mirror of
https://github.com/fail0verflow/switch-coreboot.git
synced 2025-05-04 01:39:18 -04:00
MMCONF was explicitly used here to avoid races of 0xcf8/0xcfc access being non-atomic and/or need to access 4kiB of PCI config space. All these platforms now have MMCONF_SUPPORT_DEFAULT. I liked the style of code in pci_mmio_cfg.h more, and used those to replace the ones in io.h. BUG=None BRANCH=None TEST=None Signed-off-by: Kysti Mlkki <kyosti.malkki@gmail.com> Reviewed-on: https://review.coreboot.org/17689 Tested-by: build bot (Jenkins) Reviewed-by: Aaron Durbin <adurbin@chromium.org> Change-Id: Ib5e6a451866c95d1edb9060c7f94070830b90e92 Reviewed-on: https://chromium-review.googlesource.com/417941 Commit-Ready: Furquan Shaikh <furquan@chromium.org> Tested-by: Furquan Shaikh <furquan@chromium.org> Reviewed-by: Aaron Durbin <adurbin@chromium.org>
52 lines
1.8 KiB
C
52 lines
1.8 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright (C) 2012 The Chromium OS Authors. All rights reserved.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License as
|
|
* published by the Free Software Foundation; version 2 of
|
|
* the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
|
|
#include <arch/io.h>
|
|
#include <stdlib.h>
|
|
#include "nehalem.h"
|
|
|
|
#define PCI_DEV_SNB PCI_DEV(0, 0, 0)
|
|
|
|
void intel_nehalem_finalize_smm(void)
|
|
{
|
|
pci_or_config16(PCI_DEV_SNB, 0x50, 1 << 0); /* GGC */
|
|
pci_or_config32(PCI_DEV_SNB, 0x5c, 1 << 0); /* DPR */
|
|
pci_or_config32(PCI_DEV_SNB, 0x78, 1 << 10); /* ME */
|
|
pci_or_config32(PCI_DEV_SNB, 0x90, 1 << 0); /* REMAPBASE */
|
|
pci_or_config32(PCI_DEV_SNB, 0x98, 1 << 0); /* REMAPLIMIT */
|
|
pci_or_config32(PCI_DEV_SNB, 0xa0, 1 << 0); /* TOM */
|
|
pci_or_config32(PCI_DEV_SNB, 0xa8, 1 << 0); /* TOUUD */
|
|
pci_or_config32(PCI_DEV_SNB, 0xb0, 1 << 0); /* BDSM */
|
|
pci_or_config32(PCI_DEV_SNB, 0xb4, 1 << 0); /* BGSM */
|
|
pci_or_config32(PCI_DEV_SNB, 0xb8, 1 << 0); /* TSEGMB */
|
|
pci_or_config32(PCI_DEV_SNB, 0xbc, 1 << 0); /* TOLUD */
|
|
|
|
MCHBAR32_OR(0x5500, 1 << 0); /* PAVP */
|
|
MCHBAR32_OR(0x5f00, 1 << 31); /* SA PM */
|
|
MCHBAR32_OR(0x6020, 1 << 0); /* UMA GFX */
|
|
MCHBAR32_OR(0x63fc, 1 << 0); /* VTDTRK */
|
|
MCHBAR32_OR(0x6800, 1 << 31);
|
|
MCHBAR32_OR(0x7000, 1 << 31);
|
|
MCHBAR32_OR(0x77fc, 1 << 0);
|
|
|
|
/* Memory Controller Lockdown */
|
|
MCHBAR8(0x50fc) = 0x8f;
|
|
|
|
/* Read+write the following */
|
|
MCHBAR32(0x6030) = MCHBAR32(0x6030);
|
|
MCHBAR32(0x6034) = MCHBAR32(0x6034);
|
|
MCHBAR32(0x6008) = MCHBAR32(0x6008);
|
|
}
|