From 4b7be665968b67463ec36b9afc7e8736be0c9b51 Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Mon, 23 Aug 2021 09:04:23 +0100 Subject: [PATCH] coreboot: revert cpu/intel: Configure IA32_FEATURE_CONTROL for alternative SMRR This fixes issue 3: https://notabug.org/libreboot/lbmk/issues/3 In this issue, GM45 laptops such as X200/T400 will hang on reboot (normal boot works, and shutting down works too). --- ...re-revisions-and-don-t-automatically.patch | 4 +- ...-Video-RAM-changed-to-default-previo.patch | 4 +- ...64MiB-VRAM-the-default-in-cmos.defau.patch | 4 +- ...Set-default-VRAM-to-64MiB-instead-of.patch | 4 +- ...Do-not-set-D_XOPEN_SOURCE-on-FreeBSD.patch | 4 +- ...el-stm-Add-warning-for-non-reproduci.patch | 4 +- ...-run-genbuild_h-if-not-doing-a-build.patch | 4 +- ..._h-Update-IASL-location-finding-code.patch | 4 +- ...09-util-crossgcc-Update-gmp-to-6.2.1.patch | 4 +- ...10-util-crossgcc-Update-mpc-to-1.2.1.patch | 4 +- ...sts-Enable-config-override-for-tests.patch | 4 +- ...format-in-function-declarations-and-.patch | 4 +- ...pm-Deal-with-zero-length-tlcl-writes.patch | 4 +- ...0-set-VRAM-to-352MiB-VRAM-by-default.patch | 4 +- ...o-x200-set-VRAM-to-352MiB-by-default.patch | 4 +- ...m-es2l-set-VRAM-to-352MiB-by-default.patch | 4 +- ...3t-am3-set-VRAM-to-352MiB-by-default.patch | 4 +- ...-Configure-IA32_FEATURE_CONTROL-for-.patch | 115 ++++++++++++++++++ .../patches/0019-Fix-missing-include.patch | 24 ++++ 19 files changed, 173 insertions(+), 34 deletions(-) create mode 100644 resources/coreboot/default/patches/0018-Revert-cpu-intel-Configure-IA32_FEATURE_CONTROL-for-.patch create mode 100644 resources/coreboot/default/patches/0019-Fix-missing-include.patch diff --git a/resources/coreboot/default/patches/0001-hardcode-tianocore-revisions-and-don-t-automatically.patch b/resources/coreboot/default/patches/0001-hardcode-tianocore-revisions-and-don-t-automatically.patch index d05eb30..fc6f05a 100644 --- a/resources/coreboot/default/patches/0001-hardcode-tianocore-revisions-and-don-t-automatically.patch +++ b/resources/coreboot/default/patches/0001-hardcode-tianocore-revisions-and-don-t-automatically.patch @@ -1,7 +1,7 @@ -From 91b073efaca57d455e2f25370918b9796cbc1a15 Mon Sep 17 00:00:00 2001 +From 0d1703b38c15d3a30d86e257adc71212ed1553e6 Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Thu, 13 May 2021 23:52:08 +0100 -Subject: [PATCH 01/17] hardcode tianocore revisions, and don't automatically +Subject: [PATCH 01/19] hardcode tianocore revisions, and don't automatically download --- diff --git a/resources/coreboot/default/patches/0002-lenovo-x60-64MiB-Video-RAM-changed-to-default-previo.patch b/resources/coreboot/default/patches/0002-lenovo-x60-64MiB-Video-RAM-changed-to-default-previo.patch index c3df0af..5d57fe1 100644 --- a/resources/coreboot/default/patches/0002-lenovo-x60-64MiB-Video-RAM-changed-to-default-previo.patch +++ b/resources/coreboot/default/patches/0002-lenovo-x60-64MiB-Video-RAM-changed-to-default-previo.patch @@ -1,7 +1,7 @@ -From 2ca1b655f0421fb9ed971f6e815bdd9dadc61a32 Mon Sep 17 00:00:00 2001 +From 7f56e3dc6b92f643e4f2c7eebf7da7c0a5e0cc1d Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Sun, 3 Jan 2021 03:34:01 +0000 -Subject: [PATCH 02/17] lenovo/x60: 64MiB Video RAM changed to default +Subject: [PATCH 02/19] lenovo/x60: 64MiB Video RAM changed to default (previously it was 8MiB) --- diff --git a/resources/coreboot/default/patches/0003-lenovo-t60-make-64MiB-VRAM-the-default-in-cmos.defau.patch b/resources/coreboot/default/patches/0003-lenovo-t60-make-64MiB-VRAM-the-default-in-cmos.defau.patch index 01f97cd..724e53c 100644 --- a/resources/coreboot/default/patches/0003-lenovo-t60-make-64MiB-VRAM-the-default-in-cmos.defau.patch +++ b/resources/coreboot/default/patches/0003-lenovo-t60-make-64MiB-VRAM-the-default-in-cmos.defau.patch @@ -1,7 +1,7 @@ -From 86bf61b803e116e9037d74a1166e64c7b6d85c7a Mon Sep 17 00:00:00 2001 +From 08f1bb813721bb9e7c9f60d3d08e22391080c69e Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Mon, 22 Feb 2021 22:16:59 +0000 -Subject: [PATCH 03/17] lenovo/t60: make 64MiB VRAM the default in cmos.default +Subject: [PATCH 03/19] lenovo/t60: make 64MiB VRAM the default in cmos.default --- src/mainboard/lenovo/t60/cmos.default | 2 +- diff --git a/resources/coreboot/default/patches/0004-apple-macbook21-Set-default-VRAM-to-64MiB-instead-of.patch b/resources/coreboot/default/patches/0004-apple-macbook21-Set-default-VRAM-to-64MiB-instead-of.patch index 6458a80..64ce837 100644 --- a/resources/coreboot/default/patches/0004-apple-macbook21-Set-default-VRAM-to-64MiB-instead-of.patch +++ b/resources/coreboot/default/patches/0004-apple-macbook21-Set-default-VRAM-to-64MiB-instead-of.patch @@ -1,7 +1,7 @@ -From d2da9e70f608016c20976623a6ca9916da13e647 Mon Sep 17 00:00:00 2001 +From edac42ddfaf86d60575f7789ad66c95adea8b4af Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Fri, 19 Mar 2021 05:54:58 +0000 -Subject: [PATCH 04/17] apple/macbook21: Set default VRAM to 64MiB instead of +Subject: [PATCH 04/19] apple/macbook21: Set default VRAM to 64MiB instead of 8MiB --- diff --git a/resources/coreboot/default/patches/0005-util-cbfstool-Do-not-set-D_XOPEN_SOURCE-on-FreeBSD.patch b/resources/coreboot/default/patches/0005-util-cbfstool-Do-not-set-D_XOPEN_SOURCE-on-FreeBSD.patch index 1cc7aa1..57ef67d 100644 --- a/resources/coreboot/default/patches/0005-util-cbfstool-Do-not-set-D_XOPEN_SOURCE-on-FreeBSD.patch +++ b/resources/coreboot/default/patches/0005-util-cbfstool-Do-not-set-D_XOPEN_SOURCE-on-FreeBSD.patch @@ -1,7 +1,7 @@ -From f0c8276fe364d4773f9f305f2678a0b8e8f84830 Mon Sep 17 00:00:00 2001 +From 95466021fb0e581442be523f4b84939ef5c28ea7 Mon Sep 17 00:00:00 2001 From: Idwer Vollering Date: Sun, 9 May 2021 18:16:26 +0200 -Subject: [PATCH 05/17] util/cbfstool: Do not set -D_XOPEN_SOURCE on FreeBSD +Subject: [PATCH 05/19] util/cbfstool: Do not set -D_XOPEN_SOURCE on FreeBSD Fixes compilation on FreeBSD CURRENT, and possibly other releases. diff --git a/resources/coreboot/default/patches/0006-src-security-intel-stm-Add-warning-for-non-reproduci.patch b/resources/coreboot/default/patches/0006-src-security-intel-stm-Add-warning-for-non-reproduci.patch index e03418d..a232110 100644 --- a/resources/coreboot/default/patches/0006-src-security-intel-stm-Add-warning-for-non-reproduci.patch +++ b/resources/coreboot/default/patches/0006-src-security-intel-stm-Add-warning-for-non-reproduci.patch @@ -1,7 +1,7 @@ -From 8a687e2efd7199a06cd6bdd85fa1a1b17bca53cc Mon Sep 17 00:00:00 2001 +From 44de7f951ae55d60b96794b68d505d42af184d0a Mon Sep 17 00:00:00 2001 From: Martin Roth Date: Mon, 10 May 2021 11:28:45 -0600 -Subject: [PATCH 06/17] src/security/intel/stm: Add warning for +Subject: [PATCH 06/19] src/security/intel/stm: Add warning for non-reproducible build Because the STM build doesn't use the coreboot toolchain it's not diff --git a/resources/coreboot/default/patches/0007-Makefile-Don-t-run-genbuild_h-if-not-doing-a-build.patch b/resources/coreboot/default/patches/0007-Makefile-Don-t-run-genbuild_h-if-not-doing-a-build.patch index b0a09f1..ad4ceb7 100644 --- a/resources/coreboot/default/patches/0007-Makefile-Don-t-run-genbuild_h-if-not-doing-a-build.patch +++ b/resources/coreboot/default/patches/0007-Makefile-Don-t-run-genbuild_h-if-not-doing-a-build.patch @@ -1,7 +1,7 @@ -From 710301b4e80325012e86cdec3c0c4bcca03be551 Mon Sep 17 00:00:00 2001 +From 87f01ab327469aae978884b83dd218416cf5035b Mon Sep 17 00:00:00 2001 From: Martin Roth Date: Sun, 9 May 2021 10:26:10 -0600 -Subject: [PATCH 07/17] Makefile: Don't run genbuild_h if not doing a build +Subject: [PATCH 07/19] Makefile: Don't run genbuild_h if not doing a build genbuild_h was being run on every make invocation - clean, distclean, etc. to get the source date epoch value. This value isn't used unless diff --git a/resources/coreboot/default/patches/0008-util-genbuild_h-Update-IASL-location-finding-code.patch b/resources/coreboot/default/patches/0008-util-genbuild_h-Update-IASL-location-finding-code.patch index 79a35fc..637bc4a 100644 --- a/resources/coreboot/default/patches/0008-util-genbuild_h-Update-IASL-location-finding-code.patch +++ b/resources/coreboot/default/patches/0008-util-genbuild_h-Update-IASL-location-finding-code.patch @@ -1,7 +1,7 @@ -From 5c4c5cdc3110bf02b93be9d5eb744235c8f49e33 Mon Sep 17 00:00:00 2001 +From bb4f6e441d94d52c37998d6894b373a4e797de80 Mon Sep 17 00:00:00 2001 From: Martin Roth Date: Sun, 9 May 2021 11:44:15 -0600 -Subject: [PATCH 08/17] util/genbuild_h: Update IASL location finding code +Subject: [PATCH 08/19] util/genbuild_h: Update IASL location finding code Update the iasl path finding code to use XGCCPATH if it's set, and to look for iasl on the path if it's not set and not under util/crossgcc. diff --git a/resources/coreboot/default/patches/0009-util-crossgcc-Update-gmp-to-6.2.1.patch b/resources/coreboot/default/patches/0009-util-crossgcc-Update-gmp-to-6.2.1.patch index b789989..94d7b23 100644 --- a/resources/coreboot/default/patches/0009-util-crossgcc-Update-gmp-to-6.2.1.patch +++ b/resources/coreboot/default/patches/0009-util-crossgcc-Update-gmp-to-6.2.1.patch @@ -1,7 +1,7 @@ -From 86af2659583125b2891ad57bde30a33adff91c03 Mon Sep 17 00:00:00 2001 +From f9e67d0def253cd28ffe841f1e99885e7a44b0b5 Mon Sep 17 00:00:00 2001 From: Patrick Georgi Date: Mon, 10 May 2021 23:34:18 +0200 -Subject: [PATCH 09/17] util/crossgcc: Update gmp to 6.2.1 +Subject: [PATCH 09/19] util/crossgcc: Update gmp to 6.2.1 Change-Id: I871942f66e8fc496ebe523fdab539ea20950a202 Signed-off-by: Patrick Georgi diff --git a/resources/coreboot/default/patches/0010-util-crossgcc-Update-mpc-to-1.2.1.patch b/resources/coreboot/default/patches/0010-util-crossgcc-Update-mpc-to-1.2.1.patch index 0bd330d..cacf8c1 100644 --- a/resources/coreboot/default/patches/0010-util-crossgcc-Update-mpc-to-1.2.1.patch +++ b/resources/coreboot/default/patches/0010-util-crossgcc-Update-mpc-to-1.2.1.patch @@ -1,7 +1,7 @@ -From b1533d4dca6b9c88f9e0418d5a93dd9a3c4cd7f3 Mon Sep 17 00:00:00 2001 +From af8727a0b86f0f705129529a478a29622df3fed9 Mon Sep 17 00:00:00 2001 From: Patrick Georgi Date: Mon, 10 May 2021 23:35:51 +0200 -Subject: [PATCH 10/17] util/crossgcc: Update mpc to 1.2.1 +Subject: [PATCH 10/19] util/crossgcc: Update mpc to 1.2.1 Change-Id: Ic1422464d0a95c9cba1c417aaa05e4f1fe799d26 Signed-off-by: Patrick Georgi diff --git a/resources/coreboot/default/patches/0011-tests-Enable-config-override-for-tests.patch b/resources/coreboot/default/patches/0011-tests-Enable-config-override-for-tests.patch index 2aca94d..86229b4 100644 --- a/resources/coreboot/default/patches/0011-tests-Enable-config-override-for-tests.patch +++ b/resources/coreboot/default/patches/0011-tests-Enable-config-override-for-tests.patch @@ -1,7 +1,7 @@ -From 89236c7c44797cd8306d9509552bf0115ffe928a Mon Sep 17 00:00:00 2001 +From 277f409dcb520911b55a73c5f5c0e39ae1078012 Mon Sep 17 00:00:00 2001 From: Jakub Czapiga Date: Wed, 28 Apr 2021 16:50:51 +0200 -Subject: [PATCH 11/17] tests: Enable config override for tests +Subject: [PATCH 11/19] tests: Enable config override for tests Some tests require to change kconfig symbols values to cover the code. This patch enables one to set these vaues using -config diff --git a/resources/coreboot/default/patches/0012-src-Match-array-format-in-function-declarations-and-.patch b/resources/coreboot/default/patches/0012-src-Match-array-format-in-function-declarations-and-.patch index 574e2e9..ab63e84 100644 --- a/resources/coreboot/default/patches/0012-src-Match-array-format-in-function-declarations-and-.patch +++ b/resources/coreboot/default/patches/0012-src-Match-array-format-in-function-declarations-and-.patch @@ -1,7 +1,7 @@ -From 7413a445b51db0adb9faf1bb21d8f6d2311a35d0 Mon Sep 17 00:00:00 2001 +From bc1be4e1a6c6104693ad8fc44be8feb8e0112765 Mon Sep 17 00:00:00 2001 From: Patrick Georgi Date: Wed, 12 May 2021 14:52:12 +0200 -Subject: [PATCH 12/17] src: Match array format in function declarations and +Subject: [PATCH 12/19] src: Match array format in function declarations and definitions gcc 11.1 complains when we're passing a type* into a function that was diff --git a/resources/coreboot/default/patches/0013-src-security-tpm-Deal-with-zero-length-tlcl-writes.patch b/resources/coreboot/default/patches/0013-src-security-tpm-Deal-with-zero-length-tlcl-writes.patch index 183c602..3f5a290 100644 --- a/resources/coreboot/default/patches/0013-src-security-tpm-Deal-with-zero-length-tlcl-writes.patch +++ b/resources/coreboot/default/patches/0013-src-security-tpm-Deal-with-zero-length-tlcl-writes.patch @@ -1,7 +1,7 @@ -From 37589dc0c9c0bb78904b0b2b9aae0ba519eb6e04 Mon Sep 17 00:00:00 2001 +From 416c686c4c06ab42f700187ee1dc7fe9e4fed525 Mon Sep 17 00:00:00 2001 From: Patrick Georgi Date: Wed, 12 May 2021 14:54:49 +0200 -Subject: [PATCH 13/17] src/security/tpm: Deal with zero length tlcl writes +Subject: [PATCH 13/19] src/security/tpm: Deal with zero length tlcl writes While memcpy(foo, bar, 0) should be a no-op, that's hard to prove for a compiler and so gcc 11.1 complains about the use of an uninitialized diff --git a/resources/coreboot/default/patches/0014-lenovo-t400-set-VRAM-to-352MiB-VRAM-by-default.patch b/resources/coreboot/default/patches/0014-lenovo-t400-set-VRAM-to-352MiB-VRAM-by-default.patch index d2feee4..ca57447 100644 --- a/resources/coreboot/default/patches/0014-lenovo-t400-set-VRAM-to-352MiB-VRAM-by-default.patch +++ b/resources/coreboot/default/patches/0014-lenovo-t400-set-VRAM-to-352MiB-VRAM-by-default.patch @@ -1,7 +1,7 @@ -From cff1ab192e04ca9c90b03bf4aa74d54db078d4d2 Mon Sep 17 00:00:00 2001 +From 0966b4c69f6c3df000cb4f904b9dc0bf822e5b4f Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Fri, 14 May 2021 13:10:33 +0100 -Subject: [PATCH 14/17] lenovo/t400: set VRAM to 352MiB VRAM by default +Subject: [PATCH 14/19] lenovo/t400: set VRAM to 352MiB VRAM by default In the past, this caused stability issues so we set it to 256MiB. Nowadays, coreboot has fixed the issue preventing this. See: diff --git a/resources/coreboot/default/patches/0015-lenovo-x200-set-VRAM-to-352MiB-by-default.patch b/resources/coreboot/default/patches/0015-lenovo-x200-set-VRAM-to-352MiB-by-default.patch index 7f0ac99..1f30779 100644 --- a/resources/coreboot/default/patches/0015-lenovo-x200-set-VRAM-to-352MiB-by-default.patch +++ b/resources/coreboot/default/patches/0015-lenovo-x200-set-VRAM-to-352MiB-by-default.patch @@ -1,7 +1,7 @@ -From 0daea37502732d3cc19404c2be7cb5b7be095456 Mon Sep 17 00:00:00 2001 +From 4680045aaa952ce8b2d8fe75721b5f8e662286d1 Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Fri, 14 May 2021 13:11:59 +0100 -Subject: [PATCH 15/17] lenovo/x200: set VRAM to 352MiB by default +Subject: [PATCH 15/19] lenovo/x200: set VRAM to 352MiB by default This fix makes it possible: https://review.coreboot.org/c/coreboot/+/16831 diff --git a/resources/coreboot/default/patches/0016-gigabyte-ga-g41m-es2l-set-VRAM-to-352MiB-by-default.patch b/resources/coreboot/default/patches/0016-gigabyte-ga-g41m-es2l-set-VRAM-to-352MiB-by-default.patch index fb3d2ec..450bede 100644 --- a/resources/coreboot/default/patches/0016-gigabyte-ga-g41m-es2l-set-VRAM-to-352MiB-by-default.patch +++ b/resources/coreboot/default/patches/0016-gigabyte-ga-g41m-es2l-set-VRAM-to-352MiB-by-default.patch @@ -1,7 +1,7 @@ -From 264ea6cfabe553059c888dea09046e6eac393d1b Mon Sep 17 00:00:00 2001 +From 213c3ad9ca58b0c7f273d80f195c442ed5d7ec54 Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Fri, 14 May 2021 13:18:26 +0100 -Subject: [PATCH 16/17] gigabyte/ga-g41m-es2l: set VRAM to 352MiB by default +Subject: [PATCH 16/19] gigabyte/ga-g41m-es2l: set VRAM to 352MiB by default --- src/mainboard/gigabyte/ga-g41m-es2l/cmos.default | 2 +- diff --git a/resources/coreboot/default/patches/0017-acer-g43t-am3-set-VRAM-to-352MiB-by-default.patch b/resources/coreboot/default/patches/0017-acer-g43t-am3-set-VRAM-to-352MiB-by-default.patch index 672f977..112c052 100644 --- a/resources/coreboot/default/patches/0017-acer-g43t-am3-set-VRAM-to-352MiB-by-default.patch +++ b/resources/coreboot/default/patches/0017-acer-g43t-am3-set-VRAM-to-352MiB-by-default.patch @@ -1,7 +1,7 @@ -From a40d461be382e3897b4365f34b5e5872baf72334 Mon Sep 17 00:00:00 2001 +From fb4c9fcad31d50949ffaeb35dbcfe10c7b9c1dbb Mon Sep 17 00:00:00 2001 From: Leah Rowe Date: Fri, 14 May 2021 13:21:39 +0100 -Subject: [PATCH 17/17] acer/g43t-am3: set VRAM to 352MiB by default +Subject: [PATCH 17/19] acer/g43t-am3: set VRAM to 352MiB by default --- src/mainboard/acer/g43t-am3/cmos.default | 2 +- diff --git a/resources/coreboot/default/patches/0018-Revert-cpu-intel-Configure-IA32_FEATURE_CONTROL-for-.patch b/resources/coreboot/default/patches/0018-Revert-cpu-intel-Configure-IA32_FEATURE_CONTROL-for-.patch new file mode 100644 index 0000000..f01d776 --- /dev/null +++ b/resources/coreboot/default/patches/0018-Revert-cpu-intel-Configure-IA32_FEATURE_CONTROL-for-.patch @@ -0,0 +1,115 @@ +From 96ab5f286ede629c1a67c97d7ef63a05d922d159 Mon Sep 17 00:00:00 2001 +From: Rodrigo +Date: Mon, 23 Aug 2021 02:20:32 -0300 +Subject: [PATCH 18/19] Revert "cpu/intel: Configure IA32_FEATURE_CONTROL for + alternative SMRR" + +This rendered at least the x200 unable to reboot. + +This reverts commit df7aecd92643d207feaf7fd840f8835097346644. +--- + src/cpu/intel/model_1067x/model_1067x_init.c | 3 +++ + src/cpu/intel/model_1067x/mp_init.c | 26 -------------------- + src/cpu/intel/model_106cx/model_106cx_init.c | 3 +++ + src/cpu/intel/model_6ex/model_6ex_init.c | 3 +++ + src/cpu/intel/model_6fx/model_6fx_init.c | 3 +++ + 5 files changed, 12 insertions(+), 26 deletions(-) + +diff --git a/src/cpu/intel/model_1067x/model_1067x_init.c b/src/cpu/intel/model_1067x/model_1067x_init.c +index 3e4de1fa31..ca3ce274fc 100644 +--- a/src/cpu/intel/model_1067x/model_1067x_init.c ++++ b/src/cpu/intel/model_1067x/model_1067x_init.c +@@ -274,6 +274,9 @@ static void model_1067x_init(struct device *cpu) + /* Initialize the APIC timer */ + init_timer(); + ++ /* Set virtualization based on Kconfig option */ ++ set_vmx_and_lock(); ++ + /* Configure C States */ + configure_c_states(quad); + +diff --git a/src/cpu/intel/model_1067x/mp_init.c b/src/cpu/intel/model_1067x/mp_init.c +index fd6a82ac17..e2fa7c8f20 100644 +--- a/src/cpu/intel/model_1067x/mp_init.c ++++ b/src/cpu/intel/model_1067x/mp_init.c +@@ -42,34 +42,8 @@ static void pre_mp_smm_init(void) + smm_initialize(); + } + +-#define SMRR_SUPPORTED (1 << 11) +- + static void per_cpu_smm_trigger(void) + { +- msr_t mtrr_cap = rdmsr(MTRR_CAP_MSR); +- if (cpu_has_alternative_smrr() && mtrr_cap.lo & SMRR_SUPPORTED) { +- set_feature_ctrl_vmx(); +- msr_t ia32_ft_ctrl = rdmsr(IA32_FEATURE_CONTROL); +- /* We don't care if the lock is already setting +- as our smm relocation handler is able to handle +- setups where SMRR is not enabled here. */ +- if (ia32_ft_ctrl.lo & (1 << 0)) { +- /* IA32_FEATURE_CONTROL locked. If we set it again we +- get an illegal instruction. */ +- printk(BIOS_DEBUG, "IA32_FEATURE_CONTROL already locked\n"); +- printk(BIOS_DEBUG, "SMRR status: %senabled\n", +- ia32_ft_ctrl.lo & (1 << 3) ? "" : "not "); +- } else { +- if (!CONFIG(SET_IA32_FC_LOCK_BIT)) +- printk(BIOS_INFO, +- "Overriding CONFIG(SET_IA32_FC_LOCK_BIT) to enable SMRR\n"); +- ia32_ft_ctrl.lo |= (1 << 3) | (1 << 0); +- wrmsr(IA32_FEATURE_CONTROL, ia32_ft_ctrl); +- } +- } else { +- set_vmx_and_lock(); +- } +- + /* Relocate the SMM handler. */ + smm_relocate(); + } +diff --git a/src/cpu/intel/model_106cx/model_106cx_init.c b/src/cpu/intel/model_106cx/model_106cx_init.c +index 278d8dea81..a0917045dd 100644 +--- a/src/cpu/intel/model_106cx/model_106cx_init.c ++++ b/src/cpu/intel/model_106cx/model_106cx_init.c +@@ -70,6 +70,9 @@ static void model_106cx_init(struct device *cpu) + /* Enable the local CPU APICs */ + setup_lapic(); + ++ /* Set virtualization based on Kconfig option */ ++ set_vmx_and_lock(); ++ + /* Configure C States */ + configure_c_states(); + +diff --git a/src/cpu/intel/model_6ex/model_6ex_init.c b/src/cpu/intel/model_6ex/model_6ex_init.c +index 16c6866f45..31399bdbd7 100644 +--- a/src/cpu/intel/model_6ex/model_6ex_init.c ++++ b/src/cpu/intel/model_6ex/model_6ex_init.c +@@ -109,6 +109,9 @@ static void model_6ex_init(struct device *cpu) + /* Enable the local CPU APICs */ + setup_lapic(); + ++ /* Set virtualization based on Kconfig option */ ++ set_vmx_and_lock(); ++ + /* Configure C States */ + configure_c_states(); + +diff --git a/src/cpu/intel/model_6fx/model_6fx_init.c b/src/cpu/intel/model_6fx/model_6fx_init.c +index d0987b4a63..17a865c9f3 100644 +--- a/src/cpu/intel/model_6fx/model_6fx_init.c ++++ b/src/cpu/intel/model_6fx/model_6fx_init.c +@@ -123,6 +123,9 @@ static void model_6fx_init(struct device *cpu) + /* Enable the local CPU APICs */ + setup_lapic(); + ++ /* Set virtualization based on Kconfig option */ ++ set_vmx_and_lock(); ++ + /* Configure C States */ + configure_c_states(); + +-- +2.25.1 + diff --git a/resources/coreboot/default/patches/0019-Fix-missing-include.patch b/resources/coreboot/default/patches/0019-Fix-missing-include.patch new file mode 100644 index 0000000..969b91a --- /dev/null +++ b/resources/coreboot/default/patches/0019-Fix-missing-include.patch @@ -0,0 +1,24 @@ +From e91840f8c19fde6706937a1e9285ac83fceec59a Mon Sep 17 00:00:00 2001 +From: Rodrigo +Date: Mon, 23 Aug 2021 03:51:21 -0300 +Subject: [PATCH 19/19] Fix missing include + +--- + src/cpu/intel/model_1067x/model_1067x_init.c | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/src/cpu/intel/model_1067x/model_1067x_init.c b/src/cpu/intel/model_1067x/model_1067x_init.c +index ca3ce274fc..cc7a5edca9 100644 +--- a/src/cpu/intel/model_1067x/model_1067x_init.c ++++ b/src/cpu/intel/model_1067x/model_1067x_init.c +@@ -9,6 +9,7 @@ + #include + #include + #include ++#include + + #include "chip.h" + +-- +2.25.1 +