From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by mx.groups.io with SMTP id smtpd.web11.51502.1658305447192409177 for ; Wed, 20 Jul 2022 01:24:07 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=V3Xa0ZWF; spf=pass (domain: redhat.com, ip: 170.10.129.124, mailfrom: kraxel@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1658305446; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=wCXuMcGnFsn3cDvYkBR0xigcW5zBXV8pRd9yDJTiLng=; b=V3Xa0ZWFckjvU3hwBBwVhQ1tYstx/EWRPUQ6MLXZTFOWU+Wpbh034vc/+Mg2WsD9kXcTT/ QSn6KJ5whDWvOsii4km08eirhO4o4HxJVEzBpjZTBPRVpzPWy3Nld1I4g8NQNMXt+1flVR HuSWhX9YwbCOZV5wokIaHMz1HRZ5u6I= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-317-pdWEU0NAMDaJp3kZk-wFbA-1; Wed, 20 Jul 2022 04:24:03 -0400 X-MC-Unique: pdWEU0NAMDaJp3kZk-wFbA-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 4AAB7801231; Wed, 20 Jul 2022 08:24:02 +0000 (UTC) Received: from sirius.home.kraxel.org (unknown [10.39.192.134]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0D900401E54; Wed, 20 Jul 2022 08:24:02 +0000 (UTC) Received: by sirius.home.kraxel.org (Postfix, from userid 1000) id 97E0418000A9; Wed, 20 Jul 2022 10:24:00 +0200 (CEST) Date: Wed, 20 Jul 2022 10:24:00 +0200 From: "Gerd Hoffmann" To: "Xu, Min M" Cc: "devel@edk2.groups.io" , Leif Lindholm , Ard Biesheuvel , "Chang, Abner" , "Schaefer, Daniel" , "Aktas, Erdem" , James Bottomley , "Yao, Jiewen" , Tom Lendacky Subject: Re: [PATCH V4 0/8] Enable secure-boot when lauch OVMF with -bios parameter Message-ID: <20220720082400.qfwrgq7tbwuwdu45@sirius.home.kraxel.org> References: MIME-Version: 1.0 In-Reply-To: X-Scanned-By: MIMEDefang 2.85 on 10.11.54.10 Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=kraxel@redhat.com X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Wed, Jul 20, 2022 at 06:38:32AM +0000, Xu, Min M wrote: > Hi, Gerd > Do you have any comments to this patch-set? With this in place it should be possible to allow secure boot builds for AmdSev and Microvm, that is something I plan to try for additional verification. Havn't found the time to to so, and most likely wouldn't before my summer vacation (starting next week and ending after soft freeze). Have to drop that ball I guess ... >>From looking at the code this all looks sane. Acked-by: Gerd Hoffmann take care, Gerd