blob: eb5a57642f143a670b454002fed882a456382f61 [file] [log] [blame]
Tan, Lean Sheng05dfe312020-08-25 20:40:17 -07001/* SPDX-License-Identifier: GPL-2.0-only */
2
Tan, Lean Sheng05dfe312020-08-25 20:40:17 -07003#include <device/pci_def.h>
4#include <intelblocks/cse.h>
5#include <intelblocks/smihandler.h>
6#include <soc/soc_chip.h>
7#include <soc/pci_devs.h>
8#include <soc/pm.h>
9
10/*
11 * Specific SOC SMI handler during ramstage finalize phase
12 *
13 * BIOS can't make CSME function disable as is due to POSTBOOT_SAI
14 * restriction in place from MCC chipset. Hence create SMI Handler to
15 * perform CSME function disabling logic during SMM mode.
16 */
17void smihandler_soc_at_finalize(void)
18{
Subrata Banik6fb12672022-01-03 18:49:35 +000019 if (CONFIG(DISABLE_HECI1_AT_PRE_BOOT))
Subrata Banik32e06732022-01-28 02:05:15 +053020 heci1_disable();
Tan, Lean Sheng05dfe312020-08-25 20:40:17 -070021}
22
23const smi_handler_t southbridge_smi[SMI_STS_BITS] = {
24 [SMI_ON_SLP_EN_STS_BIT] = smihandler_southbridge_sleep,
25 [APM_STS_BIT] = smihandler_southbridge_apmc,
26 [PM1_STS_BIT] = smihandler_southbridge_pm1,
27 [GPE0_STS_BIT] = smihandler_southbridge_gpe0,
28 [GPIO_STS_BIT] = smihandler_southbridge_gpi,
29 [ESPI_SMI_STS_BIT] = smihandler_southbridge_espi,
30 [MCSMI_STS_BIT] = smihandler_southbridge_mc,
31#if CONFIG(SOC_INTEL_COMMON_BLOCK_SMM_TCO_ENABLE)
32 [TCO_STS_BIT] = smihandler_southbridge_tco,
33#endif
34 [PERIODIC_STS_BIT] = smihandler_southbridge_periodic,
35 [MONITOR_STS_BIT] = smihandler_southbridge_monitor,
36};