mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-25 22:45:23 +07:00
b8f55be644
Another month, another story in the cache coherency saga. This time, we
come to the realisation that i915_gem_object_is_coherent() has been
reporting whether we can read from the target without requiring a cache
invalidate; but we were using it in places for testing whether we could
write into the object without requiring a cache flush. So split the
tracking into two, one to decide before reads, one after writes.
See commit e27ab73d17
("drm/i915: Mark CPU cache as dirty on every
transition for CPU writes") for the previous entry in this saga.
v2: Be verbose
v3: Remove unused function (i915_gem_object_is_coherent)
v4: Fix inverted coherency check prior to execbuf (from v2)
v5: Add comment for nasty code where we are optimising on gcc's behalf.
Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=101109
Bugzilla: https://bugs.freedesktop.org/show_bug.cgi?id=101555
Testcase: igt/kms_mmap_write_crc
Testcase: igt/kms_pwrite_crc
Signed-off-by: Chris Wilson <chris@chris-wilson.co.uk>
Cc: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
Cc: Dongwon Kim <dongwon.kim@intel.com>
Cc: Matt Roper <matthew.d.roper@intel.com>
Cc: Joonas Lahtinen <joonas.lahtinen@linux.intel.com>
Cc: Mika Kuoppala <mika.kuoppala@linux.intel.com>
Tested-by: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
Acked-by: Maarten Lankhorst <maarten.lankhorst@linux.intel.com>
Link: https://patchwork.freedesktop.org/patch/msgid/20170811111116.10373-1-chris@chris-wilson.co.uk
Reviewed-by: Joonas Lahtinen <joonas.lahtinen@linux.intel.com>
732 lines
20 KiB
C
732 lines
20 KiB
C
/*
|
|
* Copyright © 2008-2012 Intel Corporation
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
|
* copy of this software and associated documentation files (the "Software"),
|
|
* to deal in the Software without restriction, including without limitation
|
|
* the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
* and/or sell copies of the Software, and to permit persons to whom the
|
|
* Software is furnished to do so, subject to the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice (including the next
|
|
* paragraph) shall be included in all copies or substantial portions of the
|
|
* Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
* THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
* FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
|
* IN THE SOFTWARE.
|
|
*
|
|
* Authors:
|
|
* Eric Anholt <eric@anholt.net>
|
|
* Chris Wilson <chris@chris-wilson.co.uk>
|
|
*
|
|
*/
|
|
|
|
#include <drm/drmP.h>
|
|
#include <drm/i915_drm.h>
|
|
#include "i915_drv.h"
|
|
|
|
#define KB(x) ((x) * 1024)
|
|
#define MB(x) (KB(x) * 1024)
|
|
|
|
/*
|
|
* The BIOS typically reserves some of the system's memory for the exclusive
|
|
* use of the integrated graphics. This memory is no longer available for
|
|
* use by the OS and so the user finds that his system has less memory
|
|
* available than he put in. We refer to this memory as stolen.
|
|
*
|
|
* The BIOS will allocate its framebuffer from the stolen memory. Our
|
|
* goal is try to reuse that object for our own fbcon which must always
|
|
* be available for panics. Anything else we can reuse the stolen memory
|
|
* for is a boon.
|
|
*/
|
|
|
|
int i915_gem_stolen_insert_node_in_range(struct drm_i915_private *dev_priv,
|
|
struct drm_mm_node *node, u64 size,
|
|
unsigned alignment, u64 start, u64 end)
|
|
{
|
|
int ret;
|
|
|
|
if (!drm_mm_initialized(&dev_priv->mm.stolen))
|
|
return -ENODEV;
|
|
|
|
mutex_lock(&dev_priv->mm.stolen_lock);
|
|
ret = drm_mm_insert_node_in_range(&dev_priv->mm.stolen, node,
|
|
size, alignment, 0,
|
|
start, end, DRM_MM_INSERT_BEST);
|
|
mutex_unlock(&dev_priv->mm.stolen_lock);
|
|
|
|
return ret;
|
|
}
|
|
|
|
int i915_gem_stolen_insert_node(struct drm_i915_private *dev_priv,
|
|
struct drm_mm_node *node, u64 size,
|
|
unsigned alignment)
|
|
{
|
|
return i915_gem_stolen_insert_node_in_range(dev_priv, node, size,
|
|
alignment, 0, U64_MAX);
|
|
}
|
|
|
|
void i915_gem_stolen_remove_node(struct drm_i915_private *dev_priv,
|
|
struct drm_mm_node *node)
|
|
{
|
|
mutex_lock(&dev_priv->mm.stolen_lock);
|
|
drm_mm_remove_node(node);
|
|
mutex_unlock(&dev_priv->mm.stolen_lock);
|
|
}
|
|
|
|
static dma_addr_t i915_stolen_to_dma(struct drm_i915_private *dev_priv)
|
|
{
|
|
struct pci_dev *pdev = dev_priv->drm.pdev;
|
|
struct i915_ggtt *ggtt = &dev_priv->ggtt;
|
|
struct resource *r;
|
|
dma_addr_t base;
|
|
|
|
/* Almost universally we can find the Graphics Base of Stolen Memory
|
|
* at register BSM (0x5c) in the igfx configuration space. On a few
|
|
* (desktop) machines this is also mirrored in the bridge device at
|
|
* different locations, or in the MCHBAR.
|
|
*
|
|
* On 865 we just check the TOUD register.
|
|
*
|
|
* On 830/845/85x the stolen memory base isn't available in any
|
|
* register. We need to calculate it as TOM-TSEG_SIZE-stolen_size.
|
|
*
|
|
*/
|
|
base = 0;
|
|
if (INTEL_GEN(dev_priv) >= 3) {
|
|
u32 bsm;
|
|
|
|
pci_read_config_dword(pdev, INTEL_BSM, &bsm);
|
|
|
|
base = bsm & INTEL_BSM_MASK;
|
|
} else if (IS_I865G(dev_priv)) {
|
|
u32 tseg_size = 0;
|
|
u16 toud = 0;
|
|
u8 tmp;
|
|
|
|
pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
|
|
I845_ESMRAMC, &tmp);
|
|
|
|
if (tmp & TSEG_ENABLE) {
|
|
switch (tmp & I845_TSEG_SIZE_MASK) {
|
|
case I845_TSEG_SIZE_512K:
|
|
tseg_size = KB(512);
|
|
break;
|
|
case I845_TSEG_SIZE_1M:
|
|
tseg_size = MB(1);
|
|
break;
|
|
}
|
|
}
|
|
|
|
pci_bus_read_config_word(pdev->bus, PCI_DEVFN(0, 0),
|
|
I865_TOUD, &toud);
|
|
|
|
base = (toud << 16) + tseg_size;
|
|
} else if (IS_I85X(dev_priv)) {
|
|
u32 tseg_size = 0;
|
|
u32 tom;
|
|
u8 tmp;
|
|
|
|
pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
|
|
I85X_ESMRAMC, &tmp);
|
|
|
|
if (tmp & TSEG_ENABLE)
|
|
tseg_size = MB(1);
|
|
|
|
pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 1),
|
|
I85X_DRB3, &tmp);
|
|
tom = tmp * MB(32);
|
|
|
|
base = tom - tseg_size - ggtt->stolen_size;
|
|
} else if (IS_I845G(dev_priv)) {
|
|
u32 tseg_size = 0;
|
|
u32 tom;
|
|
u8 tmp;
|
|
|
|
pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
|
|
I845_ESMRAMC, &tmp);
|
|
|
|
if (tmp & TSEG_ENABLE) {
|
|
switch (tmp & I845_TSEG_SIZE_MASK) {
|
|
case I845_TSEG_SIZE_512K:
|
|
tseg_size = KB(512);
|
|
break;
|
|
case I845_TSEG_SIZE_1M:
|
|
tseg_size = MB(1);
|
|
break;
|
|
}
|
|
}
|
|
|
|
pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
|
|
I830_DRB3, &tmp);
|
|
tom = tmp * MB(32);
|
|
|
|
base = tom - tseg_size - ggtt->stolen_size;
|
|
} else if (IS_I830(dev_priv)) {
|
|
u32 tseg_size = 0;
|
|
u32 tom;
|
|
u8 tmp;
|
|
|
|
pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
|
|
I830_ESMRAMC, &tmp);
|
|
|
|
if (tmp & TSEG_ENABLE) {
|
|
if (tmp & I830_TSEG_SIZE_1M)
|
|
tseg_size = MB(1);
|
|
else
|
|
tseg_size = KB(512);
|
|
}
|
|
|
|
pci_bus_read_config_byte(pdev->bus, PCI_DEVFN(0, 0),
|
|
I830_DRB3, &tmp);
|
|
tom = tmp * MB(32);
|
|
|
|
base = tom - tseg_size - ggtt->stolen_size;
|
|
}
|
|
|
|
if (base == 0 || add_overflows(base, ggtt->stolen_size))
|
|
return 0;
|
|
|
|
/* make sure we don't clobber the GTT if it's within stolen memory */
|
|
if (INTEL_GEN(dev_priv) <= 4 &&
|
|
!IS_G33(dev_priv) && !IS_PINEVIEW(dev_priv) && !IS_G4X(dev_priv)) {
|
|
struct {
|
|
dma_addr_t start, end;
|
|
} stolen[2] = {
|
|
{ .start = base, .end = base + ggtt->stolen_size, },
|
|
{ .start = base, .end = base + ggtt->stolen_size, },
|
|
};
|
|
u64 ggtt_start, ggtt_end;
|
|
|
|
ggtt_start = I915_READ(PGTBL_CTL);
|
|
if (IS_GEN4(dev_priv))
|
|
ggtt_start = (ggtt_start & PGTBL_ADDRESS_LO_MASK) |
|
|
(ggtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
|
|
else
|
|
ggtt_start &= PGTBL_ADDRESS_LO_MASK;
|
|
ggtt_end = ggtt_start + ggtt_total_entries(ggtt) * 4;
|
|
|
|
if (ggtt_start >= stolen[0].start && ggtt_start < stolen[0].end)
|
|
stolen[0].end = ggtt_start;
|
|
if (ggtt_end > stolen[1].start && ggtt_end <= stolen[1].end)
|
|
stolen[1].start = ggtt_end;
|
|
|
|
/* pick the larger of the two chunks */
|
|
if (stolen[0].end - stolen[0].start >
|
|
stolen[1].end - stolen[1].start) {
|
|
base = stolen[0].start;
|
|
ggtt->stolen_size = stolen[0].end - stolen[0].start;
|
|
} else {
|
|
base = stolen[1].start;
|
|
ggtt->stolen_size = stolen[1].end - stolen[1].start;
|
|
}
|
|
|
|
if (stolen[0].start != stolen[1].start ||
|
|
stolen[0].end != stolen[1].end) {
|
|
dma_addr_t end = base + ggtt->stolen_size - 1;
|
|
|
|
DRM_DEBUG_KMS("GTT within stolen memory at 0x%llx-0x%llx\n",
|
|
(unsigned long long)ggtt_start,
|
|
(unsigned long long)ggtt_end - 1);
|
|
DRM_DEBUG_KMS("Stolen memory adjusted to %pad - %pad\n",
|
|
&base, &end);
|
|
}
|
|
}
|
|
|
|
|
|
/* Verify that nothing else uses this physical address. Stolen
|
|
* memory should be reserved by the BIOS and hidden from the
|
|
* kernel. So if the region is already marked as busy, something
|
|
* is seriously wrong.
|
|
*/
|
|
r = devm_request_mem_region(dev_priv->drm.dev, base, ggtt->stolen_size,
|
|
"Graphics Stolen Memory");
|
|
if (r == NULL) {
|
|
/*
|
|
* One more attempt but this time requesting region from
|
|
* base + 1, as we have seen that this resolves the region
|
|
* conflict with the PCI Bus.
|
|
* This is a BIOS w/a: Some BIOS wrap stolen in the root
|
|
* PCI bus, but have an off-by-one error. Hence retry the
|
|
* reservation starting from 1 instead of 0.
|
|
* There's also BIOS with off-by-one on the other end.
|
|
*/
|
|
r = devm_request_mem_region(dev_priv->drm.dev, base + 1,
|
|
ggtt->stolen_size - 2,
|
|
"Graphics Stolen Memory");
|
|
/*
|
|
* GEN3 firmware likes to smash pci bridges into the stolen
|
|
* range. Apparently this works.
|
|
*/
|
|
if (r == NULL && !IS_GEN3(dev_priv)) {
|
|
dma_addr_t end = base + ggtt->stolen_size;
|
|
|
|
DRM_ERROR("conflict detected with stolen region: [%pad - %pad]\n",
|
|
&base, &end);
|
|
base = 0;
|
|
}
|
|
}
|
|
|
|
return base;
|
|
}
|
|
|
|
void i915_gem_cleanup_stolen(struct drm_device *dev)
|
|
{
|
|
struct drm_i915_private *dev_priv = to_i915(dev);
|
|
|
|
if (!drm_mm_initialized(&dev_priv->mm.stolen))
|
|
return;
|
|
|
|
drm_mm_takedown(&dev_priv->mm.stolen);
|
|
}
|
|
|
|
static void g4x_get_stolen_reserved(struct drm_i915_private *dev_priv,
|
|
dma_addr_t *base, u32 *size)
|
|
{
|
|
struct i915_ggtt *ggtt = &dev_priv->ggtt;
|
|
uint32_t reg_val = I915_READ(IS_GM45(dev_priv) ?
|
|
CTG_STOLEN_RESERVED :
|
|
ELK_STOLEN_RESERVED);
|
|
dma_addr_t stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
|
|
|
|
*base = (reg_val & G4X_STOLEN_RESERVED_ADDR2_MASK) << 16;
|
|
|
|
WARN_ON((reg_val & G4X_STOLEN_RESERVED_ADDR1_MASK) < *base);
|
|
|
|
/* On these platforms, the register doesn't have a size field, so the
|
|
* size is the distance between the base and the top of the stolen
|
|
* memory. We also have the genuine case where base is zero and there's
|
|
* nothing reserved. */
|
|
if (*base == 0)
|
|
*size = 0;
|
|
else
|
|
*size = stolen_top - *base;
|
|
}
|
|
|
|
static void gen6_get_stolen_reserved(struct drm_i915_private *dev_priv,
|
|
dma_addr_t *base, u32 *size)
|
|
{
|
|
uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
|
|
|
|
*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
|
|
|
|
switch (reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK) {
|
|
case GEN6_STOLEN_RESERVED_1M:
|
|
*size = 1024 * 1024;
|
|
break;
|
|
case GEN6_STOLEN_RESERVED_512K:
|
|
*size = 512 * 1024;
|
|
break;
|
|
case GEN6_STOLEN_RESERVED_256K:
|
|
*size = 256 * 1024;
|
|
break;
|
|
case GEN6_STOLEN_RESERVED_128K:
|
|
*size = 128 * 1024;
|
|
break;
|
|
default:
|
|
*size = 1024 * 1024;
|
|
MISSING_CASE(reg_val & GEN6_STOLEN_RESERVED_SIZE_MASK);
|
|
}
|
|
}
|
|
|
|
static void gen7_get_stolen_reserved(struct drm_i915_private *dev_priv,
|
|
dma_addr_t *base, u32 *size)
|
|
{
|
|
uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
|
|
|
|
*base = reg_val & GEN7_STOLEN_RESERVED_ADDR_MASK;
|
|
|
|
switch (reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK) {
|
|
case GEN7_STOLEN_RESERVED_1M:
|
|
*size = 1024 * 1024;
|
|
break;
|
|
case GEN7_STOLEN_RESERVED_256K:
|
|
*size = 256 * 1024;
|
|
break;
|
|
default:
|
|
*size = 1024 * 1024;
|
|
MISSING_CASE(reg_val & GEN7_STOLEN_RESERVED_SIZE_MASK);
|
|
}
|
|
}
|
|
|
|
static void chv_get_stolen_reserved(struct drm_i915_private *dev_priv,
|
|
dma_addr_t *base, u32 *size)
|
|
{
|
|
uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
|
|
|
|
*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
|
|
|
|
switch (reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK) {
|
|
case GEN8_STOLEN_RESERVED_1M:
|
|
*size = 1024 * 1024;
|
|
break;
|
|
case GEN8_STOLEN_RESERVED_2M:
|
|
*size = 2 * 1024 * 1024;
|
|
break;
|
|
case GEN8_STOLEN_RESERVED_4M:
|
|
*size = 4 * 1024 * 1024;
|
|
break;
|
|
case GEN8_STOLEN_RESERVED_8M:
|
|
*size = 8 * 1024 * 1024;
|
|
break;
|
|
default:
|
|
*size = 8 * 1024 * 1024;
|
|
MISSING_CASE(reg_val & GEN8_STOLEN_RESERVED_SIZE_MASK);
|
|
}
|
|
}
|
|
|
|
static void bdw_get_stolen_reserved(struct drm_i915_private *dev_priv,
|
|
dma_addr_t *base, u32 *size)
|
|
{
|
|
struct i915_ggtt *ggtt = &dev_priv->ggtt;
|
|
uint32_t reg_val = I915_READ(GEN6_STOLEN_RESERVED);
|
|
dma_addr_t stolen_top;
|
|
|
|
stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
|
|
|
|
*base = reg_val & GEN6_STOLEN_RESERVED_ADDR_MASK;
|
|
|
|
/* On these platforms, the register doesn't have a size field, so the
|
|
* size is the distance between the base and the top of the stolen
|
|
* memory. We also have the genuine case where base is zero and there's
|
|
* nothing reserved. */
|
|
if (*base == 0)
|
|
*size = 0;
|
|
else
|
|
*size = stolen_top - *base;
|
|
}
|
|
|
|
int i915_gem_init_stolen(struct drm_i915_private *dev_priv)
|
|
{
|
|
struct i915_ggtt *ggtt = &dev_priv->ggtt;
|
|
dma_addr_t reserved_base, stolen_top;
|
|
u32 reserved_total, reserved_size;
|
|
u32 stolen_usable_start;
|
|
|
|
mutex_init(&dev_priv->mm.stolen_lock);
|
|
|
|
if (intel_vgpu_active(dev_priv)) {
|
|
DRM_INFO("iGVT-g active, disabling use of stolen memory\n");
|
|
return 0;
|
|
}
|
|
|
|
if (intel_vtd_active() && INTEL_GEN(dev_priv) < 8) {
|
|
DRM_INFO("DMAR active, disabling use of stolen memory\n");
|
|
return 0;
|
|
}
|
|
|
|
if (ggtt->stolen_size == 0)
|
|
return 0;
|
|
|
|
dev_priv->mm.stolen_base = i915_stolen_to_dma(dev_priv);
|
|
if (dev_priv->mm.stolen_base == 0)
|
|
return 0;
|
|
|
|
stolen_top = dev_priv->mm.stolen_base + ggtt->stolen_size;
|
|
reserved_base = 0;
|
|
reserved_size = 0;
|
|
|
|
switch (INTEL_INFO(dev_priv)->gen) {
|
|
case 2:
|
|
case 3:
|
|
break;
|
|
case 4:
|
|
if (IS_G4X(dev_priv))
|
|
g4x_get_stolen_reserved(dev_priv,
|
|
&reserved_base, &reserved_size);
|
|
break;
|
|
case 5:
|
|
/* Assume the gen6 maximum for the older platforms. */
|
|
reserved_size = 1024 * 1024;
|
|
reserved_base = stolen_top - reserved_size;
|
|
break;
|
|
case 6:
|
|
gen6_get_stolen_reserved(dev_priv,
|
|
&reserved_base, &reserved_size);
|
|
break;
|
|
case 7:
|
|
gen7_get_stolen_reserved(dev_priv,
|
|
&reserved_base, &reserved_size);
|
|
break;
|
|
default:
|
|
if (IS_LP(dev_priv))
|
|
chv_get_stolen_reserved(dev_priv,
|
|
&reserved_base, &reserved_size);
|
|
else
|
|
bdw_get_stolen_reserved(dev_priv,
|
|
&reserved_base, &reserved_size);
|
|
break;
|
|
}
|
|
|
|
/* It is possible for the reserved base to be zero, but the register
|
|
* field for size doesn't have a zero option. */
|
|
if (reserved_base == 0) {
|
|
reserved_size = 0;
|
|
reserved_base = stolen_top;
|
|
}
|
|
|
|
if (reserved_base < dev_priv->mm.stolen_base ||
|
|
reserved_base + reserved_size > stolen_top) {
|
|
dma_addr_t reserved_top = reserved_base + reserved_size;
|
|
DRM_DEBUG_KMS("Stolen reserved area [%pad - %pad] outside stolen memory [%pad - %pad]\n",
|
|
&reserved_base, &reserved_top,
|
|
&dev_priv->mm.stolen_base, &stolen_top);
|
|
return 0;
|
|
}
|
|
|
|
ggtt->stolen_reserved_base = reserved_base;
|
|
ggtt->stolen_reserved_size = reserved_size;
|
|
|
|
/* It is possible for the reserved area to end before the end of stolen
|
|
* memory, so just consider the start. */
|
|
reserved_total = stolen_top - reserved_base;
|
|
|
|
DRM_DEBUG_KMS("Memory reserved for graphics device: %uK, usable: %uK\n",
|
|
ggtt->stolen_size >> 10,
|
|
(ggtt->stolen_size - reserved_total) >> 10);
|
|
|
|
stolen_usable_start = 0;
|
|
/* WaSkipStolenMemoryFirstPage:bdw+ */
|
|
if (INTEL_GEN(dev_priv) >= 8)
|
|
stolen_usable_start = 4096;
|
|
|
|
ggtt->stolen_usable_size =
|
|
ggtt->stolen_size - reserved_total - stolen_usable_start;
|
|
|
|
/* Basic memrange allocator for stolen space. */
|
|
drm_mm_init(&dev_priv->mm.stolen, stolen_usable_start,
|
|
ggtt->stolen_usable_size);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static struct sg_table *
|
|
i915_pages_create_for_stolen(struct drm_device *dev,
|
|
u32 offset, u32 size)
|
|
{
|
|
struct drm_i915_private *dev_priv = to_i915(dev);
|
|
struct sg_table *st;
|
|
struct scatterlist *sg;
|
|
|
|
GEM_BUG_ON(range_overflows(offset, size, dev_priv->ggtt.stolen_size));
|
|
|
|
/* We hide that we have no struct page backing our stolen object
|
|
* by wrapping the contiguous physical allocation with a fake
|
|
* dma mapping in a single scatterlist.
|
|
*/
|
|
|
|
st = kmalloc(sizeof(*st), GFP_KERNEL);
|
|
if (st == NULL)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
if (sg_alloc_table(st, 1, GFP_KERNEL)) {
|
|
kfree(st);
|
|
return ERR_PTR(-ENOMEM);
|
|
}
|
|
|
|
sg = st->sgl;
|
|
sg->offset = 0;
|
|
sg->length = size;
|
|
|
|
sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset;
|
|
sg_dma_len(sg) = size;
|
|
|
|
return st;
|
|
}
|
|
|
|
static struct sg_table *
|
|
i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
|
|
{
|
|
return i915_pages_create_for_stolen(obj->base.dev,
|
|
obj->stolen->start,
|
|
obj->stolen->size);
|
|
}
|
|
|
|
static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj,
|
|
struct sg_table *pages)
|
|
{
|
|
/* Should only be called from i915_gem_object_release_stolen() */
|
|
sg_free_table(pages);
|
|
kfree(pages);
|
|
}
|
|
|
|
static void
|
|
i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
|
|
{
|
|
struct drm_i915_private *dev_priv = to_i915(obj->base.dev);
|
|
struct drm_mm_node *stolen = fetch_and_zero(&obj->stolen);
|
|
|
|
GEM_BUG_ON(!stolen);
|
|
|
|
__i915_gem_object_unpin_pages(obj);
|
|
|
|
i915_gem_stolen_remove_node(dev_priv, stolen);
|
|
kfree(stolen);
|
|
}
|
|
|
|
static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
|
|
.get_pages = i915_gem_object_get_pages_stolen,
|
|
.put_pages = i915_gem_object_put_pages_stolen,
|
|
.release = i915_gem_object_release_stolen,
|
|
};
|
|
|
|
static struct drm_i915_gem_object *
|
|
_i915_gem_object_create_stolen(struct drm_i915_private *dev_priv,
|
|
struct drm_mm_node *stolen)
|
|
{
|
|
struct drm_i915_gem_object *obj;
|
|
unsigned int cache_level;
|
|
|
|
obj = i915_gem_object_alloc(dev_priv);
|
|
if (obj == NULL)
|
|
return NULL;
|
|
|
|
drm_gem_private_object_init(&dev_priv->drm, &obj->base, stolen->size);
|
|
i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
|
|
|
|
obj->stolen = stolen;
|
|
obj->base.read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
|
|
cache_level = HAS_LLC(dev_priv) ? I915_CACHE_LLC : I915_CACHE_NONE;
|
|
i915_gem_object_set_cache_coherency(obj, cache_level);
|
|
|
|
if (i915_gem_object_pin_pages(obj))
|
|
goto cleanup;
|
|
|
|
return obj;
|
|
|
|
cleanup:
|
|
i915_gem_object_free(obj);
|
|
return NULL;
|
|
}
|
|
|
|
struct drm_i915_gem_object *
|
|
i915_gem_object_create_stolen(struct drm_i915_private *dev_priv, u32 size)
|
|
{
|
|
struct drm_i915_gem_object *obj;
|
|
struct drm_mm_node *stolen;
|
|
int ret;
|
|
|
|
if (!drm_mm_initialized(&dev_priv->mm.stolen))
|
|
return NULL;
|
|
|
|
if (size == 0)
|
|
return NULL;
|
|
|
|
stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
|
|
if (!stolen)
|
|
return NULL;
|
|
|
|
ret = i915_gem_stolen_insert_node(dev_priv, stolen, size, 4096);
|
|
if (ret) {
|
|
kfree(stolen);
|
|
return NULL;
|
|
}
|
|
|
|
obj = _i915_gem_object_create_stolen(dev_priv, stolen);
|
|
if (obj)
|
|
return obj;
|
|
|
|
i915_gem_stolen_remove_node(dev_priv, stolen);
|
|
kfree(stolen);
|
|
return NULL;
|
|
}
|
|
|
|
struct drm_i915_gem_object *
|
|
i915_gem_object_create_stolen_for_preallocated(struct drm_i915_private *dev_priv,
|
|
u32 stolen_offset,
|
|
u32 gtt_offset,
|
|
u32 size)
|
|
{
|
|
struct i915_ggtt *ggtt = &dev_priv->ggtt;
|
|
struct drm_i915_gem_object *obj;
|
|
struct drm_mm_node *stolen;
|
|
struct i915_vma *vma;
|
|
int ret;
|
|
|
|
if (!drm_mm_initialized(&dev_priv->mm.stolen))
|
|
return NULL;
|
|
|
|
lockdep_assert_held(&dev_priv->drm.struct_mutex);
|
|
|
|
DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n",
|
|
stolen_offset, gtt_offset, size);
|
|
|
|
/* KISS and expect everything to be page-aligned */
|
|
if (WARN_ON(size == 0) ||
|
|
WARN_ON(!IS_ALIGNED(size, I915_GTT_PAGE_SIZE)) ||
|
|
WARN_ON(!IS_ALIGNED(stolen_offset, I915_GTT_MIN_ALIGNMENT)))
|
|
return NULL;
|
|
|
|
stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
|
|
if (!stolen)
|
|
return NULL;
|
|
|
|
stolen->start = stolen_offset;
|
|
stolen->size = size;
|
|
mutex_lock(&dev_priv->mm.stolen_lock);
|
|
ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
|
|
mutex_unlock(&dev_priv->mm.stolen_lock);
|
|
if (ret) {
|
|
DRM_DEBUG_KMS("failed to allocate stolen space\n");
|
|
kfree(stolen);
|
|
return NULL;
|
|
}
|
|
|
|
obj = _i915_gem_object_create_stolen(dev_priv, stolen);
|
|
if (obj == NULL) {
|
|
DRM_DEBUG_KMS("failed to allocate stolen object\n");
|
|
i915_gem_stolen_remove_node(dev_priv, stolen);
|
|
kfree(stolen);
|
|
return NULL;
|
|
}
|
|
|
|
/* Some objects just need physical mem from stolen space */
|
|
if (gtt_offset == I915_GTT_OFFSET_NONE)
|
|
return obj;
|
|
|
|
ret = i915_gem_object_pin_pages(obj);
|
|
if (ret)
|
|
goto err;
|
|
|
|
vma = i915_vma_instance(obj, &ggtt->base, NULL);
|
|
if (IS_ERR(vma)) {
|
|
ret = PTR_ERR(vma);
|
|
goto err_pages;
|
|
}
|
|
|
|
/* To simplify the initialisation sequence between KMS and GTT,
|
|
* we allow construction of the stolen object prior to
|
|
* setting up the GTT space. The actual reservation will occur
|
|
* later.
|
|
*/
|
|
ret = i915_gem_gtt_reserve(&ggtt->base, &vma->node,
|
|
size, gtt_offset, obj->cache_level,
|
|
0);
|
|
if (ret) {
|
|
DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
|
|
goto err_pages;
|
|
}
|
|
|
|
GEM_BUG_ON(!drm_mm_node_allocated(&vma->node));
|
|
|
|
vma->pages = obj->mm.pages;
|
|
vma->flags |= I915_VMA_GLOBAL_BIND;
|
|
__i915_vma_set_map_and_fenceable(vma);
|
|
list_move_tail(&vma->vm_link, &ggtt->base.inactive_list);
|
|
list_move_tail(&obj->global_link, &dev_priv->mm.bound_list);
|
|
obj->bind_count++;
|
|
|
|
return obj;
|
|
|
|
err_pages:
|
|
i915_gem_object_unpin_pages(obj);
|
|
err:
|
|
i915_gem_object_put(obj);
|
|
return NULL;
|
|
}
|