From: Dorjoy Chowdhury <dorjoychy111@gmail.com>
To: "Daniel P. Berrangé" <berrange@redhat.com>
Cc: qemu-devel@nongnu.org, graf@amazon.com, agraf@csgraf.de,
stefanha@redhat.com, pbonzini@redhat.com, slp@redhat.com,
richard.henderson@linaro.org, eduardo@habkost.net,
mst@redhat.com, marcel.apfelbaum@gmail.com, philmd@linaro.org
Subject: Re: [PATCH v4 4/6] machine/nitro-enclave: Add built-in Nitro Secure Module device
Date: Thu, 22 Aug 2024 21:14:28 +0600 [thread overview]
Message-ID: <CAFfO_h6KZ65e3AVE7+giTVhxOWcOnAgLMgp54LsJjjvSnutpew@mail.gmail.com> (raw)
In-Reply-To: <ZsMgcUtCvXqbYigI@redhat.com>
Hi Daniel,
On Mon, Aug 19, 2024 at 4:37 PM Daniel P. Berrangé <berrange@redhat.com> wrote:
>
> On Sun, Aug 18, 2024 at 05:42:55PM +0600, Dorjoy Chowdhury wrote:
> > AWS Nitro Enclaves have built-in Nitro Secure Module (NSM) device which
> > is used for stripped down TPM functionality like attestation. This commit
> > adds the built-in NSM device in the nitro-enclave machine type.
> >
> > In Nitro Enclaves, all the PCRs start in a known zero state and the first
> > 16 PCRs are locked from boot and reserved. The PCR0, PCR1, PCR2 and PCR8
> > contain the SHA384 hashes related to the EIF file used to boot the
> > VM for validation.
> >
> > Some optional nitro-enclave machine options have been added:
> > - 'id': Enclave identifier, reflected in the module-id of the NSM
> > device. If not provided, a default id will be set.
> > - 'parent-role': Parent instance IAM role ARN, reflected in PCR3
> > of the NSM device.
> > - 'parent-id': Parent instance identifier, reflected in PCR4 of the
> > NSM device.
> >
> > Signed-off-by: Dorjoy Chowdhury <dorjoychy111@gmail.com>
> > ---
> > crypto/meson.build | 2 +-
> > crypto/x509-utils.c | 73 +++++++++++
> > include/crypto/x509-utils.h | 22 ++++
>
> Preferrably add these 3 in a standlone commit, since its is good practice
> to separate commits adding infra, from commits adding usage of infra.
>
> > hw/core/eif.c | 225 +++++++++++++++++++++++++++++---
> > hw/core/eif.h | 5 +-
> > hw/core/meson.build | 4 +-
> > hw/i386/Kconfig | 1 +
> > hw/i386/nitro_enclave.c | 141 +++++++++++++++++++-
> > include/hw/i386/nitro_enclave.h | 26 ++++
> > 9 files changed, 479 insertions(+), 20 deletions(-)
> > create mode 100644 crypto/x509-utils.c
> > create mode 100644 include/crypto/x509-utils.h
> >
[...]
> > +
> > + /* First 16 PCRs are locked from boot and reserved for nitro enclave */
> > + for (int i = 0; i < 16; ++i) {
> > + ne_state->vnsm->lock_pcr(ne_state->vnsm, i);
> > + }
>
> Worth NITRO_PCR_MAX constant ?
>
I kept the 16 for now.
> > static void nitro_enclave_machine_initfn(Object *obj)
> > {
> > MicrovmMachineState *mms = MICROVM_MACHINE(obj);
> > X86MachineState *x86ms = X86_MACHINE(obj);
> > + NitroEnclaveMachineState *nems = NITRO_ENCLAVE_MACHINE(obj);
> > +
> > + nems->id = g_strdup("i-234-enc5678");
>
> Is this some magic string that the Nitro spec requires ? If so, probably
> worth a #define constant for it with a comment about rationale.
>
It's just some default we provide, not related to Nitro spec. So kept
it as is for now.
Regards,
Dorjoy
next prev parent reply other threads:[~2024-08-22 15:14 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-08-18 11:42 [PATCH v4 0/6] AWS Nitro Enclave emulation support Dorjoy Chowdhury
2024-08-18 11:42 ` [PATCH v4 1/6] machine/nitro-enclave: New machine type for AWS Nitro Enclaves Dorjoy Chowdhury
2024-08-18 11:42 ` [PATCH v4 2/6] machine/nitro-enclave: Add vhost-user-vsock device Dorjoy Chowdhury
2024-08-18 11:42 ` [PATCH v4 3/6] device/virtio-nsm: Support for Nitro Secure Module device Dorjoy Chowdhury
2024-08-19 9:14 ` Alexander Graf
2024-08-19 10:48 ` Daniel P. Berrangé
2024-08-18 11:42 ` [PATCH v4 4/6] machine/nitro-enclave: Add built-in " Dorjoy Chowdhury
2024-08-19 10:13 ` Alexander Graf
2024-08-19 15:28 ` Dorjoy Chowdhury
2024-08-19 15:58 ` Alexander Graf
2024-08-19 16:12 ` Dorjoy Chowdhury
2024-08-19 15:32 ` Dorjoy Chowdhury
2024-08-19 15:53 ` Daniel P. Berrangé
2024-08-19 16:07 ` Dorjoy Chowdhury
2024-08-19 16:10 ` Daniel P. Berrangé
2024-08-19 16:14 ` Dorjoy Chowdhury
2024-08-21 13:39 ` Dorjoy Chowdhury
2024-08-19 10:37 ` Daniel P. Berrangé
2024-08-22 15:14 ` Dorjoy Chowdhury [this message]
2024-08-18 11:42 ` [PATCH v4 5/6] crypto: Support SHA384 hash when using glib Dorjoy Chowdhury
2024-08-19 10:16 ` Daniel P. Berrangé
2024-08-18 11:42 ` [PATCH v4 6/6] docs/nitro-enclave: Documentation for nitro-enclave machine type Dorjoy Chowdhury
2024-08-22 15:19 ` [PATCH v4 0/6] AWS Nitro Enclave emulation support Dorjoy Chowdhury
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAFfO_h6KZ65e3AVE7+giTVhxOWcOnAgLMgp54LsJjjvSnutpew@mail.gmail.com \
--to=dorjoychy111@gmail.com \
--cc=agraf@csgraf.de \
--cc=berrange@redhat.com \
--cc=eduardo@habkost.net \
--cc=graf@amazon.com \
--cc=marcel.apfelbaum@gmail.com \
--cc=mst@redhat.com \
--cc=pbonzini@redhat.com \
--cc=philmd@linaro.org \
--cc=qemu-devel@nongnu.org \
--cc=richard.henderson@linaro.org \
--cc=slp@redhat.com \
--cc=stefanha@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).