Linux Audio

Check our new training course

Loading...
v4.6
  1/*
  2 * Copyright © 2008-2012 Intel Corporation
  3 *
  4 * Permission is hereby granted, free of charge, to any person obtaining a
  5 * copy of this software and associated documentation files (the "Software"),
  6 * to deal in the Software without restriction, including without limitation
  7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
  8 * and/or sell copies of the Software, and to permit persons to whom the
  9 * Software is furnished to do so, subject to the following conditions:
 10 *
 11 * The above copyright notice and this permission notice (including the next
 12 * paragraph) shall be included in all copies or substantial portions of the
 13 * Software.
 14 *
 15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 16 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
 18 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 19 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
 20 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
 21 * IN THE SOFTWARE.
 22 *
 23 * Authors:
 24 *    Eric Anholt <eric@anholt.net>
 25 *    Chris Wilson <chris@chris-wilson.co.uk>
 26 *
 27 */
 28
 29#include <drm/drmP.h>
 30#include <drm/i915_drm.h>
 31#include "i915_drv.h"
 32
 33#define KB(x) ((x) * 1024)
 34#define MB(x) (KB(x) * 1024)
 35
 36/*
 37 * The BIOS typically reserves some of the system's memory for the exclusive
 38 * use of the integrated graphics. This memory is no longer available for
 39 * use by the OS and so the user finds that his system has less memory
 40 * available than he put in. We refer to this memory as stolen.
 41 *
 42 * The BIOS will allocate its framebuffer from the stolen memory. Our
 43 * goal is try to reuse that object for our own fbcon which must always
 44 * be available for panics. Anything else we can reuse the stolen memory
 45 * for is a boon.
 46 */
 47
 48int i915_gem_stolen_insert_node_in_range(struct drm_i915_private *dev_priv,
 49					 struct drm_mm_node *node, u64 size,
 50					 unsigned alignment, u64 start, u64 end)
 51{
 52	int ret;
 53
 54	if (!drm_mm_initialized(&dev_priv->mm.stolen))
 55		return -ENODEV;
 56
 57	/* See the comment at the drm_mm_init() call for more about this check.
 58	 * WaSkipStolenMemoryFirstPage:bdw,chv (incomplete) */
 59	if (INTEL_INFO(dev_priv)->gen == 8 && start < 4096)
 60		start = 4096;
 61
 62	mutex_lock(&dev_priv->mm.stolen_lock);
 63	ret = drm_mm_insert_node_in_range(&dev_priv->mm.stolen, node, size,
 64					  alignment, start, end,
 65					  DRM_MM_SEARCH_DEFAULT);
 66	mutex_unlock(&dev_priv->mm.stolen_lock);
 67
 68	return ret;
 69}
 70
 71int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv,
 72				struct drm_mm_node *node, u64 size,
 73				unsigned alignment)
 74{
 75	return i915_gem_stolen_insert_node_in_range(dev_priv, node, size,
 76					alignment, 0,
 77					dev_priv->gtt.stolen_usable_size);
 78}
 79
 80void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv,
 81				 struct drm_mm_node *node)
 82{
 83	mutex_lock(&dev_priv->mm.stolen_lock);
 84	drm_mm_remove_node(node);
 85	mutex_unlock(&dev_priv->mm.stolen_lock);
 86}
 87
 88static unsigned long i915_stolen_to_physical(struct drm_device *dev)
 
 89{
 90	struct drm_i915_private *dev_priv = dev->dev_private;
 91	struct resource *r;
 92	u32 base;
 93
 94	/* Almost universally we can find the Graphics Base of Stolen Memory
 95	 * at offset 0x5c in the igfx configuration space. On a few (desktop)
 96	 * machines this is also mirrored in the bridge device at different
 97	 * locations, or in the MCHBAR.
 98	 *
 99	 * On 865 we just check the TOUD register.
100	 *
101	 * On 830/845/85x the stolen memory base isn't available in any
102	 * register. We need to calculate it as TOM-TSEG_SIZE-stolen_size.
103	 *
104	 */
105	base = 0;
106	if (INTEL_INFO(dev)->gen >= 3) {
107		/* Read Graphics Base of Stolen Memory directly */
108		pci_read_config_dword(dev->pdev, 0x5c, &base);
109		base &= ~((1<<20) - 1);
110	} else if (IS_I865G(dev)) {
111		u16 toud = 0;
112
113		/*
114		 * FIXME is the graphics stolen memory region
115		 * always at TOUD? Ie. is it always the last
116		 * one to be allocated by the BIOS?
117		 */
118		pci_bus_read_config_word(dev->pdev->bus, PCI_DEVFN(0, 0),
119					 I865_TOUD, &toud);
120
121		base = toud << 16;
122	} else if (IS_I85X(dev)) {
123		u32 tseg_size = 0;
124		u32 tom;
125		u8 tmp;
126
127		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
128					 I85X_ESMRAMC, &tmp);
129
130		if (tmp & TSEG_ENABLE)
131			tseg_size = MB(1);
132
133		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 1),
134					 I85X_DRB3, &tmp);
135		tom = tmp * MB(32);
136
137		base = tom - tseg_size - dev_priv->gtt.stolen_size;
138	} else if (IS_845G(dev)) {
139		u32 tseg_size = 0;
140		u32 tom;
141		u8 tmp;
142
143		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
144					 I845_ESMRAMC, &tmp);
145
146		if (tmp & TSEG_ENABLE) {
147			switch (tmp & I845_TSEG_SIZE_MASK) {
148			case I845_TSEG_SIZE_512K:
149				tseg_size = KB(512);
150				break;
151			case I845_TSEG_SIZE_1M:
152				tseg_size = MB(1);
153				break;
154			}
155		}
156
157		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
158					 I830_DRB3, &tmp);
159		tom = tmp * MB(32);
160
161		base = tom - tseg_size - dev_priv->gtt.stolen_size;
162	} else if (IS_I830(dev)) {
163		u32 tseg_size = 0;
164		u32 tom;
165		u8 tmp;
166
167		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
168					 I830_ESMRAMC, &tmp);
169
170		if (tmp & TSEG_ENABLE) {
171			if (tmp & I830_TSEG_SIZE_1M)
172				tseg_size = MB(1);
173			else
174				tseg_size = KB(512);
175		}
176
177		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
178					 I830_DRB3, &tmp);
179		tom = tmp * MB(32);
180
181		base = tom - tseg_size - dev_priv->gtt.stolen_size;
182	}
183
184	if (base == 0)
185		return 0;
186
187	/* make sure we don't clobber the GTT if it's within stolen memory */
188	if (INTEL_INFO(dev)->gen <= 4 && !IS_G33(dev) && !IS_G4X(dev)) {
189		struct {
190			u32 start, end;
191		} stolen[2] = {
192			{ .start = base, .end = base + dev_priv->gtt.stolen_size, },
193			{ .start = base, .end = base + dev_priv->gtt.stolen_size, },
194		};
195		u64 gtt_start, gtt_end;
196
197		gtt_start = I915_READ(PGTBL_CTL);
198		if (IS_GEN4(dev))
199			gtt_start = (gtt_start & PGTBL_ADDRESS_LO_MASK) |
200				(gtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
201		else
202			gtt_start &= PGTBL_ADDRESS_LO_MASK;
203		gtt_end = gtt_start + gtt_total_entries(dev_priv->gtt) * 4;
204
205		if (gtt_start >= stolen[0].start && gtt_start < stolen[0].end)
206			stolen[0].end = gtt_start;
207		if (gtt_end > stolen[1].start && gtt_end <= stolen[1].end)
208			stolen[1].start = gtt_end;
209
210		/* pick the larger of the two chunks */
211		if (stolen[0].end - stolen[0].start >
212		    stolen[1].end - stolen[1].start) {
213			base = stolen[0].start;
214			dev_priv->gtt.stolen_size = stolen[0].end - stolen[0].start;
215		} else {
216			base = stolen[1].start;
217			dev_priv->gtt.stolen_size = stolen[1].end - stolen[1].start;
218		}
219
220		if (stolen[0].start != stolen[1].start ||
221		    stolen[0].end != stolen[1].end) {
222			DRM_DEBUG_KMS("GTT within stolen memory at 0x%llx-0x%llx\n",
223				      (unsigned long long) gtt_start,
224				      (unsigned long long) gtt_end - 1);
225			DRM_DEBUG_KMS("Stolen memory adjusted to 0x%x-0x%x\n",
226				      base, base + (u32) dev_priv->gtt.stolen_size - 1);
227		}
228	}
229
230
231	/* Verify that nothing else uses this physical address. Stolen
232	 * memory should be reserved by the BIOS and hidden from the
233	 * kernel. So if the region is already marked as busy, something
234	 * is seriously wrong.
235	 */
236	r = devm_request_mem_region(dev->dev, base, dev_priv->gtt.stolen_size,
 
237				    "Graphics Stolen Memory");
238	if (r == NULL) {
239		/*
240		 * One more attempt but this time requesting region from
241		 * base + 1, as we have seen that this resolves the region
242		 * conflict with the PCI Bus.
243		 * This is a BIOS w/a: Some BIOS wrap stolen in the root
244		 * PCI bus, but have an off-by-one error. Hence retry the
245		 * reservation starting from 1 instead of 0.
 
246		 */
247		r = devm_request_mem_region(dev->dev, base + 1,
248					    dev_priv->gtt.stolen_size - 1,
249					    "Graphics Stolen Memory");
250		/*
251		 * GEN3 firmware likes to smash pci bridges into the stolen
252		 * range. Apparently this works.
253		 */
254		if (r == NULL && !IS_GEN3(dev)) {
255			DRM_ERROR("conflict detected with stolen region: [0x%08x - 0x%08x]\n",
256				  base, base + (uint32_t)dev_priv->gtt.stolen_size);
257			base = 0;
 
258		}
259	}
260
261	return base;
262}
263
264void i915_gem_cleanup_stolen(struct drm_device *dev)
265{
266	struct drm_i915_private *dev_priv = dev->dev_private;
267
268	if (!drm_mm_initialized(&dev_priv->mm.stolen))
269		return;
270
271	drm_mm_takedown(&dev_priv->mm.stolen);
272}
273
274static void g4x_get_stolen_reserved(struct drm_i915_private *dev_priv,
275				    unsigned long *base, unsigned long *size)
276{
277	uint32_t reg_val = I915_READ(IS_GM45(dev_priv) ?
278				     CTG_STOLEN_RESERVED :
279				     ELK_STOLEN_RESERVED);
280	unsigned long stolen_top = dev_priv->mm.stolen_base +
281		dev_priv->gtt.stolen_size;
 
 
 
 
 
 
 
 
 
 
 
282
283	*base = (reg_val & G4X_STOLEN_RESERVED_ADDR2_MASK) << 16;
284
285	WARN_ON((reg_val & G4X_STOLEN_RESERVED_ADDR1_MASK) < *base);
286
287	/* On these platforms, the register doesn't have a size field, so the
288	 * size is the distance between the base and the top of the stolen
289	 * memory. We also have the genuine case where base is zero and there's
290	 * nothing reserved. */
291	if (*base == 0)
292		*size = 0;
293	else
294		*size = stolen_top - *base;
295}
296
297static void gen6_get_stolen_reserved(struct drm_i915_private *dev_priv,
298				     unsigned long *base, unsigned long *size)
299{
300	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
301
 
 
 
 
 
 
302	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
303
304	switch (reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK) {
305	case GEN6_STOLEN_RESERVED_1M:
306		*size = 1024 * 1024;
307		break;
308	case GEN6_STOLEN_RESERVED_512K:
309		*size = 512 * 1024;
310		break;
311	case GEN6_STOLEN_RESERVED_256K:
312		*size = 256 * 1024;
313		break;
314	case GEN6_STOLEN_RESERVED_128K:
315		*size = 128 * 1024;
316		break;
317	default:
318		*size = 1024 * 1024;
319		MISSING_CASE(reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK);
320	}
321}
322
323static void gen7_get_stolen_reserved(struct drm_i915_private *dev_priv,
324				     unsigned long *base, unsigned long *size)
325{
326	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
327
 
 
 
 
 
 
328	*base = reg_val & GEN7_STOLEN_RESERVED_ADDR_MASK;
329
330	switch (reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK) {
331	case GEN7_STOLEN_RESERVED_1M:
332		*size = 1024 * 1024;
333		break;
334	case GEN7_STOLEN_RESERVED_256K:
335		*size = 256 * 1024;
336		break;
337	default:
338		*size = 1024 * 1024;
339		MISSING_CASE(reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK);
340	}
341}
342
343static void gen8_get_stolen_reserved(struct drm_i915_private *dev_priv,
344				     unsigned long *base, unsigned long *size)
345{
346	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
347
 
 
 
 
 
 
348	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
349
350	switch (reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK) {
351	case GEN8_STOLEN_RESERVED_1M:
352		*size = 1024 * 1024;
353		break;
354	case GEN8_STOLEN_RESERVED_2M:
355		*size = 2 * 1024 * 1024;
356		break;
357	case GEN8_STOLEN_RESERVED_4M:
358		*size = 4 * 1024 * 1024;
359		break;
360	case GEN8_STOLEN_RESERVED_8M:
361		*size = 8 * 1024 * 1024;
362		break;
363	default:
364		*size = 8 * 1024 * 1024;
365		MISSING_CASE(reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK);
366	}
367}
368
369static void bdw_get_stolen_reserved(struct drm_i915_private *dev_priv,
370				    unsigned long *base, unsigned long *size)
371{
372	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
373	unsigned long stolen_top;
374
375	stolen_top = dev_priv->mm.stolen_base + dev_priv->gtt.stolen_size;
 
 
 
 
 
 
376
377	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
378
379	/* On these platforms, the register doesn't have a size field, so the
380	 * size is the distance between the base and the top of the stolen
381	 * memory. We also have the genuine case where base is zero and there's
382	 * nothing reserved. */
383	if (*base == 0)
384		*size = 0;
385	else
386		*size = stolen_top - *base;
387}
388
389int i915_gem_init_stolen(struct drm_device *dev)
390{
391	struct drm_i915_private *dev_priv = dev->dev_private;
392	unsigned long reserved_total, reserved_base = 0, reserved_size;
393	unsigned long stolen_top;
394
395	mutex_init(&dev_priv->mm.stolen_lock);
396
397#ifdef CONFIG_INTEL_IOMMU
398	if (intel_iommu_gfx_mapped && INTEL_INFO(dev)->gen < 8) {
 
 
 
 
399		DRM_INFO("DMAR active, disabling use of stolen memory\n");
400		return 0;
401	}
402#endif
403
404	if (dev_priv->gtt.stolen_size == 0)
405		return 0;
406
407	dev_priv->mm.stolen_base = i915_stolen_to_physical(dev);
408	if (dev_priv->mm.stolen_base == 0)
 
409		return 0;
410
411	stolen_top = dev_priv->mm.stolen_base + dev_priv->gtt.stolen_size;
 
412
413	switch (INTEL_INFO(dev_priv)->gen) {
 
 
 
 
414	case 2:
415	case 3:
416		break;
417	case 4:
418		if (IS_G4X(dev))
419			g4x_get_stolen_reserved(dev_priv, &reserved_base,
420						&reserved_size);
421		break;
422	case 5:
423		/* Assume the gen6 maximum for the older platforms. */
424		reserved_size = 1024 * 1024;
425		reserved_base = stolen_top - reserved_size;
426		break;
427	case 6:
428		gen6_get_stolen_reserved(dev_priv, &reserved_base,
429					 &reserved_size);
430		break;
431	case 7:
432		gen7_get_stolen_reserved(dev_priv, &reserved_base,
433					 &reserved_size);
434		break;
435	default:
436		if (IS_BROADWELL(dev_priv) ||
437		    IS_SKYLAKE(dev_priv) || IS_KABYLAKE(dev))
438			bdw_get_stolen_reserved(dev_priv, &reserved_base,
439						&reserved_size);
440		else
441			gen8_get_stolen_reserved(dev_priv, &reserved_base,
442						 &reserved_size);
443		break;
444	}
445
446	/* It is possible for the reserved base to be zero, but the register
447	 * field for size doesn't have a zero option. */
448	if (reserved_base == 0) {
449		reserved_size = 0;
450		reserved_base = stolen_top;
451	}
452
453	if (reserved_base < dev_priv->mm.stolen_base ||
454	    reserved_base + reserved_size > stolen_top) {
455		DRM_DEBUG_KMS("Stolen reserved area [0x%08lx - 0x%08lx] outside stolen memory [0x%08lx - 0x%08lx]\n",
456			      reserved_base, reserved_base + reserved_size,
457			      dev_priv->mm.stolen_base, stolen_top);
 
458		return 0;
459	}
460
461	dev_priv->gtt.stolen_reserved_base = reserved_base;
462	dev_priv->gtt.stolen_reserved_size = reserved_size;
463
464	/* It is possible for the reserved area to end before the end of stolen
465	 * memory, so just consider the start. */
466	reserved_total = stolen_top - reserved_base;
467
468	DRM_DEBUG_KMS("Memory reserved for graphics device: %zuK, usable: %luK\n",
469		      dev_priv->gtt.stolen_size >> 10,
470		      (dev_priv->gtt.stolen_size - reserved_total) >> 10);
471
472	dev_priv->gtt.stolen_usable_size = dev_priv->gtt.stolen_size -
473					   reserved_total;
474
475	/*
476	 * Basic memrange allocator for stolen space.
477	 *
478	 * TODO: Notice that some platforms require us to not use the first page
479	 * of the stolen memory but their BIOSes may still put the framebuffer
480	 * on the first page. So we don't reserve this page for now because of
481	 * that. Our current solution is to just prevent new nodes from being
482	 * inserted on the first page - see the check we have at
483	 * i915_gem_stolen_insert_node_in_range(). We may want to fix the fbcon
484	 * problem later.
485	 */
486	drm_mm_init(&dev_priv->mm.stolen, 0, dev_priv->gtt.stolen_usable_size);
487
488	return 0;
489}
490
491static struct sg_table *
492i915_pages_create_for_stolen(struct drm_device *dev,
493			     u32 offset, u32 size)
494{
495	struct drm_i915_private *dev_priv = dev->dev_private;
496	struct sg_table *st;
497	struct scatterlist *sg;
498
499	DRM_DEBUG_DRIVER("offset=0x%x, size=%d\n", offset, size);
500	BUG_ON(offset > dev_priv->gtt.stolen_size - size);
501
502	/* We hide that we have no struct page backing our stolen object
503	 * by wrapping the contiguous physical allocation with a fake
504	 * dma mapping in a single scatterlist.
505	 */
506
507	st = kmalloc(sizeof(*st), GFP_KERNEL);
508	if (st == NULL)
509		return NULL;
510
511	if (sg_alloc_table(st, 1, GFP_KERNEL)) {
512		kfree(st);
513		return NULL;
514	}
515
516	sg = st->sgl;
517	sg->offset = 0;
518	sg->length = size;
519
520	sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset;
521	sg_dma_len(sg) = size;
522
523	return st;
524}
525
526static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
527{
528	BUG();
529	return -EINVAL;
 
 
 
 
 
 
 
 
530}
531
532static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj)
 
533{
534	/* Should only be called during free */
535	sg_free_table(obj->pages);
536	kfree(obj->pages);
537}
538
539
540static void
541i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
542{
543	struct drm_i915_private *dev_priv = obj->base.dev->dev_private;
 
544
545	if (obj->stolen) {
546		i915_gem_stolen_remove_node(dev_priv, obj->stolen);
547		kfree(obj->stolen);
548		obj->stolen = NULL;
549	}
 
550}
 
551static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
552	.get_pages = i915_gem_object_get_pages_stolen,
553	.put_pages = i915_gem_object_put_pages_stolen,
554	.release = i915_gem_object_release_stolen,
555};
556
557static struct drm_i915_gem_object *
558_i915_gem_object_create_stolen(struct drm_device *dev,
559			       struct drm_mm_node *stolen)
560{
561	struct drm_i915_gem_object *obj;
 
562
563	obj = i915_gem_object_alloc(dev);
564	if (obj == NULL)
565		return NULL;
566
567	drm_gem_private_object_init(dev, &obj->base, stolen->size);
568	i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
569
570	obj->pages = i915_pages_create_for_stolen(dev,
571						  stolen->start, stolen->size);
572	if (obj->pages == NULL)
573		goto cleanup;
574
575	obj->get_page.sg = obj->pages->sgl;
576	obj->get_page.last = 0;
577
578	i915_gem_object_pin_pages(obj);
579	obj->stolen = stolen;
 
 
 
580
581	obj->base.read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
582	obj->cache_level = HAS_LLC(dev) ? I915_CACHE_LLC : I915_CACHE_NONE;
583
584	return obj;
585
586cleanup:
587	i915_gem_object_free(obj);
588	return NULL;
589}
590
591struct drm_i915_gem_object *
592i915_gem_object_create_stolen(struct drm_device *dev, u32 size)
 
593{
594	struct drm_i915_private *dev_priv = dev->dev_private;
595	struct drm_i915_gem_object *obj;
596	struct drm_mm_node *stolen;
597	int ret;
598
599	if (!drm_mm_initialized(&dev_priv->mm.stolen))
600		return NULL;
601
602	DRM_DEBUG_KMS("creating stolen object: size=%x\n", size);
603	if (size == 0)
604		return NULL;
605
606	stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
607	if (!stolen)
608		return NULL;
609
610	ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096);
611	if (ret) {
612		kfree(stolen);
613		return NULL;
614	}
615
616	obj = _i915_gem_object_create_stolen(dev, stolen);
617	if (obj)
618		return obj;
619
620	i915_gem_stolen_remove_node(dev_priv, stolen);
621	kfree(stolen);
622	return NULL;
623}
624
625struct drm_i915_gem_object *
626i915_gem_object_create_stolen_for_preallocated(struct drm_device *dev,
627					       u32 stolen_offset,
628					       u32 gtt_offset,
629					       u32 size)
630{
631	struct drm_i915_private *dev_priv = dev->dev_private;
632	struct i915_address_space *ggtt = &dev_priv->gtt.base;
633	struct drm_i915_gem_object *obj;
634	struct drm_mm_node *stolen;
635	struct i915_vma *vma;
636	int ret;
637
638	if (!drm_mm_initialized(&dev_priv->mm.stolen))
639		return NULL;
640
641	lockdep_assert_held(&dev->struct_mutex);
642
643	DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n",
644			stolen_offset, gtt_offset, size);
645
646	/* KISS and expect everything to be page-aligned */
647	if (WARN_ON(size == 0) || WARN_ON(size & 4095) ||
648	    WARN_ON(stolen_offset & 4095))
 
649		return NULL;
650
651	stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
652	if (!stolen)
653		return NULL;
654
655	stolen->start = stolen_offset;
656	stolen->size = size;
657	mutex_lock(&dev_priv->mm.stolen_lock);
658	ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
659	mutex_unlock(&dev_priv->mm.stolen_lock);
660	if (ret) {
661		DRM_DEBUG_KMS("failed to allocate stolen space\n");
662		kfree(stolen);
663		return NULL;
664	}
665
666	obj = _i915_gem_object_create_stolen(dev, stolen);
667	if (obj == NULL) {
668		DRM_DEBUG_KMS("failed to allocate stolen object\n");
669		i915_gem_stolen_remove_node(dev_priv, stolen);
670		kfree(stolen);
671		return NULL;
672	}
673
674	/* Some objects just need physical mem from stolen space */
675	if (gtt_offset == I915_GTT_OFFSET_NONE)
676		return obj;
677
678	vma = i915_gem_obj_lookup_or_create_vma(obj, ggtt);
 
 
 
 
679	if (IS_ERR(vma)) {
680		ret = PTR_ERR(vma);
681		goto err;
682	}
683
684	/* To simplify the initialisation sequence between KMS and GTT,
685	 * we allow construction of the stolen object prior to
686	 * setting up the GTT space. The actual reservation will occur
687	 * later.
688	 */
689	vma->node.start = gtt_offset;
690	vma->node.size = size;
691	if (drm_mm_initialized(&ggtt->mm)) {
692		ret = drm_mm_reserve_node(&ggtt->mm, &vma->node);
693		if (ret) {
694			DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
695			goto err;
696		}
697
698		vma->bound |= GLOBAL_BIND;
699		__i915_vma_set_map_and_fenceable(vma);
700		list_add_tail(&vma->vm_link, &ggtt->inactive_list);
701	}
702
703	list_add_tail(&obj->global_list, &dev_priv->mm.bound_list);
704	i915_gem_object_pin_pages(obj);
 
 
 
 
 
 
 
 
 
705
706	return obj;
707
 
 
708err:
709	drm_gem_object_unreference(&obj->base);
710	return NULL;
711}
v4.17
  1/*
  2 * Copyright © 2008-2012 Intel Corporation
  3 *
  4 * Permission is hereby granted, free of charge, to any person obtaining a
  5 * copy of this software and associated documentation files (the "Software"),
  6 * to deal in the Software without restriction, including without limitation
  7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
  8 * and/or sell copies of the Software, and to permit persons to whom the
  9 * Software is furnished to do so, subject to the following conditions:
 10 *
 11 * The above copyright notice and this permission notice (including the next
 12 * paragraph) shall be included in all copies or substantial portions of the
 13 * Software.
 14 *
 15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 16 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
 18 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 19 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
 20 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
 21 * IN THE SOFTWARE.
 22 *
 23 * Authors:
 24 *    Eric Anholt <eric@anholt.net>
 25 *    Chris Wilson <chris@chris-wilson.co.uk>
 26 *
 27 */
 28
 29#include <drm/drmP.h>
 30#include <drm/i915_drm.h>
 31#include "i915_drv.h"
 32
 
 
 
 33/*
 34 * The BIOS typically reserves some of the system's memory for the exclusive
 35 * use of the integrated graphics. This memory is no longer available for
 36 * use by the OS and so the user finds that his system has less memory
 37 * available than he put in. We refer to this memory as stolen.
 38 *
 39 * The BIOS will allocate its framebuffer from the stolen memory. Our
 40 * goal is try to reuse that object for our own fbcon which must always
 41 * be available for panics. Anything else we can reuse the stolen memory
 42 * for is a boon.
 43 */
 44
 45int i915_gem_stolen_insert_node_in_range(struct drm_i915_private *dev_priv,
 46					 struct drm_mm_node *node, u64 size,
 47					 unsigned alignment, u64 start, u64 end)
 48{
 49	int ret;
 50
 51	if (!drm_mm_initialized(&dev_priv->mm.stolen))
 52		return -ENODEV;
 53
 
 
 
 
 
 54	mutex_lock(&dev_priv->mm.stolen_lock);
 55	ret = drm_mm_insert_node_in_range(&dev_priv->mm.stolen, node,
 56					  size, alignment, 0,
 57					  start, end, DRM_MM_INSERT_BEST);
 58	mutex_unlock(&dev_priv->mm.stolen_lock);
 59
 60	return ret;
 61}
 62
 63int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv,
 64				struct drm_mm_node *node, u64 size,
 65				unsigned alignment)
 66{
 67	return i915_gem_stolen_insert_node_in_range(dev_priv, node, size,
 68						    alignment, 0, U64_MAX);
 
 69}
 70
 71void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv,
 72				 struct drm_mm_node *node)
 73{
 74	mutex_lock(&dev_priv->mm.stolen_lock);
 75	drm_mm_remove_node(node);
 76	mutex_unlock(&dev_priv->mm.stolen_lock);
 77}
 78
 79static int i915_adjust_stolen(struct drm_i915_private *dev_priv,
 80			      struct resource *dsm)
 81{
 82	struct i915_ggtt *ggtt = &dev_priv->ggtt;
 83	struct resource *r;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 84
 85	if (dsm->start == 0 || dsm->end <= dsm->start)
 86		return -EINVAL;
 
 87
 88	/*
 89	 * TODO: We have yet too encounter the case where the GTT wasn't at the
 90	 * end of stolen. With that assumption we could simplify this.
 91	 */
 
 92
 93	/* Make sure we don't clobber the GTT if it's within stolen memory */
 94	if (INTEL_GEN(dev_priv) <= 4 &&
 95	    !IS_G33(dev_priv) && !IS_PINEVIEW(dev_priv) && !IS_G4X(dev_priv)) {
 96		struct resource stolen[2] = {*dsm, *dsm};
 97		struct resource ggtt_res;
 98		resource_size_t ggtt_start;
 99
100		ggtt_start = I915_READ(PGTBL_CTL);
101		if (IS_GEN4(dev_priv))
102			ggtt_start = (ggtt_start & PGTBL_ADDRESS_LO_MASK) |
103				     (ggtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
 
 
 
104		else
105			ggtt_start &= PGTBL_ADDRESS_LO_MASK;
 
106
107		ggtt_res =
108			(struct resource) DEFINE_RES_MEM(ggtt_start,
109							 ggtt_total_entries(ggtt) * 4);
110
111		if (ggtt_res.start >= stolen[0].start && ggtt_res.start < stolen[0].end)
112			stolen[0].end = ggtt_res.start;
113		if (ggtt_res.end > stolen[1].start && ggtt_res.end <= stolen[1].end)
114			stolen[1].start = ggtt_res.end;
115
116		/* Pick the larger of the two chunks */
117		if (resource_size(&stolen[0]) > resource_size(&stolen[1]))
118			*dsm = stolen[0];
119		else
120			*dsm = stolen[1];
121
122		if (stolen[0].start != stolen[1].start ||
123		    stolen[0].end != stolen[1].end) {
124			DRM_DEBUG_KMS("GTT within stolen memory at %pR\n", &ggtt_res);
125			DRM_DEBUG_KMS("Stolen memory adjusted to %pR\n", dsm);
 
 
 
126		}
127	}
128
129	/*
130	 * Verify that nothing else uses this physical address. Stolen
131	 * memory should be reserved by the BIOS and hidden from the
132	 * kernel. So if the region is already marked as busy, something
133	 * is seriously wrong.
134	 */
135	r = devm_request_mem_region(dev_priv->drm.dev, dsm->start,
136				    resource_size(dsm),
137				    "Graphics Stolen Memory");
138	if (r == NULL) {
139		/*
140		 * One more attempt but this time requesting region from
141		 * start + 1, as we have seen that this resolves the region
142		 * conflict with the PCI Bus.
143		 * This is a BIOS w/a: Some BIOS wrap stolen in the root
144		 * PCI bus, but have an off-by-one error. Hence retry the
145		 * reservation starting from 1 instead of 0.
146		 * There's also BIOS with off-by-one on the other end.
147		 */
148		r = devm_request_mem_region(dev_priv->drm.dev, dsm->start + 1,
149					    resource_size(dsm) - 2,
150					    "Graphics Stolen Memory");
151		/*
152		 * GEN3 firmware likes to smash pci bridges into the stolen
153		 * range. Apparently this works.
154		 */
155		if (r == NULL && !IS_GEN3(dev_priv)) {
156			DRM_ERROR("conflict detected with stolen region: %pR\n",
157				  dsm);
158
159			return -EBUSY;
160		}
161	}
162
163	return 0;
164}
165
166void i915_gem_cleanup_stolen(struct drm_device *dev)
167{
168	struct drm_i915_private *dev_priv = to_i915(dev);
169
170	if (!drm_mm_initialized(&dev_priv->mm.stolen))
171		return;
172
173	drm_mm_takedown(&dev_priv->mm.stolen);
174}
175
176static void g4x_get_stolen_reserved(struct drm_i915_private *dev_priv,
177				    resource_size_t *base, resource_size_t *size)
178{
179	uint32_t reg_val = I915_READ(IS_GM45(dev_priv) ?
180				     CTG_STOLEN_RESERVED :
181				     ELK_STOLEN_RESERVED);
182	resource_size_t stolen_top = dev_priv->dsm.end + 1;
183
184	if ((reg_val & G4X_STOLEN_RESERVED_ENABLE) == 0) {
185		*base = 0;
186		*size = 0;
187		return;
188	}
189
190	/*
191	 * Whether ILK really reuses the ELK register for this is unclear.
192	 * Let's see if we catch anyone with this supposedly enabled on ILK.
193	 */
194	WARN(IS_GEN5(dev_priv), "ILK stolen reserved found? 0x%08x\n", reg_val);
195
196	*base = (reg_val & G4X_STOLEN_RESERVED_ADDR2_MASK) << 16;
197
198	WARN_ON((reg_val & G4X_STOLEN_RESERVED_ADDR1_MASK) < *base);
199
200	/* On these platforms, the register doesn't have a size field, so the
201	 * size is the distance between the base and the top of the stolen
202	 * memory. We also have the genuine case where base is zero and there's
203	 * nothing reserved. */
204	if (*base == 0)
205		*size = 0;
206	else
207		*size = stolen_top - *base;
208}
209
210static void gen6_get_stolen_reserved(struct drm_i915_private *dev_priv,
211				     resource_size_t *base, resource_size_t *size)
212{
213	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
214
215	if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
216		*base = 0;
217		*size = 0;
218		return;
219	}
220
221	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
222
223	switch (reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK) {
224	case GEN6_STOLEN_RESERVED_1M:
225		*size = 1024 * 1024;
226		break;
227	case GEN6_STOLEN_RESERVED_512K:
228		*size = 512 * 1024;
229		break;
230	case GEN6_STOLEN_RESERVED_256K:
231		*size = 256 * 1024;
232		break;
233	case GEN6_STOLEN_RESERVED_128K:
234		*size = 128 * 1024;
235		break;
236	default:
237		*size = 1024 * 1024;
238		MISSING_CASE(reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK);
239	}
240}
241
242static void gen7_get_stolen_reserved(struct drm_i915_private *dev_priv,
243				     resource_size_t *base, resource_size_t *size)
244{
245	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
246
247	if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
248		*base = 0;
249		*size = 0;
250		return;
251	}
252
253	*base = reg_val & GEN7_STOLEN_RESERVED_ADDR_MASK;
254
255	switch (reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK) {
256	case GEN7_STOLEN_RESERVED_1M:
257		*size = 1024 * 1024;
258		break;
259	case GEN7_STOLEN_RESERVED_256K:
260		*size = 256 * 1024;
261		break;
262	default:
263		*size = 1024 * 1024;
264		MISSING_CASE(reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK);
265	}
266}
267
268static void chv_get_stolen_reserved(struct drm_i915_private *dev_priv,
269				    resource_size_t *base, resource_size_t *size)
270{
271	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
272
273	if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
274		*base = 0;
275		*size = 0;
276		return;
277	}
278
279	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
280
281	switch (reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK) {
282	case GEN8_STOLEN_RESERVED_1M:
283		*size = 1024 * 1024;
284		break;
285	case GEN8_STOLEN_RESERVED_2M:
286		*size = 2 * 1024 * 1024;
287		break;
288	case GEN8_STOLEN_RESERVED_4M:
289		*size = 4 * 1024 * 1024;
290		break;
291	case GEN8_STOLEN_RESERVED_8M:
292		*size = 8 * 1024 * 1024;
293		break;
294	default:
295		*size = 8 * 1024 * 1024;
296		MISSING_CASE(reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK);
297	}
298}
299
300static void bdw_get_stolen_reserved(struct drm_i915_private *dev_priv,
301				    resource_size_t *base, resource_size_t *size)
302{
303	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
304	resource_size_t stolen_top;
305
306	if ((reg_val & GEN6_STOLEN_RESERVED_ENABLE) == 0) {
307		*base = 0;
308		*size = 0;
309		return;
310	}
311
312	stolen_top = dev_priv->dsm.end + 1;
313
314	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
315
316	/* On these platforms, the register doesn't have a size field, so the
317	 * size is the distance between the base and the top of the stolen
318	 * memory. We also have the genuine case where base is zero and there's
319	 * nothing reserved. */
320	if (*base == 0)
321		*size = 0;
322	else
323		*size = stolen_top - *base;
324}
325
326int i915_gem_init_stolen(struct drm_i915_private *dev_priv)
327{
328	resource_size_t reserved_base, stolen_top;
329	resource_size_t reserved_total, reserved_size;
330	resource_size_t stolen_usable_start;
331
332	mutex_init(&dev_priv->mm.stolen_lock);
333
334	if (intel_vgpu_active(dev_priv)) {
335		DRM_INFO("iGVT-g active, disabling use of stolen memory\n");
336		return 0;
337	}
338
339	if (intel_vtd_active() && INTEL_GEN(dev_priv) < 8) {
340		DRM_INFO("DMAR active, disabling use of stolen memory\n");
341		return 0;
342	}
 
343
344	if (resource_size(&intel_graphics_stolen_res) == 0)
345		return 0;
346
347	dev_priv->dsm = intel_graphics_stolen_res;
348
349	if (i915_adjust_stolen(dev_priv, &dev_priv->dsm))
350		return 0;
351
352	GEM_BUG_ON(dev_priv->dsm.start == 0);
353	GEM_BUG_ON(dev_priv->dsm.end <= dev_priv->dsm.start);
354
355	stolen_top = dev_priv->dsm.end + 1;
356	reserved_base = 0;
357	reserved_size = 0;
358
359	switch (INTEL_GEN(dev_priv)) {
360	case 2:
361	case 3:
362		break;
363	case 4:
364		if (!IS_G4X(dev_priv))
365			break;
366		/* fall through */
 
367	case 5:
368		g4x_get_stolen_reserved(dev_priv,
369					&reserved_base, &reserved_size);
 
370		break;
371	case 6:
372		gen6_get_stolen_reserved(dev_priv,
373					 &reserved_base, &reserved_size);
374		break;
375	case 7:
376		gen7_get_stolen_reserved(dev_priv,
377					 &reserved_base, &reserved_size);
378		break;
379	default:
380		if (IS_LP(dev_priv))
381			chv_get_stolen_reserved(dev_priv,
382						&reserved_base, &reserved_size);
 
383		else
384			bdw_get_stolen_reserved(dev_priv,
385						&reserved_base, &reserved_size);
386		break;
387	}
388
389	/* It is possible for the reserved base to be zero, but the register
390	 * field for size doesn't have a zero option. */
391	if (reserved_base == 0) {
392		reserved_size = 0;
393		reserved_base = stolen_top;
394	}
395
396	dev_priv->dsm_reserved =
397		(struct resource) DEFINE_RES_MEM(reserved_base, reserved_size);
398
399	if (!resource_contains(&dev_priv->dsm, &dev_priv->dsm_reserved)) {
400		DRM_ERROR("Stolen reserved area %pR outside stolen memory %pR\n",
401			  &dev_priv->dsm_reserved, &dev_priv->dsm);
402		return 0;
403	}
404
 
 
 
405	/* It is possible for the reserved area to end before the end of stolen
406	 * memory, so just consider the start. */
407	reserved_total = stolen_top - reserved_base;
408
409	DRM_DEBUG_KMS("Memory reserved for graphics device: %lluK, usable: %lluK\n",
410		      (u64)resource_size(&dev_priv->dsm) >> 10,
411		      ((u64)resource_size(&dev_priv->dsm) - reserved_total) >> 10);
412
413	stolen_usable_start = 0;
414	/* WaSkipStolenMemoryFirstPage:bdw+ */
415	if (INTEL_GEN(dev_priv) >= 8)
416		stolen_usable_start = 4096;
417
418	dev_priv->stolen_usable_size =
419		resource_size(&dev_priv->dsm) - reserved_total - stolen_usable_start;
420
421	/* Basic memrange allocator for stolen space. */
422	drm_mm_init(&dev_priv->mm.stolen, stolen_usable_start,
423		    dev_priv->stolen_usable_size);
 
 
 
 
424
425	return 0;
426}
427
428static struct sg_table *
429i915_pages_create_for_stolen(struct drm_device *dev,
430			     resource_size_t offset, resource_size_t size)
431{
432	struct drm_i915_private *dev_priv = to_i915(dev);
433	struct sg_table *st;
434	struct scatterlist *sg;
435
436	GEM_BUG_ON(range_overflows(offset, size, resource_size(&dev_priv->dsm)));
 
437
438	/* We hide that we have no struct page backing our stolen object
439	 * by wrapping the contiguous physical allocation with a fake
440	 * dma mapping in a single scatterlist.
441	 */
442
443	st = kmalloc(sizeof(*st), GFP_KERNEL);
444	if (st == NULL)
445		return ERR_PTR(-ENOMEM);
446
447	if (sg_alloc_table(st, 1, GFP_KERNEL)) {
448		kfree(st);
449		return ERR_PTR(-ENOMEM);
450	}
451
452	sg = st->sgl;
453	sg->offset = 0;
454	sg->length = size;
455
456	sg_dma_address(sg) = (dma_addr_t)dev_priv->dsm.start + offset;
457	sg_dma_len(sg) = size;
458
459	return st;
460}
461
462static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
463{
464	struct sg_table *pages =
465		i915_pages_create_for_stolen(obj->base.dev,
466					     obj->stolen->start,
467					     obj->stolen->size);
468	if (IS_ERR(pages))
469		return PTR_ERR(pages);
470
471	__i915_gem_object_set_pages(obj, pages, obj->stolen->size);
472
473	return 0;
474}
475
476static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj,
477					     struct sg_table *pages)
478{
479	/* Should only be called from i915_gem_object_release_stolen() */
480	sg_free_table(pages);
481	kfree(pages);
482}
483
 
484static void
485i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
486{
487	struct drm_i915_private *dev_priv = to_i915(obj->base.dev);
488	struct drm_mm_node *stolen = fetch_and_zero(&obj->stolen);
489
490	GEM_BUG_ON(!stolen);
491
492	__i915_gem_object_unpin_pages(obj);
493
494	i915_gem_stolen_remove_node(dev_priv, stolen);
495	kfree(stolen);
496}
497
498static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
499	.get_pages = i915_gem_object_get_pages_stolen,
500	.put_pages = i915_gem_object_put_pages_stolen,
501	.release = i915_gem_object_release_stolen,
502};
503
504static struct drm_i915_gem_object *
505_i915_gem_object_create_stolen(struct drm_i915_private *dev_priv,
506			       struct drm_mm_node *stolen)
507{
508	struct drm_i915_gem_object *obj;
509	unsigned int cache_level;
510
511	obj = i915_gem_object_alloc(dev_priv);
512	if (obj == NULL)
513		return NULL;
514
515	drm_gem_private_object_init(&dev_priv->drm, &obj->base, stolen->size);
516	i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
517
 
 
 
 
 
 
 
 
 
518	obj->stolen = stolen;
519	obj->read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
520	cache_level = HAS_LLC(dev_priv) ? I915_CACHE_LLC : I915_CACHE_NONE;
521	i915_gem_object_set_cache_coherency(obj, cache_level);
522
523	if (i915_gem_object_pin_pages(obj))
524		goto cleanup;
525
526	return obj;
527
528cleanup:
529	i915_gem_object_free(obj);
530	return NULL;
531}
532
533struct drm_i915_gem_object *
534i915_gem_object_create_stolen(struct drm_i915_private *dev_priv,
535			      resource_size_t size)
536{
 
537	struct drm_i915_gem_object *obj;
538	struct drm_mm_node *stolen;
539	int ret;
540
541	if (!drm_mm_initialized(&dev_priv->mm.stolen))
542		return NULL;
543
 
544	if (size == 0)
545		return NULL;
546
547	stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
548	if (!stolen)
549		return NULL;
550
551	ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096);
552	if (ret) {
553		kfree(stolen);
554		return NULL;
555	}
556
557	obj = _i915_gem_object_create_stolen(dev_priv, stolen);
558	if (obj)
559		return obj;
560
561	i915_gem_stolen_remove_node(dev_priv, stolen);
562	kfree(stolen);
563	return NULL;
564}
565
566struct drm_i915_gem_object *
567i915_gem_object_create_stolen_for_preallocated(struct drm_i915_private *dev_priv,
568					       resource_size_t stolen_offset,
569					       resource_size_t gtt_offset,
570					       resource_size_t size)
571{
572	struct i915_ggtt *ggtt = &dev_priv->ggtt;
 
573	struct drm_i915_gem_object *obj;
574	struct drm_mm_node *stolen;
575	struct i915_vma *vma;
576	int ret;
577
578	if (!drm_mm_initialized(&dev_priv->mm.stolen))
579		return NULL;
580
581	lockdep_assert_held(&dev_priv->drm.struct_mutex);
582
583	DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%pa, gtt_offset=%pa, size=%pa\n",
584			&stolen_offset, &gtt_offset, &size);
585
586	/* KISS and expect everything to be page-aligned */
587	if (WARN_ON(size == 0) ||
588	    WARN_ON(!IS_ALIGNED(size, I915_GTT_PAGE_SIZE)) ||
589	    WARN_ON(!IS_ALIGNED(stolen_offset, I915_GTT_MIN_ALIGNMENT)))
590		return NULL;
591
592	stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
593	if (!stolen)
594		return NULL;
595
596	stolen->start = stolen_offset;
597	stolen->size = size;
598	mutex_lock(&dev_priv->mm.stolen_lock);
599	ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
600	mutex_unlock(&dev_priv->mm.stolen_lock);
601	if (ret) {
602		DRM_DEBUG_KMS("failed to allocate stolen space\n");
603		kfree(stolen);
604		return NULL;
605	}
606
607	obj = _i915_gem_object_create_stolen(dev_priv, stolen);
608	if (obj == NULL) {
609		DRM_DEBUG_KMS("failed to allocate stolen object\n");
610		i915_gem_stolen_remove_node(dev_priv, stolen);
611		kfree(stolen);
612		return NULL;
613	}
614
615	/* Some objects just need physical mem from stolen space */
616	if (gtt_offset == I915_GTT_OFFSET_NONE)
617		return obj;
618
619	ret = i915_gem_object_pin_pages(obj);
620	if (ret)
621		goto err;
622
623	vma = i915_vma_instance(obj, &ggtt->base, NULL);
624	if (IS_ERR(vma)) {
625		ret = PTR_ERR(vma);
626		goto err_pages;
627	}
628
629	/* To simplify the initialisation sequence between KMS and GTT,
630	 * we allow construction of the stolen object prior to
631	 * setting up the GTT space. The actual reservation will occur
632	 * later.
633	 */
634	ret = i915_gem_gtt_reserve(&ggtt->base, &vma->node,
635				   size, gtt_offset, obj->cache_level,
636				   0);
637	if (ret) {
638		DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
639		goto err_pages;
 
 
 
 
 
 
640	}
641
642	GEM_BUG_ON(!drm_mm_node_allocated(&vma->node));
643
644	vma->pages = obj->mm.pages;
645	vma->flags |= I915_VMA_GLOBAL_BIND;
646	__i915_vma_set_map_and_fenceable(vma);
647	list_move_tail(&vma->vm_link, &ggtt->base.inactive_list);
648
649	spin_lock(&dev_priv->mm.obj_lock);
650	list_move_tail(&obj->mm.link, &dev_priv->mm.bound_list);
651	obj->bind_count++;
652	spin_unlock(&dev_priv->mm.obj_lock);
653
654	return obj;
655
656err_pages:
657	i915_gem_object_unpin_pages(obj);
658err:
659	i915_gem_object_put(obj);
660	return NULL;
661}