From nobody Fri Apr 26 22:09:27 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+74634+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+74634+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=amd.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1619783542956470.15726126314564; Fri, 30 Apr 2021 04:52:22 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id 1A4bYY1788612xvujii8b8LR; Fri, 30 Apr 2021 04:52:22 -0700 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (NAM12-BN8-obe.outbound.protection.outlook.com []) by mx.groups.io with SMTP id smtpd.web09.10434.1619783538721945423 for ; Fri, 30 Apr 2021 04:52:22 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZmmpjELLc0Y4FG+Z95c/+F0KTkc06LQNBNFYY+4f+xkjuTS+ZvUVKEyUbNTmBPXZj0jvNi4vdLM8irkyHE4/zZgjHWw5If50vM2c50Eqbt++K2XC1gVNQtVhugBCq8g+xnvC3jM8nM7WAC4GgqaIkOflJ1f81Cmzt0/lara2NHYwHfgRVo+ot55i74igV2K7+Nxg+TU7nbeYmyurhDnCV1qg99NN73uEgicbYXiYlhowGUNBHFxDCW08ql+Gterex0I6QQDap79oJqix88yJPQCIFKaIR7bvm0wOQKhlurSy5c1MlxeQ8NdQhFVkdhaXtYr0u5UilDB5mf1+U5rcuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Byhfge6Nvsxtftjtpo0JvnbTd2aoR7vZz2tST6qCeG4=; b=b5vSUg6QH/OEBQqYm8M9E6Pw1/7eDxR6P9S2zOEMDaXXbGmqBW16eMsWfL9PzWoYO0kWQwpE8alQiGSFYf83ZyuGeWhjWoeY+iSxgXpZH4jNA9o0nZe628slDAws9wwGWJqr2Rr3tb+eVluU2P/hEu5HgNfdHQ5RsgBpQaTOEWyDOgrbikcz1qbqr9fXW2Q7zAYLzDvA3LAWWWXvhevfMxFMnIew8pA3FipTp2rSvaWFsrjPkQYgEAk2b6VrWmEW6aDp0C6TvqgRWs6ZFdlyKKkR/u9g8TX1zJBWVe1r8+6aWb7uv7JBB2ENRiz4niG9Vm/PZhXif/Ap7yU9XeK12Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none X-Received: from SN6PR12MB2718.namprd12.prod.outlook.com (2603:10b6:805:6f::22) by SA0PR12MB4349.namprd12.prod.outlook.com (2603:10b6:806:98::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4065.23; Fri, 30 Apr 2021 11:52:20 +0000 X-Received: from SN6PR12MB2718.namprd12.prod.outlook.com ([fe80::9898:5b48:a062:db94]) by SN6PR12MB2718.namprd12.prod.outlook.com ([fe80::9898:5b48:a062:db94%6]) with mapi id 15.20.4065.027; Fri, 30 Apr 2021 11:52:20 +0000 From: "Brijesh Singh" To: devel@edk2.groups.io Cc: Brijesh Singh , James Bottomley , Min Xu , Jiewen Yao , Tom Lendacky , Jordan Justen , Ard Biesheuvel , Laszlo Ersek , Erdem Aktas Subject: [edk2-devel] [PATCH RFC v2 07/28] OvmfPkg: Use MemEncryptSevClearMmioPageEncMask() to clear EncMask from Mmio Date: Fri, 30 Apr 2021 06:51:27 -0500 Message-Id: <20210430115148.22267-8-brijesh.singh@amd.com> In-Reply-To: <20210430115148.22267-1-brijesh.singh@amd.com> References: <20210430115148.22267-1-brijesh.singh@amd.com> X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: SA0PR12CA0006.namprd12.prod.outlook.com (2603:10b6:806:6f::11) To SN6PR12MB2718.namprd12.prod.outlook.com (2603:10b6:805:6f::22) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-Received: from sbrijesh-desktop.amd.com (165.204.77.1) by SA0PR12CA0006.namprd12.prod.outlook.com (2603:10b6:806:6f::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4087.27 via Frontend Transport; Fri, 30 Apr 2021 11:52:19 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 9580fd44-269f-4e39-34cc-08d90bce68df X-MS-TrafficTypeDiagnostic: SA0PR12MB4349: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:7219; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData: =?us-ascii?Q?CWyiIWOKANzInLM0z7h8uuFdpuGIPTy5pDcrJuAOe9OATOd3yzrhp0JxK19F?= =?us-ascii?Q?yxGEctOjJx4vf2CBgydwVZB/hNrQmokFM3vFFNIN5yyPbOvBF0DY+QBzv+8j?= =?us-ascii?Q?9ZRpoModJx6+GyRPu4Wz5Ckx69QyR70LgtxhIHDzysCkTvOgIgpfA5utFHpO?= =?us-ascii?Q?Aieoo8v/YYPVn1gX0AqLgBUiYJmht/08tLzXyYkT2EW+alkFZLzcFV5ofcdG?= =?us-ascii?Q?CwBHh/I2XuRDpVIyfVaDu5Ky13AcQk7ur96wX3HI/cIZuRw1xJRgjd773whu?= =?us-ascii?Q?Oq7Xm89VDqc1BQ3gbUnr9Zyn0VkIP42nCms9j5Z7jic8GvvWPK00YB0Ot48Z?= =?us-ascii?Q?m9Lzz27JkXK4TgZdACtygqUuEQARPRFoOEIInVs1MvN3T7mFSM8dAILLqBlI?= =?us-ascii?Q?QMKrPJTswzzha2uLrS5mOt/3Y+QYavWoyl3GEhZTdOQ4LGcWx7gpBcbUzGK6?= =?us-ascii?Q?BJ7ciPz8H0MLNHlagsYHVprnqelqJB4wzdZ703xax1SBmITxdgnTv+A5TXRA?= =?us-ascii?Q?nJaOtgI7mUzvQqjOX8Tv74nH9P2vy6pgXJAgNd12lCYjCAvvZLRsQU1CLq1C?= =?us-ascii?Q?jcHw5A8dvC+RLNgK7P78x23L+mSxP4G5ZbfdZCvxNmWlbAz1IoX7uwsw7gAr?= =?us-ascii?Q?FEwot9Z07Qbn0s+/Q5k+FfQ6ptDQxqMEwS8fX/i8xe9afTRe8yqDvQdloUxW?= =?us-ascii?Q?RWDiNZSZ8aHaXP0w5KlNk390WgKke7grU8c8gGsB54rAiyC3xZu7L2NSia0y?= =?us-ascii?Q?WLcHjFwSrNNk44a1Tmpz3JdwwN8eP+UOy44cg92fgvoc6ipN9Ebr8Dp2FpcB?= =?us-ascii?Q?OXIa+Ga0QvOdqLbWG/FxtREnBvIgTN0JHdtGZJd4BkXstsBevfAz/5pKH/Y+?= =?us-ascii?Q?YfR5yBxbny6d6pcMALvTlb5eTljvceYRYQaI8o7bfkbd1dRElJaNrFUCaEi1?= =?us-ascii?Q?ALajmumUg7Scycs2lgBlOgzh6fvpQDmpIcltNw2LGnvT+DmqcdbyrzPUPMeZ?= =?us-ascii?Q?HPH+EareUmhNWwzzuJXoMu/wGsidJ0yuYcr4fiLD+7aX4iiDoRqikfxE5wwu?= =?us-ascii?Q?SYr8E3XnbUFP68McBlN+wIwRkm2i5oq4Jv443zHqoTgTJU6Sty+PWkEFcz5c?= =?us-ascii?Q?DRYmVOI7e4CYKmC0UMGQhr1ecURnFoDlg5fPRIju7ijPWramEyxdE1DZlfwA?= =?us-ascii?Q?grONKsU1LM6djrrXkx3NPdNMyphTRyrBbuO1g2lEGHeO7SIG2k/loFC47PYe?= =?us-ascii?Q?Cyar0Hul6P5aKrEi1l5jsp6l8W+Tp+C/GgUVcOOrqZCAw3QgCNb267+gsNX1?= =?us-ascii?Q?/QiLsbBxV7VsgH4khze8Rytz?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9580fd44-269f-4e39-34cc-08d90bce68df X-MS-Exchange-CrossTenant-AuthSource: SN6PR12MB2718.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Apr 2021 11:52:20.2111 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: EsFWt1bFP9RXl1Xft1amRXvzJcRVWl1R7e6G1rwkW44ktgP3jC9ptGM3usGPIlf4sJuM5tM3YsmGIGpBHrkKeg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR12MB4349 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,brijesh.singh@amd.com X-Gm-Message-State: LUMWaNHpxyk1EQGI1wPTTLhDx1787277AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1619783542; bh=FPJfTij6Vgi7Klfn49HwvV3/UOwaadFp0x+txjUlWTQ=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=KwYTIv1ME42RTb01OJzBTFvTqpp1QAHiKBiwORNPV7vdF2zp1/6+uvYQ/2Xhdc9mrNZ FtCT9jm1icmSvk9ZmW53ByDO5aCPesWhDsY69rphYee9PfkNibQ4CYebWTrzoHM9Q5698 4vDwi3OeeMw7WdNjkZ6IKOccWImxYPjICfg= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3275 Use the MemEncryptSevClearMmioPageEncMask() to clear memory encryption mask for the Mmio address range from the current page table context. Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Laszlo Ersek Cc: Erdem Aktas Signed-off-by: Brijesh Singh --- OvmfPkg/AmdSevDxe/AmdSevDxe.c | 10 ++++------ OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockServiceDxe.c | 5 ++--- OvmfPkg/QemuFlashFvbServicesRuntimeDxe/QemuFlashSmm.c | 5 ++--- 3 files changed, 8 insertions(+), 12 deletions(-) diff --git a/OvmfPkg/AmdSevDxe/AmdSevDxe.c b/OvmfPkg/AmdSevDxe/AmdSevDxe.c index 689bfb376d..80831b81fa 100644 --- a/OvmfPkg/AmdSevDxe/AmdSevDxe.c +++ b/OvmfPkg/AmdSevDxe/AmdSevDxe.c @@ -53,11 +53,10 @@ AmdSevDxeEntryPoint ( Desc =3D &AllDescMap[Index]; if (Desc->GcdMemoryType =3D=3D EfiGcdMemoryTypeMemoryMappedIo || Desc->GcdMemoryType =3D=3D EfiGcdMemoryTypeNonExistent) { - Status =3D MemEncryptSevClearPageEncMask ( + Status =3D MemEncryptSevClearMmioPageEncMask ( 0, Desc->BaseAddress, - EFI_SIZE_TO_PAGES (Desc->Length), - FALSE + EFI_SIZE_TO_PAGES (Desc->Length) ); ASSERT_EFI_ERROR (Status); } @@ -73,11 +72,10 @@ AmdSevDxeEntryPoint ( // the range. // if (PcdGet16 (PcdOvmfHostBridgePciDevId) =3D=3D INTEL_Q35_MCH_DEVICE_ID)= { - Status =3D MemEncryptSevClearPageEncMask ( + Status =3D MemEncryptSevClearMmioPageEncMask ( 0, FixedPcdGet64 (PcdPciExpressBaseAddress), - EFI_SIZE_TO_PAGES (SIZE_256MB), - FALSE + EFI_SIZE_TO_PAGES (SIZE_256MB) ); =20 ASSERT_EFI_ERROR (Status); diff --git a/OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockServiceDxe.c b/O= vmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockServiceDxe.c index 1f285e0083..ab40087a84 100644 --- a/OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockServiceDxe.c +++ b/OvmfPkg/QemuFlashFvbServicesRuntimeDxe/FwBlockServiceDxe.c @@ -205,11 +205,10 @@ MarkIoMemoryRangeForRuntimeAccess ( // memory range. // if (MemEncryptSevIsEnabled ()) { - Status =3D MemEncryptSevClearPageEncMask ( + Status =3D MemEncryptSevClearMmioPageEncMask ( 0, BaseAddress, - EFI_SIZE_TO_PAGES (Length), - FALSE + EFI_SIZE_TO_PAGES (Length) ); ASSERT_EFI_ERROR (Status); } diff --git a/OvmfPkg/QemuFlashFvbServicesRuntimeDxe/QemuFlashSmm.c b/OvmfPk= g/QemuFlashFvbServicesRuntimeDxe/QemuFlashSmm.c index 7eb80bfeff..ea75b489c7 100644 --- a/OvmfPkg/QemuFlashFvbServicesRuntimeDxe/QemuFlashSmm.c +++ b/OvmfPkg/QemuFlashFvbServicesRuntimeDxe/QemuFlashSmm.c @@ -38,11 +38,10 @@ QemuFlashBeforeProbe ( // C-bit on flash ranges from SMM page table. // =20 - Status =3D MemEncryptSevClearPageEncMask ( + Status =3D MemEncryptSevClearMmioPageEncMask ( 0, BaseAddress, - EFI_SIZE_TO_PAGES (FdBlockSize * FdBlockCount), - FALSE + EFI_SIZE_TO_PAGES (FdBlockSize * FdBlockCount) ); ASSERT_EFI_ERROR (Status); } --=20 2.17.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#74634): https://edk2.groups.io/g/devel/message/74634 Mute This Topic: https://groups.io/mt/82479054/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-