1 // SPDX-License-Identifier: GPL-2.0
3 * Firmware replacement code.
5 * Work around broken BIOSes that don't set an aperture, only set the
6 * aperture in the AGP bridge, or set too small aperture.
8 * If all fails map the aperture over some low memory. This is cheaper than
9 * doing bounce buffering. The memory is lost. This is done at early boot
10 * because only the bootmem allocator can allocate 32+MB.
12 * Copyright 2002 Andi Kleen, SuSE Labs.
14 #define pr_fmt(fmt) "AGP: " fmt
16 #include <linux/kernel.h>
17 #include <linux/kcore.h>
18 #include <linux/types.h>
19 #include <linux/init.h>
20 #include <linux/memblock.h>
21 #include <linux/mmzone.h>
22 #include <linux/pci_ids.h>
23 #include <linux/pci.h>
24 #include <linux/bitops.h>
25 #include <linux/suspend.h>
26 #include <asm/e820/api.h>
28 #include <asm/iommu.h>
30 #include <asm/pci-direct.h>
32 #include <asm/amd_nb.h>
33 #include <asm/x86_init.h>
34 #include <linux/crash_dump.h>
37 * Using 512M as goal, in case kexec will load kernel_big
38 * that will do the on-position decompress, and could overlap with
39 * with the gart aperture that is used.
42 * ==> kexec (with kdump trigger path or gart still enabled)
43 * ==> kernel_small (gart area become e820_reserved)
44 * ==> kexec (with kdump trigger path or gart still enabled)
45 * ==> kerne_big (uncompressed size will be big than 64M or 128M)
46 * So don't use 512M below as gart iommu, leave the space for kernel
49 #define GART_MIN_ADDR (512ULL << 20)
50 #define GART_MAX_ADDR (1ULL << 32)
52 int gart_iommu_aperture;
53 int gart_iommu_aperture_disabled __initdata;
54 int gart_iommu_aperture_allowed __initdata;
56 int fallback_aper_order __initdata = 1; /* 64MB */
57 int fallback_aper_force __initdata;
59 int fix_aperture __initdata = 1;
61 #if defined(CONFIG_PROC_VMCORE) || defined(CONFIG_PROC_KCORE)
63 * If the first kernel maps the aperture over e820 RAM, the kdump kernel will
64 * use the same range because it will remain configured in the northbridge.
65 * Trying to dump this area via /proc/vmcore may crash the machine, so exclude
68 static unsigned long aperture_pfn_start, aperture_page_count;
70 static int gart_mem_pfn_is_ram(unsigned long pfn)
72 return likely((pfn < aperture_pfn_start) ||
73 (pfn >= aperture_pfn_start + aperture_page_count));
76 static void __init exclude_from_core(u64 aper_base, u32 aper_order)
78 aperture_pfn_start = aper_base >> PAGE_SHIFT;
79 aperture_page_count = (32 * 1024 * 1024) << aper_order >> PAGE_SHIFT;
80 #ifdef CONFIG_PROC_VMCORE
81 WARN_ON(register_oldmem_pfn_is_ram(&gart_mem_pfn_is_ram));
83 #ifdef CONFIG_PROC_KCORE
84 WARN_ON(register_mem_pfn_is_ram(&gart_mem_pfn_is_ram));
88 static void exclude_from_core(u64 aper_base, u32 aper_order)
93 /* This code runs before the PCI subsystem is initialized, so just
94 access the northbridge directly. */
96 static u32 __init allocate_aperture(void)
101 /* aper_size should <= 1G */
102 if (fallback_aper_order > 5)
103 fallback_aper_order = 5;
104 aper_size = (32 * 1024 * 1024) << fallback_aper_order;
107 * Aperture has to be naturally aligned. This means a 2GB aperture
108 * won't have much chance of finding a place in the lower 4GB of
109 * memory. Unfortunately we cannot move it up because that would
110 * make the IOMMU useless.
112 addr = memblock_phys_alloc_range(aper_size, aper_size,
113 GART_MIN_ADDR, GART_MAX_ADDR);
115 pr_err("Cannot allocate aperture memory hole [mem %#010lx-%#010lx] (%uKB)\n",
116 addr, addr + aper_size - 1, aper_size >> 10);
119 pr_info("Mapping aperture over RAM [mem %#010lx-%#010lx] (%uKB)\n",
120 addr, addr + aper_size - 1, aper_size >> 10);
121 register_nosave_region(addr >> PAGE_SHIFT,
122 (addr+aper_size) >> PAGE_SHIFT);
128 /* Find a PCI capability */
129 static u32 __init find_cap(int bus, int slot, int func, int cap)
134 if (!(read_pci_config_16(bus, slot, func, PCI_STATUS) &
135 PCI_STATUS_CAP_LIST))
138 pos = read_pci_config_byte(bus, slot, func, PCI_CAPABILITY_LIST);
139 for (bytes = 0; bytes < 48 && pos >= 0x40; bytes++) {
143 id = read_pci_config_byte(bus, slot, func, pos+PCI_CAP_LIST_ID);
148 pos = read_pci_config_byte(bus, slot, func,
149 pos+PCI_CAP_LIST_NEXT);
154 /* Read a standard AGPv3 bridge header */
155 static u32 __init read_agp(int bus, int slot, int func, int cap, u32 *order)
160 u32 aper_low, aper_hi;
164 pr_info("pci 0000:%02x:%02x:%02x: AGP bridge\n", bus, slot, func);
165 apsizereg = read_pci_config_16(bus, slot, func, cap + 0x14);
166 if (apsizereg == 0xffffffff) {
167 pr_err("pci 0000:%02x:%02x.%d: APSIZE unreadable\n",
172 /* old_order could be the value from NB gart setting */
175 apsize = apsizereg & 0xfff;
176 /* Some BIOS use weird encodings not in the AGPv3 table. */
179 nbits = hweight16(apsize);
181 if ((int)*order < 0) /* < 32MB */
184 aper_low = read_pci_config(bus, slot, func, 0x10);
185 aper_hi = read_pci_config(bus, slot, func, 0x14);
186 aper = (aper_low & ~((1<<22)-1)) | ((u64)aper_hi << 32);
189 * On some sick chips, APSIZE is 0. It means it wants 4G
190 * so let double check that order, and lets trust AMD NB settings:
192 pr_info("pci 0000:%02x:%02x.%d: AGP aperture [bus addr %#010Lx-%#010Lx] (old size %uMB)\n",
193 bus, slot, func, aper, aper + (32ULL << (old_order + 20)) - 1,
195 if (aper + (32ULL<<(20 + *order)) > 0x100000000ULL) {
196 pr_info("pci 0000:%02x:%02x.%d: AGP aperture size %uMB (APSIZE %#x) is not right, using settings from NB\n",
197 bus, slot, func, 32 << *order, apsizereg);
201 pr_info("pci 0000:%02x:%02x.%d: AGP aperture [bus addr %#010Lx-%#010Lx] (%uMB, APSIZE %#x)\n",
202 bus, slot, func, aper, aper + (32ULL << (*order + 20)) - 1,
203 32 << *order, apsizereg);
205 if (!aperture_valid(aper, (32*1024*1024) << *order, 32<<20))
211 * Look for an AGP bridge. Windows only expects the aperture in the
212 * AGP bridge and some BIOS forget to initialize the Northbridge too.
213 * Work around this here.
215 * Do an PCI bus scan by hand because we're running before the PCI
218 * All AMD AGP bridges are AGPv3 compliant, so we can do this scan
219 * generically. It's probably overkill to always scan all slots because
220 * the AGP bridges should be always an own bus on the HT hierarchy,
221 * but do it here for future safety.
223 static u32 __init search_agp_bridge(u32 *order, int *valid_agp)
227 /* Poor man's PCI discovery */
228 for (bus = 0; bus < 256; bus++) {
229 for (slot = 0; slot < 32; slot++) {
230 for (func = 0; func < 8; func++) {
233 class = read_pci_config(bus, slot, func,
235 if (class == 0xffffffff)
238 switch (class >> 16) {
239 case PCI_CLASS_BRIDGE_HOST:
240 case PCI_CLASS_BRIDGE_OTHER: /* needed? */
242 cap = find_cap(bus, slot, func,
247 return read_agp(bus, slot, func, cap,
251 /* No multi-function device? */
252 type = read_pci_config_byte(bus, slot, func,
259 pr_info("No AGP bridge found\n");
264 static bool gart_fix_e820 __initdata = true;
266 static int __init parse_gart_mem(char *p)
268 return kstrtobool(p, &gart_fix_e820);
270 early_param("gart_fix_e820", parse_gart_mem);
273 * With kexec/kdump, if the first kernel doesn't shut down the GART and the
274 * second kernel allocates a different GART region, there might be two
275 * overlapping GART regions present:
277 * - the first still used by the GART initialized in the first kernel.
278 * - (sub-)set of it used as normal RAM by the second kernel.
280 * which leads to memory corruptions and a kernel panic eventually.
282 * This can also happen if the BIOS has forgotten to mark the GART region
285 * Try to update the e820 map to mark that new region as reserved.
287 void __init early_gart_iommu_check(void)
289 u32 agp_aper_order = 0;
290 int i, fix, slot, valid_agp = 0;
292 u32 aper_size = 0, aper_order = 0, last_aper_order = 0;
293 u64 aper_base = 0, last_aper_base = 0;
294 int aper_enabled = 0, last_aper_enabled = 0, last_valid = 0;
296 if (!amd_gart_present())
299 if (!early_pci_allowed())
302 /* This is mostly duplicate of iommu_hole_init */
303 search_agp_bridge(&agp_aper_order, &valid_agp);
306 for (i = 0; amd_nb_bus_dev_ranges[i].dev_limit; i++) {
308 int dev_base, dev_limit;
310 bus = amd_nb_bus_dev_ranges[i].bus;
311 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
312 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
314 for (slot = dev_base; slot < dev_limit; slot++) {
315 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
318 ctl = read_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL);
319 aper_enabled = ctl & GARTEN;
320 aper_order = (ctl >> 1) & 7;
321 aper_size = (32 * 1024 * 1024) << aper_order;
322 aper_base = read_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE) & 0x7fff;
326 if ((aper_order != last_aper_order) ||
327 (aper_base != last_aper_base) ||
328 (aper_enabled != last_aper_enabled)) {
334 last_aper_order = aper_order;
335 last_aper_base = aper_base;
336 last_aper_enabled = aper_enabled;
341 if (!fix && !aper_enabled)
344 if (!aper_base || !aper_size || aper_base + aper_size > 0x100000000UL)
347 if (gart_fix_e820 && !fix && aper_enabled) {
348 if (e820__mapped_any(aper_base, aper_base + aper_size,
350 /* reserve it, so we can reuse it in second kernel */
351 pr_info("e820: reserve [mem %#010Lx-%#010Lx] for GART\n",
352 aper_base, aper_base + aper_size - 1);
353 e820__range_add(aper_base, aper_size, E820_TYPE_RESERVED);
354 e820__update_table_print();
361 /* disable them all at first */
362 for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
364 int dev_base, dev_limit;
366 bus = amd_nb_bus_dev_ranges[i].bus;
367 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
368 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
370 for (slot = dev_base; slot < dev_limit; slot++) {
371 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
374 ctl = read_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL);
376 write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
382 static int __initdata printed_gart_size_msg;
384 int __init gart_iommu_hole_init(void)
386 u32 agp_aper_base = 0, agp_aper_order = 0;
387 u32 aper_size, aper_alloc = 0, aper_order = 0, last_aper_order = 0;
388 u64 aper_base, last_aper_base = 0;
389 int fix, slot, valid_agp = 0;
392 if (!amd_gart_present())
395 if (gart_iommu_aperture_disabled || !fix_aperture ||
396 !early_pci_allowed())
399 pr_info("Checking aperture...\n");
401 if (!fallback_aper_force)
402 agp_aper_base = search_agp_bridge(&agp_aper_order, &valid_agp);
406 for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
408 int dev_base, dev_limit;
411 bus = amd_nb_bus_dev_ranges[i].bus;
412 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
413 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
415 for (slot = dev_base; slot < dev_limit; slot++) {
416 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
420 gart_iommu_aperture = 1;
421 x86_init.iommu.iommu_init = gart_iommu_init;
423 ctl = read_pci_config(bus, slot, 3,
424 AMD64_GARTAPERTURECTL);
427 * Before we do anything else disable the GART. It may
428 * still be enabled if we boot into a crash-kernel here.
429 * Reconfiguring the GART while it is enabled could have
430 * unknown side-effects.
433 write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
435 aper_order = (ctl >> 1) & 7;
436 aper_size = (32 * 1024 * 1024) << aper_order;
437 aper_base = read_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE) & 0x7fff;
440 pr_info("Node %d: aperture [bus addr %#010Lx-%#010Lx] (%uMB)\n",
441 node, aper_base, aper_base + aper_size - 1,
445 if (!aperture_valid(aper_base, aper_size, 64<<20)) {
446 if (valid_agp && agp_aper_base &&
447 agp_aper_base == aper_base &&
448 agp_aper_order == aper_order) {
449 /* the same between two setting from NB and agp */
451 max_pfn > MAX_DMA32_PFN &&
452 !printed_gart_size_msg) {
453 pr_err("you are using iommu with agp, but GART size is less than 64MB\n");
454 pr_err("please increase GART size in your BIOS setup\n");
455 pr_err("if BIOS doesn't have that option, contact your HW vendor!\n");
456 printed_gart_size_msg = 1;
464 if ((last_aper_order && aper_order != last_aper_order) ||
465 (last_aper_base && aper_base != last_aper_base)) {
469 last_aper_order = aper_order;
470 last_aper_base = aper_base;
475 if (!fix && !fallback_aper_force) {
476 if (last_aper_base) {
478 * If this is the kdump kernel, the first kernel
479 * may have allocated the range over its e820 RAM
480 * and fixed up the northbridge
482 exclude_from_core(last_aper_base, last_aper_order);
489 if (!fallback_aper_force) {
490 aper_alloc = agp_aper_base;
491 aper_order = agp_aper_order;
495 /* Got the aperture from the AGP bridge */
496 } else if ((!no_iommu && max_pfn > MAX_DMA32_PFN) ||
499 fallback_aper_force) {
500 pr_info("Your BIOS doesn't leave an aperture memory hole\n");
501 pr_info("Please enable the IOMMU option in the BIOS setup\n");
502 pr_info("This costs you %dMB of RAM\n",
503 32 << fallback_aper_order);
505 aper_order = fallback_aper_order;
506 aper_alloc = allocate_aperture();
509 * Could disable AGP and IOMMU here, but it's
510 * probably not worth it. But the later users
511 * cannot deal with bad apertures and turning
512 * on the aperture over memory causes very
513 * strange problems, so it's better to panic
516 panic("Not enough memory for aperture");
523 * If this is the kdump kernel _and_ the first kernel did not
524 * configure the aperture in the northbridge, this range may
525 * overlap with the first kernel's memory. We can't access the
526 * range through vmcore even though it should be part of the dump.
528 exclude_from_core(aper_alloc, aper_order);
530 /* Fix up the north bridges */
531 for (i = 0; i < amd_nb_bus_dev_ranges[i].dev_limit; i++) {
532 int bus, dev_base, dev_limit;
535 * Don't enable translation yet but enable GART IO and CPU
536 * accesses and set DISTLBWALKPRB since GART table memory is UC.
538 u32 ctl = aper_order << 1;
540 bus = amd_nb_bus_dev_ranges[i].bus;
541 dev_base = amd_nb_bus_dev_ranges[i].dev_base;
542 dev_limit = amd_nb_bus_dev_ranges[i].dev_limit;
543 for (slot = dev_base; slot < dev_limit; slot++) {
544 if (!early_is_amd_nb(read_pci_config(bus, slot, 3, 0x00)))
547 write_pci_config(bus, slot, 3, AMD64_GARTAPERTURECTL, ctl);
548 write_pci_config(bus, slot, 3, AMD64_GARTAPERTUREBASE, aper_alloc >> 25);
552 set_up_gart_resume(aper_order, aper_alloc);