From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id CF27CC7EE23 for ; Thu, 8 Jun 2023 23:53:53 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 6D01F6B0074; Thu, 8 Jun 2023 19:53:53 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 658366B0075; Thu, 8 Jun 2023 19:53:53 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4F8C66B0078; Thu, 8 Jun 2023 19:53:53 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 3C0286B0074 for ; Thu, 8 Jun 2023 19:53:53 -0400 (EDT) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 1A0BCC0307 for ; Thu, 8 Jun 2023 23:53:53 +0000 (UTC) X-FDA: 80881235946.11.FF0DCE4 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by imf27.hostedemail.com (Postfix) with ESMTP id E21804000E for ; Thu, 8 Jun 2023 23:53:50 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=ZSTOlITU; dmarc=pass (policy=none) header.from=intel.com; spf=none (imf27.hostedemail.com: domain of kirill.shutemov@linux.intel.com has no SPF policy when checking 192.55.52.115) smtp.mailfrom=kirill.shutemov@linux.intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1686268431; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=5paVMNYd7s6sQAM/7nLRV5/2r89Zq2TUL5SG+0bDT2Y=; b=fVavSiG5X8rn3D8iRnY/Z9nUKEWYO3iMhQNWATT76bSwKYhwaAyrCV7pAh+KyCJbavPnZ6 82xuUiulF4ZUwoiz8lNOUyvFBJtZ4YZpJa9s2j4OSvL7EwFbt4NS4/FQ47owCMEcjjJ+KI gMn40lWbYLqhHFy6zzafSBZL6gM4Yyw= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=ZSTOlITU; dmarc=pass (policy=none) header.from=intel.com; spf=none (imf27.hostedemail.com: domain of kirill.shutemov@linux.intel.com has no SPF policy when checking 192.55.52.115) smtp.mailfrom=kirill.shutemov@linux.intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1686268431; a=rsa-sha256; cv=none; b=oTnO6RHfCDpGJKic7iTNiGMWAprZLJxCjbnIY1mtAu89O9Ch7+GBLRy/3NZCmWGHah1jVj pOqLJ39scq50U6GRnxlLk1x3q9q2jwhY+I0DyjZ9GK229ElbhpyfobbGh+FOep+6uHypOb Z5Jeko2IFs1rPyyqG1Tb66wgaaiYFnU= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1686268431; x=1717804431; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=iLSjboJdek0X7Qc1YWntBo1izZe2j1frjQXUOyLlElY=; b=ZSTOlITULN6Z09ffjidrM1FZfX2bRz7Mp3TreihGnDOGSr9OWdc/Rwgq 4xo/IdvLmsn2O/7THCbkuDlT8dSf42fB/smietoXnE5kSyesvMhKMDr2E 3iK1K/LFIqqtf52Xl5rUmUMaPT+wz/jvjXP7n45uIOkLqFQ69Oe6bg6X3 SwVFqLiRj6RNf4XNS+WalUiwDfu1wZuEOPRfLQZDRJT3rPcdsrhJFWiQC +rBCoYf83UB7VhPI7csVm5F9r97i4Rqn5aZyDYt8zg6sG/Tg41P/1sVmC hpwaTxItQT/Nb2E/kk3di7zBt5bHQ/QEc8E8atVLtkOMaXkD/lXudE1fD w==; X-IronPort-AV: E=McAfee;i="6600,9927,10735"; a="357471054" X-IronPort-AV: E=Sophos;i="6.00,228,1681196400"; d="scan'208";a="357471054" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jun 2023 16:53:50 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10735"; a="834402245" X-IronPort-AV: E=Sophos;i="6.00,228,1681196400"; d="scan'208";a="834402245" Received: from fgorter-mobl.ger.corp.intel.com (HELO box.shutemov.name) ([10.252.59.89]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jun 2023 16:53:44 -0700 Received: by box.shutemov.name (Postfix, from userid 1000) id B3B18104C0F; Fri, 9 Jun 2023 02:53:41 +0300 (+03) Date: Fri, 9 Jun 2023 02:53:41 +0300 From: kirill.shutemov@linux.intel.com To: Kai Huang Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-mm@kvack.org, dave.hansen@intel.com, tony.luck@intel.com, peterz@infradead.org, tglx@linutronix.de, seanjc@google.com, pbonzini@redhat.com, david@redhat.com, dan.j.williams@intel.com, rafael.j.wysocki@intel.com, ying.huang@intel.com, reinette.chatre@intel.com, len.brown@intel.com, ak@linux.intel.com, isaku.yamahata@intel.com, chao.gao@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, bagasdotme@gmail.com, sagis@google.com, imammedo@redhat.com Subject: Re: [PATCH v11 14/20] x86/virt/tdx: Configure TDX module with the TDMRs and global KeyID Message-ID: <20230608235341.7zr2dazup7p7mjd7@box.shutemov.name> References: <4e6cd933edd2501147366df7a17e1087560a4320.1685887183.git.kai.huang@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4e6cd933edd2501147366df7a17e1087560a4320.1685887183.git.kai.huang@intel.com> X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: E21804000E X-Stat-Signature: ia7piu6sqeibfaqpunweijxo5ch3y65x X-Rspam-User: X-HE-Tag: 1686268430-321348 X-HE-Meta: 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 B6aF/09i CA/4rQaYN4MHI0Ki+ZL3wQp/KhfFjYdwmS78rx46hFRIJ5Gn6yLgayMnbDGV13UChrnsy4o9T4fZnR8ZqoywBGuH0Vl6rybURcZ9Un6C414zVg4LPhj86/4XMoL5nGzRZ59hjbEqURiu/D2UDAlwm1BUn/ECJNmSwlUqxrwbLEk5JPrE= X-Bogosity: Ham, tests=bogofilter, spamicity=0.002096, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon, Jun 05, 2023 at 02:27:27AM +1200, Kai Huang wrote: > The TDX module uses a private KeyID as the "global KeyID" for mapping > things like the PAMT and other TDX metadata. This KeyID has already > been reserved when detecting TDX during the kernel early boot. > > After the list of "TD Memory Regions" (TDMRs) has been constructed to > cover all TDX-usable memory regions, the next step is to pass them to > the TDX module together with the global KeyID. > > Signed-off-by: Kai Huang > Reviewed-by: Isaku Yamahata Reviewed-by: Kirill A. Shutemov -- Kiryl Shutsemau / Kirill A. Shutemov