[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <68394ef8f2b36_3e701007d@dwillia2-xfh.jf.intel.com.notmuch>
Date: Thu, 29 May 2025 23:23:53 -0700
From: Dan Williams <dan.j.williams@...el.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>, <dan.j.williams@...el.com>
CC: <linux-coco@...ts.linux.dev>, <linux-kernel@...r.kernel.org>
Subject: Re: [GIT PULL] Trusted Security Manager (TSM) updates for 6.16
Linus Torvalds wrote:
> On Thu, 29 May 2025 at 17:59, <dan.j.williams@...el.com> wrote:
> >
> > ...to receive shared infrastructure updates for confidential computing.
>
> Do we have a sane name for this? The pull request calls it "TSM" and
> writes it out as "trusted security manager", your intro calls it
> "shared infrastructure updates for confidential computing", and the
> MAINTAINER entry calls it "trusted security module" (note the
> different word for the 'M').
>
> Making things even worse, Intel also uses "TSM", but in Intel docs,
> the "T" stands not for "Trusted", but for "TEE", which in turn is a
> recursive TLA meaning "Trusted Execution Environment".
>
> Yes, I've complained about odd TLA's before, but TSM really takes the
> odd to a new level.
>
> I've pulled this, and I've used "TSM" in the pull message, but I
> really think this TLA disease needs to end.
>
> Let's have a rule that TLA's are ok _only_ for things that
>
> (a) go back at least four decades
>
> (b) have a basically unambiguous meaning in the industry (let's
> ignore IBM that made up their own naming)
>
> (c) when you google them, they give relevant results
>
> So, for example, talking about a "TLB" entry is ok by all three rules,
> and a TTY is similarly not a bad word.
>
> "TSM" fulfills _none_ of these.
>
> Please? I know you work for Intel and you probably signed some
> paperwork saying that a certain percentage of words you use have to be
> TLA's, but please ... We can do better.
Intel TLA disease is real.
Also, it is funny, in a sad way, because some of these patches
originated in a series where I spend some paragraphs explaining the
absolute silliness of the acronym soup in this space [1], but then here
failed to respect that "TSM" continues to be close to useless as search
engines fail to find it.
I note that "TSM" is used in the new "security protocol" sections of the
PCIe specification. However, that specification being a members-only
accessible document does not help at all with the discoverability
problem.
Suffice to say "TSM" is the term the PCIe specifications ascribes to all
of the various architecture specific firmware/firmware-ish modules
(Intel TDX, AMD SEV, RISC-V COVE, ARM CCA...) that can touch the "secure
world" of the platform. I.e. setup confidential memory MMU or IOMMU
ptes, and talk the PCIe protocols to setup link encryption between host
bridges and Endpoints.
...but unless and until that becomes wider knowledge I agree that it
should be spelled out with references to where the heck it comes from
and quick reminder of what it is [2].
[1]: https://lore.kernel.org/all/173343739517.1074769.13134786548545925484.stgit@dwillia2-xfh.jf.intel.com/
[2]: PCIe r6.2 Section 11:
"The TEE Security Manager (TSM) is a logical entity in a host that
is in the Trusted Computing Base (TCB) for a Trusted Execution
Environment Virtual Machine (TVM) and enforces security policies
on the host."
Powered by blists - more mailing lists