Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[6.6]Hygon: CSV3: Support attestation for CSV3 guest #473

Conversation

wojiaohanliyang
Copy link

@wojiaohanliyang wojiaohanliyang commented Nov 14, 2024

When a confidential comupting guest try to communicate with remote entity, the guest should provide attestation report to the remote entity, then the remote entity validate the attestation report to check if the guest is a reliable entity. This patch series support generate attestation report in a Hygon CSV3 guest.

hanliyang added 3 commits November 14, 2024 14:31
hygon inclusion
category: feature
CVE: NA

---------------------------

Add definition of ATTESTATION secure call command and error codes of
the secure call.

Add struct csv_guest_user_data_attestation to support communicate
between user-space and kernel-space.

Add struct csv3_data_attestation_report to support communicate between
X86 and PSP.

Signed-off-by: hanliyang <[email protected]>
hygon inclusion
category: feature
CVE: NA

---------------------------

Expose the function to modules so that user can get attestation report
of CSV3 guest through ioctl interface.

It's suggested that the user make use of the ioctl interface of the
module csv-guest.

Signed-off-by: hanliyang <[email protected]>
hygon inclusion
category: feature
CVE: NA

---------------------------

This change allows user in the CSV3 guest to get attestation report.

Currently, the input from user-space for CSV3 attestation report is
same as that for CSV attestation report.

Signed-off-by: hanliyang <[email protected]>
@deepin-ci-robot
Copy link

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign avenger-285714 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@deepin-ci-robot
Copy link

Hi @wojiaohanliyang. Thanks for your PR.

I'm waiting for a deepin-community member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@opsiff opsiff merged commit d1c1ff5 into deepin-community:linux-6.6.y Nov 15, 2024
2 of 4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants