Michael Kubacki
ac0a286f4d
OvmfPkg: Apply uncrustify changes
...
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737
Apply uncrustify changes to .c/.h files in the OvmfPkg package
Cc: Andrew Fish <afish@apple.com >
Cc: Leif Lindholm <leif@nuviainc.com >
Cc: Michael D Kinney <michael.d.kinney@intel.com >
Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com >
Reviewed-by: Andrew Fish <afish@apple.com >
2021-12-07 17:24:28 +00:00
Brijesh Singh
8ee4e52ba8
OvmfPkg/QemuFlashFvbServicesRuntimeDxe: use Mmio helper to clear enc mask
...
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275
Use the MemEncryptSevClearMmioPageEncMask() to clear memory encryption mask
for the Mmio address range.
Cc: James Bottomley <jejb@linux.ibm.com >
Cc: Min Xu <min.m.xu@intel.com >
Cc: Jiewen Yao <jiewen.yao@intel.com >
Cc: Tom Lendacky <thomas.lendacky@amd.com >
Cc: Jordan Justen <jordan.l.justen@intel.com >
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org >
Cc: Laszlo Ersek <lersek@redhat.com >
Cc: Erdem Aktas <erdemaktas@google.com >
Reviewed-by: Laszlo Ersek <lersek@redhat.com >
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com >
Message-Id: <20210519181949.6574-12-brijesh.singh@amd.com >
2021-05-29 12:15:21 +00:00
Rebecca Cran
70d5086c32
OvmfPkg: replace old EFI_D_ debug levels with new DEBUG_ ones
...
Generated mechanically with:
find OvmfPkg -type f -exec sed -i -e 's/EFI_D_/DEBUG_/g' {} \;
Signed-off-by: Rebecca Cran <rebecca@bsdio.com >
Cc: Philippe Mathieu-Daude <philmd@redhat.com >
Cc: Jordan Justen <jordan.l.justen@intel.com >
Cc: Ard Biesheuvel <ard.biesheuvel@arm.com >
Cc: Laszlo Ersek <lersek@redhat.com >
Message-Id: <20200429215327.606467-1-rebecca@bsdio.com >
Reviewed-by: Laszlo Ersek <lersek@redhat.com >
2020-04-30 13:01:16 +00:00
Laszlo Ersek
cd99d07d53
OvmfPkg/QemuFlashFvbServices: factor out SetPcdFlashNvStorageBaseAddresses
...
Extract the dynamic setting of the
- PcdFlashNvStorageVariableBase64
- PcdFlashNvStorageFtwWorkingBase
- PcdFlashNvStorageFtwSpareBase
addresses to a helper function.
For now, the helper function is identical (duplicated) between the SMM
flash driver and the runtime DXE flash driver. In subsequent patches, this
will change.
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Cc: Jordan Justen <jordan.l.justen@intel.com >
Cc: Philippe Mathieu-Daudé <philmd@redhat.com >
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=386
Signed-off-by: Laszlo Ersek <lersek@redhat.com >
Message-Id: <20200310222739.26717-3-lersek@redhat.com >
Acked-by: Leif Lindholm <leif@nuviainc.com >
2020-03-12 21:14:46 +00:00
Michael D Kinney
b26f0cf9ee
OvmfPkg: Replace BSD License with BSD+Patent License
...
https://bugzilla.tianocore.org/show_bug.cgi?id=1373
Replace BSD 2-Clause License with BSD+Patent License. This change is
based on the following emails:
https://lists.01.org/pipermail/edk2-devel/2019-February/036260.html
https://lists.01.org/pipermail/edk2-devel/2018-October/030385.html
RFCs with detailed process for the license change:
V3: https://lists.01.org/pipermail/edk2-devel/2019-March/038116.html
V2: https://lists.01.org/pipermail/edk2-devel/2019-March/037669.html
V1: https://lists.01.org/pipermail/edk2-devel/2019-March/037500.html
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com >
Reviewed-by: Laszlo Ersek <lersek@redhat.com >
2019-04-09 10:58:19 -07:00
Brijesh Singh
75b7aa9528
OvmfPkg/QemuFlashFvbServicesRuntimeDxe: Restore C-bit when SEV is active
...
AmdSevDxe maps the flash memory range with C=0, but
SetMemorySpaceAttributes() unconditionally resets the C-bit to '1'. Lets
restore the mapping back to C=0.
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Cc: Anthony Perard <anthony.perard@citrix.com >
Cc: Julien Grall <julien.grall@linaro.org >
Cc: Justen Jordan L <jordan.l.justen@intel.com >
Cc: Laszlo Ersek <lersek@redhat.com >
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com >
Reviewed-by: Laszlo Ersek <lersek@redhat.com >
Regression-tested-by: Laszlo Ersek <lersek@redhat.com >
2018-07-06 20:08:24 +02:00
Brijesh Singh
3b3d016b7b
OvmfPkg/QemuFlashFvbServicesRuntimeDxe: Do not expose MMIO in SMM build
...
In the SMM build, only an SMM driver is using the address range hence we
do not need to expose the flash MMIO range in EFI runtime mapping.
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Cc: Anthony Perard <anthony.perard@citrix.com >
Cc: Julien Grall <julien.grall@linaro.org >
Cc: Justen Jordan L <jordan.l.justen@intel.com >
Cc: Laszlo Ersek <lersek@redhat.com >
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com >
Reviewed-by: Laszlo Ersek <lersek@redhat.com >
Regression-tested-by: Laszlo Ersek <lersek@redhat.com >
2018-07-06 20:08:21 +02:00
Laszlo Ersek
b963ec494c
OvmfPkg: QemuFlashFvbServicesRuntimeDxe: adhere to -D SMM_REQUIRE
...
When the user requires "security" by passing -D SMM_REQUIRE, and
consequently by setting PcdSmmSmramRequire, enforce flash-based variables.
Furthermore, add two ASSERT()s to catch if the wrong module were pulled
into the build.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com >
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com >
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@19063 6f19259b-4bc3-4df7-8a09-765794883524
2015-11-30 18:48:54 +00:00
Laszlo Ersek
1767877a31
OvmfPkg: QemuFlashFvbServicesRuntimeDxe: split out runtime DXE specifics
...
In preparation for introducing an SMM interface to this driver, move the
following traits to separate files, so that we can replace them in the new
SMM INF file:
- Protocol installations. The SMM driver will install protocol interfaces
in the SMM protocol database, using SMM services.
- Virtual address change handler and pointer conversions. SMM drivers run
with physical mappings and pointers must not be converted.
There are further restrictions and changes for an SMM driver, but the rest
of the code either complies with those already, or will handle the changes
transparently. For example:
- SMM drivers have access to both UEFI and SMM protocols in their entry
points (see the PI spec 1.4, "1.7 SMM Driver Initialization"),
- MemoryAllocationLib has an SMM instance that serves allocation requests
with the gSmst->SmmAllocatePool() service transparently, allocating
runtime-marked SMRAM.
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com >
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com >
git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@18671 6f19259b-4bc3-4df7-8a09-765794883524
2015-10-26 14:58:39 +00:00