audk/OvmfPkg/AmdSev
Tom Lendacky 5a67a2efa7 OvmfPkg: Create a calling area used to communicate with the SVSM
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4654

An SVSM requires a calling area page whose address (CAA) is used by the
SVSM to communicate and process the SVSM request.

Add a pre-defined page area to the OvmfPkg and AmdSev packages and define
corresponding PCDs used to communicate the location and size of the area.
Keep the AmdSev package in sync with the OvmfPkg and adjust the AmdSev
launch and hash area memory locations.

Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Erdem Aktas <erdemaktas@google.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Michael Roth <michael.roth@amd.com>
Cc: Min Xu <min.m.xu@intel.com>
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
2024-04-17 20:04:41 +00:00
..
BlobVerifierLibSevHashes OvmfPkg: Update code to be more C11 compliant by using __func__ 2023-04-10 14:19:57 +00:00
Grub
SecretDxe OvmfPkg/AmdSev/SecretDxe: Allocate secret location as EfiACPIReclaimMemory 2022-12-15 13:49:49 +00:00
SecretPei OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as reserved 2022-01-04 08:06:53 +00:00
AmdSevX64.dsc Ovmfpkg/AmdSvsmLib: Create AmdSvsmLib to handle SVSM related services 2024-04-17 18:30:03 +00:00
AmdSevX64.fdf OvmfPkg: Create a calling area used to communicate with the SVSM 2024-04-17 20:04:41 +00:00