This is to prevent #DB interception on SEV-ES VM with enabled DebugSwap feature, more details in 3/5.
The corresponding Linux change (HV and VM) went upstream long time ago: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e221804dad4e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1f85fbe836e The previous conversation (more than a year ago) is here: https://edk2.groups.io/g/devel/message/96808 v2 failed CI so here is v3 but with cosmetic changes only. This is based on sha1 fecf55a66a1c Michael Roth "OvmfPkg/CcExitLib: Drop special handling for Encrypted MMIO to APIC". Please comment. Thanks. Alexey Kardashevskiy (5): MdePkg/Register/Amd: Define all bits from MSR_SEV_STATUS_REGISTER MdePkg: Add AMD SEV features to PcdConfidentialComputingGuestAttr OvmfPkg: Add AMD SEV-ES DebugSwap feature support UefiCpuPkg: Add AMD SEV-ES features support OvmfPkf: Enable AMD SEV-ES DebugSwap for DXE MdePkg/Include/ConfidentialComputingGuestAttr.h | 15 ++++- MdePkg/Include/Register/Amd/Fam17Msr.h | 63 ++++++++++++++++++-- OvmfPkg/Include/Library/MemEncryptSevLib.h | 12 ++++ OvmfPkg/Library/BaseMemEncryptSevLib/DxeMemEncryptSevLibInternal.c | 27 ++++++++- OvmfPkg/Library/BaseMemEncryptSevLib/PeiMemEncryptSevLibInternal.c | 19 ++++++ OvmfPkg/Library/BaseMemEncryptSevLib/SecMemEncryptSevLibInternal.c | 19 ++++++ OvmfPkg/Library/CcExitLib/CcExitVcHandler.c | 8 +++ OvmfPkg/PlatformPei/AmdSev.c | 13 +++- UefiCpuPkg/Library/MpInitLib/MpLib.c | 12 +++- 9 files changed, 173 insertions(+), 15 deletions(-) -- 2.44.0 -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#118513): https://edk2.groups.io/g/devel/message/118513 Mute This Topic: https://groups.io/mt/105863808/21656 Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-