]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blob - drivers/gpu/drm/vmwgfx/vmwgfx_bo.c
Merge drm/drm-next into drm-misc-next
[mirror_ubuntu-hirsute-kernel.git] / drivers / gpu / drm / vmwgfx / vmwgfx_bo.c
1 // SPDX-License-Identifier: GPL-2.0 OR MIT
2 /**************************************************************************
3 *
4 * Copyright © 2011-2018 VMware, Inc., Palo Alto, CA., USA
5 * All Rights Reserved.
6 *
7 * Permission is hereby granted, free of charge, to any person obtaining a
8 * copy of this software and associated documentation files (the
9 * "Software"), to deal in the Software without restriction, including
10 * without limitation the rights to use, copy, modify, merge, publish,
11 * distribute, sub license, and/or sell copies of the Software, and to
12 * permit persons to whom the Software is furnished to do so, subject to
13 * the following conditions:
14 *
15 * The above copyright notice and this permission notice (including the
16 * next paragraph) shall be included in all copies or substantial portions
17 * of the Software.
18 *
19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
22 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
23 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
24 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
25 * USE OR OTHER DEALINGS IN THE SOFTWARE.
26 *
27 **************************************************************************/
28
29 #include <drm/ttm/ttm_placement.h>
30
31 #include "vmwgfx_drv.h"
32 #include "ttm_object.h"
33
34
35 /**
36 * struct vmw_user_buffer_object - User-space-visible buffer object
37 *
38 * @prime: The prime object providing user visibility.
39 * @vbo: The struct vmw_buffer_object
40 */
41 struct vmw_user_buffer_object {
42 struct ttm_prime_object prime;
43 struct vmw_buffer_object vbo;
44 };
45
46
47 /**
48 * vmw_buffer_object - Convert a struct ttm_buffer_object to a struct
49 * vmw_buffer_object.
50 *
51 * @bo: Pointer to the TTM buffer object.
52 * Return: Pointer to the struct vmw_buffer_object embedding the
53 * TTM buffer object.
54 */
55 static struct vmw_buffer_object *
56 vmw_buffer_object(struct ttm_buffer_object *bo)
57 {
58 return container_of(bo, struct vmw_buffer_object, base);
59 }
60
61
62 /**
63 * vmw_user_buffer_object - Convert a struct ttm_buffer_object to a struct
64 * vmw_user_buffer_object.
65 *
66 * @bo: Pointer to the TTM buffer object.
67 * Return: Pointer to the struct vmw_buffer_object embedding the TTM buffer
68 * object.
69 */
70 static struct vmw_user_buffer_object *
71 vmw_user_buffer_object(struct ttm_buffer_object *bo)
72 {
73 struct vmw_buffer_object *vmw_bo = vmw_buffer_object(bo);
74
75 return container_of(vmw_bo, struct vmw_user_buffer_object, vbo);
76 }
77
78
79 /**
80 * vmw_bo_pin_in_placement - Validate a buffer to placement.
81 *
82 * @dev_priv: Driver private.
83 * @buf: DMA buffer to move.
84 * @placement: The placement to pin it.
85 * @interruptible: Use interruptible wait.
86 * Return: Zero on success, Negative error code on failure. In particular
87 * -ERESTARTSYS if interrupted by a signal
88 */
89 int vmw_bo_pin_in_placement(struct vmw_private *dev_priv,
90 struct vmw_buffer_object *buf,
91 struct ttm_placement *placement,
92 bool interruptible)
93 {
94 struct ttm_operation_ctx ctx = {interruptible, false };
95 struct ttm_buffer_object *bo = &buf->base;
96 int ret;
97 uint32_t new_flags;
98
99 ret = ttm_write_lock(&dev_priv->reservation_sem, interruptible);
100 if (unlikely(ret != 0))
101 return ret;
102
103 vmw_execbuf_release_pinned_bo(dev_priv);
104
105 ret = ttm_bo_reserve(bo, interruptible, false, NULL);
106 if (unlikely(ret != 0))
107 goto err;
108
109 if (buf->pin_count > 0)
110 ret = ttm_bo_mem_compat(placement, &bo->mem,
111 &new_flags) == true ? 0 : -EINVAL;
112 else
113 ret = ttm_bo_validate(bo, placement, &ctx);
114
115 if (!ret)
116 vmw_bo_pin_reserved(buf, true);
117
118 ttm_bo_unreserve(bo);
119
120 err:
121 ttm_write_unlock(&dev_priv->reservation_sem);
122 return ret;
123 }
124
125
126 /**
127 * vmw_bo_pin_in_vram_or_gmr - Move a buffer to vram or gmr.
128 *
129 * This function takes the reservation_sem in write mode.
130 * Flushes and unpins the query bo to avoid failures.
131 *
132 * @dev_priv: Driver private.
133 * @buf: DMA buffer to move.
134 * @pin: Pin buffer if true.
135 * @interruptible: Use interruptible wait.
136 * Return: Zero on success, Negative error code on failure. In particular
137 * -ERESTARTSYS if interrupted by a signal
138 */
139 int vmw_bo_pin_in_vram_or_gmr(struct vmw_private *dev_priv,
140 struct vmw_buffer_object *buf,
141 bool interruptible)
142 {
143 struct ttm_operation_ctx ctx = {interruptible, false };
144 struct ttm_buffer_object *bo = &buf->base;
145 int ret;
146 uint32_t new_flags;
147
148 ret = ttm_write_lock(&dev_priv->reservation_sem, interruptible);
149 if (unlikely(ret != 0))
150 return ret;
151
152 vmw_execbuf_release_pinned_bo(dev_priv);
153
154 ret = ttm_bo_reserve(bo, interruptible, false, NULL);
155 if (unlikely(ret != 0))
156 goto err;
157
158 if (buf->pin_count > 0) {
159 ret = ttm_bo_mem_compat(&vmw_vram_gmr_placement, &bo->mem,
160 &new_flags) == true ? 0 : -EINVAL;
161 goto out_unreserve;
162 }
163
164 ret = ttm_bo_validate(bo, &vmw_vram_gmr_placement, &ctx);
165 if (likely(ret == 0) || ret == -ERESTARTSYS)
166 goto out_unreserve;
167
168 ret = ttm_bo_validate(bo, &vmw_vram_placement, &ctx);
169
170 out_unreserve:
171 if (!ret)
172 vmw_bo_pin_reserved(buf, true);
173
174 ttm_bo_unreserve(bo);
175 err:
176 ttm_write_unlock(&dev_priv->reservation_sem);
177 return ret;
178 }
179
180
181 /**
182 * vmw_bo_pin_in_vram - Move a buffer to vram.
183 *
184 * This function takes the reservation_sem in write mode.
185 * Flushes and unpins the query bo to avoid failures.
186 *
187 * @dev_priv: Driver private.
188 * @buf: DMA buffer to move.
189 * @interruptible: Use interruptible wait.
190 * Return: Zero on success, Negative error code on failure. In particular
191 * -ERESTARTSYS if interrupted by a signal
192 */
193 int vmw_bo_pin_in_vram(struct vmw_private *dev_priv,
194 struct vmw_buffer_object *buf,
195 bool interruptible)
196 {
197 return vmw_bo_pin_in_placement(dev_priv, buf, &vmw_vram_placement,
198 interruptible);
199 }
200
201
202 /**
203 * vmw_bo_pin_in_start_of_vram - Move a buffer to start of vram.
204 *
205 * This function takes the reservation_sem in write mode.
206 * Flushes and unpins the query bo to avoid failures.
207 *
208 * @dev_priv: Driver private.
209 * @buf: DMA buffer to pin.
210 * @interruptible: Use interruptible wait.
211 * Return: Zero on success, Negative error code on failure. In particular
212 * -ERESTARTSYS if interrupted by a signal
213 */
214 int vmw_bo_pin_in_start_of_vram(struct vmw_private *dev_priv,
215 struct vmw_buffer_object *buf,
216 bool interruptible)
217 {
218 struct ttm_operation_ctx ctx = {interruptible, false };
219 struct ttm_buffer_object *bo = &buf->base;
220 struct ttm_placement placement;
221 struct ttm_place place;
222 int ret = 0;
223 uint32_t new_flags;
224
225 place = vmw_vram_placement.placement[0];
226 place.lpfn = bo->num_pages;
227 placement.num_placement = 1;
228 placement.placement = &place;
229 placement.num_busy_placement = 1;
230 placement.busy_placement = &place;
231
232 ret = ttm_write_lock(&dev_priv->reservation_sem, interruptible);
233 if (unlikely(ret != 0))
234 return ret;
235
236 vmw_execbuf_release_pinned_bo(dev_priv);
237 ret = ttm_bo_reserve(bo, interruptible, false, NULL);
238 if (unlikely(ret != 0))
239 goto err_unlock;
240
241 /*
242 * Is this buffer already in vram but not at the start of it?
243 * In that case, evict it first because TTM isn't good at handling
244 * that situation.
245 */
246 if (bo->mem.mem_type == TTM_PL_VRAM &&
247 bo->mem.start < bo->num_pages &&
248 bo->mem.start > 0 &&
249 buf->pin_count == 0) {
250 ctx.interruptible = false;
251 (void) ttm_bo_validate(bo, &vmw_sys_placement, &ctx);
252 }
253
254 if (buf->pin_count > 0)
255 ret = ttm_bo_mem_compat(&placement, &bo->mem,
256 &new_flags) == true ? 0 : -EINVAL;
257 else
258 ret = ttm_bo_validate(bo, &placement, &ctx);
259
260 /* For some reason we didn't end up at the start of vram */
261 WARN_ON(ret == 0 && bo->mem.start != 0);
262 if (!ret)
263 vmw_bo_pin_reserved(buf, true);
264
265 ttm_bo_unreserve(bo);
266 err_unlock:
267 ttm_write_unlock(&dev_priv->reservation_sem);
268
269 return ret;
270 }
271
272
273 /**
274 * vmw_bo_unpin - Unpin the buffer given buffer, does not move the buffer.
275 *
276 * This function takes the reservation_sem in write mode.
277 *
278 * @dev_priv: Driver private.
279 * @buf: DMA buffer to unpin.
280 * @interruptible: Use interruptible wait.
281 * Return: Zero on success, Negative error code on failure. In particular
282 * -ERESTARTSYS if interrupted by a signal
283 */
284 int vmw_bo_unpin(struct vmw_private *dev_priv,
285 struct vmw_buffer_object *buf,
286 bool interruptible)
287 {
288 struct ttm_buffer_object *bo = &buf->base;
289 int ret;
290
291 ret = ttm_read_lock(&dev_priv->reservation_sem, interruptible);
292 if (unlikely(ret != 0))
293 return ret;
294
295 ret = ttm_bo_reserve(bo, interruptible, false, NULL);
296 if (unlikely(ret != 0))
297 goto err;
298
299 vmw_bo_pin_reserved(buf, false);
300
301 ttm_bo_unreserve(bo);
302
303 err:
304 ttm_read_unlock(&dev_priv->reservation_sem);
305 return ret;
306 }
307
308 /**
309 * vmw_bo_get_guest_ptr - Get the guest ptr representing the current placement
310 * of a buffer.
311 *
312 * @bo: Pointer to a struct ttm_buffer_object. Must be pinned or reserved.
313 * @ptr: SVGAGuestPtr returning the result.
314 */
315 void vmw_bo_get_guest_ptr(const struct ttm_buffer_object *bo,
316 SVGAGuestPtr *ptr)
317 {
318 if (bo->mem.mem_type == TTM_PL_VRAM) {
319 ptr->gmrId = SVGA_GMR_FRAMEBUFFER;
320 ptr->offset = bo->mem.start << PAGE_SHIFT;
321 } else {
322 ptr->gmrId = bo->mem.start;
323 ptr->offset = 0;
324 }
325 }
326
327
328 /**
329 * vmw_bo_pin_reserved - Pin or unpin a buffer object without moving it.
330 *
331 * @vbo: The buffer object. Must be reserved.
332 * @pin: Whether to pin or unpin.
333 *
334 */
335 void vmw_bo_pin_reserved(struct vmw_buffer_object *vbo, bool pin)
336 {
337 struct ttm_operation_ctx ctx = { false, true };
338 struct ttm_place pl;
339 struct ttm_placement placement;
340 struct ttm_buffer_object *bo = &vbo->base;
341 uint32_t old_mem_type = bo->mem.mem_type;
342 int ret;
343
344 dma_resv_assert_held(bo->base.resv);
345
346 if (pin) {
347 if (vbo->pin_count++ > 0)
348 return;
349 } else {
350 WARN_ON(vbo->pin_count <= 0);
351 if (--vbo->pin_count > 0)
352 return;
353 }
354
355 pl.fpfn = 0;
356 pl.lpfn = 0;
357 pl.mem_type = bo->mem.mem_type;
358 pl.flags = bo->mem.placement;
359 if (pin)
360 pl.flags |= TTM_PL_FLAG_NO_EVICT;
361 else
362 pl.flags &= ~TTM_PL_FLAG_NO_EVICT;
363
364 memset(&placement, 0, sizeof(placement));
365 placement.num_placement = 1;
366 placement.placement = &pl;
367
368 ret = ttm_bo_validate(bo, &placement, &ctx);
369
370 BUG_ON(ret != 0 || bo->mem.mem_type != old_mem_type);
371 }
372
373
374 /**
375 * vmw_bo_map_and_cache - Map a buffer object and cache the map
376 *
377 * @vbo: The buffer object to map
378 * Return: A kernel virtual address or NULL if mapping failed.
379 *
380 * This function maps a buffer object into the kernel address space, or
381 * returns the virtual kernel address of an already existing map. The virtual
382 * address remains valid as long as the buffer object is pinned or reserved.
383 * The cached map is torn down on either
384 * 1) Buffer object move
385 * 2) Buffer object swapout
386 * 3) Buffer object destruction
387 *
388 */
389 void *vmw_bo_map_and_cache(struct vmw_buffer_object *vbo)
390 {
391 struct ttm_buffer_object *bo = &vbo->base;
392 bool not_used;
393 void *virtual;
394 int ret;
395
396 virtual = ttm_kmap_obj_virtual(&vbo->map, &not_used);
397 if (virtual)
398 return virtual;
399
400 ret = ttm_bo_kmap(bo, 0, bo->num_pages, &vbo->map);
401 if (ret)
402 DRM_ERROR("Buffer object map failed: %d.\n", ret);
403
404 return ttm_kmap_obj_virtual(&vbo->map, &not_used);
405 }
406
407
408 /**
409 * vmw_bo_unmap - Tear down a cached buffer object map.
410 *
411 * @vbo: The buffer object whose map we are tearing down.
412 *
413 * This function tears down a cached map set up using
414 * vmw_buffer_object_map_and_cache().
415 */
416 void vmw_bo_unmap(struct vmw_buffer_object *vbo)
417 {
418 if (vbo->map.bo == NULL)
419 return;
420
421 ttm_bo_kunmap(&vbo->map);
422 }
423
424
425 /**
426 * vmw_bo_acc_size - Calculate the pinned memory usage of buffers
427 *
428 * @dev_priv: Pointer to a struct vmw_private identifying the device.
429 * @size: The requested buffer size.
430 * @user: Whether this is an ordinary dma buffer or a user dma buffer.
431 */
432 static size_t vmw_bo_acc_size(struct vmw_private *dev_priv, size_t size,
433 bool user)
434 {
435 static size_t struct_size, user_struct_size;
436 size_t num_pages = PAGE_ALIGN(size) >> PAGE_SHIFT;
437 size_t page_array_size = ttm_round_pot(num_pages * sizeof(void *));
438
439 if (unlikely(struct_size == 0)) {
440 size_t backend_size = ttm_round_pot(vmw_tt_size);
441
442 struct_size = backend_size +
443 ttm_round_pot(sizeof(struct vmw_buffer_object));
444 user_struct_size = backend_size +
445 ttm_round_pot(sizeof(struct vmw_user_buffer_object)) +
446 TTM_OBJ_EXTRA_SIZE;
447 }
448
449 if (dev_priv->map_mode == vmw_dma_alloc_coherent)
450 page_array_size +=
451 ttm_round_pot(num_pages * sizeof(dma_addr_t));
452
453 return ((user) ? user_struct_size : struct_size) +
454 page_array_size;
455 }
456
457
458 /**
459 * vmw_bo_bo_free - vmw buffer object destructor
460 *
461 * @bo: Pointer to the embedded struct ttm_buffer_object
462 */
463 void vmw_bo_bo_free(struct ttm_buffer_object *bo)
464 {
465 struct vmw_buffer_object *vmw_bo = vmw_buffer_object(bo);
466
467 WARN_ON(vmw_bo->dirty);
468 WARN_ON(!RB_EMPTY_ROOT(&vmw_bo->res_tree));
469 vmw_bo_unmap(vmw_bo);
470 kfree(vmw_bo);
471 }
472
473
474 /**
475 * vmw_user_bo_destroy - vmw buffer object destructor
476 *
477 * @bo: Pointer to the embedded struct ttm_buffer_object
478 */
479 static void vmw_user_bo_destroy(struct ttm_buffer_object *bo)
480 {
481 struct vmw_user_buffer_object *vmw_user_bo = vmw_user_buffer_object(bo);
482 struct vmw_buffer_object *vbo = &vmw_user_bo->vbo;
483
484 WARN_ON(vbo->dirty);
485 WARN_ON(!RB_EMPTY_ROOT(&vbo->res_tree));
486 vmw_bo_unmap(vbo);
487 ttm_prime_object_kfree(vmw_user_bo, prime);
488 }
489
490
491 /**
492 * vmw_bo_init - Initialize a vmw buffer object
493 *
494 * @dev_priv: Pointer to the device private struct
495 * @vmw_bo: Pointer to the struct vmw_buffer_object to initialize.
496 * @size: Buffer object size in bytes.
497 * @placement: Initial placement.
498 * @interruptible: Whether waits should be performed interruptible.
499 * @bo_free: The buffer object destructor.
500 * Returns: Zero on success, negative error code on error.
501 *
502 * Note that on error, the code will free the buffer object.
503 */
504 int vmw_bo_init(struct vmw_private *dev_priv,
505 struct vmw_buffer_object *vmw_bo,
506 size_t size, struct ttm_placement *placement,
507 bool interruptible,
508 void (*bo_free)(struct ttm_buffer_object *bo))
509 {
510 struct ttm_bo_device *bdev = &dev_priv->bdev;
511 size_t acc_size;
512 int ret;
513 bool user = (bo_free == &vmw_user_bo_destroy);
514
515 WARN_ON_ONCE(!bo_free && (!user && (bo_free != vmw_bo_bo_free)));
516
517 acc_size = vmw_bo_acc_size(dev_priv, size, user);
518 memset(vmw_bo, 0, sizeof(*vmw_bo));
519 BUILD_BUG_ON(TTM_MAX_BO_PRIORITY <= 3);
520 vmw_bo->base.priority = 3;
521 vmw_bo->res_tree = RB_ROOT;
522
523 ret = ttm_bo_init(bdev, &vmw_bo->base, size,
524 ttm_bo_type_device, placement,
525 0, interruptible, acc_size,
526 NULL, NULL, bo_free);
527 return ret;
528 }
529
530
531 /**
532 * vmw_user_bo_release - TTM reference base object release callback for
533 * vmw user buffer objects
534 *
535 * @p_base: The TTM base object pointer about to be unreferenced.
536 *
537 * Clears the TTM base object pointer and drops the reference the
538 * base object has on the underlying struct vmw_buffer_object.
539 */
540 static void vmw_user_bo_release(struct ttm_base_object **p_base)
541 {
542 struct vmw_user_buffer_object *vmw_user_bo;
543 struct ttm_base_object *base = *p_base;
544
545 *p_base = NULL;
546
547 if (unlikely(base == NULL))
548 return;
549
550 vmw_user_bo = container_of(base, struct vmw_user_buffer_object,
551 prime.base);
552 ttm_bo_put(&vmw_user_bo->vbo.base);
553 }
554
555
556 /**
557 * vmw_user_bo_ref_obj-release - TTM synccpu reference object release callback
558 * for vmw user buffer objects
559 *
560 * @base: Pointer to the TTM base object
561 * @ref_type: Reference type of the reference reaching zero.
562 *
563 * Called when user-space drops its last synccpu reference on the buffer
564 * object, Either explicitly or as part of a cleanup file close.
565 */
566 static void vmw_user_bo_ref_obj_release(struct ttm_base_object *base,
567 enum ttm_ref_type ref_type)
568 {
569 struct vmw_user_buffer_object *user_bo;
570
571 user_bo = container_of(base, struct vmw_user_buffer_object, prime.base);
572
573 switch (ref_type) {
574 case TTM_REF_SYNCCPU_WRITE:
575 atomic_dec(&user_bo->vbo.cpu_writers);
576 break;
577 default:
578 WARN_ONCE(true, "Undefined buffer object reference release.\n");
579 }
580 }
581
582
583 /**
584 * vmw_user_bo_alloc - Allocate a user buffer object
585 *
586 * @dev_priv: Pointer to a struct device private.
587 * @tfile: Pointer to a struct ttm_object_file on which to register the user
588 * object.
589 * @size: Size of the buffer object.
590 * @shareable: Boolean whether the buffer is shareable with other open files.
591 * @handle: Pointer to where the handle value should be assigned.
592 * @p_vbo: Pointer to where the refcounted struct vmw_buffer_object pointer
593 * should be assigned.
594 * Return: Zero on success, negative error code on error.
595 */
596 int vmw_user_bo_alloc(struct vmw_private *dev_priv,
597 struct ttm_object_file *tfile,
598 uint32_t size,
599 bool shareable,
600 uint32_t *handle,
601 struct vmw_buffer_object **p_vbo,
602 struct ttm_base_object **p_base)
603 {
604 struct vmw_user_buffer_object *user_bo;
605 int ret;
606
607 user_bo = kzalloc(sizeof(*user_bo), GFP_KERNEL);
608 if (unlikely(!user_bo)) {
609 DRM_ERROR("Failed to allocate a buffer.\n");
610 return -ENOMEM;
611 }
612
613 ret = vmw_bo_init(dev_priv, &user_bo->vbo, size,
614 (dev_priv->has_mob) ?
615 &vmw_sys_placement :
616 &vmw_vram_sys_placement, true,
617 &vmw_user_bo_destroy);
618 if (unlikely(ret != 0))
619 return ret;
620
621 ttm_bo_get(&user_bo->vbo.base);
622 ret = ttm_prime_object_init(tfile,
623 size,
624 &user_bo->prime,
625 shareable,
626 ttm_buffer_type,
627 &vmw_user_bo_release,
628 &vmw_user_bo_ref_obj_release);
629 if (unlikely(ret != 0)) {
630 ttm_bo_put(&user_bo->vbo.base);
631 goto out_no_base_object;
632 }
633
634 *p_vbo = &user_bo->vbo;
635 if (p_base) {
636 *p_base = &user_bo->prime.base;
637 kref_get(&(*p_base)->refcount);
638 }
639 *handle = user_bo->prime.base.handle;
640
641 out_no_base_object:
642 return ret;
643 }
644
645
646 /**
647 * vmw_user_bo_verify_access - verify access permissions on this
648 * buffer object.
649 *
650 * @bo: Pointer to the buffer object being accessed
651 * @tfile: Identifying the caller.
652 */
653 int vmw_user_bo_verify_access(struct ttm_buffer_object *bo,
654 struct ttm_object_file *tfile)
655 {
656 struct vmw_user_buffer_object *vmw_user_bo;
657
658 if (unlikely(bo->destroy != vmw_user_bo_destroy))
659 return -EPERM;
660
661 vmw_user_bo = vmw_user_buffer_object(bo);
662
663 /* Check that the caller has opened the object. */
664 if (likely(ttm_ref_object_exists(tfile, &vmw_user_bo->prime.base)))
665 return 0;
666
667 DRM_ERROR("Could not grant buffer access.\n");
668 return -EPERM;
669 }
670
671
672 /**
673 * vmw_user_bo_synccpu_grab - Grab a struct vmw_user_buffer_object for cpu
674 * access, idling previous GPU operations on the buffer and optionally
675 * blocking it for further command submissions.
676 *
677 * @user_bo: Pointer to the buffer object being grabbed for CPU access
678 * @tfile: Identifying the caller.
679 * @flags: Flags indicating how the grab should be performed.
680 * Return: Zero on success, Negative error code on error. In particular,
681 * -EBUSY will be returned if a dontblock operation is requested and the
682 * buffer object is busy, and -ERESTARTSYS will be returned if a wait is
683 * interrupted by a signal.
684 *
685 * A blocking grab will be automatically released when @tfile is closed.
686 */
687 static int vmw_user_bo_synccpu_grab(struct vmw_user_buffer_object *user_bo,
688 struct ttm_object_file *tfile,
689 uint32_t flags)
690 {
691 bool nonblock = !!(flags & drm_vmw_synccpu_dontblock);
692 struct ttm_buffer_object *bo = &user_bo->vbo.base;
693 bool existed;
694 int ret;
695
696 if (flags & drm_vmw_synccpu_allow_cs) {
697 long lret;
698
699 lret = dma_resv_wait_timeout_rcu
700 (bo->base.resv, true, true,
701 nonblock ? 0 : MAX_SCHEDULE_TIMEOUT);
702 if (!lret)
703 return -EBUSY;
704 else if (lret < 0)
705 return lret;
706 return 0;
707 }
708
709 ret = ttm_bo_reserve(bo, true, nonblock, NULL);
710 if (unlikely(ret != 0))
711 return ret;
712
713 ret = ttm_bo_wait(bo, true, nonblock);
714 if (likely(ret == 0))
715 atomic_inc(&user_bo->vbo.cpu_writers);
716
717 ttm_bo_unreserve(bo);
718 if (unlikely(ret != 0))
719 return ret;
720
721 ret = ttm_ref_object_add(tfile, &user_bo->prime.base,
722 TTM_REF_SYNCCPU_WRITE, &existed, false);
723 if (ret != 0 || existed)
724 atomic_dec(&user_bo->vbo.cpu_writers);
725
726 return ret;
727 }
728
729 /**
730 * vmw_user_bo_synccpu_release - Release a previous grab for CPU access,
731 * and unblock command submission on the buffer if blocked.
732 *
733 * @handle: Handle identifying the buffer object.
734 * @tfile: Identifying the caller.
735 * @flags: Flags indicating the type of release.
736 */
737 static int vmw_user_bo_synccpu_release(uint32_t handle,
738 struct ttm_object_file *tfile,
739 uint32_t flags)
740 {
741 if (!(flags & drm_vmw_synccpu_allow_cs))
742 return ttm_ref_object_base_unref(tfile, handle,
743 TTM_REF_SYNCCPU_WRITE);
744
745 return 0;
746 }
747
748
749 /**
750 * vmw_user_bo_synccpu_ioctl - ioctl function implementing the synccpu
751 * functionality.
752 *
753 * @dev: Identifies the drm device.
754 * @data: Pointer to the ioctl argument.
755 * @file_priv: Identifies the caller.
756 * Return: Zero on success, negative error code on error.
757 *
758 * This function checks the ioctl arguments for validity and calls the
759 * relevant synccpu functions.
760 */
761 int vmw_user_bo_synccpu_ioctl(struct drm_device *dev, void *data,
762 struct drm_file *file_priv)
763 {
764 struct drm_vmw_synccpu_arg *arg =
765 (struct drm_vmw_synccpu_arg *) data;
766 struct vmw_buffer_object *vbo;
767 struct vmw_user_buffer_object *user_bo;
768 struct ttm_object_file *tfile = vmw_fpriv(file_priv)->tfile;
769 struct ttm_base_object *buffer_base;
770 int ret;
771
772 if ((arg->flags & (drm_vmw_synccpu_read | drm_vmw_synccpu_write)) == 0
773 || (arg->flags & ~(drm_vmw_synccpu_read | drm_vmw_synccpu_write |
774 drm_vmw_synccpu_dontblock |
775 drm_vmw_synccpu_allow_cs)) != 0) {
776 DRM_ERROR("Illegal synccpu flags.\n");
777 return -EINVAL;
778 }
779
780 switch (arg->op) {
781 case drm_vmw_synccpu_grab:
782 ret = vmw_user_bo_lookup(tfile, arg->handle, &vbo,
783 &buffer_base);
784 if (unlikely(ret != 0))
785 return ret;
786
787 user_bo = container_of(vbo, struct vmw_user_buffer_object,
788 vbo);
789 ret = vmw_user_bo_synccpu_grab(user_bo, tfile, arg->flags);
790 vmw_bo_unreference(&vbo);
791 ttm_base_object_unref(&buffer_base);
792 if (unlikely(ret != 0 && ret != -ERESTARTSYS &&
793 ret != -EBUSY)) {
794 DRM_ERROR("Failed synccpu grab on handle 0x%08x.\n",
795 (unsigned int) arg->handle);
796 return ret;
797 }
798 break;
799 case drm_vmw_synccpu_release:
800 ret = vmw_user_bo_synccpu_release(arg->handle, tfile,
801 arg->flags);
802 if (unlikely(ret != 0)) {
803 DRM_ERROR("Failed synccpu release on handle 0x%08x.\n",
804 (unsigned int) arg->handle);
805 return ret;
806 }
807 break;
808 default:
809 DRM_ERROR("Invalid synccpu operation.\n");
810 return -EINVAL;
811 }
812
813 return 0;
814 }
815
816
817 /**
818 * vmw_bo_alloc_ioctl - ioctl function implementing the buffer object
819 * allocation functionality.
820 *
821 * @dev: Identifies the drm device.
822 * @data: Pointer to the ioctl argument.
823 * @file_priv: Identifies the caller.
824 * Return: Zero on success, negative error code on error.
825 *
826 * This function checks the ioctl arguments for validity and allocates a
827 * struct vmw_user_buffer_object bo.
828 */
829 int vmw_bo_alloc_ioctl(struct drm_device *dev, void *data,
830 struct drm_file *file_priv)
831 {
832 struct vmw_private *dev_priv = vmw_priv(dev);
833 union drm_vmw_alloc_dmabuf_arg *arg =
834 (union drm_vmw_alloc_dmabuf_arg *)data;
835 struct drm_vmw_alloc_dmabuf_req *req = &arg->req;
836 struct drm_vmw_dmabuf_rep *rep = &arg->rep;
837 struct vmw_buffer_object *vbo;
838 uint32_t handle;
839 int ret;
840
841 ret = ttm_read_lock(&dev_priv->reservation_sem, true);
842 if (unlikely(ret != 0))
843 return ret;
844
845 ret = vmw_user_bo_alloc(dev_priv, vmw_fpriv(file_priv)->tfile,
846 req->size, false, &handle, &vbo,
847 NULL);
848 if (unlikely(ret != 0))
849 goto out_no_bo;
850
851 rep->handle = handle;
852 rep->map_handle = drm_vma_node_offset_addr(&vbo->base.base.vma_node);
853 rep->cur_gmr_id = handle;
854 rep->cur_gmr_offset = 0;
855
856 vmw_bo_unreference(&vbo);
857
858 out_no_bo:
859 ttm_read_unlock(&dev_priv->reservation_sem);
860
861 return ret;
862 }
863
864
865 /**
866 * vmw_bo_unref_ioctl - Generic handle close ioctl.
867 *
868 * @dev: Identifies the drm device.
869 * @data: Pointer to the ioctl argument.
870 * @file_priv: Identifies the caller.
871 * Return: Zero on success, negative error code on error.
872 *
873 * This function checks the ioctl arguments for validity and closes a
874 * handle to a TTM base object, optionally freeing the object.
875 */
876 int vmw_bo_unref_ioctl(struct drm_device *dev, void *data,
877 struct drm_file *file_priv)
878 {
879 struct drm_vmw_unref_dmabuf_arg *arg =
880 (struct drm_vmw_unref_dmabuf_arg *)data;
881
882 return ttm_ref_object_base_unref(vmw_fpriv(file_priv)->tfile,
883 arg->handle,
884 TTM_REF_USAGE);
885 }
886
887
888 /**
889 * vmw_user_bo_lookup - Look up a vmw user buffer object from a handle.
890 *
891 * @tfile: The TTM object file the handle is registered with.
892 * @handle: The user buffer object handle
893 * @out: Pointer to a where a pointer to the embedded
894 * struct vmw_buffer_object should be placed.
895 * @p_base: Pointer to where a pointer to the TTM base object should be
896 * placed, or NULL if no such pointer is required.
897 * Return: Zero on success, Negative error code on error.
898 *
899 * Both the output base object pointer and the vmw buffer object pointer
900 * will be refcounted.
901 */
902 int vmw_user_bo_lookup(struct ttm_object_file *tfile,
903 uint32_t handle, struct vmw_buffer_object **out,
904 struct ttm_base_object **p_base)
905 {
906 struct vmw_user_buffer_object *vmw_user_bo;
907 struct ttm_base_object *base;
908
909 base = ttm_base_object_lookup(tfile, handle);
910 if (unlikely(base == NULL)) {
911 DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
912 (unsigned long)handle);
913 return -ESRCH;
914 }
915
916 if (unlikely(ttm_base_object_type(base) != ttm_buffer_type)) {
917 ttm_base_object_unref(&base);
918 DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
919 (unsigned long)handle);
920 return -EINVAL;
921 }
922
923 vmw_user_bo = container_of(base, struct vmw_user_buffer_object,
924 prime.base);
925 ttm_bo_get(&vmw_user_bo->vbo.base);
926 if (p_base)
927 *p_base = base;
928 else
929 ttm_base_object_unref(&base);
930 *out = &vmw_user_bo->vbo;
931
932 return 0;
933 }
934
935 /**
936 * vmw_user_bo_noref_lookup - Look up a vmw user buffer object without reference
937 * @tfile: The TTM object file the handle is registered with.
938 * @handle: The user buffer object handle.
939 *
940 * This function looks up a struct vmw_user_bo and returns a pointer to the
941 * struct vmw_buffer_object it derives from without refcounting the pointer.
942 * The returned pointer is only valid until vmw_user_bo_noref_release() is
943 * called, and the object pointed to by the returned pointer may be doomed.
944 * Any persistent usage of the object requires a refcount to be taken using
945 * ttm_bo_reference_unless_doomed(). Iff this function returns successfully it
946 * needs to be paired with vmw_user_bo_noref_release() and no sleeping-
947 * or scheduling functions may be called inbetween these function calls.
948 *
949 * Return: A struct vmw_buffer_object pointer if successful or negative
950 * error pointer on failure.
951 */
952 struct vmw_buffer_object *
953 vmw_user_bo_noref_lookup(struct ttm_object_file *tfile, u32 handle)
954 {
955 struct vmw_user_buffer_object *vmw_user_bo;
956 struct ttm_base_object *base;
957
958 base = ttm_base_object_noref_lookup(tfile, handle);
959 if (!base) {
960 DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
961 (unsigned long)handle);
962 return ERR_PTR(-ESRCH);
963 }
964
965 if (unlikely(ttm_base_object_type(base) != ttm_buffer_type)) {
966 ttm_base_object_noref_release();
967 DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
968 (unsigned long)handle);
969 return ERR_PTR(-EINVAL);
970 }
971
972 vmw_user_bo = container_of(base, struct vmw_user_buffer_object,
973 prime.base);
974 return &vmw_user_bo->vbo;
975 }
976
977 /**
978 * vmw_user_bo_reference - Open a handle to a vmw user buffer object.
979 *
980 * @tfile: The TTM object file to register the handle with.
981 * @vbo: The embedded vmw buffer object.
982 * @handle: Pointer to where the new handle should be placed.
983 * Return: Zero on success, Negative error code on error.
984 */
985 int vmw_user_bo_reference(struct ttm_object_file *tfile,
986 struct vmw_buffer_object *vbo,
987 uint32_t *handle)
988 {
989 struct vmw_user_buffer_object *user_bo;
990
991 if (vbo->base.destroy != vmw_user_bo_destroy)
992 return -EINVAL;
993
994 user_bo = container_of(vbo, struct vmw_user_buffer_object, vbo);
995
996 *handle = user_bo->prime.base.handle;
997 return ttm_ref_object_add(tfile, &user_bo->prime.base,
998 TTM_REF_USAGE, NULL, false);
999 }
1000
1001
1002 /**
1003 * vmw_bo_fence_single - Utility function to fence a single TTM buffer
1004 * object without unreserving it.
1005 *
1006 * @bo: Pointer to the struct ttm_buffer_object to fence.
1007 * @fence: Pointer to the fence. If NULL, this function will
1008 * insert a fence into the command stream..
1009 *
1010 * Contrary to the ttm_eu version of this function, it takes only
1011 * a single buffer object instead of a list, and it also doesn't
1012 * unreserve the buffer object, which needs to be done separately.
1013 */
1014 void vmw_bo_fence_single(struct ttm_buffer_object *bo,
1015 struct vmw_fence_obj *fence)
1016 {
1017 struct ttm_bo_device *bdev = bo->bdev;
1018
1019 struct vmw_private *dev_priv =
1020 container_of(bdev, struct vmw_private, bdev);
1021
1022 if (fence == NULL) {
1023 vmw_execbuf_fence_commands(NULL, dev_priv, &fence, NULL);
1024 dma_resv_add_excl_fence(bo->base.resv, &fence->base);
1025 dma_fence_put(&fence->base);
1026 } else
1027 dma_resv_add_excl_fence(bo->base.resv, &fence->base);
1028 }
1029
1030
1031 /**
1032 * vmw_dumb_create - Create a dumb kms buffer
1033 *
1034 * @file_priv: Pointer to a struct drm_file identifying the caller.
1035 * @dev: Pointer to the drm device.
1036 * @args: Pointer to a struct drm_mode_create_dumb structure
1037 * Return: Zero on success, negative error code on failure.
1038 *
1039 * This is a driver callback for the core drm create_dumb functionality.
1040 * Note that this is very similar to the vmw_bo_alloc ioctl, except
1041 * that the arguments have a different format.
1042 */
1043 int vmw_dumb_create(struct drm_file *file_priv,
1044 struct drm_device *dev,
1045 struct drm_mode_create_dumb *args)
1046 {
1047 struct vmw_private *dev_priv = vmw_priv(dev);
1048 struct vmw_buffer_object *vbo;
1049 int ret;
1050
1051 args->pitch = args->width * ((args->bpp + 7) / 8);
1052 args->size = args->pitch * args->height;
1053
1054 ret = ttm_read_lock(&dev_priv->reservation_sem, true);
1055 if (unlikely(ret != 0))
1056 return ret;
1057
1058 ret = vmw_user_bo_alloc(dev_priv, vmw_fpriv(file_priv)->tfile,
1059 args->size, false, &args->handle,
1060 &vbo, NULL);
1061 if (unlikely(ret != 0))
1062 goto out_no_bo;
1063
1064 vmw_bo_unreference(&vbo);
1065 out_no_bo:
1066 ttm_read_unlock(&dev_priv->reservation_sem);
1067 return ret;
1068 }
1069
1070
1071 /**
1072 * vmw_dumb_map_offset - Return the address space offset of a dumb buffer
1073 *
1074 * @file_priv: Pointer to a struct drm_file identifying the caller.
1075 * @dev: Pointer to the drm device.
1076 * @handle: Handle identifying the dumb buffer.
1077 * @offset: The address space offset returned.
1078 * Return: Zero on success, negative error code on failure.
1079 *
1080 * This is a driver callback for the core drm dumb_map_offset functionality.
1081 */
1082 int vmw_dumb_map_offset(struct drm_file *file_priv,
1083 struct drm_device *dev, uint32_t handle,
1084 uint64_t *offset)
1085 {
1086 struct ttm_object_file *tfile = vmw_fpriv(file_priv)->tfile;
1087 struct vmw_buffer_object *out_buf;
1088 int ret;
1089
1090 ret = vmw_user_bo_lookup(tfile, handle, &out_buf, NULL);
1091 if (ret != 0)
1092 return -EINVAL;
1093
1094 *offset = drm_vma_node_offset_addr(&out_buf->base.base.vma_node);
1095 vmw_bo_unreference(&out_buf);
1096 return 0;
1097 }
1098
1099
1100 /**
1101 * vmw_dumb_destroy - Destroy a dumb boffer
1102 *
1103 * @file_priv: Pointer to a struct drm_file identifying the caller.
1104 * @dev: Pointer to the drm device.
1105 * @handle: Handle identifying the dumb buffer.
1106 * Return: Zero on success, negative error code on failure.
1107 *
1108 * This is a driver callback for the core drm dumb_destroy functionality.
1109 */
1110 int vmw_dumb_destroy(struct drm_file *file_priv,
1111 struct drm_device *dev,
1112 uint32_t handle)
1113 {
1114 return ttm_ref_object_base_unref(vmw_fpriv(file_priv)->tfile,
1115 handle, TTM_REF_USAGE);
1116 }
1117
1118
1119 /**
1120 * vmw_bo_swap_notify - swapout notify callback.
1121 *
1122 * @bo: The buffer object to be swapped out.
1123 */
1124 void vmw_bo_swap_notify(struct ttm_buffer_object *bo)
1125 {
1126 /* Is @bo embedded in a struct vmw_buffer_object? */
1127 if (bo->destroy != vmw_bo_bo_free &&
1128 bo->destroy != vmw_user_bo_destroy)
1129 return;
1130
1131 /* Kill any cached kernel maps before swapout */
1132 vmw_bo_unmap(vmw_buffer_object(bo));
1133 }
1134
1135
1136 /**
1137 * vmw_bo_move_notify - TTM move_notify_callback
1138 *
1139 * @bo: The TTM buffer object about to move.
1140 * @mem: The struct ttm_resource indicating to what memory
1141 * region the move is taking place.
1142 *
1143 * Detaches cached maps and device bindings that require that the
1144 * buffer doesn't move.
1145 */
1146 void vmw_bo_move_notify(struct ttm_buffer_object *bo,
1147 struct ttm_resource *mem)
1148 {
1149 struct vmw_buffer_object *vbo;
1150
1151 if (mem == NULL)
1152 return;
1153
1154 /* Make sure @bo is embedded in a struct vmw_buffer_object? */
1155 if (bo->destroy != vmw_bo_bo_free &&
1156 bo->destroy != vmw_user_bo_destroy)
1157 return;
1158
1159 vbo = container_of(bo, struct vmw_buffer_object, base);
1160
1161 /*
1162 * Kill any cached kernel maps before move to or from VRAM.
1163 * With other types of moves, the underlying pages stay the same,
1164 * and the map can be kept.
1165 */
1166 if (mem->mem_type == TTM_PL_VRAM || bo->mem.mem_type == TTM_PL_VRAM)
1167 vmw_bo_unmap(vbo);
1168
1169 /*
1170 * If we're moving a backup MOB out of MOB placement, then make sure we
1171 * read back all resource content first, and unbind the MOB from
1172 * the resource.
1173 */
1174 if (mem->mem_type != VMW_PL_MOB && bo->mem.mem_type == VMW_PL_MOB)
1175 vmw_resource_unbind_list(vbo);
1176 }