mirror of https://github.com/acidanthera/audk.git
OvmfPkg: create a SEV secret area in the AmdSev memfd
SEV needs an area to place an injected secret where OVMF can find it and pass it up as a ConfigurationTable. This patch implements the area itself as an addition to the SEV enhanced reset vector table using an additional guid (4c2eb361-7d9b-4cc3-8081-127c90d3d294). Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=3077 Signed-off-by: James Bottomley <jejb@linux.ibm.com> Reviewed-by: Laszlo Ersek <lersek@redhat.com> Message-Id: <20201130202819.3910-5-jejb@linux.ibm.com> Acked-by: Ard Biesheuvel <ard.biesheuvel@arm.com> [lersek@redhat.com: fix typo in "ResetVectorVtf0.asm" comments]
This commit is contained in:
parent
b261a30c90
commit
224752eced
|
@ -304,6 +304,12 @@
|
||||||
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|0|UINT32|0x40
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbBase|0|UINT32|0x40
|
||||||
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize|0|UINT32|0x41
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecGhcbSize|0|UINT32|0x41
|
||||||
|
|
||||||
|
## The base address and size of the SEV Launch Secret Area provisioned
|
||||||
|
# after remote attestation. If this is set in the .fdf, the platform
|
||||||
|
# is responsible for protecting the area from DXE phase overwrites.
|
||||||
|
gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretBase|0x0|UINT32|0x42
|
||||||
|
gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretSize|0x0|UINT32|0x43
|
||||||
|
|
||||||
[PcdsDynamic, PcdsDynamicEx]
|
[PcdsDynamic, PcdsDynamicEx]
|
||||||
gUefiOvmfPkgTokenSpaceGuid.PcdEmuVariableEvent|0|UINT64|2
|
gUefiOvmfPkgTokenSpaceGuid.PcdEmuVariableEvent|0|UINT64|2
|
||||||
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashVariablesEnable|FALSE|BOOLEAN|0x10
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashVariablesEnable|FALSE|BOOLEAN|0x10
|
||||||
|
|
|
@ -47,6 +47,25 @@ TIMES (15 - ((guidedStructureEnd - guidedStructureStart + 15) % 16)) DB 0
|
||||||
;
|
;
|
||||||
guidedStructureStart:
|
guidedStructureStart:
|
||||||
|
|
||||||
|
;
|
||||||
|
; SEV Secret block
|
||||||
|
;
|
||||||
|
; This describes the guest ram area where the hypervisor should
|
||||||
|
; inject the secret. The data format is:
|
||||||
|
;
|
||||||
|
; base physical address (32 bit word)
|
||||||
|
; table length (32 bit word)
|
||||||
|
;
|
||||||
|
; GUID (SEV secret block): 4c2eb361-7d9b-4cc3-8081-127c90d3d294
|
||||||
|
;
|
||||||
|
sevSecretBlockStart:
|
||||||
|
DD SEV_LAUNCH_SECRET_BASE
|
||||||
|
DD SEV_LAUNCH_SECRET_SIZE
|
||||||
|
DW sevSecretBlockEnd - sevSecretBlockStart
|
||||||
|
DB 0x61, 0xB3, 0x2E, 0x4C, 0x9B, 0x7D, 0xC3, 0x4C
|
||||||
|
DB 0x80, 0x81, 0x12, 0x7C, 0x90, 0xD3, 0xD2, 0x94
|
||||||
|
sevSecretBlockEnd:
|
||||||
|
|
||||||
;
|
;
|
||||||
; SEV-ES Processor Reset support
|
; SEV-ES Processor Reset support
|
||||||
;
|
;
|
||||||
|
|
|
@ -43,3 +43,7 @@
|
||||||
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPageTablesSize
|
||||||
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamBase
|
||||||
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSecPeiTempRamSize
|
||||||
|
|
||||||
|
[FixedPcd]
|
||||||
|
gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretBase
|
||||||
|
gUefiOvmfPkgTokenSpaceGuid.PcdSevLaunchSecretSize
|
||||||
|
|
|
@ -83,5 +83,7 @@
|
||||||
%include "Main.asm"
|
%include "Main.asm"
|
||||||
|
|
||||||
%define SEV_ES_AP_RESET_IP FixedPcdGet32 (PcdSevEsWorkAreaBase)
|
%define SEV_ES_AP_RESET_IP FixedPcdGet32 (PcdSevEsWorkAreaBase)
|
||||||
|
%define SEV_LAUNCH_SECRET_BASE FixedPcdGet32 (PcdSevLaunchSecretBase)
|
||||||
|
%define SEV_LAUNCH_SECRET_SIZE FixedPcdGet32 (PcdSevLaunchSecretSize)
|
||||||
%include "Ia16/ResetVectorVtf0.asm"
|
%include "Ia16/ResetVectorVtf0.asm"
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue