Thank you Jiewen.

On 15/12/2022 4:42, Yao, Jiewen wrote:
> Hey
> CI failed - https://github.com/tianocore/edk2/pull/3772
> Have you run CI before submit patch? Please take a look.

I haven't -- last time I contributed to edk2 was a long time ago; I'll
look for the instructions on triggering the CI myself.

I see patch format errors (lines a bit too long) and uncrustify errors
(missing space in variable declaration).  I'll fix these and send
another spin.

-Dov

> 
> Thank you
> Yao, Jiewen
> 
>> -----Original Message-----
>> From: Tom Lendacky <thomas.lenda...@amd.com>
>> Sent: Monday, December 12, 2022 11:01 PM
>> To: Dov Murik <dovmu...@linux.ibm.com>; devel@edk2.groups.io
>> Cc: Tobin Feldman-Fitzthum <to...@ibm.com>; Ard Biesheuvel
>> <ardb+tianoc...@kernel.org>; Aktas, Erdem <erdemak...@google.com>;
>> Gerd Hoffmann <kra...@redhat.com>; James Bottomley
>> <j...@linux.ibm.com>; Yao, Jiewen <jiewen....@intel.com>; Justen, Jordan
>> L <jordan.l.jus...@intel.com>; Michael Roth <michael.r...@amd.com>; Xu,
>> Min M <min.m...@intel.com>; Tobin Feldman-Fitzthum
>> <to...@linux.ibm.com>
>> Subject: Re: [PATCH v2 1/1] OvmfPkg/AmdSev/SecretDxe: Allocate CC secret
>> location as EfiACPIReclaimMemory
>>
>> On 12/12/22 02:08, Dov Murik wrote:
>>> BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4186
>>>
>>> Commit 079a58276b98 ("OvmfPkg/AmdSev/SecretPei: Mark SEV launch
>> secret
>>> area as reserved") marked the launch secret area itself (1 page) as
>>> reserved so the guest OS can use it during the lifetime of the OS.
>>> However, the address and size of the secret area held in the
>>> CONFIDENTIAL_COMPUTING_SECRET_LOCATION struct are declared as
>> STATIC in
>>> OVMF (in AmdSev/SecretDxe); therefore there's no guarantee that it will
>>> not be written over by OS data.
>>>
>>> Fix this by allocating the memory for the
>>> CONFIDENTIAL_COMPUTING_SECRET_LOCATION struct with the
>>> EfiACPIReclaimMemory memory type to ensure the guest OS will not reuse
>>> this memory.
>>>
>>> Fixes: 079a58276b98 ("OvmfPkg/AmdSev/SecretPei: Mark SEV launch
>> secret area as reserved")
>>> Cc: Ard Biesheuvel <ardb+tianoc...@kernel.org>
>>> Cc: Erdem Aktas <erdemak...@google.com>
>>> Cc: Gerd Hoffmann <kra...@redhat.com>
>>> Cc: James Bottomley <j...@linux.ibm.com>
>>> Cc: Jiewen Yao <jiewen....@intel.com>
>>> Cc: Jordan Justen <jordan.l.jus...@intel.com>
>>> Cc: Michael Roth <michael.r...@amd.com>
>>> Cc: Min Xu <min.m...@intel.com>
>>> Cc: Tobin Feldman-Fitzthum <to...@linux.ibm.com>
>>> Cc: Tom Lendacky <thomas.lenda...@amd.com>
>>> Signed-off-by: Dov Murik <dovmu...@linux.ibm.com>
>>
>> Reviewed-by: Tom Lendacky <thomas.lenda...@amd.com>
>>
>>>
>>> ---
>>>
>>> v2 changes:
>>> * Allocate with EfiACPIReclaimMemory memory type (thanks Ard)
>>> ---
>>>   OvmfPkg/AmdSev/SecretDxe/SecretDxe.c | 22 ++++++++++++++------
>>>   1 file changed, 16 insertions(+), 6 deletions(-)
>>>
>>> diff --git a/OvmfPkg/AmdSev/SecretDxe/SecretDxe.c
>> b/OvmfPkg/AmdSev/SecretDxe/SecretDxe.c
>>> index 3d84b2545052..4f65b1ce5ba5 100644
>>> --- a/OvmfPkg/AmdSev/SecretDxe/SecretDxe.c
>>> +++ b/OvmfPkg/AmdSev/SecretDxe/SecretDxe.c
>>> @@ -8,11 +8,6 @@
>>>   #include <Library/UefiBootServicesTableLib.h>
>>>   #include <Guid/ConfidentialComputingSecret.h>
>>>
>>> -STATIC CONFIDENTIAL_COMPUTING_SECRET_LOCATION
>> mSecretDxeTable = {
>>> -  FixedPcdGet32 (PcdSevLaunchSecretBase),
>>> -  FixedPcdGet32 (PcdSevLaunchSecretSize),
>>> -};
>>> -
>>>   EFI_STATUS
>>>   EFIAPI
>>>   InitializeSecretDxe (
>>> @@ -20,8 +15,23 @@ InitializeSecretDxe (
>>>     IN EFI_SYSTEM_TABLE  *SystemTable
>>>     )
>>>   {
>>> +  EFI_STATUS                             Status;
>>> +  CONFIDENTIAL_COMPUTING_SECRET_LOCATION *SecretDxeTable;
>>> +
>>> +  Status = gBS->AllocatePool (
>>> +                  EfiACPIReclaimMemory,
>>> +                  sizeof (CONFIDENTIAL_COMPUTING_SECRET_LOCATION),
>>> +                  (VOID **)&SecretDxeTable
>>> +                  );
>>> +  if (EFI_ERROR (Status)) {
>>> +    return Status;
>>> +  }
>>> +
>>> +  SecretDxeTable->Base = FixedPcdGet32 (PcdSevLaunchSecretBase);
>>> +  SecretDxeTable->Size = FixedPcdGet32 (PcdSevLaunchSecretSize);
>>> +
>>>     return gBS->InstallConfigurationTable (
>>>                   &gConfidentialComputingSecretGuid,
>>> -                &mSecretDxeTable
>>> +                SecretDxeTable
>>>                   );
>>>   }


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#97423): https://edk2.groups.io/g/devel/message/97423
Mute This Topic: https://groups.io/mt/95617121/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to