32e0673232
This patch provides the possible options for SoC users to choose the applicable interface to make HECI1 function disable at pre-boot. `SOC_INTEL_COMMON_BLOCK_HECI_DISABLE_USING_SBI` config is used for disabling heci1 using non-posted sideband write (inside SMM) after FSP-S sets the postboot_sai attribute. Applicable from CNL PCH onwards. `SOC_INTEL_COMMON_BLOCK_HECI_DISABLE_USING_PMC_IPC` config is used for disabling heci1 using PMC IPC command `0xA9`. Applicable from TGL PCH onwards. `SOC_INTEL_COMMON_BLOCK_HECI_DISABLE_USING_PCR` config is used for disabling heci1 using private configuration register (PCR) write. Applicable for SoC platform prior to CNL PCH. Additionally, add PID_CSME0 macro for SKL, Xeon_SP and APL to fix the compilation failure. Finally, rename heci_disable() function to heci1_disable() to make it more meaningful. BUG=none TEST=Able to build and boot brya. Signed-off-by: Subrata Banik <subratabanik@google.com> Change-Id: I7e0bab0004013b999ec1e054310763427d7b9348 Reviewed-on: https://review.coreboot.org/c/coreboot/+/61431 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Werner Zeh <werner.zeh@siemens.com> Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com> |
||
---|---|---|
.. | ||
acpi | ||
bootblock | ||
include/soc | ||
nhlt | ||
romstage | ||
acpi.c | ||
chip.c | ||
chip.h | ||
chipset.cb | ||
cpu.c | ||
elog.c | ||
fadt.c | ||
finalize.c | ||
gpio.c | ||
graphics.c | ||
gspi.c | ||
i2c.c | ||
irq.c | ||
Kconfig | ||
lockdown.c | ||
lpc.c | ||
Makefile.inc | ||
me.c | ||
p2sb.c | ||
pmc.c | ||
pmutil.c | ||
reset.c | ||
sd.c | ||
smihandler.c | ||
spi.c | ||
systemagent.c | ||
uart.c | ||
vr_config.c | ||
xhci.c |