From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f53.google.com (mail-wr1-f53.google.com [209.85.221.53]) by mx.groups.io with SMTP id smtpd.web08.7896.1632488246079026556 for ; Fri, 24 Sep 2021 05:57:26 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@nuviainc-com.20210112.gappssmtp.com header.s=20210112 header.b=lUR6VJT3; spf=pass (domain: nuviainc.com, ip: 209.85.221.53, mailfrom: leif@nuviainc.com) Received: by mail-wr1-f53.google.com with SMTP id u18so27302436wrg.5 for ; Fri, 24 Sep 2021 05:57:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nuviainc-com.20210112.gappssmtp.com; s=20210112; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=lqw75gycJsVY3EF3mBdVoskxCfJRN1Ycmg4FDj4cocI=; b=lUR6VJT3T+jNU3GB0TOoFOMxz4A3Lu9tE03DP9uk9A9oqZNXc0ykc7TMSXP7JS/Hsn DkCDL+11N/q8QNqLgfqx10klJKa6cZRm1e9LC1+0/Q7NM6WwT6qP3PM4hyINUdu4dc+E 8MHywISNB6e661sxsjWkJfmGjAfOatNjrqUl22f2txCtlLEQD63CfauiFGkJc7hb85Xn VM4x7FfMED0wICCyOFzBwxoGFCPnM9LTVWqmUnpnwPLsEA9ZhYnygxmHQB024BA0lrY3 GB8j3plZsb+rJtviebvbs+w4VoW0XVkwQRuHJvR5Itlrqh6HlwHTO4lJxdHjyvaomFrI JzTA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=lqw75gycJsVY3EF3mBdVoskxCfJRN1Ycmg4FDj4cocI=; b=Vv9p7HE7OcW9lg0b4dKPDSeKKAQMN0A4YCzcfWaNaqWr7nQyWy/KLDdF4U/8KxfHo1 sjeLqo989gvsMO/y1oKCwpQRvmAWgT9B9t1P9Qe2xDh2+sHEEizeUtLUS80LKB2qUn5A QEb38lNFd0Orf/0Hu/oJPgIcAhLqTTNpdAveoE5V/CxTY+kAlrN5+B56Zuo69WseUHN/ qcXMaP78ahaORZfGaenYvvAz4wygz9LkFy2mhKvYpHESARhY1pYtIXm6+8aOUIZoV7oI r20WJEpRVBp1q1c2RyJ8gnUoQG5JPHe/IjkTcUTGL+5bIM7evde7UrThmmZaf7irUDFc DIfA== X-Gm-Message-State: AOAM531OvlMqehCLUQKjg2ij1EKe8ZXKE6O2zRDjSXth5y0qy6wS2szw IH2aIa6Q/7haTbjYkik+WTRnkZZdOUobhQ== X-Google-Smtp-Source: ABdhPJxFwvxGJDH2wu9D0iInSaBWHbnHomokJw9OU7cRB4OKj2HnoCWX9+5xazNL6wFengn9fpnpwg== X-Received: by 2002:a5d:6da9:: with SMTP id u9mr11334900wrs.58.1632488244567; Fri, 24 Sep 2021 05:57:24 -0700 (PDT) Return-Path: Received: from leviathan (cpc92314-cmbg19-2-0-cust559.5-4.cable.virginm.net. [82.11.186.48]) by smtp.gmail.com with ESMTPSA id c9sm6493011wmb.41.2021.09.24.05.57.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 24 Sep 2021 05:57:24 -0700 (PDT) Date: Fri, 24 Sep 2021 13:57:22 +0100 From: "Leif Lindholm" To: Nhi Pham Cc: devel@edk2.groups.io, patches@amperecomputing.com, vunguyen@os.amperecomputing.com, Thang Nguyen , Chuong Tran , Phong Vo , Michael D Kinney , Ard Biesheuvel , Nate DeSimone Subject: Re: [PATCH v3 28/28] AmpereAltraPkg: Add configuration screen for Pcie Devices Message-ID: <20210924125722.nuyag4yegxj76sq6@leviathan> References: <20210915155527.8176-1-nhi@os.amperecomputing.com> <20210915155527.8176-29-nhi@os.amperecomputing.com> MIME-Version: 1.0 In-Reply-To: <20210915155527.8176-29-nhi@os.amperecomputing.com> Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit On Wed, Sep 15, 2021 at 22:55:27 +0700, Nhi Pham wrote: > From: Vu Nguyen > > This screen provide menu options to configure Max Payload and Max Read > Request size for each PCIe device under Root Port. PCIe devices which > attach to external switch are not supported yet. > > Cc: Thang Nguyen > Cc: Chuong Tran > Cc: Phong Vo > Cc: Leif Lindholm > Cc: Michael D Kinney > Cc: Ard Biesheuvel > Cc: Nate DeSimone > > Signed-off-by: Vu Nguyen Reviewed-by: Leif Lindholm > --- > Silicon/Ampere/AmpereAltraPkg/AmpereAltraPkg.dec | 3 + > Platform/Ampere/JadePkg/Jade.dsc | 1 + > Platform/Ampere/JadePkg/Jade.fdf | 1 + > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.inf | 59 ++ > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.h | 78 ++ > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.h | 56 ++ > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.h | 58 ++ > Silicon/Ampere/AmpereAltraPkg/Include/Guid/PlatformPcieDeviceConfigHii.h | 19 + > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.vfr | 50 + > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.c | 1045 ++++++++++++++++++++ > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.c | 191 ++++ > Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.uni | 24 + > 12 files changed, 1585 insertions(+) > > diff --git a/Silicon/Ampere/AmpereAltraPkg/AmpereAltraPkg.dec b/Silicon/Ampere/AmpereAltraPkg/AmpereAltraPkg.dec > index b0e1f3ec6f2a..6ce545fda8dd 100644 > --- a/Silicon/Ampere/AmpereAltraPkg/AmpereAltraPkg.dec > +++ b/Silicon/Ampere/AmpereAltraPkg/AmpereAltraPkg.dec > @@ -59,6 +59,9 @@ [Guids] > # GUID for the Watchdog HII configuration form > gWatchdogConfigFormSetGuid = { 0xC3F8EC6E, 0x95EE, 0x460C, { 0xA4, 0x8D, 0xEA, 0x54, 0x2F, 0xFF, 0x01, 0x61 } } > > + # GUID for the Pcie Device HII configuration form > + gPlatformPcieDeviceConfigFormSetGuid = { 0xEC7B1D21, 0x9167, 0x4B9D, { 0xF7, 0x94, 0xCD, 0x1A, 0xEB, 0xBC, 0xB7, 0x59 } } > + > ## NVParam MM GUID > gNVParamMmGuid = { 0xE4AC5024, 0x29BE, 0x4ADC, { 0x93, 0x36, 0x87, 0xB5, 0xA0, 0x76, 0x23, 0x2D } } > > diff --git a/Platform/Ampere/JadePkg/Jade.dsc b/Platform/Ampere/JadePkg/Jade.dsc > index b752ea3e5264..9db1cf316249 100644 > --- a/Platform/Ampere/JadePkg/Jade.dsc > +++ b/Platform/Ampere/JadePkg/Jade.dsc > @@ -202,3 +202,4 @@ [Components.common] > Silicon/Ampere/AmpereAltraPkg/Drivers/AcpiConfigDxe/AcpiConfigDxe.inf > Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.inf > Silicon/Ampere/AmpereAltraPkg/Drivers/WatchdogConfigDxe/WatchdogConfigDxe.inf > + Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.inf > diff --git a/Platform/Ampere/JadePkg/Jade.fdf b/Platform/Ampere/JadePkg/Jade.fdf > index 8f3df6ccf01b..ae444d702bbe 100644 > --- a/Platform/Ampere/JadePkg/Jade.fdf > +++ b/Platform/Ampere/JadePkg/Jade.fdf > @@ -360,5 +360,6 @@ [FV.FvMain] > INF Silicon/Ampere/AmpereAltraPkg/Drivers/AcpiConfigDxe/AcpiConfigDxe.inf > INF Silicon/Ampere/AmpereAltraPkg/Drivers/RasConfigDxe/RasConfigDxe.inf > INF Silicon/Ampere/AmpereAltraPkg/Drivers/WatchdogConfigDxe/WatchdogConfigDxe.inf > + INF Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.inf > > !include Platform/Ampere/AmperePlatformPkg/FvRules.fdf.inc > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.inf b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.inf > new file mode 100644 > index 000000000000..79d7bd185b7d > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.inf > @@ -0,0 +1,59 @@ > +## @file > +# > +# Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> +# > +# SPDX-License-Identifier: BSD-2-Clause-Patent > +# > +## > + > +[Defines] > + INF_VERSION = 0x0001001B > + BASE_NAME = PlatformPcieDeviceConfigDxe > + FILE_GUID = 17E9369D-0A1B-45F4-A286-B1DED6D85D33 > + MODULE_TYPE = DXE_DRIVER > + VERSION_STRING = 1.0 > + ENTRY_POINT = PlatformPcieDeviceConfigEntryPoint > + > +[Sources.common] > + PlatformPcieDeviceConfigDxe.c > + PlatformPcieDeviceConfigDxe.h > + PlatformPcieDeviceConfigDxe.uni > + PlatformPcieDeviceConfigVfr.h > + PlatformPcieDeviceConfigVfr.vfr > + PlatformPcieHelper.c > + PlatformPcieHelper.h > + > +[Packages] > + MdeModulePkg/MdeModulePkg.dec > + MdePkg/MdePkg.dec > + Silicon/Ampere/AmpereAltraPkg/AmpereAltraPkg.dec > + Silicon/Ampere/AmpereSiliconPkg/AmpereSiliconPkg.dec > + > +[LibraryClasses] > + BaseLib > + BaseMemoryLib > + DebugLib > + DevicePathLib > + HiiLib > + MemoryAllocationLib > + PrintLib > + UefiBootServicesTableLib > + UefiDriverEntryPoint > + UefiLib > + UefiRuntimeServicesTableLib > + > +[Protocols] > + gEfiPciIoProtocolGuid > + gEfiDevicePathProtocolGuid ## CONSUMES > + gEfiHiiConfigRoutingProtocolGuid ## CONSUMES > + gEfiHiiConfigAccessProtocolGuid ## PRODUCES > + gEfiDevicePathToTextProtocolGuid > + > +[Guids] > + gEfiIfrTianoGuid > + gPlatformPcieDeviceConfigFormSetGuid > + gPlatformManagerFormsetGuid > + gPlatformManagerEntryEventGuid > + > +[Depex] > + TRUE > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.h b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.h > new file mode 100644 > index 000000000000..a39257da06ba > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.h > @@ -0,0 +1,78 @@ > +/** @file > + > + Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#ifndef PLATFORM_PCIE_DEVICE_CONFIG_H_ > +#define PLATFORM_PCIE_DEVICE_CONFIG_H_ > + > +#include > + > +#include > +#include > +#include > +#include > +#include > +#include > + > +#include "PlatformPcieDeviceConfigVfr.h" > + > +#define MAX_STRING_SIZE 100 > + > +#define PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('P', 'E', 'D', 'C') > +#define PRIVATE_DATA_FROM_THIS(a) \ > + CR (a, PRIVATE_DATA, ConfigAccess, PRIVATE_DATA_SIGNATURE) > + > +#pragma pack(1) > + > +/// > +/// HII specific Vendor Device Path definition. > +/// > +typedef struct { > + VENDOR_DEVICE_PATH VendorDevicePath; > + EFI_DEVICE_PATH_PROTOCOL End; > +} HII_VENDOR_DEVICE_PATH; > + > +#pragma pack() > + > +// > +// This is the generated IFR binary data for each formset defined in VFR. > +// This data array is ready to be used as input of HiiAddPackages() to > +// create a packagelist (which contains Form packages, String packages, etc). > +// > +extern UINT8 PlatformPcieDeviceConfigVfrBin[]; > + > +// > +// This is the generated String package data for all .UNI files. > +// This data array is ready to be used as input of HiiAddPackages() to > +// create a packagelist (which contains Form packages, String packages, etc). > +// > +extern UINT8 PlatformPcieDeviceConfigDxeStrings[]; > + > +typedef struct { > + UINTN Signature; > + > + EFI_HANDLE DriverHandle; > + EFI_HII_HANDLE HiiHandle; > + VARSTORE_DATA LastVarStoreConfig; > + VARSTORE_DATA VarStoreConfig; > + > + // > + // Consumed protocol > + // > + EFI_HII_DATABASE_PROTOCOL *HiiDatabase; > + EFI_HII_STRING_PROTOCOL *HiiString; > + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; > + EFI_CONFIG_KEYWORD_HANDLER_PROTOCOL *HiiKeywordHandler; > + EFI_FORM_BROWSER2_PROTOCOL *FormBrowser2; > + > + // > + // Produced protocol > + // > + EFI_HII_CONFIG_ACCESS_PROTOCOL ConfigAccess; > +} PRIVATE_DATA; > + > +#endif // PLATFORM_PCIE_DEVICE_CONFIG_H_ > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.h b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.h > new file mode 100644 > index 000000000000..ee4469ea5a2a > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.h > @@ -0,0 +1,56 @@ > +/** @file > + > + Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#ifndef PLATFORM_PCIE_DEVICE_CONFIG_VFR_H_ > +#define PLATFORM_PCIE_DEVICE_CONFIG_VFR_H_ > + > +#include > + > +#define VARSTORE_NAME L"PlatformPcieDeviceConfigNVData" > + > +#define MAIN_FORM_ID 0x01 > +#define DEVICE_FORM_ID 0x02 > +#define VARSTORE_ID 0x03 > + > +#define MAIN_LABEL_UPDATE 0x21 > +#define MAIN_LABEL_END 0x22 > +#define DEVICE_LABEL_UPDATE 0x31 > +#define DEVICE_LABEL_END 0x32 > + > +#define DEVICE_KEY 0x6000 > +#define MPS_ONE_OF_KEY 0x7000 > +#define MRR_ONE_OF_KEY 0x8000 > + > +#define MAX_DEVICE 40 > + > +#define DEFAULT_MPS 0x00 // Section 7.5.3.4 > +#define DEFAULT_MRR 0x02 // Section 7.5.3.4 > + > +#define PCIE_ADD(Vid, Did, Seg, Bus, Dev) \ > + (UINT64)(Vid) << 40 | (UINT64)(Did) << 24 | Seg << 16 | Bus << 8 | Dev; > + > +#pragma pack(1) > + > +typedef struct { > + UINT8 DEV; > + UINT8 BUS; > + UINT8 SEG; > + UINT16 DID; > + UINT16 VID; > + UINT8 SlotId; > +} SLOT_INFO; > + > +typedef struct { > + UINT8 MPS[MAX_DEVICE]; > + UINT8 MRR[MAX_DEVICE]; > + UINT64 SlotInfo[MAX_DEVICE]; > +} VARSTORE_DATA; > + > +#pragma pack() > + > +#endif /* PLATFORM_PCIE_DEVICE_CONFIG_VFR_H_ */ > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.h b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.h > new file mode 100644 > index 000000000000..56aed0379539 > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.h > @@ -0,0 +1,58 @@ > +/** @file > + > + Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#ifndef PLATFORM_PCIE_HELPER_H_ > +#define PLATFORM_PCIE_HELPER_H_ > + > +#define PCIE_MAX_PAYLOAD_MASK 0x07 > +#define PCIE_CONTROL_MAX_PAYLOAD_OFF 5 > +#define PCIE_MAX_READ_REQUEST_MASK 0x07 > +#define PCIE_CONTROL_READ_REQUEST_OFF 12 > + > +#define PCI_EXPRESS_CAPABILITY_DEVICE_CAPABILITIES_REG 0x04 > +#define PCI_EXPRESS_CAPABILITY_DEVICE_CONTROL_REG 0x08 > + > +#define FOR_EACH(Node, Tail, Type) \ > + for (Node = Tail->Type; Node != NULL; Node = Node->Type) > + > +struct _PCIE_NODE { > + EFI_PCI_IO_PROTOCOL *PciIo; > + UINT8 MaxMps; > + UINT8 PcieCapOffset; > + UINT16 Vid; > + UINT16 Did; > + UINT8 Seg; > + UINT8 Bus; > + UINT8 Dev; > + UINT8 Fun; > + struct _PCIE_NODE *Parent; > + struct _PCIE_NODE *Brother; > +}; > + > +typedef struct _PCIE_NODE PCIE_NODE; > + > +EFI_STATUS > +WriteMps ( > + PCIE_NODE *Node, > + UINT8 Value > + ); > + > +EFI_STATUS > +WriteMrr ( > + PCIE_NODE *Node, > + UINT8 Value > + ); > + > +EFI_STATUS > +FindCapabilityPtr ( > + IN EFI_PCI_IO_PROTOCOL *PciIo, > + IN UINT8 CapabilityId, > + OUT UINT8 *CapabilityPtr > + ); > + > +#endif // PLATFORM_PCIE_HELPER_H_ > diff --git a/Silicon/Ampere/AmpereAltraPkg/Include/Guid/PlatformPcieDeviceConfigHii.h b/Silicon/Ampere/AmpereAltraPkg/Include/Guid/PlatformPcieDeviceConfigHii.h > new file mode 100644 > index 000000000000..ed592a0027ed > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Include/Guid/PlatformPcieDeviceConfigHii.h > @@ -0,0 +1,19 @@ > +/** @file > + > + Copyright (c) 2020 - 2021, Ampere Computing LLC. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#ifndef PLATFORM_PCIE_DEVICE_CONFIG_HII_H_ > +#define PLATFORM_PCIE_DEVICE_CONFIG_HII_H_ > + > +#define PLATFORM_PCIE_DEVICE_CONFIG_FORMSET_GUID \ > + { \ > + 0xEC7B1D21, 0x9167, 0x4B9D, { 0xF7, 0x94, 0xCD, 0x1A, 0xEB, 0xBC, 0xB7, 0x59 } \ > + } > + > +extern EFI_GUID gPlatformPcieDeviceConfigFormSetGuid; > + > +#endif /* PLATFORM_PCIE_DEVICE_CONFIG_HII_H_ */ > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.vfr b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.vfr > new file mode 100644 > index 000000000000..27ca33164e23 > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigVfr.vfr > @@ -0,0 +1,50 @@ > +/** @file > + > + Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#include > +#include "PlatformPcieDeviceConfigVfr.h" > + > +formset > + guid = PLATFORM_PCIE_DEVICE_CONFIG_FORMSET_GUID, > + title = STRING_TOKEN(STR_DEVICE_CONFIG_FORM), > + help = STRING_TOKEN(STR_DEVICE_CONFIG_HELP), > + classguid = gPlatformManagerFormsetGuid, > + > + // > + // Define a variable Storage > + // > + varstore VARSTORE_DATA, > + varid = VARSTORE_ID, > + name = PlatformPcieDeviceConfigNVData, > + guid = PLATFORM_PCIE_DEVICE_CONFIG_FORMSET_GUID; > + > + form > + formid = MAIN_FORM_ID, > + title = STRING_TOKEN(STR_DEVICE_CONFIG_FORM); > + > + subtitle text = STRING_TOKEN(STR_DEVICE_CONFIG_FORM); > + > + label MAIN_LABEL_UPDATE; > + // dynamic content here > + label MAIN_LABEL_END; > + > + endform; > + > + form > + formid = DEVICE_FORM_ID, > + title = STRING_TOKEN(STR_DEVICE_FORM); > + > + subtitle text = STRING_TOKEN(STR_DEVICE_FORM); > + > + label DEVICE_LABEL_UPDATE; > + // dynamic content here > + label DEVICE_LABEL_END; > + > + endform; > + > +endformset; > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.c b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.c > new file mode 100644 > index 000000000000..b06014529c7b > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.c > @@ -0,0 +1,1045 @@ > +/** @file > + > + Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#include > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +#include "PlatformPcieDeviceConfigDxe.h" > +#include "PlatformPcieHelper.h" > + > +VOID *mPciProtocolNotifyRegistration; > +CHAR16 *mVariableName = VARSTORE_NAME; > +PCIE_NODE *mDeviceBuf[MAX_DEVICE] = {NULL}; > + > +HII_VENDOR_DEVICE_PATH mHiiVendorDevicePath = { > + { > + { > + HARDWARE_DEVICE_PATH, > + HW_VENDOR_DP, > + { > + (UINT8)(sizeof (VENDOR_DEVICE_PATH)), > + (UINT8)((sizeof (VENDOR_DEVICE_PATH)) >> 8) > + } > + }, > + PLATFORM_PCIE_DEVICE_CONFIG_FORMSET_GUID > + }, > + { > + END_DEVICE_PATH_TYPE, > + END_ENTIRE_DEVICE_PATH_SUBTYPE, > + { > + (UINT8)(END_DEVICE_PATH_LENGTH), > + (UINT8)((END_DEVICE_PATH_LENGTH) >> 8) > + } > + } > +}; > + > +VOID > +FlushDeviceData ( > + IN EFI_EVENT Event, > + IN VOID *Context > + ) > +{ > + EFI_STATUS Status; > + PCIE_NODE *Node; > + PRIVATE_DATA *PrivateData; > + UINT8 Index; > + VARSTORE_DATA *LastVarStoreConfig; > + VARSTORE_DATA *VarStoreConfig; > + > + PrivateData = (PRIVATE_DATA *)Context; > + LastVarStoreConfig = &PrivateData->LastVarStoreConfig; > + VarStoreConfig = &PrivateData->VarStoreConfig; > + > + // > + // If config has changed, update NVRAM > + // > + if (CompareMem (VarStoreConfig, LastVarStoreConfig, sizeof (VARSTORE_DATA)) != 0) { > + DEBUG ((DEBUG_INFO, "%a Update Device Config Variable\n", __FUNCTION__)); > + Status = gRT->SetVariable ( > + mVariableName, > + &gPlatformPcieDeviceConfigFormSetGuid, > + EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS, > + sizeof (VARSTORE_DATA), > + VarStoreConfig > + ); > + if (EFI_ERROR (Status)) { > + DEBUG (( > + DEBUG_ERROR, > + "%a: Failed to set variable status %r", > + __FUNCTION__, > + Status > + )); > + return; > + } > + } > + > + // Iterate through the list, then write corresponding MPS MRR > + for (Index = 0; Index < MAX_DEVICE; Index++) { > + if (mDeviceBuf[Index] == NULL) { > + continue; > + } > + > + // Write MPS value > + WriteMps (mDeviceBuf[Index], VarStoreConfig->MPS[Index]); > + > + FOR_EACH (Node, mDeviceBuf[Index], Parent) { > + WriteMps (Node, VarStoreConfig->MPS[Index]); > + } > + > + FOR_EACH (Node, mDeviceBuf[Index], Brother) { > + WriteMps (Node, VarStoreConfig->MPS[Index]); > + } > + > + // Write MRR value > + // No need to update MRR of parent node > + WriteMrr (mDeviceBuf[Index], VarStoreConfig->MRR[Index]); > + > + FOR_EACH (Node, mDeviceBuf[Index], Brother) { > + WriteMrr (Node, VarStoreConfig->MRR[Index]); > + } > + } > + > + gBS->CloseEvent (Event); > +} > + > +EFI_STATUS > +UpdateDeviceForm ( > + UINT8 Index, > + PRIVATE_DATA *PrivateData > + ) > +{ > + CHAR16 Str[MAX_STRING_SIZE]; > + UINT8 MaxMps; > + > + VOID *StartOpCodeHandle; > + EFI_IFR_GUID_LABEL *StartLabel; > + VOID *EndOpCodeHandle; > + EFI_IFR_GUID_LABEL *EndLabel; > + VOID *MpsOpCodeHandle; > + VOID *MrrOpCodeHandle; > + PCIE_NODE *Node; > + > + if (mDeviceBuf[Index] == NULL) { > + return EFI_INVALID_PARAMETER; > + } > + > + MaxMps = mDeviceBuf[Index]->MaxMps; > + FOR_EACH (Node, mDeviceBuf[Index], Parent) { > + if (Node->MaxMps < MaxMps) { > + MaxMps = Node->MaxMps; > + } > + } > + > + UnicodeSPrint ( > + Str, > + sizeof (Str), > + L"PCIe Device 0x%04x:0x%04x", > + mDeviceBuf[Index]->Vid, > + mDeviceBuf[Index]->Did > + ); > + > + HiiSetString ( > + PrivateData->HiiHandle, > + STRING_TOKEN (STR_DEVICE_FORM), > + Str, > + NULL > + ); > + > + // > + // Initialize the container for dynamic opcodes > + // > + StartOpCodeHandle = HiiAllocateOpCodeHandle (); > + ASSERT (StartOpCodeHandle != NULL); > + > + EndOpCodeHandle = HiiAllocateOpCodeHandle (); > + ASSERT (EndOpCodeHandle != NULL); > + > + // > + // Create Hii Extend Label OpCode as the start opcode > + // > + StartLabel = (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode ( > + StartOpCodeHandle, > + &gEfiIfrTianoGuid, > + NULL, > + sizeof (EFI_IFR_GUID_LABEL) > + ); > + StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL; > + StartLabel->Number = DEVICE_LABEL_UPDATE; > + > + // > + // Create Hii Extend Label OpCode as the end opcode > + // > + EndLabel = (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode ( > + EndOpCodeHandle, > + &gEfiIfrTianoGuid, > + NULL, > + sizeof (EFI_IFR_GUID_LABEL) > + ); > + EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL; > + EndLabel->Number = DEVICE_LABEL_END; > + > + // Create Option OpCode for MPS selection > + MpsOpCodeHandle = HiiAllocateOpCodeHandle (); > + ASSERT (MpsOpCodeHandle != NULL); > + > + switch (MaxMps) { > + case 5: > + HiiCreateOneOfOptionOpCode ( > + MpsOpCodeHandle, > + STRING_TOKEN (STR_4096), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 5 > + ); > + > + case 4: > + HiiCreateOneOfOptionOpCode ( > + MpsOpCodeHandle, > + STRING_TOKEN (STR_2048), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 4 > + ); > + > + case 3: > + HiiCreateOneOfOptionOpCode ( > + MpsOpCodeHandle, > + STRING_TOKEN (STR_1024), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 3 > + ); > + > + case 2: > + HiiCreateOneOfOptionOpCode ( > + MpsOpCodeHandle, > + STRING_TOKEN (STR_512), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 2 > + ); > + > + case 1: > + HiiCreateOneOfOptionOpCode ( > + MpsOpCodeHandle, > + STRING_TOKEN (STR_256), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 1 > + ); > + > + case 0: > + HiiCreateOneOfOptionOpCode ( > + MpsOpCodeHandle, > + STRING_TOKEN (STR_128), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 0 > + ); > + } > + > + // Create MPS OneOf > + HiiCreateOneOfOpCode ( > + StartOpCodeHandle, // Container for dynamic created opcodes > + (MPS_ONE_OF_KEY + Index), // Question ID (or call it "key") > + VARSTORE_ID, // VarStore ID > + Index, // Offset in Buffer Storage > + STRING_TOKEN (STR_PCIE_MPS), // Question prompt text > + STRING_TOKEN (STR_PCIE_MPS_HELP), // Question help text > + EFI_IFR_FLAG_CALLBACK, // Question flag > + EFI_IFR_NUMERIC_SIZE_1, // Data type of Question Value > + MpsOpCodeHandle, // Option Opcode list > + NULL // Default Opcode is NULl > + ); > + > + // Create Option OpCode for MRR selection > + MrrOpCodeHandle = HiiAllocateOpCodeHandle (); > + ASSERT (MrrOpCodeHandle != NULL); > + > + HiiCreateOneOfOptionOpCode ( > + MrrOpCodeHandle, > + STRING_TOKEN (STR_4096), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 5 > + ); > + > + HiiCreateOneOfOptionOpCode ( > + MrrOpCodeHandle, > + STRING_TOKEN (STR_2048), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 4 > + ); > + > + HiiCreateOneOfOptionOpCode ( > + MrrOpCodeHandle, > + STRING_TOKEN (STR_1024), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 3 > + ); > + > + HiiCreateOneOfOptionOpCode ( > + MrrOpCodeHandle, > + STRING_TOKEN (STR_512), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 2 > + ); > + > + HiiCreateOneOfOptionOpCode ( > + MrrOpCodeHandle, > + STRING_TOKEN (STR_256), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 1 > + ); > + > + HiiCreateOneOfOptionOpCode ( > + MrrOpCodeHandle, > + STRING_TOKEN (STR_128), > + 0, > + EFI_IFR_NUMERIC_SIZE_1, > + 0 > + ); > + > + // Create MRR OneOf > + HiiCreateOneOfOpCode ( > + StartOpCodeHandle, // Container for dynamic created opcodes > + (MRR_ONE_OF_KEY + Index), // Question ID (or call it "key") > + VARSTORE_ID, // VarStore ID > + MAX_DEVICE + Index, // Offset in Buffer Storage > + STRING_TOKEN (STR_PCIE_MRR), // Question prompt text > + STRING_TOKEN (STR_PCIE_MRR_HELP), // Question help text > + EFI_IFR_FLAG_CALLBACK, // Question flag > + EFI_IFR_NUMERIC_SIZE_1, // Data type of Question Value > + MrrOpCodeHandle, // Option Opcode list > + NULL // Default Opcode is NULl > + ); > + > + HiiUpdateForm ( > + PrivateData->HiiHandle, // HII handle > + &gPlatformPcieDeviceConfigFormSetGuid, // Formset GUID > + DEVICE_FORM_ID, // Form ID > + StartOpCodeHandle, // Label for where to insert opcodes > + EndOpCodeHandle // Insert data > + ); > + > + HiiFreeOpCodeHandle (StartOpCodeHandle); > + HiiFreeOpCodeHandle (EndOpCodeHandle); > + HiiFreeOpCodeHandle (MpsOpCodeHandle); > + HiiFreeOpCodeHandle (MrrOpCodeHandle); > + return EFI_SUCCESS; > +} > + > +VOID > +OnPciIoProtocolNotify ( > + IN EFI_EVENT Event, > + IN VOID *Context > + ) > +{ > + EFI_PCI_IO_PROTOCOL *PciIo; > + EFI_STATUS Status; > + EFI_HANDLE HandleBuffer; > + PCI_TYPE00 Pci; > + > + UINTN BufferSize; > + UINTN PciBusNumber; > + UINTN PciDeviceNumber; > + UINTN PciFunctionNumber; > + UINTN PciSegment; > + > + UINT8 Idx; > + UINT8 CapabilityPtr; > + UINT16 TmpValue; > + UINT64 SlotInfo; > + > + PCIE_NODE *Node; > + PRIVATE_DATA *PrivateData; > + STATIC PCIE_NODE *LastNode; > + STATIC UINT8 Index; > + STATIC UINT8 LastBus; > + > + VARSTORE_DATA *LastVarStoreConfig; > + VARSTORE_DATA *VarStoreConfig; > + > + PrivateData = (PRIVATE_DATA *)Context; > + LastVarStoreConfig = &PrivateData->LastVarStoreConfig; > + VarStoreConfig = &PrivateData->VarStoreConfig; > + > + while (TRUE) { > + BufferSize = sizeof (EFI_HANDLE); > + Status = gBS->LocateHandle ( > + ByRegisterNotify, > + NULL, > + mPciProtocolNotifyRegistration, > + &BufferSize, > + &HandleBuffer > + ); > + if (EFI_ERROR (Status)) { > + break; > + } > + > + Status = gBS->HandleProtocol ( > + HandleBuffer, > + &gEfiPciIoProtocolGuid, > + (VOID **)&PciIo > + ); > + if (EFI_ERROR (Status)) { > + break; > + } > + > + // Get device bus location > + Status = PciIo->GetLocation ( > + PciIo, > + &PciSegment, > + &PciBusNumber, > + &PciDeviceNumber, > + &PciFunctionNumber > + ); > + if (EFI_ERROR (Status) || > + ((PciBusNumber == 0) && (PciDeviceNumber == 0))) > + { > + // Filter out Host Bridge > + DEBUG ((DEBUG_INFO, "Filter out Host Bridge %x\n", PciSegment)); > + continue; > + } > + > + DEBUG (( > + DEBUG_INFO, > + ">> Dev 0x%04x:0x%02x:0x%02x:0x%02x\n", > + PciSegment, > + PciBusNumber, > + PciDeviceNumber, > + PciFunctionNumber > + )); > + > + Status = FindCapabilityPtr (PciIo, EFI_PCI_CAPABILITY_ID_PCIEXP, &CapabilityPtr); > + if (EFI_ERROR (Status)) { > + DEBUG (( > + DEBUG_ERROR, > + "%a: PCI Express Capability not found\n", > + __FUNCTION__ > + )); > + continue; > + } > + > + // Get Device's max MPS support > + Status = PciIo->Pci.Read ( > + PciIo, > + EfiPciIoWidthUint16, > + CapabilityPtr + PCI_EXPRESS_CAPABILITY_DEVICE_CAPABILITIES_REG, > + 1, > + &TmpValue > + ); > + if (EFI_ERROR (Status)) { > + continue; > + } > + > + // Read device's VID:PID > + Status = PciIo->Pci.Read ( > + PciIo, > + EfiPciIoWidthUint32, > + 0, > + sizeof (Pci) / sizeof (UINT32), > + &Pci > + ); > + if (EFI_ERROR (Status)) { > + continue; > + } > + DEBUG (( > + DEBUG_INFO, > + "VendorId 0x%04x - DeviceId 0x%04x\n", > + Pci.Hdr.VendorId, > + Pci.Hdr.DeviceId > + )); > + > + Node = AllocateZeroPool (sizeof (*Node)); > + Node->MaxMps = TmpValue & PCIE_MAX_PAYLOAD_MASK; > + Node->PcieCapOffset = CapabilityPtr; > + Node->PciIo = PciIo; > + Node->Seg = PciSegment; > + Node->Bus = PciBusNumber; > + Node->Dev = PciDeviceNumber; > + Node->Fun = PciFunctionNumber; > + Node->Vid = Pci.Hdr.VendorId; > + Node->Did = Pci.Hdr.DeviceId; > + SlotInfo = PCIE_ADD (Node->Vid, Node->Did, Node->Seg, Node->Bus, Node->Dev); > + > + // Presume child devices were registered follow root port > + if (PciBusNumber != 0) { > + if (LastBus == 0) { > + Node->Parent = LastNode; > + mDeviceBuf[Index] = Node; > + > + VarStoreConfig->MPS[Index] = DEFAULT_MPS; > + VarStoreConfig->MRR[Index] = DEFAULT_MRR; > + VarStoreConfig->SlotInfo[Index] = SlotInfo; > + > + // Retrieve setting from previous variable > + for (Idx = 0; Idx < MAX_DEVICE; Idx++) { > + if (SlotInfo == LastVarStoreConfig->SlotInfo[Idx]) { > + VarStoreConfig->MPS[Index] = LastVarStoreConfig->MPS[Idx]; > + VarStoreConfig->MRR[Index] = LastVarStoreConfig->MRR[Idx]; > + break; > + } > + } > + > + Index++; > + } else if (PciBusNumber == LastBus) { > + LastNode->Brother = Node; > + } else { > + // Ignore devices don't stay under root port > + continue; > + } > + } > + > + LastBus = PciBusNumber; > + LastNode = Node; > + } > +} > + > +VOID > +UpdateMainForm ( > + IN EFI_EVENT Event, > + IN VOID *Context > + ) > +{ > + UINTN Index; > + EFI_STRING_ID StrId; > + CHAR16 Str[MAX_STRING_SIZE]; > + VOID *StartOpCodeHandle; > + EFI_IFR_GUID_LABEL *StartLabel; > + VOID *EndOpCodeHandle; > + EFI_IFR_GUID_LABEL *EndLabel; > + PRIVATE_DATA *PrivateData; > + > + DEBUG ((DEBUG_INFO, "%a Entry ...\n", __FUNCTION__)); > + > + PrivateData = (PRIVATE_DATA *)Context; > + > + // > + // Initialize the container for dynamic opcodes > + // > + StartOpCodeHandle = HiiAllocateOpCodeHandle (); > + ASSERT (StartOpCodeHandle != NULL); > + > + EndOpCodeHandle = HiiAllocateOpCodeHandle (); > + ASSERT (EndOpCodeHandle != NULL); > + > + // > + // Create Hii Extend Label OpCode as the start opcode > + // > + StartLabel = (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode ( > + StartOpCodeHandle, > + &gEfiIfrTianoGuid, > + NULL, > + sizeof (EFI_IFR_GUID_LABEL) > + ); > + StartLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL; > + StartLabel->Number = MAIN_LABEL_UPDATE; > + > + // > + // Create Hii Extend Label OpCode as the end opcode > + // > + EndLabel = (EFI_IFR_GUID_LABEL *)HiiCreateGuidOpCode ( > + EndOpCodeHandle, > + &gEfiIfrTianoGuid, > + NULL, > + sizeof (EFI_IFR_GUID_LABEL) > + ); > + EndLabel->ExtendOpCode = EFI_IFR_EXTEND_OP_LABEL; > + EndLabel->Number = MAIN_LABEL_END; > + > + for (Index = 0; Index < MAX_DEVICE; Index++) { > + if (mDeviceBuf[Index] == NULL) { > + break; > + } > + DEBUG ((DEBUG_INFO, ">> Add item %d\n", Index)); > + > + UnicodeSPrint ( > + Str, > + sizeof (Str), > + L"PCIe Device 0x%04x:0x%04x - %04x:%02x:%02x", > + mDeviceBuf[Index]->Vid, > + mDeviceBuf[Index]->Did, > + mDeviceBuf[Index]->Seg, > + mDeviceBuf[Index]->Bus, > + mDeviceBuf[Index]->Dev > + ); > + > + StrId = HiiSetString (PrivateData->HiiHandle, 0, Str, NULL); > + > + // > + // Create a Goto OpCode to device configuration > + // > + HiiCreateGotoOpCode ( > + StartOpCodeHandle, // Container for dynamic created opcodes > + DEVICE_FORM_ID, // Target Form ID > + StrId, // Prompt text > + STRING_TOKEN (STR_DEVICE_GOTO_HELP), // Help text > + EFI_IFR_FLAG_CALLBACK, // Question flag > + (DEVICE_KEY + Index) // Question ID > + ); > + } > + > + HiiUpdateForm ( > + PrivateData->HiiHandle, // HII handle > + &gPlatformPcieDeviceConfigFormSetGuid, // Formset GUID > + MAIN_FORM_ID, // Form ID > + StartOpCodeHandle, // Label for where to insert opcodes > + EndOpCodeHandle // Insert data > + ); > + > + HiiFreeOpCodeHandle (StartOpCodeHandle); > + HiiFreeOpCodeHandle (EndOpCodeHandle); > + > + gBS->CloseEvent (Event); > +} > + > +EFI_STATUS > +EFIAPI > +ExtractConfig ( > + IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This, > + IN CONST EFI_STRING Request, > + OUT EFI_STRING *Progress, > + OUT EFI_STRING *Results > + ) > +{ > + EFI_STATUS Status; > + UINTN BufferSize; > + PRIVATE_DATA *PrivateData; > + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; > + EFI_STRING ConfigRequest; > + EFI_STRING ConfigRequestHdr; > + UINTN Size; > + CHAR16 *StrPointer; > + BOOLEAN AllocatedRequest; > + VARSTORE_DATA *VarStoreConfig; > + > + if (Progress == NULL || Results == NULL) { > + return EFI_INVALID_PARAMETER; > + } > + // > + // Initialize the local variables. > + // > + ConfigRequestHdr = NULL; > + ConfigRequest = NULL; > + Size = 0; > + *Progress = Request; > + AllocatedRequest = FALSE; > + > + PrivateData = PRIVATE_DATA_FROM_THIS (This); > + HiiConfigRouting = PrivateData->HiiConfigRouting; > + VarStoreConfig = &PrivateData->VarStoreConfig; > + ASSERT (VarStoreConfig != NULL); > + > + BufferSize = sizeof (VARSTORE_DATA); > + > + if (Request == NULL) { > + // > + // Request is set to NULL, construct full request string. > + // > + > + // > + // Allocate and fill a buffer large enough to hold the template > + // followed by "&OFFSET=0&WIDTH=WWWWWWWWWWWWWWWW" followed by a > + // Null-terminator > + // > + ConfigRequestHdr = HiiConstructConfigHdr ( > + &gPlatformPcieDeviceConfigFormSetGuid, > + mVariableName, > + PrivateData->DriverHandle > + ); > + if (ConfigRequestHdr == NULL) { > + return EFI_OUT_OF_RESOURCES; > + } > + Size = (StrLen (ConfigRequestHdr) + 32 + 1) * sizeof (CHAR16); > + ConfigRequest = AllocateZeroPool (Size); > + ASSERT (ConfigRequest != NULL); > + AllocatedRequest = TRUE; > + UnicodeSPrint ( > + ConfigRequest, > + Size, > + L"%s&OFFSET=0&WIDTH=%016LX", > + ConfigRequestHdr, > + (UINT64)BufferSize > + ); > + FreePool (ConfigRequestHdr); > + ConfigRequestHdr = NULL; > + } else { > + // > + // Check routing data in . > + // Note: if only one Storage is used, then this checking could be skipped. > + // > + if (!HiiIsConfigHdrMatch (Request, &gPlatformPcieDeviceConfigFormSetGuid, NULL)) { > + return EFI_NOT_FOUND; > + } > + // > + // Set Request to the unified request string. > + // > + ConfigRequest = Request; > + > + // > + // Check whether Request includes Request Element. > + // > + if (StrStr (Request, L"OFFSET") == NULL) { > + // > + // Check Request Element does exist in Request String > + // > + StrPointer = StrStr (Request, L"PATH"); > + if (StrPointer == NULL) { > + return EFI_INVALID_PARAMETER; > + } > + if (StrStr (StrPointer, L"&") == NULL) { > + Size = (StrLen (Request) + 32 + 1) * sizeof (CHAR16); > + ConfigRequest = AllocateZeroPool (Size); > + ASSERT (ConfigRequest != NULL); > + AllocatedRequest = TRUE; > + UnicodeSPrint ( > + ConfigRequest, > + Size, > + L"%s&OFFSET=0&WIDTH=%016LX", > + Request, > + (UINT64)BufferSize > + ); > + } > + } > + } > + // > + // Check if requesting Name/Value storage > + // > + if (StrStr (ConfigRequest, L"OFFSET") == NULL) { > + // > + // Don't have any Name/Value storage names > + // > + Status = EFI_SUCCESS; > + } else { > + // > + // Convert buffer data to by helper function BlockToConfig() > + // > + Status = HiiConfigRouting->BlockToConfig ( > + HiiConfigRouting, > + ConfigRequest, > + (UINT8 *)VarStoreConfig, > + BufferSize, > + Results, > + Progress > + ); > + } > + // > + // Free the allocated config request string. > + // > + if (AllocatedRequest) { > + FreePool (ConfigRequest); > + } > + if (ConfigRequestHdr != NULL) { > + FreePool (ConfigRequestHdr); > + } > + // > + // Set Progress string to the original request string. > + // > + if (Request == NULL) { > + *Progress = NULL; > + } else if (StrStr (Request, L"OFFSET") == NULL) { > + *Progress = Request + StrLen (Request); > + } > + return Status; > +} > + > +/** > + This function processes the results of changes in configuration. > + @param This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL. > + @param Configuration A null-terminated Unicode string in > + format. > + @param Progress A pointer to a string filled in with the offset of > + the most recent '&' before the first failing > + name/value pair (or the beginning of the string if > + the failure is in the first name/value pair) or > + the terminating NULL if all was successful. > + @retval EFI_SUCCESS The Results is processed successfully. > + @retval EFI_INVALID_PARAMETER Configuration is NULL. > + @retval EFI_NOT_FOUND Routing data doesn't match any storage in this > + driver. > +**/ > +EFI_STATUS > +EFIAPI > +RouteConfig ( > + IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This, > + IN CONST EFI_STRING Configuration, > + OUT EFI_STRING *Progress > + ) > +{ > + EFI_STATUS Status; > + UINTN BufferSize; > + PRIVATE_DATA *PrivateData; > + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; > + VARSTORE_DATA *VarStoreConfig; > + > + if (Configuration == NULL || Progress == NULL) { > + return EFI_INVALID_PARAMETER; > + } > + PrivateData = PRIVATE_DATA_FROM_THIS (This); > + HiiConfigRouting = PrivateData->HiiConfigRouting; > + *Progress = Configuration; > + VarStoreConfig = &PrivateData->VarStoreConfig; > + ASSERT (VarStoreConfig != NULL); > + > + // > + // Check routing data in . > + // Note: if only one Storage is used, then this checking could be skipped. > + // > + if (!HiiIsConfigHdrMatch ( > + Configuration, > + &gPlatformPcieDeviceConfigFormSetGuid, > + NULL > + )) > + { > + return EFI_NOT_FOUND; > + } > + > + // > + // Check if configuring Name/Value storage > + // > + if (StrStr (Configuration, L"OFFSET") == NULL) { > + // > + // Don't have any Name/Value storage names > + // > + return EFI_SUCCESS; > + } > + // > + // Convert to buffer data by helper function ConfigToBlock() > + // > + BufferSize = sizeof (VARSTORE_DATA); > + Status = HiiConfigRouting->ConfigToBlock ( > + HiiConfigRouting, > + Configuration, > + (UINT8 *)VarStoreConfig, > + &BufferSize, > + Progress > + ); > + > + return Status; > +} > + > +/** > + This function processes the results of changes in configuration. > + @param This Points to the EFI_HII_CONFIG_ACCESS_PROTOCOL. > + @param Action Specifies the type of action taken by the browser. > + @param QuestionId A unique value which is sent to the original > + exporting driver so that it can identify the type > + of data to expect. > + @param Type The type of value for the question. > + @param Value A pointer to the data being sent to the original > + exporting driver. > + @param ActionRequest On return, points to the action requested by the > + callback function. > + @retval EFI_SUCCESS The callback successfully handled the action. > + @retval EFI_INVALID_PARAMETER Configuration is NULL. > + @retval EFI_UNSUPPORTED The specified Action is not supported by the > + callback. > +**/ > +EFI_STATUS > +EFIAPI > +DriverCallback ( > + IN CONST EFI_HII_CONFIG_ACCESS_PROTOCOL *This, > + IN EFI_BROWSER_ACTION Action, > + IN EFI_QUESTION_ID QuestionId, > + IN UINT8 Type, > + IN EFI_IFR_TYPE_VALUE *Value, > + OUT EFI_BROWSER_ACTION_REQUEST *ActionRequest > + ) > +{ > + EFI_STATUS Status; > + PRIVATE_DATA *PrivateData; > + > + if (((Value == NULL) && > + (Action != EFI_BROWSER_ACTION_FORM_OPEN) && > + (Action != EFI_BROWSER_ACTION_FORM_CLOSE)) || > + (ActionRequest == NULL)) > + { > + return EFI_INVALID_PARAMETER; > + } > + > + PrivateData = PRIVATE_DATA_FROM_THIS (This); > + > + switch (Action) { > + case EFI_BROWSER_ACTION_CHANGING: > + if ((QuestionId >= DEVICE_KEY) > + & (QuestionId <= (DEVICE_KEY + MAX_DEVICE))) > + { > + Status = UpdateDeviceForm (QuestionId - DEVICE_KEY, PrivateData); > + if (EFI_ERROR (Status)) { > + return Status; > + } > + } > + break; > + > + case EFI_BROWSER_ACTION_DEFAULT_STANDARD: > + case EFI_BROWSER_ACTION_DEFAULT_MANUFACTURING: > + if ((QuestionId >= MPS_ONE_OF_KEY) > + & (QuestionId <= (MPS_ONE_OF_KEY + MAX_DEVICE))) > + { > + Value->u8 = DEFAULT_MPS; > + } > + > + if ((QuestionId >= MRR_ONE_OF_KEY) > + & (QuestionId <= (MRR_ONE_OF_KEY + MAX_DEVICE))) > + { > + Value->u8 = DEFAULT_MRR; > + } > + break; > + > + case EFI_BROWSER_ACTION_SUBMITTED: > + break; > + } > + > + return EFI_SUCCESS; > +} > + > +EFI_STATUS > +EFIAPI > +PlatformPcieDeviceConfigEntryPoint ( > + IN EFI_HANDLE ImageHandle, > + IN EFI_SYSTEM_TABLE *SystemTable > + ) > +{ > + EFI_HANDLE DriverHandle; > + EFI_HII_CONFIG_ROUTING_PROTOCOL *HiiConfigRouting; > + EFI_HII_HANDLE HiiHandle; > + EFI_STATUS Status; > + EFI_EVENT PlatformUiEntryEvent; > + EFI_EVENT FlushDeviceEvent; > + EFI_EVENT PciProtocolNotifyEvent; > + PRIVATE_DATA *PrivateData; > + UINTN BufferSize; > + > + DriverHandle = NULL; > + PrivateData = AllocateZeroPool (sizeof (*PrivateData)); > + if (PrivateData == NULL) { > + return EFI_OUT_OF_RESOURCES; > + } > + PrivateData->Signature = PRIVATE_DATA_SIGNATURE; > + > + PrivateData->ConfigAccess.ExtractConfig = ExtractConfig; > + PrivateData->ConfigAccess.RouteConfig = RouteConfig; > + PrivateData->ConfigAccess.Callback = DriverCallback; > + > + // > + // Locate ConfigRouting protocol > + // > + Status = gBS->LocateProtocol ( > + &gEfiHiiConfigRoutingProtocolGuid, > + NULL, > + (VOID **)&HiiConfigRouting > + ); > + if (EFI_ERROR (Status)) { > + goto Exit; > + } > + PrivateData->HiiConfigRouting = HiiConfigRouting; > + > + Status = gBS->InstallMultipleProtocolInterfaces ( > + &DriverHandle, > + &gEfiDevicePathProtocolGuid, > + &mHiiVendorDevicePath, > + &gEfiHiiConfigAccessProtocolGuid, > + &PrivateData->ConfigAccess, > + NULL > + ); > + if (EFI_ERROR (Status)) { > + goto Exit; > + } > + > + PrivateData->DriverHandle = DriverHandle; > + > + // > + // Publish our HII data > + // > + HiiHandle = HiiAddPackages ( > + &gPlatformPcieDeviceConfigFormSetGuid, > + DriverHandle, > + PlatformPcieDeviceConfigDxeStrings, > + PlatformPcieDeviceConfigVfrBin, > + NULL > + ); > + if (HiiHandle == NULL) { > + Status = EFI_OUT_OF_RESOURCES; > + goto Exit; > + } > + PrivateData->HiiHandle = HiiHandle; > + > + // Event to fixup screen > + Status = gBS->CreateEventEx ( > + EVT_NOTIFY_SIGNAL, > + TPL_CALLBACK, > + UpdateMainForm, > + (VOID *)PrivateData, > + &gPlatformManagerEntryEventGuid, > + &PlatformUiEntryEvent > + ); > + if (EFI_ERROR (Status)) { > + goto Exit; > + } > + > + // Event to collect PciIo > + PciProtocolNotifyEvent = EfiCreateProtocolNotifyEvent ( > + &gEfiPciIoProtocolGuid, > + TPL_CALLBACK, > + OnPciIoProtocolNotify, > + (VOID *)PrivateData, > + &mPciProtocolNotifyRegistration > + ); > + ASSERT (PciProtocolNotifyEvent != NULL); > + > + // Event to flush device data > + Status = gBS->CreateEventEx ( > + EVT_NOTIFY_SIGNAL, > + TPL_CALLBACK, > + FlushDeviceData, > + (VOID *)PrivateData, > + &gEfiEventReadyToBootGuid, > + &FlushDeviceEvent > + ); > + if (EFI_ERROR (Status)) { > + goto Exit; > + } > + > + // Verify varstore > + BufferSize = sizeof (VARSTORE_DATA); > + Status = gRT->GetVariable ( > + mVariableName, > + &gPlatformPcieDeviceConfigFormSetGuid, > + NULL, > + &BufferSize, > + &PrivateData->LastVarStoreConfig > + ); > + if (EFI_ERROR (Status)) { > + DEBUG ((DEBUG_ERROR, "%a: Last config is not found\n", __FUNCTION__)); > + } > + > + return EFI_SUCCESS; > + > +Exit: > + FreePool (PrivateData); > + return Status; > +} > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.c b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.c > new file mode 100644 > index 000000000000..6bd753ef327f > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieHelper.c > @@ -0,0 +1,191 @@ > +/** @file > + > + Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> + > + SPDX-License-Identifier: BSD-2-Clause-Patent > + > +**/ > + > +#include > + > +#include > +#include > +#include > +#include > + > +#include "PlatformPcieDeviceConfigDxe.h" > +#include "PlatformPcieHelper.h" > + > +EFI_STATUS > +FindCapabilityPtr ( > + IN EFI_PCI_IO_PROTOCOL *PciIo, > + IN UINT8 CapabilityId, > + OUT UINT8 *CapabilityPtr > + ) > +{ > + EFI_STATUS Status; > + UINT8 NextPtr; > + UINT16 TmpValue; > + > + ASSERT (PciIo != NULL); > + > + // > + // Get pointer to first PCI Capability header > + // > + Status = PciIo->Pci.Read ( > + PciIo, > + EfiPciIoWidthUint8, > + PCI_CAPBILITY_POINTER_OFFSET, > + 1, > + &NextPtr > + ); > + if (EFI_ERROR (Status)) { > + goto Exit; > + } > + > + while (TRUE) { > + if (NextPtr == 0x00) { > + Status = EFI_NOT_FOUND; > + goto Exit; > + } > + > + // > + // Retrieve PCI Capability header > + // > + Status = PciIo->Pci.Read ( > + PciIo, > + EfiPciIoWidthUint16, > + NextPtr, > + 1, > + &TmpValue > + ); > + if (EFI_ERROR (Status)) { > + goto Exit; > + } > + > + if ((TmpValue & 0xFF) == CapabilityId) { > + *CapabilityPtr = NextPtr; > + Status = EFI_SUCCESS; > + goto Exit; > + } > + > + NextPtr = (TmpValue >> 8) & 0xFF; > + } > + > +Exit: > + return Status; > +} > + > +EFI_STATUS > +WriteMps ( > + PCIE_NODE *Node, > + UINT8 Value > + ) > +{ > + EFI_PCI_IO_PROTOCOL *PciIo; > + EFI_STATUS Status; > + UINT16 TmpValue; > + UINT8 PcieCapOffset; > + > + if (Node == NULL) { > + return EFI_INVALID_PARAMETER; > + } > + > + PciIo = Node->PciIo; > + PcieCapOffset = Node->PcieCapOffset; > + > + // Get current device control reg > + Status = PciIo->Pci.Read ( > + PciIo, > + EfiPciIoWidthUint16, > + PcieCapOffset + PCI_EXPRESS_CAPABILITY_DEVICE_CONTROL_REG, > + 1, > + &TmpValue > + ); > + if (EFI_ERROR (Status)) { > + return Status; > + } > + > + // Update value and write to device > + TmpValue = (TmpValue & ~(PCIE_MAX_PAYLOAD_MASK << PCIE_CONTROL_MAX_PAYLOAD_OFF)) > + | Value << PCIE_CONTROL_MAX_PAYLOAD_OFF; > + Status = PciIo->Pci.Write ( > + PciIo, > + EfiPciIoWidthUint16, > + PcieCapOffset + PCI_EXPRESS_CAPABILITY_DEVICE_CONTROL_REG, > + 1, > + &TmpValue > + ); > + if (EFI_ERROR (Status)) { > + return Status; > + } > + DEBUG (( > + DEBUG_INFO, > + "%a: Write MPS %d to device 0x%04x:0x%02x:0x%02x:0x%02x\n", > + __FUNCTION__, > + Value, > + Node->Seg, > + Node->Bus, > + Node->Dev, > + Node->Fun > + )); > + > + return EFI_SUCCESS; > +} > + > +EFI_STATUS > +WriteMrr ( > + PCIE_NODE *Node, > + UINT8 Value > + ) > +{ > + EFI_PCI_IO_PROTOCOL *PciIo; > + EFI_STATUS Status; > + UINT16 TmpValue; > + UINT8 PcieCapOffset; > + > + if (Node == NULL) { > + return EFI_INVALID_PARAMETER; > + } > + > + PciIo = Node->PciIo; > + PcieCapOffset = Node->PcieCapOffset; > + > + // Get current device control reg > + Status = PciIo->Pci.Read ( > + PciIo, > + EfiPciIoWidthUint16, > + PcieCapOffset + PCI_EXPRESS_CAPABILITY_DEVICE_CONTROL_REG, > + 1, > + &TmpValue > + ); > + if (EFI_ERROR (Status)) { > + return Status; > + } > + > + // Update value and write to device > + TmpValue = (TmpValue & ~(PCIE_MAX_READ_REQUEST_MASK << PCIE_CONTROL_READ_REQUEST_OFF)) > + | Value << PCIE_CONTROL_READ_REQUEST_OFF; > + Status = PciIo->Pci.Write ( > + PciIo, > + EfiPciIoWidthUint16, > + PcieCapOffset + PCI_EXPRESS_CAPABILITY_DEVICE_CONTROL_REG, > + 1, > + &TmpValue > + ); > + if (EFI_ERROR (Status)) { > + return Status; > + } > + DEBUG (( > + DEBUG_INFO, > + "%a: Write MRR %d to device 0x%04x:0x%02x:0x%02x:0x%02x\n", > + __FUNCTION__, > + Value, > + Node->Seg, > + Node->Bus, > + Node->Dev, > + Node->Fun > + )); > + > + return EFI_SUCCESS; > +} > diff --git a/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.uni b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.uni > new file mode 100644 > index 000000000000..f6cd94ffee36 > --- /dev/null > +++ b/Silicon/Ampere/AmpereAltraPkg/Drivers/PlatformPcieDeviceConfigDxe/PlatformPcieDeviceConfigDxe.uni > @@ -0,0 +1,24 @@ > +// > +// Copyright (c) 2021, Ampere Computing LLC. All rights reserved.
> +// > +// SPDX-License-Identifier: BSD-2-Clause-Patent > +// > + > +#langdef en-US "English" // English > + > +#string STR_DEVICE_CONFIG_FORM #language en-US "PCIE Device Configuration" > +#string STR_DEVICE_CONFIG_HELP #language en-US "PCIE Device Configuration" > + > +#string STR_DEVICE_FORM #language en-US "PCIE Device Form" > +#string STR_DEVICE_GOTO_HELP #language en-US "PCIE Device Configuration" > + > +#string STR_PCIE_MPS #language en-US "Max Payload Size" > +#string STR_PCIE_MPS_HELP #language en-US "Max Payload Size" > +#string STR_PCIE_MRR #language en-US "Max Read Request Size" > +#string STR_PCIE_MRR_HELP #language en-US "Max Read Request Size" > +#string STR_128 #language en-US "128 bytes" > +#string STR_256 #language en-US "256 bytes" > +#string STR_512 #language en-US "512 bytes" > +#string STR_1024 #language en-US "1024 bytes" > +#string STR_2048 #language en-US "2048 bytes" > +#string STR_4096 #language en-US "4096 bytes" > -- > 2.17.1 >