From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM11-CO1-obe.outbound.protection.outlook.com (NAM11-CO1-obe.outbound.protection.outlook.com [40.107.220.52]) by mx.groups.io with SMTP id smtpd.web12.1805.1596134965785389482 for ; Thu, 30 Jul 2020 11:49:26 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=aJnXzpSR; spf=none, err=SPF record not found (domain: amd.com, ip: 40.107.220.52, mailfrom: thomas.lendacky@amd.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=A83nwiwLUYcZxx/9VDYRxLSqb6TNo6j/OGS53XFC4bqxDsE4o0CTCcVohGDVMEXyx8YVytCFhrQWgr0RPAeTmKTzG+R6ncXMSxpycT2GGFXuVWTc8h3QrayVHg1st9QcgFZvuJPdaxKoR49PU3oQ6LkVSD/tK4pWvt28jYCad3kIIAzpBCxyAVdeRSlCGuA0G5ZTQUp1OMp+dOQpMUrqB6T5m+woJqRzU6f958QGwlDuiQy4osKBbAuZkWObQXTeyg0ZOs7MPCkmI2chiGyR/WXLI2ecBtQBhcABmp1lQtkqyhhpIOvXISlQdSo8QfRaAuO5o7MTK0c95mDUpYwBoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CkUCsVMLNx44eYiVyLCG98C1A+A/KhHynEKCC72EYLo=; b=GV3jVYAtUCEX3nHM70xjYrGrnlhGXkO3eFJTlahYWr1z/laDH4nyCNBNCCl0ALPHF2o9LpHeSVLrjECRjffTgXeRdEB1W2/PG/Vntg1LAAHAfMmk54ecPkRTc7Kg0jNqeM2L+uB903UIWVkCNw7m37DsA3skuXAPxRoDhvSOIO2VIFuavfaIJCNBnnYvJtQc49sN6LEMOwdnWAl4baquqYbbN5W92t1uIR+6rmimHwxrFcqQDQb8H60wUdsxwYZ1MadLMjlPeb8xq7VGO3eSkyLUwnI4zYyzznB7/w95q2c8nVG40XjSVL89E50Kx0k4XBILhUKEdWOF3mx5bMI/iA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CkUCsVMLNx44eYiVyLCG98C1A+A/KhHynEKCC72EYLo=; b=aJnXzpSRZ2rLSp20RxRhwl4o3XawMOJjpepMWt3bX8owswyUvRknH4DmFKAYRtgyhfjykc50XVA/C7SBZVo0vx6oXduaY7lXrAYn7iliKzNJUwi7R0ZjoyA6YoNo+h3pPyOwgQZv8BdDBcUfnLC/LM59fe7SkVplxG0vHFkzdT4= Authentication-Results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=amd.com; Received: from DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) by DM6PR12MB4092.namprd12.prod.outlook.com (2603:10b6:5:214::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3239.16; Thu, 30 Jul 2020 18:49:24 +0000 Received: from DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::25ec:e6ba:197c:4eb0]) by DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::25ec:e6ba:197c:4eb0%8]) with mapi id 15.20.3239.020; Thu, 30 Jul 2020 18:49:24 +0000 From: "Lendacky, Thomas" To: devel@edk2.groups.io CC: Brijesh Singh , Ard Biesheuvel , Eric Dong , Jordan Justen , Laszlo Ersek , Liming Gao , Michael D Kinney , Ray Ni Subject: [PATCH v13 33/46] UefiCpuPkg: Create an SEV-ES workarea PCD Date: Thu, 30 Jul 2020 13:43:45 -0500 Message-ID: X-Mailer: git-send-email 2.27.0 In-Reply-To: References: X-ClientProxiedBy: DM5PR07CA0068.namprd07.prod.outlook.com (2603:10b6:4:ad::33) To DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) Return-Path: thomas.lendacky@amd.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from tlendack-t1.amd.com (165.204.77.1) by DM5PR07CA0068.namprd07.prod.outlook.com (2603:10b6:4:ad::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3239.17 via Frontend Transport; Thu, 30 Jul 2020 18:49:23 +0000 X-Mailer: git-send-email 2.27.0 X-Originating-IP: [165.204.77.1] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 23e7be07-79c7-4a18-c783-08d834b94757 X-MS-TrafficTypeDiagnostic: DM6PR12MB4092: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:4714; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: +ivVE++V0uaalJOagNvxhugRdKY1NPILi3ygFeV3gFBjf+KSaQXa9MnY6CNGxEH58vN78pbOUfA4vCfcs47q3t1FbO/xa1swwYqZ7WeEwNPschVgnd7X/mzFgaBquINHv9/ykOd25LB1G27EgX4Lgay/wxrdTrEoBOJjjMkl1W68UoHzAzkB7cVmYhlrtP06izzt8M9DHoYdEWcsjcQE+GoPu6PD/BsBPyNs+ammdDxCo7wqR44cS9JlutZfGyv8QDyGshNACb4QyMZjc+hyMb14/g+n0CeTKY/9JVUvSnxWW0pkZq/6bLQSHFKMGIPM9rJkC7v4nVo9iCLdkhVN8Z7aOWkSqxeO6C/AHtajsHSVvFDtBz4QNNG3ElEGFr0kPlhNlN3QGPR1xalX4MeSAD/HFhqZPKsntq0K5LPcCdxedC3HiYkm5q3oLaDh2t0VkgU1zKrJEVVhcUdeUGEpWA== X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR12MB1355.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFTY:;SFS:(4636009)(366004)(346002)(39860400002)(376002)(396003)(136003)(6486002)(52116002)(7696005)(26005)(5660300002)(186003)(16526019)(54906003)(66556008)(4326008)(66476007)(66946007)(316002)(6666004)(86362001)(2906002)(2616005)(6916009)(36756003)(966005)(8676002)(83380400001)(478600001)(956004)(8936002)(136400200001);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 23e7be07-79c7-4a18-c783-08d834b94757 X-MS-Exchange-CrossTenant-AuthSource: DM5PR12MB1355.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jul 2020 18:49:24.6702 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: JUWj23xFehOanH5PGvvioQngsSy48XtEV27wM40SNB7oMbiMlDqXwaUnp6LNzYJHieWzdB/62Sug+yFUkiXP2A== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR12MB4092 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable From: Tom Lendacky BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3D2198 Create an SEV-ES workarea PCD. This PCD will be used for BSP communication during SEC and for AP startup during PEI and DXE phases, the latter is the reason for creating it in the UefiCpuPkg. Cc: Eric Dong Cc: Ray Ni Cc: Laszlo Ersek Reviewed-by: Eric Dong Signed-off-by: Tom Lendacky --- UefiCpuPkg/UefiCpuPkg.dec | 8 ++++++++ UefiCpuPkg/UefiCpuPkg.uni | 8 ++++++++ 2 files changed, 16 insertions(+) diff --git a/UefiCpuPkg/UefiCpuPkg.dec b/UefiCpuPkg/UefiCpuPkg.dec index 17228cb5a84f..d83c084467b3 100644 --- a/UefiCpuPkg/UefiCpuPkg.dec +++ b/UefiCpuPkg/UefiCpuPkg.dec @@ -164,6 +164,14 @@ [PcdsFixedAtBuild] # @Prompt Specify the count of pre allocated SMM MP tokens per chunk. gUefiCpuPkgTokenSpaceGuid.PcdCpuSmmMpTokenCountPerChunk|64|UINT32|0x3000= 2002 =20 + ## Area of memory where the SEV-ES work area block lives. + # @Prompt Configure the SEV-ES work area base + gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaBase|0x0|UINT32|0x30002005 + + ## Size of teh area of memory where the SEV-ES work area block lives. + # @Prompt Configure the SEV-ES work area base + gUefiCpuPkgTokenSpaceGuid.PcdSevEsWorkAreaSize|0x0|UINT32|0x30002006 + [PcdsFixedAtBuild, PcdsPatchableInModule] ## This value is the CPU Local APIC base address, which aligns the addre= ss on a 4-KByte boundary. # @Prompt Configure base address of CPU Local APIC diff --git a/UefiCpuPkg/UefiCpuPkg.uni b/UefiCpuPkg/UefiCpuPkg.uni index f4a0c72f6293..219c1963bf08 100644 --- a/UefiCpuPkg/UefiCpuPkg.uni +++ b/UefiCpuPkg/UefiCpuPkg.uni @@ -281,3 +281,11 @@ =20 #string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsIsEnabled_PROMPT #language = en-US "Specifies whether SEV-ES is enabled" #string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsIsEnabled_HELP #language = en-US "Set to TRUE when running as an SEV-ES guest, FALSE otherwise." + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaBase_PROMPT #langua= ge en-US "Specify the address of the SEV-ES work area" + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaBase_HELP #langua= ge en-US "Specifies the address of the work area used by an SEV-ES guest." + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaSize_PROMPT #langua= ge en-US "Specify the size of the SEV-ES work area" + +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdSevEsWorkAreaSize_HELP #langua= ge en-US "Specifies the size of the work area used by an SEV-ES guest." --=20 2.27.0