Skip to content
  • Brijesh Singh's avatar
    KVM/SVM: add support for SEV attestation command · 2c07ded0
    Brijesh Singh authored
    
    
    The SEV FW version >= 0.23 added a new command that can be used to query
    the attestation report containing the SHA-256 digest of the guest memory
    encrypted through the KVM_SEV_LAUNCH_UPDATE_{DATA, VMSA} commands and
    sign the report with the Platform Endorsement Key (PEK).
    
    See the SEV FW API spec section 6.8 for more details.
    
    Note there already exist a command (KVM_SEV_LAUNCH_MEASURE) that can be
    used to get the SHA-256 digest. The main difference between the
    KVM_SEV_LAUNCH_MEASURE and KVM_SEV_ATTESTATION_REPORT is that the latter
    can be called while the guest is running and the measurement value is
    signed with PEK.
    
    Cc: James Bottomley <jejb@linux.ibm.com>
    Cc: Tom Lendacky <Thomas.Lendacky@amd.com>
    Cc: David Rientjes <rientjes@google.com>
    Cc: Paolo Bonzini <pbonzini@redhat.com>
    Cc: Sean Christopherson <seanjc@google.com>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: John Allen <john.allen@amd.com>
    Cc: Herbert Xu <herbert@gondor.apana.org.au>
    Cc: linux-crypto@vger.kernel.org
    Reviewed-by: default avatarTom Lendacky <thomas.lendacky@amd.com>
    Acked-by: default avatarDavid Rientjes <rientjes@google.com>
    Tested-by: default avatarJames Bottomley <jejb@linux.ibm.com>
    Signed-off-by: default avatarBrijesh Singh <brijesh.singh@amd.com>
    Message-Id: <20210104151749.30248-1-brijesh.singh@amd.com>
    Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
    2c07ded0