blob: 0490137988c0452a7e4d869e4de821a58ea693eb [file] [log] [blame]
Marshall Dawsona7bfbbe2017-09-13 17:24:53 -06001/*
2 * This file is part of the coreboot project.
3 *
4 * Copyright (C) 2015-2016 Intel Corp.
5 * Copyright (C) 2017 Advanced Micro Devices, Inc.
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; version 2 of the License.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 */
16
Marshall Dawsonb6172112017-09-13 17:47:31 -060017#include <cpu/cpu.h>
Marshall Dawsona7bfbbe2017-09-13 17:24:53 -060018#include <cpu/x86/mp.h>
19#include <cpu/x86/mtrr.h>
Marshall Dawsonb6172112017-09-13 17:47:31 -060020#include <cpu/x86/msr.h>
21#include <cpu/amd/amdfam15.h>
Marshall Dawsona7bfbbe2017-09-13 17:24:53 -060022#include <device/device.h>
23#include <soc/pci_devs.h>
24#include <soc/cpu.h>
25#include <soc/northbridge.h>
Marshall Dawsonb6172112017-09-13 17:47:31 -060026#include <soc/smi.h>
Marshall Dawsona7bfbbe2017-09-13 17:24:53 -060027#include <console/console.h>
28
29/*
Marshall Dawsonb6172112017-09-13 17:47:31 -060030 * MP and SMM loading initialization.
31 */
32struct smm_relocation_attrs {
33 uint32_t smbase;
34 uint32_t tseg_base;
35 uint32_t tseg_mask;
36};
37
38static struct smm_relocation_attrs relo_attrs;
39
40/*
Marshall Dawsona7bfbbe2017-09-13 17:24:53 -060041 * Do essential initialization tasks before APs can be fired up -
42 *
43 * 1. Prevent race condition in MTRR solution. Enable MTRRs on the BSP. This
44 * creates the MTRR solution that the APs will use. Otherwise APs will try to
45 * apply the incomplete solution as the BSP is calculating it.
46 */
47static void pre_mp_init(void)
48{
49 x86_setup_mtrrs_with_detect();
50 x86_mtrr_check();
51}
52
53static int get_cpu_count(void)
54{
55 device_t nb = dev_find_slot(0, HT_DEVFN);
56 return (pci_read_config16(nb, D18F0_CPU_CNT) & CPU_CNT_MASK) + 1;
57}
58
Marshall Dawsonb6172112017-09-13 17:47:31 -060059static void get_smm_info(uintptr_t *perm_smbase, size_t *perm_smsize,
60 size_t *smm_save_state_size)
61{
62 void *smm_base;
63 size_t smm_size;
64 void *handler_base;
65 size_t handler_size;
66
67 /* Initialize global tracking state. */
68 smm_region_info(&smm_base, &smm_size);
69 smm_subregion(SMM_SUBREGION_HANDLER, &handler_base, &handler_size);
70
71 relo_attrs.smbase = (uint32_t)smm_base;
72 relo_attrs.tseg_base = relo_attrs.smbase;
73 relo_attrs.tseg_mask = ALIGN_DOWN(~(smm_size - 1), 128 * KiB);
74 relo_attrs.tseg_mask |= SMM_TSEG_WB | SMM_TSEG_VALID;
75
76 *perm_smbase = (uintptr_t)handler_base;
77 *perm_smsize = handler_size;
78 *smm_save_state_size = sizeof(amd64_smm_state_save_area_t);
79}
80
81static void relocation_handler(int cpu, uintptr_t curr_smbase,
82 uintptr_t staggered_smbase)
83{
84 msr_t tseg_base, tseg_mask;
85 amd64_smm_state_save_area_t *smm_state;
86
87 tseg_base.lo = relo_attrs.tseg_base;
88 tseg_base.hi = 0;
89 wrmsr(MSR_TSEG_BASE, tseg_base);
90 tseg_mask.lo = relo_attrs.tseg_mask;
91 tseg_mask.hi = ((1 << (cpu_phys_address_size() - 32)) - 1);
92 wrmsr(MSR_SMM_MASK, tseg_mask);
93 smm_state = (void *)(SMM_AMD64_SAVE_STATE_OFFSET + curr_smbase);
94 smm_state->smbase = staggered_smbase;
95}
96
Marshall Dawsona7bfbbe2017-09-13 17:24:53 -060097static const struct mp_ops mp_ops = {
98 .pre_mp_init = pre_mp_init,
99 .get_cpu_count = get_cpu_count,
Marshall Dawsonb6172112017-09-13 17:47:31 -0600100 .get_smm_info = get_smm_info,
101 .relocation_handler = relocation_handler,
102 .post_mp_init = enable_smi_generation,
Marshall Dawsona7bfbbe2017-09-13 17:24:53 -0600103};
104
105void stoney_init_cpus(struct device *dev)
106{
107 /* Clear for take-off */
108 if (mp_init_with_smm(dev->link_list, &mp_ops) < 0)
109 printk(BIOS_ERR, "MP initialization failure.\n");
110}