vfs: remove unused wrapper block_page_mkwrite()
[linux/fpc-iii.git] / arch / x86 / kernel / early-quirks.c
blobdb9a675e751b0bf1401af295a40b1e7a314bab6a
1 /* Various workarounds for chipset bugs.
2 This code runs very early and can't use the regular PCI subsystem
3 The entries are keyed to PCI bridges which usually identify chipsets
4 uniquely.
5 This is only for whole classes of chipsets with specific problems which
6 need early invasive action (e.g. before the timers are initialized).
7 Most PCI device specific workarounds can be done later and should be
8 in standard PCI quirks
9 Mainboard specific bugs should be handled by DMI entries.
10 CPU specific bugs in setup.c */
12 #include <linux/pci.h>
13 #include <linux/acpi.h>
14 #include <linux/pci_ids.h>
15 #include <drm/i915_drm.h>
16 #include <asm/pci-direct.h>
17 #include <asm/dma.h>
18 #include <asm/io_apic.h>
19 #include <asm/apic.h>
20 #include <asm/hpet.h>
21 #include <asm/iommu.h>
22 #include <asm/gart.h>
23 #include <asm/irq_remapping.h>
25 static void __init fix_hypertransport_config(int num, int slot, int func)
27 u32 htcfg;
29 * we found a hypertransport bus
30 * make sure that we are broadcasting
31 * interrupts to all cpus on the ht bus
32 * if we're using extended apic ids
34 htcfg = read_pci_config(num, slot, func, 0x68);
35 if (htcfg & (1 << 18)) {
36 printk(KERN_INFO "Detected use of extended apic ids "
37 "on hypertransport bus\n");
38 if ((htcfg & (1 << 17)) == 0) {
39 printk(KERN_INFO "Enabling hypertransport extended "
40 "apic interrupt broadcast\n");
41 printk(KERN_INFO "Note this is a bios bug, "
42 "please contact your hw vendor\n");
43 htcfg |= (1 << 17);
44 write_pci_config(num, slot, func, 0x68, htcfg);
51 static void __init via_bugs(int num, int slot, int func)
53 #ifdef CONFIG_GART_IOMMU
54 if ((max_pfn > MAX_DMA32_PFN || force_iommu) &&
55 !gart_iommu_aperture_allowed) {
56 printk(KERN_INFO
57 "Looks like a VIA chipset. Disabling IOMMU."
58 " Override with iommu=allowed\n");
59 gart_iommu_aperture_disabled = 1;
61 #endif
64 #ifdef CONFIG_ACPI
65 #ifdef CONFIG_X86_IO_APIC
67 static int __init nvidia_hpet_check(struct acpi_table_header *header)
69 return 0;
71 #endif /* CONFIG_X86_IO_APIC */
72 #endif /* CONFIG_ACPI */
74 static void __init nvidia_bugs(int num, int slot, int func)
76 #ifdef CONFIG_ACPI
77 #ifdef CONFIG_X86_IO_APIC
79 * All timer overrides on Nvidia are
80 * wrong unless HPET is enabled.
81 * Unfortunately that's not true on many Asus boards.
82 * We don't know yet how to detect this automatically, but
83 * at least allow a command line override.
85 if (acpi_use_timer_override)
86 return;
88 if (acpi_table_parse(ACPI_SIG_HPET, nvidia_hpet_check)) {
89 acpi_skip_timer_override = 1;
90 printk(KERN_INFO "Nvidia board "
91 "detected. Ignoring ACPI "
92 "timer override.\n");
93 printk(KERN_INFO "If you got timer trouble "
94 "try acpi_use_timer_override\n");
96 #endif
97 #endif
98 /* RED-PEN skip them on mptables too? */
102 #if defined(CONFIG_ACPI) && defined(CONFIG_X86_IO_APIC)
103 static u32 __init ati_ixp4x0_rev(int num, int slot, int func)
105 u32 d;
106 u8 b;
108 b = read_pci_config_byte(num, slot, func, 0xac);
109 b &= ~(1<<5);
110 write_pci_config_byte(num, slot, func, 0xac, b);
112 d = read_pci_config(num, slot, func, 0x70);
113 d |= 1<<8;
114 write_pci_config(num, slot, func, 0x70, d);
116 d = read_pci_config(num, slot, func, 0x8);
117 d &= 0xff;
118 return d;
121 static void __init ati_bugs(int num, int slot, int func)
123 u32 d;
124 u8 b;
126 if (acpi_use_timer_override)
127 return;
129 d = ati_ixp4x0_rev(num, slot, func);
130 if (d < 0x82)
131 acpi_skip_timer_override = 1;
132 else {
133 /* check for IRQ0 interrupt swap */
134 outb(0x72, 0xcd6); b = inb(0xcd7);
135 if (!(b & 0x2))
136 acpi_skip_timer_override = 1;
139 if (acpi_skip_timer_override) {
140 printk(KERN_INFO "SB4X0 revision 0x%x\n", d);
141 printk(KERN_INFO "Ignoring ACPI timer override.\n");
142 printk(KERN_INFO "If you got timer trouble "
143 "try acpi_use_timer_override\n");
147 static u32 __init ati_sbx00_rev(int num, int slot, int func)
149 u32 d;
151 d = read_pci_config(num, slot, func, 0x8);
152 d &= 0xff;
154 return d;
157 static void __init ati_bugs_contd(int num, int slot, int func)
159 u32 d, rev;
161 rev = ati_sbx00_rev(num, slot, func);
162 if (rev >= 0x40)
163 acpi_fix_pin2_polarity = 1;
166 * SB600: revisions 0x11, 0x12, 0x13, 0x14, ...
167 * SB700: revisions 0x39, 0x3a, ...
168 * SB800: revisions 0x40, 0x41, ...
170 if (rev >= 0x39)
171 return;
173 if (acpi_use_timer_override)
174 return;
176 /* check for IRQ0 interrupt swap */
177 d = read_pci_config(num, slot, func, 0x64);
178 if (!(d & (1<<14)))
179 acpi_skip_timer_override = 1;
181 if (acpi_skip_timer_override) {
182 printk(KERN_INFO "SB600 revision 0x%x\n", rev);
183 printk(KERN_INFO "Ignoring ACPI timer override.\n");
184 printk(KERN_INFO "If you got timer trouble "
185 "try acpi_use_timer_override\n");
188 #else
189 static void __init ati_bugs(int num, int slot, int func)
193 static void __init ati_bugs_contd(int num, int slot, int func)
196 #endif
198 static void __init intel_remapping_check(int num, int slot, int func)
200 u8 revision;
201 u16 device;
203 device = read_pci_config_16(num, slot, func, PCI_DEVICE_ID);
204 revision = read_pci_config_byte(num, slot, func, PCI_REVISION_ID);
207 * Revision <= 13 of all triggering devices id in this quirk
208 * have a problem draining interrupts when irq remapping is
209 * enabled, and should be flagged as broken. Additionally
210 * revision 0x22 of device id 0x3405 has this problem.
212 if (revision <= 0x13)
213 set_irq_remapping_broken();
214 else if (device == 0x3405 && revision == 0x22)
215 set_irq_remapping_broken();
219 * Systems with Intel graphics controllers set aside memory exclusively
220 * for gfx driver use. This memory is not marked in the E820 as reserved
221 * or as RAM, and so is subject to overlap from E820 manipulation later
222 * in the boot process. On some systems, MMIO space is allocated on top,
223 * despite the efforts of the "RAM buffer" approach, which simply rounds
224 * memory boundaries up to 64M to try to catch space that may decode
225 * as RAM and so is not suitable for MMIO.
227 * And yes, so far on current devices the base addr is always under 4G.
229 static u32 __init intel_stolen_base(int num, int slot, int func, size_t stolen_size)
231 u32 base;
234 * For the PCI IDs in this quirk, the stolen base is always
235 * in 0x5c, aka the BDSM register (yes that's really what
236 * it's called).
238 base = read_pci_config(num, slot, func, 0x5c);
239 base &= ~((1<<20) - 1);
241 return base;
244 #define KB(x) ((x) * 1024UL)
245 #define MB(x) (KB (KB (x)))
246 #define GB(x) (MB (KB (x)))
248 static size_t __init i830_tseg_size(void)
250 u8 tmp = read_pci_config_byte(0, 0, 0, I830_ESMRAMC);
252 if (!(tmp & TSEG_ENABLE))
253 return 0;
255 if (tmp & I830_TSEG_SIZE_1M)
256 return MB(1);
257 else
258 return KB(512);
261 static size_t __init i845_tseg_size(void)
263 u8 tmp = read_pci_config_byte(0, 0, 0, I845_ESMRAMC);
265 if (!(tmp & TSEG_ENABLE))
266 return 0;
268 switch (tmp & I845_TSEG_SIZE_MASK) {
269 case I845_TSEG_SIZE_512K:
270 return KB(512);
271 case I845_TSEG_SIZE_1M:
272 return MB(1);
273 default:
274 WARN_ON(1);
275 return 0;
279 static size_t __init i85x_tseg_size(void)
281 u8 tmp = read_pci_config_byte(0, 0, 0, I85X_ESMRAMC);
283 if (!(tmp & TSEG_ENABLE))
284 return 0;
286 return MB(1);
289 static size_t __init i830_mem_size(void)
291 return read_pci_config_byte(0, 0, 0, I830_DRB3) * MB(32);
294 static size_t __init i85x_mem_size(void)
296 return read_pci_config_byte(0, 0, 1, I85X_DRB3) * MB(32);
300 * On 830/845/85x the stolen memory base isn't available in any
301 * register. We need to calculate it as TOM-TSEG_SIZE-stolen_size.
303 static u32 __init i830_stolen_base(int num, int slot, int func, size_t stolen_size)
305 return i830_mem_size() - i830_tseg_size() - stolen_size;
308 static u32 __init i845_stolen_base(int num, int slot, int func, size_t stolen_size)
310 return i830_mem_size() - i845_tseg_size() - stolen_size;
313 static u32 __init i85x_stolen_base(int num, int slot, int func, size_t stolen_size)
315 return i85x_mem_size() - i85x_tseg_size() - stolen_size;
318 static u32 __init i865_stolen_base(int num, int slot, int func, size_t stolen_size)
321 * FIXME is the graphics stolen memory region
322 * always at TOUD? Ie. is it always the last
323 * one to be allocated by the BIOS?
325 return read_pci_config_16(0, 0, 0, I865_TOUD) << 16;
328 static size_t __init i830_stolen_size(int num, int slot, int func)
330 size_t stolen_size;
331 u16 gmch_ctrl;
333 gmch_ctrl = read_pci_config_16(0, 0, 0, I830_GMCH_CTRL);
335 switch (gmch_ctrl & I830_GMCH_GMS_MASK) {
336 case I830_GMCH_GMS_STOLEN_512:
337 stolen_size = KB(512);
338 break;
339 case I830_GMCH_GMS_STOLEN_1024:
340 stolen_size = MB(1);
341 break;
342 case I830_GMCH_GMS_STOLEN_8192:
343 stolen_size = MB(8);
344 break;
345 case I830_GMCH_GMS_LOCAL:
346 /* local memory isn't part of the normal address space */
347 stolen_size = 0;
348 break;
349 default:
350 return 0;
353 return stolen_size;
356 static size_t __init gen3_stolen_size(int num, int slot, int func)
358 size_t stolen_size;
359 u16 gmch_ctrl;
361 gmch_ctrl = read_pci_config_16(0, 0, 0, I830_GMCH_CTRL);
363 switch (gmch_ctrl & I855_GMCH_GMS_MASK) {
364 case I855_GMCH_GMS_STOLEN_1M:
365 stolen_size = MB(1);
366 break;
367 case I855_GMCH_GMS_STOLEN_4M:
368 stolen_size = MB(4);
369 break;
370 case I855_GMCH_GMS_STOLEN_8M:
371 stolen_size = MB(8);
372 break;
373 case I855_GMCH_GMS_STOLEN_16M:
374 stolen_size = MB(16);
375 break;
376 case I855_GMCH_GMS_STOLEN_32M:
377 stolen_size = MB(32);
378 break;
379 case I915_GMCH_GMS_STOLEN_48M:
380 stolen_size = MB(48);
381 break;
382 case I915_GMCH_GMS_STOLEN_64M:
383 stolen_size = MB(64);
384 break;
385 case G33_GMCH_GMS_STOLEN_128M:
386 stolen_size = MB(128);
387 break;
388 case G33_GMCH_GMS_STOLEN_256M:
389 stolen_size = MB(256);
390 break;
391 case INTEL_GMCH_GMS_STOLEN_96M:
392 stolen_size = MB(96);
393 break;
394 case INTEL_GMCH_GMS_STOLEN_160M:
395 stolen_size = MB(160);
396 break;
397 case INTEL_GMCH_GMS_STOLEN_224M:
398 stolen_size = MB(224);
399 break;
400 case INTEL_GMCH_GMS_STOLEN_352M:
401 stolen_size = MB(352);
402 break;
403 default:
404 stolen_size = 0;
405 break;
408 return stolen_size;
411 static size_t __init gen6_stolen_size(int num, int slot, int func)
413 u16 gmch_ctrl;
415 gmch_ctrl = read_pci_config_16(num, slot, func, SNB_GMCH_CTRL);
416 gmch_ctrl >>= SNB_GMCH_GMS_SHIFT;
417 gmch_ctrl &= SNB_GMCH_GMS_MASK;
419 return gmch_ctrl << 25; /* 32 MB units */
422 static size_t __init gen8_stolen_size(int num, int slot, int func)
424 u16 gmch_ctrl;
426 gmch_ctrl = read_pci_config_16(num, slot, func, SNB_GMCH_CTRL);
427 gmch_ctrl >>= BDW_GMCH_GMS_SHIFT;
428 gmch_ctrl &= BDW_GMCH_GMS_MASK;
429 return gmch_ctrl << 25; /* 32 MB units */
432 static size_t __init chv_stolen_size(int num, int slot, int func)
434 u16 gmch_ctrl;
436 gmch_ctrl = read_pci_config_16(num, slot, func, SNB_GMCH_CTRL);
437 gmch_ctrl >>= SNB_GMCH_GMS_SHIFT;
438 gmch_ctrl &= SNB_GMCH_GMS_MASK;
441 * 0x0 to 0x10: 32MB increments starting at 0MB
442 * 0x11 to 0x16: 4MB increments starting at 8MB
443 * 0x17 to 0x1d: 4MB increments start at 36MB
445 if (gmch_ctrl < 0x11)
446 return gmch_ctrl << 25;
447 else if (gmch_ctrl < 0x17)
448 return (gmch_ctrl - 0x11 + 2) << 22;
449 else
450 return (gmch_ctrl - 0x17 + 9) << 22;
453 struct intel_stolen_funcs {
454 size_t (*size)(int num, int slot, int func);
455 u32 (*base)(int num, int slot, int func, size_t size);
458 static size_t __init gen9_stolen_size(int num, int slot, int func)
460 u16 gmch_ctrl;
462 gmch_ctrl = read_pci_config_16(num, slot, func, SNB_GMCH_CTRL);
463 gmch_ctrl >>= BDW_GMCH_GMS_SHIFT;
464 gmch_ctrl &= BDW_GMCH_GMS_MASK;
466 if (gmch_ctrl < 0xf0)
467 return gmch_ctrl << 25; /* 32 MB units */
468 else
469 /* 4MB increments starting at 0xf0 for 4MB */
470 return (gmch_ctrl - 0xf0 + 1) << 22;
473 typedef size_t (*stolen_size_fn)(int num, int slot, int func);
475 static const struct intel_stolen_funcs i830_stolen_funcs __initconst = {
476 .base = i830_stolen_base,
477 .size = i830_stolen_size,
480 static const struct intel_stolen_funcs i845_stolen_funcs __initconst = {
481 .base = i845_stolen_base,
482 .size = i830_stolen_size,
485 static const struct intel_stolen_funcs i85x_stolen_funcs __initconst = {
486 .base = i85x_stolen_base,
487 .size = gen3_stolen_size,
490 static const struct intel_stolen_funcs i865_stolen_funcs __initconst = {
491 .base = i865_stolen_base,
492 .size = gen3_stolen_size,
495 static const struct intel_stolen_funcs gen3_stolen_funcs __initconst = {
496 .base = intel_stolen_base,
497 .size = gen3_stolen_size,
500 static const struct intel_stolen_funcs gen6_stolen_funcs __initconst = {
501 .base = intel_stolen_base,
502 .size = gen6_stolen_size,
505 static const struct intel_stolen_funcs gen8_stolen_funcs __initconst = {
506 .base = intel_stolen_base,
507 .size = gen8_stolen_size,
510 static const struct intel_stolen_funcs gen9_stolen_funcs __initconst = {
511 .base = intel_stolen_base,
512 .size = gen9_stolen_size,
515 static const struct intel_stolen_funcs chv_stolen_funcs __initconst = {
516 .base = intel_stolen_base,
517 .size = chv_stolen_size,
520 static const struct pci_device_id intel_stolen_ids[] __initconst = {
521 INTEL_I830_IDS(&i830_stolen_funcs),
522 INTEL_I845G_IDS(&i845_stolen_funcs),
523 INTEL_I85X_IDS(&i85x_stolen_funcs),
524 INTEL_I865G_IDS(&i865_stolen_funcs),
525 INTEL_I915G_IDS(&gen3_stolen_funcs),
526 INTEL_I915GM_IDS(&gen3_stolen_funcs),
527 INTEL_I945G_IDS(&gen3_stolen_funcs),
528 INTEL_I945GM_IDS(&gen3_stolen_funcs),
529 INTEL_VLV_M_IDS(&gen6_stolen_funcs),
530 INTEL_VLV_D_IDS(&gen6_stolen_funcs),
531 INTEL_PINEVIEW_IDS(&gen3_stolen_funcs),
532 INTEL_I965G_IDS(&gen3_stolen_funcs),
533 INTEL_G33_IDS(&gen3_stolen_funcs),
534 INTEL_I965GM_IDS(&gen3_stolen_funcs),
535 INTEL_GM45_IDS(&gen3_stolen_funcs),
536 INTEL_G45_IDS(&gen3_stolen_funcs),
537 INTEL_IRONLAKE_D_IDS(&gen3_stolen_funcs),
538 INTEL_IRONLAKE_M_IDS(&gen3_stolen_funcs),
539 INTEL_SNB_D_IDS(&gen6_stolen_funcs),
540 INTEL_SNB_M_IDS(&gen6_stolen_funcs),
541 INTEL_IVB_M_IDS(&gen6_stolen_funcs),
542 INTEL_IVB_D_IDS(&gen6_stolen_funcs),
543 INTEL_HSW_D_IDS(&gen6_stolen_funcs),
544 INTEL_HSW_M_IDS(&gen6_stolen_funcs),
545 INTEL_BDW_M_IDS(&gen8_stolen_funcs),
546 INTEL_BDW_D_IDS(&gen8_stolen_funcs),
547 INTEL_CHV_IDS(&chv_stolen_funcs),
548 INTEL_SKL_IDS(&gen9_stolen_funcs),
549 INTEL_BXT_IDS(&gen9_stolen_funcs),
552 static void __init intel_graphics_stolen(int num, int slot, int func)
554 size_t size;
555 int i;
556 u32 start;
557 u16 device, subvendor, subdevice;
559 device = read_pci_config_16(num, slot, func, PCI_DEVICE_ID);
560 subvendor = read_pci_config_16(num, slot, func,
561 PCI_SUBSYSTEM_VENDOR_ID);
562 subdevice = read_pci_config_16(num, slot, func, PCI_SUBSYSTEM_ID);
564 for (i = 0; i < ARRAY_SIZE(intel_stolen_ids); i++) {
565 if (intel_stolen_ids[i].device == device) {
566 const struct intel_stolen_funcs *stolen_funcs =
567 (const struct intel_stolen_funcs *)intel_stolen_ids[i].driver_data;
568 size = stolen_funcs->size(num, slot, func);
569 start = stolen_funcs->base(num, slot, func, size);
570 if (size && start) {
571 printk(KERN_INFO "Reserving Intel graphics stolen memory at 0x%x-0x%x\n",
572 start, start + (u32)size - 1);
573 /* Mark this space as reserved */
574 e820_add_region(start, size, E820_RESERVED);
575 sanitize_e820_map(e820.map,
576 ARRAY_SIZE(e820.map),
577 &e820.nr_map);
579 return;
584 static void __init force_disable_hpet(int num, int slot, int func)
586 #ifdef CONFIG_HPET_TIMER
587 boot_hpet_disable = true;
588 pr_info("x86/hpet: Will disable the HPET for this platform because it's not reliable\n");
589 #endif
593 #define QFLAG_APPLY_ONCE 0x1
594 #define QFLAG_APPLIED 0x2
595 #define QFLAG_DONE (QFLAG_APPLY_ONCE|QFLAG_APPLIED)
596 struct chipset {
597 u32 vendor;
598 u32 device;
599 u32 class;
600 u32 class_mask;
601 u32 flags;
602 void (*f)(int num, int slot, int func);
606 * Only works for devices on the root bus. If you add any devices
607 * not on bus 0 readd another loop level in early_quirks(). But
608 * be careful because at least the Nvidia quirk here relies on
609 * only matching on bus 0.
611 static struct chipset early_qrk[] __initdata = {
612 { PCI_VENDOR_ID_NVIDIA, PCI_ANY_ID,
613 PCI_CLASS_BRIDGE_PCI, PCI_ANY_ID, QFLAG_APPLY_ONCE, nvidia_bugs },
614 { PCI_VENDOR_ID_VIA, PCI_ANY_ID,
615 PCI_CLASS_BRIDGE_PCI, PCI_ANY_ID, QFLAG_APPLY_ONCE, via_bugs },
616 { PCI_VENDOR_ID_AMD, PCI_DEVICE_ID_AMD_K8_NB,
617 PCI_CLASS_BRIDGE_HOST, PCI_ANY_ID, 0, fix_hypertransport_config },
618 { PCI_VENDOR_ID_ATI, PCI_DEVICE_ID_ATI_IXP400_SMBUS,
619 PCI_CLASS_SERIAL_SMBUS, PCI_ANY_ID, 0, ati_bugs },
620 { PCI_VENDOR_ID_ATI, PCI_DEVICE_ID_ATI_SBX00_SMBUS,
621 PCI_CLASS_SERIAL_SMBUS, PCI_ANY_ID, 0, ati_bugs_contd },
622 { PCI_VENDOR_ID_INTEL, 0x3403, PCI_CLASS_BRIDGE_HOST,
623 PCI_BASE_CLASS_BRIDGE, 0, intel_remapping_check },
624 { PCI_VENDOR_ID_INTEL, 0x3405, PCI_CLASS_BRIDGE_HOST,
625 PCI_BASE_CLASS_BRIDGE, 0, intel_remapping_check },
626 { PCI_VENDOR_ID_INTEL, 0x3406, PCI_CLASS_BRIDGE_HOST,
627 PCI_BASE_CLASS_BRIDGE, 0, intel_remapping_check },
628 { PCI_VENDOR_ID_INTEL, PCI_ANY_ID, PCI_CLASS_DISPLAY_VGA, PCI_ANY_ID,
629 QFLAG_APPLY_ONCE, intel_graphics_stolen },
631 * HPET on the current version of the Baytrail platform has accuracy
632 * problems: it will halt in deep idle state - so we disable it.
634 * More details can be found in section 18.10.1.3 of the datasheet:
636 * http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/atom-z8000-datasheet-vol-1.pdf
638 { PCI_VENDOR_ID_INTEL, 0x0f00,
639 PCI_CLASS_BRIDGE_HOST, PCI_ANY_ID, 0, force_disable_hpet},
644 * check_dev_quirk - apply early quirks to a given PCI device
645 * @num: bus number
646 * @slot: slot number
647 * @func: PCI function
649 * Check the vendor & device ID against the early quirks table.
651 * If the device is single function, let early_quirks() know so we don't
652 * poke at this device again.
654 static int __init check_dev_quirk(int num, int slot, int func)
656 u16 class;
657 u16 vendor;
658 u16 device;
659 u8 type;
660 int i;
662 class = read_pci_config_16(num, slot, func, PCI_CLASS_DEVICE);
664 if (class == 0xffff)
665 return -1; /* no class, treat as single function */
667 vendor = read_pci_config_16(num, slot, func, PCI_VENDOR_ID);
669 device = read_pci_config_16(num, slot, func, PCI_DEVICE_ID);
671 for (i = 0; early_qrk[i].f != NULL; i++) {
672 if (((early_qrk[i].vendor == PCI_ANY_ID) ||
673 (early_qrk[i].vendor == vendor)) &&
674 ((early_qrk[i].device == PCI_ANY_ID) ||
675 (early_qrk[i].device == device)) &&
676 (!((early_qrk[i].class ^ class) &
677 early_qrk[i].class_mask))) {
678 if ((early_qrk[i].flags &
679 QFLAG_DONE) != QFLAG_DONE)
680 early_qrk[i].f(num, slot, func);
681 early_qrk[i].flags |= QFLAG_APPLIED;
685 type = read_pci_config_byte(num, slot, func,
686 PCI_HEADER_TYPE);
687 if (!(type & 0x80))
688 return -1;
690 return 0;
693 void __init early_quirks(void)
695 int slot, func;
697 if (!early_pci_allowed())
698 return;
700 /* Poor man's PCI discovery */
701 /* Only scan the root bus */
702 for (slot = 0; slot < 32; slot++)
703 for (func = 0; func < 8; func++) {
704 /* Only probe function 0 on single fn devices */
705 if (check_dev_quirk(0, slot, func))
706 break;