public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Xing, Eric via groups.io" <eric.xing=amd.com@groups.io>
To: "Chang, Abner" <Abner.Chang@amd.com>,
	"Attar, AbdulLateef (Abdul Lateef)" <AbdulLateef.Attar@amd.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>,
	"Zhai, MingXin (Duke)" <duke.zhai@amd.com>
Cc: "Fu, Igniculus" <Igniculus.Fu@amd.com>
Subject: Re: [edk2-devel] [PATCH 29/33] AMD/VanGoghBoard: Check in SmramSaveState module.
Date: Tue, 23 Jan 2024 10:27:40 +0000	[thread overview]
Message-ID: <PH0PR12MB56311452D39A0FC2AC93EE6AF6742@PH0PR12MB5631.namprd12.prod.outlook.com> (raw)
In-Reply-To: <LV8PR12MB94528FC356121493929C21DDEA742@LV8PR12MB9452.namprd12.prod.outlook.com>

[AMD Official Use Only - General]

Hi Abner and Abdul,
Thanks for the review, it is good catch.
Currently, our current override files are based on UDK202208 code base now. AmdMmSaveStateLib.inf  is not existed in UDK2208 code base, we will leverage latest EDK2 changes after we update to new EDK2 code base.

Thanks,
Eric

> -----Original Message-----
> From: Chang, Abner <Abner.Chang@amd.com>
> Sent: Tuesday, January 23, 2024 1:16 PM
> To: Attar, AbdulLateef (Abdul Lateef) <AbdulLateef.Attar@amd.com>;
> devel@edk2.groups.io; Zhai, MingXin (Duke) <duke.zhai@amd.com>
> Cc: Xing, Eric <Eric.Xing@amd.com>; Fu, Igniculus <Igniculus.Fu@amd.com>
> Subject: RE: [edk2-devel] [PATCH 29/33] AMD/VanGoghBoard: Check in
> SmramSaveState module.
>
> [AMD Official Use Only - General]
>
> Yeah, please check if AMD specific SaveStatelib library under
> UefiCpuPkg/Library/MmSaveStateLib can cover the change or not.
>
> Thanks
> Abner
>
> > -----Original Message-----
> > From: Attar, AbdulLateef (Abdul Lateef) <AbdulLateef.Attar@amd.com>
> > Sent: Saturday, January 20, 2024 10:38 PM
> > To: devel@edk2.groups.io; Zhai, MingXin (Duke) <duke.zhai@amd.com>
> > Cc: Xing, Eric <Eric.Xing@amd.com>; Fu, Igniculus
> > <Igniculus.Fu@amd.com>; Chang, Abner <Abner.Chang@amd.com>
> > Subject: RE: [edk2-devel] [PATCH 29/33] AMD/VanGoghBoard: Check in
> > SmramSaveState module.
> >
> > [AMD Official Use Only - General]
> >
> > Why overriding the PiSmmCpuDxeSmm driver?
> > UefiCpuPkg has AMD specific SaveStatelib library
> > "UefiCpuPkg/Library/MmSaveStateLib/AmdMmSaveStateLib.inf".
> >
> > Thanks
> > AbduL
> >
> > -----Original Message-----
> > From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of
> > duke.zhai via groups.io
> > Sent: Thursday, January 18, 2024 12:21 PM
> > To: devel@edk2.groups.io
> > Cc: Xing, Eric <Eric.Xing@amd.com>; Zhai, MingXin (Duke)
> > <duke.zhai@amd.com>; Fu, Igniculus <Igniculus.Fu@amd.com>; Chang,
> > Abner <Abner.Chang@amd.com>
> > Subject: [edk2-devel] [PATCH 29/33] AMD/VanGoghBoard: Check in
> > SmramSaveState module.
> >
> > Caution: This message originated from an External Source. Use proper
> > caution when opening attachments, clicking links, or responding.
> >
> >
> > From: Duke Zhai <Duke.Zhai@amd.com>
> >
> >
> > BZ #:4640
> >
> > Initial SmramSaveState module.
> >
> > This module provides services to access SMRAM Save State Map.
> >
> >
> >
> > Signed-off-by: Ken Yao <ken.yao@amd.com>
> >
> > Cc: Eric Xing <eric.xing@amd.com>
> >
> > Cc: Duke Zhai <duke.zhai@amd.com>
> >
> > Cc: Igniculus Fu <igniculus.fu@amd.com>
> >
> > Cc: Abner Chang <abner.chang@amd.com>
> >
> > ---
> >
> >  .../PiSmmCpuDxeSmm/SmramSaveState.c           | 715
> > ++++++++++++++++++
> >
> >  1 file changed, 715 insertions(+)
> >
> >  create mode 100644
> >
> Platform/AMD/VanGoghBoard/Override/edk2/UefiCpuPkg/PiSmmCpuDxeS
> m
> > m/SmramSaveState.c
> >
> >
> >
> > diff --git
> >
> a/Platform/AMD/VanGoghBoard/Override/edk2/UefiCpuPkg/PiSmmCpuDxe
> > Smm/SmramSaveState.c
> >
> b/Platform/AMD/VanGoghBoard/Override/edk2/UefiCpuPkg/PiSmmCpuDxe
> > Smm/SmramSaveState.c
> >
> > new file mode 100644
> >
> > index 0000000000..9e5a7d59fc
> >
> > --- /dev/null
> >
> > +++
> >
> b/Platform/AMD/VanGoghBoard/Override/edk2/UefiCpuPkg/PiSmmCpuDxe
> > Smm/SmramSaveState.c
> >
> > @@ -0,0 +1,715 @@
> >
> > +/** @file
> >
> > +  Implements SmramSaveState.c
> >
> > +
> >
> > +  Copyright (C) 2024 Advanced Micro Devices, Inc. All rights
> > + reserved.<BR>
> >
> > +  SPDX-License-Identifier: BSD-2-Clause-Patent
> >
> > +
> >
> > +**/
> >
> > +
> >
> > +/* This file includes code originally published under the following
> > +license. */
> >
> > +
> >
> > +/** @file
> >
> > +Provides services to access SMRAM Save State Map
> >
> > +
> >
> > +Copyright (c) 2010 - 2019, Intel Corporation. All rights
> > +reserved.<BR>
> >
> > +SPDX-License-Identifier: BSD-2-Clause-Patent
> >
> > +
> >
> > +**/
> >
> > +
> >
> > +#include <PiSmm.h>
> >
> > +
> >
> > +#include <Library/SmmCpuFeaturesLib.h>
> >
> > +
> >
> > +#include <Library/BaseLib.h>
> >
> > +#include <Library/BaseMemoryLib.h>
> >
> > +#include <Library/SmmServicesTableLib.h>
> >
> > +#include <Library/DebugLib.h>
> >
> > +
> >
> > +#include "PiSmmCpuDxeSmm.h"
> >
> > +
> >
> > +typedef struct {
> >
> > +  UINT64    Signature;                                      // Offset 0x00
> >
> > +  UINT16    Reserved1;                                      // Offset 0x08
> >
> > +  UINT16    Reserved2;                                      // Offset 0x0A
> >
> > +  UINT16    Reserved3;                                      // Offset 0x0C
> >
> > +  UINT16    SmmCs;                                          // Offset 0x0E
> >
> > +  UINT16    SmmDs;                                          // Offset 0x10
> >
> > +  UINT16    SmmSs;                                          // Offset 0x12
> >
> > +  UINT16    SmmOtherSegment;                                // Offset 0x14
> >
> > +  UINT16    Reserved4;                                      // Offset 0x16
> >
> > +  UINT64    Reserved5;                                      // Offset 0x18
> >
> > +  UINT64    Reserved6;                                      // Offset 0x20
> >
> > +  UINT64    Reserved7;                                      // Offset 0x28
> >
> > +  UINT64    SmmGdtPtr;                                      // Offset 0x30
> >
> > +  UINT32    SmmGdtSize;                                     // Offset 0x38
> >
> > +  UINT32    Reserved8;                                      // Offset 0x3C
> >
> > +  UINT64    Reserved9;                                      // Offset 0x40
> >
> > +  UINT64    Reserved10;                                     // Offset 0x48
> >
> > +  UINT16    Reserved11;                                     // Offset 0x50
> >
> > +  UINT16    Reserved12;                                     // Offset 0x52
> >
> > +  UINT32    Reserved13;                                     // Offset 0x54
> >
> > +  UINT64    Reserved14;                                     // Offset 0x58
> >
> > +} PROCESSOR_SMM_DESCRIPTOR;
> >
> > +
> >
> > +extern CONST PROCESSOR_SMM_DESCRIPTOR  gcPsd;
> >
> > +
> >
> > +//
> >
> > +// EFER register LMA bit
> >
> > +//
> >
> > +#define LMA  BIT10
> >
> > +
> >
> > +///
> >
> > +/// Macro used to simplify the lookup table entries of type
> > CPU_SMM_SAVE_STATE_LOOKUP_ENTRY
> >
> > +///
> >
> > +#define SMM_CPU_OFFSET(Field)  OFFSET_OF
> (SMRAM_SAVE_STATE_MAP,
> > Field)
> >
> > +
> >
> > +///
> >
> > +/// Macro used to simplify the lookup table entries of type
> > CPU_SMM_SAVE_STATE_REGISTER_RANGE
> >
> > +///
> >
> > +#define SMM_REGISTER_RANGE(Start, End)  { Start, End, End - Start + 1
> > +}
> >
> > +
> >
> > +///
> >
> > +/// Structure used to describe a range of registers
> >
> > +///
> >
> > +typedef struct {
> >
> > +  EFI_SMM_SAVE_STATE_REGISTER    Start;
> >
> > +  EFI_SMM_SAVE_STATE_REGISTER    End;
> >
> > +  UINTN                          Length;
> >
> > +} CPU_SMM_SAVE_STATE_REGISTER_RANGE;
> >
> > +
> >
> > +///
> >
> > +/// Structure used to build a lookup table to retrieve the widths and
> > +offsets
> >
> > +/// associated with each supported EFI_SMM_SAVE_STATE_REGISTER
> value
> >
> > +///
> >
> > +
> >
> > +#define SMM_SAVE_STATE_REGISTER_SMMREVID_INDEX   1
> >
> > +#define SMM_SAVE_STATE_REGISTER_IOMISC_INDEX     2
> >
> > +#define SMM_SAVE_STATE_REGISTER_IOMEMADDR_INDEX  3
> >
> > +#define SMM_SAVE_STATE_REGISTER_MAX_INDEX        4
> >
> > +
> >
> > +typedef struct {
> >
> > +  UINT8      Width32;
> >
> > +  UINT8      Width64;
> >
> > +  UINT16     Offset32;
> >
> > +  UINT16     Offset64Lo;
> >
> > +  UINT16     Offset64Hi;
> >
> > +  BOOLEAN    Writeable;
> >
> > +} CPU_SMM_SAVE_STATE_LOOKUP_ENTRY;
> >
> > +
> >
> > +///
> >
> > +/// Structure used to build a lookup table for the IOMisc width
> > +information
> >
> > +///
> >
> > +typedef struct {
> >
> > +  UINT8                          Width;
> >
> > +  EFI_SMM_SAVE_STATE_IO_WIDTH    IoWidth;
> >
> > +} CPU_SMM_SAVE_STATE_IO_WIDTH;
> >
> > +
> >
> > +///
> >
> > +/// Variables from SMI Handler
> >
> > +///
> >
> > +X86_ASSEMBLY_PATCH_LABEL  gPatchSmbase;
> >
> > +X86_ASSEMBLY_PATCH_LABEL  gPatchSmiStack;
> >
> > +X86_ASSEMBLY_PATCH_LABEL  gPatchSmiCr3;
> >
> > +extern volatile UINT8     gcSmiHandlerTemplate[];
> >
> > +extern CONST UINT16       gcSmiHandlerSize;
> >
> > +
> >
> > +//
> >
> > +// Variables used by SMI Handler
> >
> > +//
> >
> > +IA32_DESCRIPTOR  gSmiHandlerIdtr;
> >
> > +
> >
> > +///
> >
> > +/// Table used by GetRegisterIndex() to convert an
> > EFI_SMM_SAVE_STATE_REGISTER
> >
> > +/// value to an index into a table of type
> > CPU_SMM_SAVE_STATE_LOOKUP_ENTRY
> >
> > +///
> >
> > +CONST CPU_SMM_SAVE_STATE_REGISTER_RANGE
> > mSmmCpuRegisterRanges[] = {
> >
> > +  SMM_REGISTER_RANGE (EFI_SMM_SAVE_STATE_REGISTER_GDTBASE,
> > EFI_SMM_SAVE_STATE_REGISTER_LDTINFO),
> >
> > +  SMM_REGISTER_RANGE (EFI_SMM_SAVE_STATE_REGISTER_ES,
> > EFI_SMM_SAVE_STATE_REGISTER_RIP),
> >
> > +  SMM_REGISTER_RANGE (EFI_SMM_SAVE_STATE_REGISTER_RFLAGS,
> > EFI_SMM_SAVE_STATE_REGISTER_CR4),
> >
> > +  { (EFI_SMM_SAVE_STATE_REGISTER)0,
> > (EFI_SMM_SAVE_STATE_REGISTER)0,      0}
> >
> > +};
> >
> > +
> >
> > +///
> >
> > +/// Lookup table used to retrieve the widths and offsets associated
> > +with each
> >
> > +/// supported EFI_SMM_SAVE_STATE_REGISTER value
> >
> > +///
> >
> > +CONST CPU_SMM_SAVE_STATE_LOOKUP_ENTRY  mSmmCpuWidthOffset[]
> =
> > {
> >
> > +  { 0, 0, 0,                            0,                                    0,
> FALSE },  //
> > Reserved
> >
> > +
> >
> > +  //
> >
> > +  // CPU Save State registers defined in PI SMM CPU Protocol.
> >
> > +  //
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64.GdtrBaseLoDword),
> > SMM_CPU_OFFSET (x64.GdtrBaseHiDword), FALSE },  //
> > EFI_SMM_SAVE_STATE_REGISTER_GDTBASE  = 4
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64.IdtrBaseLoDword),
> > SMM_CPU_OFFSET (x64.IdtrBaseHiDword), FALSE },  //
> > EFI_SMM_SAVE_STATE_REGISTER_IDTBASE  = 5
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64.LdtrBaseLoDword),
> > SMM_CPU_OFFSET (x64.LdtrBaseHiDword), FALSE },  //
> > EFI_SMM_SAVE_STATE_REGISTER_LDTBASE  = 6
> >
> > +  { 0, 0, 0,                            SMM_CPU_OFFSET (x64.GdtrLimit),       0,
> > FALSE },  //  EFI_SMM_SAVE_STATE_REGISTER_GDTLIMIT = 7
> >
> > +  { 0, 0, 0,                            SMM_CPU_OFFSET (x64.IdtrLimit),       0,
> > FALSE },  //  EFI_SMM_SAVE_STATE_REGISTER_IDTLIMIT = 8
> >
> > +  { 0, 0, 0,                            SMM_CPU_OFFSET (x64.LdtrLimit),       0,
> > FALSE },  //  EFI_SMM_SAVE_STATE_REGISTER_LDTLIMIT = 9
> >
> > +  { 0, 0, 0,                            0,                                    0,
> FALSE },  //
> > EFI_SMM_SAVE_STATE_REGISTER_LDTINFO  = 10
> >
> > +
> >
> > +  { 4, 4, SMM_CPU_OFFSET (x86._ES),     SMM_CPU_OFFSET (x64._ES),
> > 0,                                    FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_ES
> = 20
> >
> > +  { 4, 4, SMM_CPU_OFFSET (x86._CS),     SMM_CPU_OFFSET (x64._CS),
> > 0,                                    FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_CS
> = 21
> >
> > +  { 4, 4, SMM_CPU_OFFSET (x86._SS),     SMM_CPU_OFFSET (x64._SS),
> > 0,                                    FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_SS
> = 22
> >
> > +  { 4, 4, SMM_CPU_OFFSET (x86._DS),     SMM_CPU_OFFSET (x64._DS),
> > 0,                                    FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_DS
> = 23
> >
> > +  { 4, 4, SMM_CPU_OFFSET (x86._FS),     SMM_CPU_OFFSET (x64._FS),
> > 0,                                    FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_FS
> = 24
> >
> > +  { 4, 4, SMM_CPU_OFFSET (x86._GS),     SMM_CPU_OFFSET (x64._GS),
> > 0,                                    FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_GS
> = 25
> >
> > +  { 0, 4, 0,                            SMM_CPU_OFFSET (x64.LdtrSelector),    0,
> > FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_LDTR_SEL = 26
> >
> > +  { 4, 4, SMM_CPU_OFFSET (x86._TR),     SMM_CPU_OFFSET
> (x64.TrSelector),
> > 0,                                    FALSE }, //
> EFI_SMM_SAVE_STATE_REGISTER_TR_SEL   =
> > 27
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._DR7),    SMM_CPU_OFFSET (x64._DR7),
> > SMM_CPU_OFFSET (x64._DR7)    + 4,     FALSE }, //
> > EFI_SMM_SAVE_STATE_REGISTER_DR7      = 28
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._DR6),    SMM_CPU_OFFSET (x64._DR6),
> > SMM_CPU_OFFSET (x64._DR6)    + 4,     FALSE }, //
> > EFI_SMM_SAVE_STATE_REGISTER_DR6      = 29
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R8),
> > SMM_CPU_OFFSET (x64._R8)     + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R8       = 30
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R9),
> > SMM_CPU_OFFSET (x64._R9)     + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R9       = 31
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R10),
> > SMM_CPU_OFFSET (x64._R10)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R10      = 32
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R11),
> > SMM_CPU_OFFSET (x64._R11)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R11      = 33
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R12),
> > SMM_CPU_OFFSET (x64._R12)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R12      = 34
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R13),
> > SMM_CPU_OFFSET (x64._R13)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R13      = 35
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R14),
> > SMM_CPU_OFFSET (x64._R14)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R14      = 36
> >
> > +  { 0, 8, 0,                            SMM_CPU_OFFSET (x64._R15),
> > SMM_CPU_OFFSET (x64._R15)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_R15      = 37
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._EAX),    SMM_CPU_OFFSET (x64._RAX),
> > SMM_CPU_OFFSET (x64._RAX)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RAX      = 38
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._EBX),    SMM_CPU_OFFSET (x64._RBX),
> > SMM_CPU_OFFSET (x64._RBX)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RBX      = 39
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._ECX),    SMM_CPU_OFFSET (x64._RCX),
> > SMM_CPU_OFFSET (x64._RCX)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RCX      = 40
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._EDX),    SMM_CPU_OFFSET (x64._RDX),
> > SMM_CPU_OFFSET (x64._RDX)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RDX      = 41
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._ESP),    SMM_CPU_OFFSET (x64._RSP),
> > SMM_CPU_OFFSET (x64._RSP)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RSP      = 42
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._EBP),    SMM_CPU_OFFSET (x64._RBP),
> > SMM_CPU_OFFSET (x64._RBP)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RBP      = 43
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._ESI),    SMM_CPU_OFFSET (x64._RSI),
> > SMM_CPU_OFFSET (x64._RSI)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RSI      = 44
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._EDI),    SMM_CPU_OFFSET (x64._RDI),
> > SMM_CPU_OFFSET (x64._RDI)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RDI      = 45
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._EIP),    SMM_CPU_OFFSET (x64._RIP),
> > SMM_CPU_OFFSET (x64._RIP)    + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RIP      = 46
> >
> > +
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._EFLAGS), SMM_CPU_OFFSET
> > (x64._RFLAGS),         SMM_CPU_OFFSET (x64._RFLAGS) + 4,     TRUE  }, //
> > EFI_SMM_SAVE_STATE_REGISTER_RFLAGS   = 51
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._CR0),    SMM_CPU_OFFSET (x64._CR0),
> > SMM_CPU_OFFSET (x64._CR0)    + 4,     FALSE }, //
> > EFI_SMM_SAVE_STATE_REGISTER_CR0      = 52
> >
> > +  { 4, 8, SMM_CPU_OFFSET (x86._CR3),    SMM_CPU_OFFSET (x64._CR3),
> > SMM_CPU_OFFSET (x64._CR3)    + 4,     FALSE }, //
> > EFI_SMM_SAVE_STATE_REGISTER_CR3      = 53
> >
> > +  { 0, 4, 0,                            SMM_CPU_OFFSET (x64._CR4),            0,
> > FALSE }, //  EFI_SMM_SAVE_STATE_REGISTER_CR4      = 54
> >
> > +};
> >
> > +
> >
> > +///
> >
> > +/// Lookup table for the IOMisc width information
> >
> > +///
> >
> > +CONST CPU_SMM_SAVE_STATE_IO_WIDTH  mSmmCpuIoWidth[] = {
> >
> > +  { 0, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT8  },  // Undefined           = 0
> >
> > +  { 1, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT8  },  //
> > SMM_IO_LENGTH_BYTE  = 1
> >
> > +  { 2, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT16 },  //
> > SMM_IO_LENGTH_WORD  = 2
> >
> > +  { 0, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT8  },  // Undefined           = 3
> >
> > +  { 4, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT32 },  //
> > SMM_IO_LENGTH_DWORD = 4
> >
> > +  { 0, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT8  },  // Undefined           = 5
> >
> > +  { 0, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT8  },  // Undefined           = 6
> >
> > +  { 0, EFI_SMM_SAVE_STATE_IO_WIDTH_UINT8  }   // Undefined           = 7
> >
> > +};
> >
> > +
> >
> > +///
> >
> > +/// Lookup table for the IOMisc type information
> >
> > +///
> >
> > +CONST EFI_SMM_SAVE_STATE_IO_TYPE  mSmmCpuIoType[] = {
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_OUTPUT,     // SMM_IO_TYPE_OUT_DX
> > = 0
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_INPUT,      // SMM_IO_TYPE_IN_DX
> = 1
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_STRING,     // SMM_IO_TYPE_OUTS
> =
> > 2
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_STRING,     // SMM_IO_TYPE_INS
> = 3
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0,         // Undefined                 = 4
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0,         // Undefined                 = 5
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_REP_PREFIX, //
> SMM_IO_TYPE_REP_OUTS
> > = 6
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_REP_PREFIX, //
> SMM_IO_TYPE_REP_INS
> > = 7
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_OUTPUT,     //
> > SMM_IO_TYPE_OUT_IMMEDIATE = 8
> >
> > +  EFI_SMM_SAVE_STATE_IO_TYPE_INPUT,      //
> > SMM_IO_TYPE_OUT_IMMEDIATE = 9
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0,         // Undefined                 = 10
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0,         // Undefined                 = 11
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0,         // Undefined                 = 12
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0,         // Undefined                 = 13
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0,         // Undefined                 = 14
> >
> > +  (EFI_SMM_SAVE_STATE_IO_TYPE)0          // Undefined                 = 15
> >
> > +};
> >
> > +
> >
> > +///
> >
> > +/// The mode of the CPU at the time an SMI occurs
> >
> > +///
> >
> > +UINT8  mSmmSaveStateRegisterLma;
> >
> > +
> >
> > +/**
> >
> > +  Read information from the CPU save state.
> >
> > +
> >
> > +  @param  Register  Specifies the CPU register to read form the save
> state.
> >
> > +
> >
> > +  @retval 0   Register is not valid
> >
> > +  @retval >0  Index into mSmmCpuWidthOffset[] associated with
> > + Register
> >
> > +
> >
> > +**/
> >
> > +UINTN
> >
> > +GetRegisterIndex (
> >
> > +  IN EFI_SMM_SAVE_STATE_REGISTER  Register
> >
> > +  )
> >
> > +{
> >
> > +  UINTN  Index;
> >
> > +  UINTN  Offset;
> >
> > +
> >
> > +  for (Index = 0, Offset = SMM_SAVE_STATE_REGISTER_MAX_INDEX;
> > mSmmCpuRegisterRanges[Index].Length != 0; Index++) {
> >
> > +    if ((Register >= mSmmCpuRegisterRanges[Index].Start) && (Register
> > + <=
> > mSmmCpuRegisterRanges[Index].End)) {
> >
> > +      return Register - mSmmCpuRegisterRanges[Index].Start + Offset;
> >
> > +    }
> >
> > +
> >
> > +    Offset += mSmmCpuRegisterRanges[Index].Length;
> >
> > +  }
> >
> > +
> >
> > +  return 0;
> >
> > +}
> >
> > +
> >
> > +/**
> >
> > +  Read a CPU Save State register on the target processor.
> >
> > +
> >
> > +  This function abstracts the differences that whether the CPU Save
> > + State
> > register is in the
> >
> > +  IA32 CPU Save State Map or X64 CPU Save State Map.
> >
> > +
> >
> > +  This function supports reading a CPU Save State register in SMBase
> > relocation handler.
> >
> > +
> >
> > +  @param[in]  CpuIndex       Specifies the zero-based index of the CPU
> save
> > state.
> >
> > +  @param[in]  RegisterIndex  Index into mSmmCpuWidthOffset[] look up
> > table.
> >
> > +  @param[in]  Width          The number of bytes to read from the CPU
> save
> > state.
> >
> > +  @param[out] Buffer         Upon return, this holds the CPU register value
> read
> > from the save state.
> >
> > +
> >
> > +  @retval EFI_SUCCESS           The register was read from Save State.
> >
> > +  @retval EFI_NOT_FOUND         The register is not defined for the Save
> State
> > of Processor.
> >
> > +  @retval EFI_INVALID_PARAMETER  This or Buffer is NULL.
> >
> > +
> >
> > +**/
> >
> > +EFI_STATUS
> >
> > +ReadSaveStateRegisterByIndex (
> >
> > +  IN UINTN  CpuIndex,
> >
> > +  IN UINTN  RegisterIndex,
> >
> > +  IN UINTN  Width,
> >
> > +  OUT VOID  *Buffer
> >
> > +  )
> >
> > +{
> >
> > +  SMRAM_SAVE_STATE_MAP  *CpuSaveState;
> >
> > +
> >
> > +  if (RegisterIndex == 0) {
> >
> > +    return EFI_NOT_FOUND;
> >
> > +  }
> >
> > +
> >
> > +  CpuSaveState = gSmst->CpuSaveState[CpuIndex];
> >
> > +
> >
> > +  if (mSmmSaveStateRegisterLma ==
> > EFI_SMM_SAVE_STATE_REGISTER_LMA_32BIT) {
> >
> > +    //
> >
> > +    // If 32-bit mode width is zero, then the specified register can
> > + not be
> > accessed
> >
> > +    //
> >
> > +    if (mSmmCpuWidthOffset[RegisterIndex].Width32 == 0) {
> >
> > +      return EFI_NOT_FOUND;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // If Width is bigger than the 32-bit mode width, then the
> > + specified register
> > can not be accessed
> >
> > +    //
> >
> > +    if (Width > mSmmCpuWidthOffset[RegisterIndex].Width32) {
> >
> > +      return EFI_INVALID_PARAMETER;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // Write return buffer
> >
> > +    //
> >
> > +    ASSERT (CpuSaveState != NULL);
> >
> > +    CopyMem (Buffer, (UINT8 *)CpuSaveState +
> > mSmmCpuWidthOffset[RegisterIndex].Offset32, Width);
> >
> > +  } else {
> >
> > +    //
> >
> > +    // If 64-bit mode width is zero, then the specified register can
> > + not be
> > accessed
> >
> > +    //
> >
> > +    if (mSmmCpuWidthOffset[RegisterIndex].Width64 == 0) {
> >
> > +      return EFI_NOT_FOUND;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // If Width is bigger than the 64-bit mode width, then the
> > + specified register
> > can not be accessed
> >
> > +    //
> >
> > +    if (Width > mSmmCpuWidthOffset[RegisterIndex].Width64) {
> >
> > +      return EFI_INVALID_PARAMETER;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // Write at most 4 of the lower bytes of the return buffer
> >
> > +    //
> >
> > +    CopyMem (Buffer, (UINT8 *)CpuSaveState +
> > mSmmCpuWidthOffset[RegisterIndex].Offset64Lo, MIN (4, Width));
> >
> > +    if (Width > 4) {
> >
> > +      //
> >
> > +      // Write at most 4 of the upper bytes of the return buffer
> >
> > +      //
> >
> > +      CopyMem ((UINT8 *)Buffer + 4, (UINT8 *)CpuSaveState +
> > mSmmCpuWidthOffset[RegisterIndex].Offset64Hi, Width - 4);
> >
> > +    }
> >
> > +  }
> >
> > +
> >
> > +  return EFI_SUCCESS;
> >
> > +}
> >
> > +
> >
> > +/**
> >
> > +  Read a CPU Save State register on the target processor.
> >
> > +
> >
> > +  This function abstracts the differences that whether the CPU Save
> > + State
> > register is in the
> >
> > +  IA32 CPU Save State Map or X64 CPU Save State Map.
> >
> > +
> >
> > +  This function supports reading a CPU Save State register in SMBase
> > relocation handler.
> >
> > +
> >
> > +  @param[in]  CpuIndex       Specifies the zero-based index of the CPU
> save
> > state.
> >
> > +  @param[in]  RegisterIndex  Index into mSmmCpuWidthOffset[] look up
> > table.
> >
> > +  @param[in]  Width          The number of bytes to read from the CPU
> save
> > state.
> >
> > +  @param[out] Buffer         Upon return, this holds the CPU register value
> read
> > from the save state.
> >
> > +
> >
> > +  @retval EFI_SUCCESS           The register was read from Save State.
> >
> > +  @retval EFI_NOT_FOUND         The register is not defined for the Save
> State
> > of Processor.
> >
> > +  @retval EFI_INVALID_PARAMETER Buffer is NULL, or Width does not
> > + meet
> > requirement per Register type.
> >
> > +
> >
> > +**/
> >
> > +EFI_STATUS
> >
> > +EFIAPI
> >
> > +ReadSaveStateRegister (
> >
> > +  IN UINTN                        CpuIndex,
> >
> > +  IN EFI_SMM_SAVE_STATE_REGISTER  Register,
> >
> > +  IN UINTN                        Width,
> >
> > +  OUT VOID                        *Buffer
> >
> > +  )
> >
> > +{
> >
> > +  SMRAM_SAVE_STATE_MAP        *CpuSaveState;
> >
> > +  EFI_SMM_SAVE_STATE_IO_INFO  *IoInfo;
> >
> > +
> >
> > +  CpuSaveState = gSmst->CpuSaveState[CpuIndex];
> >
> > +  //
> >
> > +  // Check for special EFI_SMM_SAVE_STATE_REGISTER_LMA
> >
> > +  //
> >
> > +  if (Register == EFI_SMM_SAVE_STATE_REGISTER_LMA) {
> >
> > +    //
> >
> > +    // Only byte access is supported for this register
> >
> > +    //
> >
> > +    if (Width != 1) {
> >
> > +      return EFI_INVALID_PARAMETER;
> >
> > +    }
> >
> > +
> >
> > +    *(UINT8 *)Buffer = mSmmSaveStateRegisterLma;
> >
> > +
> >
> > +    return EFI_SUCCESS;
> >
> > +  }
> >
> > +
> >
> > +  //
> >
> > +  // Check for special EFI_SMM_SAVE_STATE_REGISTER_IO
> >
> > +  //
> >
> > +  if (Register == EFI_SMM_SAVE_STATE_REGISTER_IO) {
> >
> > +    //
> >
> > +    // Check SMM IO Trap Offset valid bit
> >
> > +    //
> >
> > +    if (!(CpuSaveState->x64.SMM_IO_TRAP & 0x02)) {
> >
> > +      return EFI_NOT_FOUND;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // Zero the IoInfo structure that will be returned in Buffer
> >
> > +    //
> >
> > +    IoInfo = (EFI_SMM_SAVE_STATE_IO_INFO *)Buffer;
> >
> > +    ZeroMem (IoInfo, sizeof (EFI_SMM_SAVE_STATE_IO_INFO));
> >
> > +
> >
> > +    //
> >
> > +    // Use hard code to fill in all the fields of the IoInfo
> > + structure
> >
> > +    //
> >
> > +    IoInfo->IoPort  = (UINT16)(CpuSaveState->x64.SMM_IO_TRAP >> 16);
> >
> > +    IoInfo->IoWidth = EFI_SMM_SAVE_STATE_IO_WIDTH_UINT8;
> >
> > +    IoInfo->IoType  = EFI_SMM_SAVE_STATE_IO_TYPE_INPUT;
> >
> > +    IoInfo->IoData  = (UINT64)IoRead8 ((CpuSaveState->x64.SMM_IO_TRAP
> > >> 16));
> >
> > +
> >
> > +    return EFI_SUCCESS;
> >
> > +  }
> >
> > +
> >
> > +  //
> >
> > +  // Convert Register to a register lookup table index
> >
> > +  //
> >
> > +  return ReadSaveStateRegisterByIndex (CpuIndex, GetRegisterIndex
> > (Register), Width, Buffer);
> >
> > +}
> >
> > +
> >
> > +/**
> >
> > +  Write value to a CPU Save State register on the target processor.
> >
> > +
> >
> > +  This function abstracts the differences that whether the CPU Save
> > + State
> > register is in the
> >
> > +  IA32 CPU Save State Map or X64 CPU Save State Map.
> >
> > +
> >
> > +  This function supports writing a CPU Save State register in SMBase
> > relocation handler.
> >
> > +
> >
> > +  @param[in] CpuIndex       Specifies the zero-based index of the CPU
> save
> > state.
> >
> > +  @param[in] RegisterIndex  Index into mSmmCpuWidthOffset[] look up
> > table.
> >
> > +  @param[in] Width          The number of bytes to read from the CPU
> save
> > state.
> >
> > +  @param[in] Buffer         Upon entry, this holds the new CPU register
> value.
> >
> > +
> >
> > +  @retval EFI_SUCCESS           The register was written to Save State.
> >
> > +  @retval EFI_NOT_FOUND         The register is not defined for the Save
> State
> > of Processor.
> >
> > +  @retval EFI_INVALID_PARAMETER  ProcessorIndex or Width is not
> correct.
> >
> > +
> >
> > +**/
> >
> > +EFI_STATUS
> >
> > +EFIAPI
> >
> > +WriteSaveStateRegister (
> >
> > +  IN UINTN                        CpuIndex,
> >
> > +  IN EFI_SMM_SAVE_STATE_REGISTER  Register,
> >
> > +  IN UINTN                        Width,
> >
> > +  IN CONST VOID                   *Buffer
> >
> > +  )
> >
> > +{
> >
> > +  UINTN                 RegisterIndex;
> >
> > +  SMRAM_SAVE_STATE_MAP  *CpuSaveState;
> >
> > +
> >
> > +  //
> >
> > +  // Writes to EFI_SMM_SAVE_STATE_REGISTER_LMA are ignored
> >
> > +  //
> >
> > +  if (Register == EFI_SMM_SAVE_STATE_REGISTER_LMA) {
> >
> > +    return EFI_SUCCESS;
> >
> > +  }
> >
> > +
> >
> > +  //
> >
> > +  // Writes to EFI_SMM_SAVE_STATE_REGISTER_IO are not supported
> >
> > +  //
> >
> > +  if (Register == EFI_SMM_SAVE_STATE_REGISTER_IO) {
> >
> > +    return EFI_NOT_FOUND;
> >
> > +  }
> >
> > +
> >
> > +  //
> >
> > +  // Convert Register to a register lookup table index
> >
> > +  //
> >
> > +  RegisterIndex = GetRegisterIndex (Register);
> >
> > +  if (RegisterIndex == 0) {
> >
> > +    return EFI_NOT_FOUND;
> >
> > +  }
> >
> > +
> >
> > +  CpuSaveState = gSmst->CpuSaveState[CpuIndex];
> >
> > +
> >
> > +  //
> >
> > +  // Do not write non-writable SaveState, because it will cause exception.
> >
> > +  //
> >
> > +  if (!mSmmCpuWidthOffset[RegisterIndex].Writeable) {
> >
> > +    return EFI_UNSUPPORTED;
> >
> > +  }
> >
> > +
> >
> > +  //
> >
> > +  // Check CPU mode
> >
> > +  //
> >
> > +  if (mSmmSaveStateRegisterLma ==
> > EFI_SMM_SAVE_STATE_REGISTER_LMA_32BIT) {
> >
> > +    //
> >
> > +    // If 32-bit mode width is zero, then the specified register can
> > + not be
> > accessed
> >
> > +    //
> >
> > +    if (mSmmCpuWidthOffset[RegisterIndex].Width32 == 0) {
> >
> > +      return EFI_NOT_FOUND;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // If Width is bigger than the 32-bit mode width, then the
> > + specified register
> > can not be accessed
> >
> > +    //
> >
> > +    if (Width > mSmmCpuWidthOffset[RegisterIndex].Width32) {
> >
> > +      return EFI_INVALID_PARAMETER;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // Write SMM State register
> >
> > +    //
> >
> > +    ASSERT (CpuSaveState != NULL);
> >
> > +    CopyMem ((UINT8 *)CpuSaveState +
> > mSmmCpuWidthOffset[RegisterIndex].Offset32, Buffer, Width);
> >
> > +  } else {
> >
> > +    //
> >
> > +    // If 64-bit mode width is zero, then the specified register can
> > + not be
> > accessed
> >
> > +    //
> >
> > +    if (mSmmCpuWidthOffset[RegisterIndex].Width64 == 0) {
> >
> > +      return EFI_NOT_FOUND;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // If Width is bigger than the 64-bit mode width, then the
> > + specified register
> > can not be accessed
> >
> > +    //
> >
> > +    if (Width > mSmmCpuWidthOffset[RegisterIndex].Width64) {
> >
> > +      return EFI_INVALID_PARAMETER;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // Write at most 4 of the lower bytes of SMM State register
> >
> > +    //
> >
> > +    CopyMem ((UINT8 *)CpuSaveState +
> > mSmmCpuWidthOffset[RegisterIndex].Offset64Lo, Buffer, MIN (4, Width));
> >
> > +    if (Width > 4) {
> >
> > +      //
> >
> > +      // Write at most 4 of the upper bytes of SMM State register
> >
> > +      //
> >
> > +      CopyMem ((UINT8 *)CpuSaveState +
> > mSmmCpuWidthOffset[RegisterIndex].Offset64Hi, (UINT8 *)Buffer + 4,
> > Width
> > - 4);
> >
> > +    }
> >
> > +  }
> >
> > +
> >
> > +  return EFI_SUCCESS;
> >
> > +}
> >
> > +
> >
> > +/**
> >
> > +  Hook the code executed immediately after an RSM instruction on the
> > currently
> >
> > +  executing CPU.  The mode of code executed immediately after RSM
> > + must be
> >
> > +  detected, and the appropriate hook must be selected.  Always clear
> > + the auto
> >
> > +  HALT restart flag if it is set.
> >
> > +
> >
> > +  @param[in] CpuIndex                 The processor index for the currently
> >
> > +                                      executing CPU.
> >
> > +  @param[in] CpuState                 Pointer to SMRAM Save State Map for
> the
> >
> > +                                      currently executing CPU.
> >
> > +  @param[in] NewInstructionPointer32  Instruction pointer to use if
> > resuming to
> >
> > +                                      32-bit mode from 64-bit SMM.
> >
> > +  @param[in] NewInstructionPointer    Instruction pointer to use if
> resuming
> > to
> >
> > +                                      same mode as SMM.
> >
> > +
> >
> > +  @retval The value of the original instruction pointer before it was
> hooked.
> >
> > +
> >
> > +**/
> >
> > +UINT64
> >
> > +EFIAPI
> >
> > +HookReturnFromSmm (
> >
> > +  IN UINTN              CpuIndex,
> >
> > +  SMRAM_SAVE_STATE_MAP  *CpuState,
> >
> > +  UINT64                NewInstructionPointer32,
> >
> > +  UINT64                NewInstructionPointer
> >
> > +  )
> >
> > +{
> >
> > +  UINT64  OriginalInstructionPointer;
> >
> > +
> >
> > +  OriginalInstructionPointer = SmmCpuFeaturesHookReturnFromSmm (
> >
> > +                                 CpuIndex,
> >
> > +                                 CpuState,
> >
> > +                                 NewInstructionPointer32,
> >
> > +                                 NewInstructionPointer
> >
> > +                                 );
> >
> > +  if (OriginalInstructionPointer != 0) {
> >
> > +    return OriginalInstructionPointer;
> >
> > +  }
> >
> > +
> >
> > +  if (mSmmSaveStateRegisterLma ==
> > EFI_SMM_SAVE_STATE_REGISTER_LMA_32BIT) {
> >
> > +    OriginalInstructionPointer = (UINT64)CpuState->x86._EIP;
> >
> > +    CpuState->x86._EIP         = (UINT32)NewInstructionPointer;
> >
> > +    //
> >
> > +    // Clear the auto HALT restart flag so the RSM instruction
> > + returns
> >
> > +    // program control to the instruction following the HLT instruction.
> >
> > +    //
> >
> > +    if ((CpuState->x86.AutoHALTRestart & BIT0) != 0) {
> >
> > +      CpuState->x86.AutoHALTRestart &= ~BIT0;
> >
> > +    }
> >
> > +  } else {
> >
> > +    OriginalInstructionPointer = CpuState->x64._RIP;
> >
> > +    if ((CpuState->x64.EFER & LMA) == 0) {
> >
> > +      CpuState->x64._RIP = (UINT32)NewInstructionPointer32;
> >
> > +    } else {
> >
> > +      CpuState->x64._RIP = (UINT32)NewInstructionPointer;
> >
> > +    }
> >
> > +
> >
> > +    //
> >
> > +    // Clear the auto HALT restart flag so the RSM instruction
> > + returns
> >
> > +    // program control to the instruction following the HLT instruction.
> >
> > +    //
> >
> > +    if ((CpuState->x64.AutoHALTRestart & BIT0) != 0) {
> >
> > +      CpuState->x64.AutoHALTRestart &= ~BIT0;
> >
> > +    }
> >
> > +  }
> >
> > +
> >
> > +  return OriginalInstructionPointer;
> >
> > +}
> >
> > +
> >
> > +/**
> >
> > +  Get the size of the SMI Handler in bytes.
> >
> > +
> >
> > +  @retval The size, in bytes, of the SMI Handler.
> >
> > +
> >
> > +**/
> >
> > +UINTN
> >
> > +EFIAPI
> >
> > +GetSmiHandlerSize (
> >
> > +  VOID
> >
> > +  )
> >
> > +{
> >
> > +  UINTN  Size;
> >
> > +
> >
> > +  Size = SmmCpuFeaturesGetSmiHandlerSize ();
> >
> > +  if (Size != 0) {
> >
> > +    return Size;
> >
> > +  }
> >
> > +
> >
> > +  return gcSmiHandlerSize;
> >
> > +}
> >
> > +
> >
> > +/**
> >
> > +  Install the SMI handler for the CPU specified by CpuIndex.  This
> > + function
> >
> > +  is called by the CPU that was elected as monarch during System
> > Management
> >
> > +  Mode initialization.
> >
> > +
> >
> > +  @param[in] CpuIndex   The index of the CPU to install the custom SMI
> > handler.
> >
> > +                        The value must be between 0 and the
> > + NumberOfCpus field
> >
> > +                        in the System Management System Table (SMST).
> >
> > +  @param[in] SmBase     The SMBASE address for the CPU specified by
> > CpuIndex.
> >
> > +  @param[in] SmiStack   The stack to use when an SMI is processed by
> the
> >
> > +                        the CPU specified by CpuIndex.
> >
> > +  @param[in] StackSize  The size, in bytes, if the stack used when an
> > + SMI is
> >
> > +                        processed by the CPU specified by CpuIndex.
> >
> > +  @param[in] GdtBase    The base address of the GDT to use when an
> SMI is
> >
> > +                        processed by the CPU specified by CpuIndex.
> >
> > +  @param[in] GdtSize    The size, in bytes, of the GDT used when an SMI
> is
> >
> > +                        processed by the CPU specified by CpuIndex.
> >
> > +  @param[in] IdtBase    The base address of the IDT to use when an SMI
> is
> >
> > +                        processed by the CPU specified by CpuIndex.
> >
> > +  @param[in] IdtSize    The size, in bytes, of the IDT used when an SMI is
> >
> > +                        processed by the CPU specified by CpuIndex.
> >
> > +  @param[in] Cr3        The base address of the page tables to use when
> an SMI
> >
> > +                        is processed by the CPU specified by CpuIndex.
> >
> > +**/
> >
> > +VOID
> >
> > +EFIAPI
> >
> > +InstallSmiHandler (
> >
> > +  IN UINTN   CpuIndex,
> >
> > +  IN UINT32  SmBase,
> >
> > +  IN VOID    *SmiStack,
> >
> > +  IN UINTN   StackSize,
> >
> > +  IN UINTN   GdtBase,
> >
> > +  IN UINTN   GdtSize,
> >
> > +  IN UINTN   IdtBase,
> >
> > +  IN UINTN   IdtSize,
> >
> > +  IN UINT32  Cr3
> >
> > +  )
> >
> > +{
> >
> > +  PROCESSOR_SMM_DESCRIPTOR  *Psd;
> >
> > +  UINT32                    CpuSmiStack;
> >
> > +
> >
> > +  //
> >
> > +  // Initialize PROCESSOR_SMM_DESCRIPTOR
> >
> > +  //
> >
> > +  Psd = (PROCESSOR_SMM_DESCRIPTOR *)(VOID *)((UINTN)SmBase +
> > SMM_PSD_OFFSET);
> >
> > +  CopyMem (Psd, &gcPsd, sizeof (gcPsd));
> >
> > +  Psd->SmmGdtPtr  = (UINT64)GdtBase;
> >
> > +  Psd->SmmGdtSize = (UINT32)GdtSize;
> >
> > +
> >
> > +  if (SmmCpuFeaturesGetSmiHandlerSize () != 0) {
> >
> > +    //
> >
> > +    // Install SMI handler provided by library
> >
> > +    //
> >
> > +    SmmCpuFeaturesInstallSmiHandler (
> >
> > +      CpuIndex,
> >
> > +      SmBase,
> >
> > +      SmiStack,
> >
> > +      StackSize,
> >
> > +      GdtBase,
> >
> > +      GdtSize,
> >
> > +      IdtBase,
> >
> > +      IdtSize,
> >
> > +      Cr3
> >
> > +      );
> >
> > +    return;
> >
> > +  }
> >
> > +
> >
> > +  InitShadowStack (CpuIndex, (VOID *)((UINTN)SmiStack + StackSize));
> >
> > +
> >
> > +  //
> >
> > +  // Initialize values in template before copy
> >
> > +  //
> >
> > +  CpuSmiStack = (UINT32)((UINTN)SmiStack + StackSize - sizeof
> > + (UINTN));
> >
> > +  PatchInstructionX86 (gPatchSmiStack, CpuSmiStack, 4);
> >
> > +  PatchInstructionX86 (gPatchSmiCr3, Cr3, 4);
> >
> > +  PatchInstructionX86 (gPatchSmbase, SmBase, 4);
> >
> > +  gSmiHandlerIdtr.Base  = IdtBase;
> >
> > +  gSmiHandlerIdtr.Limit = (UINT16)(IdtSize - 1);
> >
> > +
> >
> > +  //
> >
> > +  // Set the value at the top of the CPU stack to the CPU Index
> >
> > +  //
> >
> > +  *(UINTN *)(UINTN)CpuSmiStack = CpuIndex;
> >
> > +
> >
> > +  //
> >
> > +  // Copy template to CPU specific SMI handler location
> >
> > +  //
> >
> > +  CopyMem (
> >
> > +    (VOID *)((UINTN)SmBase + SMM_HANDLER_OFFSET),
> >
> > +    (VOID *)gcSmiHandlerTemplate,
> >
> > +    gcSmiHandlerSize
> >
> > +    );
> >
> > +}
> >
> > --
> >
> > 2.31.1
> >
> >
> >
> >
> >
> > 
> >
> >
>



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#114190): https://edk2.groups.io/g/devel/message/114190
Mute This Topic: https://groups.io/mt/103831200/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io]
-=-=-=-=-=-=-=-=-=-=-=-



  reply	other threads:[~2024-01-23 10:27 UTC|newest]

Thread overview: 49+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-01-18  6:50 [edk2-devel] [PATCH 00/33] Introduce AMD Vangogh platform reference code duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 01/33] AMD/AmdPlatformPkg: Check in AMD S3 logo duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 02/33] AMD/VanGoghBoard: Check in ACPI tables duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 03/33] AMD/VanGoghBoard: Check in Capsule update duke.zhai via groups.io
2024-01-23  4:42   ` Chang, Abner via groups.io
2024-01-25  8:25     ` Zhai, MingXin (Duke) via groups.io
2024-01-25 11:45       ` Chang, Abner via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 04/33] AMD/VanGoghBoard: Check in AgesaPublic pkg duke.zhai via groups.io
2024-01-23  4:44   ` Chang, Abner via groups.io
2024-01-25  8:17     ` Xing, Eric via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 05/33] AMD/VanGoghBoard: Check in PlatformSecLib duke.zhai via groups.io
2024-01-23  4:46   ` Chang, Abner via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 06/33] AMD/VanGoghBoard: Check in AmdIdsExtLib duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 07/33] AMD/VanGoghBoard: Check in PciPlatform duke.zhai via groups.io
2024-01-23  4:50   ` Chang, Abner via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 08/33] AMD/VanGoghBoard: Check in UDKFlashUpdate duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 09/33] AMD/VanGoghBoard: Check in Flash_AB duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 10/33] AMD/VanGoghBoard: Check in FlashUpdate duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 11/33] AMD/VanGoghBoard: Check in FvbServices duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 12/33] AMD/VanGoghBoard: Check in AMD BaseSerialPortLib duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 13/33] AMD/VanGoghBoard: Check in PlatformFlashAccessLib duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 14/33] AMD/VanGoghBoard: Check in SmbiosLib duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 15/33] AMD/VanGoghBoard: Check in SpiFlashDeviceLib duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 16/33] AMD/VanGoghBoard: Check in BaseTscTimerLib duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 17/33] AMD/VanGoghBoard: Check in Smm access module duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 18/33] AMD/VanGoghBoard: Check in PciHostBridge module duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 19/33] AMD/VanGoghBoard: Check in PcatRealTimeClockRuntimeDxe module duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 20/33] AMD/VanGoghBoard: Check in FTPM module duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 21/33] AMD/VanGoghBoard: Check in SignedCapsule duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 22/33] AMD/VanGoghBoard: Check in Vtf0 duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 23/33] AMD/VanGoghBoard: Check in AcpiPlatform duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 24/33] AMD/VanGoghBoard: Check in FchSpi module duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 25/33] AMD/VanGoghBoard: Check in PlatformInitPei module duke.zhai via groups.io
2024-01-23  6:35   ` Chang, Abner via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 26/33] AMD/VanGoghBoard: Check in Smbios platform dxe drivers duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 27/33] AMD/VanGoghBoard: Check in Fsp2WrapperPkg duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 28/33] AMD/VanGoghBoard: Check in SmmCpuFeaturesLibCommon module duke.zhai via groups.io
2024-01-23  5:14   ` Chang, Abner via groups.io
2024-01-23 10:20     ` Xing, Eric via groups.io
2024-01-23 10:44       ` Chang, Abner via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 29/33] AMD/VanGoghBoard: Check in SmramSaveState module duke.zhai via groups.io
2024-01-20 14:37   ` Abdul Lateef Attar via groups.io
2024-01-23  5:15     ` Chang, Abner via groups.io
2024-01-23 10:27       ` Xing, Eric via groups.io [this message]
2024-01-23 10:44         ` Chang, Abner via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 30/33] AMD/VanGoghBoard: Check in EDK2 override files duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 31/33] AMD/VanGoghBoard: Check in AMD SmmControlPei module duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 32/33] AMD/VanGoghBoard: Check in Chachani board project files and build script duke.zhai via groups.io
2024-01-18  6:50 ` [edk2-devel] [PATCH 33/33] AMD/VanGoghBoard: Improvement coding style duke.zhai via groups.io

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=PH0PR12MB56311452D39A0FC2AC93EE6AF6742@PH0PR12MB5631.namprd12.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox