Skip to content

Commit

Permalink
specification: Explicitly call out the unbinding flows
Browse files Browse the repository at this point in the history
And refer to the threat model from the high level device and interface
lifecycle section.

Fixes #89

Signed-off-by: Samuel Ortiz <[email protected]>
  • Loading branch information
sameo committed Apr 16, 2024
1 parent 5a1ae45 commit 99b88cb
Showing 1 changed file with 10 additions and 1 deletion.
11 changes: 10 additions & 1 deletion specification/07-theory_operations.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -561,7 +561,7 @@ host supervisor domain manager may bind a TDI and a TVM together, through the
1. The host supervisor domain manager initiates the interface binding flow by
having the TSM move the TDI into the TDISP `CONFIG_LOCKED` state. This is
achieved through the `sbi_covh_bind_interface()` `COVH` ABI.
2. The TVM xref:_tdi_acceptation[verifies and accepts the locked TDI] into its
2. The TVM xref:tdi-acceptation[verifies and accepts the locked TDI] into its
TCB.
3. The TVM asks the TSM to move the TDI to the TDISP `RUN` state, by calling the
`sbi_covg_start_interface()` `COVG` ABI.
Expand Down Expand Up @@ -893,6 +893,15 @@ compromising any TVM confidential assets.
As the platform resources owner, the host supervisor domain manager can assign
a TDI to a TVM by binding them together (step 3). At any point in time, it can
reclaim that physical resource by unbinding (step 8a) it from its TVM.
Graceful and explicit unbinding through the `COVH` ABI will clear all
confidential data and abort any outstanding DMA requests, as described in the
xref:interface-unbinding[Interface Unbinding] section. Implicit TDI unbinding,
i.e. attempts from the host supervisor domain manager to reclaim and remap a
TDI without explicitly notifying the corresponding TSM, represents a security
threat that is in the
xref:05-security_model.adoc#security-model[CoVE-IO threat model] scope. In that
situation, both the DSM and the TSM must protect the confidentiality and
integrity of the TVM assets.

Before binding a TDI and a TVM together, the host supervisor domain manager must
first require the TSM to connect (step 1) to the physical device through secured
Expand Down

0 comments on commit 99b88cb

Please sign in to comment.