1 /* $NetBSD: isa_machdep.c,v 1.7 2003/05/07 21:33:58 fvdl Exp $ */ 2 3 /*- 4 * Copyright (c) 1996, 1997, 1998 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Charles M. Hannum and by Jason R. Thorpe of the Numerical Aerospace 9 * Simulation Facility, NASA Ames Research Center. 10 * 11 * Redistribution and use in source and binary forms, with or without 12 * modification, are permitted provided that the following conditions 13 * are met: 14 * 1. Redistributions of source code must retain the above copyright 15 * notice, this list of conditions and the following disclaimer. 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 3. All advertising materials mentioning features or use of this software 20 * must display the following acknowledgement: 21 * This product includes software developed by the NetBSD 22 * Foundation, Inc. and its contributors. 23 * 4. Neither the name of The NetBSD Foundation nor the names of its 24 * contributors may be used to endorse or promote products derived 25 * from this software without specific prior written permission. 26 * 27 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 28 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 29 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 30 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 31 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 32 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 33 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 34 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 35 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 36 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 37 * POSSIBILITY OF SUCH DAMAGE. 38 */ 39 40 /*- 41 * Copyright (c) 1991 The Regents of the University of California. 42 * All rights reserved. 43 * 44 * This code is derived from software contributed to Berkeley by 45 * William Jolitz. 46 * 47 * Redistribution and use in source and binary forms, with or without 48 * modification, are permitted provided that the following conditions 49 * are met: 50 * 1. Redistributions of source code must retain the above copyright 51 * notice, this list of conditions and the following disclaimer. 52 * 2. Redistributions in binary form must reproduce the above copyright 53 * notice, this list of conditions and the following disclaimer in the 54 * documentation and/or other materials provided with the distribution. 55 * 3. All advertising materials mentioning features or use of this software 56 * must display the following acknowledgement: 57 * This product includes software developed by the University of 58 * California, Berkeley and its contributors. 59 * 4. Neither the name of the University nor the names of its contributors 60 * may be used to endorse or promote products derived from this software 61 * without specific prior written permission. 62 * 63 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 64 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 65 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 66 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 67 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 68 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 69 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 70 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 71 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 72 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 73 * SUCH DAMAGE. 74 * 75 * @(#)isa.c 7.2 (Berkeley) 5/13/91 76 */ 77 78 #include <sys/cdefs.h> 79 __KERNEL_RCSID(0, "$NetBSD: isa_machdep.c,v 1.7 2003/05/07 21:33:58 fvdl Exp $"); 80 81 #include <sys/param.h> 82 #include <sys/systm.h> 83 #include <sys/kernel.h> 84 #include <sys/syslog.h> 85 #include <sys/device.h> 86 #include <sys/malloc.h> 87 #include <sys/proc.h> 88 #include <sys/mbuf.h> 89 90 #define _X86_BUS_DMA_PRIVATE 91 #include <machine/bus.h> 92 93 #include <machine/pio.h> 94 #include <machine/cpufunc.h> 95 96 #include <dev/isa/isareg.h> 97 #include <dev/isa/isavar.h> 98 99 #include <uvm/uvm_extern.h> 100 101 #include "ioapic.h" 102 103 #if NIOAPIC > 0 104 #include <machine/i82093var.h> 105 #include <machine/mpbiosvar.h> 106 #endif 107 108 static int _isa_dma_may_bounce(bus_dma_tag_t, bus_dmamap_t, int, int *); 109 110 struct x86_bus_dma_tag isa_bus_dma_tag = { 111 ISA_DMA_BOUNCE_THRESHOLD, /* _bounce_thresh */ 112 0, /* _bounce_alloc_lo */ 113 ISA_DMA_BOUNCE_THRESHOLD, /* _bounce_alloc_hi */ 114 _isa_dma_may_bounce, 115 _bus_dmamap_create, 116 _bus_dmamap_destroy, 117 _bus_dmamap_load, 118 _bus_dmamap_load_mbuf, 119 _bus_dmamap_load_uio, 120 _bus_dmamap_load_raw, 121 _bus_dmamap_unload, 122 _bus_dmamap_sync, 123 _bus_dmamem_alloc, 124 _bus_dmamem_free, 125 _bus_dmamem_map, 126 _bus_dmamem_unmap, 127 _bus_dmamem_mmap, 128 }; 129 130 #define IDTVEC(name) __CONCAT(X,name) 131 typedef void (vector) __P((void)); 132 extern vector *IDTVEC(intr)[]; 133 134 #define LEGAL_IRQ(x) ((x) >= 0 && (x) < NUM_LEGACY_IRQS && (x) != 2) 135 136 int 137 isa_intr_alloc(isa_chipset_tag_t ic, int mask, int type, int *irq) 138 { 139 int i, tmp, bestirq, count; 140 struct intrhand **p, *q; 141 struct intrsource *isp; 142 struct cpu_info *ci; 143 144 if (type == IST_NONE) 145 panic("intr_alloc: bogus type"); 146 147 ci = &cpu_info_primary; 148 149 bestirq = -1; 150 count = -1; 151 152 /* some interrupts should never be dynamically allocated */ 153 mask &= 0xdef8; 154 155 /* 156 * XXX some interrupts will be used later (6 for fdc, 12 for pms). 157 * the right answer is to do "breadth-first" searching of devices. 158 */ 159 mask &= 0xefbf; 160 161 simple_lock(&ci->ci_slock); 162 163 for (i = 0; i < NUM_LEGACY_IRQS; i++) { 164 if (LEGAL_IRQ(i) == 0 || (mask & (1<<i)) == 0) 165 continue; 166 isp = ci->ci_isources[i]; 167 if (isp == NULL) { 168 /* 169 * if nothing's using the irq, just return it 170 */ 171 *irq = i; 172 simple_unlock(&ci->ci_slock); 173 return (0); 174 } 175 176 switch(isp->is_type) { 177 case IST_EDGE: 178 case IST_LEVEL: 179 if (type != isp->is_type) 180 continue; 181 /* 182 * if the irq is shareable, count the number of other 183 * handlers, and if it's smaller than the last irq like 184 * this, remember it 185 * 186 * XXX We should probably also consider the 187 * interrupt level and stick IPL_TTY with other 188 * IPL_TTY, etc. 189 */ 190 for (p = &isp->is_handlers, tmp = 0; (q = *p) != NULL; 191 p = &q->ih_next, tmp++) 192 ; 193 if ((bestirq == -1) || (count > tmp)) { 194 bestirq = i; 195 count = tmp; 196 } 197 break; 198 199 case IST_PULSE: 200 /* this just isn't shareable */ 201 continue; 202 } 203 } 204 205 simple_unlock(&ci->ci_slock); 206 207 if (bestirq == -1) 208 return (1); 209 210 *irq = bestirq; 211 212 return (0); 213 } 214 215 const struct evcnt * 216 isa_intr_evcnt(isa_chipset_tag_t ic, int irq) 217 { 218 219 /* XXX for now, no evcnt parent reported */ 220 return NULL; 221 } 222 223 void * 224 isa_intr_establish(ic, irq, type, level, ih_fun, ih_arg) 225 isa_chipset_tag_t ic; 226 int irq; 227 int type; 228 int level; 229 int (*ih_fun) __P((void *)); 230 void *ih_arg; 231 { 232 struct pic *pic; 233 int pin; 234 #if NIOAPIC > 0 235 int mpih; 236 #endif 237 238 pin = irq; 239 pic = &i8259_pic; 240 241 #if NIOAPIC > 0 242 if (mp_busses != NULL) { 243 if (intr_find_mpmapping(mp_isa_bus, irq, &mpih) == 0 || 244 intr_find_mpmapping(mp_eisa_bus, irq, &mpih) == 0) { 245 if (!APIC_IRQ_ISLEGACY(mpih)) { 246 pin = APIC_IRQ_PIN(mpih); 247 pic = (struct pic *) 248 ioapic_find(APIC_IRQ_APIC(mpih)); 249 if (pic == NULL) { 250 printf("isa_intr_establish: " 251 "unknown apic %d\n", 252 APIC_IRQ_APIC(mpih)); 253 return NULL; 254 } 255 } 256 } else 257 printf("isa_intr_establish: no MP mapping found\n"); 258 } 259 #endif 260 return intr_establish(irq, pic, pin, type, level, ih_fun, ih_arg); 261 } 262 263 /* 264 * Deregister an interrupt handler. 265 */ 266 void 267 isa_intr_disestablish(ic, arg) 268 isa_chipset_tag_t ic; 269 void *arg; 270 { 271 struct intrhand *ih = arg; 272 273 if (!LEGAL_IRQ(ih->ih_pin)) 274 panic("intr_disestablish: bogus irq"); 275 276 intr_disestablish(ih); 277 } 278 279 void 280 isa_attach_hook(parent, self, iba) 281 struct device *parent, *self; 282 struct isabus_attach_args *iba; 283 { 284 extern struct x86_isa_chipset x86_isa_chipset; 285 extern int isa_has_been_seen; 286 287 /* 288 * Notify others that might need to know that the ISA bus 289 * has now been attached. 290 */ 291 if (isa_has_been_seen) 292 panic("isaattach: ISA bus already seen!"); 293 isa_has_been_seen = 1; 294 295 /* 296 * Since we can only have one ISA bus, we just use a single 297 * statically allocated ISA chipset structure. Pass it up 298 * now. 299 */ 300 iba->iba_ic = &x86_isa_chipset; 301 } 302 303 int 304 isa_mem_alloc(t, size, align, boundary, flags, addrp, bshp) 305 bus_space_tag_t t; 306 bus_size_t size, align; 307 bus_addr_t boundary; 308 int flags; 309 bus_addr_t *addrp; 310 bus_space_handle_t *bshp; 311 { 312 313 /* 314 * Allocate physical address space in the ISA hole. 315 */ 316 return (bus_space_alloc(t, IOM_BEGIN, IOM_END - 1, size, align, 317 boundary, flags, addrp, bshp)); 318 } 319 320 void 321 isa_mem_free(t, bsh, size) 322 bus_space_tag_t t; 323 bus_space_handle_t bsh; 324 bus_size_t size; 325 { 326 327 bus_space_free(t, bsh, size); 328 } 329 330 /* 331 * ISA only has 24-bits of address space. This means 332 * we can't DMA to pages over 16M. In order to DMA to 333 * arbitrary buffers, we use "bounce buffers" - pages 334 * in memory below the 16M boundary. On DMA reads, 335 * DMA happens to the bounce buffers, and is copied into 336 * the caller's buffer. On writes, data is copied into 337 * but bounce buffer, and the DMA happens from those 338 * pages. To software using the DMA mapping interface, 339 * this looks simply like a data cache. 340 * 341 * If we have more than 16M of RAM in the system, we may 342 * need bounce buffers. We check and remember that here. 343 * 344 * There are exceptions, however. VLB devices can do 345 * 32-bit DMA, and indicate that here. 346 * 347 * ...or, there is an opposite case. The most segments 348 * a transfer will require is (maxxfer / PAGE_SIZE) + 1. If 349 * the caller can't handle that many segments (e.g. the 350 * ISA DMA controller), we may have to bounce it as well. 351 */ 352 static int 353 _isa_dma_may_bounce(bus_dma_tag_t t, bus_dmamap_t map, int flags, 354 int *cookieflagsp) 355 { 356 if ((flags & ISABUS_DMA_32BIT) != 0) 357 map->_dm_bounce_thresh = 0; 358 359 if (((map->_dm_size / PAGE_SIZE) + 1) > map->_dm_segcnt) 360 *cookieflagsp |= X86_DMA_ID_MIGHT_NEED_BOUNCE; 361 return 0; 362 } 363