2009-05-27 23:10:18 +02:00
|
|
|
;------------------------------------------------------------------------------
|
|
|
|
;*
|
2014-01-21 20:38:43 +01:00
|
|
|
;* Copyright (c) 2006 - 2013, Intel Corporation. All rights reserved.<BR>
|
2019-04-04 01:06:33 +02:00
|
|
|
;* SPDX-License-Identifier: BSD-2-Clause-Patent
|
2009-05-27 23:10:18 +02:00
|
|
|
;*
|
|
|
|
;* CpuAsm.asm
|
|
|
|
;*
|
|
|
|
;* Abstract:
|
|
|
|
;*
|
|
|
|
;------------------------------------------------------------------------------
|
|
|
|
|
2010-08-03 09:41:54 +02:00
|
|
|
#include <Base.h>
|
2021-07-16 10:04:11 +02:00
|
|
|
%include "TdxCommondefs.inc"
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2014-10-31 21:55:16 +01:00
|
|
|
DEFAULT REL
|
|
|
|
SECTION .text
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2014-10-31 21:55:16 +01:00
|
|
|
extern ASM_PFX(SecCoreStartupWithStack)
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2021-07-16 10:04:11 +02:00
|
|
|
%macro tdcall 0
|
|
|
|
db 0x66, 0x0f, 0x01, 0xcc
|
|
|
|
%endmacro
|
|
|
|
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
2009-12-17 00:29:17 +01:00
|
|
|
; SecCore Entry Point
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
2009-12-17 00:29:17 +01:00
|
|
|
; Processor is in flat protected mode
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
2009-12-17 00:29:17 +01:00
|
|
|
; @param[in] RAX Initial value of the EAX register (BIST: Built-in Self Test)
|
|
|
|
; @param[in] DI 'BP': boot-strap processor, or 'AP': application processor
|
|
|
|
; @param[in] RBP Pointer to the start of the Boot Firmware Volume
|
2017-11-08 20:32:30 +01:00
|
|
|
; @param[in] DS Selector allowing flat access to all addresses
|
|
|
|
; @param[in] ES Selector allowing flat access to all addresses
|
|
|
|
; @param[in] FS Selector allowing flat access to all addresses
|
|
|
|
; @param[in] GS Selector allowing flat access to all addresses
|
|
|
|
; @param[in] SS Selector allowing flat access to all addresses
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
2009-12-17 00:29:17 +01:00
|
|
|
; @return None This routine does not return
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
2014-10-31 21:55:16 +01:00
|
|
|
global ASM_PFX(_ModuleEntryPoint)
|
|
|
|
ASM_PFX(_ModuleEntryPoint):
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2021-07-16 10:04:11 +02:00
|
|
|
;
|
|
|
|
; Guest type is stored in OVMF_WORK_AREA
|
|
|
|
;
|
|
|
|
%define OVMF_WORK_AREA FixedPcdGet32 (PcdOvmfWorkAreaBase)
|
|
|
|
%define VM_GUEST_TYPE_TDX 2
|
|
|
|
mov eax, OVMF_WORK_AREA
|
|
|
|
cmp byte[eax], VM_GUEST_TYPE_TDX
|
|
|
|
jne InitStack
|
|
|
|
|
|
|
|
mov rax, TDCALL_TDINFO
|
|
|
|
tdcall
|
|
|
|
|
|
|
|
;
|
|
|
|
; R8 [31:0] NUM_VCPUS
|
|
|
|
; [63:32] MAX_VCPUS
|
|
|
|
; R9 [31:0] VCPU_INDEX
|
|
|
|
; Td Guest set the VCPU0 as the BSP, others are the APs
|
|
|
|
; APs jump to spinloop and get released by DXE's MpInitLib
|
|
|
|
;
|
|
|
|
mov rax, r9
|
|
|
|
and rax, 0xffff
|
|
|
|
test rax, rax
|
|
|
|
jne ParkAp
|
|
|
|
|
|
|
|
InitStack:
|
|
|
|
|
2017-11-08 20:32:30 +01:00
|
|
|
;
|
|
|
|
; Fill the temporary RAM with the initial stack value.
|
|
|
|
; The loop below will seed the heap as well, but that's harmless.
|
|
|
|
;
|
2017-11-27 02:38:08 +01:00
|
|
|
mov rax, (FixedPcdGet32 (PcdInitValueInTempStack) << 32) | FixedPcdGet32 (PcdInitValueInTempStack)
|
|
|
|
; qword to store
|
2017-11-08 20:32:30 +01:00
|
|
|
mov rdi, FixedPcdGet32 (PcdOvmfSecPeiTempRamBase) ; base address,
|
|
|
|
; relative to
|
|
|
|
; ES
|
|
|
|
mov rcx, FixedPcdGet32 (PcdOvmfSecPeiTempRamSize) / 8 ; qword count
|
|
|
|
cld ; store from base
|
|
|
|
; up
|
|
|
|
rep stosq
|
|
|
|
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
2014-01-21 20:38:43 +01:00
|
|
|
; Load temporary RAM stack based on PCDs
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
2014-10-31 21:55:16 +01:00
|
|
|
%define SEC_TOP_OF_STACK (FixedPcdGet32 (PcdOvmfSecPeiTempRamBase) + \
|
2014-01-21 20:38:43 +01:00
|
|
|
FixedPcdGet32 (PcdOvmfSecPeiTempRamSize))
|
|
|
|
mov rsp, SEC_TOP_OF_STACK
|
2009-05-27 23:10:18 +02:00
|
|
|
nop
|
|
|
|
|
|
|
|
;
|
|
|
|
; Setup parameters and call SecCoreStartupWithStack
|
|
|
|
; rcx: BootFirmwareVolumePtr
|
2009-12-17 00:29:17 +01:00
|
|
|
; rdx: TopOfCurrentStack
|
2009-05-27 23:10:18 +02:00
|
|
|
;
|
|
|
|
mov rcx, rbp
|
2009-12-17 00:29:17 +01:00
|
|
|
mov rdx, rsp
|
2014-10-31 21:55:16 +01:00
|
|
|
sub rsp, 0x20
|
|
|
|
call ASM_PFX(SecCoreStartupWithStack)
|
2009-05-27 23:10:18 +02:00
|
|
|
|
2021-07-16 10:04:11 +02:00
|
|
|
;
|
|
|
|
; Note: BSP never gets here. APs will be unblocked by DXE
|
|
|
|
;
|
|
|
|
; R8 [31:0] NUM_VCPUS
|
|
|
|
; [63:32] MAX_VCPUS
|
|
|
|
; R9 [31:0] VCPU_INDEX
|
|
|
|
;
|
|
|
|
ParkAp:
|
|
|
|
|
|
|
|
mov rbp, r9
|
|
|
|
|
|
|
|
.do_wait_loop:
|
|
|
|
mov rsp, FixedPcdGet32 (PcdOvmfSecGhcbBackupBase)
|
|
|
|
|
|
|
|
;
|
|
|
|
; register itself in [rsp + CpuArrivalOffset]
|
|
|
|
;
|
|
|
|
mov rax, 1
|
|
|
|
lock xadd dword [rsp + CpuArrivalOffset], eax
|
|
|
|
inc eax
|
|
|
|
|
|
|
|
.check_arrival_cnt:
|
|
|
|
cmp eax, r8d
|
|
|
|
je .check_command
|
|
|
|
mov eax, dword[rsp + CpuArrivalOffset]
|
|
|
|
jmp .check_arrival_cnt
|
|
|
|
|
|
|
|
.check_command:
|
|
|
|
mov eax, dword[rsp + CommandOffset]
|
|
|
|
cmp eax, MpProtectedModeWakeupCommandNoop
|
|
|
|
je .check_command
|
|
|
|
|
|
|
|
cmp eax, MpProtectedModeWakeupCommandWakeup
|
|
|
|
je .do_wakeup
|
|
|
|
|
|
|
|
; Don't support this command, so ignore
|
|
|
|
jmp .check_command
|
|
|
|
|
|
|
|
.do_wakeup:
|
|
|
|
;
|
|
|
|
; BSP sets these variables before unblocking APs
|
|
|
|
; RAX: WakeupVectorOffset
|
|
|
|
; RBX: Relocated mailbox address
|
|
|
|
; RBP: vCpuId
|
|
|
|
;
|
|
|
|
mov rax, 0
|
|
|
|
mov eax, dword[rsp + WakeupVectorOffset]
|
|
|
|
mov rbx, [rsp + WakeupArgsRelocatedMailBox]
|
|
|
|
nop
|
|
|
|
jmp rax
|
|
|
|
jmp $
|