Commit | Line | Data |
---|---|---|
9797fbfb CW |
1 | /* |
2 | * Copyright © 2008-2012 Intel Corporation | |
3 | * | |
4 | * Permission is hereby granted, free of charge, to any person obtaining a | |
5 | * copy of this software and associated documentation files (the "Software"), | |
6 | * to deal in the Software without restriction, including without limitation | |
7 | * the rights to use, copy, modify, merge, publish, distribute, sublicense, | |
8 | * and/or sell copies of the Software, and to permit persons to whom the | |
9 | * Software is furnished to do so, subject to the following conditions: | |
10 | * | |
11 | * The above copyright notice and this permission notice (including the next | |
12 | * paragraph) shall be included in all copies or substantial portions of the | |
13 | * Software. | |
14 | * | |
15 | * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR | |
16 | * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, | |
17 | * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL | |
18 | * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER | |
19 | * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING | |
20 | * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS | |
21 | * IN THE SOFTWARE. | |
22 | * | |
23 | * Authors: | |
24 | * Eric Anholt <eric@anholt.net> | |
25 | * Chris Wilson <chris@chris-wilson.co.uk> | |
26 | * | |
27 | */ | |
28 | ||
760285e7 DH |
29 | #include <drm/drmP.h> |
30 | #include <drm/i915_drm.h> | |
9797fbfb CW |
31 | #include "i915_drv.h" |
32 | ||
33 | /* | |
34 | * The BIOS typically reserves some of the system's memory for the exclusive | |
35 | * use of the integrated graphics. This memory is no longer available for | |
36 | * use by the OS and so the user finds that his system has less memory | |
37 | * available than he put in. We refer to this memory as stolen. | |
38 | * | |
39 | * The BIOS will allocate its framebuffer from the stolen memory. Our | |
40 | * goal is try to reuse that object for our own fbcon which must always | |
41 | * be available for panics. Anything else we can reuse the stolen memory | |
42 | * for is a boon. | |
43 | */ | |
44 | ||
d713fd49 PZ |
45 | int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv, |
46 | struct drm_mm_node *node, u64 size, | |
47 | unsigned alignment) | |
48 | { | |
92e97d2f PZ |
49 | int ret; |
50 | ||
d713fd49 PZ |
51 | if (!drm_mm_initialized(&dev_priv->mm.stolen)) |
52 | return -ENODEV; | |
53 | ||
92e97d2f PZ |
54 | mutex_lock(&dev_priv->mm.stolen_lock); |
55 | ret = drm_mm_insert_node(&dev_priv->mm.stolen, node, size, alignment, | |
56 | DRM_MM_SEARCH_DEFAULT); | |
57 | mutex_unlock(&dev_priv->mm.stolen_lock); | |
58 | ||
59 | return ret; | |
d713fd49 PZ |
60 | } |
61 | ||
62 | void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv, | |
63 | struct drm_mm_node *node) | |
64 | { | |
92e97d2f | 65 | mutex_lock(&dev_priv->mm.stolen_lock); |
d713fd49 | 66 | drm_mm_remove_node(node); |
92e97d2f | 67 | mutex_unlock(&dev_priv->mm.stolen_lock); |
d713fd49 PZ |
68 | } |
69 | ||
e12a2d53 | 70 | static unsigned long i915_stolen_to_physical(struct drm_device *dev) |
9797fbfb CW |
71 | { |
72 | struct drm_i915_private *dev_priv = dev->dev_private; | |
eaba1b8f | 73 | struct resource *r; |
9797fbfb CW |
74 | u32 base; |
75 | ||
17fec8a0 CW |
76 | /* Almost universally we can find the Graphics Base of Stolen Memory |
77 | * at offset 0x5c in the igfx configuration space. On a few (desktop) | |
78 | * machines this is also mirrored in the bridge device at different | |
79 | * locations, or in the MCHBAR. On gen2, the layout is again slightly | |
80 | * different with the Graphics Segment immediately following Top of | |
81 | * Memory (or Top of Usable DRAM). Note it appears that TOUD is only | |
82 | * reported by 865g, so we just use the top of memory as determined | |
83 | * by the e820 probe. | |
e12a2d53 | 84 | * |
17fec8a0 | 85 | * XXX However gen2 requires an unavailable symbol. |
9797fbfb | 86 | */ |
e12a2d53 | 87 | base = 0; |
17fec8a0 CW |
88 | if (INTEL_INFO(dev)->gen >= 3) { |
89 | /* Read Graphics Base of Stolen Memory directly */ | |
c9cddffc JB |
90 | pci_read_config_dword(dev->pdev, 0x5c, &base); |
91 | base &= ~((1<<20) - 1); | |
17fec8a0 | 92 | } else { /* GEN2 */ |
e12a2d53 | 93 | #if 0 |
e12a2d53 CW |
94 | /* Stolen is immediately above Top of Memory */ |
95 | base = max_low_pfn_mapped << PAGE_SHIFT; | |
9797fbfb | 96 | #endif |
e12a2d53 | 97 | } |
9797fbfb | 98 | |
eaba1b8f CW |
99 | if (base == 0) |
100 | return 0; | |
101 | ||
f1e1c212 VS |
102 | /* make sure we don't clobber the GTT if it's within stolen memory */ |
103 | if (INTEL_INFO(dev)->gen <= 4 && !IS_G33(dev) && !IS_G4X(dev)) { | |
104 | struct { | |
105 | u32 start, end; | |
106 | } stolen[2] = { | |
107 | { .start = base, .end = base + dev_priv->gtt.stolen_size, }, | |
108 | { .start = base, .end = base + dev_priv->gtt.stolen_size, }, | |
109 | }; | |
110 | u64 gtt_start, gtt_end; | |
111 | ||
112 | gtt_start = I915_READ(PGTBL_CTL); | |
113 | if (IS_GEN4(dev)) | |
114 | gtt_start = (gtt_start & PGTBL_ADDRESS_LO_MASK) | | |
115 | (gtt_start & PGTBL_ADDRESS_HI_MASK) << 28; | |
116 | else | |
117 | gtt_start &= PGTBL_ADDRESS_LO_MASK; | |
118 | gtt_end = gtt_start + gtt_total_entries(dev_priv->gtt) * 4; | |
119 | ||
120 | if (gtt_start >= stolen[0].start && gtt_start < stolen[0].end) | |
121 | stolen[0].end = gtt_start; | |
122 | if (gtt_end > stolen[1].start && gtt_end <= stolen[1].end) | |
123 | stolen[1].start = gtt_end; | |
124 | ||
125 | /* pick the larger of the two chunks */ | |
126 | if (stolen[0].end - stolen[0].start > | |
127 | stolen[1].end - stolen[1].start) { | |
128 | base = stolen[0].start; | |
129 | dev_priv->gtt.stolen_size = stolen[0].end - stolen[0].start; | |
130 | } else { | |
131 | base = stolen[1].start; | |
132 | dev_priv->gtt.stolen_size = stolen[1].end - stolen[1].start; | |
133 | } | |
134 | ||
135 | if (stolen[0].start != stolen[1].start || | |
136 | stolen[0].end != stolen[1].end) { | |
137 | DRM_DEBUG_KMS("GTT within stolen memory at 0x%llx-0x%llx\n", | |
138 | (unsigned long long) gtt_start, | |
139 | (unsigned long long) gtt_end - 1); | |
140 | DRM_DEBUG_KMS("Stolen memory adjusted to 0x%x-0x%x\n", | |
141 | base, base + (u32) dev_priv->gtt.stolen_size - 1); | |
142 | } | |
143 | } | |
144 | ||
145 | ||
eaba1b8f CW |
146 | /* Verify that nothing else uses this physical address. Stolen |
147 | * memory should be reserved by the BIOS and hidden from the | |
148 | * kernel. So if the region is already marked as busy, something | |
149 | * is seriously wrong. | |
150 | */ | |
151 | r = devm_request_mem_region(dev->dev, base, dev_priv->gtt.stolen_size, | |
152 | "Graphics Stolen Memory"); | |
153 | if (r == NULL) { | |
3617dc96 AG |
154 | /* |
155 | * One more attempt but this time requesting region from | |
156 | * base + 1, as we have seen that this resolves the region | |
157 | * conflict with the PCI Bus. | |
158 | * This is a BIOS w/a: Some BIOS wrap stolen in the root | |
159 | * PCI bus, but have an off-by-one error. Hence retry the | |
160 | * reservation starting from 1 instead of 0. | |
161 | */ | |
162 | r = devm_request_mem_region(dev->dev, base + 1, | |
163 | dev_priv->gtt.stolen_size - 1, | |
164 | "Graphics Stolen Memory"); | |
0b6d24c0 DV |
165 | /* |
166 | * GEN3 firmware likes to smash pci bridges into the stolen | |
167 | * range. Apparently this works. | |
168 | */ | |
169 | if (r == NULL && !IS_GEN3(dev)) { | |
3617dc96 AG |
170 | DRM_ERROR("conflict detected with stolen region: [0x%08x - 0x%08x]\n", |
171 | base, base + (uint32_t)dev_priv->gtt.stolen_size); | |
172 | base = 0; | |
173 | } | |
eaba1b8f CW |
174 | } |
175 | ||
e12a2d53 | 176 | return base; |
9797fbfb CW |
177 | } |
178 | ||
9797fbfb CW |
179 | void i915_gem_cleanup_stolen(struct drm_device *dev) |
180 | { | |
4d7bb011 DV |
181 | struct drm_i915_private *dev_priv = dev->dev_private; |
182 | ||
446f8d81 DV |
183 | if (!drm_mm_initialized(&dev_priv->mm.stolen)) |
184 | return; | |
185 | ||
4d7bb011 | 186 | drm_mm_takedown(&dev_priv->mm.stolen); |
9797fbfb CW |
187 | } |
188 | ||
189 | int i915_gem_init_stolen(struct drm_device *dev) | |
190 | { | |
191 | struct drm_i915_private *dev_priv = dev->dev_private; | |
40bae736 | 192 | u32 tmp; |
c9cddffc | 193 | int bios_reserved = 0; |
9797fbfb | 194 | |
92e97d2f PZ |
195 | mutex_init(&dev_priv->mm.stolen_lock); |
196 | ||
0f4706d2 | 197 | #ifdef CONFIG_INTEL_IOMMU |
fcc9fe1a | 198 | if (intel_iommu_gfx_mapped && INTEL_INFO(dev)->gen < 8) { |
0f4706d2 CW |
199 | DRM_INFO("DMAR active, disabling use of stolen memory\n"); |
200 | return 0; | |
201 | } | |
202 | #endif | |
203 | ||
6644a4e9 CW |
204 | if (dev_priv->gtt.stolen_size == 0) |
205 | return 0; | |
206 | ||
e12a2d53 CW |
207 | dev_priv->mm.stolen_base = i915_stolen_to_physical(dev); |
208 | if (dev_priv->mm.stolen_base == 0) | |
209 | return 0; | |
210 | ||
a54c0c27 BW |
211 | DRM_DEBUG_KMS("found %zd bytes of stolen memory at %08lx\n", |
212 | dev_priv->gtt.stolen_size, dev_priv->mm.stolen_base); | |
e12a2d53 | 213 | |
40bae736 DV |
214 | if (INTEL_INFO(dev)->gen >= 8) { |
215 | tmp = I915_READ(GEN7_BIOS_RESERVED); | |
216 | tmp >>= GEN8_BIOS_RESERVED_SHIFT; | |
217 | tmp &= GEN8_BIOS_RESERVED_MASK; | |
218 | bios_reserved = (1024*1024) << tmp; | |
219 | } else if (IS_GEN7(dev)) { | |
220 | tmp = I915_READ(GEN7_BIOS_RESERVED); | |
221 | bios_reserved = tmp & GEN7_BIOS_RESERVED_256K ? | |
222 | 256*1024 : 1024*1024; | |
223 | } | |
c9cddffc | 224 | |
897f9ed0 DV |
225 | if (WARN_ON(bios_reserved > dev_priv->gtt.stolen_size)) |
226 | return 0; | |
227 | ||
9797fbfb | 228 | /* Basic memrange allocator for stolen space */ |
c9cddffc JB |
229 | drm_mm_init(&dev_priv->mm.stolen, 0, dev_priv->gtt.stolen_size - |
230 | bios_reserved); | |
9797fbfb CW |
231 | |
232 | return 0; | |
233 | } | |
0104fdbb CW |
234 | |
235 | static struct sg_table * | |
236 | i915_pages_create_for_stolen(struct drm_device *dev, | |
237 | u32 offset, u32 size) | |
238 | { | |
239 | struct drm_i915_private *dev_priv = dev->dev_private; | |
240 | struct sg_table *st; | |
241 | struct scatterlist *sg; | |
242 | ||
243 | DRM_DEBUG_DRIVER("offset=0x%x, size=%d\n", offset, size); | |
a54c0c27 | 244 | BUG_ON(offset > dev_priv->gtt.stolen_size - size); |
0104fdbb CW |
245 | |
246 | /* We hide that we have no struct page backing our stolen object | |
247 | * by wrapping the contiguous physical allocation with a fake | |
248 | * dma mapping in a single scatterlist. | |
249 | */ | |
250 | ||
251 | st = kmalloc(sizeof(*st), GFP_KERNEL); | |
252 | if (st == NULL) | |
253 | return NULL; | |
254 | ||
255 | if (sg_alloc_table(st, 1, GFP_KERNEL)) { | |
256 | kfree(st); | |
257 | return NULL; | |
258 | } | |
259 | ||
260 | sg = st->sgl; | |
ec14ba47 | 261 | sg->offset = 0; |
ed23abdd | 262 | sg->length = size; |
0104fdbb CW |
263 | |
264 | sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset; | |
265 | sg_dma_len(sg) = size; | |
266 | ||
267 | return st; | |
268 | } | |
269 | ||
270 | static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj) | |
271 | { | |
272 | BUG(); | |
273 | return -EINVAL; | |
274 | } | |
275 | ||
276 | static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj) | |
277 | { | |
278 | /* Should only be called during free */ | |
279 | sg_free_table(obj->pages); | |
280 | kfree(obj->pages); | |
281 | } | |
282 | ||
ef0cf27c CW |
283 | |
284 | static void | |
285 | i915_gem_object_release_stolen(struct drm_i915_gem_object *obj) | |
286 | { | |
d713fd49 PZ |
287 | struct drm_i915_private *dev_priv = obj->base.dev->dev_private; |
288 | ||
ef0cf27c | 289 | if (obj->stolen) { |
d713fd49 | 290 | i915_gem_stolen_remove_node(dev_priv, obj->stolen); |
ef0cf27c CW |
291 | kfree(obj->stolen); |
292 | obj->stolen = NULL; | |
293 | } | |
294 | } | |
0104fdbb CW |
295 | static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = { |
296 | .get_pages = i915_gem_object_get_pages_stolen, | |
297 | .put_pages = i915_gem_object_put_pages_stolen, | |
ef0cf27c | 298 | .release = i915_gem_object_release_stolen, |
0104fdbb CW |
299 | }; |
300 | ||
301 | static struct drm_i915_gem_object * | |
302 | _i915_gem_object_create_stolen(struct drm_device *dev, | |
303 | struct drm_mm_node *stolen) | |
304 | { | |
305 | struct drm_i915_gem_object *obj; | |
306 | ||
42dcedd4 | 307 | obj = i915_gem_object_alloc(dev); |
0104fdbb CW |
308 | if (obj == NULL) |
309 | return NULL; | |
310 | ||
89c8233f | 311 | drm_gem_private_object_init(dev, &obj->base, stolen->size); |
0104fdbb CW |
312 | i915_gem_object_init(obj, &i915_gem_object_stolen_ops); |
313 | ||
314 | obj->pages = i915_pages_create_for_stolen(dev, | |
315 | stolen->start, stolen->size); | |
316 | if (obj->pages == NULL) | |
317 | goto cleanup; | |
318 | ||
319 | obj->has_dma_mapping = true; | |
dd53e1b0 | 320 | i915_gem_object_pin_pages(obj); |
0104fdbb CW |
321 | obj->stolen = stolen; |
322 | ||
d46f1c3f CW |
323 | obj->base.read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT; |
324 | obj->cache_level = HAS_LLC(dev) ? I915_CACHE_LLC : I915_CACHE_NONE; | |
0104fdbb CW |
325 | |
326 | return obj; | |
327 | ||
328 | cleanup: | |
42dcedd4 | 329 | i915_gem_object_free(obj); |
0104fdbb CW |
330 | return NULL; |
331 | } | |
332 | ||
333 | struct drm_i915_gem_object * | |
334 | i915_gem_object_create_stolen(struct drm_device *dev, u32 size) | |
335 | { | |
336 | struct drm_i915_private *dev_priv = dev->dev_private; | |
337 | struct drm_i915_gem_object *obj; | |
338 | struct drm_mm_node *stolen; | |
06e78edf | 339 | int ret; |
0104fdbb | 340 | |
446f8d81 | 341 | if (!drm_mm_initialized(&dev_priv->mm.stolen)) |
0104fdbb CW |
342 | return NULL; |
343 | ||
344 | DRM_DEBUG_KMS("creating stolen object: size=%x\n", size); | |
345 | if (size == 0) | |
346 | return NULL; | |
347 | ||
06e78edf DH |
348 | stolen = kzalloc(sizeof(*stolen), GFP_KERNEL); |
349 | if (!stolen) | |
0104fdbb CW |
350 | return NULL; |
351 | ||
d713fd49 | 352 | ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096); |
06e78edf DH |
353 | if (ret) { |
354 | kfree(stolen); | |
355 | return NULL; | |
356 | } | |
357 | ||
0104fdbb CW |
358 | obj = _i915_gem_object_create_stolen(dev, stolen); |
359 | if (obj) | |
360 | return obj; | |
361 | ||
d713fd49 | 362 | i915_gem_stolen_remove_node(dev_priv, stolen); |
06e78edf | 363 | kfree(stolen); |
0104fdbb CW |
364 | return NULL; |
365 | } | |
366 | ||
866d12b4 CW |
367 | struct drm_i915_gem_object * |
368 | i915_gem_object_create_stolen_for_preallocated(struct drm_device *dev, | |
369 | u32 stolen_offset, | |
370 | u32 gtt_offset, | |
371 | u32 size) | |
372 | { | |
373 | struct drm_i915_private *dev_priv = dev->dev_private; | |
40d74980 | 374 | struct i915_address_space *ggtt = &dev_priv->gtt.base; |
866d12b4 CW |
375 | struct drm_i915_gem_object *obj; |
376 | struct drm_mm_node *stolen; | |
2f633156 | 377 | struct i915_vma *vma; |
b3a070cc | 378 | int ret; |
866d12b4 | 379 | |
446f8d81 | 380 | if (!drm_mm_initialized(&dev_priv->mm.stolen)) |
866d12b4 CW |
381 | return NULL; |
382 | ||
383 | DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n", | |
384 | stolen_offset, gtt_offset, size); | |
385 | ||
386 | /* KISS and expect everything to be page-aligned */ | |
f37b5c2b DV |
387 | if (WARN_ON(size == 0) || WARN_ON(size & 4095) || |
388 | WARN_ON(stolen_offset & 4095)) | |
866d12b4 CW |
389 | return NULL; |
390 | ||
b3a070cc BW |
391 | stolen = kzalloc(sizeof(*stolen), GFP_KERNEL); |
392 | if (!stolen) | |
393 | return NULL; | |
394 | ||
338710e7 BW |
395 | stolen->start = stolen_offset; |
396 | stolen->size = size; | |
92e97d2f | 397 | mutex_lock(&dev_priv->mm.stolen_lock); |
338710e7 | 398 | ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen); |
92e97d2f | 399 | mutex_unlock(&dev_priv->mm.stolen_lock); |
b3a070cc | 400 | if (ret) { |
866d12b4 | 401 | DRM_DEBUG_KMS("failed to allocate stolen space\n"); |
b3a070cc | 402 | kfree(stolen); |
866d12b4 CW |
403 | return NULL; |
404 | } | |
405 | ||
406 | obj = _i915_gem_object_create_stolen(dev, stolen); | |
407 | if (obj == NULL) { | |
408 | DRM_DEBUG_KMS("failed to allocate stolen object\n"); | |
d713fd49 | 409 | i915_gem_stolen_remove_node(dev_priv, stolen); |
06e78edf | 410 | kfree(stolen); |
866d12b4 CW |
411 | return NULL; |
412 | } | |
413 | ||
3727d55e | 414 | /* Some objects just need physical mem from stolen space */ |
190d6cd5 | 415 | if (gtt_offset == I915_GTT_OFFSET_NONE) |
3727d55e JB |
416 | return obj; |
417 | ||
e656a6cb | 418 | vma = i915_gem_obj_lookup_or_create_vma(obj, ggtt); |
db473b36 DC |
419 | if (IS_ERR(vma)) { |
420 | ret = PTR_ERR(vma); | |
2f633156 BW |
421 | goto err_out; |
422 | } | |
423 | ||
866d12b4 CW |
424 | /* To simplify the initialisation sequence between KMS and GTT, |
425 | * we allow construction of the stolen object prior to | |
426 | * setting up the GTT space. The actual reservation will occur | |
427 | * later. | |
428 | */ | |
2f633156 BW |
429 | vma->node.start = gtt_offset; |
430 | vma->node.size = size; | |
40d74980 BW |
431 | if (drm_mm_initialized(&ggtt->mm)) { |
432 | ret = drm_mm_reserve_node(&ggtt->mm, &vma->node); | |
b3a070cc | 433 | if (ret) { |
866d12b4 | 434 | DRM_DEBUG_KMS("failed to allocate stolen GTT space\n"); |
4a025e26 | 435 | goto err_vma; |
866d12b4 | 436 | } |
edd41a87 | 437 | } |
866d12b4 | 438 | |
aff43766 | 439 | vma->bound |= GLOBAL_BIND; |
866d12b4 | 440 | |
35c20a60 | 441 | list_add_tail(&obj->global_list, &dev_priv->mm.bound_list); |
ca191b13 | 442 | list_add_tail(&vma->mm_list, &ggtt->inactive_list); |
d8ccba86 | 443 | i915_gem_object_pin_pages(obj); |
866d12b4 CW |
444 | |
445 | return obj; | |
b3a070cc | 446 | |
4a025e26 DV |
447 | err_vma: |
448 | i915_gem_vma_destroy(vma); | |
f7f18184 | 449 | err_out: |
d713fd49 | 450 | i915_gem_stolen_remove_node(dev_priv, stolen); |
32c913e4 | 451 | kfree(stolen); |
b3a070cc BW |
452 | drm_gem_object_unreference(&obj->base); |
453 | return NULL; | |
866d12b4 | 454 | } |