]> git.proxmox.com Git - mirror_edk2.git/blame - UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c
MdeModulePkg/Universal/Acpi/BootScriptExecutorDxe: Add support for PCD PcdPteMemoryEn...
[mirror_edk2.git] / UefiCpuPkg / PiSmmCpuDxeSmm / Ia32 / PageTbl.c
CommitLineData
7947da3c
MK
1/** @file\r
2Page table manipulation functions for IA-32 processors\r
3\r
fe3a75bc 4Copyright (c) 2009 - 2016, Intel Corporation. All rights reserved.<BR>\r
7947da3c
MK
5This program and the accompanying materials\r
6are licensed and made available under the terms and conditions of the BSD License\r
7which accompanies this distribution. The full text of the license may be found at\r
8http://opensource.org/licenses/bsd-license.php\r
9\r
10THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
12\r
13**/\r
14\r
15#include "PiSmmCpuDxeSmm.h"\r
16\r
7947da3c
MK
17/**\r
18 Create PageTable for SMM use.\r
19\r
20 @return PageTable Address\r
21\r
22**/\r
23UINT32\r
24SmmInitPageTable (\r
25 VOID\r
26 )\r
27{\r
28 UINTN PageFaultHandlerHookAddress;\r
29 IA32_IDT_GATE_DESCRIPTOR *IdtEntry;\r
5c88af79 30 EFI_STATUS Status;\r
7947da3c
MK
31\r
32 //\r
33 // Initialize spin lock\r
34 //\r
fe3a75bc 35 InitializeSpinLock (mPFLock);\r
7947da3c
MK
36\r
37 if (FeaturePcdGet (PcdCpuSmmProfileEnable)) {\r
38 //\r
39 // Set own Page Fault entry instead of the default one, because SMM Profile\r
40 // feature depends on IRET instruction to do Single Step\r
41 //\r
42 PageFaultHandlerHookAddress = (UINTN)PageFaultIdtHandlerSmmProfile;\r
43 IdtEntry = (IA32_IDT_GATE_DESCRIPTOR *) gcSmiIdtr.Base;\r
44 IdtEntry += EXCEPT_IA32_PAGE_FAULT;\r
45 IdtEntry->Bits.OffsetLow = (UINT16)PageFaultHandlerHookAddress;\r
46 IdtEntry->Bits.Reserved_0 = 0;\r
47 IdtEntry->Bits.GateType = IA32_IDT_GATE_TYPE_INTERRUPT_32;\r
48 IdtEntry->Bits.OffsetHigh = (UINT16)(PageFaultHandlerHookAddress >> 16);\r
49 } else {\r
50 //\r
51 // Register SMM Page Fault Handler\r
52 //\r
5c88af79
JF
53 Status = SmmRegisterExceptionHandler (&mSmmCpuService, EXCEPT_IA32_PAGE_FAULT, SmiPFHandler);\r
54 ASSERT_EFI_ERROR (Status);\r
7947da3c
MK
55 }\r
56\r
57 //\r
58 // Additional SMM IDT initialization for SMM stack guard\r
59 //\r
60 if (FeaturePcdGet (PcdCpuSmmStackGuard)) {\r
61 InitializeIDTSmmStackGuard ();\r
62 }\r
717fb604 63 return Gen4GPageTable (TRUE);\r
7947da3c
MK
64}\r
65\r
66/**\r
67 Page Fault handler for SMM use.\r
68\r
69**/\r
70VOID\r
71SmiDefaultPFHandler (\r
72 VOID\r
73 )\r
74{\r
75 CpuDeadLoop ();\r
76}\r
77\r
78/**\r
79 ThePage Fault handler wrapper for SMM use.\r
80\r
81 @param InterruptType Defines the type of interrupt or exception that\r
82 occurred on the processor.This parameter is processor architecture specific.\r
83 @param SystemContext A pointer to the processor context when\r
84 the interrupt occurred on the processor.\r
85**/\r
86VOID\r
87EFIAPI\r
88SmiPFHandler (\r
89 IN EFI_EXCEPTION_TYPE InterruptType,\r
90 IN EFI_SYSTEM_CONTEXT SystemContext\r
91 )\r
92{\r
93 UINTN PFAddress;\r
7fa1376c
JY
94 UINTN GuardPageAddress;\r
95 UINTN CpuIndex;\r
7947da3c
MK
96\r
97 ASSERT (InterruptType == EXCEPT_IA32_PAGE_FAULT);\r
98\r
fe3a75bc 99 AcquireSpinLock (mPFLock);\r
7947da3c
MK
100\r
101 PFAddress = AsmReadCr2 ();\r
102\r
7fa1376c
JY
103 //\r
104 // If a page fault occurs in SMRAM range, it might be in a SMM stack guard page,\r
105 // or SMM page protection violation.\r
106 //\r
107 if ((PFAddress >= mCpuHotPlugData.SmrrBase) &&\r
7947da3c 108 (PFAddress < (mCpuHotPlugData.SmrrBase + mCpuHotPlugData.SmrrSize))) {\r
7fa1376c
JY
109 CpuIndex = GetCpuIndex ();\r
110 GuardPageAddress = (mSmmStackArrayBase + EFI_PAGE_SIZE + CpuIndex * mSmmStackSize);\r
111 if ((FeaturePcdGet (PcdCpuSmmStackGuard)) &&\r
112 (PFAddress >= GuardPageAddress) &&\r
113 (PFAddress < (GuardPageAddress + EFI_PAGE_SIZE))) {\r
114 DEBUG ((DEBUG_ERROR, "SMM stack overflow!\n"));\r
115 } else {\r
116 DEBUG ((DEBUG_ERROR, "SMM exception data - 0x%x(", SystemContext.SystemContextIa32->ExceptionData));\r
117 DEBUG ((DEBUG_ERROR, "I:%x, R:%x, U:%x, W:%x, P:%x",\r
118 (SystemContext.SystemContextIa32->ExceptionData & IA32_PF_EC_ID) != 0,\r
119 (SystemContext.SystemContextIa32->ExceptionData & IA32_PF_EC_RSVD) != 0,\r
120 (SystemContext.SystemContextIa32->ExceptionData & IA32_PF_EC_US) != 0,\r
121 (SystemContext.SystemContextIa32->ExceptionData & IA32_PF_EC_WR) != 0,\r
122 (SystemContext.SystemContextIa32->ExceptionData & IA32_PF_EC_P) != 0\r
123 ));\r
124 DEBUG ((DEBUG_ERROR, ")\n"));\r
125 if ((SystemContext.SystemContextIa32->ExceptionData & IA32_PF_EC_ID) != 0) {\r
126 DEBUG ((DEBUG_ERROR, "SMM exception at execution (0x%x)\n", PFAddress));\r
127 DEBUG_CODE (\r
128 DumpModuleInfoByIp (*(UINTN *)(UINTN)SystemContext.SystemContextIa32->Esp);\r
129 );\r
130 } else {\r
131 DEBUG ((DEBUG_ERROR, "SMM exception at access (0x%x)\n", PFAddress));\r
132 DEBUG_CODE (\r
133 DumpModuleInfoByIp ((UINTN)SystemContext.SystemContextIa32->Eip);\r
134 );\r
135 }\r
136 }\r
7947da3c
MK
137 CpuDeadLoop ();\r
138 }\r
139\r
140 //\r
141 // If a page fault occurs in SMM range\r
142 //\r
143 if ((PFAddress < mCpuHotPlugData.SmrrBase) ||\r
144 (PFAddress >= mCpuHotPlugData.SmrrBase + mCpuHotPlugData.SmrrSize)) {\r
145 if ((SystemContext.SystemContextIa32->ExceptionData & IA32_PF_EC_ID) != 0) {\r
717fb604 146 DEBUG ((DEBUG_ERROR, "Code executed on IP(0x%x) out of SMM range after SMM is locked!\n", PFAddress));\r
7947da3c
MK
147 DEBUG_CODE (\r
148 DumpModuleInfoByIp (*(UINTN *)(UINTN)SystemContext.SystemContextIa32->Esp);\r
149 );\r
150 CpuDeadLoop ();\r
151 }\r
d2fc7711
JY
152 if (IsSmmCommBufferForbiddenAddress (PFAddress)) {\r
153 DEBUG ((DEBUG_ERROR, "Access SMM communication forbidden address (0x%x)!\n", PFAddress));\r
154 DEBUG_CODE (\r
155 DumpModuleInfoByIp ((UINTN)SystemContext.SystemContextIa32->Eip);\r
156 );\r
157 CpuDeadLoop ();\r
158 }\r
7947da3c
MK
159 }\r
160\r
161 if (FeaturePcdGet (PcdCpuSmmProfileEnable)) {\r
162 SmmProfilePFHandler (\r
163 SystemContext.SystemContextIa32->Eip,\r
164 SystemContext.SystemContextIa32->ExceptionData\r
165 );\r
166 } else {\r
167 SmiDefaultPFHandler ();\r
168 }\r
169\r
fe3a75bc 170 ReleaseSpinLock (mPFLock);\r
7947da3c 171}\r
717fb604
JY
172\r
173/**\r
174 This function sets memory attribute for page table.\r
175**/\r
176VOID\r
177SetPageTableAttributes (\r
178 VOID\r
179 )\r
180{\r
181 UINTN Index2;\r
182 UINTN Index3;\r
183 UINT64 *L1PageTable;\r
184 UINT64 *L2PageTable;\r
185 UINT64 *L3PageTable;\r
186 BOOLEAN IsSplitted;\r
187 BOOLEAN PageTableSplitted;\r
188\r
189 DEBUG ((DEBUG_INFO, "SetPageTableAttributes\n"));\r
190\r
191 //\r
192 // Disable write protection, because we need mark page table to be write protected.\r
193 // We need *write* page table memory, to mark itself to be *read only*.\r
194 //\r
195 AsmWriteCr0 (AsmReadCr0() & ~CR0_WP);\r
196\r
197 do {\r
198 DEBUG ((DEBUG_INFO, "Start...\n"));\r
199 PageTableSplitted = FALSE;\r
200\r
201 L3PageTable = (UINT64 *)GetPageTableBase ();\r
202\r
203 SmmSetMemoryAttributesEx ((EFI_PHYSICAL_ADDRESS)(UINTN)L3PageTable, SIZE_4KB, EFI_MEMORY_RO, &IsSplitted);\r
204 PageTableSplitted = (PageTableSplitted || IsSplitted);\r
205\r
206 for (Index3 = 0; Index3 < 4; Index3++) {\r
207 L2PageTable = (UINT64 *)(UINTN)(L3PageTable[Index3] & PAGING_4K_ADDRESS_MASK_64);\r
208 if (L2PageTable == NULL) {\r
209 continue;\r
210 }\r
211\r
212 SmmSetMemoryAttributesEx ((EFI_PHYSICAL_ADDRESS)(UINTN)L2PageTable, SIZE_4KB, EFI_MEMORY_RO, &IsSplitted);\r
213 PageTableSplitted = (PageTableSplitted || IsSplitted);\r
214\r
215 for (Index2 = 0; Index2 < SIZE_4KB/sizeof(UINT64); Index2++) {\r
216 if ((L2PageTable[Index2] & IA32_PG_PS) != 0) {\r
217 // 2M\r
218 continue;\r
219 }\r
220 L1PageTable = (UINT64 *)(UINTN)(L2PageTable[Index2] & PAGING_4K_ADDRESS_MASK_64);\r
221 if (L1PageTable == NULL) {\r
222 continue;\r
223 }\r
224 SmmSetMemoryAttributesEx ((EFI_PHYSICAL_ADDRESS)(UINTN)L1PageTable, SIZE_4KB, EFI_MEMORY_RO, &IsSplitted);\r
225 PageTableSplitted = (PageTableSplitted || IsSplitted);\r
226 }\r
227 }\r
228 } while (PageTableSplitted);\r
229\r
230 //\r
231 // Enable write protection, after page table updated.\r
232 //\r
233 AsmWriteCr0 (AsmReadCr0() | CR0_WP);\r
234\r
235 return ;\r
236}\r