]>
Commit | Line | Data |
---|---|---|
8f07f895 | 1 | /** @file\r |
9b4aa760 | 2 | CPU Exception Library provides PEI/DXE/SMM CPU common exception handler.\r |
8f07f895 | 3 | \r |
1b2f7b3e | 4 | Copyright (c) 2012 - 2017, Intel Corporation. All rights reserved.<BR>\r |
8f07f895 | 5 | This program and the accompanying materials are licensed and made available under\r |
6 | the terms and conditions of the BSD License that accompanies this distribution.\r | |
7 | The full text of the license may be found at\r | |
8 | http://opensource.org/licenses/bsd-license.php.\r | |
9 | \r | |
10 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r | |
11 | WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r | |
12 | \r | |
13 | **/\r | |
14 | \r | |
8f07f895 | 15 | #include "CpuExceptionCommon.h"\r |
e41aad15 | 16 | #include <Library/DebugLib.h>\r |
8f07f895 | 17 | \r |
8f07f895 | 18 | /**\r |
44ecbc28 | 19 | Internal worker function for common exception handler.\r |
8f07f895 | 20 | \r |
44ecbc28 JF |
21 | @param ExceptionType Exception type.\r |
22 | @param SystemContext Pointer to EFI_SYSTEM_CONTEXT.\r | |
23 | @param ExceptionHandlerData Pointer to exception handler data.\r | |
8f07f895 | 24 | **/\r |
25 | VOID\r | |
44ecbc28 | 26 | CommonExceptionHandlerWorker (\r |
dd563742 | 27 | IN EFI_EXCEPTION_TYPE ExceptionType,\r |
44ecbc28 JF |
28 | IN EFI_SYSTEM_CONTEXT SystemContext,\r |
29 | IN EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r | |
8f07f895 | 30 | )\r |
31 | {\r | |
e41aad15 | 32 | EXCEPTION_HANDLER_CONTEXT *ExceptionHandlerContext;\r |
44ecbc28 JF |
33 | RESERVED_VECTORS_DATA *ReservedVectors;\r |
34 | EFI_CPU_INTERRUPT_HANDLER *ExternalInterruptHandler;\r | |
e41aad15 | 35 | \r |
44ecbc28 JF |
36 | ExceptionHandlerContext = (EXCEPTION_HANDLER_CONTEXT *) (UINTN) (SystemContext.SystemContextIa32);\r |
37 | ReservedVectors = ExceptionHandlerData->ReservedVectors;\r | |
38 | ExternalInterruptHandler = ExceptionHandlerData->ExternalInterruptHandler;\r | |
e41aad15 | 39 | \r |
44ecbc28 | 40 | switch (ReservedVectors[ExceptionType].Attribute) {\r |
e41aad15 JF |
41 | case EFI_VECTOR_HANDOFF_HOOK_BEFORE:\r |
42 | //\r | |
43 | // Need to jmp to old IDT handler after this exception handler\r | |
44 | //\r | |
45 | ExceptionHandlerContext->ExceptionDataFlag = (mErrorCodeFlag & (1 << ExceptionType)) ? TRUE : FALSE;\r | |
44ecbc28 | 46 | ExceptionHandlerContext->OldIdtHandler = ReservedVectors[ExceptionType].ExceptonHandler;\r |
e41aad15 JF |
47 | break;\r |
48 | case EFI_VECTOR_HANDOFF_HOOK_AFTER:\r | |
49 | while (TRUE) {\r | |
50 | //\r | |
51 | // If if anyone has gotten SPIN_LOCK for owner running hook after\r | |
52 | //\r | |
44ecbc28 | 53 | if (AcquireSpinLockOrFail (&ReservedVectors[ExceptionType].SpinLock)) {\r |
e41aad15 JF |
54 | //\r |
55 | // Need to execute old IDT handler before running this exception handler\r | |
56 | //\r | |
44ecbc28 | 57 | ReservedVectors[ExceptionType].ApicId = GetApicId ();\r |
81b21fc2 | 58 | ArchSaveExceptionContext (ExceptionType, SystemContext, ExceptionHandlerData);\r |
e41aad15 | 59 | ExceptionHandlerContext->ExceptionDataFlag = (mErrorCodeFlag & (1 << ExceptionType)) ? TRUE : FALSE;\r |
44ecbc28 | 60 | ExceptionHandlerContext->OldIdtHandler = ReservedVectors[ExceptionType].ExceptonHandler;\r |
e41aad15 JF |
61 | return;\r |
62 | }\r | |
63 | //\r | |
64 | // If failed to acquire SPIN_LOCK, check if it was locked by processor itself\r | |
65 | //\r | |
44ecbc28 | 66 | if (ReservedVectors[ExceptionType].ApicId == GetApicId ()) {\r |
e41aad15 | 67 | //\r |
438f1766 | 68 | // Old IDT handler has been executed, then restore CPU exception content to\r |
e41aad15 JF |
69 | // run new exception handler.\r |
70 | //\r | |
368c54e7 | 71 | ArchRestoreExceptionContext (ExceptionType, SystemContext, ExceptionHandlerData);\r |
e41aad15 JF |
72 | //\r |
73 | // Rlease spin lock for ApicId\r | |
74 | //\r | |
44ecbc28 | 75 | ReleaseSpinLock (&ReservedVectors[ExceptionType].SpinLock);\r |
e41aad15 JF |
76 | break;\r |
77 | }\r | |
78 | CpuPause ();\r | |
79 | }\r | |
80 | break;\r | |
81 | case 0xffffffff:\r | |
82 | break;\r | |
83 | default:\r | |
84 | //\r | |
85 | // It should never reach here\r | |
86 | //\r | |
87 | CpuDeadLoop ();\r | |
88 | break;\r | |
8f07f895 | 89 | }\r |
dd563742 | 90 | \r |
44ecbc28 JF |
91 | if (ExternalInterruptHandler != NULL &&\r |
92 | ExternalInterruptHandler[ExceptionType] != NULL) {\r | |
93 | (ExternalInterruptHandler[ExceptionType]) (ExceptionType, SystemContext);\r | |
f3b113bf | 94 | } else if (ExceptionType < CPU_EXCEPTION_NUM) {\r |
e41aad15 JF |
95 | //\r |
96 | // Get Spinlock to display CPU information\r | |
97 | //\r | |
44ecbc28 | 98 | while (!AcquireSpinLockOrFail (&ExceptionHandlerData->DisplayMessageSpinLock)) {\r |
e41aad15 JF |
99 | CpuPause ();\r |
100 | }\r | |
101 | //\r | |
102 | // Display ExceptionType, CPU information and Image information\r | |
dd563742 | 103 | //\r |
1b2f7b3e | 104 | DumpImageAndCpuContent (ExceptionType, SystemContext);\r |
e41aad15 JF |
105 | //\r |
106 | // Release Spinlock of output message\r | |
107 | //\r | |
44ecbc28 | 108 | ReleaseSpinLock (&ExceptionHandlerData->DisplayMessageSpinLock);\r |
e41aad15 JF |
109 | //\r |
110 | // Enter a dead loop if needn't to execute old IDT handler further\r | |
111 | //\r | |
44ecbc28 | 112 | if (ReservedVectors[ExceptionType].Attribute != EFI_VECTOR_HANDOFF_HOOK_BEFORE) {\r |
e41aad15 JF |
113 | CpuDeadLoop ();\r |
114 | }\r | |
115 | }\r | |
116 | }\r | |
8f07f895 | 117 | \r |
e41aad15 JF |
118 | /**\r |
119 | Internal worker function to update IDT entries accordling to vector attributes.\r | |
120 | \r | |
9db15f81 JF |
121 | @param[in] IdtTable Pointer to IDT table.\r |
122 | @param[in] TemplateMap Pointer to a buffer where the address map is\r | |
123 | returned.\r | |
124 | @param[in] ExceptionHandlerData Pointer to exception handler data.\r | |
e41aad15 JF |
125 | \r |
126 | **/\r | |
127 | VOID\r | |
128 | UpdateIdtTable (\r | |
129 | IN IA32_IDT_GATE_DESCRIPTOR *IdtTable,\r | |
130 | IN EXCEPTION_HANDLER_TEMPLATE_MAP *TemplateMap,\r | |
9db15f81 | 131 | IN EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r |
e41aad15 JF |
132 | )\r |
133 | {\r | |
134 | UINT16 CodeSegment;\r | |
135 | UINTN Index;\r | |
136 | UINTN InterruptHandler;\r | |
9db15f81 | 137 | RESERVED_VECTORS_DATA *ReservedVectors;\r |
8f07f895 | 138 | \r |
9db15f81 | 139 | ReservedVectors = ExceptionHandlerData->ReservedVectors;\r |
8f07f895 | 140 | //\r |
e41aad15 | 141 | // Use current CS as the segment selector of interrupt gate in IDT\r |
8f07f895 | 142 | //\r |
e41aad15 | 143 | CodeSegment = AsmReadCs ();\r |
8f07f895 | 144 | \r |
9db15f81 | 145 | for (Index = 0; Index < ExceptionHandlerData->IdtEntryCount; Index ++) {\r |
e41aad15 JF |
146 | IdtTable[Index].Bits.Selector = CodeSegment;\r |
147 | //\r | |
148 | // Check reserved vectors attributes\r | |
149 | //\r | |
9db15f81 | 150 | switch (ReservedVectors[Index].Attribute) {\r |
e41aad15 JF |
151 | case EFI_VECTOR_HANDOFF_DO_NOT_HOOK:\r |
152 | //\r | |
153 | // Keep original IDT entry\r | |
154 | //\r | |
155 | continue;\r | |
156 | case EFI_VECTOR_HANDOFF_HOOK_AFTER:\r | |
9db15f81 | 157 | InitializeSpinLock (&ReservedVectors[Index].SpinLock);\r |
e41aad15 | 158 | CopyMem (\r |
9db15f81 | 159 | (VOID *) ReservedVectors[Index].HookAfterStubHeaderCode,\r |
e41aad15 JF |
160 | (VOID *) TemplateMap->HookAfterStubHeaderStart,\r |
161 | TemplateMap->ExceptionStubHeaderSize\r | |
162 | );\r | |
07da1ac8 | 163 | AsmVectorNumFixup (\r |
9db15f81 | 164 | (VOID *) ReservedVectors[Index].HookAfterStubHeaderCode,\r |
07da1ac8 AF |
165 | (UINT8) Index,\r |
166 | (VOID *) TemplateMap->HookAfterStubHeaderStart\r | |
167 | );\r | |
e41aad15 JF |
168 | //\r |
169 | // Go on the following code\r | |
170 | //\r | |
171 | case EFI_VECTOR_HANDOFF_HOOK_BEFORE:\r | |
172 | //\r | |
173 | // Save original IDT handler address\r | |
174 | //\r | |
9db15f81 | 175 | ReservedVectors[Index].ExceptonHandler = ArchGetIdtHandler (&IdtTable[Index]);\r |
e41aad15 JF |
176 | //\r |
177 | // Go on the following code\r | |
178 | //\r | |
179 | default:\r | |
180 | //\r | |
181 | // Update new IDT entry\r | |
182 | //\r | |
183 | InterruptHandler = TemplateMap->ExceptionStart + Index * TemplateMap->ExceptionStubHeaderSize;\r | |
184 | ArchUpdateIdtEntry (&IdtTable[Index], InterruptHandler);\r | |
185 | break;\r | |
186 | }\r | |
187 | }\r | |
8f07f895 | 188 | }\r |
189 | \r | |
190 | /**\r | |
e41aad15 | 191 | Internal worker function to initialize exception handler.\r |
8f07f895 | 192 | \r |
ab95e54d JF |
193 | @param[in] VectorInfo Pointer to reserved vector list.\r |
194 | @param[in, out] ExceptionHandlerData Pointer to exception handler data.\r | |
dd563742 JF |
195 | \r |
196 | @retval EFI_SUCCESS CPU Exception Entries have been successfully initialized\r | |
e41aad15 JF |
197 | with default exception handlers.\r |
198 | @retval EFI_INVALID_PARAMETER VectorInfo includes the invalid content if VectorInfo is not NULL.\r | |
199 | @retval EFI_UNSUPPORTED This function is not supported.\r | |
200 | \r | |
8f07f895 | 201 | **/\r |
e41aad15 JF |
202 | EFI_STATUS\r |
203 | InitializeCpuExceptionHandlersWorker (\r | |
ab95e54d JF |
204 | IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL,\r |
205 | IN OUT EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r | |
8f07f895 | 206 | )\r |
207 | {\r | |
e41aad15 JF |
208 | EFI_STATUS Status;\r |
209 | IA32_DESCRIPTOR IdtDescriptor;\r | |
210 | UINTN IdtEntryCount;\r | |
211 | EXCEPTION_HANDLER_TEMPLATE_MAP TemplateMap;\r | |
212 | IA32_IDT_GATE_DESCRIPTOR *IdtTable;\r | |
ab95e54d | 213 | RESERVED_VECTORS_DATA *ReservedVectors;\r |
e41aad15 | 214 | \r |
ab95e54d JF |
215 | ReservedVectors = ExceptionHandlerData->ReservedVectors;\r |
216 | SetMem ((VOID *) ReservedVectors, sizeof (RESERVED_VECTORS_DATA) * CPU_EXCEPTION_NUM, 0xff);\r | |
e41aad15 | 217 | if (VectorInfo != NULL) {\r |
ab95e54d | 218 | Status = ReadAndVerifyVectorInfo (VectorInfo, ReservedVectors, CPU_EXCEPTION_NUM);\r |
e41aad15 JF |
219 | if (EFI_ERROR (Status)) {\r |
220 | return EFI_INVALID_PARAMETER;\r | |
221 | }\r | |
222 | }\r | |
e41aad15 | 223 | \r |
e41aad15 JF |
224 | //\r |
225 | // Read IDT descriptor and calculate IDT size\r | |
226 | //\r | |
227 | AsmReadIdtr (&IdtDescriptor);\r | |
228 | IdtEntryCount = (IdtDescriptor.Limit + 1) / sizeof (IA32_IDT_GATE_DESCRIPTOR);\r | |
229 | if (IdtEntryCount > CPU_EXCEPTION_NUM) {\r | |
230 | //\r | |
231 | // CPU exeption library only setup CPU_EXCEPTION_NUM exception handler at most\r | |
232 | //\r | |
233 | IdtEntryCount = CPU_EXCEPTION_NUM;\r | |
234 | }\r | |
235 | \r | |
236 | IdtTable = (IA32_IDT_GATE_DESCRIPTOR *) IdtDescriptor.Base;\r | |
237 | AsmGetTemplateAddressMap (&TemplateMap);\r | |
238 | ASSERT (TemplateMap.ExceptionStubHeaderSize <= HOOKAFTER_STUB_SIZE);\r | |
9db15f81 JF |
239 | \r |
240 | ExceptionHandlerData->IdtEntryCount = IdtEntryCount;\r | |
241 | UpdateIdtTable (IdtTable, &TemplateMap, ExceptionHandlerData);\r | |
d91225cf | 242 | \r |
e41aad15 JF |
243 | return EFI_SUCCESS;\r |
244 | }\r | |
245 | \r | |
246 | /**\r | |
247 | Registers a function to be called from the processor interrupt handler.\r | |
248 | \r | |
670f13af JF |
249 | @param[in] InterruptType Defines which interrupt or exception to hook.\r |
250 | @param[in] InterruptHandler A pointer to a function of type EFI_CPU_INTERRUPT_HANDLER that is called\r | |
251 | when a processor interrupt occurs. If this parameter is NULL, then the handler\r | |
252 | will be uninstalled\r | |
253 | @param[in] ExceptionHandlerData Pointer to exception handler data.\r | |
e41aad15 JF |
254 | \r |
255 | @retval EFI_SUCCESS The handler for the processor interrupt was successfully installed or uninstalled.\r | |
256 | @retval EFI_ALREADY_STARTED InterruptHandler is not NULL, and a handler for InterruptType was\r | |
257 | previously installed.\r | |
258 | @retval EFI_INVALID_PARAMETER InterruptHandler is NULL, and a handler for InterruptType was not\r | |
259 | previously installed.\r | |
260 | @retval EFI_UNSUPPORTED The interrupt specified by InterruptType is not supported,\r | |
261 | or this function is not supported.\r | |
3f25e6ea | 262 | **/\r |
e41aad15 JF |
263 | EFI_STATUS\r |
264 | RegisterCpuInterruptHandlerWorker (\r | |
265 | IN EFI_EXCEPTION_TYPE InterruptType,\r | |
670f13af JF |
266 | IN EFI_CPU_INTERRUPT_HANDLER InterruptHandler,\r |
267 | IN EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r | |
e41aad15 JF |
268 | )\r |
269 | {\r | |
670f13af JF |
270 | UINTN EnabledInterruptNum;\r |
271 | RESERVED_VECTORS_DATA *ReservedVectors;\r | |
272 | EFI_CPU_INTERRUPT_HANDLER *ExternalInterruptHandler;\r | |
273 | \r | |
274 | EnabledInterruptNum = ExceptionHandlerData->IdtEntryCount;\r | |
275 | ReservedVectors = ExceptionHandlerData->ReservedVectors;\r | |
276 | ExternalInterruptHandler = ExceptionHandlerData->ExternalInterruptHandler;\r | |
277 | \r | |
278 | if (InterruptType < 0 || InterruptType >= (EFI_EXCEPTION_TYPE)EnabledInterruptNum ||\r | |
279 | ReservedVectors[InterruptType].Attribute == EFI_VECTOR_HANDOFF_DO_NOT_HOOK) {\r | |
e41aad15 JF |
280 | return EFI_UNSUPPORTED;\r |
281 | }\r | |
282 | \r | |
670f13af | 283 | if (InterruptHandler == NULL && ExternalInterruptHandler[InterruptType] == NULL) {\r |
e41aad15 JF |
284 | return EFI_INVALID_PARAMETER;\r |
285 | }\r | |
286 | \r | |
670f13af | 287 | if (InterruptHandler != NULL && ExternalInterruptHandler[InterruptType] != NULL) {\r |
e41aad15 JF |
288 | return EFI_ALREADY_STARTED;\r |
289 | }\r | |
290 | \r | |
670f13af | 291 | ExternalInterruptHandler[InterruptType] = InterruptHandler;\r |
e41aad15 | 292 | return EFI_SUCCESS;\r |
8f07f895 | 293 | }\r |
294 | \r |