sb/intel/i82801{g,j}x: Remove unused smi.c files
Now that all targets featuring these southbridges use SMM_TSEG these files are unused. Change-Id: Ic3a1d790f3595e98a8d33e6e8274cb72ad356a89 Signed-off-by: Arthur Heymans <arthur@aheymans.xyz> Reviewed-on: https://review.coreboot.org/c/30018 Reviewed-by: Nico Huber <nico.h@gmx.de> Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
This commit is contained in:
parent
97ca02cb17
commit
6880a7a18b
|
@ -1,185 +0,0 @@
|
|||
/*
|
||||
* This file is part of the coreboot project.
|
||||
*
|
||||
* Copyright (C) 2008-2009 coresystems GmbH
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License as
|
||||
* published by the Free Software Foundation; version 2 of
|
||||
* the License.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*/
|
||||
|
||||
|
||||
#include <device/device.h>
|
||||
#include <device/pci.h>
|
||||
#include <console/console.h>
|
||||
#include <arch/io.h>
|
||||
#include <arch/acpi.h>
|
||||
#include <cpu/x86/cache.h>
|
||||
#include <cpu/x86/smm.h>
|
||||
#include <string.h>
|
||||
#include <southbridge/intel/common/pmutil.h>
|
||||
#include "i82801gx.h"
|
||||
|
||||
/* I945 */
|
||||
#define SMRAM 0x9d
|
||||
#define D_OPEN (1 << 6)
|
||||
#define D_CLS (1 << 5)
|
||||
#define D_LCK (1 << 4)
|
||||
#define G_SMRAME (1 << 3)
|
||||
#define C_BASE_SEG ((0 << 2) | (1 << 1) | (0 << 0))
|
||||
|
||||
/* While we read PMBASE dynamically in case it changed, let's
|
||||
* initialize it with a sane value
|
||||
*/
|
||||
static u16 pmbase = DEFAULT_PMBASE;
|
||||
|
||||
extern uint8_t smm_relocation_start, smm_relocation_end;
|
||||
static void *default_smm_area = NULL;
|
||||
|
||||
static void smm_relocate(void)
|
||||
{
|
||||
u32 smi_en;
|
||||
u16 pm1_en;
|
||||
|
||||
printk(BIOS_DEBUG, "Initializing SMM handler...");
|
||||
|
||||
pmbase = pci_read_config16(dev_find_slot(0, PCI_DEVFN(0x1f, 0)), 0x40) & 0xfffc;
|
||||
printk(BIOS_SPEW, " ... pmbase = 0x%04x\n", pmbase);
|
||||
|
||||
smi_en = inl(pmbase + SMI_EN);
|
||||
if (smi_en & APMC_EN) {
|
||||
printk(BIOS_INFO, "SMI# handler already enabled?\n");
|
||||
return;
|
||||
}
|
||||
|
||||
default_smm_area = backup_default_smm_area();
|
||||
|
||||
/* copy the SMM relocation code */
|
||||
memcpy((void *)0x38000, &smm_relocation_start,
|
||||
&smm_relocation_end - &smm_relocation_start);
|
||||
wbinvd();
|
||||
|
||||
printk(BIOS_DEBUG, "\n");
|
||||
dump_smi_status(reset_smi_status());
|
||||
dump_pm1_status(reset_pm1_status());
|
||||
dump_gpe0_status(reset_gpe0_status());
|
||||
dump_alt_gp_smi_status(reset_alt_gp_smi_status());
|
||||
dump_tco_status(reset_tco_status());
|
||||
|
||||
/* Enable SMI generation:
|
||||
* - on TCO events
|
||||
* - on APMC writes (io 0xb2)
|
||||
* - on writes to SLP_EN (sleep states)
|
||||
* - on writes to GBL_RLS (bios commands)
|
||||
* No SMIs:
|
||||
* - on microcontroller writes (io 0x62/0x66)
|
||||
*/
|
||||
|
||||
smi_en = 0; /* reset SMI enables */
|
||||
|
||||
#if 0
|
||||
smi_en |= LEGACY_USB2_EN | LEGACY_USB_EN;
|
||||
#endif
|
||||
smi_en |= TCO_EN;
|
||||
smi_en |= APMC_EN;
|
||||
#if DEBUG_PERIODIC_SMIS
|
||||
/* Set DEBUG_PERIODIC_SMIS in i82801gx.h to debug using
|
||||
* periodic SMIs.
|
||||
*/
|
||||
smi_en |= PERIODIC_EN;
|
||||
#endif
|
||||
smi_en |= SLP_SMI_EN;
|
||||
smi_en |= BIOS_EN;
|
||||
|
||||
/* The following need to be on for SMIs to happen */
|
||||
smi_en |= EOS | GBL_SMI_EN;
|
||||
|
||||
outl(smi_en, pmbase + SMI_EN);
|
||||
|
||||
pm1_en = 0;
|
||||
pm1_en |= PWRBTN_EN;
|
||||
pm1_en |= GBL_EN;
|
||||
outw(pm1_en, pmbase + PM1_EN);
|
||||
|
||||
/**
|
||||
* There are several methods of raising a controlled SMI# via
|
||||
* software, among them:
|
||||
* - Writes to io 0xb2 (APMC)
|
||||
* - Writes to the Local Apic ICR with Delivery mode SMI.
|
||||
*
|
||||
* Using the local apic is a bit more tricky. According to
|
||||
* AMD Family 11 Processor BKDG no destination shorthand must be
|
||||
* used.
|
||||
* The whole SMM initialization is quite a bit hardware specific, so
|
||||
* I'm not too worried about the better of the methods at the moment
|
||||
*/
|
||||
|
||||
/* raise an SMI interrupt */
|
||||
printk(BIOS_SPEW, " ... raise SMI#\n");
|
||||
outb(0x00, 0xb2);
|
||||
}
|
||||
|
||||
static int smm_handler_copied = 0;
|
||||
|
||||
static void smm_install(void)
|
||||
{
|
||||
/* The first CPU running this gets to copy the SMM handler. But not all
|
||||
* of them.
|
||||
*/
|
||||
if (smm_handler_copied)
|
||||
return;
|
||||
smm_handler_copied = 1;
|
||||
|
||||
|
||||
/* if we're resuming from S3, the SMM code is already in place,
|
||||
* so don't copy it again to keep the current SMM state */
|
||||
|
||||
if (!acpi_is_wakeup_s3()) {
|
||||
/* enable the SMM memory window */
|
||||
pci_write_config8(dev_find_slot(0, PCI_DEVFN(0, 0)), SMRAM,
|
||||
D_OPEN | G_SMRAME | C_BASE_SEG);
|
||||
|
||||
/* copy the real SMM handler */
|
||||
memcpy((void *)0xa0000, _binary_smm_start,
|
||||
_binary_smm_end - _binary_smm_start);
|
||||
wbinvd();
|
||||
}
|
||||
|
||||
/* close the SMM memory window and enable normal SMM */
|
||||
pci_write_config8(dev_find_slot(0, PCI_DEVFN(0, 0)), SMRAM,
|
||||
G_SMRAME | C_BASE_SEG);
|
||||
}
|
||||
|
||||
void smm_init(void)
|
||||
{
|
||||
/* Put SMM code to 0xa0000 */
|
||||
smm_install();
|
||||
|
||||
/* Put relocation code to 0x38000 and relocate SMBASE */
|
||||
smm_relocate();
|
||||
|
||||
/* We're done. Make sure SMIs can happen! */
|
||||
smi_set_eos();
|
||||
}
|
||||
|
||||
void smm_init_completion(void)
|
||||
{
|
||||
restore_default_smm_area(default_smm_area);
|
||||
}
|
||||
|
||||
void smm_lock(void)
|
||||
{
|
||||
/* LOCK the SMM memory window and enable normal SMM.
|
||||
* After running this function, only a full reset can
|
||||
* make the SMM registers writable again.
|
||||
*/
|
||||
printk(BIOS_DEBUG, "Locking SMM.\n");
|
||||
pci_write_config8(dev_find_slot(0, PCI_DEVFN(0, 0)), SMRAM,
|
||||
D_LCK | G_SMRAME | C_BASE_SEG);
|
||||
}
|
|
@ -1,181 +0,0 @@
|
|||
/*
|
||||
* This file is part of the coreboot project.
|
||||
*
|
||||
* Copyright (C) 2008-2009 coresystems GmbH
|
||||
* 2012 secunet Security Networks AG
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or
|
||||
* modify it under the terms of the GNU General Public License as
|
||||
* published by the Free Software Foundation; version 2 of
|
||||
* the License.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*/
|
||||
|
||||
|
||||
#include <device/device.h>
|
||||
#include <device/pci.h>
|
||||
#include <console/console.h>
|
||||
#include <arch/io.h>
|
||||
#include <arch/acpi.h>
|
||||
#include <cpu/x86/cache.h>
|
||||
#include <cpu/x86/smm.h>
|
||||
#include <string.h>
|
||||
#include <southbridge/intel/common/pmutil.h>
|
||||
#include "i82801jx.h"
|
||||
|
||||
/* I945/GM45 */
|
||||
#define SMRAM 0x9d
|
||||
#define D_OPEN (1 << 6)
|
||||
#define D_CLS (1 << 5)
|
||||
#define D_LCK (1 << 4)
|
||||
#define G_SMRAME (1 << 3)
|
||||
#define C_BASE_SEG ((0 << 2) | (1 << 1) | (0 << 0))
|
||||
|
||||
/* While we read PMBASE dynamically in case it changed, let's
|
||||
* initialize it with a sane value
|
||||
*/
|
||||
static u16 pmbase = DEFAULT_PMBASE;
|
||||
|
||||
extern uint8_t smm_relocation_start, smm_relocation_end;
|
||||
static void *default_smm_area = NULL;
|
||||
|
||||
static void smm_relocate(void)
|
||||
{
|
||||
u32 smi_en;
|
||||
u16 pm1_en;
|
||||
|
||||
printk(BIOS_DEBUG, "Initializing SMM handler...");
|
||||
|
||||
pmbase = pci_read_config16(dev_find_slot(0, PCI_DEVFN(0x1f, 0)), D31F0_PMBASE) & 0xfffc;
|
||||
printk(BIOS_SPEW, " ... pmbase = 0x%04x\n", pmbase);
|
||||
|
||||
smi_en = inl(pmbase + SMI_EN);
|
||||
if (smi_en & GBL_SMI_EN) {
|
||||
printk(BIOS_INFO, "SMI# handler already enabled?\n");
|
||||
return;
|
||||
}
|
||||
|
||||
default_smm_area = backup_default_smm_area();
|
||||
|
||||
/* copy the SMM relocation code */
|
||||
memcpy((void *)0x38000, &smm_relocation_start,
|
||||
&smm_relocation_end - &smm_relocation_start);
|
||||
wbinvd();
|
||||
|
||||
printk(BIOS_DEBUG, "\n");
|
||||
dump_smi_status(reset_smi_status());
|
||||
dump_pm1_status(reset_pm1_status());
|
||||
dump_gpe0_status(reset_gpe0_status());
|
||||
dump_alt_gp_smi_status(reset_alt_gp_smi_status());
|
||||
dump_tco_status(reset_tco_status());
|
||||
|
||||
/* Enable SMI generation:
|
||||
* - on TCO events
|
||||
* - on APMC writes (io 0xb2)
|
||||
* - on writes to GBL_RLS (bios commands)
|
||||
* No SMIs:
|
||||
* - on microcontroller writes (io 0x62/0x66)
|
||||
*/
|
||||
|
||||
smi_en = 0; /* reset SMI enables */
|
||||
|
||||
smi_en |= TCO_EN;
|
||||
smi_en |= APMC_EN;
|
||||
#if DEBUG_PERIODIC_SMIS
|
||||
/* Set DEBUG_PERIODIC_SMIS in i82801jx.h to debug using
|
||||
* periodic SMIs.
|
||||
*/
|
||||
smi_en |= PERIODIC_EN;
|
||||
#endif
|
||||
smi_en |= BIOS_EN;
|
||||
|
||||
/* The following need to be on for SMIs to happen */
|
||||
smi_en |= EOS | GBL_SMI_EN;
|
||||
|
||||
outl(smi_en, pmbase + SMI_EN);
|
||||
|
||||
pm1_en = 0;
|
||||
pm1_en |= PWRBTN_EN;
|
||||
pm1_en |= GBL_EN;
|
||||
outw(pm1_en, pmbase + PM1_EN);
|
||||
|
||||
/**
|
||||
* There are several methods of raising a controlled SMI# via
|
||||
* software, among them:
|
||||
* - Writes to io 0xb2 (APMC)
|
||||
* - Writes to the Local Apic ICR with Delivery mode SMI.
|
||||
*
|
||||
* Using the local apic is a bit more tricky. According to
|
||||
* AMD Family 11 Processor BKDG no destination shorthand must be
|
||||
* used.
|
||||
* The whole SMM initialization is quite a bit hardware specific, so
|
||||
* I'm not too worried about the better of the methods at the moment
|
||||
*/
|
||||
|
||||
/* raise an SMI interrupt */
|
||||
printk(BIOS_SPEW, " ... raise SMI#\n");
|
||||
outb(0x00, 0xb2);
|
||||
}
|
||||
|
||||
static int smm_handler_copied = 0;
|
||||
|
||||
static void smm_install(void)
|
||||
{
|
||||
/* The first CPU running this gets to copy the SMM handler. But not all
|
||||
* of them.
|
||||
*/
|
||||
if (smm_handler_copied)
|
||||
return;
|
||||
smm_handler_copied = 1;
|
||||
|
||||
|
||||
/* if we're resuming from S3, the SMM code is already in place,
|
||||
* so don't copy it again to keep the current SMM state */
|
||||
|
||||
if (!acpi_is_wakeup_s3()) {
|
||||
/* enable the SMM memory window */
|
||||
pci_write_config8(dev_find_slot(0, PCI_DEVFN(0, 0)), SMRAM,
|
||||
D_OPEN | G_SMRAME | C_BASE_SEG);
|
||||
|
||||
/* copy the real SMM handler */
|
||||
memcpy((void *)0xa0000, _binary_smm_start,
|
||||
_binary_smm_end - _binary_smm_start);
|
||||
wbinvd();
|
||||
}
|
||||
|
||||
/* close the SMM memory window and enable normal SMM */
|
||||
pci_write_config8(dev_find_slot(0, PCI_DEVFN(0, 0)), SMRAM,
|
||||
G_SMRAME | C_BASE_SEG);
|
||||
}
|
||||
|
||||
void smm_init(void)
|
||||
{
|
||||
/* Put SMM code to 0xa0000 */
|
||||
smm_install();
|
||||
|
||||
/* Put relocation code to 0x38000 and relocate SMBASE */
|
||||
smm_relocate();
|
||||
|
||||
/* We're done. Make sure SMIs can happen! */
|
||||
smi_set_eos();
|
||||
}
|
||||
|
||||
void smm_init_completion(void)
|
||||
{
|
||||
restore_default_smm_area(default_smm_area);
|
||||
}
|
||||
|
||||
void smm_lock(void)
|
||||
{
|
||||
/* LOCK the SMM memory window and enable normal SMM.
|
||||
* After running this function, only a full reset can
|
||||
* make the SMM registers writable again.
|
||||
*/
|
||||
printk(BIOS_DEBUG, "Locking SMM.\n");
|
||||
pci_write_config8(dev_find_slot(0, PCI_DEVFN(0, 0)), SMRAM,
|
||||
D_LCK | G_SMRAME | C_BASE_SEG);
|
||||
}
|
Loading…
Reference in New Issue