1 // SPDX-License-Identifier: GPL-2.0
3 * Firmware replacement code.
5 * Work around broken BIOSes that don't set an aperture, only set the
6 * aperture in the AGP bridge, or set too small aperture.
8 * If all fails map the aperture over some low memory. This is cheaper than
9 * doing bounce buffering. The memory is lost. This is done at early boot
10 * because only the bootmem allocator can allocate 32+MB.
12 * Copyright 2002 Andi Kleen, SuSE Labs.
14 #define pr_fmt(fmt) "AGP: " fmt
16 #include <linux/kernel.h>
17 #include <linux/types.h>
18 #include <linux/init.h>
19 #include <linux/memblock.h>
20 #include <linux/mmzone.h>
21 #include <linux/pci_ids.h>
22 #include <linux/pci.h>
23 #include <linux/bitops.h>
24 #include <linux/suspend.h>
25 #include <asm/e820/api.h>
27 #include <asm/iommu.h>
29 #include <asm/pci-direct.h>
31 #include <asm/amd_nb.h>
32 #include <asm/x86_init.h>
33 #include <linux/crash_dump.h>
36 * Using 512M as goal, in case kexec will load kernel_big
37 * that will do the on-position decompress, and could overlap with
38 * with the gart aperture that is used.
41 * ==> kexec (with kdump trigger path or gart still enabled)
42 * ==> kernel_small (gart area become e820_reserved)
43 * ==> kexec (with kdump trigger path or gart still enabled)
44 * ==> kerne_big (uncompressed size will be big than 64M or 128M)
45 * So don't use 512M below as gart iommu, leave the space for kernel
48 #define GART_MIN_ADDR (512ULL << 20)
49 #define GART_MAX_ADDR (1ULL << 32)
51 int gart_iommu_aperture
;
52 int gart_iommu_aperture_disabled __initdata
;
53 int gart_iommu_aperture_allowed __initdata
;
55 int fallback_aper_order __initdata
= 1; /* 64MB */
56 int fallback_aper_force __initdata
;
58 int fix_aperture __initdata
= 1;
60 #ifdef CONFIG_PROC_VMCORE
62 * If the first kernel maps the aperture over e820 RAM, the kdump kernel will
63 * use the same range because it will remain configured in the northbridge.
64 * Trying to dump this area via /proc/vmcore may crash the machine, so exclude
67 static unsigned long aperture_pfn_start
, aperture_page_count
;
69 static int gart_oldmem_pfn_is_ram(unsigned long pfn
)
71 return likely((pfn
< aperture_pfn_start
) ||
72 (pfn
>= aperture_pfn_start
+ aperture_page_count
));
75 static void exclude_from_vmcore(u64 aper_base
, u32 aper_order
)
77 aperture_pfn_start
= aper_base
>> PAGE_SHIFT
;
78 aperture_page_count
= (32 * 1024 * 1024) << aper_order
>> PAGE_SHIFT
;
79 WARN_ON(register_oldmem_pfn_is_ram(&gart_oldmem_pfn_is_ram
));
82 static void exclude_from_vmcore(u64 aper_base
, u32 aper_order
)
87 /* This code runs before the PCI subsystem is initialized, so just
88 access the northbridge directly. */
90 static u32 __init
allocate_aperture(void)
95 /* aper_size should <= 1G */
96 if (fallback_aper_order
> 5)
97 fallback_aper_order
= 5;
98 aper_size
= (32 * 1024 * 1024) << fallback_aper_order
;
101 * Aperture has to be naturally aligned. This means a 2GB aperture
102 * won't have much chance of finding a place in the lower 4GB of
103 * memory. Unfortunately we cannot move it up because that would
104 * make the IOMMU useless.
106 addr
= memblock_find_in_range(GART_MIN_ADDR
, GART_MAX_ADDR
,
107 aper_size
, aper_size
);
109 pr_err("Cannot allocate aperture memory hole [mem %#010lx-%#010lx] (%uKB)\n",
110 addr
, addr
+ aper_size
- 1, aper_size
>> 10);
113 memblock_reserve(addr
, aper_size
);
114 pr_info("Mapping aperture over RAM [mem %#010lx-%#010lx] (%uKB)\n",
115 addr
, addr
+ aper_size
- 1, aper_size
>> 10);
116 register_nosave_region(addr
>> PAGE_SHIFT
,
117 (addr
+aper_size
) >> PAGE_SHIFT
);
123 /* Find a PCI capability */
124 static u32 __init
find_cap(int bus
, int slot
, int func
, int cap
)
129 if (!(read_pci_config_16(bus
, slot
, func
, PCI_STATUS
) &
130 PCI_STATUS_CAP_LIST
))
133 pos
= read_pci_config_byte(bus
, slot
, func
, PCI_CAPABILITY_LIST
);
134 for (bytes
= 0; bytes
< 48 && pos
>= 0x40; bytes
++) {
138 id
= read_pci_config_byte(bus
, slot
, func
, pos
+PCI_CAP_LIST_ID
);
143 pos
= read_pci_config_byte(bus
, slot
, func
,
144 pos
+PCI_CAP_LIST_NEXT
);
149 /* Read a standard AGPv3 bridge header */
150 static u32 __init
read_agp(int bus
, int slot
, int func
, int cap
, u32
*order
)
155 u32 aper_low
, aper_hi
;
159 pr_info("pci 0000:%02x:%02x:%02x: AGP bridge\n", bus
, slot
, func
);
160 apsizereg
= read_pci_config_16(bus
, slot
, func
, cap
+ 0x14);
161 if (apsizereg
== 0xffffffff) {
162 pr_err("pci 0000:%02x:%02x.%d: APSIZE unreadable\n",
167 /* old_order could be the value from NB gart setting */
170 apsize
= apsizereg
& 0xfff;
171 /* Some BIOS use weird encodings not in the AGPv3 table. */
174 nbits
= hweight16(apsize
);
176 if ((int)*order
< 0) /* < 32MB */
179 aper_low
= read_pci_config(bus
, slot
, func
, 0x10);
180 aper_hi
= read_pci_config(bus
, slot
, func
, 0x14);
181 aper
= (aper_low
& ~((1<<22)-1)) | ((u64
)aper_hi
<< 32);
184 * On some sick chips, APSIZE is 0. It means it wants 4G
185 * so let double check that order, and lets trust AMD NB settings:
187 pr_info("pci 0000:%02x:%02x.%d: AGP aperture [bus addr %#010Lx-%#010Lx] (old size %uMB)\n",
188 bus
, slot
, func
, aper
, aper
+ (32ULL << (old_order
+ 20)) - 1,
190 if (aper
+ (32ULL<<(20 + *order
)) > 0x100000000ULL
) {
191 pr_info("pci 0000:%02x:%02x.%d: AGP aperture size %uMB (APSIZE %#x) is not right, using settings from NB\n",
192 bus
, slot
, func
, 32 << *order
, apsizereg
);
196 pr_info("pci 0000:%02x:%02x.%d: AGP aperture [bus addr %#010Lx-%#010Lx] (%uMB, APSIZE %#x)\n",
197 bus
, slot
, func
, aper
, aper
+ (32ULL << (*order
+ 20)) - 1,
198 32 << *order
, apsizereg
);
200 if (!aperture_valid(aper
, (32*1024*1024) << *order
, 32<<20))
206 * Look for an AGP bridge. Windows only expects the aperture in the
207 * AGP bridge and some BIOS forget to initialize the Northbridge too.
208 * Work around this here.
210 * Do an PCI bus scan by hand because we're running before the PCI
213 * All AMD AGP bridges are AGPv3 compliant, so we can do this scan
214 * generically. It's probably overkill to always scan all slots because
215 * the AGP bridges should be always an own bus on the HT hierarchy,
216 * but do it here for future safety.
218 static u32 __init
search_agp_bridge(u32
*order
, int *valid_agp
)
222 /* Poor man's PCI discovery */
223 for (bus
= 0; bus
< 256; bus
++) {
224 for (slot
= 0; slot
< 32; slot
++) {
225 for (func
= 0; func
< 8; func
++) {
228 class = read_pci_config(bus
, slot
, func
,
230 if (class == 0xffffffff)
233 switch (class >> 16) {
234 case PCI_CLASS_BRIDGE_HOST
:
235 case PCI_CLASS_BRIDGE_OTHER
: /* needed? */
237 cap
= find_cap(bus
, slot
, func
,
242 return read_agp(bus
, slot
, func
, cap
,
246 /* No multi-function device? */
247 type
= read_pci_config_byte(bus
, slot
, func
,
254 pr_info("No AGP bridge found\n");
259 static bool gart_fix_e820 __initdata
= true;
261 static int __init
parse_gart_mem(char *p
)
263 return kstrtobool(p
, &gart_fix_e820
);
265 early_param("gart_fix_e820", parse_gart_mem
);
268 * With kexec/kdump, if the first kernel doesn't shut down the GART and the
269 * second kernel allocates a different GART region, there might be two
270 * overlapping GART regions present:
272 * - the first still used by the GART initialized in the first kernel.
273 * - (sub-)set of it used as normal RAM by the second kernel.
275 * which leads to memory corruptions and a kernel panic eventually.
277 * This can also happen if the BIOS has forgotten to mark the GART region
280 * Try to update the e820 map to mark that new region as reserved.
282 void __init
early_gart_iommu_check(void)
284 u32 agp_aper_order
= 0;
285 int i
, fix
, slot
, valid_agp
= 0;
287 u32 aper_size
= 0, aper_order
= 0, last_aper_order
= 0;
288 u64 aper_base
= 0, last_aper_base
= 0;
289 int aper_enabled
= 0, last_aper_enabled
= 0, last_valid
= 0;
291 if (!amd_gart_present())
294 if (!early_pci_allowed())
297 /* This is mostly duplicate of iommu_hole_init */
298 search_agp_bridge(&agp_aper_order
, &valid_agp
);
301 for (i
= 0; amd_nb_bus_dev_ranges
[i
].dev_limit
; i
++) {
303 int dev_base
, dev_limit
;
305 bus
= amd_nb_bus_dev_ranges
[i
].bus
;
306 dev_base
= amd_nb_bus_dev_ranges
[i
].dev_base
;
307 dev_limit
= amd_nb_bus_dev_ranges
[i
].dev_limit
;
309 for (slot
= dev_base
; slot
< dev_limit
; slot
++) {
310 if (!early_is_amd_nb(read_pci_config(bus
, slot
, 3, 0x00)))
313 ctl
= read_pci_config(bus
, slot
, 3, AMD64_GARTAPERTURECTL
);
314 aper_enabled
= ctl
& GARTEN
;
315 aper_order
= (ctl
>> 1) & 7;
316 aper_size
= (32 * 1024 * 1024) << aper_order
;
317 aper_base
= read_pci_config(bus
, slot
, 3, AMD64_GARTAPERTUREBASE
) & 0x7fff;
321 if ((aper_order
!= last_aper_order
) ||
322 (aper_base
!= last_aper_base
) ||
323 (aper_enabled
!= last_aper_enabled
)) {
329 last_aper_order
= aper_order
;
330 last_aper_base
= aper_base
;
331 last_aper_enabled
= aper_enabled
;
336 if (!fix
&& !aper_enabled
)
339 if (!aper_base
|| !aper_size
|| aper_base
+ aper_size
> 0x100000000UL
)
342 if (gart_fix_e820
&& !fix
&& aper_enabled
) {
343 if (e820__mapped_any(aper_base
, aper_base
+ aper_size
,
345 /* reserve it, so we can reuse it in second kernel */
346 pr_info("e820: reserve [mem %#010Lx-%#010Lx] for GART\n",
347 aper_base
, aper_base
+ aper_size
- 1);
348 e820__range_add(aper_base
, aper_size
, E820_TYPE_RESERVED
);
349 e820__update_table_print();
356 /* disable them all at first */
357 for (i
= 0; i
< amd_nb_bus_dev_ranges
[i
].dev_limit
; i
++) {
359 int dev_base
, dev_limit
;
361 bus
= amd_nb_bus_dev_ranges
[i
].bus
;
362 dev_base
= amd_nb_bus_dev_ranges
[i
].dev_base
;
363 dev_limit
= amd_nb_bus_dev_ranges
[i
].dev_limit
;
365 for (slot
= dev_base
; slot
< dev_limit
; slot
++) {
366 if (!early_is_amd_nb(read_pci_config(bus
, slot
, 3, 0x00)))
369 ctl
= read_pci_config(bus
, slot
, 3, AMD64_GARTAPERTURECTL
);
371 write_pci_config(bus
, slot
, 3, AMD64_GARTAPERTURECTL
, ctl
);
377 static int __initdata printed_gart_size_msg
;
379 int __init
gart_iommu_hole_init(void)
381 u32 agp_aper_base
= 0, agp_aper_order
= 0;
382 u32 aper_size
, aper_alloc
= 0, aper_order
= 0, last_aper_order
= 0;
383 u64 aper_base
, last_aper_base
= 0;
384 int fix
, slot
, valid_agp
= 0;
387 if (!amd_gart_present())
390 if (gart_iommu_aperture_disabled
|| !fix_aperture
||
391 !early_pci_allowed())
394 pr_info("Checking aperture...\n");
396 if (!fallback_aper_force
)
397 agp_aper_base
= search_agp_bridge(&agp_aper_order
, &valid_agp
);
401 for (i
= 0; i
< amd_nb_bus_dev_ranges
[i
].dev_limit
; i
++) {
403 int dev_base
, dev_limit
;
406 bus
= amd_nb_bus_dev_ranges
[i
].bus
;
407 dev_base
= amd_nb_bus_dev_ranges
[i
].dev_base
;
408 dev_limit
= amd_nb_bus_dev_ranges
[i
].dev_limit
;
410 for (slot
= dev_base
; slot
< dev_limit
; slot
++) {
411 if (!early_is_amd_nb(read_pci_config(bus
, slot
, 3, 0x00)))
415 gart_iommu_aperture
= 1;
416 x86_init
.iommu
.iommu_init
= gart_iommu_init
;
418 ctl
= read_pci_config(bus
, slot
, 3,
419 AMD64_GARTAPERTURECTL
);
422 * Before we do anything else disable the GART. It may
423 * still be enabled if we boot into a crash-kernel here.
424 * Reconfiguring the GART while it is enabled could have
425 * unknown side-effects.
428 write_pci_config(bus
, slot
, 3, AMD64_GARTAPERTURECTL
, ctl
);
430 aper_order
= (ctl
>> 1) & 7;
431 aper_size
= (32 * 1024 * 1024) << aper_order
;
432 aper_base
= read_pci_config(bus
, slot
, 3, AMD64_GARTAPERTUREBASE
) & 0x7fff;
435 pr_info("Node %d: aperture [bus addr %#010Lx-%#010Lx] (%uMB)\n",
436 node
, aper_base
, aper_base
+ aper_size
- 1,
440 if (!aperture_valid(aper_base
, aper_size
, 64<<20)) {
441 if (valid_agp
&& agp_aper_base
&&
442 agp_aper_base
== aper_base
&&
443 agp_aper_order
== aper_order
) {
444 /* the same between two setting from NB and agp */
446 max_pfn
> MAX_DMA32_PFN
&&
447 !printed_gart_size_msg
) {
448 pr_err("you are using iommu with agp, but GART size is less than 64MB\n");
449 pr_err("please increase GART size in your BIOS setup\n");
450 pr_err("if BIOS doesn't have that option, contact your HW vendor!\n");
451 printed_gart_size_msg
= 1;
459 if ((last_aper_order
&& aper_order
!= last_aper_order
) ||
460 (last_aper_base
&& aper_base
!= last_aper_base
)) {
464 last_aper_order
= aper_order
;
465 last_aper_base
= aper_base
;
470 if (!fix
&& !fallback_aper_force
) {
471 if (last_aper_base
) {
473 * If this is the kdump kernel, the first kernel
474 * may have allocated the range over its e820 RAM
475 * and fixed up the northbridge
477 exclude_from_vmcore(last_aper_base
, last_aper_order
);
484 if (!fallback_aper_force
) {
485 aper_alloc
= agp_aper_base
;
486 aper_order
= agp_aper_order
;
490 /* Got the aperture from the AGP bridge */
491 } else if ((!no_iommu
&& max_pfn
> MAX_DMA32_PFN
) ||
494 fallback_aper_force
) {
495 pr_info("Your BIOS doesn't leave an aperture memory hole\n");
496 pr_info("Please enable the IOMMU option in the BIOS setup\n");
497 pr_info("This costs you %dMB of RAM\n",
498 32 << fallback_aper_order
);
500 aper_order
= fallback_aper_order
;
501 aper_alloc
= allocate_aperture();
504 * Could disable AGP and IOMMU here, but it's
505 * probably not worth it. But the later users
506 * cannot deal with bad apertures and turning
507 * on the aperture over memory causes very
508 * strange problems, so it's better to panic
511 panic("Not enough memory for aperture");
518 * If this is the kdump kernel _and_ the first kernel did not
519 * configure the aperture in the northbridge, this range may
520 * overlap with the first kernel's memory. We can't access the
521 * range through vmcore even though it should be part of the dump.
523 exclude_from_vmcore(aper_alloc
, aper_order
);
525 /* Fix up the north bridges */
526 for (i
= 0; i
< amd_nb_bus_dev_ranges
[i
].dev_limit
; i
++) {
527 int bus
, dev_base
, dev_limit
;
530 * Don't enable translation yet but enable GART IO and CPU
531 * accesses and set DISTLBWALKPRB since GART table memory is UC.
533 u32 ctl
= aper_order
<< 1;
535 bus
= amd_nb_bus_dev_ranges
[i
].bus
;
536 dev_base
= amd_nb_bus_dev_ranges
[i
].dev_base
;
537 dev_limit
= amd_nb_bus_dev_ranges
[i
].dev_limit
;
538 for (slot
= dev_base
; slot
< dev_limit
; slot
++) {
539 if (!early_is_amd_nb(read_pci_config(bus
, slot
, 3, 0x00)))
542 write_pci_config(bus
, slot
, 3, AMD64_GARTAPERTURECTL
, ctl
);
543 write_pci_config(bus
, slot
, 3, AMD64_GARTAPERTUREBASE
, aper_alloc
>> 25);
547 set_up_gart_resume(aper_order
, aper_alloc
);