Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp592974rdb; Tue, 5 Dec 2023 14:05:30 -0800 (PST) X-Google-Smtp-Source: AGHT+IGEVkvJcOjFqieN8MI0ZHTsZquWORDMXkD+xl7lJYjtgTfEYiH9pYXR4dRvFtN3qVIYIvat X-Received: by 2002:a05:6a20:100a:b0:188:f3d:ea35 with SMTP id gs10-20020a056a20100a00b001880f3dea35mr6443542pzc.50.1701813930144; Tue, 05 Dec 2023 14:05:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701813930; cv=none; d=google.com; s=arc-20160816; b=F/su38r4tVmtKXEpbSGSJG0hAxxg9+6HBMDsEAeJmSYR9GPIyroM9jzVCmcoxuMaGU A4607ocgWW3LC9vjs6uM2zv+VQ3p7Z3GdJ6jZaU3uOciGQrAkaJG6MtFJrpYNeAONe6a 0TGOckPvIS/Ks0PjwK/hD9NryqC+Q1FP7hQTQ6/8LmkUqMmshAZmMMle2FzkIB95lcMQ UF77UIIFcEu038OF9AcXwmCQW9of7fB/rdRT1xYSd2HyJXPA0PkrwuEN+o9ZC69FnJTp NE0pRNyS1c2IJR6XYvVh5W7zLSk+PD3F8qh/eecXA2MdaQSQhiYizSG85cPWUQZWGbR7 qr/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=/xPsXYdPRuMVqnsmnQJ1p0ZibiDuuU0TYtGWS33ZgM4=; fh=Gja1l53NHGWw3VKCV8W+Bva9i36Wcy6254Az0jXKXgI=; b=n6x2BcJF4g8e30MslYgyz064EnNUXZvQLogS0NfKT1AehQGPSkLV7RUDKSXkm+Usp4 fdTDYAsr2ifh/utSt+xBMIbd2KEUdMrs4dWhtrKZ0ve3qpMDRWDLsM2r1saT1i+Vgz5G Jsb3W7T1BeB5aFArUMk8OY3EFgVAjg3oq067hYbx5JdGt5Kcm/RGlY4GVgbPehg170Cg gc3j0+HDF+HD8+9jnyhlpFWH9QU4NLV7Oks0FkodYN+4ozAeWQz8tVk4M4K1RuqwKyLf nh97d8LG3uwjSfQ9qFiHU0peozHBIg3ow4VRvIqD9NmtFM2fIDs0uz2fue5N1Oq2MiJZ AwbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=FSM3mOB7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id d4-20020a056a0010c400b006cdeb7e9f6dsi9894692pfu.234.2023.12.05.14.05.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Dec 2023 14:05:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=FSM3mOB7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 72D3080843CB; Tue, 5 Dec 2023 14:05:08 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346327AbjLEWEx (ORCPT + 99 others); Tue, 5 Dec 2023 17:04:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46042 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229591AbjLEWEw (ORCPT ); Tue, 5 Dec 2023 17:04:52 -0500 Received: from mail-ed1-x533.google.com (mail-ed1-x533.google.com [IPv6:2a00:1450:4864:20::533]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 86EF61B1 for ; Tue, 5 Dec 2023 14:04:57 -0800 (PST) Received: by mail-ed1-x533.google.com with SMTP id 4fb4d7f45d1cf-54c77d011acso1157a12.1 for ; Tue, 05 Dec 2023 14:04:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1701813896; x=1702418696; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=/xPsXYdPRuMVqnsmnQJ1p0ZibiDuuU0TYtGWS33ZgM4=; b=FSM3mOB7N7qlrkkYHsJuLq/r0l7JVdre2PpBK4FcXnhUGblqiLgJrLWYQVqS8t7ZPh 1ipCvbe7CrT7h4nO2PFn0EmN5boAGl0bkPhBo2130UbDo32orIZAE7I2ISbBBbceHuhm Ing6K+/kubIhGW4hSxGXFEgwnuDL9DWrPodk2RxT7asyRupO4hmscJiTajoyDGCxBRiw Kp/qgVklEPtCR8Zfg3gEltZE4Qztsz/QhcWWSFFth1LY/ozNhPJpXWJvfpzi5kKSXZ9D CwlUFtW/BwJvKa/9w3agneXNuj6yjn79VIdN/2ZUWJlNXRAsjCGUPwAKHr3dbDPjI9Yj 9aeQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701813896; x=1702418696; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=/xPsXYdPRuMVqnsmnQJ1p0ZibiDuuU0TYtGWS33ZgM4=; b=od/82leMv5wy1Lot1kQx5HTHT8UKwacLfYdzjzvqvySUG2hvERDydXj1tFP2FuS7I0 WqoEWvkFj1Yx/9uBBU+0d6iwt4v6zSer26ut1OooZr+cMJ0IRce5K+TPqFqu6sH8jE0e MhF+XL69StTBy/uvkAXQBoVPBBdUAA7mvBksIzZ1+EjGYmUmAd6uFjMA9gPWr2s4cvOx JKMTdiQRsZG29woWMdzENX+QPqz/jeuK9azHLYEGydX0WvxGRa/gUo2S0tu5/GX/X8Cl LDxVgI20By91JpNoV6TQoIgC3Tdh1GjRpBrA+Li6ejSACy1jw2s/VQTycpwX8UfKsY5o Y5kA== X-Gm-Message-State: AOJu0YxFlnDxCPUYApyUsvJhL4ZIc/i81QVuljYBMPaHnWfNI7t+hHsE bernEleTBZ7JNUcJl+TaiJ+i3fR9Z1Vk5/CTfs7mNA== X-Received: by 2002:a50:bb03:0:b0:544:466b:3b20 with SMTP id y3-20020a50bb03000000b00544466b3b20mr5843ede.5.1701813895835; Tue, 05 Dec 2023 14:04:55 -0800 (PST) MIME-Version: 1.0 References: <20231016132819.1002933-49-michael.roth@amd.com> <20231110220756.7hhiy36jc6jiu7nm@amd.com> <656e6f0aa1c5_4568a29451@dwillia2-xfh.jf.intel.com.notmuch> <656f82b4b1972_45e012944e@dwillia2-xfh.jf.intel.com.notmuch> In-Reply-To: <656f82b4b1972_45e012944e@dwillia2-xfh.jf.intel.com.notmuch> From: Dionna Amalie Glaze Date: Tue, 5 Dec 2023 14:04:41 -0800 Message-ID: Subject: Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event To: Dan Williams Cc: Sean Christopherson , Michael Roth , Alexey Kardashevskiy , kvm@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, jroedel@suse.de, thomas.lendacky@amd.com, hpa@zytor.com, ardb@kernel.org, pbonzini@redhat.com, vkuznets@redhat.com, jmattson@google.com, luto@kernel.org, dave.hansen@linux.intel.com, slp@redhat.com, pgonda@google.com, peterz@infradead.org, srinivas.pandruvada@linux.intel.com, rientjes@google.com, dovmurik@linux.ibm.com, tobin@ibm.com, bp@alien8.de, vbabka@suse.cz, kirill@shutemov.name, ak@linux.intel.com, tony.luck@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, alpergun@google.com, jarkko@kernel.org, ashish.kalra@amd.com, nikunj.dadhania@amd.com, pankaj.gupta@amd.com, liam.merwick@oracle.com, zhi.a.wang@intel.com, Brijesh Singh , dan.middleton@intel.com Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Tue, 05 Dec 2023 14:05:08 -0800 (PST) On Tue, Dec 5, 2023 at 12:06=E2=80=AFPM Dan Williams wrote: > > [ add Ard for the SBOM sysfs ABI commentary ] > > Dionna Amalie Glaze wrote: > [..] > > > > My own plan for SEV-SNP was to have a bespoke signed measurement of > > > > the UEFI in the GUID table, but that doesn't extend to TDX. If we'r= e > > > > looking more at an industry alignment on coRIM for SBOM formats (ye= s > > > > please), then it'd be great to start getting that kind of info plum= bed > > > > to the user in a uniform way that doesn't have to rely on servers > > > > providing the endorsements. > > > > > > > > [1] https://uefi.org/blog/firmware-sbom-proposal > > > > > > Honestly my first reaction for this ABI would be for a new file under > > > /sys/firmware/efi/efivars or similar. > > > > For UEFI specifically that could make sense, yes. Not everyone has > > been mounting efivars, so it's been a bit of an uphill battle for that > > one. > > I wonder what the concern is with mounting efivarfs vs configfs? In any > event this seems distinct enough to be its own /sys/firmware/efi/sbom > file. I would defer to Ard, but I think SBOM is a generally useful > concept that would be out of place as a blob returned from configfs-tsm. > > > Still there's the matter of cached TDI RIMs. NVIDIA would have > > I am not immediatly sure what a "TDI RIM" is? > I might just be making up terms. Any trusted hardware device that has its own attestation will (hopefully) have signed reference measurements, or a Reference Integrity Manifest as TCG calls them. > > everyone send attestation requests to their servers every quote > > request in the NRAS architecture, but we're looking at other ways to > > "NRAS" does not parse for me either. > That would be this https://docs.attestation.nvidia.com/api-docs/nras.html > > provide reliable attestation without a third party service, albeit > > with slightly different security properties. > > Setting the above confusion aside, I would just say that in general yes, > the kernel needs to understand its role in an end-to-end attestation > architecture that is not beholden to a single vendor, but also allows > the kernel to enforce ABI stability / mitigate regressions based on > binary format changes. > I'm mainly holding on to hope that I don't have to introduce a new runtime dependency on a service that gives a source of truth about the software that's running in the VM. If we can have a GUID table with a flexible size that the host can request of the guest, then we can version ABI changes with new GUID entries. It's a big enough value space without vanity naming opportunities that we can pretty easily make changes without incurring any guest kernel changes. --=20 -Dionna Glaze, PhD (she/her)