2 Page table manipulation functions for IA-32 processors
4 Copyright (c) 2009 - 2015, Intel Corporation. All rights reserved.<BR>
5 This program and the accompanying materials
6 are licensed and made available under the terms and conditions of the BSD License
7 which accompanies this distribution. The full text of the license may be found at
8 http://opensource.org/licenses/bsd-license.php
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
15 #include "PiSmmCpuDxeSmm.h"
20 Create PageTable for SMM use.
22 @return PageTable Address
30 UINTN PageFaultHandlerHookAddress
;
31 IA32_IDT_GATE_DESCRIPTOR
*IdtEntry
;
34 // Initialize spin lock
36 InitializeSpinLock (&mPFLock
);
38 if (FeaturePcdGet (PcdCpuSmmProfileEnable
)) {
40 // Set own Page Fault entry instead of the default one, because SMM Profile
41 // feature depends on IRET instruction to do Single Step
43 PageFaultHandlerHookAddress
= (UINTN
)PageFaultIdtHandlerSmmProfile
;
44 IdtEntry
= (IA32_IDT_GATE_DESCRIPTOR
*) gcSmiIdtr
.Base
;
45 IdtEntry
+= EXCEPT_IA32_PAGE_FAULT
;
46 IdtEntry
->Bits
.OffsetLow
= (UINT16
)PageFaultHandlerHookAddress
;
47 IdtEntry
->Bits
.Reserved_0
= 0;
48 IdtEntry
->Bits
.GateType
= IA32_IDT_GATE_TYPE_INTERRUPT_32
;
49 IdtEntry
->Bits
.OffsetHigh
= (UINT16
)(PageFaultHandlerHookAddress
>> 16);
52 // Register SMM Page Fault Handler
54 SmmRegisterExceptionHandler (&mSmmCpuService
, EXCEPT_IA32_PAGE_FAULT
, SmiPFHandler
);
58 // Additional SMM IDT initialization for SMM stack guard
60 if (FeaturePcdGet (PcdCpuSmmStackGuard
)) {
61 InitializeIDTSmmStackGuard ();
63 return Gen4GPageTable (0, TRUE
);
67 Page Fault handler for SMM use.
79 ThePage Fault handler wrapper for SMM use.
81 @param InterruptType Defines the type of interrupt or exception that
82 occurred on the processor.This parameter is processor architecture specific.
83 @param SystemContext A pointer to the processor context when
84 the interrupt occurred on the processor.
89 IN EFI_EXCEPTION_TYPE InterruptType
,
90 IN EFI_SYSTEM_CONTEXT SystemContext
95 ASSERT (InterruptType
== EXCEPT_IA32_PAGE_FAULT
);
97 AcquireSpinLock (&mPFLock
);
99 PFAddress
= AsmReadCr2 ();
101 if ((FeaturePcdGet (PcdCpuSmmStackGuard
)) &&
102 (PFAddress
>= mCpuHotPlugData
.SmrrBase
) &&
103 (PFAddress
< (mCpuHotPlugData
.SmrrBase
+ mCpuHotPlugData
.SmrrSize
))) {
104 DEBUG ((EFI_D_ERROR
, "SMM stack overflow!\n"));
109 // If a page fault occurs in SMM range
111 if ((PFAddress
< mCpuHotPlugData
.SmrrBase
) ||
112 (PFAddress
>= mCpuHotPlugData
.SmrrBase
+ mCpuHotPlugData
.SmrrSize
)) {
113 if ((SystemContext
.SystemContextIa32
->ExceptionData
& IA32_PF_EC_ID
) != 0) {
114 DEBUG ((EFI_D_ERROR
, "Code executed on IP(0x%x) out of SMM range after SMM is locked!\n", PFAddress
));
116 DumpModuleInfoByIp (*(UINTN
*)(UINTN
)SystemContext
.SystemContextIa32
->Esp
);
122 if (FeaturePcdGet (PcdCpuSmmProfileEnable
)) {
123 SmmProfilePFHandler (
124 SystemContext
.SystemContextIa32
->Eip
,
125 SystemContext
.SystemContextIa32
->ExceptionData
128 SmiDefaultPFHandler ();
131 ReleaseSpinLock (&mPFLock
);