render / rpms / edk2

Forked from rpms/edk2 2 months ago
Clone

Blame SOURCES/edk2-OvmfPkg-AmdSev-SecretPei-Mark-SEV-launch-secret-area.patch

a1b2f6
From e4a64ad230ff2906ec56d41b2a8dd7a0bb39a399 Mon Sep 17 00:00:00 2001
a1b2f6
From: Dov Murik <dovmurik@linux.ibm.com>
a1b2f6
Date: Tue, 4 Jan 2022 15:16:40 +0800
a1b2f6
Subject: [PATCH] OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as
a1b2f6
 reserved
a1b2f6
a1b2f6
RH-Author: Pawel Polawski <None>
a1b2f6
RH-MergeRequest: 11: OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as reserved
a1b2f6
RH-Commit: [1/1] a14d34eb204387aae3446770a0e5fb95a9283ae3 (elkoniu/edk2)
a1b2f6
RH-Bugzilla: 2041754
a1b2f6
RH-Acked-by: Oliver Steffen <None>
a1b2f6
a1b2f6
Mark the SEV launch secret MEMFD area as reserved, which will allow the
a1b2f6
guest OS to use it during the lifetime of the OS, without creating
a1b2f6
copies of the sensitive content.
a1b2f6
a1b2f6
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
a1b2f6
Cc: Jordan Justen <jordan.l.justen@intel.com>
a1b2f6
Cc: Gerd Hoffmann <kraxel@redhat.com>
a1b2f6
Cc: Brijesh Singh <brijesh.singh@amd.com>
a1b2f6
Cc: Erdem Aktas <erdemaktas@google.com>
a1b2f6
Cc: James Bottomley <jejb@linux.ibm.com>
a1b2f6
Cc: Jiewen Yao <jiewen.yao@intel.com>
a1b2f6
Cc: Min Xu <min.m.xu@intel.com>
a1b2f6
Cc: Tom Lendacky <thomas.lendacky@amd.com>
a1b2f6
Cc: Tobin Feldman-Fitzthum <tobin@linux.ibm.com>
a1b2f6
Signed-off-by: Dov Murik <dovmurik@linux.ibm.com>
a1b2f6
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
a1b2f6
Acked-by: Jiewen Yao <Jiewen.Yao@intel.com>
a1b2f6
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
a1b2f6
---
a1b2f6
 OvmfPkg/AmdSev/SecretPei/SecretPei.c | 2 +-
a1b2f6
 1 file changed, 1 insertion(+), 1 deletion(-)
a1b2f6
a1b2f6
diff --git a/OvmfPkg/AmdSev/SecretPei/SecretPei.c b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
a1b2f6
index db94c26b54..6bf1a55dea 100644
a1b2f6
--- a/OvmfPkg/AmdSev/SecretPei/SecretPei.c
a1b2f6
+++ b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
a1b2f6
@@ -19,7 +19,7 @@ InitializeSecretPei (
a1b2f6
   BuildMemoryAllocationHob (
a1b2f6
     PcdGet32 (PcdSevLaunchSecretBase),
a1b2f6
     ALIGN_VALUE (PcdGet32 (PcdSevLaunchSecretSize), EFI_PAGE_SIZE),
a1b2f6
-    EfiBootServicesData
a1b2f6
+    EfiReservedMemoryType
a1b2f6
     );
a1b2f6
 
a1b2f6
   return EFI_SUCCESS;
a1b2f6
-- 
a1b2f6
2.27.0
a1b2f6