73add175cd
With this implementation it's possible to detect the state of bootguard in intel based systems. Currently it's WIP and in a testphase. Handle it with care! Changes done: * Add support for reading msr * Read ME firmware version * Print bootguard state for ME > 9.1 * Make argument -s legacy * Add argument -b for bootguard (and ME) dumping * Add argument -m for ME dumping * Opt out early if CPU is non Intel Change-Id: Ifeec8e20fa8efc35d7db4c6a84be1f118dccfc4a Signed-off-by: Philipp Deppenwiese <zaolin@das-labor.org> Signed-off-by: Patrick Rudolph <siro@das-labor.org> Reviewed-on: https://review.coreboot.org/16328 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Philipp Deppenwiese <zaolin.daisuki@gmail.com>
30 lines
857 B
C
30 lines
857 B
C
/* intelmetool
|
|
*
|
|
* Copyright (C) 2013-2016 Philipp Deppenwiese <zaolin@das-labor.org>
|
|
* Copyright (C) 2013-2016 Alexander Couzens <lynxis@fe80.eu>
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License as
|
|
* published by the Free Software Foundation; either version 2 of
|
|
* the License, or any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
|
|
#include <inttypes.h>
|
|
|
|
#ifndef __DARWIN__
|
|
|
|
#define MSR_BOOTGUARD 0x13A
|
|
|
|
typedef struct {
|
|
unsigned int ebx;
|
|
unsigned int edx;
|
|
unsigned int ecx;
|
|
} regs_t;
|
|
|
|
extern int msr_bootguard(uint64_t *msr, int debug);
|
|
#endif
|