From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail05.groups.io (mail05.groups.io [45.79.224.7]) by spool.mail.gandi.net (Postfix) with ESMTPS id 42900941314 for ; Wed, 26 Jun 2024 08:08:49 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=NaYzEsIAKSW5OpXuabVzl7cqX451ZdDwUQ8FJnss7Tc=; c=relaxed/simple; d=groups.io; h=Message-ID:Date:User-Agent:Subject:To:Cc:References:From:In-Reply-To:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Resent-Date:Resent-From:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Type:Content-Language; s=20240206; t=1719389329; v=1; b=kwHQGGbYyHueec3+WuqpY/Wrr5ybXdTj+M/PX2sAEVGESdhef/N+2Tie8hnng3IYM2U7200U WHpyN9SnEt/V3UST2wcPK3kXep1U3/CUCYPg6MyZbdnkJBrGPPm5RYyjKJ5/B+2Dq4aIl2ysWtT 6Qp0FzoOtFb8TcaKWKyeUjNVXGn50IVMruF5YmTr9kfhTZTfwF943xKaPYouge41hGxbyeJ2rH7 GzcAhHIleXo3MNovdEweYLRsKaPdAPd/uHMrhRun1lB3+jEB1szIGMZIDWdOehCwDWJrfvk5tce H7orvZIctuf9JeA7YY9tk9VO/daEHosiUbqTt7VKYfC2g== X-Received: by 127.0.0.2 with SMTP id HEuPYY7687511xtQZrU8SnDb; Wed, 26 Jun 2024 01:08:47 -0700 X-Received: from NAM10-DM6-obe.outbound.protection.outlook.com (NAM10-DM6-obe.outbound.protection.outlook.com [40.107.93.56]) by mx.groups.io with SMTP id smtpd.web10.20670.1719389327016841269 for ; Wed, 26 Jun 2024 01:08:47 -0700 X-Received: from IA1PR12MB6460.namprd12.prod.outlook.com (2603:10b6:208:3a8::13) by BL3PR12MB6545.namprd12.prod.outlook.com (2603:10b6:208:38c::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7698.32; Wed, 26 Jun 2024 08:08:44 +0000 X-Received: from IA1PR12MB6460.namprd12.prod.outlook.com ([fe80::c819:8fc0:6563:aadf]) by IA1PR12MB6460.namprd12.prod.outlook.com ([fe80::c819:8fc0:6563:aadf%4]) with mapi id 15.20.7698.025; Wed, 26 Jun 2024 08:08:44 +0000 Message-ID: <5618d3f0-827f-49f4-b1a7-6a47fac50550@amd.com> Date: Wed, 26 Jun 2024 13:38:35 +0530 User-Agent: Mozilla Thunderbird Subject: Re: [edk2-devel] [PATCH 0/2] AmdSev: Harden SEV Kernel hashes verifier To: devel@edk2.groups.io, tobin@linux.ibm.com Cc: dov.murik@gmail.com, james.bottomley@hansenpartnership.com, thomas.lendacky@amd.com, tobin@ibm.com References: From: "Aithal, Srikanth via groups.io" In-Reply-To: X-ClientProxiedBy: PN3PR01CA0168.INDPRD01.PROD.OUTLOOK.COM (2603:1096:c01:de::8) To IA1PR12MB6460.namprd12.prod.outlook.com (2603:10b6:208:3a8::13) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: IA1PR12MB6460:EE_|BL3PR12MB6545:EE_ X-MS-Office365-Filtering-Correlation-Id: 8a677647-de86-4993-efd7-08dc95b7326f X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Message-Info: =?utf-8?B?NVY1Um5hZkRwQWk0aVR4RjFwbVpFN2VuM2tvdWhWcWFBQVR4RmYzd0lZS0dH?= =?utf-8?B?QWxDOVJ3TU5sQWFkWEV4YkR6RTI3bk13RmZoNU1DMVNjcjNOdEhrTGNkWWt4?= =?utf-8?B?WDZ6Rys5L1p6cm0wQ25vdG4vK2RENGtES3BVNmdzRk9YNmFLN25EdkMzMGUy?= =?utf-8?B?dk92UktTRlZMdHh3cXIwR0lYYkxUVWxPV0FhUVdZQ2d6OWRJSVVYTDNXeG1u?= =?utf-8?B?VVhjSkh5cEdPVE51YUM1UHlpMDgrMUsvYzRYN3JQeFhHckUveEw4cXlmQ1px?= =?utf-8?B?ckVRZlpuWHVPUUxFbDJFMURZQXRlbUJPVnRVQ1dQZFltbDRVd0pjREEvN0lW?= =?utf-8?B?SEVqMGtxMHlON1lIaWI3MkJXQ0hrWHdlNFlxSFRXREZmNUQvY1VkczFkcFp6?= =?utf-8?B?b2tRZ1FMNzlSbWZpSGpTUk9Ya0lDdDhralZZOUZHOTVEQXdpQS96TEQ5Z1hO?= =?utf-8?B?bndleCtvY01hOHhrWXRCanVXc1FZWUF2UGZpdkNJdWxIL24xaGRqelV0eEdv?= =?utf-8?B?QUNWNTJ3NHRNVjlsc1dwY21CUEJGTGUvSUpvRDkxWStKcjdqVnpJWU5rMFlK?= =?utf-8?B?d1cwbWJhTy9vS0xTZ2tGMnR1Sk1YK0svR3VBem1YRmQvZFRISXFaODdtcjlW?= =?utf-8?B?MWM1MDVOQWl3Z1V0aXBoQm9VRTNoT2lzV2x0OFVycmVDVi9yRENYVU9MNE15?= =?utf-8?B?K0dQS0cySFUxTHJYT1VkTHZ1RkV2S2grMm8xU29qOVJPSXhIRWFxZmk4WGQz?= =?utf-8?B?MkdFRHFFeUJrL2oxOXhSd0xJNCtFTFJKbWVINGlaVy96azR1NWxoaHhBbDRU?= =?utf-8?B?dWc1STVGTFY0WmJQZ0FOQ0tlc1R3RUptaEdqNjdXN1dxSUpNM21sN25ZVVhL?= =?utf-8?B?bTl1MzJUbFBWOVg2T29SanpHUW5IWDNMb1BnSFh2WkVUMUVaTzhzcUdFb29G?= =?utf-8?B?dFZhdmRLY3hTQlVUbENacURDcVE3Q1NYbzkrMnpqWW9YSzRtL0dWaXpPMFpY?= =?utf-8?B?OFVRZTZPbVB6NEVGdm9wQ2kvb1g1WG9zZFNwYzB4ZFhwZkVtM0tmdVlGQnNS?= =?utf-8?B?ZU5NYWNzM0ZjTkU5M1FFcjhlVGNZaTJZZXRyVkZTUUgwbjhKSzhlaHhHdFdp?= =?utf-8?B?VjB4MVFOcklDclRvWFduWGY3QWRTUWRiYU54MnJJdnBPdkQvNG9sYnB2djRE?= =?utf-8?B?dVgwZXQ4STdTbklSSFQySldMYjcvL2p2UEFWQWU4S1NWMldKSy83UUJrNUJn?= =?utf-8?B?UnlvazFic29mTmhZaVNKWjB4NjVSVEM4NHRjOURNYnRMaGZpR3g0MTIwc3h1?= =?utf-8?B?QTNnY0FzdDVHY3F3K1NlWVRSZlY4WitTVlpwTXpXYVpzSmc0QjNvSS9XWDN4?= =?utf-8?B?T2hnb1YxUi9yOEg3TkNWRUJPMlVMOG1GczAvcFpUOHNSaUp0Z25yWUlIcmFE?= =?utf-8?B?bjV1eThOZFlUNzNYWE12d1pDTk0yQ0N0c29yN0RxVktJbzkvbVhWbWFLcVlM?= =?utf-8?B?dVlJdkRJdEJTQ2NNUCt1YnlEQjlwTzVmYlBKajEvYldXRXJmVklCUDJmNUdK?= =?utf-8?B?ZUt0ZEZjTWVXVlV5NnNIejVZUVgxVFIwYko3Nkk5NisvcUU1TEUyQVY3T3di?= =?utf-8?B?MUw5SXNuS2VVQ3FjKzFmZ2xBdkdOVXdvTml2WU9zN0tNNDdTNFZ0c3g2MjZm?= =?utf-8?B?aDRyeXYxV0pIY25TNDRYQWVKUHdJQ3VicXhjVzJNRWNjbG5jcmtSRW80bWNP?= =?utf-8?B?ZzkvZVVJRUtDYndXa3VCOEU4THpVTmhJaE1WQUVDSXljKzlSQ25qWGZHYy9Q?= =?utf-8?B?RG1BUktqTHhHYVVqY3hudz09?= X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?RHJTMnZsYXRjWDhrcm40Z1NzaFhrbnRzbDFuUGloREw1d1ZKbEhwWVNRYXVB?= =?utf-8?B?Q0xsaWxLREV2SmVuR3JxYUZ4V25MTkN5cFhDYjFkNUxsSWpvWHVzQ1JDNlZm?= =?utf-8?B?K0ZoSVNHcm1NWkF5WDV2QThiMjVLdDU1UDdZaC9kYnIzUzlzZmRveUhhaVpx?= =?utf-8?B?TGZDdXJKbjBLOTUrWVVBVWgyYVZOR0t6UTVxN2lLSU55SzdLRjQzMW1yU0Uw?= =?utf-8?B?NWdhUzVqQzZHMXowWU5tUFdwS0oybzFTVExIMjcyM1U1OG9JbmFKczY1K1BC?= =?utf-8?B?QVh0eWFjOUUrK09rN29oQ0h3MVA2cEcySWZJemoxNnVFUVdmVlZtaXZpR2pp?= =?utf-8?B?OGI4NG0waTdoWS9UZndCZjk0ZWFjdUJKa3M3clU2bjhOWlpRRXJtY0p2c0xH?= =?utf-8?B?V3JJSFI5Rmh5Ui9keE41bkcvSnRadVk3Q2FuVFJwOE01VGZYRi9xVFkxV2E0?= =?utf-8?B?ODlBWEpscThab21La1c0R1l3WTRhZ3ZMdVdpbEUvbXdZTHNmQmF0MllWM3lT?= =?utf-8?B?enNUTXpMdUlxYkdPaHdVUkVQMVlnbUpsSTQrR3RBeEJZK1FPaEdudVI0UzVG?= =?utf-8?B?NjM0dkF0Q2krUTkvaGZPSGxIM3BnaFJuYmFvaWs4TjQrbVBBWDRveStrdE0r?= =?utf-8?B?bDZJQ1dBZVRkR0xXWlhCUmRIR3ZUd29xbzZzWnRQaFlMRld5NjdOSnJFaGFj?= =?utf-8?B?b0d4ZjBEcDFoK0NyN3ZXdHBZbllWUVFZdE9CWHRMaUk4eitwa0pJTFJTRDhp?= =?utf-8?B?M1BoRDFLWHpWTUdSZ21DcXlRK3JIK1QrMzd0SHhIR2FvZFhUVDdWM0JOVDVq?= =?utf-8?B?d0ZodjVXSjd0MC9RTHhwSTNxN2pDSVZkenhBQXU0cUlMR3ZKckhyTUh2bDAv?= =?utf-8?B?Z09SNTdmbkxDTmxIK2U5eVpYQjdVMGhJZ1JsR1RuTGpyV2xuNThEYlN3bWxq?= =?utf-8?B?dEtCMWtVNEdaNFBrODV5QzZMMkRLVHJnM1VWSEpDNVpOL2hXaEw4NnlSa0c2?= =?utf-8?B?RTF3L25tTTk4Vk5qZ0N5bWJkREhkSk1OOWhUWmhwd3pPREc5bngwYnVhWDlG?= =?utf-8?B?T1phSkNuZ1BoQThnWjhmUEtWSm1nK0M1SHdGMHNFT1JIU1ZVMXViK1ZFQTBx?= =?utf-8?B?eWVJZFVLNGlNSTRZSWNOckRnV0Z1ZWlFeUNSc3diR2hJclplRXRyeXc1MlZy?= =?utf-8?B?QUcra0lnY2NDYXRtak5OczM3NjM0a3d5VW1SZmZURFR6bEtSY1FvQkJndnh2?= =?utf-8?B?ZWJmR0RpZm5sMGZBekhYZ0tFZmVSWERPbVJWUFA2eEdFVUI1NGE3OWlXb2NR?= =?utf-8?B?eXg4TDVHbFp5RWdFZGJPUTFZaVJkbVFIeXplOGFjK1N4eVJ0Z2M0SmlPWDVv?= =?utf-8?B?QVRteVFTa0Z1azd4T2JMSVhoYWZxWFltUmE0WkUwYjVCc01WNFJBNW5mU21y?= =?utf-8?B?d2J3a0ZWelZKNFN5cXY5VkdpZmxjOWYxZkFsT0o3OElRd2t5Y2pFV1JQVmV2?= =?utf-8?B?Z2NZNTgxaUdJWDJYSUFKbnJBRDZ0dEJUUVlva3J4VFNIUTBsaDdCWkZYL0Vh?= =?utf-8?B?dVFUeFRhVTJjVlpRVDlFS2trMzI1VndEdVZhM2FRSkpaVEYyMlI4TGNRUEcy?= =?utf-8?B?eDdhQ04rVlEraEhvMzdSQ2FIZ2tOeFdMdWdGUEdzTUZucHgrZkhVUjVDK1Fm?= =?utf-8?B?Qkl4Um8xUTlLV1Rtb2xFS1FmamEzNmg3dFp1VmkxbHZ0RWlwR0QzMnVDMHVF?= =?utf-8?B?SENrekRPbHpiU3lDOGl3ZFAxMzEwTG5DcHRxLzBsRGg5aVRnQmRiYUdrUktE?= =?utf-8?B?TGdNQmJsL0Y3NzFaZUU1YmZ6bmo0N0FFU3JGSGpONzNDRHBuS1g2NjU5Z1lT?= =?utf-8?B?ZjRmZXRJazE0aHc1WUo3MGF3bmc4SzdtT042Z0REMDQvY2ZpUjJGNWZIa3NI?= =?utf-8?B?RUF3bkkxb21FN1lnNk5DOTl4Y2gzZjI5dXB0WHFRRThYa2dkVUdOdFdjUmx5?= =?utf-8?B?WVNZQjlMbEQ2ZXczdzUvbGxLV3VWV09qSkZVWC9uSXdOY2ZtODhYUVB6dkJn?= =?utf-8?B?M3RoT2k2c1JnNnptOVQycytWNjFuNks4TGlURzlZcjg3S3hGNE1lMEgrd0dl?= =?utf-8?Q?qPEyjHrrEQYajsGkHnfBjfvFk?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8a677647-de86-4993-efd7-08dc95b7326f X-MS-Exchange-CrossTenant-AuthSource: IA1PR12MB6460.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jun 2024 08:08:44.0422 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ooMDrfZV7v1ByKfDZ0kEiwlki6PWzqxfuyVC+TRKYdxk7b0W3XRUaTZdDqSWiKpxLHqIlMwRd3sco8EpN9/+hA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL3PR12MB6545 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Resent-Date: Wed, 26 Jun 2024 01:08:47 -0700 Resent-From: srikanth.aithal@amd.com Reply-To: devel@edk2.groups.io,srikanth.aithal@amd.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: QLmtxrDD1zB5wAzTXZMyIMvrx7686176AA= Content-Type: multipart/alternative; boundary="------------t6wk0q76qUw0RkjhyXZgdt5q" Content-Language: en-US X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20240206 header.b=kwHQGGbY; dmarc=pass (policy=none) header.from=groups.io; spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 45.79.224.7 as permitted sender) smtp.mailfrom=bounce@groups.io --------------t6wk0q76qUw0RkjhyXZgdt5q Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit Hello, SEV/SEVES guest boot fails with AMDSEV OVMF package built using upstream edk2 master [commit head: 2fbaaa96d11ad61a9133df1728e3fe965d1457a5]. SEV/SEVES guest boot with AMDSEV package gets stuck at below point: Plain Text |2024-06-26 04:38:02: FetchBlob: loading 14332416 bytes for "kernel" 2024-06-26 04:38:02: Select Item: 0x18 2024-06-26 04:38:02: Select Item: 0x11 2024-06-26 04:38:02: VerifyBlob: Found GUID 4DE79437-ABD2-427F-B835-D5B172D2045B in table 2024-06-26 04:38:02: VerifyBlob: Hash comparison succeeded for "kernel" 2024-06-26 04:38:02: Select Item: 0xB 2024-06-26 04:38:02: VerifyBlob: Found GUID 44BAF731-3A2F-4BD7-9AF1-41E29169781D in table 2024-06-26 04:38:02: VerifyBlob: Blob Specified in Hash Table was not Provided --> Hung here | This was working until yesterday [commit head: be38c01], where we can see boot was proceeding Plain Text |2024-06-25 03:13:23: VerifyBlob: Found GUID 4DE79437-ABD2-427F-B835-D5B172D2045B in table 2024-06-25 03:13:23: VerifyBlob: Hash comparison succeeded for "kernel" 2024-06-25 03:13:23: Select Item: 0xB 2024-06-25 03:13:23: VerifyBlob: Found GUID 44BAF731-3A2F-4BD7-9AF1-41E29169781D in table 2024-06-25 03:13:23: VerifyBlob: Hash comparison succeeded for "initrd" 2024-06-25 03:13:23: Select Item: 0x14 2024-06-25 03:13:23: FetchBlob: loading 120 bytes for "cmdline" 2024-06-25 03:13:23: Select Item: 0x15 2024-06-25 03:13:23: VerifyBlob: Found GUID 97D02DD8-BD20-4C94-AA78-E7714D36AB2A in table 2024-06-25 03:13:23: VerifyBlob: Hash comparison succeeded for "cmdline"| After this patch got merged the regression is seen. Thanks, Srikanth Aithal On 5/7/2024 1:57 AM, Tobin Feldman-Fitzthum via groups.io wrote: > The AmdSev package has a so-called BlobVerifier, which > is meant to extend the TCB of a confidential guest > (SEV or SNP) to include components provided via fw_cfg > such as initrd, kernel, kernel params. > > This series fixes a few implementation errors in the > blob verifier. One common theme is that the verifier > currently fails to halt the boot when an invalid blob > is detected. This can lead to a confidential guest > having a launch measurement that does not reflect the > guest TCB. > > This series could also help us move towards consolidating > the AmdSev package back into the OvmfPkg although more > discussion will be needed on this. > > Thank you for Ryan Savino at AMD for pointing out > some of these issues. > > Tobin Feldman-Fitzthum (2): > AmdSev: Rework Blob Verifier > AmdSev: Halt on failed blob allocation > > .../BlobVerifierSevHashes.c | 56 ++++++++++++++++--- > OvmfPkg/Include/Library/BlobVerifierLib.h | 14 +++-- > .../BlobVerifierLibNull/BlobVerifierNull.c | 13 +++-- > .../QemuKernelLoaderFsDxe.c | 9 ++- > 4 files changed, 69 insertions(+), 23 deletions(-) > -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#119717): https://edk2.groups.io/g/devel/message/119717 Mute This Topic: https://groups.io/mt/105977013/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=-=-=-=-=-=-=-=-=-=-=- --------------t6wk0q76qUw0RkjhyXZgdt5q Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: 8bit

Hello,

SEV/SEVES guest boot fails with AMDSEV OVMF package built using upstream edk2 master [commit head: 2fbaaa96d11ad61a9133df1728e3fe965d1457a5].

SEV/SEVES guest boot with AMDSEV package gets stuck at below point:

 

Plain Text
2024-06-26 04:38:02: FetchBlob: loading 14332416 bytes for "kernel"
2024-06-26 04:38:02: Select Item: 0x18
2024-06-26 04:38:02: Select Item: 0x11
2024-06-26 04:38:02: VerifyBlob: Found GUID 4DE79437-ABD2-427F-B835-D5B172D2045B in table
2024-06-26 04:38:02: VerifyBlob: Hash comparison succeeded for "kernel"
2024-06-26 04:38:02: Select Item: 0xB
2024-06-26 04:38:02: VerifyBlob: Found GUID 44BAF731-3A2F-4BD7-9AF1-41E29169781D in table
2024-06-26 04:38:02: VerifyBlob: Blob Specified in Hash Table was not Provided

--> Hung here

 

This was working until yesterday [commit head: be38c01], where we can see boot was proceeding

Plain Text
2024-06-25 03:13:23: VerifyBlob: Found GUID 4DE79437-ABD2-427F-B835-D5B172D2045B in table
2024-06-25 03:13:23: VerifyBlob: Hash comparison succeeded for "kernel"
2024-06-25 03:13:23: Select Item: 0xB
2024-06-25 03:13:23: VerifyBlob: Found GUID 44BAF731-3A2F-4BD7-9AF1-41E29169781D in table
2024-06-25 03:13:23: VerifyBlob: Hash comparison succeeded for "initrd"
2024-06-25 03:13:23: Select Item: 0x14
2024-06-25 03:13:23: FetchBlob: loading 120 bytes for "cmdline"
2024-06-25 03:13:23: Select Item: 0x15
2024-06-25 03:13:23: VerifyBlob: Found GUID 97D02DD8-BD20-4C94-AA78-E7714D36AB2A in table
2024-06-25 03:13:23: VerifyBlob: Hash comparison succeeded for "cmdline"


After this patch got merged the regression is seen.

Thanks,

Srikanth Aithal


On 5/7/2024 1:57 AM, Tobin Feldman-Fitzthum via groups.io wrote:
The AmdSev package has a so-called BlobVerifier, which
is meant to extend the TCB of a confidential guest
(SEV or SNP) to include components provided via fw_cfg
such as initrd, kernel, kernel params.

This series fixes a few implementation errors in the
blob verifier. One common theme is that the verifier
currently fails to halt the boot when an invalid blob
is detected. This can lead to a confidential guest
having a launch measurement that does not reflect the
guest TCB.

This series could also help us move towards consolidating
the AmdSev package back into the OvmfPkg although more
discussion will be needed on this.

Thank you for Ryan Savino at AMD for pointing out
some of these issues.

Tobin Feldman-Fitzthum (2):
  AmdSev: Rework Blob Verifier
  AmdSev: Halt on failed blob allocation

 .../BlobVerifierSevHashes.c                   | 56 ++++++++++++++++---
 OvmfPkg/Include/Library/BlobVerifierLib.h     | 14 +++--
 .../BlobVerifierLibNull/BlobVerifierNull.c    | 13 +++--
 .../QemuKernelLoaderFsDxe.c                   |  9 ++-
 4 files changed, 69 insertions(+), 23 deletions(-)

_._,_._,_

Groups.io Links:

You receive all messages sent to this group.

View/Reply Online (#119717) | | Mute This Topic | New Topic
Your Subscription | Contact Group Owner | Unsubscribe [rebecca@openfw.io]

_._,_._,_
--------------t6wk0q76qUw0RkjhyXZgdt5q--