[edk2] [PATCH v4 0/6] Add PCD PcdPteMemoryEncryptionAddressOrMask

Leo Duran posted 6 patches 125 weeks ago
Failed in applying to current master (apply log)
MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf            |  5 +-
MdeModulePkg/Core/DxeIplPeim/Ia32/DxeLoadFunc.c    | 12 +++-
MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c   | 39 +++++++---
MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.h   |  5 ++
MdeModulePkg/MdeModulePkg.dec                      |  8 +++
.../BootScriptExecutorDxe.inf                      |  2 +
.../Acpi/BootScriptExecutorDxe/ScriptExecute.c     |  7 ++
.../Acpi/BootScriptExecutorDxe/ScriptExecute.h     |  5 ++
.../Acpi/BootScriptExecutorDxe/X64/SetIdtEntry.c   | 15 ++--
MdeModulePkg/Universal/CapsulePei/CapsulePei.inf   |  2 +
.../Universal/CapsulePei/Common/CommonHeader.h     |  5 ++
MdeModulePkg/Universal/CapsulePei/UefiCapsule.c    | 17 +++--
MdeModulePkg/Universal/CapsulePei/X64/X64Entry.c   | 24 +++++--
UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c           |  6 +-
UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c              | 83 +++-------------------
UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c         | 14 ++++
UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h         |  8 ++-
UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf       |  2 +
UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c | 14 ++--
UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c             | 16 +++--
UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c            | 41 ++++++-----
UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmmProfileArch.c     | 32 +++++----
UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c  | 17 +++--
.../Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf   |  2 +
24 files changed, 224 insertions(+), 157 deletions(-)
mode change 100644 => 100755 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c

[edk2] [PATCH v4 0/6] Add PCD PcdPteMemoryEncryptionAddressOrMask

Posted by Leo Duran 125 weeks ago
This new PCD holds the address mask for page table entries when memory
encryption is enabled on AMD processors supporting the Secure Encrypted
Virtualization (SEV) feature.

This mask is be applied when creating or modifying page-table entries.
For example, the OvmfPkg would set the PCD when launching SEV-enabled guests.

Changes since v3:
- Break out changes to MdeModulePkg/Core/DxeIplPeim to a separate patch
- Add few cases of applying the mask that were previously missed
- Add PCD support for UefiCpuPkg/PiSmmCpuDxeSmm

Leo Duran (6):
  MdeModulePkg: Add PCD PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Core/DxeIplPeim:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Universal/CapsulePei:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  UefiCpuPkg/Universal/Acpi/S3Resume2Pei:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe:     Add support for
    PCD PcdPteMemoryEncryptionAddressOrMask
  UefiCpuPkg/PiSmmCpuDxeSmm:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask

 MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf            |  5 +-
 MdeModulePkg/Core/DxeIplPeim/Ia32/DxeLoadFunc.c    | 12 +++-
 MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c   | 39 +++++++---
 MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.h   |  5 ++
 MdeModulePkg/MdeModulePkg.dec                      |  8 +++
 .../BootScriptExecutorDxe.inf                      |  2 +
 .../Acpi/BootScriptExecutorDxe/ScriptExecute.c     |  7 ++
 .../Acpi/BootScriptExecutorDxe/ScriptExecute.h     |  5 ++
 .../Acpi/BootScriptExecutorDxe/X64/SetIdtEntry.c   | 15 ++--
 MdeModulePkg/Universal/CapsulePei/CapsulePei.inf   |  2 +
 .../Universal/CapsulePei/Common/CommonHeader.h     |  5 ++
 MdeModulePkg/Universal/CapsulePei/UefiCapsule.c    | 17 +++--
 MdeModulePkg/Universal/CapsulePei/X64/X64Entry.c   | 24 +++++--
 UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c           |  6 +-
 UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c              | 83 +++-------------------
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c         | 14 ++++
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h         |  8 ++-
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf       |  2 +
 UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c | 14 ++--
 UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c             | 16 +++--
 UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c            | 41 ++++++-----
 UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmmProfileArch.c     | 32 +++++----
 UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c  | 17 +++--
 .../Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf   |  2 +
 24 files changed, 224 insertions(+), 157 deletions(-)
 mode change 100644 => 100755 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c

-- 
2.7.4

_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Re: [edk2] [PATCH v4 0/6] Add PCD PcdPteMemoryEncryptionAddressOrMask

Posted by Zeng, Star 124 weeks ago
The patch series has been pushed at  https://github.com/tianocore/edk2/compare/a9b4ee43d319...241f914975d5.

Thanks,
Star
-----Original Message-----
From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of Leo Duran
Sent: Monday, February 27, 2017 1:43 AM
To: edk2-devel@ml01.01.org
Cc: Leo Duran <leo.duran@amd.com>
Subject: [edk2] [PATCH v4 0/6] Add PCD PcdPteMemoryEncryptionAddressOrMask

This new PCD holds the address mask for page table entries when memory encryption is enabled on AMD processors supporting the Secure Encrypted Virtualization (SEV) feature.

This mask is be applied when creating or modifying page-table entries.
For example, the OvmfPkg would set the PCD when launching SEV-enabled guests.

Changes since v3:
- Break out changes to MdeModulePkg/Core/DxeIplPeim to a separate patch
- Add few cases of applying the mask that were previously missed
- Add PCD support for UefiCpuPkg/PiSmmCpuDxeSmm

Leo Duran (6):
  MdeModulePkg: Add PCD PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Core/DxeIplPeim:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Universal/CapsulePei:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  UefiCpuPkg/Universal/Acpi/S3Resume2Pei:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask
  MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe:     Add support for
    PCD PcdPteMemoryEncryptionAddressOrMask
  UefiCpuPkg/PiSmmCpuDxeSmm:     Add support for PCD
    PcdPteMemoryEncryptionAddressOrMask

 MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf            |  5 +-
 MdeModulePkg/Core/DxeIplPeim/Ia32/DxeLoadFunc.c    | 12 +++-
 MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c   | 39 +++++++---
 MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.h   |  5 ++
 MdeModulePkg/MdeModulePkg.dec                      |  8 +++
 .../BootScriptExecutorDxe.inf                      |  2 +
 .../Acpi/BootScriptExecutorDxe/ScriptExecute.c     |  7 ++
 .../Acpi/BootScriptExecutorDxe/ScriptExecute.h     |  5 ++
 .../Acpi/BootScriptExecutorDxe/X64/SetIdtEntry.c   | 15 ++--
 MdeModulePkg/Universal/CapsulePei/CapsulePei.inf   |  2 +
 .../Universal/CapsulePei/Common/CommonHeader.h     |  5 ++
 MdeModulePkg/Universal/CapsulePei/UefiCapsule.c    | 17 +++--
 MdeModulePkg/Universal/CapsulePei/X64/X64Entry.c   | 24 +++++--
 UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c           |  6 +-
 UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c              | 83 +++-------------------
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c         | 14 ++++
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h         |  8 ++-
 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf       |  2 +
 UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c | 14 ++--
 UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c             | 16 +++--
 UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c            | 41 ++++++-----
 UefiCpuPkg/PiSmmCpuDxeSmm/X64/SmmProfileArch.c     | 32 +++++----
 UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c  | 17 +++--
 .../Universal/Acpi/S3Resume2Pei/S3Resume2Pei.inf   |  2 +
 24 files changed, 224 insertions(+), 157 deletions(-)  mode change 100644 => 100755 UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c

--
2.7.4

_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel
_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel