1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * linux/arch/alpha/kernel/core_cia.c 4 * 5 * Written by David A Rusling (david.rusling@reo.mts.dec.com). 6 * December 1995. 7 * 8 * Copyright (C) 1995 David A Rusling 9 * Copyright (C) 1997, 1998 Jay Estabrook 10 * Copyright (C) 1998, 1999, 2000 Richard Henderson 11 * 12 * Code common to all CIA core logic chips. 13 */ 14 15 #define __EXTERN_INLINE inline 16 #include <asm/io.h> 17 #include <asm/core_cia.h> 18 #undef __EXTERN_INLINE 19 20 #include <linux/types.h> 21 #include <linux/pci.h> 22 #include <linux/sched.h> 23 #include <linux/init.h> 24 #include <linux/bootmem.h> 25 26 #include <asm/ptrace.h> 27 #include <asm/mce.h> 28 29 #include "proto.h" 30 #include "pci_impl.h" 31 32 33 /* 34 * NOTE: Herein lie back-to-back mb instructions. They are magic. 35 * One plausible explanation is that the i/o controller does not properly 36 * handle the system transaction. Another involves timing. Ho hum. 37 */ 38 39 #define DEBUG_CONFIG 0 40 #if DEBUG_CONFIG 41 # define DBGC(args) printk args 42 #else 43 # define DBGC(args) 44 #endif 45 46 #define vip volatile int * 47 48 /* 49 * Given a bus, device, and function number, compute resulting 50 * configuration space address. It is therefore not safe to have 51 * concurrent invocations to configuration space access routines, but 52 * there really shouldn't be any need for this. 53 * 54 * Type 0: 55 * 56 * 3 3|3 3 2 2|2 2 2 2|2 2 2 2|1 1 1 1|1 1 1 1|1 1 57 * 3 2|1 0 9 8|7 6 5 4|3 2 1 0|9 8 7 6|5 4 3 2|1 0 9 8|7 6 5 4|3 2 1 0 58 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 59 * | | |D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|F|F|F|R|R|R|R|R|R|0|0| 60 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 61 * 62 * 31:11 Device select bit. 63 * 10:8 Function number 64 * 7:2 Register number 65 * 66 * Type 1: 67 * 68 * 3 3|3 3 2 2|2 2 2 2|2 2 2 2|1 1 1 1|1 1 1 1|1 1 69 * 3 2|1 0 9 8|7 6 5 4|3 2 1 0|9 8 7 6|5 4 3 2|1 0 9 8|7 6 5 4|3 2 1 0 70 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 71 * | | | | | | | | | | |B|B|B|B|B|B|B|B|D|D|D|D|D|F|F|F|R|R|R|R|R|R|0|1| 72 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 73 * 74 * 31:24 reserved 75 * 23:16 bus number (8 bits = 128 possible buses) 76 * 15:11 Device number (5 bits) 77 * 10:8 function number 78 * 7:2 register number 79 * 80 * Notes: 81 * The function number selects which function of a multi-function device 82 * (e.g., SCSI and Ethernet). 83 * 84 * The register selects a DWORD (32 bit) register offset. Hence it 85 * doesn't get shifted by 2 bits as we want to "drop" the bottom two 86 * bits. 87 */ 88 89 static int 90 mk_conf_addr(struct pci_bus *bus_dev, unsigned int device_fn, int where, 91 unsigned long *pci_addr, unsigned char *type1) 92 { 93 u8 bus = bus_dev->number; 94 95 *type1 = (bus != 0); 96 *pci_addr = (bus << 16) | (device_fn << 8) | where; 97 98 DBGC(("mk_conf_addr(bus=%d ,device_fn=0x%x, where=0x%x," 99 " returning address 0x%p\n" 100 bus, device_fn, where, *pci_addr)); 101 102 return 0; 103 } 104 105 static unsigned int 106 conf_read(unsigned long addr, unsigned char type1) 107 { 108 unsigned long flags; 109 int stat0, value; 110 int cia_cfg = 0; 111 112 DBGC(("conf_read(addr=0x%lx, type1=%d) ", addr, type1)); 113 local_irq_save(flags); 114 115 /* Reset status register to avoid losing errors. */ 116 stat0 = *(vip)CIA_IOC_CIA_ERR; 117 *(vip)CIA_IOC_CIA_ERR = stat0; 118 mb(); 119 *(vip)CIA_IOC_CIA_ERR; /* re-read to force write */ 120 121 /* If Type1 access, must set CIA CFG. */ 122 if (type1) { 123 cia_cfg = *(vip)CIA_IOC_CFG; 124 *(vip)CIA_IOC_CFG = (cia_cfg & ~3) | 1; 125 mb(); 126 *(vip)CIA_IOC_CFG; 127 } 128 129 mb(); 130 draina(); 131 mcheck_expected(0) = 1; 132 mcheck_taken(0) = 0; 133 mb(); 134 135 /* Access configuration space. */ 136 value = *(vip)addr; 137 mb(); 138 mb(); /* magic */ 139 if (mcheck_taken(0)) { 140 mcheck_taken(0) = 0; 141 value = 0xffffffff; 142 mb(); 143 } 144 mcheck_expected(0) = 0; 145 mb(); 146 147 /* If Type1 access, must reset IOC CFG so normal IO space ops work. */ 148 if (type1) { 149 *(vip)CIA_IOC_CFG = cia_cfg; 150 mb(); 151 *(vip)CIA_IOC_CFG; 152 } 153 154 local_irq_restore(flags); 155 DBGC(("done\n")); 156 157 return value; 158 } 159 160 static void 161 conf_write(unsigned long addr, unsigned int value, unsigned char type1) 162 { 163 unsigned long flags; 164 int stat0, cia_cfg = 0; 165 166 DBGC(("conf_write(addr=0x%lx, type1=%d) ", addr, type1)); 167 local_irq_save(flags); 168 169 /* Reset status register to avoid losing errors. */ 170 stat0 = *(vip)CIA_IOC_CIA_ERR; 171 *(vip)CIA_IOC_CIA_ERR = stat0; 172 mb(); 173 *(vip)CIA_IOC_CIA_ERR; /* re-read to force write */ 174 175 /* If Type1 access, must set CIA CFG. */ 176 if (type1) { 177 cia_cfg = *(vip)CIA_IOC_CFG; 178 *(vip)CIA_IOC_CFG = (cia_cfg & ~3) | 1; 179 mb(); 180 *(vip)CIA_IOC_CFG; 181 } 182 183 mb(); 184 draina(); 185 mcheck_expected(0) = 1; 186 mcheck_taken(0) = 0; 187 mb(); 188 189 /* Access configuration space. */ 190 *(vip)addr = value; 191 mb(); 192 *(vip)addr; /* read back to force the write */ 193 194 mcheck_expected(0) = 0; 195 mb(); 196 197 /* If Type1 access, must reset IOC CFG so normal IO space ops work. */ 198 if (type1) { 199 *(vip)CIA_IOC_CFG = cia_cfg; 200 mb(); 201 *(vip)CIA_IOC_CFG; 202 } 203 204 local_irq_restore(flags); 205 DBGC(("done\n")); 206 } 207 208 static int 209 cia_read_config(struct pci_bus *bus, unsigned int devfn, int where, int size, 210 u32 *value) 211 { 212 unsigned long addr, pci_addr; 213 long mask; 214 unsigned char type1; 215 int shift; 216 217 if (mk_conf_addr(bus, devfn, where, &pci_addr, &type1)) 218 return PCIBIOS_DEVICE_NOT_FOUND; 219 220 mask = (size - 1) * 8; 221 shift = (where & 3) * 8; 222 addr = (pci_addr << 5) + mask + CIA_CONF; 223 *value = conf_read(addr, type1) >> (shift); 224 return PCIBIOS_SUCCESSFUL; 225 } 226 227 static int 228 cia_write_config(struct pci_bus *bus, unsigned int devfn, int where, int size, 229 u32 value) 230 { 231 unsigned long addr, pci_addr; 232 long mask; 233 unsigned char type1; 234 235 if (mk_conf_addr(bus, devfn, where, &pci_addr, &type1)) 236 return PCIBIOS_DEVICE_NOT_FOUND; 237 238 mask = (size - 1) * 8; 239 addr = (pci_addr << 5) + mask + CIA_CONF; 240 conf_write(addr, value << ((where & 3) * 8), type1); 241 return PCIBIOS_SUCCESSFUL; 242 } 243 244 struct pci_ops cia_pci_ops = 245 { 246 .read = cia_read_config, 247 .write = cia_write_config, 248 }; 249 250 /* 251 * CIA Pass 1 and PYXIS Pass 1 and 2 have a broken scatter-gather tlb. 252 * It cannot be invalidated. Rather than hard code the pass numbers, 253 * actually try the tbia to see if it works. 254 */ 255 256 void 257 cia_pci_tbi(struct pci_controller *hose, dma_addr_t start, dma_addr_t end) 258 { 259 wmb(); 260 *(vip)CIA_IOC_PCI_TBIA = 3; /* Flush all locked and unlocked. */ 261 mb(); 262 *(vip)CIA_IOC_PCI_TBIA; 263 } 264 265 /* 266 * On PYXIS, even if the tbia works, we cannot use it. It effectively locks 267 * the chip (as well as direct write to the tag registers) if there is a 268 * SG DMA operation in progress. This is true at least for PYXIS rev. 1, 269 * so always use the method below. 270 */ 271 /* 272 * This is the method NT and NetBSD use. 273 * 274 * Allocate mappings, and put the chip into DMA loopback mode to read a 275 * garbage page. This works by causing TLB misses, causing old entries to 276 * be purged to make room for the new entries coming in for the garbage page. 277 */ 278 279 #define CIA_BROKEN_TBIA_BASE 0x30000000 280 #define CIA_BROKEN_TBIA_SIZE 1024 281 282 /* Always called with interrupts disabled */ 283 void 284 cia_pci_tbi_try2(struct pci_controller *hose, 285 dma_addr_t start, dma_addr_t end) 286 { 287 void __iomem *bus_addr; 288 int ctrl; 289 290 /* Put the chip into PCI loopback mode. */ 291 mb(); 292 ctrl = *(vip)CIA_IOC_CIA_CTRL; 293 *(vip)CIA_IOC_CIA_CTRL = ctrl | CIA_CTRL_PCI_LOOP_EN; 294 mb(); 295 *(vip)CIA_IOC_CIA_CTRL; 296 mb(); 297 298 /* Read from PCI dense memory space at TBI_ADDR, skipping 32k on 299 each read. This forces SG TLB misses. NetBSD claims that the 300 TLB entries are not quite LRU, meaning that we need to read more 301 times than there are actual tags. The 2117x docs claim strict 302 round-robin. Oh well, we've come this far... */ 303 /* Even better - as seen on the PYXIS rev 1 the TLB tags 0-3 can 304 be filled by the TLB misses *only once* after being invalidated 305 (by tbia or direct write). Next misses won't update them even 306 though the lock bits are cleared. Tags 4-7 are "quite LRU" though, 307 so use them and read at window 3 base exactly 4 times. Reading 308 more sometimes makes the chip crazy. -ink */ 309 310 bus_addr = cia_ioremap(CIA_BROKEN_TBIA_BASE, 32768 * 4); 311 312 cia_readl(bus_addr + 0x00000); 313 cia_readl(bus_addr + 0x08000); 314 cia_readl(bus_addr + 0x10000); 315 cia_readl(bus_addr + 0x18000); 316 317 cia_iounmap(bus_addr); 318 319 /* Restore normal PCI operation. */ 320 mb(); 321 *(vip)CIA_IOC_CIA_CTRL = ctrl; 322 mb(); 323 *(vip)CIA_IOC_CIA_CTRL; 324 mb(); 325 } 326 327 static inline void 328 cia_prepare_tbia_workaround(int window) 329 { 330 unsigned long *ppte, pte; 331 long i; 332 333 /* Use minimal 1K map. */ 334 ppte = __alloc_bootmem(CIA_BROKEN_TBIA_SIZE, 32768, 0); 335 pte = (virt_to_phys(ppte) >> (PAGE_SHIFT - 1)) | 1; 336 337 for (i = 0; i < CIA_BROKEN_TBIA_SIZE / sizeof(unsigned long); ++i) 338 ppte[i] = pte; 339 340 *(vip)CIA_IOC_PCI_Wn_BASE(window) = CIA_BROKEN_TBIA_BASE | 3; 341 *(vip)CIA_IOC_PCI_Wn_MASK(window) 342 = (CIA_BROKEN_TBIA_SIZE*1024 - 1) & 0xfff00000; 343 *(vip)CIA_IOC_PCI_Tn_BASE(window) = virt_to_phys(ppte) >> 2; 344 } 345 346 static void __init 347 verify_tb_operation(void) 348 { 349 static int page[PAGE_SIZE/4] 350 __attribute__((aligned(PAGE_SIZE))) 351 __initdata = { 0 }; 352 353 struct pci_iommu_arena *arena = pci_isa_hose->sg_isa; 354 int ctrl, addr0, tag0, pte0, data0; 355 int temp, use_tbia_try2 = 0; 356 void __iomem *bus_addr; 357 358 /* pyxis -- tbia is broken */ 359 if (pci_isa_hose->dense_io_base) 360 use_tbia_try2 = 1; 361 362 /* Put the chip into PCI loopback mode. */ 363 mb(); 364 ctrl = *(vip)CIA_IOC_CIA_CTRL; 365 *(vip)CIA_IOC_CIA_CTRL = ctrl | CIA_CTRL_PCI_LOOP_EN; 366 mb(); 367 *(vip)CIA_IOC_CIA_CTRL; 368 mb(); 369 370 /* Write a valid entry directly into the TLB registers. */ 371 372 addr0 = arena->dma_base; 373 tag0 = addr0 | 1; 374 pte0 = (virt_to_phys(page) >> (PAGE_SHIFT - 1)) | 1; 375 376 *(vip)CIA_IOC_TB_TAGn(0) = tag0; 377 *(vip)CIA_IOC_TB_TAGn(1) = 0; 378 *(vip)CIA_IOC_TB_TAGn(2) = 0; 379 *(vip)CIA_IOC_TB_TAGn(3) = 0; 380 *(vip)CIA_IOC_TB_TAGn(4) = 0; 381 *(vip)CIA_IOC_TB_TAGn(5) = 0; 382 *(vip)CIA_IOC_TB_TAGn(6) = 0; 383 *(vip)CIA_IOC_TB_TAGn(7) = 0; 384 *(vip)CIA_IOC_TBn_PAGEm(0,0) = pte0; 385 *(vip)CIA_IOC_TBn_PAGEm(0,1) = 0; 386 *(vip)CIA_IOC_TBn_PAGEm(0,2) = 0; 387 *(vip)CIA_IOC_TBn_PAGEm(0,3) = 0; 388 mb(); 389 390 /* Get a usable bus address */ 391 bus_addr = cia_ioremap(addr0, 8*PAGE_SIZE); 392 393 /* First, verify we can read back what we've written. If 394 this fails, we can't be sure of any of the other testing 395 we're going to do, so bail. */ 396 /* ??? Actually, we could do the work with machine checks. 397 By passing this register update test, we pretty much 398 guarantee that cia_pci_tbi_try1 works. If this test 399 fails, cia_pci_tbi_try2 might still work. */ 400 401 temp = *(vip)CIA_IOC_TB_TAGn(0); 402 if (temp != tag0) { 403 printk("pci: failed tb register update test " 404 "(tag0 %#x != %#x)\n", temp, tag0); 405 goto failed; 406 } 407 temp = *(vip)CIA_IOC_TB_TAGn(1); 408 if (temp != 0) { 409 printk("pci: failed tb register update test " 410 "(tag1 %#x != 0)\n", temp); 411 goto failed; 412 } 413 temp = *(vip)CIA_IOC_TBn_PAGEm(0,0); 414 if (temp != pte0) { 415 printk("pci: failed tb register update test " 416 "(pte0 %#x != %#x)\n", temp, pte0); 417 goto failed; 418 } 419 printk("pci: passed tb register update test\n"); 420 421 /* Second, verify we can actually do I/O through this entry. */ 422 423 data0 = 0xdeadbeef; 424 page[0] = data0; 425 mcheck_expected(0) = 1; 426 mcheck_taken(0) = 0; 427 mb(); 428 temp = cia_readl(bus_addr); 429 mb(); 430 mcheck_expected(0) = 0; 431 mb(); 432 if (mcheck_taken(0)) { 433 printk("pci: failed sg loopback i/o read test (mcheck)\n"); 434 goto failed; 435 } 436 if (temp != data0) { 437 printk("pci: failed sg loopback i/o read test " 438 "(%#x != %#x)\n", temp, data0); 439 goto failed; 440 } 441 printk("pci: passed sg loopback i/o read test\n"); 442 443 /* Third, try to invalidate the TLB. */ 444 445 if (! use_tbia_try2) { 446 cia_pci_tbi(arena->hose, 0, -1); 447 temp = *(vip)CIA_IOC_TB_TAGn(0); 448 if (temp & 1) { 449 use_tbia_try2 = 1; 450 printk("pci: failed tbia test; workaround available\n"); 451 } else { 452 printk("pci: passed tbia test\n"); 453 } 454 } 455 456 /* Fourth, verify the TLB snoops the EV5's caches when 457 doing a tlb fill. */ 458 459 data0 = 0x5adda15e; 460 page[0] = data0; 461 arena->ptes[4] = pte0; 462 mcheck_expected(0) = 1; 463 mcheck_taken(0) = 0; 464 mb(); 465 temp = cia_readl(bus_addr + 4*PAGE_SIZE); 466 mb(); 467 mcheck_expected(0) = 0; 468 mb(); 469 if (mcheck_taken(0)) { 470 printk("pci: failed pte write cache snoop test (mcheck)\n"); 471 goto failed; 472 } 473 if (temp != data0) { 474 printk("pci: failed pte write cache snoop test " 475 "(%#x != %#x)\n", temp, data0); 476 goto failed; 477 } 478 printk("pci: passed pte write cache snoop test\n"); 479 480 /* Fifth, verify that a previously invalid PTE entry gets 481 filled from the page table. */ 482 483 data0 = 0xabcdef12; 484 page[0] = data0; 485 arena->ptes[5] = pte0; 486 mcheck_expected(0) = 1; 487 mcheck_taken(0) = 0; 488 mb(); 489 temp = cia_readl(bus_addr + 5*PAGE_SIZE); 490 mb(); 491 mcheck_expected(0) = 0; 492 mb(); 493 if (mcheck_taken(0)) { 494 printk("pci: failed valid tag invalid pte reload test " 495 "(mcheck; workaround available)\n"); 496 /* Work around this bug by aligning new allocations 497 on 4 page boundaries. */ 498 arena->align_entry = 4; 499 } else if (temp != data0) { 500 printk("pci: failed valid tag invalid pte reload test " 501 "(%#x != %#x)\n", temp, data0); 502 goto failed; 503 } else { 504 printk("pci: passed valid tag invalid pte reload test\n"); 505 } 506 507 /* Sixth, verify machine checks are working. Test invalid 508 pte under the same valid tag as we used above. */ 509 510 mcheck_expected(0) = 1; 511 mcheck_taken(0) = 0; 512 mb(); 513 temp = cia_readl(bus_addr + 6*PAGE_SIZE); 514 mb(); 515 mcheck_expected(0) = 0; 516 mb(); 517 printk("pci: %s pci machine check test\n", 518 mcheck_taken(0) ? "passed" : "failed"); 519 520 /* Clean up after the tests. */ 521 arena->ptes[4] = 0; 522 arena->ptes[5] = 0; 523 524 if (use_tbia_try2) { 525 alpha_mv.mv_pci_tbi = cia_pci_tbi_try2; 526 527 /* Tags 0-3 must be disabled if we use this workaraund. */ 528 wmb(); 529 *(vip)CIA_IOC_TB_TAGn(0) = 2; 530 *(vip)CIA_IOC_TB_TAGn(1) = 2; 531 *(vip)CIA_IOC_TB_TAGn(2) = 2; 532 *(vip)CIA_IOC_TB_TAGn(3) = 2; 533 534 printk("pci: tbia workaround enabled\n"); 535 } 536 alpha_mv.mv_pci_tbi(arena->hose, 0, -1); 537 538 exit: 539 /* unmap the bus addr */ 540 cia_iounmap(bus_addr); 541 542 /* Restore normal PCI operation. */ 543 mb(); 544 *(vip)CIA_IOC_CIA_CTRL = ctrl; 545 mb(); 546 *(vip)CIA_IOC_CIA_CTRL; 547 mb(); 548 return; 549 550 failed: 551 printk("pci: disabling sg translation window\n"); 552 *(vip)CIA_IOC_PCI_W0_BASE = 0; 553 *(vip)CIA_IOC_PCI_W1_BASE = 0; 554 pci_isa_hose->sg_isa = NULL; 555 alpha_mv.mv_pci_tbi = NULL; 556 goto exit; 557 } 558 559 #if defined(ALPHA_RESTORE_SRM_SETUP) 560 /* Save CIA configuration data as the console had it set up. */ 561 struct 562 { 563 unsigned int hae_mem; 564 unsigned int hae_io; 565 unsigned int pci_dac_offset; 566 unsigned int err_mask; 567 unsigned int cia_ctrl; 568 unsigned int cia_cnfg; 569 struct { 570 unsigned int w_base; 571 unsigned int w_mask; 572 unsigned int t_base; 573 } window[4]; 574 } saved_config __attribute((common)); 575 576 void 577 cia_save_srm_settings(int is_pyxis) 578 { 579 int i; 580 581 /* Save some important registers. */ 582 saved_config.err_mask = *(vip)CIA_IOC_ERR_MASK; 583 saved_config.cia_ctrl = *(vip)CIA_IOC_CIA_CTRL; 584 saved_config.hae_mem = *(vip)CIA_IOC_HAE_MEM; 585 saved_config.hae_io = *(vip)CIA_IOC_HAE_IO; 586 saved_config.pci_dac_offset = *(vip)CIA_IOC_PCI_W_DAC; 587 588 if (is_pyxis) 589 saved_config.cia_cnfg = *(vip)CIA_IOC_CIA_CNFG; 590 else 591 saved_config.cia_cnfg = 0; 592 593 /* Save DMA windows configuration. */ 594 for (i = 0; i < 4; i++) { 595 saved_config.window[i].w_base = *(vip)CIA_IOC_PCI_Wn_BASE(i); 596 saved_config.window[i].w_mask = *(vip)CIA_IOC_PCI_Wn_MASK(i); 597 saved_config.window[i].t_base = *(vip)CIA_IOC_PCI_Tn_BASE(i); 598 } 599 mb(); 600 } 601 602 void 603 cia_restore_srm_settings(void) 604 { 605 int i; 606 607 for (i = 0; i < 4; i++) { 608 *(vip)CIA_IOC_PCI_Wn_BASE(i) = saved_config.window[i].w_base; 609 *(vip)CIA_IOC_PCI_Wn_MASK(i) = saved_config.window[i].w_mask; 610 *(vip)CIA_IOC_PCI_Tn_BASE(i) = saved_config.window[i].t_base; 611 } 612 613 *(vip)CIA_IOC_HAE_MEM = saved_config.hae_mem; 614 *(vip)CIA_IOC_HAE_IO = saved_config.hae_io; 615 *(vip)CIA_IOC_PCI_W_DAC = saved_config.pci_dac_offset; 616 *(vip)CIA_IOC_ERR_MASK = saved_config.err_mask; 617 *(vip)CIA_IOC_CIA_CTRL = saved_config.cia_ctrl; 618 619 if (saved_config.cia_cnfg) /* Must be pyxis. */ 620 *(vip)CIA_IOC_CIA_CNFG = saved_config.cia_cnfg; 621 622 mb(); 623 } 624 #else /* ALPHA_RESTORE_SRM_SETUP */ 625 #define cia_save_srm_settings(p) do {} while (0) 626 #define cia_restore_srm_settings() do {} while (0) 627 #endif /* ALPHA_RESTORE_SRM_SETUP */ 628 629 630 static void __init 631 do_init_arch(int is_pyxis) 632 { 633 struct pci_controller *hose; 634 int temp, cia_rev, tbia_window; 635 636 cia_rev = *(vip)CIA_IOC_CIA_REV & CIA_REV_MASK; 637 printk("pci: cia revision %d%s\n", 638 cia_rev, is_pyxis ? " (pyxis)" : ""); 639 640 if (alpha_using_srm) 641 cia_save_srm_settings(is_pyxis); 642 643 /* Set up error reporting. */ 644 temp = *(vip)CIA_IOC_ERR_MASK; 645 temp &= ~(CIA_ERR_CPU_PE | CIA_ERR_MEM_NEM | CIA_ERR_PA_PTE_INV 646 | CIA_ERR_RCVD_MAS_ABT | CIA_ERR_RCVD_TAR_ABT); 647 *(vip)CIA_IOC_ERR_MASK = temp; 648 649 /* Clear all currently pending errors. */ 650 temp = *(vip)CIA_IOC_CIA_ERR; 651 *(vip)CIA_IOC_CIA_ERR = temp; 652 653 /* Turn on mchecks. */ 654 temp = *(vip)CIA_IOC_CIA_CTRL; 655 temp |= CIA_CTRL_FILL_ERR_EN | CIA_CTRL_MCHK_ERR_EN; 656 *(vip)CIA_IOC_CIA_CTRL = temp; 657 658 /* Clear the CFG register, which gets used for PCI config space 659 accesses. That is the way we want to use it, and we do not 660 want to depend on what ARC or SRM might have left behind. */ 661 *(vip)CIA_IOC_CFG = 0; 662 663 /* Zero the HAEs. */ 664 *(vip)CIA_IOC_HAE_MEM = 0; 665 *(vip)CIA_IOC_HAE_IO = 0; 666 667 /* For PYXIS, we always use BWX bus and i/o accesses. To that end, 668 make sure they're enabled on the controller. At the same time, 669 enable the monster window. */ 670 if (is_pyxis) { 671 temp = *(vip)CIA_IOC_CIA_CNFG; 672 temp |= CIA_CNFG_IOA_BWEN | CIA_CNFG_PCI_MWEN; 673 *(vip)CIA_IOC_CIA_CNFG = temp; 674 } 675 676 /* Synchronize with all previous changes. */ 677 mb(); 678 *(vip)CIA_IOC_CIA_REV; 679 680 /* 681 * Create our single hose. 682 */ 683 684 pci_isa_hose = hose = alloc_pci_controller(); 685 hose->io_space = &ioport_resource; 686 hose->mem_space = &iomem_resource; 687 hose->index = 0; 688 689 if (! is_pyxis) { 690 struct resource *hae_mem = alloc_resource(); 691 hose->mem_space = hae_mem; 692 693 hae_mem->start = 0; 694 hae_mem->end = CIA_MEM_R1_MASK; 695 hae_mem->name = pci_hae0_name; 696 hae_mem->flags = IORESOURCE_MEM; 697 698 if (request_resource(&iomem_resource, hae_mem) < 0) 699 printk(KERN_ERR "Failed to request HAE_MEM\n"); 700 701 hose->sparse_mem_base = CIA_SPARSE_MEM - IDENT_ADDR; 702 hose->dense_mem_base = CIA_DENSE_MEM - IDENT_ADDR; 703 hose->sparse_io_base = CIA_IO - IDENT_ADDR; 704 hose->dense_io_base = 0; 705 } else { 706 hose->sparse_mem_base = 0; 707 hose->dense_mem_base = CIA_BW_MEM - IDENT_ADDR; 708 hose->sparse_io_base = 0; 709 hose->dense_io_base = CIA_BW_IO - IDENT_ADDR; 710 } 711 712 /* 713 * Set up the PCI to main memory translation windows. 714 * 715 * Window 0 is S/G 8MB at 8MB (for isa) 716 * Window 1 is S/G 1MB at 768MB (for tbia) (unused for CIA rev 1) 717 * Window 2 is direct access 2GB at 2GB 718 * Window 3 is DAC access 4GB at 8GB (or S/G for tbia if CIA rev 1) 719 * 720 * ??? NetBSD hints that page tables must be aligned to 32K, 721 * possibly due to a hardware bug. This is over-aligned 722 * from the 8K alignment one would expect for an 8MB window. 723 * No description of what revisions affected. 724 */ 725 726 hose->sg_pci = NULL; 727 hose->sg_isa = iommu_arena_new(hose, 0x00800000, 0x00800000, 32768); 728 729 __direct_map_base = 0x80000000; 730 __direct_map_size = 0x80000000; 731 732 *(vip)CIA_IOC_PCI_W0_BASE = hose->sg_isa->dma_base | 3; 733 *(vip)CIA_IOC_PCI_W0_MASK = (hose->sg_isa->size - 1) & 0xfff00000; 734 *(vip)CIA_IOC_PCI_T0_BASE = virt_to_phys(hose->sg_isa->ptes) >> 2; 735 736 *(vip)CIA_IOC_PCI_W2_BASE = __direct_map_base | 1; 737 *(vip)CIA_IOC_PCI_W2_MASK = (__direct_map_size - 1) & 0xfff00000; 738 *(vip)CIA_IOC_PCI_T2_BASE = 0 >> 2; 739 740 /* On PYXIS we have the monster window, selected by bit 40, so 741 there is no need for window3 to be enabled. 742 743 On CIA, we don't have true arbitrary addressing -- bits <39:32> 744 are compared against W_DAC. We can, however, directly map 4GB, 745 which is better than before. However, due to assumptions made 746 elsewhere, we should not claim that we support DAC unless that 747 4GB covers all of physical memory. 748 749 On CIA rev 1, apparently W1 and W2 can't be used for SG. 750 At least, there are reports that it doesn't work for Alcor. 751 In that case, we have no choice but to use W3 for the TBIA 752 workaround, which means we can't use DAC at all. */ 753 754 tbia_window = 1; 755 if (is_pyxis) { 756 *(vip)CIA_IOC_PCI_W3_BASE = 0; 757 } else if (cia_rev == 1) { 758 *(vip)CIA_IOC_PCI_W1_BASE = 0; 759 tbia_window = 3; 760 } else if (max_low_pfn > (0x100000000UL >> PAGE_SHIFT)) { 761 *(vip)CIA_IOC_PCI_W3_BASE = 0; 762 } else { 763 *(vip)CIA_IOC_PCI_W3_BASE = 0x00000000 | 1 | 8; 764 *(vip)CIA_IOC_PCI_W3_MASK = 0xfff00000; 765 *(vip)CIA_IOC_PCI_T3_BASE = 0 >> 2; 766 767 alpha_mv.pci_dac_offset = 0x200000000UL; 768 *(vip)CIA_IOC_PCI_W_DAC = alpha_mv.pci_dac_offset >> 32; 769 } 770 771 /* Prepare workaround for apparently broken tbia. */ 772 cia_prepare_tbia_workaround(tbia_window); 773 } 774 775 void __init 776 cia_init_arch(void) 777 { 778 do_init_arch(0); 779 } 780 781 void __init 782 pyxis_init_arch(void) 783 { 784 /* On pyxis machines we can precisely calculate the 785 CPU clock frequency using pyxis real time counter. 786 It's especially useful for SX164 with broken RTC. 787 788 Both CPU and chipset are driven by the single 16.666M 789 or 16.667M crystal oscillator. PYXIS_RT_COUNT clock is 790 66.66 MHz. -ink */ 791 792 unsigned int cc0, cc1; 793 unsigned long pyxis_cc; 794 795 __asm__ __volatile__ ("rpcc %0" : "=r"(cc0)); 796 pyxis_cc = *(vulp)PYXIS_RT_COUNT; 797 do { } while(*(vulp)PYXIS_RT_COUNT - pyxis_cc < 4096); 798 __asm__ __volatile__ ("rpcc %0" : "=r"(cc1)); 799 cc1 -= cc0; 800 hwrpb->cycle_freq = ((cc1 >> 11) * 100000000UL) / 3; 801 hwrpb_update_checksum(hwrpb); 802 803 do_init_arch(1); 804 } 805 806 void 807 cia_kill_arch(int mode) 808 { 809 if (alpha_using_srm) 810 cia_restore_srm_settings(); 811 } 812 813 void __init 814 cia_init_pci(void) 815 { 816 /* Must delay this from init_arch, as we need machine checks. */ 817 verify_tb_operation(); 818 common_init_pci(); 819 } 820 821 static inline void 822 cia_pci_clr_err(void) 823 { 824 int jd; 825 826 jd = *(vip)CIA_IOC_CIA_ERR; 827 *(vip)CIA_IOC_CIA_ERR = jd; 828 mb(); 829 *(vip)CIA_IOC_CIA_ERR; /* re-read to force write. */ 830 } 831 832 #ifdef CONFIG_VERBOSE_MCHECK 833 static void 834 cia_decode_pci_error(struct el_CIA_sysdata_mcheck *cia, const char *msg) 835 { 836 static const char * const pci_cmd_desc[16] = { 837 "Interrupt Acknowledge", "Special Cycle", "I/O Read", 838 "I/O Write", "Reserved 0x4", "Reserved 0x5", "Memory Read", 839 "Memory Write", "Reserved 0x8", "Reserved 0x9", 840 "Configuration Read", "Configuration Write", 841 "Memory Read Multiple", "Dual Address Cycle", 842 "Memory Read Line", "Memory Write and Invalidate" 843 }; 844 845 if (cia->cia_err & (CIA_ERR_COR_ERR 846 | CIA_ERR_UN_COR_ERR 847 | CIA_ERR_MEM_NEM 848 | CIA_ERR_PA_PTE_INV)) { 849 static const char * const window_desc[6] = { 850 "No window active", "Window 0 hit", "Window 1 hit", 851 "Window 2 hit", "Window 3 hit", "Monster window hit" 852 }; 853 854 const char *window; 855 const char *cmd; 856 unsigned long addr, tmp; 857 int lock, dac; 858 859 cmd = pci_cmd_desc[cia->pci_err0 & 0x7]; 860 lock = (cia->pci_err0 >> 4) & 1; 861 dac = (cia->pci_err0 >> 5) & 1; 862 863 tmp = (cia->pci_err0 >> 8) & 0x1F; 864 tmp = ffs(tmp); 865 window = window_desc[tmp]; 866 867 addr = cia->pci_err1; 868 if (dac) { 869 tmp = *(vip)CIA_IOC_PCI_W_DAC & 0xFFUL; 870 addr |= tmp << 32; 871 } 872 873 printk(KERN_CRIT "CIA machine check: %s\n", msg); 874 printk(KERN_CRIT " DMA command: %s\n", cmd); 875 printk(KERN_CRIT " PCI address: %#010lx\n", addr); 876 printk(KERN_CRIT " %s, Lock: %d, DAC: %d\n", 877 window, lock, dac); 878 } else if (cia->cia_err & (CIA_ERR_PERR 879 | CIA_ERR_PCI_ADDR_PE 880 | CIA_ERR_RCVD_MAS_ABT 881 | CIA_ERR_RCVD_TAR_ABT 882 | CIA_ERR_IOA_TIMEOUT)) { 883 static const char * const master_st_desc[16] = { 884 "Idle", "Drive bus", "Address step cycle", 885 "Address cycle", "Data cycle", "Last read data cycle", 886 "Last write data cycle", "Read stop cycle", 887 "Write stop cycle", "Read turnaround cycle", 888 "Write turnaround cycle", "Reserved 0xB", 889 "Reserved 0xC", "Reserved 0xD", "Reserved 0xE", 890 "Unknown state" 891 }; 892 static const char * const target_st_desc[16] = { 893 "Idle", "Busy", "Read data cycle", "Write data cycle", 894 "Read stop cycle", "Write stop cycle", 895 "Read turnaround cycle", "Write turnaround cycle", 896 "Read wait cycle", "Write wait cycle", 897 "Reserved 0xA", "Reserved 0xB", "Reserved 0xC", 898 "Reserved 0xD", "Reserved 0xE", "Unknown state" 899 }; 900 901 const char *cmd; 902 const char *master, *target; 903 unsigned long addr, tmp; 904 int dac; 905 906 master = master_st_desc[(cia->pci_err0 >> 16) & 0xF]; 907 target = target_st_desc[(cia->pci_err0 >> 20) & 0xF]; 908 cmd = pci_cmd_desc[(cia->pci_err0 >> 24) & 0xF]; 909 dac = (cia->pci_err0 >> 28) & 1; 910 911 addr = cia->pci_err2; 912 if (dac) { 913 tmp = *(volatile int *)CIA_IOC_PCI_W_DAC & 0xFFUL; 914 addr |= tmp << 32; 915 } 916 917 printk(KERN_CRIT "CIA machine check: %s\n", msg); 918 printk(KERN_CRIT " PCI command: %s\n", cmd); 919 printk(KERN_CRIT " Master state: %s, Target state: %s\n", 920 master, target); 921 printk(KERN_CRIT " PCI address: %#010lx, DAC: %d\n", 922 addr, dac); 923 } else { 924 printk(KERN_CRIT "CIA machine check: %s\n", msg); 925 printk(KERN_CRIT " Unknown PCI error\n"); 926 printk(KERN_CRIT " PCI_ERR0 = %#08lx", cia->pci_err0); 927 printk(KERN_CRIT " PCI_ERR1 = %#08lx", cia->pci_err1); 928 printk(KERN_CRIT " PCI_ERR2 = %#08lx", cia->pci_err2); 929 } 930 } 931 932 static void 933 cia_decode_mem_error(struct el_CIA_sysdata_mcheck *cia, const char *msg) 934 { 935 unsigned long mem_port_addr; 936 unsigned long mem_port_mask; 937 const char *mem_port_cmd; 938 const char *seq_state; 939 const char *set_select; 940 unsigned long tmp; 941 942 /* If this is a DMA command, also decode the PCI bits. */ 943 if ((cia->mem_err1 >> 20) & 1) 944 cia_decode_pci_error(cia, msg); 945 else 946 printk(KERN_CRIT "CIA machine check: %s\n", msg); 947 948 mem_port_addr = cia->mem_err0 & 0xfffffff0; 949 mem_port_addr |= (cia->mem_err1 & 0x83UL) << 32; 950 951 mem_port_mask = (cia->mem_err1 >> 12) & 0xF; 952 953 tmp = (cia->mem_err1 >> 8) & 0xF; 954 tmp |= ((cia->mem_err1 >> 20) & 1) << 4; 955 if ((tmp & 0x1E) == 0x06) 956 mem_port_cmd = "WRITE BLOCK or WRITE BLOCK LOCK"; 957 else if ((tmp & 0x1C) == 0x08) 958 mem_port_cmd = "READ MISS or READ MISS MODIFY"; 959 else if (tmp == 0x1C) 960 mem_port_cmd = "BC VICTIM"; 961 else if ((tmp & 0x1E) == 0x0E) 962 mem_port_cmd = "READ MISS MODIFY"; 963 else if ((tmp & 0x1C) == 0x18) 964 mem_port_cmd = "DMA READ or DMA READ MODIFY"; 965 else if ((tmp & 0x1E) == 0x12) 966 mem_port_cmd = "DMA WRITE"; 967 else 968 mem_port_cmd = "Unknown"; 969 970 tmp = (cia->mem_err1 >> 16) & 0xF; 971 switch (tmp) { 972 case 0x0: 973 seq_state = "Idle"; 974 break; 975 case 0x1: 976 seq_state = "DMA READ or DMA WRITE"; 977 break; 978 case 0x2: case 0x3: 979 seq_state = "READ MISS (or READ MISS MODIFY) with victim"; 980 break; 981 case 0x4: case 0x5: case 0x6: 982 seq_state = "READ MISS (or READ MISS MODIFY) with no victim"; 983 break; 984 case 0x8: case 0x9: case 0xB: 985 seq_state = "Refresh"; 986 break; 987 case 0xC: 988 seq_state = "Idle, waiting for DMA pending read"; 989 break; 990 case 0xE: case 0xF: 991 seq_state = "Idle, ras precharge"; 992 break; 993 default: 994 seq_state = "Unknown"; 995 break; 996 } 997 998 tmp = (cia->mem_err1 >> 24) & 0x1F; 999 switch (tmp) { 1000 case 0x00: set_select = "Set 0 selected"; break; 1001 case 0x01: set_select = "Set 1 selected"; break; 1002 case 0x02: set_select = "Set 2 selected"; break; 1003 case 0x03: set_select = "Set 3 selected"; break; 1004 case 0x04: set_select = "Set 4 selected"; break; 1005 case 0x05: set_select = "Set 5 selected"; break; 1006 case 0x06: set_select = "Set 6 selected"; break; 1007 case 0x07: set_select = "Set 7 selected"; break; 1008 case 0x08: set_select = "Set 8 selected"; break; 1009 case 0x09: set_select = "Set 9 selected"; break; 1010 case 0x0A: set_select = "Set A selected"; break; 1011 case 0x0B: set_select = "Set B selected"; break; 1012 case 0x0C: set_select = "Set C selected"; break; 1013 case 0x0D: set_select = "Set D selected"; break; 1014 case 0x0E: set_select = "Set E selected"; break; 1015 case 0x0F: set_select = "Set F selected"; break; 1016 case 0x10: set_select = "No set selected"; break; 1017 case 0x1F: set_select = "Refresh cycle"; break; 1018 default: set_select = "Unknown"; break; 1019 } 1020 1021 printk(KERN_CRIT " Memory port command: %s\n", mem_port_cmd); 1022 printk(KERN_CRIT " Memory port address: %#010lx, mask: %#lx\n", 1023 mem_port_addr, mem_port_mask); 1024 printk(KERN_CRIT " Memory sequencer state: %s\n", seq_state); 1025 printk(KERN_CRIT " Memory set: %s\n", set_select); 1026 } 1027 1028 static void 1029 cia_decode_ecc_error(struct el_CIA_sysdata_mcheck *cia, const char *msg) 1030 { 1031 long syn; 1032 long i; 1033 const char *fmt; 1034 1035 cia_decode_mem_error(cia, msg); 1036 1037 syn = cia->cia_syn & 0xff; 1038 if (syn == (syn & -syn)) { 1039 fmt = KERN_CRIT " ECC syndrome %#x -- check bit %d\n"; 1040 i = ffs(syn) - 1; 1041 } else { 1042 static unsigned char const data_bit[64] = { 1043 0xCE, 0xCB, 0xD3, 0xD5, 1044 0xD6, 0xD9, 0xDA, 0xDC, 1045 0x23, 0x25, 0x26, 0x29, 1046 0x2A, 0x2C, 0x31, 0x34, 1047 0x0E, 0x0B, 0x13, 0x15, 1048 0x16, 0x19, 0x1A, 0x1C, 1049 0xE3, 0xE5, 0xE6, 0xE9, 1050 0xEA, 0xEC, 0xF1, 0xF4, 1051 0x4F, 0x4A, 0x52, 0x54, 1052 0x57, 0x58, 0x5B, 0x5D, 1053 0xA2, 0xA4, 0xA7, 0xA8, 1054 0xAB, 0xAD, 0xB0, 0xB5, 1055 0x8F, 0x8A, 0x92, 0x94, 1056 0x97, 0x98, 0x9B, 0x9D, 1057 0x62, 0x64, 0x67, 0x68, 1058 0x6B, 0x6D, 0x70, 0x75 1059 }; 1060 1061 for (i = 0; i < 64; ++i) 1062 if (data_bit[i] == syn) 1063 break; 1064 1065 if (i < 64) 1066 fmt = KERN_CRIT " ECC syndrome %#x -- data bit %d\n"; 1067 else 1068 fmt = KERN_CRIT " ECC syndrome %#x -- unknown bit\n"; 1069 } 1070 1071 printk (fmt, syn, i); 1072 } 1073 1074 static void 1075 cia_decode_parity_error(struct el_CIA_sysdata_mcheck *cia) 1076 { 1077 static const char * const cmd_desc[16] = { 1078 "NOP", "LOCK", "FETCH", "FETCH_M", "MEMORY BARRIER", 1079 "SET DIRTY", "WRITE BLOCK", "WRITE BLOCK LOCK", 1080 "READ MISS0", "READ MISS1", "READ MISS MOD0", 1081 "READ MISS MOD1", "BCACHE VICTIM", "Spare", 1082 "READ MISS MOD STC0", "READ MISS MOD STC1" 1083 }; 1084 1085 unsigned long addr; 1086 unsigned long mask; 1087 const char *cmd; 1088 int par; 1089 1090 addr = cia->cpu_err0 & 0xfffffff0; 1091 addr |= (cia->cpu_err1 & 0x83UL) << 32; 1092 cmd = cmd_desc[(cia->cpu_err1 >> 8) & 0xF]; 1093 mask = (cia->cpu_err1 >> 12) & 0xF; 1094 par = (cia->cpu_err1 >> 21) & 1; 1095 1096 printk(KERN_CRIT "CIA machine check: System bus parity error\n"); 1097 printk(KERN_CRIT " Command: %s, Parity bit: %d\n", cmd, par); 1098 printk(KERN_CRIT " Address: %#010lx, Mask: %#lx\n", addr, mask); 1099 } 1100 #endif /* CONFIG_VERBOSE_MCHECK */ 1101 1102 1103 static int 1104 cia_decode_mchk(unsigned long la_ptr) 1105 { 1106 struct el_common *com; 1107 struct el_CIA_sysdata_mcheck *cia; 1108 1109 com = (void *)la_ptr; 1110 cia = (void *)(la_ptr + com->sys_offset); 1111 1112 if ((cia->cia_err & CIA_ERR_VALID) == 0) 1113 return 0; 1114 1115 #ifdef CONFIG_VERBOSE_MCHECK 1116 if (!alpha_verbose_mcheck) 1117 return 1; 1118 1119 switch (ffs(cia->cia_err & 0xfff) - 1) { 1120 case 0: /* CIA_ERR_COR_ERR */ 1121 cia_decode_ecc_error(cia, "Corrected ECC error"); 1122 break; 1123 case 1: /* CIA_ERR_UN_COR_ERR */ 1124 cia_decode_ecc_error(cia, "Uncorrected ECC error"); 1125 break; 1126 case 2: /* CIA_ERR_CPU_PE */ 1127 cia_decode_parity_error(cia); 1128 break; 1129 case 3: /* CIA_ERR_MEM_NEM */ 1130 cia_decode_mem_error(cia, "Access to nonexistent memory"); 1131 break; 1132 case 4: /* CIA_ERR_PCI_SERR */ 1133 cia_decode_pci_error(cia, "PCI bus system error"); 1134 break; 1135 case 5: /* CIA_ERR_PERR */ 1136 cia_decode_pci_error(cia, "PCI data parity error"); 1137 break; 1138 case 6: /* CIA_ERR_PCI_ADDR_PE */ 1139 cia_decode_pci_error(cia, "PCI address parity error"); 1140 break; 1141 case 7: /* CIA_ERR_RCVD_MAS_ABT */ 1142 cia_decode_pci_error(cia, "PCI master abort"); 1143 break; 1144 case 8: /* CIA_ERR_RCVD_TAR_ABT */ 1145 cia_decode_pci_error(cia, "PCI target abort"); 1146 break; 1147 case 9: /* CIA_ERR_PA_PTE_INV */ 1148 cia_decode_pci_error(cia, "PCI invalid PTE"); 1149 break; 1150 case 10: /* CIA_ERR_FROM_WRT_ERR */ 1151 cia_decode_mem_error(cia, "Write to flash ROM attempted"); 1152 break; 1153 case 11: /* CIA_ERR_IOA_TIMEOUT */ 1154 cia_decode_pci_error(cia, "I/O timeout"); 1155 break; 1156 } 1157 1158 if (cia->cia_err & CIA_ERR_LOST_CORR_ERR) 1159 printk(KERN_CRIT "CIA lost machine check: " 1160 "Correctable ECC error\n"); 1161 if (cia->cia_err & CIA_ERR_LOST_UN_CORR_ERR) 1162 printk(KERN_CRIT "CIA lost machine check: " 1163 "Uncorrectable ECC error\n"); 1164 if (cia->cia_err & CIA_ERR_LOST_CPU_PE) 1165 printk(KERN_CRIT "CIA lost machine check: " 1166 "System bus parity error\n"); 1167 if (cia->cia_err & CIA_ERR_LOST_MEM_NEM) 1168 printk(KERN_CRIT "CIA lost machine check: " 1169 "Access to nonexistent memory\n"); 1170 if (cia->cia_err & CIA_ERR_LOST_PERR) 1171 printk(KERN_CRIT "CIA lost machine check: " 1172 "PCI data parity error\n"); 1173 if (cia->cia_err & CIA_ERR_LOST_PCI_ADDR_PE) 1174 printk(KERN_CRIT "CIA lost machine check: " 1175 "PCI address parity error\n"); 1176 if (cia->cia_err & CIA_ERR_LOST_RCVD_MAS_ABT) 1177 printk(KERN_CRIT "CIA lost machine check: " 1178 "PCI master abort\n"); 1179 if (cia->cia_err & CIA_ERR_LOST_RCVD_TAR_ABT) 1180 printk(KERN_CRIT "CIA lost machine check: " 1181 "PCI target abort\n"); 1182 if (cia->cia_err & CIA_ERR_LOST_PA_PTE_INV) 1183 printk(KERN_CRIT "CIA lost machine check: " 1184 "PCI invalid PTE\n"); 1185 if (cia->cia_err & CIA_ERR_LOST_FROM_WRT_ERR) 1186 printk(KERN_CRIT "CIA lost machine check: " 1187 "Write to flash ROM attempted\n"); 1188 if (cia->cia_err & CIA_ERR_LOST_IOA_TIMEOUT) 1189 printk(KERN_CRIT "CIA lost machine check: " 1190 "I/O timeout\n"); 1191 #endif /* CONFIG_VERBOSE_MCHECK */ 1192 1193 return 1; 1194 } 1195 1196 void 1197 cia_machine_check(unsigned long vector, unsigned long la_ptr) 1198 { 1199 int expected; 1200 1201 /* Clear the error before any reporting. */ 1202 mb(); 1203 mb(); /* magic */ 1204 draina(); 1205 cia_pci_clr_err(); 1206 wrmces(rdmces()); /* reset machine check pending flag. */ 1207 mb(); 1208 1209 expected = mcheck_expected(0); 1210 if (!expected && vector == 0x660) 1211 expected = cia_decode_mchk(la_ptr); 1212 process_mcheck_info(vector, la_ptr, "CIA", expected); 1213 } 1214