Subversion Repositories Kolibri OS

Rev

Rev 5060 | Rev 5367 | Go to most recent revision | Blame | Compare with Previous | Last modification | View Log | Download | RSS feed

  1. /*
  2.  * Copyright © 2008-2012 Intel Corporation
  3.  *
  4.  * Permission is hereby granted, free of charge, to any person obtaining a
  5.  * copy of this software and associated documentation files (the "Software"),
  6.  * to deal in the Software without restriction, including without limitation
  7.  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
  8.  * and/or sell copies of the Software, and to permit persons to whom the
  9.  * Software is furnished to do so, subject to the following conditions:
  10.  *
  11.  * The above copyright notice and this permission notice (including the next
  12.  * paragraph) shall be included in all copies or substantial portions of the
  13.  * Software.
  14.  *
  15.  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  16.  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  17.  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
  18.  * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  19.  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
  20.  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
  21.  * IN THE SOFTWARE.
  22.  *
  23.  * Authors:
  24.  *    Eric Anholt <eric@anholt.net>
  25.  *    Chris Wilson <chris@chris-wilson.co.uk>
  26.  *
  27.  */
  28.  
  29. #include <drm/drmP.h>
  30. #include <drm/i915_drm.h>
  31. #include "i915_drv.h"
  32.  
  33. /*
  34.  * The BIOS typically reserves some of the system's memory for the exclusive
  35.  * use of the integrated graphics. This memory is no longer available for
  36.  * use by the OS and so the user finds that his system has less memory
  37.  * available than he put in. We refer to this memory as stolen.
  38.  *
  39.  * The BIOS will allocate its framebuffer from the stolen memory. Our
  40.  * goal is try to reuse that object for our own fbcon which must always
  41.  * be available for panics. Anything else we can reuse the stolen memory
  42.  * for is a boon.
  43.  */
  44.  
  45. static unsigned long i915_stolen_to_physical(struct drm_device *dev)
  46. {
  47.         struct drm_i915_private *dev_priv = dev->dev_private;
  48.         struct resource *r;
  49.         u32 base;
  50.  
  51.         /* Almost universally we can find the Graphics Base of Stolen Memory
  52.          * at offset 0x5c in the igfx configuration space. On a few (desktop)
  53.          * machines this is also mirrored in the bridge device at different
  54.          * locations, or in the MCHBAR. On gen2, the layout is again slightly
  55.          * different with the Graphics Segment immediately following Top of
  56.          * Memory (or Top of Usable DRAM). Note it appears that TOUD is only
  57.          * reported by 865g, so we just use the top of memory as determined
  58.          * by the e820 probe.
  59.          *
  60.          * XXX However gen2 requires an unavailable symbol.
  61.          */
  62.         base = 0;
  63.         if (INTEL_INFO(dev)->gen >= 3) {
  64.                 /* Read Graphics Base of Stolen Memory directly */
  65.                 pci_read_config_dword(dev->pdev, 0x5c, &base);
  66.                 base &= ~((1<<20) - 1);
  67.         } else { /* GEN2 */
  68. #if 0
  69.                 /* Stolen is immediately above Top of Memory */
  70.                 base = max_low_pfn_mapped << PAGE_SHIFT;
  71. #endif
  72.         }
  73.  
  74.         if (base == 0)
  75.                 return 0;
  76.  
  77.         /* make sure we don't clobber the GTT if it's within stolen memory */
  78.         if (INTEL_INFO(dev)->gen <= 4 && !IS_G33(dev) && !IS_G4X(dev)) {
  79.                 struct {
  80.                         u32 start, end;
  81.                 } stolen[2] = {
  82.                         { .start = base, .end = base + dev_priv->gtt.stolen_size, },
  83.                         { .start = base, .end = base + dev_priv->gtt.stolen_size, },
  84.                 };
  85.                 u64 gtt_start, gtt_end;
  86.  
  87.                 gtt_start = I915_READ(PGTBL_CTL);
  88.                 if (IS_GEN4(dev))
  89.                         gtt_start = (gtt_start & PGTBL_ADDRESS_LO_MASK) |
  90.                                 (gtt_start & PGTBL_ADDRESS_HI_MASK) << 28;
  91.                 else
  92.                         gtt_start &= PGTBL_ADDRESS_LO_MASK;
  93.                 gtt_end = gtt_start + gtt_total_entries(dev_priv->gtt) * 4;
  94.  
  95.                 if (gtt_start >= stolen[0].start && gtt_start < stolen[0].end)
  96.                         stolen[0].end = gtt_start;
  97.                 if (gtt_end > stolen[1].start && gtt_end <= stolen[1].end)
  98.                         stolen[1].start = gtt_end;
  99.  
  100.                 /* pick the larger of the two chunks */
  101.                 if (stolen[0].end - stolen[0].start >
  102.                     stolen[1].end - stolen[1].start) {
  103.                         base = stolen[0].start;
  104.                         dev_priv->gtt.stolen_size = stolen[0].end - stolen[0].start;
  105.                 } else {
  106.                         base = stolen[1].start;
  107.                         dev_priv->gtt.stolen_size = stolen[1].end - stolen[1].start;
  108.                 }
  109.  
  110.                 if (stolen[0].start != stolen[1].start ||
  111.                     stolen[0].end != stolen[1].end) {
  112.                         DRM_DEBUG_KMS("GTT within stolen memory at 0x%llx-0x%llx\n",
  113.                                       (unsigned long long) gtt_start,
  114.                                       (unsigned long long) gtt_end - 1);
  115.                         DRM_DEBUG_KMS("Stolen memory adjusted to 0x%x-0x%x\n",
  116.                                       base, base + (u32) dev_priv->gtt.stolen_size - 1);
  117.                 }
  118.         }
  119.  
  120. #if 0
  121.  
  122.         /* Verify that nothing else uses this physical address. Stolen
  123.          * memory should be reserved by the BIOS and hidden from the
  124.          * kernel. So if the region is already marked as busy, something
  125.          * is seriously wrong.
  126.          */
  127.         r = devm_request_mem_region(dev->dev, base, dev_priv->gtt.stolen_size,
  128.                                     "Graphics Stolen Memory");
  129.         if (r == NULL) {
  130.                 DRM_ERROR("conflict detected with stolen region: [0x%08x - 0x%08x]\n",
  131.                           base, base + (uint32_t)dev_priv->gtt.stolen_size);
  132.                 base = 0;
  133.         }
  134. #endif
  135.         return base;
  136. }
  137.  
  138. static int find_compression_threshold(struct drm_device *dev,
  139.                                       struct drm_mm_node *node,
  140.                                       int size,
  141.                                       int fb_cpp)
  142. {
  143.         struct drm_i915_private *dev_priv = dev->dev_private;
  144.         int compression_threshold = 1;
  145.         int ret;
  146.  
  147.         /* HACK: This code depends on what we will do in *_enable_fbc. If that
  148.          * code changes, this code needs to change as well.
  149.          *
  150.          * The enable_fbc code will attempt to use one of our 2 compression
  151.          * thresholds, therefore, in that case, we only have 1 resort.
  152.          */
  153.  
  154.         /* Try to over-allocate to reduce reallocations and fragmentation. */
  155.         ret = drm_mm_insert_node(&dev_priv->mm.stolen, node,
  156.                                  size <<= 1, 4096, DRM_MM_SEARCH_DEFAULT);
  157.         if (ret == 0)
  158.                 return compression_threshold;
  159.  
  160. again:
  161.         /* HW's ability to limit the CFB is 1:4 */
  162.         if (compression_threshold > 4 ||
  163.             (fb_cpp == 2 && compression_threshold == 2))
  164.                 return 0;
  165.  
  166.         ret = drm_mm_insert_node(&dev_priv->mm.stolen, node,
  167.                                          size >>= 1, 4096,
  168.                                          DRM_MM_SEARCH_DEFAULT);
  169.         if (ret && INTEL_INFO(dev)->gen <= 4) {
  170.                 return 0;
  171.         } else if (ret) {
  172.                 compression_threshold <<= 1;
  173.                 goto again;
  174.         } else {
  175.                 return compression_threshold;
  176.         }
  177. }
  178.  
  179. static int i915_setup_compression(struct drm_device *dev, int size, int fb_cpp)
  180. {
  181.         struct drm_i915_private *dev_priv = dev->dev_private;
  182.         struct drm_mm_node *uninitialized_var(compressed_llb);
  183.         int ret;
  184.  
  185.         ret = find_compression_threshold(dev, &dev_priv->fbc.compressed_fb,
  186.                                          size, fb_cpp);
  187.         if (!ret)
  188.                 goto err_llb;
  189.         else if (ret > 1) {
  190.                 DRM_INFO("Reducing the compressed framebuffer size. This may lead to less power savings than a non-reduced-size. Try to increase stolen memory size if available in BIOS.\n");
  191.  
  192.         }
  193.  
  194.         dev_priv->fbc.threshold = ret;
  195.  
  196.         if (HAS_PCH_SPLIT(dev))
  197.                 I915_WRITE(ILK_DPFC_CB_BASE, dev_priv->fbc.compressed_fb.start);
  198.         else if (IS_GM45(dev)) {
  199.                 I915_WRITE(DPFC_CB_BASE, dev_priv->fbc.compressed_fb.start);
  200.         } else {
  201.                 compressed_llb = kzalloc(sizeof(*compressed_llb), GFP_KERNEL);
  202.                 if (!compressed_llb)
  203.                         goto err_fb;
  204.  
  205.                 ret = drm_mm_insert_node(&dev_priv->mm.stolen, compressed_llb,
  206.                                          4096, 4096, DRM_MM_SEARCH_DEFAULT);
  207.                 if (ret)
  208.                         goto err_fb;
  209.  
  210.                 dev_priv->fbc.compressed_llb = compressed_llb;
  211.  
  212.                 I915_WRITE(FBC_CFB_BASE,
  213.                            dev_priv->mm.stolen_base + dev_priv->fbc.compressed_fb.start);
  214.                 I915_WRITE(FBC_LL_BASE,
  215.                            dev_priv->mm.stolen_base + compressed_llb->start);
  216.         }
  217.  
  218.         dev_priv->fbc.size = size / dev_priv->fbc.threshold;
  219.  
  220.         DRM_DEBUG_KMS("reserved %d bytes of contiguous stolen space for FBC\n",
  221.                       size);
  222.  
  223.         return 0;
  224.  
  225. err_fb:
  226.         kfree(compressed_llb);
  227.         drm_mm_remove_node(&dev_priv->fbc.compressed_fb);
  228. err_llb:
  229.         return -ENOSPC;
  230. }
  231.  
  232. int i915_gem_stolen_setup_compression(struct drm_device *dev, int size, int fb_cpp)
  233. {
  234.         struct drm_i915_private *dev_priv = dev->dev_private;
  235.  
  236.         if (!drm_mm_initialized(&dev_priv->mm.stolen))
  237.                 return -ENODEV;
  238.  
  239.         if (size < dev_priv->fbc.size)
  240.                 return 0;
  241.  
  242.         /* Release any current block */
  243.         i915_gem_stolen_cleanup_compression(dev);
  244.  
  245.         return i915_setup_compression(dev, size, fb_cpp);
  246. }
  247.  
  248. void i915_gem_stolen_cleanup_compression(struct drm_device *dev)
  249. {
  250.         struct drm_i915_private *dev_priv = dev->dev_private;
  251.  
  252.         if (dev_priv->fbc.size == 0)
  253.                 return;
  254.  
  255.         drm_mm_remove_node(&dev_priv->fbc.compressed_fb);
  256.  
  257.         if (dev_priv->fbc.compressed_llb) {
  258.                 drm_mm_remove_node(dev_priv->fbc.compressed_llb);
  259.                 kfree(dev_priv->fbc.compressed_llb);
  260.         }
  261.  
  262.         dev_priv->fbc.size = 0;
  263. }
  264.  
  265. void i915_gem_cleanup_stolen(struct drm_device *dev)
  266. {
  267.         struct drm_i915_private *dev_priv = dev->dev_private;
  268.  
  269.         if (!drm_mm_initialized(&dev_priv->mm.stolen))
  270.                 return;
  271.  
  272.         i915_gem_stolen_cleanup_compression(dev);
  273.         drm_mm_takedown(&dev_priv->mm.stolen);
  274. }
  275.  
  276. int i915_gem_init_stolen(struct drm_device *dev)
  277. {
  278.         struct drm_i915_private *dev_priv = dev->dev_private;
  279.         u32 tmp;
  280.         int bios_reserved = 0;
  281.  
  282. #ifdef CONFIG_INTEL_IOMMU
  283.         if (intel_iommu_gfx_mapped && INTEL_INFO(dev)->gen < 8) {
  284.                 DRM_INFO("DMAR active, disabling use of stolen memory\n");
  285.                 return 0;
  286.         }
  287. #endif
  288.  
  289.         if (dev_priv->gtt.stolen_size == 0)
  290.                 return 0;
  291.  
  292.         dev_priv->mm.stolen_base = i915_stolen_to_physical(dev);
  293.         if (dev_priv->mm.stolen_base == 0)
  294.                 return 0;
  295.  
  296.         DRM_DEBUG_KMS("found %zd bytes of stolen memory at %08lx\n",
  297.                       dev_priv->gtt.stolen_size, dev_priv->mm.stolen_base);
  298.  
  299.         if (INTEL_INFO(dev)->gen >= 8) {
  300.                 tmp = I915_READ(GEN7_BIOS_RESERVED);
  301.                 tmp >>= GEN8_BIOS_RESERVED_SHIFT;
  302.                 tmp &= GEN8_BIOS_RESERVED_MASK;
  303.                 bios_reserved = (1024*1024) << tmp;
  304.         } else if (IS_GEN7(dev)) {
  305.                 tmp = I915_READ(GEN7_BIOS_RESERVED);
  306.                 bios_reserved = tmp & GEN7_BIOS_RESERVED_256K ?
  307.                         256*1024 : 1024*1024;
  308.         }
  309.  
  310.         if (WARN_ON(bios_reserved > dev_priv->gtt.stolen_size))
  311.                 return 0;
  312.  
  313.         /* Basic memrange allocator for stolen space */
  314.         drm_mm_init(&dev_priv->mm.stolen, 0, dev_priv->gtt.stolen_size -
  315.                     bios_reserved);
  316.  
  317.         return 0;
  318. }
  319.  
  320. static struct sg_table *
  321. i915_pages_create_for_stolen(struct drm_device *dev,
  322.                              u32 offset, u32 size)
  323. {
  324.         struct drm_i915_private *dev_priv = dev->dev_private;
  325.         struct sg_table *st;
  326.         struct scatterlist *sg;
  327.  
  328.         DRM_DEBUG_DRIVER("offset=0x%x, size=%d\n", offset, size);
  329.         BUG_ON(offset > dev_priv->gtt.stolen_size - size);
  330.  
  331.         /* We hide that we have no struct page backing our stolen object
  332.          * by wrapping the contiguous physical allocation with a fake
  333.          * dma mapping in a single scatterlist.
  334.          */
  335.  
  336.         st = kmalloc(sizeof(*st), GFP_KERNEL);
  337.         if (st == NULL)
  338.                 return NULL;
  339.  
  340.         if (sg_alloc_table(st, 1, GFP_KERNEL)) {
  341.                 kfree(st);
  342.                 return NULL;
  343.         }
  344.  
  345.         sg = st->sgl;
  346.         sg->offset = 0;
  347.         sg->length = size;
  348.  
  349.         sg_dma_address(sg) = (dma_addr_t)dev_priv->mm.stolen_base + offset;
  350.         sg_dma_len(sg) = size;
  351.  
  352.         return st;
  353. }
  354.  
  355. static int i915_gem_object_get_pages_stolen(struct drm_i915_gem_object *obj)
  356. {
  357.         BUG();
  358.         return -EINVAL;
  359. }
  360.  
  361. static void i915_gem_object_put_pages_stolen(struct drm_i915_gem_object *obj)
  362. {
  363.         /* Should only be called during free */
  364.         sg_free_table(obj->pages);
  365.         kfree(obj->pages);
  366. }
  367.  
  368.  
  369. static void
  370. i915_gem_object_release_stolen(struct drm_i915_gem_object *obj)
  371. {
  372.         if (obj->stolen) {
  373.                 drm_mm_remove_node(obj->stolen);
  374.                 kfree(obj->stolen);
  375.                 obj->stolen = NULL;
  376.         }
  377. }
  378. static const struct drm_i915_gem_object_ops i915_gem_object_stolen_ops = {
  379.         .get_pages = i915_gem_object_get_pages_stolen,
  380.         .put_pages = i915_gem_object_put_pages_stolen,
  381.         .release = i915_gem_object_release_stolen,
  382. };
  383.  
  384. static struct drm_i915_gem_object *
  385. _i915_gem_object_create_stolen(struct drm_device *dev,
  386.                                struct drm_mm_node *stolen)
  387. {
  388.         struct drm_i915_gem_object *obj;
  389.  
  390.         obj = i915_gem_object_alloc(dev);
  391.         if (obj == NULL)
  392.                 return NULL;
  393.  
  394.         drm_gem_private_object_init(dev, &obj->base, stolen->size);
  395.         i915_gem_object_init(obj, &i915_gem_object_stolen_ops);
  396.  
  397.         obj->pages = i915_pages_create_for_stolen(dev,
  398.                                                   stolen->start, stolen->size);
  399.         if (obj->pages == NULL)
  400.                 goto cleanup;
  401.  
  402.         obj->has_dma_mapping = true;
  403.         i915_gem_object_pin_pages(obj);
  404.         obj->stolen = stolen;
  405.  
  406.         obj->base.read_domains = I915_GEM_DOMAIN_CPU | I915_GEM_DOMAIN_GTT;
  407.         obj->cache_level = HAS_LLC(dev) ? I915_CACHE_LLC : I915_CACHE_NONE;
  408.  
  409.         return obj;
  410.  
  411. cleanup:
  412.         i915_gem_object_free(obj);
  413.         return NULL;
  414. }
  415.  
  416. struct drm_i915_gem_object *
  417. i915_gem_object_create_stolen(struct drm_device *dev, u32 size)
  418. {
  419.         struct drm_i915_private *dev_priv = dev->dev_private;
  420.         struct drm_i915_gem_object *obj;
  421.         struct drm_mm_node *stolen;
  422.         int ret;
  423.  
  424.         if (!drm_mm_initialized(&dev_priv->mm.stolen))
  425.                 return NULL;
  426.  
  427.         DRM_DEBUG_KMS("creating stolen object: size=%x\n", size);
  428.         if (size == 0)
  429.                 return NULL;
  430.  
  431.         stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
  432.         if (!stolen)
  433.                 return NULL;
  434.  
  435.         ret = drm_mm_insert_node(&dev_priv->mm.stolen, stolen, size,
  436.                                  4096, DRM_MM_SEARCH_DEFAULT);
  437.         if (ret) {
  438.                 kfree(stolen);
  439.                 return NULL;
  440.         }
  441.  
  442.         obj = _i915_gem_object_create_stolen(dev, stolen);
  443.         if (obj)
  444.                 return obj;
  445.  
  446.         drm_mm_remove_node(stolen);
  447.         kfree(stolen);
  448.         return NULL;
  449. }
  450.  
  451. struct drm_i915_gem_object *
  452. i915_gem_object_create_stolen_for_preallocated(struct drm_device *dev,
  453.                                                u32 stolen_offset,
  454.                                                u32 gtt_offset,
  455.                                                u32 size)
  456. {
  457.         struct drm_i915_private *dev_priv = dev->dev_private;
  458.         struct i915_address_space *ggtt = &dev_priv->gtt.base;
  459.         struct drm_i915_gem_object *obj;
  460.         struct drm_mm_node *stolen;
  461.         struct i915_vma *vma;
  462.         int ret;
  463.  
  464.         if (!drm_mm_initialized(&dev_priv->mm.stolen))
  465.                 return NULL;
  466.  
  467.         DRM_DEBUG_KMS("creating preallocated stolen object: stolen_offset=%x, gtt_offset=%x, size=%x\n",
  468.                         stolen_offset, gtt_offset, size);
  469.  
  470.         /* KISS and expect everything to be page-aligned */
  471.         BUG_ON(stolen_offset & 4095);
  472.         BUG_ON(size & 4095);
  473.  
  474.         if (WARN_ON(size == 0))
  475.                 return NULL;
  476.  
  477.         stolen = kzalloc(sizeof(*stolen), GFP_KERNEL);
  478.         if (!stolen)
  479.                 return NULL;
  480.  
  481.         stolen->start = stolen_offset;
  482.         stolen->size = size;
  483.         ret = drm_mm_reserve_node(&dev_priv->mm.stolen, stolen);
  484.         if (ret) {
  485.                 DRM_DEBUG_KMS("failed to allocate stolen space\n");
  486.                 kfree(stolen);
  487.                 return NULL;
  488.         }
  489.  
  490.         obj = _i915_gem_object_create_stolen(dev, stolen);
  491.         if (obj == NULL) {
  492.                 DRM_DEBUG_KMS("failed to allocate stolen object\n");
  493.                 drm_mm_remove_node(stolen);
  494.                 kfree(stolen);
  495.                 return NULL;
  496.         }
  497.  
  498.         /* Some objects just need physical mem from stolen space */
  499.         if (gtt_offset == I915_GTT_OFFSET_NONE)
  500.                 return obj;
  501.  
  502.         vma = i915_gem_obj_lookup_or_create_vma(obj, ggtt);
  503.         if (IS_ERR(vma)) {
  504.                 ret = PTR_ERR(vma);
  505.                 goto err_out;
  506.         }
  507.  
  508.         /* To simplify the initialisation sequence between KMS and GTT,
  509.          * we allow construction of the stolen object prior to
  510.          * setting up the GTT space. The actual reservation will occur
  511.          * later.
  512.          */
  513.         vma->node.start = gtt_offset;
  514.         vma->node.size = size;
  515.         if (drm_mm_initialized(&ggtt->mm)) {
  516.                 ret = drm_mm_reserve_node(&ggtt->mm, &vma->node);
  517.                 if (ret) {
  518.                         DRM_DEBUG_KMS("failed to allocate stolen GTT space\n");
  519.                         goto err_vma;
  520.                 }
  521.                 }
  522.  
  523.         vma->bound |= GLOBAL_BIND;
  524.  
  525.         list_add_tail(&obj->global_list, &dev_priv->mm.bound_list);
  526.         list_add_tail(&vma->mm_list, &ggtt->inactive_list);
  527.         i915_gem_object_pin_pages(obj);
  528.  
  529.         return obj;
  530.  
  531. err_vma:
  532.         i915_gem_vma_destroy(vma);
  533. err_out:
  534.         drm_mm_remove_node(stolen);
  535.         kfree(stolen);
  536.         drm_gem_object_unreference(&obj->base);
  537.         return NULL;
  538. }
  539.