Branch: refs/heads/master
  Home:   https://github.com/tianocore/edk2
  Commit: c2d8e9236787270384bab6af9d9db0071468e9e5
      
https://github.com/tianocore/edk2/commit/c2d8e9236787270384bab6af9d9db0071468e9e5
  Author: Jacob Xu <jacob...@google.com>
  Date:   2025-04-17 (Thu, 17 Apr 2025)

  Changed paths:
    M SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpmSvsm.inf
    M SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpmSvsm.inf
    M SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2PtpSvsmShim.c

  Log Message:
  -----------
  SecurityPkg-Tpm2DeviceLibDTpm: Check SNP enabled prior to using AmdSvsmLib

AmdSvsmLib currently doesn't check if SNP enabled, thus using AmdSvsmLib
may errantly cause the caller code to believe SVSM is present. This
leads to boot failure on non-SNP enabled VMs.

We use the PcdConfidentialComputingGuestAttr since it remains valid
after MpInitLib runs which invalidates PcdSevEsWorkArea's cached
sev-status msr which we use to check for SNP enabled in other places.

The added functions ConfidentialComputingGuestHas() and
AmdMemEncryptionAttrCheck() are copied from MpLib.c, which is intended
to be replaced later on with a more minimal library perhaps in MdePkg to
cleanup some of the circular dependencies currently surrounding SvsmLib.

Signed-off-by: Jacob Xu <jacob...@google.com>
Signed-off-by: Oliver Steffen <ostef...@redhat.com>
Suggested-by: Tom Lendacky <thomas.lenda...@amd.com>



To unsubscribe from these emails, change your notification settings at 
https://github.com/tianocore/edk2/settings/notifications


_______________________________________________
edk2-commits mailing list
edk2-commits@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/edk2-commits

Reply via email to