]> git.proxmox.com Git - mirror_edk2.git/blame - UefiCpuPkg/Library/CpuExceptionHandlerLib/PeiDxeSmmCpuException.c
UefiCpuPkg/ExceptionLib: Move global variable location
[mirror_edk2.git] / UefiCpuPkg / Library / CpuExceptionHandlerLib / PeiDxeSmmCpuException.c
CommitLineData
8f07f895 1/** @file\r
9b4aa760 2 CPU Exception Library provides PEI/DXE/SMM CPU common exception handler.\r
8f07f895 3\r
9b4aa760 4Copyright (c) 2012 - 2016, Intel Corporation. All rights reserved.<BR>\r
8f07f895 5This program and the accompanying materials are licensed and made available under\r
6the terms and conditions of the BSD License that accompanies this distribution.\r
7The full text of the license may be found at\r
8http://opensource.org/licenses/bsd-license.php.\r
9\r
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
12\r
13**/\r
14\r
8f07f895 15#include "CpuExceptionCommon.h"\r
e41aad15 16#include <Library/DebugLib.h>\r
8f07f895 17\r
8f07f895 18/**\r
44ecbc28 19 Internal worker function for common exception handler.\r
8f07f895 20\r
44ecbc28
JF
21 @param ExceptionType Exception type.\r
22 @param SystemContext Pointer to EFI_SYSTEM_CONTEXT.\r
23 @param ExceptionHandlerData Pointer to exception handler data.\r
8f07f895 24**/\r
25VOID\r
44ecbc28 26CommonExceptionHandlerWorker (\r
e41aad15 27 IN EFI_EXCEPTION_TYPE ExceptionType, \r
44ecbc28
JF
28 IN EFI_SYSTEM_CONTEXT SystemContext,\r
29 IN EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r
8f07f895 30 )\r
31{\r
e41aad15 32 EXCEPTION_HANDLER_CONTEXT *ExceptionHandlerContext;\r
44ecbc28
JF
33 RESERVED_VECTORS_DATA *ReservedVectors;\r
34 EFI_CPU_INTERRUPT_HANDLER *ExternalInterruptHandler;\r
e41aad15 35\r
44ecbc28
JF
36 ExceptionHandlerContext = (EXCEPTION_HANDLER_CONTEXT *) (UINTN) (SystemContext.SystemContextIa32);\r
37 ReservedVectors = ExceptionHandlerData->ReservedVectors;\r
38 ExternalInterruptHandler = ExceptionHandlerData->ExternalInterruptHandler;\r
e41aad15 39\r
44ecbc28 40 switch (ReservedVectors[ExceptionType].Attribute) {\r
e41aad15
JF
41 case EFI_VECTOR_HANDOFF_HOOK_BEFORE:\r
42 //\r
43 // Need to jmp to old IDT handler after this exception handler\r
44 //\r
45 ExceptionHandlerContext->ExceptionDataFlag = (mErrorCodeFlag & (1 << ExceptionType)) ? TRUE : FALSE;\r
44ecbc28 46 ExceptionHandlerContext->OldIdtHandler = ReservedVectors[ExceptionType].ExceptonHandler;\r
e41aad15
JF
47 break;\r
48 case EFI_VECTOR_HANDOFF_HOOK_AFTER:\r
49 while (TRUE) {\r
50 //\r
51 // If if anyone has gotten SPIN_LOCK for owner running hook after\r
52 //\r
44ecbc28 53 if (AcquireSpinLockOrFail (&ReservedVectors[ExceptionType].SpinLock)) {\r
e41aad15
JF
54 //\r
55 // Need to execute old IDT handler before running this exception handler\r
56 //\r
44ecbc28 57 ReservedVectors[ExceptionType].ApicId = GetApicId ();\r
e41aad15
JF
58 ArchSaveExceptionContext (ExceptionType, SystemContext);\r
59 ExceptionHandlerContext->ExceptionDataFlag = (mErrorCodeFlag & (1 << ExceptionType)) ? TRUE : FALSE;\r
44ecbc28 60 ExceptionHandlerContext->OldIdtHandler = ReservedVectors[ExceptionType].ExceptonHandler;\r
e41aad15
JF
61 return;\r
62 }\r
63 //\r
64 // If failed to acquire SPIN_LOCK, check if it was locked by processor itself\r
65 //\r
44ecbc28 66 if (ReservedVectors[ExceptionType].ApicId == GetApicId ()) {\r
e41aad15
JF
67 //\r
68 // Old IDT handler has been executed, then retore CPU exception content to\r
69 // run new exception handler.\r
70 //\r
71 ArchRestoreExceptionContext (ExceptionType, SystemContext);\r
72 //\r
73 // Rlease spin lock for ApicId\r
74 //\r
44ecbc28 75 ReleaseSpinLock (&ReservedVectors[ExceptionType].SpinLock);\r
e41aad15
JF
76 break;\r
77 }\r
78 CpuPause ();\r
79 }\r
80 break;\r
81 case 0xffffffff:\r
82 break;\r
83 default:\r
84 //\r
85 // It should never reach here\r
86 //\r
87 CpuDeadLoop ();\r
88 break;\r
8f07f895 89 }\r
e41aad15 90 \r
44ecbc28
JF
91 if (ExternalInterruptHandler != NULL &&\r
92 ExternalInterruptHandler[ExceptionType] != NULL) {\r
93 (ExternalInterruptHandler[ExceptionType]) (ExceptionType, SystemContext);\r
f3b113bf 94 } else if (ExceptionType < CPU_EXCEPTION_NUM) {\r
e41aad15
JF
95 //\r
96 // Get Spinlock to display CPU information\r
97 //\r
44ecbc28 98 while (!AcquireSpinLockOrFail (&ExceptionHandlerData->DisplayMessageSpinLock)) {\r
e41aad15
JF
99 CpuPause ();\r
100 }\r
101 //\r
102 // Display ExceptionType, CPU information and Image information\r
103 // \r
104 DumpCpuContent (ExceptionType, SystemContext);\r
105 //\r
106 // Release Spinlock of output message\r
107 //\r
44ecbc28 108 ReleaseSpinLock (&ExceptionHandlerData->DisplayMessageSpinLock);\r
e41aad15
JF
109 //\r
110 // Enter a dead loop if needn't to execute old IDT handler further\r
111 //\r
44ecbc28 112 if (ReservedVectors[ExceptionType].Attribute != EFI_VECTOR_HANDOFF_HOOK_BEFORE) {\r
e41aad15
JF
113 CpuDeadLoop ();\r
114 }\r
115 }\r
116}\r
8f07f895 117\r
e41aad15
JF
118/**\r
119 Internal worker function to update IDT entries accordling to vector attributes.\r
120\r
9db15f81
JF
121 @param[in] IdtTable Pointer to IDT table.\r
122 @param[in] TemplateMap Pointer to a buffer where the address map is\r
123 returned.\r
124 @param[in] ExceptionHandlerData Pointer to exception handler data.\r
e41aad15
JF
125\r
126**/\r
127VOID\r
128UpdateIdtTable (\r
129 IN IA32_IDT_GATE_DESCRIPTOR *IdtTable,\r
130 IN EXCEPTION_HANDLER_TEMPLATE_MAP *TemplateMap,\r
9db15f81 131 IN EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r
e41aad15
JF
132 )\r
133{\r
134 UINT16 CodeSegment;\r
135 UINTN Index;\r
136 UINTN InterruptHandler;\r
9db15f81 137 RESERVED_VECTORS_DATA *ReservedVectors;\r
8f07f895 138\r
9db15f81 139 ReservedVectors = ExceptionHandlerData->ReservedVectors;\r
8f07f895 140 //\r
e41aad15 141 // Use current CS as the segment selector of interrupt gate in IDT\r
8f07f895 142 //\r
e41aad15 143 CodeSegment = AsmReadCs ();\r
8f07f895 144\r
9db15f81 145 for (Index = 0; Index < ExceptionHandlerData->IdtEntryCount; Index ++) {\r
e41aad15
JF
146 IdtTable[Index].Bits.Selector = CodeSegment;\r
147 //\r
148 // Check reserved vectors attributes\r
149 //\r
9db15f81 150 switch (ReservedVectors[Index].Attribute) {\r
e41aad15
JF
151 case EFI_VECTOR_HANDOFF_DO_NOT_HOOK:\r
152 //\r
153 // Keep original IDT entry\r
154 //\r
155 continue;\r
156 case EFI_VECTOR_HANDOFF_HOOK_AFTER:\r
9db15f81 157 InitializeSpinLock (&ReservedVectors[Index].SpinLock);\r
e41aad15 158 CopyMem (\r
9db15f81 159 (VOID *) ReservedVectors[Index].HookAfterStubHeaderCode,\r
e41aad15
JF
160 (VOID *) TemplateMap->HookAfterStubHeaderStart,\r
161 TemplateMap->ExceptionStubHeaderSize\r
162 );\r
07da1ac8 163 AsmVectorNumFixup (\r
9db15f81 164 (VOID *) ReservedVectors[Index].HookAfterStubHeaderCode,\r
07da1ac8
AF
165 (UINT8) Index,\r
166 (VOID *) TemplateMap->HookAfterStubHeaderStart\r
167 );\r
e41aad15
JF
168 //\r
169 // Go on the following code\r
170 //\r
171 case EFI_VECTOR_HANDOFF_HOOK_BEFORE:\r
172 //\r
173 // Save original IDT handler address\r
174 //\r
9db15f81 175 ReservedVectors[Index].ExceptonHandler = ArchGetIdtHandler (&IdtTable[Index]);\r
e41aad15
JF
176 //\r
177 // Go on the following code\r
178 //\r
179 default:\r
180 //\r
181 // Update new IDT entry\r
182 //\r
183 InterruptHandler = TemplateMap->ExceptionStart + Index * TemplateMap->ExceptionStubHeaderSize;\r
184 ArchUpdateIdtEntry (&IdtTable[Index], InterruptHandler);\r
185 break;\r
186 }\r
187 }\r
8f07f895 188}\r
189\r
190/**\r
e41aad15 191 Internal worker function to initialize exception handler.\r
8f07f895 192\r
ab95e54d
JF
193 @param[in] VectorInfo Pointer to reserved vector list.\r
194 @param[in, out] ExceptionHandlerData Pointer to exception handler data.\r
8f07f895 195 \r
e41aad15
JF
196 @retval EFI_SUCCESS CPU Exception Entries have been successfully initialized \r
197 with default exception handlers.\r
198 @retval EFI_INVALID_PARAMETER VectorInfo includes the invalid content if VectorInfo is not NULL.\r
199 @retval EFI_UNSUPPORTED This function is not supported.\r
200\r
8f07f895 201**/\r
e41aad15
JF
202EFI_STATUS\r
203InitializeCpuExceptionHandlersWorker (\r
ab95e54d
JF
204 IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL,\r
205 IN OUT EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r
8f07f895 206 )\r
207{\r
e41aad15
JF
208 EFI_STATUS Status;\r
209 IA32_DESCRIPTOR IdtDescriptor;\r
210 UINTN IdtEntryCount;\r
211 EXCEPTION_HANDLER_TEMPLATE_MAP TemplateMap;\r
212 IA32_IDT_GATE_DESCRIPTOR *IdtTable;\r
ab95e54d 213 RESERVED_VECTORS_DATA *ReservedVectors;\r
e41aad15 214\r
ab95e54d
JF
215 ReservedVectors = ExceptionHandlerData->ReservedVectors;\r
216 SetMem ((VOID *) ReservedVectors, sizeof (RESERVED_VECTORS_DATA) * CPU_EXCEPTION_NUM, 0xff);\r
e41aad15 217 if (VectorInfo != NULL) {\r
ab95e54d 218 Status = ReadAndVerifyVectorInfo (VectorInfo, ReservedVectors, CPU_EXCEPTION_NUM);\r
e41aad15
JF
219 if (EFI_ERROR (Status)) {\r
220 return EFI_INVALID_PARAMETER;\r
221 }\r
222 }\r
e41aad15 223\r
e41aad15
JF
224 //\r
225 // Read IDT descriptor and calculate IDT size\r
226 //\r
227 AsmReadIdtr (&IdtDescriptor);\r
228 IdtEntryCount = (IdtDescriptor.Limit + 1) / sizeof (IA32_IDT_GATE_DESCRIPTOR);\r
229 if (IdtEntryCount > CPU_EXCEPTION_NUM) {\r
230 //\r
231 // CPU exeption library only setup CPU_EXCEPTION_NUM exception handler at most\r
232 //\r
233 IdtEntryCount = CPU_EXCEPTION_NUM;\r
234 }\r
235\r
236 IdtTable = (IA32_IDT_GATE_DESCRIPTOR *) IdtDescriptor.Base;\r
237 AsmGetTemplateAddressMap (&TemplateMap);\r
238 ASSERT (TemplateMap.ExceptionStubHeaderSize <= HOOKAFTER_STUB_SIZE);\r
9db15f81
JF
239\r
240 ExceptionHandlerData->IdtEntryCount = IdtEntryCount;\r
241 UpdateIdtTable (IdtTable, &TemplateMap, ExceptionHandlerData);\r
d91225cf 242\r
e41aad15
JF
243 return EFI_SUCCESS;\r
244}\r
245\r
246/**\r
247 Registers a function to be called from the processor interrupt handler.\r
248\r
670f13af
JF
249 @param[in] InterruptType Defines which interrupt or exception to hook.\r
250 @param[in] InterruptHandler A pointer to a function of type EFI_CPU_INTERRUPT_HANDLER that is called\r
251 when a processor interrupt occurs. If this parameter is NULL, then the handler\r
252 will be uninstalled\r
253 @param[in] ExceptionHandlerData Pointer to exception handler data.\r
e41aad15
JF
254\r
255 @retval EFI_SUCCESS The handler for the processor interrupt was successfully installed or uninstalled.\r
256 @retval EFI_ALREADY_STARTED InterruptHandler is not NULL, and a handler for InterruptType was\r
257 previously installed.\r
258 @retval EFI_INVALID_PARAMETER InterruptHandler is NULL, and a handler for InterruptType was not\r
259 previously installed.\r
260 @retval EFI_UNSUPPORTED The interrupt specified by InterruptType is not supported,\r
261 or this function is not supported.\r
3f25e6ea 262**/\r
e41aad15
JF
263EFI_STATUS\r
264RegisterCpuInterruptHandlerWorker (\r
265 IN EFI_EXCEPTION_TYPE InterruptType,\r
670f13af
JF
266 IN EFI_CPU_INTERRUPT_HANDLER InterruptHandler,\r
267 IN EXCEPTION_HANDLER_DATA *ExceptionHandlerData\r
e41aad15
JF
268 )\r
269{\r
670f13af
JF
270 UINTN EnabledInterruptNum;\r
271 RESERVED_VECTORS_DATA *ReservedVectors;\r
272 EFI_CPU_INTERRUPT_HANDLER *ExternalInterruptHandler;\r
273\r
274 EnabledInterruptNum = ExceptionHandlerData->IdtEntryCount;\r
275 ReservedVectors = ExceptionHandlerData->ReservedVectors;\r
276 ExternalInterruptHandler = ExceptionHandlerData->ExternalInterruptHandler;\r
277\r
278 if (InterruptType < 0 || InterruptType >= (EFI_EXCEPTION_TYPE)EnabledInterruptNum ||\r
279 ReservedVectors[InterruptType].Attribute == EFI_VECTOR_HANDOFF_DO_NOT_HOOK) {\r
e41aad15
JF
280 return EFI_UNSUPPORTED;\r
281 }\r
282\r
670f13af 283 if (InterruptHandler == NULL && ExternalInterruptHandler[InterruptType] == NULL) {\r
e41aad15
JF
284 return EFI_INVALID_PARAMETER;\r
285 }\r
286\r
670f13af 287 if (InterruptHandler != NULL && ExternalInterruptHandler[InterruptType] != NULL) {\r
e41aad15
JF
288 return EFI_ALREADY_STARTED;\r
289 }\r
290\r
670f13af 291 ExternalInterruptHandler[InterruptType] = InterruptHandler;\r
e41aad15 292 return EFI_SUCCESS;\r
8f07f895 293}\r
294\r