[SLOF] [PATCH 00/16] Add vTPM support to SLOF

Stefan Berger stefanb at us.ibm.com
Fri Aug 14 10:22:17 AEST 2015


David Gibson <david at gibson.dropbear.id.au> wrote on 08/11/2015 10:13:45 
PM:

> From: David Gibson <david at gibson.dropbear.id.au>
> To: Stefan Berger <stefanb at linux.vnet.ibm.com>
> Cc: slof at lists.ozlabs.org, nikunj at linux.vnet.ibm.com, 
> aik at au1.ibm.com, pmac at au1.ibm.com, Tim Block/Rochester/IBM at IBMUS, 
> Stefan Berger/Watson/IBM at IBMUS, Hon c Lo/Poughkeepsie/IBM at IBMUS, 
> George Wilson/Austin/IBM at IBMUS, Dimitrios Pendarakis/Watson/
> IBM at IBMUS, Joy Latten/Austin/IBM at IBMUS
> Date: 08/11/2015 10:41 PM
> Subject: Re: [SLOF] [PATCH 00/16] Add vTPM support to SLOF
> 
> On Mon, Aug 10, 2015 at 06:55:10AM -0400, Stefan Berger wrote:
> > The following series of patches adds TPM support to SLOF.
> > In particular it adds the following:
> > 
> > - TPM drivers for hardware interface and CRQ interface
> > - TPM initialization
> > - TPM logging area and firmware API to transfer it to the OS
> >   (measurements are visible in sysfs)
> > - Some measurement code (Static Core Root Of Trust)
> > - TPM menu (accessible via 't' key during boot if TPM is available)
> > - Firmware API extensions following Power Firmware Doc
> >   (to make trusted grub work)
> > 
> > Necessarily, some of its parts are written in Forth, many are written
> > in 'C'. The extensions are known to work with QEMU for ppc64 running 
Linux.
> > 
> > Patches 4-6 will eventually need to be merged to avoid compiler 
warnings
> > related to unused functions.
> 
> So, your cover letter seems to be missing the single most important
> bit of information:  why is this useful?

The firmware extensions are necessary for initializing the TPM, 
establishing 
a core root of trust for measurements, etc, which is required for systems 
with
an attached TPM. The same is then true for systems with an attached vTPM.

Otherwise having a vTPM attached to a VM provides the following benefits:

- enablement of trusted boot; this allow us to eventually extend the chain 
of trust from the hypervisor to the guests
- enablement of attestation so that one can verify what software is 
running on a machine
- provides TPM functionality to VMs, which includes a standardized 
mechanism to store keys and other blobs
  (Linux trusted keys, GNU TLS's TPM extensions)

Regards,
    Stefan
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/slof/attachments/20150813/9f9e03a2/attachment.html>


More information about the SLOF mailing list