From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by mx.groups.io with SMTP id smtpd.web12.4452.1641287753399554584 for ; Tue, 04 Jan 2022 01:15:53 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@ibm.com header.s=pp1 header.b=AlFxNxu9; spf=pass (domain: linux.ibm.com, ip: 148.163.156.1, mailfrom: dovmurik@linux.ibm.com) Received: from pps.filterd (m0187473.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 2046sW6V009980; Tue, 4 Jan 2022 09:15:46 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : date : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding : mime-version; s=pp1; bh=KFThdMeMWPZUX2klWuZdPIkb/0xZC4nnh6q+AtwyTIc=; b=AlFxNxu9mt4M/S8PZNPQmhaIZ1ozwX650ssrsa3kv+rS8J52+aavOpNrVtWr+Dt8vNJP RBqY3kLSn4CxCAK1VakmTHGisTjr/bL9psoVRLqzoCG3YMBlOFz0M0k/ZWQmFuP9Mhyg EEHDX+BucjOInr8CK9A3Go95OAFirmLGytXw7h7iRJ4yqURlCEmo5mQcPNvQQRw93OXq jMRNGJtZ0tuAPnk/zQ6znSyxla1hla3MDhdAqVu+oOfEyFVI9jYKVlaw/LC3OIiHl72w VgPx7MZDdZUKRn+u8bElhT1TekZRPgc6TMfHR5Bg6jdliqPiIH89qgJ08PqGrm0WLSgA 9w== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 3dc7j6jdne-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Jan 2022 09:15:46 +0000 Received: from m0187473.ppops.net (m0187473.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 2048uqGP026369; Tue, 4 Jan 2022 09:15:45 GMT Received: from ppma04dal.us.ibm.com (7a.29.35a9.ip4.static.sl-reverse.com [169.53.41.122]) by mx0a-001b2d01.pphosted.com with ESMTP id 3dc7j6jdmu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Jan 2022 09:15:45 +0000 Received: from pps.filterd (ppma04dal.us.ibm.com [127.0.0.1]) by ppma04dal.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 2049CV3t003539; Tue, 4 Jan 2022 09:15:44 GMT Received: from b03cxnp08026.gho.boulder.ibm.com (b03cxnp08026.gho.boulder.ibm.com [9.17.130.18]) by ppma04dal.us.ibm.com with ESMTP id 3daekb0j0a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Jan 2022 09:15:44 +0000 Received: from b03ledav001.gho.boulder.ibm.com (b03ledav001.gho.boulder.ibm.com [9.17.130.232]) by b03cxnp08026.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 2049FhV634144534 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 4 Jan 2022 09:15:43 GMT Received: from b03ledav001.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 0E37E6E064; Tue, 4 Jan 2022 09:15:43 +0000 (GMT) Received: from b03ledav001.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id E67EE6E062; Tue, 4 Jan 2022 09:15:39 +0000 (GMT) Received: from [9.160.161.139] (unknown [9.160.161.139]) by b03ledav001.gho.boulder.ibm.com (Postfix) with ESMTP; Tue, 4 Jan 2022 09:15:39 +0000 (GMT) Message-ID: <2b7d1b94-2c07-b85d-e076-fe089ef50a9f@linux.ibm.com> Date: Tue, 4 Jan 2022 11:15:38 +0200 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.4.1 Subject: Re: [edk2-devel] [PATCH RESEND] OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as reserved To: "Yao, Jiewen" , "devel@edk2.groups.io" Cc: Ard Biesheuvel , "Justen, Jordan L" , Gerd Hoffmann , Brijesh Singh , "Aktas, Erdem" , James Bottomley , "Xu, Min M" , Tom Lendacky , Tobin Feldman-Fitzthum , Dov Murik References: <20220104071640.298819-1-dovmurik@linux.ibm.com> From: "Dov Murik" In-Reply-To: X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: WWi_ApBfhM-L1dm2nIsSpIqc62ekR4Co X-Proofpoint-GUID: JAJq9zaE3umjbq14ntCsXZJrb8TrnQPT X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.790,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-01-04_04,2022-01-04_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 priorityscore=1501 impostorscore=0 phishscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 suspectscore=0 mlxlogscore=999 mlxscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2110150000 definitions=main-2201040060 Content-Language: en-US Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 04/01/2022 11:00, Yao, Jiewen wrote: > Merged: https://github.com/tianocore/edk2/commit/079a58276b98dc97ca363e3bc8b35cc7baa56d76 > Thanks! -Dov >> -----Original Message----- >> From: devel@edk2.groups.io On Behalf Of Dov Murik >> Sent: Tuesday, January 4, 2022 3:17 PM >> To: devel@edk2.groups.io >> Cc: Dov Murik ; Ard Biesheuvel >> ; Justen, Jordan L ; >> Gerd Hoffmann ; Brijesh Singh ; >> Aktas, Erdem ; James Bottomley >> ; Yao, Jiewen ; Xu, Min M >> ; Tom Lendacky ; Tobin >> Feldman-Fitzthum ; Yao, Jiewen >> Subject: [edk2-devel] [PATCH RESEND] OvmfPkg/AmdSev/SecretPei: Mark SEV >> launch secret area as reserved >> >> Mark the SEV launch secret MEMFD area as reserved, which will allow the >> guest OS to use it during the lifetime of the OS, without creating >> copies of the sensitive content. >> >> Cc: Ard Biesheuvel >> Cc: Jordan Justen >> Cc: Gerd Hoffmann >> Cc: Brijesh Singh >> Cc: Erdem Aktas >> Cc: James Bottomley >> Cc: Jiewen Yao >> Cc: Min Xu >> Cc: Tom Lendacky >> Cc: Tobin Feldman-Fitzthum >> Signed-off-by: Dov Murik >> Acked-by: Gerd Hoffmann >> Acked-by: Jiewen Yao >> Reviewed-by: Brijesh Singh >> >> --- >> >> Resending with Acked-by and Reviewed-by tags. >> Please let me know if there's anything else missing. >> Thanks, >> -Dov >> >> --- >> OvmfPkg/AmdSev/SecretPei/SecretPei.c | 2 +- >> 1 file changed, 1 insertion(+), 1 deletion(-) >> >> diff --git a/OvmfPkg/AmdSev/SecretPei/SecretPei.c >> b/OvmfPkg/AmdSev/SecretPei/SecretPei.c >> index db94c26b54d1..6bf1a55dea64 100644 >> --- a/OvmfPkg/AmdSev/SecretPei/SecretPei.c >> +++ b/OvmfPkg/AmdSev/SecretPei/SecretPei.c >> @@ -19,7 +19,7 @@ InitializeSecretPei ( >> BuildMemoryAllocationHob ( >> >> PcdGet32 (PcdSevLaunchSecretBase), >> >> ALIGN_VALUE (PcdGet32 (PcdSevLaunchSecretSize), EFI_PAGE_SIZE), >> >> - EfiBootServicesData >> >> + EfiReservedMemoryType >> >> ); >> >> >> >> return EFI_SUCCESS; >> >> -- >> 2.25.1 >> >> >> >> -=-=-=-=-=-= >> Groups.io Links: You receive all messages sent to this group. >> View/Reply Online (#85273): https://edk2.groups.io/g/devel/message/85273 >> Mute This Topic: https://groups.io/mt/88186113/1772286 >> Group Owner: devel+owner@edk2.groups.io >> Unsubscribe: https://edk2.groups.io/g/devel/unsub [jiewen.yao@intel.com] >> -=-=-=-=-=-= >> >