From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 90EFC9414A2 for ; Fri, 2 Feb 2024 06:07:26 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=q2yTnba7UENZFsabNsEkRWmNaNcjQ3KXOCUHu9VBG7E=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1706854045; v=1; b=RVeKsWA7ipyysZHwsPCeQ5cVDOXdCBKaDYwBIzPG5BTaiUN1pK5ZMkVr0yaQ6177qrTeVteA q9qE82BclZLkFk1uOgVvXIgkOH5gkY0i/Y0CMflXSJsaV7gf47qt/8Sn+GJPL/A6SzXn7LHjpB1 aqFJ7WxoTR1vngLClCAdMDnc= X-Received: by 127.0.0.2 with SMTP id gcxuYY7687511xTT9icySuQC; Thu, 01 Feb 2024 22:07:25 -0800 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.11]) by mx.groups.io with SMTP id smtpd.web11.17215.1706854044671832548 for ; Thu, 01 Feb 2024 22:07:24 -0800 X-IronPort-AV: E=McAfee;i="6600,9927,10971"; a="10706301" X-IronPort-AV: E=Sophos;i="6.05,237,1701158400"; d="scan'208";a="10706301" X-Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orvoesa103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Feb 2024 22:07:24 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10971"; a="823137457" X-IronPort-AV: E=Sophos;i="6.05,237,1701158400"; d="scan'208";a="823137457" X-Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga001.jf.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 01 Feb 2024 22:07:24 -0800 X-Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 1 Feb 2024 22:07:23 -0800 X-Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Thu, 1 Feb 2024 22:07:22 -0800 X-Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Thu, 1 Feb 2024 22:07:22 -0800 X-Received: from NAM02-BN1-obe.outbound.protection.outlook.com (104.47.51.41) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Thu, 1 Feb 2024 22:07:22 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ebExKJL4jjhwaDPmCiNtxdc7rjlGhDFL2ZK70dJI7br22jeNplpTWCpsbiEwDL+yGtoDeYgXuZ1JT2dtif+jstv1cIqtsIaGv90IQJX+fTFLVmZrQRWSQST2BTqO6NPM089yaRq7H4TsiZIUUqXvuhnZipPzMm3ltrgWKEWM5Vdfru2A4PHN9jpnn9z6GxpKIUACW7oSGq6gf/S4pRVsvmLKC6J8kIwQkIzqGeBI4E39DXwTYXU4A0CIexBPNkH1pyj4DubjXdM4QX/iHMLlk8ZwsuX92Jn0IbC0HjeYK5IRv7Ql4vjGvvZMh0Y2IXTnTiYH8FLx3EEkeas/XlkrsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kGzAdi+/cizxVV8hnHUU4UBoZx4sOviJ27BVPjH+Azs=; b=LocE7HS3EXceLs7iT1EMwGTTrh/IHwvW2F9NAwuAmUY8j7MpfOSvG03mAFnUnAnMUp8zGlHgfWY24ZbHJv0WOvGZqBfI62FvO9A30nPT7KhbuD3KLb0l2hYVY8kWAQOCCMzweIRMSpHmu2oqYZpNLLcKofNTjbhC6oUs5kP9p6F9q9B83UHpQSCBs4YUFBN4CYNpFovJSbTbvX1tjTGu474sO/FdqJH5INVYxZAJYD/DHv6oaXnWYgnGLMwQTN9ComhxnNrWWaDJ5AKSvPJM3o0G+SyiSAOq11MUZol5kXKhBTNNMj5TA2g9Z2ExJ0h1reFPEhCLN3SjjofiGAnlZg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com (2603:10b6:208:470::14) by PH7PR11MB7478.namprd11.prod.outlook.com (2603:10b6:510:269::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7249.22; Fri, 2 Feb 2024 06:07:19 +0000 X-Received: from MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::fdd3:11d7:1c15:6c2d]) by MN6PR11MB8244.namprd11.prod.outlook.com ([fe80::fdd3:11d7:1c15:6c2d%7]) with mapi id 15.20.7228.029; Fri, 2 Feb 2024 06:07:19 +0000 From: "Ni, Ray" To: Tom Lendacky , "devel@edk2.groups.io" CC: Ard Biesheuvel , "Aktas, Erdem" , Gerd Hoffmann , "Yao, Jiewen" , Laszlo Ersek , Liming Gao , "Kinney, Michael D" , "Xu, Min M" , "Liu, Zhiguang" , "Kumar, Rahul R" , Michael Roth Subject: Re: [edk2-devel] [PATCH 09/16] UefiCpuPkg/MpInitLib: Use CcExitSnpVmsaRmpAdjust() to set/clear VMSA Thread-Topic: [PATCH 09/16] UefiCpuPkg/MpInitLib: Use CcExitSnpVmsaRmpAdjust() to set/clear VMSA Thread-Index: AQHaUKUYccpo6UVFW0e+akGQb+3jHbD2mtBA Date: Fri, 2 Feb 2024 06:07:19 +0000 Message-ID: References: <8054a730de53debf85cace82346ed1ecab8daa66.1706307195.git.thomas.lendacky@amd.com> In-Reply-To: <8054a730de53debf85cace82346ed1ecab8daa66.1706307195.git.thomas.lendacky@amd.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MN6PR11MB8244:EE_|PH7PR11MB7478:EE_ x-ms-office365-filtering-correlation-id: 35ed9ad5-f61a-44cc-d746-08dc23b536d6 x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?VlF+s0DqmNO9bgQ/KmVDmY+KtobbSJhcYeZarLiSVBcJurFC/lzWngSHxpfc?= =?us-ascii?Q?6JlRxnaZmh1q0TVJlLTJzno2dCR6T1qbTIYgQt1cgtK+g6MZBhk96XkE2lMf?= =?us-ascii?Q?eubOl0qU/QQBinywvaBUY1pxH1+buWl2VaeYxXvcGdsmzjQWf6qqq6+sixXY?= =?us-ascii?Q?rMGFv82HD6z3tY1Jplm5j04i5qwbkKiFQ+GBjiUlhzDviPl8qiRTHFYxFhfq?= =?us-ascii?Q?BFSoFYFEw9mb840iiqdxsc5iyeQ0AeHOALFPFb03DaDmbqU84JDrGNrIJio+?= =?us-ascii?Q?Tm/DQdAnfniITREIowGr0cf9cE8SYIipXsdig08EQfrYoaPqeMYKm4q6x2wV?= =?us-ascii?Q?KMO1nCSr5gk2QqWvRT3K7Rn9jDlXgkJn3+aMntOCpQyjEM+kZLT+RCfHiwXk?= =?us-ascii?Q?rjRDaWsjFNtcR6QQ66xDOB1nGD1HicFoe35fQqD3OixRDWucm2rURlf/0Gu7?= =?us-ascii?Q?j5BSckR5BjF6KyNCDQFoKGslWmYvRsR2w/kOhfpCK8M4Sec0F7Ug1wUtlshC?= =?us-ascii?Q?heBKDZZs+IYeXkuyl0OYwafljgMb+Y8DhaCypQ4kxL6EDm3NCioknD7NlkWl?= =?us-ascii?Q?+F06V/G2IPim0dfsiY4Vvvuos5iJfl06G9LHkhbP9Xt0g9Ve50z9dKS2ZV7R?= =?us-ascii?Q?JKD0EU1+Q0USlZObDtDNkvJuiFZp+mQ9b+Gfc1OqPC+Ko1qkMCy9EJ4HDgog?= =?us-ascii?Q?mKMExPzpXdJT0ibbkg6+UIve7PaR+3CS1aMGmdfLRm356aTAr99MrWkecoZb?= =?us-ascii?Q?oJy8E3AoJcR8MyVj97hR4pip+KNn/HuPpLffGOgufhrYA+3d0IAYQ0daW3j9?= =?us-ascii?Q?Y9xngvgSAnY0v5/k19Tqxxk7xMuNEYl/ox1D3Sg5k1xGeN8iMub3C88oPAVS?= =?us-ascii?Q?qMUcQw+oPq6s+4uNkBFa4U5vpu+TEafCEO9JOV7LIOXT1Z42P1LfKaVOtM2S?= =?us-ascii?Q?JtFTxSuh1Oj8fK23Y5/UbNSvFA2pEid29QECHJ7b08HKeWdXufzDoSvG8IlN?= =?us-ascii?Q?eWfekIvdcXnINo8Dev+0AjZIHxyBmNa+s/f/DwocnAeKtfY/NWYXEFnVVyRL?= =?us-ascii?Q?IVKDhqOQVZVGuFGcFiFgOYgEJTDgcX8j6jLdG7prssltEYZM5SV9qu9jPZgo?= =?us-ascii?Q?K9BVI0tT+hDT4R2JfPxjB60LAAoFzDgO5avMaOAuykdcIl6k9CKTggdNhTij?= =?us-ascii?Q?IqpfiXQaxsDL6+UA0/idmFfDrIpX0CPkom4Zy3qv5owdeUf5Z2MGOfLe4VJe?= =?us-ascii?Q?NlvbZ825J5Jv7vqlTeD+nBeoxyYkL4Fi02ihHzSf4RtPTuR7MXn34Y17Q0vT?= =?us-ascii?Q?ivPbcnx2OmdRwFqi7M6QhTjs+AK7FpKh5DDnhbDdDpOsIzwomWKZ0hxvpJvd?= =?us-ascii?Q?e89QLTt7RZ4sjgF+MELhkNU8cs15W8309SMfLzY9/sK1txvO8ufJe7RSVN0n?= =?us-ascii?Q?sDWXmbn6kwvv6PrgLhjVT+LBe+KuY3BMK8fXRmPbSb94AjqqdGGsqsGXJWGt?= =?us-ascii?Q?sxyKe67ucOAfAJI1yCy5ScTg7XGibYj48JqInNGfcDOfbwipmNX+/pQrjOjo?= =?us-ascii?Q?vyk/UAzoasNVUhUkTds=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MN6PR11MB8244.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 35ed9ad5-f61a-44cc-d746-08dc23b536d6 X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Feb 2024 06:07:19.5257 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: YOic8UbySIcViDK1INuT6O0DGavsTxC8xltgo45WH8STKZx48GJoMKZYDwTNkmrHxmAkOcvaaAXZFqoHSzghxw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB7478 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ray.ni@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: fHXleGYV2414g2sBc2oNbb2Px7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=RVeKsWA7; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io Acked-by: Ray Ni Thanks, Ray > -----Original Message----- > From: Tom Lendacky > Sent: Saturday, January 27, 2024 6:13 AM > To: devel@edk2.groups.io > Cc: Ard Biesheuvel ; Aktas, Erdem > ; Gerd Hoffmann ; Yao, > Jiewen ; Laszlo Ersek ; Liming > Gao ; Kinney, Michael D > ; Xu, Min M ; Liu, > Zhiguang ; Kumar, Rahul R > ; Ni, Ray ; Michael Roth > > Subject: [PATCH 09/16] UefiCpuPkg/MpInitLib: Use > CcExitSnpVmsaRmpAdjust() to set/clear VMSA >=20 > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4654 >=20 > The RMPADJUST instruction is used to change the VMSA attribute of a page, > but the VMSA attribute can only be changed when running at VMPL0. When > an > SVSM is present, use the SVSM_CORE_CREATE_VCPU and > SVSM_CORE_DELTE_VCPU > calls to change the VMSA attribute on a page instead of issuing the > RMPADJUST instruction directly. >=20 > Implement the CcExitSnpVmsaRmpAdjust() API to perform the appropriate > operation to change the VMSA attribute based on the presence of an SVSM. >=20 > Signed-off-by: Tom Lendacky > --- > UefiCpuPkg/Library/MpInitLib/MpLib.h | 14 ------ > UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c | 20 -------- > UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c | 53 +++----------------- > 3 files changed, 6 insertions(+), 81 deletions(-) >=20 > diff --git a/UefiCpuPkg/Library/MpInitLib/MpLib.h > b/UefiCpuPkg/Library/MpInitLib/MpLib.h > index a96a6389c17d..6e2137cb17cd 100644 > --- a/UefiCpuPkg/Library/MpInitLib/MpLib.h > +++ b/UefiCpuPkg/Library/MpInitLib/MpLib.h > @@ -870,20 +870,6 @@ FillExchangeInfoDataSevEs ( > IN volatile MP_CPU_EXCHANGE_INFO *ExchangeInfo > ); >=20 > -/** > - Issue RMPADJUST to adjust the VMSA attribute of an SEV-SNP page. > - > - @param[in] PageAddress > - @param[in] VmsaPage > - > - @return RMPADJUST return value > -**/ > -UINT32 > -SevSnpRmpAdjust ( > - IN EFI_PHYSICAL_ADDRESS PageAddress, > - IN BOOLEAN VmsaPage > - ); > - > /** > Create an SEV-SNP AP save area (VMSA) for use in running the vCPU. >=20 > diff --git a/UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c > b/UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c > index c83144285b68..a2b8a5b3f516 100644 > --- a/UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c > +++ b/UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c > @@ -48,23 +48,3 @@ SevSnpCreateAP ( > // > ASSERT (FALSE); > } > - > -/** > - Issue RMPADJUST to adjust the VMSA attribute of an SEV-SNP page. > - > - @param[in] PageAddress > - @param[in] VmsaPage > - > - @return RMPADJUST return value > -**/ > -UINT32 > -SevSnpRmpAdjust ( > - IN EFI_PHYSICAL_ADDRESS PageAddress, > - IN BOOLEAN VmsaPage > - ) > -{ > - // > - // RMPADJUST is not supported in 32-bit mode > - // > - return RETURN_UNSUPPORTED; > -} > diff --git a/UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c > b/UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c > index c9f0984f41a2..db9a37fbbd19 100644 > --- a/UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c > +++ b/UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c > @@ -38,20 +38,15 @@ SevSnpPerformApAction ( > BOOLEAN InterruptState; > UINT64 ExitInfo1; > UINT64 ExitInfo2; > - UINT32 RmpAdjustStatus; > UINT64 VmgExitStatus; > + EFI_STATUS VmsaStatus; >=20 > if (Action =3D=3D SVM_VMGEXIT_SNP_AP_CREATE) { > // > - // To turn the page into a recognized VMSA page, issue RMPADJUST: > - // Target VMPL but numerically higher than current VMPL > - // Target PermissionMask is not used > + // Turn the page into a recognized VMSA page. > // > - RmpAdjustStatus =3D SevSnpRmpAdjust ( > - (EFI_PHYSICAL_ADDRESS)(UINTN)SaveArea, > - TRUE > - ); > - if (RmpAdjustStatus !=3D 0) { > + VmsaStatus =3D CcExitSnpVmsaRmpAdjust (SaveArea, ApicId, TRUE); > + if (EFI_ERROR (VmsaStatus)) { > DEBUG ((DEBUG_INFO, "SEV-SNP: RMPADJUST failed for VMSA > creation\n")); > ASSERT (FALSE); >=20 > @@ -94,11 +89,8 @@ SevSnpPerformApAction ( > // Make the current VMSA not runnable and accessible to be > // reprogrammed. > // > - RmpAdjustStatus =3D SevSnpRmpAdjust ( > - (EFI_PHYSICAL_ADDRESS)(UINTN)SaveArea, > - FALSE > - ); > - if (RmpAdjustStatus !=3D 0) { > + VmsaStatus =3D CcExitSnpVmsaRmpAdjust (SaveArea, ApicId, FALSE); > + if (EFI_ERROR (VmsaStatus)) { > DEBUG ((DEBUG_INFO, "SEV-SNP: RMPADJUST failed for VMSA reset\n"))= ; > ASSERT (FALSE); >=20 > @@ -292,36 +284,3 @@ SevSnpCreateAP ( > SevSnpCreateSaveArea (CpuMpData, CpuData, ApicId); > } > } > - > -/** > - Issue RMPADJUST to adjust the VMSA attribute of an SEV-SNP page. > - > - @param[in] PageAddress > - @param[in] VmsaPage > - > - @return RMPADJUST return value > -**/ > -UINT32 > -SevSnpRmpAdjust ( > - IN EFI_PHYSICAL_ADDRESS PageAddress, > - IN BOOLEAN VmsaPage > - ) > -{ > - UINT64 Rdx; > - > - // > - // The RMPADJUST instruction is used to set or clear the VMSA bit for = a > - // page. The VMSA change is only made when running at VMPL0 and is > ignored > - // otherwise. If too low a target VMPL is specified, the instruction c= an > - // succeed without changing the VMSA bit when not running at VMPL0. > Using a > - // target VMPL level of 1, RMPADJUST will return a FAIL_PERMISSION err= or > if > - // not running at VMPL0, thus ensuring that the VMSA bit is set > appropriately > - // when no error is returned. > - // > - Rdx =3D 1; > - if (VmsaPage) { > - Rdx |=3D RMPADJUST_VMSA_PAGE_BIT; > - } > - > - return AsmRmpAdjust ((UINT64)PageAddress, 0, Rdx); > -} > -- > 2.42.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#115020): https://edk2.groups.io/g/devel/message/115020 Mute This Topic: https://groups.io/mt/103986460/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-