audk/OvmfPkg/PlatformPei
Brijesh Singh via groups.io ea3a12d970 OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map
When SEV-SNP is active, the CPUID and Secrets memory range contains the
information that is used during the VM boot. The content need to be persist
across the kexec boot. Mark the memory range as Reserved in the EFI map
so that guest OS or firmware does not use the range as a system RAM.

Cc: Michael Roth <michael.roth@amd.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: Min Xu <min.m.xu@intel.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Erdem Aktas <erdemaktas@google.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
2021-12-09 06:28:10 +00:00
..
AmdSev.c OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map 2021-12-09 06:28:10 +00:00
ClearCache.c OvmfPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
Cmos.c OvmfPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
Cmos.h OvmfPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
FeatureControl.c OvmfPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
Fv.c OvmfPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
MemDetect.c OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map 2021-12-09 06:28:10 +00:00
MemTypeInfo.c OvmfPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
Platform.c OvmfPkg: Apply uncrustify changes 2021-12-07 17:24:28 +00:00
Platform.h OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map 2021-12-09 06:28:10 +00:00
PlatformPei.inf OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map 2021-12-09 06:28:10 +00:00