diff options
author | Tim Chu <Tim.Chu@quantatw.com> | 2022-12-16 08:45:53 +0000 |
---|---|---|
committer | Martin L Roth <gaumless@gmail.com> | 2023-01-15 02:29:51 +0000 |
commit | 8e4500aa57afd856aa7f0acc57d8e5ba68fea90a (patch) | |
tree | d497223f6dc03187793277f0957d4d257c4f146d | |
parent | ef1297689d8c12ca6db2c9295bcb6974e6b4e423 (diff) |
soc/intel/xeon_sp: lock MSR_PPIN_CTL at BS_PAYLOAD_LOAD
MSR_PPIN_CTL may need to be read more than once, so lock PPIN CTL
MSR at a late BS_PAYLOAD_LOAD boot state.
This MSR is in platform scope and must only be locked once on each
socket. Add a spinlock to do so.
Tested=On OCP Craterlake single socket, rdmsr -a 0x04e shows 1.
Signed-off-by: Johnny Lin <johnny_lin@wiwynn.com>
Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
Change-Id: I8deb086339267cf36e41e16f189e1378f20b82f1
Reviewed-on: https://review.coreboot.org/c/coreboot/+/71144
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: David Hendricks <david.hendricks@gmail.com>
-rw-r--r-- | src/soc/intel/xeon_sp/finalize.c | 37 | ||||
-rw-r--r-- | src/soc/intel/xeon_sp/util.c | 3 |
2 files changed, 37 insertions, 3 deletions
diff --git a/src/soc/intel/xeon_sp/finalize.c b/src/soc/intel/xeon_sp/finalize.c index 76e3ef1125..33a4d435d3 100644 --- a/src/soc/intel/xeon_sp/finalize.c +++ b/src/soc/intel/xeon_sp/finalize.c @@ -3,12 +3,15 @@ #include <bootstate.h> #include <console/console.h> #include <console/debug.h> +#include <cpu/x86/mp.h> #include <cpu/x86/smm.h> #include <device/pci.h> #include <intelpch/lockdown.h> +#include <soc/msr.h> #include <soc/pci_devs.h> #include <soc/pm.h> #include <soc/util.h> +#include <smp/spinlock.h> #include "chip.h" @@ -23,6 +26,32 @@ static void lock_pam0123(void) pci_or_config32(dev, SAD_ALL_PAM0123_CSR, PAM_LOCK); } +DECLARE_SPIN_LOCK(msr_ppin_lock); + +static void lock_msr_ppin_ctl(void *unused) +{ + msr_t msr; + + msr = rdmsr(MSR_PLATFORM_INFO); + if ((msr.lo & MSR_PPIN_CAP) == 0) + return; + + spin_lock(&msr_ppin_lock); + + msr = rdmsr(MSR_PPIN_CTL); + if (msr.lo & MSR_PPIN_CTL_LOCK) { + spin_unlock(&msr_ppin_lock); + return; + } + + /* Clear enable and lock it */ + msr.lo &= ~MSR_PPIN_CTL_ENABLE; + msr.lo |= MSR_PPIN_CTL_LOCK; + wrmsr(MSR_PPIN_CTL, msr); + + spin_unlock(&msr_ppin_lock); +} + static void soc_finalize(void *unused) { printk(BIOS_DEBUG, "Finalizing chipset.\n"); @@ -43,6 +72,14 @@ static void soc_finalize(void *unused) apm_control(APM_CNT_FINALIZE); lock_pam0123(); + if (CONFIG_MAX_SOCKET > 1) { + /* This MSR is package scope but run for all cpus for code simplicity */ + if (mp_run_on_all_cpus(&lock_msr_ppin_ctl, NULL) != CB_SUCCESS) + printk(BIOS_ERR, "Lock PPIN CTL MSR failed\n"); + } else { + lock_msr_ppin_ctl(NULL); + } + post_code(POST_OS_BOOT); } diff --git a/src/soc/intel/xeon_sp/util.c b/src/soc/intel/xeon_sp/util.c index 0c8e63a640..525efc5add 100644 --- a/src/soc/intel/xeon_sp/util.c +++ b/src/soc/intel/xeon_sp/util.c @@ -68,9 +68,6 @@ msr_t read_msr_ppin(void) wrmsr(MSR_PPIN_CTL, msr); } ppin = rdmsr(MSR_PPIN); - /* Set enable to 0 after reading MSR_PPIN */ - msr.lo &= ~MSR_PPIN_CTL_ENABLE; - wrmsr(MSR_PPIN_CTL, msr); return ppin; } |