src/cpu: Fix typo

Change-Id: I13dec72b2de2a525d45909e697c33fbdc31111cb
Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
Reviewed-on: https://review.coreboot.org/27918
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Martin Roth <martinroth@google.com>
This commit is contained in:
Elyes HAOUAS 2018-08-07 12:24:16 +02:00 committed by Martin Roth
parent 394ec02298
commit ece26961b9
6 changed files with 6 additions and 6 deletions

View File

@ -69,7 +69,7 @@ void intel_model_206ax_finalize_smm(void)
msr_set_bit(MSR_PP1_POWER_LIMIT, 31); msr_set_bit(MSR_PP1_POWER_LIMIT, 31);
#endif #endif
/* Lock TM interupts - route thermal events to all processors */ /* Lock TM interrupts - route thermal events to all processors */
msr_set_bit(MSR_MISC_PWR_MGMT, 22); msr_set_bit(MSR_MISC_PWR_MGMT, 22);
/* Lock memory configuration to protect SMM */ /* Lock memory configuration to protect SMM */

View File

@ -72,7 +72,7 @@ void intel_cpu_haswell_finalize_smm(void)
msr_set_bit(MSR_PP1_POWER_LIMIT, 31); msr_set_bit(MSR_PP1_POWER_LIMIT, 31);
#endif #endif
/* Lock TM interupts - route thermal events to all processors */ /* Lock TM interrupts - route thermal events to all processors */
msr_set_bit(MSR_MISC_PWR_MGMT, 22); msr_set_bit(MSR_MISC_PWR_MGMT, 22);
/* Lock memory configuration to protect SMM */ /* Lock memory configuration to protect SMM */

View File

@ -52,6 +52,6 @@ void intel_model_2065x_finalize_smm(void)
if (cpuid_ecx(1) & (1 << 25)) if (cpuid_ecx(1) & (1 << 25))
msr_set_bit(MSR_FEATURE_CONFIG, 0); msr_set_bit(MSR_FEATURE_CONFIG, 0);
/* Lock TM interupts - route thermal events to all processors */ /* Lock TM interrupts - route thermal events to all processors */
msr_set_bit(MSR_MISC_PWR_MGMT, 22); msr_set_bit(MSR_MISC_PWR_MGMT, 22);
} }

View File

@ -70,7 +70,7 @@ void intel_model_206ax_finalize_smm(void)
msr_set_bit(MSR_PP1_POWER_LIMIT, 31); msr_set_bit(MSR_PP1_POWER_LIMIT, 31);
#endif #endif
/* Lock TM interupts - route thermal events to all processors */ /* Lock TM interrupts - route thermal events to all processors */
msr_set_bit(MSR_MISC_PWR_MGMT, 22); msr_set_bit(MSR_MISC_PWR_MGMT, 22);
/* Lock memory configuration to protect SMM */ /* Lock memory configuration to protect SMM */

View File

@ -89,7 +89,7 @@ _start16bit:
* must be loaded at or above 0xffff0000 or below 0x100000. * must be loaded at or above 0xffff0000 or below 0x100000.
* *
* The linker scripts computes gdtptr16_offset by simply returning * The linker scripts computes gdtptr16_offset by simply returning
* the low 16 bits. This means that the intial segment used * the low 16 bits. This means that the initial segment used
* when start is called must be 64K aligned. This should not * when start is called must be 64K aligned. This should not
* restrict the address as the ip address can be anything. * restrict the address as the ip address can be anything.
* *

View File

@ -17,7 +17,7 @@
#include <cpu/x86/cr.h> #include <cpu/x86/cr.h>
#include <cpu/amd/mtrr.h> #include <cpu/amd/mtrr.h>
/* The SIPI vector is responsible for initializing the APs in the sytem. It /* The SIPI vector is responsible for initializing the APs in the system. It
* loads microcode, sets up MSRs, and enables caching before calling into * loads microcode, sets up MSRs, and enables caching before calling into
* C code. */ * C code. */