summaryrefslogtreecommitdiffstats
path: root/OvmfPkg/Sec
diff options
context:
space:
mode:
authorjljusten <jljusten@6f19259b-4bc3-4df7-8a09-765794883524>2009-05-27 21:10:18 +0000
committerjljusten <jljusten@6f19259b-4bc3-4df7-8a09-765794883524>2009-05-27 21:10:18 +0000
commit49ba9447c92d6fca214476381107a180d08e59d1 (patch)
tree08bcd066ffa49329f29457b36f6ed328d9b1112f /OvmfPkg/Sec
parenta1f11f7547b43a6b86f6925cb8ab3f836b2d5dae (diff)
downloadedk2-49ba9447c92d6fca214476381107a180d08e59d1.tar.gz
edk2-49ba9447c92d6fca214476381107a180d08e59d1.tar.bz2
edk2-49ba9447c92d6fca214476381107a180d08e59d1.zip
Add initial version of Open Virtual Machine Firmware (OVMF) platform.
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@8398 6f19259b-4bc3-4df7-8a09-765794883524
Diffstat (limited to 'OvmfPkg/Sec')
-rw-r--r--OvmfPkg/Sec/Ia32/SecEntry.S63
-rw-r--r--OvmfPkg/Sec/Ia32/SecEntry.asm60
-rw-r--r--OvmfPkg/Sec/Ia32/Stack.S93
-rw-r--r--OvmfPkg/Sec/Ia32/SwitchStack.c136
-rw-r--r--OvmfPkg/Sec/SecMain.c171
-rw-r--r--OvmfPkg/Sec/SecMain.h50
-rw-r--r--OvmfPkg/Sec/SecMain.inf58
-rw-r--r--OvmfPkg/Sec/X64/SecEntry.S60
-rw-r--r--OvmfPkg/Sec/X64/SecEntry.asm61
-rw-r--r--OvmfPkg/Sec/X64/SwitchStack.c165
10 files changed, 917 insertions, 0 deletions
diff --git a/OvmfPkg/Sec/Ia32/SecEntry.S b/OvmfPkg/Sec/Ia32/SecEntry.S
new file mode 100644
index 0000000000..9fefebca5f
--- /dev/null
+++ b/OvmfPkg/Sec/Ia32/SecEntry.S
@@ -0,0 +1,63 @@
+#
+# ConvertAsm.py: Automatically generated from SecEntry.asm
+#
+# TITLE SecEntry.asm
+
+#------------------------------------------------------------------------------
+#*
+#* Copyright 2006 - 2009, Intel Corporation
+#* All rights reserved. This program and the accompanying materials
+#* are licensed and made available under the terms and conditions of the BSD License
+#* which accompanies this distribution. The full text of the license may be found at
+#* http://opensource.org/licenses/bsd-license.php
+#*
+#* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+#* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#*
+#* CpuAsm.asm
+#*
+#* Abstract:
+#*
+#------------------------------------------------------------------------------
+
+
+#include "SecMain.h"
+
+#EXTERN ASM_PFX(SecCoreStartupWithStack)
+
+#
+# SecCore Entry Point
+#
+# Processor is in flat protected mode
+#
+# @param ESI Pointer to SEC Core Entry Point (this function)
+# @param EDI Pointer to PEI Core Entry Point
+# @param EBP Pointer to the start of the Boot Firmware Volume
+#
+# @return None
+#
+#
+.intel_syntax
+ASM_GLOBAL ASM_PFX(_ModuleEntryPoint)
+ASM_PFX(_ModuleEntryPoint):
+
+ #
+ # Load temporary stack top at very low memory. The C code
+ # can reload to a better address.
+ #
+ mov eax, INITIAL_TOP_OF_STACK
+ mov esp, eax
+ nop
+
+ #
+ # Call into C code
+ #
+ push eax
+ push edi
+ push esi
+ push ebp
+ call ASM_PFX(SecCoreStartupWithStack)
+
+
+#END
+
diff --git a/OvmfPkg/Sec/Ia32/SecEntry.asm b/OvmfPkg/Sec/Ia32/SecEntry.asm
new file mode 100644
index 0000000000..48b97a40f9
--- /dev/null
+++ b/OvmfPkg/Sec/Ia32/SecEntry.asm
@@ -0,0 +1,60 @@
+ TITLE SecEntry.asm
+;------------------------------------------------------------------------------
+;*
+;* Copyright 2006 - 2009, Intel Corporation
+;* All rights reserved. This program and the accompanying materials
+;* are licensed and made available under the terms and conditions of the BSD License
+;* which accompanies this distribution. The full text of the license may be found at
+;* http://opensource.org/licenses/bsd-license.php
+;*
+;* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+;* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+;*
+;* CpuAsm.asm
+;*
+;* Abstract:
+;*
+;------------------------------------------------------------------------------
+
+#include "SecMain.h"
+
+ .686
+ .model flat,C
+ .code
+
+EXTERN SecCoreStartupWithStack:PROC
+
+;
+; SecCore Entry Point
+;
+; Processor is in flat protected mode
+;
+; @param ESI Pointer to SEC Core Entry Point (this function)
+; @param EDI Pointer to PEI Core Entry Point
+; @param EBP Pointer to the start of the Boot Firmware Volume
+;
+; @return None
+;
+;
+_ModuleEntryPoint PROC PUBLIC
+
+ ;
+ ; Load temporary stack top at very low memory. The C code
+ ; can reload to a better address.
+ ;
+ mov eax, INITIAL_TOP_OF_STACK
+ mov esp, eax
+ nop
+
+ ;
+ ; Call into C code
+ ;
+ push eax
+ push edi
+ push esi
+ push ebp
+ call SecCoreStartupWithStack
+
+_ModuleEntryPoint ENDP
+
+END
diff --git a/OvmfPkg/Sec/Ia32/Stack.S b/OvmfPkg/Sec/Ia32/Stack.S
new file mode 100644
index 0000000000..1f8ad199c6
--- /dev/null
+++ b/OvmfPkg/Sec/Ia32/Stack.S
@@ -0,0 +1,93 @@
+#------------------------------------------------------------------------------
+#
+# Copyright (c) 2008, Intel Corporation
+# All rights reserved. This program and the accompanying materials
+# are licensed and made available under the terms and conditions of the BSD License
+# which accompanies this distribution. The full text of the license may be found at
+# http://opensource.org/licenses/bsd-license.php
+#
+# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#
+# Module Name:
+#
+# Stack.asm
+#
+# Abstract:
+#
+# Switch the stack from temporary memory to permenent memory.
+#
+#------------------------------------------------------------------------------
+
+#------------------------------------------------------------------------------
+# VOID
+# EFIAPI
+# SecSwitchStack (
+# UINT32 TemporaryMemoryBase,
+# UINT32 PermenentMemoryBase
+# );
+#------------------------------------------------------------------------------
+
+#include <ProcessorBind.h>
+
+ASM_GLOBAL ASM_PFX(SecSwitchStack)
+ASM_PFX(SecSwitchStack):
+#
+# Save three register: eax, ebx, ecx
+#
+ push %eax
+ push %ebx
+ push %ecx
+ push %edx
+
+#
+# !!CAUTION!! this function address's is pushed into stack after
+# migration of whole temporary memory, so need save it to permenent
+# memory at first!
+#
+
+ movl 20(%esp), %ebx # Save the first parameter
+ movl 24(%esp), %ecx # Save the second parameter
+
+#
+# Save this function's return address into permenent memory at first.
+# Then, Fixup the esp point to permenent memory
+#
+
+ movl %esp, %eax
+ subl %ebx, %eax
+ addl %ecx, %eax
+ movl (%esp), %edx # copy pushed register's value to permenent memory
+ movl %edx, (%eax)
+ movl 4(%esp), %edx
+ movl %edx, 4(%eax)
+ movl 8(%esp), %edx
+ movl %edx, 8(%eax)
+ movl 12(%esp), %edx
+ movl %edx, 12(%eax)
+ movl 16(%esp), %edx
+ movl %edx, 16(%eax)
+ movl %eax, %esp # From now, esp is pointed to permenent memory
+
+#
+# Fixup the ebp point to permenent memory
+#
+ movl %ebp, %eax
+ subl %ebx, %eax
+ addl %ecx, %eax
+ movl %eax, %ebp # From now, ebp is pointed to permenent memory
+
+#
+# Fixup callee's ebp point for PeiDispatch
+#
+ movl (%ebp), %eax
+ subl %ebx, %eax
+ addl %ecx, %eax
+ movl %eax, (%ebp) # From now, Temporary's PPI caller's stack is in permenent memory
+
+ pop %edx
+ pop %ecx
+ pop %ebx
+ pop %eax
+ ret
+
diff --git a/OvmfPkg/Sec/Ia32/SwitchStack.c b/OvmfPkg/Sec/Ia32/SwitchStack.c
new file mode 100644
index 0000000000..54fde9494a
--- /dev/null
+++ b/OvmfPkg/Sec/Ia32/SwitchStack.c
@@ -0,0 +1,136 @@
+/** @file
+ Switch Stack functions.
+
+ Copyright (c) 2006 - 2007, Intel Corporation<BR>
+ All rights reserved. This program and the accompanying materials
+ are licensed and made available under the terms and conditions of the BSD License
+ which accompanies this distribution. The full text of the license may be found at
+ http://opensource.org/licenses/bsd-license.php
+
+ THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+//
+// Include common header file for this module.
+//
+
+
+#include <Library/BaseLib.h>
+#include <Library/BaseMemoryLib.h>
+#include <Library/DebugLib.h>
+#include <Library/PeiServicesLib.h>
+
+/**
+ Transfers control to a function starting with a new stack.
+
+ Transfers control to the function specified by EntryPoint using the new stack
+ specified by NewStack and passing in the parameters specified by Context1 and
+ Context2. Context1 and Context2 are optional and may be NULL. The function
+ EntryPoint must never return.
+
+ If EntryPoint is NULL, then ASSERT().
+ If NewStack is NULL, then ASSERT().
+
+ @param EntryPoint A pointer to function to call with the new stack.
+ @param Context1 A pointer to the context to pass into the EntryPoint
+ function.
+ @param Context2 A pointer to the context to pass into the EntryPoint
+ function.
+ @param NewStack A pointer to the new stack to use for the EntryPoint
+ function.
+ @param NewBsp A pointer to the new BSP for the EntryPoint on IPF. It's
+ Reserved on other architectures.
+
+**/
+VOID
+EFIAPI
+PeiSwitchStacks (
+ IN SWITCH_STACK_ENTRY_POINT EntryPoint,
+ IN VOID *Context1, OPTIONAL
+ IN VOID *Context2, OPTIONAL
+ IN VOID *Context3, OPTIONAL
+ IN VOID *OldTopOfStack,
+ IN VOID *NewStack
+ )
+{
+ BASE_LIBRARY_JUMP_BUFFER JumpBuffer;
+
+ ASSERT (EntryPoint != NULL);
+ ASSERT (NewStack != NULL);
+
+ //
+ // Stack should be aligned with CPU_STACK_ALIGNMENT
+ //
+ ASSERT (((UINTN)NewStack & (CPU_STACK_ALIGNMENT - 1)) == 0);
+
+ JumpBuffer.Eip = (UINTN)EntryPoint;
+ JumpBuffer.Esp = (UINTN)NewStack - sizeof (VOID*);
+ JumpBuffer.Esp -= sizeof (Context1) + sizeof (Context2) + sizeof(Context3);
+ ((VOID**)JumpBuffer.Esp)[1] = Context1;
+ ((VOID**)JumpBuffer.Esp)[2] = Context2;
+ ((VOID**)JumpBuffer.Esp)[3] = Context3;
+
+ LongJump (&JumpBuffer, (UINTN)-1);
+
+ //
+ // InternalSwitchStack () will never return
+ //
+ ASSERT (FALSE);
+}
+
+/**
+ Transfers control to a function starting with a new stack.
+
+ Transfers control to the function specified by EntryPoint using the new stack
+ specified by NewStack and passing in the parameters specified by Context1 and
+ Context2. Context1 and Context2 are optional and may be NULL. The function
+ EntryPoint must never return.
+
+ If EntryPoint is NULL, then ASSERT().
+ If NewStack is NULL, then ASSERT().
+
+ @param EntryPoint A pointer to function to call with the new stack.
+ @param Context1 A pointer to the context to pass into the EntryPoint
+ function.
+ @param Context2 A pointer to the context to pass into the EntryPoint
+ function.
+ @param NewStack A pointer to the new stack to use for the EntryPoint
+ function.
+ @param NewBsp A pointer to the new BSP for the EntryPoint on IPF. It's
+ Reserved on other architectures.
+
+**/
+VOID
+EFIAPI
+SecSwitchStack (
+ IN UINTN TemporaryMemoryBase,
+ IN UINTN PermanentMemoryBase,
+ IN UINTN CopySize
+ )
+{
+ BASE_LIBRARY_JUMP_BUFFER JumpBuffer;
+ UINTN SetJumpFlag;
+
+ ASSERT ((VOID*)TemporaryMemoryBase != NULL);
+ ASSERT ((VOID*)PermanentMemoryBase != NULL);
+
+ SetJumpFlag = SetJump (&JumpBuffer);
+ //
+ // The initial call to SetJump() must always return 0.
+ // Subsequent calls to LongJump() may cause a non-zero value to be returned by SetJump().
+ //
+ if (SetJumpFlag == 0) {
+ DEBUG ((EFI_D_ERROR, "SecSwitchStack+%d: Esp: 0x%xL\n", __LINE__, JumpBuffer.Esp));
+ JumpBuffer.Esp =
+ (INTN)JumpBuffer.Esp -
+ (INTN)TemporaryMemoryBase +
+ (INTN)PermanentMemoryBase;
+ MemoryFence ();
+ CopyMem((VOID*)PermanentMemoryBase, (VOID*)TemporaryMemoryBase, CopySize);
+ LongJump (&JumpBuffer, (UINTN)-1);
+ }
+
+}
+
diff --git a/OvmfPkg/Sec/SecMain.c b/OvmfPkg/Sec/SecMain.c
new file mode 100644
index 0000000000..1dafa05025
--- /dev/null
+++ b/OvmfPkg/Sec/SecMain.c
@@ -0,0 +1,171 @@
+/** @file
+ Main SEC phase code. Transitions to PEI.
+
+ Copyright (c) 2008 - 2009, Intel Corporation
+
+ All rights reserved. This program and the accompanying materials
+ are licensed and made available under the terms and conditions of the BSD License
+ which accompanies this distribution. The full text of the license may be found at
+ http://opensource.org/licenses/bsd-license.php
+
+ THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+#include <PiPei.h>
+#include <Library/BaseLib.h>
+#include <Library/DebugLib.h>
+#include <Library/BaseMemoryLib.h>
+#include <Library/PeiServicesLib.h>
+#include <Ppi/TemporaryRamSupport.h>
+#include <Library/PcdLib.h>
+
+#include "SecMain.h"
+
+EFI_STATUS
+EFIAPI
+TemporaryRamMigration (
+ IN CONST EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PHYSICAL_ADDRESS TemporaryMemoryBase,
+ IN EFI_PHYSICAL_ADDRESS PermanentMemoryBase,
+ IN UINTN CopySize
+ );
+
+STATIC TEMPORARY_RAM_SUPPORT_PPI mTempRamSupportPpi = {
+ (TEMPORARY_RAM_MIGRATION) TemporaryRamMigration
+};
+
+STATIC EFI_PEI_PPI_DESCRIPTOR mPrivateDispatchTable[] = {
+ {
+ (EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
+ &gEfiTemporaryRamSupportPpiGuid,
+ &mTempRamSupportPpi
+ },
+};
+
+
+VOID
+InitializeIdtPtr (
+ IN VOID* IdtPtr
+ )
+{
+ IA32_DESCRIPTOR IdtDescriptor;
+
+ IdtDescriptor.Base = (UINTN)IdtPtr;
+ IdtDescriptor.Limit = (UINT16) 0;
+ AsmWriteIdtr (&IdtDescriptor);
+}
+
+VOID
+EFIAPI
+SecCoreStartupWithStack (
+ IN VOID *BootFirmwareVolumePtr,
+ IN VOID *SecCoreEntryPoint,
+ IN VOID *PeiCoreEntryPoint,
+ IN VOID *TopOfCurrentStack
+ )
+{
+ EFI_SEC_PEI_HAND_OFF *SecCoreData;
+ UINT8 *BottomOfTempRam;
+ UINT8 *TopOfTempRam;
+ UINTN SizeOfTempRam;
+ VOID *IdtPtr;
+
+ DEBUG ((EFI_D_ERROR,
+ "SecCoreStartupWithStack(0x%x, 0x%x, 0x%x, 0x%x)\n",
+ (UINT32)(UINTN)BootFirmwareVolumePtr,
+ (UINT32)(UINTN)SecCoreEntryPoint,
+ (UINT32)(UINTN)PeiCoreEntryPoint,
+ (UINT32)(UINTN)TopOfCurrentStack));
+
+
+ BottomOfTempRam = (UINT8*)(UINTN) INITIAL_TOP_OF_STACK;
+ SizeOfTempRam = (UINTN) SIZE_64KB;
+ TopOfTempRam = BottomOfTempRam + SizeOfTempRam;
+
+ //
+ // |-------------|
+ // | SecCoreData | 4k
+ // |-------------|
+ // | Heap | 28k
+ // |-------------|
+ // | Stack | 32k
+ // |-------------| <---- INITIAL_TOP_OF_STACK
+ //
+
+ //
+ // Bind this information into the SEC hand-off state
+ //
+ SecCoreData = (EFI_SEC_PEI_HAND_OFF*)((UINTN) TopOfTempRam - SIZE_4KB);
+ SecCoreData->DataSize = sizeof(EFI_SEC_PEI_HAND_OFF);
+
+ SecCoreData->BootFirmwareVolumeBase = (VOID*)(UINTN) PcdGet32 (PcdOvmfFlashFvRecoveryBase);
+ SecCoreData->BootFirmwareVolumeSize = PcdGet32 (PcdOvmfFlashFvRecoverySize);
+
+ SecCoreData->TemporaryRamBase = (VOID*) BottomOfTempRam;
+ SecCoreData->TemporaryRamSize = SizeOfTempRam;
+
+ SecCoreData->PeiTemporaryRamSize = 28 * SIZE_1KB;
+ SecCoreData->PeiTemporaryRamBase = (VOID*)((UINTN)SecCoreData - SecCoreData->PeiTemporaryRamSize);
+
+ SecCoreData->StackBase = SecCoreData->TemporaryRamBase;
+ SecCoreData->StackSize = (UINTN)SecCoreData->PeiTemporaryRamBase - (UINTN)SecCoreData->TemporaryRamBase;
+
+ //
+ // Initialize the IDT Pointer, since IA32 & X64 architectures
+ // use it to store the PEI Services pointer.
+ //
+ IdtPtr = (VOID*)((UINT8*)SecCoreData + sizeof (*SecCoreData) + sizeof (UINTN));
+ IdtPtr = ALIGN_POINTER(IdtPtr, 16);
+ InitializeIdtPtr (IdtPtr);
+
+ //
+ // Transfer control to the PEI Core
+ //
+ PeiSwitchStacks (
+ (SWITCH_STACK_ENTRY_POINT) (UINTN) PeiCoreEntryPoint,
+ SecCoreData,
+ (VOID *) (UINTN) ((EFI_PEI_PPI_DESCRIPTOR *) &mPrivateDispatchTable),
+ NULL,
+ TopOfCurrentStack,
+ (VOID *)((UINTN)SecCoreData->StackBase + SecCoreData->StackSize)
+ );
+
+ //
+ // If we get here, then the PEI Core returned. This is an error
+ //
+ ASSERT (FALSE);
+ CpuDeadLoop ();
+}
+
+EFI_STATUS
+EFIAPI
+TemporaryRamMigration (
+ IN CONST EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PHYSICAL_ADDRESS TemporaryMemoryBase,
+ IN EFI_PHYSICAL_ADDRESS PermanentMemoryBase,
+ IN UINTN CopySize
+ )
+{
+ DEBUG ((EFI_D_ERROR, "TemporaryRamMigration(0x%x, 0x%x, 0x%x)\n", (UINTN)TemporaryMemoryBase, (UINTN)PermanentMemoryBase, CopySize));
+
+ //
+ // Migrate the whole temporary memory to permenent memory.
+ //
+ CopyMem((VOID*)(UINTN)PermanentMemoryBase, (VOID*)(UINTN)TemporaryMemoryBase, CopySize);
+
+ //
+ // SecSwitchStack function must be invoked after the memory migration
+ // immediatly, also we need fixup the stack change caused by new call into
+ // permenent memory.
+ //
+ SecSwitchStack (
+ (UINTN) TemporaryMemoryBase,
+ (UINTN) PermanentMemoryBase,
+ CopySize
+ );
+
+ return EFI_SUCCESS;
+}
+
diff --git a/OvmfPkg/Sec/SecMain.h b/OvmfPkg/Sec/SecMain.h
new file mode 100644
index 0000000000..50c5b295e9
--- /dev/null
+++ b/OvmfPkg/Sec/SecMain.h
@@ -0,0 +1,50 @@
+/** @file
+ Header file for SEC code
+
+ Copyright (c) 2008 - 2009, Intel Corporation
+
+ All rights reserved. This program and the accompanying materials
+ are licensed and made available under the terms and conditions of the BSD License
+ which accompanies this distribution. The full text of the license may be found at
+ http://opensource.org/licenses/bsd-license.php
+
+ THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+#ifndef _PLATFORM_SECMAIN_H_
+#define _PLATFORM_SECMAIN_H_
+
+VOID
+EFIAPI
+PeiSwitchStacks (
+ IN SWITCH_STACK_ENTRY_POINT EntryPoint,
+ IN VOID *Context1, OPTIONAL
+ IN VOID *Context2, OPTIONAL
+ IN VOID *Context3, OPTIONAL
+ IN VOID *OldTopOfStack,
+ IN VOID *NewStack
+ );
+
+VOID
+EFIAPI
+SecSwitchStack (
+ IN UINTN TemporaryMemoryBase,
+ IN UINTN PermanentMemoryBase,
+ IN UINTN CopySize
+ );
+
+EFI_STATUS
+EFIAPI
+TemporaryRamMigration (
+ IN CONST EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PHYSICAL_ADDRESS TemporaryMemoryBase,
+ IN EFI_PHYSICAL_ADDRESS PermanentMemoryBase,
+ IN UINTN CopySize
+ );
+
+#define INITIAL_TOP_OF_STACK BASE_128KB
+
+#endif // _PLATFORM_SECMAIN_H_
+
diff --git a/OvmfPkg/Sec/SecMain.inf b/OvmfPkg/Sec/SecMain.inf
new file mode 100644
index 0000000000..1646cce978
--- /dev/null
+++ b/OvmfPkg/Sec/SecMain.inf
@@ -0,0 +1,58 @@
+#/** @file
+# SEC Driver
+#
+# Copyright (c) 2008, Intel Corporation
+#
+# All rights reserved. This program and the accompanying materials
+# are licensed and made available under the terms and conditions of the BSD License
+# which accompanies this distribution. The full text of the license may be found at
+# http://opensource.org/licenses/bsd-license.php
+#
+# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#
+#**/
+
+[Defines]
+ INF_VERSION = 0x00010005
+ BASE_NAME = SecMain
+ FILE_GUID = df1ccef6-f301-4a63-9661-fc6030dcc880
+ MODULE_TYPE = SEC
+ VERSION_STRING = 1.0
+ EDK_RELEASE_VERSION = 0x00020000
+ EFI_SPECIFICATION_VERSION = 0x00020000
+ ENTRY_POINT = SecMain
+
+#
+# The following information is for reference only and not required by the build tools.
+#
+# VALID_ARCHITECTURES = IA32 X64 IPF EBC
+#
+
+[Sources.common]
+ SecMain.c
+
+[Sources.IA32]
+ Ia32/SecEntry.asm
+ Ia32/SecEntry.S
+ Ia32/SwitchStack.c
+
+[Sources.X64]
+ X64/SecEntry.asm
+ X64/SecEntry.S
+ X64/SwitchStack.c
+
+[Packages]
+ MdePkg/MdePkg.dec
+ OvmfPkg/OvmfPkg.dec
+
+[LibraryClasses]
+ BaseLib
+
+[Ppis]
+ gEfiTemporaryRamSupportPpiGuid # PPI ALWAYS_PRODUCED
+
+[FixedPcd.common]
+ gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashFvRecoveryBase
+ gUefiOvmfPkgTokenSpaceGuid.PcdOvmfFlashFvRecoverySize
+
diff --git a/OvmfPkg/Sec/X64/SecEntry.S b/OvmfPkg/Sec/X64/SecEntry.S
new file mode 100644
index 0000000000..42b3022170
--- /dev/null
+++ b/OvmfPkg/Sec/X64/SecEntry.S
@@ -0,0 +1,60 @@
+# TITLE SecEntry.asm
+
+#------------------------------------------------------------------------------
+#*
+#* Copyright 2006 - 2009, Intel Corporation
+#* All rights reserved. This program and the accompanying materials
+#* are licensed and made available under the terms and conditions of the BSD License
+#* which accompanies this distribution. The full text of the license may be found at
+#* http://opensource.org/licenses/bsd-license.php
+#*
+#* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+#* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+#*
+#* CpuAsm.asm
+#*
+#* Abstract:
+#*
+#------------------------------------------------------------------------------
+
+
+#include "SecMain.h"
+
+#EXTERN ASM_PFX(SecCoreStartupWithStack)
+
+#
+# SecCore Entry Point
+#
+# Processor is in flat protected mode
+#
+# @param ESI Pointer to SEC Core Entry Point (this function)
+# @param EDI Pointer to PEI Core Entry Point
+# @param EBP Pointer to the start of the Boot Firmware Volume
+#
+# @return None
+#
+#
+.intel_syntax
+ASM_GLOBAL ASM_PFX(_ModuleEntryPoint)
+ASM_PFX(_ModuleEntryPoint):
+
+ #
+ # Load temporary stack top at very low memory. The C code
+ # can reload to a better address.
+ #
+ mov %rsp, INITIAL_TOP_OF_STACK
+ nop
+
+ #
+ # Setup parameters and call SecCoreStartupWithStack
+ # rcx: BootFirmwareVolumePtr
+ # rdx: SecCoreEntryPoint
+ # r8: PeiCoreEntryPoint
+ # r9: TopOfCurrentStack
+ #
+ mov %rcx, %rbp
+ mov %rdx, %rsi
+ mov %r8, %rdi
+ mov %r9, %rsp
+ call ASM_PFX(SecCoreStartupWithStack)
+
diff --git a/OvmfPkg/Sec/X64/SecEntry.asm b/OvmfPkg/Sec/X64/SecEntry.asm
new file mode 100644
index 0000000000..8b836de62e
--- /dev/null
+++ b/OvmfPkg/Sec/X64/SecEntry.asm
@@ -0,0 +1,61 @@
+ TITLE SecEntry.asm
+;------------------------------------------------------------------------------
+;*
+;* Copyright 2006 - 2009, Intel Corporation
+;* All rights reserved. This program and the accompanying materials
+;* are licensed and made available under the terms and conditions of the BSD License
+;* which accompanies this distribution. The full text of the license may be found at
+;* http://opensource.org/licenses/bsd-license.php
+;*
+;* THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+;* WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+;*
+;* CpuAsm.asm
+;*
+;* Abstract:
+;*
+;------------------------------------------------------------------------------
+
+#include "SecMain.h"
+
+.code
+
+EXTERN SecCoreStartupWithStack:PROC
+
+;
+; SecCore Entry Point
+;
+; Processor is in flat protected mode
+;
+; @param ESI Pointer to SEC Core Entry Point (this function)
+; @param EDI Pointer to PEI Core Entry Point
+; @param EBP Pointer to the start of the Boot Firmware Volume
+;
+; @return None
+;
+;
+_ModuleEntryPoint PROC PUBLIC
+
+ ;
+ ; Load temporary stack top at very low memory. The C code
+ ; can reload to a better address.
+ ;
+ mov rsp, INITIAL_TOP_OF_STACK
+ nop
+
+ ;
+ ; Setup parameters and call SecCoreStartupWithStack
+ ; rcx: BootFirmwareVolumePtr
+ ; rdx: SecCoreEntryPoint
+ ; r8: PeiCoreEntryPoint
+ ; r9: TopOfCurrentStack
+ ;
+ mov rcx, rbp
+ mov rdx, rsi
+ mov r8, rdi
+ mov r9, rsp
+ call SecCoreStartupWithStack
+
+_ModuleEntryPoint ENDP
+
+END
diff --git a/OvmfPkg/Sec/X64/SwitchStack.c b/OvmfPkg/Sec/X64/SwitchStack.c
new file mode 100644
index 0000000000..3ff98ba5c4
--- /dev/null
+++ b/OvmfPkg/Sec/X64/SwitchStack.c
@@ -0,0 +1,165 @@
+/** @file
+ Switch Stack functions.
+
+ Copyright (c) 2006 - 2007, Intel Corporation<BR>
+ All rights reserved. This program and the accompanying materials
+ are licensed and made available under the terms and conditions of the BSD License
+ which accompanies this distribution. The full text of the license may be found at
+ http://opensource.org/licenses/bsd-license.php
+
+ THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
+ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
+
+**/
+
+//
+// Include common header file for this module.
+//
+
+
+#include <Library/BaseLib.h>
+#include <Library/BaseMemoryLib.h>
+#include <Library/DebugLib.h>
+#include <Library/PeiServicesLib.h>
+
+//
+// Type define for PEI Core Entry Point function
+//
+typedef
+VOID
+(EFIAPI *PEI_CORE_ENTRY_POINT)(
+ IN CONST EFI_SEC_PEI_HAND_OFF *SecCoreData,
+ IN CONST EFI_PEI_PPI_DESCRIPTOR *PpiList,
+ IN VOID *Data
+ )
+;
+
+/**
+ Transfers control to a function starting with a new stack.
+
+ Transfers control to the function specified by EntryPoint using the new stack
+ specified by NewStack and passing in the parameters specified by Context1 and
+ Context2. Context1 and Context2 are optional and may be NULL. The function
+ EntryPoint must never return.
+
+ If EntryPoint is NULL, then ASSERT().
+ If NewStack is NULL, then ASSERT().
+
+ @param EntryPoint A pointer to function to call with the new stack.
+ @param Context1 A pointer to the context to pass into the EntryPoint
+ function.
+ @param Context2 A pointer to the context to pass into the EntryPoint
+ function.
+ @param NewStack A pointer to the new stack to use for the EntryPoint
+ function.
+ @param NewBsp A pointer to the new BSP for the EntryPoint on IPF. It's
+ Reserved on other architectures.
+
+**/
+VOID
+EFIAPI
+PeiSwitchStacks (
+ IN SWITCH_STACK_ENTRY_POINT EntryPoint,
+ IN VOID *Context1, OPTIONAL
+ IN VOID *Context2, OPTIONAL
+ IN VOID *Context3, OPTIONAL
+ IN VOID *OldTopOfStack,
+ IN VOID *NewStack
+ )
+{
+ BASE_LIBRARY_JUMP_BUFFER JumpBuffer;
+ UINTN SizeOfStackUsed;
+ UINTN SetJumpFlag;
+
+ ASSERT (EntryPoint != NULL);
+ ASSERT (NewStack != NULL);
+
+ SetJumpFlag = SetJump (&JumpBuffer);
+ //
+ // The initial call to SetJump() must always return 0.
+ // Subsequent calls to LongJump() may cause a non-zero value to be returned by SetJump().
+ //
+ if (SetJumpFlag == 0) {
+ //
+ // Stack should be aligned with CPU_STACK_ALIGNMENT
+ //
+ ASSERT (((UINTN)NewStack & (CPU_STACK_ALIGNMENT - 1)) == 0);
+
+ //JumpBuffer.Rip = (UINTN)EntryPoint;
+ SizeOfStackUsed = (UINTN)OldTopOfStack - JumpBuffer.Rsp;
+ JumpBuffer.Rsp = (UINTN)NewStack - SizeOfStackUsed;
+ MemoryFence ();
+ CopyMem (
+ (VOID*) ((UINTN)NewStack - SizeOfStackUsed),
+ (VOID*) ((UINTN)OldTopOfStack - SizeOfStackUsed),
+ SizeOfStackUsed
+ );
+ LongJump (&JumpBuffer, (UINTN)-1);
+ } else {
+ (*(PEI_CORE_ENTRY_POINT)(EntryPoint)) (
+ (EFI_SEC_PEI_HAND_OFF *) Context1,
+ (EFI_PEI_PPI_DESCRIPTOR *) Context2,
+ Context3
+ );
+ }
+
+ //
+ // InternalSwitchStack () will never return
+ //
+ ASSERT (FALSE);
+}
+
+/**
+ Transfers control to a function starting with a new stack.
+
+ Transfers control to the function specified by EntryPoint using the new stack
+ specified by NewStack and passing in the parameters specified by Context1 and
+ Context2. Context1 and Context2 are optional and may be NULL. The function
+ EntryPoint must never return.
+
+ If EntryPoint is NULL, then ASSERT().
+ If NewStack is NULL, then ASSERT().
+
+ @param EntryPoint A pointer to function to call with the new stack.
+ @param Context1 A pointer to the context to pass into the EntryPoint
+ function.
+ @param Context2 A pointer to the context to pass into the EntryPoint
+ function.
+ @param NewStack A pointer to the new stack to use for the EntryPoint
+ function.
+ @param NewBsp A pointer to the new BSP for the EntryPoint on IPF. It's
+ Reserved on other architectures.
+
+**/
+VOID
+EFIAPI
+SecSwitchStack (
+ IN UINTN TemporaryMemoryBase,
+ IN UINTN PermanentMemoryBase,
+ IN UINTN CopySize
+ )
+{
+ BASE_LIBRARY_JUMP_BUFFER JumpBuffer;
+ UINTN SetJumpFlag;
+
+ ASSERT ((VOID*)TemporaryMemoryBase != NULL);
+ ASSERT ((VOID*)PermanentMemoryBase != NULL);
+
+ SetJumpFlag = SetJump (&JumpBuffer);
+ //
+ // The initial call to SetJump() must always return 0.
+ // Subsequent calls to LongJump() may cause a non-zero value to be returned by SetJump().
+ //
+ if (SetJumpFlag == 0) {
+ DEBUG ((EFI_D_ERROR, "SecSwitchStack+%d: Rsp: 0x%xL\n", __LINE__, JumpBuffer.Rsp));
+ JumpBuffer.Rsp =
+ (INTN)JumpBuffer.Rsp -
+ (INTN)TemporaryMemoryBase +
+ (INTN)PermanentMemoryBase;
+ MemoryFence ();
+ CopyMem((VOID*)PermanentMemoryBase, (VOID*)TemporaryMemoryBase, CopySize);
+ LongJump (&JumpBuffer, (UINTN)-1);
+ }
+
+}
+