Received: by 2002:a05:7412:bc1a:b0:d7:7d3a:4fe2 with SMTP id ki26csp348229rdb; Sat, 19 Aug 2023 04:27:27 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH47Qh3AXfQUN03QD7EmjrfDWJQoTanaeB0byG78Lc4aTf2yS0AAHFSrtJtWEbA8MLPiQNA X-Received: by 2002:a17:902:dacd:b0:1b8:a469:53d8 with SMTP id q13-20020a170902dacd00b001b8a46953d8mr2110154plx.0.1692444447080; Sat, 19 Aug 2023 04:27:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692444447; cv=none; d=google.com; s=arc-20160816; b=wKVRLpBIKWVy/NVxJGsN+571GqJDxeZFeIi4fYPbBof1nZlXue3Gle0jjiJcsEsIZM Om6aQBA+TyeXyaINl9MLVKFWCWWqrDF1s/7rx6Nqo0fxtSBmYD/kZFEUZOvaT8DDct2J WkJsLcq57VghiBob5eTWHRpsAzTEIHZzxWtYghc6swiwKNlMg2nT61qbQht3ST68aG3n QSMQZJ5yo+QNFP9qF1jhJSuKN9KlG0+8UIwoaxB9DxiKfMKtIct5MUUZbkXtEqRwKe/N I0aty2N4/1UmVPuU+dEBUUoDBcMDh3ZHfIKbWaRiUUFUGmHY8D4/k9hcI+v5NxschMe3 8tBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=1WCcY1DTF2SDkL2C38h5/rIUZSGkzG/CsRQNgHvnx78=; fh=9hTTAgEcfYw2eGPHmvh0aVvqo5NEgR3ec4Fr19Dt+HM=; b=Gcj/38D4q+fHU2ZqEIbiWhJXLcXOS4xdYr3Gvdgbd+fIBjC9Fkae2J61XTEfal3laA rNtFOESG4f7z5ry0b8azwbmtmsNAE8v2c81IDw9QSM8BNVl8SQyRcFsq3SNMrL7h+nJD nwbIZpycchn61icS2GKkL+FGJQV8nrDKL17GUEigwlTKCDBJnyuskVigWUMm+jcLG7A+ 4hhAUP9MQXE1RvzBwfGfB4azDrv34AiLIYC+J0G2OIz71EztpFFjGrekXN0CYgCjcpfa HHhYm3uo2yz/vog2kI/LaRg+yHKb/YFc5cW2zE1iQrd0oQKCtExVwSNFb7ATe0trA3BQ gHWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=M6Vx4wfJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id y6-20020a17090322c600b001b53b6b029csi3557014plg.124.2023.08.19.04.27.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 19 Aug 2023 04:27:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=M6Vx4wfJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C103264BD7; Sat, 19 Aug 2023 01:34:09 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238699AbjHORQ2 (ORCPT + 99 others); Tue, 15 Aug 2023 13:16:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49664 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238688AbjHORQV (ORCPT ); Tue, 15 Aug 2023 13:16:21 -0400 Received: from mail-qt1-x829.google.com (mail-qt1-x829.google.com [IPv6:2607:f8b0:4864:20::829]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9D5BC19B5 for ; Tue, 15 Aug 2023 10:16:19 -0700 (PDT) Received: by mail-qt1-x829.google.com with SMTP id d75a77b69052e-4036bd4fff1so20931cf.0 for ; Tue, 15 Aug 2023 10:16:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1692119779; x=1692724579; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=1WCcY1DTF2SDkL2C38h5/rIUZSGkzG/CsRQNgHvnx78=; b=M6Vx4wfJkJ366sFCowkGvQ+/tOWO0fxXKCqskj3hKgFn5l2JkDOB5JczHT5DRghjkp DV6VbcYG8D/gxiY83tG+Orw4OM1ZzoyIhFC7w4p9PWtNuqTFtKthCwrFzNqgt6CJ0gWm GsHptxsBfryyqd+kX21dJbj76UtP5YksoujiDKi18lAl4vcJhoH0DyG9S3Zq3RcxhOEC Yfti0RtdYszrEhnONH7e2kZvYknbFDgCf6y8YcD9RHfP//9dEUcwRJzrjh1PLL/D5Rr/ VL+sDINBBTQZXBZg1Yvpumg3DuV7AdCL200x/BIOLDjEysi2fZpD6C8LosVbuyIUku1o kNgw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692119779; x=1692724579; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=1WCcY1DTF2SDkL2C38h5/rIUZSGkzG/CsRQNgHvnx78=; b=BEM4/mAz1oT8HGaMNEBLC+JytRleg4GEKyBk2ON5mR780oL6A79XNvYtQNqzt52z7N 7+mQW/8lwDrX+KlHM9+GSu9Fvkdk1BflR4RBXpPRNYs0TcwQux9fRhqyi9ymUs8xokGF IxYPj3UoNBpYHjmGnY5rWkq5p+edmaenaS8KiGGT80LjHxQRMXv3QwYkLCnZpbFuP/kO 1lzIWOAPWC+VkWPxvuDy0FvWhQLnfSHMRDXiT2LvVzZ4IUFwX4IziTSi0Tgy90UQ2ZNc swhowaW87GTQWJXIoVlsho8iuvO+WhRMC/S6u1zj9l0v6C64IlNcvVhzS8KpQt232xgQ ibNQ== X-Gm-Message-State: AOJu0Yy2/fjKeHDsn9bXqMkkhjxvvHDIyvDRhH4XheclKM0J4bnDM3a0 Ajd/3PC0vP3kyfi8GKS0EghFiCmYijZS/+zfCCfJhw== X-Received: by 2002:a05:622a:1106:b0:403:e1d1:8b63 with SMTP id e6-20020a05622a110600b00403e1d18b63mr11535qty.24.1692119778732; Tue, 15 Aug 2023 10:16:18 -0700 (PDT) MIME-Version: 1.0 References: <169199898909.1782217.10899362240465838600.stgit@dwillia2-xfh.jf.intel.com> <57f3a05e-8fcd-4656-beea-56bb8365ae64@linux.microsoft.com> <64da606b171cc_2138e29484@dwillia2-xfh.jf.intel.com.notmuch> In-Reply-To: From: Dionna Amalie Glaze Date: Tue, 15 Aug 2023 10:16:07 -0700 Message-ID: Subject: Re: [PATCH v2 0/5] tsm: Attestation Report ABI To: Peter Gonda Cc: Dan Williams , Jeremi Piotrowski , linux-coco@lists.linux.dev, Brijesh Singh , Kuppuswamy Sathyanarayanan , Peter Zijlstra , Tom Lendacky , Borislav Petkov , Samuel Ortiz , Greg Kroah-Hartman , Andrew Morton , James Bottomley , x86@kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > > Why do we need to be so prescriptive about "boot time" vs "runtime" > attestations? A user may wish to attest to several requests as Jeremi > notes. And why should users be forced into using a vTPM interface if > their usecase doesn't require all the features and complexity of a > vTPM? Some users may prefer less overall code within their Trusted > Computer Base (TCB) and a TPM emulate is a significant code base. > I agree, and I was a bit too hasty to acquiesce to sysfs due to the TPM argument that really only applies for SEV-SNP without a whole lot of extra work for other backends (not to say SVSM isn't itself a whole lot of extra work). > It seems like you are just reading the SNP spec, if you read the TDX > spec you'll see there are RTMRs which can be extended with new data. > This leads to a different data in the attestation. Similar there are > REMs in the ARM CCA spec. > I'll add a note here that measurement registers are extensible at any point by ring0, and there should be an API for doing so, the way that there is for /dev/tpmX. It could be /dev/teemr or something to unify TDX, COVE, ARM CCA, and potentially a measurement register protocol extension to SEV-SNP's SVSM. I'm not sure how Intel is going to propose abstracting TCG Canonical Event Log measurements to reuse measurement-to-PCR code points in the kernel as measurement-to-MR, or whatnot, but each technology should have that implementation option to extend their own measurement registers (and event log, potentially). I (and probably James) object with just saying the PCRs are going to xyz-measurement-register for simulating that integrity part of a TPM to get just the quote aspect and not the rest of TPM 2.0 to hide everything behind the TPM abstraction. It doesn't follow the Tcg spec. But I repeat myself. If we use any ioctl, we'll end up multiplexing the input per-technology, and at that point we essentially have manufacturer-specific devices much to Dan's dismay. Sysfs will certainly not be okay for measurement register-only technology, since there's no way to not use a hardware attestation to securely track measurement changes past "the static boot" (PCRs 0-7). I don't want to have to rely on enclave-like peer VMs that perform the TPM behavior. -- -Dionna Glaze, PhD (she/her)