summaryrefslogtreecommitdiff
path: root/src/southbridge
diff options
context:
space:
mode:
authorDuncan Laurie <dlaurie@chromium.org>2012-06-23 17:25:29 -0700
committerRonald G. Minnich <rminnich@gmail.com>2012-07-26 20:28:38 +0200
commit0920915bca2391ed318eeb12ddad8b7cb4a52905 (patch)
tree25756ddcc76e563c636e3ba925c55177cfbb0c91 /src/southbridge
parent38bd80d5a7320dc1b9277c00f18539cc4f878776 (diff)
ELOG: Support GSMI in CPT/PPT southbridge SMI handler
In order to support the GSMI interface the SMI handler needs to find and use the state save area from the same CPU that initiated the SMI. In this case it is a synchronous SMI resulting form an IO write to port 0xB2. To find the right CPU state save area iterate over the region until the "IO Misc Info" field reports the expected value and then proceed to use that state save area. This is needed because the coreboot SMI handler only executes on one core, and that core is non-deterministic. It is likely that the core executing the C SMM handler is not the same one that actually did the IO write to 0xB2 and generated the SMI. The GSMI parameter buffer is passed as a pointer to EBX in the tate save area, and the GSMI command is extracted from EAX before it is used as the return value. This interface is tested by enabling CONFIG_GOOGLE_GSMI in the kernel and generating events and verifying that they end up in the event log. 159 | 2012-06-23 16:22:45 | Kernl Event | Clean Shutdown 184 | 2012-06-23 17:14:05 | Kernl Event | Oops 185 | 2012-06-23 17:14:05 | Kernl Event | Panic Change-Id: Ic121ea69e9f50c88467c435e095c3e3629989806 Signed-off-by: Duncan Laurie <dlaurie@chromium.org> Reviewed-on: http://review.coreboot.org/1317 Tested-by: build bot (Jenkins) Reviewed-by: Ronald G. Minnich <rminnich@gmail.com>
Diffstat (limited to 'src/southbridge')
-rw-r--r--src/southbridge/intel/bd82x6x/smihandler.c53
1 files changed, 53 insertions, 0 deletions
diff --git a/src/southbridge/intel/bd82x6x/smihandler.c b/src/southbridge/intel/bd82x6x/smihandler.c
index d9477ea4e4..e4d1512142 100644
--- a/src/southbridge/intel/bd82x6x/smihandler.c
+++ b/src/southbridge/intel/bd82x6x/smihandler.c
@@ -28,6 +28,7 @@
#include <cpu/x86/smm.h>
#include <device/pci_def.h>
#include <cpu/x86/smm.h>
+#include <elog.h>
#include "pch.h"
#include "nvs.h"
@@ -405,6 +406,53 @@ static void southbridge_smi_sleep(unsigned int node, smm_state_save_area_t *stat
}
}
+#if CONFIG_ELOG_GSMI
+static void southbridge_smi_gsmi(void)
+{
+ em64t101_smm_state_save_area_t *io_smi;
+ u32 base = smi_get_tseg_base() + 0x8000;
+ u32 *ret, *param;
+ u8 sub_command, node;
+
+ /*
+ * Check for Synchronous IO SMI and use save state from that
+ * core in case we are not running on the same core that
+ * initiated the IO transaction.
+ */
+ for (node = 0; node < CONFIG_MAX_CPUS; node++) {
+ /*
+ * Look for IO Misc Info:
+ * Synchronous bit[0]=1
+ * Byte bit[3:1]=1
+ * Output bit[7:4]=0
+ * APMC port bit[31:16]=0xb2
+ * RAX[7:0] == 0xEF
+ */
+ u32 io_want_info = (APM_CNT << 16) | 0x3;
+ io_smi = (em64t101_smm_state_save_area_t *)
+ (base + 0x7d00 - (node * 0x400));
+
+ if (io_smi->io_misc_info == io_want_info &&
+ ((u8)io_smi->rax == ELOG_GSMI_APM_CNT))
+ break;
+ }
+
+ /* Did not find matching CPU Save State */
+ if (node == CONFIG_MAX_CPUS)
+ return;
+
+ /* Command and return value in EAX */
+ ret = (u32*)&io_smi->rax;
+ sub_command = (u8)(*ret >> 8);
+
+ /* Parameter buffer in EBX */
+ param = (u32*)&io_smi->rbx;
+
+ /* drivers/elog/gsmi.c */
+ *ret = gsmi_exec(sub_command, param);
+}
+#endif
+
static void southbridge_smi_apmc(unsigned int node, smm_state_save_area_t *state_save)
{
u32 pmctrl;
@@ -452,6 +500,11 @@ static void southbridge_smi_apmc(unsigned int node, smm_state_save_area_t *state
smm_initialized = 1;
printk(BIOS_DEBUG, "SMI#: Setting up structures to %p, %p, %p\n", gnvs, tcg, smi1);
break;
+#if CONFIG_ELOG_GSMI
+ case ELOG_GSMI_APM_CNT:
+ southbridge_smi_gsmi();
+ break;
+#endif
}
tseg_relocate((void **)&mainboard_apmc);