RE: [PATCH v1 1/3] x86/tdx: Check for TDX partitioning during early TDX init

2023-12-07 Thread Reshetova, Elena
> >> The TDVMCALLs are related to the I/O path (networking/block io) into the L2 > guest, and > >> so they intentionally go straight to L0 and are never injected to L1. L1 > >> is not > >> involved in that path at all. > >> > >> Using something different than TDVMCALLs here would lead to additiona

RE: [PATCH v1 1/3] x86/tdx: Check for TDX partitioning during early TDX init

2023-12-05 Thread Reshetova, Elena
> On 04/12/2023 10:17, Reshetova, Elena wrote: > >> Check for additional CPUID bits to identify TDX guests running with Trust > >> Domain (TD) partitioning enabled. TD partitioning is like nested > >> virtualization > >> inside the Trust Domain so there

RE: [PATCH v1 1/3] x86/tdx: Check for TDX partitioning during early TDX init

2023-12-04 Thread Reshetova, Elena
> Check for additional CPUID bits to identify TDX guests running with Trust > Domain (TD) partitioning enabled. TD partitioning is like nested > virtualization > inside the Trust Domain so there is a L1 TD VM(M) and there can be L2 TD > VM(s). > > In this arrangement we are not guaranteed that t

RE: [PATCH v1 1/3] x86/tdx: Check for TDX partitioning during early TDX init

2023-11-30 Thread Reshetova, Elena
> On Thu, Nov 30, 2023 at 07:08:00AM +0000, Reshetova, Elena wrote: > > ... > > 3. Normal TDX 1.0 guest that is unaware that it runs in partitioned > >environment > > 4. and so on > > There's a reason I call it a virt zoo. > > > I don’t

RE: [PATCH v1 1/3] x86/tdx: Check for TDX partitioning during early TDX init

2023-11-29 Thread Reshetova, Elena
> On Wed, Nov 22, 2023 at 06:19:20PM +0100, Jeremi Piotrowski wrote: > > Which approach do you prefer? > > I'm trying to figure out from the whole thread, what this guest is. > > * A HyperV second-level guest > > * of type TDX > > * Needs to defer cc_mask and page visibility bla... > > * need