]> git.proxmox.com Git - mirror_edk2.git/blame - IntelFsp2Pkg/FspSecCore/SecMain.c
IntelFsp2Pkg: FSP can utilize bootloader stack
[mirror_edk2.git] / IntelFsp2Pkg / FspSecCore / SecMain.c
CommitLineData
cf1d4549
JY
1/** @file\r
2\r
12a0a80b 3 Copyright (c) 2014 - 2019, Intel Corporation. All rights reserved.<BR>\r
cf1d4549
JY
4 This program and the accompanying materials\r
5 are licensed and made available under the terms and conditions of the BSD License\r
6 which accompanies this distribution. The full text of the license may be found at\r
7 http://opensource.org/licenses/bsd-license.php.\r
8\r
9 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
10 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
11\r
12**/\r
13\r
14#include "SecMain.h"\r
15#include "SecFsp.h"\r
16\r
17EFI_PEI_TEMPORARY_RAM_SUPPORT_PPI gSecTemporaryRamSupportPpi = {\r
18 SecTemporaryRamSupport\r
19};\r
20\r
21EFI_PEI_PPI_DESCRIPTOR mPeiSecPlatformInformationPpi[] = {\r
a2e61f34
CC
22 {\r
23 EFI_PEI_PPI_DESCRIPTOR_PPI,\r
24 &gFspInApiModePpiGuid,\r
25 NULL\r
26 },\r
cf1d4549
JY
27 {\r
28 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
29 &gEfiTemporaryRamSupportPpiGuid,\r
30 &gSecTemporaryRamSupportPpi\r
31 }\r
32};\r
33\r
34//\r
35// These are IDT entries pointing to 08:FFFFFFE4h.\r
36//\r
37UINT64 mIdtEntryTemplate = 0xffff8e000008ffe4ULL;\r
38\r
39/**\r
40\r
41 Entry point to the C language phase of SEC. After the SEC assembly\r
42 code has initialized some temporary memory and set up the stack,\r
43 the control is transferred to this function.\r
44\r
45\r
46 @param[in] SizeOfRam Size of the temporary memory available for use.\r
058dcbf2 47 @param[in] TempRamBase Base address of temporary ram\r
cf1d4549
JY
48 @param[in] BootFirmwareVolume Base address of the Boot Firmware Volume.\r
49 @param[in] PeiCore PeiCore entry point.\r
50 @param[in] BootLoaderStack BootLoader stack.\r
51 @param[in] ApiIdx the index of API.\r
52\r
53 @return This function never returns.\r
54\r
55**/\r
56VOID\r
57EFIAPI\r
58SecStartup (\r
59 IN UINT32 SizeOfRam,\r
60 IN UINT32 TempRamBase,\r
61 IN VOID *BootFirmwareVolume,\r
62 IN PEI_CORE_ENTRY PeiCore,\r
63 IN UINT32 BootLoaderStack,\r
64 IN UINT32 ApiIdx\r
65 )\r
66{\r
67 EFI_SEC_PEI_HAND_OFF SecCoreData;\r
68 IA32_DESCRIPTOR IdtDescriptor;\r
69 SEC_IDT_TABLE IdtTableInStack;\r
70 UINT32 Index;\r
71 FSP_GLOBAL_DATA PeiFspData;\r
72 UINT64 ExceptionHandler;\r
b1cc6f67 73 UINTN IdtSize;\r
cf1d4549
JY
74\r
75 //\r
76 // Process all libraries constructor function linked to SecCore.\r
77 //\r
78 ProcessLibraryConstructorList ();\r
79\r
80 //\r
81 // Initialize floating point operating environment\r
82 // to be compliant with UEFI spec.\r
83 //\r
84 InitializeFloatingPointUnits ();\r
85\r
12a0a80b
CC
86 //\r
87 // Scenario 1 memory map when running on bootloader stack\r
88 //\r
89 // |-------------------|---->\r
90 // |Idt Table |\r
91 // |-------------------|\r
92 // |PeiService Pointer |\r
93 // |-------------------|\r
94 // | |\r
95 // | |\r
96 // | Heap |\r
97 // | |\r
98 // | |\r
99 // |-------------------|----> TempRamBase\r
100 //\r
101 //\r
102 // |-------------------|\r
103 // |Bootloader stack |----> somewhere in memory, FSP will share this stack.\r
104 // |-------------------|\r
cf1d4549 105\r
12a0a80b
CC
106 //\r
107 // Scenario 2 memory map when running FSP on a separate stack\r
108 //\r
cf1d4549
JY
109 // |-------------------|---->\r
110 // |Idt Table |\r
111 // |-------------------|\r
112 // |PeiService Pointer | PeiStackSize\r
113 // |-------------------|\r
114 // | |\r
115 // | Stack |\r
116 // |-------------------|---->\r
117 // | |\r
118 // | |\r
119 // | Heap | PeiTemporayRamSize\r
120 // | |\r
121 // | |\r
122 // |-------------------|----> TempRamBase\r
123 IdtTableInStack.PeiService = NULL;\r
b1cc6f67 124 AsmReadIdtr (&IdtDescriptor);\r
c09b254b 125 if (IdtDescriptor.Base == 0) {\r
b1cc6f67
CC
126 ExceptionHandler = FspGetExceptionHandler(mIdtEntryTemplate);\r
127 for (Index = 0; Index < FixedPcdGet8(PcdFspMaxInterruptSupported); Index ++) {\r
128 CopyMem ((VOID*)&IdtTableInStack.IdtTable[Index], (VOID*)&ExceptionHandler, sizeof (UINT64));\r
129 }\r
130 IdtSize = sizeof (IdtTableInStack.IdtTable);\r
131 } else {\r
901ae29d
CC
132 IdtSize = IdtDescriptor.Limit + 1;\r
133 if (IdtSize > sizeof (IdtTableInStack.IdtTable)) {\r
b1cc6f67
CC
134 //\r
135 // ERROR: IDT table size from boot loader is larger than FSP can support, DeadLoop here!\r
136 //\r
137 CpuDeadLoop();\r
c09b254b
CC
138 } else {\r
139 CopyMem ((VOID *) (UINTN) &IdtTableInStack.IdtTable, (VOID *) IdtDescriptor.Base, IdtSize);\r
b1cc6f67 140 }\r
cf1d4549 141 }\r
cf1d4549 142 IdtDescriptor.Base = (UINTN) &IdtTableInStack.IdtTable;\r
b1cc6f67 143 IdtDescriptor.Limit = (UINT16)(IdtSize - 1);\r
cf1d4549
JY
144\r
145 AsmWriteIdtr (&IdtDescriptor);\r
146\r
147 //\r
148 // Initialize the global FSP data region\r
149 //\r
150 FspGlobalDataInit (&PeiFspData, BootLoaderStack, (UINT8)ApiIdx);\r
151\r
152 //\r
153 // Update the base address and length of Pei temporary memory\r
154 //\r
155 SecCoreData.DataSize = sizeof (EFI_SEC_PEI_HAND_OFF);\r
156 SecCoreData.BootFirmwareVolumeBase = BootFirmwareVolume;\r
157 SecCoreData.BootFirmwareVolumeSize = (UINT32)((EFI_FIRMWARE_VOLUME_HEADER *)BootFirmwareVolume)->FvLength;\r
158\r
159 SecCoreData.TemporaryRamBase = (VOID*)(UINTN) TempRamBase;\r
12a0a80b
CC
160 if (PcdGet8 (PcdFspHeapSizePercentage) == 0) {\r
161 SecCoreData.TemporaryRamSize = SizeOfRam; // stack size that is going to be copied to the permanent memory\r
162 SecCoreData.PeiTemporaryRamBase = SecCoreData.TemporaryRamBase;\r
163 SecCoreData.PeiTemporaryRamSize = SecCoreData.TemporaryRamSize;\r
164 SecCoreData.StackBase = (VOID *)GetFspEntryStack(); // Share the same boot loader stack\r
165 SecCoreData.StackSize = 0;\r
166 } else {\r
167 SecCoreData.TemporaryRamSize = SizeOfRam;\r
168 SecCoreData.PeiTemporaryRamBase = SecCoreData.TemporaryRamBase;\r
169 SecCoreData.PeiTemporaryRamSize = SecCoreData.TemporaryRamSize * PcdGet8 (PcdFspHeapSizePercentage) / 100;\r
170 SecCoreData.StackBase = (VOID*)(UINTN)((UINTN)SecCoreData.TemporaryRamBase + SecCoreData.PeiTemporaryRamSize);\r
171 SecCoreData.StackSize = SecCoreData.TemporaryRamSize - SecCoreData.PeiTemporaryRamSize;\r
172 }\r
cf1d4549
JY
173\r
174 DEBUG ((DEBUG_INFO, "Fsp BootFirmwareVolumeBase - 0x%x\n", SecCoreData.BootFirmwareVolumeBase));\r
175 DEBUG ((DEBUG_INFO, "Fsp BootFirmwareVolumeSize - 0x%x\n", SecCoreData.BootFirmwareVolumeSize));\r
176 DEBUG ((DEBUG_INFO, "Fsp TemporaryRamBase - 0x%x\n", SecCoreData.TemporaryRamBase));\r
177 DEBUG ((DEBUG_INFO, "Fsp TemporaryRamSize - 0x%x\n", SecCoreData.TemporaryRamSize));\r
178 DEBUG ((DEBUG_INFO, "Fsp PeiTemporaryRamBase - 0x%x\n", SecCoreData.PeiTemporaryRamBase));\r
179 DEBUG ((DEBUG_INFO, "Fsp PeiTemporaryRamSize - 0x%x\n", SecCoreData.PeiTemporaryRamSize));\r
180 DEBUG ((DEBUG_INFO, "Fsp StackBase - 0x%x\n", SecCoreData.StackBase));\r
181 DEBUG ((DEBUG_INFO, "Fsp StackSize - 0x%x\n", SecCoreData.StackSize));\r
182\r
183 //\r
184 // Call PeiCore Entry\r
e37bb20c 185 //\r
cf1d4549
JY
186 PeiCore (&SecCoreData, mPeiSecPlatformInformationPpi);\r
187\r
188 //\r
189 // Should never be here\r
190 //\r
191 CpuDeadLoop ();\r
192}\r
193\r
194/**\r
195 This service of the TEMPORARY_RAM_SUPPORT_PPI that migrates temporary RAM into\r
196 permanent memory.\r
197\r
198 @param[in] PeiServices Pointer to the PEI Services Table.\r
199 @param[in] TemporaryMemoryBase Source Address in temporary memory from which the SEC or PEIM will copy the\r
200 Temporary RAM contents.\r
201 @param[in] PermanentMemoryBase Destination Address in permanent memory into which the SEC or PEIM will copy the\r
202 Temporary RAM contents.\r
203 @param[in] CopySize Amount of memory to migrate from temporary to permanent memory.\r
204\r
205 @retval EFI_SUCCESS The data was successfully returned.\r
206 @retval EFI_INVALID_PARAMETER PermanentMemoryBase + CopySize > TemporaryMemoryBase when\r
207 TemporaryMemoryBase > PermanentMemoryBase.\r
208\r
209**/\r
210EFI_STATUS\r
211EFIAPI\r
212SecTemporaryRamSupport (\r
213 IN CONST EFI_PEI_SERVICES **PeiServices,\r
214 IN EFI_PHYSICAL_ADDRESS TemporaryMemoryBase,\r
215 IN EFI_PHYSICAL_ADDRESS PermanentMemoryBase,\r
216 IN UINTN CopySize\r
217 )\r
218{\r
219 IA32_DESCRIPTOR IdtDescriptor;\r
220 VOID* OldHeap;\r
221 VOID* NewHeap;\r
222 VOID* OldStack;\r
223 VOID* NewStack;\r
224 UINTN HeapSize;\r
225 UINTN StackSize;\r
226\r
12a0a80b
CC
227 UINTN CurrentStack;\r
228 UINTN FspStackBase;\r
229\r
230 if (PcdGet8 (PcdFspHeapSizePercentage) == 0) {\r
231\r
232 CurrentStack = AsmReadEsp();\r
233 FspStackBase = (UINTN)GetFspEntryStack();\r
e37bb20c 234\r
12a0a80b
CC
235 StackSize = FspStackBase - CurrentStack;\r
236 HeapSize = CopySize;\r
cf1d4549 237\r
12a0a80b
CC
238 OldHeap = (VOID*)(UINTN)TemporaryMemoryBase;\r
239 NewHeap = (VOID*)((UINTN)PermanentMemoryBase);\r
cf1d4549 240\r
12a0a80b
CC
241 OldStack = (VOID*)CurrentStack;\r
242 //\r
243 //The old stack is copied at the end of the stack region because stack grows down.\r
244 //\r
245 NewStack = (VOID*)((UINTN)PermanentMemoryBase - StackSize);\r
246\r
247 } else {\r
248 HeapSize = CopySize * PcdGet8 (PcdFspHeapSizePercentage) / 100 ;\r
249 StackSize = CopySize - HeapSize;\r
250\r
251 OldHeap = (VOID*)(UINTN)TemporaryMemoryBase;\r
252 NewHeap = (VOID*)((UINTN)PermanentMemoryBase + StackSize);\r
253\r
254 OldStack = (VOID*)((UINTN)TemporaryMemoryBase + HeapSize);\r
255 NewStack = (VOID*)(UINTN)PermanentMemoryBase;\r
256\r
257 }\r
cf1d4549
JY
258 //\r
259 // Migrate Heap\r
260 //\r
261 CopyMem (NewHeap, OldHeap, HeapSize);\r
262\r
263 //\r
264 // Migrate Stack\r
265 //\r
266 CopyMem (NewStack, OldStack, StackSize);\r
267\r
268\r
269 //\r
270 // We need *not* fix the return address because currently,\r
271 // The PeiCore is executed in flash.\r
272 //\r
273\r
274 //\r
275 // Rebase IDT table in permanent memory\r
276 //\r
277 AsmReadIdtr (&IdtDescriptor);\r
278 IdtDescriptor.Base = IdtDescriptor.Base - (UINTN)OldStack + (UINTN)NewStack;\r
279\r
280 AsmWriteIdtr (&IdtDescriptor);\r
281\r
282 //\r
283 // Fixed the FSP data pointer\r
284 //\r
285 FspDataPointerFixUp ((UINTN)NewStack - (UINTN)OldStack);\r
286\r
287 //\r
288 // SecSwitchStack function must be invoked after the memory migration\r
058dcbf2
GL
289 // immediately, also we need fixup the stack change caused by new call into\r
290 // permanent memory.\r
cf1d4549
JY
291 //\r
292 SecSwitchStack (\r
293 (UINT32) (UINTN) OldStack,\r
294 (UINT32) (UINTN) NewStack\r
295 );\r
296\r
297 return EFI_SUCCESS;\r
298}\r