public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Chang, Abner" <abner.chang@amd.com>
To: "Attar, AbdulLateef (Abdul Lateef)" <AbdulLateef.Attar@amd.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: "Attar, AbdulLateef (Abdul Lateef)" <AbdulLateef.Attar@amd.com>,
	"Kirkendall, Garrett" <Garrett.Kirkendall@amd.com>,
	"Grimes, Paul" <Paul.Grimes@amd.com>,
	Eric Dong <eric.dong@intel.com>, Ray Ni <ray.ni@intel.com>,
	Rahul Kumar <rahul1.kumar@intel.com>
Subject: Re: [PATCH v1 1/5] UefiCpuPkg/SmmCpuFeaturesLib: Restructure arch-dependent code
Date: Wed, 7 Dec 2022 15:57:28 +0000	[thread overview]
Message-ID: <MN2PR12MB396685A24BB3A1D10DFC5360EA1A9@MN2PR12MB3966.namprd12.prod.outlook.com> (raw)
In-Reply-To: <4c6e06ace12701059f409fc146c227cc28c5ca6b.1670332633.git.abdattar@amd.com>

[AMD Official Use Only - General]

Reviewed-by: Abner Chang <abner.chang@amd.com>

> -----Original Message-----
> From: Abdul Lateef Attar <abdattar@amd.com>
> Sent: Tuesday, December 6, 2022 9:23 PM
> To: devel@edk2.groups.io
> Cc: Attar, AbdulLateef (Abdul Lateef) <AbdulLateef.Attar@amd.com>; Chang,
> Abner <Abner.Chang@amd.com>; Kirkendall, Garrett
> <Garrett.Kirkendall@amd.com>; Grimes, Paul <Paul.Grimes@amd.com>; Eric
> Dong <eric.dong@intel.com>; Ray Ni <ray.ni@intel.com>; Rahul Kumar
> <rahul1.kumar@intel.com>
> Subject: [PATCH v1 1/5] UefiCpuPkg/SmmCpuFeaturesLib: Restructure arch-
> dependent code
> 
> From: Abdul Lateef Attar <AbdulLateef.Attar@amd.com>
> 
> BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=4182
> 
> moves Intel-specific code to the arch-dependent file.
> Other processor families might have different implementation of these
> functions.
> Hence, moving out of the common file.
> 
> Cc: Abner Chang <abner.chang@amd.com>
> Cc: Garrett Kirkendall <garrett.kirkendall@amd.com>
> Cc: Paul Grimes <paul.grimes@amd.com>
> Cc: Eric Dong <eric.dong@intel.com>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Rahul Kumar <rahul1.kumar@intel.com>
> Signed-off-by: Abdul Lateef Attar <AbdulLateef.Attar@amd.com>
> ---
>  .../IntelSmmCpuFeaturesLib.c                  | 140 ++++++++++++++++++
>  .../SmmCpuFeaturesLibCommon.c                 | 140 ------------------
>  2 files changed, 140 insertions(+), 140 deletions(-)
> 
> diff --git
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> index d5eaaa7a991e..994267f393b3 100644
> --- a/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> +++ b/UefiCpuPkg/Library/SmmCpuFeaturesLib/IntelSmmCpuFeaturesLib.c
> @@ -400,3 +400,143 @@ SmmCpuFeaturesSetSmmRegister (
>      AsmWriteMsr64 (SMM_FEATURES_LIB_SMM_FEATURE_CONTROL,
> Value);   } }++/**+  This function updates the SMRAM save state on the
> currently executing CPU+  to resume execution at a specific address after an
> RSM instruction.  This+  function must evaluate the SMRAM save state to
> determine the execution mode+  the RSM instruction resumes and update
> the resume execution address with+  either NewInstructionPointer32 or
> NewInstructionPoint.  The auto HALT restart+  flag in the SMRAM save state
> must always be cleared.  This function returns+  the value of the instruction
> pointer from the SMRAM save state that was+  replaced.  If this function
> returns 0, then the SMRAM save state was not+  modified.++  This function is
> called during the very first SMI on each CPU after+
> SmmCpuFeaturesInitializeProcessor() to set a flag in normal execution
> mode+  to signal that the SMBASE of each CPU has been updated before the
> default+  SMBASE address is used for the first SMI to the next CPU.++
> @param[in] CpuIndex                 The index of the CPU to hook.  The value+
> must be between 0 and the NumberOfCpus+                                      field in the
> System Management System Table+                                      (SMST).+  @param[in]
> CpuState                 Pointer to SMRAM Save State Map for the+
> currently executing CPU.+  @param[in] NewInstructionPointer32  Instruction
> pointer to use if resuming to+                                      32-bit execution mode from
> 64-bit SMM.+  @param[in] NewInstructionPointer    Instruction pointer to
> use if resuming to+                                      same execution mode as SMM.++
> @retval 0    This function did modify the SMRAM save state.+  @retval > 0
> The original instruction pointer value from the SMRAM save state+
> before it was
> replaced.+**/+UINT64+EFIAPI+SmmCpuFeaturesHookReturnFromSmm (+
> IN UINTN                 CpuIndex,+  IN SMRAM_SAVE_STATE_MAP  *CpuState,+
> IN UINT64                NewInstructionPointer32,+  IN UINT64
> NewInstructionPointer+  )+{+  return 0;+}++/**+  Read an SMM Save State
> register on the target processor.  If this function+  returns
> EFI_UNSUPPORTED, then the caller is responsible for reading the+  SMM
> Save Sate register.++  @param[in]  CpuIndex  The index of the CPU to read
> the SMM Save State.  The+                        value must be between 0 and the
> NumberOfCpus field in+                        the System Management System Table
> (SMST).+  @param[in]  Register  The SMM Save State register to read.+
> @param[in]  Width     The number of bytes to read from the CPU save state.+
> @param[out] Buffer    Upon return, this holds the CPU register value read+
> from the save state.++  @retval EFI_SUCCESS           The register was read
> from Save State.+  @retval EFI_INVALID_PARAMETER  Buffer is NULL.+
> @retval EFI_UNSUPPORTED       This function does not support reading
> Register.++**/+EFI_STATUS+EFIAPI+SmmCpuFeaturesReadSaveStateRegist
> er (+  IN  UINTN                        CpuIndex,+  IN
> EFI_SMM_SAVE_STATE_REGISTER  Register,+  IN  UINTN                        Width,+
> OUT VOID                         *Buffer+  )+{+  return EFI_UNSUPPORTED;+}++/**+
> Writes an SMM Save State register on the target processor.  If this function+
> returns EFI_UNSUPPORTED, then the caller is responsible for writing the+
> SMM Save Sate register.++  @param[in] CpuIndex  The index of the CPU to
> write the SMM Save State.  The+                       value must be between 0 and
> the NumberOfCpus field in+                       the System Management System
> Table (SMST).+  @param[in] Register  The SMM Save State register to write.+
> @param[in] Width     The number of bytes to write to the CPU save state.+
> @param[in] Buffer    Upon entry, this holds the new CPU register value.++
> @retval EFI_SUCCESS           The register was written to Save State.+  @retval
> EFI_INVALID_PARAMETER  Buffer is NULL.+  @retval EFI_UNSUPPORTED
> This function does not support writing
> Register.+**/+EFI_STATUS+EFIAPI+SmmCpuFeaturesWriteSaveStateRegiste
> r (+  IN UINTN                        CpuIndex,+  IN EFI_SMM_SAVE_STATE_REGISTER
> Register,+  IN UINTN                        Width,+  IN CONST VOID
> *Buffer+  )+{+  return EFI_UNSUPPORTED;+}++/**+  Check to see if an SMM
> register is supported by a specified CPU.++  @param[in] CpuIndex  The index
> of the CPU to check for SMM register support.+                       The value must
> be between 0 and the NumberOfCpus field+                       in the System
> Management System Table (SMST).+  @param[in] RegName   Identifies the
> SMM register to check for support.++  @retval TRUE   The SMM register
> specified by RegName is supported by the CPU+                 specified by
> CpuIndex.+  @retval FALSE  The SMM register specified by RegName is not
> supported by the+                 CPU specified by
> CpuIndex.+**/+BOOLEAN+EFIAPI+SmmCpuFeaturesIsSmmRegisterSupport
> ed (+  IN UINTN         CpuIndex,+  IN SMM_REG_NAME  RegName+  )+{+  if
> (FeaturePcdGet (PcdSmmFeatureControlEnable) && (RegName ==
> SmmRegFeatureControl)) {+    return TRUE;+  }++  return FALSE;+}++/**+
> This function is hook point called after the
> gEfiSmmReadyToLockProtocolGuid+  notification is completely
> processed.+**/+VOID+EFIAPI+SmmCpuFeaturesCompleteSmmReadyToLoc
> k (+  VOID+  )+{+}diff --git
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
> index 7777e52740eb..2f8841bbbf77 100644
> ---
> a/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
> +++
> b/UefiCpuPkg/Library/SmmCpuFeaturesLib/SmmCpuFeaturesLibCommon.c
> @@ -17,49 +17,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
>   #include "CpuFeaturesLib.h" -/**-  This function updates the SMRAM save
> state on the currently executing CPU-  to resume execution at a specific
> address after an RSM instruction.  This-  function must evaluate the SMRAM
> save state to determine the execution mode-  the RSM instruction resumes
> and update the resume execution address with-  either
> NewInstructionPointer32 or NewInstructionPoint.  The auto HALT restart-
> flag in the SMRAM save state must always be cleared.  This function returns-
> the value of the instruction pointer from the SMRAM save state that was-
> replaced.  If this function returns 0, then the SMRAM save state was not-
> modified.--  This function is called during the very first SMI on each CPU
> after-  SmmCpuFeaturesInitializeProcessor() to set a flag in normal execution
> mode-  to signal that the SMBASE of each CPU has been updated before the
> default-  SMBASE address is used for the first SMI to the next CPU.--
> @param[in] CpuIndex                 The index of the CPU to hook.  The value-
> must be between 0 and the NumberOfCpus-                                      field in the
> System Management System Table-                                      (SMST).-  @param[in]
> CpuState                 Pointer to SMRAM Save State Map for the-
> currently executing CPU.-  @param[in] NewInstructionPointer32  Instruction
> pointer to use if resuming to-                                      32-bit execution mode from
> 64-bit SMM.-  @param[in] NewInstructionPointer    Instruction pointer to use
> if resuming to-                                      same execution mode as SMM.--  @retval 0
> This function did modify the SMRAM save state.-  @retval > 0  The original
> instruction pointer value from the SMRAM save state-               before it was
> replaced.-**/-UINT64-EFIAPI-SmmCpuFeaturesHookReturnFromSmm (-  IN
> UINTN                 CpuIndex,-  IN SMRAM_SAVE_STATE_MAP  *CpuState,-  IN
> UINT64                NewInstructionPointer32,-  IN UINT64
> NewInstructionPointer-  )-{-  return 0;-}- /**   Hook point in normal execution
> mode that allows the one CPU that was elected   as monarch during System
> Management Mode initialization to perform additional@@ -90,103 +47,6 @@
> SmmCpuFeaturesRendezvousExit (
>  { } -/**-  Check to see if an SMM register is supported by a specified CPU.--
> @param[in] CpuIndex  The index of the CPU to check for SMM register
> support.-                       The value must be between 0 and the NumberOfCpus
> field-                       in the System Management System Table (SMST).-
> @param[in] RegName   Identifies the SMM register to check for support.--
> @retval TRUE   The SMM register specified by RegName is supported by the
> CPU-                 specified by CpuIndex.-  @retval FALSE  The SMM register
> specified by RegName is not supported by the-                 CPU specified by
> CpuIndex.-**/-BOOLEAN-EFIAPI-SmmCpuFeaturesIsSmmRegisterSupported
> (-  IN UINTN         CpuIndex,-  IN SMM_REG_NAME  RegName-  )-{-  if
> (FeaturePcdGet (PcdSmmFeatureControlEnable) && (RegName ==
> SmmRegFeatureControl)) {-    return TRUE;-  }--  return FALSE;-}--/**-  Read
> an SMM Save State register on the target processor.  If this function-  returns
> EFI_UNSUPPORTED, then the caller is responsible for reading the-  SMM
> Save Sate register.--  @param[in]  CpuIndex  The index of the CPU to read
> the SMM Save State.  The-                        value must be between 0 and the
> NumberOfCpus field in-                        the System Management System Table
> (SMST).-  @param[in]  Register  The SMM Save State register to read.-
> @param[in]  Width     The number of bytes to read from the CPU save state.-
> @param[out] Buffer    Upon return, this holds the CPU register value read-
> from the save state.--  @retval EFI_SUCCESS           The register was read from
> Save State.-  @retval EFI_INVALID_PARAMETER  Buffer is NULL.-  @retval
> EFI_UNSUPPORTED       This function does not support reading Register.--**/-
> EFI_STATUS-EFIAPI-SmmCpuFeaturesReadSaveStateRegister (-  IN  UINTN
> CpuIndex,-  IN  EFI_SMM_SAVE_STATE_REGISTER  Register,-  IN  UINTN
> Width,-  OUT VOID                         *Buffer-  )-{-  return EFI_UNSUPPORTED;-}--
> /**-  Writes an SMM Save State register on the target processor.  If this
> function-  returns EFI_UNSUPPORTED, then the caller is responsible for
> writing the-  SMM Save Sate register.--  @param[in] CpuIndex  The index of
> the CPU to write the SMM Save State.  The-                       value must be
> between 0 and the NumberOfCpus field in-                       the System
> Management System Table (SMST).-  @param[in] Register  The SMM Save
> State register to write.-  @param[in] Width     The number of bytes to write
> to the CPU save state.-  @param[in] Buffer    Upon entry, this holds the new
> CPU register value.--  @retval EFI_SUCCESS           The register was written to
> Save State.-  @retval EFI_INVALID_PARAMETER  Buffer is NULL.-  @retval
> EFI_UNSUPPORTED       This function does not support writing Register.-**/-
> EFI_STATUS-EFIAPI-SmmCpuFeaturesWriteSaveStateRegister (-  IN UINTN
> CpuIndex,-  IN EFI_SMM_SAVE_STATE_REGISTER  Register,-  IN UINTN
> Width,-  IN CONST VOID                   *Buffer-  )-{-  return EFI_UNSUPPORTED;-}-
> -/**-  This function is hook point called after the
> gEfiSmmReadyToLockProtocolGuid-  notification is completely processed.-
> **/-VOID-EFIAPI-SmmCpuFeaturesCompleteSmmReadyToLock (-  VOID-  )-{-
> }- /**   This API provides a method for a CPU to allocate a specific region for
> storing page tables. --
> 2.25.1

  reply	other threads:[~2022-12-07 15:57 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-12-06 13:23 [PATCH v1 0/5] Adds AmdSmmCpuFeaturesLib Abdul Lateef Attar
2022-12-06 13:23 ` [PATCH v1 1/5] UefiCpuPkg/SmmCpuFeaturesLib: Restructure arch-dependent code Abdul Lateef Attar
2022-12-07 15:57   ` Chang, Abner [this message]
2022-12-06 13:23 ` [PATCH v1 2/5] MdePkg: Adds AMD SMRAM save state map Abdul Lateef Attar
2022-12-07 16:17   ` [edk2-devel] " Chang, Abner
2022-12-06 13:23 ` [PATCH v1 3/5] UefiCpuPkg: Initial implementation of AMD's SmmCpuFeaturesLib Abdul Lateef Attar
2022-12-08  4:06   ` [edk2-devel] " Chang, Abner
2022-12-06 13:23 ` [PATCH v1 4/5] UefiCpuPkg: Implements SmmCpuFeaturesLib for AMD Family Abdul Lateef Attar
2022-12-08  5:07   ` [edk2-devel] " Chang, Abner
2022-12-12  9:13     ` Attar, AbdulLateef (Abdul Lateef)
2022-12-06 13:23 ` [PATCH v1 5/5] UefiCpuPkg/AmdSmmCpuFeaturesLib: Handles S3 save state Abdul Lateef Attar
2022-12-08  5:46   ` [edk2-devel] " Chang, Abner
2022-12-12  9:16     ` Attar, AbdulLateef (Abdul Lateef)

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=MN2PR12MB396685A24BB3A1D10DFC5360EA1A9@MN2PR12MB3966.namprd12.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox