Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp2137031pxb; Sat, 2 Oct 2021 07:46:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwNJ7HTE0LyiQKBbEWQH4LOOEziTruASiMJjW08tbtEUGHYEBikwi8gWccQFBnOwvk2KEz7 X-Received: by 2002:a17:902:dac4:b0:13d:acee:cacc with SMTP id q4-20020a170902dac400b0013daceecaccmr14751789plx.0.1633186005361; Sat, 02 Oct 2021 07:46:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633186005; cv=none; d=google.com; s=arc-20160816; b=DOKX0UgyqNk5tln/B0RMPyEWB05G3yBxMda8UtiLTzFRA/hf9F2kFjxOTo1RhfEKKV SAZjYCtuEfJG6A0OttlIgNmqGKSSpjQfMfj01DA59VYQ7BD3bNjvz0uTKu1wQm3WvXRI L70YGVkdZ1Ui+4n8X+gXbzmhG3ZDIvN+FnNCQVPMUDrolR/47la4dMgZciWgFVgbrZ+z 8sY7eb7SFAy9bdhK18fhz8gE8nQFXdTjC3pj5qmQDBKFsRFWfAhya7wD7knTMDNwrGzv taSSpXzWGW54tvUzikqFbcvF4Fduby9YoSbnmBBELXKCmbNflJS67JHR9Masu+rQ3WVH tzXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=uY+klAHDlTK3K4s94SjaSBbz9YLEIka37Rl1s5mcjc4=; b=HZxizTaeJtbgwIgxvOLU3qc6ACaJjujTvwUbFuLfhD+49s8Is+JrV0KhhyujKSSMgD r+DsjCXKlwVSiOrOlvMxpg1eP1t6Qobz89rmk1NosqRJy+I3F7iMDwYpQaKco7yhfGTw YA3rs5cmA/lR4yaIV4rjbkYcEIPpxmCcxO56pZyO/4hshe+VY8so9zWy1d/j04IHICpw mJ0Vbs4n8VfsmRobRwmw5kX7arvrWvyh+k2ysUkIs7Cu5UdwwrYTFJF7fF+SwBju7Q+A cWk8uKBd0wB29mPoIuii8/s/GRfIu4pvGOl0Rtoq4uqCX77u5lk3PDYuq1QDrFopQ5Oe ZQRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="KmKcktd/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u36si10674775pgl.231.2021.10.02.07.46.29; Sat, 02 Oct 2021 07:46:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="KmKcktd/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233422AbhJBOpv (ORCPT + 99 others); Sat, 2 Oct 2021 10:45:51 -0400 Received: from mail.kernel.org ([198.145.29.99]:49032 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229560AbhJBOpv (ORCPT ); Sat, 2 Oct 2021 10:45:51 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BDE8161A38; Sat, 2 Oct 2021 14:44:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1633185845; bh=RVXCE1KtXB8pEGemhZzbi1pw9kaZh7HJ77HnqA+Npns=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KmKcktd/wdJOAcwgKPmcihqF52yuGkwO6RKYCQVgvR3byomenOLbvq2VfDP6EjvI0 plksHABi/Z/OXC4bfqZU2y4MUj4nw/JE7r+MlNbFWxMgZ3xVT+GKw6RNwYkpMQ3q5H Df6XaN3sMEBBNp5q2PWkokq4AYxKlEzAikICkvoM= Date: Sat, 2 Oct 2021 16:44:00 +0200 From: Greg Kroah-Hartman To: Andi Kleen Cc: "Michael S. Tsirkin" , "Kuppuswamy, Sathyanarayanan" , Dan Williams , Borislav Petkov , X86 ML , Bjorn Helgaas , Thomas Gleixner , Ingo Molnar , Andreas Noever , Michael Jamet , Yehezkel Bernat , "Rafael J . Wysocki" , Mika Westerberg , Jonathan Corbet , Jason Wang , Kuppuswamy Sathyanarayanan , Linux Kernel Mailing List , Linux PCI , USB list , virtualization@lists.linux-foundation.org, "Reshetova, Elena" Subject: Re: [PATCH v2 4/6] virtio: Initialize authorized attribute for confidential guest Message-ID: References: <20210930065953-mutt-send-email-mst@kernel.org> <6d1e2701-5095-d110-3b0a-2697abd0c489@linux.intel.com> <1cfdce51-6bb4-f7af-a86b-5854b6737253@linux.intel.com> <64eb085b-ef9d-dc6e-5bfd-d23ca0149b5e@linux.intel.com> <20211002070218-mutt-send-email-mst@kernel.org> <95ba71c5-87b8-7716-fbe4-bdc9b04b6812@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <95ba71c5-87b8-7716-fbe4-bdc9b04b6812@linux.intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Oct 02, 2021 at 07:20:22AM -0700, Andi Kleen wrote: > > On 10/2/2021 4:14 AM, Greg Kroah-Hartman wrote: > > On Sat, Oct 02, 2021 at 07:04:28AM -0400, Michael S. Tsirkin wrote: > > > On Fri, Oct 01, 2021 at 08:49:28AM -0700, Andi Kleen wrote: > > > > > Do you have a list of specific drivers and kernel options that you > > > > > feel you now "trust"? > > > > For TDX it's currently only virtio net/block/console > > > > > > > > But we expect this list to grow slightly over time, but not at a high rate > > > > (so hopefully <10) > > > Well there are already >10 virtio drivers and I think it's reasonable > > > that all of these will be used with encrypted guests. The list will > > > grow. > > What is keeping "all" drivers from being on this list? > > It would be too much work to harden them all, and it would be pointless > because all these drivers are never legitimately needed in a virtualized > environment which only virtualize a very small number of devices. Why would you not want to properly review and fix up all kernel drivers? That feels like you are being lazy. What exactly are you meaning by "harden"? Why isn't it automated? Who is doing this work? Where is it being done? Come on, you have a small number of virtio drivers, to somehow say that they are now divided up into trusted/untrusted feels very very odd. Just do the real work here, everyone will benefit, including yourself. > > How exactly are > > you determining what should, and should not, be allowed? > > Everything that has had reasonable effort at hardening can be added. But if > someone proposes to add a driver that should trigger additional scrutiny in > code review. We should also request them to do some fuzzing. You can provide that fuzzing right now, why isn't syzbot running on these interfaces today? And again, what _exactly_ do you all mean by "hardening" that has happened? Where is that documented and who did that work? > > And why not just put all of that into userspace and have it pick and > > choose? That should be the end-goal here, you don't want to encode > > policy like this in the kernel, right? > > How would user space know what drivers have been hardened? This is really > something that the kernel needs to determine. I don't think we can outsource > it to anyone else. It would "know" just as well as you know today in the kernel. There is no difference here. Just do the real work here, and "harden" all of the virtio drivers please. What prevents that? > Also BTW of course user space can still override it, but really the defaults > should be a kernel policy. > > There's also the additional problem that one of the goals of confidential > guest is to just move existing guest virtual images into them without much > changes. So it's better for such a case if as much as possible of the policy > is in the kernel. But that's more a secondary consideration, the first point > is really the important part. Where exactly are all of these "goals" and "requirements" documented and who is defining them and forcing them on us without actually doing any of the work involved? thanks, greg k-h