From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 875853FB15; Thu, 1 Feb 2024 22:03:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706825034; cv=none; b=kXDaIz/Xtg/E6GiuFMcb+D9JrJGbP3PgwWk++9hPFSAH8Z8eqSSJRsEbOGfLExkXAr+To+oCCUz7bMwJ73kc58OMVFQop4tJHvGsJA64k7kS7k1xI0VR5TbTo1UWtQDt2TzcozMY03PYBWYAdcuLs6PHLUSPZv2WU2XdbwBv7ns= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706825034; c=relaxed/simple; bh=DyfFCo9ypbopk5SXJ0mM1Wja7KYemHh8D4kOapDKtP4=; h=Mime-Version:Content-Type:Date:Message-Id:Cc:Subject:From:To: References:In-Reply-To; b=kKbtyzFeJsdQ9yczH3tzAqVBTPiCg1Z2V86W2KnNY2NzoUUz7jc4Sgr2PlFT3QgGA1d153R6kDXLzf/pnS6k9+1eUUZmQtxarcE60/MfBLFqGy+p162aE6HXTxnZ0Oz/MCONZhALfRAA0/DPI5HdsWf6fteWgVbpPUpskwOuLZ0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=HWcbKjK0; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="HWcbKjK0" Received: by smtp.kernel.org (Postfix) with ESMTPSA id B581AC433C7; Thu, 1 Feb 2024 22:03:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706825034; bh=DyfFCo9ypbopk5SXJ0mM1Wja7KYemHh8D4kOapDKtP4=; h=Date:Cc:Subject:From:To:References:In-Reply-To:From; b=HWcbKjK06tEL6KahLUGO5ozn9ZvtScnt7BO65NP1wK4PxQWrUq1rO3cbqAODtG6+S 9HwdMUVAoR3I4fCQlPqAZbOUilnxvgFviT7YRAOW57F95JDEGBat2qC98wmcSjllkI BFg9iV9O+N9tib/YDRcbREyhyHH57mu17EK+dNB2Gsjwifx1D17gHKFVds/mO4HZVy 5EHLSn82Wexxd4mWnLOaJrdZDdwmkkmadJf8uHSyZ5nEh2XIj1l14mAUSbZJ7ikyY+ AZ39XeZAYQdfW9Kr4I0UHAvFqtZKuHbwTNk6xsxtESN7Ay2kl8IVhp6AaNE7haEh68 LAyfFgRoCOh4g== Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Fri, 02 Feb 2024 00:03:49 +0200 Message-Id: Cc: "Kuppuswamy Sathyanarayanan" , "Qinkun Bao" , "Yao, Jiewen" , "Xing, Cedric" , "Dionna Amalie Glaze" , , , , Subject: Re: [RFC PATCH v2 1/4] tsm: Runtime measurement register support From: "Jarkko Sakkinen" To: "Samuel Ortiz" , "Dan Williams" X-Mailer: aerc 0.15.2 References: <20240128212532.2754325-1-sameo@rivosinc.com> <20240128212532.2754325-2-sameo@rivosinc.com> In-Reply-To: <20240128212532.2754325-2-sameo@rivosinc.com> On Sun Jan 28, 2024 at 11:25 PM EET, Samuel Ortiz wrote: > Some confidential computing architecture (Intel TDX, ARM-CCA, RISC-V > CoVE) provide the TVM (confidential computing guest) with a set of > runtime measurement registers (RTMR). TVMs can extend those registers > with their measurements at runtime, i.e. after the TVM initial > measurements are finalized and the TVM actually runs. > > RTMRs are separated from the initial measurement registers set, and TSMs "measurement registers" and you do not need to cross-check what the heck RTMR was anyway. BR, Jarkko