mirror of https://github.com/acidanthera/audk.git
57 lines
1.4 KiB
C
57 lines
1.4 KiB
C
/** @file
|
|
|
|
SEV-SNP Page Validation functions.
|
|
|
|
Copyright (c) 2021 AMD Incorporated. All rights reserved.<BR>
|
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
|
|
**/
|
|
|
|
#include <Uefi/UefiBaseType.h>
|
|
#include <Library/BaseLib.h>
|
|
#include <Library/DebugLib.h>
|
|
#include <Library/MemEncryptSevLib.h>
|
|
|
|
#include "SnpPageStateChange.h"
|
|
#include "VirtualMemory.h"
|
|
|
|
/**
|
|
Pre-validate the system RAM when SEV-SNP is enabled in the guest VM.
|
|
|
|
@param[in] BaseAddress Base address
|
|
@param[in] NumPages Number of pages starting from the base address
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
MemEncryptSevSnpPreValidateSystemRam (
|
|
IN PHYSICAL_ADDRESS BaseAddress,
|
|
IN UINTN NumPages
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
|
|
if (!MemEncryptSevSnpIsEnabled ()) {
|
|
return;
|
|
}
|
|
|
|
// DXE pre-validation may happen with the memory accept protocol.
|
|
// The protocol should only be called outside the prevalidated ranges
|
|
// that the PEI stage code explicitly skips. Specifically, only memory
|
|
// ranges that are classified as unaccepted.
|
|
if (BaseAddress >= SIZE_4GB) {
|
|
Status = InternalMemEncryptSevCreateIdentityMap1G (
|
|
0,
|
|
BaseAddress,
|
|
EFI_PAGES_TO_SIZE (NumPages)
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
ASSERT (FALSE);
|
|
CpuDeadLoop ();
|
|
}
|
|
}
|
|
|
|
InternalSetPageState (BaseAddress, NumPages, SevSnpPagePrivate, TRUE);
|
|
}
|