Blame SOURCES/edk2-OvmfPkg-AmdSev-SecretPei-Mark-SEV-launch-secret-area.patch

ea838b
From e4a64ad230ff2906ec56d41b2a8dd7a0bb39a399 Mon Sep 17 00:00:00 2001
ea838b
From: Dov Murik <dovmurik@linux.ibm.com>
ea838b
Date: Tue, 4 Jan 2022 15:16:40 +0800
ea838b
Subject: [PATCH] OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as
ea838b
 reserved
ea838b
ea838b
RH-Author: Pawel Polawski <None>
ea838b
RH-MergeRequest: 11: OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as reserved
ea838b
RH-Commit: [1/1] a14d34eb204387aae3446770a0e5fb95a9283ae3 (elkoniu/edk2)
ea838b
RH-Bugzilla: 2041754
ea838b
RH-Acked-by: Oliver Steffen <None>
ea838b
ea838b
Mark the SEV launch secret MEMFD area as reserved, which will allow the
ea838b
guest OS to use it during the lifetime of the OS, without creating
ea838b
copies of the sensitive content.
ea838b
ea838b
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
ea838b
Cc: Jordan Justen <jordan.l.justen@intel.com>
ea838b
Cc: Gerd Hoffmann <kraxel@redhat.com>
ea838b
Cc: Brijesh Singh <brijesh.singh@amd.com>
ea838b
Cc: Erdem Aktas <erdemaktas@google.com>
ea838b
Cc: James Bottomley <jejb@linux.ibm.com>
ea838b
Cc: Jiewen Yao <jiewen.yao@intel.com>
ea838b
Cc: Min Xu <min.m.xu@intel.com>
ea838b
Cc: Tom Lendacky <thomas.lendacky@amd.com>
ea838b
Cc: Tobin Feldman-Fitzthum <tobin@linux.ibm.com>
ea838b
Signed-off-by: Dov Murik <dovmurik@linux.ibm.com>
ea838b
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
ea838b
Acked-by: Jiewen Yao <Jiewen.Yao@intel.com>
ea838b
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
ea838b
---
ea838b
 OvmfPkg/AmdSev/SecretPei/SecretPei.c | 2 +-
ea838b
 1 file changed, 1 insertion(+), 1 deletion(-)
ea838b
ea838b
diff --git a/OvmfPkg/AmdSev/SecretPei/SecretPei.c b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
ea838b
index db94c26b54..6bf1a55dea 100644
ea838b
--- a/OvmfPkg/AmdSev/SecretPei/SecretPei.c
ea838b
+++ b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
ea838b
@@ -19,7 +19,7 @@ InitializeSecretPei (
ea838b
   BuildMemoryAllocationHob (
ea838b
     PcdGet32 (PcdSevLaunchSecretBase),
ea838b
     ALIGN_VALUE (PcdGet32 (PcdSevLaunchSecretSize), EFI_PAGE_SIZE),
ea838b
-    EfiBootServicesData
ea838b
+    EfiReservedMemoryType
ea838b
     );
ea838b
 
ea838b
   return EFI_SUCCESS;
ea838b
-- 
ea838b
2.27.0
ea838b