From nobody Thu Nov 14 17:48:37 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+99100+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+99100+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1674767871; cv=none; d=zohomail.com; s=zohoarc; b=nSXpYZ+y2tJk8AaWqjxrxvBNamTgwFVxUi1tHoglsM+Zr/tQLu01C5FObt9u2Ea8jqT3ILiv+eUUg1rdh0a6mttevBluFAlzJXYUuR6mxg5g/cKKcIKu/lkLZyDLTEaWKUmXRftNfqpHAp1l3ud+AFAYdzy8FNS5EPovlk/8aKY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1674767871; h=Content-Type:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=GDbTrnN4/YeM/sJcZEqcelaiGo3GfLi57Cvt7l8ARPc=; b=HKQZEn2BvY54KJYMXS40ZJiPw5TKoR/ITzgLgmSe6PDZzN4DdqZqyaa6aQZfRnakx75mFWzAI+S+ydwBy3typ7YwyXXh2UlKimazuLCbvx4MxeMBltGg2DfLe14lakn2cHfrQs7EUgLUUuz8yNz+87N3DJlH2YiWyXFHY7gKFEQ= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+99100+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1674767871191733.5140120209768; Thu, 26 Jan 2023 13:17:51 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id MFrmYY1788612xqzNVN7H9S3; Thu, 26 Jan 2023 13:17:50 -0800 X-Received: from mail-pj1-f74.google.com (mail-pj1-f74.google.com [209.85.216.74]) by mx.groups.io with SMTP id smtpd.web10.86654.1674767870284075890 for ; Thu, 26 Jan 2023 13:17:50 -0800 X-Received: by mail-pj1-f74.google.com with SMTP id e11-20020a17090a77cb00b0022925dd66d3so3264804pjs.4 for ; Thu, 26 Jan 2023 13:17:50 -0800 (PST) X-Gm-Message-State: ZxIqZ5YSuEgPPIuMh5yegDd6x1787277AA= X-Google-Smtp-Source: AK7set+AacFezw+pAzGk7EbykqrwNGye/2t7RhCcqZEnAqMN49GreKRbVRKFvm5axBEzLhc6NSv+r92pVuF4IMjnbg== X-Received: from dionnaglaze.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:2ee6]) (user=dionnaglaze job=sendgmr) by 2002:a62:e30e:0:b0:592:618f:db6c with SMTP id g14-20020a62e30e000000b00592618fdb6cmr22549pfh.34.1674767869619; Thu, 26 Jan 2023 13:17:49 -0800 (PST) Date: Thu, 26 Jan 2023 21:17:38 +0000 In-Reply-To: <20230126211740.3235408-1-dionnaglaze@google.com> Mime-Version: 1.0 References: <20230126211740.3235408-1-dionnaglaze@google.com> Message-ID: <20230126211740.3235408-3-dionnaglaze@google.com> Subject: [edk2-devel] [PATCH v11 2/4] MdePkg: Introduce the SevMemoryAcceptance protocol From: "Dionna Glaze via groups.io" To: devel@edk2.groups.io Cc: Dionna Glaze , Gerd Hoffmann , James Bottomley , Jiewen Yao , Tom Lendacky , Ard Biesheuvel , "Min M. Xu" , Andrew Fish , "Michael D. Kinney" Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,dionnaglaze@google.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1674767870; bh=g/DUtYSBfuSsHoIPXlq3AJMgWInkwYSdzA2F4OBF2gA=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=XcdQ4f2kz8cJBMYZIcb8GDIdhFCWfQtfLu0vjYUryJSNyQnnSLQB+BAHo1j9msM5PKv oE/PVbWNhBR+ctftHruv9Luo32GcADfwjbI6Y4TiGKzl/on6MRvphev1VvqlGyUPNB8Gs fh1EpJHjsHR1Y1ODuILyyvHhdJ7Zm2M3uxs= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1674767871426100009 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The default behavior for unaccepted memory in SEV-SNP is to accept all memory when ExitBootServices is called. An OS loader can use this protocol to disable this behavior to assume responsibility for memory acceptance and to affirm that the OS can handle the unaccepted memory type. Cc: Gerd Hoffmann Cc: James Bottomley Cc: Jiewen Yao Cc: Tom Lendacky Cc: Ard Biesheuvel Cc: "Min M. Xu" Cc: Andrew Fish Cc: "Michael D. Kinney" Signed-off-by: Dionna Glaze --- OvmfPkg/Include/Protocol/SevMemoryAcceptance.h | 42 ++++++++++++++++++++ OvmfPkg/OvmfPkg.dec | 1 + 2 files changed, 43 insertions(+) diff --git a/OvmfPkg/Include/Protocol/SevMemoryAcceptance.h b/OvmfPkg/Inclu= de/Protocol/SevMemoryAcceptance.h new file mode 100644 index 0000000000..c45b499006 --- /dev/null +++ b/OvmfPkg/Include/Protocol/SevMemoryAcceptance.h @@ -0,0 +1,42 @@ +/** @file + The file provides the protocol that disables the behavior that all memory + gets accepted at ExitBootServices(). This protocol is only meant to be c= alled + by the OS loader, and not EDK2 itself. The SEV naming is due to the coin= cidence + that only SEV-SNP needs this protocol, since SEV-SNP kernel support rele= ased + before kernel support for unaccepted memory. The technology enablement t= hus + does not strictly imply support for the unaccepted memory type. + + Copyright (c) 2023, Google LLC. All rights reserved.
+ SPDX-License-Identifier: BSD-2-Clause-Patent +**/ + +#ifndef SEV_MEMORY_ACCEPTANCE_H_ +#define SEV_MEMORY_ACCEPTANCE_H_ + +#define OVMF_SEV_MEMORY_ACCEPTANCE_PROTOCOL_GUID \ + {0xc5a010fe, \ + 0x38a7, \ + 0x4531, \ + {0x8a, 0x4a, 0x05, 0x00, 0xd2, 0xfd, 0x16, 0x49}} + +typedef struct _OVMF_SEV_MEMORY_ACCEPTANCE_PROTOCOL + OVMF_SEV_MEMORY_ACCEPTANCE_PROTOCOL; + +/** + @param This A pointer to a OVMF_SEV_MEMORY_ACCEPTANCE_PROTOCOL. +**/ +typedef + EFI_STATUS +(EFIAPI *OVMF_SEV_ALLOW_UNACCEPTED_MEMORY)( + IN OVMF_SEV_MEMORY_ACCEPTANCE_PROTOCOL *This + ); + +/// +/// The OVMF_SEV_MEMORY_ACCEPTANCE_PROTOCOL allows the OS loader to +/// indicate to EDK2 that ExitBootServices should not accept all memory. +/// +struct _OVMF_SEV_MEMORY_ACCEPTANCE_PROTOCOL { + OVMF_SEV_ALLOW_UNACCEPTED_MEMORY AllowUnacceptedMemory; +}; + +#endif diff --git a/OvmfPkg/OvmfPkg.dec b/OvmfPkg/OvmfPkg.dec index 1b521f2604..a22eb246c6 100644 --- a/OvmfPkg/OvmfPkg.dec +++ b/OvmfPkg/OvmfPkg.dec @@ -184,6 +184,7 @@ gEfiLegacyInterruptProtocolGuid =3D {0x31ce593d, 0x108a, 0x485d, {= 0xad, 0xb2, 0x78, 0xf2, 0x1f, 0x29, 0x66, 0xbe}} gEfiVgaMiniPortProtocolGuid =3D {0xc7735a2f, 0x88f5, 0x4882, {= 0xae, 0x63, 0xfa, 0xac, 0x8c, 0x8b, 0x86, 0xb3}} gOvmfLoadedX86LinuxKernelProtocolGuid =3D {0xa3edc05d, 0xb618, 0x4ff6, {= 0x95, 0x52, 0x76, 0xd7, 0x88, 0x63, 0x43, 0xc8}} + gOvmfSevMemoryAcceptanceProtocolGuid =3D {0xc5a010fe, 0x38a7, 0x4531, {= 0x8a, 0x4a, 0x05, 0x00, 0xd2, 0xfd, 0x16, 0x49}} gQemuAcpiTableNotifyProtocolGuid =3D {0x928939b2, 0x4235, 0x462f, {= 0x95, 0x80, 0xf6, 0xa2, 0xb2, 0xc2, 0x1a, 0x4f}} gEfiMpInitLibMpDepProtocolGuid =3D {0xbb00a5ca, 0x8ce, 0x462f, {= 0xa5, 0x37, 0x43, 0xc7, 0x4a, 0x82, 0x5c, 0xa4}} gEfiMpInitLibUpDepProtocolGuid =3D {0xa9e7cef1, 0x5682, 0x42cc, {= 0xb1, 0x23, 0x99, 0x30, 0x97, 0x3f, 0x4a, 0x9f}} --=20 2.39.1.456.gfc5497dd1b-goog -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#99100): https://edk2.groups.io/g/devel/message/99100 Mute This Topic: https://groups.io/mt/96553083/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-