]> git.proxmox.com Git - mirror_edk2.git/blob - MdeModulePkg/Core/DxeIplPeim/Ia32/DxeLoadFunc.c
MdeModulePkg/DxeIpl: support more NX related PCDs
[mirror_edk2.git] / MdeModulePkg / Core / DxeIplPeim / Ia32 / DxeLoadFunc.c
1 /** @file
2 Ia32-specific functionality for DxeLoad.
3
4 Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
5 Copyright (c) 2017, AMD Incorporated. All rights reserved.<BR>
6
7 This program and the accompanying materials
8 are licensed and made available under the terms and conditions of the BSD License
9 which accompanies this distribution. The full text of the license may be found at
10 http://opensource.org/licenses/bsd-license.php
11
12 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
13 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
14
15 **/
16
17 #include "DxeIpl.h"
18 #include "VirtualMemory.h"
19
20 #define IDT_ENTRY_COUNT 32
21
22 typedef struct _X64_IDT_TABLE {
23 //
24 // Reserved 4 bytes preceding PeiService and IdtTable,
25 // since IDT base address should be 8-byte alignment.
26 //
27 UINT32 Reserved;
28 CONST EFI_PEI_SERVICES **PeiService;
29 X64_IDT_GATE_DESCRIPTOR IdtTable[IDT_ENTRY_COUNT];
30 } X64_IDT_TABLE;
31
32 //
33 // Global Descriptor Table (GDT)
34 //
35 GLOBAL_REMOVE_IF_UNREFERENCED IA32_GDT gGdtEntries[] = {
36 /* selector { Global Segment Descriptor } */
37 /* 0x00 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, //null descriptor
38 /* 0x08 */ {{0xffff, 0, 0, 0x2, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //linear data segment descriptor
39 /* 0x10 */ {{0xffff, 0, 0, 0xf, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //linear code segment descriptor
40 /* 0x18 */ {{0xffff, 0, 0, 0x3, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //system data segment descriptor
41 /* 0x20 */ {{0xffff, 0, 0, 0xa, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //system code segment descriptor
42 /* 0x28 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, //spare segment descriptor
43 /* 0x30 */ {{0xffff, 0, 0, 0x2, 1, 0, 1, 0xf, 0, 0, 1, 1, 0}}, //system data segment descriptor
44 /* 0x38 */ {{0xffff, 0, 0, 0xa, 1, 0, 1, 0xf, 0, 1, 0, 1, 0}}, //system code segment descriptor
45 /* 0x40 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}}, //spare segment descriptor
46 };
47
48 //
49 // IA32 Gdt register
50 //
51 GLOBAL_REMOVE_IF_UNREFERENCED CONST IA32_DESCRIPTOR gGdt = {
52 sizeof (gGdtEntries) - 1,
53 (UINTN) gGdtEntries
54 };
55
56 GLOBAL_REMOVE_IF_UNREFERENCED IA32_DESCRIPTOR gLidtDescriptor = {
57 sizeof (X64_IDT_GATE_DESCRIPTOR) * IDT_ENTRY_COUNT - 1,
58 0
59 };
60
61 /**
62 Allocates and fills in the Page Directory and Page Table Entries to
63 establish a 4G page table.
64
65 @param[in] StackBase Stack base address.
66 @param[in] StackSize Stack size.
67
68 @return The address of page table.
69
70 **/
71 UINTN
72 Create4GPageTablesIa32Pae (
73 IN EFI_PHYSICAL_ADDRESS StackBase,
74 IN UINTN StackSize
75 )
76 {
77 UINT8 PhysicalAddressBits;
78 EFI_PHYSICAL_ADDRESS PhysicalAddress;
79 UINTN IndexOfPdpEntries;
80 UINTN IndexOfPageDirectoryEntries;
81 UINT32 NumberOfPdpEntriesNeeded;
82 PAGE_MAP_AND_DIRECTORY_POINTER *PageMap;
83 PAGE_MAP_AND_DIRECTORY_POINTER *PageDirectoryPointerEntry;
84 PAGE_TABLE_ENTRY *PageDirectoryEntry;
85 UINTN TotalPagesNum;
86 UINTN PageAddress;
87 UINT64 AddressEncMask;
88
89 //
90 // Make sure AddressEncMask is contained to smallest supported address field
91 //
92 AddressEncMask = PcdGet64 (PcdPteMemoryEncryptionAddressOrMask) & PAGING_1G_ADDRESS_MASK_64;
93
94 PhysicalAddressBits = 32;
95
96 //
97 // Calculate the table entries needed.
98 //
99 NumberOfPdpEntriesNeeded = (UINT32) LShiftU64 (1, (PhysicalAddressBits - 30));
100
101 TotalPagesNum = NumberOfPdpEntriesNeeded + 1;
102 PageAddress = (UINTN) AllocatePageTableMemory (TotalPagesNum);
103 ASSERT (PageAddress != 0);
104
105 PageMap = (VOID *) PageAddress;
106 PageAddress += SIZE_4KB;
107
108 PageDirectoryPointerEntry = PageMap;
109 PhysicalAddress = 0;
110
111 for (IndexOfPdpEntries = 0; IndexOfPdpEntries < NumberOfPdpEntriesNeeded; IndexOfPdpEntries++, PageDirectoryPointerEntry++) {
112 //
113 // Each Directory Pointer entries points to a page of Page Directory entires.
114 // So allocate space for them and fill them in in the IndexOfPageDirectoryEntries loop.
115 //
116 PageDirectoryEntry = (VOID *) PageAddress;
117 PageAddress += SIZE_4KB;
118
119 //
120 // Fill in a Page Directory Pointer Entries
121 //
122 PageDirectoryPointerEntry->Uint64 = (UINT64) (UINTN) PageDirectoryEntry | AddressEncMask;
123 PageDirectoryPointerEntry->Bits.Present = 1;
124
125 for (IndexOfPageDirectoryEntries = 0; IndexOfPageDirectoryEntries < 512; IndexOfPageDirectoryEntries++, PageDirectoryEntry++, PhysicalAddress += SIZE_2MB) {
126 if ((IsNullDetectionEnabled () && PhysicalAddress == 0)
127 || ((PhysicalAddress < StackBase + StackSize)
128 && ((PhysicalAddress + SIZE_2MB) > StackBase))) {
129 //
130 // Need to split this 2M page that covers stack range.
131 //
132 Split2MPageTo4K (PhysicalAddress, (UINT64 *) PageDirectoryEntry, StackBase, StackSize);
133 } else {
134 //
135 // Fill in the Page Directory entries
136 //
137 PageDirectoryEntry->Uint64 = (UINT64) PhysicalAddress | AddressEncMask;
138 PageDirectoryEntry->Bits.ReadWrite = 1;
139 PageDirectoryEntry->Bits.Present = 1;
140 PageDirectoryEntry->Bits.MustBe1 = 1;
141 }
142 }
143 }
144
145 for (; IndexOfPdpEntries < 512; IndexOfPdpEntries++, PageDirectoryPointerEntry++) {
146 ZeroMem (
147 PageDirectoryPointerEntry,
148 sizeof (PAGE_MAP_AND_DIRECTORY_POINTER)
149 );
150 }
151
152 //
153 // Protect the page table by marking the memory used for page table to be
154 // read-only.
155 //
156 EnablePageTableProtection ((UINTN)PageMap, FALSE);
157
158 return (UINTN) PageMap;
159 }
160
161 /**
162 The function will check if IA32 PAE is supported.
163
164 @retval TRUE IA32 PAE is supported.
165 @retval FALSE IA32 PAE is not supported.
166
167 **/
168 BOOLEAN
169 IsIa32PaeSupport (
170 VOID
171 )
172 {
173 UINT32 RegEax;
174 UINT32 RegEdx;
175 BOOLEAN Ia32PaeSupport;
176
177 Ia32PaeSupport = FALSE;
178 AsmCpuid (0x0, &RegEax, NULL, NULL, NULL);
179 if (RegEax >= 0x1) {
180 AsmCpuid (0x1, NULL, NULL, NULL, &RegEdx);
181 if ((RegEdx & BIT6) != 0) {
182 Ia32PaeSupport = TRUE;
183 }
184 }
185
186 return Ia32PaeSupport;
187 }
188
189 /**
190 The function will check if page table should be setup or not.
191
192 @retval TRUE Page table should be created.
193 @retval FALSE Page table should not be created.
194
195 **/
196 BOOLEAN
197 ToBuildPageTable (
198 VOID
199 )
200 {
201 if (!IsIa32PaeSupport ()) {
202 return FALSE;
203 }
204
205 if (IsNullDetectionEnabled ()) {
206 return TRUE;
207 }
208
209 if (PcdGet8 (PcdHeapGuardPropertyMask) != 0) {
210 return TRUE;
211 }
212
213 if (PcdGetBool (PcdCpuStackGuard)) {
214 return TRUE;
215 }
216
217 if (IsEnableNonExecNeeded ()) {
218 return TRUE;
219 }
220
221 return FALSE;
222 }
223
224 /**
225 Transfers control to DxeCore.
226
227 This function performs a CPU architecture specific operations to execute
228 the entry point of DxeCore with the parameters of HobList.
229 It also installs EFI_END_OF_PEI_PPI to signal the end of PEI phase.
230
231 @param DxeCoreEntryPoint The entry point of DxeCore.
232 @param HobList The start of HobList passed to DxeCore.
233
234 **/
235 VOID
236 HandOffToDxeCore (
237 IN EFI_PHYSICAL_ADDRESS DxeCoreEntryPoint,
238 IN EFI_PEI_HOB_POINTERS HobList
239 )
240 {
241 EFI_STATUS Status;
242 EFI_PHYSICAL_ADDRESS BaseOfStack;
243 EFI_PHYSICAL_ADDRESS TopOfStack;
244 UINTN PageTables;
245 X64_IDT_GATE_DESCRIPTOR *IdtTable;
246 UINTN SizeOfTemplate;
247 VOID *TemplateBase;
248 EFI_PHYSICAL_ADDRESS VectorAddress;
249 UINT32 Index;
250 X64_IDT_TABLE *IdtTableForX64;
251 EFI_VECTOR_HANDOFF_INFO *VectorInfo;
252 EFI_PEI_VECTOR_HANDOFF_INFO_PPI *VectorHandoffInfoPpi;
253 BOOLEAN BuildPageTablesIa32Pae;
254
255 if (IsNullDetectionEnabled ()) {
256 ClearFirst4KPage (HobList.Raw);
257 }
258
259 Status = PeiServicesAllocatePages (EfiBootServicesData, EFI_SIZE_TO_PAGES (STACK_SIZE), &BaseOfStack);
260 ASSERT_EFI_ERROR (Status);
261
262 if (FeaturePcdGet(PcdDxeIplSwitchToLongMode)) {
263 //
264 // Compute the top of the stack we were allocated, which is used to load X64 dxe core.
265 // Pre-allocate a 32 bytes which confroms to x64 calling convention.
266 //
267 // The first four parameters to a function are passed in rcx, rdx, r8 and r9.
268 // Any further parameters are pushed on the stack. Furthermore, space (4 * 8bytes) for the
269 // register parameters is reserved on the stack, in case the called function
270 // wants to spill them; this is important if the function is variadic.
271 //
272 TopOfStack = BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - 32;
273
274 //
275 // x64 Calling Conventions requires that the stack must be aligned to 16 bytes
276 //
277 TopOfStack = (EFI_PHYSICAL_ADDRESS) (UINTN) ALIGN_POINTER (TopOfStack, 16);
278
279 //
280 // Load the GDT of Go64. Since the GDT of 32-bit Tiano locates in the BS_DATA
281 // memory, it may be corrupted when copying FV to high-end memory
282 //
283 AsmWriteGdtr (&gGdt);
284 //
285 // Create page table and save PageMapLevel4 to CR3
286 //
287 PageTables = CreateIdentityMappingPageTables (BaseOfStack, STACK_SIZE);
288
289 //
290 // End of PEI phase signal
291 //
292 PERF_EVENT_SIGNAL_BEGIN (gEndOfPeiSignalPpi.Guid);
293 Status = PeiServicesInstallPpi (&gEndOfPeiSignalPpi);
294 PERF_EVENT_SIGNAL_END (gEndOfPeiSignalPpi.Guid);
295 ASSERT_EFI_ERROR (Status);
296
297 //
298 // Paging might be already enabled. To avoid conflict configuration,
299 // disable paging first anyway.
300 //
301 AsmWriteCr0 (AsmReadCr0 () & (~BIT31));
302 AsmWriteCr3 (PageTables);
303
304 //
305 // Update the contents of BSP stack HOB to reflect the real stack info passed to DxeCore.
306 //
307 UpdateStackHob (BaseOfStack, STACK_SIZE);
308
309 SizeOfTemplate = AsmGetVectorTemplatInfo (&TemplateBase);
310
311 Status = PeiServicesAllocatePages (
312 EfiBootServicesData,
313 EFI_SIZE_TO_PAGES(sizeof (X64_IDT_TABLE) + SizeOfTemplate * IDT_ENTRY_COUNT),
314 &VectorAddress
315 );
316 ASSERT_EFI_ERROR (Status);
317
318 //
319 // Store EFI_PEI_SERVICES** in the 4 bytes immediately preceding IDT to avoid that
320 // it may not be gotten correctly after IDT register is re-written.
321 //
322 IdtTableForX64 = (X64_IDT_TABLE *) (UINTN) VectorAddress;
323 IdtTableForX64->PeiService = GetPeiServicesTablePointer ();
324
325 VectorAddress = (EFI_PHYSICAL_ADDRESS) (UINTN) (IdtTableForX64 + 1);
326 IdtTable = IdtTableForX64->IdtTable;
327 for (Index = 0; Index < IDT_ENTRY_COUNT; Index++) {
328 IdtTable[Index].Ia32IdtEntry.Bits.GateType = 0x8e;
329 IdtTable[Index].Ia32IdtEntry.Bits.Reserved_0 = 0;
330 IdtTable[Index].Ia32IdtEntry.Bits.Selector = SYS_CODE64_SEL;
331
332 IdtTable[Index].Ia32IdtEntry.Bits.OffsetLow = (UINT16) VectorAddress;
333 IdtTable[Index].Ia32IdtEntry.Bits.OffsetHigh = (UINT16) (RShiftU64 (VectorAddress, 16));
334 IdtTable[Index].Offset32To63 = (UINT32) (RShiftU64 (VectorAddress, 32));
335 IdtTable[Index].Reserved = 0;
336
337 CopyMem ((VOID *) (UINTN) VectorAddress, TemplateBase, SizeOfTemplate);
338 AsmVectorFixup ((VOID *) (UINTN) VectorAddress, (UINT8) Index);
339
340 VectorAddress += SizeOfTemplate;
341 }
342
343 gLidtDescriptor.Base = (UINTN) IdtTable;
344
345 //
346 // Disable interrupt of Debug timer, since new IDT table cannot handle it.
347 //
348 SaveAndSetDebugTimerInterrupt (FALSE);
349
350 AsmWriteIdtr (&gLidtDescriptor);
351
352 DEBUG ((
353 DEBUG_INFO,
354 "%a() Stack Base: 0x%lx, Stack Size: 0x%x\n",
355 __FUNCTION__,
356 BaseOfStack,
357 STACK_SIZE
358 ));
359
360 //
361 // Go to Long Mode and transfer control to DxeCore.
362 // Interrupts will not get turned on until the CPU AP is loaded.
363 // Call x64 drivers passing in single argument, a pointer to the HOBs.
364 //
365 AsmEnablePaging64 (
366 SYS_CODE64_SEL,
367 DxeCoreEntryPoint,
368 (EFI_PHYSICAL_ADDRESS)(UINTN)(HobList.Raw),
369 0,
370 TopOfStack
371 );
372 } else {
373 //
374 // Get Vector Hand-off Info PPI and build Guided HOB
375 //
376 Status = PeiServicesLocatePpi (
377 &gEfiVectorHandoffInfoPpiGuid,
378 0,
379 NULL,
380 (VOID **)&VectorHandoffInfoPpi
381 );
382 if (Status == EFI_SUCCESS) {
383 DEBUG ((EFI_D_INFO, "Vector Hand-off Info PPI is gotten, GUIDed HOB is created!\n"));
384 VectorInfo = VectorHandoffInfoPpi->Info;
385 Index = 1;
386 while (VectorInfo->Attribute != EFI_VECTOR_HANDOFF_LAST_ENTRY) {
387 VectorInfo ++;
388 Index ++;
389 }
390 BuildGuidDataHob (
391 &gEfiVectorHandoffInfoPpiGuid,
392 VectorHandoffInfoPpi->Info,
393 sizeof (EFI_VECTOR_HANDOFF_INFO) * Index
394 );
395 }
396
397 //
398 // Compute the top of the stack we were allocated. Pre-allocate a UINTN
399 // for safety.
400 //
401 TopOfStack = BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - CPU_STACK_ALIGNMENT;
402 TopOfStack = (EFI_PHYSICAL_ADDRESS) (UINTN) ALIGN_POINTER (TopOfStack, CPU_STACK_ALIGNMENT);
403
404 PageTables = 0;
405 BuildPageTablesIa32Pae = ToBuildPageTable ();
406 if (BuildPageTablesIa32Pae) {
407 PageTables = Create4GPageTablesIa32Pae (BaseOfStack, STACK_SIZE);
408 if (IsEnableNonExecNeeded ()) {
409 EnableExecuteDisableBit();
410 }
411 }
412
413 //
414 // End of PEI phase signal
415 //
416 PERF_EVENT_SIGNAL_BEGIN (gEndOfPeiSignalPpi.Guid);
417 Status = PeiServicesInstallPpi (&gEndOfPeiSignalPpi);
418 PERF_EVENT_SIGNAL_END (gEndOfPeiSignalPpi.Guid);
419 ASSERT_EFI_ERROR (Status);
420
421 if (BuildPageTablesIa32Pae) {
422 //
423 // Paging might be already enabled. To avoid conflict configuration,
424 // disable paging first anyway.
425 //
426 AsmWriteCr0 (AsmReadCr0 () & (~BIT31));
427 AsmWriteCr3 (PageTables);
428 //
429 // Set Physical Address Extension (bit 5 of CR4).
430 //
431 AsmWriteCr4 (AsmReadCr4 () | BIT5);
432 }
433
434 //
435 // Update the contents of BSP stack HOB to reflect the real stack info passed to DxeCore.
436 //
437 UpdateStackHob (BaseOfStack, STACK_SIZE);
438
439 DEBUG ((
440 DEBUG_INFO,
441 "%a() Stack Base: 0x%lx, Stack Size: 0x%x\n",
442 __FUNCTION__,
443 BaseOfStack,
444 STACK_SIZE
445 ));
446
447 //
448 // Transfer the control to the entry point of DxeCore.
449 //
450 if (BuildPageTablesIa32Pae) {
451 AsmEnablePaging32 (
452 (SWITCH_STACK_ENTRY_POINT)(UINTN)DxeCoreEntryPoint,
453 HobList.Raw,
454 NULL,
455 (VOID *) (UINTN) TopOfStack
456 );
457 } else {
458 SwitchStack (
459 (SWITCH_STACK_ENTRY_POINT)(UINTN)DxeCoreEntryPoint,
460 HobList.Raw,
461 NULL,
462 (VOID *) (UINTN) TopOfStack
463 );
464 }
465 }
466 }
467