mirror of https://github.com/acidanthera/audk.git
OvmfPkg: Move the GHCB allocations into reserved memory
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198 After having transitioned from UEFI to the OS, the OS will need to boot the APs. For an SEV-ES guest, the APs will have been parked by UEFI using GHCB pages allocated by UEFI. The hypervisor will write to the GHCB SW_EXITINFO2 field of the GHCB when the AP is booted. As a result, the GHCB pages must be marked reserved so that the OS does not attempt to use them and experience memory corruption because of the hypervisor write. Change the GHCB allocation from the default boot services memory to reserved memory. Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Laszlo Ersek <lersek@redhat.com> Cc: Ard Biesheuvel <ard.biesheuvel@arm.com> Reviewed-by: Laszlo Ersek <lersek@redhat.com> Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com> Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
This commit is contained in:
parent
30937f2f98
commit
3b49d0a598
|
@ -51,9 +51,11 @@ AmdSevEsInitialize (
|
||||||
|
|
||||||
//
|
//
|
||||||
// Allocate GHCB and per-CPU variable pages.
|
// Allocate GHCB and per-CPU variable pages.
|
||||||
|
// Since the pages must survive across the UEFI to OS transition
|
||||||
|
// make them reserved.
|
||||||
//
|
//
|
||||||
GhcbPageCount = mMaxCpuCount * 2;
|
GhcbPageCount = mMaxCpuCount * 2;
|
||||||
GhcbBase = AllocatePages (GhcbPageCount);
|
GhcbBase = AllocateReservedPages (GhcbPageCount);
|
||||||
ASSERT (GhcbBase != NULL);
|
ASSERT (GhcbBase != NULL);
|
||||||
|
|
||||||
GhcbBasePa = (PHYSICAL_ADDRESS)(UINTN) GhcbBase;
|
GhcbBasePa = (PHYSICAL_ADDRESS)(UINTN) GhcbBase;
|
||||||
|
|
Loading…
Reference in New Issue