]>
Commit | Line | Data |
---|---|---|
96226baa | 1 | /** @file\r |
48557c65 | 2 | Ia32-specific functionality for DxeLoad.\r |
95276127 | 3 | \r |
d1102dba | 4 | Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>\r |
5997daf7 LD |
5 | Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR>\r |
6 | \r | |
cd5ebaa0 | 7 | This program and the accompanying materials\r |
95276127 | 8 | are licensed and made available under the terms and conditions of the BSD License\r |
9 | which accompanies this distribution. The full text of the license may be found at\r | |
10 | http://opensource.org/licenses/bsd-license.php\r | |
11 | \r | |
12 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r | |
13 | WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r | |
14 | \r | |
96226baa | 15 | **/\r |
95276127 | 16 | \r |
95276127 | 17 | #include "DxeIpl.h"\r |
18 | #include "VirtualMemory.h"\r | |
19 | \r | |
df7aaeb9 | 20 | #define IDT_ENTRY_COUNT 32\r |
e7af83ae | 21 | \r |
bdfbe63e | 22 | typedef struct _X64_IDT_TABLE {\r |
23 | //\r | |
24 | // Reserved 4 bytes preceding PeiService and IdtTable,\r | |
25 | // since IDT base address should be 8-byte alignment.\r | |
26 | //\r | |
27 | UINT32 Reserved;\r | |
28 | CONST EFI_PEI_SERVICES **PeiService;\r | |
29 | X64_IDT_GATE_DESCRIPTOR IdtTable[IDT_ENTRY_COUNT];\r | |
30 | } X64_IDT_TABLE;\r | |
31 | \r | |
95276127 | 32 | //\r |
33 | // Global Descriptor Table (GDT)\r | |
34 | //\r | |
b98da1b1 | 35 | GLOBAL_REMOVE_IF_UNREFERENCED IA32_GDT gGdtEntries[] = {\r |
0cf27ce0 | 36 | /* selector { Global Segment Descriptor } */\r |
37 | /* 0x00 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, //null descriptor\r | |
95276127 | 38 | /* 0x08 */ {{0xffff, 0, 0, 0x2, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //linear data segment descriptor\r |
39 | /* 0x10 */ {{0xffff, 0, 0, 0xf, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //linear code segment descriptor\r | |
40 | /* 0x18 */ {{0xffff, 0, 0, 0x3, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //system data segment descriptor\r | |
41 | /* 0x20 */ {{0xffff, 0, 0, 0xa, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //system code segment descriptor\r | |
42 | /* 0x28 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, //spare segment descriptor\r | |
43 | /* 0x30 */ {{0xffff, 0, 0, 0x2, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //system data segment descriptor\r | |
44 | /* 0x38 */ {{0xffff, 0, 0, 0xa, 1, 0, 1, 0xf, 0, 1, 0, 1, 0}}, //system code segment descriptor\r | |
45 | /* 0x40 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, //spare segment descriptor\r | |
46 | };\r | |
47 | \r | |
48 | //\r | |
49 | // IA32 Gdt register\r | |
50 | //\r | |
51 | GLOBAL_REMOVE_IF_UNREFERENCED CONST IA32_DESCRIPTOR gGdt = {\r | |
52 | sizeof (gGdtEntries) - 1,\r | |
53 | (UINTN) gGdtEntries\r | |
54 | };\r | |
55 | \r | |
5d582956 | 56 | GLOBAL_REMOVE_IF_UNREFERENCED IA32_DESCRIPTOR gLidtDescriptor = {\r |
e7af83ae | 57 | sizeof (X64_IDT_GATE_DESCRIPTOR) * IDT_ENTRY_COUNT - 1,\r |
5d582956 | 58 | 0\r |
59 | };\r | |
60 | \r | |
5630cdfe SZ |
61 | /**\r |
62 | Allocates and fills in the Page Directory and Page Table Entries to\r | |
63 | establish a 4G page table.\r | |
64 | \r | |
65 | @param[in] StackBase Stack base address.\r | |
66 | @param[in] StackSize Stack size.\r | |
67 | \r | |
68 | @return The address of page table.\r | |
69 | \r | |
70 | **/\r | |
71 | UINTN\r | |
72 | Create4GPageTablesIa32Pae (\r | |
73 | IN EFI_PHYSICAL_ADDRESS StackBase,\r | |
74 | IN UINTN StackSize\r | |
75 | )\r | |
d1102dba | 76 | {\r |
5630cdfe SZ |
77 | UINT8 PhysicalAddressBits;\r |
78 | EFI_PHYSICAL_ADDRESS PhysicalAddress;\r | |
79 | UINTN IndexOfPdpEntries;\r | |
80 | UINTN IndexOfPageDirectoryEntries;\r | |
81 | UINT32 NumberOfPdpEntriesNeeded;\r | |
82 | PAGE_MAP_AND_DIRECTORY_POINTER *PageMap;\r | |
83 | PAGE_MAP_AND_DIRECTORY_POINTER *PageDirectoryPointerEntry;\r | |
84 | PAGE_TABLE_ENTRY *PageDirectoryEntry;\r | |
85 | UINTN TotalPagesNum;\r | |
86 | UINTN PageAddress;\r | |
5997daf7 LD |
87 | UINT64 AddressEncMask;\r |
88 | \r | |
89 | //\r | |
90 | // Make sure AddressEncMask is contained to smallest supported address field\r | |
91 | //\r | |
92 | AddressEncMask = PcdGet64 (PcdPteMemoryEncryptionAddressOrMask) & PAGING_1G_ADDRESS_MASK_64;\r | |
5630cdfe SZ |
93 | \r |
94 | PhysicalAddressBits = 32;\r | |
95 | \r | |
96 | //\r | |
97 | // Calculate the table entries needed.\r | |
98 | //\r | |
99 | NumberOfPdpEntriesNeeded = (UINT32) LShiftU64 (1, (PhysicalAddressBits - 30));\r | |
100 | \r | |
101 | TotalPagesNum = NumberOfPdpEntriesNeeded + 1;\r | |
2ac1730b | 102 | PageAddress = (UINTN) AllocatePageTableMemory (TotalPagesNum);\r |
5630cdfe SZ |
103 | ASSERT (PageAddress != 0);\r |
104 | \r | |
105 | PageMap = (VOID *) PageAddress;\r | |
106 | PageAddress += SIZE_4KB;\r | |
107 | \r | |
108 | PageDirectoryPointerEntry = PageMap;\r | |
109 | PhysicalAddress = 0;\r | |
110 | \r | |
111 | for (IndexOfPdpEntries = 0; IndexOfPdpEntries < NumberOfPdpEntriesNeeded; IndexOfPdpEntries++, PageDirectoryPointerEntry++) {\r | |
112 | //\r | |
113 | // Each Directory Pointer entries points to a page of Page Directory entires.\r | |
114 | // So allocate space for them and fill them in in the IndexOfPageDirectoryEntries loop.\r | |
d1102dba | 115 | //\r |
5630cdfe SZ |
116 | PageDirectoryEntry = (VOID *) PageAddress;\r |
117 | PageAddress += SIZE_4KB;\r | |
118 | \r | |
119 | //\r | |
120 | // Fill in a Page Directory Pointer Entries\r | |
121 | //\r | |
5997daf7 | 122 | PageDirectoryPointerEntry->Uint64 = (UINT64) (UINTN) PageDirectoryEntry | AddressEncMask;\r |
5630cdfe SZ |
123 | PageDirectoryPointerEntry->Bits.Present = 1;\r |
124 | \r | |
125 | for (IndexOfPageDirectoryEntries = 0; IndexOfPageDirectoryEntries < 512; IndexOfPageDirectoryEntries++, PageDirectoryEntry++, PhysicalAddress += SIZE_2MB) {\r | |
9189ec20 JW |
126 | if ((IsNullDetectionEnabled () && PhysicalAddress == 0)\r |
127 | || ((PhysicalAddress < StackBase + StackSize)\r | |
128 | && ((PhysicalAddress + SIZE_2MB) > StackBase))) {\r | |
5630cdfe SZ |
129 | //\r |
130 | // Need to split this 2M page that covers stack range.\r | |
131 | //\r | |
132 | Split2MPageTo4K (PhysicalAddress, (UINT64 *) PageDirectoryEntry, StackBase, StackSize);\r | |
133 | } else {\r | |
134 | //\r | |
135 | // Fill in the Page Directory entries\r | |
136 | //\r | |
5997daf7 | 137 | PageDirectoryEntry->Uint64 = (UINT64) PhysicalAddress | AddressEncMask;\r |
5630cdfe SZ |
138 | PageDirectoryEntry->Bits.ReadWrite = 1;\r |
139 | PageDirectoryEntry->Bits.Present = 1;\r | |
140 | PageDirectoryEntry->Bits.MustBe1 = 1;\r | |
141 | }\r | |
142 | }\r | |
143 | }\r | |
144 | \r | |
145 | for (; IndexOfPdpEntries < 512; IndexOfPdpEntries++, PageDirectoryPointerEntry++) {\r | |
146 | ZeroMem (\r | |
147 | PageDirectoryPointerEntry,\r | |
148 | sizeof (PAGE_MAP_AND_DIRECTORY_POINTER)\r | |
149 | );\r | |
150 | }\r | |
151 | \r | |
2ac1730b JW |
152 | //\r |
153 | // Protect the page table by marking the memory used for page table to be\r | |
154 | // read-only.\r | |
155 | //\r | |
156 | EnablePageTableProtection ((UINTN)PageMap, FALSE);\r | |
157 | \r | |
5630cdfe SZ |
158 | return (UINTN) PageMap;\r |
159 | }\r | |
160 | \r | |
161 | /**\r | |
162 | The function will check if IA32 PAE is supported.\r | |
163 | \r | |
164 | @retval TRUE IA32 PAE is supported.\r | |
165 | @retval FALSE IA32 PAE is not supported.\r | |
166 | \r | |
167 | **/\r | |
168 | BOOLEAN\r | |
169 | IsIa32PaeSupport (\r | |
170 | VOID\r | |
171 | )\r | |
172 | {\r | |
173 | UINT32 RegEax;\r | |
174 | UINT32 RegEdx;\r | |
175 | BOOLEAN Ia32PaeSupport;\r | |
176 | \r | |
177 | Ia32PaeSupport = FALSE;\r | |
178 | AsmCpuid (0x0, &RegEax, NULL, NULL, NULL);\r | |
179 | if (RegEax >= 0x1) {\r | |
180 | AsmCpuid (0x1, NULL, NULL, NULL, &RegEdx);\r | |
181 | if ((RegEdx & BIT6) != 0) {\r | |
182 | Ia32PaeSupport = TRUE;\r | |
183 | }\r | |
184 | }\r | |
185 | \r | |
186 | return Ia32PaeSupport;\r | |
187 | }\r | |
188 | \r | |
e63da9f0 JW |
189 | /**\r |
190 | The function will check if page table should be setup or not.\r | |
191 | \r | |
192 | @retval TRUE Page table should be created.\r | |
193 | @retval FALSE Page table should not be created.\r | |
194 | \r | |
195 | **/\r | |
196 | BOOLEAN\r | |
197 | ToBuildPageTable (\r | |
198 | VOID\r | |
199 | )\r | |
200 | {\r | |
201 | if (!IsIa32PaeSupport ()) {\r | |
202 | return FALSE;\r | |
203 | }\r | |
204 | \r | |
205 | if (IsNullDetectionEnabled ()) {\r | |
206 | return TRUE;\r | |
207 | }\r | |
208 | \r | |
209 | if (PcdGet8 (PcdHeapGuardPropertyMask) != 0) {\r | |
210 | return TRUE;\r | |
211 | }\r | |
212 | \r | |
50255363 JW |
213 | if (PcdGetBool (PcdCpuStackGuard)) {\r |
214 | return TRUE;\r | |
215 | }\r | |
216 | \r | |
52679261 | 217 | if (IsEnableNonExecNeeded ()) {\r |
e63da9f0 JW |
218 | return TRUE;\r |
219 | }\r | |
220 | \r | |
221 | return FALSE;\r | |
222 | }\r | |
223 | \r | |
91d92e25 | 224 | /**\r |
225 | Transfers control to DxeCore.\r | |
226 | \r | |
227 | This function performs a CPU architecture specific operations to execute\r | |
228 | the entry point of DxeCore with the parameters of HobList.\r | |
48557c65 | 229 | It also installs EFI_END_OF_PEI_PPI to signal the end of PEI phase.\r |
91d92e25 | 230 | \r |
48557c65 | 231 | @param DxeCoreEntryPoint The entry point of DxeCore.\r |
91d92e25 | 232 | @param HobList The start of HobList passed to DxeCore.\r |
91d92e25 | 233 | \r |
234 | **/\r | |
95276127 | 235 | VOID\r |
236 | HandOffToDxeCore (\r | |
237 | IN EFI_PHYSICAL_ADDRESS DxeCoreEntryPoint,\r | |
9b937a73 | 238 | IN EFI_PEI_HOB_POINTERS HobList\r |
95276127 | 239 | )\r |
240 | {\r | |
241 | EFI_STATUS Status;\r | |
242 | EFI_PHYSICAL_ADDRESS BaseOfStack;\r | |
243 | EFI_PHYSICAL_ADDRESS TopOfStack;\r | |
244 | UINTN PageTables;\r | |
5d582956 | 245 | X64_IDT_GATE_DESCRIPTOR *IdtTable;\r |
246 | UINTN SizeOfTemplate;\r | |
247 | VOID *TemplateBase;\r | |
248 | EFI_PHYSICAL_ADDRESS VectorAddress;\r | |
249 | UINT32 Index;\r | |
bdfbe63e | 250 | X64_IDT_TABLE *IdtTableForX64;\r |
57f360f2 JF |
251 | EFI_VECTOR_HANDOFF_INFO *VectorInfo;\r |
252 | EFI_PEI_VECTOR_HANDOFF_INFO_PPI *VectorHandoffInfoPpi;\r | |
5630cdfe | 253 | BOOLEAN BuildPageTablesIa32Pae;\r |
95276127 | 254 | \r |
9189ec20 JW |
255 | if (IsNullDetectionEnabled ()) {\r |
256 | ClearFirst4KPage (HobList.Raw);\r | |
257 | }\r | |
258 | \r | |
95276127 | 259 | Status = PeiServicesAllocatePages (EfiBootServicesData, EFI_SIZE_TO_PAGES (STACK_SIZE), &BaseOfStack);\r |
260 | ASSERT_EFI_ERROR (Status);\r | |
0cf27ce0 | 261 | \r |
95276127 | 262 | if (FeaturePcdGet(PcdDxeIplSwitchToLongMode)) {\r |
263 | //\r | |
0cf27ce0 | 264 | // Compute the top of the stack we were allocated, which is used to load X64 dxe core.\r |
95276127 | 265 | // Pre-allocate a 32 bytes which confroms to x64 calling convention.\r |
266 | //\r | |
0cf27ce0 | 267 | // The first four parameters to a function are passed in rcx, rdx, r8 and r9.\r |
268 | // Any further parameters are pushed on the stack. Furthermore, space (4 * 8bytes) for the\r | |
269 | // register parameters is reserved on the stack, in case the called function\r | |
270 | // wants to spill them; this is important if the function is variadic.\r | |
95276127 | 271 | //\r |
272 | TopOfStack = BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - 32;\r | |
273 | \r | |
274 | //\r | |
b98da1b1 | 275 | // x64 Calling Conventions requires that the stack must be aligned to 16 bytes\r |
95276127 | 276 | //\r |
277 | TopOfStack = (EFI_PHYSICAL_ADDRESS) (UINTN) ALIGN_POINTER (TopOfStack, 16);\r | |
278 | \r | |
279 | //\r | |
280 | // Load the GDT of Go64. Since the GDT of 32-bit Tiano locates in the BS_DATA\r | |
0cf27ce0 | 281 | // memory, it may be corrupted when copying FV to high-end memory\r |
95276127 | 282 | //\r |
283 | AsmWriteGdtr (&gGdt);\r | |
284 | //\r | |
285 | // Create page table and save PageMapLevel4 to CR3\r | |
286 | //\r | |
5630cdfe | 287 | PageTables = CreateIdentityMappingPageTables (BaseOfStack, STACK_SIZE);\r |
95276127 | 288 | \r |
289 | //\r | |
48557c65 | 290 | // End of PEI phase signal\r |
95276127 | 291 | //\r |
98d20e44 | 292 | PERF_EVENT_SIGNAL_BEGIN (gEndOfPeiSignalPpi.Guid);\r |
9b937a73 | 293 | Status = PeiServicesInstallPpi (&gEndOfPeiSignalPpi);\r |
98d20e44 | 294 | PERF_EVENT_SIGNAL_END (gEndOfPeiSignalPpi.Guid);\r |
95276127 | 295 | ASSERT_EFI_ERROR (Status);\r |
0cf27ce0 | 296 | \r |
2af2988f JW |
297 | //\r |
298 | // Paging might be already enabled. To avoid conflict configuration,\r | |
299 | // disable paging first anyway.\r | |
300 | //\r | |
301 | AsmWriteCr0 (AsmReadCr0 () & (~BIT31));\r | |
95276127 | 302 | AsmWriteCr3 (PageTables);\r |
5d582956 | 303 | \r |
30c8f861 | 304 | //\r |
305 | // Update the contents of BSP stack HOB to reflect the real stack info passed to DxeCore.\r | |
0cf27ce0 | 306 | //\r |
30c8f861 | 307 | UpdateStackHob (BaseOfStack, STACK_SIZE);\r |
5d582956 | 308 | \r |
4bfa7dc4 | 309 | SizeOfTemplate = AsmGetVectorTemplatInfo (&TemplateBase);\r |
310 | \r | |
311 | Status = PeiServicesAllocatePages (\r | |
0cf27ce0 | 312 | EfiBootServicesData,\r |
bdfbe63e | 313 | EFI_SIZE_TO_PAGES(sizeof (X64_IDT_TABLE) + SizeOfTemplate * IDT_ENTRY_COUNT),\r |
b028c102 | 314 | &VectorAddress\r |
4bfa7dc4 | 315 | );\r |
316 | ASSERT_EFI_ERROR (Status);\r | |
317 | \r | |
bdfbe63e | 318 | //\r |
319 | // Store EFI_PEI_SERVICES** in the 4 bytes immediately preceding IDT to avoid that\r | |
320 | // it may not be gotten correctly after IDT register is re-written.\r | |
321 | //\r | |
b028c102 | 322 | IdtTableForX64 = (X64_IDT_TABLE *) (UINTN) VectorAddress;\r |
bdfbe63e | 323 | IdtTableForX64->PeiService = GetPeiServicesTablePointer ();\r |
324 | \r | |
325 | VectorAddress = (EFI_PHYSICAL_ADDRESS) (UINTN) (IdtTableForX64 + 1);\r | |
326 | IdtTable = IdtTableForX64->IdtTable;\r | |
e7af83ae | 327 | for (Index = 0; Index < IDT_ENTRY_COUNT; Index++) {\r |
4bfa7dc4 | 328 | IdtTable[Index].Ia32IdtEntry.Bits.GateType = 0x8e;\r |
329 | IdtTable[Index].Ia32IdtEntry.Bits.Reserved_0 = 0;\r | |
330 | IdtTable[Index].Ia32IdtEntry.Bits.Selector = SYS_CODE64_SEL;\r | |
331 | \r | |
332 | IdtTable[Index].Ia32IdtEntry.Bits.OffsetLow = (UINT16) VectorAddress;\r | |
333 | IdtTable[Index].Ia32IdtEntry.Bits.OffsetHigh = (UINT16) (RShiftU64 (VectorAddress, 16));\r | |
334 | IdtTable[Index].Offset32To63 = (UINT32) (RShiftU64 (VectorAddress, 32));\r | |
335 | IdtTable[Index].Reserved = 0;\r | |
336 | \r | |
337 | CopyMem ((VOID *) (UINTN) VectorAddress, TemplateBase, SizeOfTemplate);\r | |
338 | AsmVectorFixup ((VOID *) (UINTN) VectorAddress, (UINT8) Index);\r | |
339 | \r | |
340 | VectorAddress += SizeOfTemplate;\r | |
5d582956 | 341 | }\r |
4bfa7dc4 | 342 | \r |
343 | gLidtDescriptor.Base = (UINTN) IdtTable;\r | |
0cf27ce0 | 344 | \r |
e7af83ae | 345 | //\r |
346 | // Disable interrupt of Debug timer, since new IDT table cannot handle it.\r | |
347 | //\r | |
348 | SaveAndSetDebugTimerInterrupt (FALSE);\r | |
349 | \r | |
4bfa7dc4 | 350 | AsmWriteIdtr (&gLidtDescriptor);\r |
351 | \r | |
6fb389d0 JF |
352 | DEBUG ((\r |
353 | DEBUG_INFO,\r | |
354 | "%a() Stack Base: 0x%lx, Stack Size: 0x%x\n",\r | |
355 | __FUNCTION__,\r | |
356 | BaseOfStack,\r | |
357 | STACK_SIZE\r | |
358 | ));\r | |
359 | \r | |
5d582956 | 360 | //\r |
b98da1b1 | 361 | // Go to Long Mode and transfer control to DxeCore.\r |
362 | // Interrupts will not get turned on until the CPU AP is loaded.\r | |
95276127 | 363 | // Call x64 drivers passing in single argument, a pointer to the HOBs.\r |
0cf27ce0 | 364 | //\r |
95276127 | 365 | AsmEnablePaging64 (\r |
366 | SYS_CODE64_SEL,\r | |
367 | DxeCoreEntryPoint,\r | |
368 | (EFI_PHYSICAL_ADDRESS)(UINTN)(HobList.Raw),\r | |
369 | 0,\r | |
370 | TopOfStack\r | |
371 | );\r | |
372 | } else {\r | |
57f360f2 JF |
373 | //\r |
374 | // Get Vector Hand-off Info PPI and build Guided HOB\r | |
375 | //\r | |
376 | Status = PeiServicesLocatePpi (\r | |
377 | &gEfiVectorHandoffInfoPpiGuid,\r | |
378 | 0,\r | |
379 | NULL,\r | |
380 | (VOID **)&VectorHandoffInfoPpi\r | |
381 | );\r | |
382 | if (Status == EFI_SUCCESS) {\r | |
383 | DEBUG ((EFI_D_INFO, "Vector Hand-off Info PPI is gotten, GUIDed HOB is created!\n"));\r | |
384 | VectorInfo = VectorHandoffInfoPpi->Info;\r | |
385 | Index = 1;\r | |
386 | while (VectorInfo->Attribute != EFI_VECTOR_HANDOFF_LAST_ENTRY) {\r | |
387 | VectorInfo ++;\r | |
388 | Index ++;\r | |
389 | }\r | |
390 | BuildGuidDataHob (\r | |
391 | &gEfiVectorHandoffInfoPpiGuid,\r | |
392 | VectorHandoffInfoPpi->Info,\r | |
393 | sizeof (EFI_VECTOR_HANDOFF_INFO) * Index\r | |
394 | );\r | |
395 | }\r | |
396 | \r | |
95276127 | 397 | //\r |
398 | // Compute the top of the stack we were allocated. Pre-allocate a UINTN\r | |
399 | // for safety.\r | |
400 | //\r | |
401 | TopOfStack = BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - CPU_STACK_ALIGNMENT;\r | |
402 | TopOfStack = (EFI_PHYSICAL_ADDRESS) (UINTN) ALIGN_POINTER (TopOfStack, CPU_STACK_ALIGNMENT);\r | |
403 | \r | |
09e4a8fd | 404 | PageTables = 0;\r |
e63da9f0 | 405 | BuildPageTablesIa32Pae = ToBuildPageTable ();\r |
5630cdfe SZ |
406 | if (BuildPageTablesIa32Pae) {\r |
407 | PageTables = Create4GPageTablesIa32Pae (BaseOfStack, STACK_SIZE);\r | |
52679261 | 408 | if (IsEnableNonExecNeeded ()) {\r |
9189ec20 JW |
409 | EnableExecuteDisableBit();\r |
410 | }\r | |
5630cdfe SZ |
411 | }\r |
412 | \r | |
95276127 | 413 | //\r |
48557c65 | 414 | // End of PEI phase signal\r |
95276127 | 415 | //\r |
98d20e44 | 416 | PERF_EVENT_SIGNAL_BEGIN (gEndOfPeiSignalPpi.Guid);\r |
9b937a73 | 417 | Status = PeiServicesInstallPpi (&gEndOfPeiSignalPpi);\r |
98d20e44 | 418 | PERF_EVENT_SIGNAL_END (gEndOfPeiSignalPpi.Guid);\r |
95276127 | 419 | ASSERT_EFI_ERROR (Status);\r |
420 | \r | |
5630cdfe | 421 | if (BuildPageTablesIa32Pae) {\r |
2af2988f JW |
422 | //\r |
423 | // Paging might be already enabled. To avoid conflict configuration,\r | |
424 | // disable paging first anyway.\r | |
425 | //\r | |
426 | AsmWriteCr0 (AsmReadCr0 () & (~BIT31));\r | |
5630cdfe SZ |
427 | AsmWriteCr3 (PageTables);\r |
428 | //\r | |
429 | // Set Physical Address Extension (bit 5 of CR4).\r | |
430 | //\r | |
431 | AsmWriteCr4 (AsmReadCr4 () | BIT5);\r | |
432 | }\r | |
433 | \r | |
30c8f861 | 434 | //\r |
435 | // Update the contents of BSP stack HOB to reflect the real stack info passed to DxeCore.\r | |
0cf27ce0 | 436 | //\r |
30c8f861 | 437 | UpdateStackHob (BaseOfStack, STACK_SIZE);\r |
0cf27ce0 | 438 | \r |
6fb389d0 JF |
439 | DEBUG ((\r |
440 | DEBUG_INFO,\r | |
441 | "%a() Stack Base: 0x%lx, Stack Size: 0x%x\n",\r | |
442 | __FUNCTION__,\r | |
443 | BaseOfStack,\r | |
444 | STACK_SIZE\r | |
445 | ));\r | |
446 | \r | |
b98da1b1 | 447 | //\r |
448 | // Transfer the control to the entry point of DxeCore.\r | |
449 | //\r | |
5630cdfe SZ |
450 | if (BuildPageTablesIa32Pae) {\r |
451 | AsmEnablePaging32 (\r | |
452 | (SWITCH_STACK_ENTRY_POINT)(UINTN)DxeCoreEntryPoint,\r | |
453 | HobList.Raw,\r | |
454 | NULL,\r | |
455 | (VOID *) (UINTN) TopOfStack\r | |
456 | );\r | |
457 | } else {\r | |
458 | SwitchStack (\r | |
459 | (SWITCH_STACK_ENTRY_POINT)(UINTN)DxeCoreEntryPoint,\r | |
460 | HobList.Raw,\r | |
461 | NULL,\r | |
462 | (VOID *) (UINTN) TopOfStack\r | |
463 | );\r | |
464 | }\r | |
0cf27ce0 | 465 | }\r |
95276127 | 466 | }\r |
467 | \r |