]> git.proxmox.com Git - mirror_edk2.git/blobdiff - EdkModulePkg/Core/DxeIplX64Peim/DxeLoadX64.c
Add missing files in msa file and add module description in msa file, and reorganize...
[mirror_edk2.git] / EdkModulePkg / Core / DxeIplX64Peim / DxeLoadX64.c
diff --git a/EdkModulePkg/Core/DxeIplX64Peim/DxeLoadX64.c b/EdkModulePkg/Core/DxeIplX64Peim/DxeLoadX64.c
new file mode 100644 (file)
index 0000000..cbb7595
--- /dev/null
@@ -0,0 +1,997 @@
+/*++\r
+\r
+Copyright (c) 2006, Intel Corporation                                                         \r
+All rights reserved. This program and the accompanying materials                          \r
+are licensed and made available under the terms and conditions of the BSD License         \r
+which accompanies this distribution.  The full text of the license may be found at        \r
+http://opensource.org/licenses/bsd-license.php                                            \r
+                                                                                          \r
+THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,                     \r
+WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.             \r
+\r
+Module Name:\r
+\r
+  DxeLoad.c\r
+\r
+Abstract:\r
+\r
+  Last PEIM.\r
+  Responsibility of this module is to load the DXE Core from a Firmware Volume.\r
+\r
+--*/\r
+\r
+#include <DxeIpl.h>\r
+\r
+#pragma warning( disable : 4305 )\r
+\r
+BOOLEAN gInMemory = FALSE;\r
+\r
+//\r
+// GUID for EM64T\r
+//\r
+#define EFI_PPI_NEEDED_BY_DXE \\r
+  { \\r
+    0x4d37da42, 0x3a0c, 0x4eda, 0xb9, 0xeb, 0xbc, 0x0e, 0x1d, 0xb4, 0x71, 0x3b \\r
+  }\r
+EFI_GUID mPpiNeededByDxeGuid = EFI_PPI_NEEDED_BY_DXE;\r
+\r
+//\r
+// Module Globals used in the DXE to PEI handoff\r
+// These must be module globals, so the stack can be switched\r
+//\r
+static EFI_DXE_IPL_PPI mDxeIplPpi = {\r
+  DxeLoadCore\r
+};\r
+\r
+static EFI_PEI_FV_FILE_LOADER_PPI mLoadFilePpi = {\r
+  DxeIplLoadFile\r
+};\r
+\r
+static EFI_PEI_PPI_DESCRIPTOR     mPpiLoadFile = {\r
+  (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
+  &gEfiPeiFvFileLoaderPpiGuid,\r
+  &mLoadFilePpi\r
+};\r
+\r
+static EFI_PEI_PPI_DESCRIPTOR     mPpiList = {\r
+  (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
+  &gEfiDxeIplPpiGuid,\r
+  &mDxeIplPpi\r
+};\r
+\r
+static EFI_PEI_PPI_DESCRIPTOR     mPpiPeiInMemory = {\r
+  (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
+  &gPeiInMemoryGuid,\r
+  NULL\r
+};\r
+\r
+static EFI_PEI_PPI_DESCRIPTOR     mPpiSignal = {\r
+  (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
+  &gEfiEndOfPeiSignalPpiGuid,\r
+  NULL\r
+};\r
+\r
+DECOMPRESS_LIBRARY  gEfiDecompress = {\r
+  UefiDecompressGetInfo,\r
+  UefiDecompress\r
+};\r
+\r
+DECOMPRESS_LIBRARY  gTianoDecompress = {\r
+  TianoDecompressGetInfo,\r
+  TianoDecompress\r
+};\r
+\r
+DECOMPRESS_LIBRARY  gCustomDecompress = {\r
+  CustomDecompressGetInfo,\r
+  CustomDecompress\r
+};\r
+\r
+STATIC\r
+UINTN\r
+GetOccupiedSize (\r
+  IN UINTN   ActualSize,\r
+  IN UINTN   Alignment\r
+  )\r
+{\r
+  UINTN OccupiedSize;\r
+\r
+  OccupiedSize = ActualSize;\r
+  while ((OccupiedSize & (Alignment - 1)) != 0) {\r
+    OccupiedSize++;\r
+  }\r
+\r
+  return OccupiedSize;\r
+}\r
+\r
+EFI_STATUS\r
+EFIAPI\r
+PeimInitializeDxeIpl (\r
+  IN EFI_FFS_FILE_HEADER       *FfsHeader,\r
+  IN EFI_PEI_SERVICES          **PeiServices\r
+  )\r
+/*++\r
+\r
+Routine Description:\r
+\r
+  Initializes the Dxe Ipl PPI\r
+\r
+Arguments:\r
+\r
+  FfsHeader   - Pointer to FFS file header\r
+  PeiServices - General purpose services available to every PEIM.\r
+\r
+Returns:\r
+\r
+  EFI_SUCCESS\r
+\r
+--*/\r
+{\r
+  EFI_STATUS                                Status;\r
+  EFI_PEI_PE_COFF_LOADER_PROTOCOL           *PeiEfiPeiPeCoffLoader;\r
+  EFI_BOOT_MODE                             BootMode;\r
+\r
+  Status = PeiServicesGetBootMode (&BootMode);\r
+\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
+  Status = PeiServicesLocatePpi (\r
+             &gPeiInMemoryGuid,\r
+             0,\r
+             NULL,\r
+             NULL\r
+             );\r
+\r
+  if (EFI_ERROR (Status) && (BootMode != BOOT_ON_S3_RESUME)) {   \r
+    //\r
+    // The DxeIpl has not yet been shadowed\r
+    //\r
+    PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();\r
+\r
+    //\r
+    // Shadow DxeIpl and then re-run its entry point\r
+    //\r
+    Status = ShadowDxeIpl (FfsHeader, PeiEfiPeiPeCoffLoader);\r
+    if (EFI_ERROR (Status)) {\r
+      return Status;\r
+    }\r
+\r
+  } else {\r
+    if (BootMode != BOOT_ON_S3_RESUME) {\r
+    //\r
+    // The DxeIpl has been shadowed\r
+    //\r
+    gInMemory = TRUE;\r
+\r
+    //\r
+    // Install LoadFile PPI\r
+    //\r
+    Status = PeiServicesInstallPpi (&mPpiLoadFile);\r
+\r
+    if (EFI_ERROR (Status)) {\r
+      return Status;\r
+      }\r
+    }\r
+    //\r
+    // Install DxeIpl PPI\r
+    //\r
+    PeiServicesInstallPpi (&mPpiList);\r
+\r
+    if (EFI_ERROR (Status)) {\r
+      return Status;\r
+    }\r
+\r
+  }\r
+\r
+  return EFI_SUCCESS;\r
+}\r
+\r
+EFI_STATUS\r
+EFIAPI\r
+DxeLoadCore (\r
+  IN EFI_DXE_IPL_PPI       *This,\r
+  IN EFI_PEI_SERVICES      **PeiServices,\r
+  IN EFI_PEI_HOB_POINTERS  HobList\r
+  )\r
+/*++\r
+\r
+Routine Description:\r
+\r
+  Main entry point to last PEIM\r
+\r
+Arguments:\r
+\r
+  This         - Entry point for DXE IPL PPI\r
+  PeiServices  - General purpose services available to every PEIM.\r
+  HobList      - Address to the Pei HOB list\r
+\r
+Returns:\r
+\r
+  EFI_SUCCESS          - DEX core was successfully loaded.\r
+  EFI_OUT_OF_RESOURCES - There are not enough resources to load DXE core.\r
+\r
+--*/\r
+{\r
+  EFI_STATUS                                                Status;\r
+  EFI_PHYSICAL_ADDRESS                                      TopOfStack;\r
+  EFI_PHYSICAL_ADDRESS                                      BaseOfStack;\r
+  EFI_PHYSICAL_ADDRESS                                      BspStore;\r
+  EFI_GUID                                                  DxeCoreFileName;\r
+  VOID                                                      *DxeCorePe32Data;\r
+  EFI_PHYSICAL_ADDRESS                                      DxeCoreAddress;\r
+  UINT64                                                    DxeCoreSize;\r
+  EFI_PHYSICAL_ADDRESS                                      DxeCoreEntryPoint;\r
+  EFI_PEI_PE_COFF_LOADER_PROTOCOL                           *PeiEfiPeiPeCoffLoader;\r
+  EFI_BOOT_MODE                                             BootMode;\r
+  EFI_PEI_RECOVERY_MODULE_PPI                               *PeiRecovery;\r
+  EFI_PEI_S3_RESUME_PPI                                     *S3Resume;\r
+  EFI_PHYSICAL_ADDRESS                                      PageTables;\r
+  \r
+  TopOfStack  = 0;\r
+  BaseOfStack = 0;\r
+  BspStore    = 0;\r
+  Status      = EFI_SUCCESS;\r
+\r
+  //\r
+  // if in S3 Resume, restore configure\r
+  //\r
+  Status = PeiServicesGetBootMode (&BootMode);\r
+\r
+  if (!EFI_ERROR (Status) && (BootMode == BOOT_ON_S3_RESUME)) {\r
+    Status = PeiServicesLocatePpi (\r
+               &gEfiPeiS3ResumePpiGuid,\r
+               0,\r
+               NULL,\r
+               (VOID **)&S3Resume\r
+               );\r
+\r
+    ASSERT_EFI_ERROR (Status);\r
+\r
+    Status = S3Resume->S3RestoreConfig (PeiServices);\r
+\r
+    ASSERT_EFI_ERROR (Status);\r
+  }\r
+\r
+  Status = EFI_SUCCESS;\r
+\r
+  //\r
+  // Install the PEI Protocols that are shared between PEI and DXE\r
+  //\r
+#ifdef EFI_NT_EMULATOR\r
+  PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();\r
+  ASSERT (PeiEfiPeiPeCoffLoader != NULL);\r
+#else\r
+  PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderX64Protocol ();\r
+#endif \r
+\r
+#if 0\r
+  Status = InstallEfiPeiPeCoffLoader64 (PeiServices, &PeiEfiPeiPeCoffLoader, NULL);\r
+  ASSERT_EFI_ERROR (Status);\r
+#endif\r
+  //\r
+  // Allocate 128KB for the Stack\r
+  //\r
+  PeiServicesAllocatePages (EfiBootServicesData, EFI_SIZE_TO_PAGES (STACK_SIZE), &BaseOfStack);\r
+  ASSERT (BaseOfStack != 0);\r
+\r
+  //\r
+  // Compute the top of the stack we were allocated. Pre-allocate a 32 bytes\r
+  // for safety (PpisNeededByDxe and DxeCore).\r
+  //\r
+  TopOfStack = BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - 32;\r
+\r
+  //\r
+  // Add architecture-specifc HOBs (including the BspStore HOB)\r
+  //\r
+  Status = CreateArchSpecificHobs (&BspStore);\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
+  //\r
+  // See if we are in crisis recovery\r
+  //\r
+  Status = PeiServicesGetBootMode (&BootMode);\r
+  if (!EFI_ERROR (Status) && (BootMode == BOOT_IN_RECOVERY_MODE)) {\r
+    Status = PeiServicesLocatePpi (\r
+               &gEfiPeiRecoveryModulePpiGuid,\r
+               0,\r
+               NULL,\r
+               (VOID **)&PeiRecovery\r
+               );\r
+\r
+    ASSERT_EFI_ERROR (Status);\r
+    Status = PeiRecovery->LoadRecoveryCapsule (PeiServices, PeiRecovery);\r
+    ASSERT_EFI_ERROR (Status);\r
+  }\r
+\r
+  //\r
+  // Find the DXE Core in a Firmware Volume\r
+  //\r
+  Status = PeiFindFile (\r
+             EFI_FV_FILETYPE_DXE_CORE,\r
+             EFI_SECTION_PE32,\r
+             &DxeCoreFileName,\r
+             &DxeCorePe32Data\r
+             );\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
+  //\r
+  // Transfer control to the DXE Core\r
+  // The handoff state is simply a pointer to the HOB list\r
+  //\r
+  // PEI_PERF_END (PeiServices, L"DxeIpl", NULL, 0);\r
+\r
+  Status = PeiServicesInstallPpi (&mPpiSignal);\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
+  //\r
+  // Load the GDT of Go64. Since the GDT of 32-bit Tiano locates in the BS_DATA \\r
+  // memory, it may be corrupted when copying FV to high-end memory \r
+  LoadGo64Gdt();\r
+\r
+  //\r
+  // Limit to 36 bits of addressing for debug. Should get it from CPU\r
+  //\r
+  PageTables = CreateIdentityMappingPageTables (36);\r
+\r
+\r
+  //\r
+  // Load the DXE Core from a Firmware Volume\r
+  //\r
+  Status = PeiLoadx64File (\r
+             PeiEfiPeiPeCoffLoader,\r
+             DxeCorePe32Data,\r
+             EfiBootServicesData,\r
+             &DxeCoreAddress,\r
+             &DxeCoreSize,\r
+             &DxeCoreEntryPoint\r
+             );\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
+  //\r
+  //\r
+  // Add HOB for the DXE Core\r
+  //\r
+  BuildModuleHob (\r
+    &DxeCoreFileName,\r
+    DxeCoreAddress,\r
+    DxeCoreSize,\r
+    DxeCoreEntryPoint\r
+    );\r
+\r
+  //\r
+  // Report Status Code EFI_SW_PEI_PC_HANDOFF_TO_NEXT\r
+  //\r
+  REPORT_STATUS_CODE (\r
+    EFI_PROGRESS_CODE,\r
+    EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_CORE_PC_HANDOFF_TO_NEXT\r
+    );\r
+\r
+  DEBUG ((EFI_D_INFO, "DXE Core Entry\n"));\r
+  //\r
+  // Go to Long Mode. Interrupts will not get turned on until the CPU AP is loaded.\r
+  // Call x64 drivers passing in single argument, a pointer to the HOBs.\r
+  //\r
+  ActivateLongMode (\r
+    PageTables, \r
+    (EFI_PHYSICAL_ADDRESS)(UINTN)(HobList.Raw), \r
+    TopOfStack,\r
+    0x00000000,\r
+    DxeCoreEntryPoint\r
+    );\r
+\r
+  //\r
+  // If we get here, then the DXE Core returned.  This is an error\r
+  //\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
+  return EFI_OUT_OF_RESOURCES;\r
+}\r
+\r
+EFI_STATUS\r
+PeiFindFile (\r
+  IN  UINT8                  Type,\r
+  IN  UINT16                 SectionType,\r
+  OUT EFI_GUID               *FileName,\r
+  OUT VOID                   **Pe32Data\r
+  )\r
+/*++\r
+\r
+Routine Description:\r
+\r
+  Finds a PE/COFF of a specific Type and SectionType in the Firmware Volumes\r
+  described in the HOB list. Able to search in a compression set in a FFS file.\r
+  But only one level of compression is supported, that is, not able to search\r
+  in a compression set that is within another compression set.\r
+\r
+Arguments:\r
+\r
+  Type        - The Type of file to retrieve\r
+\r
+  SectionType - The type of section to retrieve from a file\r
+\r
+  FileName    - The name of the file found in the Firmware Volume\r
+\r
+  Pe32Data    - Pointer to the beginning of the PE/COFF file found in the Firmware Volume\r
+\r
+Returns:\r
+\r
+  EFI_SUCCESS   - The file was found, and the name is returned in FileName, and a pointer to\r
+                  the PE/COFF image is returned in Pe32Data\r
+\r
+  EFI_NOT_FOUND - The file was not found in the Firmware Volumes present in the HOB List\r
+\r
+--*/\r
+{\r
+  EFI_FIRMWARE_VOLUME_HEADER  *FwVolHeader;\r
+  EFI_FFS_FILE_HEADER         *FfsFileHeader;\r
+  VOID                        *SectionData;\r
+  EFI_STATUS                  Status;\r
+  EFI_PEI_HOB_POINTERS        Hob;\r
+\r
+\r
+  FwVolHeader   = NULL;\r
+  FfsFileHeader = NULL;\r
+  SectionData   = NULL;\r
+\r
+  //\r
+  // Foreach Firmware Volume, look for a specified type\r
+  // of file and break out when one is found\r
+  //\r
+  Hob.Raw = GetHobList ();\r
+  while ((Hob.Raw = GetNextHob (EFI_HOB_TYPE_FV, Hob.Raw)) != NULL) {\r
+    FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (Hob.FirmwareVolume->BaseAddress);\r
+    Status = PeiServicesFfsFindNextFile (\r
+               Type,\r
+               FwVolHeader,\r
+               &FfsFileHeader\r
+               );\r
+    if (!EFI_ERROR (Status)) {\r
+      Status = PeiProcessFile (\r
+                 SectionType,\r
+                 &FfsFileHeader,\r
+                 Pe32Data\r
+                 );\r
+      CopyMem (FileName, &FfsFileHeader->Name, sizeof (EFI_GUID));\r
+      return Status;\r
+    }\r
+    Hob.Raw = GET_NEXT_HOB (Hob);\r
+  }\r
+  return EFI_NOT_FOUND;\r
+}\r
+\r
+EFI_STATUS\r
+PeiLoadx64File (\r
+  IN  EFI_PEI_PE_COFF_LOADER_PROTOCOL           *PeiEfiPeiPeCoffLoader,\r
+  IN  VOID                                      *Pe32Data,\r
+  IN  EFI_MEMORY_TYPE                           MemoryType,\r
+  OUT EFI_PHYSICAL_ADDRESS                      *ImageAddress,\r
+  OUT UINT64                                    *ImageSize,\r
+  OUT EFI_PHYSICAL_ADDRESS                      *EntryPoint\r
+  )\r
+/*++\r
+\r
+Routine Description:\r
+\r
+  Loads and relocates a PE/COFF image into memory.\r
+\r
+Arguments:\r
+\r
+  PeiEfiPeiPeCoffLoader - Pointer to a PE COFF loader protocol\r
+\r
+  Pe32Data         - The base address of the PE/COFF file that is to be loaded and relocated\r
+\r
+  ImageAddress     - The base address of the relocated PE/COFF image\r
+\r
+  ImageSize        - The size of the relocated PE/COFF image\r
+\r
+  EntryPoint       - The entry point of the relocated PE/COFF image\r
+\r
+Returns:\r
+\r
+  EFI_SUCCESS                     - The file was loaded and relocated\r
+  EFI_OUT_OF_RESOURCES            - There was not enough memory to load and relocate the PE/COFF file\r
+\r
+--*/\r
+{\r
+  EFI_STATUS                            Status;\r
+  PE_COFF_LOADER_IMAGE_CONTEXT          ImageContext;\r
+  EFI_PHYSICAL_ADDRESS                  MemoryBuffer;\r
+\r
+  ZeroMem (&ImageContext, sizeof (ImageContext));\r
+  ImageContext.Handle = Pe32Data;\r
+  Status              = GetImageReadFunction (&ImageContext);\r
+\r
+  ASSERT_EFI_ERROR (Status);\r
+\r
+  Status = PeiEfiPeiPeCoffLoader->GetImageInfo (PeiEfiPeiPeCoffLoader, &ImageContext);\r
+  if (EFI_ERROR (Status)) {\r
+    return Status;\r
+  }\r
+  //\r
+  // Allocate Memory for the image\r
+  //\r
+  //\r
+  // Allocate Memory for the image\r
+  //\r
+  PeiServicesAllocatePages (MemoryType, EFI_SIZE_TO_PAGES ((UINT32) ImageContext.ImageSize), &MemoryBuffer);\r
+  ImageContext.ImageAddress = MemoryBuffer;\r
+  ASSERT (ImageContext.ImageAddress != 0);\r
+\r
+  //\r
+  // Load the image to our new buffer\r
+  //\r
+\r
+  Status = PeiEfiPeiPeCoffLoader->LoadImage (PeiEfiPeiPeCoffLoader, &ImageContext);\r
+  if (EFI_ERROR (Status)) {\r
+    return Status;\r
+  }\r
+  \r
+  //\r
+  // Relocate the image in our new buffer\r
+  //\r
+  Status = PeiEfiPeiPeCoffLoader->RelocateImage (PeiEfiPeiPeCoffLoader, &ImageContext);\r
+  if (EFI_ERROR (Status)) {\r
+    return Status;\r
+  }\r
+\r
+  //\r
+  // Flush the instruction cache so the image data is written before we execute it\r
+  //\r
+  InvalidateInstructionCacheRange ((VOID *)(UINTN)ImageContext.ImageAddress, (UINTN)ImageContext.ImageSize);\r
+\r
+  *ImageAddress = ImageContext.ImageAddress;\r
+  *ImageSize    = ImageContext.ImageSize;\r
+  *EntryPoint   = ImageContext.EntryPoint;\r
+\r
+  return EFI_SUCCESS;\r
+}\r
+\r
+EFI_STATUS\r
+ShadowDxeIpl (\r
+  IN EFI_FFS_FILE_HEADER                       *DxeIplFileHeader,\r
+  IN EFI_PEI_PE_COFF_LOADER_PROTOCOL           *PeiEfiPeiPeCoffLoader\r
+  )\r
+/*++\r
+\r
+Routine Description:\r
+\r
+  Shadow the DXE IPL to a different memory location. This occurs after permanent\r
+  memory has been discovered.\r
+\r
+Arguments:\r
+\r
+  DxeIplFileHeader      - Pointer to the FFS file header of the DXE IPL driver\r
+\r
+  PeiEfiPeiPeCoffLoader - Pointer to a PE COFF loader protocol\r
+\r
+Returns:\r
+\r
+  EFI_SUCCESS   - DXE IPL was successfully shadowed to a different memory location.\r
+\r
+  EFI_ ERROR    - The shadow was unsuccessful.\r
+\r
+\r
+--*/\r
+{\r
+  UINTN                     SectionLength;\r
+  UINTN                     OccupiedSectionLength;\r
+  EFI_PHYSICAL_ADDRESS      DxeIplAddress;\r
+  UINT64                    DxeIplSize;\r
+  EFI_PHYSICAL_ADDRESS      DxeIplEntryPoint;\r
+  EFI_STATUS                Status;\r
+  EFI_COMMON_SECTION_HEADER *Section;\r
+\r
+  Section = (EFI_COMMON_SECTION_HEADER *) (DxeIplFileHeader + 1);\r
+\r
+  while ((Section->Type != EFI_SECTION_PE32) && (Section->Type != EFI_SECTION_TE)) {\r
+    SectionLength         = *(UINT32 *) (Section->Size) & 0x00ffffff;\r
+    OccupiedSectionLength = GetOccupiedSize (SectionLength, 4);\r
+    Section               = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) Section + OccupiedSectionLength);\r
+  }\r
+  \r
+  //\r
+  // Relocate DxeIpl into memory by using loadfile service\r
+  //\r
+  Status = PeiLoadx64File (\r
+            PeiEfiPeiPeCoffLoader,\r
+            (VOID *) (Section + 1),\r
+            EfiBootServicesData,\r
+            &DxeIplAddress,\r
+            &DxeIplSize,\r
+            &DxeIplEntryPoint\r
+            );\r
\r
+  if (Status == EFI_SUCCESS) {\r
+    //\r
+    // Install PeiInMemory to indicate the Dxeipl is shadowed\r
+    //\r
+    Status = PeiServicesInstallPpi (&mPpiPeiInMemory);\r
+\r
+    if (EFI_ERROR (Status)) {\r
+      return Status;\r
+    }\r
+\r
+    Status = ((EFI_PEIM_ENTRY_POINT) (UINTN) DxeIplEntryPoint) (DxeIplFileHeader, GetPeiServicesTablePointer());\r
+  }\r
+\r
+  return Status;\r
+}\r
+\r
+EFI_STATUS\r
+EFIAPI\r
+DxeIplLoadFile (\r
+  IN EFI_PEI_FV_FILE_LOADER_PPI                 *This,\r
+  IN  EFI_FFS_FILE_HEADER                       *FfsHeader,\r
+  OUT EFI_PHYSICAL_ADDRESS                      *ImageAddress,\r
+  OUT UINT64                                    *ImageSize,\r
+  OUT EFI_PHYSICAL_ADDRESS                      *EntryPoint\r
+  )\r
+/*++\r
+\r
+Routine Description:\r
+\r
+  Given a pointer to an FFS file containing a PE32 image, get the\r
+  information on the PE32 image, and then "load" it so that it\r
+  can be executed.\r
+\r
+Arguments:\r
+\r
+  This  - pointer to our file loader protocol\r
+  FfsHeader - pointer to the FFS file header of the FFS file that\r
+              contains the PE32 image we want to load\r
+  ImageAddress  - returned address where the PE32 image is loaded\r
+  ImageSize     - returned size of the loaded PE32 image\r
+  EntryPoint    - entry point to the loaded PE32 image\r
+\r
+Returns:\r
\r
+  EFI_SUCCESS  - The FFS file was successfully loaded.\r
+  EFI_ERROR    - Unable to load the FFS file.\r
+\r
+--*/\r
+{\r
+  EFI_PEI_PE_COFF_LOADER_PROTOCOL           *PeiEfiPeiPeCoffLoader;\r
+  EFI_STATUS                                Status;\r
+  VOID                                      *Pe32Data;\r
+\r
+  Pe32Data = NULL;\r
+  PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();\r
+\r
+  //\r
+  // Preprocess the FFS file to get a pointer to the PE32 information\r
+  // in the enclosed PE32 image.\r
+  //\r
+  Status = PeiProcessFile (\r
+            EFI_SECTION_PE32,\r
+            &FfsHeader,\r
+            &Pe32Data\r
+            );\r
+\r
+  if (EFI_ERROR (Status)) {\r
+    return Status;\r
+  }\r
+  //\r
+  // Load the PE image from the FFS file\r
+  //\r
+  Status = PeiLoadx64File (\r
+            PeiEfiPeiPeCoffLoader,\r
+            Pe32Data,\r
+            EfiBootServicesData,\r
+            ImageAddress,\r
+            ImageSize,\r
+            EntryPoint\r
+            );\r
+\r
+  return Status;\r
+}\r
+\r
+EFI_STATUS\r
+PeiProcessFile (\r
+  IN      UINT16                 SectionType,\r
+  IN OUT  EFI_FFS_FILE_HEADER    **RealFfsFileHeader,\r
+  OUT     VOID                   **Pe32Data\r
+  )\r
+/*++\r
+\r
+Routine Description:\r
+\r
+Arguments:\r
+\r
+  SectionType       - The type of section in the FFS file to process.\r
+\r
+  FfsFileHeader     - Pointer to the FFS file to process, looking for the\r
+                      specified SectionType\r
+\r
+  Pe32Data          - returned pointer to the start of the PE32 image found\r
+                      in the FFS file.\r
+\r
+Returns:\r
+\r
+  EFI_SUCCESS       - found the PE32 section in the FFS file\r
+\r
+--*/\r
+{\r
+  EFI_STATUS                      Status;\r
+  VOID                            *SectionData;\r
+  DECOMPRESS_LIBRARY              *DecompressLibrary;\r
+  UINT8                           *DstBuffer;\r
+  UINT8                           *ScratchBuffer;\r
+  UINT32                          DstBufferSize;\r
+  UINT32                          ScratchBufferSize;\r
+  EFI_COMMON_SECTION_HEADER       *CmpSection;\r
+  UINTN                           CmpSectionLength;\r
+  UINTN                           OccupiedCmpSectionLength;\r
+  VOID                            *CmpFileData;\r
+  UINTN                           CmpFileSize;\r
+  EFI_COMMON_SECTION_HEADER       *Section;\r
+  UINTN                           SectionLength;\r
+  UINTN                           OccupiedSectionLength;\r
+  UINT64                          FileSize;\r
+  EFI_GUID_DEFINED_SECTION        *GuidedSectionHeader;\r
+  UINT32                          AuthenticationStatus;\r
+  EFI_PEI_SECTION_EXTRACTION_PPI  *SectionExtract;\r
+  UINT32                          BufferSize;\r
+  UINT8                           *Buffer;\r
+  EFI_PEI_SECURITY_PPI            *Security;\r
+  BOOLEAN                         StartCrisisRecovery;\r
+  EFI_GUID                        TempGuid;\r
+  EFI_FIRMWARE_VOLUME_HEADER      *FvHeader;\r
+  EFI_COMPRESSION_SECTION         *CompressionSection;\r
+  EFI_FFS_FILE_HEADER             *FfsFileHeader;\r
+  \r
+  FfsFileHeader = *RealFfsFileHeader;\r
+\r
+  Status = PeiServicesFfsFindSectionData (\r
+             EFI_SECTION_COMPRESSION,\r
+             FfsFileHeader,\r
+             &SectionData\r
+             );\r
+\r
+  //\r
+  // Upon finding a DXE Core file, see if there is first a compression section\r
+  //\r
+  if (!EFI_ERROR (Status)) {\r
+    //\r
+    // Yes, there is a compression section, so extract the contents\r
+    // Decompress the image here\r
+    //\r
+    Section = (EFI_COMMON_SECTION_HEADER *) (UINTN) (VOID *) ((UINT8 *) (FfsFileHeader) + (UINTN) sizeof (EFI_FFS_FILE_HEADER));\r
+\r
+    do {\r
+      SectionLength         = *(UINT32 *) (Section->Size) & 0x00ffffff;\r
+      OccupiedSectionLength = GetOccupiedSize (SectionLength, 4);\r
+\r
+      //\r
+      // Was the DXE Core file encapsulated in a GUID'd section?\r
+      //\r
+      if (Section->Type == EFI_SECTION_GUID_DEFINED) {\r
+        //\r
+        // Locate the GUID'd Section Extractor\r
+        //\r
+        GuidedSectionHeader = (VOID *) (Section + 1);\r
+\r
+        //\r
+        // This following code constitutes the addition of the security model\r
+        // to the DXE IPL.\r
+        //\r
+        //\r
+        // Set a default authenticatino state\r
+        //\r
+        AuthenticationStatus = 0;\r
+\r
+        Status = PeiServicesLocatePpi (\r
+                   &gEfiPeiSectionExtractionPpiGuid,\r
+                   0,\r
+                   NULL,\r
+                   (VOID **)&SectionExtract\r
+                   );\r
+\r
+        if (EFI_ERROR (Status)) {\r
+          return Status;\r
+        }\r
+        //\r
+        // Verify Authentication State\r
+        //\r
+        CopyMem (&TempGuid, Section + 1, sizeof (EFI_GUID));\r
+\r
+        Status = SectionExtract->PeiGetSection (\r
+                                  GetPeiServicesTablePointer(),\r
+                                  SectionExtract,\r
+                                  (EFI_SECTION_TYPE *) &SectionType,\r
+                                  &TempGuid,\r
+                                  0,\r
+                                  (VOID **) &Buffer,\r
+                                  &BufferSize,\r
+                                  &AuthenticationStatus\r
+                                  );\r
+\r
+        if (EFI_ERROR (Status)) {\r
+          return Status;\r
+        }\r
+        //\r
+        // If not ask the Security PPI, if exists, for disposition\r
+        //\r
+        //\r
+        Status = PeiServicesLocatePpi (\r
+                   &gEfiPeiSecurityPpiGuid,\r
+                   0,\r
+                   NULL,\r
+                   (VOID **)&Security\r
+                   );\r
+        if (EFI_ERROR (Status)) {\r
+          return Status;\r
+        }\r
+\r
+        Status = Security->AuthenticationState (\r
+                            GetPeiServicesTablePointer(),\r
+                            (struct _EFI_PEI_SECURITY_PPI *) Security,\r
+                            AuthenticationStatus,\r
+                            FfsFileHeader,\r
+                            &StartCrisisRecovery\r
+                            );\r
+\r
+        if (EFI_ERROR (Status)) {\r
+          return Status;\r
+        }\r
+        //\r
+        // If there is a security violation, report to caller and have\r
+        // the upper-level logic possible engender a crisis recovery\r
+        //\r
+        if (StartCrisisRecovery) {\r
+          return EFI_SECURITY_VIOLATION;\r
+        }\r
+      }\r
+\r
+      if (Section->Type == EFI_SECTION_PE32) {\r
+        //\r
+        // This is what we want\r
+        //\r
+        *Pe32Data = (VOID *) (Section + 1);\r
+        return EFI_SUCCESS;\r
+      } else if (Section->Type == EFI_SECTION_COMPRESSION) {\r
+        //\r
+        // This is a compression set, expand it\r
+        //\r
+        CompressionSection  = (EFI_COMPRESSION_SECTION *) Section;\r
+\r
+        switch (CompressionSection->CompressionType) {\r
+        case EFI_STANDARD_COMPRESSION:\r
+          DecompressLibrary = &gTianoDecompress;\r
+          break;\r
+\r
+        case EFI_CUSTOMIZED_COMPRESSION:\r
+          //\r
+          // Load user customized compression protocol.\r
+          //\r
+          DecompressLibrary = &gCustomDecompress;\r
+          break;\r
+\r
+        case EFI_NOT_COMPRESSED:\r
+        default:\r
+          //\r
+          // Need to support not compressed file\r
+          //\r
+          ASSERT_EFI_ERROR (Status);\r
+          return EFI_NOT_FOUND;\r
+        }\r
+\r
+        Status = DecompressLibrary->GetInfo (\r
+                   (UINT8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),\r
+                   (UINT32) SectionLength - sizeof (EFI_COMPRESSION_SECTION),\r
+                   &DstBufferSize,\r
+                   &ScratchBufferSize\r
+                   );\r
+        if (EFI_ERROR (Status)) {\r
+          //\r
+          // GetInfo failed\r
+          //\r
+          return EFI_NOT_FOUND;\r
+        }\r
+\r
+        //\r
+        // Allocate scratch buffer\r
+        //\r
+        ScratchBuffer = AllocatePages (EFI_SIZE_TO_PAGES (ScratchBufferSize));\r
+        if (ScratchBuffer == NULL) {\r
+          return EFI_OUT_OF_RESOURCES;\r
+        }\r
+\r
+        //\r
+        // Allocate destination buffer\r
+        //\r
+        DstBuffer = AllocatePages (EFI_SIZE_TO_PAGES (DstBufferSize));\r
+        if (DstBuffer == NULL) {\r
+          return EFI_OUT_OF_RESOURCES;\r
+        }\r
+\r
+        //\r
+        // Call decompress function\r
+        //\r
+        Status = DecompressLibrary->Decompress (\r
+                    (CHAR8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),\r
+                    DstBuffer,\r
+                    ScratchBuffer\r
+                    );\r
+\r
+        CmpSection = (EFI_COMMON_SECTION_HEADER *) DstBuffer;\r
+        if (CmpSection->Type == EFI_SECTION_RAW) {\r
+          //\r
+          // Skip the section header and\r
+          // adjust the pointer alignment to 16\r
+          //\r
+          FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *) (DstBuffer + 16);\r
+\r
+          if (FvHeader->Signature == EFI_FVH_SIGNATURE) {\r
+            FfsFileHeader = NULL;\r
+            BuildFvHob ((EFI_PHYSICAL_ADDRESS) (UINTN) FvHeader, FvHeader->FvLength);\r
+            Status = PeiServicesFfsFindNextFile (\r
+                       EFI_FV_FILETYPE_DXE_CORE,\r
+                       FvHeader,\r
+                       &FfsFileHeader\r
+                       );\r
+\r
+            if (EFI_ERROR (Status)) {\r
+              return EFI_NOT_FOUND;\r
+            }\r
+\r
+            //\r
+            // Reture the FfsHeader that contain Pe32Data.\r
+            //\r
+            *RealFfsFileHeader = FfsFileHeader;\r
+            return PeiProcessFile (SectionType, RealFfsFileHeader, Pe32Data);\r
+          }\r
+        }\r
+        //\r
+        // Decompress successfully.\r
+        // Loop the decompressed data searching for expected section.\r
+        //\r
+        CmpFileData = (VOID *) DstBuffer;\r
+        CmpFileSize = DstBufferSize;\r
+        do {\r
+          CmpSectionLength = *(UINT32 *) (CmpSection->Size) & 0x00ffffff;\r
+          if (CmpSection->Type == EFI_SECTION_PE32) {\r
+            //\r
+            // This is what we want\r
+            //\r
+            *Pe32Data = (VOID *) (CmpSection + 1);\r
+            return EFI_SUCCESS;\r
+          }\r
+\r
+          OccupiedCmpSectionLength  = GetOccupiedSize (CmpSectionLength, 4);\r
+          CmpSection                = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) CmpSection + OccupiedCmpSectionLength);\r
+        } while (CmpSection->Type != 0 && (UINTN) ((UINT8 *) CmpSection - (UINT8 *) CmpFileData) < CmpFileSize);\r
+      }\r
+\r
+      Section   = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) Section + OccupiedSectionLength);\r
+      FileSize  = FfsFileHeader->Size[0] & 0xFF;\r
+      FileSize += (FfsFileHeader->Size[1] << 8) & 0xFF00;\r
+      FileSize += (FfsFileHeader->Size[2] << 16) & 0xFF0000;\r
+      FileSize &= 0x00FFFFFF;\r
+    } while (Section->Type != 0 && (UINTN) ((UINT8 *) Section - (UINT8 *) FfsFileHeader) < FileSize);\r
+\r
+    //\r
+    // End of the decompression activity\r
+    //\r
+  } else {\r
+\r
+    Status = PeiServicesFfsFindSectionData (\r
+               EFI_SECTION_PE32,\r
+               FfsFileHeader,\r
+               &SectionData\r
+               );\r
+\r
+    if (EFI_ERROR (Status)) {\r
+      Status = PeiServicesFfsFindSectionData (\r
+                 EFI_SECTION_TE,\r
+                 FfsFileHeader,\r
+                 &SectionData\r
+                 );\r
+      if (EFI_ERROR (Status)) {\r
+        return Status;\r
+      }\r
+    }\r
+  }\r
+\r
+  *Pe32Data = SectionData;\r
+\r
+  return EFI_SUCCESS;\r
+}
\ No newline at end of file