• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright © 2008-2012 Intel Corporation
3  *
4  * Permission is hereby granted, free of charge, to any person obtaining a
5  * copy of this software and associated documentation files (the "Software"),
6  * to deal in the Software without restriction, including without limitation
7  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8  * and/or sell copies of the Software, and to permit persons to whom the
9  * Software is furnished to do so, subject to the following conditions:
10  *
11  * The above copyright notice and this permission notice (including the next
12  * paragraph) shall be included in all copies or substantial portions of the
13  * Software.
14  *
15  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
18  * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
20  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
21  * IN THE SOFTWARE.
22  *
23  * Authors:
24  *    Eric Anholt <eric@anholt.net>
25  *    Chris Wilson <chris@chris-wilson.co.uk>
26  *
27  */
28 
29 #include <drm/drmP.h>
30 #include <drm/i915_drm.h>
31 #include "i915_drv.h"
32 
33 #define KB(x) ((x) * 1024)
34 #define MB(x) (KB(x) * 1024)
35 
36 /*
37  * The BIOS typically reserves some of the system's memory for the exclusive
38  * use of the integrated graphics. This memory is no longer available for
39  * use by the OS and so the user finds that his system has less memory
40  * available than he put in. We refer to this memory as stolen.
41  *
42  * The BIOS will allocate its framebuffer from the stolen memory. Our
43  * goal is try to reuse that object for our own fbcon which must always
44  * be available for panics. Anything else we can reuse the stolen memory
45  * for is a boon.
46  */
47 
i915_gem_stolen_insert_node_in_range(struct drm_i915_private * dev_priv,struct drm_mm_node * node,u64 size,unsigned alignment,u64 start,u64 end)48 int i915_gem_stolen_insert_node_in_range(struct drm_i915_private *dev_priv,
49 					 struct drm_mm_node *node, u64 size,
50 					 unsigned alignment, u64 start, u64 end)
51 {
52 	int ret;
53 
54 	if (!drm_mm_initialized(&dev_priv->mm.stolen))
55 		return -ENODEV;
56 
57 	/* See the comment at the drm_mm_init() call for more about this check.
58 	 * WaSkipStolenMemoryFirstPage:bdw,chv (incomplete) */
59 	if (INTEL_INFO(dev_priv)->gen == 8 && start < 4096)
60 		start = 4096;
61 
62 	mutex_lock(&dev_priv->mm.stolen_lock);
63 	ret = drm_mm_insert_node_in_range(&dev_priv->mm.stolen, node, size,
64 					  alignment, start, end,
65 					  DRM_MM_SEARCH_DEFAULT);
66 	mutex_unlock(&dev_priv->mm.stolen_lock);
67 
68 	return ret;
69 }
70 
i915_gem_stolen_insert_node(struct drm_i915_private * dev_priv,struct drm_mm_node * node,u64 size,unsigned alignment)71 int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv,
72 				struct drm_mm_node *node, u64 size,
73 				unsigned alignment)
74 {
75 	return i915_gem_stolen_insert_node_in_range(dev_priv, node, size,
76 					alignment, 0,
77 					dev_priv->gtt.stolen_usable_size);
78 }
79 
i915_gem_stolen_remove_node(struct drm_i915_private * dev_priv,struct drm_mm_node * node)80 void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv,
81 				 struct drm_mm_node *node)
82 {
83 	mutex_lock(&dev_priv->mm.stolen_lock);
84 	drm_mm_remove_node(node);
85 	mutex_unlock(&dev_priv->mm.stolen_lock);
86 }
87 
i915_stolen_to_physical(struct drm_device * dev)88 static unsigned long i915_stolen_to_physical(struct drm_device *dev)
89 {
90 	struct drm_i915_private *dev_priv = dev->dev_private;
91 	struct resource *r;
92 	u32 base;
93 
94 	/* Almost universally we can find the Graphics Base of Stolen Memory
95 	 * at offset 0x5c in the igfx configuration space. On a few (desktop)
96 	 * machines this is also mirrored in the bridge device at different
97 	 * locations, or in the MCHBAR.
98 	 *
99 	 * On 865 we just check the TOUD register.
100 	 *
101 	 * On 830/845/85x the stolen memory base isn't available in any
102 	 * register. We need to calculate it as TOM-TSEG_SIZE-stolen_size.
103 	 *
104 	 */
105 	base = 0;
106 	if (INTEL_INFO(dev)->gen >= 3) {
107 		/* Read Graphics Base of Stolen Memory directly */
108 		pci_read_config_dword(dev->pdev, 0x5c, &base);
109 		base &= ~((1<<20) - 1);
110 	} else if (IS_I865G(dev)) {
111 		u32 tseg_size = 0;
112 		u16 toud = 0;
113 		u8 tmp;
114 
115 		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
116 					 I845_ESMRAMC, &tmp);
117 
118 		if (tmp & TSEG_ENABLE) {
119 			switch (tmp & I845_TSEG_SIZE_MASK) {
120 			case I845_TSEG_SIZE_512K:
121 				tseg_size = KB(512);
122 				break;
123 			case I845_TSEG_SIZE_1M:
124 				tseg_size = MB(1);
125 				break;
126 			}
127 		}
128 
129 		pci_bus_read_config_word(dev->pdev->bus, PCI_DEVFN(0, 0),
130 					 I865_TOUD, &toud);
131 
132 		base = (toud << 16) + tseg_size;
133 	} else if (IS_I85X(dev)) {
134 		u32 tseg_size = 0;
135 		u32 tom;
136 		u8 tmp;
137 
138 		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
139 					 I85X_ESMRAMC, &tmp);
140 
141 		if (tmp & TSEG_ENABLE)
142 			tseg_size = MB(1);
143 
144 		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 1),
145 					 I85X_DRB3, &tmp);
146 		tom = tmp * MB(32);
147 
148 		base = tom - tseg_size - dev_priv->gtt.stolen_size;
149 	} else if (IS_845G(dev)) {
150 		u32 tseg_size = 0;
151 		u32 tom;
152 		u8 tmp;
153 
154 		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
155 					 I845_ESMRAMC, &tmp);
156 
157 		if (tmp & TSEG_ENABLE) {
158 			switch (tmp & I845_TSEG_SIZE_MASK) {
159 			case I845_TSEG_SIZE_512K:
160 				tseg_size = KB(512);
161 				break;
162 			case I845_TSEG_SIZE_1M:
163 				tseg_size = MB(1);
164 				break;
165 			}
166 		}
167 
168 		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
169 					 I830_DRB3, &tmp);
170 		tom = tmp * MB(32);
171 
172 		base = tom - tseg_size - dev_priv->gtt.stolen_size;
173 	} else if (IS_I830(dev)) {
174 		u32 tseg_size = 0;
175 		u32 tom;
176 		u8 tmp;
177 
178 		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
179 					 I830_ESMRAMC, &tmp);
180 
181 		if (tmp & TSEG_ENABLE) {
182 			if (tmp & I830_TSEG_SIZE_1M)
183 				tseg_size = MB(1);
184 			else
185 				tseg_size = KB(512);
186 		}
187 
188 		pci_bus_read_config_byte(dev->pdev->bus, PCI_DEVFN(0, 0),
189 					 I830_DRB3, &tmp);
190 		tom = tmp * MB(32);
191 
192 		base = tom - tseg_size - dev_priv->gtt.stolen_size;
193 	}
194 
195 	if (base == 0)
196 		return 0;
197 
198 	/* make sure we don't clobber the GTT if it's within stolen memory */
199 	if (INTEL_INFO(dev)->gen <= 4 && !IS_G33(dev) && !IS_G4X(dev)) {
200 		struct {
201 			u32 start, end;
202 		} stolen[2] = {
203 			{ .start = base, .end = base + dev_priv->gtt.stolen_size, },
204 			{ .start = base, .end = base + dev_priv->gtt.stolen_size, },
205 		};
206 		u64 gtt_start, gtt_end;
207 
208 		gtt_start = I915_READ(PGTBL_CTL);
209 		if (IS_GEN4(dev))
210 			gtt_start = (gtt_start & PGTBL_ADDRESS_LO_MASK) |
211 				(gtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
212 		else
213 			gtt_start &= PGTBL_ADDRESS_LO_MASK;
214 		gtt_end = gtt_start + gtt_total_entries(dev_priv->gtt) * 4;
215 
216 		if (gtt_start >= stolen[0].start && gtt_start < stolen[0].end)
217 			stolen[0].end = gtt_start;
218 		if (gtt_end > stolen[1].start && gtt_end <= stolen[1].end)
219 			stolen[1].start = gtt_end;
220 
221 		/* pick the larger of the two chunks */
222 		if (stolen[0].end - stolen[0].start >
223 		    stolen[1].end - stolen[1].start) {
224 			base = stolen[0].start;
225 			dev_priv->gtt.stolen_size = stolen[0].end - stolen[0].start;
226 		} else {
227 			base = stolen[1].start;
228 			dev_priv->gtt.stolen_size = stolen[1].end - stolen[1].start;
229 		}
230 
231 		if (stolen[0].start != stolen[1].start ||
232 		    stolen[0].end != stolen[1].end) {
233 			DRM_DEBUG_KMS("GTT within stolen memory at 0x%llx-0x%llx\n",
234 				      (unsigned long long) gtt_start,
235 				      (unsigned long long) gtt_end - 1);
236 			DRM_DEBUG_KMS("Stolen memory adjusted to 0x%x-0x%x\n",
237 				      base, base + (u32) dev_priv->gtt.stolen_size - 1);
238 		}
239 	}
240 
241 
242 	/* Verify that nothing else uses this physical address. Stolen
243 	 * memory should be reserved by the BIOS and hidden from the
244 	 * kernel. So if the region is already marked as busy, something
245 	 * is seriously wrong.
246 	 */
247 	r = devm_request_mem_region(dev->dev, base, dev_priv->gtt.stolen_size,
248 				    "Graphics Stolen Memory");
249 	if (r == NULL) {
250 		/*
251 		 * One more attempt but this time requesting region from
252 		 * base + 1, as we have seen that this resolves the region
253 		 * conflict with the PCI Bus.
254 		 * This is a BIOS w/a: Some BIOS wrap stolen in the root
255 		 * PCI bus, but have an off-by-one error. Hence retry the
256 		 * reservation starting from 1 instead of 0.
257 		 */
258 		r = devm_request_mem_region(dev->dev, base + 1,
259 					    dev_priv->gtt.stolen_size - 1,
260 					    "Graphics Stolen Memory");
261 		/*
262 		 * GEN3 firmware likes to smash pci bridges into the stolen
263 		 * range. Apparently this works.
264 		 */
265 		if (r == NULL && !IS_GEN3(dev)) {
266 			DRM_ERROR("conflict detected with stolen region: [0x%08x - 0x%08x]\n",
267 				  base, base + (uint32_t)dev_priv->gtt.stolen_size);
268 			base = 0;
269 		}
270 	}
271 
272 	return base;
273 }
274 
i915_gem_cleanup_stolen(struct drm_device * dev)275 void i915_gem_cleanup_stolen(struct drm_device *dev)
276 {
277 	struct drm_i915_private *dev_priv = dev->dev_private;
278 
279 	if (!drm_mm_initialized(&dev_priv->mm.stolen))
280 		return;
281 
282 	drm_mm_takedown(&dev_priv->mm.stolen);
283 }
284 
g4x_get_stolen_reserved(struct drm_i915_private * dev_priv,unsigned long * base,unsigned long * size)285 static void g4x_get_stolen_reserved(struct drm_i915_private *dev_priv,
286 				    unsigned long *base, unsigned long *size)
287 {
288 	uint32_t reg_val = I915_READ(IS_GM45(dev_priv) ?
289 				     CTG_STOLEN_RESERVED :
290 				     ELK_STOLEN_RESERVED);
291 	unsigned long stolen_top = dev_priv->mm.stolen_base +
292 		dev_priv->gtt.stolen_size;
293 
294 	*base = (reg_val & G4X_STOLEN_RESERVED_ADDR2_MASK) << 16;
295 
296 	WARN_ON((reg_val & G4X_STOLEN_RESERVED_ADDR1_MASK) < *base);
297 
298 	/* On these platforms, the register doesn't have a size field, so the
299 	 * size is the distance between the base and the top of the stolen
300 	 * memory. We also have the genuine case where base is zero and there's
301 	 * nothing reserved. */
302 	if (*base == 0)
303 		*size = 0;
304 	else
305 		*size = stolen_top - *base;
306 }
307 
gen6_get_stolen_reserved(struct drm_i915_private * dev_priv,unsigned long * base,unsigned long * size)308 static void gen6_get_stolen_reserved(struct drm_i915_private *dev_priv,
309 				     unsigned long *base, unsigned long *size)
310 {
311 	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
312 
313 	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
314 
315 	switch (reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK) {
316 	case GEN6_STOLEN_RESERVED_1M:
317 		*size = 1024 * 1024;
318 		break;
319 	case GEN6_STOLEN_RESERVED_512K:
320 		*size = 512 * 1024;
321 		break;
322 	case GEN6_STOLEN_RESERVED_256K:
323 		*size = 256 * 1024;
324 		break;
325 	case GEN6_STOLEN_RESERVED_128K:
326 		*size = 128 * 1024;
327 		break;
328 	default:
329 		*size = 1024 * 1024;
330 		MISSING_CASE(reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK);
331 	}
332 }
333 
gen7_get_stolen_reserved(struct drm_i915_private * dev_priv,unsigned long * base,unsigned long * size)334 static void gen7_get_stolen_reserved(struct drm_i915_private *dev_priv,
335 				     unsigned long *base, unsigned long *size)
336 {
337 	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
338 
339 	*base = reg_val & GEN7_STOLEN_RESERVED_ADDR_MASK;
340 
341 	switch (reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK) {
342 	case GEN7_STOLEN_RESERVED_1M:
343 		*size = 1024 * 1024;
344 		break;
345 	case GEN7_STOLEN_RESERVED_256K:
346 		*size = 256 * 1024;
347 		break;
348 	default:
349 		*size = 1024 * 1024;
350 		MISSING_CASE(reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK);
351 	}
352 }
353 
gen8_get_stolen_reserved(struct drm_i915_private * dev_priv,unsigned long * base,unsigned long * size)354 static void gen8_get_stolen_reserved(struct drm_i915_private *dev_priv,
355 				     unsigned long *base, unsigned long *size)
356 {
357 	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
358 
359 	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
360 
361 	switch (reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK) {
362 	case GEN8_STOLEN_RESERVED_1M:
363 		*size = 1024 * 1024;
364 		break;
365 	case GEN8_STOLEN_RESERVED_2M:
366 		*size = 2 * 1024 * 1024;
367 		break;
368 	case GEN8_STOLEN_RESERVED_4M:
369 		*size = 4 * 1024 * 1024;
370 		break;
371 	case GEN8_STOLEN_RESERVED_8M:
372 		*size = 8 * 1024 * 1024;
373 		break;
374 	default:
375 		*size = 8 * 1024 * 1024;
376 		MISSING_CASE(reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK);
377 	}
378 }
379 
bdw_get_stolen_reserved(struct drm_i915_private * dev_priv,unsigned long * base,unsigned long * size)380 static void bdw_get_stolen_reserved(struct drm_i915_private *dev_priv,
381 				    unsigned long *base, unsigned long *size)
382 {
383 	uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
384 	unsigned long stolen_top;
385 
386 	stolen_top = dev_priv->mm.stolen_base + dev_priv->gtt.stolen_size;
387 
388 	*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
389 
390 	/* On these platforms, the register doesn't have a size field, so the
391 	 * size is the distance between the base and the top of the stolen
392 	 * memory. We also have the genuine case where base is zero and there's
393 	 * nothing reserved. */
394 	if (*base == 0)
395 		*size = 0;
396 	else
397 		*size = stolen_top - *base;
398 }
399 
i915_gem_init_stolen(struct drm_device * dev)400 int i915_gem_init_stolen(struct drm_device *dev)
401 {
402 	struct drm_i915_private *dev_priv = dev->dev_private;
403 	unsigned long reserved_total, reserved_base = 0, reserved_size;
404 	unsigned long stolen_top;
405 
406 	mutex_init(&dev_priv->mm.stolen_lock);
407 
408 #ifdef CONFIG_INTEL_IOMMU
409 	if (intel_iommu_gfx_mapped && INTEL_INFO(dev)->gen < 8) {
410 		DRM_INFO("DMAR active, disabling use of stolen memory\n");
411 		return 0;
412 	}
413 #endif
414 
415 	if (dev_priv->gtt.stolen_size == 0)
416 		return 0;
417 
418 	dev_priv->mm.stolen_base = i915_stolen_to_physical(dev);
419 	if (dev_priv->mm.stolen_base == 0)
420 		return 0;
421 
422 	stolen_top = dev_priv->mm.stolen_base + dev_priv->gtt.stolen_size;
423 
424 	switch (INTEL_INFO(dev_priv)->gen) {
425 	case 2:
426 	case 3:
427 		break;
428 	case 4:
429 		if (IS_G4X(dev))
430 			g4x_get_stolen_reserved(dev_priv, &reserved_base,
431 						&reserved_size);
432 		break;
433 	case 5:
434 		/* Assume the gen6 maximum for the older platforms. */
435 		reserved_size = 1024 * 1024;
436 		reserved_base = stolen_top - reserved_size;
437 		break;
438 	case 6:
439 		gen6_get_stolen_reserved(dev_priv, &reserved_base,
440 					 &reserved_size);
441 		break;
442 	case 7:
443 		gen7_get_stolen_reserved(dev_priv, &reserved_base,
444 					 &reserved_size);
445 		break;
446 	default:
447 		if (IS_BROADWELL(dev_priv) || IS_SKYLAKE(dev_priv))
448 			bdw_get_stolen_reserved(dev_priv, &reserved_base,
449 						&reserved_size);
450 		else
451 			gen8_get_stolen_reserved(dev_priv, &reserved_base,
452 						 &reserved_size);
453 		break;
454 	}
455 
456 	/* It is possible for the reserved base to be zero, but the register
457 	 * field for size doesn't have a zero option. */
458 	if (reserved_base == 0) {
459 		reserved_size = 0;
460 		reserved_base = stolen_top;
461 	}
462 
463 	if (reserved_base < dev_priv->mm.stolen_base ||
464 	    reserved_base + reserved_size > stolen_top) {
465 		DRM_DEBUG_KMS("Stolen reserved area [0x%08lx - 0x%08lx] outside stolen memory [0x%08lx - 0x%08lx]\n",
466 			      reserved_base, reserved_base + reserved_size,
467 			      dev_priv->mm.stolen_base, stolen_top);
468 		return 0;
469 	}
470 
471 	/* It is possible for the reserved area to end before the end of stolen
472 	 * memory, so just consider the start. */
473 	reserved_total = stolen_top - reserved_base;
474 
475 	DRM_DEBUG_KMS("Memory reserved for graphics device: %zuK, usable: %luK\n",
476 		      dev_priv->gtt.stolen_size >> 10,
477 		      (dev_priv->gtt.stolen_size - reserved_total) >> 10);
478 
479 	dev_priv->gtt.stolen_usable_size = dev_priv->gtt.stolen_size -
480 					   reserved_total;
481 
482 	/*
483 	 * Basic memrange allocator for stolen space.
484 	 *
485 	 * TODO: Notice that some platforms require us to not use the first page
486 	 * of the stolen memory but their BIOSes may still put the framebuffer
487 	 * on the first page. So we don't reserve this page for now because of
488 	 * that. Our current solution is to just prevent new nodes from being
489 	 * inserted on the first page - see the check we have at
490 	 * i915_gem_stolen_insert_node_in_range(). We may want to fix the fbcon
491 	 * problem later.
492 	 */
493 	drm_mm_init(&dev_priv->mm.stolen, 0, dev_priv->gtt.stolen_usable_size);
494 
495 	return 0;
496 }
497 
498 static struct sg_table *
i915_pages_create_for_stolen(struct drm_device * dev,u32 offset,u32 size)499 i915_pages_create_for_stolen(struct drm_device *dev,
500 			     u32 offset, u32 size)
501 {
502 	struct drm_i915_private *dev_priv = dev->dev_private;
503 	struct sg_table *st;
504 	struct scatterlist *sg;
505 
506 	DRM_DEBUG_DRIVER("offset=0x%x, size=%d\n", offset, size);
507 	BUG_ON(offset > dev_priv->gtt.stolen_size - size);
508 
509 	/* We hide that we have no struct page backing our stolen object
510 	 * by wrapping the contiguous physical allocation with a fake
511 	 * dma mapping in a single scatterlist.
512 	 */
513 
514 	st = kmalloc(sizeof(*st), GFP_KERNEL);
515 	if (st == NULL)
516 		return NULL;
517 
518 	if (sg_alloc_table(st, 1, GFP_KERNEL)) {
519 		kfree(st);
520 		return NULL;
521 	}
522 
523 	sg = st->sgl;
524 	sg->offset = 0;
525 	sg->length = size;
526 
527 	sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset;
528 	sg_dma_len(sg) = size;
529 
530 	return st;
531 }
532 
i915_gem_object_get_pages_stolen(struct drm_i915_gem_object * obj)533 static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
534 {
535 	BUG();
536 	return -EINVAL;
537 }
538 
i915_gem_object_put_pages_stolen(struct drm_i915_gem_object * obj)539 static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj)
540 {
541 	/* Should only be called during free */
542 	sg_free_table(obj->pages);
543 	kfree(obj->pages);
544 }
545 
546 
547 static void
i915_gem_object_release_stolen(struct drm_i915_gem_object * obj)548 i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
549 {
550 	struct drm_i915_private *dev_priv = obj->base.dev->dev_private;
551 
552 	if (obj->stolen) {
553 		i915_gem_stolen_remove_node(dev_priv, obj->stolen);
554 		kfree(obj->stolen);
555 		obj->stolen = NULL;
556 	}
557 }
558 static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
559 	.get_pages = i915_gem_object_get_pages_stolen,
560 	.put_pages = i915_gem_object_put_pages_stolen,
561 	.release = i915_gem_object_release_stolen,
562 };
563 
564 static struct drm_i915_gem_object *
_i915_gem_object_create_stolen(struct drm_device * dev,struct drm_mm_node * stolen)565 _i915_gem_object_create_stolen(struct drm_device *dev,
566 			       struct drm_mm_node *stolen)
567 {
568 	struct drm_i915_gem_object *obj;
569 
570 	obj = i915_gem_object_alloc(dev);
571 	if (obj == NULL)
572 		return NULL;
573 
574 	drm_gem_private_object_init(dev, &obj->base, stolen->size);
575 	i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
576 
577 	obj->pages = i915_pages_create_for_stolen(dev,
578 						  stolen->start, stolen->size);
579 	if (obj->pages == NULL)
580 		goto cleanup;
581 
582 	i915_gem_object_pin_pages(obj);
583 	obj->stolen = stolen;
584 
585 	obj->base.read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
586 	obj->cache_level = HAS_LLC(dev) ? I915_CACHE_LLC : I915_CACHE_NONE;
587 
588 	return obj;
589 
590 cleanup:
591 	i915_gem_object_free(obj);
592 	return NULL;
593 }
594 
595 struct drm_i915_gem_object *
i915_gem_object_create_stolen(struct drm_device * dev,u32 size)596 i915_gem_object_create_stolen(struct drm_device *dev, u32 size)
597 {
598 	struct drm_i915_private *dev_priv = dev->dev_private;
599 	struct drm_i915_gem_object *obj;
600 	struct drm_mm_node *stolen;
601 	int ret;
602 
603 	if (!drm_mm_initialized(&dev_priv->mm.stolen))
604 		return NULL;
605 
606 	DRM_DEBUG_KMS("creating stolen object: size=%x\n", size);
607 	if (size == 0)
608 		return NULL;
609 
610 	stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
611 	if (!stolen)
612 		return NULL;
613 
614 	ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096);
615 	if (ret) {
616 		kfree(stolen);
617 		return NULL;
618 	}
619 
620 	obj = _i915_gem_object_create_stolen(dev, stolen);
621 	if (obj)
622 		return obj;
623 
624 	i915_gem_stolen_remove_node(dev_priv, stolen);
625 	kfree(stolen);
626 	return NULL;
627 }
628 
629 struct drm_i915_gem_object *
i915_gem_object_create_stolen_for_preallocated(struct drm_device * dev,u32 stolen_offset,u32 gtt_offset,u32 size)630 i915_gem_object_create_stolen_for_preallocated(struct drm_device *dev,
631 					       u32 stolen_offset,
632 					       u32 gtt_offset,
633 					       u32 size)
634 {
635 	struct drm_i915_private *dev_priv = dev->dev_private;
636 	struct i915_address_space *ggtt = &dev_priv->gtt.base;
637 	struct drm_i915_gem_object *obj;
638 	struct drm_mm_node *stolen;
639 	struct i915_vma *vma;
640 	int ret;
641 
642 	if (!drm_mm_initialized(&dev_priv->mm.stolen))
643 		return NULL;
644 
645 	DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n",
646 			stolen_offset, gtt_offset, size);
647 
648 	/* KISS and expect everything to be page-aligned */
649 	if (WARN_ON(size == 0) || WARN_ON(size & 4095) ||
650 	    WARN_ON(stolen_offset & 4095))
651 		return NULL;
652 
653 	stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
654 	if (!stolen)
655 		return NULL;
656 
657 	stolen->start = stolen_offset;
658 	stolen->size = size;
659 	mutex_lock(&dev_priv->mm.stolen_lock);
660 	ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
661 	mutex_unlock(&dev_priv->mm.stolen_lock);
662 	if (ret) {
663 		DRM_DEBUG_KMS("failed to allocate stolen space\n");
664 		kfree(stolen);
665 		return NULL;
666 	}
667 
668 	obj = _i915_gem_object_create_stolen(dev, stolen);
669 	if (obj == NULL) {
670 		DRM_DEBUG_KMS("failed to allocate stolen object\n");
671 		i915_gem_stolen_remove_node(dev_priv, stolen);
672 		kfree(stolen);
673 		return NULL;
674 	}
675 
676 	/* Some objects just need physical mem from stolen space */
677 	if (gtt_offset == I915_GTT_OFFSET_NONE)
678 		return obj;
679 
680 	vma = i915_gem_obj_lookup_or_create_vma(obj, ggtt);
681 	if (IS_ERR(vma)) {
682 		ret = PTR_ERR(vma);
683 		goto err;
684 	}
685 
686 	/* To simplify the initialisation sequence between KMS and GTT,
687 	 * we allow construction of the stolen object prior to
688 	 * setting up the GTT space. The actual reservation will occur
689 	 * later.
690 	 */
691 	vma->node.start = gtt_offset;
692 	vma->node.size = size;
693 	if (drm_mm_initialized(&ggtt->mm)) {
694 		ret = drm_mm_reserve_node(&ggtt->mm, &vma->node);
695 		if (ret) {
696 			DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
697 			goto err;
698 		}
699 
700 		vma->bound |= GLOBAL_BIND;
701 		__i915_vma_set_map_and_fenceable(vma);
702 		list_add_tail(&vma->mm_list, &ggtt->inactive_list);
703 	}
704 
705 	list_add_tail(&obj->global_list, &dev_priv->mm.bound_list);
706 	i915_gem_object_pin_pages(obj);
707 
708 	return obj;
709 
710 err:
711 	drm_gem_object_unreference(&obj->base);
712 	return NULL;
713 }
714