summaryrefslogtreecommitdiff
path: root/src/drivers/secunet
diff options
context:
space:
mode:
authorRocky Phagura <rphagura@fb.com>2020-06-11 11:18:02 -0700
committerPatrick Georgi <pgeorgi@google.com>2020-09-21 08:06:23 +0000
commitcced3469c54a778cfe3b1675a7f6c45beab9ab91 (patch)
tree432ac1a95ad3fe279de8e351c111dece481081d8 /src/drivers/secunet
parentbb25c59e90110f601291a281a5df8a70714399dc (diff)
soc/intel/xeon_sp: Enable PMC support
PMC support was not enabled on Xeon_sp platforms. This involves turning on SOC_INTEL_COMMON_BLOCK_PMC and then adding the proper hooks in SOC specific code. This patch leverages code from the Skylake project and adds the bare minimum hooks to leverage PMC common code. Most importantly this enables power management registers located in the PMC device (under ACPI_BASE_ADDRESS). Access to this device is also needed for SMM setup and handling. TEST=build for Tiogapass and enable the following Kconfig options: select SOC_INTEL_COMMON_BLOCK_PMC select ACPI_INTEL_HARDWARE_SLEEP_VALUES select CPU_INTEL_COMMON_SMM Boot the system and ensure pmbase is programmed. (Look for pmbase in debug messages). Secondly check that SMIs are enabled by looking at the debug messages (search for "Enabling SMIs") and verifying in HW by reading IO port 0x530. Change-Id: I6d57a8282a8b6dc4314f156c39deb09535575cbd Signed-off-by: Rocky Phagura <rphagura@fb.com> Reviewed-on: https://review.coreboot.org/c/coreboot/+/42289 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Angel Pons <th3fanbus@gmail.com> Reviewed-by: Marc Jones <marc@marcjonesconsulting.com>
Diffstat (limited to 'src/drivers/secunet')
0 files changed, 0 insertions, 0 deletions