From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (NAM10-MW2-obe.outbound.protection.outlook.com [40.107.94.95]) by mx.groups.io with SMTP id smtpd.web12.5479.1622023954894437824 for ; Wed, 26 May 2021 03:12:35 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="body hash did not verify" header.i=@os.amperecomputing.com header.s=selector2 header.b=duuzg0XP; spf=pass (domain: os.amperecomputing.com, ip: 40.107.94.95, mailfrom: nhi@os.amperecomputing.com) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gIac8oSNOiA8kaC122WeOloy5Nn1I17am1u8klwpPmeehIwMow8dscP8mfM9iWHl24I2pb2/AflLj5n/8jwRPW6WxZA5oeRmTJ0vYPLOB8MwK6zyODzhcvCohvaqJM4njoIo5Og1pB6BjoP4xWbp46y/RIS0okonJ7yd3sG1Q1H2HCk+vidqLFAza2Vy2lygRz06fwcXSubYBp8z5+j6sB5ogAQ3gMN0bhj2CSZCcNrvqgxIddltEcVVCe83E5tRfJvksi+npkXc82sHDtKMb5Pnm7UrUG1SE7NmzQJxX9eYqd10P+Duz4xxUMZ8KvEF6gu4ua3kW6lJbTsGN5KAXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Todu9pXjpMAOkIO/1ENaLqoJLw4zwHX03qCP+IXXbK4=; b=nrDuzKJ7q8C7LFWapA4cwwXaRedWyu3QfVMTAG7KxyTay3Mi2+mYwgziCS3THY0lwj5z4ahXsSWMyv5G0u2kJ8O2Yj2mRJ4KvRliO9ySK68TFM0YcTPoCTZeLugMCxGpQ3irebHM/US4NoB8jBpL/Zp4vwOGMRqysEH5TPInOhL26MW3lCgLbFYKKFtWy7VD2+3dBtxnv+8FCIjTxlu+acFBOWALcGVre0sSwNX7LNCU2vBV1gDw9avv5SQDg5IBcwJlzRq4fFe9oo9osJez7Gz2AQJjs8HK/+G4PXuVqnnuHoQHavfLR9O04hbBiLPNblrxx48T8IQ+3m9NwpPWzw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=os.amperecomputing.com; dmarc=pass action=none header.from=os.amperecomputing.com; dkim=pass header.d=os.amperecomputing.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=os.amperecomputing.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Todu9pXjpMAOkIO/1ENaLqoJLw4zwHX03qCP+IXXbK4=; b=duuzg0XPoWkIA/Ny1cMr0czIz4stJOCgfjTOPrduwKw751wk3zm5ZpwmEkuJoEgfSnbwyKPehZrydqKYwbSGhSdpK/3p5opnJ5M0ytBXCdFupX0ayz9U0FVi8K6BlDfoOVVqieWvVQcKL30v5Xq2xzTJKNxBe01mcOgICLfkE4U= Authentication-Results: edk2.groups.io; dkim=none (message not signed) header.d=none;edk2.groups.io; dmarc=none action=none header.from=os.amperecomputing.com; Received: from DM6PR01MB5849.prod.exchangelabs.com (2603:10b6:5:205::20) by DM5PR01MB2426.prod.exchangelabs.com (2603:10b6:3:3b::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4150.27; Wed, 26 May 2021 10:12:33 +0000 Received: from DM6PR01MB5849.prod.exchangelabs.com ([fe80::60d2:86dd:1f1c:51dd]) by DM6PR01MB5849.prod.exchangelabs.com ([fe80::60d2:86dd:1f1c:51dd%7]) with mapi id 15.20.4173.020; Wed, 26 May 2021 10:12:33 +0000 From: "Nhi Pham" To: devel@edk2.groups.io CC: Quan Nguyen , Thang Nguyen , Chuong Tran , Phong Vo , Leif Lindholm , Michael D Kinney , Ard Biesheuvel , Nate DeSimone Subject: [edk2-platforms][PATCH v2 26/32] AmpereAltraPkg: Add configuration screen for RAS Date: Wed, 26 May 2021 17:07:18 +0700 Message-ID: <20210526100724.5359-28-nhi@os.amperecomputing.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210526100724.5359-1-nhi@os.amperecomputing.com> References: <20210526100724.5359-1-nhi@os.amperecomputing.com> X-Originating-IP: [118.69.219.201] X-ClientProxiedBy: HKAPR04CA0008.apcprd04.prod.outlook.com (2603:1096:203:d0::18) To DM6PR01MB5849.prod.exchangelabs.com (2603:10b6:5:205::20) Return-Path: nhi@os.amperecomputing.com MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from localhost.localdomain (118.69.219.201) by HKAPR04CA0008.apcprd04.prod.outlook.com (2603:1096:203:d0::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4173.20 via Frontend Transport; Wed, 26 May 2021 10:12:30 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 2d38496b-fd2f-4f0d-4bf7-08d9202ec714 X-MS-TrafficTypeDiagnostic: DM5PR01MB2426: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:96; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM6PR01MB5849.prod.exchangelabs.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(39850400004)(136003)(346002)(366004)(376002)(186003)(66476007)(6506007)(2616005)(6486002)(66946007)(52116002)(6916009)(16526019)(66574015)(38100700002)(38350700002)(1076003)(83380400001)(30864003)(66556008)(6512007)(956004)(316002)(478600001)(6666004)(4326008)(8676002)(5660300002)(26005)(86362001)(2906002)(8936002)(54906003)(69590400013)(290074003)(579004)(44824005);DIR:OUT;SFP:1102; X-MS-Exchange-AntiSpam-MessageData: =?us-ascii?Q?b2mYsn0lYViLwb1EyqaOwXgeXb/Wauopm6D1tUZCudLCIc/l1zV+OR58kCzk?= =?us-ascii?Q?+dzOqggK7QDebOCV+aQpccXZt2Ex8uUZxgyPdCqB+GHxpsq3CDF5x0Kwfvg8?= =?us-ascii?Q?2G1/vazdmnTptoCkKvM+OKepT3YEujc0rw9/IVkn2EDjn/mDgXX2fPWNtGrz?= =?us-ascii?Q?rpzEdy2rSdVGVU04a4Ii+mqiX2lH10pBoWa65d2rdrTciMMY4hB2kK7js+Sq?= =?us-ascii?Q?BO4NIwzNetTjXM9tQSAuCAJ49GlmEmYqmPazYmL0JMqz1vPahBA396C8kG6z?= =?us-ascii?Q?GwGfH87CXDvKFqeNxSpcdgojL6MOGKByZschqQTYtvhLffxRAUJS0cgw46t5?= =?us-ascii?Q?BPd6+iuOZyNh9LbUghy3u3qaaCZt5FNJVD9lwgO4nz7Np3xvHskNdIXHT9TR?= =?us-ascii?Q?z2UYOaHjyrF69mlfjSJm/3zH4tuk2T8oECtxywg4Yg6dOpH/rZjjxWOWPv+P?= =?us-ascii?Q?38IYMQ870yxleNdrOFFi+JxWuGDfRFblBWL670Zorybn74epmXK7OMqjuzEq?= =?us-ascii?Q?O4jvWAj7BYRApY1illRa4vdFQmim6oJO/T+1QpTU0mTHSwhkmWkhFPqXCeaO?= =?us-ascii?Q?4FcyiKVCIKvBbwKgsKNEyZ/wYZT/7b5kAvuZOyej+YDwXlc6gdEoLP7ZB8QE?= =?us-ascii?Q?GpZLYq170O1ewA/mAV/KQYYTUwVfetZD1TZ8XvwXpZuXMnW3verHLXoZVmw2?= =?us-ascii?Q?pG+EbH+qrV6xjxq8ua+7QaOcNHMbnrxRvie2wQk8uqJbvrQFvbNmZiJbmtP5?= =?us-ascii?Q?/cyPZxCVCWAC5jNUYr+6G8qhCXwPwIQAlGR+VlNqe5LMKHc1fTUa8w0U/1tT?= =?us-ascii?Q?GJXaGD0HeQ7Y7/j2QQJz4R5BnTX5VW0CNjITGqIKDiNauTGOs2aVq6x5rDCi?= =?us-ascii?Q?r/gNDOLJHYixF8M4+QHAy6NKeDpmyNmbA2shBYETkX06csMRvFYeusiDLc3B?= =?us-ascii?Q?WAvVERtev+Opru48t29MRa5RjqLy0zAnvi735lii2t8nq4LKSbJjcItucEgM?= =?us-ascii?Q?Y2z+Pcl6UIn4kWDVIJv39zWwXU/NmGGwO5eieBmMYbH7bymb2xD1Q2gw+Ki0?= =?us-ascii?Q?1N9OyjnFL46LveGXtVFZvOLEaJ4Omi406X/rdB0yhvZK9aaVbzevOM+K2GPr?= =?us-ascii?Q?qOReKTdugZBnqV/7NKLK0K7gsEaSPuhfQVSrBWDDDolbHOCj6Z0CZOy0+sCu?= =?us-ascii?Q?tXLRfJabxzwx7i+meC9V6jWeTnGQmSUpZdTgbzssoIq7V+7+HwqAj2usDVjM?= =?us-ascii?Q?wO/vc88DwtOFcwtt3yuYZhMnwZ4RYyN2r8pW6nzAfFIX8ku5Ml048mOkiEA2?= =?us-ascii?Q?SUa5fYzv3zXmgbJ5XxfK5nn3?= X-OriginatorOrg: os.amperecomputing.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2d38496b-fd2f-4f0d-4bf7-08d9202ec714 X-MS-Exchange-CrossTenant-AuthSource: DM6PR01MB5849.prod.exchangelabs.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 May 2021 10:12:33.2085 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3bc2b170-fd94-476d-b0ce-4229bdc904a7 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: f4FsSnffNyo5Z6ISYX5IMRooBeMkU8nk/BDmiCAqPBCkd4HpEDd0ANbZ+4KrYHn9GP+VVbAegff7Qf/H7wK8Q1z1chVP6kr/7BNs4zZUE98= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR01MB2426 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain From: Quan Nguyen This supports user to enable/disable RAS components running the system firmware such as HEST, BERT,... Cc: Thang Nguyen Cc: Chuong Tran Cc: Phong Vo Cc: Leif Lindholm Cc: Michael D Kinney Cc: Ard Biesheuvel Cc: Nate DeSimone Signed-off-by: Quan Nguyen --- Platform/Ampere/JadePkg/Jade.dsc | 1 = + Platform/Ampere/JadePkg/Jade.fdf | 1 = + Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.inf | 56 = ++ Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/NVDataStruc.h | 46 = ++ Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.h | 82 = +++ Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/Vfr.vfr | 105 = +++ Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.c | 762 = ++++++++++++++++++++ Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/VfrStrings.uni | 38 = + 8 files changed, 1091 insertions(+) diff --git a/Platform/Ampere/JadePkg/Jade.dsc b/Platform/Ampere/JadePkg/Jad= e.dsc index e82b0cce691a..26cf8be001ab 100755 --- a/Platform/Ampere/JadePkg/Jade.dsc +++ b/Platform/Ampere/JadePkg/Jade.dsc @@ -182,3 +182,4 @@ [Components.common] Silicon/Ampere/AmpereAltraPkg/Drivers/MemInfoDxe/MemInfoDxe.inf Silicon/Ampere/AmpereAltraPkg/Drivers/CpuConfigDxe/CpuConfigDxe.inf Silicon/Ampere/AmpereAltraPkg/Drivers/AcpiConfigDxe/AcpiConfigDxe.inf + Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.inf diff --git a/Platform/Ampere/JadePkg/Jade.fdf b/Platform/Ampere/JadePkg/Jad= e.fdf index ddd601075f19..c0b71a4732fa 100755 --- a/Platform/Ampere/JadePkg/Jade.fdf +++ b/Platform/Ampere/JadePkg/Jade.fdf @@ -357,5 +357,6 @@ [FV.FvMain] INF Silicon/Ampere/AmpereAltraPkg/Drivers/MemInfoDxe/MemInfoDxe.inf INF Silicon/Ampere/AmpereAltraPkg/Drivers/CpuConfigDxe/CpuConfigDxe.inf INF Silicon/Ampere/AmpereAltraPkg/Drivers/AcpiConfigDxe/AcpiConfigDxe.in= f + INF Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.inf =20 !include Platform/Ampere/AmperePlatformPkg/FvRules.fdf.inc diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDx= e.inf b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.inf new file mode 100644 index 000000000000..7413b7474d7a --- /dev/null +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.inf @@ -0,0 +1,56 @@ +## @file +# +# Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved. +# +# SPDX-License-Identifier: BSD-2-Clause-Patent +# +## + +[Defines] + INF_VERSION =3D 0x0001001A + BASE_NAME =3D RasConfigDxe + FILE_GUID =3D 5b5ee6e3-3135-45f7-ad21-46a3f36813cc + MODULE_TYPE =3D DXE_DRIVER + VERSION_STRING =3D 1.0 + ENTRY_POINT =3D RasConfigEntryPoint + +[Sources.common] + NVDataStruc.h + RasConfigDxe.c + RasConfigDxe.h + Vfr.vfr + VfrStrings.uni + +[Packages] + MdeModulePkg/MdeModulePkg.dec + MdePkg/MdePkg.dec + Silicon/Ampere/AmpereAltraPkg/AmpereAltraPkg.dec + Silicon/Ampere/AmpereSiliconPkg/AmpereSiliconPkg.dec + +[LibraryClasses] + AmpereCpuLib + BaseLib + BaseMemoryLib + DebugLib + DevicePathLib + DevicePathLib + HiiLib + MemoryAllocationLib + NVParamLib + UefiBootServicesTableLib + UefiDriverEntryPoint + UefiLib + UefiRuntimeServicesTableLib + +[Guids] + gEfiIfrTianoGuid + gPlatformManagerFormsetGuid + gAcpiConfigFormSetGuid + +[Protocols] + gEfiDevicePathProtocolGuid ## CONSUMES + gEfiHiiConfigRoutingProtocolGuid ## CONSUMES + gEfiHiiConfigAccessProtocolGuid ## PRODUCES + +[Depex] + TRUE diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/NVDataStruc= .h b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/NVDataStruc.h new file mode 100644 index 000000000000..e87d1c97597c --- /dev/null +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/NVDataStruc.h @@ -0,0 +1,46 @@ +/** @file + + Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef RAS_CONFIG_NVDATA_STRUC_H_ +#define RAS_CONFIG_NVDATA_STRUC_H_ + +#define RAS_CONFIG_VARSTORE_ID 0x1234 +#define RAS_CONFIG_FORM_ID 0x1235 + +#define RAS_VARSTORE_NAME L"RasConfigNVData" + +#define RAS_CONFIG_FORMSET_GUID \ + { \ + 0x96934cc6, 0xcb15, 0x4d8a, { 0xbe, 0x5f, 0x8e, 0x7d, 0x55, 0x0e, 0xc9= , 0xc6 } \ + } + +// +// Labels definition +// +#define LABEL_UPDATE 0x3234 +#define LABEL_END 0xffff + +#pragma pack(1) + +// +// Ras Configuration NV data structure definition +// +typedef struct { + UINT32 RasHardwareEinj; + UINT32 RasPcieAerFwFirstEnabled; + UINT32 RasBertEnabled; + UINT32 RasSdeiEnabled; + UINT32 RasDdrCeThreshold; + UINT32 Ras2pCeThreshold; + UINT32 RasCpmCeThreshold; + UINT32 RasLinkErrThreshold; +} RAS_CONFIG_VARSTORE_DATA; + +#pragma pack() + +#endif /* RAS_CONFIG_NVDATA_STRUC_H_ */ diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDx= e.h b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.h new file mode 100644 index 000000000000..66e2ded8b701 --- /dev/null +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.h @@ -0,0 +1,82 @@ +/** @file + + Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#ifndef RAS_CONFIG_DXE_H_ +#define RAS_CONFIG_DXE_H_ + +#include + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "NVDataStruc.h" + +// +// This is the generated IFR binary data for each formset defined in VFR. +// +extern UINT8 VfrBin[]; + +// +// This is the generated String package data for all .UNI files. +// +extern UINT8 RasConfigDxeStrings[]; + +#define RAS_2P_CE_THRESHOLD_OFST OFFSET_OF (RAS_CONFIG_VARSTORE_DATA, Ras= 2pCeThreshold) + +#define RAS_CONFIG_PRIVATE_SIGNATURE SIGNATURE_32 ('R', 'A', 'S', 'C') + +typedef struct { + UINTN Signature; + + EFI_HANDLE DriverHandle; + EFI_HII_HANDLE HiiHandle; + RAS_CONFIG_VARSTORE_DATA Configuration; + + // + // Consumed protocol + // + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; + + // + // Produced protocol + // + EFI_HII_CONFIG_ACCESS_PROTOCOL ConfigAccess; +} RAS_CONFIG_PRIVATE_DATA; + +#define RAS_CONFIG_PRIVATE_FROM_THIS(a) CR (a, RAS_CONFIG_PRIVATE_DATA, C= onfigAccess, RAS_CONFIG_PRIVATE_SIGNATURE) + +#pragma pack(1) + +/// +/// HII specific Vendor Device Path definition. +/// +typedef struct { + VENDOR_DEVICE_PATH VendorDevicePath; + EFI_DEVICE_PATH_PROTOCOL End; +} HII_VENDOR_DEVICE_PATH; + +#pragma pack() + +#endif /* RAS_CONFIG_DXE_H_ */ diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/Vfr.vfr b/S= ilicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/Vfr.vfr new file mode 100644 index 000000000000..3c2c4947a52b --- /dev/null +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/Vfr.vfr @@ -0,0 +1,105 @@ +/** @file + + Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include "NVDataStruc.h" + +formset + guid =3D RAS_CONFIG_FORMSET_GUID, + title =3D STRING_TOKEN(STR_RAS_FORM), + help =3D STRING_TOKEN(STR_RAS_FORM_HELP), + classguid =3D gPlatformManagerFormsetGuid, + + // + // Define a variable Storage + // + varstore RAS_CONFIG_VARSTORE_DATA, + varid =3D RAS_CONFIG_VARSTORE_ID, + name =3D RasConfigNVData, + guid =3D RAS_CONFIG_FORMSET_GUID; + + form formid =3D RAS_CONFIG_FORM_ID, + title =3D STRING_TOKEN(STR_RAS_FORM); + + subtitle text =3D STRING_TOKEN(STR_RAS_FORM); + + oneof varid =3D RasConfigNVData.RasHardwareEinj, + prompt =3D STRING_TOKEN(STR_RAS_HARDWARE_EINJ_PROMPT), + help =3D STRING_TOKEN(STR_RAS_HARDWARE_EINJ_HELP), + flags =3D NUMERIC_SIZE_4 | RESET_REQUIRED, + option text =3D STRING_TOKEN(STR_RAS_COMMON_ENABLE), value =3D 1, fl= ags =3D DEFAULT; + option text =3D STRING_TOKEN(STR_RAS_COMMON_DISABLE), value =3D 0, f= lags =3D 0; + + endoneof; + + oneof varid =3D RasConfigNVData.RasPcieAerFwFirstEnabled, + prompt =3D STRING_TOKEN(STR_RAS_PCIE_AER_FW_FIRST_PROMPT), + help =3D STRING_TOKEN(STR_RAS_PCIE_AER_FW_FIRST_HELP), + flags =3D NUMERIC_SIZE_4 | RESET_REQUIRED, + option text =3D STRING_TOKEN(STR_RAS_COMMON_ENABLE), value =3D 1, fl= ags =3D 0; + option text =3D STRING_TOKEN(STR_RAS_COMMON_DISABLE), value =3D 0, f= lags =3D DEFAULT; + + endoneof; + + oneof varid =3D RasConfigNVData.RasBertEnabled, + prompt =3D STRING_TOKEN(STR_RAS_BERT_ENABLED_PROMPT), + help =3D STRING_TOKEN(STR_RAS_BERT_ENABLED_HELP), + flags =3D NUMERIC_SIZE_4 | RESET_REQUIRED, + option text =3D STRING_TOKEN(STR_RAS_COMMON_ENABLE), value =3D 1, fl= ags =3D DEFAULT; + option text =3D STRING_TOKEN(STR_RAS_COMMON_DISABLE), value =3D 0, f= lags =3D 0; + + endoneof; + + oneof varid =3D RasConfigNVData.RasSdeiEnabled, + prompt =3D STRING_TOKEN(STR_RAS_SDEI_ENABLED_PROMPT), + help =3D STRING_TOKEN(STR_RAS_SDEI_ENABLED_HELP), + flags =3D NUMERIC_SIZE_4 | RESET_REQUIRED, + option text =3D STRING_TOKEN(STR_RAS_COMMON_ENABLE), value =3D 1, fl= ags =3D 0; + option text =3D STRING_TOKEN(STR_RAS_COMMON_DISABLE), value =3D 0, f= lags =3D DEFAULT; + + endoneof; + + numeric varid =3D RasConfigNVData.RasDdrCeThreshold, + prompt =3D STRING_TOKEN(STR_RAS_DDR_CE_THRESHOLD_PROMPT), + help =3D STRING_TOKEN(STR_RAS_DDR_CE_THRESHOLD_HELP), + flags =3D NUMERIC_SIZE_4 | RESET_REQUIRED, + minimum =3D 1, + maximum =3D 8192, + default =3D 1, + + endnumeric; + + label LABEL_UPDATE; + // + // This is where we will dynamically add other Action type op-code + // + label LABEL_END; + + numeric varid =3D RasConfigNVData.RasCpmCeThreshold, + prompt =3D STRING_TOKEN(STR_RAS_CPM_CE_THRESHOLD_PROMPT), + help =3D STRING_TOKEN(STR_RAS_CPM_CE_THRESHOLD_HELP), + flags =3D NUMERIC_SIZE_4 | RESET_REQUIRED, + minimum =3D 1, + maximum =3D 8192, + default =3D 1, + + endnumeric; + + numeric varid =3D RasConfigNVData.RasLinkErrThreshold, + prompt =3D STRING_TOKEN(STR_RAS_LINK_ERR_THRESHOLD_PROMPT), + help =3D STRING_TOKEN(STR_RAS_LINK_ERR_THRESHOLD_HELP), + flags =3D NUMERIC_SIZE_4 | RESET_REQUIRED, + minimum =3D 1, + maximum =3D 8192, + default =3D 1, + + endnumeric; + + + endform; + +endformset; diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDx= e.c b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.c new file mode 100644 index 000000000000..ca115764ed7a --- /dev/null +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.c @@ -0,0 +1,762 @@ +/** @file + + Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved. + + SPDX-License-Identifier: BSD-2-Clause-Patent + +**/ + +#include "RasConfigDxe.h" + +CHAR16 RasConfigVarstoreDataName[] =3D L"RasConfigNVData"; + +EFI_HANDLE mDriverHandle =3D NULL; +RAS_CONFIG_PRIVATE_DATA *mPrivateData =3D NULL; + +EFI_GUID mRasConfigFormSetGuid =3D RAS_CONFIG_FORMSET_GUID; + +// +// Default RAS Settings +// +#define RAS_DEFAULT_HARDWARE_EINJ_SUPPORT 0 +#define RAS_DEFAULT_PCIE_AER_FW_FIRST 0 +#define RAS_DEFAULT_BERT_SUPPORT 1 +#define RAS_DEFAULT_SDEI_SUPPORT 0 +#define RAS_DEFAULT_DDR_CE_THRESHOLD 1 +#define RAS_DEFAULT_2P_CE_THRESHOLD 1 +#define RAS_DEFAULT_PROCESSOR_CE_THRESHOLD 1 +#define RAS_DEFAULT_DDR_LINK_ERROR_THRESHOLD 1 + + +HII_VENDOR_DEVICE_PATH mRasConfigHiiVendorDevicePath =3D { + { + { + HARDWARE_DEVICE_PATH, + HW_VENDOR_DP, + { + (UINT8)(sizeof (VENDOR_DEVICE_PATH)), + (UINT8)((sizeof (VENDOR_DEVICE_PATH)) >> 8) + } + }, + RAS_CONFIG_FORMSET_GUID + }, + { + END_DEVICE_PATH_TYPE, + END_ENTIRE_DEVICE_PATH_SUBTYPE, + { + (UINT8)(END_DEVICE_PATH_LENGTH), + (UINT8)((END_DEVICE_PATH_LENGTH) >> 8) + } + } +}; + +EFI_STATUS +RasConfigNvParamGet ( + OUT RAS_CONFIG_VARSTORE_DATA *Configuration + ) +{ + EFI_STATUS Status; + UINT32 Value; + + Status =3D NVParamGet ( + NV_SI_HARDWARE_EINJ, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_HARDWARE_EINJ_SUPPORT; + Status =3D NVParamSet ( + NV_SI_HARDWARE_EINJ, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->RasHardwareEinj =3D Value; + + Status =3D NVParamGet ( + NV_SI_RAS_PCIE_AER_FW_FIRST, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_PCIE_AER_FW_FIRST; + Status =3D NVParamSet ( + NV_SI_RAS_PCIE_AER_FW_FIRST, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->RasPcieAerFwFirstEnabled =3D Value; + + Status =3D NVParamGet ( + NV_SI_RAS_BERT_ENABLED, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_BERT_SUPPORT; + Status =3D NVParamSet ( + NV_SI_RAS_BERT_ENABLED, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->RasBertEnabled =3D Value; + + Status =3D NVParamGet ( + NV_SI_RAS_SDEI_ENABLED, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_SDEI_SUPPORT; + Status =3D NVParamSet ( + NV_SI_RAS_SDEI_ENABLED, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->RasSdeiEnabled =3D Value; + + Status =3D NVParamGet ( + NV_SI_DDR_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_DDR_CE_THRESHOLD; + Status =3D NVParamSet ( + NV_SI_DDR_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->RasDdrCeThreshold =3D Value; + + Status =3D NVParamGet ( + NV_SI_2P_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_2P_CE_THRESHOLD; + Status =3D NVParamSet ( + NV_SI_2P_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->Ras2pCeThreshold =3D Value; + + Status =3D NVParamGet ( + NV_SI_CPM_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_PROCESSOR_CE_THRESHOLD; + Status =3D NVParamSet ( + NV_SI_CPM_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->RasCpmCeThreshold =3D Value; + + Status =3D NVParamGet ( + NV_SI_LINK_ERR_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + &Value + ); + if (EFI_ERROR (Status)) { + Value =3D RAS_DEFAULT_DDR_LINK_ERROR_THRESHOLD; + Status =3D NVParamSet ( + NV_SI_LINK_ERR_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Value + ); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_ERROR, "%a:%d NVParamSet() failed!\n", __FUNCTION__, _= _LINE__)); + ASSERT_EFI_ERROR (Status); + Value =3D 0; + } + } + Configuration->RasLinkErrThreshold =3D Value; + + return EFI_SUCCESS; +} + +EFI_STATUS +RasConfigNvParamSet ( + IN RAS_CONFIG_VARSTORE_DATA *Configuration + ) +{ + EFI_STATUS Status; + + Status =3D NVParamSet ( + NV_SI_HARDWARE_EINJ, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->RasHardwareEinj + ); + ASSERT_EFI_ERROR (Status); + + Status =3D NVParamSet ( + NV_SI_RAS_PCIE_AER_FW_FIRST, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->RasPcieAerFwFirstEnabled + ); + ASSERT_EFI_ERROR (Status); + + Status =3D NVParamSet ( + NV_SI_RAS_BERT_ENABLED, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->RasBertEnabled + ); + ASSERT_EFI_ERROR (Status); + + Status =3D NVParamSet ( + NV_SI_RAS_SDEI_ENABLED, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->RasSdeiEnabled + ); + ASSERT_EFI_ERROR (Status); + + Status =3D NVParamSet ( + NV_SI_DDR_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->RasDdrCeThreshold + ); + ASSERT_EFI_ERROR (Status); + + Status =3D NVParamSet ( + NV_SI_2P_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->Ras2pCeThreshold + ); + ASSERT_EFI_ERROR (Status); + + Status =3D NVParamSet ( + NV_SI_CPM_CE_RAS_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->RasCpmCeThreshold + ); + ASSERT_EFI_ERROR (Status); + + Status =3D NVParamSet ( + NV_SI_LINK_ERR_THRESHOLD, + NV_PERM_ATF | NV_PERM_BIOS | NV_PERM_MANU | NV_PERM_BMC, + NV_PERM_BIOS | NV_PERM_MANU, + Configuration->RasLinkErrThreshold + ); + ASSERT_EFI_ERROR (Status); + + return EFI_SUCCESS; +} + +/** + This function allows a caller to extract the current configuration for o= ne + or more named elements from the target driver. + + @param This Points to the EFI_HII_CONFIG_ACCESS_PROTO= COL. + @param Request A null-terminated Unicode string in + format. + @param Progress On return, points to a character in the R= equest + string. Points to the string's null termi= nator if + request was successful. Points to the mos= t recent + '&' before the first failing name/value p= air (or + the beginning of the string if the failur= e is in + the first name/value pair) if the request= was not + successful. + @param Results A null-terminated Unicode string in + format which has all valu= es filled + in for the names in the Request string. S= tring to + be allocated by the called function. + + @retval EFI_SUCCESS The Results is filled with the requested = values. + @retval EFI_OUT_OF_RESOURCES Not enough memory to store the results. + @retval EFI_INVALID_PARAMETER Request is illegal syntax, or unknown nam= e. + @retval EFI_NOT_FOUND Routing data doesn't match any storage in= this + driver. + +**/ +EFI_STATUS +EFIAPI +RasConfigExtractConfig ( + IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This, + IN CONST EFI_STRING Request, + OUT EFI_STRING *Progress, + OUT EFI_STRING *Results + ) +{ + EFI_STATUS Status; + UINTN BufferSize; + RAS_CONFIG_PRIVATE_DATA *PrivateData; + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; + EFI_STRING ConfigRequest; + EFI_STRING ConfigRequestHdr; + UINTN Size; + BOOLEAN AllocatedRequest; + + if (Progress =3D=3D NULL || Results =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + // + // Initialize the local variables. + // + ConfigRequestHdr =3D NULL; + ConfigRequest =3D NULL; + Size =3D 0; + *Progress =3D Request; + AllocatedRequest =3D FALSE; + + if ((Request !=3D NULL) && !HiiIsConfigHdrMatch (Request, &mRasConfigFor= mSetGuid, RasConfigVarstoreDataName)) { + return EFI_NOT_FOUND; + } + + PrivateData =3D RAS_CONFIG_PRIVATE_FROM_THIS (This); + HiiConfigRouting =3D PrivateData->HiiConfigRouting; + + // + // Get current setting from NVParam. + // + Status =3D RasConfigNvParamGet (&PrivateData->Configuration); + if (EFI_ERROR (Status)) { + return Status; + } + + // + // Convert buffer data to by helper function BlockToConfig(= ) + // + BufferSize =3D sizeof (RAS_CONFIG_VARSTORE_DATA); + ConfigRequest =3D Request; + if ((Request =3D=3D NULL) || (StrStr (Request, L"OFFSET") =3D=3D NULL)) = { + // + // Request has no request element, construct full request string. + // Allocate and fill a buffer large enough to hold the tem= plate + // followed by "&OFFSET=3D0&WIDTH=3DWWWWWWWWWWWWWWWW" followed by a Nu= ll-terminator + // + ConfigRequestHdr =3D HiiConstructConfigHdr (&mRasConfigFormSetGuid, Ra= sConfigVarstoreDataName, PrivateData->DriverHandle); + Size =3D (StrLen (ConfigRequestHdr) + 32 + 1) * sizeof (CHAR16); + ConfigRequest =3D AllocateZeroPool (Size); + ASSERT (ConfigRequest !=3D NULL); + if (ConfigRequest =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + AllocatedRequest =3D TRUE; + UnicodeSPrint (ConfigRequest, Size, L"%s&OFFSET=3D0&WIDTH=3D%016LX", C= onfigRequestHdr, (UINT64)BufferSize); + FreePool (ConfigRequestHdr); + } + + // + // Convert buffer data to by helper function BlockToConfig(= ) + // + Status =3D HiiConfigRouting->BlockToConfig ( + HiiConfigRouting, + ConfigRequest, + (UINT8 *)&PrivateData->Configuration, + BufferSize, + Results, + Progress + ); + + // + // Free the allocated config request string. + // + if (AllocatedRequest) { + FreePool (ConfigRequest); + ConfigRequest =3D NULL; + } + + // + // Set Progress string to the original request string. + // + if (Request =3D=3D NULL) { + *Progress =3D NULL; + } else if (StrStr (Request, L"OFFSET") =3D=3D NULL) { + *Progress =3D Request + StrLen (Request); + } + + return Status; +} + +/** + This function processes the results of changes in configuration. + + @param This Points to the EFI_HII_CONFIG_ACCESS_PROTO= COL. + @param Configuration A null-terminated Unicode string in + format. + @param Progress A pointer to a string filled in with the = offset of + the most recent '&' before the first fail= ing + name/value pair (or the beginning of the = string if + the failure is in the first name/value pa= ir) or + the terminating NULL if all was successfu= l. + + @retval EFI_SUCCESS The Results is processed successfully. + @retval EFI_INVALID_PARAMETER Configuration is NULL. + @retval EFI_NOT_FOUND Routing data doesn't match any storage in= this + driver. + +**/ +EFI_STATUS +EFIAPI +RasConfigRouteConfig ( + IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This, + IN CONST EFI_STRING Configuration, + OUT EFI_STRING *Progress + ) +{ + EFI_STATUS Status; + UINTN BufferSize; + RAS_CONFIG_PRIVATE_DATA *PrivateData; + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; + + if (Configuration =3D=3D NULL || Progress =3D=3D NULL) { + return EFI_INVALID_PARAMETER; + } + + PrivateData =3D RAS_CONFIG_PRIVATE_FROM_THIS (This); + HiiConfigRouting =3D PrivateData->HiiConfigRouting; + *Progress =3D Configuration; + + // + // Check routing data in . + // Note: if only one Storage is used, then this checking could be skippe= d. + // + if (!HiiIsConfigHdrMatch (Configuration, &mRasConfigFormSetGuid, RasConf= igVarstoreDataName)) { + return EFI_NOT_FOUND; + } + + // + // Get configuration data from NVParam + // + Status =3D RasConfigNvParamGet (&PrivateData->Configuration); + if (EFI_ERROR (Status)) { + return Status; + } + + // + // Convert to buffer data by helper function ConfigToBlock(= ) + // + BufferSize =3D sizeof (RAS_CONFIG_VARSTORE_DATA); + Status =3D HiiConfigRouting->ConfigToBlock ( + HiiConfigRouting, + Configuration, + (UINT8 *)&PrivateData->Configuration, + &BufferSize, + Progress + ); + if (EFI_ERROR (Status)) { + return Status; + } + + // + // Store configuration data back to NVParam + // + Status =3D RasConfigNvParamSet (&PrivateData->Configuration); + if (EFI_ERROR (Status)) { + return Status; + } + + return Status; +} + +/** + This function processes the results of changes in configuration. + + @param This Points to the EFI_HII_CONFIG_ACCESS_PROTO= COL. + @param Action Specifies the type of action taken by the= browser. + @param QuestionId A unique value which is sent to the origi= nal + exporting driver so that it can identify = the type + of data to expect. + @param Type The type of value for the question. + @param Value A pointer to the data being sent to the o= riginal + exporting driver. + @param ActionRequest On return, points to the action requested= by the + callback function. + + @retval EFI_SUCCESS The callback successfully handled the act= ion. + @retval EFI_INVALID_PARAMETER The setup browser call this function with= invalid parameters. + +**/ +EFI_STATUS +EFIAPI +RasConfigCallback ( + IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This, + IN EFI_BROWSER_ACTION Action, + IN EFI_QUESTION_ID QuestionId, + IN UINT8 Type, + IN EFI_IFR_TYPE_VALUE *Value, + OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest + ) +{ + if (Action !=3D EFI_BROWSER_ACTION_CHANGING) { + // + // Do nothing for other UEFI Action. Only do call back when data is ch= anged. + // + return EFI_UNSUPPORTED; + } + if (((Value =3D=3D NULL) + && (Action !=3D EFI_BROWSER_ACTION_FORM_OPEN) + && (Action !=3D EFI_BROWSER_ACTION_FORM_CLOSE)) + || (ActionRequest =3D=3D NULL)) + { + return EFI_INVALID_PARAMETER; + } + + return EFI_SUCCESS; +} + +EFI_STATUS +UpdateRasConfigScreen ( + IN RAS_CONFIG_PRIVATE_DATA *PrivateData + ) +{ + EFI_STATUS Status; + VOID *StartOpCodeHandle; + EFI_IFR_GUID_LABEL *StartLabel; + VOID *EndOpCodeHandle; + EFI_IFR_GUID_LABEL *EndLabel; + + if (!IsSlaveSocketActive ()) { + return EFI_SUCCESS; + } + + // + // Initialize the container for dynamic opcodes + // + StartOpCodeHandle =3D HiiAllocateOpCodeHandle (); + ASSERT (StartOpCodeHandle !=3D NULL); + + EndOpCodeHandle =3D HiiAllocateOpCodeHandle (); + ASSERT (EndOpCodeHandle !=3D NULL); + + // + // Create Hii Extend Label OpCode as the start opcode + // + StartLabel =3D (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode ( + StartOpCodeHandle, + &gEfiIfrTianoGuid, + NULL, + sizeof (EFI_IFR_GUID_LABEL) + ); + if (StartLabel =3D=3D NULL) { + Status =3D EFI_OUT_OF_RESOURCES; + goto FreeOpCodeBuffer; + } + StartLabel->ExtendOpCode =3D EFI_IFR_EXTEND_OP_LABEL; + StartLabel->Number =3D LABEL_UPDATE; + + // + // Create Hii Extend Label OpCode as the end opcode + // + EndLabel =3D (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode ( + EndOpCodeHandle, + &gEfiIfrTianoGuid, + NULL, + sizeof (EFI_IFR_GUID_LABEL) + ); + if (EndLabel =3D=3D NULL) { + Status =3D EFI_OUT_OF_RESOURCES; + goto FreeOpCodeBuffer; + } + EndLabel->ExtendOpCode =3D EFI_IFR_EXTEND_OP_LABEL; + EndLabel->Number =3D LABEL_END; + + // + // Create the numeric for 2P CE threshold + // + HiiCreateNumericOpCode ( + StartOpCodeHandle, // Container for dynami= c created opcodes + 0x8005, // Question ID + RAS_CONFIG_VARSTORE_ID, // VarStore ID + (UINT16)RAS_2P_CE_THRESHOLD_OFST, // Offset in Buffer Sto= rage + STRING_TOKEN (STR_RAS_2P_CE_THRESHOLD_PROMPT), // Question prompt text + STRING_TOKEN (STR_RAS_2P_CE_THRESHOLD_HELP), + EFI_IFR_FLAG_CALLBACK | EFI_IFR_FLAG_RESET_REQUIRED, + EFI_IFR_NUMERIC_SIZE_4, + 1, + 8192, + 1, + NULL + ); + + Status =3D HiiUpdateForm ( + PrivateData->HiiHandle, // HII handle + &mRasConfigFormSetGuid, // Formset GUID + RAS_CONFIG_FORM_ID, // Form ID + StartOpCodeHandle, // Label for where to insert opcodes + EndOpCodeHandle // Insert data + ); + +FreeOpCodeBuffer: + HiiFreeOpCodeHandle (StartOpCodeHandle); + HiiFreeOpCodeHandle (EndOpCodeHandle); + + return Status; +} + +EFI_STATUS +EFIAPI +RasConfigUnload ( + VOID + ) +{ + ASSERT (mPrivateData !=3D NULL); + + if (mDriverHandle !=3D NULL) { + gBS->UninstallMultipleProtocolInterfaces ( + mDriverHandle, + &gEfiDevicePathProtocolGuid, + &mRasConfigHiiVendorDevicePath, + &gEfiHiiConfigAccessProtocolGuid, + &mPrivateData->ConfigAccess, + NULL + ); + mDriverHandle =3D NULL; + } + + if (mPrivateData->HiiHandle !=3D NULL) { + HiiRemovePackages (mPrivateData->HiiHandle); + } + + FreePool (mPrivateData); + mPrivateData =3D NULL; + + return EFI_SUCCESS; +} + +EFI_STATUS +EFIAPI +RasConfigEntryPoint ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +{ + EFI_STATUS Status; + EFI_HII_HANDLE HiiHandle; + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; + + // + // Initialize driver private data + // + mPrivateData =3D AllocateZeroPool (sizeof (RAS_CONFIG_PRIVATE_DATA)); + if (mPrivateData =3D=3D NULL) { + return EFI_OUT_OF_RESOURCES; + } + + mPrivateData->Signature =3D RAS_CONFIG_PRIVATE_SIGNATURE; + + mPrivateData->ConfigAccess.ExtractConfig =3D RasConfigExtractConfig; + mPrivateData->ConfigAccess.RouteConfig =3D RasConfigRouteConfig; + mPrivateData->ConfigAccess.Callback =3D RasConfigCallback; + + // + // Locate ConfigRouting protocol + // + Status =3D gBS->LocateProtocol (&gEfiHiiConfigRoutingProtocolGuid, NULL,= (VOID **)&HiiConfigRouting); + if (EFI_ERROR (Status)) { + return Status; + } + mPrivateData->HiiConfigRouting =3D HiiConfigRouting; + + Status =3D gBS->InstallMultipleProtocolInterfaces ( + &mDriverHandle, + &gEfiDevicePathProtocolGuid, + &mRasConfigHiiVendorDevicePath, + &gEfiHiiConfigAccessProtocolGuid, + &mPrivateData->ConfigAccess, + NULL + ); + ASSERT_EFI_ERROR (Status); + + mPrivateData->DriverHandle =3D mDriverHandle; + + // + // Publish our HII data + // + HiiHandle =3D HiiAddPackages ( + &mRasConfigFormSetGuid, + mDriverHandle, + RasConfigDxeStrings, + VfrBin, + NULL + ); + if (HiiHandle =3D=3D NULL) { + gBS->UninstallMultipleProtocolInterfaces ( + mDriverHandle, + &gEfiDevicePathProtocolGuid, + &mRasConfigHiiVendorDevicePath, + &gEfiHiiConfigAccessProtocolGuid, + &mPrivateData->ConfigAccess, + NULL + ); + return EFI_OUT_OF_RESOURCES; + } + + mPrivateData->HiiHandle =3D HiiHandle; + + Status =3D UpdateRasConfigScreen (mPrivateData); + if (EFI_ERROR (Status)) { + DEBUG (( + DEBUG_ERROR, + "%a %d Fail to update Memory Configuration screen \n", + __FUNCTION__, + __LINE__ + )); + RasConfigUnload (); + ASSERT_EFI_ERROR (Status); + return Status; + } + + return EFI_SUCCESS; +} diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/VfrStrings.= uni b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/VfrStrings.uni new file mode 100644 index 000000000000..c502093a2bbf --- /dev/null +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/VfrStrings.uni @@ -0,0 +1,38 @@ +// +// Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved. +// +// SPDX-License-Identifier: BSD-2-Clause-Patent +// + +#langdef en-US "English" + +#string STR_RAS_FORM #language en-US "RAS C= onfiguration" +#string STR_RAS_FORM_HELP #language en-US "RAS C= onfiguration" + +#string STR_RAS_FORM_SEPERATE_LINE #language en-US "" +#string STR_RAS_COMMON_ENABLE #language en-US "Enabl= ed" +#string STR_RAS_COMMON_DISABLE #language en-US "Disab= led" + +#string STR_RAS_HARDWARE_EINJ_PROMPT #language en-US "Hardw= are EINJ" +#string STR_RAS_HARDWARE_EINJ_HELP #language en-US "Enabl= e hardware EINJ support, if disabled EINJ is software simulated" + +#string STR_RAS_PCIE_AER_FW_FIRST_PROMPT #language en-US "PCIe = AER Firmware First" +#string STR_RAS_PCIE_AER_FW_FIRST_HELP #language en-US "Enabl= e firmware to detect PCIe AER, if disabled OS detects AER" + +#string STR_RAS_BERT_ENABLED_PROMPT #language en-US "Enabl= e BERT" +#string STR_RAS_BERT_ENABLED_HELP #language en-US "Enabl= e Boot Error Record Table, if disabled BERT will not be populated" + +#string STR_RAS_SDEI_ENABLED_PROMPT #language en-US "Enabl= e SDEI" +#string STR_RAS_SDEI_ENABLED_HELP #language en-US "Enabl= e Software Delegated Exception Interface for NMI support" + +#string STR_RAS_DDR_CE_THRESHOLD_PROMPT #language en-US "DDR C= E Threshold" +#string STR_RAS_DDR_CE_THRESHOLD_HELP #language en-US "Numbe= r of DDR CEs to occur before using SCI notification to OS rather than polle= d notification" + +#string STR_RAS_2P_CE_THRESHOLD_PROMPT #language en-US "2P CE= Threshold" +#string STR_RAS_2P_CE_THRESHOLD_HELP #language en-US "Numbe= r of 2P CEs to occur before using SCI notification to OS rather than polled= notification" + +#string STR_RAS_CPM_CE_THRESHOLD_PROMPT #language en-US "Proce= ssor CE Threshold" +#string STR_RAS_CPM_CE_THRESHOLD_HELP #language en-US "Numbe= r of processor CEs to occur before using SCI notification to OS rather than= polled notification" + +#string STR_RAS_LINK_ERR_THRESHOLD_PROMPT #language en-US "DDR L= ink Error Threshold" +#string STR_RAS_LINK_ERR_THRESHOLD_HELP #language en-US "Numbe= r of DDR link errors before considering it fatal severity" --=20 2.17.1