]> git.proxmox.com Git - mirror_edk2.git/blame_incremental - UefiCpuPkg/SecCore/SecMain.c
UefiCpuPkg/CpuDxe: Enable protection for newly added page table
[mirror_edk2.git] / UefiCpuPkg / SecCore / SecMain.c
... / ...
CommitLineData
1/** @file\r
2 C functions in SEC\r
3\r
4 Copyright (c) 2008 - 2017, Intel Corporation. All rights reserved.<BR>\r
5 This program and the accompanying materials\r
6 are licensed and made available under the terms and conditions of the BSD License\r
7 which accompanies this distribution. The full text of the license may be found at\r
8 http://opensource.org/licenses/bsd-license.php\r
9\r
10 THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,\r
11 WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.\r
12\r
13**/\r
14\r
15#include "SecMain.h"\r
16\r
17EFI_PEI_TEMPORARY_RAM_DONE_PPI gSecTemporaryRamDonePpi = {\r
18 SecTemporaryRamDone\r
19};\r
20\r
21EFI_SEC_PLATFORM_INFORMATION_PPI mSecPlatformInformationPpi = { SecPlatformInformation };\r
22\r
23EFI_PEI_PPI_DESCRIPTOR mPeiSecPlatformInformationPpi[] = {\r
24 {\r
25 //\r
26 // SecPerformance PPI notify descriptor.\r
27 //\r
28 EFI_PEI_PPI_DESCRIPTOR_NOTIFY_CALLBACK,\r
29 &gPeiSecPerformancePpiGuid,\r
30 (VOID *) (UINTN) SecPerformancePpiCallBack\r
31 },\r
32 {\r
33 EFI_PEI_PPI_DESCRIPTOR_PPI,\r
34 &gEfiTemporaryRamDonePpiGuid,\r
35 &gSecTemporaryRamDonePpi\r
36 },\r
37 {\r
38 (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),\r
39 &gEfiSecPlatformInformationPpiGuid,\r
40 &mSecPlatformInformationPpi\r
41 }\r
42};\r
43\r
44//\r
45// These are IDT entries pointing to 10:FFFFFFE4h.\r
46//\r
47UINT64 mIdtEntryTemplate = 0xffff8e000010ffe4ULL;\r
48\r
49/**\r
50 Caller provided function to be invoked at the end of InitializeDebugAgent().\r
51\r
52 Entry point to the C language phase of SEC. After the SEC assembly\r
53 code has initialized some temporary memory and set up the stack,\r
54 the control is transferred to this function.\r
55\r
56 @param[in] Context The first input parameter of InitializeDebugAgent().\r
57\r
58**/\r
59VOID\r
60NORETURN\r
61EFIAPI\r
62SecStartupPhase2(\r
63 IN VOID *Context\r
64 );\r
65\r
66/**\r
67 Entry point of the notification callback function itself within the PEIM.\r
68 It is to get SEC performance data and build HOB to convey the SEC performance\r
69 data to DXE phase.\r
70\r
71 @param PeiServices Indirect reference to the PEI Services Table.\r
72 @param NotifyDescriptor Address of the notification descriptor data structure.\r
73 @param Ppi Address of the PPI that was installed.\r
74\r
75 @return Status of the notification.\r
76 The status code returned from this function is ignored.\r
77**/\r
78EFI_STATUS\r
79EFIAPI\r
80SecPerformancePpiCallBack (\r
81 IN EFI_PEI_SERVICES **PeiServices,\r
82 IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor,\r
83 IN VOID *Ppi\r
84 )\r
85{\r
86 EFI_STATUS Status;\r
87 PEI_SEC_PERFORMANCE_PPI *SecPerf;\r
88 FIRMWARE_SEC_PERFORMANCE Performance;\r
89\r
90 SecPerf = (PEI_SEC_PERFORMANCE_PPI *) Ppi;\r
91 Status = SecPerf->GetPerformance ((CONST EFI_PEI_SERVICES **) PeiServices, SecPerf, &Performance);\r
92 if (!EFI_ERROR (Status)) {\r
93 BuildGuidDataHob (\r
94 &gEfiFirmwarePerformanceGuid,\r
95 &Performance,\r
96 sizeof (FIRMWARE_SEC_PERFORMANCE)\r
97 );\r
98 DEBUG ((DEBUG_INFO, "FPDT: SEC Performance Hob ResetEnd = %ld\n", Performance.ResetEnd));\r
99 }\r
100\r
101 return Status;\r
102}\r
103\r
104/**\r
105\r
106 Entry point to the C language phase of SEC. After the SEC assembly\r
107 code has initialized some temporary memory and set up the stack,\r
108 the control is transferred to this function.\r
109\r
110\r
111 @param SizeOfRam Size of the temporary memory available for use.\r
112 @param TempRamBase Base address of temporary ram\r
113 @param BootFirmwareVolume Base address of the Boot Firmware Volume.\r
114**/\r
115VOID\r
116EFIAPI\r
117SecStartup (\r
118 IN UINT32 SizeOfRam,\r
119 IN UINT32 TempRamBase,\r
120 IN VOID *BootFirmwareVolume\r
121 )\r
122{\r
123 EFI_SEC_PEI_HAND_OFF SecCoreData;\r
124 IA32_DESCRIPTOR IdtDescriptor;\r
125 SEC_IDT_TABLE IdtTableInStack;\r
126 UINT32 Index;\r
127 UINT32 PeiStackSize;\r
128 EFI_STATUS Status;\r
129\r
130 //\r
131 // Report Status Code to indicate entering SEC core\r
132 //\r
133 REPORT_STATUS_CODE (\r
134 EFI_PROGRESS_CODE,\r
135 EFI_SOFTWARE_SEC | EFI_SW_SEC_PC_ENTRY_POINT\r
136 );\r
137\r
138 PeiStackSize = PcdGet32 (PcdPeiTemporaryRamStackSize);\r
139 if (PeiStackSize == 0) {\r
140 PeiStackSize = (SizeOfRam >> 1);\r
141 }\r
142\r
143 ASSERT (PeiStackSize < SizeOfRam);\r
144\r
145 //\r
146 // Process all libraries constructor function linked to SecCore.\r
147 //\r
148 ProcessLibraryConstructorList ();\r
149\r
150 //\r
151 // Initialize floating point operating environment\r
152 // to be compliant with UEFI spec.\r
153 //\r
154 InitializeFloatingPointUnits ();\r
155\r
156 // |-------------------|---->\r
157 // |IDT Table |\r
158 // |-------------------|\r
159 // |PeiService Pointer | PeiStackSize\r
160 // |-------------------|\r
161 // | |\r
162 // | Stack |\r
163 // |-------------------|---->\r
164 // | |\r
165 // | |\r
166 // | Heap | PeiTemporayRamSize\r
167 // | |\r
168 // | |\r
169 // |-------------------|----> TempRamBase\r
170\r
171 IdtTableInStack.PeiService = 0;\r
172 for (Index = 0; Index < SEC_IDT_ENTRY_COUNT; Index ++) {\r
173 CopyMem ((VOID*)&IdtTableInStack.IdtTable[Index], (VOID*)&mIdtEntryTemplate, sizeof (UINT64));\r
174 }\r
175\r
176 IdtDescriptor.Base = (UINTN) &IdtTableInStack.IdtTable;\r
177 IdtDescriptor.Limit = (UINT16)(sizeof (IdtTableInStack.IdtTable) - 1);\r
178\r
179 AsmWriteIdtr (&IdtDescriptor);\r
180\r
181 //\r
182 // Setup the default exception handlers\r
183 //\r
184 Status = InitializeCpuExceptionHandlers (NULL);\r
185 ASSERT_EFI_ERROR (Status);\r
186\r
187 //\r
188 // Update the base address and length of Pei temporary memory\r
189 //\r
190 SecCoreData.DataSize = (UINT16) sizeof (EFI_SEC_PEI_HAND_OFF);\r
191 SecCoreData.BootFirmwareVolumeBase = BootFirmwareVolume;\r
192 SecCoreData.BootFirmwareVolumeSize = (UINTN)((EFI_FIRMWARE_VOLUME_HEADER *) BootFirmwareVolume)->FvLength;\r
193 SecCoreData.TemporaryRamBase = (VOID*)(UINTN) TempRamBase;\r
194 SecCoreData.TemporaryRamSize = SizeOfRam;\r
195 SecCoreData.PeiTemporaryRamBase = SecCoreData.TemporaryRamBase;\r
196 SecCoreData.PeiTemporaryRamSize = SizeOfRam - PeiStackSize;\r
197 SecCoreData.StackBase = (VOID*)(UINTN)(TempRamBase + SecCoreData.PeiTemporaryRamSize);\r
198 SecCoreData.StackSize = PeiStackSize;\r
199\r
200 //\r
201 // Initialize Debug Agent to support source level debug in SEC/PEI phases before memory ready.\r
202 //\r
203 InitializeDebugAgent (DEBUG_AGENT_INIT_PREMEM_SEC, &SecCoreData, SecStartupPhase2);\r
204}\r
205\r
206/**\r
207 Caller provided function to be invoked at the end of InitializeDebugAgent().\r
208\r
209 Entry point to the C language phase of SEC. After the SEC assembly\r
210 code has initialized some temporary memory and set up the stack,\r
211 the control is transferred to this function.\r
212\r
213 @param[in] Context The first input parameter of InitializeDebugAgent().\r
214\r
215**/\r
216VOID\r
217NORETURN\r
218EFIAPI\r
219SecStartupPhase2(\r
220 IN VOID *Context\r
221 )\r
222{\r
223 EFI_SEC_PEI_HAND_OFF *SecCoreData;\r
224 EFI_PEI_PPI_DESCRIPTOR *PpiList;\r
225 UINT32 Index;\r
226 EFI_PEI_PPI_DESCRIPTOR *AllSecPpiList;\r
227 EFI_PEI_CORE_ENTRY_POINT PeiCoreEntryPoint;\r
228\r
229 SecCoreData = (EFI_SEC_PEI_HAND_OFF *) Context;\r
230 AllSecPpiList = (EFI_PEI_PPI_DESCRIPTOR *) SecCoreData->PeiTemporaryRamBase;\r
231 //\r
232 // Find Pei Core entry point. It will report SEC and Pei Core debug information if remote debug\r
233 // is enabled.\r
234 //\r
235 FindAndReportEntryPoints ((EFI_FIRMWARE_VOLUME_HEADER *) SecCoreData->BootFirmwareVolumeBase, &PeiCoreEntryPoint);\r
236 if (PeiCoreEntryPoint == NULL)\r
237 {\r
238 CpuDeadLoop ();\r
239 }\r
240\r
241 //\r
242 // Perform platform specific initialization before entering PeiCore.\r
243 //\r
244 PpiList = SecPlatformMain (SecCoreData);\r
245 if (PpiList != NULL) {\r
246 //\r
247 // Remove the terminal flag from the terminal PPI\r
248 //\r
249 CopyMem (AllSecPpiList, mPeiSecPlatformInformationPpi, sizeof (mPeiSecPlatformInformationPpi));\r
250 Index = sizeof (mPeiSecPlatformInformationPpi) / sizeof (EFI_PEI_PPI_DESCRIPTOR) - 1;\r
251 AllSecPpiList[Index].Flags = AllSecPpiList[Index].Flags & (~EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST);\r
252\r
253 //\r
254 // Append the platform additional PPI list\r
255 //\r
256 Index += 1;\r
257 while (((PpiList->Flags & EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST) != EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST)) {\r
258 CopyMem (&AllSecPpiList[Index], PpiList, sizeof (EFI_PEI_PPI_DESCRIPTOR));\r
259 Index++;\r
260 PpiList++;\r
261 }\r
262\r
263 //\r
264 // Add the terminal PPI\r
265 //\r
266 CopyMem (&AllSecPpiList[Index ++], PpiList, sizeof (EFI_PEI_PPI_DESCRIPTOR));\r
267\r
268 //\r
269 // Set PpiList to the total PPI\r
270 //\r
271 PpiList = AllSecPpiList;\r
272\r
273 //\r
274 // Adjust PEI TEMP RAM Range.\r
275 //\r
276 ASSERT (SecCoreData->PeiTemporaryRamSize > Index * sizeof (EFI_PEI_PPI_DESCRIPTOR));\r
277 SecCoreData->PeiTemporaryRamBase = (VOID *)((UINTN) SecCoreData->PeiTemporaryRamBase + Index * sizeof (EFI_PEI_PPI_DESCRIPTOR));\r
278 SecCoreData->PeiTemporaryRamSize = SecCoreData->PeiTemporaryRamSize - Index * sizeof (EFI_PEI_PPI_DESCRIPTOR);\r
279 //\r
280 // Adjust the Base and Size to be 8-byte aligned as HOB which has 8byte aligned requirement\r
281 // will be built based on them in PEI phase.\r
282 //\r
283 SecCoreData->PeiTemporaryRamBase = (VOID *)(((UINTN)SecCoreData->PeiTemporaryRamBase + 7) & ~0x07);\r
284 SecCoreData->PeiTemporaryRamSize &= ~(UINTN)0x07;\r
285 } else {\r
286 //\r
287 // No addition PPI, PpiList directly point to the common PPI list.\r
288 //\r
289 PpiList = &mPeiSecPlatformInformationPpi[0];\r
290 }\r
291\r
292 DEBUG ((\r
293 DEBUG_INFO,\r
294 "%a() Stack Base: 0x%p, Stack Size: 0x%x\n",\r
295 __FUNCTION__,\r
296 SecCoreData->StackBase,\r
297 (UINT32) SecCoreData->StackSize\r
298 ));\r
299\r
300 //\r
301 // Report Status Code to indicate transferring to PEI core\r
302 //\r
303 REPORT_STATUS_CODE (\r
304 EFI_PROGRESS_CODE,\r
305 EFI_SOFTWARE_SEC | EFI_SW_SEC_PC_HANDOFF_TO_NEXT\r
306 );\r
307\r
308 //\r
309 // Transfer the control to the PEI core\r
310 //\r
311 ASSERT (PeiCoreEntryPoint != NULL);\r
312 (*PeiCoreEntryPoint) (SecCoreData, PpiList);\r
313\r
314 //\r
315 // Should not come here.\r
316 //\r
317 UNREACHABLE ();\r
318}\r
319\r
320/**\r
321 TemporaryRamDone() disables the use of Temporary RAM. If present, this service is invoked\r
322 by the PEI Foundation after the EFI_PEI_PERMANANT_MEMORY_INSTALLED_PPI is installed.\r
323\r
324 @retval EFI_SUCCESS Use of Temporary RAM was disabled.\r
325 @retval EFI_INVALID_PARAMETER Temporary RAM could not be disabled.\r
326\r
327**/\r
328EFI_STATUS\r
329EFIAPI\r
330SecTemporaryRamDone (\r
331 VOID\r
332 )\r
333{\r
334 BOOLEAN State;\r
335\r
336 //\r
337 // Republish Sec Platform Information(2) PPI\r
338 //\r
339 RepublishSecPlatformInformationPpi ();\r
340\r
341 //\r
342 // Migrate DebugAgentContext.\r
343 //\r
344 InitializeDebugAgent (DEBUG_AGENT_INIT_POSTMEM_SEC, NULL, NULL);\r
345\r
346 //\r
347 // Disable interrupts and save current interrupt state\r
348 //\r
349 State = SaveAndDisableInterrupts();\r
350\r
351 //\r
352 // Disable Temporary RAM after Stack and Heap have been migrated at this point.\r
353 //\r
354 SecPlatformDisableTemporaryMemory ();\r
355\r
356 //\r
357 // Restore original interrupt state\r
358 //\r
359 SetInterruptState (State);\r
360\r
361 return EFI_SUCCESS;\r
362}\r