tpm0,bus=aspeed.i2c.bus.12,address=0x2e
|
|
|
|
|
|
|
|
For testing, use this command to load the driver to the correct address
|
|
|
|
|
|
|
|
echo tpm_tis_i2c 0x2e > /sys/bus/i2c/devices/i2c-12/new_device
|
|
|
|
|
2020-01-21 18:29:35 +03:00
|
|
|
In case SeaBIOS is used as firmware, it should show the TPM menu item
|
|
|
|
after entering the menu with 'ESC'.
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
Select boot device:
|
|
|
|
1. DVD/CD [ata1-0: QEMU DVD-ROM ATAPI-4 DVD/CD]
|
|
|
|
[...]
|
|
|
|
5. Legacy option rom
|
|
|
|
|
|
|
|
t. TPM Configuration
|
|
|
|
|
|
|
|
The following commands should result in similar output inside the VM
|
|
|
|
with a Linux kernel that either has the TPM TIS driver built-in or
|
|
|
|
available as a module:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
# dmesg | grep -i tpm
|
2022-09-27 15:21:46 +03:00
|
|
|
[ 0.012560] ACPI: TPM2 0x000000000BFFD1900 00004C (v04 BOCHS \
|
|
|
|
BXPC 0000001 BXPC 00000001)
|
2020-01-21 18:29:35 +03:00
|
|
|
|
|
|
|
# ls -l /dev/tpm*
|
2022-09-27 15:21:46 +03:00
|
|
|
crw-rw----. 1 tss root 10, 224 Sep 6 12:36 /dev/tpm0
|
|
|
|
crw-rw----. 1 tss rss 253, 65536 Sep 6 12:36 /dev/tpmrm0
|
2020-01-21 18:29:35 +03:00
|
|
|
|
2022-09-27 15:21:46 +03:00
|
|
|
Starting with Linux 5.12 there are PCR entries for TPM 2 in sysfs:
|
|
|
|
# find /sys/devices/ -type f | grep pcr-sha
|
|
|
|
...
|
|
|
|
/sys/devices/LNXSYSTEM:00/LNXSYBUS:00/MSFT0101:00/tpm/tpm0/pcr-sha256/1
|
|
|
|
...
|
|
|
|
/sys/devices/LNXSYSTEM:00/LNXSYBUS:00/MSFT0101:00/tpm/tpm0/pcr-sha256/9
|
2020-01-21 18:29:35 +03:00
|
|
|
...
|
|
|
|
|
|
|
|
Migration with the TPM emulator
|
|
|
|
===============================
|
|
|
|
|
|
|
|
The TPM emulator supports the following types of virtual machine
|
|
|
|
migration:
|
|
|
|
|
|
|
|
- VM save / restore (migration into a file)
|
|
|
|
- Network migration
|
|
|
|
- Snapshotting (migration into storage like QoW2 or QED)
|
|
|
|
|
|
|
|
The following command sequences can be used to test VM save / restore.
|
|
|
|
|
|
|
|
In a 1st terminal start an instance of a swtpm using the following command:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
mkdir /tmp/mytpm1
|
|
|
|
swtpm socket --tpmstate dir=/tmp/mytpm1 \
|
|
|
|
--ctrl type=unixio,path=/tmp/mytpm1/swtpm-sock \
|
2022-09-27 15:21:46 +03:00
|
|
|
--tpm2 \
|
|
|
|
--log level=20
|
2020-01-21 18:29:35 +03:00
|
|
|
|
|
|
|
In a 2nd terminal start the VM:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
qemu-system-x86_64 -display sdl -accel kvm \
|
|
|
|
-m 1024 -boot d -bios bios-256k.bin -boot menu=on \
|
|
|
|
-chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
|
|
|
|
-tpmdev emulator,id=tpm0,chardev=chrtpm \
|
|
|
|
-device tpm-tis,tpmdev=tpm0 \
|
|
|
|
-monitor stdio \
|
|
|
|
test.img
|
|
|
|
|
|
|
|
Verify that the attached TPM is working as expected using applications
|
|
|
|
inside the VM.
|
|
|
|
|
|
|
|
To store the state of the VM use the following command in the QEMU
|
|
|
|
monitor in the 2nd terminal:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
(qemu) migrate "exec:cat > testvm.bin"
|
|
|
|
(qemu) quit
|
|
|
|
|
|
|
|
At this point a file called ``testvm.bin`` should exists and the swtpm
|
|
|
|
and QEMU processes should have ended.
|
|
|
|
|
|
|
|
To test 'VM restore' you have to start the swtpm with the same
|
|
|
|
parameters as before. If previously a TPM 2 [--tpm2] was saved, --tpm2
|
|
|
|
must now be passed again on the command line.
|
|
|
|
|
|
|
|
In the 1st terminal restart the swtpm with the same command line as
|
|
|
|
before:
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
swtpm socket --tpmstate dir=/tmp/mytpm1 \
|
|
|
|
--ctrl type=unixio,path=/tmp/mytpm1/swtpm-sock \
|
|
|
|
--log level=20 --tpm2
|
|
|
|
|
|
|
|
In the 2nd terminal restore the state of the VM using the additional
|
|
|
|
'-incoming' option.
|
|
|
|
|
|
|
|
.. code-block:: console
|
|
|
|
|
|
|
|
qemu-system-x86_64 -display sdl -accel kvm \
|
|
|
|
-m 1024 -boot d -bios bios-256k.bin -boot menu=on \
|
|
|
|
-chardev socket,id=chrtpm,path=/tmp/mytpm1/swtpm-sock \
|
|
|
|
-tpmdev emulator,id=tpm0,chardev=chrtpm \
|
|
|
|
-device tpm-tis,tpmdev=tpm0 \
|
|
|
|
-incoming "exec:cat < testvm.bin" \
|
|
|
|
test.img
|
|
|
|
|
|
|
|
Troubleshooting migration
|
|
|
|
-------------------------
|
|
|
|
|
|
|
|
There are several reasons why migration may fail. In case of problems,
|
|
|
|
please ensure that the command lines adhere to the following rules
|
|
|
|
and, if possible, that identical versions of QEMU and swtpm are used
|
|
|
|
at all times.
|
|
|
|
|
|
|
|
VM save and restore:
|
|
|
|
|
|
|
|
- QEMU command line parameters should be identical apart from the
|
|
|
|
'-incoming' option on VM restore
|
|
|
|
|
|
|
|
- swtpm command line parameters should be identical
|
|
|
|
|
|
|
|
VM migration to 'localhost':
|
|
|
|
|
|
|
|
- QEMU command line parameters should be identical apart from the
|
|
|
|
'-incoming' option on the destination side
|
|
|
|
|
|
|
|
- swtpm command line parameters should point to two different
|
|
|
|
directories on the source and destination swtpm (--tpmstate dir=...)
|
|
|
|
(especially if different versions of libtpms were to be used on the
|
|
|
|
same machine).
|
|
|
|
|
|
|
|
VM migration across the network:
|
|
|
|
|
|
|
|
- QEMU command line parameters should be identical apart from the
|
|
|
|
'-incoming' option on the destination side
|
|
|
|
|
|
|
|
- swtpm command line parameters should be identical
|
|
|
|
|
|
|
|
VM Snapshotting:
|
|
|
|
- QEMU command line parameters should be identical
|
|
|
|
|
|
|
|
- swtpm command line parameters should be identical
|
|
|
|
|
|
|
|
|
|
|
|
Besides that, migration failure reasons on the swtpm level may include
|
|
|
|
the following:
|
|
|
|
|
|
|
|
- the versions of the swtpm on the source and destination sides are
|
|
|
|
incompatible
|
|
|
|
|
|
|
|
- downgrading of TPM state may not be supported
|
|
|
|
|
|
|
|
- the source and destination libtpms were compiled with different
|
|
|
|
compile-time options and the destination side refuses to accept the
|
|
|
|
state
|
|
|
|
|
|
|
|
- different migration keys are used on the source and destination side
|
|
|
|
and the destination side cannot decrypt the migrated state
|
|
|
|
(swtpm ... --migration-key ... )
|
|
|
|
|
|
|
|
|
|
|
|
.. _TIS specification:
|
|
|
|
https://trustedcomputinggroup.org/pc-client-work-group-pc-client-specific-tpm-interface-specification-tis/
|
|
|
|
|
|
|
|
.. _CRB specification:
|
|
|
|
https://trustedcomputinggroup.org/resource/pc-client-platform-tpm-profile-ptp-specification/
|
|
|
|
|
|
|
|
|
|
|
|
.. _ACPI specification:
|
|
|
|
https://trustedcomputinggroup.org/tcg-acpi-specification/
|
|
|
|
|
|
|
|
.. _PPI specification:
|
|
|
|
https://trustedcomputinggroup.org/resource/tcg-physical-presence-interface-specification/
|
|
|
|
|
|
|
|
.. _SWTPM protocol:
|
|
|
|
https://github.com/stefanberger/swtpm/blob/master/man/man3/swtpm_ioctls.pod
|