]> git.proxmox.com Git - mirror_edk2.git/blame - ArmPlatformPkg/Sec/Sec.c
ARM Packages: Rename PcdNormal* into Pcd* PCDs
[mirror_edk2.git] / ArmPlatformPkg / Sec / Sec.c
CommitLineData
1d5d0ae9 1/** @file
2* Main file supporting the SEC Phase for Versatile Express
3*
4* Copyright (c) 2011, ARM Limited. All rights reserved.
5*
6* This program and the accompanying materials
7* are licensed and made available under the terms and conditions of the BSD License
8* which accompanies this distribution. The full text of the license may be found at
9* http://opensource.org/licenses/bsd-license.php
10*
11* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
12* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
13*
14**/
15
16#include <Library/DebugLib.h>
a6caee65 17#include <Library/DebugAgentLib.h>
1d5d0ae9 18#include <Library/PcdLib.h>
2637d1ef 19#include <Library/PrintLib.h>
1d5d0ae9 20#include <Library/BaseLib.h>
21#include <Library/BaseMemoryLib.h>
22#include <Library/ArmLib.h>
1d5d0ae9 23#include <Library/SerialPortLib.h>
24#include <Library/ArmPlatformLib.h>
25
0620eec9 26#include <Chipset/ArmV7.h>
55a0d64b 27#include <Library/ArmGicLib.h>
0620eec9 28
e862cd50 29#define SerialPrint(txt) SerialPortWrite ((UINT8*)txt, AsciiStrLen(txt)+1);
2637d1ef 30
1d5d0ae9 31extern VOID *monitor_vector_table;
32
0620eec9 33VOID
34ArmSetupGicNonSecure (
35 IN INTN GicDistributorBase,
36 IN INTN GicInterruptInterfaceBase
1d5d0ae9 37);
38
39// Vector Table for Sec Phase
0620eec9 40VOID
41SecVectorTable (
42 VOID
43 );
1d5d0ae9 44
0620eec9 45VOID
46NonSecureWaitForFirmware (
1d5d0ae9 47 VOID
48 );
49
50VOID
51enter_monitor_mode(
52 IN VOID* Stack
53 );
54
55VOID
56return_from_exception (
57 IN UINTN NonSecureBase
58 );
59
60VOID
61copy_cpsr_into_spsr (
62 VOID
63 );
64
65VOID
66CEntryPoint (
0787bc61 67 IN UINTN MpId
1d5d0ae9 68 )
69{
2637d1ef 70 CHAR8 Buffer[100];
71 UINTN CharCount;
a6caee65 72 UINTN JumpAddress;
2637d1ef 73
1d5d0ae9 74 // Primary CPU clears out the SCU tag RAMs, secondaries wait
0787bc61 75 if (IS_PRIMARY_CORE(MpId)) {
1d5d0ae9 76 if (FixedPcdGet32(PcdMPCoreSupport)) {
77 ArmInvalidScu();
78 }
79
80 // SEC phase needs to run library constructors by hand. This assumes we are linked against the SerialLib
81 // In non SEC modules the init call is in autogenerated code.
82 SerialPortInitialize ();
2637d1ef 83
1d5d0ae9 84 // Start talking
2637d1ef 85 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"UEFI firmware built at %a on %a\n\r",__TIME__, __DATE__);
86 SerialPortWrite ((UINT8 *) Buffer, CharCount);
1d5d0ae9 87
a6caee65 88 // Initialize the Debug Agent for Source Level Debugging
89 InitializeDebugAgent (DEBUG_AGENT_INIT_PREMEM_SEC, NULL, NULL);
90 SaveAndSetDebugTimerInterrupt (TRUE);
91
1d5d0ae9 92 // Now we've got UART, make the check:
93 // - The Vector table must be 32-byte aligned
94 ASSERT(((UINT32)SecVectorTable & ((1 << 5)-1)) == 0);
95 }
96
97 // Invalidate the data cache. Doesn't have to do the Data cache clean.
98 ArmInvalidateDataCache();
99
100 //Invalidate Instruction Cache
101 ArmInvalidateInstructionCache();
102
103 //Invalidate I & D TLBs
104 ArmInvalidateInstructionAndDataTlb();
105
106 // Enable Full Access to CoProcessors
107 ArmWriteCPACR (CPACR_CP_FULL_ACCESS);
108
109 // Enable SWP instructions
110 ArmEnableSWPInstruction();
111
112 // Enable program flow prediction, if supported.
113 ArmEnableBranchPrediction();
114
115 if (FixedPcdGet32(PcdVFPEnabled)) {
116 ArmEnableVFP();
117 }
118
0787bc61 119 if (IS_PRIMARY_CORE(MpId)) {
8e06b586 120 // Initialize peripherals that must be done at the early stage
121 // Example: Some L2x0 controllers must be initialized in Secure World
aa01abaa 122 ArmPlatformSecInitialize ();
1d5d0ae9 123
124 // If we skip the PEI Core we could want to initialize the DRAM in the SEC phase.
125 // If we are in standalone, we need the initialization to copy the UEFI firmware into DRAM
a6caee65 126 if (FeaturePcdGet(PcdSystemMemoryInitializeInSec)) {
1d5d0ae9 127 // Initialize system memory (DRAM)
1ad14bc8 128 ArmPlatformInitializeSystemMemory ();
1d5d0ae9 129 }
130
0620eec9 131 // Some platform can change their physical memory mapping
1ad14bc8 132 ArmPlatformBootRemapping ();
1d5d0ae9 133 }
134
135 // Test if Trustzone is supported on this platform
136 if (ArmPlatformTrustzoneSupported()) {
137 if (FixedPcdGet32(PcdMPCoreSupport)) {
138 // Setup SMP in Non Secure world
0787bc61 139 ArmSetupSmpNonSecure (GET_CORE_ID(MpId));
1d5d0ae9 140 }
141
142 // Enter Monitor Mode
0787bc61 143 enter_monitor_mode ((VOID*)(PcdGet32(PcdCPUCoresSecMonStackBase) + (PcdGet32(PcdCPUCoreSecMonStackSize) * GET_CORE_POS(MpId))));
1d5d0ae9 144
145 //Write the monitor mode vector table address
146 ArmWriteVMBar((UINT32) &monitor_vector_table);
147
148 //-------------------- Monitor Mode ---------------------
0620eec9 149 // Setup the Trustzone Chipsets
0787bc61 150 if (IS_PRIMARY_CORE(MpId)) {
1d5d0ae9 151 ArmPlatformTrustzoneInit();
152
153 // Wake up the secondary cores by sending a interrupt to everyone else
154 // NOTE 1: The Software Generated Interrupts are always enabled on Cortex-A9
155 // MPcore test chip on Versatile Express board, So the Software doesn't have to
156 // enable SGI's explicitly.
157 // 2: As no other Interrupts are enabled, doesn't have to worry about the priority.
158 // 3: As all the cores are in secure state, use secure SGI's
159 //
160
55a0d64b 161 ArmGicEnableDistributor (PcdGet32(PcdGicDistributorBase));
162 ArmGicEnableInterruptInterface (PcdGet32(PcdGicInterruptInterfaceBase));
1d5d0ae9 163
164 // Send SGI to all Secondary core to wake them up from WFI state.
55a0d64b 165 ArmGicSendSgiTo (PcdGet32(PcdGicDistributorBase), ARM_GIC_ICDSGIR_FILTER_EVERYONEELSE, 0x0E);
1d5d0ae9 166 } else {
167 // The secondary cores need to wait until the Trustzone chipsets configuration is done
0620eec9 168 // before switching to Non Secure World
1d5d0ae9 169
170 // Enabled GIC CPU Interface
55a0d64b 171 ArmGicEnableInterruptInterface (PcdGet32(PcdGicInterruptInterfaceBase));
1d5d0ae9 172
173 // Waiting for the SGI from the primary core
174 ArmCallWFI();
175
0620eec9 176 // Acknowledge the interrupt and send End of Interrupt signal.
55a0d64b 177 ArmGicAcknowledgeSgiFrom (PcdGet32(PcdGicInterruptInterfaceBase), PRIMARY_CORE_ID);
1d5d0ae9 178 }
179
180 // Transfer the interrupt to Non-secure World
55a0d64b 181 ArmGicSetupNonSecure (PcdGet32(PcdGicDistributorBase),PcdGet32(PcdGicInterruptInterfaceBase));
1d5d0ae9 182
183 // Write to CP15 Non-secure Access Control Register :
184 // - Enable CP10 and CP11 accesses in NS World
185 // - Enable Access to Preload Engine in NS World
186 // - Enable lockable TLB entries allocation in NS world
187 // - Enable R/W access to SMP bit of Auxiliary Control Register in NS world
188 ArmWriteNsacr(NSACR_NS_SMP | NSACR_TL | NSACR_PLE | NSACR_CP(10) | NSACR_CP(11));
189
190 // CP15 Secure Configuration Register with Non Secure bit (SCR_NS), CPSR.A modified in any
191 // security state (SCR_AW), CPSR.F modified in any security state (SCR_FW)
192 ArmWriteScr(SCR_NS | SCR_FW | SCR_AW);
193 } else {
0787bc61 194 if (IS_PRIMARY_CORE(MpId)) {
2637d1ef 195 SerialPrint ("Trust Zone Configuration is disabled\n\r");
1d5d0ae9 196 }
197
0620eec9 198 // Trustzone is not enabled, just enable the Distributor and CPU interface
0787bc61 199 if (IS_PRIMARY_CORE(MpId)) {
55a0d64b 200 ArmGicEnableDistributor (PcdGet32(PcdGicDistributorBase));
bf7d7a67 201 }
55a0d64b 202 ArmGicEnableInterruptInterface (PcdGet32(PcdGicInterruptInterfaceBase));
1d5d0ae9 203
204 // With Trustzone support the transition from Sec to Normal world is done by return_from_exception().
205 // If we want to keep this function call we need to ensure the SVC's SPSR point to the same Program
206 // Status Register as the the current one (CPSR).
a6caee65 207 copy_cpsr_into_spsr ();
1d5d0ae9 208 }
209
f92b93c9 210 JumpAddress = PcdGet32 (PcdFvBaseAddress);
0787bc61 211 ArmPlatformSecExtraAction (MpId, &JumpAddress);
64e03133 212
a6caee65 213 return_from_exception (JumpAddress);
1d5d0ae9 214 //-------------------- Non Secure Mode ---------------------
215
216 // PEI Core should always load and never return
217 ASSERT (FALSE);
218}
219
2637d1ef 220VOID
221SecCommonExceptionEntry (
222 IN UINT32 Entry,
223 IN UINT32 LR
224 )
225{
226 CHAR8 Buffer[100];
227 UINTN CharCount;
228
1d5d0ae9 229 switch (Entry) {
230 case 0:
2637d1ef 231 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"Reset Exception at 0x%X\n\r",LR);
1d5d0ae9 232 break;
233 case 1:
2637d1ef 234 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"Undefined Exception at 0x%X\n\r",LR);
1d5d0ae9 235 break;
236 case 2:
2637d1ef 237 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"SWI Exception at 0x%X\n\r",LR);
1d5d0ae9 238 break;
239 case 3:
2637d1ef 240 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"PrefetchAbort Exception at 0x%X\n\r",LR);
1d5d0ae9 241 break;
242 case 4:
2637d1ef 243 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"DataAbort Exception at 0x%X\n\r",LR);
1d5d0ae9 244 break;
245 case 5:
2637d1ef 246 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"Reserved Exception at 0x%X\n\r",LR);
1d5d0ae9 247 break;
248 case 6:
2637d1ef 249 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"IRQ Exception at 0x%X\n\r",LR);
1d5d0ae9 250 break;
251 case 7:
2637d1ef 252 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"FIQ Exception at 0x%X\n\r",LR);
1d5d0ae9 253 break;
254 default:
2637d1ef 255 CharCount = AsciiSPrint (Buffer,sizeof (Buffer),"Unknown Exception at 0x%X\n\r",LR);
1d5d0ae9 256 break;
257 }
2637d1ef 258 SerialPortWrite ((UINT8 *) Buffer, CharCount);
1d5d0ae9 259 while(1);
260}