From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mx.groups.io with SMTP id smtpd.web08.7980.1608018801768958627 for ; Mon, 14 Dec 2020 23:53:22 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@intel.onmicrosoft.com header.s=selector2-intel-onmicrosoft-com header.b=BZQBrgK6; spf=pass (domain: intel.com, ip: 192.55.52.43, mailfrom: jiewen.yao@intel.com) IronPort-SDR: Wp/alm+Tj3fInlAkbrYK8dIdJr1QkEVNckVnLuurzo9oiHd+ScKghlr+9/WsHexmzpL5Au6+dF dxg2upcdKKww== X-IronPort-AV: E=McAfee;i="6000,8403,9835"; a="259568128" X-IronPort-AV: E=Sophos;i="5.78,420,1599548400"; d="scan'208";a="259568128" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Dec 2020 23:53:20 -0800 IronPort-SDR: 3icxtOlbkIfgn6rh90WPNOLg16ynbGaNy454CD1ymyk59VS8XB71r5frJeZYKTzgWAJZ+ha7kM PlfFErSTDfRg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.78,420,1599548400"; d="scan'208";a="368103179" Received: from orsmsx604.amr.corp.intel.com ([10.22.229.17]) by orsmga008.jf.intel.com with ESMTP; 14 Dec 2020 23:53:20 -0800 Received: from orsmsx608.amr.corp.intel.com (10.22.229.21) by ORSMSX604.amr.corp.intel.com (10.22.229.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Mon, 14 Dec 2020 23:53:20 -0800 Received: from orsmsx607.amr.corp.intel.com (10.22.229.20) by ORSMSX608.amr.corp.intel.com (10.22.229.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Mon, 14 Dec 2020 23:53:19 -0800 Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx607.amr.corp.intel.com (10.22.229.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Frontend Transport; Mon, 14 Dec 2020 23:53:19 -0800 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (104.47.70.108) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Mon, 14 Dec 2020 23:53:19 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HIBA4x6aoDvL/D2oYZCPOz3KeD3sqsMhzaUcoKL1FqpiSfju57/ag9DyDmzcWv159qH4ergXKBdH66PUAGDpf6VRcqu/O2BzRs9iAIm73FqS4nAFeqz5WQLvir7PmZlk6gcBfQ7UmCF72mAWr/3NLVZ2PLNS3AZbzy87slhRgw3f4ZI2+BIB56ataNky1porTpGDl/zMASjBF88wYKAJPHDRDejPF3ELkEnt+MTOSRi8tMSFaa9aFtD8rDNDnD+qR8zgC83aQ51uPCSHKbczvfHrT62A18aq0ZcO31HORfU2keIYyT9sQZuSh4ao4Ehy7+UWwGFKZuhDZY7cxvMZGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kueoEvr/QBFnQgDOyI4GNYgmzWdkvs8sm5GT28i7Cyw=; b=QuYJs7295yqHBvyWkSL65FFeuAIQ+3JgJVSg61MkQtK3x5HGVWy3wkv+L27AKI2PfVQnkPMGfW60SCWTL5u9i3v1bE9plS6M5gO/lvvTj/LFZuNMpUdHRbblKz036+Geo6Sl/9lzHQxkwJhx8NvIzX8SyZ0zX/Qp3WW3eKJbSoTFR0g7Bmn3qFCUZohSS/mYSHTgz2fHTzotRor9cL6COEKc+Y8cHwIbeY0yvMOeNFKBQ66/z4bUIE5yecLo6YwyJSIIX6pyGUxNnK6fVlg53UFlGyQ30vKbqxdU3T1AlP1FxbLP22P3caH/arJae9ZDnctzj+9f1RH0gcclhnjSMw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kueoEvr/QBFnQgDOyI4GNYgmzWdkvs8sm5GT28i7Cyw=; b=BZQBrgK68yV6dFG6sn/rt81tnig4a5SPhq8J+QUdvd+axadonPnrneHJBJpfhQj9YKBtAyucbo56/+AoIJx7LlD43DIPc3EfnHB56h508GBrC3aCV/3ifTjLX0Xfsm8IYvDXowpcKsX+b+qt0+J1ShBBfnnOImG9V9C6+r+X7SE= Received: from CY4PR11MB1288.namprd11.prod.outlook.com (2603:10b6:903:23::8) by CY4PR11MB1640.namprd11.prod.outlook.com (2603:10b6:910:8::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.21; Tue, 15 Dec 2020 07:53:18 +0000 Received: from CY4PR11MB1288.namprd11.prod.outlook.com ([fe80::e058:fd5a:28d8:2b17]) by CY4PR11MB1288.namprd11.prod.outlook.com ([fe80::e058:fd5a:28d8:2b17%12]) with mapi id 15.20.3654.025; Tue, 15 Dec 2020 07:53:18 +0000 From: "Yao, Jiewen" To: "Kinney, Michael D" , "devel@edk2.groups.io" CC: "Zimmer, Vincent" , "Jarlstrom, Laurie" , "Shaw, Kevin W" Subject: Re: [tianocore-docs][ATBB-Memory_Protection_in_UEFI_BIOS][Patch 0/2] Sync with template add Gitbook Action Thread-Topic: [tianocore-docs][ATBB-Memory_Protection_in_UEFI_BIOS][Patch 0/2] Sync with template add Gitbook Action Thread-Index: AQHWz/lWdxTIJJKXcU23Sdvio61B8qn3zqnQ Date: Tue, 15 Dec 2020 07:53:18 +0000 Message-ID: References: <20201211200748.1622-1-michael.d.kinney@intel.com> In-Reply-To: <20201211200748.1622-1-michael.d.kinney@intel.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.5.1.3 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=intel.com; x-originating-ip: [192.198.147.199] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: c42d621f-0972-4395-3317-08d8a0ce7c65 x-ms-traffictypediagnostic: CY4PR11MB1640: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:935; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: jPa1mJ1scwxOha1Z+TJHtTMQrslQ9TSPaoZTpvGq3MoL8xIcYSNaqNV1HXcQybbWdadlpocWfcfxSnUfqNlnP76jsjJ1pKSRVbo2EYmo1skH0C2r87Lf1TQuo9yzXRAurwz54VvOMaZ9N14StBvs1aGcfuaKgpJPKKw8gT6Hpgi7uY3laqt6xlBaVc/Sc9gNxKGTKqmLRtIIxTLp8MDzHmenVfGmIP+Te82tgP9c+2JBmnX8yxo/OFQcmB9C8ovCK14Jt23Dd+Eka7sNLhWB2NVWYXeuwURQA/sSAsIzYqQO1ra8x2wl3vbWCgVI/UDIY+jKT68y70Hic60l83tR1Q== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CY4PR11MB1288.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(376002)(346002)(136003)(366004)(186003)(55016002)(26005)(9686003)(83380400001)(33656002)(52536014)(2906002)(5660300002)(86362001)(66946007)(64756008)(71200400001)(66556008)(76116006)(66446008)(66476007)(8936002)(54906003)(6506007)(110136005)(7696005)(107886003)(53546011)(508600001)(4326008)(8676002);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: =?us-ascii?Q?4HGjVFhhGBc4VubLCkr2HRfkxzOqZc7lq69PaKkPgkzcuf+RUp8TL7lmqP4p?= =?us-ascii?Q?b8569ePNYdF9Ev3mrX9TnqOHmqtyHf076ETVyILWvHnxekOvziIrjZ27Oasr?= =?us-ascii?Q?SqMd1TGNGa1rqkh4fcoZuZQu07ZE5UoCTebx5JH2rQTYzowGNf8eCVU5TSCO?= =?us-ascii?Q?mnNDwZk7sevNcWzjJCkTkn8iC5gCRqSvxOIfbaTTLvgDIf8Reo501m/aK7ac?= =?us-ascii?Q?2TlMJZIk6N+20hW6A+/P8wVnARaqCVLhhlTi4KfkXtdevnLG1WhyZ8B0ns7g?= =?us-ascii?Q?dZXSLHC7AOeNynwPZvxKOLC9gKmnkB1lYNqRfg/Ds+0cgJ+ZcpfDkuxV8Ndd?= =?us-ascii?Q?BWmBUuckb9Cn2lYrf2VnoCDKrh5YwcPI5FndyQ89to6OeclZZWaOxgx/iBQu?= =?us-ascii?Q?k5ggJiUnxCPH2GQk+OSK8C3XaYuPwf1d3D13WBf9sr9FYaaMcdY8I6CkmBv2?= =?us-ascii?Q?2btEtwkaqfEJO91Q0+TiEv+bjAnVwg32iUyg3vuAiCHV8/DVy1yYHpTkMaeT?= =?us-ascii?Q?8epR/w0GZO+ijVwjo6hQnv3J+NgaGISE7nykxa8DSX0oKzMUXUxQoqbcaoE8?= =?us-ascii?Q?HE3ARZJpjLobwS6gnm346EqfjgVpXyZYSUqh+W73nVi1qgPQ81524WP2diHc?= =?us-ascii?Q?LRB95CXuO2EAfSMCE34bsM3m/mRfCqUAPLBum8M38sBV2iWt+pxFDn5a61AG?= =?us-ascii?Q?r7t4mYHKUPrGVlniSwtU14kyeIBLSdyYMEm03To4yzb7c2gaj1A6pb0ENiOy?= =?us-ascii?Q?L27noffLD9dwflUe+9+C0UEn3P62fmKFKyKDq9C6XJCa2i/LmCpgNIZekUmo?= =?us-ascii?Q?28bGtG9P2dMzGeQJgo0p+TuSu4VSECcAXpPxkGA52mC0509kaWgW4rpJ0r+c?= =?us-ascii?Q?7RH4Ts51pxJECvKhkjWGg980CMdXdQJkzNRnH6bZc5zA84ZNQKRSPclv9e4c?= =?us-ascii?Q?eE/mdrdvePLBrr2kyyFTPYNhtEU3d8Lmw9k5Wbkqw8Y=3D?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CY4PR11MB1288.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: c42d621f-0972-4395-3317-08d8a0ce7c65 X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Dec 2020 07:53:18.1690 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: bBl9v8EWwVNB+b+OiuBmvOHODo7DzK7RaIBTsYQ2ZM57DAIIWWy5xRQQyuw5fjIzZKtvdcX0oG7VqB9FJdL/hg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR11MB1640 Return-Path: jiewen.yao@intel.com X-OriginatorOrg: intel.com Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Reviewed-by: Jiewen Yao > -----Original Message----- > From: Michael D Kinney > Sent: Saturday, December 12, 2020 4:08 AM > To: devel@edk2.groups.io > Cc: Yao, Jiewen ; Zimmer, Vincent > ; Jarlstrom, Laurie ; > Shaw, Kevin W > Subject: [tianocore-docs][ATBB-Memory_Protection_in_UEFI_BIOS][Patch 0/2] > Sync with template add Gitbook Action >=20 > * Move figures from assets directory to media directory > * Remove non ASCII characters > * Add Figure to TOC > * Add missing file headers > * Add layout directory to match template > * Update CSS styles to match template > * Add GitBook Action >=20 > Cc: Jiewen Yao > Cc: Vincent Zimmer > Cc: Laurie Jarlstrom > Cc: Kevin Shaw > Contributed-under: TianoCore Contribution Agreement 1.1 > Signed-off-by: Michael D Kinney >=20 > Michael D Kinney (2): > Clean up format and layout to match template > Update to match template and enable GitBook action >=20 > .bookignore | 3 + > .github/workflows/gitbook-action.yml | 39 +++ > .gitignore | 10 +- > README.md | 36 +-- > SUMMARY.md | 38 +++ > _layouts/ebook/page.html | 42 ++++ > _layouts/ebook/pdf_footer.html | 17 ++ > _layouts/ebook/pdf_header.html | 14 ++ > _layouts/ebook/summary.html | 98 ++++++++ > _layouts/layout.html | 27 +++ > _layouts/website/footer.html | 17 ++ > _layouts/website/header.html | 31 +++ > _layouts/website/languages.html | 19 ++ > _layouts/website/layout.html | 28 +++ > _layouts/website/page.html | 86 +++++++ > _layouts/website/summary.html | 61 +++++ > assets/Tianocore_logo2.png | Bin 7360 -> 0 bytes > authors.md | 31 +++ > book.json | 9 + > cover.jpg | Bin 0 -> 211343 bytes > executive-summary.md | 31 +++ > glossary.md | 68 ++++-- > .../Fig1- SMRAM memory protection.jpg | Bin > .../Fig2 - Mapping of Protection in SMM.jpg | Bin > ...g3 - Page table enforced memory layout.jpg | Bin > .../Fig4 - UEFI memory protection.jpg | Bin > media/TianocoreTitlePageLogo.jpg | Bin 0 -> 44499 bytes > memory-protection-in-SMM.md | 134 ++++++----- > memory-protection-in-uefi.md | 104 +++++--- > references.md | 50 +++- > styles/epub.css | 221 ++--------------- > styles/mobi.css | 50 ++++ > styles/pdf.css | 221 ++--------------- > styles/website.css | 223 ++---------------- > 34 files changed, 950 insertions(+), 758 deletions(-) > create mode 100644 .bookignore > create mode 100644 .github/workflows/gitbook-action.yml > create mode 100644 _layouts/ebook/page.html > create mode 100644 _layouts/ebook/pdf_footer.html > create mode 100644 _layouts/ebook/pdf_header.html > create mode 100644 _layouts/ebook/summary.html > create mode 100644 _layouts/layout.html > create mode 100644 _layouts/website/footer.html > create mode 100644 _layouts/website/header.html > create mode 100644 _layouts/website/languages.html > create mode 100644 _layouts/website/layout.html > create mode 100644 _layouts/website/page.html > create mode 100644 _layouts/website/summary.html > delete mode 100644 assets/Tianocore_logo2.png > create mode 100644 book.json > create mode 100644 cover.jpg > rename {assets =3D> media}/Fig1- SMRAM memory protection.jpg (100%) > rename {assets =3D> media}/Fig2 - Mapping of Protection in SMM.jpg (100%= ) > rename {assets =3D> media}/Fig3 - Page table enforced memory layout.jpg > (100%) > rename {assets =3D> media}/Fig4 - UEFI memory protection.jpg (100%) > create mode 100644 media/TianocoreTitlePageLogo.jpg > create mode 100644 styles/mobi.css >=20 > -- > 2.29.2.windows.2