-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

Following patch adds necessary hooks and as well the compile time checks for
ACPI suspend/resume.

Signed-off-by: Rudolf Marek <[email protected]>

Rudolf
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkng3GgACgkQ3J9wPJqZRNWBcgCePS7W4uc1KUdPVkjLCBcKVQoz
zjkAnjcNBHU2kiEtgDPJ4JT9aV1iweQx
=a8Y2
-----END PGP SIGNATURE-----
Index: src/cpu/amd/car/clear_init_ram.c
===================================================================
--- src/cpu/amd/car/clear_init_ram.c	(revision 4093)
+++ src/cpu/amd/car/clear_init_ram.c	(working copy)
@@ -6,8 +6,7 @@
 	// gcc 3.4.5 will inline the copy_and_run and clear_init_ram in post_cache_as_ram
 	// will reuse %edi as 0 from clear_memory for copy_and_run part, actually it is increased already
 	// so noline clear_init_ram
-        clear_memory(0,  ((CONFIG_LB_MEM_TOPK<<10) - DCACHE_RAM_SIZE));
-
+        clear_memory( _RAMBASE,  (CONFIG_LB_MEM_TOPK << 10) -  _RAMBASE - DCACHE_RAM_SIZE);
 }
 
 /* be warned, this file will be used by core other than core 0/node 0 or core0/node0 when cpu_reset*/
Index: src/cpu/x86/lapic/lapic_cpu_init.c
===================================================================
--- src/cpu/x86/lapic/lapic_cpu_init.c	(revision 4093)
+++ src/cpu/x86/lapic/lapic_cpu_init.c	(working copy)
@@ -31,6 +31,10 @@
 }
 #endif
 
+char *lowmem_backup;
+char *lowmem_backup_ptr;
+int  lowmem_backup_size;
+
 static void copy_secondary_start_to_1m_below(void) 
 {
 #if _RAMBASE >= 0x100000
@@ -45,6 +49,15 @@
         start_eip = get_valid_start_eip((unsigned long)_secondary_start);
         code_size = (unsigned long)_secondary_start_end - (unsigned long)_secondary_start;
 
+	/* need to save it for RAM resume */
+	lowmem_backup_size = code_size;
+	lowmem_backup = malloc(code_size);
+	lowmem_backup_ptr = (unsigned char *)start_eip;
+	
+	if (lowmem_backup == NULL)
+		die("Out of backup memory\n");
+
+        memcpy(lowmem_backup, lowmem_backup_ptr, lowmem_backup_size);
         /* copy the _secondary_start to the ram below 1M*/
         memcpy((unsigned char *)start_eip, (unsigned char *)_secondary_start, code_size);
 
Index: src/boot/hardwaremain.c
===================================================================
--- src/boot/hardwaremain.c	(revision 4093)
+++ src/boot/hardwaremain.c	(working copy)
@@ -37,6 +37,7 @@
 #include <part/init_timer.h>
 #include <boot/elf.h>
 #include <romfs.h>
+#include <arch/acpi.h>
 
 /**
  * @brief Main function of the DRAM part of coreboot.
@@ -47,9 +48,11 @@
  * Device Enumeration:
  *	In the dev_enumerate() phase, 
  */
+
 void hardwaremain(int boot_complete)
 {
 	struct lb_memory *lb_mem;
+	void *wake_vec;
 
 	post_code(0x80);
 
@@ -84,11 +87,27 @@
 	dev_initialize();
 	post_code(0x89);
 
+#if HAVE_ACPI_RESUME == 1
+
+#if MEM_TRAIN_SEQ != 0
+	#error "So far it works on AMD and MEM_TRAIN_SEQ == 0"
+#endif
+
+#if _RAMBASE < 0x1F00000
+	#error "For ACPI RESUME you need to have _RAMBASE at least 31MB"
+	#error "Chipset support (S3_NVRAM_EARLY and ACPI_IS_WAKEUP_EARLY functions and memory ctrl)"
+	#error "And coreboot memory reserved in mainboard.c"
+#endif
+	/* if we happen to be resuming find wakeup vector and jump to OS */
+	wake_vec = acpi_find_wakeup_vector();
+	if (wake_vec)
+		acpi_jump_to_wakeup(wake_vec);
+#endif
+
 	/* Now that we have collected all of our information
 	 * write our configuration tables.
 	 */
 	lb_mem = write_tables();
-
 #if CONFIG_ROMFS == 1
 # if USE_FALLBACK_IMAGE == 1
 	void (*pl)(void) = romfs_load_payload(lb_mem, "fallback/payload");
Index: src/config/Options.lb
===================================================================
--- src/config/Options.lb	(revision 4093)
+++ src/config/Options.lb	(working copy)
@@ -927,6 +927,12 @@
 	comment "Define to build ACPI tables"
 end
 
+define HAVE_ACPI_RESUME
+	default 0
+	export always
+	comment "Define to build ACPI with resume support"
+end
+
 define ACPI_SSDTX_NUM
 	default 0
 	export always

Attachment: s3_general.patch.sig
Description: Binary data

-- 
coreboot mailing list: [email protected]
http://www.coreboot.org/mailman/listinfo/coreboot

Reply via email to