mirror of https://github.com/acidanthera/audk.git
383 lines
11 KiB
C
383 lines
11 KiB
C
|
/** @file
|
||
|
This is the driver that publishes the SMM Access Ppi
|
||
|
instance for the Quark SOC.
|
||
|
|
||
|
Copyright (c) 2013-2015 Intel Corporation.
|
||
|
|
||
|
This program and the accompanying materials
|
||
|
are licensed and made available under the terms and conditions of the BSD License
|
||
|
which accompanies this distribution. The full text of the license may be found at
|
||
|
http://opensource.org/licenses/bsd-license.php
|
||
|
|
||
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||
|
|
||
|
**/
|
||
|
#include <PiPei.h>
|
||
|
#include <Ppi/SmmAccess.h>
|
||
|
#include <Guid/SmramMemoryReserve.h>
|
||
|
#include <Library/BaseMemoryLib.h>
|
||
|
#include <Library/MemoryAllocationLib.h>
|
||
|
#include <Library/DebugLib.h>
|
||
|
#include <Library/HobLib.h>
|
||
|
#include <Library/PciLib.h>
|
||
|
#include <Library/PeiServicesLib.h>
|
||
|
#include <Library/QNCSmmLib.h>
|
||
|
#include <QNCAccess.h>
|
||
|
|
||
|
#define SMM_ACCESS_PRIVATE_DATA_FROM_THIS(a) \
|
||
|
CR ( \
|
||
|
a, \
|
||
|
SMM_ACCESS_PRIVATE_DATA, \
|
||
|
SmmAccess, \
|
||
|
SMM_ACCESS_PRIVATE_DATA_SIGNATURE \
|
||
|
)
|
||
|
|
||
|
#define MAX_CPU_SOCKET 1
|
||
|
#define MAX_SMRAM_RANGES 4
|
||
|
|
||
|
typedef struct {
|
||
|
UINTN Signature;
|
||
|
EFI_HANDLE Handle;
|
||
|
PEI_SMM_ACCESS_PPI SmmAccess;
|
||
|
UINTN NumberRegions;
|
||
|
EFI_SMRAM_DESCRIPTOR SmramDesc[MAX_SMRAM_RANGES];
|
||
|
UINT8 TsegSize;
|
||
|
UINT8 MaxBusNumber;
|
||
|
UINT8 SocketPopulated[MAX_CPU_SOCKET];
|
||
|
UINT8 SocketBusNum[MAX_CPU_SOCKET];
|
||
|
} SMM_ACCESS_PRIVATE_DATA;
|
||
|
|
||
|
#define SMM_ACCESS_PRIVATE_DATA_SIGNATURE SIGNATURE_32 ('i', 's', 'm', 'a')
|
||
|
|
||
|
|
||
|
EFI_STATUS
|
||
|
EFIAPI
|
||
|
Open (
|
||
|
IN EFI_PEI_SERVICES **PeiServices,
|
||
|
IN PEI_SMM_ACCESS_PPI *This,
|
||
|
IN UINTN DescriptorIndex
|
||
|
)
|
||
|
/*++
|
||
|
|
||
|
Routine Description:
|
||
|
|
||
|
This routine accepts a request to "open" a region of SMRAM. The
|
||
|
region could be legacy ABSEG, HSEG, or TSEG near top of physical memory.
|
||
|
The use of "open" means that the memory is visible from all PEIM
|
||
|
and SMM agents.
|
||
|
|
||
|
Arguments:
|
||
|
|
||
|
PeiServices - General purpose services available to every PEIM.
|
||
|
This - Pointer to the SMM Access Interface.
|
||
|
DescriptorIndex - Region of SMRAM to Open.
|
||
|
|
||
|
Returns:
|
||
|
|
||
|
EFI_SUCCESS - The region was successfully opened.
|
||
|
EFI_DEVICE_ERROR - The region could not be opened because locked by
|
||
|
chipset.
|
||
|
EFI_INVALID_PARAMETER - The descriptor index was out of bounds.
|
||
|
|
||
|
--*/
|
||
|
{
|
||
|
SMM_ACCESS_PRIVATE_DATA *SmmAccess;
|
||
|
|
||
|
SmmAccess = SMM_ACCESS_PRIVATE_DATA_FROM_THIS (This);
|
||
|
|
||
|
if (DescriptorIndex >= SmmAccess->NumberRegions) {
|
||
|
return EFI_INVALID_PARAMETER;
|
||
|
} else if (SmmAccess->SmramDesc[DescriptorIndex].RegionState & EFI_SMRAM_LOCKED) {
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
//
|
||
|
// Open TSEG
|
||
|
//
|
||
|
if (!QNCOpenSmramRegion ()) {
|
||
|
SmmAccess->SmramDesc[DescriptorIndex].RegionState |= EFI_SMRAM_LOCKED;
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
SmmAccess->SmramDesc[DescriptorIndex].RegionState &= ~(EFI_SMRAM_CLOSED | EFI_ALLOCATED);
|
||
|
SmmAccess->SmramDesc[DescriptorIndex].RegionState |= EFI_SMRAM_OPEN;
|
||
|
SmmAccess->SmmAccess.OpenState = TRUE;
|
||
|
|
||
|
return EFI_SUCCESS;
|
||
|
}
|
||
|
|
||
|
EFI_STATUS
|
||
|
EFIAPI
|
||
|
Close (
|
||
|
IN EFI_PEI_SERVICES **PeiServices,
|
||
|
IN PEI_SMM_ACCESS_PPI *This,
|
||
|
IN UINTN DescriptorIndex
|
||
|
)
|
||
|
/*++
|
||
|
|
||
|
Routine Description:
|
||
|
|
||
|
This routine accepts a request to "close" a region of SMRAM. This is valid for
|
||
|
compatible SMRAM region.
|
||
|
|
||
|
Arguments:
|
||
|
|
||
|
PeiServices - General purpose services available to every PEIM.
|
||
|
This - Pointer to the SMM Access Interface.
|
||
|
DescriptorIndex - Region of SMRAM to Close.
|
||
|
|
||
|
Returns:
|
||
|
|
||
|
EFI_SUCCESS - The region was successfully closed.
|
||
|
EFI_DEVICE_ERROR - The region could not be closed because locked by
|
||
|
chipset.
|
||
|
EFI_INVALID_PARAMETER - The descriptor index was out of bounds.
|
||
|
|
||
|
--*/
|
||
|
{
|
||
|
SMM_ACCESS_PRIVATE_DATA *SmmAccess;
|
||
|
BOOLEAN OpenState;
|
||
|
UINTN Index;
|
||
|
|
||
|
|
||
|
SmmAccess = SMM_ACCESS_PRIVATE_DATA_FROM_THIS (This);
|
||
|
|
||
|
if (DescriptorIndex >= SmmAccess->NumberRegions) {
|
||
|
return EFI_INVALID_PARAMETER;
|
||
|
} else if (SmmAccess->SmramDesc[DescriptorIndex].RegionState & EFI_SMRAM_LOCKED) {
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
if (SmmAccess->SmramDesc[DescriptorIndex].RegionState & EFI_SMRAM_CLOSED) {
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
//
|
||
|
// Close TSEG
|
||
|
//
|
||
|
if (!QNCCloseSmramRegion ()) {
|
||
|
SmmAccess->SmramDesc[DescriptorIndex].RegionState |= EFI_SMRAM_LOCKED;
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
SmmAccess->SmramDesc[DescriptorIndex].RegionState &= ~EFI_SMRAM_OPEN;
|
||
|
SmmAccess->SmramDesc[DescriptorIndex].RegionState |= (EFI_SMRAM_CLOSED | EFI_ALLOCATED);
|
||
|
|
||
|
//
|
||
|
// Find out if any regions are still open
|
||
|
//
|
||
|
OpenState = FALSE;
|
||
|
for (Index = 0; Index < SmmAccess->NumberRegions; Index++) {
|
||
|
if ((SmmAccess->SmramDesc[Index].RegionState & EFI_SMRAM_OPEN) == EFI_SMRAM_OPEN) {
|
||
|
OpenState = TRUE;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
SmmAccess->SmmAccess.OpenState = OpenState;
|
||
|
|
||
|
return EFI_SUCCESS;
|
||
|
}
|
||
|
|
||
|
EFI_STATUS
|
||
|
EFIAPI
|
||
|
Lock (
|
||
|
IN EFI_PEI_SERVICES **PeiServices,
|
||
|
IN PEI_SMM_ACCESS_PPI *This,
|
||
|
IN UINTN DescriptorIndex
|
||
|
)
|
||
|
/*++
|
||
|
|
||
|
Routine Description:
|
||
|
|
||
|
This routine accepts a request to "lock" SMRAM. The
|
||
|
region could be legacy AB or TSEG near top of physical memory.
|
||
|
The use of "lock" means that the memory can no longer be opened
|
||
|
to PEIM.
|
||
|
|
||
|
Arguments:
|
||
|
|
||
|
PeiServices - General purpose services available to every PEIM.
|
||
|
This - Pointer to the SMM Access Interface.
|
||
|
DescriptorIndex - Region of SMRAM to Lock.
|
||
|
|
||
|
Returns:
|
||
|
|
||
|
EFI_SUCCESS - The region was successfully locked.
|
||
|
EFI_DEVICE_ERROR - The region could not be locked because at least
|
||
|
one range is still open.
|
||
|
EFI_INVALID_PARAMETER - The descriptor index was out of bounds.
|
||
|
|
||
|
--*/
|
||
|
{
|
||
|
SMM_ACCESS_PRIVATE_DATA *SmmAccess;
|
||
|
|
||
|
SmmAccess = SMM_ACCESS_PRIVATE_DATA_FROM_THIS (This);
|
||
|
|
||
|
if (DescriptorIndex >= SmmAccess->NumberRegions) {
|
||
|
return EFI_INVALID_PARAMETER;
|
||
|
} else if (SmmAccess->SmmAccess.OpenState) {
|
||
|
return EFI_DEVICE_ERROR;
|
||
|
}
|
||
|
|
||
|
SmmAccess->SmramDesc[DescriptorIndex].RegionState |= EFI_SMRAM_LOCKED;
|
||
|
SmmAccess->SmmAccess.LockState = TRUE;
|
||
|
|
||
|
//
|
||
|
// Lock TSEG
|
||
|
//
|
||
|
QNCLockSmramRegion ();
|
||
|
|
||
|
return EFI_SUCCESS;
|
||
|
}
|
||
|
|
||
|
EFI_STATUS
|
||
|
EFIAPI
|
||
|
GetCapabilities (
|
||
|
IN EFI_PEI_SERVICES **PeiServices,
|
||
|
IN PEI_SMM_ACCESS_PPI *This,
|
||
|
IN OUT UINTN *SmramMapSize,
|
||
|
IN OUT EFI_SMRAM_DESCRIPTOR *SmramMap
|
||
|
)
|
||
|
/*++
|
||
|
|
||
|
Routine Description:
|
||
|
|
||
|
This routine services a user request to discover the SMRAM
|
||
|
capabilities of this platform. This will report the possible
|
||
|
ranges that are possible for SMRAM access, based upon the
|
||
|
memory controller capabilities.
|
||
|
|
||
|
Arguments:
|
||
|
|
||
|
PeiServices - General purpose services available to every PEIM.
|
||
|
This - Pointer to the SMRAM Access Interface.
|
||
|
SmramMapSize - Pointer to the variable containing size of the
|
||
|
buffer to contain the description information.
|
||
|
SmramMap - Buffer containing the data describing the Smram
|
||
|
region descriptors.
|
||
|
Returns:
|
||
|
|
||
|
EFI_BUFFER_TOO_SMALL - The user did not provide a sufficient buffer.
|
||
|
EFI_SUCCESS - The user provided a sufficiently-sized buffer.
|
||
|
|
||
|
--*/
|
||
|
{
|
||
|
EFI_STATUS Status;
|
||
|
SMM_ACCESS_PRIVATE_DATA *SmmAccess;
|
||
|
UINTN BufferSize;
|
||
|
|
||
|
SmmAccess = SMM_ACCESS_PRIVATE_DATA_FROM_THIS (This);
|
||
|
BufferSize = SmmAccess->NumberRegions * sizeof (EFI_SMRAM_DESCRIPTOR);
|
||
|
|
||
|
if (*SmramMapSize < BufferSize) {
|
||
|
Status = EFI_BUFFER_TOO_SMALL;
|
||
|
} else {
|
||
|
CopyMem (SmramMap, SmmAccess->SmramDesc, *SmramMapSize);
|
||
|
Status = EFI_SUCCESS;
|
||
|
}
|
||
|
|
||
|
*SmramMapSize = BufferSize;
|
||
|
|
||
|
return Status;
|
||
|
}
|
||
|
|
||
|
|
||
|
EFI_STATUS
|
||
|
EFIAPI
|
||
|
SmmAccessPeiEntryPoint (
|
||
|
IN EFI_PEI_FILE_HANDLE FileHandle,
|
||
|
IN CONST EFI_PEI_SERVICES **PeiServices
|
||
|
)
|
||
|
/*++
|
||
|
|
||
|
Routine Description:
|
||
|
|
||
|
This is the constructor for the SMM Access Ppi
|
||
|
|
||
|
Arguments:
|
||
|
|
||
|
FfsHeader - FfsHeader.
|
||
|
PeiServices - General purpose services available to every PEIM.
|
||
|
|
||
|
Returns:
|
||
|
|
||
|
EFI_SUCCESS - Protocol successfully started and installed.
|
||
|
EFI_UNSUPPORTED - Protocol can't be started.
|
||
|
--*/
|
||
|
{
|
||
|
|
||
|
EFI_STATUS Status;
|
||
|
UINTN Index;
|
||
|
EFI_SMRAM_HOB_DESCRIPTOR_BLOCK *DescriptorBlock;
|
||
|
SMM_ACCESS_PRIVATE_DATA *SmmAccessPrivate;
|
||
|
EFI_PEI_PPI_DESCRIPTOR *PpiList;
|
||
|
EFI_HOB_GUID_TYPE *GuidHob;
|
||
|
|
||
|
//
|
||
|
// Initialize private data
|
||
|
//
|
||
|
SmmAccessPrivate = AllocatePool (sizeof(*SmmAccessPrivate));
|
||
|
ASSERT(SmmAccessPrivate);
|
||
|
|
||
|
PpiList = AllocatePool (sizeof(*PpiList));
|
||
|
ASSERT (PpiList);
|
||
|
|
||
|
//
|
||
|
// Build SMM related information
|
||
|
//
|
||
|
SmmAccessPrivate->Signature = SMM_ACCESS_PRIVATE_DATA_SIGNATURE;
|
||
|
|
||
|
//
|
||
|
// Get Hob list
|
||
|
//
|
||
|
GuidHob = GetFirstGuidHob (&gEfiSmmPeiSmramMemoryReserveGuid);
|
||
|
DescriptorBlock = GET_GUID_HOB_DATA (GuidHob);
|
||
|
ASSERT (DescriptorBlock);
|
||
|
|
||
|
// Get CPU Max bus number
|
||
|
|
||
|
SmmAccessPrivate->MaxBusNumber = PCI_BUS_NUMBER_QNC;
|
||
|
for (Index = 0; Index < MAX_CPU_SOCKET; Index++) {
|
||
|
SmmAccessPrivate->SocketPopulated[Index] = TRUE;
|
||
|
SmmAccessPrivate->SocketBusNum[Index] = PCI_BUS_NUMBER_QNC;
|
||
|
}
|
||
|
|
||
|
//
|
||
|
// Use the hob to publish SMRAM capabilities
|
||
|
//
|
||
|
ASSERT (DescriptorBlock->NumberOfSmmReservedRegions <= MAX_SMRAM_RANGES);
|
||
|
for (Index = 0; Index < DescriptorBlock->NumberOfSmmReservedRegions; Index++) {
|
||
|
SmmAccessPrivate->SmramDesc[Index].PhysicalStart = DescriptorBlock->Descriptor[Index].PhysicalStart;
|
||
|
SmmAccessPrivate->SmramDesc[Index].CpuStart = DescriptorBlock->Descriptor[Index].CpuStart;
|
||
|
SmmAccessPrivate->SmramDesc[Index].PhysicalSize = DescriptorBlock->Descriptor[Index].PhysicalSize;
|
||
|
SmmAccessPrivate->SmramDesc[Index].RegionState = DescriptorBlock->Descriptor[Index].RegionState;
|
||
|
}
|
||
|
|
||
|
SmmAccessPrivate->NumberRegions = Index;
|
||
|
SmmAccessPrivate->SmmAccess.Open = Open;
|
||
|
SmmAccessPrivate->SmmAccess.Close = Close;
|
||
|
SmmAccessPrivate->SmmAccess.Lock = Lock;
|
||
|
SmmAccessPrivate->SmmAccess.GetCapabilities = GetCapabilities;
|
||
|
SmmAccessPrivate->SmmAccess.LockState = FALSE;
|
||
|
SmmAccessPrivate->SmmAccess.OpenState = FALSE;
|
||
|
|
||
|
PpiList->Flags = (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST);
|
||
|
PpiList->Guid = &gPeiSmmAccessPpiGuid;
|
||
|
PpiList->Ppi = &SmmAccessPrivate->SmmAccess;
|
||
|
|
||
|
Status = (**PeiServices).InstallPpi (PeiServices, PpiList);
|
||
|
ASSERT_EFI_ERROR(Status);
|
||
|
|
||
|
DEBUG (
|
||
|
(EFI_D_INFO, "SMM Base:Size %08X:%08X\n",
|
||
|
(UINTN)(SmmAccessPrivate->SmramDesc[SmmAccessPrivate->NumberRegions-1].PhysicalStart),
|
||
|
(UINTN)(SmmAccessPrivate->SmramDesc[SmmAccessPrivate->NumberRegions-1].PhysicalSize)
|
||
|
));
|
||
|
|
||
|
SmmAccessPrivate->TsegSize = (UINT8)(SmmAccessPrivate->SmramDesc[SmmAccessPrivate->NumberRegions-1].PhysicalSize);
|
||
|
|
||
|
return EFI_SUCCESS;
|
||
|
}
|
||
|
|