901cb9ca46
Allocate storage for the BERT reserved memory in cbmem, and add it in response to a romstage hook. Add a Kconfig option for adjusting the size reserved. This is different from the Stoney Ridge implementation where it was intentionally oversized to ease MTRR use and to keep TSEG aligned. Signed-off-by: Marshall Dawson <marshalldawson3rd@gmail.com> Signed-off-by: Felix Held <felix-coreboot@felixheld.de> Change-Id: I4759154d394a8f5b35c0ef0a15994bbef25492e5 Reviewed-on: https://review.coreboot.org/c/coreboot/+/38694 Reviewed-by: Raul Rangel <rrangel@chromium.org> Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
74 lines
1.4 KiB
C
74 lines
1.4 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/* This file is part of the coreboot project. */
|
|
|
|
#define __SIMPLE_DEVICE__
|
|
|
|
#include <assert.h>
|
|
#include <stdint.h>
|
|
#include <console/console.h>
|
|
#include <cpu/x86/msr.h>
|
|
#include <cpu/x86/smm.h>
|
|
#include <cpu/amd/msr.h>
|
|
#include <cpu/amd/mtrr.h>
|
|
#include <cbmem.h>
|
|
#include <arch/bert_storage.h>
|
|
#include <soc/northbridge.h>
|
|
#include <soc/iomap.h>
|
|
#include <amdblocks/acpimmio.h>
|
|
|
|
void *cbmem_top_chipset(void)
|
|
{
|
|
msr_t tom = rdmsr(TOP_MEM);
|
|
|
|
if (!tom.lo)
|
|
return 0;
|
|
|
|
/* 8MB alignment to keep MTRR usage low */
|
|
return (void *)ALIGN_DOWN(restore_top_of_low_cacheable()
|
|
- CONFIG_SMM_TSEG_SIZE, 8*MiB);
|
|
}
|
|
|
|
static uintptr_t smm_region_start(void)
|
|
{
|
|
return (uintptr_t)cbmem_top();
|
|
}
|
|
|
|
static size_t smm_region_size(void)
|
|
{
|
|
return CONFIG_SMM_TSEG_SIZE;
|
|
}
|
|
|
|
/*
|
|
* For data stored in TSEG, ensure TValid is clear so R/W access can reach
|
|
* the DRAM when not in SMM.
|
|
*/
|
|
static void clear_tvalid(void)
|
|
{
|
|
msr_t hwcr = rdmsr(HWCR_MSR);
|
|
msr_t mask = rdmsr(SMM_MASK_MSR);
|
|
int tvalid = !!(mask.lo & SMM_TSEG_VALID);
|
|
|
|
if (hwcr.lo & SMM_LOCK) {
|
|
if (!tvalid) /* not valid but locked means still accessible */
|
|
return;
|
|
|
|
printk(BIOS_ERR, "Error: can't clear TValid, already locked\n");
|
|
return;
|
|
}
|
|
|
|
mask.lo &= ~SMM_TSEG_VALID;
|
|
wrmsr(SMM_MASK_MSR, mask);
|
|
}
|
|
|
|
void smm_region(uintptr_t *start, size_t *size)
|
|
{
|
|
static int once;
|
|
|
|
*start = smm_region_start();
|
|
*size = smm_region_size();
|
|
|
|
if (!once) {
|
|
clear_tvalid();
|
|
once = 1;
|
|
}
|
|
}
|