BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 The flash detection routine will attempt to determine how the flash device behaves (e.g. ROM, RAM, Flash). But when SEV-ES is enabled and the flash device behaves as a ROM device (meaning it is marked read-only by the hypervisor), this check may result in an infinite nested page fault because of the attempted write. Since the instruction cannot be emulated when SEV-ES is enabled, the RIP is never advanced, resulting in repeated nested page faults. When SEV-ES is enabled, exit the flash detection early and assume that the FD behaves as Flash. This will result in QemuFlashWrite() being called to store EFI variables, which will also result in an infinite nested page fault when the write is performed. In this case, update QemuFlashWrite() to use the VMGEXIT MMIO write support to have the hypervisor perform the write without having to emulate the instruction. Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Laszlo Ersek <lersek@redhat.com> Cc: Ard Biesheuvel <ard.biesheuvel@arm.com> Reviewed-by: Laszlo Ersek <lersek@redhat.com> Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
65 lines
1.6 KiB
C
65 lines
1.6 KiB
C
/** @file
|
|
Define the module hooks used while probing the QEMU flash device.
|
|
|
|
Copyright (C) 2018, Advanced Micro Devices. All rights reserved.
|
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
|
|
#include <Library/BaseMemoryLib.h>
|
|
#include <Library/DebugLib.h>
|
|
#include <Library/PcdLib.h>
|
|
#include <Library/MemEncryptSevLib.h>
|
|
|
|
#include "QemuFlash.h"
|
|
|
|
VOID
|
|
QemuFlashBeforeProbe (
|
|
IN EFI_PHYSICAL_ADDRESS BaseAddress,
|
|
IN UINTN FdBlockSize,
|
|
IN UINTN FdBlockCount
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
ASSERT (FeaturePcdGet (PcdSmmSmramRequire));
|
|
|
|
if (!MemEncryptSevIsEnabled ()) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// When SEV is enabled, AmdSevDxe runs early in DXE phase and clears the
|
|
// C-bit from the NonExistent entry -- which is later split and accommodate
|
|
// the flash MMIO but the driver runs in non SMM context hence it cleared the
|
|
// flash ranges from non SMM page table. When SMM is enabled, the flash
|
|
// services are accessed from the SMM mode hence we explicitly clear the
|
|
// C-bit on flash ranges from SMM page table.
|
|
//
|
|
|
|
Status = MemEncryptSevClearPageEncMask (
|
|
0,
|
|
BaseAddress,
|
|
EFI_SIZE_TO_PAGES (FdBlockSize * FdBlockCount),
|
|
FALSE
|
|
);
|
|
ASSERT_EFI_ERROR (Status);
|
|
}
|
|
|
|
/**
|
|
Write to QEMU Flash
|
|
|
|
@param[in] Ptr Pointer to the location to write.
|
|
@param[in] Value The value to write.
|
|
|
|
**/
|
|
VOID
|
|
QemuFlashPtrWrite (
|
|
IN volatile UINT8 *Ptr,
|
|
IN UINT8 Value
|
|
)
|
|
{
|
|
*Ptr = Value;
|
|
}
|