]> git.proxmox.com Git - mirror_edk2.git/blame - IntelFspWrapperPkg/FspWrapperSecCore/SecMain.c
IntelFspWrapperPkg: Replace BSD License with BSD+Patent License
[mirror_edk2.git] / IntelFspWrapperPkg / FspWrapperSecCore / SecMain.c
CommitLineData
a33a2f62
JY
1/** @file\r
2 C functions in SEC\r
3\r
4 Copyright (c) 2014, Intel Corporation. All rights reserved.<BR>\r
19486360 5 SPDX-License-Identifier: BSD-2-Clause-Patent\r
a33a2f62
JY
6\r
7**/\r
8\r
9\r
10#include "SecMain.h"\r
11\r
12EFI_PEI_PPI_DESCRIPTOR mPeiSecMainPpi[] = {\r
13 {\r
14 EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST,\r
15 &gTopOfTemporaryRamPpiGuid,\r
16 NULL // To be patched later.\r
17 },\r
18};\r
19\r
20//\r
21// These are IDT entries pointing to 10:FFFFFFE4h.\r
22//\r
23UINT64 mIdtEntryTemplate = 0xffff8e000010ffe4ULL;\r
24\r
25/**\r
26 Caller provided function to be invoked at the end of InitializeDebugAgent().\r
27\r
28 Entry point to the C language phase of SEC. After the SEC assembly\r
29 code has initialized some temporary memory and set up the stack,\r
30 the control is transferred to this function.\r
31\r
32 @param[in] Context The first input parameter of InitializeDebugAgent().\r
33\r
34**/\r
35VOID\r
36EFIAPI\r
37SecStartupPhase2(\r
38 IN VOID *Context\r
39 );\r
40\r
41\r
42/**\r
43\r
44 Entry point to the C language phase of SEC. After the SEC assembly\r
45 code has initialized some temporary memory and set up the stack,\r
46 the control is transferred to this function.\r
47\r
48 @param[in] SizeOfRam Size of the temporary memory available for use.\r
b9ca25cb 49 @param[in] TempRamBase Base address of temporary ram\r
a33a2f62
JY
50 @param[in] BootFirmwareVolume Base address of the Boot Firmware Volume.\r
51**/\r
52VOID\r
53EFIAPI\r
54SecStartup (\r
55 IN UINT32 SizeOfRam,\r
56 IN UINT32 TempRamBase,\r
57 IN VOID *BootFirmwareVolume\r
58 )\r
59{\r
60 EFI_SEC_PEI_HAND_OFF SecCoreData;\r
61 IA32_DESCRIPTOR IdtDescriptor;\r
62 SEC_IDT_TABLE IdtTableInStack;\r
63 UINT32 Index;\r
64 UINT32 PeiStackSize;\r
65\r
66 PeiStackSize = PcdGet32 (PcdPeiTemporaryRamStackSize);\r
67 if (PeiStackSize == 0) {\r
68 PeiStackSize = (SizeOfRam >> 1);\r
69 }\r
70\r
71 ASSERT (PeiStackSize < SizeOfRam);\r
72\r
73 //\r
74 // Process all libraries constructor function linked to SecCore.\r
75 //\r
76 ProcessLibraryConstructorList ();\r
77\r
78 DEBUG ((DEBUG_INFO, "SecCore - SecStartup\n"));\r
79\r
80 //\r
81 // Initialize floating point operating environment\r
82 // to be compliant with UEFI spec.\r
83 //\r
84 InitializeFloatingPointUnits ();\r
85\r
86\r
87 // |-------------------|---->\r
88 // |Idt Table |\r
89 // |-------------------|\r
90 // |PeiService Pointer | PeiStackSize\r
91 // |-------------------|\r
92 // | |\r
93 // | Stack |\r
94 // |-------------------|---->\r
95 // | |\r
96 // | |\r
97 // | Heap | PeiTemporayRamSize\r
98 // | |\r
99 // | |\r
100 // |-------------------|----> TempRamBase\r
101\r
102 IdtTableInStack.PeiService = 0;\r
103 for (Index = 0; Index < SEC_IDT_ENTRY_COUNT; Index ++) {\r
104 CopyMem ((VOID*)&IdtTableInStack.IdtTable[Index], (VOID*)&mIdtEntryTemplate, sizeof (UINT64));\r
105 }\r
106\r
107 IdtDescriptor.Base = (UINTN) &IdtTableInStack.IdtTable;\r
108 IdtDescriptor.Limit = (UINT16)(sizeof (IdtTableInStack.IdtTable) - 1);\r
109\r
110 AsmWriteIdtr (&IdtDescriptor);\r
111\r
112 //\r
113 // Update the base address and length of Pei temporary memory\r
114 //\r
115 SecCoreData.DataSize = (UINT16) sizeof (EFI_SEC_PEI_HAND_OFF);\r
116 SecCoreData.BootFirmwareVolumeBase = BootFirmwareVolume;\r
117 SecCoreData.BootFirmwareVolumeSize = (UINTN)(SIZE_4GB - (UINTN) BootFirmwareVolume);\r
118 SecCoreData.TemporaryRamBase = (VOID*)(UINTN) TempRamBase;\r
119 SecCoreData.TemporaryRamSize = SizeOfRam;\r
120 SecCoreData.PeiTemporaryRamBase = SecCoreData.TemporaryRamBase;\r
121 SecCoreData.PeiTemporaryRamSize = SizeOfRam - PeiStackSize;\r
122 SecCoreData.StackBase = (VOID*)(UINTN)(TempRamBase + SecCoreData.PeiTemporaryRamSize);\r
123 SecCoreData.StackSize = PeiStackSize;\r
124\r
125 DEBUG ((DEBUG_INFO, "BootFirmwareVolumeBase - 0x%x\n", SecCoreData.BootFirmwareVolumeBase));\r
126 DEBUG ((DEBUG_INFO, "BootFirmwareVolumeSize - 0x%x\n", SecCoreData.BootFirmwareVolumeSize));\r
127 DEBUG ((DEBUG_INFO, "TemporaryRamBase - 0x%x\n", SecCoreData.TemporaryRamBase));\r
128 DEBUG ((DEBUG_INFO, "TemporaryRamSize - 0x%x\n", SecCoreData.TemporaryRamSize));\r
129 DEBUG ((DEBUG_INFO, "PeiTemporaryRamBase - 0x%x\n", SecCoreData.PeiTemporaryRamBase));\r
130 DEBUG ((DEBUG_INFO, "PeiTemporaryRamSize - 0x%x\n", SecCoreData.PeiTemporaryRamSize));\r
131 DEBUG ((DEBUG_INFO, "StackBase - 0x%x\n", SecCoreData.StackBase));\r
132 DEBUG ((DEBUG_INFO, "StackSize - 0x%x\n", SecCoreData.StackSize));\r
133\r
134 //\r
135 // Initialize Debug Agent to support source level debug in SEC/PEI phases before memory ready.\r
136 //\r
137 InitializeDebugAgent (DEBUG_AGENT_INIT_PREMEM_SEC, &SecCoreData, SecStartupPhase2);\r
138\r
139}\r
140\r
141/**\r
142 This API patch the TopOfTemporaryRam value in SecPpiList.\r
143\r
144 @param[in,out] SecPpiList PPI list to be patched.\r
145 @param[in] TopOfTemporaryRam The top of CAR.\r
146\r
147**/\r
148VOID\r
149PatchTopOfTemporaryRamPpi (\r
150 IN OUT EFI_PEI_PPI_DESCRIPTOR *SecPpiList,\r
151 IN VOID *TopOfTemporaryRam\r
152 )\r
153{\r
154 SecPpiList[0].Ppi = TopOfTemporaryRam;\r
155}\r
156\r
157/**\r
158 Caller provided function to be invoked at the end of InitializeDebugAgent().\r
159\r
160 Entry point to the C language phase of SEC. After the SEC assembly\r
161 code has initialized some temporary memory and set up the stack,\r
162 the control is transferred to this function.\r
163\r
164 @param[in] Context The first input parameter of InitializeDebugAgent().\r
165\r
166**/\r
167VOID\r
168EFIAPI\r
169SecStartupPhase2(\r
170 IN VOID *Context\r
171 )\r
172{\r
173 EFI_SEC_PEI_HAND_OFF *SecCoreData;\r
174 EFI_PEI_PPI_DESCRIPTOR *PpiList;\r
175 UINT32 Index;\r
176 EFI_PEI_PPI_DESCRIPTOR LocalSecPpiList[sizeof(mPeiSecMainPpi)/sizeof(mPeiSecMainPpi[0])];\r
177 EFI_PEI_PPI_DESCRIPTOR AllSecPpiList[FixedPcdGet32(PcdSecCoreMaxPpiSupported)];\r
178 EFI_PEI_CORE_ENTRY_POINT PeiCoreEntryPoint;\r
179\r
180 SecCoreData = (EFI_SEC_PEI_HAND_OFF *) Context;\r
181 //\r
182 // Find Pei Core entry point. It will report SEC and Pei Core debug information if remote debug\r
183 // is enabled.\r
184 //\r
185 FindAndReportEntryPoints ((EFI_FIRMWARE_VOLUME_HEADER *) SecCoreData->BootFirmwareVolumeBase, &PeiCoreEntryPoint);\r
186 if (PeiCoreEntryPoint == NULL)\r
187 {\r
188 CpuDeadLoop ();\r
189 }\r
190\r
191 CopyMem (LocalSecPpiList, mPeiSecMainPpi, sizeof(mPeiSecMainPpi));\r
192 PatchTopOfTemporaryRamPpi (LocalSecPpiList, (VOID *)((UINTN)SecCoreData->TemporaryRamBase + SecCoreData->TemporaryRamSize));\r
193\r
194 //\r
195 // Perform platform specific initialization before entering PeiCore.\r
196 //\r
197 PpiList = SecPlatformMain (SecCoreData);\r
198 if (PpiList != NULL) {\r
199 //\r
200 // Remove the terminal flag from the terminal Ppi\r
201 //\r
202 CopyMem (AllSecPpiList, LocalSecPpiList, sizeof (LocalSecPpiList));\r
203 for (Index = 0; Index < PcdGet32 (PcdSecCoreMaxPpiSupported); Index ++) {\r
204 if ((AllSecPpiList[Index].Flags & EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST) == EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST) {\r
205 break;\r
206 }\r
207 }\r
208 AllSecPpiList[Index].Flags = AllSecPpiList[Index].Flags & (~EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST);\r
209\r
210 //\r
211 // Append the platform additional Ppi list\r
212 //\r
213 Index += 1;\r
214 while (Index < PcdGet32 (PcdSecCoreMaxPpiSupported) &&\r
215 ((PpiList->Flags & EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST) != EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST)) {\r
216 CopyMem (&AllSecPpiList[Index], PpiList, sizeof (EFI_PEI_PPI_DESCRIPTOR));\r
217 Index++;\r
218 PpiList++;\r
219 }\r
220\r
221 //\r
222 // Check whether the total Ppis exceeds the max supported Ppi.\r
223 //\r
224 if (Index >= PcdGet32 (PcdSecCoreMaxPpiSupported)) {\r
225 //\r
226 // the total Ppi is larger than the supported Max\r
227 // PcdSecCoreMaxPpiSupported can be enlarged to solve it.\r
228 //\r
229 CpuDeadLoop ();\r
230 } else {\r
231 //\r
232 // Add the terminal Ppi\r
233 //\r
234 CopyMem (&AllSecPpiList[Index], PpiList, sizeof (EFI_PEI_PPI_DESCRIPTOR));\r
235 }\r
236\r
237 //\r
238 // Set PpiList to the total Ppi\r
239 //\r
240 PpiList = &AllSecPpiList[0];\r
241 } else {\r
242 //\r
243 // No addition Ppi, PpiList directly point to the common Ppi list.\r
244 //\r
245 PpiList = &LocalSecPpiList[0];\r
246 }\r
247\r
248 //\r
249 // Transfer the control to the PEI core\r
250 //\r
251 ASSERT (PeiCoreEntryPoint != NULL);\r
252 (*PeiCoreEntryPoint) (SecCoreData, PpiList);\r
253\r
254 //\r
255 // Should not come here.\r
256 //\r
257 return ;\r
258}\r