From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0040.outbound.protection.outlook.com [104.47.40.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 17F6121D2E634 for ; Wed, 23 Aug 2017 05:20:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector1-amd-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=a1xsqvS31ryoYBnlQepiFNy7YR3E9rrDKKCWw1l0SNo=; b=rxR3p0FGRiyJdzz5nbqF7uguYHjojB3NHJ87ehLifViKcrn+osmXuFDEqIGLMlkzR4e+f6PkuQlnmcvwqMKbWEARQaRD6rhFdn4UR8S2RI1Fx5sljHRHyhgst9Z5svwhFsY4+nbQq5VLjxG7pYaFc9Q0DtXHQJjwaJsOs8hfywg= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=brijesh.singh@amd.com; Received: from brijesh-build-machine.amd.com (165.204.77.1) by DM2PR12MB0155.namprd12.prod.outlook.com (2a01:111:e400:50ce::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1362.18; Wed, 23 Aug 2017 12:23:05 +0000 From: Brijesh Singh To: edk2-devel@lists.01.org Cc: Brijesh Singh , Ard Biesheuvel , Jordan Justen , Tom Lendacky , Laszlo Ersek Date: Wed, 23 Aug 2017 08:22:41 -0400 Message-Id: <1503490967-5559-18-git-send-email-brijesh.singh@amd.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1503490967-5559-1-git-send-email-brijesh.singh@amd.com> References: <1503490967-5559-1-git-send-email-brijesh.singh@amd.com> MIME-Version: 1.0 X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: DM5PR12CA0069.namprd12.prod.outlook.com (2603:10b6:3:103::31) To DM2PR12MB0155.namprd12.prod.outlook.com (2a01:111:e400:50ce::18) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 8cb5c258-df26-42e4-4e6c-08d4ea21b516 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254152)(48565401081)(300000503095)(300135400095)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:DM2PR12MB0155; X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0155; 3:hDruoq8fetSIcD9q68/jxHu+oxwFUt5kSRfRNPApMY/mNGvOAoyHdf+VI62cT+jSaQji6TFAsB7zxPtsv1/03bfbOWZFbj+s3G/PDP83XfICD4dvAuEfOdNisSk/eLkcTfLdj/9TNULN9TMjfwJjXWHIV9ZGLFQbMrNLPCP8fTTXjZOx+22S4pV3krA/RiS7yFR1AKAEA9q2MXHhf3+8o0CpuoCNirytIir7lHMQ4sRWh/4OpwqQlFiUsqG6XDCM; 25:omq6UkeWfLLM18GLV6xPSna80i/MKuShPmi7dx7d0h5+q++x+v/vARY/CUgo5fGr31QjbLFLnPIw2iti7Mpi7DPCIDUC2wZng0VRfLDRi+ATaQ07SiqSgzXSfnT+MqtISeaJgp5myNbjXYwdjwRAxmFfBybaLyFSeCxpecOnlr5B53CGYcGWI08PnSR6l8yjgX4z+PYRI5zVK6UnH8uVW5+kxtdTK0P43lqhFnChe/Oyamx8ZjxgEaBrucP1Pdi3M889RxzUY3S3jsYgi7hxAtMB/q6b1vnApYdlztcax7dpPqXE7ndyU9XWiaXL/EJ1KVt8P/nilb6swnIdbKN94Q==; 31:rkAwqI5B4oK1xvLeUzWWaJ19ApnV5cLEvlFTSoYXeVcrkC6kJelVseJndkePAcvbPYDaOP58WXq4ECwUBFr8pz7Ykn/7PRruJAd3p0XDzDkE9wB0z2bw/vQBkoiIqvCbqIhSRmwL687+BXJjVqN5IQ6PZL2XhfeJerfPJPjKfDSKAg+0V96q4LyYVr22chIKcueuy2NiDq/lELijAPcYcXZI68NdIrng0HYgT/mtNLQ= X-MS-TrafficTypeDiagnostic: DM2PR12MB0155: X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0155; 20: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; 4:AfIb+dTX6ky6VbZCnV9Wrr08bT31itjJJ3BOOSQUipx4BgndazJH2w0UN7+UExeoJ+RmnqOs9Y2NGfyXsqQO5Ao+FXJm9E6EH0nJYAXCE7yptMfPfc6jpoYF0nIOadySP1SiyQ72WBmSlVvIMKTbWvKWwU0ovLrawDe6yBBV1bzaSpFN5A339yC8hAGzumSAWSV/um8vu05GshQr4l9+Lwjtzt+gEj/QmVc/DDGm75M7b5gQGFzVILwbY4NBwQ2vE/cdVh+nTZHBSpEJfZWQJPkSlx8QWKcwOFMe7SUBPd//aqrgqW/SJOC7KnMkf0rBs8pPHKwgAqTkDKpUATcmlg== X-Exchange-Antispam-Report-Test: UriScan:(767451399110)(228905959029699); X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(3002001)(6055026)(6041248)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123560025)(20161123564025)(20161123558100)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:DM2PR12MB0155; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:DM2PR12MB0155; X-Forefront-PRVS: 040866B734 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(7370300001)(4630300001)(6009001)(39860400002)(189002)(199003)(575784001)(305945005)(47776003)(97736004)(101416001)(110136004)(6666003)(189998001)(478600001)(7736002)(3846002)(66066001)(5003940100001)(6116002)(6486002)(48376002)(86362001)(105586002)(2950100002)(4326008)(106356001)(36756003)(6916009)(50466002)(2906002)(50226002)(42186005)(2351001)(33646002)(53416004)(25786009)(7350300001)(81156014)(76176999)(5660300001)(68736007)(54906002)(8676002)(53936002)(50986999)(81166006)(2361001); DIR:OUT; SFP:1101; SCL:1; SRVR:DM2PR12MB0155; H:brijesh-build-machine.amd.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; Received-SPF: None (protection.outlook.com: amd.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DM2PR12MB0155; 23:mOubQM2k/YYU23Vs1HHXpjY6UNzQqGsH5XgKniAUZ?= =?us-ascii?Q?ydN4y166ZoZLcZQKED10bFBEnako/tt1mr4XiNbygYw9e7vgwmmhnQDMxy2b?= =?us-ascii?Q?vRto6hZGBb4cz0MTh2jlq17MD8jxUxHOV+rJ3FGhLfLnGPIqemKLqNN7NqRl?= =?us-ascii?Q?2NbJETyUgiAm+i4rbTvW5ePDMXxA5dGKj7IbYCruhDOdOsDMhYHWNP0835jn?= =?us-ascii?Q?vSnYWqvs3x4jMlUTc1TWnEpTl+KV4JBIz6gE6o3wcLBf8LvxWj04y3J2Maf6?= =?us-ascii?Q?MZPbT3PBKxluk3W63AjSZBE6Z9Te7vbGE2X7WhMLGK/tActjttAQ4t1aAwih?= =?us-ascii?Q?WvbDyQpaZgi8rYTzuTA5xSb0+aFhqhd6hvjv2fzIwfxCJ1/Foo9SPHondmvZ?= =?us-ascii?Q?x218ezzVkRv1Xw9XHw5ggSVK7K5OKQSd3WAYcGWWOClJHB29hU+ZlvUUgn/+?= =?us-ascii?Q?cGfW7/waG+zSmd+jE/o4d0LUTLcNdg/Fee5uTU5ULtJ+2SANifXH9AfECACi?= =?us-ascii?Q?LkK8yUWyTpgi6qjAJR9muUbE9HQuT96Kj2A/wGn8kxe5Ig2ftndzOCF/08IC?= =?us-ascii?Q?9raRPKxDRMCNRpuZXLKxoB66/AsQbdYy9q691tdiZPZVDGCkP8tM9aazCUXf?= =?us-ascii?Q?xLnLkJIeEWKKNbDKKkd9x6vC89G7ahSqLpCSaVkvLXNK85FZf4tLKPvRynUs?= =?us-ascii?Q?tC6TsaKsQZJ0l7OGJ3fCCq4lqSc9aI3jb0EtfDnaCNLcULcqIz960vDzW2Nz?= =?us-ascii?Q?H6o8PDFSiwxSrFoZA00vvxtgT/9leg75djp/M8X0D0tdoGk27Uf7FGf5lpBY?= =?us-ascii?Q?J4EnoOy9X331JGWaQWjjY8N2++iJxL9N/qeRGE30hiS1Hrq4vJBgfvGjWn89?= =?us-ascii?Q?lZJ4rZ+yMBySfNb3Zzw/z4Csyr218ZlqG45B9Nu+GQ/+FJIIDC6MfNrz34Dy?= =?us-ascii?Q?mM1QxCuCwWIuxWfTp43Ff7nQ2dL5ROa1mG7JF3FveZTfqCB9Z9YfpHma0s9l?= =?us-ascii?Q?go8m67CmKnGBCcJOhgmW0kabRQpFMgeM6vuZZe7mjKZV4SDAlrGsnR3eF93E?= =?us-ascii?Q?nq82S4FbrTXDJsuZVu5Z8otl9jTKehn9BlqaPUkcp27LBobR8OabCJXMqrTP?= =?us-ascii?Q?bH7Odu0ObJZhU3P0BYababcICzyXBaHTemHMkO638f6y8kbLcvPL6PEZhH/B?= =?us-ascii?Q?KIXRrYyFlXJ0Ns=3D?= X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0155; 6:RdMee4fyFgwZTKPuUb0GXX4tCwwaEeCKFrZH/JvNl6sluiey2bUTV/Av5Ox0ImqnmLCVid7H/qRhfLWjlK0IGXZFvgMCW0iqYIZPVFYqww5T6RI7Z7feY7IEU+cYkvm1bULJB6yrTj5IvAnPGUnlqF6eFwwb7FrsOaGROc5rMw/PtKNAGw+R6j/3WF6+AheevU6j5LFcVRoIA6ZR3bJtA4qqjFm7qgtg2A4OWv35Lt41r7yWpDVx01vIw2vumT/ohDECOV8z7WQeXBOkewYHi3TIF08T+Sfog6utmweyh9140elkR8sofsLRHw2xV6/JscZ2+yp66dxVZnwGD7+GhQ==; 5:MJyrIinvHco2oVCc5OwcQx6oVX6k1I/1gPyxW3LZP4N+Susk+iYPHNP2COHMz4NrieAJ9Evl/gaOrUiTUnuTgRPrEH75LAuSxBKMxjLX6e7p/OcbP0z+WlT7WPeE6N+2rGiAYon/1pAtrORQsFzfSw==; 24:EMO5we3i1rMsnGC+X2knVnOwrJ3JbPdsLAqxbqr5SenQ9Ls0yLJuLSKAn0hoHPjejjXM8YLYRuNqdgfHguh6oQQGTpLwNEm9iX+zAZquK4E=; 7:vwfuAfbao6S0XZyrnt+EYqjJyV/GaDPomLK3Sbg6wteIUA2MidQU+L+B40IPvrXaDbwhykh1DNA35QddQwBjhWI0nqXiZAxj9gPNlypwsqwgKvakU+o0YB0b+djAjFgdypmjwXdWFepq/tSOTcPRL+G0p51lGioJjUCa0vp1CLrWoT1vmfzkMPD9fVHz9/gxTfsFIeRBnryEAHHCkEy4mrrViJWmKjvPmgMmBxN9crU= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DM2PR12MB0155; 20:cVGfHQPQDA5GWKTeB2ZSrH52QptSEdwfZsybR59coAYTlFkiPXoeBuEnScr/dizyJMVGyVO0Y9S6WpB1y8fKo6ARylCaTEU5KCmgvpRrwGFrVhGrKLbs04yDuOPNhN6VeUcYMR8czr7D5Dm+iCYMwgCbpAtvLZxqm9ndK/0P+zxpBFkk22xkMEq6pLQtaBwG8fyyWvFHcsUzgCZxXoENk13jNMq+Bv0MKS5s0KJGuTXolUEM5iUTXNLH1zj9oWYE X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Aug 2017 12:23:05.7323 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM2PR12MB0155 Subject: [PATCH v3 17/23] OvmfPkg/VirtioNetDxe: dynamically alloc transmit header X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Aug 2017 12:20:36 -0000 Content-Type: text/plain A network packets are transmitted by placing them into a transmit queue, each packet is preceded by a VIRTIO_1_0_NET_REQ header. VirtioNetInitTx(), builds the header once and fills the vring descriptors with the system physical address of the VIRTIO_1_0_NET_REQ header. The patch uses VirtIo->AllocateSharedPages() to allocate the header buffer and map it with BusMasterCommonBuffer so that it can be equally accessed by both processor and device. We could map it with BusMasterRead but since the header pointer is used after it was added into vring hence I choose to dynamically allocate it and map it with BusMasterCommonBuffer to avoid the code complexity. Cc: Ard Biesheuvel Cc: Jordan Justen Cc: Tom Lendacky Cc: Laszlo Ersek Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Brijesh Singh --- OvmfPkg/VirtioNetDxe/VirtioNet.h | 3 +- OvmfPkg/VirtioNetDxe/Events.c | 6 ++ OvmfPkg/VirtioNetDxe/SnpInitialize.c | 65 +++++++++++++++++--- OvmfPkg/VirtioNetDxe/SnpSharedHelpers.c | 7 +++ 4 files changed, 72 insertions(+), 9 deletions(-) diff --git a/OvmfPkg/VirtioNetDxe/VirtioNet.h b/OvmfPkg/VirtioNetDxe/VirtioNet.h index 7df51bd044f5..3efe95a735d8 100644 --- a/OvmfPkg/VirtioNetDxe/VirtioNet.h +++ b/OvmfPkg/VirtioNetDxe/VirtioNet.h @@ -94,7 +94,8 @@ typedef struct { UINT16 TxMaxPending; // VirtioNetInitTx UINT16 TxCurPending; // VirtioNetInitTx UINT16 *TxFreeStack; // VirtioNetInitTx - VIRTIO_1_0_NET_REQ TxSharedReq; // VirtioNetInitTx + VIRTIO_1_0_NET_REQ *TxSharedReq; // VirtioNetInitTx + VOID *TxSharedReqMap; // VirtioMapSharedBuffer UINT16 TxLastUsed; // VirtioNetInitTx } VNET_DEV; diff --git a/OvmfPkg/VirtioNetDxe/Events.c b/OvmfPkg/VirtioNetDxe/Events.c index 0586a82cdf09..9366aa00a1b3 100644 --- a/OvmfPkg/VirtioNetDxe/Events.c +++ b/OvmfPkg/VirtioNetDxe/Events.c @@ -101,4 +101,10 @@ VirtioNetExitBoot ( // device is reset. // Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->RxBufMap); + + // + // Unmap shared Tx request mapping so that hypervisor will not be able to get + // readable data after device is reset. + // + Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->TxSharedReqMap); } diff --git a/OvmfPkg/VirtioNetDxe/SnpInitialize.c b/OvmfPkg/VirtioNetDxe/SnpInitialize.c index bdc3fd7ac6a2..3d4eb70aa630 100644 --- a/OvmfPkg/VirtioNetDxe/SnpInitialize.c +++ b/OvmfPkg/VirtioNetDxe/SnpInitialize.c @@ -18,6 +18,7 @@ **/ #include +#include #include #include @@ -151,8 +152,12 @@ VirtioNetInitTx ( IN OUT VNET_DEV *Dev ) { - UINTN TxSharedReqSize; - UINTN PktIdx; + UINTN TxSharedReqSize; + UINTN PktIdx; + EFI_STATUS Status; + EFI_PHYSICAL_ADDRESS DeviceAddress; + UINT64 BufBaseShift; + VOID *TxSharedReqBuffer; Dev->TxMaxPending = (UINT16) MIN (Dev->TxRing.QueueSize / 2, VNET_MAX_PENDING); @@ -164,24 +169,60 @@ VirtioNetInitTx ( } // + // Allocate TxSharedReq header and map with BusMasterCommonBuffer so that it + // can be accessed equally by both processor and device. + // + Status = Dev->VirtIo->AllocateSharedPages ( + Dev->VirtIo, + EFI_SIZE_TO_PAGES (sizeof *(Dev->TxSharedReq)), + &TxSharedReqBuffer + ); + if (EFI_ERROR (Status)) { + return EFI_OUT_OF_RESOURCES; + } + + Status = VirtioMapAllBytesInSharedBuffer ( + Dev->VirtIo, + VirtioOperationBusMasterCommonBuffer, + TxSharedReqBuffer, + sizeof *(Dev->TxSharedReq), + &DeviceAddress, + &Dev->TxSharedReqMap + ); + if (EFI_ERROR (Status)) { + Status = EFI_OUT_OF_RESOURCES; + goto FreeBuffer; + } + + Dev->TxSharedReq = TxSharedReqBuffer; + + BufBaseShift = (UINT64) (UINTN)Dev->TxSharedReq - (UINT64) DeviceAddress; + + ZeroMem ((VOID *) Dev->TxSharedReq, sizeof *(Dev->TxSharedReq)); + + // // In VirtIo 1.0, the NumBuffers field is mandatory. In 0.9.5, it depends on // VIRTIO_NET_F_MRG_RXBUF, which we never negotiate. // TxSharedReqSize = (Dev->VirtIo->Revision < VIRTIO_SPEC_REVISION (1, 0, 0)) ? - sizeof Dev->TxSharedReq.V0_9_5 : - sizeof Dev->TxSharedReq; + sizeof ((Dev->TxSharedReq)->V0_9_5) : + sizeof *(Dev->TxSharedReq); for (PktIdx = 0; PktIdx < Dev->TxMaxPending; ++PktIdx) { UINT16 DescIdx; + UINT64 Address; DescIdx = (UINT16) (2 * PktIdx); Dev->TxFreeStack[PktIdx] = DescIdx; + Address = (UINTN) Dev->TxSharedReq; + Address += BufBaseShift; + // // For each possibly pending packet, lay out the descriptor for the common // (unmodified by the host) virtio-net request header. // - Dev->TxRing.Desc[DescIdx].Addr = (UINTN) &Dev->TxSharedReq; + Dev->TxRing.Desc[DescIdx].Addr = Address; Dev->TxRing.Desc[DescIdx].Len = (UINT32) TxSharedReqSize; Dev->TxRing.Desc[DescIdx].Flags = VRING_DESC_F_NEXT; Dev->TxRing.Desc[DescIdx].Next = (UINT16) (DescIdx + 1); @@ -196,13 +237,13 @@ VirtioNetInitTx ( // // virtio-0.9.5, Appendix C, Packet Transmission // - Dev->TxSharedReq.V0_9_5.Flags = 0; - Dev->TxSharedReq.V0_9_5.GsoType = VIRTIO_NET_HDR_GSO_NONE; + Dev->TxSharedReq->V0_9_5.Flags = 0; + Dev->TxSharedReq->V0_9_5.GsoType = VIRTIO_NET_HDR_GSO_NONE; // // For VirtIo 1.0 only -- the field exists, but it is unused // - Dev->TxSharedReq.NumBuffers = 0; + Dev->TxSharedReq->NumBuffers = 0; // // virtio-0.9.5, 2.4.2 Receiving Used Buffers From the Device @@ -217,6 +258,14 @@ VirtioNetInitTx ( *Dev->TxRing.Avail.Flags = (UINT16) VRING_AVAIL_F_NO_INTERRUPT; return EFI_SUCCESS; + +FreeBuffer: + Dev->VirtIo->FreeSharedPages ( + Dev->VirtIo, + EFI_SIZE_TO_PAGES (sizeof *(Dev->TxSharedReq)), + (VOID *) Dev->TxSharedReq + ); + return Status; } diff --git a/OvmfPkg/VirtioNetDxe/SnpSharedHelpers.c b/OvmfPkg/VirtioNetDxe/SnpSharedHelpers.c index 4c9d9ece0790..aeb9e6605f0d 100644 --- a/OvmfPkg/VirtioNetDxe/SnpSharedHelpers.c +++ b/OvmfPkg/VirtioNetDxe/SnpSharedHelpers.c @@ -54,5 +54,12 @@ VirtioNetShutdownTx ( IN OUT VNET_DEV *Dev ) { + Dev->VirtIo->UnmapSharedBuffer (Dev->VirtIo, Dev->TxSharedReqMap); + Dev->VirtIo->FreeSharedPages ( + Dev->VirtIo, + EFI_SIZE_TO_PAGES (sizeof *(Dev->TxSharedReq)), + (VOID *) Dev->TxSharedReq + ); + FreePool (Dev->TxFreeStack); } -- 2.7.4