From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 5DF1AAC0CC0 for ; Wed, 28 Feb 2024 06:14:40 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=UCFUiDT1OFhqLYCVEWVFCNwJdPGOuixri23dEE5HiKk=; c=relaxed/simple; d=groups.io; h=ARC-Seal:ARC-Message-Signature:ARC-Authentication-Results:From:To:CC:Subject:Thread-Topic:Thread-Index:Date:Message-ID:References:In-Reply-To:Accept-Language:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Language:Content-Type:Content-Transfer-Encoding; s=20140610; t=1709100878; v=1; b=qNvhPrToAEj7MUiqy7jzelT38fwV4bcLalnTkuveErj0h1TjvRJLw+QeBLrqBicJ1dele31u 6SgGi18SoknGZZfIrvT21sDcKS6KH5xbQ3FXnEkUyYWps2fkRWc3EO/5NEtkhIuM99crQMkAR0S I1zqHlT7URBDlAAK/ZqODI7k= X-Received: by 127.0.0.2 with SMTP id Mv26YY7687511xVpJlU1gkIj; Tue, 27 Feb 2024 22:14:38 -0800 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.13]) by mx.groups.io with SMTP id smtpd.web10.7461.1709100877983230924 for ; Tue, 27 Feb 2024 22:14:38 -0800 X-IronPort-AV: E=McAfee;i="6600,9927,10996"; a="6433408" X-IronPort-AV: E=Sophos;i="6.06,190,1705392000"; d="scan'208";a="6433408" X-Received: from fmviesa004.fm.intel.com ([10.60.135.144]) by fmvoesa107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Feb 2024 22:14:37 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.06,190,1705392000"; d="scan'208";a="11945139" X-Received: from fmsmsx603.amr.corp.intel.com ([10.18.126.83]) by fmviesa004.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 27 Feb 2024 22:14:37 -0800 X-Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 27 Feb 2024 22:14:37 -0800 X-Received: from fmsmsx610.amr.corp.intel.com (10.18.126.90) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Tue, 27 Feb 2024 22:14:36 -0800 X-Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx610.amr.corp.intel.com (10.18.126.90) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Tue, 27 Feb 2024 22:14:36 -0800 X-Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Tue, 27 Feb 2024 22:14:36 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NJ1xc9xQBqxEUam4ZL8w/3hN/FRkk2KsvF4r3dS04HPE/vGnl/imzZYjCchVoKjRjMNBohxg5Ro3jxUd8o7dlDCzX9cYCH7ehp/XmAfhSrh0rp9ybco4mkwZC4BKXgcYJi9TRtRfHSSh/+9AK4R5qyqxYHRVYth5Yo4n876zyBlpK1durxDIi/nnZafjuzsnRJCvYYk26eyjr/Z7nyZQXKT78RBCJJFT2f/qQtHhCwJcw8itK6GuS2iVnNlh2dWdOkukOhypCcV5O6LYLJzlC5A6yyQ1O36+hgAnm6+JHp/u9QyGiGAPjI0T6m8SeX34PxxamO1FQ0ZTS66g0GtW1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=+1ib360RPDX5XEjzl9L3MYFE/sZLe1HcXvXMfFwTGsY=; b=l6KIGbijViVrR+501ZeunGgQMiaeR+X13nSsS7W22i3evGAdeuULj4DV8+WwwRo32TSECQ6FkqbnNxk7H/Zzc7Bz6O+U8Gzeiu9QQaxZt2ya77JQWK9Rj92jsVdQNAs2Gzk65WN5PhR75tjQUbFDWsRjh+c7uoKP/FLDWJa2pAjnz7rjhKysCO6YxpGC6sXnEFeJWnpeSzcFWJ1jizTRs5V+bqptgXdrovcP30lbIxkgxOzUIlYTur6kDUcpOhHu31fnO/Xc6j55/QbNJa4ydbbR4pIu7xRPCzbcRfws5/MHvTnpVjEgbMKifxuQGdRa/TZ2D73LNEjox5PntV0xDQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com (2603:10b6:303:169::14) by SJ0PR11MB5023.namprd11.prod.outlook.com (2603:10b6:a03:2de::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.22; Wed, 28 Feb 2024 06:14:33 +0000 X-Received: from MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::92a7:f6a2:9262:d150]) by MW4PR11MB5872.namprd11.prod.outlook.com ([fe80::92a7:f6a2:9262:d150%3]) with mapi id 15.20.7339.024; Wed, 28 Feb 2024 06:14:33 +0000 From: "Yao, Jiewen" To: Tom Lendacky , "devel@edk2.groups.io" CC: Ard Biesheuvel , "Aktas, Erdem" , Gerd Hoffmann , Laszlo Ersek , Liming Gao , "Kinney, Michael D" , "Xu, Min M" , "Liu, Zhiguang" , "Kumar, Rahul R" , "Ni, Ray" , Michael Roth Subject: Re: [edk2-devel] [PATCH v2 00/23] Provide SEV-SNP support for running under an SVSM Thread-Topic: [PATCH v2 00/23] Provide SEV-SNP support for running under an SVSM Thread-Index: AQHaZbTc60y9/Hu0z0i4XilPD6y8CrEfSzVw Date: Wed, 28 Feb 2024 06:14:33 +0000 Message-ID: References: In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: MW4PR11MB5872:EE_|SJ0PR11MB5023:EE_ x-ms-office365-filtering-correlation-id: d21e8590-e095-4ebb-6d0b-08dc38248827 x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam-message-info: 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 x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?ImjTwIvcgJLKRy4ZFV4eTYokezVBpFRPpqqFOODZ58D59nJzIv00sTs3e2H0?= =?us-ascii?Q?yxhl2iGIf7fYh3i5x1ZCUZPY32QHSSfGLv/EyOdaYW5CW7dMXa8Co8Q9N53X?= =?us-ascii?Q?JDlM71ne3zLptE3ii9G3Xw53HDY8FEg6nGPoC2CS7H5cUbkdNZh4YJxMBSlg?= =?us-ascii?Q?XC6vqCZV9M49Eb/1E02ymPAM+8G2rdJ3cAXDVEYuHPUy3WL6ReT4d3bDqGvR?= =?us-ascii?Q?i7+e5qrL/Vm+BIq+ZQ7lzHtnm4U1shevvEpGEcL5dmuKTHvchl85YnD1S9Vf?= =?us-ascii?Q?j2Mr/CAPi+oxS5FCF/fxZTmb1REsWydSjPRR26epTFqAO/Wobs7xp28d3Jkm?= =?us-ascii?Q?qogwJf9S/wwZsWg12+maAquO3lbMams0tegUYozQvNQnn9cNJum9oCRi1dHM?= =?us-ascii?Q?s+TS97RFtKnWYpAV1z6vExT05mTcGvDMyiJA3XlckaFwmqchaTMbcYPk3fQH?= =?us-ascii?Q?Zz5QmRZtlHpeK153C9l2SQlNhxDjtLQG1nxoEtQ8PDLExksKfGPwrTrfsGKL?= =?us-ascii?Q?mWNn+/k6eyhczopZBqaTjzmpF79rFP7QiDdynzv0el28fSQ2lSmTnZJtHIHe?= =?us-ascii?Q?J3lcw1JXzXHoe5JXlmXEFN3T3iCR3SnLarPZavrB86nSX5VLl9FxqV0lCsKs?= =?us-ascii?Q?dtIkucwVrC6jZFhJbjl4nTnyHQVwni18PFDN5EKgRODATwkEjOBtVxb/Jp6Z?= =?us-ascii?Q?xeKSGYPzUKZbtWPwF/GGPAvI6iPplRvl43DRMiw502jYTUmm3RsBsXTb7Ax+?= =?us-ascii?Q?XeMlLYULXFURHlD2fcCdOqSr5qG4WyY0y0c9Xr5Yxwf6ZVez7W9uL3yKrfp8?= =?us-ascii?Q?2a3WkZZELzc5wOvR1kiMlzIpRzoQcDB66mo/Vr6bfH+M6uz4vp5li5ldWO0S?= =?us-ascii?Q?nZzIV2CqzJDxGHwTMpb0SAL5QhcRzsl39xxnMbcSbjm1bRHjAVZU82ALRin2?= =?us-ascii?Q?8MxeShzmBHqiVHwqYpDMNMv5kv4A7NU9Ek9cR2tVo318H9P/JuF1A3+t9OnM?= =?us-ascii?Q?q0IoXDGp/S8WNGXPsbUIxG9SZznqBcfCmL1ZoEGIl7r3xkrEX2jlKluQERRo?= =?us-ascii?Q?cAn0woKIMteupb3t/Cnuuppx9+4SCm3z19+116VhV9SJEp2ZTGjgN7cq31Yd?= =?us-ascii?Q?DXyb0qSSjny5IIyukRP9CJEukSEf6A3R/FIGa6HBDIVfkui4itcmgehC8RAR?= =?us-ascii?Q?UrzsGQEO8Krt+jnrp6XzB4C+aIFd5Vqpf7LpMHWjb4hpyZYWrWpfuv296hrD?= =?us-ascii?Q?jpAjIOhbYLJR9scsODEb1d7NGj9rMmJjSv3gECyfBn6yPGNht6ITwqObEe4G?= =?us-ascii?Q?Y2kdarQAWpnUP3C8OzjWnB4G7dGdY517QJWO3+6/P+hAYLk7FIpWLrWeNPos?= =?us-ascii?Q?rUdLwuIQTDOf+HGiiKdPd3uWzLo9yhG+CSnRY+59gJtYqE8XZW+/kqOI0eQk?= =?us-ascii?Q?L3KP6X9Ey4cH+H11fVxNZEEZvIz+rJzW33AuJvHE53lBvLTJGDELN1IUde5X?= =?us-ascii?Q?FcLjH4svs4rTfaed+DlJJVtPU8Bnt0fkibedGq0s48ZC2G3vJdYX4iGPg/ib?= =?us-ascii?Q?qq42LmNWrHTSANnlRDGZykjVssLmkq84tcls41+v?= MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: MW4PR11MB5872.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d21e8590-e095-4ebb-6d0b-08dc38248827 X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2024 06:14:33.3747 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 3nTfUmQkp058rSO99aoPUOii+ud49xBho57bYE92/cNgXZcKZnq1TrA2TA5nEDTjuZO4PEU3w+Izs70IdFZEMA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB5023 X-OriginatorOrg: intel.com Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jiewen.yao@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: i58QE4W5t1E2Ua4TH8OHtGR1x7686176AA= Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=qNvhPrTo; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=intel.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io Some feedback: 1) 0002-MdePkg-GHCB-APIC-ID-retrieval-support-definitions MdePkg only contains the definition in the standard. Question: Is EFI_APIC_IDS_GUID definition in some AMD/SVSM specification? 2) 0012-UefiCpuPkg-CcSvsmLib-Create-the-CcSvsmLib-library-to-support-an-SVS= M I am not sure the position of SVSM. If the SVSM interface is AMD specific, the it should be AmdSvsmLib. If the SVSM interface is generic, then we should define everything in a gen= eric way. It is very confusing to mix a generic CcSvsm lib with AMD specific . Thank you Yao, Jiewen > -----Original Message----- > From: Tom Lendacky > Sent: Friday, February 23, 2024 1:30 AM > To: devel@edk2.groups.io > Cc: Ard Biesheuvel ; Aktas, Erdem > ; Gerd Hoffmann ; Yao, Jiewen > ; Laszlo Ersek ; Liming Gao > ; Kinney, Michael D ; > Xu, Min M ; Liu, Zhiguang ; > Kumar, Rahul R ; Ni, Ray ; Mic= hael > Roth > Subject: [PATCH v2 00/23] Provide SEV-SNP support for running under an SV= SM >=20 >=20 > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4654 >=20 > This series adds SEV-SNP support for running OVMF under an Secure VM > Service Module (SVSM) at a less privileged VM Privilege Level (VMPL). > By running at a less priviledged VMPL, the SVSM can be used to provide > services, e.g. a virtual TPM, for the guest OS within the SEV-SNP > confidential VM (CVM) rather than trust such services from the hypervisor= . >=20 > Currently, OVMF expects to run at the highest VMPL, VMPL0, and there are > certain SNP related operations that require that VMPL level. Specifically= , > the PVALIDATE instruction and the RMPADJUST instruction when setting the > the VMSA attribute of a page (used when starting APs). >=20 > If OVMF is to run at a less privileged VMPL, e.g. VMPL2, then it must > use an SVSM (which is running at VMPL0) to perform the operations that > it is no longer able to perform. >=20 > When running under an SVSM, OVMF must know the APIC IDs of the vCPUs that > it will be starting. As a result, the GHCB APIC ID retrieval action must > be performed. Since this service can also work with SEV-SNP running at > VMPL0, the patches to make use of this feature are near the beginning of > the series. >=20 > How OVMF interacts with and uses the SVSM is documented in the SVSM > specification [1] and the GHCB specification [2]. >=20 > This support creates a new CcSvsmLib library that is used by MpInitLib. > This requires an update to the edk2-platform DSC files to add the new > library. The edk2-platform change would be needed after patch 12, but > before patch 15. >=20 > This series introduces support to run OVMF under an SVSM. It consists > of: > - Retrieving the list of vCPU APIC IDs and starting up all APs without > performing a broadcast SIPI > - Reorganizing the page state change support to not directly use the > GHCB buffer since an SVSM will use the calling area buffer, instead > - Detecting the presence of an SVSM > - When not running at VMPL0, invoking the SVSM for page validation and > VMSA page creation/deletion > - Detecting and allowing OVMF to run in a VMPL other than 0 when an > SVSM is present >=20 > The series is based off of commit: >=20 > 2ca8d5597443 ("UefiCpuPkg/PiSmmCpuDxeSmm: Check BspIndex first before > lock cmpxchg") >=20 > [1] https://www.amd.com/content/dam/amd/en/documents/epyc-technical- > docs/specifications/58019.pdf > [2] https://www.amd.com/content/dam/amd/en/documents/epyc-technical- > docs/specifications/56421.pdf >=20 > --- >=20 > Changes in v2: > - Move the APIC IDs retrieval support to the beginning of the patch serie= s > - Use a GUIDed HOB to hold the APIC ID list instead of a PCD > - Split up Page State Change reorganization into multiple patches > - Created CcSvsmLib library instead of extending CcExitLib > - This will require a corresponding update to edk2-platform DSC files > - Removed Ray Ni's Acked-by since it is not a minor change > - Variable name changes and other misc changes >=20 > Tom Lendacky (23): > OvmfPkg/BaseMemEncryptLib: Fix error check from AsmRmpAdjust() > MdePkg: GHCB APIC ID retrieval support definitions > OvmfPkg/PlatformPei: Retrieve APIC IDs from the hypervisor > UefiCpuPkg/MpInitLib: Always use AP Create if PcdSevSnpApicIds is set > OvmfPkg/BaseMemEncryptSevLib: Fix uncrustify errors > OvmfPkg/BaseMemEncryptSevLib: Calculate memory size for Page State > Change > MdePkg: Avoid hardcoded value for number of Page State Change entries > OvmfPkg/BaseMemEncryptSevLib: Re-organize page state change support > OvmfPkg/BaseMemEncryptSevLib: Maximize Page State Change efficiency > MdePkg/Register/Amd: Define the SVSM related information > MdePkg/BaseLib: Add a new VMGEXIT instruction invocation for SVSM > UefiCpuPkg/CcSvsmLib: Create the CcSvsmLib library to support an SVSM > UefiPayloadPkg: Prepare UefiPayloadPkg to use the CcSvsmLib library > Ovmfpkg/CcSvsmLib: Create CcSvsmLib to handle SVSM related services > UefiCpuPkg/MpInitLib: Use CcSvsmSnpVmsaRmpAdjust() to set/clear VMSA > OvmfPkg/BaseMemEncryptSevLib: Use CcSvsmSnpPvalidate() to validate > pages > OvmfPkg: Create a calling area used to communicate with the SVSM > OvmfPkg/CcSvsmLib: Add support for the SVSM_CORE_PVALIDATE call > OvmfPkg/BaseMemEncryptSevLib: Maximize Page State Change efficiency > OvmfPkg/CcSvsmLib: Add support for the SVSM create/delete vCPU calls > UefiCpuPkg/MpInitLib: AP creation support under an SVSM > Ovmfpkg/CcExitLib: Provide SVSM discovery support > OvmfPkg/BaseMemEncryptLib: Check for presence of an SVSM when not at > VMPL0 >=20 > MdePkg/MdePkg.dec | = 5 +- > OvmfPkg/OvmfPkg.dec | = 4 + > UefiCpuPkg/UefiCpuPkg.dec | = 5 +- > OvmfPkg/AmdSev/AmdSevX64.dsc | = 1 + > OvmfPkg/Bhyve/BhyveX64.dsc | = 1 + > OvmfPkg/CloudHv/CloudHvX64.dsc | = 1 + > OvmfPkg/IntelTdx/IntelTdxX64.dsc | = 1 + > OvmfPkg/Microvm/MicrovmX64.dsc | = 1 + > OvmfPkg/OvmfPkgIa32.dsc | = 1 + > OvmfPkg/OvmfPkgIa32X64.dsc | = 3 +- > OvmfPkg/OvmfPkgX64.dsc | = 1 + > OvmfPkg/OvmfXen.dsc | = 1 + > UefiCpuPkg/UefiCpuPkg.dsc | = 4 +- > UefiPayloadPkg/UefiPayloadPkg.dsc | = 1 + > OvmfPkg/AmdSev/AmdSevX64.fdf | = 9 +- > OvmfPkg/OvmfPkgX64.fdf | = 3 + > MdePkg/Library/BaseLib/BaseLib.inf | = 2 + > OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLib.inf | = 3 > +- > OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLib.inf | = 3 +- > OvmfPkg/Library/BaseMemEncryptSevLib/SecMemEncryptSevLib.inf | = 3 > +- > OvmfPkg/Library/CcExitLib/CcExitLib.inf | = 3 +- > OvmfPkg/Library/CcExitLib/SecCcExitLib.inf | = 3 +- > OvmfPkg/Library/CcSvsmLib/CcSvsmLib.inf | = 38 ++ > OvmfPkg/PlatformPei/PlatformPei.inf | = 3 + > OvmfPkg/ResetVector/ResetVector.inf | = 2 + > UefiCpuPkg/Library/CcSvsmLibNull/CcSvsmLibNull.inf | = 27 ++ > UefiCpuPkg/Library/MpInitLib/DxeMpInitLib.inf | = 2 + > UefiCpuPkg/Library/MpInitLib/PeiMpInitLib.inf | = 2 + > MdePkg/Include/Library/BaseLib.h | = 39 ++ > MdePkg/Include/Register/Amd/Fam17Msr.h | = 19 +- > MdePkg/Include/Register/Amd/Ghcb.h | = 23 +- > MdePkg/Include/Register/Amd/Msr.h | = 3 +- > MdePkg/Include/Register/Amd/Svsm.h | = 101 ++++ > MdePkg/Include/Register/Amd/SvsmMsr.h | = 35 ++ > OvmfPkg/Include/WorkArea.h | = 9 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/SnpPageStateChange.h | = 6 > +- > UefiCpuPkg/Include/Library/CcSvsmLib.h | = 101 ++++ > UefiCpuPkg/Library/MpInitLib/MpLib.h | = 29 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/DxeSnpSystemRamValidate.c | > 11 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiDxeVirtualMemory.c | = 27 > +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/PeiSnpSystemRamValidate.c | > 22 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/SecSnpSystemRamValidate.c | > 31 +- > OvmfPkg/Library/BaseMemEncryptSevLib/X64/SnpPageStateChangeInternal.c | > 206 ++++---- > OvmfPkg/Library/CcExitLib/CcExitVcHandler.c | = 29 +- > OvmfPkg/Library/CcSvsmLib/CcSvsmLib.c | = 500 > ++++++++++++++++++++ > OvmfPkg/PlatformPei/AmdSev.c | = 102 +++- > UefiCpuPkg/Library/CcSvsmLibNull/CcSvsmLibNull.c | = 108 +++++ > UefiCpuPkg/Library/MpInitLib/Ia32/AmdSev.c | = 21 +- > UefiCpuPkg/Library/MpInitLib/MpLib.c | = 9 +- > UefiCpuPkg/Library/MpInitLib/X64/AmdSev.c | = 134 ++++-- > MdePkg/Library/BaseLib/Ia32/VmgExitSvsm.nasm | = 39 ++ > MdePkg/Library/BaseLib/X64/VmgExitSvsm.nasm | = 94 ++++ > OvmfPkg/ResetVector/ResetVector.nasmb | = 6 +- > OvmfPkg/ResetVector/X64/OvmfSevMetadata.asm | = 11 +- > UefiCpuPkg/Library/CcSvsmLibNull/CcSvsmLibNull.uni | = 13 + > 55 files changed, 1628 insertions(+), 233 deletions(-) > create mode 100644 OvmfPkg/Library/CcSvsmLib/CcSvsmLib.inf > create mode 100644 UefiCpuPkg/Library/CcSvsmLibNull/CcSvsmLibNull.inf > create mode 100644 MdePkg/Include/Register/Amd/Svsm.h > create mode 100644 MdePkg/Include/Register/Amd/SvsmMsr.h > create mode 100644 UefiCpuPkg/Include/Library/CcSvsmLib.h > create mode 100644 OvmfPkg/Library/CcSvsmLib/CcSvsmLib.c > create mode 100644 UefiCpuPkg/Library/CcSvsmLibNull/CcSvsmLibNull.c > create mode 100644 MdePkg/Library/BaseLib/Ia32/VmgExitSvsm.nasm > create mode 100644 MdePkg/Library/BaseLib/X64/VmgExitSvsm.nasm > create mode 100644 UefiCpuPkg/Library/CcSvsmLibNull/CcSvsmLibNull.uni >=20 > -- > 2.42.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#116092): https://edk2.groups.io/g/devel/message/116092 Mute This Topic: https://groups.io/mt/104512925/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-