[edk2-devel] [PATCH v6] UefiPayloadPkg: Remove SystemTableInfo GUID.

2021-10-19 Thread thiyagukb
SystemTableInfo GUID is not a Spec defined GUID. The latest SBL and CBL produces ACPI and SMBIOS table information. So removing the SystemTableInfo GUID implementation. Cc: Maurice Ma Cc: Guo Dong Cc: Ray Ni Cc: Benjamin You Cc: Zhiguang Liu Signed-off-by: Guo Dong Signed-off-by: Thiyagu Ke

[edk2-devel] [PATCH v5] UefiPayloadPkg: Remove SystemTableInfo GUID.

2021-10-19 Thread thiyagukb
SystemTableInfo GUID is not a Spec defined GUID. But the latest SBL uses SystemTableInfo to get ACPI and SMBIOS table information. So moving the SystemTableInfo GUID implementation to SblParseLib. Cc: Maurice Ma Cc: Guo Dong Cc: Ray Ni Cc: Benjamin You Cc: Zhiguang Liu Signed-off-by: Guo Do

Re: [edk2-devel] [PATCH v6 1/3] MdeModulePkg/SortLib: Add QuickSort function on BaseLib

2021-10-19 Thread IanX Kuo
Hi Liming The change "PATCH v6 1/3" is the same with "PATCH v3 1/3". The difference between "v3 to v6" is on "PATCH v6 3/3" Thanks, Ian Kuo -Original Message- From: devel@edk2.groups.io On Behalf Of gaoliming Sent: Wednesday, October 20, 2021 9:50 AM To: Kuo, IanX ; devel@edk2.groups.i

[edk2-devel] [PATCH] DynamicTablesPkg: Fix unitialized variable use

2021-10-19 Thread Moritz Fischer via groups.io
In the success case we should return EFI_SUCCESS rather than returning a potentially unitialized value of Status. Cc: Sami Mujawar Cc: Alexei Fedorov Signed-off-by: Moritz Fischer --- .../Library/Common/AmlLib/CodeGen/AmlResourceDataCodeGen.c | 2 +- 1 file changed, 1 insertion(+), 1 dele

Re: [edk2-devel] [PATCH v10 30/32] OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map

2021-10-19 Thread Gerd Hoffmann
On Tue, Oct 19, 2021 at 02:39:32PM -0500, Brijesh Singh wrote: > When SEV-SNP is active, the CPUID and Secrets memory range contains the > information that is used during the VM boot. The content need to be persist > across the kexec boot. Mark the memory range as Reserved in the EFI map > so that

Re: [edk2-devel] [PATCH v10 22/32] UefiCpuPkg/MpInitLib: use PcdConfidentialComputingAttr to check SEV status

2021-10-19 Thread Gerd Hoffmann
On Tue, Oct 19, 2021 at 02:39:24PM -0500, Brijesh Singh wrote: > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 > > Previous commit introduced a generic confidential computing PCD that can > determine whether AMD SEV-ES is enabled. Update the MpInitLib to drop the > PcdSevEsIsEnabled in f

Re: [edk2-devel] [PATCH v10 20/32] UefiCpuPkg: Define ConfidentialComputingGuestAttr

2021-10-19 Thread Gerd Hoffmann
On Tue, Oct 19, 2021 at 02:39:22PM -0500, Brijesh Singh wrote: > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 > > While initializing APs, the MpInitLib may need to know whether the > guest is running with active AMD SEV or Intel TDX memory encryption. > > Add a new ConfidentialComputin

Re: [edk2-devel] [PATCH v10 17/32] OvmfPkg/MemEncryptSevLib: add support to validate > 4GB memory in PEI phase

2021-10-19 Thread Gerd Hoffmann
On Tue, Oct 19, 2021 at 02:39:19PM -0500, Brijesh Singh wrote: > BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 > > The initial page built during the SEC phase is used by the > MemEncryptSevSnpValidateSystemRam() for the system RAM validation. The > page validation process requires using

Re: [edk2-devel] [PATCH v9 30/32] OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map

2021-10-19 Thread Gerd Hoffmann
Hi, > >> [ ... ] > >> [    0.00] BIOS-e820: [mem 0x0080-0x00807fff] ACPI > >> NVS > >> [    0.00] BIOS-e820: [mem 0x00808000-0x0080afff] > >> usable > >> [    0.00] BIOS-e820: [mem 0x0080b000-0x0080bfff] ACPI > >> NVS > >> [    0

[edk2-devel] [edk2-libc Patch 1/1] AppPkg/Applications/Python: Remove py2.7.2 support from edk2-libc

2021-10-19 Thread Jayaprakash, N
-=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#82406): https://edk2.groups.io/g/devel/message/82406 Mute This Topic: https://groups.io/mt/86457669/21656 Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/

Re: [edk2-devel] [PATCH v6 1/3] MdeModulePkg/SortLib: Add QuickSort function on BaseLib

2021-10-19 Thread Wang, Jian J
Reviewed-by: Jian J Wang Regards, Jian > -Original Message- > From: Kuo, IanX > Sent: Monday, October 18, 2021 12:21 PM > To: devel@edk2.groups.io > Cc: Chan, Amy ; Ni, Ray ; Kuo, IanX > ; Wang, Jian J ; Liming Gao > > Subject: [PATCH v6 1/3] MdeModulePkg/SortLib: Add QuickSort funct

[edk2-devel][edk2-platforms][PATCH V1 2/2] WhitleyOpenBoardPkg/Build: Remove MultiPchPei PEIM binary use

2021-10-19 Thread Oram, Isaac W
Use the open source version of MultiPchPei PEIM. Cc: Nate DeSimone Cc: Chasel Chiu Signed-off-by: Isaac Oram --- Platform/Intel/WhitleyOpenBoardPkg/PlatformPkg.dsc | 1 + Platform/Intel/WhitleyOpenBoardPkg/PlatformPkg.fdf | 6 +- 2 files changed, 2 insertions(+), 5 deletions(-) diff --git

[edk2-devel][edk2-platforms][PATCH V1 1/2] WhitleySiliconPkg/MultiPchPei: Open Source PEIM

2021-10-19 Thread Oram, Isaac W
Eliminate the need for the binary PEIM currenty in use by Whitley. Cc: Nate DeSimone Cc: Chasel Chiu Signed-off-by: Isaac Oram --- Silicon/Intel/WhitleySiliconPkg/Pch/SouthClusterLbg/Include/Library/PchMultiPch.h | 34 Silicon/Intel/WhitleySiliconPkg/Pch/SouthClusterLbg/MultiPch/Pei

[edk2-devel][edk2-platforms][PATCH V1 0/2] Eliminate MultiPchPei PEIM binary

2021-10-19 Thread Oram, Isaac W
Open source the MultiPchPei PEIM code and eliminate the use of the binary from the FspBinPkg. Isaac Oram (2): WhitleySiliconPkg/MultiPchPei: Open Source PEIM WhitleyOpenBoardPkg/Build: Remove MultiPchPei PEIM binary use Platform/Intel/WhitleyOpenBoardPkg/PlatformPkg.dsc

Re: [edk2-devel] [PATCH v2] IntelSiliconPkg/IntelVTdDxe: Support Multi PCI Root Bus

2021-10-19 Thread Sheng Wei
Hi Ray, Thank you for sharing the solution. I am worrying on this issue now. I have found some produce did not support this lib. I will update the patch. BR Sheng Wei > -Original Message- > From: Ni, Ray > Sent: 2021年10月20日 8:29 > To: Sheng, W ; devel@edk2.groups.io > Cc: Kowalewski, Rob

回复: [edk2-devel][PATCH v2] FmpDevicePkg/FmpDxe: Use new Variable Lock interface

2021-10-19 Thread gaoliming
Jie: Thanks for your update. I also miss this typo. Reviewed-by: Liming Gao Thanks Liming > -邮件原件- > 发件人: devel@edk2.groups.io 代表 Yang Jie > 发送时间: 2021年10月19日 11:11 > 收件人: devel@edk2.groups.io > 抄送: gaolim...@byosoft.com.cn; michael.d.kin...@intel.com; > guomin.ji...@intel.com; wei6...

回复: [edk2-devel] [PATCH v6 1/3] MdeModulePkg/SortLib: Add QuickSort function on BaseLib

2021-10-19 Thread gaoliming
What new change is made in new version patch? Thanks Liming > -邮件原件- > 发件人: Kuo, IanX > 发送时间: 2021年10月19日 10:09 > 收件人: devel@edk2.groups.io; Kuo, IanX ; Liming Gao > > 抄送: Chan, Amy ; Ni, Ray ; Wang, > Jian J > 主题: RE: [edk2-devel] [PATCH v6 1/3] MdeModulePkg/SortLib: Add > QuickSort fu

Re: [edk2-devel] [PATCH v4] UefiPayloadPkg: Remove SystemTableInfo GUID.

2021-10-19 Thread Guo Dong
+ SmbiosHob.Raw = GetFirstGuidHob(&gUniversalPayloadSmbiosTableGuid); + if (SmbiosHob.Raw == NULL) { +SmBiosTableHob = BuildGuidHob (&gUniversalPayloadSmbiosTableGuid, sizeof (UNIVERSAL_PAYLOAD_SMBIOS_TABLE)); In non-universal payload, there is no gUniversalPayloadSmbiosTableGuid in UEFI

Re: [edk2-devel] [PATCH v2] IntelSiliconPkg/IntelVTdDxe: Support Multi PCI Root Bus

2021-10-19 Thread Ni, Ray
Can you rely on the PciRootBridgeIo protocol instances instead of this library? It will make the driver usable in platforms that don't produce the PciHostBridgeLib. Thanks, Rya > -Original Message- > From: Sheng, W > Sent: Monday, October 18, 2021 4:43 PM > To: devel@edk2.groups.io > C

Re: [edk2-devel] [PATCH v2 1/1] OvmfPkg: Introduce 16MiB flash size for (primarily) Linuxboot

2021-10-19 Thread Devon Bautista
On 9/9/21 03:09, Philippe Mathieu-Daudé wrote: On 9/3/21 7:26 AM, Devon Bautista wrote: The largest size flash image currently available for OVMF builds, 4MiB, is too small to insert a Linux kernel and initramfs into the DXEFV, and is thus insufficient for testing Linuxboot builds via OVMF. Int

[edk2-devel] [PATCH 1/1] ArmPkg: Add SMC helper functions

2021-10-19 Thread Rebecca Cran
Add functions ArmCallSmc0/1/2/3 to do SMC calls with 0, 1, 2 or 3 arguments. The functions return up to 3 values. Signed-off-by: Rebecca Cran --- ArmPkg/Include/Library/ArmSmcLib.h | 73 ArmPkg/Library/ArmSmcLib/ArmSmc.c| 122 ArmPkg/Libra

[edk2-devel] [PATCH] MdeModulePkg/DxeCapsuleLibFmp: Add runtime SetImage support

2021-10-19 Thread Bob Morgan via groups.io
Adds optional support for processing FMP capusle images after ExitBootServices() if the ImageTypeIdGuid is mentioned in the new PcdRuntimeFmpCapsuleImageTypeIdGuid list. Cc: Jian J Wang Cc: Liming Gao Cc: Guomin Jiang Signed-off-by: Bob Morgan --- .../Library/DxeCapsuleLibFmp/DxeCapsuleLib.c

[edk2-devel] [PATCH v10 23/32] UefiCpuPkg: add PcdGhcbHypervisorFeatures

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Version 2 of the GHCB specification added a new VMGEXIT that the guest could use for querying the hypervisor features. One of the immediate users for it will be an AP creation code. When SEV-SNP is enabled, the guest can use the newly added A

[edk2-devel] [PATCH v10 31/32] OvmfPkg/AmdSev: expose the SNP reserved pages through configuration table

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Now that both the secrets and cpuid pages are reserved in the HOB, extract the location details through fixed PCD and make it available to the guest OS through the configuration table. Cc: Michael Roth Cc: James Bottomley Cc: Min Xu Cc: J

[edk2-devel] [PATCH v10 32/32] UefiCpuPkg/MpInitLib: Use SEV-SNP AP Creation NAE event to launch APs

2021-10-19 Thread Brijesh Singh via groups.io
From: Tom Lendacky BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Use the SEV-SNP AP Creation NAE event to create and launch APs under SEV-SNP. This capability will be advertised in the SEV Hypervisor Feature Support PCD (PcdSevEsHypervisorFeatures). Cc: Michael Roth Cc: Eric Dong Cc

[edk2-devel] [PATCH v10 30/32] OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map

2021-10-19 Thread Brijesh Singh via groups.io
When SEV-SNP is active, the CPUID and Secrets memory range contains the information that is used during the VM boot. The content need to be persist across the kexec boot. Mark the memory range as Reserved in the EFI map so that guest OS or firmware does not use the range as a system RAM. Cc: Micha

[edk2-devel] [PATCH v10 17/32] OvmfPkg/MemEncryptSevLib: add support to validate > 4GB memory in PEI phase

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The initial page built during the SEC phase is used by the MemEncryptSevSnpValidateSystemRam() for the system RAM validation. The page validation process requires using the PVALIDATE instruction; the instruction accepts a virtual address of

[edk2-devel] [PATCH v10 29/32] OvmfPkg/MemEncryptSevLib: skip page state change for Mmio address

2021-10-19 Thread Brijesh Singh via groups.io
The SetMemoryEncDec() is used by the higher level routines to set or clear the page encryption mask for system RAM and Mmio address. When SEV-SNP is active, in addition to set/clear page mask it also updates the RMP table. The RMP table updates are required for the system RAM address and not the Mm

[edk2-devel] [PATCH v10 27/32] UefiCpuPkg/MpInitLib: use BSP to do extended topology check

2021-10-19 Thread Brijesh Singh via groups.io
From: Michael Roth During AP bringup, just after switching to long mode, APs will do some cpuid calls to verify that the extended topology leaf (0xB) is available so they can fetch their x2 APIC IDs from it. In the case of SEV-ES, these cpuid instructions must be handled by direct use of the GHCB

[edk2-devel] [PATCH v10 28/32] OvmfPkg/MemEncryptSevLib: change the page state in the RMP table

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The MemEncryptSev{Set,Clear}PageEncMask() functions are used to set or clear the memory encryption attribute in the page table. When SEV-SNP is active, we also need to change the page state in the RMP table so that it is in sync with the memo

[edk2-devel] [PATCH v10 26/32] UefiCpuPkg/MpLib: add support to register GHCB GPA when SEV-SNP is enabled

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 An SEV-SNP guest requires that the physical address of the GHCB must be registered with the hypervisor before using it. See the GHCB specification section 2.3.2 for more details. Cc: Michael Roth Cc: Eric Dong Cc: Ray Ni Cc: Rahul Kumar

[edk2-devel] [PATCH v10 25/32] MdePkg/GHCB: increase the GHCB protocol max version

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Now that OvmfPkg supports version 2 of the GHCB specification, bump the protocol version. Cc: Michael Roth Cc: Ray Ni Cc: Rahul Kumar Cc: Eric Dong Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc:

[edk2-devel] [PATCH v10 21/32] OvmfPkg/PlatformPei: set PcdConfidentialComputingAttr when SEV is active

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The MpInitLib uses the ConfidentialComputingAttr PCD to determine whether AMD SEV is active so that it can use the VMGEXITs defined in the GHCB specification to create APs. Cc: Michael Roth Cc: Ray Ni Cc: Rahul Kumar Cc: Eric Dong Cc: Ja

[edk2-devel] [PATCH v10 24/32] OvmfPkg/PlatformPei: set the Hypervisor Features PCD

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Version 2 of the GHCB specification added the support to query the hypervisor feature bitmap. The feature bitmap provide information such as whether to use the AP create VmgExit or use the AP jump table approach to create the APs. The MpInitL

[edk2-devel] [PATCH v10 18/32] OvmfPkg/SecMain: validate the memory used for decompressing Fv

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The VMM launch sequence should have pre-validated all the data pages used in the Reset vector. The range does not cover the data pages used during the SEC phase (mainly PEI and DXE firmware volume decompression memory). When SEV-SNP is activ

[edk2-devel] [PATCH v10 22/32] UefiCpuPkg/MpInitLib: use PcdConfidentialComputingAttr to check SEV status

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Previous commit introduced a generic confidential computing PCD that can determine whether AMD SEV-ES is enabled. Update the MpInitLib to drop the PcdSevEsIsEnabled in favor of PcdConfidentialComputingAttr. Cc: Michael Roth Cc: Ray Ni Cc:

[edk2-devel] [PATCH v10 05/32] OvmfPkg: reserve SNP secrets page

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 During the SNP guest launch sequence, a special secrets page needs to be inserted by the VMM. The PSP will populate the page; it will contain the VM Platform Communication Key (VMPCKs) used by the guest to send and receive secure messages to

[edk2-devel] [PATCH v10 19/32] OvmfPkg/PlatformPei: validate the system RAM when SNP is active

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 When SEV-SNP is active, a memory region mapped encrypted in the page table must be validated before access. There are two approaches that can be taken to validate the system RAM detected during the PEI phase: 1) Validate on-demand OR 2) Vali

[edk2-devel] [PATCH v10 16/32] OvmfPkg/BaseMemEncryptSevLib: skip the pre-validated system RAM

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The MemEncryptSevSnpPreValidateSystemRam() is used for pre-validating the system RAM. As the boot progress, each phase validates a fixed region of the RAM. In the PEI phase, the PlatformPei detects all the available RAM and calls to pre-valid

[edk2-devel] [PATCH v10 14/32] OvmfPkg/MemEncryptSevLib: add support to validate system RAM

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Many of the integrity guarantees of SEV-SNP are enforced through the Reverse Map Table (RMP). Each RMP entry contains the GPA at which a particular page of DRAM should be mapped. The guest can request the hypervisor to add pages in the RMP ta

[edk2-devel] [PATCH v10 20/32] UefiCpuPkg: Define ConfidentialComputingGuestAttr

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 While initializing APs, the MpInitLib may need to know whether the guest is running with active AMD SEV or Intel TDX memory encryption. Add a new ConfidentialComputingGuestAttr PCD that can be used to query the memory encryption attribute.

[edk2-devel] [PATCH v10 10/32] OvmfPkg/SecMain: register GHCB gpa for the SEV-SNP guest

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The SEV-SNP guest requires that GHCB GPA must be registered before using. See the GHCB specification section 2.3.2 for more details. Cc: Michael Roth Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc:

[edk2-devel] [PATCH v10 11/32] OvmfPkg/VmgExitLib: use SEV-SNP-validated CPUID values

2021-10-19 Thread Brijesh Singh via groups.io
From: Michael Roth SEV-SNP firmware allows a special guest page to be populated with guest CPUID values so that they can be validated against supported host features before being loaded into encrypted guest memory to be used instead of hypervisor-provided values [1]. Add handling for this in the

[edk2-devel] [PATCH v10 15/32] OvmfPkg/MemEncryptSevLib: add function to check the VMPL0

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Virtual Machine Privilege Level (VMPL) feature in the SEV-SNP architecture allows a guest VM to divide its address space into four levels. The level can be used to provide the hardware isolated abstraction layers with a VM. The VMPL0 is the h

[edk2-devel] [PATCH v10 08/32] OvmfPkg/ResetVector: use SEV-SNP-validated CPUID values

2021-10-19 Thread Brijesh Singh via groups.io
From: Michael Roth CPUID instructions are issued during early boot to do things like probe for SEV support. Currently these are handled by a minimal #VC handler that uses the MSR-based GHCB protocol to fetch the CPUID values from the hypervisor. When SEV-SNP is enabled, use the firmware-validated

[edk2-devel] [PATCH v10 13/32] OvmfPkg/AmdSevDxe: do not use extended PCI config space

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Commit 85b8eac59b8c5bd9c7eb9afdb64357ce1aa2e803 added support to ensure that MMIO is only performed against the un-encrypted memory. If MMIO is performed against encrypted memory, a #GP is raised. The AmdSevDxe uses the functions provided by

[edk2-devel] [PATCH v10 04/32] OvmfPkg/ResetVector: introduce SEV metadata descriptor for VMM use

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The OvmfPkgX86 build reserves memory regions in MEMFD. The memory regions get accessed in the SEC phase. AMD SEV-SNP require that the guest's private memory be accepted or validated before access. Introduce a Guided metadata structure that d

[edk2-devel] [PATCH v10 12/32] OvmfPkg/PlatformPei: register GHCB gpa for the SEV-SNP guest

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 The SEV-SNP guest requires that GHCB GPA must be registered before using. See the GHCB specification section 2.3.2 for more details. Cc: Michael Roth Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc:

[edk2-devel] [PATCH v10 09/32] OvmfPkg/MemEncryptSevLib: add MemEncryptSevSnpEnabled()

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Create a function that can be used to determine if VM is running as an SEV-SNP guest. Cc: Michael Roth Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Erdem Aktas Cc: Gerd Hoffm

[edk2-devel] [PATCH v10 07/32] OvmfPkg/ResetVector: pre-validate the data pages used in SEC phase

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 An SEV-SNP guest requires that private memory (aka pages mapped encrypted) must be validated before being accessed. The validation process consist of the following sequence: 1) Set the memory encryption attribute in the page table (aka C-bi

[edk2-devel] [PATCH v10 03/32] OvmfPkg/ResetVector: move clearing GHCB in SecMain

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 In preparation for SEV-SNP support move clearing of the GHCB memory from the ResetVector/AmdSev.asm to SecMain/AmdSev.c. The GHCB page is not accessed until SevEsProtocolCheck() switch to full GHCB. So, the move does not make any changes in t

[edk2-devel] [PATCH v10 06/32] OvmfPkg: reserve CPUID page

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Platform features and capabilities are traditionally discovered via the CPUID instruction. Hypervisors typically trap and emulate the CPUID instruction for a variety of reasons. There are some cases where incorrect CPUID information can poten

[edk2-devel] [PATCH v10 02/32] UefiCpuPkg/MpInitLib: move SEV specific routines in AmdSev.c

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Move all the SEV specific function in AmdSev.c. No functional change intended. Cc: Eric Dong Cc: Ray Ni Cc: Rahul Kumar Cc: Michael Roth Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesh

[edk2-devel] [PATCH v10 01/32] OvmfPkg/SecMain: move SEV specific routines in AmdSev.c

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 Move all the SEV specific function in AmdSev.c. No functional change intended. Cc: Michael Roth Cc: James Bottomley Cc: Min Xu Cc: Jiewen Yao Cc: Tom Lendacky Cc: Jordan Justen Cc: Ard Biesheuvel Cc: Erdem Aktas Cc: Gerd Hoffmann A

[edk2-devel] [PATCH v10 00/32] Add AMD Secure Nested Paging (SEV-SNP) support

2021-10-19 Thread Brijesh Singh via groups.io
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=3275 SEV-SNP builds upon existing SEV and SEV-ES functionality while adding new hardware-based memory protections. SEV-SNP adds strong memory integrity protection to help prevent malicious hypervisor-based attacks like data replay, memory re-mappi

[edk2-devel] [PATCH v2] MdeModulePkg/DxeCapsuleLibFmp: Capsule on Disk file name capsule

2021-10-19 Thread Bob Morgan via groups.io
Enhance RelocateCapsuleToRam() to skip creation of the Capsule on Disk file name capsule if PcdSupportUpdateCapsuleReset feature is not enabled. This avoids an EFI_UNSUPPORTED return status from UpdateCapsule() when the file name capsule is encountered and PcdSupportUpdateCapsuleReset is FALSE. Cc

Re: [edk2-devel] [PATCH V2 1/3] MdePkg: Introduce TdProtocol for TD-Guest firmware

2021-10-19 Thread Yao, Jiewen
Good feedback. Thank you very much, Sami. Response inline. I proposed some naming change. Please let us know if that is OK. Thank you Yao, Jiewen > -Original Message- > From: devel@edk2.groups.io On Behalf Of Sami > Mujawar > Sent: Tuesday, October 19, 2021 9:21 PM > To: devel@edk2.g

Re: [edk2-devel] [PATCH v9 30/32] OvmfPkg/PlatformPei: mark cpuid and secrets memory reserved in EFI map

2021-10-19 Thread Brijesh Singh via groups.io
On 10/18/21 1:01 AM, Gerd Hoffmann wrote: > Hi, > >> The MEMFD range is outside of the firmware image map,  MEMFD begins with >> 0x80 [1] and in my boots I don't see it reserved in e820. > Ah, ok. > >> Here is the snippet. >> >> [ ... ] >> [    0.00] BIOS-e820: [mem 0x0080-0

Re: [edk2-devel] [PATCH V2 0/3] Introduce TdProtocol into EDK2

2021-10-19 Thread Min Xu
On October 19, 2021 5:52 PM, Sami Mujawar wrote: > I will start providing the feedback for this series starting today. > I may need some help to understand the sequence of the various patch > series that enable this feature and would be grateful if you could point me to > a Github branch that I can

Re: [edk2-devel] [PATCH V2 3/3] SecurityPkg: Support TdProtocol in DxeTpmMeasurementLib

2021-10-19 Thread Sami Mujawar
Hi Min, Jiewen, I believe this patch would need updating based on the changes done to patch 1/3 to make the measurment protocol architecture neutral. Other than that the code changes in this patch look good to me. Regards, Sami Mujawar On 08/10/2021 06:21 AM, Min Xu via groups.io wrote: BZ

Re: [edk2-devel] [PATCH V2 2/3] SecurityPkg: Support TdProtocol in DxeTpm2MeasureBootLib

2021-10-19 Thread Sami Mujawar
Hi Min, Jiewen, Thank you for this patch. I think this patch would need updating based on the changes done to patch 1/3. Other than that I have some general feedback marked inline as [SAMI]. Regards, Sami Mujawar On 08/10/2021 06:21 AM, Min Xu via groups.io wrote: BZ: https://bugzilla.ti

Re: [edk2-devel] [PATCH V2 1/3] MdePkg: Introduce TdProtocol for TD-Guest firmware

2021-10-19 Thread Sami Mujawar
Hi Min, Jiewen, Thank you for this patch. I think the protocol definition can be made architecturally neutral with a few modifications marked inline as [SAMI]. I am fine with renaming the protocol to either EFI_TEE_MEASUREMENT_PROTOCOL or EFI_CCAM_PROTOCOL. Similarly, some of the data struc

Re: [edk2-devel] [RFC PATCH edk2-platforms v1 0/5] Remove ARM nested packages

2021-10-19 Thread PierreGondois
Hi Ard, On 10/19/21 12:17, Ard Biesheuvel wrote: > On Tue, 19 Oct 2021 at 12:25, wrote: >> From: Pierre Gondois >> >> Bugzilla: 3259 (https://bugzilla.tianocore.org/show_bug.cgi?id=3259) >> >> The Platform/ARM/ARM.dec file implies that the Platform/ARM/ folder is >> a package. This folder howeve

Re: [edk2-devel] [RFC PATCH edk2-platforms v1 0/5] Remove ARM nested packages

2021-10-19 Thread Ard Biesheuvel
On Tue, 19 Oct 2021 at 12:25, wrote: > > From: Pierre Gondois > > Bugzilla: 3259 (https://bugzilla.tianocore.org/show_bug.cgi?id=3259) > > The Platform/ARM/ARM.dec file implies that the Platform/ARM/ folder is > a package. This folder however hosts other packages describing > platforms (JunoPkg,

[edk2-devel] [RFC PATCH edk2-platforms v1 5/5] Platform/ARM: Resolve ArmCommonPkg library references

2021-10-19 Thread PierreGondois
From: Pierre Gondois The Platform/ARM/ARM.dec file implies that the Platform/ARM/ folder is a package. This folder however hosts other packages describing platforms (JunoPkg, SgiPkg, ...) and packages describing drivers (BootMonFs, FdtPlatformDxe). As the Dec specification mention: "EDK II Pack

[edk2-devel] [RFC PATCH edk2-platforms v1 2/5] Platform/ARM: Create ArmCommonPkg.dec from ARM.dec

2021-10-19 Thread PierreGondois
From: Pierre Gondois The Platform/ARM/ARM.dec file implies that the Platform/ARM/ folder is a package. This folder however hosts other packages describing platforms (JunoPkg, SgiPkg, ...) and packages describing drivers (BootMonFs, FdtPlatformDxe). As the Dec specification mention: "EDK II Pack

[edk2-devel] [RFC PATCH edk2-platforms v1 3/5] Platform/ARM: Move BootMonFs package to ArmCommonPkg

2021-10-19 Thread PierreGondois
From: Pierre Gondois The Platform/ARM/ARM.dec file implies that the Platform/ARM/ folder is a package. This folder however hosts other packages describing platforms (JunoPkg, SgiPkg, ...) and packages describing drivers (BootMonFs, FdtPlatformDxe). As the Dec specification mention: "EDK II Pack

[edk2-devel] [RFC PATCH edk2-platforms v1 1/5] Platform/ARM: Create ArmCommonPkg

2021-10-19 Thread PierreGondois
From: Pierre Gondois The Platform/ARM/ARM.dec file implies that the Platform/ARM folder is a package. This folder however host other packages describing platforms (JunoPkg, SgiPkg, ...) and packages describing drivers (BootMonFs, FdtPlatformDxe). As the Dec specification mention: "EDK II Packag

[edk2-devel] [RFC PATCH edk2-platforms v1 4/5] Platform/ARM: Move FdtPlatformDxe package to ArmCommonPkg

2021-10-19 Thread PierreGondois
From: Pierre Gondois The Platform/ARM/ARM.dec file implies that the Platform/ARM/ folder is a package. This folder however hosts other packages describing platforms (JunoPkg, SgiPkg, ...) and packages describing drivers (BootMonFs, FdtPlatformDxe). As the Dec specification mention: "EDK II Pack

[edk2-devel] [RFC PATCH edk2-platforms v1 0/5] Remove ARM nested packages

2021-10-19 Thread PierreGondois
From: Pierre Gondois Bugzilla: 3259 (https://bugzilla.tianocore.org/show_bug.cgi?id=3259) The Platform/ARM/ARM.dec file implies that the Platform/ARM/ folder is a package. This folder however hosts other packages describing platforms (JunoPkg, SgiPkg, ...) and packages describing drivers (BootMo

Re: [edk2-devel] [PATCH V2 0/3] Introduce TdProtocol into EDK2

2021-10-19 Thread Sami Mujawar
Hi Jiewen, I will start providing the feedback for this series starting today. I may need some help to understand the sequence of the various patch series that enable this feature and would be grateful if you could point me to a Github branch that I can refer. Regards, Sami Mujawar On 18/10

[edk2-devel] [edk2-platforms][PATCH 30/30] Silicon/RISC-V: Add PciCpuIoDxe driver

2021-10-19 Thread Abner Chang
Add PCI CpuIo protocol to RISC-V. Signed-off-by: Abner Chang Cc: Daniel Schaefer Cc: Sunil V L --- .../RISC-V/ProcessorPkg/RiscVProcessorPkg.dsc | 1 + .../Universal/PciCpuIo2Dxe/PciCpuIo2Dxe.inf | 47 ++ .../Universal/PciCpuIo2Dxe/PciCpuIo2Dxe.c | 554 ++ 3 files chan

[edk2-devel] [edk2-platforms][PATCH 29/30] RISC-V/PlatformPkg: Determine hart number from DTB

2021-10-19 Thread Abner Chang
Determine total number of hart from DTB instead of using PCD. Signed-off-by: Abner Chang Cc: Daniel Schaefer Cc: Sunil V L --- .../U540.fdf.inc | 1 - .../OpensbiPlatformLib/OpensbiPlatformLib.inf | 3 - .../PlatformPkg/Universal/Sec/SecMain.inf | 1 - .../P

[edk2-devel] [edk2-platforms][PATCH 24/30] RiscV/ProcessorPkg: Use mtime CSR library

2021-10-19 Thread Abner Chang
Use mtime CSR library interface to access mtime CSR. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../Library/RiscVTimerLib/BaseRiscVTimerLib.inf | 3 ++- Silicon/RISC-V/ProcessorPkg/Universal/CpuDxe/CpuDxe.inf | 1 + .../ProcessorPkg/Library/RiscVTimerLib/

[edk2-devel] [edk2-platforms][PATCH 22/30] RiscVPlatformPkg/Sec: Add more comments to Secmain.c

2021-10-19 Thread Abner Chang
Add more comments to SecMain.c Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- Platform/RISC-V/PlatformPkg/Universal/Sec/SecMain.c | 9 ++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/Platform/RISC-V/PlatformPkg/Universal/Sec/SecMain.c b/Platform/RISC

[edk2-devel] [edk2-platforms][PATCH 27/30] RISC-V/PlatformPkg: Updates for the latest OpenSBI

2021-10-19 Thread Abner Chang
Code changes to incorporate with OpenSBI commit ID: a731c7e36988c3308e1978ecde491f2f6182d490 Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../OpensbiPlatformLib/OpensbiPlatformLib.inf | 10 +- .../PlatformPkg/Universal/Sec/SecMain.inf | 4 + .../Library/OpensbiPlatf

[edk2-devel] [edk2-platforms][PATCH 28/30] RiscVPlatformPkg/Sec: Separate EDK2 Opensbi platform hook.

2021-10-19 Thread Abner Chang
Separate EDK2 Opensbi platform operations hooks from Secmain as an individual library which can be override by OEM platform. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../RISC-V/PlatformPkg/RiscVPlatformPkg.dec | 1 + .../RISC-V/PlatformPkg/RiscVPlatformPkg.dsc |

[edk2-devel] [edk2-platforms][PATCH 26/30] SiFive/SerialPortLib: Remove global variable

2021-10-19 Thread Abner Chang
Remove global variable from SerialPortLib because this module is not necessarily executed in memory. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../SiFive/U5SeriesPkg/Include/SifiveU5Uart.h | 1 + .../Library/SerialIoLib/SerialPortLib.c | 58 +++ 2

[edk2-devel] [edk2-platforms][PATCH 23/30] RiscV/ProcessorPkg: Create read mtime CSR library instances

2021-10-19 Thread Abner Chang
Create library instances of reading Machine mode timer. - MacineModeTimerLib is used to read mtime CSR through platfrom library. - EmulatedMacineModeTimerLib is used to read mtime CSR through shadow CSR. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../RISC-V/Processor

[edk2-devel] [edk2-platforms][PATCH 25/30] Silicon/SiFive: Use mtime CSR library

2021-10-19 Thread Abner Chang
Use mtime CSR library interface to access mtime CSR in Timer DXE driver. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../FreedomU540HiFiveUnleashedBoard/U540.dsc | 2 ++ .../Universal/Dxe/TimerDxe/TimerDxe.inf| 1 + .../U5SeriesPkg/Universal/Dxe/TimerD

[edk2-devel] [edk2-platforms][PATCH 17/30] U5SeriesPkg/PeiCoreInfoHob: Remove hart count check

2021-10-19 Thread Abner Chang
Remove hart count check because the bootable hart count may be varied according to the harts declared in Device tree and PcdBootableHartNumber PCD. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../U5SeriesPkg/Library/PeiCoreInfoHobLib/CoreInfoHob.c | 9 + 1 file c

[edk2-devel] [edk2-platforms][PATCH 20/30] ProcessorPkg/opensbi: Update opensbi library

2021-10-19 Thread Abner Chang
Update opensbi library to a731c7e36988c3308e1978ecde491f2f6182d490, which is based on v0.9. Cc: Daniel Schaefer Cc: Sunil V L Signed-off-by: Daniel Schaefer --- Silicon/RISC-V/ProcessorPkg/Library/RiscVOpensbiLib/opensbi | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Sili

[edk2-devel] [edk2-platforms][PATCH 21/30] RiscVPlatformPkg/Sec: Check Cold/Warm hart

2021-10-19 Thread Abner Chang
Check Coldboot or Warmboot hart in SEC OpenSBI platform function. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../RISC-V/PlatformPkg/Universal/Sec/SecMain.c| 15 ++- 1 file changed, 14 insertions(+), 1 deletion(-) diff --git a/Platform/RISC-V/PlatformPkg/

[edk2-devel] [edk2-platforms][PATCH 19/30] RiscVPlatformPkg/U540: Add SortLib

2021-10-19 Thread Abner Chang
Add SortLib to run ram disk. Need to override generic library. Cc: Daniel Schaefer Cc: Sunil V L Signed-off-by: Daniel Schaefer --- .../U5SeriesPkg/FreedomU540HiFiveUnleashedBoard/U540.dsc | 3 +++ 1 file changed, 3 insertions(+) diff --git a/Platform/SiFive/U5SeriesPkg/FreedomU540HiF

[edk2-devel] [edk2-platforms][PATCH 11/30] SiFive/U540: RiscVSpecialPlatformLib instance of U540

2021-10-19 Thread Abner Chang
Provide platform_override of U540 platform. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../FreedomU540HiFiveUnleashedBoard/U540.dsc | 1 + .../RiscVSpecialPlatformLib.inf | 36 .../RiscVSpecialPlatformLib/SifiveFu540.c | 56 ++

[edk2-devel] [edk2-platforms][PATCH 18/30] RiscVPlatformPkg/RiscVSpecialPlatformLib: Rename module name

2021-10-19 Thread Abner Chang
Rename RiscVSpecialPlatformLib to RiscVSpecialPlatformLibNull because this is the NULL instance for RiscVPlatformPkg. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- Platform/RISC-V/PlatformPkg/RiscVPlatformPkg.dsc | 4 ++-- .../RiscVSpecialPlatformLibNull.inf}

[edk2-devel] [edk2-platforms][PATCH 16/30] RiscVPlatformPkg/U540: Only use four harts on U540

2021-10-19 Thread Abner Chang
Only use four harts on U540 reference code. This overwrites the bootable harts declared in Device Tree. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../FreedomU540HiFiveUnleashedBoard/U540.fdf.inc| 13 ++--- 1 file changed, 10 insertions(+), 3 deletions(-) di

[edk2-devel] [edk2-platforms][PATCH 14/30] RiscVPlatformPkg/Sec: Initial hart_index2Id array

2021-10-19 Thread Abner Chang
Initial hart index to Id array by invoking OpenSBI fw_platform_init function. Introduce PcdBootableHartIndexToId PCD which could be used to overwrite the hart_index2Id arrary built from Devie tree according to platform demand. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang ---

[edk2-devel] [edk2-platforms][PATCH 12/30] Platform/RISC-V: Remove platform dependency from this library

2021-10-19 Thread Abner Chang
This is the generic library for all RISC-V platforms. Remove the dependencies of SiFive U540 platform. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../OpensbiPlatformLib/OpensbiPlatformLib.inf | 3 +- .../OpensbiPlatformLib/PlatformOverride.h | 30 .../L

[edk2-devel] [edk2-platforms][PATCH 13/30] Platform/RISC-V: Remove Null instance of OpensbilatformLibNull

2021-10-19 Thread Abner Chang
Remove Null instance of OpensbilatformLibNull, OpensbilatformLib is the generic one for RsicVPlatformPkg. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../RISC-V/PlatformPkg/RiscVPlatformPkg.dsc | 2 +- .../OpensbiPlatformLibNull.inf| 38 --

[edk2-devel] [edk2-platforms][PATCH 15/30] RiscVPlatformPkg/OpensbiPlatformLib: Remove platform code

2021-10-19 Thread Abner Chang
Remove platform code from generic OpensbiPlatfomLib. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../Library/OpensbiPlatformLib/Platform.c | 25 ++- 1 file changed, 7 insertions(+), 18 deletions(-) diff --git a/Platform/RISC-V/PlatformPkg/Library/Open

[edk2-devel] [edk2-platforms][PATCH 07/30] Platform/RISC-V: Use PlatformSecPpiLib

2021-10-19 Thread Abner Chang
Use PlatformSecPpiLib to get PPI descriptor and remove PPI descriptor related code from SEC. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../PeiCoreEntryPoint/PeiCoreEntryPoint.inf | 1 + .../PlatformPkg/Universal/Sec/SecMain.inf | 4 - .../PlatformPkg/Universal/S

[edk2-devel] [edk2-platforms][PATCH 08/30] Platform/SiFive: CoreInfoHob uses RiscVFirmwareContextLib

2021-10-19 Thread Abner Chang
CoreInfoHob uses RiscVFirmwareContextLib to get the pointer of FirmwareContext. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../Library/PeiCoreInfoHobLib/PeiCoreInfoHobLib.inf | 3 ++- Silicon/SiFive/U54/Library/PeiCoreInfoHobLib/CoreInfoHob.c | 6 +++--- 2 files

[edk2-devel] [edk2-platforms][PATCH 10/30] Platform/RISC-V: Add NULL library instance of RiscVSpecialPlatformLib

2021-10-19 Thread Abner Chang
This is the library instance to provide platform_override for the special RISC-V platform. This module incorporates with OpensbiPlatformLib and RISC-V Opensbi library. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../RISC-V/ProcessorPkg/RiscVProcessorPkg.dec | 1 + .../RI

[edk2-devel] [edk2-platforms][PATCH 06/30] Platform/U540: Provide PlatormSecPpiLib

2021-10-19 Thread Abner Chang
Provide PlatormSecPpiLib instance for U540 Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../FreedomU540HiFiveUnleashedBoard/U540.dsc | 1 + .../PlatformSecPpiLib/PlatformSecPpiLib.inf | 43 + .../PlatformSecPpiLib/PlatformSecPpiLib.c | 148 ++

[edk2-devel] [edk2-platforms][PATCH 09/30] SiFive/U5SeriesPkg: Add CLINT to Device Tree

2021-10-19 Thread Abner Chang
Add CLINT to Device Tree on U540 platform for M-mode timer and IPI. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../DeviceTree/fu540-c000.dtsi| 591 +- 1 file changed, 304 insertions(+), 287 deletions(-) diff --git a/Platform/SiFive/U5Ser

[edk2-devel] [edk2-platforms][PATCH 02/30] RISC-V: Add RISC-V PeiCoreEntryPoint library

2021-10-19 Thread Abner Chang
- Add RISC-V PeiCoreEntryPoint library that incorporates with opensbi next phase switching mechanism. - Use RiscVFirmwareContext library to get the pointer of opensbi FirmwareContext. Cc: Sunil V L Cc: Daniel Schaefer Signed-off-by: Abner Chang --- .../RISC-V/PlatformPkg/RiscVPlatformPkg.

[edk2-devel] [edk2-platforms][PATCH 04/30] RISC-V: Use RISC-V PeiCoreEntryPoint library

2021-10-19 Thread Abner Chang
1. Use RISC-V PeiCoreEntryPoint library instance for opensbi to switch to the next phase with arg0 as HART Id and arg1 as the SEC to PEI handoff data. 2. Introduce EDK2 opensbi platform operation functions. With this, OEM can has its won platform initialization code before and/or after

[edk2-devel] [edk2-platforms][PATCH 03/30] RISC-V: Create opensbi firmware domains

2021-10-19 Thread Abner Chang
Incorporate with opensbi to create three firmware domains, - Boot firmware domain, which built with opensbi library as M-mode access only region. - Firmware domain which includes PEI and DXE regions, the PMP attribute is readable, wriable and executable. - EFI Variable region which is readable

[edk2-devel] [edk2-platforms][PATCH 00/30] EDK2 RISC-V port with opensbi v0.9

2021-10-19 Thread Abner Chang
This is the patch set to incorporate opensbi v0.9 with edk2 RISC-V port. There are many architecture changes to compliant with the RISC-V SBI implementation (opensbi) and also provide the flexibility to OEM platform. Below is the summary of major changes. You can also refer to patch (1/31) to unde

  1   2   >