From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mx.groups.io with SMTP id smtpd.web11.123896.1671069805067138277 for ; Wed, 14 Dec 2022 18:03:25 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=R8aYnJP1; spf=pass (domain: intel.com, ip: 192.55.52.93, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1671069805; x=1702605805; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=46C3bC9vycfdGOqtvx/IzLJeqJld8glBlt4lsEL2XWc=; b=R8aYnJP1kaMOrRsIu0qQ3KnJb7LYbMTpue/pD10kcazF9WJcEzVlIO16 VZ4/VJcbcQWYX1u4qZaqnunGMLZPzVcIt/LChBtTtDMvLKuGN+LSpoVP5 wOJd3FW8FqItgz7D5loZxblVfYmp4vXhol3BwYJJej3I/WG0+Gx2v+1se 6LJmdNEBvw8LTL5uV6JLKk1sWCVJdpzI/zUW8tA4wOmKT3Q3iWPWnj0x9 BfeBs8boWYs5ZsNcF+/3E7At3SjhVgGm0qJzRMyzOrN9T4SNIFoqIlKOK H6doOt1jl1JZWEtvNuq2TxtLnl3KN0B5gan/fcD8OLs4fvW4tYlNFIZ6s Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10561"; a="316199057" X-IronPort-AV: E=Sophos;i="5.96,246,1665471600"; d="scan'208";a="316199057" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Dec 2022 18:02:51 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10561"; a="642740587" X-IronPort-AV: E=Sophos;i="5.96,246,1665471600"; d="scan'208";a="642740587" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga007.jf.intel.com with ESMTP; 14 Dec 2022 18:02:50 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Wed, 14 Dec 2022 18:02:50 -0800 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Wed, 14 Dec 2022 18:02:50 -0800 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.48) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.16; Wed, 14 Dec 2022 18:02:50 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MZy4N63YytneOsqXYjc6PWdVkMVsc7CZf47O0o1ltCigCP+PRGS1rUFUSxvtiOYf2yD2UQngSb9e16JuNmqcHhnPQnhywQLvj8aHESAEcWyQwilE4KPUhZK0piddvN8eiZUt5FSE6zhLpFvNyafHRRCFbWb34QKvRkGw+O8GO1WSpOCgM7Kr/qCVNev0rQQsU4H024fCf9DaPHoufDMHhHIrby5iZsa1QriTd/Pb01fEDgTcrrX9gxs91QTPdT04l/aiWpnVKn2pLnVVKiLOhViM0NRIZfVEaOOTplB9E5gFemyyPNu5P8Op11gBFns0SeQXaPJMztl+EVRktqb1Eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qVDV3JbQsWAKAgVsNM4dWTWdxODDdtmcOT+5IyxakxA=; b=TPKgPBHht7qN5WiRL3KJBF2t9ZaHKRMcadRI7yELVYFRmzSpbYBU9DSeIdjbsQw+QqM+ovLfwPNmnXJc84ITp5ONHN8YzX68HWREA20FoGrJ/CDHzod+UMZzJDMhfE6J5ZEFr9a8j9gcDPzqlpKIpW0WU6S8FrsPXSaIOtcv0sfYG6cCs0mdhdnbrCdizdtthIcHLWzN/G1MjUloRBo17pUpAZQsBp28AbCYqUXUreI+WCvuj3EebPe0VkzP/UHqqMcdVSOv3rUyaN7mw7AkomdbqYkAl0mrNtYIiHtsZUP4lfftqCFryJRjpXRPNHSE5UyJinIN9UXtX5vvsFdKdA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by CY5PR11MB6344.namprd11.prod.outlook.com (2603:10b6:930:3b::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5924.11; Thu, 15 Dec 2022 02:02:48 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041%9]) with mapi id 15.20.5880.019; Thu, 15 Dec 2022 02:02:48 +0000 From: "Yao, Jiewen" To: "Boeuf, Sebastien" , "devel@edk2.groups.io" CC: "Xu, Min M" , "kraxel@redhat.com" Subject: Re: [PATCH 0/3] OvmfPkg: Make IntelTdx work with Cloud Hypervisor Thread-Topic: [PATCH 0/3] OvmfPkg: Make IntelTdx work with Cloud Hypervisor Thread-Index: AQHZDgisGR7Oa8ZK0EGYPTCgVsrqdq5tk45wgACixXA= Date: Thu, 15 Dec 2022 02:02:48 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|CY5PR11MB6344:EE_ x-ms-office365-filtering-correlation-id: 13cbd2bf-807c-4473-b383-08dade40770c x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: izK3CLmAyC4YSDT0PL435w8MrdsLm3SllRqaHFXJhXBizSEjYL0XoBmY3aQ6RtHhF5G8fUSxqriAFakeSyRdCcZ/uus2k27yzfOebshbw6HEhYXLOuuD2alFklZ7jhtQ4CAwZ3es4MD/ifIXQLPXsaIOtbLr5hBjcW1XU4+vjdK/ECmxsdsBYBNB/RAj5zs/WFud5qIczN8Ynt9+727L4D8GbqBlCd7g5vvfHJIuhvD2x0ZsqUOvLmmYLmUjLWLg7r8seJ7+n85uW30TyWysy7J+eabYxO+17a6ltMnZSk7jh6FhWSKJVjNdribNuMv/i0Ah2qelukNS8Z/VvYaqRUouoBZo3lhbXUtcKTNAB8/HYAU4mTUI2Xv47P0J5+NTLxLEX7POsp9gxd/FpbDMGy+4Wf9ETBTGgnu1YwgfL593XsWza7bnW5yHhT0jt4J3g8vSdgxsQx6Os+oDrnvtv9MBRvA4+dw6bJGNCA/pMnmr7qbUpS2nteiYdS0e5QIm6c63E+8KQa7L5AIXqZT5DYN6eAbsDHRSC4HJX5O8fC2D5GgC9nZLHRBRabpbZWaKnRkve9DLIf+VQTnQfADh7vxAZGFBF9uuhXc5WxmLokIApcNGIBhFMPBZ/2WCq5DBvWXRWntVUd1Xf8y9nymEmrHXaZxPbls2Oug56cyr6/RmRDSROH6YrkTw+Qy1GMLlq/yvEsvolo6efenkWroQ2OGJxhSfGlhck8fvLNtwWmU= x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(376002)(136003)(396003)(39860400002)(366004)(346002)(451199015)(6506007)(7696005)(122000001)(9686003)(53546011)(71200400001)(26005)(2906002)(478600001)(186003)(966005)(54906003)(316002)(38100700002)(66446008)(8676002)(66476007)(4326008)(66946007)(64756008)(76116006)(66556008)(8936002)(52536014)(38070700005)(41300700001)(5660300002)(86362001)(83380400001)(110136005)(82960400001)(33656002)(55016003);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?BDbadTRlhAw8kmw8kZkjzxis/QoYnhLBVWaZh8iCpzLeUx0WjFThQX9ymbCF?= =?us-ascii?Q?bJ2vMThA5RRiiF7Jh4ZYe7gQnG9CRHMQEfurKxpuLbNM7dv394rHpVKFvoef?= =?us-ascii?Q?MEYOEK/vFpDrp6MRzjwf7kuqchZU8oUNjrDQgkib6B+bRg0yFVEiP/alCpHG?= =?us-ascii?Q?mMl2yUfvF/1PTtF9TeFjxC2FCNzbynUYnHa9PFS/qU4pSxFG0/BiQlFi9sNx?= =?us-ascii?Q?LPbQg6fyGSGMOsjFNAllMN/ydVHn2tOQ/5mvZ0P1Cq6Ay6a97NdHUw5kmHON?= =?us-ascii?Q?q1wZtyWePcP4j/HMOiVcSFFmc95NkhuTjs8BMtTBobTZVo9zVkvK83UKzGIS?= =?us-ascii?Q?FAe6p8mSpHIigdOROzgNGN6ZZS+t7aahj0Vu3ergJIC2cpKEmt79PpMbHLVS?= =?us-ascii?Q?itrF1OFtjLLb+jlwUrA/B84sw4gqUwUrdm5oHuYazmcOtnUfxcF9zR0A4fuN?= =?us-ascii?Q?8Yw/eJDDXUmPvRRpph/an7AlxesPUynMOk4Gbg9ZlOM+LimriACP4jihrcrc?= =?us-ascii?Q?rcwSS4to4z5Z2QHn9+9Pm36jGIAVV78xA2VAoj3gVNn1A46Lo1KOvsmKCu3X?= =?us-ascii?Q?/fCkvE4k/3HyeKKwH3N5neN0rvjgrD136VP9lqqwEC6Li8pv5AgWrr9sfxsP?= =?us-ascii?Q?jlUAmLlQLDr9IMwYOBQdnoCtL2SS4jCu5oR7b7vAMFfO7AhD1rLJ6hgTWiy5?= =?us-ascii?Q?lbyZaPaN4uGZOrSKy4BvKw2p/yo6cRA0U4dTvmi4oEyEyuE+QfOL2imzn9C4?= =?us-ascii?Q?qaY8IGl+YjKwR2k13jd7syP1H7lPFd88WH2DqCHPM7Y0vynyAKbYMSVmNbft?= =?us-ascii?Q?SKTIcncGQXS8cVhg2laAxslUeQ8z3pkC2hViOIJ1kj3Do61KRJiUJSdX7OzW?= =?us-ascii?Q?bgZbe4poaSop85TViIqiynBJ1QkCOQ8xu3gONA6T5uvXlq6aYN5gjtCNs6QR?= =?us-ascii?Q?v6122+q+DQdclqaFPgWdkbSGmu4FGJE/SBSmmLqlmdBmadCHZYVnxGTlPhrE?= =?us-ascii?Q?hnn84niohq6e+HdsTAsQprxRSfMFnn1UU5HaZrqIVBC5ReNrkQXzWEdtDuJj?= =?us-ascii?Q?OUfHkVTgChZ1wZXyTX29Eea5Kg8zR9jvu8V2q3G3Qeyx/LML2bMr9GTogWIV?= =?us-ascii?Q?fjv6dgXrRx2IeIUB8vrMBjmKOAxjKoqDf6oABn5AOtd4TV017+j27zMzNKtJ?= =?us-ascii?Q?58xTXm4nYjejBZ0N13nXwlGW+/oBkkFU8vXo+kjez5OU4s+0r4OaQAHc9RoD?= =?us-ascii?Q?8y5vUplN1yLMcuvI/tkOQtBMD/npUY6oUYbrA5TMELPUVoVXCy+B5KqQpK+8?= =?us-ascii?Q?tnqCuyAm5GHL+aBBI+opb3rQ35UgjRflvRYbeurjc2Vs2jJU/dGCXUvhutex?= =?us-ascii?Q?pmhjDkspkQB+5aCqE6o4D+4DOEhO6f/5Mo7vIPaKd3COPrUFpGrvdcV0oyu8?= =?us-ascii?Q?g+ZdrCt6VN2qxuxWZXKmTdx+rK0EV6tqvVoC5VqFIJTYlEB+ZRjaICKwdxiR?= =?us-ascii?Q?j9dGHZgbi6hvxQaEnbaZkgRHkytuQWCXx2X7JX0nbBDSYPzbq3Yx0DMKNt/a?= =?us-ascii?Q?OLXc/pE+pMZdkn8L9Q632vRAbGQEVF+9wGAVWURU?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 13cbd2bf-807c-4473-b383-08dade40770c X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Dec 2022 02:02:48.2628 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: J01jpBswcwBy3umU+0XOmHwr/vAGpg1NrlwTv8xMmt8WGTw6y3BnBUHDlPDNroJ9l6kTMYGxuyb3wkGN1BzFsw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR11MB6344 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Sebastien CI failed, https://github.com/tianocore/edk2/pull/3769 Have you run CI before submission? Please take a look. > -----Original Message----- > From: Yao, Jiewen > Sent: Thursday, December 15, 2022 12:20 AM > To: Boeuf, Sebastien ; devel@edk2.groups.io > Cc: Xu, Min M ; kraxel@redhat.com > Subject: RE: [PATCH 0/3] OvmfPkg: Make IntelTdx work with Cloud > Hypervisor >=20 > Reviewed-by: Jiewen Yao >=20 > > -----Original Message----- > > From: Boeuf, Sebastien > > Sent: Monday, December 12, 2022 5:04 PM > > To: devel@edk2.groups.io > > Cc: Yao, Jiewen ; Xu, Min M > ; > > kraxel@redhat.com; Boeuf, Sebastien > > Subject: [PATCH 0/3] OvmfPkg: Make IntelTdx work with Cloud Hypervisor > > > > From: Sebastien Boeuf > > > > The IntelTdxX64 OVMF target wasn't working with Cloud Hypervisor on TDX > > platform. This was due to the way the OVMF code expects Cloud > Hypervisor > > to rely on PVH to retrieve information like memory below 4GiB as well a= s > > the ACPI tables. > > > > This is why this series takes care of identifying when running on TDX i= n > > order to handle things differently. For the memory below 4GiB, it falls > > back onto the CMOS to retrieve the correct information, and for the ACP= I > > tables, it relies on the HOB to obtain every table individually before > > to expose them to the guest OS. > > > > With these two use cases properly handled by this series, it is now > > possible to use the IntelTdxX64 target to build an OVMF binary that > > works both for QEMU and Cloud Hypervisor on a TDX platform. > > > > Sebastien Boeuf (3): > > OvmfPkg/PlatformInitLib: Differentiate TDX case for Cloud Hypervisor > > OvmfPkg/PlatformInitLib: Transfer GUID Extension HOB > > OvmfPkg/AcpiPlatformDxe: Differentiate TDX case for Cloud Hypervisor > > > > OvmfPkg/AcpiPlatformDxe/AcpiPlatform.c | 8 +- > > OvmfPkg/AcpiPlatformDxe/AcpiPlatform.h | 6 ++ > > OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf | 2 + > > OvmfPkg/AcpiPlatformDxe/CloudHvAcpi.c | 87 > +++++++++++++++++++++ > > OvmfPkg/Library/PlatformInitLib/IntelTdx.c | 5 ++ > > OvmfPkg/Library/PlatformInitLib/MemDetect.c | 4 +- > > OvmfPkg/OvmfPkg.dec | 1 + > > 7 files changed, 111 insertions(+), 2 deletions(-) > > > > -- > > 2.34.1