Blame SOURCES/edk2-OvmfPkg-AmdSev-SecretPei-Mark-SEV-launch-secret-area.patch

d314f8
From c4096f74a41bde4fc62576222e0c9622152d7701 Mon Sep 17 00:00:00 2001
d314f8
From: Pawel Polawski <ppolawsk@redhat.com>
d314f8
Date: Tue, 4 Jan 2022 15:16:40 +0800
d314f8
Subject: [PATCH 2/2] OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as
d314f8
 reserved
d314f8
d314f8
RH-Author: Pawel Polawski <ppolawsk@redhat.com>
d314f8
RH-MergeRequest: 10: OvmfPkg/AmdSev/SecretPei: Mark SEV launch secret area as reserved
d314f8
RH-Commit: [1/1] a8f099d508e2e7b39697945acaa767c43577b1e6 (elkoniu/edk2)
d314f8
RH-Bugzilla: 2041754
d314f8
RH-Acked-by: Oliver Steffen <osteffen@redhat.com>
d314f8
RH-Acked-by: Gerd Hoffmann <kraxel@redhat.com>
d314f8
d314f8
Mark the SEV launch secret MEMFD area as reserved, which will allow the
d314f8
guest OS to use it during the lifetime of the OS, without creating
d314f8
copies of the sensitive content.
d314f8
d314f8
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
d314f8
Cc: Jordan Justen <jordan.l.justen@intel.com>
d314f8
Cc: Gerd Hoffmann <kraxel@redhat.com>
d314f8
Cc: Brijesh Singh <brijesh.singh@amd.com>
d314f8
Cc: Erdem Aktas <erdemaktas@google.com>
d314f8
Cc: James Bottomley <jejb@linux.ibm.com>
d314f8
Cc: Jiewen Yao <jiewen.yao@intel.com>
d314f8
Cc: Min Xu <min.m.xu@intel.com>
d314f8
Cc: Tom Lendacky <thomas.lendacky@amd.com>
d314f8
Cc: Tobin Feldman-Fitzthum <tobin@linux.ibm.com>
d314f8
Signed-off-by: Dov Murik <dovmurik@linux.ibm.com>
d314f8
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
d314f8
Acked-by: Jiewen Yao <Jiewen.Yao@intel.com>
d314f8
Reviewed-by: Brijesh Singh <brijesh.singh@amd.com>
d314f8
---
d314f8
 OvmfPkg/AmdSev/SecretPei/SecretPei.c | 2 +-
d314f8
 1 file changed, 1 insertion(+), 1 deletion(-)
d314f8
d314f8
diff --git a/OvmfPkg/AmdSev/SecretPei/SecretPei.c b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
d314f8
index db94c26b54..6bf1a55dea 100644
d314f8
--- a/OvmfPkg/AmdSev/SecretPei/SecretPei.c
d314f8
+++ b/OvmfPkg/AmdSev/SecretPei/SecretPei.c
d314f8
@@ -19,7 +19,7 @@ InitializeSecretPei (
d314f8
   BuildMemoryAllocationHob (
d314f8
     PcdGet32 (PcdSevLaunchSecretBase),
d314f8
     ALIGN_VALUE (PcdGet32 (PcdSevLaunchSecretSize), EFI_PAGE_SIZE),
d314f8
-    EfiBootServicesData
d314f8
+    EfiReservedMemoryType
d314f8
     );
d314f8
 
d314f8
   return EFI_SUCCESS;
d314f8
-- 
d314f8
2.27.0
d314f8