Linux Confidential Computing Development
 help / color / mirror / Atom feed
From: Alexey Kardashevskiy <aik@amd.com>
To: Dan Williams <dan.j.williams@intel.com>,
	"Giani, Dhaval" <Dhaval.Giani@amd.com>,
	Paolo Bonzini <pbonzini@redhat.com>,
	"Kardashevskiy, Alexey" <Alexey.Kardashevskiy@amd.com>,
	"Kaplan, David" <David.Kaplan@amd.com>,
	"steffen.eiden@ibm.com" <steffen.eiden@ibm.com>,
	"yilun.xu@intel.com" <yilun.xu@intel.com>,
	Suzuki K P <suzuki.kp@gmail.com>,
	"Powell, Jeremy" <Jeremy.Powell@amd.com>,
	"atishp04@gmail.com" <atishp04@gmail.com>
Cc: "linux-coco@lists.linux.dev" <linux-coco@lists.linux.dev>,
	"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
	lukas@wunner.de
Subject: Re: RE: KVM Forum BoF on I/O + secure virtualization
Date: Thu, 8 Jun 2023 09:18:12 +1000	[thread overview]
Message-ID: <d1269899-7e74-f33c-97bf-be0c708d2465@amd.com> (raw)
In-Reply-To: <647e9d4be14dd_142af8294b2@dwillia2-xfh.jf.intel.com.notmuch>

On 6/6/23 12:43, Dan Williams wrote:
> [ add Lukas ]
> 
> Giani, Dhaval wrote:
>> [AMD Official Use Only - General]
>>
>> Hi all,
>>
>> We have proposed a trusted I/O BoF session at KVM forum this year. I wanted
>> to kick off the discussion to maximize the 25 mins we have.
>>
>> By trusted I/O, I mean using TDISP to have “trusted” communications with a
>> device using something like AMD SEV-TIO [1] or Intel’s TDX connect [2].
>>
>> Some topics we would like to discuss are
>> o What is the device model like?
>> o Do we enlighten the PCI subsystem?
>> o Do we enlighten device drivers?
> 
> One observation in relation to these first questions is something that
> has been brewing since SPDM and IDE were discussed at Plumbers 2022.
> 
> https://lpc.events/event/16/contributions/1304/
> 
> Namely, that there is value in the base specs on the way to the full
> vendor TSM implementations. I.e. that if the Linux kernel can aspire to
> the role of a TSM it becomes easier to incrementally add proxying to a
> platform TSM later. In the meantime, platforms and endpoints that
> support CMA / SPDM and PCIe/CXL IDE but not full "trusted I/O" still
> gain incremental benefit.

TSM on the AMD hardware is a PSP firmware and it is going to implement 
all of SPDM/IDE and the only proxying the host kernel will do is PCI DOE.

> The first proof point for that idea is teaching the PCI core to perform
> CMA / SPDM session establishment and provide that result to drivers.
> 
> That is what Lukas has been working on after picking up Jonathan's
> initial SPDM RFC. I expect the discussion on those forthcoming patches
> starts to answer device-model questions around attestation.


Those SPDM patches should work on the AMD hw (as they do not need any 
additional host PCI support) but that's about it - IDE won't be possible 
that way as there is no way to program the IDE keys to PCI RC without 
the PSP.

If we want reuse any of that code to provide 
certificates/measurements/reports for the host kernel, then that will 
need to allow skipping the bits that the firmware implements (SPDM, IDE) 
+ calling the firmware instead. And TDISP is worse as it is based on the 
idea of not trusting the VMM (is there any use for TDISP for the 
host-only config at all?) so such SPDM-enabled linux has to not run KVM.



>> o What does the guest need to know from the device?
>> o How does the attestation workflow work?
>> o Generic vs vendor specific TSMs
>>
>> Some of these topics may be better suited for LPC,
> 
> Maybe, but there's so much to discuss that the more opportunities to
> collaborate on the details the better.
> 
>> however we want to get the discussion going from the KVM perspective
>> and continue wider discussions at LPC.
> 
> While I worry that my points above are more suited to something like a
> PCI Micro-conference than a KVM BoF, I think the nature of "trusted I/O"
> requires those tribes to talk more to each other.

-- 
Alexey


  reply	other threads:[~2023-06-07 23:18 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <c2db1a80-722b-c807-76b5-b8672cb0db09@redhat.com>
2023-06-02 18:04 ` KVM Forum BoF on I/O + secure virtualization Giani, Dhaval
2023-06-06  2:43   ` Dan Williams
2023-06-07 23:18     ` Alexey Kardashevskiy [this message]
2023-06-08  9:12       ` Lukas Wunner
2023-06-08 14:32         ` Kaplan, David

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=d1269899-7e74-f33c-97bf-be0c708d2465@amd.com \
    --to=aik@amd.com \
    --cc=Alexey.Kardashevskiy@amd.com \
    --cc=David.Kaplan@amd.com \
    --cc=Dhaval.Giani@amd.com \
    --cc=Jeremy.Powell@amd.com \
    --cc=atishp04@gmail.com \
    --cc=dan.j.williams@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-coco@lists.linux.dev \
    --cc=lukas@wunner.de \
    --cc=pbonzini@redhat.com \
    --cc=steffen.eiden@ibm.com \
    --cc=suzuki.kp@gmail.com \
    --cc=yilun.xu@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox