-/*++\r
-\r
-Copyright (c) 2006, Intel Corporation \r
-All rights reserved. This program and the accompanying materials \r
-are licensed and made available under the terms and conditions of the BSD License \r
-which accompanies this distribution. The full text of the license may be found at \r
-http://opensource.org/licenses/bsd-license.php \r
- \r
-THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, \r
-WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. \r
-\r
-Module Name:\r
-\r
- DxeLoad.c\r
-\r
-Abstract:\r
-\r
- Last PEIM.\r
- Responsibility of this module is to load the DXE Core from a Firmware Volume.\r
-\r
---*/\r
-\r
-#include <DxeIpl.h>\r
-\r
-#pragma warning( disable : 4305 )\r
-\r
-BOOLEAN gInMemory = FALSE;\r
-\r
-//\r
-// GUID for EM64T\r
-//\r
-#define EFI_PPI_NEEDED_BY_DXE \\r
- { \\r
- 0x4d37da42, 0x3a0c, 0x4eda, 0xb9, 0xeb, 0xbc, 0x0e, 0x1d, 0xb4, 0x71, 0x3b \\r
- }\r
-EFI_GUID mPpiNeededByDxeGuid = EFI_PPI_NEEDED_BY_DXE;\r
-\r
-//\r
-// Module Globals used in the DXE to PEI handoff\r
-// These must be module globals, so the stack can be switched\r
-//\r
-static EFI_DXE_IPL_PPI mDxeIplPpi = {\r
- DxeLoadCore\r
-};\r
-\r
-static EFI_PEI_FV_FILE_LOADER_PPI mLoadFilePpi = {\r
- DxeIplLoadFile\r
-};\r
-\r
-static EFI_PEI_PPI_DESCRIPTOR mPpiLoadFile = {\r
- (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
- &gEfiPeiFvFileLoaderPpiGuid,\r
- &mLoadFilePpi\r
-};\r
-\r
-static EFI_PEI_PPI_DESCRIPTOR mPpiList = {\r
- (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
- &gEfiDxeIplPpiGuid,\r
- &mDxeIplPpi\r
-};\r
-\r
-static EFI_PEI_PPI_DESCRIPTOR mPpiPeiInMemory = {\r
- (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
- &gPeiInMemoryGuid,\r
- NULL\r
-};\r
-\r
-static EFI_PEI_PPI_DESCRIPTOR mPpiSignal = {\r
- (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
- &gEfiEndOfPeiSignalPpiGuid,\r
- NULL\r
-};\r
-\r
-DECOMPRESS_LIBRARY gEfiDecompress = {\r
- UefiDecompressGetInfo,\r
- UefiDecompress\r
-};\r
-\r
-DECOMPRESS_LIBRARY gTianoDecompress = {\r
- TianoDecompressGetInfo,\r
- TianoDecompress\r
-};\r
-\r
-DECOMPRESS_LIBRARY gCustomDecompress = {\r
- CustomDecompressGetInfo,\r
- CustomDecompress\r
-};\r
-\r
-STATIC\r
-UINTN\r
-GetOccupiedSize (\r
- IN UINTN ActualSize,\r
- IN UINTN Alignment\r
- )\r
-{\r
- UINTN OccupiedSize;\r
-\r
- OccupiedSize = ActualSize;\r
- while ((OccupiedSize & (Alignment - 1)) != 0) {\r
- OccupiedSize++;\r
- }\r
-\r
- return OccupiedSize;\r
-}\r
-\r
-EFI_STATUS\r
-EFIAPI\r
-PeimInitializeDxeIpl (\r
- IN EFI_FFS_FILE_HEADER *FfsHeader,\r
- IN EFI_PEI_SERVICES **PeiServices\r
- )\r
-/*++\r
-\r
-Routine Description:\r
-\r
- Initializes the Dxe Ipl PPI\r
-\r
-Arguments:\r
-\r
- FfsHeader - Pointer to FFS file header\r
- PeiServices - General purpose services available to every PEIM.\r
-\r
-Returns:\r
-\r
- EFI_SUCCESS\r
-\r
---*/\r
-{\r
- EFI_STATUS Status;\r
- EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader;\r
- EFI_BOOT_MODE BootMode;\r
-\r
- Status = PeiCoreGetBootMode (&BootMode);\r
-\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- Status = PeiCoreLocatePpi (\r
- &gPeiInMemoryGuid,\r
- 0,\r
- NULL,\r
- NULL\r
- );\r
-\r
- if (EFI_ERROR (Status) && (BootMode != BOOT_ON_S3_RESUME)) { \r
- //\r
- // The DxeIpl has not yet been shadowed\r
- //\r
- PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();\r
-\r
- //\r
- // Shadow DxeIpl and then re-run its entry point\r
- //\r
- Status = ShadowDxeIpl (FfsHeader, PeiEfiPeiPeCoffLoader);\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
-\r
- } else {\r
- if (BootMode != BOOT_ON_S3_RESUME) {\r
- //\r
- // The DxeIpl has been shadowed\r
- //\r
- gInMemory = TRUE;\r
-\r
- //\r
- // Install LoadFile PPI\r
- //\r
- Status = PeiCoreInstallPpi (&mPpiLoadFile);\r
-\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- }\r
- //\r
- // Install DxeIpl PPI\r
- //\r
- PeiCoreInstallPpi (&mPpiList);\r
-\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
-\r
- }\r
-\r
- return EFI_SUCCESS;\r
-}\r
-\r
-EFI_STATUS\r
-EFIAPI\r
-DxeLoadCore (\r
- IN EFI_DXE_IPL_PPI *This,\r
- IN EFI_PEI_SERVICES **PeiServices,\r
- IN EFI_PEI_HOB_POINTERS HobList\r
- )\r
-/*++\r
-\r
-Routine Description:\r
-\r
- Main entry point to last PEIM\r
-\r
-Arguments:\r
-\r
- This - Entry point for DXE IPL PPI\r
- PeiServices - General purpose services available to every PEIM.\r
- HobList - Address to the Pei HOB list\r
-\r
-Returns:\r
-\r
- EFI_SUCCESS - DEX core was successfully loaded.\r
- EFI_OUT_OF_RESOURCES - There are not enough resources to load DXE core.\r
-\r
---*/\r
-{\r
- EFI_STATUS Status;\r
- EFI_PHYSICAL_ADDRESS TopOfStack;\r
- EFI_PHYSICAL_ADDRESS BaseOfStack;\r
- EFI_PHYSICAL_ADDRESS BspStore;\r
- EFI_GUID DxeCoreFileName;\r
- VOID *DxeCorePe32Data;\r
- EFI_PHYSICAL_ADDRESS DxeCoreAddress;\r
- UINT64 DxeCoreSize;\r
- EFI_PHYSICAL_ADDRESS DxeCoreEntryPoint;\r
- VOID *PpisNeededByDxePe32Data;\r
- EFI_PHYSICAL_ADDRESS PpisNeededByDxeAddress;\r
- UINT64 PpisNeededByDxeSize;\r
- EFI_PHYSICAL_ADDRESS PpisNeededByDxeEntryPoint;\r
- EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader;\r
- EFI_BOOT_MODE BootMode;\r
- EFI_PEI_RECOVERY_MODULE_PPI *PeiRecovery;\r
- EFI_PEI_S3_RESUME_PPI *S3Resume;\r
- EFI_PHYSICAL_ADDRESS PageTables;\r
- \r
- TopOfStack = 0;\r
- BaseOfStack = 0;\r
- BspStore = 0;\r
- Status = EFI_SUCCESS;\r
-\r
- //\r
- // if in S3 Resume, restore configure\r
- //\r
- Status = PeiCoreGetBootMode (&BootMode);\r
-\r
- if (!EFI_ERROR (Status) && (BootMode == BOOT_ON_S3_RESUME)) {\r
- Status = PeiCoreLocatePpi (\r
- &gEfiPeiS3ResumePpiGuid,\r
- 0,\r
- NULL,\r
- (VOID **)&S3Resume\r
- );\r
-\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- Status = S3Resume->S3RestoreConfig (PeiServices);\r
-\r
- ASSERT_EFI_ERROR (Status);\r
- }\r
-\r
- Status = EFI_SUCCESS;\r
-\r
- //\r
- // Install the PEI Protocols that are shared between PEI and DXE\r
- //\r
-#ifdef EFI_NT_EMULATOR\r
- PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();\r
- ASSERT (PeiEfiPeiPeCoffLoader != NULL);\r
-#else\r
- PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderX64Protocol ();\r
-#endif \r
-\r
-#if 0\r
- Status = InstallEfiPeiPeCoffLoader64 (PeiServices, &PeiEfiPeiPeCoffLoader, NULL);\r
- ASSERT_EFI_ERROR (Status);\r
-#endif\r
- //\r
- // Allocate 128KB for the Stack\r
- //\r
- PeiCoreAllocatePages (EfiBootServicesData, EFI_SIZE_TO_PAGES (STACK_SIZE), &BaseOfStack);\r
- ASSERT (BaseOfStack != 0);\r
-\r
- //\r
- // Compute the top of the stack we were allocated. Pre-allocate a 32 bytes\r
- // for safety (PpisNeededByDxe and DxeCore).\r
- //\r
- TopOfStack = BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - 32;\r
-\r
- //\r
- // Add architecture-specifc HOBs (including the BspStore HOB)\r
- //\r
- Status = CreateArchSpecificHobs (&BspStore);\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- //\r
- // See if we are in crisis recovery\r
- //\r
- Status = PeiCoreGetBootMode (&BootMode);\r
- if (!EFI_ERROR (Status) && (BootMode == BOOT_IN_RECOVERY_MODE)) {\r
- Status = PeiCoreLocatePpi (\r
- &gEfiPeiRecoveryModulePpiGuid,\r
- 0,\r
- NULL,\r
- (VOID **)&PeiRecovery\r
- );\r
-\r
- ASSERT_EFI_ERROR (Status);\r
- Status = PeiRecovery->LoadRecoveryCapsule (PeiServices, PeiRecovery);\r
- ASSERT_EFI_ERROR (Status);\r
- }\r
-\r
- //\r
- // Find the DXE Core in a Firmware Volume\r
- //\r
- Status = PeiFindFile (\r
- EFI_FV_FILETYPE_DXE_CORE,\r
- EFI_SECTION_PE32,\r
- &DxeCoreFileName,\r
- &DxeCorePe32Data\r
- );\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- //\r
- // Find the PpisNeededByDxe in a Firmware Volume\r
- //\r
- Status = PeiFindFile (\r
- EFI_FV_FILETYPE_ALL,\r
- EFI_SECTION_PE32,\r
- &mPpiNeededByDxeGuid,\r
- &PpisNeededByDxePe32Data\r
- );\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- //\r
- // Transfer control to the DXE Core\r
- // The handoff state is simply a pointer to the HOB list\r
- //\r
- // PEI_PERF_END (PeiServices, L"DxeIpl", NULL, 0);\r
-\r
- Status = PeiCoreInstallPpi (&mPpiSignal);\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- //\r
- // Load the GDT of Go64. Since the GDT of 32-bit Tiano locates in the BS_DATA \\r
- // memory, it may be corrupted when copying FV to high-end memory \r
- LoadGo64Gdt();\r
-\r
- //\r
- // Limit to 36 bits of addressing for debug. Should get it from CPU\r
- //\r
- PageTables = CreateIdentityMappingPageTables (36);\r
-\r
- //\r
- // Load the PpiNeededByDxe from a Firmware Volume\r
- //\r
- Status = PeiLoadx64File (\r
- PeiEfiPeiPeCoffLoader,\r
- PpisNeededByDxePe32Data,\r
- EfiBootServicesData,\r
- &PpisNeededByDxeAddress,\r
- &PpisNeededByDxeSize,\r
- &PpisNeededByDxeEntryPoint\r
- );\r
- ASSERT_EFI_ERROR (Status);\r
-\r
-\r
- //\r
- // Load the DXE Core from a Firmware Volume\r
- //\r
- Status = PeiLoadx64File (\r
- PeiEfiPeiPeCoffLoader,\r
- DxeCorePe32Data,\r
- EfiBootServicesData,\r
- &DxeCoreAddress,\r
- &DxeCoreSize,\r
- &DxeCoreEntryPoint\r
- );\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- //\r
- //\r
- // Add HOB for the DXE Core\r
- //\r
- BuildModuleHob (\r
- &DxeCoreFileName,\r
- DxeCoreAddress,\r
- DxeCoreSize,\r
- DxeCoreEntryPoint\r
- );\r
-\r
- //\r
- // Report Status Code EFI_SW_PEI_PC_HANDOFF_TO_NEXT\r
- //\r
- REPORT_STATUS_CODE (\r
- EFI_PROGRESS_CODE,\r
- EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_CORE_PC_HANDOFF_TO_NEXT\r
- );\r
-\r
- DEBUG ((EFI_D_INFO, "DXE Core Entry\n"));\r
- //\r
- // Go to Long Mode. Interrupts will not get turned on until the CPU AP is loaded.\r
- // Call x64 drivers passing in single argument, a pointer to the HOBs.\r
- //\r
- ActivateLongMode (\r
- PageTables, \r
- (EFI_PHYSICAL_ADDRESS)(UINTN)(HobList.Raw), \r
- TopOfStack,\r
- PpisNeededByDxeEntryPoint,\r
- DxeCoreEntryPoint\r
- );\r
-\r
- //\r
- // If we get here, then the DXE Core returned. This is an error\r
- //\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- return EFI_OUT_OF_RESOURCES;\r
-}\r
-\r
-EFI_STATUS\r
-PeiFindFile (\r
- IN UINT8 Type,\r
- IN UINT16 SectionType,\r
- OUT EFI_GUID *FileName,\r
- OUT VOID **Pe32Data\r
- )\r
-/*++\r
-\r
-Routine Description:\r
-\r
- Finds a PE/COFF of a specific Type and SectionType in the Firmware Volumes\r
- described in the HOB list. Able to search in a compression set in a FFS file.\r
- But only one level of compression is supported, that is, not able to search\r
- in a compression set that is within another compression set.\r
-\r
-Arguments:\r
-\r
- Type - The Type of file to retrieve\r
-\r
- SectionType - The type of section to retrieve from a file\r
-\r
- FileName - The name of the file found in the Firmware Volume\r
-\r
- Pe32Data - Pointer to the beginning of the PE/COFF file found in the Firmware Volume\r
-\r
-Returns:\r
-\r
- EFI_SUCCESS - The file was found, and the name is returned in FileName, and a pointer to\r
- the PE/COFF image is returned in Pe32Data\r
-\r
- EFI_NOT_FOUND - The file was not found in the Firmware Volumes present in the HOB List\r
-\r
---*/\r
-{\r
- EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;\r
- EFI_FFS_FILE_HEADER *FfsFileHeader;\r
- VOID *SectionData;\r
- EFI_STATUS Status;\r
- EFI_PEI_HOB_POINTERS Hob;\r
-\r
-\r
- FwVolHeader = NULL;\r
- FfsFileHeader = NULL;\r
- SectionData = NULL;\r
-\r
- //\r
- // Foreach Firmware Volume, look for a specified type\r
- // of file and break out when one is found\r
- //\r
- Hob.Raw = GetHobList ();\r
- while ((Hob.Raw = GetNextHob (EFI_HOB_TYPE_FV, Hob.Raw)) != NULL) {\r
- FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (Hob.FirmwareVolume->BaseAddress);\r
- Status = PeiCoreFfsFindNextFile (\r
- Type,\r
- FwVolHeader,\r
- &FfsFileHeader\r
- );\r
- if (!EFI_ERROR (Status)) {\r
- CopyMem (FileName, &FfsFileHeader->Name, sizeof (EFI_GUID));\r
- Status = PeiProcessFile (\r
- SectionType,\r
- FfsFileHeader,\r
- Pe32Data\r
- );\r
- return Status;\r
- }\r
- Hob.Raw = GET_NEXT_HOB (Hob);\r
- }\r
- return EFI_NOT_FOUND;\r
-}\r
-\r
-EFI_STATUS\r
-PeiLoadx64File (\r
- IN EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader,\r
- IN VOID *Pe32Data,\r
- IN EFI_MEMORY_TYPE MemoryType,\r
- OUT EFI_PHYSICAL_ADDRESS *ImageAddress,\r
- OUT UINT64 *ImageSize,\r
- OUT EFI_PHYSICAL_ADDRESS *EntryPoint\r
- )\r
-/*++\r
-\r
-Routine Description:\r
-\r
- Loads and relocates a PE/COFF image into memory.\r
-\r
-Arguments:\r
-\r
- PeiEfiPeiPeCoffLoader - Pointer to a PE COFF loader protocol\r
-\r
- Pe32Data - The base address of the PE/COFF file that is to be loaded and relocated\r
-\r
- ImageAddress - The base address of the relocated PE/COFF image\r
-\r
- ImageSize - The size of the relocated PE/COFF image\r
-\r
- EntryPoint - The entry point of the relocated PE/COFF image\r
-\r
-Returns:\r
-\r
- EFI_SUCCESS - The file was loaded and relocated\r
- EFI_OUT_OF_RESOURCES - There was not enough memory to load and relocate the PE/COFF file\r
-\r
---*/\r
-{\r
- EFI_STATUS Status;\r
- PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;\r
- EFI_PHYSICAL_ADDRESS MemoryBuffer;\r
-\r
- ZeroMem (&ImageContext, sizeof (ImageContext));\r
- ImageContext.Handle = Pe32Data;\r
- Status = GetImageReadFunction (&ImageContext);\r
-\r
- ASSERT_EFI_ERROR (Status);\r
-\r
- Status = PeiEfiPeiPeCoffLoader->GetImageInfo (PeiEfiPeiPeCoffLoader, &ImageContext);\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- //\r
- // Allocate Memory for the image\r
- //\r
- //\r
- // Allocate Memory for the image\r
- //\r
- PeiCoreAllocatePages (MemoryType, EFI_SIZE_TO_PAGES ((UINT32) ImageContext.ImageSize), &MemoryBuffer);\r
- ImageContext.ImageAddress = MemoryBuffer;\r
- ASSERT (ImageContext.ImageAddress != 0);\r
-\r
- //\r
- // Load the image to our new buffer\r
- //\r
-\r
- Status = PeiEfiPeiPeCoffLoader->LoadImage (PeiEfiPeiPeCoffLoader, &ImageContext);\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- \r
- //\r
- // Relocate the image in our new buffer\r
- //\r
- Status = PeiEfiPeiPeCoffLoader->RelocateImage (PeiEfiPeiPeCoffLoader, &ImageContext);\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
-\r
- //\r
- // Flush the instruction cache so the image data is written before we execute it\r
- //\r
- InvalidateInstructionCacheRange ((VOID *)(UINTN)ImageContext.ImageAddress, (UINTN)ImageContext.ImageSize);\r
-\r
- *ImageAddress = ImageContext.ImageAddress;\r
- *ImageSize = ImageContext.ImageSize;\r
- *EntryPoint = ImageContext.EntryPoint;\r
-\r
- return EFI_SUCCESS;\r
-}\r
-\r
-EFI_STATUS\r
-ShadowDxeIpl (\r
- IN EFI_FFS_FILE_HEADER *DxeIplFileHeader,\r
- IN EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader\r
- )\r
-/*++\r
-\r
-Routine Description:\r
-\r
- Shadow the DXE IPL to a different memory location. This occurs after permanent\r
- memory has been discovered.\r
-\r
-Arguments:\r
-\r
- DxeIplFileHeader - Pointer to the FFS file header of the DXE IPL driver\r
-\r
- PeiEfiPeiPeCoffLoader - Pointer to a PE COFF loader protocol\r
-\r
-Returns:\r
-\r
- EFI_SUCCESS - DXE IPL was successfully shadowed to a different memory location.\r
-\r
- EFI_ ERROR - The shadow was unsuccessful.\r
-\r
-\r
---*/\r
-{\r
- UINTN SectionLength;\r
- UINTN OccupiedSectionLength;\r
- EFI_PHYSICAL_ADDRESS DxeIplAddress;\r
- UINT64 DxeIplSize;\r
- EFI_PHYSICAL_ADDRESS DxeIplEntryPoint;\r
- EFI_STATUS Status;\r
- EFI_COMMON_SECTION_HEADER *Section;\r
-\r
- Section = (EFI_COMMON_SECTION_HEADER *) (DxeIplFileHeader + 1);\r
-\r
- while ((Section->Type != EFI_SECTION_PE32) && (Section->Type != EFI_SECTION_TE)) {\r
- SectionLength = *(UINT32 *) (Section->Size) & 0x00ffffff;\r
- OccupiedSectionLength = GetOccupiedSize (SectionLength, 4);\r
- Section = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) Section + OccupiedSectionLength);\r
- }\r
- \r
- //\r
- // Relocate DxeIpl into memory by using loadfile service\r
- //\r
- Status = PeiLoadx64File (\r
- PeiEfiPeiPeCoffLoader,\r
- (VOID *) (Section + 1),\r
- EfiBootServicesData,\r
- &DxeIplAddress,\r
- &DxeIplSize,\r
- &DxeIplEntryPoint\r
- );\r
- \r
- if (Status == EFI_SUCCESS) {\r
- //\r
- // Install PeiInMemory to indicate the Dxeipl is shadowed\r
- //\r
- Status = PeiCoreInstallPpi (&mPpiPeiInMemory);\r
-\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
-\r
- Status = ((EFI_PEIM_ENTRY_POINT) (UINTN) DxeIplEntryPoint) (DxeIplFileHeader, GetPeiServicesTablePointer());\r
- }\r
-\r
- return Status;\r
-}\r
-\r
-EFI_STATUS\r
-EFIAPI\r
-DxeIplLoadFile (\r
- IN EFI_PEI_FV_FILE_LOADER_PPI *This,\r
- IN EFI_FFS_FILE_HEADER *FfsHeader,\r
- OUT EFI_PHYSICAL_ADDRESS *ImageAddress,\r
- OUT UINT64 *ImageSize,\r
- OUT EFI_PHYSICAL_ADDRESS *EntryPoint\r
- )\r
-/*++\r
-\r
-Routine Description:\r
-\r
- Given a pointer to an FFS file containing a PE32 image, get the\r
- information on the PE32 image, and then "load" it so that it\r
- can be executed.\r
-\r
-Arguments:\r
-\r
- This - pointer to our file loader protocol\r
- FfsHeader - pointer to the FFS file header of the FFS file that\r
- contains the PE32 image we want to load\r
- ImageAddress - returned address where the PE32 image is loaded\r
- ImageSize - returned size of the loaded PE32 image\r
- EntryPoint - entry point to the loaded PE32 image\r
-\r
-Returns:\r
- \r
- EFI_SUCCESS - The FFS file was successfully loaded.\r
- EFI_ERROR - Unable to load the FFS file.\r
-\r
---*/\r
-{\r
- EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader;\r
- EFI_STATUS Status;\r
- VOID *Pe32Data;\r
-\r
- Pe32Data = NULL;\r
- PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();\r
-\r
- //\r
- // Preprocess the FFS file to get a pointer to the PE32 information\r
- // in the enclosed PE32 image.\r
- //\r
- Status = PeiProcessFile (\r
- EFI_SECTION_PE32,\r
- FfsHeader,\r
- &Pe32Data\r
- );\r
-\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- //\r
- // Load the PE image from the FFS file\r
- //\r
- Status = PeiLoadx64File (\r
- PeiEfiPeiPeCoffLoader,\r
- Pe32Data,\r
- EfiBootServicesData,\r
- ImageAddress,\r
- ImageSize,\r
- EntryPoint\r
- );\r
-\r
- return Status;\r
-}\r
-\r
-EFI_STATUS\r
-PeiProcessFile (\r
- IN UINT16 SectionType,\r
- IN EFI_FFS_FILE_HEADER *FfsFileHeader,\r
- OUT VOID **Pe32Data\r
- )\r
-/*++\r
-\r
-Routine Description:\r
-\r
-Arguments:\r
-\r
- SectionType - The type of section in the FFS file to process.\r
-\r
- FfsFileHeader - Pointer to the FFS file to process, looking for the\r
- specified SectionType\r
-\r
- Pe32Data - returned pointer to the start of the PE32 image found\r
- in the FFS file.\r
-\r
-Returns:\r
-\r
- EFI_SUCCESS - found the PE32 section in the FFS file\r
-\r
---*/\r
-{\r
- EFI_STATUS Status;\r
- VOID *SectionData;\r
- DECOMPRESS_LIBRARY *DecompressLibrary;\r
- UINT8 *DstBuffer;\r
- UINT8 *ScratchBuffer;\r
- UINT32 DstBufferSize;\r
- UINT32 ScratchBufferSize;\r
- EFI_COMMON_SECTION_HEADER *CmpSection;\r
- UINTN CmpSectionLength;\r
- UINTN OccupiedCmpSectionLength;\r
- VOID *CmpFileData;\r
- UINTN CmpFileSize;\r
- EFI_COMMON_SECTION_HEADER *Section;\r
- UINTN SectionLength;\r
- UINTN OccupiedSectionLength;\r
- UINT64 FileSize;\r
- EFI_GUID_DEFINED_SECTION *GuidedSectionHeader;\r
- UINT32 AuthenticationStatus;\r
- EFI_PEI_SECTION_EXTRACTION_PPI *SectionExtract;\r
- UINT32 BufferSize;\r
- UINT8 *Buffer;\r
- EFI_PEI_SECURITY_PPI *Security;\r
- BOOLEAN StartCrisisRecovery;\r
- EFI_GUID TempGuid;\r
- EFI_FIRMWARE_VOLUME_HEADER *FvHeader;\r
- EFI_COMPRESSION_SECTION *CompressionSection;\r
-\r
- Status = PeiCoreFfsFindSectionData (\r
- EFI_SECTION_COMPRESSION,\r
- FfsFileHeader,\r
- &SectionData\r
- );\r
-\r
- //\r
- // Upon finding a DXE Core file, see if there is first a compression section\r
- //\r
- if (!EFI_ERROR (Status)) {\r
- //\r
- // Yes, there is a compression section, so extract the contents\r
- // Decompress the image here\r
- //\r
- Section = (EFI_COMMON_SECTION_HEADER *) (UINTN) (VOID *) ((UINT8 *) (FfsFileHeader) + (UINTN) sizeof (EFI_FFS_FILE_HEADER));\r
-\r
- do {\r
- SectionLength = *(UINT32 *) (Section->Size) & 0x00ffffff;\r
- OccupiedSectionLength = GetOccupiedSize (SectionLength, 4);\r
-\r
- //\r
- // Was the DXE Core file encapsulated in a GUID'd section?\r
- //\r
- if (Section->Type == EFI_SECTION_GUID_DEFINED) {\r
- //\r
- // Locate the GUID'd Section Extractor\r
- //\r
- GuidedSectionHeader = (VOID *) (Section + 1);\r
-\r
- //\r
- // This following code constitutes the addition of the security model\r
- // to the DXE IPL.\r
- //\r
- //\r
- // Set a default authenticatino state\r
- //\r
- AuthenticationStatus = 0;\r
-\r
- Status = PeiCoreLocatePpi (\r
- &gEfiPeiSectionExtractionPpiGuid,\r
- 0,\r
- NULL,\r
- (VOID **)&SectionExtract\r
- );\r
-\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- //\r
- // Verify Authentication State\r
- //\r
- CopyMem (&TempGuid, Section + 1, sizeof (EFI_GUID));\r
-\r
- Status = SectionExtract->PeiGetSection (\r
- GetPeiServicesTablePointer(),\r
- SectionExtract,\r
- (EFI_SECTION_TYPE *) &SectionType,\r
- &TempGuid,\r
- 0,\r
- (VOID **) &Buffer,\r
- &BufferSize,\r
- &AuthenticationStatus\r
- );\r
-\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- //\r
- // If not ask the Security PPI, if exists, for disposition\r
- //\r
- //\r
- Status = PeiCoreLocatePpi (\r
- &gEfiPeiSecurityPpiGuid,\r
- 0,\r
- NULL,\r
- (VOID **)&Security\r
- );\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
-\r
- Status = Security->AuthenticationState (\r
- GetPeiServicesTablePointer(),\r
- (struct _EFI_PEI_SECURITY_PPI *) Security,\r
- AuthenticationStatus,\r
- FfsFileHeader,\r
- &StartCrisisRecovery\r
- );\r
-\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- //\r
- // If there is a security violation, report to caller and have\r
- // the upper-level logic possible engender a crisis recovery\r
- //\r
- if (StartCrisisRecovery) {\r
- return EFI_SECURITY_VIOLATION;\r
- }\r
- }\r
-\r
- if (Section->Type == EFI_SECTION_PE32) {\r
- //\r
- // This is what we want\r
- //\r
- *Pe32Data = (VOID *) (Section + 1);\r
- return EFI_SUCCESS;\r
- } else if (Section->Type == EFI_SECTION_COMPRESSION) {\r
- //\r
- // This is a compression set, expand it\r
- //\r
- CompressionSection = (EFI_COMPRESSION_SECTION *) Section;\r
-\r
- switch (CompressionSection->CompressionType) {\r
- case EFI_STANDARD_COMPRESSION:\r
- DecompressLibrary = &gTianoDecompress;\r
- break;\r
-\r
- case EFI_CUSTOMIZED_COMPRESSION:\r
- //\r
- // Load user customized compression protocol.\r
- //\r
- DecompressLibrary = &gCustomDecompress;\r
- break;\r
-\r
- case EFI_NOT_COMPRESSED:\r
- default:\r
- //\r
- // Need to support not compressed file\r
- //\r
- ASSERT_EFI_ERROR (Status);\r
- return EFI_NOT_FOUND;\r
- }\r
-\r
- Status = DecompressLibrary->GetInfo (\r
- (UINT8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),\r
- (UINT32) SectionLength - sizeof (EFI_COMPRESSION_SECTION),\r
- &DstBufferSize,\r
- &ScratchBufferSize\r
- );\r
- if (EFI_ERROR (Status)) {\r
- //\r
- // GetInfo failed\r
- //\r
- return EFI_NOT_FOUND;\r
- }\r
-\r
- //\r
- // Allocate scratch buffer\r
- //\r
- ScratchBuffer = AllocatePages (EFI_SIZE_TO_PAGES (ScratchBufferSize));\r
- if (ScratchBuffer == NULL) {\r
- return EFI_OUT_OF_RESOURCES;\r
- }\r
-\r
- //\r
- // Allocate destination buffer\r
- //\r
- DstBuffer = AllocatePages (EFI_SIZE_TO_PAGES (DstBufferSize));\r
- if (DstBuffer == NULL) {\r
- return EFI_OUT_OF_RESOURCES;\r
- }\r
-\r
- //\r
- // Call decompress function\r
- //\r
- Status = DecompressLibrary->Decompress (\r
- (CHAR8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),\r
- DstBuffer,\r
- ScratchBuffer\r
- );\r
-\r
- CmpSection = (EFI_COMMON_SECTION_HEADER *) DstBuffer;\r
- if (CmpSection->Type == EFI_SECTION_RAW) {\r
- //\r
- // Skip the section header and\r
- // adjust the pointer alignment to 16\r
- //\r
- FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *) (DstBuffer + 16);\r
-\r
- if (FvHeader->Signature == EFI_FVH_SIGNATURE) {\r
- FfsFileHeader = NULL;\r
- BuildFvHob ((EFI_PHYSICAL_ADDRESS) (UINTN) FvHeader, FvHeader->FvLength);\r
- Status = PeiCoreFfsFindNextFile (\r
- EFI_FV_FILETYPE_DXE_CORE,\r
- FvHeader,\r
- &FfsFileHeader\r
- );\r
-\r
- if (EFI_ERROR (Status)) {\r
- return EFI_NOT_FOUND;\r
- }\r
-\r
- return PeiProcessFile (SectionType, FfsFileHeader, Pe32Data);\r
- }\r
- }\r
- //\r
- // Decompress successfully.\r
- // Loop the decompressed data searching for expected section.\r
- //\r
- CmpFileData = (VOID *) DstBuffer;\r
- CmpFileSize = DstBufferSize;\r
- do {\r
- CmpSectionLength = *(UINT32 *) (CmpSection->Size) & 0x00ffffff;\r
- if (CmpSection->Type == EFI_SECTION_PE32) {\r
- //\r
- // This is what we want\r
- //\r
- *Pe32Data = (VOID *) (CmpSection + 1);\r
- return EFI_SUCCESS;\r
- }\r
-\r
- OccupiedCmpSectionLength = GetOccupiedSize (CmpSectionLength, 4);\r
- CmpSection = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) CmpSection + OccupiedCmpSectionLength);\r
- } while (CmpSection->Type != 0 && (UINTN) ((UINT8 *) CmpSection - (UINT8 *) CmpFileData) < CmpFileSize);\r
- }\r
-\r
- Section = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) Section + OccupiedSectionLength);\r
- FileSize = FfsFileHeader->Size[0] & 0xFF;\r
- FileSize += (FfsFileHeader->Size[1] << 8) & 0xFF00;\r
- FileSize += (FfsFileHeader->Size[2] << 16) & 0xFF0000;\r
- FileSize &= 0x00FFFFFF;\r
- } while (Section->Type != 0 && (UINTN) ((UINT8 *) Section - (UINT8 *) FfsFileHeader) < FileSize);\r
-\r
- //\r
- // End of the decompression activity\r
- //\r
- } else {\r
-\r
- Status = PeiCoreFfsFindSectionData (\r
- EFI_SECTION_PE32,\r
- FfsFileHeader,\r
- &SectionData\r
- );\r
-\r
- if (EFI_ERROR (Status)) {\r
- Status = PeiCoreFfsFindSectionData (\r
- EFI_SECTION_TE,\r
- FfsFileHeader,\r
- &SectionData\r
- );\r
- if (EFI_ERROR (Status)) {\r
- return Status;\r
- }\r
- }\r
- }\r
-\r
- *Pe32Data = SectionData;\r
-\r
- return EFI_SUCCESS;\r
+/*++
+
+Copyright (c) 2006, Intel Corporation
+All rights reserved. This program and the accompanying materials
+are licensed and made available under the terms and conditions of the BSD License
+which accompanies this distribution. The full text of the license may be found at
+http://opensource.org/licenses/bsd-license.php
+
+THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+Module Name:
+
+ DxeLoad.c
+
+Abstract:
+
+ Last PEIM.
+ Responsibility of this module is to load the DXE Core from a Firmware Volume.
+
+--*/
+
+#include <DxeIpl.h>
+
+#pragma warning( disable : 4305 )
+
+BOOLEAN gInMemory = FALSE;
+
+//
+// GUID for EM64T
+//
+#define EFI_PPI_NEEDED_BY_DXE \
+ { \
+ 0x4d37da42, 0x3a0c, 0x4eda, 0xb9, 0xeb, 0xbc, 0x0e, 0x1d, 0xb4, 0x71, 0x3b \
+ }
+EFI_GUID mPpiNeededByDxeGuid = EFI_PPI_NEEDED_BY_DXE;
+
+//
+// Module Globals used in the DXE to PEI handoff
+// These must be module globals, so the stack can be switched
+//
+static EFI_DXE_IPL_PPI mDxeIplPpi = {
+ DxeLoadCore
+};
+
+static EFI_PEI_FV_FILE_LOADER_PPI mLoadFilePpi = {
+ DxeIplLoadFile
+};
+
+static EFI_PEI_PPI_DESCRIPTOR mPpiLoadFile = {
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
+ &gEfiPeiFvFileLoaderPpiGuid,
+ &mLoadFilePpi
+};
+
+static EFI_PEI_PPI_DESCRIPTOR mPpiList = {
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
+ &gEfiDxeIplPpiGuid,
+ &mDxeIplPpi
+};
+
+static EFI_PEI_PPI_DESCRIPTOR mPpiPeiInMemory = {
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
+ &gPeiInMemoryGuid,
+ NULL
+};
+
+static EFI_PEI_PPI_DESCRIPTOR mPpiSignal = {
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
+ &gEfiEndOfPeiSignalPpiGuid,
+ NULL
+};
+
+DECOMPRESS_LIBRARY gEfiDecompress = {
+ UefiDecompressGetInfo,
+ UefiDecompress
+};
+
+DECOMPRESS_LIBRARY gTianoDecompress = {
+ TianoDecompressGetInfo,
+ TianoDecompress
+};
+
+DECOMPRESS_LIBRARY gCustomDecompress = {
+ CustomDecompressGetInfo,
+ CustomDecompress
+};
+
+STATIC
+UINTN
+GetOccupiedSize (
+ IN UINTN ActualSize,
+ IN UINTN Alignment
+ )
+{
+ UINTN OccupiedSize;
+
+ OccupiedSize = ActualSize;
+ while ((OccupiedSize & (Alignment - 1)) != 0) {
+ OccupiedSize++;
+ }
+
+ return OccupiedSize;
+}
+
+EFI_STATUS
+EFIAPI
+PeimInitializeDxeIpl (
+ IN EFI_FFS_FILE_HEADER *FfsHeader,
+ IN EFI_PEI_SERVICES **PeiServices
+ )
+/*++
+
+Routine Description:
+
+ Initializes the Dxe Ipl PPI
+
+Arguments:
+
+ FfsHeader - Pointer to FFS file header
+ PeiServices - General purpose services available to every PEIM.
+
+Returns:
+
+ EFI_SUCCESS
+
+--*/
+{
+ EFI_STATUS Status;
+ EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader;
+ EFI_BOOT_MODE BootMode;
+
+ Status = PeiCoreGetBootMode (&BootMode);
+
+ ASSERT_EFI_ERROR (Status);
+
+ Status = PeiCoreLocatePpi (
+ &gPeiInMemoryGuid,
+ 0,
+ NULL,
+ NULL
+ );
+
+ if (EFI_ERROR (Status) && (BootMode != BOOT_ON_S3_RESUME)) {
+ //
+ // The DxeIpl has not yet been shadowed
+ //
+ PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();
+
+ //
+ // Shadow DxeIpl and then re-run its entry point
+ //
+ Status = ShadowDxeIpl (FfsHeader, PeiEfiPeiPeCoffLoader);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ } else {
+ if (BootMode != BOOT_ON_S3_RESUME) {
+ //
+ // The DxeIpl has been shadowed
+ //
+ gInMemory = TRUE;
+
+ //
+ // Install LoadFile PPI
+ //
+ Status = PeiCoreInstallPpi (&mPpiLoadFile);
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ }
+ //
+ // Install DxeIpl PPI
+ //
+ PeiCoreInstallPpi (&mPpiList);
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ }
+
+ return EFI_SUCCESS;
+}
+
+EFI_STATUS
+EFIAPI
+DxeLoadCore (
+ IN EFI_DXE_IPL_PPI *This,
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PEI_HOB_POINTERS HobList
+ )
+/*++
+
+Routine Description:
+
+ Main entry point to last PEIM
+
+Arguments:
+
+ This - Entry point for DXE IPL PPI
+ PeiServices - General purpose services available to every PEIM.
+ HobList - Address to the Pei HOB list
+
+Returns:
+
+ EFI_SUCCESS - DEX core was successfully loaded.
+ EFI_OUT_OF_RESOURCES - There are not enough resources to load DXE core.
+
+--*/
+{
+ EFI_STATUS Status;
+ EFI_PHYSICAL_ADDRESS TopOfStack;
+ EFI_PHYSICAL_ADDRESS BaseOfStack;
+ EFI_PHYSICAL_ADDRESS BspStore;
+ EFI_GUID DxeCoreFileName;
+ VOID *DxeCorePe32Data;
+ EFI_PHYSICAL_ADDRESS DxeCoreAddress;
+ UINT64 DxeCoreSize;
+ EFI_PHYSICAL_ADDRESS DxeCoreEntryPoint;
+ EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader;
+ EFI_BOOT_MODE BootMode;
+ EFI_PEI_RECOVERY_MODULE_PPI *PeiRecovery;
+ EFI_PEI_S3_RESUME_PPI *S3Resume;
+ EFI_PHYSICAL_ADDRESS PageTables;
+
+ TopOfStack = 0;
+ BaseOfStack = 0;
+ BspStore = 0;
+ Status = EFI_SUCCESS;
+
+ //
+ // if in S3 Resume, restore configure
+ //
+ Status = PeiCoreGetBootMode (&BootMode);
+
+ if (!EFI_ERROR (Status) && (BootMode == BOOT_ON_S3_RESUME)) {
+ Status = PeiCoreLocatePpi (
+ &gEfiPeiS3ResumePpiGuid,
+ 0,
+ NULL,
+ (VOID **)&S3Resume
+ );
+
+ ASSERT_EFI_ERROR (Status);
+
+ Status = S3Resume->S3RestoreConfig (PeiServices);
+
+ ASSERT_EFI_ERROR (Status);
+ }
+
+ Status = EFI_SUCCESS;
+
+ //
+ // Install the PEI Protocols that are shared between PEI and DXE
+ //
+#ifdef EFI_NT_EMULATOR
+ PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();
+ ASSERT (PeiEfiPeiPeCoffLoader != NULL);
+#else
+ PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderX64Protocol ();
+#endif
+
+#if 0
+ Status = InstallEfiPeiPeCoffLoader64 (PeiServices, &PeiEfiPeiPeCoffLoader, NULL);
+ ASSERT_EFI_ERROR (Status);
+#endif
+ //
+ // Allocate 128KB for the Stack
+ //
+ PeiCoreAllocatePages (EfiBootServicesData, EFI_SIZE_TO_PAGES (STACK_SIZE), &BaseOfStack);
+ ASSERT (BaseOfStack != 0);
+
+ //
+ // Compute the top of the stack we were allocated. Pre-allocate a 32 bytes
+ // for safety (PpisNeededByDxe and DxeCore).
+ //
+ TopOfStack = BaseOfStack + EFI_SIZE_TO_PAGES (STACK_SIZE) * EFI_PAGE_SIZE - 32;
+
+ //
+ // Add architecture-specifc HOBs (including the BspStore HOB)
+ //
+ Status = CreateArchSpecificHobs (&BspStore);
+ ASSERT_EFI_ERROR (Status);
+
+ //
+ // See if we are in crisis recovery
+ //
+ Status = PeiCoreGetBootMode (&BootMode);
+ if (!EFI_ERROR (Status) && (BootMode == BOOT_IN_RECOVERY_MODE)) {
+ Status = PeiCoreLocatePpi (
+ &gEfiPeiRecoveryModulePpiGuid,
+ 0,
+ NULL,
+ (VOID **)&PeiRecovery
+ );
+
+ ASSERT_EFI_ERROR (Status);
+ Status = PeiRecovery->LoadRecoveryCapsule (PeiServices, PeiRecovery);
+ ASSERT_EFI_ERROR (Status);
+ }
+
+ //
+ // Find the DXE Core in a Firmware Volume
+ //
+ Status = PeiFindFile (
+ EFI_FV_FILETYPE_DXE_CORE,
+ EFI_SECTION_PE32,
+ &DxeCoreFileName,
+ &DxeCorePe32Data
+ );
+ ASSERT_EFI_ERROR (Status);
+
+ //
+ // Transfer control to the DXE Core
+ // The handoff state is simply a pointer to the HOB list
+ //
+ // PEI_PERF_END (PeiServices, L"DxeIpl", NULL, 0);
+
+ Status = PeiCoreInstallPpi (&mPpiSignal);
+ ASSERT_EFI_ERROR (Status);
+
+ //
+ // Load the GDT of Go64. Since the GDT of 32-bit Tiano locates in the BS_DATA \
+ // memory, it may be corrupted when copying FV to high-end memory
+ LoadGo64Gdt();
+
+ //
+ // Limit to 36 bits of addressing for debug. Should get it from CPU
+ //
+ PageTables = CreateIdentityMappingPageTables (36);
+
+
+ //
+ // Load the DXE Core from a Firmware Volume
+ //
+ Status = PeiLoadx64File (
+ PeiEfiPeiPeCoffLoader,
+ DxeCorePe32Data,
+ EfiBootServicesData,
+ &DxeCoreAddress,
+ &DxeCoreSize,
+ &DxeCoreEntryPoint
+ );
+ ASSERT_EFI_ERROR (Status);
+
+ //
+ //
+ // Add HOB for the DXE Core
+ //
+ BuildModuleHob (
+ &DxeCoreFileName,
+ DxeCoreAddress,
+ DxeCoreSize,
+ DxeCoreEntryPoint
+ );
+
+ //
+ // Report Status Code EFI_SW_PEI_PC_HANDOFF_TO_NEXT
+ //
+ REPORT_STATUS_CODE (
+ EFI_PROGRESS_CODE,
+ EFI_SOFTWARE_PEI_MODULE | EFI_SW_PEI_CORE_PC_HANDOFF_TO_NEXT
+ );
+
+ DEBUG ((EFI_D_INFO, "DXE Core Entry\n"));
+ //
+ // Go to Long Mode. Interrupts will not get turned on until the CPU AP is loaded.
+ // Call x64 drivers passing in single argument, a pointer to the HOBs.
+ //
+ ActivateLongMode (
+ PageTables,
+ (EFI_PHYSICAL_ADDRESS)(UINTN)(HobList.Raw),
+ TopOfStack,
+ 0x00000000,
+ DxeCoreEntryPoint
+ );
+
+ //
+ // If we get here, then the DXE Core returned. This is an error
+ //
+ ASSERT_EFI_ERROR (Status);
+
+ return EFI_OUT_OF_RESOURCES;
+}
+
+EFI_STATUS
+PeiFindFile (
+ IN UINT8 Type,
+ IN UINT16 SectionType,
+ OUT EFI_GUID *FileName,
+ OUT VOID **Pe32Data
+ )
+/*++
+
+Routine Description:
+
+ Finds a PE/COFF of a specific Type and SectionType in the Firmware Volumes
+ described in the HOB list. Able to search in a compression set in a FFS file.
+ But only one level of compression is supported, that is, not able to search
+ in a compression set that is within another compression set.
+
+Arguments:
+
+ Type - The Type of file to retrieve
+
+ SectionType - The type of section to retrieve from a file
+
+ FileName - The name of the file found in the Firmware Volume
+
+ Pe32Data - Pointer to the beginning of the PE/COFF file found in the Firmware Volume
+
+Returns:
+
+ EFI_SUCCESS - The file was found, and the name is returned in FileName, and a pointer to
+ the PE/COFF image is returned in Pe32Data
+
+ EFI_NOT_FOUND - The file was not found in the Firmware Volumes present in the HOB List
+
+--*/
+{
+ EFI_FIRMWARE_VOLUME_HEADER *FwVolHeader;
+ EFI_FFS_FILE_HEADER *FfsFileHeader;
+ VOID *SectionData;
+ EFI_STATUS Status;
+ EFI_PEI_HOB_POINTERS Hob;
+
+
+ FwVolHeader = NULL;
+ FfsFileHeader = NULL;
+ SectionData = NULL;
+
+ //
+ // Foreach Firmware Volume, look for a specified type
+ // of file and break out when one is found
+ //
+ Hob.Raw = GetHobList ();
+ while ((Hob.Raw = GetNextHob (EFI_HOB_TYPE_FV, Hob.Raw)) != NULL) {
+ FwVolHeader = (EFI_FIRMWARE_VOLUME_HEADER *) (UINTN) (Hob.FirmwareVolume->BaseAddress);
+ Status = PeiCoreFfsFindNextFile (
+ Type,
+ FwVolHeader,
+ &FfsFileHeader
+ );
+ if (!EFI_ERROR (Status)) {
+ CopyMem (FileName, &FfsFileHeader->Name, sizeof (EFI_GUID));
+ Status = PeiProcessFile (
+ SectionType,
+ FfsFileHeader,
+ Pe32Data
+ );
+ return Status;
+ }
+ Hob.Raw = GET_NEXT_HOB (Hob);
+ }
+ return EFI_NOT_FOUND;
+}
+
+EFI_STATUS
+PeiLoadx64File (
+ IN EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader,
+ IN VOID *Pe32Data,
+ IN EFI_MEMORY_TYPE MemoryType,
+ OUT EFI_PHYSICAL_ADDRESS *ImageAddress,
+ OUT UINT64 *ImageSize,
+ OUT EFI_PHYSICAL_ADDRESS *EntryPoint
+ )
+/*++
+
+Routine Description:
+
+ Loads and relocates a PE/COFF image into memory.
+
+Arguments:
+
+ PeiEfiPeiPeCoffLoader - Pointer to a PE COFF loader protocol
+
+ Pe32Data - The base address of the PE/COFF file that is to be loaded and relocated
+
+ ImageAddress - The base address of the relocated PE/COFF image
+
+ ImageSize - The size of the relocated PE/COFF image
+
+ EntryPoint - The entry point of the relocated PE/COFF image
+
+Returns:
+
+ EFI_SUCCESS - The file was loaded and relocated
+ EFI_OUT_OF_RESOURCES - There was not enough memory to load and relocate the PE/COFF file
+
+--*/
+{
+ EFI_STATUS Status;
+ PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;
+ EFI_PHYSICAL_ADDRESS MemoryBuffer;
+
+ ZeroMem (&ImageContext, sizeof (ImageContext));
+ ImageContext.Handle = Pe32Data;
+ Status = GetImageReadFunction (&ImageContext);
+
+ ASSERT_EFI_ERROR (Status);
+
+ Status = PeiEfiPeiPeCoffLoader->GetImageInfo (PeiEfiPeiPeCoffLoader, &ImageContext);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ //
+ // Allocate Memory for the image
+ //
+ //
+ // Allocate Memory for the image
+ //
+ PeiCoreAllocatePages (MemoryType, EFI_SIZE_TO_PAGES ((UINT32) ImageContext.ImageSize), &MemoryBuffer);
+ ImageContext.ImageAddress = MemoryBuffer;
+ ASSERT (ImageContext.ImageAddress != 0);
+
+ //
+ // Load the image to our new buffer
+ //
+
+ Status = PeiEfiPeiPeCoffLoader->LoadImage (PeiEfiPeiPeCoffLoader, &ImageContext);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ //
+ // Relocate the image in our new buffer
+ //
+ Status = PeiEfiPeiPeCoffLoader->RelocateImage (PeiEfiPeiPeCoffLoader, &ImageContext);
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ //
+ // Flush the instruction cache so the image data is written before we execute it
+ //
+ InvalidateInstructionCacheRange ((VOID *)(UINTN)ImageContext.ImageAddress, (UINTN)ImageContext.ImageSize);
+
+ *ImageAddress = ImageContext.ImageAddress;
+ *ImageSize = ImageContext.ImageSize;
+ *EntryPoint = ImageContext.EntryPoint;
+
+ return EFI_SUCCESS;
+}
+
+EFI_STATUS
+ShadowDxeIpl (
+ IN EFI_FFS_FILE_HEADER *DxeIplFileHeader,
+ IN EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader
+ )
+/*++
+
+Routine Description:
+
+ Shadow the DXE IPL to a different memory location. This occurs after permanent
+ memory has been discovered.
+
+Arguments:
+
+ DxeIplFileHeader - Pointer to the FFS file header of the DXE IPL driver
+
+ PeiEfiPeiPeCoffLoader - Pointer to a PE COFF loader protocol
+
+Returns:
+
+ EFI_SUCCESS - DXE IPL was successfully shadowed to a different memory location.
+
+ EFI_ ERROR - The shadow was unsuccessful.
+
+
+--*/
+{
+ UINTN SectionLength;
+ UINTN OccupiedSectionLength;
+ EFI_PHYSICAL_ADDRESS DxeIplAddress;
+ UINT64 DxeIplSize;
+ EFI_PHYSICAL_ADDRESS DxeIplEntryPoint;
+ EFI_STATUS Status;
+ EFI_COMMON_SECTION_HEADER *Section;
+
+ Section = (EFI_COMMON_SECTION_HEADER *) (DxeIplFileHeader + 1);
+
+ while ((Section->Type != EFI_SECTION_PE32) && (Section->Type != EFI_SECTION_TE)) {
+ SectionLength = *(UINT32 *) (Section->Size) & 0x00ffffff;
+ OccupiedSectionLength = GetOccupiedSize (SectionLength, 4);
+ Section = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) Section + OccupiedSectionLength);
+ }
+
+ //
+ // Relocate DxeIpl into memory by using loadfile service
+ //
+ Status = PeiLoadx64File (
+ PeiEfiPeiPeCoffLoader,
+ (VOID *) (Section + 1),
+ EfiBootServicesData,
+ &DxeIplAddress,
+ &DxeIplSize,
+ &DxeIplEntryPoint
+ );
+
+ if (Status == EFI_SUCCESS) {
+ //
+ // Install PeiInMemory to indicate the Dxeipl is shadowed
+ //
+ Status = PeiCoreInstallPpi (&mPpiPeiInMemory);
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ Status = ((EFI_PEIM_ENTRY_POINT) (UINTN) DxeIplEntryPoint) (DxeIplFileHeader, GetPeiServicesTablePointer());
+ }
+
+ return Status;
+}
+
+EFI_STATUS
+EFIAPI
+DxeIplLoadFile (
+ IN EFI_PEI_FV_FILE_LOADER_PPI *This,
+ IN EFI_FFS_FILE_HEADER *FfsHeader,
+ OUT EFI_PHYSICAL_ADDRESS *ImageAddress,
+ OUT UINT64 *ImageSize,
+ OUT EFI_PHYSICAL_ADDRESS *EntryPoint
+ )
+/*++
+
+Routine Description:
+
+ Given a pointer to an FFS file containing a PE32 image, get the
+ information on the PE32 image, and then "load" it so that it
+ can be executed.
+
+Arguments:
+
+ This - pointer to our file loader protocol
+ FfsHeader - pointer to the FFS file header of the FFS file that
+ contains the PE32 image we want to load
+ ImageAddress - returned address where the PE32 image is loaded
+ ImageSize - returned size of the loaded PE32 image
+ EntryPoint - entry point to the loaded PE32 image
+
+Returns:
+
+ EFI_SUCCESS - The FFS file was successfully loaded.
+ EFI_ERROR - Unable to load the FFS file.
+
+--*/
+{
+ EFI_PEI_PE_COFF_LOADER_PROTOCOL *PeiEfiPeiPeCoffLoader;
+ EFI_STATUS Status;
+ VOID *Pe32Data;
+
+ Pe32Data = NULL;
+ PeiEfiPeiPeCoffLoader = (EFI_PEI_PE_COFF_LOADER_PROTOCOL *)GetPeCoffLoaderProtocol ();
+
+ //
+ // Preprocess the FFS file to get a pointer to the PE32 information
+ // in the enclosed PE32 image.
+ //
+ Status = PeiProcessFile (
+ EFI_SECTION_PE32,
+ FfsHeader,
+ &Pe32Data
+ );
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ //
+ // Load the PE image from the FFS file
+ //
+ Status = PeiLoadx64File (
+ PeiEfiPeiPeCoffLoader,
+ Pe32Data,
+ EfiBootServicesData,
+ ImageAddress,
+ ImageSize,
+ EntryPoint
+ );
+
+ return Status;
+}
+
+EFI_STATUS
+PeiProcessFile (
+ IN UINT16 SectionType,
+ IN EFI_FFS_FILE_HEADER *FfsFileHeader,
+ OUT VOID **Pe32Data
+ )
+/*++
+
+Routine Description:
+
+Arguments:
+
+ SectionType - The type of section in the FFS file to process.
+
+ FfsFileHeader - Pointer to the FFS file to process, looking for the
+ specified SectionType
+
+ Pe32Data - returned pointer to the start of the PE32 image found
+ in the FFS file.
+
+Returns:
+
+ EFI_SUCCESS - found the PE32 section in the FFS file
+
+--*/
+{
+ EFI_STATUS Status;
+ VOID *SectionData;
+ DECOMPRESS_LIBRARY *DecompressLibrary;
+ UINT8 *DstBuffer;
+ UINT8 *ScratchBuffer;
+ UINT32 DstBufferSize;
+ UINT32 ScratchBufferSize;
+ EFI_COMMON_SECTION_HEADER *CmpSection;
+ UINTN CmpSectionLength;
+ UINTN OccupiedCmpSectionLength;
+ VOID *CmpFileData;
+ UINTN CmpFileSize;
+ EFI_COMMON_SECTION_HEADER *Section;
+ UINTN SectionLength;
+ UINTN OccupiedSectionLength;
+ UINT64 FileSize;
+ EFI_GUID_DEFINED_SECTION *GuidedSectionHeader;
+ UINT32 AuthenticationStatus;
+ EFI_PEI_SECTION_EXTRACTION_PPI *SectionExtract;
+ UINT32 BufferSize;
+ UINT8 *Buffer;
+ EFI_PEI_SECURITY_PPI *Security;
+ BOOLEAN StartCrisisRecovery;
+ EFI_GUID TempGuid;
+ EFI_FIRMWARE_VOLUME_HEADER *FvHeader;
+ EFI_COMPRESSION_SECTION *CompressionSection;
+
+ Status = PeiCoreFfsFindSectionData (
+ EFI_SECTION_COMPRESSION,
+ FfsFileHeader,
+ &SectionData
+ );
+
+ //
+ // Upon finding a DXE Core file, see if there is first a compression section
+ //
+ if (!EFI_ERROR (Status)) {
+ //
+ // Yes, there is a compression section, so extract the contents
+ // Decompress the image here
+ //
+ Section = (EFI_COMMON_SECTION_HEADER *) (UINTN) (VOID *) ((UINT8 *) (FfsFileHeader) + (UINTN) sizeof (EFI_FFS_FILE_HEADER));
+
+ do {
+ SectionLength = *(UINT32 *) (Section->Size) & 0x00ffffff;
+ OccupiedSectionLength = GetOccupiedSize (SectionLength, 4);
+
+ //
+ // Was the DXE Core file encapsulated in a GUID'd section?
+ //
+ if (Section->Type == EFI_SECTION_GUID_DEFINED) {
+ //
+ // Locate the GUID'd Section Extractor
+ //
+ GuidedSectionHeader = (VOID *) (Section + 1);
+
+ //
+ // This following code constitutes the addition of the security model
+ // to the DXE IPL.
+ //
+ //
+ // Set a default authenticatino state
+ //
+ AuthenticationStatus = 0;
+
+ Status = PeiCoreLocatePpi (
+ &gEfiPeiSectionExtractionPpiGuid,
+ 0,
+ NULL,
+ (VOID **)&SectionExtract
+ );
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ //
+ // Verify Authentication State
+ //
+ CopyMem (&TempGuid, Section + 1, sizeof (EFI_GUID));
+
+ Status = SectionExtract->PeiGetSection (
+ GetPeiServicesTablePointer(),
+ SectionExtract,
+ (EFI_SECTION_TYPE *) &SectionType,
+ &TempGuid,
+ 0,
+ (VOID **) &Buffer,
+ &BufferSize,
+ &AuthenticationStatus
+ );
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ //
+ // If not ask the Security PPI, if exists, for disposition
+ //
+ //
+ Status = PeiCoreLocatePpi (
+ &gEfiPeiSecurityPpiGuid,
+ 0,
+ NULL,
+ (VOID **)&Security
+ );
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ Status = Security->AuthenticationState (
+ GetPeiServicesTablePointer(),
+ (struct _EFI_PEI_SECURITY_PPI *) Security,
+ AuthenticationStatus,
+ FfsFileHeader,
+ &StartCrisisRecovery
+ );
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ //
+ // If there is a security violation, report to caller and have
+ // the upper-level logic possible engender a crisis recovery
+ //
+ if (StartCrisisRecovery) {
+ return EFI_SECURITY_VIOLATION;
+ }
+ }
+
+ if (Section->Type == EFI_SECTION_PE32) {
+ //
+ // This is what we want
+ //
+ *Pe32Data = (VOID *) (Section + 1);
+ return EFI_SUCCESS;
+ } else if (Section->Type == EFI_SECTION_COMPRESSION) {
+ //
+ // This is a compression set, expand it
+ //
+ CompressionSection = (EFI_COMPRESSION_SECTION *) Section;
+
+ switch (CompressionSection->CompressionType) {
+ case EFI_STANDARD_COMPRESSION:
+ DecompressLibrary = &gTianoDecompress;
+ break;
+
+ case EFI_CUSTOMIZED_COMPRESSION:
+ //
+ // Load user customized compression protocol.
+ //
+ DecompressLibrary = &gCustomDecompress;
+ break;
+
+ case EFI_NOT_COMPRESSED:
+ default:
+ //
+ // Need to support not compressed file
+ //
+ ASSERT_EFI_ERROR (Status);
+ return EFI_NOT_FOUND;
+ }
+
+ Status = DecompressLibrary->GetInfo (
+ (UINT8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),
+ (UINT32) SectionLength - sizeof (EFI_COMPRESSION_SECTION),
+ &DstBufferSize,
+ &ScratchBufferSize
+ );
+ if (EFI_ERROR (Status)) {
+ //
+ // GetInfo failed
+ //
+ return EFI_NOT_FOUND;
+ }
+
+ //
+ // Allocate scratch buffer
+ //
+ ScratchBuffer = AllocatePages (EFI_SIZE_TO_PAGES (ScratchBufferSize));
+ if (ScratchBuffer == NULL) {
+ return EFI_OUT_OF_RESOURCES;
+ }
+
+ //
+ // Allocate destination buffer
+ //
+ DstBuffer = AllocatePages (EFI_SIZE_TO_PAGES (DstBufferSize));
+ if (DstBuffer == NULL) {
+ return EFI_OUT_OF_RESOURCES;
+ }
+
+ //
+ // Call decompress function
+ //
+ Status = DecompressLibrary->Decompress (
+ (CHAR8 *) ((EFI_COMPRESSION_SECTION *) Section + 1),
+ DstBuffer,
+ ScratchBuffer
+ );
+
+ CmpSection = (EFI_COMMON_SECTION_HEADER *) DstBuffer;
+ if (CmpSection->Type == EFI_SECTION_RAW) {
+ //
+ // Skip the section header and
+ // adjust the pointer alignment to 16
+ //
+ FvHeader = (EFI_FIRMWARE_VOLUME_HEADER *) (DstBuffer + 16);
+
+ if (FvHeader->Signature == EFI_FVH_SIGNATURE) {
+ FfsFileHeader = NULL;
+ BuildFvHob ((EFI_PHYSICAL_ADDRESS) (UINTN) FvHeader, FvHeader->FvLength);
+ Status = PeiCoreFfsFindNextFile (
+ EFI_FV_FILETYPE_DXE_CORE,
+ FvHeader,
+ &FfsFileHeader
+ );
+
+ if (EFI_ERROR (Status)) {
+ return EFI_NOT_FOUND;
+ }
+
+ return PeiProcessFile (SectionType, FfsFileHeader, Pe32Data);
+ }
+ }
+ //
+ // Decompress successfully.
+ // Loop the decompressed data searching for expected section.
+ //
+ CmpFileData = (VOID *) DstBuffer;
+ CmpFileSize = DstBufferSize;
+ do {
+ CmpSectionLength = *(UINT32 *) (CmpSection->Size) & 0x00ffffff;
+ if (CmpSection->Type == EFI_SECTION_PE32) {
+ //
+ // This is what we want
+ //
+ *Pe32Data = (VOID *) (CmpSection + 1);
+ return EFI_SUCCESS;
+ }
+
+ OccupiedCmpSectionLength = GetOccupiedSize (CmpSectionLength, 4);
+ CmpSection = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) CmpSection + OccupiedCmpSectionLength);
+ } while (CmpSection->Type != 0 && (UINTN) ((UINT8 *) CmpSection - (UINT8 *) CmpFileData) < CmpFileSize);
+ }
+
+ Section = (EFI_COMMON_SECTION_HEADER *) ((UINT8 *) Section + OccupiedSectionLength);
+ FileSize = FfsFileHeader->Size[0] & 0xFF;
+ FileSize += (FfsFileHeader->Size[1] << 8) & 0xFF00;
+ FileSize += (FfsFileHeader->Size[2] << 16) & 0xFF0000;
+ FileSize &= 0x00FFFFFF;
+ } while (Section->Type != 0 && (UINTN) ((UINT8 *) Section - (UINT8 *) FfsFileHeader) < FileSize);
+
+ //
+ // End of the decompression activity
+ //
+ } else {
+
+ Status = PeiCoreFfsFindSectionData (
+ EFI_SECTION_PE32,
+ FfsFileHeader,
+ &SectionData
+ );
+
+ if (EFI_ERROR (Status)) {
+ Status = PeiCoreFfsFindSectionData (
+ EFI_SECTION_TE,
+ FfsFileHeader,
+ &SectionData
+ );
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+ }
+ }
+
+ *Pe32Data = SectionData;
+
+ return EFI_SUCCESS;
}
\ No newline at end of file