From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9A174C4167B for ; Tue, 5 Dec 2023 20:06:58 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 195886B009A; Tue, 5 Dec 2023 15:06:58 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 11F616B009B; Tue, 5 Dec 2023 15:06:58 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EB36D6B009C; Tue, 5 Dec 2023 15:06:57 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id DB90B6B009A for ; Tue, 5 Dec 2023 15:06:57 -0500 (EST) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id BB939160288 for ; Tue, 5 Dec 2023 20:06:57 +0000 (UTC) X-FDA: 81533848074.07.B8BF12F Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) by imf17.hostedemail.com (Postfix) with ESMTP id 2748440023 for ; Tue, 5 Dec 2023 20:06:53 +0000 (UTC) Authentication-Results: imf17.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Jdv2Wd5o; spf=pass (imf17.hostedemail.com: domain of dan.j.williams@intel.com designates 192.198.163.7 as permitted sender) smtp.mailfrom=dan.j.williams@intel.com; dmarc=pass (policy=none) header.from=intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1701806814; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=PIs+1DbSuB+l0FIbWtOWxxpV3Bjnvv0DUIP3OoUvrJc=; b=6XaLvSf1wyj3e2zD7dVxfMYY7MnddUg+1J7nI4USoM/gtW2s9JobzM0oImlTGxvzx2Zw0A G+BopB6XFANJQafaLHQdKprNOJsOrqVeriPQW2g0k0sfl8aLehTnAwEdouvqagp10ghm7G SqqDNiYkSppT21Z0Y1PtwWaNDfm2pGg= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1701806814; a=rsa-sha256; cv=fail; b=J8PZ7a2IM2cixO7mCIe+DSANnlXO6l6uwsV1hfOv0lN6ndYfxIW/Udu5P5cuVqhQF3YM8U xCbjeIs43bn0Wz4iJ7P3xPlwMCCIDNjgSAtxfHJk94JYtSDEfQCLEH0ZTY2MiO8QjuN2AS j89qD6wy176pqYwPr09yryMfpM1gRhQ= ARC-Authentication-Results: i=2; imf17.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Jdv2Wd5o; spf=pass (imf17.hostedemail.com: domain of dan.j.williams@intel.com designates 192.198.163.7 as permitted sender) smtp.mailfrom=dan.j.williams@intel.com; dmarc=pass (policy=none) header.from=intel.com; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1701806814; x=1733342814; h=date:from:to:cc:subject:message-id:references: in-reply-to:mime-version; bh=2yxEZa4DBCf93II3k1pKkeoz4uIA2S0IS5QgfVkBQSk=; b=Jdv2Wd5oN4CpdGTaNKrbEYL2AIh+fD47U1wALjs1ISqEKfpRNhNy0uC4 La4Fm9V+gRlUwYaTnPpHWpkUwrT7p56GU2hhJNsy9GYQDSgzehh5kg+Xr SPP4nb8AkwF/+qNuU9GfgjlTmJhrIFPrifMWPDGsiGobamWE1Lg2sV9ht 16lNYpAi+mNokifKuNbgt2AYaaY76Q125HvXNBhwQFjm5NLAJ4N9JUsIV RwkooEU078yaV9bJWTTAo0lxPh6AA0gl3eWHh7e71GDUZkxKryedjTVnl hecJi+V0juDqfrV4Z5LdTnWMkZ9nKt0CwKQC1Eejw0p3G3v/6Q6/EsqTu A==; X-IronPort-AV: E=McAfee;i="6600,9927,10915"; a="15501980" X-IronPort-AV: E=Sophos;i="6.04,253,1695711600"; d="scan'208";a="15501980" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Dec 2023 12:06:51 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10915"; a="889059454" X-IronPort-AV: E=Sophos;i="6.04,253,1695711600"; d="scan'208";a="889059454" Received: from fmsmsx603.amr.corp.intel.com ([10.18.126.83]) by fmsmga002.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 05 Dec 2023 12:06:50 -0800 Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 5 Dec 2023 12:06:50 -0800 Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 5 Dec 2023 12:06:46 -0800 Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Tue, 5 Dec 2023 12:06:46 -0800 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (104.47.58.169) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.34; Tue, 5 Dec 2023 12:06:46 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Rn6mOdgbTVkiilntMhjoujlSgiaZUXBb6Y5I+fo3LaOG0uelyOExYTJn6BSWK8brN8GIBaf5O2sZMFVgigbUUpGD4sIgQMBoTXtFpq95ERK9Scjh0nWT8zrr4A6tPFO6RT40YbVJcpYJW9NYsfIHd7X2rtjcvbEQSXgKzyd6u7c75iE3mxmhWL3RndzdqTe+wjB2A0wJL+gC2Voz4h2qDHDpwhbY1VEogKEMwtUfIcd5aSViQzJDBML2H+cwZrqK0LCyOupQUsm1uZpKSqHAUo+7/TxCiFqq6uBkozUe10IYdmnB35x9bF/pptgpcnxREiU+ANYTWbOj0Fcvv92Urg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PIs+1DbSuB+l0FIbWtOWxxpV3Bjnvv0DUIP3OoUvrJc=; b=IrcWnOvfzpWXMzW45OloKU5K9qPPZ0pw1Yojpwv3ThRAeT9QeHYZeeOfCGrJECbNmlRHYi2PtbA2c7L0ivxgk+3sDRj8AuH+972orKve1DWde59K2YNU1FXNrYADwtJEwbbPMpIifZBvVSzL9co96V3hZxHlIMDI0pneUZk+qn1Ci5yqbDFqAVFws6wNxxjH9RvfthU1wNiio9Tj615p9ETnBczo1gGFmJ7CV1BA8lB1mCEDAgFfdFoIFm/BGJPgbk8BlMBko2rV13Skgb7T/MPY8CyUkCQ96bVymyAkkEsMQjKLAJviNK4z1R2xIizQilOqBD4q549Ardj6lbvgHQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from PH8PR11MB8107.namprd11.prod.outlook.com (2603:10b6:510:256::6) by SJ0PR11MB5167.namprd11.prod.outlook.com (2603:10b6:a03:2d9::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7046.34; Tue, 5 Dec 2023 20:06:40 +0000 Received: from PH8PR11MB8107.namprd11.prod.outlook.com ([fe80::6362:763e:f84b:4169]) by PH8PR11MB8107.namprd11.prod.outlook.com ([fe80::6362:763e:f84b:4169%5]) with mapi id 15.20.7046.033; Tue, 5 Dec 2023 20:06:39 +0000 Date: Tue, 5 Dec 2023 12:06:12 -0800 From: Dan Williams To: Dionna Amalie Glaze , Dan Williams CC: Sean Christopherson , Michael Roth , Alexey Kardashevskiy , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , Brijesh Singh , Subject: Re: [PATCH v10 48/50] KVM: SEV: Provide support for SNP_GUEST_REQUEST NAE event Message-ID: <656f82b4b1972_45e012944e@dwillia2-xfh.jf.intel.com.notmuch> References: <20231016132819.1002933-49-michael.roth@amd.com> <20231110220756.7hhiy36jc6jiu7nm@amd.com> <656e6f0aa1c5_4568a29451@dwillia2-xfh.jf.intel.com.notmuch> Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: X-ClientProxiedBy: MW2PR16CA0045.namprd16.prod.outlook.com (2603:10b6:907:1::22) To PH8PR11MB8107.namprd11.prod.outlook.com (2603:10b6:510:256::6) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PH8PR11MB8107:EE_|SJ0PR11MB5167:EE_ X-MS-Office365-Filtering-Correlation-Id: 9ce8f1d6-995f-4034-8a21-08dbf5cdb0d2 X-LD-Processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH8PR11MB8107.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(396003)(366004)(136003)(346002)(376002)(39860400002)(230922051799003)(451199024)(1800799012)(186009)(64100799003)(26005)(6512007)(6666004)(9686003)(6486002)(7406005)(83380400001)(6506007)(5660300002)(7416002)(2906002)(41300700001)(478600001)(966005)(4326008)(8676002)(66946007)(66476007)(8936002)(66556008)(54906003)(110136005)(316002)(82960400001)(86362001)(38100700002);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?1yfMlUMOLIIrk59SQsDs835gSkScZiEOLnRTQUieyNjRTxqBfLnLxestWvYL?= =?us-ascii?Q?cRqzJHb/axSlDGd+xStLJWflfIYGn0B075qYi6mv2qHF7aPY7r0bReZeqRj/?= =?us-ascii?Q?+IWX9KBBHDZTV9900smx8ItaqqMm2VhdBTFakcP+H3ZLqwmvQLmv7rA0Ddfo?= =?us-ascii?Q?+PRn83+upF6N44GZpVaJHCOK/GSJwrnzANRDr/9Um+18Jh17gqfzQ+uwQKwc?= =?us-ascii?Q?YLhHOpE0pQcbv+xnxZ9IMOhV+HwQEgT+5eqQ19NOgXd2RrfNGeqYizvwTcRO?= =?us-ascii?Q?Y2ZC8TfMTS94y5hR+NfPMD6wKgGkInXZW8IusLXizH/MpKSxLJkI3Zqzhb0J?= =?us-ascii?Q?5DAmg14XP528o+NDff+3VYgWSDsY9H311y1TNhikfWvWCMrJNqZ0LCK7j0zp?= =?us-ascii?Q?f18WizWvtnIJOkqIF81FDuLsG+CULgb+hWWW6rEwUEdMNVd6/zK18qoHPoLb?= =?us-ascii?Q?EsL/3wTcmdvYHt4mdbCkBjrimsDTFhWZYXCDc3u3Vtj9vXa4PqoAH0B9POau?= =?us-ascii?Q?ZXHaU81H2dY3Nmdy818pRZ5IHaUbQA2kVdeJnbfLy+5flMimcvqTX7d9u1TX?= =?us-ascii?Q?FPSGnzeg8Mve2hq4wK57Oom02Ind0EyhBs8oB77aXF+rTULBdk72ZYBl9pfQ?= =?us-ascii?Q?zL8UieaiFF9lVXjhriZUb3EzuGkwas+KO0mIXlQ9kgmf7GVsIa0l933KNQre?= =?us-ascii?Q?0sH5aREGaG2HfG2lpS9aJPRD2DOk5mhe0akszxassZsrBeDbx1g1fmrC0heH?= =?us-ascii?Q?ZJpHqHVU1if4JLOMfgjCJqWaugx4Aq/Hq934H2W+TNMewU0ZFx+2jMCegU8e?= =?us-ascii?Q?3CrDk0vdvKLQ2rN9XEg55X2Zs92mFBm1ntqcT68uN+ezMY+pIhsYzywt3eUj?= =?us-ascii?Q?WUw3eJL/p0G5v4pgCt/dRGu3gqdXYEeprXdYYwQSf/i2vwteLcLP1/AVmtsO?= =?us-ascii?Q?56HHMI3WbacqMGVxc5awd7mqI/b1TrzZjdh30aDYI3s++7O+ejwnmBYAhh6R?= =?us-ascii?Q?+r6q2tlfzZNdi8jM96+zFI027z9Uolp+I+9Ij0usWX49aqap09RlwJJ2VZ+d?= =?us-ascii?Q?NALdGc6Hhncb1e2Q7O1ZTW92iGIuUQ9gSCTvHSNFLwdJkHR0jyGSgeaPvnIN?= =?us-ascii?Q?cdr4RWahznsQpC432D7Bz75CszMy0kMWGXKSS9qj6C0o3pjewF3LmzFU66sS?= =?us-ascii?Q?WFWpEV+uVTel8/khj8kabV7bzwSLa11KhIGIYaF1G4Fom1lLbd0QpX8lXyxd?= =?us-ascii?Q?mGr4GAyBfoCMe8wJ0Exzh+GVF+IKG6InNZ8oCwEVcokzDCjOS6qxwFZjiBDp?= =?us-ascii?Q?oUT0qD7yUuwjr1Wvixi8pcH92uxXseb5zfUs3wXVSotUJW2UAIfpZb+9TCoV?= =?us-ascii?Q?Bml8HNwkWbENr/D43gH87SxIDFjMEBKt3XmF2cEfc8NKRoUiZch5TNR84JhX?= =?us-ascii?Q?cJY1PbZbADIJJsnqUtZ9pu5WuJv5egeTdd/ywAtUemaTs6HbdOSg4fA6vepk?= =?us-ascii?Q?IilZ27naokqvNv5aam0agVnW3e6duudbm/oUVPbaJPXhYDo1MfFBb+KIezk+?= =?us-ascii?Q?b1krH53FoQrIoroxRQZbZxPAUESoo9r9mPztBtXcUJeKTkHPMXlCnktPGT51?= =?us-ascii?Q?pw=3D=3D?= X-MS-Exchange-CrossTenant-Network-Message-Id: 9ce8f1d6-995f-4034-8a21-08dbf5cdb0d2 X-MS-Exchange-CrossTenant-AuthSource: PH8PR11MB8107.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Dec 2023 20:06:39.1311 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 7Te2ssBNr66jDI3RtjUytIKQmv04SysmLXqQqWLIQ42sT6/eGSMVDuM53R551BFC1CRlaR11/1YkGi19q/jtusdkGw5PxR7SFbz6TVzv8Fg= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5167 X-OriginatorOrg: intel.com X-Rspamd-Queue-Id: 2748440023 X-Rspam-User: X-Stat-Signature: wo8jazrsd1ok5d5bii5sg3mseto47imb X-Rspamd-Server: rspam03 X-HE-Tag: 1701806813-770345 X-HE-Meta: U2FsdGVkX1+ue1j5i6Tt9B+Akj8gpnauBRAYJsSBYfA7sfGZIekTFYzVb00rfwDL2oiEpXv/qMhzzsEfItalT0eRDOoOtu1zJOjZ/1a4SBxnmWJz3F/0272PQuOQSXgUPFaD9QPemRxLnvf4S/VhjqPUWWXf3z3AxeHY0C+cdcU1HXhzXL9teDs8wgUxET1W0ftARecZeXVu4/A6g1HPxR3Kui0qypNs6tUvnkJ2Rff3kbBLU+HVXlq8dJTeY5jJd955hNYsLctMfp7MyE6Oz1L/mDZhpodZKsAUTOpDrKaQ0MS7b2g31o845K+0ANu9EsQFVUkR7c6bG7RrtD+09gjXe5tSEq6SeTEnHJ4qtEkn1Pzswk/3pgoCcTasOY0Xu5gb7Er9eI5FBTtMYBU/N5WA9XIpY3I9Mq9tEGHb47q1kv8qxz2iWOM1l5xDlh/BQF/XLL31cK2tXVIagczAjFl1ovy/r8Rqi+t1n21MObp4Pi0j3coYsnesy/gwUkhQxPqwvOiCAPRpOcrcIeVRqYINc7ciHgXn7v1HIY1zxIVJnJKznMdb7FMbncqydUMPcIod6FeOxR/dNyoGtl7eLdxjTMDAk2PgPFGIO7Arj+Omj+BCeLh1cSsELk5mMfC6WRrADAyFs/4meO4gK/eqdRKmXjchXC0ZP5txh92uP5k3K4LHYWrhAnDVNhTjUlfQlLVPyDIuIiDVybKe6u4y404zUYiN9g2HOSC6HYRVN63qjWHBh0sfzeRSuFhcr7/rI7Ycygq8DIonHaYoksxZlFucC6C9pgFGq0So2neidd5bzVS7glGgPDWoETcYmKmq2yUgaduVvWfRSsD4HakaS37GHQ+fTlNZav2iueypLJYQHKHE5Tf4q81NTwmOBx73z1deiD7HVSFXEaa1bqxLjXj3m1JfQ6yTm7TG0N+NFMXVOSXrDcEbJc/2551uC7HrZHcXZ555s4qX7NKbxKy npfCFSnz jE6LIKvYXF4avG4e+NOJT1hUZvgmGhaTf8QvPwWk0sq7E3wTep37YMjYd2tXOT7EcQyTkUQkOKijO7n6UFkZwZ6xq8NMah40CzI5x3oQxkCsnIA0FRcb9brvRN5142ccACEC2H51PbUSKEHDtDJ0EKIUyvMkyVlDZLZ7btS6IWY4hC5fJKXttdGQD+H/sFsrX7LZbmCvCIWqbS+euMOjHjHOYpn0DLegYxfwSHDxgN+NX5rlQBLQ5rSnQvDa/djS+FNV8ObvZBPlH2nbf7bHyrU5VGCBmuSZpM3rHZ4B6N+L3WfC3SxizMgu+vuC0lvE1+IaI46muk0vINJU+p8QpQxZp8/6h6DOJ0g/w X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: [ add Ard for the SBOM sysfs ABI commentary ] Dionna Amalie Glaze wrote: [..] > > > My own plan for SEV-SNP was to have a bespoke signed measurement of > > > the UEFI in the GUID table, but that doesn't extend to TDX. If we're > > > looking more at an industry alignment on coRIM for SBOM formats (yes > > > please), then it'd be great to start getting that kind of info plumbed > > > to the user in a uniform way that doesn't have to rely on servers > > > providing the endorsements. > > > > > > [1] https://uefi.org/blog/firmware-sbom-proposal > > > > Honestly my first reaction for this ABI would be for a new file under > > /sys/firmware/efi/efivars or similar. > > For UEFI specifically that could make sense, yes. Not everyone has > been mounting efivars, so it's been a bit of an uphill battle for that > one. I wonder what the concern is with mounting efivarfs vs configfs? In any event this seems distinct enough to be its own /sys/firmware/efi/sbom file. I would defer to Ard, but I think SBOM is a generally useful concept that would be out of place as a blob returned from configfs-tsm. > Still there's the matter of cached TDI RIMs. NVIDIA would have I am not immediatly sure what a "TDI RIM" is? > everyone send attestation requests to their servers every quote > request in the NRAS architecture, but we're looking at other ways to "NRAS" does not parse for me either. > provide reliable attestation without a third party service, albeit > with slightly different security properties. Setting the above confusion aside, I would just say that in general yes, the kernel needs to understand its role in an end-to-end attestation architecture that is not beholden to a single vendor, but also allows the kernel to enforce ABI stability / mitigate regressions based on binary format changes.