Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp38796pxb; Wed, 20 Apr 2022 15:26:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJysXh4Npv2KLYOwuqCE8ZPNydgrjjn73lFligwGBF6S8woKtCRp0318nbiM3TA8HHfQCOMJ X-Received: by 2002:a65:490d:0:b0:39e:58cb:b1eb with SMTP id p13-20020a65490d000000b0039e58cbb1ebmr21723561pgs.390.1650493565785; Wed, 20 Apr 2022 15:26:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650493565; cv=none; d=google.com; s=arc-20160816; b=b+/UFmk0yiQkfks3fvopeFpczg55831YpZ7nCoMTJC0WzkGiMBqbBNePEX0D4ZOthX p+mdqNGjYqScbZv6V98xJpC0+wvjal0rE8RtDvIcpEsny2LkgTXmOVrrteNDWT98lmTO 2sQtkmBmrRGz/nHDAF9v3bfSi+Jhg3suh0sk1EZWA5Rb7o2mN6cGmpjiGFmXmQDvLip+ EW3wxdMLw/mlS/YYsmkNV9626UQYPUXeGKFQNjyYL6Lb0uE2+L3S0jgT2SJX2B9a1iFA MjNYAbyD0Ml8pZck5jRAF0nGjIZ0j1NeKHrQIhUaZ5cfaFn0OSqfGUhVnKZpkaukWep+ kMxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=gyLb2ZM891IF7vvqgLWuOu1OsK8ZHQglfboC5ouA8rA=; b=GS8RYHJoXo/1SxysRSUwNGJTDOqErvhLM1nuFa0M/U/kqpMa8FZ6RYg9rhKf0IAIEW enwsKp2ODmlxgRAx7R8pV5GP9rzzYkcIzVd8lCR7rgL+tISUdptlMlcMB0SZhJha3LE8 lDl1VgilJPMq5YBB0fQe0IFJTP/drN8mRTlqC7ThLOmpojj9Dr2voUmZ08+aU0g63akH 0/6euKFI2EwkRxCuu78oUYaBvDZzdbYlqDdZlnORBO+RuD7xfziNS3obgaLSmnf3JPPT LF65E5dK8x/LLENYiGy89s6lOHfWj/u2datZvuGW5kkVACm8Wd7Lkz+xs19RFslKfEU5 jsWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=HnWtQxI0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w6-20020a170902a70600b00153b2d16586si3143003plq.398.2022.04.20.15.25.40; Wed, 20 Apr 2022 15:26:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=HnWtQxI0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357032AbiDSWYu (ORCPT + 99 others); Tue, 19 Apr 2022 18:24:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52240 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229599AbiDSWYq (ORCPT ); Tue, 19 Apr 2022 18:24:46 -0400 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0D39722BE7; Tue, 19 Apr 2022 15:22:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1650406922; x=1681942922; h=message-id:subject:from:to:cc:date:in-reply-to: references:mime-version:content-transfer-encoding; bh=7FPoGNOFLlOXDs/xu3hONgTHzwKlS/vbPKmpCE0gDjo=; b=HnWtQxI0xa8kEbGSLMjLYMwO1/Sk+XoD9m9VfiV0dQH+gUndEVooD5dG KTI1ony/8LY7K1OEuaVUIxukdU/I3PuFDB2puJ0Ij2rDahI0W9a0nlL/L jnoV4F9D/taV9eRoDbPBTHAvQBRMtcvihlMX2Xi1TeH+olCWEqYW1BADj FUYnRS+L4OX0abGTn483wKveHwF2DM+P6KXNMReoEZJ8X+b9bYGWLHQ1b 5uU9tHibQ9mWepblGOjpsbZo0QwmW6+zvQYPA3+8zW8bnxj97iUHEmZCy qyCnbnOOPuqUxQluq5hxVwMebIzYmt2Kvq2QvQiURxloWNJC+GNwk1NIJ g==; X-IronPort-AV: E=McAfee;i="6400,9594,10322"; a="264058068" X-IronPort-AV: E=Sophos;i="5.90,273,1643702400"; d="scan'208";a="264058068" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Apr 2022 15:22:01 -0700 X-IronPort-AV: E=Sophos;i="5.90,273,1643702400"; d="scan'208";a="554918565" Received: from asaini1-mobl1.amr.corp.intel.com (HELO khuang2-desk.gar.corp.intel.com) ([10.254.58.15]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Apr 2022 15:21:57 -0700 Message-ID: Subject: Re: [PATCH v3 4/4] platform/x86: intel_tdx_attest: Add TDX Guest attestation interface driver From: Kai Huang To: Dave Hansen , Kuppuswamy Sathyanarayanan , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, Hans de Goede , Mark Gross Cc: "H . Peter Anvin" , "Kirill A . Shutemov" , Tony Luck , Andi Kleen , linux-kernel@vger.kernel.org, platform-driver-x86@vger.kernel.org Date: Wed, 20 Apr 2022 10:21:55 +1200 In-Reply-To: <975b5050-2108-9ace-cc71-46f17db0a731@intel.com> References: <20220415220109.282834-1-sathyanarayanan.kuppuswamy@linux.intel.com> <20220415220109.282834-5-sathyanarayanan.kuppuswamy@linux.intel.com> <975b5050-2108-9ace-cc71-46f17db0a731@intel.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.42.4 (3.42.4-1.fc35) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2022-04-19 at 07:13 -0700, Dave Hansen wrote: > On 4/19/22 00:47, Kai Huang wrote: > > > From security's perspective, attestation is an essential part of TDX. That > > being said, w/o attestation support in TD guest, I guess nobody will seriously > > use TD guest. > > Are you saying you can't think of a single threat model where there's a > benefit to running a TDX guest without attestation? Will TDX only be > used in environments where secrets are provisioned to guests on the > basis of attestation? > > > I don't think anyone should provision secret to a TD before it get attested that it is a genuine TD that he/she expected. If someone does that, he/she takes the risk of losing the secret. Of course if someone just want to try a TD then w/o attestation is totally fine. -- Thanks, -Kai