blob: 2a4616cec35f550eeefd61dd528f3b2f002cd146 [file] [log] [blame]
Angel Ponsc3f58f62020-04-05 15:46:41 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Aaron Durbin302cbd62013-10-21 12:36:17 -05002
Aaron Durbin302cbd62013-10-21 12:36:17 -05003#include <console/console.h>
4#include <cpu/cpu.h>
Matt DeVilliere5a1a4c2017-01-19 21:13:02 -06005#include <cpu/intel/common/common.h>
Kyösti Mälkkifaf20d32019-08-14 05:41:41 +03006#include <cpu/intel/em64t100_save_state.h>
Aaron Durbin302cbd62013-10-21 12:36:17 -05007#include <cpu/intel/microcode.h>
Kyösti Mälkkifaf20d32019-08-14 05:41:41 +03008#include <cpu/intel/smm_reloc.h>
Duncan Laurie05a33932013-11-05 12:59:50 -08009#include <cpu/intel/turbo.h>
Aaron Durbin7837be62013-10-21 22:32:00 -050010#include <cpu/x86/lapic.h>
Aaron Durbin302cbd62013-10-21 12:36:17 -050011#include <cpu/x86/mp.h>
Aaron Durbin7837be62013-10-21 22:32:00 -050012#include <cpu/x86/msr.h>
13#include <cpu/x86/mtrr.h>
14#include <cpu/x86/smm.h>
Felix Held37e160e2021-10-20 23:43:12 +020015#include <device/device.h>
Duncan Laurie05a33932013-11-05 12:59:50 -080016#include <reg_script.h>
Julius Werner18ea2d32014-10-07 16:42:17 -070017#include <soc/iosf.h>
18#include <soc/msr.h>
19#include <soc/pattrs.h>
20#include <soc/ramstage.h>
Felix Heldd27ef5b2021-10-20 20:18:12 +020021#include <types.h>
Aaron Durbin7837be62013-10-21 22:32:00 -050022
Duncan Laurie05a33932013-11-05 12:59:50 -080023/* Core level MSRs */
Angel Pons1fb17d62020-07-07 18:13:47 +020024static const struct reg_script core_msr_script[] = {
Duncan Laurie31ac9e32014-03-28 10:52:13 -070025 /* Dynamic L2 shrink enable and threshold, clear SINGLE_PCTL bit 11 */
Elyes HAOUAS4e6b7902018-10-02 08:44:47 +020026 REG_MSR_RMW(MSR_PKG_CST_CONFIG_CONTROL, ~0x3f080f, 0xe0008),
Angel Ponsb046bfa2020-07-07 17:36:08 +020027 REG_MSR_RMW(MSR_POWER_MISC, ~(ENABLE_ULFM_AUTOCM_MASK | ENABLE_INDP_AUTOCM_MASK), 0),
28
Duncan Laurie05a33932013-11-05 12:59:50 -080029 /* Disable C1E */
30 REG_MSR_RMW(MSR_POWER_CTL, ~0x2, 0),
31 REG_MSR_OR(MSR_POWER_MISC, 0x44),
32 REG_SCRIPT_END
33};
34
Angel Pons1fb17d62020-07-07 18:13:47 +020035static void soc_core_init(struct device *cpu)
Aaron Durbin302cbd62013-10-21 12:36:17 -050036{
37 printk(BIOS_DEBUG, "Init BayTrail core.\n");
Duncan Laurie05a33932013-11-05 12:59:50 -080038
Angel Pons26b49cc2020-07-07 17:17:51 +020039 /*
40 * The turbo disable bit is actually scoped at building block level -- not package.
41 * For non-BSP cores that are within a building block, enable turbo. The cores within
42 * the BSP's building block will just see it already enabled and move on.
43 */
Aaron Durbin59d1d872014-01-14 17:34:10 -060044 if (lapicid())
45 enable_turbo();
46
Matt DeVilliere5a1a4c2017-01-19 21:13:02 -060047 /* Set virtualization based on Kconfig option */
Matt DeVillierf9aed652018-12-15 15:57:33 -060048 set_vmx_and_lock();
Matt DeVilliere5a1a4c2017-01-19 21:13:02 -060049
Duncan Laurie05a33932013-11-05 12:59:50 -080050 /* Set core MSRs */
51 reg_script_run(core_msr_script);
52
53 /* Set this core to max frequency ratio */
54 set_max_freq();
Aaron Durbin302cbd62013-10-21 12:36:17 -050055}
56
57static struct device_operations cpu_dev_ops = {
Angel Pons1fb17d62020-07-07 18:13:47 +020058 .init = soc_core_init,
Aaron Durbin302cbd62013-10-21 12:36:17 -050059};
60
Jonathan Neuschäfer8f06ce32017-11-20 01:56:44 +010061static const struct cpu_device_id cpu_table[] = {
Felix Held6a6ac1e2023-02-06 15:19:11 +010062 { X86_VENDOR_INTEL, 0x30673, CPUID_EXACT_MATCH_MASK },
63 { X86_VENDOR_INTEL, 0x30678, CPUID_EXACT_MATCH_MASK },
64 { X86_VENDOR_INTEL, 0x30679, CPUID_EXACT_MATCH_MASK },
Felix Held1e781652023-02-08 11:39:16 +010065 CPU_TABLE_END
Aaron Durbin302cbd62013-10-21 12:36:17 -050066};
67
68static const struct cpu_driver driver __cpu_driver = {
69 .ops = &cpu_dev_ops,
70 .id_table = cpu_table,
71};
72
Aaron Durbin7837be62013-10-21 22:32:00 -050073/*
Aaron Durbinb04bb652016-05-03 11:12:52 -050074 * MP and SMM loading initialization.
Aaron Durbin7837be62013-10-21 22:32:00 -050075 */
76
Aaron Durbinb04bb652016-05-03 11:12:52 -050077/* Package level MSRs */
78static const struct reg_script package_msr_script[] = {
79 /* Set Package TDP to ~7W */
80 REG_MSR_WRITE(MSR_PKG_POWER_LIMIT, 0x3880fa),
81 REG_MSR_RMW(MSR_PP1_POWER_LIMIT, ~(0x7f << 17), 0),
82 REG_MSR_WRITE(MSR_PKG_TURBO_CFG1, 0x702),
83 REG_MSR_WRITE(MSR_CPU_TURBO_WKLD_CFG1, 0x200b),
84 REG_MSR_WRITE(MSR_CPU_TURBO_WKLD_CFG2, 0),
85 REG_MSR_WRITE(MSR_CPU_THERM_CFG1, 0x00000305),
86 REG_MSR_WRITE(MSR_CPU_THERM_CFG2, 0x0405500d),
87 REG_MSR_WRITE(MSR_CPU_THERM_SENS_CFG, 0x27),
88 REG_SCRIPT_END
89};
Aaron Durbin7837be62013-10-21 22:32:00 -050090
Aaron Durbinb04bb652016-05-03 11:12:52 -050091static void pre_mp_init(void)
92{
93 uint32_t bsmrwac;
94
95 /* Set up MTRRs based on physical address size. */
96 x86_setup_mtrrs_with_detect();
97 x86_mtrr_check();
98
99 /*
Angel Pons26b49cc2020-07-07 17:17:51 +0200100 * Configure the BUNIT to allow dirty cache line evictions in non-SMM mode for lines
101 * that were dirtied while in SMM mode. Otherwise the writes would be silently dropped.
Aaron Durbinb04bb652016-05-03 11:12:52 -0500102 */
103 bsmrwac = iosf_bunit_read(BUNIT_SMRWAC) | SAI_IA_UNTRUSTED;
104 iosf_bunit_write(BUNIT_SMRWAC, bsmrwac);
105
106 /* Set package MSRs */
107 reg_script_run(package_msr_script);
108
109 /* Enable Turbo Mode on BSP and siblings of the BSP's building block. */
110 enable_turbo();
Aaron Durbin7837be62013-10-21 22:32:00 -0500111}
112
Aaron Durbinb04bb652016-05-03 11:12:52 -0500113static int get_cpu_count(void)
114{
115 const struct pattrs *pattrs = pattrs_get();
116
117 return pattrs->num_cpus;
118}
119
Kyösti Mälkki568a42a2019-08-14 06:48:28 +0300120static void fill_in_relocation_params(struct smm_relocation_params *params)
121{
122 uintptr_t tseg_base;
123 size_t tseg_size;
124
125 /* All range registers are aligned to 4KiB */
126 const u32 rmask = ~((1 << 12) - 1);
127
128 smm_region(&tseg_base, &tseg_size);
129
130 /* SMRR has 32-bits of valid address aligned to 4KiB. */
131 params->smrr_base.lo = (tseg_base & rmask) | MTRR_TYPE_WRBACK;
132 params->smrr_base.hi = 0;
133 params->smrr_mask.lo = (~(tseg_size - 1) & rmask) | MTRR_PHYS_MASK_VALID;
134 params->smrr_mask.hi = 0;
135}
136
Aaron Durbinb04bb652016-05-03 11:12:52 -0500137static void get_smm_info(uintptr_t *perm_smbase, size_t *perm_smsize,
138 size_t *smm_save_state_size)
139{
Kyösti Mälkki568a42a2019-08-14 06:48:28 +0300140 printk(BIOS_DEBUG, "Setting up SMI for CPU\n");
Aaron Durbinb04bb652016-05-03 11:12:52 -0500141
Kyösti Mälkki568a42a2019-08-14 06:48:28 +0300142 fill_in_relocation_params(&smm_reloc_params);
Aaron Durbinb04bb652016-05-03 11:12:52 -0500143
Kyösti Mälkki568a42a2019-08-14 06:48:28 +0300144 smm_subregion(SMM_SUBREGION_HANDLER, perm_smbase, perm_smsize);
145
Aaron Durbinb04bb652016-05-03 11:12:52 -0500146 *smm_save_state_size = sizeof(em64t100_smm_state_save_area_t);
147}
148
Aaron Durbinb04bb652016-05-03 11:12:52 -0500149static void get_microcode_info(const void **microcode, int *parallel)
150{
151 const struct pattrs *pattrs = pattrs_get();
152
153 *microcode = pattrs->microcode_patch;
Patrick Rudolphce51b342021-01-11 09:21:58 +0100154 *parallel = !intel_ht_supported();
Aaron Durbinb04bb652016-05-03 11:12:52 -0500155}
156
157static void per_cpu_smm_trigger(void)
158{
159 const struct pattrs *pattrs = pattrs_get();
160
161 /* Relocate SMM space. */
162 smm_initiate_relocation();
163
164 /* Load microcode after SMM relocation. */
165 intel_microcode_load_unlocked(pattrs->microcode_patch);
166}
167
Angel Ponsb046bfa2020-07-07 17:36:08 +0200168static void relocation_handler(int cpu, uintptr_t curr_smbase, uintptr_t staggered_smbase)
Aaron Durbin7837be62013-10-21 22:32:00 -0500169{
Kyösti Mälkki568a42a2019-08-14 06:48:28 +0300170 struct smm_relocation_params *relo_params = &smm_reloc_params;
Aaron Durbin7837be62013-10-21 22:32:00 -0500171 em64t100_smm_state_save_area_t *smm_state;
Aaron Durbin7837be62013-10-21 22:32:00 -0500172
173 /* Set up SMRR. */
Kyösti Mälkki568a42a2019-08-14 06:48:28 +0300174 wrmsr(IA32_SMRR_PHYS_BASE, relo_params->smrr_base);
175 wrmsr(IA32_SMRR_PHYS_MASK, relo_params->smrr_mask);
Aaron Durbin7837be62013-10-21 22:32:00 -0500176
Aaron Durbinb04bb652016-05-03 11:12:52 -0500177 smm_state = (void *)(SMM_EM64T100_SAVE_STATE_OFFSET + curr_smbase);
178 smm_state->smbase = staggered_smbase;
Aaron Durbin7837be62013-10-21 22:32:00 -0500179}
180
Kyösti Mälkki0778c862020-06-10 12:44:03 +0300181static void post_mp_init(void)
182{
183 global_smi_enable();
184}
185
Aaron Durbinb04bb652016-05-03 11:12:52 -0500186static const struct mp_ops mp_ops = {
Angel Ponsb046bfa2020-07-07 17:36:08 +0200187 .pre_mp_init = pre_mp_init,
188 .get_cpu_count = get_cpu_count,
189 .get_smm_info = get_smm_info,
190 .get_microcode_info = get_microcode_info,
191 .pre_mp_smm_init = smm_southbridge_clear_state,
Aaron Durbinb04bb652016-05-03 11:12:52 -0500192 .per_cpu_smm_trigger = per_cpu_smm_trigger,
Angel Ponsb046bfa2020-07-07 17:36:08 +0200193 .relocation_handler = relocation_handler,
194 .post_mp_init = post_mp_init,
Aaron Durbinb04bb652016-05-03 11:12:52 -0500195};
196
Felix Held37e160e2021-10-20 23:43:12 +0200197void mp_init_cpus(struct bus *cpu_bus)
Aaron Durbin7837be62013-10-21 22:32:00 -0500198{
Felix Held4dd7d112021-10-20 23:31:43 +0200199 /* TODO: Handle mp_init_with_smm failure? */
200 mp_init_with_smm(cpu_bus, &mp_ops);
Aaron Durbin7837be62013-10-21 22:32:00 -0500201}