2 This module produces the EFI_PEI_S3_RESUME_PPI.
3 This module works with StandAloneBootScriptExecutor to S3 resume to OS.
4 This module will excute the boot script saved during last boot and after that,
5 control is passed to OS waking up handler.
7 Copyright (c) 2006 - 2011, Intel Corporation. All rights reserved.<BR>
9 This program and the accompanying materials
10 are licensed and made available under the terms and conditions
11 of the BSD License which accompanies this distribution. The
12 full text of the license may be found at
13 http://opensource.org/licenses/bsd-license.php
15 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
16 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
22 #include <Guid/AcpiS3Context.h>
23 #include <Guid/BootScriptExecutorVariable.h>
24 #include <Guid/Performance.h>
25 #include <Ppi/ReadOnlyVariable2.h>
26 #include <Ppi/S3Resume2.h>
27 #include <Ppi/SmmAccess.h>
28 #include <Ppi/PostBootScriptTable.h>
29 #include <Ppi/EndOfPeiPhase.h>
31 #include <Library/DebugLib.h>
32 #include <Library/BaseLib.h>
33 #include <Library/TimerLib.h>
34 #include <Library/PeimEntryPoint.h>
35 #include <Library/PeiServicesLib.h>
36 #include <Library/HobLib.h>
37 #include <Library/PerformanceLib.h>
38 #include <Library/PeiServicesTablePointerLib.h>
39 #include <Library/IoLib.h>
40 #include <Library/BaseMemoryLib.h>
41 #include <Library/MemoryAllocationLib.h>
42 #include <Library/PcdLib.h>
43 #include <Library/DebugAgentLib.h>
44 #include <Library/LocalApicLib.h>
45 #include <Library/ReportStatusCodeLib.h>
46 #include <Library/PrintLib.h>
47 #include <Library/LockBoxLib.h>
48 #include <IndustryStandard/Acpi.h>
63 UINT32 DefaultSize
: 1;
64 UINT32 Granularity
: 1;
71 // Page-Map Level-4 Offset (PML4) and
72 // Page-Directory-Pointer Offset (PDPE) entries 4K & 2MB
76 UINT64 Present
:1; // 0 = Not present in memory, 1 = Present in memory
77 UINT64 ReadWrite
:1; // 0 = Read-Only, 1= Read/Write
78 UINT64 UserSupervisor
:1; // 0 = Supervisor, 1=User
79 UINT64 WriteThrough
:1; // 0 = Write-Back caching, 1=Write-Through caching
80 UINT64 CacheDisabled
:1; // 0 = Cached, 1=Non-Cached
81 UINT64 Accessed
:1; // 0 = Not accessed, 1 = Accessed (set by CPU)
82 UINT64 Reserved
:1; // Reserved
83 UINT64 MustBeZero
:2; // Must Be Zero
84 UINT64 Available
:3; // Available for use by system software
85 UINT64 PageTableBaseAddress
:40; // Page Table Base Address
86 UINT64 AvabilableHigh
:11; // Available for use by system software
87 UINT64 Nx
:1; // No Execute bit
90 } PAGE_MAP_AND_DIRECTORY_POINTER
;
93 // Page Table Entry 2MB
97 UINT64 Present
:1; // 0 = Not present in memory, 1 = Present in memory
98 UINT64 ReadWrite
:1; // 0 = Read-Only, 1= Read/Write
99 UINT64 UserSupervisor
:1; // 0 = Supervisor, 1=User
100 UINT64 WriteThrough
:1; // 0 = Write-Back caching, 1=Write-Through caching
101 UINT64 CacheDisabled
:1; // 0 = Cached, 1=Non-Cached
102 UINT64 Accessed
:1; // 0 = Not accessed, 1 = Accessed (set by CPU)
103 UINT64 Dirty
:1; // 0 = Not Dirty, 1 = written by processor on access to page
104 UINT64 MustBe1
:1; // Must be 1
105 UINT64 Global
:1; // 0 = Not global page, 1 = global page TLB not cleared on CR3 write
106 UINT64 Available
:3; // Available for use by system software
108 UINT64 MustBeZero
:8; // Must be zero;
109 UINT64 PageTableBaseAddress
:31; // Page Table Base Address
110 UINT64 AvabilableHigh
:11; // Available for use by system software
111 UINT64 Nx
:1; // 0 = Execute Code, 1 = No Code Execution
119 // Function prototypes
122 a ASM function to transfer control to OS.
124 @param S3WakingVector The S3 waking up vector saved in ACPI Facs table
125 @param AcpiLowMemoryBase a buffer under 1M which could be used during the transfer
129 (EFIAPI
*ASM_TRANSFER_CONTROL
) (
130 IN UINT32 S3WakingVector
,
131 IN UINT32 AcpiLowMemoryBase
135 Restores the platform to its preboot configuration for an S3 resume and
136 jumps to the OS waking vector.
138 This function will restore the platform to its pre-boot configuration that was
139 pre-stored in the boot script table and transfer control to OS waking vector.
140 Upon invocation, this function is responsible for locating the following
141 information before jumping to OS waking vector:
144 - any other information that it needs
146 The S3RestoreConfig() function then executes the pre-stored boot script table
147 and transitions the platform to the pre-boot state. The boot script is recorded
148 during regular boot using the EFI_S3_SAVE_STATE_PROTOCOL.Write() and
149 EFI_S3_SMM_SAVE_STATE_PROTOCOL.Write() functions. Finally, this function
150 transfers control to the OS waking vector. If the OS supports only a real-mode
151 waking vector, this function will switch from flat mode to real mode before
152 jumping to the waking vector. If all platform pre-boot configurations are
153 successfully restored and all other necessary information is ready, this
154 function will never return and instead will directly jump to the OS waking
155 vector. If this function returns, it indicates that the attempt to resume
156 from the ACPI S3 sleep state failed.
158 @param[in] This Pointer to this instance of the PEI_S3_RESUME_PPI
160 @retval EFI_ABORTED Execution of the S3 resume boot script table failed.
161 @retval EFI_NOT_FOUND Some necessary information that is used for the S3
162 resume boot path could not be located.
168 IN EFI_PEI_S3_RESUME2_PPI
*This
174 EFI_PEI_S3_RESUME2_PPI mS3ResumePpi
= { S3RestoreConfig2
};
176 EFI_PEI_PPI_DESCRIPTOR mPpiList
= {
177 (EFI_PEI_PPI_DESCRIPTOR_PPI
| EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST
),
178 &gEfiPeiS3Resume2PpiGuid
,
182 EFI_PEI_PPI_DESCRIPTOR mPpiListPostScriptTable
= {
183 (EFI_PEI_PPI_DESCRIPTOR_PPI
| EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST
),
184 &gPeiPostScriptTablePpiGuid
,
188 EFI_PEI_PPI_DESCRIPTOR mPpiListEndOfPeiTable
= {
189 (EFI_PEI_PPI_DESCRIPTOR_PPI
| EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST
),
190 &gEfiEndOfPeiSignalPpiGuid
,
195 // Global Descriptor Table (GDT)
197 GLOBAL_REMOVE_IF_UNREFERENCED IA32_GDT mGdtEntries
[] = {
198 /* selector { Global Segment Descriptor } */
199 /* 0x00 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},
200 /* 0x08 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},
201 /* 0x10 */ {{0xFFFF, 0, 0, 0xB, 1, 0, 1, 0xF, 0, 0, 1, 1, 0}},
202 /* 0x18 */ {{0xFFFF, 0, 0, 0x3, 1, 0, 1, 0xF, 0, 0, 1, 1, 0}},
203 /* 0x20 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},
204 /* 0x28 */ {{0xFFFF, 0, 0, 0xB, 1, 0, 1, 0xF, 0, 0, 0, 1, 0}},
205 /* 0x30 */ {{0xFFFF, 0, 0, 0x3, 1, 0, 1, 0xF, 0, 0, 0, 1, 0}},
206 /* 0x38 */ {{0xFFFF, 0, 0, 0xB, 1, 0, 1, 0xF, 0, 1, 0, 1, 0}},
207 /* 0x40 */ {{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}},
213 GLOBAL_REMOVE_IF_UNREFERENCED CONST IA32_DESCRIPTOR mGdt
= {
214 sizeof (mGdtEntries
) - 1,
219 Performance measure function to get S3 detailed performance data.
221 This function will getS3 detailed performance data and saved in pre-reserved ACPI memory.
224 WriteToOsS3PerformanceData (
229 EFI_PHYSICAL_ADDRESS mAcpiLowMemoryBase
;
230 PERF_HEADER
*PerfHeader
;
234 EFI_PEI_READ_ONLY_VARIABLE2_PPI
*VariableServices
;
248 // Retrive time stamp count as early as possilbe
250 Ticker
= GetPerformanceCounter ();
252 Freq
= GetPerformanceCounterProperties (&StartValue
, &EndValue
);
254 Freq
= DivU64x32 (Freq
, 1000);
256 Status
= PeiServicesLocatePpi (
257 &gEfiPeiReadOnlyVariable2PpiGuid
,
260 (VOID
**) &VariableServices
262 ASSERT_EFI_ERROR (Status
);
264 VarSize
= sizeof (EFI_PHYSICAL_ADDRESS
);
265 Status
= VariableServices
->GetVariable (
268 &gPerformanceProtocolGuid
,
273 if (EFI_ERROR (Status
)) {
274 DEBUG ((EFI_D_ERROR
, "Fail to retrieve variable to log S3 performance data \n"));
278 PerfHeader
= (PERF_HEADER
*) (UINTN
) mAcpiLowMemoryBase
;
280 if (PerfHeader
->Signiture
!= PERFORMANCE_SIGNATURE
) {
281 DEBUG ((EFI_D_ERROR
, "Performance data in ACPI memory get corrupted! \n"));
286 // Record total S3 resume time.
288 if (EndValue
>= StartValue
) {
289 PerfHeader
->S3Resume
= Ticker
- StartValue
;
292 PerfHeader
->S3Resume
= StartValue
- Ticker
;
297 // Get S3 detailed performance data
301 while ((LogEntryKey
= GetPerformanceMeasurement (
308 if (EndTicker
!= 0) {
309 PerfData
= &PerfHeader
->S3Entry
[Index
];
312 // Use File Handle to specify the different performance log for PEIM.
313 // File Handle is the base address of PEIM FFS file.
315 if ((AsciiStrnCmp (Token
, "PEIM", PEI_PERFORMANCE_STRING_SIZE
) == 0) && (Handle
!= NULL
)) {
316 AsciiSPrint (PerfData
->Token
, PERF_TOKEN_LENGTH
, "0x%11p", Handle
);
318 AsciiStrnCpy (PerfData
->Token
, Token
, PERF_TOKEN_LENGTH
);
320 if (StartTicker
== 1) {
321 StartTicker
= StartValue
;
323 if (EndTicker
== 1) {
324 EndTicker
= StartValue
;
326 Ticker
= CountUp
? (EndTicker
- StartTicker
) : (StartTicker
- EndTicker
);
327 PerfData
->Duration
= (UINT32
) DivU64x32 (Ticker
, (UINT32
) Freq
);
330 // Only Record > 1ms performance data so that more big performance can be recorded.
332 if ((Ticker
> Freq
) && (++Index
>= PERF_PEI_ENTRY_MAX_NUM
)) {
334 // Reach the maximum number of PEI performance log entries.
340 PerfHeader
->S3EntryNum
= (UINT32
) Index
;
344 Jump to OS waking vector.
345 The function will install boot script done PPI, report S3 resume status code, and then jump to OS waking vector.
347 @param AcpiS3Context a pointer to a structure of ACPI_S3_CONTEXT
348 @param PeiS3ResumeState a pointer to a structure of PEI_S3_RESUME_STATE
353 IN ACPI_S3_CONTEXT
*AcpiS3Context
,
354 IN PEI_S3_RESUME_STATE
*PeiS3ResumeState
358 EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE
*Facs
;
359 ASM_TRANSFER_CONTROL AsmTransferControl
;
361 UINTN TempStack
[0x10];
366 AsmWriteIdtr (&PeiS3ResumeState
->Idtr
);
369 // Install BootScriptDonePpi
371 Status
= PeiServicesInstallPpi (&mPpiListPostScriptTable
);
372 ASSERT_EFI_ERROR (Status
);
375 // Get ACPI Table Address
377 Facs
= (EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE
*) ((UINTN
) (AcpiS3Context
->AcpiFacsTable
));
379 if ((Facs
== NULL
) ||
380 (Facs
->Signature
!= EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_SIGNATURE
) ||
381 ((Facs
->FirmwareWakingVector
== 0) && (Facs
->XFirmwareWakingVector
== 0)) ) {
387 // report status code on S3 resume
389 REPORT_STATUS_CODE (EFI_PROGRESS_CODE
, EFI_SOFTWARE_PEI_MODULE
| EFI_SW_PEI_PC_OS_WAKE
);
392 // Install EndOfPeiPpi
394 Status
= PeiServicesInstallPpi (&mPpiListEndOfPeiTable
);
395 ASSERT_EFI_ERROR (Status
);
398 WriteToOsS3PerformanceData ();
401 AsmTransferControl
= (ASM_TRANSFER_CONTROL
)(UINTN
)PeiS3ResumeState
->AsmTransferControl
;
402 if (Facs
->XFirmwareWakingVector
!= 0) {
404 // Switch to native waking vector
406 TempStackTop
= (UINTN
)&TempStack
+ sizeof(TempStack
);
407 if ((Facs
->Version
== EFI_ACPI_4_0_FIRMWARE_ACPI_CONTROL_STRUCTURE_VERSION
) &&
408 ((Facs
->Flags
& EFI_ACPI_4_0_64BIT_WAKE_SUPPORTED_F
) != 0) &&
409 ((Facs
->Flags
& EFI_ACPI_4_0_OSPM_64BIT_WAKE__F
) != 0)) {
411 // X64 long mode waking vector
413 DEBUG (( EFI_D_ERROR
, "Transfer to 64bit OS waking vector - %x\r\n", (UINTN
)Facs
->XFirmwareWakingVector
));
414 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode
)) {
417 Facs
->XFirmwareWakingVector
,
420 (UINT64
)(UINTN
)TempStackTop
423 DEBUG (( EFI_D_ERROR
, "Unsupported for 32bit DXE transfer to 64bit OS waking vector!\r\n"));
428 // IA32 protected mode waking vector (Page disabled)
430 DEBUG (( EFI_D_ERROR
, "Transfer to 32bit OS waking vector - %x\r\n", (UINTN
)Facs
->XFirmwareWakingVector
));
432 (SWITCH_STACK_ENTRY_POINT
) (UINTN
) Facs
->XFirmwareWakingVector
,
435 (VOID
*)(UINTN
)TempStackTop
440 // 16bit Realmode waking vector
442 DEBUG (( EFI_D_ERROR
, "Transfer to 16bit OS waking vector - %x\r\n", (UINTN
)Facs
->FirmwareWakingVector
));
443 AsmTransferControl (Facs
->FirmwareWakingVector
, 0x0);
453 Restore S3 page table because we do not trust ACPINvs content.
454 If BootScriptExector driver will not run in 64-bit mode, this function will do nothing.
456 @param S3NvsPageTableAddress PageTableAddress in ACPINvs
459 RestoreS3PageTables (
460 IN UINTN S3NvsPageTableAddress
463 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode
)) {
465 UINT8 PhysicalAddressBits
;
466 EFI_PHYSICAL_ADDRESS PageAddress
;
467 UINTN IndexOfPml4Entries
;
468 UINTN IndexOfPdpEntries
;
469 UINTN IndexOfPageDirectoryEntries
;
470 UINT64 NumberOfPml4EntriesNeeded
;
471 UINT64 NumberOfPdpEntriesNeeded
;
472 PAGE_MAP_AND_DIRECTORY_POINTER
*PageMapLevel4Entry
;
473 PAGE_MAP_AND_DIRECTORY_POINTER
*PageMap
;
474 PAGE_MAP_AND_DIRECTORY_POINTER
*PageDirectoryPointerEntry
;
475 PAGE_TABLE_ENTRY
*PageDirectoryEntry
;
478 // NOTE: We have to ASSUME the page table generation format, because we do not know whole page table information.
479 // The whole page table is too large to be saved in SMRAM.
481 // The assumption is : whole page table is allocated in CONTINOUS memory and CR3 points to TOP page.
483 DEBUG ((EFI_D_ERROR
, "S3NvsPageTableAddress - %x\n", S3NvsPageTableAddress
));
486 // By architecture only one PageMapLevel4 exists - so lets allocate storgage for it.
488 PageMap
= (PAGE_MAP_AND_DIRECTORY_POINTER
*)S3NvsPageTableAddress
;
489 S3NvsPageTableAddress
+= SIZE_4KB
;
492 // Get physical address bits supported.
494 AsmCpuid (0x80000000, &RegEax
, NULL
, NULL
, NULL
);
495 if (RegEax
>= 0x80000008) {
496 AsmCpuid (0x80000008, &RegEax
, NULL
, NULL
, NULL
);
497 PhysicalAddressBits
= (UINT8
) RegEax
;
499 PhysicalAddressBits
= 36;
503 // Calculate the table entries needed.
505 if (PhysicalAddressBits
<= 39) {
506 NumberOfPml4EntriesNeeded
= 1;
507 NumberOfPdpEntriesNeeded
= LShiftU64 (1, (PhysicalAddressBits
- 30));
509 NumberOfPml4EntriesNeeded
= LShiftU64 (1, (PhysicalAddressBits
- 39));
510 NumberOfPdpEntriesNeeded
= 512;
513 PageMapLevel4Entry
= PageMap
;
515 for (IndexOfPml4Entries
= 0; IndexOfPml4Entries
< NumberOfPml4EntriesNeeded
; IndexOfPml4Entries
++, PageMapLevel4Entry
++) {
517 // Each PML4 entry points to a page of Page Directory Pointer entires.
518 // So lets allocate space for them and fill them in in the IndexOfPdpEntries loop.
520 PageDirectoryPointerEntry
= (PAGE_MAP_AND_DIRECTORY_POINTER
*)S3NvsPageTableAddress
;
521 S3NvsPageTableAddress
+= SIZE_4KB
;
526 PageMapLevel4Entry
->Uint64
= (UINT64
)(UINTN
)PageDirectoryPointerEntry
;
527 PageMapLevel4Entry
->Bits
.ReadWrite
= 1;
528 PageMapLevel4Entry
->Bits
.Present
= 1;
530 for (IndexOfPdpEntries
= 0; IndexOfPdpEntries
< NumberOfPdpEntriesNeeded
; IndexOfPdpEntries
++, PageDirectoryPointerEntry
++) {
532 // Each Directory Pointer entries points to a page of Page Directory entires.
533 // So allocate space for them and fill them in in the IndexOfPageDirectoryEntries loop.
535 PageDirectoryEntry
= (PAGE_TABLE_ENTRY
*)S3NvsPageTableAddress
;
536 S3NvsPageTableAddress
+= SIZE_4KB
;
539 // Fill in a Page Directory Pointer Entries
541 PageDirectoryPointerEntry
->Uint64
= (UINT64
)(UINTN
)PageDirectoryEntry
;
542 PageDirectoryPointerEntry
->Bits
.ReadWrite
= 1;
543 PageDirectoryPointerEntry
->Bits
.Present
= 1;
545 for (IndexOfPageDirectoryEntries
= 0; IndexOfPageDirectoryEntries
< 512; IndexOfPageDirectoryEntries
++, PageDirectoryEntry
++, PageAddress
+= SIZE_2MB
) {
547 // Fill in the Page Directory entries
549 PageDirectoryEntry
->Uint64
= (UINT64
)PageAddress
;
550 PageDirectoryEntry
->Bits
.ReadWrite
= 1;
551 PageDirectoryEntry
->Bits
.Present
= 1;
552 PageDirectoryEntry
->Bits
.MustBe1
= 1;
559 // If DXE is running 32-bit mode, no need to establish page table.
566 Jump to boot script executor driver.
568 The function will close and lock SMRAM and then jump to boot script execute driver to executing S3 boot script table.
570 @param AcpiS3Context a pointer to a structure of ACPI_S3_CONTEXT
571 @param EfiBootScriptExecutorVariable The function entry to executing S3 boot Script table. This function is build in
572 boot script execute driver
576 S3ResumeExecuteBootScript (
577 IN ACPI_S3_CONTEXT
*AcpiS3Context
,
578 IN BOOT_SCRIPT_EXECUTOR_VARIABLE
*EfiBootScriptExecutorVariable
582 PEI_SMM_ACCESS_PPI
*SmmAccess
;
585 IA32_DESCRIPTOR
*IdtDescriptor
;
587 PEI_S3_RESUME_STATE
*PeiS3ResumeState
;
589 DEBUG ((EFI_D_ERROR
, "S3ResumeExecuteBootScript()\n"));
592 // Attempt to use content from SMRAM first
594 GuidHob
= GetFirstGuidHob (&gEfiAcpiVariableGuid
);
595 if (GuidHob
!= NULL
) {
597 // Last step for SMM - send SMI for initialization
603 SendSmiIpiAllExcludingSelf ();
607 SendSmiIpi (GetApicId ());
609 Status
= PeiServicesLocatePpi (
610 &gPeiSmmAccessPpiGuid
,
616 DEBUG ((EFI_D_ERROR
, "Close all SMRAM regions before executing boot script\n"));
618 for (Index
= 0, Status
= EFI_SUCCESS
; !EFI_ERROR (Status
); Index
++) {
619 Status
= SmmAccess
->Close ((EFI_PEI_SERVICES
**)GetPeiServicesTablePointer (), SmmAccess
, Index
);
622 DEBUG ((EFI_D_ERROR
, "Lock all SMRAM regions before executing boot script\n"));
624 for (Index
= 0, Status
= EFI_SUCCESS
; !EFI_ERROR (Status
); Index
++) {
625 Status
= SmmAccess
->Lock ((EFI_PEI_SERVICES
**)GetPeiServicesTablePointer (), SmmAccess
, Index
);
629 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode
)) {
631 // Need reconstruct page table here, since we do not trust ACPINvs.
633 RestoreS3PageTables ((UINTN
)AcpiS3Context
->S3NvsPageTableAddress
);
634 AsmWriteCr3 ((UINTN
)AcpiS3Context
->S3NvsPageTableAddress
);
637 if (FeaturePcdGet (PcdFrameworkCompatibilitySupport
)) {
639 // On some platform, such as ECP, a dispatch node in boot script table may execute a 32-bit PEIM which may need PeiServices
640 // pointer. So PeiServices need preserve in (IDTBase- sizeof (UINTN)).
642 IdtDescriptor
= (IA32_DESCRIPTOR
*) (UINTN
) (AcpiS3Context
->IdtrProfile
);
644 // Make sure the newly allcated IDT align with 16-bytes
646 IdtBuffer
= AllocatePages (EFI_SIZE_TO_PAGES((IdtDescriptor
->Limit
+ 1) + 16));
647 ASSERT (IdtBuffer
!= NULL
);
648 CopyMem ((VOID
*)((UINT8
*)IdtBuffer
+ 16),(VOID
*)(IdtDescriptor
->Base
), (IdtDescriptor
->Limit
+ 1));
649 IdtDescriptor
->Base
= (UINTN
)((UINT8
*)IdtBuffer
+ 16);
650 *(UINTN
*)(IdtDescriptor
->Base
- sizeof(UINTN
)) = (UINTN
)GetPeiServicesTablePointer ();
654 // Need to make sure the GDT is loaded with values that support long mode and real mode.
656 AsmWriteGdtr (&mGdt
);
659 // Prepare data for return back
661 PeiS3ResumeState
= AllocatePool (sizeof(*PeiS3ResumeState
));
662 ASSERT (PeiS3ResumeState
!= NULL
);
663 DEBUG (( EFI_D_ERROR
, "PeiS3ResumeState - %x\r\n", PeiS3ResumeState
));
664 PeiS3ResumeState
->ReturnCs
= 0x10;
665 PeiS3ResumeState
->ReturnEntryPoint
= (EFI_PHYSICAL_ADDRESS
)(UINTN
)S3ResumeBootOs
;
666 PeiS3ResumeState
->ReturnStackPointer
= (EFI_PHYSICAL_ADDRESS
)(UINTN
)&Status
;
670 AsmReadIdtr (&PeiS3ResumeState
->Idtr
);
672 if (FeaturePcdGet (PcdDxeIplSwitchToLongMode
)) {
676 DEBUG (( EFI_D_ERROR
, "Enable X64 and transfer control to Standalone Boot Script Executor\r\n"));
679 // Switch to long mode to complete resume.
683 EfiBootScriptExecutorVariable
->BootScriptExecutorEntrypoint
,
684 (UINT64
)(UINTN
)AcpiS3Context
,
685 (UINT64
)(UINTN
)PeiS3ResumeState
,
686 (UINT64
)(UINTN
)(AcpiS3Context
->BootScriptStackBase
+ AcpiS3Context
->BootScriptStackSize
)
692 DEBUG (( EFI_D_ERROR
, "transfer control to Standalone Boot Script Executor\r\n"));
694 (SWITCH_STACK_ENTRY_POINT
) (UINTN
) EfiBootScriptExecutorVariable
->BootScriptExecutorEntrypoint
,
695 (VOID
*)AcpiS3Context
,
696 (VOID
*)PeiS3ResumeState
,
697 (VOID
*)(UINTN
)(AcpiS3Context
->BootScriptStackBase
+ AcpiS3Context
->BootScriptStackSize
)
707 Restores the platform to its preboot configuration for an S3 resume and
708 jumps to the OS waking vector.
710 This function will restore the platform to its pre-boot configuration that was
711 pre-stored in the boot script table and transfer control to OS waking vector.
712 Upon invocation, this function is responsible for locating the following
713 information before jumping to OS waking vector:
716 - any other information that it needs
718 The S3RestoreConfig() function then executes the pre-stored boot script table
719 and transitions the platform to the pre-boot state. The boot script is recorded
720 during regular boot using the EFI_S3_SAVE_STATE_PROTOCOL.Write() and
721 EFI_S3_SMM_SAVE_STATE_PROTOCOL.Write() functions. Finally, this function
722 transfers control to the OS waking vector. If the OS supports only a real-mode
723 waking vector, this function will switch from flat mode to real mode before
724 jumping to the waking vector. If all platform pre-boot configurations are
725 successfully restored and all other necessary information is ready, this
726 function will never return and instead will directly jump to the OS waking
727 vector. If this function returns, it indicates that the attempt to resume
728 from the ACPI S3 sleep state failed.
730 @param[in] This Pointer to this instance of the PEI_S3_RESUME_PPI
732 @retval EFI_ABORTED Execution of the S3 resume boot script table failed.
733 @retval EFI_NOT_FOUND Some necessary information that is used for the S3
734 resume boot path could not be located.
740 IN EFI_PEI_S3_RESUME2_PPI
*This
744 PEI_SMM_ACCESS_PPI
*SmmAccess
;
746 ACPI_S3_CONTEXT
*AcpiS3Context
;
747 EFI_PEI_READ_ONLY_VARIABLE2_PPI
*VariableServices
;
748 EFI_PHYSICAL_ADDRESS TempEfiBootScriptExecutorVariable
;
749 EFI_PHYSICAL_ADDRESS TempAcpiS3Context
;
750 BOOT_SCRIPT_EXECUTOR_VARIABLE
*EfiBootScriptExecutorVariable
;
752 EFI_SMRAM_DESCRIPTOR
*SmramDescriptor
;
753 SMM_S3_RESUME_STATE
*SmmS3ResumeState
;
756 DEBUG ((EFI_D_ERROR
, "Enter S3 PEIM\r\n"));
758 Status
= PeiServicesLocatePpi (
759 &gPeiSmmAccessPpiGuid
,
764 for (Index
= 0; !EFI_ERROR (Status
); Index
++) {
765 Status
= SmmAccess
->Open ((EFI_PEI_SERVICES
**)GetPeiServicesTablePointer (), SmmAccess
, Index
);
768 Status
= PeiServicesLocatePpi (
769 &gEfiPeiReadOnlyVariable2PpiGuid
,
772 (VOID
**) &VariableServices
774 if (EFI_ERROR (Status
)) {
778 VarSize
= sizeof (EFI_PHYSICAL_ADDRESS
);
779 Status
= RestoreLockBox (
780 &gEfiAcpiVariableGuid
,
784 ASSERT_EFI_ERROR (Status
);
786 AcpiS3Context
= (ACPI_S3_CONTEXT
*)(UINTN
)TempAcpiS3Context
;
787 ASSERT (AcpiS3Context
!= NULL
);
789 Status
= RestoreLockBox (
790 &gEfiAcpiS3ContextGuid
,
794 ASSERT_EFI_ERROR (Status
);
796 VarSize
= sizeof (TempEfiBootScriptExecutorVariable
);
797 Status
= RestoreLockBox (
798 &gEfiBootScriptExecutorVariableGuid
,
799 &TempEfiBootScriptExecutorVariable
,
802 ASSERT_EFI_ERROR (Status
);
804 Status
= RestoreLockBox (
805 &gEfiBootScriptExecutorContextGuid
,
809 ASSERT_EFI_ERROR (Status
);
811 EfiBootScriptExecutorVariable
= (BOOT_SCRIPT_EXECUTOR_VARIABLE
*) (UINTN
) TempEfiBootScriptExecutorVariable
;
813 DEBUG (( EFI_D_ERROR
, "AcpiS3Context = %x\n", AcpiS3Context
));
814 DEBUG (( EFI_D_ERROR
, "Waking Vector = %x\n", ((EFI_ACPI_2_0_FIRMWARE_ACPI_CONTROL_STRUCTURE
*) ((UINTN
) (AcpiS3Context
->AcpiFacsTable
)))->FirmwareWakingVector
));
815 DEBUG (( EFI_D_ERROR
, "AcpiS3Context->AcpiFacsTable = %x\n", AcpiS3Context
->AcpiFacsTable
));
816 DEBUG (( EFI_D_ERROR
, "AcpiS3Context->S3NvsPageTableAddress = %x\n", AcpiS3Context
->S3NvsPageTableAddress
));
817 DEBUG (( EFI_D_ERROR
, "AcpiS3Context->S3DebugBufferAddress = %x\n", AcpiS3Context
->S3DebugBufferAddress
));
818 DEBUG (( EFI_D_ERROR
, "EfiBootScriptExecutorVariable->BootScriptExecutorEntrypoint = %x\n", EfiBootScriptExecutorVariable
->BootScriptExecutorEntrypoint
));
821 // Additional step for BootScript integrity - we only handle BootScript and BootScriptExecutor.
822 // Script dispatch image and context (parameter) are handled by platform.
823 // We just use restore all lock box in place, no need restore one by one.
825 Status
= RestoreAllLockBoxInPlace ();
826 ASSERT_EFI_ERROR (Status
);
827 if (EFI_ERROR (Status
)) {
833 // Attempt to use content from SMRAM first
835 GuidHob
= GetFirstGuidHob (&gEfiAcpiVariableGuid
);
836 if (GuidHob
!= NULL
) {
837 SmramDescriptor
= (EFI_SMRAM_DESCRIPTOR
*) GET_GUID_HOB_DATA (GuidHob
);
838 SmmS3ResumeState
= (SMM_S3_RESUME_STATE
*)(UINTN
)SmramDescriptor
->CpuStart
;
840 SmmS3ResumeState
->ReturnCs
= AsmReadCs ();
841 SmmS3ResumeState
->ReturnEntryPoint
= (EFI_PHYSICAL_ADDRESS
)(UINTN
)S3ResumeExecuteBootScript
;
842 SmmS3ResumeState
->ReturnContext1
= (EFI_PHYSICAL_ADDRESS
)(UINTN
)AcpiS3Context
;
843 SmmS3ResumeState
->ReturnContext2
= (EFI_PHYSICAL_ADDRESS
)(UINTN
)EfiBootScriptExecutorVariable
;
844 SmmS3ResumeState
->ReturnStackPointer
= (EFI_PHYSICAL_ADDRESS
)(UINTN
)&Status
;
846 DEBUG (( EFI_D_ERROR
, "SMM S3 Signature = %x\n", SmmS3ResumeState
->Signature
));
847 DEBUG (( EFI_D_ERROR
, "SMM S3 Stack Base = %x\n", SmmS3ResumeState
->SmmS3StackBase
));
848 DEBUG (( EFI_D_ERROR
, "SMM S3 Stack Size = %x\n", SmmS3ResumeState
->SmmS3StackSize
));
849 DEBUG (( EFI_D_ERROR
, "SMM S3 Resume Entry Point = %x\n", SmmS3ResumeState
->SmmS3ResumeEntryPoint
));
850 DEBUG (( EFI_D_ERROR
, "SMM S3 CR0 = %x\n", SmmS3ResumeState
->SmmS3Cr0
));
851 DEBUG (( EFI_D_ERROR
, "SMM S3 CR3 = %x\n", SmmS3ResumeState
->SmmS3Cr3
));
852 DEBUG (( EFI_D_ERROR
, "SMM S3 CR4 = %x\n", SmmS3ResumeState
->SmmS3Cr4
));
853 DEBUG (( EFI_D_ERROR
, "SMM S3 Return CS = %x\n", SmmS3ResumeState
->ReturnCs
));
854 DEBUG (( EFI_D_ERROR
, "SMM S3 Return Entry Point = %x\n", SmmS3ResumeState
->ReturnEntryPoint
));
855 DEBUG (( EFI_D_ERROR
, "SMM S3 Return Context1 = %x\n", SmmS3ResumeState
->ReturnContext1
));
856 DEBUG (( EFI_D_ERROR
, "SMM S3 Return Context2 = %x\n", SmmS3ResumeState
->ReturnContext2
));
857 DEBUG (( EFI_D_ERROR
, "SMM S3 Return Stack Pointer = %x\n", SmmS3ResumeState
->ReturnStackPointer
));
858 DEBUG (( EFI_D_ERROR
, "SMM S3 Smst = %x\n", SmmS3ResumeState
->Smst
));
861 // Disable interrupt of Debug timer.
863 SaveAndSetDebugTimerInterrupt (FALSE
);
865 if (SmmS3ResumeState
->Signature
== SMM_S3_RESUME_SMM_32
) {
867 (SWITCH_STACK_ENTRY_POINT
)(UINTN
)SmmS3ResumeState
->SmmS3ResumeEntryPoint
,
868 (VOID
*)AcpiS3Context
,
870 (VOID
*)(UINTN
)(SmmS3ResumeState
->SmmS3StackBase
+ SmmS3ResumeState
->SmmS3StackSize
)
873 if (SmmS3ResumeState
->Signature
== SMM_S3_RESUME_SMM_64
) {
875 // Switch to long mode to complete resume.
879 // Need to make sure the GDT is loaded with values that support long mode and real mode.
881 AsmWriteGdtr (&mGdt
);
882 AsmWriteCr3 ((UINTN
)SmmS3ResumeState
->SmmS3Cr3
);
885 SmmS3ResumeState
->SmmS3ResumeEntryPoint
,
886 (UINT64
)(UINTN
)AcpiS3Context
,
888 SmmS3ResumeState
->SmmS3StackBase
+ SmmS3ResumeState
->SmmS3StackSize
894 S3ResumeExecuteBootScript (AcpiS3Context
, EfiBootScriptExecutorVariable
);
898 Main entry for S3 Resume PEIM.
900 This routine is to install EFI_PEI_S3_RESUME2_PPI.
902 @param FileHandle Handle of the file being invoked.
903 @param PeiServices Pointer to PEI Services table.
905 @retval EFI_SUCCESS S3Resume Ppi is installed successfully.
910 PeimS3ResumeEntryPoint (
911 IN EFI_PEI_FILE_HANDLE FileHandle
,
912 IN CONST EFI_PEI_SERVICES
**PeiServices
918 // Install S3 Resume Ppi
920 Status
= (**PeiServices
).InstallPpi (PeiServices
, &mPpiList
);
921 ASSERT_EFI_ERROR (Status
);