Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

measurement: fix pad calculation #114

Merged
merged 1 commit into from
Apr 11, 2023
Merged

measurement: fix pad calculation #114

merged 1 commit into from
Apr 11, 2023

Conversation

sza-1
Copy link
Contributor

@sza-1 sza-1 commented Apr 5, 2023

The guest memory region must be 16 B aligned, but the current pad formula is invalid: it adds 16 bytes when a pad is not needed. It causes OVMF to fail, since the secret packet will overflow (while using sevctl secret build ... and 16 K secrets). This PR fixes it.

@crobinso crobinso merged commit a53a1a0 into virtee:main Apr 11, 2023
@crobinso
Copy link
Contributor

crobinso commented Apr 11, 2023

@sza-1 Thanks! We have unit-ish tests covering sevctl secret build. Maybe you can extend it to cover this case too so we don't regress?

@sza-1
Copy link
Contributor Author

sza-1 commented Apr 11, 2023

@crobinso Sure.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants