patch-pre2.0.12 linux/arch/alpha/kernel/cia.c

Next file: linux/arch/alpha/kernel/irq.c
Previous file: linux/arch/alpha/kernel/bios32.c
Back to the patch index
Back to the overall index

diff -u --recursive --new-file pre2.0.11/linux/arch/alpha/kernel/cia.c linux/arch/alpha/kernel/cia.c
@@ -0,0 +1,486 @@
+/*
+ * Code common to all CIA chips.
+ *
+ * Written by David A Rusling (david.rusling@reo.mts.dec.com).
+ * December 1995.
+ *
+ */
+#include <linux/kernel.h>
+#include <linux/config.h>
+#include <linux/types.h>
+#include <linux/bios32.h>
+#include <linux/pci.h>
+#include <linux/sched.h>
+
+#include <asm/system.h>
+#include <asm/io.h>
+#include <asm/hwrpb.h>
+#include <asm/ptrace.h>
+#include <asm/mmu_context.h>
+
+extern struct hwrpb_struct *hwrpb;
+extern asmlinkage void wrmces(unsigned long mces);
+extern int alpha_sys_type;
+/*
+ * BIOS32-style PCI interface:
+ */
+
+#ifdef CONFIG_ALPHA_CIA
+
+#ifdef DEBUG 
+# define DBG(args)	printk args
+#else
+# define DBG(args)
+#endif
+
+#define vulp	volatile unsigned long *
+#define vuip	volatile unsigned int  *
+
+static volatile unsigned int CIA_mcheck_expected = 0;
+static volatile unsigned int CIA_mcheck_taken = 0;
+static unsigned long CIA_jd, CIA_jd1, CIA_jd2;
+
+
+/*
+ * Given a bus, device, and function number, compute resulting
+ * configuration space address and setup the CIA_HAXR2 register
+ * accordingly.  It is therefore not safe to have concurrent
+ * invocations to configuration space access routines, but there
+ * really shouldn't be any need for this.
+ *
+ * Type 0:
+ *
+ *  3 3|3 3 2 2|2 2 2 2|2 2 2 2|1 1 1 1|1 1 1 1|1 1 
+ *  3 2|1 0 9 8|7 6 5 4|3 2 1 0|9 8 7 6|5 4 3 2|1 0 9 8|7 6 5 4|3 2 1 0
+ * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ * | | |D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|D|F|F|F|R|R|R|R|R|R|0|0|
+ * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ *
+ *	31:11	Device select bit.
+ * 	10:8	Function number
+ * 	 7:2	Register number
+ *
+ * Type 1:
+ *
+ *  3 3|3 3 2 2|2 2 2 2|2 2 2 2|1 1 1 1|1 1 1 1|1 1 
+ *  3 2|1 0 9 8|7 6 5 4|3 2 1 0|9 8 7 6|5 4 3 2|1 0 9 8|7 6 5 4|3 2 1 0
+ * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ * | | | | | | | | | | |B|B|B|B|B|B|B|B|D|D|D|D|D|F|F|F|R|R|R|R|R|R|0|1|
+ * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
+ *
+ *	31:24	reserved
+ *	23:16	bus number (8 bits = 128 possible buses)
+ *	15:11	Device number (5 bits)
+ *	10:8	function number
+ *	 7:2	register number
+ *  
+ * Notes:
+ *	The function number selects which function of a multi-function device 
+ *	(e.g., scsi and ethernet).
+ * 
+ *	The register selects a DWORD (32 bit) register offset.  Hence it
+ *	doesn't get shifted by 2 bits as we want to "drop" the bottom two
+ *	bits.
+ */
+static int mk_conf_addr(unsigned char bus, unsigned char device_fn,
+			unsigned char where, unsigned long *pci_addr,
+			unsigned char *type1)
+{
+	unsigned long addr;
+
+	DBG(("mk_conf_addr(bus=%d ,device_fn=0x%x, where=0x%x, pci_addr=0x%p, type1=0x%p)\n",
+	     bus, device_fn, where, pci_addr, type1));
+
+	if (bus == 0) {
+		int device = device_fn >> 3;
+
+		/* type 0 configuration cycle: */
+
+		if (device > 20) {
+			DBG(("mk_conf_addr: device (%d) > 20, returning -1\n", device));
+			return -1;
+		}
+
+		*type1 = 0;
+		addr = (device_fn << 8) | (where);
+	} else {
+		/* type 1 configuration cycle: */
+		*type1 = 1;
+		addr = (bus << 16) | (device_fn << 8) | (where);
+	}
+	*pci_addr = addr;
+	DBG(("mk_conf_addr: returning pci_addr 0x%lx\n", addr));
+	return 0;
+}
+
+
+static unsigned int conf_read(unsigned long addr, unsigned char type1)
+{
+	unsigned long flags;
+	unsigned int stat0, value;
+	unsigned int cia_cfg = 0; /* to keep gcc quiet */
+
+	save_flags(flags);	/* avoid getting hit by machine check */
+	cli();
+
+	DBG(("conf_read(addr=0x%lx, type1=%d)\n", addr, type1));
+
+	/* reset status register to avoid losing errors: */
+	stat0 = *((volatile unsigned int *)CIA_IOC_CIA_ERR);
+	*((volatile unsigned int *)CIA_IOC_CIA_ERR) = stat0;
+	mb();
+	DBG(("conf_read: CIA ERR was 0x%x\n", stat0));
+	/* if Type1 access, must set CIA CFG */
+	if (type1) {
+		cia_cfg = *((unsigned int *)CIA_IOC_CFG);
+		mb();
+		*((unsigned int *)CIA_IOC_CFG) = cia_cfg | 1;
+		DBG(("conf_read: TYPE1 access\n"));
+	}
+
+	draina();
+	CIA_mcheck_expected = 1;
+	CIA_mcheck_taken = 0;
+	mb();
+	/* access configuration space: */
+	value = *((volatile unsigned int *)addr);
+	mb();
+	mb();
+	if (CIA_mcheck_taken) {
+		CIA_mcheck_taken = 0;
+		value = 0xffffffffU;
+		mb();
+	}
+	CIA_mcheck_expected = 0;
+	mb();
+	/*
+	 * david.rusling@reo.mts.dec.com.  This code is needed for the
+	 * EB64+ as it does not generate a machine check (why I don't
+	 * know).  When we build kernels for one particular platform
+	 * then we can make this conditional on the type.
+	 */
+#if 1
+	draina();
+
+	/* now look for any errors */
+	stat0 = *((unsigned int *)CIA_IOC_CIA_ERR);
+	DBG(("conf_read: CIA ERR after read 0x%x\n", stat0));
+	if (stat0 & 0x8280U) { /* is any error bit set? */
+		/* if not NDEV, print status */
+		if (!(stat0 & 0x0080)) {
+			printk("CIA.c:conf_read: got stat0=%x\n", stat0);
+		}
+
+		/* reset error status: */
+		*((volatile unsigned long *)CIA_IOC_CIA_ERR) = stat0;
+		mb();
+		wrmces(0x7);			/* reset machine check */
+		value = 0xffffffff;
+	}
+#endif
+
+	/* if Type1 access, must reset IOC CFG so normal IO space ops work */
+	if (type1) {
+		*((unsigned int *)CIA_IOC_CFG) = cia_cfg & ~1;
+		mb();
+	}
+
+	DBG(("conf_read(): finished\n"));
+
+	restore_flags(flags);
+	return value;
+}
+
+
+static void conf_write(unsigned long addr, unsigned int value, unsigned char type1)
+{
+	unsigned long flags;
+	unsigned int stat0;
+	unsigned int cia_cfg = 0; /* to keep gcc quiet */
+
+	save_flags(flags);	/* avoid getting hit by machine check */
+	cli();
+
+	/* reset status register to avoid losing errors: */
+	stat0 = *((volatile unsigned int *)CIA_IOC_CIA_ERR);
+	*((volatile unsigned int *)CIA_IOC_CIA_ERR) = stat0;
+	mb();
+	DBG(("conf_write: CIA ERR was 0x%x\n", stat0));
+	/* if Type1 access, must set CIA CFG */
+	if (type1) {
+		cia_cfg = *((unsigned int *)CIA_IOC_CFG);
+		mb();
+		*((unsigned int *)CIA_IOC_CFG) = cia_cfg | 1;
+		DBG(("conf_read: TYPE1 access\n"));
+	}
+
+	draina();
+	CIA_mcheck_expected = 1;
+	mb();
+	/* access configuration space: */
+	*((volatile unsigned int *)addr) = value;
+	mb();
+	mb();
+	CIA_mcheck_expected = 0;
+	mb();
+	/*
+	 * david.rusling@reo.mts.dec.com.  This code is needed for the
+	 * EB64+ as it does not generate a machine check (why I don't
+	 * know).  When we build kernels for one particular platform
+	 * then we can make this conditional on the type.
+	 */
+#if 1
+	draina();
+
+	/* now look for any errors */
+	stat0 = *((unsigned int *)CIA_IOC_CIA_ERR);
+	DBG(("conf_write: CIA ERR after write 0x%x\n", stat0));
+	if (stat0 & 0x8280U) { /* is any error bit set? */
+		/* if not NDEV, print status */
+		if (!(stat0 & 0x0080)) {
+			printk("CIA.c:conf_read: got stat0=%x\n", stat0);
+		}
+
+		/* reset error status: */
+		*((volatile unsigned long *)CIA_IOC_CIA_ERR) = stat0;
+		mb();
+		wrmces(0x7);			/* reset machine check */
+		value = 0xffffffff;
+	}
+#endif
+
+	/* if Type1 access, must reset IOC CFG so normal IO space ops work */
+	if (type1) {
+		*((unsigned int *)CIA_IOC_CFG) = cia_cfg & ~1;
+		mb();
+	}
+
+	DBG(("conf_write(): finished\n"));
+	restore_flags(flags);
+}
+
+
+int pcibios_read_config_byte (unsigned char bus, unsigned char device_fn,
+			      unsigned char where, unsigned char *value)
+{
+	unsigned long addr = CIA_CONF;
+	unsigned long pci_addr;
+	unsigned char type1;
+
+	*value = 0xff;
+
+	if (mk_conf_addr(bus, device_fn, where, &pci_addr, &type1) < 0) {
+		return PCIBIOS_SUCCESSFUL;
+	}
+
+	addr |= (pci_addr << 5) + 0x00;
+
+	*value = conf_read(addr, type1) >> ((where & 3) * 8);
+
+	return PCIBIOS_SUCCESSFUL;
+}
+
+
+int pcibios_read_config_word (unsigned char bus, unsigned char device_fn,
+			      unsigned char where, unsigned short *value)
+{
+	unsigned long addr = CIA_CONF;
+	unsigned long pci_addr;
+	unsigned char type1;
+
+	*value = 0xffff;
+
+	if (where & 0x1) {
+		return PCIBIOS_BAD_REGISTER_NUMBER;
+	}
+
+	if (mk_conf_addr(bus, device_fn, where, &pci_addr, &type1)) {
+		return PCIBIOS_SUCCESSFUL;
+	}
+
+	addr |= (pci_addr << 5) + 0x08;
+
+	*value = conf_read(addr, type1) >> ((where & 3) * 8);
+	return PCIBIOS_SUCCESSFUL;
+}
+
+
+int pcibios_read_config_dword (unsigned char bus, unsigned char device_fn,
+			       unsigned char where, unsigned int *value)
+{
+	unsigned long addr = CIA_CONF;
+	unsigned long pci_addr;
+	unsigned char type1;
+
+	*value = 0xffffffff;
+	if (where & 0x3) {
+		return PCIBIOS_BAD_REGISTER_NUMBER;
+	}
+
+	if (mk_conf_addr(bus, device_fn, where, &pci_addr, &type1)) {
+		return PCIBIOS_SUCCESSFUL;
+	}
+	addr |= (pci_addr << 5) + 0x18;
+	*value = conf_read(addr, type1);
+	return PCIBIOS_SUCCESSFUL;
+}
+
+
+int pcibios_write_config_byte (unsigned char bus, unsigned char device_fn,
+			       unsigned char where, unsigned char value)
+{
+	unsigned long addr = CIA_CONF;
+	unsigned long pci_addr;
+	unsigned char type1;
+
+	if (mk_conf_addr(bus, device_fn, where, &pci_addr, &type1) < 0) {
+		return PCIBIOS_SUCCESSFUL;
+	}
+	addr |= (pci_addr << 5) + 0x00;
+	conf_write(addr, value << ((where & 3) * 8), type1);
+	return PCIBIOS_SUCCESSFUL;
+}
+
+
+int pcibios_write_config_word (unsigned char bus, unsigned char device_fn,
+			       unsigned char where, unsigned short value)
+{
+	unsigned long addr = CIA_CONF;
+	unsigned long pci_addr;
+	unsigned char type1;
+
+	if (mk_conf_addr(bus, device_fn, where, &pci_addr, &type1) < 0) {
+		return PCIBIOS_SUCCESSFUL;
+	}
+	addr |= (pci_addr << 5) + 0x08;
+	conf_write(addr, value << ((where & 3) * 8), type1);
+	return PCIBIOS_SUCCESSFUL;
+}
+
+
+int pcibios_write_config_dword (unsigned char bus, unsigned char device_fn,
+				unsigned char where, unsigned int value)
+{
+	unsigned long addr = CIA_CONF;
+	unsigned long pci_addr;
+	unsigned char type1;
+
+	if (mk_conf_addr(bus, device_fn, where, &pci_addr, &type1) < 0) {
+		return PCIBIOS_SUCCESSFUL;
+	}
+	addr |= (pci_addr << 5) + 0x18;
+	conf_write(addr, value << ((where & 3) * 8), type1);
+	return PCIBIOS_SUCCESSFUL;
+}
+
+
+unsigned long cia_init(unsigned long mem_start, unsigned long mem_end)
+{
+        unsigned int cia_err ;
+
+        /* 
+	 * Set up error reporting.
+	 */
+	cia_err = *(vuip)CIA_IOC_CIA_ERR ;
+	cia_err |= (0x1 << 7) ;   /* master abort */
+	*(vuip)CIA_IOC_CIA_ERR = cia_err ;
+	mb() ;
+
+	/*
+	 * Set up the PCI->physical memory translation windows.
+	 * For now, windows 1,2 and 3 are disabled.  In the future, we may
+	 * want to use them to do scatter/gather DMA.  Window 0
+	 * goes at 1 GB and is 1 GB large.
+	 */
+
+	*(vuip)CIA_IOC_PCI_W0_BASE = 1U | (CIA_DMA_WIN_BASE & 0xfff00000U);
+ 	*(vuip)CIA_IOC_PCI_W0_MASK = (CIA_DMA_WIN_SIZE - 1) & 0xfff00000U;
+	*(vuip)CIA_IOC_PCI_T0_BASE = 0;
+
+	*(vuip)CIA_IOC_PCI_W1_BASE = 0x0 ;
+	*(vuip)CIA_IOC_PCI_W2_BASE = 0x0 ;
+	*(vuip)CIA_IOC_PCI_W3_BASE = 0x0 ;
+
+	/*
+	 * check ASN in HWRPB for validity, report if bad
+	 */
+	if (hwrpb->max_asn != MAX_ASN) {
+		printk("CIA_init: max ASN from HWRPB is bad (0x%lx)\n",
+			hwrpb->max_asn);
+		hwrpb->max_asn = MAX_ASN;
+	}
+
+        /*
+         * Finally, clear the CIA_CFG register, which gets used
+         *  for PCI Config Space accesses. That is the way
+         *  we want to use it, and we do not want to depend on
+         *  what ARC or SRM might have left behind...
+         */
+        {
+#if 0
+          unsigned int cia_cfg = *((unsigned int *)CIA_IOC_CFG); mb();
+          if (cia_cfg) printk("CIA_init: CFG was 0x%x\n", cia_cfg);
+#endif
+          *((unsigned int *)CIA_IOC_CFG) = 0; mb();
+        }
+ 
+	return mem_start;
+}
+
+int cia_pci_clr_err(void)
+{
+	CIA_jd = *((unsigned int *)CIA_IOC_CIA_ERR);
+	DBG(("CIA_pci_clr_err: CIA ERR after read 0x%x\n", CIA_jd));
+	*((unsigned long *)CIA_IOC_CIA_ERR) = 0x0080;
+	mb();
+	return 0;
+}
+
+void cia_machine_check(unsigned long vector, unsigned long la_ptr,
+			 struct pt_regs * regs)
+{
+#if 1
+        printk("CIA machine check\n") ;
+#else
+	struct el_common *mchk_header;
+	struct el_CIA_sysdata_mcheck *mchk_sysdata;
+
+	mchk_header = (struct el_common *)la_ptr;
+
+	mchk_sysdata = 
+	  (struct el_CIA_sysdata_mcheck *)(la_ptr + mchk_header->sys_offset);
+
+	DBG(("cia_machine_check: vector=0x%lx la_ptr=0x%lx\n", vector, la_ptr));
+	DBG(("                     pc=0x%lx size=0x%x procoffset=0x%x sysoffset 0x%x\n",
+	     regs->pc, mchk_header->size, mchk_header->proc_offset, mchk_header->sys_offset));
+	DBG(("cia_machine_check: expected %d DCSR 0x%lx PEAR 0x%lx\n",
+	     CIA_mcheck_expected, mchk_sysdata->epic_dcsr, mchk_sysdata->epic_pear));
+#ifdef DEBUG
+	{
+	    unsigned long *ptr;
+	    int i;
+
+	    ptr = (unsigned long *)la_ptr;
+	    for (i = 0; i < mchk_header->size / sizeof(long); i += 2) {
+		printk(" +%lx %lx %lx\n", i*sizeof(long), ptr[i], ptr[i+1]);
+	    }
+	}
+#endif /* DEBUG */
+	/*
+	 * Check if machine check is due to a badaddr() and if so,
+	 * ignore the machine check.
+	 */
+	if (CIA_mcheck_expected && (mchk_sysdata->epic_dcsr && 0x0c00UL)) {
+		CIA_mcheck_expected = 0;
+		CIA_mcheck_taken = 1;
+		mb();
+		mb();
+		cia_pci_clr_err();
+		wrmces(0x7);
+		mb();
+		draina();
+	}
+#endif
+}
+
+#endif /* CONFIG_ALPHA_CIA */

FUNET's LINUX-ADM group, linux-adm@nic.funet.fi
TCL-scripts by Sam Shen, slshen@lbl.gov with Sam's (original) version
of this