Branch: refs/heads/master
  Home:   https://github.com/tianocore/edk2
  Commit: 6436d9b6939ab2e390b5de71798b288e17d85a3a
      
https://github.com/tianocore/edk2/commit/6436d9b6939ab2e390b5de71798b288e17d85a3a
  Author: Dov Murik <[email protected]>
  Date:   2023-11-28 (Tue, 28 Nov 2023)

  Changed paths:
    M OvmfPkg/AmdSev/AmdSevX64.fdf

  Log Message:
  -----------
  OvmfPkg/AmdSev: Reorder MEMFD pages to match the order in OvmfPkgX64.fdf

Resize the MEMFD section of AmdSevX64.fdf and reorder its pages so that
it matches the same size and order used in OvmfPkgX64.fdf.

After this change, this is the difference in the MEMFD of the two
targets:

$ diff -u \
       <(sed -ne '/FD.MEMFD/,/FV.SECFV/p' OvmfPkg/OvmfPkgX64.fdf) \
       <(sed -ne '/FD.MEMFD/,/FV.SECFV/p' OvmfPkg/AmdSev/AmdSevX64.fdf)
--- /dev/fd/63  2023-02-16 07:06:15.365308683 +0000
+++ /dev/fd/62  2023-02-16 07:06:15.365308683 +0000
@@ -32,6 +32,12 @@
 0x00E000|0x001000
 
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize

+0x00F000|0x000C00
+gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretBase|gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretSize
+
+0x00FC00|0x000400
+gUefiOvmfPkgTokenSpaceGuid.PcdQemuHashTableBase|gUefiOvmfPkgTokenSpaceGuid.PcdQemuHashTableSize
+
 0x010000|0x010000
 
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase|gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize

Signed-off-by: Dov Murik <[email protected]>
Acked-by: Tom Lendacky <[email protected]>
Acked-by: Gerd Hoffmann <[email protected]>


  Commit: 9eec96bd4fc53d7836b5606f2a8bbb10713cc8f5
      
https://github.com/tianocore/edk2/commit/9eec96bd4fc53d7836b5606f2a8bbb10713cc8f5
  Author: Dov Murik <[email protected]>
  Date:   2023-11-28 (Tue, 28 Nov 2023)

  Changed paths:
    M OvmfPkg/ResetVector/ResetVector.nasmb
    M OvmfPkg/ResetVector/X64/OvmfSevMetadata.asm

  Log Message:
  -----------
  OvmfPkg/ResetVector: Define SNP metadata for kernel hashes

In order to allow the VMM (such as QEMU) to add a page with hashes of
kernel/initrd/cmdline for measured direct boot on SNP, add it explicitly
to the SNP metadata list report to the VMM.

In such case, VMM should fill the page with the hashes content, or
explicitly update it as a zero page (if kernel hashes are not used).

Note that for SNP, the launch secret part of the page (lower 3KB) are
not relevant and will remain zero.  The last 1KB is used for the hashes.

This should have no effect on OvmfPkgX64 targets (which don't define
PcdSevLaunchSecretBase).

Signed-off-by: Dov Murik <[email protected]>
Acked-by: Tom Lendacky <[email protected]>
Acked-by: Gerd Hoffmann <[email protected]>


Compare: https://github.com/tianocore/edk2/compare/3c5f9ac5c3b9...9eec96bd4fc5


_______________________________________________
edk2-commits mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/edk2-commits

Reply via email to