public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Zeng, Star" <star.zeng@intel.com>
To: Leo Duran <leo.duran@amd.com>,
	"edk2-devel@ml01.01.org" <edk2-devel@ml01.01.org>
Cc: "Fan, Jeff" <jeff.fan@intel.com>, "Zeng, Star" <star.zeng@intel.com>
Subject: Re: [PATCH v4 0/6] Add PCD PcdPteMemoryEncryptionAddressOrMask
Date: Wed, 1 Mar 2017 04:56:39 +0000	[thread overview]
Message-ID: <0C09AFA07DD0434D9E2A0C6AEB0483103B82D409@shsmsx102.ccr.corp.intel.com> (raw)
In-Reply-To: <1488130987-2544-1-git-send-email-leo.duran@amd.com>

The patch series has been pushed at  https://github.com/tianocore/edk2/compare/a9b4ee43d319...241f914975d5.

Thanks,
Star
-----Original Message-----
From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of Leo Duran
Sent: Monday, February 27, 2017 1:43 AM
To: edk2-devel@ml01.01.org
Cc: Leo Duran <leo.duran@amd.com>
Subject: [edk2] [PATCH v4 0/6] Add PCD PcdPteMemoryEncryptionAddressOrMask

This new PCD holds the address mask for page table entries when memory encryption is enabled on AMD processors supporting the Secure Encrypted Virtualization (SEV) feature.

This mask is be applied when creating or modifying page-table entries.
For example, the OvmfPkg would set the PCD when launching SEV-enabled guests.

Changes since v3:
- Break out changes to MdeModulePkg/Core/DxeIplPeim to a separate patch
- Add few cases of applying the mask that were previously missed
- Add PCD support for UefiCpuPkg/PiSmmCpuDxeSmm

Leo Duran (6):
  MdeModulePkg: Add PCD PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Core/DxeIplPeim:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Universal/CapsulePei:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  UefiCpuPkg/Universal/Acpi/S3Resume2Pei:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe:     Add support for
    PCD PcdPteMemoryEncryptionAddressOrMask
  UefiCpuPkg/PiSmmCpuDxeSmm:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask

 MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf            |  5 +-
 MdeModulePkg/Core/DxeIplPeim/Ia32/DxeLoadFunc.c    | 12 +++-
 MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c   | 39 +++++++---
 MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.h   |  5 ++
 MdeModulePkg/MdeModulePkg.dec                      |  8 +++
 .../BootScriptExecutorDxe.inf                      |  2 +
 .../Acpi/BootScriptExecutorDxe/ScriptExecute.c     |  7 ++
 .../Acpi/BootScriptExecutorDxe/ScriptExecute.h     |  5 ++
 .../Acpi/BootScriptExecutorDxe/X64/SetIdtEntry.c   | 15 ++--
 MdeModulePkg/Universal/CapsulePei/CapsulePei.inf   |  2 +
 .../Universal/CapsulePei/Common/CommonHeader.h     |  5 ++
 MdeModulePkg/Universal/CapsulePei/UefiCapsule.c    | 17 +++--
 MdeModulePkg/Universal/CapsulePei/X64/X64Entry.c   | 24 +++++--
 UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c           |  6 +-
 UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c              | 83 +++-------------------
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c         | 14 ++++
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h         |  8 ++-
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf       |  2 +
 UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c | 14 ++--
 UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c             | 16 +++--
 UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c            | 41 ++++++-----
 UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmmProfileArch.c     | 32 +++++----
 UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c  | 17 +++--
 .../Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf   |  2 +
 24 files changed, 224 insertions(+), 157 deletions(-)  mode change 100644 => 100755 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c

--
2.7.4

_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel


      parent reply	other threads:[~2017-03-01  4:56 UTC|newest]

Thread overview: 15+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-02-26 17:43 [PATCH v4 0/6] Add PCD PcdPteMemoryEncryptionAddressOrMask Leo Duran
2017-02-26 17:43 ` [PATCH v4 1/6] MdeModulePkg: " Leo Duran
2017-02-27  2:20   ` Zeng, Star
2017-02-27 14:12     ` Duran, Leo
2017-02-28  0:59       ` Zeng, Star
2017-02-26 17:43 ` [PATCH v4 2/6] MdeModulePkg/Core/DxeIplPeim: Add support for " Leo Duran
2017-02-26 17:43 ` [PATCH v4 3/6] MdeModulePkg/Universal/CapsulePei: " Leo Duran
2017-02-26 17:43 ` [PATCH v4 4/6] UefiCpuPkg/Universal/Acpi/S3Resume2Pei: " Leo Duran
2017-02-28  8:12   ` Fan, Jeff
2017-02-26 17:43 ` [PATCH v4 5/6] MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe: " Leo Duran
2017-02-26 17:43 ` [PATCH v4 6/6] UefiCpuPkg/PiSmmCpuDxeSmm: " Leo Duran
2017-02-27  7:51   ` Fan, Jeff
2017-02-27 14:15     ` Duran, Leo
2017-02-28  8:12   ` Fan, Jeff
2017-03-01  4:56 ` Zeng, Star [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=0C09AFA07DD0434D9E2A0C6AEB0483103B82D409@shsmsx102.ccr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox