Received: by 2002:a05:6500:1b41:b0:1fb:d597:ff75 with SMTP id cz1csp455387lqb; Tue, 4 Jun 2024 17:22:48 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCX5F8XI32p5eIUOtUjnvVKwzbIkZ27/uJHhsP6L0iVnQ26bVUmONI/1Ga6t/FYxNuvq8sHg93xxm6v1OVeFPDy6adcsU4iP/bK+6iUnQw== X-Google-Smtp-Source: AGHT+IHLbejfmQuEZ2esKobNg2Wb2p3Uhl7QHXmlC5Kgqy+4FS754kzmhGhYVWA1mEmr8qY0OidZ X-Received: by 2002:a05:6a00:1397:b0:6ed:60a4:6d9c with SMTP id d2e1a72fcca58-703e5921394mr1280373b3a.4.1717546968365; Tue, 04 Jun 2024 17:22:48 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717546968; cv=pass; d=google.com; s=arc-20160816; b=OBYRsQ5VSv2gsX8gL1tuRpegHTMfyOhQhFqBANUBBz6jrSfrj+F92Shs0Mtc2k+UfA uZel4V1lhelu0ZSAkURj+rSplDGWTmETSz+7jMJm+I3k1xk8Q+t8qFGVUQ6rMfWj9+fH UnojOSnrgSMhw7Ku5/jJmP5L3QC7/al/FwLXCPExbyeetPfdZRkiOkpA8HGHJ2jAmf8t DTOime58MZlTAIs328TPcjl9xezMJKkHAjZ510WZsnAkbUO2iiFZ2UXzqCz/CMN9GqdX 1VUJ67T2OEJT1OVBSUu7n/MnDeoe0oOWRHgrYu0g7i9qEomB+JNj8PSnZPyz/Ggb7sQo t43g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:references:subject:cc:to:from:message-id:date :content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:dkim-signature; bh=hpCCUV4aaP1BiivXQHRRLndOo67ylYV/oOZHAKOWxrU=; fh=ob5azfB9XxoxMZDgxzt241xWNaHrW/LZm1mChu2OyKk=; b=lPOaQTS9NtWih1l8j4RkUEl965zEVPFCetugPuIsJvMMCFcuTuEM/DbuC/0geOj8qM rR4HOlK+YzArYQrZkRF0MixsMSquVseVqgAYWm5Bq67BBrpVK9Py1oxy1qYpf9x/A+Hc MMT0fgz9KFopqkVC8nJ18VKht1K63RC1Y+CpjpMJP39Y+8feIlVyOgXyuV2ssdY8rWag xCycyefVTXe1NyPoaml7PR2AJveL+FEahUjv84xxG4LzsiSxFu821/Tc2ZDN8LU6JGdf YeJ8qMr2XrTD8Uh0DfKeorZLElA/HJ7ln5ZGgWP6W62akhCVgLXWwj9IH66cpyh9gC4o 5BCg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gpS8JCUP; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-201583-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-201583-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id d2e1a72fcca58-7025e39ddc5si6117482b3a.3.2024.06.04.17.22.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Jun 2024 17:22:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-201583-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gpS8JCUP; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-201583-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-201583-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id D755828462D for ; Wed, 5 Jun 2024 00:22:47 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B907F4A3D; Wed, 5 Jun 2024 00:22:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="gpS8JCUP" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CCBE92F43; Wed, 5 Jun 2024 00:22:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717546957; cv=none; b=dq0L9UNiiSB17BPhPHTW4rQ033+WkDrnlX90DuF8I5T0Oe/1+yhDtLT6YPsntsHaJcNLICrSPejRAY4jGN3kkfReyIw4cmueoAKnFJtRGAv3u1CHFO8HKA0Fdwh7VWye42l92Wi1X4KP0g2bY2SWsQHV0KxzHn8CWv95zG7VfgI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717546957; c=relaxed/simple; bh=qnHIpwOv9R+4h5FqLF1d7WUJag+t2UlUxgUBxANOKTs=; h=Mime-Version:Content-Type:Date:Message-Id:From:To:Cc:Subject: References:In-Reply-To; b=d051FWyIRdKJA6MnVHeCAYtYcpNEeJoMbcQ1Wi4BbEdaJWB99Exi0rl7WpcJJmfxtX8dweyUWDUGXkUNhbJJPko6iQescHADiV79V3dejiYtodZ7lZCQURzmP+N9vnxs6jhUnfqb2m2v/Uohd6yWfqm9tbVO10AYP5ZP2r/FiAI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=gpS8JCUP; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id D836FC2BBFC; Wed, 5 Jun 2024 00:22:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1717546956; bh=qnHIpwOv9R+4h5FqLF1d7WUJag+t2UlUxgUBxANOKTs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=gpS8JCUPVudbfLoCJNfzcfmZ6SFh99FLZs51VgiUe6UAhKbyd/FWxsSWpbDQ6dZ6c lYiex9VIlFvoQaypZgxbyZENW7OwIlJyAjjZJTPTEn6YV+LelBDlDsWsAzMRxWBUy9 XHY9yvhF057HhXTDnUu2akRiESqsW8vJd9ld4UEp0FT+NXZuAIzRiuGAXIku6/nWEm nbIv12JqGj1B6P84Wd6NSj2iYKhSbj2SJfo6ER3z8rU17A5ThjwKtEMHsGfeQ65C41 fGMihXTqPhomNMsdW+wBXfn1N7FvgBkZnzGChV/WKzb6XUrA2nol2LCOhtzah0VozP 30I243cBKrIAQ== Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=UTF-8 Date: Wed, 05 Jun 2024 03:22:27 +0300 Message-Id: From: "Jarkko Sakkinen" To: , , , , , , , , Cc: , , , , , , , , , , , , , , , , , , , , , Subject: Re: [PATCH v9 04/19] x86: Secure Launch Resource Table header file X-Mailer: aerc 0.17.0 References: <20240531010331.134441-1-ross.philipson@oracle.com> <20240531010331.134441-5-ross.philipson@oracle.com> <1eca8cb1-4b3b-402b-993b-53de7c810016@oracle.com> <249a9b27-c18d-4377-8b51-9bc610b53a8b@oracle.com> In-Reply-To: <249a9b27-c18d-4377-8b51-9bc610b53a8b@oracle.com> On Wed Jun 5, 2024 at 2:00 AM EEST, wrote: > On 6/4/24 3:36 PM, Jarkko Sakkinen wrote: > > On Tue Jun 4, 2024 at 11:31 PM EEST, wrote: > >> On 6/4/24 11:21 AM, Jarkko Sakkinen wrote: > >>> On Fri May 31, 2024 at 4:03 AM EEST, Ross Philipson wrote: > >>>> Introduce the Secure Launch Resource Table which forms the formal > >>>> interface between the pre and post launch code. > >>>> > >>>> Signed-off-by: Ross Philipson > >>> > >>> If a uarch specific, I'd appreciate Intel SDM reference here so that = I > >>> can look it up and compare. Like in section granularity. > >> > >> This table is meant to not be architecture specific though it can > >> contain architecture specific sub-entities. E.g. there is a TXT specif= ic > >> table and in the future there will be an AMD and ARM one (and hopefull= y > >> some others). I hope that addresses what you are pointing out or maybe= I > >> don't fully understand what you mean here... > >=20 > > At least Intel SDM has a definition of any possible architecture > > specific data structure. It is handy to also have this available > > in inline comment for any possible such structure pointing out the > > section where it is defined. > > The TXT specific structure is not defined in the SDM or the TXT dev=20 > guide. Part of it is driven by requirements in the TXT dev guide but=20 > that guide does not contain implementation details. > > That said, if you would like links to relevant documents in the comments= =20 > before arch specific structures, I can add them. Vol. 2D 7-40, in the description of GETSEC[WAKEUP] there is in fact a description of MLE JOINT structure at least: 1. GDT limit (offset 0) 2. GDT base (offset 4) 3. Segment selector initializer (offset 8) 4. EIP (offset 12) So is this only exercised in protect mode, and not in long mode? Just wondering whether I should make a bug report on this for SDM or not. Especially this puzzles me, given that x86s won't have protected mode in the first place... BR, Jarkko