mirror of https://github.com/acidanthera/audk.git
1206 lines
41 KiB
C
1206 lines
41 KiB
C
/** @file
|
|
SMM IPL that produces SMM related runtime protocols and load the SMM Core into SMRAM
|
|
|
|
Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.<BR>
|
|
This program and the accompanying materials are licensed and made available
|
|
under the terms and conditions of the BSD License which accompanies this
|
|
distribution. The full text of the license may be found at
|
|
http://opensource.org/licenses/bsd-license.php
|
|
|
|
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|
|
|
**/
|
|
|
|
#include <PiDxe.h>
|
|
|
|
#include <Protocol/SmmBase2.h>
|
|
#include <Protocol/SmmCommunication.h>
|
|
#include <Protocol/SmmAccess2.h>
|
|
#include <Protocol/SmmConfiguration.h>
|
|
#include <Protocol/SmmControl2.h>
|
|
#include <Protocol/DxeSmmReadyToLock.h>
|
|
#include <Protocol/Cpu.h>
|
|
|
|
#include <Guid/EventGroup.h>
|
|
#include <Guid/EventLegacyBios.h>
|
|
#include <Guid/LoadModuleAtFixedAddress.h>
|
|
|
|
#include <Library/BaseLib.h>
|
|
#include <Library/BaseMemoryLib.h>
|
|
#include <Library/PeCoffLib.h>
|
|
#include <Library/CacheMaintenanceLib.h>
|
|
#include <Library/MemoryAllocationLib.h>
|
|
#include <Library/DebugLib.h>
|
|
#include <Library/UefiBootServicesTableLib.h>
|
|
#include <Library/DxeServicesTableLib.h>
|
|
#include <Library/DxeServicesLib.h>
|
|
#include <Library/UefiLib.h>
|
|
#include <Library/UefiRuntimeLib.h>
|
|
#include <Library/PcdLib.h>
|
|
|
|
#include "PiSmmCorePrivateData.h"
|
|
|
|
//
|
|
// Function prototypes from produced protocols
|
|
//
|
|
|
|
/**
|
|
Indicate whether the driver is currently executing in the SMM Initialization phase.
|
|
|
|
@param This The EFI_SMM_BASE2_PROTOCOL instance.
|
|
@param InSmram Pointer to a Boolean which, on return, indicates that the driver is currently executing
|
|
inside of SMRAM (TRUE) or outside of SMRAM (FALSE).
|
|
|
|
@retval EFI_INVALID_PARAMETER InSmram was NULL.
|
|
@retval EFI_SUCCESS The call returned successfully.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
SmmBase2InSmram (
|
|
IN CONST EFI_SMM_BASE2_PROTOCOL *This,
|
|
OUT BOOLEAN *InSmram
|
|
);
|
|
|
|
/**
|
|
Retrieves the location of the System Management System Table (SMST).
|
|
|
|
@param This The EFI_SMM_BASE2_PROTOCOL instance.
|
|
@param Smst On return, points to a pointer to the System Management Service Table (SMST).
|
|
|
|
@retval EFI_INVALID_PARAMETER Smst or This was invalid.
|
|
@retval EFI_SUCCESS The memory was returned to the system.
|
|
@retval EFI_UNSUPPORTED Not in SMM.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
SmmBase2GetSmstLocation (
|
|
IN CONST EFI_SMM_BASE2_PROTOCOL *This,
|
|
OUT EFI_SMM_SYSTEM_TABLE2 **Smst
|
|
);
|
|
|
|
/**
|
|
Communicates with a registered handler.
|
|
|
|
This function provides a service to send and receive messages from a registered
|
|
UEFI service. This function is part of the SMM Communication Protocol that may
|
|
be called in physical mode prior to SetVirtualAddressMap() and in virtual mode
|
|
after SetVirtualAddressMap().
|
|
|
|
@param[in] This The EFI_SMM_COMMUNICATION_PROTOCOL instance.
|
|
@param[in, out] CommBuffer A pointer to the buffer to convey into SMRAM.
|
|
@param[in, out] CommSize The size of the data buffer being passed in.On exit, the size of data
|
|
being returned. Zero if the handler does not wish to reply with any data.
|
|
|
|
@retval EFI_SUCCESS The message was successfully posted.
|
|
@retval EFI_INVALID_PARAMETER The CommBuffer was NULL.
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
SmmCommunicationCommunicate (
|
|
IN CONST EFI_SMM_COMMUNICATION_PROTOCOL *This,
|
|
IN OUT VOID *CommBuffer,
|
|
IN OUT UINTN *CommSize
|
|
);
|
|
|
|
/**
|
|
Event notification that is fired every time a gEfiSmmConfigurationProtocol installs.
|
|
|
|
@param Event The Event that is being processed, not used.
|
|
@param Context Event Context, not used.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplSmmConfigurationEventNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
);
|
|
|
|
/**
|
|
Event notification that is fired every time a DxeSmmReadyToLock protocol is added
|
|
or if gEfiEventReadyToBootGuid is signalled.
|
|
|
|
@param Event The Event that is being processed, not used.
|
|
@param Context Event Context, not used.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplReadyToLockEventNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
);
|
|
|
|
/**
|
|
Event notification that is fired when DxeDispatch Event Group is signaled.
|
|
|
|
@param Event The Event that is being processed, not used.
|
|
@param Context Event Context, not used.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplGuidedEventNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
);
|
|
|
|
/**
|
|
Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE.
|
|
|
|
This is a notification function registered on EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.
|
|
It convers pointer to new virtual address.
|
|
|
|
@param Event Event whose notification function is being invoked.
|
|
@param Context Pointer to the notification function's context.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplSetVirtualAddressNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
);
|
|
|
|
//
|
|
// Data structure used to declare a table of protocol notifications and event
|
|
// notifications required by the SMM IPL
|
|
//
|
|
typedef struct {
|
|
BOOLEAN Protocol;
|
|
BOOLEAN CloseOnLock;
|
|
EFI_GUID *Guid;
|
|
EFI_EVENT_NOTIFY NotifyFunction;
|
|
VOID *NotifyContext;
|
|
EFI_EVENT Event;
|
|
} SMM_IPL_EVENT_NOTIFICATION;
|
|
|
|
//
|
|
// Handle to install the SMM Base2 Protocol and the SMM Communication Protocol
|
|
//
|
|
EFI_HANDLE mSmmIplHandle = NULL;
|
|
|
|
//
|
|
// SMM Base 2 Protocol instance
|
|
//
|
|
EFI_SMM_BASE2_PROTOCOL mSmmBase2 = {
|
|
SmmBase2InSmram,
|
|
SmmBase2GetSmstLocation
|
|
};
|
|
|
|
//
|
|
// SMM Communication Protocol instance
|
|
//
|
|
EFI_SMM_COMMUNICATION_PROTOCOL mSmmCommunication = {
|
|
SmmCommunicationCommunicate
|
|
};
|
|
|
|
//
|
|
// SMM Core Private Data structure that contains the data shared between
|
|
// the SMM IPL and the SMM Core.
|
|
//
|
|
SMM_CORE_PRIVATE_DATA mSmmCorePrivateData = {
|
|
SMM_CORE_PRIVATE_DATA_SIGNATURE, // Signature
|
|
NULL, // SmmIplImageHandle
|
|
0, // SmramRangeCount
|
|
NULL, // SmramRanges
|
|
NULL, // SmmEntryPoint
|
|
FALSE, // SmmEntryPointRegistered
|
|
FALSE, // InSmm
|
|
NULL, // Smst
|
|
NULL, // CommunicationBuffer
|
|
0, // BufferSize
|
|
EFI_SUCCESS // ReturnStatus
|
|
};
|
|
|
|
//
|
|
// Global pointer used to access mSmmCorePrivateData from outside and inside SMM
|
|
//
|
|
SMM_CORE_PRIVATE_DATA *gSmmCorePrivate = &mSmmCorePrivateData;
|
|
|
|
//
|
|
// SMM IPL global variables
|
|
//
|
|
EFI_SMM_CONTROL2_PROTOCOL *mSmmControl2;
|
|
EFI_SMM_ACCESS2_PROTOCOL *mSmmAccess;
|
|
EFI_SMRAM_DESCRIPTOR *mCurrentSmramRange;
|
|
BOOLEAN mSmmLocked = FALSE;
|
|
EFI_PHYSICAL_ADDRESS mSmramCacheBase;
|
|
UINT64 mSmramCacheSize;
|
|
|
|
//
|
|
// Table of Protocol notification and GUIDed Event notifications that the SMM IPL requires
|
|
//
|
|
SMM_IPL_EVENT_NOTIFICATION mSmmIplEvents[] = {
|
|
//
|
|
// Declare protocol notification on the SMM Configuration protocol. When this notification is etablished,
|
|
// the associated event is immediately signalled, so the notification function will be executed and the
|
|
// SMM Configuration Protocol will be found if it is already in the handle database.
|
|
//
|
|
{ TRUE, FALSE, &gEfiSmmConfigurationProtocolGuid, SmmIplSmmConfigurationEventNotify, &gEfiSmmConfigurationProtocolGuid, NULL },
|
|
//
|
|
// Declare protocl notification on DxeSmmReadyToLock protocols. When this notification is etablished,
|
|
// the associated event is immediately signalled, so the notification function will be executed and the
|
|
// DXE SMM Ready To Lock Protocol will be found if it is already in the handle database.
|
|
//
|
|
{ TRUE, TRUE, &gEfiDxeSmmReadyToLockProtocolGuid, SmmIplReadyToLockEventNotify, &gEfiDxeSmmReadyToLockProtocolGuid, NULL },
|
|
//
|
|
// Declare event notification on the DXE Dispatch Event Group. This event is signaled by the DXE Core
|
|
// each time the DXE Core dispatcher has completed its work. When this event is signalled, the SMM Core
|
|
// if notified, so the SMM Core can dispatch SMM drivers.
|
|
//
|
|
{ FALSE, TRUE, &gEfiEventDxeDispatchGuid, SmmIplGuidedEventNotify, &gEfiEventDxeDispatchGuid, NULL },
|
|
//
|
|
// Declare event notification on Ready To Boot Event Group. This is an extra event notification that is
|
|
// used to make sure SMRAM is locked before any boot options are processed.
|
|
//
|
|
{ FALSE, TRUE, &gEfiEventReadyToBootGuid, SmmIplReadyToLockEventNotify, &gEfiEventReadyToBootGuid, NULL },
|
|
//
|
|
// Declare event notification on Legacy Boot Event Group. This is used to inform the SMM Core that the platform
|
|
// is performing a legacy boot operation, and that the UEFI environment is no longer available and the SMM Core
|
|
// must guarantee that it does not access any UEFI related structures outside of SMRAM.
|
|
//
|
|
{ FALSE, FALSE, &gEfiEventLegacyBootGuid, SmmIplGuidedEventNotify, &gEfiEventLegacyBootGuid, NULL },
|
|
//
|
|
// Declare event notification on SetVirtualAddressMap() Event Group. This is used to convert gSmmCorePrivate
|
|
// and mSmmControl2 from physical addresses to virtual addresses.
|
|
//
|
|
{ FALSE, FALSE, &gEfiEventVirtualAddressChangeGuid, SmmIplSetVirtualAddressNotify, NULL, NULL },
|
|
//
|
|
// Terminate the table of event notifications
|
|
//
|
|
{ FALSE, FALSE, NULL, NULL, NULL, NULL }
|
|
};
|
|
|
|
/**
|
|
Find the maximum SMRAM cache range that covers the range specified by SmramRange.
|
|
|
|
This function searches and joins all adjacent ranges of SmramRange into a range to be cached.
|
|
|
|
@param SmramRange The SMRAM range to search from.
|
|
@param SmramCacheBase The returned cache range base.
|
|
@param SmramCacheSize The returned cache range size.
|
|
|
|
**/
|
|
VOID
|
|
GetSmramCacheRange (
|
|
IN EFI_SMRAM_DESCRIPTOR *SmramRange,
|
|
OUT EFI_PHYSICAL_ADDRESS *SmramCacheBase,
|
|
OUT UINT64 *SmramCacheSize
|
|
)
|
|
{
|
|
UINTN Index;
|
|
EFI_PHYSICAL_ADDRESS RangeCpuStart;
|
|
UINT64 RangePhysicalSize;
|
|
BOOLEAN FoundAjacentRange;
|
|
|
|
*SmramCacheBase = SmramRange->CpuStart;
|
|
*SmramCacheSize = SmramRange->PhysicalSize;
|
|
|
|
do {
|
|
FoundAjacentRange = FALSE;
|
|
for (Index = 0; Index < gSmmCorePrivate->SmramRangeCount; Index++) {
|
|
RangeCpuStart = gSmmCorePrivate->SmramRanges[Index].CpuStart;
|
|
RangePhysicalSize = gSmmCorePrivate->SmramRanges[Index].PhysicalSize;
|
|
if (RangeCpuStart < *SmramCacheBase && *SmramCacheBase == (RangeCpuStart + RangePhysicalSize)) {
|
|
*SmramCacheBase = RangeCpuStart;
|
|
*SmramCacheSize += RangePhysicalSize;
|
|
FoundAjacentRange = TRUE;
|
|
} else if ((*SmramCacheBase + *SmramCacheSize) == RangeCpuStart && RangePhysicalSize > 0) {
|
|
*SmramCacheSize += RangePhysicalSize;
|
|
FoundAjacentRange = TRUE;
|
|
}
|
|
}
|
|
} while (FoundAjacentRange);
|
|
|
|
}
|
|
|
|
/**
|
|
Indicate whether the driver is currently executing in the SMM Initialization phase.
|
|
|
|
@param This The EFI_SMM_BASE2_PROTOCOL instance.
|
|
@param InSmram Pointer to a Boolean which, on return, indicates that the driver is currently executing
|
|
inside of SMRAM (TRUE) or outside of SMRAM (FALSE).
|
|
|
|
@retval EFI_INVALID_PARAMETER InSmram was NULL.
|
|
@retval EFI_SUCCESS The call returned successfully.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
SmmBase2InSmram (
|
|
IN CONST EFI_SMM_BASE2_PROTOCOL *This,
|
|
OUT BOOLEAN *InSmram
|
|
)
|
|
{
|
|
if (InSmram == NULL) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
*InSmram = gSmmCorePrivate->InSmm;
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Retrieves the location of the System Management System Table (SMST).
|
|
|
|
@param This The EFI_SMM_BASE2_PROTOCOL instance.
|
|
@param Smst On return, points to a pointer to the System Management Service Table (SMST).
|
|
|
|
@retval EFI_INVALID_PARAMETER Smst or This was invalid.
|
|
@retval EFI_SUCCESS The memory was returned to the system.
|
|
@retval EFI_UNSUPPORTED Not in SMM.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
SmmBase2GetSmstLocation (
|
|
IN CONST EFI_SMM_BASE2_PROTOCOL *This,
|
|
OUT EFI_SMM_SYSTEM_TABLE2 **Smst
|
|
)
|
|
{
|
|
if ((This == NULL) ||(Smst == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
if (!gSmmCorePrivate->InSmm) {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
*Smst = gSmmCorePrivate->Smst;
|
|
|
|
return EFI_SUCCESS;
|
|
}
|
|
|
|
/**
|
|
Communicates with a registered handler.
|
|
|
|
This function provides a service to send and receive messages from a registered
|
|
UEFI service. This function is part of the SMM Communication Protocol that may
|
|
be called in physical mode prior to SetVirtualAddressMap() and in virtual mode
|
|
after SetVirtualAddressMap().
|
|
|
|
@param[in] This The EFI_SMM_COMMUNICATION_PROTOCOL instance.
|
|
@param[in, out] CommBuffer A pointer to the buffer to convey into SMRAM.
|
|
@param[in, out] CommSize The size of the data buffer being passed in.On exit, the size of data
|
|
being returned. Zero if the handler does not wish to reply with any data.
|
|
|
|
@retval EFI_SUCCESS The message was successfully posted.
|
|
@retval EFI_INVALID_PARAMETER The CommBuffer was NULL.
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
SmmCommunicationCommunicate (
|
|
IN CONST EFI_SMM_COMMUNICATION_PROTOCOL *This,
|
|
IN OUT VOID *CommBuffer,
|
|
IN OUT UINTN *CommSize
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
EFI_SMM_COMMUNICATE_HEADER *CommunicateHeader;
|
|
BOOLEAN OldInSmm;
|
|
|
|
//
|
|
// Check parameters
|
|
//
|
|
if ((CommBuffer == NULL) || (CommSize == NULL)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// CommSize must hold HeaderGuid and MessageLength
|
|
//
|
|
if (*CommSize < OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, Data)) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// If not already in SMM, then generate a Software SMI
|
|
//
|
|
if (!gSmmCorePrivate->InSmm && gSmmCorePrivate->SmmEntryPointRegistered) {
|
|
//
|
|
// Put arguments for Software SMI in gSmmCorePrivate
|
|
//
|
|
gSmmCorePrivate->CommunicationBuffer = CommBuffer;
|
|
gSmmCorePrivate->BufferSize = *CommSize;
|
|
|
|
//
|
|
// Generate Software SMI
|
|
//
|
|
Status = mSmmControl2->Trigger (mSmmControl2, NULL, NULL, FALSE, 0);
|
|
if (EFI_ERROR (Status)) {
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
//
|
|
// Return status from software SMI
|
|
//
|
|
*CommSize = gSmmCorePrivate->BufferSize;
|
|
return gSmmCorePrivate->ReturnStatus;
|
|
}
|
|
|
|
//
|
|
// If we are in SMM, then the execution mode must be physical, which means that
|
|
// OS established virtual addresses can not be used. If SetVirtualAddressMap()
|
|
// has been called, then a direct invocation of the Software SMI is not
|
|
// not allowed so return EFI_INVALID_PARAMETER.
|
|
//
|
|
if (EfiGoneVirtual()) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// Don't allow call SmiManage() directly when SMRAM is closed or locked.
|
|
//
|
|
if (!mSmmAccess->OpenState || mSmmAccess->LockState) {
|
|
return EFI_INVALID_PARAMETER;
|
|
}
|
|
|
|
//
|
|
// Save current InSmm state and set InSmm state to TRUE
|
|
//
|
|
OldInSmm = gSmmCorePrivate->InSmm;
|
|
gSmmCorePrivate->InSmm = TRUE;
|
|
|
|
//
|
|
// Already in SMM and before SetVirtualAddressMap(), so call SmiManage() directly.
|
|
//
|
|
CommunicateHeader = (EFI_SMM_COMMUNICATE_HEADER *)CommBuffer;
|
|
*CommSize -= OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, Data);
|
|
Status = gSmmCorePrivate->Smst->SmiManage (
|
|
&CommunicateHeader->HeaderGuid,
|
|
NULL,
|
|
CommunicateHeader->Data,
|
|
CommSize
|
|
);
|
|
|
|
//
|
|
// Update CommunicationBuffer, BufferSize and ReturnStatus
|
|
// Communicate service finished, reset the pointer to CommBuffer to NULL
|
|
//
|
|
*CommSize += OFFSET_OF (EFI_SMM_COMMUNICATE_HEADER, Data);
|
|
|
|
//
|
|
// Restore original InSmm state
|
|
//
|
|
gSmmCorePrivate->InSmm = OldInSmm;
|
|
|
|
return (Status == EFI_WARN_INTERRUPT_SOURCE_QUIESCED) ? EFI_SUCCESS : EFI_NOT_FOUND;
|
|
}
|
|
|
|
/**
|
|
Event notification that is fired when DxeDispatch Event Group is signaled.
|
|
|
|
@param Event The Event that is being processed, not used.
|
|
@param Context Event Context, not used.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplGuidedEventNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
)
|
|
{
|
|
EFI_SMM_COMMUNICATE_HEADER CommunicateHeader;
|
|
UINTN Size;
|
|
|
|
//
|
|
// Use Guid to initialize EFI_SMM_COMMUNICATE_HEADER structure
|
|
//
|
|
CopyGuid (&CommunicateHeader.HeaderGuid, (EFI_GUID *)Context);
|
|
CommunicateHeader.MessageLength = 1;
|
|
CommunicateHeader.Data[0] = 0;
|
|
|
|
//
|
|
// Generate the Software SMI and return the result
|
|
//
|
|
Size = sizeof (CommunicateHeader);
|
|
SmmCommunicationCommunicate (&mSmmCommunication, &CommunicateHeader, &Size);
|
|
}
|
|
|
|
/**
|
|
Event notification that is fired every time a gEfiSmmConfigurationProtocol installs.
|
|
|
|
@param Event The Event that is being processed, not used.
|
|
@param Context Event Context, not used.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplSmmConfigurationEventNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
EFI_SMM_CONFIGURATION_PROTOCOL *SmmConfiguration;
|
|
|
|
//
|
|
// Make sure this notification is for this handler
|
|
//
|
|
Status = gBS->LocateProtocol (Context, NULL, (VOID **)&SmmConfiguration);
|
|
if (EFI_ERROR (Status)) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Register the SMM Entry Point provided by the SMM Core with the SMM COnfiguration protocol
|
|
//
|
|
Status = SmmConfiguration->RegisterSmmEntry (SmmConfiguration, gSmmCorePrivate->SmmEntryPoint);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Set flag to indicate that the SM< Entry Point has been registered which
|
|
// means that SMIs are now fully operational.
|
|
//
|
|
gSmmCorePrivate->SmmEntryPointRegistered = TRUE;
|
|
|
|
//
|
|
// Print debug message showing SMM Core entry point address.
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL registered SMM Entry Point address %p\n", (VOID *)(UINTN)gSmmCorePrivate->SmmEntryPoint));
|
|
|
|
//
|
|
// Attempt to reset SMRAM cacheability to UC
|
|
// Assume CPU AP is available at this time
|
|
//
|
|
Status = gDS->SetMemorySpaceAttributes(
|
|
mSmramCacheBase,
|
|
mSmramCacheSize,
|
|
EFI_MEMORY_UC
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
DEBUG ((DEBUG_WARN, "SMM IPL failed to reset SMRAM window to EFI_MEMORY_UC\n"));
|
|
}
|
|
|
|
//
|
|
// Close all SMRAM ranges to protect SMRAM
|
|
//
|
|
Status = mSmmAccess->Close (mSmmAccess);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Print debug message that the SMRAM window is now closed.
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL closed SMRAM window\n"));
|
|
}
|
|
|
|
/**
|
|
Event notification that is fired every time a DxeSmmReadyToLock protocol is added
|
|
or if gEfiEventReadyToBootGuid is signalled.
|
|
|
|
@param Event The Event that is being processed, not used.
|
|
@param Context Event Context, not used.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplReadyToLockEventNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VOID *Interface;
|
|
UINTN Index;
|
|
|
|
//
|
|
// See if we are already locked
|
|
//
|
|
if (mSmmLocked) {
|
|
return;
|
|
}
|
|
|
|
//
|
|
// Make sure this notification is for this handler
|
|
//
|
|
if (CompareGuid ((EFI_GUID *)Context, &gEfiDxeSmmReadyToLockProtocolGuid)) {
|
|
Status = gBS->LocateProtocol (&gEfiDxeSmmReadyToLockProtocolGuid, NULL, &Interface);
|
|
if (EFI_ERROR (Status)) {
|
|
return;
|
|
}
|
|
} else {
|
|
//
|
|
// If SMM is not locked yet and we got here from gEfiEventReadyToBootGuid being
|
|
// signalled, then gEfiDxeSmmReadyToLockProtocolGuid was not installed as expected.
|
|
// Print a warning on debug builds.
|
|
//
|
|
DEBUG ((DEBUG_WARN, "SMM IPL! DXE SMM Ready To Lock Protocol not installed before Ready To Boot signal\n"));
|
|
}
|
|
|
|
//
|
|
// Lock the SMRAM (Note: Locking SMRAM may not be supported on all platforms)
|
|
//
|
|
mSmmAccess->Lock (mSmmAccess);
|
|
|
|
//
|
|
// Close protocol and event notification events that do not apply after the
|
|
// DXE SMM Ready To Lock Protocol has been installed or the Ready To Boot
|
|
// event has been signalled.
|
|
//
|
|
for (Index = 0; mSmmIplEvents[Index].NotifyFunction != NULL; Index++) {
|
|
if (mSmmIplEvents[Index].CloseOnLock) {
|
|
gBS->CloseEvent (mSmmIplEvents[Index].Event);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Inform SMM Core that the DxeSmmReadyToLock protocol was installed
|
|
//
|
|
SmmIplGuidedEventNotify (Event, (VOID *)&gEfiDxeSmmReadyToLockProtocolGuid);
|
|
|
|
//
|
|
// Print debug message that the SMRAM window is now locked.
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL locked SMRAM window\n"));
|
|
|
|
//
|
|
// Set flag so this operation will not be performed again
|
|
//
|
|
mSmmLocked = TRUE;
|
|
}
|
|
|
|
/**
|
|
Notification function of EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE.
|
|
|
|
This is a notification function registered on EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE event.
|
|
It convers pointer to new virtual address.
|
|
|
|
@param Event Event whose notification function is being invoked.
|
|
@param Context Pointer to the notification function's context.
|
|
|
|
**/
|
|
VOID
|
|
EFIAPI
|
|
SmmIplSetVirtualAddressNotify (
|
|
IN EFI_EVENT Event,
|
|
IN VOID *Context
|
|
)
|
|
{
|
|
EfiConvertPointer (0x0, (VOID **)&mSmmControl2);
|
|
}
|
|
|
|
/**
|
|
Get the fixed loadding address from image header assigned by build tool. This function only be called
|
|
when Loading module at Fixed address feature enabled.
|
|
|
|
@param ImageContext Pointer to the image context structure that describes the PE/COFF
|
|
image that needs to be examined by this function.
|
|
@retval EFI_SUCCESS An fixed loading address is assigned to this image by build tools .
|
|
@retval EFI_NOT_FOUND The image has no assigned fixed loadding address.
|
|
**/
|
|
EFI_STATUS
|
|
GetPeCoffImageFixLoadingAssignedAddress(
|
|
IN OUT PE_COFF_LOADER_IMAGE_CONTEXT *ImageContext
|
|
)
|
|
{
|
|
UINTN SectionHeaderOffset;
|
|
EFI_STATUS Status;
|
|
EFI_IMAGE_SECTION_HEADER SectionHeader;
|
|
EFI_IMAGE_OPTIONAL_HEADER_UNION *ImgHdr;
|
|
EFI_PHYSICAL_ADDRESS FixLoaddingAddress;
|
|
UINT16 Index;
|
|
UINTN Size;
|
|
UINT16 NumberOfSections;
|
|
EFI_PHYSICAL_ADDRESS SmramBase;
|
|
UINT64 SmmCodeSize;
|
|
UINT64 ValueInSectionHeader;
|
|
//
|
|
// Build tool will calculate the smm code size and then patch the PcdLoadFixAddressSmmCodePageNumber
|
|
//
|
|
SmmCodeSize = EFI_PAGES_TO_SIZE (PcdGet32(PcdLoadFixAddressSmmCodePageNumber));
|
|
|
|
FixLoaddingAddress = 0;
|
|
Status = EFI_NOT_FOUND;
|
|
SmramBase = mCurrentSmramRange->CpuStart;
|
|
//
|
|
// Get PeHeader pointer
|
|
//
|
|
ImgHdr = (EFI_IMAGE_OPTIONAL_HEADER_UNION *)((CHAR8* )ImageContext->Handle + ImageContext->PeCoffHeaderOffset);
|
|
SectionHeaderOffset = (UINTN)(
|
|
ImageContext->PeCoffHeaderOffset +
|
|
sizeof (UINT32) +
|
|
sizeof (EFI_IMAGE_FILE_HEADER) +
|
|
ImgHdr->Pe32.FileHeader.SizeOfOptionalHeader
|
|
);
|
|
NumberOfSections = ImgHdr->Pe32.FileHeader.NumberOfSections;
|
|
|
|
//
|
|
// Get base address from the first section header that doesn't point to code section.
|
|
//
|
|
for (Index = 0; Index < NumberOfSections; Index++) {
|
|
//
|
|
// Read section header from file
|
|
//
|
|
Size = sizeof (EFI_IMAGE_SECTION_HEADER);
|
|
Status = ImageContext->ImageRead (
|
|
ImageContext->Handle,
|
|
SectionHeaderOffset,
|
|
&Size,
|
|
&SectionHeader
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
Status = EFI_NOT_FOUND;
|
|
|
|
if ((SectionHeader.Characteristics & EFI_IMAGE_SCN_CNT_CODE) == 0) {
|
|
//
|
|
// Build tool saves the offset to SMRAM base as image base in PointerToRelocations & PointerToLineNumbers fields in the
|
|
// first section header that doesn't point to code section in image header. And there is an assumption that when the
|
|
// feature is enabled, if a module is assigned a loading address by tools, PointerToRelocations & PointerToLineNumbers
|
|
// fields should NOT be Zero, or else, these 2 fileds should be set to Zero
|
|
//
|
|
ValueInSectionHeader = ReadUnaligned64((UINT64*)&SectionHeader.PointerToRelocations);
|
|
if (ValueInSectionHeader != 0) {
|
|
//
|
|
// Found first section header that doesn't point to code section in which uild tool saves the
|
|
// offset to SMRAM base as image base in PointerToRelocations & PointerToLineNumbers fields
|
|
//
|
|
FixLoaddingAddress = (EFI_PHYSICAL_ADDRESS)(SmramBase + (INT64)ValueInSectionHeader);
|
|
|
|
if (SmramBase + SmmCodeSize > FixLoaddingAddress && SmramBase <= FixLoaddingAddress) {
|
|
//
|
|
// The assigned address is valid. Return the specified loadding address
|
|
//
|
|
ImageContext->ImageAddress = FixLoaddingAddress;
|
|
Status = EFI_SUCCESS;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
SectionHeaderOffset += sizeof (EFI_IMAGE_SECTION_HEADER);
|
|
}
|
|
DEBUG ((EFI_D_INFO|EFI_D_LOAD, "LOADING MODULE FIXED INFO: Loading module at fixed address %x, Status = %r \n", FixLoaddingAddress, Status));
|
|
return Status;
|
|
}
|
|
/**
|
|
Load the SMM Core image into SMRAM and executes the SMM Core from SMRAM.
|
|
|
|
@param[in] SmramRange Descriptor for the range of SMRAM to reload the
|
|
currently executing image.
|
|
@param[in] Context Context to pass into SMM Core
|
|
|
|
@return EFI_STATUS
|
|
|
|
**/
|
|
EFI_STATUS
|
|
ExecuteSmmCoreFromSmram (
|
|
IN EFI_SMRAM_DESCRIPTOR *SmramRange,
|
|
IN VOID *Context
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
VOID *SourceBuffer;
|
|
UINTN SourceSize;
|
|
PE_COFF_LOADER_IMAGE_CONTEXT ImageContext;
|
|
UINTN PageCount;
|
|
EFI_PHYSICAL_ADDRESS DestinationBuffer;
|
|
EFI_IMAGE_ENTRY_POINT EntryPoint;
|
|
|
|
//
|
|
// Search all Firmware Volumes for a PE/COFF image in a file of type SMM_CORE
|
|
//
|
|
Status = GetSectionFromAnyFvByFileType (
|
|
EFI_FV_FILETYPE_SMM_CORE,
|
|
0,
|
|
EFI_SECTION_PE32,
|
|
0,
|
|
&SourceBuffer,
|
|
&SourceSize
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
|
|
//
|
|
// Initilize ImageContext
|
|
//
|
|
ImageContext.Handle = SourceBuffer;
|
|
ImageContext.ImageRead = PeCoffLoaderImageReadFromMemory;
|
|
|
|
//
|
|
// Get information about the image being loaded
|
|
//
|
|
Status = PeCoffLoaderGetImageInfo (&ImageContext);
|
|
if (EFI_ERROR (Status)) {
|
|
return Status;
|
|
}
|
|
//
|
|
// if Loading module at Fixed Address feature is enabled, the SMM core driver will be loaded to
|
|
// the address assigned by build tool.
|
|
//
|
|
if (PcdGet64(PcdLoadModuleAtFixAddressEnable) != 0) {
|
|
//
|
|
// Get the fixed loading address assigned by Build tool
|
|
//
|
|
Status = GetPeCoffImageFixLoadingAssignedAddress (&ImageContext);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Since the memory range to load SMM CORE will be cut out in SMM core, so no need to allocate and free this range
|
|
//
|
|
PageCount = 0;
|
|
} else {
|
|
DEBUG ((EFI_D_INFO, "LOADING MODULE FIXED ERROR: Loading module at fixed address at address failed\n"));
|
|
//
|
|
// Allocate memory for the image being loaded from the EFI_SRAM_DESCRIPTOR
|
|
// specified by SmramRange
|
|
//
|
|
PageCount = (UINTN)EFI_SIZE_TO_PAGES(ImageContext.ImageSize + ImageContext.SectionAlignment);
|
|
|
|
ASSERT ((SmramRange->PhysicalSize & EFI_PAGE_MASK) == 0);
|
|
ASSERT (SmramRange->PhysicalSize > EFI_PAGES_TO_SIZE (PageCount));
|
|
|
|
SmramRange->PhysicalSize -= EFI_PAGES_TO_SIZE (PageCount);
|
|
DestinationBuffer = SmramRange->CpuStart + SmramRange->PhysicalSize;
|
|
|
|
//
|
|
// Align buffer on section boundry
|
|
//
|
|
ImageContext.ImageAddress = DestinationBuffer;
|
|
}
|
|
} else {
|
|
//
|
|
// Allocate memory for the image being loaded from the EFI_SRAM_DESCRIPTOR
|
|
// specified by SmramRange
|
|
//
|
|
PageCount = (UINTN)EFI_SIZE_TO_PAGES(ImageContext.ImageSize + ImageContext.SectionAlignment);
|
|
|
|
ASSERT ((SmramRange->PhysicalSize & EFI_PAGE_MASK) == 0);
|
|
ASSERT (SmramRange->PhysicalSize > EFI_PAGES_TO_SIZE (PageCount));
|
|
|
|
SmramRange->PhysicalSize -= EFI_PAGES_TO_SIZE (PageCount);
|
|
DestinationBuffer = SmramRange->CpuStart + SmramRange->PhysicalSize;
|
|
|
|
//
|
|
// Align buffer on section boundry
|
|
//
|
|
ImageContext.ImageAddress = DestinationBuffer;
|
|
}
|
|
|
|
ImageContext.ImageAddress += ImageContext.SectionAlignment - 1;
|
|
ImageContext.ImageAddress &= ~(ImageContext.SectionAlignment - 1);
|
|
|
|
//
|
|
// Print debug message showing SMM Core load address.
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL loading SMM Core at SMRAM address %p\n", (VOID *)(UINTN)ImageContext.ImageAddress));
|
|
|
|
//
|
|
// Load the image to our new buffer
|
|
//
|
|
Status = PeCoffLoaderLoadImage (&ImageContext);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Relocate the image in our new buffer
|
|
//
|
|
Status = PeCoffLoaderRelocateImage (&ImageContext);
|
|
if (!EFI_ERROR (Status)) {
|
|
//
|
|
// Flush the instruction cache so the image data are written before we execute it
|
|
//
|
|
InvalidateInstructionCacheRange ((VOID *)(UINTN)ImageContext.ImageAddress, (UINTN)ImageContext.ImageSize);
|
|
|
|
//
|
|
// Print debug message showing SMM Core entry point address.
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL calling SMM Core at SMRAM address %p\n", (VOID *)(UINTN)ImageContext.EntryPoint));
|
|
|
|
//
|
|
// Execute image
|
|
//
|
|
EntryPoint = (EFI_IMAGE_ENTRY_POINT)(UINTN)ImageContext.EntryPoint;
|
|
Status = EntryPoint ((EFI_HANDLE)Context, gST);
|
|
}
|
|
}
|
|
|
|
//
|
|
// If the load operation, relocate operation, or the image execution return an
|
|
// error, then free memory allocated from the EFI_SRAM_DESCRIPTOR specified by
|
|
// SmramRange
|
|
//
|
|
if (EFI_ERROR (Status)) {
|
|
SmramRange->PhysicalSize += EFI_PAGES_TO_SIZE (PageCount);
|
|
}
|
|
|
|
//
|
|
// Always free memory allocted by GetFileBufferByFilePath ()
|
|
//
|
|
FreePool (SourceBuffer);
|
|
|
|
return Status;
|
|
}
|
|
|
|
/**
|
|
The Entry Point for SMM IPL
|
|
|
|
Load SMM Core into SMRAM, register SMM Core entry point for SMIs, install
|
|
SMM Base 2 Protocol and SMM Communication Protocol, and register for the
|
|
critical events required to coordinate between DXE and SMM environments.
|
|
|
|
@param ImageHandle The firmware allocated handle for the EFI image.
|
|
@param SystemTable A pointer to the EFI System Table.
|
|
|
|
@retval EFI_SUCCESS The entry point is executed successfully.
|
|
@retval Other Some error occurred when executing this entry point.
|
|
|
|
**/
|
|
EFI_STATUS
|
|
EFIAPI
|
|
SmmIplEntry (
|
|
IN EFI_HANDLE ImageHandle,
|
|
IN EFI_SYSTEM_TABLE *SystemTable
|
|
)
|
|
{
|
|
EFI_STATUS Status;
|
|
EFI_SMM_CONFIGURATION_PROTOCOL *SmmConfiguration;
|
|
UINTN Size;
|
|
UINTN Index;
|
|
EFI_SMM_RESERVED_SMRAM_REGION *SmramResRegion;
|
|
UINT64 MaxSize;
|
|
VOID *Registration;
|
|
UINT64 SmmCodeSize;
|
|
EFI_LOAD_FIXED_ADDRESS_CONFIGURATION_TABLE *LMFAConfigurationTable;
|
|
EFI_CPU_ARCH_PROTOCOL *CpuArch;
|
|
|
|
//
|
|
// Fill in the image handle of the SMM IPL so the SMM Core can use this as the
|
|
// ParentImageHandle field of the Load Image Protocol for all SMM Drivers loaded
|
|
// by the SMM Core
|
|
//
|
|
mSmmCorePrivateData.SmmIplImageHandle = ImageHandle;
|
|
|
|
//
|
|
// Get SMM Access Protocol
|
|
//
|
|
Status = gBS->LocateProtocol (&gEfiSmmAccess2ProtocolGuid, NULL, (VOID **)&mSmmAccess);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Get SMM Control2 Protocol
|
|
//
|
|
Status = gBS->LocateProtocol (&gEfiSmmControl2ProtocolGuid, NULL, (VOID **)&mSmmControl2);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Get SMM Configuration Protocol if it is present
|
|
//
|
|
SmmConfiguration = NULL;
|
|
Status = gBS->LocateProtocol (&gEfiSmmConfigurationProtocolGuid, NULL, (VOID **) &SmmConfiguration);
|
|
|
|
//
|
|
// Get SMRAM information
|
|
//
|
|
Size = 0;
|
|
Status = mSmmAccess->GetCapabilities (mSmmAccess, &Size, NULL);
|
|
ASSERT (Status == EFI_BUFFER_TOO_SMALL);
|
|
|
|
gSmmCorePrivate->SmramRanges = (EFI_SMRAM_DESCRIPTOR *)AllocatePool (Size);
|
|
ASSERT (gSmmCorePrivate->SmramRanges != NULL);
|
|
|
|
Status = mSmmAccess->GetCapabilities (mSmmAccess, &Size, gSmmCorePrivate->SmramRanges);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
gSmmCorePrivate->SmramRangeCount = Size / sizeof (EFI_SMRAM_DESCRIPTOR);
|
|
|
|
//
|
|
// Open all SMRAM ranges
|
|
//
|
|
Status = mSmmAccess->Open (mSmmAccess);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Print debug message that the SMRAM window is now open.
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL opened SMRAM window\n"));
|
|
|
|
//
|
|
// Subtract SMRAM any reserved SMRAM regions.
|
|
//
|
|
if (SmmConfiguration != NULL) {
|
|
SmramResRegion = SmmConfiguration->SmramReservedRegions;
|
|
while (SmramResRegion->SmramReservedSize != 0) {
|
|
for (Index = 0; Index < gSmmCorePrivate->SmramRangeCount; Index ++) {
|
|
if ((SmramResRegion->SmramReservedStart >= gSmmCorePrivate->SmramRanges[Index].CpuStart) && \
|
|
((SmramResRegion->SmramReservedStart + SmramResRegion->SmramReservedSize) <= \
|
|
(gSmmCorePrivate->SmramRanges[Index].CpuStart + gSmmCorePrivate->SmramRanges[Index].PhysicalSize))) {
|
|
//
|
|
// This range has reserved area, calculate the left free size
|
|
//
|
|
gSmmCorePrivate->SmramRanges[Index].PhysicalSize = SmramResRegion->SmramReservedStart - gSmmCorePrivate->SmramRanges[Index].CpuStart;
|
|
}
|
|
}
|
|
SmramResRegion++;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Find the largest SMRAM range between 1MB and 4GB that is at least 256KB - 4K in size
|
|
//
|
|
mCurrentSmramRange = NULL;
|
|
for (Index = 0, MaxSize = SIZE_256KB - EFI_PAGE_SIZE; Index < gSmmCorePrivate->SmramRangeCount; Index++) {
|
|
if (gSmmCorePrivate->SmramRanges[Index].CpuStart >= BASE_1MB) {
|
|
if ((gSmmCorePrivate->SmramRanges[Index].CpuStart + gSmmCorePrivate->SmramRanges[Index].PhysicalSize) <= BASE_4GB) {
|
|
if (gSmmCorePrivate->SmramRanges[Index].PhysicalSize >= MaxSize) {
|
|
MaxSize = gSmmCorePrivate->SmramRanges[Index].PhysicalSize;
|
|
mCurrentSmramRange = &gSmmCorePrivate->SmramRanges[Index];
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (mCurrentSmramRange != NULL) {
|
|
//
|
|
// Print debug message showing SMRAM window that will be used by SMM IPL and SMM Core
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL found SMRAM window %p - %p\n",
|
|
(VOID *)(UINTN)mCurrentSmramRange->CpuStart,
|
|
(VOID *)(UINTN)(mCurrentSmramRange->CpuStart + mCurrentSmramRange->PhysicalSize - 1)
|
|
));
|
|
|
|
GetSmramCacheRange (mCurrentSmramRange, &mSmramCacheBase, &mSmramCacheSize);
|
|
//
|
|
// If CPU AP is present, attempt to set SMRAM cacheability to WB
|
|
// Note that it is expected that cacheability of SMRAM has been set to WB if CPU AP
|
|
// is not available here.
|
|
//
|
|
CpuArch = NULL;
|
|
Status = gBS->LocateProtocol (&gEfiCpuArchProtocolGuid, NULL, (VOID **)&CpuArch);
|
|
if (!EFI_ERROR (Status)) {
|
|
Status = gDS->SetMemorySpaceAttributes(
|
|
mSmramCacheBase,
|
|
mSmramCacheSize,
|
|
EFI_MEMORY_WB
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
DEBUG ((DEBUG_WARN, "SMM IPL failed to set SMRAM window to EFI_MEMORY_WB\n"));
|
|
}
|
|
}
|
|
//
|
|
// if Loading module at Fixed Address feature is enabled, save the SMRAM base to Load
|
|
// Modules At Fixed Address Configuration Table.
|
|
//
|
|
if (PcdGet64(PcdLoadModuleAtFixAddressEnable) != 0) {
|
|
//
|
|
// Build tool will calculate the smm code size and then patch the PcdLoadFixAddressSmmCodePageNumber
|
|
//
|
|
SmmCodeSize = LShiftU64 (PcdGet32(PcdLoadFixAddressSmmCodePageNumber), EFI_PAGE_SHIFT);
|
|
//
|
|
// The SMRAM available memory is assumed to be larger than SmmCodeSize
|
|
//
|
|
ASSERT (mCurrentSmramRange->PhysicalSize > SmmCodeSize);
|
|
//
|
|
// Retrieve Load modules At fixed address configuration table and save the SMRAM base.
|
|
//
|
|
Status = EfiGetSystemConfigurationTable (
|
|
&gLoadFixedAddressConfigurationTableGuid,
|
|
(VOID **) &LMFAConfigurationTable
|
|
);
|
|
if (!EFI_ERROR (Status) && LMFAConfigurationTable != NULL) {
|
|
LMFAConfigurationTable->SmramBase = mCurrentSmramRange->CpuStart;
|
|
//
|
|
// Print the SMRAM base
|
|
//
|
|
DEBUG ((EFI_D_INFO, "LOADING MODULE FIXED INFO: TSEG BASE is %x. \n", LMFAConfigurationTable->SmramBase));
|
|
}
|
|
}
|
|
//
|
|
// Load SMM Core into SMRAM and execute it from SMRAM
|
|
//
|
|
Status = ExecuteSmmCoreFromSmram (mCurrentSmramRange, gSmmCorePrivate);
|
|
if (EFI_ERROR (Status)) {
|
|
//
|
|
// Print error message that the SMM Core failed to be loaded and executed.
|
|
//
|
|
DEBUG ((DEBUG_ERROR, "SMM IPL could not load and execute SMM Core from SMRAM\n"));
|
|
|
|
//
|
|
// Attempt to reset SMRAM cacheability to UC
|
|
//
|
|
if (CpuArch != NULL) {
|
|
Status = gDS->SetMemorySpaceAttributes(
|
|
mSmramCacheBase,
|
|
mSmramCacheSize,
|
|
EFI_MEMORY_UC
|
|
);
|
|
if (EFI_ERROR (Status)) {
|
|
DEBUG ((DEBUG_WARN, "SMM IPL failed to reset SMRAM window to EFI_MEMORY_UC\n"));
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
//
|
|
// Print error message that there are not enough SMRAM resources to load the SMM Core.
|
|
//
|
|
DEBUG ((DEBUG_ERROR, "SMM IPL could not find a large enough SMRAM region to load SMM Core\n"));
|
|
}
|
|
|
|
//
|
|
// If the SMM Core could not be loaded then close SMRAM window, free allocated
|
|
// resources, and return an error so SMM IPL will be unloaded.
|
|
//
|
|
if (mCurrentSmramRange == NULL || EFI_ERROR (Status)) {
|
|
//
|
|
// Close all SMRAM ranges
|
|
//
|
|
Status = mSmmAccess->Close (mSmmAccess);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Print debug message that the SMRAM window is now closed.
|
|
//
|
|
DEBUG ((DEBUG_INFO, "SMM IPL closed SMRAM window\n"));
|
|
|
|
//
|
|
// Free all allocated resources
|
|
//
|
|
FreePool (gSmmCorePrivate->SmramRanges);
|
|
|
|
return EFI_UNSUPPORTED;
|
|
}
|
|
|
|
//
|
|
// Install SMM Base2 Protocol and SMM Communication Protocol
|
|
//
|
|
Status = gBS->InstallMultipleProtocolInterfaces (
|
|
&mSmmIplHandle,
|
|
&gEfiSmmBase2ProtocolGuid, &mSmmBase2,
|
|
&gEfiSmmCommunicationProtocolGuid, &mSmmCommunication,
|
|
NULL
|
|
);
|
|
ASSERT_EFI_ERROR (Status);
|
|
|
|
//
|
|
// Create the set of protocol and event notififcations that the SMM IPL requires
|
|
//
|
|
for (Index = 0; mSmmIplEvents[Index].NotifyFunction != NULL; Index++) {
|
|
if (mSmmIplEvents[Index].Protocol) {
|
|
mSmmIplEvents[Index].Event = EfiCreateProtocolNotifyEvent (
|
|
mSmmIplEvents[Index].Guid,
|
|
TPL_CALLBACK,
|
|
mSmmIplEvents[Index].NotifyFunction,
|
|
mSmmIplEvents[Index].NotifyContext,
|
|
&Registration
|
|
);
|
|
} else {
|
|
Status = gBS->CreateEventEx (
|
|
EVT_NOTIFY_SIGNAL,
|
|
TPL_CALLBACK,
|
|
mSmmIplEvents[Index].NotifyFunction,
|
|
mSmmIplEvents[Index].NotifyContext,
|
|
mSmmIplEvents[Index].Guid,
|
|
&mSmmIplEvents[Index].Event
|
|
);
|
|
ASSERT_EFI_ERROR (Status);
|
|
}
|
|
}
|
|
|
|
return EFI_SUCCESS;
|
|
}
|