123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661 |
- /*
- * Copyright © 2008-2012 Intel Corporation
- *
- * Permission is hereby granted, free of charge, to any person obtaining a
- * copy of this software and associated documentation files (the "Software"),
- * to deal in the Software without restriction, including without limitation
- * the rights to use, copy, modify, merge, publish, distribute, sublicense,
- * and/or sell copies of the Software, and to permit persons to whom the
- * Software is furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice (including the next
- * paragraph) shall be included in all copies or substantial portions of the
- * Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
- * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
- * IN THE SOFTWARE.
- *
- * Authors:
- * Eric Anholt <eric@anholt.net>
- * Chris Wilson <chris@chris-wilson.co.uk>
- *
- */
- #include <drm/drmP.h>
- #include <drm/i915_drm.h>
- #include "i915_drv.h"
- /*
- * The BIOS typically reserves some of the system's memory for the exclusive
- * use of the integrated graphics. This memory is no longer available for
- * use by the OS and so the user finds that his system has less memory
- * available than he put in. We refer to this memory as stolen.
- *
- * The BIOS will allocate its framebuffer from the stolen memory. Our
- * goal is try to reuse that object for our own fbcon which must always
- * be available for panics. Anything else we can reuse the stolen memory
- * for is a boon.
- */
- int i915_gem_stolen_insert_node_in_range(struct drm_i915_private *dev_priv,
- struct drm_mm_node *node, u64 size,
- unsigned alignment, u64 start, u64 end)
- {
- int ret;
- if (!drm_mm_initialized(&dev_priv->mm.stolen))
- return -ENODEV;
- mutex_lock(&dev_priv->mm.stolen_lock);
- ret = drm_mm_insert_node_in_range(&dev_priv->mm.stolen, node,
- size, alignment, 0,
- start, end, DRM_MM_INSERT_BEST);
- mutex_unlock(&dev_priv->mm.stolen_lock);
- return ret;
- }
- int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv,
- struct drm_mm_node *node, u64 size,
- unsigned alignment)
- {
- return i915_gem_stolen_insert_node_in_range(dev_priv, node, size,
- alignment, 0, U64_MAX);
- }
- void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv,
- struct drm_mm_node *node)
- {
- mutex_lock(&dev_priv->mm.stolen_lock);
- drm_mm_remove_node(node);
- mutex_unlock(&dev_priv->mm.stolen_lock);
- }
- static int i915_adjust_stolen(struct drm_i915_private *dev_priv,
- struct resource *dsm)
- {
- struct i915_ggtt *ggtt = &dev_priv->ggtt;
- struct resource *r;
- if (dsm->start == 0 || dsm->end <= dsm->start)
- return -EINVAL;
- /*
- * TODO: We have yet too encounter the case where the GTT wasn't at the
- * end of stolen. With that assumption we could simplify this.
- */
- /* Make sure we don't clobber the GTT if it's within stolen memory */
- if (INTEL_GEN(dev_priv) <= 4 &&
- !IS_G33(dev_priv) && !IS_PINEVIEW(dev_priv) && !IS_G4X(dev_priv)) {
- struct resource stolen[2] = {*dsm, *dsm};
- struct resource ggtt_res;
- resource_size_t ggtt_start;
- ggtt_start = I915_READ(PGTBL_CTL);
- if (IS_GEN4(dev_priv))
- ggtt_start = (ggtt_start & PGTBL_ADDRESS_LO_MASK) |
- (ggtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
- else
- ggtt_start &= PGTBL_ADDRESS_LO_MASK;
- ggtt_res =
- (struct resource) DEFINE_RES_MEM(ggtt_start,
- ggtt_total_entries(ggtt) * 4);
- if (ggtt_res.start >= stolen[0].start && ggtt_res.start < stolen[0].end)
- stolen[0].end = ggtt_res.start;
- if (ggtt_res.end > stolen[1].start && ggtt_res.end <= stolen[1].end)
- stolen[1].start = ggtt_res.end;
- /* Pick the larger of the two chunks */
- if (resource_size(&stolen[0]) > resource_size(&stolen[1]))
- *dsm = stolen[0];
- else
- *dsm = stolen[1];
- if (stolen[0].start != stolen[1].start ||
- stolen[0].end != stolen[1].end) {
- DRM_DEBUG_KMS("GTT within stolen memory at %pR\n", &ggtt_res);
- DRM_DEBUG_KMS("Stolen memory adjusted to %pR\n", dsm);
- }
- }
- /*
- * Verify that nothing else uses this physical address. Stolen
- * memory should be reserved by the BIOS and hidden from the
- * kernel. So if the region is already marked as busy, something
- * is seriously wrong.
- */
- r = devm_request_mem_region(dev_priv->drm.dev, dsm->start,
- resource_size(dsm),
- "Graphics Stolen Memory");
- if (r == NULL) {
- /*
- * One more attempt but this time requesting region from
- * start + 1, as we have seen that this resolves the region
- * conflict with the PCI Bus.
- * This is a BIOS w/a: Some BIOS wrap stolen in the root
- * PCI bus, but have an off-by-one error. Hence retry the
- * reservation starting from 1 instead of 0.
- * There's also BIOS with off-by-one on the other end.
- */
- r = devm_request_mem_region(dev_priv->drm.dev, dsm->start + 1,
- resource_size(dsm) - 2,
- "Graphics Stolen Memory");
- /*
- * GEN3 firmware likes to smash pci bridges into the stolen
- * range. Apparently this works.
- */
- if (r == NULL && !IS_GEN3(dev_priv)) {
- DRM_ERROR("conflict detected with stolen region: %pR\n",
- dsm);
- return -EBUSY;
- }
- }
- return 0;
- }
- void i915_gem_cleanup_stolen(struct drm_device *dev)
- {
- struct drm_i915_private *dev_priv = to_i915(dev);
- if (!drm_mm_initialized(&dev_priv->mm.stolen))
- return;
- drm_mm_takedown(&dev_priv->mm.stolen);
- }
- static void g4x_get_stolen_reserved(struct drm_i915_private *dev_priv,
- resource_size_t *base, resource_size_t *size)
- {
- uint32_t reg_val = I915_READ(IS_GM45(dev_priv) ?
- CTG_STOLEN_RESERVED :
- ELK_STOLEN_RESERVED);
- resource_size_t stolen_top = dev_priv->dsm.end + 1;
- if ((reg_val & G4X_STOLEN_RESERVED_ENABLE) == 0) {
- *base = 0;
- *size = 0;
- return;
- }
- /*
- * Whether ILK really reuses the ELK register for this is unclear.
- * Let's see if we catch anyone with this supposedly enabled on ILK.
- */
- WARN(IS_GEN5(dev_priv), "ILK stolen reserved found? 0x%08x\n", reg_val);
- *base = (reg_val & G4X_STOLEN_RESERVED_ADDR2_MASK) << 16;
- WARN_ON((reg_val & G4X_STOLEN_RESERVED_ADDR1_MASK) < *base);
- /* On these platforms, the register doesn't have a size field, so the
- * size is the distance between the base and the top of the stolen
- * memory. We also have the genuine case where base is zero and there's
- * nothing reserved. */
- if (*base == 0)
- *size = 0;
- else
- *size = stolen_top - *base;
- }
- static void gen6_get_stolen_reserved(struct drm_i915_private *dev_priv,
- resource_size_t *base, resource_size_t *size)
- {
- uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
- if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
- *base = 0;
- *size = 0;
- return;
- }
- *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
- switch (reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK) {
- case GEN6_STOLEN_RESERVED_1M:
- *size = 1024 * 1024;
- break;
- case GEN6_STOLEN_RESERVED_512K:
- *size = 512 * 1024;
- break;
- case GEN6_STOLEN_RESERVED_256K:
- *size = 256 * 1024;
- break;
- case GEN6_STOLEN_RESERVED_128K:
- *size = 128 * 1024;
- break;
- default:
- *size = 1024 * 1024;
- MISSING_CASE(reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK);
- }
- }
- static void gen7_get_stolen_reserved(struct drm_i915_private *dev_priv,
- resource_size_t *base, resource_size_t *size)
- {
- uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
- if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
- *base = 0;
- *size = 0;
- return;
- }
- *base = reg_val & GEN7_STOLEN_RESERVED_ADDR_MASK;
- switch (reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK) {
- case GEN7_STOLEN_RESERVED_1M:
- *size = 1024 * 1024;
- break;
- case GEN7_STOLEN_RESERVED_256K:
- *size = 256 * 1024;
- break;
- default:
- *size = 1024 * 1024;
- MISSING_CASE(reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK);
- }
- }
- static void chv_get_stolen_reserved(struct drm_i915_private *dev_priv,
- resource_size_t *base, resource_size_t *size)
- {
- uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
- if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
- *base = 0;
- *size = 0;
- return;
- }
- *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
- switch (reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK) {
- case GEN8_STOLEN_RESERVED_1M:
- *size = 1024 * 1024;
- break;
- case GEN8_STOLEN_RESERVED_2M:
- *size = 2 * 1024 * 1024;
- break;
- case GEN8_STOLEN_RESERVED_4M:
- *size = 4 * 1024 * 1024;
- break;
- case GEN8_STOLEN_RESERVED_8M:
- *size = 8 * 1024 * 1024;
- break;
- default:
- *size = 8 * 1024 * 1024;
- MISSING_CASE(reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK);
- }
- }
- static void bdw_get_stolen_reserved(struct drm_i915_private *dev_priv,
- resource_size_t *base, resource_size_t *size)
- {
- uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
- resource_size_t stolen_top;
- if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
- *base = 0;
- *size = 0;
- return;
- }
- stolen_top = dev_priv->dsm.end + 1;
- *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
- /* On these platforms, the register doesn't have a size field, so the
- * size is the distance between the base and the top of the stolen
- * memory. We also have the genuine case where base is zero and there's
- * nothing reserved. */
- if (*base == 0)
- *size = 0;
- else
- *size = stolen_top - *base;
- }
- int i915_gem_init_stolen(struct drm_i915_private *dev_priv)
- {
- resource_size_t reserved_base, stolen_top;
- resource_size_t reserved_total, reserved_size;
- resource_size_t stolen_usable_start;
- mutex_init(&dev_priv->mm.stolen_lock);
- if (intel_vgpu_active(dev_priv)) {
- DRM_INFO("iGVT-g active, disabling use of stolen memory\n");
- return 0;
- }
- if (intel_vtd_active() && INTEL_GEN(dev_priv) < 8) {
- DRM_INFO("DMAR active, disabling use of stolen memory\n");
- return 0;
- }
- if (resource_size(&intel_graphics_stolen_res) == 0)
- return 0;
- dev_priv->dsm = intel_graphics_stolen_res;
- if (i915_adjust_stolen(dev_priv, &dev_priv->dsm))
- return 0;
- GEM_BUG_ON(dev_priv->dsm.start == 0);
- GEM_BUG_ON(dev_priv->dsm.end <= dev_priv->dsm.start);
- stolen_top = dev_priv->dsm.end + 1;
- reserved_base = 0;
- reserved_size = 0;
- switch (INTEL_GEN(dev_priv)) {
- case 2:
- case 3:
- break;
- case 4:
- if (!IS_G4X(dev_priv))
- break;
- /* fall through */
- case 5:
- g4x_get_stolen_reserved(dev_priv,
- &reserved_base, &reserved_size);
- break;
- case 6:
- gen6_get_stolen_reserved(dev_priv,
- &reserved_base, &reserved_size);
- break;
- case 7:
- gen7_get_stolen_reserved(dev_priv,
- &reserved_base, &reserved_size);
- break;
- default:
- if (IS_LP(dev_priv))
- chv_get_stolen_reserved(dev_priv,
- &reserved_base, &reserved_size);
- else
- bdw_get_stolen_reserved(dev_priv,
- &reserved_base, &reserved_size);
- break;
- }
- /* It is possible for the reserved base to be zero, but the register
- * field for size doesn't have a zero option. */
- if (reserved_base == 0) {
- reserved_size = 0;
- reserved_base = stolen_top;
- }
- dev_priv->dsm_reserved =
- (struct resource) DEFINE_RES_MEM(reserved_base, reserved_size);
- if (!resource_contains(&dev_priv->dsm, &dev_priv->dsm_reserved)) {
- DRM_ERROR("Stolen reserved area %pR outside stolen memory %pR\n",
- &dev_priv->dsm_reserved, &dev_priv->dsm);
- return 0;
- }
- /* It is possible for the reserved area to end before the end of stolen
- * memory, so just consider the start. */
- reserved_total = stolen_top - reserved_base;
- DRM_DEBUG_KMS("Memory reserved for graphics device: %lluK, usable: %lluK\n",
- (u64)resource_size(&dev_priv->dsm) >> 10,
- ((u64)resource_size(&dev_priv->dsm) - reserved_total) >> 10);
- stolen_usable_start = 0;
- /* WaSkipStolenMemoryFirstPage:bdw+ */
- if (INTEL_GEN(dev_priv) >= 8)
- stolen_usable_start = 4096;
- dev_priv->stolen_usable_size =
- resource_size(&dev_priv->dsm) - reserved_total - stolen_usable_start;
- /* Basic memrange allocator for stolen space. */
- drm_mm_init(&dev_priv->mm.stolen, stolen_usable_start,
- dev_priv->stolen_usable_size);
- return 0;
- }
- static struct sg_table *
- i915_pages_create_for_stolen(struct drm_device *dev,
- resource_size_t offset, resource_size_t size)
- {
- struct drm_i915_private *dev_priv = to_i915(dev);
- struct sg_table *st;
- struct scatterlist *sg;
- GEM_BUG_ON(range_overflows(offset, size, resource_size(&dev_priv->dsm)));
- /* We hide that we have no struct page backing our stolen object
- * by wrapping the contiguous physical allocation with a fake
- * dma mapping in a single scatterlist.
- */
- st = kmalloc(sizeof(*st), GFP_KERNEL);
- if (st == NULL)
- return ERR_PTR(-ENOMEM);
- if (sg_alloc_table(st, 1, GFP_KERNEL)) {
- kfree(st);
- return ERR_PTR(-ENOMEM);
- }
- sg = st->sgl;
- sg->offset = 0;
- sg->length = size;
- sg_dma_address(sg) = (dma_addr_t)dev_priv->dsm.start + offset;
- sg_dma_len(sg) = size;
- return st;
- }
- static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
- {
- struct sg_table *pages =
- i915_pages_create_for_stolen(obj->base.dev,
- obj->stolen->start,
- obj->stolen->size);
- if (IS_ERR(pages))
- return PTR_ERR(pages);
- __i915_gem_object_set_pages(obj, pages, obj->stolen->size);
- return 0;
- }
- static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj,
- struct sg_table *pages)
- {
- /* Should only be called from i915_gem_object_release_stolen() */
- sg_free_table(pages);
- kfree(pages);
- }
- static void
- i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
- {
- struct drm_i915_private *dev_priv = to_i915(obj->base.dev);
- struct drm_mm_node *stolen = fetch_and_zero(&obj->stolen);
- GEM_BUG_ON(!stolen);
- __i915_gem_object_unpin_pages(obj);
- i915_gem_stolen_remove_node(dev_priv, stolen);
- kfree(stolen);
- }
- static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
- .get_pages = i915_gem_object_get_pages_stolen,
- .put_pages = i915_gem_object_put_pages_stolen,
- .release = i915_gem_object_release_stolen,
- };
- static struct drm_i915_gem_object *
- _i915_gem_object_create_stolen(struct drm_i915_private *dev_priv,
- struct drm_mm_node *stolen)
- {
- struct drm_i915_gem_object *obj;
- unsigned int cache_level;
- obj = i915_gem_object_alloc(dev_priv);
- if (obj == NULL)
- return NULL;
- drm_gem_private_object_init(&dev_priv->drm, &obj->base, stolen->size);
- i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
- obj->stolen = stolen;
- obj->read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
- cache_level = HAS_LLC(dev_priv) ? I915_CACHE_LLC : I915_CACHE_NONE;
- i915_gem_object_set_cache_coherency(obj, cache_level);
- if (i915_gem_object_pin_pages(obj))
- goto cleanup;
- return obj;
- cleanup:
- i915_gem_object_free(obj);
- return NULL;
- }
- struct drm_i915_gem_object *
- i915_gem_object_create_stolen(struct drm_i915_private *dev_priv,
- resource_size_t size)
- {
- struct drm_i915_gem_object *obj;
- struct drm_mm_node *stolen;
- int ret;
- if (!drm_mm_initialized(&dev_priv->mm.stolen))
- return NULL;
- if (size == 0)
- return NULL;
- stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
- if (!stolen)
- return NULL;
- ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096);
- if (ret) {
- kfree(stolen);
- return NULL;
- }
- obj = _i915_gem_object_create_stolen(dev_priv, stolen);
- if (obj)
- return obj;
- i915_gem_stolen_remove_node(dev_priv, stolen);
- kfree(stolen);
- return NULL;
- }
- struct drm_i915_gem_object *
- i915_gem_object_create_stolen_for_preallocated(struct drm_i915_private *dev_priv,
- resource_size_t stolen_offset,
- resource_size_t gtt_offset,
- resource_size_t size)
- {
- struct i915_ggtt *ggtt = &dev_priv->ggtt;
- struct drm_i915_gem_object *obj;
- struct drm_mm_node *stolen;
- struct i915_vma *vma;
- int ret;
- if (!drm_mm_initialized(&dev_priv->mm.stolen))
- return NULL;
- lockdep_assert_held(&dev_priv->drm.struct_mutex);
- DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%pa, gtt_offset=%pa, size=%pa\n",
- &stolen_offset, >t_offset, &size);
- /* KISS and expect everything to be page-aligned */
- if (WARN_ON(size == 0) ||
- WARN_ON(!IS_ALIGNED(size, I915_GTT_PAGE_SIZE)) ||
- WARN_ON(!IS_ALIGNED(stolen_offset, I915_GTT_MIN_ALIGNMENT)))
- return NULL;
- stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
- if (!stolen)
- return NULL;
- stolen->start = stolen_offset;
- stolen->size = size;
- mutex_lock(&dev_priv->mm.stolen_lock);
- ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
- mutex_unlock(&dev_priv->mm.stolen_lock);
- if (ret) {
- DRM_DEBUG_KMS("failed to allocate stolen space\n");
- kfree(stolen);
- return NULL;
- }
- obj = _i915_gem_object_create_stolen(dev_priv, stolen);
- if (obj == NULL) {
- DRM_DEBUG_KMS("failed to allocate stolen object\n");
- i915_gem_stolen_remove_node(dev_priv, stolen);
- kfree(stolen);
- return NULL;
- }
- /* Some objects just need physical mem from stolen space */
- if (gtt_offset == I915_GTT_OFFSET_NONE)
- return obj;
- ret = i915_gem_object_pin_pages(obj);
- if (ret)
- goto err;
- vma = i915_vma_instance(obj, &ggtt->base, NULL);
- if (IS_ERR(vma)) {
- ret = PTR_ERR(vma);
- goto err_pages;
- }
- /* To simplify the initialisation sequence between KMS and GTT,
- * we allow construction of the stolen object prior to
- * setting up the GTT space. The actual reservation will occur
- * later.
- */
- ret = i915_gem_gtt_reserve(&ggtt->base, &vma->node,
- size, gtt_offset, obj->cache_level,
- 0);
- if (ret) {
- DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
- goto err_pages;
- }
- GEM_BUG_ON(!drm_mm_node_allocated(&vma->node));
- vma->pages = obj->mm.pages;
- vma->flags |= I915_VMA_GLOBAL_BIND;
- __i915_vma_set_map_and_fenceable(vma);
- list_move_tail(&vma->vm_link, &ggtt->base.inactive_list);
- spin_lock(&dev_priv->mm.obj_lock);
- list_move_tail(&obj->mm.link, &dev_priv->mm.bound_list);
- obj->bind_count++;
- spin_unlock(&dev_priv->mm.obj_lock);
- return obj;
- err_pages:
- i915_gem_object_unpin_pages(obj);
- err:
- i915_gem_object_put(obj);
- return NULL;
- }
|