On Thu, Jul 11, 2019 at 08:19:32PM -0500, Michael Roth wrote: > These patches are also available at: > > https://github.com/mdroth/qemu/commits/spapr-tpm-hcall-v0 > > This patchset implements the H_TPM_COMM hypercall, which provides a way > for an Ultravisor to pass raw TPM commands on to a host's TPM device, > either directly or through a TPM Resource Manager (needed to support > multiple guests). > > Secure Guests running on an Ultravisor have a symmetric key that is > encrypted using a public key that is bound to a trusted host's TPM > hardware. This hypercall provides a means to decrypt the symmetric > key on behalf of a Secure Guest using the host's TPM hardware. > > More details are provided in the spec summary introduced in patch 1.
This is obviously 4.2 material, other comments on the individual patches. > > docs/specs/ppc-spapr-uv-hcalls.txt | 74 > ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > hw/ppc/Makefile.objs | 1 + > hw/ppc/spapr.c | 27 +++++++++++++++++++++++++++ > hw/ppc/spapr_hcall_tpm.c | 135 > +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > hw/ppc/trace-events | 4 ++++ > include/hw/ppc/spapr.h | 7 ++++++- > 6 files changed, 247 insertions(+), 1 deletion(-) > > -- David Gibson | I'll have my music baroque, and my code david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_ | _way_ _around_! http://www.ozlabs.org/~dgibson
Description: PGP signature