Merge remote-tracking branch 'airlied/drm-next' into drm-intel-next-queued
[deliverable/linux.git] / drivers / gpu / drm / i915 / i915_gem_stolen.c
CommitLineData
9797fbfb
CW
1/*
2 * Copyright © 2008-2012 Intel Corporation
3 *
4 * Permission is hereby granted, free of charge, to any person obtaining a
5 * copy of this software and associated documentation files (the "Software"),
6 * to deal in the Software without restriction, including without limitation
7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8 * and/or sell copies of the Software, and to permit persons to whom the
9 * Software is furnished to do so, subject to the following conditions:
10 *
11 * The above copyright notice and this permission notice (including the next
12 * paragraph) shall be included in all copies or substantial portions of the
13 * Software.
14 *
15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
18 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
20 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
21 * IN THE SOFTWARE.
22 *
23 * Authors:
24 * Eric Anholt <eric@anholt.net>
25 * Chris Wilson <chris@chris-wilson.co.uk>
26 *
27 */
28
760285e7
DH
29#include <drm/drmP.h>
30#include <drm/i915_drm.h>
9797fbfb
CW
31#include "i915_drv.h"
32
0ad98c74
VS
33#define KB(x) ((x) * 1024)
34#define MB(x) (KB(x) * 1024)
35
9797fbfb
CW
36/*
37 * The BIOS typically reserves some of the system's memory for the exclusive
38 * use of the integrated graphics. This memory is no longer available for
39 * use by the OS and so the user finds that his system has less memory
40 * available than he put in. We refer to this memory as stolen.
41 *
42 * The BIOS will allocate its framebuffer from the stolen memory. Our
43 * goal is try to reuse that object for our own fbcon which must always
44 * be available for panics. Anything else we can reuse the stolen memory
45 * for is a boon.
46 */
47
a9da512b
PZ
48int i915_gem_stolen_insert_node_in_range(struct drm_i915_private *dev_priv,
49 struct drm_mm_node *node, u64 size,
50 unsigned alignment, u64 start, u64 end)
d713fd49 51{
92e97d2f
PZ
52 int ret;
53
d713fd49
PZ
54 if (!drm_mm_initialized(&dev_priv->mm.stolen))
55 return -ENODEV;
56
1ca36d4c
PZ
57 /* See the comment at the drm_mm_init() call for more about this check.
58 * WaSkipStolenMemoryFirstPage:bdw,chv (incomplete) */
7e22dbbb 59 if (IS_GEN8(dev_priv) && start < 4096)
1ca36d4c
PZ
60 start = 4096;
61
92e97d2f 62 mutex_lock(&dev_priv->mm.stolen_lock);
a9da512b
PZ
63 ret = drm_mm_insert_node_in_range(&dev_priv->mm.stolen, node, size,
64 alignment, start, end,
65 DRM_MM_SEARCH_DEFAULT);
92e97d2f
PZ
66 mutex_unlock(&dev_priv->mm.stolen_lock);
67
68 return ret;
d713fd49
PZ
69}
70
a9da512b
PZ
71int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv,
72 struct drm_mm_node *node, u64 size,
73 unsigned alignment)
74{
72e96d64
JL
75 struct i915_ggtt *ggtt = &dev_priv->ggtt;
76
a9da512b 77 return i915_gem_stolen_insert_node_in_range(dev_priv, node, size,
72e96d64
JL
78 alignment, 0,
79 ggtt->stolen_usable_size);
a9da512b
PZ
80}
81
d713fd49
PZ
82void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv,
83 struct drm_mm_node *node)
84{
92e97d2f 85 mutex_lock(&dev_priv->mm.stolen_lock);
d713fd49 86 drm_mm_remove_node(node);
92e97d2f 87 mutex_unlock(&dev_priv->mm.stolen_lock);
d713fd49
PZ
88}
89
e12a2d53 90static unsigned long i915_stolen_to_physical(struct drm_device *dev)
9797fbfb 91{
72e96d64
JL
92 struct drm_i915_private *dev_priv = to_i915(dev);
93 struct i915_ggtt *ggtt = &dev_priv->ggtt;
eaba1b8f 94 struct resource *r;
9797fbfb
CW
95 u32 base;
96
17fec8a0 97 /* Almost universally we can find the Graphics Base of Stolen Memory
e10fa551
JL
98 * at register BSM (0x5c) in the igfx configuration space. On a few
99 * (desktop) machines this is also mirrored in the bridge device at
100 * different locations, or in the MCHBAR.
0ad98c74
VS
101 *
102 * On 865 we just check the TOUD register.
103 *
104 * On 830/845/85x the stolen memory base isn't available in any
105 * register. We need to calculate it as TOM-TSEG_SIZE-stolen_size.
e12a2d53 106 *
9797fbfb 107 */
e12a2d53 108 base = 0;
17fec8a0 109 if (INTEL_INFO(dev)->gen >= 3) {
e10fa551
JL
110 u32 bsm;
111
c0dd3460 112 pci_read_config_dword(dev->pdev, INTEL_BSM, &bsm);
e10fa551 113
c0dd3460 114 base = bsm & INTEL_BSM_MASK;
0ad98c74
VS
115 } else if (IS_I865G(dev)) {
116 u16 toud = 0;
117
118 /*
119 * FIXME is the graphics stolen memory region
120 * always at TOUD? Ie. is it always the last
121 * one to be allocated by the BIOS?
122 */
123 pci_bus_read_config_word(dev->pdev->bus, PCI_DEVFN(0, 0),
124 I865_TOUD, &toud);
125
126 base = toud << 16;
127 } else if (IS_I85X(dev)) {
128 u32 tseg_size = 0;
129 u32 tom;
130 u8 tmp;
131
132 pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
133 I85X_ESMRAMC, &tmp);
134
135 if (tmp & TSEG_ENABLE)
136 tseg_size = MB(1);
137
138 pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 1),
139 I85X_DRB3, &tmp);
140 tom = tmp * MB(32);
141
72e96d64 142 base = tom - tseg_size - ggtt->stolen_size;
0ad98c74
VS
143 } else if (IS_845G(dev)) {
144 u32 tseg_size = 0;
145 u32 tom;
146 u8 tmp;
147
148 pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
149 I845_ESMRAMC, &tmp);
150
151 if (tmp & TSEG_ENABLE) {
152 switch (tmp & I845_TSEG_SIZE_MASK) {
153 case I845_TSEG_SIZE_512K:
154 tseg_size = KB(512);
155 break;
156 case I845_TSEG_SIZE_1M:
157 tseg_size = MB(1);
158 break;
159 }
160 }
161
162 pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
163 I830_DRB3, &tmp);
164 tom = tmp * MB(32);
165
72e96d64 166 base = tom - tseg_size - ggtt->stolen_size;
0ad98c74
VS
167 } else if (IS_I830(dev)) {
168 u32 tseg_size = 0;
169 u32 tom;
170 u8 tmp;
171
172 pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
173 I830_ESMRAMC, &tmp);
174
175 if (tmp & TSEG_ENABLE) {
176 if (tmp & I830_TSEG_SIZE_1M)
177 tseg_size = MB(1);
178 else
179 tseg_size = KB(512);
180 }
181
182 pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
183 I830_DRB3, &tmp);
184 tom = tmp * MB(32);
185
72e96d64 186 base = tom - tseg_size - ggtt->stolen_size;
e12a2d53 187 }
9797fbfb 188
eaba1b8f
CW
189 if (base == 0)
190 return 0;
191
f1e1c212
VS
192 /* make sure we don't clobber the GTT if it's within stolen memory */
193 if (INTEL_INFO(dev)->gen <= 4 && !IS_G33(dev) && !IS_G4X(dev)) {
194 struct {
195 u32 start, end;
196 } stolen[2] = {
72e96d64
JL
197 { .start = base, .end = base + ggtt->stolen_size, },
198 { .start = base, .end = base + ggtt->stolen_size, },
f1e1c212 199 };
72e96d64 200 u64 ggtt_start, ggtt_end;
f1e1c212 201
72e96d64 202 ggtt_start = I915_READ(PGTBL_CTL);
f1e1c212 203 if (IS_GEN4(dev))
72e96d64
JL
204 ggtt_start = (ggtt_start & PGTBL_ADDRESS_LO_MASK) |
205 (ggtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
f1e1c212 206 else
72e96d64
JL
207 ggtt_start &= PGTBL_ADDRESS_LO_MASK;
208 ggtt_end = ggtt_start + ggtt_total_entries(ggtt) * 4;
f1e1c212 209
72e96d64
JL
210 if (ggtt_start >= stolen[0].start && ggtt_start < stolen[0].end)
211 stolen[0].end = ggtt_start;
212 if (ggtt_end > stolen[1].start && ggtt_end <= stolen[1].end)
213 stolen[1].start = ggtt_end;
f1e1c212
VS
214
215 /* pick the larger of the two chunks */
216 if (stolen[0].end - stolen[0].start >
217 stolen[1].end - stolen[1].start) {
218 base = stolen[0].start;
72e96d64 219 ggtt->stolen_size = stolen[0].end - stolen[0].start;
f1e1c212
VS
220 } else {
221 base = stolen[1].start;
72e96d64 222 ggtt->stolen_size = stolen[1].end - stolen[1].start;
f1e1c212
VS
223 }
224
225 if (stolen[0].start != stolen[1].start ||
226 stolen[0].end != stolen[1].end) {
227 DRM_DEBUG_KMS("GTT within stolen memory at 0x%llx-0x%llx\n",
72e96d64
JL
228 (unsigned long long)ggtt_start,
229 (unsigned long long)ggtt_end - 1);
f1e1c212 230 DRM_DEBUG_KMS("Stolen memory adjusted to 0x%x-0x%x\n",
72e96d64 231 base, base + (u32)ggtt->stolen_size - 1);
f1e1c212
VS
232 }
233 }
234
235
eaba1b8f
CW
236 /* Verify that nothing else uses this physical address. Stolen
237 * memory should be reserved by the BIOS and hidden from the
238 * kernel. So if the region is already marked as busy, something
239 * is seriously wrong.
240 */
72e96d64 241 r = devm_request_mem_region(dev->dev, base, ggtt->stolen_size,
eaba1b8f
CW
242 "Graphics Stolen Memory");
243 if (r == NULL) {
3617dc96
AG
244 /*
245 * One more attempt but this time requesting region from
246 * base + 1, as we have seen that this resolves the region
247 * conflict with the PCI Bus.
248 * This is a BIOS w/a: Some BIOS wrap stolen in the root
249 * PCI bus, but have an off-by-one error. Hence retry the
250 * reservation starting from 1 instead of 0.
251 */
252 r = devm_request_mem_region(dev->dev, base + 1,
72e96d64 253 ggtt->stolen_size - 1,
3617dc96 254 "Graphics Stolen Memory");
0b6d24c0
DV
255 /*
256 * GEN3 firmware likes to smash pci bridges into the stolen
257 * range. Apparently this works.
258 */
259 if (r == NULL && !IS_GEN3(dev)) {
3617dc96 260 DRM_ERROR("conflict detected with stolen region: [0x%08x - 0x%08x]\n",
72e96d64 261 base, base + (uint32_t)ggtt->stolen_size);
3617dc96
AG
262 base = 0;
263 }
eaba1b8f
CW
264 }
265
e12a2d53 266 return base;
9797fbfb
CW
267}
268
9797fbfb
CW
269void i915_gem_cleanup_stolen(struct drm_device *dev)
270{
4d7bb011
DV
271 struct drm_i915_private *dev_priv = dev->dev_private;
272
446f8d81
DV
273 if (!drm_mm_initialized(&dev_priv->mm.stolen))
274 return;
275
4d7bb011 276 drm_mm_takedown(&dev_priv->mm.stolen);
9797fbfb
CW
277}
278
7d316aec
VS
279static void g4x_get_stolen_reserved(struct drm_i915_private *dev_priv,
280 unsigned long *base, unsigned long *size)
281{
72e96d64 282 struct i915_ggtt *ggtt = &dev_priv->ggtt;
7d316aec
VS
283 uint32_t reg_val = I915_READ(IS_GM45(dev_priv) ?
284 CTG_STOLEN_RESERVED :
285 ELK_STOLEN_RESERVED);
286 unsigned long stolen_top = dev_priv->mm.stolen_base +
72e96d64 287 ggtt->stolen_size;
7d316aec
VS
288
289 *base = (reg_val & G4X_STOLEN_RESERVED_ADDR2_MASK) << 16;
290
291 WARN_ON((reg_val & G4X_STOLEN_RESERVED_ADDR1_MASK) < *base);
292
293 /* On these platforms, the register doesn't have a size field, so the
294 * size is the distance between the base and the top of the stolen
295 * memory. We also have the genuine case where base is zero and there's
296 * nothing reserved. */
297 if (*base == 0)
298 *size = 0;
299 else
300 *size = stolen_top - *base;
301}
302
3774eb50
PZ
303static void gen6_get_stolen_reserved(struct drm_i915_private *dev_priv,
304 unsigned long *base, unsigned long *size)
305{
306 uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
307
308 *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
309
310 switch (reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK) {
311 case GEN6_STOLEN_RESERVED_1M:
312 *size = 1024 * 1024;
313 break;
314 case GEN6_STOLEN_RESERVED_512K:
315 *size = 512 * 1024;
316 break;
317 case GEN6_STOLEN_RESERVED_256K:
318 *size = 256 * 1024;
319 break;
320 case GEN6_STOLEN_RESERVED_128K:
321 *size = 128 * 1024;
322 break;
323 default:
324 *size = 1024 * 1024;
325 MISSING_CASE(reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK);
326 }
327}
328
329static void gen7_get_stolen_reserved(struct drm_i915_private *dev_priv,
330 unsigned long *base, unsigned long *size)
331{
332 uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
333
334 *base = reg_val & GEN7_STOLEN_RESERVED_ADDR_MASK;
335
336 switch (reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK) {
337 case GEN7_STOLEN_RESERVED_1M:
338 *size = 1024 * 1024;
339 break;
340 case GEN7_STOLEN_RESERVED_256K:
341 *size = 256 * 1024;
342 break;
343 default:
344 *size = 1024 * 1024;
345 MISSING_CASE(reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK);
346 }
347}
348
349static void gen8_get_stolen_reserved(struct drm_i915_private *dev_priv,
350 unsigned long *base, unsigned long *size)
351{
352 uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
353
354 *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
355
356 switch (reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK) {
357 case GEN8_STOLEN_RESERVED_1M:
358 *size = 1024 * 1024;
359 break;
360 case GEN8_STOLEN_RESERVED_2M:
361 *size = 2 * 1024 * 1024;
362 break;
363 case GEN8_STOLEN_RESERVED_4M:
364 *size = 4 * 1024 * 1024;
365 break;
366 case GEN8_STOLEN_RESERVED_8M:
367 *size = 8 * 1024 * 1024;
368 break;
369 default:
370 *size = 8 * 1024 * 1024;
371 MISSING_CASE(reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK);
372 }
373}
374
375static void bdw_get_stolen_reserved(struct drm_i915_private *dev_priv,
376 unsigned long *base, unsigned long *size)
377{
72e96d64 378 struct i915_ggtt *ggtt = &dev_priv->ggtt;
3774eb50
PZ
379 uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
380 unsigned long stolen_top;
381
72e96d64 382 stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
3774eb50
PZ
383
384 *base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
385
386 /* On these platforms, the register doesn't have a size field, so the
387 * size is the distance between the base and the top of the stolen
388 * memory. We also have the genuine case where base is zero and there's
389 * nothing reserved. */
390 if (*base == 0)
391 *size = 0;
392 else
393 *size = stolen_top - *base;
394}
395
9797fbfb
CW
396int i915_gem_init_stolen(struct drm_device *dev)
397{
72e96d64
JL
398 struct drm_i915_private *dev_priv = to_i915(dev);
399 struct i915_ggtt *ggtt = &dev_priv->ggtt;
d7884d69 400 unsigned long reserved_total, reserved_base = 0, reserved_size;
3774eb50 401 unsigned long stolen_top;
9797fbfb 402
92e97d2f
PZ
403 mutex_init(&dev_priv->mm.stolen_lock);
404
0f4706d2 405#ifdef CONFIG_INTEL_IOMMU
fcc9fe1a 406 if (intel_iommu_gfx_mapped && INTEL_INFO(dev)->gen < 8) {
0f4706d2
CW
407 DRM_INFO("DMAR active, disabling use of stolen memory\n");
408 return 0;
409 }
410#endif
411
72e96d64 412 if (ggtt->stolen_size == 0)
6644a4e9
CW
413 return 0;
414
e12a2d53
CW
415 dev_priv->mm.stolen_base = i915_stolen_to_physical(dev);
416 if (dev_priv->mm.stolen_base == 0)
417 return 0;
418
72e96d64 419 stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
3774eb50
PZ
420
421 switch (INTEL_INFO(dev_priv)->gen) {
422 case 2:
423 case 3:
7d316aec 424 break;
3774eb50 425 case 4:
7d316aec
VS
426 if (IS_G4X(dev))
427 g4x_get_stolen_reserved(dev_priv, &reserved_base,
428 &reserved_size);
429 break;
3774eb50
PZ
430 case 5:
431 /* Assume the gen6 maximum for the older platforms. */
432 reserved_size = 1024 * 1024;
433 reserved_base = stolen_top - reserved_size;
434 break;
435 case 6:
436 gen6_get_stolen_reserved(dev_priv, &reserved_base,
437 &reserved_size);
438 break;
439 case 7:
440 gen7_get_stolen_reserved(dev_priv, &reserved_base,
441 &reserved_size);
442 break;
443 default:
ef11bdb3
RV
444 if (IS_BROADWELL(dev_priv) ||
445 IS_SKYLAKE(dev_priv) || IS_KABYLAKE(dev))
3774eb50
PZ
446 bdw_get_stolen_reserved(dev_priv, &reserved_base,
447 &reserved_size);
448 else
449 gen8_get_stolen_reserved(dev_priv, &reserved_base,
450 &reserved_size);
451 break;
452 }
453
454 /* It is possible for the reserved base to be zero, but the register
455 * field for size doesn't have a zero option. */
456 if (reserved_base == 0) {
457 reserved_size = 0;
458 reserved_base = stolen_top;
40bae736 459 }
c9cddffc 460
3774eb50
PZ
461 if (reserved_base < dev_priv->mm.stolen_base ||
462 reserved_base + reserved_size > stolen_top) {
463 DRM_DEBUG_KMS("Stolen reserved area [0x%08lx - 0x%08lx] outside stolen memory [0x%08lx - 0x%08lx]\n",
464 reserved_base, reserved_base + reserved_size,
465 dev_priv->mm.stolen_base, stolen_top);
897f9ed0 466 return 0;
3774eb50
PZ
467 }
468
72e96d64
JL
469 ggtt->stolen_reserved_base = reserved_base;
470 ggtt->stolen_reserved_size = reserved_size;
274008e8 471
3774eb50
PZ
472 /* It is possible for the reserved area to end before the end of stolen
473 * memory, so just consider the start. */
474 reserved_total = stolen_top - reserved_base;
475
8e9d597a 476 DRM_DEBUG_KMS("Memory reserved for graphics device: %zuK, usable: %luK\n",
72e96d64
JL
477 ggtt->stolen_size >> 10,
478 (ggtt->stolen_size - reserved_total) >> 10);
897f9ed0 479
72e96d64 480 ggtt->stolen_usable_size = ggtt->stolen_size - reserved_total;
a9da512b 481
1ca36d4c
PZ
482 /*
483 * Basic memrange allocator for stolen space.
484 *
485 * TODO: Notice that some platforms require us to not use the first page
486 * of the stolen memory but their BIOSes may still put the framebuffer
487 * on the first page. So we don't reserve this page for now because of
488 * that. Our current solution is to just prevent new nodes from being
489 * inserted on the first page - see the check we have at
490 * i915_gem_stolen_insert_node_in_range(). We may want to fix the fbcon
491 * problem later.
492 */
72e96d64 493 drm_mm_init(&dev_priv->mm.stolen, 0, ggtt->stolen_usable_size);
9797fbfb
CW
494
495 return 0;
496}
0104fdbb
CW
497
498static struct sg_table *
499i915_pages_create_for_stolen(struct drm_device *dev,
500 u32 offset, u32 size)
501{
72e96d64
JL
502 struct drm_i915_private *dev_priv = to_i915(dev);
503 struct i915_ggtt *ggtt = &dev_priv->ggtt;
0104fdbb
CW
504 struct sg_table *st;
505 struct scatterlist *sg;
506
507 DRM_DEBUG_DRIVER("offset=0x%x, size=%d\n", offset, size);
72e96d64 508 BUG_ON(offset > ggtt->stolen_size - size);
0104fdbb
CW
509
510 /* We hide that we have no struct page backing our stolen object
511 * by wrapping the contiguous physical allocation with a fake
512 * dma mapping in a single scatterlist.
513 */
514
515 st = kmalloc(sizeof(*st), GFP_KERNEL);
516 if (st == NULL)
517 return NULL;
518
519 if (sg_alloc_table(st, 1, GFP_KERNEL)) {
520 kfree(st);
521 return NULL;
522 }
523
524 sg = st->sgl;
ec14ba47 525 sg->offset = 0;
ed23abdd 526 sg->length = size;
0104fdbb
CW
527
528 sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset;
529 sg_dma_len(sg) = size;
530
531 return st;
532}
533
534static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
535{
536 BUG();
537 return -EINVAL;
538}
539
540static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj)
541{
542 /* Should only be called during free */
543 sg_free_table(obj->pages);
544 kfree(obj->pages);
545}
546
ef0cf27c
CW
547
548static void
549i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
550{
d713fd49
PZ
551 struct drm_i915_private *dev_priv = obj->base.dev->dev_private;
552
ef0cf27c 553 if (obj->stolen) {
d713fd49 554 i915_gem_stolen_remove_node(dev_priv, obj->stolen);
ef0cf27c
CW
555 kfree(obj->stolen);
556 obj->stolen = NULL;
557 }
558}
0104fdbb
CW
559static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
560 .get_pages = i915_gem_object_get_pages_stolen,
561 .put_pages = i915_gem_object_put_pages_stolen,
ef0cf27c 562 .release = i915_gem_object_release_stolen,
0104fdbb
CW
563};
564
565static struct drm_i915_gem_object *
566_i915_gem_object_create_stolen(struct drm_device *dev,
567 struct drm_mm_node *stolen)
568{
569 struct drm_i915_gem_object *obj;
570
42dcedd4 571 obj = i915_gem_object_alloc(dev);
0104fdbb
CW
572 if (obj == NULL)
573 return NULL;
574
89c8233f 575 drm_gem_private_object_init(dev, &obj->base, stolen->size);
0104fdbb
CW
576 i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
577
578 obj->pages = i915_pages_create_for_stolen(dev,
579 stolen->start, stolen->size);
580 if (obj->pages == NULL)
581 goto cleanup;
582
c5236470
AS
583 obj->get_page.sg = obj->pages->sgl;
584 obj->get_page.last = 0;
585
dd53e1b0 586 i915_gem_object_pin_pages(obj);
0104fdbb
CW
587 obj->stolen = stolen;
588
d46f1c3f
CW
589 obj->base.read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
590 obj->cache_level = HAS_LLC(dev) ? I915_CACHE_LLC : I915_CACHE_NONE;
0104fdbb
CW
591
592 return obj;
593
594cleanup:
42dcedd4 595 i915_gem_object_free(obj);
0104fdbb
CW
596 return NULL;
597}
598
599struct drm_i915_gem_object *
600i915_gem_object_create_stolen(struct drm_device *dev, u32 size)
601{
602 struct drm_i915_private *dev_priv = dev->dev_private;
603 struct drm_i915_gem_object *obj;
604 struct drm_mm_node *stolen;
06e78edf 605 int ret;
0104fdbb 606
446f8d81 607 if (!drm_mm_initialized(&dev_priv->mm.stolen))
0104fdbb
CW
608 return NULL;
609
610 DRM_DEBUG_KMS("creating stolen object: size=%x\n", size);
611 if (size == 0)
612 return NULL;
613
06e78edf
DH
614 stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
615 if (!stolen)
0104fdbb
CW
616 return NULL;
617
d713fd49 618 ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096);
06e78edf
DH
619 if (ret) {
620 kfree(stolen);
621 return NULL;
622 }
623
0104fdbb
CW
624 obj = _i915_gem_object_create_stolen(dev, stolen);
625 if (obj)
626 return obj;
627
d713fd49 628 i915_gem_stolen_remove_node(dev_priv, stolen);
06e78edf 629 kfree(stolen);
0104fdbb
CW
630 return NULL;
631}
632
866d12b4
CW
633struct drm_i915_gem_object *
634i915_gem_object_create_stolen_for_preallocated(struct drm_device *dev,
635 u32 stolen_offset,
636 u32 gtt_offset,
637 u32 size)
638{
72e96d64
JL
639 struct drm_i915_private *dev_priv = to_i915(dev);
640 struct i915_ggtt *ggtt = &dev_priv->ggtt;
866d12b4
CW
641 struct drm_i915_gem_object *obj;
642 struct drm_mm_node *stolen;
2f633156 643 struct i915_vma *vma;
b3a070cc 644 int ret;
866d12b4 645
446f8d81 646 if (!drm_mm_initialized(&dev_priv->mm.stolen))
866d12b4
CW
647 return NULL;
648
12c83d99
TU
649 lockdep_assert_held(&dev->struct_mutex);
650
866d12b4
CW
651 DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n",
652 stolen_offset, gtt_offset, size);
653
654 /* KISS and expect everything to be page-aligned */
f37b5c2b
DV
655 if (WARN_ON(size == 0) || WARN_ON(size & 4095) ||
656 WARN_ON(stolen_offset & 4095))
866d12b4
CW
657 return NULL;
658
b3a070cc
BW
659 stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
660 if (!stolen)
661 return NULL;
662
338710e7
BW
663 stolen->start = stolen_offset;
664 stolen->size = size;
92e97d2f 665 mutex_lock(&dev_priv->mm.stolen_lock);
338710e7 666 ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
92e97d2f 667 mutex_unlock(&dev_priv->mm.stolen_lock);
b3a070cc 668 if (ret) {
866d12b4 669 DRM_DEBUG_KMS("failed to allocate stolen space\n");
b3a070cc 670 kfree(stolen);
866d12b4
CW
671 return NULL;
672 }
673
674 obj = _i915_gem_object_create_stolen(dev, stolen);
675 if (obj == NULL) {
676 DRM_DEBUG_KMS("failed to allocate stolen object\n");
d713fd49 677 i915_gem_stolen_remove_node(dev_priv, stolen);
06e78edf 678 kfree(stolen);
866d12b4
CW
679 return NULL;
680 }
681
3727d55e 682 /* Some objects just need physical mem from stolen space */
190d6cd5 683 if (gtt_offset == I915_GTT_OFFSET_NONE)
3727d55e
JB
684 return obj;
685
72e96d64 686 vma = i915_gem_obj_lookup_or_create_vma(obj, &ggtt->base);
db473b36
DC
687 if (IS_ERR(vma)) {
688 ret = PTR_ERR(vma);
7c4a7d60 689 goto err;
2f633156
BW
690 }
691
866d12b4
CW
692 /* To simplify the initialisation sequence between KMS and GTT,
693 * we allow construction of the stolen object prior to
694 * setting up the GTT space. The actual reservation will occur
695 * later.
696 */
2f633156
BW
697 vma->node.start = gtt_offset;
698 vma->node.size = size;
72e96d64
JL
699 if (drm_mm_initialized(&ggtt->base.mm)) {
700 ret = drm_mm_reserve_node(&ggtt->base.mm, &vma->node);
b3a070cc 701 if (ret) {
866d12b4 702 DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
7c4a7d60 703 goto err;
866d12b4 704 }
866d12b4 705
7c4a7d60 706 vma->bound |= GLOBAL_BIND;
d0710abb 707 __i915_vma_set_map_and_fenceable(vma);
72e96d64 708 list_add_tail(&vma->vm_link, &ggtt->base.inactive_list);
7c4a7d60 709 }
866d12b4 710
35c20a60 711 list_add_tail(&obj->global_list, &dev_priv->mm.bound_list);
d8ccba86 712 i915_gem_object_pin_pages(obj);
866d12b4
CW
713
714 return obj;
b3a070cc 715
7c4a7d60 716err:
b3a070cc
BW
717 drm_gem_object_unreference(&obj->base);
718 return NULL;
866d12b4 719}
This page took 0.314984 seconds and 5 git commands to generate.