MSR_FEATURE_CONFIG, which is used for locking AES-NI, is core-scoped, not package-scoped. Thus, move locking from SMM to core init, where the code gets executed once per core. Change-Id: I3a6f7fc95ce226ce4246b65070726087eb9d689c Signed-off-by: Michael Niewöhner <foss@mniewoehner.de> Reviewed-on: https://review.coreboot.org/c/coreboot/+/46535 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Nico Huber <nico.h@gmx.de>
21 lines
525 B
C
21 lines
525 B
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
|
|
#include <types.h>
|
|
#include <arch/cpu.h>
|
|
#include <cpu/x86/msr.h>
|
|
#include "model_206ax.h"
|
|
|
|
/* MSR Documentation based on
|
|
* "Sandy Bridge Processor Family BIOS Writer's Guide (BWG)"
|
|
* Document Number 504790
|
|
* Revision 1.6.0, June 2012 */
|
|
|
|
void intel_model_206ax_finalize_smm(void)
|
|
{
|
|
/* Lock TM interrupts - route thermal events to all processors */
|
|
msr_set(MSR_MISC_PWR_MGMT, BIT(22));
|
|
|
|
/* Lock memory configuration to protect SMM */
|
|
msr_set(MSR_LT_LOCK_MEMORY, BIT(0));
|
|
}
|