linux-coco.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
From: James Bottomley <jejb@linux.ibm.com>
To: Tom Lendacky <thomas.lendacky@amd.com>, linux-coco@lists.linux.dev
Subject: Re: [RFC 0/3] Enlightened vTPM support for SVSM on SEV-SNP
Date: Wed, 04 Jan 2023 17:59:58 -0500	[thread overview]
Message-ID: <57f57492540f1cad4a677bb5fb96183ce8847306.camel@linux.ibm.com> (raw)
In-Reply-To: <93bb47b9-4381-469b-b02e-6e494d0c189c@amd.com>

On Wed, 2023-01-04 at 16:44 -0600, Tom Lendacky wrote:
> How should we indicate when cancellation or locality support is
> available? Should there just be a protocol call ID that returns a
> bitmap of supported command values (e.g.: bit 8 would be set for
> TPM_SEND_COMMAND) and a bitmap of supported features?

I'm not sure anyone will ever care about cancellation.  There are only
two cancellable points in the entire MS TPM implementation; one is in
CryptRsa to abort the prime search and the other is in
CryptEccCommitCompute.  On a full power CPU system you're unlikely ever
to be able to signal a cancellation in time for it to be meaningfully
useful.

Discovery for all the commands bar locality is simply they return -
EINVAL if you try to invoke them in the SVSM when they're not
implemented (that's an extension to the MSSIM protocol).

Locality can't simply be added, it needs someone to come up with the
actual locality properties and for the SVSM to police them.  Presumably
discovery would be part of that exercise.

James


  reply	other threads:[~2023-01-04 23:00 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-01-03 21:01 [RFC 0/3] Enlightened vTPM support for SVSM on SEV-SNP James Bottomley
2023-01-03 21:02 ` [RFC 1/3] tpm: add generic platform device James Bottomley
2023-01-05  8:08   ` Dov Murik
2023-01-05 12:28     ` James Bottomley
2023-01-03 21:04 ` [RFC 2/2] x86/sev: add a SVSM vTPM " James Bottomley
2023-01-03 21:05 ` [RFC 3/3] edk2: Add SVSM based vTPM James Bottomley
2023-01-04 22:44 ` [RFC 0/3] Enlightened vTPM support for SVSM on SEV-SNP Tom Lendacky
2023-01-04 22:59   ` James Bottomley [this message]
2024-11-06 11:19 ` Stefano Garzarella
2024-11-06 14:54   ` James Bottomley
2024-11-06 15:33     ` Stefano Garzarella

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=57f57492540f1cad4a677bb5fb96183ce8847306.camel@linux.ibm.com \
    --to=jejb@linux.ibm.com \
    --cc=linux-coco@lists.linux.dev \
    --cc=thomas.lendacky@amd.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).