]> git.proxmox.com Git - mirror_edk2.git/blame - UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c
MdeModulePkg/XhciDxe: Fix ICC compiler build warning.
[mirror_edk2.git] / UefiCpuPkg / Universal / Acpi / S3Resume2Pei / S3Resume.c
CommitLineData
1f569620 1/** @file\r
2 This module produces the EFI_PEI_S3_RESUME_PPI.\r
3 This module works with StandAloneBootScriptExecutor to S3 resume to OS.\r
4 This module will excute the boot script saved during last boot and after that,\r
5 control is passed to OS waking up handler.\r
6\r
e47459e6 7 Copyright (c) 2006 - 2012, Intel Corporation. All rights reserved.<BR>\r
1f569620 8\r
9 This program and the accompanying materials\r
10 are licensed and made available under the terms and conditions\r
11 of the BSD License which accompanies this distribution. The\r
12 full text of the license may be found at\r
13 http://opensource.org/licenses/bsd-license.php\r
14\r
15 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
16 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
17\r
18**/\r
19\r
20#include <PiPei.h>\r
21\r
22#include <Guid/AcpiS3Context.h>\r
23#include <Guid/BootScriptExecutorVariable.h>\r
24#include <Guid/Performance.h>\r
25#include <Ppi/ReadOnlyVariable2.h>\r
26#include <Ppi/S3Resume2.h>\r
27#include <Ppi/SmmAccess.h>\r
28#include <Ppi/PostBootScriptTable.h>\r
29#include <Ppi/EndOfPeiPhase.h>\r
30\r
31#include <Library/DebugLib.h>\r
32#include <Library/BaseLib.h>\r
33#include <Library/TimerLib.h>\r
34#include <Library/PeimEntryPoint.h>\r
35#include <Library/PeiServicesLib.h>\r
36#include <Library/HobLib.h>\r
37#include <Library/PerformanceLib.h>\r
38#include <Library/PeiServicesTablePointerLib.h>\r
39#include <Library/IoLib.h>\r
40#include <Library/BaseMemoryLib.h>\r
41#include <Library/MemoryAllocationLib.h>\r
42#include <Library/PcdLib.h>\r
43#include <Library/DebugAgentLib.h>\r
44#include <Library/LocalApicLib.h>\r
45#include <Library/ReportStatusCodeLib.h>\r
46#include <Library/PrintLib.h>\r
c56b6566 47#include <Library/HobLib.h>\r
1f569620 48#include <Library/LockBoxLib.h>\r
49#include <IndustryStandard/Acpi.h>\r
50\r
51#pragma pack(1)\r
52typedef union {\r
53 struct {\r
54 UINT32 LimitLow : 16;\r
55 UINT32 BaseLow : 16;\r
56 UINT32 BaseMid : 8;\r
57 UINT32 Type : 4;\r
58 UINT32 System : 1;\r
59 UINT32 Dpl : 2;\r
60 UINT32 Present : 1;\r
61 UINT32 LimitHigh : 4;\r
62 UINT32 Software : 1;\r
63 UINT32 Reserved : 1;\r
64 UINT32 DefaultSize : 1;\r
65 UINT32 Granularity : 1;\r
66 UINT32 BaseHigh : 8;\r
67 } Bits;\r
68 UINT64 Uint64;\r
69} IA32_GDT;\r
70\r
71//\r
72// Page-Map Level-4 Offset (PML4) and\r
73// Page-Directory-Pointer Offset (PDPE) entries 4K & 2MB\r
74//\r
75typedef union {\r
76 struct {\r
77 UINT64 Present:1; // 0 = Not present in memory, 1 = Present in memory\r
78 UINT64 ReadWrite:1; // 0 = Read-Only, 1= Read/Write\r
79 UINT64 UserSupervisor:1; // 0 = Supervisor, 1=User\r
80 UINT64 WriteThrough:1; // 0 = Write-Back caching, 1=Write-Through caching\r
81 UINT64 CacheDisabled:1; // 0 = Cached, 1=Non-Cached\r
82 UINT64 Accessed:1; // 0 = Not accessed, 1 = Accessed (set by CPU)\r
83 UINT64 Reserved:1; // Reserved\r
84 UINT64 MustBeZero:2; // Must Be Zero\r
85 UINT64 Available:3; // Available for use by system software\r
86 UINT64 PageTableBaseAddress:40; // Page Table Base Address\r
87 UINT64 AvabilableHigh:11; // Available for use by system software\r
88 UINT64 Nx:1; // No Execute bit\r
89 } Bits;\r
90 UINT64 Uint64;\r
91} PAGE_MAP_AND_DIRECTORY_POINTER;\r
92\r
93//\r
94// Page Table Entry 2MB\r
95//\r
96typedef union {\r
97 struct {\r
98 UINT64 Present:1; // 0 = Not present in memory, 1 = Present in memory\r
99 UINT64 ReadWrite:1; // 0 = Read-Only, 1= Read/Write\r
100 UINT64 UserSupervisor:1; // 0 = Supervisor, 1=User\r
101 UINT64 WriteThrough:1; // 0 = Write-Back caching, 1=Write-Through caching\r
102 UINT64 CacheDisabled:1; // 0 = Cached, 1=Non-Cached\r
103 UINT64 Accessed:1; // 0 = Not accessed, 1 = Accessed (set by CPU)\r
104 UINT64 Dirty:1; // 0 = Not Dirty, 1 = written by processor on access to page\r
105 UINT64 MustBe1:1; // Must be 1 \r
106 UINT64 Global:1; // 0 = Not global page, 1 = global page TLB not cleared on CR3 write\r
107 UINT64 Available:3; // Available for use by system software\r
108 UINT64 PAT:1; //\r
109 UINT64 MustBeZero:8; // Must be zero;\r
110 UINT64 PageTableBaseAddress:31; // Page Table Base Address\r
111 UINT64 AvabilableHigh:11; // Available for use by system software\r
112 UINT64 Nx:1; // 0 = Execute Code, 1 = No Code Execution\r
113 } Bits;\r
114 UINT64 Uint64;\r
115} PAGE_TABLE_ENTRY;\r
116\r
c56b6566
JY
117//\r
118// Page Table Entry 1GB\r
119//\r
120typedef union {\r
121 struct {\r
122 UINT64 Present:1; // 0 = Not present in memory, 1 = Present in memory\r
123 UINT64 ReadWrite:1; // 0 = Read-Only, 1= Read/Write\r
124 UINT64 UserSupervisor:1; // 0 = Supervisor, 1=User\r
125 UINT64 WriteThrough:1; // 0 = Write-Back caching, 1=Write-Through caching\r
126 UINT64 CacheDisabled:1; // 0 = Cached, 1=Non-Cached\r
127 UINT64 Accessed:1; // 0 = Not accessed, 1 = Accessed (set by CPU)\r
128 UINT64 Dirty:1; // 0 = Not Dirty, 1 = written by processor on access to page\r
129 UINT64 MustBe1:1; // Must be 1 \r
130 UINT64 Global:1; // 0 = Not global page, 1 = global page TLB not cleared on CR3 write\r
131 UINT64 Available:3; // Available for use by system software\r
132 UINT64 PAT:1; //\r
133 UINT64 MustBeZero:17; // Must be zero;\r
134 UINT64 PageTableBaseAddress:22; // Page Table Base Address\r
135 UINT64 AvabilableHigh:11; // Available for use by system software\r
136 UINT64 Nx:1; // 0 = Execute Code, 1 = No Code Execution\r
137 } Bits;\r
138 UINT64 Uint64;\r
139} PAGE_TABLE_1G_ENTRY;\r
140\r
1f569620 141#pragma pack()\r
142\r
143//\r
144// Function prototypes\r
145//\r
146/**\r
147 a ASM function to transfer control to OS.\r
148 \r
149 @param S3WakingVector The S3 waking up vector saved in ACPI Facs table\r
150 @param AcpiLowMemoryBase a buffer under 1M which could be used during the transfer \r
151**/\r
152typedef\r
153VOID\r
154(EFIAPI *ASM_TRANSFER_CONTROL) (\r
155 IN UINT32 S3WakingVector,\r
156 IN UINT32 AcpiLowMemoryBase\r
157 );\r
158\r
159/**\r
160 Restores the platform to its preboot configuration for an S3 resume and\r
161 jumps to the OS waking vector.\r
162\r
163 This function will restore the platform to its pre-boot configuration that was\r
164 pre-stored in the boot script table and transfer control to OS waking vector.\r
165 Upon invocation, this function is responsible for locating the following\r
166 information before jumping to OS waking vector:\r
167 - ACPI tables\r
168 - boot script table\r
169 - any other information that it needs\r
170\r
171 The S3RestoreConfig() function then executes the pre-stored boot script table\r
172 and transitions the platform to the pre-boot state. The boot script is recorded\r
173 during regular boot using the EFI_S3_SAVE_STATE_PROTOCOL.Write() and\r
174 EFI_S3_SMM_SAVE_STATE_PROTOCOL.Write() functions. Finally, this function\r
175 transfers control to the OS waking vector. If the OS supports only a real-mode\r
176 waking vector, this function will switch from flat mode to real mode before\r
177 jumping to the waking vector. If all platform pre-boot configurations are\r
178 successfully restored and all other necessary information is ready, this\r
179 function will never return and instead will directly jump to the OS waking\r
180 vector. If this function returns, it indicates that the attempt to resume\r
181 from the ACPI S3 sleep state failed.\r
182\r
183 @param[in] This Pointer to this instance of the PEI_S3_RESUME_PPI\r
184\r
185 @retval EFI_ABORTED Execution of the S3 resume boot script table failed.\r
186 @retval EFI_NOT_FOUND Some necessary information that is used for the S3\r
187 resume boot path could not be located.\r
188\r
189**/\r
190EFI_STATUS\r
191EFIAPI\r
192S3RestoreConfig2 (\r
193 IN EFI_PEI_S3_RESUME2_PPI *This\r
194 );\r
195\r
abef469f 196/**\r
197 Set data segment selectors value including DS/ES/FS/GS/SS.\r
198\r
199 @param[in] SelectorValue Segment selector value to be set.\r
200\r
201**/\r
202VOID\r
203EFIAPI\r
204AsmSetDataSelectors (\r
205 IN UINT16 SelectorValue\r
206 );\r
207\r
1f569620 208//\r
209// Globals\r
210//\r
211EFI_PEI_S3_RESUME2_PPI mS3ResumePpi = { S3RestoreConfig2 };\r
212\r
213EFI_PEI_PPI_DESCRIPTOR mPpiList = {\r
214 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
215 &gEfiPeiS3Resume2PpiGuid,\r
216 &mS3ResumePpi\r
217};\r
218\r
219EFI_PEI_PPI_DESCRIPTOR mPpiListPostScriptTable = {\r
220 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
221 &gPeiPostScriptTablePpiGuid,\r
222 0\r
223};\r
224\r
225EFI_PEI_PPI_DESCRIPTOR mPpiListEndOfPeiTable = {\r
226 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
227 &gEfiEndOfPeiSignalPpiGuid,\r
228 0\r
229};\r
230\r
231//\r
232// Global Descriptor Table (GDT)\r
233//\r
234GLOBAL_REMOVE_IF_UNREFERENCED IA32_GDT mGdtEntries[] = {\r
235/* selector { Global Segment Descriptor } */\r
236/* 0x00 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},\r
237/* 0x08 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},\r
238/* 0x10 */ {{0xFFFF, 0, 0, 0xB, 1, 0, 1, 0xF, 0, 0, 1, 1, 0}},\r
239/* 0x18 */ {{0xFFFF, 0, 0, 0x3, 1, 0, 1, 0xF, 0, 0, 1, 1, 0}},\r
240/* 0x20 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},\r
241/* 0x28 */ {{0xFFFF, 0, 0, 0xB, 1, 0, 1, 0xF, 0, 0, 0, 1, 0}},\r
242/* 0x30 */ {{0xFFFF, 0, 0, 0x3, 1, 0, 1, 0xF, 0, 0, 0, 1, 0}},\r
243/* 0x38 */ {{0xFFFF, 0, 0, 0xB, 1, 0, 1, 0xF, 0, 1, 0, 1, 0}},\r
244/* 0x40 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},\r
245};\r
246\r
abef469f 247#define DATA_SEGEMENT_SELECTOR 0x18\r
248\r
1f569620 249//\r
250// IA32 Gdt register\r
251//\r
252GLOBAL_REMOVE_IF_UNREFERENCED CONST IA32_DESCRIPTOR mGdt = {\r
253 sizeof (mGdtEntries) - 1,\r
254 (UINTN) mGdtEntries\r
255 };\r
256\r
257/**\r
258 Performance measure function to get S3 detailed performance data.\r
259\r
260 This function will getS3 detailed performance data and saved in pre-reserved ACPI memory.\r
261**/\r
262VOID\r
263WriteToOsS3PerformanceData (\r
264 VOID\r
265 )\r
266{\r
267 EFI_STATUS Status;\r
268 EFI_PHYSICAL_ADDRESS mAcpiLowMemoryBase;\r
269 PERF_HEADER *PerfHeader;\r
270 PERF_DATA *PerfData;\r
271 UINT64 Ticker;\r
272 UINTN Index;\r
273 EFI_PEI_READ_ONLY_VARIABLE2_PPI *VariableServices;\r
274 UINTN VarSize;\r
275 UINTN LogEntryKey;\r
276 CONST VOID *Handle;\r
277 CONST CHAR8 *Token;\r
278 CONST CHAR8 *Module;\r
279 UINT64 StartTicker;\r
280 UINT64 EndTicker;\r
281 UINT64 StartValue;\r
282 UINT64 EndValue;\r
283 BOOLEAN CountUp;\r
284 UINT64 Freq;\r
285\r
286 //\r
287 // Retrive time stamp count as early as possilbe\r
288 //\r
289 Ticker = GetPerformanceCounter ();\r
290\r
291 Freq = GetPerformanceCounterProperties (&StartValue, &EndValue);\r
292\r
293 Freq = DivU64x32 (Freq, 1000);\r
294\r
295 Status = PeiServicesLocatePpi (\r
296 &gEfiPeiReadOnlyVariable2PpiGuid,\r
297 0,\r
298 NULL,\r
299 (VOID **) &VariableServices\r
300 );\r
40ef06fc
SZ
301 if (EFI_ERROR (Status)) {\r
302 return;\r
303 }\r
1f569620 304\r
305 VarSize = sizeof (EFI_PHYSICAL_ADDRESS);\r
306 Status = VariableServices->GetVariable (\r
307 VariableServices,\r
308 L"PerfDataMemAddr",\r
309 &gPerformanceProtocolGuid,\r
310 NULL,\r
311 &VarSize,\r
312 &mAcpiLowMemoryBase\r
313 );\r
314 if (EFI_ERROR (Status)) {\r
315 DEBUG ((EFI_D_ERROR, "Fail to retrieve variable to log S3 performance data \n"));\r
316 return;\r
317 }\r
318\r
319 PerfHeader = (PERF_HEADER *) (UINTN) mAcpiLowMemoryBase;\r
320\r
321 if (PerfHeader->Signiture != PERFORMANCE_SIGNATURE) {\r
322 DEBUG ((EFI_D_ERROR, "Performance data in ACPI memory get corrupted! \n"));\r
323 return;\r
324 }\r
325\r
326 //\r
327 // Record total S3 resume time.\r
328 //\r
329 if (EndValue >= StartValue) {\r
330 PerfHeader->S3Resume = Ticker - StartValue;\r
331 CountUp = TRUE;\r
332 } else {\r
333 PerfHeader->S3Resume = StartValue - Ticker;\r
334 CountUp = FALSE;\r
335 }\r
336\r
337 //\r
338 // Get S3 detailed performance data\r
339 //\r
340 Index = 0;\r
341 LogEntryKey = 0;\r
342 while ((LogEntryKey = GetPerformanceMeasurement (\r
343 LogEntryKey,\r
344 &Handle,\r
345 &Token,\r
346 &Module,\r
347 &StartTicker,\r
348 &EndTicker)) != 0) {\r
349 if (EndTicker != 0) {\r
350 PerfData = &PerfHeader->S3Entry[Index];\r
351\r
352 //\r
353 // Use File Handle to specify the different performance log for PEIM.\r
354 // File Handle is the base address of PEIM FFS file.\r
355 //\r
356 if ((AsciiStrnCmp (Token, "PEIM", PEI_PERFORMANCE_STRING_SIZE) == 0) && (Handle != NULL)) {\r
357 AsciiSPrint (PerfData->Token, PERF_TOKEN_LENGTH, "0x%11p", Handle);\r
358 } else {\r
359 AsciiStrnCpy (PerfData->Token, Token, PERF_TOKEN_LENGTH);\r
360 }\r
361 if (StartTicker == 1) {\r
362 StartTicker = StartValue;\r
363 }\r
364 if (EndTicker == 1) {\r
365 EndTicker = StartValue;\r
366 }\r
367 Ticker = CountUp? (EndTicker - StartTicker) : (StartTicker - EndTicker);\r
368 PerfData->Duration = (UINT32) DivU64x32 (Ticker, (UINT32) Freq);\r
369\r
370 //\r
371 // Only Record > 1ms performance data so that more big performance can be recorded.\r
372 //\r
373 if ((Ticker > Freq) && (++Index >= PERF_PEI_ENTRY_MAX_NUM)) {\r
374 //\r
375 // Reach the maximum number of PEI performance log entries.\r
376 //\r
377 break;\r
378 }\r
379 }\r
380 }\r
381 PerfHeader->S3EntryNum = (UINT32) Index;\r
382}\r
383\r
d0bf5623
JY
384/**\r
385 The function will check if current waking vector is long mode.\r
386\r
387 @param AcpiS3Context a pointer to a structure of ACPI_S3_CONTEXT\r
388\r
389 @retval TRUE Current context need long mode waking vector.\r
390 @retval FALSE Current context need not long mode waking vector.\r
391**/\r
392BOOLEAN\r
393IsLongModeWakingVector (\r
394 IN ACPI_S3_CONTEXT *AcpiS3Context\r
395 )\r
396{\r
397 EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *Facs;\r
398\r
399 Facs = (EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *) ((UINTN) (AcpiS3Context->AcpiFacsTable));\r
400 if ((Facs == NULL) ||\r
401 (Facs->Signature != EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_SIGNATURE) ||\r
402 ((Facs->FirmwareWakingVector == 0) && (Facs->XFirmwareWakingVector == 0)) ) {\r
403 // Something wrong with FACS\r
404 return FALSE;\r
405 }\r
406 if (Facs->XFirmwareWakingVector != 0) {\r
407 if ((Facs->Version == EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_VERSION) &&\r
408 ((Facs->Flags & EFI_ACPI_4_0_64BIT_WAKE_SUPPORTED_F) != 0) &&\r
409 ((Facs->Flags & EFI_ACPI_4_0_OSPM_64BIT_WAKE__F) != 0)) {\r
410 // Both BIOS and OS wants 64bit vector\r
411 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {\r
412 return TRUE;\r
413 }\r
414 }\r
415 }\r
416 return FALSE;\r
417}\r
418\r
1f569620 419/**\r
420 Jump to OS waking vector.\r
421 The function will install boot script done PPI, report S3 resume status code, and then jump to OS waking vector.\r
422\r
423 @param AcpiS3Context a pointer to a structure of ACPI_S3_CONTEXT\r
424 @param PeiS3ResumeState a pointer to a structure of PEI_S3_RESUME_STATE\r
425**/\r
426VOID\r
427EFIAPI\r
428S3ResumeBootOs (\r
429 IN ACPI_S3_CONTEXT *AcpiS3Context,\r
430 IN PEI_S3_RESUME_STATE *PeiS3ResumeState\r
431 )\r
432{\r
433 EFI_STATUS Status;\r
434 EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *Facs;\r
435 ASM_TRANSFER_CONTROL AsmTransferControl;\r
436 UINTN TempStackTop;\r
437 UINTN TempStack[0x10];\r
438\r
439 //\r
440 // Restore IDT\r
441 //\r
442 AsmWriteIdtr (&PeiS3ResumeState->Idtr);\r
443\r
f6d5cbe7 444 if (PeiS3ResumeState->ReturnStatus != EFI_SUCCESS) {\r
445 //\r
446 // Report Status code that boot script execution is failed\r
447 //\r
448 REPORT_STATUS_CODE (\r
449 EFI_ERROR_CODE | EFI_ERROR_MINOR,\r
450 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_BOOT_SCRIPT_ERROR)\r
451 );\r
452 }\r
453\r
f5c941b1 454 //\r
455 // NOTE: Because Debug Timer interrupt and system interrupts will be disabled \r
456 // in BootScriptExecuteDxe, the rest code in S3ResumeBootOs() cannot be halted\r
457 // by soft debugger.\r
458 //\r
459\r
5c0687cc
SZ
460 PERF_END (NULL, "ScriptExec", NULL, 0);\r
461\r
1f569620 462 //\r
463 // Install BootScriptDonePpi\r
464 //\r
465 Status = PeiServicesInstallPpi (&mPpiListPostScriptTable);\r
466 ASSERT_EFI_ERROR (Status);\r
467\r
468 //\r
469 // Get ACPI Table Address\r
470 //\r
471 Facs = (EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *) ((UINTN) (AcpiS3Context->AcpiFacsTable));\r
472\r
473 if ((Facs == NULL) ||\r
474 (Facs->Signature != EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_SIGNATURE) ||\r
475 ((Facs->FirmwareWakingVector == 0) && (Facs->XFirmwareWakingVector == 0)) ) {\r
f6d5cbe7 476 //\r
477 // Report Status code that no valid vector is found\r
478 //\r
479 REPORT_STATUS_CODE (\r
480 EFI_ERROR_CODE | EFI_ERROR_MAJOR,\r
481 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR)\r
482 );\r
1f569620 483 CpuDeadLoop ();\r
484 return ;\r
485 }\r
486\r
1f569620 487 //\r
488 // Install EndOfPeiPpi\r
489 //\r
490 Status = PeiServicesInstallPpi (&mPpiListEndOfPeiTable);\r
491 ASSERT_EFI_ERROR (Status);\r
492\r
26c0ba77
SZ
493 //\r
494 // report status code on S3 resume\r
495 //\r
496 REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_OS_WAKE);\r
497\r
1f569620 498 PERF_CODE (\r
499 WriteToOsS3PerformanceData ();\r
500 );\r
501\r
502 AsmTransferControl = (ASM_TRANSFER_CONTROL)(UINTN)PeiS3ResumeState->AsmTransferControl;\r
503 if (Facs->XFirmwareWakingVector != 0) {\r
504 //\r
505 // Switch to native waking vector\r
506 //\r
507 TempStackTop = (UINTN)&TempStack + sizeof(TempStack);\r
508 if ((Facs->Version == EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_VERSION) &&\r
509 ((Facs->Flags & EFI_ACPI_4_0_64BIT_WAKE_SUPPORTED_F) != 0) &&\r
510 ((Facs->Flags & EFI_ACPI_4_0_OSPM_64BIT_WAKE__F) != 0)) {\r
511 //\r
512 // X64 long mode waking vector\r
513 //\r
514 DEBUG (( EFI_D_ERROR, "Transfer to 64bit OS waking vector - %x\r\n", (UINTN)Facs->XFirmwareWakingVector));\r
515 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {\r
516 AsmEnablePaging64 (\r
517 0x38,\r
518 Facs->XFirmwareWakingVector,\r
519 0,\r
520 0,\r
521 (UINT64)(UINTN)TempStackTop\r
522 );\r
523 } else {\r
f6d5cbe7 524 //\r
525 // Report Status code that no valid waking vector is found\r
526 //\r
527 REPORT_STATUS_CODE (\r
528 EFI_ERROR_CODE | EFI_ERROR_MAJOR,\r
529 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR)\r
530 );\r
1f569620 531 DEBUG (( EFI_D_ERROR, "Unsupported for 32bit DXE transfer to 64bit OS waking vector!\r\n"));\r
532 ASSERT (FALSE);\r
f6d5cbe7 533 CpuDeadLoop ();\r
534 return ;\r
1f569620 535 }\r
536 } else {\r
537 //\r
538 // IA32 protected mode waking vector (Page disabled)\r
539 //\r
540 DEBUG (( EFI_D_ERROR, "Transfer to 32bit OS waking vector - %x\r\n", (UINTN)Facs->XFirmwareWakingVector));\r
541 SwitchStack (\r
542 (SWITCH_STACK_ENTRY_POINT) (UINTN) Facs->XFirmwareWakingVector,\r
543 NULL,\r
544 NULL,\r
545 (VOID *)(UINTN)TempStackTop\r
546 );\r
547 }\r
548 } else {\r
549 //\r
550 // 16bit Realmode waking vector\r
551 //\r
552 DEBUG (( EFI_D_ERROR, "Transfer to 16bit OS waking vector - %x\r\n", (UINTN)Facs->FirmwareWakingVector));\r
553 AsmTransferControl (Facs->FirmwareWakingVector, 0x0);\r
554 }\r
555\r
f6d5cbe7 556 //\r
557 // Report Status code the failure of S3Resume\r
558 //\r
559 REPORT_STATUS_CODE (\r
560 EFI_ERROR_CODE | EFI_ERROR_MAJOR,\r
561 (EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_EC_S3_OS_WAKE_ERROR)\r
562 );\r
563\r
1f569620 564 //\r
565 // Never run to here\r
566 //\r
567 CpuDeadLoop();\r
568}\r
569\r
570/**\r
571 Restore S3 page table because we do not trust ACPINvs content.\r
572 If BootScriptExector driver will not run in 64-bit mode, this function will do nothing. \r
573\r
574 @param S3NvsPageTableAddress PageTableAddress in ACPINvs\r
d0bf5623 575 @param Build4GPageTableOnly If BIOS just build 4G page table only\r
1f569620 576**/\r
577VOID\r
578RestoreS3PageTables (\r
d0bf5623
JY
579 IN UINTN S3NvsPageTableAddress,\r
580 IN BOOLEAN Build4GPageTableOnly\r
1f569620 581 )\r
582{\r
583 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {\r
584 UINT32 RegEax;\r
c56b6566 585 UINT32 RegEdx;\r
1f569620 586 UINT8 PhysicalAddressBits;\r
587 EFI_PHYSICAL_ADDRESS PageAddress;\r
588 UINTN IndexOfPml4Entries;\r
589 UINTN IndexOfPdpEntries;\r
590 UINTN IndexOfPageDirectoryEntries;\r
c56b6566
JY
591 UINT32 NumberOfPml4EntriesNeeded;\r
592 UINT32 NumberOfPdpEntriesNeeded;\r
1f569620 593 PAGE_MAP_AND_DIRECTORY_POINTER *PageMapLevel4Entry;\r
594 PAGE_MAP_AND_DIRECTORY_POINTER *PageMap;\r
595 PAGE_MAP_AND_DIRECTORY_POINTER *PageDirectoryPointerEntry;\r
596 PAGE_TABLE_ENTRY *PageDirectoryEntry;\r
c56b6566
JY
597 VOID *Hob;\r
598 BOOLEAN Page1GSupport;\r
599 PAGE_TABLE_1G_ENTRY *PageDirectory1GEntry;\r
1f569620 600\r
601 //\r
602 // NOTE: We have to ASSUME the page table generation format, because we do not know whole page table information.\r
603 // The whole page table is too large to be saved in SMRAM.\r
604 //\r
605 // The assumption is : whole page table is allocated in CONTINOUS memory and CR3 points to TOP page.\r
606 //\r
d0bf5623 607 DEBUG ((EFI_D_ERROR, "S3NvsPageTableAddress - %x (%x)\n", (UINTN)S3NvsPageTableAddress, (UINTN)Build4GPageTableOnly));\r
1f569620 608\r
609 //\r
610 // By architecture only one PageMapLevel4 exists - so lets allocate storgage for it.\r
611 //\r
612 PageMap = (PAGE_MAP_AND_DIRECTORY_POINTER *)S3NvsPageTableAddress;\r
613 S3NvsPageTableAddress += SIZE_4KB;\r
614 \r
c56b6566 615 Page1GSupport = FALSE;\r
378175d2
JY
616 if (PcdGetBool(PcdUse1GPageTable)) {\r
617 AsmCpuid (0x80000000, &RegEax, NULL, NULL, NULL);\r
618 if (RegEax >= 0x80000001) {\r
619 AsmCpuid (0x80000001, NULL, NULL, NULL, &RegEdx);\r
620 if ((RegEdx & BIT26) != 0) {\r
621 Page1GSupport = TRUE;\r
622 }\r
c56b6566
JY
623 }\r
624 }\r
625 \r
1f569620 626 //\r
627 // Get physical address bits supported.\r
628 //\r
c56b6566
JY
629 Hob = GetFirstHob (EFI_HOB_TYPE_CPU);\r
630 if (Hob != NULL) {\r
631 PhysicalAddressBits = ((EFI_HOB_CPU *) Hob)->SizeOfMemorySpace;\r
1f569620 632 } else {\r
c56b6566
JY
633 AsmCpuid (0x80000000, &RegEax, NULL, NULL, NULL);\r
634 if (RegEax >= 0x80000008) {\r
635 AsmCpuid (0x80000008, &RegEax, NULL, NULL, NULL);\r
636 PhysicalAddressBits = (UINT8) RegEax;\r
637 } else {\r
638 PhysicalAddressBits = 36;\r
639 }\r
1f569620 640 }\r
641 \r
c56b6566
JY
642 //\r
643 // IA-32e paging translates 48-bit linear addresses to 52-bit physical addresses.\r
644 //\r
645 ASSERT (PhysicalAddressBits <= 52);\r
646 if (PhysicalAddressBits > 48) {\r
647 PhysicalAddressBits = 48;\r
648 }\r
649\r
d0bf5623
JY
650 //\r
651 // NOTE: In order to save time to create full page table, we just create 4G page table by default.\r
652 // And let PF handler in BootScript driver to create more on request.\r
653 //\r
654 if (Build4GPageTableOnly) {\r
655 PhysicalAddressBits = 32;\r
656 ZeroMem (PageMap, EFI_PAGES_TO_SIZE(2));\r
657 }\r
1f569620 658 //\r
659 // Calculate the table entries needed.\r
660 //\r
661 if (PhysicalAddressBits <= 39) {\r
662 NumberOfPml4EntriesNeeded = 1;\r
c56b6566 663 NumberOfPdpEntriesNeeded = (UINT32)LShiftU64 (1, (PhysicalAddressBits - 30));\r
1f569620 664 } else {\r
c56b6566 665 NumberOfPml4EntriesNeeded = (UINT32)LShiftU64 (1, (PhysicalAddressBits - 39));\r
1f569620 666 NumberOfPdpEntriesNeeded = 512;\r
667 }\r
668 \r
669 PageMapLevel4Entry = PageMap;\r
670 PageAddress = 0;\r
671 for (IndexOfPml4Entries = 0; IndexOfPml4Entries < NumberOfPml4EntriesNeeded; IndexOfPml4Entries++, PageMapLevel4Entry++) {\r
672 //\r
673 // Each PML4 entry points to a page of Page Directory Pointer entires.\r
674 // So lets allocate space for them and fill them in in the IndexOfPdpEntries loop.\r
675 //\r
676 PageDirectoryPointerEntry = (PAGE_MAP_AND_DIRECTORY_POINTER *)S3NvsPageTableAddress;\r
677 S3NvsPageTableAddress += SIZE_4KB;\r
678 \r
679 //\r
680 // Make a PML4 Entry\r
681 //\r
682 PageMapLevel4Entry->Uint64 = (UINT64)(UINTN)PageDirectoryPointerEntry;\r
683 PageMapLevel4Entry->Bits.ReadWrite = 1;\r
684 PageMapLevel4Entry->Bits.Present = 1;\r
c56b6566
JY
685\r
686 if (Page1GSupport) {\r
54d3b84e 687 PageDirectory1GEntry = (VOID *) PageDirectoryPointerEntry;\r
1f569620 688 \r
c56b6566 689 for (IndexOfPageDirectoryEntries = 0; IndexOfPageDirectoryEntries < 512; IndexOfPageDirectoryEntries++, PageDirectory1GEntry++, PageAddress += SIZE_1GB) {\r
1f569620 690 //\r
691 // Fill in the Page Directory entries\r
692 //\r
c56b6566
JY
693 PageDirectory1GEntry->Uint64 = (UINT64)PageAddress;\r
694 PageDirectory1GEntry->Bits.ReadWrite = 1;\r
695 PageDirectory1GEntry->Bits.Present = 1;\r
696 PageDirectory1GEntry->Bits.MustBe1 = 1;\r
697 }\r
698 } else {\r
699 for (IndexOfPdpEntries = 0; IndexOfPdpEntries < NumberOfPdpEntriesNeeded; IndexOfPdpEntries++, PageDirectoryPointerEntry++) {\r
700 //\r
701 // Each Directory Pointer entries points to a page of Page Directory entires.\r
702 // So allocate space for them and fill them in in the IndexOfPageDirectoryEntries loop.\r
703 // \r
704 PageDirectoryEntry = (PAGE_TABLE_ENTRY *)S3NvsPageTableAddress;\r
705 S3NvsPageTableAddress += SIZE_4KB;\r
706 \r
707 //\r
708 // Fill in a Page Directory Pointer Entries\r
709 //\r
710 PageDirectoryPointerEntry->Uint64 = (UINT64)(UINTN)PageDirectoryEntry;\r
711 PageDirectoryPointerEntry->Bits.ReadWrite = 1;\r
712 PageDirectoryPointerEntry->Bits.Present = 1;\r
713 \r
714 for (IndexOfPageDirectoryEntries = 0; IndexOfPageDirectoryEntries < 512; IndexOfPageDirectoryEntries++, PageDirectoryEntry++, PageAddress += SIZE_2MB) {\r
715 //\r
716 // Fill in the Page Directory entries\r
717 //\r
718 PageDirectoryEntry->Uint64 = (UINT64)PageAddress;\r
719 PageDirectoryEntry->Bits.ReadWrite = 1;\r
720 PageDirectoryEntry->Bits.Present = 1;\r
721 PageDirectoryEntry->Bits.MustBe1 = 1;\r
722 }\r
1f569620 723 }\r
724 }\r
725 }\r
726 return ;\r
727 } else {\r
728 //\r
729 // If DXE is running 32-bit mode, no need to establish page table.\r
730 //\r
731 return ;\r
732 }\r
733}\r
734\r
735/**\r
736 Jump to boot script executor driver.\r
737\r
738 The function will close and lock SMRAM and then jump to boot script execute driver to executing S3 boot script table.\r
739\r
740 @param AcpiS3Context a pointer to a structure of ACPI_S3_CONTEXT\r
741 @param EfiBootScriptExecutorVariable The function entry to executing S3 boot Script table. This function is build in\r
742 boot script execute driver\r
743**/\r
744VOID\r
745EFIAPI\r
746S3ResumeExecuteBootScript (\r
747 IN ACPI_S3_CONTEXT *AcpiS3Context,\r
748 IN BOOT_SCRIPT_EXECUTOR_VARIABLE *EfiBootScriptExecutorVariable\r
749 )\r
750{\r
751 EFI_STATUS Status;\r
752 PEI_SMM_ACCESS_PPI *SmmAccess;\r
753 UINTN Index;\r
754 VOID *GuidHob;\r
755 IA32_DESCRIPTOR *IdtDescriptor;\r
756 VOID *IdtBuffer;\r
757 PEI_S3_RESUME_STATE *PeiS3ResumeState;\r
abef469f 758 BOOLEAN InterruptStatus;\r
1f569620 759\r
760 DEBUG ((EFI_D_ERROR, "S3ResumeExecuteBootScript()\n"));\r
761\r
762 //\r
763 // Attempt to use content from SMRAM first\r
764 //\r
765 GuidHob = GetFirstGuidHob (&gEfiAcpiVariableGuid);\r
766 if (GuidHob != NULL) {\r
767 //\r
768 // Last step for SMM - send SMI for initialization\r
769 //\r
770\r
771 //\r
772 // Send SMI to APs\r
773 // \r
774 SendSmiIpiAllExcludingSelf ();\r
775 //\r
776 // Send SMI to BSP\r
777 //\r
778 SendSmiIpi (GetApicId ());\r
779\r
780 Status = PeiServicesLocatePpi (\r
781 &gPeiSmmAccessPpiGuid,\r
782 0,\r
783 NULL,\r
784 (VOID **) &SmmAccess\r
785 );\r
40ef06fc
SZ
786 if (!EFI_ERROR (Status)) {\r
787 DEBUG ((EFI_D_ERROR, "Close all SMRAM regions before executing boot script\n"));\r
788 \r
789 for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) {\r
790 Status = SmmAccess->Close ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);\r
791 }\r
1f569620 792\r
40ef06fc
SZ
793 DEBUG ((EFI_D_ERROR, "Lock all SMRAM regions before executing boot script\n"));\r
794 \r
795 for (Index = 0, Status = EFI_SUCCESS; !EFI_ERROR (Status); Index++) {\r
796 Status = SmmAccess->Lock ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);\r
797 }\r
1f569620 798 }\r
799 }\r
800\r
801 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {\r
1f569620 802 AsmWriteCr3 ((UINTN)AcpiS3Context->S3NvsPageTableAddress);\r
803 }\r
804\r
805 if (FeaturePcdGet (PcdFrameworkCompatibilitySupport)) {\r
806 //\r
807 // On some platform, such as ECP, a dispatch node in boot script table may execute a 32-bit PEIM which may need PeiServices\r
808 // pointer. So PeiServices need preserve in (IDTBase- sizeof (UINTN)). \r
809 //\r
810 IdtDescriptor = (IA32_DESCRIPTOR *) (UINTN) (AcpiS3Context->IdtrProfile);\r
811 //\r
812 // Make sure the newly allcated IDT align with 16-bytes\r
813 // \r
814 IdtBuffer = AllocatePages (EFI_SIZE_TO_PAGES((IdtDescriptor->Limit + 1) + 16));\r
815 ASSERT (IdtBuffer != NULL);\r
e47459e6 816 //\r
817 // Additional 16 bytes allocated to save IA32 IDT descriptor and Pei Service Table Pointer\r
818 // IA32 IDT descriptor will be used to setup IA32 IDT table for 32-bit Framework Boot Script code\r
819 // \r
820 ZeroMem (IdtBuffer, 16);\r
821 AsmReadIdtr ((IA32_DESCRIPTOR *)IdtBuffer);\r
1f569620 822 CopyMem ((VOID*)((UINT8*)IdtBuffer + 16),(VOID*)(IdtDescriptor->Base), (IdtDescriptor->Limit + 1));\r
823 IdtDescriptor->Base = (UINTN)((UINT8*)IdtBuffer + 16);\r
824 *(UINTN*)(IdtDescriptor->Base - sizeof(UINTN)) = (UINTN)GetPeiServicesTablePointer ();\r
825 }\r
826\r
abef469f 827 InterruptStatus = SaveAndDisableInterrupts ();\r
1f569620 828 //\r
829 // Need to make sure the GDT is loaded with values that support long mode and real mode.\r
830 //\r
831 AsmWriteGdtr (&mGdt);\r
abef469f 832 //\r
833 // update segment selectors per the new GDT.\r
834 //\r
835 AsmSetDataSelectors (DATA_SEGEMENT_SELECTOR);\r
836 //\r
837 // Restore interrupt state.\r
838 //\r
839 SetInterruptState (InterruptStatus);\r
1f569620 840\r
841 //\r
842 // Prepare data for return back\r
843 //\r
844 PeiS3ResumeState = AllocatePool (sizeof(*PeiS3ResumeState));\r
845 ASSERT (PeiS3ResumeState != NULL);\r
846 DEBUG (( EFI_D_ERROR, "PeiS3ResumeState - %x\r\n", PeiS3ResumeState));\r
847 PeiS3ResumeState->ReturnCs = 0x10;\r
848 PeiS3ResumeState->ReturnEntryPoint = (EFI_PHYSICAL_ADDRESS)(UINTN)S3ResumeBootOs;\r
849 PeiS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)(UINTN)&Status;\r
850 //\r
851 // Save IDT\r
852 //\r
853 AsmReadIdtr (&PeiS3ResumeState->Idtr);\r
f6d5cbe7 854 \r
855 //\r
856 // Report Status Code to indicate S3 boot script execution\r
857 //\r
858 REPORT_STATUS_CODE (EFI_PROGRESS_CODE, EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_PC_S3_BOOT_SCRIPT);\r
1f569620 859\r
5c0687cc
SZ
860 PERF_START (NULL, "ScriptExec", NULL, 0);\r
861\r
1f569620 862 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {\r
863 //\r
864 // X64 S3 Resume\r
865 //\r
866 DEBUG (( EFI_D_ERROR, "Enable X64 and transfer control to Standalone Boot Script Executor\r\n"));\r
867\r
868 //\r
869 // Switch to long mode to complete resume.\r
870 //\r
871 AsmEnablePaging64 (\r
872 0x38,\r
873 EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint,\r
874 (UINT64)(UINTN)AcpiS3Context,\r
875 (UINT64)(UINTN)PeiS3ResumeState,\r
876 (UINT64)(UINTN)(AcpiS3Context->BootScriptStackBase + AcpiS3Context->BootScriptStackSize)\r
877 );\r
878 } else {\r
879 //\r
880 // IA32 S3 Resume\r
881 //\r
882 DEBUG (( EFI_D_ERROR, "transfer control to Standalone Boot Script Executor\r\n"));\r
883 SwitchStack (\r
884 (SWITCH_STACK_ENTRY_POINT) (UINTN) EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint,\r
885 (VOID *)AcpiS3Context,\r
886 (VOID *)PeiS3ResumeState,\r
887 (VOID *)(UINTN)(AcpiS3Context->BootScriptStackBase + AcpiS3Context->BootScriptStackSize)\r
888 );\r
889 }\r
890\r
891 //\r
892 // Never run to here\r
893 //\r
894 CpuDeadLoop();\r
895}\r
896/**\r
897 Restores the platform to its preboot configuration for an S3 resume and\r
898 jumps to the OS waking vector.\r
899\r
900 This function will restore the platform to its pre-boot configuration that was\r
901 pre-stored in the boot script table and transfer control to OS waking vector.\r
902 Upon invocation, this function is responsible for locating the following\r
903 information before jumping to OS waking vector:\r
904 - ACPI tables\r
905 - boot script table\r
906 - any other information that it needs\r
907\r
908 The S3RestoreConfig() function then executes the pre-stored boot script table\r
909 and transitions the platform to the pre-boot state. The boot script is recorded\r
910 during regular boot using the EFI_S3_SAVE_STATE_PROTOCOL.Write() and\r
911 EFI_S3_SMM_SAVE_STATE_PROTOCOL.Write() functions. Finally, this function\r
912 transfers control to the OS waking vector. If the OS supports only a real-mode\r
913 waking vector, this function will switch from flat mode to real mode before\r
914 jumping to the waking vector. If all platform pre-boot configurations are\r
915 successfully restored and all other necessary information is ready, this\r
916 function will never return and instead will directly jump to the OS waking\r
917 vector. If this function returns, it indicates that the attempt to resume\r
918 from the ACPI S3 sleep state failed.\r
919\r
920 @param[in] This Pointer to this instance of the PEI_S3_RESUME_PPI\r
921\r
922 @retval EFI_ABORTED Execution of the S3 resume boot script table failed.\r
923 @retval EFI_NOT_FOUND Some necessary information that is used for the S3\r
924 resume boot path could not be located.\r
925\r
926**/\r
927EFI_STATUS\r
928EFIAPI\r
929S3RestoreConfig2 (\r
930 IN EFI_PEI_S3_RESUME2_PPI *This\r
931 )\r
932{\r
933 EFI_STATUS Status;\r
934 PEI_SMM_ACCESS_PPI *SmmAccess;\r
935 UINTN Index;\r
936 ACPI_S3_CONTEXT *AcpiS3Context;\r
1f569620 937 EFI_PHYSICAL_ADDRESS TempEfiBootScriptExecutorVariable;\r
938 EFI_PHYSICAL_ADDRESS TempAcpiS3Context;\r
939 BOOT_SCRIPT_EXECUTOR_VARIABLE *EfiBootScriptExecutorVariable;\r
940 UINTN VarSize;\r
941 EFI_SMRAM_DESCRIPTOR *SmramDescriptor;\r
942 SMM_S3_RESUME_STATE *SmmS3ResumeState;\r
943 VOID *GuidHob;\r
d0bf5623 944 BOOLEAN Build4GPageTableOnly;\r
abef469f 945 BOOLEAN InterruptStatus;\r
1f569620 946\r
48ee8e3e
SZ
947 TempAcpiS3Context = 0;\r
948 TempEfiBootScriptExecutorVariable = 0;\r
949\r
1f569620 950 DEBUG ((EFI_D_ERROR, "Enter S3 PEIM\r\n"));\r
951\r
1f569620 952 VarSize = sizeof (EFI_PHYSICAL_ADDRESS);\r
953 Status = RestoreLockBox (\r
954 &gEfiAcpiVariableGuid,\r
955 &TempAcpiS3Context,\r
956 &VarSize\r
957 );\r
958 ASSERT_EFI_ERROR (Status);\r
959\r
1f569620 960 Status = RestoreLockBox (\r
961 &gEfiAcpiS3ContextGuid,\r
962 NULL,\r
963 NULL\r
964 );\r
965 ASSERT_EFI_ERROR (Status);\r
966\r
48ee8e3e
SZ
967 AcpiS3Context = (ACPI_S3_CONTEXT *)(UINTN)TempAcpiS3Context;\r
968 ASSERT (AcpiS3Context != NULL);\r
969\r
970 VarSize = sizeof (EFI_PHYSICAL_ADDRESS);\r
1f569620 971 Status = RestoreLockBox (\r
972 &gEfiBootScriptExecutorVariableGuid,\r
973 &TempEfiBootScriptExecutorVariable,\r
974 &VarSize\r
975 );\r
976 ASSERT_EFI_ERROR (Status);\r
977\r
978 Status = RestoreLockBox (\r
979 &gEfiBootScriptExecutorContextGuid,\r
980 NULL,\r
981 NULL\r
982 );\r
983 ASSERT_EFI_ERROR (Status);\r
984\r
985 EfiBootScriptExecutorVariable = (BOOT_SCRIPT_EXECUTOR_VARIABLE *) (UINTN) TempEfiBootScriptExecutorVariable;\r
48ee8e3e 986 ASSERT (EfiBootScriptExecutorVariable != NULL);\r
1f569620 987\r
988 DEBUG (( EFI_D_ERROR, "AcpiS3Context = %x\n", AcpiS3Context));\r
989 DEBUG (( EFI_D_ERROR, "Waking Vector = %x\n", ((EFI_ACPI_2_0_FIRMWARE_ACPI_CONTROL_STRUCTURE *) ((UINTN) (AcpiS3Context->AcpiFacsTable)))->FirmwareWakingVector));\r
990 DEBUG (( EFI_D_ERROR, "AcpiS3Context->AcpiFacsTable = %x\n", AcpiS3Context->AcpiFacsTable));\r
991 DEBUG (( EFI_D_ERROR, "AcpiS3Context->S3NvsPageTableAddress = %x\n", AcpiS3Context->S3NvsPageTableAddress));\r
992 DEBUG (( EFI_D_ERROR, "AcpiS3Context->S3DebugBufferAddress = %x\n", AcpiS3Context->S3DebugBufferAddress));\r
993 DEBUG (( EFI_D_ERROR, "EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint = %x\n", EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint));\r
994\r
995 //\r
996 // Additional step for BootScript integrity - we only handle BootScript and BootScriptExecutor.\r
997 // Script dispatch image and context (parameter) are handled by platform.\r
998 // We just use restore all lock box in place, no need restore one by one.\r
999 //\r
1000 Status = RestoreAllLockBoxInPlace ();\r
1001 ASSERT_EFI_ERROR (Status);\r
1002 if (EFI_ERROR (Status)) {\r
1003 // Something wrong\r
1004 CpuDeadLoop ();\r
1005 }\r
1006\r
3a69f7cb 1007 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode)) {\r
1008 //\r
1009 // Need reconstruct page table here, since we do not trust ACPINvs.\r
1010 //\r
d0bf5623
JY
1011 if (IsLongModeWakingVector (AcpiS3Context)) {\r
1012 Build4GPageTableOnly = FALSE;\r
1013 } else {\r
1014 Build4GPageTableOnly = TRUE;\r
1015 }\r
1016 RestoreS3PageTables ((UINTN)AcpiS3Context->S3NvsPageTableAddress, Build4GPageTableOnly);\r
3a69f7cb 1017 }\r
1018\r
1f569620 1019 //\r
1020 // Attempt to use content from SMRAM first\r
1021 //\r
1022 GuidHob = GetFirstGuidHob (&gEfiAcpiVariableGuid);\r
1023 if (GuidHob != NULL) {\r
40ef06fc
SZ
1024 Status = PeiServicesLocatePpi (\r
1025 &gPeiSmmAccessPpiGuid,\r
1026 0,\r
1027 NULL,\r
1028 (VOID **) &SmmAccess\r
1029 );\r
1030 for (Index = 0; !EFI_ERROR (Status); Index++) {\r
1031 Status = SmmAccess->Open ((EFI_PEI_SERVICES **)GetPeiServicesTablePointer (), SmmAccess, Index);\r
1032 }\r
1033\r
1f569620 1034 SmramDescriptor = (EFI_SMRAM_DESCRIPTOR *) GET_GUID_HOB_DATA (GuidHob);\r
1035 SmmS3ResumeState = (SMM_S3_RESUME_STATE *)(UINTN)SmramDescriptor->CpuStart;\r
1036\r
1037 SmmS3ResumeState->ReturnCs = AsmReadCs ();\r
1038 SmmS3ResumeState->ReturnEntryPoint = (EFI_PHYSICAL_ADDRESS)(UINTN)S3ResumeExecuteBootScript;\r
1039 SmmS3ResumeState->ReturnContext1 = (EFI_PHYSICAL_ADDRESS)(UINTN)AcpiS3Context;\r
1040 SmmS3ResumeState->ReturnContext2 = (EFI_PHYSICAL_ADDRESS)(UINTN)EfiBootScriptExecutorVariable;\r
1041 SmmS3ResumeState->ReturnStackPointer = (EFI_PHYSICAL_ADDRESS)(UINTN)&Status;\r
1042\r
1043 DEBUG (( EFI_D_ERROR, "SMM S3 Signature = %x\n", SmmS3ResumeState->Signature));\r
1044 DEBUG (( EFI_D_ERROR, "SMM S3 Stack Base = %x\n", SmmS3ResumeState->SmmS3StackBase));\r
1045 DEBUG (( EFI_D_ERROR, "SMM S3 Stack Size = %x\n", SmmS3ResumeState->SmmS3StackSize));\r
1046 DEBUG (( EFI_D_ERROR, "SMM S3 Resume Entry Point = %x\n", SmmS3ResumeState->SmmS3ResumeEntryPoint));\r
1047 DEBUG (( EFI_D_ERROR, "SMM S3 CR0 = %x\n", SmmS3ResumeState->SmmS3Cr0));\r
1048 DEBUG (( EFI_D_ERROR, "SMM S3 CR3 = %x\n", SmmS3ResumeState->SmmS3Cr3));\r
1049 DEBUG (( EFI_D_ERROR, "SMM S3 CR4 = %x\n", SmmS3ResumeState->SmmS3Cr4));\r
1050 DEBUG (( EFI_D_ERROR, "SMM S3 Return CS = %x\n", SmmS3ResumeState->ReturnCs));\r
1051 DEBUG (( EFI_D_ERROR, "SMM S3 Return Entry Point = %x\n", SmmS3ResumeState->ReturnEntryPoint));\r
1052 DEBUG (( EFI_D_ERROR, "SMM S3 Return Context1 = %x\n", SmmS3ResumeState->ReturnContext1));\r
1053 DEBUG (( EFI_D_ERROR, "SMM S3 Return Context2 = %x\n", SmmS3ResumeState->ReturnContext2));\r
1054 DEBUG (( EFI_D_ERROR, "SMM S3 Return Stack Pointer = %x\n", SmmS3ResumeState->ReturnStackPointer));\r
1055 DEBUG (( EFI_D_ERROR, "SMM S3 Smst = %x\n", SmmS3ResumeState->Smst));\r
1056\r
1f569620 1057 if (SmmS3ResumeState->Signature == SMM_S3_RESUME_SMM_32) {\r
1058 SwitchStack (\r
1059 (SWITCH_STACK_ENTRY_POINT)(UINTN)SmmS3ResumeState->SmmS3ResumeEntryPoint,\r
1060 (VOID *)AcpiS3Context,\r
1061 0,\r
1062 (VOID *)(UINTN)(SmmS3ResumeState->SmmS3StackBase + SmmS3ResumeState->SmmS3StackSize)\r
1063 );\r
1064 }\r
1065 if (SmmS3ResumeState->Signature == SMM_S3_RESUME_SMM_64) {\r
1066 //\r
1067 // Switch to long mode to complete resume.\r
1068 //\r
1069\r
abef469f 1070 InterruptStatus = SaveAndDisableInterrupts ();\r
1f569620 1071 //\r
1072 // Need to make sure the GDT is loaded with values that support long mode and real mode.\r
1073 //\r
1074 AsmWriteGdtr (&mGdt);\r
abef469f 1075 //\r
1076 // update segment selectors per the new GDT.\r
1077 // \r
1078 AsmSetDataSelectors (DATA_SEGEMENT_SELECTOR);\r
1079 //\r
1080 // Restore interrupt state.\r
1081 //\r
1082 SetInterruptState (InterruptStatus);\r
1083\r
1f569620 1084 AsmWriteCr3 ((UINTN)SmmS3ResumeState->SmmS3Cr3);\r
f5c941b1 1085\r
1086 //\r
1087 // Disable interrupt of Debug timer, since IDT table cannot work in long mode.\r
1088 // NOTE: On x64 platforms, because DisablePaging64() will disable interrupts,\r
1089 // the code in S3ResumeExecuteBootScript() cannot be halted by soft debugger.\r
1090 //\r
1091 SaveAndSetDebugTimerInterrupt (FALSE);\r
1092\r
1f569620 1093 AsmEnablePaging64 (\r
1094 0x38,\r
1095 SmmS3ResumeState->SmmS3ResumeEntryPoint,\r
1096 (UINT64)(UINTN)AcpiS3Context,\r
1097 0,\r
1098 SmmS3ResumeState->SmmS3StackBase + SmmS3ResumeState->SmmS3StackSize\r
1099 );\r
1100 }\r
1101\r
1102 }\r
1103\r
1104 S3ResumeExecuteBootScript (AcpiS3Context, EfiBootScriptExecutorVariable );\r
1105 return EFI_SUCCESS;\r
1106}\r
1107/**\r
1108 Main entry for S3 Resume PEIM.\r
1109\r
1110 This routine is to install EFI_PEI_S3_RESUME2_PPI.\r
1111 \r
1112 @param FileHandle Handle of the file being invoked.\r
1113 @param PeiServices Pointer to PEI Services table.\r
1114\r
1115 @retval EFI_SUCCESS S3Resume Ppi is installed successfully.\r
1116\r
1117**/\r
1118EFI_STATUS\r
1119EFIAPI\r
1120PeimS3ResumeEntryPoint (\r
1121 IN EFI_PEI_FILE_HANDLE FileHandle,\r
1122 IN CONST EFI_PEI_SERVICES **PeiServices\r
1123 )\r
1124{\r
1125 EFI_STATUS Status;\r
1126\r
1127 //\r
1128 // Install S3 Resume Ppi\r
1129 //\r
1130 Status = (**PeiServices).InstallPpi (PeiServices, &mPpiList);\r
1131 ASSERT_EFI_ERROR (Status);\r
1132\r
1133 return EFI_SUCCESS;\r
1134}\r
1135\r