1 /* Various workarounds for chipset bugs.
2 This code runs very early and can't use the regular PCI subsystem
3 The entries are keyed to PCI bridges which usually identify chipsets
5 This is only for whole classes of chipsets with specific problems which
6 need early invasive action (e.g. before the timers are initialized).
7 Most PCI device specific workarounds can be done later and should be
9 Mainboard specific bugs should be handled by DMI entries.
10 CPU specific bugs in setup.c */
12 #include <linux/pci.h>
13 #include <linux/acpi.h>
14 #include <linux/pci_ids.h>
15 #include <drm/i915_drm.h>
16 #include <asm/pci-direct.h>
18 #include <asm/io_apic.h>
21 #include <asm/iommu.h>
23 #include <asm/irq_remapping.h>
25 static void __init
fix_hypertransport_config(int num
, int slot
, int func
)
29 * we found a hypertransport bus
30 * make sure that we are broadcasting
31 * interrupts to all cpus on the ht bus
32 * if we're using extended apic ids
34 htcfg
= read_pci_config(num
, slot
, func
, 0x68);
35 if (htcfg
& (1 << 18)) {
36 printk(KERN_INFO
"Detected use of extended apic ids "
37 "on hypertransport bus\n");
38 if ((htcfg
& (1 << 17)) == 0) {
39 printk(KERN_INFO
"Enabling hypertransport extended "
40 "apic interrupt broadcast\n");
41 printk(KERN_INFO
"Note this is a bios bug, "
42 "please contact your hw vendor\n");
44 write_pci_config(num
, slot
, func
, 0x68, htcfg
);
51 static void __init
via_bugs(int num
, int slot
, int func
)
53 #ifdef CONFIG_GART_IOMMU
54 if ((max_pfn
> MAX_DMA32_PFN
|| force_iommu
) &&
55 !gart_iommu_aperture_allowed
) {
57 "Looks like a VIA chipset. Disabling IOMMU."
58 " Override with iommu=allowed\n");
59 gart_iommu_aperture_disabled
= 1;
65 #ifdef CONFIG_X86_IO_APIC
67 static int __init
nvidia_hpet_check(struct acpi_table_header
*header
)
71 #endif /* CONFIG_X86_IO_APIC */
72 #endif /* CONFIG_ACPI */
74 static void __init
nvidia_bugs(int num
, int slot
, int func
)
77 #ifdef CONFIG_X86_IO_APIC
79 * All timer overrides on Nvidia are
80 * wrong unless HPET is enabled.
81 * Unfortunately that's not true on many Asus boards.
82 * We don't know yet how to detect this automatically, but
83 * at least allow a command line override.
85 if (acpi_use_timer_override
)
88 if (acpi_table_parse(ACPI_SIG_HPET
, nvidia_hpet_check
)) {
89 acpi_skip_timer_override
= 1;
90 printk(KERN_INFO
"Nvidia board "
91 "detected. Ignoring ACPI "
93 printk(KERN_INFO
"If you got timer trouble "
94 "try acpi_use_timer_override\n");
98 /* RED-PEN skip them on mptables too? */
102 #if defined(CONFIG_ACPI) && defined(CONFIG_X86_IO_APIC)
103 static u32 __init
ati_ixp4x0_rev(int num
, int slot
, int func
)
108 b
= read_pci_config_byte(num
, slot
, func
, 0xac);
110 write_pci_config_byte(num
, slot
, func
, 0xac, b
);
112 d
= read_pci_config(num
, slot
, func
, 0x70);
114 write_pci_config(num
, slot
, func
, 0x70, d
);
116 d
= read_pci_config(num
, slot
, func
, 0x8);
121 static void __init
ati_bugs(int num
, int slot
, int func
)
126 if (acpi_use_timer_override
)
129 d
= ati_ixp4x0_rev(num
, slot
, func
);
131 acpi_skip_timer_override
= 1;
133 /* check for IRQ0 interrupt swap */
134 outb(0x72, 0xcd6); b
= inb(0xcd7);
136 acpi_skip_timer_override
= 1;
139 if (acpi_skip_timer_override
) {
140 printk(KERN_INFO
"SB4X0 revision 0x%x\n", d
);
141 printk(KERN_INFO
"Ignoring ACPI timer override.\n");
142 printk(KERN_INFO
"If you got timer trouble "
143 "try acpi_use_timer_override\n");
147 static u32 __init
ati_sbx00_rev(int num
, int slot
, int func
)
151 d
= read_pci_config(num
, slot
, func
, 0x8);
157 static void __init
ati_bugs_contd(int num
, int slot
, int func
)
161 rev
= ati_sbx00_rev(num
, slot
, func
);
163 acpi_fix_pin2_polarity
= 1;
166 * SB600: revisions 0x11, 0x12, 0x13, 0x14, ...
167 * SB700: revisions 0x39, 0x3a, ...
168 * SB800: revisions 0x40, 0x41, ...
173 if (acpi_use_timer_override
)
176 /* check for IRQ0 interrupt swap */
177 d
= read_pci_config(num
, slot
, func
, 0x64);
179 acpi_skip_timer_override
= 1;
181 if (acpi_skip_timer_override
) {
182 printk(KERN_INFO
"SB600 revision 0x%x\n", rev
);
183 printk(KERN_INFO
"Ignoring ACPI timer override.\n");
184 printk(KERN_INFO
"If you got timer trouble "
185 "try acpi_use_timer_override\n");
189 static void __init
ati_bugs(int num
, int slot
, int func
)
193 static void __init
ati_bugs_contd(int num
, int slot
, int func
)
198 static void __init
intel_remapping_check(int num
, int slot
, int func
)
203 device
= read_pci_config_16(num
, slot
, func
, PCI_DEVICE_ID
);
204 revision
= read_pci_config_byte(num
, slot
, func
, PCI_REVISION_ID
);
207 * Revision <= 13 of all triggering devices id in this quirk
208 * have a problem draining interrupts when irq remapping is
209 * enabled, and should be flagged as broken. Additionally
210 * revision 0x22 of device id 0x3405 has this problem.
212 if (revision
<= 0x13)
213 set_irq_remapping_broken();
214 else if (device
== 0x3405 && revision
== 0x22)
215 set_irq_remapping_broken();
219 * Systems with Intel graphics controllers set aside memory exclusively
220 * for gfx driver use. This memory is not marked in the E820 as reserved
221 * or as RAM, and so is subject to overlap from E820 manipulation later
222 * in the boot process. On some systems, MMIO space is allocated on top,
223 * despite the efforts of the "RAM buffer" approach, which simply rounds
224 * memory boundaries up to 64M to try to catch space that may decode
225 * as RAM and so is not suitable for MMIO.
227 * And yes, so far on current devices the base addr is always under 4G.
229 static u32 __init
intel_stolen_base(int num
, int slot
, int func
, size_t stolen_size
)
234 * For the PCI IDs in this quirk, the stolen base is always
235 * in 0x5c, aka the BDSM register (yes that's really what
238 base
= read_pci_config(num
, slot
, func
, 0x5c);
239 base
&= ~((1<<20) - 1);
244 #define KB(x) ((x) * 1024UL)
245 #define MB(x) (KB (KB (x)))
246 #define GB(x) (MB (KB (x)))
248 static size_t __init
i830_tseg_size(void)
250 u8 tmp
= read_pci_config_byte(0, 0, 0, I830_ESMRAMC
);
252 if (!(tmp
& TSEG_ENABLE
))
255 if (tmp
& I830_TSEG_SIZE_1M
)
261 static size_t __init
i845_tseg_size(void)
263 u8 tmp
= read_pci_config_byte(0, 0, 0, I845_ESMRAMC
);
265 if (!(tmp
& TSEG_ENABLE
))
268 switch (tmp
& I845_TSEG_SIZE_MASK
) {
269 case I845_TSEG_SIZE_512K
:
271 case I845_TSEG_SIZE_1M
:
279 static size_t __init
i85x_tseg_size(void)
281 u8 tmp
= read_pci_config_byte(0, 0, 0, I85X_ESMRAMC
);
283 if (!(tmp
& TSEG_ENABLE
))
289 static size_t __init
i830_mem_size(void)
291 return read_pci_config_byte(0, 0, 0, I830_DRB3
) * MB(32);
294 static size_t __init
i85x_mem_size(void)
296 return read_pci_config_byte(0, 0, 1, I85X_DRB3
) * MB(32);
300 * On 830/845/85x the stolen memory base isn't available in any
301 * register. We need to calculate it as TOM-TSEG_SIZE-stolen_size.
303 static u32 __init
i830_stolen_base(int num
, int slot
, int func
, size_t stolen_size
)
305 return i830_mem_size() - i830_tseg_size() - stolen_size
;
308 static u32 __init
i845_stolen_base(int num
, int slot
, int func
, size_t stolen_size
)
310 return i830_mem_size() - i845_tseg_size() - stolen_size
;
313 static u32 __init
i85x_stolen_base(int num
, int slot
, int func
, size_t stolen_size
)
315 return i85x_mem_size() - i85x_tseg_size() - stolen_size
;
318 static u32 __init
i865_stolen_base(int num
, int slot
, int func
, size_t stolen_size
)
321 * FIXME is the graphics stolen memory region
322 * always at TOUD? Ie. is it always the last
323 * one to be allocated by the BIOS?
325 return read_pci_config_16(0, 0, 0, I865_TOUD
) << 16;
328 static size_t __init
i830_stolen_size(int num
, int slot
, int func
)
333 gmch_ctrl
= read_pci_config_16(0, 0, 0, I830_GMCH_CTRL
);
335 switch (gmch_ctrl
& I830_GMCH_GMS_MASK
) {
336 case I830_GMCH_GMS_STOLEN_512
:
337 stolen_size
= KB(512);
339 case I830_GMCH_GMS_STOLEN_1024
:
342 case I830_GMCH_GMS_STOLEN_8192
:
345 case I830_GMCH_GMS_LOCAL
:
346 /* local memory isn't part of the normal address space */
356 static size_t __init
gen3_stolen_size(int num
, int slot
, int func
)
361 gmch_ctrl
= read_pci_config_16(0, 0, 0, I830_GMCH_CTRL
);
363 switch (gmch_ctrl
& I855_GMCH_GMS_MASK
) {
364 case I855_GMCH_GMS_STOLEN_1M
:
367 case I855_GMCH_GMS_STOLEN_4M
:
370 case I855_GMCH_GMS_STOLEN_8M
:
373 case I855_GMCH_GMS_STOLEN_16M
:
374 stolen_size
= MB(16);
376 case I855_GMCH_GMS_STOLEN_32M
:
377 stolen_size
= MB(32);
379 case I915_GMCH_GMS_STOLEN_48M
:
380 stolen_size
= MB(48);
382 case I915_GMCH_GMS_STOLEN_64M
:
383 stolen_size
= MB(64);
385 case G33_GMCH_GMS_STOLEN_128M
:
386 stolen_size
= MB(128);
388 case G33_GMCH_GMS_STOLEN_256M
:
389 stolen_size
= MB(256);
391 case INTEL_GMCH_GMS_STOLEN_96M
:
392 stolen_size
= MB(96);
394 case INTEL_GMCH_GMS_STOLEN_160M
:
395 stolen_size
= MB(160);
397 case INTEL_GMCH_GMS_STOLEN_224M
:
398 stolen_size
= MB(224);
400 case INTEL_GMCH_GMS_STOLEN_352M
:
401 stolen_size
= MB(352);
411 static size_t __init
gen6_stolen_size(int num
, int slot
, int func
)
415 gmch_ctrl
= read_pci_config_16(num
, slot
, func
, SNB_GMCH_CTRL
);
416 gmch_ctrl
>>= SNB_GMCH_GMS_SHIFT
;
417 gmch_ctrl
&= SNB_GMCH_GMS_MASK
;
419 return gmch_ctrl
<< 25; /* 32 MB units */
422 static size_t __init
gen8_stolen_size(int num
, int slot
, int func
)
426 gmch_ctrl
= read_pci_config_16(num
, slot
, func
, SNB_GMCH_CTRL
);
427 gmch_ctrl
>>= BDW_GMCH_GMS_SHIFT
;
428 gmch_ctrl
&= BDW_GMCH_GMS_MASK
;
429 return gmch_ctrl
<< 25; /* 32 MB units */
432 static size_t __init
chv_stolen_size(int num
, int slot
, int func
)
436 gmch_ctrl
= read_pci_config_16(num
, slot
, func
, SNB_GMCH_CTRL
);
437 gmch_ctrl
>>= SNB_GMCH_GMS_SHIFT
;
438 gmch_ctrl
&= SNB_GMCH_GMS_MASK
;
441 * 0x0 to 0x10: 32MB increments starting at 0MB
442 * 0x11 to 0x16: 4MB increments starting at 8MB
443 * 0x17 to 0x1d: 4MB increments start at 36MB
445 if (gmch_ctrl
< 0x11)
446 return gmch_ctrl
<< 25;
447 else if (gmch_ctrl
< 0x17)
448 return (gmch_ctrl
- 0x11 + 2) << 22;
450 return (gmch_ctrl
- 0x17 + 9) << 22;
453 struct intel_stolen_funcs
{
454 size_t (*size
)(int num
, int slot
, int func
);
455 u32 (*base
)(int num
, int slot
, int func
, size_t size
);
458 static size_t __init
gen9_stolen_size(int num
, int slot
, int func
)
462 gmch_ctrl
= read_pci_config_16(num
, slot
, func
, SNB_GMCH_CTRL
);
463 gmch_ctrl
>>= BDW_GMCH_GMS_SHIFT
;
464 gmch_ctrl
&= BDW_GMCH_GMS_MASK
;
466 if (gmch_ctrl
< 0xf0)
467 return gmch_ctrl
<< 25; /* 32 MB units */
469 /* 4MB increments starting at 0xf0 for 4MB */
470 return (gmch_ctrl
- 0xf0 + 1) << 22;
473 typedef size_t (*stolen_size_fn
)(int num
, int slot
, int func
);
475 static const struct intel_stolen_funcs i830_stolen_funcs __initconst
= {
476 .base
= i830_stolen_base
,
477 .size
= i830_stolen_size
,
480 static const struct intel_stolen_funcs i845_stolen_funcs __initconst
= {
481 .base
= i845_stolen_base
,
482 .size
= i830_stolen_size
,
485 static const struct intel_stolen_funcs i85x_stolen_funcs __initconst
= {
486 .base
= i85x_stolen_base
,
487 .size
= gen3_stolen_size
,
490 static const struct intel_stolen_funcs i865_stolen_funcs __initconst
= {
491 .base
= i865_stolen_base
,
492 .size
= gen3_stolen_size
,
495 static const struct intel_stolen_funcs gen3_stolen_funcs __initconst
= {
496 .base
= intel_stolen_base
,
497 .size
= gen3_stolen_size
,
500 static const struct intel_stolen_funcs gen6_stolen_funcs __initconst
= {
501 .base
= intel_stolen_base
,
502 .size
= gen6_stolen_size
,
505 static const struct intel_stolen_funcs gen8_stolen_funcs __initconst
= {
506 .base
= intel_stolen_base
,
507 .size
= gen8_stolen_size
,
510 static const struct intel_stolen_funcs gen9_stolen_funcs __initconst
= {
511 .base
= intel_stolen_base
,
512 .size
= gen9_stolen_size
,
515 static const struct intel_stolen_funcs chv_stolen_funcs __initconst
= {
516 .base
= intel_stolen_base
,
517 .size
= chv_stolen_size
,
520 static const struct pci_device_id intel_stolen_ids
[] __initconst
= {
521 INTEL_I830_IDS(&i830_stolen_funcs
),
522 INTEL_I845G_IDS(&i845_stolen_funcs
),
523 INTEL_I85X_IDS(&i85x_stolen_funcs
),
524 INTEL_I865G_IDS(&i865_stolen_funcs
),
525 INTEL_I915G_IDS(&gen3_stolen_funcs
),
526 INTEL_I915GM_IDS(&gen3_stolen_funcs
),
527 INTEL_I945G_IDS(&gen3_stolen_funcs
),
528 INTEL_I945GM_IDS(&gen3_stolen_funcs
),
529 INTEL_VLV_M_IDS(&gen6_stolen_funcs
),
530 INTEL_VLV_D_IDS(&gen6_stolen_funcs
),
531 INTEL_PINEVIEW_IDS(&gen3_stolen_funcs
),
532 INTEL_I965G_IDS(&gen3_stolen_funcs
),
533 INTEL_G33_IDS(&gen3_stolen_funcs
),
534 INTEL_I965GM_IDS(&gen3_stolen_funcs
),
535 INTEL_GM45_IDS(&gen3_stolen_funcs
),
536 INTEL_G45_IDS(&gen3_stolen_funcs
),
537 INTEL_IRONLAKE_D_IDS(&gen3_stolen_funcs
),
538 INTEL_IRONLAKE_M_IDS(&gen3_stolen_funcs
),
539 INTEL_SNB_D_IDS(&gen6_stolen_funcs
),
540 INTEL_SNB_M_IDS(&gen6_stolen_funcs
),
541 INTEL_IVB_M_IDS(&gen6_stolen_funcs
),
542 INTEL_IVB_D_IDS(&gen6_stolen_funcs
),
543 INTEL_HSW_D_IDS(&gen6_stolen_funcs
),
544 INTEL_HSW_M_IDS(&gen6_stolen_funcs
),
545 INTEL_BDW_M_IDS(&gen8_stolen_funcs
),
546 INTEL_BDW_D_IDS(&gen8_stolen_funcs
),
547 INTEL_CHV_IDS(&chv_stolen_funcs
),
548 INTEL_SKL_IDS(&gen9_stolen_funcs
),
549 INTEL_BXT_IDS(&gen9_stolen_funcs
),
552 static void __init
intel_graphics_stolen(int num
, int slot
, int func
)
557 u16 device
, subvendor
, subdevice
;
559 device
= read_pci_config_16(num
, slot
, func
, PCI_DEVICE_ID
);
560 subvendor
= read_pci_config_16(num
, slot
, func
,
561 PCI_SUBSYSTEM_VENDOR_ID
);
562 subdevice
= read_pci_config_16(num
, slot
, func
, PCI_SUBSYSTEM_ID
);
564 for (i
= 0; i
< ARRAY_SIZE(intel_stolen_ids
); i
++) {
565 if (intel_stolen_ids
[i
].device
== device
) {
566 const struct intel_stolen_funcs
*stolen_funcs
=
567 (const struct intel_stolen_funcs
*)intel_stolen_ids
[i
].driver_data
;
568 size
= stolen_funcs
->size(num
, slot
, func
);
569 start
= stolen_funcs
->base(num
, slot
, func
, size
);
571 printk(KERN_INFO
"Reserving Intel graphics stolen memory at 0x%x-0x%x\n",
572 start
, start
+ (u32
)size
- 1);
573 /* Mark this space as reserved */
574 e820_add_region(start
, size
, E820_RESERVED
);
575 sanitize_e820_map(e820
.map
,
576 ARRAY_SIZE(e820
.map
),
584 static void __init
force_disable_hpet(int num
, int slot
, int func
)
586 #ifdef CONFIG_HPET_TIMER
587 boot_hpet_disable
= true;
588 pr_info("x86/hpet: Will disable the HPET for this platform because it's not reliable\n");
593 #define QFLAG_APPLY_ONCE 0x1
594 #define QFLAG_APPLIED 0x2
595 #define QFLAG_DONE (QFLAG_APPLY_ONCE|QFLAG_APPLIED)
602 void (*f
)(int num
, int slot
, int func
);
606 * Only works for devices on the root bus. If you add any devices
607 * not on bus 0 readd another loop level in early_quirks(). But
608 * be careful because at least the Nvidia quirk here relies on
609 * only matching on bus 0.
611 static struct chipset early_qrk
[] __initdata
= {
612 { PCI_VENDOR_ID_NVIDIA
, PCI_ANY_ID
,
613 PCI_CLASS_BRIDGE_PCI
, PCI_ANY_ID
, QFLAG_APPLY_ONCE
, nvidia_bugs
},
614 { PCI_VENDOR_ID_VIA
, PCI_ANY_ID
,
615 PCI_CLASS_BRIDGE_PCI
, PCI_ANY_ID
, QFLAG_APPLY_ONCE
, via_bugs
},
616 { PCI_VENDOR_ID_AMD
, PCI_DEVICE_ID_AMD_K8_NB
,
617 PCI_CLASS_BRIDGE_HOST
, PCI_ANY_ID
, 0, fix_hypertransport_config
},
618 { PCI_VENDOR_ID_ATI
, PCI_DEVICE_ID_ATI_IXP400_SMBUS
,
619 PCI_CLASS_SERIAL_SMBUS
, PCI_ANY_ID
, 0, ati_bugs
},
620 { PCI_VENDOR_ID_ATI
, PCI_DEVICE_ID_ATI_SBX00_SMBUS
,
621 PCI_CLASS_SERIAL_SMBUS
, PCI_ANY_ID
, 0, ati_bugs_contd
},
622 { PCI_VENDOR_ID_INTEL
, 0x3403, PCI_CLASS_BRIDGE_HOST
,
623 PCI_BASE_CLASS_BRIDGE
, 0, intel_remapping_check
},
624 { PCI_VENDOR_ID_INTEL
, 0x3405, PCI_CLASS_BRIDGE_HOST
,
625 PCI_BASE_CLASS_BRIDGE
, 0, intel_remapping_check
},
626 { PCI_VENDOR_ID_INTEL
, 0x3406, PCI_CLASS_BRIDGE_HOST
,
627 PCI_BASE_CLASS_BRIDGE
, 0, intel_remapping_check
},
628 { PCI_VENDOR_ID_INTEL
, PCI_ANY_ID
, PCI_CLASS_DISPLAY_VGA
, PCI_ANY_ID
,
629 QFLAG_APPLY_ONCE
, intel_graphics_stolen
},
631 * HPET on the current version of the Baytrail platform has accuracy
632 * problems: it will halt in deep idle state - so we disable it.
634 * More details can be found in section 18.10.1.3 of the datasheet:
636 * http://www.intel.com/content/dam/www/public/us/en/documents/datasheets/atom-z8000-datasheet-vol-1.pdf
638 { PCI_VENDOR_ID_INTEL
, 0x0f00,
639 PCI_CLASS_BRIDGE_HOST
, PCI_ANY_ID
, 0, force_disable_hpet
},
644 * check_dev_quirk - apply early quirks to a given PCI device
647 * @func: PCI function
649 * Check the vendor & device ID against the early quirks table.
651 * If the device is single function, let early_quirks() know so we don't
652 * poke at this device again.
654 static int __init
check_dev_quirk(int num
, int slot
, int func
)
662 class = read_pci_config_16(num
, slot
, func
, PCI_CLASS_DEVICE
);
665 return -1; /* no class, treat as single function */
667 vendor
= read_pci_config_16(num
, slot
, func
, PCI_VENDOR_ID
);
669 device
= read_pci_config_16(num
, slot
, func
, PCI_DEVICE_ID
);
671 for (i
= 0; early_qrk
[i
].f
!= NULL
; i
++) {
672 if (((early_qrk
[i
].vendor
== PCI_ANY_ID
) ||
673 (early_qrk
[i
].vendor
== vendor
)) &&
674 ((early_qrk
[i
].device
== PCI_ANY_ID
) ||
675 (early_qrk
[i
].device
== device
)) &&
676 (!((early_qrk
[i
].class ^ class) &
677 early_qrk
[i
].class_mask
))) {
678 if ((early_qrk
[i
].flags
&
679 QFLAG_DONE
) != QFLAG_DONE
)
680 early_qrk
[i
].f(num
, slot
, func
);
681 early_qrk
[i
].flags
|= QFLAG_APPLIED
;
685 type
= read_pci_config_byte(num
, slot
, func
,
693 void __init
early_quirks(void)
697 if (!early_pci_allowed())
700 /* Poor man's PCI discovery */
701 /* Only scan the root bus */
702 for (slot
= 0; slot
< 32; slot
++)
703 for (func
= 0; func
< 8; func
++) {
704 /* Only probe function 0 on single fn devices */
705 if (check_dev_quirk(0, slot
, func
))