From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga02.intel.com (mga02.intel.com [134.134.136.20]) by mx.groups.io with SMTP id smtpd.web10.4561.1671159784756717348 for ; Thu, 15 Dec 2022 19:03:05 -0800 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=YRf/zVxX; spf=pass (domain: intel.com, ip: 134.134.136.20, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1671159784; x=1702695784; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=b3uIK8RLjkKnx/k+e4lnYpCV75LnYjshV1hUg8ycSuI=; b=YRf/zVxX1WEuM3xluAmoEkisvxPIQE1EZqKpx/WCJyKtJLoUxIagZuj1 dDc7coRhmDC7TeWyqu14qYvsds0q9BtXzvPD6VM5VaTC5beruQwoFNpHn jSCySa6CfSy7Drwrh0nbL1iLResOd9f7MICsluygryJJo41HFOgYYDBv3 5Ehxdtgdn6vdgy/uXIdmqQc5cLp3+FGcZMDa62HiDsb0lBzKbVGQec14M fH7GC/LpTjsbrAKIrz3PPq6JTU6m4frzOCc6vNJN4QaGp6TL3YlNNgC2m wzRfIGsZFeuJU4JT01FguV+PSIQnWJ66ODeaDtKmt5BK0DB6vuRBdJGKs g==; X-IronPort-AV: E=McAfee;i="6500,9779,10562"; a="306539677" X-IronPort-AV: E=Sophos;i="5.96,248,1665471600"; d="scan'208";a="306539677" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Dec 2022 19:03:04 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10562"; a="978448203" X-IronPort-AV: E=Sophos;i="5.96,248,1665471600"; d="scan'208";a="978448203" Received: from fmsmsx602.amr.corp.intel.com ([10.18.126.82]) by fmsmga005.fm.intel.com with ESMTP; 15 Dec 2022 19:03:03 -0800 Received: from fmsmsx602.amr.corp.intel.com (10.18.126.82) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16; Thu, 15 Dec 2022 19:03:03 -0800 Received: from FMSEDG603.ED.cps.intel.com (10.1.192.133) by fmsmsx602.amr.corp.intel.com (10.18.126.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.16 via Frontend Transport; Thu, 15 Dec 2022 19:03:03 -0800 Received: from NAM02-DM3-obe.outbound.protection.outlook.com (104.47.56.46) by edgegateway.intel.com (192.55.55.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.16; Thu, 15 Dec 2022 19:03:02 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B1bqAWZ2UTXQFLPB83YPTqe7rKd3XO6IdIl2MKbhJxE+Ok8bqFKnX9pfeHJQ0rfEakKgFjOakGbbEQhqa5o48laz9QVm/s5pIn4Xv42kB1g34CIHOZwwH+Y+ejkNislOYCi2fi3Apoe85kqU1/IMcePIAVITfJAGFr3HUZ+Gj8MDC7SI33xQd5Jti3+xbNjsXLscxObYxFMuGeBDXKexNywb05K3qKHGVBXdqFSWea1uw+bcL2wb7cDB421jlweu3I9EpZZOrW8pTh1YUIARFnXb7loLzLKTqhPk9BjRR+NlTNC4xHPnPLE4K4sPQzl1hiYaxSLonSazKUReubwAYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RTzqdRehmnQHsaT3jIXVMT+cU5Oxp25mofxH1YJ/5V4=; b=VGIMIa5NlPI5nkgMXi4FxhIfLIqDoog6j9eHKTJjcDkwfHuSL3klKs2nmUx65qmKN2eY8HQitg3AmSQvfd/hJ4szJNn6n6nxH7RKsM3nc0LbcvYJJFoKMv9KYuIrgWSawh7JVeqRQ6ciui10WgSWp+F9ZqoOYHQ1oovx6VeYYPu6nMIHaU/KXZUKIa3m/KO85gMsHl+ijSn6ZRgMn6mR4koUGp7Z7r2aareUvrWqZNZ6DhNn1Gyal05ELmW1D5nkgNSXTq/zXOkM9qcK0tmMdRwk9KK9MZlru8H/6dIKZreBuAwxDtEuoQoDU7j4pIZLCNhwwToqS5i2IRBlLSaKJw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by SJ0PR11MB6720.namprd11.prod.outlook.com (2603:10b6:a03:479::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5924.12; Fri, 16 Dec 2022 03:03:01 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::5f56:1bdc:2eae:c041%7]) with mapi id 15.20.5924.012; Fri, 16 Dec 2022 03:03:01 +0000 From: "Yao, Jiewen" To: "Boeuf, Sebastien" , "devel@edk2.groups.io" CC: "Xu, Min M" , "kraxel@redhat.com" Subject: Re: [PATCH v2 0/3] OvmfPkg: Make IntelTdx work with Cloud Hypervisor Thread-Topic: [PATCH v2 0/3] OvmfPkg: Make IntelTdx work with Cloud Hypervisor Thread-Index: AQHZEJdzZ5HYZ31UkkKss/WDvkulJ65v1JLQ Date: Fri, 16 Dec 2022 03:03:00 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|SJ0PR11MB6720:EE_ x-ms-office365-filtering-correlation-id: 906c1040-1833-4d10-0f70-08dadf120ac8 x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230022)(396003)(366004)(39860400002)(346002)(376002)(136003)(451199015)(9686003)(66556008)(26005)(186003)(53546011)(71200400001)(7696005)(6506007)(76116006)(64756008)(66446008)(66476007)(5660300002)(8676002)(52536014)(83380400001)(4326008)(8936002)(33656002)(66946007)(966005)(478600001)(316002)(38070700005)(2906002)(55016003)(86362001)(38100700002)(82960400001)(41300700001)(54906003)(110136005)(122000001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?mO0B/s0uG2PqHvQ9ebGVASmr9H/wORlP/CTXSE0cfnzurlQfvQSPcm5z40Ei?= =?us-ascii?Q?ZCFJBYycVaThzlXXWqDn1cvGbgWVucb8xeApUhUDhxYtKzCa9s+qyWL7aaBr?= =?us-ascii?Q?eOktZhNUoy/MLDFq0wISZUnZixXyN9ypmKHiu633gMQf45mNQllk9+5ULGDU?= =?us-ascii?Q?cyxR/DV7s0DTC4ZM+08yn8NThFaj5PaGTrZIiVYkS6dgkKeAGaAPCLw3I3K/?= =?us-ascii?Q?lSENGYwZOxN1fyebTbdCTHaK1PjphrTzghivV9wKV+szUL8PMMlhP3U/a4E1?= =?us-ascii?Q?Ic89pwrj9jEMsDJLfMJAxg6ju4YyQdlWk71mjwHlp4SjV4fPRpEN1O0SHcHn?= =?us-ascii?Q?vpi7wqQWJmrz4FwKVloelogI6CYzt+lFUtgO6fNeyHa+LKDfp0gAAo5Ci2B+?= =?us-ascii?Q?mlERJng3EssVtajbNVzLNJazobs7AppeAtWdMOs1c6RIXGjrEmsUewlVxbzJ?= =?us-ascii?Q?P6zRdKg7ljiuTeeTjA4h+AzYjHhe6atc3iOSWYb7ZhfGgomLSTwiRFK1iLr1?= =?us-ascii?Q?JUR9T4ZiSgOGAoLLx5xB49lyxfemb02AAbyudQYWeAQOrGFBIv7goVfPTlW+?= =?us-ascii?Q?roKI0O/KpRhOU91xxFZQlOhWr9rcv6+Gh0TiTDEztPqcPHQk4EyqG3XsXbQk?= =?us-ascii?Q?z3c4gsXGAxlACPvOTgh9s76z4JUlhb/oVqTL3xJk8xu+WZgrVxmCD+MQxYQb?= =?us-ascii?Q?By9LRgSOkVRyACT0oj4aPp7rd5TbP+kO/Yxt3CV1OGyE2Lb9wMii6NZvi+qa?= =?us-ascii?Q?G83iiiHSCTNpMUQZeGsUN9RQd9yZH0Gitq4S0biDBmt8oA4YqtLCE6yMoM9H?= =?us-ascii?Q?z2aIZWx6JYsViMKtFerbCdF0MvpYiMDyK0ma+uCmPDSX5WIttWO2NGu+Fx/E?= =?us-ascii?Q?BliFVtBpYZmPFwlStTuwew7UmukC1hz9RXG6bePERSO2KCW20gIogLgmvn69?= =?us-ascii?Q?BwoYWXP7jOAb+ketbKXC0ikZoGyszcHyRC9IdmufBjE6VySi+VfTp6aIwmbL?= =?us-ascii?Q?mFb7keIRxH3rzuPKEUbwNh4gOUFT04X3l1PuN12tk76vrUTP8L9Fa1zYV0YX?= =?us-ascii?Q?gUbiXoFgr80X7iPARKJb55pkmcLiFjU9GPsyngZ4ur8aunkLp8yi09bh2Dc8?= =?us-ascii?Q?AntOOzX+WgsFWJ88Ro7o0K+RyCsDd5s8uh3kzAVTrLGCI2pOkIaEsDVzGN/L?= =?us-ascii?Q?Dfrj8mePPoT4BoAMeMaiNP7XcHAxGz4rSqF7FEtRjXYbMNZ86grWHBLnl/F+?= =?us-ascii?Q?hqXWjsBWh0fx/kqhfvU673WmnRRzRCmQ/bumwK6/0nCNIx8grJPzMdyeWx19?= =?us-ascii?Q?UZgyFQRXDalYeSPNIcwTjRp9biY+VGlQugSzFw2uqgh2kb/8dShgRhg2hIwy?= =?us-ascii?Q?9imEghobVaZh9tMiUZwFmb4PmeZf97fjPMhyQf5h5NOgmijhtqEmhtRFU4MA?= =?us-ascii?Q?yrd7IW5M15xKPTpOIuY6hS0RYe0hWv53sq5tZS71qrPANjkqkabW+uUv/ZMW?= =?us-ascii?Q?SkO3xLU+X6N6yY9DE/1SuYgFAV1fU0XbiXRSGAzfZOR5hSQFNfmpmk3N4Hge?= =?us-ascii?Q?4WHahwLYdU49YNEmNxm2h0EGJFsn1r8jhHU35Set?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 906c1040-1833-4d10-0f70-08dadf120ac8 X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Dec 2022 03:03:00.9322 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: UFTy8o/uT88eNrOHXi11aLAd5yrliZWn2hbtaYXOgkUm8tya85LpZs/7q/xy3fBqdAF1SKwKU7keEQ8I7cEuSA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB6720 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Merged: https://github.com/tianocore/edk2/pull/3778 > -----Original Message----- > From: Boeuf, Sebastien > Sent: Thursday, December 15, 2022 11:10 PM > To: devel@edk2.groups.io > Cc: Yao, Jiewen ; Xu, Min M ; > kraxel@redhat.com; Boeuf, Sebastien > Subject: [PATCH v2 0/3] OvmfPkg: Make IntelTdx work with Cloud Hypervisor >=20 > From: Sebastien Boeuf >=20 > The IntelTdxX64 OVMF target wasn't working with Cloud Hypervisor on TDX > platform. This was due to the way the OVMF code expects Cloud Hypervisor > to rely on PVH to retrieve information like memory below 4GiB as well as > the ACPI tables. >=20 > This is why this series takes care of identifying when running on TDX in > order to handle things differently. For the memory below 4GiB, it falls > back onto the CMOS to retrieve the correct information, and for the ACPI > tables, it relies on the HOB to obtain every table individually before > to expose them to the guest OS. >=20 > With these two use cases properly handled by this series, it is now > possible to use the IntelTdxX64 target to build an OVMF binary that > works both for QEMU and Cloud Hypervisor on a TDX platform. >=20 > Sebastien Boeuf (3): > OvmfPkg/PlatformInitLib: Differentiate TDX case for Cloud Hypervisor > OvmfPkg/PlatformInitLib: Transfer GUID Extension HOB > OvmfPkg/AcpiPlatformDxe: Differentiate TDX case for Cloud Hypervisor >=20 > ArmVirtPkg/ArmVirtQemu.dsc | 1 + > OvmfPkg/AcpiPlatformDxe/AcpiPlatform.c | 8 +- > OvmfPkg/AcpiPlatformDxe/AcpiPlatform.h | 6 ++ > OvmfPkg/AcpiPlatformDxe/AcpiPlatformDxe.inf | 3 + > OvmfPkg/AcpiPlatformDxe/CloudHvAcpi.c | 87 +++++++++++++++++++++ > OvmfPkg/Library/PlatformInitLib/IntelTdx.c | 5 ++ > OvmfPkg/Library/PlatformInitLib/MemDetect.c | 5 +- > OvmfPkg/OvmfPkg.dec | 1 + > 8 files changed, 114 insertions(+), 2 deletions(-) >=20 > -- > 2.34.1