From: "Ni, Ray" <ray.ni@intel.com>
To: "abner.chang@amd.com" <abner.chang@amd.com>,
"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: Abdul Lateef Attar <abdattar@amd.com>,
Garrett Kirkendall <garrett.kirkendall@amd.com>,
Paul Grimes <paul.grimes@amd.com>,
"Dong, Eric" <eric.dong@intel.com>,
"Kumar, Rahul R" <rahul.r.kumar@intel.com>
Subject: Re: [PATCH V3 2/3] UefiCpuPkg/SmmCpuFeaturesLib: Abstract arch dependent code
Date: Mon, 31 Oct 2022 04:48:04 +0000 [thread overview]
Message-ID: <MWHPR11MB1631D486001DEAD4303BB3168C379@MWHPR11MB1631.namprd11.prod.outlook.com> (raw)
In-Reply-To: <20221031024912.60-2-abner.chang@amd.com>
Reviewed-by: Ray Ni <ray.ni@intel.com>
> -----Original Message-----
> From: abner.chang@amd.com <abner.chang@amd.com>
> Sent: Monday, October 31, 2022 10:49 AM
> To: devel@edk2.groups.io
> Cc: Abdul Lateef Attar <abdattar@amd.com>; Garrett Kirkendall
> <garrett.kirkendall@amd.com>; Paul Grimes <paul.grimes@amd.com>; Dong,
> Eric <eric.dong@intel.com>; Ni, Ray <ray.ni@intel.com>; Kumar, Rahul R
> <rahul.r.kumar@intel.com>
> Subject: [PATCH V3 2/3] UefiCpuPkg/SmmCpuFeaturesLib: Abstract arch
> dependent code
>
> From: Abner Chang <abner.chang@amd.com>
>
> BZ# 4093: Abstract SmmCpuFeaturesLib for sharing common code
>
> This change stripped away the code that can be
> shared with other archs or vendors from Intel
> implementation and put in to the common file,
> leaves the Intel X86 implementation in the
> IntelSmmCpuFeatureLib. Also updates the header
> file and INF file.
>
> Signed-off-by: Abner Chang <abner.chang@amd.com>
> Cc: Abdul Lateef Attar <abdattar@amd.com>
> Cc: Garrett Kirkendall <garrett.kirkendall@amd.com>
> Cc: Paul Grimes <paul.grimes@amd.com>
> Cc: Eric Dong <eric.dong@intel.com>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Rahul Kumar <rahul1.kumar@intel.com>
> ---
> .../SmmCpuFeaturesLib/SmmCpuFeaturesLib.inf | 1 +
> .../SmmCpuFeaturesLibStm.inf | 1 +
> .../StandaloneMmCpuFeaturesLib.inf | 1 +
> .../SmmCpuFeaturesLib/CpuFeaturesLib.h | 6 +
> .../IntelSmmCpuFeaturesLib.c | 206 +----------------
> .../SmmCpuFeaturesLibCommon.c | 216 ++++++++++++++++++
> 6 files changed, 227 insertions(+), 204 deletions(-)
> create mode 100644
> UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
>
> diff --git a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLib.inf
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLib.inf
> index 6254a14698a..9ac7dde78f8 100644
> --- a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLib.inf
> +++ b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLib.inf
> @@ -20,6 +20,7 @@
> CpuFeaturesLib.h
> IntelSmmCpuFeaturesLib.c
> SmmCpuFeaturesLib.c
> + SmmCpuFeaturesLibCommon.c
> SmmCpuFeaturesLibNoStm.c
> TraditionalMmCpuFeaturesLib.c
>
> diff --git
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibStm.inf
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibStm.inf
> index d64d8e66b38..86d367e0a09 100644
> --- a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibStm.inf
> +++ b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibStm.inf
> @@ -20,6 +20,7 @@
> [Sources]
> CpuFeaturesLib.h
> IntelSmmCpuFeaturesLib.c
> + SmmCpuFeaturesLibCommon.c
> SmmStm.c
> SmmStm.h
> TraditionalMmCpuFeaturesLib.c
> diff --git
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/StandaloneMmCpuFeaturesLib.i
> nf
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/StandaloneMmCpuFeaturesLib.i
> nf
> index 5935b3e1fd6..b1f60a55055 100644
> ---
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/StandaloneMmCpuFeaturesLib.i
> nf
> +++
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/StandaloneMmCpuFeaturesLib.i
> nf
> @@ -21,6 +21,7 @@
> [Sources]
> CpuFeaturesLib.h
> IntelSmmCpuFeaturesLib.c
> + SmmCpuFeaturesLibCommon.c
> StandaloneMmCpuFeaturesLib.c
> SmmCpuFeaturesLibNoStm.c
>
> diff --git a/UefiCpuPkg/Library/SmmCpuFeaturesLib/CpuFeaturesLib.h
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/CpuFeaturesLib.h
> index 8a1c2adc5c4..fd3e902547c 100644
> --- a/UefiCpuPkg/Library/SmmCpuFeaturesLib/CpuFeaturesLib.h
> +++ b/UefiCpuPkg/Library/SmmCpuFeaturesLib/CpuFeaturesLib.h
> @@ -9,6 +9,12 @@
> #ifndef CPU_FEATURES_LIB_H_
> #define CPU_FEATURES_LIB_H_
>
> +#include <Library/SmmCpuFeaturesLib.h>
> +#include <Library/BaseLib.h>
> +#include <Library/PcdLib.h>
> +#include <Library/MemoryAllocationLib.h>
> +#include <Library/DebugLib.h>
> +
> /**
> Performs library initialization.
>
> diff --git
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> index 75a0ec8e948..cb4897b21e3 100644
> --- a/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> +++ b/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> @@ -7,16 +7,11 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
>
> **/
>
> -#include <PiMm.h>
> -#include <Library/SmmCpuFeaturesLib.h>
> -#include <Library/BaseLib.h>
> +#include "CpuFeaturesLib.h"
> +
> #include <Library/MtrrLib.h>
> -#include <Library/PcdLib.h>
> -#include <Library/MemoryAllocationLib.h>
> -#include <Library/DebugLib.h>
> #include <Register/Intel/Cpuid.h>
> #include <Register/Intel/SmramSaveStateMap.h>
> -#include "CpuFeaturesLib.h"
>
> //
> // Machine Specific Registers (MSRs)
> @@ -287,64 +282,6 @@ SmmCpuFeaturesInitializeProcessor (
> FinishSmmCpuFeaturesInitializeProcessor ();
> }
>
> -/**
> - This function updates the SMRAM save state on the currently executing
> CPU
> - to resume execution at a specific address after an RSM instruction. This
> - function must evaluate the SMRAM save state to determine the execution
> mode
> - the RSM instruction resumes and update the resume execution address
> with
> - either NewInstructionPointer32 or NewInstructionPoint. The auto HALT
> restart
> - flag in the SMRAM save state must always be cleared. This function returns
> - the value of the instruction pointer from the SMRAM save state that was
> - replaced. If this function returns 0, then the SMRAM save state was not
> - modified.
> -
> - This function is called during the very first SMI on each CPU after
> - SmmCpuFeaturesInitializeProcessor() to set a flag in normal execution
> mode
> - to signal that the SMBASE of each CPU has been updated before the
> default
> - SMBASE address is used for the first SMI to the next CPU.
> -
> - @param[in] CpuIndex The index of the CPU to hook. The value
> - must be between 0 and the NumberOfCpus
> - field in the System Management System Table
> - (SMST).
> - @param[in] CpuState Pointer to SMRAM Save State Map for the
> - currently executing CPU.
> - @param[in] NewInstructionPointer32 Instruction pointer to use if
> resuming to
> - 32-bit execution mode from 64-bit SMM.
> - @param[in] NewInstructionPointer Instruction pointer to use if resuming
> to
> - same execution mode as SMM.
> -
> - @retval 0 This function did modify the SMRAM save state.
> - @retval > 0 The original instruction pointer value from the SMRAM save
> state
> - before it was replaced.
> -**/
> -UINT64
> -EFIAPI
> -SmmCpuFeaturesHookReturnFromSmm (
> - IN UINTN CpuIndex,
> - IN SMRAM_SAVE_STATE_MAP *CpuState,
> - IN UINT64 NewInstructionPointer32,
> - IN UINT64 NewInstructionPointer
> - )
> -{
> - return 0;
> -}
> -
> -/**
> - Hook point in normal execution mode that allows the one CPU that was
> elected
> - as monarch during System Management Mode initialization to perform
> additional
> - initialization actions immediately after all of the CPUs have processed their
> - first SMI and called SmmCpuFeaturesInitializeProcessor() relocating
> SMBASE
> - into a buffer in SMRAM and called
> SmmCpuFeaturesHookReturnFromSmm().
> -**/
> -VOID
> -EFIAPI
> -SmmCpuFeaturesSmmRelocationComplete (
> - VOID
> - )
> -{
> -}
> -
> /**
> Determines if MTRR registers must be configured to set SMRAM cache-
> ability
> when executing in System Management Mode.
> @@ -414,48 +351,6 @@ SmmCpuFeaturesRendezvousEntry (
> }
> }
>
> -/**
> - Processor specific hook point each time a CPU exits System Management
> Mode.
> -
> - @param[in] CpuIndex The index of the CPU that is exiting SMM. The value
> must
> - be between 0 and the NumberOfCpus field in the System
> - Management System Table (SMST).
> -**/
> -VOID
> -EFIAPI
> -SmmCpuFeaturesRendezvousExit (
> - IN UINTN CpuIndex
> - )
> -{
> -}
> -
> -/**
> - Check to see if an SMM register is supported by a specified CPU.
> -
> - @param[in] CpuIndex The index of the CPU to check for SMM register
> support.
> - The value must be between 0 and the NumberOfCpus field
> - in the System Management System Table (SMST).
> - @param[in] RegName Identifies the SMM register to check for support.
> -
> - @retval TRUE The SMM register specified by RegName is supported by
> the CPU
> - specified by CpuIndex.
> - @retval FALSE The SMM register specified by RegName is not supported
> by the
> - CPU specified by CpuIndex.
> -**/
> -BOOLEAN
> -EFIAPI
> -SmmCpuFeaturesIsSmmRegisterSupported (
> - IN UINTN CpuIndex,
> - IN SMM_REG_NAME RegName
> - )
> -{
> - if (FeaturePcdGet (PcdSmmFeatureControlEnable) && (RegName ==
> SmmRegFeatureControl)) {
> - return TRUE;
> - }
> -
> - return FALSE;
> -}
> -
> /**
> Returns the current value of the SMM register for the specified CPU.
> If the SMM register is not supported, then 0 is returned.
> @@ -506,100 +401,3 @@ SmmCpuFeaturesSetSmmRegister (
> }
> }
>
> -/**
> - Read an SMM Save State register on the target processor. If this function
> - returns EFI_UNSUPPORTED, then the caller is responsible for reading the
> - SMM Save Sate register.
> -
> - @param[in] CpuIndex The index of the CPU to read the SMM Save State.
> The
> - value must be between 0 and the NumberOfCpus field in
> - the System Management System Table (SMST).
> - @param[in] Register The SMM Save State register to read.
> - @param[in] Width The number of bytes to read from the CPU save state.
> - @param[out] Buffer Upon return, this holds the CPU register value read
> - from the save state.
> -
> - @retval EFI_SUCCESS The register was read from Save State.
> - @retval EFI_INVALID_PARAMETER Buffer is NULL.
> - @retval EFI_UNSUPPORTED This function does not support reading
> Register.
> -
> -**/
> -EFI_STATUS
> -EFIAPI
> -SmmCpuFeaturesReadSaveStateRegister (
> - IN UINTN CpuIndex,
> - IN EFI_SMM_SAVE_STATE_REGISTER Register,
> - IN UINTN Width,
> - OUT VOID *Buffer
> - )
> -{
> - return EFI_UNSUPPORTED;
> -}
> -
> -/**
> - Writes an SMM Save State register on the target processor. If this function
> - returns EFI_UNSUPPORTED, then the caller is responsible for writing the
> - SMM Save Sate register.
> -
> - @param[in] CpuIndex The index of the CPU to write the SMM Save State.
> The
> - value must be between 0 and the NumberOfCpus field in
> - the System Management System Table (SMST).
> - @param[in] Register The SMM Save State register to write.
> - @param[in] Width The number of bytes to write to the CPU save state.
> - @param[in] Buffer Upon entry, this holds the new CPU register value.
> -
> - @retval EFI_SUCCESS The register was written to Save State.
> - @retval EFI_INVALID_PARAMETER Buffer is NULL.
> - @retval EFI_UNSUPPORTED This function does not support writing
> Register.
> -**/
> -EFI_STATUS
> -EFIAPI
> -SmmCpuFeaturesWriteSaveStateRegister (
> - IN UINTN CpuIndex,
> - IN EFI_SMM_SAVE_STATE_REGISTER Register,
> - IN UINTN Width,
> - IN CONST VOID *Buffer
> - )
> -{
> - return EFI_UNSUPPORTED;
> -}
> -
> -/**
> - This function is hook point called after the
> gEfiSmmReadyToLockProtocolGuid
> - notification is completely processed.
> -**/
> -VOID
> -EFIAPI
> -SmmCpuFeaturesCompleteSmmReadyToLock (
> - VOID
> - )
> -{
> -}
> -
> -/**
> - This API provides a method for a CPU to allocate a specific region for storing
> page tables.
> -
> - This API can be called more once to allocate memory for page tables.
> -
> - Allocates the number of 4KB pages of type EfiRuntimeServicesData and
> returns a pointer to the
> - allocated buffer. The buffer returned is aligned on a 4KB boundary. If
> Pages is 0, then NULL
> - is returned. If there is not enough memory remaining to satisfy the
> request, then NULL is
> - returned.
> -
> - This function can also return NULL if there is no preference on where the
> page tables are allocated in SMRAM.
> -
> - @param Pages The number of 4 KB pages to allocate.
> -
> - @return A pointer to the allocated buffer for page tables.
> - @retval NULL Fail to allocate a specific region for storing page tables,
> - Or there is no preference on where the page tables are allocated
> in SMRAM.
> -
> -**/
> -VOID *
> -EFIAPI
> -SmmCpuFeaturesAllocatePageTableMemory (
> - IN UINTN Pages
> - )
> -{
> - return NULL;
> -}
> diff --git
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
> new file mode 100644
> index 00000000000..7777e52740e
> --- /dev/null
> +++
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
> @@ -0,0 +1,216 @@
> +/** @file
> +Implementation shared across all library instances.
> +
> +Copyright (c) 2010 - 2019, Intel Corporation. All rights reserved.<BR>
> +Copyright (c) Microsoft Corporation.<BR>
> +SPDX-License-Identifier: BSD-2-Clause-Patent
> +
> +**/
> +
> +#include <PiMm.h>
> +#include <Library/SmmCpuFeaturesLib.h>
> +#include <Library/BaseLib.h>
> +#include <Library/MtrrLib.h>
> +#include <Library/PcdLib.h>
> +#include <Library/MemoryAllocationLib.h>
> +#include <Library/DebugLib.h>
> +
> +#include "CpuFeaturesLib.h"
> +
> +/**
> + This function updates the SMRAM save state on the currently executing
> CPU
> + to resume execution at a specific address after an RSM instruction. This
> + function must evaluate the SMRAM save state to determine the execution
> mode
> + the RSM instruction resumes and update the resume execution address
> with
> + either NewInstructionPointer32 or NewInstructionPoint. The auto HALT
> restart
> + flag in the SMRAM save state must always be cleared. This function
> returns
> + the value of the instruction pointer from the SMRAM save state that was
> + replaced. If this function returns 0, then the SMRAM save state was not
> + modified.
> +
> + This function is called during the very first SMI on each CPU after
> + SmmCpuFeaturesInitializeProcessor() to set a flag in normal execution
> mode
> + to signal that the SMBASE of each CPU has been updated before the
> default
> + SMBASE address is used for the first SMI to the next CPU.
> +
> + @param[in] CpuIndex The index of the CPU to hook. The value
> + must be between 0 and the NumberOfCpus
> + field in the System Management System Table
> + (SMST).
> + @param[in] CpuState Pointer to SMRAM Save State Map for the
> + currently executing CPU.
> + @param[in] NewInstructionPointer32 Instruction pointer to use if
> resuming to
> + 32-bit execution mode from 64-bit SMM.
> + @param[in] NewInstructionPointer Instruction pointer to use if resuming
> to
> + same execution mode as SMM.
> +
> + @retval 0 This function did modify the SMRAM save state.
> + @retval > 0 The original instruction pointer value from the SMRAM save
> state
> + before it was replaced.
> +**/
> +UINT64
> +EFIAPI
> +SmmCpuFeaturesHookReturnFromSmm (
> + IN UINTN CpuIndex,
> + IN SMRAM_SAVE_STATE_MAP *CpuState,
> + IN UINT64 NewInstructionPointer32,
> + IN UINT64 NewInstructionPointer
> + )
> +{
> + return 0;
> +}
> +
> +/**
> + Hook point in normal execution mode that allows the one CPU that was
> elected
> + as monarch during System Management Mode initialization to perform
> additional
> + initialization actions immediately after all of the CPUs have processed their
> + first SMI and called SmmCpuFeaturesInitializeProcessor() relocating
> SMBASE
> + into a buffer in SMRAM and called
> SmmCpuFeaturesHookReturnFromSmm().
> +**/
> +VOID
> +EFIAPI
> +SmmCpuFeaturesSmmRelocationComplete (
> + VOID
> + )
> +{
> +}
> +
> +/**
> + Processor specific hook point each time a CPU exits System Management
> Mode.
> +
> + @param[in] CpuIndex The index of the CPU that is exiting SMM. The
> value must
> + be between 0 and the NumberOfCpus field in the System
> + Management System Table (SMST).
> +**/
> +VOID
> +EFIAPI
> +SmmCpuFeaturesRendezvousExit (
> + IN UINTN CpuIndex
> + )
> +{
> +}
> +
> +/**
> + Check to see if an SMM register is supported by a specified CPU.
> +
> + @param[in] CpuIndex The index of the CPU to check for SMM register
> support.
> + The value must be between 0 and the NumberOfCpus field
> + in the System Management System Table (SMST).
> + @param[in] RegName Identifies the SMM register to check for support.
> +
> + @retval TRUE The SMM register specified by RegName is supported by
> the CPU
> + specified by CpuIndex.
> + @retval FALSE The SMM register specified by RegName is not supported
> by the
> + CPU specified by CpuIndex.
> +**/
> +BOOLEAN
> +EFIAPI
> +SmmCpuFeaturesIsSmmRegisterSupported (
> + IN UINTN CpuIndex,
> + IN SMM_REG_NAME RegName
> + )
> +{
> + if (FeaturePcdGet (PcdSmmFeatureControlEnable) && (RegName ==
> SmmRegFeatureControl)) {
> + return TRUE;
> + }
> +
> + return FALSE;
> +}
> +
> +/**
> + Read an SMM Save State register on the target processor. If this function
> + returns EFI_UNSUPPORTED, then the caller is responsible for reading the
> + SMM Save Sate register.
> +
> + @param[in] CpuIndex The index of the CPU to read the SMM Save State.
> The
> + value must be between 0 and the NumberOfCpus field in
> + the System Management System Table (SMST).
> + @param[in] Register The SMM Save State register to read.
> + @param[in] Width The number of bytes to read from the CPU save
> state.
> + @param[out] Buffer Upon return, this holds the CPU register value read
> + from the save state.
> +
> + @retval EFI_SUCCESS The register was read from Save State.
> + @retval EFI_INVALID_PARAMETER Buffer is NULL.
> + @retval EFI_UNSUPPORTED This function does not support reading
> Register.
> +
> +**/
> +EFI_STATUS
> +EFIAPI
> +SmmCpuFeaturesReadSaveStateRegister (
> + IN UINTN CpuIndex,
> + IN EFI_SMM_SAVE_STATE_REGISTER Register,
> + IN UINTN Width,
> + OUT VOID *Buffer
> + )
> +{
> + return EFI_UNSUPPORTED;
> +}
> +
> +/**
> + Writes an SMM Save State register on the target processor. If this function
> + returns EFI_UNSUPPORTED, then the caller is responsible for writing the
> + SMM Save Sate register.
> +
> + @param[in] CpuIndex The index of the CPU to write the SMM Save State.
> The
> + value must be between 0 and the NumberOfCpus field in
> + the System Management System Table (SMST).
> + @param[in] Register The SMM Save State register to write.
> + @param[in] Width The number of bytes to write to the CPU save state.
> + @param[in] Buffer Upon entry, this holds the new CPU register value.
> +
> + @retval EFI_SUCCESS The register was written to Save State.
> + @retval EFI_INVALID_PARAMETER Buffer is NULL.
> + @retval EFI_UNSUPPORTED This function does not support writing
> Register.
> +**/
> +EFI_STATUS
> +EFIAPI
> +SmmCpuFeaturesWriteSaveStateRegister (
> + IN UINTN CpuIndex,
> + IN EFI_SMM_SAVE_STATE_REGISTER Register,
> + IN UINTN Width,
> + IN CONST VOID *Buffer
> + )
> +{
> + return EFI_UNSUPPORTED;
> +}
> +
> +/**
> + This function is hook point called after the
> gEfiSmmReadyToLockProtocolGuid
> + notification is completely processed.
> +**/
> +VOID
> +EFIAPI
> +SmmCpuFeaturesCompleteSmmReadyToLock (
> + VOID
> + )
> +{
> +}
> +
> +/**
> + This API provides a method for a CPU to allocate a specific region for
> storing page tables.
> +
> + This API can be called more once to allocate memory for page tables.
> +
> + Allocates the number of 4KB pages of type EfiRuntimeServicesData and
> returns a pointer to the
> + allocated buffer. The buffer returned is aligned on a 4KB boundary. If
> Pages is 0, then NULL
> + is returned. If there is not enough memory remaining to satisfy the
> request, then NULL is
> + returned.
> +
> + This function can also return NULL if there is no preference on where the
> page tables are allocated in SMRAM.
> +
> + @param Pages The number of 4 KB pages to allocate.
> +
> + @return A pointer to the allocated buffer for page tables.
> + @retval NULL Fail to allocate a specific region for storing page tables,
> + Or there is no preference on where the page tables are allocated
> in SMRAM.
> +
> +**/
> +VOID *
> +EFIAPI
> +SmmCpuFeaturesAllocatePageTableMemory (
> + IN UINTN Pages
> + )
> +{
> + return NULL;
> +}
> --
> 2.37.1.windows.1
next prev parent reply other threads:[~2022-10-31 4:48 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-10-31 2:49 [PATCH V3 1/3] UefiCpuPkg/SmmCpuFeaturesLib: Rename the common C file Chang, Abner
2022-10-31 2:49 ` [PATCH V3 2/3] UefiCpuPkg/SmmCpuFeaturesLib: Abstract arch dependent code Chang, Abner
2022-10-31 4:48 ` Ni, Ray [this message]
2022-10-31 2:49 ` [PATCH V3 3/3] UefiCpuPkg/SmmCpuFeaturesLib: Clean up header file inclusion in SmmStm.c Chang, Abner
2022-10-31 4:48 ` Ni, Ray
2022-10-31 4:47 ` [edk2-devel] [PATCH V3 1/3] UefiCpuPkg/SmmCpuFeaturesLib: Rename the common C file Ni, Ray
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=MWHPR11MB1631D486001DEAD4303BB3168C379@MWHPR11MB1631.namprd11.prod.outlook.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox