List of changes: 1. Add required SoC programming till ramstage 2. Include only required headers into include/soc 3. Add CPU, PCH and SA EDS document number and chapter number 4. Fill required FSP-S UPD to call FSP-S API Change-Id: I3394f585d66b14ece67cde9e45ffa1177406f35f Signed-off-by: Subrata Banik <subrata.banik@intel.com> Reviewed-on: https://review.coreboot.org/c/coreboot/+/45759 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Angel Pons <th3fanbus@gmail.com>
40 lines
1.3 KiB
C
40 lines
1.3 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
|
|
#include <device/pci_def.h>
|
|
#include <intelblocks/cse.h>
|
|
#include <intelblocks/smihandler.h>
|
|
#include <soc/soc_chip.h>
|
|
#include <soc/pci_devs.h>
|
|
#include <soc/pm.h>
|
|
|
|
/*
|
|
* Specific SOC SMI handler during ramstage finalize phase
|
|
*
|
|
* BIOS can't make CSME function disable as is due to POSTBOOT_SAI
|
|
* restriction in place from ADP chipset. Hence create SMI Handler to
|
|
* perform CSME function disabling logic during SMM mode.
|
|
*/
|
|
void smihandler_soc_at_finalize(void)
|
|
{
|
|
const struct soc_intel_alderlake_config *config;
|
|
|
|
config = config_of_soc();
|
|
|
|
if (!config->HeciEnabled && CONFIG(HECI_DISABLE_USING_SMM))
|
|
heci_disable();
|
|
}
|
|
|
|
const smi_handler_t southbridge_smi[SMI_STS_BITS] = {
|
|
[SMI_ON_SLP_EN_STS_BIT] = smihandler_southbridge_sleep,
|
|
[APM_STS_BIT] = smihandler_southbridge_apmc,
|
|
[PM1_STS_BIT] = smihandler_southbridge_pm1,
|
|
[GPE0_STS_BIT] = smihandler_southbridge_gpe0,
|
|
[GPIO_STS_BIT] = smihandler_southbridge_gpi,
|
|
[ESPI_SMI_STS_BIT] = smihandler_southbridge_espi,
|
|
[MCSMI_STS_BIT] = smihandler_southbridge_mc,
|
|
#if CONFIG(SOC_INTEL_COMMON_BLOCK_SMM_TCO_ENABLE)
|
|
[TCO_STS_BIT] = smihandler_southbridge_tco,
|
|
#endif
|
|
[PERIODIC_STS_BIT] = smihandler_southbridge_periodic,
|
|
[MONITOR_STS_BIT] = smihandler_southbridge_monitor,
|
|
};
|