From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mx.groups.io with SMTP id smtpd.web10.52330.1683783429590269771 for ; Wed, 10 May 2023 22:37:09 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=IFzzgZEZ; spf=pass (domain: intel.com, ip: 134.134.136.100, mailfrom: ray.ni@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1683783429; x=1715319429; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=TOm4jHqUeVuuZA3Rvd2ZYpGqM7ZC1q4ljrrXBxe7Pcw=; b=IFzzgZEZN7KRPgtRhIuGUPMZUk2T+97IzGCyVQhob7zBFY5KfFWKy/f9 vhcxYX/ZZG5+MAyKJLFhX0co8MUSfqgWLrsNPmuburI13t57ka0hdqosA FreKFJ+P/hRgTNav03yuzHI58eJWh7hDqwGtIViSxzQs0c33HoqNbMxMf 0rz+7fmR5pQ7IkPcnYIbs2Y1stG4NlpbevqpeWdiPnUF5Z2/ljm20+32G Z+g3N4dDdj20HgZVfTYF9fhmiSv+fci3vq6QE2hRTqXE8ru3xR3kCMOCV gmd5nsYGaepIfdIhrNPrHwSpNZEHyePbPQUlOlNXvyII8ElhMOmoaItx+ w==; X-IronPort-AV: E=McAfee;i="6600,9927,10706"; a="415990687" X-IronPort-AV: E=Sophos;i="5.99,266,1677571200"; d="scan'208";a="415990687" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 May 2023 22:37:08 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10706"; a="843788513" X-IronPort-AV: E=Sophos;i="5.99,266,1677571200"; d="scan'208";a="843788513" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmsmga001.fm.intel.com with ESMTP; 10 May 2023 22:37:08 -0700 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Wed, 10 May 2023 22:37:07 -0700 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23 via Frontend Transport; Wed, 10 May 2023 22:37:07 -0700 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.169) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.23; Wed, 10 May 2023 22:36:28 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=je5wSFDEJ5op+CQCzLskYEdOOY9JqQtsc7GqvrZoMK6vnYeqfutnGch8shb3Wp3yo9SVqbW3C+wOYrQOLYE2buZy9ZrFjYRCsSUdr4g9YPVs8Mqem60RPkWhDIxEQP75omYIX/7bBMeuN+Euk1XEdYWB/Zv4i8rkvm4n2jkmKcV5QbkqLfoPzURk1KkDq9s9zrc2A9ZjcevKC7dHZnsvQ3Ce3m2YGZRPiuaPFElDof3ji+VPHA7TbNniRVsjl3nsK6jA4VM9ZYCi4xEnB2ft+WVlmlr5906R9Da8q+AcRR95tpDomJLiGIpS9Gwt/1RQxfJTBy0qt6ebPWxYuarhKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lKmGw5JEZ4dz57nEOK63VgUMRJejXiOepyzYtYiWlas=; b=UsaQH2Sp9XKbSGxJP43V5UfSThZk0TmkS9c6tNaGGE3Otcg1ghkVl3LxkqHUwGsDSaSqpuQBb2SU09MRs5j3qOtNJcNV8eTJurYRErUn0+AdJloSIiuPF2gcvDjQa+YquZv2OOS1Ug4m1b8Hn4F7UiE2mizLWEBbdzy9QmqQ6z+XHsWG42C4MJlCK5+hc21dwqB24Dl770JpliVj9IRiDEHHjTHiktLxDQyF+PzXwzK9OBSJLa3EZGOu/WQUYyXC3eYpjW7HEDYSNexSHs2ClDbn3Rq3oxBuyK1h0204cr//GhfaIDy91fpKpqAoeMGvc+blIWUmeFvvEq2EA+DJ/A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MN6PR11MB8244.namprd11.prod.outlook.com (2603:10b6:208:470::14) by LV8PR11MB8558.namprd11.prod.outlook.com (2603:10b6:408:1ed::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6387.18; Thu, 11 May 2023 05:36:21 +0000 Received: from MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::892b:b8e6:bab7:635d]) by MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::892b:b8e6:bab7:635d%5]) with mapi id 15.20.6363.032; Thu, 11 May 2023 05:36:21 +0000 From: "Ni, Ray" To: "kraxel@redhat.com" , "devel@edk2.groups.io" , "Kinney, Michael D" CC: "Wu, Jiaxin" , "Dong, Eric" , "Zeng, Star" , "Kumar, Rahul R" Subject: Re: [edk2-devel] [PATCH v1 1/3] UefiCpuPkg/SecCore: Migrate page table to permanent memory Thread-Topic: [edk2-devel] [PATCH v1 1/3] UefiCpuPkg/SecCore: Migrate page table to permanent memory Thread-Index: AQHZgmBA2axaambWnE2b6Jc8et0F4q9SA0SAgADK0bCAAFTEgIABbMNw Date: Thu, 11 May 2023 05:36:21 +0000 Message-ID: References: <20230509102253.16632-1-jiaxin.wu@intel.com> <20230509102253.16632-2-jiaxin.wu@intel.com> In-Reply-To: Accept-Language: en-US X-Mentions: michael.d.kinney@intel.com X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MN6PR11MB8244:EE_|LV8PR11MB8558:EE_ x-ms-office365-filtering-correlation-id: 4aa3862d-9afe-4375-b432-08db51e1a6c5 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN6PR11MB8244.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(346002)(136003)(396003)(376002)(366004)(39860400002)(451199021)(2906002)(478600001)(186003)(7696005)(71200400001)(26005)(82960400001)(6506007)(41300700001)(122000001)(9686003)(55016003)(316002)(53546011)(83380400001)(38100700002)(33656002)(54906003)(38070700005)(110136005)(107886003)(66446008)(4326008)(6636002)(66946007)(64756008)(76116006)(66556008)(66476007)(86362001)(5660300002)(8676002)(8936002)(52536014);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?kO3fke0tT/JZ8csN7WessibchXa4edGESwAA2z7jS+dkEDpJ6tX8wj1xxLuK?= =?us-ascii?Q?2suI/iUD+J/E6ol5rAj7pBqVwQ0D1uHU4ITyu6EWzYC1YzuoAJX9U8KYHHmS?= =?us-ascii?Q?asE3g7WNh5MBCzrvEwsiJFuUI/VPGQea/22zb7sDee82KLQ08UWpa6WeU1ES?= =?us-ascii?Q?f/0os0Q2ChMzjuPXy5YY9pzw8wqOd2UIQB9b9dwqIbaQbpPVep2rRXKF4RAn?= =?us-ascii?Q?rdKSRq17WoYOG1W1AzrDL6d3MRlQ8RseHaEAPMXwWpXx1nPeKbN8P2bFVkV3?= =?us-ascii?Q?9LhNbUln7jpbzfpFqMDkGGVtoiOaB4gGxW4+MOFyjNa0p3/YUz+Jpy9RYGCQ?= =?us-ascii?Q?1jmm6j789q2LrsJ0rr9fu1WSddYiDAE55WcXmUOLqw6XvpUjpDGCo8EnfLWn?= =?us-ascii?Q?MHlv0MI1g1k4yV2XeNWMLC4XWgFEmoh8+h7cM5RwJ8CykapQzi0LquKJ3Pdg?= =?us-ascii?Q?ef+WzTeOXzAabfr7ixR1lpxiJl4Amav9brR83sWrLCLsay6fK2US5LaiQANh?= =?us-ascii?Q?Cyd4Sa7XePSSaZdNACVEAEHr1+BYn0u4+IBvjqjOzhQACj0DmeMSWYiOS2D9?= =?us-ascii?Q?LvgKYma7PMaxYDKyw6w0cX3bm4q2A9wE++/hyInwKe9r1ddtu2GbPEeGh7Dy?= =?us-ascii?Q?iXdaGF6jNNXwBaOAjvvxw0ou1eVrUr7NEIbygL92hi143Eb/3IQ/hfxwOkBW?= =?us-ascii?Q?Y/B7MiVFI6s9IdsaU1U6GZeJOtl0EYpFojB3t0vM3e+JH3meUgqWgaSa26e7?= =?us-ascii?Q?CAp1v9Nu6ArXh6xkP2/qOU8xMNcAFuo76i4x7wCFHoe9zOHhV2UuYrAx5uyh?= =?us-ascii?Q?gZvVsB36usW6W54NgSrrAUplGZjCgZXPxLxNrEPkzag75O8XYUdDtnH5dabo?= =?us-ascii?Q?BwEviUUfrtu2NNVhRh2U5npy/5Nhi7epMIBOJunzKHiziNdGNxnBosC+kamF?= =?us-ascii?Q?xI/KFx4Mcivh/BLNTL44DRBSgK5UHlj2k79seHtl10d7TieSqefqNkhft8W5?= =?us-ascii?Q?jrl80JkGSPq7WzF8RYeD9x81JhLl2XwOhJcRQVaTAbFTDDuM0Brbp8y40XLg?= =?us-ascii?Q?1h7Na9RCyRpaalDcpwcaMiyCw+eAnyOaRQ5mPRyfajbSkupQlTRxDcG+8CeG?= =?us-ascii?Q?3XqyzWmY28VBYAktczIuRtMZ4RZ/+IlmjLFzbTT/jNHyfH6tcENFGgeiYYvQ?= =?us-ascii?Q?4zObvYx7a9dXyOhJRtQKG3BEl/dtH/4yuygH+r0LoYpscYePPUOBhSXIiGX9?= =?us-ascii?Q?r69EPRCrVonQ1NuxqNLn1sqwU3292DDrDPlbuMbLywpnJVdIAJiZRWf1QqAY?= =?us-ascii?Q?NqeKbgS+Rf9lLs/7BTZgokWQb5Pr3pj6GEXuFmejOh+e0Z5u6oelQRxu4mgP?= =?us-ascii?Q?szoFgPDgEMqF6GW0yNbluz31yzOW7/Mfl4rW7TZSwT/yT1RS2A2HzTOSt4ZP?= =?us-ascii?Q?7vQQ6pVw72I64qIsRclVudT2TgaI/S6wUSHsxAuL5rGKI2DbGRZ1y6Rjw92d?= =?us-ascii?Q?tdaCCSkWIDNZYWUZQw5kvqf/r14Ko1XvTWn1etfaruB4yOqDP6zOTLCcNFCe?= =?us-ascii?Q?K/8ePwbwoTTe4i1gz+8=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MN6PR11MB8244.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4aa3862d-9afe-4375-b432-08db51e1a6c5 X-MS-Exchange-CrossTenant-originalarrivaltime: 11 May 2023 05:36:21.0307 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Mo44H0Nf6nNMm3jX8QcvIzhF0lLKdT9An22hY8/wqcHgI5fjFrBmcT1XKeajerh/IRkFBdEcvrJ4SXd+hqPW+A== X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV8PR11MB8558 Return-Path: ray.ni@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable > -----Original Message----- > From: kraxel@redhat.com > Sent: Wednesday, May 10, 2023 3:48 PM > To: devel@edk2.groups.io; Ni, Ray > Cc: Wu, Jiaxin ; Dong, Eric ; Z= eng, > Star ; Kumar, Rahul R > Subject: Re: [edk2-devel] [PATCH v1 1/3] UefiCpuPkg/SecCore: Migrate page > table to permanent memory >=20 > On Wed, May 10, 2023 at 02:48:52AM +0000, Ni, Ray wrote: > > Gerd, > > My understanding is that when code dereferences memory address, the cod= e > itself is responsible for > > supplying the sign-extended linear address. > > The page table creation logic still maps the entire linear memory space > supported by the CPU. > > > > Why do you think covering the half of the space is better? >=20 > edk2 boot services operate on the assumption that everything is identity > mapped, only runtime services know the concept of virtual addresses. >=20 > The lower half of the address space can be identity-mapped (virtual > address =3D=3D physical address). The upper half can not, so I think it'= s > better for efi boot services to restrict themself to the lower half. Good point. I am convinced that 4-level paging only maps up to 2^47 address= and 5-level only maps up to 2^56 address. +@Kinney, Michael D, if he have other thoughts. >=20 > take care, > Gerd