memblock, x86: Replace memblock_x86_reserve/free_range() with generic ones
[deliverable/linux.git] / arch / x86 / kernel / aperture_64.c
CommitLineData
c140df97 1/*
1da177e4 2 * Firmware replacement code.
c140df97 3 *
8caac563
PM
4 * Work around broken BIOSes that don't set an aperture, only set the
5 * aperture in the AGP bridge, or set too small aperture.
6 *
c140df97
IM
7 * If all fails map the aperture over some low memory. This is cheaper than
8 * doing bounce buffering. The memory is lost. This is done at early boot
9 * because only the bootmem allocator can allocate 32+MB.
10 *
1da177e4 11 * Copyright 2002 Andi Kleen, SuSE Labs.
1da177e4 12 */
1da177e4
LT
13#include <linux/kernel.h>
14#include <linux/types.h>
15#include <linux/init.h>
32e3f2b0 16#include <linux/memblock.h>
1da177e4
LT
17#include <linux/mmzone.h>
18#include <linux/pci_ids.h>
19#include <linux/pci.h>
20#include <linux/bitops.h>
56dd669a 21#include <linux/ioport.h>
2050d45d 22#include <linux/suspend.h>
acde31dc 23#include <linux/kmemleak.h>
1da177e4
LT
24#include <asm/e820.h>
25#include <asm/io.h>
46a7fa27 26#include <asm/iommu.h>
395624fc 27#include <asm/gart.h>
1da177e4 28#include <asm/pci-direct.h>
ca8642f6 29#include <asm/dma.h>
23ac4ae8 30#include <asm/amd_nb.h>
de957628 31#include <asm/x86_init.h>
1da177e4 32
c387aa3a
JR
33/*
34 * Using 512M as goal, in case kexec will load kernel_big
35 * that will do the on-position decompress, and could overlap with
36 * with the gart aperture that is used.
37 * Sequence:
38 * kernel_small
39 * ==> kexec (with kdump trigger path or gart still enabled)
40 * ==> kernel_small (gart area become e820_reserved)
41 * ==> kexec (with kdump trigger path or gart still enabled)
42 * ==> kerne_big (uncompressed size will be big than 64M or 128M)
43 * So don't use 512M below as gart iommu, leave the space for kernel
44 * code for safe.
45 */
46#define GART_MIN_ADDR (512ULL << 20)
47#define GART_MAX_ADDR (1ULL << 32)
48
0440d4c0 49int gart_iommu_aperture;
7de6a4cd
PM
50int gart_iommu_aperture_disabled __initdata;
51int gart_iommu_aperture_allowed __initdata;
1da177e4
LT
52
53int fallback_aper_order __initdata = 1; /* 64MB */
7de6a4cd 54int fallback_aper_force __initdata;
1da177e4
LT
55
56int fix_aperture __initdata = 1;
57
56dd669a
AD
58static struct resource gart_resource = {
59 .name = "GART",
60 .flags = IORESOURCE_MEM,
61};
62
63static void __init insert_aperture_resource(u32 aper_base, u32 aper_size)
64{
65 gart_resource.start = aper_base;
66 gart_resource.end = aper_base + aper_size - 1;
67 insert_resource(&iomem_resource, &gart_resource);
68}
69
42442ed5
AM
70/* This code runs before the PCI subsystem is initialized, so just
71 access the northbridge directly. */
1da177e4 72
c140df97 73static u32 __init allocate_aperture(void)
1da177e4 74{
1da177e4 75 u32 aper_size;
32e3f2b0 76 unsigned long addr;
1da177e4 77
7677b2ef
YL
78 /* aper_size should <= 1G */
79 if (fallback_aper_order > 5)
80 fallback_aper_order = 5;
c140df97 81 aper_size = (32 * 1024 * 1024) << fallback_aper_order;
1da177e4 82
c140df97
IM
83 /*
84 * Aperture has to be naturally aligned. This means a 2GB aperture
85 * won't have much chance of finding a place in the lower 4GB of
86 * memory. Unfortunately we cannot move it up because that would
87 * make the IOMMU useless.
1da177e4 88 */
c387aa3a
JR
89 addr = memblock_find_in_range(GART_MIN_ADDR, GART_MAX_ADDR,
90 aper_size, aper_size);
1f5026a7 91 if (!addr || addr + aper_size > GART_MAX_ADDR) {
32e3f2b0
YL
92 printk(KERN_ERR
93 "Cannot allocate aperture memory hole (%lx,%uK)\n",
94 addr, aper_size>>10);
95 return 0;
96 }
24aa0788 97 memblock_reserve(addr, aper_size);
acde31dc
CM
98 /*
99 * Kmemleak should not scan this block as it may not be mapped via the
100 * kernel direct mapping.
101 */
32e3f2b0 102 kmemleak_ignore(phys_to_virt(addr));
31183ba8 103 printk(KERN_INFO "Mapping aperture over %d KB of RAM @ %lx\n",
32e3f2b0
YL
104 aper_size >> 10, addr);
105 insert_aperture_resource((u32)addr, aper_size);
106 register_nosave_region(addr >> PAGE_SHIFT,
107 (addr+aper_size) >> PAGE_SHIFT);
c140df97 108
32e3f2b0 109 return (u32)addr;
1da177e4
LT
110}
111
1da177e4 112
42442ed5 113/* Find a PCI capability */
dd564d0c 114static u32 __init find_cap(int bus, int slot, int func, int cap)
c140df97 115{
1da177e4 116 int bytes;
c140df97
IM
117 u8 pos;
118
55c0d721 119 if (!(read_pci_config_16(bus, slot, func, PCI_STATUS) &
c140df97 120 PCI_STATUS_CAP_LIST))
1da177e4 121 return 0;
c140df97 122
55c0d721 123 pos = read_pci_config_byte(bus, slot, func, PCI_CAPABILITY_LIST);
c140df97 124 for (bytes = 0; bytes < 48 && pos >= 0x40; bytes++) {
1da177e4 125 u8 id;
c140df97
IM
126
127 pos &= ~3;
55c0d721 128 id = read_pci_config_byte(bus, slot, func, pos+PCI_CAP_LIST_ID);
1da177e4
LT
129 if (id == 0xff)
130 break;
c140df97
IM
131 if (id == cap)
132 return pos;
55c0d721 133 pos = read_pci_config_byte(bus, slot, func,
c140df97
IM
134 pos+PCI_CAP_LIST_NEXT);
135 }
1da177e4 136 return 0;
c140df97 137}
1da177e4
LT
138
139/* Read a standard AGPv3 bridge header */
dd564d0c 140static u32 __init read_agp(int bus, int slot, int func, int cap, u32 *order)
c140df97 141{
1da177e4
LT
142 u32 apsize;
143 u32 apsizereg;
144 int nbits;
145 u32 aper_low, aper_hi;
146 u64 aper;
1edc1ab3 147 u32 old_order;
1da177e4 148
55c0d721
YL
149 printk(KERN_INFO "AGP bridge at %02x:%02x:%02x\n", bus, slot, func);
150 apsizereg = read_pci_config_16(bus, slot, func, cap + 0x14);
1da177e4 151 if (apsizereg == 0xffffffff) {
31183ba8 152 printk(KERN_ERR "APSIZE in AGP bridge unreadable\n");
1da177e4
LT
153 return 0;
154 }
155
1edc1ab3
YL
156 /* old_order could be the value from NB gart setting */
157 old_order = *order;
158
1da177e4
LT
159 apsize = apsizereg & 0xfff;
160 /* Some BIOS use weird encodings not in the AGPv3 table. */
c140df97
IM
161 if (apsize & 0xff)
162 apsize |= 0xf00;
1da177e4
LT
163 nbits = hweight16(apsize);
164 *order = 7 - nbits;
165 if ((int)*order < 0) /* < 32MB */
166 *order = 0;
c140df97 167
55c0d721
YL
168 aper_low = read_pci_config(bus, slot, func, 0x10);
169 aper_hi = read_pci_config(bus, slot, func, 0x14);
1da177e4
LT
170 aper = (aper_low & ~((1<<22)-1)) | ((u64)aper_hi << 32);
171
1edc1ab3
YL
172 /*
173 * On some sick chips, APSIZE is 0. It means it wants 4G
174 * so let double check that order, and lets trust AMD NB settings:
175 */
8c9fd91a
YL
176 printk(KERN_INFO "Aperture from AGP @ %Lx old size %u MB\n",
177 aper, 32 << old_order);
178 if (aper + (32ULL<<(20 + *order)) > 0x100000000ULL) {
1edc1ab3
YL
179 printk(KERN_INFO "Aperture size %u MB (APSIZE %x) is not right, using settings from NB\n",
180 32 << *order, apsizereg);
181 *order = old_order;
182 }
183
31183ba8
IM
184 printk(KERN_INFO "Aperture from AGP @ %Lx size %u MB (APSIZE %x)\n",
185 aper, 32 << *order, apsizereg);
1da177e4 186
8c9fd91a 187 if (!aperture_valid(aper, (32*1024*1024) << *order, 32<<20))
c140df97
IM
188 return 0;
189 return (u32)aper;
190}
1da177e4 191
c140df97
IM
192/*
193 * Look for an AGP bridge. Windows only expects the aperture in the
194 * AGP bridge and some BIOS forget to initialize the Northbridge too.
195 * Work around this here.
196 *
197 * Do an PCI bus scan by hand because we're running before the PCI
198 * subsystem.
199 *
eec1d4fa 200 * All AMD AGP bridges are AGPv3 compliant, so we can do this scan
c140df97
IM
201 * generically. It's probably overkill to always scan all slots because
202 * the AGP bridges should be always an own bus on the HT hierarchy,
203 * but do it here for future safety.
204 */
dd564d0c 205static u32 __init search_agp_bridge(u32 *order, int *valid_agp)
1da177e4 206{
55c0d721 207 int bus, slot, func;
1da177e4
LT
208
209 /* Poor man's PCI discovery */
55c0d721 210 for (bus = 0; bus < 256; bus++) {
c140df97
IM
211 for (slot = 0; slot < 32; slot++) {
212 for (func = 0; func < 8; func++) {
1da177e4
LT
213 u32 class, cap;
214 u8 type;
55c0d721 215 class = read_pci_config(bus, slot, func,
1da177e4
LT
216 PCI_CLASS_REVISION);
217 if (class == 0xffffffff)
c140df97
IM
218 break;
219
220 switch (class >> 16) {
1da177e4
LT
221 case PCI_CLASS_BRIDGE_HOST:
222 case PCI_CLASS_BRIDGE_OTHER: /* needed? */
223 /* AGP bridge? */
55c0d721 224 cap = find_cap(bus, slot, func,
c140df97 225 PCI_CAP_ID_AGP);
1da177e4
LT
226 if (!cap)
227 break;
c140df97 228 *valid_agp = 1;
55c0d721 229 return read_agp(bus, slot, func, cap,
c140df97
IM
230 order);
231 }
232
1da177e4 233 /* No multi-function device? */
55c0d721 234 type = read_pci_config_byte(bus, slot, func,
1da177e4
LT
235 PCI_HEADER_TYPE);
236 if (!(type & 0x80))
237 break;
c140df97
IM
238 }
239 }
1da177e4 240 }
31183ba8 241 printk(KERN_INFO "No AGP bridge found\n");
c140df97 242
1da177e4
LT
243 return 0;
244}
245
aaf23042
YL
246static int gart_fix_e820 __initdata = 1;
247
248static int __init parse_gart_mem(char *p)
249{
250 if (!p)
251 return -EINVAL;
252
253 if (!strncmp(p, "off", 3))
254 gart_fix_e820 = 0;
255 else if (!strncmp(p, "on", 2))
256 gart_fix_e820 = 1;
257
258 return 0;
259}
260early_param("gart_fix_e820", parse_gart_mem);
261
262void __init early_gart_iommu_check(void)
263{
264 /*
265 * in case it is enabled before, esp for kexec/kdump,
266 * previous kernel already enable that. memset called
267 * by allocate_aperture/__alloc_bootmem_nopanic cause restart.
268 * or second kernel have different position for GART hole. and new
269 * kernel could use hole as RAM that is still used by GART set by
270 * first kernel
271 * or BIOS forget to put that in reserved.
272 * try to update e820 to make that region as reserved.
273 */
fa10ba64 274 u32 agp_aper_order = 0;
f3eee542 275 int i, fix, slot, valid_agp = 0;
aaf23042
YL
276 u32 ctl;
277 u32 aper_size = 0, aper_order = 0, last_aper_order = 0;
278 u64 aper_base = 0, last_aper_base = 0;
fa5b8a30 279 int aper_enabled = 0, last_aper_enabled = 0, last_valid = 0;
aaf23042
YL
280
281 if (!early_pci_allowed())
282 return;
283
fa5b8a30 284 /* This is mostly duplicate of iommu_hole_init */
fa10ba64 285 search_agp_bridge(&agp_aper_order, &valid_agp);
f3eee542 286
aaf23042 287 fix = 0;
24d9b70b 288 for (i = 0; amd_nb_bus_dev_ranges[i].dev_limit; i++) {
55c0d721
YL
289 int bus;
290 int dev_base, dev_limit;
291
24d9b70b
JB
292 bus = amd_nb_bus_dev_ranges[i].bus;
293 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
294 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
55c0d721
YL
295
296 for (slot = dev_base; slot < dev_limit; slot++) {
eec1d4fa 297 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
55c0d721
YL
298 continue;
299
300 ctl = read_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL);
57ab43e3 301 aper_enabled = ctl & GARTEN;
55c0d721
YL
302 aper_order = (ctl >> 1) & 7;
303 aper_size = (32 * 1024 * 1024) << aper_order;
304 aper_base = read_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE) & 0x7fff;
305 aper_base <<= 25;
306
fa5b8a30
PM
307 if (last_valid) {
308 if ((aper_order != last_aper_order) ||
309 (aper_base != last_aper_base) ||
310 (aper_enabled != last_aper_enabled)) {
311 fix = 1;
312 break;
313 }
55c0d721 314 }
fa5b8a30 315
55c0d721
YL
316 last_aper_order = aper_order;
317 last_aper_base = aper_base;
318 last_aper_enabled = aper_enabled;
fa5b8a30 319 last_valid = 1;
aaf23042 320 }
aaf23042
YL
321 }
322
323 if (!fix && !aper_enabled)
324 return;
325
326 if (!aper_base || !aper_size || aper_base + aper_size > 0x100000000UL)
327 fix = 1;
328
329 if (gart_fix_e820 && !fix && aper_enabled) {
0754557d
YL
330 if (e820_any_mapped(aper_base, aper_base + aper_size,
331 E820_RAM)) {
0abbc78a 332 /* reserve it, so we can reuse it in second kernel */
aaf23042 333 printk(KERN_INFO "update e820 for GART\n");
d0be6bde 334 e820_add_region(aper_base, aper_size, E820_RESERVED);
aaf23042
YL
335 update_e820();
336 }
aaf23042
YL
337 }
338
f3eee542 339 if (valid_agp)
4f384f8b
PM
340 return;
341
f3eee542 342 /* disable them all at first */
24d9b70b 343 for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
55c0d721
YL
344 int bus;
345 int dev_base, dev_limit;
346
24d9b70b
JB
347 bus = amd_nb_bus_dev_ranges[i].bus;
348 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
349 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
aaf23042 350
55c0d721 351 for (slot = dev_base; slot < dev_limit; slot++) {
eec1d4fa 352 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
55c0d721
YL
353 continue;
354
355 ctl = read_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL);
57ab43e3 356 ctl &= ~GARTEN;
55c0d721
YL
357 write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
358 }
aaf23042
YL
359 }
360
361}
362
8c9fd91a
YL
363static int __initdata printed_gart_size_msg;
364
480125ba 365int __init gart_iommu_hole_init(void)
c140df97 366{
8c9fd91a 367 u32 agp_aper_base = 0, agp_aper_order = 0;
50895c5d 368 u32 aper_size, aper_alloc = 0, aper_order = 0, last_aper_order = 0;
1da177e4 369 u64 aper_base, last_aper_base = 0;
55c0d721
YL
370 int fix, slot, valid_agp = 0;
371 int i, node;
1da177e4 372
0440d4c0
JR
373 if (gart_iommu_aperture_disabled || !fix_aperture ||
374 !early_pci_allowed())
480125ba 375 return -ENODEV;
1da177e4 376
753811dc 377 printk(KERN_INFO "Checking aperture...\n");
1da177e4 378
8c9fd91a
YL
379 if (!fallback_aper_force)
380 agp_aper_base = search_agp_bridge(&agp_aper_order, &valid_agp);
381
1da177e4 382 fix = 0;
47db4c3e 383 node = 0;
24d9b70b 384 for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
55c0d721
YL
385 int bus;
386 int dev_base, dev_limit;
4b83873d 387 u32 ctl;
55c0d721 388
24d9b70b
JB
389 bus = amd_nb_bus_dev_ranges[i].bus;
390 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
391 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
55c0d721
YL
392
393 for (slot = dev_base; slot < dev_limit; slot++) {
eec1d4fa 394 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
55c0d721
YL
395 continue;
396
397 iommu_detected = 1;
398 gart_iommu_aperture = 1;
de957628 399 x86_init.iommu.iommu_init = gart_iommu_init;
55c0d721 400
4b83873d
JR
401 ctl = read_pci_config(bus, slot, 3,
402 AMD64_GARTAPERTURECTL);
403
404 /*
405 * Before we do anything else disable the GART. It may
406 * still be enabled if we boot into a crash-kernel here.
407 * Reconfiguring the GART while it is enabled could have
408 * unknown side-effects.
409 */
410 ctl &= ~GARTEN;
411 write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
412
413 aper_order = (ctl >> 1) & 7;
55c0d721
YL
414 aper_size = (32 * 1024 * 1024) << aper_order;
415 aper_base = read_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE) & 0x7fff;
416 aper_base <<= 25;
417
418 printk(KERN_INFO "Node %d: aperture @ %Lx size %u MB\n",
419 node, aper_base, aper_size >> 20);
420 node++;
421
422 if (!aperture_valid(aper_base, aper_size, 64<<20)) {
423 if (valid_agp && agp_aper_base &&
424 agp_aper_base == aper_base &&
425 agp_aper_order == aper_order) {
426 /* the same between two setting from NB and agp */
c987d12f
YL
427 if (!no_iommu &&
428 max_pfn > MAX_DMA32_PFN &&
429 !printed_gart_size_msg) {
55c0d721
YL
430 printk(KERN_ERR "you are using iommu with agp, but GART size is less than 64M\n");
431 printk(KERN_ERR "please increase GART size in your BIOS setup\n");
432 printk(KERN_ERR "if BIOS doesn't have that option, contact your HW vendor!\n");
433 printed_gart_size_msg = 1;
434 }
435 } else {
436 fix = 1;
437 goto out;
8c9fd91a 438 }
8c9fd91a 439 }
1da177e4 440
55c0d721
YL
441 if ((last_aper_order && aper_order != last_aper_order) ||
442 (last_aper_base && aper_base != last_aper_base)) {
443 fix = 1;
444 goto out;
445 }
446 last_aper_order = aper_order;
447 last_aper_base = aper_base;
1da177e4 448 }
c140df97 449 }
1da177e4 450
55c0d721 451out:
56dd669a
AD
452 if (!fix && !fallback_aper_force) {
453 if (last_aper_base) {
454 unsigned long n = (32 * 1024 * 1024) << last_aper_order;
c140df97 455
56dd669a 456 insert_aperture_resource((u32)last_aper_base, n);
480125ba 457 return 1;
56dd669a 458 }
480125ba 459 return 0;
56dd669a 460 }
1da177e4 461
8c9fd91a
YL
462 if (!fallback_aper_force) {
463 aper_alloc = agp_aper_base;
464 aper_order = agp_aper_order;
465 }
c140df97
IM
466
467 if (aper_alloc) {
1da177e4 468 /* Got the aperture from the AGP bridge */
c987d12f 469 } else if ((!no_iommu && max_pfn > MAX_DMA32_PFN) ||
1da177e4
LT
470 force_iommu ||
471 valid_agp ||
c140df97 472 fallback_aper_force) {
9b156845 473 printk(KERN_INFO
31183ba8 474 "Your BIOS doesn't leave a aperture memory hole\n");
9b156845 475 printk(KERN_INFO
31183ba8 476 "Please enable the IOMMU option in the BIOS setup\n");
9b156845 477 printk(KERN_INFO
31183ba8
IM
478 "This costs you %d MB of RAM\n",
479 32 << fallback_aper_order);
1da177e4
LT
480
481 aper_order = fallback_aper_order;
482 aper_alloc = allocate_aperture();
c140df97
IM
483 if (!aper_alloc) {
484 /*
485 * Could disable AGP and IOMMU here, but it's
486 * probably not worth it. But the later users
487 * cannot deal with bad apertures and turning
488 * on the aperture over memory causes very
489 * strange problems, so it's better to panic
490 * early.
491 */
1da177e4
LT
492 panic("Not enough memory for aperture");
493 }
c140df97 494 } else {
480125ba 495 return 0;
c140df97 496 }
1da177e4
LT
497
498 /* Fix up the north bridges */
24d9b70b 499 for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
260133ab
BP
500 int bus, dev_base, dev_limit;
501
502 /*
503 * Don't enable translation yet but enable GART IO and CPU
504 * accesses and set DISTLBWALKPRB since GART table memory is UC.
505 */
c34151a7 506 u32 ctl = aper_order << 1;
55c0d721 507
24d9b70b
JB
508 bus = amd_nb_bus_dev_ranges[i].bus;
509 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
510 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
55c0d721 511 for (slot = dev_base; slot < dev_limit; slot++) {
eec1d4fa 512 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
55c0d721
YL
513 continue;
514
260133ab 515 write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
55c0d721
YL
516 write_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE, aper_alloc >> 25);
517 }
c140df97 518 }
6703f6d1
RW
519
520 set_up_gart_resume(aper_order, aper_alloc);
480125ba
KRW
521
522 return 1;
c140df97 523}
This page took 0.546375 seconds and 5 git commands to generate.