]> git.proxmox.com Git - mirror_edk2.git/blob - ArmPlatformPkg/Sec/SecEntryPoint.S
ArmPlatformPkg/ArmPlatformLib: Removed 'ArmPlatformIsMemoryInitialized' function
[mirror_edk2.git] / ArmPlatformPkg / Sec / SecEntryPoint.S
1 #------------------------------------------------------------------------------
2 #
3 # ARM VE Entry point. Reset vector in FV header will brach to
4 # _ModuleEntryPoint.
5 #
6 # Copyright (c) 2011, ARM Limited. All rights reserved.
7 #
8 # This program and the accompanying materials
9 # are licensed and made available under the terms and conditions of the BSD License
10 # which accompanies this distribution. The full text of the license may be found at
11 # http://opensource.org/licenses/bsd-license.php
12 #
13 # THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
14 # WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
15 #
16 #------------------------------------------------------------------------------
17
18 #include <AsmMacroIoLib.h>
19 #include <Base.h>
20 #include <Library/PcdLib.h>
21 #include <Library/ArmPlatformLib.h>
22 #include <AutoGen.h>
23
24 #Start of Code section
25 .text
26 .align 3
27
28 #make _ModuleEntryPoint as global
29 GCC_ASM_EXPORT(_ModuleEntryPoint)
30
31 #global functions referenced by this module
32 GCC_ASM_IMPORT(CEntryPoint)
33 GCC_ASM_IMPORT(ArmPlatformSecBootAction)
34 GCC_ASM_IMPORT(ArmPlatformInitializeBootMemory)
35 GCC_ASM_IMPORT(ArmDisableInterrupts)
36 GCC_ASM_IMPORT(ArmDisableCachesAndMmu)
37 GCC_ASM_IMPORT(ArmWriteVBar)
38 GCC_ASM_IMPORT(ArmReadMpidr)
39 GCC_ASM_IMPORT(SecVectorTable)
40
41 #if (FixedPcdGet32(PcdMPCoreSupport))
42 GCC_ASM_IMPORT(ArmIsScuEnable)
43 #endif
44
45 StartupAddr: .word ASM_PFX(CEntryPoint)
46 SecVectorTableAddr: .word ASM_PFX(SecVectorTable)
47
48 ASM_PFX(_ModuleEntryPoint):
49 # First ensure all interrupts are disabled
50 bl ASM_PFX(ArmDisableInterrupts)
51
52 # Ensure that the MMU and caches are off
53 bl ASM_PFX(ArmDisableCachesAndMmu)
54
55 # Jump to Platform Specific Boot Action function
56 blx ASM_PFX(ArmPlatformSecBootAction)
57
58 # Set VBAR to the start of the exception vectors in Secure Mode
59 ldr r0, =SecVectorTable
60 bl ASM_PFX(ArmWriteVBar)
61
62 _IdentifyCpu:
63 # Identify CPU ID
64 bl ASM_PFX(ArmReadMpidr)
65 // Get ID of this CPU in Multicore system
66 LoadConstantToReg (FixedPcdGet32(PcdArmPrimaryCoreMask), r1)
67 and r5, r0, r1
68
69 #get ID of this CPU in Multicore system
70 LoadConstantToReg (FixedPcdGet32(PcdArmPrimaryCore), r1)
71 cmp r5, r1
72 # Only the primary core initialize the memory (SMC)
73 beq _InitMem
74
75 #if (FixedPcdGet32(PcdMPCoreSupport))
76 # ... The secondary cores wait for SCU to be enabled
77 _WaitForEnabledScu:
78 bl ASM_PFX(ArmIsScuEnable)
79 tst r1, #1
80 beq _WaitForEnabledScu
81 b _SetupStack
82 #endif
83
84 _InitMem:
85 // Initialize Init Boot Memory
86 bl ASM_PFX(ArmPlatformInitializeBootMemory)
87
88 # Only Primary CPU could run this line (the secondary cores have jumped from _IdentifyCpu to _SetupStack)
89 mov r5, #0
90
91 _SetupStack:
92 # Setup Stack for the 4 CPU cores
93 #Read Stack Base address from PCD
94 LoadConstantToReg (FixedPcdGet32(PcdCPUCoresSecStackBase), r1)
95
96 #read Stack size from PCD
97 LoadConstantToReg (FixedPcdGet32(PcdCPUCoreSecStackSize), r2)
98
99 #calcuate Stack Pointer reg value using Stack size and CPU ID.
100 mov r3,r5 @ r3 = core_id
101 mul r3,r3,r2 @ r3 = core_id * stack_size = offset from the stack base
102 add r3,r3,r1 @ r3 ldr= stack_base + offset
103 mov sp, r3
104
105 # move sec startup address into a data register
106 # ensure we're jumping to FV version of the code (not boot remapped alias)
107 ldr r3, StartupAddr
108
109 # Move the CoreId in r0 to be the first argument of the SEC Entry Point
110 mov r0, r5
111
112 # jump to SEC C code
113 # r0 = core_id
114 blx r3
115
116