Linux Confidential Computing Development
 help / color / mirror / Atom feed
From: Dan Williams <dan.j.williams@intel.com>
To: Linus Torvalds <torvalds@linux-foundation.org>,
	<dan.j.williams@intel.com>
Cc: <linux-coco@lists.linux.dev>, <linux-kernel@vger.kernel.org>
Subject: Re: [GIT PULL] Trusted Security Manager (TSM) updates for 6.16
Date: Thu, 29 May 2025 23:23:53 -0700	[thread overview]
Message-ID: <68394ef8f2b36_3e701007d@dwillia2-xfh.jf.intel.com.notmuch> (raw)
In-Reply-To: <CAHk-=whjvmBiZ=oMnR-R9rqzEPnGCaU7dNLkY1RHXwjRCAR5YQ@mail.gmail.com>

Linus Torvalds wrote:
> On Thu, 29 May 2025 at 17:59, <dan.j.williams@intel.com> wrote:
> >
> > ...to receive shared infrastructure updates for confidential computing.
> 
> Do we have a sane name for this? The pull request calls it "TSM" and
> writes it out as "trusted security manager", your intro calls it
> "shared infrastructure updates for confidential computing", and the
> MAINTAINER entry calls it "trusted security module" (note the
> different word for the 'M').
> 
> Making things even worse, Intel also uses "TSM", but in Intel docs,
> the "T" stands not for "Trusted", but for "TEE", which in turn is a
> recursive TLA meaning "Trusted Execution Environment".
> 
> Yes, I've complained about odd TLA's before, but TSM really takes the
> odd to a new level.
> 
> I've pulled this, and I've used "TSM" in the pull message, but I
> really think this TLA disease needs to end.
> 
> Let's have a rule that TLA's are ok _only_ for things that
> 
>  (a) go back at least four decades
> 
>  (b) have a basically unambiguous meaning in the industry (let's
> ignore IBM that made up their own naming)
> 
>  (c) when you google them, they give relevant results
> 
> So, for example, talking about a "TLB" entry is ok by all three rules,
> and a TTY is similarly not a bad word.
> 
> "TSM" fulfills _none_ of these.
> 
> Please? I know you work for Intel and you probably signed some
> paperwork saying that a certain percentage of words you use have to be
> TLA's, but please ... We can do better.

Intel TLA disease is real.

Also, it is funny, in a sad way, because some of these patches
originated in a series where I spend some paragraphs explaining the
absolute silliness of the acronym soup in this space [1], but then here
failed to respect that "TSM" continues to be close to useless as search
engines fail to find it.

I note that "TSM" is used in the new "security protocol" sections of the
PCIe specification. However, that specification being a members-only
accessible document does not help at all with the discoverability
problem.

Suffice to say "TSM" is the term the PCIe specifications ascribes to all
of the various architecture specific firmware/firmware-ish modules
(Intel TDX, AMD SEV, RISC-V COVE, ARM CCA...) that can touch the "secure
world" of the platform. I.e. setup confidential memory MMU or IOMMU
ptes, and talk the PCIe protocols to setup link encryption between host
bridges and Endpoints.

...but unless and until that becomes wider knowledge I agree that it
should be spelled out with references to where the heck it comes from
and quick reminder of what it is [2].

[1]: https://lore.kernel.org/all/173343739517.1074769.13134786548545925484.stgit@dwillia2-xfh.jf.intel.com/

[2]: PCIe r6.2 Section 11:
     "The TEE Security Manager (TSM) is a logical entity in a host that
      is in the Trusted Computing Base (TCB) for a Trusted Execution
      Environment Virtual Machine (TVM) and enforces security policies
      on the host."

  reply	other threads:[~2025-05-30  6:24 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-05-30  0:59 [GIT PULL] Trusted Security Manager (TSM) updates for 6.16 dan.j.williams
2025-05-30  1:05 ` dan.j.williams
2025-05-30  4:34 ` Linus Torvalds
2025-05-30  6:23   ` Dan Williams [this message]
2025-05-30  5:25 ` pr-tracker-bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=68394ef8f2b36_3e701007d@dwillia2-xfh.jf.intel.com.notmuch \
    --to=dan.j.williams@intel.com \
    --cc=linux-coco@lists.linux.dev \
    --cc=linux-kernel@vger.kernel.org \
    --cc=torvalds@linux-foundation.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox