]> bbs.cooldavid.org Git - net-next-2.6.git/blame - arch/x86/kernel/bios_uv.c
x86: uv: update XPC to handle updated BIOS interface
[net-next-2.6.git] / arch / x86 / kernel / bios_uv.c
CommitLineData
7019cc2d
RA
1/*
2 * BIOS run time interface routines.
3 *
7019cc2d
RA
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
7f594232
RA
17 *
18 * Copyright (c) 2008 Silicon Graphics, Inc. All Rights Reserved.
19 * Copyright (c) Russ Anderson
7019cc2d
RA
20 */
21
7f594232
RA
22#include <linux/efi.h>
23#include <asm/efi.h>
24#include <linux/io.h>
7019cc2d 25#include <asm/uv/bios.h>
922402f1 26#include <asm/uv/uv_hub.h>
7019cc2d 27
c62e9d56 28static struct uv_systab uv_systab;
7f594232
RA
29
30s64 uv_bios_call(enum uv_bios_cmd which, u64 a1, u64 a2, u64 a3, u64 a4, u64 a5)
7019cc2d 31{
7f594232
RA
32 struct uv_systab *tab = &uv_systab;
33
34 if (!tab->function)
35 /*
36 * BIOS does not support UV systab
37 */
38 return BIOS_STATUS_UNIMPLEMENTED;
39
40 return efi_call6((void *)__va(tab->function),
41 (u64)which, a1, a2, a3, a4, a5);
7019cc2d
RA
42}
43
7f594232
RA
44s64 uv_bios_call_irqsave(enum uv_bios_cmd which, u64 a1, u64 a2, u64 a3,
45 u64 a4, u64 a5)
7019cc2d 46{
7f594232
RA
47 unsigned long bios_flags;
48 s64 ret;
49
50 local_irq_save(bios_flags);
51 ret = uv_bios_call(which, a1, a2, a3, a4, a5);
52 local_irq_restore(bios_flags);
53
54 return ret;
55}
56
57s64 uv_bios_call_reentrant(enum uv_bios_cmd which, u64 a1, u64 a2, u64 a3,
58 u64 a4, u64 a5)
59{
60 s64 ret;
61
62 preempt_disable();
63 ret = uv_bios_call(which, a1, a2, a3, a4, a5);
64 preempt_enable();
7019cc2d 65
7f594232
RA
66 return ret;
67}
68
922402f1
RA
69
70long sn_partition_id;
71EXPORT_SYMBOL_GPL(sn_partition_id);
b0f20989
RA
72long sn_coherency_id;
73EXPORT_SYMBOL_GPL(sn_coherency_id);
74long sn_region_size;
75EXPORT_SYMBOL_GPL(sn_region_size);
922402f1
RA
76int uv_type;
77
78
79s64 uv_bios_get_sn_info(int fc, int *uvtype, long *partid, long *coher,
80 long *region)
81{
82 s64 ret;
83 u64 v0, v1;
84 union partition_info_u part;
85
86 ret = uv_bios_call_irqsave(UV_BIOS_GET_SN_INFO, fc,
87 (u64)(&v0), (u64)(&v1), 0, 0);
88 if (ret != BIOS_STATUS_SUCCESS)
89 return ret;
90
91 part.val = v0;
92 if (uvtype)
93 *uvtype = part.hub_version;
94 if (partid)
95 *partid = part.partition_id;
96 if (coher)
97 *coher = part.coherence_id;
98 if (region)
99 *region = part.region_size;
100 return ret;
101}
102
64ccf2f9 103int
c2c9f115 104uv_bios_mq_watchlist_alloc(unsigned long addr, unsigned int mq_size,
64ccf2f9
RA
105 unsigned long *intr_mmr_offset)
106{
64ccf2f9
RA
107 u64 watchlist;
108 s64 ret;
109
64ccf2f9
RA
110 /*
111 * bios returns watchlist number or negative error number.
112 */
113 ret = (int)uv_bios_call_irqsave(UV_BIOS_WATCHLIST_ALLOC, addr,
c2c9f115 114 mq_size, (u64)intr_mmr_offset,
64ccf2f9
RA
115 (u64)&watchlist, 0);
116 if (ret < BIOS_STATUS_SUCCESS)
117 return ret;
118
119 return watchlist;
120}
121EXPORT_SYMBOL_GPL(uv_bios_mq_watchlist_alloc);
122
123int
124uv_bios_mq_watchlist_free(int blade, int watchlist_num)
125{
126 return (int)uv_bios_call_irqsave(UV_BIOS_WATCHLIST_FREE,
127 blade, watchlist_num, 0, 0, 0);
128}
129EXPORT_SYMBOL_GPL(uv_bios_mq_watchlist_free);
922402f1 130
e8929c8a
RA
131s64
132uv_bios_change_memprotect(u64 paddr, u64 len, enum uv_memprotect perms)
133{
134 return uv_bios_call_irqsave(UV_BIOS_MEMPROTECT, paddr, len,
135 perms, 0, 0);
136}
137EXPORT_SYMBOL_GPL(uv_bios_change_memprotect);
138
23c35700
RA
139s64
140uv_bios_reserved_page_pa(u64 buf, u64 *cookie, u64 *addr, u64 *len)
141{
142 s64 ret;
143
144 ret = uv_bios_call_irqsave(UV_BIOS_GET_PARTITION_ADDR, (u64)cookie,
145 (u64)addr, buf, (u64)len, 0);
146 return ret;
147}
148EXPORT_SYMBOL_GPL(uv_bios_reserved_page_pa);
149
922402f1 150s64 uv_bios_freq_base(u64 clock_type, u64 *ticks_per_second)
7f594232
RA
151{
152 return uv_bios_call(UV_BIOS_FREQ_BASE, clock_type,
922402f1 153 (u64)ticks_per_second, 0, 0, 0);
7019cc2d 154}
922402f1 155EXPORT_SYMBOL_GPL(uv_bios_freq_base);
7f594232
RA
156
157
158#ifdef CONFIG_EFI
159void uv_bios_init(void)
160{
161 struct uv_systab *tab;
162
163 if ((efi.uv_systab == EFI_INVALID_TABLE_ADDR) ||
164 (efi.uv_systab == (unsigned long)NULL)) {
165 printk(KERN_CRIT "No EFI UV System Table.\n");
166 uv_systab.function = (unsigned long)NULL;
167 return;
168 }
169
170 tab = (struct uv_systab *)ioremap(efi.uv_systab,
171 sizeof(struct uv_systab));
172 if (strncmp(tab->signature, "UVST", 4) != 0)
173 printk(KERN_ERR "bad signature in UV system table!");
174
175 /*
176 * Copy table to permanent spot for later use.
177 */
178 memcpy(&uv_systab, tab, sizeof(struct uv_systab));
179 iounmap(tab);
180
1a544e65
RA
181 printk(KERN_INFO "EFI UV System Table Revision %d\n",
182 uv_systab.revision);
7f594232
RA
183}
184#else /* !CONFIG_EFI */
185
186void uv_bios_init(void) { }
187#endif
188