From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f42.google.com (mail-wr1-f42.google.com [209.85.221.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D7DF718E039 for ; Tue, 20 Aug 2024 13:19:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.42 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724159947; cv=none; b=chWjULytgplFPPP/iUamZQhmXcZKxz0nqlu5qheHSiO+flwPaXtuAGqXqRT3UfyClh4CLRA2tjkN/orx+v7+EmFFj9VdMTNge49LIPjZ7CFN+6v4iXvD7vLwm1f083ZLkF2SQg+OAp4tKNvuclMg60y4XPkRwLyCwAyAVC6jjh0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724159947; c=relaxed/simple; bh=jwzNwqi23bxpGTQU9W6ZKRunMeDE8ltL7X3DcNiGD08=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=a1+ytMJHfFTx6iOuoWof8z/fYwaFqCvNrf2F7Wjopni3m87FrIIWTjmWsXer8Cl1XJnthu6R5D+0jwZtOeArwhmAAE3KN1gbrs0tr/ggwRFeeIn0dfzHPCxBZxMloy+moi4R5kaMVgi56WiL1fogu4/FHjUZkZQJV6RSVT0FVvQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=rivosinc.com; spf=pass smtp.mailfrom=rivosinc.com; dkim=pass (2048-bit key) header.d=rivosinc-com.20230601.gappssmtp.com header.i=@rivosinc-com.20230601.gappssmtp.com header.b=VaqX5BMc; arc=none smtp.client-ip=209.85.221.42 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=rivosinc.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=rivosinc.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=rivosinc-com.20230601.gappssmtp.com header.i=@rivosinc-com.20230601.gappssmtp.com header.b="VaqX5BMc" Received: by mail-wr1-f42.google.com with SMTP id ffacd0b85a97d-371a92d8c90so1798837f8f.3 for ; Tue, 20 Aug 2024 06:19:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rivosinc-com.20230601.gappssmtp.com; s=20230601; t=1724159944; x=1724764744; darn=vger.kernel.org; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date:from:to :cc:subject:date:message-id:reply-to; bh=4jr0wUUNxuwMBzuuDz03CQuikwyocGytAf7u+HScwAk=; b=VaqX5BMce30MAFKZMSIUdZGRfh2aaU6qSWbGXoBTdglRMs4DPfGmZ7Ed93CxhvdS7y ZDcVPxmR35R2CXYLHQYKNAADd3iMWZ6nEzTRpxlRDbT4o3cVq+t79WDtNSIXu+Q0hxhb YtyQsSHJptYrtmfTP9ErEsSCtg9/cEaPUCXRm1es/FH4Zr5oQvxUHBWqbUkb477EkqUc beThQCWA++oapmXOJnPYkyDA1deESMKuBhCD+9TOCaUfC3H6dBHSv/K0h2YsSNHcgvlx pc0c2AwSvrjGWROZ9QKJyihmIdtKRFpBQFUYPTugmJTPLg73z4z+Q4yHvcQQ0Xj4TIov qnpw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1724159944; x=1724764744; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=4jr0wUUNxuwMBzuuDz03CQuikwyocGytAf7u+HScwAk=; b=TD6+5cyQYQaOCeQn6W4aKKzfLSuLSQB4X/4pDui9jGTsc1ivAVavTinIUGJX0D6kSw YmVALfb+SxRgSgEzAeUsaxND+kiGTun7/gDfq3O/e0hQqaXLPsvPSmUPCPwcxGxUTz1C BaeT2FcxyFjaJlaE2jOIumCVOys+L6zA7xPBuRZeVcoazcOCln0xzcIQv3OYTRyvEaa0 PO71Z4flLBf788J8GHvHcbsGMABuG3VvKzeWKCaPNNQdEGBA54MzjGWZTCgwq5VIjx9R q7T7NatJzYaAUgi2s8wcmn2RIAXjpYbAjLZACb9VrGC7tiepnkMe6vhvX1NOIO/nuIUL e0xg== X-Forwarded-Encrypted: i=1; AJvYcCWI6jp45K59YlnwEON9UYCRny7erjq36nIskp3qM9cuC7Y0rDEix9Q++OIQtD75cI7S63+KK0+FnIE6flERxX7FjcNQSbaQNta/B0nNqly9 X-Gm-Message-State: AOJu0Yy8eXh+E7G2lSdgs+91bjcbeCMhP9xq9x4LBWuyiVxYp/ATsTcj WkQb3bH/vpUkbfwz7094PAJKyCKuxMoLADmZN4gPx6DfloFL6gVGyCityTWXFL4= X-Google-Smtp-Source: AGHT+IHjT9qAO+emW/POSF1qBJZ0ZFLKI59tqUdczr2XqRvddNqHnQb3poFA0SPeVno3u8Z7Ce50uA== X-Received: by 2002:adf:e552:0:b0:368:7f8c:1b38 with SMTP id ffacd0b85a97d-37194655c7emr7988293f8f.30.1724159943777; Tue, 20 Aug 2024 06:19:03 -0700 (PDT) Received: from vermeer.tail79c99.ts.net ([2a01:cb1d:81a9:dd00:b570:b34c:ffd4:c805]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-3718983a0eesm13242280f8f.1.2024.08.20.06.19.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 20 Aug 2024 06:19:03 -0700 (PDT) Date: Tue, 20 Aug 2024 15:19:00 +0200 From: Samuel Ortiz To: Qinkun Bao Cc: Dan Williams , Kuppuswamy Sathyanarayanan , "Yao, Jiewen" , "Xing, Cedric" , biao.lu@intel.com, James Bottomley , linux-coco@lists.linux.dev, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, Vishal Annapurve , Chong Cai , Dan Middleton , Alex Crisan Subject: Re: [RFC PATCH v2 0/4] tsm: Runtime measurement registers ABI Message-ID: References: <20240128212532.2754325-1-sameo@rivosinc.com> <6DEAEC08-420C-46A9-8877-EBF60331A931@google.com> Precedence: bulk X-Mailing-List: linux-integrity@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <6DEAEC08-420C-46A9-8877-EBF60331A931@google.com> Qinkun, I am working on a adding a patch that generates and exports a CEL, but this takes longer than I was hoping for, mostly due to a lack of bandwidth on my side. I will send a PoC for this as soon as I can, and folks can improve it from there. Cheers, Samuel. On Mon, Aug 19, 2024 at 02:25:15PM -0700, Qinkun Bao wrote: > A gentle ping on this email thread. We have tested the patch series [1] and will release a product based on the patch series. > > If the patch series can not get upstreamed, the whole confidential computing community can not have a way to measure the workload with RTMRs. Without the patch, RTMR3 is completely unused. The patch works perfectly for our usage case (Like the existing TPM ABI, the raw measurement is taken instead of recording the log entry.). Assuming RTMR serves as an alternative to TPM-based measurement, migrating existing software to the RTMR could be greatly simplified by developing an ABI that resembles the TPM. > > I don’t object to having an ABI to take the log entry. For our usage case, we use the Canonical event log [2] to measure the workload. I do think that we should NOT block the patch series for several months to solve an issue that TPM can not solve. > > Link: > [1] https://lore.kernel.org/lkml/20240128212532.2754325-1-sameo@rivosinc.com/ > [2] https://trustedcomputinggroup.org/resource/canonical-event-log-format/