From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 7E7C6D8086D for ; Sat, 27 Jan 2024 04:04:46 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=ku7XT5zKusyIETtl3QSr38zPXuXvvIW75QgulPkBBmU=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1706328284; v=1; b=WrMyJDurVcrwH+xiFJyAxtN1LiM+QXjuArtpijyGKVim3UDP6+q/oCTt18tchgIeKWS/IQmg 07vbpYlxdVtXce49ETErv1cN7b9c1BJ0Pe/Oz0RL55O24dqvBKdmZzh6wh57Uodt2fDQePzjPaM xHgdcDammBcUyl69GzMLkhhU= X-Received: by 127.0.0.2 with SMTP id 0LqfYY7687511xV4x5452NYW; Fri, 26 Jan 2024 20:04:44 -0800 X-Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.15]) by mx.groups.io with SMTP id smtpd.web10.9620.1706328283918392079 for ; Fri, 26 Jan 2024 20:04:44 -0800 X-IronPort-AV: E=McAfee;i="6600,9927,10964"; a="2514180" X-IronPort-AV: E=Sophos;i="6.05,220,1701158400"; d="scan'208";a="2514180" X-Received: from fmviesa005.fm.intel.com ([10.60.135.145]) by orvoesa107.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Jan 2024 20:04:43 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.05,220,1701158400"; d="scan'208";a="2775447" X-Received: from fmsmsx603.amr.corp.intel.com ([10.18.126.83]) by fmviesa005.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 26 Jan 2024 20:04:43 -0800 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Fri, 26 Jan 2024 20:04:42 -0800 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Fri, 26 Jan 2024 20:04:41 -0800 X-Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Fri, 26 Jan 2024 20:04:41 -0800 X-Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.169) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Fri, 26 Jan 2024 20:04:41 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IdDt41ckSnVMWQ3jedx0ZF5GdLOA1kY/oLGrJ52YFVsAOk+iZHGsNjONojJi7NgnooXF9T/6E82W6SOGlyAeF36+3oWrSHgEau3XcQf4rUiwPUW1783OeS5oGEBsRCjjXUeWx2iN8oIT1SGQIkE/tLeTfwA26evWTV0Kcd3vE3wjFufFxrgh1LSzPS97UIrohCN3j7bu8ipvPfAlmVohyVpCDtZRGMdaSvk9dsplLlz54/0KZHthzedwxMpn6jcswVUDD7QQAUxP65Eh2PbJeVZOCbkk9iaEaD3uUK8nDP5pcyD2IyblsCt5gmBPBfNi9x/Y2dCI5kzAKJOfooYcaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=55p3tgT9wE51HZxuOcvuC1GoiBx9qHDqDvq0mlJRsQ4=; b=GpsEbagaRd9kBLzxiepofKoMesZGDDRCVYxNpJFZjqm9lNWaEVHftsAqbzrIUQvxPTD8vdxK1jeLeC8jcKoK9crzEinTMvjTNEq7PdpxBnOaSxpwDk9gQ2I3Is0kru2xlpH9YU2v2T+1ok6EIy+Ezw7hRU3bBLgSKCzTmcgC4jDvHBITvUui7nCeQSB0MK7SSHo9NaZQzisc26f/hb6p2TeBD8r6PmHJPdQ9UdanrbQwJ+zHxxV2tE0veNT5JTCnvd7NJCUNn59gKKPwpNmI3Kse9Au+l3TbpCx4ey9etMYcWKKgPEbrPNrVGO8t/B6T+ylAG9eFl2mZtcSGdlK12g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by PH7PR11MB8527.namprd11.prod.outlook.com (2603:10b6:510:2ff::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7228.22; Sat, 27 Jan 2024 04:04:38 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::92a7:f6a2:9262:d150]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::92a7:f6a2:9262:d150%3]) with mapi id 15.20.7228.027; Sat, 27 Jan 2024 04:04:38 +0000 From: "Yao, Jiewen" To: Tom Lendacky , "devel@edk2.groups.io" CC: Ard Biesheuvel , "Aktas, Erdem" , Gerd Hoffmann , Laszlo Ersek , Liming Gao , "Kinney, Michael D" , "Xu, Min M" , "Liu, Zhiguang" , "Kumar, Rahul R" , "Ni, Ray" , Michael Roth , "Yao, Jiewen" Subject: Re: [edk2-devel] [PATCH 00/16] Provide SEV-SNP support for running under an SVSM Thread-Topic: [PATCH 00/16] Provide SEV-SNP support for running under an SVSM Thread-Index: AQHaUKTuVxCr7P66EEKoUxO1u8ud3rDtCaUA Date: Sat, 27 Jan 2024 04:04:38 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|PH7PR11MB8527:EE_ x-ms-office365-filtering-correlation-id: c2eee2c3-434c-42dc-674d-08dc1eed14d3 x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?kth57EexMAA09TR0s+PRy5rgLHEILxD19GOwEsicS9Pz5pvrdgBjA37+0i4z?= =?us-ascii?Q?L9VmoQJiO62/G9DvgjoB5QNgyGqd3KU8cHoj/sywu4mxKwybx04F9lLO1MxA?= =?us-ascii?Q?ZFq/lBAUFsB17leqsqDGVCi2GnTzQhBV+iSLwUvItIKMV19WKPEsb+ukD5nt?= =?us-ascii?Q?nrF0uTmi/KkQXok9cuUvEmrLQ1TI1ARZBxeuqi72ikVEeyzf1IfPN13bj/4c?= =?us-ascii?Q?U4uSgJMG4AaSxb3kowYied2B5BJKWWnvLQpVheqEdiBD/NzRrm40zqCycRTM?= =?us-ascii?Q?TY6uTtEz1/P7gUFamuGd1QYvxT/d0Jgd1UO2n91uVt9xl+umA19yX5g+kteZ?= =?us-ascii?Q?BCH18bZhhgNgOqdhbpcspIcvg+BmaiR2NR4DaHHZcjI+hAZLkFpyGkjS9amQ?= =?us-ascii?Q?lG/zxtiVuxxtCzv/SwHSJ73Xb0VcUgyOMpV1iCjBT82yfOI4GyK2eIMou5iA?= =?us-ascii?Q?tPzHbc0jlxNBrsVQOFXFeCXQN6PnQnSILv6RMnCnA7yjRpz6YO6ocCb7fq4G?= =?us-ascii?Q?kXZSZsJya1s4KN0RoRKrw6yt4QRgDG5W7TN7NO/v58Dg1oRJrknlluHPi7w6?= =?us-ascii?Q?DEazwbzlr8TUPaASejAIFMnxGZu18sRboplyxeNM0KDP9vExY7WQ9/5PiCG+?= =?us-ascii?Q?v614x0s7J7CGXPNEg/0DCISlEZZF4SlegD20I+0CCv/+2FEcL4wDR9uzCV2d?= =?us-ascii?Q?ocNQsGUI8ElK6XrU1iYaDeUYyNe+UeXqhKL5Plqivhfe7+rEA/wUygKd8hdK?= =?us-ascii?Q?Iu6whPWeINkpacy0avFSi5uJTfdtt+uRwQiR/VUIAYqUSyg4yVL+8xXtrdPD?= =?us-ascii?Q?t0IT0JuLevMehTLEInuuX6CzyfOvXOWC4QvK1v5sZKz8AO0kbo4aFo1HY9Fo?= =?us-ascii?Q?4uzKTQtdWo0fYG2eLcunKQwiDAIHgB5eBAQj2wFjGgQLSjv3MurPhiE3684L?= =?us-ascii?Q?vrqVPc1GaCW5gT3Bvl8s0PT3snKm80wSQZCEg4KPorFxAdLhwA5ZQlQRhuUA?= =?us-ascii?Q?dxZfvagS1VN/R65GYD2EYY/Nx6As3pDp4GFv7/Fyd7nxe8N13w/P84IXI3X+?= =?us-ascii?Q?e1QEQGUcEe6FaUp32XS0rKZkkZdfpJX3vifLX6pOv5iFJtA7STaU9veXLmVD?= =?us-ascii?Q?S7mWMQUo9dapmAMHsB1xCT0sBbJTa3qoRTaBLLDMM1z+FacaXWL83+zeAevm?= =?us-ascii?Q?2kFbjd51RUKMAa0x6nfKNpkbBdPkJ73mtDqGWA69S6uYFzQthl+EHTyo679K?= =?us-ascii?Q?IHROBbALzG98kvjsuVPKWWo8aIMFynWGCjEJE1x0qd39aSxTEXiyMj+lOvhx?= =?us-ascii?Q?WIlE5ca5JpbfSq8cwJ+qNQAreG0EUHnarriXCz9YviYFB8/2ZqD4ZYu4wUok?= =?us-ascii?Q?7advfOXoPrBobaJdLH2W9CVQ8FDgs25Y90BHdk/uYAnIkSECEsjPnKGV1tt4?= =?us-ascii?Q?lvClwcPJ5txEYLMpcAltRzMxVpQpcVjIxpnRILtjUT98ZsoMLe0lkXvt4FIW?= =?us-ascii?Q?z91oOBGe91Bcp+PUIDbOtD3GqcqqRGDh7/RhlSAHs5appVxx/FMPMgpJHgzU?= =?us-ascii?Q?BO3ouasZpHHuir8ufPojD8ApojS8nV1F2kSawprP?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: c2eee2c3-434c-42dc-674d-08dc1eed14d3 X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Jan 2024 04:04:38.5179 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: +W27L339dhkSPvADR14GLzmPUMxbhcnpVTqHYTk6waXIHfUb7pNSRXbOzcHPupa623YLkE+FIzGX/OSjk/bZYQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB8527 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: 37rBV5bK8ONQPVCbuWSCgyibx7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=WrMyJDur; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}") Thanks Tom. Please give me some time to digest this patch set before I can give some fe= edback. One quick question to you: With this patch, we need to support multiple SEV modes: 1. SEV guest firmware 2. SEV-ES guest firmware 3. SEV-SNP guest firmware 4. SEV-SNP SVSM guest firmware And all these mode requires runtime detection. Am I right? If so, where is the flag to set those mode? Please correct me if my understanding is wrong. Thank you Yao, Jiewen > -----Original Message----- > From: Tom Lendacky > Sent: Saturday, January 27, 2024 6:13 AM > To: devel@edk2.groups.io > Cc: Ard Biesheuvel ; Aktas, Erdem > ; Gerd Hoffmann ; Yao, Jiewen > ; Laszlo Ersek ; Liming Gao > ; Kinney, Michael D ; > Xu, Min M ; Liu, Zhiguang ; > Kumar, Rahul R ; Ni, Ray ; Mic= hael > Roth > Subject: [PATCH 00/16] Provide SEV-SNP support for running under an SVSM >=20 >=20 > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4654 >=20 > This series adds SEV-SNP support for running OVMF under an Secure VM > Service Module (SVSM) at a less privileged VM Privilege Level (VMPL). > By running at a less priviledged VMPL, the SVSM can be used to provide > services, e.g. a virtual TPM, for the guest OS within the SEV-SNP > confidential VM (CVM) rather than trust such services from the hypervisor= . >=20 > Currently, OVMF expects to run at the highest VMPL, VMPL0, and there are > certain SNP related operations that require that VMPL level. Specifically= , > the PVALIDATE instruction and the RMPADJUST instruction when setting the > the VMSA attribute of a page (used when starting APs). >=20 > If OVMF is to run at a less privileged VMPL, e.g. VMPL2, then it must > use an SVSM (which is running at VMPL0) to perform the operations that > it is no longer able to perform. >=20 > How OVMF interacts with and uses the SVSM is documented in the SVSM > specification [1] and the GHCB specification [2]. >=20 > This series introduces support to run OVMF under an SVSM. It consists > of: > - Reorganize the page state change support to not directly use the > GHCB buffer since an SVSM will use the calling area buffer, instead > - Detecting the presence of an SVSM > - When not running at VMPL0, invoking the SVSM for page validation and > VMSA page creation/deletion > - Retrieving the list of vCPU APIC IDs and starting up all APs without > performing a broadcast SIPI > - Detecting and allowing OVMF to run in a VMPL other than 0 when an > SVSM is present >=20 > The series is based off of commit: >=20 > 7d7decfa3dc8 ("UefiPayloadPkg/Crypto: Support external Crypto drivers."= ) >=20 > [1] https://www.amd.com/content/dam/amd/en/documents/epyc-technical- > docs/specifications/58019.pdf > [2] https://www.amd.com/content/dam/amd/en/documents/epyc-technical- > docs/specifications/56421.pdf >=20 > --- >=20 > Tom Lendacky (16): > OvmfPkg/BaseMemEncryptSevLib: Re-organize page state change support > MdePkg/Register/Amd: Define the SVSM related information > MdePkg/BaseLib: Add a new VMGEXIT instruction invocation for SVSM > UefiCpuPkg/CcExitLib: Extend the CcExitLib library to support an SVSM > Ovmfpkg/CcExitLib: Extend CcExitLib to handle SVSM related services > OvmfPkg: Create a calling area used to communicate with the SVSM > OvmfPkg/CcExitLib: Add support for the SVSM_CORE_PVALIDATE call > OvmfPkg/CcExitLib: Add support for the SVSM create/delete vCPU calls > UefiCpuPkg/MpInitLib: Use CcExitSnpVmsaRmpAdjust() to set/clear VMSA > MdePkg: GHCB APIC ID retrieval support definitions > UefiCpuPkg: Create APIC ID list PCD > OvmfPkg/PlatformPei: Retrieve APIC IDs from the hypervisor > UefiCpuPkg/MpInitLib: Always use AP Create if PcdSevSnpApicIds is set > UefiCpuPkg/MpInitLib: AP creation support under an SVSM > Ovmfpkg/CcExitLib: Provide SVSM discovery support > OvmfPkg/BaseMemEncryptLib: Check for presence of an SVSM when not at > VMPL0 >=20 > OvmfPkg/OvmfPkg.dec | = 4 + > UefiCpuPkg/UefiCpuPkg.dec | = 7 +- > OvmfPkg/AmdSev/AmdSevX64.fdf | = 9 +- > OvmfPkg/OvmfPkgX64.fdf | = 3 + > MdePkg/Library/BaseLib/BaseLib.inf | = 2 + > OvmfPkg/Library/CcExitLib/CcExitLib.inf | = 5 +- > OvmfPkg/Library/CcExitLib/SecCcExitLib.inf | = 5 +- > OvmfPkg/PlatformPei/PlatformPei.inf | = 3 + > OvmfPkg/ResetVector/ResetVector.inf | = 2 + > UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf | = 1 + > UefiCpuPkg/Library/MpInitLib/PeiMpInitLib.inf | = 3 +- > MdePkg/Include/Library/BaseLib.h | = 39 ++ > MdePkg/Include/Register/Amd/Fam17Msr.h | = 19 +- > MdePkg/Include/Register/Amd/Ghcb.h | = 19 +- > MdePkg/Include/Register/Amd/Msr.h | = 3 +- > MdePkg/Include/Register/Amd/Svsm.h | = 101 ++++ > MdePkg/Include/Register/Amd/SvsmMsr.h | = 35 ++ > OvmfPkg/Include/WorkArea.h | = 7 + > OvmfPkg/Library/BaseMemEncryptSevLib/X64/SnpPageStateChange.h | = 4 > +- > OvmfPkg/Library/CcExitLib/CcExitSvsm.h | = 29 ++ > UefiCpuPkg/Include/Library/CcExitLib.h | = 71 ++- > UefiCpuPkg/Library/MpInitLib/MpLib.h | = 27 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/DxeSnpSystemRamValidate.c | > 16 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c | = 25 > +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiSnpSystemRamValidate.c | > 20 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/SecSnpSystemRamValidate.c | > 25 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/SnpPageStateChangeInternal.c | > 203 ++++---- > OvmfPkg/Library/CcExitLib/CcExitSvsm.c | = 532 > ++++++++++++++++++++ > OvmfPkg/Library/CcExitLib/CcExitVcHandler.c | = 29 +- > OvmfPkg/PlatformPei/AmdSev.c | = 100 +++- > UefiCpuPkg/Library/CcExitLibNull/CcExitLibNull.c | = 82 ++- > UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c | = 19 +- > UefiCpuPkg/Library/MpInitLib/MpLib.c | = 7 +- > UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c | = 127 +++-- > MdePkg/Library/BaseLib/Ia32/VmgExitSvsm.nasm | = 39 ++ > MdePkg/Library/BaseLib/X64/VmgExitSvsm.nasm | = 94 ++++ > OvmfPkg/ResetVector/ResetVector.nasmb | = 6 +- > OvmfPkg/ResetVector/X64/OvmfSevMetadata.asm | = 9 + > UefiCpuPkg/UefiCpuPkg.uni | = 3 + > 39 files changed, 1524 insertions(+), 210 deletions(-) > create mode 100644 MdePkg/Include/Register/Amd/Svsm.h > create mode 100644 MdePkg/Include/Register/Amd/SvsmMsr.h > create mode 100644 OvmfPkg/Library/CcExitLib/CcExitSvsm.h > create mode 100644 OvmfPkg/Library/CcExitLib/CcExitSvsm.c > create mode 100644 MdePkg/Library/BaseLib/Ia32/VmgExitSvsm.nasm > create mode 100644 MdePkg/Library/BaseLib/X64/VmgExitSvsm.nasm >=20 > -- > 2.42.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#114647): https://edk2.groups.io/g/devel/message/114647 Mute This Topic: https://groups.io/mt/103986434/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-