ec/google/chromeec: Define ACPI_NOTIFY_CROS_EC_MKBP constant
[coreboot.git] / src / soc / intel / elkhartlake / pmc.c
blob567f50d18e2447c64cfc9a20ee32e65140303abc
1 /* SPDX-License-Identifier: GPL-2.0-only */
3 #include <bootstate.h>
4 #include <console/console.h>
5 #include <device/device.h>
6 #include <device/mmio.h>
7 #include <intelblocks/acpi.h>
8 #include <intelblocks/pmc.h>
9 #include <intelblocks/pmclib.h>
10 #include <intelblocks/rtc.h>
11 #include <soc/pci_devs.h>
12 #include <soc/pm.h>
13 #include <soc/soc_chip.h>
14 #include <static.h>
16 static void config_deep_sX(uint32_t offset, uint32_t mask, int sx, int enable)
18 uint32_t reg;
19 uint8_t *pmcbase = pmc_mmio_regs();
21 printk(BIOS_DEBUG, "%sabling Deep S%c\n",
22 enable ? "En" : "Dis", sx + '0');
23 reg = read32(pmcbase + offset);
24 if (enable)
25 reg |= mask;
26 else
27 reg &= ~mask;
28 write32(pmcbase + offset, reg);
31 static void config_deep_s5(int on_ac, int on_dc)
33 /* Treat S4 the same as S5. */
34 config_deep_sX(S4_PWRGATE_POL, S4AC_GATE_SUS, 4, on_ac);
35 config_deep_sX(S4_PWRGATE_POL, S4DC_GATE_SUS, 4, on_dc);
36 config_deep_sX(S5_PWRGATE_POL, S5AC_GATE_SUS, 5, on_ac);
37 config_deep_sX(S5_PWRGATE_POL, S5DC_GATE_SUS, 5, on_dc);
40 static void config_deep_s3(int on_ac, int on_dc)
42 config_deep_sX(S3_PWRGATE_POL, S3AC_GATE_SUS, 3, on_ac);
43 config_deep_sX(S3_PWRGATE_POL, S3DC_GATE_SUS, 3, on_dc);
46 static void config_deep_sx(uint32_t deepsx_config)
48 uint32_t reg;
49 uint8_t *pmcbase = pmc_mmio_regs();
51 reg = read32(pmcbase + DSX_CFG);
52 reg &= ~DSX_CFG_MASK;
53 reg |= deepsx_config;
54 write32(pmcbase + DSX_CFG, reg);
57 static void soc_pmc_enable(struct device *dev)
59 const config_t *config = config_of_soc();
61 rtc_init();
63 pmc_set_power_failure_state(true);
64 pmc_gpe_init();
66 config_deep_s3(config->deep_s3_enable_ac, config->deep_s3_enable_dc);
67 config_deep_s5(config->deep_s5_enable_ac, config->deep_s5_enable_dc);
68 config_deep_sx(config->deep_sx_config);
71 static void soc_pmc_read_resources(struct device *dev)
73 struct resource *res;
75 mmio_range(dev, PWRMBASE, PCH_PWRM_BASE_ADDRESS, PCH_PWRM_BASE_SIZE);
77 res = new_resource(dev, 1);
78 res->base = (resource_t)ACPI_BASE_ADDRESS;
79 res->size = (resource_t)ACPI_BASE_SIZE;
80 res->limit = res->base + res->size - 1;
81 res->flags = IORESOURCE_IO | IORESOURCE_ASSIGNED | IORESOURCE_FIXED;
84 static void soc_pmc_init(struct device *dev)
87 * pmc_set_acpi_mode() should be delayed until BS_DEV_INIT in order
88 * to ensure the ordering does not break the assumptions that other
89 * drivers make about ACPI mode (e.g. Chrome EC). Since it disables
90 * ACPI mode, other drivers may take different actions based on this
91 * (e.g. Chrome EC will flush any pending hostevent bits). Because
92 * EHL has its PMC device available for device_operations, it can be
93 * done from the "ops->init" callback.
95 pmc_set_acpi_mode();
98 * Disable ACPI PM timer based on Kconfig
100 * Disabling ACPI PM timer is necessary for XTAL OSC shutdown.
101 * Disabling ACPI PM timer also switches off TCO
103 if (!CONFIG(USE_PM_ACPI_TIMER))
104 setbits8(pmc_mmio_regs() + PCH_PWRM_ACPI_TMR_CTL, ACPI_TIM_DIS);
107 static void pmc_fill_ssdt(const struct device *dev)
109 if (CONFIG(SOC_INTEL_COMMON_BLOCK_ACPI_PEP))
110 generate_acpi_power_engine();
114 * `pmc_final` function is native implementation of equivalent events performed by
115 * each FSP NotifyPhase() API invocations.
118 * Clear PMCON status bits (Global Reset/Power Failure/Host Reset Status bits)
120 * Perform the PMCON status bit clear operation from `.final`
121 * to cover any such chances where later boot stage requested a global
122 * reset and PMCON status bit remains set.
124 static void pmc_final(struct device *dev)
126 pmc_clear_pmcon_sts();
129 struct device_operations pmc_ops = {
130 .read_resources = soc_pmc_read_resources,
131 .set_resources = noop_set_resources,
132 .init = soc_pmc_init,
133 .enable = soc_pmc_enable,
134 #if CONFIG(HAVE_ACPI_TABLES)
135 .acpi_fill_ssdt = pmc_fill_ssdt,
136 #endif
137 .final = pmc_final,