2022-02-12 07:06:46 +01:00
|
|
|
/** @file
|
|
|
|
PlatformInitLib header file.
|
|
|
|
|
|
|
|
Copyright (c) 2021, Intel Corporation. All rights reserved.<BR>
|
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#ifndef PLATFORM_INIT_LIB_H_
|
|
|
|
#define PLATFORM_INIT_LIB_H_
|
|
|
|
|
|
|
|
#include <PiPei.h>
|
|
|
|
|
|
|
|
#pragma pack(1)
|
|
|
|
typedef struct {
|
|
|
|
EFI_HOB_GUID_TYPE GuidHeader;
|
|
|
|
UINT16 HostBridgeDevId;
|
|
|
|
|
|
|
|
UINT64 PcdConfidentialComputingGuestAttr;
|
|
|
|
BOOLEAN SevEsIsEnabled;
|
|
|
|
|
|
|
|
UINT32 BootMode;
|
|
|
|
BOOLEAN S3Supported;
|
|
|
|
|
|
|
|
BOOLEAN SmmSmramRequire;
|
|
|
|
BOOLEAN Q35SmramAtDefaultSmbase;
|
|
|
|
UINT16 Q35TsegMbytes;
|
|
|
|
|
|
|
|
UINT64 FirstNonAddress;
|
|
|
|
UINT8 PhysMemAddressWidth;
|
|
|
|
UINT32 Uc32Base;
|
|
|
|
UINT32 Uc32Size;
|
|
|
|
|
|
|
|
BOOLEAN PcdSetNxForStack;
|
|
|
|
UINT64 PcdTdxSharedBitMask;
|
|
|
|
|
|
|
|
UINT64 PcdPciMmio64Base;
|
|
|
|
UINT64 PcdPciMmio64Size;
|
|
|
|
UINT32 PcdPciMmio32Base;
|
|
|
|
UINT32 PcdPciMmio32Size;
|
|
|
|
UINT64 PcdPciIoBase;
|
|
|
|
UINT64 PcdPciIoSize;
|
|
|
|
|
|
|
|
UINT64 PcdEmuVariableNvStoreReserved;
|
|
|
|
UINT32 PcdCpuBootLogicalProcessorNumber;
|
|
|
|
UINT32 PcdCpuMaxLogicalProcessorNumber;
|
|
|
|
UINT32 DefaultMaxCpuNumber;
|
|
|
|
|
|
|
|
UINT32 S3AcpiReservedMemoryBase;
|
|
|
|
UINT32 S3AcpiReservedMemorySize;
|
|
|
|
} EFI_HOB_PLATFORM_INFO;
|
|
|
|
#pragma pack()
|
|
|
|
|
|
|
|
/**
|
|
|
|
Reads 8-bits of CMOS data.
|
|
|
|
|
|
|
|
Reads the 8-bits of CMOS data at the location specified by Index.
|
|
|
|
The 8-bit read value is returned.
|
|
|
|
|
|
|
|
@param Index The CMOS location to read.
|
|
|
|
|
|
|
|
@return The value read.
|
|
|
|
|
|
|
|
**/
|
|
|
|
UINT8
|
|
|
|
EFIAPI
|
|
|
|
PlatformCmosRead8 (
|
|
|
|
IN UINTN Index
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Writes 8-bits of CMOS data.
|
|
|
|
|
|
|
|
Writes 8-bits of CMOS data to the location specified by Index
|
|
|
|
with the value specified by Value and returns Value.
|
|
|
|
|
|
|
|
@param Index The CMOS location to write.
|
|
|
|
@param Value The value to write to CMOS.
|
|
|
|
|
|
|
|
@return The value written to CMOS.
|
|
|
|
|
|
|
|
**/
|
|
|
|
UINT8
|
|
|
|
EFIAPI
|
|
|
|
PlatformCmosWrite8 (
|
|
|
|
IN UINTN Index,
|
|
|
|
IN UINT8 Value
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Dump the CMOS content
|
|
|
|
*/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformDebugDumpCmos (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2022-02-12 09:53:26 +01:00
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformAddIoMemoryBaseSizeHob (
|
|
|
|
IN EFI_PHYSICAL_ADDRESS MemoryBase,
|
|
|
|
IN UINT64 MemorySize
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformAddIoMemoryRangeHob (
|
|
|
|
IN EFI_PHYSICAL_ADDRESS MemoryBase,
|
|
|
|
IN EFI_PHYSICAL_ADDRESS MemoryLimit
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformAddMemoryBaseSizeHob (
|
|
|
|
IN EFI_PHYSICAL_ADDRESS MemoryBase,
|
|
|
|
IN UINT64 MemorySize
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformAddMemoryRangeHob (
|
|
|
|
IN EFI_PHYSICAL_ADDRESS MemoryBase,
|
|
|
|
IN EFI_PHYSICAL_ADDRESS MemoryLimit
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformAddReservedMemoryBaseSizeHob (
|
|
|
|
IN EFI_PHYSICAL_ADDRESS MemoryBase,
|
|
|
|
IN UINT64 MemorySize,
|
|
|
|
IN BOOLEAN Cacheable
|
|
|
|
);
|
|
|
|
|
2022-03-07 03:26:39 +01:00
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformQemuUc32BaseInitialization (
|
|
|
|
IN OUT EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
|
|
|
UINT32
|
|
|
|
EFIAPI
|
|
|
|
PlatformGetSystemMemorySizeBelow4gb (
|
|
|
|
IN EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Initialize the PhysMemAddressWidth field in PlatformInfoHob based on guest RAM size.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformAddressWidthInitialization (
|
|
|
|
IN OUT EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Peform Memory Detection for QEMU / KVM
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformQemuInitializeRam (
|
|
|
|
IN EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformQemuInitializeRamForS3 (
|
|
|
|
IN EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
2022-03-07 03:56:27 +01:00
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformMemMapInitialization (
|
|
|
|
IN OUT EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Fetch "opt/ovmf/PcdSetNxForStack" from QEMU
|
|
|
|
*
|
|
|
|
* @param Setting The pointer to the setting of "/opt/ovmf/PcdSetNxForStack".
|
|
|
|
* @return EFI_SUCCESS Successfully fetch the settings.
|
|
|
|
*/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
PlatformNoexecDxeInitialization (
|
|
|
|
IN OUT EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformMiscInitialization (
|
|
|
|
IN EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Fetch the boot CPU count and the possible CPU count from QEMU, and expose
|
|
|
|
them to UefiCpuPkg modules.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformMaxCpuCountInitialization (
|
|
|
|
IN OUT EFI_HOB_PLATFORM_INFO *PlatformInfoHob
|
|
|
|
);
|
|
|
|
|
OvmfPkg: Update PlatformInitLib to process Tdx hoblist
RFC: https://bugzilla.tianocore.org/show_bug.cgi?id=3429
When host VMM create the Td guest, the system memory informations are
stored in TdHob, which is a memory region described in Tdx metadata.
The system memory region in TdHob should be accepted before it can be
accessed. So the newly added function (ProcessTdxHobList) is to process
the TdHobList to accept the memory. Because TdHobList is provided by
host VMM which is not trusted, so its content should be checked before
it is consumed by TDVF.
Because ProcessTdxHobList is to be called in SEC phase, so
PlatformInitLib.inf is updated to support SEC.
Note: In this patch it is BSP which accepts the pages. So there maybe
boot performance issue. There are some mitigations to this issue, such
as lazy accept, 2M accept page size, etc. We will re-visit here in the
future.
EFI_RESOURCE_MEMORY_UNACCEPTED is a new ResourceType in
EFI_HOB_RESOURCE_DESCRIPTOR. It is defined for the unaccepted memory
passed from Host VMM. This is proposed in microsoft/mu_basecore#66
files#diff-b20a11152d1ce9249c691be5690b4baf52069efadf2e2546cdd2eb663d80c9
e4R237 according to UEFI-Code-First. The proposal was approved in 2021
in UEFI Mantis, and will be added to the new PI.next specification.
Per the MdePkg reviewer's comments, before this new ResourceType is
added in the PI spec, it should not be in MdePkg. So it is now
defined as an internal implementation and will be moved to
MdePkg/Include/Pi/PiHob.h after it is added in PI spec.
See https://edk2.groups.io/g/devel/message/87641
PcdTdxAcceptPageSize is added for page accepting. Currently TDX supports
4K and 2M accept page size. The default value is 2M.
Tdx guest is only supported in X64. So for IA32 ProcessTdxHobList
just returns EFI_UNSUPPORTED.
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Brijesh Singh <brijesh.singh@amd.com>
Cc: Erdem Aktas <erdemaktas@google.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
Signed-off-by: Min Xu <min.m.xu@intel.com>
2022-02-16 06:32:13 +01:00
|
|
|
/**
|
|
|
|
In Tdx guest, some information need to be passed from host VMM to guest
|
|
|
|
firmware. For example, the memory resource, etc. These information are
|
|
|
|
prepared by host VMM and put in HobList which is described in TdxMetadata.
|
|
|
|
|
|
|
|
Information in HobList is treated as external input. From the security
|
|
|
|
perspective before it is consumed, it should be validated.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Successfully process the hoblist
|
|
|
|
@retval Others Other error as indicated
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
ProcessTdxHobList (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2022-02-16 06:42:55 +01:00
|
|
|
/**
|
|
|
|
In Tdx guest, the system memory is passed in TdHob by host VMM. So
|
|
|
|
the major task of PlatformTdxPublishRamRegions is to walk thru the
|
|
|
|
TdHob list and transfer the ResourceDescriptorHob and MemoryAllocationHob
|
|
|
|
to the hobs in DXE phase.
|
|
|
|
|
|
|
|
MemoryAllocationHob should also be created for Mailbox and Ovmf work area.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
PlatformTdxPublishRamRegions (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2022-02-12 07:06:46 +01:00
|
|
|
#endif // PLATFORM_INIT_LIB_H_
|