[edk2-devel] [PATCH v3 0/5] Target to enable paging from temporary RAM Done

Wu, Jiaxin posted 5 patches 11 months, 1 week ago
Failed in applying to current master (apply log)
MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c |  36 ++--
OvmfPkg/AmdSev/AmdSevX64.dsc                     |   2 +-
OvmfPkg/CloudHv/CloudHvX64.dsc                   |   2 +-
OvmfPkg/IntelTdx/IntelTdxX64.dsc                 |   3 +-
OvmfPkg/Microvm/MicrovmX64.dsc                   |   2 +-
OvmfPkg/OvmfPkgIa32.dsc                          |   1 +
OvmfPkg/OvmfPkgIa32X64.dsc                       |   2 +-
OvmfPkg/OvmfPkgX64.dsc                           |   3 +-
OvmfPkg/OvmfXen.dsc                              |   2 +-
UefiCpuPkg/CpuMpPei/CpuMpPei.h                   |   1 +
UefiCpuPkg/CpuMpPei/CpuMpPei.inf                 |   1 +
UefiCpuPkg/CpuMpPei/CpuPaging.c                  | 202 ++++++++---------------
UefiCpuPkg/SecCore/SecCore.inf                   |   1 +
UefiCpuPkg/SecCore/SecCoreNative.inf             |   1 +
UefiCpuPkg/SecCore/SecMain.c                     | 147 +++++++++++++++++
UefiCpuPkg/SecCore/SecMain.h                     |   4 +
UefiPayloadPkg/UefiPayloadPkg.dsc                |   2 +-
17 files changed, 261 insertions(+), 151 deletions(-)
[edk2-devel] [PATCH v3 0/5] Target to enable paging from temporary RAM Done
Posted by Wu, Jiaxin 11 months, 1 week ago
For arch X64, system will enable the page table in SPI to cover 0-512G
range via CR4.PAE & MSR.LME & CR0.PG & CR3 setting. Existing code doesn't
cover the higher address access above 512G before memory-discovered
callback. This series patches provide the solution to enable paging from
temporary RAM Done.

Jiaxin Wu (5):
  UefiCpuPkg/SecCore: Migrate page table to permanent memory
  UefiCpuPkg/CpuMpPei: Conditionally enable PAE paging in 32bit mode
  MdeModulePkg/DxeIpl: Align Page table Level setting with previous
    level.
  OvmfPkg: Add CpuPageTableLib required by SecCore & CpuMpPei
  UefiPayloadPkg: Add CpuPageTableLib required by SecCore & CpuMpPei

 MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c |  36 ++--
 OvmfPkg/AmdSev/AmdSevX64.dsc                     |   2 +-
 OvmfPkg/CloudHv/CloudHvX64.dsc                   |   2 +-
 OvmfPkg/IntelTdx/IntelTdxX64.dsc                 |   3 +-
 OvmfPkg/Microvm/MicrovmX64.dsc                   |   2 +-
 OvmfPkg/OvmfPkgIa32.dsc                          |   1 +
 OvmfPkg/OvmfPkgIa32X64.dsc                       |   2 +-
 OvmfPkg/OvmfPkgX64.dsc                           |   3 +-
 OvmfPkg/OvmfXen.dsc                              |   2 +-
 UefiCpuPkg/CpuMpPei/CpuMpPei.h                   |   1 +
 UefiCpuPkg/CpuMpPei/CpuMpPei.inf                 |   1 +
 UefiCpuPkg/CpuMpPei/CpuPaging.c                  | 202 ++++++++---------------
 UefiCpuPkg/SecCore/SecCore.inf                   |   1 +
 UefiCpuPkg/SecCore/SecCoreNative.inf             |   1 +
 UefiCpuPkg/SecCore/SecMain.c                     | 147 +++++++++++++++++
 UefiCpuPkg/SecCore/SecMain.h                     |   4 +
 UefiPayloadPkg/UefiPayloadPkg.dsc                |   2 +-
 17 files changed, 261 insertions(+), 151 deletions(-)

-- 
2.16.2.windows.1



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#104839): https://edk2.groups.io/g/devel/message/104839
Mute This Topic: https://groups.io/mt/98895180/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-
Re: [edk2-devel] [PATCH v3 0/5] Target to enable paging from temporary RAM Done
Posted by Ni, Ray 11 months, 1 week ago
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com> for all patches.

> -----Original Message-----
> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of Wu, Jiaxin
> Sent: Monday, May 15, 2023 10:16 AM
> To: devel@edk2.groups.io
> Subject: [edk2-devel] [PATCH v3 0/5] Target to enable paging from temporary
> RAM Done
> 
> For arch X64, system will enable the page table in SPI to cover 0-512G
> range via CR4.PAE & MSR.LME & CR0.PG & CR3 setting. Existing code doesn't
> cover the higher address access above 512G before memory-discovered
> callback. This series patches provide the solution to enable paging from
> temporary RAM Done.
> 
> Jiaxin Wu (5):
>   UefiCpuPkg/SecCore: Migrate page table to permanent memory
>   UefiCpuPkg/CpuMpPei: Conditionally enable PAE paging in 32bit mode
>   MdeModulePkg/DxeIpl: Align Page table Level setting with previous
>     level.
>   OvmfPkg: Add CpuPageTableLib required by SecCore & CpuMpPei
>   UefiPayloadPkg: Add CpuPageTableLib required by SecCore & CpuMpPei
> 
>  MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c |  36 ++--
>  OvmfPkg/AmdSev/AmdSevX64.dsc                     |   2 +-
>  OvmfPkg/CloudHv/CloudHvX64.dsc                   |   2 +-
>  OvmfPkg/IntelTdx/IntelTdxX64.dsc                 |   3 +-
>  OvmfPkg/Microvm/MicrovmX64.dsc                   |   2 +-
>  OvmfPkg/OvmfPkgIa32.dsc                          |   1 +
>  OvmfPkg/OvmfPkgIa32X64.dsc                       |   2 +-
>  OvmfPkg/OvmfPkgX64.dsc                           |   3 +-
>  OvmfPkg/OvmfXen.dsc                              |   2 +-
>  UefiCpuPkg/CpuMpPei/CpuMpPei.h                   |   1 +
>  UefiCpuPkg/CpuMpPei/CpuMpPei.inf                 |   1 +
>  UefiCpuPkg/CpuMpPei/CpuPaging.c                  | 202 ++++++++---------------
>  UefiCpuPkg/SecCore/SecCore.inf                   |   1 +
>  UefiCpuPkg/SecCore/SecCoreNative.inf             |   1 +
>  UefiCpuPkg/SecCore/SecMain.c                     | 147 +++++++++++++++++
>  UefiCpuPkg/SecCore/SecMain.h                     |   4 +
>  UefiPayloadPkg/UefiPayloadPkg.dsc                |   2 +-
>  17 files changed, 261 insertions(+), 151 deletions(-)
> 
> --
> 2.16.2.windows.1
> 
> 
> 
> 
> 



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#104964): https://edk2.groups.io/g/devel/message/104964
Mute This Topic: https://groups.io/mt/98895180/1787277
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/leave/3901457/1787277/102458076/xyzzy [importer@patchew.org]
-=-=-=-=-=-=-=-=-=-=-=-