From: "Dr. David Alan Gilbert" <dgilbert@redhat.com>
To: Brijesh Singh <brijesh.singh@amd.com>
Cc: Dov Murik <dovmurik@linux.ibm.com>,
linux-efi@vger.kernel.org,
Tobin Feldman-Fitzthum <tobin@linux.ibm.com>,
Tobin Feldman-Fitzthum <tobin@ibm.com>,
Jim Cadden <jcadden@ibm.com>,
James Bottomley <jejb@linux.ibm.com>,
Hubertus Franke <frankeh@us.ibm.com>,
Mike Rapoport <rppt@linux.ibm.com>,
Laszlo Ersek <lersek@redhat.com>,
Ashish Kalra <ashish.kalra@amd.com>,
Tom Lendacky <thomas.lendacky@amd.com>,
Ard Biesheuvel <ardb@kernel.org>,
James Morris <jmorris@namei.org>,
"Serge E. Hallyn" <serge@hallyn.com>,
ak@linux.intel.com, linux-security-module@vger.kernel.org,
linux-kernel@vger.kernel.org
Subject: Re: [RFC PATCH 0/3] Allow access to confidential computing secret area
Date: Thu, 20 May 2021 11:56:17 +0100 [thread overview]
Message-ID: <YKZAUdbikp2Pt0XV@work-vm> (raw)
In-Reply-To: <2c8ae998-6dd0-bcb9-f735-e90da05ab9d9@amd.com>
* Brijesh Singh (brijesh.singh@amd.com) wrote:
> Hi Dov,
>
>
> On 5/13/21 1:26 AM, Dov Murik wrote:
> > Confidential computing hardware such as AMD SEV (Secure Encrypted
> > Virtualization) allows guest owners to inject secrets into the VMs
> > memory without the host/hypervisor being able to read them. In SEV,
> > secret injection is performed early in the VM launch process, before the
> > guest starts running.
> >
> > Support for secret injection is already available in OVMF (in its AmdSev
> > package; see edk2 commit 01726b6d23d4 "OvmfPkg/AmdSev: Expose the Sev
> > Secret area using a configuration table" [1]), but the secrets were not
> > available in the guest kernel.
> >
> > The patch series copies the secrets from the EFI-provided memory to
> > kernel reserved memory, and optionally exposes them to userspace via
> > securityfs using a new sev_secret kernel module.
> >
> > The first patch in efi/libstub copies the secret area from the EFI
> > memory to specially allocated memory; the second patch reserves that
> > memory block; and the third patch introduces the new sev_secret module
> > that exposes the content of the secret entries as securityfs files.
> >
> > This has been tested with AMD SEV guests, but the kernel side of
> > handling the secret area has no SEV-specific dependencies, and therefore
> > should be usable for any confidential computing hardware that can
> > publish the secret area via the standard EFI config table entry.
> >
> > Here is a simple example for usage of the sev_secret module in a guest to which
> > secrets were injected during launch:
> >
> > # modprobe sev_secret
> > # ls -la /sys/kernel/security/sev_secret
> > total 0
> > drwxr-xr-x 2 root root 0 May 12 18:03 .
> > drwxr-xr-x 3 root root 0 May 12 18:02 ..
> > -r--r----- 1 root root 0 May 12 18:03 736870e5-84f0-4973-92ec-06879ce3da0b
> > -r--r----- 1 root root 0 May 12 18:03 83c83f7f-1356-4975-8b7e-d3a0b54312c6
> > -r--r----- 1 root root 0 May 12 18:03 9553f55d-3da2-43ee-ab5d-ff17f78864d2
> > -r--r----- 1 root root 0 May 12 18:03 e6f5a162-d67f-4750-a67c-5d065f2a9910
> >
> > # xxd /sys/kernel/security/sev_secret/e6f5a162-d67f-4750-a67c-5d065f2a9910
> > 00000000: 7468 6573 652d 6172 652d 7468 652d 6b61 these-are-the-ka
> > 00000010: 7461 2d73 6563 7265 7473 0001 0203 0405 ta-secrets......
> > 00000020: 0607 ..
>
> I am adding a new virt driver to help get the attestation report for the
> SEV-SNP guest. I understand they both are different, in case of the SEV
> the attestation is already completed and we are simply exposing the
> secret provided after the attestation to the userspace, whereas in SNP,
> the userspace is querying the attestation and will probably derive keys
> etc based on the attestation report. I am wondering if we should merge
> both the SEV secret and SNP attestation query in a single driver ?
> Should we cover usecases where SEV guest is not booted under the EFI ?
> Also, it appears that this driver need to be manually loaded, should we
> create a platform device so that the driver binds to platform device and
> use the resource structure to find the location of the secret data?
The nice thing about Dov's device/file is that it's a simple text file
that userspace can then read the secret out of; I'm not sure if there's
anything similar in SNP (or for that matter TDX, cc'ing in Andi)
Dave
> I was trying to answer some of these questions SNP series. See these patches
>
> https://marc.info/?l=kvm&m=161978514019741&w=2
>
> https://marc.info/?l=kvm&m=161978514119744&w=2
>
> https://marc.info/?l=kvm&m=161978514219751&w=2
>
>
> >
> > [1] https://github.com/tianocore/edk2/commit/01726b6d23d4
> >
> >
> > Cc: Laszlo Ersek <lersek@redhat.com>
> > Cc: Ashish Kalra <ashish.kalra@amd.com>
> > Cc: Brijesh Singh <brijesh.singh@amd.com>
> > Cc: Tom Lendacky <thomas.lendacky@amd.com>
> > Cc: James Bottomley <jejb@linux.ibm.com>
> > Cc: Ard Biesheuvel <ardb@kernel.org>
> > Cc: James Morris <jmorris@namei.org>
> > Cc: "Serge E. Hallyn" <serge@hallyn.com>
> > Cc: linux-efi@vger.kernel.org
> > Cc: linux-security-module@vger.kernel.org
> > Cc: linux-kernel@vger.kernel.org
> >
> > Dov Murik (3):
> > efi/libstub: Copy confidential computing secret area
> > efi: Reserve confidential computing secret area
> > virt: Add sev_secret module to expose confidential computing secrets
> >
> > drivers/firmware/efi/Makefile | 2 +-
> > drivers/firmware/efi/confidential-computing.c | 41 +++
> > drivers/firmware/efi/efi.c | 5 +
> > drivers/firmware/efi/libstub/Makefile | 3 +-
> > .../efi/libstub/confidential-computing.c | 68 +++++
> > drivers/firmware/efi/libstub/efi-stub.c | 2 +
> > drivers/firmware/efi/libstub/efistub.h | 2 +
> > drivers/firmware/efi/libstub/x86-stub.c | 2 +
> > drivers/virt/Kconfig | 2 +
> > drivers/virt/Makefile | 1 +
> > drivers/virt/sev_secret/Kconfig | 11 +
> > drivers/virt/sev_secret/Makefile | 2 +
> > drivers/virt/sev_secret/sev_secret.c | 260 ++++++++++++++++++
> > include/linux/efi.h | 11 +
> > 14 files changed, 410 insertions(+), 2 deletions(-)
> > create mode 100644 drivers/firmware/efi/confidential-computing.c
> > create mode 100644 drivers/firmware/efi/libstub/confidential-computing.c
> > create mode 100644 drivers/virt/sev_secret/Kconfig
> > create mode 100644 drivers/virt/sev_secret/Makefile
> > create mode 100644 drivers/virt/sev_secret/sev_secret.c
> >
> >
> > base-commit: c06a2ba62fc401b7aaefd23f5d0bc06d2457ccc1
--
Dr. David Alan Gilbert / dgilbert@redhat.com / Manchester, UK
next prev parent reply other threads:[~2021-05-20 10:59 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-05-13 6:26 [RFC PATCH 0/3] Allow access to confidential computing secret area Dov Murik
2021-05-13 6:26 ` [RFC PATCH 3/3] virt: Add sev_secret module to expose confidential computing secrets Dov Murik
2021-05-14 13:01 ` [RFC PATCH 0/3] Allow access to confidential computing secret area Brijesh Singh
2021-05-20 10:38 ` Dov Murik
2021-05-20 10:56 ` Dr. David Alan Gilbert [this message]
2021-05-20 22:02 ` Andi Kleen
2021-05-21 15:56 ` Brijesh Singh
2021-05-21 16:03 ` James Bottomley
2021-05-21 16:21 ` Brijesh Singh
2021-05-21 16:41 ` Andi Kleen
2021-05-24 12:08 ` Dr. David Alan Gilbert
2021-05-24 15:35 ` James Bottomley
2021-05-24 16:31 ` Andi Kleen
2021-05-24 17:12 ` James Bottomley
2021-06-08 19:48 ` Dov Murik
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=YKZAUdbikp2Pt0XV@work-vm \
--to=dgilbert@redhat.com \
--cc=ak@linux.intel.com \
--cc=ardb@kernel.org \
--cc=ashish.kalra@amd.com \
--cc=brijesh.singh@amd.com \
--cc=dovmurik@linux.ibm.com \
--cc=frankeh@us.ibm.com \
--cc=jcadden@ibm.com \
--cc=jejb@linux.ibm.com \
--cc=jmorris@namei.org \
--cc=lersek@redhat.com \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=rppt@linux.ibm.com \
--cc=serge@hallyn.com \
--cc=thomas.lendacky@amd.com \
--cc=tobin@ibm.com \
--cc=tobin@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).