[PATCH] i386: Enforce GPLness of VMI ROM
[deliverable/linux.git] / arch / x86_64 / kernel / pci-gart.c
CommitLineData
1da177e4
LT
1/*
2 * Dynamic DMA mapping support for AMD Hammer.
3 *
4 * Use the integrated AGP GART in the Hammer northbridge as an IOMMU for PCI.
5 * This allows to use PCI devices that only support 32bit addresses on systems
6 * with more than 4GB.
7 *
8 * See Documentation/DMA-mapping.txt for the interface specification.
9 *
10 * Copyright 2002 Andi Kleen, SuSE Labs.
11 */
12
1da177e4
LT
13#include <linux/types.h>
14#include <linux/ctype.h>
15#include <linux/agp_backend.h>
16#include <linux/init.h>
17#include <linux/mm.h>
18#include <linux/string.h>
19#include <linux/spinlock.h>
20#include <linux/pci.h>
21#include <linux/module.h>
22#include <linux/topology.h>
23#include <linux/interrupt.h>
24#include <linux/bitops.h>
25#include <asm/atomic.h>
26#include <asm/io.h>
27#include <asm/mtrr.h>
28#include <asm/pgtable.h>
29#include <asm/proto.h>
30#include <asm/cacheflush.h>
31#include <asm/kdebug.h>
17a941d8
MBY
32#include <asm/swiotlb.h>
33#include <asm/dma.h>
a32073bf 34#include <asm/k8.h>
1da177e4
LT
35
36unsigned long iommu_bus_base; /* GART remapping area (physical) */
37static unsigned long iommu_size; /* size of remapping area bytes */
38static unsigned long iommu_pages; /* .. and in pages */
39
40u32 *iommu_gatt_base; /* Remapping table */
41
1da177e4
LT
42/* If this is disabled the IOMMU will use an optimized flushing strategy
43 of only flushing when an mapping is reused. With it true the GART is flushed
44 for every mapping. Problem is that doing the lazy flush seems to trigger
45 bugs with some popular PCI cards, in particular 3ware (but has been also
46 also seen with Qlogic at least). */
47int iommu_fullflush = 1;
48
1da177e4
LT
49/* Allocation bitmap for the remapping area */
50static DEFINE_SPINLOCK(iommu_bitmap_lock);
51static unsigned long *iommu_gart_bitmap; /* guarded by iommu_bitmap_lock */
52
53static u32 gart_unmapped_entry;
54
55#define GPTE_VALID 1
56#define GPTE_COHERENT 2
57#define GPTE_ENCODE(x) \
58 (((x) & 0xfffff000) | (((x) >> 32) << 4) | GPTE_VALID | GPTE_COHERENT)
59#define GPTE_DECODE(x) (((x) & 0xfffff000) | (((u64)(x) & 0xff0) << 28))
60
61#define to_pages(addr,size) \
62 (round_up(((addr) & ~PAGE_MASK) + (size), PAGE_SIZE) >> PAGE_SHIFT)
63
1da177e4
LT
64#define EMERGENCY_PAGES 32 /* = 128KB */
65
66#ifdef CONFIG_AGP
67#define AGPEXTERN extern
68#else
69#define AGPEXTERN
70#endif
71
72/* backdoor interface to AGP driver */
73AGPEXTERN int agp_memory_reserved;
74AGPEXTERN __u32 *agp_gatt_table;
75
76static unsigned long next_bit; /* protected by iommu_bitmap_lock */
77static int need_flush; /* global flush state. set for each gart wrap */
1da177e4
LT
78
79static unsigned long alloc_iommu(int size)
80{
81 unsigned long offset, flags;
82
83 spin_lock_irqsave(&iommu_bitmap_lock, flags);
84 offset = find_next_zero_string(iommu_gart_bitmap,next_bit,iommu_pages,size);
85 if (offset == -1) {
86 need_flush = 1;
f5adc9c7 87 offset = find_next_zero_string(iommu_gart_bitmap,0,iommu_pages,size);
1da177e4
LT
88 }
89 if (offset != -1) {
90 set_bit_string(iommu_gart_bitmap, offset, size);
91 next_bit = offset+size;
92 if (next_bit >= iommu_pages) {
93 next_bit = 0;
94 need_flush = 1;
95 }
96 }
97 if (iommu_fullflush)
98 need_flush = 1;
99 spin_unlock_irqrestore(&iommu_bitmap_lock, flags);
100 return offset;
101}
102
103static void free_iommu(unsigned long offset, int size)
104{
105 unsigned long flags;
1da177e4
LT
106 spin_lock_irqsave(&iommu_bitmap_lock, flags);
107 __clear_bit_string(iommu_gart_bitmap, offset, size);
108 spin_unlock_irqrestore(&iommu_bitmap_lock, flags);
109}
110
111/*
112 * Use global flush state to avoid races with multiple flushers.
113 */
a32073bf 114static void flush_gart(void)
1da177e4
LT
115{
116 unsigned long flags;
1da177e4 117 spin_lock_irqsave(&iommu_bitmap_lock, flags);
a32073bf
AK
118 if (need_flush) {
119 k8_flush_garts();
1da177e4
LT
120 need_flush = 0;
121 }
122 spin_unlock_irqrestore(&iommu_bitmap_lock, flags);
123}
124
1da177e4
LT
125#ifdef CONFIG_IOMMU_LEAK
126
127#define SET_LEAK(x) if (iommu_leak_tab) \
128 iommu_leak_tab[x] = __builtin_return_address(0);
129#define CLEAR_LEAK(x) if (iommu_leak_tab) \
130 iommu_leak_tab[x] = NULL;
131
132/* Debugging aid for drivers that don't free their IOMMU tables */
133static void **iommu_leak_tab;
134static int leak_trace;
135int iommu_leak_pages = 20;
136void dump_leak(void)
137{
138 int i;
139 static int dump;
140 if (dump || !iommu_leak_tab) return;
141 dump = 1;
142 show_stack(NULL,NULL);
143 /* Very crude. dump some from the end of the table too */
144 printk("Dumping %d pages from end of IOMMU:\n", iommu_leak_pages);
145 for (i = 0; i < iommu_leak_pages; i+=2) {
146 printk("%lu: ", iommu_pages-i);
147 printk_address((unsigned long) iommu_leak_tab[iommu_pages-i]);
148 printk("%c", (i+1)%2 == 0 ? '\n' : ' ');
149 }
150 printk("\n");
151}
152#else
153#define SET_LEAK(x)
154#define CLEAR_LEAK(x)
155#endif
156
17a941d8 157static void iommu_full(struct device *dev, size_t size, int dir)
1da177e4
LT
158{
159 /*
160 * Ran out of IOMMU space for this operation. This is very bad.
161 * Unfortunately the drivers cannot handle this operation properly.
162 * Return some non mapped prereserved space in the aperture and
163 * let the Northbridge deal with it. This will result in garbage
164 * in the IO operation. When the size exceeds the prereserved space
165 * memory corruption will occur or random memory will be DMAed
166 * out. Hopefully no network devices use single mappings that big.
167 */
168
169 printk(KERN_ERR
170 "PCI-DMA: Out of IOMMU space for %lu bytes at device %s\n",
171 size, dev->bus_id);
172
17a941d8 173 if (size > PAGE_SIZE*EMERGENCY_PAGES) {
1da177e4
LT
174 if (dir == PCI_DMA_FROMDEVICE || dir == PCI_DMA_BIDIRECTIONAL)
175 panic("PCI-DMA: Memory would be corrupted\n");
176 if (dir == PCI_DMA_TODEVICE || dir == PCI_DMA_BIDIRECTIONAL)
17a941d8 177 panic(KERN_ERR "PCI-DMA: Random memory would be DMAed\n");
1da177e4
LT
178 }
179
180#ifdef CONFIG_IOMMU_LEAK
181 dump_leak();
182#endif
183}
184
185static inline int need_iommu(struct device *dev, unsigned long addr, size_t size)
186{
187 u64 mask = *dev->dma_mask;
00edefae 188 int high = addr + size > mask;
1da177e4
LT
189 int mmu = high;
190 if (force_iommu)
191 mmu = 1;
1da177e4
LT
192 return mmu;
193}
194
195static inline int nonforced_iommu(struct device *dev, unsigned long addr, size_t size)
196{
197 u64 mask = *dev->dma_mask;
00edefae 198 int high = addr + size > mask;
1da177e4 199 int mmu = high;
1da177e4
LT
200 return mmu;
201}
202
203/* Map a single continuous physical area into the IOMMU.
204 * Caller needs to check if the iommu is needed and flush.
205 */
17a941d8
MBY
206static dma_addr_t dma_map_area(struct device *dev, dma_addr_t phys_mem,
207 size_t size, int dir)
1da177e4
LT
208{
209 unsigned long npages = to_pages(phys_mem, size);
210 unsigned long iommu_page = alloc_iommu(npages);
211 int i;
212 if (iommu_page == -1) {
213 if (!nonforced_iommu(dev, phys_mem, size))
214 return phys_mem;
215 if (panic_on_overflow)
216 panic("dma_map_area overflow %lu bytes\n", size);
17a941d8 217 iommu_full(dev, size, dir);
1da177e4
LT
218 return bad_dma_address;
219 }
220
221 for (i = 0; i < npages; i++) {
222 iommu_gatt_base[iommu_page + i] = GPTE_ENCODE(phys_mem);
223 SET_LEAK(iommu_page + i);
224 phys_mem += PAGE_SIZE;
225 }
226 return iommu_bus_base + iommu_page*PAGE_SIZE + (phys_mem & ~PAGE_MASK);
227}
228
17a941d8
MBY
229static dma_addr_t gart_map_simple(struct device *dev, char *buf,
230 size_t size, int dir)
231{
232 dma_addr_t map = dma_map_area(dev, virt_to_bus(buf), size, dir);
a32073bf 233 flush_gart();
17a941d8
MBY
234 return map;
235}
236
1da177e4 237/* Map a single area into the IOMMU */
17a941d8 238dma_addr_t gart_map_single(struct device *dev, void *addr, size_t size, int dir)
1da177e4
LT
239{
240 unsigned long phys_mem, bus;
241
1da177e4
LT
242 if (!dev)
243 dev = &fallback_dev;
244
245 phys_mem = virt_to_phys(addr);
246 if (!need_iommu(dev, phys_mem, size))
247 return phys_mem;
248
17a941d8 249 bus = gart_map_simple(dev, addr, size, dir);
1da177e4 250 return bus;
17a941d8
MBY
251}
252
7c2d9cd2
JM
253/*
254 * Free a DMA mapping.
255 */
256void gart_unmap_single(struct device *dev, dma_addr_t dma_addr,
257 size_t size, int direction)
258{
259 unsigned long iommu_page;
260 int npages;
261 int i;
262
263 if (dma_addr < iommu_bus_base + EMERGENCY_PAGES*PAGE_SIZE ||
264 dma_addr >= iommu_bus_base + iommu_size)
265 return;
266 iommu_page = (dma_addr - iommu_bus_base)>>PAGE_SHIFT;
267 npages = to_pages(dma_addr, size);
268 for (i = 0; i < npages; i++) {
269 iommu_gatt_base[iommu_page + i] = gart_unmapped_entry;
270 CLEAR_LEAK(iommu_page + i);
271 }
272 free_iommu(iommu_page, npages);
273}
274
17a941d8
MBY
275/*
276 * Wrapper for pci_unmap_single working with scatterlists.
277 */
278void gart_unmap_sg(struct device *dev, struct scatterlist *sg, int nents, int dir)
279{
280 int i;
281
282 for (i = 0; i < nents; i++) {
283 struct scatterlist *s = &sg[i];
60b08c67 284 if (!s->dma_length || !s->length)
17a941d8 285 break;
7c2d9cd2 286 gart_unmap_single(dev, s->dma_address, s->dma_length, dir);
17a941d8
MBY
287 }
288}
1da177e4
LT
289
290/* Fallback for dma_map_sg in case of overflow */
291static int dma_map_sg_nonforce(struct device *dev, struct scatterlist *sg,
292 int nents, int dir)
293{
294 int i;
295
296#ifdef CONFIG_IOMMU_DEBUG
297 printk(KERN_DEBUG "dma_map_sg overflow\n");
298#endif
299
300 for (i = 0; i < nents; i++ ) {
301 struct scatterlist *s = &sg[i];
302 unsigned long addr = page_to_phys(s->page) + s->offset;
303 if (nonforced_iommu(dev, addr, s->length)) {
17a941d8 304 addr = dma_map_area(dev, addr, s->length, dir);
1da177e4
LT
305 if (addr == bad_dma_address) {
306 if (i > 0)
17a941d8 307 gart_unmap_sg(dev, sg, i, dir);
1da177e4
LT
308 nents = 0;
309 sg[0].dma_length = 0;
310 break;
311 }
312 }
313 s->dma_address = addr;
314 s->dma_length = s->length;
315 }
a32073bf 316 flush_gart();
1da177e4
LT
317 return nents;
318}
319
320/* Map multiple scatterlist entries continuous into the first. */
321static int __dma_map_cont(struct scatterlist *sg, int start, int stopat,
322 struct scatterlist *sout, unsigned long pages)
323{
324 unsigned long iommu_start = alloc_iommu(pages);
325 unsigned long iommu_page = iommu_start;
326 int i;
327
328 if (iommu_start == -1)
329 return -1;
330
331 for (i = start; i < stopat; i++) {
332 struct scatterlist *s = &sg[i];
333 unsigned long pages, addr;
334 unsigned long phys_addr = s->dma_address;
335
336 BUG_ON(i > start && s->offset);
337 if (i == start) {
60b08c67 338 *sout = *s;
1da177e4
LT
339 sout->dma_address = iommu_bus_base;
340 sout->dma_address += iommu_page*PAGE_SIZE + s->offset;
341 sout->dma_length = s->length;
342 } else {
343 sout->dma_length += s->length;
344 }
345
346 addr = phys_addr;
347 pages = to_pages(s->offset, s->length);
348 while (pages--) {
349 iommu_gatt_base[iommu_page] = GPTE_ENCODE(addr);
350 SET_LEAK(iommu_page);
351 addr += PAGE_SIZE;
352 iommu_page++;
0d541064 353 }
1da177e4
LT
354 }
355 BUG_ON(iommu_page - iommu_start != pages);
356 return 0;
357}
358
359static inline int dma_map_cont(struct scatterlist *sg, int start, int stopat,
360 struct scatterlist *sout,
361 unsigned long pages, int need)
362{
363 if (!need) {
364 BUG_ON(stopat - start != 1);
60b08c67 365 *sout = sg[start];
1da177e4
LT
366 sout->dma_length = sg[start].length;
367 return 0;
368 }
369 return __dma_map_cont(sg, start, stopat, sout, pages);
370}
371
372/*
373 * DMA map all entries in a scatterlist.
374 * Merge chunks that have page aligned sizes into a continuous mapping.
375 */
17a941d8 376int gart_map_sg(struct device *dev, struct scatterlist *sg, int nents, int dir)
1da177e4
LT
377{
378 int i;
379 int out;
380 int start;
381 unsigned long pages = 0;
382 int need = 0, nextneed;
383
1da177e4
LT
384 if (nents == 0)
385 return 0;
386
1da177e4
LT
387 if (!dev)
388 dev = &fallback_dev;
389
390 out = 0;
391 start = 0;
392 for (i = 0; i < nents; i++) {
393 struct scatterlist *s = &sg[i];
394 dma_addr_t addr = page_to_phys(s->page) + s->offset;
395 s->dma_address = addr;
396 BUG_ON(s->length == 0);
397
398 nextneed = need_iommu(dev, addr, s->length);
399
400 /* Handle the previous not yet processed entries */
401 if (i > start) {
402 struct scatterlist *ps = &sg[i-1];
403 /* Can only merge when the last chunk ends on a page
404 boundary and the new one doesn't have an offset. */
405 if (!iommu_merge || !nextneed || !need || s->offset ||
406 (ps->offset + ps->length) % PAGE_SIZE) {
407 if (dma_map_cont(sg, start, i, sg+out, pages,
408 need) < 0)
409 goto error;
410 out++;
411 pages = 0;
412 start = i;
413 }
414 }
415
416 need = nextneed;
417 pages += to_pages(s->offset, s->length);
418 }
419 if (dma_map_cont(sg, start, i, sg+out, pages, need) < 0)
420 goto error;
421 out++;
a32073bf 422 flush_gart();
1da177e4
LT
423 if (out < nents)
424 sg[out].dma_length = 0;
425 return out;
426
427error:
a32073bf 428 flush_gart();
17a941d8 429 gart_unmap_sg(dev, sg, nents, dir);
a1002a48
KV
430 /* When it was forced or merged try again in a dumb way */
431 if (force_iommu || iommu_merge) {
432 out = dma_map_sg_nonforce(dev, sg, nents, dir);
433 if (out > 0)
434 return out;
435 }
1da177e4
LT
436 if (panic_on_overflow)
437 panic("dma_map_sg: overflow on %lu pages\n", pages);
17a941d8 438 iommu_full(dev, pages << PAGE_SHIFT, dir);
1da177e4
LT
439 for (i = 0; i < nents; i++)
440 sg[i].dma_address = bad_dma_address;
441 return 0;
442}
443
17a941d8 444static int no_agp;
1da177e4
LT
445
446static __init unsigned long check_iommu_size(unsigned long aper, u64 aper_size)
447{
448 unsigned long a;
449 if (!iommu_size) {
450 iommu_size = aper_size;
451 if (!no_agp)
452 iommu_size /= 2;
453 }
454
455 a = aper + iommu_size;
456 iommu_size -= round_up(a, LARGE_PAGE_SIZE) - a;
457
458 if (iommu_size < 64*1024*1024)
459 printk(KERN_WARNING
460 "PCI-DMA: Warning: Small IOMMU %luMB. Consider increasing the AGP aperture in BIOS\n",iommu_size>>20);
461
462 return iommu_size;
463}
464
465static __init unsigned read_aperture(struct pci_dev *dev, u32 *size)
466{
467 unsigned aper_size = 0, aper_base_32;
468 u64 aper_base;
469 unsigned aper_order;
470
471 pci_read_config_dword(dev, 0x94, &aper_base_32);
472 pci_read_config_dword(dev, 0x90, &aper_order);
473 aper_order = (aper_order >> 1) & 7;
474
475 aper_base = aper_base_32 & 0x7fff;
476 aper_base <<= 25;
477
478 aper_size = (32 * 1024 * 1024) << aper_order;
479 if (aper_base + aper_size >= 0xffffffff || !aper_size)
480 aper_base = 0;
481
482 *size = aper_size;
483 return aper_base;
484}
485
486/*
487 * Private Northbridge GATT initialization in case we cannot use the
488 * AGP driver for some reason.
489 */
490static __init int init_k8_gatt(struct agp_kern_info *info)
491{
492 struct pci_dev *dev;
493 void *gatt;
494 unsigned aper_base, new_aper_base;
495 unsigned aper_size, gatt_size, new_aper_size;
a32073bf
AK
496 int i;
497
1da177e4
LT
498 printk(KERN_INFO "PCI-DMA: Disabling AGP.\n");
499 aper_size = aper_base = info->aper_size = 0;
a32073bf
AK
500 dev = NULL;
501 for (i = 0; i < num_k8_northbridges; i++) {
502 dev = k8_northbridges[i];
1da177e4
LT
503 new_aper_base = read_aperture(dev, &new_aper_size);
504 if (!new_aper_base)
505 goto nommu;
506
507 if (!aper_base) {
508 aper_size = new_aper_size;
509 aper_base = new_aper_base;
510 }
511 if (aper_size != new_aper_size || aper_base != new_aper_base)
512 goto nommu;
513 }
514 if (!aper_base)
515 goto nommu;
516 info->aper_base = aper_base;
517 info->aper_size = aper_size>>20;
518
519 gatt_size = (aper_size >> PAGE_SHIFT) * sizeof(u32);
520 gatt = (void *)__get_free_pages(GFP_KERNEL, get_order(gatt_size));
521 if (!gatt)
522 panic("Cannot allocate GATT table");
523 memset(gatt, 0, gatt_size);
524 agp_gatt_table = gatt;
a32073bf
AK
525
526 for (i = 0; i < num_k8_northbridges; i++) {
1da177e4
LT
527 u32 ctl;
528 u32 gatt_reg;
529
a32073bf 530 dev = k8_northbridges[i];
1da177e4
LT
531 gatt_reg = __pa(gatt) >> 12;
532 gatt_reg <<= 4;
533 pci_write_config_dword(dev, 0x98, gatt_reg);
534 pci_read_config_dword(dev, 0x90, &ctl);
535
536 ctl |= 1;
537 ctl &= ~((1<<4) | (1<<5));
538
539 pci_write_config_dword(dev, 0x90, ctl);
540 }
a32073bf 541 flush_gart();
1da177e4
LT
542
543 printk("PCI-DMA: aperture base @ %x size %u KB\n",aper_base, aper_size>>10);
544 return 0;
545
546 nommu:
547 /* Should not happen anymore */
548 printk(KERN_ERR "PCI-DMA: More than 4GB of RAM and no IOMMU\n"
f46ace69 549 KERN_ERR "PCI-DMA: 32bit PCI IO may malfunction.\n");
1da177e4
LT
550 return -1;
551}
552
553extern int agp_amd64_init(void);
554
17a941d8
MBY
555static struct dma_mapping_ops gart_dma_ops = {
556 .mapping_error = NULL,
557 .map_single = gart_map_single,
558 .map_simple = gart_map_simple,
559 .unmap_single = gart_unmap_single,
560 .sync_single_for_cpu = NULL,
561 .sync_single_for_device = NULL,
562 .sync_single_range_for_cpu = NULL,
563 .sync_single_range_for_device = NULL,
564 .sync_sg_for_cpu = NULL,
565 .sync_sg_for_device = NULL,
566 .map_sg = gart_map_sg,
567 .unmap_sg = gart_unmap_sg,
568};
569
0dc243ae 570void __init gart_iommu_init(void)
1da177e4
LT
571{
572 struct agp_kern_info info;
573 unsigned long aper_size;
574 unsigned long iommu_start;
1da177e4
LT
575 unsigned long scratch;
576 long i;
577
a32073bf
AK
578 if (cache_k8_northbridges() < 0 || num_k8_northbridges == 0) {
579 printk(KERN_INFO "PCI-GART: No AMD northbridge found.\n");
0dc243ae 580 return;
a32073bf
AK
581 }
582
1da177e4
LT
583#ifndef CONFIG_AGP_AMD64
584 no_agp = 1;
585#else
586 /* Makefile puts PCI initialization via subsys_initcall first. */
587 /* Add other K8 AGP bridge drivers here */
588 no_agp = no_agp ||
589 (agp_amd64_init() < 0) ||
590 (agp_copy_info(agp_bridge, &info) < 0);
591#endif
592
60b08c67 593 if (swiotlb)
0dc243ae 594 return;
60b08c67 595
8d4f6b93
JM
596 /* Did we detect a different HW IOMMU? */
597 if (iommu_detected && !iommu_aperture)
0dc243ae 598 return;
8d4f6b93 599
1da177e4 600 if (no_iommu ||
17a941d8 601 (!force_iommu && end_pfn <= MAX_DMA32_PFN) ||
1da177e4
LT
602 !iommu_aperture ||
603 (no_agp && init_k8_gatt(&info) < 0)) {
5b7b644c
JM
604 if (end_pfn > MAX_DMA32_PFN) {
605 printk(KERN_ERR "WARNING more than 4GB of memory "
3807fd46 606 "but GART IOMMU not available.\n"
dc9a7195 607 KERN_ERR "WARNING 32bit PCI may malfunction.\n");
5b7b644c 608 }
0dc243ae 609 return;
1da177e4
LT
610 }
611
5b7b644c 612 printk(KERN_INFO "PCI-DMA: using GART IOMMU.\n");
1da177e4
LT
613 aper_size = info.aper_size * 1024 * 1024;
614 iommu_size = check_iommu_size(info.aper_base, aper_size);
615 iommu_pages = iommu_size >> PAGE_SHIFT;
616
617 iommu_gart_bitmap = (void*)__get_free_pages(GFP_KERNEL,
618 get_order(iommu_pages/8));
619 if (!iommu_gart_bitmap)
620 panic("Cannot allocate iommu bitmap\n");
621 memset(iommu_gart_bitmap, 0, iommu_pages/8);
622
623#ifdef CONFIG_IOMMU_LEAK
624 if (leak_trace) {
625 iommu_leak_tab = (void *)__get_free_pages(GFP_KERNEL,
626 get_order(iommu_pages*sizeof(void *)));
627 if (iommu_leak_tab)
628 memset(iommu_leak_tab, 0, iommu_pages * 8);
629 else
630 printk("PCI-DMA: Cannot allocate leak trace area\n");
631 }
632#endif
633
634 /*
635 * Out of IOMMU space handling.
636 * Reserve some invalid pages at the beginning of the GART.
637 */
638 set_bit_string(iommu_gart_bitmap, 0, EMERGENCY_PAGES);
639
640 agp_memory_reserved = iommu_size;
641 printk(KERN_INFO
642 "PCI-DMA: Reserving %luMB of IOMMU area in the AGP aperture\n",
643 iommu_size>>20);
644
645 iommu_start = aper_size - iommu_size;
646 iommu_bus_base = info.aper_base + iommu_start;
647 bad_dma_address = iommu_bus_base;
648 iommu_gatt_base = agp_gatt_table + (iommu_start>>PAGE_SHIFT);
649
650 /*
651 * Unmap the IOMMU part of the GART. The alias of the page is
652 * always mapped with cache enabled and there is no full cache
653 * coherency across the GART remapping. The unmapping avoids
654 * automatic prefetches from the CPU allocating cache lines in
655 * there. All CPU accesses are done via the direct mapping to
656 * the backing memory. The GART address is only used by PCI
657 * devices.
658 */
659 clear_kernel_mapping((unsigned long)__va(iommu_bus_base), iommu_size);
660
661 /*
662 * Try to workaround a bug (thanks to BenH)
663 * Set unmapped entries to a scratch page instead of 0.
664 * Any prefetches that hit unmapped entries won't get an bus abort
665 * then.
666 */
667 scratch = get_zeroed_page(GFP_KERNEL);
668 if (!scratch)
669 panic("Cannot allocate iommu scratch page");
670 gart_unmapped_entry = GPTE_ENCODE(__pa(scratch));
671 for (i = EMERGENCY_PAGES; i < iommu_pages; i++)
672 iommu_gatt_base[i] = gart_unmapped_entry;
673
a32073bf 674 flush_gart();
17a941d8 675 dma_ops = &gart_dma_ops;
1da177e4
LT
676}
677
17a941d8
MBY
678void gart_parse_options(char *p)
679{
680 int arg;
681
1da177e4 682#ifdef CONFIG_IOMMU_LEAK
17a941d8
MBY
683 if (!strncmp(p,"leak",4)) {
684 leak_trace = 1;
685 p += 4;
686 if (*p == '=') ++p;
687 if (isdigit(*p) && get_option(&p, &arg))
688 iommu_leak_pages = arg;
689 }
1da177e4 690#endif
17a941d8
MBY
691 if (isdigit(*p) && get_option(&p, &arg))
692 iommu_size = arg;
693 if (!strncmp(p, "fullflush",8))
694 iommu_fullflush = 1;
695 if (!strncmp(p, "nofullflush",11))
696 iommu_fullflush = 0;
697 if (!strncmp(p,"noagp",5))
698 no_agp = 1;
699 if (!strncmp(p, "noaperture",10))
700 fix_aperture = 0;
701 /* duplicated from pci-dma.c */
702 if (!strncmp(p,"force",5))
703 iommu_aperture_allowed = 1;
704 if (!strncmp(p,"allowed",7))
705 iommu_aperture_allowed = 1;
706 if (!strncmp(p, "memaper", 7)) {
707 fallback_aper_force = 1;
708 p += 7;
709 if (*p == '=') {
710 ++p;
711 if (get_option(&p, &arg))
712 fallback_aper_order = arg;
713 }
714 }
715}
This page took 0.22478 seconds and 5 git commands to generate.