From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (NAM12-MW2-obe.outbound.protection.outlook.com [40.107.244.87]) by mx.groups.io with SMTP id smtpd.web09.450.1624402073734698820 for ; Tue, 22 Jun 2021 15:47:54 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@amd.com header.s=selector1 header.b=i/4vsLmc; spf=permerror, err=parse error for token &{10 18 %{i}._ip.%{h}._ehlo.%{d}._spf.vali.email}: invalid domain name (domain: amd.com, ip: 40.107.244.87, mailfrom: thomas.lendacky@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fs3n45YTMMOdGQRAXkyQPAr3dChKl4n22XDHzolLnIYNYS0FtVyV2uyx/YX+Cg3wKFWeo0357k+AMZR3IxuV16m5S83k0ai7AWuIcLVDIQuXRiGvs153j8iuVrkvI7QyZD3WqzBrNadRULOUunquokBmPctNvrWKQBVe+hdJ46sJTK4SlwICrbogWDmWNBRyzZMssomhm4H6jbbHNhUKC90PdBTB+5g8thruFyC4Lr7mL3lROk0xOOvjNVW9mQIIR07EepGI9gvaWgrgO2yP+/nreNvgxXQgsDVkgxBDKvIpGx9dAUpHAATmVX0DzfueHnjlwKU+8Vr259b1TSaJwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JVKBbi/4xykscp22rECIwCwETBb8iTtgXJ5tA186Uyc=; b=U13IpgK66JvEzaTd7z860q16aG3htFpWUhnn/HclhXotIvKZLO2FMIA6eT8nM25Cfm4wMYodms9Oc8ftva+FRuzrd2X1lwnA6nXdO7FZnoFAVcJXWqaKSUxxoE26/0Fcu/5o2Cka7iciCPsQnBdaJNTWZ04LJx5mli63U3B9Tz4+ikw8ac6LMnMyJBzgjBqTWqd2zzUWyDWuw/tD98svYgk6NuxRAObpXHsbexuEcFrHmxbbVQr0sX7nMnhyduCL+fO4r6wbQvsLIpM5WBkcMSV/Q2FbP8ry4x/z04ISAsRWu56V5LRRHxPnTo02VvvXKe/vRTm/j46yTn4NJTvf7A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JVKBbi/4xykscp22rECIwCwETBb8iTtgXJ5tA186Uyc=; b=i/4vsLmcIXIfCm7q8IawI7ATSgP4v8wmVgwyyP8B8n3VZg1xiKmwTPWXJSk4ceRe5Z+WPrmUjt+ne3Pg85LRf0E2eJs8PQNBbnIjnmc3uFTEWdbBy1/XwFwmhN45wORQdOF+R8KV660TpNnSih+25uDt7z1lFfc2y3hHpAXUUR0= Authentication-Results: arm.com; dkim=none (message not signed) header.d=none;arm.com; dmarc=none action=none header.from=amd.com; Received: from DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) by DM5PR12MB4680.namprd12.prod.outlook.com (2603:10b6:4:a6::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.19; Tue, 22 Jun 2021 22:47:51 +0000 Received: from DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::6437:2e87:f7dc:a686]) by DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::6437:2e87:f7dc:a686%12]) with mapi id 15.20.4242.023; Tue, 22 Jun 2021 22:47:50 +0000 Subject: Re: [PATCH v4 1/4] OvmfPkg/MemEncryptHypercallLib: add library to support SEV hypercalls. To: Ashish Kalra , devel@edk2.groups.io Cc: brijesh.singh@amd.com, jejb@linux.ibm.com, erdemaktas@google.com, jiewen.yao@intel.com, min.m.xu@intel.com, lersek@redhat.com, jordan.l.justen@intel.com, ard.biesheuvel@arm.com References: <7d0a30a022a7d3d3e056af8f79b87ed9991d2f52.1624281247.git.ashish.kalra@amd.com> From: "Lendacky, Thomas" Message-ID: Date: Tue, 22 Jun 2021 17:47:48 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.8.1 In-Reply-To: <7d0a30a022a7d3d3e056af8f79b87ed9991d2f52.1624281247.git.ashish.kalra@amd.com> X-Originating-IP: [67.79.209.213] X-ClientProxiedBy: SA0PR11CA0041.namprd11.prod.outlook.com (2603:10b6:806:d0::16) To DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) Return-Path: thomas.lendacky@amd.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from office-ryzen.texastahm.com (67.79.209.213) by SA0PR11CA0041.namprd11.prod.outlook.com (2603:10b6:806:d0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.21 via Frontend Transport; Tue, 22 Jun 2021 22:47:49 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: d2bbf9b1-7f0c-4c21-0b54-08d935cfc3a5 X-MS-TrafficTypeDiagnostic: DM5PR12MB4680: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:4502; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR12MB1355.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(346002)(376002)(136003)(366004)(39860400002)(478600001)(36756003)(8676002)(4326008)(6512007)(2616005)(5660300002)(83380400001)(6486002)(66556008)(956004)(38100700002)(66476007)(26005)(66946007)(86362001)(2906002)(53546011)(31686004)(6506007)(31696002)(8936002)(19627235002)(16526019)(186003)(30864003)(316002)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bWsycmRXcFZ0OWtCTFdCaVMxU0lxQ1Fjd1d0dkZ0aEdhL3I1a0I0UERLUjAz?= =?utf-8?B?RThzYVR1QVpRWFdRWmF6UVI3SjYveHJqQ1lRL2diSGpqRndoYmwrT2xMdG93?= =?utf-8?B?M01JQTBGUGQrYUlrSWxzb3ozbFBVeFR2UHY4NXFLUzRnbmhwNzNmT1hHUXBy?= =?utf-8?B?aTJ5OTQ4Y2xOdklha0tnV0xNeG9oQ1dqektYNXRHN3VMYi80a1FQRmo1RlJz?= =?utf-8?B?b3FZS0RhVC8xSjNEdlJDVmZ6NkpvME1uOXJSWHc5Y1FpSDBQMnNrcXkyS2RG?= =?utf-8?B?cWN1Q1ZhTzNzR0ZMZVRwMTZLdzhlcXVZcEZiNWtWc3MybXJXL3NYYmFDVGV1?= =?utf-8?B?T3FxTEZ3MzhEU2ZFM3hDRllUVUYvS0Zwa1d4UzJCTTV3aVF3d2daMWVlN0lT?= =?utf-8?B?OVJ3VDNkSFlINmlMSndiYlQrT3d1OHM1M0J6V3FXbCsrc091SEtIcjNwbHYw?= =?utf-8?B?WG9kQUZnU1J0NHh6Vk9WTktmTnJsY2RSa3R3RmZOTzI5bk1Qak1MSXByaXI3?= =?utf-8?B?blByQVVIU1hmdW1MaXo2L205K25Da3Vock91cFFDRmpYWTlBZkUzNFdZaVJI?= =?utf-8?B?OUh0VGlJY2czTGEvV3BJeFhNelJvK3l1VStkdUdZL0o0MXlDVzRGNWV5K0kx?= =?utf-8?B?SUlWVUorNWdGNG5OWEZkVXF1Y2ozUFdtVG50eFA0djd3Z0tGVVV1RVpOZFBk?= =?utf-8?B?RWFTb1VFdzZHNU1oeUFWclJxanBJRi80bEtXWEdRSUR3YUhsWm5rOGEyNlpz?= =?utf-8?B?RmliSzQyUDA2bWVRL3RheHJqUmpicEx6Q0dyazFiZk9DUGJQZUw3RFNoK3c2?= =?utf-8?B?bXhocU9mRUEwZ2xzZ2xCM3NyamNxZFNBbTNBZCtvaGcwa3hXTGFsQ3JiYlRB?= =?utf-8?B?N042Q0hnWW9hRkkxMHM5bkszV3N0Qm9DTkFaa0JUK3VzNnk4RElVNWlOK3JT?= =?utf-8?B?c0dML3NHRUFmeVR4dFoxS0ZzVmg3UEFjaEVFY0pnL08xQTFSTjYzNkZBbE1I?= =?utf-8?B?R1krRjZqWGlGZEtIcUNJYnpxbTZqQ0lyWGFVbnlBM0czM2E1UDJLTEtnNCtv?= =?utf-8?B?a2hoaWM5aVJWSGdiMzZMcDh5ZGNZSGM5Y3BoWWlmV08xd1I0c2FDSHFCL280?= =?utf-8?B?b2N1bERsTnlyeURJUFp6WjRwWWcybVhNOUl3enJVQjRtbG5JWERsY2MxelEw?= =?utf-8?B?ckI2SHZQdWVINzJOTHB4UFovU2g4U2JIWjI5U09yMkRrRGJuSTlGaXpKMis3?= =?utf-8?B?SjVJNG9KdTdhZTlNMitKYUpadko1cWNGdlhjZG4ydW8rYW01RnEyQmFpNEN0?= =?utf-8?B?N0QrMGlrNzVhNy9CT3RuS0c3ck8rSkMrNFd6YWNieGRhcTZ3UVdLdWpUQVRk?= =?utf-8?B?M0dJTXVUV2lERDA2MWVFU0lCQ1JGZUlKeHlwOVZZNURGSjRmMlJqam9lZi9W?= =?utf-8?B?RjZ1QXRLa01LOUQzeXlDelNRRGNlVHhxUzhGeTE3TnlPdm5ONlRyaDBTQ2oz?= =?utf-8?B?Wmg3d3VjNTR0QjJHakFOZkMyTzMxd1dXZnoza3FpNitIK3Y2TGFKejZjUkdD?= =?utf-8?B?VGwrbS83OG8rd2xhQ3VZTUFDR25Sb3NlL2Z0L2E3ZCtYUkk1WnNPb0V2TVFk?= =?utf-8?B?NkhJNnRhS3RKSFZ0VlI3TGZqQk8xUkxGVlN6d3RWVGE3UEVjanN6WWNGVjJn?= =?utf-8?B?bE13VGVYSCtzMCtQK2wwK05SUTlXQWp1akd6a3dqWEdLdCtrVnJtK0RRVGNs?= =?utf-8?Q?XZK1iGnTy0q1E6/ihL/O9Xm0p/Dp6fAYLw1cR2l?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: d2bbf9b1-7f0c-4c21-0b54-08d935cfc3a5 X-MS-Exchange-CrossTenant-AuthSource: DM5PR12MB1355.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Jun 2021 22:47:50.8800 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 34IhYOaEZ3vN+X/LjsyylIwnnUZSgPokUfZ/h7EPk/kLLTukKAj8tv/6P8V49ZLxyhGRjxvLreqlt8BpWhVUyQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB4680 Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit On 6/21/21 8:56 AM, Ashish Kalra wrote: > From: Ashish Kalra > > Add SEV and SEV-ES hypercall abstraction library to support SEV Page > encryption/deceryption status hypercalls for SEV and SEV-ES guests. Does this have to be a new library? It's just a single function and so I would think it could live in the BaseMemEncryptSevLib library where the change to the c-bit is being done anyway. > > Cc: Jordan Justen > Cc: Laszlo Ersek > Cc: Ard Biesheuvel > > Signed-off-by: Ashish Kalra > --- > Maintainers.txt | 2 + > OvmfPkg/Include/Library/MemEncryptHypercallLib.h | 43 ++++++++ > OvmfPkg/Library/MemEncryptHypercallLib/Ia32/MemEncryptHypercallLib.c | 37 +++++++ > OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf | 42 ++++++++ > OvmfPkg/Library/MemEncryptHypercallLib/X64/AsmHelperStub.nasm | 28 ++++++ > OvmfPkg/Library/MemEncryptHypercallLib/X64/MemEncryptHypercallLib.c | 105 ++++++++++++++++++++ > OvmfPkg/OvmfPkgIa32.dsc | 1 + > OvmfPkg/OvmfPkgIa32X64.dsc | 1 + > OvmfPkg/OvmfPkgX64.dsc | 1 + > OvmfPkg/OvmfXen.dsc | 1 + > 10 files changed, 261 insertions(+) > > diff --git a/Maintainers.txt b/Maintainers.txt > index ea54e0b7e9..8ecc8464ba 100644 > --- a/Maintainers.txt > +++ b/Maintainers.txt > @@ -449,8 +449,10 @@ F: OvmfPkg/AmdSev/ > F: OvmfPkg/AmdSevDxe/ > F: OvmfPkg/Include/Guid/ConfidentialComputingSecret.h > F: OvmfPkg/Include/Library/MemEncryptSevLib.h > +F: OvmfPkg/Include/Library/MemEncryptHypercallLib.h > F: OvmfPkg/IoMmuDxe/AmdSevIoMmu.* > F: OvmfPkg/Library/BaseMemEncryptSevLib/ > +F: OvmfPkg/Library/MemEncryptHypercallLib/ > F: OvmfPkg/Library/PlatformBootManagerLibGrub/ > F: OvmfPkg/Library/VmgExitLib/ > F: OvmfPkg/PlatformPei/AmdSev.c > diff --git a/OvmfPkg/Include/Library/MemEncryptHypercallLib.h b/OvmfPkg/Include/Library/MemEncryptHypercallLib.h > new file mode 100644 > index 0000000000..b241a189b6 > --- /dev/null > +++ b/OvmfPkg/Include/Library/MemEncryptHypercallLib.h > @@ -0,0 +1,43 @@ > +/** @file > + > + Define Secure Encrypted Virtualization (SEV) hypercall library. > + > + Copyright (c) 2020, AMD Incorporated. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#ifndef _MEM_ENCRYPT_HYPERCALL_LIB_H_ > +#define _MEM_ENCRYPT_HYPERCALL_LIB_H_ > + > +#include > + > +#define KVM_HC_MAP_GPA_RANGE 12 > +#define KVM_MAP_GPA_RANGE_PAGE_SZ_4K 0 > +#define KVM_MAP_GPA_RANGE_PAGE_SZ_2M (1 << 0) Use the BIT0 define, e.g.: #define KVM_MAP_GPA_RANGE_PAGE_SZ_2M BIT0 > +#define KVM_MAP_GPA_RANGE_PAGE_SZ_1G (1 << 1) BIT1 Also, where are these used? Are they supposed to be part of the "Mode" parameter, in which case the comment for Mode below is incorrect. > +#define KVM_MAP_GPA_RANGE_ENC_STAT(n) ((n) << 4) > +#define KVM_MAP_GPA_RANGE_ENCRYPTED KVM_MAP_GPA_RANGE_ENC_STAT(1) > +#define KVM_MAP_GPA_RANGE_DECRYPTED KVM_MAP_GPA_RANGE_ENC_STAT(0) > + > +/** > + This hyercall is used to notify hypervisor when a page is marked as > + 'decrypted' (i.e C-bit removed). > + > + @param[in] PhysicalAddress The physical address that is the start address > + of a memory region. > + @param[in] Length The length of memory region > + @param[in] Mode SetCBit or ClearCBit > + > +**/ > + > +VOID > +EFIAPI > +SetMemoryEncDecHypercall3 ( > + IN UINTN PhysicalAddress, > + IN UINTN Length, > + IN UINTN Mode > + ); > + > +#endif > diff --git a/OvmfPkg/Library/MemEncryptHypercallLib/Ia32/MemEncryptHypercallLib.c b/OvmfPkg/Library/MemEncryptHypercallLib/Ia32/MemEncryptHypercallLib.c > new file mode 100644 > index 0000000000..2e73d47ee6 > --- /dev/null > +++ b/OvmfPkg/Library/MemEncryptHypercallLib/Ia32/MemEncryptHypercallLib.c > @@ -0,0 +1,37 @@ > +/** @file > + > + Secure Encrypted Virtualization (SEV) hypercall helper library > + > + Copyright (c) 2020, AMD Incorporated. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#include > +#include > +#include > + > +/** > + This hyercall is used to notify hypervisor when a page is marked as > + 'decrypted' (i.e C-bit removed). > + > + @param[in] PhysicalAddress The physical address that is the start address > + of a memory region. > + @param[in] Length The length of memory region > + @param[in] Mode SetCBit or ClearCBit This isn't actually SetCBit or ClearCBit based on how I see it used below. > + > +**/ > + > +VOID > +EFIAPI > +SetMemoryEncDecHypercall3 ( > + IN PHYSICAL_ADDRESS PhysicalAddress, > + IN UINTN Pages, This doesn't match the comment above. > + IN UINTN Mode > + ) > +{ > + // > + // Memory encryption bit is not accessible in 32-bit mode > + // > +} > diff --git a/OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf b/OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf > new file mode 100644 > index 0000000000..a77d58a7e6 > --- /dev/null > +++ b/OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf > @@ -0,0 +1,42 @@ > +## @file > +# Library provides the hypervisor helper functions for SEV guest > +# > +# Copyright (c) 2020 Advanced Micro Devices. All rights reserved.
> +# > +# SPDX-License-Identifier: BSD-2-Clause-Patent > +# > +# > +## > + > +[Defines] > + INF_VERSION = 1.25 > + BASE_NAME = MemEncryptHypercallLib > + FILE_GUID = 86f2501e-f128-45f3-91c4-3cff31656ca8 > + MODULE_TYPE = BASE > + VERSION_STRING = 1.0 > + LIBRARY_CLASS = MemEncryptHypercallLib > + > +# > +# The following information is for reference only and not required by the build > +# tools. > +# > +# VALID_ARCHITECTURES = IA32 X64 > +# > + > +[Packages] > + MdeModulePkg/MdeModulePkg.dec > + MdePkg/MdePkg.dec > + UefiCpuPkg/UefiCpuPkg.dec > + OvmfPkg/OvmfPkg.dec > + > +[Sources.X64] > + X64/MemEncryptHypercallLib.c > + X64/AsmHelperStub.nasm > + > +[Sources.IA32] > + Ia32/MemEncryptHypercallLib.c > + > +[LibraryClasses] > + BaseLib > + DebugLib > + VmgExitLib > diff --git a/OvmfPkg/Library/MemEncryptHypercallLib/X64/AsmHelperStub.nasm b/OvmfPkg/Library/MemEncryptHypercallLib/X64/AsmHelperStub.nasm > new file mode 100644 > index 0000000000..f29b96f9b0 > --- /dev/null > +++ b/OvmfPkg/Library/MemEncryptHypercallLib/X64/AsmHelperStub.nasm > @@ -0,0 +1,28 @@ > +DEFAULT REL > +SECTION .text > + > +; VOID > +; EFIAPI > +; SetMemoryEncDecHypercall3AsmStub ( > +; IN UINT HypercallNum, > +; IN INTN Arg1, > +; IN INTN Arg2, > +; IN INTN Arg3 > +; ); > +global ASM_PFX(SetMemoryEncDecHypercall3AsmStub) > +ASM_PFX(SetMemoryEncDecHypercall3AsmStub): > + ; UEFI calling conventions require RBX to > + ; be nonvolatile/callee-saved. > + push rbx > + ; Copy HypercallNumber to rax Placing these comments on the same line will make this more readable, e.g.: mov rax, rcx ; Copy HypercallNum to rax > + mov rax, rcx > + ; Copy Arg1 to the register expected by KVM > + mov rbx, rdx > + ; Copy Arg2 to register expected by KVM > + mov rcx, r8 > + ; Copy Arg2 to register expected by KVM > + mov rdx, r9 > + ; Call VMMCALL > + vmmcall > + pop rbx > + ret > diff --git a/OvmfPkg/Library/MemEncryptHypercallLib/X64/MemEncryptHypercallLib.c b/OvmfPkg/Library/MemEncryptHypercallLib/X64/MemEncryptHypercallLib.c > new file mode 100644 > index 0000000000..1c09ea012b > --- /dev/null > +++ b/OvmfPkg/Library/MemEncryptHypercallLib/X64/MemEncryptHypercallLib.c > @@ -0,0 +1,105 @@ > +/** @file > + > + Secure Encrypted Virtualization (SEV) hypercall helper library > + > + Copyright (c) 2020, AMD Incorporated. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +// > +// Interface exposed by the ASM implementation of the core hypercall > +// > +// > + > +VOID > +EFIAPI > +SetMemoryEncDecHypercall3AsmStub ( > + IN UINTN HypercallNum, > + IN UINTN PhysicalAddress, > + IN UINTN Length, > + IN UINTN Mode > + ); > + > +STATIC > +VOID > +GhcbSetRegValid ( > + IN OUT GHCB *Ghcb, > + IN GHCB_REGISTER Reg > + ) > +{ > + UINT32 RegIndex; > + UINT32 RegBit; > + > + RegIndex = Reg / 8; > + RegBit = Reg & 0x07; > + > + Ghcb->SaveArea.ValidBitmap[RegIndex] |= (1 << RegBit); > +} As Brijesh noted, you should be using the function defined in VmgExitLib.h. > + > +/** > + This hyercall is used to notify hypervisor when a page is marked as > + 'decrypted' (i.e C-bit removed). > + > + @param[in] PhysicalAddress The physical address that is the start address > + of a memory region. > + @param[in] Length The length of memory region > + @param[in] Mode SetCBit or ClearCBit > + > +**/ > + > +VOID > +EFIAPI > +SetMemoryEncDecHypercall3 ( > + IN PHYSICAL_ADDRESS PhysicalAddress, > + IN UINTN Pages, > + IN UINTN Mode > + ) > +{ > + if (MemEncryptSevEsIsEnabled ()) { > + MSR_SEV_ES_GHCB_REGISTER Msr; > + GHCB *Ghcb; > + BOOLEAN InterruptState; > + UINT64 Status; > + > + Msr.GhcbPhysicalAddress = AsmReadMsr64 (MSR_SEV_ES_GHCB); > + Ghcb = Msr.Ghcb; > + > + VmgInit (Ghcb, &InterruptState); > + > + Ghcb->SaveArea.Rax = KVM_HC_MAP_GPA_RANGE; > + GhcbSetRegValid (Ghcb, GhcbRax); > + Ghcb->SaveArea.Rbx = PhysicalAddress; > + GhcbSetRegValid (Ghcb, GhcbRbx); > + Ghcb->SaveArea.Rcx = Pages; > + GhcbSetRegValid (Ghcb, GhcbRcx); > + Ghcb->SaveArea.Rdx = Mode; > + GhcbSetRegValid (Ghcb, GhcbRdx); > + Ghcb->SaveArea.Cpl = AsmReadCs() & 0x3; > + GhcbSetRegValid (Ghcb, GhcbCpl); > + > + Status = VmgExit (Ghcb, SVM_EXIT_VMMCALL, 0, 0); > + if (Status) { > + DEBUG ((DEBUG_ERROR, "SVM_EXIT_VMMCALL failed %lx\n", Status)); > + } > + VmgDone (Ghcb, InterruptState); > + } else { > + SetMemoryEncDecHypercall3AsmStub ( > + KVM_HC_MAP_GPA_RANGE, > + PhysicalAddress, > + Pages, > + Mode > + ); > + } > +} You could just issue the VMMCALL and, for SEV-ES, let the VC handler take care of this. You would just have to add some smarts to the VC handler to compare the hypercall number and add the additional register values. You could probably get rid of a level of function calls that way. Thoughts? Thanks, Tom > diff --git a/OvmfPkg/OvmfPkgIa32.dsc b/OvmfPkg/OvmfPkgIa32.dsc > index f53efeae79..36f1d82ce7 100644 > --- a/OvmfPkg/OvmfPkgIa32.dsc > +++ b/OvmfPkg/OvmfPkgIa32.dsc > @@ -176,6 +176,7 @@ > VirtioLib|OvmfPkg/Library/VirtioLib/VirtioLib.inf > LoadLinuxLib|OvmfPkg/Library/LoadLinuxLib/LoadLinuxLib.inf > MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLib.inf > + MemEncryptHypercallLib|OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf > !if $(SMM_REQUIRE) == FALSE > LockBoxLib|OvmfPkg/Library/LockBoxLib/LockBoxBaseLib.inf > !endif > diff --git a/OvmfPkg/OvmfPkgIa32X64.dsc b/OvmfPkg/OvmfPkgIa32X64.dsc > index b3662e17f2..2a743688b4 100644 > --- a/OvmfPkg/OvmfPkgIa32X64.dsc > +++ b/OvmfPkg/OvmfPkgIa32X64.dsc > @@ -180,6 +180,7 @@ > VirtioLib|OvmfPkg/Library/VirtioLib/VirtioLib.inf > LoadLinuxLib|OvmfPkg/Library/LoadLinuxLib/LoadLinuxLib.inf > MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLib.inf > + MemEncryptHypercallLib|OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf > !if $(SMM_REQUIRE) == FALSE > LockBoxLib|OvmfPkg/Library/LockBoxLib/LockBoxBaseLib.inf > !endif > diff --git a/OvmfPkg/OvmfPkgX64.dsc b/OvmfPkg/OvmfPkgX64.dsc > index 0a237a9058..eb9da51a15 100644 > --- a/OvmfPkg/OvmfPkgX64.dsc > +++ b/OvmfPkg/OvmfPkgX64.dsc > @@ -180,6 +180,7 @@ > VirtioLib|OvmfPkg/Library/VirtioLib/VirtioLib.inf > LoadLinuxLib|OvmfPkg/Library/LoadLinuxLib/LoadLinuxLib.inf > MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLib.inf > + MemEncryptHypercallLib|OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf > !if $(SMM_REQUIRE) == FALSE > LockBoxLib|OvmfPkg/Library/LockBoxLib/LockBoxBaseLib.inf > !endif > diff --git a/OvmfPkg/OvmfXen.dsc b/OvmfPkg/OvmfXen.dsc > index 3c1ca6bfd4..de0c052832 100644 > --- a/OvmfPkg/OvmfXen.dsc > +++ b/OvmfPkg/OvmfXen.dsc > @@ -167,6 +167,7 @@ > QemuFwCfgLib|OvmfPkg/Library/QemuFwCfgLib/QemuFwCfgDxeLib.inf > QemuLoadImageLib|OvmfPkg/Library/GenericQemuLoadImageLib/GenericQemuLoadImageLib.inf > MemEncryptSevLib|OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLib.inf > + MemEncryptHypercallLib|OvmfPkg/Library/MemEncryptHypercallLib/MemEncryptHypercallLib.inf > LockBoxLib|OvmfPkg/Library/LockBoxLib/LockBoxBaseLib.inf > CustomizedDisplayLib|MdeModulePkg/Library/CustomizedDisplayLib/CustomizedDisplayLib.inf > FrameBufferBltLib|MdeModulePkg/Library/FrameBufferBltLib/FrameBufferBltLib.inf >