Branch: refs/heads/master
  Home:   https://github.com/tianocore/edk2
  Commit: b98ccecdecec0bb768e6e5bd4df1694de87ad42f
      
https://github.com/tianocore/edk2/commit/b98ccecdecec0bb768e6e5bd4df1694de87ad42f
  Author: RARelph <[email protected]>
  Date:   2025-11-04 (Tue, 04 Nov 2025)

  Changed paths:
    M MdePkg/Include/Library/BaseLib.h
    A MdePkg/Library/BaseLib/AmdSevNull.c
    M MdePkg/Library/BaseLib/BaseLib.inf
    M MdePkg/Library/BaseLib/UnitTestHostBaseLib.inf
    A MdePkg/Library/BaseLib/X64/SevProbe.c

  Log Message:
  -----------
  MdePkg: Add code to detect running as an SEV guest

Similar to Intel's Tdx, we need a mechanism to detect running as
an AMD SEV guest that will work in all phases everywhere. This
will be immediately used to prevent usage of MTRRs with SEV guests.

Signed-off-by: Richard Relph <[email protected]>


  Commit: 05b677c9de2cb3c4486736eb795c12e8008c3797
      
https://github.com/tianocore/edk2/commit/05b677c9de2cb3c4486736eb795c12e8008c3797
  Author: RARelph <[email protected]>
  Date:   2025-11-04 (Tue, 04 Nov 2025)

  Changed paths:
    M UefiCpuPkg/Library/MtrrLib/MtrrLib.c

  Log Message:
  -----------
  UefiCpuPkg/MtrrLib: Prevent MTRR usage with SEV guests

Confidential computing guests do not support MTRR emulation.
This is as true for AMD SEV as it is for Intel's Tdx.

Signed-off-by: Richard Relph <[email protected]>


Compare: https://github.com/tianocore/edk2/compare/8058a94f60a1...05b677c9de2c

To unsubscribe from these emails, change your notification settings at 
https://github.com/tianocore/edk2/settings/notifications


_______________________________________________
edk2-commits mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/edk2-commits

Reply via email to