summaryrefslogtreecommitdiff
path: root/ReferenceCode/Haswell/CpuInit/Pei
diff options
context:
space:
mode:
Diffstat (limited to 'ReferenceCode/Haswell/CpuInit/Pei')
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/BootGuardInit.c111
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CachePeim.c1045
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.cif20
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.mak76
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.sdl37
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.c1404
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.dxs42
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.h212
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.inf124
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.c292
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.h55
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/Ia32/Cpu.asm77
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/PfatInit.c191
-rw-r--r--ReferenceCode/Haswell/CpuInit/Pei/PfatInit.h42
14 files changed, 3728 insertions, 0 deletions
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/BootGuardInit.c b/ReferenceCode/Haswell/CpuInit/Pei/BootGuardInit.c
new file mode 100644
index 0000000..f877784
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/BootGuardInit.c
@@ -0,0 +1,111 @@
+/** @file
+ EFI 2.0 PEIM to initialize the cache and load the BSP microcode
+
+@copyright
+ Copyright (c) 1999 - 2013 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Pre-EFI Module' and is licensed
+ for Intel CPUs and Chipsets under the terms of your license
+ agreement with Intel or your vendor. This file may be
+ modified by the user, subject to additional terms of the
+ license agreement
+
+**/
+
+///
+/// External include files do NOT need to be explicitly specified in real EDKII
+/// environment
+///
+#if !defined(EDK_RELEASE_VERSION) || (EDK_RELEASE_VERSION < 0x00020000)
+#include "EdkIIGluePeim.h"
+#include "CpuInitPeim.h"
+#include "CpuAccess.h"
+#include "BootGuardLibrary.h"
+#include "MeAccess.h"
+#include "HeciRegs.h"
+#endif
+
+VOID
+BootGuardInit (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+/**
+
+ Perform the platform spefific initializations.
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+
+**/
+{
+ UINT32 MsrValue;
+ UINT32 MeFwSts4;
+ UINT32 BootGuardAcmStatus;
+
+ if (CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig == NULL) {
+ return;
+ }
+
+ ///
+ /// Check if System Supports Boot Guard
+ ///
+ if( IsBootGuardSupported() ) {
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->BootGuardSupport = TRUE;
+
+ BootGuardAcmStatus = *(UINT32 *) (UINTN) (TXT_PUBLIC_BASE + R_CPU_BOOT_GUARD_ACM_STATUS);
+ DEBUG ((EFI_D_INFO, "Boot Guard ACM Status = %x\n", BootGuardAcmStatus));
+
+ ///
+ /// Check Bit 12 in ME FWSTS4 to check if TPM_DISCONNECT_ALL bit is set
+ /// or ENF Shutdown path is taken by ME FW.
+ /// Also Identify any failures in ACM
+ ///
+ MeFwSts4 = HeciPciRead32(R_ME_HFS_4);
+ DEBUG ((EFI_D_INFO, "ME FW STS 4 = %x\n", MeFwSts4));
+ if((MeFwSts4 & (B_TPM_DISCONNECT | B_BOOT_GUARD_ENF_MASK)) || (BootGuardAcmStatus & B_BOOT_GUARD_ACM_ERRORCODE_MASK)) {
+ DEBUG ((EFI_D_INFO, "All TPM's on Platform are Disconnected\n"));
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->DisconnectAllTpms = TRUE;
+ }
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->BypassTpmInit = FALSE;
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->MeasuredBoot = FALSE;
+
+ if(MeFwSts4 & BIT10) {
+ DEBUG ((EFI_D_INFO, "Sx Resume Type Identified - TPM Event Log not required for ACM Measurements\n"));
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->ByPassTpmEventLog = TRUE;
+ }
+ ///
+ /// Check bit 0 of BOOT_GUARD_SACM_INFO MSR if system is in Boot Guard boot mode
+ ///
+ MsrValue = (UINT32) AsmReadMsr64 (MSR_BOOT_GUARD_SACM_INFO);
+ DEBUG ((EFI_D_INFO, "MSR_BOOT_GUARD_SACM_INFO MSR = %x\n", MsrValue));
+ if ( (MsrValue & B_NEM_INIT) == 0 ) {
+ DEBUG ((EFI_D_INFO, "NEM is not initiated by Boot Guard ACM\n"));
+ }
+ if (MsrValue & B_MEASURED) {
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->MeasuredBoot = TRUE;
+ ///
+ /// if measured bit is set, BIOS needs to bypass startup command
+ ///
+ if (MsrValue & B_TPM_SUCCESS) {
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->BypassTpmInit = TRUE;
+ }
+ ///
+ /// Read present TPM type
+ ///
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->TpmType = (TPM_TYPE) ( (MsrValue & V_TPM_PRESENT_MASK) >> 1 );
+ DEBUG ((EFI_D_INFO, "TPM Type is %x\n", CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->TpmType));
+ }
+ } else {
+ CpuPlatformPolicyPpi->SecurityConfig->BootGuardConfig->BootGuardSupport = FALSE;
+ }
+
+ return;
+}
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CachePeim.c b/ReferenceCode/Haswell/CpuInit/Pei/CachePeim.c
new file mode 100644
index 0000000..959c58e
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CachePeim.c
@@ -0,0 +1,1045 @@
+/** @file
+ EFI 2.0 PEIM to initialize the cache and load the BSP microcode
+
+@copyright
+ Copyright (c) 1999 - 2012 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Pre-EFI Module' and is licensed
+ for Intel CPUs and Chipsets under the terms of your license
+ agreement with Intel or your vendor. This file may be
+ modified by the user, subject to additional terms of the
+ license agreement
+
+**/
+#if !defined(EDK_RELEASE_VERSION) || (EDK_RELEASE_VERSION < 0x00020000)
+#include "EdkIIGluePeim.h"
+#include "CpuAccess.h"
+#include "CpuInitPeim.h"
+#include EFI_PPI_PRODUCER (Cache)
+#define ALIGNED_SEED 0x01010101
+#endif
+
+INT8
+CheckDirection (
+ IN UINT64 Input
+ );
+
+UINT64
+PeiPower2MaxMemory (
+ IN UINT64 MemoryLength
+ );
+
+VOID
+EfiDisableCacheMtrr (
+ IN UINT64 *OldMtrr
+ );
+
+VOID
+EfiRecoverCacheMtrr (
+ IN BOOLEAN EnableMtrr,
+ IN UINT64 OldMtrr
+ );
+
+VOID
+EfiProgramMtrr (
+ IN PEI_CACHE_PPI *This,
+ IN UINTN MtrrNumber,
+ IN EFI_PHYSICAL_ADDRESS MemoryAddress,
+ IN UINT64 MemoryLength,
+ IN EFI_MEMORY_CACHE_TYPE MemoryCacheType,
+ IN UINT64 ValidMtrrAddressMask
+ );
+
+EFI_STATUS
+EFIAPI
+PeiResetCacheAttributes (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This
+ );
+
+EFI_STATUS
+EFIAPI
+PeiActivateCache (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This
+ );
+
+EFI_STATUS
+EFIAPI
+PeiSetCacheAttributes (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This,
+ IN EFI_PHYSICAL_ADDRESS MemoryAddress,
+ IN UINT64 MemoryLength,
+ IN EFI_MEMORY_CACHE_TYPE MemoryCacheType
+ );
+
+EFI_STATUS
+SearchForExactMtrr (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This,
+ IN EFI_PHYSICAL_ADDRESS MemoryAddress,
+ IN UINT64 MemoryLength,
+ IN UINT64 ValidMtrrAddressMask,
+ OUT UINT32 *UsedMsrNum,
+ OUT EFI_MEMORY_CACHE_TYPE *MemoryCacheType
+ );
+
+BOOLEAN
+IsDefaultType (
+ IN EFI_MEMORY_CACHE_TYPE MemoryCacheType
+ );
+
+EFI_STATUS
+DisableCacheAsRam (
+ VOID
+ );
+
+typedef struct _ALIGNED_DWORD {
+ UINT32 High;
+ UINT32 Low;
+} ALIGNED_DWORD;
+
+typedef union _ALIGNED {
+ UINT64 AlignedQword;
+ ALIGNED_DWORD AlignedDword;
+} ALIGNED;
+
+typedef struct {
+ UINT32 Msr;
+ UINT32 BaseAddress;
+ UINT32 Length;
+} FIXED_MTRR;
+
+FIXED_MTRR mFixedMtrrTable[] = {
+ {
+ IA32_MTRR_FIX64K_00000,
+ 0,
+ 0x10000
+ },
+ {
+ IA32_MTRR_FIX16K_80000,
+ 0x80000,
+ 0x4000
+ },
+ {
+ IA32_MTRR_FIX16K_A0000,
+ 0xA0000,
+ 0x4000
+ },
+ {
+ IA32_MTRR_FIX4K_C0000,
+ 0xC0000,
+ 0x1000
+ },
+ {
+ IA32_MTRR_FIX4K_C8000,
+ 0xC8000,
+ 0x1000
+ },
+ {
+ IA32_MTRR_FIX4K_D0000,
+ 0xD0000,
+ 0x1000
+ },
+ {
+ IA32_MTRR_FIX4K_D8000,
+ 0xD8000,
+ 0x1000
+ },
+ {
+ IA32_MTRR_FIX4K_E0000,
+ 0xE0000,
+ 0x1000
+ },
+ {
+ IA32_MTRR_FIX4K_E8000,
+ 0xE8000,
+ 0x1000
+ },
+ {
+ IA32_MTRR_FIX4K_F0000,
+ 0xF0000,
+ 0x1000
+ },
+ {
+ IA32_MTRR_FIX4K_F8000,
+ 0xF8000,
+ 0x1000
+ },
+ {
+ 0,
+ 0x100000,
+ 0
+ }
+};
+
+PEI_CACHE_PPI mCachePpi = {
+ PeiSetCacheAttributes,
+ PeiResetCacheAttributes,
+ PeiActivateCache
+};
+
+/**
+ Update MTRR setting to memory buffer
+
+ @param[in] This - Current instance of Pei Cache PPI.
+ @param[in] MsrNum - offset 0-10 maps to Fixed MTRR table
+ offset above 0x200 maps to Variable MTRR table
+ @param[in] UpdateValue - MTRR setting
+ **/
+VOID
+WriteMsrToBuffer (
+ IN PEI_CACHE_PPI *This,
+ IN UINT32 MsrNum,
+ IN UINT64 UpdateValue
+ )
+{
+ CACHE_PPI_INSTANCE *CachePpiInstance;
+ CachePpiInstance = PEI_CACHE_PPI_INSTANCE_FROM_THIS (This);
+ if (MsrNum >= CACHE_VARIABLE_MTRR_BASE) {
+ if ((MsrNum - CACHE_VARIABLE_MTRR_BASE) >= V_MAXIMUM_VARIABLE_MTRR_NUMBER * 2) {
+ ASSERT (FALSE);
+ return;
+ }
+
+ CachePpiInstance->VariableMtrrChanged = TRUE;
+ CachePpiInstance->VariableMtrrValue[MsrNum - CACHE_VARIABLE_MTRR_BASE].Changed = TRUE;
+ CachePpiInstance->VariableMtrrValue[MsrNum - CACHE_VARIABLE_MTRR_BASE].MsrValue = UpdateValue;
+ } else {
+ if (MsrNum >= V_FIXED_MTRR_NUMBER) {
+ ASSERT (FALSE);
+ return;
+ }
+
+ CachePpiInstance->FixedMtrrChanged = TRUE;
+ CachePpiInstance->FixedMtrrValue[MsrNum].Changed = TRUE;
+ CachePpiInstance->FixedMtrrValue[MsrNum].MsrValue = UpdateValue;
+ }
+}
+
+/**
+ Read MTRR from Buffer. If buffer not ready, read from real MSR instead.
+
+ @param[in] This - Current instance of Pei Cache PPI.
+ @param[in] MsrNum - offset 0-10 maps to Fixed MTRR table
+ offset above 0x200 maps to Variable MTRR table
+
+ @retval Return MTRR setting
+ **/
+UINT64
+ReadMsrFromBuffer (
+ IN PEI_CACHE_PPI *This,
+ IN UINT32 MsrNum
+ )
+{
+ UINT64 MtrrVal;
+ CACHE_PPI_INSTANCE *CachePpiInstance;
+ CachePpiInstance = PEI_CACHE_PPI_INSTANCE_FROM_THIS (This);
+ if (MsrNum >= CACHE_VARIABLE_MTRR_BASE) {
+ if ((MsrNum - CACHE_VARIABLE_MTRR_BASE) >= V_MAXIMUM_VARIABLE_MTRR_NUMBER * 2) {
+ ASSERT (FALSE);
+ return 0;
+ }
+
+ if (CachePpiInstance->VariableMtrrValue[MsrNum - CACHE_VARIABLE_MTRR_BASE].Changed) {
+ MtrrVal = CachePpiInstance->VariableMtrrValue[MsrNum - CACHE_VARIABLE_MTRR_BASE].MsrValue;
+ } else {
+ MtrrVal = AsmReadMsr64 (MsrNum);
+ }
+ } else {
+ if (MsrNum >= V_FIXED_MTRR_NUMBER) {
+ ASSERT (FALSE);
+ return 0;
+ }
+
+ if (CachePpiInstance->FixedMtrrValue[MsrNum].Changed) {
+ MtrrVal = CachePpiInstance->FixedMtrrValue[MsrNum].MsrValue;
+ } else {
+ MtrrVal = AsmReadMsr64 (mFixedMtrrTable[MsrNum].Msr);
+ }
+ }
+
+ return MtrrVal;
+}
+
+/**
+ Disable cache and its mtrr
+
+ @param[in] OldMtrr - To return the Old MTRR value
+**/
+VOID
+EfiDisableCacheMtrr (
+ OUT UINT64 *OldMtrr
+ )
+{
+ UINT64 TempQword;
+
+ EfiDisableCache ();
+
+ ///
+ /// Disable Cache MTRR
+ ///
+ *OldMtrr = AsmReadMsr64 (CACHE_IA32_MTRR_DEF_TYPE);
+ TempQword = (*OldMtrr) &~B_CACHE_MTRR_VALID &~B_CACHE_FIXED_MTRR_VALID;
+ AsmWriteMsr64 (CACHE_IA32_MTRR_DEF_TYPE, TempQword);
+ return;
+}
+
+/**
+ Recover cache MTRR
+
+ @param[in] EnableMtrr - Whether to enable the MTRR
+ @param[in] OldMtrr - The saved old MTRR value to restore when not to
+ enable the MTRR
+**/
+VOID
+EfiRecoverCacheMtrr (
+ IN BOOLEAN EnableMtrr,
+ IN UINT64 OldMtrr
+ )
+{
+ UINT64 TempQword;
+
+ TempQword = 0;
+
+ ///
+ /// Enable Cache MTRR
+ ///
+ if (EnableMtrr) {
+ TempQword = AsmReadMsr64 (CACHE_IA32_MTRR_DEF_TYPE);
+ TempQword |= (B_CACHE_MTRR_VALID | B_CACHE_FIXED_MTRR_VALID);
+ } else {
+ TempQword = OldMtrr;
+ }
+
+ AsmWriteMsr64 (CACHE_IA32_MTRR_DEF_TYPE, TempQword);
+
+ EfiEnableCache ();
+ return;
+}
+
+/**
+ Programming MTRR according to Memory address, length, and type.
+
+ @param[in] This - Pointer to PEI_CACHE_PPI
+ @param[in] MtrrNumber - the variable MTRR index number
+ @param[in] MemoryAddress - the address of target memory
+ @param[in] MemoryLength - the length of target memory
+ @param[in] MemoryCacheType - the cache type of target memory
+ @param[in] ValidMtrrAddressMask - the MTRR address mask
+**/
+VOID
+EfiProgramMtrr (
+ IN PEI_CACHE_PPI *This,
+ IN UINT32 MtrrNumber,
+ IN EFI_PHYSICAL_ADDRESS MemoryAddress,
+ IN UINT64 MemoryLength,
+ IN EFI_MEMORY_CACHE_TYPE MemoryCacheType,
+ IN UINT64 ValidMtrrAddressMask
+ )
+{
+ UINT64 TempQword;
+
+ ///
+ /// MTRR Physical Base
+ ///
+ TempQword = (MemoryAddress & ValidMtrrAddressMask) | MemoryCacheType;
+ WriteMsrToBuffer (This, MtrrNumber, TempQword);
+
+ ///
+ /// MTRR Physical Mask
+ ///
+ TempQword = ~(MemoryLength - 1);
+ WriteMsrToBuffer (This, MtrrNumber + 1, (TempQword & ValidMtrrAddressMask) | B_CACHE_MTRR_VALID);
+
+ return;
+}
+
+/**
+ Calculate max memory of power 2
+
+ @param[in] MemoryLength - Memory length that will be calculated
+
+ @retval Max memory
+**/
+UINT64
+PeiPower2MaxMemory (
+ IN UINT64 MemoryLength
+ )
+{
+ UINT64 Result;
+ UINT32 *ResultPointer;
+ UINT32 *MemoryLengthPointer;
+ MemoryLengthPointer = (UINT32 *) &MemoryLength;
+ ResultPointer = (UINT32 *) &Result;
+ Result = 0;
+ if (MemoryLengthPointer[1] != 0) {
+ ResultPointer[1] = GetPowerOfTwo32 (MemoryLengthPointer[1]);
+ } else {
+ ResultPointer[0] = GetPowerOfTwo32 (MemoryLengthPointer[0]);
+ }
+
+ return Result;
+}
+
+/**
+ Program the unaligned MTRR register.
+
+ @param[in] This - Pointer to PEI_CACHE_PPI
+ @param[in] AlignedQword - The aligned 64-bit cache type.
+ @param[in] MsrNum - The index of current MTRR.
+ @param[in] UnalignedBase - Base Address of the current unaligned MTRR.
+ @param[in] UnalignedLimit - Limit Address of the current unaligned MTRR.
+
+ @retval EFI_SUCCESS - The unaligned MTRR is set successfully.
+ @retval EFI_DEVICE_ERROR - The unaligned address is not the multiple of the basic length of MTRR.
+**/
+EFI_STATUS
+PeiProgramUnalignedMtrr (
+ IN PEI_CACHE_PPI *This,
+ IN UINT64 AlignedQword,
+ IN UINTN MsrNum,
+ IN UINT32 UnalignedBase,
+ IN UINT32 UnalignedLimit
+ )
+{
+ UINT32 UnalignedOffset;
+ UINT64 TempQword;
+ UINT64 Mask;
+ UINT8 ByteShift;
+
+ UnalignedOffset = UnalignedBase - mFixedMtrrTable[MsrNum].BaseAddress;
+ if (UnalignedOffset % mFixedMtrrTable[MsrNum].Length != 0) {
+ return EFI_DEVICE_ERROR;
+ }
+
+ ByteShift = (UINT8) (UnalignedOffset / mFixedMtrrTable[MsrNum].Length);
+ Mask = ~(LShiftU64 (1, ByteShift * 8) - 1);
+
+ if (UnalignedLimit < mFixedMtrrTable[MsrNum + 1].BaseAddress) {
+ UnalignedOffset = UnalignedLimit - mFixedMtrrTable[MsrNum].BaseAddress;
+ if (UnalignedOffset % mFixedMtrrTable[MsrNum].Length != 0) {
+ return EFI_DEVICE_ERROR;
+ }
+
+ ByteShift = (UINT8) (UnalignedOffset / mFixedMtrrTable[MsrNum].Length);
+ Mask &= LShiftU64 (1, ByteShift * 8) - 1;
+ }
+
+ TempQword = ReadMsrFromBuffer (This, MsrNum) &~Mask;
+ TempQword |= AlignedQword & Mask;
+ WriteMsrToBuffer (This, MsrNum, TempQword);
+ return EFI_SUCCESS;
+}
+
+/**
+ Given the low memory range ( <= 1MB) and cache type, program the MTRRs.
+
+ @param[in] This - Current instance of Pei Cache PPI.
+ @param[in] MemoryCacheType - Cache Type.
+ @param[in] MemoryBase - Base Address of Memory to program MTRR.
+ @param[in] MemoryLimit - Limit Address of Memory to program MTRR.
+
+ @retval EFI_SUCCESS - Low memory MTRR is set successfully.
+ @retval others - An error occurs when setting Low memory MTRR.
+**/
+EFI_STATUS
+PeiProgramLowMemoryMtrr (
+ IN PEI_CACHE_PPI *This,
+ IN EFI_MEMORY_CACHE_TYPE MemoryCacheType,
+ IN UINT32 MemoryBase,
+ IN UINT32 MemoryLimit
+ )
+{
+ EFI_STATUS Status;
+ ALIGNED Aligned;
+ UINTN MsrNum;
+
+ Status = EFI_SUCCESS;
+
+ Aligned.AlignedDword.High = MemoryCacheType * ALIGNED_SEED;
+ Aligned.AlignedDword.Low = Aligned.AlignedDword.High;
+
+ for (MsrNum = 0; mFixedMtrrTable[MsrNum].BaseAddress < MemoryBase; MsrNum++) {
+ ;
+ }
+
+ if (MemoryBase < mFixedMtrrTable[MsrNum].BaseAddress) {
+ Status = PeiProgramUnalignedMtrr (This, Aligned.AlignedQword, MsrNum - 1, MemoryBase, MemoryLimit);
+ if (EFI_ERROR (Status)) {
+ goto Done;
+ }
+ }
+
+ while (MsrNum < V_FIXED_MTRR_NUMBER && MemoryLimit >= mFixedMtrrTable[MsrNum + 1].BaseAddress) {
+ ///
+ /// Program aligned MTRR
+ ///
+ WriteMsrToBuffer (This, MsrNum, Aligned.AlignedQword);
+ MsrNum++;
+ }
+
+ if (MemoryLimit > mFixedMtrrTable[MsrNum].BaseAddress) {
+ Status = PeiProgramUnalignedMtrr (
+ This,
+ Aligned.AlignedQword,
+ MsrNum,
+ mFixedMtrrTable[MsrNum].BaseAddress,
+ MemoryLimit
+ );
+ }
+
+Done:
+ return Status;
+}
+
+/**
+ Given the memory range and cache type, programs the MTRRs.
+
+ @param[in] PeiServices - General purpose services available to every PEIM.
+ @param[in] This - Current instance of Pei Cache PPI.
+ @param[in] MemoryAddress - Base Address of Memory to program MTRR.
+ @param[in] MemoryLength - Length of Memory to program MTRR.
+ @param[in] MemoryCacheType - Cache Type.
+
+ @retval EFI_SUCCESS - Mtrr are set successfully.
+ @retval EFI_LOAD_ERROR - No empty MTRRs to use.
+ @retval EFI_INVALID_PARAMETER - The input parameter is not valid.
+ @retval others - An error occurs when setting MTTR.
+**/
+EFI_STATUS
+EFIAPI
+PeiSetCacheAttributes (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This,
+ IN EFI_PHYSICAL_ADDRESS MemoryAddress,
+ IN UINT64 MemoryLength,
+ IN EFI_MEMORY_CACHE_TYPE MemoryCacheType
+ )
+{
+ EFI_STATUS Status;
+ UINT32 MsrNum;
+ UINT64 TempQword;
+ UINT32 UsedMsrNum;
+ EFI_MEMORY_CACHE_TYPE UsedMemoryCacheType;
+ UINT64 ValidMtrrAddressMask;
+ EFI_CPUID_REGISTER FeatureInfo;
+ UINT64 Power2Length[8];
+ UINT64 LengthArray[8];
+ UINTN LengthSize;
+ UINTN Index;
+ UINTN Count;
+ UINT32 Remainder;
+ UINT32 VariableMtrrLimit;
+ UINT32 *TempQwordPointer;
+ UINT32 *Power2LengthPointer;
+
+ TempQwordPointer = (UINT32 *) &TempQword;
+
+ VariableMtrrLimit = (UINT32) (AsmReadMsr64 (IA32_MTRR_CAP) & B_IA32_MTRR_VARIABLE_SUPPORT);
+ if (VariableMtrrLimit > V_MAXIMUM_VARIABLE_MTRR_NUMBER) {
+ VariableMtrrLimit = V_MAXIMUM_VARIABLE_MTRR_NUMBER;
+ }
+ ValidMtrrAddressMask = 0x1000000000ULL;
+
+ AsmCpuid (
+ CPUID_EXTENDED_FUNCTION,
+ &FeatureInfo.RegEax,
+ &FeatureInfo.RegEbx,
+ &FeatureInfo.RegEcx,
+ &FeatureInfo.RegEdx
+ );
+ if (FeatureInfo.RegEax >= CPUID_VIR_PHY_ADDRESS_SIZE) {
+ AsmCpuid (
+ CPUID_VIR_PHY_ADDRESS_SIZE,
+ &FeatureInfo.RegEax,
+ &FeatureInfo.RegEbx,
+ &FeatureInfo.RegEcx,
+ &FeatureInfo.RegEdx
+ );
+ ValidMtrrAddressMask = (LShiftU64 ((UINT64) 1, FeatureInfo.RegEax & 0xFF) - 1) & (~(UINT64) 0x0FFF);
+ }
+
+ ///
+ /// Check for invalid parameter
+ ///
+ if ((MemoryAddress &~ValidMtrrAddressMask) != 0 || (MemoryLength &~ValidMtrrAddressMask) != 0) {
+ return EFI_INVALID_PARAMETER;
+ }
+
+ switch (MemoryCacheType) {
+ case EfiCacheTypeUncacheable:
+ case EfiCacheTypeWriteCombining:
+ case EfiCacheTypeWriteThrough:
+ case EfiCacheTypeWriteProtected:
+ case EfiCacheTypeWriteBack:
+ break;
+
+ default:
+ return EFI_INVALID_PARAMETER;
+ }
+
+ ///
+ /// Check if Fixed MTRR
+ ///
+ if ((MemoryAddress + MemoryLength) <= (1 << 20)) {
+ Status = PeiProgramLowMemoryMtrr (
+ This,
+ MemoryCacheType,
+ (UINT32) MemoryAddress,
+ (UINT32) (MemoryAddress + MemoryLength)
+ );
+ return Status;
+ }
+
+ ///
+ /// Special case for 1 MB base address
+ ///
+ if (MemoryAddress == 0x100000) {
+ MemoryAddress = 0;
+ MemoryLength += 0x100000;
+ }
+
+ ///
+ /// Split MemoryLength into a sum of power of 2
+ ///
+ ZeroMem (Power2Length, sizeof (Power2Length));
+ LengthSize = 0;
+ TempQword = MemoryLength;
+ do {
+ Power2Length[LengthSize] = PeiPower2MaxMemory (TempQword);
+ TempQword -= Power2Length[LengthSize];
+ LengthSize++;
+ } while (TempQword != 0 && LengthSize < 8);
+ if (TempQword != 0) {
+ return EFI_LOAD_ERROR;
+ }
+
+ ///
+ /// Work out an order of splitted power of 2
+ /// so that Base and Length are suitable for MTRR
+ /// setting constraints.
+ ///
+ Count = 0;
+ TempQword = MemoryAddress;
+ do {
+ for (Index = 0; Index < LengthSize; Index++) {
+ Power2LengthPointer = (UINT32 *) &Power2Length[Index];
+ if (Power2Length[Index] != 0) {
+ if (Power2LengthPointer[1] != 0) {
+ Remainder = (UINT32) TempQword;
+ if (Remainder == 0) {
+ DivU64x32Remainder (
+ TempQwordPointer[1],
+ Power2LengthPointer[1],
+ &Remainder
+ );
+ }
+ } else {
+ DivU64x32Remainder (TempQword, (UINT32) Power2Length[Index], &Remainder);
+ }
+
+ if (Remainder == 0) {
+ LengthArray[Count] = Power2Length[Index];
+ TempQword += Power2Length[Index];
+ Power2Length[Index] = 0;
+ Count++;
+ break;
+ }
+ }
+ }
+
+ if (Index == LengthSize) {
+ return EFI_LOAD_ERROR;
+ }
+ } while (Count < LengthSize);
+ ///
+ /// Begin setting the MTRR according to the order
+ ///
+ for (Index = 0; Index < LengthSize; Index++, MemoryAddress += MemoryLength) {
+ MemoryLength = LengthArray[Index];
+ ///
+ /// Search if the range attribute has been set before
+ ///
+ Status = SearchForExactMtrr (
+ PeiServices,
+ This,
+ MemoryAddress,
+ MemoryLength,
+ ValidMtrrAddressMask,
+ &UsedMsrNum,
+ &UsedMemoryCacheType
+ );
+
+ if (!EFI_ERROR (Status)) {
+ ///
+ /// Compare if it has the same type as current setting
+ ///
+ if (UsedMemoryCacheType != MemoryCacheType) {
+ ///
+ /// Different type
+ ///
+ ///
+ /// Check if the set type is the same as default type
+ ///
+ if (IsDefaultType (MemoryCacheType)) {
+ ///
+ /// Clear the mtrr
+ ///
+ WriteMsrToBuffer (This, UsedMsrNum, 0);
+ WriteMsrToBuffer (This, UsedMsrNum + 1, 0);
+
+ } else {
+ ///
+ /// Modify the mtrr type
+ ///
+ EfiProgramMtrr (
+ This,
+ UsedMsrNum,
+ MemoryAddress,
+ MemoryLength,
+ MemoryCacheType,
+ ValidMtrrAddressMask
+ );
+ }
+ }
+
+ continue;
+ }
+
+ ///
+ /// Find first unused MTRR
+ ///
+ for (MsrNum = CACHE_VARIABLE_MTRR_BASE; MsrNum < (CACHE_VARIABLE_MTRR_BASE + VariableMtrrLimit * 2); MsrNum += 2) {
+ if (ReadMsrFromBuffer (This, MsrNum + 1) == 0) {
+ break;
+ }
+ }
+ ///
+ /// Check if we ran out of variable-range MTRRs
+ ///
+ if (MsrNum >= (CACHE_VARIABLE_MTRR_BASE + VariableMtrrLimit * 2)) {
+ return EFI_LOAD_ERROR;
+ }
+
+ EfiProgramMtrr (
+ This,
+ MsrNum,
+ MemoryAddress,
+ MemoryLength,
+ MemoryCacheType,
+ ValidMtrrAddressMask
+ );
+ }
+
+ return EFI_SUCCESS;
+}
+
+/**
+ Update MTRR setting from buffer to MSR. Disable NEM when NEM is not disabled yet.
+
+ @param[in] PeiServices - General purpose services available to every PEIM.
+ @param[in] This - Current instance of Pei Cache PPI.
+
+ @retval EFI_SUCCESS - Mtrr are set successfully.
+**/
+EFI_STATUS
+EFIAPI
+PeiActivateCache (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This
+ )
+{
+ UINT32 VariableMtrrLimit;
+ UINT32 MsrNum;
+ UINT64 OldMtrr;
+ UINT16 Index;
+ CACHE_PPI_INSTANCE *CachePpiInstance;
+ CachePpiInstance = PEI_CACHE_PPI_INSTANCE_FROM_THIS (This);
+
+ VariableMtrrLimit = (UINT32) (AsmReadMsr64 (IA32_MTRR_CAP) & B_IA32_MTRR_VARIABLE_SUPPORT);
+ if (VariableMtrrLimit > V_MAXIMUM_VARIABLE_MTRR_NUMBER) {
+ VariableMtrrLimit = V_MAXIMUM_VARIABLE_MTRR_NUMBER;
+ }
+
+ ///
+ /// Disable NEM when NEM is not disabled yet
+ ///
+ if (!CachePpiInstance->NemDisabledDone) {
+ DisableCacheAsRam ();
+ CachePpiInstance->NemDisabledDone = TRUE;
+ }
+
+ ///
+ /// Disable/Enable cache only when MTRR configuration is changed in MTRR buffer
+ ///
+ if (CachePpiInstance->FixedMtrrChanged || CachePpiInstance->VariableMtrrChanged) {
+ EfiDisableCacheMtrr (&OldMtrr);
+ if (CachePpiInstance->FixedMtrrChanged) {
+ for (Index = 0; Index < V_FIXED_MTRR_NUMBER; Index++) {
+ if (CachePpiInstance->FixedMtrrValue[Index].Changed) {
+ AsmWriteMsr64 (mFixedMtrrTable[Index].Msr, CachePpiInstance->FixedMtrrValue[Index].MsrValue);
+ CachePpiInstance->FixedMtrrValue[Index].Changed = FALSE;
+ }
+ }
+
+ CachePpiInstance->FixedMtrrChanged = FALSE;
+ }
+
+ if (CachePpiInstance->VariableMtrrChanged) {
+ for (MsrNum = CACHE_VARIABLE_MTRR_BASE; MsrNum < (CACHE_VARIABLE_MTRR_BASE + VariableMtrrLimit * 2); MsrNum++) {
+ if (CachePpiInstance->VariableMtrrValue[MsrNum - CACHE_VARIABLE_MTRR_BASE].Changed) {
+ AsmWriteMsr64 (MsrNum, CachePpiInstance->VariableMtrrValue[MsrNum - CACHE_VARIABLE_MTRR_BASE].MsrValue);
+ CachePpiInstance->VariableMtrrValue[MsrNum - CACHE_VARIABLE_MTRR_BASE].Changed = FALSE;
+ }
+
+ CachePpiInstance->VariableMtrrChanged = FALSE;
+ }
+ }
+
+ EfiRecoverCacheMtrr (TRUE, OldMtrr);
+ }
+
+ return EFI_SUCCESS;
+}
+
+/**
+ Reset all the MTRRs to a known state.
+
+ @param[in] PeiServices - General purpose services available to every PEIM.
+ @param[in] This - Pointer to the instance of the PEI_CACHE_PPI.
+
+ @retval EFI_SUCCESS - All MTRRs have been reset successfully.
+**/
+EFI_STATUS
+EFIAPI
+PeiResetCacheAttributes (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This
+ )
+{
+ UINT32 MsrNum;
+ UINT16 Index;
+ UINT32 VariableMtrrLimit;
+
+ VariableMtrrLimit = (UINT32) (AsmReadMsr64 (IA32_MTRR_CAP) & B_IA32_MTRR_VARIABLE_SUPPORT);
+ if (VariableMtrrLimit > V_MAXIMUM_VARIABLE_MTRR_NUMBER) {
+ VariableMtrrLimit = V_MAXIMUM_VARIABLE_MTRR_NUMBER;
+ }
+
+ Index = 0;
+
+ ///
+ /// Reset Fixed Mtrrs
+ ///
+ while (mFixedMtrrTable[Index].Msr != 0) {
+ WriteMsrToBuffer (This, Index, 0);
+ Index++;
+ }
+
+ ///
+ /// Reset Variable Mtrrs
+ ///
+ for (MsrNum = CACHE_VARIABLE_MTRR_BASE; MsrNum < (CACHE_VARIABLE_MTRR_BASE + VariableMtrrLimit * 2); MsrNum++) {
+ WriteMsrToBuffer (This, MsrNum, 0);
+ }
+
+ return EFI_SUCCESS;
+}
+
+/**
+ Search the memory cache type for specific memory from MTRR.
+
+ @param[in] PeiServices - General purpose services available to every PEIM.
+ @param[in] This - Current instance of Pei Cache PPI.
+ @param[in] MemoryAddress - the address of target memory
+ @param[in] MemoryLength - the length of target memory
+ @param[in] ValidMtrrAddressMask - the MTRR address mask
+ @param[in] UsedMsrNum - the used MSR number
+ @param[in] UsedMemoryCacheType - the cache type for the target memory
+
+ @retval EFI_SUCCESS - The memory is found in MTRR and cache type is returned
+ @retval EFI_NOT_FOUND - The memory is not found in MTRR
+**/
+EFI_STATUS
+SearchForExactMtrr (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CACHE_PPI *This,
+ IN EFI_PHYSICAL_ADDRESS MemoryAddress,
+ IN UINT64 MemoryLength,
+ IN UINT64 ValidMtrrAddressMask,
+ OUT UINT32 *UsedMsrNum,
+ OUT EFI_MEMORY_CACHE_TYPE *UsedMemoryCacheType
+ )
+{
+ UINT32 MsrNum;
+ UINT64 TempQword;
+ UINT32 VariableMtrrLimit;
+
+ VariableMtrrLimit = (UINT32) (AsmReadMsr64 (IA32_MTRR_CAP) & B_IA32_MTRR_VARIABLE_SUPPORT);
+ if (VariableMtrrLimit > V_MAXIMUM_VARIABLE_MTRR_NUMBER) {
+ VariableMtrrLimit = V_MAXIMUM_VARIABLE_MTRR_NUMBER;
+ }
+
+ for (MsrNum = CACHE_VARIABLE_MTRR_BASE; MsrNum < (CACHE_VARIABLE_MTRR_BASE + VariableMtrrLimit * 2 - 1); MsrNum += 2) {
+
+ TempQword = ReadMsrFromBuffer (This, MsrNum + 1);
+
+ if ((TempQword & B_CACHE_MTRR_VALID) == 0) {
+ continue;
+ }
+
+ if ((TempQword & ValidMtrrAddressMask) != ((~(MemoryLength - 1)) & ValidMtrrAddressMask)) {
+ continue;
+ }
+
+ TempQword = ReadMsrFromBuffer (This, MsrNum);
+
+ if ((TempQword & ValidMtrrAddressMask) != (MemoryAddress & ValidMtrrAddressMask)) {
+ continue;
+ }
+
+ *UsedMemoryCacheType = (EFI_MEMORY_CACHE_TYPE) (TempQword & 0xFF);
+ *UsedMsrNum = MsrNum;
+
+ return EFI_SUCCESS;
+
+ }
+
+ return EFI_NOT_FOUND;
+}
+
+/**
+ Compares provided Cache type to default type
+
+ @param[in] MemoryCacheType - Memory type for testing
+
+ @retval TRUE - Memory type instance is the default type
+ @retval FALSE - Memory type instance is not the default type
+**/
+BOOLEAN
+IsDefaultType (
+ IN EFI_MEMORY_CACHE_TYPE MemoryCacheType
+ )
+{
+
+ if ((AsmReadMsr64 (CACHE_IA32_MTRR_DEF_TYPE) & 0xFF) != MemoryCacheType) {
+ return FALSE;
+ } else {
+ return TRUE;
+ }
+}
+
+/**
+ Install CacheInitPpi
+
+ @retval EFI_OUT_OF_RESOURCES - failed to allocate required pool
+**/
+EFI_STATUS
+CacheInitPpiInit (
+ VOID
+ )
+{
+ EFI_STATUS Status;
+ CACHE_PPI_INSTANCE *CachePpiInstance;
+
+ CachePpiInstance = AllocateZeroPool (sizeof (CACHE_PPI_INSTANCE));
+ ASSERT (CachePpiInstance != NULL);
+ if (CachePpiInstance == NULL) {
+ return EFI_OUT_OF_RESOURCES;
+ }
+
+ CachePpiInstance->Ppi.SetCache = PeiSetCacheAttributes;
+ CachePpiInstance->Ppi.ResetCache = PeiResetCacheAttributes;
+ CachePpiInstance->Ppi.ActivateCache = PeiActivateCache;
+
+ CachePpiInstance->PpiDesc.Flags = EFI_PEI_PPI_DESCRIPTOR_PPI | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST;
+ CachePpiInstance->PpiDesc.Guid = &gPeiCachePpiGuid;
+ CachePpiInstance->PpiDesc.Ppi = &CachePpiInstance->Ppi;
+
+ ///
+ /// Install PPI
+ ///
+ Status = PeiServicesInstallPpi (&CachePpiInstance->PpiDesc);
+ ASSERT_EFI_ERROR (Status);
+ return Status;
+}
+
+VOID
+CacheInvd (
+ VOID
+ );
+
+/**
+ Disable NEM (cache-as-ram)
+
+ @retval EFI_SUCCESS - always return success
+**/
+EFI_STATUS
+DisableCacheAsRam (
+ VOID
+ )
+{
+ UINT64 CacheAsRamMsr;
+ UINT64 McStatus;
+ UINT32 McIndex;
+ UINT32 McCounter;
+ UINT64 TempQword;
+ UINT64 OldMtrr;
+
+ CacheAsRamMsr = AsmReadMsr64 (NO_EVICT_MODE);
+
+ ///
+ /// Check if CAR has already been disabled. We should not
+ /// execute CacheInvd() after cache has been enabled. This
+ /// check will avoid that.
+ ///
+ if ((CacheAsRamMsr & B_NO_EVICT_MODE_RUN) == 0) {
+ return EFI_SUCCESS;
+ }
+
+ CacheInvd ();
+
+ ///
+ /// Step 3: Disable No-Eviction Mode Run State by clearing
+ /// NO_EVICT_MODE MSR 2E0h bit [1] = 0
+ ///
+ CacheAsRamMsr &= ~B_NO_EVICT_MODE_RUN;
+ AsmWriteMsr64 (NO_EVICT_MODE, CacheAsRamMsr);
+
+ ///
+ /// Step 4: Disable No-Eviction Mode Setup State by clearing
+ /// NO_EVICT_MODE MSR 2E0h bit [0] = 0
+ ///
+ CacheAsRamMsr &= ~B_NO_EVICT_MODE_SETUP;
+ AsmWriteMsr64 (NO_EVICT_MODE, CacheAsRamMsr);
+
+ ///
+ /// Disable Cache MTRR by cleaning IA32_MTRR_DEF_TYPE.E or IA32_MTRR_DEF_TYPE.GE
+ ///
+ OldMtrr = AsmReadMsr64 (CACHE_IA32_MTRR_DEF_TYPE);
+ TempQword = OldMtrr &~B_CACHE_MTRR_VALID;
+ AsmWriteMsr64 (CACHE_IA32_MTRR_DEF_TYPE, TempQword);
+
+ ///
+ /// After NEM is disabled, BIOS must clear any Machine Check Bank 5-8 errors that may
+ /// have occurred as the result of ... MLC to to LLC Evictions.
+ ///
+ McStatus = 0;
+ McCounter = (UINT32) (AsmReadMsr64 (IA32_MCG_CAP) & 0x0f);
+ for (McIndex = 5; McIndex < McCounter; McIndex++) {
+ if (McIndex <= 8) {
+ AsmWriteMsr64 (IA32_MC0_STATUS + McIndex * 4, McStatus);
+ }
+ }
+
+ return EFI_SUCCESS;
+}
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.cif b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.cif
new file mode 100644
index 0000000..f69c12f
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.cif
@@ -0,0 +1,20 @@
+<component>
+ name = "CpuInitPei"
+ category = ModulePart
+ LocalRoot = "ReferenceCode\Haswell\CpuInit\Pei"
+ RefName = "CpuInitPei"
+[files]
+"CpuInitPeim.c"
+"CachePeim.c"
+"CpuInitPeim.h"
+"PfatInit.c"
+"PfatInit.h"
+"CpuOcInit.c"
+"CpuOcInit.h"
+"CpuInitPeim.dxs"
+"CpuInitPeim.inf"
+"CpuInitPei.mak"
+"CpuInitPei.sdl"
+"Ia32\Cpu.asm"
+"BootGuardInit.c"
+<endComponent>
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.mak b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.mak
new file mode 100644
index 0000000..7258a7c
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.mak
@@ -0,0 +1,76 @@
+# MAK file for the eModule:PowerManagement
+
+EDK : CpuInitPei
+
+BUILD_CpuInitPei_DIR = $(BUILD_DIR)\$(CpuInitPei_DIR)
+
+$(BUILD_DIR)\CpuInitPei.mak : $(CpuInitPei_DIR)\CpuInitPei.cif $(BUILD_RULES)
+ $(CIF2MAK) $(CpuInitPei_DIR)\CpuInitPei.cif $(CIF2MAK_DEFAULTS)
+
+CpuInitPei : $(BUILD_DIR)\CpuInitPei.MAK CpuInitPeiBin
+
+CpuInitPei_OBJECTS = \
+ $(BUILD_CpuInitPei_DIR)\CpuInitPeim.obj \
+ $(BUILD_CpuInitPei_DIR)\CachePeim.obj \
+ $(BUILD_CpuInitPei_DIR)\CpuOcInit.obj \
+ $(BUILD_CpuInitPei_DIR)\PfatInit.obj \
+ $(BUILD_CpuInitPei_DIR)\ia32\Cpu.obj \
+ $(BUILD_CpuInitPei_DIR)\BootGuardInit.obj
+
+CpuInitPei_MY_INCLUDES= \
+ $(EDK_INCLUDES)\
+ $(PROJECT_CPU_INCLUDES)\
+ $(INTEL_MCH_INCLUDES)\
+ $(ME_INCLUDES)\
+ $(INTEL_PCH_INCLUDES)
+
+CpuInitPei_DEFINES = $(MY_DEFINES)\
+ /D"__EDKII_GLUE_MODULE_ENTRY_POINT__=PeimInitializeCpu"\
+ /D __EDKII_GLUE_BASE_LIB__ \
+ /D __EDKII_GLUE_PEI_MEMORY_ALLOCATION_LIB__ \
+ /D __EDKII_GLUE_BASE_PCI_LIB_PCI_EXPRESS__ \
+ /D __EDKII_GLUE_PEI_SERVICES_TABLE_POINTER_LIB_MM7__ \
+
+CpuInitPei_LIBS =\
+ $(CPU_PPI_LIB)\
+ $(CPUIA32LIB)\
+ $(EdkIIGluePeiServicesLib_LIB) \
+ $(EdkIIGluePeiReportStatusCodeLib_LIB) \
+ $(EfiRuntimeLib_LIB)\
+ $(INTEL_PCH_PROTOCOL_LIB)\
+ $(EFIRUNTIMELIB)\
+ $(EDKFRAMEWORKPPILIB) \
+ $(EdkIIGluePeiMemoryAllocationLib_LIB)\
+ $(EdkIIGluePeiDebugLibReportStatusCode_LIB)\
+ $(BUILD_DIR)\IA32\EdkIIGlueBaseLib.lib\
+ $(IntelPchPpiLib_LIB)\
+ $(EdkIIGlueBaseLibIA32_LIB)\
+ $(EdkIIGluePeiHobLib_LIB) \
+ $(CpuGuidLib_LIB) \
+ $(PEIHOBLIB) \
+ $(EdkIIGlueBaseIoLibIntrinsic_LIB)\
+ $(EdkIIGlueBasePciLibPciExpress_LIB) \
+ $(EdkIIGlueBasePciExpressLib_LIB)\
+ $(PchPlatformPeiLib_LIB)\
+ $(CpuPlatformLib_LIB)\
+ $(OcPlatformLib_LIB)\
+ $(MeLibPpi_LIB)\
+ $(BootGuardLib_LIB)\
+ $(EFISCRIPTLIB)
+
+CpuInitPeiBin : $(CpuInitPei_LIBS) $(HeciPei_LIBS)
+ $(MAKE) /$(MAKEFLAGS) $(EDKIIGLUE_DEFAULTS)\
+ /f $(BUILD_DIR)\CpuInitPei.mak all\
+ NAME=CpuInitPei\
+ MAKEFILE=$(BUILD_DIR)\CpuInitPei.mak \
+ "MY_INCLUDES=$(CpuInitPei_MY_INCLUDES)" \
+ "MY_DEFINES=$(CpuInitPei_DEFINES)"\
+ OBJECTS="$(CpuInitPei_OBJECTS)" \
+ GUID=01359D99-9446-456d-ADA4-50A711C03ADA\
+ ENTRY_POINT=_ModuleEntryPoint \
+ TYPE=PEIM \
+ EDKIIModule=PEIM\
+ DEPEX1=$(CpuInitPei_DIR)\CpuInitPeim.DXS \
+ DEPEX1_TYPE=EFI_SECTION_PEI_DEPEX \
+ COMPRESS=0
+#-----------------------------------------------------------------------
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.sdl b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.sdl
new file mode 100644
index 0000000..a1abd10
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPei.sdl
@@ -0,0 +1,37 @@
+TOKEN
+ Name = "CpuInitPei_SUPPORT"
+ Value = "1"
+ Help = "Main switch to enable Cpu Pei init support in Project"
+ TokenType = Boolean
+ TargetEQU = Yes
+ TargetMAK = Yes
+ TargetH = Yes
+ Master = Yes
+End
+
+PATH
+ Name = "CpuInitPei_DIR"
+End
+
+MODULE
+ Help = "Includes CpuInitPei.mak to Project"
+ File = "CpuInitPei.mak"
+End
+
+ELINK
+ Name = "CpuInitPei_INCLUDES"
+ InvokeOrder = ReplaceParent
+End
+
+ELINK
+ Name = "/I$(CpuInitPei_DIR)"
+ Parent = "CpuInitPei_INCLUDES"
+ InvokeOrder = AfterParent
+End
+
+ELINK
+ Name = "$(BUILD_DIR)\CpuInitPei.ffs"
+ Parent = "FV_BB"
+ InvokeOrder = AfterParent
+End
+
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.c b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.c
new file mode 100644
index 0000000..739e043
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.c
@@ -0,0 +1,1404 @@
+/** @file
+ EFI 2.0 PEIM to initialize the cache and program for unlock processor
+
+Revision History
+
+@copyright
+ Copyright (c) 1999 - 2013 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Pre-EFI Module' and is licensed
+ for Intel CPUs and Chipsets under the terms of your license
+ agreement with Intel or your vendor. This file may be
+ modified by the user, subject to additional terms of the
+ license agreement
+
+**/
+
+///
+/// External include files do NOT need to be explicitly specified in real EDKII
+/// environment
+///
+#if !defined(EDK_RELEASE_VERSION) || (EDK_RELEASE_VERSION < 0x00020000)
+#include "EdkIIGluePeim.h"
+#include "CpuAccess.h"
+#include "CpuInitPeim.h"
+#include "PchAccess.h"
+#include "SaAccess.h"
+#include "PfatInit.h"
+#include "CpuOcInit.h"
+#include "CpuPlatformLib.h"
+
+#include EFI_PPI_DEFINITION (BootMode)
+#include EFI_PPI_DEFINITION (PchInit)
+#include EFI_PPI_CONSUMER (PchReset)
+#endif
+
+#include EFI_PPI_CONSUMER (SecPlatformInformation)
+#include EFI_GUID_DEFINITION (HtBistHob)
+
+/**
+ This fuction compare Setup Options of ActiveCores & HyperThreading against the CPU Strap
+ and in case of mismatch requests reset
+
+ @param[in] PeiServices - For printouts
+ @param[in] CpuStrapSet - Strap current setting
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+
+ @retval CPU_RESET_TYPE
+ @retval CPU_ONLY_RESET - if reset is needed
+ @retval NO_RESET - otherwise
+**/
+CPU_RESET_TYPE
+SetActiveCoresAndSmtEnableDisable (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN CPU_STRAP_SET *CpuStrapSet,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+ CPU_RESET_TYPE ResetType;
+ UINT16 TotalThreadsPerCore;
+ UINT32 Data32;
+ UINT32 NumberOfActiveCores;
+ UINT32 NumberOfActiveThreads;
+ EFI_CPUID_REGISTER Cpuid0B = { 0, 0, 0, 0 };
+
+ ResetType = NO_RESET;
+
+ ///
+ /// Read CPUID(0xB) with ECX=0 for number of logical processors per Core.
+ /// This value does NOT change based on Intel HT Technology disable and core disables.
+ ///
+ Cpuid0B.RegEcx = 0;
+ AsmCpuidEx (CPUID_PROCESSOR_TOPOLOGY, 0, NULL, &Cpuid0B.RegEbx, NULL, NULL);
+ TotalThreadsPerCore = (UINT16) Cpuid0B.RegEbx;
+
+ ///
+ /// CORE_THREAD_COUNT - msr 0x35
+ /// Symbol Name MSB:LSB Description
+ /// CoreCount CoreCount 31:16 The Core Count reflects the enabled cores based
+ /// on the above thread count and the value of threads_
+ /// available (to determine if HT is on) at reset time.
+ ///
+ /// ThreadCount ThreadCount 15:0 The Thread Count reflects the enabled threads based
+ /// on the factory-configured thread count and the value
+ /// of the CSR_DESIRED_CORES register at reset time.
+ ///
+ ///
+ /// Read MSR for Active Core and Thread Count.
+ ///
+ Data32 = (UINT32) AsmReadMsr64 (MSR_CORE_THREAD_COUNT);
+ NumberOfActiveCores = (UINT32) ((Data32 >> 16) & 0xFFFF);
+ NumberOfActiveThreads = (UINT32) (Data32 & 0xFFFF);
+
+ DEBUG ((EFI_D_INFO, "Number of Active Cores / Threads = %x / %x\n", NumberOfActiveCores, NumberOfActiveThreads));
+
+ if (TotalThreadsPerCore > 1) {
+ ///
+ /// SMT is supported
+ ///
+ DEBUG ((EFI_D_INFO, "SMT is supported\n"));
+ ///
+ /// Check if the configuration of SMT matches the BIOS Setup option.
+ ///
+ if (CpuStrapSet->HtDisabled == CpuPlatformPolicyPpi->CpuConfig->HyperThreading) {
+ ///
+ /// SMT configuration doesn't match BIOS Setup option; update the Strap Set Data and Issue a Warm reset
+ ///
+ DEBUG ((EFI_D_INFO, "SMT configuration doesn't match the setup value\n"));
+ CpuStrapSet->HtDisabled = !CpuPlatformPolicyPpi->CpuConfig->HyperThreading;
+ ResetType |= WARM_RESET;
+ }
+ } else {
+ ///
+ /// SMT is not supported by default fusing.
+ ///
+ DEBUG ((EFI_D_WARN, "SMT is NOT supported\n"));
+ CpuStrapSet->HtDisabled = 1;
+ CpuPlatformPolicyPpi->CpuConfig->HyperThreading = CPU_FEATURE_DISABLE;
+ }
+ ///
+ /// Check if the configuration of "Active Core" matches the BIOS Setup option.
+ ///
+ if (CpuStrapSet->NumberOfActiveCores != CpuPlatformPolicyPpi->CpuConfig->ActiveCoreCount) {
+ DEBUG (
+ (EFI_D_INFO,
+ "NumberOfActiveCores doesn't match the value from Setup = %x / %x\n",
+ CpuStrapSet->NumberOfActiveCores,
+ CpuPlatformPolicyPpi->CpuConfig->ActiveCoreCount)
+ );
+ CpuStrapSet->NumberOfActiveCores = CpuPlatformPolicyPpi->CpuConfig->ActiveCoreCount;
+ ///
+ /// Haswell CPU doesnt require COLD reset to set number of active cores
+ ///
+ ResetType |= WARM_RESET;
+ }
+
+ return ResetType;
+}
+
+/**
+ This fuction compare Setup Options of BIST against the CPU Strap
+ and in case of mismatch requests reset
+
+ @param[in] PeiServices - For printouts
+ @param[in] CpuStrapSet - Strap current setting
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+
+ @retval CPU_RESET_TYPE
+ @retval CPU_ONLY_RESET - if reset is needed
+ @retval NO_RESET - otherwise
+**/
+CPU_RESET_TYPE
+BistEnableDisable (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN CPU_STRAP_SET *CpuStrapSet,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+ if (CpuStrapSet->Bist == CpuPlatformPolicyPpi->CpuConfig->BistOnReset) {
+ return NO_RESET;
+ } else {
+ CpuStrapSet->Bist = CpuPlatformPolicyPpi->CpuConfig->BistOnReset;
+ DEBUG ((EFI_D_INFO, "BIST configuration doesn't match the setup value\n"));
+ return WARM_RESET;
+ }
+}
+
+/**
+ This fuction compare Setup Options of Processor Flex Multiplier against the CPU Strap
+ and in case of mismatch requests reset
+
+ @param[in] PeiServices - For printouts
+ @param[in] CpuStrapSet - Strap current setting
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+
+ @retval CPU_RESET_TYPE
+ @retval CPU_ONLY_RESET - if reset is needed
+ @retval NO_RESET - otherwise
+**/
+CPU_RESET_TYPE
+ProgramProcessorFlexMultiplier (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN CPU_STRAP_SET *CpuStrapSet,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+ UINT64 FlexRatioData;
+ UINT64 CurrentClockFlexRatio;
+ UINT64 MsrData;
+ CPU_RESET_TYPE ResetType;
+
+ ResetType = NO_RESET;
+
+ ///
+ /// Perform Flex Ratio if enabled by user in Setup screen
+ ///
+ if (CpuPlatformPolicyPpi->CpuConfig->CpuRatioOverride) {
+ FlexRatioData = (UINT64) (CpuPlatformPolicyPpi->CpuConfig->CpuRatio);
+ } else {
+ ///
+ /// Flex Ratio was set to disable. Reset to Max Non-Turbo Ratio
+ ///
+ FlexRatioData = 0x0;
+ }
+ DEBUG ((EFI_D_INFO, "Setup Ratio is 0x%X\n", FlexRatioData));
+
+ ///
+ /// Read and save current Flex Ratio data; disregard enable bit (MSR 194h [15:8])
+ ///
+ MsrData = AsmReadMsr64 (MSR_FLEX_RATIO);
+ CurrentClockFlexRatio = ((RShiftU64 (MsrData, N_FLEX_RATIO)) & 0xFF);
+ DEBUG ((EFI_D_INFO, "Current Flex Ratio from MSR is 0x%X\n", CurrentClockFlexRatio));
+ DEBUG ((EFI_D_INFO, "Current Flex Ratio from CPU Strap: 0x%X\n", CpuStrapSet->FlexRatio));
+ ///
+ /// Check and set Flex Ratio to requested ratio if possible
+ ///
+ if (FlexRatioData == CpuStrapSet->FlexRatio) {
+ ///
+ /// Do nothing, ratio is already set to requested value and enabled
+ ///
+ DEBUG ((EFI_D_INFO, "No need to set Flex Ratio.\n"));
+ } else {
+ ///
+ /// Set Flex Ratio to user selected value
+ ///
+ /// Write new data to Flex Ratio register
+ /// First clear MSR of any previous value
+ ///
+ MsrData &= RATIO_FLEX_CLEAR_MASK;
+
+ ///
+ /// Enter the new data
+ ///
+ MsrData |= (LShiftU64 ((FlexRatioData & 0xFF), N_FLEX_RATIO));
+ MsrData |= B_FLEX_EN;
+ AsmWriteMsr64 (MSR_FLEX_RATIO, MsrData);
+
+ ///
+ /// Set Soft Reset Data for Flex Ratio
+ ///
+ CpuStrapSet->FlexRatio = (UINT32) FlexRatioData;
+
+ ///
+ /// Set RESET flag
+ ///
+ DEBUG ((EFI_D_INFO, "Setting Flex Ratio to 0x%X\n", CpuStrapSet->FlexRatio));
+ ResetType |= WARM_RESET;
+ }
+
+ return ResetType;
+}
+
+static EFI_PEI_NOTIFY_DESCRIPTOR mNotifyList[] = {
+ {
+ EFI_PEI_PPI_DESCRIPTOR_NOTIFY_CALLBACK,
+ &gPchInitPpiGuid,
+ SetCpuStrap
+ },
+ {
+ (EFI_PEI_PPI_DESCRIPTOR_NOTIFY_CALLBACK | EFI_PEI_PPI_DESCRIPTOR_TERMINATE_LIST),
+ &gEfiPeiMasterBootModePpiGuid,
+ BuildBistHob
+ }
+};
+
+/**
+ Check if VT is fused and disabled by Setup Option so reset is needed
+
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+
+ @retval CPU_RESET_TYPE
+ @retval NO_RESET - If no reset is needed
+ @retval COLDRESET - otherwise
+**/
+CPU_RESET_TYPE
+CheckVmxIfNeedReset (
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+ UINT64 MsrIa32FeatureControl;
+ BOOLEAN CurrentVmxState;
+ EFI_CPUID_REGISTER Cpuid01 = { 0, 0, 0, 0 };
+
+ AsmCpuid (CPUID_VERSION_INFO, &Cpuid01.RegEax, &Cpuid01.RegEbx, &Cpuid01.RegEcx, &Cpuid01.RegEdx);
+
+ ///
+ /// Check if VMX is supported
+ ///
+ if ((Cpuid01.RegEcx & B_CPUID_VERSION_INFO_ECX_VME) == 0) {
+ return NO_RESET;
+ }
+
+ MsrIa32FeatureControl = AsmReadMsr64 (MSR_IA32_FEATURE_CONTROL);
+
+ ///
+ /// If unlocked, no reset needed.
+ ///
+ if ((MsrIa32FeatureControl & B_MSR_IA32_FEATURE_CONTROL_LOCK) == 0) {
+ return NO_RESET;
+ }
+
+ CurrentVmxState = (BOOLEAN) ((MsrIa32FeatureControl & B_MSR_IA32_FEATURE_CONTROL_EVT) != 0);
+
+ ///
+ /// Need to reset only if locked and VMX state has to be changed.
+ ///
+ if ((CurrentVmxState == (CpuPlatformPolicyPpi->CpuConfig->VmxEnable)) == CPU_FEATURE_ENABLE) {
+ return NO_RESET;
+ }
+ ///
+ /// We need a power good reset to unlock MSR_IA32_FEATURE_CONTROL.
+ ///
+ return COLDRESET;
+}
+
+/**
+ Set CPU strap setting for feature change
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] NotifyDescriptor - Address of the notification descriptor data structure. Type
+ EFI_PEI_NOTIFY_DESCRIPTOR is defined above.
+ @param[in] Ppi - Address of the PPI that was installed.
+
+ @retval EFI_SUCCESS - Function completed successfully
+**/
+EFI_STATUS
+EFIAPI
+SetCpuStrap (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor,
+ IN VOID *Ppi
+ )
+{
+ EFI_STATUS Status;
+ CPU_STRAP_SET CpuStrapSet = { 0 };
+ UINT16 CpuStrapSetData;
+ volatile CPU_RESET_TYPE ResetType;
+ PCH_INIT_PPI *PchInitPpi;
+ PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi;
+ UINT8 Data;
+
+ ResetType = NO_RESET;
+ CpuStrapSetData = 0;
+ Data = 0;
+
+ Status = PeiServicesLocatePpi (
+ &gPeiCpuPlatformPolicyPpiGuid,
+ 0,
+ NULL,
+ (VOID **) &CpuPlatformPolicyPpi
+ );
+ ASSERT_EFI_ERROR (Status);
+
+ ///
+ /// Locate PchInit Ppi
+ ///
+ Status = PeiServicesLocatePpi (
+ &gPchInitPpiGuid,
+ 0,
+ NULL,
+ (VOID **) &PchInitPpi
+ );
+ if (Status == EFI_SUCCESS) {
+ ///
+ /// Get Cpu Strap Set Data
+ ///
+ DEBUG ((EFI_D_INFO, "Set PCH CPU Straps \n"));
+ Status = PchInitPpi->CpuStrapSet (PeiServices, GetCpuStrapSetData, &CpuStrapSetData);
+ *((UINT16 *) (&CpuStrapSet)) = CpuStrapSetData;
+ DEBUG ((EFI_D_INFO, "Current CPU Strap Data = 0x%04X\n", CpuStrapSetData));
+
+ if (Status == EFI_SUCCESS) {
+ ResetType |= SetActiveCoresAndSmtEnableDisable (PeiServices, &CpuStrapSet, CpuPlatformPolicyPpi);
+ ResetType |= BistEnableDisable (PeiServices, &CpuStrapSet, CpuPlatformPolicyPpi);
+
+ ///
+ /// Perform Flex Ratio if processor is fused to perform Flex Ratio
+ ///
+ if ((AsmReadMsr64 (MSR_FLEX_RATIO) & B_FLEX_EN) == B_FLEX_EN) {
+ ResetType |= ProgramProcessorFlexMultiplier (PeiServices, &CpuStrapSet, CpuPlatformPolicyPpi);
+ }
+
+ if (ResetType != NO_RESET) {
+ CpuStrapSetData = *((UINT16 *) (&CpuStrapSet));
+ DEBUG ((EFI_D_INFO, "New CPU Strap Data = 0x%04X\n", CpuStrapSetData));
+ Status = PchInitPpi->CpuStrapSet (
+ PeiServices,
+ SetCpuStrapSetData,
+ &CpuStrapSetData
+ );
+ if (EFI_ERROR (Status)) {
+ DEBUG ((EFI_D_INFO, "NO Reset\n"));
+ ResetType = NO_RESET;
+ }
+ }
+ }
+ }
+
+ ResetType |= CheckVmxIfNeedReset (CpuPlatformPolicyPpi);
+
+ if (ResetType != NO_RESET) {
+ ///
+ /// Perform Warm or Cold Reset
+ ///
+ DEBUG (
+ (EFI_D_INFO,
+ "Reset Required. Performing Cold/Warm Reset to read the new strap values - ResetType = %x\n",
+ ResetType)
+ );
+ PerformWarmORColdReset (PeiServices, ResetType);
+ }
+
+ Status = PchInitPpi->CpuStrapSet (
+ PeiServices,
+ LockCpuStrapSetData,
+ &CpuStrapSetData
+ );
+ DEBUG ((EFI_D_INFO, "No Reset Required\n"));
+
+ return EFI_SUCCESS;
+}
+
+/**
+ Initialize prefetcher settings
+
+ @param[in] MlcStreamerprefecterEnabled - Enable/Disable MLC streamer prefetcher
+ @param[in] MlcSpatialPrefetcherEnabled - Enable/Disable MLC spatial prefetcher
+**/
+VOID
+ProcessorsPrefetcherInitialization (
+ IN UINTN MlcStreamerprefecterEnabled,
+ IN UINTN MlcSpatialPrefetcherEnabled
+ )
+{
+ UINT64 MsrValue;
+ MsrValue = AsmReadMsr64 (MISC_FEATURE_CONTROL);
+
+ if (MlcStreamerprefecterEnabled == CPU_FEATURE_DISABLE) {
+ MsrValue |= B_MISC_FEATURE_CONTROL_MLC_STRP;
+ }
+
+ if (MlcSpatialPrefetcherEnabled == CPU_FEATURE_DISABLE) {
+ MsrValue |= B_MISC_FEATURE_CONTROL_MLC_SPAP;
+ }
+
+ if ((MsrValue & (B_MISC_FEATURE_CONTROL_MLC_STRP | B_MISC_FEATURE_CONTROL_MLC_SPAP)) != 0) {
+ AsmWriteMsr64 (MISC_FEATURE_CONTROL, MsrValue);
+ }
+
+ return;
+}
+
+/**
+ Based on ResetType, perform warm or cold reset using PCH Reset PPI
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] ResetType - CPU_RESET_TYPE to indicate which reset shoudl be performed.
+
+ @exception EFI_UNSUPPORTED - Reset type unsupported
+ @retval EFI_SUCCESS - function successfully (system should already reset)
+**/
+EFI_STATUS
+PerformWarmORColdReset (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN CPU_RESET_TYPE ResetType
+ )
+{
+ PCH_RESET_PPI *PchResetPpi;
+ EFI_STATUS Status;
+
+ ///
+ /// Loccate Reset PPI
+ ///
+ Status = (*PeiServices)->LocatePpi (
+ PeiServices,
+ &gPchResetPpiGuid,
+ 0,
+ NULL,
+ (VOID **) &PchResetPpi
+ );
+
+ ASSERT_EFI_ERROR (Status);
+
+ ///
+ /// Perfrom the requested reset using PCH reset PPI
+ ///
+ Status = EFI_SUCCESS;
+ switch (ResetType) {
+ case WARM_RESET:
+ PchResetPpi->Reset (PchResetPpi, RESET_PPI_WARM_RESET);
+ break;
+
+ case COLDRESET:
+ PchResetPpi->Reset (PchResetPpi, RESET_PPI_COLD_RESET);
+ break;
+
+ default:
+ DEBUG ((EFI_D_ERROR, "CpuInitPeim: PerformWarmORColdReset - ResetType %d not supported: \n", ResetType));
+ Status = EFI_UNSUPPORTED;
+ ASSERT_EFI_ERROR (Status);
+ }
+
+ return Status;
+}
+
+/**
+ Initializes XE OR Overclocking support in the processor.
+
+ @param[in] PowerMgmtConfig Pointer to Policy protocol instance
+
+ @retval EFI_SUCCESS
+**/
+EFI_STATUS
+XeInit (
+ IN OUT POWER_MGMT_CONFIG_PPI *PowerMgmtConfig,
+ IN OUT OVERCLOCKING_CONFIG_PPI *OcConfig
+ )
+{
+ MSR_REGISTER TurboRatioLimit;
+ MSR_REGISTER FlexRatioMsr;
+ MSR_REGISTER TempMsr;
+ MSR_REGISTER RingRatioMsr;
+ UINT8 CoreCount;
+ UINT8 OverclockingBins;
+ UINT8 OneCoreRatioLimit;
+ UINT8 TwoCoreRatioLimit;
+ UINT8 ThreeCoreRatioLimit;
+ UINT8 FourCoreRatioLimit;
+ UINT8 RatioLimitProgrammble;
+ UINT16 MaxBusRatio;
+
+ if ((PowerMgmtConfig->Xe == 0)) {
+ ///
+ /// XE is disabled
+ ///
+ return EFI_SUCCESS;
+ }
+
+ TurboRatioLimit.Qword = AsmReadMsr64 (MSR_TURBO_RATIO_LIMIT);
+ OneCoreRatioLimit = (UINT8) (TurboRatioLimit.Dwords.Low & B_MSR_TURBO_RATIO_LIMIT_1C);
+ TwoCoreRatioLimit = (UINT8) RShiftU64 (
+ (TurboRatioLimit.Dwords.Low & B_MSR_TURBO_RATIO_LIMIT_2C),
+ N_MSR_TURBO_RATIO_LIMIT_2C
+ );
+ ThreeCoreRatioLimit = (UINT8) RShiftU64 (
+ (TurboRatioLimit.Dwords.Low & B_MSR_TURBO_RATIO_LIMIT_3C),
+ N_MSR_TURBO_RATIO_LIMIT_3C
+ );
+ FourCoreRatioLimit = (UINT8) RShiftU64 (
+ (TurboRatioLimit.Dwords.Low & B_MSR_TURBO_RATIO_LIMIT_4C),
+ N_MSR_TURBO_RATIO_LIMIT_4C
+ );
+
+ ///
+ /// Check if XE capable
+ ///
+ FlexRatioMsr.Qword = AsmReadMsr64 (MSR_FLEX_RATIO);
+
+ ///
+ /// Overclocking availablity
+ ///
+ OverclockingBins = (UINT8) RShiftU64 ((FlexRatioMsr.Dwords.Low & B_OVERCLOCKING_BINS), N_OVERCLOCKING_BINS);
+
+ ///
+ /// Check if Turbo Ratio Limit is programmable
+ /// Platform Info MSR (0xCE) [28]
+ ///
+ TempMsr.Qword = AsmReadMsr64 (MSR_PLATFORM_INFO);
+ RatioLimitProgrammble = (UINT8) RShiftU64 (
+ (TempMsr.Qword & B_PLATFORM_INFO_RATIO_LIMIT),
+ N_PLATFORM_INFO_RATIO_LIMIT
+ );
+ ///
+ /// Get Maximum Non-Turbo bus ratio (HFM) from Platform Info MSR Bits[15:8]
+ ///
+ MaxBusRatio = TempMsr.Bytes.SecondByte;
+
+ ///
+ /// Check if processor turbo-ratio can be overriden:
+ /// BWG Section 14.14.2
+ /// If PLATFORM INFO MSR [28] == 1 and FLEX_RATIO MSR [19:17] != 0
+ /// Processor with capability to override turbo-ratio detected (either XE or Overclocking part detected)
+ ///
+ if ((RatioLimitProgrammble == 0) || (OverclockingBins == 0)) {
+ ///
+ /// Neither XE nor Overclocking Capable processor.
+ ///
+ DEBUG ((EFI_D_WARN, "WARNING: Trying to configure XE params on a non-XE processor\n"));
+ return EFI_SUCCESS;
+ }
+ ///
+ /// For Overclocking parts, verify ratio overide is within the allowable limits
+ ///
+ if ((RatioLimitProgrammble) && (OverclockingBins < MAX_OVERCLOCKING_BINS)) {
+ if (PowerMgmtConfig->RatioLimit[0] > (OneCoreRatioLimit + OverclockingBins)) {
+ PowerMgmtConfig->RatioLimit[0] = OneCoreRatioLimit + OverclockingBins;
+ }
+
+ if (PowerMgmtConfig->RatioLimit[1] > (TwoCoreRatioLimit + OverclockingBins)) {
+ PowerMgmtConfig->RatioLimit[1] = TwoCoreRatioLimit + OverclockingBins;
+ }
+
+ if (PowerMgmtConfig->RatioLimit[2] > (ThreeCoreRatioLimit + OverclockingBins)) {
+ PowerMgmtConfig->RatioLimit[2] = ThreeCoreRatioLimit + OverclockingBins;
+ }
+
+ if (PowerMgmtConfig->RatioLimit[3] > (FourCoreRatioLimit + OverclockingBins)) {
+ PowerMgmtConfig->RatioLimit[3] = FourCoreRatioLimit + OverclockingBins;
+ }
+ }
+
+ if ((RatioLimitProgrammble)) {
+ ///
+ /// Now initialize turbo ratio limit MSR
+ /// Find the number of active cores and initialize the ratio limits only if they are available.
+ /// Also program the VID value for the new max Turbo ratio by programming Flex Ratio MSR.
+ ///
+ TempMsr.Qword = AsmReadMsr64 (MSR_CORE_THREAD_COUNT);
+ CoreCount = (UINT8) RShiftU64 (TempMsr.Dwords.Low, N_CORE_COUNT_OFFSET);
+
+ if (PowerMgmtConfig->RatioLimit[0] >= PowerMgmtConfig->RatioLimit[1] &&
+ PowerMgmtConfig->RatioLimit[0] >= PowerMgmtConfig->RatioLimit[2] &&
+ PowerMgmtConfig->RatioLimit[0] >= PowerMgmtConfig->RatioLimit[3] &&
+ PowerMgmtConfig->RatioLimit[1] >= MaxBusRatio &&
+ PowerMgmtConfig->RatioLimit[2] >= MaxBusRatio &&
+ PowerMgmtConfig->RatioLimit[3] >= MaxBusRatio
+ ) {
+ if (CoreCount >= 1) {
+ TurboRatioLimit.Dwords.Low &= ~B_MSR_TURBO_RATIO_LIMIT_1C;
+ TurboRatioLimit.Dwords.Low |= PowerMgmtConfig->RatioLimit[0];
+ }
+
+ if (CoreCount >= 2) {
+ TurboRatioLimit.Dwords.Low &= ~B_MSR_TURBO_RATIO_LIMIT_2C;
+ TurboRatioLimit.Dwords.Low |= LShiftU64 (PowerMgmtConfig->RatioLimit[1], 8);
+ }
+
+ if (CoreCount >= 3) {
+ TurboRatioLimit.Dwords.Low &= ~B_MSR_TURBO_RATIO_LIMIT_3C;
+ TurboRatioLimit.Dwords.Low |= LShiftU64 (PowerMgmtConfig->RatioLimit[2], 16);
+ }
+
+ if (CoreCount >= 4) {
+ TurboRatioLimit.Dwords.Low &= ~B_MSR_TURBO_RATIO_LIMIT_4C;
+ TurboRatioLimit.Dwords.Low |= LShiftU64 (PowerMgmtConfig->RatioLimit[3], 24);
+ }
+
+ AsmWriteMsr64 (MSR_TURBO_RATIO_LIMIT, TurboRatioLimit.Qword);
+ }
+ }
+
+ ///
+ /// For Overclocking parts, if a non-default ring ratio is specificed, we need to
+ /// update the ring ratio limit MSR's max limit
+ ///
+ if ((OverclockingBins != 0) && (OcConfig->ClrMaxOcTurboRatio != 0)) {
+ RingRatioMsr.Qword = AsmReadMsr64 (MSR_RING_RATIO_LIMIT);
+ RingRatioMsr.Bytes.FirstByte &= ~MSR_MAX_RING_RATIO_LIMIT_MASK;
+ RingRatioMsr.Bytes.FirstByte |= OcConfig->ClrMaxOcTurboRatio & MSR_MAX_RING_RATIO_LIMIT_MASK;
+ AsmWriteMsr64 (MSR_RING_RATIO_LIMIT, RingRatioMsr.Qword);
+ }
+ return EFI_SUCCESS;
+}
+
+/**
+ Initialize performance and power management features
+
+ @param[in] CpuPlatformPolicyPpi - The CPU Platform Policy PPI instance
+**/
+VOID
+ProcessorsPerfPowerInit (
+ IN OUT PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+ EFI_CPUID_REGISTER Cpuid = { 0, 0, 0, 0 };
+ MSR_REGISTER TempMsr;
+ UINT8 TccActivationOffsetProgrammable;
+ UINT16 MaxBusRatio;
+ UINT16 MinBusRatio;
+ UINT32 Remainder;
+ POWER_MGMT_CONFIG_PPI *PowerMgmtConfig;
+ MSR_REGISTER TurboRatioLimit;
+ UINT8 OneCoreRatioLimit;
+ MSR_REGISTER Ia32MiscEnable;
+ CPU_FAMILY CpuFamilyId;
+ CPU_STEPPING CpuStepping;
+ UINT8 TccActivationOffsetMask;
+ UINT32 WriteFivrSpreadCmd;
+ UINT32 ReadFivrSpreadCmd;
+ UINT32 ReadFivrSpreadData;
+ UINT32 WriteFivrSpreadData;
+ UINT32 MailboxStatus;
+
+ PowerMgmtConfig = CpuPlatformPolicyPpi->PowerMgmtConfig;
+ CpuFamilyId = GetCpuFamily();
+ CpuStepping = GetCpuStepping();
+
+ ///
+ /// Initializes Processor Prefetcher
+ ///
+ ProcessorsPrefetcherInitialization (
+ CpuPlatformPolicyPpi->CpuConfig->MlcStreamerPrefetcher,
+ CpuPlatformPolicyPpi->CpuConfig->MlcSpatialPrefetcher
+ );
+
+ TempMsr.Qword = AsmReadMsr64 (MSR_PLATFORM_INFO);
+
+ ///
+ /// Get Tcc Activation Offset Programmable Setting from Platform Info MSR Bits[30]
+ ///
+ TccActivationOffsetProgrammable = (UINT8) RShiftU64 (
+ (TempMsr.Qword & B_PLATFORM_INFO_PROG_TCC_ACTIVATION_OFFSET),
+ N_PLATFORM_INFO_PROG_TCC_ACTIVATION_OFFSET
+ );
+ ///
+ /// Get Maximum Non-Turbo bus ratio (HFM) from Platform Info MSR Bits[15:8]
+ ///
+ MaxBusRatio = TempMsr.Bytes.SecondByte;
+ ///
+ /// Get Maximum Efficiency bus ratio (LFM) from Platform Info MSR Bits[47:40]
+ ///
+ MinBusRatio = TempMsr.Bytes.SixthByte;
+ ///
+ /// Tcc activation offset in temperature target MSR changes from 4 bits [27:24] to 6 bits [29:24] on ULT C step onwards
+ ///
+ if ((CpuFamilyId == EnumCpuHswUlt) && (CpuStepping >= EnumHswUltC0)) {
+ TccActivationOffsetMask = 0x3F;
+ } else {
+ TccActivationOffsetMask = 0xF;
+ }
+ ///
+ /// If User slects TccActivationOffset greater than supported progam max supported.
+ ///
+ if(PowerMgmtConfig->TccActivationOffset > TccActivationOffsetMask){
+ PowerMgmtConfig->TccActivationOffset = TccActivationOffsetMask;
+ }
+ ///
+ /// First check if TCC Activation Offset is programmable PLATFORM INFO MSR [30]
+ /// If TCC Activation Offset is programable, program the TCC Activation offset value
+ /// from Policy, and the Tcc activation offset programming should be dependency on RESET_CPL done.
+ ///
+ if (TccActivationOffsetProgrammable) {
+ TempMsr.Qword = AsmReadMsr64 (MSR_TEMPERATURE_TARGET);
+ TempMsr.Dwords.Low &= ~(TccActivationOffsetMask << N_MSR_TEMPERATURE_TARGET_TCC_OFFSET_LIMIT);
+ PowerMgmtConfig->TccActivationOffset &= TccActivationOffsetMask;
+ TempMsr.Dwords.Low |= LShiftU64 (PowerMgmtConfig->TccActivationOffset, N_MSR_TEMPERATURE_TARGET_TCC_OFFSET_LIMIT);
+ AsmWriteMsr64 (MSR_TEMPERATURE_TARGET, TempMsr.Qword);
+ }
+ ///
+ /// Program Voltage regulator Current Limit's
+ ///
+ TempMsr.Qword = AsmReadMsr64 (MSR_VR_CURRENT_CONFIG);
+ TempMsr.Dwords.High &= ~PSIX_THRESHOLD_MASK;
+ if (CpuPlatformPolicyPpi->Revision >= PEI_CPU_PLATFORM_POLICY_PPI_REVISION_5) {
+ TempMsr.Dwords.High |= ((PowerMgmtConfig->Psi3Threshold << 20) | (PowerMgmtConfig->Psi2Threshold << 10) | PowerMgmtConfig->Psi1Threshold );
+ if ((CpuFamilyId == EnumCpuHswUlt) && (PowerMgmtConfig->VrPSI4enable)) {
+ TempMsr.Dwords.High |= (0x1 << 30);
+ }
+ }
+ if (PowerMgmtConfig->VrCurrentLimit != 0) {
+ ///
+ /// Check the VR_CURRENT_LOCK bit
+ ///
+ if ((TempMsr.Dwords.Low & B_CURRENT_LIMIT_LOCK) == 0) {
+ TempMsr.Dwords.Low &= ~B_CURRENT_LIMIT_MASK;
+ TempMsr.Dwords.Low |= PowerMgmtConfig->VrCurrentLimit;
+ } else {
+ DEBUG ((EFI_D_INFO, "PPM:: VR Current Limit in MSR_VR_CURRENT_CONFIG is locked\n"));
+ }
+ }
+ ///
+ /// Set CURRENT_LIMIT_LOCK bit in VR_Config_MSR
+ ///
+ if (PowerMgmtConfig->VrCurrentLimitLock) {
+ TempMsr.Dwords.Low |= B_CURRENT_LIMIT_LOCK;
+ }
+
+ AsmWriteMsr64 (MSR_VR_CURRENT_CONFIG, TempMsr.Qword);
+
+ if (CpuPlatformPolicyPpi->Revision >= PEI_CPU_PLATFORM_POLICY_PPI_REVISION_4) {
+ TempMsr.Qword = AsmReadMsr64 (MSR_VR_MISC_CONFIG);
+ TempMsr.Dwords.High = RRotU32 (TempMsr.Dwords.High, 8);
+ if (PowerMgmtConfig->VrMiscIoutSlope <= 1023) {
+ ///
+ /// Update IOUT_SLOPE [49:40]
+ /// Must be 0 to 0x3FF (1023 decimal)
+ ///
+ TempMsr.Dwords.High &= ~0x3FF;
+ TempMsr.Dwords.High |= PowerMgmtConfig->VrMiscIoutSlope;
+ }
+ TempMsr.Dwords.High = LRotU32 (TempMsr.Dwords.High, 8);
+ if ((PowerMgmtConfig->VrMiscIoutOffset != 0) && (PowerMgmtConfig->VrMiscIoutOffset <= 625)) {
+ ///
+ /// Update IOUT_OFFSET[39:32]
+ /// MSR encoding = int(value*2^8+0.0625) for positive offsets
+ /// inv(int(value*2^8+0.0625))+1 for negative offsets
+ /// +0.0625 could be ignored
+ ///
+ PowerMgmtConfig->VrMiscIoutOffset = (UINT16) DivU64x32Remainder (
+ (UINT64) MultU64x32 (PowerMgmtConfig->VrMiscIoutOffset, (UINT32) LShiftU64 (1, 8)),
+ 10000,
+ &Remainder
+ );
+ if (Remainder >= 5000) {
+ PowerMgmtConfig->VrMiscIoutOffset += 1;
+ }
+ if (PowerMgmtConfig->VrMiscIoutOffsetSign == 1) {
+ ///
+ /// This is negative offset
+ ///
+ PowerMgmtConfig->VrMiscIoutOffset = (UINT8) (~PowerMgmtConfig->VrMiscIoutOffset + 1);
+ }
+ TempMsr.Dwords.High &= ~0xFF;
+ TempMsr.Dwords.High |= PowerMgmtConfig->VrMiscIoutOffset;
+ }
+ AsmWriteMsr64 (MSR_VR_MISC_CONFIG, TempMsr.Qword);
+ }
+
+ if (CpuPlatformPolicyPpi->Revision >= PEI_CPU_PLATFORM_POLICY_PPI_REVISION_3) {
+ TempMsr.Qword = AsmReadMsr64 (MSR_VR_MISC_CONFIG);
+ TempMsr.Dwords.Low = RRotU32 (TempMsr.Dwords.Low, N_MSR_VR_MISC_CONFIG_MIN_VID_OFFSET);
+ ///
+ /// Update MIN_VID [31:24]
+ /// Must be 0 to 0xFF (255 decimal) resolution 10mV
+ /// 0 equal to 0mV; 0xFF (255 decimal) equal to 2550mV
+ ///
+ TempMsr.Dwords.Low &= ~B_MSR_VR_MISC_CONFIG_MIN_VID_MASK;
+ TempMsr.Dwords.Low |= PowerMgmtConfig->VrMiscMinVid;
+ TempMsr.Dwords.Low = LRotU32 (TempMsr.Dwords.Low, N_MSR_VR_MISC_CONFIG_MIN_VID_OFFSET);
+
+ ///
+ /// Update IDLE_EXIT_RAMP_RATE[50]
+ ///
+ TempMsr.Qword &= ~B_MSR_VR_MISC_CONFIG_IDLE_EXIT_RAMP_RATE;
+ if (PowerMgmtConfig->VrMiscIdleExitRampRate) {
+ TempMsr.Qword |= B_MSR_VR_MISC_CONFIG_IDLE_EXIT_RAMP_RATE;
+ }
+
+ ///
+ /// Update IDLE_ENTRY_RAMP_RATE[51]
+ ///
+ TempMsr.Qword &= ~B_MSR_VR_MISC_CONFIG_IDLE_ENTRY_RAMP_RATE;
+ if (PowerMgmtConfig->VrMiscIdleEntryRampRate) {
+ TempMsr.Qword |= B_MSR_VR_MISC_CONFIG_IDLE_ENTRY_RAMP_RATE;
+ }
+
+ ///
+ /// Update IDLE_ENTRY_DECAY_ENABLE[52]
+ ///
+ TempMsr.Qword &= ~B_MSR_VR_MISC_CONFIG_IDLE_ENTRY_DECAY_ENABLE;
+ if (PowerMgmtConfig->VrMiscIdleEntryDecayEnable) {
+ TempMsr.Qword |= B_MSR_VR_MISC_CONFIG_IDLE_ENTRY_DECAY_ENABLE;
+ }
+
+ if (CpuFamilyId == EnumCpuHswUlt) {
+ ///
+ /// Update IDLE_ENTRY_DECAY_ENABLE[52]
+ ///
+ TempMsr.Qword &= ~B_MSR_VR_MISC_CONFIG_SLOW_SLEW_RATE_CONFIG_MASK;
+ switch (PowerMgmtConfig->VrMiscSlowSlewRateConfig) {
+ case 1:
+ TempMsr.Qword |= V_MSR_VR_MISC_CONFIG_SLOW_SLEW_RATE_CONFIG_FAST_4;
+ break;
+ case 2:
+ TempMsr.Qword |= V_MSR_VR_MISC_CONFIG_SLOW_SLEW_RATE_CONFIG_FAST_8;
+ break;
+ case 3:
+ TempMsr.Qword |= V_MSR_VR_MISC_CONFIG_SLOW_SLEW_RATE_CONFIG_FAST_16;
+ break;
+ case 0:
+ default:
+ TempMsr.Qword |= V_MSR_VR_MISC_CONFIG_SLOW_SLEW_RATE_CONFIG_FAST_2;
+ break;
+ }
+ }
+ AsmWriteMsr64 (MSR_VR_MISC_CONFIG, TempMsr.Qword);
+
+ if (CpuFamilyId == EnumCpuHswUlt) {
+ TempMsr.Qword = AsmReadMsr64 (MSR_VR_MISC_CONFIG2);
+ ///
+ /// Update FAST_RAMP_VOLTAGE [7:0]
+ /// Must be 0 to 0xFF (255 decimal) resolution 10mV
+ /// 0 equal to 0mV; 0xFF (255 decimal) equal to 2550mV
+ ///
+ TempMsr.Bytes.FirstByte &= ~B_MSR_VR_MISC_CONFIG2_FAST_RAMP_VOLTAGE_MASK;
+ TempMsr.Bytes.FirstByte |= PowerMgmtConfig->VrMisc2FastRampVoltage;
+
+ ///
+ /// Update MIN_C8_VOLTAGE [15:8]
+ /// Must be 0 to 0xFF (255 decimal) resolution 10mV
+ /// 0 equal to 0mV; 0xFF (255 decimal) equal to 2550mV
+ ///
+ TempMsr.Bytes.SecondByte &= ~B_MSR_VR_MISC_CONFIG2_MIN_C8_VOLTAGE_MASK;
+ TempMsr.Bytes.SecondByte |= PowerMgmtConfig->VrMisc2MinC8Voltage;
+
+ AsmWriteMsr64 (MSR_VR_MISC_CONFIG2, TempMsr.Qword);
+ }
+ }
+ ///
+ /// Initializes XE OR Overclocking support
+ ///
+ XeInit (CpuPlatformPolicyPpi->PowerMgmtConfig, CpuPlatformPolicyPpi->OverclockingConfig);
+
+ ///
+ /// Set processor P state to HFM, LFM or TURBO
+ ///
+ AsmCpuid (CPUID_VERSION_INFO, &Cpuid.RegEax, &Cpuid.RegEbx, &Cpuid.RegEcx, &Cpuid.RegEdx);
+ ///
+ /// Check to see if CPU is GV3 capable - GV3 is fused Enabled
+ ///
+ if ((Cpuid.RegEcx & B_CPUID_VERSION_INFO_ECX_EIST) == B_CPUID_VERSION_INFO_ECX_EIST) {
+ Ia32MiscEnable.Qword = AsmReadMsr64 (MSR_IA32_MISC_ENABLE);
+ Ia32MiscEnable.Qword |= B_MSR_IA32_MISC_ENABLE_EIST;
+ AsmWriteMsr64 (MSR_IA32_MISC_ENABLE, Ia32MiscEnable.Qword);
+
+ TempMsr.Qword = AsmReadMsr64 (MSR_IA32_PERF_CTRL);
+ TempMsr.Qword &= ~B_IA32_PERF_CTRLP_STATE_TARGET;
+
+ if ((CpuPlatformPolicyPpi->Revision >= PEI_CPU_PLATFORM_POLICY_PPI_REVISION_3) && (PowerMgmtConfig->BootInLfm == 2)) {
+ ///
+ /// Set processor P state as TURBO_RATIO_LIMIT_1C if available
+ ///
+ AsmCpuid (CPUID_POWER_MANAGEMENT_PARAMS, &Cpuid.RegEax, &Cpuid.RegEbx, &Cpuid.RegEcx, &Cpuid.RegEdx);
+ if (((Cpuid.RegEax & B_CPUID_POWER_MANAGEMENT_EAX_TURBO) == B_CPUID_POWER_MANAGEMENT_EAX_TURBO) ||
+ ((Ia32MiscEnable.Qword & B_MSR_IA32_MISC_DISABLE_TURBO) == B_MSR_IA32_MISC_DISABLE_TURBO)) {
+ ///
+ /// Temporarily enable Turbo and it will be reset in DXE phase
+ ///
+ Ia32MiscEnable.Qword &= ~B_MSR_IA32_MISC_DISABLE_TURBO;
+ AsmWriteMsr64 (MSR_IA32_MISC_ENABLE, Ia32MiscEnable.Qword);
+ ///
+ /// Set processor P state as TURBO_RATIO_LIMIT_1C
+ ///
+ TurboRatioLimit.Qword = AsmReadMsr64 (MSR_TURBO_RATIO_LIMIT);
+ OneCoreRatioLimit = (UINT8) (TurboRatioLimit.Dwords.Low & B_MSR_TURBO_RATIO_LIMIT_1C);
+ TempMsr.Qword |= LShiftU64 (OneCoreRatioLimit, N_IA32_PERF_CTRLP_STATE_TARGET);
+ } else {
+ ///
+ /// Turbo is not available, down to HFM
+ ///
+ DEBUG ((EFI_D_INFO, "CPU: Turbo mode is not available, down to HFM mode.\n"));
+ TempMsr.Qword |= LShiftU64 (MaxBusRatio, N_IA32_PERF_CTRLP_STATE_TARGET);
+ }
+ } else if (PowerMgmtConfig->BootInLfm == CPU_FEATURE_DISABLE) {
+ ///
+ /// Set processor P state as HFM
+ ///
+ TempMsr.Qword |= LShiftU64 (MaxBusRatio, N_IA32_PERF_CTRLP_STATE_TARGET);
+ } else {
+ ///
+ /// Set processor P state as LFM
+ ///
+ TempMsr.Qword |= LShiftU64 (MinBusRatio, N_IA32_PERF_CTRLP_STATE_TARGET);
+ }
+
+ AsmWriteMsr64 (MSR_IA32_PERF_CTRL, TempMsr.Qword);
+ }
+
+ ///
+ /// FIVR Spread Spectrum control is available on C0 steppings onward for all CPU families
+ ///
+ if ((CpuFamilyId == EnumCpuHswUlt && CpuStepping >= EnumHswUltC0) ||
+ (CpuFamilyId == EnumCpuHsw && CpuStepping >= EnumHswC0) ||
+ (CpuFamilyId == EnumCpuCrw && CpuStepping >= EnumCrwC0)){
+
+ ///
+ /// FivrSscPercent is specified in 1/10th percent increments. Range is 0-249.
+ ///
+ if (PowerMgmtConfig->FivrSscPercent > MAX_FIVR_SSC_PERCENT) {
+ PowerMgmtConfig->FivrSscPercent = MAX_FIVR_SSC_PERCENT;
+ }
+
+ ///
+ /// Read current FIVR SSC Spread percentage
+ ///
+ ReadFivrSpreadCmd = 0x8000000E;
+ ReadFivrSpreadData = 0;
+ MailboxRead(MAILBOX_TYPE_PCODE, ReadFivrSpreadCmd, &ReadFivrSpreadData, &MailboxStatus);
+
+//(AMI_CHG)>
+ {
+ UINT32 i = 0;
+ while (MailboxStatus == PCODE_MAILBOX_CC_VR_INTERFACE_LOCKED) {
+ MailboxRead(MAILBOX_TYPE_PCODE, ReadFivrSpreadCmd, &ReadFivrSpreadData, &MailboxStatus);
+ i++;
+ if (i == 100) break;
+ }
+ }
+//<(AMI_CHG)
+
+ if (PowerMgmtConfig->FivrSscEnable) {
+ WriteFivrSpreadData = ( ((PowerMgmtConfig->FivrSscPercent)*1024)/NUM_TENTHS_TO_PERCENTAGE) | FIVR_SSC_LOCK_BIT;
+ }
+ else {
+ ///
+ /// If disabling FIVR SSC, send 0% spread and lock interface
+ ///
+
+ WriteFivrSpreadData = FIVR_SSC_LOCK_BIT;
+ }
+
+ DEBUG ((EFI_D_INFO, "FIVR: Read FIVR Spread = %X, Write FIVR Spread = %X\n", ReadFivrSpreadData, WriteFivrSpreadData));
+ ///
+ /// Only update SSC percentage if needed
+ ///
+ if (ReadFivrSpreadData != WriteFivrSpreadData) {
+ DEBUG ((EFI_D_INFO, "FIVR: Update FIVR Spread = %X\n", WriteFivrSpreadData));
+
+ WriteFivrSpreadCmd = 0x8000000F;
+ MailboxWrite(MAILBOX_TYPE_PCODE, WriteFivrSpreadCmd, WriteFivrSpreadData, &MailboxStatus);
+
+//(AMI_CHG)>
+ {
+ UINT32 i = 0;
+ while (MailboxStatus == PCODE_MAILBOX_CC_VR_INTERFACE_LOCKED) {
+ MailboxWrite(MAILBOX_TYPE_PCODE, WriteFivrSpreadCmd, WriteFivrSpreadData, &MailboxStatus);
+ i++;
+ if (i == 100) break;
+ }
+ }
+//<(AMI_CHG)
+
+ if (MailboxStatus != PCODE_MAILBOX_CC_SUCCESS) {
+ DEBUG ((EFI_D_ERROR, "FIVR: Error updating FIVR Spread. Mailbox Status = %X\n", MailboxStatus));
+ }
+ }
+ }
+ else {
+ DEBUG ((EFI_D_ERROR, "FIVR: FIVR Spread adjustment requires C0 stepping or greater. Bypassing FIVR Spread flow.\n"));
+ }
+
+ return;
+}
+
+/**
+ Loads the Processor Microcode & Install the Cache PPI
+
+ @param[in] FfsHeader - Pointer to an alleged FFS file.
+ @param[in] PeiServices - General purpose services available to every PEIM.
+
+ @retval EFI_STATUS - the status code returned from any sub-routine
+**/
+EFI_STATUS
+PeimInitializeCpu (
+ IN EFI_FFS_FILE_HEADER *FfsHeader,
+ IN EFI_PEI_SERVICES **PeiServices
+ )
+{
+ EFI_STATUS Status;
+ PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi;
+
+ Status = PeiServicesLocatePpi (
+ &gPeiCpuPlatformPolicyPpiGuid,
+ 0,
+ NULL,
+ (VOID **) &CpuPlatformPolicyPpi
+ );
+ if (EFI_ERROR (Status)) {
+ return Status;
+
+ }
+
+ //
+ // Dump Cpu Platform Policy
+ //
+ CpuPeiPolicyDump(CpuPlatformPolicyPpi);
+
+ ///
+ /// Install Cache PPI
+ ///
+ Status = CacheInitPpiInit ();
+ ASSERT_EFI_ERROR (Status);
+
+ ///
+ /// Install Notify
+ ///
+ Status = PeiServicesNotifyPpi (&mNotifyList[0]);
+ ASSERT_EFI_ERROR (Status);
+
+ ///
+ /// Initializes Overclocking support
+ ///
+ CpuOcInit(PeiServices, CpuPlatformPolicyPpi);
+
+ ///
+ /// Initializes Performance and Power Settings
+ ///
+ ProcessorsPerfPowerInit (CpuPlatformPolicyPpi);
+
+ ///
+ /// Init XMM support
+ ///
+ XmmInit ();
+
+ ///
+ /// Pfat Initialization
+ ///
+ PfatInit (PeiServices, CpuPlatformPolicyPpi);
+
+ ///
+ /// Boot Guard Initializatoin
+ ///
+ BootGuardInit (PeiServices, CpuPlatformPolicyPpi);
+
+ return Status;
+}
+
+/**
+ Build BIST HOB
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] NotifyDescriptor - Address of the notification descriptor data structure. Type
+ EFI_PEI_NOTIFY_DESCRIPTOR is defined above.
+ @param[in] Ppi - Address of the PPI that was installed.
+
+ @retval EFI_SUCCESS - Hob built or not necessary
+**/
+EFI_STATUS
+EFIAPI
+BuildBistHob (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor,
+ IN VOID *Ppi
+ )
+{
+ EFI_STATUS Status;
+ EFI_BOOT_MODE BootMode;
+ EFI_SEC_PLATFORM_INFORMATION_PPI *SecPlatformInformationPpi;
+ UINT64 InformationSize;
+ SEC_PLATFORM_INFORMATION_RECORD *SecPlatformInformation;
+ VOID *Hob;
+
+ Status = (**PeiServices).GetBootMode (PeiServices, &BootMode);
+ if (!EFI_ERROR (Status) && (BootMode == BOOT_ON_S3_RESUME)) {
+ return EFI_SUCCESS;
+ }
+
+ Status = PeiServicesLocatePpi (
+ &gEfiSecPlatformInformationPpiGuid, ///< GUID
+ 0, ///< INSTANCE
+ NULL, ///< EFI_PEI_PPI_DESCRIPTOR
+ (VOID ** ) &SecPlatformInformationPpi ///< PPI
+ );
+
+ if (Status == EFI_NOT_FOUND) {
+ return EFI_SUCCESS;
+ }
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ InformationSize = 0;
+ SecPlatformInformation = NULL;
+ Status = SecPlatformInformationPpi->PlatformInformation (
+ PeiServices,
+ &InformationSize,
+ SecPlatformInformation
+ );
+ if (Status == EFI_BUFFER_TOO_SMALL) {
+ Status = PeiServicesAllocatePool (
+ (UINTN) InformationSize,
+ (VOID **) &SecPlatformInformation
+ );
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ Status = SecPlatformInformationPpi->PlatformInformation (
+ PeiServices,
+ &InformationSize,
+ SecPlatformInformation
+ );
+ }
+
+ if (EFI_ERROR (Status)) {
+ return Status;
+ }
+
+ Hob = BuildGuidDataHob (
+ &gEfiHtBistHobGuid,
+ SecPlatformInformation,
+ (UINTN) InformationSize
+ );
+ ASSERT (Hob != NULL);
+
+ return Status;
+}
+
+/**
+ Dump RC CPU and PPM platform policies
+
+ @param[in] CpuPlatformPolicyPpi - Address of the cpu platform policy ppi.
+**/
+VOID
+CpuPeiPolicyDump (
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+#ifdef EFI_DEBUG
+ UINTN Index;
+ CPU_CONFIG_PPI *CpuConfig;
+ POWER_MGMT_CONFIG_PPI *PowerMgmtConfig;
+ SECURITY_CONFIG_PPI *SecurityConfig;
+ OVERCLOCKING_CONFIG_PPI *OverclockingConfig;
+
+ CpuConfig = CpuPlatformPolicyPpi->CpuConfig;
+ PowerMgmtConfig = CpuPlatformPolicyPpi->PowerMgmtConfig;
+ SecurityConfig = CpuPlatformPolicyPpi->SecurityConfig;
+ OverclockingConfig = CpuPlatformPolicyPpi->OverclockingConfig;
+
+ DEBUG ((EFI_D_INFO, "\n------------------------ CpuPlatformPolicyPpi Dump Begin -----------------\n"));
+ //
+ // CPU_CONFIG
+ //
+ DEBUG ((EFI_D_INFO, " CPU:: BistOnReset : 0x%X\n", CpuConfig->BistOnReset));
+ DEBUG ((EFI_D_INFO, " CPU:: HyperThreading : 0x%X\n", CpuConfig->HyperThreading));
+ DEBUG ((EFI_D_INFO, " CPU:: CpuRatioOverride : 0x%X\n", CpuConfig->CpuRatioOverride));
+ DEBUG ((EFI_D_INFO, " CPU:: VmxEnable : 0x%X\n", CpuConfig->VmxEnable));
+ DEBUG ((EFI_D_INFO, " CPU:: Pfat Feature: 0x%X\n", CpuConfig->Pfat));
+ DEBUG ((EFI_D_INFO, " CPU:: MlcStreamerPrefetcher : 0x%X\n", CpuConfig->MlcStreamerPrefetcher));
+ DEBUG ((EFI_D_INFO, " CPU:: MlcSpatialPrefetcher : 0x%X\n", CpuConfig->MlcSpatialPrefetcher));
+ DEBUG ((EFI_D_INFO, " CPU:: ActiveCoreCount : 0x%X\n", CpuConfig->ActiveCoreCount));
+ DEBUG ((EFI_D_INFO, " CPU:: CpuRatio : 0x%X\n", CpuConfig->CpuRatio));
+ DEBUG ((EFI_D_INFO, " CPU:: MaxNonTurboRatio : 0x%X\n", CpuConfig->CpuMaxNonTurboRatio));
+ //
+ // POWER_MGMT_CONFIG
+ //
+ DEBUG ((EFI_D_INFO, " PPM:: BootInLfm : 0x%X\n", PowerMgmtConfig->BootInLfm));
+ DEBUG ((EFI_D_INFO, " PPM:: TccActivationOffset : 0x%X\n", PowerMgmtConfig->TccActivationOffset));
+ DEBUG ((EFI_D_INFO, " PPM:: VrCurrentLimit : 0x%X\n", PowerMgmtConfig->VrCurrentLimit));
+ DEBUG ((EFI_D_INFO, " PPM:: VrCurrentLimitLock : 0x%X\n", PowerMgmtConfig->VrCurrentLimitLock));
+ DEBUG ((EFI_D_INFO, " PPM:: Xe : 0x%X\n", PowerMgmtConfig->Xe));
+ DEBUG ((EFI_D_INFO, " PPM:: RatioLimit[4] : 0x%X , 0x%X , 0x%X , 0x%X \n", PowerMgmtConfig->RatioLimit[0], \
+ PowerMgmtConfig->RatioLimit[1], \
+ PowerMgmtConfig->RatioLimit[2], \
+ PowerMgmtConfig->RatioLimit[3]));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscIoutSlope : 0x%X\n", PowerMgmtConfig->VrMiscIoutSlope));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscIoutOffsetSign : 0x%X\n", PowerMgmtConfig->VrMiscIoutOffsetSign));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscIoutOffset : 0x%X\n", PowerMgmtConfig->VrMiscIoutOffset));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscMinVid : 0x%X\n", PowerMgmtConfig->VrMiscMinVid));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscIdleExitRampRate : 0x%X\n", PowerMgmtConfig->VrMiscIdleExitRampRate));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscIdleEntryRampRate : 0x%X\n", PowerMgmtConfig->VrMiscIdleEntryRampRate));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscIdleEntryDecayEnable : 0x%X\n", PowerMgmtConfig->VrMiscIdleEntryDecayEnable));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMiscSlowSlewRateConfig : 0x%X\n", PowerMgmtConfig->VrMiscSlowSlewRateConfig));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMisc2FastRampVoltage : 0x%X\n", PowerMgmtConfig->VrMisc2FastRampVoltage));
+ DEBUG ((EFI_D_INFO, " PPM:: VrMisc2MinC8Voltage : 0x%X\n", PowerMgmtConfig->VrMisc2MinC8Voltage));
+ DEBUG ((EFI_D_INFO, " PPM:: FivrSscEnable : 0x%X\n", PowerMgmtConfig->FivrSscEnable));
+ DEBUG ((EFI_D_INFO, " PPM:: FivrSscPercent : 0x%X\n", PowerMgmtConfig->FivrSscPercent));
+
+ //
+ // SECURITY_CONFIG : PFAT_CONFIG
+ //
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : Version : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.Version));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : PlatId[16] :\n"));
+ for (Index = 0; Index < 16; Index++) {
+ if (Index == 15) {
+ DEBUG ((EFI_D_INFO, " 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PlatId[Index]));
+ } else {
+ DEBUG ((EFI_D_INFO, " 0x%X ,", SecurityConfig->PfatConfig->Ppdt.PlatId[Index]));
+ }
+ }
+ DEBUG ((EFI_D_INFO, " \n"));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : PkgAttributes : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.PkgAttributes));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : PslMajorVer : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.PslMajorVer));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : PslMinorVer : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.PslMinorVer));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : ScriptSectionSize : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.ScriptSectionSize));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : DataSectionSize : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.DataSectionSize));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : BiosSvn : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.BiosSvn));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : EcSvn : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.EcSvn));
+ DEBUG ((EFI_D_INFO, " PFAT:: PUP_HEADER : VendorSpecific : 0x%X\n", SecurityConfig->PfatConfig->PupHeader.VendorSpecific));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PpdtSize : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PpdtSize));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PpdtMajVer : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PpdtMajVer));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PpdtMinVer : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PpdtMinVer));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PlatId[16] :\n"));
+ for (Index = 0; Index < 16; Index++) {
+ if (Index == 15) {
+ DEBUG ((EFI_D_INFO, " 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PlatId[Index]));
+ } else {
+ DEBUG ((EFI_D_INFO, " 0x%X ,", SecurityConfig->PfatConfig->Ppdt.PlatId[Index]));
+ }
+ }
+ DEBUG ((EFI_D_INFO, " \n"));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PkeySlot0[32] :\n"));
+ for (Index = 0; Index < 32; Index++) {
+ if ((Index == 15) || (Index == 31)) {
+ DEBUG ((EFI_D_INFO, " 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PkeySlot0[Index]));
+ } else {
+ DEBUG ((EFI_D_INFO, " 0x%X ,", SecurityConfig->PfatConfig->Ppdt.PkeySlot0[Index]));
+ }
+ }
+ DEBUG ((EFI_D_INFO, " \n"));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PkeySlot1[32] :\n"));
+ for (Index = 0; Index < 32; Index++) {
+ if ((Index == 15) || (Index == 31)) {
+ DEBUG ((EFI_D_INFO, " 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PkeySlot1[Index]));
+ } else {
+ DEBUG ((EFI_D_INFO, " 0x%X ,", SecurityConfig->PfatConfig->Ppdt.PkeySlot1[Index]));
+ }
+ }
+ DEBUG ((EFI_D_INFO, " \n"));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PkeySlot2[32] :\n"));
+ for (Index = 0; Index < 32; Index++) {
+ if ((Index == 15)|| (Index == 31)) {
+ DEBUG ((EFI_D_INFO, " 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PkeySlot2[Index]));
+ } else {
+ DEBUG ((EFI_D_INFO, " 0x%X ,", SecurityConfig->PfatConfig->Ppdt.PkeySlot2[Index]));
+ }
+ }
+ DEBUG ((EFI_D_INFO, " \n"));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PfatModSvn : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PfatModSvn));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : BiosSvn : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.BiosSvn));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : ExecLim : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.ExecLim));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : PlatAttr : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.PlatAttr));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : EcCmd : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.EcCmd));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : EcData : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.EcData));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : EcCmdGetSvn : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.EcCmdGetSvn));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : EcCmdOpen : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.EcCmdOpen));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : EcCmdClose : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.EcCmdClose));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : EcCmdPortTest : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.EcCmdPortTest));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : LastSfam : 0x%X\n", SecurityConfig->PfatConfig->Ppdt.LastSfam));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : SfamData[64] :\n"));
+ //
+ // Change the array size according to MAX_SFAM_COUNT
+ //
+ for (Index = 0; Index < 64; Index++) {
+ if ((Index == 15) || (Index == 31) || (Index == 47) || (Index == 63) ) {
+ DEBUG ((EFI_D_INFO, " 0x%X\n", SecurityConfig->PfatConfig->Ppdt.SfamData[Index]));
+ } else {
+ DEBUG ((EFI_D_INFO, " 0x%X ,", SecurityConfig->PfatConfig->Ppdt.SfamData[Index]));
+ }
+ }
+ DEBUG ((EFI_D_INFO, " \n"));
+ DEBUG ((EFI_D_INFO, " PFAT:: PpdtHash[4] : 0x%lX , 0x%lX , 0x%lX , 0x%lX \n", SecurityConfig->PfatConfig->PpdtHash[0], \
+ SecurityConfig->PfatConfig->PpdtHash[1], \
+ SecurityConfig->PfatConfig->PpdtHash[2], \
+ SecurityConfig->PfatConfig->PpdtHash[3]));
+
+ DEBUG ((EFI_D_INFO, " PFAT:: NumSpiComponents : 0x%x\n", SecurityConfig->PfatConfig->NumSpiComponents));
+ DEBUG ((EFI_D_INFO, " PFAT:: PPDT : ComponentSize[8] :\n"));
+ for (Index = 0; Index < SecurityConfig->PfatConfig->NumSpiComponents; Index++) {
+ if (Index == 7) {
+ DEBUG ((EFI_D_INFO, " 0x%X\n", SecurityConfig->PfatConfig->ComponentSize[Index]));
+ } else {
+ DEBUG ((EFI_D_INFO, " 0x%X ,", SecurityConfig->PfatConfig->ComponentSize[Index]));
+ }
+ }
+ DEBUG ((EFI_D_INFO, " \n"));
+ DEBUG ((EFI_D_INFO, " PFAT:: PfatMemSize : 0x%X\n", SecurityConfig->PfatConfig->PfatMemSize));
+ DEBUG ((EFI_D_INFO, " PFAT:: EcCmdDiscovery : 0x%X\n", SecurityConfig->PfatConfig->EcCmdDiscovery));
+ DEBUG ((EFI_D_INFO, " PFAT:: EcCmdProvisionEav : 0x%X\n", SecurityConfig->PfatConfig->EcCmdProvisionEav));
+ DEBUG ((EFI_D_INFO, " PFAT:: EcCmdLock : 0x%X\n", SecurityConfig->PfatConfig->EcCmdLock));
+ DEBUG ((EFI_D_INFO, " PFAT:: PFATLOG:: Version : 0x%X\n", SecurityConfig->PfatConfig->PfatLog.Version));
+ DEBUG ((EFI_D_INFO, " PFAT:: PFATLOG:: LastPage : 0x%X\n", SecurityConfig->PfatConfig->PfatLog.LastPage));
+ DEBUG ((EFI_D_INFO, " PFAT:: PFATLOG:: LoggingOptions : 0x%X\n", SecurityConfig->PfatConfig->PfatLog.LoggingOptions));
+ DEBUG ((EFI_D_INFO, " PFAT:: PFATLOG:: PfatModSvn : 0x%X\n", SecurityConfig->PfatConfig->PfatLog.PfatModSvn));
+ DEBUG ((EFI_D_INFO, " PFAT:: PFATLOG:: NumOfEntriesInLog : 0x%X\n", SecurityConfig->PfatConfig->PfatLog.NumOfEntriesInLog));
+ //
+ // SECURITY_CONFIG : TXT_CONFIG
+ //
+#if defined(TXT_SUPPORT_FLAG) && (TXT_SUPPORT_FLAG == 1)
+ DEBUG ((EFI_D_INFO, " TXT:: SinitMemorySize : 0x%lX\n", SecurityConfig->TxtConfig->SinitMemorySize));
+ DEBUG ((EFI_D_INFO, " TXT:: TxtHeapMemorySize : 0x%lX\n", SecurityConfig->TxtConfig->TxtHeapMemorySize));
+ DEBUG ((EFI_D_INFO, " TXT:: TxtDprMemoryBase : 0x%lX\n", SecurityConfig->TxtConfig->TxtDprMemoryBase));
+ DEBUG ((EFI_D_INFO, " TXT:: TxtDprMemorySize : 0x%lX\n", SecurityConfig->TxtConfig->TxtDprMemorySize));
+ DEBUG ((EFI_D_INFO, " TXT:: BiosAcmBase : 0x%lX\n", SecurityConfig->TxtConfig->BiosAcmBase));
+ DEBUG ((EFI_D_INFO, " TXT:: BiosAcmSize : 0x%lX\n", SecurityConfig->TxtConfig->BiosAcmSize));
+ DEBUG ((EFI_D_INFO, " TXT:: McuUpdateDataAddr : 0x%lX\n", SecurityConfig->TxtConfig->McuUpdateDataAddr));
+ DEBUG ((EFI_D_INFO, " TXT:: TgaSize : 0x%lX\n", SecurityConfig->TxtConfig->TgaSize));
+ DEBUG ((EFI_D_INFO, " TXT:: TxtLcpPdBase : 0x%lX\n", SecurityConfig->TxtConfig->TxtLcpPdBase));
+ DEBUG ((EFI_D_INFO, " TXT:: TxtLcpPdSize : 0x%lX\n", SecurityConfig->TxtConfig->TxtLcpPdSize));
+#else
+ DEBUG ((EFI_D_INFO, " TXT CONFIG:: UNSUPPORTED \n"));
+#endif
+
+ //
+ // OVERCLOCKING_CONFIG
+ //
+ DEBUG ((EFI_D_INFO, " OC:: CoreVoltageOffset : 0x%X\n", OverclockingConfig->CoreVoltageOffset));
+ DEBUG ((EFI_D_INFO, " OC:: CoreVoltageOverride : 0x%X\n", OverclockingConfig->CoreVoltageOverride));
+ DEBUG ((EFI_D_INFO, " OC:: CoreExtraTurboVoltage : 0x%X\n", OverclockingConfig->CoreExtraTurboVoltage));
+ DEBUG ((EFI_D_INFO, " OC:: CoreMaxOcTurboRatio : 0x%X\n", OverclockingConfig->CoreMaxOcTurboRatio));
+ DEBUG ((EFI_D_INFO, " OC:: ClrVoltageOffset : 0x%X\n", OverclockingConfig->ClrVoltageOffset));
+ DEBUG ((EFI_D_INFO, " OC:: ClrVoltageOverride : 0x%X\n", OverclockingConfig->ClrVoltageOverride));
+ DEBUG ((EFI_D_INFO, " OC:: ClrExtraTurboVoltage : 0x%X\n", OverclockingConfig->ClrExtraTurboVoltage));
+ DEBUG ((EFI_D_INFO, " OC:: ClrMaxOcTurboRatio : 0x%X\n", OverclockingConfig->ClrMaxOcTurboRatio));
+ DEBUG ((EFI_D_INFO, " OC:: SvidVoltageOverride : 0x%X\n", OverclockingConfig->SvidVoltageOverride));
+ DEBUG ((EFI_D_INFO, " OC:: SvidEnable : 0x%X\n", OverclockingConfig->SvidEnable));
+ DEBUG ((EFI_D_INFO, " OC:: FivrFaultsEnable : 0x%X\n", OverclockingConfig->FivrFaultsEnable));
+ DEBUG ((EFI_D_INFO, " OC:: FivrEfficiencyEnable : 0x%X\n", OverclockingConfig->FivrEfficiencyEnable));
+ DEBUG ((EFI_D_INFO, " OC:: CoreVoltageMode : 0x%X\n", OverclockingConfig->CoreVoltageMode));
+ DEBUG ((EFI_D_INFO, " OC:: ClrVoltageMode : 0x%X\n", OverclockingConfig->ClrVoltageMode));
+ DEBUG ((EFI_D_INFO, " OC:: OcSupport : 0x%X\n", OverclockingConfig->OcSupport));
+
+ DEBUG ((EFI_D_INFO, "\n------------------------ CpuPlatformPolicyPpi Dump End -----------------\n\n"));
+#endif
+}
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.dxs b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.dxs
new file mode 100644
index 0000000..62f855b
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.dxs
@@ -0,0 +1,42 @@
+/** @file
+ Dependency expression source file.
+
+@copyright
+ Copyright (c) 2004 - 2012 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains a 'Sample Driver' and is licensed as such
+ under the terms of your license agreement with Intel or your
+ vendor. This file may be modified by the user, subject to
+ the additional terms of the license agreement
+
+**/
+
+
+//
+// Common for R8 and R9 codebase
+//
+#include "AutoGen.h"
+#include "PeimDepex.h"
+
+//
+// BUILD_WITH_GLUELIB and BUILD_WITH_EDKII_GLUE_LIB are both "defined" in R8 codebase;
+// BUILD_WITH_EDKII_GLUE_LIB is defined in Edk-Dev-Snapshot-20070228 and later version
+// BUILD_WITH_GLUELIB and BUILD_WITH_EDKII_GLUE_LIB are "not defined" in R9 codebase.
+//
+#if defined (BUILD_WITH_GLUELIB) || defined (BUILD_WITH_EDKII_GLUE_LIB)
+#include "EfiDepex.h"
+#include EFI_PPI_DEFINITION (CpuPlatformPolicy)
+#endif
+
+DEPENDENCY_START
+
+ PEI_CPU_PLATFORM_POLICY_PPI_GUID
+
+DEPENDENCY_END
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.h b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.h
new file mode 100644
index 0000000..9d6fac5
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.h
@@ -0,0 +1,212 @@
+/** @file
+ Describes the functions visible to the rest of the CpuPeim.
+
+@copyright
+ Copyright (c) 2010 - 2013 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Pre-EFI Module' and is licensed
+ for Intel CPUs and Chipsets under the terms of your license
+ agreement with Intel or your vendor. This file may be
+ modified by the user, subject to additional terms of the
+ license agreement
+**/
+#ifndef _CPU_INIT_PEIM_H_
+#define _CPU_INIT_PEIM_H_
+
+#include EFI_PPI_PRODUCER (Cache)
+#include EFI_PPI_DEFINITION (CpuPlatformPolicy)
+#include "CpuRegs.h"
+
+typedef struct {
+ UINT32 HtDisabled : 1;
+ UINT32 NumberOfActiveCores : 2;
+ UINT32 Reserved0 : 2;
+ UINT32 Bist : 1;
+ UINT32 FlexRatio : 6;
+ UINT32 Reserved1 : 4;
+ UINT32 Reserved2 : 16;
+} CPU_STRAP_SET;
+
+typedef UINT32 CPU_RESET_TYPE;
+
+typedef struct {
+ UINT64 MsrValue;
+ BOOLEAN Changed;
+} MTRR_VALUE;
+
+typedef struct {
+ PEI_CACHE_PPI Ppi;
+ EFI_PEI_PPI_DESCRIPTOR PpiDesc;
+ MTRR_VALUE FixedMtrrValue[V_FIXED_MTRR_NUMBER];
+ MTRR_VALUE VariableMtrrValue[V_MAXIMUM_VARIABLE_MTRR_NUMBER * 2];
+ BOOLEAN FixedMtrrChanged;
+ BOOLEAN VariableMtrrChanged;
+ BOOLEAN NemDisabledDone;
+} CACHE_PPI_INSTANCE;
+
+#define PEI_CACHE_PPI_INSTANCE_FROM_THIS(a) _CR (a, CACHE_PPI_INSTANCE, Ppi)
+
+///
+/// Breaking UINT64 MSR into DWORDs/BYTEs
+///
+#pragma pack(1)
+typedef union _MSR_REGISTER {
+ UINT64 Qword;
+
+ struct _DWORDS {
+ UINT32 Low;
+ UINT32 High;
+ } Dwords;
+
+ struct _BYTES {
+ UINT8 FirstByte;
+ UINT8 SecondByte;
+ UINT8 ThirdByte;
+ UINT8 FouthByte;
+ UINT8 FifthByte;
+ UINT8 SixthByte;
+ UINT8 SeventhByte;
+ UINT8 EighthByte;
+ } Bytes;
+
+} MSR_REGISTER;
+#pragma pack()
+#define NO_RESET 0
+#define CPU_ONLY_RESET 1
+#define WARM_RESET 2
+#define COLDRESET 3
+
+#define RESET_PPI_WARM_RESET 0
+#define RESET_PPI_COLD_RESET 3
+
+#define RESET_PORT 0x0CF9
+#define CLEAR_RESET_BITS 0x0F1
+#define PSIX_THRESHOLD_MASK 0x3FFFFFFF ///< Bits 61:32 - Mask value respect to Dword.High
+#define PSI1_THRESHOLD_VALUE 0x14
+#define PSI2_THRESHOLD_VALUE 0x05
+#define PSI3_THRESHOLD_VALUE 0x01
+
+#define MAX_OVERCLOCKING_BINS 0x7
+
+/**
+ Set up flags in CR4 for XMM instruction enabling
+**/
+VOID
+XmmInit (
+ VOID
+ );
+
+/**
+ Loads the Processor Microcode & Install the Cache PPI
+
+ @param[in] FfsHeader - Pointer to an alleged FFS file.
+ @param[in] PeiServices - General purpose services available to every PEIM.
+
+ @retval EFI_STATUS - the status code returned from any sub-routine
+**/
+EFI_STATUS
+PeimInitializeCpu (
+ IN EFI_FFS_FILE_HEADER *FfsHeader,
+ IN EFI_PEI_SERVICES **PeiServices
+ );
+
+/**
+ Install CacheInitPpi
+
+ @retval EFI_OUT_OF_RESOURCES - failed to allocate required pool
+**/
+EFI_STATUS
+CacheInitPpiInit (
+ VOID
+ );
+
+/**
+ Set CPU strap setting for feature change
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] NotifyDescriptor - Address of the notification descriptor data structure. Type
+ EFI_PEI_NOTIFY_DESCRIPTOR is defined above.
+ @param[in] Ppi - Address of the PPI that was installed.
+
+ @retval EFI_SUCCESS - Function completed successfully
+**/
+EFI_STATUS
+EFIAPI
+SetCpuStrap (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor,
+ IN VOID *Ppi
+ );
+
+/**
+ Based on ResetType, perform warm or cold reset using PCH Reset PPI
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] ResetType - CPU_RESET_TYPE to indicate which reset shoudl be performed.
+
+ @exception EFI_UNSUPPORTED - Reset type unsupported
+ @retval EFI_SUCCESS - function successfully (system should already reset)
+**/
+EFI_STATUS
+PerformWarmORColdReset (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN CPU_RESET_TYPE ResetType
+ );
+
+/**
+ Based on ResetType, perform warm or cold reset using PCH Reset PPI
+
+ @param[in] PeiServices
+ @param[in] CPU_RESET_TYPE
+
+ @retval EFI_STATUS
+
+ Build BIST HOB
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] NotifyDescriptor - Address of the notification descriptor data structure. Type
+ EFI_PEI_NOTIFY_DESCRIPTOR is defined above.
+ @param[in] Ppi - Address of the PPI that was installed.
+
+ @retval EFI_SUCCESS - Hob built or not necessary
+**/
+EFI_STATUS
+EFIAPI
+BuildBistHob (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN EFI_PEI_NOTIFY_DESCRIPTOR *NotifyDescriptor,
+ IN VOID *Ppi
+ );
+
+/**
+ Dump RC CPU and PPM platform policies
+
+ @param[in] CpuPlatformPolicyPpi - Address of the cpu platform policy ppi.
+**/
+VOID
+CpuPeiPolicyDump(
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ );
+
+/**
+
+ Perform the platform spefific initializations.
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+
+**/
+VOID
+BootGuardInit (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ );
+
+#endif
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.inf b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.inf
new file mode 100644
index 0000000..6110b72
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuInitPeim.inf
@@ -0,0 +1,124 @@
+#
+# This file contains an 'Intel Pre-EFI Module' and is licensed
+# for Intel CPUs and Chipsets under the terms of your license
+# agreement with Intel or your vendor. This file may be
+# modified by the user, subject to additional terms of the
+# license agreement
+#
+#/*++
+#
+# Copyright (c) 2007 - 2013 Intel Corporation. All rights reserved
+# This software and associated documentation (if any) is furnished
+# under a license and may only be used or copied in accordance
+# with the terms of the license. Except as permitted by such
+# license, no part of this software or documentation may be
+# reproduced, stored in a retrieval system, or transmitted in any
+# form or by any means without the express written consent of
+# Intel Corporation.
+
+#
+# Module Name:
+#
+# CpuInitPeim.inf
+#
+# Abstract:
+#
+# Component description file for CPU module
+#
+#
+#--*/
+
+[defines]
+BASE_NAME = CpuInitPeim
+FILE_GUID = 01359D99-9446-456d-ADA4-50A711C03ADA
+COMPONENT_TYPE = PE32_PEIM
+
+[sources.common]
+ CpuInitPeim.c
+ CachePeim.c
+ PfatInit.c
+ CpuOcInit.c
+ BootGuardInit.c
+
+#
+# Edk II Glue Driver Entry Point
+#
+ EdkIIGluePeimEntryPoint.c
+
+[sources.ia32]
+ Ia32/Cpu.asm
+
+[includes.common]
+ $(EDK_SOURCE)/Foundation/Framework
+ $(EDK_SOURCE)/Foundation
+ $(EDK_SOURCE)/Foundation/Efi
+ $(EDK_SOURCE)/Foundation/Include
+ $(EDK_SOURCE)/Foundation/Efi/Include
+ $(EDK_SOURCE)/Foundation/Framework/Include
+ $(EDK_SOURCE)/Foundation/Include/IndustryStandard
+ $(EDK_SOURCE)/Foundation/Core/Dxe
+ $(EDK_SOURCE)/Foundation/Library/Dxe/Include
+ $(EDK_SOURCE)/Foundation/Include/Pei
+ $(EDK_SOURCE)/Foundation/Library/Pei/Include
+ $(EDK_SOURCE)/Foundation/Cpu/Pentium/Include
+ $(EFI_SOURCE)/$(PROJECT_CPU_ROOT)/Include
+#
+# Edk II Glue Library, some hearder are included by R9 header so have to include
+#
+ $(EFI_SOURCE)
+ $(EFI_SOURCE)/Framework
+ $(EDK_SOURCE)/Foundation
+ $(EDK_SOURCE)/Foundation/Framework
+ $(EDK_SOURCE)/Foundation/Include/IndustryStandard
+ $(EDK_SOURCE)/Foundation/Core/Dxe
+ $(EDK_SOURCE)/Foundation/Include/Pei
+ $(EDK_SOURCE)/Foundation/Library/Dxe/Include
+ $(EDK_SOURCE)/Foundation/Library/EdkIIGlueLib/Include
+ $(EFI_SOURCE)/$(PROJECT_CPU_ROOT)
+ $(EFI_SOURCE)/$(PROJECT_CPU_ROOT)/Library/OverclockingLib
+ $(EFI_SOURCE)/$(PROJECT_CPU_ROOT)/Include
+ $(EFI_SOURCE)/$(PROJECT_CPU_ROOT)/Include/Library
+ $(EFI_SOURCE)/$(PROJECT_CPU_ROOT)/SampleCode
+ $(EFI_SOURCE)/$(PROJECT_CPU_ROOT)/SampleCode/Include
+ $(EFI_SOURCE)/$(PROJECT_PCH_ROOT)
+ $(EFI_SOURCE)/$(PROJECT_PCH_ROOT)/Include
+ $(EFI_SOURCE)/$(PROJECT_PCH_ROOT)/Include/Library
+ $(EFI_SOURCE)/$(PROJECT_SA_ROOT)
+ $(EFI_SOURCE)/$(PROJECT_SA_ROOT)/Include
+ $(EFI_SOURCE)/$(PROJECT_ME_ROOT)/Library/MeKernel/Include
+ $(EFI_SOURCE)/$(PROJECT_ME_ROOT)/Heci/Include
+
+[libraries.common]
+ EdkFrameworkPpiLib
+ EdkIIGlueBaseLib
+ EdkIIGlueBaseMemoryLib
+ EdkIIGluePeiDebugLibReportStatusCode
+ EdkIIGluePeiReportStatusCodeLib
+ EdkIIGluePeiServicesLib
+ EdkIIGluePeiMemoryAllocationLib
+ EdkIIGluePeiHobLib
+ EdkPpiLib
+ CpuPpiLib
+ CpuGuidLib
+ $(PROJECT_PCH_FAMILY)PpiLib
+ PeiKscLib
+ CpuPlatformLib
+ OverclockingLib
+ BootGuardLib
+
+[libraries.ia32]
+ CpuIA32Lib
+
+[nmake.common]
+ IMAGE_ENTRY_POINT = _ModuleEntryPoint
+ DPX_SOURCE = CpuInitPeim.dxs
+
+#
+# Module Entry Point
+#
+ C_FLAGS = $(C_FLAGS) -D __EDKII_GLUE_MODULE_ENTRY_POINT__=PeimInitializeCpu
+ C_FLAGS = $(C_FLAGS) -D __EDKII_GLUE_BASE_LIB__ \
+ -D __EDKII_GLUE_BASE_MEMORY_LIB__ \
+ -D __EDKII_GLUE_PEI_DEBUG_LIB_REPORT_STATUS_CODE__ \
+ -D __EDKII_GLUE_PEI_REPORT_STATUS_CODE_LIB__ \
+ -D __EDKII_GLUE_PEI_SERVICES_LIB__
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.c b/ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.c
new file mode 100644
index 0000000..8aa7cd7
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.c
@@ -0,0 +1,292 @@
+/** @file
+ OC CPU Early Post initializations.
+
+@copyright
+ Copyright (c) 2011 - 2012 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Peripheral Driver' and uniquely
+ identified as "Intel Reference Module" and is
+ licensed for Intel CPUs and chipsets under the terms of your
+ license agreement with Intel or your vendor. This file may
+ be modified by the user, subject to additional terms of the
+ license agreement
+
+**/
+
+///
+/// External include files do NOT need to be explicitly specified in real EDKII
+/// environment
+///
+#if !defined(EDK_RELEASE_VERSION) || (EDK_RELEASE_VERSION < 0x00020000)
+#include "EdkIIGluePeim.h"
+#include "CpuInitPeim.h"
+#include "CpuAccess.h"
+#include "OverclockingLibrary.h"
+#include "CpuOcInit.h"
+#endif
+
+/**
+ Initializes Overclocking settings in the processor.
+
+ @param[in] PeiServices - General purpose services available to every PEIM.
+ @param[in] OverclockingtConfig Pointer to Policy protocol instance
+
+ @retval EFI_SUCCESS
+**/
+EFI_STATUS
+CpuOcInit (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+ EFI_STATUS Status;
+ OC_CAPABILITIES_ITEM OcCaps;
+ VOLTAGE_FREQUENCY_ITEM CurrentVfItem;
+ VOLTAGE_FREQUENCY_ITEM RequestedVfItem;
+ GLOBAL_CONFIG_ITEM CurrentFivrItem;
+ GLOBAL_CONFIG_ITEM RequestedFivrItem;
+ SVID_CONFIG_ITEM CurrentSvidItem;
+ SVID_CONFIG_ITEM RequestedSvidItem;
+ UINT32 LibStatus;
+ UINT8 DomainId;
+ UINT8 ResetRequired;
+ WDT_PPI *gWdtPei;
+
+ LibStatus = 0; //DEBUG
+ ResetRequired = FALSE;
+ if (CpuPlatformPolicyPpi->OverclockingConfig->OcSupport == 0) {
+ ///
+ /// Overclocking is disabled
+ ///
+ DEBUG ((EFI_D_ERROR, "(OC) Overclocking is disabled. Bypassing CPU core overclocking flow.\n"));
+ return EFI_SUCCESS;
+ }
+
+ Status = EFI_SUCCESS;
+ ZeroMem(&CurrentFivrItem,sizeof(CurrentFivrItem));
+ ZeroMem(&RequestedFivrItem,sizeof(RequestedFivrItem));
+ ZeroMem(&CurrentSvidItem,sizeof(CurrentSvidItem));
+ ZeroMem(&RequestedSvidItem,sizeof(RequestedSvidItem));
+
+ //
+ // Locate WDT_PPI (ICC WDT PPI)
+ //
+ Status = PeiServicesLocatePpi (
+ &gWdtPpiGuid,
+ 0,
+ NULL,
+ (VOID **) &gWdtPei
+ );
+ ASSERT_EFI_ERROR (Status);
+
+ ///
+ /// We will loop on the CPU domains to manage the voltage/frequency settings
+ ///
+ for (DomainId = OC_LIB_DOMAIN_ID_IA_CORE; DomainId < OC_LIB_DOMAIN_ID_UNCORE; DomainId++) {
+ ///
+ /// Only IA_CORE and CLR are valid for CPU Core
+ ///
+ if ((DomainId == OC_LIB_DOMAIN_ID_IA_CORE) || (DomainId == OC_LIB_DOMAIN_ID_CLR)) {
+
+ ///
+ /// Get OC Capabilities of the domain
+ ///
+ ZeroMem(&OcCaps,sizeof(OcCaps));
+ OcCaps.DomainId = DomainId;
+ Status = GetOcCapabilities(&OcCaps,&LibStatus);
+
+ if (LibStatus == OC_LIB_COMPLETION_CODE_SUCCESS) {
+ ///
+ /// If any OC is supported on this domain, then proceed
+ ///
+ if (OcCaps.RatioOcSupported || OcCaps.VoltageOverridesSupported || OcCaps.VoltageOffsetSupported) {
+ ///
+ /// Need to populate the user requested settings from the platform policy
+ /// to determine if OC changes are desired.
+ ///
+ ZeroMem(&CurrentVfItem,sizeof(CurrentVfItem));
+ CurrentVfItem.DomainId = DomainId;
+
+ ///
+ /// Get a copy of the current domain VfSettings from the Mailbox Library
+ ///
+ Status = GetVoltageFrequencyItem(&CurrentVfItem,&LibStatus);
+ if ((Status != EFI_SUCCESS) || (LibStatus != OC_LIB_COMPLETION_CODE_SUCCESS)) {
+ continue;
+ }
+
+ ///
+ /// Populate the user requested VfSettings struct
+ ///
+ ZeroMem(&RequestedVfItem,sizeof(RequestedVfItem));
+ RequestedVfItem.DomainId = DomainId;
+ if (DomainId == OC_LIB_DOMAIN_ID_IA_CORE) {
+ RequestedVfItem.VfSettings.MaxOcRatio = (UINT8) CpuPlatformPolicyPpi->OverclockingConfig->CoreMaxOcTurboRatio;
+ } else if (DomainId == OC_LIB_DOMAIN_ID_CLR) {
+ RequestedVfItem.VfSettings.MaxOcRatio = (UINT8) CpuPlatformPolicyPpi->OverclockingConfig->ClrMaxOcTurboRatio;
+ }
+
+ ///
+ /// VoltageTarget has 2 uses and we need to update the target based
+ /// on the voltagemode requested
+ ///
+ if (DomainId == OC_LIB_DOMAIN_ID_IA_CORE) {
+ RequestedVfItem.VfSettings.VoltageTargetMode = CpuPlatformPolicyPpi->OverclockingConfig->CoreVoltageMode;
+ if (RequestedVfItem.VfSettings.VoltageTargetMode == OC_LIB_OFFSET_ADAPTIVE) {
+ RequestedVfItem.VfSettings.VoltageTarget = CpuPlatformPolicyPpi->OverclockingConfig->CoreExtraTurboVoltage;
+ } else {
+ RequestedVfItem.VfSettings.VoltageTarget = CpuPlatformPolicyPpi->OverclockingConfig->CoreVoltageOverride;
+ }
+ RequestedVfItem.VfSettings.VoltageOffset = CpuPlatformPolicyPpi->OverclockingConfig->CoreVoltageOffset;
+ } else if (DomainId == OC_LIB_DOMAIN_ID_CLR) {
+ RequestedVfItem.VfSettings.VoltageTargetMode = CpuPlatformPolicyPpi->OverclockingConfig->ClrVoltageMode;
+ if (RequestedVfItem.VfSettings.VoltageTargetMode == OC_LIB_OFFSET_ADAPTIVE) {
+ RequestedVfItem.VfSettings.VoltageTarget = CpuPlatformPolicyPpi->OverclockingConfig->ClrExtraTurboVoltage;
+ } else {
+ RequestedVfItem.VfSettings.VoltageTarget = CpuPlatformPolicyPpi->OverclockingConfig->ClrVoltageOverride;
+ }
+ RequestedVfItem.VfSettings.VoltageOffset = CpuPlatformPolicyPpi->OverclockingConfig->ClrVoltageOffset;
+ }
+
+ ///
+ /// Compare current settings with user requested settings to see if changes are needed
+ ///
+ if (CompareMem((VOID *)&RequestedVfItem,(VOID *)&CurrentVfItem,sizeof(VOLTAGE_FREQUENCY_ITEM))) {
+ ///
+ /// Arm watchdog timer for OC changes
+ ///
+ Status = gWdtPei->ReloadAndStart (WDT_TIMEOUT_BETWEEN_PEI_DXE);
+
+ ///
+ /// Need to update the requested voltage/frequency values
+ ///
+ DEBUG ((EFI_D_INFO, "(OC) Set Voltage Frequency for Domain = %X\n", DomainId));
+ DEBUG ((EFI_D_INFO, "(OC) RequestedVfItem.VfSettings.MaxOcRatio = %X\n", RequestedVfItem.VfSettings.MaxOcRatio));
+ DEBUG ((EFI_D_INFO, "(OC) RequestedVfItem.VfSettings.TargetMode = %X\n", RequestedVfItem.VfSettings.VoltageTargetMode));
+ DEBUG ((EFI_D_INFO, "(OC) RequestedVfItem.VfSettings.VoltageTarget = %X\n", RequestedVfItem.VfSettings.VoltageTarget));
+ DEBUG ((EFI_D_INFO, "(OC) RequestedVfItem.VfSettings.VoltageOffset = %X\n", RequestedVfItem.VfSettings.VoltageOffset));
+ DEBUG ((EFI_D_INFO, "(OC) CurrentVfItem.VfSettings.MaxOcRatio = %X\n", CurrentVfItem.VfSettings.MaxOcRatio));
+ DEBUG ((EFI_D_INFO, "(OC) CurrentVfItem.VfSettings.TargetMode = %X\n", CurrentVfItem.VfSettings.VoltageTargetMode));
+ DEBUG ((EFI_D_INFO, "(OC) CurrentVfItem.VfSettings.VoltageTarget = %X\n", CurrentVfItem.VfSettings.VoltageTarget));
+ DEBUG ((EFI_D_INFO, "(OC) CurrentVfItem.VfSettings.VoltageOffset = %X\n", CurrentVfItem.VfSettings.VoltageOffset));
+ Status = SetVoltageFrequencyItem(RequestedVfItem,&LibStatus);
+ if ((Status != EFI_SUCCESS) || (LibStatus != OC_LIB_COMPLETION_CODE_SUCCESS)) {
+ DEBUG ((EFI_D_ERROR, "(OC) Set Voltage Frequency failed. EFI Status = %X, Library Status = %X\n", Status, LibStatus));
+ }
+ }
+ }
+ } else {
+ DEBUG ((EFI_D_ERROR, "(OC) GetOcCapabilities message failed. Library Status = %X, Domain = %X\n", LibStatus, DomainId));
+ }
+ }
+ }
+
+ ///
+ /// Detect changes to global FIVR settings
+ ///
+ Status = GetFivrConfig(&CurrentFivrItem,&LibStatus);
+
+ if (LibStatus == OC_LIB_COMPLETION_CODE_SUCCESS) {
+ ///
+ /// Populate the requested FIVR settings from platform policy. The platform policy defines
+ /// these bits as 0-Disabled, 1-Enabled. The Mailbox uses the reverse encoding. Need to convert
+ /// the platform policy data to match the mailbox input.
+ ///
+ RequestedFivrItem.DisableFivrFaults = (~CpuPlatformPolicyPpi->OverclockingConfig->FivrFaultsEnable) & BIT0_MASK;
+ RequestedFivrItem.DisableFivrEfficiency = (~CpuPlatformPolicyPpi->OverclockingConfig->FivrEfficiencyEnable) & BIT0_MASK;
+
+ ///
+ /// Compare current FIVR settings with requested FIVR settings to see if changes are needed
+ ///
+ if (CompareMem((VOID *)&RequestedFivrItem,(VOID *)&CurrentFivrItem,sizeof(GLOBAL_CONFIG_ITEM))) {
+ ///
+ /// Arm watchdog timer for OC changes
+ ///
+ Status = gWdtPei->ReloadAndStart (8);
+
+ ///
+ /// Need to update the requested FIVR values
+ ///
+ DEBUG ((EFI_D_INFO, "(OC) Set FIVR Config for Domain = %X\n", DomainId));
+ Status = SetFivrConfig(RequestedFivrItem, &LibStatus);
+ if ((Status != EFI_SUCCESS) || (LibStatus != OC_LIB_COMPLETION_CODE_SUCCESS)) {
+ DEBUG ((EFI_D_ERROR, "(OC) Set FIVR Config failed. EFI Status = %X, Library Status = %X\n", Status, LibStatus));
+ }
+ else {
+ ///
+ /// If Re-enabling Fivr Faults, system needs to perform a cold reset for hardware to take effect
+ ///
+ if ((CurrentFivrItem.DisableFivrFaults == 1) && (RequestedFivrItem.DisableFivrFaults == 0)) {
+ DEBUG ((EFI_D_ERROR, "(OC) FIVR Faults enable detected. Cold Reset required.\n"));
+ ResetRequired = TRUE;
+ }
+ }
+ }
+ }
+ else {
+ DEBUG ((EFI_D_ERROR, "(OC) Get FIVR Config message failed. Library Status = %X\n", LibStatus));
+ }
+
+ ///
+ /// Detect changes to SVID settings
+ ///
+ Status = GetSvidConfig(&CurrentSvidItem,&LibStatus);
+
+ if (LibStatus == OC_LIB_COMPLETION_CODE_SUCCESS) {
+ ///
+ /// Populate the requested SVID settings from platform policy. SvidDisable uses a
+ /// reverse encoding from the platform policy defintion and will need to be converted.
+ ///
+ RequestedSvidItem.VoltageTarget = CpuPlatformPolicyPpi->OverclockingConfig->SvidVoltageOverride;
+ RequestedSvidItem.SvidDisable = ~(CpuPlatformPolicyPpi->OverclockingConfig->SvidEnable) & BIT0_MASK;
+
+ ///
+ /// Compare current SVID settings with requested SVID settings to see if changes are needed
+ ///
+ if (CompareMem((VOID *)&RequestedSvidItem,(VOID *)&CurrentSvidItem,sizeof(SVID_CONFIG_ITEM))) {
+ ///
+ /// Arm watchdog timer for OC changes
+ ///
+ Status = gWdtPei->ReloadAndStart (8);
+
+ ///
+ /// If Re-enabling SVID, system needs to perform a cold reset for hardware to take effect. No write to mailbox needed.
+ ///
+ if ((CurrentSvidItem.SvidDisable == 1) && (RequestedSvidItem.SvidDisable == 0)) {
+ DEBUG ((EFI_D_ERROR, "(OC) SVID Enable detected. Cold Reset required.\n"));
+ ResetRequired = TRUE;
+ }
+ else {
+ ///
+ /// Need to update the requested SVID values
+ ///
+ DEBUG ((EFI_D_INFO, "(OC) Set SVID Config for Domain = %X\n", DomainId));
+ Status = SetSvidConfig(RequestedSvidItem, &LibStatus);
+ if ((Status != EFI_SUCCESS) || (LibStatus != OC_LIB_COMPLETION_CODE_SUCCESS)) {
+ DEBUG ((EFI_D_ERROR, "(OC) Set SVID Config failed. EFI Status = %X, Library Status = %X\n", Status, LibStatus));
+ }
+ }
+ }
+ } else {
+ DEBUG ((EFI_D_ERROR, "(OC) GetFivrConfig message failed. Library Status = %X\n", LibStatus));
+ }
+
+ ///
+ /// Command was successful and SVID config has changed. CPU must perform a reset
+ /// for SVID settings to take effect.
+ ///
+ if (ResetRequired) {
+ DEBUG ((EFI_D_ERROR, "(OC) Perform Cold Reset\n"));
+ PerformWarmORColdReset (PeiServices, COLDRESET);
+ }
+
+ return Status;
+}
+
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.h b/ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.h
new file mode 100644
index 0000000..652c67e
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/CpuOcInit.h
@@ -0,0 +1,55 @@
+/** @file
+ Describes the functions visible to the rest of the OcInit.
+
+@copyright
+ Copyright (c) 2011 - 2012 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Peripheral Driver' and uniquely
+ identified as "Intel Reference Module" and is
+ licensed for Intel CPUs and chipsets under the terms of your
+ license agreement with Intel or your vendor. This file may
+ be modified by the user, subject to additional terms of the
+ license agreement
+**/
+#ifndef _OC_INIT_H_
+#define _OC_INIT_H_
+
+#include "OverclockingLibrary.h"
+#include EFI_PPI_DEFINITION (CpuPlatformPolicy)
+#include EFI_PPI_CONSUMER (Wdt)
+
+#ifdef USE_WDT_IN_DEBUG_BIOS
+//
+// MRC takes a lot of time to execute in debug mode
+//
+#define WDT_TIMEOUT_BETWEEN_PEI_DXE 120
+#else
+#define WDT_TIMEOUT_BETWEEN_PEI_DXE 60
+#endif
+
+///
+/// Function Prototypes
+///
+/**
+ Initializes Overclocking settings in the processor.
+
+ @param[in] PeiServices - General purpose services available to every PEIM.
+ @param[in] OverclockingtConfig Pointer to Policy protocol instance
+
+ @retval EFI_SUCCESS
+**/
+EFI_STATUS
+CpuOcInit (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ );
+
+#endif
+
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/Ia32/Cpu.asm b/ReferenceCode/Haswell/CpuInit/Pei/Ia32/Cpu.asm
new file mode 100644
index 0000000..e7c812a
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/Ia32/Cpu.asm
@@ -0,0 +1,77 @@
+;
+; This file contains an 'Intel Pre-EFI Module' and is licensed
+; for Intel CPUs and Chipsets under the terms of your license
+; agreement with Intel or your vendor. This file may be
+; modified by the user, subject to additional terms of the
+; license agreement
+;
+;------------------------------------------------------------------------------
+;
+; Copyright (c) 2006 - 2012 Intel Corporation. All rights reserved
+; This software and associated documentation (if any) is furnished
+; under a license and may only be used or copied in accordance
+; with the terms of the license. Except as permitted by such
+; license, no part of this software or documentation may be
+; reproduced, stored in a retrieval system, or transmitted in any
+; form or by any means without the express written consent of
+; Intel Corporation.
+;
+;
+; Module Name:
+;
+; Cpu.asm
+;
+; Abstract:
+;
+; Assembly code of Cpu
+;
+;------------------------------------------------------------------------------
+
+ .686p
+ .model flat
+ .xmm
+
+IA32_CR4_OSFXSR equ 200h
+IA32_CR4_OSXMMEXCPT equ 400h
+IA32_CR0_MP equ 2h
+
+IA32_CPUID_SSE2 equ 02000000h
+IA32_CPUID_SSE2_B equ 26
+
+ .code
+
+;------------------------------------------------------------------------------
+; Set up flags in CR4 for XMM instruction enabling
+;------------------------------------------------------------------------------
+XmmInit PROC C PUBLIC
+ push ebx
+
+ ; Check whether SSE2 is supported
+ mov eax, 1
+ cpuid
+ bt edx, IA32_CPUID_SSE2_B
+ jnc @F
+
+ ; Enable XMM
+ mov eax, cr0
+ or eax, IA32_CR0_MP
+ mov cr0, eax
+ mov eax, cr4
+ or eax, IA32_CR4_OSFXSR OR IA32_CR4_OSXMMEXCPT
+ mov cr4, eax
+
+@@:
+ pop ebx
+ ret
+XmmInit ENDP
+
+
+;------------------------------------------------------------------------------
+; Invalidate cache
+;------------------------------------------------------------------------------
+CacheInvd PROC C PUBLIC
+ invd
+ ret
+CacheInvd ENDP
+
+ END
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/PfatInit.c b/ReferenceCode/Haswell/CpuInit/Pei/PfatInit.c
new file mode 100644
index 0000000..8eff986
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/PfatInit.c
@@ -0,0 +1,191 @@
+/** @file
+ PFAT EarlyPost initializations.
+
+@copyright
+ Copyright (c) 2011 - 2012 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Peripheral Driver' and uniquely
+ identified as "Intel Reference Module" and is
+ licensed for Intel CPUs and chipsets under the terms of your
+ license agreement with Intel or your vendor. This file may
+ be modified by the user, subject to additional terms of the
+ license agreement
+**/
+
+///
+/// External include files do NOT need to be explicitly specified in real EDKII
+/// environment
+///
+#if !defined(EDK_RELEASE_VERSION) || (EDK_RELEASE_VERSION < 0x00020000)
+#include "EdkIIGluePeim.h"
+#include "CpuInitPeim.h"
+#include "CpuAccess.h"
+#include "PfatInit.h"
+#ifdef PFAT_EC_FLAG
+#include EFI_PPI_DEPENDENCY (CpuIo)
+#include EFI_PPI_PRODUCER (Stall)
+#include "PeiKscLib.h"
+#endif //PFAT_EC_FLAG
+#endif
+
+#ifdef PFAT_EC_FLAG
+/**
+ Gets CPU's random number generator.
+
+ @param[out] UINT32 - Random value
+**/
+UINT32
+RandomNumber (
+ void
+ )
+{
+ UINT32 Random = 0;
+
+ ///
+ /// Assembly instruction to read CPU's random number generator
+ /// Instruction is only available 100k cycles after reset
+ ///
+ __asm {
+tryAgain:
+ ; rdrand eax
+ ; db 0Fh, 0C7h, 0F0h
+
+ _emit 0x0F
+ _emit 0xC7
+ _emit 0xF0
+
+ mov Random, eax
+ jnc tryAgain; CF will be set is valid number was generated
+ }
+
+ return (Random);
+}
+#endif //PFAT_EC_FLAG
+
+/**
+ Perform the platform spefific initializations.
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+**/
+VOID
+PfatInit (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ )
+{
+ EFI_STATUS Status;
+ UINT64 MsrValue;
+ BOOLEAN ResetRequired;
+ PFAT_HOB *PfatHobPtr;
+ EFI_GUID PfatHobGuid = PFAT_HOB_GUID;
+ UINT8 i;
+ PFAT_CONFIG *PfatConfig;
+#ifdef PFAT_EC_FLAG
+ volatile UINT32 EphemeralAuthValue;
+ UINT8 EcStatus;
+ PEI_STALL_PPI *StallPpi;
+ PEI_CPU_IO_PPI *CpuIo;
+#endif //PFAT_EC_FLAG
+
+ DEBUG ((EFI_D_INFO, "PfatInit\n"));
+
+ ResetRequired = FALSE;
+ MsrValue = AsmReadMsr64 (MSR_PLATFORM_INFO);
+ if (!(MsrValue & B_MSR_PLATFORM_INFO_PFAT_AVAIL)) {
+ DEBUG ((EFI_D_INFO, "PFAT Feature is not supported\n"));
+ return;
+ }
+
+ if (CpuPlatformPolicyPpi->CpuConfig->Pfat) {
+ DEBUG ((EFI_D_INFO, "PFAT Module is Enable\n"));
+ PfatConfig = CpuPlatformPolicyPpi->SecurityConfig->PfatConfig;
+ ///
+ /// Read PFAT Control Register
+ ///
+ MsrValue = AsmReadMsr64 (MSR_PLAT_FRMW_PROT_CTRL);
+ if (MsrValue & B_MSR_PLAT_FRMW_PROT_CTRL_LK) {
+ if (!(MsrValue & B_MSR_PLAT_FRMW_PROT_CTRL_EN)) {
+ ///
+ /// Reset required as the PFAT CTRL MSR is locked and needs to be toggled
+ ///
+ ResetRequired = TRUE;
+ }
+ } else {
+#ifdef PFAT_EC_FLAG
+ if ((PfatConfig->Ppdt.PlatAttr & EC_PRESENT) && (PfatConfig->Ppdt.PlatAttr & EC_PFAT_PROTECTED)) {
+ DEBUG ((EFI_D_INFO, "EC is Present and EC FW supports PFAT\n"));
+ CpuIo = (**PeiServices).CpuIo;
+ Status = (*PeiServices)->LocatePpi (PeiServices, &gPeiStallPpiGuid, 0, NULL, &StallPpi);
+ ASSERT_PEI_ERROR (PeiServices, Status);
+ Status = SendKscCommand (PeiServices, CpuIo, StallPpi, PfatConfig->EcCmdProvisionEav);
+ if (Status == EFI_SUCCESS) {
+ EphemeralAuthValue = RandomNumber ();
+ for (i = 0; (i < (sizeof (EphemeralAuthValue))); i++) {
+ Status = SendKscData (PeiServices, CpuIo, StallPpi, (UINT8) ((EphemeralAuthValue >> (i * 8)) & 0xFF));
+ }
+ Status = ReceiveKscData (PeiServices, CpuIo, StallPpi, &EcStatus);
+ if (EcStatus != 0) {
+ ResetRequired = TRUE;
+ }
+ AsmWriteMsr32 (MSR_PLAT_FRMW_PROT_PASSWD, EphemeralAuthValue);
+ EphemeralAuthValue = 0;
+ Status = SendKscCommand (PeiServices, CpuIo, StallPpi, PfatConfig->EcCmdLock);
+ }
+ }
+#endif //PFAT_EC_FLAG
+ AsmWriteMsr64 (MSR_PLAT_FRMW_PROT_HASH_0, PfatConfig->PpdtHash[0]);
+ AsmWriteMsr64 (MSR_PLAT_FRMW_PROT_HASH_1, PfatConfig->PpdtHash[1]);
+ AsmWriteMsr64 (MSR_PLAT_FRMW_PROT_HASH_2, PfatConfig->PpdtHash[2]);
+ AsmWriteMsr64 (MSR_PLAT_FRMW_PROT_HASH_3, PfatConfig->PpdtHash[3]);
+ MsrValue |= (B_MSR_PLAT_FRMW_PROT_CTRL_LK | B_MSR_PLAT_FRMW_PROT_CTRL_EN);
+ AsmWriteMsr64 (MSR_PLAT_FRMW_PROT_CTRL, MsrValue);
+ }
+ ///
+ /// Create PFAT HOB
+ ///
+ if (!ResetRequired) {
+ Status = (*PeiServices)->CreateHob (PeiServices, EFI_HOB_TYPE_GUID_EXTENSION, sizeof (PFAT_HOB), (VOID **) &PfatHobPtr);
+ PfatHobPtr->EfiHobGuidType.Name = PfatHobGuid;
+ CopyMem (&PfatHobPtr->Ppdt, &PfatConfig->Ppdt, PfatConfig->Ppdt.PpdtSize);
+ CopyMem (&PfatHobPtr->PupHeader, &PfatConfig->PupHeader, sizeof (PUP_HEADER));
+ CopyMem (&PfatHobPtr->PfatLog, &PfatConfig->PfatLog, sizeof (PFAT_LOG));
+ PfatHobPtr->NumSpiComponents = PfatConfig->NumSpiComponents;
+ for (i = 0; i < PfatConfig->NumSpiComponents; i++) {
+ PfatHobPtr->ComponentSize[i] = PfatConfig->ComponentSize[i];
+ }
+ }
+ } else {
+ DEBUG ((EFI_D_INFO, "PFAT Module is Disabled\n"));
+ MsrValue = AsmReadMsr64 (MSR_PLAT_FRMW_PROT_CTRL);
+ if (MsrValue & B_MSR_PLAT_FRMW_PROT_CTRL_LK) {
+ if (MsrValue & B_MSR_PLAT_FRMW_PROT_CTRL_EN) {
+ ///
+ /// Reset required as the PFAT CTRL MSR is locked and needs to be toggled
+ ///
+ ResetRequired = TRUE;
+ }
+ } else {
+ MsrValue &= ~B_MSR_PLAT_FRMW_PROT_CTRL_EN;
+ MsrValue |= B_MSR_PLAT_FRMW_PROT_CTRL_LK;
+ AsmWriteMsr64 (MSR_PLAT_FRMW_PROT_CTRL, MsrValue);
+ }
+ }
+
+ if (ResetRequired) {
+ ///
+ /// Perform Cold Reset
+ ///
+ DEBUG ((EFI_D_INFO, "Reset Required. Performing Cold Reset to unlock PFAT CONTROL MSR\n"));
+ PerformWarmORColdReset (PeiServices, COLDRESET);
+ }
+
+ return;
+}
diff --git a/ReferenceCode/Haswell/CpuInit/Pei/PfatInit.h b/ReferenceCode/Haswell/CpuInit/Pei/PfatInit.h
new file mode 100644
index 0000000..22e807f
--- /dev/null
+++ b/ReferenceCode/Haswell/CpuInit/Pei/PfatInit.h
@@ -0,0 +1,42 @@
+/** @file
+ Describes the functions visible to the rest of the PfatInit.
+
+@copyright
+ Copyright (c) 2011 - 2012 Intel Corporation. All rights reserved
+ This software and associated documentation (if any) is furnished
+ under a license and may only be used or copied in accordance
+ with the terms of the license. Except as permitted by such
+ license, no part of this software or documentation may be
+ reproduced, stored in a retrieval system, or transmitted in any
+ form or by any means without the express written consent of
+ Intel Corporation.
+
+ This file contains an 'Intel Peripheral Driver' and uniquely
+ identified as "Intel Reference Module" and is
+ licensed for Intel CPUs and chipsets under the terms of your
+ license agreement with Intel or your vendor. This file may
+ be modified by the user, subject to additional terms of the
+ license agreement
+**/
+#ifndef _PFAT_INIT_H_
+#define _PFAT_INIT_H_
+
+#include "PfatDefinitions.h"
+#include EFI_PPI_DEFINITION (CpuPlatformPolicy)
+
+///
+/// Function Prototypes
+///
+/**
+ Execute Early-Post initialization of PFAT specific MSRs
+
+ @param[in] PeiServices - Indirect reference to the PEI Services Table.
+ @param[in] CpuPlatformPolicyPpi - Platform Policy PPI
+**/
+VOID
+PfatInit (
+ IN EFI_PEI_SERVICES **PeiServices,
+ IN PEI_CPU_PLATFORM_POLICY_PPI *CpuPlatformPolicyPpi
+ );
+
+#endif