soc/intel/cannonlake: Add provision to make CSME function disable in SMM mode
TEST=lspci from Chrome OS shows CSME device is not visible over PCI tree. Change-Id: I3e0a5b00758a4ce42f2f190748c293c5ce07390c Signed-off-by: Subrata Banik <subrata.banik@intel.com> Reviewed-on: https://review.coreboot.org/23824 Reviewed-by: Furquan Shaikh <furquan@google.com> Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
This commit is contained in:
parent
f9eaede518
commit
e83d057c3e
|
@ -33,49 +33,12 @@
|
||||||
#include <soc/systemagent.h>
|
#include <soc/systemagent.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
|
|
||||||
#define PSF_BASE_ADDRESS 0x300
|
|
||||||
#define PCR_PSFX_T0_SHDW_PCIEN 0x1C
|
|
||||||
#define PCR_PSFX_T0_SHDW_PCIEN_FUNDIS (1 << 8)
|
|
||||||
|
|
||||||
#define CAMERA1_CLK 0x8000 /* Camera 1 Clock */
|
#define CAMERA1_CLK 0x8000 /* Camera 1 Clock */
|
||||||
#define CAMERA2_CLK 0x8080 /* Camera 2 Clock */
|
#define CAMERA2_CLK 0x8080 /* Camera 2 Clock */
|
||||||
#define CAM_CLK_EN (1 << 1)
|
#define CAM_CLK_EN (1 << 1)
|
||||||
#define MIPI_CLK (1 << 0)
|
#define MIPI_CLK (1 << 0)
|
||||||
#define HDPLL_CLK (0 << 0)
|
#define HDPLL_CLK (0 << 0)
|
||||||
|
|
||||||
static void pch_configure_endpoints(device_t dev, int epmask_id, uint32_t mask)
|
|
||||||
{
|
|
||||||
uint32_t reg32;
|
|
||||||
|
|
||||||
reg32 = pci_read_config32(dev, PCH_P2SB_EPMASK(epmask_id));
|
|
||||||
pci_write_config32(dev, PCH_P2SB_EPMASK(epmask_id), reg32 | mask);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void disable_sideband_access(void)
|
|
||||||
{
|
|
||||||
device_t dev;
|
|
||||||
u8 reg8;
|
|
||||||
uint32_t mask;
|
|
||||||
|
|
||||||
dev = PCH_DEV_P2SB;
|
|
||||||
|
|
||||||
/* Remove the host accessing right to PSF register range. */
|
|
||||||
/* Set p2sb PCI offset EPMASK5 [29, 28, 27, 26] to [1, 1, 1, 1] */
|
|
||||||
mask = (1 << 29) | (1 << 28) | (1 << 27) | (1 << 26);
|
|
||||||
pch_configure_endpoints(dev, 5, mask);
|
|
||||||
|
|
||||||
/* Set the "Endpoint Mask Lock!", P2SB PCI offset E2h bit[1] to 1. */
|
|
||||||
reg8 = pci_read_config8(dev, PCH_P2SB_E0 + 2);
|
|
||||||
pci_write_config8(dev, PCH_P2SB_E0 + 2, reg8 | (1 << 1));
|
|
||||||
}
|
|
||||||
|
|
||||||
static void pch_disable_heci(void)
|
|
||||||
{
|
|
||||||
pcr_or32(PID_PSF1, PSF_BASE_ADDRESS + PCR_PSFX_T0_SHDW_PCIEN,
|
|
||||||
PCR_PSFX_T0_SHDW_PCIEN_FUNDIS);
|
|
||||||
disable_sideband_access();
|
|
||||||
}
|
|
||||||
|
|
||||||
static void pch_enable_isclk(void)
|
static void pch_enable_isclk(void)
|
||||||
{
|
{
|
||||||
pcr_or32(PID_ISCLK, CAMERA1_CLK, CAM_CLK_EN | MIPI_CLK);
|
pcr_or32(PID_ISCLK, CAMERA1_CLK, CAM_CLK_EN | MIPI_CLK);
|
||||||
|
@ -84,25 +47,8 @@ static void pch_enable_isclk(void)
|
||||||
|
|
||||||
static void pch_handle_sideband(config_t *config)
|
static void pch_handle_sideband(config_t *config)
|
||||||
{
|
{
|
||||||
device_t dev = PCH_DEV_P2SB;
|
|
||||||
|
|
||||||
if (!dev)
|
|
||||||
return;
|
|
||||||
|
|
||||||
if (config->HeciEnabled && !config->pch_isclk)
|
|
||||||
return;
|
|
||||||
|
|
||||||
/* unhide p2sb device */
|
|
||||||
pci_write_config8(dev, PCH_P2SB_E0 + 1, 0);
|
|
||||||
|
|
||||||
if (config->HeciEnabled == 0)
|
|
||||||
pch_disable_heci();
|
|
||||||
|
|
||||||
if (config->pch_isclk)
|
if (config->pch_isclk)
|
||||||
pch_enable_isclk();
|
pch_enable_isclk();
|
||||||
|
|
||||||
/* hide p2sb device */
|
|
||||||
pci_write_config8(dev, PCH_P2SB_E0 + 1, 1);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static void pch_finalize(void)
|
static void pch_finalize(void)
|
||||||
|
|
|
@ -25,6 +25,7 @@
|
||||||
#define PID_GPIOCOM0 0x6e
|
#define PID_GPIOCOM0 0x6e
|
||||||
#define PID_DMI 0x88
|
#define PID_DMI 0x88
|
||||||
#define PID_PSTH 0x89
|
#define PID_PSTH 0x89
|
||||||
|
#define PID_CSME0 0x90
|
||||||
#define PID_ISCLK 0xad
|
#define PID_ISCLK 0xad
|
||||||
#define PID_PSF1 0xba
|
#define PID_PSF1 0xba
|
||||||
#define PID_PSF2 0xbb
|
#define PID_PSF2 0xbb
|
||||||
|
|
|
@ -15,16 +15,105 @@
|
||||||
* GNU General Public License for more details.
|
* GNU General Public License for more details.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
#include <chip.h>
|
||||||
#include <console/console.h>
|
#include <console/console.h>
|
||||||
|
#include <device/pci_def.h>
|
||||||
#include <intelblocks/fast_spi.h>
|
#include <intelblocks/fast_spi.h>
|
||||||
|
#include <intelblocks/pcr.h>
|
||||||
#include <intelblocks/smihandler.h>
|
#include <intelblocks/smihandler.h>
|
||||||
|
#include <soc/p2sb.h>
|
||||||
|
#include <soc/pci_devs.h>
|
||||||
|
#include <soc/pcr_ids.h>
|
||||||
#include <soc/pm.h>
|
#include <soc/pm.h>
|
||||||
|
|
||||||
|
#define CSME0_FBE 0xf
|
||||||
|
#define CSME0_BAR 0x0
|
||||||
|
#define CSME0_FID 0xb0
|
||||||
|
|
||||||
const struct smm_save_state_ops *get_smm_save_state_ops(void)
|
const struct smm_save_state_ops *get_smm_save_state_ops(void)
|
||||||
{
|
{
|
||||||
return &em64t101_smm_ops;
|
return &em64t101_smm_ops;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void pch_configure_endpoints(device_t dev, int epmask_id, uint32_t mask)
|
||||||
|
{
|
||||||
|
uint32_t reg32;
|
||||||
|
|
||||||
|
reg32 = pci_read_config32(dev, PCH_P2SB_EPMASK(epmask_id));
|
||||||
|
pci_write_config32(dev, PCH_P2SB_EPMASK(epmask_id), reg32 | mask);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void disable_sideband_access(device_t dev)
|
||||||
|
{
|
||||||
|
u8 reg8;
|
||||||
|
uint32_t mask;
|
||||||
|
|
||||||
|
/* Remove the host accessing right to PSF register range. */
|
||||||
|
/* Set p2sb PCI offset EPMASK5 [29, 28, 27, 26] to [1, 1, 1, 1] */
|
||||||
|
mask = (1 << 29) | (1 << 28) | (1 << 27) | (1 << 26);
|
||||||
|
pch_configure_endpoints(dev, 5, mask);
|
||||||
|
|
||||||
|
/* Set the "Endpoint Mask Lock!", P2SB PCI offset E2h bit[1] to 1. */
|
||||||
|
reg8 = pci_read_config8(dev, PCH_P2SB_E0 + 2);
|
||||||
|
pci_write_config8(dev, PCH_P2SB_E0 + 2, reg8 | (1 << 1));
|
||||||
|
}
|
||||||
|
|
||||||
|
static void pch_disable_heci(void)
|
||||||
|
{
|
||||||
|
device_t dev = PCH_DEV_P2SB;
|
||||||
|
struct pcr_sbi_msg msg = {
|
||||||
|
.pid = PID_CSME0,
|
||||||
|
.offset = 0,
|
||||||
|
.opcode = PCR_WRITE,
|
||||||
|
.is_posted = false,
|
||||||
|
.fast_byte_enable = CSME0_FBE,
|
||||||
|
.bar = CSME0_BAR,
|
||||||
|
.fid = CSME0_FID
|
||||||
|
};
|
||||||
|
/* Bit 0: Set to make HECI#1 Function disable */
|
||||||
|
uint32_t data32 = 1;
|
||||||
|
uint8_t response;
|
||||||
|
int status;
|
||||||
|
|
||||||
|
/* unhide p2sb device */
|
||||||
|
pci_write_config8(dev, PCH_P2SB_E0 + 1, 0);
|
||||||
|
|
||||||
|
/* Send SBI command to make HECI#1 function disable */
|
||||||
|
status = pcr_execute_sideband_msg(&msg, &data32, &response);
|
||||||
|
if (status && response)
|
||||||
|
printk(BIOS_ERR, "Fail to make CSME function disable\n");
|
||||||
|
|
||||||
|
/* Ensure to Lock SBI interface after this command */
|
||||||
|
disable_sideband_access(dev);
|
||||||
|
|
||||||
|
/* hide p2sb device */
|
||||||
|
pci_write_config8(dev, PCH_P2SB_E0 + 1, 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Specific SOC SMI handler during ramstage finalize phase
|
||||||
|
*
|
||||||
|
* BIOS can't make CSME function disable as is due to POSTBOOT_SAI
|
||||||
|
* restriction in place from CNP chipset. Hence create SMI Handler to
|
||||||
|
* perform CSME function disabling logic during SMM mode.
|
||||||
|
*/
|
||||||
|
void smihandler_soc_at_finalize(void)
|
||||||
|
{
|
||||||
|
const struct soc_intel_cannonlake_config *config;
|
||||||
|
const struct device *dev = dev_find_slot(0, PCH_DEVFN_CSE);
|
||||||
|
|
||||||
|
if (!dev || !dev->chip_info) {
|
||||||
|
printk(BIOS_ERR, "%s: Could not find SoC devicetree config!\n",
|
||||||
|
__func__);
|
||||||
|
return ;
|
||||||
|
}
|
||||||
|
|
||||||
|
config = dev->chip_info;
|
||||||
|
|
||||||
|
if (config->HeciEnabled == 0)
|
||||||
|
pch_disable_heci();
|
||||||
|
}
|
||||||
|
|
||||||
void smihandler_soc_check_illegal_access(uint32_t tco_sts)
|
void smihandler_soc_check_illegal_access(uint32_t tco_sts)
|
||||||
{
|
{
|
||||||
if (!((tco_sts & (1 << 8)) && IS_ENABLED(CONFIG_SPI_FLASH_SMM)
|
if (!((tco_sts & (1 << 8)) && IS_ENABLED(CONFIG_SPI_FLASH_SMM)
|
||||||
|
|
Loading…
Reference in New Issue