blob: b8a2c8ceb558ee182c74462b792cc0c76a18d5c9 [file] [log] [blame]
Angel Ponsf5627e82020-04-05 15:46:52 +02001/* SPDX-License-Identifier: GPL-2.0-only */
Pratik Prajapati01eda282017-08-17 21:09:45 -07002
3#include <console/console.h>
4#include <device/pci.h>
Pratik Prajapati01eda282017-08-17 21:09:45 -07005#include <cpu/x86/mp.h>
Elyes HAOUAS419bfbc2018-10-01 08:47:51 +02006#include <cpu/x86/msr.h>
Kyösti Mälkkifaf20d32019-08-14 05:41:41 +03007#include <cpu/intel/smm_reloc.h>
Pratik Prajapati01eda282017-08-17 21:09:45 -07008#include <cpu/intel/turbo.h>
9#include <intelblocks/cpulib.h>
10#include <intelblocks/mp_init.h>
Pratik Prajapati01eda282017-08-17 21:09:45 -070011#include <soc/cpu.h>
12#include <soc/msr.h>
13#include <soc/pci_devs.h>
Sumeet Pawnikarc896e92e2019-01-08 19:52:54 +053014#include <soc/systemagent.h>
Ronak Kanabar69a95652019-02-19 20:10:23 +053015#include <cpu/x86/mtrr.h>
16#include <cpu/intel/microcode.h>
Ronak Kanabara432f382019-03-16 21:26:43 +053017#include <cpu/intel/common/common.h>
Felix Heldd27ef5b2021-10-20 20:18:12 +020018#include <types.h>
Sumeet Pawnikarc896e92e2019-01-08 19:52:54 +053019
Elyes HAOUASc3385072019-03-21 15:38:06 +010020#include "chip.h"
21
Subrata Banik56ab8e22022-01-07 13:40:19 +000022bool cpu_soc_is_in_untrusted_mode(void)
23{
24 msr_t msr;
25
26 msr = rdmsr(MSR_BIOS_DONE);
27 return !!(msr.lo & ENABLE_IA_UNTRUSTED);
28}
29
Subrata Banik37a55d12022-05-30 18:11:12 +000030void cpu_soc_bios_done(void)
31{
32 msr_t msr;
33
34 msr = rdmsr(MSR_BIOS_DONE);
35 msr.lo |= ENABLE_IA_UNTRUSTED;
36 wrmsr(MSR_BIOS_DONE, msr);
37}
38
Pratik Prajapati01eda282017-08-17 21:09:45 -070039static void soc_fsp_load(void)
40{
Kyösti Mälkkicc93c6e2021-01-09 22:53:52 +020041 fsps_load();
Pratik Prajapati01eda282017-08-17 21:09:45 -070042}
43
Pratik Prajapati01eda282017-08-17 21:09:45 -070044static void configure_misc(void)
45{
Pratik Prajapati01eda282017-08-17 21:09:45 -070046 msr_t msr;
47
Angel Ponsbda02b02020-09-28 01:10:40 +020048 config_t *conf = config_of_soc();
49
Pratik Prajapati01eda282017-08-17 21:09:45 -070050 msr = rdmsr(IA32_MISC_ENABLE);
51 msr.lo |= (1 << 0); /* Fast String enable */
52 msr.lo |= (1 << 3); /* TM1/TM2/EMTTM enable */
Matt Delco54e98942020-03-09 12:41:09 -070053 wrmsr(IA32_MISC_ENABLE, msr);
54
Subrata Banik6d569162019-04-10 12:19:27 +053055 /* Set EIST status */
56 cpu_set_eist(conf->eist_enable);
Pratik Prajapati01eda282017-08-17 21:09:45 -070057
58 /* Disable Thermal interrupts */
59 msr.lo = 0;
60 msr.hi = 0;
61 wrmsr(IA32_THERM_INTERRUPT, msr);
62
63 /* Enable package critical interrupt only */
64 msr.lo = 1 << 4;
65 msr.hi = 0;
66 wrmsr(IA32_PACKAGE_THERM_INTERRUPT, msr);
67
68 /* Enable PROCHOT */
69 msr = rdmsr(MSR_POWER_CTL);
Angel Pons4d794bd2021-10-11 14:00:54 +020070 msr.lo |= (1 << 0); /* Enable Bi-directional PROCHOT as an input */
Angel Ponsa0f8dc32021-10-11 14:01:55 +020071 msr.lo |= (1 << 18); /* Enable Energy/Performance Bias control */
Pratik Prajapati01eda282017-08-17 21:09:45 -070072 msr.lo |= (1 << 23); /* Lock it */
73 wrmsr(MSR_POWER_CTL, msr);
74}
75
Nico Huber234e7ec2021-07-27 10:26:31 +000076static void configure_c_states(const config_t *const cfg)
Pratik Prajapati01eda282017-08-17 21:09:45 -070077{
78 msr_t msr;
79
Nico Huber234e7ec2021-07-27 10:26:31 +000080 msr = rdmsr(MSR_PKG_CST_CONFIG_CONTROL);
81 if (cfg->max_package_c_state && (msr.lo & 0xf) >= cfg->max_package_c_state) {
82 msr.lo = (msr.lo & ~0xf) | ((cfg->max_package_c_state - 1) & 0xf);
Nico Huber234e7ec2021-07-27 10:26:31 +000083 }
Angel Pons0c7a2502021-10-11 13:53:15 +020084 msr.lo |= CST_CFG_LOCK_MASK;
85 wrmsr(MSR_PKG_CST_CONFIG_CONTROL, msr);
Nico Huber234e7ec2021-07-27 10:26:31 +000086
Nico Huber327c04a2021-07-26 13:34:59 +000087 /* C-state Interrupt Response Latency Control 0 - package C3 latency */
88 msr.hi = 0;
89 msr.lo = IRTL_VALID | IRTL_1024_NS | C_STATE_LATENCY_CONTROL_0_LIMIT;
90 wrmsr(MSR_C_STATE_LATENCY_CONTROL_0, msr);
91
Pratik Prajapati01eda282017-08-17 21:09:45 -070092 /* C-state Interrupt Response Latency Control 1 - package C6/C7 short */
93 msr.hi = 0;
Nico Huber327c04a2021-07-26 13:34:59 +000094 msr.lo = IRTL_VALID | IRTL_1024_NS | C_STATE_LATENCY_CONTROL_1_LIMIT;
Pratik Prajapati01eda282017-08-17 21:09:45 -070095 wrmsr(MSR_C_STATE_LATENCY_CONTROL_1, msr);
96
97 /* C-state Interrupt Response Latency Control 2 - package C6/C7 long */
98 msr.hi = 0;
Nico Huber327c04a2021-07-26 13:34:59 +000099 msr.lo = IRTL_VALID | IRTL_1024_NS | C_STATE_LATENCY_CONTROL_2_LIMIT;
Pratik Prajapati01eda282017-08-17 21:09:45 -0700100 wrmsr(MSR_C_STATE_LATENCY_CONTROL_2, msr);
101
102 /* C-state Interrupt Response Latency Control 3 - package C8 */
103 msr.hi = 0;
Nico Huberad5b8b82021-07-26 13:43:24 +0000104 msr.lo = IRTL_VALID | IRTL_1024_NS | C_STATE_LATENCY_CONTROL_3_LIMIT;
Pratik Prajapati01eda282017-08-17 21:09:45 -0700105 wrmsr(MSR_C_STATE_LATENCY_CONTROL_3, msr);
106
107 /* C-state Interrupt Response Latency Control 4 - package C9 */
108 msr.hi = 0;
Nico Huberad5b8b82021-07-26 13:43:24 +0000109 msr.lo = IRTL_VALID | IRTL_1024_NS | C_STATE_LATENCY_CONTROL_4_LIMIT;
Pratik Prajapati01eda282017-08-17 21:09:45 -0700110 wrmsr(MSR_C_STATE_LATENCY_CONTROL_4, msr);
111
112 /* C-state Interrupt Response Latency Control 5 - package C10 */
113 msr.hi = 0;
Nico Huberad5b8b82021-07-26 13:43:24 +0000114 msr.lo = IRTL_VALID | IRTL_1024_NS | C_STATE_LATENCY_CONTROL_5_LIMIT;
Pratik Prajapati01eda282017-08-17 21:09:45 -0700115 wrmsr(MSR_C_STATE_LATENCY_CONTROL_5, msr);
116}
117
118/* All CPUs including BSP will run the following function. */
Elyes HAOUAS3c8b5d02018-05-27 16:57:24 +0200119void soc_core_init(struct device *cpu)
Pratik Prajapati01eda282017-08-17 21:09:45 -0700120{
Patrick Rudolphe9b08302021-02-16 11:52:38 +0100121 config_t *cfg = config_of_soc();
122
Pratik Prajapati01eda282017-08-17 21:09:45 -0700123 /* Clear out pending MCEs */
Pratik Prajapati2ad1ddb2017-08-28 12:28:24 -0700124 /* TODO(adurbin): This should only be done on a cold boot. Also, some
125 * of these banks are core vs package scope. For now every CPU clears
126 * every bank. */
Subrata Banikf91344c2019-05-06 19:23:26 +0530127 mca_configure();
Pratik Prajapati01eda282017-08-17 21:09:45 -0700128
Pratik Prajapati01eda282017-08-17 21:09:45 -0700129 enable_lapic_tpr();
Pratik Prajapati01eda282017-08-17 21:09:45 -0700130
131 /* Configure c-state interrupt response time */
Nico Huber234e7ec2021-07-27 10:26:31 +0000132 configure_c_states(cfg);
Pratik Prajapati01eda282017-08-17 21:09:45 -0700133
134 /* Configure Enhanced SpeedStep and Thermal Sensors */
135 configure_misc();
136
Michael Niewöhner5611cfd2020-10-11 13:04:02 +0200137 set_aesni_lock();
138
Lijian Zhao0f5d7b92018-10-05 10:31:11 -0700139 enable_pm_timer_emulation();
140
Pratik Prajapati01eda282017-08-17 21:09:45 -0700141 /* Enable Direct Cache Access */
142 configure_dca_cap();
143
144 /* Set energy policy */
145 set_energy_perf_bias(ENERGY_POLICY_NORMAL);
146
Patrick Rudolphe9b08302021-02-16 11:52:38 +0100147 if (cfg->cpu_turbo_disable)
148 disable_turbo();
149 else
150 enable_turbo();
Ronak Kanabara432f382019-03-16 21:26:43 +0530151
152 /* Enable Vmx */
Angel Pons67d06722022-01-31 17:41:29 +0100153 set_feature_ctrl_vmx_arg(CONFIG(ENABLE_VMX) && !cfg->disable_vmx);
154 set_feature_ctrl_lock();
Lijian Zhaof0eb9992017-09-14 14:51:12 -0700155}
Pratik Prajapati01eda282017-08-17 21:09:45 -0700156
Lijian Zhaof0eb9992017-09-14 14:51:12 -0700157static void per_cpu_smm_trigger(void)
158{
159 /* Relocate the SMM handler. */
160 smm_relocate();
Pratik Prajapati01eda282017-08-17 21:09:45 -0700161}
162
Angel Pons1b8e65d2021-02-19 18:29:58 +0100163void smm_lock(void)
164{
165 struct device *sa_dev = pcidev_path_on_root(SA_DEVFN_ROOT);
166 /*
167 * LOCK the SMM memory window and enable normal SMM.
168 * After running this function, only a full reset can
169 * make the SMM registers writable again.
170 */
171 printk(BIOS_DEBUG, "Locking SMM.\n");
172 pci_write_config8(sa_dev, SMRAM, D_LCK | G_SMRAME | C_BASE_SEG);
173}
174
Pratik Prajapati01eda282017-08-17 21:09:45 -0700175static void post_mp_init(void)
176{
177 /* Set Max Ratio */
178 cpu_set_max_ratio();
Lijian Zhaof0eb9992017-09-14 14:51:12 -0700179
180 /*
181 * Now that all APs have been relocated as well as the BSP let SMIs
182 * start flowing.
183 */
Kyösti Mälkki040c5312020-05-31 20:03:11 +0300184 global_smi_enable_no_pwrbtn();
Lijian Zhaof0eb9992017-09-14 14:51:12 -0700185
186 /* Lock down the SMRAM space. */
187 smm_lock();
Pratik Prajapati01eda282017-08-17 21:09:45 -0700188}
189
190static const struct mp_ops mp_ops = {
191 /*
192 * Skip Pre MP init MTRR programming as MTRRs are mirrored from BSP,
193 * that are set prior to ramstage.
194 * Real MTRRs programming are being done after resource allocation.
195 */
196 .pre_mp_init = soc_fsp_load,
197 .get_cpu_count = get_cpu_count,
Lijian Zhaof0eb9992017-09-14 14:51:12 -0700198 .get_smm_info = smm_info,
Pratik Prajapati01eda282017-08-17 21:09:45 -0700199 .get_microcode_info = get_microcode_info,
Lijian Zhaof0eb9992017-09-14 14:51:12 -0700200 .pre_mp_smm_init = smm_initialize,
201 .per_cpu_smm_trigger = per_cpu_smm_trigger,
202 .relocation_handler = smm_relocation_handler,
Pratik Prajapati01eda282017-08-17 21:09:45 -0700203 .post_mp_init = post_mp_init,
204};
205
Arthur Heymans829e8e62023-01-30 19:09:34 +0100206void mp_init_cpus(struct bus *cpu_bus)
Pratik Prajapati01eda282017-08-17 21:09:45 -0700207{
Felix Held4dd7d112021-10-20 23:31:43 +0200208 /* TODO: Handle mp_init_with_smm failure? */
209 mp_init_with_smm(cpu_bus, &mp_ops);
John Su31269642019-01-10 14:53:26 +0800210
211 /* Thermal throttle activation offset */
Sumeet R Pawnikar360684b2020-06-18 15:56:11 +0530212 configure_tcc_thermal_target();
Pratik Prajapati01eda282017-08-17 21:09:45 -0700213}
Ronak Kanabar69a95652019-02-19 20:10:23 +0530214
215int soc_skip_ucode_update(u32 current_patch_id, u32 new_patch_id)
216{
217 msr_t msr1;
218 msr_t msr2;
219
220 /*
Ronak Kanabar69a95652019-02-19 20:10:23 +0530221 * If PRMRR/SGX is supported the FIT microcode load will set the msr
222 * 0x08b with the Patch revision id one less than the id in the
223 * microcode binary. The PRMRR support is indicated in the MSR
224 * MTRRCAP[12]. If SGX is not enabled, check and avoid reloading the
225 * same microcode during CPU initialization. If SGX is enabled, as
226 * part of SGX BIOS initialization steps, the same microcode needs to
227 * be reloaded after the core PRMRR MSRs are programmed.
228 */
229 msr1 = rdmsr(MTRR_CAP_MSR);
230 msr2 = rdmsr(MSR_PRMRR_PHYS_BASE);
231 if (msr2.lo && (current_patch_id == new_patch_id - 1))
232 return 0;
233
Kyösti Mälkkieadd2512020-06-11 09:52:45 +0300234 return (msr1.lo & MTRR_CAP_PRMRR) &&
Ronak Kanabar69a95652019-02-19 20:10:23 +0530235 (current_patch_id == new_patch_id - 1);
236}