From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: ross.philipson@oracle.com, hpa@zytor.com
Cc: "H. Peter Anvin" <hpa@zytor.com>,
linux-kernel@vger.kernel.org, x86@kernel.org,
linux-integrity@vger.kernel.org, linux-doc@vger.kernel.org,
linux-crypto@vger.kernel.org, kexec@lists.infradead.org,
linux-efi@vger.kernel.org, iommu@lists.linux.dev,
dpsmith@apertussolutions.com, tglx@linutronix.de,
mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com,
ardb@kernel.org, mjg59@srcf.ucam.org,
James.Bottomley@hansenpartnership.com, peterhuewe@gmx.de,
jarkko@kernel.org, jgg@ziepe.ca, luto@amacapital.net,
nivedita@alum.mit.edu, herbert@gondor.apana.org.au,
davem@davemloft.net, corbet@lwn.net, ebiederm@xmission.com,
dwmw2@infradead.org, baolu.lu@linux.intel.com,
kanth.ghatraju@oracle.com, andrew.cooper3@citrix.com,
trenchboot-devel@googlegroups.com
Subject: Re: [PATCH v13 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch
Date: Tue, 8 Apr 2025 18:34:16 -0400 [thread overview]
Message-ID: <Z_WkaJhel-BYxHeW@char.us.oracle.com> (raw)
In-Reply-To: <886145d3-a9f2-41f3-a754-253decdb1b4f@oracle.com>
..snip..
> > > @@ -925,6 +1014,11 @@ void __noreturn efi_stub_entry(efi_handle_t handle,
> > > goto fail;
> > > }
> > >
> > > +#if (IS_ENABLED(CONFIG_SECURE_LAUNCH))
> > > + /* If a Secure Launch is in progress, this never returns */
> > > + efi_secure_launch(boot_params);
> > > +#endif
> > > +
> > > /*
> > > * Call the SEV init code while still running with the firmware's
> > > * GDT/IDT, so #VC exceptions will be handled by EFI.
> >
> > efi_set_u64_form()?
> >
> > What the heck is that? If it actually involves two u32 packed into a 64 field, why not simply do two stores?
> >
>
> Well the story is this. The EFI maintainers asked me to use the
> efi_set_u64_split() type functions (this one splits a u64 into 2 u32). I
> went to look and there was no function that did the opposite action so I
> added it. The original function was called efi_set_u64_split() so
> efi_set_u64_form() was what I came up with. I can name it anything that is
> desired.
Hey Peter,
Is there anything in particular that needs to be done to this patch?
Thx
next prev parent reply other threads:[~2025-04-08 22:35 UTC|newest]
Thread overview: 27+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-03-28 23:07 [PATCH v13 00/19] x86: Trenchboot secure dynamic launch Linux kernel support Ross Philipson
2025-03-28 23:07 ` [PATCH v13 01/19] Documentation/x86: Secure Launch kernel documentation Ross Philipson
2025-03-28 23:07 ` [PATCH v13 02/19] x86: Secure Launch Kconfig Ross Philipson
2025-03-28 23:07 ` [PATCH v13 03/19] x86: Secure Launch Resource Table header file Ross Philipson
2025-03-28 23:07 ` [PATCH v13 04/19] x86: Secure Launch main " Ross Philipson
2025-03-28 23:08 ` [PATCH v13 05/19] x86: Add early SHA-1 support for Secure Launch early measurements Ross Philipson
2025-03-28 23:08 ` [PATCH v13 06/19] x86: Add early SHA-256 " Ross Philipson
2025-03-28 23:08 ` [PATCH v13 07/19] x86/msr: Add variable MTRR base/mask and x2apic ID registers Ross Philipson
2025-03-28 23:08 ` [PATCH v13 08/19] x86/boot: Place TXT MLE header in the kernel_info section Ross Philipson
2025-03-28 23:08 ` [PATCH v13 09/19] x86: Secure Launch kernel early boot stub Ross Philipson
2025-03-28 23:08 ` [PATCH v13 10/19] x86: Secure Launch kernel late " Ross Philipson
2025-03-28 23:08 ` [PATCH v13 11/19] x86: Secure Launch SMP bringup support Ross Philipson
2025-03-28 23:08 ` [PATCH v13 12/19] kexec: Secure Launch kexec SEXIT support Ross Philipson
2025-03-28 23:08 ` [PATCH v13 13/19] x86/reboot: Secure Launch SEXIT support on reboot paths Ross Philipson
2025-03-28 23:08 ` [PATCH v13 14/19] tpm, tpm_tis: Close all localities Ross Philipson
2025-03-28 23:08 ` [PATCH v13 15/19] tpm, tpm_tis: Address positive localities in tpm_tis_request_locality() Ross Philipson
2025-03-28 23:08 ` [PATCH v13 16/19] tpm, tpm_tis: Allow locality to be set to a different value Ross Philipson
2025-03-28 23:08 ` [PATCH v13 17/19] tpm, sysfs: Show locality used by kernel Ross Philipson
2025-03-28 23:08 ` [PATCH v13 18/19] x86: Secure Launch late initcall platform module Ross Philipson
2025-03-28 23:08 ` [PATCH v13 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch Ross Philipson
2025-03-30 1:13 ` H. Peter Anvin
2025-03-31 18:29 ` ross.philipson
2025-04-08 22:34 ` Konrad Rzeszutek Wilk [this message]
2025-04-09 9:15 ` Ard Biesheuvel
2025-03-29 11:32 ` [PATCH v13 00/19] x86: Trenchboot secure dynamic launch Linux kernel support Jarkko Sakkinen
2025-03-29 20:46 ` ross.philipson
-- strict thread matches above, loose matches on Subject: below --
2025-04-10 20:41 Ross Philipson
2025-04-10 20:41 ` [PATCH v13 19/19] x86/efi: EFI stub DRTM launch support for Secure Launch Ross Philipson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Z_WkaJhel-BYxHeW@char.us.oracle.com \
--to=konrad.wilk@oracle.com \
--cc=James.Bottomley@hansenpartnership.com \
--cc=andrew.cooper3@citrix.com \
--cc=ardb@kernel.org \
--cc=baolu.lu@linux.intel.com \
--cc=bp@alien8.de \
--cc=corbet@lwn.net \
--cc=dave.hansen@linux.intel.com \
--cc=davem@davemloft.net \
--cc=dpsmith@apertussolutions.com \
--cc=dwmw2@infradead.org \
--cc=ebiederm@xmission.com \
--cc=herbert@gondor.apana.org.au \
--cc=hpa@zytor.com \
--cc=iommu@lists.linux.dev \
--cc=jarkko@kernel.org \
--cc=jgg@ziepe.ca \
--cc=kanth.ghatraju@oracle.com \
--cc=kexec@lists.infradead.org \
--cc=linux-crypto@vger.kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=linux-efi@vger.kernel.org \
--cc=linux-integrity@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@amacapital.net \
--cc=mingo@redhat.com \
--cc=mjg59@srcf.ucam.org \
--cc=nivedita@alum.mit.edu \
--cc=peterhuewe@gmx.de \
--cc=ross.philipson@oracle.com \
--cc=tglx@linutronix.de \
--cc=trenchboot-devel@googlegroups.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox