Message ID | 20240913200517.3085794-1-ross.philipson@oracle.com |
---|---|
Headers | show |
Series | x86: Trenchboot secure dynamic launch Linux kernel support | expand |
On Fri, Sep 13 2024 at 13:04, Ross Philipson wrote: > The larger focus of the TrenchBoot project (https://github.com/TrenchBoot) is to > enhance the boot security and integrity in a unified manner. The first area of > focus has been on the Trusted Computing Group's Dynamic Launch for establishing > a hardware Root of Trust for Measurement, also know as DRTM (Dynamic Root of > Trust for Measurement). The project has been and continues to work on providing > a unified means to Dynamic Launch that is a cross-platform (Intel and AMD) and > cross-architecture (x86 and Arm), with our recent involvment in the upcoming > Arm DRTM specification. The order of introducing DRTM to the Linux kernel > follows the maturity of DRTM in the architectures. Intel's Trusted eXecution > Technology (TXT) is present today and only requires a preamble loader, e.g. a > boot loader, and an OS kernel that is TXT-aware. AMD DRTM implementation has > been present since the introduction of AMD-V but requires an additional > component that is AMD specific and referred to in the specification as the > Secure Loader, which the TrenchBoot project has an active prototype in > development. Finally Arm's implementation is in specification development stage > and the project is looking to support it when it becomes available. > > This patchset provides detailed documentation of DRTM, the approach used for > adding the capbility, and relevant API/ABI documentation. In addition to the > documentation the patch set introduces Intel TXT support as the first platform > for Linux Secure Launch. So this looks pretty reasonable to me by now and I'm inclined to take it through the tip x86 tree, but that needs reviewed/acked-by's from the crypto and TPM folks. EFI has been reviewed already. Can we make progress on this please? Thanks, tglx
On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: > On Fri, Sep 13 2024 at 13:04, Ross Philipson wrote: > > The larger focus of the TrenchBoot project (https://github.com/TrenchBoot) is to > > enhance the boot security and integrity in a unified manner. The first area of > > focus has been on the Trusted Computing Group's Dynamic Launch for establishing > > a hardware Root of Trust for Measurement, also know as DRTM (Dynamic Root of > > Trust for Measurement). The project has been and continues to work on providing > > a unified means to Dynamic Launch that is a cross-platform (Intel and AMD) and > > cross-architecture (x86 and Arm), with our recent involvment in the upcoming > > Arm DRTM specification. The order of introducing DRTM to the Linux kernel > > follows the maturity of DRTM in the architectures. Intel's Trusted eXecution > > Technology (TXT) is present today and only requires a preamble loader, e.g. a > > boot loader, and an OS kernel that is TXT-aware. AMD DRTM implementation has > > been present since the introduction of AMD-V but requires an additional > > component that is AMD specific and referred to in the specification as the > > Secure Loader, which the TrenchBoot project has an active prototype in > > development. Finally Arm's implementation is in specification development stage > > and the project is looking to support it when it becomes available. > > > > This patchset provides detailed documentation of DRTM, the approach used for > > adding the capbility, and relevant API/ABI documentation. In addition to the > > documentation the patch set introduces Intel TXT support as the first platform > > for Linux Secure Launch. > > So this looks pretty reasonable to me by now and I'm inclined to take it > through the tip x86 tree, but that needs reviewed/acked-by's from the > crypto and TPM folks. EFI has been reviewed already. > > Can we make progress on this please? So TPM patches do have bunch of glitches: - 15/20: I don't get this. There is nothing to report unless tree is falling. The reported-by tag literally meaningless. Maybe this is something that makes sense with this feature. Explain from that angle. - 16/20: Is this actually a bug fix? If it is should be before 15/20. - 17/20: the commit message could do a better job explaining how the locality can vary. I'm not sure how this will be used by rest of the patch set. - 18/20: I'm not confident we want to give privilege to set locality to the user space. The commit message neither makes a case of this. Has this been tested to together with bus encryption (just checking)? > > Thanks, > > tglx BR, Jarkko
On Fri, Nov 01 2024 at 00:37, Jarkko Sakkinen wrote: > On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: >> So this looks pretty reasonable to me by now and I'm inclined to take it >> through the tip x86 tree, but that needs reviewed/acked-by's from the >> crypto and TPM folks. EFI has been reviewed already. >> >> Can we make progress on this please? > > So TPM patches do have bunch of glitches: > > - 15/20: I don't get this. There is nothing to report unless tree > is falling. The reported-by tag literally meaningless. Maybe this > is something that makes sense with this feature. Explain from that > angle. > - 16/20: Is this actually a bug fix? If it is should be before 15/20. > - 17/20: the commit message could do a better job explaining how the > locality can vary. I'm not sure how this will be used by rest of > the patch set. > - 18/20: I'm not confident we want to give privilege to set locality > to the user space. The commit message neither makes a case of this. > Has this been tested to together with bus encryption (just checking)? Can you please explicitely voice your detailed technical concerns in replies to the actual patches? Thanks, tglx
On Fri Nov 1, 2024 at 1:08 AM EET, Thomas Gleixner wrote: > On Fri, Nov 01 2024 at 00:37, Jarkko Sakkinen wrote: > > On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: > >> So this looks pretty reasonable to me by now and I'm inclined to take it > >> through the tip x86 tree, but that needs reviewed/acked-by's from the > >> crypto and TPM folks. EFI has been reviewed already. > >> > >> Can we make progress on this please? > > > > So TPM patches do have bunch of glitches: > > > > - 15/20: I don't get this. There is nothing to report unless tree > > is falling. The reported-by tag literally meaningless. Maybe this > > is something that makes sense with this feature. Explain from that > > angle. > > - 16/20: Is this actually a bug fix? If it is should be before 15/20. > > - 17/20: the commit message could do a better job explaining how the > > locality can vary. I'm not sure how this will be used by rest of > > the patch set. > > - 18/20: I'm not confident we want to give privilege to set locality > > to the user space. The commit message neither makes a case of this. > > Has this been tested to together with bus encryption (just checking)? > > Can you please explicitely voice your detailed technical concerns in > replies to the actual patches? - 15/20 looks like a rigged patch. I don't really know why it is done so it is hard to either suggest how "resolve it". - 16/20 probably makes sense but if it is a bug fix or part of it is, the bug fix should have relevant fixes etc tags so that it can be picked up to stable kernels. - 17-18/20: I'd speak about this as the "one whole" i.e. here the privilege to be able change locality during run-time is really concerning. Could the locality be figured out for the kernel command-line instead? The sysfs attribute can exist as read-only. So yeah, the way I see it 15-16 are the more trivial issue to sort out (probably) but with 17-18 we have an actual architectural concern for kernel overall. > Thanks, > > tglx BR, Jarkko
On Fri Nov 1, 2024 at 2:33 AM EET, Jarkko Sakkinen wrote: > On Fri Nov 1, 2024 at 1:08 AM EET, Thomas Gleixner wrote: > > On Fri, Nov 01 2024 at 00:37, Jarkko Sakkinen wrote: > > > On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: > > >> So this looks pretty reasonable to me by now and I'm inclined to take it > > >> through the tip x86 tree, but that needs reviewed/acked-by's from the > > >> crypto and TPM folks. EFI has been reviewed already. > > >> > > >> Can we make progress on this please? > > > > > > So TPM patches do have bunch of glitches: > > > > > > - 15/20: I don't get this. There is nothing to report unless tree > > > is falling. The reported-by tag literally meaningless. Maybe this > > > is something that makes sense with this feature. Explain from that > > > angle. > > > - 16/20: Is this actually a bug fix? If it is should be before 15/20. > > > - 17/20: the commit message could do a better job explaining how the > > > locality can vary. I'm not sure how this will be used by rest of > > > the patch set. > > > - 18/20: I'm not confident we want to give privilege to set locality > > > to the user space. The commit message neither makes a case of this. > > > Has this been tested to together with bus encryption (just checking)? > > > > Can you please explicitely voice your detailed technical concerns in > > replies to the actual patches? > > - 15/20 looks like a rigged patch. I don't really know why it is done > so it is hard to either suggest how "resolve it". > - 16/20 probably makes sense but if it is a bug fix or part of it is, > the bug fix should have relevant fixes etc tags so that it can be > picked up to stable kernels. > - 17-18/20: I'd speak about this as the "one whole" i.e. here the > privilege to be able change locality during run-time is really > concerning. Could the locality be figured out for the kernel > command-line instead? The sysfs attribute can exist as read-only. > > So yeah, the way I see it 15-16 are the more trivial issue to sort > out (probably) but with 17-18 we have an actual architectural concern > for kernel overall. Further: 15/20: I can accept this without reported-by tag (or changed as suggested-by). It does not harm. 16/20: I'll re-review this with time. I'll try to get this done latest next week. So let's put focus only on 17 and 18. Can this problem be sorted out by kernel command-line parameter? In the case of locality we want to keep regular "chain of trust" i.e. boot-loader makes the decision, *even* in the case of DRTM. I would call this almost as constraint that would be wise to set. BR, Jarkko
On Fri, 1 Nov 2024 at 01:40, Jarkko Sakkinen <jarkko@kernel.org> wrote: > > On Fri Nov 1, 2024 at 2:33 AM EET, Jarkko Sakkinen wrote: > > On Fri Nov 1, 2024 at 1:08 AM EET, Thomas Gleixner wrote: > > > On Fri, Nov 01 2024 at 00:37, Jarkko Sakkinen wrote: > > > > On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: > > > >> So this looks pretty reasonable to me by now and I'm inclined to take it > > > >> through the tip x86 tree, but that needs reviewed/acked-by's from the > > > >> crypto and TPM folks. EFI has been reviewed already. > > > >> > > > >> Can we make progress on this please? > > > > > > > > So TPM patches do have bunch of glitches: > > > > > > > > - 15/20: I don't get this. There is nothing to report unless tree > > > > is falling. The reported-by tag literally meaningless. Maybe this > > > > is something that makes sense with this feature. Explain from that > > > > angle. > > > > - 16/20: Is this actually a bug fix? If it is should be before 15/20. > > > > - 17/20: the commit message could do a better job explaining how the > > > > locality can vary. I'm not sure how this will be used by rest of > > > > the patch set. > > > > - 18/20: I'm not confident we want to give privilege to set locality > > > > to the user space. The commit message neither makes a case of this. > > > > Has this been tested to together with bus encryption (just checking)? > > > > > > Can you please explicitely voice your detailed technical concerns in > > > replies to the actual patches? > > > > - 15/20 looks like a rigged patch. I don't really know why it is done > > so it is hard to either suggest how "resolve it". > > - 16/20 probably makes sense but if it is a bug fix or part of it is, > > the bug fix should have relevant fixes etc tags so that it can be > > picked up to stable kernels. > > - 17-18/20: I'd speak about this as the "one whole" i.e. here the > > privilege to be able change locality during run-time is really > > concerning. Could the locality be figured out for the kernel > > command-line instead? The sysfs attribute can exist as read-only. > > > > So yeah, the way I see it 15-16 are the more trivial issue to sort > > out (probably) but with 17-18 we have an actual architectural concern > > for kernel overall. > > Further: > > 15/20: I can accept this without reported-by tag (or changed as > suggested-by). It does not harm. > 16/20: I'll re-review this with time. I'll try to get this done > latest next week. > > So let's put focus only on 17 and 18. Can this problem be sorted out > by kernel command-line parameter? In the case of locality we want to > keep regular "chain of trust" i.e. boot-loader makes the decision, > *even* in the case of DRTM. I would call this almost as constraint > that would be wise to set. > Please don't add a kernel command line parameter for this - the code running in the decompressor will be the one setting it and there are better ways to pass information between these components (and the slaunch stack is already doing that in any case) Also, let's have this discussion in the appropriate place, i.e., on the thread for each respective patch.
On Fri Nov 1, 2024 at 10:50 AM EET, Ard Biesheuvel wrote: > On Fri, 1 Nov 2024 at 01:40, Jarkko Sakkinen <jarkko@kernel.org> wrote: > > > > On Fri Nov 1, 2024 at 2:33 AM EET, Jarkko Sakkinen wrote: > > > On Fri Nov 1, 2024 at 1:08 AM EET, Thomas Gleixner wrote: > > > > On Fri, Nov 01 2024 at 00:37, Jarkko Sakkinen wrote: > > > > > On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: > > > > >> So this looks pretty reasonable to me by now and I'm inclined to take it > > > > >> through the tip x86 tree, but that needs reviewed/acked-by's from the > > > > >> crypto and TPM folks. EFI has been reviewed already. > > > > >> > > > > >> Can we make progress on this please? > > > > > > > > > > So TPM patches do have bunch of glitches: > > > > > > > > > > - 15/20: I don't get this. There is nothing to report unless tree > > > > > is falling. The reported-by tag literally meaningless. Maybe this > > > > > is something that makes sense with this feature. Explain from that > > > > > angle. > > > > > - 16/20: Is this actually a bug fix? If it is should be before 15/20. > > > > > - 17/20: the commit message could do a better job explaining how the > > > > > locality can vary. I'm not sure how this will be used by rest of > > > > > the patch set. > > > > > - 18/20: I'm not confident we want to give privilege to set locality > > > > > to the user space. The commit message neither makes a case of this. > > > > > Has this been tested to together with bus encryption (just checking)? > > > > > > > > Can you please explicitely voice your detailed technical concerns in > > > > replies to the actual patches? > > > > > > - 15/20 looks like a rigged patch. I don't really know why it is done > > > so it is hard to either suggest how "resolve it". > > > - 16/20 probably makes sense but if it is a bug fix or part of it is, > > > the bug fix should have relevant fixes etc tags so that it can be > > > picked up to stable kernels. > > > - 17-18/20: I'd speak about this as the "one whole" i.e. here the > > > privilege to be able change locality during run-time is really > > > concerning. Could the locality be figured out for the kernel > > > command-line instead? The sysfs attribute can exist as read-only. > > > > > > So yeah, the way I see it 15-16 are the more trivial issue to sort > > > out (probably) but with 17-18 we have an actual architectural concern > > > for kernel overall. > > > > Further: > > > > 15/20: I can accept this without reported-by tag (or changed as > > suggested-by). It does not harm. > > 16/20: I'll re-review this with time. I'll try to get this done > > latest next week. > > > > So let's put focus only on 17 and 18. Can this problem be sorted out > > by kernel command-line parameter? In the case of locality we want to > > keep regular "chain of trust" i.e. boot-loader makes the decision, > > *even* in the case of DRTM. I would call this almost as constraint > > that would be wise to set. > > > > Please don't add a kernel command line parameter for this - the code > running in the decompressor will be the one setting it and there are > better ways to pass information between these components (and the > slaunch stack is already doing that in any case) Not sure if I follow this (I don't know what "decompressor" is). > Also, let's have this discussion in the appropriate place, i.e., on > the thread for each respective patch. Sure, I just did not have a lot of time to download the patch. BR, Jarkko
On Fri Nov 1, 2024 at 11:18 AM EET, Jarkko Sakkinen wrote: > On Fri Nov 1, 2024 at 10:50 AM EET, Ard Biesheuvel wrote: > > On Fri, 1 Nov 2024 at 01:40, Jarkko Sakkinen <jarkko@kernel.org> wrote: > > > > > > On Fri Nov 1, 2024 at 2:33 AM EET, Jarkko Sakkinen wrote: > > > > On Fri Nov 1, 2024 at 1:08 AM EET, Thomas Gleixner wrote: > > > > > On Fri, Nov 01 2024 at 00:37, Jarkko Sakkinen wrote: > > > > > > On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: > > > > > >> So this looks pretty reasonable to me by now and I'm inclined to take it > > > > > >> through the tip x86 tree, but that needs reviewed/acked-by's from the > > > > > >> crypto and TPM folks. EFI has been reviewed already. > > > > > >> > > > > > >> Can we make progress on this please? > > > > > > > > > > > > So TPM patches do have bunch of glitches: > > > > > > > > > > > > - 15/20: I don't get this. There is nothing to report unless tree > > > > > > is falling. The reported-by tag literally meaningless. Maybe this > > > > > > is something that makes sense with this feature. Explain from that > > > > > > angle. > > > > > > - 16/20: Is this actually a bug fix? If it is should be before 15/20. > > > > > > - 17/20: the commit message could do a better job explaining how the > > > > > > locality can vary. I'm not sure how this will be used by rest of > > > > > > the patch set. > > > > > > - 18/20: I'm not confident we want to give privilege to set locality > > > > > > to the user space. The commit message neither makes a case of this. > > > > > > Has this been tested to together with bus encryption (just checking)? > > > > > > > > > > Can you please explicitely voice your detailed technical concerns in > > > > > replies to the actual patches? > > > > > > > > - 15/20 looks like a rigged patch. I don't really know why it is done > > > > so it is hard to either suggest how "resolve it". > > > > - 16/20 probably makes sense but if it is a bug fix or part of it is, > > > > the bug fix should have relevant fixes etc tags so that it can be > > > > picked up to stable kernels. > > > > - 17-18/20: I'd speak about this as the "one whole" i.e. here the > > > > privilege to be able change locality during run-time is really > > > > concerning. Could the locality be figured out for the kernel > > > > command-line instead? The sysfs attribute can exist as read-only. > > > > > > > > So yeah, the way I see it 15-16 are the more trivial issue to sort > > > > out (probably) but with 17-18 we have an actual architectural concern > > > > for kernel overall. > > > > > > Further: > > > > > > 15/20: I can accept this without reported-by tag (or changed as > > > suggested-by). It does not harm. > > > 16/20: I'll re-review this with time. I'll try to get this done > > > latest next week. > > > > > > So let's put focus only on 17 and 18. Can this problem be sorted out > > > by kernel command-line parameter? In the case of locality we want to > > > keep regular "chain of trust" i.e. boot-loader makes the decision, > > > *even* in the case of DRTM. I would call this almost as constraint > > > that would be wise to set. > > > > > > > Please don't add a kernel command line parameter for this - the code > > running in the decompressor will be the one setting it and there are > > better ways to pass information between these components (and the > > slaunch stack is already doing that in any case) > > Not sure if I follow this (I don't know what "decompressor" is). Right you refer to the process running GETSEC[SENTER], sorry, in the page with this detail. BR, Jarkko
On Fri Sep 13, 2024 at 11:04 PM EEST, Ross Philipson wrote: > The larger focus of the TrenchBoot project (https://github.com/TrenchBoot) is to > enhance the boot security and integrity in a unified manner. The first area of > focus has been on the Trusted Computing Group's Dynamic Launch for establishing > a hardware Root of Trust for Measurement, also know as DRTM (Dynamic Root of > Trust for Measurement). The project has been and continues to work on providing > a unified means to Dynamic Launch that is a cross-platform (Intel and AMD) and > cross-architecture (x86 and Arm), with our recent involvment in the upcoming > Arm DRTM specification. The order of introducing DRTM to the Linux kernel > follows the maturity of DRTM in the architectures. Intel's Trusted eXecution > Technology (TXT) is present today and only requires a preamble loader, e.g. a > boot loader, and an OS kernel that is TXT-aware. AMD DRTM implementation has > been present since the introduction of AMD-V but requires an additional > component that is AMD specific and referred to in the specification as the > Secure Loader, which the TrenchBoot project has an active prototype in > development. Finally Arm's implementation is in specification development stage > and the project is looking to support it when it becomes available. > > This patchset provides detailed documentation of DRTM, the approach used for > adding the capbility, and relevant API/ABI documentation. In addition to the > documentation the patch set introduces Intel TXT support as the first platform > for Linux Secure Launch. > > A quick note on terminology. The larger open source project itself is called > TrenchBoot, which is hosted on Github (links below). The kernel feature enabling > the use of Dynamic Launch technology is referred to as "Secure Launch" within > the kernel code. As such the prefixes sl_/SL_ or slaunch/SLAUNCH will be seen > in the code. The stub code discussed above is referred to as the SL stub. 1. I don't see any tags in most of the patches so don't get the rush. This includes also patches for x86. Why I would care to review TPM patches when there is over a dozen unreviewed and untested patches before it? 2. TPM patches have been in circulation in and out of the patch set for some time now with little or no improvement. Why the sudden buzz? I have not heard much about this since last early summer. Have to spend some time recalling what this is about anyway. I cannot trust that my tags make any sense before more reviewed/tested-by tags before the TPM patches. BR, Jarkko
On Fri Nov 1, 2024 at 1:08 AM EET, Thomas Gleixner wrote: > On Fri, Nov 01 2024 at 00:37, Jarkko Sakkinen wrote: > > On Thu Oct 31, 2024 at 9:25 PM EET, Thomas Gleixner wrote: > >> So this looks pretty reasonable to me by now and I'm inclined to take it > >> through the tip x86 tree, but that needs reviewed/acked-by's from the > >> crypto and TPM folks. EFI has been reviewed already. > >> > >> Can we make progress on this please? > > > > So TPM patches do have bunch of glitches: > > > > - 15/20: I don't get this. There is nothing to report unless tree > > is falling. The reported-by tag literally meaningless. Maybe this > > is something that makes sense with this feature. Explain from that > > angle. > > - 16/20: Is this actually a bug fix? If it is should be before 15/20. > > - 17/20: the commit message could do a better job explaining how the > > locality can vary. I'm not sure how this will be used by rest of > > the patch set. > > - 18/20: I'm not confident we want to give privilege to set locality > > to the user space. The commit message neither makes a case of this. > > Has this been tested to together with bus encryption (just checking)? > > Can you please explicitely voice your detailed technical concerns in > replies to the actual patches? Yes, I did that. > > Thanks, > > tglx BR, Jarkko
On Fri, Nov 01 2024 at 12:28, Jarkko Sakkinen wrote: > On Fri Sep 13, 2024 at 11:04 PM EEST, Ross Philipson wrote: >> A quick note on terminology. The larger open source project itself is called >> TrenchBoot, which is hosted on Github (links below). The kernel feature enabling >> the use of Dynamic Launch technology is referred to as "Secure Launch" within >> the kernel code. As such the prefixes sl_/SL_ or slaunch/SLAUNCH will be seen >> in the code. The stub code discussed above is referred to as the SL stub. > > 1. I don't see any tags in most of the patches so don't get the rush. This > includes also patches for x86. Why I would care to review TPM patches > when there is over a dozen unreviewed and untested patches before it? > 2. TPM patches have been in circulation in and out of the patch set > for some time now with little or no improvement. > > Why the sudden buzz? I have not heard much about this since last early > summer. Have to spend some time recalling what this is about anyway. I > cannot trust that my tags make any sense before more reviewed/tested-by > tags before the TPM patches. If I intend to merge the patches then I surely have looked at them deeply. I don't have to send a reviewed-by just to apply them afterwards. There was enough motion on these patches and this posting is in your inbox for 6 weeks now without any reaction from you. The TPM changes are very much independent from the x86 specific ones, so why do you want x86 review tags in order to look at the ones which are specific to your subsystem especially as some of them seem to address real short comings there independent of trenchboot. Thanks, tglx
On Fri Nov 1, 2024 at 10:34 PM EET, Thomas Gleixner wrote: > On Fri, Nov 01 2024 at 12:28, Jarkko Sakkinen wrote: > > On Fri Sep 13, 2024 at 11:04 PM EEST, Ross Philipson wrote: > >> A quick note on terminology. The larger open source project itself is called > >> TrenchBoot, which is hosted on Github (links below). The kernel feature enabling > >> the use of Dynamic Launch technology is referred to as "Secure Launch" within > >> the kernel code. As such the prefixes sl_/SL_ or slaunch/SLAUNCH will be seen > >> in the code. The stub code discussed above is referred to as the SL stub. > > > > 1. I don't see any tags in most of the patches so don't get the rush. This > > includes also patches for x86. Why I would care to review TPM patches > > when there is over a dozen unreviewed and untested patches before it? > > 2. TPM patches have been in circulation in and out of the patch set > > for some time now with little or no improvement. > > > > Why the sudden buzz? I have not heard much about this since last early > > summer. Have to spend some time recalling what this is about anyway. I > > cannot trust that my tags make any sense before more reviewed/tested-by > > tags before the TPM patches. > > If I intend to merge the patches then I surely have looked at them > deeply. I don't have to send a reviewed-by just to apply them > afterwards. > > There was enough motion on these patches and this posting is in your > inbox for 6 weeks now without any reaction from you. > > The TPM changes are very much independent from the x86 specific ones, so > why do you want x86 review tags in order to look at the ones which are > specific to your subsystem especially as some of them seem to address > real short comings there independent of trenchboot. I think we can sort them out independently as long as we find a conclusion how to address locality change. > > Thanks, > > tglx BR, Jarkko
On Fri Nov 1, 2024 at 11:13 PM EET, Jarkko Sakkinen wrote: > On Fri Nov 1, 2024 at 10:34 PM EET, Thomas Gleixner wrote: > > On Fri, Nov 01 2024 at 12:28, Jarkko Sakkinen wrote: > > > On Fri Sep 13, 2024 at 11:04 PM EEST, Ross Philipson wrote: > > >> A quick note on terminology. The larger open source project itself is called > > >> TrenchBoot, which is hosted on Github (links below). The kernel feature enabling > > >> the use of Dynamic Launch technology is referred to as "Secure Launch" within > > >> the kernel code. As such the prefixes sl_/SL_ or slaunch/SLAUNCH will be seen > > >> in the code. The stub code discussed above is referred to as the SL stub. > > > > > > 1. I don't see any tags in most of the patches so don't get the rush. This > > > includes also patches for x86. Why I would care to review TPM patches > > > when there is over a dozen unreviewed and untested patches before it? > > > 2. TPM patches have been in circulation in and out of the patch set > > > for some time now with little or no improvement. > > > > > > Why the sudden buzz? I have not heard much about this since last early > > > summer. Have to spend some time recalling what this is about anyway. I > > > cannot trust that my tags make any sense before more reviewed/tested-by > > > tags before the TPM patches. > > > > If I intend to merge the patches then I surely have looked at them > > deeply. I don't have to send a reviewed-by just to apply them > > afterwards. > > > > There was enough motion on these patches and this posting is in your > > inbox for 6 weeks now without any reaction from you. > > > > The TPM changes are very much independent from the x86 specific ones, so > > why do you want x86 review tags in order to look at the ones which are > > specific to your subsystem especially as some of them seem to address > > real short comings there independent of trenchboot. > > I think we can sort them out independently as long as we find a > conclusion how to address locality change. And to be fair: there was no reaction from anyone. It is mostly x86 patch set, meaning that I was waiting for some reaction first from that side. And I did respond to that when it came. IMHO: let's get a solution for that one problem and then it should be fine as far as I'm concerned. BR, Jarkko
On Fri, Nov 01 2024 at 23:19, Jarkko Sakkinen wrote: > On Fri Nov 1, 2024 at 11:13 PM EET, Jarkko Sakkinen wrote: >> I think we can sort them out independently as long as we find a >> conclusion how to address locality change. > > And to be fair: there was no reaction from anyone. It is mostly x86 > patch set, meaning that I was waiting for some reaction first from that > side. And I did respond to that when it came. The x86 side is mostly self contained, so the damage there is minimal, but the TPM parts are changing the generic operations and the x86 parts depend on them. So let's not create a chicken and egg problem and solve the TPM parts, which at my cursory glance are partially legitimate fixes, independent of the actual trenchboot x86 functionality. Thanks, tglx
On Sat Nov 2, 2024 at 12:04 AM EET, Thomas Gleixner wrote: > On Fri, Nov 01 2024 at 23:19, Jarkko Sakkinen wrote: > > On Fri Nov 1, 2024 at 11:13 PM EET, Jarkko Sakkinen wrote: > >> I think we can sort them out independently as long as we find a > >> conclusion how to address locality change. > > > > And to be fair: there was no reaction from anyone. It is mostly x86 > > patch set, meaning that I was waiting for some reaction first from that > > side. And I did respond to that when it came. > > The x86 side is mostly self contained, so the damage there is minimal, > but the TPM parts are changing the generic operations and the x86 parts > depend on them. > > So let's not create a chicken and egg problem and solve the TPM parts, > which at my cursory glance are partially legitimate fixes, independent > of the actual trenchboot x86 functionality. Yeah, I'm already writing a (draft/RFC) patch to demonstrate my proposal that I sent so all good. > > Thanks, > > tglx BR, Jarkko