summaryrefslogtreecommitdiff
path: root/src/mainboard/emulation/qemu-q35/cpu.c
blob: c57ec500fe577363aff5bac604d738f32a759d3e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
/* SPDX-License-Identifier: GPL-2.0-only */

#include <commonlib/helpers.h>
#include <console/console.h>
#include <cpu/amd/amd64_save_state.h>
#include <cpu/intel/smm_reloc.h>
#include <cpu/x86/legacy_save_state.h>
#include <cpu/x86/mp.h>
#include <cpu/x86/smm.h>
#include <mainboard/emulation/qemu-i440fx/fw_cfg.h>
#include <stddef.h>
#include <stdint.h>

static void get_smm_info(uintptr_t *perm_smbase, size_t *perm_smsize,
	      size_t *smm_save_state_size)
{
	printk(BIOS_DEBUG, "Setting up SMI for CPU\n");

	smm_subregion(SMM_SUBREGION_HANDLER, perm_smbase, perm_smsize);

	smm_open();

	/* FIXME: on X86_64 the save state size is smaller than the size of the SMM stub */
	*smm_save_state_size = sizeof(amd64_smm_state_save_area_t);
	printk(BIOS_DEBUG, "Save state size: 0x%zx bytes\n", *smm_save_state_size);
}

/*
 * The relocation work is actually performed in SMM context, but the code
 * resides in the ramstage module. This occurs by trampolining from the default
 * SMRAM entry point to here.
 */

union __packed save_state {
	amd64_smm_state_save_area_t amd64;
	struct {
		char _reserved[sizeof(amd64_smm_state_save_area_t)
			       - sizeof(legacy_smm_state_save_area_t)];
		legacy_smm_state_save_area_t legacy;
	};
};

_Static_assert(sizeof(union save_state) == sizeof(amd64_smm_state_save_area_t),
	       "Incorrect save state union size");

_Static_assert(offsetof(union save_state, amd64.smm_revision)
	       == offsetof(union save_state, legacy.smm_revision),
	       "Incompatible SMM save state revision offset");

static void relocation_handler(int cpu, uintptr_t curr_smbase,
			       uintptr_t staggered_smbase)
{
	union save_state *save_state =
		(void *)(curr_smbase + SMM_DEFAULT_SIZE - sizeof(*save_state));

	u32 smbase = staggered_smbase;

	/* The SMM save state revision is always at a compatible offset */
	const u32 revision = save_state->legacy.smm_revision;
	switch (revision) {
	case 0x00020000:
		save_state->legacy.smbase = smbase;
		break;
	case 0x00020064:
		save_state->amd64.smbase = smbase;
		break;
	default:
		printk(BIOS_ERR, "Unknown SMM revision 0x%x, not relocating SMM\n", revision);
		return;
	};

	printk(BIOS_DEBUG, "In relocation handler: cpu %d\n", cpu);
	printk(BIOS_DEBUG, "SMM revision: 0x%08x\n", revision);
	printk(BIOS_DEBUG, "New SMBASE=0x%08x\n", smbase);
}

static void post_mp_init(void)
{
	/* Limit access to SMRAM to SMM module. */
	smm_close();

	/* Now that all APs have been relocated as well as the BSP let SMIs start flowing. */
	global_smi_enable();

	/* Lock down the SMRAM space. */
	smm_lock();
}

const struct mp_ops mp_ops_with_smm = {
	.get_cpu_count       = fw_cfg_max_cpus,
	.get_smm_info        = get_smm_info,
	.pre_mp_smm_init     = smm_southbridge_clear_state,
	.relocation_handler  = relocation_handler,
	.post_mp_init        = post_mp_init,
};