From nobody Mon Feb 9 02:28:38 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+46347+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+46347+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1566773181; cv=none; d=zoho.com; s=zohoarc; b=bUUtEZLZliXzRRjsPtb6SLNg+KlBseb3j2VGUdqwjz6bNTAu0E6twFygsyEOeC4TEg9aXj+I+cN/pUNWV9c/fz+du27BmkyzUX08x0sipTgPdJRICzpuNDhoVWFZVRU+zELyTzp8CkECUk/Fe3DWdUzp8r7U7PAkhjNwb+8Nofk= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1566773181; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To:ARC-Authentication-Results; bh=Khjm2tz+uTaARcpj+6t5EHZGORdlRjCzKdk6zCjSaB0=; b=lM7h2eXp+14aAsak1AVHmdjiP+6qE3at4J5da7UpoR41R2TEiX4jdysV505YVa07ib9cTnhTDEU67tUFGkHJxKEbOaohORAkmw9gAbKFbGabWgxa0ln/bZIM6leKkWe08McT9C6pgO2T3lWwmvCAi46eZjl8PtzCUUxyHb6S1R4= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=pass; spf=pass (zoho.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+46347+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 156677318150281.20077625114789; Sun, 25 Aug 2019 15:46:21 -0700 (PDT) Return-Path: X-Received: from mga14.intel.com (mga14.intel.com []) by groups.io with SMTP; Sun, 25 Aug 2019 15:46:19 -0700 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Aug 2019 15:46:18 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,431,1559545200"; d="scan'208";a="331277782" X-Received: from ray-dev.ccr.corp.intel.com ([10.239.9.9]) by orsmga004.jf.intel.com with ESMTP; 25 Aug 2019 15:46:08 -0700 From: "Ni, Ray" To: devel@edk2.groups.io Cc: Eric Dong , Jiewen Yao , Laszlo Ersek Subject: [edk2-devel] [PATCH 4/5] UefiCpuPkg: Explain relationship between several SMM PCDs Date: Mon, 26 Aug 2019 06:45:12 +0800 Message-Id: <20190825224513.171572-5-ray.ni@intel.com> In-Reply-To: <20190825224513.171572-1-ray.ni@intel.com> References: <20190825224513.171572-1-ray.ni@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ray.ni@intel.com Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1566773181; bh=lI7UaFFmcNHMFvKATDa9F4YRDvP1miuLxIyrZbDHpYQ=; h=Cc:Date:From:Reply-To:Subject:To; b=QrSmoBXA+rKVENfME3pHRu1+2DrU8Vn2bD6zOdf8CYFYNnLAZUYM2X4JWW62WTEztWb vxENBpfbMFhhf6EMcsoivQm1ZZPhEPrgkvi3abyeYU0iILhR4OzWLzOgDB1DfadrrIqvH l1/CSG+9DFpfCUa20gWWq7HNKRvywYyfu5c= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" There are three PCDs that may impact the behavior of each other in SMM environment: PcdCpuSmmProfileEnable PcdHeapGuardPropertyMask in MdeModulePkg PcdCpuSmmRestrictedMemoryAccess The patch updates the comments in DEC file to document it. Signed-off-by: Ray Ni Cc: Eric Dong Cc: Jiewen Yao Cc: Laszlo Ersek Reviewed-by: Eric Dong Reviewed-by: Laszlo Ersek --- UefiCpuPkg/UefiCpuPkg.dec | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/UefiCpuPkg/UefiCpuPkg.dec b/UefiCpuPkg/UefiCpuPkg.dec index 83acd33612..9a03bdd716 100644 --- a/UefiCpuPkg/UefiCpuPkg.dec +++ b/UefiCpuPkg/UefiCpuPkg.dec @@ -81,7 +81,8 @@ [Ppis] [PcdsFeatureFlag] ## Indicates if SMM Profile will be enabled. # If enabled, instruction executions in and data accesses to memory out= side of SMRAM will be logged. - # It could not be enabled at the same time with SMM static page table f= eature (PcdCpuSmmStaticPageTable). + # In X64 build, it could not be enabled when PcdCpuSmmRestrictedMemoryA= ccess is TRUE. + # In IA32 build, the page table memory is not marked as read-only when = it is enabled. # This PCD is only for validation purpose. It should be set to false in= production.

# TRUE - SMM Profile will be enabled.
# FALSE - SMM Profile will be disabled.
@@ -285,6 +286,11 @@ [PcdsFixedAtBuild.X64, PcdsPatchableInModule.X64, Pcds= Dynamic.X64, PcdsDynamicEx # The PCD value is considered as constantly TRUE in IA32 platforms. # When the PCD value is TRUE, page table is initialized to cover all me= mory spaces # and the memory occupied by page table is protected by page table itse= lf as read-only. + # In X64 build, it cannot be enabled at the same time with SMM profile = feature (PcdCpuSmmProfileEnable). + # In X64 build, it could not be enabled also at the same time with heap= guard feature for SMM + # (PcdHeapGuardPropertyMask in MdeModulePkg). + # In IA32 build, page table memory is not marked as read-only when eith= er SMM profile feature (PcdCpuSmmProfileEnable) + # or heap guard feature for SMM (PcdHeapGuardPropertyMask in MdeModuleP= kg) is enabled. # TRUE - Access to non-SMRAM memory is restricted to reserved, runtim= e and ACPI NVS type after SmmReadyToLock.
# FALSE - Access to any type of non-SMRAM memory after SmmReadyToLock = is allowed.
# @Prompt Access to non-SMRAM memory is restricted to reserved, runtime = and ACPI NVS type after SmmReadyToLock. --=20 2.21.0.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#46347): https://edk2.groups.io/g/devel/message/46347 Mute This Topic: https://groups.io/mt/33027101/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-