2016-07-20 15:56:58 +02:00
|
|
|
/** @file
|
|
|
|
Common header file for MP Initialize Library.
|
|
|
|
|
2020-01-03 08:11:51 +01:00
|
|
|
Copyright (c) 2016 - 2020, Intel Corporation. All rights reserved.<BR>
|
2019-04-04 01:07:22 +02:00
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
2016-07-20 15:56:58 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#ifndef _MP_LIB_H_
|
|
|
|
#define _MP_LIB_H_
|
|
|
|
|
|
|
|
#include <PiPei.h>
|
|
|
|
|
2019-08-01 11:58:31 +02:00
|
|
|
#include <Register/Intel/Cpuid.h>
|
|
|
|
#include <Register/Intel/Msr.h>
|
|
|
|
#include <Register/Intel/LocalApic.h>
|
|
|
|
#include <Register/Intel/Microcode.h>
|
2016-07-20 15:56:58 +02:00
|
|
|
|
|
|
|
#include <Library/MpInitLib.h>
|
|
|
|
#include <Library/BaseLib.h>
|
|
|
|
#include <Library/BaseMemoryLib.h>
|
|
|
|
#include <Library/MemoryAllocationLib.h>
|
|
|
|
#include <Library/DebugLib.h>
|
|
|
|
#include <Library/LocalApicLib.h>
|
|
|
|
#include <Library/CpuLib.h>
|
|
|
|
#include <Library/UefiCpuLib.h>
|
|
|
|
#include <Library/TimerLib.h>
|
|
|
|
#include <Library/SynchronizationLib.h>
|
|
|
|
#include <Library/MtrrLib.h>
|
|
|
|
#include <Library/HobLib.h>
|
|
|
|
|
UefiCpuPkg/MpInitLib: Not pass microcode info between archs in CPU_MP_DATA
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2465
Commit 89164babec:
UefiCpuPkg/MpInitLib: don't shadow the microcode patch twice.
attempted to use 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
fields to avoid loading the microcode patches data into memory again in
the DXE phase.
However, the CPU_MP_DATA structure has members with type 'UINTN' or
pointer before the microcode patch related fields. This may cause issues
when PEI and DXE are of different archs (e.g. PEI - IA32, DXE - x64),
since the microcode patch related fields will have different offsets in
the CPU_MP_DATA structure.
Commit 88bd066166:
UefiCpuPkg/MpInitLib: Relocate microcode patch fields in CPU_MP_DATA
tried to resolve the above-mentioned issue by relocating the fields
'MicrocodePatchRegionSize' and 'MicrocodePatchAddress' before members with
different size between different archs. But it failed to take the case of
pre-built binaries (e.g. FSP) into consideration.
Binaries can be built when the code base had a different version of the
CPU_MP_DATA structure definition. This may cause issues when accessing
these microcode patch related fields, since their offsets are different
(between PEI phase in the binaries and DXE phase in current code
implementation).
This commit will use the newly introduced EDKII microcode patch HOB
instead for the DXE phase to get the information of the loaded microcode
patches data done in the PEI phase. And the 'MicrocodePatchRegionSize' and
'MicrocodePatchAddress' fields in CPU_MP_DATA will not be used to pass
information between phases.
For pre-built binaries, they can be classified into 3 types with regard to
the time when they are being built:
A. Before commit 89164babec
(In other words, 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
were not being used to skip microcode load in DXE)
For this case, the EDKII microcode patch HOB will not be produced. This
commit will load the microcode patches data again in DXE. Such behavior is
the same with the code base back then.
B. After commit 89164babec, before commit e1ed55738e
(In other words, 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
being used to skip microcode load in DXE, but failed to work properly
between differnt archs.)
For this case, the EDKII microcode patch HOB will not be produced as well.
This commit will also load the microcode patches data again in DXE.
But since commit 89164babec failed to keep the detection and application
of microcode patches working properly in DXE after skipping the load, we
fall back to the origin behavior (that is to load the microcode patches
data again in DXE).
C. After commit e1ed55738e
(In other words, EDKII microcode patch HOB will be produced.)
For this case, it will have the same behavior with the BIOS built from
the current source codes.
Cc: Michael Kubacki <michael.a.kubacki@intel.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Hao A Wu <hao.a.wu@intel.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ray Ni <ray.ni@intel.com>
2020-01-22 07:02:05 +01:00
|
|
|
#include <Guid/MicrocodePatchHob.h>
|
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
#define WAKEUP_AP_SIGNAL SIGNATURE_32 ('S', 'T', 'A', 'P')
|
|
|
|
|
2016-07-21 10:08:12 +02:00
|
|
|
#define CPU_INIT_MP_LIB_HOB_GUID \
|
|
|
|
{ \
|
|
|
|
0x58eb6a19, 0x3699, 0x4c68, { 0xa8, 0x36, 0xda, 0xcd, 0x8e, 0xdc, 0xad, 0x4a } \
|
|
|
|
}
|
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
//
|
|
|
|
// The MP data for switch BSP
|
|
|
|
//
|
|
|
|
#define CPU_SWITCH_STATE_IDLE 0
|
|
|
|
#define CPU_SWITCH_STATE_STORED 1
|
|
|
|
#define CPU_SWITCH_STATE_LOADED 2
|
|
|
|
|
2019-12-19 07:33:44 +01:00
|
|
|
//
|
|
|
|
// Default maximum number of entries to store the microcode patches information
|
|
|
|
//
|
|
|
|
#define DEFAULT_MAX_MICROCODE_PATCH_NUM 8
|
|
|
|
|
|
|
|
//
|
|
|
|
// Data structure for microcode patch information
|
|
|
|
//
|
|
|
|
typedef struct {
|
|
|
|
UINTN Address;
|
|
|
|
UINTN Size;
|
|
|
|
} MICROCODE_PATCH_INFO;
|
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
//
|
|
|
|
// CPU exchange information for switch BSP
|
|
|
|
//
|
|
|
|
typedef struct {
|
|
|
|
UINT8 State; // offset 0
|
|
|
|
UINTN StackPointer; // offset 4 / 8
|
|
|
|
IA32_DESCRIPTOR Gdtr; // offset 8 / 16
|
|
|
|
IA32_DESCRIPTOR Idtr; // offset 14 / 26
|
|
|
|
} CPU_EXCHANGE_ROLE_INFO;
|
|
|
|
|
2016-07-20 17:32:17 +02:00
|
|
|
//
|
|
|
|
// AP loop state when APs are in idle state
|
|
|
|
// It's value is the same with PcdCpuApLoopMode
|
|
|
|
//
|
|
|
|
typedef enum {
|
|
|
|
ApInHltLoop = 1,
|
|
|
|
ApInMwaitLoop = 2,
|
|
|
|
ApInRunLoop = 3
|
|
|
|
} AP_LOOP_MODE;
|
|
|
|
|
2016-07-20 17:33:25 +02:00
|
|
|
//
|
|
|
|
// AP initialization state during APs wakeup
|
|
|
|
//
|
|
|
|
typedef enum {
|
|
|
|
ApInitConfig = 1,
|
|
|
|
ApInitReconfig = 2,
|
|
|
|
ApInitDone = 3
|
|
|
|
} AP_INIT_STATE;
|
|
|
|
|
2016-07-20 17:43:29 +02:00
|
|
|
//
|
|
|
|
// AP state
|
|
|
|
//
|
2018-07-24 16:25:41 +02:00
|
|
|
// The state transitions for an AP when it process a procedure are:
|
|
|
|
// Idle ----> Ready ----> Busy ----> Idle
|
|
|
|
// [BSP] [AP] [AP]
|
|
|
|
//
|
2016-07-20 17:43:29 +02:00
|
|
|
typedef enum {
|
|
|
|
CpuStateIdle,
|
|
|
|
CpuStateReady,
|
|
|
|
CpuStateBusy,
|
2018-11-02 09:27:48 +01:00
|
|
|
CpuStateFinished,
|
2016-07-20 17:43:29 +02:00
|
|
|
CpuStateDisabled
|
|
|
|
} CPU_STATE;
|
|
|
|
|
2016-07-20 17:47:59 +02:00
|
|
|
//
|
|
|
|
// CPU volatile registers around INIT-SIPI-SIPI
|
|
|
|
//
|
|
|
|
typedef struct {
|
|
|
|
UINTN Cr0;
|
|
|
|
UINTN Cr3;
|
|
|
|
UINTN Cr4;
|
|
|
|
UINTN Dr0;
|
|
|
|
UINTN Dr1;
|
|
|
|
UINTN Dr2;
|
|
|
|
UINTN Dr3;
|
|
|
|
UINTN Dr6;
|
|
|
|
UINTN Dr7;
|
2017-12-07 13:16:29 +01:00
|
|
|
IA32_DESCRIPTOR Gdtr;
|
|
|
|
IA32_DESCRIPTOR Idtr;
|
|
|
|
UINT16 Tr;
|
2016-07-20 17:47:59 +02:00
|
|
|
} CPU_VOLATILE_REGISTERS;
|
|
|
|
|
2016-07-20 17:33:25 +02:00
|
|
|
//
|
|
|
|
// AP related data
|
|
|
|
//
|
|
|
|
typedef struct {
|
|
|
|
SPIN_LOCK ApLock;
|
|
|
|
volatile UINT32 *StartupApSignal;
|
|
|
|
volatile UINTN ApFunction;
|
|
|
|
volatile UINTN ApFunctionArgument;
|
|
|
|
BOOLEAN CpuHealthy;
|
2016-07-20 17:43:29 +02:00
|
|
|
volatile CPU_STATE State;
|
2016-07-20 17:47:59 +02:00
|
|
|
CPU_VOLATILE_REGISTERS VolatileRegisters;
|
2016-07-20 17:33:25 +02:00
|
|
|
BOOLEAN Waiting;
|
|
|
|
BOOLEAN *Finished;
|
|
|
|
UINT64 ExpectedTime;
|
|
|
|
UINT64 CurrentTime;
|
|
|
|
UINT64 TotalTime;
|
|
|
|
EFI_EVENT WaitEvent;
|
2019-12-19 06:36:24 +01:00
|
|
|
UINT32 ProcessorSignature;
|
|
|
|
UINT8 PlatformId;
|
2019-12-23 07:32:49 +01:00
|
|
|
UINT64 MicrocodeEntryAddr;
|
2016-07-20 17:33:25 +02:00
|
|
|
} CPU_AP_DATA;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Basic CPU information saved in Guided HOB.
|
|
|
|
// Because the contents will be shard between PEI and DXE,
|
|
|
|
// we need to make sure the each fields offset same in different
|
|
|
|
// architecture.
|
|
|
|
//
|
UefiCpuPkg/MpInitLib: support 64-bit AP stack addresses
The cached "CPU_INFO_IN_HOB.ApTopOfStack" field currently has type UINT32.
This is not ideal because the AP stacks are located within
"CpuMpData->Buffer", which is allocated with a plain AllocatePages() call
in MpInitLibInitialize():
platform CpuMpPei included PEI RAM > 4GB result
-------- ----------------- ------------- ------
Ia32 * n/a good
Ia32X64 no n/a BAD
Ia32X64 yes n/a good
X64 no * BAD
X64 yes no good
X64 yes yes BAD
- If we are on an Ia32X64 or X64 platform that does not include CpuMpPei,
then CpuDxe cannot reuse the CPU_INFO_IN_HOB structures preallocated by
CpuMpPei (through the CpuInitMpLib GUID HOB), and then AllocatePages()
-- invoked first in 64-bit DXE -- could return an address outside of
32-bit address space.
- If we are on an X64 platform where the permanent PEI RAM extends above
the 32-bit address space, then the same issue can surface even if
CpuMpPei is included: even the original allocation of the
CPU_INFO_IN_HOB structures, by CpuMpPei, could be satisfied from above
4GB.
The original "AP init" branch in "X64/MpFuncs.nasm" correctly considers a
64-bit stack start: the "MP_CPU_EXCHANGE_INFO.StackStart" field has type
UINTN, and the code uses QWORD addition and movement to set RSP from it.
Adapt the "GetApicId" branch of "X64/MpFuncs.nasm":
- change the type of "CPU_INFO_IN_HOB.ApTopOfStack" to UINT64,
- remove the explicit truncation to UINT32 in InitializeApData(),
- update the "GetNextProcNumber" iteration size to the new size of
"CPU_INFO_IN_HOB",
- set RSP with a QWORD movement from "CPU_INFO_IN_HOB.ApTopOfStack".
Because the same CPU_INFO_IN_HOB structure is used by "Ia32/MpFuncs.nasm",
we have to update the "GetNextProcNumber" iteration size there as well.
The ESP setting can be preserved as a DWORD movement from the original
offset (decimal 12), since our integers are little endian.
Cc: Jeff Fan <jeff.fan@intel.com>
Fixes: 845c5be1fd9bf7edfac4a103dfab70829686978f
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jeff Fan <jeff.fan@intel.com>
2016-11-16 23:31:11 +01:00
|
|
|
#pragma pack (1)
|
2016-07-20 17:33:25 +02:00
|
|
|
typedef struct {
|
|
|
|
UINT32 InitialApicId;
|
|
|
|
UINT32 ApicId;
|
|
|
|
UINT32 Health;
|
UefiCpuPkg/MpInitLib: support 64-bit AP stack addresses
The cached "CPU_INFO_IN_HOB.ApTopOfStack" field currently has type UINT32.
This is not ideal because the AP stacks are located within
"CpuMpData->Buffer", which is allocated with a plain AllocatePages() call
in MpInitLibInitialize():
platform CpuMpPei included PEI RAM > 4GB result
-------- ----------------- ------------- ------
Ia32 * n/a good
Ia32X64 no n/a BAD
Ia32X64 yes n/a good
X64 no * BAD
X64 yes no good
X64 yes yes BAD
- If we are on an Ia32X64 or X64 platform that does not include CpuMpPei,
then CpuDxe cannot reuse the CPU_INFO_IN_HOB structures preallocated by
CpuMpPei (through the CpuInitMpLib GUID HOB), and then AllocatePages()
-- invoked first in 64-bit DXE -- could return an address outside of
32-bit address space.
- If we are on an X64 platform where the permanent PEI RAM extends above
the 32-bit address space, then the same issue can surface even if
CpuMpPei is included: even the original allocation of the
CPU_INFO_IN_HOB structures, by CpuMpPei, could be satisfied from above
4GB.
The original "AP init" branch in "X64/MpFuncs.nasm" correctly considers a
64-bit stack start: the "MP_CPU_EXCHANGE_INFO.StackStart" field has type
UINTN, and the code uses QWORD addition and movement to set RSP from it.
Adapt the "GetApicId" branch of "X64/MpFuncs.nasm":
- change the type of "CPU_INFO_IN_HOB.ApTopOfStack" to UINT64,
- remove the explicit truncation to UINT32 in InitializeApData(),
- update the "GetNextProcNumber" iteration size to the new size of
"CPU_INFO_IN_HOB",
- set RSP with a QWORD movement from "CPU_INFO_IN_HOB.ApTopOfStack".
Because the same CPU_INFO_IN_HOB structure is used by "Ia32/MpFuncs.nasm",
we have to update the "GetNextProcNumber" iteration size there as well.
The ESP setting can be preserved as a DWORD movement from the original
offset (decimal 12), since our integers are little endian.
Cc: Jeff Fan <jeff.fan@intel.com>
Fixes: 845c5be1fd9bf7edfac4a103dfab70829686978f
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jeff Fan <jeff.fan@intel.com>
2016-11-16 23:31:11 +01:00
|
|
|
UINT64 ApTopOfStack;
|
2016-07-20 17:33:25 +02:00
|
|
|
} CPU_INFO_IN_HOB;
|
UefiCpuPkg/MpInitLib: support 64-bit AP stack addresses
The cached "CPU_INFO_IN_HOB.ApTopOfStack" field currently has type UINT32.
This is not ideal because the AP stacks are located within
"CpuMpData->Buffer", which is allocated with a plain AllocatePages() call
in MpInitLibInitialize():
platform CpuMpPei included PEI RAM > 4GB result
-------- ----------------- ------------- ------
Ia32 * n/a good
Ia32X64 no n/a BAD
Ia32X64 yes n/a good
X64 no * BAD
X64 yes no good
X64 yes yes BAD
- If we are on an Ia32X64 or X64 platform that does not include CpuMpPei,
then CpuDxe cannot reuse the CPU_INFO_IN_HOB structures preallocated by
CpuMpPei (through the CpuInitMpLib GUID HOB), and then AllocatePages()
-- invoked first in 64-bit DXE -- could return an address outside of
32-bit address space.
- If we are on an X64 platform where the permanent PEI RAM extends above
the 32-bit address space, then the same issue can surface even if
CpuMpPei is included: even the original allocation of the
CPU_INFO_IN_HOB structures, by CpuMpPei, could be satisfied from above
4GB.
The original "AP init" branch in "X64/MpFuncs.nasm" correctly considers a
64-bit stack start: the "MP_CPU_EXCHANGE_INFO.StackStart" field has type
UINTN, and the code uses QWORD addition and movement to set RSP from it.
Adapt the "GetApicId" branch of "X64/MpFuncs.nasm":
- change the type of "CPU_INFO_IN_HOB.ApTopOfStack" to UINT64,
- remove the explicit truncation to UINT32 in InitializeApData(),
- update the "GetNextProcNumber" iteration size to the new size of
"CPU_INFO_IN_HOB",
- set RSP with a QWORD movement from "CPU_INFO_IN_HOB.ApTopOfStack".
Because the same CPU_INFO_IN_HOB structure is used by "Ia32/MpFuncs.nasm",
we have to update the "GetNextProcNumber" iteration size there as well.
The ESP setting can be preserved as a DWORD movement from the original
offset (decimal 12), since our integers are little endian.
Cc: Jeff Fan <jeff.fan@intel.com>
Fixes: 845c5be1fd9bf7edfac4a103dfab70829686978f
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jeff Fan <jeff.fan@intel.com>
2016-11-16 23:31:11 +01:00
|
|
|
#pragma pack ()
|
2016-07-20 17:33:25 +02:00
|
|
|
|
2016-07-20 16:56:09 +02:00
|
|
|
//
|
|
|
|
// AP reset code information including code address and size,
|
|
|
|
// this structure will be shared be C code and assembly code.
|
|
|
|
// It is natural aligned by design.
|
|
|
|
//
|
|
|
|
typedef struct {
|
|
|
|
UINT8 *RendezvousFunnelAddress;
|
|
|
|
UINTN ModeEntryOffset;
|
|
|
|
UINTN RendezvousFunnelSize;
|
|
|
|
UINT8 *RelocateApLoopFuncAddress;
|
|
|
|
UINTN RelocateApLoopFuncSize;
|
2017-12-29 02:12:54 +01:00
|
|
|
UINTN ModeTransitionOffset;
|
2016-07-20 16:56:09 +02:00
|
|
|
} MP_ASSEMBLY_ADDRESS_MAP;
|
2016-07-20 15:56:58 +02:00
|
|
|
|
2016-07-20 17:33:25 +02:00
|
|
|
typedef struct _CPU_MP_DATA CPU_MP_DATA;
|
|
|
|
|
2016-07-20 16:44:39 +02:00
|
|
|
#pragma pack(1)
|
|
|
|
|
|
|
|
//
|
|
|
|
// MP CPU exchange information for AP reset code
|
|
|
|
// This structure is required to be packed because fixed field offsets
|
|
|
|
// into this structure are used in assembly code in this module
|
|
|
|
//
|
|
|
|
typedef struct {
|
|
|
|
UINTN Lock;
|
|
|
|
UINTN StackStart;
|
|
|
|
UINTN StackSize;
|
|
|
|
UINTN CFunction;
|
|
|
|
IA32_DESCRIPTOR GdtrProfile;
|
|
|
|
IA32_DESCRIPTOR IdtrProfile;
|
|
|
|
UINTN BufferStart;
|
|
|
|
UINTN ModeOffset;
|
2017-10-23 08:45:44 +02:00
|
|
|
UINTN ApIndex;
|
2016-07-20 16:44:39 +02:00
|
|
|
UINTN CodeSegment;
|
|
|
|
UINTN DataSegment;
|
2016-07-29 15:13:34 +02:00
|
|
|
UINTN EnableExecuteDisable;
|
2016-07-20 16:44:39 +02:00
|
|
|
UINTN Cr3;
|
2016-11-14 04:09:00 +01:00
|
|
|
UINTN InitFlag;
|
|
|
|
CPU_INFO_IN_HOB *CpuInfo;
|
2017-10-23 09:02:36 +02:00
|
|
|
UINTN NumApsExecuting;
|
2016-07-20 17:33:25 +02:00
|
|
|
CPU_MP_DATA *CpuMpData;
|
2017-05-17 21:19:16 +02:00
|
|
|
UINTN InitializeFloatingPointUnitsAddress;
|
2017-12-29 02:12:54 +01:00
|
|
|
UINT32 ModeTransitionMemory;
|
|
|
|
UINT16 ModeTransitionSegment;
|
|
|
|
UINT32 ModeHighMemory;
|
|
|
|
UINT16 ModeHighSegment;
|
2019-08-01 11:58:24 +02:00
|
|
|
//
|
|
|
|
// Enable5LevelPaging indicates whether 5-level paging is enabled in long mode.
|
|
|
|
//
|
|
|
|
BOOLEAN Enable5LevelPaging;
|
2016-07-20 16:44:39 +02:00
|
|
|
} MP_CPU_EXCHANGE_INFO;
|
|
|
|
|
|
|
|
#pragma pack()
|
2016-07-20 17:33:25 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// CPU MP Data save in memory
|
|
|
|
//
|
|
|
|
struct _CPU_MP_DATA {
|
|
|
|
UINT64 CpuInfoInHob;
|
|
|
|
UINT32 CpuCount;
|
|
|
|
UINT32 BspNumber;
|
|
|
|
//
|
|
|
|
// The above fields data will be passed from PEI to DXE
|
|
|
|
// Please make sure the fields offset same in the different
|
|
|
|
// architecture.
|
|
|
|
//
|
|
|
|
SPIN_LOCK MpLock;
|
|
|
|
UINTN Buffer;
|
|
|
|
UINTN CpuApStackSize;
|
|
|
|
MP_ASSEMBLY_ADDRESS_MAP AddressMap;
|
|
|
|
UINTN WakeupBuffer;
|
2018-01-24 02:36:01 +01:00
|
|
|
UINTN WakeupBufferHigh;
|
2016-07-20 17:33:25 +02:00
|
|
|
UINTN BackupBuffer;
|
|
|
|
UINTN BackupBufferSize;
|
|
|
|
|
|
|
|
volatile UINT32 FinishedCount;
|
UefiCpuPkg/MpInitLib: Remove StartCount and volatile definition.
The patch includes below changes:
(1) It removes "volatile" from RunningCount, because only the BSP modifies it.
(2) When we detect a timeout in CheckAllAPs(), and collect the list of failed CPUs, the size of the list is derived from the following difference, before the patch:
StartCount - FinishedCount
where "StartCount" is set by the BSP at startup, and FinishedCount is incremented by the APs themselves.
Here the patch replaces this difference with
StartCount - RunningCount
that is, the difference is no more calculated from the BSP's startup counter and the AP's shared finish counter, but from the RunningCount measurement that the BSP does itself, in CheckAllAPs().
(3) Finally, the patch changes the meaning of RunningCount. Before the patch, we have:
- StartCount: the number of APs the BSP stars up,
- RunningCount: the number of finished APs that the BSP collected
After the patch, StartCount is removed, and RunningCount is *redefined* as the following difference:
OLD_StartCount - OLD_RunningCount
Giving the number of APs that the BSP started up but hasn't collected yet.
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ruiyu Ni <ruiyu.ni@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Laszlo Ersek <lersek@redhat.com>
2018-07-24 16:29:53 +02:00
|
|
|
UINT32 RunningCount;
|
2016-07-20 17:33:25 +02:00
|
|
|
BOOLEAN SingleThread;
|
|
|
|
EFI_AP_PROCEDURE Procedure;
|
|
|
|
VOID *ProcArguments;
|
|
|
|
BOOLEAN *Finished;
|
|
|
|
UINT64 ExpectedTime;
|
|
|
|
UINT64 CurrentTime;
|
|
|
|
UINT64 TotalTime;
|
|
|
|
EFI_EVENT WaitEvent;
|
|
|
|
UINTN **FailedCpuList;
|
|
|
|
|
|
|
|
AP_INIT_STATE InitFlag;
|
2016-07-21 15:20:18 +02:00
|
|
|
BOOLEAN SwitchBspFlag;
|
2016-11-14 04:43:26 +01:00
|
|
|
UINTN NewBspNumber;
|
2016-07-21 15:20:18 +02:00
|
|
|
CPU_EXCHANGE_ROLE_INFO BSPInfo;
|
|
|
|
CPU_EXCHANGE_ROLE_INFO APInfo;
|
2016-07-20 17:33:25 +02:00
|
|
|
MTRR_SETTINGS MtrrTable;
|
|
|
|
UINT8 ApLoopMode;
|
|
|
|
UINT8 ApTargetCState;
|
|
|
|
UINT16 PmCodeSegment;
|
|
|
|
CPU_AP_DATA *CpuData;
|
|
|
|
volatile MP_CPU_EXCHANGE_INFO *MpCpuExchangeInfo;
|
2016-12-26 09:44:24 +01:00
|
|
|
|
|
|
|
UINT32 CurrentTimerCount;
|
|
|
|
UINTN DivideValue;
|
|
|
|
UINT8 Vector;
|
|
|
|
BOOLEAN PeriodicMode;
|
|
|
|
BOOLEAN TimerInterruptState;
|
2020-01-16 02:30:12 +01:00
|
|
|
UINT64 MicrocodePatchAddress;
|
|
|
|
UINT64 MicrocodePatchRegionSize;
|
2018-07-11 13:07:28 +02:00
|
|
|
|
2018-06-27 10:42:51 +02:00
|
|
|
//
|
|
|
|
// Whether need to use Init-Sipi-Sipi to wake up the APs.
|
|
|
|
// Two cases need to set this value to TRUE. One is in HLT
|
|
|
|
// loop mode, the other is resume from S3 which loop mode
|
2018-09-05 08:22:18 +02:00
|
|
|
// will be hardcode change to HLT mode by PiSmmCpuDxeSmm
|
2018-06-27 10:42:51 +02:00
|
|
|
// driver.
|
|
|
|
//
|
|
|
|
BOOLEAN WakeUpByInitSipiSipi;
|
2016-07-20 17:33:25 +02:00
|
|
|
};
|
2016-07-21 10:08:12 +02:00
|
|
|
|
|
|
|
extern EFI_GUID mCpuInitMpLibHobGuid;
|
|
|
|
|
2016-07-20 16:47:47 +02:00
|
|
|
/**
|
|
|
|
Assembly code to place AP into safe loop mode.
|
|
|
|
|
|
|
|
Place AP into targeted C-State if MONITOR is supported, otherwise
|
|
|
|
place AP into hlt state.
|
|
|
|
Place AP in protected mode if the current is long mode. Due to AP maybe
|
|
|
|
wakeup by some hardware event. It could avoid accessing page table that
|
|
|
|
may not available during booting to OS.
|
|
|
|
|
|
|
|
@param[in] MwaitSupport TRUE indicates MONITOR is supported.
|
|
|
|
FALSE indicates MONITOR is not supported.
|
|
|
|
@param[in] ApTargetCState Target C-State value.
|
|
|
|
@param[in] PmCodeSegment Protected mode code segment value.
|
|
|
|
**/
|
|
|
|
typedef
|
|
|
|
VOID
|
|
|
|
(EFIAPI * ASM_RELOCATE_AP_LOOP) (
|
|
|
|
IN BOOLEAN MwaitSupport,
|
|
|
|
IN UINTN ApTargetCState,
|
2016-11-23 14:52:24 +01:00
|
|
|
IN UINTN PmCodeSegment,
|
2016-11-25 06:18:57 +01:00
|
|
|
IN UINTN TopOfApStack,
|
|
|
|
IN UINTN NumberToFinish
|
2016-07-20 16:47:47 +02:00
|
|
|
);
|
2016-07-20 16:56:09 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
Assembly code to get starting address and size of the rendezvous entry for APs.
|
|
|
|
Information for fixing a jump instruction in the code is also returned.
|
|
|
|
|
|
|
|
@param[out] AddressMap Output buffer for address map information.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
AsmGetAddressMap (
|
|
|
|
OUT MP_ASSEMBLY_ADDRESS_MAP *AddressMap
|
|
|
|
);
|
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
/**
|
|
|
|
This function is called by both the BSP and the AP which is to become the BSP to
|
|
|
|
Exchange execution context including stack between them. After return from this
|
|
|
|
function, the BSP becomes AP and the AP becomes the BSP.
|
|
|
|
|
|
|
|
@param[in] MyInfo Pointer to buffer holding the exchanging information for the executing processor.
|
|
|
|
@param[in] OthersInfo Pointer to buffer holding the exchanging information for the peer.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
AsmExchangeRole (
|
|
|
|
IN CPU_EXCHANGE_ROLE_INFO *MyInfo,
|
|
|
|
IN CPU_EXCHANGE_ROLE_INFO *OthersInfo
|
|
|
|
);
|
|
|
|
|
2016-07-21 10:08:12 +02:00
|
|
|
/**
|
|
|
|
Get the pointer to CPU MP Data structure.
|
|
|
|
|
|
|
|
@return The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
CPU_MP_DATA *
|
|
|
|
GetCpuMpData (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Save the pointer to CPU MP Data structure.
|
|
|
|
|
|
|
|
@param[in] CpuMpData The pointer to CPU MP Data structure will be saved.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SaveCpuMpData (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
);
|
|
|
|
|
2016-07-24 16:19:09 +02:00
|
|
|
|
|
|
|
/**
|
2017-08-04 04:05:20 +02:00
|
|
|
Get available system memory below 1MB by specified size.
|
2016-07-24 16:19:09 +02:00
|
|
|
|
2017-08-04 04:05:20 +02:00
|
|
|
@param[in] WakeupBufferSize Wakeup buffer size required
|
|
|
|
|
|
|
|
@retval other Return wakeup buffer address below 1MB.
|
|
|
|
@retval -1 Cannot find free memory below 1MB.
|
2016-07-24 16:19:09 +02:00
|
|
|
**/
|
2017-08-04 04:05:20 +02:00
|
|
|
UINTN
|
|
|
|
GetWakeupBuffer (
|
|
|
|
IN UINTN WakeupBufferSize
|
2016-07-24 16:19:09 +02:00
|
|
|
);
|
|
|
|
|
2017-12-29 02:12:54 +01:00
|
|
|
/**
|
|
|
|
Get available EfiBootServicesCode memory below 4GB by specified size.
|
|
|
|
|
|
|
|
This buffer is required to safely transfer AP from real address mode to
|
|
|
|
protected mode or long mode, due to the fact that the buffer returned by
|
|
|
|
GetWakeupBuffer() may be marked as non-executable.
|
|
|
|
|
|
|
|
@param[in] BufferSize Wakeup transition buffer size.
|
|
|
|
|
|
|
|
@retval other Return wakeup transition buffer address below 4GB.
|
|
|
|
@retval 0 Cannot find free memory below 4GB.
|
|
|
|
**/
|
|
|
|
UINTN
|
|
|
|
GetModeTransitionBuffer (
|
|
|
|
IN UINTN BufferSize
|
|
|
|
);
|
|
|
|
|
2016-07-20 18:23:52 +02:00
|
|
|
/**
|
|
|
|
This function will be called by BSP to wakeup AP.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data
|
|
|
|
@param[in] Broadcast TRUE: Send broadcast IPI to all APs
|
|
|
|
FALSE: Send IPI to AP by ApicId
|
|
|
|
@param[in] ProcessorNumber The handle number of specified processor
|
|
|
|
@param[in] Procedure The function to be invoked by AP
|
|
|
|
@param[in] ProcedureArgument The argument to be passed into AP function
|
2018-07-26 10:44:22 +02:00
|
|
|
@param[in] WakeUpDisabledAps Whether need to wake up disabled APs in broadcast mode.
|
2016-07-20 18:23:52 +02:00
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
WakeUpAP (
|
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
|
|
|
IN BOOLEAN Broadcast,
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
IN EFI_AP_PROCEDURE Procedure, OPTIONAL
|
2018-07-26 10:44:22 +02:00
|
|
|
IN VOID *ProcedureArgument, OPTIONAL
|
|
|
|
IN BOOLEAN WakeUpDisabledAps OPTIONAL
|
2016-07-20 18:23:52 +02:00
|
|
|
);
|
|
|
|
|
2016-07-21 10:08:12 +02:00
|
|
|
/**
|
|
|
|
Initialize global data for MP support.
|
|
|
|
|
|
|
|
@param[in] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
InitMpGlobalData (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
);
|
|
|
|
|
2016-07-21 15:33:11 +02:00
|
|
|
/**
|
|
|
|
Worker function to execute a caller provided function on all enabled APs.
|
|
|
|
|
|
|
|
@param[in] Procedure A pointer to the function to be run on
|
|
|
|
enabled APs of the system.
|
|
|
|
@param[in] SingleThread If TRUE, then all the enabled APs execute
|
|
|
|
the function specified by Procedure one by
|
|
|
|
one, in ascending order of processor handle
|
|
|
|
number. If FALSE, then all the enabled APs
|
|
|
|
execute the function specified by Procedure
|
|
|
|
simultaneously.
|
2019-04-10 05:00:43 +02:00
|
|
|
@param[in] ExcludeBsp Whether let BSP also trig this task.
|
2016-07-21 15:33:11 +02:00
|
|
|
@param[in] WaitEvent The event created by the caller with CreateEvent()
|
|
|
|
service.
|
2016-12-13 03:46:28 +01:00
|
|
|
@param[in] TimeoutInMicroseconds Indicates the time limit in microseconds for
|
2016-07-21 15:33:11 +02:00
|
|
|
APs to return from Procedure, either for
|
|
|
|
blocking or non-blocking mode.
|
|
|
|
@param[in] ProcedureArgument The parameter passed into Procedure for
|
|
|
|
all APs.
|
|
|
|
@param[out] FailedCpuList If all APs finish successfully, then its
|
|
|
|
content is set to NULL. If not all APs
|
|
|
|
finish before timeout expires, then its
|
|
|
|
content is set to address of the buffer
|
|
|
|
holding handle numbers of the failed APs.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS In blocking mode, all APs have finished before
|
|
|
|
the timeout expired.
|
|
|
|
@retval EFI_SUCCESS In non-blocking mode, function has been dispatched
|
|
|
|
to all enabled APs.
|
|
|
|
@retval others Failed to Startup all APs.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
2019-04-10 05:00:43 +02:00
|
|
|
StartupAllCPUsWorker (
|
2016-07-21 15:33:11 +02:00
|
|
|
IN EFI_AP_PROCEDURE Procedure,
|
|
|
|
IN BOOLEAN SingleThread,
|
2019-04-10 05:00:43 +02:00
|
|
|
IN BOOLEAN ExcludeBsp,
|
2016-07-21 15:33:11 +02:00
|
|
|
IN EFI_EVENT WaitEvent OPTIONAL,
|
|
|
|
IN UINTN TimeoutInMicroseconds,
|
|
|
|
IN VOID *ProcedureArgument OPTIONAL,
|
|
|
|
OUT UINTN **FailedCpuList OPTIONAL
|
|
|
|
);
|
|
|
|
|
2016-07-21 15:31:47 +02:00
|
|
|
/**
|
|
|
|
Worker function to let the caller get one enabled AP to execute a caller-provided
|
|
|
|
function.
|
|
|
|
|
|
|
|
@param[in] Procedure A pointer to the function to be run on
|
|
|
|
enabled APs of the system.
|
|
|
|
@param[in] ProcessorNumber The handle number of the AP.
|
|
|
|
@param[in] WaitEvent The event created by the caller with CreateEvent()
|
|
|
|
service.
|
2016-12-13 03:46:28 +01:00
|
|
|
@param[in] TimeoutInMicroseconds Indicates the time limit in microseconds for
|
2016-07-21 15:31:47 +02:00
|
|
|
APs to return from Procedure, either for
|
|
|
|
blocking or non-blocking mode.
|
|
|
|
@param[in] ProcedureArgument The parameter passed into Procedure for
|
|
|
|
all APs.
|
|
|
|
@param[out] Finished If AP returns from Procedure before the
|
|
|
|
timeout expires, its content is set to TRUE.
|
|
|
|
Otherwise, the value is set to FALSE.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS In blocking mode, specified AP finished before
|
|
|
|
the timeout expires.
|
|
|
|
@retval others Failed to Startup AP.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
StartupThisAPWorker (
|
|
|
|
IN EFI_AP_PROCEDURE Procedure,
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
IN EFI_EVENT WaitEvent OPTIONAL,
|
|
|
|
IN UINTN TimeoutInMicroseconds,
|
|
|
|
IN VOID *ProcedureArgument OPTIONAL,
|
|
|
|
OUT BOOLEAN *Finished OPTIONAL
|
|
|
|
);
|
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
/**
|
|
|
|
Worker function to switch the requested AP to be the BSP from that point onward.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of AP that is to become the new BSP.
|
|
|
|
@param[in] EnableOldBSP If TRUE, then the old BSP will be listed as an
|
|
|
|
enabled AP. Otherwise, it will be disabled.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS BSP successfully switched.
|
2018-06-27 15:14:20 +02:00
|
|
|
@retval others Failed to switch BSP.
|
2016-07-21 15:20:18 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
SwitchBSPWorker (
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
IN BOOLEAN EnableOldBSP
|
|
|
|
);
|
|
|
|
|
2016-07-21 15:23:05 +02:00
|
|
|
/**
|
|
|
|
Worker function to let the caller enable or disable an AP from this point onward.
|
|
|
|
This service may only be called from the BSP.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of AP.
|
|
|
|
@param[in] EnableAP Specifies the new state for the processor for
|
|
|
|
enabled, FALSE for disabled.
|
|
|
|
@param[in] HealthFlag If not NULL, a pointer to a value that specifies
|
|
|
|
the new health status of the AP.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS The specified AP was enabled or disabled successfully.
|
|
|
|
@retval others Failed to Enable/Disable AP.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EnableDisableApWorker (
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
IN BOOLEAN EnableAP,
|
|
|
|
IN UINT32 *HealthFlag OPTIONAL
|
|
|
|
);
|
|
|
|
|
2016-07-21 10:08:12 +02:00
|
|
|
/**
|
|
|
|
Get pointer to CPU MP Data structure from GUIDed HOB.
|
|
|
|
|
|
|
|
@return The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
CPU_MP_DATA *
|
|
|
|
GetCpuMpDataFromGuidedHob (
|
|
|
|
VOID
|
|
|
|
);
|
2016-07-21 15:28:16 +02:00
|
|
|
|
|
|
|
/** Checks status of specified AP.
|
|
|
|
|
|
|
|
This function checks whether the specified AP has finished the task assigned
|
|
|
|
by StartupThisAP(), and whether timeout expires.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of processor.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Specified AP has finished task assigned by StartupThisAPs().
|
|
|
|
@retval EFI_TIMEOUT The timeout expires.
|
|
|
|
@retval EFI_NOT_READY Specified AP has not finished task and timeout has not expired.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
CheckThisAP (
|
|
|
|
IN UINTN ProcessorNumber
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Checks status of all APs.
|
|
|
|
|
|
|
|
This function checks whether all APs have finished task assigned by StartupAllAPs(),
|
|
|
|
and whether timeout expires.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS All APs have finished task assigned by StartupAllAPs().
|
|
|
|
@retval EFI_TIMEOUT The timeout expires.
|
|
|
|
@retval EFI_NOT_READY APs have not finished task and timeout has not expired.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
CheckAllAPs (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Checks APs status and updates APs status if needed.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
CheckAndUpdateApsStatus (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2016-07-20 17:49:35 +02:00
|
|
|
/**
|
|
|
|
Detect whether specified processor can find matching microcode patch and load it.
|
|
|
|
|
2019-12-23 07:32:49 +01:00
|
|
|
@param[in] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
@param[in] ProcessorNumber The handle number of the processor. The range is
|
|
|
|
from 0 to the total number of logical processors
|
|
|
|
minus 1.
|
2016-07-20 17:49:35 +02:00
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
MicrocodeDetect (
|
2018-07-11 13:07:28 +02:00
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
2019-12-23 07:32:49 +01:00
|
|
|
IN UINTN ProcessorNumber
|
2016-07-20 17:49:35 +02:00
|
|
|
);
|
|
|
|
|
2019-12-19 07:33:44 +01:00
|
|
|
/**
|
2020-01-08 04:22:30 +01:00
|
|
|
Shadow the required microcode patches data into memory.
|
2019-12-19 07:33:44 +01:00
|
|
|
|
|
|
|
@param[in, out] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
VOID
|
2020-01-08 04:22:30 +01:00
|
|
|
ShadowMicrocodeUpdatePatch (
|
2019-12-19 07:33:44 +01:00
|
|
|
IN OUT CPU_MP_DATA *CpuMpData
|
|
|
|
);
|
|
|
|
|
UefiCpuPkg/MpInitLib: Not pass microcode info between archs in CPU_MP_DATA
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2465
Commit 89164babec:
UefiCpuPkg/MpInitLib: don't shadow the microcode patch twice.
attempted to use 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
fields to avoid loading the microcode patches data into memory again in
the DXE phase.
However, the CPU_MP_DATA structure has members with type 'UINTN' or
pointer before the microcode patch related fields. This may cause issues
when PEI and DXE are of different archs (e.g. PEI - IA32, DXE - x64),
since the microcode patch related fields will have different offsets in
the CPU_MP_DATA structure.
Commit 88bd066166:
UefiCpuPkg/MpInitLib: Relocate microcode patch fields in CPU_MP_DATA
tried to resolve the above-mentioned issue by relocating the fields
'MicrocodePatchRegionSize' and 'MicrocodePatchAddress' before members with
different size between different archs. But it failed to take the case of
pre-built binaries (e.g. FSP) into consideration.
Binaries can be built when the code base had a different version of the
CPU_MP_DATA structure definition. This may cause issues when accessing
these microcode patch related fields, since their offsets are different
(between PEI phase in the binaries and DXE phase in current code
implementation).
This commit will use the newly introduced EDKII microcode patch HOB
instead for the DXE phase to get the information of the loaded microcode
patches data done in the PEI phase. And the 'MicrocodePatchRegionSize' and
'MicrocodePatchAddress' fields in CPU_MP_DATA will not be used to pass
information between phases.
For pre-built binaries, they can be classified into 3 types with regard to
the time when they are being built:
A. Before commit 89164babec
(In other words, 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
were not being used to skip microcode load in DXE)
For this case, the EDKII microcode patch HOB will not be produced. This
commit will load the microcode patches data again in DXE. Such behavior is
the same with the code base back then.
B. After commit 89164babec, before commit e1ed55738e
(In other words, 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
being used to skip microcode load in DXE, but failed to work properly
between differnt archs.)
For this case, the EDKII microcode patch HOB will not be produced as well.
This commit will also load the microcode patches data again in DXE.
But since commit 89164babec failed to keep the detection and application
of microcode patches working properly in DXE after skipping the load, we
fall back to the origin behavior (that is to load the microcode patches
data again in DXE).
C. After commit e1ed55738e
(In other words, EDKII microcode patch HOB will be produced.)
For this case, it will have the same behavior with the BIOS built from
the current source codes.
Cc: Michael Kubacki <michael.a.kubacki@intel.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Hao A Wu <hao.a.wu@intel.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ray Ni <ray.ni@intel.com>
2020-01-22 07:02:05 +01:00
|
|
|
/**
|
|
|
|
Get the cached microcode patch base address and size from the microcode patch
|
|
|
|
information cache HOB.
|
|
|
|
|
|
|
|
@param[out] Address Base address of the microcode patches data.
|
|
|
|
It will be updated if the microcode patch
|
|
|
|
information cache HOB is found.
|
|
|
|
@param[out] RegionSize Size of the microcode patches data.
|
|
|
|
It will be updated if the microcode patch
|
|
|
|
information cache HOB is found.
|
|
|
|
|
|
|
|
@retval TRUE The microcode patch information cache HOB is found.
|
|
|
|
@retval FALSE The microcode patch information cache HOB is not found.
|
|
|
|
|
|
|
|
**/
|
|
|
|
BOOLEAN
|
|
|
|
GetMicrocodePatchInfoFromHob (
|
|
|
|
UINT64 *Address,
|
|
|
|
UINT64 *RegionSize
|
|
|
|
);
|
|
|
|
|
2016-07-24 17:03:12 +02:00
|
|
|
/**
|
|
|
|
Detect whether Mwait-monitor feature is supported.
|
|
|
|
|
|
|
|
@retval TRUE Mwait-monitor feature is supported.
|
|
|
|
@retval FALSE Mwait-monitor feature is not supported.
|
|
|
|
**/
|
|
|
|
BOOLEAN
|
|
|
|
IsMwaitSupport (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2016-12-26 09:28:58 +01:00
|
|
|
/**
|
|
|
|
Enable Debug Agent to support source debugging on AP function.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EnableDebugAgent (
|
|
|
|
VOID
|
|
|
|
);
|
|
|
|
|
2019-12-23 07:32:49 +01:00
|
|
|
/**
|
|
|
|
Find the current Processor number by APIC ID.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to PEI CPU MP Data
|
|
|
|
@param[out] ProcessorNumber Return the pocessor number found
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS ProcessorNumber is found and returned.
|
|
|
|
@retval EFI_NOT_FOUND ProcessorNumber is not found.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
GetProcessorNumber (
|
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
|
|
|
OUT UINTN *ProcessorNumber
|
|
|
|
);
|
|
|
|
|
2020-02-11 14:30:48 +01:00
|
|
|
/**
|
|
|
|
This funtion will try to invoke platform specific microcode shadow logic to
|
|
|
|
relocate microcode update patches into memory.
|
|
|
|
|
|
|
|
@param[in] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Shadow microcode success.
|
|
|
|
@retval EFI_OUT_OF_RESOURCES No enough resource to complete the operation.
|
|
|
|
@retval EFI_UNSUPPORTED Can't find platform specific microcode shadow
|
|
|
|
PPI/Protocol.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
PlatformShadowMicrocode (
|
|
|
|
IN OUT CPU_MP_DATA *CpuMpData
|
|
|
|
);
|
|
|
|
|
2016-07-20 15:56:58 +02:00
|
|
|
#endif
|
|
|
|
|