From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 2C24A20958BD7 for ; Tue, 5 Sep 2017 23:37:10 -0700 (PDT) Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 05 Sep 2017 23:39:59 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.41,483,1498546800"; d="scan'208";a="1215292569" Received: from jyao1-mobl.ccr.corp.intel.com ([10.239.196.53]) by fmsmga002.fm.intel.com with ESMTP; 05 Sep 2017 23:39:58 -0700 From: Jiewen Yao To: edk2-devel@lists.01.org Date: Wed, 6 Sep 2017 14:39:41 +0800 Message-Id: <1504679983-15536-1-git-send-email-jiewen.yao@intel.com> X-Mailer: git-send-email 2.7.4.windows.1 Subject: [PATCH 0/2] Add VTd policy PCD X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 Sep 2017 06:37:10 -0000 Add PcdVTdPolicyPropertyMask BIT0: This is to control if a platform wants to enable VTd based protection during boot. BIT1: This is to control if a platform wants to keep VTd enabled at ExitBootService. The default configuration is BIT0:1, BIT1:0. Jiewen Yao (2): IntelSiliconPkg/dec: Add VTd policy PCD IntelSiliconPkg/IntelVtd: Consume VTd policy PCD IntelSiliconPkg/IntelSiliconPkg.dec | 6 ++++++ IntelSiliconPkg/IntelVTdDxe/DmaProtection.c | 7 +++++-- IntelSiliconPkg/IntelVTdDxe/IntelVTdDxe.c | 4 ++++ IntelSiliconPkg/IntelVTdDxe/IntelVTdDxe.inf | 3 +++ 4 files changed, 18 insertions(+), 2 deletions(-) -- 2.7.4.windows.1