summaryrefslogtreecommitdiff
path: root/src/soc/amd/common/block/cpu/noncar
diff options
context:
space:
mode:
authorFelix Held <felix-coreboot@felixheld.de>2023-06-06 00:29:58 +0200
committerFelix Held <felix-coreboot@felixheld.de>2023-06-07 00:05:30 +0000
commit11ff753407ee7fd1cb2da06f8bedc5ac40ebbd95 (patch)
tree6ecbb219bf48422b94a9e6ccdc89ba87a9a1bf16 /src/soc/amd/common/block/cpu/noncar
parentb39e93e56fdd2b11b8e7a12889472f144673d05a (diff)
soc/amd/common/block/cpu/noncar: add get_usable_physical_address_bits()
In case the secure memory encryption is enabled, some of the upper usable address bits of the host can't be used any more. Bits 11..6 in CPUID_EBX_MEM_ENCRYPT indicate how many of the address bits are taken away from the usable address bits in the case the secure memory encryption is enabled. Signed-off-by: Felix Held <felix-coreboot@felixheld.de> Change-Id: Ia810b0984972216095da2ad8f9c19e37684f2a2e Reviewed-on: https://review.coreboot.org/c/coreboot/+/75623 Reviewed-by: Arthur Heymans <arthur@aheymans.xyz> Reviewed-by: Raul Rangel <rrangel@chromium.org> Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Diffstat (limited to 'src/soc/amd/common/block/cpu/noncar')
-rw-r--r--src/soc/amd/common/block/cpu/noncar/cpu.c18
1 files changed, 18 insertions, 0 deletions
diff --git a/src/soc/amd/common/block/cpu/noncar/cpu.c b/src/soc/amd/common/block/cpu/noncar/cpu.c
index 4afb69a299..891dece7dd 100644
--- a/src/soc/amd/common/block/cpu/noncar/cpu.c
+++ b/src/soc/amd/common/block/cpu/noncar/cpu.c
@@ -1,9 +1,12 @@
/* SPDX-License-Identifier: GPL-2.0-only */
#include <amdblocks/cpu.h>
+#include <arch/cpuid.h>
#include <cpu/cpu.h>
#include <cpu/x86/msr.h>
+#include <cpu/amd/cpuid.h>
#include <cpu/amd/msr.h>
+#include <cpu/amd/mtrr.h>
#include <smbios.h>
#include <soc/iomap.h>
#include <types.h>
@@ -31,3 +34,18 @@ void set_cstate_io_addr(void)
cst_addr.lo = ACPI_CSTATE_CONTROL;
wrmsr(MSR_CSTATE_ADDRESS, cst_addr);
}
+
+static uint32_t get_smee_reserved_address_bits(void)
+{
+ if (rdmsr(SYSCFG_MSR).raw & SYSCFG_MSR_SMEE)
+ return (cpuid_ebx(CPUID_EBX_MEM_ENCRYPT) &
+ CPUID_EBX_MEM_ENCRYPT_ADDR_BITS_MASK) >>
+ CPUID_EBX_MEM_ENCRYPT_ADDR_BITS_SHIFT;
+ else
+ return 0;
+}
+
+uint32_t get_usable_physical_address_bits(void)
+{
+ return cpu_phys_address_size() - get_smee_reserved_address_bits();
+}