diff options
author | Brijesh Singh <brijesh.singh@amd.com> | 2018-03-09 10:06:03 -0600 |
---|---|---|
committer | Laszlo Ersek <lersek@redhat.com> | 2018-03-09 21:44:53 +0100 |
commit | e4a1d5a7c4e4668fe128261fdc9eb799c384f109 (patch) | |
tree | a483656ca4f8ad636109da300f75dc6900f1ebfc /OvmfPkg/Tcg | |
parent | d5a002aba0aa4ea89396e389106ca718b870be2f (diff) | |
download | edk2-e4a1d5a7c4e4668fe128261fdc9eb799c384f109.tar.gz edk2-e4a1d5a7c4e4668fe128261fdc9eb799c384f109.tar.bz2 edk2-e4a1d5a7c4e4668fe128261fdc9eb799c384f109.zip |
OvmfPkg/QemuFlashFvbServicesRuntimeDxe: Clear C-bit when SEV is active
Commit:24e4ad7 (OvmfPkg: Add AmdSevDxe driver) added a driver which runs
early in DXE phase and clears the C-bit from NonExistent entry -- which
is later split and accommodate the flash MMIO. When SMM is enabled, we
build two sets of page tables; first page table is used when executing
code in non SMM mode (SMM-less-pgtable) and second page table is used
when we are executing code in SMM mode (SMM-pgtable).
During boot time, AmdSevDxe driver clears the C-bit from the
SMM-less-pgtable. But when SMM is enabled, Qemu Flash services are used
from SMM mode.
In this patch we explicitly clear the C-bit from Qemu flash MMIO range
before we probe the flash. When OVMF is built with SMM_REQUIRE then
call to initialize the flash services happen after the SMM-pgtable is
created and processor has served the first SMI. At this time we will
have access to the SMM-pgtable.
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
[lersek@redhat.com: trivial coding style improvements]
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Diffstat (limited to 'OvmfPkg/Tcg')
0 files changed, 0 insertions, 0 deletions