The only option to make HECI1 function disable on Elkhart Lake SoC platform is using SBI under SMM mode. List of changes: 1. Drop `HeciEnabled` from dt and dt chip configuration. 2. Replace all logic that disables HECI1 based on the `HeciEnabled` chip config with `DISABLE_HECI1_AT_PRE_BOOT` config. Mainboards that choose to make HECI1 enable during boot don't override `heci1 disable` config. Signed-off-by: Subrata Banik <subratabanik@google.com> Change-Id: I76c625e6221fdef1343599e7dbc7739caa91bf98 Reviewed-on: https://review.coreboot.org/c/coreboot/+/60727 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Sheng Lean Tan <sheng.tan@9elements.com>
37 lines
1.2 KiB
C
37 lines
1.2 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
|
|
#include <device/pci_def.h>
|
|
#include <intelblocks/cse.h>
|
|
#include <intelblocks/smihandler.h>
|
|
#include <soc/soc_chip.h>
|
|
#include <soc/pci_devs.h>
|
|
#include <soc/pm.h>
|
|
|
|
/*
|
|
* Specific SOC SMI handler during ramstage finalize phase
|
|
*
|
|
* BIOS can't make CSME function disable as is due to POSTBOOT_SAI
|
|
* restriction in place from MCC chipset. Hence create SMI Handler to
|
|
* perform CSME function disabling logic during SMM mode.
|
|
*/
|
|
void smihandler_soc_at_finalize(void)
|
|
{
|
|
if (CONFIG(DISABLE_HECI1_AT_PRE_BOOT))
|
|
heci_disable();
|
|
}
|
|
|
|
const smi_handler_t southbridge_smi[SMI_STS_BITS] = {
|
|
[SMI_ON_SLP_EN_STS_BIT] = smihandler_southbridge_sleep,
|
|
[APM_STS_BIT] = smihandler_southbridge_apmc,
|
|
[PM1_STS_BIT] = smihandler_southbridge_pm1,
|
|
[GPE0_STS_BIT] = smihandler_southbridge_gpe0,
|
|
[GPIO_STS_BIT] = smihandler_southbridge_gpi,
|
|
[ESPI_SMI_STS_BIT] = smihandler_southbridge_espi,
|
|
[MCSMI_STS_BIT] = smihandler_southbridge_mc,
|
|
#if CONFIG(SOC_INTEL_COMMON_BLOCK_SMM_TCO_ENABLE)
|
|
[TCO_STS_BIT] = smihandler_southbridge_tco,
|
|
#endif
|
|
[PERIODIC_STS_BIT] = smihandler_southbridge_periodic,
|
|
[MONITOR_STS_BIT] = smihandler_southbridge_monitor,
|
|
};
|