parts. This should help to reduce the code duplication for Rudolf's K8/VIA SMM implementation... Signed-off-by: Stefan Reinauer <stepan@coresystems.de> Acked-by: Joseph Smith <joe@settoplinux.org> git-svn-id: svn://svn.coreboot.org/coreboot/trunk@3870 2b7e53f0-3cfb-0310-b3e9-8179ed1497e1
204 lines
4.2 KiB
C
204 lines
4.2 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright (C) 2008 coresystems GmbH
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License as
|
|
* published by the Free Software Foundation; version 2 of
|
|
* the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston,
|
|
* MA 02110-1301 USA
|
|
*/
|
|
|
|
#include <arch/io.h>
|
|
#include <arch/romcc_io.h>
|
|
#include <console/console.h>
|
|
#include <cpu/x86/cache.h>
|
|
#include <cpu/x86/smm.h>
|
|
|
|
void southbridge_smi_set_eos(void);
|
|
|
|
#define DEBUG_SMI
|
|
|
|
typedef enum { SMI_LOCKED, SMI_UNLOCKED } smi_semaphore;
|
|
|
|
/* SMI multiprocessing semaphore */
|
|
static volatile smi_semaphore smi_handler_status = SMI_UNLOCKED;
|
|
|
|
static int smi_obtain_lock(void)
|
|
{
|
|
u8 ret = SMI_LOCKED;
|
|
|
|
asm volatile (
|
|
"movb %2, %%al\n"
|
|
"xchgb %%al, %1\n"
|
|
"movb %%al, %0\n"
|
|
: "=g" (ret), "=m" (smi_handler_status)
|
|
: "g" (SMI_LOCKED)
|
|
: "eax"
|
|
);
|
|
|
|
return (ret == SMI_UNLOCKED);
|
|
}
|
|
|
|
static void smi_release_lock(void)
|
|
{
|
|
asm volatile (
|
|
"movb %1, %%al\n"
|
|
"xchgb %%al, %0\n"
|
|
: "=m" (smi_handler_status)
|
|
: "g" (SMI_UNLOCKED)
|
|
: "eax"
|
|
);
|
|
}
|
|
|
|
#define LAPIC_ID 0xfee00020
|
|
static inline __attribute__((always_inline)) unsigned long nodeid(void)
|
|
{
|
|
return (*((volatile unsigned long *)(LAPIC_ID)) >> 24);
|
|
}
|
|
|
|
/* ********************* smi_util ************************* */
|
|
|
|
/* Data */
|
|
#define UART_RBR 0x00
|
|
#define UART_TBR 0x00
|
|
|
|
/* Control */
|
|
#define UART_IER 0x01
|
|
#define UART_IIR 0x02
|
|
#define UART_FCR 0x02
|
|
#define UART_LCR 0x03
|
|
#define UART_MCR 0x04
|
|
#define UART_DLL 0x00
|
|
#define UART_DLM 0x01
|
|
|
|
/* Status */
|
|
#define UART_LSR 0x05
|
|
#define UART_MSR 0x06
|
|
#define UART_SCR 0x07
|
|
|
|
static int uart_can_tx_byte(void)
|
|
{
|
|
return inb(TTYS0_BASE + UART_LSR) & 0x20;
|
|
}
|
|
|
|
static void uart_wait_to_tx_byte(void)
|
|
{
|
|
while(!uart_can_tx_byte())
|
|
;
|
|
}
|
|
|
|
static void uart_wait_until_sent(void)
|
|
{
|
|
while(!(inb(TTYS0_BASE + UART_LSR) & 0x40))
|
|
;
|
|
}
|
|
|
|
static void uart_tx_byte(unsigned char data)
|
|
{
|
|
uart_wait_to_tx_byte();
|
|
outb(data, TTYS0_BASE + UART_TBR);
|
|
/* Make certain the data clears the fifos */
|
|
uart_wait_until_sent();
|
|
}
|
|
|
|
void console_tx_flush(void)
|
|
{
|
|
uart_wait_to_tx_byte();
|
|
}
|
|
|
|
void console_tx_byte(unsigned char byte)
|
|
{
|
|
if (byte == '\n')
|
|
uart_tx_byte('\r');
|
|
uart_tx_byte(byte);
|
|
}
|
|
|
|
/* ********************* smi_util ************************* */
|
|
|
|
|
|
void io_trap_handler(int smif)
|
|
{
|
|
southbridge_io_trap_handler(smif);
|
|
}
|
|
|
|
/**
|
|
* @brief Set the EOS bit
|
|
*/
|
|
static void smi_set_eos(void)
|
|
{
|
|
southbridge_smi_set_eos();
|
|
}
|
|
|
|
/**
|
|
* @brief Interrupt handler for SMI#
|
|
*
|
|
* @param smm_revision revision of the smm state save map
|
|
*/
|
|
|
|
void smi_handler(u32 smm_revision)
|
|
{
|
|
u8 reg8;
|
|
u16 pmctrl;
|
|
u16 pm1_sts;
|
|
u32 smi_sts, gpe0_sts, tco_sts;
|
|
unsigned int node;
|
|
smm_state_save_area_t state_save;
|
|
|
|
/* Are we ok to execute the handler? */
|
|
if (!smi_obtain_lock())
|
|
return;
|
|
|
|
node=nodeid();
|
|
|
|
#ifdef DEBUG_SMI
|
|
console_loglevel = DEFAULT_CONSOLE_LOGLEVEL;
|
|
#else
|
|
console_loglevel = 1;
|
|
#endif
|
|
|
|
printk_debug("\nSMI# #%d\n", node);
|
|
|
|
switch (smm_revision) {
|
|
case 0x00030007:
|
|
state_save.type = LEGACY;
|
|
state_save.legacy_state_save = (legacy_smm_state_save_area_t *)
|
|
(0xa8000 + 0x7e00 - (node * 0x400));
|
|
break;
|
|
case 0x00030100:
|
|
state_save.type = EM64T;
|
|
state_save.em64t_state_save = (em64t_smm_state_save_area_t *)
|
|
(0xa8000 + 0x7d00 - (node * 0x400));
|
|
break;
|
|
case 0x00030064:
|
|
state_save.type = AMD64;
|
|
state_save.amd64_state_save = (amd64_smm_state_save_area_t *)
|
|
(0xa8000 + 0x7e00 - (node * 0x400));
|
|
break;
|
|
default:
|
|
printk_debug("smm_revision: 0x%08x\n", smm_revision);
|
|
printk_debug("SMI# not supported on your CPU\n");
|
|
/* Don't release lock, so no further SMI will happen,
|
|
* if we don't handle it anyways.
|
|
*/
|
|
return;
|
|
}
|
|
|
|
southbridge_smi_handler(node, &state_save);
|
|
|
|
smi_release_lock();
|
|
|
|
/* De-assert SMI# signal to allow another SMI */
|
|
smi_set_eos();
|
|
}
|