]>
Commit | Line | Data |
---|---|---|
a33a2f62 JY |
1 | /** @file\r |
2 | C functions in SEC\r | |
3 | \r | |
4 | Copyright (c) 2014, Intel Corporation. All rights reserved.<BR>\r | |
5 | This program and the accompanying materials\r | |
6 | are licensed and made available under the terms and conditions of the BSD License\r | |
7 | which accompanies this distribution. The full text of the license may be found at\r | |
8 | http://opensource.org/licenses/bsd-license.php.\r | |
9 | \r | |
10 | THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r | |
11 | WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r | |
12 | \r | |
13 | **/\r | |
14 | \r | |
15 | \r | |
16 | #include "SecMain.h"\r | |
17 | \r | |
18 | EFI_PEI_PPI_DESCRIPTOR mPeiSecMainPpi[] = {\r | |
19 | {\r | |
20 | EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST,\r | |
21 | &gTopOfTemporaryRamPpiGuid,\r | |
22 | NULL // To be patched later.\r | |
23 | },\r | |
24 | };\r | |
25 | \r | |
26 | //\r | |
27 | // These are IDT entries pointing to 10:FFFFFFE4h.\r | |
28 | //\r | |
29 | UINT64 mIdtEntryTemplate = 0xffff8e000010ffe4ULL;\r | |
30 | \r | |
31 | /**\r | |
32 | Caller provided function to be invoked at the end of InitializeDebugAgent().\r | |
33 | \r | |
34 | Entry point to the C language phase of SEC. After the SEC assembly\r | |
35 | code has initialized some temporary memory and set up the stack,\r | |
36 | the control is transferred to this function.\r | |
37 | \r | |
38 | @param[in] Context The first input parameter of InitializeDebugAgent().\r | |
39 | \r | |
40 | **/\r | |
41 | VOID\r | |
42 | EFIAPI\r | |
43 | SecStartupPhase2(\r | |
44 | IN VOID *Context\r | |
45 | );\r | |
46 | \r | |
47 | \r | |
48 | /**\r | |
49 | \r | |
50 | Entry point to the C language phase of SEC. After the SEC assembly\r | |
51 | code has initialized some temporary memory and set up the stack,\r | |
52 | the control is transferred to this function.\r | |
53 | \r | |
54 | @param[in] SizeOfRam Size of the temporary memory available for use.\r | |
b9ca25cb | 55 | @param[in] TempRamBase Base address of temporary ram\r |
a33a2f62 JY |
56 | @param[in] BootFirmwareVolume Base address of the Boot Firmware Volume.\r |
57 | **/\r | |
58 | VOID\r | |
59 | EFIAPI\r | |
60 | SecStartup (\r | |
61 | IN UINT32 SizeOfRam,\r | |
62 | IN UINT32 TempRamBase,\r | |
63 | IN VOID *BootFirmwareVolume\r | |
64 | )\r | |
65 | {\r | |
66 | EFI_SEC_PEI_HAND_OFF SecCoreData;\r | |
67 | IA32_DESCRIPTOR IdtDescriptor;\r | |
68 | SEC_IDT_TABLE IdtTableInStack;\r | |
69 | UINT32 Index;\r | |
70 | UINT32 PeiStackSize;\r | |
71 | \r | |
72 | PeiStackSize = PcdGet32 (PcdPeiTemporaryRamStackSize);\r | |
73 | if (PeiStackSize == 0) {\r | |
74 | PeiStackSize = (SizeOfRam >> 1);\r | |
75 | }\r | |
76 | \r | |
77 | ASSERT (PeiStackSize < SizeOfRam);\r | |
78 | \r | |
79 | //\r | |
80 | // Process all libraries constructor function linked to SecCore.\r | |
81 | //\r | |
82 | ProcessLibraryConstructorList ();\r | |
83 | \r | |
84 | DEBUG ((DEBUG_INFO, "SecCore - SecStartup\n"));\r | |
85 | \r | |
86 | //\r | |
87 | // Initialize floating point operating environment\r | |
88 | // to be compliant with UEFI spec.\r | |
89 | //\r | |
90 | InitializeFloatingPointUnits ();\r | |
91 | \r | |
92 | \r | |
93 | // |-------------------|---->\r | |
94 | // |Idt Table |\r | |
95 | // |-------------------|\r | |
96 | // |PeiService Pointer | PeiStackSize\r | |
97 | // |-------------------|\r | |
98 | // | |\r | |
99 | // | Stack |\r | |
100 | // |-------------------|---->\r | |
101 | // | |\r | |
102 | // | |\r | |
103 | // | Heap | PeiTemporayRamSize\r | |
104 | // | |\r | |
105 | // | |\r | |
106 | // |-------------------|----> TempRamBase\r | |
107 | \r | |
108 | IdtTableInStack.PeiService = 0;\r | |
109 | for (Index = 0; Index < SEC_IDT_ENTRY_COUNT; Index ++) {\r | |
110 | CopyMem ((VOID*)&IdtTableInStack.IdtTable[Index], (VOID*)&mIdtEntryTemplate, sizeof (UINT64));\r | |
111 | }\r | |
112 | \r | |
113 | IdtDescriptor.Base = (UINTN) &IdtTableInStack.IdtTable;\r | |
114 | IdtDescriptor.Limit = (UINT16)(sizeof (IdtTableInStack.IdtTable) - 1);\r | |
115 | \r | |
116 | AsmWriteIdtr (&IdtDescriptor);\r | |
117 | \r | |
118 | //\r | |
119 | // Update the base address and length of Pei temporary memory\r | |
120 | //\r | |
121 | SecCoreData.DataSize = (UINT16) sizeof (EFI_SEC_PEI_HAND_OFF);\r | |
122 | SecCoreData.BootFirmwareVolumeBase = BootFirmwareVolume;\r | |
123 | SecCoreData.BootFirmwareVolumeSize = (UINTN)(SIZE_4GB - (UINTN) BootFirmwareVolume);\r | |
124 | SecCoreData.TemporaryRamBase = (VOID*)(UINTN) TempRamBase;\r | |
125 | SecCoreData.TemporaryRamSize = SizeOfRam;\r | |
126 | SecCoreData.PeiTemporaryRamBase = SecCoreData.TemporaryRamBase;\r | |
127 | SecCoreData.PeiTemporaryRamSize = SizeOfRam - PeiStackSize;\r | |
128 | SecCoreData.StackBase = (VOID*)(UINTN)(TempRamBase + SecCoreData.PeiTemporaryRamSize);\r | |
129 | SecCoreData.StackSize = PeiStackSize;\r | |
130 | \r | |
131 | DEBUG ((DEBUG_INFO, "BootFirmwareVolumeBase - 0x%x\n", SecCoreData.BootFirmwareVolumeBase));\r | |
132 | DEBUG ((DEBUG_INFO, "BootFirmwareVolumeSize - 0x%x\n", SecCoreData.BootFirmwareVolumeSize));\r | |
133 | DEBUG ((DEBUG_INFO, "TemporaryRamBase - 0x%x\n", SecCoreData.TemporaryRamBase));\r | |
134 | DEBUG ((DEBUG_INFO, "TemporaryRamSize - 0x%x\n", SecCoreData.TemporaryRamSize));\r | |
135 | DEBUG ((DEBUG_INFO, "PeiTemporaryRamBase - 0x%x\n", SecCoreData.PeiTemporaryRamBase));\r | |
136 | DEBUG ((DEBUG_INFO, "PeiTemporaryRamSize - 0x%x\n", SecCoreData.PeiTemporaryRamSize));\r | |
137 | DEBUG ((DEBUG_INFO, "StackBase - 0x%x\n", SecCoreData.StackBase));\r | |
138 | DEBUG ((DEBUG_INFO, "StackSize - 0x%x\n", SecCoreData.StackSize));\r | |
139 | \r | |
140 | //\r | |
141 | // Initialize Debug Agent to support source level debug in SEC/PEI phases before memory ready.\r | |
142 | //\r | |
143 | InitializeDebugAgent (DEBUG_AGENT_INIT_PREMEM_SEC, &SecCoreData, SecStartupPhase2);\r | |
144 | \r | |
145 | }\r | |
146 | \r | |
147 | /**\r | |
148 | This API patch the TopOfTemporaryRam value in SecPpiList.\r | |
149 | \r | |
150 | @param[in,out] SecPpiList PPI list to be patched.\r | |
151 | @param[in] TopOfTemporaryRam The top of CAR.\r | |
152 | \r | |
153 | **/\r | |
154 | VOID\r | |
155 | PatchTopOfTemporaryRamPpi (\r | |
156 | IN OUT EFI_PEI_PPI_DESCRIPTOR *SecPpiList,\r | |
157 | IN VOID *TopOfTemporaryRam\r | |
158 | )\r | |
159 | {\r | |
160 | SecPpiList[0].Ppi = TopOfTemporaryRam;\r | |
161 | }\r | |
162 | \r | |
163 | /**\r | |
164 | Caller provided function to be invoked at the end of InitializeDebugAgent().\r | |
165 | \r | |
166 | Entry point to the C language phase of SEC. After the SEC assembly\r | |
167 | code has initialized some temporary memory and set up the stack,\r | |
168 | the control is transferred to this function.\r | |
169 | \r | |
170 | @param[in] Context The first input parameter of InitializeDebugAgent().\r | |
171 | \r | |
172 | **/\r | |
173 | VOID\r | |
174 | EFIAPI\r | |
175 | SecStartupPhase2(\r | |
176 | IN VOID *Context\r | |
177 | )\r | |
178 | {\r | |
179 | EFI_SEC_PEI_HAND_OFF *SecCoreData;\r | |
180 | EFI_PEI_PPI_DESCRIPTOR *PpiList;\r | |
181 | UINT32 Index;\r | |
182 | EFI_PEI_PPI_DESCRIPTOR LocalSecPpiList[sizeof(mPeiSecMainPpi)/sizeof(mPeiSecMainPpi[0])];\r | |
183 | EFI_PEI_PPI_DESCRIPTOR AllSecPpiList[FixedPcdGet32(PcdSecCoreMaxPpiSupported)];\r | |
184 | EFI_PEI_CORE_ENTRY_POINT PeiCoreEntryPoint;\r | |
185 | \r | |
186 | SecCoreData = (EFI_SEC_PEI_HAND_OFF *) Context;\r | |
187 | //\r | |
188 | // Find Pei Core entry point. It will report SEC and Pei Core debug information if remote debug\r | |
189 | // is enabled.\r | |
190 | //\r | |
191 | FindAndReportEntryPoints ((EFI_FIRMWARE_VOLUME_HEADER *) SecCoreData->BootFirmwareVolumeBase, &PeiCoreEntryPoint);\r | |
192 | if (PeiCoreEntryPoint == NULL)\r | |
193 | {\r | |
194 | CpuDeadLoop ();\r | |
195 | }\r | |
196 | \r | |
197 | CopyMem (LocalSecPpiList, mPeiSecMainPpi, sizeof(mPeiSecMainPpi));\r | |
198 | PatchTopOfTemporaryRamPpi (LocalSecPpiList, (VOID *)((UINTN)SecCoreData->TemporaryRamBase + SecCoreData->TemporaryRamSize));\r | |
199 | \r | |
200 | //\r | |
201 | // Perform platform specific initialization before entering PeiCore.\r | |
202 | //\r | |
203 | PpiList = SecPlatformMain (SecCoreData);\r | |
204 | if (PpiList != NULL) {\r | |
205 | //\r | |
206 | // Remove the terminal flag from the terminal Ppi\r | |
207 | //\r | |
208 | CopyMem (AllSecPpiList, LocalSecPpiList, sizeof (LocalSecPpiList));\r | |
209 | for (Index = 0; Index < PcdGet32 (PcdSecCoreMaxPpiSupported); Index ++) {\r | |
210 | if ((AllSecPpiList[Index].Flags & EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST) == EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST) {\r | |
211 | break;\r | |
212 | }\r | |
213 | }\r | |
214 | AllSecPpiList[Index].Flags = AllSecPpiList[Index].Flags & (~EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST);\r | |
215 | \r | |
216 | //\r | |
217 | // Append the platform additional Ppi list\r | |
218 | //\r | |
219 | Index += 1;\r | |
220 | while (Index < PcdGet32 (PcdSecCoreMaxPpiSupported) &&\r | |
221 | ((PpiList->Flags & EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST) != EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST)) {\r | |
222 | CopyMem (&AllSecPpiList[Index], PpiList, sizeof (EFI_PEI_PPI_DESCRIPTOR));\r | |
223 | Index++;\r | |
224 | PpiList++;\r | |
225 | }\r | |
226 | \r | |
227 | //\r | |
228 | // Check whether the total Ppis exceeds the max supported Ppi.\r | |
229 | //\r | |
230 | if (Index >= PcdGet32 (PcdSecCoreMaxPpiSupported)) {\r | |
231 | //\r | |
232 | // the total Ppi is larger than the supported Max\r | |
233 | // PcdSecCoreMaxPpiSupported can be enlarged to solve it.\r | |
234 | //\r | |
235 | CpuDeadLoop ();\r | |
236 | } else {\r | |
237 | //\r | |
238 | // Add the terminal Ppi\r | |
239 | //\r | |
240 | CopyMem (&AllSecPpiList[Index], PpiList, sizeof (EFI_PEI_PPI_DESCRIPTOR));\r | |
241 | }\r | |
242 | \r | |
243 | //\r | |
244 | // Set PpiList to the total Ppi\r | |
245 | //\r | |
246 | PpiList = &AllSecPpiList[0];\r | |
247 | } else {\r | |
248 | //\r | |
249 | // No addition Ppi, PpiList directly point to the common Ppi list.\r | |
250 | //\r | |
251 | PpiList = &LocalSecPpiList[0];\r | |
252 | }\r | |
253 | \r | |
254 | //\r | |
255 | // Transfer the control to the PEI core\r | |
256 | //\r | |
257 | ASSERT (PeiCoreEntryPoint != NULL);\r | |
258 | (*PeiCoreEntryPoint) (SecCoreData, PpiList);\r | |
259 | \r | |
260 | //\r | |
261 | // Should not come here.\r | |
262 | //\r | |
263 | return ;\r | |
264 | }\r |