Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp6417383ioo; Thu, 2 Jun 2022 06:10:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxePHichPVBBs9Mm9PhXtMPxNWV1pzwHckyGsi2rgICxMjSmEahWYiXTQYEeblFhEf+lA4f X-Received: by 2002:a17:906:804a:b0:70c:1dac:9bb8 with SMTP id x10-20020a170906804a00b0070c1dac9bb8mr1350261ejw.92.1654175403363; Thu, 02 Jun 2022 06:10:03 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1654175403; cv=pass; d=google.com; s=arc-20160816; b=Yc5e0U35OeNEXb0Fo3VLTtI1OydlIdy1GFiKO3ls5ToKUpPUd4Q5wm2oTbkeLExIXr X7APFWCYKAUPCf2hVJQNDAHlX0H2x0WbU3yxL11TEP60nzlFMx/M1I/0HNuJOv7DPqP+ SZdvdnLuafw5dylWRYSVO1aEBkGydJVLItDT567K3+LklFvDA8eHi6biJzDKfgo+bbQy jBijDD8gsVIEfIjS8DHKnBQ4tNcxWLowDejVE/6WJEcTuJuI3ytIdsttNVkiGn5M6rld /ov26nGKmG4LhRBxafzVHOCEGXy27G5/arGVt3/U1ujZ/9C07kOYz57my2Yb9MJwZ8VE CDMw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=tl5Jw+UulbKqEMtgUT3K2V354kKV5SSHEf74OZxYd5E=; b=xoqR51XdNBv30ef0OsyQ8QjwTUe+HUdHEs/DFAnIO57IdTAFq5E+1o/7LLXgFsE+CQ bhrCNCG92G2L5+9HkgbiyRcZk3+FTz6FwIzeiT00SZtyzT8/biUWRH9YcMYaJ/UjG/OG Qg6oouUH9lqa8klNrXfnGavhz5/sBt019CVn0CWMq8mfkdm19Ocd7r2gv3BjzmiDE3l9 vsJejf+3SJl3CTcVj98kUBvFDbRVkwwCFAD/xzpIq7+2nToYtpzv/HowkzmnycUzWECM TOIAW5l7phGyLp5qxTeOyyhvK784GYpzTd5Pmt9/uNvfN/rOKq77lmWAA72YRBUydJAa mD+A== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@iki.fi header.s=meesny header.b=gVIvyyFh; arc=pass (i=1); spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o14-20020a056402038e00b0042dd179c25bsi4292611edv.623.2022.06.02.06.09.24; Thu, 02 Jun 2022 06:10:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@iki.fi header.s=meesny header.b=gVIvyyFh; arc=pass (i=1); spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234412AbiFBLtL (ORCPT + 99 others); Thu, 2 Jun 2022 07:49:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42766 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233722AbiFBLs5 (ORCPT ); Thu, 2 Jun 2022 07:48:57 -0400 Received: from meesny.iki.fi (meesny.iki.fi [IPv6:2001:67c:2b0:1c1::201]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 358212B1D42; Thu, 2 Jun 2022 04:48:54 -0700 (PDT) Received: from localhost (91-154-92-55.elisa-laajakaista.fi [91.154.92.55]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: sakkinen) by meesny.iki.fi (Postfix) with ESMTPSA id B102C20050; Thu, 2 Jun 2022 14:48:51 +0300 (EEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=meesny; t=1654170531; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=tl5Jw+UulbKqEMtgUT3K2V354kKV5SSHEf74OZxYd5E=; b=gVIvyyFheZVOW68udFbl3Qpp9M7jjcbWm9FiuKuldUA0wBr/wcvKOh6oKSlm0FoFCrGc0G lsOlYPhv+Htk32XWaDLY8BMfz1Jnnqwv08tgZW6pNc7J1LCWEyUaQoUcrTB+nmUKwkfWEj JxvXIkollSXLISgj1FALNvEyep0VQpE= Date: Thu, 2 Jun 2022 14:47:02 +0300 From: Jarkko Sakkinen To: Brijesh Singh Cc: x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-efi@vger.kernel.org, platform-driver-x86@vger.kernel.org, linux-coco@lists.linux.dev, linux-mm@kvack.org, linux-crypto@vger.kernel.org, Thomas Gleixner , Ingo Molnar , Joerg Roedel , Tom Lendacky , "H. Peter Anvin" , Ard Biesheuvel , Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Andy Lutomirski , Dave Hansen , Sergio Lopez , Peter Gonda , Peter Zijlstra , Srinivas Pandruvada , David Rientjes , Dov Murik , Tobin Feldman-Fitzthum , Borislav Petkov , Michael Roth , Vlastimil Babka , tony.luck@intel.com, npmccallum@redhat.com, brijesh.ksingh@gmail.com Subject: Re: [PATCH Part2 RFC v4 04/40] x86/sev: Add the host SEV-SNP initialization support Message-ID: References: <20210707183616.5620-1-brijesh.singh@amd.com> <20210707183616.5620-5-brijesh.singh@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210707183616.5620-5-brijesh.singh@amd.com> ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=iki.fi; s=meesny; t=1654170531; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=tl5Jw+UulbKqEMtgUT3K2V354kKV5SSHEf74OZxYd5E=; b=ePgDehaSBHMbAUeRp95u13p4p8R22l6vqZ0Y7PeMjozqI0sCl7tMMSg7fa+Rj8EsK12Dq9 Q7NAMreqVW2DSqoiku0beXey8bOa/CKisFZf3su1o1Em6zHYFfxJIU+ZuM+wjtgiMaLuei EBgApVVinLsgcmdA6hz+r0XtTmGpcfw= ARC-Authentication-Results: i=1; ORIGINATING; auth=pass smtp.auth=sakkinen smtp.mailfrom=jarkko.sakkinen@iki.fi ARC-Seal: i=1; s=meesny; d=iki.fi; t=1654170531; a=rsa-sha256; cv=none; b=LC1JwZgfmfj/q89WJnmLomXZ9I33E8D3pncYsBCxYXrtbfkGKulazshKvHVgPXgYyOeUvZ oWMRAL0kUm5nnedlv5afvZAt1bUMzvZNHXZE7+RfG1jmq5cNNtqWJfwl2OhNbt7c2V12yD aaXkQguiVODIdoopJVtYpj7pyRE7tp8= X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Wed, Jul 07, 2021 at 01:35:40PM -0500, Brijesh Singh wrote: > The memory integrity guarantees of SEV-SNP are enforced through a new > structure called the Reverse Map Table (RMP). The RMP is a single data > structure shared across the system that contains one entry for every 4K > page of DRAM that may be used by SEV-SNP VMs. The goal of RMP is to > track the owner of each page of memory. Pages of memory can be owned by > the hypervisor, owned by a specific VM or owned by the AMD-SP. See APM2 > section 15.36.3 for more detail on RMP. > > The RMP table is used to enforce access control to memory. The table itself > is not directly writable by the software. New CPU instructions (RMPUPDATE, > PVALIDATE, RMPADJUST) are used to manipulate the RMP entries. What's the point of throwing out a set of opcodes, if there's no explanation what they do? BR, Jarkko