From: Dan Williams <dan.j.williams@intel.com>
To: linux-coco@lists.linux.dev
Cc: Kuppuswamy Sathyanarayanan
<sathyanarayanan.kuppuswamy@linux.intel.com>,
Erdem Aktas <erdemaktas@google.com>,
Peter Zijlstra <peterz@infradead.org>,
Tom Lendacky <thomas.lendacky@amd.com>,
Peter Gonda <pgonda@google.com>, Borislav Petkov <bp@alien8.de>,
Dionna Amalie Glaze <dionnaglaze@google.com>,
Jeremi Piotrowski <jpiotrowski@linux.microsoft.com>,
Thomas Gleixner <tglx@linutronix.de>,
Samuel Ortiz <sameo@rivosinc.com>,
Dionna Glaze <dionnaglaze@google.com>,
Pankaj Gupta <pankaj.gupta@amd.com>,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
Alexey Kardashevskiy <aik@amd.com>,
Andrew Morton <akpm@linux-foundation.org>,
James Bottomley <James.Bottomley@HansenPartnership.com>,
dave.hansen@linux.intel.com, x86@kernel.org
Subject: [PATCH v7 0/7] configfs-tsm: Attestation Report ABI
Date: Thu, 19 Oct 2023 18:16:25 -0700 [thread overview]
Message-ID: <169776458564.1705513.13069337506739791098.stgit@dwillia2-xfh.jf.intel.com> (raw)
Changes since v6 [1]:
- s/sev-guest/sev_guest/ in Documentation (Alexey)
- s/tdx-guest/tdx_guest/ in Documentation (Alexey)
- Check for ops registration in tsm_report_read() (Alexey)
- Reorder declaration of tsm_report_extra_attr and
tsm_report_extra_bin_attrs to make it clear they are supersets of
their "non-extra" versions (Alexey)
- s/ext/extra/ (Alexey)
- Move tsm_report_group declaration closer to its usage (Alexey)
- Convert from int to unsigned int (multiple locations) (Alexey)
- Drop device.h include (Alexey)
- Move SNP_REPORT_INVALID_{PARAM,KEY} definitions to sev_ret_code values
(Alexey)
- Use guid_is_null() and explicit offset and length checks to detect
empty entries (Alexey)
- Replace magic number 64 with a new "SNP_REPORT_USER_DATA_SIZE" name
(Alexey)
- Add warning message for suspicious cases where the certificate table
appears malformed (Alexey)
[1]: http://lore.kernel.org/r/169716323436.984874.9170967990536970455.stgit@dwillia2-xfh.jf.intel.com
---
Merge notes: The feedback has reached a point where the big picture
changes have been made and the last round was into more form and style
cleanups. As for merging I leave it for Dave and Boris to comment. I
am open to sending a pull request, just let me know.
Much thanks to Alexey and Peter for verifying that the certificate table
is being correctly conveyed through the @auxblob attribute, and for all
the review from everyone. I smoke tested these again after the cleanups.
---
Dan Williams (6):
virt: sevguest: Fix passing a stack buffer as a scatterlist target
virt: coco: Add a coco/Makefile and coco/Kconfig
configfs-tsm: Introduce a shared ABI for attestation reports
virt: sevguest: Prep for kernel internal get_ext_report()
mm/slab: Add __free() support for kvfree
virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT
Kuppuswamy Sathyanarayanan (1):
virt: tdx-guest: Add Quote generation support using TSM_REPORTS
Documentation/ABI/testing/configfs-tsm | 82 ++++++
MAINTAINERS | 8 +
arch/x86/coco/tdx/tdx.c | 21 ++
arch/x86/include/asm/shared/tdx.h | 1
arch/x86/include/asm/tdx.h | 2
drivers/virt/Kconfig | 6
drivers/virt/Makefile | 4
drivers/virt/coco/Kconfig | 14 +
drivers/virt/coco/Makefile | 8 +
drivers/virt/coco/sev-guest/Kconfig | 1
drivers/virt/coco/sev-guest/sev-guest.c | 214 ++++++++++++++--
drivers/virt/coco/tdx-guest/Kconfig | 1
drivers/virt/coco/tdx-guest/tdx-guest.c | 229 +++++++++++++++++
drivers/virt/coco/tsm.c | 425 +++++++++++++++++++++++++++++++
include/linux/slab.h | 2
include/linux/tsm.h | 69 +++++
include/uapi/linux/psp-sev.h | 1
include/uapi/linux/sev-guest.h | 4
18 files changed, 1055 insertions(+), 37 deletions(-)
create mode 100644 Documentation/ABI/testing/configfs-tsm
create mode 100644 drivers/virt/coco/Kconfig
create mode 100644 drivers/virt/coco/Makefile
create mode 100644 drivers/virt/coco/tsm.c
create mode 100644 include/linux/tsm.h
base-commit: 6465e260f48790807eef06b583b38ca9789b6072
next reply other threads:[~2023-10-20 1:16 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-20 1:16 Dan Williams [this message]
2023-10-20 1:16 ` [PATCH v7 1/7] virt: sevguest: Fix passing a stack buffer as a scatterlist target Dan Williams
2023-10-20 1:16 ` [PATCH v7 2/7] virt: coco: Add a coco/Makefile and coco/Kconfig Dan Williams
2023-10-20 1:16 ` [PATCH v7 3/7] configfs-tsm: Introduce a shared ABI for attestation reports Dan Williams
2023-10-25 4:14 ` Qinkun Bao
2023-10-25 20:06 ` Dan Williams
2023-10-27 1:30 ` Chong Cai
2023-10-20 1:16 ` [PATCH v7 4/7] virt: sevguest: Prep for kernel internal get_ext_report() Dan Williams
2023-10-20 1:16 ` [PATCH v7 5/7] mm/slab: Add __free() support for kvfree Dan Williams
2023-10-20 1:17 ` [PATCH v7 6/7] virt: sevguest: Add TSM_REPORTS support for SNP_GET_EXT_REPORT Dan Williams
2023-10-20 3:25 ` Alexey Kardashevskiy
2023-10-20 1:17 ` [PATCH v7 7/7] virt: tdx-guest: Add Quote generation support using TSM_REPORTS Dan Williams
2023-10-24 17:08 ` Dan Williams
2023-12-21 1:50 ` Xiaoyao Li
2024-01-08 2:55 ` Kuppuswamy Sathyanarayanan
2024-01-09 2:13 ` Xiaoyao Li
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=169776458564.1705513.13069337506739791098.stgit@dwillia2-xfh.jf.intel.com \
--to=dan.j.williams@intel.com \
--cc=James.Bottomley@HansenPartnership.com \
--cc=aik@amd.com \
--cc=akpm@linux-foundation.org \
--cc=bp@alien8.de \
--cc=dave.hansen@linux.intel.com \
--cc=dionnaglaze@google.com \
--cc=erdemaktas@google.com \
--cc=gregkh@linuxfoundation.org \
--cc=jpiotrowski@linux.microsoft.com \
--cc=linux-coco@lists.linux.dev \
--cc=pankaj.gupta@amd.com \
--cc=peterz@infradead.org \
--cc=pgonda@google.com \
--cc=sameo@rivosinc.com \
--cc=sathyanarayanan.kuppuswamy@linux.intel.com \
--cc=tglx@linutronix.de \
--cc=thomas.lendacky@amd.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).