i915_gem_stolen.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448
  1. /*
  2. * Copyright © 2008-2012 Intel Corporation
  3. *
  4. * Permission is hereby granted, free of charge, to any person obtaining a
  5. * copy of this software and associated documentation files (the "Software"),
  6. * to deal in the Software without restriction, including without limitation
  7. * the rights to use, copy, modify, merge, publish, distribute, sublicense,
  8. * and/or sell copies of the Software, and to permit persons to whom the
  9. * Software is furnished to do so, subject to the following conditions:
  10. *
  11. * The above copyright notice and this permission notice (including the next
  12. * paragraph) shall be included in all copies or substantial portions of the
  13. * Software.
  14. *
  15. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  16. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  17. * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
  18. * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  19. * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
  20. * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
  21. * IN THE SOFTWARE.
  22. *
  23. * Authors:
  24. * Eric Anholt <eric@anholt.net>
  25. * Chris Wilson <chris@chris-wilson.co.uk>
  26. *
  27. */
  28. #include <drm/drmP.h>
  29. #include <drm/i915_drm.h>
  30. #include "i915_drv.h"
  31. /*
  32. * The BIOS typically reserves some of the system's memory for the exclusive
  33. * use of the integrated graphics. This memory is no longer available for
  34. * use by the OS and so the user finds that his system has less memory
  35. * available than he put in. We refer to this memory as stolen.
  36. *
  37. * The BIOS will allocate its framebuffer from the stolen memory. Our
  38. * goal is try to reuse that object for our own fbcon which must always
  39. * be available for panics. Anything else we can reuse the stolen memory
  40. * for is a boon.
  41. */
  42. static unsigned long i915_stolen_to_physical(struct drm_device *dev)
  43. {
  44. struct drm_i915_private *dev_priv = dev->dev_private;
  45. struct pci_dev *pdev = dev_priv->bridge_dev;
  46. struct resource *r;
  47. u32 base;
  48. /* On the machines I have tested the Graphics Base of Stolen Memory
  49. * is unreliable, so on those compute the base by subtracting the
  50. * stolen memory from the Top of Low Usable DRAM which is where the
  51. * BIOS places the graphics stolen memory.
  52. *
  53. * On gen2, the layout is slightly different with the Graphics Segment
  54. * immediately following Top of Memory (or Top of Usable DRAM). Note
  55. * it appears that TOUD is only reported by 865g, so we just use the
  56. * top of memory as determined by the e820 probe.
  57. *
  58. * XXX gen2 requires an unavailable symbol and 945gm fails with
  59. * its value of TOLUD.
  60. */
  61. base = 0;
  62. if (IS_VALLEYVIEW(dev)) {
  63. pci_read_config_dword(dev->pdev, 0x5c, &base);
  64. base &= ~((1<<20) - 1);
  65. } else if (INTEL_INFO(dev)->gen >= 6) {
  66. /* Read Base Data of Stolen Memory Register (BDSM) directly.
  67. * Note that there is also a MCHBAR miror at 0x1080c0 or
  68. * we could use device 2:0x5c instead.
  69. */
  70. pci_read_config_dword(pdev, 0xB0, &base);
  71. base &= ~4095; /* lower bits used for locking register */
  72. } else if (INTEL_INFO(dev)->gen > 3 || IS_G33(dev)) {
  73. /* Read Graphics Base of Stolen Memory directly */
  74. pci_read_config_dword(pdev, 0xA4, &base);
  75. #if 0
  76. } else if (IS_GEN3(dev)) {
  77. u8 val;
  78. /* Stolen is immediately below Top of Low Usable DRAM */
  79. pci_read_config_byte(pdev, 0x9c, &val);
  80. base = val >> 3 << 27;
  81. base -= dev_priv->mm.gtt->stolen_size;
  82. } else {
  83. /* Stolen is immediately above Top of Memory */
  84. base = max_low_pfn_mapped << PAGE_SHIFT;
  85. #endif
  86. }
  87. if (base == 0)
  88. return 0;
  89. /* Verify that nothing else uses this physical address. Stolen
  90. * memory should be reserved by the BIOS and hidden from the
  91. * kernel. So if the region is already marked as busy, something
  92. * is seriously wrong.
  93. */
  94. r = devm_request_mem_region(dev->dev, base, dev_priv->gtt.stolen_size,
  95. "Graphics Stolen Memory");
  96. if (r == NULL) {
  97. DRM_ERROR("conflict detected with stolen region: [0x%08x - 0x%08x]\n",
  98. base, base + (uint32_t)dev_priv->gtt.stolen_size);
  99. base = 0;
  100. }
  101. return base;
  102. }
  103. static int i915_setup_compression(struct drm_device *dev, int size)
  104. {
  105. struct drm_i915_private *dev_priv = dev->dev_private;
  106. struct drm_mm_node *compressed_fb, *uninitialized_var(compressed_llb);
  107. int ret;
  108. compressed_fb = kzalloc(sizeof(*compressed_fb), GFP_KERNEL);
  109. if (!compressed_fb)
  110. goto err_llb;
  111. /* Try to over-allocate to reduce reallocations and fragmentation */
  112. ret = drm_mm_insert_node(&dev_priv->mm.stolen, compressed_fb,
  113. size <<= 1, 4096, DRM_MM_SEARCH_DEFAULT);
  114. if (ret)
  115. ret = drm_mm_insert_node(&dev_priv->mm.stolen, compressed_fb,
  116. size >>= 1, 4096,
  117. DRM_MM_SEARCH_DEFAULT);
  118. if (ret)
  119. goto err_llb;
  120. if (HAS_PCH_SPLIT(dev))
  121. I915_WRITE(ILK_DPFC_CB_BASE, compressed_fb->start);
  122. else if (IS_GM45(dev)) {
  123. I915_WRITE(DPFC_CB_BASE, compressed_fb->start);
  124. } else {
  125. compressed_llb = kzalloc(sizeof(*compressed_llb), GFP_KERNEL);
  126. if (!compressed_llb)
  127. goto err_fb;
  128. ret = drm_mm_insert_node(&dev_priv->mm.stolen, compressed_llb,
  129. 4096, 4096, DRM_MM_SEARCH_DEFAULT);
  130. if (ret)
  131. goto err_fb;
  132. dev_priv->fbc.compressed_llb = compressed_llb;
  133. I915_WRITE(FBC_CFB_BASE,
  134. dev_priv->mm.stolen_base + compressed_fb->start);
  135. I915_WRITE(FBC_LL_BASE,
  136. dev_priv->mm.stolen_base + compressed_llb->start);
  137. }
  138. dev_priv->fbc.compressed_fb = compressed_fb;
  139. dev_priv->fbc.size = size;
  140. DRM_DEBUG_KMS("reserved %d bytes of contiguous stolen space for FBC\n",
  141. size);
  142. return 0;
  143. err_fb:
  144. kfree(compressed_llb);
  145. drm_mm_remove_node(compressed_fb);
  146. err_llb:
  147. kfree(compressed_fb);
  148. pr_info_once("drm: not enough stolen space for compressed buffer (need %d more bytes), disabling. Hint: you may be able to increase stolen memory size in the BIOS to avoid this.\n", size);
  149. return -ENOSPC;
  150. }
  151. int i915_gem_stolen_setup_compression(struct drm_device *dev, int size)
  152. {
  153. struct drm_i915_private *dev_priv = dev->dev_private;
  154. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  155. return -ENODEV;
  156. if (size < dev_priv->fbc.size)
  157. return 0;
  158. /* Release any current block */
  159. i915_gem_stolen_cleanup_compression(dev);
  160. return i915_setup_compression(dev, size);
  161. }
  162. void i915_gem_stolen_cleanup_compression(struct drm_device *dev)
  163. {
  164. struct drm_i915_private *dev_priv = dev->dev_private;
  165. if (dev_priv->fbc.size == 0)
  166. return;
  167. if (dev_priv->fbc.compressed_fb) {
  168. drm_mm_remove_node(dev_priv->fbc.compressed_fb);
  169. kfree(dev_priv->fbc.compressed_fb);
  170. }
  171. if (dev_priv->fbc.compressed_llb) {
  172. drm_mm_remove_node(dev_priv->fbc.compressed_llb);
  173. kfree(dev_priv->fbc.compressed_llb);
  174. }
  175. dev_priv->fbc.size = 0;
  176. }
  177. void i915_gem_cleanup_stolen(struct drm_device *dev)
  178. {
  179. struct drm_i915_private *dev_priv = dev->dev_private;
  180. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  181. return;
  182. i915_gem_stolen_cleanup_compression(dev);
  183. drm_mm_takedown(&dev_priv->mm.stolen);
  184. }
  185. int i915_gem_init_stolen(struct drm_device *dev)
  186. {
  187. struct drm_i915_private *dev_priv = dev->dev_private;
  188. int bios_reserved = 0;
  189. dev_priv->mm.stolen_base = i915_stolen_to_physical(dev);
  190. if (dev_priv->mm.stolen_base == 0)
  191. return 0;
  192. DRM_DEBUG_KMS("found %zd bytes of stolen memory at %08lx\n",
  193. dev_priv->gtt.stolen_size, dev_priv->mm.stolen_base);
  194. if (IS_VALLEYVIEW(dev))
  195. bios_reserved = 1024*1024; /* top 1M on VLV/BYT */
  196. if (WARN_ON(bios_reserved > dev_priv->gtt.stolen_size))
  197. return 0;
  198. /* Basic memrange allocator for stolen space */
  199. drm_mm_init(&dev_priv->mm.stolen, 0, dev_priv->gtt.stolen_size -
  200. bios_reserved);
  201. return 0;
  202. }
  203. static struct sg_table *
  204. i915_pages_create_for_stolen(struct drm_device *dev,
  205. u32 offset, u32 size)
  206. {
  207. struct drm_i915_private *dev_priv = dev->dev_private;
  208. struct sg_table *st;
  209. struct scatterlist *sg;
  210. DRM_DEBUG_DRIVER("offset=0x%x, size=%d\n", offset, size);
  211. BUG_ON(offset > dev_priv->gtt.stolen_size - size);
  212. /* We hide that we have no struct page backing our stolen object
  213. * by wrapping the contiguous physical allocation with a fake
  214. * dma mapping in a single scatterlist.
  215. */
  216. st = kmalloc(sizeof(*st), GFP_KERNEL);
  217. if (st == NULL)
  218. return NULL;
  219. if (sg_alloc_table(st, 1, GFP_KERNEL)) {
  220. kfree(st);
  221. return NULL;
  222. }
  223. sg = st->sgl;
  224. sg->offset = offset;
  225. sg->length = size;
  226. sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset;
  227. sg_dma_len(sg) = size;
  228. return st;
  229. }
  230. static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
  231. {
  232. BUG();
  233. return -EINVAL;
  234. }
  235. static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj)
  236. {
  237. /* Should only be called during free */
  238. sg_free_table(obj->pages);
  239. kfree(obj->pages);
  240. }
  241. static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
  242. .get_pages = i915_gem_object_get_pages_stolen,
  243. .put_pages = i915_gem_object_put_pages_stolen,
  244. };
  245. static struct drm_i915_gem_object *
  246. _i915_gem_object_create_stolen(struct drm_device *dev,
  247. struct drm_mm_node *stolen)
  248. {
  249. struct drm_i915_gem_object *obj;
  250. obj = i915_gem_object_alloc(dev);
  251. if (obj == NULL)
  252. return NULL;
  253. drm_gem_private_object_init(dev, &obj->base, stolen->size);
  254. i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
  255. obj->pages = i915_pages_create_for_stolen(dev,
  256. stolen->start, stolen->size);
  257. if (obj->pages == NULL)
  258. goto cleanup;
  259. obj->has_dma_mapping = true;
  260. i915_gem_object_pin_pages(obj);
  261. obj->stolen = stolen;
  262. obj->base.write_domain = I915_GEM_DOMAIN_GTT;
  263. obj->base.read_domains = I915_GEM_DOMAIN_GTT;
  264. obj->cache_level = I915_CACHE_NONE;
  265. return obj;
  266. cleanup:
  267. i915_gem_object_free(obj);
  268. return NULL;
  269. }
  270. struct drm_i915_gem_object *
  271. i915_gem_object_create_stolen(struct drm_device *dev, u32 size)
  272. {
  273. struct drm_i915_private *dev_priv = dev->dev_private;
  274. struct drm_i915_gem_object *obj;
  275. struct drm_mm_node *stolen;
  276. int ret;
  277. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  278. return NULL;
  279. DRM_DEBUG_KMS("creating stolen object: size=%x\n", size);
  280. if (size == 0)
  281. return NULL;
  282. stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
  283. if (!stolen)
  284. return NULL;
  285. ret = drm_mm_insert_node(&dev_priv->mm.stolen, stolen, size,
  286. 4096, DRM_MM_SEARCH_DEFAULT);
  287. if (ret) {
  288. kfree(stolen);
  289. return NULL;
  290. }
  291. obj = _i915_gem_object_create_stolen(dev, stolen);
  292. if (obj)
  293. return obj;
  294. drm_mm_remove_node(stolen);
  295. kfree(stolen);
  296. return NULL;
  297. }
  298. struct drm_i915_gem_object *
  299. i915_gem_object_create_stolen_for_preallocated(struct drm_device *dev,
  300. u32 stolen_offset,
  301. u32 gtt_offset,
  302. u32 size)
  303. {
  304. struct drm_i915_private *dev_priv = dev->dev_private;
  305. struct drm_i915_gem_object *obj;
  306. struct drm_mm_node *stolen;
  307. int ret;
  308. if (!drm_mm_initialized(&dev_priv->mm.stolen))
  309. return NULL;
  310. DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n",
  311. stolen_offset, gtt_offset, size);
  312. /* KISS and expect everything to be page-aligned */
  313. BUG_ON(stolen_offset & 4095);
  314. BUG_ON(size & 4095);
  315. if (WARN_ON(size == 0))
  316. return NULL;
  317. stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
  318. if (!stolen)
  319. return NULL;
  320. stolen->start = stolen_offset;
  321. stolen->size = size;
  322. ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
  323. if (ret) {
  324. DRM_DEBUG_KMS("failed to allocate stolen space\n");
  325. kfree(stolen);
  326. return NULL;
  327. }
  328. obj = _i915_gem_object_create_stolen(dev, stolen);
  329. if (obj == NULL) {
  330. DRM_DEBUG_KMS("failed to allocate stolen object\n");
  331. drm_mm_remove_node(stolen);
  332. kfree(stolen);
  333. return NULL;
  334. }
  335. /* Some objects just need physical mem from stolen space */
  336. if (gtt_offset == I915_GTT_OFFSET_NONE)
  337. return obj;
  338. /* To simplify the initialisation sequence between KMS and GTT,
  339. * we allow construction of the stolen object prior to
  340. * setting up the GTT space. The actual reservation will occur
  341. * later.
  342. */
  343. obj->gtt_space.start = gtt_offset;
  344. obj->gtt_space.size = size;
  345. if (drm_mm_initialized(&dev_priv->mm.gtt_space)) {
  346. ret = drm_mm_reserve_node(&dev_priv->mm.gtt_space,
  347. &obj->gtt_space);
  348. if (ret) {
  349. DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
  350. goto unref_out;
  351. }
  352. }
  353. obj->has_global_gtt_mapping = 1;
  354. list_add_tail(&obj->global_list, &dev_priv->mm.bound_list);
  355. list_add_tail(&obj->mm_list, &dev_priv->mm.inactive_list);
  356. return obj;
  357. unref_out:
  358. drm_gem_object_unreference(&obj->base);
  359. return NULL;
  360. }
  361. void
  362. i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
  363. {
  364. if (obj->stolen) {
  365. drm_mm_remove_node(obj->stolen);
  366. kfree(obj->stolen);
  367. obj->stolen = NULL;
  368. }
  369. }