Re: [PATCH v12 16/19] tpm, tpm_tis: Allow locality to be set to a different value

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:13AM -0800, Ross Philipson wrote: > DRTM needs to be able to set the locality used by kernel. Provide > a one-shot function tpm_chip_set_locality() for the purpose. > > Signed-off-by: Ross Philipson > Signed-off-by: Jarkko Sakkinen > --- > drivers/char/tpm/tpm-chip

Re: [PATCH v12 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality()

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:12AM -0800, Ross Philipson wrote: > From: "Daniel P. Smith" > > Validate that the input locality is within the correct range, as specified > by TCG standards, and increase the locality count also for the positive > localities. > > Signed-off-by: Daniel P. Smith > S

Re: [PATCH v12 10/19] x86: Secure Launch kernel late boot stub

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:07AM -0800, Ross Philipson wrote: > The routine slaunch_setup is called out of the x86 specific setup_arch() > routine during early kernel boot. After determining what platform is > present, various operations specific to that platform occur. This > includes finalizing

Re: [PATCH v12 09/19] x86: Secure Launch kernel early boot stub

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:06AM -0800, Ross Philipson wrote: > The Secure Launch (SL) stub provides the entry point for Intel TXT (and > later AMD SKINIT) to vector to during the late launch. The symbol Does "to vector to" translate into to jump into during late launch? :-) Given the complicat

Re: [PATCH v12 08/19] x86/boot: Place TXT MLE header in the kernel_info section

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:05AM -0800, Ross Philipson wrote: > The MLE (measured launch environment) header must be locatable by the > boot loader and TXT must be setup to do a launch with this header's (cutting the hairs) nit: /TXT/Intel TXT/ > location. While the offset to the kernel_info st

Re: [PATCH v12 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:04AM -0800, Ross Philipson wrote: > These values are needed by Secure Launch to locate particular CPUs > during AP startup and to restore the MTRR state after a TXT launch. Hmm... does the first part with like locating particular CPU cores? I'd start also the sentenc

Re: [RFC PATCH 1/5] misc: introduce FDBox

2025-03-06 Thread Greg Kroah-Hartman
One quick review note: On Fri, Mar 07, 2025 at 12:57:35AM +, Pratyush Yadav wrote: > +/** > + * struct fdbox - A box of FDs. > + * @name: Name of the box. Must be unique. > + * @rwsem: Used to ensure exclusive access to the box during SEAL/UNSEAL > + * operations. > + * @dev: Backing d

Re: [PATCH v12 06/19] x86: Add early SHA-256 support for Secure Launch early measurements

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:03AM -0800, Ross Philipson wrote: > From: "Daniel P. Smith" > > The SHA-256 algorithm is necessary to measure configuration information into > the TPM as early as possible before using the values. This implementation > uses the established approach of #including the

Re: [PATCH v12 05/19] x86: Add early SHA-1 support for Secure Launch early measurements

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:02AM -0800, Ross Philipson wrote: > From: "Daniel P. Smith" > > Secure Launch is written to be compliant with the Intel TXT Measured Launch > Developer's Guide. The MLE Guide dictates that the system can be configured to > use both the SHA-1 and SHA-2 hashing algorit

Re: [PATCH v12 04/19] x86: Secure Launch main header file

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:01AM -0800, Ross Philipson wrote: > Introduce the main Secure Launch header file used in the early SL stub > and the early setup code. Just would need a *short* description of what slaunch.h holds. I guess it holds Intel TXT micro-arhitectural data structures? Anythin

Re: [PATCH v12 03/19] x86: Secure Launch Resource Table header file

2025-03-06 Thread Jarkko Sakkinen
On Thu, Dec 19, 2024 at 11:42:00AM -0800, Ross Philipson wrote: > Introduce the Secure Launch Resource Table which forms the formal > interface between the pre and post launch code. > > Signed-off-by: Ross Philipson Is this interface kernel specific or uarch specific? I'd just explicitly state t

[RFC PATCH 0/5] Introduce FDBox, and preserve memfd with shmem over KHO

2025-03-06 Thread Pratyush Yadav
This series introduces the File Descriptor Box (FDBox), along with support in memfd and shmem for persisting memfds over KHO using FDBox. FDBox is a mechanism for userspace to name file descriptors and give them over to the kernel to hold. They can later be retrieved by passing in the same name. T

Re: [RFC PATCH 2/5] misc: add documentation for FDBox

2025-03-06 Thread Randy Dunlap
On March 6, 2025 4:57:36 PM PST, Pratyush Yadav wrote: >With FDBox in place, add documentation that describes what it is and how >it is used, along with its UAPI and in-kernel API. > >Since the document refers to KHO, add a reference tag in kho/index.rst. > >Signed-off-by: Pratyush Yadav >--- > D

[RFC PATCH 2/5] misc: add documentation for FDBox

2025-03-06 Thread Pratyush Yadav
With FDBox in place, add documentation that describes what it is and how it is used, along with its UAPI and in-kernel API. Since the document refers to KHO, add a reference tag in kho/index.rst. Signed-off-by: Pratyush Yadav --- Documentation/filesystems/locking.rst | 21 +++ Documentation/kh

[RFC PATCH 4/5] mm: shmem: allow preserving file over FDBOX + KHO

2025-03-06 Thread Pratyush Yadav
For applications with a large amount of memory that takes time to rebuild, reboots to consume kernel upgrades can be very expensive. FDBox allows preserving file descriptors over kexec using KHO. Combining that with memfd gives those applications reboot-persistent memory that they can use to quickl

[RFC PATCH 1/5] misc: introduce FDBox

2025-03-06 Thread Pratyush Yadav
The File Descriptor Box (FDBox) is a mechanism for userspace to name file descriptors and give them over to the kernel to hold. They can later be retrieved by passing in the same name. The primary purpose of FDBox is to be used with Kexec Handover (KHO). There are many kinds anonymous file descrip

[RFC PATCH 3/5] mm: shmem: allow callers to specify operations to shmem_undo_range

2025-03-06 Thread Pratyush Yadav
In a following patch, support for preserving a shmem file over kexec handover (KHO) will be added. When a shmem file is to be preserved over KHO, its pages must be removed from the inode's page cache and kept reserved. That work is very similar to what shmem_undo_range() does. The only extra thing

[RFC PATCH 5/5] mm/memfd: allow preserving FD over FDBOX + KHO

2025-03-06 Thread Pratyush Yadav
For applications with a large amount of memory that takes time to rebuild, reboots to consume kernel upgrades can be very expensive. FDBox allows preserving file descriptors over kexec using KHO. Combining that with memfd gives those applications reboot-persistent memory that they can use to quickl

Re: The Business Loan/financing.1

2025-03-06 Thread Barry
Hello, My name is Barry at Investment Consult, we are a consultancy and brokerage Firm specializing in Growth Financial Loan and joint partnership venture. We specialize in investments in all Private and public sectors in a broad range of areas within our Financial Investment Services. We are ex

Re: [PATCH v9 1/7] ima: copy only complete measurement records across kexec

2025-03-06 Thread steven chen
On 3/5/2025 4:27 AM, Mimi Zohar wrote: On Wed, 2025-03-05 at 20:08 +0800, Baoquan He wrote: On 03/04/25 at 11:03am, steven chen wrote: Carrying the IMA measurement list across kexec requires allocating a buffer and copying the measurement records. Separate allocating the buffer and copying the