Commit | Line | Data |
---|---|---|
a9764e68 MK |
1 | /** @file\r |
2 | The CPU specific programming for PiSmmCpuDxeSmm module.\r | |
3 | \r | |
728de7a0 | 4 | Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>\r |
a9764e68 MK |
5 | This program and the accompanying materials\r |
6 | are licensed and made available under the terms and conditions of the BSD License\r | |
7 | which accompanies this distribution. The full text of the license may be found at\r | |
8 | http://opensource.org/licenses/bsd-license.php\r | |
9 | \r | |
10 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r | |
11 | WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r | |
12 | \r | |
13 | **/\r | |
14 | \r | |
15 | #include <PiSmm.h>\r | |
16 | #include <Library/SmmCpuFeaturesLib.h>\r | |
17 | #include <Library/BaseLib.h>\r | |
18 | #include <Library/MtrrLib.h>\r | |
19 | #include <Library/PcdLib.h>\r | |
20 | #include <Library/MemoryAllocationLib.h>\r | |
21 | #include <Library/DebugLib.h>\r | |
22 | #include <Register/Cpuid.h>\r | |
23 | #include <Register/SmramSaveStateMap.h>\r | |
24 | \r | |
25 | //\r | |
26 | // Machine Specific Registers (MSRs)\r | |
27 | //\r | |
28 | #define SMM_FEATURES_LIB_IA32_MTRR_CAP 0x0FE\r | |
29 | #define SMM_FEATURES_LIB_IA32_FEATURE_CONTROL 0x03A\r | |
30 | #define SMM_FEATURES_LIB_IA32_SMRR_PHYSBASE 0x1F2\r | |
31 | #define SMM_FEATURES_LIB_IA32_SMRR_PHYSMASK 0x1F3\r | |
32 | #define SMM_FEATURES_LIB_IA32_CORE_SMRR_PHYSBASE 0x0A0\r | |
33 | #define SMM_FEATURES_LIB_IA32_CORE_SMRR_PHYSMASK 0x0A1\r | |
34 | #define EFI_MSR_SMRR_MASK 0xFFFFF000\r | |
35 | #define EFI_MSR_SMRR_PHYS_MASK_VALID BIT11\r | |
d26a7a3f | 36 | #define SMM_FEATURES_LIB_SMM_FEATURE_CONTROL 0x4E0\r |
a9764e68 | 37 | \r |
4ab4e20f JF |
38 | //\r |
39 | // MSRs required for configuration of SMM Code Access Check\r | |
40 | //\r | |
41 | #define SMM_FEATURES_LIB_IA32_MCA_CAP 0x17D\r | |
42 | #define SMM_CODE_ACCESS_CHK_BIT BIT58\r | |
43 | \r | |
4c6351db MK |
44 | /**\r |
45 | Internal worker function that is called to complete CPU initialization at the\r | |
d0c80b8a | 46 | end of SmmCpuFeaturesInitializeProcessor().\r |
4c6351db MK |
47 | \r |
48 | **/\r | |
49 | VOID\r | |
50 | FinishSmmCpuFeaturesInitializeProcessor (\r | |
51 | VOID\r | |
52 | );\r | |
53 | \r | |
a9764e68 MK |
54 | //\r |
55 | // Set default value to assume SMRR is not supported\r | |
56 | //\r | |
57 | BOOLEAN mSmrrSupported = FALSE;\r | |
58 | \r | |
d26a7a3f MK |
59 | //\r |
60 | // Set default value to assume MSR_SMM_FEATURE_CONTROL is not supported\r | |
61 | //\r | |
62 | BOOLEAN mSmmFeatureControlSupported = FALSE;\r | |
63 | \r | |
a9764e68 MK |
64 | //\r |
65 | // Set default value to assume IA-32 Architectural MSRs are used\r | |
66 | //\r | |
67 | UINT32 mSmrrPhysBaseMsr = SMM_FEATURES_LIB_IA32_SMRR_PHYSBASE;\r | |
68 | UINT32 mSmrrPhysMaskMsr = SMM_FEATURES_LIB_IA32_SMRR_PHYSMASK;\r | |
69 | \r | |
70 | //\r | |
71 | // Set default value to assume MTRRs need to be configured on each SMI\r | |
72 | //\r | |
73 | BOOLEAN mNeedConfigureMtrrs = TRUE;\r | |
74 | \r | |
75 | //\r | |
76 | // Array for state of SMRR enable on all CPUs\r | |
77 | //\r | |
78 | BOOLEAN *mSmrrEnabled;\r | |
79 | \r | |
80 | /**\r | |
81 | The constructor function\r | |
82 | \r | |
83 | @param[in] ImageHandle The firmware allocated handle for the EFI image.\r | |
84 | @param[in] SystemTable A pointer to the EFI System Table.\r | |
85 | \r | |
86 | @retval EFI_SUCCESS The constructor always returns EFI_SUCCESS.\r | |
87 | \r | |
88 | **/\r | |
89 | EFI_STATUS\r | |
90 | EFIAPI\r | |
91 | SmmCpuFeaturesLibConstructor (\r | |
92 | IN EFI_HANDLE ImageHandle,\r | |
93 | IN EFI_SYSTEM_TABLE *SystemTable\r | |
94 | )\r | |
95 | {\r | |
96 | UINT32 RegEax;\r | |
97 | UINT32 RegEdx;\r | |
98 | UINTN FamilyId;\r | |
99 | UINTN ModelId;\r | |
100 | \r | |
101 | //\r | |
102 | // Retrieve CPU Family and Model\r | |
103 | //\r | |
104 | AsmCpuid (CPUID_VERSION_INFO, &RegEax, NULL, NULL, &RegEdx);\r | |
105 | FamilyId = (RegEax >> 8) & 0xf;\r | |
106 | ModelId = (RegEax >> 4) & 0xf;\r | |
107 | if (FamilyId == 0x06 || FamilyId == 0x0f) {\r | |
108 | ModelId = ModelId | ((RegEax >> 12) & 0xf0);\r | |
109 | }\r | |
110 | \r | |
111 | //\r | |
112 | // Check CPUID(CPUID_VERSION_INFO).EDX[12] for MTRR capability\r | |
113 | //\r | |
114 | if ((RegEdx & BIT12) != 0) {\r | |
115 | //\r | |
116 | // Check MTRR_CAP MSR bit 11 for SMRR support\r | |
117 | //\r | |
118 | if ((AsmReadMsr64 (SMM_FEATURES_LIB_IA32_MTRR_CAP) & BIT11) != 0) {\r | |
119 | mSmrrSupported = TRUE;\r | |
120 | }\r | |
121 | }\r | |
122 | \r | |
123 | //\r | |
124 | // Intel(R) 64 and IA-32 Architectures Software Developer's Manual\r | |
125 | // Volume 3C, Section 35.3 MSRs in the Intel(R) Atom(TM) Processor Family\r | |
126 | //\r | |
127 | // If CPU Family/Model is 06_1CH, 06_26H, 06_27H, 06_35H or 06_36H, then\r | |
128 | // SMRR Physical Base and SMM Physical Mask MSRs are not available.\r | |
129 | //\r | |
130 | if (FamilyId == 0x06) {\r | |
131 | if (ModelId == 0x1C || ModelId == 0x26 || ModelId == 0x27 || ModelId == 0x35 || ModelId == 0x36) {\r | |
132 | mSmrrSupported = FALSE;\r | |
133 | }\r | |
134 | }\r | |
135 | \r | |
136 | //\r | |
137 | // Intel(R) 64 and IA-32 Architectures Software Developer's Manual\r | |
138 | // Volume 3C, Section 35.2 MSRs in the Intel(R) Core(TM) 2 Processor Family\r | |
139 | //\r | |
140 | // If CPU Family/Model is 06_0F or 06_17, then use Intel(R) Core(TM) 2\r | |
141 | // Processor Family MSRs\r | |
142 | //\r | |
143 | if (FamilyId == 0x06) {\r | |
144 | if (ModelId == 0x17 || ModelId == 0x0f) {\r | |
145 | mSmrrPhysBaseMsr = SMM_FEATURES_LIB_IA32_CORE_SMRR_PHYSBASE;\r | |
146 | mSmrrPhysMaskMsr = SMM_FEATURES_LIB_IA32_CORE_SMRR_PHYSMASK;\r | |
147 | }\r | |
148 | }\r | |
149 | \r | |
150 | //\r | |
151 | // Intel(R) 64 and IA-32 Architectures Software Developer's Manual\r | |
152 | // Volume 3C, Section 34.4.2 SMRAM Caching\r | |
153 | // An IA-32 processor does not automatically write back and invalidate its\r | |
154 | // caches before entering SMM or before exiting SMM. Because of this behavior,\r | |
155 | // care must be taken in the placement of the SMRAM in system memory and in\r | |
156 | // the caching of the SMRAM to prevent cache incoherence when switching back\r | |
157 | // and forth between SMM and protected mode operation.\r | |
158 | //\r | |
159 | // An IA-32 processor is a processor that does not support the Intel 64\r | |
160 | // Architecture. Support for the Intel 64 Architecture can be detected from\r | |
161 | // CPUID(CPUID_EXTENDED_CPU_SIG).EDX[29]\r | |
162 | //\r | |
163 | // If an IA-32 processor is detected, then set mNeedConfigureMtrrs to TRUE,\r | |
164 | // so caches are flushed on SMI entry and SMI exit, the interrupted code\r | |
165 | // MTRRs are saved/restored, and MTRRs for SMM are loaded.\r | |
166 | //\r | |
167 | AsmCpuid (CPUID_EXTENDED_FUNCTION, &RegEax, NULL, NULL, NULL);\r | |
168 | if (RegEax >= CPUID_EXTENDED_CPU_SIG) {\r | |
169 | AsmCpuid (CPUID_EXTENDED_CPU_SIG, NULL, NULL, NULL, &RegEdx);\r | |
170 | if ((RegEdx & BIT29) != 0) {\r | |
171 | mNeedConfigureMtrrs = FALSE;\r | |
172 | }\r | |
173 | }\r | |
174 | \r | |
175 | //\r | |
176 | // Allocate array for state of SMRR enable on all CPUs\r | |
177 | //\r | |
178 | mSmrrEnabled = (BOOLEAN *)AllocatePool (sizeof (BOOLEAN) * PcdGet32 (PcdCpuMaxLogicalProcessorNumber));\r | |
179 | ASSERT (mSmrrEnabled != NULL);\r | |
180 | \r | |
181 | return EFI_SUCCESS;\r | |
182 | }\r | |
183 | \r | |
184 | /**\r | |
185 | Called during the very first SMI into System Management Mode to initialize\r | |
186 | CPU features, including SMBASE, for the currently executing CPU. Since this\r | |
187 | is the first SMI, the SMRAM Save State Map is at the default address of\r | |
188 | SMM_DEFAULT_SMBASE + SMRAM_SAVE_STATE_MAP_OFFSET. The currently executing\r | |
189 | CPU is specified by CpuIndex and CpuIndex can be used to access information\r | |
190 | about the currently executing CPU in the ProcessorInfo array and the\r | |
191 | HotPlugCpuData data structure.\r | |
192 | \r | |
193 | @param[in] CpuIndex The index of the CPU to initialize. The value\r | |
194 | must be between 0 and the NumberOfCpus field in\r | |
195 | the System Management System Table (SMST).\r | |
196 | @param[in] IsMonarch TRUE if the CpuIndex is the index of the CPU that\r | |
197 | was elected as monarch during System Management\r | |
198 | Mode initialization.\r | |
199 | FALSE if the CpuIndex is not the index of the CPU\r | |
200 | that was elected as monarch during System\r | |
201 | Management Mode initialization.\r | |
202 | @param[in] ProcessorInfo Pointer to an array of EFI_PROCESSOR_INFORMATION\r | |
203 | structures. ProcessorInfo[CpuIndex] contains the\r | |
204 | information for the currently executing CPU.\r | |
205 | @param[in] CpuHotPlugData Pointer to the CPU_HOT_PLUG_DATA structure that\r | |
206 | contains the ApidId and SmBase arrays.\r | |
207 | **/\r | |
208 | VOID\r | |
209 | EFIAPI\r | |
210 | SmmCpuFeaturesInitializeProcessor (\r | |
211 | IN UINTN CpuIndex,\r | |
212 | IN BOOLEAN IsMonarch,\r | |
213 | IN EFI_PROCESSOR_INFORMATION *ProcessorInfo,\r | |
214 | IN CPU_HOT_PLUG_DATA *CpuHotPlugData\r | |
215 | )\r | |
216 | {\r | |
217 | SMRAM_SAVE_STATE_MAP *CpuState;\r | |
218 | UINT64 FeatureControl;\r | |
4ab4e20f JF |
219 | UINT32 RegEax;\r |
220 | UINT32 RegEdx;\r | |
221 | UINTN FamilyId;\r | |
222 | UINTN ModelId;\r | |
a9764e68 MK |
223 | \r |
224 | //\r | |
225 | // Configure SMBASE.\r | |
226 | //\r | |
227 | CpuState = (SMRAM_SAVE_STATE_MAP *)(UINTN)(SMM_DEFAULT_SMBASE + SMRAM_SAVE_STATE_MAP_OFFSET);\r | |
228 | CpuState->x86.SMBASE = (UINT32)CpuHotPlugData->SmBase[CpuIndex];\r | |
229 | \r | |
230 | //\r | |
231 | // Intel(R) 64 and IA-32 Architectures Software Developer's Manual\r | |
232 | // Volume 3C, Section 35.2 MSRs in the Intel(R) Core(TM) 2 Processor Family\r | |
233 | //\r | |
234 | // If Intel(R) Core(TM) Core(TM) 2 Processor Family MSRs are being used, then\r | |
235 | // make sure SMRR Enable(BIT3) of MSR_FEATURE_CONTROL MSR(0x3A) is set before\r | |
236 | // accessing SMRR base/mask MSRs. If Lock(BIT0) of MSR_FEATURE_CONTROL MSR(0x3A)\r | |
237 | // is set, then the MSR is locked and can not be modified.\r | |
238 | //\r | |
239 | if (mSmrrSupported && mSmrrPhysBaseMsr == SMM_FEATURES_LIB_IA32_CORE_SMRR_PHYSBASE) {\r | |
240 | FeatureControl = AsmReadMsr64 (SMM_FEATURES_LIB_IA32_FEATURE_CONTROL);\r | |
241 | if ((FeatureControl & BIT3) == 0) {\r | |
242 | if ((FeatureControl & BIT0) == 0) {\r | |
243 | AsmWriteMsr64 (SMM_FEATURES_LIB_IA32_FEATURE_CONTROL, FeatureControl | BIT3);\r | |
244 | } else {\r | |
245 | mSmrrSupported = FALSE;\r | |
246 | }\r | |
247 | }\r | |
248 | }\r | |
249 | \r | |
250 | //\r | |
251 | // If SMRR is supported, then program SMRR base/mask MSRs.\r | |
252 | // The EFI_MSR_SMRR_PHYS_MASK_VALID bit is not set until the first normal SMI.\r | |
253 | // The code that initializes SMM environment is running in normal mode\r | |
254 | // from SMRAM region. If SMRR is enabled here, then the SMRAM region\r | |
255 | // is protected and the normal mode code execution will fail.\r | |
256 | //\r | |
257 | if (mSmrrSupported) {\r | |
728de7a0 MK |
258 | //\r |
259 | // SMRR size cannot be less than 4-KBytes\r | |
260 | // SMRR size must be of length 2^n\r | |
261 | // SMRR base alignment cannot be less than SMRR length\r | |
262 | //\r | |
263 | if ((CpuHotPlugData->SmrrSize < SIZE_4KB) ||\r | |
264 | (CpuHotPlugData->SmrrSize != GetPowerOfTwo32 (CpuHotPlugData->SmrrSize)) ||\r | |
265 | ((CpuHotPlugData->SmrrBase & ~(CpuHotPlugData->SmrrSize - 1)) != CpuHotPlugData->SmrrBase)) {\r | |
266 | //\r | |
267 | // Print message and halt if CPU is Monarch\r | |
268 | //\r | |
269 | if (IsMonarch) {\r | |
4c6351db | 270 | DEBUG ((DEBUG_ERROR, "SMM Base/Size does not meet alignment/size requirement!\n"));\r |
728de7a0 MK |
271 | CpuDeadLoop ();\r |
272 | }\r | |
273 | } else {\r | |
274 | AsmWriteMsr64 (mSmrrPhysBaseMsr, CpuHotPlugData->SmrrBase | MTRR_CACHE_WRITE_BACK);\r | |
275 | AsmWriteMsr64 (mSmrrPhysMaskMsr, (~(CpuHotPlugData->SmrrSize - 1) & EFI_MSR_SMRR_MASK));\r | |
276 | mSmrrEnabled[CpuIndex] = FALSE;\r | |
277 | }\r | |
a9764e68 | 278 | }\r |
4ab4e20f JF |
279 | \r |
280 | //\r | |
281 | // Retrieve CPU Family and Model\r | |
282 | //\r | |
283 | AsmCpuid (CPUID_VERSION_INFO, &RegEax, NULL, NULL, &RegEdx);\r | |
284 | FamilyId = (RegEax >> 8) & 0xf;\r | |
285 | ModelId = (RegEax >> 4) & 0xf;\r | |
286 | if (FamilyId == 0x06 || FamilyId == 0x0f) {\r | |
287 | ModelId = ModelId | ((RegEax >> 12) & 0xf0);\r | |
288 | }\r | |
289 | \r | |
290 | //\r | |
291 | // Intel(R) 64 and IA-32 Architectures Software Developer's Manual\r | |
292 | // Volume 3C, Section 35.10.1 MSRs in 4th Generation Intel(R) Core(TM)\r | |
293 | // Processor Family.\r | |
294 | //\r | |
295 | // If CPU Family/Model is 06_3C, 06_45, or 06_46 then use 4th Generation\r | |
296 | // Intel(R) Core(TM) Processor Family MSRs.\r | |
297 | //\r | |
298 | if (FamilyId == 0x06) {\r | |
53fa8728 JY |
299 | if (ModelId == 0x3C || ModelId == 0x45 || ModelId == 0x46 ||\r |
300 | ModelId == 0x3D || ModelId == 0x47 || ModelId == 0x4E || ModelId == 0x4F ||\r | |
301 | ModelId == 0x3F || ModelId == 0x56 || ModelId == 0x57 || ModelId == 0x5C) {\r | |
4ab4e20f JF |
302 | //\r |
303 | // Check to see if the CPU supports the SMM Code Access Check feature\r | |
304 | // Do not access this MSR unless the CPU supports the SmmRegFeatureControl\r | |
305 | //\r | |
306 | if ((AsmReadMsr64 (SMM_FEATURES_LIB_IA32_MCA_CAP) & SMM_CODE_ACCESS_CHK_BIT) != 0) {\r | |
307 | mSmmFeatureControlSupported = TRUE;\r | |
308 | }\r | |
309 | }\r | |
310 | }\r | |
4c6351db MK |
311 | \r |
312 | //\r | |
313 | // Call internal worker function that completes the CPU initialization\r | |
314 | //\r | |
315 | FinishSmmCpuFeaturesInitializeProcessor ();\r | |
a9764e68 MK |
316 | }\r |
317 | \r | |
318 | /**\r | |
319 | This function updates the SMRAM save state on the currently executing CPU\r | |
320 | to resume execution at a specific address after an RSM instruction. This\r | |
321 | function must evaluate the SMRAM save state to determine the execution mode\r | |
322 | the RSM instruction resumes and update the resume execution address with\r | |
323 | either NewInstructionPointer32 or NewInstructionPoint. The auto HALT restart\r | |
324 | flag in the SMRAM save state must always be cleared. This function returns\r | |
325 | the value of the instruction pointer from the SMRAM save state that was\r | |
326 | replaced. If this function returns 0, then the SMRAM save state was not\r | |
327 | modified.\r | |
328 | \r | |
329 | This function is called during the very first SMI on each CPU after\r | |
330 | SmmCpuFeaturesInitializeProcessor() to set a flag in normal execution mode\r | |
331 | to signal that the SMBASE of each CPU has been updated before the default\r | |
332 | SMBASE address is used for the first SMI to the next CPU.\r | |
333 | \r | |
334 | @param[in] CpuIndex The index of the CPU to hook. The value\r | |
335 | must be between 0 and the NumberOfCpus\r | |
336 | field in the System Management System Table\r | |
337 | (SMST).\r | |
338 | @param[in] CpuState Pointer to SMRAM Save State Map for the\r | |
339 | currently executing CPU.\r | |
340 | @param[in] NewInstructionPointer32 Instruction pointer to use if resuming to\r | |
341 | 32-bit execution mode from 64-bit SMM.\r | |
342 | @param[in] NewInstructionPointer Instruction pointer to use if resuming to\r | |
343 | same execution mode as SMM.\r | |
344 | \r | |
345 | @retval 0 This function did modify the SMRAM save state.\r | |
346 | @retval > 0 The original instruction pointer value from the SMRAM save state\r | |
347 | before it was replaced.\r | |
348 | **/\r | |
349 | UINT64\r | |
350 | EFIAPI\r | |
351 | SmmCpuFeaturesHookReturnFromSmm (\r | |
352 | IN UINTN CpuIndex,\r | |
353 | IN SMRAM_SAVE_STATE_MAP *CpuState,\r | |
354 | IN UINT64 NewInstructionPointer32,\r | |
355 | IN UINT64 NewInstructionPointer\r | |
356 | )\r | |
357 | {\r | |
358 | return 0;\r | |
359 | }\r | |
360 | \r | |
361 | /**\r | |
362 | Hook point in normal execution mode that allows the one CPU that was elected\r | |
363 | as monarch during System Management Mode initialization to perform additional\r | |
364 | initialization actions immediately after all of the CPUs have processed their\r | |
365 | first SMI and called SmmCpuFeaturesInitializeProcessor() relocating SMBASE\r | |
366 | into a buffer in SMRAM and called SmmCpuFeaturesHookReturnFromSmm().\r | |
367 | **/\r | |
368 | VOID\r | |
369 | EFIAPI\r | |
370 | SmmCpuFeaturesSmmRelocationComplete (\r | |
371 | VOID\r | |
a9764e68 MK |
372 | )\r |
373 | {\r | |
374 | }\r | |
375 | \r | |
376 | /**\r | |
377 | Determines if MTRR registers must be configured to set SMRAM cache-ability\r | |
378 | when executing in System Management Mode.\r | |
379 | \r | |
380 | @retval TRUE MTRR registers must be configured to set SMRAM cache-ability.\r | |
381 | @retval FALSE MTRR registers do not need to be configured to set SMRAM\r | |
382 | cache-ability.\r | |
383 | **/\r | |
384 | BOOLEAN\r | |
385 | EFIAPI\r | |
386 | SmmCpuFeaturesNeedConfigureMtrrs (\r | |
387 | VOID\r | |
388 | )\r | |
389 | {\r | |
390 | return mNeedConfigureMtrrs;\r | |
391 | }\r | |
392 | \r | |
393 | /**\r | |
394 | Disable SMRR register if SMRR is supported and SmmCpuFeaturesNeedConfigureMtrrs()\r | |
395 | returns TRUE.\r | |
396 | **/\r | |
397 | VOID\r | |
398 | EFIAPI\r | |
399 | SmmCpuFeaturesDisableSmrr (\r | |
400 | VOID\r | |
401 | )\r | |
402 | {\r | |
403 | if (mSmrrSupported && mNeedConfigureMtrrs) {\r | |
404 | AsmWriteMsr64 (mSmrrPhysMaskMsr, AsmReadMsr64(mSmrrPhysMaskMsr) & ~EFI_MSR_SMRR_PHYS_MASK_VALID);\r | |
405 | }\r | |
406 | }\r | |
407 | \r | |
408 | /**\r | |
409 | Enable SMRR register if SMRR is supported and SmmCpuFeaturesNeedConfigureMtrrs()\r | |
410 | returns TRUE.\r | |
411 | **/\r | |
412 | VOID\r | |
413 | EFIAPI\r | |
414 | SmmCpuFeaturesReenableSmrr (\r | |
415 | VOID\r | |
416 | )\r | |
417 | {\r | |
418 | if (mSmrrSupported && mNeedConfigureMtrrs) {\r | |
419 | AsmWriteMsr64 (mSmrrPhysMaskMsr, AsmReadMsr64(mSmrrPhysMaskMsr) | EFI_MSR_SMRR_PHYS_MASK_VALID);\r | |
420 | }\r | |
421 | }\r | |
422 | \r | |
423 | /**\r | |
424 | Processor specific hook point each time a CPU enters System Management Mode.\r | |
425 | \r | |
426 | @param[in] CpuIndex The index of the CPU that has entered SMM. The value\r | |
427 | must be between 0 and the NumberOfCpus field in the\r | |
428 | System Management System Table (SMST).\r | |
429 | **/\r | |
430 | VOID\r | |
431 | EFIAPI\r | |
432 | SmmCpuFeaturesRendezvousEntry (\r | |
433 | IN UINTN CpuIndex\r | |
434 | )\r | |
435 | {\r | |
436 | //\r | |
437 | // If SMRR is supported and this is the first normal SMI, then enable SMRR\r | |
438 | //\r | |
439 | if (mSmrrSupported && !mSmrrEnabled[CpuIndex]) {\r | |
440 | AsmWriteMsr64 (mSmrrPhysMaskMsr, AsmReadMsr64 (mSmrrPhysMaskMsr) | EFI_MSR_SMRR_PHYS_MASK_VALID);\r | |
441 | mSmrrEnabled[CpuIndex] = TRUE;\r | |
442 | }\r | |
443 | }\r | |
444 | \r | |
445 | /**\r | |
446 | Processor specific hook point each time a CPU exits System Management Mode.\r | |
447 | \r | |
448 | @param[in] CpuIndex The index of the CPU that is exiting SMM. The value must\r | |
449 | be between 0 and the NumberOfCpus field in the System\r | |
450 | Management System Table (SMST).\r | |
451 | **/\r | |
452 | VOID\r | |
453 | EFIAPI\r | |
454 | SmmCpuFeaturesRendezvousExit (\r | |
455 | IN UINTN CpuIndex\r | |
456 | )\r | |
457 | {\r | |
458 | }\r | |
459 | \r | |
460 | /**\r | |
461 | Check to see if an SMM register is supported by a specified CPU.\r | |
462 | \r | |
463 | @param[in] CpuIndex The index of the CPU to check for SMM register support.\r | |
464 | The value must be between 0 and the NumberOfCpus field\r | |
465 | in the System Management System Table (SMST).\r | |
466 | @param[in] RegName Identifies the SMM register to check for support.\r | |
467 | \r | |
468 | @retval TRUE The SMM register specified by RegName is supported by the CPU\r | |
469 | specified by CpuIndex.\r | |
470 | @retval FALSE The SMM register specified by RegName is not supported by the\r | |
471 | CPU specified by CpuIndex.\r | |
472 | **/\r | |
473 | BOOLEAN\r | |
474 | EFIAPI\r | |
475 | SmmCpuFeaturesIsSmmRegisterSupported (\r | |
476 | IN UINTN CpuIndex,\r | |
477 | IN SMM_REG_NAME RegName\r | |
478 | )\r | |
479 | {\r | |
d26a7a3f MK |
480 | if (mSmmFeatureControlSupported && RegName == SmmRegFeatureControl) {\r |
481 | return TRUE;\r | |
482 | }\r | |
a9764e68 MK |
483 | return FALSE;\r |
484 | }\r | |
485 | \r | |
486 | /**\r | |
487 | Returns the current value of the SMM register for the specified CPU.\r | |
488 | If the SMM register is not supported, then 0 is returned.\r | |
489 | \r | |
490 | @param[in] CpuIndex The index of the CPU to read the SMM register. The\r | |
491 | value must be between 0 and the NumberOfCpus field in\r | |
492 | the System Management System Table (SMST).\r | |
493 | @param[in] RegName Identifies the SMM register to read.\r | |
494 | \r | |
495 | @return The value of the SMM register specified by RegName from the CPU\r | |
496 | specified by CpuIndex.\r | |
497 | **/\r | |
498 | UINT64\r | |
499 | EFIAPI\r | |
500 | SmmCpuFeaturesGetSmmRegister (\r | |
501 | IN UINTN CpuIndex,\r | |
502 | IN SMM_REG_NAME RegName\r | |
503 | )\r | |
504 | {\r | |
d26a7a3f MK |
505 | if (mSmmFeatureControlSupported && RegName == SmmRegFeatureControl) {\r |
506 | return AsmReadMsr64 (SMM_FEATURES_LIB_SMM_FEATURE_CONTROL);\r | |
507 | }\r | |
a9764e68 MK |
508 | return 0;\r |
509 | }\r | |
510 | \r | |
511 | /**\r | |
512 | Sets the value of an SMM register on a specified CPU.\r | |
513 | If the SMM register is not supported, then no action is performed.\r | |
514 | \r | |
515 | @param[in] CpuIndex The index of the CPU to write the SMM register. The\r | |
516 | value must be between 0 and the NumberOfCpus field in\r | |
517 | the System Management System Table (SMST).\r | |
518 | @param[in] RegName Identifies the SMM register to write.\r | |
519 | registers are read-only.\r | |
520 | @param[in] Value The value to write to the SMM register.\r | |
521 | **/\r | |
522 | VOID\r | |
523 | EFIAPI\r | |
524 | SmmCpuFeaturesSetSmmRegister (\r | |
525 | IN UINTN CpuIndex,\r | |
526 | IN SMM_REG_NAME RegName,\r | |
527 | IN UINT64 Value\r | |
528 | )\r | |
529 | {\r | |
d26a7a3f MK |
530 | if (mSmmFeatureControlSupported && RegName == SmmRegFeatureControl) {\r |
531 | AsmWriteMsr64 (SMM_FEATURES_LIB_SMM_FEATURE_CONTROL, Value);\r | |
532 | }\r | |
a9764e68 MK |
533 | }\r |
534 | \r | |
535 | /**\r | |
536 | Read an SMM Save State register on the target processor. If this function\r | |
537 | returns EFI_UNSUPPORTED, then the caller is responsible for reading the\r | |
538 | SMM Save Sate register.\r | |
539 | \r | |
540 | @param[in] CpuIndex The index of the CPU to read the SMM Save State. The\r | |
541 | value must be between 0 and the NumberOfCpus field in\r | |
542 | the System Management System Table (SMST).\r | |
543 | @param[in] Register The SMM Save State register to read.\r | |
544 | @param[in] Width The number of bytes to read from the CPU save state.\r | |
545 | @param[out] Buffer Upon return, this holds the CPU register value read\r | |
546 | from the save state.\r | |
547 | \r | |
548 | @retval EFI_SUCCESS The register was read from Save State.\r | |
549 | @retval EFI_INVALID_PARAMTER Buffer is NULL.\r | |
550 | @retval EFI_UNSUPPORTED This function does not support reading Register.\r | |
551 | \r | |
552 | **/\r | |
553 | EFI_STATUS\r | |
554 | EFIAPI\r | |
555 | SmmCpuFeaturesReadSaveStateRegister (\r | |
556 | IN UINTN CpuIndex,\r | |
557 | IN EFI_SMM_SAVE_STATE_REGISTER Register,\r | |
558 | IN UINTN Width,\r | |
559 | OUT VOID *Buffer\r | |
560 | )\r | |
561 | {\r | |
562 | return EFI_UNSUPPORTED;\r | |
563 | }\r | |
564 | \r | |
565 | /**\r | |
566 | Writes an SMM Save State register on the target processor. If this function\r | |
567 | returns EFI_UNSUPPORTED, then the caller is responsible for writing the\r | |
568 | SMM Save Sate register.\r | |
569 | \r | |
570 | @param[in] CpuIndex The index of the CPU to write the SMM Save State. The\r | |
571 | value must be between 0 and the NumberOfCpus field in\r | |
572 | the System Management System Table (SMST).\r | |
573 | @param[in] Register The SMM Save State register to write.\r | |
574 | @param[in] Width The number of bytes to write to the CPU save state.\r | |
575 | @param[in] Buffer Upon entry, this holds the new CPU register value.\r | |
576 | \r | |
577 | @retval EFI_SUCCESS The register was written to Save State.\r | |
578 | @retval EFI_INVALID_PARAMTER Buffer is NULL.\r | |
579 | @retval EFI_UNSUPPORTED This function does not support writing Register.\r | |
580 | **/\r | |
581 | EFI_STATUS\r | |
582 | EFIAPI\r | |
583 | SmmCpuFeaturesWriteSaveStateRegister (\r | |
584 | IN UINTN CpuIndex,\r | |
585 | IN EFI_SMM_SAVE_STATE_REGISTER Register,\r | |
586 | IN UINTN Width,\r | |
587 | IN CONST VOID *Buffer\r | |
588 | )\r | |
589 | {\r | |
590 | return EFI_UNSUPPORTED;\r | |
591 | }\r | |
b095a540 JY |
592 | \r |
593 | /**\r | |
594 | This function is hook point called after the gEfiSmmReadyToLockProtocolGuid\r | |
595 | notification is completely processed.\r | |
596 | **/\r | |
597 | VOID\r | |
598 | EFIAPI\r | |
599 | SmmCpuFeaturesCompleteSmmReadyToLock (\r | |
600 | VOID\r | |
601 | )\r | |
602 | {\r | |
603 | }\r | |
604 | \r | |
605 | /**\r | |
606 | This API provides a method for a CPU to allocate a specific region for storing page tables.\r | |
607 | \r | |
608 | This API can be called more once to allocate memory for page tables.\r | |
609 | \r | |
610 | Allocates the number of 4KB pages of type EfiRuntimeServicesData and returns a pointer to the\r | |
611 | allocated buffer. The buffer returned is aligned on a 4KB boundary. If Pages is 0, then NULL\r | |
612 | is returned. If there is not enough memory remaining to satisfy the request, then NULL is\r | |
613 | returned.\r | |
614 | \r | |
615 | This function can also return NULL if there is no preference on where the page tables are allocated in SMRAM.\r | |
616 | \r | |
617 | @param Pages The number of 4 KB pages to allocate.\r | |
618 | \r | |
619 | @return A pointer to the allocated buffer for page tables.\r | |
620 | @retval NULL Fail to allocate a specific region for storing page tables,\r | |
621 | Or there is no preference on where the page tables are allocated in SMRAM.\r | |
622 | \r | |
623 | **/\r | |
624 | VOID *\r | |
625 | EFIAPI\r | |
626 | SmmCpuFeaturesAllocatePageTableMemory (\r | |
627 | IN UINTN Pages\r | |
628 | )\r | |
629 | {\r | |
630 | return NULL;\r | |
631 | }\r | |
632 | \r |