]> git.proxmox.com Git - mirror_edk2.git/blame - IntelFsp2Pkg/FspSecCore/SecMain.c
IntelFsp2Pkg: Support Multi-Phase SiInit and debug handlers.
[mirror_edk2.git] / IntelFsp2Pkg / FspSecCore / SecMain.c
CommitLineData
cf1d4549
JY
1/** @file\r
2\r
f2cdb268 3 Copyright (c) 2014 - 2020, Intel Corporation. All rights reserved.<BR>\r
9672cd30 4 SPDX-License-Identifier: BSD-2-Clause-Patent\r
cf1d4549
JY
5\r
6**/\r
7\r
8#include "SecMain.h"\r
9#include "SecFsp.h"\r
10\r
11EFI_PEI_TEMPORARY_RAM_SUPPORT_PPI gSecTemporaryRamSupportPpi = {\r
12 SecTemporaryRamSupport\r
13};\r
14\r
15EFI_PEI_PPI_DESCRIPTOR mPeiSecPlatformInformationPpi[] = {\r
a2e61f34
CC
16 {\r
17 EFI_PEI_PPI_DESCRIPTOR_PPI,\r
18 &gFspInApiModePpiGuid,\r
19 NULL\r
20 },\r
cf1d4549
JY
21 {\r
22 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
23 &gEfiTemporaryRamSupportPpiGuid,\r
24 &gSecTemporaryRamSupportPpi\r
25 }\r
26};\r
27\r
28//\r
29// These are IDT entries pointing to 08:FFFFFFE4h.\r
30//\r
31UINT64 mIdtEntryTemplate = 0xffff8e000008ffe4ULL;\r
32\r
33/**\r
34\r
35 Entry point to the C language phase of SEC. After the SEC assembly\r
36 code has initialized some temporary memory and set up the stack,\r
37 the control is transferred to this function.\r
38\r
39\r
40 @param[in] SizeOfRam Size of the temporary memory available for use.\r
058dcbf2 41 @param[in] TempRamBase Base address of temporary ram\r
cf1d4549
JY
42 @param[in] BootFirmwareVolume Base address of the Boot Firmware Volume.\r
43 @param[in] PeiCore PeiCore entry point.\r
44 @param[in] BootLoaderStack BootLoader stack.\r
45 @param[in] ApiIdx the index of API.\r
46\r
47 @return This function never returns.\r
48\r
49**/\r
50VOID\r
51EFIAPI\r
52SecStartup (\r
53 IN UINT32 SizeOfRam,\r
54 IN UINT32 TempRamBase,\r
55 IN VOID *BootFirmwareVolume,\r
56 IN PEI_CORE_ENTRY PeiCore,\r
57 IN UINT32 BootLoaderStack,\r
58 IN UINT32 ApiIdx\r
59 )\r
60{\r
61 EFI_SEC_PEI_HAND_OFF SecCoreData;\r
62 IA32_DESCRIPTOR IdtDescriptor;\r
63 SEC_IDT_TABLE IdtTableInStack;\r
64 UINT32 Index;\r
65 FSP_GLOBAL_DATA PeiFspData;\r
66 UINT64 ExceptionHandler;\r
b1cc6f67 67 UINTN IdtSize;\r
cf1d4549
JY
68\r
69 //\r
70 // Process all libraries constructor function linked to SecCore.\r
71 //\r
72 ProcessLibraryConstructorList ();\r
73\r
74 //\r
75 // Initialize floating point operating environment\r
76 // to be compliant with UEFI spec.\r
77 //\r
78 InitializeFloatingPointUnits ();\r
79\r
12a0a80b
CC
80 //\r
81 // Scenario 1 memory map when running on bootloader stack\r
82 //\r
83 // |-------------------|---->\r
84 // |Idt Table |\r
85 // |-------------------|\r
86 // |PeiService Pointer |\r
87 // |-------------------|\r
88 // | |\r
89 // | |\r
90 // | Heap |\r
91 // | |\r
92 // | |\r
93 // |-------------------|----> TempRamBase\r
94 //\r
95 //\r
96 // |-------------------|\r
97 // |Bootloader stack |----> somewhere in memory, FSP will share this stack.\r
98 // |-------------------|\r
cf1d4549 99\r
12a0a80b
CC
100 //\r
101 // Scenario 2 memory map when running FSP on a separate stack\r
102 //\r
cf1d4549
JY
103 // |-------------------|---->\r
104 // |Idt Table |\r
105 // |-------------------|\r
106 // |PeiService Pointer | PeiStackSize\r
107 // |-------------------|\r
108 // | |\r
109 // | Stack |\r
110 // |-------------------|---->\r
111 // | |\r
112 // | |\r
91cc60ba 113 // | Heap | PeiTemporaryRamSize\r
cf1d4549
JY
114 // | |\r
115 // | |\r
116 // |-------------------|----> TempRamBase\r
520a1e60 117 IdtTableInStack.PeiService = 0;\r
b1cc6f67 118 AsmReadIdtr (&IdtDescriptor);\r
c09b254b 119 if (IdtDescriptor.Base == 0) {\r
b1cc6f67
CC
120 ExceptionHandler = FspGetExceptionHandler(mIdtEntryTemplate);\r
121 for (Index = 0; Index < FixedPcdGet8(PcdFspMaxInterruptSupported); Index ++) {\r
122 CopyMem ((VOID*)&IdtTableInStack.IdtTable[Index], (VOID*)&ExceptionHandler, sizeof (UINT64));\r
123 }\r
124 IdtSize = sizeof (IdtTableInStack.IdtTable);\r
125 } else {\r
901ae29d
CC
126 IdtSize = IdtDescriptor.Limit + 1;\r
127 if (IdtSize > sizeof (IdtTableInStack.IdtTable)) {\r
b1cc6f67
CC
128 //\r
129 // ERROR: IDT table size from boot loader is larger than FSP can support, DeadLoop here!\r
130 //\r
131 CpuDeadLoop();\r
c09b254b
CC
132 } else {\r
133 CopyMem ((VOID *) (UINTN) &IdtTableInStack.IdtTable, (VOID *) IdtDescriptor.Base, IdtSize);\r
b1cc6f67 134 }\r
cf1d4549 135 }\r
cf1d4549 136 IdtDescriptor.Base = (UINTN) &IdtTableInStack.IdtTable;\r
b1cc6f67 137 IdtDescriptor.Limit = (UINT16)(IdtSize - 1);\r
cf1d4549
JY
138\r
139 AsmWriteIdtr (&IdtDescriptor);\r
140\r
141 //\r
142 // Initialize the global FSP data region\r
143 //\r
144 FspGlobalDataInit (&PeiFspData, BootLoaderStack, (UINT8)ApiIdx);\r
145\r
146 //\r
147 // Update the base address and length of Pei temporary memory\r
148 //\r
149 SecCoreData.DataSize = sizeof (EFI_SEC_PEI_HAND_OFF);\r
150 SecCoreData.BootFirmwareVolumeBase = BootFirmwareVolume;\r
151 SecCoreData.BootFirmwareVolumeSize = (UINT32)((EFI_FIRMWARE_VOLUME_HEADER *)BootFirmwareVolume)->FvLength;\r
152\r
153 SecCoreData.TemporaryRamBase = (VOID*)(UINTN) TempRamBase;\r
12a0a80b
CC
154 if (PcdGet8 (PcdFspHeapSizePercentage) == 0) {\r
155 SecCoreData.TemporaryRamSize = SizeOfRam; // stack size that is going to be copied to the permanent memory\r
156 SecCoreData.PeiTemporaryRamBase = SecCoreData.TemporaryRamBase;\r
157 SecCoreData.PeiTemporaryRamSize = SecCoreData.TemporaryRamSize;\r
158 SecCoreData.StackBase = (VOID *)GetFspEntryStack(); // Share the same boot loader stack\r
159 SecCoreData.StackSize = 0;\r
160 } else {\r
161 SecCoreData.TemporaryRamSize = SizeOfRam;\r
162 SecCoreData.PeiTemporaryRamBase = SecCoreData.TemporaryRamBase;\r
163 SecCoreData.PeiTemporaryRamSize = SecCoreData.TemporaryRamSize * PcdGet8 (PcdFspHeapSizePercentage) / 100;\r
164 SecCoreData.StackBase = (VOID*)(UINTN)((UINTN)SecCoreData.TemporaryRamBase + SecCoreData.PeiTemporaryRamSize);\r
165 SecCoreData.StackSize = SecCoreData.TemporaryRamSize - SecCoreData.PeiTemporaryRamSize;\r
166 }\r
cf1d4549
JY
167\r
168 DEBUG ((DEBUG_INFO, "Fsp BootFirmwareVolumeBase - 0x%x\n", SecCoreData.BootFirmwareVolumeBase));\r
169 DEBUG ((DEBUG_INFO, "Fsp BootFirmwareVolumeSize - 0x%x\n", SecCoreData.BootFirmwareVolumeSize));\r
170 DEBUG ((DEBUG_INFO, "Fsp TemporaryRamBase - 0x%x\n", SecCoreData.TemporaryRamBase));\r
171 DEBUG ((DEBUG_INFO, "Fsp TemporaryRamSize - 0x%x\n", SecCoreData.TemporaryRamSize));\r
172 DEBUG ((DEBUG_INFO, "Fsp PeiTemporaryRamBase - 0x%x\n", SecCoreData.PeiTemporaryRamBase));\r
173 DEBUG ((DEBUG_INFO, "Fsp PeiTemporaryRamSize - 0x%x\n", SecCoreData.PeiTemporaryRamSize));\r
174 DEBUG ((DEBUG_INFO, "Fsp StackBase - 0x%x\n", SecCoreData.StackBase));\r
175 DEBUG ((DEBUG_INFO, "Fsp StackSize - 0x%x\n", SecCoreData.StackSize));\r
176\r
177 //\r
178 // Call PeiCore Entry\r
e37bb20c 179 //\r
cf1d4549
JY
180 PeiCore (&SecCoreData, mPeiSecPlatformInformationPpi);\r
181\r
182 //\r
183 // Should never be here\r
184 //\r
185 CpuDeadLoop ();\r
186}\r
187\r
188/**\r
189 This service of the TEMPORARY_RAM_SUPPORT_PPI that migrates temporary RAM into\r
190 permanent memory.\r
191\r
192 @param[in] PeiServices Pointer to the PEI Services Table.\r
193 @param[in] TemporaryMemoryBase Source Address in temporary memory from which the SEC or PEIM will copy the\r
194 Temporary RAM contents.\r
195 @param[in] PermanentMemoryBase Destination Address in permanent memory into which the SEC or PEIM will copy the\r
196 Temporary RAM contents.\r
197 @param[in] CopySize Amount of memory to migrate from temporary to permanent memory.\r
198\r
199 @retval EFI_SUCCESS The data was successfully returned.\r
200 @retval EFI_INVALID_PARAMETER PermanentMemoryBase + CopySize > TemporaryMemoryBase when\r
201 TemporaryMemoryBase > PermanentMemoryBase.\r
202\r
203**/\r
204EFI_STATUS\r
205EFIAPI\r
206SecTemporaryRamSupport (\r
207 IN CONST EFI_PEI_SERVICES **PeiServices,\r
208 IN EFI_PHYSICAL_ADDRESS TemporaryMemoryBase,\r
209 IN EFI_PHYSICAL_ADDRESS PermanentMemoryBase,\r
210 IN UINTN CopySize\r
211 )\r
212{\r
213 IA32_DESCRIPTOR IdtDescriptor;\r
214 VOID* OldHeap;\r
215 VOID* NewHeap;\r
216 VOID* OldStack;\r
217 VOID* NewStack;\r
218 UINTN HeapSize;\r
219 UINTN StackSize;\r
220\r
12a0a80b
CC
221 UINTN CurrentStack;\r
222 UINTN FspStackBase;\r
223\r
f2cdb268
CC
224 //\r
225 // Override OnSeparateStack to 1 because this function will switch stack to permanent memory\r
226 // which makes FSP running on different stack from bootloader temporary ram stack.\r
227 //\r
228 GetFspGlobalDataPointer ()->OnSeparateStack = 1;\r
229\r
12a0a80b
CC
230 if (PcdGet8 (PcdFspHeapSizePercentage) == 0) {\r
231\r
232 CurrentStack = AsmReadEsp();\r
233 FspStackBase = (UINTN)GetFspEntryStack();\r
e37bb20c 234\r
12a0a80b
CC
235 StackSize = FspStackBase - CurrentStack;\r
236 HeapSize = CopySize;\r
cf1d4549 237\r
12a0a80b
CC
238 OldHeap = (VOID*)(UINTN)TemporaryMemoryBase;\r
239 NewHeap = (VOID*)((UINTN)PermanentMemoryBase);\r
cf1d4549 240\r
12a0a80b
CC
241 OldStack = (VOID*)CurrentStack;\r
242 //\r
243 //The old stack is copied at the end of the stack region because stack grows down.\r
244 //\r
245 NewStack = (VOID*)((UINTN)PermanentMemoryBase - StackSize);\r
246\r
247 } else {\r
248 HeapSize = CopySize * PcdGet8 (PcdFspHeapSizePercentage) / 100 ;\r
249 StackSize = CopySize - HeapSize;\r
250\r
251 OldHeap = (VOID*)(UINTN)TemporaryMemoryBase;\r
252 NewHeap = (VOID*)((UINTN)PermanentMemoryBase + StackSize);\r
253\r
254 OldStack = (VOID*)((UINTN)TemporaryMemoryBase + HeapSize);\r
255 NewStack = (VOID*)(UINTN)PermanentMemoryBase;\r
256\r
257 }\r
cf1d4549
JY
258 //\r
259 // Migrate Heap\r
260 //\r
261 CopyMem (NewHeap, OldHeap, HeapSize);\r
262\r
263 //\r
264 // Migrate Stack\r
265 //\r
266 CopyMem (NewStack, OldStack, StackSize);\r
267\r
268\r
269 //\r
270 // We need *not* fix the return address because currently,\r
271 // The PeiCore is executed in flash.\r
272 //\r
273\r
274 //\r
275 // Rebase IDT table in permanent memory\r
276 //\r
277 AsmReadIdtr (&IdtDescriptor);\r
278 IdtDescriptor.Base = IdtDescriptor.Base - (UINTN)OldStack + (UINTN)NewStack;\r
279\r
280 AsmWriteIdtr (&IdtDescriptor);\r
281\r
282 //\r
283 // Fixed the FSP data pointer\r
284 //\r
285 FspDataPointerFixUp ((UINTN)NewStack - (UINTN)OldStack);\r
286\r
287 //\r
288 // SecSwitchStack function must be invoked after the memory migration\r
058dcbf2
GL
289 // immediately, also we need fixup the stack change caused by new call into\r
290 // permanent memory.\r
cf1d4549
JY
291 //\r
292 SecSwitchStack (\r
293 (UINT32) (UINTN) OldStack,\r
294 (UINT32) (UINTN) NewStack\r
295 );\r
296\r
297 return EFI_SUCCESS;\r
298}\r