2015-05-13 03:19:47 +02:00
|
|
|
/*
|
|
|
|
* This file is part of the coreboot project.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2008-2009 coresystems GmbH
|
|
|
|
* Copyright (C) 2014 Google Inc.
|
2017-12-14 13:48:34 +01:00
|
|
|
* Copyright (C) 2015-2017 Intel Corporation.
|
2015-05-13 03:19:47 +02:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; version 2 of the License.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <console/console.h>
|
2017-03-31 14:41:49 +02:00
|
|
|
#include <intelblocks/fast_spi.h>
|
2017-12-14 13:48:34 +01:00
|
|
|
#include <intelblocks/smihandler.h>
|
2015-05-13 03:19:47 +02:00
|
|
|
#include <soc/pm.h>
|
|
|
|
|
2017-12-14 13:48:34 +01:00
|
|
|
const struct smm_save_state_ops *get_smm_save_state_ops(void)
|
2015-05-13 03:19:47 +02:00
|
|
|
{
|
2017-12-14 13:48:34 +01:00
|
|
|
return &em64t101_smm_ops;
|
2015-05-13 03:19:47 +02:00
|
|
|
}
|
|
|
|
|
2017-12-22 09:11:35 +01:00
|
|
|
void smihandler_soc_check_illegal_access(uint32_t tco_sts)
|
2015-05-13 03:19:47 +02:00
|
|
|
{
|
2019-03-06 01:53:33 +01:00
|
|
|
if (!((tco_sts & (1 << 8)) && CONFIG(SPI_FLASH_SMM)
|
2017-12-14 13:48:34 +01:00
|
|
|
&& fast_spi_wpd_status()))
|
2015-05-13 03:19:47 +02:00
|
|
|
return;
|
|
|
|
|
2015-05-13 03:23:27 +02:00
|
|
|
/*
|
2017-12-14 13:48:34 +01:00
|
|
|
* BWE is RW, so the SMI was caused by a
|
|
|
|
* write to BWE, not by a write to the BIOS
|
|
|
|
*
|
|
|
|
* This is the place where we notice someone
|
|
|
|
* is trying to tinker with the BIOS. We are
|
|
|
|
* trying to be nice and just ignore it. A more
|
|
|
|
* resolute answer would be to power down the
|
|
|
|
* box.
|
2015-05-13 03:23:27 +02:00
|
|
|
*/
|
2017-12-14 13:48:34 +01:00
|
|
|
printk(BIOS_DEBUG, "Switching back to RO\n");
|
|
|
|
fast_spi_enable_wp();
|
2015-05-13 03:19:47 +02:00
|
|
|
}
|
|
|
|
|
2017-10-17 07:49:05 +02:00
|
|
|
/* SMI handlers that should be serviced in SCI mode too. */
|
2017-12-22 09:11:35 +01:00
|
|
|
uint32_t smihandler_soc_get_sci_mask(void)
|
2017-12-14 13:48:34 +01:00
|
|
|
{
|
|
|
|
uint32_t sci_mask =
|
|
|
|
SMI_HANDLER_SCI_EN(APM_STS_BIT) |
|
|
|
|
SMI_HANDLER_SCI_EN(SMI_ON_SLP_EN_STS_BIT);
|
|
|
|
|
|
|
|
return sci_mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
const smi_handler_t southbridge_smi[SMI_STS_BITS] = {
|
|
|
|
[SMI_ON_SLP_EN_STS_BIT] = smihandler_southbridge_sleep,
|
|
|
|
[APM_STS_BIT] = smihandler_southbridge_apmc,
|
|
|
|
[PM1_STS_BIT] = smihandler_southbridge_pm1,
|
|
|
|
[GPE0_STS_BIT] = smihandler_southbridge_gpe0,
|
|
|
|
[GPIO_STS_BIT] = smihandler_southbridge_gpi,
|
|
|
|
[ESPI_SMI_STS_BIT] = smihandler_southbridge_espi,
|
|
|
|
[MCSMI_STS_BIT] = smihandler_southbridge_mc,
|
|
|
|
[TCO_STS_BIT] = smihandler_southbridge_tco,
|
|
|
|
[PERIODIC_STS_BIT] = smihandler_southbridge_periodic,
|
|
|
|
[MONITOR_STS_BIT] = smihandler_southbridge_monitor,
|
|
|
|
};
|