]> git.proxmox.com Git - mirror_edk2.git/commitdiff
OvmfPkg: fix PcdFSBClock
authorGerd Hoffmann <kraxel@redhat.com>
Mon, 23 May 2022 13:45:04 +0000 (21:45 +0800)
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
Wed, 25 May 2022 13:34:26 +0000 (13:34 +0000)
kvm FSB clock is 1GHz, not 100 MHz.  Timings are off by factor 10.
Fix all affected build configurations.  Not changed: Microvm and
Cloudhw (they have already have the correct value), and Xen (has
no fixed frequency, the PCD is configured at runtime by platform
initialization code).

Fixes: c37cbc030d96 ("OvmfPkg: Switch timer in build time for OvmfPkg")
Reported-by: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Gerd Hoffmann <kraxel@redhat.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
OvmfPkg/AmdSev/AmdSevX64.dsc
OvmfPkg/IntelTdx/IntelTdxX64.dsc
OvmfPkg/OvmfPkgIa32.dsc
OvmfPkg/OvmfPkgIa32X64.dsc
OvmfPkg/OvmfPkgX64.dsc

index bead9722eab8ed9259a6d2bab9e53bff4b64b5d6..fc1fdb2e2297dcd37e09ddc6af71cb428c029a87 100644 (file)
 \r
 !include OvmfPkg/OvmfTpmPcds.dsc.inc\r
 \r
-  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000\r
+  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|1000000000\r
 \r
 [PcdsDynamicHii]\r
 !include OvmfPkg/OvmfTpmPcdsHii.dsc.inc\r
index 00bc1255bc4e2c583f5c58b9a374efca065514cb..dd8d446f4a5617833ca622ec12ff9f3e5169084f 100644 (file)
   # Set ConfidentialComputing defaults\r
   gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0\r
 \r
-  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000\r
+  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|1000000000\r
 \r
 ################################################################################\r
 #\r
index c16a840fff16efb4d795167820b7d00e377a71b2..a9841cbfc3ca1b91b39e6dee4431a95f71af2190 100644 (file)
   gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0\r
 \r
 !if $(CSM_ENABLE) == FALSE\r
-  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000\r
+  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|1000000000\r
 !endif\r
 \r
 [PcdsDynamicHii]\r
index d3a80cb56892608a90c45dd4f36a0cd44638474f..f7949780fa38b164a281d608a48b14432e689f48 100644 (file)
   gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0\r
 \r
 !if $(CSM_ENABLE) == FALSE\r
-  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000\r
+  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|1000000000\r
 !endif\r
 \r
 [PcdsDynamicDefault.X64]\r
index 7b3d48aac4300be2eda42a53c5b52b5219a3ce7d..1448f925b782cdd959d1a0c2a9797cd3dcd73dc9 100644 (file)
   gEfiMdePkgTokenSpaceGuid.PcdConfidentialComputingGuestAttr|0\r
 \r
 !if $(CSM_ENABLE) == FALSE\r
-  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|100000000\r
+  gEfiMdePkgTokenSpaceGuid.PcdFSBClock|1000000000\r
 !endif\r
 \r
 [PcdsDynamicHii]\r