[edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs

Mikolaj Lisik via groups.io posted 1 patch 1 year, 3 months ago
Failed in applying to current master (apply log)
.../X64/PeiDxeVirtualMemory.c                 | 26 ++++++++++++-------
1 file changed, 17 insertions(+), 9 deletions(-)
[edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Posted by Mikolaj Lisik via groups.io 1 year, 3 months ago
Edk2 was failing, rather than creating more PML4 entries, when they
weren't present in the initial memory acceptance flow. Because of that
VMs with more than 512G memory were crashing. This code fixes that.

This change affects only SEV-SNP VMs.

The code was tested by successfully booting a 512G SEV-SNP VM.

Signed-off-by: Mikolaj Lisik <lisik@google.com>
---
 .../X64/PeiDxeVirtualMemory.c                 | 26 ++++++++++++-------
 1 file changed, 17 insertions(+), 9 deletions(-)

diff --git a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
index b9c0a5b25a..75c2c36bb4 100644
--- a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
+++ b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
@@ -548,6 +548,7 @@ InternalMemEncryptSevCreateIdentityMap1G (
   PAGE_MAP_AND_DIRECTORY_POINTER  *PageMapLevel4Entry;
   PAGE_TABLE_1G_ENTRY             *PageDirectory1GEntry;
   UINT64                          PgTableMask;
+  UINT64                          *NewPageTable;
   UINT64                          AddressEncMask;
   BOOLEAN                         IsWpEnabled;
   RETURN_STATUS                   Status;
@@ -602,15 +603,22 @@ InternalMemEncryptSevCreateIdentityMap1G (
     PageMapLevel4Entry  = (VOID *)(Cr3BaseAddress & ~PgTableMask);
     PageMapLevel4Entry += PML4_OFFSET (PhysicalAddress);
     if (!PageMapLevel4Entry->Bits.Present) {
-      DEBUG ((
-        DEBUG_ERROR,
-        "%a:%a: bad PML4 for Physical=0x%Lx\n",
-        gEfiCallerBaseName,
-        __FUNCTION__,
-        PhysicalAddress
-        ));
-      Status = RETURN_NO_MAPPING;
-      goto Done;
+      NewPageTable = AllocatePageTableMemory (1);
+      if (NewPageTable == NULL) {
+        DEBUG ((
+          DEBUG_ERROR,
+          "%a:%a: failed to allocate a new PML4 entry\n",
+          gEfiCallerBaseName,
+          __FUNCTION__
+          ));
+        Status = RETURN_NO_MAPPING;
+        goto Done;
+      }
+      SetMem (NewPageTable, EFI_PAGE_SIZE, 0);
+      PageMapLevel4Entry->Uint64          = (UINT64)(UINTN)NewPageTable | AddressEncMask;
+      PageMapLevel4Entry->Bits.MustBeZero = 0;
+      PageMapLevel4Entry->Bits.ReadWrite  = 1;
+      PageMapLevel4Entry->Bits.Present    = 1;
     }
 
     PageDirectory1GEntry = (VOID *)(
-- 
2.39.1.456.gfc5497dd1b-goog



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#99097): https://edk2.groups.io/g/devel/message/99097
Mute This Topic: https://groups.io/mt/96551964/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-
Re: [edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Posted by Lendacky, Thomas via groups.io 11 months ago
On 1/26/23 14:26, Mikolaj Lisik wrote:
> Edk2 was failing, rather than creating more PML4 entries, when they
> weren't present in the initial memory acceptance flow. Because of that
> VMs with more than 512G memory were crashing. This code fixes that.
> 
> This change affects only SEV-SNP VMs.
> 
> The code was tested by successfully booting a 512G SEV-SNP VM.
> 
> Signed-off-by: Mikolaj Lisik <lisik@google.com>

I don't see where this was merged. Both Gerd and I acked it back in 
January, was there a problem with it?

Thanks,
Tom

> ---
>   .../X64/PeiDxeVirtualMemory.c                 | 26 ++++++++++++-------
>   1 file changed, 17 insertions(+), 9 deletions(-)
> 
> diff --git a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> index b9c0a5b25a..75c2c36bb4 100644
> --- a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> +++ b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> @@ -548,6 +548,7 @@ InternalMemEncryptSevCreateIdentityMap1G (
>     PAGE_MAP_AND_DIRECTORY_POINTER  *PageMapLevel4Entry;
>     PAGE_TABLE_1G_ENTRY             *PageDirectory1GEntry;
>     UINT64                          PgTableMask;
> +  UINT64                          *NewPageTable;
>     UINT64                          AddressEncMask;
>     BOOLEAN                         IsWpEnabled;
>     RETURN_STATUS                   Status;
> @@ -602,15 +603,22 @@ InternalMemEncryptSevCreateIdentityMap1G (
>       PageMapLevel4Entry  = (VOID *)(Cr3BaseAddress & ~PgTableMask);
>       PageMapLevel4Entry += PML4_OFFSET (PhysicalAddress);
>       if (!PageMapLevel4Entry->Bits.Present) {
> -      DEBUG ((
> -        DEBUG_ERROR,
> -        "%a:%a: bad PML4 for Physical=0x%Lx\n",
> -        gEfiCallerBaseName,
> -        __FUNCTION__,
> -        PhysicalAddress
> -        ));
> -      Status = RETURN_NO_MAPPING;
> -      goto Done;
> +      NewPageTable = AllocatePageTableMemory (1);
> +      if (NewPageTable == NULL) {
> +        DEBUG ((
> +          DEBUG_ERROR,
> +          "%a:%a: failed to allocate a new PML4 entry\n",
> +          gEfiCallerBaseName,
> +          __FUNCTION__
> +          ));
> +        Status = RETURN_NO_MAPPING;
> +        goto Done;
> +      }
> +      SetMem (NewPageTable, EFI_PAGE_SIZE, 0);
> +      PageMapLevel4Entry->Uint64          = (UINT64)(UINTN)NewPageTable | AddressEncMask;
> +      PageMapLevel4Entry->Bits.MustBeZero = 0;
> +      PageMapLevel4Entry->Bits.ReadWrite  = 1;
> +      PageMapLevel4Entry->Bits.Present    = 1;
>       }
>   
>       PageDirectory1GEntry = (VOID *)(


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#105677): https://edk2.groups.io/g/devel/message/105677
Mute This Topic: https://groups.io/mt/96551964/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-
Re: [edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Posted by Ard Biesheuvel 11 months ago
On Fri, 2 Jun 2023 at 23:20, Lendacky, Thomas via groups.io
<thomas.lendacky=amd.com@groups.io> wrote:
>
> On 1/26/23 14:26, Mikolaj Lisik wrote:
> > Edk2 was failing, rather than creating more PML4 entries, when they
> > weren't present in the initial memory acceptance flow. Because of that
> > VMs with more than 512G memory were crashing. This code fixes that.
> >
> > This change affects only SEV-SNP VMs.
> >
> > The code was tested by successfully booting a 512G SEV-SNP VM.
> >
> > Signed-off-by: Mikolaj Lisik <lisik@google.com>
>
> I don't see where this was merged. Both Gerd and I acked it back in
> January, was there a problem with it?
>

I wasn't cc'ed.

I've queued this up now.



>
> > ---
> >   .../X64/PeiDxeVirtualMemory.c                 | 26 ++++++++++++-------
> >   1 file changed, 17 insertions(+), 9 deletions(-)
> >
> > diff --git a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> > index b9c0a5b25a..75c2c36bb4 100644
> > --- a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> > +++ b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> > @@ -548,6 +548,7 @@ InternalMemEncryptSevCreateIdentityMap1G (
> >     PAGE_MAP_AND_DIRECTORY_POINTER  *PageMapLevel4Entry;
> >     PAGE_TABLE_1G_ENTRY             *PageDirectory1GEntry;
> >     UINT64                          PgTableMask;
> > +  UINT64                          *NewPageTable;
> >     UINT64                          AddressEncMask;
> >     BOOLEAN                         IsWpEnabled;
> >     RETURN_STATUS                   Status;
> > @@ -602,15 +603,22 @@ InternalMemEncryptSevCreateIdentityMap1G (
> >       PageMapLevel4Entry  = (VOID *)(Cr3BaseAddress & ~PgTableMask);
> >       PageMapLevel4Entry += PML4_OFFSET (PhysicalAddress);
> >       if (!PageMapLevel4Entry->Bits.Present) {
> > -      DEBUG ((
> > -        DEBUG_ERROR,
> > -        "%a:%a: bad PML4 for Physical=0x%Lx\n",
> > -        gEfiCallerBaseName,
> > -        __FUNCTION__,
> > -        PhysicalAddress
> > -        ));
> > -      Status = RETURN_NO_MAPPING;
> > -      goto Done;
> > +      NewPageTable = AllocatePageTableMemory (1);
> > +      if (NewPageTable == NULL) {
> > +        DEBUG ((
> > +          DEBUG_ERROR,
> > +          "%a:%a: failed to allocate a new PML4 entry\n",
> > +          gEfiCallerBaseName,
> > +          __FUNCTION__
> > +          ));
> > +        Status = RETURN_NO_MAPPING;
> > +        goto Done;
> > +      }
> > +      SetMem (NewPageTable, EFI_PAGE_SIZE, 0);
> > +      PageMapLevel4Entry->Uint64          = (UINT64)(UINTN)NewPageTable | AddressEncMask;
> > +      PageMapLevel4Entry->Bits.MustBeZero = 0;
> > +      PageMapLevel4Entry->Bits.ReadWrite  = 1;
> > +      PageMapLevel4Entry->Bits.Present    = 1;
> >       }
> >
> >       PageDirectory1GEntry = (VOID *)(
>
>
> 
>
>


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#105679): https://edk2.groups.io/g/devel/message/105679
Mute This Topic: https://groups.io/mt/96551964/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-
Re: [edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Posted by Lendacky, Thomas via groups.io 11 months ago
On 6/2/23 17:49, Ard Biesheuvel wrote:
> On Fri, 2 Jun 2023 at 23:20, Lendacky, Thomas via groups.io
> <thomas.lendacky=amd.com@groups.io> wrote:
>>
>> On 1/26/23 14:26, Mikolaj Lisik wrote:
>>> Edk2 was failing, rather than creating more PML4 entries, when they
>>> weren't present in the initial memory acceptance flow. Because of that
>>> VMs with more than 512G memory were crashing. This code fixes that.
>>>
>>> This change affects only SEV-SNP VMs.
>>>
>>> The code was tested by successfully booting a 512G SEV-SNP VM.
>>>
>>> Signed-off-by: Mikolaj Lisik <lisik@google.com>
>>
>> I don't see where this was merged. Both Gerd and I acked it back in
>> January, was there a problem with it?
>>
> 
> I wasn't cc'ed.

Ah, I hadn't noticed that you weren't cc'd...

> 
> I've queued this up now.

Thanks, Ard!

Tom

> 
> 
> 
>>
>>> ---
>>>    .../X64/PeiDxeVirtualMemory.c                 | 26 ++++++++++++-------
>>>    1 file changed, 17 insertions(+), 9 deletions(-)
>>>
>>> diff --git a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
>>> index b9c0a5b25a..75c2c36bb4 100644
>>> --- a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
>>> +++ b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
>>> @@ -548,6 +548,7 @@ InternalMemEncryptSevCreateIdentityMap1G (
>>>      PAGE_MAP_AND_DIRECTORY_POINTER  *PageMapLevel4Entry;
>>>      PAGE_TABLE_1G_ENTRY             *PageDirectory1GEntry;
>>>      UINT64                          PgTableMask;
>>> +  UINT64                          *NewPageTable;
>>>      UINT64                          AddressEncMask;
>>>      BOOLEAN                         IsWpEnabled;
>>>      RETURN_STATUS                   Status;
>>> @@ -602,15 +603,22 @@ InternalMemEncryptSevCreateIdentityMap1G (
>>>        PageMapLevel4Entry  = (VOID *)(Cr3BaseAddress & ~PgTableMask);
>>>        PageMapLevel4Entry += PML4_OFFSET (PhysicalAddress);
>>>        if (!PageMapLevel4Entry->Bits.Present) {
>>> -      DEBUG ((
>>> -        DEBUG_ERROR,
>>> -        "%a:%a: bad PML4 for Physical=0x%Lx\n",
>>> -        gEfiCallerBaseName,
>>> -        __FUNCTION__,
>>> -        PhysicalAddress
>>> -        ));
>>> -      Status = RETURN_NO_MAPPING;
>>> -      goto Done;
>>> +      NewPageTable = AllocatePageTableMemory (1);
>>> +      if (NewPageTable == NULL) {
>>> +        DEBUG ((
>>> +          DEBUG_ERROR,
>>> +          "%a:%a: failed to allocate a new PML4 entry\n",
>>> +          gEfiCallerBaseName,
>>> +          __FUNCTION__
>>> +          ));
>>> +        Status = RETURN_NO_MAPPING;
>>> +        goto Done;
>>> +      }
>>> +      SetMem (NewPageTable, EFI_PAGE_SIZE, 0);
>>> +      PageMapLevel4Entry->Uint64          = (UINT64)(UINTN)NewPageTable | AddressEncMask;
>>> +      PageMapLevel4Entry->Bits.MustBeZero = 0;
>>> +      PageMapLevel4Entry->Bits.ReadWrite  = 1;
>>> +      PageMapLevel4Entry->Bits.Present    = 1;
>>>        }
>>>
>>>        PageDirectory1GEntry = (VOID *)(
>>
>>
>> 
>>
>>


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#105682): https://edk2.groups.io/g/devel/message/105682
Mute This Topic: https://groups.io/mt/96551964/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-
Re: [edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Posted by Ard Biesheuvel 11 months ago
On Sat, 3 Jun 2023 at 00:49, Ard Biesheuvel <ardb@kernel.org> wrote:
>
> On Fri, 2 Jun 2023 at 23:20, Lendacky, Thomas via groups.io
> <thomas.lendacky=amd.com@groups.io> wrote:
> >
> > On 1/26/23 14:26, Mikolaj Lisik wrote:
> > > Edk2 was failing, rather than creating more PML4 entries, when they
> > > weren't present in the initial memory acceptance flow. Because of that
> > > VMs with more than 512G memory were crashing. This code fixes that.
> > >
> > > This change affects only SEV-SNP VMs.
> > >
> > > The code was tested by successfully booting a 512G SEV-SNP VM.
> > >
> > > Signed-off-by: Mikolaj Lisik <lisik@google.com>
> >
> > I don't see where this was merged. Both Gerd and I acked it back in
> > January, was there a problem with it?
> >
>
> I wasn't cc'ed.
>
> I've queued this up now.
>

PR here
https://github.com/tianocore/edk2/pull/4473

CI is spuriously failing again.

(cc Mike + Mike + Sean)

Could someone please push the merge button on this? Thanks.


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#105680): https://edk2.groups.io/g/devel/message/105680
Mute This Topic: https://groups.io/mt/96551964/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-
Re: [edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Posted by Lendacky, Thomas via groups.io 1 year, 3 months ago
On 1/26/23 14:26, Mikolaj Lisik wrote:
> Edk2 was failing, rather than creating more PML4 entries, when they
> weren't present in the initial memory acceptance flow. Because of that
> VMs with more than 512G memory were crashing. This code fixes that.
> 
> This change affects only SEV-SNP VMs.
> 
> The code was tested by successfully booting a 512G SEV-SNP VM.
> 
> Signed-off-by: Mikolaj Lisik <lisik@google.com>

Acked-by: Tom Lendacky <thomas.lendacky@amd.com>

> ---
>   .../X64/PeiDxeVirtualMemory.c                 | 26 ++++++++++++-------
>   1 file changed, 17 insertions(+), 9 deletions(-)
> 
> diff --git a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> index b9c0a5b25a..75c2c36bb4 100644
> --- a/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> +++ b/OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c
> @@ -548,6 +548,7 @@ InternalMemEncryptSevCreateIdentityMap1G (
>     PAGE_MAP_AND_DIRECTORY_POINTER  *PageMapLevel4Entry;
>     PAGE_TABLE_1G_ENTRY             *PageDirectory1GEntry;
>     UINT64                          PgTableMask;
> +  UINT64                          *NewPageTable;
>     UINT64                          AddressEncMask;
>     BOOLEAN                         IsWpEnabled;
>     RETURN_STATUS                   Status;
> @@ -602,15 +603,22 @@ InternalMemEncryptSevCreateIdentityMap1G (
>       PageMapLevel4Entry  = (VOID *)(Cr3BaseAddress & ~PgTableMask);
>       PageMapLevel4Entry += PML4_OFFSET (PhysicalAddress);
>       if (!PageMapLevel4Entry->Bits.Present) {
> -      DEBUG ((
> -        DEBUG_ERROR,
> -        "%a:%a: bad PML4 for Physical=0x%Lx\n",
> -        gEfiCallerBaseName,
> -        __FUNCTION__,
> -        PhysicalAddress
> -        ));
> -      Status = RETURN_NO_MAPPING;
> -      goto Done;
> +      NewPageTable = AllocatePageTableMemory (1);
> +      if (NewPageTable == NULL) {
> +        DEBUG ((
> +          DEBUG_ERROR,
> +          "%a:%a: failed to allocate a new PML4 entry\n",
> +          gEfiCallerBaseName,
> +          __FUNCTION__
> +          ));
> +        Status = RETURN_NO_MAPPING;
> +        goto Done;
> +      }
> +      SetMem (NewPageTable, EFI_PAGE_SIZE, 0);
> +      PageMapLevel4Entry->Uint64          = (UINT64)(UINTN)NewPageTable | AddressEncMask;
> +      PageMapLevel4Entry->Bits.MustBeZero = 0;
> +      PageMapLevel4Entry->Bits.ReadWrite  = 1;
> +      PageMapLevel4Entry->Bits.Present    = 1;
>       }
>   
>       PageDirectory1GEntry = (VOID *)(


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#99178): https://edk2.groups.io/g/devel/message/99178
Mute This Topic: https://groups.io/mt/96551964/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-
Re: [edk2-devel] [PATCH v2] OvmfPkg: Create additional PML1 entries for large SEV-SNP VMs
Posted by Gerd Hoffmann 1 year, 3 months ago
On Thu, Jan 26, 2023 at 08:26:40PM +0000, Mikolaj Lisik via groups.io wrote:
> Edk2 was failing, rather than creating more PML4 entries, when they
> weren't present in the initial memory acceptance flow. Because of that
> VMs with more than 512G memory were crashing. This code fixes that.
> 
> This change affects only SEV-SNP VMs.
> 
> The code was tested by successfully booting a 512G SEV-SNP VM.

Acked-by: Gerd Hoffmann <kraxel@redhat.com>



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#99126): https://edk2.groups.io/g/devel/message/99126
Mute This Topic: https://groups.io/mt/96551964/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-