/** @file | |
Secure Encrypted Virtualization (SEV) library helper function | |
Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR> | |
This program and the accompanying materials are licensed and made available | |
under the terms and conditions of the BSD License which accompanies this | |
distribution. The full text of the license may be found at | |
http://opensource.org/licenses/bsd-license.php | |
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, | |
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | |
**/ | |
#include <Library/BaseLib.h> | |
#include <Library/DebugLib.h> | |
#include <Library/MemEncryptSevLib.h> | |
#include <Library/PcdLib.h> | |
#include <Register/Amd/Cpuid.h> | |
#include <Register/Amd/Msr.h> | |
#include <Register/Cpuid.h> | |
#include <Register/QemuSmramSaveStateMap.h> | |
#include <Register/SmramSaveStateMap.h> | |
#include <Uefi/UefiBaseType.h> | |
STATIC BOOLEAN mSevStatus = FALSE; | |
STATIC BOOLEAN mSevStatusChecked = FALSE; | |
/** | |
Returns a boolean to indicate whether SEV is enabled | |
@retval TRUE SEV is enabled | |
@retval FALSE SEV is not enabled | |
**/ | |
STATIC | |
BOOLEAN | |
EFIAPI | |
InternalMemEncryptSevIsEnabled ( | |
VOID | |
) | |
{ | |
UINT32 RegEax; | |
MSR_SEV_STATUS_REGISTER Msr; | |
CPUID_MEMORY_ENCRYPTION_INFO_EAX Eax; | |
// | |
// Check if memory encryption leaf exist | |
// | |
AsmCpuid (CPUID_EXTENDED_FUNCTION, &RegEax, NULL, NULL, NULL); | |
if (RegEax >= CPUID_MEMORY_ENCRYPTION_INFO) { | |
// | |
// CPUID Fn8000_001F[EAX] Bit 1 (Sev supported) | |
// | |
AsmCpuid (CPUID_MEMORY_ENCRYPTION_INFO, &Eax.Uint32, NULL, NULL, NULL); | |
if (Eax.Bits.SevBit) { | |
// | |
// Check MSR_0xC0010131 Bit 0 (Sev Enabled) | |
// | |
Msr.Uint32 = AsmReadMsr32 (MSR_SEV_STATUS); | |
if (Msr.Bits.SevBit) { | |
return TRUE; | |
} | |
} | |
} | |
return FALSE; | |
} | |
/** | |
Returns a boolean to indicate whether SEV is enabled | |
@retval TRUE SEV is enabled | |
@retval FALSE SEV is not enabled | |
**/ | |
BOOLEAN | |
EFIAPI | |
MemEncryptSevIsEnabled ( | |
VOID | |
) | |
{ | |
if (mSevStatusChecked) { | |
return mSevStatus; | |
} | |
mSevStatus = InternalMemEncryptSevIsEnabled(); | |
mSevStatusChecked = TRUE; | |
return mSevStatus; | |
} | |
/** | |
Locate the page range that covers the initial (pre-SMBASE-relocation) SMRAM | |
Save State Map. | |
@param[out] BaseAddress The base address of the lowest-address page that | |
covers the initial SMRAM Save State Map. | |
@param[out] NumberOfPages The number of pages in the page range that covers | |
the initial SMRAM Save State Map. | |
@retval RETURN_SUCCESS BaseAddress and NumberOfPages have been set on | |
output. | |
@retval RETURN_UNSUPPORTED SMM is unavailable. | |
**/ | |
RETURN_STATUS | |
EFIAPI | |
MemEncryptSevLocateInitialSmramSaveStateMapPages ( | |
OUT UINTN *BaseAddress, | |
OUT UINTN *NumberOfPages | |
) | |
{ | |
UINTN MapStart; | |
UINTN MapEnd; | |
UINTN MapPagesStart; // MapStart rounded down to page boundary | |
UINTN MapPagesEnd; // MapEnd rounded up to page boundary | |
UINTN MapPagesSize; // difference between MapPagesStart and MapPagesEnd | |
if (!FeaturePcdGet (PcdSmmSmramRequire)) { | |
return RETURN_UNSUPPORTED; | |
} | |
MapStart = SMM_DEFAULT_SMBASE + SMRAM_SAVE_STATE_MAP_OFFSET; | |
MapEnd = MapStart + sizeof (QEMU_SMRAM_SAVE_STATE_MAP); | |
MapPagesStart = MapStart & ~(UINTN)EFI_PAGE_MASK; | |
MapPagesEnd = ALIGN_VALUE (MapEnd, EFI_PAGE_SIZE); | |
MapPagesSize = MapPagesEnd - MapPagesStart; | |
ASSERT ((MapPagesSize & EFI_PAGE_MASK) == 0); | |
*BaseAddress = MapPagesStart; | |
*NumberOfPages = MapPagesSize >> EFI_PAGE_SHIFT; | |
return RETURN_SUCCESS; | |
} |