Branch: refs/heads/master
  Home:   https://github.com/tianocore/edk2
  Commit: de463163d9f6d3c5dc6b55ff35d1e5676e0e1b9f
      
https://github.com/tianocore/edk2/commit/de463163d9f6d3c5dc6b55ff35d1e5676e0e1b9f
  Author: Gerd Hoffmann <kra...@redhat.com>
  Date:   2022-02-28 (Mon, 28 Feb 2022)

  Changed paths:
    M OvmfPkg/AmdSev/AmdSevX64.fdf

  Log Message:
  -----------
  OvmfPkg/AmdSev: reserve snp pages

The SNP patch series updated the OvmfPkgX64 build but forgot the AmdSev
variant, resulting in a broken OvmfSevMetadata table.

Fixes: cca9cd3dd6bf ("OvmfPkg: reserve CPUID page")
Fixes: 707c71a01b9d ("OvmfPkg: reserve SNP secrets page")
Signed-off-by: Gerd Hoffmann <kra...@redhat.com>
Reviewed-by: Brijesh Singh <brijesh.si...@amd.com>
Acked-by: Jiewen Yao <jiewen....@intel.com>


  Commit: 63c50d3ff2854a76432b752af4f2a76f33ff1974
      
https://github.com/tianocore/edk2/commit/63c50d3ff2854a76432b752af4f2a76f33ff1974
  Author: Brijesh Singh <brijesh.si...@amd.com>
  Date:   2022-02-28 (Mon, 28 Feb 2022)

  Changed paths:
    M OvmfPkg/Include/WorkArea.h
    M OvmfPkg/ResetVector/Ia32/AmdSev.asm
    M OvmfPkg/ResetVector/Ia32/Flat32ToFlat64.asm
    M OvmfPkg/ResetVector/ResetVector.nasmb
    M OvmfPkg/Sec/AmdSev.c

  Log Message:
  -----------
  OvmfPkg/ResetVector: cache the SEV status MSR value in workarea

BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3582

In order to probe the SEV feature the BaseMemEncryptLib and Reset vector
reads the SEV_STATUS MSR. Cache the value on the first read in the
workarea. In the next patches the value saved in the workarea will
be used by the BaseMemEncryptLib. This not only eliminates the extra
MSR reads it also helps cleaning up the code in BaseMemEncryptLib.

Cc: Min Xu <min.m...@intel.com>
Cc: Jiewen Yao <jiewen....@intel.com>
Cc: Tom Lendacky <thomas.lenda...@amd.com>
Cc: Jordan Justen <jordan.l.jus...@intel.com>
Cc: Ard Biesheuvel <ardb+tianoc...@kernel.org>
Cc: Erdem Aktas <erdemak...@google.com>
Cc: Gerd Hoffmann <kra...@redhat.com>
Acked-by: Gerd Hoffmann <kra...@redhat.com>
Signed-off-by: Brijesh Singh <brijesh.si...@amd.com>
Acked-by: Jiewen Yao <jiewen....@intel.com>


  Commit: f1d1c337e7c0575da7fd248b2dd9cffc755940df
      
https://github.com/tianocore/edk2/commit/f1d1c337e7c0575da7fd248b2dd9cffc755940df
  Author: Brijesh Singh <brijesh.si...@amd.com>
  Date:   2022-02-28 (Mon, 28 Feb 2022)

  Changed paths:
    M OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLib.inf
    M OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLibInternal.c
    M OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLib.inf
    M OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLibInternal.c
    M OvmfPkg/Library/BaseMemEncryptSevLib/SecMemEncryptSevLib.inf
    M OvmfPkg/Library/BaseMemEncryptSevLib/SecMemEncryptSevLibInternal.c

  Log Message:
  -----------
  OvmfPkg/BaseMemEncryptLib: use the SEV_STATUS MSR value from workarea

BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3582

Improve the MemEncryptSev{Es,Snp}IsEnabled() to use the SEV_STATUS MSR
value saved in the workarea. Since workarea is valid until the PEI phase,
so, for the Dxe phase use the PcdConfidentialComputingGuestAttr to
determine which SEV technology is enabled.

Cc: Min Xu <min.m...@intel.com>
Cc: Jiewen Yao <jiewen....@intel.com>
Cc: Tom Lendacky <thomas.lenda...@amd.com>
Cc: Jordan Justen <jordan.l.jus...@intel.com>
Cc: Ard Biesheuvel <ardb+tianoc...@kernel.org>
Cc: Erdem Aktas <erdemak...@google.com>
Cc: Gerd Hoffmann <kra...@redhat.com>
Acked-by: Gerd Hoffmann <kra...@redhat.com>
Signed-off-by: Brijesh Singh <brijesh.si...@amd.com>
Acked-by: Jiewen Yao <jiewen....@intel.com>


Compare: https://github.com/tianocore/edk2/compare/54cddc3ad4b3...f1d1c337e7c0


_______________________________________________
edk2-commits mailing list
edk2-commits@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/edk2-commits

Reply via email to