Blame SOURCES/edk2-OvmfPkg-AmdSev-SecretPei-Mark-SEV-launch-secret-area.patch

4f9acf
From e4a64ad230ff2906ec56d41b2a8dd7a0bb39a399 Mon Sep 17 00:00:00 2001
4f9acf
From: Dov Murik <dovmurik@linux.ibm.com>
4f9acf
Date: Tue, 4 Jan 2022 15:16:40 +0800
4f9acf
Subject: [PATCH] OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as
4f9acf
 reserved
4f9acf
4f9acf
RH-Author: Pawel Polawski <None>
4f9acf
RH-MergeRequest: 11: OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as reserved
4f9acf
RH-Commit: [1/1] a14d34eb204387aae3446770a0e5fb95a9283ae3 (elkoniu/edk2)
4f9acf
RH-Bugzilla: 2041754
4f9acf
RH-Acked-by: Oliver Steffen <None>
4f9acf
4f9acf
Mark the SEV launch secret MEMFD area as reserved, which will allow the
4f9acf
guest OS to use it during the lifetime of the OS, without creating
4f9acf
copies of the sensitive content.
4f9acf
4f9acf
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
4f9acf
Cc: Jordan Justen <jordan.l.justen@intel.com>
4f9acf
Cc: Gerd Hoffmann <kraxel@redhat.com>
4f9acf
Cc: Brijesh Singh <brijesh.singh@amd.com>
4f9acf
Cc: Erdem Aktas <erdemaktas@google.com>
4f9acf
Cc: James Bottomley <jejb@linux.ibm.com>
4f9acf
Cc: Jiewen Yao <jiewen.yao@intel.com>
4f9acf
Cc: Min Xu <min.m.xu@intel.com>
4f9acf
Cc: Tom Lendacky <thomas.lendacky@amd.com>
4f9acf
Cc: Tobin Feldman-Fitzthum <tobin@linux.ibm.com>
4f9acf
Signed-off-by: Dov Murik <dovmurik@linux.ibm.com>
4f9acf
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
4f9acf
Acked-by: Jiewen Yao <Jiewen.Yao@intel.com>
4f9acf
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
4f9acf
---
4f9acf
 OvmfPkg/AmdSev/SecretPei/SecretPei.c | 2 +-
4f9acf
 1 file changed, 1 insertion(+), 1 deletion(-)
4f9acf
4f9acf
diff --git a/OvmfPkg/AmdSev/SecretPei/SecretPei.c b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
4f9acf
index db94c26b54..6bf1a55dea 100644
4f9acf
--- a/OvmfPkg/AmdSev/SecretPei/SecretPei.c
4f9acf
+++ b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
4f9acf
@@ -19,7 +19,7 @@ InitializeSecretPei (
4f9acf
   BuildMemoryAllocationHob (
4f9acf
     PcdGet32 (PcdSevLaunchSecretBase),
4f9acf
     ALIGN_VALUE (PcdGet32 (PcdSevLaunchSecretSize), EFI_PAGE_SIZE),
4f9acf
-    EfiBootServicesData
4f9acf
+    EfiReservedMemoryType
4f9acf
     );
4f9acf
 
4f9acf
   return EFI_SUCCESS;
4f9acf
-- 
4f9acf
2.27.0
4f9acf