diff options
author | Dun Tan <dun.tan@intel.com> | 2024-07-26 15:32:13 +0800 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2024-07-29 03:48:53 +0000 |
commit | 51edd4830d822e70b96a8548d0d89383e12bc4c0 (patch) | |
tree | f36845ab181eae192b784a3f9bc71cc6b6f2c7e5 /MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/IA32/S3Asm.asm | |
parent | ecb1d67775a6dcaa9a0deb4869ca60e250987e91 (diff) | |
download | edk2-master.zip edk2-master.tar.gz edk2-master.tar.bz2 |
This commit is to fix smm code assert issue when SMM Profile
is enabled.
When SMM Profile is enabled, the function InitProtectedMemRange()
retrives MMIO ranges from GCD and store the MMIO ranges in the
mProtectionMemRange. When ReadyToLock, the function InitPaging()
modifies the page table based on the mProtectionMemRange. If the
MMIO ranges in mProtectionMemRange is not 4k aligned, code will
assert when modifying page table.
In this commit, we skip the MMIO ranges that BaseAddress and Length
are not 4k aligned when creating mProtectionMemRange. This will only
cause each access to the skipped MMIO range to be logged. In current
failure case on QEMU and QSP SimicsOpenBoard, the skipped MMIO range
is [0xFED00000, 0xFED00400] for HPET. Considering that the probability
of HPET MMIO range being accessed is very small in SMM, the solution
in this commit is acceptable and simple.
Signed-off-by: Dun Tan <dun.tan@intel.com>
Diffstat (limited to 'MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe/IA32/S3Asm.asm')
0 files changed, 0 insertions, 0 deletions