Source: edk2
Severity: wishlist
X-Debbugs-Cc: sl...@ubuntu.com, da...@debian.org

Dear Maintainer,

The launch of SNP QEMU VM with SNP measurement boot option fails due to the 
absence of OVMF amdsev file in the OVMF package.

The OVMF package requires the integration of the AMD SEV firmware 
file,OVMF.amdsev.fd, to enable support for SEV-secured VM remote attestation 
and secret injection.

Currently, the SEV firmware necessary to support SEV Virtual Machine Remote 
Attestation is not available within the OVMF binary package (but part of the 
necessary code is part of the source package already).

We attempted to execute an SNP QEMU measured boot using the OVMF file, but this 
endeavor was unsuccessful due to the provision of an invalid OVMF file within 
the OVMF package.

Error message that I see using OVMF.fd (/usr/share/ovmf/OVMF.fd) as guest bios 
is as follows:
qemu-system-x86_64: SEV: guest firmware hashes table area is invalid (base=0x0 
size=0x0)

QEMU commandline used for my SNP guest test launch is as follows:

qemu-system-x86_64 \
 -enable-kvm \
 -cpu EPYC-v4 \
 -m 2048 \
 -nographic \
 -netdev user,hostfwd=tcp::10030-:22,id=vmnic \
 -device 
virtio-net-pci,disable-legacy=on,iommu_platform=true,netdev=vmnic,romfile= \
 -device virtio-scsi-pci,id=scsi0 \
 -device scsi-hd,drive=disk0 \
 -drive 
if=none,id=disk0,format=qcow2,file=/home/amd/os-guest-test/os-guest-test-guest.qcow2
 \
 -machine memory-encryption=sev0,vmport=off \
 -object memory-backend-memfd,id=ram1,size=2048M,share=true,prealloc=false \
 -machine memory-backend=ram1 \
 -object sev-snp-guest,id=sev0,cbitpos=51,reduced-phys-bits=1,kernel-hashes=on \
 -bios /usr/share/ovmf/OVMF.fd \
 -kernel 
/home/amd/os-guest-test/guest_kernel_initrd/vmlinuz-6.13.9-200.fc41.x86_64 \
 -initrd 
/home/amd/os-guest-test/guest_kernel_initrd/initramfs-6.13.9-200.fc41.x86_64.img
 \
 -append "console=tty1 console=ttyS0,115200n8 root=LABEL=fedora ro 
rootflags=subvol=root"


This feature request was forwarded from Ubuntu/Launchpad:
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2106771

Cheers,
  Lukas

-- System Information:
Debian Release: trixie/sid
  APT prefers noble-updates
  APT policy: (500, 'noble-updates'), (500, 'noble-security'), (500, 'noble'), 
(100, 'noble-proposed'), (100, 'noble-backports')
Architecture: amd64 (x86_64)

Kernel: Linux 6.8.0-55-generic (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), 
LANGUAGE=de_DE:en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Reply via email to