From nobody Sat Nov 2 10:21:00 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) client-ip=198.145.21.10; envelope-from=edk2-devel-bounces@lists.01.org; helo=ml01.01.org; Authentication-Results: mx.zoho.com; spf=none (zoho.com: 198.145.21.10 is neither permitted nor denied by domain of lists.01.org) smtp.mailfrom=edk2-devel-bounces@lists.01.org; Return-Path: Received: from ml01.01.org (ml01.01.org [198.145.21.10]) by mx.zohomail.com with SMTPS id 1493496916276666.893411458276; Sat, 29 Apr 2017 13:15:16 -0700 (PDT) Received: from [127.0.0.1] (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 4ACEB21951CAE; Sat, 29 Apr 2017 13:15:14 -0700 (PDT) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id F2361219493C3 for ; Sat, 29 Apr 2017 13:15:13 -0700 (PDT) Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6A49281226; Sat, 29 Apr 2017 20:15:13 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-116-30.phx2.redhat.com [10.3.116.30]) by smtp.corp.redhat.com (Postfix) with ESMTP id 4F87A18023; Sat, 29 Apr 2017 20:15:10 +0000 (UTC) X-Original-To: edk2-devel@lists.01.org DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 6A49281226 Authentication-Results: ext-mx01.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx01.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=lersek@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 6A49281226 From: Laszlo Ersek To: edk2-devel-01 Date: Sat, 29 Apr 2017 22:14:59 +0200 Message-Id: <20170429201500.18496-3-lersek@redhat.com> In-Reply-To: <20170429201500.18496-1-lersek@redhat.com> References: <20170429201500.18496-1-lersek@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Sat, 29 Apr 2017 20:15:13 +0000 (UTC) Subject: [edk2] [PATCH 2/3] OvmfPkg: introduce FD_SIZE_4MB (mainly) for Windows HCK X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Jordan Justen , Gary Ching-Pang Lin MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Errors-To: edk2-devel-bounces@lists.01.org Sender: "edk2-devel" X-ZohoMail: RSF_4 Z_629925259 SPT_0 Content-Type: text/plain; charset="utf-8" The "Confirm64KilobytesOfUnauthenticatedVariableStorage" test case of the Secure Boot Logo Test ("Microsoft.UefiSecureBootLogo.Tests") suite in the Microsoft Hardware Certification Kit expects to be able to populate the variable store up to roughly 64 KB, with a series of 1 KB sized, unauthenticated variables. OVMF's current live varstore area is too small for this: 56 KB. Introduce the FD_SIZE_4MB build macro, which - enlarges the full flash image to 4MB -- QEMU supports up to 8MB, see FLASH_MAP_BASE_MIN in "hw/i386/pc_sysfw.c" --, - inside that, grows the varstore area / pflash chip to 512 KB, and within it, the live area from 56 KB to 248 KB. (For the latter, Hyper-V considers 128 KB generous: Re: [edk2] Secure Boot & NV storage size http://mid.mail-archive.com/24f63595e68c476eb98cf87e7abfa1bc@BL2PR03MB242= .namprd03.prod.outlook.com so we should be larger than that, for future proofing.) Importantly, a firmware binary built with -D FD_SIZE_4MB will *not* be compatible with a variable store that originates from a variable store template built *without* -D FD_SIZE_4MB. This is the reason for the large increase, as every such change breaks compatibility between a new firmware binary and old varstore files. Enlarging the varstore should not impact the performance of normal operations, as we keep the varstore block size 4KB. The performance of reclaim is affected, but that is expected (since reclaim has to rework the full live area). And, reclaim should occur proportionally less frequently. While at it, the FVMAIN_COMPACT volume (with the compressed FFS file in it) is also enlarged significantly, so that we have plenty of room for future DXEFV (and perhaps PEIFV) increments -- DXEFV has been growing steadily, and that increase shows through compression too. Right now the PEIFV and DXEFV volumes need no resizing. Here's a summary: Description Compression type Size [KB] ------------------------- ----------------- ---------------------- Non-volatile data storage open-coded binary 128 -> 512 ( +384) data Variable store 56 -> 248 ( +192) Event log 4 -> 4 ( +0) Working block 4 -> 4 ( +0) Spare area 64 -> 256 ( +192) FVMAIN_COMPACT uncompressed 1712 -> 3376 (+1664) FV FFS file LZMA compressed PEIFV uncompressed 896 -> 896 ( +0) individual PEI uncompressed modules DXEFV uncompressed 10240 -> 10240 ( +0) individual DXE uncompressed modules SECFV uncompressed 208 -> 208 ( +0) SEC driver reset vector code Cc: Gary Ching-Pang Lin Cc: Jordan Justen Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Laszlo Ersek --- OvmfPkg/OvmfPkg.fdf.inc | 29 ++++++++++++ OvmfPkg/VarStore.fdf.inc | 46 +++++++++++++++++++- 2 files changed, 73 insertions(+), 2 deletions(-) diff --git a/OvmfPkg/OvmfPkg.fdf.inc b/OvmfPkg/OvmfPkg.fdf.inc index fce6c7b8ce64..a1eb2d380167 100644 --- a/OvmfPkg/OvmfPkg.fdf.inc +++ b/OvmfPkg/OvmfPkg.fdf.inc @@ -20,8 +20,35 @@ # # Defining FD_SIZE_1MB on the build command line can override this. # +# A firmware binary built for the default 2MB flash size, and a firmware b= inary +# built with FD_SIZE_1MB defined, use the same variable store layout. +# +# Defining FD_SIZE_4MB results in a different (much larger) variable store +# structure that is incompatible with both the default and the FD_SIZE_1MB +# firmware binaries. +# =20 DEFINE BLOCK_SIZE =3D 0x1000 + +!ifdef $(FD_SIZE_4MB) + +DEFINE VARS_SIZE =3D 0x80000 +DEFINE VARS_BLOCKS =3D 0x80 +DEFINE VARS_LIVE_SIZE =3D 0x3E000 +DEFINE VARS_SPARE_SIZE =3D 0x40000 + +DEFINE FW_BASE_ADDRESS =3D 0xFFC00000 +DEFINE FW_SIZE =3D 0x00400000 +DEFINE FW_BLOCKS =3D 0x400 +DEFINE CODE_BASE_ADDRESS =3D 0xFFC80000 +DEFINE CODE_SIZE =3D 0x00380000 +DEFINE CODE_BLOCKS =3D 0x380 +DEFINE FVMAIN_SIZE =3D 0x0034C000 +DEFINE SECFV_OFFSET =3D 0x003CC000 +DEFINE SECFV_SIZE =3D 0x34000 + +!else + DEFINE VARS_SIZE =3D 0x20000 DEFINE VARS_BLOCKS =3D 0x20 DEFINE VARS_LIVE_SIZE =3D 0xE000 @@ -53,6 +80,8 @@ =20 !endif =20 +!endif + SET gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFdBaseAddress =3D $(FW_BASE_ADDR= ESS) SET gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareFdSize =3D $(FW_SIZE) SET gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFirmwareBlockSize =3D $(BLOCK_SIZE) diff --git a/OvmfPkg/VarStore.fdf.inc b/OvmfPkg/VarStore.fdf.inc index ce901c0109b1..7325b698157d 100644 --- a/OvmfPkg/VarStore.fdf.inc +++ b/OvmfPkg/VarStore.fdf.inc @@ -15,7 +15,11 @@ # ## =20 +!ifdef $(FD_SIZE_4MB) +0x00000000|0x0003e000 +!else 0x00000000|0x0000e000 +!endif #NV_VARIABLE_STORE DATA =3D { ## This is the EFI_FIRMWARE_VOLUME_HEADER @@ -27,14 +31,33 @@ # { 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50 }} 0x8D, 0x2B, 0xF1, 0xFF, 0x96, 0x76, 0x8B, 0x4C, 0xA9, 0x85, 0x27, 0x47, 0x07, 0x5B, 0x4F, 0x50, +!ifdef $(FD_SIZE_4MB) + # FvLength: 0x80000 + 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, +!else # FvLength: 0x20000 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, +!endif # Signature "_FVH" # Attributes 0x5f, 0x46, 0x56, 0x48, 0xff, 0xfe, 0x04, 0x00, - # HeaderLength # CheckSum # ExtHeaderOffset #Reserved #Revision - 0x48, 0x00, 0x19, 0xF9, 0x00, 0x00, 0x00, 0x02, + # HeaderLength + 0x48, 0x00, +!ifdef $(FD_SIZE_4MB) + # CheckSum + 0xB3, 0xF8, +!else + # CheckSum + 0x19, 0xF9, +!endif + # ExtHeaderOffset #Reserved #Revision + 0x00, 0x00, 0x00, 0x02, +!ifdef $(FD_SIZE_4MB) + # Blockmap[0]: 0x80 Blocks * 0x1000 Bytes / Block + 0x80, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, +!else # Blockmap[0]: 0x20 Blocks * 0x1000 Bytes / Block 0x20, 0x00, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, +!endif # Blockmap[1]: End 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, ## This is the VARIABLE_STORE_HEADER @@ -44,18 +67,33 @@ # { 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92 }} 0x78, 0x2c, 0xf3, 0xaa, 0x7b, 0x94, 0x9a, 0x43, 0xa1, 0x80, 0x2e, 0x14, 0x4e, 0xc3, 0x77, 0x92, +!ifdef $(FD_SIZE_4MB) + # Size: 0x3e000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariabl= eSize) - + # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) =3D 0x3dfb8 + # This can speed up the Variable Dispatch a bit. + 0xB8, 0xDF, 0x03, 0x00, +!else # Size: 0xe000 (gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariable= Size) - # 0x48 (size of EFI_FIRMWARE_VOLUME_HEADER) =3D 0xdfb8 # This can speed up the Variable Dispatch a bit. 0xB8, 0xDF, 0x00, 0x00, +!endif # FORMATTED: 0x5A #HEALTHY: 0xFE #Reserved: UINT16 #Reserved1: UINT32 0x5A, 0xFE, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } =20 +!ifdef $(FD_SIZE_4MB) +0x0003e000|0x00001000 +!else 0x0000e000|0x00001000 +!endif #NV_EVENT_LOG =20 +!ifdef $(FD_SIZE_4MB) +0x0003f000|0x00001000 +!else 0x0000f000|0x00001000 +!endif #NV_FTW_WORKING DATA =3D { # EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER->Signature =3D gEdkiiWorkingBl= ockSignatureGuid =3D @@ -68,5 +106,9 @@ 0xE0, 0x0F, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 } =20 +!ifdef $(FD_SIZE_4MB) +0x00040000|0x00040000 +!else 0x00010000|0x00010000 +!endif #NV_FTW_SPARE --=20 2.9.3 _______________________________________________ edk2-devel mailing list edk2-devel@lists.01.org https://lists.01.org/mailman/listinfo/edk2-devel