From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) by mx.groups.io with SMTP id smtpd.web12.778.1619629494260290796 for ; Wed, 28 Apr 2021 10:04:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BbydKCM0; spf=pass (domain: redhat.com, ip: 216.205.24.124, mailfrom: lersek@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1619629493; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+B3wVxK2oyG7wBpr+R2N7STt8ofJGJBiLBmIlzt5Wwc=; b=BbydKCM0e/zpr1HtV8QzFxBnNLJFuBJA5kesDwpQTkFlAw64TqGouSDf28nM6qqs0xIwDx eWjleIymGlYTjMPJvcN3qB4Q4ykLHDO8HJodhFJNfpHanfEMi52MGxPMOBSDzOPQLvPLya IK25ktUkZst8lNBk2h36qg09eXxqWL8= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-281-8k_lwNNvMOesUnZ7rmsI2w-1; Wed, 28 Apr 2021 13:04:49 -0400 X-MC-Unique: 8k_lwNNvMOesUnZ7rmsI2w-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 1301D1898298; Wed, 28 Apr 2021 17:04:47 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-114-188.ams2.redhat.com [10.36.114.188]) by smtp.corp.redhat.com (Postfix) with ESMTP id BA99E226FB; Wed, 28 Apr 2021 17:04:43 +0000 (UTC) Subject: Re: [edk2-devel] [PATCH v2 1/4] OvfmPkg/VmgExitLib: Properly decode MMIO MOVZX and MOVSX opcodes To: devel@edk2.groups.io, thomas.lendacky@amd.com Cc: Joerg Roedel , Borislav Petkov , Ard Biesheuvel , Jordan Justen , Brijesh Singh , Erdem Aktas , James Bottomley , Jiewen Yao , Min Xu References: <9678513eb498c7ecf147798211f37075437790ab.1619540470.git.thomas.lendacky@amd.com> From: "Laszlo Ersek" Message-ID: Date: Wed, 28 Apr 2021 19:04:42 +0200 MIME-Version: 1.0 In-Reply-To: <9678513eb498c7ecf147798211f37075437790ab.1619540470.git.thomas.lendacky@amd.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=lersek@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit On 04/27/21 18:21, Lendacky, Thomas wrote: > From: Tom Lendacky > > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3345 > > The MOVZX and MOVSX instructions use the ModRM byte in the instruction, > but the instruction decoding support was not decoding it. This resulted > in invalid decoding and failing of the MMIO operation. Also, when > performing the zero-extend or sign-extend operation, the memory operation > should be using the size, and not the size enumeration value. > > Add the ModRM byte decoding for the MOVZX and MOVSX opcodes and use the > true data size to perform the extend operations. Additionally, add a > DEBUG statement identifying the MMIO address being flagged as encrypted > during the MMIO address validation. > > Fixes: c45f678a1ea2080344e125dc55b14e4b9f98483d > Cc: Laszlo Ersek > Cc: Ard Biesheuvel > Cc: Jordan Justen > Cc: Brijesh Singh > Cc: Erdem Aktas > Cc: James Bottomley > Cc: Jiewen Yao > Cc: Min Xu > Acked-by: Laszlo Ersek > Signed-off-by: Tom Lendacky > --- > OvmfPkg/Library/VmgExitLib/VmgExitVcHandler.c | 7 +++++-- > 1 file changed, 5 insertions(+), 2 deletions(-) > > diff --git a/OvmfPkg/Library/VmgExitLib/VmgExitVcHandler.c b/OvmfPkg/Library/VmgExitLib/VmgExitVcHandler.c > index 24259060fd65..dd117f971134 100644 > --- a/OvmfPkg/Library/VmgExitLib/VmgExitVcHandler.c > +++ b/OvmfPkg/Library/VmgExitLib/VmgExitVcHandler.c > @@ -643,6 +643,7 @@ ValidateMmioMemory ( > // > // Any state other than unencrypted is an error, issue a #GP. > // > + DEBUG ((DEBUG_ERROR, "MMIO using encrypted memory: %lx\n", (UINT64) MemoryAddress)); (1) This line is now too long -- 86 characters. But I'll fix that up on merge, if I find nothing serious in v2. Thanks Laszlo > GpEvent.Uint64 = 0; > GpEvent.Elements.Vector = GP_EXCEPTION; > GpEvent.Elements.Type = GHCB_EVENT_INJECTION_TYPE_EXCEPTION; > @@ -817,6 +818,7 @@ MmioExit ( > // fall through > // > case 0xB7: > + DecodeModRm (Regs, InstructionData); > Bytes = (Bytes != 0) ? Bytes : 2; > > Status = ValidateMmioMemory (Ghcb, InstructionData->Ext.RmData, Bytes); > @@ -835,7 +837,7 @@ MmioExit ( > } > > Register = GetRegisterPointer (Regs, InstructionData->Ext.ModRm.Reg); > - SetMem (Register, InstructionData->DataSize, 0); > + SetMem (Register, (UINTN) (1 << InstructionData->DataSize), 0); > CopyMem (Register, Ghcb->SharedBuffer, Bytes); > break; > > @@ -848,6 +850,7 @@ MmioExit ( > // fall through > // > case 0xBF: > + DecodeModRm (Regs, InstructionData); > Bytes = (Bytes != 0) ? Bytes : 2; > > Status = ValidateMmioMemory (Ghcb, InstructionData->Ext.RmData, Bytes); > @@ -878,7 +881,7 @@ MmioExit ( > } > > Register = GetRegisterPointer (Regs, InstructionData->Ext.ModRm.Reg); > - SetMem (Register, InstructionData->DataSize, SignByte); > + SetMem (Register, (UINTN) (1 << InstructionData->DataSize), SignByte); > CopyMem (Register, Ghcb->SharedBuffer, Bytes); > break; > >