soc/intel: common,apl,skl: remove orphaned memory locking API

Remove the now orphaned memory locking API that was replaced by a
Kconfig-based approach.

Change-Id: Iebc45f514c576d77f90f558151d25c21f0554779
Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/36515
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Nico Huber <nico.h@gmx.de>
This commit is contained in:
Michael Niewöhner 2019-10-31 19:06:08 +01:00 committed by Nico Huber
parent c5fc753b13
commit 7253e7a135
3 changed files with 0 additions and 23 deletions

View File

@ -291,9 +291,3 @@ void apollolake_init_cpus(struct device *dev)
CONFIG(BOOT_DEVICE_SPI_FLASH))
fast_spi_cache_bios_region();
}
void cpu_lock_sgx_memory(void)
{
/* Do nothing because MCHECK while loading microcode and enabling
* IA untrusted mode takes care of necessary locking */
}

View File

@ -18,12 +18,6 @@
#include <soc/nvs.h>
/*
* Lock SGX memory.
* CPU specific code needs to provide the implementation.
*/
void cpu_lock_sgx_memory(void);
/*
* Configure core PRMRR.
* PRMRR needs to configured first on all cores and then

View File

@ -575,14 +575,3 @@ int soc_skip_ucode_update(u32 current_patch_id, u32 new_patch_id)
return (msr1.lo & PRMRR_SUPPORTED) &&
(current_patch_id == new_patch_id - 1);
}
void cpu_lock_sgx_memory(void)
{
msr_t msr;
msr = rdmsr(MSR_LT_LOCK_MEMORY);
if ((msr.lo & 1) == 0) {
msr.lo |= 1; /* Lock it */
wrmsr(MSR_LT_LOCK_MEMORY, msr);
}
}