From nobody Sat Apr 27 15:40:32 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+72420+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+72420+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=hpe.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1614828113925316.2206279842741; Wed, 3 Mar 2021 19:21:53 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id owfLYY1788612xKR5VgRUc6O; Wed, 03 Mar 2021 19:21:53 -0800 X-Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) by mx.groups.io with SMTP id smtpd.web10.1898.1614828108171599307 for ; Wed, 03 Mar 2021 19:21:48 -0800 X-Received: from pps.filterd (m0150242.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 1243HwLu029370; Thu, 4 Mar 2021 03:21:42 GMT X-Received: from g4t3426.houston.hpe.com (g4t3426.houston.hpe.com [15.241.140.75]) by mx0a-002e3701.pphosted.com with ESMTP id 3720nmjdra-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 04 Mar 2021 03:21:41 +0000 X-Received: from G4W9120.americas.hpqcorp.net (g4w9120.houston.hp.com [16.210.21.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3426.houston.hpe.com (Postfix) with ESMTPS id DEB764E; Thu, 4 Mar 2021 03:21:40 +0000 (UTC) X-Received: from G2W6309.americas.hpqcorp.net (2002:10c5:4033::10c5:4033) by G4W9120.americas.hpqcorp.net (2002:10d2:150f::10d2:150f) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 4 Mar 2021 03:21:40 +0000 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (15.241.52.10) by G2W6309.americas.hpqcorp.net (16.197.64.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 4 Mar 2021 03:21:40 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=oPE7vKCA7AOSogodmOSeGI8BP6m0UI6lPPV1KmwzucD1fLGnEcXyvIpGGORZEoPnS/Y99f3v0Py/KUKR2TJTVEbzzTxQuxlGNofimvJCGJrgXxhI/zAo08QXHqcMLloxPx/OGmUa7qrND+ukG/9YCv8iia9PpoUA+L98dqWQ4vvRMXtc3T5Cl4CwxUu+z8fwVV6eTCy3P8OCvrKoJmaU3mHRLubccYHf1+72j7V0TwFOizw5eNcHsUdq+XKGBShByYF9kiK7weekOtO3e0NhsNc3Dc3bC3Fj6UROj4SV4FWVu5bJ4pDX3u9i+Q7ADqoTeRBry/4OJfqSVNx+4Vvh6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QQzoRuQUQJY5Z9/djxRR4/oHB+bnvZB4zfCdqLj2k1Q=; b=EzmgUuD+WOzbPGNjD0cGfLZSDWLP6n5Kq/titWgqFqMbxiyos8KgxcuZBJrKpNbipwSACcnR4pksDBfF74e4HTWUPEgFqGqWNKmiv+jDrTKy5ncsedJDhGq8DIfg/6tkRpA+l9JmsWLKqtPNHmsq4HwgS5Aw9SNXSPLmrGeLTiTUKCnhux1Q8EWdY+JTjWNw5Ep2CuJBdcHKMjRM9jRHqAeq6mclNdbETAOJMTNPQmkNReIQd0JpMwh9/VQI3mJ9CWAXRbSLvXRoBPFiw2PkDyQ/MKxLko8jtezOi7vd3goBVvD2++L9SF9qfCdr09lIS5ud5VWgnLFhtCMOVJh2Ig== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) by DF4PR8401MB0506.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7606::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Thu, 4 Mar 2021 03:21:38 +0000 X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318]) by DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318%7]) with mapi id 15.20.3912.017; Thu, 4 Mar 2021 03:21:38 +0000 From: "Daniel Schaefer" To: CC: G Edhaya Chandran , Barton Gao , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Leif Lindholm , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [edk2-test PATCHv3 1/5] SctPkg: Add RISCV64 support by using Aarch64 sources Date: Thu, 4 Mar 2021 11:21:12 +0800 Message-ID: <20210304032116.24357-2-daniel.schaefer@hpe.com> In-Reply-To: <20210304032116.24357-1-daniel.schaefer@hpe.com> References: <20210304032116.24357-1-daniel.schaefer@hpe.com> X-Originating-IP: [15.211.146.34] X-ClientProxiedBy: SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) To DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) X-MS-Exchange-MessageSentRepresentingType: 1 X-Received: from x360-nix.wireless.hpe.com (15.211.146.34) by SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend Transport; Thu, 4 Mar 2021 03:21:35 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 58d4d74e-7184-451a-497f-08d8debc9f59 X-MS-TrafficTypeDiagnostic: DF4PR8401MB0506: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:4502; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData: =?us-ascii?Q?B7sd9ZqSM5WZDiCBRO7kPXYyzbXfUXAJ5yYRvZneDA2ScgO9oZx81O0hqNA7?= =?us-ascii?Q?c6gpDvT2owO+Ae8xCmxJz8opfasQyf2bPnyW5bEeEFDr1gt1gFhHJpQ3wto/?= =?us-ascii?Q?4q+IuI+XcjXaQHQJq33Gu5iOdsJdJ+tbqzF9Z0oeFS++IdSmZNXQOBDgbzev?= =?us-ascii?Q?be7WBnh2dbGk1bkjkh4waDxvWJs3uVMcPoQSr4TzzDdI1ybrgJlipwqNn7TW?= =?us-ascii?Q?vdNKwdn45DbUCZFQGIjXkRpiz69udQO/hUYIiMU+HrOr5QpQSUzKrVP4l3ZS?= =?us-ascii?Q?EEsfwZeSe2dhHAHa+qJgubVtm4Cq4S77kiF4su8wrWX0yh9g35HzEWKXqmnY?= =?us-ascii?Q?Z05HydFjj44Xnsy0IA3mXssc8YqZvtMcmcW/a4aQirEMrspfBoNnLy+W68lz?= =?us-ascii?Q?tO/35uNHFPp01ZDfJa9qP5l5HgozkjX/a90KNzcueENtZXDWRHnlDWsXPlPJ?= =?us-ascii?Q?eSR79zq7yC179YSTYzmB8ESEPxQuJKMxvBOhBLaNDx7aWajR/uBeDQjfse4q?= =?us-ascii?Q?q49pwAjO2QPs5dKEXKi3x6tzBKOYqYQ4vpTfZELfON5bvhSzVUKPm/+DLM/G?= =?us-ascii?Q?wwOgP2Gi1IqOmqj3RbjZOmCUCkflQHczOZ2HURhapKwa5rIo+hN6BFpOuVvg?= =?us-ascii?Q?e11oMD8NTyq5Lw7kpH/8uYPIC4TP16iPizUAVOpF/THe0w73SChdN845lOJc?= =?us-ascii?Q?IR8/t6YznDmQYFOY+ALdcifH8QuYwycV7CH3Fdwx0j4uGee8FDwAcjCYK+DC?= =?us-ascii?Q?i7GTRqRNcCWViqvYHvud9L3Le1+e/dZP6nO4FW1OTclxjpy6Pjrr9YOtHgCv?= =?us-ascii?Q?wakD/vDrCq5Dgiqm7gJpytOBPEdhFaE8mqbcxLQQNIme/OuITXcfPZT1G79A?= =?us-ascii?Q?UzLlWKxuPfPhwDULWqIk+x9NN/AUk3E+jFjs80Ts3eeMII+Sc4X5gTpuwSZm?= =?us-ascii?Q?Dz67/BeXWIgU5SaPJp/fp2ULVzq5XcPOGbr4AcDWb3bBkJMuA1D9NU2uBa7a?= =?us-ascii?Q?0tx/Kc6T8gtWgd8iyRF5KCa+Rg8yvAwWml6Y1OqUG7MQcS4lVHTiarnsYUxF?= =?us-ascii?Q?eSwNGYKQaqkpfzv7xKz3QKsHyy/LlE9XVhRQL/g7a4gdXJKc+Ywy9weE45N8?= =?us-ascii?Q?iYN5CSehXGa5S33JT8woTWdnEpSXWlI78GJk0WNPDB/QG3r4vKGkHEob4qfm?= =?us-ascii?Q?MWkek93bsahQGf+RND8z9xpoBchOxoWjXAbZ5inzAl5BhKQzFw89FY9li1PJ?= =?us-ascii?Q?xFBkNud+AS0XhK6eelRZqA79Ni3BhxAa+kClCfsjWR/w6HcTGefszifd8CtW?= =?us-ascii?Q?wSlAKiXZqkxB0tpD2BALv/dn?= X-MS-Exchange-CrossTenant-Network-Message-Id: 58d4d74e-7184-451a-497f-08d8debc9f59 X-MS-Exchange-CrossTenant-AuthSource: DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2021 03:21:38.6339 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: GCJFcatCeEzj8muhZjv4sAYc1rtsBOHxp0V+e/c4QAYh582H5ZKecFsiYxlI1cJHjdG2p3Hygez69fIYl1h/Xw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DF4PR8401MB0506 X-OriginatorOrg: hpe.com X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,daniel.schaefer@hpe.com X-Gm-Message-State: hVSWG4GA3t16GAY7HrkN3Cp2x1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1614828113; bh=UdUavEtOBiKpctFn0dQYA/gNv44Xg2itlMmMyaZj9t0=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=BiP+xsxl5r87mQvHOs3cm1NZaIN47s+lwi9KUWydezC1Ky8KzfHkkRCGd5dE/HXtMVb QoOf1veUbDpM0Z/h/qac/xNJIS1EHHd3gGwsQ1H4JeTfgz/WUwS0opzzsmMQYO5ep9d/l fa6g4dOh3Kv9mRzwNzBmjqbYl0H8LT+lgFA= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" The sources were copied from Aarch64. Follow-up commit will adapt them for Riscv64. REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D3042 Cc: G Edhaya Chandran Cc: Barton Gao Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Leif Lindholm Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Daniel Schaefer Reviewed-by: Sunny Wang --- uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h = | 32 +++ uefi-sct/SctPkg/Library/SctLib/Riscv64/initplat.c = | 45 ++++ uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S = | 44 ++++ uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c = | 182 +++++++++++++ uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c = | 88 +++++++ uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Dump.c = | 68 +++++ uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c = | 134 ++++++++++ uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.h = | 48 ++++ uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/DebugSupportBBTestCacheFunction.c | 137 ++++++++++ uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/DebugSupportBBTestExceptionCallbackFunction.c | 276 ++++++++++++++++++++ uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/PlatformIsa.c | 30 +++ uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/EntsL= ibPlat.h | 55 ++++ uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/InitP= lat.c | 55 ++++ 13 files changed, 1194 insertions(+) diff --git a/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h b/uefi-sct= /SctPkg/Library/SctLib/Riscv64/SctLibPlat.h new file mode 100644 index 00000000..ee7c656b --- /dev/null +++ b/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h @@ -0,0 +1,32 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2011 - 2012, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + SctLibPlat.h + +Abstract: + + AArch64 specific defines + +--*/ + +#ifndef _EFI_LIB_PLAT_H_ +#define _EFI_LIB_PLAT_H_ + +#define MIN_ALIGNMENT_SIZE 8 + +#endif diff --git a/uefi-sct/SctPkg/Library/SctLib/Riscv64/initplat.c b/uefi-sct/S= ctPkg/Library/SctLib/Riscv64/initplat.c new file mode 100644 index 00000000..a48bb2f3 --- /dev/null +++ b/uefi-sct/SctPkg/Library/SctLib/Riscv64/initplat.c @@ -0,0 +1,45 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2011 - 2012, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + initplat.c + +Abstract: + + Math routines for compatibility with native EFI library routines. + +--*/ + +#include "SctLibInternal.h" + +VOID +InitializeLibPlatform ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) + +{ + // No platform-specific initializations +} + +UINT64 +SctReadTsc ( + VOID + ) +{ + return 0; +} diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S b/uefi-sct/Sc= tPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S new file mode 100644 index 00000000..d223b36b --- /dev/null +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S @@ -0,0 +1,44 @@ +## @file +# +# Copyright 2010 - 2012 Unified EFI, Inc.
+# Copyright (c) 2012, ARM Ltd. All rights reserved.
+# +# This program and the accompanying materials +# are licensed and made available under the terms and conditions of the B= SD License +# which accompanies this distribution. The full text of the license may = be found at=20 +# http://opensource.org/licenses/bsd-license.php +#=20 +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. +#=20 +## +# +# +#/*++ +# +# Module Name: +# +# GoVirtual.S +# +#--*/ +#start of the code section +.text +/* FIXME: Should alignment be different on Aarch64? */ +.align 3 + +.global JumpToTestFunc +.type JumpToTestFunc, %function + +#-------------------------------------------------------------------------= ----- +# VOID +# JumpToTestFunc ( +# IN UINTN FuncPointer, +# IN UNITN ConfigInfo +# ) +# +JumpToTestFunc: + mov x2, x0 + mov x0, x1 + + // Jump to Virtual function + blr x2 diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c b/uefi-sc= t/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c new file mode 100644 index 00000000..397b3514 --- /dev/null +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c @@ -0,0 +1,182 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2012, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + VirtualMemory.c + +--*/ + +#include "SCRTApp.h" + +#define VIRT_TO_PHYS_OFFSET (0x80000000) //2G + +BOOLEAN HighAddress =3D FALSE; +UINTN PageTable =3D 0; + + +VOID +ConvertRuntimeFuncPtr ( + IN OUT UINTN *VirtualFunc + ) +/*++ + +Routine Description: + + Change RuntimeTestFunc physical address to virtual address + +Arguments: + + VirtualFunc - On input, RuntimeTestFunc physical address. + On output, RuntimeTest virtual address. + +Returns: + + NONE + +--*/ +{ + /*Note: It is presumed that on ARM v5, V6 and V7 architectures + * the MMU is configured and enabled in PEI phase. As VirtualFunc + * is already mapped to virtual memory, don't have to do anything here. + */ + /* FIXME: Is it the same on ARM v8? */ +} + + +EFI_STATUS +DoMemoryAllocation ( + IN UINTN PhysicalFunc + ) +/*++ + +Routine Description: + + Allocate memory and create the PageTable to set up physical-virtual map. + +Arguments: + + PhysicalFunc - Physical address where RuntimeTestFunc locates. + +Returns: + + EFI_STATUS + +--*/ +{ + EFI_STATUS Status; + EFI_PHYSICAL_ADDRESS AllocateMemory; + + //create new page tables or use existing page tables. + // + // Allocate PageTable memory close to this Application image location in + // the system memory. In this way, it is safe for page table memory. + // + AllocateMemory =3D PhysicalFunc; + + Status =3D tBS->AllocatePages ( + AllocateMaxAddress, + EfiRuntimeServicesData, + 1, + &AllocateMemory + ); + + if (EFI_ERROR(Status)) { + return Status; + } + + PageTable =3D (UINTN)AllocateMemory; + return EFI_SUCCESS; +} + + +VOID +PrepareVirtualAddressMap ( + IN UINTN MemoryMapSize, + IN UINTN DescriptorSize, + IN EFI_MEMORY_DESCRIPTOR *MemoryMap, + IN EFI_MEMORY_DESCRIPTOR *VirtualMemoryMap, + IN OUT UINTN *VirtualMapSize + ) +/*++ + +Routine Description: + + Construct VirtualAddressMap from physical address to virtual address + +Arguments: + + MemoryMapSize - The size, in bytes, of the MemoryMap buffer + DescriptorSize - The size, in bytes, of an individual EFI_MEMORY_DESC= RIPTOR + MemoryMap - A pointer to the current memory map + VirtualMemoryMap - A pointer to the modified virtual memory map + VirtualMapSize - A pointer to the size, in bytes, of the VirtualMemor= yMap buffer + +Returns: + + NONE + +--*/ +{ + UINTN Index; + *VirtualMapSize =3D 0; + + // + // Copy entries that need runtime mapping to construct virtualMemoryMap + // + for (Index =3D 0; Index < (MemoryMapSize / DescriptorSize); Index++) { + if ((MemoryMap->Attribute & EFI_MEMORY_RUNTIME) =3D=3D EFI_MEMORY_RUNT= IME) { + SctCopyMem ((VOID *) VirtualMemoryMap, (VOID *) MemoryMap, Descripto= rSize); + VirtualMemoryMap->VirtualStart =3D VirtualMemoryMap->PhysicalStart; + *VirtualMapSize +=3D DescriptorSize; + VirtualMemoryMap =3D NextMemoryDescriptor (VirtualMemoryMap, Descrip= torSize); + } + + MemoryMap =3D NextMemoryDescriptor (MemoryMap, DescriptorSize); + } +} + + + +VOID +JumpVirtualMode( + IN UINTN VirtualFunc, + IN UINTN HandOffAddr + ) +/*++ + +Routine Description: + + Enable virtual addressing mode, and jump to RuntimeTestFunc in virtual a= ddress + +Arguments: + + VirtualFunc - RuntimeTestFunc virtual address + HandOffAddr - Configuration Data Address + +Returns: + + NONE + +--*/ +{ + // + // Note: It is assumed that the MMU and page tables are configured on AR= M platforms + // based on ARM v5 v6 and v7 architecture. + // + /* FIXME: Is it the same on ARM v8? */ + JumpToTestFunc(VirtualFunc, HandOffAddr); +} diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c b/uefi-sct/Sct= Pkg/SCRT/SCRTDriver/Riscv64/Debug.c new file mode 100644 index 00000000..6161d596 --- /dev/null +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c @@ -0,0 +1,88 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ + +/*++ + +Module Name: + + Debug.c + +--*/ + +#include "SCRTDriver.h" + +UINTN mHandOffPtr =3D 0; +EFI_PHYSICAL_ADDRESS mIoPortSpaceAddress =3D 0; + + +EFI_STATUS +ConsumeHandOff ( + IN UINTN HandOffAddr, + OUT CONF_INFO *ConfigData + ) +{ + RUNTIME_HANDOFF *HandOffPtr; + // + // First fix the memory address of hand off data. + // + FixAddress(&HandOffAddr); + mHandOffPtr =3D HandOffAddr; + HandOffPtr =3D (RUNTIME_HANDOFF*)mHandOffPtr; + *ConfigData =3D HandOffPtr->ConfigureInfo; + + if (!HandOffPtr->DebuggerInfo.MmioFlag){ + // + // If debug port is I/O mapped, fix IoBase Address. + // + FixAddress(&HandOffPtr->DebuggerInfo.IoBase); + mIoPortSpaceAddress =3D HandOffPtr->DebuggerInfo.IoBase; + } else { + // + // If debug port is MMIO, fix MmioBase Address. + // + FixAddress(&HandOffPtr->DebuggerInfo.MmioBase); + } + + return EFI_SUCCESS; +} + + +EFI_STATUS +Send2UART ( + CHAR8 *String + ) +{ + // + // TODO: On ARM platforms use platform specific functions to + // write the data to UART. + // + return EFI_SUCCESS; +} + + + +EFI_STATUS +DebugWorker ( + IN CHAR8 *String + ) +{ + EFI_STATUS Status; + + // + // Send text message to registered UART. + // + Status =3D Send2UART(String); + return Status; +} diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Dump.c b/uefi-sct/SctP= kg/SCRT/SCRTDriver/Riscv64/Dump.c new file mode 100644 index 00000000..cc8d9869 --- /dev/null +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Dump.c @@ -0,0 +1,68 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ + +/*++ + +Module Name: + + Dump.c + +--*/ + +#include "SCRTDriver.h" + +VOID +DumpRuntimeTable() +{ + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DDump Runti= me Table=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("Header Signature =3D 0x%x\n", VRT->Hdr.Signature); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DGetTime Se= rvice=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("GetTime @ 0x%x\n", VRT->GetTime); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DSetTime Se= rvice=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("SetTime @ 0x%x\n", VRT->SetTime); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DGetWakeupT= ime Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("GetWakeupTime @ 0x%x\n", VRT->GetWakeupTime); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DSetWakeupT= ime Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("SetWakeupTime @ 0x%x\n", VRT->SetWakeupTime); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DGetVariabl= e Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("GetVariable @ 0x%x\n", VRT->GetVariable); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DGetNextVar= iableName Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("GetNextVariableName @ 0x%x\n", VRT->GetNextVariableName); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DSetVariabl= e Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("SetVariable @ 0x%x\n", VRT->SetVariable); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DGetNextHig= hMonotonicCount Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("GetNextHighMonotonicCount @ 0x%x\n", VRT->GetNextHighMonoton= icCount); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DResetSyste= m Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("ResetSystem @ 0x%x\n", VRT->ResetSystem); +#if 0 + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DUpdateCaps= ule Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("UpdateCapsule @ 0x%x\n", VRT->UpdateCapsule); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DQueryCapsu= leCapabilities Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("QueryCapsuleCapabilities @ 0x%x\n", VRT->QueryCapsuleCapabil= ities); + + SctAPrint ("\n=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3DQueryVaria= bleInfo Service=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D\n"); + SctAPrint ("QueryVariableInfo @ 0x%x\n", VRT->QueryVariableInfo); +#endif +} diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c b/uefi-sct/SctPkg= /SCRT/SCRTDriver/Riscv64/Io.c new file mode 100644 index 00000000..b925e151 --- /dev/null +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c @@ -0,0 +1,134 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ + +/*++ + +Module Name: + + Io.c + +--*/ + +#include "Io.h" + +EFI_STATUS +EFIAPI +CpuIoServiceWrite ( + IN EFI_PEI_CPU_IO_PPI_WIDTH Width, + IN UINT64 UserAddress, + IN UINTN Count, + IN VOID *UserBuffer + ) +/*++ + +Routine Description: + + Perform the port I/O write service + +Arguments: + + Width - Width of the port I/O operation + Address - Base address of the port I/O operation + Count - Count of the number of accesses to perform + Buffer - Pointer to the source buffer from which to write data + +Returns: + + EFI_SUCCESS - The data was written. + EFI_INVALID_PARAMETER - Width is invalid. + EFI_INVALID_PARAMETER - Buffer is NULL. + EFI_UNSUPPORTED - The Buffer is not aligned for the given Width. + EFI_UNSUPPORTED - The address range specified by Address, Width, + and Count is not valid. + +--*/ +{ + return EFI_UNSUPPORTED; +} + + +EFI_STATUS +EfiIoWrite ( + IN EFI_PEI_CPU_IO_PPI_WIDTH Width, + IN UINT64 Address, + IN UINTN Count, + IN OUT VOID *Buffer + ) +/*++ + +Routine Description: + Perform an IO write into Buffer. + +Arguments: + Width - Width of write transaction, and repeat operation to use + Address - IO address to write + Count - Number of times to write the IO address. + Buffer - Buffer to write data from. size is Width * Count + +Returns: + Status code + +--*/ +{ + return CpuIoServiceWrite(Width, Address, Count, Buffer); +} + + +EFI_STATUS +EfiIoRead ( + IN EFI_PEI_CPU_IO_PPI_WIDTH Width, + IN UINT64 Address, + IN UINTN Count, + IN OUT VOID *Buffer + ) +/*++ + +Routine Description: + Perform an IO read into Buffer. + +Arguments: + Width - Width of read transaction, and repeat operation to use + Address - IO address to read + Count - Number of times to read the IO address. + Buffer - Buffer to read data into. size is Width * Count + +Returns: + Status code + +--*/ +{ + return EFI_UNSUPPORTED; +} + + +VOID +FixAddress ( + IN UINTN *PhyAddress + ) +{ + // + //Note: On ARM platforms don't have to do this as all the functions are = virtually mapped. + // +} + +// Quick port to ARM + +VOID +Port80 ( + UINT8 Number + ) +{ + //EFI_SCT_DEBUG ((EFI_SCT_D_ERROR, L"Port80 %02x", Number)); +} diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.h b/uefi-sct/SctPkg= /SCRT/SCRTDriver/Riscv64/Io.h new file mode 100644 index 00000000..1e78b3e4 --- /dev/null +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.h @@ -0,0 +1,48 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ + +/*++ + +Module Name: + + Debug.h + +--*/ + +#ifndef _IA32_IO_ACCESS_H +#define _IA32_IO_ACCESS_H + +#include "SCRTDriver.h" + +#define IA32_MAX_IO_ADDRESS 0xFFFF + +#define IA32API + + +typedef union { + UINT8 VOLATILE *buf; + UINT8 VOLATILE *ui8; + UINT16 VOLATILE *ui16; + UINT32 VOLATILE *ui32; + UINT64 VOLATILE *ui64; + UINTN VOLATILE ui; +} PTR; + +// This address is assuming a pure PC architecture. Not required? +#define VIRT_TO_PHYS_OFFSET (0x80000000) //2G + + + +#endif diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/DebugSupportBBTestCacheFunction.c b/uefi-sct/SctPkg/TestCase= /UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv64/DebugSupportBBTestCach= eFunction.c new file mode 100644 index 00000000..96ee7b57 --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestCacheFunction.c @@ -0,0 +1,137 @@ +/** @file + + Copyright 2006 - 2016 Unified EFI, Inc.
+ Copyright (c) 2011 - 2016, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + DebugSupportBBTestCacheFunction.c + +Abstract: + + Interface Function Test Cases of Debug Support Protocol + +--*/ + + +#include "DebugSupportBBTestMain.h" + +/** + * Entrypoint for EFI_DEBUG_SUPPORT_PROTOCOL.InvalidateInstructionCache()= Function Test. + * @param This a pointer of EFI_BB_TEST_PROTOCOL. + * @param ClientInterface a pointer to the interface to be tested. + * @param TestLevel test "thoroughness" control. + * @param SupportHandle a handle containing protocols required. + * @return EFI_SUCCESS Finish the test successfully. + */ +// +// TDS 3.5 +// +EFI_STATUS +BBTestInvalidateInstructionCacheFunctionAutoTest ( + IN EFI_BB_TEST_PROTOCOL *This, + IN VOID *ClientInterface, + IN EFI_TEST_LEVEL TestLevel, + IN EFI_HANDLE SupportHandle + ) +{ + EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib; + EFI_STATUS Status; + EFI_DEBUG_SUPPORT_PROTOCOL *DebugSupport; + EFI_TEST_ASSERTION AssertionType; + UINT64 Start; + UINT64 Length; + UINTN MaxProcessorIndex; + UINTN ProcessorIndex; + + // + // Get the Standard Library Interface + // + Status =3D gtBS->HandleProtocol ( + SupportHandle, + &gEfiStandardTestLibraryGuid, + (VOID **) &StandardLib + ); + + if (EFI_ERROR(Status)) { + StandardLib->RecordAssertion ( + StandardLib, + EFI_TEST_ASSERTION_FAILED, + gTestGenericFailureGuid, + L"BS.HandleProtocol - Handle standard test library", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + return Status; + } + + DebugSupport =3D (EFI_DEBUG_SUPPORT_PROTOCOL *)ClientInterface; + + if (DebugSupport->Isa !=3D PlatformIsa) { + return EFI_SUCCESS; + } + + Status =3D DebugSupport->GetMaximumProcessorIndex (DebugSupport, &MaxPro= cessorIndex); + if (EFI_ERROR(Status)) { + StandardLib->RecordAssertion ( + StandardLib, + EFI_TEST_ASSERTION_FAILED, + gTestGenericFailureGuid, + L"EFI_DEBUG_SUPPORT_PROTOCOL.GetMaximumProcessorIndex", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + return Status; + } + + for (ProcessorIndex =3D 0; ProcessorIndex <=3D MaxProcessorIndex; Proces= sorIndex++) { + + // + // Assertion Point 3.5.2.1 + // Invoke InvalidateInstructionCache and verify interface correctness. + // + + // The Physical base of the memory range to be invalidated. + Start =3D 0x0; + + // The minimum number of bytes in the processor's instruction cache to= be invalidated. + Length =3D 0x0; + + Status =3D DebugSupport->InvalidateInstructionCache (DebugSupport, Pro= cessorIndex, (VOID*)&Start, Length); + + if (EFI_ERROR(Status)) { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } + + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gDebugSupportBBTestFunctionAssertionGuid015, + L"EFI_DEBUG_SUPPORT_PROTOCOL.InvalidateInstructionCache -= Invoke this function and verify interface correctness", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + } + + return EFI_SUCCESS; +} + diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/DebugSupportBBTestExceptionCallbackFunction.c b/uefi-sct/Sct= Pkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv64/DebugSuppo= rtBBTestExceptionCallbackFunction.c new file mode 100644 index 00000000..c27c0c0c --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestExceptionCallbackFunction.c @@ -0,0 +1,276 @@ +/** @file + + Copyright 2006 - 2016 Unified EFI, Inc.
+ Copyright (c) 2011 - 2016, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + DebugSupportBBExceptionCallbackFunction.c + +Abstract: + + Interface Function Test Cases of Debug Support Protocol + +--*/ + + +#include "DebugSupportBBTestMain.h" + +extern volatile UINTN InvokedExceptionCallback; +extern volatile UINTN InvokedPeriodicCallback; + +extern EFI_INSTRUCTION_SET_ARCHITECTURE PlatformIsa; + +void +SoftwareBreak ( + void + ) +{ + // Not ported to ARM yet + ASSERT (FALSE); +} + +/** + * Entrypoint for EFI_DEBUG_SUPPORT_PROTOCOL.RegisterExceptionCallback() = Function Test. + * @param This a pointer of EFI_BB_TEST_PROTOCOL. + * @param ClientInterface a pointer to the interface to be tested. + * @param TestLevel test "thoroughness" control. + * @param SupportHandle a handle containing protocols required. + * @return EFI_SUCCESS Finish the test successfully. + */ +// +// TDS 3.4 +// +EFI_STATUS +BBTestRegisterExceptionCallbackFunctionManualTest ( + IN EFI_BB_TEST_PROTOCOL *This, + IN VOID *ClientInterface, + IN EFI_TEST_LEVEL TestLevel, + IN EFI_HANDLE SupportHandle + ) +{ + EFI_STANDARD_TEST_LIBRARY_PROTOCOL *StandardLib; + EFI_STATUS Status; + EFI_DEBUG_SUPPORT_PROTOCOL *DebugSupport; + EFI_TEST_ASSERTION AssertionType; + + DebugSupport =3D (EFI_DEBUG_SUPPORT_PROTOCOL *)ClientInterface; + + if (DebugSupport->Isa !=3D PlatformIsa) { + return EFI_SUCCESS; + } + + // + // Get the Standard Library Interface + // + Status =3D gtBS->HandleProtocol ( + SupportHandle, + &gEfiStandardTestLibraryGuid, + (VOID **) &StandardLib + ); + + if (EFI_ERROR(Status)) { + StandardLib->RecordAssertion ( + StandardLib, + EFI_TEST_ASSERTION_FAILED, + gTestGenericFailureGuid, + L"BS.HandleProtocol - Handle standard test library", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + return Status; + } + + // + // Assertion Point 3.4.2.1 + // Invoke RegisterExceptionCallback() to install an interrupt handler fu= nction. + // + InvokedExceptionCallback =3D FALSE; + // FIXME: Is it normal that we use EXCEPT_IA32_BREAKPOINT here? + // Shouldn't we define proper constants for ARM exceptions in DebugSuppo= rtProtocol.h file? + Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, Exc= eptionCallback, EXCEPT_IA32_BREAKPOINT); + + if ((Status =3D=3D EFI_SUCCESS) || (Status =3D=3D EFI_ALREADY_STARTED)) { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gDebugSupportBBTestFunctionAssertionGuid009, + L"EFI_DEBUG_SUPPORT_PROTOCOL.RegisterExceptionCallback - = Invoke this function and verify interface correctness", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + // + // If the callback function is already registed, return + // + if (EFI_ERROR(Status)) { + return EFI_SUCCESS; + } + + // + // Test the callback function registed. + // + + // + // Call SoftwareBreak to invoke the interrupt handler function. + // + SoftwareBreak (); + + if (InvokedExceptionCallback =3D=3D FALSE) { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } + + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gDebugSupportBBTestFunctionAssertionGuid010, + L"EFI_DEBUG_SUPPORT_PROTOCOL.RegisterExceptionCallback - = Verify the callback function was invoked.", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + // + // Assertion Point 3.4.2.2 + // Invoke RegisterPeriodicCallback() to install the Periodic interrupt h= andler function. + // Verify the two callback functions can be both invoked. + // + InvokedExceptionCallback =3D FALSE; + InvokedPeriodicCallback =3D FALSE; + + Status =3D DebugSupport->RegisterPeriodicCallback (DebugSupport, 0, Peri= odicCallback); + if (EFI_ERROR(Status)) { + return Status; + } + + // + // Wait the PeriodicCallback to be invoked. + // + gtBS->Stall (500000); + + // + // Call SoftwareBreak to invoke the interrupt handler function. + // + SoftwareBreak (); + + if ((InvokedExceptionCallback =3D=3D TRUE) && (InvokedPeriodicCallback = =3D=3D TRUE)) { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } + + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gDebugSupportBBTestFunctionAssertionGuid011, + L"EFI_DEBUG_SUPPORT_PROTOCOL.RegisterExceptionCallback - = Verify the two callback functions can be both invoked.", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + // + // Uninstall the Periodic callback function. + // + Status =3D DebugSupport->RegisterPeriodicCallback (DebugSupport, 0, NULL= ); + if (EFI_ERROR(Status)) { + return Status; + } + + // + // Assertion Point 3.4.2.3 + // Invoke RegisterExceptionCallback() to install another interrupt handl= er function. + // + Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, Exc= eptionCallback1, EXCEPT_IA32_BREAKPOINT); + + if (Status !=3D EFI_ALREADY_STARTED) { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } + + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gDebugSupportBBTestFunctionAssertionGuid012, + L"EFI_DEBUG_SUPPORT_PROTOCOL.RegisterExceptionCallback - = Register another callback function.", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + // + // Assertion Point 3.4.2.4 + // Invoke RegisterExceptionCallback() to unstall the interrupt handler f= unction. + // + Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, NUL= L, EXCEPT_IA32_BREAKPOINT); + + if (EFI_ERROR(Status)) { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } + + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gDebugSupportBBTestFunctionAssertionGuid013, + L"EFI_DEBUG_SUPPORT_PROTOCOL.RegisterExceptionCallback - = Invoke this function to uninstall the interrupt handler function", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + InvokedExceptionCallback =3D FALSE; + + // + // Call SoftwareBreak to invoke the interrupt handler function. + // + SoftwareBreak (); + + if (InvokedExceptionCallback !=3D FALSE) { + AssertionType =3D EFI_TEST_ASSERTION_FAILED; + } else { + AssertionType =3D EFI_TEST_ASSERTION_PASSED; + } + + StandardLib->RecordAssertion ( + StandardLib, + AssertionType, + gDebugSupportBBTestFunctionAssertionGuid014, + L"EFI_DEBUG_SUPPORT_PROTOCOL.RegisterExceptionCallback - = Verify the callback function wasn't invoked", + L"%a:%d:Status - %r", + __FILE__, + (UINTN)__LINE__, + Status + ); + + return EFI_SUCCESS; +} + diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/PlatformIsa.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/D= ebugSupport/BlackBoxTest/Riscv64/PlatformIsa.c new file mode 100644 index 00000000..8334f601 --- /dev/null +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/PlatformIsa.c @@ -0,0 +1,30 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2011 - 2012, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + PlatformIsa.c + +Abstract: + + Platform related Isa definition. + +--*/ + +#include "DebugSupportBBTestMain.h" + +EFI_INSTRUCTION_SET_ARCHITECTURE PlatformIsa =3D IsaAArch64; + diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/R= iscv64/EntsLibPlat.h b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENT= S/EasLib/Riscv64/EntsLibPlat.h new file mode 100644 index 00000000..ff781aee --- /dev/null +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= EntsLibPlat.h @@ -0,0 +1,55 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2010 - 2012, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + EntsLibPlat.h + +Abstract: + + AArch64 specific defines + +--*/ + +#ifndef _EFI_LIB_PLAT_H_ +#define _EFI_LIB_PLAT_H_ + +#define MIN_ALIGNMENT_SIZE 8 + +VOID +EntsInitializeLibPlatform ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +/*++ + +Routine Description: + + Initialize platform. + +Arguments: + + ImageHandle - The image handle. + SystemTable - The system table. + +Returns: + + None. + +--*/ +; + +#endif diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/R= iscv64/InitPlat.c b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/E= asLib/Riscv64/InitPlat.c new file mode 100644 index 00000000..70a509a4 --- /dev/null +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= InitPlat.c @@ -0,0 +1,55 @@ +/** @file + + Copyright 2006 - 2012 Unified EFI, Inc.
+ Copyright (c) 2010 - 2012, ARM Ltd. All rights reserved.
+ + This program and the accompanying materials + are licensed and made available under the terms and conditions of the BS= D License + which accompanies this distribution. The full text of the license may b= e found at=20 + http://opensource.org/licenses/bsd-license.php +=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. +=20 +**/ +/*++ + +Module Name: + + InitPlat.c + +Abstract: + + Math routines for compatibility with native EFI library routines. + +--*/ + +#include "Efi.h" +#include "EntsLibPlat.h" + +VOID +EntsInitializeLibPlatform ( + IN EFI_HANDLE ImageHandle, + IN EFI_SYSTEM_TABLE *SystemTable + ) +/*++ + +Routine Description: + + Initialize platform. + +Arguments: + + ImageHandle - The image handle. + SystemTable - The system table. + +Returns: + + None. + +--*/ +{ + // + // No platform-specific initializations + // +} --=20 2.30.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#72420): https://edk2.groups.io/g/devel/message/72420 Mute This Topic: https://groups.io/mt/81069865/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat Apr 27 15:40:32 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+72421+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+72421+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=hpe.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1614828117963783.2111818950068; Wed, 3 Mar 2021 19:21:57 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id yLlvYY1788612xuWCcIDJLZ4; Wed, 03 Mar 2021 19:21:56 -0800 X-Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) by mx.groups.io with SMTP id smtpd.web10.1900.1614828111155287793 for ; Wed, 03 Mar 2021 19:21:51 -0800 X-Received: from pps.filterd (m0134421.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 1243J0CC029131; Thu, 4 Mar 2021 03:21:45 GMT X-Received: from g2t2353.austin.hpe.com (g2t2353.austin.hpe.com [15.233.44.26]) by mx0b-002e3701.pphosted.com with ESMTP id 372nt2gj07-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 04 Mar 2021 03:21:45 +0000 X-Received: from G2W6310.americas.hpqcorp.net (g2w6310.austin.hp.com [16.197.64.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g2t2353.austin.hpe.com (Postfix) with ESMTPS id 85C016D; Thu, 4 Mar 2021 03:21:44 +0000 (UTC) X-Received: from G1W8107.americas.hpqcorp.net (2002:10c1:483b::10c1:483b) by G2W6310.americas.hpqcorp.net (2002:10c5:4034::10c5:4034) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 4 Mar 2021 03:21:44 +0000 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (15.241.52.11) by G1W8107.americas.hpqcorp.net (16.193.72.59) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 4 Mar 2021 03:21:43 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cM03vNkFzphF6qeH3OBiq9LNFyeN8QM09IqJfT2mBo3NJAR/pf4eCYag1LWur7WX/14guYzXGrZUKqMAMiJEJXr+vcDEYtuJhgnphTbNaIf40v6FnzaiUW/YFzg7u77sOZyFG+GQAt1ZO97ArxE2HOTklea3QdYlXTjbqTOoPcDd5sI9eicr7aA70MjxG/Vqb6ZcNe963nDndiB+UpEHbwCs5BCJlUW9QQRme07GQ1bSJaI03Nq7qTr7A/KRbguIKG+i1RX2rhQS22A4A8SwZMBB0NmXlINcZkv5d27Hsa1JRzSnLh4wOicxox8xSJBPmvzCEybIZ9q9DPftNPrB0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=wrv6qIE+5n1hsQZXh+wOkRHQqf25ummAusNoEaY6RnQ=; b=WoudCgKjsjpccCtWr6DmEjTLDi3u53pL8ktqGcA7AxMePxoNJPoqrzh0JzBR4uELODQjYu4LPQkObtygRz06EJ3Jmd4P7YxY+yxQIGAtv36eL2K9tJ80d+zp5AYnIwuGO39OdwRD8XakycYsVUV9f+2fGsdDK5/gcc+mSCnLSGcVSuxC961Yumj9hTzDnJ3RTp2mH6yW7f7Qbx54jRi5l2X4wRnxopO3B9PdBARqCcu+0pNSs1vVTmBvfH4A0ToBxUUkhD2sCy/yIgnbNVlqBk3Uq/fDl+J82wxFn67L8AE70POaeSh/c58YYOHwQqgbNyXyobD9Q+24idrlg49vmQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) by DF4PR8401MB0506.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7606::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Thu, 4 Mar 2021 03:21:42 +0000 X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318]) by DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318%7]) with mapi id 15.20.3912.017; Thu, 4 Mar 2021 03:21:42 +0000 From: "Daniel Schaefer" To: CC: G Edhaya Chandran , Barton Gao , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Leif Lindholm , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [edk2-test PATCHv3 2/5] SctPkg: Adapt Aarch64 sources for Riscv64 Date: Thu, 4 Mar 2021 11:21:13 +0800 Message-ID: <20210304032116.24357-3-daniel.schaefer@hpe.com> In-Reply-To: <20210304032116.24357-1-daniel.schaefer@hpe.com> References: <20210304032116.24357-1-daniel.schaefer@hpe.com> X-Originating-IP: [15.211.146.34] X-ClientProxiedBy: SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) To DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) X-MS-Exchange-MessageSentRepresentingType: 1 X-Received: from x360-nix.wireless.hpe.com (15.211.146.34) by SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend Transport; Thu, 4 Mar 2021 03:21:39 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 428e7650-7e66-4828-2e17-08d8debca1c6 X-MS-TrafficTypeDiagnostic: DF4PR8401MB0506: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:9508; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData: =?us-ascii?Q?lrzUG0aYtA7ldb6lAlpeLj/EGtbRR3SVx5E2U/mfj/Vzd39iiAx4tZQTwx7J?= =?us-ascii?Q?dn+YWJmHxm6hDT49OTzuehwAGLY2JmePyi3mFdX4+3288FC59AGl8Ek6tDs8?= =?us-ascii?Q?T71jLPH+lznsTSRjDvogEt1P2GoOQqgJb6ojbueNQ92vUACyYb+a5sU5JLS6?= =?us-ascii?Q?Bjh0qnlUglWj2/kAatKIRSSELDD2PiqXc/NBfZjAoOG70TtE5UxYTLeDMsaA?= =?us-ascii?Q?jkvGPdKwGSyZyVBamwagU5S9aNGWCkuTFaJhNOLOhOEDgF2ptUet+JjIhr/q?= =?us-ascii?Q?w5zihh0QbQ9+NJgIrNcl9Tb9lUgkyOEPPOVxTMnOXqa2TBPja6Eunn3aGsXU?= =?us-ascii?Q?DrJIkSoJG7x/h/VGMee0cYQWWd8LKdhns0MWprtclh6vC7Eoep4nBiKkOu+j?= =?us-ascii?Q?cD98JImZNjwzndiVxIVOE+QciXzEVGtoGYkCeC7B7kcNDpT9IDIXMCOIAoBW?= =?us-ascii?Q?Z/uCRN1ecufa2F9tJiRNduwUPUZWzrYaTvSjaBjEAA6qHuOWa+4wFSfdrFWK?= =?us-ascii?Q?ZeOgRn3si6OW3LzSjshYzlF7D2WrvlX/id8jMwv7MdeTkeUiizuCB20Gi2Rj?= =?us-ascii?Q?oAfhJ7jDCO3RJMT1eMTkmvNrK5MRVUnLDInxfjtTuHsi18LLiJPprIP9AAmP?= =?us-ascii?Q?TCEu9q+g6huhR0B2Wuhvwoac1oTMtUZxs/l5W9hgTnS+ahnoXEOjxZuLnNO3?= =?us-ascii?Q?sqdNw+pEklUIvz++y2CiSx6W0pbByX2bsgsZ6Ku8dOwtAxjxtjM1PlXtX6EC?= =?us-ascii?Q?k0JC4LET+zpy91yPCHg/usvgmEevJXGl5j0IbJr1Hez8d0wiS7o9fN6sOIrn?= =?us-ascii?Q?LJ3jhvY3+meRrwStjOx40wS79Xnb0bzbY/fSII3QrFXBtM/K9ytaQX+gSCRI?= =?us-ascii?Q?kzgL+YBjec8h31MpElIXIqdGNtTrFR1kLoifXOdk7blBvYztmuGcQuMn3nFb?= =?us-ascii?Q?OSR7DF8yXFzgyaGJuNgpkx/fOWmnfwvOzko3OMLNSGOP3JxoloNlEth1sSm0?= =?us-ascii?Q?pI3bfx3Y1gOABXitEb+vuhfdgcNtGBZlnbKFA+px5SK58kjxQ5Zm0b8K2Tb1?= =?us-ascii?Q?EiD30ZrJQ/VGTpChA4BCM/UAKTYlFKhtYplxgxMckYNeZPQ1mbvrH5QzedXy?= =?us-ascii?Q?7xj97Cv6KlpK+aeaAmyVGBpR8OnhgLAAzVW0nXAIcbTMhIn/IvUutOnjR6XR?= =?us-ascii?Q?SM14Rfqvf0zeej1+rcX9KUEWhBsyhQ7kDSggO+vgl2g4G8aNN27va3cHy3eD?= =?us-ascii?Q?RKnRexhq4lRoou4Lz803TT7gSiWe9kuYs0Bwbkgj+vIVG5u/8ChSEgOL1Eo0?= =?us-ascii?Q?hnod/kYXEasqzKC+LB/V9E3b?= X-MS-Exchange-CrossTenant-Network-Message-Id: 428e7650-7e66-4828-2e17-08d8debca1c6 X-MS-Exchange-CrossTenant-AuthSource: DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2021 03:21:42.6260 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: MCtc2WmLm0Njgitp1srylLrSaWRifHRranVN897JK59Kn1iIvYlLmm/tBmj5q3hVIEP4FHURgOCXOkvt2RA0rQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DF4PR8401MB0506 X-OriginatorOrg: hpe.com X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,daniel.schaefer@hpe.com X-Gm-Message-State: ZssjpDyVUwlis9CvIXa3V7s9x1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1614828116; bh=r93BZCt7FJJRaWtDCw0P4gKYH2hoJ5JEJjATSFVxZcQ=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=wqbFGVaJAPyk+eWzF6BZZjSXi7vXgS/ZzQf0VwC37cMReYrfslrBQxXxEQIYSIZqImH H7aAqGmKDJqlBfn1DGZ1l53FYVyOJu34JJJWLsKg1z+T1Y/LgNwesyNaRPOVSx1FBQsM3 3qZjAePbna48ovrhM0QDo9O6fbFCdeO8BBM= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D3042 Cc: G Edhaya Chandran Cc: Barton Gao Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Leif Lindholm Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Daniel Schaefer Reviewed-by: Abner Chang Reviewed-by: Sunny Wang --- uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h = | 3 +- uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S = | 9 ++-- uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c = | 16 +++---- uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c = | 22 +++------ uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c = | 7 +-- uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.h = | 48 -------------------- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/DebugSupportBBTestExceptionCallbackFunction.c | 12 ++--- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/PlatformIsa.c | 4 +- uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/EntsL= ibPlat.h | 3 +- 9 files changed, 32 insertions(+), 92 deletions(-) diff --git a/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h b/uefi-sct= /SctPkg/Library/SctLib/Riscv64/SctLibPlat.h index ee7c656b..69e7f904 100644 --- a/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h +++ b/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h @@ -2,6 +2,7 @@ =20 Copyright 2006 - 2012 Unified EFI, Inc.
Copyright (c) 2011 - 2012, ARM Ltd. All rights reserved.
+ Copyright (c) 2021, Hewlett Packard Enterprise Development LP. All right= s reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -20,7 +21,7 @@ Module Name: =20 Abstract: =20 - AArch64 specific defines + RISCV64 specific defines =20 --*/ =20 diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S b/uefi-sct/Sc= tPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S index d223b36b..ae33da18 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S @@ -2,6 +2,7 @@ # # Copyright 2010 - 2012 Unified EFI, Inc.
# Copyright (c) 2012, ARM Ltd. All rights reserved.
+# Copyright (c) 2021, Hewlett Packard Enterprise Development LP.
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -23,8 +24,6 @@ #--*/ #start of the code section .text -/* FIXME: Should alignment be different on Aarch64? */ -.align 3 =20 .global JumpToTestFunc .type JumpToTestFunc, %function @@ -37,8 +36,8 @@ # ) # JumpToTestFunc: - mov x2, x0 - mov x0, x1 + mv x2, x0 + mv x0, x1 =20 // Jump to Virtual function - blr x2 + jalr x2 diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c b/uefi-sc= t/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c index 397b3514..00b59594 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c @@ -2,6 +2,7 @@ =20 Copyright 2006 - 2012 Unified EFI, Inc.
Copyright (c) 2012, ARM Ltd. All rights reserved.
+ Copyright (c) 2021, Hewlett Packard Enterprise Development LP. All right= s reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -22,9 +23,6 @@ Module Name: =20 #include "SCRTApp.h" =20 -#define VIRT_TO_PHYS_OFFSET (0x80000000) //2G - -BOOLEAN HighAddress =3D FALSE; UINTN PageTable =3D 0; =20 =20 @@ -49,11 +47,10 @@ Returns: =20 --*/ { - /*Note: It is presumed that on ARM v5, V6 and V7 architectures - * the MMU is configured and enabled in PEI phase. As VirtualFunc - * is already mapped to virtual memory, don't have to do anything here. + /* Note: It is presumed that on RISCV architectures the MMU is configure= d and + * enabled in PEI phase. As VirtualFunc is already mapped to virtual mem= ory, + * don't have to do anything here. */ - /* FIXME: Is it the same on ARM v8? */ } =20 =20 @@ -174,9 +171,8 @@ Returns: --*/ { // - // Note: It is assumed that the MMU and page tables are configured on AR= M platforms - // based on ARM v5 v6 and v7 architecture. + // Note: It is assumed that the MMU and page tables are configured on RI= SC-V + // platforms. // - /* FIXME: Is it the same on ARM v8? */ JumpToTestFunc(VirtualFunc, HandOffAddr); } diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c b/uefi-sct/Sct= Pkg/SCRT/SCRTDriver/Riscv64/Debug.c index 6161d596..2991935a 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c @@ -1,7 +1,8 @@ /** @file =20 Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
+ Copyright (c) 2021 Hewlett Packard Enterprise Development LP. All rights= reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -24,7 +25,6 @@ Module Name: #include "SCRTDriver.h" =20 UINTN mHandOffPtr =3D 0; -EFI_PHYSICAL_ADDRESS mIoPortSpaceAddress =3D 0; =20 =20 EFI_STATUS @@ -42,18 +42,10 @@ ConsumeHandOff ( HandOffPtr =3D (RUNTIME_HANDOFF*)mHandOffPtr; *ConfigData =3D HandOffPtr->ConfigureInfo; =20 - if (!HandOffPtr->DebuggerInfo.MmioFlag){ - // - // If debug port is I/O mapped, fix IoBase Address. - // - FixAddress(&HandOffPtr->DebuggerInfo.IoBase); - mIoPortSpaceAddress =3D HandOffPtr->DebuggerInfo.IoBase; - } else { - // - // If debug port is MMIO, fix MmioBase Address. - // - FixAddress(&HandOffPtr->DebuggerInfo.MmioBase); - } + // + // Fix MmioBase Address. + // + FixAddress(&HandOffPtr->DebuggerInfo.MmioBase); =20 return EFI_SUCCESS; } @@ -65,7 +57,7 @@ Send2UART ( ) { // - // TODO: On ARM platforms use platform specific functions to + // TODO: On RISC-V platforms use platform specific functions to // write the data to UART. // return EFI_SUCCESS; diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c b/uefi-sct/SctPkg= /SCRT/SCRTDriver/Riscv64/Io.c index b925e151..255cb9a6 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c @@ -2,6 +2,7 @@ =20 Copyright 2006 - 2012 Unified EFI, Inc.
Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + (C) Copyright 2021 Hewlett Packard Enterprise Development LP
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -21,7 +22,7 @@ Module Name: =20 --*/ =20 -#include "Io.h" +#include "SCRTDriver.h" =20 EFI_STATUS EFIAPI @@ -119,11 +120,11 @@ FixAddress ( ) { // - //Note: On ARM platforms don't have to do this as all the functions are = virtually mapped. + //Note: On RISC-V platforms don't have to do this as all the functions a= re virtually mapped. // } =20 -// Quick port to ARM +// Quick port to RISC-V. It doesn't have traditional I/O-Port 80h POST Cod= es =20 VOID Port80 ( diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.h b/uefi-sct/SctPkg= /SCRT/SCRTDriver/Riscv64/Io.h deleted file mode 100644 index 1e78b3e4..00000000 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.h +++ /dev/null @@ -1,48 +0,0 @@ -/** @file - - Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 - - This program and the accompanying materials - are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 - http://opensource.org/licenses/bsd-license.php -=20 - THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, - WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 -**/ - -/*++ - -Module Name: - - Debug.h - ---*/ - -#ifndef _IA32_IO_ACCESS_H -#define _IA32_IO_ACCESS_H - -#include "SCRTDriver.h" - -#define IA32_MAX_IO_ADDRESS 0xFFFF - -#define IA32API - - -typedef union { - UINT8 VOLATILE *buf; - UINT8 VOLATILE *ui8; - UINT16 VOLATILE *ui16; - UINT32 VOLATILE *ui32; - UINT64 VOLATILE *ui64; - UINTN VOLATILE ui; -} PTR; - -// This address is assuming a pure PC architecture. Not required? -#define VIRT_TO_PHYS_OFFSET (0x80000000) //2G - - - -#endif diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/DebugSupportBBTestExceptionCallbackFunction.c b/uefi-sct/Sct= Pkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv64/DebugSuppo= rtBBTestExceptionCallbackFunction.c index c27c0c0c..c6e72806 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestExceptionCallbackFunction.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestExceptionCallbackFunction.c @@ -2,6 +2,7 @@ =20 Copyright 2006 - 2016 Unified EFI, Inc.
Copyright (c) 2011 - 2016, ARM Ltd. All rights reserved.
+ Copyright (c) 2021, Hewlett Packard Enterprise Development LP. All right= s reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -37,7 +38,7 @@ SoftwareBreak ( void ) { - // Not ported to ARM yet + // Not ported to RISC-V yet ASSERT (FALSE); } =20 @@ -99,9 +100,7 @@ BBTestRegisterExceptionCallbackFunctionManualTest ( // Invoke RegisterExceptionCallback() to install an interrupt handler fu= nction. // InvokedExceptionCallback =3D FALSE; - // FIXME: Is it normal that we use EXCEPT_IA32_BREAKPOINT here? - // Shouldn't we define proper constants for ARM exceptions in DebugSuppo= rtProtocol.h file? - Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, Exc= eptionCallback, EXCEPT_IA32_BREAKPOINT); + Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, Exc= eptionCallback, EXCEPT_RISCV_BREAKPOINT); =20 if ((Status =3D=3D EFI_SUCCESS) || (Status =3D=3D EFI_ALREADY_STARTED)) { AssertionType =3D EFI_TEST_ASSERTION_PASSED; @@ -205,7 +204,7 @@ BBTestRegisterExceptionCallbackFunctionManualTest ( // Assertion Point 3.4.2.3 // Invoke RegisterExceptionCallback() to install another interrupt handl= er function. // - Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, Exc= eptionCallback1, EXCEPT_IA32_BREAKPOINT); + Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, Exc= eptionCallback1, EXCEPT_RISCV_BREAKPOINT); =20 if (Status !=3D EFI_ALREADY_STARTED) { AssertionType =3D EFI_TEST_ASSERTION_FAILED; @@ -228,7 +227,7 @@ BBTestRegisterExceptionCallbackFunctionManualTest ( // Assertion Point 3.4.2.4 // Invoke RegisterExceptionCallback() to unstall the interrupt handler f= unction. // - Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, NUL= L, EXCEPT_IA32_BREAKPOINT); + Status =3D DebugSupport->RegisterExceptionCallback (DebugSupport, 0, NUL= L, EXCEPT_RISCV_BREAKPOINT); =20 if (EFI_ERROR(Status)) { AssertionType =3D EFI_TEST_ASSERTION_FAILED; @@ -273,4 +272,3 @@ BBTestRegisterExceptionCallbackFunctionManualTest ( =20 return EFI_SUCCESS; } - diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/PlatformIsa.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/D= ebugSupport/BlackBoxTest/Riscv64/PlatformIsa.c index 8334f601..8b23d91b 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/PlatformIsa.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/PlatformIsa.c @@ -2,6 +2,7 @@ =20 Copyright 2006 - 2012 Unified EFI, Inc.
Copyright (c) 2011 - 2012, ARM Ltd. All rights reserved.
+ Copyright (c) 2021, Hewlett Packard Enterprise Development LP. All right= s reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -26,5 +27,4 @@ Abstract: =20 #include "DebugSupportBBTestMain.h" =20 -EFI_INSTRUCTION_SET_ARCHITECTURE PlatformIsa =3D IsaAArch64; - +EFI_INSTRUCTION_SET_ARCHITECTURE PlatformIsa =3D IsaRiscv64; diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/R= iscv64/EntsLibPlat.h b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENT= S/EasLib/Riscv64/EntsLibPlat.h index ff781aee..144f812a 100644 --- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= EntsLibPlat.h +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= EntsLibPlat.h @@ -2,6 +2,7 @@ =20 Copyright 2006 - 2012 Unified EFI, Inc.
Copyright (c) 2010 - 2012, ARM Ltd. All rights reserved.
+ Copyright (c) 2021 Hewlett Packard Enterprise Development LP. All rights= reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -20,7 +21,7 @@ Module Name: =20 Abstract: =20 - AArch64 specific defines + RISCV64 specific defines =20 --*/ =20 --=20 2.30.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#72421): https://edk2.groups.io/g/devel/message/72421 Mute This Topic: https://groups.io/mt/81069867/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat Apr 27 15:40:32 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+72424+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+72424+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=hpe.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1614828123342942.0486411468403; Wed, 3 Mar 2021 19:22:03 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id L3UFYY1788612xolWMLNciHU; Wed, 03 Mar 2021 19:22:02 -0800 X-Received: from mx0b-002e3701.pphosted.com (mx0b-002e3701.pphosted.com [148.163.143.35]) by mx.groups.io with SMTP id smtpd.web10.1905.1614828122218198367 for ; Wed, 03 Mar 2021 19:22:02 -0800 X-Received: from pps.filterd (m0134425.ppops.net [127.0.0.1]) by mx0b-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 1243Hea1012295; Thu, 4 Mar 2021 03:21:50 GMT X-Received: from g4t3425.houston.hpe.com (g4t3425.houston.hpe.com [15.241.140.78]) by mx0b-002e3701.pphosted.com with ESMTP id 371n4xgere-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 04 Mar 2021 03:21:50 +0000 X-Received: from G1W8107.americas.hpqcorp.net (g1w8107.austin.hp.com [16.193.72.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3425.houston.hpe.com (Postfix) with ESMTPS id 0E6059D; Thu, 4 Mar 2021 03:21:48 +0000 (UTC) X-Received: from G9W8453.americas.hpqcorp.net (2002:10d8:a0d3::10d8:a0d3) by G1W8107.americas.hpqcorp.net (2002:10c1:483b::10c1:483b) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 4 Mar 2021 03:21:48 +0000 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (15.241.52.11) by G9W8453.americas.hpqcorp.net (16.216.160.211) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 4 Mar 2021 03:21:48 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ixQsDMFnIanET8doUGWRWSkMYWCl1Yi4VIlsFrNKo7ZhujHGXy+6JiOeRJWiAOConpBUuTbYhRKgxP86Qo3P6u0SluDfVmKf7p1+ycTda0fUjDECrz9QmJ4GHbbiPxDEjC47Sl8T9dlpwXYj72ODAFJ53ESLecq6iA2OZsl7lvGC/W22vW/0+2QJtbgeOWw7f1H0gJt3i0Q0lIMAYK9PDvvPkVKXbB7TOb4fCbASycnc3kCcHB8Vv8Xun+pnoOASiHBYogNeL9i0t1RwZIBGRy+Ukmf4J5LvFX8jRpkwPLS91B/FsWbDfgBhsx3j472TRD4JduLWTIkoqHgFtP8ekQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MhQtyFNXudFqkG9OXIO5b7W8jDiV84QD05e8vnxlrxg=; b=npI0WqaJYnGIvoPIkRULnZUfgg6Mk3w7SorvgbCh3GFxOXJhGmKcLJaz2t5xjAdYAktOiXlB8rfVB7OwX1ATq1XLEy0NEnq+WJnr6kGnvs+Q9Nl4BQr3IuTW+KGFi8FzJh8vm5eyggjhk6AkFTnTiaNMZRQ6cXDvTaDtboUnlmyiSibDBpcB+PJcu8SgKaPbYO1OtKJc+a7kJcw+J9qnxYbSp1xEhjZhM7aMqsaFpvv8/A6MOGwgI2XzGmtOKvQDXpOCFxYerfiR4UCfliK9a6CoG4aaqNbq5RIw++M/Wq38fzeAu7r8jJUJY7Z9jCDve5t5MQegroArMDuDIFI70g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) by DF4PR8401MB0506.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7606::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Thu, 4 Mar 2021 03:21:46 +0000 X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318]) by DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318%7]) with mapi id 15.20.3912.017; Thu, 4 Mar 2021 03:21:46 +0000 From: "Daniel Schaefer" To: CC: G Edhaya Chandran , Barton Gao , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Leif Lindholm , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [edk2-test PATCHv3 3/5] SctPkg: Add RISCV64 build support Date: Thu, 4 Mar 2021 11:21:14 +0800 Message-ID: <20210304032116.24357-4-daniel.schaefer@hpe.com> In-Reply-To: <20210304032116.24357-1-daniel.schaefer@hpe.com> References: <20210304032116.24357-1-daniel.schaefer@hpe.com> X-Originating-IP: [15.211.146.34] X-ClientProxiedBy: SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) To DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) X-MS-Exchange-MessageSentRepresentingType: 1 X-Received: from x360-nix.wireless.hpe.com (15.211.146.34) by SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend Transport; Thu, 4 Mar 2021 03:21:43 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 25bc0467-9dea-4f6f-c02b-08d8debca434 X-MS-TrafficTypeDiagnostic: DF4PR8401MB0506: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:4714; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData: =?us-ascii?Q?yeqfYsPRuxPhKj7vYJvenxMb/vNm76R1FeKnLMRSrFlrhq5pL7zjVxZPMyE+?= =?us-ascii?Q?NucDxQU9Ol9rwPZCWmWWj1IWcHdfKd0vYlC+tAYbQFyGzf631hodSH7VuFiv?= =?us-ascii?Q?dVM+ca1wRvBGC7c2mNUh9GBQe+MQJ63xq+j4IHNsnD9fhSxYVeTr0cIgYlcp?= =?us-ascii?Q?UWX8D3RuDCTykJYA/+hzZfGhHwLU60tFl3IoR/cJrMMpYEYY06FqbSOxJy5I?= =?us-ascii?Q?5r24E/TYhXMaVMmMl+2KwGPdmqGDJ/E0A1FpuFdh4VbADU6kjSZlb/vlpMLd?= =?us-ascii?Q?mU5Vi7YBrST8H5kHhSlPwSJZpcNLtqkOukH4FLlUIW7KswoOPu4M31fL1GKF?= =?us-ascii?Q?7tRMzRGFQELHIOAONBJwBYTaeoeS+oPYv2uUkuVqX/iJFt/nz0iFOlgCJ0tt?= =?us-ascii?Q?TAy+i/LkXJv4xfhgASNlT9i3U8gP43WBb2raBiGIlGOm/SSs5+ydd5nR2IYe?= =?us-ascii?Q?WOPljudai8as4bEJd8vnC6+ktjedJsPvljN837r5k8ePYXLqRAugDsla8OBT?= =?us-ascii?Q?0+Cnw6aj9EpAUsgQcTzEXUhr/SEYva05IQYyX4Bdh15Prk4wmL6MxqoBNmXQ?= =?us-ascii?Q?s5mV4+TPBsAM5bWJQgwr16ap/0+x5X1DMXa0z3A/pRr6r2vEKEsw4R/qOPCN?= =?us-ascii?Q?qY6mRWkGrP0l5opfs7WoT60CtruPltMU6vQYKdnkXKTcAoNeisqnGXfWZJ1E?= =?us-ascii?Q?nq+U+98sDNZS+oiChBNWWU3UgiGkuaNMS6JoIqL4pLPsAXJq5cbQhhid6zZt?= =?us-ascii?Q?IYojMvVj3U0SYSdGQcv0uVgXwNS0oM26x7ClzoxA+LrAGJ/Rln8CldnoGVEo?= =?us-ascii?Q?PkvEJh5y3YVOVRVpI+U5u2gB8Vfl164/yeOQCZzgg6AnqSz/6XJpwMAe7KZi?= =?us-ascii?Q?kd8CSig7Pc8Pww2A48q3LF6L9a7RB5Qiw/vEHNW/epQonH1BgvX0xsTuuGJR?= =?us-ascii?Q?pHDH5JzNpPPeQ9B5mOtbw0UqIwDiVls2S7TvdaTkJqCGRAvV2fkcr8kNO2oa?= =?us-ascii?Q?yTIVF/hJcVE06B/z4KEjsnsgqOoj98h7VBjWo5FD/kcCFXbZLjH0xx+c6CrQ?= =?us-ascii?Q?m1zeYAyDjykpLNXIYa2FDvdOb0Sd8a2HPGWKcvha08fH4Y+/zpPAhwRIS5jb?= =?us-ascii?Q?s+8hfZ1spnUynio6Ds+WYhOC4+b3fq7H2Hv6DnCEgCZOWRewbn70Ng93wc/d?= =?us-ascii?Q?zbT/nkRDcsQF0DeQnGtcZ7AyIclrfUb9sydawE/Xymyi3cfYrADLFbWz/Y06?= =?us-ascii?Q?j1SSies3V9PNXNXgV0VDB2A6XAuCRRS7XqYfPoE+KHcdQW+mlsPJsewpwehx?= =?us-ascii?Q?ZP8P4ST574OBuCgaWjQ+s5mJ?= X-MS-Exchange-CrossTenant-Network-Message-Id: 25bc0467-9dea-4f6f-c02b-08d8debca434 X-MS-Exchange-CrossTenant-AuthSource: DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2021 03:21:46.7171 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 0uHoq1q62j/5zwIBQhPO7cjpk3YUdqpjeo+JTrVrM7Q9Hp+Ax2MdfwAPSsvWOUVB9TI6S7+MJj9WRki25zLzCQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DF4PR8401MB0506 X-OriginatorOrg: hpe.com X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,daniel.schaefer@hpe.com X-Gm-Message-State: q5Pd2R62cPLhplT27I4IGEP3x1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1614828122; bh=ph0OCWLBAN6yt4iNsJk43yZtRt5TCaszuSoh8bCEBtk=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=MatCOjru1Lw0hBtY5vG4mahMyyfERzgmfuGq/2YW2pwerwozvfq8Vn+RCa/f2JLT+jE UJnHdjcnxChyyoG7Mj94QkyEHIO9omyhh7q8MFPTpQ1TaqbrECSqgi68JKajmWoVQkX3e ZJqPsAR2UMYbKPCuIHYGkYh4ZMx0YMDB8Xg= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D3042 Cc: G Edhaya Chandran Cc: Barton Gao Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Leif Lindholm Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Daniel Schaefer Reviewed-by: Sunny Wang --- uefi-sct/SctPkg/Application/InstallSct/InstallSctDef.h = | 4 ++ uefi-sct/SctPkg/Library/SctLib/SctLib.inf = | 6 ++ uefi-sct/SctPkg/SCRT/SCRTApp/SCRTApp.inf = | 5 ++ uefi-sct/SctPkg/SCRT/SCRTDriver/SCRTDriver.inf = | 6 ++ uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Debug= SupportBBTest.inf | 6 ++ uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/Usb2Hc/BlackBoxTest/Usb2HcTest.= inf | 4 ++ uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/UsbHc/BlackBoxTest/UsbHcTest.in= f | 4 ++ uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/EntsLib.inf = | 5 ++ uefi-sct/SctPkg/Tools/Source/GenBin/GNUmakefile = | 4 ++ uefi-sct/SctPkg/UEFI/IHV_SCT.dsc = | 17 +++++- uefi-sct/SctPkg/UEFI/Protocol/DebugSupport.h = | 61 +++++++++++++++++++- uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc = | 18 +++++- uefi-sct/SctPkg/build.sh = | 11 +++- 13 files changed, 144 insertions(+), 7 deletions(-) diff --git a/uefi-sct/SctPkg/Application/InstallSct/InstallSctDef.h b/uefi-= sct/SctPkg/Application/InstallSct/InstallSctDef.h index a7815580..02f0283e 100644 --- a/uefi-sct/SctPkg/Application/InstallSct/InstallSctDef.h +++ b/uefi-sct/SctPkg/Application/InstallSct/InstallSctDef.h @@ -3,6 +3,7 @@ Copyright 2006 - 2017 Unified EFI, Inc.
Copyright (c) 2010 - 2017, Intel Corporation. All rights reserved.
Portions copyright (c) 2014, ARM Ltd. All rights reserved.
+ (C) Copyright 2021 Hewlett Packard Enterprise Development LP
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -32,6 +33,9 @@ #elif defined(EFIAARCH64) #define INSTALL_SCT_PLATFORM_SHORT_NAME L"aarch64" #define INSTALL_SCT_PLATFORM_NAME L"AARCH64" +#elif defined(EFIRISCV64) + #define INSTALL_SCT_PLATFORM_SHORT_NAME L"riscv64" + #define INSTALL_SCT_PLATFORM_NAME L"RISCV64" #else #error "Architecture not supported" #endif diff --git a/uefi-sct/SctPkg/Library/SctLib/SctLib.inf b/uefi-sct/SctPkg/Li= brary/SctLib/SctLib.inf index 23cb77fb..7527b203 100644 --- a/uefi-sct/SctPkg/Library/SctLib/SctLib.inf +++ b/uefi-sct/SctPkg/Library/SctLib/SctLib.inf @@ -3,6 +3,7 @@ # Copyright 2006 - 2016 Unified EFI, Inc.
# Copyright (c) 2013 - 2014, ARM Ltd. All rights reserved.
# Copyright (c) 2014 - 2019, Intel Corporation. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -62,6 +63,11 @@ Aarch64/initplat.c Math.c =20 +[sources.RISCV64] + Riscv64/SctLibPlat.h + Riscv64/initplat.c + Math.c + [sources.ia32] ia32/SctLibPlat.h ia32/initplat.c diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/SCRTApp.inf b/uefi-sct/SctPkg/SCR= T/SCRTApp/SCRTApp.inf index 7aca6e30..8104a4ef 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTApp/SCRTApp.inf +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/SCRTApp.inf @@ -2,6 +2,7 @@ # # Copyright 2006 - 2016 Unified EFI, Inc.
# Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -39,6 +40,10 @@ Aarch64/GoVirtual.asm | RVCT Aarch64/GoVirtual.S | GCC =20 +[sources.RISCV64] + Riscv64/VirtualMemory.c + Riscv64/GoVirtual.S | GCC + [sources.ia32] ia32/VirtualMemory.c ia32/GoVirtual.asm | MSFT diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/SCRTDriver.inf b/uefi-sct/SctP= kg/SCRT/SCRTDriver/SCRTDriver.inf index ad0eb0f8..a3ef454e 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/SCRTDriver.inf +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/SCRTDriver.inf @@ -2,6 +2,7 @@ # # Copyright 2006 - 2016 Unified EFI, Inc.
# Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -69,6 +70,11 @@ Aarch64/Dump.c Aarch64/Debug.c =20 +[sources.RISCV64] + Riscv64/Io.c + Riscv64/Dump.c + Riscv64/Debug.c + [sources.common] Guid.h Guid.c diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/DebugSupportBBTest.inf b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/= DebugSupport/BlackBoxTest/DebugSupportBBTest.inf index 799f86fd..03bf7ccf 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= DebugSupportBBTest.inf +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= DebugSupportBBTest.inf @@ -3,6 +3,7 @@ # Copyright 2006 - 2012 Unified EFI, Inc.
# Copyright (c) 2010 - 2012, Intel Corporation. All rights reserved.
# Copyright (c) 2019, ARM Ltd. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -67,6 +68,11 @@ Aarch64/DebugSupportBBTestExceptionCallbackFunction.c Aarch64/DebugSupportBBTestCacheFunction.c =20 +[sources.RISCV64] + Riscv64/PlatformIsa.c + Riscv64/DebugSupportBBTestExceptionCallbackFunction.c + Riscv64/DebugSupportBBTestCacheFunction.c + [Packages] SctPkg/SctPkg.dec SctPkg/UEFI/UEFI.dec diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/Usb2Hc/BlackBoxTest= /Usb2HcTest.inf b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/Usb2Hc/BlackBo= xTest/Usb2HcTest.inf index e8118739..95ae593e 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/Usb2Hc/BlackBoxTest/Usb2Hc= Test.inf +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/Usb2Hc/BlackBoxTest/Usb2Hc= Test.inf @@ -2,6 +2,7 @@ # # Copyright 2006 - 2016 Unified EFI, Inc.
# Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -55,6 +56,9 @@ #[sources.Aarch64] # IPF/TimerInterrupt.c =20 +#[sources.Riscv64] +# IPF/TimerInterrupt.c + [Packages] MdePkg/MdePkg.dec SctPkg/SctPkg.dec diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/UsbHc/BlackBoxTest/= UsbHcTest.inf b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/UsbHc/BlackBoxTe= st/UsbHcTest.inf index efc438c1..d3bcd5ce 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/UsbHc/BlackBoxTest/UsbHcTe= st.inf +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/UsbHc/BlackBoxTest/UsbHcTe= st.inf @@ -2,6 +2,7 @@ # # Copyright 2006 - 2012 Unified EFI, Inc.
# Copyright (c) 2010 - 2012, Intel Corporation. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -55,6 +56,9 @@ [sources.Aarch64] Aarch64/TimerInterrupt.c =20 +[sources.RISCV64] + Riscv64/TimerInterrupt.c + [Packages] MdePkg/MdePkg.dec SctPkg/SctPkg.dec diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/E= ntsLib.inf b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/E= ntsLib.inf index 23f12d1a..b60e90b2 100644 --- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/EntsLib.= inf +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/EntsLib.= inf @@ -3,6 +3,7 @@ # Copyright 2006 - 2012 Unified EFI, Inc.
# Copyright (c) 2010 - 2012, Intel Corporation. All rights reserved.
# Copyright (c) 2019, ARM Ltd. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -66,6 +67,10 @@ Aarch64/EntsLibPlat.h Aarch64/InitPlat.c =20 +[sources.RISCV64] + Riscv64/EntsLibPlat.h + Riscv64/InitPlat.c + [Packages] MdePkg/MdePkg.dec SctPkg/SctPkg.dec diff --git a/uefi-sct/SctPkg/Tools/Source/GenBin/GNUmakefile b/uefi-sct/Sct= Pkg/Tools/Source/GenBin/GNUmakefile index c235f313..c492d441 100644 --- a/uefi-sct/SctPkg/Tools/Source/GenBin/GNUmakefile +++ b/uefi-sct/SctPkg/Tools/Source/GenBin/GNUmakefile @@ -1,6 +1,7 @@ # # Copyright 2006 - 2010 Unified EFI, Inc.
# Copyright (c) 2010 Intel Corporation. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -31,6 +32,9 @@ ifndef ARCH ifneq (,$(findstring arm,$(uname_m))) ARCH=3DARM endif + ifneq (,$(findstring riscv64,$(uname_m))) + ARCH=3DRISCV64 + endif ifndef ARCH $(info Could not detected ARCH from uname results) $(error ARCH is not defined!) diff --git a/uefi-sct/SctPkg/UEFI/IHV_SCT.dsc b/uefi-sct/SctPkg/UEFI/IHV_SC= T.dsc index f9e86264..94bb5c36 100644 --- a/uefi-sct/SctPkg/UEFI/IHV_SCT.dsc +++ b/uefi-sct/SctPkg/UEFI/IHV_SCT.dsc @@ -3,6 +3,7 @@ # Copyright 2006 - 2016 Unified EFI, Inc.
# Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.
# Copyright (c) 2019,Microchip Technology Inc.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -42,7 +43,7 @@ PLATFORM_VERSION =3D 0.1 DSC_SPECIFICATION =3D 0x00010005 OUTPUT_DIRECTORY =3D Build/IhvSct - SUPPORTED_ARCHITECTURES =3D IA32|X64|ARM|AARCH64 + SUPPORTED_ARCHITECTURES =3D IA32|X64|ARM|AARCH64|RISCV64 BUILD_TARGETS =3D DEBUG|RELEASE SKUID_IDENTIFIER =3D DEFAULT =20 @@ -109,6 +110,12 @@ *_*_AARCH64_PP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) RVCT:*_*_AARCH64_DLINK_FLAGS =3D --muldefweak =20 + *_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + GCC:*_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) -ffreestand= ing -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-error=3Dunused-bu= t-set-variable -Wno-error + *_*_RISCV64_VFRPP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + *_*_RISCV64_APP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + *_*_RISCV64_PP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + DEBUG_*_*_CC_FLAGS =3D -DEFI_DEBUG RELEASE_*_*_CC_FLAGS =3D -DMDEPKG_NDEBUG =20 @@ -124,6 +131,9 @@ [Libraries.AARCH64] ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf =20 +[Libraries.RISCV64] + ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf + [Libraries.IA32,Libraries.X64] =20 [LibraryClasses.common] @@ -146,6 +156,9 @@ [LibraryClasses.AARCH64] NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf =20 +[LibraryClasses.RISCV64] + NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf + [LibraryClasses.IA32] =20 ##########################################################################= ##### @@ -228,4 +241,4 @@ SctPkg/TestInfrastructure/SCT/Framework/Sct.inf =20 [Components.IA32, Components.X64] SctPkg/TestCase/UEFI/IHV/Protocol/PlatformDriverOverride/BlackBoxTest/IhvP= latformDriverOverrideBBTest.inf -SctPkg/TestCase/UEFI/IHV/Protocol/PlatformToDriverConfiguration/BlackBoxTe= st/IhvPlatformToDriverConfigurationBBTest.inf \ No newline at end of file +SctPkg/TestCase/UEFI/IHV/Protocol/PlatformToDriverConfiguration/BlackBoxTe= st/IhvPlatformToDriverConfigurationBBTest.inf diff --git a/uefi-sct/SctPkg/UEFI/Protocol/DebugSupport.h b/uefi-sct/SctPkg= /UEFI/Protocol/DebugSupport.h index 7fba87ae..1963d619 100644 --- a/uefi-sct/SctPkg/UEFI/Protocol/DebugSupport.h +++ b/uefi-sct/SctPkg/UEFI/Protocol/DebugSupport.h @@ -2,6 +2,7 @@ =20 Copyright 2006 - 2016 Unified EFI, Inc.
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.
=20 + (C) Copyright 2021 Hewlett Packard Enterprise Development LP
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License @@ -607,6 +608,60 @@ typedef struct { UINT64 FAR; // Fault Address Register } EFI_SYSTEM_CONTEXT_AARCH64; =20 +/// +/// RISC-V processor exception types. +/// +#define EXCEPT_RISCV_INST_MISALIGNED 0 +#define EXCEPT_RISCV_INST_ACCESS_FAULT 1 +#define EXCEPT_RISCV_ILLEGAL_INST 2 +#define EXCEPT_RISCV_BREAKPOINT 3 +#define EXCEPT_RISCV_LOAD_ADDRESS_MISALIGNED 4 +#define EXCEPT_RISCV_LOAD_ACCESS_FAULT 5 +#define EXCEPT_RISCV_STORE_AMO_ADDRESS_MISALIGNED 6 +#define EXCEPT_RISCV_STORE_AMO_ACCESS_FAULT 7 +#define EXCEPT_RISCV_ENV_CALL_FROM_UMODE 8 +#define EXCEPT_RISCV_ENV_CALL_FROM_SMODE 9 +#define EXCEPT_RISCV_ENV_CALL_FROM_HMODE 10 +#define EXCEPT_RISCV_ENV_CALL_FROM_MMODE 11 + +#define EXCEPT_RISCV_SOFTWARE_INT 0x0 +#define EXCEPT_RISCV_TIMER_INT 0x1 + +typedef struct { + UINT64 X0; + UINT64 X1; + UINT64 X2; + UINT64 X3; + UINT64 X4; + UINT64 X5; + UINT64 X6; + UINT64 X7; + UINT64 X8; + UINT64 X9; + UINT64 X10; + UINT64 X11; + UINT64 X12; + UINT64 X13; + UINT64 X14; + UINT64 X15; + UINT64 X16; + UINT64 X17; + UINT64 X18; + UINT64 X19; + UINT64 X20; + UINT64 X21; + UINT64 X22; + UINT64 X23; + UINT64 X24; + UINT64 X25; + UINT64 X26; + UINT64 X27; + UINT64 X28; + UINT64 X29; + UINT64 X30; + UINT64 X31; +} EFI_SYSTEM_CONTEXT_RISCV64; + // // Universal EFI_SYSTEM_CONTEXT definition // @@ -618,6 +673,7 @@ union { EFI_SYSTEM_CONTEXT_IPF *SystemContextIpf; EFI_SYSTEM_CONTEXT_ARM *SystemContextArm; EFI_SYSTEM_CONTEXT_AARCH64 *SystemContextAArch64; + EFI_SYSTEM_CONTEXT_RISCV64 *SystemContextRiscV64; } EFI_SYSTEM_CONTEXT; =20 // @@ -645,6 +701,8 @@ VOID #define IMAGE_FILE_MACHINE_EBC 0x0EBC #define IMAGE_FILE_MACHINE_ARMTHUMB_MIXED 0x01c2 #define IMAGE_FILE_MACHINE_ARM64 0xAA64 +#define IMAGE_FILE_MACHINE_RISCV64 0x5064 + =20 typedef enum { @@ -653,7 +711,8 @@ enum { IsaIpf =3D IMAGE_FILE_MACHINE_IA64, IsaEbc =3D IMAGE_FILE_MACHINE_EBC, IsaArm =3D IMAGE_FILE_MACHINE_ARMTHUMB_MIXED, ///< 0x01c2 - IsaAArch64 =3D IMAGE_FILE_MACHINE_ARM64 ///< 0xAA64 + IsaAArch64 =3D IMAGE_FILE_MACHINE_ARM64, ///< 0xAA64 + IsaRiscv64 =3D IMAGE_FILE_MACHINE_RISCV64 ///< 0x5064 } EFI_INSTRUCTION_SET_ARCHITECTURE; =20 typedef struct _EFI_DEBUG_SUPPORT_PROTOCOL EFI_DEBUG_SUPPORT_PROTOCOL;; diff --git a/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc b/uefi-sct/SctPkg/UEFI/UEFI_= SCT.dsc index 2e97687b..e13e40e4 100644 --- a/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc +++ b/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc @@ -2,7 +2,7 @@ # # Copyright 2006 - 2017 Unified EFI, Inc.
# Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.
-# (C) Copyright 2017 Hewlett Packard Enterprise Development LP
+# (C) Copyright 2017 - 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -42,7 +42,7 @@ PLATFORM_VERSION =3D 0.1 DSC_SPECIFICATION =3D 0x00010005 OUTPUT_DIRECTORY =3D Build/UefiSct - SUPPORTED_ARCHITECTURES =3D IA32|X64|ARM|AARCH64 + SUPPORTED_ARCHITECTURES =3D IA32|X64|ARM|AARCH64|RISCV64 BUILD_TARGETS =3D DEBUG|RELEASE SKUID_IDENTIFIER =3D DEFAULT =20 @@ -112,6 +112,12 @@ *_*_AARCH64_PP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) RVCT:*_*_AARCH64_DLINK_FLAGS =3D --muldefweak =20 + *_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + GCC:*_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) -ffreest= anding -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-error=3Dunused= -but-set-variable -Wno-error + *_*_RISCV64_VFRPP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + *_*_RISCV64_APP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + *_*_RISCV64_PP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) + DEBUG_*_*_CC_FLAGS =3D -DEFI_DEBUG RELEASE_*_*_CC_FLAGS =3D -DMDEPKG_NDEBUG =20 @@ -129,6 +135,9 @@ [Libraries.AARCH64] ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf =20 +[Libraries.RISCV64] + ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf + [LibraryClasses.common] UefiApplicationEntryPoint|MdePkg/Library/UefiApplicationEntryPoint/UefiA= pplicationEntryPoint.inf UefiDriverEntryPoint|MdePkg/Library/UefiDriverEntryPoint/UefiDriverEntry= Point.inf @@ -157,6 +166,9 @@ [LibraryClasses.AARCH64] NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf =20 +[LibraryClasses.RISCV64] + NULL|ArmPkg/Library/CompilerIntrinsicsLib/CompilerIntrinsicsLib.inf + ##########################################################################= ##### # # These are the components that will be built by the master makefile @@ -483,4 +495,4 @@ SctPkg/TestCase/RIVL/Protocol/Http/Http/HttpENTSTest.inf SctPkg/TestCase/RIVL/Protocol/Http/HttpServiceBinding/HttpServiceBindingEN= TSTest.inf =20 [Components.IA32, Components.X64] -SctPkg/TestCase/UEFI/EFI/Generic/ExeMode/BlackBoxTest/ExeModeBBTest.inf \ No newline at end of file +SctPkg/TestCase/UEFI/EFI/Generic/ExeMode/BlackBoxTest/ExeModeBBTest.inf diff --git a/uefi-sct/SctPkg/build.sh b/uefi-sct/SctPkg/build.sh index 37667711..f7c5e4bd 100755 --- a/uefi-sct/SctPkg/build.sh +++ b/uefi-sct/SctPkg/build.sh @@ -2,6 +2,7 @@ # # Copyright 2006 - 2015 Unified EFI, Inc.
# Copyright (c) 2011 - 2020, ARM Ltd. All rights reserved.
+# (C) Copyright 2021 Hewlett Packard Enterprise Development LP
# # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License @@ -22,6 +23,8 @@ function get_build_arch BUILD_ARCH=3DARM;; aarch64*) BUILD_ARCH=3DAARCH64;; + riscv64*) + BUILD_ARCH=3DRISCV64;; *) BUILD_ARCH=3Dother;; esac @@ -47,6 +50,12 @@ function set_cross_compile else TEMP_CROSS_COMPILE=3Darm-linux-gnueabihf- fi + elif [ "$SCT_TARGET_ARCH" =3D=3D "RISCV64" ]; then + if [ X"$CROSS_COMPILE_64" !=3D X"" ]; then + TEMP_CROSS_COMPILE=3D"$CROSS_COMPILE_64" + else + TEMP_CROSS_COMPILE=3Driscv64-unknown-elf- + fi else echo "Unsupported target architecture '$SCT_TARGET_ARCH'!" >&2 fi @@ -110,7 +119,7 @@ PrintUsage() { #Print Help # echo "Usage:" - echo " $0 \ + echo " $0 \ \ [build type (RELEASE OR DEBUG, DEFAULT: DEBUG)]" } --=20 2.30.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#72424): https://edk2.groups.io/g/devel/message/72424 Mute This Topic: https://groups.io/mt/81069870/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat Apr 27 15:40:32 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+72422+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+72422+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=hpe.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1614828118418651.0385775997611; Wed, 3 Mar 2021 19:21:58 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id KGiZYY1788612x02xYxK8IRk; Wed, 03 Mar 2021 19:21:57 -0800 X-Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) by mx.groups.io with SMTP id smtpd.web08.1865.1614828117336838291 for ; Wed, 03 Mar 2021 19:21:57 -0800 X-Received: from pps.filterd (m0150242.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 1243I92n029986; Thu, 4 Mar 2021 03:21:52 GMT X-Received: from g4t3425.houston.hpe.com (g4t3425.houston.hpe.com [15.241.140.78]) by mx0a-002e3701.pphosted.com with ESMTP id 3720nmjdrw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 04 Mar 2021 03:21:52 +0000 X-Received: from G1W8107.americas.hpqcorp.net (g1w8107.austin.hp.com [16.193.72.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3425.houston.hpe.com (Postfix) with ESMTPS id EF8A0AC; Thu, 4 Mar 2021 03:21:51 +0000 (UTC) X-Received: from G4W9120.americas.hpqcorp.net (2002:10d2:150f::10d2:150f) by G1W8107.americas.hpqcorp.net (2002:10c1:483b::10c1:483b) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 4 Mar 2021 03:21:51 +0000 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (15.241.52.12) by G4W9120.americas.hpqcorp.net (16.210.21.15) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 4 Mar 2021 03:21:51 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cPkbIzzRD2/oYiqykAt3KMuBf47NBNLXmuP9JJlNCH/As1586TR62/FOJ4RGmX3PxjGTcoj0dnmNvR2lvAiLv2oAC4AxpMnsn6rWiTl1ZV1P1mqqZzLqR3c3frEsqw8ovkNIQLEiy7fH46zRD40aE4JL48SrMLEVqsgfmkyEvk6RZy2w/gFMYqNti9hzrDTZRL0CIr5XG75niHP42iwJA/NgTRIcbH+l18qUpdyuTvAnYom5jHow14gCydaG2cVsRBMDmW5RDcMfHJ9LzObVJB6TR+YVWJrPMRFjwiwSKXojGg0kBX/Vv6eQ5arRys8Rya+vY7LQjAJuJhuX4v1HGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mPjjlHEVSgX/pSZx0j3emwm7s8rH+3nsIdriI5mj0u8=; b=jHcidY7AKmj2YieYk3Vpo9lt7SBZIaVXg6mMdBAv2BCy1p0RhRfs2v86RX2aC2zxTz3VAs8GqjK6MkBmETGwPcJIb0dxHuVQa8TIQJhGdotbVK8vEGCvmIh/APkJx+swaxmKyloo/ELtbdg4ZR6nLD/kXtEMDsZqipn506o/Q2CipZE/8Nk1+10I/LzIPPnaZMpz57X6+RS7aw2n8fhwfuNprnJTs2F7dwMUdBY3KWTF4qFkPbxudFoT+vvCItjJ4MPosPLN69dgd3QuB3S2pQtGekbL5LsSuHtotxD6pORuIlK2AXLVlmvEQGafqK+NQQwpNdNsLgYvwjRVoGTl2Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) by DF4PR8401MB0506.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7606::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Thu, 4 Mar 2021 03:21:50 +0000 X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318]) by DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318%7]) with mapi id 15.20.3912.017; Thu, 4 Mar 2021 03:21:50 +0000 From: "Daniel Schaefer" To: CC: G Edhaya Chandran , Barton Gao , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Leif Lindholm , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [edk2-test PATCHv3 4/5] SctPkg: Unify CC_FLAGS for all GCC platforms Date: Thu, 4 Mar 2021 11:21:15 +0800 Message-ID: <20210304032116.24357-5-daniel.schaefer@hpe.com> In-Reply-To: <20210304032116.24357-1-daniel.schaefer@hpe.com> References: <20210304032116.24357-1-daniel.schaefer@hpe.com> X-Originating-IP: [15.211.146.34] X-ClientProxiedBy: SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) To DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) X-MS-Exchange-MessageSentRepresentingType: 1 X-Received: from x360-nix.wireless.hpe.com (15.211.146.34) by SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend Transport; Thu, 4 Mar 2021 03:21:47 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 4ef3cf6e-5fc7-482f-ec7a-08d8debca66f X-MS-TrafficTypeDiagnostic: DF4PR8401MB0506: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:454; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData: =?us-ascii?Q?SAk+QKb2d5LxS5lcgNKL3vhjUdZAVP4N0R+79qDHDWUa6YU04zjB3XLM0MLb?= =?us-ascii?Q?4yVT8PAY+iUiZUpfIvIOpd8JOVxHJDOyf/4dCyB54AYLQ8EBcxbHZl8U9tQY?= =?us-ascii?Q?F8HDknh3dyBbY3XBzMr4ajCA0CLlcGUvUAyOaLXzyUUAkjeKfwh6GKBVo/07?= =?us-ascii?Q?AkMOpnUdAHbgtG/xyg3c4GBL0vsqDa9StKcmDEuNktDgU77Z0eI9PEwRok4S?= =?us-ascii?Q?6NY5tGsRXwTilcGVIz5JOG7agjiKcVdiKrn+42M/8DWOyIlMQGcxe7NlCZae?= =?us-ascii?Q?4d42f+C0puAIWVkUIzu1ivyZwyyVHlSa6p6yxsNnV/3sc1ev/giMsVHEmbws?= =?us-ascii?Q?aHi0db3RD2IVEhuN1m+3VfHnGkgAXQU2Ebc1qttq5ir45we8bqIDYn1S5tH5?= =?us-ascii?Q?xmbx++1YAN5Jw8fyQMq3kOw7yF0CcXBOqAzYL4eijyl3PPnC8b3u+f/5S/c6?= =?us-ascii?Q?3helo6m73gWU0p05GR9Zd1iAlL/O8PR2uVptdD99+tiQb2U7c1OKsnMMW1gW?= =?us-ascii?Q?/m8I6WgYW43IesVmKeXdmOSUtDOzLtAHLV/1ibdt51GoX1SY4jUfzz/phBqV?= =?us-ascii?Q?EwOpMNfWjFD/S/FF3X47wQ6QYmCgIKJRaNNvYIb6cE4pwPRjaWnQoGZ4THqc?= =?us-ascii?Q?kcKNam/lEnHqc4QvYrltXaMYhnql0jOsUwsvUJdlubuVlpqiniPwfxJ3VmQR?= =?us-ascii?Q?tkyRC8zEgY35a0h7/M17W/CGh/p4rdNthZu1bFZqQQCT9cnCVF8g50tcaUiI?= =?us-ascii?Q?bEcKKHwtXotBb8uyDYMBmoBqLTBqzQUJ06vBapLSP0vLLHDQVC491tfX7WRO?= =?us-ascii?Q?LY1+QLyf7zAStdKcGoGAiNdgrkrbzDhtEikpT7saDaTfy3lFd9vjsYgQazRZ?= =?us-ascii?Q?HGv28bTiePt9s8XRfHLPG13qZXInc8RS/NlKgCOE1GHo+kQJ1IYo1tZxsMaM?= =?us-ascii?Q?7FCD8N97s9s6Ozu+od/qsr//p9IvZosneMkZUCbcyUU/vhOua5bNcFBnaA++?= =?us-ascii?Q?foYZoHLaqcmqMDA1SV3bfHkUGyHHdw9C9afEIExwDFKPf514e49uie0i6atO?= =?us-ascii?Q?StWUUWy/DLolUyYpKDRFA43HqRpXFeed0Wa5XVnsDzQ/eq/O2mBGHvnjAl88?= =?us-ascii?Q?uDyu9OUu9wiKnGhJFOQ4Sx9LylJInRBavMVVTH3hZPOrPaQTbew8lJrAxlfs?= =?us-ascii?Q?qoUQf2si51LW9S4dfuNw9l3hHF+rfLNPgmw+ercVtDZf7VJ5PPciSsqJ0fEe?= =?us-ascii?Q?kQo33I245FyaI8msMRb3/KrsWcs9W0KQ8IWjZoQ3uDB6Jkw/Dtm2cdgaQuXQ?= =?us-ascii?Q?Rhamx+SR6+nXbh+nVg5TEgTn?= X-MS-Exchange-CrossTenant-Network-Message-Id: 4ef3cf6e-5fc7-482f-ec7a-08d8debca66f X-MS-Exchange-CrossTenant-AuthSource: DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2021 03:21:50.3764 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: RMh5DfjRcCW8/N/JQe4qkDAaN5MR7pJ97HWvyG5/TZluZFo46fUSi7V/DSJi3924OR/B600+ChmnFVVnZqIrbg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DF4PR8401MB0506 X-OriginatorOrg: hpe.com X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,daniel.schaefer@hpe.com X-Gm-Message-State: SarSzf2ZlJDktHodbxzrnqLCx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1614828117; bh=toBKT/f0ZqVHd2tO3/e4fnyiyJu08F1GdKYRO1TZa0Y=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=AuZPdVMunZEMn0zes34aahI6LSgxkb2Ac5xZTk8j4eaqhCMRwyhANUY3e5ovFMvgiFO N8fTLttUn/W6i1RdVik607OycrszSQW9Y1YHuA2VXe3Jo6CXi6ypChyuJFuTtyACwIaVp mHLMpLeCAfnGAjCUgzLWmuhhnjN7D4tAUNY= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D3042 Cc: G Edhaya Chandran Cc: Barton Gao Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Leif Lindholm Cc: Heinrich Schuchardt Cc: Abner Chang Signed-off-by: Daniel Schaefer Reviewed-by: Abner Chang --- uefi-sct/SctPkg/UEFI/IHV_SCT.dsc | 15 ++++++++------- uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc | 15 ++++++++------- 2 files changed, 16 insertions(+), 14 deletions(-) diff --git a/uefi-sct/SctPkg/UEFI/IHV_SCT.dsc b/uefi-sct/SctPkg/UEFI/IHV_SC= T.dsc index 94bb5c36..91116ca7 100644 --- a/uefi-sct/SctPkg/UEFI/IHV_SCT.dsc +++ b/uefi-sct/SctPkg/UEFI/IHV_SCT.dsc @@ -69,15 +69,16 @@ MSFT:*_*_X64_APP_FLAGS =3D /D EFIX64 MSFT:*_*_X64_PP_FLAGS =3D /D EFIX64 =20 -# GCC:*_*_IA32_CC_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) -ffreestanding = -nostdinc -nostdlib -Wno-error -mno-red-zone -Wno-address -mno-stack-arg-pr= obe "-DEFIAPI=3D__attribute__((ms_abi))" -m32 -mabi=3Dms -D MDE_CPU_X32 - GCC:*_*_IA32_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -Wno-error=20 + GCC:*_*_*_CC_FLAGS =3D -ffreestanding -nostdinc -nostdlib -Wno-e= rror +# GCC:*_*_IA32_CC_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) -mno-red-zone -= Wno-address -mno-stack-arg-probe "-DEFIAPI=3D__attribute__((ms_abi))" -m32 = -mabi=3Dms -D MDE_CPU_X32 + GCC:*_*_IA32_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_IA32_VFRPP_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) # GCC:*_*_IA32_APP_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) # GCC:*_*_IA32_PP_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) =20 -# GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -ffreestanding = -nostdinc -nostdlib -Wno-error -mno-red-zone -Wno-address -mno-stack-arg-pr= obe "-DEFIAPI=3D__attribute__((ms_abi))" -m64 -mcmodel=3Dlarge -mabi=3Dms -= D MDE_CPU_X64 +# GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -mno-red-zone -= Wno-address -mno-stack-arg-probe "-DEFIAPI=3D__attribute__((ms_abi))" -m64 = -mcmodel=3Dlarge -mabi=3Dms -D MDE_CPU_X64 =20 - GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -Wno-error=20 + GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_X64_VFRPP_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_X64_APP_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_X64_PP_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) @@ -85,7 +86,7 @@ =20 #TODO: OM - fixme RVCT:*_*_ARM_CC_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) *_*_ARM_CC_FLAGS =3D -D EFIARM - GCC:*_*_ARM_CC_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) -fno-stack-protecto= r -ffreestanding -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-erro= r=3Dunused-but-set-variable -Wno-error=3Dimplicit-function-declaration -Wno= -error + GCC:*_*_ARM_CC_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) -fno-stack-protector *_*_ARM_VFRPP_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) *_*_ARM_APP_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) *_*_ARM_PP_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) @@ -104,14 +105,14 @@ RVCT:*_*_ARM_CC_FLAGS =3D --diag_remark=3D167 --diag_suppress=3D167,1= 295,188,550,1,68,111,177 =20 *_*_AARCH64_CC_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) - GCC:*_*_AARCH64_CC_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) -ffreest= anding -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-error=3Dunused= -but-set-variable -Wno-error + GCC:*_*_AARCH64_CC_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) *_*_AARCH64_VFRPP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) *_*_AARCH64_APP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) *_*_AARCH64_PP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) RVCT:*_*_AARCH64_DLINK_FLAGS =3D --muldefweak =20 *_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) - GCC:*_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) -ffreestand= ing -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-error=3Dunused-bu= t-set-variable -Wno-error + GCC:*_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) *_*_RISCV64_VFRPP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) *_*_RISCV64_APP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) *_*_RISCV64_PP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) diff --git a/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc b/uefi-sct/SctPkg/UEFI/UEFI_= SCT.dsc index e13e40e4..3bb57d26 100644 --- a/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc +++ b/uefi-sct/SctPkg/UEFI/UEFI_SCT.dsc @@ -72,14 +72,15 @@ MSFT:*_*_X64_APP_FLAGS =3D /D EFIX64 MSFT:*_*_X64_PP_FLAGS =3D /D EFIX64 =20 -# GCC:*_*_IA32_CC_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) -ffreestanding = -nostdinc -nostdlib -Wno-error -mno-red-zone -Wno-address -mno-stack-arg-pr= obe "-DEFIAPI=3D__attribute__((ms_abi))" -m32 -mabi=3Dms -D MDE_CPU_X32 - GCC:*_*_IA32_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -Wno-error=20 + GCC:*_*_*_CC_FLAGS =3D -ffreestanding -nostdinc -nostdlib -Wno-e= rror +# GCC:*_*_IA32_CC_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) -mno-red-zone -= Wno-address -mno-stack-arg-probe "-DEFIAPI=3D__attribute__((ms_abi))" -m32 = -mabi=3Dms -D MDE_CPU_X32 + GCC:*_*_IA32_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_IA32_VFRPP_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) # GCC:*_*_IA32_APP_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) # GCC:*_*_IA32_PP_FLAGS =3D -D EFI32 $(GCC_VER_MACRO) =20 -# GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -ffreestanding = -nostdinc -nostdlib -Wno-error -mno-red-zone -Wno-address -mno-stack-arg-pr= obe "-DEFIAPI=3D__attribute__((ms_abi))" -m64 -mcmodel=3Dlarge -mabi=3Dms -= D MDE_CPU_X64 - GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -Wno-error=20 +# GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) -mno-red-zone -= Wno-address -mno-stack-arg-probe "-DEFIAPI=3D__attribute__((ms_abi))" -m64 = -mcmodel=3Dlarge -mabi=3Dms -D MDE_CPU_X64 + GCC:*_*_X64_CC_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_X64_VFRPP_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_X64_APP_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) # GCC:*_*_X64_PP_FLAGS =3D -D EFIX64 $(GCC_VER_MACRO) @@ -87,7 +88,7 @@ =20 #TODO: OM - fixme RVCT:*_*_ARM_CC_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) *_*_ARM_CC_FLAGS =3D -D EFIARM - GCC:*_*_ARM_CC_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) -fno-stack-protecto= r -ffreestanding -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-erro= r=3Dunused-but-set-variable -Wno-error=3Dimplicit-function-declaration -Wno= -error + GCC:*_*_ARM_CC_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) -fno-stack-protector *_*_ARM_VFRPP_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) *_*_ARM_APP_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) *_*_ARM_PP_FLAGS =3D -D EFIARM $(GCC_VER_MACRO) @@ -106,14 +107,14 @@ RVCT:*_*_ARM_CC_FLAGS =3D --diag_remark=3D167 --diag_suppress=3D167,1= 295,188,550,1,68,111,177 =20 *_*_AARCH64_CC_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) - GCC:*_*_AARCH64_CC_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) -ffreest= anding -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-error=3Dunused= -but-set-variable -Wno-error + GCC:*_*_AARCH64_CC_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) *_*_AARCH64_VFRPP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) *_*_AARCH64_APP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) *_*_AARCH64_PP_FLAGS =3D -D EFIAARCH64 $(GCC_VER_MACRO) RVCT:*_*_AARCH64_DLINK_FLAGS =3D --muldefweak =20 *_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) - GCC:*_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) -ffreest= anding -nostdinc -nostdlib -Wno-error=3Dunused-function -Wno-error=3Dunused= -but-set-variable -Wno-error + GCC:*_*_RISCV64_CC_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) *_*_RISCV64_VFRPP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) *_*_RISCV64_APP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) *_*_RISCV64_PP_FLAGS =3D -D EFIRISCV64 $(GCC_VER_MACRO) --=20 2.30.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#72422): https://edk2.groups.io/g/devel/message/72422 Mute This Topic: https://groups.io/mt/81069868/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Sat Apr 27 15:40:32 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+72423+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+72423+1787277+3901457@groups.io; arc=fail (BodyHash is different from the expected one); dmarc=fail(p=none dis=none) header.from=hpe.com Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1614828123049697.3263654332139; Wed, 3 Mar 2021 19:22:03 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id jjLqYY1788612xQQqA7uyytk; Wed, 03 Mar 2021 19:22:02 -0800 X-Received: from mx0a-002e3701.pphosted.com (mx0a-002e3701.pphosted.com [148.163.147.86]) by mx.groups.io with SMTP id smtpd.web09.1919.1614828122229231948 for ; Wed, 03 Mar 2021 19:22:02 -0800 X-Received: from pps.filterd (m0150242.ppops.net [127.0.0.1]) by mx0a-002e3701.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 1243Ii5k031223; Thu, 4 Mar 2021 03:21:57 GMT X-Received: from g4t3425.houston.hpe.com (g4t3425.houston.hpe.com [15.241.140.78]) by mx0a-002e3701.pphosted.com with ESMTP id 3720nmjdsb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 04 Mar 2021 03:21:57 +0000 X-Received: from G1W8107.americas.hpqcorp.net (g1w8107.austin.hp.com [16.193.72.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by g4t3425.houston.hpe.com (Postfix) with ESMTPS id B4EFAA9; Thu, 4 Mar 2021 03:21:56 +0000 (UTC) X-Received: from G2W6309.americas.hpqcorp.net (2002:10c5:4033::10c5:4033) by G1W8107.americas.hpqcorp.net (2002:10c1:483b::10c1:483b) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 4 Mar 2021 03:21:56 +0000 X-Received: from NAM12-BN8-obe.outbound.protection.outlook.com (15.241.52.11) by G2W6309.americas.hpqcorp.net (16.197.64.51) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 4 Mar 2021 03:21:56 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mV1w3aXCOO/sadtwSszjppgr4kDFwxnmBhy4PuGitK4V2F2WImWqV674esG+1OrUFhVUlx/rPtZdzyShFj0Bx4CdZkdEsRy0sZfyhGjhSjuPZFzA8YGXitj5F9g17dHJH1+jYInq+e9AQtKrvVY8nigUcJSZ7Pgn1wG1usxDyoCj/bHVe9D7Tf8GpnnVOTnj4D8HLQNFra0npwZa9N8gcc823GNv/P+Pmck13p6C8mpUpHx6jhkwF6N3ZWPLmaK+RVw6SMs3vqN0btuL0eaZv1/6/NMfwS4yR8SZxI95EbQ0wI8a2Sq0Y9QHrwQ4oEj5CPsGobTIgQYPLwlE1meDJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v6FFs1DzVjilNqmVxqHuzcxjDkga6iPZ0psDeok6kow=; b=VbHXaKEVPpHcpv/FlxRgl08W5u+/51wyH6X8C8AldlJlAIqvXW7ZD0LkQGbKuroVyx28DcGw5gvVY0noE4dp9jNa6Zl6Uz7AbjhagLjilClYrR0vn5uc7N/7/sWX2Gd3Rg4vcwCnNUacMe0UosbS9XgATDTL2/5aLOQnqr2a+pwwK3ePf9UwzjbeyH3Il/0SklFMsj5BU9ko1/rIkiHGEvN0S4WAfeMdgzS8OBu6KJic1xTzFOapvOfWEsvSWOQoL3suhDx0kX+Uanj+12uDvjXTZ/OeoBjVxjDWxAe8JH9jz7X7hQ+/yz45ajNuvlnVTw9b/dcxxGNdl33OTsadlg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hpe.com; dmarc=pass action=none header.from=hpe.com; dkim=pass header.d=hpe.com; arc=none X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) by DF4PR8401MB0506.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:7606::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Thu, 4 Mar 2021 03:21:54 +0000 X-Received: from DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318]) by DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM ([fe80::ad2c:ff74:846c:5318%7]) with mapi id 15.20.3912.017; Thu, 4 Mar 2021 03:21:54 +0000 From: "Daniel Schaefer" To: CC: G Edhaya Chandran , Barton Gao , Samer El-Haj-Mahmoud , Eric Jin , Arvin Chen , Leif Lindholm , Heinrich Schuchardt , Abner Chang Subject: [edk2-devel] [edk2-test PATCHv3 5/5] SctPkg: Remove trailing whitespace Date: Thu, 4 Mar 2021 11:21:16 +0800 Message-ID: <20210304032116.24357-6-daniel.schaefer@hpe.com> In-Reply-To: <20210304032116.24357-1-daniel.schaefer@hpe.com> References: <20210304032116.24357-1-daniel.schaefer@hpe.com> X-Originating-IP: [15.211.146.34] X-ClientProxiedBy: SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) To DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM (2a01:111:e400:760d::23) X-MS-Exchange-MessageSentRepresentingType: 1 X-Received: from x360-nix.wireless.hpe.com (15.211.146.34) by SG2PR06CA0172.apcprd06.prod.outlook.com (2603:1096:1:1e::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17 via Frontend Transport; Thu, 4 Mar 2021 03:21:50 +0000 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 5463ee4b-5717-44d8-8264-08d8debca8ee X-MS-TrafficTypeDiagnostic: DF4PR8401MB0506: X-MS-Exchange-Transport-Forked: True X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:1107; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData: =?us-ascii?Q?rbnQeu+NnkjAKe3XQGc/W0sw4pX3jemyVDz//xEF+uvewIpUKMlBTZ75zhz5?= =?us-ascii?Q?+MjA1vGq1csv93qgw8S7uP2ZikDMaKnem4PisSdMQ7DWBGzeqHwHwkzDpxoe?= =?us-ascii?Q?L5cGu+9F1OZwBgKyzbMwKsFNwH/dPBZ1jdca4UyQzJCh131xq9nCwo98ttUr?= =?us-ascii?Q?TUrAiRk4M11DJ+844W5aMOiG1ON+TYcGO6V1A+PIcfu3DpqQn/k15y0eskfr?= =?us-ascii?Q?D1fCFCERHsPiguWVi/uVAz6SeVGcnhgzlT89wxb5KBgWb9OqdnfeWc95Aq+9?= =?us-ascii?Q?GSNIowPRSH9k40yiVM0WbWv0+oJ79NVW5vV8jw7bU22n0orvD2AO7vLA+vex?= =?us-ascii?Q?NR2zbXkliRyrSGVpf7QlQdnaUGsHFIgnksDTChnCdUJSt3lZ+twrz2ayJFsv?= =?us-ascii?Q?2E5p9uEASpPkN/aFVwwBEcylyPgI4CmBdAyWd7yCqArCkm6GuMtiuap1G9s+?= =?us-ascii?Q?kUTOFUMePE+1vSkQXimOhzmne5gd4yJH7zCTqWAn5TU1gl/q5of9GRs39AyA?= =?us-ascii?Q?yP1RbHZP4h+NWVKuKMGbQMTw7HtlT7cOzK5MF8XRtViEnq1b7mLaKESC7x/u?= =?us-ascii?Q?5vvhrjXw+F4zz0WnFAUdx7TI+VPzQYaEvJxA2FCScXoatiurwbD1J/reTyQd?= =?us-ascii?Q?p5Xusu9GwX+gq/lM+3tp4477ylQ+xLG+h+jgSsPydnch20y2uX556rn7NiXj?= =?us-ascii?Q?8z0NOtUqIwTEaL/T+vbATamxbXC1LOpvryFt0esoTtWgmPvLMwtXjAhDXYpC?= =?us-ascii?Q?v6c/IHdEkVdrUKGGfbfxAVCEmlO7qX2vSCmae91DNCVdQaJ7kl9mOnmCjdUG?= =?us-ascii?Q?JjHW5Fm5qeFZAk3THT2kko7S7VItKvvAR+sOCXYcowUrCKl9FKNU0UoEcojU?= =?us-ascii?Q?FcfmFRG6euQb8EuT+EKz9HTWPdKDdAw6O7Oo5iE7foINAXIQiwZsyaRC54GB?= =?us-ascii?Q?SzFXS6JmJ7e2Xe9XlZAgj2aLQ34i9MlLXqxeZThfYxaL2jx+PCEzbqHpkLem?= =?us-ascii?Q?Mf7AvLFbuUXHmp0mkRz9tgB6gKWxiYI0UzRx7Oweb1hOXbYZkbMXljSkZxHS?= =?us-ascii?Q?exYoBNOz9/Bo85koAO7a/75mSCkKlTIy/xgMk+nEQUB/j18IDZw/Yi9Mk5ij?= =?us-ascii?Q?lC5d4OcrGflWiL4KfXzl101uRj8PFzzyohHcuU/MWj/vs9qSlpkxmYs1A34E?= =?us-ascii?Q?HSgdkp1G5rwdZYs0Y3lokkc/GzxU8CNSAVpiKgJ7vEv2cB9LAWm/23b00wC8?= =?us-ascii?Q?3qN/HskPUWm9BTYNetioJpJ/Jyjqtq9dqbSC5s6DqIRgoegV9+vgYhL5boDk?= =?us-ascii?Q?ol3F9Hug/qa/B4wE7698wP8U?= X-MS-Exchange-CrossTenant-Network-Message-Id: 5463ee4b-5717-44d8-8264-08d8debca8ee X-MS-Exchange-CrossTenant-AuthSource: DF4PR8401MB0444.NAMPRD84.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Mar 2021 03:21:54.6114 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 105b2061-b669-4b31-92ac-24d304d195dc X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: egWnMUe/MVYzM+EAvgdSvKt2MUzBlkuO7MxPcog3fN92PBSb5hXOumfADCcNYnnOATtpvpjkWhidhMd/w6emLw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DF4PR8401MB0506 X-OriginatorOrg: hpe.com X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-HPE-SCL: -1 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,daniel.schaefer@hpe.com X-Gm-Message-State: EPMHQgBbhTrp0siqS9sTwQTHx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1614828122; bh=Hwtx8r0rSiNEuvD9y+Ks4EwXcv/G82dkd+aRnvUN0tI=; h=CC:Content-Type:Date:From:Reply-To:Subject:To; b=M5rdXJj/O43nJSLHYE+5iBfP2D7GFNkYA6A79aoxno8K3fImHjJTNAzE52IQYEVu5W+ tCR60wLnUDgaBDDi3KIMPUicHntBcVweO/ulcOc3/Qs9tZ0TaslVQfEUfyKjTkHY/RM/4 43FOU076zVffetbd39kKquNemWzV1zviFLQ= X-ZohoMail-DKIM: pass (identity @groups.io) Content-Type: text/plain; charset="utf-8" REF:https://bugzilla.tianocore.org/show_bug.cgi?id=3D3042 Cc: G Edhaya Chandran Cc: Barton Gao Cc: Samer El-Haj-Mahmoud Cc: Eric Jin Cc: Arvin Chen Cc: Leif Lindholm Cc: Heinrich Schuchardt Cc: Abner Chang Reviewed-by: Samer El-Haj-Mahmoud Reviewed-by: G Edhaya Chandran Signed-off-by: Daniel Schaefer Reviewed-by: Abner Chang --- uefi-sct/SctPkg/Library/SctLib/Aarch64/SctLibPlat.h = | 4 ++-- uefi-sct/SctPkg/Library/SctLib/Aarch64/initplat.c = | 6 +++--- uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h = | 4 ++-- uefi-sct/SctPkg/Library/SctLib/Riscv64/initplat.c = | 6 +++--- uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/GoVirtual.S = | 6 +++--- uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/VirtualMemory.c = | 6 +++--- uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S = | 6 +++--- uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c = | 6 +++--- uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Debug.c = | 8 ++++---- uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Dump.c = | 8 ++++---- uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.c = | 8 ++++---- uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.h = | 8 ++++---- uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c = | 6 +++--- uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Dump.c = | 8 ++++---- uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c = | 8 ++++---- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Aarch= 64/DebugSupportBBTestCacheFunction.c | 6 +++--- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Aarch= 64/DebugSupportBBTestExceptionCallbackFunction.c | 7 +++---- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Aarch= 64/PlatformIsa.c | 6 +++--- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/DebugSupportBBTestCacheFunction.c | 6 +++--- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/DebugSupportBBTestExceptionCallbackFunction.c | 6 +++--- uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv= 64/PlatformIsa.c | 6 +++--- uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Aarch64/EntsL= ibPlat.h | 6 +++--- uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Aarch64/InitP= lat.c | 6 +++--- uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/EntsL= ibPlat.h | 6 +++--- uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/InitP= lat.c | 6 +++--- 25 files changed, 79 insertions(+), 80 deletions(-) diff --git a/uefi-sct/SctPkg/Library/SctLib/Aarch64/SctLibPlat.h b/uefi-sct= /SctPkg/Library/SctLib/Aarch64/SctLibPlat.h index ee7c656b..b7832e18 100644 --- a/uefi-sct/SctPkg/Library/SctLib/Aarch64/SctLibPlat.h +++ b/uefi-sct/SctPkg/Library/SctLib/Aarch64/SctLibPlat.h @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php =20 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/Library/SctLib/Aarch64/initplat.c b/uefi-sct/S= ctPkg/Library/SctLib/Aarch64/initplat.c index a48bb2f3..1c247c91 100644 --- a/uefi-sct/SctPkg/Library/SctLib/Aarch64/initplat.c +++ b/uefi-sct/SctPkg/Library/SctLib/Aarch64/initplat.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h b/uefi-sct= /SctPkg/Library/SctLib/Riscv64/SctLibPlat.h index 69e7f904..5d527ac2 100644 --- a/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h +++ b/uefi-sct/SctPkg/Library/SctLib/Riscv64/SctLibPlat.h @@ -6,12 +6,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php =20 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/Library/SctLib/Riscv64/initplat.c b/uefi-sct/S= ctPkg/Library/SctLib/Riscv64/initplat.c index a48bb2f3..1c247c91 100644 --- a/uefi-sct/SctPkg/Library/SctLib/Riscv64/initplat.c +++ b/uefi-sct/SctPkg/Library/SctLib/Riscv64/initplat.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/GoVirtual.S b/uefi-sct/Sc= tPkg/SCRT/SCRTApp/Aarch64/GoVirtual.S index d223b36b..a2d7ed71 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/GoVirtual.S +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/GoVirtual.S @@ -5,12 +5,12 @@ # # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License -# which accompanies this distribution. The full text of the license may = be found at=20 +# which accompanies this distribution. The full text of the license may = be found at # http://opensource.org/licenses/bsd-license.php -#=20 +# # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. -#=20 +# ## # # diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/VirtualMemory.c b/uefi-sc= t/SctPkg/SCRT/SCRTApp/Aarch64/VirtualMemory.c index 397b3514..3edf277e 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/VirtualMemory.c +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Aarch64/VirtualMemory.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S b/uefi-sct/Sc= tPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S index ae33da18..6b727d6e 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/GoVirtual.S @@ -6,12 +6,12 @@ # # This program and the accompanying materials # are licensed and made available under the terms and conditions of the B= SD License -# which accompanies this distribution. The full text of the license may = be found at=20 +# which accompanies this distribution. The full text of the license may = be found at # http://opensource.org/licenses/bsd-license.php -#=20 +# # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IM= PLIED. -#=20 +# ## # # diff --git a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c b/uefi-sc= t/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c index 00b59594..c85ea27b 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c +++ b/uefi-sct/SctPkg/SCRT/SCRTApp/Riscv64/VirtualMemory.c @@ -6,12 +6,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Debug.c b/uefi-sct/Sct= Pkg/SCRT/SCRTDriver/Aarch64/Debug.c index 6161d596..122e3531 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Debug.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Debug.c @@ -1,16 +1,16 @@ /** @file =20 Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ =20 /*++ diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Dump.c b/uefi-sct/SctP= kg/SCRT/SCRTDriver/Aarch64/Dump.c index cc8d9869..cb9771b1 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Dump.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Dump.c @@ -1,16 +1,16 @@ /** @file =20 Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ =20 /*++ diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.c b/uefi-sct/SctPkg= /SCRT/SCRTDriver/Aarch64/Io.c index b925e151..e215d723 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.c @@ -1,16 +1,16 @@ /** @file =20 Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ =20 /*++ diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.h b/uefi-sct/SctPkg= /SCRT/SCRTDriver/Aarch64/Io.h index 1e78b3e4..10ab372a 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.h +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Aarch64/Io.h @@ -1,16 +1,16 @@ /** @file =20 Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ =20 /*++ diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c b/uefi-sct/Sct= Pkg/SCRT/SCRTDriver/Riscv64/Debug.c index 2991935a..b3e13f63 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Debug.c @@ -6,12 +6,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ =20 /*++ diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Dump.c b/uefi-sct/SctP= kg/SCRT/SCRTDriver/Riscv64/Dump.c index cc8d9869..cb9771b1 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Dump.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Dump.c @@ -1,16 +1,16 @@ /** @file =20 Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ =20 /*++ diff --git a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c b/uefi-sct/SctPkg= /SCRT/SCRTDriver/Riscv64/Io.c index 255cb9a6..13cd0bc6 100644 --- a/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c +++ b/uefi-sct/SctPkg/SCRT/SCRTDriver/Riscv64/Io.c @@ -1,17 +1,17 @@ /** @file =20 Copyright 2006 - 2012 Unified EFI, Inc.
- Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
=20 + Copyright (c) 2011 - 2012 ARM Ltd. All rights reserved.
(C) Copyright 2021 Hewlett Packard Enterprise Development LP
=20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ =20 /*++ diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Aarch64/DebugSupportBBTestCacheFunction.c b/uefi-sct/SctPkg/TestCase= /UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Aarch64/DebugSupportBBTestCach= eFunction.c index 96ee7b57..6b54a25f 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Aarch64/DebugSupportBBTestCacheFunction.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Aarch64/DebugSupportBBTestCacheFunction.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Aarch64/DebugSupportBBTestExceptionCallbackFunction.c b/uefi-sct/Sct= Pkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Aarch64/DebugSuppo= rtBBTestExceptionCallbackFunction.c index c27c0c0c..ab09a19a 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Aarch64/DebugSupportBBTestExceptionCallbackFunction.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Aarch64/DebugSupportBBTestExceptionCallbackFunction.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 @@ -273,4 +273,3 @@ BBTestRegisterExceptionCallbackFunctionManualTest ( =20 return EFI_SUCCESS; } - diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Aarch64/PlatformIsa.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/D= ebugSupport/BlackBoxTest/Aarch64/PlatformIsa.c index 8334f601..3178fb60 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Aarch64/PlatformIsa.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Aarch64/PlatformIsa.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/DebugSupportBBTestCacheFunction.c b/uefi-sct/SctPkg/TestCase= /UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv64/DebugSupportBBTestCach= eFunction.c index 96ee7b57..6b54a25f 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestCacheFunction.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestCacheFunction.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/DebugSupportBBTestExceptionCallbackFunction.c b/uefi-sct/Sct= Pkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/Riscv64/DebugSuppo= rtBBTestExceptionCallbackFunction.c index c6e72806..6338008e 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestExceptionCallbackFunction.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/DebugSupportBBTestExceptionCallbackFunction.c @@ -6,12 +6,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackB= oxTest/Riscv64/PlatformIsa.c b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/D= ebugSupport/BlackBoxTest/Riscv64/PlatformIsa.c index 8b23d91b..d91f520e 100644 --- a/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/PlatformIsa.c +++ b/uefi-sct/SctPkg/TestCase/UEFI/EFI/Protocol/DebugSupport/BlackBoxTest/= Riscv64/PlatformIsa.c @@ -6,12 +6,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found at http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/A= arch64/EntsLibPlat.h b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENT= S/EasLib/Aarch64/EntsLibPlat.h index ff781aee..91839324 100644 --- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Aarch64/= EntsLibPlat.h +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Aarch64/= EntsLibPlat.h @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/A= arch64/InitPlat.c b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/E= asLib/Aarch64/InitPlat.c index 70a509a4..b255e811 100644 --- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Aarch64/= InitPlat.c +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Aarch64/= InitPlat.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/R= iscv64/EntsLibPlat.h b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENT= S/EasLib/Riscv64/EntsLibPlat.h index 144f812a..1dcd458e 100644 --- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= EntsLibPlat.h +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= EntsLibPlat.h @@ -6,12 +6,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a=20 http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 diff --git a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/R= iscv64/InitPlat.c b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/E= asLib/Riscv64/InitPlat.c index 70a509a4..b255e811 100644 --- a/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= InitPlat.c +++ b/uefi-sct/SctPkg/TestInfrastructure/SCT/Framework/ENTS/EasLib/Riscv64/= InitPlat.c @@ -5,12 +5,12 @@ =20 This program and the accompanying materials are licensed and made available under the terms and conditions of the BS= D License - which accompanies this distribution. The full text of the license may b= e found at=20 + which accompanies this distribution. The full text of the license may b= e found a http://opensource.org/licenses/bsd-license.php -=20 + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMP= LIED. -=20 + **/ /*++ =20 --=20 2.30.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#72423): https://edk2.groups.io/g/devel/message/72423 Mute This Topic: https://groups.io/mt/81069869/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-