From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web10.9950.1648887622087298912 for ; Sat, 02 Apr 2022 01:20:23 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=jWqANC6n; spf=pass (domain: intel.com, ip: 192.55.52.43, mailfrom: jiewen.yao@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1648887622; x=1680423622; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=NHdruLrJYvooaP74I6dqRQf+LS29AmsaZwMld2SLNdY=; b=jWqANC6nprXRCJh1JauMAxvBidTGxgebc+4OmIPtuv6L7ABz90Bm519J kA7WALF7QHEB9jLlsTb3hOh/Y93KpLpRZnVRogjShQY2l2pVNznl83uXy 9a1kjIHNOw3CoUA5BN5NMdvNUm//lD4WzM8kMkMVe1aE25TFANcDquqwk prb46FFbgxVdzjvbPDbKwFUZ67MjoiUqcmaot8c1gz3pJIUl5Fipy/8XW 7CJrMc7lKTNoq55bJcY1+CUvEmMIHbnwAlzePJEk2d1XRhTgolkhE7APK tJX8htbVBq7ewP8NE7ADk2M4OKCXkZ1Rlp1hk+XMXOqAZoL8HSIp9rbuf Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10304"; a="346725960" X-IronPort-AV: E=Sophos;i="5.90,229,1643702400"; d="scan'208";a="346725960" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2022 01:20:21 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,229,1643702400"; d="scan'208";a="548091431" Received: from orsmsx606.amr.corp.intel.com ([10.22.229.19]) by orsmga007.jf.intel.com with ESMTP; 02 Apr 2022 01:20:21 -0700 Received: from orsmsx609.amr.corp.intel.com (10.22.229.22) by ORSMSX606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Sat, 2 Apr 2022 01:20:20 -0700 Received: from orsmsx603.amr.corp.intel.com (10.22.229.16) by ORSMSX609.amr.corp.intel.com (10.22.229.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Sat, 2 Apr 2022 01:20:20 -0700 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27 via Frontend Transport; Sat, 2 Apr 2022 01:20:20 -0700 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.27; Sat, 2 Apr 2022 01:20:20 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Wcrko4QHz1a5cmB31SxVWJYccba9m3TokQZPtdswkzURV9CT6OYHD91tpRp4pO0on1YmWLdZIStdaJ3ERNOX2IM20maN4qclOh6D1YoGMGGLCAa6vKGzEMV9kQaOLNqN4JC2H4hai0e2RerDFtS9A58zP/ZK3g3fOtdiD4PqCf4RdtO44pgmGrRiFTdrLjevoGpL+bTm93O3G19+Tzfkln2TSqdpG9v1LMYLoUnQurc7/wUwKyab5psT9uZYfZWN1EqjnGq/e/KjwCLiDjiTC8Itgy/NNqgGjrfVb94JEGVzAJvaKOLPVANbRfNL4BA8lTNkfzR6BmKzF+D1KRbibQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bPZ8aYAGC1dgJ2+g4xqaKBrtz0vR6iZYyIBJOHr1RY8=; b=IwxlPPdtGgZGgzaDCAooflEWncwbbbpm9o6sVD/hnlOSb5cgjUam887Vwzfs8t02jUP/+wqt01bX8Q87DTkqwLfq4twGfrFcnyoAlRLBpI2PqlWRccBXEvE8W0vba6Q+fWoe2YkF5PEtftSaCPOBd0kis9leGzw3fMRwLSJ2B1wU6JtwWAYlJx2gPJysjQh/Y9U2uE2kdz+id40+PnFAXYnm29xxGCDuLHFh4MaZgaHUWjwyM6VK2F2xRlQU7hSjlJgXu3xI+CUi3tU71ZzkuoNkEsS0ZMlZaaxOlqcQCSpOhrY8HBtr4Cbu0zKYMl0atZv2woa9lOX1KkP2YKdcwg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by BN6PR11MB1474.namprd11.prod.outlook.com (2603:10b6:405:c::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.30; Sat, 2 Apr 2022 08:20:17 +0000 Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::e188:d844:25ed:e390]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::e188:d844:25ed:e390%4]) with mapi id 15.20.5123.030; Sat, 2 Apr 2022 08:20:17 +0000 From: "Yao, Jiewen" To: "Xu, Min M" , "devel@edk2.groups.io" CC: "Kinney, Michael D" , Brijesh Singh , "Aktas, Erdem" , "James Bottomley" , Tom Lendacky , "Gerd Hoffmann" , Leif Lindholm , "Ard Biesheuvel" , "Chang, Abner" , "Schaefer, Daniel" , "Ni, Ray" Subject: Re: [PATCH V5 00/10] Introduce TDVF Config-B (basic) in OvmfPkg Thread-Topic: [PATCH V5 00/10] Introduce TDVF Config-B (basic) in OvmfPkg Thread-Index: AQHYNnMXkmXNkbF3J0GyvGQCbVabwKzcZ/WQ Date: Sat, 2 Apr 2022 08:20:17 +0000 Message-ID: References: <20220313004111.388-1-min.m.xu@intel.com> In-Reply-To: <20220313004111.388-1-min.m.xu@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.6.401.20 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 4abddf4e-9365-4421-2130-08da14819ee3 x-ms-traffictypediagnostic: BN6PR11MB1474:EE_ x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR11MB5872.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(366004)(82960400001)(52536014)(86362001)(508600001)(7416002)(8936002)(38070700005)(7696005)(6506007)(53546011)(107886003)(83380400001)(33656002)(9686003)(26005)(186003)(110136005)(55016003)(2906002)(38100700002)(966005)(5660300002)(66446008)(64756008)(8676002)(4326008)(71200400001)(66556008)(54906003)(76116006)(316002)(19627235002)(66946007)(66476007)(122000001)(156123004);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?xKIG8EhyXas6/CP/2BepOksb1YjINXNxUsP4P8Ii45HJt1i74He2FnXKF2m1?= =?us-ascii?Q?GGM2ep7VpmCM97657ygNNqQ9ksLQcjfNA1P2KOiU60ByD2vRZhIK7rtD7PIP?= =?us-ascii?Q?LRWUQdiIsnF5a+y6yLThbKkXWzSD53o1UpNtxQcVOsBfLCIePpdIpyRZTgdS?= =?us-ascii?Q?tB2ZpskW/Zlhkc0UE1yWgi6u7+XHpEqtHnkd+s3TduQhHNX65NEnnam13wej?= =?us-ascii?Q?jDwVtacaLOPxRfZIiG3UfYhAy07tPn6EmdVUz9kP+iMwFsrcgGksdW0KcDI+?= =?us-ascii?Q?+Ip9s1Kaj8gjl2x0HsWNmFmxwMN0e7TOgpw07neAYj6v1Z6K4t0EmM1UHC08?= =?us-ascii?Q?pdCnmav9IH5hcGKYjKlr/S20CaslK2XM2uoqc60VDTasejQNAyudTwKAiTXO?= =?us-ascii?Q?A8Eg6GNVNVroDef5l5muZpyc73Mix/IyePsO4roJC363Ko4nLICirQmpD/u2?= =?us-ascii?Q?nhgPcxQ1v8tkQjJQkoO7bPPFLMMb0AVrHJFZS/byIgpkz3LY7B2+3ReiEy/w?= =?us-ascii?Q?4TdISPzUE35VumB6OGPWx0gOVJLtsaHfrbQF+Q5dOq2xA/ebC4WCiY7TUhij?= =?us-ascii?Q?NfMTNk4YBAbhbaVG/RyyuCeXVzWXRqUjXKLYTnd5LYiutCTSy3fH9+M1gJDv?= =?us-ascii?Q?ErEZTGJ/EEtNZuA+JEnAaHnVoRKZzsKQd/kbsB9FH94Ge4W8MTu0ryngwOcu?= =?us-ascii?Q?/mz7lt3X8g6dwjtL8zkNy6Am8fg8mDwwDSEaoA8f0ptfWIbQR5avJD7xVQUE?= =?us-ascii?Q?uEpl1Ovj1LTaOZegY3RbSfsyz9XdZMOM+aES3OqcdXaTW9NS12y6A1zltnyt?= =?us-ascii?Q?x6NeHf6O7+KaVJ56lEEpCdXwRwaeYuHv8CtuOMqiy49IbvTV6E7CWgicNbi0?= =?us-ascii?Q?4i11RDrYO7oXGaOfLEY+TCc//OSVJl/DA73x4n0lq3eYmeXGLJeY0i3y41rc?= =?us-ascii?Q?4fkPlTeaA7lj1uLXka+/o9KDZVbmZibRWhTbbmwDSzSOHe3bl2XoyWTVAYjO?= =?us-ascii?Q?ZbDJioLQ+SxE/M+dLHGZ62bMFpPvAkC09Kr9keczh0S4/+Oab2+eyq1y9sPT?= =?us-ascii?Q?DR3RZDmIlCv1uonmhyjQjQPHxYXjOOeoQLZ9hpI+HGvwwn2G0UoHFVVnf+zt?= =?us-ascii?Q?E8xqcd6qk6FNND9/fVqCUnsrrx2AlwPvcWBesxJXMJ/RqOo6y2+CmbdyiNvP?= =?us-ascii?Q?8tS4ukGhyOs8nh7s7GXnBm82xBvE9Q4l0b9jVuP8L+JBSlXN3YW6OYSE9LZQ?= =?us-ascii?Q?+4vVOtpPfsmWoTdoMQLS5ZasQ/OqoJMFBuWlubo7wrvQQt511g32IeCxc7mt?= =?us-ascii?Q?Xuw/3ZKX03H4kJmlAVGNInbpDDlsYfObUOQo6X09rMYMBloXekV3k7xEfNhG?= =?us-ascii?Q?QBhuX754ibmL0Q3S6iz/Mg9VSov/RfaCkYakcItT0f33m2rwLuGEE94EqWmH?= =?us-ascii?Q?KFOoVSikjov29bnKd06vfAj0dNE/qJ13LIOLsDPzsRz/AcbBRBYazXU8U6wP?= =?us-ascii?Q?boCPhmHWPvGspBU17OxxYqDUqWR8z9yXAz2Fwhv4cME1k4QJ/1xPu5MLo1a9?= =?us-ascii?Q?/iIqsP8xCxXlJFKwrQ23H2rxkY8IQ9ANfdQ02ib3XQou8tQ7U9SFvydWwnuZ?= =?us-ascii?Q?t6ErcFAyKjSh6YSiCzlqqihtjGmt1cI0gYsMUJQ3CPJY+OlLve3ihhyMaNRB?= =?us-ascii?Q?8MZMuyAbRBM3EkkzMY4rf42dG61KR6Ec3fpCA8Wzif/lOacPGcl7eszlfa5F?= =?us-ascii?Q?tin64W0JYg=3D=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4abddf4e-9365-4421-2130-08da14819ee3 X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Apr 2022 08:20:17.4431 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 0lp50AZ4PZY+b6OfQFMW0xqW6T4lws7JIvJ7/7hioHBYP70IZL4HMwg1xUfwtOiI4pEJ2DyFIoTh5ym5KXzJCg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB1474 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Series: reviewed-by: Jiewen Yao > -----Original Message----- > From: Xu, Min M > Sent: Sunday, March 13, 2022 8:41 AM > To: devel@edk2.groups.io > Cc: Xu, Min M ; Kinney, Michael D > ; Brijesh Singh ; Akta= s, > Erdem ; James Bottomley ; > Yao, Jiewen ; Tom Lendacky > ; Gerd Hoffmann ; Leif > Lindholm ; Ard Biesheuvel ; > Chang, Abner ; Schaefer, Daniel > ; Ni, Ray > Subject: [PATCH V5 00/10] Introduce TDVF Config-B (basic) in OvmfPkg >=20 > RFC: https://bugzilla.tianocore.org/show_bug.cgi?id=3D3429 >=20 > Intel's Trust Domain Extensions (Intel TDX) refers to an Intel technology > that extends Virtual Machines Extensions (VMX) and Multi-Key Total Memory > Encryption (MKTME) with a new kind of virutal machines guest called a > Trust Domain (TD). A TD is desinged to run in a CPU mode that protects th= e > confidentiality of TD memory contents and the TD's CPU state from other > software, including the hosting Virtual-Machine Monitor (VMM), unless > explicitly shared by the TD itself. >=20 > There are 2 configurations for TDVF to upstream. See below link for > the definitions of the 2 configurations. > https://edk2.groups.io/g/devel/message/76367 >=20 > This patch-set is to enable the basic feature of Config-B in OvmfPkg. > - Add a standalone IntelTdxX64.dsc to a TDX specific directory for a > *full* feature TDVF. (Align with existing SEV) > - IntelTdxX64.dsc includes TDX/normal OVMF basic boot capability. The > final binary can run on TDX/normal OVMF. > - PEI phase is skipped. >=20 > By design in Config-B there should be more advanced features, such as: > - RTMR based measurement and measure boot. > - Remove unnecessary drivers to reduce attack surface, such as > network stack. >=20 > To make the code review more efficiency, Config-B is split into 2 waves: > - Basic feature of Config-B > - Advanced feature of Config-B > This patch-set is for *Basic feature of Config-B*. >=20 > Code at: https://github.com/mxu9/edk2/tree/tdvf_wave3.v5 >=20 > Please be noted: > This patch-set is based on tdvf_wave2.v8 which is at: > https://github.com/mxu9/edk2/tree/tdvf_wave2.v8 >=20 > v5 changes: > - Move PeilessStartupLib to OvmfPkg/Library. > - Split the changes of IncompatiblePciDeviceSupportDxe to 2 patch. > Please see Patch 7 & 8. >=20 > v4 changes: > - Rename TdxStartupLib to PeilessStartupLib. > - Check HostBridgeDevId from PlatformInfoHob in DxeAcpiTimerLib. > - Add 2 more patches (#8 #9) to ignore PCI OptionRom in Td guest. >=20 > v3 changes: > - Drop the PcdTdxWorkAreaBase introduced in v2. Instead PcdSevEsWorkArea > is used to point to the TDX WorkArea. PcdSevEsWorkArea will be renamed > to PcdCcWorkAreaBase in the future. > - In v2 TdHob is processed in OvmfPkg/IntelTdx/Sec/IntelTdx.c. Since > the codes have been moved to PlatformInitLib, IntelTdx.c is deleted. > - Add comments in DxeAcpiTimerLib to explain why both > PcdOvmfHostBridgePciDevId and EFI_HOB_PLATFORM_INFO are checked to > read HostBridgeDevId. >=20 > v2 changes: > - In v1 PEI phase is skipped during boot process. But the code is still > in the image. It is not a good way. So in v2 the code of PEI is > removed as well. > - In v1 PrePiLib in EmbeddedPkg are updated to meet the requirement of > TDVF-Config-B. This is because PrePiLib in EmbeddedPkg is designed for > the situation of PEI-less boot. So after PEI is removed, this change > is not needed anymore. > - In v1 only Tdx guest can be brought up. Now v2 brings up both Legacy > guest and Tdx guest. > - Platform initialization in TdxStartup is refactored with the > PlatformInitLib. > - OvmfPkg/IntelTdx/Sec is introduced. It is a simplied version of > OvmfPkg/Sec. >=20 > Cc: Michael D Kinney > Cc: Brijesh Singh > Cc: Erdem Aktas > Cc: James Bottomley > Cc: Jiewen Yao > Cc: Tom Lendacky > Cc: Gerd Hoffmann > Cc: Leif Lindholm > Cc: Ard Biesheuvel > Cc: Abner Chang > Cc: Daniel Schaefer > Cc: Ray Ni > Signed-off-by: Min Xu >=20 > Min Xu (10): > OvmfPkg: Add TdxWorkArea definition > OvmfPkg: Add PrePiHobListPointerLibTdx > OvmfPkg: Add PeilessStartupLib > OvmfPkg/IntelTdx: Add Sec to bring up both Legacy and Tdx guest > OvmfPkg: Update TdxDxe to set TDX PCDs > OvmfPkg: Update DxeAcpiTimerLib to read HostBridgeDevId in > PlatformInfoHob > OvmfPkg/IncompatiblePciDeviceSupportDxe: Refine the configuration > OvmfPkg/IncompatiblePciDeviceSupportDxe: Ignore OptionRom in Td guest > MdeModulePkg: Update PciEnumeratorSupport to ignore OptionRom if > needed > OvmfPkg: Introduce IntelTdxX64 for TDVF Config-B >=20 > .../Bus/Pci/PciBusDxe/PciEnumeratorSupport.c | 23 +- > .../Bus/Pci/PciBusDxe/PciEnumeratorSupport.h | 4 +- > OvmfPkg/Include/Library/PeilessStartupLib.h | 34 + > OvmfPkg/Include/WorkArea.h | 15 + > .../IncompatiblePciDeviceSupport.c | 108 +- > OvmfPkg/IntelTdx/IntelTdxX64.dsc | 721 ++++++++++++++ > OvmfPkg/IntelTdx/IntelTdxX64.fdf | 401 ++++++++ > .../PrePiHobListPointer.c | 57 ++ > .../PrePiHobListPointerLibTdx.inf | 29 + > OvmfPkg/IntelTdx/Sec/SecMain.c | 198 ++++ > OvmfPkg/IntelTdx/Sec/SecMain.inf | 61 ++ > OvmfPkg/IntelTdx/Sec/X64/SecEntry.nasm | 151 +++ > .../Library/AcpiTimerLib/DxeAcpiTimerLib.c | 25 +- > .../Library/AcpiTimerLib/DxeAcpiTimerLib.inf | 7 +- > OvmfPkg/Library/PeilessStartupLib/DxeLoad.c | 218 ++++ > OvmfPkg/Library/PeilessStartupLib/Hob.c | 135 +++ > .../PeilessStartupLib/PeilessStartup.c | 223 +++++ > .../PeilessStartupInternal.h | 55 ++ > .../PeilessStartupLib/PeilessStartupLib.inf | 86 ++ > .../PeilessStartupLib/X64/PageTables.h | 206 ++++ > .../PeilessStartupLib/X64/VirtualMemory.c | 935 ++++++++++++++++++ > OvmfPkg/OvmfPkg.dec | 4 + > OvmfPkg/TdxDxe/TdxDxe.c | 66 +- > OvmfPkg/TdxDxe/TdxDxe.inf | 4 + > 24 files changed, 3724 insertions(+), 42 deletions(-) > create mode 100644 OvmfPkg/Include/Library/PeilessStartupLib.h > create mode 100644 OvmfPkg/IntelTdx/IntelTdxX64.dsc > create mode 100644 OvmfPkg/IntelTdx/IntelTdxX64.fdf > create mode 100644 > OvmfPkg/IntelTdx/PrePiHobListPointerLibTdx/PrePiHobListPointer.c > create mode 100644 > OvmfPkg/IntelTdx/PrePiHobListPointerLibTdx/PrePiHobListPointerLibTdx.inf > create mode 100644 OvmfPkg/IntelTdx/Sec/SecMain.c > create mode 100644 OvmfPkg/IntelTdx/Sec/SecMain.inf > create mode 100644 OvmfPkg/IntelTdx/Sec/X64/SecEntry.nasm > create mode 100644 OvmfPkg/Library/PeilessStartupLib/DxeLoad.c > create mode 100644 OvmfPkg/Library/PeilessStartupLib/Hob.c > create mode 100644 OvmfPkg/Library/PeilessStartupLib/PeilessStartup.c > create mode 100644 > OvmfPkg/Library/PeilessStartupLib/PeilessStartupInternal.h > create mode 100644 OvmfPkg/Library/PeilessStartupLib/PeilessStartupLib.i= nf > create mode 100644 OvmfPkg/Library/PeilessStartupLib/X64/PageTables.h > create mode 100644 OvmfPkg/Library/PeilessStartupLib/X64/VirtualMemory.c >=20 > -- > 2.29.2.windows.2