From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by mx.groups.io with SMTP id smtpd.web10.4576.1608350288077310535 for ; Fri, 18 Dec 2020 19:58:08 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=CDqo4iMY; spf=pass (domain: intel.com, ip: 192.55.52.115, mailfrom: jiewen.yao@intel.com) IronPort-SDR: sc0lY/8VJPVVeG7tJxV5+krQOeSEq5ozsCZ96lUJnLBXtqYo1E9yRBMnLRJeFyImi8tajtlM+b KR5mhOUaejUQ== X-IronPort-AV: E=McAfee;i="6000,8403,9839"; a="174774598" X-IronPort-AV: E=Sophos;i="5.78,432,1599548400"; d="scan'208";a="174774598" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Dec 2020 19:58:06 -0800 IronPort-SDR: RLhtN/WRv2m0AFoN/7tkubXwr/P+VTvWHrv8oPm/P7UGygSUZKPdAz1IcN/+u6Lu79kkA/JMUz u6hr/pQUUQSA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.78,432,1599548400"; d="scan'208";a="370986462" Received: from orsmsx604.amr.corp.intel.com ([10.22.229.17]) by orsmga008.jf.intel.com with ESMTP; 18 Dec 2020 19:58:06 -0800 Received: from orsmsx612.amr.corp.intel.com (10.22.229.25) by ORSMSX604.amr.corp.intel.com (10.22.229.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 18 Dec 2020 19:58:05 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX612.amr.corp.intel.com (10.22.229.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Fri, 18 Dec 2020 19:58:05 -0800 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Frontend Transport; Fri, 18 Dec 2020 19:58:05 -0800 Received: from NAM04-BN8-obe.outbound.protection.outlook.com (104.47.74.40) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Fri, 18 Dec 2020 19:58:05 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DLD5oSqn1f7xikmznrWuJxjUqNyADuTm0GDSTaVZqlSJk6RoKHylCvVtyAwbaltBDmofPz7kdJZiC9F+tETQapzxif4O+rs/5AeVLkmoT5Z3tJ4Y7Lj9A8mg2BVLYbW73LXGPRO6v94zrSFC4EavbDILkuWXlCjQVvU/d4ipAiAIVIsdffZ0wCplTWPpkD2xtKBb8pVXKYdQPdlVuQlmmnmMK06F63WhOlOAPlfu/mRuPVnTMgSqnf2NTrkACghaBBFsdLCRj9sWuhWvwHDuOXWn/8VElpKyzcq4fLokbnvbeZltVNM5OC57YLBoqfMnxvWQoF9+cT3FEjkEHW4GkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wTQdMHyUjx1OVYSxDAHHRBMA9hFzm600vhHsw3CVUOo=; b=KmIqqjX+KepWiYyBdYVVA+Q2jYNJiAiwlHj2EoKyiG2bJny7Zl0XhSUyRWvXT6p4oes9ABvKp9L1CBoKNpme7o9kdjg/FL07eEdNrM9d4mitW7I8mABwO9j7mg+bDPd0iwqilRWp0pghrJ9F/AWQ3kT+FGsGDXrHhcHp7NuXIXpUS+RIOH1a3lSG5X+PqNbRRmhL6r0YtJ5xr+rstx7Tzh2nF//U6vj6jwh7p15gmsUrD18syymS0MPDgnHYNgTDPu6aEyzpT9CdzVJKsU4DUK2dBHgw9SOz49DK6XoYGs9FUk3OQ7QqU1d5RESrUsOprifORQkYEIB8AviigprzcA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wTQdMHyUjx1OVYSxDAHHRBMA9hFzm600vhHsw3CVUOo=; b=CDqo4iMY0g+MtuJvkKqYtGiRPvYql3T76+mhSv39JQxBEHilcCeZWpe+VsvikWqCyJuTFPlVqiksCgbTBvgulbnes9LOdhJpm8ekzsmWxfBMXVe2wbOVZrUHuo0NM0PtVPhVWGu3SacSYCi4jZVn9E3QzxrhaHoaNTJGHocWl5Y= Received: from BN6PR11MB1284.namprd11.prod.outlook.com (2603:10b6:404:49::9) by BN6PR11MB4083.namprd11.prod.outlook.com (2603:10b6:405:7a::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.13; Sat, 19 Dec 2020 03:58:03 +0000 Received: from BN6PR11MB1284.namprd11.prod.outlook.com ([fe80::a963:6f79:d85a:70de]) by BN6PR11MB1284.namprd11.prod.outlook.com ([fe80::a963:6f79:d85a:70de%11]) with mapi id 15.20.3676.025; Sat, 19 Dec 2020 03:58:03 +0000 From: "Yao, Jiewen" To: "devel@edk2.groups.io" , "kun.q@outlook.com" CC: "Wang, Jian J" , "Wu, Hao A" , "Dong, Eric" , "Bi, Dandan" , Liming Gao , "Kinney, Michael D" , "Liu, Zhiguang" , "Ni, Ray" , "Zhang, Qi1" , "Kumar, Rahul1" , Ard Biesheuvel , "Sami Mujawar" , Supreeth Venkatesh , Laszlo Ersek Subject: Re: [edk2-devel] [PATCH v1 00/15] Extends Support of MM_STANDALONE Type Modules to X64 Thread-Topic: [edk2-devel] [PATCH v1 00/15] Extends Support of MM_STANDALONE Type Modules to X64 Thread-Index: AQHW1W6uAJzAcwmivU63uhTVoopJdqn9yr0A Date: Sat, 19 Dec 2020 03:58:03 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.5.1.3 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=intel.com; x-originating-ip: [192.198.147.195] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 9e57197b-232b-437f-ed2f-08d8a3d2491e x-ms-traffictypediagnostic: BN6PR11MB4083: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:7691; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 6afdfIyGo2hu9UjeNqvdrZZlvOg9US5ckeeuZpIcYK9sArULz3koMtdnvyI4b3lsxwkQEP8dclJCM3bEPiqwN5c4ZGWw828MHQvKnsJ/b4CRvoB+ep4AZVKf1cnGs77pvZsSFOWROxhRHwTmfSGBt5ArkQXzVZPzKaDiyuRj8u6LTbNvAtnLJOXEIGShv37k00B4LERO1Z6h0VE4ZSrSVqHLDnBgOtwCMdjc6uqX3YCf90ybwEy6PF33DZYuXY/Qs6W2P8wPsMZPgwC7aRYFu21IyQsM68v8Xi7RacJfSYkRS9c0aItUqzpG4hsBmCaH1xOpmb9xyL0muzifVk6PQsXUN1QoGIytzQJGaIRt12E8F2UCDEj3dN+5Kvz6sCXu7RVhfLqWeWnEyk24AFUNqw== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BN6PR11MB1284.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(136003)(396003)(346002)(366004)(39860400002)(376002)(33656002)(30864003)(54906003)(76116006)(8676002)(6506007)(4326008)(52536014)(55016002)(110136005)(71200400001)(9686003)(83380400001)(5660300002)(53546011)(64756008)(19627235002)(66556008)(66476007)(478600001)(966005)(186003)(66574015)(86362001)(2906002)(66446008)(8936002)(66946007)(316002)(26005)(7696005);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: =?us-ascii?Q?Wgtb5HEbosBZQUrboFr9EPQAld//OYpgXktnOPIkUpIS16ZjT9vDV/SM0JWK?= =?us-ascii?Q?7f/ngMFsw4DiUriOe67rvgbhTticoF+Xk62aHWoMKzRWgu1Evsbm0P1Muv3N?= =?us-ascii?Q?z+/v826EbGrqHK+IXROaQFkY0izHaxnCxkBnANeWGfoEEhwaWndO2aIxbHFH?= =?us-ascii?Q?8EMNm3p5X8BFpuGOILsViBAGMsGSH6NDK/3obJSgikR78015Esb7HVMMeiBT?= =?us-ascii?Q?23AUcL7cwjU6HQ2tgdllc5mRpzfjDsLHQDShss6XuBy9SrbGSVU1RpIm6AT8?= =?us-ascii?Q?GI5X0BBR8VzK+WHC4UBR8WmKOWZZhGs0u/InqJjdaIfEp4ZbEJImgy9ksCSo?= =?us-ascii?Q?6Ywu/xzLIWmC9tTWAZQlIq+RseeJBj/hG0b+M3VFM8jnWKgm0jgTrGBf1f3x?= =?us-ascii?Q?Xv0eVGGm1u0eFGRQ/eR1kOQ85R9dc2fMKzf3S2yuUvevwnR76QV4kq58EMGe?= =?us-ascii?Q?56IOSaBxLsYs/osGPGv77gdWhjVGgLeLUuyNEsMlOr06VWNZcCATerW1bCcR?= =?us-ascii?Q?wu8Z/xgMnYBPwbGU+QfwR+m7+6DSuYMNicVss9v31WrKEmy2aw+2JjVRdV04?= =?us-ascii?Q?q2Im6/IYpWNGvxP8sMHOg34dtz01nGP9D3z5a6mMpfqPjkH5qSNvRKujFo/Q?= =?us-ascii?Q?zTmcMOL1f+Ol6UxS9G69t5wD0S7uoQI8cQptAoUumW2FDR35sfOPAgsYk2cN?= =?us-ascii?Q?MQ6T5dI0tAsofb63eID/XaWOwVsOL3z0PfAGYTrINVkZ0w/tUIetjsTlnNR7?= =?us-ascii?Q?5cPdVkSirPrLVQUNJtjH6BQQPt5bcagWKpVDNzLgx0pj8KSSucMZADnwtd2A?= =?us-ascii?Q?fEMzUzVtIVxsAZcPOlWEXmEX5yFUfL4r2kaASH77VPhVDAAFN003817pDtAx?= =?us-ascii?Q?KqVSTqD46uZCaCAxAy+BgGAbgB9KNHlKOvlzg+vc8oKXFGaPYpSBmeqOOXgO?= =?us-ascii?Q?LptXooe6NoVoFu7t9B4zlYwQQN0SZHe7YdbHAs0aDPY=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BN6PR11MB1284.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9e57197b-232b-437f-ed2f-08d8a3d2491e X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Dec 2020 03:58:03.6129 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: yMltDs0gV1Z/cGpMpDkFni0bjEcBRy5LOvt7chf9dNHpPNxLj67PtL4un/auJcOxUdPUO5NPelXo0iTPf8AUeA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR11MB4083 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi Thanks to add the StandaloneMM support. Would you please share the information on how you test the patch series? For every feature you touched (such as TPM), have you validated both tradi= tional MM and standalone MM feature on some platforms? Thank you Yao Jiewen > -----Original Message----- > From: devel@edk2.groups.io On Behalf Of Kun Qin > Sent: Saturday, December 19, 2020 2:50 AM > To: devel@edk2.groups.io > Cc: Wang, Jian J ; Wu, Hao A > ; Dong, Eric ; Bi, Dandan > ; Liming Gao ; Kinney, > Michael D ; Liu, Zhiguang > ; Ni, Ray ; Yao, Jiewen > ; Zhang, Qi1 ; Kumar, > Rahul1 ; Ard Biesheuvel > ; Sami Mujawar ; > Supreeth Venkatesh ; Laszlo Ersek > > Subject: [edk2-devel] [PATCH v1 00/15] Extends Support of > MM_STANDALONE Type Modules to X64 >=20 > Current MM_STANDALONE type modules are largely focusing on AArch64 > systems, which presents certain gaps to compile or run StandaloneMm on > X64 system. >=20 > This patch series extended support for MM_STANDALONE type modules to > build and run on X64 systems by creating new instances of drivers and > libraries. >=20 > A few minor build time bugs related to this effort are also fixed. >=20 > Patch v1 branch: > https://github.com/kuqin12/edk2/tree/standalone_x64_v1 >=20 > Cc: Jian J Wang > Cc: Hao A Wu > Cc: Eric Dong > Cc: Dandan Bi > Cc: Liming Gao > Cc: Michael D Kinney > Cc: Zhiguang Liu > Cc: Ray Ni > Cc: Jiewen Yao > Cc: Qi Zhang > Cc: Rahul Kumar > Cc: Ard Biesheuvel > Cc: Sami Mujawar > Cc: Supreeth Venkatesh > Cc: Laszlo Ersek >=20 > Kun Qin (15): > StandaloneMmPkg: StandaloneMmCoreEntryPoint: Extends support for > X64 > StandaloneMmPkg: StandaloneMmCoreHobLib: Extend support for x64 > Mm > Core > StandaloneMmPkg: StandaloneMmCoreMemoryAllocationLib: Fix > compiler > warning > StandaloneMmPkg: StandaloneMmMemLib: Extends support for X64 > architecture > MdeModulePkg: SmmLockBoxSmmLib: Support StandaloneMm for > SmmLockBoxLib > MdeModulePkg: SmmReportStatusCodeLib: ReportStatusCodeLib in > StandaloneMm > MdeModulePkg: FirmwarePerformanceDataTable: Added StandaloneMm > support > MdeModulePkg: ReportStatusCodeRouter: Support StandaloneMm RSC > Router > MdePkg: UefiDevicePathLib: Support UefiDevicePathLib under > StandaloneMm > PcAtChipsetPkg: AcpiTimerLib: Added StandaloneMm instance of > AcpiTimerLib > SecurityPkg: Tcg2PhysicalPresenceLib: Introduce StandaloneMm instance > SecurityPkg: Tcg2PpVendorLibNull: Added support for MM_STANDALONE > type > SecurityPkg: Tpm2DeviceLibDTpm: Introduce StandaloneMm instance > UefiCpuPkg: CpuIo2Smm: Support of CpuIo driver under StandaloneMm > UefiCpuPkg: SmmCpuExceptionHandlerLib: Added StandaloneMm module > support >=20 > MdeModulePkg/Library/SmmLockBoxLib/{SmmLockBoxSmmLib.c =3D> > SmmLockBoxMmLib.c} | = 77 ++-- > MdeModulePkg/Library/SmmLockBoxLib/SmmLockBoxStandaloneMmLib.c > | 53 +++ > MdeModulePkg/Library/SmmLockBoxLib/SmmLockBoxTraditionalMmLib.c > | 53 +++ > MdeModulePkg/Library/SmmReportStatusCodeLib/ReportStatusCodeLib.c > | 16 +- >=20 > MdeModulePkg/Library/SmmReportStatusCodeLib/ReportStatusCodeLibSt > andaloneMm.c | 39 ++ >=20 > MdeModulePkg/Library/SmmReportStatusCodeLib/ReportStatusCodeLibTr > aditional.c | 39 ++ >=20 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/{Fir > mwarePerformanceSmm.c =3D> FirmwarePerformanceCommon.c} | 72 > ++-- >=20 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/Firm > warePerformanceStandaloneMm.c | 62 ++= + >=20 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/Firm > warePerformanceTraditional.c | 62 ++= + >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/{ReportStatusCo > deRouterSmm.c =3D> ReportStatusCodeRouterCommon.c} | 43 += - >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCo > deRouterStandaloneMm.c | 33 ++ >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCo > deRouterTraditional.c | 33 ++ > MdePkg/Library/UefiDevicePathLib/DevicePathUtilities.c > | 33 -- > MdePkg/Library/UefiDevicePathLib/DevicePathUtilitiesDxeSmm.c > | 51 +++ > MdePkg/Library/UefiDevicePathLib/DevicePathUtilitiesStandaloneMm.c > | 40 ++ > PcAtChipsetPkg/Library/AcpiTimerLib/{DxeAcpiTimerLib.c =3D> > CommonAcpiTimerLib.c} | = 8 +- > PcAtChipsetPkg/Library/AcpiTimerLib/DxeAcpiTimerLib.c > | 81 +--- > PcAtChipsetPkg/Library/AcpiTimerLib/StandaloneAcpiTimerLib.c > | 31 ++ >=20 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/{SmmTcg2PhysicalPrese > nceLib.c =3D> MmTcg2PhysicalPresenceLibCommon.c} | 29 +- >=20 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresen > ceLib.c | 368 +-----= ----------- >=20 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/StandaloneMmTcg2Phys > icalPresenceLib.c | 42 ++ > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.c > | 42 +- > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpmBase.c > | 69 ++++ >=20 > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpmStandalone > Mm.c | 67 +++ > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.c > | 40 +- > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2Ptp.c > | 15 +- >=20 > StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/X64/Standalone > MmCoreEntryPoint.c | 71 +++= + > StandaloneMmPkg/Library/StandaloneMmCoreHobLib/{ =3D> > AArch64}/StandaloneMmCoreHobLib.c = | 6 +- > StandaloneMmPkg/Library/StandaloneMmCoreHobLib/{ =3D> > X64}/StandaloneMmCoreHobLib.c = | 426 > ++++++++++---------- >=20 > StandaloneMmPkg/Library/StandaloneMmCoreMemoryAllocationLib/Stan > daloneMmCoreMemoryAllocationLib.c | 2 +- >=20 > StandaloneMmPkg/Library/StandaloneMmMemLib/X64/StandaloneMmMe > mLibInternal.c | 67= +++ > UefiCpuPkg/CpuIo2Smm/{CpuIo2Smm.c =3D> CpuIo2Common.c} > | 14 +- > UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.c > | 384 +----------------- > UefiCpuPkg/CpuIo2Smm/CpuIo2StandaloneMm.c > | 31 ++ > MdeModulePkg/Library/SmmLockBoxLib/SmmLockBoxLibPrivate.h > | 27 ++ > MdeModulePkg/Library/SmmLockBoxLib/SmmLockBoxSmmLib.inf > | 15 +- > MdeModulePkg/Library/SmmLockBoxLib/{SmmLockBoxSmmLib.inf =3D> > SmmLockBoxStandaloneMmLib.inf} | 2= 6 +- > MdeModulePkg/Library/SmmReportStatusCodeLib/ReportStatusCodeLib.h > | 37 ++ >=20 > MdeModulePkg/Library/SmmReportStatusCodeLib/SmmReportStatusCode > Lib.inf | 4 += - >=20 > MdeModulePkg/Library/SmmReportStatusCodeLib/{SmmReportStatusCode > Lib.inf =3D> StandaloneMmReportStatusCodeLib.inf} | 17 = +- > MdeModulePkg/MdeModulePkg.dsc > | 6 + >=20 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/Firm > warePerformanceCommon.h | 55 ++= + >=20 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/Firm > warePerformanceSmm.inf | 11 +- >=20 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/{Fir > mwarePerformanceSmm.inf =3D> FirmwarePerformanceStandaloneMm.inf} | > 31 +- >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/{ReportStatusCo > deRouterSmm.h =3D> ReportStatusCodeRouterCommon.h} | 50 += +- >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCo > deRouterSmm.inf | 13 +- >=20 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCo > deRouterStandaloneMm.inf | 49 ++= + > MdePkg/Library/UefiDevicePathLib/UefiDevicePathLib.inf > | 1 + >=20 > MdePkg/Library/UefiDevicePathLib/UefiDevicePathLibOptionalDevicePathPr > otocol.inf | 1 + > MdePkg/Library/UefiDevicePathLib/{UefiDevicePathLib.inf =3D> > UefiDevicePathLibStandaloneMm.inf} | = 11 +- > MdePkg/MdePkg.dsc > | 1 + > PcAtChipsetPkg/Library/AcpiTimerLib/CommonAcpiTimerLib.h > | 25 ++ > PcAtChipsetPkg/Library/AcpiTimerLib/DxeAcpiTimerLib.inf > | 2 + > PcAtChipsetPkg/Library/AcpiTimerLib/{DxeAcpiTimerLib.inf =3D> > StandaloneAcpiTimerLib.inf} | 1= 9 +- > PcAtChipsetPkg/PcAtChipsetPkg.dsc > | 1 + >=20 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/MmTcg2PhysicalPresenc > eLibCommon.h | 35 ++ >=20 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/SmmTcg2PhysicalPresen > ceLib.inf | 6 +- >=20 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/{SmmTcg2PhysicalPrese > nceLib.inf =3D> StandaloneMmTcg2PhysicalPresenceLib.inf} | 22 +- > SecurityPkg/Library/Tcg2PpVendorLibNull/Tcg2PpVendorLibNull.inf > | 2 +- > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.h > | 68 ++++ > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.inf > | 3 + > SecurityPkg/Library/Tpm2DeviceLibDTpm/{Tpm2DeviceLibDTpm.inf =3D> > Tpm2DeviceLibDTpmStandaloneMm.inf} | 13 +- > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.inf > | 3 + > SecurityPkg/SecurityPkg.dsc > | 3 + >=20 > StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/StandaloneMm > CoreEntryPoint.inf | 3 + >=20 > StandaloneMmPkg/Library/StandaloneMmCoreHobLib/StandaloneMmCore > HobLib.inf | 8 += - >=20 > StandaloneMmPkg/Library/StandaloneMmMemLib/StandaloneMmMemLib > .inf | 6= +- > UefiCpuPkg/CpuIo2Smm/{CpuIo2Smm.h =3D> CpuIo2Common.h} > | 18 +- > UefiCpuPkg/CpuIo2Smm/CpuIo2Smm.inf > | 7 +- > UefiCpuPkg/CpuIo2Smm/{CpuIo2Smm.inf =3D> CpuIo2StandaloneMm.inf} > | 23 +- >=20 > UefiCpuPkg/Library/CpuExceptionHandlerLib/SmmCpuExceptionHandlerLib. > inf | 2 +- > UefiCpuPkg/UefiCpuPkg.dsc > | 6 + > 72 files changed, 1704 insertions(+), 1425 deletions(-) > rename MdeModulePkg/Library/SmmLockBoxLib/{SmmLockBoxSmmLib.c > =3D> SmmLockBoxMmLib.c} (89%) > create mode 100644 > MdeModulePkg/Library/SmmLockBoxLib/SmmLockBoxStandaloneMmLib.c > create mode 100644 > MdeModulePkg/Library/SmmLockBoxLib/SmmLockBoxTraditionalMmLib.c > create mode 100644 > MdeModulePkg/Library/SmmReportStatusCodeLib/ReportStatusCodeLibSt > andaloneMm.c > create mode 100644 > MdeModulePkg/Library/SmmReportStatusCodeLib/ReportStatusCodeLibTr > aditional.c > rename > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/{Fir > mwarePerformanceSmm.c =3D> FirmwarePerformanceCommon.c} (77%) > create mode 100644 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/Firm > warePerformanceStandaloneMm.c > create mode 100644 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/Firm > warePerformanceTraditional.c > rename > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/{ReportStatusCo > deRouterSmm.c =3D> ReportStatusCodeRouterCommon.c} (80%) > create mode 100644 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCo > deRouterStandaloneMm.c > create mode 100644 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCo > deRouterTraditional.c > create mode 100644 > MdePkg/Library/UefiDevicePathLib/DevicePathUtilitiesDxeSmm.c > create mode 100644 > MdePkg/Library/UefiDevicePathLib/DevicePathUtilitiesStandaloneMm.c > copy PcAtChipsetPkg/Library/AcpiTimerLib/{DxeAcpiTimerLib.c =3D> > CommonAcpiTimerLib.c} (86%) > create mode 100644 > PcAtChipsetPkg/Library/AcpiTimerLib/StandaloneAcpiTimerLib.c > copy > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/{SmmTcg2PhysicalPrese > nceLib.c =3D> MmTcg2PhysicalPresenceLibCommon.c} (91%) > create mode 100644 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/StandaloneMmTcg2Phys > icalPresenceLib.c > create mode 100644 > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpmBase.c > create mode 100644 > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpmStandalone > Mm.c > create mode 100644 > StandaloneMmPkg/Library/StandaloneMmCoreEntryPoint/X64/Standalone > MmCoreEntryPoint.c > copy StandaloneMmPkg/Library/StandaloneMmCoreHobLib/{ =3D> > AArch64}/StandaloneMmCoreHobLib.c (96%) > rename StandaloneMmPkg/Library/StandaloneMmCoreHobLib/{ =3D> > X64}/StandaloneMmCoreHobLib.c (70%) > create mode 100644 > StandaloneMmPkg/Library/StandaloneMmMemLib/X64/StandaloneMmMe > mLibInternal.c > copy UefiCpuPkg/CpuIo2Smm/{CpuIo2Smm.c =3D> CpuIo2Common.c} (94%) > create mode 100644 UefiCpuPkg/CpuIo2Smm/CpuIo2StandaloneMm.c > copy MdeModulePkg/Library/SmmLockBoxLib/{SmmLockBoxSmmLib.inf =3D> > SmmLockBoxStandaloneMmLib.inf} (52%) > create mode 100644 > MdeModulePkg/Library/SmmReportStatusCodeLib/ReportStatusCodeLib.h > copy > MdeModulePkg/Library/SmmReportStatusCodeLib/{SmmReportStatusCode > Lib.inf =3D> StandaloneMmReportStatusCodeLib.inf} (64%) > create mode 100644 > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/Firm > warePerformanceCommon.h > copy > MdeModulePkg/Universal/Acpi/FirmwarePerformanceDataTableSmm/{Fir > mwarePerformanceSmm.inf =3D> FirmwarePerformanceStandaloneMm.inf} > (65%) > rename > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/{ReportStatusCo > deRouterSmm.h =3D> ReportStatusCodeRouterCommon.h} (70%) > create mode 100644 > MdeModulePkg/Universal/ReportStatusCodeRouter/Smm/ReportStatusCo > deRouterStandaloneMm.inf > copy MdePkg/Library/UefiDevicePathLib/{UefiDevicePathLib.inf =3D> > UefiDevicePathLibStandaloneMm.inf} (79%) > create mode 100644 > PcAtChipsetPkg/Library/AcpiTimerLib/CommonAcpiTimerLib.h > copy PcAtChipsetPkg/Library/AcpiTimerLib/{DxeAcpiTimerLib.inf =3D> > StandaloneAcpiTimerLib.inf} (70%) > create mode 100644 > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/MmTcg2PhysicalPresenc > eLibCommon.h > copy > SecurityPkg/Library/SmmTcg2PhysicalPresenceLib/{SmmTcg2PhysicalPrese > nceLib.inf =3D> StandaloneMmTcg2PhysicalPresenceLib.inf} (64%) > create mode 100644 > SecurityPkg/Library/Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.h > copy SecurityPkg/Library/Tpm2DeviceLibDTpm/{Tpm2DeviceLibDTpm.inf =3D> > Tpm2DeviceLibDTpmStandaloneMm.inf} (70%) > rename UefiCpuPkg/CpuIo2Smm/{CpuIo2Smm.h =3D> CpuIo2Common.h} > (92%) > copy UefiCpuPkg/CpuIo2Smm/{CpuIo2Smm.inf =3D> > CpuIo2StandaloneMm.inf} (56%) >=20 > -- > 2.28.0.windows.1 >=20 >=20 >=20 >=20 >=20