From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-ej1-f43.google.com (mail-ej1-f43.google.com [209.85.218.43]) by mx.groups.io with SMTP id smtpd.web10.219.1667925810256367797 for ; Tue, 08 Nov 2022 08:43:30 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@google.com header.s=20210112 header.b=q7+2gzDc; spf=pass (domain: google.com, ip: 209.85.218.43, mailfrom: dionnaglaze@google.com) Received: by mail-ej1-f43.google.com with SMTP id n12so40045132eja.11 for ; Tue, 08 Nov 2022 08:43:29 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=oRswAikbQk5QLhBvRmku/uPQCvoyoP/GT+axBg8VOP4=; b=q7+2gzDcLXQc6kKzJuEPMxLrnVxvRmlcpvElNNBVslSBvpvLUQaN22Mm/U+vqybM7f QYTvribKOMSDWpaLHlkFUfYbBw+MXQ/FVdOe0WJ8V11YoDKMtYFoUI9FETNB+ErUshT3 7b09bA29vLHb8wrfZbXb33NXFCRbNXSIc4EZFVdRY6N6NSCLm1SEreIQH/s+RY08mXos txo+XU0nugG2CiLdBjQDZE4q1mXuO6fSXUCcCBWv82XN1Kwvj+aBvv+0ZosI7W+qAYvn Bhfdl/MVmuzmg3/CPUZV//fb06jvuDtEhB5IWulYN+GV0NqRyjS/aMU2HlhXNk3ZDCLf 41Qw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=oRswAikbQk5QLhBvRmku/uPQCvoyoP/GT+axBg8VOP4=; b=k0gkUl8Nrp0y5pTbnjQuKZhlJfh9jkRSGq4ilside4pEtyLHfyI5fXF5YTbg1aGVg7 S/LvQj4+RWy7Ssaytn95zJTnSkx3mbP1s7f0v4sOENqSi9W27uI7wn1WpgitsjHgTXpy ssfM2T42AcJbmTcn2wcPcSHaNg2oe0siQtAXgowQwc/rwlxxjGWVqOCXgMBSJfeiKw5S hHjWbxnD1yCu3l/K+qIA2vUzzPJ1AatLnX7QAXFd0W12CaJu2/HCbRBjJGWEoTS5zfDH JUZM8PkZIR8YAnizXmfLykSaF5TVRhz++kyqAbjFlRbizjfA+xmTxN/h9F+s8BECssnG SKpQ== X-Gm-Message-State: ACrzQf00GjEprBBiQtKFXQ4ugOLf3HypF3oKwxW/WmGa1ZK15ap0jgCU dSDnxU7I7/RjpJrlTs/Z2Prl7ceU9yTqlnw3NK0eOw== X-Google-Smtp-Source: AMsMyM7YZ4IsNoz+n52UHhMmc2LFeFbsD3ANjtpEDJ4UPmPTgHupT9VAchOvxPjHYAEzCf4o9+8sVkHO0GdtzG9VgKA= X-Received: by 2002:a17:907:971c:b0:7ad:7d51:8c10 with SMTP id jg28-20020a170907971c00b007ad7d518c10mr29252404ejc.473.1667925808561; Tue, 08 Nov 2022 08:43:28 -0800 (PST) MIME-Version: 1.0 References: <20221024204114.2772064-1-dionnaglaze@google.com> In-Reply-To: From: "Dionna Glaze" Date: Tue, 8 Nov 2022 08:43:17 -0800 Message-ID: Subject: Re: [edk2-devel] [PATCH v8 0/7] Add safe unaccepted memory behavior To: "Yao, Jiewen" Cc: "devel@edk2.groups.io" , "thomas.lendacky@amd.com" , Ard Biescheuvel , "Xu, Min M" , Gerd Hoffmann , James Bottomley , "Aktas, Erdem" , Andrew Fish , "Kinney, Michael D" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable > > BTW: Is there any data for AMD-SEV? > Earlier this year, I tried to make the lazy accept patches work for SEV-SNP, but the boot would always crash in the Qemu try boot kernel step IIRC: https://github.com/AMDESE/ovmf/pull/4 Tom suggested accepting the first 4GiB and I didn't go back to try to make the more complicated solution work, since accepting the HOB up to the MMIO hole took roughly 30ms, which is well within our boot budget given the outsized cost of pinning memory. The launch sequence (start, update_data*, finish) for OVMF takes about 190ms, which we can't make any lower. > > Thank you > Yao, Jiewen > > > > -----Original Message----- > > From: Dionna Amalie Glaze > > Sent: Wednesday, November 9, 2022 12:23 AM > > To: Yao, Jiewen > > Cc: devel@edk2.groups.io; thomas.lendacky@amd.com; Ard Biescheuvel > > ; Xu, Min M ; Gerd Hoffmann > > ; James Bottomley ; Aktas, > > Erdem ; Andrew Fish ; > > Kinney, Michael D > > Subject: Re: [edk2-devel] [PATCH v8 0/7] Add safe unaccepted memory > > behavior > > > > On Tue, Nov 8, 2022 at 8:09 AM Yao, Jiewen wrote= : > > > > > > Hi Tom/Dionna > > > I think this patch is addressing > > https://bugzilla.tianocore.org/show_bug.cgi?id=3D3987. > > > > > > For patch 1~3, I am OK for the API which we already agreed, such as > > EfiMemoryAcceptProtocol and > > EFI_EVENT_GROUP_BEFORE_EXIT_BOOT_SERVICES. > > > I have given Acked by: Jiewen Yao > > > > > > For patch 4, it changed the behavior to accept all. I don=E2=80=99t b= elieve it should > > be 4. It should be the latest one. (please correct me if I am wrong.) > > > > > > > The acceptance protocol (5-6) and the accept-all behavior (4) could be > > swapped in order, but they really only make sense as a pair. No client > > would use a new protocol to disable the behavior of something that > > doesn't happen. > > The accept-all behavior (4) must be default before SEV-SNP introduces > > unaccepted memory (7). > > > > > For patch 5~6, I cannot give R-B for > > BZ3987_MEMORY_ACCEPTANCE_PROTOCAL proposed here because it does > > not address my concern. Please refer to the discussion in the Bugzilla. > > > > > > > I don't think your concern is addressable given the constraints of a > > smooth upgrade path. I think the right folks to discuss this with you > > from the Intel side are Min Xu and Kirill Shutemov. Kirill will know > > what is feasible for the OS to inform the UEFI of in terms of memory > > required, and how to not break OSes that don't use the new protocol, > > whereas Min should know where that kind of information should be > > communicated. > > > > > > > > If you want to split the patch series and submit 1~3 as standalone on= e, > > that will match SEV to TDX on lazy accept part. I believe we may merge > > them after we get R-B from right person. > > > > > > > I can do that. > > > > > Thank you > > > Yao, Jiewen > > > > > > > > > > -----Original Message----- > > > > From: devel@edk2.groups.io On Behalf Of > > > > Lendacky, Thomas via groups.io > > > > Sent: Tuesday, November 8, 2022 10:38 PM > > > > To: Dionna Glaze ; devel@edk2.groups.io > > > > Cc: Ard Biescheuvel ; Xu, Min M > > ; > > > > Gerd Hoffmann ; James Bottomley > > > > ; Yao, Jiewen ; Aktas, > > Erdem > > > > ; Andrew Fish ; Kinney, > > > > Michael D > > > > Subject: Re: [edk2-devel] [PATCH v8 0/7] Add safe unaccepted memory > > > > behavior > > > > > > > > On 10/24/22 15:41, Dionna Glaze wrote: > > > > > These seven patches build on the lazy-accept patch series > > > > > > > > > > "Introduce Lazy-accept for Tdx guest" > > > > > > > > Since the above series was accepted into the EDK2 tree, can this se= ries > > > > also be pulled in so that both TDX and SNP can support unaccepted > > > > memory > > > > in the same release? > > > > > > > > Thanks, > > > > Tom > > > > > > > > > > > > > > by adding SEV-SNP support for the MemoryAccept protocol, and > > > > > importantly making eager memory acceptance the default behavior. > > > > > > > > > > We implement a standardized event group from UEFI v2.9, > > > > > EFI_EVENT_GROUP_BEFORE_EXIT_BOOT_SERVICES, since it provides > > > > exactly > > > > > the right invocation point for eagerly accepting memory if eager > > > > > acceptance has not been disabled. > > > > > > > > > > To make use of this event group, we add a new driver that is mean= t to > > > > > carry behavior that is needed for all confidential compute > > technologies, > > > > > not just specific platforms, CocoDxe. In CocoDxe we implement the > > > > > default safe behavior to accept all unaccepted memory and invalid= ate > > > > > the MemoryMap on ExitBootServices. > > > > > > > > > > To allow the OS loader to prevent the eager acceptance, we add a = new > > > > > protocol, up for standardization, > > AcceptAllUnacceptedMemoryProtocol. > > > > > This protocol has one interface, Disable(). The OS loader can inf= orm > > the > > > > > UEFI that it supports the unaccepted memory type and accepts the > > > > > responsibility to accept it. > > > > > > > > > > All images that support unaccepted memory must now locate and cal= l > > > > this > > > > > new BZ3987_ACCEPT_ALL_UNACCEPTED_MEMORY_PROTOCOL and > > call > > > > the Disable > > > > > function. > > > > > > > > > > Changes since v7: > > > > > - Rebased onto lazy accept v4 patch series, so memory accept > > protocol > > > > > has the EDKII prefix, and the unaccepted memory type has the > > BZ3937 > > > > > prefix. > > > > > - Removed a bad #include to a header removed in v7. > > > > > - Renamed the protocol to > > BZ3987_MEMORY_ACCEPTANCE_PROTOCOL > > > > as per the > > > > > discussion on the buganizer issue. > > > > > - Uncrustify formatting > > > > > > > > > > Changes since v6: > > > > > - Added implementation of > > > > EFI_EVENT_GROUP_BEFORE_EXIT_BOOT_SERVICES. > > > > > - Changed callback protocol of v5 to instead use the standardiz= ed > > event > > > > > group for before_exit_boot_services. > > > > > > > > > > Changes since v5: > > > > > - Generic callback protocol moved to MdeModulePkg > > > > > - Removed use of EFI_WARN_STALE_DATA and added comment that > > the > > > > callback > > > > > should only return EFI_SUCCESS or EFI_INVALID_PARAMETER. > > > > > - Removed errant log statement and fixed formatting. > > > > > > > > > > Changes since v4: > > > > > - Commit message wording > > > > > - Replaced direct change to DxeMain with a more generic callbac= k > > > > > protocol. > > > > > - Implemented the direct change as an instance of the callback > > protocol > > > > > from a new CocoDxe driver. > > > > > - Replaced "enable" protocol with a "disable" protocol, since t= he > > name > > > > > was confusing. The AcceptAllUnacceptedMemory protocol directl= y > > > > names > > > > > the behavior that is disabling. > > > > > > > > > > Changes since v3: > > > > > - "DxeMain accepts all memory" patch split into 3 to make each > > patch > > > > > affect only one package at a time. > > > > > > > > > > Changes since v2: > > > > > - Removed the redundant memory accept interface and added the > > accept > > > > > behavior to the DXE implementation of > > > > > MemEncryptSevSnpPreValidateSystemRam. > > > > > - Fixed missing #include in >=3D4GB patch. > > > > > > > > > > Changes since v1: > > > > > - Added a patch to classify SEV-SNP memory above 4GB unaccepted= . > > > > > - Fixed style problems in EfiMemoryAcceptProtocol implementatio= n. > > > > > > > > > > Cc: Ard Biescheuvel > > > > > Cc: "Min M. Xu" > > > > > Cc: Gerd Hoffmann > > > > > Cc: James Bottomley > > > > > Cc: Tom Lendacky > > > > > Cc: Jiewen Yao > > > > > Cc: Erdem Aktas > > > > > Cc: Andrew Fish > > > > > Cc: "Michael D. Kinney" > > > > > > > > > > Signed-off-by: Dionna Glaze > > > > > > > > > > Dionna Glaze (7): > > > > > OvmfPkg: Realize EfiMemoryAcceptProtocol in AmdSevDxe > > > > > MdePkg: Add EFI_EVENT_BEFORE_EXIT_BOOT_SERVICES_GUID > > > > > MdeModulePkg: Notify BeforeExitBootServices in > > CoreExitBootServices > > > > > OvmfPkg: Introduce CocoDxe driver > > > > > MdePkg: Introduce the MemoryAcceptance protocol > > > > > OvmfPkg: Implement AcceptAllUnacceptedMemory in CocoDxe > > > > > OvmfPkg/PlatformPei: SEV-SNP make >=3D4GB unaccepted > > > > > > > > > > MdeModulePkg/Core/Dxe/DxeMain.inf = | 1 + > > > > > MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c = | 6 > > + > > > > > MdePkg/Include/Guid/EventGroup.h = | 5 + > > > > > MdePkg/Include/Protocol/MemoryAcceptance.h = | 40 > > > > +++++ > > > > > MdePkg/MdePkg.dec = | 8 +- > > > > > OvmfPkg/AmdSev/AmdSevX64.dsc = | 1 + > > > > > OvmfPkg/AmdSev/AmdSevX64.fdf = | 1 + > > > > > OvmfPkg/AmdSevDxe/AmdSevDxe.c = | 55 > > ++++++- > > > > > OvmfPkg/AmdSevDxe/AmdSevDxe.inf = | 3 + > > > > > OvmfPkg/CocoDxe/CocoDxe.c = | 174 > > > > ++++++++++++++++++++ > > > > > OvmfPkg/CocoDxe/CocoDxe.inf = | 46 ++++++ > > > > > OvmfPkg/IntelTdx/IntelTdxX64.dsc = | 1 + > > > > > OvmfPkg/IntelTdx/IntelTdxX64.fdf = | 1 + > > > > > > > > > > > OvmfPkg/Library/BaseMemEncryptSevLib/X64/DxeSnpSystemRamValidate. > > > > c | 24 ++- > > > > > OvmfPkg/OvmfPkgIa32X64.dsc = | 1 + > > > > > OvmfPkg/OvmfPkgIa32X64.fdf = | 1 + > > > > > OvmfPkg/OvmfPkgX64.dsc = | 1 + > > > > > OvmfPkg/OvmfPkgX64.fdf = | 1 + > > > > > OvmfPkg/PlatformPei/AmdSev.c = | 5 + > > > > > 19 files changed, 366 insertions(+), 9 deletions(-) > > > > > create mode 100644 > > MdePkg/Include/Protocol/MemoryAcceptance.h > > > > > create mode 100644 OvmfPkg/CocoDxe/CocoDxe.c > > > > > create mode 100644 OvmfPkg/CocoDxe/CocoDxe.inf > > > > > > > > > > > > > > > > >=20 > > > > > > > > > > > > > -- > > -Dionna Glaze, PhD (she/her) --=20 -Dionna Glaze, PhD (she/her)