From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from EUR03-AM5-obe.outbound.protection.outlook.com (EUR03-AM5-obe.outbound.protection.outlook.com [40.107.3.74]) by mx.groups.io with SMTP id smtpd.web10.10393.1636541779614081025 for ; Wed, 10 Nov 2021 02:56:20 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@armh.onmicrosoft.com header.s=selector2-armh-onmicrosoft-com header.b=dBXp77OO; spf=pass (domain: arm.com, ip: 40.107.3.74, mailfrom: sami.mujawar@arm.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UGPX3jjd69ABy2d29X/oY6697pUoNuy4w+kxjIcFJQk=; b=dBXp77OO3G2OBODmbrN1zJmBJpm38/eg832SJ5bQrU+/t6NgNY3ldIri4TzJ+ILsbMUaxTgwfuCUBDg/8oM8hWegutbT+B6t3dYFTSbYR26o6kG5OVFeovsEWd9zUIEmzNczEB8hjbbcfAc/nAXdyXiTWC1UiSMzyeOJvaC9lNE= Received: from AS8P251CA0002.EURP251.PROD.OUTLOOK.COM (2603:10a6:20b:2f2::15) by AM0PR08MB3730.eurprd08.prod.outlook.com (2603:10a6:208:fe::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4690.15; Wed, 10 Nov 2021 10:56:15 +0000 Received: from AM5EUR03FT039.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:2f2:cafe::95) by AS8P251CA0002.outlook.office365.com (2603:10a6:20b:2f2::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4690.15 via Frontend Transport; Wed, 10 Nov 2021 10:56:15 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT039.mail.protection.outlook.com (10.152.17.185) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4649.14 via Frontend Transport; Wed, 10 Nov 2021 10:56:15 +0000 Received: ("Tessian outbound e7ce0d853b63:v108"); Wed, 10 Nov 2021 10:56:15 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 301d2fb7ac18ff5e X-CR-MTA-TID: 64aa7808 Received: from 001aff9a7841.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 52AA916A-5288-4E1C-9C83-0078C2A1C125.1; Wed, 10 Nov 2021 10:56:09 +0000 Received: from EUR04-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 001aff9a7841.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 10 Nov 2021 10:56:09 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FC7bWQG/uvr+6k6QnAK2frB8sMh4T38lQiUA4gSISx+m8qdwe5gdh4ju0V1Z4m0zhQFQPR4llcMz22RxIEUEiOzFtH0K/uV26pJa8imev0w/tYqEOkGuEzK05Hy/7WyWbNdmoSvU3RjWLMifzmXUpN2LSaGuDbm/vhV7X+hmK6fqKORhdy0xLa/bxTJdGmxM9L8G/UtR5J+BYKhPHF19GKC6XhjA7cpekN1bHqKtAMU1sHYb7ZXpoVB+t8PgQQ19OMQzvG6J0chK3rWQI9KIMeeKOJW1CfmG9fSbaRAsAxEWWAwY+KSkU5bu/mAcm6BNm1FsEWjF4kUo/GiPNeWtzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UGPX3jjd69ABy2d29X/oY6697pUoNuy4w+kxjIcFJQk=; b=FMBKjFVAP1pn/XlSEwuN5xkrxBFgjptocn5ODxFCkqmvhS5qf+k0q+tG3h/p7XrZuB9o2Abvr3O02gRK8IWuRoXvPymqFsWlJIhCYOEk2l+6PunB2MKwVRvwUmmtTjexEPXa4SAZe0ybBPjhIIN3GmO2NrUK6mDfVR3ESThDRfc5rX114T8IXg+SRfN3t4K1q68hxFpHFt+b9Txc1zUSL0XPwD+NRdy0cqMUl52fw3NgZgrRE8NNGRqq4tHHdeLrkgeAzKAxi9Hq6Gu2Xu1M+H8q3wPRq6lF7t2Gv4G5r4gpI0PRUgDVakVXY6uiJtBk7VXWde6/0MefmnAahB53vw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=edk2.groups.io smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UGPX3jjd69ABy2d29X/oY6697pUoNuy4w+kxjIcFJQk=; b=dBXp77OO3G2OBODmbrN1zJmBJpm38/eg832SJ5bQrU+/t6NgNY3ldIri4TzJ+ILsbMUaxTgwfuCUBDg/8oM8hWegutbT+B6t3dYFTSbYR26o6kG5OVFeovsEWd9zUIEmzNczEB8hjbbcfAc/nAXdyXiTWC1UiSMzyeOJvaC9lNE= Received: from DB3PR08CA0001.eurprd08.prod.outlook.com (2603:10a6:8::14) by DBBPR08MB4823.eurprd08.prod.outlook.com (2603:10a6:10:df::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4669.13; Wed, 10 Nov 2021 10:56:06 +0000 Received: from DB5EUR03FT043.eop-EUR03.prod.protection.outlook.com (2603:10a6:8:0:cafe::e4) by DB3PR08CA0001.outlook.office365.com (2603:10a6:8::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4690.15 via Frontend Transport; Wed, 10 Nov 2021 10:56:06 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; Received: from nebula.arm.com (40.67.248.234) by DB5EUR03FT043.mail.protection.outlook.com (10.152.20.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4649.14 via Frontend Transport; Wed, 10 Nov 2021 10:56:06 +0000 Received: from AZ-NEU-EX03.Arm.com (10.251.24.31) by AZ-NEU-EX03.Arm.com (10.251.24.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.14; Wed, 10 Nov 2021 10:55:26 +0000 Received: from E114225.Arm.com (10.1.196.43) by mail.arm.com (10.251.24.31) with Microsoft SMTP Server id 15.1.2308.14 via Frontend Transport; Wed, 10 Nov 2021 10:55:25 +0000 From: "Sami Mujawar" To: CC: Sami Mujawar , , , , , , , , , , , , , , Subject: [PATCH v3 1/8] MdePkg: IORT header update for IORT Rev E.b spec Date: Wed, 10 Nov 2021 10:55:25 +0000 Message-ID: <20211110105532.38696-2-sami.mujawar@arm.com> X-Mailer: git-send-email 2.16.2.windows.1 In-Reply-To: <20211110105532.38696-1-sami.mujawar@arm.com> References: <20211110105532.38696-1-sami.mujawar@arm.com> MIME-Version: 1.0 X-EOPAttributedMessage: 1 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: f85c684e-0905-4ab4-eefb-08d9a438b79e X-MS-TrafficTypeDiagnostic: DBBPR08MB4823:|AM0PR08MB3730: X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true NoDisclaimer: true X-MS-Oob-TLC-OOBClassifiers: OLM:8882;OLM:8882; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:nebula.arm.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(4636009)(36840700001)(46966006)(2906002)(2616005)(426003)(44832011)(54906003)(70586007)(356005)(186003)(26005)(36756003)(83380400001)(81166007)(336012)(4326008)(5660300002)(7696005)(316002)(8936002)(47076005)(15650500001)(1076003)(508600001)(6916009)(36860700001)(70206006)(8676002)(86362001)(82310400003)(966005)(36900700001);DIR:OUT;SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4823 Return-Path: Sami.Mujawar@arm.com X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT039.eop-EUR03.prod.protection.outlook.com X-MS-Office365-Filtering-Correlation-Id-Prvs: f972ddb2-faa3-4ccd-2927-08d9a438b236 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123;CTRY:IE;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:64aa7808-outbound-1.mta.getcheckrecipient.com;PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com;CAT:NONE;SFS:(4636009)(36840700001)(46966006)(8676002)(186003)(70206006)(70586007)(54906003)(8936002)(1076003)(5660300002)(47076005)(316002)(81166007)(83380400001)(2906002)(26005)(82310400003)(86362001)(36860700001)(15650500001)(336012)(966005)(36756003)(508600001)(426003)(44832011)(2616005)(7696005)(4326008)(6916009);DIR:OUT;SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Nov 2021 10:56:15.4876 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f85c684e-0905-4ab4-eefb-08d9a438b79e X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d;Ip=[63.35.35.123];Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT039.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3730 Content-Type: text/plain Bugzilla: 3458 - Add support IORT Rev E.b specification updates (https://bugzilla.tianocore.org/show_bug.cgi?id=3458) The IO Remapping Table, Platform Design Document, Revision E.b, Feb 2021 (https://developer.arm.com/documentation/den0049/) introduces the following updates, collectively including the updates and errata fixes to Rev E and Rev E.a: - increments the IORT table revision to 3. - updates the node definition to add an 'Identifier' field. - adds definition of node type 6 - Reserved Memory Range node. - adds definition for Memory Range Descriptors. - adds flag to indicate PRI support for root complexes. - adds flag to indicate if the root complex supports forwarding of PASID information on translated transactions to the SMMU. Therefore, update the IORT header file to reflect these changes, and also rename the EFI_ACPI_IO_REMAPPING_TABLE_REVISION macro to EFI_ACPI_IO_REMAPPING_TABLE_REV0. Signed-off-by: Sami Mujawar Reviewed-by: Zhichao Gao --- Notes: v2: - Set EFI_ACPI_IO_REMAPPING_TABLE_REVISION to Rev 0 as [SAMI] setting to Rev 3 will break existing platforms. The problem is that existing code would not be populating the Identifier field in the nodes. This can lead to non-unique values in the Identifier field. v3: - Submit patch series to update platform code to use the [LIMING] EFI_ACPI_IO_REMAPPING_TABLE_REV0 macro. Ref: https://edk2.groups.io/g/devel/topic/83618423#76799 - Removed definition of EFI_ACPI_IO_REMAPPING_TABLE_REVISION [SAMI] as EFI_ACPI_IO_REMAPPING_TABLE_REV0 has been provided for representing Rev 0. Also, a corresponding patch series for updating the platforms in edk2-platforms repository shall be submitted to the edk2 mailing list. - Include r-b received from v2 series. [SAMI] Ref: https://edk2.groups.io/g/devel/topic/83600724#76660 MdePkg/Include/IndustryStandard/IoRemappingTable.h | 66 +++++++++++++++++--- 1 file changed, 59 insertions(+), 7 deletions(-) diff --git a/MdePkg/Include/IndustryStandard/IoRemappingTable.h b/MdePkg/Include/IndustryStandard/IoRemappingTable.h index 90504e3a6715be7facc6450c6ff0e1eab92cd3c7..e80164a07f4d561cd85994b4f785e76f2eab4586 100644 --- a/MdePkg/Include/IndustryStandard/IoRemappingTable.h +++ b/MdePkg/Include/IndustryStandard/IoRemappingTable.h @@ -1,12 +1,19 @@ /** @file - ACPI IO Remapping Table (IORT) as specified in ARM spec DEN0049D - - http://infocenter.arm.com/help/topic/com.arm.doc.den0049d/DEN0049D_IO_Remapping_Table.pdf + ACPI IO Remapping Table (IORT) definitions. Copyright (c) 2017, Linaro Limited. All rights reserved.
- Copyright (c) 2018, ARM Limited. All rights reserved.
+ Copyright (c) 2018 - 2021, Arm Limited. All rights reserved.
SPDX-License-Identifier: BSD-2-Clause-Patent + + @par Reference(s): + - IO Remapping Table, Platform Design Document, Revision E.b, Feb 2021 + (https://developer.arm.com/documentation/den0049/) + + @par Glossary: + - Ref : Reference + - Mem : Memory + - Desc : Descriptor **/ #ifndef __IO_REMAPPING_TABLE_H__ @@ -14,7 +21,8 @@ #include -#define EFI_ACPI_IO_REMAPPING_TABLE_REVISION 0x0 +#define EFI_ACPI_IO_REMAPPING_TABLE_REV0 0x0 +#define EFI_ACPI_IO_REMAPPING_TABLE_REV3 0x3 #define EFI_ACPI_IORT_TYPE_ITS_GROUP 0x0 #define EFI_ACPI_IORT_TYPE_NAMED_COMP 0x1 @@ -22,6 +30,7 @@ #define EFI_ACPI_IORT_TYPE_SMMUv1v2 0x3 #define EFI_ACPI_IORT_TYPE_SMMUv3 0x4 #define EFI_ACPI_IORT_TYPE_PMCG 0x5 +#define EFI_ACPI_IORT_TYPE_RMR 0x6 #define EFI_ACPI_IORT_MEM_ACCESS_PROP_CCA BIT0 @@ -55,7 +64,16 @@ #define EFI_ACPI_IORT_SMMUv3_MODEL_CAVIUM_CN99XX 0x2 #define EFI_ACPI_IORT_ROOT_COMPLEX_ATS_UNSUPPORTED 0x0 -#define EFI_ACPI_IORT_ROOT_COMPLEX_ATS_SUPPORTED 0x1 +#define EFI_ACPI_IORT_ROOT_COMPLEX_ATS_SUPPORTED BIT0 + +#define EFI_ACPI_IORT_ROOT_COMPLEX_PRI_UNSUPPORTED 0x0 +#define EFI_ACPI_IORT_ROOT_COMPLEX_PRI_SUPPORTED BIT1 + +#define EFI_ACPI_IORT_ROOT_COMPLEX_PASID_FWD_UNSUPPORTED 0x0 +#define EFI_ACPI_IORT_ROOT_COMPLEX_PASID_FWD_SUPPORTED BIT2 + +#define EFI_ACPI_IORT_RMR_REMAP_NOT_PERMITTED 0x0 +#define EFI_ACPI_IORT_RMR_REMAP_PERMITTED BIT0 #define EFI_ACPI_IORT_ID_MAPPING_FLAGS_SINGLE BIT0 @@ -89,7 +107,7 @@ typedef struct { UINT8 Type; UINT16 Length; UINT8 Revision; - UINT32 Reserved; + UINT32 Identifier; UINT32 NumIdMappings; UINT32 IdReference; } EFI_ACPI_6_0_IO_REMAPPING_NODE; @@ -198,6 +216,40 @@ typedef struct { //EFI_ACPI_6_0_IO_REMAPPING_ID_TABLE OverflowInterruptMsiMapping[1]; } EFI_ACPI_6_0_IO_REMAPPING_PMCG_NODE; +/// +/// Memory Range Descriptor. +/// +typedef struct { + /// Base address of Reserved Memory Range, + /// aligned to a page size of 64K. + UINT64 Base; + + /// Length of the Reserved Memory range. + /// Must be a multiple of the page size of 64K. + UINT64 Length; + + /// Reserved, must be zero. + UINT32 Reserved; +} EFI_ACPI_6_0_IO_REMAPPING_MEM_RANGE_DESC; + +/// +/// Node type 6: Reserved Memory Range (RMR) node +/// +typedef struct { + EFI_ACPI_6_0_IO_REMAPPING_NODE Node; + + /// RMR flags + UINT32 Flags; + + /// Memory range descriptor count. + UINT32 NumMemRangeDesc; + + /// Offset of the memory range descriptor array. + UINT32 MemRangeDescRef; +// EFI_ACPI_6_0_IO_REMAPPING_ID_TABLE IdMapping[1]; +// EFI_ACPI_6_0_IO_REMAPPING_MEM_RANGE_DESC MemRangeDesc[1]; +} EFI_ACPI_6_0_IO_REMAPPING_RMR_NODE; + #pragma pack() #endif -- 'Guid(CE165669-3EF3-493F-B85D-6190EE5B9759)'