aperture_64.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520
  1. /*
  2. * Firmware replacement code.
  3. *
  4. * Work around broken BIOSes that don't set an aperture, only set the
  5. * aperture in the AGP bridge, or set too small aperture.
  6. *
  7. * If all fails map the aperture over some low memory. This is cheaper than
  8. * doing bounce buffering. The memory is lost. This is done at early boot
  9. * because only the bootmem allocator can allocate 32+MB.
  10. *
  11. * Copyright 2002 Andi Kleen, SuSE Labs.
  12. */
  13. #include <linux/kernel.h>
  14. #include <linux/types.h>
  15. #include <linux/init.h>
  16. #include <linux/bootmem.h>
  17. #include <linux/mmzone.h>
  18. #include <linux/pci_ids.h>
  19. #include <linux/pci.h>
  20. #include <linux/bitops.h>
  21. #include <linux/ioport.h>
  22. #include <linux/suspend.h>
  23. #include <linux/kmemleak.h>
  24. #include <asm/e820.h>
  25. #include <asm/io.h>
  26. #include <asm/iommu.h>
  27. #include <asm/gart.h>
  28. #include <asm/pci-direct.h>
  29. #include <asm/dma.h>
  30. #include <asm/amd_nb.h>
  31. #include <asm/x86_init.h>
  32. int gart_iommu_aperture;
  33. int gart_iommu_aperture_disabled __initdata;
  34. int gart_iommu_aperture_allowed __initdata;
  35. int fallback_aper_order __initdata = 1; /* 64MB */
  36. int fallback_aper_force __initdata;
  37. int fix_aperture __initdata = 1;
  38. static struct resource gart_resource = {
  39. .name = "GART",
  40. .flags = IORESOURCE_MEM,
  41. };
  42. static void __init insert_aperture_resource(u32 aper_base, u32 aper_size)
  43. {
  44. gart_resource.start = aper_base;
  45. gart_resource.end = aper_base + aper_size - 1;
  46. insert_resource(&iomem_resource, &gart_resource);
  47. }
  48. /* This code runs before the PCI subsystem is initialized, so just
  49. access the northbridge directly. */
  50. static u32 __init allocate_aperture(void)
  51. {
  52. u32 aper_size;
  53. void *p;
  54. /* aper_size should <= 1G */
  55. if (fallback_aper_order > 5)
  56. fallback_aper_order = 5;
  57. aper_size = (32 * 1024 * 1024) << fallback_aper_order;
  58. /*
  59. * Aperture has to be naturally aligned. This means a 2GB aperture
  60. * won't have much chance of finding a place in the lower 4GB of
  61. * memory. Unfortunately we cannot move it up because that would
  62. * make the IOMMU useless.
  63. */
  64. /*
  65. * using 512M as goal, in case kexec will load kernel_big
  66. * that will do the on position decompress, and could overlap with
  67. * that positon with gart that is used.
  68. * sequende:
  69. * kernel_small
  70. * ==> kexec (with kdump trigger path or previous doesn't shutdown gart)
  71. * ==> kernel_small(gart area become e820_reserved)
  72. * ==> kexec (with kdump trigger path or previous doesn't shutdown gart)
  73. * ==> kerne_big (uncompressed size will be big than 64M or 128M)
  74. * so don't use 512M below as gart iommu, leave the space for kernel
  75. * code for safe
  76. */
  77. p = __alloc_bootmem_nopanic(aper_size, aper_size, 512ULL<<20);
  78. /*
  79. * Kmemleak should not scan this block as it may not be mapped via the
  80. * kernel direct mapping.
  81. */
  82. kmemleak_ignore(p);
  83. if (!p || __pa(p)+aper_size > 0xffffffff) {
  84. printk(KERN_ERR
  85. "Cannot allocate aperture memory hole (%p,%uK)\n",
  86. p, aper_size>>10);
  87. if (p)
  88. free_bootmem(__pa(p), aper_size);
  89. return 0;
  90. }
  91. printk(KERN_INFO "Mapping aperture over %d KB of RAM @ %lx\n",
  92. aper_size >> 10, __pa(p));
  93. insert_aperture_resource((u32)__pa(p), aper_size);
  94. register_nosave_region((u32)__pa(p) >> PAGE_SHIFT,
  95. (u32)__pa(p+aper_size) >> PAGE_SHIFT);
  96. return (u32)__pa(p);
  97. }
  98. /* Find a PCI capability */
  99. static u32 __init find_cap(int bus, int slot, int func, int cap)
  100. {
  101. int bytes;
  102. u8 pos;
  103. if (!(read_pci_config_16(bus, slot, func, PCI_STATUS) &
  104. PCI_STATUS_CAP_LIST))
  105. return 0;
  106. pos = read_pci_config_byte(bus, slot, func, PCI_CAPABILITY_LIST);
  107. for (bytes = 0; bytes < 48 && pos >= 0x40; bytes++) {
  108. u8 id;
  109. pos &= ~3;
  110. id = read_pci_config_byte(bus, slot, func, pos+PCI_CAP_LIST_ID);
  111. if (id == 0xff)
  112. break;
  113. if (id == cap)
  114. return pos;
  115. pos = read_pci_config_byte(bus, slot, func,
  116. pos+PCI_CAP_LIST_NEXT);
  117. }
  118. return 0;
  119. }
  120. /* Read a standard AGPv3 bridge header */
  121. static u32 __init read_agp(int bus, int slot, int func, int cap, u32 *order)
  122. {
  123. u32 apsize;
  124. u32 apsizereg;
  125. int nbits;
  126. u32 aper_low, aper_hi;
  127. u64 aper;
  128. u32 old_order;
  129. printk(KERN_INFO "AGP bridge at %02x:%02x:%02x\n", bus, slot, func);
  130. apsizereg = read_pci_config_16(bus, slot, func, cap + 0x14);
  131. if (apsizereg == 0xffffffff) {
  132. printk(KERN_ERR "APSIZE in AGP bridge unreadable\n");
  133. return 0;
  134. }
  135. /* old_order could be the value from NB gart setting */
  136. old_order = *order;
  137. apsize = apsizereg & 0xfff;
  138. /* Some BIOS use weird encodings not in the AGPv3 table. */
  139. if (apsize & 0xff)
  140. apsize |= 0xf00;
  141. nbits = hweight16(apsize);
  142. *order = 7 - nbits;
  143. if ((int)*order < 0) /* < 32MB */
  144. *order = 0;
  145. aper_low = read_pci_config(bus, slot, func, 0x10);
  146. aper_hi = read_pci_config(bus, slot, func, 0x14);
  147. aper = (aper_low & ~((1<<22)-1)) | ((u64)aper_hi << 32);
  148. /*
  149. * On some sick chips, APSIZE is 0. It means it wants 4G
  150. * so let double check that order, and lets trust AMD NB settings:
  151. */
  152. printk(KERN_INFO "Aperture from AGP @ %Lx old size %u MB\n",
  153. aper, 32 << old_order);
  154. if (aper + (32ULL<<(20 + *order)) > 0x100000000ULL) {
  155. printk(KERN_INFO "Aperture size %u MB (APSIZE %x) is not right, using settings from NB\n",
  156. 32 << *order, apsizereg);
  157. *order = old_order;
  158. }
  159. printk(KERN_INFO "Aperture from AGP @ %Lx size %u MB (APSIZE %x)\n",
  160. aper, 32 << *order, apsizereg);
  161. if (!aperture_valid(aper, (32*1024*1024) << *order, 32<<20))
  162. return 0;
  163. return (u32)aper;
  164. }
  165. /*
  166. * Look for an AGP bridge. Windows only expects the aperture in the
  167. * AGP bridge and some BIOS forget to initialize the Northbridge too.
  168. * Work around this here.
  169. *
  170. * Do an PCI bus scan by hand because we're running before the PCI
  171. * subsystem.
  172. *
  173. * All AMD AGP bridges are AGPv3 compliant, so we can do this scan
  174. * generically. It's probably overkill to always scan all slots because
  175. * the AGP bridges should be always an own bus on the HT hierarchy,
  176. * but do it here for future safety.
  177. */
  178. static u32 __init search_agp_bridge(u32 *order, int *valid_agp)
  179. {
  180. int bus, slot, func;
  181. /* Poor man's PCI discovery */
  182. for (bus = 0; bus < 256; bus++) {
  183. for (slot = 0; slot < 32; slot++) {
  184. for (func = 0; func < 8; func++) {
  185. u32 class, cap;
  186. u8 type;
  187. class = read_pci_config(bus, slot, func,
  188. PCI_CLASS_REVISION);
  189. if (class == 0xffffffff)
  190. break;
  191. switch (class >> 16) {
  192. case PCI_CLASS_BRIDGE_HOST:
  193. case PCI_CLASS_BRIDGE_OTHER: /* needed? */
  194. /* AGP bridge? */
  195. cap = find_cap(bus, slot, func,
  196. PCI_CAP_ID_AGP);
  197. if (!cap)
  198. break;
  199. *valid_agp = 1;
  200. return read_agp(bus, slot, func, cap,
  201. order);
  202. }
  203. /* No multi-function device? */
  204. type = read_pci_config_byte(bus, slot, func,
  205. PCI_HEADER_TYPE);
  206. if (!(type & 0x80))
  207. break;
  208. }
  209. }
  210. }
  211. printk(KERN_INFO "No AGP bridge found\n");
  212. return 0;
  213. }
  214. static int gart_fix_e820 __initdata = 1;
  215. static int __init parse_gart_mem(char *p)
  216. {
  217. if (!p)
  218. return -EINVAL;
  219. if (!strncmp(p, "off", 3))
  220. gart_fix_e820 = 0;
  221. else if (!strncmp(p, "on", 2))
  222. gart_fix_e820 = 1;
  223. return 0;
  224. }
  225. early_param("gart_fix_e820", parse_gart_mem);
  226. void __init early_gart_iommu_check(void)
  227. {
  228. /*
  229. * in case it is enabled before, esp for kexec/kdump,
  230. * previous kernel already enable that. memset called
  231. * by allocate_aperture/__alloc_bootmem_nopanic cause restart.
  232. * or second kernel have different position for GART hole. and new
  233. * kernel could use hole as RAM that is still used by GART set by
  234. * first kernel
  235. * or BIOS forget to put that in reserved.
  236. * try to update e820 to make that region as reserved.
  237. */
  238. u32 agp_aper_order = 0;
  239. int i, fix, slot, valid_agp = 0;
  240. u32 ctl;
  241. u32 aper_size = 0, aper_order = 0, last_aper_order = 0;
  242. u64 aper_base = 0, last_aper_base = 0;
  243. int aper_enabled = 0, last_aper_enabled = 0, last_valid = 0;
  244. if (!early_pci_allowed())
  245. return;
  246. /* This is mostly duplicate of iommu_hole_init */
  247. search_agp_bridge(&agp_aper_order, &valid_agp);
  248. fix = 0;
  249. for (i = 0; amd_nb_bus_dev_ranges[i].dev_limit; i++) {
  250. int bus;
  251. int dev_base, dev_limit;
  252. bus = amd_nb_bus_dev_ranges[i].bus;
  253. dev_base = amd_nb_bus_dev_ranges[i].dev_base;
  254. dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
  255. for (slot = dev_base; slot < dev_limit; slot++) {
  256. if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
  257. continue;
  258. ctl = read_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL);
  259. aper_enabled = ctl & GARTEN;
  260. aper_order = (ctl >> 1) & 7;
  261. aper_size = (32 * 1024 * 1024) << aper_order;
  262. aper_base = read_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE) & 0x7fff;
  263. aper_base <<= 25;
  264. if (last_valid) {
  265. if ((aper_order != last_aper_order) ||
  266. (aper_base != last_aper_base) ||
  267. (aper_enabled != last_aper_enabled)) {
  268. fix = 1;
  269. break;
  270. }
  271. }
  272. last_aper_order = aper_order;
  273. last_aper_base = aper_base;
  274. last_aper_enabled = aper_enabled;
  275. last_valid = 1;
  276. }
  277. }
  278. if (!fix && !aper_enabled)
  279. return;
  280. if (!aper_base || !aper_size || aper_base + aper_size > 0x100000000UL)
  281. fix = 1;
  282. if (gart_fix_e820 && !fix && aper_enabled) {
  283. if (e820_any_mapped(aper_base, aper_base + aper_size,
  284. E820_RAM)) {
  285. /* reserve it, so we can reuse it in second kernel */
  286. printk(KERN_INFO "update e820 for GART\n");
  287. e820_add_region(aper_base, aper_size, E820_RESERVED);
  288. update_e820();
  289. }
  290. }
  291. if (valid_agp)
  292. return;
  293. /* disable them all at first */
  294. for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
  295. int bus;
  296. int dev_base, dev_limit;
  297. bus = amd_nb_bus_dev_ranges[i].bus;
  298. dev_base = amd_nb_bus_dev_ranges[i].dev_base;
  299. dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
  300. for (slot = dev_base; slot < dev_limit; slot++) {
  301. if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
  302. continue;
  303. ctl = read_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL);
  304. ctl &= ~GARTEN;
  305. write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
  306. }
  307. }
  308. }
  309. static int __initdata printed_gart_size_msg;
  310. int __init gart_iommu_hole_init(void)
  311. {
  312. u32 agp_aper_base = 0, agp_aper_order = 0;
  313. u32 aper_size, aper_alloc = 0, aper_order = 0, last_aper_order = 0;
  314. u64 aper_base, last_aper_base = 0;
  315. int fix, slot, valid_agp = 0;
  316. int i, node;
  317. if (gart_iommu_aperture_disabled || !fix_aperture ||
  318. !early_pci_allowed())
  319. return -ENODEV;
  320. printk(KERN_INFO "Checking aperture...\n");
  321. if (!fallback_aper_force)
  322. agp_aper_base = search_agp_bridge(&agp_aper_order, &valid_agp);
  323. fix = 0;
  324. node = 0;
  325. for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
  326. int bus;
  327. int dev_base, dev_limit;
  328. u32 ctl;
  329. bus = amd_nb_bus_dev_ranges[i].bus;
  330. dev_base = amd_nb_bus_dev_ranges[i].dev_base;
  331. dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
  332. for (slot = dev_base; slot < dev_limit; slot++) {
  333. if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
  334. continue;
  335. iommu_detected = 1;
  336. gart_iommu_aperture = 1;
  337. x86_init.iommu.iommu_init = gart_iommu_init;
  338. ctl = read_pci_config(bus, slot, 3,
  339. AMD64_GARTAPERTURECTL);
  340. /*
  341. * Before we do anything else disable the GART. It may
  342. * still be enabled if we boot into a crash-kernel here.
  343. * Reconfiguring the GART while it is enabled could have
  344. * unknown side-effects.
  345. */
  346. ctl &= ~GARTEN;
  347. write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
  348. aper_order = (ctl >> 1) & 7;
  349. aper_size = (32 * 1024 * 1024) << aper_order;
  350. aper_base = read_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE) & 0x7fff;
  351. aper_base <<= 25;
  352. printk(KERN_INFO "Node %d: aperture @ %Lx size %u MB\n",
  353. node, aper_base, aper_size >> 20);
  354. node++;
  355. if (!aperture_valid(aper_base, aper_size, 64<<20)) {
  356. if (valid_agp && agp_aper_base &&
  357. agp_aper_base == aper_base &&
  358. agp_aper_order == aper_order) {
  359. /* the same between two setting from NB and agp */
  360. if (!no_iommu &&
  361. max_pfn > MAX_DMA32_PFN &&
  362. !printed_gart_size_msg) {
  363. printk(KERN_ERR "you are using iommu with agp, but GART size is less than 64M\n");
  364. printk(KERN_ERR "please increase GART size in your BIOS setup\n");
  365. printk(KERN_ERR "if BIOS doesn't have that option, contact your HW vendor!\n");
  366. printed_gart_size_msg = 1;
  367. }
  368. } else {
  369. fix = 1;
  370. goto out;
  371. }
  372. }
  373. if ((last_aper_order && aper_order != last_aper_order) ||
  374. (last_aper_base && aper_base != last_aper_base)) {
  375. fix = 1;
  376. goto out;
  377. }
  378. last_aper_order = aper_order;
  379. last_aper_base = aper_base;
  380. }
  381. }
  382. out:
  383. if (!fix && !fallback_aper_force) {
  384. if (last_aper_base) {
  385. unsigned long n = (32 * 1024 * 1024) << last_aper_order;
  386. insert_aperture_resource((u32)last_aper_base, n);
  387. return 1;
  388. }
  389. return 0;
  390. }
  391. if (!fallback_aper_force) {
  392. aper_alloc = agp_aper_base;
  393. aper_order = agp_aper_order;
  394. }
  395. if (aper_alloc) {
  396. /* Got the aperture from the AGP bridge */
  397. } else if ((!no_iommu && max_pfn > MAX_DMA32_PFN) ||
  398. force_iommu ||
  399. valid_agp ||
  400. fallback_aper_force) {
  401. printk(KERN_INFO
  402. "Your BIOS doesn't leave a aperture memory hole\n");
  403. printk(KERN_INFO
  404. "Please enable the IOMMU option in the BIOS setup\n");
  405. printk(KERN_INFO
  406. "This costs you %d MB of RAM\n",
  407. 32 << fallback_aper_order);
  408. aper_order = fallback_aper_order;
  409. aper_alloc = allocate_aperture();
  410. if (!aper_alloc) {
  411. /*
  412. * Could disable AGP and IOMMU here, but it's
  413. * probably not worth it. But the later users
  414. * cannot deal with bad apertures and turning
  415. * on the aperture over memory causes very
  416. * strange problems, so it's better to panic
  417. * early.
  418. */
  419. panic("Not enough memory for aperture");
  420. }
  421. } else {
  422. return 0;
  423. }
  424. /* Fix up the north bridges */
  425. for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
  426. int bus, dev_base, dev_limit;
  427. /*
  428. * Don't enable translation yet but enable GART IO and CPU
  429. * accesses and set DISTLBWALKPRB since GART table memory is UC.
  430. */
  431. u32 ctl = DISTLBWALKPRB | aper_order << 1;
  432. bus = amd_nb_bus_dev_ranges[i].bus;
  433. dev_base = amd_nb_bus_dev_ranges[i].dev_base;
  434. dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
  435. for (slot = dev_base; slot < dev_limit; slot++) {
  436. if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
  437. continue;
  438. write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
  439. write_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE, aper_alloc >> 25);
  440. }
  441. }
  442. set_up_gart_resume(aper_order, aper_alloc);
  443. return 1;
  444. }