TDX Module updates require userspace to select the appropriate module
to load. Expose necessary information to facilitate this decision. Two
values are needed:
- P-SEAMLDR version: for compatibility checks between TDX Module and
P-SEAMLDR
- num_remaining_updates: indicates how many updates can be performed
Expose them as tdx-host device attributes.
Note that P-SEAMLDR sysfs nodes are hidden when INTEL_TDX_MODULE_UPDATE
isn't enabled or when P-SEAMLDR isn't loaded by BIOS, both of which
cause seamldr_get_info() to return NULL.
Signed-off-by: Chao Gao <chao.gao@intel.com>
Tested-by: Farrah Chen <farrah.chen@intel.com>
---
.../ABI/testing/sysfs-devices-faux-tdx-host | 25 ++++++++
drivers/virt/coco/tdx-host/tdx-host.c | 63 ++++++++++++++++++-
2 files changed, 87 insertions(+), 1 deletion(-)
diff --git a/Documentation/ABI/testing/sysfs-devices-faux-tdx-host b/Documentation/ABI/testing/sysfs-devices-faux-tdx-host
index 18d4a4a71b80..13c1f4f9909c 100644
--- a/Documentation/ABI/testing/sysfs-devices-faux-tdx-host
+++ b/Documentation/ABI/testing/sysfs-devices-faux-tdx-host
@@ -4,3 +4,28 @@ Description: (RO) Report the version of the loaded TDX module. The TDX module
version is formatted as x.y.z, where "x" is the major version,
"y" is the minor version and "z" is the update version. Versions
are used for bug reporting, TD-Preserving updates and etc.
+
+What: /sys/devices/faux/tdx_host/seamldr/version
+Contact: linux-coco@lists.linux.dev
+Description: (RO) Report the version of the loaded SEAM loader. The SEAM
+ loader version is formatted as x.y.z, where "x" is the major
+ version, "y" is the minor version and "z" is the update version.
+ Versions are used for bug reporting and compatibility check.
+
+What: /sys/devices/faux/tdx_host/seamldr/num_remaining_updates
+Contact: linux-coco@lists.linux.dev
+Description: (RO) Report the number of remaining updates that can be performed.
+ The CPU keeps track of TCB versions for each TDX Module that
+ has been loaded. Since this tracking database has finite
+ capacity, there's a maximum number of module updates that can
+ be performed.
+
+ After each successful update, the number reduces by one. Once it
+ reaches zero, further updates will fail until next reboot. The
+ number is always zero if P-SEAMLDR doesn't support updates.
+
+ See Intel® Trust Domain Extensions - SEAM Loader (SEAMLDR)
+ Interface Specification Chapter 3.3 "SEAMLDR_INFO" and Chapter
+ 4.2 "SEAMLDR.INSTALL" for more information. The documentation is
+ available at:
+ https://cdrdv2-public.intel.com/739045/intel-tdx-seamldr-interface-specification.pdf
diff --git a/drivers/virt/coco/tdx-host/tdx-host.c b/drivers/virt/coco/tdx-host/tdx-host.c
index 968a19f4e01a..42570c5b221b 100644
--- a/drivers/virt/coco/tdx-host/tdx-host.c
+++ b/drivers/virt/coco/tdx-host/tdx-host.c
@@ -11,6 +11,7 @@
#include <linux/sysfs.h>
#include <linux/device/faux.h>
#include <asm/cpu_device_id.h>
+#include <asm/seamldr.h>
#include <asm/tdx.h>
#include <asm/tdx_global_metadata.h>
@@ -43,7 +44,67 @@ static struct attribute *tdx_host_attrs[] = {
&dev_attr_version.attr,
NULL,
};
-ATTRIBUTE_GROUPS(tdx_host);
+
+struct attribute_group tdx_host_group = {
+ .attrs = tdx_host_attrs,
+};
+
+static ssize_t seamldr_version_show(struct device *dev, struct device_attribute *attr,
+ char *buf)
+{
+ const struct seamldr_info *info = seamldr_get_info();
+
+ if (!info)
+ return -ENXIO;
+
+ return sysfs_emit(buf, "%u.%u.%u\n", info->major_version,
+ info->minor_version,
+ info->update_version);
+}
+
+static ssize_t num_remaining_updates_show(struct device *dev,
+ struct device_attribute *attr,
+ char *buf)
+{
+ const struct seamldr_info *info = seamldr_get_info();
+
+ if (!info)
+ return -ENXIO;
+
+ return sysfs_emit(buf, "%u\n", info->num_remaining_updates);
+}
+
+/*
+ * Open-code DEVICE_ATTR_RO to specify a different 'show' function for
+ * P-SEAMLDR version as version_show() is used for the TDX Module version.
+ */
+static struct device_attribute dev_attr_seamldr_version =
+ __ATTR(version, 0444, seamldr_version_show, NULL);
+static DEVICE_ATTR_RO(num_remaining_updates);
+
+static struct attribute *seamldr_attrs[] = {
+ &dev_attr_seamldr_version.attr,
+ &dev_attr_num_remaining_updates.attr,
+ NULL,
+};
+
+static umode_t seamldr_group_is_visible(struct kobject *kobj,
+ struct attribute *attr, int n)
+{
+ return seamldr_get_info() ? attr->mode : 0;
+}
+
+static struct attribute_group seamldr_group = {
+ .name = "seamldr",
+ .attrs = seamldr_attrs,
+ .is_visible = seamldr_group_is_visible,
+};
+
+static const struct attribute_group *tdx_host_groups[] = {
+ &tdx_host_group,
+ &seamldr_group,
+ NULL,
+};
static int __init tdx_host_init(void)
{
--
2.47.3
On Tue, Sep 30, 2025 at 07:52:51PM -0700, Chao Gao wrote:
> TDX Module updates require userspace to select the appropriate module
> to load. Expose necessary information to facilitate this decision. Two
> values are needed:
>
> - P-SEAMLDR version: for compatibility checks between TDX Module and
> P-SEAMLDR
> - num_remaining_updates: indicates how many updates can be performed
>
> Expose them as tdx-host device attributes.
>
> Note that P-SEAMLDR sysfs nodes are hidden when INTEL_TDX_MODULE_UPDATE
> isn't enabled or when P-SEAMLDR isn't loaded by BIOS, both of which
I don't think we need to worry about whether P-SEAMLDR is loaded or not.
The tdx-host device exists only if TDX Module is loaded, and in turn
P-SEAMLDR is loaded.
> cause seamldr_get_info() to return NULL.
>
[...]
> +static ssize_t seamldr_version_show(struct device *dev, struct device_attribute *attr,
> + char *buf)
> +{
> + const struct seamldr_info *info = seamldr_get_info();
> +
> + if (!info)
> + return -ENXIO;
> +
> + return sysfs_emit(buf, "%u.%u.%u\n", info->major_version,
> + info->minor_version,
> + info->update_version);
> +}
> +
> +static ssize_t num_remaining_updates_show(struct device *dev,
> + struct device_attribute *attr,
> + char *buf)
> +{
> + const struct seamldr_info *info = seamldr_get_info();
> +
> + if (!info)
> + return -ENXIO;
> +
> + return sysfs_emit(buf, "%u\n", info->num_remaining_updates);
> +}
> +
> +/*
> + * Open-code DEVICE_ATTR_RO to specify a different 'show' function for
> + * P-SEAMLDR version as version_show() is used for the TDX Module version.
> + */
> +static struct device_attribute dev_attr_seamldr_version =
> + __ATTR(version, 0444, seamldr_version_show, NULL);
> +static DEVICE_ATTR_RO(num_remaining_updates);
> +
> +static struct attribute *seamldr_attrs[] = {
> + &dev_attr_seamldr_version.attr,
> + &dev_attr_num_remaining_updates.attr,
> + NULL,
> +};
> +
> +static umode_t seamldr_group_is_visible(struct kobject *kobj,
> + struct attribute *attr, int n)
> +{
> + return seamldr_get_info() ? attr->mode : 0;
I feel it is a little wierd here, need some explaination why use
seamldr_get_info() for visibility. At first glance, I get the impression
that we don't expose the attributes on 1st seamldr_get_info() failure,
and if 1st read success we expose the attributes, then we return read
failure on 2nd seamldr_get_info() failure. That's the motivation I'm
trying to make the logic simpler.
As you said, the purpose of using seamldr_get_info() here is for the 2
checks:
1. If INTEL_TDX_MODULE_UPDATE is selected.
2. If P-SEAMLOAD exists.
But P-SEAMLOAD must exist in tdx-host device context. The chain of
dependency is P-SEAMLOAD->TDX Module->tdx host device.
So the logic could be simplified as "if INTEL_TDX_MODULE_UPDATE
selected, expose seamldr sysfs". A common practice maybe:
#ifdef INTEL_TDX_MODULE_UPDATE
> +static struct attribute_group seamldr_group = {
> + .name = "seamldr",
> + .attrs = seamldr_attrs,
> + .is_visible = seamldr_group_is_visible,
drop is_visible()
> +};
#endif
> +
> +static const struct attribute_group *tdx_host_groups[] = {
> + &tdx_host_group,
#ifdef INTEL_TDX_MODULE_UPDATE
> + &seamldr_group,
#endif
The #ifdef should be added for several places, which seems annoying but
may be fine for the first optional feature. Later, could solve this by
splitting the file into tdx-host/main.c tdx-host/update.c
tdx-host/connect.c ...
> + NULL,
> +};
On Wed, Jan 14, 2026 at 09:50:33AM +0800, Xu Yilun wrote:
>On Tue, Sep 30, 2025 at 07:52:51PM -0700, Chao Gao wrote:
>> TDX Module updates require userspace to select the appropriate module
>> to load. Expose necessary information to facilitate this decision. Two
>> values are needed:
>>
>> - P-SEAMLDR version: for compatibility checks between TDX Module and
>> P-SEAMLDR
>> - num_remaining_updates: indicates how many updates can be performed
>>
>> Expose them as tdx-host device attributes.
>>
>> Note that P-SEAMLDR sysfs nodes are hidden when INTEL_TDX_MODULE_UPDATE
>> isn't enabled or when P-SEAMLDR isn't loaded by BIOS, both of which
>
>I don't think we need to worry about whether P-SEAMLDR is loaded or not.
>The tdx-host device exists only if TDX Module is loaded, and in turn
>P-SEAMLDR is loaded.
Yes, you are right.
<snip>
>> +static umode_t seamldr_group_is_visible(struct kobject *kobj,
>> + struct attribute *attr, int n)
>> +{
>> + return seamldr_get_info() ? attr->mode : 0;
>
>I feel it is a little wierd here, need some explaination why use
>seamldr_get_info() for visibility. At first glance, I get the impression
>that we don't expose the attributes on 1st seamldr_get_info() failure,
>and if 1st read success we expose the attributes, then we return read
>failure on 2nd seamldr_get_info() failure. That's the motivation I'm
>trying to make the logic simpler.
>
>As you said, the purpose of using seamldr_get_info() here is for the 2
>checks:
>
> 1. If INTEL_TDX_MODULE_UPDATE is selected.
> 2. If P-SEAMLOAD exists.
>
>But P-SEAMLOAD must exist in tdx-host device context. The chain of
>dependency is P-SEAMLOAD->TDX Module->tdx host device.
Indeed, and the suggested changes below look good to me.
Thanks.
On Tue, Sep 30, 2025 at 9:55 PM Chao Gao <chao.gao@intel.com> wrote:
>
> TDX Module updates require userspace to select the appropriate module
> to load. Expose necessary information to facilitate this decision. Two
> values are needed:
>
> - P-SEAMLDR version: for compatibility checks between TDX Module and
> P-SEAMLDR
> - num_remaining_updates: indicates how many updates can be performed
>
> Expose them as tdx-host device attributes.
>
> Note that P-SEAMLDR sysfs nodes are hidden when INTEL_TDX_MODULE_UPDATE
> isn't enabled or when P-SEAMLDR isn't loaded by BIOS, both of which
> cause seamldr_get_info() to return NULL.
>
> Signed-off-by: Chao Gao <chao.gao@intel.com>
> Tested-by: Farrah Chen <farrah.chen@intel.com>
> ---
> .../ABI/testing/sysfs-devices-faux-tdx-host | 25 ++++++++
> drivers/virt/coco/tdx-host/tdx-host.c | 63 ++++++++++++++++++-
> 2 files changed, 87 insertions(+), 1 deletion(-)
>
> diff --git a/Documentation/ABI/testing/sysfs-devices-faux-tdx-host b/Documentation/ABI/testing/sysfs-devices-faux-tdx-host
Trying to apply this patch locally fails because
sysfs-devices-faux-tdx-host does not exist. There are also conflicts
around drivers/virt/coco/tdx-host/tdx-host.c.
I'm looking at the base commit specified in the cover letter [1] but
even the current head of the tsm/tdx tree [2] doesn't have the
sysfs-devices-faux-tdx-host file. Are there any other dependencies for
this series?
[1] https://git.kernel.org/pub/scm/linux/kernel/git/devsec/tsm.git/commit/?h=tdx&id=9332e088937f
[2] https://git.kernel.org/pub/scm/linux/kernel/git/devsec/tsm.git/tree/Documentation/ABI/testing?h=tdx
> index 18d4a4a71b80..13c1f4f9909c 100644
> --- a/Documentation/ABI/testing/sysfs-devices-faux-tdx-host
> +++ b/Documentation/ABI/testing/sysfs-devices-faux-tdx-host
> @@ -4,3 +4,28 @@ Description: (RO) Report the version of the loaded TDX module. The TDX module
> version is formatted as x.y.z, where "x" is the major version,
> "y" is the minor version and "z" is the update version. Versions
> are used for bug reporting, TD-Preserving updates and etc.
> +
> +What: /sys/devices/faux/tdx_host/seamldr/version
> +Contact: linux-coco@lists.linux.dev
> +Description: (RO) Report the version of the loaded SEAM loader. The SEAM
> + loader version is formatted as x.y.z, where "x" is the major
> + version, "y" is the minor version and "z" is the update version.
> + Versions are used for bug reporting and compatibility check.
> +
> +What: /sys/devices/faux/tdx_host/seamldr/num_remaining_updates
> +Contact: linux-coco@lists.linux.dev
> +Description: (RO) Report the number of remaining updates that can be performed.
> + The CPU keeps track of TCB versions for each TDX Module that
> + has been loaded. Since this tracking database has finite
> + capacity, there's a maximum number of module updates that can
> + be performed.
> +
> + After each successful update, the number reduces by one. Once it
> + reaches zero, further updates will fail until next reboot. The
> + number is always zero if P-SEAMLDR doesn't support updates.
> +
> + See Intel® Trust Domain Extensions - SEAM Loader (SEAMLDR)
> + Interface Specification Chapter 3.3 "SEAMLDR_INFO" and Chapter
> + 4.2 "SEAMLDR.INSTALL" for more information. The documentation is
> + available at:
> + https://cdrdv2-public.intel.com/739045/intel-tdx-seamldr-interface-specification.pdf
> diff --git a/drivers/virt/coco/tdx-host/tdx-host.c b/drivers/virt/coco/tdx-host/tdx-host.c
> index 968a19f4e01a..42570c5b221b 100644
> --- a/drivers/virt/coco/tdx-host/tdx-host.c
> +++ b/drivers/virt/coco/tdx-host/tdx-host.c
> @@ -11,6 +11,7 @@
> #include <linux/sysfs.h>
> #include <linux/device/faux.h>
> #include <asm/cpu_device_id.h>
> +#include <asm/seamldr.h>
> #include <asm/tdx.h>
> #include <asm/tdx_global_metadata.h>
>
> @@ -43,7 +44,67 @@ static struct attribute *tdx_host_attrs[] = {
> &dev_attr_version.attr,
> NULL,
> };
> -ATTRIBUTE_GROUPS(tdx_host);
> +
> +struct attribute_group tdx_host_group = {
> + .attrs = tdx_host_attrs,
> +};
> +
> +static ssize_t seamldr_version_show(struct device *dev, struct device_attribute *attr,
> + char *buf)
> +{
> + const struct seamldr_info *info = seamldr_get_info();
> +
> + if (!info)
> + return -ENXIO;
> +
> + return sysfs_emit(buf, "%u.%u.%u\n", info->major_version,
> + info->minor_version,
> + info->update_version);
> +}
> +
> +static ssize_t num_remaining_updates_show(struct device *dev,
> + struct device_attribute *attr,
> + char *buf)
> +{
> + const struct seamldr_info *info = seamldr_get_info();
> +
> + if (!info)
> + return -ENXIO;
> +
> + return sysfs_emit(buf, "%u\n", info->num_remaining_updates);
> +}
> +
> +/*
> + * Open-code DEVICE_ATTR_RO to specify a different 'show' function for
> + * P-SEAMLDR version as version_show() is used for the TDX Module version.
> + */
> +static struct device_attribute dev_attr_seamldr_version =
> + __ATTR(version, 0444, seamldr_version_show, NULL);
> +static DEVICE_ATTR_RO(num_remaining_updates);
> +
> +static struct attribute *seamldr_attrs[] = {
> + &dev_attr_seamldr_version.attr,
> + &dev_attr_num_remaining_updates.attr,
> + NULL,
> +};
> +
> +static umode_t seamldr_group_is_visible(struct kobject *kobj,
> + struct attribute *attr, int n)
> +{
> + return seamldr_get_info() ? attr->mode : 0;
> +}
> +
> +static struct attribute_group seamldr_group = {
> + .name = "seamldr",
> + .attrs = seamldr_attrs,
> + .is_visible = seamldr_group_is_visible,
> +};
> +
> +static const struct attribute_group *tdx_host_groups[] = {
> + &tdx_host_group,
> + &seamldr_group,
> + NULL,
> +};
>
> static int __init tdx_host_init(void)
> {
> --
> 2.47.3
>
Sagi Shahar wrote: > On Tue, Sep 30, 2025 at 9:55 PM Chao Gao <chao.gao@intel.com> wrote: > > > > TDX Module updates require userspace to select the appropriate module > > to load. Expose necessary information to facilitate this decision. Two > > values are needed: > > > > - P-SEAMLDR version: for compatibility checks between TDX Module and > > P-SEAMLDR > > - num_remaining_updates: indicates how many updates can be performed > > > > Expose them as tdx-host device attributes. > > > > Note that P-SEAMLDR sysfs nodes are hidden when INTEL_TDX_MODULE_UPDATE > > isn't enabled or when P-SEAMLDR isn't loaded by BIOS, both of which > > cause seamldr_get_info() to return NULL. > > > > Signed-off-by: Chao Gao <chao.gao@intel.com> > > Tested-by: Farrah Chen <farrah.chen@intel.com> > > --- > > .../ABI/testing/sysfs-devices-faux-tdx-host | 25 ++++++++ > > drivers/virt/coco/tdx-host/tdx-host.c | 63 ++++++++++++++++++- > > 2 files changed, 87 insertions(+), 1 deletion(-) > > > > diff --git a/Documentation/ABI/testing/sysfs-devices-faux-tdx-host b/Documentation/ABI/testing/sysfs-devices-faux-tdx-host > > Trying to apply this patch locally fails because > sysfs-devices-faux-tdx-host does not exist. There are also conflicts > around drivers/virt/coco/tdx-host/tdx-host.c. > > I'm looking at the base commit specified in the cover letter [1] but > even the current head of the tsm/tdx tree [2] doesn't have the > sysfs-devices-faux-tdx-host file. Are there any other dependencies for > this series? I hit the same head scratcher, but then realized that Chao did say that you also need to apply: https://lore.kernel.org/linux-coco/20251001022309.277238-1-chao.gao@intel.com ...so: git checkout -b $branch 9332e088937f b4 shazam 20251001022309.277238-1-chao.gao@intel.com b4 shazam 20251001025442.427697-1-chao.gao@intel.com ...works for me.
On Thu, Oct 30, 2025 at 6:05 PM <dan.j.williams@intel.com> wrote: > > Sagi Shahar wrote: > > On Tue, Sep 30, 2025 at 9:55 PM Chao Gao <chao.gao@intel.com> wrote: > > > > > > TDX Module updates require userspace to select the appropriate module > > > to load. Expose necessary information to facilitate this decision. Two > > > values are needed: > > > > > > - P-SEAMLDR version: for compatibility checks between TDX Module and > > > P-SEAMLDR > > > - num_remaining_updates: indicates how many updates can be performed > > > > > > Expose them as tdx-host device attributes. > > > > > > Note that P-SEAMLDR sysfs nodes are hidden when INTEL_TDX_MODULE_UPDATE > > > isn't enabled or when P-SEAMLDR isn't loaded by BIOS, both of which > > > cause seamldr_get_info() to return NULL. > > > > > > Signed-off-by: Chao Gao <chao.gao@intel.com> > > > Tested-by: Farrah Chen <farrah.chen@intel.com> > > > --- > > > .../ABI/testing/sysfs-devices-faux-tdx-host | 25 ++++++++ > > > drivers/virt/coco/tdx-host/tdx-host.c | 63 ++++++++++++++++++- > > > 2 files changed, 87 insertions(+), 1 deletion(-) > > > > > > diff --git a/Documentation/ABI/testing/sysfs-devices-faux-tdx-host b/Documentation/ABI/testing/sysfs-devices-faux-tdx-host > > > > Trying to apply this patch locally fails because > > sysfs-devices-faux-tdx-host does not exist. There are also conflicts > > around drivers/virt/coco/tdx-host/tdx-host.c. > > > > I'm looking at the base commit specified in the cover letter [1] but > > even the current head of the tsm/tdx tree [2] doesn't have the > > sysfs-devices-faux-tdx-host file. Are there any other dependencies for > > this series? > > I hit the same head scratcher, but then realized that Chao did say that > you also need to apply: > > https://lore.kernel.org/linux-coco/20251001022309.277238-1-chao.gao@intel.com > > ...so: > > git checkout -b $branch 9332e088937f > b4 shazam 20251001022309.277238-1-chao.gao@intel.com > b4 shazam 20251001025442.427697-1-chao.gao@intel.com > > ...works for me. Thanks, I missed that one. It's working now
© 2016 - 2026 Red Hat, Inc.