ec/google/chromeec: Define ACPI_NOTIFY_CROS_EC_MKBP constant
[coreboot.git] / src / soc / intel / elkhartlake / smihandler.c
blobeb5a57642f143a670b454002fed882a456382f61
1 /* SPDX-License-Identifier: GPL-2.0-only */
3 #include <device/pci_def.h>
4 #include <intelblocks/cse.h>
5 #include <intelblocks/smihandler.h>
6 #include <soc/soc_chip.h>
7 #include <soc/pci_devs.h>
8 #include <soc/pm.h>
11 * Specific SOC SMI handler during ramstage finalize phase
13 * BIOS can't make CSME function disable as is due to POSTBOOT_SAI
14 * restriction in place from MCC chipset. Hence create SMI Handler to
15 * perform CSME function disabling logic during SMM mode.
17 void smihandler_soc_at_finalize(void)
19 if (CONFIG(DISABLE_HECI1_AT_PRE_BOOT))
20 heci1_disable();
23 const smi_handler_t southbridge_smi[SMI_STS_BITS] = {
24 [SMI_ON_SLP_EN_STS_BIT] = smihandler_southbridge_sleep,
25 [APM_STS_BIT] = smihandler_southbridge_apmc,
26 [PM1_STS_BIT] = smihandler_southbridge_pm1,
27 [GPE0_STS_BIT] = smihandler_southbridge_gpe0,
28 [GPIO_STS_BIT] = smihandler_southbridge_gpi,
29 [ESPI_SMI_STS_BIT] = smihandler_southbridge_espi,
30 [MCSMI_STS_BIT] = smihandler_southbridge_mc,
31 #if CONFIG(SOC_INTEL_COMMON_BLOCK_SMM_TCO_ENABLE)
32 [TCO_STS_BIT] = smihandler_southbridge_tco,
33 #endif
34 [PERIODIC_STS_BIT] = smihandler_southbridge_periodic,
35 [MONITOR_STS_BIT] = smihandler_southbridge_monitor,