fixup.c 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * Exceptions for specific devices. Usually work-arounds for fatal design flaws.
  4. */
  5. #include <linux/delay.h>
  6. #include <linux/dmi.h>
  7. #include <linux/pci.h>
  8. #include <linux/vgaarb.h>
  9. #include <asm/amd_nb.h>
  10. #include <asm/hpet.h>
  11. #include <asm/pci_x86.h>
  12. static void pci_fixup_i450nx(struct pci_dev *d)
  13. {
  14. /*
  15. * i450NX -- Find and scan all secondary buses on all PXB's.
  16. */
  17. int pxb, reg;
  18. u8 busno, suba, subb;
  19. dev_warn(&d->dev, "Searching for i450NX host bridges\n");
  20. reg = 0xd0;
  21. for(pxb = 0; pxb < 2; pxb++) {
  22. pci_read_config_byte(d, reg++, &busno);
  23. pci_read_config_byte(d, reg++, &suba);
  24. pci_read_config_byte(d, reg++, &subb);
  25. dev_dbg(&d->dev, "i450NX PXB %d: %02x/%02x/%02x\n", pxb, busno,
  26. suba, subb);
  27. if (busno)
  28. pcibios_scan_root(busno); /* Bus A */
  29. if (suba < subb)
  30. pcibios_scan_root(suba+1); /* Bus B */
  31. }
  32. pcibios_last_bus = -1;
  33. }
  34. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_82451NX, pci_fixup_i450nx);
  35. static void pci_fixup_i450gx(struct pci_dev *d)
  36. {
  37. /*
  38. * i450GX and i450KX -- Find and scan all secondary buses.
  39. * (called separately for each PCI bridge found)
  40. */
  41. u8 busno;
  42. pci_read_config_byte(d, 0x4a, &busno);
  43. dev_info(&d->dev, "i440KX/GX host bridge; secondary bus %02x\n", busno);
  44. pcibios_scan_root(busno);
  45. pcibios_last_bus = -1;
  46. }
  47. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_82454GX, pci_fixup_i450gx);
  48. static void pci_fixup_umc_ide(struct pci_dev *d)
  49. {
  50. /*
  51. * UM8886BF IDE controller sets region type bits incorrectly,
  52. * therefore they look like memory despite of them being I/O.
  53. */
  54. int i;
  55. dev_warn(&d->dev, "Fixing base address flags\n");
  56. for(i = 0; i < 4; i++)
  57. d->resource[i].flags |= PCI_BASE_ADDRESS_SPACE_IO;
  58. }
  59. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_UMC, PCI_DEVICE_ID_UMC_UM8886BF, pci_fixup_umc_ide);
  60. static void pci_fixup_latency(struct pci_dev *d)
  61. {
  62. /*
  63. * SiS 5597 and 5598 chipsets require latency timer set to
  64. * at most 32 to avoid lockups.
  65. */
  66. dev_dbg(&d->dev, "Setting max latency to 32\n");
  67. pcibios_max_latency = 32;
  68. }
  69. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_SI, PCI_DEVICE_ID_SI_5597, pci_fixup_latency);
  70. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_SI, PCI_DEVICE_ID_SI_5598, pci_fixup_latency);
  71. static void pci_fixup_piix4_acpi(struct pci_dev *d)
  72. {
  73. /*
  74. * PIIX4 ACPI device: hardwired IRQ9
  75. */
  76. d->irq = 9;
  77. }
  78. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_82371AB_3, pci_fixup_piix4_acpi);
  79. /*
  80. * Addresses issues with problems in the memory write queue timer in
  81. * certain VIA Northbridges. This bugfix is per VIA's specifications,
  82. * except for the KL133/KM133: clearing bit 5 on those Northbridges seems
  83. * to trigger a bug in its integrated ProSavage video card, which
  84. * causes screen corruption. We only clear bits 6 and 7 for that chipset,
  85. * until VIA can provide us with definitive information on why screen
  86. * corruption occurs, and what exactly those bits do.
  87. *
  88. * VIA 8363,8622,8361 Northbridges:
  89. * - bits 5, 6, 7 at offset 0x55 need to be turned off
  90. * VIA 8367 (KT266x) Northbridges:
  91. * - bits 5, 6, 7 at offset 0x95 need to be turned off
  92. * VIA 8363 rev 0x81/0x84 (KL133/KM133) Northbridges:
  93. * - bits 6, 7 at offset 0x55 need to be turned off
  94. */
  95. #define VIA_8363_KL133_REVISION_ID 0x81
  96. #define VIA_8363_KM133_REVISION_ID 0x84
  97. static void pci_fixup_via_northbridge_bug(struct pci_dev *d)
  98. {
  99. u8 v;
  100. int where = 0x55;
  101. int mask = 0x1f; /* clear bits 5, 6, 7 by default */
  102. if (d->device == PCI_DEVICE_ID_VIA_8367_0) {
  103. /* fix pci bus latency issues resulted by NB bios error
  104. it appears on bug free^Wreduced kt266x's bios forces
  105. NB latency to zero */
  106. pci_write_config_byte(d, PCI_LATENCY_TIMER, 0);
  107. where = 0x95; /* the memory write queue timer register is
  108. different for the KT266x's: 0x95 not 0x55 */
  109. } else if (d->device == PCI_DEVICE_ID_VIA_8363_0 &&
  110. (d->revision == VIA_8363_KL133_REVISION_ID ||
  111. d->revision == VIA_8363_KM133_REVISION_ID)) {
  112. mask = 0x3f; /* clear only bits 6 and 7; clearing bit 5
  113. causes screen corruption on the KL133/KM133 */
  114. }
  115. pci_read_config_byte(d, where, &v);
  116. if (v & ~mask) {
  117. dev_warn(&d->dev, "Disabling VIA memory write queue (PCI ID %04x, rev %02x): [%02x] %02x & %02x -> %02x\n", \
  118. d->device, d->revision, where, v, mask, v & mask);
  119. v &= mask;
  120. pci_write_config_byte(d, where, v);
  121. }
  122. }
  123. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8363_0, pci_fixup_via_northbridge_bug);
  124. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8622, pci_fixup_via_northbridge_bug);
  125. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8361, pci_fixup_via_northbridge_bug);
  126. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8367_0, pci_fixup_via_northbridge_bug);
  127. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8363_0, pci_fixup_via_northbridge_bug);
  128. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8622, pci_fixup_via_northbridge_bug);
  129. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8361, pci_fixup_via_northbridge_bug);
  130. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8367_0, pci_fixup_via_northbridge_bug);
  131. /*
  132. * For some reasons Intel decided that certain parts of their
  133. * 815, 845 and some other chipsets must look like PCI-to-PCI bridges
  134. * while they are obviously not. The 82801 family (AA, AB, BAM/CAM,
  135. * BA/CA/DB and E) PCI bridges are actually HUB-to-PCI ones, according
  136. * to Intel terminology. These devices do forward all addresses from
  137. * system to PCI bus no matter what are their window settings, so they are
  138. * "transparent" (or subtractive decoding) from programmers point of view.
  139. */
  140. static void pci_fixup_transparent_bridge(struct pci_dev *dev)
  141. {
  142. if ((dev->device & 0xff00) == 0x2400)
  143. dev->transparent = 1;
  144. }
  145. DECLARE_PCI_FIXUP_CLASS_HEADER(PCI_VENDOR_ID_INTEL, PCI_ANY_ID,
  146. PCI_CLASS_BRIDGE_PCI, 8, pci_fixup_transparent_bridge);
  147. /*
  148. * Fixup for C1 Halt Disconnect problem on nForce2 systems.
  149. *
  150. * From information provided by "Allen Martin" <[email protected]>:
  151. *
  152. * A hang is caused when the CPU generates a very fast CONNECT/HALT cycle
  153. * sequence. Workaround is to set the SYSTEM_IDLE_TIMEOUT to 80 ns.
  154. * This allows the state-machine and timer to return to a proper state within
  155. * 80 ns of the CONNECT and probe appearing together. Since the CPU will not
  156. * issue another HALT within 80 ns of the initial HALT, the failure condition
  157. * is avoided.
  158. */
  159. static void pci_fixup_nforce2(struct pci_dev *dev)
  160. {
  161. u32 val;
  162. /*
  163. * Chip Old value New value
  164. * C17 0x1F0FFF01 0x1F01FF01
  165. * C18D 0x9F0FFF01 0x9F01FF01
  166. *
  167. * Northbridge chip version may be determined by
  168. * reading the PCI revision ID (0xC1 or greater is C18D).
  169. */
  170. pci_read_config_dword(dev, 0x6c, &val);
  171. /*
  172. * Apply fixup if needed, but don't touch disconnect state
  173. */
  174. if ((val & 0x00FF0000) != 0x00010000) {
  175. dev_warn(&dev->dev, "nForce2 C1 Halt Disconnect fixup\n");
  176. pci_write_config_dword(dev, 0x6c, (val & 0xFF00FFFF) | 0x00010000);
  177. }
  178. }
  179. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_NVIDIA, PCI_DEVICE_ID_NVIDIA_NFORCE2, pci_fixup_nforce2);
  180. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_NVIDIA, PCI_DEVICE_ID_NVIDIA_NFORCE2, pci_fixup_nforce2);
  181. /* Max PCI Express root ports */
  182. #define MAX_PCIEROOT 6
  183. static int quirk_aspm_offset[MAX_PCIEROOT << 3];
  184. #define GET_INDEX(a, b) ((((a) - PCI_DEVICE_ID_INTEL_MCH_PA) << 3) + ((b) & 7))
  185. static int quirk_pcie_aspm_read(struct pci_bus *bus, unsigned int devfn, int where, int size, u32 *value)
  186. {
  187. return raw_pci_read(pci_domain_nr(bus), bus->number,
  188. devfn, where, size, value);
  189. }
  190. /*
  191. * Replace the original pci bus ops for write with a new one that will filter
  192. * the request to insure ASPM cannot be enabled.
  193. */
  194. static int quirk_pcie_aspm_write(struct pci_bus *bus, unsigned int devfn, int where, int size, u32 value)
  195. {
  196. u8 offset;
  197. offset = quirk_aspm_offset[GET_INDEX(bus->self->device, devfn)];
  198. if ((offset) && (where == offset))
  199. value = value & ~PCI_EXP_LNKCTL_ASPMC;
  200. return raw_pci_write(pci_domain_nr(bus), bus->number,
  201. devfn, where, size, value);
  202. }
  203. static struct pci_ops quirk_pcie_aspm_ops = {
  204. .read = quirk_pcie_aspm_read,
  205. .write = quirk_pcie_aspm_write,
  206. };
  207. /*
  208. * Prevents PCI Express ASPM (Active State Power Management) being enabled.
  209. *
  210. * Save the register offset, where the ASPM control bits are located,
  211. * for each PCI Express device that is in the device list of
  212. * the root port in an array for fast indexing. Replace the bus ops
  213. * with the modified one.
  214. */
  215. static void pcie_rootport_aspm_quirk(struct pci_dev *pdev)
  216. {
  217. int i;
  218. struct pci_bus *pbus;
  219. struct pci_dev *dev;
  220. if ((pbus = pdev->subordinate) == NULL)
  221. return;
  222. /*
  223. * Check if the DID of pdev matches one of the six root ports. This
  224. * check is needed in the case this function is called directly by the
  225. * hot-plug driver.
  226. */
  227. if ((pdev->device < PCI_DEVICE_ID_INTEL_MCH_PA) ||
  228. (pdev->device > PCI_DEVICE_ID_INTEL_MCH_PC1))
  229. return;
  230. if (list_empty(&pbus->devices)) {
  231. /*
  232. * If no device is attached to the root port at power-up or
  233. * after hot-remove, the pbus->devices is empty and this code
  234. * will set the offsets to zero and the bus ops to parent's bus
  235. * ops, which is unmodified.
  236. */
  237. for (i = GET_INDEX(pdev->device, 0); i <= GET_INDEX(pdev->device, 7); ++i)
  238. quirk_aspm_offset[i] = 0;
  239. pci_bus_set_ops(pbus, pbus->parent->ops);
  240. } else {
  241. /*
  242. * If devices are attached to the root port at power-up or
  243. * after hot-add, the code loops through the device list of
  244. * each root port to save the register offsets and replace the
  245. * bus ops.
  246. */
  247. list_for_each_entry(dev, &pbus->devices, bus_list)
  248. /* There are 0 to 8 devices attached to this bus */
  249. quirk_aspm_offset[GET_INDEX(pdev->device, dev->devfn)] =
  250. dev->pcie_cap + PCI_EXP_LNKCTL;
  251. pci_bus_set_ops(pbus, &quirk_pcie_aspm_ops);
  252. dev_info(&pbus->dev, "writes to ASPM control bits will be ignored\n");
  253. }
  254. }
  255. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_MCH_PA, pcie_rootport_aspm_quirk);
  256. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_MCH_PA1, pcie_rootport_aspm_quirk);
  257. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_MCH_PB, pcie_rootport_aspm_quirk);
  258. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_MCH_PB1, pcie_rootport_aspm_quirk);
  259. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_MCH_PC, pcie_rootport_aspm_quirk);
  260. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_INTEL, PCI_DEVICE_ID_INTEL_MCH_PC1, pcie_rootport_aspm_quirk);
  261. /*
  262. * Fixup to mark boot BIOS video selected by BIOS before it changes
  263. *
  264. * From information provided by "Jon Smirl" <[email protected]>
  265. *
  266. * The standard boot ROM sequence for an x86 machine uses the BIOS
  267. * to select an initial video card for boot display. This boot video
  268. * card will have its BIOS copied to 0xC0000 in system RAM.
  269. * IORESOURCE_ROM_SHADOW is used to associate the boot video
  270. * card with this copy. On laptops this copy has to be used since
  271. * the main ROM may be compressed or combined with another image.
  272. * See pci_map_rom() for use of this flag. Before marking the device
  273. * with IORESOURCE_ROM_SHADOW check if a vga_default_device is already set
  274. * by either arch code or vga-arbitration; if so only apply the fixup to this
  275. * already-determined primary video card.
  276. */
  277. static void pci_fixup_video(struct pci_dev *pdev)
  278. {
  279. struct pci_dev *bridge;
  280. struct pci_bus *bus;
  281. u16 config;
  282. struct resource *res;
  283. /* Is VGA routed to us? */
  284. bus = pdev->bus;
  285. while (bus) {
  286. bridge = bus->self;
  287. /*
  288. * From information provided by
  289. * "David Miller" <[email protected]>
  290. * The bridge control register is valid for PCI header
  291. * type BRIDGE, or CARDBUS. Host to PCI controllers use
  292. * PCI header type NORMAL.
  293. */
  294. if (bridge && (pci_is_bridge(bridge))) {
  295. pci_read_config_word(bridge, PCI_BRIDGE_CONTROL,
  296. &config);
  297. if (!(config & PCI_BRIDGE_CTL_VGA))
  298. return;
  299. }
  300. bus = bus->parent;
  301. }
  302. if (!vga_default_device() || pdev == vga_default_device()) {
  303. pci_read_config_word(pdev, PCI_COMMAND, &config);
  304. if (config & (PCI_COMMAND_IO | PCI_COMMAND_MEMORY)) {
  305. res = &pdev->resource[PCI_ROM_RESOURCE];
  306. pci_disable_rom(pdev);
  307. if (res->parent)
  308. release_resource(res);
  309. res->start = 0xC0000;
  310. res->end = res->start + 0x20000 - 1;
  311. res->flags = IORESOURCE_MEM | IORESOURCE_ROM_SHADOW |
  312. IORESOURCE_PCI_FIXED;
  313. dev_info(&pdev->dev, "Video device with shadowed ROM at %pR\n",
  314. res);
  315. }
  316. }
  317. }
  318. DECLARE_PCI_FIXUP_CLASS_HEADER(PCI_ANY_ID, PCI_ANY_ID,
  319. PCI_CLASS_DISPLAY_VGA, 8, pci_fixup_video);
  320. static const struct dmi_system_id msi_k8t_dmi_table[] = {
  321. {
  322. .ident = "MSI-K8T-Neo2Fir",
  323. .matches = {
  324. DMI_MATCH(DMI_SYS_VENDOR, "MSI"),
  325. DMI_MATCH(DMI_PRODUCT_NAME, "MS-6702E"),
  326. },
  327. },
  328. {}
  329. };
  330. /*
  331. * The AMD-Athlon64 board MSI "K8T Neo2-FIR" disables the onboard sound
  332. * card if a PCI-soundcard is added.
  333. *
  334. * The BIOS only gives options "DISABLED" and "AUTO". This code sets
  335. * the corresponding register-value to enable the soundcard.
  336. *
  337. * The soundcard is only enabled, if the mainboard is identified
  338. * via DMI-tables and the soundcard is detected to be off.
  339. */
  340. static void pci_fixup_msi_k8t_onboard_sound(struct pci_dev *dev)
  341. {
  342. unsigned char val;
  343. if (!dmi_check_system(msi_k8t_dmi_table))
  344. return; /* only applies to MSI K8T Neo2-FIR */
  345. pci_read_config_byte(dev, 0x50, &val);
  346. if (val & 0x40) {
  347. pci_write_config_byte(dev, 0x50, val & (~0x40));
  348. /* verify the change for status output */
  349. pci_read_config_byte(dev, 0x50, &val);
  350. if (val & 0x40)
  351. dev_info(&dev->dev, "Detected MSI K8T Neo2-FIR; "
  352. "can't enable onboard soundcard!\n");
  353. else
  354. dev_info(&dev->dev, "Detected MSI K8T Neo2-FIR; "
  355. "enabled onboard soundcard\n");
  356. }
  357. }
  358. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8237,
  359. pci_fixup_msi_k8t_onboard_sound);
  360. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8237,
  361. pci_fixup_msi_k8t_onboard_sound);
  362. /*
  363. * Some Toshiba laptops need extra code to enable their TI TSB43AB22/A.
  364. *
  365. * We pretend to bring them out of full D3 state, and restore the proper
  366. * IRQ, PCI cache line size, and BARs, otherwise the device won't function
  367. * properly. In some cases, the device will generate an interrupt on
  368. * the wrong IRQ line, causing any devices sharing the line it's
  369. * *supposed* to use to be disabled by the kernel's IRQ debug code.
  370. */
  371. static u16 toshiba_line_size;
  372. static const struct dmi_system_id toshiba_ohci1394_dmi_table[] = {
  373. {
  374. .ident = "Toshiba PS5 based laptop",
  375. .matches = {
  376. DMI_MATCH(DMI_SYS_VENDOR, "TOSHIBA"),
  377. DMI_MATCH(DMI_PRODUCT_VERSION, "PS5"),
  378. },
  379. },
  380. {
  381. .ident = "Toshiba PSM4 based laptop",
  382. .matches = {
  383. DMI_MATCH(DMI_SYS_VENDOR, "TOSHIBA"),
  384. DMI_MATCH(DMI_PRODUCT_VERSION, "PSM4"),
  385. },
  386. },
  387. {
  388. .ident = "Toshiba A40 based laptop",
  389. .matches = {
  390. DMI_MATCH(DMI_SYS_VENDOR, "TOSHIBA"),
  391. DMI_MATCH(DMI_PRODUCT_VERSION, "PSA40U"),
  392. },
  393. },
  394. { }
  395. };
  396. static void pci_pre_fixup_toshiba_ohci1394(struct pci_dev *dev)
  397. {
  398. if (!dmi_check_system(toshiba_ohci1394_dmi_table))
  399. return; /* only applies to certain Toshibas (so far) */
  400. dev->current_state = PCI_D3cold;
  401. pci_read_config_word(dev, PCI_CACHE_LINE_SIZE, &toshiba_line_size);
  402. }
  403. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_TI, 0x8032,
  404. pci_pre_fixup_toshiba_ohci1394);
  405. static void pci_post_fixup_toshiba_ohci1394(struct pci_dev *dev)
  406. {
  407. if (!dmi_check_system(toshiba_ohci1394_dmi_table))
  408. return; /* only applies to certain Toshibas (so far) */
  409. /* Restore config space on Toshiba laptops */
  410. pci_write_config_word(dev, PCI_CACHE_LINE_SIZE, toshiba_line_size);
  411. pci_read_config_byte(dev, PCI_INTERRUPT_LINE, (u8 *)&dev->irq);
  412. pci_write_config_dword(dev, PCI_BASE_ADDRESS_0,
  413. pci_resource_start(dev, 0));
  414. pci_write_config_dword(dev, PCI_BASE_ADDRESS_1,
  415. pci_resource_start(dev, 1));
  416. }
  417. DECLARE_PCI_FIXUP_ENABLE(PCI_VENDOR_ID_TI, 0x8032,
  418. pci_post_fixup_toshiba_ohci1394);
  419. /*
  420. * Prevent the BIOS trapping accesses to the Cyrix CS5530A video device
  421. * configuration space.
  422. */
  423. static void pci_early_fixup_cyrix_5530(struct pci_dev *dev)
  424. {
  425. u8 r;
  426. /* clear 'F4 Video Configuration Trap' bit */
  427. pci_read_config_byte(dev, 0x42, &r);
  428. r &= 0xfd;
  429. pci_write_config_byte(dev, 0x42, r);
  430. }
  431. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_CYRIX, PCI_DEVICE_ID_CYRIX_5530_LEGACY,
  432. pci_early_fixup_cyrix_5530);
  433. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_CYRIX, PCI_DEVICE_ID_CYRIX_5530_LEGACY,
  434. pci_early_fixup_cyrix_5530);
  435. /*
  436. * Siemens Nixdorf AG FSC Multiprocessor Interrupt Controller:
  437. * prevent update of the BAR0, which doesn't look like a normal BAR.
  438. */
  439. static void pci_siemens_interrupt_controller(struct pci_dev *dev)
  440. {
  441. dev->resource[0].flags |= IORESOURCE_PCI_FIXED;
  442. }
  443. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_SIEMENS, 0x0015,
  444. pci_siemens_interrupt_controller);
  445. /*
  446. * SB600: Disable BAR1 on device 14.0 to avoid HPET resources from
  447. * confusing the PCI engine:
  448. */
  449. static void sb600_disable_hpet_bar(struct pci_dev *dev)
  450. {
  451. u8 val;
  452. /*
  453. * The SB600 and SB700 both share the same device
  454. * ID, but the PM register 0x55 does something different
  455. * for the SB700, so make sure we are dealing with the
  456. * SB600 before touching the bit:
  457. */
  458. pci_read_config_byte(dev, 0x08, &val);
  459. if (val < 0x2F) {
  460. outb(0x55, 0xCD6);
  461. val = inb(0xCD7);
  462. /* Set bit 7 in PM register 0x55 */
  463. outb(0x55, 0xCD6);
  464. outb(val | 0x80, 0xCD7);
  465. }
  466. }
  467. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_ATI, 0x4385, sb600_disable_hpet_bar);
  468. #ifdef CONFIG_HPET_TIMER
  469. static void sb600_hpet_quirk(struct pci_dev *dev)
  470. {
  471. struct resource *r = &dev->resource[1];
  472. if (r->flags & IORESOURCE_MEM && r->start == hpet_address) {
  473. r->flags |= IORESOURCE_PCI_FIXED;
  474. dev_info(&dev->dev, "reg 0x14 contains HPET; making it immovable\n");
  475. }
  476. }
  477. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_ATI, 0x4385, sb600_hpet_quirk);
  478. #endif
  479. /*
  480. * Twinhead H12Y needs us to block out a region otherwise we map devices
  481. * there and any access kills the box.
  482. *
  483. * See: https://bugzilla.kernel.org/show_bug.cgi?id=10231
  484. *
  485. * Match off the LPC and svid/sdid (older kernels lose the bridge subvendor)
  486. */
  487. static void twinhead_reserve_killing_zone(struct pci_dev *dev)
  488. {
  489. if (dev->subsystem_vendor == 0x14FF && dev->subsystem_device == 0xA003) {
  490. pr_info("Reserving memory on Twinhead H12Y\n");
  491. request_mem_region(0xFFB00000, 0x100000, "twinhead");
  492. }
  493. }
  494. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x27B9, twinhead_reserve_killing_zone);
  495. /*
  496. * Device [8086:2fc0]
  497. * Erratum HSE43
  498. * CONFIG_TDP_NOMINAL CSR Implemented at Incorrect Offset
  499. * https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html
  500. *
  501. * Devices [8086:6f60,6fa0,6fc0]
  502. * Erratum BDF2
  503. * PCI BARs in the Home Agent Will Return Non-Zero Values During Enumeration
  504. * https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v4-spec-update.html
  505. */
  506. static void pci_invalid_bar(struct pci_dev *dev)
  507. {
  508. dev->non_compliant_bars = 1;
  509. }
  510. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0x2fc0, pci_invalid_bar);
  511. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0x6f60, pci_invalid_bar);
  512. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0x6fa0, pci_invalid_bar);
  513. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0x6fc0, pci_invalid_bar);
  514. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0xa1ec, pci_invalid_bar);
  515. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0xa1ed, pci_invalid_bar);
  516. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0xa26c, pci_invalid_bar);
  517. DECLARE_PCI_FIXUP_EARLY(PCI_VENDOR_ID_INTEL, 0xa26d, pci_invalid_bar);
  518. /*
  519. * Device [1022:7808]
  520. * 23. USB Wake on Connect/Disconnect with Low Speed Devices
  521. * https://support.amd.com/TechDocs/46837.pdf
  522. * Appendix A2
  523. * https://support.amd.com/TechDocs/42413.pdf
  524. */
  525. static void pci_fixup_amd_ehci_pme(struct pci_dev *dev)
  526. {
  527. dev_info(&dev->dev, "PME# does not work under D3, disabling it\n");
  528. dev->pme_support &= ~((PCI_PM_CAP_PME_D3hot | PCI_PM_CAP_PME_D3cold)
  529. >> PCI_PM_CAP_PME_SHIFT);
  530. }
  531. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x7808, pci_fixup_amd_ehci_pme);
  532. /*
  533. * Device [1022:7914]
  534. * When in D0, PME# doesn't get asserted when plugging USB 2.0 device.
  535. */
  536. static void pci_fixup_amd_fch_xhci_pme(struct pci_dev *dev)
  537. {
  538. dev_info(&dev->dev, "PME# does not work under D0, disabling it\n");
  539. dev->pme_support &= ~(PCI_PM_CAP_PME_D0 >> PCI_PM_CAP_PME_SHIFT);
  540. }
  541. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x7914, pci_fixup_amd_fch_xhci_pme);
  542. /*
  543. * Apple MacBook Pro: Avoid [mem 0x7fa00000-0x7fbfffff]
  544. *
  545. * Using the [mem 0x7fa00000-0x7fbfffff] region, e.g., by assigning it to
  546. * the 00:1c.0 Root Port, causes a conflict with [io 0x1804], which is used
  547. * for soft poweroff and suspend-to-RAM.
  548. *
  549. * As far as we know, this is related to the address space, not to the Root
  550. * Port itself. Attaching the quirk to the Root Port is a convenience, but
  551. * it could probably also be a standalone DMI quirk.
  552. *
  553. * https://bugzilla.kernel.org/show_bug.cgi?id=103211
  554. */
  555. static void quirk_apple_mbp_poweroff(struct pci_dev *pdev)
  556. {
  557. struct device *dev = &pdev->dev;
  558. struct resource *res;
  559. if ((!dmi_match(DMI_PRODUCT_NAME, "MacBookPro11,4") &&
  560. !dmi_match(DMI_PRODUCT_NAME, "MacBookPro11,5")) ||
  561. pdev->bus->number != 0 || pdev->devfn != PCI_DEVFN(0x1c, 0))
  562. return;
  563. res = request_mem_region(0x7fa00000, 0x200000,
  564. "MacBook Pro poweroff workaround");
  565. if (res)
  566. dev_info(dev, "claimed %s %pR\n", res->name, res);
  567. else
  568. dev_info(dev, "can't work around MacBook Pro poweroff issue\n");
  569. }
  570. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x8c10, quirk_apple_mbp_poweroff);
  571. /*
  572. * VMD-enabled root ports will change the source ID for all messages
  573. * to the VMD device. Rather than doing device matching with the source
  574. * ID, the AER driver should traverse the child device tree, reading
  575. * AER registers to find the faulting device.
  576. */
  577. static void quirk_no_aersid(struct pci_dev *pdev)
  578. {
  579. /* VMD Domain */
  580. if (is_vmd(pdev->bus) && pci_is_root_bus(pdev->bus))
  581. pdev->bus->bus_flags |= PCI_BUS_FLAGS_NO_AERSID;
  582. }
  583. DECLARE_PCI_FIXUP_CLASS_EARLY(PCI_VENDOR_ID_INTEL, PCI_ANY_ID,
  584. PCI_CLASS_BRIDGE_PCI, 8, quirk_no_aersid);
  585. static void quirk_intel_th_dnv(struct pci_dev *dev)
  586. {
  587. struct resource *r = &dev->resource[4];
  588. /*
  589. * Denverton reports 2k of RTIT_BAR (intel_th resource 4), which
  590. * appears to be 4 MB in reality.
  591. */
  592. if (r->end == r->start + 0x7ff) {
  593. r->start = 0;
  594. r->end = 0x3fffff;
  595. r->flags |= IORESOURCE_UNSET;
  596. }
  597. }
  598. DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x19e1, quirk_intel_th_dnv);
  599. #ifdef CONFIG_PHYS_ADDR_T_64BIT
  600. #define AMD_141b_MMIO_BASE(x) (0x80 + (x) * 0x8)
  601. #define AMD_141b_MMIO_BASE_RE_MASK BIT(0)
  602. #define AMD_141b_MMIO_BASE_WE_MASK BIT(1)
  603. #define AMD_141b_MMIO_BASE_MMIOBASE_MASK GENMASK(31,8)
  604. #define AMD_141b_MMIO_LIMIT(x) (0x84 + (x) * 0x8)
  605. #define AMD_141b_MMIO_LIMIT_MMIOLIMIT_MASK GENMASK(31,8)
  606. #define AMD_141b_MMIO_HIGH(x) (0x180 + (x) * 0x4)
  607. #define AMD_141b_MMIO_HIGH_MMIOBASE_MASK GENMASK(7,0)
  608. #define AMD_141b_MMIO_HIGH_MMIOLIMIT_SHIFT 16
  609. #define AMD_141b_MMIO_HIGH_MMIOLIMIT_MASK GENMASK(23,16)
  610. /*
  611. * The PCI Firmware Spec, rev 3.2, notes that ACPI should optionally allow
  612. * configuring host bridge windows using the _PRS and _SRS methods.
  613. *
  614. * But this is rarely implemented, so we manually enable a large 64bit BAR for
  615. * PCIe device on AMD Family 15h (Models 00h-1fh, 30h-3fh, 60h-7fh) Processors
  616. * here.
  617. */
  618. static void pci_amd_enable_64bit_bar(struct pci_dev *dev)
  619. {
  620. static const char *name = "PCI Bus 0000:00";
  621. struct resource *res, *conflict;
  622. u32 base, limit, high;
  623. struct pci_dev *other;
  624. unsigned i;
  625. if (!(pci_probe & PCI_BIG_ROOT_WINDOW))
  626. return;
  627. /* Check that we are the only device of that type */
  628. other = pci_get_device(dev->vendor, dev->device, NULL);
  629. if (other != dev ||
  630. (other = pci_get_device(dev->vendor, dev->device, other))) {
  631. /* This is a multi-socket system, don't touch it for now */
  632. pci_dev_put(other);
  633. return;
  634. }
  635. for (i = 0; i < 8; i++) {
  636. pci_read_config_dword(dev, AMD_141b_MMIO_BASE(i), &base);
  637. pci_read_config_dword(dev, AMD_141b_MMIO_HIGH(i), &high);
  638. /* Is this slot free? */
  639. if (!(base & (AMD_141b_MMIO_BASE_RE_MASK |
  640. AMD_141b_MMIO_BASE_WE_MASK)))
  641. break;
  642. base >>= 8;
  643. base |= high << 24;
  644. /* Abort if a slot already configures a 64bit BAR. */
  645. if (base > 0x10000)
  646. return;
  647. }
  648. if (i == 8)
  649. return;
  650. res = kzalloc(sizeof(*res), GFP_KERNEL);
  651. if (!res)
  652. return;
  653. /*
  654. * Allocate a 256GB window directly below the 0xfd00000000 hardware
  655. * limit (see AMD Family 15h Models 30h-3Fh BKDG, sec 2.4.6).
  656. */
  657. res->name = name;
  658. res->flags = IORESOURCE_PREFETCH | IORESOURCE_MEM |
  659. IORESOURCE_MEM_64 | IORESOURCE_WINDOW;
  660. res->start = 0xbd00000000ull;
  661. res->end = 0xfd00000000ull - 1;
  662. conflict = request_resource_conflict(&iomem_resource, res);
  663. if (conflict) {
  664. kfree(res);
  665. if (conflict->name != name)
  666. return;
  667. /* We are resuming from suspend; just reenable the window */
  668. res = conflict;
  669. } else {
  670. dev_info(&dev->dev, "adding root bus resource %pR (tainting kernel)\n",
  671. res);
  672. add_taint(TAINT_FIRMWARE_WORKAROUND, LOCKDEP_STILL_OK);
  673. pci_bus_add_resource(dev->bus, res, 0);
  674. }
  675. base = ((res->start >> 8) & AMD_141b_MMIO_BASE_MMIOBASE_MASK) |
  676. AMD_141b_MMIO_BASE_RE_MASK | AMD_141b_MMIO_BASE_WE_MASK;
  677. limit = ((res->end + 1) >> 8) & AMD_141b_MMIO_LIMIT_MMIOLIMIT_MASK;
  678. high = ((res->start >> 40) & AMD_141b_MMIO_HIGH_MMIOBASE_MASK) |
  679. ((((res->end + 1) >> 40) << AMD_141b_MMIO_HIGH_MMIOLIMIT_SHIFT)
  680. & AMD_141b_MMIO_HIGH_MMIOLIMIT_MASK);
  681. pci_write_config_dword(dev, AMD_141b_MMIO_HIGH(i), high);
  682. pci_write_config_dword(dev, AMD_141b_MMIO_LIMIT(i), limit);
  683. pci_write_config_dword(dev, AMD_141b_MMIO_BASE(i), base);
  684. }
  685. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x1401, pci_amd_enable_64bit_bar);
  686. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x141b, pci_amd_enable_64bit_bar);
  687. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x1571, pci_amd_enable_64bit_bar);
  688. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x15b1, pci_amd_enable_64bit_bar);
  689. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x1601, pci_amd_enable_64bit_bar);
  690. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_AMD, 0x1401, pci_amd_enable_64bit_bar);
  691. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_AMD, 0x141b, pci_amd_enable_64bit_bar);
  692. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_AMD, 0x1571, pci_amd_enable_64bit_bar);
  693. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_AMD, 0x15b1, pci_amd_enable_64bit_bar);
  694. DECLARE_PCI_FIXUP_RESUME(PCI_VENDOR_ID_AMD, 0x1601, pci_amd_enable_64bit_bar);
  695. #define RS690_LOWER_TOP_OF_DRAM2 0x30
  696. #define RS690_LOWER_TOP_OF_DRAM2_VALID 0x1
  697. #define RS690_UPPER_TOP_OF_DRAM2 0x31
  698. #define RS690_HTIU_NB_INDEX 0xA8
  699. #define RS690_HTIU_NB_INDEX_WR_ENABLE 0x100
  700. #define RS690_HTIU_NB_DATA 0xAC
  701. /*
  702. * Some BIOS implementations support RAM above 4GB, but do not configure the
  703. * PCI host to respond to bus master accesses for these addresses. These
  704. * implementations set the TOP_OF_DRAM_SLOT1 register correctly, so PCI DMA
  705. * works as expected for addresses below 4GB.
  706. *
  707. * Reference: "AMD RS690 ASIC Family Register Reference Guide" (pg. 2-57)
  708. * https://www.amd.com/system/files/TechDocs/43372_rs690_rrg_3.00o.pdf
  709. */
  710. static void rs690_fix_64bit_dma(struct pci_dev *pdev)
  711. {
  712. u32 val = 0;
  713. phys_addr_t top_of_dram = __pa(high_memory - 1) + 1;
  714. if (top_of_dram <= (1ULL << 32))
  715. return;
  716. pci_write_config_dword(pdev, RS690_HTIU_NB_INDEX,
  717. RS690_LOWER_TOP_OF_DRAM2);
  718. pci_read_config_dword(pdev, RS690_HTIU_NB_DATA, &val);
  719. if (val)
  720. return;
  721. pci_info(pdev, "Adjusting top of DRAM to %pa for 64-bit DMA support\n", &top_of_dram);
  722. pci_write_config_dword(pdev, RS690_HTIU_NB_INDEX,
  723. RS690_UPPER_TOP_OF_DRAM2 | RS690_HTIU_NB_INDEX_WR_ENABLE);
  724. pci_write_config_dword(pdev, RS690_HTIU_NB_DATA, top_of_dram >> 32);
  725. pci_write_config_dword(pdev, RS690_HTIU_NB_INDEX,
  726. RS690_LOWER_TOP_OF_DRAM2 | RS690_HTIU_NB_INDEX_WR_ENABLE);
  727. pci_write_config_dword(pdev, RS690_HTIU_NB_DATA,
  728. top_of_dram | RS690_LOWER_TOP_OF_DRAM2_VALID);
  729. }
  730. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_ATI, 0x7910, rs690_fix_64bit_dma);
  731. #endif
  732. #ifdef CONFIG_AMD_NB
  733. #define AMD_15B8_RCC_DEV2_EPF0_STRAP2 0x10136008
  734. #define AMD_15B8_RCC_DEV2_EPF0_STRAP2_NO_SOFT_RESET_DEV2_F0_MASK 0x00000080L
  735. static void quirk_clear_strap_no_soft_reset_dev2_f0(struct pci_dev *dev)
  736. {
  737. u32 data;
  738. if (!amd_smn_read(0, AMD_15B8_RCC_DEV2_EPF0_STRAP2, &data)) {
  739. data &= ~AMD_15B8_RCC_DEV2_EPF0_STRAP2_NO_SOFT_RESET_DEV2_F0_MASK;
  740. if (amd_smn_write(0, AMD_15B8_RCC_DEV2_EPF0_STRAP2, data))
  741. pci_err(dev, "Failed to write data 0x%x\n", data);
  742. } else {
  743. pci_err(dev, "Failed to read data\n");
  744. }
  745. }
  746. DECLARE_PCI_FIXUP_FINAL(PCI_VENDOR_ID_AMD, 0x15b8, quirk_clear_strap_no_soft_reset_dev2_f0);
  747. #endif