From: "Lendacky, Thomas" <thomas.lendacky@amd.com>
To: "Ni, Ray" <ray.ni@intel.com>,
"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: "Justen, Jordan L" <jordan.l.justen@intel.com>,
Laszlo Ersek <lersek@redhat.com>,
Ard Biesheuvel <ard.biesheuvel@linaro.org>,
"Kinney, Michael D" <michael.d.kinney@intel.com>,
"Gao, Liming" <liming.gao@intel.com>,
"Dong, Eric" <eric.dong@intel.com>,
"Singh, Brijesh" <brijesh.singh@amd.com>
Subject: Re: [RFC PATCH v2 42/44] UefiCpuPkg/MpInitLib: Prepare SEV-ES guest APs for OS use
Date: Fri, 13 Dec 2019 10:35:50 -0600 [thread overview]
Message-ID: <c84bf71a-5f13-16b7-bf14-6bc42169d18f@amd.com> (raw)
In-Reply-To: <734D49CCEBEEF84792F5B80ED585239D5C399C13@SHSMSX104.ccr.corp.intel.com>
On 12/12/19 2:24 AM, Ni, Ray wrote:
> Tom,
> why this cannot be done as today's code in ExitBS callback?
> Because it should be done after interrupt is disabled?
The problem comes from the calls during and after the ExitBS callbacks are
performed. Part of the finalization support is to set the AP jump table in
the GHCB MSR and to copy/move AP reset code for use when the OS starts the
APs. The GHCB MSR will now not point to an actual GHCB, so we can't take
any more #VCs at that point. When I look at the #VC count when running
through CoreExitBootServices() in MdeModulePkg/Core/Dxe/DxeMain/DxeMain.c
(with debug statements enabled), I see the following #VC counts:
CoreNotifySignalList() = 12
MemoryProtectionExitBootServicesCallback() = 1908
If I disable serial debug (don't build with -DDEBUG_ON_SERIAL_PORT=TRUE),
I see the following #VC counts:
CoreNotifySignalList() = 2
MemoryProtectionExitBootServicesCallback() = 234
So even if I could ensure that an SEV-ES callback was the last callback
in CoreNotifySignalList(), MemoryProtectionExitBootServicesCallback() will
generate #VCs so we need to perform the finalization (or at least the GHCB
MSR update) after that.
I'm looking at whether I can eliminate the need for the finalization
support. I might be able to perform the copy/move of the AP reset code
in MpInitChangeApLoopCallback() - I just need to be careful that all APs
are out of the area of code that will be updated. And if I implement a
new GHCB protocol for registering the jump page, I can leave the GHCB MSR
in tact. Just a concept at the moment, but it may be possible.
Thanks,
Tom
>
>> -----Original Message-----
>> From: Lendacky, Thomas <Thomas.Lendacky@amd.com>
>> Sent: Friday, September 20, 2019 3:53 AM
>> To: devel@edk2.groups.io
>> Cc: Justen, Jordan L <jordan.l.justen@intel.com>; Laszlo Ersek <lersek@redhat.com>; Ard Biesheuvel
>> <ard.biesheuvel@linaro.org>; Kinney, Michael D <michael.d.kinney@intel.com>; Gao, Liming <liming.gao@intel.com>; Dong,
>> Eric <eric.dong@intel.com>; Ni, Ray <ray.ni@intel.com>; Singh, Brijesh <brijesh.singh@amd.com>
>> Subject: [RFC PATCH v2 42/44] UefiCpuPkg/MpInitLib: Prepare SEV-ES guest APs for OS use
>>
>> From: Tom Lendacky <thomas.lendacky@amd.com>
>>
>> BZ: https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugzilla.tianocore.org%2Fshow_bug.cgi%3Fid%3D2198&data=02%7C01%7CThomas.Lendacky%40amd.com%7Ce9dfe136268e4b3b8bd308d77edca950%7C3dd8961fe4884e608e11a82d994e183d%7C0%7C0%7C637117358507708564&sdata=o7EsL8JXEpjg8sixUFshm3yIoCHi8T7dyCLEPNT1bqQ%3D&reserved=0
>>
>> Before UEFI transfers control to the OS, it must park the AP. This is
>> done using the AsmRelocateApLoop function to transition into 32-bit
>> non-paging mode. For an SEV-ES guest, a few additional things must be
>> done:
>> - AsmRelocateApLoop must be updated to support SEV-ES. This means
>> performing a VMGEXIT AP Reset Hold instead of an MWAIT or HLT loop.
>> - Since the AP must transition to real mode, a small routine is copied
>> to the WakeupBuffer area. Since the WakeupBuffer will be used by
>> the AP during OS booting, it must be placed in reserved memory.
>> Additionally, the AP stack must be located where it can be accessed
>> in real mode.
>> - Once the AP is in real mode it will transfer control to the
>> destination specified by the OS in the SEV-ES AP Jump Table. The
>> SEV-ES AP Jump Table address is communicated to the OS using the BSP
>> GHCB MSR.
>>
>> Cc: Eric Dong <eric.dong@intel.com>
>> Cc: Ray Ni <ray.ni@intel.com>
>> Cc: Laszlo Ersek <lersek@redhat.com>
>> Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
>> ---
>> UefiCpuPkg/Library/MpInitLib/MpLib.h | 8 +-
>> UefiCpuPkg/Library/MpInitLib/DxeMpLib.c | 54 ++++++-
>> UefiCpuPkg/Library/MpInitLib/X64/MpFuncs.nasm | 134 ++++++++++++++++--
>> 3 files changed, 176 insertions(+), 20 deletions(-)
>>
>> diff --git a/UefiCpuPkg/Library/MpInitLib/MpLib.h b/UefiCpuPkg/Library/MpInitLib/MpLib.h
>> index 5966510d4a1b..2d38a0e85a40 100644
>> --- a/UefiCpuPkg/Library/MpInitLib/MpLib.h
>> +++ b/UefiCpuPkg/Library/MpInitLib/MpLib.h
>> @@ -277,7 +277,8 @@ struct _CPU_MP_DATA {
>> UINT64 GhcbBase;
>> };
>>
>> -#define AP_RESET_STACK_SIZE 64
>> +#define AP_SAFE_STACK_SIZE 128
>> +#define AP_RESET_STACK_SIZE AP_SAFE_STACK_SIZE
>>
>> typedef union {
>> struct {
>> @@ -331,8 +332,11 @@ VOID
>> IN BOOLEAN MwaitSupport,
>> IN UINTN ApTargetCState,
>> IN UINTN PmCodeSegment,
>> + IN UINTN Pm16CodeSegment,
>> IN UINTN TopOfApStack,
>> - IN UINTN NumberToFinish
>> + IN UINTN NumberToFinish,
>> + IN UINTN SevEsAPJumpTable,
>> + IN UINTN WakeupBuffer
>> );
>>
>> /**
>> diff --git a/UefiCpuPkg/Library/MpInitLib/DxeMpLib.c b/UefiCpuPkg/Library/MpInitLib/DxeMpLib.c
>> index 16603ef3f20e..cf53b5026aa4 100644
>> --- a/UefiCpuPkg/Library/MpInitLib/DxeMpLib.c
>> +++ b/UefiCpuPkg/Library/MpInitLib/DxeMpLib.c
>> @@ -18,7 +18,6 @@
>> #include <Protocol/Timer.h>
>>
>> #define AP_CHECK_INTERVAL (EFI_TIMER_PERIOD_MILLISECONDS (100))
>> -#define AP_SAFE_STACK_SIZE 128
>>
>> CPU_MP_DATA *mCpuMpData = NULL;
>> EFI_EVENT mCheckAllApsEvent = NULL;
>> @@ -86,6 +85,13 @@ GetWakeupBuffer (
>> {
>> EFI_STATUS Status;
>> EFI_PHYSICAL_ADDRESS StartAddress;
>> + EFI_MEMORY_TYPE MemoryType;
>> +
>> + if (PcdGetBool (PcdSevEsActive)) {
>> + MemoryType = EfiReservedMemoryType;
>> + } else {
>> + MemoryType = EfiBootServicesData;
>> + }
>>
>> //
>> // Try to allocate buffer below 1M for waking vector.
>> @@ -98,7 +104,7 @@ GetWakeupBuffer (
>> StartAddress = 0x88000;
>> Status = gBS->AllocatePages (
>> AllocateMaxAddress,
>> - EfiBootServicesData,
>> + MemoryType,
>> EFI_SIZE_TO_PAGES (WakeupBufferSize),
>> &StartAddress
>> );
>> @@ -331,17 +337,26 @@ RelocateApLoop (
>> BOOLEAN MwaitSupport;
>> ASM_RELOCATE_AP_LOOP AsmRelocateApLoopFunc;
>> UINTN ProcessorNumber;
>> + UINTN StackStart;
>>
>> MpInitLibWhoAmI (&ProcessorNumber);
>> CpuMpData = GetCpuMpData ();
>> MwaitSupport = IsMwaitSupport ();
>> + if (CpuMpData->SevEsActive) {
>> + StackStart = CpuMpData->SevEsAPResetStackStart;
>> + } else {
>> + StackStart = mReservedTopOfApStack;
>> + }
>> AsmRelocateApLoopFunc = (ASM_RELOCATE_AP_LOOP) (UINTN) mReservedApLoopFunc;
>> AsmRelocateApLoopFunc (
>> MwaitSupport,
>> CpuMpData->ApTargetCState,
>> CpuMpData->PmCodeSegment,
>> - mReservedTopOfApStack - ProcessorNumber * AP_SAFE_STACK_SIZE,
>> - (UINTN) &mNumberToFinish
>> + CpuMpData->Pm16CodeSegment,
>> + StackStart - ProcessorNumber * AP_SAFE_STACK_SIZE,
>> + (UINTN) &mNumberToFinish,
>> + CpuMpData->SevEsAPBuffer,
>> + CpuMpData->WakeupBuffer
>> );
>> //
>> // It should never reach here
>> @@ -895,9 +910,34 @@ MpFinalize (
>> IN CPU_MP_DATA *CpuMpData
>> )
>> {
>> - //
>> - // DXE phase will do this transition, but just return EFI_SUCCESS for now.
>> - //
>> + if (CpuMpData->SevEsActive) {
>> + //
>> + // Perform SEV-ES specific finalization
>> + //
>> + if (CpuMpData->WakeupBuffer == (UINTN) -1) {
>> + //
>> + // No APs parked in UEFI, clear the GHCB
>> + //
>> + AsmWriteMsr64 (MSR_SEV_ES_GHCB, 0);
>> + } else {
>> + //
>> + // Re-use reserved memory area below 1MB from WakeupBuffer
>> + //
>> + CopyMem (
>> + (VOID *) CpuMpData->WakeupBuffer,
>> + (VOID *) CpuMpData->AddressMap.RendezvousFunnelAddress +
>> + CpuMpData->AddressMap.SwitchToRealPM16ModeOffset,
>> + CpuMpData->AddressMap.SwitchToRealPM16ModeSize
>> + );
>> +
>> + //
>> + // Point the GHCB at the AP jump table to communicate the address to
>> + // the booting system.
>> + //
>> + AsmWriteMsr64 (MSR_SEV_ES_GHCB, (CpuMpData->SevEsAPBuffer) | 0x03);
>> + }
>> + }
>> +
>> return EFI_SUCCESS;
>> }
>>
>> diff --git a/UefiCpuPkg/Library/MpInitLib/X64/MpFuncs.nasm b/UefiCpuPkg/Library/MpInitLib/X64/MpFuncs.nasm
>> index bbc7432740ff..3cb0cd5bb306 100644
>> --- a/UefiCpuPkg/Library/MpInitLib/X64/MpFuncs.nasm
>> +++ b/UefiCpuPkg/Library/MpInitLib/X64/MpFuncs.nasm
>> @@ -465,6 +465,10 @@ BITS 16
>> ; - IP for Real Mode (two bytes)
>> ; - CS for Real Mode (two bytes)
>> ;
>> + ; This label is also used with AsmRelocateApLoop. During MP finalization,
>> + ; the code from PM16Mode to SwitchToRealProcEnd is copied to the start of
>> + ; the WakeupBuffer, allowing a parked AP to be booted by an OS.
>> + ;
>> PM16Mode:
>> mov eax, cr0 ; Read CR0
>> btr eax, 0 ; Set PE=0
>> @@ -487,32 +491,95 @@ PM16Mode:
>> SwitchToRealProcEnd:
>>
>> ;-------------------------------------------------------------------------------------
>> -; AsmRelocateApLoop (MwaitSupport, ApTargetCState, PmCodeSegment, TopOfApStack, CountTofinish);
>> +; AsmRelocateApLoop (MwaitSupport, ApTargetCState, PmCodeSegment, Pm16CodeSegment, TopOfApStack,
>> CountTofinish, SevEsAPJumpTable, WakeupBuffer);
>> ;-------------------------------------------------------------------------------------
>> global ASM_PFX(AsmRelocateApLoop)
>> ASM_PFX(AsmRelocateApLoop):
>> AsmRelocateApLoopStart:
>> BITS 64
>> + cmp qword [rsp + 56], 0
>> + je NoSevEs
>> +
>> + ;
>> + ; Perform some SEV-ES related setup before leaving 64-bit mode
>> + ;
>> + push rcx
>> + push rdx
>> +
>> + ;
>> + ; Get the RDX reset value using CPUID
>> + ;
>> + mov rax, 1
>> + cpuid
>> + mov rsi, rax ; Save off the reset value for RDX
>> +
>> + ;
>> + ; Prepare the GHCB for the AP_HLT_LOOP VMGEXIT call
>> + ; - Must be done while in 64-bit long mode so that writes to
>> + ; the GHCB memory will be unencrypted.
>> + ; - No NAE events can be generated once this is set otherwise
>> + ; the AP_RESET_HOLD SW_EXITCODE will be overwritten.
>> + ;
>> + mov rcx, 0xc0010130
>> + rdmsr ; Retrieve current GHCB address
>> + shl rdx, 32
>> + or rdx, rax
>> +
>> + mov rdi, rdx
>> + xor rax, rax
>> + mov rcx, 0x800
>> + shr rcx, 3
>> + rep stosq ; Clear the GHCB
>> +
>> + mov rax, 0x80000004 ; VMGEXIT AP_RESET_HOLD
>> + mov [rdx + 0x390], rax
>> +
>> + pop rdx
>> + pop rcx
>> +
>> +NoSevEs:
>> cli ; Disable interrupt before switching to 32-bit mode
>> - mov rax, [rsp + 40] ; CountTofinish
>> + mov rax, [rsp + 48] ; CountTofinish
>> lock dec dword [rax] ; (*CountTofinish)--
>> - mov rsp, r9
>> - push rcx
>> - push rdx
>>
>> - lea rsi, [PmEntry] ; rsi <- The start address of transition code
>> + mov rax, [rsp + 56] ; SevEsAPJumpTable
>> + mov rbx, [rsp + 64] ; WakeupBuffer
>> + mov rsp, [rsp + 40] ; TopOfApStack
>> +
>> + push rax ; Save SevEsAPJumpTable
>> + push rbx ; Save WakeupBuffer
>> + push r9 ; Save Pm16CodeSegment
>> + push rcx ; Save MwaitSupport
>> + push rdx ; Save ApTargetCState
>> +
>> + lea rax, [PmEntry] ; rax <- The start address of transition code
>>
>> push r8
>> - push rsi
>> - DB 0x48
>> - retf
>> + push rax
>> +
>> + ;
>> + ; Clear R8 - R15, for reset, before going into 32-bit mode
>> + ;
>> + xor r8, r8
>> + xor r9, r9
>> + xor r10, r10
>> + xor r11, r11
>> + xor r12, r12
>> + xor r13, r13
>> + xor r14, r14
>> + xor r15, r15
>> +
>> + ;
>> + ; Far return into 32-bit mode
>> + ;
>> +o64 retf
>> +
>> BITS 32
>> PmEntry:
>> mov eax, cr0
>> btr eax, 31 ; Clear CR0.PG
>> mov cr0, eax ; Disable paging and caches
>>
>> - mov ebx, edx ; Save EntryPoint to rbx, for rdmsr will overwrite rdx
>> mov ecx, 0xc0000080
>> rdmsr
>> and ah, ~ 1 ; Clear LME
>> @@ -525,6 +592,8 @@ PmEntry:
>> add esp, 4
>> pop ecx,
>> add esp, 4
>> +
>> +MwaitCheck:
>> cmp cl, 1 ; Check mwait-monitor support
>> jnz HltLoop
>> mov ebx, edx ; Save C-State to ebx
>> @@ -538,10 +607,53 @@ MwaitLoop:
>> shl eax, 4
>> mwait
>> jmp MwaitLoop
>> +
>> HltLoop:
>> + pop edx ; PM16CodeSegment
>> + add esp, 4
>> + pop ebx ; WakeupBuffer
>> + add esp, 4
>> + pop eax ; SevEsAPJumpTable
>> + add esp, 4
>> + cmp eax, 0 ; Check for SEV-ES
>> + je DoHlt
>> +
>> + cli
>> + ;
>> + ; SEV-ES is active, use VMGEXIT (GHCB information already
>> + ; set by caller)
>> + ;
>> + ; VMGEXIT is rep vmmcall
>> + ;
>> + db 0xf3
>> + db 0x0f
>> + db 0x01
>> + db 0xd9
>> +
>> + ;
>> + ; Back from VMGEXIT AP_HLT_LOOP
>> + ; Push the FLAGS/CS/IP values to use
>> + ;
>> + push word 0x0002 ; EFLAGS
>> + xor ecx, ecx
>> + mov cx, [eax + 2] ; CS
>> + push cx
>> + mov cx, [eax] ; IP
>> + push cx
>> + push word 0x0000 ; For alignment, will be discarded
>> +
>> + push edx
>> + push ebx
>> +
>> + mov edx, esi ; Restore RDX reset value
>> +
>> + retf
>> +
>> +DoHlt:
>> cli
>> hlt
>> - jmp HltLoop
>> + jmp DoHlt
>> +
>> BITS 64
>> AsmRelocateApLoopEnd:
>>
>> --
>> 2.17.1
>
next prev parent reply other threads:[~2019-12-13 16:35 UTC|newest]
Thread overview: 106+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-09-19 19:52 [RFC PATCH v2 00/44] SEV-ES guest support Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 01/44] MdePkg: Create PCDs to be used in support of SEV-ES Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 02/44] OvmfPkg/MemEncryptSevLib: Add an SEV-ES guest indicator function Lendacky, Thomas
2019-09-24 11:53 ` [edk2-devel] " Laszlo Ersek
2019-09-19 19:52 ` [RFC PATCH v2 03/44] OvmfPkg: Add support to perform SEV-ES initialization Lendacky, Thomas
2019-09-24 11:59 ` [edk2-devel] " Laszlo Ersek
2019-09-24 14:43 ` Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 04/44] OvmfPkg/ResetVector: Add support for a 32-bit SEV check Lendacky, Thomas
2019-09-24 13:42 ` [edk2-devel] " Laszlo Ersek
2019-09-24 13:50 ` Laszlo Ersek
2019-09-24 18:57 ` Lendacky, Thomas
2019-09-25 14:45 ` Laszlo Ersek
2019-09-30 19:29 ` Laszlo Ersek
2019-09-30 19:55 ` Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 05/44] MdePkg: Add the MSR definition for the GHCB register Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 06/44] OvmfPkg: Create a GHCB page for use during Sec phase Lendacky, Thomas
2019-09-25 8:09 ` [edk2-devel] " Laszlo Ersek
2019-09-25 17:36 ` Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 07/44] OvmfPkg/PlatformPei: Reserve GHCB-related areas if S3 is supported Lendacky, Thomas
2019-09-25 8:27 ` [edk2-devel] " Laszlo Ersek
2019-09-25 17:52 ` Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 08/44] OvmfPkg: Create GHCB pages for use during Pei and Dxe phase Lendacky, Thomas
2019-09-26 8:00 ` [edk2-devel] " Laszlo Ersek
2019-09-26 14:00 ` Lendacky, Thomas
2019-09-30 18:52 ` Laszlo Ersek
2019-09-30 19:49 ` Lendacky, Thomas
2019-09-30 19:12 ` Laszlo Ersek
2019-09-30 19:51 ` Lendacky, Thomas
2019-10-02 10:23 ` Laszlo Ersek
2019-10-02 14:43 ` Lendacky, Thomas
2019-10-02 15:55 ` Laszlo Ersek
2019-09-19 19:52 ` [RFC PATCH v2 09/44] MdeModulePkg/DxeIplPeim: Support GHCB pages when creating page tables Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 10/44] OvmfPkg: A per-CPU variable area for #VC usage Lendacky, Thomas
2019-09-26 8:17 ` [edk2-devel] " Laszlo Ersek
2019-09-26 14:46 ` Lendacky, Thomas
2019-09-30 19:15 ` Laszlo Ersek
2019-09-30 19:52 ` Lendacky, Thomas
2019-10-02 11:51 ` Laszlo Ersek
2019-10-02 16:06 ` Lendacky, Thomas
2019-10-03 9:06 ` Laszlo Ersek
2019-09-19 19:52 ` [RFC PATCH v2 11/44] OvmfPkg/PlatformPei: Move early GDT into ram when SEV-ES is enabled Lendacky, Thomas
2019-10-02 12:05 ` [edk2-devel] " Laszlo Ersek
2019-10-02 16:10 ` Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 12/44] MdePkg: Add a structure definition for the GHCB Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 13/44] MdePkg/BaseLib: Add support for the VMGEXIT instruction Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 14/44] UefiCpuPkg: Implement library support for VMGEXIT Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 15/44] UefiCpuPkg/CpuExceptionHandler: Add base support for the #VC exception Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 16/44] OvmfPkg/MemEncryptSevLib: Make MemEncryptSevLib available during SEC Lendacky, Thomas
2019-10-02 12:24 ` [edk2-devel] " Laszlo Ersek
2019-10-02 12:30 ` Laszlo Ersek
2019-10-02 16:16 ` Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 17/44] UefiCpuPkg/CpuExceptionHandler: Add #VC exception handling for Sec phase Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 18/44] OvmfPkg/Sec: Enable cache early to speed up booting Lendacky, Thomas
2019-10-02 12:31 ` [edk2-devel] " Laszlo Ersek
2019-09-19 19:52 ` [RFC PATCH v2 19/44] UefiCpuPkg/CpuExceptionHandler: Add support for IOIO_PROT NAE events Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 20/44] UefiCpuPkg/CpuExceptionHandler: Support string IO " Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 21/44] MdePkg: Add support for the XGETBV instruction Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 22/44] UefiCpuPkg/CpuExceptionHandler: Add support for CPUID NAE events Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 23/44] UefiCpuPkg/CpuExceptionHandler: Add support for MSR_PROT " Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 24/44] UefiCpuPkg/CpuExceptionHandler: Add support for NPF NAE events (MMIO) Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 25/44] UefiCpuPkg/CpuExceptionHandler: Add support for WBINVD NAE events Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 26/44] UefiCpuPkg/CpuExceptionHandler: Add support for RDTSC " Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 27/44] UefiCpuPkg/CpuExceptionHandler: Add support for RDPMC " Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 28/44] UefiCpuPkg/CpuExceptionHandler: Add support for INVD " Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 29/44] UefiCpuPkg/CpuExceptionHandler: Add support for VMMCALL " Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 30/44] UefiCpuPkg/CpuExceptionHandler: Add support for RDTSCP " Lendacky, Thomas
2019-09-19 19:52 ` [RFC PATCH v2 31/44] UefiCpuPkg/CpuExceptionHandler: Add support for MONITOR/MONITORX " Lendacky, Thomas
2019-09-19 19:53 ` [RFC PATCH v2 32/44] UefiCpuPkg/CpuExceptionHandler: Add support for MWAIT/MWAITX " Lendacky, Thomas
2019-09-19 19:53 ` [RFC PATCH v2 33/44] UefiCpuPkg/CpuExceptionHandler: Add support for DR7 Read/Write " Lendacky, Thomas
2019-09-19 19:53 ` [RFC PATCH v2 34/44] UefiCpuPkg/MpInitLib: Update CPU MP data with a flag to indicate if SEV-ES is active Lendacky, Thomas
2019-09-19 19:53 ` [RFC PATCH v2 36/44] UefiCpuPkg: Add a 16-bit protected mode code segment descriptor Lendacky, Thomas
2019-09-19 19:53 ` [RFC PATCH v2 35/44] MdeModulePkg: Reserve " Lendacky, Thomas
2019-09-19 19:53 ` [RFC PATCH v2 37/44] OvmfPkg: Add support for SEV-ES AP reset vector re-directing Lendacky, Thomas
2019-10-02 14:54 ` [edk2-devel] " Laszlo Ersek
2019-10-02 17:33 ` Lendacky, Thomas
2019-10-03 9:09 ` Laszlo Ersek
2019-09-19 19:53 ` [RFC PATCH v2 38/44] UefiCpuPkg: Allow AP booting under SEV-ES Lendacky, Thomas
2019-10-02 15:15 ` [edk2-devel] " Laszlo Ersek
2019-10-02 15:26 ` Laszlo Ersek
2019-10-02 18:07 ` Lendacky, Thomas
2019-10-03 10:12 ` Laszlo Ersek
2019-10-03 10:32 ` Laszlo Ersek
2019-10-03 15:12 ` Lendacky, Thomas
2019-10-10 23:17 ` Lendacky, Thomas
2019-10-10 23:56 ` Andrew Fish
2019-10-11 8:56 ` Laszlo Ersek
2019-10-12 6:42 ` Andrew Fish
2019-10-12 7:46 ` Liming Gao
2019-10-12 18:50 ` Andrew Fish
2019-10-14 13:11 ` Laszlo Ersek
2019-10-14 19:11 ` Andrew Fish
2019-10-02 17:58 ` Lendacky, Thomas
2019-10-03 9:21 ` Laszlo Ersek
2019-09-19 19:53 ` [RFC PATCH v2 40/44] MdePkg: Add a finalization function to the CPU protocol Lendacky, Thomas
2019-09-20 13:16 ` [RFC PATCH v2 39/44] OvmfPkg: Move the GHCB allocations into reserved memory Lendacky, Thomas
2019-10-02 14:38 ` [edk2-devel] " Laszlo Ersek
2019-09-20 13:16 ` [RFC PATCH v2 42/44] UefiCpuPkg/MpInitLib: Prepare SEV-ES guest APs for OS use Lendacky, Thomas
2019-12-12 8:24 ` Ni, Ray
2019-12-13 16:35 ` Lendacky, Thomas [this message]
2019-09-20 13:16 ` [RFC PATCH v2 41/44] UefiCpuPkg/MpInitLib: Add MP finalization interface to MpInitLib Lendacky, Thomas
2019-09-20 13:16 ` [RFC PATCH v2 43/44] UefiCpuPkg/CpuDxe: Provide an DXE MP finalization routine to support SEV-ES Lendacky, Thomas
2019-09-20 13:16 ` [RFC PATCH v2 44/44] MdeModulePkg/DxeCore: Perform the CPU protocol finalization support Lendacky, Thomas
2019-09-20 19:24 ` [RFC PATCH v2 00/44] SEV-ES guest support Lendacky, Thomas
2019-09-24 1:55 ` [edk2-devel] " Dong, Eric
2019-09-24 14:31 ` Lendacky, Thomas
2019-09-25 22:31 ` Ni, Ray
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=c84bf71a-5f13-16b7-bf14-6bc42169d18f@amd.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox