On Wed, Dec 21, 2022 at 09:50:43AM -0600, Michael Roth wrote:
> A full-featured SEV-SNP guest will not rely on the AP jump table, and
> will instead use the AP Creation interface defined by the GHCB. However,
> a guest is still allowed to use the AP jump table if desired.
> 
> However, unlike with SEV-ES guests, SEV-SNP guests should not
> store/retrieve the jump table address via GHCB requests to the
> hypervisor, they should instead store/retrieve it via the SEV-SNP
> secrets page.
> 
> This series implements the store side of this for OVMF by introducing a
> PCD that can be used to pass the SEV-SNP secrets page address to
> UefiCpuPkg, where the jump table address is allocated. It also
> introduces a struct that defines the SEV-SNP secrets page format
> according to the GHCB v2.01 and SEV-SNP FW ABI specifications.
> 
> v4:
>  - Move storing of jump table address after relevant comment rather
>    than before it. (Tom)
> 
> v3:
>  - Break up single patch into a set of patches containing the specific
>    changes for each package. (Ray)
> 
> v2:
>  - Update Secrets OS area to match latest GHCB 2.01 spec (Tom)
>  - Move Secrets header file into ./Register/AMD subdirectory (Tom)
>  - Fix CI EccCheck due to assignment in variable declaration
> 
> ----------------------------------------------------------------
> Michael Roth (4):
>       MdePkg: Add header for SEV-SNP secrets page struct
>       MdePkg: Add PcdSevSnpSecretsAddress to export SEV-SNP secrets page
>       OvmfPkg: Initialize the PcdSevSnpSecretsAddress PCD during PEI phase
>       UefiCpuPkg: Store SEV-SNP AP jump table in the secrets page

Adding some Cc's from Maintainers.txt that I should have included originally:

Patch 1/2:
  Michael D Kinney <[email protected]>
  Liming Gao <[email protected]>
  Zhiguang Liu <[email protected]>

Patch 3:
  Ard Biesheuvel <[email protected]>
  Jiewen Yao <[email protected]>
  Gerd Hoffmann <[email protected]>

Patch 4:
  Eric Dong <[email protected]>
  Rahul Kumar <[email protected]>

Thanks,

Mike

> 
>  MdePkg/Include/Register/Amd/SnpSecretsPage.h  | 56 
> +++++++++++++++++++++++++++++++++++++++++++++++++++++
>  MdePkg/MdePkg.dec                             |  4 ++++
>  OvmfPkg/AmdSev/AmdSevX64.dsc                  |  3 +++
>  OvmfPkg/CloudHv/CloudHvX64.dsc                |  3 +++
>  OvmfPkg/IntelTdx/IntelTdxX64.dsc              |  3 +++
>  OvmfPkg/Microvm/MicrovmX64.dsc                |  3 +++
>  OvmfPkg/OvmfPkgIa32.dsc                       |  3 +++
>  OvmfPkg/OvmfPkgIa32X64.dsc                    |  3 +++
>  OvmfPkg/OvmfPkgX64.dsc                        |  3 +++
>  OvmfPkg/PlatformPei/AmdSev.c                  |  5 +++++
>  OvmfPkg/PlatformPei/PlatformPei.inf           |  1 +
>  UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf |  1 +
>  UefiCpuPkg/Library/MpInitLib/DxeMpLib.c       | 10 ++++++++++
>  13 files changed, 98 insertions(+)
>  create mode 100644 MdePkg/Include/Register/Amd/SnpSecretsPage.h
> 
> 


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#97707): https://edk2.groups.io/g/devel/message/97707
Mute This Topic: https://groups.io/mt/95815534/21656
Group Owner: [email protected]
Unsubscribe: https://edk2.groups.io/g/devel/unsub [[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to