public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Chiu, Chasel" <chasel.chiu@intel.com>
To: devel@edk2.groups.io
Cc: Nate DeSimone <nathaniel.l.desimone@intel.com>,
	Michael A Kubacki <michael.a.kubacki@intel.com>,
	Sai Chaganty <rangasai.v.chaganty@intel.com>
Subject: [PATCH 0/2] Kabylake*Pkg: FSP 2.1 SEC handling.
Date: Fri, 31 May 2019 19:42:49 +0800	[thread overview]
Message-ID: <20190531114251.12024-1-chasel.chiu@intel.com> (raw)

To support Dispatch mode PlatformSecLib needs:
1. Report PeiCoreFvLocationPPI to SecMain so PeiCore from FSP-M can be loaded.
2. Consume FspTempRamExitPpi produced by FSP to disable temporary memory.

0001-KabylakeSiliconPkg: Add FspTempRamExitPpi
0002-KabylakeOpenBoardPkg: Report PeiCoreFvLocation and consume FspTempRamExitPpi

Cc: Nate DeSimone <nathaniel.l.desimone@intel.com>
Cc: Michael A Kubacki <michael.a.kubacki@intel.com>
Cc: Sai Chaganty <rangasai.v.chaganty@intel.com>
Signed-off-by: Chasel Chiu <chasel.chiu@intel.com>

Chasel, Chiu (2):
  KabylakeSiliconPkg: FSP 2.1 SEC handling.
  KabylakeOpenBoardPkg: FSP 2.1 SEC handling.

 .../FspWrapperPlatformSecLib.c                | 186 +++++++++
 .../PlatformInit.c                            |  47 +++
 .../SecGetPerformance.c                       |  89 +++++
 .../SecPlatformInformation.c                  |  78 ++++
 .../SecRamInitData.c                          |  36 ++
 .../SecTempRamDone.c                          |  73 ++++
 .../SecFspWrapperPlatformSecLib/FsptCoreUpd.h |  40 ++
 .../SecFspWrapperPlatformSecLib/Ia32/Fsp.h    |  42 ++
 .../Ia32/PeiCoreEntry.nasm                    | 130 +++++++
 .../Ia32/SecEntry.nasm                        | 361 ++++++++++++++++++
 .../Ia32/Stack.nasm                           |  72 ++++
 .../SecFspWrapperPlatformSecLib.inf           |  97 +++++
 .../KabylakeRvp3/OpenBoardPkg.dsc             |   2 +-
 .../KabylakeRvp3/OpenBoardPkg.fdf             |   2 +-
 .../Include/Ppi/TempRamExitPpi.h              |  50 +++
 Silicon/Intel/KabylakeSiliconPkg/SiPkg.dec    |   2 +
 16 files changed, 1305 insertions(+), 2 deletions(-)
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/FspWrapperPlatformSecLib.c
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/PlatformInit.c
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/SecGetPerformance.c
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/SecPlatformInformation.c
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/SecRamInitData.c
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/SecTempRamDone.c
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/FsptCoreUpd.h
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/Ia32/Fsp.h
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/Ia32/PeiCoreEntry.nasm
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/Ia32/SecEntry.nasm
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/Ia32/Stack.nasm
 create mode 100644 Platform/Intel/KabylakeOpenBoardPkg/FspWrapper/Library/SecFspWrapperPlatformSecLib/SecFspWrapperPlatformSecLib.inf
 create mode 100644 Silicon/Intel/KabylakeSiliconPkg/Include/Ppi/TempRamExitPpi.h

-- 
2.19.1.windows.1


             reply	other threads:[~2019-05-31 11:44 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-05-31 11:42 Chiu, Chasel [this message]
2019-05-31 11:42 ` [PATCH 1/2] KabylakeSiliconPkg: FSP 2.1 SEC handling Chiu, Chasel
2019-06-05 19:52   ` [edk2-devel] " Nate DeSimone
2019-06-06  6:05     ` Chiu, Chasel
2019-06-06  9:45       ` Nate DeSimone
2019-05-31 11:42 ` [PATCH 2/2] KabylakeOpenBoardPkg: " Chiu, Chasel
2019-06-05 19:58   ` [edk2-devel] " Nate DeSimone

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190531114251.12024-1-chasel.chiu@intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox