2016-07-20 15:56:58 +02:00
|
|
|
/** @file
|
|
|
|
CPU MP Initialize Library common functions.
|
|
|
|
|
2022-08-26 09:04:46 +02:00
|
|
|
Copyright (c) 2016 - 2022, Intel Corporation. All rights reserved.<BR>
|
2020-02-29 16:05:45 +01:00
|
|
|
Copyright (c) 2020, AMD Inc. All rights reserved.<BR>
|
|
|
|
|
2019-04-04 01:07:22 +02:00
|
|
|
SPDX-License-Identifier: BSD-2-Clause-Patent
|
2016-07-20 15:56:58 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
|
|
|
|
#include "MpLib.h"
|
2022-11-07 07:30:26 +01:00
|
|
|
#include <Library/CcExitLib.h>
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
#include <Register/Amd/Fam17Msr.h>
|
|
|
|
#include <Register/Amd/Ghcb.h>
|
2016-07-20 15:56:58 +02:00
|
|
|
|
2016-07-21 10:08:12 +02:00
|
|
|
EFI_GUID mCpuInitMpLibHobGuid = CPU_INIT_MP_LIB_HOB_GUID;
|
2023-06-28 10:47:22 +02:00
|
|
|
EFI_GUID mMpHandOffGuid = MP_HANDOFF_GUID;
|
2020-02-29 16:05:45 +01:00
|
|
|
|
2022-08-26 09:04:46 +02:00
|
|
|
/**
|
|
|
|
Save the volatile registers required to be restored following INIT IPI.
|
|
|
|
|
|
|
|
@param[out] VolatileRegisters Returns buffer saved the volatile resisters
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SaveVolatileRegisters (
|
|
|
|
OUT CPU_VOLATILE_REGISTERS *VolatileRegisters
|
|
|
|
);
|
|
|
|
|
|
|
|
/**
|
|
|
|
Restore the volatile registers following INIT IPI.
|
|
|
|
|
|
|
|
@param[in] VolatileRegisters Pointer to volatile resisters
|
|
|
|
@param[in] IsRestoreDr TRUE: Restore DRx if supported
|
|
|
|
FALSE: Do not restore DRx
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
RestoreVolatileRegisters (
|
|
|
|
IN CPU_VOLATILE_REGISTERS *VolatileRegisters,
|
|
|
|
IN BOOLEAN IsRestoreDr
|
|
|
|
);
|
|
|
|
|
2016-07-20 18:22:21 +02:00
|
|
|
/**
|
|
|
|
The function will check if BSP Execute Disable is enabled.
|
2017-03-27 09:00:00 +02:00
|
|
|
|
|
|
|
DxeIpl may have enabled Execute Disable for BSP, APs need to
|
|
|
|
get the status and sync up the settings.
|
|
|
|
If BSP's CR0.Paging is not set, BSP execute Disble feature is
|
|
|
|
not working actually.
|
2016-07-20 18:22:21 +02:00
|
|
|
|
|
|
|
@retval TRUE BSP Execute Disable is enabled.
|
|
|
|
@retval FALSE BSP Execute Disable is not enabled.
|
|
|
|
**/
|
|
|
|
BOOLEAN
|
|
|
|
IsBspExecuteDisableEnabled (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 Eax;
|
|
|
|
CPUID_EXTENDED_CPU_SIG_EDX Edx;
|
|
|
|
MSR_IA32_EFER_REGISTER EferMsr;
|
|
|
|
BOOLEAN Enabled;
|
2017-03-27 09:00:00 +02:00
|
|
|
IA32_CR0 Cr0;
|
2016-07-20 18:22:21 +02:00
|
|
|
|
|
|
|
Enabled = FALSE;
|
2017-03-27 09:00:00 +02:00
|
|
|
Cr0.UintN = AsmReadCr0 ();
|
|
|
|
if (Cr0.Bits.PG != 0) {
|
2016-07-20 18:22:21 +02:00
|
|
|
//
|
2017-03-27 09:00:00 +02:00
|
|
|
// If CR0 Paging bit is set
|
2016-07-20 18:22:21 +02:00
|
|
|
//
|
2017-03-27 09:00:00 +02:00
|
|
|
AsmCpuid (CPUID_EXTENDED_FUNCTION, &Eax, NULL, NULL, NULL);
|
|
|
|
if (Eax >= CPUID_EXTENDED_CPU_SIG) {
|
|
|
|
AsmCpuid (CPUID_EXTENDED_CPU_SIG, NULL, NULL, NULL, &Edx.Uint32);
|
2016-07-20 18:22:21 +02:00
|
|
|
//
|
2017-03-27 09:00:00 +02:00
|
|
|
// CPUID 0x80000001
|
|
|
|
// Bit 20: Execute Disable Bit available.
|
2016-07-20 18:22:21 +02:00
|
|
|
//
|
2017-03-27 09:00:00 +02:00
|
|
|
if (Edx.Bits.NX != 0) {
|
|
|
|
EferMsr.Uint64 = AsmReadMsr64 (MSR_IA32_EFER);
|
|
|
|
//
|
|
|
|
// MSR 0xC0000080
|
|
|
|
// Bit 11: Execute Disable Bit enable.
|
|
|
|
//
|
|
|
|
if (EferMsr.Bits.NXE != 0) {
|
|
|
|
Enabled = TRUE;
|
|
|
|
}
|
2016-07-20 18:22:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return Enabled;
|
|
|
|
}
|
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
/**
|
|
|
|
Worker function for SwitchBSP().
|
|
|
|
|
|
|
|
Worker function for SwitchBSP(), assigned to the AP which is intended
|
|
|
|
to become BSP.
|
|
|
|
|
|
|
|
@param[in] Buffer Pointer to CPU MP Data
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
FutureBSPProc (
|
|
|
|
IN VOID *Buffer
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPU_MP_DATA *DataInHob;
|
|
|
|
|
|
|
|
DataInHob = (CPU_MP_DATA *)Buffer;
|
2022-08-26 09:04:46 +02:00
|
|
|
//
|
|
|
|
// Save and restore volatile registers when switch BSP
|
|
|
|
//
|
|
|
|
SaveVolatileRegisters (&DataInHob->APInfo.VolatileRegisters);
|
2016-07-21 15:20:18 +02:00
|
|
|
AsmExchangeRole (&DataInHob->APInfo, &DataInHob->BSPInfo);
|
2022-08-26 09:04:46 +02:00
|
|
|
RestoreVolatileRegisters (&DataInHob->APInfo.VolatileRegisters, FALSE);
|
2016-07-21 15:20:18 +02:00
|
|
|
}
|
|
|
|
|
2016-07-20 17:43:29 +02:00
|
|
|
/**
|
|
|
|
Get the Application Processors state.
|
|
|
|
|
|
|
|
@param[in] CpuData The pointer to CPU_AP_DATA of specified AP
|
|
|
|
|
|
|
|
@return The AP status
|
|
|
|
**/
|
|
|
|
CPU_STATE
|
|
|
|
GetApState (
|
|
|
|
IN CPU_AP_DATA *CpuData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
return CpuData->State;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Set the Application Processors state.
|
|
|
|
|
|
|
|
@param[in] CpuData The pointer to CPU_AP_DATA of specified AP
|
|
|
|
@param[in] State The AP status
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SetApState (
|
|
|
|
IN CPU_AP_DATA *CpuData,
|
|
|
|
IN CPU_STATE State
|
|
|
|
)
|
|
|
|
{
|
|
|
|
AcquireSpinLock (&CpuData->ApLock);
|
|
|
|
CpuData->State = State;
|
|
|
|
ReleaseSpinLock (&CpuData->ApLock);
|
|
|
|
}
|
2016-07-20 15:56:58 +02:00
|
|
|
|
2016-12-26 09:44:24 +01:00
|
|
|
/**
|
2017-01-05 02:59:22 +01:00
|
|
|
Save BSP's local APIC timer setting.
|
2016-12-26 09:44:24 +01:00
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SaveLocalApicTimerSetting (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// Record the current local APIC timer setting of BSP
|
|
|
|
//
|
|
|
|
GetApicTimerState (
|
|
|
|
&CpuMpData->DivideValue,
|
|
|
|
&CpuMpData->PeriodicMode,
|
|
|
|
&CpuMpData->Vector
|
|
|
|
);
|
|
|
|
CpuMpData->CurrentTimerCount = GetApicTimerCurrentCount ();
|
|
|
|
CpuMpData->TimerInterruptState = GetApicTimerInterruptState ();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Sync local APIC timer setting from BSP to AP.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SyncLocalApicTimerSetting (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// Sync local APIC timer setting from BSP to AP
|
|
|
|
//
|
|
|
|
InitializeApicTimer (
|
|
|
|
CpuMpData->DivideValue,
|
|
|
|
CpuMpData->CurrentTimerCount,
|
|
|
|
CpuMpData->PeriodicMode,
|
|
|
|
CpuMpData->Vector
|
|
|
|
);
|
|
|
|
//
|
|
|
|
// Disable AP's local APIC timer interrupt
|
|
|
|
//
|
|
|
|
DisableApicTimerInterrupt ();
|
|
|
|
}
|
|
|
|
|
2016-07-20 17:47:59 +02:00
|
|
|
/**
|
|
|
|
Save the volatile registers required to be restored following INIT IPI.
|
|
|
|
|
|
|
|
@param[out] VolatileRegisters Returns buffer saved the volatile resisters
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SaveVolatileRegisters (
|
|
|
|
OUT CPU_VOLATILE_REGISTERS *VolatileRegisters
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPUID_VERSION_INFO_EDX VersionInfoEdx;
|
|
|
|
|
|
|
|
VolatileRegisters->Cr0 = AsmReadCr0 ();
|
|
|
|
VolatileRegisters->Cr3 = AsmReadCr3 ();
|
|
|
|
VolatileRegisters->Cr4 = AsmReadCr4 ();
|
|
|
|
|
|
|
|
AsmCpuid (CPUID_VERSION_INFO, NULL, NULL, NULL, &VersionInfoEdx.Uint32);
|
|
|
|
if (VersionInfoEdx.Bits.DE != 0) {
|
|
|
|
//
|
|
|
|
// If processor supports Debugging Extensions feature
|
|
|
|
// by CPUID.[EAX=01H]:EDX.BIT2
|
|
|
|
//
|
|
|
|
VolatileRegisters->Dr0 = AsmReadDr0 ();
|
|
|
|
VolatileRegisters->Dr1 = AsmReadDr1 ();
|
|
|
|
VolatileRegisters->Dr2 = AsmReadDr2 ();
|
|
|
|
VolatileRegisters->Dr3 = AsmReadDr3 ();
|
|
|
|
VolatileRegisters->Dr6 = AsmReadDr6 ();
|
|
|
|
VolatileRegisters->Dr7 = AsmReadDr7 ();
|
|
|
|
}
|
2017-12-07 13:16:29 +01:00
|
|
|
|
|
|
|
AsmReadGdtr (&VolatileRegisters->Gdtr);
|
|
|
|
AsmReadIdtr (&VolatileRegisters->Idtr);
|
|
|
|
VolatileRegisters->Tr = AsmReadTr ();
|
2016-07-20 17:47:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Restore the volatile registers following INIT IPI.
|
|
|
|
|
|
|
|
@param[in] VolatileRegisters Pointer to volatile resisters
|
|
|
|
@param[in] IsRestoreDr TRUE: Restore DRx if supported
|
|
|
|
FALSE: Do not restore DRx
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
RestoreVolatileRegisters (
|
|
|
|
IN CPU_VOLATILE_REGISTERS *VolatileRegisters,
|
|
|
|
IN BOOLEAN IsRestoreDr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPUID_VERSION_INFO_EDX VersionInfoEdx;
|
2017-12-07 13:16:29 +01:00
|
|
|
IA32_TSS_DESCRIPTOR *Tss;
|
2016-07-20 17:47:59 +02:00
|
|
|
|
|
|
|
AsmWriteCr3 (VolatileRegisters->Cr3);
|
|
|
|
AsmWriteCr4 (VolatileRegisters->Cr4);
|
2018-09-03 04:47:54 +02:00
|
|
|
AsmWriteCr0 (VolatileRegisters->Cr0);
|
2016-07-20 17:47:59 +02:00
|
|
|
|
|
|
|
if (IsRestoreDr) {
|
|
|
|
AsmCpuid (CPUID_VERSION_INFO, NULL, NULL, NULL, &VersionInfoEdx.Uint32);
|
|
|
|
if (VersionInfoEdx.Bits.DE != 0) {
|
|
|
|
//
|
|
|
|
// If processor supports Debugging Extensions feature
|
|
|
|
// by CPUID.[EAX=01H]:EDX.BIT2
|
|
|
|
//
|
|
|
|
AsmWriteDr0 (VolatileRegisters->Dr0);
|
|
|
|
AsmWriteDr1 (VolatileRegisters->Dr1);
|
|
|
|
AsmWriteDr2 (VolatileRegisters->Dr2);
|
|
|
|
AsmWriteDr3 (VolatileRegisters->Dr3);
|
|
|
|
AsmWriteDr6 (VolatileRegisters->Dr6);
|
|
|
|
AsmWriteDr7 (VolatileRegisters->Dr7);
|
|
|
|
}
|
|
|
|
}
|
2017-12-07 13:16:29 +01:00
|
|
|
|
|
|
|
AsmWriteGdtr (&VolatileRegisters->Gdtr);
|
|
|
|
AsmWriteIdtr (&VolatileRegisters->Idtr);
|
|
|
|
if ((VolatileRegisters->Tr != 0) &&
|
|
|
|
(VolatileRegisters->Tr < VolatileRegisters->Gdtr.Limit))
|
|
|
|
{
|
|
|
|
Tss = (IA32_TSS_DESCRIPTOR *)(VolatileRegisters->Gdtr.Base +
|
|
|
|
VolatileRegisters->Tr);
|
2017-12-27 10:06:18 +01:00
|
|
|
if (Tss->Bits.P == 1) {
|
2017-12-07 13:16:29 +01:00
|
|
|
Tss->Bits.Type &= 0xD; // 1101 - Clear busy bit just in case
|
|
|
|
AsmWriteTr (VolatileRegisters->Tr);
|
|
|
|
}
|
|
|
|
}
|
2016-07-20 17:47:59 +02:00
|
|
|
}
|
|
|
|
|
2016-07-20 17:32:17 +02:00
|
|
|
/**
|
|
|
|
Detect whether Mwait-monitor feature is supported.
|
|
|
|
|
|
|
|
@retval TRUE Mwait-monitor feature is supported.
|
|
|
|
@retval FALSE Mwait-monitor feature is not supported.
|
|
|
|
**/
|
|
|
|
BOOLEAN
|
|
|
|
IsMwaitSupport (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPUID_VERSION_INFO_ECX VersionInfoEcx;
|
|
|
|
|
|
|
|
AsmCpuid (CPUID_VERSION_INFO, NULL, NULL, &VersionInfoEcx.Uint32, NULL);
|
|
|
|
return (VersionInfoEcx.Bits.MONITOR == 1) ? TRUE : FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Get AP loop mode.
|
|
|
|
|
|
|
|
@param[out] MonitorFilterSize Returns the largest monitor-line size in bytes.
|
|
|
|
|
|
|
|
@return The AP loop mode.
|
|
|
|
**/
|
|
|
|
UINT8
|
|
|
|
GetApLoopMode (
|
|
|
|
OUT UINT32 *MonitorFilterSize
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT8 ApLoopMode;
|
|
|
|
CPUID_MONITOR_MWAIT_EBX MonitorMwaitEbx;
|
|
|
|
|
|
|
|
ASSERT (MonitorFilterSize != NULL);
|
|
|
|
|
|
|
|
ApLoopMode = PcdGet8 (PcdCpuApLoopMode);
|
|
|
|
ASSERT (ApLoopMode >= ApInHltLoop && ApLoopMode <= ApInRunLoop);
|
|
|
|
if (ApLoopMode == ApInMwaitLoop) {
|
|
|
|
if (!IsMwaitSupport ()) {
|
|
|
|
//
|
|
|
|
// If processor does not support MONITOR/MWAIT feature,
|
|
|
|
// force AP in Hlt-loop mode
|
|
|
|
//
|
|
|
|
ApLoopMode = ApInHltLoop;
|
|
|
|
}
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
|
2021-12-09 04:28:00 +01:00
|
|
|
if (ConfidentialComputingGuestHas (CCAttrAmdSevEs) &&
|
|
|
|
!ConfidentialComputingGuestHas (CCAttrAmdSevSnp))
|
|
|
|
{
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
//
|
2021-12-09 04:28:00 +01:00
|
|
|
// For SEV-ES (SEV-SNP is also considered SEV-ES), force AP in Hlt-loop
|
|
|
|
// mode in order to use the GHCB protocol for starting APs
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
//
|
|
|
|
ApLoopMode = ApInHltLoop;
|
|
|
|
}
|
2016-07-20 17:32:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ApLoopMode != ApInMwaitLoop) {
|
|
|
|
*MonitorFilterSize = sizeof (UINT32);
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// CPUID.[EAX=05H]:EBX.BIT0-15: Largest monitor-line size in bytes
|
|
|
|
// CPUID.[EAX=05H].EDX: C-states supported using MWAIT
|
|
|
|
//
|
|
|
|
AsmCpuid (CPUID_MONITOR_MWAIT, NULL, &MonitorMwaitEbx.Uint32, NULL, NULL);
|
|
|
|
*MonitorFilterSize = MonitorMwaitEbx.Bits.LargestMonitorLineSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ApLoopMode;
|
|
|
|
}
|
2016-07-20 18:20:26 +02:00
|
|
|
|
2016-07-20 18:31:36 +02:00
|
|
|
/**
|
|
|
|
Sort the APIC ID of all processors.
|
|
|
|
|
|
|
|
This function sorts the APIC ID of all processors so that processor number is
|
|
|
|
assigned in the ascending order of APIC ID which eases MP debugging.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to PEI CPU MP Data
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SortApicId (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN Index1;
|
|
|
|
UINTN Index2;
|
|
|
|
UINTN Index3;
|
|
|
|
UINT32 ApicId;
|
2016-11-14 03:49:51 +01:00
|
|
|
CPU_INFO_IN_HOB CpuInfo;
|
2016-07-20 18:31:36 +02:00
|
|
|
UINT32 ApCount;
|
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
2017-12-28 03:24:29 +01:00
|
|
|
volatile UINT32 *StartupApSignal;
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-20 18:31:36 +02:00
|
|
|
ApCount = CpuMpData->CpuCount - 1;
|
2016-11-14 03:49:51 +01:00
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
2016-07-20 18:31:36 +02:00
|
|
|
if (ApCount != 0) {
|
|
|
|
for (Index1 = 0; Index1 < ApCount; Index1++) {
|
|
|
|
Index3 = Index1;
|
|
|
|
//
|
|
|
|
// Sort key is the hardware default APIC ID
|
|
|
|
//
|
2016-11-14 03:49:51 +01:00
|
|
|
ApicId = CpuInfoInHob[Index1].ApicId;
|
2016-07-20 18:31:36 +02:00
|
|
|
for (Index2 = Index1 + 1; Index2 <= ApCount; Index2++) {
|
2016-11-14 03:49:51 +01:00
|
|
|
if (ApicId > CpuInfoInHob[Index2].ApicId) {
|
2016-07-20 18:31:36 +02:00
|
|
|
Index3 = Index2;
|
2016-11-14 03:49:51 +01:00
|
|
|
ApicId = CpuInfoInHob[Index2].ApicId;
|
2016-07-20 18:31:36 +02:00
|
|
|
}
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-20 18:31:36 +02:00
|
|
|
if (Index3 != Index1) {
|
2016-11-14 03:49:51 +01:00
|
|
|
CopyMem (&CpuInfo, &CpuInfoInHob[Index3], sizeof (CPU_INFO_IN_HOB));
|
2016-07-20 18:31:36 +02:00
|
|
|
CopyMem (
|
2016-11-14 03:49:51 +01:00
|
|
|
&CpuInfoInHob[Index3],
|
|
|
|
&CpuInfoInHob[Index1],
|
|
|
|
sizeof (CPU_INFO_IN_HOB)
|
2016-07-20 18:31:36 +02:00
|
|
|
);
|
2016-11-14 03:49:51 +01:00
|
|
|
CopyMem (&CpuInfoInHob[Index1], &CpuInfo, sizeof (CPU_INFO_IN_HOB));
|
2017-12-28 03:24:29 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// Also exchange the StartupApSignal.
|
|
|
|
//
|
|
|
|
StartupApSignal = CpuMpData->CpuData[Index3].StartupApSignal;
|
|
|
|
CpuMpData->CpuData[Index3].StartupApSignal =
|
|
|
|
CpuMpData->CpuData[Index1].StartupApSignal;
|
|
|
|
CpuMpData->CpuData[Index1].StartupApSignal = StartupApSignal;
|
2016-07-20 18:31:36 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Get the processor number for the BSP
|
|
|
|
//
|
|
|
|
ApicId = GetInitialApicId ();
|
|
|
|
for (Index1 = 0; Index1 < CpuMpData->CpuCount; Index1++) {
|
2016-11-14 03:49:51 +01:00
|
|
|
if (CpuInfoInHob[Index1].ApicId == ApicId) {
|
2016-07-20 18:31:36 +02:00
|
|
|
CpuMpData->BspNumber = (UINT32)Index1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:29:49 +02:00
|
|
|
/**
|
|
|
|
Enable x2APIC mode on APs.
|
|
|
|
|
|
|
|
@param[in, out] Buffer Pointer to private data buffer.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
ApFuncEnableX2Apic (
|
|
|
|
IN OUT VOID *Buffer
|
|
|
|
)
|
|
|
|
{
|
|
|
|
SetApicMode (LOCAL_APIC_MODE_X2APIC);
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
/**
|
|
|
|
Do sync on APs.
|
|
|
|
|
|
|
|
@param[in, out] Buffer Pointer to private data buffer.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
ApInitializeSync (
|
|
|
|
IN OUT VOID *Buffer
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
2019-12-23 07:32:49 +01:00
|
|
|
UINTN ProcessorNumber;
|
|
|
|
EFI_STATUS Status;
|
2016-07-20 18:20:26 +02:00
|
|
|
|
|
|
|
CpuMpData = (CPU_MP_DATA *)Buffer;
|
2019-12-23 07:32:49 +01:00
|
|
|
Status = GetProcessorNumber (CpuMpData, &ProcessorNumber);
|
|
|
|
ASSERT_EFI_ERROR (Status);
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
|
|
|
// Load microcode on AP
|
|
|
|
//
|
2019-12-23 07:32:49 +01:00
|
|
|
MicrocodeDetect (CpuMpData, ProcessorNumber);
|
2017-04-01 15:29:54 +02:00
|
|
|
//
|
|
|
|
// Sync BSP's MTRR table to AP
|
|
|
|
//
|
|
|
|
MtrrSetAllMtrrs (&CpuMpData->MtrrTable);
|
2016-07-20 18:20:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Find the current Processor number by APIC ID.
|
|
|
|
|
2016-12-13 03:46:28 +01:00
|
|
|
@param[in] CpuMpData Pointer to PEI CPU MP Data
|
|
|
|
@param[out] ProcessorNumber Return the pocessor number found
|
2016-07-20 18:20:26 +02:00
|
|
|
|
|
|
|
@retval EFI_SUCCESS ProcessorNumber is found and returned.
|
|
|
|
@retval EFI_NOT_FOUND ProcessorNumber is not found.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
GetProcessorNumber (
|
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
|
|
|
OUT UINTN *ProcessorNumber
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN TotalProcessorNumber;
|
|
|
|
UINTN Index;
|
2016-11-14 03:49:51 +01:00
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
2018-07-04 10:29:07 +02:00
|
|
|
UINT32 CurrentApicId;
|
2016-11-14 03:49:51 +01:00
|
|
|
|
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
2016-07-20 18:20:26 +02:00
|
|
|
|
|
|
|
TotalProcessorNumber = CpuMpData->CpuCount;
|
2018-07-04 10:29:07 +02:00
|
|
|
CurrentApicId = GetApicId ();
|
2016-07-20 18:20:26 +02:00
|
|
|
for (Index = 0; Index < TotalProcessorNumber; Index++) {
|
2018-07-04 10:29:07 +02:00
|
|
|
if (CpuInfoInHob[Index].ApicId == CurrentApicId) {
|
2016-07-20 18:20:26 +02:00
|
|
|
*ProcessorNumber = Index;
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
}
|
2018-07-04 10:29:07 +02:00
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:28:45 +02:00
|
|
|
/**
|
|
|
|
This function will get CPU count in the system.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to PEI CPU MP Data
|
|
|
|
|
|
|
|
@return CPU count detected
|
|
|
|
**/
|
|
|
|
UINTN
|
|
|
|
CollectProcessorCount (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
2017-04-25 05:22:00 +02:00
|
|
|
UINTN Index;
|
2019-10-23 08:23:38 +02:00
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
2019-10-23 08:54:57 +02:00
|
|
|
BOOLEAN X2Apic;
|
2017-04-25 05:22:00 +02:00
|
|
|
|
2016-07-20 18:28:45 +02:00
|
|
|
//
|
|
|
|
// Send 1st broadcast IPI to APs to wakeup APs
|
|
|
|
//
|
2019-10-23 08:54:57 +02:00
|
|
|
CpuMpData->InitFlag = ApInitConfig;
|
2018-07-26 10:44:22 +02:00
|
|
|
WakeUpAP (CpuMpData, TRUE, 0, NULL, NULL, TRUE);
|
2016-07-20 18:28:45 +02:00
|
|
|
CpuMpData->InitFlag = ApInitDone;
|
|
|
|
//
|
2021-01-28 06:03:54 +01:00
|
|
|
// When InitFlag == ApInitConfig, WakeUpAP () guarantees all APs are checked in.
|
|
|
|
// FinishedCount is the number of check-in APs.
|
2016-07-20 18:28:45 +02:00
|
|
|
//
|
2021-01-28 06:03:54 +01:00
|
|
|
CpuMpData->CpuCount = CpuMpData->FinishedCount + 1;
|
|
|
|
ASSERT (CpuMpData->CpuCount <= PcdGet32 (PcdCpuMaxLogicalProcessorNumber));
|
2019-11-14 12:00:10 +01:00
|
|
|
|
2019-10-23 08:23:38 +02:00
|
|
|
//
|
|
|
|
// Enable x2APIC mode if
|
|
|
|
// 1. Number of CPU is greater than 255; or
|
|
|
|
// 2. There are any logical processors reporting an Initial APIC ID of 255 or greater.
|
|
|
|
//
|
2019-10-23 08:54:57 +02:00
|
|
|
X2Apic = FALSE;
|
2017-05-26 13:50:43 +02:00
|
|
|
if (CpuMpData->CpuCount > 255) {
|
|
|
|
//
|
|
|
|
// If there are more than 255 processor found, force to enable X2APIC
|
|
|
|
//
|
2019-10-23 08:54:57 +02:00
|
|
|
X2Apic = TRUE;
|
2019-10-23 08:23:38 +02:00
|
|
|
} else {
|
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
if (CpuInfoInHob[Index].InitialApicId >= 0xFF) {
|
2019-10-23 08:54:57 +02:00
|
|
|
X2Apic = TRUE;
|
2019-10-23 08:23:38 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2017-05-26 13:50:43 +02:00
|
|
|
}
|
2019-10-23 08:23:38 +02:00
|
|
|
|
2019-10-23 08:54:57 +02:00
|
|
|
if (X2Apic) {
|
2016-07-20 18:29:49 +02:00
|
|
|
DEBUG ((DEBUG_INFO, "Force x2APIC mode!\n"));
|
|
|
|
//
|
|
|
|
// Wakeup all APs to enable x2APIC mode
|
|
|
|
//
|
2018-07-26 10:44:22 +02:00
|
|
|
WakeUpAP (CpuMpData, TRUE, 0, ApFuncEnableX2Apic, NULL, TRUE);
|
2016-07-20 18:29:49 +02:00
|
|
|
//
|
|
|
|
// Wait for all known APs finished
|
|
|
|
//
|
|
|
|
while (CpuMpData->FinishedCount < (CpuMpData->CpuCount - 1)) {
|
|
|
|
CpuPause ();
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-20 18:29:49 +02:00
|
|
|
//
|
|
|
|
// Enable x2APIC on BSP
|
|
|
|
//
|
|
|
|
SetApicMode (LOCAL_APIC_MODE_X2APIC);
|
2017-04-25 05:22:00 +02:00
|
|
|
//
|
|
|
|
// Set BSP/Aps state to IDLE
|
|
|
|
//
|
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
SetApState (&CpuMpData->CpuData[Index], CpuStateIdle);
|
|
|
|
}
|
2016-07-20 18:29:49 +02:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-20 18:29:49 +02:00
|
|
|
DEBUG ((DEBUG_INFO, "APIC MODE is %d\n", GetApicMode ()));
|
2016-07-20 18:31:36 +02:00
|
|
|
//
|
|
|
|
// Sort BSP/Aps by CPU APIC ID in ascending order
|
|
|
|
//
|
|
|
|
SortApicId (CpuMpData);
|
|
|
|
|
2016-07-20 18:28:45 +02:00
|
|
|
DEBUG ((DEBUG_INFO, "MpInitLib: Find %d processors in system.\n", CpuMpData->CpuCount));
|
|
|
|
|
|
|
|
return CpuMpData->CpuCount;
|
|
|
|
}
|
|
|
|
|
2016-12-13 03:46:28 +01:00
|
|
|
/**
|
2016-07-20 17:43:29 +02:00
|
|
|
Initialize CPU AP Data when AP is wakeup at the first time.
|
|
|
|
|
|
|
|
@param[in, out] CpuMpData Pointer to PEI CPU MP Data
|
|
|
|
@param[in] ProcessorNumber The handle number of processor
|
|
|
|
@param[in] BistData Processor BIST data
|
2016-12-13 03:46:28 +01:00
|
|
|
@param[in] ApTopOfStack Top of AP stack
|
2016-07-20 17:43:29 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
InitializeApData (
|
|
|
|
IN OUT CPU_MP_DATA *CpuMpData,
|
|
|
|
IN UINTN ProcessorNumber,
|
2016-11-14 04:38:25 +01:00
|
|
|
IN UINT32 BistData,
|
UefiCpuPkg/MpInitLib: support 64-bit AP stack addresses
The cached "CPU_INFO_IN_HOB.ApTopOfStack" field currently has type UINT32.
This is not ideal because the AP stacks are located within
"CpuMpData->Buffer", which is allocated with a plain AllocatePages() call
in MpInitLibInitialize():
platform CpuMpPei included PEI RAM > 4GB result
-------- ----------------- ------------- ------
Ia32 * n/a good
Ia32X64 no n/a BAD
Ia32X64 yes n/a good
X64 no * BAD
X64 yes no good
X64 yes yes BAD
- If we are on an Ia32X64 or X64 platform that does not include CpuMpPei,
then CpuDxe cannot reuse the CPU_INFO_IN_HOB structures preallocated by
CpuMpPei (through the CpuInitMpLib GUID HOB), and then AllocatePages()
-- invoked first in 64-bit DXE -- could return an address outside of
32-bit address space.
- If we are on an X64 platform where the permanent PEI RAM extends above
the 32-bit address space, then the same issue can surface even if
CpuMpPei is included: even the original allocation of the
CPU_INFO_IN_HOB structures, by CpuMpPei, could be satisfied from above
4GB.
The original "AP init" branch in "X64/MpFuncs.nasm" correctly considers a
64-bit stack start: the "MP_CPU_EXCHANGE_INFO.StackStart" field has type
UINTN, and the code uses QWORD addition and movement to set RSP from it.
Adapt the "GetApicId" branch of "X64/MpFuncs.nasm":
- change the type of "CPU_INFO_IN_HOB.ApTopOfStack" to UINT64,
- remove the explicit truncation to UINT32 in InitializeApData(),
- update the "GetNextProcNumber" iteration size to the new size of
"CPU_INFO_IN_HOB",
- set RSP with a QWORD movement from "CPU_INFO_IN_HOB.ApTopOfStack".
Because the same CPU_INFO_IN_HOB structure is used by "Ia32/MpFuncs.nasm",
we have to update the "GetNextProcNumber" iteration size there as well.
The ESP setting can be preserved as a DWORD movement from the original
offset (decimal 12), since our integers are little endian.
Cc: Jeff Fan <jeff.fan@intel.com>
Fixes: 845c5be1fd9bf7edfac4a103dfab70829686978f
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jeff Fan <jeff.fan@intel.com>
2016-11-16 23:31:11 +01:00
|
|
|
IN UINT64 ApTopOfStack
|
2016-07-20 17:43:29 +02:00
|
|
|
)
|
|
|
|
{
|
2019-12-19 06:36:24 +01:00
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
|
|
|
MSR_IA32_PLATFORM_ID_REGISTER PlatformIdMsr;
|
2022-08-19 08:17:28 +02:00
|
|
|
AP_STACK_DATA *ApStackData;
|
2016-11-14 03:49:51 +01:00
|
|
|
|
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
|
|
|
CpuInfoInHob[ProcessorNumber].InitialApicId = GetInitialApicId ();
|
|
|
|
CpuInfoInHob[ProcessorNumber].ApicId = GetApicId ();
|
|
|
|
CpuInfoInHob[ProcessorNumber].Health = BistData;
|
UefiCpuPkg/MpInitLib: support 64-bit AP stack addresses
The cached "CPU_INFO_IN_HOB.ApTopOfStack" field currently has type UINT32.
This is not ideal because the AP stacks are located within
"CpuMpData->Buffer", which is allocated with a plain AllocatePages() call
in MpInitLibInitialize():
platform CpuMpPei included PEI RAM > 4GB result
-------- ----------------- ------------- ------
Ia32 * n/a good
Ia32X64 no n/a BAD
Ia32X64 yes n/a good
X64 no * BAD
X64 yes no good
X64 yes yes BAD
- If we are on an Ia32X64 or X64 platform that does not include CpuMpPei,
then CpuDxe cannot reuse the CPU_INFO_IN_HOB structures preallocated by
CpuMpPei (through the CpuInitMpLib GUID HOB), and then AllocatePages()
-- invoked first in 64-bit DXE -- could return an address outside of
32-bit address space.
- If we are on an X64 platform where the permanent PEI RAM extends above
the 32-bit address space, then the same issue can surface even if
CpuMpPei is included: even the original allocation of the
CPU_INFO_IN_HOB structures, by CpuMpPei, could be satisfied from above
4GB.
The original "AP init" branch in "X64/MpFuncs.nasm" correctly considers a
64-bit stack start: the "MP_CPU_EXCHANGE_INFO.StackStart" field has type
UINTN, and the code uses QWORD addition and movement to set RSP from it.
Adapt the "GetApicId" branch of "X64/MpFuncs.nasm":
- change the type of "CPU_INFO_IN_HOB.ApTopOfStack" to UINT64,
- remove the explicit truncation to UINT32 in InitializeApData(),
- update the "GetNextProcNumber" iteration size to the new size of
"CPU_INFO_IN_HOB",
- set RSP with a QWORD movement from "CPU_INFO_IN_HOB.ApTopOfStack".
Because the same CPU_INFO_IN_HOB structure is used by "Ia32/MpFuncs.nasm",
we have to update the "GetNextProcNumber" iteration size there as well.
The ESP setting can be preserved as a DWORD movement from the original
offset (decimal 12), since our integers are little endian.
Cc: Jeff Fan <jeff.fan@intel.com>
Fixes: 845c5be1fd9bf7edfac4a103dfab70829686978f
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jeff Fan <jeff.fan@intel.com>
2016-11-16 23:31:11 +01:00
|
|
|
CpuInfoInHob[ProcessorNumber].ApTopOfStack = ApTopOfStack;
|
2016-11-14 03:49:51 +01:00
|
|
|
|
2022-08-19 08:17:28 +02:00
|
|
|
//
|
|
|
|
// AP_STACK_DATA is stored at the top of AP Stack
|
|
|
|
//
|
|
|
|
ApStackData = (AP_STACK_DATA *)((UINTN)ApTopOfStack - sizeof (AP_STACK_DATA));
|
|
|
|
ApStackData->MpData = CpuMpData;
|
|
|
|
|
2016-07-20 17:43:29 +02:00
|
|
|
CpuMpData->CpuData[ProcessorNumber].Waiting = FALSE;
|
|
|
|
CpuMpData->CpuData[ProcessorNumber].CpuHealthy = (BistData == 0) ? TRUE : FALSE;
|
|
|
|
|
2020-02-29 16:05:45 +01:00
|
|
|
//
|
|
|
|
// NOTE: PlatformId is not relevant on AMD platforms.
|
|
|
|
//
|
|
|
|
if (!StandardSignatureIsAuthenticAMD ()) {
|
|
|
|
PlatformIdMsr.Uint64 = AsmReadMsr64 (MSR_IA32_PLATFORM_ID);
|
|
|
|
CpuMpData->CpuData[ProcessorNumber].PlatformId = (UINT8)PlatformIdMsr.Bits.PlatformId;
|
|
|
|
}
|
2019-12-19 06:36:24 +01:00
|
|
|
|
|
|
|
AsmCpuid (
|
|
|
|
CPUID_VERSION_INFO,
|
|
|
|
&CpuMpData->CpuData[ProcessorNumber].ProcessorSignature,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
NULL
|
|
|
|
);
|
|
|
|
|
2016-07-20 17:43:29 +02:00
|
|
|
InitializeSpinLock (&CpuMpData->CpuData[ProcessorNumber].ApLock);
|
|
|
|
SetApState (&CpuMpData->CpuData[ProcessorNumber], CpuStateIdle);
|
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:20 +02:00
|
|
|
/**
|
|
|
|
This function place APs in Halt loop.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
PlaceAPInHltLoop (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
while (TRUE) {
|
|
|
|
DisableInterrupts ();
|
|
|
|
if (CpuMpData->UseSevEsAPMethod) {
|
|
|
|
SevEsPlaceApHlt (CpuMpData);
|
|
|
|
} else {
|
|
|
|
CpuSleep ();
|
|
|
|
}
|
|
|
|
|
|
|
|
CpuPause ();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:21 +02:00
|
|
|
/**
|
|
|
|
This function place APs in Mwait or Run loop.
|
|
|
|
|
|
|
|
@param[in] ApLoopMode Ap Loop Mode
|
|
|
|
@param[in] ApStartupSignalBuffer Pointer to Ap Startup Signal Buffer
|
|
|
|
@param[in] ApTargetCState Ap Target CState
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
PlaceAPInMwaitLoopOrRunLoop (
|
|
|
|
IN UINT8 ApLoopMode,
|
|
|
|
IN volatile UINT32 *ApStartupSignalBuffer,
|
|
|
|
IN UINT8 ApTargetCState
|
|
|
|
)
|
|
|
|
{
|
|
|
|
while (TRUE) {
|
|
|
|
DisableInterrupts ();
|
|
|
|
if (ApLoopMode == ApInMwaitLoop) {
|
|
|
|
//
|
|
|
|
// Place AP in MWAIT-loop
|
|
|
|
//
|
|
|
|
AsmMonitor ((UINTN)ApStartupSignalBuffer, 0, 0);
|
2023-06-28 10:47:24 +02:00
|
|
|
if ((*ApStartupSignalBuffer != WAKEUP_AP_SIGNAL) && (*ApStartupSignalBuffer != MP_HAND_OFF_SIGNAL)) {
|
2023-06-28 10:47:21 +02:00
|
|
|
//
|
|
|
|
// Check AP start-up signal again.
|
|
|
|
// If AP start-up signal is not set, place AP into
|
|
|
|
// the specified C-state
|
|
|
|
//
|
|
|
|
AsmMwait (ApTargetCState << 4, 0);
|
|
|
|
}
|
|
|
|
} else if (ApLoopMode == ApInRunLoop) {
|
|
|
|
//
|
|
|
|
// Place AP in Run-loop
|
|
|
|
//
|
|
|
|
CpuPause ();
|
|
|
|
} else {
|
|
|
|
ASSERT (FALSE);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// If AP start-up signal is written, AP is waken up
|
|
|
|
// otherwise place AP in loop again
|
|
|
|
//
|
2023-06-28 10:47:24 +02:00
|
|
|
if ((*ApStartupSignalBuffer == WAKEUP_AP_SIGNAL) || (*ApStartupSignalBuffer == MP_HAND_OFF_SIGNAL)) {
|
2023-06-28 10:47:21 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
/**
|
|
|
|
This function will be called from AP reset code if BSP uses WakeUpAP.
|
|
|
|
|
2023-06-28 10:47:23 +02:00
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data
|
2017-11-01 02:36:53 +01:00
|
|
|
@param[in] ApIndex Number of current executing AP
|
2016-07-20 18:20:26 +02:00
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
ApWakeupFunction (
|
2023-06-28 10:47:23 +02:00
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
|
|
|
IN UINTN ApIndex
|
2016-07-20 18:20:26 +02:00
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN ProcessorNumber;
|
|
|
|
EFI_AP_PROCEDURE Procedure;
|
|
|
|
VOID *Parameter;
|
|
|
|
UINT32 BistData;
|
|
|
|
volatile UINT32 *ApStartupSignalBuffer;
|
2016-11-14 03:49:51 +01:00
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
UefiCpuPkg/MpInitLib: support 64-bit AP stack addresses
The cached "CPU_INFO_IN_HOB.ApTopOfStack" field currently has type UINT32.
This is not ideal because the AP stacks are located within
"CpuMpData->Buffer", which is allocated with a plain AllocatePages() call
in MpInitLibInitialize():
platform CpuMpPei included PEI RAM > 4GB result
-------- ----------------- ------------- ------
Ia32 * n/a good
Ia32X64 no n/a BAD
Ia32X64 yes n/a good
X64 no * BAD
X64 yes no good
X64 yes yes BAD
- If we are on an Ia32X64 or X64 platform that does not include CpuMpPei,
then CpuDxe cannot reuse the CPU_INFO_IN_HOB structures preallocated by
CpuMpPei (through the CpuInitMpLib GUID HOB), and then AllocatePages()
-- invoked first in 64-bit DXE -- could return an address outside of
32-bit address space.
- If we are on an X64 platform where the permanent PEI RAM extends above
the 32-bit address space, then the same issue can surface even if
CpuMpPei is included: even the original allocation of the
CPU_INFO_IN_HOB structures, by CpuMpPei, could be satisfied from above
4GB.
The original "AP init" branch in "X64/MpFuncs.nasm" correctly considers a
64-bit stack start: the "MP_CPU_EXCHANGE_INFO.StackStart" field has type
UINTN, and the code uses QWORD addition and movement to set RSP from it.
Adapt the "GetApicId" branch of "X64/MpFuncs.nasm":
- change the type of "CPU_INFO_IN_HOB.ApTopOfStack" to UINT64,
- remove the explicit truncation to UINT32 in InitializeApData(),
- update the "GetNextProcNumber" iteration size to the new size of
"CPU_INFO_IN_HOB",
- set RSP with a QWORD movement from "CPU_INFO_IN_HOB.ApTopOfStack".
Because the same CPU_INFO_IN_HOB structure is used by "Ia32/MpFuncs.nasm",
we have to update the "GetNextProcNumber" iteration size there as well.
The ESP setting can be preserved as a DWORD movement from the original
offset (decimal 12), since our integers are little endian.
Cc: Jeff Fan <jeff.fan@intel.com>
Fixes: 845c5be1fd9bf7edfac4a103dfab70829686978f
Contributed-under: TianoCore Contribution Agreement 1.0
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Jeff Fan <jeff.fan@intel.com>
2016-11-16 23:31:11 +01:00
|
|
|
UINT64 ApTopOfStack;
|
2017-05-24 07:53:30 +02:00
|
|
|
UINTN CurrentApicMode;
|
2022-08-19 08:17:28 +02:00
|
|
|
AP_STACK_DATA *ApStackData;
|
2023-06-28 10:47:24 +02:00
|
|
|
UINT32 OriginalValue;
|
2016-07-20 18:20:26 +02:00
|
|
|
|
2016-12-26 09:44:24 +01:00
|
|
|
//
|
|
|
|
// AP's local APIC settings will be lost after received INIT IPI
|
|
|
|
// We need to re-initialize them at here
|
|
|
|
//
|
|
|
|
ProgramVirtualWireMode ();
|
2018-01-05 10:08:13 +01:00
|
|
|
//
|
|
|
|
// Mask the LINT0 and LINT1 so that AP doesn't enter the system timer interrupt handler.
|
|
|
|
//
|
|
|
|
DisableLvtInterrupts ();
|
2016-12-26 09:44:24 +01:00
|
|
|
SyncLocalApicTimerSetting (CpuMpData);
|
2016-07-20 18:20:26 +02:00
|
|
|
|
2017-05-24 07:53:30 +02:00
|
|
|
CurrentApicMode = GetApicMode ();
|
2016-07-20 18:20:26 +02:00
|
|
|
while (TRUE) {
|
|
|
|
if (CpuMpData->InitFlag == ApInitConfig) {
|
2017-10-23 08:45:44 +02:00
|
|
|
ProcessorNumber = ApIndex;
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
|
|
|
// This is first time AP wakeup, get BIST information from AP stack
|
|
|
|
//
|
2016-11-14 04:38:25 +01:00
|
|
|
ApTopOfStack = CpuMpData->Buffer + (ProcessorNumber + 1) * CpuMpData->CpuApStackSize;
|
2022-08-19 08:17:28 +02:00
|
|
|
ApStackData = (AP_STACK_DATA *)((UINTN)ApTopOfStack - sizeof (AP_STACK_DATA));
|
|
|
|
BistData = (UINT32)ApStackData->Bist;
|
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
2018-07-02 08:01:35 +02:00
|
|
|
// CpuMpData->CpuData[0].VolatileRegisters is initialized based on BSP environment,
|
|
|
|
// to initialize AP in InitConfig path.
|
|
|
|
// NOTE: IDTR.BASE stored in CpuMpData->CpuData[0].VolatileRegisters points to a different IDT shared by all APs.
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
|
|
|
RestoreVolatileRegisters (&CpuMpData->CpuData[0].VolatileRegisters, FALSE);
|
2016-11-14 04:38:25 +01:00
|
|
|
InitializeApData (CpuMpData, ProcessorNumber, BistData, ApTopOfStack);
|
2016-07-20 18:20:26 +02:00
|
|
|
ApStartupSignalBuffer = CpuMpData->CpuData[ProcessorNumber].StartupApSignal;
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// Execute AP function if AP is ready
|
|
|
|
//
|
|
|
|
GetProcessorNumber (CpuMpData, &ProcessorNumber);
|
|
|
|
//
|
|
|
|
// Clear AP start-up signal when AP waken up
|
|
|
|
//
|
|
|
|
ApStartupSignalBuffer = CpuMpData->CpuData[ProcessorNumber].StartupApSignal;
|
2023-06-28 10:47:24 +02:00
|
|
|
OriginalValue = InterlockedCompareExchange32 (
|
|
|
|
(UINT32 *)ApStartupSignalBuffer,
|
|
|
|
MP_HAND_OFF_SIGNAL,
|
|
|
|
0
|
|
|
|
);
|
|
|
|
if (OriginalValue == MP_HAND_OFF_SIGNAL) {
|
|
|
|
SetApState (&CpuMpData->CpuData[ProcessorNumber], CpuStateReady);
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
InterlockedCompareExchange32 (
|
|
|
|
(UINT32 *)ApStartupSignalBuffer,
|
|
|
|
WAKEUP_AP_SIGNAL,
|
|
|
|
0
|
|
|
|
);
|
2020-04-29 13:51:20 +02:00
|
|
|
|
|
|
|
if (CpuMpData->InitFlag == ApInitReconfig) {
|
2018-01-26 09:30:40 +01:00
|
|
|
//
|
2020-04-29 13:51:20 +02:00
|
|
|
// ApInitReconfig happens when:
|
|
|
|
// 1. AP is re-enabled after it's disabled, in either PEI or DXE phase.
|
|
|
|
// 2. AP is initialized in DXE phase.
|
|
|
|
// In either case, use the volatile registers value derived from BSP.
|
|
|
|
// NOTE: IDTR.BASE stored in CpuMpData->CpuData[0].VolatileRegisters points to a
|
|
|
|
// different IDT shared by all APs.
|
2018-01-26 09:30:40 +01:00
|
|
|
//
|
2020-04-29 13:51:20 +02:00
|
|
|
RestoreVolatileRegisters (&CpuMpData->CpuData[0].VolatileRegisters, FALSE);
|
|
|
|
} else {
|
|
|
|
if (CpuMpData->ApLoopMode == ApInHltLoop) {
|
|
|
|
//
|
|
|
|
// Restore AP's volatile registers saved before AP is halted
|
|
|
|
//
|
|
|
|
RestoreVolatileRegisters (&CpuMpData->CpuData[ProcessorNumber].VolatileRegisters, TRUE);
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// The CPU driver might not flush TLB for APs on spot after updating
|
|
|
|
// page attributes. AP in mwait loop mode needs to take care of it when
|
|
|
|
// woken up.
|
|
|
|
//
|
|
|
|
CpuFlushTlb ();
|
|
|
|
}
|
2016-07-20 18:20:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (GetApState (&CpuMpData->CpuData[ProcessorNumber]) == CpuStateReady) {
|
|
|
|
Procedure = (EFI_AP_PROCEDURE)CpuMpData->CpuData[ProcessorNumber].ApFunction;
|
|
|
|
Parameter = (VOID *)CpuMpData->CpuData[ProcessorNumber].ApFunctionArgument;
|
|
|
|
if (Procedure != NULL) {
|
|
|
|
SetApState (&CpuMpData->CpuData[ProcessorNumber], CpuStateBusy);
|
|
|
|
//
|
2016-12-26 09:28:58 +01:00
|
|
|
// Enable source debugging on AP function
|
2018-06-27 15:14:20 +02:00
|
|
|
//
|
2016-12-26 09:28:58 +01:00
|
|
|
EnableDebugAgent ();
|
|
|
|
//
|
2016-07-20 18:20:26 +02:00
|
|
|
// Invoke AP function here
|
|
|
|
//
|
|
|
|
Procedure (Parameter);
|
2016-11-14 03:49:51 +01:00
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
2016-07-21 15:20:18 +02:00
|
|
|
if (CpuMpData->SwitchBspFlag) {
|
|
|
|
//
|
|
|
|
// Re-get the processor number due to BSP/AP maybe exchange in AP function
|
|
|
|
//
|
|
|
|
GetProcessorNumber (CpuMpData, &ProcessorNumber);
|
|
|
|
CpuMpData->CpuData[ProcessorNumber].ApFunction = 0;
|
|
|
|
CpuMpData->CpuData[ProcessorNumber].ApFunctionArgument = 0;
|
2016-11-14 04:43:26 +01:00
|
|
|
ApStartupSignalBuffer = CpuMpData->CpuData[ProcessorNumber].StartupApSignal;
|
|
|
|
CpuInfoInHob[ProcessorNumber].ApTopOfStack = CpuInfoInHob[CpuMpData->NewBspNumber].ApTopOfStack;
|
2016-07-21 15:20:18 +02:00
|
|
|
} else {
|
2017-05-24 07:53:30 +02:00
|
|
|
if ((CpuInfoInHob[ProcessorNumber].ApicId != GetApicId ()) ||
|
|
|
|
(CpuInfoInHob[ProcessorNumber].InitialApicId != GetInitialApicId ()))
|
|
|
|
{
|
|
|
|
if (CurrentApicMode != GetApicMode ()) {
|
|
|
|
//
|
|
|
|
// If APIC mode change happened during AP function execution,
|
|
|
|
// we do not support APIC ID value changed.
|
|
|
|
//
|
|
|
|
ASSERT (FALSE);
|
|
|
|
CpuDeadLoop ();
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// Re-get the CPU APICID and Initial APICID if they are changed
|
|
|
|
//
|
|
|
|
CpuInfoInHob[ProcessorNumber].ApicId = GetApicId ();
|
|
|
|
CpuInfoInHob[ProcessorNumber].InitialApicId = GetInitialApicId ();
|
|
|
|
}
|
|
|
|
}
|
2016-07-21 15:20:18 +02:00
|
|
|
}
|
2016-07-20 18:20:26 +02:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2018-11-02 09:27:48 +01:00
|
|
|
SetApState (&CpuMpData->CpuData[ProcessorNumber], CpuStateFinished);
|
2016-07-20 18:20:26 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-22 18:10:20 +01:00
|
|
|
if (CpuMpData->ApLoopMode == ApInHltLoop) {
|
|
|
|
//
|
|
|
|
// Save AP volatile registers
|
|
|
|
//
|
|
|
|
SaveVolatileRegisters (&CpuMpData->CpuData[ProcessorNumber].VolatileRegisters);
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
|
|
|
// AP finished executing C code
|
|
|
|
//
|
|
|
|
InterlockedIncrement ((UINT32 *)&CpuMpData->FinishedCount);
|
|
|
|
|
2021-01-22 18:10:20 +01:00
|
|
|
if (CpuMpData->InitFlag == ApInitConfig) {
|
|
|
|
//
|
|
|
|
// Delay decrementing the APs executing count when SEV-ES is enabled
|
|
|
|
// to allow the APs to issue an AP_RESET_HOLD before the BSP possibly
|
|
|
|
// performs another INIT-SIPI-SIPI sequence.
|
|
|
|
//
|
2021-12-09 04:28:00 +01:00
|
|
|
if (!CpuMpData->UseSevEsAPMethod) {
|
2021-01-22 18:10:20 +01:00
|
|
|
InterlockedDecrement ((UINT32 *)&CpuMpData->MpCpuExchangeInfo->NumApsExecuting);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
|
|
|
// Place AP is specified loop mode
|
|
|
|
//
|
|
|
|
if (CpuMpData->ApLoopMode == ApInHltLoop) {
|
2023-06-28 10:47:20 +02:00
|
|
|
PlaceAPInHltLoop (CpuMpData);
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
2023-06-28 10:47:20 +02:00
|
|
|
// Never run here
|
2016-07-20 18:20:26 +02:00
|
|
|
//
|
2023-06-28 10:47:21 +02:00
|
|
|
} else {
|
|
|
|
PlaceAPInMwaitLoopOrRunLoop (CpuMpData->ApLoopMode, ApStartupSignalBuffer, CpuMpData->ApTargetCState);
|
2016-07-20 18:20:26 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:24 +02:00
|
|
|
/**
|
|
|
|
This function serves as the entry point for APs when
|
|
|
|
they are awakened by the stores in the memory address
|
|
|
|
indicated by the MP_HANDOFF_INFO structure.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to PEI CPU MP Data
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
DxeApEntryPoint (
|
|
|
|
CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN ProcessorNumber;
|
|
|
|
|
|
|
|
GetProcessorNumber (CpuMpData, &ProcessorNumber);
|
|
|
|
InterlockedIncrement ((UINT32 *)&CpuMpData->FinishedCount);
|
|
|
|
RestoreVolatileRegisters (&CpuMpData->CpuData[0].VolatileRegisters, FALSE);
|
|
|
|
PlaceAPInMwaitLoopOrRunLoop (
|
|
|
|
CpuMpData->ApLoopMode,
|
|
|
|
CpuMpData->CpuData[ProcessorNumber].StartupApSignal,
|
|
|
|
CpuMpData->ApTargetCState
|
|
|
|
);
|
|
|
|
ApWakeupFunction (CpuMpData, ProcessorNumber);
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:23:52 +02:00
|
|
|
/**
|
|
|
|
Wait for AP wakeup and write AP start-up signal till AP is waken up.
|
|
|
|
|
|
|
|
@param[in] ApStartupSignalBuffer Pointer to AP wakeup signal
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
WaitApWakeup (
|
|
|
|
IN volatile UINT32 *ApStartupSignalBuffer
|
|
|
|
)
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// If AP is waken up, StartupApSignal should be cleared.
|
|
|
|
// Otherwise, write StartupApSignal again till AP waken up.
|
|
|
|
//
|
|
|
|
while (InterlockedCompareExchange32 (
|
|
|
|
(UINT32 *)ApStartupSignalBuffer,
|
|
|
|
WAKEUP_AP_SIGNAL,
|
|
|
|
WAKEUP_AP_SIGNAL
|
|
|
|
) != 0)
|
|
|
|
{
|
|
|
|
CpuPause ();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-07 16:25:19 +02:00
|
|
|
/**
|
|
|
|
Calculate the size of the reset vector.
|
|
|
|
|
|
|
|
@param[in] AddressMap The pointer to Address Map structure.
|
|
|
|
@param[out] SizeBelow1Mb Return the size of below 1MB memory for AP reset area.
|
|
|
|
@param[out] SizeAbove1Mb Return the size of abvoe 1MB memory for AP reset area.
|
|
|
|
**/
|
|
|
|
STATIC
|
|
|
|
VOID
|
|
|
|
GetApResetVectorSize (
|
|
|
|
IN MP_ASSEMBLY_ADDRESS_MAP *AddressMap,
|
|
|
|
OUT UINTN *SizeBelow1Mb OPTIONAL,
|
|
|
|
OUT UINTN *SizeAbove1Mb OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
|
|
|
if (SizeBelow1Mb != NULL) {
|
|
|
|
*SizeBelow1Mb = AddressMap->ModeTransitionOffset + sizeof (MP_CPU_EXCHANGE_INFO);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (SizeAbove1Mb != NULL) {
|
|
|
|
*SizeAbove1Mb = AddressMap->RendezvousFunnelSize - AddressMap->ModeTransitionOffset;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:22:21 +02:00
|
|
|
/**
|
|
|
|
This function will fill the exchange info structure.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
FillExchangeInfoData (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
volatile MP_CPU_EXCHANGE_INFO *ExchangeInfo;
|
2017-12-29 02:12:54 +01:00
|
|
|
UINTN Size;
|
|
|
|
IA32_SEGMENT_DESCRIPTOR *Selector;
|
2019-08-01 11:58:24 +02:00
|
|
|
IA32_CR4 Cr4;
|
2016-07-20 18:22:21 +02:00
|
|
|
|
|
|
|
ExchangeInfo = CpuMpData->MpCpuExchangeInfo;
|
|
|
|
ExchangeInfo->StackStart = CpuMpData->Buffer;
|
|
|
|
ExchangeInfo->StackSize = CpuMpData->CpuApStackSize;
|
|
|
|
ExchangeInfo->BufferStart = CpuMpData->WakeupBuffer;
|
|
|
|
ExchangeInfo->ModeOffset = CpuMpData->AddressMap.ModeEntryOffset;
|
|
|
|
|
|
|
|
ExchangeInfo->CodeSegment = AsmReadCs ();
|
|
|
|
ExchangeInfo->DataSegment = AsmReadDs ();
|
|
|
|
|
|
|
|
ExchangeInfo->Cr3 = AsmReadCr3 ();
|
|
|
|
|
|
|
|
ExchangeInfo->CFunction = (UINTN)ApWakeupFunction;
|
2017-10-23 08:45:44 +02:00
|
|
|
ExchangeInfo->ApIndex = 0;
|
2017-10-23 09:02:36 +02:00
|
|
|
ExchangeInfo->NumApsExecuting = 0;
|
2016-11-14 04:09:00 +01:00
|
|
|
ExchangeInfo->InitFlag = (UINTN)CpuMpData->InitFlag;
|
|
|
|
ExchangeInfo->CpuInfo = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
2016-07-20 18:22:21 +02:00
|
|
|
ExchangeInfo->CpuMpData = CpuMpData;
|
|
|
|
|
|
|
|
ExchangeInfo->EnableExecuteDisable = IsBspExecuteDisableEnabled ();
|
|
|
|
|
2017-05-17 21:19:16 +02:00
|
|
|
ExchangeInfo->InitializeFloatingPointUnitsAddress = (UINTN)InitializeFloatingPointUnits;
|
|
|
|
|
2019-08-01 11:58:24 +02:00
|
|
|
//
|
|
|
|
// We can check either CPUID(7).ECX[bit16] or check CR4.LA57[bit12]
|
|
|
|
// to determin whether 5-Level Paging is enabled.
|
|
|
|
// CPUID(7).ECX[bit16] shows CPU's capability, CR4.LA57[bit12] shows
|
|
|
|
// current system setting.
|
|
|
|
// Using latter way is simpler because it also eliminates the needs to
|
|
|
|
// check whether platform wants to enable it.
|
|
|
|
//
|
|
|
|
Cr4.UintN = AsmReadCr4 ();
|
|
|
|
ExchangeInfo->Enable5LevelPaging = (BOOLEAN)(Cr4.Bits.LA57 == 1);
|
|
|
|
DEBUG ((DEBUG_INFO, "%a: 5-Level Paging = %d\n", gEfiCallerBaseName, ExchangeInfo->Enable5LevelPaging));
|
|
|
|
|
2021-12-09 04:27:54 +01:00
|
|
|
ExchangeInfo->SevEsIsEnabled = CpuMpData->SevEsIsEnabled;
|
|
|
|
ExchangeInfo->SevSnpIsEnabled = CpuMpData->SevSnpIsEnabled;
|
|
|
|
ExchangeInfo->GhcbBase = (UINTN)CpuMpData->GhcbBase;
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
|
UefiCpuPkg/MpInitLib: use BSP to do extended topology check
During AP bringup, just after switching to long mode, APs will do some
cpuid calls to verify that the extended topology leaf (0xB) is available
so they can fetch their x2 APIC IDs from it. In the case of SEV-ES,
these cpuid instructions must be handled by direct use of the GHCB MSR
protocol to fetch the values from the hypervisor, since a #VC handler
is not yet available due to the AP's stack not being set up yet.
For SEV-SNP, rather than relying on the GHCB MSR protocol, it is
expected that these values would be obtained from the SEV-SNP CPUID
table instead. The actual x2 APIC ID (and 8-bit APIC IDs) would still
be fetched from hypervisor using the GHCB MSR protocol however, so
introducing support for the SEV-SNP CPUID table in that part of the AP
bring-up code would only be to handle the checks/validation of the
extended topology leaf.
Rather than introducing all the added complexity needed to handle these
checks via the CPUID table, instead let the BSP do the check in advance,
since it can make use of the #VC handler to avoid the need to scan the
SNP CPUID table directly, and add a flag in ExchangeInfo to communicate
the result of this check to APs.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Rahul Kumar <rahul1.kumar@intel.com>
Cc: James Bottomley <jejb@linux.ibm.com>
Cc: Min Xu <min.m.xu@intel.com>
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: Jordan Justen <jordan.l.justen@intel.com>
Cc: Ard Biesheuvel <ardb+tianocore@kernel.org>
Cc: Erdem Aktas <erdemaktas@google.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Acked-by: Gerd Hoffmann <kraxel@redhat.com>
Acked-by: Ray Ni <ray.ni@intel.com>
Suggested-by: Brijesh Singh <brijesh.singh@amd.com>
Signed-off-by: Michael Roth <michael.roth@amd.com>
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
2021-12-09 04:27:55 +01:00
|
|
|
//
|
|
|
|
// Populate SEV-ES specific exchange data.
|
|
|
|
//
|
|
|
|
if (ExchangeInfo->SevSnpIsEnabled) {
|
|
|
|
FillExchangeInfoDataSevEs (ExchangeInfo);
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:22:21 +02:00
|
|
|
//
|
|
|
|
// Get the BSP's data of GDT and IDT
|
|
|
|
//
|
|
|
|
AsmReadGdtr ((IA32_DESCRIPTOR *)&ExchangeInfo->GdtrProfile);
|
|
|
|
AsmReadIdtr ((IA32_DESCRIPTOR *)&ExchangeInfo->IdtrProfile);
|
2017-12-29 02:12:54 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// Find a 32-bit code segment
|
|
|
|
//
|
|
|
|
Selector = (IA32_SEGMENT_DESCRIPTOR *)ExchangeInfo->GdtrProfile.Base;
|
|
|
|
Size = ExchangeInfo->GdtrProfile.Limit + 1;
|
|
|
|
while (Size > 0) {
|
|
|
|
if ((Selector->Bits.L == 0) && (Selector->Bits.Type >= 8)) {
|
|
|
|
ExchangeInfo->ModeTransitionSegment =
|
|
|
|
(UINT16)((UINTN)Selector - ExchangeInfo->GdtrProfile.Base);
|
|
|
|
break;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2017-12-29 02:12:54 +01:00
|
|
|
Selector += 1;
|
|
|
|
Size -= sizeof (IA32_SEGMENT_DESCRIPTOR);
|
|
|
|
}
|
|
|
|
|
2022-05-07 16:25:19 +02:00
|
|
|
ExchangeInfo->ModeTransitionMemory = (UINT32)CpuMpData->WakeupBufferHigh;
|
2018-01-24 13:09:02 +01:00
|
|
|
|
|
|
|
ExchangeInfo->ModeHighMemory = ExchangeInfo->ModeTransitionMemory +
|
|
|
|
(UINT32)ExchangeInfo->ModeOffset -
|
|
|
|
(UINT32)CpuMpData->AddressMap.ModeTransitionOffset;
|
|
|
|
ExchangeInfo->ModeHighSegment = (UINT16)ExchangeInfo->CodeSegment;
|
2016-07-20 18:22:21 +02:00
|
|
|
}
|
|
|
|
|
2016-11-24 12:19:54 +01:00
|
|
|
/**
|
|
|
|
Helper function that waits until the finished AP count reaches the specified
|
|
|
|
limit, or the specified timeout elapses (whichever comes first).
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data.
|
|
|
|
@param[in] FinishedApLimit The number of finished APs to wait for.
|
|
|
|
@param[in] TimeLimit The number of microseconds to wait for.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
TimedWaitForApFinish (
|
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
|
|
|
IN UINT32 FinishedApLimit,
|
|
|
|
IN UINT32 TimeLimit
|
|
|
|
);
|
|
|
|
|
2017-08-04 04:05:20 +02:00
|
|
|
/**
|
|
|
|
Get available system memory below 1MB by specified size.
|
|
|
|
|
|
|
|
@param[in] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
BackupAndPrepareWakeupBuffer (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CopyMem (
|
|
|
|
(VOID *)CpuMpData->BackupBuffer,
|
|
|
|
(VOID *)CpuMpData->WakeupBuffer,
|
|
|
|
CpuMpData->BackupBufferSize
|
|
|
|
);
|
|
|
|
CopyMem (
|
|
|
|
(VOID *)CpuMpData->WakeupBuffer,
|
|
|
|
(VOID *)CpuMpData->AddressMap.RendezvousFunnelAddress,
|
2022-05-07 16:25:19 +02:00
|
|
|
CpuMpData->BackupBufferSize - sizeof (MP_CPU_EXCHANGE_INFO)
|
2017-08-04 04:05:20 +02:00
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Restore wakeup buffer data.
|
|
|
|
|
|
|
|
@param[in] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
RestoreWakeupBuffer (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CopyMem (
|
|
|
|
(VOID *)CpuMpData->WakeupBuffer,
|
|
|
|
(VOID *)CpuMpData->BackupBuffer,
|
|
|
|
CpuMpData->BackupBufferSize
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Allocate reset vector buffer.
|
|
|
|
|
|
|
|
@param[in, out] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
VOID
|
2022-05-08 07:22:49 +02:00
|
|
|
AllocateResetVectorBelow1Mb (
|
2017-08-04 04:05:20 +02:00
|
|
|
IN OUT CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
2021-05-14 22:28:45 +02:00
|
|
|
UINTN ApResetStackSize;
|
2017-08-04 04:05:20 +02:00
|
|
|
|
|
|
|
if (CpuMpData->WakeupBuffer == (UINTN)-1) {
|
2022-05-08 07:22:49 +02:00
|
|
|
CpuMpData->WakeupBuffer = GetWakeupBuffer (CpuMpData->BackupBufferSize);
|
2017-08-04 04:05:20 +02:00
|
|
|
CpuMpData->MpCpuExchangeInfo = (MP_CPU_EXCHANGE_INFO *)(UINTN)
|
2022-05-08 07:22:49 +02:00
|
|
|
(CpuMpData->WakeupBuffer + CpuMpData->BackupBufferSize - sizeof (MP_CPU_EXCHANGE_INFO));
|
|
|
|
DEBUG ((
|
|
|
|
DEBUG_INFO,
|
|
|
|
"AP Vector: 16-bit = %p/%x, ExchangeInfo = %p/%x\n",
|
|
|
|
CpuMpData->WakeupBuffer,
|
|
|
|
CpuMpData->BackupBufferSize - sizeof (MP_CPU_EXCHANGE_INFO),
|
|
|
|
CpuMpData->MpCpuExchangeInfo,
|
|
|
|
sizeof (MP_CPU_EXCHANGE_INFO)
|
|
|
|
));
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
//
|
2021-05-14 22:28:45 +02:00
|
|
|
// The AP reset stack is only used by SEV-ES guests. Do not allocate it
|
2021-12-09 04:28:00 +01:00
|
|
|
// if SEV-ES is not enabled. An SEV-SNP guest is also considered
|
|
|
|
// an SEV-ES guest, but uses a different method of AP startup, eliminating
|
|
|
|
// the need for the allocation.
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
//
|
2021-12-09 04:28:00 +01:00
|
|
|
if (ConfidentialComputingGuestHas (CCAttrAmdSevEs) &&
|
|
|
|
!ConfidentialComputingGuestHas (CCAttrAmdSevSnp))
|
|
|
|
{
|
2021-05-14 22:28:45 +02:00
|
|
|
//
|
|
|
|
// Stack location is based on ProcessorNumber, so use the total number
|
|
|
|
// of processors for calculating the total stack area.
|
|
|
|
//
|
|
|
|
ApResetStackSize = (AP_RESET_STACK_SIZE *
|
|
|
|
PcdGet32 (PcdCpuMaxLogicalProcessorNumber));
|
|
|
|
|
|
|
|
//
|
|
|
|
// Invoke GetWakeupBuffer a second time to allocate the stack area
|
|
|
|
// below 1MB. The returned buffer will be page aligned and sized and
|
|
|
|
// below the previously allocated buffer.
|
|
|
|
//
|
|
|
|
CpuMpData->SevEsAPResetStackStart = GetWakeupBuffer (ApResetStackSize);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check to be sure that the "allocate below" behavior hasn't changed.
|
|
|
|
// This will also catch a failed allocation, as "-1" is returned on
|
|
|
|
// failure.
|
|
|
|
//
|
|
|
|
if (CpuMpData->SevEsAPResetStackStart >= CpuMpData->WakeupBuffer) {
|
|
|
|
DEBUG ((
|
|
|
|
DEBUG_ERROR,
|
|
|
|
"SEV-ES AP reset stack is not below wakeup buffer\n"
|
|
|
|
));
|
|
|
|
|
|
|
|
ASSERT (FALSE);
|
|
|
|
CpuDeadLoop ();
|
|
|
|
}
|
|
|
|
}
|
2017-08-04 04:05:20 +02:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2017-08-04 04:05:20 +02:00
|
|
|
BackupAndPrepareWakeupBuffer (CpuMpData);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Free AP reset vector buffer.
|
|
|
|
|
|
|
|
@param[in] CpuMpData The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
FreeResetVector (
|
|
|
|
IN CPU_MP_DATA *CpuMpData
|
|
|
|
)
|
|
|
|
{
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
//
|
|
|
|
// If SEV-ES is enabled, the reset area is needed for AP parking and
|
|
|
|
// and AP startup in the OS, so the reset area is reserved. Do not
|
|
|
|
// perform the restore as this will overwrite memory which has data
|
|
|
|
// needed by SEV-ES.
|
|
|
|
//
|
2021-12-09 04:28:00 +01:00
|
|
|
if (!CpuMpData->UseSevEsAPMethod) {
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
RestoreWakeupBuffer (CpuMpData);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:23:52 +02:00
|
|
|
/**
|
|
|
|
This function will be called by BSP to wakeup AP.
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data
|
|
|
|
@param[in] Broadcast TRUE: Send broadcast IPI to all APs
|
|
|
|
FALSE: Send IPI to AP by ApicId
|
|
|
|
@param[in] ProcessorNumber The handle number of specified processor
|
|
|
|
@param[in] Procedure The function to be invoked by AP
|
|
|
|
@param[in] ProcedureArgument The argument to be passed into AP function
|
2018-07-26 10:44:22 +02:00
|
|
|
@param[in] WakeUpDisabledAps Whether need to wake up disabled APs in broadcast mode.
|
2016-07-20 18:23:52 +02:00
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
WakeUpAP (
|
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
|
|
|
IN BOOLEAN Broadcast,
|
|
|
|
IN UINTN ProcessorNumber,
|
2021-12-03 03:01:00 +01:00
|
|
|
IN EFI_AP_PROCEDURE Procedure OPTIONAL,
|
|
|
|
IN VOID *ProcedureArgument OPTIONAL,
|
2018-07-26 10:44:22 +02:00
|
|
|
IN BOOLEAN WakeUpDisabledAps
|
2016-07-20 18:23:52 +02:00
|
|
|
)
|
|
|
|
{
|
|
|
|
volatile MP_CPU_EXCHANGE_INFO *ExchangeInfo;
|
|
|
|
UINTN Index;
|
|
|
|
CPU_AP_DATA *CpuData;
|
|
|
|
BOOLEAN ResetVectorRequired;
|
2016-11-14 03:49:51 +01:00
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
2016-07-20 18:23:52 +02:00
|
|
|
|
|
|
|
CpuMpData->FinishedCount = 0;
|
|
|
|
ResetVectorRequired = FALSE;
|
|
|
|
|
2018-06-27 10:42:51 +02:00
|
|
|
if (CpuMpData->WakeUpByInitSipiSipi ||
|
2016-07-20 18:23:52 +02:00
|
|
|
(CpuMpData->InitFlag != ApInitDone))
|
|
|
|
{
|
|
|
|
ResetVectorRequired = TRUE;
|
2022-05-08 07:22:49 +02:00
|
|
|
AllocateResetVectorBelow1Mb (CpuMpData);
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
AllocateSevEsAPMemory (CpuMpData);
|
2016-07-20 18:23:52 +02:00
|
|
|
FillExchangeInfoData (CpuMpData);
|
2016-12-26 09:44:24 +01:00
|
|
|
SaveLocalApicTimerSetting (CpuMpData);
|
2018-06-27 10:42:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (CpuMpData->ApLoopMode == ApInMwaitLoop) {
|
2016-07-20 18:23:52 +02:00
|
|
|
//
|
|
|
|
// Get AP target C-state each time when waking up AP,
|
|
|
|
// for it maybe updated by platform again
|
|
|
|
//
|
|
|
|
CpuMpData->ApTargetCState = PcdGet8 (PcdCpuApTargetCstate);
|
|
|
|
}
|
|
|
|
|
|
|
|
ExchangeInfo = CpuMpData->MpCpuExchangeInfo;
|
|
|
|
|
|
|
|
if (Broadcast) {
|
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
if (Index != CpuMpData->BspNumber) {
|
|
|
|
CpuData = &CpuMpData->CpuData[Index];
|
2018-07-26 10:44:22 +02:00
|
|
|
//
|
|
|
|
// All AP(include disabled AP) will be woke up by INIT-SIPI-SIPI, but
|
2018-09-05 08:22:18 +02:00
|
|
|
// the AP procedure will be skipped for disabled AP because AP state
|
2018-07-26 10:44:22 +02:00
|
|
|
// is not CpuStateReady.
|
|
|
|
//
|
|
|
|
if ((GetApState (CpuData) == CpuStateDisabled) && !WakeUpDisabledAps) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:23:52 +02:00
|
|
|
CpuData->ApFunction = (UINTN)Procedure;
|
|
|
|
CpuData->ApFunctionArgument = (UINTN)ProcedureArgument;
|
|
|
|
SetApState (CpuData, CpuStateReady);
|
|
|
|
if (CpuMpData->InitFlag != ApInitConfig) {
|
|
|
|
*(UINT32 *)CpuData->StartupApSignal = WAKEUP_AP_SIGNAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-20 18:23:52 +02:00
|
|
|
if (ResetVectorRequired) {
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
//
|
2021-12-09 04:28:00 +01:00
|
|
|
// For SEV-ES and SEV-SNP, the initial AP boot address will be defined by
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
// PcdSevEsWorkAreaBase. The Segment/Rip must be the jump address
|
|
|
|
// from the original INIT-SIPI-SIPI.
|
|
|
|
//
|
|
|
|
if (CpuMpData->SevEsIsEnabled) {
|
|
|
|
SetSevEsJumpTable (ExchangeInfo->BufferStart);
|
|
|
|
}
|
|
|
|
|
2016-07-20 18:23:52 +02:00
|
|
|
//
|
|
|
|
// Wakeup all APs
|
2021-12-09 04:28:00 +01:00
|
|
|
// Must use the INIT-SIPI-SIPI method for initial configuration in
|
|
|
|
// order to obtain the APIC ID.
|
2016-07-20 18:23:52 +02:00
|
|
|
//
|
2021-12-09 04:28:00 +01:00
|
|
|
if (CpuMpData->SevSnpIsEnabled && (CpuMpData->InitFlag != ApInitConfig)) {
|
|
|
|
SevSnpCreateAP (CpuMpData, -1);
|
|
|
|
} else {
|
2023-07-18 11:59:30 +02:00
|
|
|
if ((CpuMpData->InitFlag == ApInitConfig) && FixedPcdGetBool (PcdFirstTimeWakeUpAPsBySipi)) {
|
|
|
|
//
|
|
|
|
// SIPI can be used for the first time wake up after reset to reduce boot time.
|
|
|
|
//
|
|
|
|
SendStartupIpiAllExcludingSelf ((UINT32)ExchangeInfo->BufferStart);
|
|
|
|
} else {
|
|
|
|
SendInitSipiSipiAllExcludingSelf ((UINT32)ExchangeInfo->BufferStart);
|
|
|
|
}
|
2021-12-09 04:28:00 +01:00
|
|
|
}
|
2016-07-20 18:23:52 +02:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-08-24 15:37:14 +02:00
|
|
|
if (CpuMpData->InitFlag == ApInitConfig) {
|
UefiCpuPkg/MpInitLib: honor the platform's boot CPU count in AP detection
- If a platform boots such that the boot CPU count is smaller than
PcdCpuMaxLogicalProcessorNumber, then the platform cannot use the "fast
AP detection" logic added in commit 6e1987f19af7. (Which has been
documented as a subset of use case (2) in the previous patch.)
Said logic depends on the boot CPU count being equal to
PcdCpuMaxLogicalProcessorNumber. If the equality does not hold, the
platform either has to wait too long, or risk missing APs due to an
early timeout.
- The platform may not be able to use the variant added in commit
0594ec417c89 either. (Which has been documented as use case (1) in the
previous patch.)
See commit 861218740d6d. When OVMF runs on QEMU/KVM, APs may check in
with the BSP in arbitrary order, plus the individual AP may take
arbitrarily long to check-in. If "NumApsExecuting" falls to zero
mid-enumeration, APs will be missed.
Allow platforms to specify the exact boot CPU count, independently of
PcdCpuMaxLogicalProcessorNumber. In this mode, the BSP waits for all APs
to check-in regardless of timeout. If at least one AP fails to check-in,
then the AP enumeration hangs forever. That is the desired behavior when
the exact boot CPU count is known in advance. (A hung boot is better than
an AP checking-in after timeout, and executing code from released
storage.)
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1515
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Ray Ni <ray.ni@intel.com>
2019-10-07 14:05:28 +02:00
|
|
|
if (PcdGet32 (PcdCpuBootLogicalProcessorNumber) > 0) {
|
|
|
|
//
|
|
|
|
// The AP enumeration algorithm below is suitable only when the
|
|
|
|
// platform can tell us the *exact* boot CPU count in advance.
|
|
|
|
//
|
|
|
|
// The wait below finishes only when the detected AP count reaches
|
|
|
|
// (PcdCpuBootLogicalProcessorNumber - 1), regardless of how long that
|
|
|
|
// takes. If at least one AP fails to check in (meaning a platform
|
|
|
|
// hardware bug), the detection hangs forever, by design. If the actual
|
|
|
|
// boot CPU count in the system is higher than
|
|
|
|
// PcdCpuBootLogicalProcessorNumber (meaning a platform
|
|
|
|
// misconfiguration), then some APs may complete initialization after
|
|
|
|
// the wait finishes, and cause undefined behavior.
|
|
|
|
//
|
|
|
|
TimedWaitForApFinish (
|
|
|
|
CpuMpData,
|
|
|
|
PcdGet32 (PcdCpuBootLogicalProcessorNumber) - 1,
|
|
|
|
MAX_UINT32 // approx. 71 minutes
|
|
|
|
);
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// The AP enumeration algorithm below is suitable for two use cases.
|
|
|
|
//
|
|
|
|
// (1) The check-in time for an individual AP is bounded, and APs run
|
|
|
|
// through their initialization routines strongly concurrently. In
|
|
|
|
// particular, the number of concurrently running APs
|
|
|
|
// ("NumApsExecuting") is never expected to fall to zero
|
|
|
|
// *temporarily* -- it is expected to fall to zero only when all
|
|
|
|
// APs have checked-in.
|
|
|
|
//
|
|
|
|
// In this case, the platform is supposed to set
|
|
|
|
// PcdCpuApInitTimeOutInMicroSeconds to a low-ish value (just long
|
|
|
|
// enough for one AP to start initialization). The timeout will be
|
|
|
|
// reached soon, and remaining APs are collected by watching
|
|
|
|
// NumApsExecuting fall to zero. If NumApsExecuting falls to zero
|
|
|
|
// mid-process, while some APs have not completed initialization,
|
|
|
|
// the behavior is undefined.
|
|
|
|
//
|
|
|
|
// (2) The check-in time for an individual AP is unbounded, and/or APs
|
|
|
|
// may complete their initializations widely spread out. In
|
|
|
|
// particular, some APs may finish initialization before some APs
|
|
|
|
// even start.
|
|
|
|
//
|
|
|
|
// In this case, the platform is supposed to set
|
|
|
|
// PcdCpuApInitTimeOutInMicroSeconds to a high-ish value. The AP
|
|
|
|
// enumeration will always take that long (except when the boot CPU
|
|
|
|
// count happens to be maximal, that is,
|
|
|
|
// PcdCpuMaxLogicalProcessorNumber). All APs are expected to
|
|
|
|
// check-in before the timeout, and NumApsExecuting is assumed zero
|
|
|
|
// at timeout. APs that miss the time-out may cause undefined
|
|
|
|
// behavior.
|
|
|
|
//
|
|
|
|
TimedWaitForApFinish (
|
|
|
|
CpuMpData,
|
|
|
|
PcdGet32 (PcdCpuMaxLogicalProcessorNumber) - 1,
|
|
|
|
PcdGet32 (PcdCpuApInitTimeOutInMicroSeconds)
|
|
|
|
);
|
2017-10-23 09:02:36 +02:00
|
|
|
|
UefiCpuPkg/MpInitLib: honor the platform's boot CPU count in AP detection
- If a platform boots such that the boot CPU count is smaller than
PcdCpuMaxLogicalProcessorNumber, then the platform cannot use the "fast
AP detection" logic added in commit 6e1987f19af7. (Which has been
documented as a subset of use case (2) in the previous patch.)
Said logic depends on the boot CPU count being equal to
PcdCpuMaxLogicalProcessorNumber. If the equality does not hold, the
platform either has to wait too long, or risk missing APs due to an
early timeout.
- The platform may not be able to use the variant added in commit
0594ec417c89 either. (Which has been documented as use case (1) in the
previous patch.)
See commit 861218740d6d. When OVMF runs on QEMU/KVM, APs may check in
with the BSP in arbitrary order, plus the individual AP may take
arbitrarily long to check-in. If "NumApsExecuting" falls to zero
mid-enumeration, APs will be missed.
Allow platforms to specify the exact boot CPU count, independently of
PcdCpuMaxLogicalProcessorNumber. In this mode, the BSP waits for all APs
to check-in regardless of timeout. If at least one AP fails to check-in,
then the AP enumeration hangs forever. That is the desired behavior when
the exact boot CPU count is known in advance. (A hung boot is better than
an AP checking-in after timeout, and executing code from released
storage.)
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1515
Signed-off-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Ray Ni <ray.ni@intel.com>
2019-10-07 14:05:28 +02:00
|
|
|
while (CpuMpData->MpCpuExchangeInfo->NumApsExecuting != 0) {
|
|
|
|
CpuPause ();
|
|
|
|
}
|
2017-10-23 09:02:36 +02:00
|
|
|
}
|
2016-08-24 15:37:14 +02:00
|
|
|
} else {
|
2016-07-20 18:23:52 +02:00
|
|
|
//
|
|
|
|
// Wait all APs waken up if this is not the 1st broadcast of SIPI
|
|
|
|
//
|
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
CpuData = &CpuMpData->CpuData[Index];
|
|
|
|
if (Index != CpuMpData->BspNumber) {
|
|
|
|
WaitApWakeup (CpuData->StartupApSignal);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
CpuData = &CpuMpData->CpuData[ProcessorNumber];
|
|
|
|
CpuData->ApFunction = (UINTN)Procedure;
|
|
|
|
CpuData->ApFunctionArgument = (UINTN)ProcedureArgument;
|
|
|
|
SetApState (CpuData, CpuStateReady);
|
|
|
|
//
|
|
|
|
// Wakeup specified AP
|
|
|
|
//
|
|
|
|
ASSERT (CpuMpData->InitFlag != ApInitConfig);
|
|
|
|
*(UINT32 *)CpuData->StartupApSignal = WAKEUP_AP_SIGNAL;
|
|
|
|
if (ResetVectorRequired) {
|
2016-11-14 03:49:51 +01:00
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
|
|
|
|
//
|
2021-12-09 04:28:00 +01:00
|
|
|
// For SEV-ES and SEV-SNP, the initial AP boot address will be defined by
|
UefiCpuPkg: Allow AP booting under SEV-ES
BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=2198
Typically, an AP is booted using the INIT-SIPI-SIPI sequence. This
sequence is intercepted by the hypervisor, which sets the AP's registers
to the values requested by the sequence. At that point, the hypervisor can
start the AP, which will then begin execution at the appropriate location.
Under SEV-ES, AP booting presents some challenges since the hypervisor is
not allowed to alter the AP's register state. In this situation, we have
to distinguish between the AP's first boot and AP's subsequent boots.
First boot:
Once the AP's register state has been defined (which is before the guest
is first booted) it cannot be altered. Should the hypervisor attempt to
alter the register state, the change would be detected by the hardware
and the VMRUN instruction would fail. Given this, the first boot for the
AP is required to begin execution with this initial register state, which
is typically the reset vector. This prevents the BSP from directing the
AP startup location through the INIT-SIPI-SIPI sequence.
To work around this, the firmware will provide a build time reserved area
that can be used as the initial IP value. The hypervisor can extract this
location value by checking for the SEV-ES reset block GUID that must be
located 48-bytes from the end of the firmware. The format of the SEV-ES
reset block area is:
0x00 - 0x01 - SEV-ES Reset IP
0x02 - 0x03 - SEV-ES Reset CS Segment Base[31:16]
0x04 - 0x05 - Size of the SEV-ES reset block
0x06 - 0x15 - SEV-ES Reset Block GUID
(00f771de-1a7e-4fcb-890e-68c77e2fb44e)
The total size is 22 bytes. Any expansion to this block must be done
by adding new values before existing values.
The hypervisor will use the IP and CS values obtained from the SEV-ES
reset block to set as the AP's initial values. The CS Segment Base
represents the upper 16 bits of the CS segment base and must be left
shifted by 16 bits to form the complete CS segment base value.
Before booting the AP for the first time, the BSP must initialize the
SEV-ES reset area. This consists of programming a FAR JMP instruction
to the contents of a memory location that is also located in the SEV-ES
reset area. The BSP must program the IP and CS values for the FAR JMP
based on values drived from the INIT-SIPI-SIPI sequence.
Subsequent boots:
Again, the hypervisor cannot alter the AP register state, so a method is
required to take the AP out of halt state and redirect it to the desired
IP location. If it is determined that the AP is running in an SEV-ES
guest, then instead of calling CpuSleep(), a VMGEXIT is issued with the
AP Reset Hold exit code (0x80000004). The hypervisor will put the AP in
a halt state, waiting for an INIT-SIPI-SIPI sequence. Once the sequence
is recognized, the hypervisor will resume the AP. At this point the AP
must transition from the current 64-bit long mode down to 16-bit real
mode and begin executing at the derived location from the INIT-SIPI-SIPI
sequence.
Another change is around the area of obtaining the (x2)APIC ID during AP
startup. During AP startup, the AP can't take a #VC exception before the
AP has established a stack. However, the AP stack is set by using the
(x2)APIC ID, which is obtained through CPUID instructions. A CPUID
instruction will cause a #VC, so a different method must be used. The
GHCB protocol supports a method to obtain CPUID information from the
hypervisor through the GHCB MSR. This method does not require a stack,
so it is used to obtain the necessary CPUID information to determine the
(x2)APIC ID.
The new 16-bit protected mode GDT entry is used in order to transition
from 64-bit long mode down to 16-bit real mode.
A new assembler routine is created that takes the AP from 64-bit long mode
to 16-bit real mode. This is located under 1MB in memory and transitions
from 64-bit long mode to 32-bit compatibility mode to 16-bit protected
mode and finally 16-bit real mode.
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
2020-08-12 22:21:42 +02:00
|
|
|
// PcdSevEsWorkAreaBase. The Segment/Rip must be the jump address
|
|
|
|
// from the original INIT-SIPI-SIPI.
|
|
|
|
//
|
|
|
|
if (CpuMpData->SevEsIsEnabled) {
|
|
|
|
SetSevEsJumpTable (ExchangeInfo->BufferStart);
|
|
|
|
}
|
|
|
|
|
2021-12-09 04:28:00 +01:00
|
|
|
if (CpuMpData->SevSnpIsEnabled && (CpuMpData->InitFlag != ApInitConfig)) {
|
|
|
|
SevSnpCreateAP (CpuMpData, (INTN)ProcessorNumber);
|
|
|
|
} else {
|
|
|
|
SendInitSipiSipi (
|
|
|
|
CpuInfoInHob[ProcessorNumber].ApicId,
|
|
|
|
(UINT32)ExchangeInfo->BufferStart
|
|
|
|
);
|
|
|
|
}
|
2016-07-20 18:23:52 +02:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-20 18:23:52 +02:00
|
|
|
//
|
|
|
|
// Wait specified AP waken up
|
|
|
|
//
|
|
|
|
WaitApWakeup (CpuData->StartupApSignal);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ResetVectorRequired) {
|
|
|
|
FreeResetVector (CpuMpData);
|
|
|
|
}
|
2018-06-27 10:42:51 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// After one round of Wakeup Ap actions, need to re-sync ApLoopMode with
|
|
|
|
// WakeUpByInitSipiSipi flag. WakeUpByInitSipiSipi flag maybe changed by
|
|
|
|
// S3SmmInitDone Ppi.
|
|
|
|
//
|
|
|
|
CpuMpData->WakeUpByInitSipiSipi = (CpuMpData->ApLoopMode == ApInHltLoop);
|
2016-07-20 18:23:52 +02:00
|
|
|
}
|
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
/**
|
|
|
|
Calculate timeout value and return the current performance counter value.
|
|
|
|
|
|
|
|
Calculate the number of performance counter ticks required for a timeout.
|
|
|
|
If TimeoutInMicroseconds is 0, return value is also 0, which is recognized
|
|
|
|
as infinity.
|
|
|
|
|
|
|
|
@param[in] TimeoutInMicroseconds Timeout value in microseconds.
|
|
|
|
@param[out] CurrentTime Returns the current value of the performance counter.
|
|
|
|
|
|
|
|
@return Expected time stamp counter for timeout.
|
|
|
|
If TimeoutInMicroseconds is 0, return value is also 0, which is recognized
|
|
|
|
as infinity.
|
|
|
|
|
|
|
|
**/
|
|
|
|
UINT64
|
|
|
|
CalculateTimeout (
|
|
|
|
IN UINTN TimeoutInMicroseconds,
|
|
|
|
OUT UINT64 *CurrentTime
|
|
|
|
)
|
|
|
|
{
|
2017-08-21 08:40:44 +02:00
|
|
|
UINT64 TimeoutInSeconds;
|
|
|
|
UINT64 TimestampCounterFreq;
|
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
//
|
|
|
|
// Read the current value of the performance counter
|
|
|
|
//
|
|
|
|
*CurrentTime = GetPerformanceCounter ();
|
|
|
|
|
|
|
|
//
|
|
|
|
// If TimeoutInMicroseconds is 0, return value is also 0, which is recognized
|
|
|
|
// as infinity.
|
|
|
|
//
|
|
|
|
if (TimeoutInMicroseconds == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// GetPerformanceCounterProperties () returns the timestamp counter's frequency
|
2018-06-27 15:14:20 +02:00
|
|
|
// in Hz.
|
2017-08-21 08:40:44 +02:00
|
|
|
//
|
|
|
|
TimestampCounterFreq = GetPerformanceCounterProperties (NULL, NULL);
|
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
//
|
2017-08-21 08:40:44 +02:00
|
|
|
// Check the potential overflow before calculate the number of ticks for the timeout value.
|
|
|
|
//
|
|
|
|
if (DivU64x64Remainder (MAX_UINT64, TimeoutInMicroseconds, NULL) < TimestampCounterFreq) {
|
|
|
|
//
|
|
|
|
// Convert microseconds into seconds if direct multiplication overflows
|
|
|
|
//
|
|
|
|
TimeoutInSeconds = DivU64x32 (TimeoutInMicroseconds, 1000000);
|
|
|
|
//
|
|
|
|
// Assertion if the final tick count exceeds MAX_UINT64
|
|
|
|
//
|
|
|
|
ASSERT (DivU64x64Remainder (MAX_UINT64, TimeoutInSeconds, NULL) >= TimestampCounterFreq);
|
|
|
|
return MultU64x64 (TimestampCounterFreq, TimeoutInSeconds);
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// No overflow case, multiply the return value with TimeoutInMicroseconds and then divide
|
|
|
|
// it by 1,000,000, to get the number of ticks for the timeout value.
|
|
|
|
//
|
|
|
|
return DivU64x32 (
|
|
|
|
MultU64x64 (
|
|
|
|
TimestampCounterFreq,
|
|
|
|
TimeoutInMicroseconds
|
|
|
|
),
|
|
|
|
1000000
|
|
|
|
);
|
|
|
|
}
|
2016-07-21 15:28:16 +02:00
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:24 +02:00
|
|
|
/**
|
|
|
|
Switch Context for each AP.
|
|
|
|
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
EFIAPI
|
|
|
|
SwitchContextPerAp (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN ProcessorNumber;
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
|
|
|
GetProcessorNumber (CpuMpData, &ProcessorNumber);
|
|
|
|
|
|
|
|
SwitchStack (
|
|
|
|
(SWITCH_STACK_ENTRY_POINT)(UINTN)DxeApEntryPoint,
|
|
|
|
(VOID *)(UINTN)CpuMpData,
|
|
|
|
NULL,
|
|
|
|
(VOID *)((UINTN)CpuInfoInHob[ProcessorNumber].ApTopOfStack)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
/**
|
|
|
|
Checks whether timeout expires.
|
|
|
|
|
|
|
|
Check whether the number of elapsed performance counter ticks required for
|
|
|
|
a timeout condition has been reached.
|
|
|
|
If Timeout is zero, which means infinity, return value is always FALSE.
|
|
|
|
|
|
|
|
@param[in, out] PreviousTime On input, the value of the performance counter
|
|
|
|
when it was last read.
|
|
|
|
On output, the current value of the performance
|
|
|
|
counter
|
|
|
|
@param[in] TotalTime The total amount of elapsed time in performance
|
|
|
|
counter ticks.
|
|
|
|
@param[in] Timeout The number of performance counter ticks required
|
|
|
|
to reach a timeout condition.
|
|
|
|
|
|
|
|
@retval TRUE A timeout condition has been reached.
|
|
|
|
@retval FALSE A timeout condition has not been reached.
|
|
|
|
|
|
|
|
**/
|
|
|
|
BOOLEAN
|
|
|
|
CheckTimeout (
|
|
|
|
IN OUT UINT64 *PreviousTime,
|
|
|
|
IN UINT64 *TotalTime,
|
|
|
|
IN UINT64 Timeout
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT64 Start;
|
|
|
|
UINT64 End;
|
|
|
|
UINT64 CurrentTime;
|
|
|
|
INT64 Delta;
|
|
|
|
INT64 Cycle;
|
|
|
|
|
|
|
|
if (Timeout == 0) {
|
|
|
|
return FALSE;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
GetPerformanceCounterProperties (&Start, &End);
|
|
|
|
Cycle = End - Start;
|
|
|
|
if (Cycle < 0) {
|
|
|
|
Cycle = -Cycle;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
Cycle++;
|
|
|
|
CurrentTime = GetPerformanceCounter ();
|
|
|
|
Delta = (INT64)(CurrentTime - *PreviousTime);
|
|
|
|
if (Start > End) {
|
|
|
|
Delta = -Delta;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
if (Delta < 0) {
|
|
|
|
Delta += Cycle;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
*TotalTime += Delta;
|
|
|
|
*PreviousTime = CurrentTime;
|
|
|
|
if (*TotalTime > Timeout) {
|
|
|
|
return TRUE;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2016-11-24 12:19:54 +01:00
|
|
|
/**
|
|
|
|
Helper function that waits until the finished AP count reaches the specified
|
|
|
|
limit, or the specified timeout elapses (whichever comes first).
|
|
|
|
|
|
|
|
@param[in] CpuMpData Pointer to CPU MP Data.
|
|
|
|
@param[in] FinishedApLimit The number of finished APs to wait for.
|
|
|
|
@param[in] TimeLimit The number of microseconds to wait for.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
TimedWaitForApFinish (
|
|
|
|
IN CPU_MP_DATA *CpuMpData,
|
|
|
|
IN UINT32 FinishedApLimit,
|
|
|
|
IN UINT32 TimeLimit
|
|
|
|
)
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// CalculateTimeout() and CheckTimeout() consider a TimeLimit of 0
|
|
|
|
// "infinity", so check for (TimeLimit == 0) explicitly.
|
|
|
|
//
|
|
|
|
if (TimeLimit == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
CpuMpData->TotalTime = 0;
|
|
|
|
CpuMpData->ExpectedTime = CalculateTimeout (
|
|
|
|
TimeLimit,
|
|
|
|
&CpuMpData->CurrentTime
|
|
|
|
);
|
|
|
|
while (CpuMpData->FinishedCount < FinishedApLimit &&
|
|
|
|
!CheckTimeout (
|
|
|
|
&CpuMpData->CurrentTime,
|
|
|
|
&CpuMpData->TotalTime,
|
|
|
|
CpuMpData->ExpectedTime
|
|
|
|
))
|
|
|
|
{
|
|
|
|
CpuPause ();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (CpuMpData->FinishedCount >= FinishedApLimit) {
|
|
|
|
DEBUG ((
|
|
|
|
DEBUG_VERBOSE,
|
|
|
|
"%a: reached FinishedApLimit=%u in %Lu microseconds\n",
|
2023-04-06 21:49:10 +02:00
|
|
|
__func__,
|
2016-11-24 12:19:54 +01:00
|
|
|
FinishedApLimit,
|
|
|
|
DivU64x64Remainder (
|
|
|
|
MultU64x32 (CpuMpData->TotalTime, 1000000),
|
|
|
|
GetPerformanceCounterProperties (NULL, NULL),
|
|
|
|
NULL
|
|
|
|
)
|
|
|
|
));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
/**
|
|
|
|
Reset an AP to Idle state.
|
|
|
|
|
|
|
|
Any task being executed by the AP will be aborted and the AP
|
|
|
|
will be waiting for a new task in Wait-For-SIPI state.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of processor.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
ResetProcessorToIdleState (
|
|
|
|
IN UINTN ProcessorNumber
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
2016-11-14 03:30:03 +01:00
|
|
|
CpuMpData->InitFlag = ApInitReconfig;
|
2018-07-26 10:44:22 +02:00
|
|
|
WakeUpAP (CpuMpData, FALSE, ProcessorNumber, NULL, NULL, TRUE);
|
2016-11-14 03:30:03 +01:00
|
|
|
while (CpuMpData->FinishedCount < 1) {
|
|
|
|
CpuPause ();
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-11-14 03:30:03 +01:00
|
|
|
CpuMpData->InitFlag = ApInitDone;
|
2016-07-21 15:28:16 +02:00
|
|
|
|
|
|
|
SetApState (&CpuMpData->CpuData[ProcessorNumber], CpuStateIdle);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Searches for the next waiting AP.
|
|
|
|
|
|
|
|
Search for the next AP that is put in waiting state by single-threaded StartupAllAPs().
|
|
|
|
|
|
|
|
@param[out] NextProcessorNumber Pointer to the processor number of the next waiting AP.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS The next waiting AP has been found.
|
|
|
|
@retval EFI_NOT_FOUND No waiting AP exists.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
GetNextWaitingProcessorNumber (
|
|
|
|
OUT UINTN *NextProcessorNumber
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN ProcessorNumber;
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
|
|
|
for (ProcessorNumber = 0; ProcessorNumber < CpuMpData->CpuCount; ProcessorNumber++) {
|
|
|
|
if (CpuMpData->CpuData[ProcessorNumber].Waiting) {
|
|
|
|
*NextProcessorNumber = ProcessorNumber;
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Checks status of specified AP.
|
|
|
|
|
|
|
|
This function checks whether the specified AP has finished the task assigned
|
|
|
|
by StartupThisAP(), and whether timeout expires.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of processor.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Specified AP has finished task assigned by StartupThisAPs().
|
|
|
|
@retval EFI_TIMEOUT The timeout expires.
|
|
|
|
@retval EFI_NOT_READY Specified AP has not finished task and timeout has not expired.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
CheckThisAP (
|
|
|
|
IN UINTN ProcessorNumber
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
CPU_AP_DATA *CpuData;
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
CpuData = &CpuMpData->CpuData[ProcessorNumber];
|
|
|
|
|
|
|
|
//
|
2018-07-24 16:25:41 +02:00
|
|
|
// Check the CPU state of AP. If it is CpuStateIdle, then the AP has finished its task.
|
2016-07-21 15:28:16 +02:00
|
|
|
// Only BSP and corresponding AP access this unit of CPU Data. This means the AP will not modify the
|
2018-07-24 16:25:41 +02:00
|
|
|
// value of state after setting the it to CpuStateIdle, so BSP can safely make use of its value.
|
2016-07-21 15:28:16 +02:00
|
|
|
//
|
|
|
|
//
|
|
|
|
// If the AP finishes for StartupThisAP(), return EFI_SUCCESS.
|
|
|
|
//
|
2018-11-02 09:27:48 +01:00
|
|
|
if (GetApState (CpuData) == CpuStateFinished) {
|
2016-07-21 15:28:16 +02:00
|
|
|
if (CpuData->Finished != NULL) {
|
|
|
|
*(CpuData->Finished) = TRUE;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2018-11-02 09:27:48 +01:00
|
|
|
SetApState (CpuData, CpuStateIdle);
|
2016-07-21 15:28:16 +02:00
|
|
|
return EFI_SUCCESS;
|
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// If timeout expires for StartupThisAP(), report timeout.
|
|
|
|
//
|
|
|
|
if (CheckTimeout (&CpuData->CurrentTime, &CpuData->TotalTime, CpuData->ExpectedTime)) {
|
|
|
|
if (CpuData->Finished != NULL) {
|
|
|
|
*(CpuData->Finished) = FALSE;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
//
|
|
|
|
// Reset failed AP to idle state
|
|
|
|
//
|
|
|
|
ResetProcessorToIdleState (ProcessorNumber);
|
|
|
|
|
|
|
|
return EFI_TIMEOUT;
|
|
|
|
}
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
return EFI_NOT_READY;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Checks status of all APs.
|
|
|
|
|
|
|
|
This function checks whether all APs have finished task assigned by StartupAllAPs(),
|
|
|
|
and whether timeout expires.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS All APs have finished task assigned by StartupAllAPs().
|
|
|
|
@retval EFI_TIMEOUT The timeout expires.
|
|
|
|
@retval EFI_NOT_READY APs have not finished task and timeout has not expired.
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
CheckAllAPs (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN ProcessorNumber;
|
|
|
|
UINTN NextProcessorNumber;
|
|
|
|
UINTN ListIndex;
|
|
|
|
EFI_STATUS Status;
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
CPU_AP_DATA *CpuData;
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
|
|
|
NextProcessorNumber = 0;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Go through all APs that are responsible for the StartupAllAPs().
|
|
|
|
//
|
|
|
|
for (ProcessorNumber = 0; ProcessorNumber < CpuMpData->CpuCount; ProcessorNumber++) {
|
|
|
|
if (!CpuMpData->CpuData[ProcessorNumber].Waiting) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
CpuData = &CpuMpData->CpuData[ProcessorNumber];
|
|
|
|
//
|
2018-07-24 16:25:41 +02:00
|
|
|
// Check the CPU state of AP. If it is CpuStateIdle, then the AP has finished its task.
|
2016-07-21 15:28:16 +02:00
|
|
|
// Only BSP and corresponding AP access this unit of CPU Data. This means the AP will not modify the
|
2018-07-24 16:25:41 +02:00
|
|
|
// value of state after setting the it to CpuStateIdle, so BSP can safely make use of its value.
|
2016-07-21 15:28:16 +02:00
|
|
|
//
|
2018-11-02 09:27:48 +01:00
|
|
|
if (GetApState (CpuData) == CpuStateFinished) {
|
UefiCpuPkg/MpInitLib: Remove StartCount and volatile definition.
The patch includes below changes:
(1) It removes "volatile" from RunningCount, because only the BSP modifies it.
(2) When we detect a timeout in CheckAllAPs(), and collect the list of failed CPUs, the size of the list is derived from the following difference, before the patch:
StartCount - FinishedCount
where "StartCount" is set by the BSP at startup, and FinishedCount is incremented by the APs themselves.
Here the patch replaces this difference with
StartCount - RunningCount
that is, the difference is no more calculated from the BSP's startup counter and the AP's shared finish counter, but from the RunningCount measurement that the BSP does itself, in CheckAllAPs().
(3) Finally, the patch changes the meaning of RunningCount. Before the patch, we have:
- StartCount: the number of APs the BSP stars up,
- RunningCount: the number of finished APs that the BSP collected
After the patch, StartCount is removed, and RunningCount is *redefined* as the following difference:
OLD_StartCount - OLD_RunningCount
Giving the number of APs that the BSP started up but hasn't collected yet.
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ruiyu Ni <ruiyu.ni@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Laszlo Ersek <lersek@redhat.com>
2018-07-24 16:29:53 +02:00
|
|
|
CpuMpData->RunningCount--;
|
2016-07-21 15:28:16 +02:00
|
|
|
CpuMpData->CpuData[ProcessorNumber].Waiting = FALSE;
|
2018-11-02 09:27:48 +01:00
|
|
|
SetApState (CpuData, CpuStateIdle);
|
2016-07-21 15:28:16 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// If in Single Thread mode, then search for the next waiting AP for execution.
|
|
|
|
//
|
|
|
|
if (CpuMpData->SingleThread) {
|
|
|
|
Status = GetNextWaitingProcessorNumber (&NextProcessorNumber);
|
|
|
|
|
|
|
|
if (!EFI_ERROR (Status)) {
|
|
|
|
WakeUpAP (
|
|
|
|
CpuMpData,
|
|
|
|
FALSE,
|
|
|
|
(UINT32)NextProcessorNumber,
|
|
|
|
CpuMpData->Procedure,
|
2018-07-26 10:44:22 +02:00
|
|
|
CpuMpData->ProcArguments,
|
|
|
|
TRUE
|
2016-07-21 15:28:16 +02:00
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// If all APs finish, return EFI_SUCCESS.
|
|
|
|
//
|
UefiCpuPkg/MpInitLib: Remove StartCount and volatile definition.
The patch includes below changes:
(1) It removes "volatile" from RunningCount, because only the BSP modifies it.
(2) When we detect a timeout in CheckAllAPs(), and collect the list of failed CPUs, the size of the list is derived from the following difference, before the patch:
StartCount - FinishedCount
where "StartCount" is set by the BSP at startup, and FinishedCount is incremented by the APs themselves.
Here the patch replaces this difference with
StartCount - RunningCount
that is, the difference is no more calculated from the BSP's startup counter and the AP's shared finish counter, but from the RunningCount measurement that the BSP does itself, in CheckAllAPs().
(3) Finally, the patch changes the meaning of RunningCount. Before the patch, we have:
- StartCount: the number of APs the BSP stars up,
- RunningCount: the number of finished APs that the BSP collected
After the patch, StartCount is removed, and RunningCount is *redefined* as the following difference:
OLD_StartCount - OLD_RunningCount
Giving the number of APs that the BSP started up but hasn't collected yet.
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ruiyu Ni <ruiyu.ni@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Laszlo Ersek <lersek@redhat.com>
2018-07-24 16:29:53 +02:00
|
|
|
if (CpuMpData->RunningCount == 0) {
|
2016-07-21 15:28:16 +02:00
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// If timeout expires, report timeout.
|
|
|
|
//
|
|
|
|
if (CheckTimeout (
|
|
|
|
&CpuMpData->CurrentTime,
|
|
|
|
&CpuMpData->TotalTime,
|
|
|
|
CpuMpData->ExpectedTime
|
|
|
|
)
|
|
|
|
)
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// If FailedCpuList is not NULL, record all failed APs in it.
|
|
|
|
//
|
|
|
|
if (CpuMpData->FailedCpuList != NULL) {
|
|
|
|
*CpuMpData->FailedCpuList =
|
UefiCpuPkg/MpInitLib: Remove StartCount and volatile definition.
The patch includes below changes:
(1) It removes "volatile" from RunningCount, because only the BSP modifies it.
(2) When we detect a timeout in CheckAllAPs(), and collect the list of failed CPUs, the size of the list is derived from the following difference, before the patch:
StartCount - FinishedCount
where "StartCount" is set by the BSP at startup, and FinishedCount is incremented by the APs themselves.
Here the patch replaces this difference with
StartCount - RunningCount
that is, the difference is no more calculated from the BSP's startup counter and the AP's shared finish counter, but from the RunningCount measurement that the BSP does itself, in CheckAllAPs().
(3) Finally, the patch changes the meaning of RunningCount. Before the patch, we have:
- StartCount: the number of APs the BSP stars up,
- RunningCount: the number of finished APs that the BSP collected
After the patch, StartCount is removed, and RunningCount is *redefined* as the following difference:
OLD_StartCount - OLD_RunningCount
Giving the number of APs that the BSP started up but hasn't collected yet.
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ruiyu Ni <ruiyu.ni@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Laszlo Ersek <lersek@redhat.com>
2018-07-24 16:29:53 +02:00
|
|
|
AllocatePool ((CpuMpData->RunningCount + 1) * sizeof (UINTN));
|
2016-07-21 15:28:16 +02:00
|
|
|
ASSERT (*CpuMpData->FailedCpuList != NULL);
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
ListIndex = 0;
|
|
|
|
|
|
|
|
for (ProcessorNumber = 0; ProcessorNumber < CpuMpData->CpuCount; ProcessorNumber++) {
|
|
|
|
//
|
|
|
|
// Check whether this processor is responsible for StartupAllAPs().
|
|
|
|
//
|
|
|
|
if (CpuMpData->CpuData[ProcessorNumber].Waiting) {
|
|
|
|
//
|
|
|
|
// Reset failed APs to idle state
|
|
|
|
//
|
|
|
|
ResetProcessorToIdleState (ProcessorNumber);
|
|
|
|
CpuMpData->CpuData[ProcessorNumber].Waiting = FALSE;
|
|
|
|
if (CpuMpData->FailedCpuList != NULL) {
|
|
|
|
(*CpuMpData->FailedCpuList)[ListIndex++] = ProcessorNumber;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
if (CpuMpData->FailedCpuList != NULL) {
|
|
|
|
(*CpuMpData->FailedCpuList)[ListIndex] = END_OF_CPU_LIST;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
return EFI_TIMEOUT;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:28:16 +02:00
|
|
|
return EFI_NOT_READY;
|
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:22 +02:00
|
|
|
/**
|
|
|
|
This function Get BspNumber.
|
|
|
|
|
|
|
|
@param[in] MpHandOff Pointer to MpHandOff
|
|
|
|
@return BspNumber
|
|
|
|
**/
|
|
|
|
UINT32
|
|
|
|
GetBspNumber (
|
|
|
|
IN CONST MP_HAND_OFF *MpHandOff
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT32 ApicId;
|
|
|
|
UINT32 BspNumber;
|
|
|
|
UINT32 Index;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Get the processor number for the BSP
|
|
|
|
//
|
|
|
|
BspNumber = MAX_UINT32;
|
|
|
|
ApicId = GetInitialApicId ();
|
|
|
|
for (Index = 0; Index < MpHandOff->CpuCount; Index++) {
|
|
|
|
if (MpHandOff->Info[Index].ApicId == ApicId) {
|
|
|
|
BspNumber = Index;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ASSERT (BspNumber != MAX_UINT32);
|
|
|
|
|
|
|
|
return BspNumber;
|
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:24 +02:00
|
|
|
/**
|
|
|
|
This function is intended to be invoked by the BSP in order
|
|
|
|
to wake up the AP. The BSP accomplishes this by triggering a
|
|
|
|
start-up signal, which in turn causes any APs that are
|
|
|
|
currently in a loop on the PEI-prepared memory to awaken and
|
|
|
|
begin running the procedure called SwitchContextPerAp.
|
|
|
|
This procedure allows the AP to switch to another section of
|
|
|
|
memory and continue its loop there.
|
|
|
|
|
|
|
|
@param[in] MpHandOff Pointer to MP hand-off data structure.
|
|
|
|
**/
|
|
|
|
VOID
|
|
|
|
SwitchApContext (
|
|
|
|
IN MP_HAND_OFF *MpHandOff
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINTN Index;
|
|
|
|
UINT32 BspNumber;
|
|
|
|
|
|
|
|
BspNumber = GetBspNumber (MpHandOff);
|
|
|
|
|
|
|
|
for (Index = 0; Index < MpHandOff->CpuCount; Index++) {
|
|
|
|
if (Index != BspNumber) {
|
|
|
|
*(UINTN *)(UINTN)MpHandOff->Info[Index].StartupProcedureAddress = (UINTN)SwitchContextPerAp;
|
|
|
|
*(UINT32 *)(UINTN)MpHandOff->Info[Index].StartupSignalAddress = MpHandOff->StartupSignalValue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Wait all APs waken up if this is not the 1st broadcast of SIPI
|
|
|
|
//
|
|
|
|
for (Index = 0; Index < MpHandOff->CpuCount; Index++) {
|
|
|
|
if (Index != BspNumber) {
|
|
|
|
WaitApWakeup ((UINT32 *)(UINTN)(MpHandOff->Info[Index].StartupSignalAddress));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:22 +02:00
|
|
|
/**
|
|
|
|
Get pointer to MP_HAND_OFF GUIDed HOB.
|
|
|
|
|
|
|
|
@return The pointer to MP_HAND_OFF structure.
|
|
|
|
**/
|
|
|
|
MP_HAND_OFF *
|
|
|
|
GetMpHandOffHob (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_HOB_GUID_TYPE *GuidHob;
|
|
|
|
MP_HAND_OFF *MpHandOff;
|
|
|
|
|
|
|
|
MpHandOff = NULL;
|
|
|
|
GuidHob = GetFirstGuidHob (&mMpHandOffGuid);
|
|
|
|
if (GuidHob != NULL) {
|
|
|
|
MpHandOff = (MP_HAND_OFF *)GET_GUID_HOB_DATA (GuidHob);
|
|
|
|
}
|
|
|
|
|
|
|
|
return MpHandOff;
|
|
|
|
}
|
|
|
|
|
2016-07-20 15:56:58 +02:00
|
|
|
/**
|
|
|
|
MP Initialize Library initialization.
|
|
|
|
|
|
|
|
This service will allocate AP reset vector and wakeup all APs to do APs
|
|
|
|
initialization.
|
|
|
|
|
|
|
|
This service must be invoked before all other MP Initialize Library
|
|
|
|
service are invoked.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS MP initialization succeeds.
|
|
|
|
@retval Others MP initialization fails.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
MpInitLibInitialize (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
2023-06-28 10:47:22 +02:00
|
|
|
MP_HAND_OFF *MpHandOff;
|
2016-07-20 18:32:53 +02:00
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
2016-07-20 17:33:25 +02:00
|
|
|
UINT32 MaxLogicalProcessorNumber;
|
|
|
|
UINT32 ApStackSize;
|
2016-07-20 16:56:09 +02:00
|
|
|
MP_ASSEMBLY_ADDRESS_MAP AddressMap;
|
2018-07-02 08:01:35 +02:00
|
|
|
CPU_VOLATILE_REGISTERS VolatileRegisters;
|
2016-07-20 17:33:25 +02:00
|
|
|
UINTN BufferSize;
|
2016-07-20 17:32:17 +02:00
|
|
|
UINT32 MonitorFilterSize;
|
2016-07-20 17:33:25 +02:00
|
|
|
VOID *MpBuffer;
|
|
|
|
UINTN Buffer;
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
2016-07-20 17:32:17 +02:00
|
|
|
UINT8 ApLoopMode;
|
2016-07-20 17:33:25 +02:00
|
|
|
UINT8 *MonitorBuffer;
|
2016-07-20 17:43:29 +02:00
|
|
|
UINTN Index;
|
2022-05-07 16:25:19 +02:00
|
|
|
UINTN ApResetVectorSizeBelow1Mb;
|
2022-05-08 07:22:49 +02:00
|
|
|
UINTN ApResetVectorSizeAbove1Mb;
|
2016-07-20 17:33:25 +02:00
|
|
|
UINTN BackupBufferAddr;
|
2018-07-02 08:01:35 +02:00
|
|
|
UINTN ApIdtBase;
|
2016-07-20 18:32:53 +02:00
|
|
|
|
2023-06-28 10:47:22 +02:00
|
|
|
MpHandOff = GetMpHandOffHob ();
|
|
|
|
if (MpHandOff == NULL) {
|
2016-07-20 18:32:53 +02:00
|
|
|
MaxLogicalProcessorNumber = PcdGet32 (PcdCpuMaxLogicalProcessorNumber);
|
|
|
|
} else {
|
2023-06-28 10:47:22 +02:00
|
|
|
MaxLogicalProcessorNumber = MpHandOff->CpuCount;
|
2016-07-20 18:32:53 +02:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-11-04 08:45:13 +01:00
|
|
|
ASSERT (MaxLogicalProcessorNumber != 0);
|
2016-07-20 16:56:09 +02:00
|
|
|
|
|
|
|
AsmGetAddressMap (&AddressMap);
|
2022-05-08 07:22:49 +02:00
|
|
|
GetApResetVectorSize (&AddressMap, &ApResetVectorSizeBelow1Mb, &ApResetVectorSizeAbove1Mb);
|
|
|
|
ApStackSize = PcdGet32 (PcdCpuApStackSize);
|
2022-08-19 08:17:28 +02:00
|
|
|
//
|
|
|
|
// ApStackSize must be power of 2
|
|
|
|
//
|
|
|
|
ASSERT ((ApStackSize & (ApStackSize - 1)) == 0);
|
|
|
|
ApLoopMode = GetApLoopMode (&MonitorFilterSize);
|
2016-07-20 17:32:17 +02:00
|
|
|
|
2018-07-02 08:01:35 +02:00
|
|
|
//
|
2018-09-03 04:47:54 +02:00
|
|
|
// Save BSP's Control registers for APs.
|
2018-07-02 08:01:35 +02:00
|
|
|
//
|
|
|
|
SaveVolatileRegisters (&VolatileRegisters);
|
|
|
|
|
2022-08-19 08:17:28 +02:00
|
|
|
BufferSize = ApStackSize * MaxLogicalProcessorNumber;
|
|
|
|
//
|
|
|
|
// Allocate extra ApStackSize to let AP stack align on ApStackSize bounday
|
|
|
|
//
|
|
|
|
BufferSize += ApStackSize;
|
2016-07-20 17:33:25 +02:00
|
|
|
BufferSize += MonitorFilterSize * MaxLogicalProcessorNumber;
|
2022-05-07 16:25:19 +02:00
|
|
|
BufferSize += ApResetVectorSizeBelow1Mb;
|
2018-07-02 08:01:35 +02:00
|
|
|
BufferSize = ALIGN_VALUE (BufferSize, 8);
|
|
|
|
BufferSize += VolatileRegisters.Idtr.Limit + 1;
|
|
|
|
BufferSize += sizeof (CPU_MP_DATA);
|
2016-07-20 17:33:25 +02:00
|
|
|
BufferSize += (sizeof (CPU_AP_DATA) + sizeof (CPU_INFO_IN_HOB))* MaxLogicalProcessorNumber;
|
|
|
|
MpBuffer = AllocatePages (EFI_SIZE_TO_PAGES (BufferSize));
|
|
|
|
ASSERT (MpBuffer != NULL);
|
|
|
|
ZeroMem (MpBuffer, BufferSize);
|
2022-08-19 08:17:28 +02:00
|
|
|
Buffer = ALIGN_VALUE ((UINTN)MpBuffer, ApStackSize);
|
2016-07-20 17:33:25 +02:00
|
|
|
|
2018-07-02 08:01:35 +02:00
|
|
|
//
|
2022-08-19 08:17:28 +02:00
|
|
|
// The layout of the Buffer is as below (lower address on top):
|
2018-07-02 08:01:35 +02:00
|
|
|
//
|
2022-08-19 08:17:28 +02:00
|
|
|
// +--------------------+ <-- Buffer (Pointer of CpuMpData is stored in the top of each AP's stack.)
|
|
|
|
// AP Stacks (N) (StackTop = (RSP + ApStackSize) & ~ApStackSize))
|
2018-07-02 08:01:35 +02:00
|
|
|
// +--------------------+ <-- MonitorBuffer
|
|
|
|
// AP Monitor Filters (N)
|
|
|
|
// +--------------------+ <-- BackupBufferAddr (CpuMpData->BackupBuffer)
|
|
|
|
// Backup Buffer
|
|
|
|
// +--------------------+
|
|
|
|
// Padding
|
|
|
|
// +--------------------+ <-- ApIdtBase (8-byte boundary)
|
2022-08-19 08:17:28 +02:00
|
|
|
// AP IDT All APs share one separate IDT.
|
2018-07-02 08:01:35 +02:00
|
|
|
// +--------------------+ <-- CpuMpData
|
|
|
|
// CPU_MP_DATA
|
|
|
|
// +--------------------+ <-- CpuMpData->CpuData
|
|
|
|
// CPU_AP_DATA (N)
|
|
|
|
// +--------------------+ <-- CpuMpData->CpuInfoInHob
|
|
|
|
// CPU_INFO_IN_HOB (N)
|
|
|
|
// +--------------------+
|
|
|
|
//
|
2016-07-20 17:33:25 +02:00
|
|
|
MonitorBuffer = (UINT8 *)(Buffer + ApStackSize * MaxLogicalProcessorNumber);
|
|
|
|
BackupBufferAddr = (UINTN)MonitorBuffer + MonitorFilterSize * MaxLogicalProcessorNumber;
|
2022-05-07 16:25:19 +02:00
|
|
|
ApIdtBase = ALIGN_VALUE (BackupBufferAddr + ApResetVectorSizeBelow1Mb, 8);
|
2018-07-02 08:01:35 +02:00
|
|
|
CpuMpData = (CPU_MP_DATA *)(ApIdtBase + VolatileRegisters.Idtr.Limit + 1);
|
2016-07-20 17:33:25 +02:00
|
|
|
CpuMpData->Buffer = Buffer;
|
|
|
|
CpuMpData->CpuApStackSize = ApStackSize;
|
|
|
|
CpuMpData->BackupBuffer = BackupBufferAddr;
|
2022-05-07 16:25:19 +02:00
|
|
|
CpuMpData->BackupBufferSize = ApResetVectorSizeBelow1Mb;
|
2016-07-20 17:33:25 +02:00
|
|
|
CpuMpData->WakeupBuffer = (UINTN)-1;
|
|
|
|
CpuMpData->CpuCount = 1;
|
|
|
|
CpuMpData->BspNumber = 0;
|
|
|
|
CpuMpData->WaitEvent = NULL;
|
2016-07-21 15:20:18 +02:00
|
|
|
CpuMpData->SwitchBspFlag = FALSE;
|
2016-07-20 17:33:25 +02:00
|
|
|
CpuMpData->CpuData = (CPU_AP_DATA *)(CpuMpData + 1);
|
|
|
|
CpuMpData->CpuInfoInHob = (UINT64)(UINTN)(CpuMpData->CpuData + MaxLogicalProcessorNumber);
|
|
|
|
InitializeSpinLock (&CpuMpData->MpLock);
|
2021-12-09 04:28:00 +01:00
|
|
|
CpuMpData->SevEsIsEnabled = ConfidentialComputingGuestHas (CCAttrAmdSevEs);
|
|
|
|
CpuMpData->SevSnpIsEnabled = ConfidentialComputingGuestHas (CCAttrAmdSevSnp);
|
|
|
|
CpuMpData->SevEsAPBuffer = (UINTN)-1;
|
|
|
|
CpuMpData->GhcbBase = PcdGet64 (PcdGhcbBase);
|
|
|
|
CpuMpData->UseSevEsAPMethod = CpuMpData->SevEsIsEnabled && !CpuMpData->SevSnpIsEnabled;
|
|
|
|
|
|
|
|
if (CpuMpData->SevSnpIsEnabled) {
|
|
|
|
ASSERT ((PcdGet64 (PcdGhcbHypervisorFeatures) & GHCB_HV_FEATURES_SNP_AP_CREATE) == GHCB_HV_FEATURES_SNP_AP_CREATE);
|
|
|
|
}
|
2018-07-02 08:01:35 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Make sure no memory usage outside of the allocated buffer.
|
2022-08-19 08:17:28 +02:00
|
|
|
// (ApStackSize - (Buffer - (UINTN)MpBuffer)) is the redundant caused by alignment
|
2016-07-20 17:33:25 +02:00
|
|
|
//
|
2018-07-02 08:01:35 +02:00
|
|
|
ASSERT (
|
|
|
|
(CpuMpData->CpuInfoInHob + sizeof (CPU_INFO_IN_HOB) * MaxLogicalProcessorNumber) ==
|
2022-08-19 08:17:28 +02:00
|
|
|
(UINTN)MpBuffer + BufferSize - (ApStackSize - Buffer + (UINTN)MpBuffer)
|
2018-07-02 08:01:35 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Duplicate BSP's IDT to APs.
|
|
|
|
// All APs share one separate IDT. So AP can get the address of CpuMpData by using IDTR.BASE + IDTR.LIMIT + 1
|
2016-07-20 17:47:59 +02:00
|
|
|
//
|
2018-07-02 08:01:35 +02:00
|
|
|
CopyMem ((VOID *)ApIdtBase, (VOID *)VolatileRegisters.Idtr.Base, VolatileRegisters.Idtr.Limit + 1);
|
|
|
|
VolatileRegisters.Idtr.Base = ApIdtBase;
|
2018-09-03 04:47:54 +02:00
|
|
|
//
|
|
|
|
// Don't pass BSP's TR to APs to avoid AP init failure.
|
|
|
|
//
|
|
|
|
VolatileRegisters.Tr = 0;
|
2018-07-02 08:01:35 +02:00
|
|
|
CopyMem (&CpuMpData->CpuData[0].VolatileRegisters, &VolatileRegisters, sizeof (VolatileRegisters));
|
2016-07-20 17:47:59 +02:00
|
|
|
//
|
2016-07-20 17:43:29 +02:00
|
|
|
// Set BSP basic information
|
|
|
|
//
|
2018-01-04 03:57:26 +01:00
|
|
|
InitializeApData (CpuMpData, 0, 0, CpuMpData->Buffer + ApStackSize);
|
2016-07-20 17:43:29 +02:00
|
|
|
//
|
2016-07-20 17:33:25 +02:00
|
|
|
// Save assembly code information
|
|
|
|
//
|
|
|
|
CopyMem (&CpuMpData->AddressMap, &AddressMap, sizeof (MP_ASSEMBLY_ADDRESS_MAP));
|
|
|
|
//
|
|
|
|
// Finally set AP loop mode
|
|
|
|
//
|
|
|
|
CpuMpData->ApLoopMode = ApLoopMode;
|
|
|
|
DEBUG ((DEBUG_INFO, "AP Loop Mode is %d\n", CpuMpData->ApLoopMode));
|
2018-06-27 10:42:51 +02:00
|
|
|
|
|
|
|
CpuMpData->WakeUpByInitSipiSipi = (CpuMpData->ApLoopMode == ApInHltLoop);
|
|
|
|
|
2016-07-20 17:33:25 +02:00
|
|
|
//
|
2016-07-20 17:43:29 +02:00
|
|
|
// Set up APs wakeup signal buffer
|
|
|
|
//
|
|
|
|
for (Index = 0; Index < MaxLogicalProcessorNumber; Index++) {
|
|
|
|
CpuMpData->CpuData[Index].StartupApSignal =
|
|
|
|
(UINT32 *)(MonitorBuffer + MonitorFilterSize * Index);
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2022-05-08 07:22:49 +02:00
|
|
|
//
|
|
|
|
// Copy all 32-bit code and 64-bit code into memory with type of
|
|
|
|
// EfiBootServicesCode to avoid page fault if NX memory protection is enabled.
|
|
|
|
//
|
|
|
|
CpuMpData->WakeupBufferHigh = AllocateCodeBuffer (ApResetVectorSizeAbove1Mb);
|
|
|
|
CopyMem (
|
|
|
|
(VOID *)CpuMpData->WakeupBufferHigh,
|
|
|
|
CpuMpData->AddressMap.RendezvousFunnelAddress +
|
|
|
|
CpuMpData->AddressMap.ModeTransitionOffset,
|
|
|
|
ApResetVectorSizeAbove1Mb
|
|
|
|
);
|
|
|
|
DEBUG ((DEBUG_INFO, "AP Vector: non-16-bit = %p/%x\n", CpuMpData->WakeupBufferHigh, ApResetVectorSizeAbove1Mb));
|
|
|
|
|
2016-07-20 17:49:35 +02:00
|
|
|
//
|
2017-04-21 05:21:00 +02:00
|
|
|
// Enable the local APIC for Virtual Wire Mode.
|
|
|
|
//
|
|
|
|
ProgramVirtualWireMode ();
|
2016-07-20 17:33:25 +02:00
|
|
|
|
2023-06-28 10:47:22 +02:00
|
|
|
if (MpHandOff == NULL) {
|
2016-11-04 08:45:13 +01:00
|
|
|
if (MaxLogicalProcessorNumber > 1) {
|
|
|
|
//
|
|
|
|
// Wakeup all APs and calculate the processor count in system
|
|
|
|
//
|
|
|
|
CollectProcessorCount (CpuMpData);
|
|
|
|
}
|
2016-07-20 18:32:53 +02:00
|
|
|
} else {
|
|
|
|
//
|
|
|
|
// APs have been wakeup before, just get the CPU Information
|
|
|
|
// from HOB
|
|
|
|
//
|
2023-07-26 05:55:41 +02:00
|
|
|
if (CpuMpData->UseSevEsAPMethod) {
|
|
|
|
AmdSevUpdateCpuMpData (CpuMpData);
|
|
|
|
}
|
|
|
|
|
2023-06-28 10:47:22 +02:00
|
|
|
CpuMpData->CpuCount = MpHandOff->CpuCount;
|
|
|
|
CpuMpData->BspNumber = GetBspNumber (MpHandOff);
|
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
2016-07-20 18:32:53 +02:00
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
InitializeSpinLock (&CpuMpData->CpuData[Index].ApLock);
|
2023-06-28 10:47:22 +02:00
|
|
|
CpuMpData->CpuData[Index].CpuHealthy = (MpHandOff->Info[Index].Health == 0) ? TRUE : FALSE;
|
2016-07-20 18:32:53 +02:00
|
|
|
CpuMpData->CpuData[Index].ApFunction = 0;
|
2023-06-28 10:47:22 +02:00
|
|
|
CpuInfoInHob[Index].InitialApicId = MpHandOff->Info[Index].ApicId;
|
|
|
|
CpuInfoInHob[Index].ApTopOfStack = CpuMpData->Buffer + (Index + 1) * CpuMpData->CpuApStackSize;
|
|
|
|
CpuInfoInHob[Index].ApicId = MpHandOff->Info[Index].ApicId;
|
|
|
|
CpuInfoInHob[Index].Health = MpHandOff->Info[Index].Health;
|
2016-07-20 18:32:53 +02:00
|
|
|
}
|
2023-06-28 10:47:24 +02:00
|
|
|
|
|
|
|
DEBUG ((DEBUG_INFO, "MpHandOff->WaitLoopExecutionMode: %04d, sizeof (VOID *): %04d\n", MpHandOff->WaitLoopExecutionMode, sizeof (VOID *)));
|
|
|
|
if (MpHandOff->WaitLoopExecutionMode == sizeof (VOID *)) {
|
|
|
|
ASSERT (CpuMpData->ApLoopMode != ApInHltLoop);
|
|
|
|
|
|
|
|
CpuMpData->FinishedCount = 0;
|
|
|
|
CpuMpData->InitFlag = ApInitDone;
|
|
|
|
SaveCpuMpData (CpuMpData);
|
|
|
|
//
|
|
|
|
// In scenarios where both the PEI and DXE phases run in the same
|
|
|
|
// execution mode (32bit or 64bit), the BSP triggers
|
|
|
|
// a start-up signal during the DXE phase to wake up the APs. This causes any
|
|
|
|
// APs that are currently in a loop on the memory prepared during the PEI
|
|
|
|
// phase to awaken and run the SwitchContextPerAp procedure. This procedure
|
|
|
|
// enables the APs to switch to a different memory section and continue their
|
|
|
|
// looping process there.
|
|
|
|
//
|
|
|
|
SwitchApContext (MpHandOff);
|
|
|
|
ASSERT (CpuMpData->FinishedCount == (CpuMpData->CpuCount - 1));
|
|
|
|
|
|
|
|
//
|
|
|
|
// Set Apstate as Idle, otherwise Aps cannot be waken-up again.
|
|
|
|
// If any enabled AP is not idle, return EFI_NOT_READY during waken-up.
|
|
|
|
//
|
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
SetApState (&CpuMpData->CpuData[Index], CpuStateIdle);
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Initialize global data for MP support
|
|
|
|
//
|
|
|
|
InitMpGlobalData (CpuMpData);
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
2019-12-19 07:33:44 +01:00
|
|
|
}
|
|
|
|
|
UefiCpuPkg/MpInitLib: Not pass microcode info between archs in CPU_MP_DATA
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2465
Commit 89164babec:
UefiCpuPkg/MpInitLib: don't shadow the microcode patch twice.
attempted to use 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
fields to avoid loading the microcode patches data into memory again in
the DXE phase.
However, the CPU_MP_DATA structure has members with type 'UINTN' or
pointer before the microcode patch related fields. This may cause issues
when PEI and DXE are of different archs (e.g. PEI - IA32, DXE - x64),
since the microcode patch related fields will have different offsets in
the CPU_MP_DATA structure.
Commit 88bd066166:
UefiCpuPkg/MpInitLib: Relocate microcode patch fields in CPU_MP_DATA
tried to resolve the above-mentioned issue by relocating the fields
'MicrocodePatchRegionSize' and 'MicrocodePatchAddress' before members with
different size between different archs. But it failed to take the case of
pre-built binaries (e.g. FSP) into consideration.
Binaries can be built when the code base had a different version of the
CPU_MP_DATA structure definition. This may cause issues when accessing
these microcode patch related fields, since their offsets are different
(between PEI phase in the binaries and DXE phase in current code
implementation).
This commit will use the newly introduced EDKII microcode patch HOB
instead for the DXE phase to get the information of the loaded microcode
patches data done in the PEI phase. And the 'MicrocodePatchRegionSize' and
'MicrocodePatchAddress' fields in CPU_MP_DATA will not be used to pass
information between phases.
For pre-built binaries, they can be classified into 3 types with regard to
the time when they are being built:
A. Before commit 89164babec
(In other words, 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
were not being used to skip microcode load in DXE)
For this case, the EDKII microcode patch HOB will not be produced. This
commit will load the microcode patches data again in DXE. Such behavior is
the same with the code base back then.
B. After commit 89164babec, before commit e1ed55738e
(In other words, 'MicrocodePatchRegionSize' and 'MicrocodePatchAddress'
being used to skip microcode load in DXE, but failed to work properly
between differnt archs.)
For this case, the EDKII microcode patch HOB will not be produced as well.
This commit will also load the microcode patches data again in DXE.
But since commit 89164babec failed to keep the detection and application
of microcode patches working properly in DXE after skipping the load, we
fall back to the origin behavior (that is to load the microcode patches
data again in DXE).
C. After commit e1ed55738e
(In other words, EDKII microcode patch HOB will be produced.)
For this case, it will have the same behavior with the BIOS built from
the current source codes.
Cc: Michael Kubacki <michael.a.kubacki@intel.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Cc: Eric Dong <eric.dong@intel.com>
Cc: Ray Ni <ray.ni@intel.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Signed-off-by: Hao A Wu <hao.a.wu@intel.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
Reviewed-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ray Ni <ray.ni@intel.com>
2020-01-22 07:02:05 +01:00
|
|
|
if (!GetMicrocodePatchInfoFromHob (
|
|
|
|
&CpuMpData->MicrocodePatchAddress,
|
|
|
|
&CpuMpData->MicrocodePatchRegionSize
|
|
|
|
))
|
|
|
|
{
|
|
|
|
//
|
|
|
|
// The microcode patch information cache HOB does not exist, which means
|
|
|
|
// the microcode patches data has not been loaded into memory yet
|
|
|
|
//
|
|
|
|
ShadowMicrocodeUpdatePatch (CpuMpData);
|
|
|
|
}
|
|
|
|
|
2019-12-19 07:33:44 +01:00
|
|
|
//
|
|
|
|
// Detect and apply Microcode on BSP
|
|
|
|
//
|
2019-12-23 07:32:49 +01:00
|
|
|
MicrocodeDetect (CpuMpData, CpuMpData->BspNumber);
|
2019-12-19 07:33:44 +01:00
|
|
|
//
|
|
|
|
// Store BSP's MTRR setting
|
|
|
|
//
|
|
|
|
MtrrGetAllMtrrs (&CpuMpData->MtrrTable);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Wakeup APs to do some AP initialize sync (Microcode & MTRR)
|
|
|
|
//
|
|
|
|
if (CpuMpData->CpuCount > 1) {
|
2023-06-28 10:47:22 +02:00
|
|
|
if (MpHandOff != NULL) {
|
2020-04-24 10:47:16 +02:00
|
|
|
//
|
|
|
|
// Only needs to use this flag for DXE phase to update the wake up
|
|
|
|
// buffer. Wakeup buffer allocated in PEI phase is no longer valid
|
|
|
|
// in DXE.
|
|
|
|
//
|
|
|
|
CpuMpData->InitFlag = ApInitReconfig;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2019-12-19 07:33:44 +01:00
|
|
|
WakeUpAP (CpuMpData, TRUE, 0, ApInitializeSync, CpuMpData, TRUE);
|
2020-01-17 05:44:59 +01:00
|
|
|
//
|
|
|
|
// Wait for all APs finished initialization
|
|
|
|
//
|
2019-12-19 07:33:44 +01:00
|
|
|
while (CpuMpData->FinishedCount < (CpuMpData->CpuCount - 1)) {
|
|
|
|
CpuPause ();
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2023-06-28 10:47:22 +02:00
|
|
|
if (MpHandOff != NULL) {
|
2020-04-24 10:47:16 +02:00
|
|
|
CpuMpData->InitFlag = ApInitDone;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2019-12-19 07:33:44 +01:00
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
SetApState (&CpuMpData->CpuData[Index], CpuStateIdle);
|
2016-07-20 18:32:53 +02:00
|
|
|
}
|
|
|
|
}
|
2016-07-21 10:08:12 +02:00
|
|
|
|
2021-03-12 12:39:38 +01:00
|
|
|
//
|
|
|
|
// Dump the microcode revision for each core.
|
|
|
|
//
|
2021-12-05 23:34:05 +01:00
|
|
|
DEBUG_CODE_BEGIN ();
|
2021-03-12 12:39:38 +01:00
|
|
|
UINT32 ThreadId;
|
|
|
|
UINT32 ExpectedMicrocodeRevision;
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2021-03-12 12:39:38 +01:00
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
|
|
|
for (Index = 0; Index < CpuMpData->CpuCount; Index++) {
|
|
|
|
GetProcessorLocationByApicId (CpuInfoInHob[Index].InitialApicId, NULL, NULL, &ThreadId);
|
|
|
|
if (ThreadId == 0) {
|
|
|
|
//
|
|
|
|
// MicrocodeDetect() loads microcode in first thread of each core, so,
|
|
|
|
// CpuMpData->CpuData[Index].MicrocodeEntryAddr is initialized only for first thread of each core.
|
|
|
|
//
|
|
|
|
ExpectedMicrocodeRevision = 0;
|
|
|
|
if (CpuMpData->CpuData[Index].MicrocodeEntryAddr != 0) {
|
|
|
|
ExpectedMicrocodeRevision = ((CPU_MICROCODE_HEADER *)(UINTN)CpuMpData->CpuData[Index].MicrocodeEntryAddr)->UpdateRevision;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
|
|
|
DEBUG ((
|
2021-03-12 12:39:38 +01:00
|
|
|
DEBUG_INFO,
|
|
|
|
"CPU[%04d]: Microcode revision = %08x, expected = %08x\n",
|
2021-12-05 23:54:17 +01:00
|
|
|
Index,
|
2021-03-12 12:39:38 +01:00
|
|
|
CpuMpData->CpuData[Index].MicrocodeRevision,
|
|
|
|
ExpectedMicrocodeRevision
|
2021-12-05 23:54:17 +01:00
|
|
|
));
|
2021-03-12 12:39:38 +01:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
}
|
|
|
|
|
2021-12-05 23:34:05 +01:00
|
|
|
DEBUG_CODE_END ();
|
2016-07-21 10:08:12 +02:00
|
|
|
//
|
|
|
|
// Initialize global data for MP support
|
|
|
|
//
|
|
|
|
InitMpGlobalData (CpuMpData);
|
|
|
|
|
2016-07-20 16:56:09 +02:00
|
|
|
return EFI_SUCCESS;
|
2016-07-20 15:56:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Gets detailed MP-related information on the requested processor at the
|
|
|
|
instant this call is made. This service may only be called from the BSP.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of processor.
|
|
|
|
@param[out] ProcessorInfoBuffer A pointer to the buffer where information for
|
|
|
|
the requested processor is deposited.
|
|
|
|
@param[out] HealthData Return processor health data.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS Processor information was returned.
|
|
|
|
@retval EFI_DEVICE_ERROR The calling processor is an AP.
|
|
|
|
@retval EFI_INVALID_PARAMETER ProcessorInfoBuffer is NULL.
|
|
|
|
@retval EFI_NOT_FOUND The processor with the handle specified by
|
|
|
|
ProcessorNumber does not exist in the platform.
|
|
|
|
@retval EFI_NOT_READY MP Initialize Library is not initialized.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
MpInitLibGetProcessorInfo (
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
OUT EFI_PROCESSOR_INFORMATION *ProcessorInfoBuffer,
|
|
|
|
OUT EFI_HEALTH_FLAGS *HealthData OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
2016-07-21 15:12:46 +02:00
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
UINTN CallerNumber;
|
2016-11-14 03:49:51 +01:00
|
|
|
CPU_INFO_IN_HOB *CpuInfoInHob;
|
2019-03-25 10:32:15 +01:00
|
|
|
UINTN OriginalProcessorNumber;
|
2016-07-21 15:12:46 +02:00
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
2016-11-14 03:49:51 +01:00
|
|
|
CpuInfoInHob = (CPU_INFO_IN_HOB *)(UINTN)CpuMpData->CpuInfoInHob;
|
2016-07-21 15:12:46 +02:00
|
|
|
|
2019-03-25 10:32:15 +01:00
|
|
|
//
|
|
|
|
// Lower 24 bits contains the actual processor number.
|
|
|
|
//
|
|
|
|
OriginalProcessorNumber = ProcessorNumber;
|
|
|
|
ProcessorNumber &= BIT24 - 1;
|
|
|
|
|
2016-07-21 15:12:46 +02:00
|
|
|
//
|
|
|
|
// Check whether caller processor is BSP
|
|
|
|
//
|
|
|
|
MpInitLibWhoAmI (&CallerNumber);
|
|
|
|
if (CallerNumber != CpuMpData->BspNumber) {
|
|
|
|
return EFI_DEVICE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ProcessorInfoBuffer == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ProcessorNumber >= CpuMpData->CpuCount) {
|
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
|
|
|
|
2016-11-14 03:49:51 +01:00
|
|
|
ProcessorInfoBuffer->ProcessorId = (UINT64)CpuInfoInHob[ProcessorNumber].ApicId;
|
2016-07-21 15:12:46 +02:00
|
|
|
ProcessorInfoBuffer->StatusFlag = 0;
|
|
|
|
if (ProcessorNumber == CpuMpData->BspNumber) {
|
|
|
|
ProcessorInfoBuffer->StatusFlag |= PROCESSOR_AS_BSP_BIT;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:12:46 +02:00
|
|
|
if (CpuMpData->CpuData[ProcessorNumber].CpuHealthy) {
|
|
|
|
ProcessorInfoBuffer->StatusFlag |= PROCESSOR_HEALTH_STATUS_BIT;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:12:46 +02:00
|
|
|
if (GetApState (&CpuMpData->CpuData[ProcessorNumber]) == CpuStateDisabled) {
|
|
|
|
ProcessorInfoBuffer->StatusFlag &= ~PROCESSOR_ENABLED_BIT;
|
|
|
|
} else {
|
|
|
|
ProcessorInfoBuffer->StatusFlag |= PROCESSOR_ENABLED_BIT;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Get processor location information
|
|
|
|
//
|
2016-11-01 03:45:37 +01:00
|
|
|
GetProcessorLocationByApicId (
|
2016-11-14 03:49:51 +01:00
|
|
|
CpuInfoInHob[ProcessorNumber].ApicId,
|
2016-10-31 20:42:57 +01:00
|
|
|
&ProcessorInfoBuffer->Location.Package,
|
|
|
|
&ProcessorInfoBuffer->Location.Core,
|
|
|
|
&ProcessorInfoBuffer->Location.Thread
|
|
|
|
);
|
2016-07-21 15:12:46 +02:00
|
|
|
|
2019-03-25 10:32:15 +01:00
|
|
|
if ((OriginalProcessorNumber & CPU_V2_EXTENDED_TOPOLOGY) != 0) {
|
|
|
|
GetProcessorLocation2ByApicId (
|
|
|
|
CpuInfoInHob[ProcessorNumber].ApicId,
|
|
|
|
&ProcessorInfoBuffer->ExtendedInformation.Location2.Package,
|
|
|
|
&ProcessorInfoBuffer->ExtendedInformation.Location2.Die,
|
|
|
|
&ProcessorInfoBuffer->ExtendedInformation.Location2.Tile,
|
|
|
|
&ProcessorInfoBuffer->ExtendedInformation.Location2.Module,
|
|
|
|
&ProcessorInfoBuffer->ExtendedInformation.Location2.Core,
|
|
|
|
&ProcessorInfoBuffer->ExtendedInformation.Location2.Thread
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
2016-07-21 15:12:46 +02:00
|
|
|
if (HealthData != NULL) {
|
2016-11-14 03:49:51 +01:00
|
|
|
HealthData->Uint32 = CpuInfoInHob[ProcessorNumber].Health;
|
2016-07-21 15:12:46 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return EFI_SUCCESS;
|
2016-07-20 15:56:58 +02:00
|
|
|
}
|
2016-07-21 15:12:46 +02:00
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
/**
|
|
|
|
Worker function to switch the requested AP to be the BSP from that point onward.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of AP that is to become the new BSP.
|
|
|
|
@param[in] EnableOldBSP If TRUE, then the old BSP will be listed as an
|
|
|
|
enabled AP. Otherwise, it will be disabled.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS BSP successfully switched.
|
2018-06-27 15:14:20 +02:00
|
|
|
@retval others Failed to switch BSP.
|
2016-07-21 15:20:18 +02:00
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
SwitchBSPWorker (
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
IN BOOLEAN EnableOldBSP
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
UINTN CallerNumber;
|
|
|
|
CPU_STATE State;
|
|
|
|
MSR_IA32_APIC_BASE_REGISTER ApicBaseMsr;
|
2016-12-26 09:52:48 +01:00
|
|
|
BOOLEAN OldInterruptState;
|
2016-12-26 09:55:12 +01:00
|
|
|
BOOLEAN OldTimerInterruptState;
|
2016-12-26 09:52:48 +01:00
|
|
|
|
2016-12-26 09:55:12 +01:00
|
|
|
//
|
|
|
|
// Save and Disable Local APIC timer interrupt
|
|
|
|
//
|
|
|
|
OldTimerInterruptState = GetApicTimerInterruptState ();
|
|
|
|
DisableApicTimerInterrupt ();
|
2016-12-26 09:52:48 +01:00
|
|
|
//
|
|
|
|
// Before send both BSP and AP to a procedure to exchange their roles,
|
|
|
|
// interrupt must be disabled. This is because during the exchange role
|
|
|
|
// process, 2 CPU may use 1 stack. If interrupt happens, the stack will
|
|
|
|
// be corrupted, since interrupt return address will be pushed to stack
|
|
|
|
// by hardware.
|
|
|
|
//
|
|
|
|
OldInterruptState = SaveAndDisableInterrupts ();
|
|
|
|
|
|
|
|
//
|
|
|
|
// Mask LINT0 & LINT1 for the old BSP
|
|
|
|
//
|
|
|
|
DisableLvtInterrupts ();
|
2016-07-21 15:20:18 +02:00
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether caller processor is BSP
|
|
|
|
//
|
|
|
|
MpInitLibWhoAmI (&CallerNumber);
|
|
|
|
if (CallerNumber != CpuMpData->BspNumber) {
|
2017-07-06 03:25:37 +02:00
|
|
|
return EFI_DEVICE_ERROR;
|
2016-07-21 15:20:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ProcessorNumber >= CpuMpData->CpuCount) {
|
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether specified AP is disabled
|
|
|
|
//
|
|
|
|
State = GetApState (&CpuMpData->CpuData[ProcessorNumber]);
|
|
|
|
if (State == CpuStateDisabled) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether ProcessorNumber specifies the current BSP
|
|
|
|
//
|
|
|
|
if (ProcessorNumber == CpuMpData->BspNumber) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether specified AP is busy
|
|
|
|
//
|
|
|
|
if (State == CpuStateBusy) {
|
|
|
|
return EFI_NOT_READY;
|
|
|
|
}
|
|
|
|
|
|
|
|
CpuMpData->BSPInfo.State = CPU_SWITCH_STATE_IDLE;
|
|
|
|
CpuMpData->APInfo.State = CPU_SWITCH_STATE_IDLE;
|
|
|
|
CpuMpData->SwitchBspFlag = TRUE;
|
2016-11-14 04:43:26 +01:00
|
|
|
CpuMpData->NewBspNumber = ProcessorNumber;
|
2016-07-21 15:20:18 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Clear the BSP bit of MSR_IA32_APIC_BASE
|
|
|
|
//
|
|
|
|
ApicBaseMsr.Uint64 = AsmReadMsr64 (MSR_IA32_APIC_BASE);
|
|
|
|
ApicBaseMsr.Bits.BSP = 0;
|
|
|
|
AsmWriteMsr64 (MSR_IA32_APIC_BASE, ApicBaseMsr.Uint64);
|
|
|
|
|
|
|
|
//
|
|
|
|
// Need to wakeUp AP (future BSP).
|
|
|
|
//
|
2018-07-26 10:44:22 +02:00
|
|
|
WakeUpAP (CpuMpData, FALSE, ProcessorNumber, FutureBSPProc, CpuMpData, TRUE);
|
2016-07-21 15:20:18 +02:00
|
|
|
|
2022-08-26 09:04:46 +02:00
|
|
|
//
|
|
|
|
// Save and restore volatile registers when switch BSP
|
|
|
|
//
|
|
|
|
SaveVolatileRegisters (&CpuMpData->BSPInfo.VolatileRegisters);
|
2016-07-21 15:20:18 +02:00
|
|
|
AsmExchangeRole (&CpuMpData->BSPInfo, &CpuMpData->APInfo);
|
2022-08-26 09:04:46 +02:00
|
|
|
RestoreVolatileRegisters (&CpuMpData->BSPInfo.VolatileRegisters, FALSE);
|
2016-07-21 15:20:18 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Set the BSP bit of MSR_IA32_APIC_BASE on new BSP
|
|
|
|
//
|
|
|
|
ApicBaseMsr.Uint64 = AsmReadMsr64 (MSR_IA32_APIC_BASE);
|
|
|
|
ApicBaseMsr.Bits.BSP = 1;
|
|
|
|
AsmWriteMsr64 (MSR_IA32_APIC_BASE, ApicBaseMsr.Uint64);
|
2018-01-17 06:52:06 +01:00
|
|
|
ProgramVirtualWireMode ();
|
2016-07-21 15:20:18 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// Wait for old BSP finished AP task
|
|
|
|
//
|
2018-11-02 09:27:48 +01:00
|
|
|
while (GetApState (&CpuMpData->CpuData[CallerNumber]) != CpuStateFinished) {
|
2016-07-21 15:20:18 +02:00
|
|
|
CpuPause ();
|
|
|
|
}
|
|
|
|
|
|
|
|
CpuMpData->SwitchBspFlag = FALSE;
|
|
|
|
//
|
|
|
|
// Set old BSP enable state
|
|
|
|
//
|
|
|
|
if (!EnableOldBSP) {
|
|
|
|
SetApState (&CpuMpData->CpuData[CallerNumber], CpuStateDisabled);
|
2016-12-26 12:16:23 +01:00
|
|
|
} else {
|
|
|
|
SetApState (&CpuMpData->CpuData[CallerNumber], CpuStateIdle);
|
2016-07-21 15:20:18 +02:00
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
//
|
|
|
|
// Save new BSP number
|
|
|
|
//
|
|
|
|
CpuMpData->BspNumber = (UINT32)ProcessorNumber;
|
|
|
|
|
2016-12-26 09:52:48 +01:00
|
|
|
//
|
|
|
|
// Restore interrupt state.
|
|
|
|
//
|
|
|
|
SetInterruptState (OldInterruptState);
|
|
|
|
|
2016-12-26 09:55:12 +01:00
|
|
|
if (OldTimerInterruptState) {
|
|
|
|
EnableApicTimerInterrupt ();
|
|
|
|
}
|
2016-12-26 09:52:48 +01:00
|
|
|
|
2016-07-21 15:20:18 +02:00
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
2016-07-21 15:12:46 +02:00
|
|
|
|
2016-07-21 15:23:05 +02:00
|
|
|
/**
|
|
|
|
Worker function to let the caller enable or disable an AP from this point onward.
|
|
|
|
This service may only be called from the BSP.
|
|
|
|
|
|
|
|
@param[in] ProcessorNumber The handle number of AP.
|
|
|
|
@param[in] EnableAP Specifies the new state for the processor for
|
|
|
|
enabled, FALSE for disabled.
|
|
|
|
@param[in] HealthFlag If not NULL, a pointer to a value that specifies
|
|
|
|
the new health status of the AP.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS The specified AP was enabled or disabled successfully.
|
|
|
|
@retval others Failed to Enable/Disable AP.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EnableDisableApWorker (
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
IN BOOLEAN EnableAP,
|
|
|
|
IN UINT32 *HealthFlag OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
UINTN CallerNumber;
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether caller processor is BSP
|
|
|
|
//
|
|
|
|
MpInitLibWhoAmI (&CallerNumber);
|
|
|
|
if (CallerNumber != CpuMpData->BspNumber) {
|
|
|
|
return EFI_DEVICE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ProcessorNumber == CpuMpData->BspNumber) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ProcessorNumber >= CpuMpData->CpuCount) {
|
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!EnableAP) {
|
|
|
|
SetApState (&CpuMpData->CpuData[ProcessorNumber], CpuStateDisabled);
|
|
|
|
} else {
|
2017-08-28 05:05:00 +02:00
|
|
|
ResetProcessorToIdleState (ProcessorNumber);
|
2016-07-21 15:23:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (HealthFlag != NULL) {
|
|
|
|
CpuMpData->CpuData[ProcessorNumber].CpuHealthy =
|
|
|
|
(BOOLEAN)((*HealthFlag & PROCESSOR_HEALTH_STATUS_BIT) != 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
return EFI_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2016-07-20 15:56:58 +02:00
|
|
|
/**
|
|
|
|
This return the handle number for the calling processor. This service may be
|
|
|
|
called from the BSP and APs.
|
|
|
|
|
|
|
|
@param[out] ProcessorNumber Pointer to the handle number of AP.
|
|
|
|
The range is from 0 to the total number of
|
|
|
|
logical processors minus 1. The total number of
|
|
|
|
logical processors can be retrieved by
|
|
|
|
MpInitLibGetNumberOfProcessors().
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS The current processor handle number was returned
|
|
|
|
in ProcessorNumber.
|
|
|
|
@retval EFI_INVALID_PARAMETER ProcessorNumber is NULL.
|
|
|
|
@retval EFI_NOT_READY MP Initialize Library is not initialized.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
MpInitLibWhoAmI (
|
|
|
|
OUT UINTN *ProcessorNumber
|
|
|
|
)
|
|
|
|
{
|
2016-07-21 15:14:00 +02:00
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
|
|
|
|
if (ProcessorNumber == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
|
|
|
return GetProcessorNumber (CpuMpData, ProcessorNumber);
|
2016-07-20 15:56:58 +02:00
|
|
|
}
|
2016-07-20 18:34:19 +02:00
|
|
|
|
2016-07-20 15:56:58 +02:00
|
|
|
/**
|
|
|
|
Retrieves the number of logical processor in the platform and the number of
|
|
|
|
those logical processors that are enabled on this boot. This service may only
|
|
|
|
be called from the BSP.
|
|
|
|
|
|
|
|
@param[out] NumberOfProcessors Pointer to the total number of logical
|
|
|
|
processors in the system, including the BSP
|
|
|
|
and disabled APs.
|
|
|
|
@param[out] NumberOfEnabledProcessors Pointer to the number of enabled logical
|
|
|
|
processors that exist in system, including
|
|
|
|
the BSP.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS The number of logical processors and enabled
|
|
|
|
logical processors was retrieved.
|
|
|
|
@retval EFI_DEVICE_ERROR The calling processor is an AP.
|
|
|
|
@retval EFI_INVALID_PARAMETER NumberOfProcessors is NULL and NumberOfEnabledProcessors
|
|
|
|
is NULL.
|
|
|
|
@retval EFI_NOT_READY MP Initialize Library is not initialized.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
MpInitLibGetNumberOfProcessors (
|
2021-12-03 03:01:00 +01:00
|
|
|
OUT UINTN *NumberOfProcessors OPTIONAL,
|
2016-07-20 15:56:58 +02:00
|
|
|
OUT UINTN *NumberOfEnabledProcessors OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
2016-07-20 18:34:19 +02:00
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
UINTN CallerNumber;
|
|
|
|
UINTN ProcessorNumber;
|
|
|
|
UINTN EnabledProcessorNumber;
|
|
|
|
UINTN Index;
|
|
|
|
|
2022-05-07 03:36:18 +02:00
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
2016-07-20 18:34:19 +02:00
|
|
|
if ((NumberOfProcessors == NULL) && (NumberOfEnabledProcessors == NULL)) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether caller processor is BSP
|
|
|
|
//
|
|
|
|
MpInitLibWhoAmI (&CallerNumber);
|
|
|
|
if (CallerNumber != CpuMpData->BspNumber) {
|
|
|
|
return EFI_DEVICE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
ProcessorNumber = CpuMpData->CpuCount;
|
|
|
|
EnabledProcessorNumber = 0;
|
|
|
|
for (Index = 0; Index < ProcessorNumber; Index++) {
|
|
|
|
if (GetApState (&CpuMpData->CpuData[Index]) != CpuStateDisabled) {
|
|
|
|
EnabledProcessorNumber++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NumberOfProcessors != NULL) {
|
|
|
|
*NumberOfProcessors = ProcessorNumber;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-20 18:34:19 +02:00
|
|
|
if (NumberOfEnabledProcessors != NULL) {
|
|
|
|
*NumberOfEnabledProcessors = EnabledProcessorNumber;
|
|
|
|
}
|
|
|
|
|
|
|
|
return EFI_SUCCESS;
|
2016-07-20 15:56:58 +02:00
|
|
|
}
|
2016-07-20 18:32:53 +02:00
|
|
|
|
2016-07-21 15:33:11 +02:00
|
|
|
/**
|
|
|
|
Worker function to execute a caller provided function on all enabled APs.
|
|
|
|
|
|
|
|
@param[in] Procedure A pointer to the function to be run on
|
|
|
|
enabled APs of the system.
|
|
|
|
@param[in] SingleThread If TRUE, then all the enabled APs execute
|
|
|
|
the function specified by Procedure one by
|
|
|
|
one, in ascending order of processor handle
|
|
|
|
number. If FALSE, then all the enabled APs
|
|
|
|
execute the function specified by Procedure
|
|
|
|
simultaneously.
|
2019-04-10 05:00:43 +02:00
|
|
|
@param[in] ExcludeBsp Whether let BSP also trig this task.
|
2016-07-21 15:33:11 +02:00
|
|
|
@param[in] WaitEvent The event created by the caller with CreateEvent()
|
|
|
|
service.
|
2016-12-13 03:46:28 +01:00
|
|
|
@param[in] TimeoutInMicroseconds Indicates the time limit in microseconds for
|
2016-07-21 15:33:11 +02:00
|
|
|
APs to return from Procedure, either for
|
|
|
|
blocking or non-blocking mode.
|
|
|
|
@param[in] ProcedureArgument The parameter passed into Procedure for
|
|
|
|
all APs.
|
|
|
|
@param[out] FailedCpuList If all APs finish successfully, then its
|
|
|
|
content is set to NULL. If not all APs
|
|
|
|
finish before timeout expires, then its
|
|
|
|
content is set to address of the buffer
|
|
|
|
holding handle numbers of the failed APs.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS In blocking mode, all APs have finished before
|
|
|
|
the timeout expired.
|
|
|
|
@retval EFI_SUCCESS In non-blocking mode, function has been dispatched
|
|
|
|
to all enabled APs.
|
|
|
|
@retval others Failed to Startup all APs.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
2019-04-10 05:00:43 +02:00
|
|
|
StartupAllCPUsWorker (
|
2016-07-21 15:33:11 +02:00
|
|
|
IN EFI_AP_PROCEDURE Procedure,
|
|
|
|
IN BOOLEAN SingleThread,
|
2019-04-10 05:00:43 +02:00
|
|
|
IN BOOLEAN ExcludeBsp,
|
2016-07-21 15:33:11 +02:00
|
|
|
IN EFI_EVENT WaitEvent OPTIONAL,
|
|
|
|
IN UINTN TimeoutInMicroseconds,
|
|
|
|
IN VOID *ProcedureArgument OPTIONAL,
|
|
|
|
OUT UINTN **FailedCpuList OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
UINTN ProcessorCount;
|
|
|
|
UINTN ProcessorNumber;
|
|
|
|
UINTN CallerNumber;
|
|
|
|
CPU_AP_DATA *CpuData;
|
|
|
|
BOOLEAN HasEnabledAp;
|
|
|
|
CPU_STATE ApState;
|
|
|
|
|
2022-05-07 03:36:18 +02:00
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
2016-07-21 15:33:11 +02:00
|
|
|
if (FailedCpuList != NULL) {
|
|
|
|
*FailedCpuList = NULL;
|
|
|
|
}
|
|
|
|
|
2022-05-07 03:36:18 +02:00
|
|
|
if ((CpuMpData->CpuCount == 1) && ExcludeBsp) {
|
2016-07-21 15:33:11 +02:00
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Procedure == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether caller processor is BSP
|
|
|
|
//
|
|
|
|
MpInitLibWhoAmI (&CallerNumber);
|
|
|
|
if (CallerNumber != CpuMpData->BspNumber) {
|
|
|
|
return EFI_DEVICE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Update AP state
|
|
|
|
//
|
|
|
|
CheckAndUpdateApsStatus ();
|
|
|
|
|
|
|
|
ProcessorCount = CpuMpData->CpuCount;
|
|
|
|
HasEnabledAp = FALSE;
|
|
|
|
//
|
|
|
|
// Check whether all enabled APs are idle.
|
|
|
|
// If any enabled AP is not idle, return EFI_NOT_READY.
|
|
|
|
//
|
|
|
|
for (ProcessorNumber = 0; ProcessorNumber < ProcessorCount; ProcessorNumber++) {
|
|
|
|
CpuData = &CpuMpData->CpuData[ProcessorNumber];
|
|
|
|
if (ProcessorNumber != CpuMpData->BspNumber) {
|
|
|
|
ApState = GetApState (CpuData);
|
|
|
|
if (ApState != CpuStateDisabled) {
|
|
|
|
HasEnabledAp = TRUE;
|
|
|
|
if (ApState != CpuStateIdle) {
|
|
|
|
//
|
|
|
|
// If any enabled APs are busy, return EFI_NOT_READY.
|
|
|
|
//
|
|
|
|
return EFI_NOT_READY;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-10 05:00:43 +02:00
|
|
|
if (!HasEnabledAp && ExcludeBsp) {
|
2016-07-21 15:33:11 +02:00
|
|
|
//
|
2019-04-10 05:00:43 +02:00
|
|
|
// If no enabled AP exists and not include Bsp to do the procedure, return EFI_NOT_STARTED.
|
2016-07-21 15:33:11 +02:00
|
|
|
//
|
|
|
|
return EFI_NOT_STARTED;
|
|
|
|
}
|
|
|
|
|
UefiCpuPkg/MpInitLib: Remove StartCount and volatile definition.
The patch includes below changes:
(1) It removes "volatile" from RunningCount, because only the BSP modifies it.
(2) When we detect a timeout in CheckAllAPs(), and collect the list of failed CPUs, the size of the list is derived from the following difference, before the patch:
StartCount - FinishedCount
where "StartCount" is set by the BSP at startup, and FinishedCount is incremented by the APs themselves.
Here the patch replaces this difference with
StartCount - RunningCount
that is, the difference is no more calculated from the BSP's startup counter and the AP's shared finish counter, but from the RunningCount measurement that the BSP does itself, in CheckAllAPs().
(3) Finally, the patch changes the meaning of RunningCount. Before the patch, we have:
- StartCount: the number of APs the BSP stars up,
- RunningCount: the number of finished APs that the BSP collected
After the patch, StartCount is removed, and RunningCount is *redefined* as the following difference:
OLD_StartCount - OLD_RunningCount
Giving the number of APs that the BSP started up but hasn't collected yet.
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ruiyu Ni <ruiyu.ni@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Laszlo Ersek <lersek@redhat.com>
2018-07-24 16:29:53 +02:00
|
|
|
CpuMpData->RunningCount = 0;
|
2016-07-21 15:33:11 +02:00
|
|
|
for (ProcessorNumber = 0; ProcessorNumber < ProcessorCount; ProcessorNumber++) {
|
|
|
|
CpuData = &CpuMpData->CpuData[ProcessorNumber];
|
|
|
|
CpuData->Waiting = FALSE;
|
|
|
|
if (ProcessorNumber != CpuMpData->BspNumber) {
|
|
|
|
if (CpuData->State == CpuStateIdle) {
|
|
|
|
//
|
|
|
|
// Mark this processor as responsible for current calling.
|
|
|
|
//
|
|
|
|
CpuData->Waiting = TRUE;
|
UefiCpuPkg/MpInitLib: Remove StartCount and volatile definition.
The patch includes below changes:
(1) It removes "volatile" from RunningCount, because only the BSP modifies it.
(2) When we detect a timeout in CheckAllAPs(), and collect the list of failed CPUs, the size of the list is derived from the following difference, before the patch:
StartCount - FinishedCount
where "StartCount" is set by the BSP at startup, and FinishedCount is incremented by the APs themselves.
Here the patch replaces this difference with
StartCount - RunningCount
that is, the difference is no more calculated from the BSP's startup counter and the AP's shared finish counter, but from the RunningCount measurement that the BSP does itself, in CheckAllAPs().
(3) Finally, the patch changes the meaning of RunningCount. Before the patch, we have:
- StartCount: the number of APs the BSP stars up,
- RunningCount: the number of finished APs that the BSP collected
After the patch, StartCount is removed, and RunningCount is *redefined* as the following difference:
OLD_StartCount - OLD_RunningCount
Giving the number of APs that the BSP started up but hasn't collected yet.
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Ruiyu Ni <ruiyu.ni@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Eric Dong <eric.dong@intel.com>
Reviewed-by: Ruiyu Ni <ruiyu.ni@intel.com>
Reviewed-by: Laszlo Ersek <lersek@redhat.com>
Tested-by: Laszlo Ersek <lersek@redhat.com>
2018-07-24 16:29:53 +02:00
|
|
|
CpuMpData->RunningCount++;
|
2016-07-21 15:33:11 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
CpuMpData->Procedure = Procedure;
|
|
|
|
CpuMpData->ProcArguments = ProcedureArgument;
|
|
|
|
CpuMpData->SingleThread = SingleThread;
|
|
|
|
CpuMpData->FinishedCount = 0;
|
|
|
|
CpuMpData->FailedCpuList = FailedCpuList;
|
|
|
|
CpuMpData->ExpectedTime = CalculateTimeout (
|
|
|
|
TimeoutInMicroseconds,
|
|
|
|
&CpuMpData->CurrentTime
|
|
|
|
);
|
|
|
|
CpuMpData->TotalTime = 0;
|
|
|
|
CpuMpData->WaitEvent = WaitEvent;
|
|
|
|
|
|
|
|
if (!SingleThread) {
|
2018-07-26 10:44:22 +02:00
|
|
|
WakeUpAP (CpuMpData, TRUE, 0, Procedure, ProcedureArgument, FALSE);
|
2016-07-21 15:33:11 +02:00
|
|
|
} else {
|
|
|
|
for (ProcessorNumber = 0; ProcessorNumber < ProcessorCount; ProcessorNumber++) {
|
|
|
|
if (ProcessorNumber == CallerNumber) {
|
|
|
|
continue;
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 15:33:11 +02:00
|
|
|
if (CpuMpData->CpuData[ProcessorNumber].Waiting) {
|
2018-07-26 10:44:22 +02:00
|
|
|
WakeUpAP (CpuMpData, FALSE, ProcessorNumber, Procedure, ProcedureArgument, TRUE);
|
2016-07-21 15:33:11 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-10 05:00:43 +02:00
|
|
|
if (!ExcludeBsp) {
|
|
|
|
//
|
|
|
|
// Start BSP.
|
|
|
|
//
|
|
|
|
Procedure (ProcedureArgument);
|
|
|
|
}
|
|
|
|
|
2016-07-21 15:33:11 +02:00
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
if (WaitEvent == NULL) {
|
|
|
|
do {
|
|
|
|
Status = CheckAllAPs ();
|
|
|
|
} while (Status == EFI_NOT_READY);
|
|
|
|
}
|
|
|
|
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
|
2016-07-21 15:31:47 +02:00
|
|
|
/**
|
|
|
|
Worker function to let the caller get one enabled AP to execute a caller-provided
|
|
|
|
function.
|
|
|
|
|
|
|
|
@param[in] Procedure A pointer to the function to be run on
|
|
|
|
enabled APs of the system.
|
|
|
|
@param[in] ProcessorNumber The handle number of the AP.
|
|
|
|
@param[in] WaitEvent The event created by the caller with CreateEvent()
|
|
|
|
service.
|
2016-12-13 03:46:28 +01:00
|
|
|
@param[in] TimeoutInMicroseconds Indicates the time limit in microseconds for
|
2016-07-21 15:31:47 +02:00
|
|
|
APs to return from Procedure, either for
|
|
|
|
blocking or non-blocking mode.
|
|
|
|
@param[in] ProcedureArgument The parameter passed into Procedure for
|
|
|
|
all APs.
|
|
|
|
@param[out] Finished If AP returns from Procedure before the
|
|
|
|
timeout expires, its content is set to TRUE.
|
|
|
|
Otherwise, the value is set to FALSE.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS In blocking mode, specified AP finished before
|
|
|
|
the timeout expires.
|
|
|
|
@retval others Failed to Startup AP.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
StartupThisAPWorker (
|
|
|
|
IN EFI_AP_PROCEDURE Procedure,
|
|
|
|
IN UINTN ProcessorNumber,
|
|
|
|
IN EFI_EVENT WaitEvent OPTIONAL,
|
|
|
|
IN UINTN TimeoutInMicroseconds,
|
|
|
|
IN VOID *ProcedureArgument OPTIONAL,
|
|
|
|
OUT BOOLEAN *Finished OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_STATUS Status;
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
CPU_AP_DATA *CpuData;
|
|
|
|
UINTN CallerNumber;
|
|
|
|
|
|
|
|
CpuMpData = GetCpuMpData ();
|
|
|
|
|
|
|
|
if (Finished != NULL) {
|
|
|
|
*Finished = FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether caller processor is BSP
|
|
|
|
//
|
|
|
|
MpInitLibWhoAmI (&CallerNumber);
|
|
|
|
if (CallerNumber != CpuMpData->BspNumber) {
|
|
|
|
return EFI_DEVICE_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether processor with the handle specified by ProcessorNumber exists
|
|
|
|
//
|
|
|
|
if (ProcessorNumber >= CpuMpData->CpuCount) {
|
|
|
|
return EFI_NOT_FOUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether specified processor is BSP
|
|
|
|
//
|
|
|
|
if (ProcessorNumber == CpuMpData->BspNumber) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check parameter Procedure
|
|
|
|
//
|
|
|
|
if (Procedure == NULL) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// Update AP state
|
|
|
|
//
|
|
|
|
CheckAndUpdateApsStatus ();
|
|
|
|
|
|
|
|
//
|
|
|
|
// Check whether specified AP is disabled
|
|
|
|
//
|
|
|
|
if (GetApState (&CpuMpData->CpuData[ProcessorNumber]) == CpuStateDisabled) {
|
|
|
|
return EFI_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// If WaitEvent is not NULL, execute in non-blocking mode.
|
|
|
|
// BSP saves data for CheckAPsStatus(), and returns EFI_SUCCESS.
|
|
|
|
// CheckAPsStatus() will check completion and timeout periodically.
|
|
|
|
//
|
|
|
|
CpuData = &CpuMpData->CpuData[ProcessorNumber];
|
|
|
|
CpuData->WaitEvent = WaitEvent;
|
|
|
|
CpuData->Finished = Finished;
|
|
|
|
CpuData->ExpectedTime = CalculateTimeout (TimeoutInMicroseconds, &CpuData->CurrentTime);
|
|
|
|
CpuData->TotalTime = 0;
|
|
|
|
|
2018-07-26 10:44:22 +02:00
|
|
|
WakeUpAP (CpuMpData, FALSE, ProcessorNumber, Procedure, ProcedureArgument, TRUE);
|
2016-07-21 15:31:47 +02:00
|
|
|
|
|
|
|
//
|
|
|
|
// If WaitEvent is NULL, execute in blocking mode.
|
|
|
|
// BSP checks AP's state until it finishes or TimeoutInMicrosecsond expires.
|
|
|
|
//
|
|
|
|
Status = EFI_SUCCESS;
|
|
|
|
if (WaitEvent == NULL) {
|
|
|
|
do {
|
|
|
|
Status = CheckThisAP (ProcessorNumber);
|
|
|
|
} while (Status == EFI_NOT_READY);
|
|
|
|
}
|
|
|
|
|
|
|
|
return Status;
|
|
|
|
}
|
|
|
|
|
2016-07-21 10:08:12 +02:00
|
|
|
/**
|
|
|
|
Get pointer to CPU MP Data structure from GUIDed HOB.
|
|
|
|
|
|
|
|
@return The pointer to CPU MP Data structure.
|
|
|
|
**/
|
|
|
|
CPU_MP_DATA *
|
|
|
|
GetCpuMpDataFromGuidedHob (
|
|
|
|
VOID
|
|
|
|
)
|
|
|
|
{
|
|
|
|
EFI_HOB_GUID_TYPE *GuidHob;
|
|
|
|
VOID *DataInHob;
|
|
|
|
CPU_MP_DATA *CpuMpData;
|
|
|
|
|
|
|
|
CpuMpData = NULL;
|
|
|
|
GuidHob = GetFirstGuidHob (&mCpuInitMpLibHobGuid);
|
|
|
|
if (GuidHob != NULL) {
|
|
|
|
DataInHob = GET_GUID_HOB_DATA (GuidHob);
|
|
|
|
CpuMpData = (CPU_MP_DATA *)(*(UINTN *)DataInHob);
|
|
|
|
}
|
2021-12-05 23:54:17 +01:00
|
|
|
|
2016-07-21 10:08:12 +02:00
|
|
|
return CpuMpData;
|
|
|
|
}
|
2016-08-24 16:41:40 +02:00
|
|
|
|
2019-04-10 05:00:43 +02:00
|
|
|
/**
|
|
|
|
This service executes a caller provided function on all enabled CPUs.
|
|
|
|
|
|
|
|
@param[in] Procedure A pointer to the function to be run on
|
|
|
|
enabled APs of the system. See type
|
|
|
|
EFI_AP_PROCEDURE.
|
|
|
|
@param[in] TimeoutInMicroseconds Indicates the time limit in microseconds for
|
|
|
|
APs to return from Procedure, either for
|
|
|
|
blocking or non-blocking mode. Zero means
|
|
|
|
infinity. TimeoutInMicroseconds is ignored
|
|
|
|
for BSP.
|
|
|
|
@param[in] ProcedureArgument The parameter passed into Procedure for
|
|
|
|
all APs.
|
|
|
|
|
|
|
|
@retval EFI_SUCCESS In blocking mode, all CPUs have finished before
|
|
|
|
the timeout expired.
|
|
|
|
@retval EFI_SUCCESS In non-blocking mode, function has been dispatched
|
|
|
|
to all enabled CPUs.
|
|
|
|
@retval EFI_DEVICE_ERROR Caller processor is AP.
|
|
|
|
@retval EFI_NOT_READY Any enabled APs are busy.
|
|
|
|
@retval EFI_NOT_READY MP Initialize Library is not initialized.
|
|
|
|
@retval EFI_TIMEOUT In blocking mode, the timeout expired before
|
|
|
|
all enabled APs have finished.
|
|
|
|
@retval EFI_INVALID_PARAMETER Procedure is NULL.
|
|
|
|
|
|
|
|
**/
|
|
|
|
EFI_STATUS
|
|
|
|
EFIAPI
|
|
|
|
MpInitLibStartupAllCPUs (
|
|
|
|
IN EFI_AP_PROCEDURE Procedure,
|
|
|
|
IN UINTN TimeoutInMicroseconds,
|
|
|
|
IN VOID *ProcedureArgument OPTIONAL
|
|
|
|
)
|
|
|
|
{
|
|
|
|
return StartupAllCPUsWorker (
|
|
|
|
Procedure,
|
|
|
|
FALSE,
|
|
|
|
FALSE,
|
|
|
|
NULL,
|
|
|
|
TimeoutInMicroseconds,
|
|
|
|
ProcedureArgument,
|
|
|
|
NULL
|
|
|
|
);
|
|
|
|
}
|
2021-12-09 04:27:50 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
The function check if the specified Attr is set.
|
|
|
|
|
|
|
|
@param[in] CurrentAttr The current attribute.
|
|
|
|
@param[in] Attr The attribute to check.
|
|
|
|
|
|
|
|
@retval TRUE The specified Attr is set.
|
|
|
|
@retval FALSE The specified Attr is not set.
|
|
|
|
|
|
|
|
**/
|
|
|
|
STATIC
|
|
|
|
BOOLEAN
|
|
|
|
AmdMemEncryptionAttrCheck (
|
|
|
|
IN UINT64 CurrentAttr,
|
|
|
|
IN CONFIDENTIAL_COMPUTING_GUEST_ATTR Attr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
switch (Attr) {
|
|
|
|
case CCAttrAmdSev:
|
|
|
|
//
|
|
|
|
// SEV is automatically enabled if SEV-ES or SEV-SNP is active.
|
|
|
|
//
|
|
|
|
return CurrentAttr >= CCAttrAmdSev;
|
|
|
|
case CCAttrAmdSevEs:
|
|
|
|
//
|
|
|
|
// SEV-ES is automatically enabled if SEV-SNP is active.
|
|
|
|
//
|
|
|
|
return CurrentAttr >= CCAttrAmdSevEs;
|
|
|
|
case CCAttrAmdSevSnp:
|
|
|
|
return CurrentAttr == CCAttrAmdSevSnp;
|
|
|
|
default:
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
Check if the specified confidential computing attribute is active.
|
|
|
|
|
|
|
|
@param[in] Attr The attribute to check.
|
|
|
|
|
|
|
|
@retval TRUE The specified Attr is active.
|
|
|
|
@retval FALSE The specified Attr is not active.
|
|
|
|
|
|
|
|
**/
|
|
|
|
BOOLEAN
|
|
|
|
EFIAPI
|
|
|
|
ConfidentialComputingGuestHas (
|
|
|
|
IN CONFIDENTIAL_COMPUTING_GUEST_ATTR Attr
|
|
|
|
)
|
|
|
|
{
|
|
|
|
UINT64 CurrentAttr;
|
|
|
|
|
|
|
|
//
|
|
|
|
// Get the current CC attribute.
|
|
|
|
//
|
|
|
|
CurrentAttr = PcdGet64 (PcdConfidentialComputingGuestAttr);
|
|
|
|
|
|
|
|
//
|
|
|
|
// If attr is for the AMD group then call AMD specific checks.
|
|
|
|
//
|
|
|
|
if (((RShiftU64 (CurrentAttr, 8)) & 0xff) == 1) {
|
|
|
|
return AmdMemEncryptionAttrCheck (CurrentAttr, Attr);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (CurrentAttr == Attr);
|
|
|
|
}
|