blob: 8754e4295c2a264fbb0b638dab847b74d8ae9f3b [file] [log] [blame]
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -07001/*
2 * This file is part of the coreboot project.
3 *
4 * Copyright (C) 2011 Google Inc.
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; version 2 of the License.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -070014 */
15
16#include <console/console.h>
17#include <console/usb.h>
18#include <bootmode.h>
19#include <string.h>
20#include <arch/io.h>
21#include <cbmem.h>
22#include <arch/cbfs.h>
23#include <cbfs.h>
24#include <ip_checksum.h>
25#include <pc80/mc146818rtc.h>
26#include <device/pci_def.h>
Alexander Couzens81c5c762016-03-09 03:13:45 +010027#include <northbridge/intel/common/mrc_cache.h>
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -070028#include <halt.h>
Vladimir Serbinenkoffbb3c02016-02-10 01:36:25 +010029#include <timestamp.h>
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -070030#include "raminit.h"
31#include "pei_data.h"
32#include "sandybridge.h"
33
34/* Management Engine is in the southbridge */
35#include "southbridge/intel/bd82x6x/me.h"
36
37/*
38 * MRC scrambler seed offsets should be reserved in
39 * mainboard cmos.layout and not covered by checksum.
40 */
41#if CONFIG_USE_OPTION_TABLE
42#include "option_table.h"
43#define CMOS_OFFSET_MRC_SEED (CMOS_VSTART_mrc_scrambler_seed >> 3)
44#define CMOS_OFFSET_MRC_SEED_S3 (CMOS_VSTART_mrc_scrambler_seed_s3 >> 3)
45#define CMOS_OFFSET_MRC_SEED_CHK (CMOS_VSTART_mrc_scrambler_seed_chk >> 3)
46#else
47#define CMOS_OFFSET_MRC_SEED 152
48#define CMOS_OFFSET_MRC_SEED_S3 156
49#define CMOS_OFFSET_MRC_SEED_CHK 160
50#endif
51
52void save_mrc_data(struct pei_data *pei_data)
53{
54 u16 c1, c2, checksum;
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -070055
56 /* Save the MRC S3 restore data to cbmem */
Patrick Rudolphbb9c90a2016-05-29 17:05:06 +020057 store_current_mrc_cache(pei_data->mrc_output, pei_data->mrc_output_len);
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -070058
59 /* Save the MRC seed values to CMOS */
60 cmos_write32(CMOS_OFFSET_MRC_SEED, pei_data->scrambler_seed);
61 printk(BIOS_DEBUG, "Save scrambler seed 0x%08x to CMOS 0x%02x\n",
62 pei_data->scrambler_seed, CMOS_OFFSET_MRC_SEED);
63
64 cmos_write32(CMOS_OFFSET_MRC_SEED_S3, pei_data->scrambler_seed_s3);
65 printk(BIOS_DEBUG, "Save s3 scrambler seed 0x%08x to CMOS 0x%02x\n",
66 pei_data->scrambler_seed_s3, CMOS_OFFSET_MRC_SEED_S3);
67
68 /* Save a simple checksum of the seed values */
69 c1 = compute_ip_checksum((u8*)&pei_data->scrambler_seed,
70 sizeof(u32));
71 c2 = compute_ip_checksum((u8*)&pei_data->scrambler_seed_s3,
72 sizeof(u32));
73 checksum = add_ip_checksums(sizeof(u32), c1, c2);
74
75 cmos_write(checksum & 0xff, CMOS_OFFSET_MRC_SEED_CHK);
76 cmos_write((checksum >> 8) & 0xff, CMOS_OFFSET_MRC_SEED_CHK+1);
77}
78
79static void prepare_mrc_cache(struct pei_data *pei_data)
80{
81 struct mrc_data_container *mrc_cache;
82 u16 c1, c2, checksum, seed_checksum;
83
84 // preset just in case there is an error
85 pei_data->mrc_input = NULL;
86 pei_data->mrc_input_len = 0;
87
88 /* Read scrambler seeds from CMOS */
89 pei_data->scrambler_seed = cmos_read32(CMOS_OFFSET_MRC_SEED);
90 printk(BIOS_DEBUG, "Read scrambler seed 0x%08x from CMOS 0x%02x\n",
91 pei_data->scrambler_seed, CMOS_OFFSET_MRC_SEED);
92
93 pei_data->scrambler_seed_s3 = cmos_read32(CMOS_OFFSET_MRC_SEED_S3);
94 printk(BIOS_DEBUG, "Read S3 scrambler seed 0x%08x from CMOS 0x%02x\n",
95 pei_data->scrambler_seed_s3, CMOS_OFFSET_MRC_SEED_S3);
96
97 /* Compute seed checksum and compare */
98 c1 = compute_ip_checksum((u8*)&pei_data->scrambler_seed,
99 sizeof(u32));
100 c2 = compute_ip_checksum((u8*)&pei_data->scrambler_seed_s3,
101 sizeof(u32));
102 checksum = add_ip_checksums(sizeof(u32), c1, c2);
103
104 seed_checksum = cmos_read(CMOS_OFFSET_MRC_SEED_CHK);
105 seed_checksum |= cmos_read(CMOS_OFFSET_MRC_SEED_CHK+1) << 8;
106
107 if (checksum != seed_checksum) {
108 printk(BIOS_ERR, "%s: invalid seed checksum\n", __func__);
109 pei_data->scrambler_seed = 0;
110 pei_data->scrambler_seed_s3 = 0;
111 return;
112 }
113
114 if ((mrc_cache = find_current_mrc_cache()) == NULL) {
115 /* error message printed in find_current_mrc_cache */
116 return;
117 }
118
119 pei_data->mrc_input = mrc_cache->mrc_data;
120 pei_data->mrc_input_len = mrc_cache->mrc_data_size;
121
122 printk(BIOS_DEBUG, "%s: at %p, size %x checksum %04x\n",
123 __func__, pei_data->mrc_input,
124 pei_data->mrc_input_len, mrc_cache->mrc_checksum);
125}
126
127static const char* ecc_decoder[] = {
128 "inactive",
129 "active on IO",
130 "disabled on IO",
131 "active"
132};
133
134/*
135 * Dump in the log memory controller configuration as read from the memory
136 * controller registers.
137 */
138static void report_memory_config(void)
139{
140 u32 addr_decoder_common, addr_decode_ch[2];
141 int i;
142
143 addr_decoder_common = MCHBAR32(0x5000);
144 addr_decode_ch[0] = MCHBAR32(0x5004);
145 addr_decode_ch[1] = MCHBAR32(0x5008);
146
147 printk(BIOS_DEBUG, "memcfg DDR3 clock %d MHz\n",
148 (MCHBAR32(0x5e04) * 13333 * 2 + 50)/100);
149 printk(BIOS_DEBUG, "memcfg channel assignment: A: %d, B % d, C % d\n",
150 addr_decoder_common & 3,
151 (addr_decoder_common >> 2) & 3,
152 (addr_decoder_common >> 4) & 3);
153
154 for (i = 0; i < ARRAY_SIZE(addr_decode_ch); i++) {
155 u32 ch_conf = addr_decode_ch[i];
156 printk(BIOS_DEBUG, "memcfg channel[%d] config (%8.8x):\n",
157 i, ch_conf);
158 printk(BIOS_DEBUG, " ECC %s\n",
159 ecc_decoder[(ch_conf >> 24) & 3]);
160 printk(BIOS_DEBUG, " enhanced interleave mode %s\n",
161 ((ch_conf >> 22) & 1) ? "on" : "off");
162 printk(BIOS_DEBUG, " rank interleave %s\n",
163 ((ch_conf >> 21) & 1) ? "on" : "off");
164 printk(BIOS_DEBUG, " DIMMA %d MB width x%d %s rank%s\n",
165 ((ch_conf >> 0) & 0xff) * 256,
166 ((ch_conf >> 19) & 1) ? 16 : 8,
167 ((ch_conf >> 17) & 1) ? "dual" : "single",
168 ((ch_conf >> 16) & 1) ? "" : ", selected");
169 printk(BIOS_DEBUG, " DIMMB %d MB width x%d %s rank%s\n",
170 ((ch_conf >> 8) & 0xff) * 256,
171 ((ch_conf >> 20) & 1) ? 16 : 8,
172 ((ch_conf >> 18) & 1) ? "dual" : "single",
173 ((ch_conf >> 16) & 1) ? ", selected" : "");
174 }
175}
176
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -0700177/**
178 * Find PEI executable in coreboot filesystem and execute it.
179 *
180 * @param pei_data: configuration data for UEFI PEI reference code
181 */
182void sdram_initialize(struct pei_data *pei_data)
183{
184 struct sys_info sysinfo;
185 int (*entry) (struct pei_data *pei_data) __attribute__ ((regparm(1)));
186
187 report_platform_info();
188
189 /* Wait for ME to be ready */
190 intel_early_me_init();
191 intel_early_me_uma_size();
192
193 printk(BIOS_DEBUG, "Starting UEFI PEI System Agent\n");
194
195 memset(&sysinfo, 0, sizeof(sysinfo));
196
197 sysinfo.boot_path = pei_data->boot_mode;
198
199 /*
200 * Do not pass MRC data in for recovery mode boot,
201 * Always pass it in for S3 resume.
202 */
203 if (!recovery_mode_enabled() || pei_data->boot_mode == 2)
204 prepare_mrc_cache(pei_data);
205
206 /* If MRC data is not found we cannot continue S3 resume. */
207 if (pei_data->boot_mode == 2 && !pei_data->mrc_input) {
208 printk(BIOS_DEBUG, "Giving up in sdram_initialize: No MRC data\n");
209 outb(0x6, 0xcf9);
210 halt();
211 }
212
213 /* Pass console handler in pei_data */
214 pei_data->tx_byte = do_putchar;
215
216 /* Locate and call UEFI System Agent binary. */
217 entry = cbfs_boot_map_with_leak("mrc.bin", CBFS_TYPE_MRC, NULL);
218 if (entry) {
219 int rv;
220 rv = entry (pei_data);
221 if (rv) {
222 switch (rv) {
223 case -1:
224 printk(BIOS_ERR, "PEI version mismatch.\n");
225 break;
226 case -2:
227 printk(BIOS_ERR, "Invalid memory frequency.\n");
228 break;
229 default:
230 printk(BIOS_ERR, "MRC returned %x.\n", rv);
231 }
232 die("Nonzero MRC return value.\n");
233 }
234 } else {
235 die("UEFI PEI System Agent not found.\n");
236 }
237
238#if CONFIG_USBDEBUG_IN_ROMSTAGE
239 /* mrc.bin reconfigures USB, so reinit it to have debug */
240 usbdebug_init();
241#endif
242
243 /* For reference print the System Agent version
244 * after executing the UEFI PEI stage.
245 */
246 u32 version = MCHBAR32(0x5034);
247 printk(BIOS_DEBUG, "System Agent Version %d.%d.%d Build %d\n",
248 version >> 24 , (version >> 16) & 0xff,
249 (version >> 8) & 0xff, version & 0xff);
250
251 /* Send ME init done for SandyBridge here. This is done
252 * inside the SystemAgent binary on IvyBridge. */
253 if (BASE_REV_SNB ==
254 (pci_read_config16(PCI_CPU_DEVICE, PCI_DEVICE_ID) & BASE_REV_MASK))
255 intel_early_me_init_done(ME_INIT_STATUS_SUCCESS);
256 else
257 intel_early_me_status();
258
Alexandru Gagniucecf2eb42015-09-28 21:39:12 -0700259 report_memory_config();
260}
Vladimir Serbinenkoffbb3c02016-02-10 01:36:25 +0100261
262void perform_raminit(int s3resume)
263{
264 int cbmem_was_initted;
265 struct pei_data pei_data;
266
267 /* Prepare USB controller early in S3 resume */
268 if (!mainboard_should_reset_usb(s3resume))
269 enable_usb_bar();
270
271 mainboard_fill_pei_data(&pei_data);
272
273 post_code(0x3a);
274 pei_data.boot_mode = s3resume ? 2 : 0;
275 timestamp_add_now(TS_BEFORE_INITRAM);
276 sdram_initialize(&pei_data);
277 cbmem_was_initted = !cbmem_recovery(s3resume);
278 if (!s3resume)
279 save_mrc_data(&pei_data);
280
281 if (s3resume && !cbmem_was_initted) {
282 /* Failed S3 resume, reset to come up cleanly */
283 outb(0x6, 0xcf9);
284 halt();
285 }
286}