cpu/x86: Remove obsolete smm_init_completion()

This is not used together with PARALLEL_MP and SMM_TSEG.
Platforms with SMM_ASEG continue to have their local
implementation doing the same thing.

Change-Id: I13a2f164804330c93240bff7f048e0a162b3ae25
Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/34154
Reviewed-by: Paul Menzel <paulepanter@users.sourceforge.net>
Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
This commit is contained in:
Kyösti Mälkki 2019-07-09 04:37:35 +03:00
parent 571b7b2118
commit fd10f773db
1 changed files with 0 additions and 6 deletions

View File

@ -57,7 +57,6 @@ struct smm_relocation_params {
/* This gets filled in and used during relocation. */ /* This gets filled in and used during relocation. */
static struct smm_relocation_params smm_reloc_params; static struct smm_relocation_params smm_reloc_params;
static void *default_smm_area = NULL;
/* On model_6fx, model_1067x and model_106cx SMRR functions slightly /* On model_6fx, model_1067x and model_106cx SMRR functions slightly
differently. The MSR are at different location from the rest differently. The MSR are at different location from the rest
@ -168,11 +167,6 @@ static void setup_ied_area(struct smm_relocation_params *params)
memset(ied_base + (1 << 20), 0, (32 << 10)); memset(ied_base + (1 << 20), 0, (32 << 10));
} }
void smm_init_completion(void)
{
restore_default_smm_area(default_smm_area);
}
void smm_lock(void) void smm_lock(void)
{ {
/* LOCK the SMM memory window and enable normal SMM. /* LOCK the SMM memory window and enable normal SMM.