From nobody Wed Apr 24 22:48:24 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+85273+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+85273+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=linux.ibm.com ARC-Seal: i=1; a=rsa-sha256; t=1641280616; cv=none; d=zohomail.com; s=zohoarc; b=lfX8uGBuw16IOocO8DpKXyMJQF3pWMWB38a5Hz+wLLzzZySa67psNpSZpxHvEMorV9M6/7qijmQTG264IJ08pcpYRmGubfxhOJKtZ8vJDFX6Zj7Sl+jBLs28SRIOg0DVvToxqKumE4Z1JinIQg14wBGuH2jBa58EURFY1s7uLbw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1641280616; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Sender:Subject:To; bh=wr6m0ACZM1cocGPzJbQwgsUyewBEQfdlulJQthajR6A=; b=DA4hOGP7pZyq4Hi5zM7k4mUdFNA13cscZdP0/KFVaqYUX6ifSaZEIS11Q/PsoazffyUxoOogJ0cAfyCFDZKnUfButPAH5bbOVwOpxGNByOFWThYqVEZGaFfhNUH2eDprfx5cZodPxElHh9gnIxGrSTsbxQD/vblDa2isvqcO0uk= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+85273+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1641280616672170.05721270812114; Mon, 3 Jan 2022 23:16:56 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id Lm0EYY1788612x4kaBwW7Wax; Mon, 03 Jan 2022 23:16:56 -0800 X-Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by mx.groups.io with SMTP id smtpd.web11.3700.1641280615303417220 for ; Mon, 03 Jan 2022 23:16:55 -0800 X-Received: from pps.filterd (m0098399.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 2045519r019627; Tue, 4 Jan 2022 07:16:49 GMT X-Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 3dcb2bdr7r-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Jan 2022 07:16:48 +0000 X-Received: from m0098399.ppops.net (m0098399.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 2046gA6f011281; Tue, 4 Jan 2022 07:16:48 GMT X-Received: from ppma01wdc.us.ibm.com (fd.55.37a9.ip4.static.sl-reverse.com [169.55.85.253]) by mx0a-001b2d01.pphosted.com with ESMTP id 3dcb2bdr6y-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Jan 2022 07:16:48 +0000 X-Received: from pps.filterd (ppma01wdc.us.ibm.com [127.0.0.1]) by ppma01wdc.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 2047EjKC022891; Tue, 4 Jan 2022 07:16:45 GMT X-Received: from b01cxnp23034.gho.pok.ibm.com (b01cxnp23034.gho.pok.ibm.com [9.57.198.29]) by ppma01wdc.us.ibm.com with ESMTP id 3daeka5gfe-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 04 Jan 2022 07:16:45 +0000 X-Received: from b01ledav006.gho.pok.ibm.com (b01ledav006.gho.pok.ibm.com [9.57.199.111]) by b01cxnp23034.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 2047GjJZ35324190 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 4 Jan 2022 07:16:45 GMT X-Received: from b01ledav006.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id EC62EAC05E; Tue, 4 Jan 2022 07:16:44 +0000 (GMT) X-Received: from b01ledav006.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id BAEA2AC05B; Tue, 4 Jan 2022 07:16:44 +0000 (GMT) X-Received: from amdrome3.watson.ibm.com (unknown [9.2.130.16]) by b01ledav006.gho.pok.ibm.com (Postfix) with ESMTP; Tue, 4 Jan 2022 07:16:44 +0000 (GMT) From: "Dov Murik" To: devel@edk2.groups.io Cc: Dov Murik , Ard Biesheuvel , Jordan Justen , Gerd Hoffmann , Brijesh Singh , Erdem Aktas , James Bottomley , Jiewen Yao , Min Xu , Tom Lendacky , Tobin Feldman-Fitzthum , Jiewen Yao Subject: [edk2-devel] [PATCH RESEND] OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as reserved Date: Tue, 4 Jan 2022 07:16:40 +0000 Message-Id: <20220104071640.298819-1-dovmurik@linux.ibm.com> MIME-Version: 1.0 X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: 9Nvi2bCRHi1jqpcpg3gJc6w_yaKEOTRz X-Proofpoint-GUID: 4x1RYzka65BAb-tA0xF5i0rfMfCzNxO2 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,dovmurik@linux.ibm.com X-Gm-Message-State: F4UDYr6Cg0yPVCrknupJucPrx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1641280616; bh=TCCSZhNURa7hkvQeyCsbcA/rZC5BLCRtKH5QqQ+kCj8=; h=Cc:Date:From:Reply-To:Subject:To; b=O2Gg7223sjKc9/sZWmXAH/eFeK3lC1Pt8JjmhAj8t3nDGwyCB4l5KEpMEAWhABmXD0T coraD+vg9sIhUHoriGzdmdNpTATzARSLsRw7NDZHmtu918uQ3pxnbo2uW2lK4qqlNFAHp n1JD7/DMHz3V9YAxhVrazbPDeCBQgYXp7R4= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1641280617592100002 Content-Type: text/plain; charset="utf-8" Mark the SEV launch secret MEMFD area as reserved, which will allow the guest OS to use it during the lifetime of the OS, without creating copies of the sensitive content. Cc: Ard Biesheuvel Cc: Jordan Justen Cc: Gerd Hoffmann Cc: Brijesh Singh Cc: Erdem Aktas Cc: James Bottomley Cc: Jiewen Yao Cc: Min Xu Cc: Tom Lendacky Cc: Tobin Feldman-Fitzthum Signed-off-by: Dov Murik Acked-by: Gerd Hoffmann Acked-by: Jiewen Yao Reviewed-by: Brijesh Singh --- Resending with Acked-by and Reviewed-by tags. Please let me know if there's anything else missing. Thanks, -Dov --- OvmfPkg/AmdSev/SecretPei/SecretPei.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/OvmfPkg/AmdSev/SecretPei/SecretPei.c b/OvmfPkg/AmdSev/SecretPe= i/SecretPei.c index db94c26b54d1..6bf1a55dea64 100644 --- a/OvmfPkg/AmdSev/SecretPei/SecretPei.c +++ b/OvmfPkg/AmdSev/SecretPei/SecretPei.c @@ -19,7 +19,7 @@ InitializeSecretPei ( BuildMemoryAllocationHob ( PcdGet32 (PcdSevLaunchSecretBase), ALIGN_VALUE (PcdGet32 (PcdSevLaunchSecretSize), EFI_PAGE_SIZE), - EfiBootServicesData + EfiReservedMemoryType ); =20 return EFI_SUCCESS; --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#85273): https://edk2.groups.io/g/devel/message/85273 Mute This Topic: https://groups.io/mt/88186113/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-