device/virtio-nsm: Support for Nitro Secure Module device

Nitro Secure Module (NSM)[1] device is used in AWS Nitro Enclaves[2]
for stripped down TPM functionality like cryptographic attestation.
The requests to and responses from NSM device are CBOR[3] encoded.

This commit adds support for NSM device in QEMU. Although related to
AWS Nitro Enclaves, the virito-nsm device is independent and can be
used in other machine types as well. The libcbor[4] library has been
used for the CBOR encoding and decoding functionalities.

[1] https://lists.oasis-open.org/archives/virtio-comment/202310/msg00387.html
[2] https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html
[3] http://cbor.io/
[4] https://libcbor.readthedocs.io/en/latest/

Signed-off-by: Dorjoy Chowdhury <dorjoychy111@gmail.com>
Reviewed-by: Alexander Graf <graf@amazon.com>
Link: https://lore.kernel.org/r/20241008211727.49088-3-dorjoychy111@gmail.com
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
Dorjoy Chowdhury 2024-10-09 03:17:23 +06:00 committed by Paolo Bonzini
parent 1ac32dc8ea
commit bb154e3e0c
12 changed files with 2252 additions and 0 deletions

View file

@ -6,6 +6,10 @@ config VIRTIO_RNG
default y
depends on VIRTIO
config VIRTIO_NSM
bool
depends on LIBCBOR && VIRTIO
config VIRTIO_IOMMU
bool
default y

321
hw/virtio/cbor-helpers.c Normal file
View file

@ -0,0 +1,321 @@
/*
* QEMU CBOR helpers
*
* Copyright (c) 2024 Dorjoy Chowdhury <dorjoychy111@gmail.com>
*
* This work is licensed under the terms of the GNU GPL, version 2 or
* (at your option) any later version. See the COPYING file in the
* top-level directory.
*/
#include "hw/virtio/cbor-helpers.h"
bool qemu_cbor_map_add(cbor_item_t *map, cbor_item_t *key, cbor_item_t *value)
{
bool success = false;
struct cbor_pair pair = (struct cbor_pair) {
.key = cbor_move(key),
.value = cbor_move(value)
};
success = cbor_map_add(map, pair);
if (!success) {
cbor_incref(pair.key);
cbor_incref(pair.value);
}
return success;
}
bool qemu_cbor_array_push(cbor_item_t *array, cbor_item_t *value)
{
bool success = false;
success = cbor_array_push(array, cbor_move(value));
if (!success) {
cbor_incref(value);
}
return success;
}
bool qemu_cbor_add_bool_to_map(cbor_item_t *map, const char *key, bool value)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_build_bool(value);
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_uint8_to_map(cbor_item_t *map, const char *key,
uint8_t value)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_build_uint8(value);
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_map_to_map(cbor_item_t *map, const char *key,
size_t nested_map_size,
cbor_item_t **nested_map)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_new_definite_map(nested_map_size);
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
*nested_map = value_cbor;
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_bytestring_to_map(cbor_item_t *map, const char *key,
uint8_t *arr, size_t len)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_build_bytestring(arr, len);
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_null_to_map(cbor_item_t *map, const char *key)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_new_null();
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_string_to_map(cbor_item_t *map, const char *key,
const char *value)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_build_string(value);
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_uint8_array_to_map(cbor_item_t *map, const char *key,
uint8_t *arr, size_t len)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_new_definite_array(len);
if (!value_cbor) {
goto cleanup;
}
for (int i = 0; i < len; ++i) {
cbor_item_t *tmp = cbor_build_uint8(arr[i]);
if (!tmp) {
goto cleanup;
}
if (!qemu_cbor_array_push(value_cbor, tmp)) {
cbor_decref(&tmp);
goto cleanup;
}
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_uint8_key_bytestring_to_map(cbor_item_t *map, uint8_t key,
uint8_t *buf, size_t len)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_uint8(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_build_bytestring(buf, len);
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}
bool qemu_cbor_add_uint64_to_map(cbor_item_t *map, const char *key,
uint64_t value)
{
cbor_item_t *key_cbor = NULL;
cbor_item_t *value_cbor = NULL;
key_cbor = cbor_build_string(key);
if (!key_cbor) {
goto cleanup;
}
value_cbor = cbor_build_uint64(value);
if (!value_cbor) {
goto cleanup;
}
if (!qemu_cbor_map_add(map, key_cbor, value_cbor)) {
goto cleanup;
}
return true;
cleanup:
if (key_cbor) {
cbor_decref(&key_cbor);
}
if (value_cbor) {
cbor_decref(&value_cbor);
}
return false;
}

View file

@ -54,6 +54,7 @@ specific_virtio_ss.add(when: 'CONFIG_VIRTIO_PMEM', if_true: files('virtio-pmem.c
specific_virtio_ss.add(when: 'CONFIG_VHOST_VSOCK', if_true: files('vhost-vsock.c'))
specific_virtio_ss.add(when: 'CONFIG_VHOST_USER_VSOCK', if_true: files('vhost-user-vsock.c'))
specific_virtio_ss.add(when: 'CONFIG_VIRTIO_RNG', if_true: files('virtio-rng.c'))
specific_virtio_ss.add(when: 'CONFIG_VIRTIO_NSM', if_true: [files('virtio-nsm.c', 'cbor-helpers.c'), libcbor])
specific_virtio_ss.add(when: 'CONFIG_VIRTIO_MEM', if_true: files('virtio-mem.c'))
specific_virtio_ss.add(when: 'CONFIG_VHOST_USER_SCMI', if_true: files('vhost-user-scmi.c'))
specific_virtio_ss.add(when: ['CONFIG_VIRTIO_PCI', 'CONFIG_VHOST_USER_SCMI'], if_true: files('vhost-user-scmi-pci.c'))
@ -70,6 +71,7 @@ virtio_pci_ss.add(when: 'CONFIG_VIRTIO_CRYPTO', if_true: files('virtio-crypto-pc
virtio_pci_ss.add(when: 'CONFIG_VIRTIO_INPUT_HOST', if_true: files('virtio-input-host-pci.c'))
virtio_pci_ss.add(when: 'CONFIG_VIRTIO_INPUT', if_true: files('virtio-input-pci.c'))
virtio_pci_ss.add(when: 'CONFIG_VIRTIO_RNG', if_true: files('virtio-rng-pci.c'))
virtio_pci_ss.add(when: 'CONFIG_VIRTIO_NSM', if_true: [files('virtio-nsm-pci.c', 'cbor-helpers.c'), libcbor])
virtio_pci_ss.add(when: 'CONFIG_VIRTIO_BALLOON', if_true: files('virtio-balloon-pci.c'))
virtio_pci_ss.add(when: 'CONFIG_VIRTIO_9P', if_true: files('virtio-9p-pci.c'))
virtio_pci_ss.add(when: 'CONFIG_VIRTIO_SCSI', if_true: files('virtio-scsi-pci.c'))

View file

@ -0,0 +1,73 @@
/*
* AWS Nitro Secure Module (NSM) device
*
* Copyright (c) 2024 Dorjoy Chowdhury <dorjoychy111@gmail.com>
*
* This work is licensed under the terms of the GNU GPL, version 2 or
* (at your option) any later version. See the COPYING file in the
* top-level directory.
*/
#include "qemu/osdep.h"
#include "hw/virtio/virtio-pci.h"
#include "hw/virtio/virtio-nsm.h"
#include "hw/qdev-properties.h"
#include "qapi/error.h"
#include "qemu/module.h"
#include "qom/object.h"
typedef struct VirtIONsmPCI VirtIONsmPCI;
#define TYPE_VIRTIO_NSM_PCI "virtio-nsm-pci-base"
DECLARE_INSTANCE_CHECKER(VirtIONsmPCI, VIRTIO_NSM_PCI,
TYPE_VIRTIO_NSM_PCI)
struct VirtIONsmPCI {
VirtIOPCIProxy parent_obj;
VirtIONSM vdev;
};
static void virtio_nsm_pci_realize(VirtIOPCIProxy *vpci_dev, Error **errp)
{
VirtIONsmPCI *vnsm = VIRTIO_NSM_PCI(vpci_dev);
DeviceState *vdev = DEVICE(&vnsm->vdev);
virtio_pci_force_virtio_1(vpci_dev);
if (!qdev_realize(vdev, BUS(&vpci_dev->bus), errp)) {
return;
}
}
static void virtio_nsm_pci_class_init(ObjectClass *klass, void *data)
{
DeviceClass *dc = DEVICE_CLASS(klass);
VirtioPCIClass *k = VIRTIO_PCI_CLASS(klass);
k->realize = virtio_nsm_pci_realize;
set_bit(DEVICE_CATEGORY_MISC, dc->categories);
}
static void virtio_nsm_initfn(Object *obj)
{
VirtIONsmPCI *dev = VIRTIO_NSM_PCI(obj);
virtio_instance_init_common(obj, &dev->vdev, sizeof(dev->vdev),
TYPE_VIRTIO_NSM);
}
static const VirtioPCIDeviceTypeInfo virtio_nsm_pci_info = {
.base_name = TYPE_VIRTIO_NSM_PCI,
.generic_name = "virtio-nsm-pci",
.instance_size = sizeof(VirtIONsmPCI),
.instance_init = virtio_nsm_initfn,
.class_init = virtio_nsm_pci_class_init,
};
static void virtio_nsm_pci_register(void)
{
virtio_pci_types_register(&virtio_nsm_pci_info);
}
type_init(virtio_nsm_pci_register)

1732
hw/virtio/virtio-nsm.c Normal file

File diff suppressed because it is too large Load diff