From: "James Bottomley" <jejb@linux.ibm.com>
To: devel@edk2.groups.io, jiewen.yao@intel.com
Cc: "dovmurik@linux.vnet.ibm.com" <dovmurik@linux.vnet.ibm.com>,
"Dov.Murik1@il.ibm.com" <Dov.Murik1@il.ibm.com>,
"ashish.kalra@amd.com" <ashish.kalra@amd.com>,
"brijesh.singh@amd.com" <brijesh.singh@amd.com>,
"tobin@ibm.com" <tobin@ibm.com>,
"david.kaplan@amd.com" <david.kaplan@amd.com>,
"jon.grimm@amd.com" <jon.grimm@amd.com>,
"thomas.lendacky@amd.com" <thomas.lendacky@amd.com>,
"frankeh@us.ibm.com" <frankeh@us.ibm.com>,
"Dr . David Alan Gilbert" <dgilbert@redhat.com>,
Laszlo Ersek <lersek@redhat.com>,
"Justen, Jordan L" <jordan.l.justen@intel.com>,
Ard Biesheuvel <ard.biesheuvel@arm.com>
Subject: Re: [edk2-devel] [PATCH v3 6/6] OvmfPkg/AmdSev: Expose the Sev Secret area using a configuration table
Date: Wed, 09 Dec 2020 07:54:54 -0800 [thread overview]
Message-ID: <2975e120c1764f9a3f26c0c74a23b1ddc161c4ad.camel@linux.ibm.com> (raw)
In-Reply-To: <e0edf3ac7ebc8e5a22f798fdd9bef8b6d172751b.camel@linux.ibm.com>
On Wed, 2020-12-09 at 07:46 -0800, James Bottomley wrote:
> On Wed, 2020-12-09 at 12:02 +0000, Yao, Jiewen wrote:
> > Would you please take a look at intel-tdx-guest-hypervisor-
> > communication-interface, section 4.4 storage volume key data.
OK, I read through the spec.
> > We defined multiple key layout, key type and key format. Please let
> > us know if you have any thought.
>
> I really think the standard GUIDed form:
>
> GUID|len|data
>
> Works best because a GUID is big enough to define for any number of
> uses and it also means we don't have to define key types or anything,
> because all a new consumer has to do is define their data structure
> and give it a guid. The single uefi config table is passed through
> to all the elements until it gets to one that recognizes the GUID.
The only other thing I would add here, is that you have indirect ACPI
tables whereas the above is direct. I think indirect might be useful
at the low level for scatter gather injection if it has to be done for
the architecture, but I think to make it easier for the consumers above
OVMF we gather all the information into on GUIDed table with no
indirection, which makes the above GUIDed form the best description.
James
next prev parent reply other threads:[~2020-12-09 15:55 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-11-30 20:28 [PATCH v3 0/6] SEV Encrypted Boot for Ovmf James Bottomley
2020-11-30 20:28 ` [PATCH v3 1/6] OvmfPkg/ResetVector: convert SEV-ES Reset Block structure to be GUIDed James Bottomley
2020-12-03 8:10 ` [edk2-devel] " Laszlo Ersek
2020-11-30 20:28 ` [PATCH v3 2/6] OvmfPkg/Amdsev: Base commit to build encrypted boot specific OVMF James Bottomley
2020-12-03 8:20 ` [edk2-devel] " Laszlo Ersek
2020-11-30 20:28 ` [PATCH v3 3/6] OvmfPkg/AmdSev: add Grub Firmware Volume Package James Bottomley
2020-12-03 8:39 ` [edk2-devel] " Laszlo Ersek
2020-11-30 20:28 ` [PATCH v3 4/6] OvmfPkg: create a SEV secret area in the AmdSev memfd James Bottomley
2020-12-03 8:42 ` [edk2-devel] " Laszlo Ersek
2020-11-30 20:28 ` [PATCH v3 5/6] OvmfPkg/AmdSev: assign and protect the Sev Secret area James Bottomley
2020-12-01 7:54 ` Ard Biesheuvel
2020-12-01 18:36 ` [edk2-devel] " James Bottomley
2020-11-30 20:28 ` [PATCH v3 6/6] OvmfPkg/AmdSev: Expose the Sev Secret area using a configuration table James Bottomley
2020-12-03 8:46 ` [edk2-devel] " Laszlo Ersek
2020-12-09 12:02 ` Yao, Jiewen
2020-12-09 15:46 ` James Bottomley
2020-12-09 15:54 ` James Bottomley [this message]
2020-12-09 16:33 ` Yao, Jiewen
2020-12-09 16:38 ` James Bottomley
2020-12-09 16:51 ` Yao, Jiewen
2020-12-09 17:04 ` James Bottomley
2020-12-10 9:12 ` Laszlo Ersek
2020-12-10 9:27 ` Yao, Jiewen
2020-12-01 8:05 ` [PATCH v3 0/6] SEV Encrypted Boot for Ovmf Ard Biesheuvel
2020-12-01 8:13 ` Laszlo Ersek
2020-12-01 15:26 ` James Bottomley
2020-12-01 8:05 ` Laszlo Ersek
2020-12-03 12:26 ` [edk2-devel] " Laszlo Ersek
2020-12-03 14:27 ` James Bottomley
2020-12-04 0:46 ` Laszlo Ersek
2020-12-04 1:05 ` James Bottomley
2020-12-04 1:55 ` Laszlo Ersek
2020-12-04 2:01 ` Laszlo Ersek
2020-12-14 19:57 ` Laszlo Ersek
2020-12-21 15:00 ` Laszlo Ersek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2975e120c1764f9a3f26c0c74a23b1ddc161c4ad.camel@linux.ibm.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox