summaryrefslogtreecommitdiff
path: root/src/soc
diff options
context:
space:
mode:
authorFelix Singer <felixsinger@posteo.net>2021-05-03 02:21:05 +0200
committerTim Wawrzynczak <twawrzynczak@chromium.org>2021-08-12 21:41:31 +0000
commit85ebab85419d737a77c9ba0544b8bd35359e541b (patch)
treef871702dcddc7730930bc6f31b38f7aeebf64ca0 /src/soc
parentc6d7166942728fd79ccea09a30faddf137916dc3 (diff)
soc/intel/cannonlake: Clean up FSP chipset lockdown configuration
Use a variable to store if the FSP should be responsible for the chipset lockdown and use it for setting related configuration options. Thus, get rid of that if-else-clause and adjust comments. Change-Id: I202c212ec8e9ac63f5512c2e74040c23e1562b9a Signed-off-by: Felix Singer <felixsinger@posteo.net> Reviewed-on: https://review.coreboot.org/c/coreboot/+/52842 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Angel Pons <th3fanbus@gmail.com> Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
Diffstat (limited to 'src/soc')
-rw-r--r--src/soc/intel/cannonlake/fsp_params.c39
1 files changed, 12 insertions, 27 deletions
diff --git a/src/soc/intel/cannonlake/fsp_params.c b/src/soc/intel/cannonlake/fsp_params.c
index 4a88458b70..2c82c38ca4 100644
--- a/src/soc/intel/cannonlake/fsp_params.c
+++ b/src/soc/intel/cannonlake/fsp_params.c
@@ -642,35 +642,20 @@ void platform_fsp_silicon_init_params_cb(FSPS_UPD *supd)
#endif
/* Chipset Lockdown */
- if (get_lockdown_config() == CHIPSET_LOCKDOWN_COREBOOT) {
- tconfig->PchLockDownGlobalSmi = 0;
- tconfig->PchLockDownBiosInterface = 0;
- params->PchLockDownBiosLock = 0;
- params->PchLockDownRtcMemoryLock = 0;
+ const bool lockdown_by_fsp = get_lockdown_config() == CHIPSET_LOCKDOWN_FSP;
+ tconfig->PchLockDownGlobalSmi = lockdown_by_fsp;
+ tconfig->PchLockDownBiosInterface = lockdown_by_fsp;
+ params->PchLockDownBiosLock = lockdown_by_fsp;
+ params->PchLockDownRtcMemoryLock = lockdown_by_fsp;
#if CONFIG(SOC_INTEL_COMETLAKE)
- /*
- * Skip SPI Flash Lockdown from inside FSP.
- * Making this config "0" means FSP won't set the FLOCKDN bit
- * of SPIBAR + 0x04 (i.e., Bit 15 of BIOS_HSFSTS_CTL).
- * So, it becomes coreboot's responsibility to set this bit
- * before end of POST for security concerns.
- */
- params->SpiFlashCfgLockDown = 0;
-#endif
- } else {
- tconfig->PchLockDownGlobalSmi = 1;
- tconfig->PchLockDownBiosInterface = 1;
- params->PchLockDownBiosLock = 1;
- params->PchLockDownRtcMemoryLock = 1;
-#if CONFIG(SOC_INTEL_COMETLAKE)
- /*
- * Enable SPI Flash Lockdown from inside FSP.
- * Making this config "1" means FSP will set the FLOCKDN bit
- * of SPIBAR + 0x04 (i.e., Bit 15 of BIOS_HSFSTS_CTL).
- */
- params->SpiFlashCfgLockDown = 1;
+ /*
+ * Making this config "0" means FSP won't set the FLOCKDN bit
+ * of SPIBAR + 0x04 (i.e., Bit 15 of BIOS_HSFSTS_CTL).
+ * So, it becomes coreboot's responsibility to set this bit
+ * before end of POST for security concerns.
+ */
+ params->SpiFlashCfgLockDown = lockdown_by_fsp;
#endif
- }
#if !CONFIG(SOC_INTEL_COMETLAKE)
params->VrPowerDeliveryDesign = config->VrPowerDeliveryDesign;