From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (NAM10-MW2-obe.outbound.protection.outlook.com [40.107.94.63]) by mx.groups.io with SMTP id smtpd.web11.4296.1596829463594213517 for ; Fri, 07 Aug 2020 12:44:23 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=Xxf4/QBy; spf=none, err=SPF record not found (domain: amd.com, ip: 40.107.94.63, mailfrom: thomas.lendacky@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GDPZOfeDM7wsu5FlePLkzuONJb3vV8Ug8/0J+unJuoaEzP5ZT4Yv7a/iQCrmmQphNHaNiODwemSWGNeFiXqZP6U+Od/izRFk8S5mgUiBT/M3q3bQg+f/p2KzTGKXSFuLaA2qE4lJF2/gTb3eOGvBHvaeXQZDuz1wbxltP9oPjmZTp4hoTPqElxNUNQMRdw7jHOypRJHrlrD+R+0wGxyIepuqmKQuzEyvZytVwCrZTBy0yWbjW4p6WGBrrLyM/ii+KlEdIU5+MILMpWIZQgwhRrxcgYx52gMGectzukgcHwEX1RmXbcWup+58u9gpXvHXOMvE53AjW3CHxc+9SuQV9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TjAY63iLn0C9S3DzH549SsJshW3SZE3x2r3RtZTyabw=; b=gwYhJCR+1khS+M6dp5EGb743bIs1bYUxYKv8exRtr1YhDFFizN5kV19frEU5lPgw5W+ljdH1S1yzjFjkpKF0zAlVfJcbLC+1UGm/7sa4Hrr2zKTVKe614+TJoj/+ZJ9N4fHY/ujEXpNCxpA8VEsxnpcLqsWCaMjz5P69QCZK/bgsxEosEh6egRCPFFDmKD3r9oI3kniyQLz84jppv3BAFzgYz4Iei/Kdbsa310pL16ofSgoGPPI5Wel9PkCEg8oHbZ4mA59XUvxAghTuwG+mM8YHakZ5DFO4eWcapUvqpGcmY8GV9pcyHKCfrmG5ez26fII1W0jPHmO+yBEtbsjbyA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TjAY63iLn0C9S3DzH549SsJshW3SZE3x2r3RtZTyabw=; b=Xxf4/QBy86P0UZe8wU1VYhl5Bszs3ET5c75ZW6YIPqwG/e7xuiuXJXqElXXJxv5toyVmMNzi2algbjk0+SLCtuDY39ZqEspuC3Dm9FD5uIz8VF2qK3j3NxdSj5oGo9bOX1dR9bp6S7Rf6xw+BDWAqqGS3mTKSPd64L5wycXV1Ws= Authentication-Results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=amd.com; Received: from CY4PR12MB1352.namprd12.prod.outlook.com (2603:10b6:903:3a::13) by CY4PR12MB1798.namprd12.prod.outlook.com (2603:10b6:903:11a::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3261.19; Fri, 7 Aug 2020 19:44:22 +0000 Received: from CY4PR12MB1352.namprd12.prod.outlook.com ([fe80::9181:78bf:bf0:702b]) by CY4PR12MB1352.namprd12.prod.outlook.com ([fe80::9181:78bf:bf0:702b%5]) with mapi id 15.20.3239.024; Fri, 7 Aug 2020 19:44:22 +0000 From: "Lendacky, Thomas" To: devel@edk2.groups.io CC: Brijesh Singh , Ard Biesheuvel , Eric Dong , Jordan Justen , Laszlo Ersek , Liming Gao , Michael D Kinney , Ray Ni Subject: [PATCH v14 34/46] OvmfPkg: Reserve a page in memory for the SEV-ES usage Date: Fri, 7 Aug 2020 14:39:19 -0500 Message-ID: <837d7c1a293469566ed3253ff1573c634d74332e.1596829170.git.thomas.lendacky@amd.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: References: X-ClientProxiedBy: SN4PR0601CA0001.namprd06.prod.outlook.com (2603:10b6:803:2f::11) To CY4PR12MB1352.namprd12.prod.outlook.com (2603:10b6:903:3a::13) Return-Path: thomas.lendacky@amd.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from tlendack-t1.amd.com (165.204.77.1) by SN4PR0601CA0001.namprd06.prod.outlook.com (2603:10b6:803:2f::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3261.19 via Frontend Transport; Fri, 7 Aug 2020 19:44:21 +0000 X-Mailer: git-send-email 2.27.0 X-Originating-IP: [165.204.77.1] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 7fcd2233-750b-4a68-e685-08d83b0a4831 X-MS-TrafficTypeDiagnostic: CY4PR12MB1798: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:8882; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: PNuNaG7swDfKprCWhvMDBL1/9OQR/Q4dhtt+1Qg62jxhCPW/pOwwuPG5eou12J1ENSsQbAQE5D+uY47gBRY8+KXVN8qSU1cQLO75Qc/y5gQdIvCDLgtONQxuKfCZh1rSN25iJu5+9mj/BNcxYoM+m0QefKMsSv6jjvIRDZbb7/JPlrUivL1KP5gDjZzlpfp40khi4GfekwQU2X/BIl9NXh8imBXoKzTax1v+Hjv0Y7t3zWO/cuxVX6Uk2RrT9I3Z8G4SKj2j2Wgmt5dwLn4dHF3Bz7xVgPrq8sN3aaC2QeHPc9eUoniAV37jmcNy+WOf5lIqXbPQ9E/Y/0iwwdabLxHFWdpOyGUN+YsDqTaf2tbulq7dUrz3+ONU0U5AgJoQDNb6XosQhAm51HgARrEuO6knwuBBguq6oO9D6pnbreq0KCN7j0Yh6d/EQguKJvNbahRdjZj7ZH9NMxjajTaA0Q== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CY4PR12MB1352.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(4636009)(376002)(136003)(366004)(39860400002)(346002)(396003)(4326008)(19627235002)(66946007)(6486002)(2906002)(66556008)(66476007)(5660300002)(966005)(478600001)(8676002)(7696005)(26005)(8936002)(16526019)(186003)(86362001)(956004)(6916009)(36756003)(2616005)(52116002)(316002)(54906003)(83380400001)(136400200001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 7fcd2233-750b-4a68-e685-08d83b0a4831 X-MS-Exchange-CrossTenant-AuthSource: CY4PR12MB1352.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 07 Aug 2020 19:44:22.1975 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Xwxqa+z+Wu0I9MLfusBitv/JUflofrwjsqHaAXD7W6Gcro4QS6UUT/wYnIto9v6Pac1TaxCscFGm+2rRt9lMcA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1798 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable From: Tom Lendacky BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2198 Reserve a fixed area of memory for SEV-ES use and set a fixed PCD, PcdSevEsWorkAreaBase, to this value. This area will be used by SEV-ES support for two purposes: 1. Communicating the SEV-ES status during BSP boot to SEC: Using a byte of memory from the page, the BSP reset vector code can communicate the SEV-ES status to SEC for use before exception handling can be enabled in SEC. After SEC, this field is no longer valid and the standard way of determine if SEV-ES is active should be used. 2. Establishing an area of memory for AP boot support: A hypervisor is not allowed to update an SEV-ES guest's register state, so when booting an SEV-ES guest AP, the hypervisor is not allowed to set the RIP to the guest requested value. Instead an SEV-ES AP must be re-directed from within the guest to the actual requested staring location as specified in the INIT-SIPI-SIPI sequence. Use this memory for reset vector code that can be programmed to have the AP jump to the desired RIP location after starting the AP. This is required for only the very first AP reset. Cc: Jordan Justen Cc: Laszlo Ersek Cc: Ard Biesheuvel Reviewed-by: Laszlo Ersek Signed-off-by: Tom Lendacky --- OvmfPkg/OvmfPkgX64.fdf | 3 +++ 1 file changed, 3 insertions(+) diff --git a/OvmfPkg/OvmfPkgX64.fdf b/OvmfPkg/OvmfPkgX64.fdf index edb03b5464d4..8da59037e5f0 100644 --- a/OvmfPkg/OvmfPkgX64.fdf +++ b/OvmfPkg/OvmfPkgX64.fdf @@ -82,6 +82,9 @@ [FD.MEMFD] 0x009000|0x002000 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|gUefiOvmfPkgTokenSpaceGuid.P= cdOvmfSecGhcbSize =20 +0x00B000|0x001000 +gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase|gUefiCpuPkgTokenSpaceGuid.P= cdSevEsWorkAreaSize + 0x010000|0x010000 gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpace= Guid.PcdOvmfSecPeiTempRamSize =20 --=20 2.27.0