soc/intel/jasperlake: Lock PAM registers in finalize
Use the support from the previous patch to have coreboot lock the PAM registers instead of the FSP when the lockdown configuration is set to coreboot. Change-Id: I10f859f30b260d012f0bc8755f32413d8b2cf267 Signed-off-by: Tim Wawrzynczak <twawrzynczak@chromium.org> Reviewed-on: https://review.coreboot.org/c/coreboot/+/57183 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Furquan Shaikh <furquan@google.com>
This commit is contained in:
parent
12b809bf00
commit
9ed1751676
|
@ -9,8 +9,10 @@
|
||||||
#include <intelblocks/lpc_lib.h>
|
#include <intelblocks/lpc_lib.h>
|
||||||
#include <intelblocks/pcr.h>
|
#include <intelblocks/pcr.h>
|
||||||
#include <intelblocks/pmclib.h>
|
#include <intelblocks/pmclib.h>
|
||||||
|
#include <intelblocks/systemagent.h>
|
||||||
#include <intelblocks/tco.h>
|
#include <intelblocks/tco.h>
|
||||||
#include <intelblocks/thermal.h>
|
#include <intelblocks/thermal.h>
|
||||||
|
#include <intelpch/lockdown.h>
|
||||||
#include <soc/p2sb.h>
|
#include <soc/p2sb.h>
|
||||||
#include <soc/pci_devs.h>
|
#include <soc/pci_devs.h>
|
||||||
#include <soc/pcr_ids.h>
|
#include <soc/pcr_ids.h>
|
||||||
|
@ -80,12 +82,19 @@ static void pch_finalize(void)
|
||||||
pmc_clear_pmcon_sts();
|
pmc_clear_pmcon_sts();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void sa_finalize(void)
|
||||||
|
{
|
||||||
|
if (get_lockdown_config() == CHIPSET_LOCKDOWN_COREBOOT)
|
||||||
|
sa_lock_pam();
|
||||||
|
}
|
||||||
|
|
||||||
static void soc_finalize(void *unused)
|
static void soc_finalize(void *unused)
|
||||||
{
|
{
|
||||||
printk(BIOS_DEBUG, "Finalizing chipset.\n");
|
printk(BIOS_DEBUG, "Finalizing chipset.\n");
|
||||||
|
|
||||||
pch_finalize();
|
pch_finalize();
|
||||||
apm_control(APM_CNT_FINALIZE);
|
apm_control(APM_CNT_FINALIZE);
|
||||||
|
sa_finalize();
|
||||||
|
|
||||||
/* Indicate finalize step with post code */
|
/* Indicate finalize step with post code */
|
||||||
post_code(POST_OS_BOOT);
|
post_code(POST_OS_BOOT);
|
||||||
|
|
|
@ -75,6 +75,7 @@ void platform_fsp_silicon_init_params_cb(FSPS_UPD *supd)
|
||||||
params->PchLockDownBiosInterface = lockdown_by_fsp;
|
params->PchLockDownBiosInterface = lockdown_by_fsp;
|
||||||
params->PchUnlockGpioPads = !lockdown_by_fsp;
|
params->PchUnlockGpioPads = !lockdown_by_fsp;
|
||||||
params->RtcMemoryLock = lockdown_by_fsp;
|
params->RtcMemoryLock = lockdown_by_fsp;
|
||||||
|
params->SkipPamLock = !lockdown_by_fsp;
|
||||||
|
|
||||||
/* coreboot will send EOP before loading payload */
|
/* coreboot will send EOP before loading payload */
|
||||||
params->EndOfPostMessage = EOP_DISABLE;
|
params->EndOfPostMessage = EOP_DISABLE;
|
||||||
|
|
Loading…
Reference in New Issue