From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: intel.com, ip: 134.134.136.24, mailfrom: ray.ni@intel.com) Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by groups.io with SMTP; Fri, 26 Jul 2019 20:29:29 -0700 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Jul 2019 20:29:29 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,313,1559545200"; d="scan'208";a="194505168" Received: from ray-dev.ccr.corp.intel.com ([10.239.9.16]) by fmsmga004.fm.intel.com with ESMTP; 26 Jul 2019 20:29:28 -0700 From: "Ni, Ray" To: devel@edk2.groups.io Subject: [PATCH 0/3] Allow SMM access-out when static paging is OFF Date: Sat, 27 Jul 2019 11:28:47 +0800 Message-Id: <20190727032850.337840-1-ray.ni@intel.com> X-Mailer: git-send-email 2.21.0.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit The patch set refines the original CR2 save/restore logic by adding a new internal function IsStaticPageTableEnabled() because now there are two use cases that need to conditionally do something based on whether static page table is enabled. Based on the refine, the patch changes the policy to allow SMM access out when static paging is OFF. Ray Ni (3): UefiCpuPkg/PiSmmCpu: Add Internal function IsStaticPageTableEnabled UefiCpuPkg/PiSmmCpu: Refine CR2 save/restore logic UefiCpuPkg/PiSmmCpu: Allow SMM access-out when static paging is OFF UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c | 41 ++++++++------------ UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c | 8 +++- UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c | 21 +++++++--- UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h | 27 +++++-------- UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c | 45 ++++++++-------------- 5 files changed, 63 insertions(+), 79 deletions(-) -- 2.21.0.windows.1