]> git.proxmox.com Git - mirror_edk2.git/blame - UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/SmmFuncsArch.c
UefiCpuPkg/PiSmmCpuDxeSmm: Add paging protection.
[mirror_edk2.git] / UefiCpuPkg / PiSmmCpuDxeSmm / Ia32 / SmmFuncsArch.c
CommitLineData
fe5f1949
JY
1/** @file\r
2 SMM CPU misc functions for Ia32 arch specific.\r
3 \r
4a0f88dd 4Copyright (c) 2015 - 2016, Intel Corporation. All rights reserved.<BR>\r
fe5f1949
JY
5This program and the accompanying materials\r
6are licensed and made available under the terms and conditions of the BSD License\r
7which accompanies this distribution. The full text of the license may be found at\r
8http://opensource.org/licenses/bsd-license.php\r
9\r
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
12\r
13**/\r
14\r
15#include "PiSmmCpuDxeSmm.h"\r
16\r
717fb604
JY
17extern UINT64 gTaskGateDescriptor;\r
18\r
19EFI_PHYSICAL_ADDRESS mGdtBuffer;\r
20UINTN mGdtBufferSize;\r
21\r
22/**\r
23 Initialize IDT for SMM Stack Guard.\r
24\r
25**/\r
26VOID\r
27EFIAPI\r
28InitializeIDTSmmStackGuard (\r
29 VOID\r
30 )\r
31{\r
32 IA32_IDT_GATE_DESCRIPTOR *IdtGate;\r
33\r
34 //\r
35 // If SMM Stack Guard feature is enabled, the Page Fault Exception entry in IDT\r
36 // is a Task Gate Descriptor so that when a Page Fault Exception occurs,\r
37 // the processors can use a known good stack in case stack is ran out.\r
38 //\r
39 IdtGate = (IA32_IDT_GATE_DESCRIPTOR *)gcSmiIdtr.Base;\r
40 IdtGate += EXCEPT_IA32_PAGE_FAULT;\r
41 IdtGate->Uint64 = gTaskGateDescriptor;\r
42}\r
43\r
fe5f1949
JY
44/**\r
45 Initialize Gdt for all processors.\r
46 \r
47 @param[in] Cr3 CR3 value.\r
48 @param[out] GdtStepSize The step size for GDT table.\r
49\r
50 @return GdtBase for processor 0.\r
51 GdtBase for processor X is: GdtBase + (GdtStepSize * X)\r
52**/\r
53VOID *\r
54InitGdt (\r
55 IN UINTN Cr3,\r
56 OUT UINTN *GdtStepSize\r
57 )\r
58{\r
59 UINTN Index;\r
60 IA32_SEGMENT_DESCRIPTOR *GdtDescriptor;\r
61 UINTN TssBase;\r
62 UINTN GdtTssTableSize;\r
63 UINT8 *GdtTssTables;\r
64 UINTN GdtTableStepSize;\r
65\r
66 if (FeaturePcdGet (PcdCpuSmmStackGuard)) {\r
67 //\r
68 // For IA32 SMM, if SMM Stack Guard feature is enabled, we use 2 TSS.\r
69 // in this case, we allocate separate GDT/TSS for each CPUs to avoid TSS load contention\r
70 // on each SMI entry.\r
71 //\r
72\r
73 //\r
74 // Enlarge GDT to contain 2 TSS descriptors\r
75 //\r
76 gcSmiGdtr.Limit += (UINT16)(2 * sizeof (IA32_SEGMENT_DESCRIPTOR));\r
77\r
78 GdtTssTableSize = (gcSmiGdtr.Limit + 1 + TSS_SIZE * 2 + 7) & ~7; // 8 bytes aligned\r
717fb604
JY
79 mGdtBufferSize = GdtTssTableSize * gSmmCpuPrivate->SmmCoreEntryContext.NumberOfCpus;\r
80 GdtTssTables = (UINT8*)AllocateCodePages (EFI_SIZE_TO_PAGES (mGdtBufferSize));\r
fe5f1949 81 ASSERT (GdtTssTables != NULL);\r
717fb604 82 mGdtBuffer = (UINTN)GdtTssTables;\r
fe5f1949
JY
83 GdtTableStepSize = GdtTssTableSize;\r
84\r
85 for (Index = 0; Index < gSmmCpuPrivate->SmmCoreEntryContext.NumberOfCpus; Index++) {\r
86 CopyMem (GdtTssTables + GdtTableStepSize * Index, (VOID*)(UINTN)gcSmiGdtr.Base, gcSmiGdtr.Limit + 1 + TSS_SIZE * 2);\r
87 //\r
88 // Fixup TSS descriptors\r
89 //\r
90 TssBase = (UINTN)(GdtTssTables + GdtTableStepSize * Index + gcSmiGdtr.Limit + 1);\r
91 GdtDescriptor = (IA32_SEGMENT_DESCRIPTOR *)(TssBase) - 2;\r
92 GdtDescriptor->Bits.BaseLow = (UINT16)TssBase;\r
93 GdtDescriptor->Bits.BaseMid = (UINT8)(TssBase >> 16);\r
94 GdtDescriptor->Bits.BaseHigh = (UINT8)(TssBase >> 24);\r
95\r
96 TssBase += TSS_SIZE;\r
97 GdtDescriptor++;\r
98 GdtDescriptor->Bits.BaseLow = (UINT16)TssBase;\r
99 GdtDescriptor->Bits.BaseMid = (UINT8)(TssBase >> 16);\r
100 GdtDescriptor->Bits.BaseHigh = (UINT8)(TssBase >> 24);\r
101 //\r
102 // Fixup TSS segments\r
103 //\r
104 // ESP as known good stack\r
105 //\r
106 *(UINTN *)(TssBase + TSS_IA32_ESP_OFFSET) = mSmmStackArrayBase + EFI_PAGE_SIZE + Index * mSmmStackSize;\r
107 *(UINT32 *)(TssBase + TSS_IA32_CR3_OFFSET) = Cr3;\r
108 }\r
109 } else {\r
110 //\r
111 // Just use original table, AllocatePage and copy them here to make sure GDTs are covered in page memory.\r
112 //\r
113 GdtTssTableSize = gcSmiGdtr.Limit + 1;\r
717fb604
JY
114 mGdtBufferSize = GdtTssTableSize * gSmmCpuPrivate->SmmCoreEntryContext.NumberOfCpus;\r
115 GdtTssTables = (UINT8*)AllocateCodePages (EFI_SIZE_TO_PAGES (mGdtBufferSize));\r
fe5f1949 116 ASSERT (GdtTssTables != NULL);\r
717fb604 117 mGdtBuffer = (UINTN)GdtTssTables;\r
fe5f1949
JY
118 GdtTableStepSize = GdtTssTableSize;\r
119\r
120 for (Index = 0; Index < gSmmCpuPrivate->SmmCoreEntryContext.NumberOfCpus; Index++) {\r
121 CopyMem (GdtTssTables + GdtTableStepSize * Index, (VOID*)(UINTN)gcSmiGdtr.Base, gcSmiGdtr.Limit + 1);\r
122 }\r
123 }\r
124\r
125 *GdtStepSize = GdtTableStepSize;\r
126 return GdtTssTables;\r
127}\r
4a0f88dd
JF
128\r
129/**\r
130 Transfer AP to safe hlt-loop after it finished restore CPU features on S3 patch.\r
131\r
132 @param[in] ApHltLoopCode The 32-bit address of the safe hlt-loop function.\r
133 @param[in] TopOfStack A pointer to the new stack to use for the ApHltLoopCode.\r
ec8a3877 134 @param[in] NumberToFinish Semaphore of APs finish count.\r
4a0f88dd
JF
135\r
136**/\r
137VOID\r
138TransferApToSafeState (\r
139 IN UINT32 ApHltLoopCode,\r
ec8a3877
JF
140 IN UINT32 TopOfStack,\r
141 IN UINT32 *NumberToFinish\r
4a0f88dd
JF
142 )\r
143{\r
144 SwitchStack (\r
145 (SWITCH_STACK_ENTRY_POINT) (UINTN) ApHltLoopCode,\r
ec8a3877 146 NumberToFinish,\r
4a0f88dd
JF
147 NULL,\r
148 (VOID *) (UINTN) TopOfStack\r
149 );\r
150 //\r
151 // It should never reach here\r
152 //\r
153 ASSERT (FALSE);\r
154}\r