From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (NAM12-MW2-obe.outbound.protection.outlook.com [40.107.244.73]) by mx.groups.io with SMTP id smtpd.web11.5567.1595366656563483483 for ; Tue, 21 Jul 2020 14:24:16 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=jo6191pT; spf=none, err=SPF record not found (domain: amd.com, ip: 40.107.244.73, mailfrom: thomas.lendacky@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eIO2BlX0Zzi3vgBQdoYVDYBnup8sAHo0zMj/buEg5eCipMtvMTrtYBRxm9wSdlpX1r3ZoSckGpNT+5Yhw8pkERrI/RFtwe7HnNgLCayqWiAeq7EjKaRKqwlhxA8A2NUYHkkRgb65Qe0ginQxFrxwMfaTlzjnD11/bqI4bf47Y8fccwMmeYVZiUK1qwDKNYqEDJ/SH3XyFIfCx6TVTLPvq8HiIrqkyCWURkbPqsFutE5Yo/kBEqFIbLIiNtxS4FZzBDyeGevQMAyElCRh19j5HM5ioUlyz9QXW7EgzdMlNgrcaQMrJU/e6KzdQmNGRkKFDnIn1EqHlif4VP2DlA5fkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RmbqkIxYiPPEKoCZtNux7cvM35+H6P1bYXxGk/GrTms=; b=gVwHXxD/PlNz0dN2TCCAW00TYUNeMIrp2u5T0Q2V7Fda9toEIBTBYUwmomUwtrv4YDoeLljwJns1N9kMuubGXiBPFclj9NlFNDmVf6WyCJy3B6Lxoc0nYCq1F2mRCWEsR443nwypoIGymBrdy+v82CqGhGcfquof2yAbR1sUKZ2m7szFVPZqPQZFSeouxq3ZQgVdmnEZah8BMHwLL00Bmjq2o8fCkLiEGLhzLuf+O6E+RoaGInF6IuUnNNqK+enxUyooa/NbcwfUmo/l7EiIjSFjAgc3AaD9gJva2mcSnlW1B5X7w5cOaplMHySms2q9ioRIEymbgGQyeO57UHRxxw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RmbqkIxYiPPEKoCZtNux7cvM35+H6P1bYXxGk/GrTms=; b=jo6191pTCz+WxZLoAIRdGiKTJtGftaCBfxdqzS9pDtKhfYHNAQGecl8Yz3VrIC6CkcuptsYCM3+kLMXromTAHWAoxCxD77YeaGVCb12u6MZd0PqGdIylKg+1KYia3JFLDkiMSiizXEY30CFbXO/6bqMXNmGxrFhcrh34tQpmYj4= Authentication-Results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=amd.com; Received: from CY4PR12MB1352.namprd12.prod.outlook.com (2603:10b6:903:3a::13) by CY4PR12MB1143.namprd12.prod.outlook.com (2603:10b6:903:38::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3195.25; Tue, 21 Jul 2020 21:24:15 +0000 Received: from CY4PR12MB1352.namprd12.prod.outlook.com ([fe80::9181:78bf:bf0:702b]) by CY4PR12MB1352.namprd12.prod.outlook.com ([fe80::9181:78bf:bf0:702b%5]) with mapi id 15.20.3216.020; Tue, 21 Jul 2020 21:24:15 +0000 From: "Lendacky, Thomas" To: devel@edk2.groups.io CC: Brijesh Singh , Ard Biesheuvel , Eric Dong , Jordan Justen , Laszlo Ersek , Liming Gao , Michael D Kinney , Ray Ni Subject: [PATCH v11 33/46] UefiCpuPkg: Create an SEV-ES workarea PCD Date: Tue, 21 Jul 2020 16:19:10 -0500 Message-ID: <5564a9591c935d25e3e41d3862424db48a2409b0.1595366363.git.thomas.lendacky@amd.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: References: X-ClientProxiedBy: SN6PR16CA0043.namprd16.prod.outlook.com (2603:10b6:805:ca::20) To CY4PR12MB1352.namprd12.prod.outlook.com (2603:10b6:903:3a::13) Return-Path: thomas.lendacky@amd.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from tlendack-t1.amd.com (165.204.77.1) by SN6PR16CA0043.namprd16.prod.outlook.com (2603:10b6:805:ca::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3216.20 via Frontend Transport; Tue, 21 Jul 2020 21:24:14 +0000 X-Mailer: git-send-email 2.27.0 X-Originating-IP: [165.204.77.1] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: b33050b5-b97b-478f-4924-08d82dbc6b5d X-MS-TrafficTypeDiagnostic: CY4PR12MB1143: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:4714; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: REf3ZRanKT4JbVMfn+qp33QW4PWwJPZUzDMDJR149NTkjFm/hmjZP0/LX0FLKLPjSKP6GgFUC83Z1HU/qNAY41aB2yr3AKVfCkBAKQSGd8/Rg4h1vTr3kmYUVOX1ADmxMnl5+FUZ7viFybykcSpt1imtvzafuNT6u4ADM2Z9xQc9PXOBiNPHnlZGQ2DEQXP6XCvoUYswNqzHzOu/QOJU91psZnA2F+AnnbQmLKJFdhN9W5Gz6uJYk+BIj21spHFn132w8lFWPpZTlI7N+UXtasKr3UIfQzcOQ+dHCiQbsD8s740reRM7nyILYWROfb6cmLhF5yxd/Yzhc0sMyf6x2SJSM/Cbrbl+z21XY8jeLb3JhYGp0gf6srUNOu3X7zLra0rdP+sa1SF9dkmwXYFVUBMPv1USf7U26Z39SzHRTErJgxrVFMU03wcDAZb3ncBStkf0SYZcA5ilwjVmAzokMw== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CY4PR12MB1352.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(4636009)(396003)(346002)(136003)(39860400002)(376002)(366004)(966005)(6916009)(26005)(6486002)(86362001)(8936002)(2906002)(66946007)(36756003)(8676002)(16526019)(186003)(2616005)(956004)(54906003)(478600001)(4326008)(66556008)(66476007)(7696005)(6666004)(52116002)(5660300002)(83380400001)(316002)(136400200001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: EQfFgTCDwddu0+yqrb3qWk+NSCBBqUlzfUg22c8gdErjruFbvX6GVLtfFAwSq0uojCwLPU+ZjScsM4wBuUkmRjUd+7C31L3D/s2CzIZbKtulsugP0ge3doqHMBByli4DKDhCxOUDhr/bfgiVKi1YiQ0NLWgEHMXijgp5MNMzzZ4MO/iZQS6gd+GOHQTXroVet3RE+YPB7+BnlnCZpBcdd0WbBNEw04vfgio0ufDtQK/PkNP7qv/Sy9F0ldIf4qBtbZwQk0ovSRz7F1Xp8TBu3t0xcmt6KjFhR27JIj3MmCj1EIEcUNutmi6HmxWtf6IiNTHKl6/B7mGn9zqEYq/Vv6OqmFRm1MlQFfAXcWYLt5EvoMnKQcJbgcutDRCUH0IYvynJkWNbKkfcQ7mMaAkhJj6PgSAPmP13KcBc+0AI8SrP8cDQ30mcGJmilh00mUzKbOR18+aYyIaGE38WnmRGb4N5nVKdXLSaW9B3vHVbLUQ= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: b33050b5-b97b-478f-4924-08d82dbc6b5d X-MS-Exchange-CrossTenant-AuthSource: CY4PR12MB1352.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Jul 2020 21:24:15.3211 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: YnZWf9IMiBqDEYKVdZ5E5f2tAZXLYRjRNsk0L+gBE1ev7INRD4ucnQnHpgq6YQ+EWZDTD3AA5BSKziEL3uebcg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1143 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable From: Tom Lendacky BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2198 Create an SEV-ES workarea PCD. This PCD will be used for BSP communication during SEC and for AP startup during PEI and DXE phases, the latter is the reason for creating it in the UefiCpuPkg. Cc: Eric Dong Cc: Ray Ni Cc: Laszlo Ersek Reviewed-by: Eric Dong Signed-off-by: Tom Lendacky --- UefiCpuPkg/UefiCpuPkg.dec | 8 ++++++++ UefiCpuPkg/UefiCpuPkg.uni | 8 ++++++++ 2 files changed, 16 insertions(+) diff --git a/UefiCpuPkg/UefiCpuPkg.dec b/UefiCpuPkg/UefiCpuPkg.dec index cb92f34b6f55..8c614f9b42bd 100644 --- a/UefiCpuPkg/UefiCpuPkg.dec +++ b/UefiCpuPkg/UefiCpuPkg.dec @@ -161,6 +161,14 @@ [PcdsFixedAtBuild] # @Prompt Specify the count of pre allocated SMM MP tokens per chunk. gUefiCpuPkgTokenSpaceGuid.PcdCpuSmmMpTokenCountPerChunk|64|UINT32|0x3000= 2002 =20 + ## Area of memory where the SEV-ES work area block lives. + # @Prompt Configure the SEV-ES work area base + gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase|0x0|UINT32|0x30002005 + + ## Size of teh area of memory where the SEV-ES work area block lives. + # @Prompt Configure the SEV-ES work area base + gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize|0x0|UINT32|0x30002006 + [PcdsFixedAtBuild, PcdsPatchableInModule] ## This value is the CPU Local APIC base address, which aligns the addre= ss on a 4-KByte boundary. # @Prompt Configure base address of CPU Local APIC diff --git a/UefiCpuPkg/UefiCpuPkg.uni b/UefiCpuPkg/UefiCpuPkg.uni index f4a0c72f6293..219c1963bf08 100644 --- a/UefiCpuPkg/UefiCpuPkg.uni +++ b/UefiCpuPkg/UefiCpuPkg.uni @@ -281,3 +281,11 @@ =20 #string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsIsEnabled_PROMPT #language = en-US "Specifies whether SEV-ES is enabled" #string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsIsEnabled_HELP #language = en-US "Set to TRUE when running as an SEV-ES guest, FALSE otherwise." + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaBase_PROMPT #langua= ge en-US "Specify the address of the SEV-ES work area" + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaBase_HELP #langua= ge en-US "Specifies the address of the work area used by an SEV-ES guest." + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaSize_PROMPT #langua= ge en-US "Specify the size of the SEV-ES work area" + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaSize_HELP #langua= ge en-US "Specifies the size of the work area used by an SEV-ES guest." --=20 2.27.0