From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from walk.intel-email.com (walk.intel-email.com [101.227.64.242]) by mx.groups.io with SMTP id smtpd.web11.456.1668128050040949385 for ; Thu, 10 Nov 2022 16:54:10 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@byosoft.com.cn header.s=cloud-union header.b=IfzxRc9R; spf=pass (domain: byosoft.com.cn, ip: 101.227.64.242, mailfrom: gaoliming@byosoft.com.cn) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id 01741CD1F7C0 for ; Fri, 11 Nov 2022 08:54:06 +0800 (CST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=byosoft.com.cn; s=cloud-union; t=1668128046; bh=x1RDwrE1jymWxULq/xBBAsoi6spAUf8/93PJqV/vwDc=; h=From:To:Cc:References:In-Reply-To:Subject:Date; b=IfzxRc9Ru/7Rus5fbH4lQPSJ4tcC50lhuO+g4nev7lCAWjST2qCC0RhVLw1/50XsB 9gGEfzLp05MaSvk3G/ac2a2Y7KDEfB0RUZxcVtFfMkqZygxVijG7ITItwcYLLyUM+R uYv59aQsX3m23NRukoV/CXh1qOkpUwi5kXmuIiPI= Received: from localhost (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id F1A81CD1F7BF for ; Fri, 11 Nov 2022 08:54:05 +0800 (CST) Received: from walk.intel-email.com (localhost [127.0.0.1]) by walk.intel-email.com (Postfix) with ESMTP id C76F3CD1F7BA for ; Fri, 11 Nov 2022 08:54:05 +0800 (CST) Authentication-Results: walk.intel-email.com; none Received: from mail.byosoft.com.cn (mail.byosoft.com.cn [58.240.74.242]) by walk.intel-email.com (Postfix) with SMTP id D157ECD1F6DA for ; Fri, 11 Nov 2022 08:54:02 +0800 (CST) Received: from DESKTOPS6D0PVI ([58.246.60.130]) (envelope-sender ) by 192.168.6.13 with ESMTP for ; Fri, 11 Nov 2022 08:53:59 +0800 X-WM-Sender: gaoliming@byosoft.com.cn X-Originating-IP: 58.246.60.130 X-WM-AuthFlag: YES X-WM-AuthUser: gaoliming@byosoft.com.cn From: "gaoliming" To: "'Chiu, Chasel'" , "'Kinney, Michael D'" Cc: "'Desimone, Nathaniel L'" , "'Zeng, Star'" , "'S, Ashraf Ali'" , "'Duggapu, Chinni B'" , , "'Kuo, Ted'" References: <982993884529155a9bba1fa0a09a33301a0ded35.1667982515.git.ted.kuo@intel.com> In-Reply-To: Subject: =?UTF-8?B?5Zue5aSNOiBbZWRrMi1kZXZlbF1bUEFUQ0ggdjFdIEludGVsRnNwMlBrZzogSW1wcm92ZW1lbnQgb2Ygc3VwcG9ydGluZyBudWxsIFVQRCBwb2ludGVyIGluIEZTUC1U?= Date: Fri, 11 Nov 2022 08:54:02 +0800 Message-ID: <00e801d8f568$173ce3e0$45b6aba0$@byosoft.com.cn> MIME-Version: 1.0 X-Mailer: Microsoft Outlook 16.0 Thread-Index: AQKTs1X8BrygnG5z8eBLmNWwoq5A6gFbryafrLiLkcA= Sender: "gaoliming" Content-Type: text/plain; charset="gb2312" Content-Transfer-Encoding: quoted-printable Content-Language: zh-cn Chasel: Please see the announce mail = https://edk2.groups.io/g/devel/message/96175 Now, we are in soft feature freeze. If the patch wants to catch this stable tag, please highlight it and get approval from Stewards. Thanks Liming > -----=D3=CA=BC=FE=D4=AD=BC=FE----- > =B7=A2=BC=FE=C8=CB: Chiu, Chasel > =B7=A2=CB=CD=CA=B1=BC=E4: 2022=C4=EA11=D4=C211=C8=D5 8:47 > =CA=D5=BC=FE=C8=CB: Gao, Liming ; Kinney, = Michael D > > =B3=AD=CB=CD: Desimone, Nathaniel L ; = Zeng, Star > ; S, Ashraf Ali ; = Duggapu, > Chinni B ; devel@edk2.groups.io; Kuo, Ted > > =D6=F7=CC=E2: RE: [edk2-devel][PATCH v1] IntelFsp2Pkg: Improvement of = supporting > null UPD pointer in FSP-T >=20 >=20 > Hi Liming, Michael, >=20 > May I know why we cannot merge this PR > https://github.com/tianocore/edk2/pull/3624 ? > Was it due to Hard Feature Freeze? But I thought we still have time = right? >=20 > Thanks, > Chasel >=20 >=20 > > -----Original Message----- > > From: devel@edk2.groups.io On Behalf Of Kuo, > > Ted > > Sent: Wednesday, November 9, 2022 3:31 AM > > To: devel@edk2.groups.io > > Cc: Chiu, Chasel ; Desimone, Nathaniel L > > ; Zeng, Star ; = S, > > Ashraf Ali ; Duggapu, Chinni B > > > > Subject: [edk2-devel][PATCH v1] IntelFsp2Pkg: Improvement of = supporting > > null UPD pointer in FSP-T > > > > REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D4114 > > > > 1.Use xmm5 slot 1 and xmm6 slot 3 to save ucode status and UPD = pointer > > respectively in TempRamInitApi in IA32 FspSecCoreT. > > 2.Correct inappropriate description in the return value of > > AsmGetFspInfoHeader. > > 3.Replace hardcoded offset value 0x1C with > > FSP_HEADER_IMGBASE_OFFSET in > > FspHeler.nasm. > > > > Cc: Chasel Chiu > > Cc: Nate DeSimone > > Cc: Star Zeng > > Cc: Ashraf Ali S > > Cc: Chinni B Duggapu > > Signed-off-by: Ted Kuo > > --- > > .../FspSecCore/Ia32/FspApiEntryT.nasm | 17 +++-- > > IntelFsp2Pkg/FspSecCore/Ia32/FspHelper.nasm | 4 +- > > .../FspSecCore/Ia32/SaveRestoreSseNasm.inc | 74 > ++++++++++--------- > > IntelFsp2Pkg/FspSecCore/SecFsp.h | 2 +- > > IntelFsp2Pkg/FspSecCore/X64/FspHelper.nasm | 4 +- > > 5 files changed, 55 insertions(+), 46 deletions(-) > > > > diff --git a/IntelFsp2Pkg/FspSecCore/Ia32/FspApiEntryT.nasm > > b/IntelFsp2Pkg/FspSecCore/Ia32/FspApiEntryT.nasm > > index 73821ad22a..2cff8b3643 100644 > > --- a/IntelFsp2Pkg/FspSecCore/Ia32/FspApiEntryT.nasm > > +++ b/IntelFsp2Pkg/FspSecCore/Ia32/FspApiEntryT.nasm > > @@ -594,37 +594,38 @@ ASM_PFX(TempRamInitApi): > > SAVE_EAX SAVE_EDX + CALL_EBP > ASM_PFX(LoadUpdPointerToECX) ; > > ECX for UPD param+ SAVE_ECX ; > save UPD param to slot > > 3 in xmm6+ ; ; Sec Platform Init ;- CALL_EBP > > ASM_PFX(LoadUpdPointerToECX) ; ECX for UPD param CALL_MMX > > ASM_PFX(SecPlatformInit) cmp eax, 0 jnz > TempRamInitExit ; > > Load microcode LOAD_ESP- CALL_EBP > ASM_PFX(LoadUpdPointerToECX) ; > > ECX for UPD param+ LOAD_ECX CALL_MMX > > ASM_PFX(LoadMicrocodeDefault)- SXMMN xmm6, 3, > eax ;Save > > microcode return status in ECX-SLOT 3 in xmm6.+ > > SAVE_UCODE_STATUS ; Save microcode return status in > slot 1 in > > xmm5. ;@note If return value eax is not 0, microcode did not load, = but > > continue and attempt to boot. ; Call Sec CAR Init LOAD_ESP- > CALL_EBP > > ASM_PFX(LoadUpdPointerToECX) ; ECX for UPD param+ LOAD_ECX > > CALL_MMX ASM_PFX(SecCarInit) cmp eax, 0 jnz > TempRamInitExit > > LOAD_ESP- CALL_EBP ASM_PFX(LoadUpdPointerToECX) ; ECX for UPD > > param- mov edi, ecx ; Save UPD param > to EDI for later code > > use+ LOAD_ECX+ mov edi, ecx ; Save UPD > param to EDI for > > later code use CALL_MMX ASM_PFX(EstablishStackFsp) cmp > eax, 0 > > jnz TempRamInitExit - LXMMN xmm6, eax, 3 ;Restore > microcode > > status if no CAR init error from ECX-SLOT 3 in xmm6.- SXMMN = xmm6, > 3, > > edi ;Save FSP-T UPD parameter pointer in ECX-SLOT 3 in xmm6.+ > > LOAD_UCODE_STATUS ; Restore microcode status if no > CAR init > > error from slot 1 in xmm5. TempRamInitExit: mov bl, > al ; > > save al data in bldiff --git a/IntelFsp2Pkg/FspSecCore/Ia32/FspHelper.nasm > > b/IntelFsp2Pkg/FspSecCore/Ia32/FspHelper.nasm > > index e3e1945473..3c63f6eea5 100644 > > --- a/IntelFsp2Pkg/FspSecCore/Ia32/FspHelper.nasm > > +++ b/IntelFsp2Pkg/FspSecCore/Ia32/FspHelper.nasm > > @@ -7,6 +7,8 @@ > > SECTION .text +FSP_HEADER_IMGBASE_OFFSET EQU 1Ch+ > global > > ASM_PFX(FspInfoHeaderRelativeOff) ASM_PFX(FspInfoHeaderRelativeOff): > > DD 0x12345678 ; This value must be patched by the > build > > script@@ -14,7 +16,7 @@ ASM_PFX(FspInfoHeaderRelativeOff): > > global ASM_PFX(AsmGetFspBaseAddress) > > ASM_PFX(AsmGetFspBaseAddress): call > > ASM_PFX(AsmGetFspInfoHeader)- add eax, 0x1C+ add eax, > > FSP_HEADER_IMGBASE_OFFSET mov eax, dword [eax] ret diff > --git > > a/IntelFsp2Pkg/FspSecCore/Ia32/SaveRestoreSseNasm.inc > > b/IntelFsp2Pkg/FspSecCore/Ia32/SaveRestoreSseNasm.inc > > index 4c321cbece..a222f2e376 100644 > > --- a/IntelFsp2Pkg/FspSecCore/Ia32/SaveRestoreSseNasm.inc > > +++ b/IntelFsp2Pkg/FspSecCore/Ia32/SaveRestoreSseNasm.inc > > @@ -1,6 +1,6 @@ > > ;------------------------------------------------------------------------= --- --- ;-; > Copyright (c) > > 2015 - 2019, Intel Corporation. All rights reserved.
+; Copyright = (c) > > 2015 - 2022, Intel Corporation. All rights reserved.
; = SPDX-License- > > Identifier: BSD-2-Clause-Patent ; ; Abstract:@@ -16,21 +16,21 @@ > > ; ; Define SSE macros using SSE 4.1 instructions ; args 1:XMM, = 2:IDX, > > 3:REG-%macro SXMMN 3+%macro SXMMN 3 > pinsrd %1, %3, > > (%2 & 3) %endmacro ; ;args 1:XMM, 2:REG, > 3:IDX ;-%macro > > LXMMN 3+%macro LXMMN 3 > pextrd %2, %1, (%3 & 3) > > %endmacro %else ; ; Define SSE macros using SSE 2 instructions ; = args > > 1:XMM, 2:IDX, 3:REG-%macro SXMMN 3+%macro SXMMN 3 > > pinsrw %1, %3, (%2 & 3) * 2 ror %3, 16 > pinsrw %1, %3, > > (%2 & 3) * 2 + 1@@ -38,19 +38,19 @@ > > %endmacro ;-;args 1:XMM, 2:REG, 3:IDX+;args > 1:XMM, 2:REG, > > 3:IDX ; %macro LXMMN 3- pshufd %1, %1, > ((0E4E4E4h >> (%3 * 2)) > > & 0FFh)+ pshufd %1, %1, ((0E4E4E4h >> (%3 * 2)) & > 0FFh) > > movd %2, %1- pshufd %1, %1, ((0E4E4E4h >> (%3 * > 2 + (%3 & 1) * > > 4)) & 0FFh)+ pshufd %1, %1, ((0E4E4E4h >> (%3 * 2 + (%3 > & 1) * 4)) > > & 0FFh) %endmacro %endif ;-; XMM7 to save/restore > EBP, EBX, ESI, > > EDI+; XMM7 to save/restore EBP - slot 0, EBX - slot 1, ESI - slot 2, = EDI - slot > > 3 ;-%macro SAVE_REGS 0+%macro SAVE_REGS 0 SXMMN > xmm7, 0, > > ebp SXMMN xmm7, 1, ebx SXMMN xmm7, 2, esi@@ > -67,63 +67,67 > > @@ > > %endmacro ;-; XMM6 to save/restore EAX, EDX, ECX, > ESP+; XMM6 > > to save/restore ESP - slot 0, EAX - slot 1, EDX - slot 2, ECX - slot = 3 ;-%macro > > LOAD_EAX 0+%macro LOAD_ESP 0+ movd esp, > xmm6+ > > %endmacro++%macro SAVE_ESP 0+ SXMMN xmm6, 0, esp+ > > %endmacro++%macro LOAD_EAX 0 LXMMN xmm6, eax, 1 > > %endmacro -%macro SAVE_EAX 0+%macro SAVE_EAX 0 > SXMMN > > xmm6, 1, eax %endmacro -%macro LOAD_EDX > 0+%macro > > LOAD_EDX 0 LXMMN xmm6, edx, > 2 %endmacro -%macro > > SAVE_EDX 0+%macro SAVE_EDX 0 SXMMN xmm6, 2, > edx > > %endmacro -%macro SAVE_ECX 0- SXMMN xmm6, 3, ecx- > > %endmacro--%macro LOAD_ECX 0+%macro LOAD_ECX 0 > LXMMN > > xmm6, ecx, 3 %endmacro -%macro SAVE_ESP 0- > SXMMN > > xmm6, 0, esp+%macro SAVE_ECX 0+ SXMMN xmm6, 3, ecx > > %endmacro -%macro LOAD_ESP 0- movd esp, xmm6- > > %endmacro ;-; XMM5 for calling stack+; XMM5 slot 0 for calling stack = ; arg > > 1:Entry %macro CALL_XMM 1 mov > esi, %%ReturnAddress- > > pslldq xmm5, 4-%ifdef USE_SSE41_FLAG- pinsrd xmm5, > esi, 0- > > %else- pinsrw xmm5, esi, 0- ror esi, > 16- pinsrw > > xmm5, esi, 1-%endif+ SXMMN xmm5, 0, esi > mov esi, %1 > > jmp esi %%ReturnAddress: %endmacro %macro > RET_XMM 0- > > movd esi, xmm5- psrldq xmm5, 4+ > LXMMN xmm5, esi, 0 > > jmp esi %endmacro +;+; XMM5 slot 1 for uCode > status+;+%macro > > LOAD_UCODE_STATUS 0+ LXMMN xmm5, eax, 1+ > > %endmacro++%macro SAVE_UCODE_STATUS 0+ SXMMN > xmm5, 1, > > eax+ %endmacro+ %macro ENABLE_SSE > 0 ; ; Initialize > > floating point unitsdiff --git a/IntelFsp2Pkg/FspSecCore/SecFsp.h > > b/IntelFsp2Pkg/FspSecCore/SecFsp.h > > index d7a5976c12..693af29f20 100644 > > --- a/IntelFsp2Pkg/FspSecCore/SecFsp.h > > +++ b/IntelFsp2Pkg/FspSecCore/SecFsp.h > > @@ -79,7 +79,7 @@ AsmGetFspBaseAddress ( > > /** This interface gets FspInfoHeader pointer - @return FSP > binary base > > address.+ @return FSP info header. **/ UINTNdiff --git > > a/IntelFsp2Pkg/FspSecCore/X64/FspHelper.nasm > > b/IntelFsp2Pkg/FspSecCore/X64/FspHelper.nasm > > index 122fa1d174..71624a3aad 100644 > > --- a/IntelFsp2Pkg/FspSecCore/X64/FspHelper.nasm > > +++ b/IntelFsp2Pkg/FspSecCore/X64/FspHelper.nasm > > @@ -7,10 +7,12 @@ > > DEFAULT REL SECTION .text > +FSP_HEADER_IMGBASE_OFFSET EQU > > 1Ch+ global ASM_PFX(AsmGetFspBaseAddress) > > ASM_PFX(AsmGetFspBaseAddress): call > > ASM_PFX(AsmGetFspInfoHeader)- add rax, 0x1C+ add rax, > > FSP_HEADER_IMGBASE_OFFSET mov eax, [rax] ret -- > > 2.35.3.windows.1 > > > > > > > > -=3D-=3D-=3D-=3D-=3D-=3D > > Groups.io Links: You receive all messages sent to this group. > > View/Reply Online (#96131): > > https://edk2.groups.io/g/devel/message/96131 > > Mute This Topic: https://groups.io/mt/94910671/1777047 > > Group Owner: devel+owner@edk2.groups.io > > Unsubscribe: https://edk2.groups.io/g/devel/unsub > [chasel.chiu@intel.com] > > -=3D-=3D-=3D-=3D-=3D-=3D > >