audk/OvmfPkg/ResetVector
Brijesh Singh e60af8a1eb OvmfPkg/ResetVector: Set C-bit when building initial page table
SEV guest VMs have the concept of private and shared memory. Private
memory is encrypted with the guest-specific key, while shared memory
may be encrypted with hypervisor key. Certain types of memory (namely
instruction pages and guest page tables) are always treated as private
memory by the hardware. The C-bit in PTE indicate whether the page is
private or shared. The C-bit position for the PTE can be obtained from
CPUID Fn8000_001F[EBX].

When SEV is active, the BIOS is encrypted by the Qemu launch sequence,
we must set the C-bit when building the page table.

Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Tom Lendacky <Thomas.Lendacky@amd.com>
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jordan Justen <jordan.l.justen@intel.com>
2017-07-10 21:17:27 -07:00
..
Ia32 OvmfPkg/ResetVector: Set C-bit when building initial page table 2017-07-10 21:17:27 -07:00
ResetVector.inf OvmfPkg/ResetVector: Depend on PCD values of the page tables. 2016-11-04 23:47:07 +01:00
ResetVector.nasmb OvmfPkg/ResetVector: Depend on PCD values of the page tables. 2016-11-04 23:47:07 +01:00