The added behavior is to accept all unaccepted memory at ExitBootServices if the behavior is not disabled. This allows safe upgrades for OS loaders to affirm their support for the unaccepted memory type. Cc: Gerd Hoffmann <kraxel@redhat.com> Cc: James Bottomley <jejb@linux.ibm.com> Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Tom Lendacky <thomas.lendacky@amd.com> Cc: Ard Biesheuvel <ardb@kernel.org> Cc: "Min M. Xu" <min.m.xu@intel.com> Cc: Andrew Fish <afish@apple.com> Cc: "Michael D. Kinney" <michael.d.kinney@intel.com> Signed-off-by: Dionna Glaze <dionnaglaze@google.com> Reviewed-by: Ard Biesheuvel <ardb@kernel.org>
59 lines
1.3 KiB
INI
59 lines
1.3 KiB
INI
#/** @file
|
|
#
|
|
# Driver clears the encryption attribute from MMIO regions when SEV is enabled
|
|
#
|
|
# Copyright (c) 2017 - 2020, AMD Inc. All rights reserved.<BR>
|
|
#
|
|
# SPDX-License-Identifier: BSD-2-Clause-Patent
|
|
#
|
|
#**/
|
|
|
|
[Defines]
|
|
INF_VERSION = 1.25
|
|
BASE_NAME = AmdSevDxe
|
|
FILE_GUID = 2ec9da37-ee35-4de9-86c5-6d9a81dc38a7
|
|
MODULE_TYPE = DXE_DRIVER
|
|
VERSION_STRING = 1.0
|
|
ENTRY_POINT = AmdSevDxeEntryPoint
|
|
|
|
[Sources]
|
|
AmdSevDxe.c
|
|
|
|
[Packages]
|
|
MdeModulePkg/MdeModulePkg.dec
|
|
MdePkg/MdePkg.dec
|
|
OvmfPkg/OvmfPkg.dec
|
|
|
|
[LibraryClasses]
|
|
BaseLib
|
|
BaseMemoryLib
|
|
DebugLib
|
|
DxeServicesTableLib
|
|
MemEncryptSevLib
|
|
MemoryAllocationLib
|
|
PcdLib
|
|
UefiDriverEntryPoint
|
|
|
|
[Depex]
|
|
TRUE
|
|
|
|
[FeaturePcd]
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdSmmSmramRequire
|
|
|
|
[FixedPcd]
|
|
gEfiMdePkgTokenSpaceGuid.PcdPciExpressBaseAddress
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidBase
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfCpuidSize
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsBase
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfSnpSecretsSize
|
|
|
|
[Protocols]
|
|
gEdkiiMemoryAcceptProtocolGuid
|
|
|
|
[Guids]
|
|
gConfidentialComputingSevSnpBlobGuid
|
|
gEfiEventBeforeExitBootServicesGuid
|
|
|
|
[Pcd]
|
|
gUefiOvmfPkgTokenSpaceGuid.PcdOvmfHostBridgePciDevId
|