8d01902bb7
Add the necessary infrastructure to support eSPI SMI events, and a mainboard handler to pass control to the EC. BUG=chrome-os-partner:58666 TEST=tested on eve board with eSPI enabled, verified that lid close event from the EC during firmware will result in an SMI and shut down the system. Change-Id: I6367e233e070a8fca053a7bdd2534c0578d15d12 Signed-off-by: Duncan Laurie <dlaurie@chromium.org> Reviewed-on: https://review.coreboot.org/17134 Tested-by: build bot (Jenkins) Reviewed-by: Furquan Shaikh <furquan@google.com>
122 lines
3 KiB
C
122 lines
3 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright (C) 2008-2009 coresystems GmbH
|
|
* Copyright (C) 2014 Google Inc.
|
|
* Copyright (C) 2015 Intel Corporation.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
|
|
#include <device/device.h>
|
|
#include <device/pci.h>
|
|
#include <console/console.h>
|
|
#include <arch/io.h>
|
|
#include <cpu/cpu.h>
|
|
#include <cpu/x86/cache.h>
|
|
#include <cpu/x86/smm.h>
|
|
#include <string.h>
|
|
#include <soc/iomap.h>
|
|
#include <soc/pch.h>
|
|
#include <soc/pm.h>
|
|
#include <soc/smm.h>
|
|
|
|
void southbridge_smm_clear_state(void)
|
|
{
|
|
u32 smi_en;
|
|
|
|
printk(BIOS_DEBUG, "Initializing Southbridge SMI...");
|
|
printk(BIOS_SPEW, " ... pmbase = 0x%04x\n", ACPI_BASE_ADDRESS);
|
|
|
|
smi_en = inl(ACPI_BASE_ADDRESS + SMI_EN);
|
|
if (smi_en & APMC_EN) {
|
|
printk(BIOS_INFO, "SMI# handler already enabled?\n");
|
|
return;
|
|
}
|
|
|
|
printk(BIOS_DEBUG, "\n");
|
|
|
|
/* Dump and clear status registers */
|
|
clear_smi_status();
|
|
clear_pm1_status();
|
|
clear_tco_status();
|
|
clear_gpe_status();
|
|
}
|
|
|
|
void southbridge_smm_enable_smi(void)
|
|
{
|
|
printk(BIOS_DEBUG, "Enabling SMIs.\n");
|
|
/* Configure events */
|
|
enable_pm1(PWRBTN_EN | GBL_EN);
|
|
disable_gpe(PME_B0_EN);
|
|
|
|
/*
|
|
* Enable SMI generation:
|
|
* - on APMC writes (io 0xb2)
|
|
* - on writes to SLP_EN (sleep states)
|
|
* - on writes to GBL_RLS (bios commands)
|
|
* - on eSPI events (does nothing on LPC systems)
|
|
* No SMIs:
|
|
* - on microcontroller writes (io 0x62/0x66)
|
|
* - on TCO events
|
|
*/
|
|
enable_smi(APMC_EN | SLP_SMI_EN | GBL_SMI_EN | ESPI_SMI_EN | EOS);
|
|
}
|
|
|
|
void southbridge_trigger_smi(void)
|
|
{
|
|
/*
|
|
* There are several methods of raising a controlled SMI# via
|
|
* software, among them:
|
|
* - Writes to io 0xb2 (APMC)
|
|
* - Writes to the Local Apic ICR with Delivery mode SMI.
|
|
*
|
|
* Using the local apic is a bit more tricky. According to
|
|
* AMD Family 11 Processor BKDG no destination shorthand must be
|
|
* used.
|
|
* The whole SMM initialization is quite a bit hardware specific, so
|
|
* I'm not too worried about the better of the methods at the moment
|
|
*/
|
|
|
|
/* raise an SMI interrupt */
|
|
printk(BIOS_SPEW, " ... raise SMI#\n");
|
|
outb(0x00, 0xb2);
|
|
}
|
|
|
|
void southbridge_clear_smi_status(void)
|
|
{
|
|
/* Clear SMI status */
|
|
clear_smi_status();
|
|
|
|
/* Clear PM1 status */
|
|
clear_pm1_status();
|
|
|
|
/* Set EOS bit so other SMIs can occur. */
|
|
enable_smi(EOS);
|
|
}
|
|
|
|
void smm_setup_structures(void *gnvs, void *tcg, void *smi1)
|
|
{
|
|
/*
|
|
* Issue SMI to set the gnvs pointer in SMM.
|
|
* tcg and smi1 are unused.
|
|
*
|
|
* EAX = APM_CNT_GNVS_UPDATE
|
|
* EBX = gnvs pointer
|
|
* EDX = APM_CNT
|
|
*/
|
|
asm volatile (
|
|
"outb %%al, %%dx\n\t"
|
|
: /* ignore result */
|
|
: "a" (APM_CNT_GNVS_UPDATE),
|
|
"b" ((u32)gnvs),
|
|
"d" (APM_CNT)
|
|
);
|
|
}
|