ArmPlatformPkg/Sec: Added support for Non Cold Boot Paths
For instance, in case of CpuHotPlug boot path the platform has already been initialized. The CPU core should not execute any of the platform initialization in this case. Signed-off-by: Olivier Martin <olivier.martin@arm.com> git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13492 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
parent
77734e3d69
commit
a75568e9c9
@ -15,6 +15,10 @@
|
|||||||
#ifndef _ARMPLATFORMSECLIB_H_
|
#ifndef _ARMPLATFORMSECLIB_H_
|
||||||
#define _ARMPLATFORMSECLIB_H_
|
#define _ARMPLATFORMSECLIB_H_
|
||||||
|
|
||||||
|
#define ARM_SEC_BOOT_MASK ~0
|
||||||
|
#define ARM_SEC_COLD_BOOT (1 << 0)
|
||||||
|
#define ARM_SEC_SECONDARY_COLD_BOOT (1 << 1)
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Initialize the memory where the initial stacks will reside
|
Initialize the memory where the initial stacks will reside
|
||||||
|
|
||||||
|
@ -22,17 +22,18 @@ GCC_ASM_EXPORT(set_non_secure_mode)
|
|||||||
|
|
||||||
# r0: Monitor World EntryPoint
|
# r0: Monitor World EntryPoint
|
||||||
# r1: MpId
|
# r1: MpId
|
||||||
# r2: Secure Monitor mode stack
|
# r2: SecBootMode
|
||||||
|
# r3: Secure Monitor mode stack
|
||||||
ASM_PFX(enter_monitor_mode):
|
ASM_PFX(enter_monitor_mode):
|
||||||
cmp r2, #0 @ If a Secure Monitor stack base has not been defined then use the Secure stack
|
cmp r3, #0 @ If a Secure Monitor stack base has not been defined then use the Secure stack
|
||||||
moveq r2, sp
|
moveq r3, sp
|
||||||
|
|
||||||
mrs r4, cpsr @ Save current mode (SVC) in r4
|
mrs r4, cpsr @ Save current mode (SVC) in r4
|
||||||
bic r3, r4, #0x1f @ Clear all mode bits
|
bic r5, r4, #0x1f @ Clear all mode bits
|
||||||
orr r3, r3, #0x16 @ Set bits for Monitor mode
|
orr r5, r5, #0x16 @ Set bits for Monitor mode
|
||||||
msr cpsr_cxsf, r3 @ We are now in Monitor Mode
|
msr cpsr_cxsf, r5 @ We are now in Monitor Mode
|
||||||
|
|
||||||
mov sp, r2 @ Set the stack of the Monitor Mode
|
mov sp, r3 @ Set the stack of the Monitor Mode
|
||||||
|
|
||||||
mov lr, r0 @ Use the pass entrypoint as lr
|
mov lr, r0 @ Use the pass entrypoint as lr
|
||||||
|
|
||||||
@ -40,6 +41,8 @@ ASM_PFX(enter_monitor_mode):
|
|||||||
|
|
||||||
mov r4, r0 @ Swap EntryPoint and MpId registers
|
mov r4, r0 @ Swap EntryPoint and MpId registers
|
||||||
mov r0, r1
|
mov r0, r1
|
||||||
|
mov r1, r2
|
||||||
|
mov r2, r3
|
||||||
|
|
||||||
bx r4
|
bx r4
|
||||||
|
|
||||||
|
@ -20,17 +20,18 @@
|
|||||||
|
|
||||||
// r0: Monitor World EntryPoint
|
// r0: Monitor World EntryPoint
|
||||||
// r1: MpId
|
// r1: MpId
|
||||||
// r2: Secure Monitor mode stack
|
// r2: SecBootMode
|
||||||
enter_monitor_mode
|
// r3: Secure Monitor mode stack
|
||||||
cmp r2, #0 // If a Secure Monitor stack base has not been defined then use the Secure stack
|
enter_monitor_mode FUNCTION
|
||||||
moveq r2, sp
|
cmp r3, #0 // If a Secure Monitor stack base has not been defined then use the Secure stack
|
||||||
|
moveq r3, sp
|
||||||
|
|
||||||
mrs r4, cpsr // Save current mode (SVC) in r4
|
mrs r4, cpsr // Save current mode (SVC) in r4
|
||||||
bic r3, r4, #0x1f // Clear all mode bits
|
bic r5, r4, #0x1f // Clear all mode bits
|
||||||
orr r3, r3, #0x16 // Set bits for Monitor mode
|
orr r5, r5, #0x16 // Set bits for Monitor mode
|
||||||
msr cpsr_cxsf, r3 // We are now in Monitor Mode
|
msr cpsr_cxsf, r5 // We are now in Monitor Mode
|
||||||
|
|
||||||
mov sp, r2 // Set the stack of the Monitor Mode
|
mov sp, r3 // Set the stack of the Monitor Mode
|
||||||
|
|
||||||
mov lr, r0 // Use the pass entrypoint as lr
|
mov lr, r0 // Use the pass entrypoint as lr
|
||||||
|
|
||||||
@ -38,8 +39,11 @@ enter_monitor_mode
|
|||||||
|
|
||||||
mov r4, r0 // Swap EntryPoint and MpId registers
|
mov r4, r0 // Swap EntryPoint and MpId registers
|
||||||
mov r0, r1
|
mov r0, r1
|
||||||
|
mov r1, r2
|
||||||
|
mov r2, r3
|
||||||
|
|
||||||
bx r4
|
bx r4
|
||||||
|
ENDFUNC
|
||||||
|
|
||||||
// We cannot use the instruction 'movs pc, lr' because the caller can be written either in ARM or Thumb2 assembler.
|
// We cannot use the instruction 'movs pc, lr' because the caller can be written either in ARM or Thumb2 assembler.
|
||||||
// When we will jump into this function, we will set the CPSR flag to ARM assembler. By copying directly 'lr' into
|
// When we will jump into this function, we will set the CPSR flag to ARM assembler. By copying directly 'lr' into
|
||||||
|
@ -26,7 +26,8 @@
|
|||||||
|
|
||||||
VOID
|
VOID
|
||||||
CEntryPoint (
|
CEntryPoint (
|
||||||
IN UINTN MpId
|
IN UINTN MpId,
|
||||||
|
IN UINTN SecBootMode
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
CHAR8 Buffer[100];
|
CHAR8 Buffer[100];
|
||||||
@ -109,7 +110,7 @@ CEntryPoint (
|
|||||||
((PcdGet32(PcdCPUCoresSecMonStackBase) != 0) && (PcdGet32(PcdCPUCoreSecMonStackSize) != 0)));
|
((PcdGet32(PcdCPUCoresSecMonStackBase) != 0) && (PcdGet32(PcdCPUCoreSecMonStackSize) != 0)));
|
||||||
|
|
||||||
// Enter Monitor Mode
|
// Enter Monitor Mode
|
||||||
enter_monitor_mode ((UINTN)TrustedWorldInitialization, MpId, (VOID*)(PcdGet32(PcdCPUCoresSecMonStackBase) + (PcdGet32(PcdCPUCoreSecMonStackSize) * (GET_CORE_POS(MpId) + 1))));
|
enter_monitor_mode ((UINTN)TrustedWorldInitialization, MpId, SecBootMode, (VOID*)(PcdGet32(PcdCPUCoresSecMonStackBase) + (PcdGet32(PcdCPUCoreSecMonStackSize) * (GET_CORE_POS(MpId) + 1))));
|
||||||
} else {
|
} else {
|
||||||
if (IS_PRIMARY_CORE(MpId)) {
|
if (IS_PRIMARY_CORE(MpId)) {
|
||||||
SerialPrint ("Trust Zone Configuration is disabled\n\r");
|
SerialPrint ("Trust Zone Configuration is disabled\n\r");
|
||||||
@ -131,7 +132,8 @@ CEntryPoint (
|
|||||||
|
|
||||||
VOID
|
VOID
|
||||||
TrustedWorldInitialization (
|
TrustedWorldInitialization (
|
||||||
IN UINTN MpId
|
IN UINTN MpId,
|
||||||
|
IN UINTN SecBootMode
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
UINTN JumpAddress;
|
UINTN JumpAddress;
|
||||||
@ -153,7 +155,7 @@ TrustedWorldInitialization (
|
|||||||
// Signal the secondary core the Security settings is done (event: EVENT_SECURE_INIT)
|
// Signal the secondary core the Security settings is done (event: EVENT_SECURE_INIT)
|
||||||
ArmCallSEV ();
|
ArmCallSEV ();
|
||||||
}
|
}
|
||||||
} else {
|
} else if ((SecBootMode & ARM_SEC_BOOT_MASK) == ARM_SEC_COLD_BOOT) {
|
||||||
// The secondary cores need to wait until the Trustzone chipsets configuration is done
|
// The secondary cores need to wait until the Trustzone chipsets configuration is done
|
||||||
// before switching to Non Secure World
|
// before switching to Non Secure World
|
||||||
|
|
||||||
|
@ -38,6 +38,9 @@ ASM_PFX(_ModuleEntryPoint):
|
|||||||
// Ensure that the MMU and caches are off
|
// Ensure that the MMU and caches are off
|
||||||
bl ASM_PFX(ArmDisableCachesAndMmu)
|
bl ASM_PFX(ArmDisableCachesAndMmu)
|
||||||
|
|
||||||
|
// By default, we are doing a cold boot
|
||||||
|
mov r10, #ARM_SEC_COLD_BOOT
|
||||||
|
|
||||||
// Jump to Platform Specific Boot Action function
|
// Jump to Platform Specific Boot Action function
|
||||||
blx ASM_PFX(ArmPlatformSecBootAction)
|
blx ASM_PFX(ArmPlatformSecBootAction)
|
||||||
|
|
||||||
@ -59,6 +62,11 @@ _IdentifyCpu:
|
|||||||
beq _InitMem
|
beq _InitMem
|
||||||
|
|
||||||
_WaitInitMem:
|
_WaitInitMem:
|
||||||
|
// If we are not doing a cold boot in this case we should assume the Initial Memory to be already initialized
|
||||||
|
// Otherwise we have to wait the Primary Core to finish the initialization
|
||||||
|
cmp r10, #ARM_SEC_COLD_BOOT
|
||||||
|
bne _SetupSecondaryCoreStack
|
||||||
|
|
||||||
// Wait for the primary core to initialize the initial memory (event: BOOT_MEM_INIT)
|
// Wait for the primary core to initialize the initial memory (event: BOOT_MEM_INIT)
|
||||||
bl ASM_PFX(ArmCallWFE)
|
bl ASM_PFX(ArmCallWFE)
|
||||||
// Now the Init Mem is initialized, we setup the secondary core stacks
|
// Now the Init Mem is initialized, we setup the secondary core stacks
|
||||||
@ -108,7 +116,9 @@ _PrepareArguments:
|
|||||||
|
|
||||||
// Jump to SEC C code
|
// Jump to SEC C code
|
||||||
// r0 = mp_id
|
// r0 = mp_id
|
||||||
|
// r1 = Boot Mode
|
||||||
mov r0, r5
|
mov r0, r5
|
||||||
|
mov r1, r10
|
||||||
blx r3
|
blx r3
|
||||||
|
|
||||||
_NeverReturn:
|
_NeverReturn:
|
||||||
|
@ -33,13 +33,16 @@
|
|||||||
|
|
||||||
StartupAddr DCD CEntryPoint
|
StartupAddr DCD CEntryPoint
|
||||||
|
|
||||||
_ModuleEntryPoint
|
_ModuleEntryPoint FUNCTION
|
||||||
// First ensure all interrupts are disabled
|
// First ensure all interrupts are disabled
|
||||||
blx ArmDisableInterrupts
|
blx ArmDisableInterrupts
|
||||||
|
|
||||||
// Ensure that the MMU and caches are off
|
// Ensure that the MMU and caches are off
|
||||||
blx ArmDisableCachesAndMmu
|
blx ArmDisableCachesAndMmu
|
||||||
|
|
||||||
|
// By default, we are doing a cold boot
|
||||||
|
mov r10, #ARM_SEC_COLD_BOOT
|
||||||
|
|
||||||
// Jump to Platform Specific Boot Action function
|
// Jump to Platform Specific Boot Action function
|
||||||
blx ArmPlatformSecBootAction
|
blx ArmPlatformSecBootAction
|
||||||
|
|
||||||
@ -61,6 +64,11 @@ _IdentifyCpu
|
|||||||
beq _InitMem
|
beq _InitMem
|
||||||
|
|
||||||
_WaitInitMem
|
_WaitInitMem
|
||||||
|
// If we are not doing a cold boot in this case we should assume the Initial Memory to be already initialized
|
||||||
|
// Otherwise we have to wait the Primary Core to finish the initialization
|
||||||
|
cmp r10, #ARM_SEC_COLD_BOOT
|
||||||
|
bne _SetupSecondaryCoreStack
|
||||||
|
|
||||||
// Wait for the primary core to initialize the initial memory (event: BOOT_MEM_INIT)
|
// Wait for the primary core to initialize the initial memory (event: BOOT_MEM_INIT)
|
||||||
bl ArmCallWFE
|
bl ArmCallWFE
|
||||||
// Now the Init Mem is initialized, we setup the secondary core stacks
|
// Now the Init Mem is initialized, we setup the secondary core stacks
|
||||||
@ -110,8 +118,11 @@ _PrepareArguments
|
|||||||
|
|
||||||
// Jump to SEC C code
|
// Jump to SEC C code
|
||||||
// r0 = mp_id
|
// r0 = mp_id
|
||||||
|
// r1 = Boot Mode
|
||||||
mov r0, r5
|
mov r0, r5
|
||||||
|
mov r1, r10
|
||||||
blx r3
|
blx r3
|
||||||
|
ENDFUNC
|
||||||
|
|
||||||
_NeverReturn
|
_NeverReturn
|
||||||
b _NeverReturn
|
b _NeverReturn
|
||||||
|
@ -28,7 +28,8 @@
|
|||||||
|
|
||||||
VOID
|
VOID
|
||||||
TrustedWorldInitialization (
|
TrustedWorldInitialization (
|
||||||
IN UINTN MpId
|
IN UINTN MpId,
|
||||||
|
IN UINTN SecBootMode
|
||||||
);
|
);
|
||||||
|
|
||||||
VOID
|
VOID
|
||||||
@ -53,7 +54,8 @@ VOID
|
|||||||
enter_monitor_mode (
|
enter_monitor_mode (
|
||||||
IN UINTN MonitorEntryPoint,
|
IN UINTN MonitorEntryPoint,
|
||||||
IN UINTN MpId,
|
IN UINTN MpId,
|
||||||
IN VOID* Stack
|
IN UINTN SecBootMode,
|
||||||
|
IN VOID* MonitorStackBase
|
||||||
);
|
);
|
||||||
|
|
||||||
VOID
|
VOID
|
||||||
|
Loading…
x
Reference in New Issue
Block a user