Branch: refs/heads/master
Home: https://github.com/tianocore/edk2
Commit: 6436d9b6939ab2e390b5de71798b288e17d85a3a
https://github.com/tianocore/edk2/commit/6436d9b6939ab2e390b5de71798b288e17d85a3a
Author: Dov Murik <[email protected]>
Date: 2023-11-28 (Tue, 28 Nov 2023)
Changed paths:
M OvmfPkg/AmdSev/AmdSevX64.fdf
Log Message:
-----------
OvmfPkg/AmdSev: Reorder MEMFD pages to match the order in OvmfPkgX64.fdf
Resize the MEMFD section of AmdSevX64.fdf and reorder its pages so that
it matches the same size and order used in OvmfPkgX64.fdf.
After this change, this is the difference in the MEMFD of the two
targets:
$ diff -u \
<(sed -ne '/FD.MEMFD/,/FV.SECFV/p' OvmfPkg/OvmfPkgX64.fdf) \
<(sed -ne '/FD.MEMFD/,/FV.SECFV/p' OvmfPkg/AmdSev/AmdSevX64.fdf)
--- /dev/fd/63 2023-02-16 07:06:15.365308683 +0000
+++ /dev/fd/62 2023-02-16 07:06:15.365308683 +0000
@@ -32,6 +32,12 @@
0x00E000|0x001000
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize
+0x00F000|0x000C00
+gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretBase|gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretSize
+
+0x00FC00|0x000400
+gUefiOvmfPkgTokenSpaceGuid.PcdQemuHashTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdQemuHashTableSize
+
0x010000|0x010000
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
Signed-off-by: Dov Murik <[email protected]>
Acked-by: Tom Lendacky <[email protected]>
Acked-by: Gerd Hoffmann <[email protected]>
Commit: 9eec96bd4fc53d7836b5606f2a8bbb10713cc8f5
https://github.com/tianocore/edk2/commit/9eec96bd4fc53d7836b5606f2a8bbb10713cc8f5
Author: Dov Murik <[email protected]>
Date: 2023-11-28 (Tue, 28 Nov 2023)
Changed paths:
M OvmfPkg/ResetVector/ResetVector.nasmb
M OvmfPkg/ResetVector/X64/OvmfSevMetadata.asm
Log Message:
-----------
OvmfPkg/ResetVector: Define SNP metadata for kernel hashes
In order to allow the VMM (such as QEMU) to add a page with hashes of
kernel/initrd/cmdline for measured direct boot on SNP, add it explicitly
to the SNP metadata list report to the VMM.
In such case, VMM should fill the page with the hashes content, or
explicitly update it as a zero page (if kernel hashes are not used).
Note that for SNP, the launch secret part of the page (lower 3KB) are
not relevant and will remain zero. The last 1KB is used for the hashes.
This should have no effect on OvmfPkgX64 targets (which don't define
PcdSevLaunchSecretBase).
Signed-off-by: Dov Murik <[email protected]>
Acked-by: Tom Lendacky <[email protected]>
Acked-by: Gerd Hoffmann <[email protected]>
Compare: https://github.com/tianocore/edk2/compare/3c5f9ac5c3b9...9eec96bd4fc5
_______________________________________________
edk2-commits mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/edk2-commits