From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (NAM11-DM6-obe.outbound.protection.outlook.com [40.107.223.45]) by mx.groups.io with SMTP id smtpd.web11.17915.1681402735744488968 for ; Thu, 13 Apr 2023 09:18:56 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@amd.com header.s=selector1 header.b=odbJ5s2t; spf=permerror, err=parse error for token &{10 18 %{i}._ip.%{h}._ehlo.%{d}._spf.vali.email}: invalid domain name (domain: amd.com, ip: 40.107.223.45, mailfrom: thomas.lendacky@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SXemnLboqx1DKkhGac1EyduV9YGvYIptAAGiJciBcvckLXbVgNuMEu6MI7rxVd2lcUttyDul6buC/KjTWz5Kbaml/uPxMCmLUmWAHOH/ThakA6+aA7GofvErPeXbf00N/LaWkt6Mz+jP1WK4vtRCBRLe56FTYPIbGbmeXVVnil7vfAsGLcVBlkyK4N8dJ+JttkKCmSuEUDIJThXwdzbI5Z5Z2pkwJOlVDOs7YnP8dYbWN6y51bL3XiBqCSEjXXiU2rVKpRhdvNgPQA03XdKzjCD7Nem1gXIhYQgp6vfctt42PDFR+wYTgdVmWVXlfndcobWnqlSIMspA8TVmDIfqRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/MCzgOSryXJ2Kl+/CtzkPvS8fur4qiAloVkPdxbKIB0=; b=SMi93mnHc448+0StrfFn6JLQJO89eFYHHxmltldbw/mrEsQYXc/KsVYHd8KXitj1mwbSLIueoC+4GopD6zoqyQaQfdOk2oNCZAcJRa5SN7YO8JIEasH37ZRpFmJMAsJTI/fhKqvk94weRRNndyUDAqBJN7anNAKoNUjRmTtXysBpH1Bj04edADDvZGotFm510YRhpSTlg56BMofnoEM7N4GA1qBIwHR9qQEX7bWe7oY3e3MSE5Xgn6M5kdCsgvVO+m0F9AtIu30A5W96PpygbfOZ7F+nOtxz36ZMiISohstl9JPaHOMYR3Dvp4biwP2AY002VlIYa5g7IclCU0CzJQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/MCzgOSryXJ2Kl+/CtzkPvS8fur4qiAloVkPdxbKIB0=; b=odbJ5s2tP5X+gUPNrvtUVahIdOQyRh7P3w7NVIOxnc1fzKCvC19HBoijQkPwxM0xpSQ+eTAxO5AK0x2mMjgmXEmo0EN+/0KicGvqJiJHNCfam9kwJ6Ns7/halzMHzgypeY4BAqxSnw2pWZF5vcaiAHlVlZf2DQhKtBMzmLNbuzs= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com; Received: from DM4PR12MB5229.namprd12.prod.outlook.com (2603:10b6:5:398::12) by PH7PR12MB7161.namprd12.prod.outlook.com (2603:10b6:510:200::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6277.36; Thu, 13 Apr 2023 16:18:52 +0000 Received: from DM4PR12MB5229.namprd12.prod.outlook.com ([fe80::ea32:baf8:cc85:9648]) by DM4PR12MB5229.namprd12.prod.outlook.com ([fe80::ea32:baf8:cc85:9648%6]) with mapi id 15.20.6298.030; Thu, 13 Apr 2023 16:18:52 +0000 Message-ID: Date: Thu, 13 Apr 2023 11:18:50 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [edk2-devel] [Patch V2 0/8] Use CpuPageTableLib to create and update smm page table To: "Tan, Dun" , "devel@edk2.groups.io" Cc: "Ni, Ray" References: <1755241E6695EAE7.1885@groups.io> <2301e275-1f69-e5c0-997d-d967264aa590@amd.com> From: "Lendacky, Thomas" In-Reply-To: X-ClientProxiedBy: CH2PR10CA0001.namprd10.prod.outlook.com (2603:10b6:610:4c::11) To DM4PR12MB5229.namprd12.prod.outlook.com (2603:10b6:5:398::12) Return-Path: Thomas.Lendacky@amd.com MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM4PR12MB5229:EE_|PH7PR12MB7161:EE_ X-MS-Office365-Filtering-Correlation-Id: 35be75ac-f527-4349-7b5f-08db3c3ac593 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM4PR12MB5229.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230028)(4636009)(376002)(39860400002)(366004)(346002)(396003)(136003)(451199021)(31686004)(66899021)(478600001)(6512007)(83380400001)(36756003)(31696002)(2616005)(86362001)(38100700002)(966005)(2906002)(53546011)(316002)(6506007)(26005)(110136005)(186003)(5660300002)(66946007)(6486002)(66476007)(8936002)(41300700001)(66556008)(8676002)(4326008)(15650500001)(19627235002)(43740500002)(45980500001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?WGJKU0d1elNoUDhMVGpGTTZXTFZSRWY3RmZSdlhqclBUWmh2bkk1WFRZYjE5?= =?utf-8?B?a1NLckU3OTJ6amF6aDFRQ2NiUWpTVHN0SEg5ZDU3a0JUOFNvU1dmRWdINEEv?= =?utf-8?B?aFVCV0NkSnhhbnUwL3REeGhibEVETHV4UFJHSGxyREltNzJSY052WmIyZG5i?= =?utf-8?B?eXAxSHpzVHczTGxONlg0UXRmOFBOaHB4QkIvdjRWdHZTVkVGaWE2U3NDb1Fz?= =?utf-8?B?V2hWaE1LVEJTZG1PM2lEaFVhV0NiREd6VkNpMFZ2WVgzQ1JlS1JBY3B6SW02?= =?utf-8?B?dUlvdWNXK0NDejJUL25aTEc4eXZMWTdtenN4alF2eGEwMDZNRkhEVHNweHlu?= =?utf-8?B?Z01CeUJESkE1Zm9RTDE1bGo4OVBFYktSYi9YS3Q3c1JSWWo5Zyt3RURjK0RF?= =?utf-8?B?RzZ4c3RLZUtoZ01MekxLNXhTYk5qVCtJRGR4ck9HNHFVUlA1NHllWFFNQ0J5?= =?utf-8?B?eFArVUN5N3VpMGdrL05zb3ViSkx4akNPOXIzNS9lenBJekVBdk9pZU1haUR0?= =?utf-8?B?eGxqQ1hKbVRyWWtHVC9ackR0Mm56Y3R0dThnQVRhU3kxbVkzVVh2SkJ3dFl0?= =?utf-8?B?dXNnV0NPUzV1YjRlSWo0dFpHS09lR3Btc29rN2p5ZEV5VHY4WE42TnJTVUdM?= =?utf-8?B?b1ZZZHo4amVuSlVLenYraE0yVisrUGlwdXJMajdCZUIybWZZd3pNZXdicnVW?= =?utf-8?B?M294YnV3MjNpcjJmeFVnckljTVNHV2hEaUVUUlF3M01yOHV6ck9veWEvelRW?= =?utf-8?B?RmJxcXVUc1ZMOFVobllRNVpyZHhpVCtEUHVPNkNiQzJjRGE4cXE0UHFvcE9p?= =?utf-8?B?b0tUUnBmeHZuUnA4elJpckpsVnp4SG5ESGJYcnFBeHM4eENGa3hLZG1KODhy?= =?utf-8?B?UnBDOVF2MjhHMXJhRjVKSmZXZW1xWGJwUDJSZ24rSUpaY0xLTHFaZnJmZUV0?= =?utf-8?B?eVZWdlhzMGdRVnNIN2tGejhPR2ZMMnhydlMwTjl1MldPbkZMRVJSNnVObjEz?= =?utf-8?B?Z3VqOGlnS0NycmQxVmNBL1phaUJreHNBT09MK2pPSW83VFAzMGcralJkWXcy?= =?utf-8?B?SitFMGRKbmVEU05waldFa0VtR1dyQTFEZ3VYMWswQTdVQ3IrOC9RSFBkd2tO?= =?utf-8?B?VlhtWVZVcmk5emNCTjVXOUd1OEJFSjV2bmFoMFFRa0cyQ2hBNW43alJaMFMv?= =?utf-8?B?YTd5WGxCdDFDbjgwYzVnLys2cFE4ejVlT2Q3RVVoSVZLU2VFSmFqQUc0OFZZ?= =?utf-8?B?NmpNZDl1eGZBTlhqb2hXTTRkNlpUdUtCN0NYV0o5ZlpjYkd6LzVZRGJrK3gv?= =?utf-8?B?SlRmeTVMajJ5dkZpS2trNFh5ZjhKQ3NZWnZlN1FJOEJYZWF5ekUzRFdDeFNB?= =?utf-8?B?eEVsOVgzSExWcXhRMUlMK0dySEo5cEI5WlVreVlqazh1UGpGa0xZelNtWVRN?= =?utf-8?B?L2RWTnNZak1ZbXR2Qm51Mm0xRjFsSithcmlyQVc2Nkl1UGRnZXJ6S3lWQ3l1?= =?utf-8?B?cWh6akhRMVRKRGxySkdPZG5tK21MMFcyZnlscXZRanVPK3BRbUZLZHlXUlJr?= =?utf-8?B?SG1qL3RQVk9sWENUY01Pc0Q4SStBZWJLdklzRW1KM0tiZGhpMlpQWStUQUth?= =?utf-8?B?N2FvQ2dFRDZKMjZUdHRNcGJMWjcxZW0zTHAvVkNobldnTi9oS002U0t4U1dr?= =?utf-8?B?bTU5M29MV25Lek0vQXJsQS9jYlJ2eFAvNi9SWVVTTmN3czFQT2QzdHBvS1Vh?= =?utf-8?B?UWRVVHBlRTFvSXpnQW10dTJlaDc1anJqS0ZaQ2VUenBBQTJvYVZ0VXJ3Q0lj?= =?utf-8?B?TXdDeGpvRVA3YVptMSsxc2RQQm9RMDNnTGROMWhJLzlSc0NRVTFWSEdIS0Fl?= =?utf-8?B?UVhjemdvMXQvV1RNZTJ3UU9vTEdIazRhTTRoTVFYT3p0V0tGTGJ1V3MyM2tJ?= =?utf-8?B?OGhMb2JwdlFDY1BpRExVc1BYY1Q1SjNadWZFUkNmMkc4OG9KOVZKcStiRStN?= =?utf-8?B?REFiNEZLV3h4UG9mSUtqRGhHb0EvTTYvU0lWNjYxRmxLSWhHeEtFR3JKQU1n?= =?utf-8?B?TXNhSkpPak9nNllzM01la0xoQ01sbWlWaFdVWG1yYWJBWlJqS2NUUUUxakl6?= =?utf-8?Q?P0XoF75cVp5LXHpHPK5yR3Xts?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 35be75ac-f527-4349-7b5f-08db3c3ac593 X-MS-Exchange-CrossTenant-AuthSource: DM4PR12MB5229.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Apr 2023 16:18:52.5172 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 5RXtKoJUNG0x7PGIKhJ0SgrO1DTHhXjnFRwH4hmZYvW0mk8lQx5sh6Mwg8Q+uDQQac3fhjlxnJLeaKeOKN7nbA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR12MB7161 Content-Language: en-US Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit On 4/13/23 04:14, Tan, Dun wrote: > Hi Tom, > > Thank you for your help with testing. > For the build failure, it's because that the CpuPageTableLib instance is added into OvmfPkg DSC in the last pacth ' OvmfPkg: Add CpuPageTableLib required by PiSmmCpuDxe'. I have moved this patch to the head of the patch set. > > For the boot failure, I think it's because that the encrypt mask was not applied to the memory used by page table in page table non-leaf entry. Initially I thought the encrypt mask would only be applied to the leaf entry in AMD SEV feature. So I treated the encryption process as non 1:1 mapping, which only applies the encrypt mask to leaf entry. I'm also curious why the DxeIpl patch set works good. All the page table non-leaf entries are also not encrypted in the DxeIpl page table related patch set. Right, and that works for SEV. All non-leaf pagetable entries are treated as encrypted regardless of the encryption bit. Since the tables were built being mapped encrypted, the pagetable walk works when the non-leaf entries don't have the encryption bit set. In this case, though, the encryption bit is present in the non-leaf entry and that is the reason why there are issues. Here is some debug after setting PagingEntry at line 436 of UefiCpuPkg/Library/CpuPageTableLib/CpuPageTableMap.c: *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF81000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF80000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF83000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF81000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF80000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF83000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF81000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 3FF80000 *** DEBUG: PageTableLibMapInLevel:437 - PagingEntry = 800003FC01000 !!!! X64 Exception Type - 0D(#GP - General Protection) CPU Apic ID - 00000000 !!!! 0x800003FC01000 isn't mapped and so it fails - I'm not exactly sure how the #PF turns into a #GP, though, maybe because the virtual address isn't canonical that point. Thanks, Tom > > I'll added another patch in my code branch to fix this issue later. In the new commit, from the perspective of CpuPageTableLib, the whole memory can be divided into 3 categories: memory used by page table, guest private memory and guest shared memory. CpuPageTableLib will always apply the encrypt mask to memory used by page table, which means all the non-leaf page table entries are encrypted. For guest private memory, this case can be treated as non-1:1 mapping. We can apply the encrypt mask by setting the input parameter of PageTableMap() API like " Attribute.Uint64 = LinearAddress | AddressEncMask". For guest shared memory, this case can be treated as normal 1:1 mapping. I'll let you know once the new patch is ready. > > Thanks, > Dun > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Lendacky, Thomas via groups.io > Sent: Thursday, April 13, 2023 3:26 AM > To: devel@edk2.groups.io; Tan, Dun > Subject: Re: [edk2-devel] [Patch V2 0/8] Use CpuPageTableLib to create and update smm page table > > On 4/12/23 05:17, duntan via groups.io wrote: >> Hi Tom, >> >> This patch set is to change PiSmmCpuDxeSmm code to use CpuPageTableLib to create and update SMM page table. The Pcd PcdPteMemoryEncryptionAddressOrMask is also used in PiSmmCpuDxeSmm code and the whole range covered by page table is mapped encrypted, which is different from the situation in DxeIpl module. >> So could you also help do a test to make sure the AMD SEV feature still works good in SMM with this patch set? >> Here is the code branch in my fork repo: >> https://github.com/td36/edk2/commits/SmmPageTable_V2 > > Hi Dun, > > I tested at the final commit of the branch and encountered a #GP with an SEV guest. It looks like the CpuPageTableLibrary doesn't take the encryption bit into account. For example: > > Line 436 of UefiCpuPkg/Library/CpuPageTableLib/CpuPageTableMap.c > PagingEntry = (IA32_PAGING_ENTRY *)(UINTN)IA32_PNLE_PAGE_TABLE_BASE_ADDRESS (&ParentPagingEntry->Pnle); > > This will get an address with the encryption bit set and then try to reference it. When I clear the encryption bit, the code proceeds a bit further, but then encounters a #GP in a different location. > > So it appears that the CpuPageTableLibrary doesn't deal with the encryption bit properly. > > Also, going through a build/test of each individual patch had mixed results. > > - With the second patch in the series applied, I get a build error: > > /root/kernels/ovmf-dun-build-X64/OvmfPkg/OvmfPkgX64.dsc(...): error 4000: Instance of library class [CpuPageTableLib] is not found > in [/root/kernels/ovmf-dun-build-X64/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf] [X64] > consumed by module [/root/kernels/ovmf-dun-build-X64/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf] > > that isn't resolved until the final patch. > > Thanks, > Tom > >> >> Thanks, >> Dun >> >> -----Original Message----- >> From: devel@edk2.groups.io On Behalf Of duntan >> Sent: Wednesday, April 12, 2023 4:54 PM >> To: devel@edk2.groups.io >> Subject: [edk2-devel] [Patch V2 0/8] Use CpuPageTableLib to create and >> update smm page table >> >> In V2 patch set: >> 1.In 'Refinement to code about updating smm page table', use QuickSort() in BaseLib instead or PerformQuickSort() in BaseSortLib. >> 2.Remove the patch to add BaseSortLib in DSC file. >> 3.Add a new patch to add CpuPageTableLib in UefiCpuPkg.dsc. >> 4.Add a temp patch to add CpuPageTableLib in OvmfPkg dsc files for >> test(A previous patch I sent before '[Patch V2 4/8] OvmfPkg: Add >> CpuPageTableLib required by DxeIpl in DSC file' contains all the >> changes in this patch) >> >> Dun Tan (8): >> OvmfPkg: Add CpuPageTableLib required by PiSmmCpuDxe >> UefiPayloadPkg: Add CpuPageTableLib required by PiSmmCpuDxe >> UefiCpuPkg: Use CpuPageTableLib to convert SMM paging attribute. >> UefiCpuPkg/PiSmmCpuDxeSmm: Avoid setting non-present range to RO/NX >> UefiCpuPkg: Extern mSmmShadowStackSize in PiSmmCpuDxeSmm.h >> UefiCpuPkg: Refinement to current smm page table generation code >> UefiCpuPkg: Refinement to code about updating smm page table >> UefiCpuPkg/PiSmmCpuDxeSmm: Remove unnecessary function >> >> OvmfPkg/CloudHv/CloudHvX64.dsc | 2 +- >> OvmfPkg/OvmfPkgIa32.dsc | 3 ++- >> OvmfPkg/OvmfPkgIa32X64.dsc | 2 +- >> OvmfPkg/OvmfPkgX64.dsc | 2 +- >> UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c | 5 +++-- >> UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/SmmFuncsArch.c | 3 +-- >> UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/SmmProfileArch.c | 2 +- >> UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c | 132 ------------------------------------------------------------------------------------------------------------------------------------ >> UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c | 8 ++++++-- >> UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h | 97 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++------------------------------------- >> UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf | 1 + >> UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c | 629 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- >> UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c | 348 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- >> UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c | 229 ++++++++++++++++++++++++++++++------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- >> UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmmFuncsArch.c | 3 +-- >> UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmmProfileArch.c | 19 ++----------------- >> UefiPayloadPkg/UefiPayloadPkg.dsc | 2 +- >> 17 files changed, 510 insertions(+), 977 deletions(-) >> > > > > >