From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-23.2 required=3.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_CR_TRAILER,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 14593C433B4 for ; Tue, 13 Apr 2021 00:06:07 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id DAE336135C for ; Tue, 13 Apr 2021 00:06:06 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238497AbhDMAGY (ORCPT ); Mon, 12 Apr 2021 20:06:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40344 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237765AbhDMAGX (ORCPT ); Mon, 12 Apr 2021 20:06:23 -0400 Received: from mail-il1-x12a.google.com (mail-il1-x12a.google.com [IPv6:2607:f8b0:4864:20::12a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DC2FEC061756 for ; Mon, 12 Apr 2021 17:06:04 -0700 (PDT) Received: by mail-il1-x12a.google.com with SMTP id c18so12596527iln.7 for ; Mon, 12 Apr 2021 17:06:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oc8KDiOWuwADnzIA25HidDazWPNHccWEXTYmACDczag=; b=G3MmhBQSxPp8hy3RJxE7/AHj5wYLU/wal3dtuc+Hu1ED8dOFUsVkmKd59y17amn7N4 Y3glEJBHd+euhT/qra+SIse7JEnBa1xLscQG0ZDaHDtGLJVczImyM0f/uA4arFYxj/OD wz0xIbIt7a5dn8sojVg6bE5+8ppSTgNF22T3zD6mw1b8dYOrIwZKUjqYuaSAU8wHaqTy d/qpCxTFw9TtC7Ld24iZrIAV5qlZr/4IA8I1KwXkyD2w0zfEiILC3A9DWc83msK5u0ce GEV9F7s4m5NUhXs3N9th7yzL91/vVUQzruX47ztxAYV1eFDQ6iJQR3UEAAUYXVUH2Bff 1X+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oc8KDiOWuwADnzIA25HidDazWPNHccWEXTYmACDczag=; b=LVZt0PH28FvHo+w05Xk0FSV55pPsdoGXy7yvEjm9nOCQdNx3PRO+oEXL0br12WVR4v ceK+C+7bKMSBYmHETMTR39ZQYlw0H1wWJnWlhxDRupW+Fe0jULneWuPRI9yK6QhkdbHb agb/ucd7GW+rfr881JaGIkZ/Cj86rQTOy8H43wNfnoSUgffttgrvwDPrcq3ZQW1kCoVz O1A8YpXifU9Ms5jOhaAec0s5wTbd5wz7HOGoVxJ0IfzbAs62ZHQqhoOHDNk5Gcefcugw FIKVrLx7z2xhgGDF05dcMRvk4c7pNQ53zk/2OZqo79Zpdm/VVTF7rW7IRpUEKQdcfeZr JW2A== X-Gm-Message-State: AOAM531PaVJ8fIqD9MzqcSg5AmaQJzKdJu2ha/FDpv+KX6dytBdXFbCe cwuvOrmZVywCBLBt1WNo9tZvkoRIg3NkNgvYnF9d0w== X-Google-Smtp-Source: ABdhPJwt3lAnilBhiJwW5hW0wvM9UynrbmdkqL8tSyjQF+bL5upsICRlEi6khnogCFg89M5espWn2e0B99MVXdu8Y8E= X-Received: by 2002:a05:6e02:eb4:: with SMTP id u20mr26826705ilj.182.1618272364171; Mon, 12 Apr 2021 17:06:04 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Steve Rutherford Date: Mon, 12 Apr 2021 17:05:28 -0700 Message-ID: Subject: Re: [PATCH v12 11/13] EFI: Introduce the new AMD Memory Encryption GUID. To: Ashish Kalra Cc: Paolo Bonzini , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Joerg Roedel , Borislav Petkov , Tom Lendacky , X86 ML , KVM list , LKML , Sean Christopherson , Venu Busireddy , Brijesh Singh Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On Mon, Apr 12, 2021 at 12:46 PM Ashish Kalra wrote: > > From: Ashish Kalra > > Introduce a new AMD Memory Encryption GUID which is currently > used for defining a new UEFI environment variable which indicates > UEFI/OVMF support for the SEV live migration feature. This variable > is setup when UEFI/OVMF detects host/hypervisor support for SEV > live migration and later this variable is read by the kernel using > EFI runtime services to verify if OVMF supports the live migration > feature. > > Signed-off-by: Ashish Kalra > --- > include/linux/efi.h | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/include/linux/efi.h b/include/linux/efi.h > index 6b5d36babfcc..6f364ace82cb 100644 > --- a/include/linux/efi.h > +++ b/include/linux/efi.h > @@ -362,6 +362,7 @@ void efi_native_runtime_setup(void); > > /* OEM GUIDs */ > #define DELLEMC_EFI_RCI2_TABLE_GUID EFI_GUID(0x2d9f28a2, 0xa886, 0x456a, 0x97, 0xa8, 0xf1, 0x1e, 0xf2, 0x4f, 0xf4, 0x55) > +#define MEM_ENCRYPT_GUID EFI_GUID(0x0cf29b71, 0x9e51, 0x433a, 0xa3, 0xb7, 0x81, 0xf3, 0xab, 0x16, 0xb8, 0x75) > > typedef struct { > efi_guid_t guid; > -- > 2.17.1 > Reviewed-by: Steve Rutherford