i915_gem_stolen.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. /*
  2. * Copyright © 2008-2012 Intel Corporation
  3. *
  4. * Permission is hereby granted, free of charge, to any person obtaining a
  5. * copy of this software and associated documentation files (the "Software"),
  6. * to deal in the Software without restriction, including without limitation
  7. * the rights to use, copy, modify, merge, publish, distribute, sublicense,
  8. * and/or sell copies of the Software, and to permit persons to whom the
  9. * Software is furnished to do so, subject to the following conditions:
  10. *
  11. * The above copyright notice and this permission notice (including the next
  12. * paragraph) shall be included in all copies or substantial portions of the
  13. * Software.
  14. *
  15. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  16. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  17. * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
  18. * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  19. * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
  20. * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
  21. * IN THE SOFTWARE.
  22. *
  23. * Authors:
  24. * Eric Anholt <eric@anholt.net>
  25. * Chris Wilson <chris@chris-wilson.co.uk>
  26. *
  27. */
  28. #include <drm/drmP.h>
  29. #include <drm/i915_drm.h>
  30. #include "i915_drv.h"
  31. #define KB(x) ((x) * 1024)
  32. #define MB(x) (KB(x) * 1024)
  33. /*
  34. * The BIOS typically reserves some of the system's memory for the exclusive
  35. * use of the integrated graphics. This memory is no longer available for
  36. * use by the OS and so the user finds that his system has less memory
  37. * available than he put in. We refer to this memory as stolen.
  38. *
  39. * The BIOS will allocate its framebuffer from the stolen memory. Our
  40. * goal is try to reuse that object for our own fbcon which must always
  41. * be available for panics. Anything else we can reuse the stolen memory
  42. * for is a boon.
  43. */
  44. int i915_gem_stolen_insert_node_in_range(struct drm_i915_private *dev_priv,
  45. struct drm_mm_node *node, u64 size,
  46. unsigned alignment, u64 start, u64 end)
  47. {
  48. int ret;
  49. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  50. return -ENODEV;
  51. mutex_lock(&dev_priv->mm.stolen_lock);
  52. ret = drm_mm_insert_node_in_range(&dev_priv->mm.stolen, node,
  53. size, alignment, 0,
  54. start, end, DRM_MM_INSERT_BEST);
  55. mutex_unlock(&dev_priv->mm.stolen_lock);
  56. return ret;
  57. }
  58. int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv,
  59. struct drm_mm_node *node, u64 size,
  60. unsigned alignment)
  61. {
  62. return i915_gem_stolen_insert_node_in_range(dev_priv, node, size,
  63. alignment, 0, U64_MAX);
  64. }
  65. void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv,
  66. struct drm_mm_node *node)
  67. {
  68. mutex_lock(&dev_priv->mm.stolen_lock);
  69. drm_mm_remove_node(node);
  70. mutex_unlock(&dev_priv->mm.stolen_lock);
  71. }
  72. static dma_addr_t i915_stolen_to_dma(struct drm_i915_private *dev_priv)
  73. {
  74. struct pci_dev *pdev = dev_priv->drm.pdev;
  75. struct i915_ggtt *ggtt = &dev_priv->ggtt;
  76. struct resource *r;
  77. dma_addr_t base;
  78. /* Almost universally we can find the Graphics Base of Stolen Memory
  79. * at register BSM (0x5c) in the igfx configuration space. On a few
  80. * (desktop) machines this is also mirrored in the bridge device at
  81. * different locations, or in the MCHBAR.
  82. *
  83. * On 865 we just check the TOUD register.
  84. *
  85. * On 830/845/85x the stolen memory base isn't available in any
  86. * register. We need to calculate it as TOM-TSEG_SIZE-stolen_size.
  87. *
  88. */
  89. base = 0;
  90. if (INTEL_GEN(dev_priv) >= 3) {
  91. u32 bsm;
  92. pci_read_config_dword(pdev, INTEL_BSM, &bsm);
  93. base = bsm & INTEL_BSM_MASK;
  94. } else if (IS_I865G(dev_priv)) {
  95. u32 tseg_size = 0;
  96. u16 toud = 0;
  97. u8 tmp;
  98. pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
  99. I845_ESMRAMC, &tmp);
  100. if (tmp & TSEG_ENABLE) {
  101. switch (tmp & I845_TSEG_SIZE_MASK) {
  102. case I845_TSEG_SIZE_512K:
  103. tseg_size = KB(512);
  104. break;
  105. case I845_TSEG_SIZE_1M:
  106. tseg_size = MB(1);
  107. break;
  108. }
  109. }
  110. pci_bus_read_config_word(pdev->bus, PCI_DEVFN(0, 0),
  111. I865_TOUD, &toud);
  112. base = (toud << 16) + tseg_size;
  113. } else if (IS_I85X(dev_priv)) {
  114. u32 tseg_size = 0;
  115. u32 tom;
  116. u8 tmp;
  117. pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
  118. I85X_ESMRAMC, &tmp);
  119. if (tmp & TSEG_ENABLE)
  120. tseg_size = MB(1);
  121. pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 1),
  122. I85X_DRB3, &tmp);
  123. tom = tmp * MB(32);
  124. base = tom - tseg_size - ggtt->stolen_size;
  125. } else if (IS_I845G(dev_priv)) {
  126. u32 tseg_size = 0;
  127. u32 tom;
  128. u8 tmp;
  129. pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
  130. I845_ESMRAMC, &tmp);
  131. if (tmp & TSEG_ENABLE) {
  132. switch (tmp & I845_TSEG_SIZE_MASK) {
  133. case I845_TSEG_SIZE_512K:
  134. tseg_size = KB(512);
  135. break;
  136. case I845_TSEG_SIZE_1M:
  137. tseg_size = MB(1);
  138. break;
  139. }
  140. }
  141. pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
  142. I830_DRB3, &tmp);
  143. tom = tmp * MB(32);
  144. base = tom - tseg_size - ggtt->stolen_size;
  145. } else if (IS_I830(dev_priv)) {
  146. u32 tseg_size = 0;
  147. u32 tom;
  148. u8 tmp;
  149. pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
  150. I830_ESMRAMC, &tmp);
  151. if (tmp & TSEG_ENABLE) {
  152. if (tmp & I830_TSEG_SIZE_1M)
  153. tseg_size = MB(1);
  154. else
  155. tseg_size = KB(512);
  156. }
  157. pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
  158. I830_DRB3, &tmp);
  159. tom = tmp * MB(32);
  160. base = tom - tseg_size - ggtt->stolen_size;
  161. }
  162. if (base == 0 || add_overflows(base, ggtt->stolen_size))
  163. return 0;
  164. /* make sure we don't clobber the GTT if it's within stolen memory */
  165. if (INTEL_GEN(dev_priv) <= 4 &&
  166. !IS_G33(dev_priv) && !IS_PINEVIEW(dev_priv) && !IS_G4X(dev_priv)) {
  167. struct {
  168. dma_addr_t start, end;
  169. } stolen[2] = {
  170. { .start = base, .end = base + ggtt->stolen_size, },
  171. { .start = base, .end = base + ggtt->stolen_size, },
  172. };
  173. u64 ggtt_start, ggtt_end;
  174. ggtt_start = I915_READ(PGTBL_CTL);
  175. if (IS_GEN4(dev_priv))
  176. ggtt_start = (ggtt_start & PGTBL_ADDRESS_LO_MASK) |
  177. (ggtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
  178. else
  179. ggtt_start &= PGTBL_ADDRESS_LO_MASK;
  180. ggtt_end = ggtt_start + ggtt_total_entries(ggtt) * 4;
  181. if (ggtt_start >= stolen[0].start && ggtt_start < stolen[0].end)
  182. stolen[0].end = ggtt_start;
  183. if (ggtt_end > stolen[1].start && ggtt_end <= stolen[1].end)
  184. stolen[1].start = ggtt_end;
  185. /* pick the larger of the two chunks */
  186. if (stolen[0].end - stolen[0].start >
  187. stolen[1].end - stolen[1].start) {
  188. base = stolen[0].start;
  189. ggtt->stolen_size = stolen[0].end - stolen[0].start;
  190. } else {
  191. base = stolen[1].start;
  192. ggtt->stolen_size = stolen[1].end - stolen[1].start;
  193. }
  194. if (stolen[0].start != stolen[1].start ||
  195. stolen[0].end != stolen[1].end) {
  196. dma_addr_t end = base + ggtt->stolen_size - 1;
  197. DRM_DEBUG_KMS("GTT within stolen memory at 0x%llx-0x%llx\n",
  198. (unsigned long long)ggtt_start,
  199. (unsigned long long)ggtt_end - 1);
  200. DRM_DEBUG_KMS("Stolen memory adjusted to %pad - %pad\n",
  201. &base, &end);
  202. }
  203. }
  204. /* Verify that nothing else uses this physical address. Stolen
  205. * memory should be reserved by the BIOS and hidden from the
  206. * kernel. So if the region is already marked as busy, something
  207. * is seriously wrong.
  208. */
  209. r = devm_request_mem_region(dev_priv->drm.dev, base, ggtt->stolen_size,
  210. "Graphics Stolen Memory");
  211. if (r == NULL) {
  212. /*
  213. * One more attempt but this time requesting region from
  214. * base + 1, as we have seen that this resolves the region
  215. * conflict with the PCI Bus.
  216. * This is a BIOS w/a: Some BIOS wrap stolen in the root
  217. * PCI bus, but have an off-by-one error. Hence retry the
  218. * reservation starting from 1 instead of 0.
  219. */
  220. r = devm_request_mem_region(dev_priv->drm.dev, base + 1,
  221. ggtt->stolen_size - 1,
  222. "Graphics Stolen Memory");
  223. /*
  224. * GEN3 firmware likes to smash pci bridges into the stolen
  225. * range. Apparently this works.
  226. */
  227. if (r == NULL && !IS_GEN3(dev_priv)) {
  228. dma_addr_t end = base + ggtt->stolen_size;
  229. DRM_ERROR("conflict detected with stolen region: [%pad - %pad]\n",
  230. &base, &end);
  231. base = 0;
  232. }
  233. }
  234. return base;
  235. }
  236. void i915_gem_cleanup_stolen(struct drm_device *dev)
  237. {
  238. struct drm_i915_private *dev_priv = to_i915(dev);
  239. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  240. return;
  241. drm_mm_takedown(&dev_priv->mm.stolen);
  242. }
  243. static void g4x_get_stolen_reserved(struct drm_i915_private *dev_priv,
  244. dma_addr_t *base, u32 *size)
  245. {
  246. struct i915_ggtt *ggtt = &dev_priv->ggtt;
  247. uint32_t reg_val = I915_READ(IS_GM45(dev_priv) ?
  248. CTG_STOLEN_RESERVED :
  249. ELK_STOLEN_RESERVED);
  250. dma_addr_t stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
  251. *base = (reg_val & G4X_STOLEN_RESERVED_ADDR2_MASK) << 16;
  252. WARN_ON((reg_val & G4X_STOLEN_RESERVED_ADDR1_MASK) < *base);
  253. /* On these platforms, the register doesn't have a size field, so the
  254. * size is the distance between the base and the top of the stolen
  255. * memory. We also have the genuine case where base is zero and there's
  256. * nothing reserved. */
  257. if (*base == 0)
  258. *size = 0;
  259. else
  260. *size = stolen_top - *base;
  261. }
  262. static void gen6_get_stolen_reserved(struct drm_i915_private *dev_priv,
  263. dma_addr_t *base, u32 *size)
  264. {
  265. uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
  266. *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
  267. switch (reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK) {
  268. case GEN6_STOLEN_RESERVED_1M:
  269. *size = 1024 * 1024;
  270. break;
  271. case GEN6_STOLEN_RESERVED_512K:
  272. *size = 512 * 1024;
  273. break;
  274. case GEN6_STOLEN_RESERVED_256K:
  275. *size = 256 * 1024;
  276. break;
  277. case GEN6_STOLEN_RESERVED_128K:
  278. *size = 128 * 1024;
  279. break;
  280. default:
  281. *size = 1024 * 1024;
  282. MISSING_CASE(reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK);
  283. }
  284. }
  285. static void gen7_get_stolen_reserved(struct drm_i915_private *dev_priv,
  286. dma_addr_t *base, u32 *size)
  287. {
  288. uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
  289. *base = reg_val & GEN7_STOLEN_RESERVED_ADDR_MASK;
  290. switch (reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK) {
  291. case GEN7_STOLEN_RESERVED_1M:
  292. *size = 1024 * 1024;
  293. break;
  294. case GEN7_STOLEN_RESERVED_256K:
  295. *size = 256 * 1024;
  296. break;
  297. default:
  298. *size = 1024 * 1024;
  299. MISSING_CASE(reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK);
  300. }
  301. }
  302. static void chv_get_stolen_reserved(struct drm_i915_private *dev_priv,
  303. dma_addr_t *base, u32 *size)
  304. {
  305. uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
  306. *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
  307. switch (reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK) {
  308. case GEN8_STOLEN_RESERVED_1M:
  309. *size = 1024 * 1024;
  310. break;
  311. case GEN8_STOLEN_RESERVED_2M:
  312. *size = 2 * 1024 * 1024;
  313. break;
  314. case GEN8_STOLEN_RESERVED_4M:
  315. *size = 4 * 1024 * 1024;
  316. break;
  317. case GEN8_STOLEN_RESERVED_8M:
  318. *size = 8 * 1024 * 1024;
  319. break;
  320. default:
  321. *size = 8 * 1024 * 1024;
  322. MISSING_CASE(reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK);
  323. }
  324. }
  325. static void bdw_get_stolen_reserved(struct drm_i915_private *dev_priv,
  326. dma_addr_t *base, u32 *size)
  327. {
  328. struct i915_ggtt *ggtt = &dev_priv->ggtt;
  329. uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
  330. dma_addr_t stolen_top;
  331. stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
  332. *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
  333. /* On these platforms, the register doesn't have a size field, so the
  334. * size is the distance between the base and the top of the stolen
  335. * memory. We also have the genuine case where base is zero and there's
  336. * nothing reserved. */
  337. if (*base == 0)
  338. *size = 0;
  339. else
  340. *size = stolen_top - *base;
  341. }
  342. int i915_gem_init_stolen(struct drm_i915_private *dev_priv)
  343. {
  344. struct i915_ggtt *ggtt = &dev_priv->ggtt;
  345. dma_addr_t reserved_base, stolen_top;
  346. u32 reserved_total, reserved_size;
  347. u32 stolen_usable_start;
  348. mutex_init(&dev_priv->mm.stolen_lock);
  349. if (intel_vgpu_active(dev_priv)) {
  350. DRM_INFO("iGVT-g active, disabling use of stolen memory\n");
  351. return 0;
  352. }
  353. #ifdef CONFIG_INTEL_IOMMU
  354. if (intel_iommu_gfx_mapped && INTEL_GEN(dev_priv) < 8) {
  355. DRM_INFO("DMAR active, disabling use of stolen memory\n");
  356. return 0;
  357. }
  358. #endif
  359. if (ggtt->stolen_size == 0)
  360. return 0;
  361. dev_priv->mm.stolen_base = i915_stolen_to_dma(dev_priv);
  362. if (dev_priv->mm.stolen_base == 0)
  363. return 0;
  364. stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
  365. reserved_base = 0;
  366. reserved_size = 0;
  367. switch (INTEL_INFO(dev_priv)->gen) {
  368. case 2:
  369. case 3:
  370. break;
  371. case 4:
  372. if (IS_G4X(dev_priv))
  373. g4x_get_stolen_reserved(dev_priv,
  374. &reserved_base, &reserved_size);
  375. break;
  376. case 5:
  377. /* Assume the gen6 maximum for the older platforms. */
  378. reserved_size = 1024 * 1024;
  379. reserved_base = stolen_top - reserved_size;
  380. break;
  381. case 6:
  382. gen6_get_stolen_reserved(dev_priv,
  383. &reserved_base, &reserved_size);
  384. break;
  385. case 7:
  386. gen7_get_stolen_reserved(dev_priv,
  387. &reserved_base, &reserved_size);
  388. break;
  389. default:
  390. if (IS_LP(dev_priv))
  391. chv_get_stolen_reserved(dev_priv,
  392. &reserved_base, &reserved_size);
  393. else
  394. bdw_get_stolen_reserved(dev_priv,
  395. &reserved_base, &reserved_size);
  396. break;
  397. }
  398. /* It is possible for the reserved base to be zero, but the register
  399. * field for size doesn't have a zero option. */
  400. if (reserved_base == 0) {
  401. reserved_size = 0;
  402. reserved_base = stolen_top;
  403. }
  404. if (reserved_base < dev_priv->mm.stolen_base ||
  405. reserved_base + reserved_size > stolen_top) {
  406. dma_addr_t reserved_top = reserved_base + reserved_size;
  407. DRM_DEBUG_KMS("Stolen reserved area [%pad - %pad] outside stolen memory [%pad - %pad]\n",
  408. &reserved_base, &reserved_top,
  409. &dev_priv->mm.stolen_base, &stolen_top);
  410. return 0;
  411. }
  412. ggtt->stolen_reserved_base = reserved_base;
  413. ggtt->stolen_reserved_size = reserved_size;
  414. /* It is possible for the reserved area to end before the end of stolen
  415. * memory, so just consider the start. */
  416. reserved_total = stolen_top - reserved_base;
  417. DRM_DEBUG_KMS("Memory reserved for graphics device: %uK, usable: %uK\n",
  418. ggtt->stolen_size >> 10,
  419. (ggtt->stolen_size - reserved_total) >> 10);
  420. stolen_usable_start = 0;
  421. /* WaSkipStolenMemoryFirstPage:bdw+ */
  422. if (INTEL_GEN(dev_priv) >= 8)
  423. stolen_usable_start = 4096;
  424. ggtt->stolen_usable_size =
  425. ggtt->stolen_size - reserved_total - stolen_usable_start;
  426. /* Basic memrange allocator for stolen space. */
  427. drm_mm_init(&dev_priv->mm.stolen, stolen_usable_start,
  428. ggtt->stolen_usable_size);
  429. return 0;
  430. }
  431. static struct sg_table *
  432. i915_pages_create_for_stolen(struct drm_device *dev,
  433. u32 offset, u32 size)
  434. {
  435. struct drm_i915_private *dev_priv = to_i915(dev);
  436. struct sg_table *st;
  437. struct scatterlist *sg;
  438. GEM_BUG_ON(range_overflows(offset, size, dev_priv->ggtt.stolen_size));
  439. /* We hide that we have no struct page backing our stolen object
  440. * by wrapping the contiguous physical allocation with a fake
  441. * dma mapping in a single scatterlist.
  442. */
  443. st = kmalloc(sizeof(*st), GFP_KERNEL);
  444. if (st == NULL)
  445. return ERR_PTR(-ENOMEM);
  446. if (sg_alloc_table(st, 1, GFP_KERNEL)) {
  447. kfree(st);
  448. return ERR_PTR(-ENOMEM);
  449. }
  450. sg = st->sgl;
  451. sg->offset = 0;
  452. sg->length = size;
  453. sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset;
  454. sg_dma_len(sg) = size;
  455. return st;
  456. }
  457. static struct sg_table *
  458. i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
  459. {
  460. return i915_pages_create_for_stolen(obj->base.dev,
  461. obj->stolen->start,
  462. obj->stolen->size);
  463. }
  464. static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj,
  465. struct sg_table *pages)
  466. {
  467. /* Should only be called from i915_gem_object_release_stolen() */
  468. sg_free_table(pages);
  469. kfree(pages);
  470. }
  471. static void
  472. i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
  473. {
  474. struct drm_i915_private *dev_priv = to_i915(obj->base.dev);
  475. struct drm_mm_node *stolen = fetch_and_zero(&obj->stolen);
  476. GEM_BUG_ON(!stolen);
  477. __i915_gem_object_unpin_pages(obj);
  478. i915_gem_stolen_remove_node(dev_priv, stolen);
  479. kfree(stolen);
  480. }
  481. static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
  482. .get_pages = i915_gem_object_get_pages_stolen,
  483. .put_pages = i915_gem_object_put_pages_stolen,
  484. .release = i915_gem_object_release_stolen,
  485. };
  486. static struct drm_i915_gem_object *
  487. _i915_gem_object_create_stolen(struct drm_i915_private *dev_priv,
  488. struct drm_mm_node *stolen)
  489. {
  490. struct drm_i915_gem_object *obj;
  491. obj = i915_gem_object_alloc(dev_priv);
  492. if (obj == NULL)
  493. return NULL;
  494. drm_gem_private_object_init(&dev_priv->drm, &obj->base, stolen->size);
  495. i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
  496. obj->stolen = stolen;
  497. obj->base.read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
  498. obj->cache_level = HAS_LLC(dev_priv) ? I915_CACHE_LLC : I915_CACHE_NONE;
  499. if (i915_gem_object_pin_pages(obj))
  500. goto cleanup;
  501. return obj;
  502. cleanup:
  503. i915_gem_object_free(obj);
  504. return NULL;
  505. }
  506. struct drm_i915_gem_object *
  507. i915_gem_object_create_stolen(struct drm_i915_private *dev_priv, u32 size)
  508. {
  509. struct drm_i915_gem_object *obj;
  510. struct drm_mm_node *stolen;
  511. int ret;
  512. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  513. return NULL;
  514. if (size == 0)
  515. return NULL;
  516. stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
  517. if (!stolen)
  518. return NULL;
  519. ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096);
  520. if (ret) {
  521. kfree(stolen);
  522. return NULL;
  523. }
  524. obj = _i915_gem_object_create_stolen(dev_priv, stolen);
  525. if (obj)
  526. return obj;
  527. i915_gem_stolen_remove_node(dev_priv, stolen);
  528. kfree(stolen);
  529. return NULL;
  530. }
  531. struct drm_i915_gem_object *
  532. i915_gem_object_create_stolen_for_preallocated(struct drm_i915_private *dev_priv,
  533. u32 stolen_offset,
  534. u32 gtt_offset,
  535. u32 size)
  536. {
  537. struct i915_ggtt *ggtt = &dev_priv->ggtt;
  538. struct drm_i915_gem_object *obj;
  539. struct drm_mm_node *stolen;
  540. struct i915_vma *vma;
  541. int ret;
  542. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  543. return NULL;
  544. lockdep_assert_held(&dev_priv->drm.struct_mutex);
  545. DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n",
  546. stolen_offset, gtt_offset, size);
  547. /* KISS and expect everything to be page-aligned */
  548. if (WARN_ON(size == 0) ||
  549. WARN_ON(!IS_ALIGNED(size, I915_GTT_PAGE_SIZE)) ||
  550. WARN_ON(!IS_ALIGNED(stolen_offset, I915_GTT_MIN_ALIGNMENT)))
  551. return NULL;
  552. stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
  553. if (!stolen)
  554. return NULL;
  555. stolen->start = stolen_offset;
  556. stolen->size = size;
  557. mutex_lock(&dev_priv->mm.stolen_lock);
  558. ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
  559. mutex_unlock(&dev_priv->mm.stolen_lock);
  560. if (ret) {
  561. DRM_DEBUG_KMS("failed to allocate stolen space\n");
  562. kfree(stolen);
  563. return NULL;
  564. }
  565. obj = _i915_gem_object_create_stolen(dev_priv, stolen);
  566. if (obj == NULL) {
  567. DRM_DEBUG_KMS("failed to allocate stolen object\n");
  568. i915_gem_stolen_remove_node(dev_priv, stolen);
  569. kfree(stolen);
  570. return NULL;
  571. }
  572. /* Some objects just need physical mem from stolen space */
  573. if (gtt_offset == I915_GTT_OFFSET_NONE)
  574. return obj;
  575. ret = i915_gem_object_pin_pages(obj);
  576. if (ret)
  577. goto err;
  578. vma = i915_vma_instance(obj, &ggtt->base, NULL);
  579. if (IS_ERR(vma)) {
  580. ret = PTR_ERR(vma);
  581. goto err_pages;
  582. }
  583. /* To simplify the initialisation sequence between KMS and GTT,
  584. * we allow construction of the stolen object prior to
  585. * setting up the GTT space. The actual reservation will occur
  586. * later.
  587. */
  588. ret = i915_gem_gtt_reserve(&ggtt->base, &vma->node,
  589. size, gtt_offset, obj->cache_level,
  590. 0);
  591. if (ret) {
  592. DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
  593. goto err_pages;
  594. }
  595. GEM_BUG_ON(!drm_mm_node_allocated(&vma->node));
  596. vma->pages = obj->mm.pages;
  597. vma->flags |= I915_VMA_GLOBAL_BIND;
  598. __i915_vma_set_map_and_fenceable(vma);
  599. list_move_tail(&vma->vm_link, &ggtt->base.inactive_list);
  600. list_move_tail(&obj->global_link, &dev_priv->mm.bound_list);
  601. obj->bind_count++;
  602. return obj;
  603. err_pages:
  604. i915_gem_object_unpin_pages(obj);
  605. err:
  606. i915_gem_object_put(obj);
  607. return NULL;
  608. }