blob: 6583dd34ed18c7179fade500f5dea9300500f0ea [file] [log] [blame]
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001/**************************************************************************
2 *
3 * Copyright © 2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27
28#include "vmwgfx_drv.h"
29#include "vmwgfx_reg.h"
David Howells760285e2012-10-02 18:01:07 +010030#include <drm/ttm/ttm_bo_api.h>
31#include <drm/ttm/ttm_placement.h>
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +000032
Thomas Hellstromc0951b72012-11-20 12:19:35 +000033#define VMW_RES_HT_ORDER 12
34
35/**
36 * struct vmw_resource_relocation - Relocation info for resources
37 *
38 * @head: List head for the software context's relocation list.
39 * @res: Non-ref-counted pointer to the resource.
40 * @offset: Offset of 4 byte entries into the command buffer where the
41 * id that needs fixup is located.
42 */
43struct vmw_resource_relocation {
44 struct list_head head;
45 const struct vmw_resource *res;
46 unsigned long offset;
47};
48
49/**
50 * struct vmw_resource_val_node - Validation info for resources
51 *
52 * @head: List head for the software context's resource list.
53 * @hash: Hash entry for quick resouce to val_node lookup.
54 * @res: Ref-counted pointer to the resource.
55 * @switch_backup: Boolean whether to switch backup buffer on unreserve.
56 * @new_backup: Refcounted pointer to the new backup buffer.
57 * @new_backup_offset: New backup buffer offset if @new_backup is non-NUll.
58 * @first_usage: Set to true the first time the resource is referenced in
59 * the command stream.
60 * @no_buffer_needed: Resources do not need to allocate buffer backup on
61 * reservation. The command stream will provide one.
62 */
63struct vmw_resource_val_node {
64 struct list_head head;
65 struct drm_hash_item hash;
66 struct vmw_resource *res;
67 struct vmw_dma_buffer *new_backup;
68 unsigned long new_backup_offset;
69 bool first_usage;
70 bool no_buffer_needed;
71};
72
73/**
74 * vmw_resource_unreserve - unreserve resources previously reserved for
75 * command submission.
76 *
77 * @list_head: list of resources to unreserve.
78 * @backoff: Whether command submission failed.
79 */
80static void vmw_resource_list_unreserve(struct list_head *list,
81 bool backoff)
82{
83 struct vmw_resource_val_node *val;
84
85 list_for_each_entry(val, list, head) {
86 struct vmw_resource *res = val->res;
87 struct vmw_dma_buffer *new_backup =
88 backoff ? NULL : val->new_backup;
89
90 vmw_resource_unreserve(res, new_backup,
91 val->new_backup_offset);
92 vmw_dmabuf_unreference(&val->new_backup);
93 }
94}
95
96
97/**
98 * vmw_resource_val_add - Add a resource to the software context's
99 * resource list if it's not already on it.
100 *
101 * @sw_context: Pointer to the software context.
102 * @res: Pointer to the resource.
103 * @p_node On successful return points to a valid pointer to a
104 * struct vmw_resource_val_node, if non-NULL on entry.
105 */
106static int vmw_resource_val_add(struct vmw_sw_context *sw_context,
107 struct vmw_resource *res,
108 struct vmw_resource_val_node **p_node)
109{
110 struct vmw_resource_val_node *node;
111 struct drm_hash_item *hash;
112 int ret;
113
114 if (likely(drm_ht_find_item(&sw_context->res_ht, (unsigned long) res,
115 &hash) == 0)) {
116 node = container_of(hash, struct vmw_resource_val_node, hash);
117 node->first_usage = false;
118 if (unlikely(p_node != NULL))
119 *p_node = node;
120 return 0;
121 }
122
123 node = kzalloc(sizeof(*node), GFP_KERNEL);
124 if (unlikely(node == NULL)) {
125 DRM_ERROR("Failed to allocate a resource validation "
126 "entry.\n");
127 return -ENOMEM;
128 }
129
130 node->hash.key = (unsigned long) res;
131 ret = drm_ht_insert_item(&sw_context->res_ht, &node->hash);
132 if (unlikely(ret != 0)) {
133 DRM_ERROR("Failed to initialize a resource validation "
134 "entry.\n");
135 kfree(node);
136 return ret;
137 }
138 list_add_tail(&node->head, &sw_context->resource_list);
139 node->res = vmw_resource_reference(res);
140 node->first_usage = true;
141
142 if (unlikely(p_node != NULL))
143 *p_node = node;
144
145 return 0;
146}
147
148/**
149 * vmw_resource_relocation_add - Add a relocation to the relocation list
150 *
151 * @list: Pointer to head of relocation list.
152 * @res: The resource.
153 * @offset: Offset into the command buffer currently being parsed where the
154 * id that needs fixup is located. Granularity is 4 bytes.
155 */
156static int vmw_resource_relocation_add(struct list_head *list,
157 const struct vmw_resource *res,
158 unsigned long offset)
159{
160 struct vmw_resource_relocation *rel;
161
162 rel = kmalloc(sizeof(*rel), GFP_KERNEL);
163 if (unlikely(rel == NULL)) {
164 DRM_ERROR("Failed to allocate a resource relocation.\n");
165 return -ENOMEM;
166 }
167
168 rel->res = res;
169 rel->offset = offset;
170 list_add_tail(&rel->head, list);
171
172 return 0;
173}
174
175/**
176 * vmw_resource_relocations_free - Free all relocations on a list
177 *
178 * @list: Pointer to the head of the relocation list.
179 */
180static void vmw_resource_relocations_free(struct list_head *list)
181{
182 struct vmw_resource_relocation *rel, *n;
183
184 list_for_each_entry_safe(rel, n, list, head) {
185 list_del(&rel->head);
186 kfree(rel);
187 }
188}
189
190/**
191 * vmw_resource_relocations_apply - Apply all relocations on a list
192 *
193 * @cb: Pointer to the start of the command buffer bein patch. This need
194 * not be the same buffer as the one being parsed when the relocation
195 * list was built, but the contents must be the same modulo the
196 * resource ids.
197 * @list: Pointer to the head of the relocation list.
198 */
199static void vmw_resource_relocations_apply(uint32_t *cb,
200 struct list_head *list)
201{
202 struct vmw_resource_relocation *rel;
203
204 list_for_each_entry(rel, list, head)
205 cb[rel->offset] = rel->res->id;
206}
207
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000208static int vmw_cmd_invalid(struct vmw_private *dev_priv,
209 struct vmw_sw_context *sw_context,
210 SVGA3dCmdHeader *header)
211{
212 return capable(CAP_SYS_ADMIN) ? : -EINVAL;
213}
214
215static int vmw_cmd_ok(struct vmw_private *dev_priv,
216 struct vmw_sw_context *sw_context,
217 SVGA3dCmdHeader *header)
218{
219 return 0;
220}
221
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200222/**
223 * vmw_bo_to_validate_list - add a bo to a validate list
224 *
225 * @sw_context: The software context used for this command submission batch.
226 * @bo: The buffer object to add.
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100227 * @validate_as_mob: Validate this buffer as a MOB.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200228 * @p_val_node: If non-NULL Will be updated with the validate node number
229 * on return.
230 *
231 * Returns -EINVAL if the limit of number of buffer objects per command
232 * submission is reached.
233 */
234static int vmw_bo_to_validate_list(struct vmw_sw_context *sw_context,
235 struct ttm_buffer_object *bo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100236 bool validate_as_mob,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200237 uint32_t *p_val_node)
238{
239 uint32_t val_node;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000240 struct vmw_validate_buffer *vval_buf;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200241 struct ttm_validate_buffer *val_buf;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000242 struct drm_hash_item *hash;
243 int ret;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200244
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000245 if (likely(drm_ht_find_item(&sw_context->res_ht, (unsigned long) bo,
246 &hash) == 0)) {
247 vval_buf = container_of(hash, struct vmw_validate_buffer,
248 hash);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100249 if (unlikely(vval_buf->validate_as_mob != validate_as_mob)) {
250 DRM_ERROR("Inconsistent buffer usage.\n");
251 return -EINVAL;
252 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000253 val_buf = &vval_buf->base;
254 val_node = vval_buf - sw_context->val_bufs;
255 } else {
256 val_node = sw_context->cur_val_buf;
257 if (unlikely(val_node >= VMWGFX_MAX_VALIDATIONS)) {
258 DRM_ERROR("Max number of DMA buffers per submission "
259 "exceeded.\n");
260 return -EINVAL;
261 }
262 vval_buf = &sw_context->val_bufs[val_node];
263 vval_buf->hash.key = (unsigned long) bo;
264 ret = drm_ht_insert_item(&sw_context->res_ht, &vval_buf->hash);
265 if (unlikely(ret != 0)) {
266 DRM_ERROR("Failed to initialize a buffer validation "
267 "entry.\n");
268 return ret;
269 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200270 ++sw_context->cur_val_buf;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000271 val_buf = &vval_buf->base;
272 val_buf->bo = ttm_bo_reference(bo);
273 val_buf->reserved = false;
274 list_add_tail(&val_buf->head, &sw_context->validate_nodes);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100275 vval_buf->validate_as_mob = validate_as_mob;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200276 }
277
Maarten Lankhorstbe013362012-10-12 15:01:43 +0000278 sw_context->fence_flags |= DRM_VMW_FENCE_FLAG_EXEC;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200279
280 if (p_val_node)
281 *p_val_node = val_node;
282
283 return 0;
284}
285
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000286/**
287 * vmw_resources_reserve - Reserve all resources on the sw_context's
288 * resource list.
289 *
290 * @sw_context: Pointer to the software context.
291 *
292 * Note that since vmware's command submission currently is protected by
293 * the cmdbuf mutex, no fancy deadlock avoidance is required for resources,
294 * since only a single thread at once will attempt this.
295 */
296static int vmw_resources_reserve(struct vmw_sw_context *sw_context)
297{
298 struct vmw_resource_val_node *val;
299 int ret;
300
301 list_for_each_entry(val, &sw_context->resource_list, head) {
302 struct vmw_resource *res = val->res;
303
304 ret = vmw_resource_reserve(res, val->no_buffer_needed);
305 if (unlikely(ret != 0))
306 return ret;
307
308 if (res->backup) {
309 struct ttm_buffer_object *bo = &res->backup->base;
310
311 ret = vmw_bo_to_validate_list
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100312 (sw_context, bo,
313 vmw_resource_needs_backup(res), NULL);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000314
315 if (unlikely(ret != 0))
316 return ret;
317 }
318 }
319 return 0;
320}
321
322/**
323 * vmw_resources_validate - Validate all resources on the sw_context's
324 * resource list.
325 *
326 * @sw_context: Pointer to the software context.
327 *
328 * Before this function is called, all resource backup buffers must have
329 * been validated.
330 */
331static int vmw_resources_validate(struct vmw_sw_context *sw_context)
332{
333 struct vmw_resource_val_node *val;
334 int ret;
335
336 list_for_each_entry(val, &sw_context->resource_list, head) {
337 struct vmw_resource *res = val->res;
338
339 ret = vmw_resource_validate(res);
340 if (unlikely(ret != 0)) {
341 if (ret != -ERESTARTSYS)
342 DRM_ERROR("Failed to validate resource.\n");
343 return ret;
344 }
345 }
346 return 0;
347}
348
349/**
350 * vmw_cmd_res_check - Check that a resource is present and if so, put it
351 * on the resource validate list unless it's already there.
352 *
353 * @dev_priv: Pointer to a device private structure.
354 * @sw_context: Pointer to the software context.
355 * @res_type: Resource type.
356 * @converter: User-space visisble type specific information.
357 * @id: Pointer to the location in the command buffer currently being
358 * parsed from where the user-space resource id handle is located.
359 */
360static int vmw_cmd_res_check(struct vmw_private *dev_priv,
361 struct vmw_sw_context *sw_context,
362 enum vmw_res_type res_type,
363 const struct vmw_user_resource_conv *converter,
364 uint32_t *id,
365 struct vmw_resource_val_node **p_val)
366{
367 struct vmw_res_cache_entry *rcache =
368 &sw_context->res_cache[res_type];
369 struct vmw_resource *res;
370 struct vmw_resource_val_node *node;
371 int ret;
372
373 if (*id == SVGA3D_INVALID_ID)
374 return 0;
375
376 /*
377 * Fastpath in case of repeated commands referencing the same
378 * resource
379 */
380
381 if (likely(rcache->valid && *id == rcache->handle)) {
382 const struct vmw_resource *res = rcache->res;
383
384 rcache->node->first_usage = false;
385 if (p_val)
386 *p_val = rcache->node;
387
388 return vmw_resource_relocation_add
389 (&sw_context->res_relocations, res,
390 id - sw_context->buf_start);
391 }
392
393 ret = vmw_user_resource_lookup_handle(dev_priv,
394 sw_context->tfile,
395 *id,
396 converter,
397 &res);
398 if (unlikely(ret != 0)) {
399 DRM_ERROR("Could not find or use resource 0x%08x.\n",
400 (unsigned) *id);
401 dump_stack();
402 return ret;
403 }
404
405 rcache->valid = true;
406 rcache->res = res;
407 rcache->handle = *id;
408
409 ret = vmw_resource_relocation_add(&sw_context->res_relocations,
410 res,
411 id - sw_context->buf_start);
412 if (unlikely(ret != 0))
413 goto out_no_reloc;
414
415 ret = vmw_resource_val_add(sw_context, res, &node);
416 if (unlikely(ret != 0))
417 goto out_no_reloc;
418
419 rcache->node = node;
420 if (p_val)
421 *p_val = node;
422 vmw_resource_unreference(&res);
423 return 0;
424
425out_no_reloc:
426 BUG_ON(sw_context->error_resource != NULL);
427 sw_context->error_resource = res;
428
429 return ret;
430}
431
432/**
433 * vmw_cmd_cid_check - Check a command header for valid context information.
434 *
435 * @dev_priv: Pointer to a device private structure.
436 * @sw_context: Pointer to the software context.
437 * @header: A command header with an embedded user-space context handle.
438 *
439 * Convenience function: Call vmw_cmd_res_check with the user-space context
440 * handle embedded in @header.
441 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000442static int vmw_cmd_cid_check(struct vmw_private *dev_priv,
443 struct vmw_sw_context *sw_context,
444 SVGA3dCmdHeader *header)
445{
446 struct vmw_cid_cmd {
447 SVGA3dCmdHeader header;
448 __le32 cid;
449 } *cmd;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000450
451 cmd = container_of(header, struct vmw_cid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000452 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
453 user_context_converter, &cmd->cid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000454}
455
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000456static int vmw_cmd_set_render_target_check(struct vmw_private *dev_priv,
457 struct vmw_sw_context *sw_context,
458 SVGA3dCmdHeader *header)
459{
460 struct vmw_sid_cmd {
461 SVGA3dCmdHeader header;
462 SVGA3dCmdSetRenderTarget body;
463 } *cmd;
464 int ret;
465
466 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
467 if (unlikely(ret != 0))
468 return ret;
469
470 cmd = container_of(header, struct vmw_sid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000471 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
472 user_surface_converter,
473 &cmd->body.target.sid, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +0100474 return ret;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000475}
476
477static int vmw_cmd_surface_copy_check(struct vmw_private *dev_priv,
478 struct vmw_sw_context *sw_context,
479 SVGA3dCmdHeader *header)
480{
481 struct vmw_sid_cmd {
482 SVGA3dCmdHeader header;
483 SVGA3dCmdSurfaceCopy body;
484 } *cmd;
485 int ret;
486
487 cmd = container_of(header, struct vmw_sid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000488 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
489 user_surface_converter,
490 &cmd->body.src.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000491 if (unlikely(ret != 0))
492 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000493 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
494 user_surface_converter,
495 &cmd->body.dest.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000496}
497
498static int vmw_cmd_stretch_blt_check(struct vmw_private *dev_priv,
499 struct vmw_sw_context *sw_context,
500 SVGA3dCmdHeader *header)
501{
502 struct vmw_sid_cmd {
503 SVGA3dCmdHeader header;
504 SVGA3dCmdSurfaceStretchBlt body;
505 } *cmd;
506 int ret;
507
508 cmd = container_of(header, struct vmw_sid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000509 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
510 user_surface_converter,
511 &cmd->body.src.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000512 if (unlikely(ret != 0))
513 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000514 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
515 user_surface_converter,
516 &cmd->body.dest.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000517}
518
519static int vmw_cmd_blt_surf_screen_check(struct vmw_private *dev_priv,
520 struct vmw_sw_context *sw_context,
521 SVGA3dCmdHeader *header)
522{
523 struct vmw_sid_cmd {
524 SVGA3dCmdHeader header;
525 SVGA3dCmdBlitSurfaceToScreen body;
526 } *cmd;
527
528 cmd = container_of(header, struct vmw_sid_cmd, header);
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +0200529
530 if (unlikely(!sw_context->kernel)) {
531 DRM_ERROR("Kernel only SVGA3d command: %u.\n", cmd->header.id);
532 return -EPERM;
533 }
534
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000535 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
536 user_surface_converter,
537 &cmd->body.srcImage.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000538}
539
540static int vmw_cmd_present_check(struct vmw_private *dev_priv,
541 struct vmw_sw_context *sw_context,
542 SVGA3dCmdHeader *header)
543{
544 struct vmw_sid_cmd {
545 SVGA3dCmdHeader header;
546 SVGA3dCmdPresent body;
547 } *cmd;
548
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +0200549
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000550 cmd = container_of(header, struct vmw_sid_cmd, header);
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +0200551
552 if (unlikely(!sw_context->kernel)) {
553 DRM_ERROR("Kernel only SVGA3d command: %u.\n", cmd->header.id);
554 return -EPERM;
555 }
556
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000557 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
558 user_surface_converter, &cmd->body.sid,
559 NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000560}
561
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200562/**
563 * vmw_query_bo_switch_prepare - Prepare to switch pinned buffer for queries.
564 *
565 * @dev_priv: The device private structure.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200566 * @new_query_bo: The new buffer holding query results.
567 * @sw_context: The software context used for this command submission.
568 *
569 * This function checks whether @new_query_bo is suitable for holding
570 * query results, and if another buffer currently is pinned for query
571 * results. If so, the function prepares the state of @sw_context for
572 * switching pinned buffers after successful submission of the current
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000573 * command batch.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200574 */
575static int vmw_query_bo_switch_prepare(struct vmw_private *dev_priv,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200576 struct ttm_buffer_object *new_query_bo,
577 struct vmw_sw_context *sw_context)
578{
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000579 struct vmw_res_cache_entry *ctx_entry =
580 &sw_context->res_cache[vmw_res_context];
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200581 int ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000582
583 BUG_ON(!ctx_entry->valid);
584 sw_context->last_query_ctx = ctx_entry->res;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200585
586 if (unlikely(new_query_bo != sw_context->cur_query_bo)) {
587
588 if (unlikely(new_query_bo->num_pages > 4)) {
589 DRM_ERROR("Query buffer too large.\n");
590 return -EINVAL;
591 }
592
593 if (unlikely(sw_context->cur_query_bo != NULL)) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000594 sw_context->needs_post_query_barrier = true;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200595 ret = vmw_bo_to_validate_list(sw_context,
596 sw_context->cur_query_bo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100597 dev_priv->has_mob, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200598 if (unlikely(ret != 0))
599 return ret;
600 }
601 sw_context->cur_query_bo = new_query_bo;
602
603 ret = vmw_bo_to_validate_list(sw_context,
604 dev_priv->dummy_query_bo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100605 dev_priv->has_mob, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200606 if (unlikely(ret != 0))
607 return ret;
608
609 }
610
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200611 return 0;
612}
613
614
615/**
616 * vmw_query_bo_switch_commit - Finalize switching pinned query buffer
617 *
618 * @dev_priv: The device private structure.
619 * @sw_context: The software context used for this command submission batch.
620 *
621 * This function will check if we're switching query buffers, and will then,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200622 * issue a dummy occlusion query wait used as a query barrier. When the fence
623 * object following that query wait has signaled, we are sure that all
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000624 * preceding queries have finished, and the old query buffer can be unpinned.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200625 * However, since both the new query buffer and the old one are fenced with
626 * that fence, we can do an asynchronus unpin now, and be sure that the
627 * old query buffer won't be moved until the fence has signaled.
628 *
629 * As mentioned above, both the new - and old query buffers need to be fenced
630 * using a sequence emitted *after* calling this function.
631 */
632static void vmw_query_bo_switch_commit(struct vmw_private *dev_priv,
633 struct vmw_sw_context *sw_context)
634{
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200635 /*
636 * The validate list should still hold references to all
637 * contexts here.
638 */
639
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000640 if (sw_context->needs_post_query_barrier) {
641 struct vmw_res_cache_entry *ctx_entry =
642 &sw_context->res_cache[vmw_res_context];
643 struct vmw_resource *ctx;
644 int ret;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200645
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000646 BUG_ON(!ctx_entry->valid);
647 ctx = ctx_entry->res;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200648
649 ret = vmw_fifo_emit_dummy_query(dev_priv, ctx->id);
650
651 if (unlikely(ret != 0))
652 DRM_ERROR("Out of fifo space for dummy query.\n");
653 }
654
655 if (dev_priv->pinned_bo != sw_context->cur_query_bo) {
656 if (dev_priv->pinned_bo) {
657 vmw_bo_pin(dev_priv->pinned_bo, false);
658 ttm_bo_unref(&dev_priv->pinned_bo);
659 }
660
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000661 if (!sw_context->needs_post_query_barrier) {
662 vmw_bo_pin(sw_context->cur_query_bo, true);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200663
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000664 /*
665 * We pin also the dummy_query_bo buffer so that we
666 * don't need to validate it when emitting
667 * dummy queries in context destroy paths.
668 */
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200669
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000670 vmw_bo_pin(dev_priv->dummy_query_bo, true);
671 dev_priv->dummy_query_bo_pinned = true;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200672
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000673 BUG_ON(sw_context->last_query_ctx == NULL);
674 dev_priv->query_cid = sw_context->last_query_ctx->id;
675 dev_priv->query_cid_valid = true;
676 dev_priv->pinned_bo =
677 ttm_bo_reference(sw_context->cur_query_bo);
678 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200679 }
680}
681
682/**
Thomas Hellstromddcda242012-11-21 11:26:55 +0100683 * vmw_translate_mob_pointer - Prepare to translate a user-space buffer
684 * handle to a MOB id.
685 *
686 * @dev_priv: Pointer to a device private structure.
687 * @sw_context: The software context used for this command batch validation.
688 * @id: Pointer to the user-space handle to be translated.
689 * @vmw_bo_p: Points to a location that, on successful return will carry
690 * a reference-counted pointer to the DMA buffer identified by the
691 * user-space handle in @id.
692 *
693 * This function saves information needed to translate a user-space buffer
694 * handle to a MOB id. The translation does not take place immediately, but
695 * during a call to vmw_apply_relocations(). This function builds a relocation
696 * list and a list of buffers to validate. The former needs to be freed using
697 * either vmw_apply_relocations() or vmw_free_relocations(). The latter
698 * needs to be freed using vmw_clear_validations.
699 */
700static int vmw_translate_mob_ptr(struct vmw_private *dev_priv,
701 struct vmw_sw_context *sw_context,
702 SVGAMobId *id,
703 struct vmw_dma_buffer **vmw_bo_p)
704{
705 struct vmw_dma_buffer *vmw_bo = NULL;
706 struct ttm_buffer_object *bo;
707 uint32_t handle = *id;
708 struct vmw_relocation *reloc;
709 int ret;
710
711 ret = vmw_user_dmabuf_lookup(sw_context->tfile, handle, &vmw_bo);
712 if (unlikely(ret != 0)) {
713 DRM_ERROR("Could not find or use MOB buffer.\n");
714 return -EINVAL;
715 }
716 bo = &vmw_bo->base;
717
718 if (unlikely(sw_context->cur_reloc >= VMWGFX_MAX_RELOCATIONS)) {
719 DRM_ERROR("Max number relocations per submission"
720 " exceeded\n");
721 ret = -EINVAL;
722 goto out_no_reloc;
723 }
724
725 reloc = &sw_context->relocs[sw_context->cur_reloc++];
726 reloc->mob_loc = id;
727 reloc->location = NULL;
728
729 ret = vmw_bo_to_validate_list(sw_context, bo, true, &reloc->index);
730 if (unlikely(ret != 0))
731 goto out_no_reloc;
732
733 *vmw_bo_p = vmw_bo;
734 return 0;
735
736out_no_reloc:
737 vmw_dmabuf_unreference(&vmw_bo);
738 vmw_bo_p = NULL;
739 return ret;
740}
741
742/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000743 * vmw_translate_guest_pointer - Prepare to translate a user-space buffer
744 * handle to a valid SVGAGuestPtr
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200745 *
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000746 * @dev_priv: Pointer to a device private structure.
747 * @sw_context: The software context used for this command batch validation.
748 * @ptr: Pointer to the user-space handle to be translated.
749 * @vmw_bo_p: Points to a location that, on successful return will carry
750 * a reference-counted pointer to the DMA buffer identified by the
751 * user-space handle in @id.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200752 *
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000753 * This function saves information needed to translate a user-space buffer
754 * handle to a valid SVGAGuestPtr. The translation does not take place
755 * immediately, but during a call to vmw_apply_relocations().
756 * This function builds a relocation list and a list of buffers to validate.
757 * The former needs to be freed using either vmw_apply_relocations() or
758 * vmw_free_relocations(). The latter needs to be freed using
759 * vmw_clear_validations.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200760 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000761static int vmw_translate_guest_ptr(struct vmw_private *dev_priv,
762 struct vmw_sw_context *sw_context,
763 SVGAGuestPtr *ptr,
764 struct vmw_dma_buffer **vmw_bo_p)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000765{
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000766 struct vmw_dma_buffer *vmw_bo = NULL;
767 struct ttm_buffer_object *bo;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000768 uint32_t handle = ptr->gmrId;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000769 struct vmw_relocation *reloc;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000770 int ret;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000771
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000772 ret = vmw_user_dmabuf_lookup(sw_context->tfile, handle, &vmw_bo);
773 if (unlikely(ret != 0)) {
774 DRM_ERROR("Could not find or use GMR region.\n");
775 return -EINVAL;
776 }
777 bo = &vmw_bo->base;
778
779 if (unlikely(sw_context->cur_reloc >= VMWGFX_MAX_RELOCATIONS)) {
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000780 DRM_ERROR("Max number relocations per submission"
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000781 " exceeded\n");
782 ret = -EINVAL;
783 goto out_no_reloc;
784 }
785
786 reloc = &sw_context->relocs[sw_context->cur_reloc++];
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000787 reloc->location = ptr;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000788
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100789 ret = vmw_bo_to_validate_list(sw_context, bo, false, &reloc->index);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200790 if (unlikely(ret != 0))
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000791 goto out_no_reloc;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000792
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000793 *vmw_bo_p = vmw_bo;
794 return 0;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000795
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000796out_no_reloc:
797 vmw_dmabuf_unreference(&vmw_bo);
798 vmw_bo_p = NULL;
799 return ret;
800}
801
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000802/**
Thomas Hellstromddcda242012-11-21 11:26:55 +0100803 * vmw_cmd_begin_gb_query - validate a SVGA_3D_CMD_BEGIN_GB_QUERY command.
804 *
805 * @dev_priv: Pointer to a device private struct.
806 * @sw_context: The software context used for this command submission.
807 * @header: Pointer to the command header in the command stream.
808 */
809static int vmw_cmd_begin_gb_query(struct vmw_private *dev_priv,
810 struct vmw_sw_context *sw_context,
811 SVGA3dCmdHeader *header)
812{
813 struct vmw_begin_gb_query_cmd {
814 SVGA3dCmdHeader header;
815 SVGA3dCmdBeginGBQuery q;
816 } *cmd;
817
818 cmd = container_of(header, struct vmw_begin_gb_query_cmd,
819 header);
820
821 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
822 user_context_converter, &cmd->q.cid,
823 NULL);
824}
825
826/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000827 * vmw_cmd_begin_query - validate a SVGA_3D_CMD_BEGIN_QUERY command.
828 *
829 * @dev_priv: Pointer to a device private struct.
830 * @sw_context: The software context used for this command submission.
831 * @header: Pointer to the command header in the command stream.
832 */
833static int vmw_cmd_begin_query(struct vmw_private *dev_priv,
834 struct vmw_sw_context *sw_context,
835 SVGA3dCmdHeader *header)
836{
837 struct vmw_begin_query_cmd {
838 SVGA3dCmdHeader header;
839 SVGA3dCmdBeginQuery q;
840 } *cmd;
841
842 cmd = container_of(header, struct vmw_begin_query_cmd,
843 header);
844
Thomas Hellstromddcda242012-11-21 11:26:55 +0100845 if (unlikely(dev_priv->has_mob)) {
846 struct {
847 SVGA3dCmdHeader header;
848 SVGA3dCmdBeginGBQuery q;
849 } gb_cmd;
850
851 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
852
853 gb_cmd.header.id = SVGA_3D_CMD_BEGIN_GB_QUERY;
854 gb_cmd.header.size = cmd->header.size;
855 gb_cmd.q.cid = cmd->q.cid;
856 gb_cmd.q.type = cmd->q.type;
857
858 memcpy(cmd, &gb_cmd, sizeof(*cmd));
859 return vmw_cmd_begin_gb_query(dev_priv, sw_context, header);
860 }
861
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000862 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
863 user_context_converter, &cmd->q.cid,
864 NULL);
865}
866
867/**
Thomas Hellstromddcda242012-11-21 11:26:55 +0100868 * vmw_cmd_end_gb_query - validate a SVGA_3D_CMD_END_GB_QUERY command.
869 *
870 * @dev_priv: Pointer to a device private struct.
871 * @sw_context: The software context used for this command submission.
872 * @header: Pointer to the command header in the command stream.
873 */
874static int vmw_cmd_end_gb_query(struct vmw_private *dev_priv,
875 struct vmw_sw_context *sw_context,
876 SVGA3dCmdHeader *header)
877{
878 struct vmw_dma_buffer *vmw_bo;
879 struct vmw_query_cmd {
880 SVGA3dCmdHeader header;
881 SVGA3dCmdEndGBQuery q;
882 } *cmd;
883 int ret;
884
885 cmd = container_of(header, struct vmw_query_cmd, header);
886 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
887 if (unlikely(ret != 0))
888 return ret;
889
890 ret = vmw_translate_mob_ptr(dev_priv, sw_context,
891 &cmd->q.mobid,
892 &vmw_bo);
893 if (unlikely(ret != 0))
894 return ret;
895
896 ret = vmw_query_bo_switch_prepare(dev_priv, &vmw_bo->base, sw_context);
897
898 vmw_dmabuf_unreference(&vmw_bo);
899 return ret;
900}
901
902/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000903 * vmw_cmd_end_query - validate a SVGA_3D_CMD_END_QUERY command.
904 *
905 * @dev_priv: Pointer to a device private struct.
906 * @sw_context: The software context used for this command submission.
907 * @header: Pointer to the command header in the command stream.
908 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000909static int vmw_cmd_end_query(struct vmw_private *dev_priv,
910 struct vmw_sw_context *sw_context,
911 SVGA3dCmdHeader *header)
912{
913 struct vmw_dma_buffer *vmw_bo;
914 struct vmw_query_cmd {
915 SVGA3dCmdHeader header;
916 SVGA3dCmdEndQuery q;
917 } *cmd;
918 int ret;
919
920 cmd = container_of(header, struct vmw_query_cmd, header);
Thomas Hellstromddcda242012-11-21 11:26:55 +0100921 if (dev_priv->has_mob) {
922 struct {
923 SVGA3dCmdHeader header;
924 SVGA3dCmdEndGBQuery q;
925 } gb_cmd;
926
927 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
928
929 gb_cmd.header.id = SVGA_3D_CMD_END_GB_QUERY;
930 gb_cmd.header.size = cmd->header.size;
931 gb_cmd.q.cid = cmd->q.cid;
932 gb_cmd.q.type = cmd->q.type;
933 gb_cmd.q.mobid = cmd->q.guestResult.gmrId;
934 gb_cmd.q.offset = cmd->q.guestResult.offset;
935
936 memcpy(cmd, &gb_cmd, sizeof(*cmd));
937 return vmw_cmd_end_gb_query(dev_priv, sw_context, header);
938 }
939
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000940 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
941 if (unlikely(ret != 0))
942 return ret;
943
944 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
945 &cmd->q.guestResult,
946 &vmw_bo);
947 if (unlikely(ret != 0))
948 return ret;
949
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000950 ret = vmw_query_bo_switch_prepare(dev_priv, &vmw_bo->base, sw_context);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200951
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000952 vmw_dmabuf_unreference(&vmw_bo);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200953 return ret;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000954}
955
Thomas Hellstromddcda242012-11-21 11:26:55 +0100956/**
957 * vmw_cmd_wait_gb_query - validate a SVGA_3D_CMD_WAIT_GB_QUERY command.
958 *
959 * @dev_priv: Pointer to a device private struct.
960 * @sw_context: The software context used for this command submission.
961 * @header: Pointer to the command header in the command stream.
962 */
963static int vmw_cmd_wait_gb_query(struct vmw_private *dev_priv,
964 struct vmw_sw_context *sw_context,
965 SVGA3dCmdHeader *header)
966{
967 struct vmw_dma_buffer *vmw_bo;
968 struct vmw_query_cmd {
969 SVGA3dCmdHeader header;
970 SVGA3dCmdWaitForGBQuery q;
971 } *cmd;
972 int ret;
973
974 cmd = container_of(header, struct vmw_query_cmd, header);
975 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
976 if (unlikely(ret != 0))
977 return ret;
978
979 ret = vmw_translate_mob_ptr(dev_priv, sw_context,
980 &cmd->q.mobid,
981 &vmw_bo);
982 if (unlikely(ret != 0))
983 return ret;
984
985 vmw_dmabuf_unreference(&vmw_bo);
986 return 0;
987}
988
989/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000990 * vmw_cmd_wait_query - validate a SVGA_3D_CMD_WAIT_QUERY command.
991 *
992 * @dev_priv: Pointer to a device private struct.
993 * @sw_context: The software context used for this command submission.
994 * @header: Pointer to the command header in the command stream.
995 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000996static int vmw_cmd_wait_query(struct vmw_private *dev_priv,
997 struct vmw_sw_context *sw_context,
998 SVGA3dCmdHeader *header)
999{
1000 struct vmw_dma_buffer *vmw_bo;
1001 struct vmw_query_cmd {
1002 SVGA3dCmdHeader header;
1003 SVGA3dCmdWaitForQuery q;
1004 } *cmd;
1005 int ret;
1006
1007 cmd = container_of(header, struct vmw_query_cmd, header);
Thomas Hellstromddcda242012-11-21 11:26:55 +01001008 if (dev_priv->has_mob) {
1009 struct {
1010 SVGA3dCmdHeader header;
1011 SVGA3dCmdWaitForGBQuery q;
1012 } gb_cmd;
1013
1014 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
1015
1016 gb_cmd.header.id = SVGA_3D_CMD_WAIT_FOR_GB_QUERY;
1017 gb_cmd.header.size = cmd->header.size;
1018 gb_cmd.q.cid = cmd->q.cid;
1019 gb_cmd.q.type = cmd->q.type;
1020 gb_cmd.q.mobid = cmd->q.guestResult.gmrId;
1021 gb_cmd.q.offset = cmd->q.guestResult.offset;
1022
1023 memcpy(cmd, &gb_cmd, sizeof(*cmd));
1024 return vmw_cmd_wait_gb_query(dev_priv, sw_context, header);
1025 }
1026
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001027 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1028 if (unlikely(ret != 0))
1029 return ret;
1030
1031 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1032 &cmd->q.guestResult,
1033 &vmw_bo);
1034 if (unlikely(ret != 0))
1035 return ret;
1036
1037 vmw_dmabuf_unreference(&vmw_bo);
1038 return 0;
1039}
1040
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001041static int vmw_cmd_dma(struct vmw_private *dev_priv,
1042 struct vmw_sw_context *sw_context,
1043 SVGA3dCmdHeader *header)
1044{
1045 struct vmw_dma_buffer *vmw_bo = NULL;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001046 struct vmw_surface *srf = NULL;
1047 struct vmw_dma_cmd {
1048 SVGA3dCmdHeader header;
1049 SVGA3dCmdSurfaceDMA dma;
1050 } *cmd;
1051 int ret;
1052
1053 cmd = container_of(header, struct vmw_dma_cmd, header);
1054 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1055 &cmd->dma.guest.ptr,
1056 &vmw_bo);
1057 if (unlikely(ret != 0))
1058 return ret;
1059
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001060 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1061 user_surface_converter, &cmd->dma.host.sid,
1062 NULL);
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +02001063 if (unlikely(ret != 0)) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001064 if (unlikely(ret != -ERESTARTSYS))
1065 DRM_ERROR("could not find surface for DMA.\n");
1066 goto out_no_surface;
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +02001067 }
1068
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001069 srf = vmw_res_to_srf(sw_context->res_cache[vmw_res_surface].res);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001070
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001071 vmw_kms_cursor_snoop(srf, sw_context->tfile, &vmw_bo->base, header);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001072
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001073out_no_surface:
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001074 vmw_dmabuf_unreference(&vmw_bo);
1075 return ret;
1076}
1077
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001078static int vmw_cmd_draw(struct vmw_private *dev_priv,
1079 struct vmw_sw_context *sw_context,
1080 SVGA3dCmdHeader *header)
1081{
1082 struct vmw_draw_cmd {
1083 SVGA3dCmdHeader header;
1084 SVGA3dCmdDrawPrimitives body;
1085 } *cmd;
1086 SVGA3dVertexDecl *decl = (SVGA3dVertexDecl *)(
1087 (unsigned long)header + sizeof(*cmd));
1088 SVGA3dPrimitiveRange *range;
1089 uint32_t i;
1090 uint32_t maxnum;
1091 int ret;
1092
1093 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1094 if (unlikely(ret != 0))
1095 return ret;
1096
1097 cmd = container_of(header, struct vmw_draw_cmd, header);
1098 maxnum = (header->size - sizeof(cmd->body)) / sizeof(*decl);
1099
1100 if (unlikely(cmd->body.numVertexDecls > maxnum)) {
1101 DRM_ERROR("Illegal number of vertex declarations.\n");
1102 return -EINVAL;
1103 }
1104
1105 for (i = 0; i < cmd->body.numVertexDecls; ++i, ++decl) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001106 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1107 user_surface_converter,
1108 &decl->array.surfaceId, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001109 if (unlikely(ret != 0))
1110 return ret;
1111 }
1112
1113 maxnum = (header->size - sizeof(cmd->body) -
1114 cmd->body.numVertexDecls * sizeof(*decl)) / sizeof(*range);
1115 if (unlikely(cmd->body.numRanges > maxnum)) {
1116 DRM_ERROR("Illegal number of index ranges.\n");
1117 return -EINVAL;
1118 }
1119
1120 range = (SVGA3dPrimitiveRange *) decl;
1121 for (i = 0; i < cmd->body.numRanges; ++i, ++range) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001122 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1123 user_surface_converter,
1124 &range->indexArray.surfaceId, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001125 if (unlikely(ret != 0))
1126 return ret;
1127 }
1128 return 0;
1129}
1130
1131
1132static int vmw_cmd_tex_state(struct vmw_private *dev_priv,
1133 struct vmw_sw_context *sw_context,
1134 SVGA3dCmdHeader *header)
1135{
1136 struct vmw_tex_state_cmd {
1137 SVGA3dCmdHeader header;
1138 SVGA3dCmdSetTextureState state;
1139 };
1140
1141 SVGA3dTextureState *last_state = (SVGA3dTextureState *)
1142 ((unsigned long) header + header->size + sizeof(header));
1143 SVGA3dTextureState *cur_state = (SVGA3dTextureState *)
1144 ((unsigned long) header + sizeof(struct vmw_tex_state_cmd));
1145 int ret;
1146
1147 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1148 if (unlikely(ret != 0))
1149 return ret;
1150
1151 for (; cur_state < last_state; ++cur_state) {
1152 if (likely(cur_state->name != SVGA3D_TS_BIND_TEXTURE))
1153 continue;
1154
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001155 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1156 user_surface_converter,
1157 &cur_state->value, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001158 if (unlikely(ret != 0))
1159 return ret;
1160 }
1161
1162 return 0;
1163}
1164
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001165static int vmw_cmd_check_define_gmrfb(struct vmw_private *dev_priv,
1166 struct vmw_sw_context *sw_context,
1167 void *buf)
1168{
1169 struct vmw_dma_buffer *vmw_bo;
1170 int ret;
1171
1172 struct {
1173 uint32_t header;
1174 SVGAFifoCmdDefineGMRFB body;
1175 } *cmd = buf;
1176
1177 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1178 &cmd->body.ptr,
1179 &vmw_bo);
1180 if (unlikely(ret != 0))
1181 return ret;
1182
1183 vmw_dmabuf_unreference(&vmw_bo);
1184
1185 return ret;
1186}
1187
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001188/**
1189 * vmw_cmd_set_shader - Validate an SVGA_3D_CMD_SET_SHADER
1190 * command
1191 *
1192 * @dev_priv: Pointer to a device private struct.
1193 * @sw_context: The software context being used for this batch.
1194 * @header: Pointer to the command header in the command stream.
1195 */
1196static int vmw_cmd_set_shader(struct vmw_private *dev_priv,
1197 struct vmw_sw_context *sw_context,
1198 SVGA3dCmdHeader *header)
1199{
1200 struct vmw_set_shader_cmd {
1201 SVGA3dCmdHeader header;
1202 SVGA3dCmdSetShader body;
1203 } *cmd;
1204 int ret;
1205
1206 cmd = container_of(header, struct vmw_set_shader_cmd,
1207 header);
1208
1209 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1210 if (unlikely(ret != 0))
1211 return ret;
1212
1213 return 0;
1214}
1215
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001216static int vmw_cmd_check_not_3d(struct vmw_private *dev_priv,
1217 struct vmw_sw_context *sw_context,
1218 void *buf, uint32_t *size)
1219{
1220 uint32_t size_remaining = *size;
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001221 uint32_t cmd_id;
1222
1223 cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
1224 switch (cmd_id) {
1225 case SVGA_CMD_UPDATE:
1226 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdUpdate);
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001227 break;
1228 case SVGA_CMD_DEFINE_GMRFB:
1229 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdDefineGMRFB);
1230 break;
1231 case SVGA_CMD_BLIT_GMRFB_TO_SCREEN:
1232 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
1233 break;
1234 case SVGA_CMD_BLIT_SCREEN_TO_GMRFB:
1235 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
1236 break;
1237 default:
1238 DRM_ERROR("Unsupported SVGA command: %u.\n", cmd_id);
1239 return -EINVAL;
1240 }
1241
1242 if (*size > size_remaining) {
1243 DRM_ERROR("Invalid SVGA command (size mismatch):"
1244 " %u.\n", cmd_id);
1245 return -EINVAL;
1246 }
1247
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +02001248 if (unlikely(!sw_context->kernel)) {
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001249 DRM_ERROR("Kernel only SVGA command: %u.\n", cmd_id);
1250 return -EPERM;
1251 }
1252
1253 if (cmd_id == SVGA_CMD_DEFINE_GMRFB)
1254 return vmw_cmd_check_define_gmrfb(dev_priv, sw_context, buf);
1255
1256 return 0;
1257}
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001258
1259typedef int (*vmw_cmd_func) (struct vmw_private *,
1260 struct vmw_sw_context *,
1261 SVGA3dCmdHeader *);
1262
1263#define VMW_CMD_DEF(cmd, func) \
1264 [cmd - SVGA_3D_CMD_BASE] = func
1265
1266static vmw_cmd_func vmw_cmd_funcs[SVGA_3D_CMD_MAX] = {
1267 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DEFINE, &vmw_cmd_invalid),
1268 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DESTROY, &vmw_cmd_invalid),
1269 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_COPY, &vmw_cmd_surface_copy_check),
1270 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_STRETCHBLT, &vmw_cmd_stretch_blt_check),
1271 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DMA, &vmw_cmd_dma),
1272 VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DEFINE, &vmw_cmd_invalid),
1273 VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DESTROY, &vmw_cmd_invalid),
1274 VMW_CMD_DEF(SVGA_3D_CMD_SETTRANSFORM, &vmw_cmd_cid_check),
1275 VMW_CMD_DEF(SVGA_3D_CMD_SETZRANGE, &vmw_cmd_cid_check),
1276 VMW_CMD_DEF(SVGA_3D_CMD_SETRENDERSTATE, &vmw_cmd_cid_check),
1277 VMW_CMD_DEF(SVGA_3D_CMD_SETRENDERTARGET,
1278 &vmw_cmd_set_render_target_check),
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001279 VMW_CMD_DEF(SVGA_3D_CMD_SETTEXTURESTATE, &vmw_cmd_tex_state),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001280 VMW_CMD_DEF(SVGA_3D_CMD_SETMATERIAL, &vmw_cmd_cid_check),
1281 VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTDATA, &vmw_cmd_cid_check),
1282 VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTENABLED, &vmw_cmd_cid_check),
1283 VMW_CMD_DEF(SVGA_3D_CMD_SETVIEWPORT, &vmw_cmd_cid_check),
1284 VMW_CMD_DEF(SVGA_3D_CMD_SETCLIPPLANE, &vmw_cmd_cid_check),
1285 VMW_CMD_DEF(SVGA_3D_CMD_CLEAR, &vmw_cmd_cid_check),
1286 VMW_CMD_DEF(SVGA_3D_CMD_PRESENT, &vmw_cmd_present_check),
1287 VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DEFINE, &vmw_cmd_cid_check),
1288 VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DESTROY, &vmw_cmd_cid_check),
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001289 VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER, &vmw_cmd_set_shader),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001290 VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER_CONST, &vmw_cmd_cid_check),
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001291 VMW_CMD_DEF(SVGA_3D_CMD_DRAW_PRIMITIVES, &vmw_cmd_draw),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001292 VMW_CMD_DEF(SVGA_3D_CMD_SETSCISSORRECT, &vmw_cmd_cid_check),
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001293 VMW_CMD_DEF(SVGA_3D_CMD_BEGIN_QUERY, &vmw_cmd_begin_query),
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001294 VMW_CMD_DEF(SVGA_3D_CMD_END_QUERY, &vmw_cmd_end_query),
1295 VMW_CMD_DEF(SVGA_3D_CMD_WAIT_FOR_QUERY, &vmw_cmd_wait_query),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001296 VMW_CMD_DEF(SVGA_3D_CMD_PRESENT_READBACK, &vmw_cmd_ok),
1297 VMW_CMD_DEF(SVGA_3D_CMD_BLIT_SURFACE_TO_SCREEN,
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001298 &vmw_cmd_blt_surf_screen_check),
1299 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DEFINE_V2, &vmw_cmd_invalid),
1300 VMW_CMD_DEF(SVGA_3D_CMD_GENERATE_MIPMAPS, &vmw_cmd_invalid),
1301 VMW_CMD_DEF(SVGA_3D_CMD_ACTIVATE_SURFACE, &vmw_cmd_invalid),
1302 VMW_CMD_DEF(SVGA_3D_CMD_DEACTIVATE_SURFACE, &vmw_cmd_invalid),
Thomas Hellstromddcda242012-11-21 11:26:55 +01001303 VMW_CMD_DEF(SVGA_3D_CMD_BEGIN_GB_QUERY, &vmw_cmd_begin_gb_query),
1304 VMW_CMD_DEF(SVGA_3D_CMD_END_GB_QUERY, &vmw_cmd_end_gb_query),
1305 VMW_CMD_DEF(SVGA_3D_CMD_WAIT_FOR_GB_QUERY, &vmw_cmd_wait_gb_query),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001306};
1307
1308static int vmw_cmd_check(struct vmw_private *dev_priv,
1309 struct vmw_sw_context *sw_context,
1310 void *buf, uint32_t *size)
1311{
1312 uint32_t cmd_id;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001313 uint32_t size_remaining = *size;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001314 SVGA3dCmdHeader *header = (SVGA3dCmdHeader *) buf;
1315 int ret;
1316
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001317 cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
1318 /* Handle any none 3D commands */
1319 if (unlikely(cmd_id < SVGA_CMD_MAX))
1320 return vmw_cmd_check_not_3d(dev_priv, sw_context, buf, size);
1321
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001322
1323 cmd_id = le32_to_cpu(header->id);
1324 *size = le32_to_cpu(header->size) + sizeof(SVGA3dCmdHeader);
1325
1326 cmd_id -= SVGA_3D_CMD_BASE;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001327 if (unlikely(*size > size_remaining))
1328 goto out_err;
1329
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001330 if (unlikely(cmd_id >= SVGA_3D_CMD_MAX - SVGA_3D_CMD_BASE))
1331 goto out_err;
1332
1333 ret = vmw_cmd_funcs[cmd_id](dev_priv, sw_context, header);
1334 if (unlikely(ret != 0))
1335 goto out_err;
1336
1337 return 0;
1338out_err:
1339 DRM_ERROR("Illegal / Invalid SVGA3D command: %d\n",
1340 cmd_id + SVGA_3D_CMD_BASE);
1341 return -EINVAL;
1342}
1343
1344static int vmw_cmd_check_all(struct vmw_private *dev_priv,
1345 struct vmw_sw_context *sw_context,
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001346 void *buf,
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001347 uint32_t size)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001348{
1349 int32_t cur_size = size;
1350 int ret;
1351
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001352 sw_context->buf_start = buf;
1353
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001354 while (cur_size > 0) {
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001355 size = cur_size;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001356 ret = vmw_cmd_check(dev_priv, sw_context, buf, &size);
1357 if (unlikely(ret != 0))
1358 return ret;
1359 buf = (void *)((unsigned long) buf + size);
1360 cur_size -= size;
1361 }
1362
1363 if (unlikely(cur_size != 0)) {
1364 DRM_ERROR("Command verifier out of sync.\n");
1365 return -EINVAL;
1366 }
1367
1368 return 0;
1369}
1370
1371static void vmw_free_relocations(struct vmw_sw_context *sw_context)
1372{
1373 sw_context->cur_reloc = 0;
1374}
1375
1376static void vmw_apply_relocations(struct vmw_sw_context *sw_context)
1377{
1378 uint32_t i;
1379 struct vmw_relocation *reloc;
1380 struct ttm_validate_buffer *validate;
1381 struct ttm_buffer_object *bo;
1382
1383 for (i = 0; i < sw_context->cur_reloc; ++i) {
1384 reloc = &sw_context->relocs[i];
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001385 validate = &sw_context->val_bufs[reloc->index].base;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001386 bo = validate->bo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001387 switch (bo->mem.mem_type) {
1388 case TTM_PL_VRAM:
Thomas Hellstrom135cba02010-10-26 21:21:47 +02001389 reloc->location->offset += bo->offset;
1390 reloc->location->gmrId = SVGA_GMR_FRAMEBUFFER;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001391 break;
1392 case VMW_PL_GMR:
Thomas Hellstrom135cba02010-10-26 21:21:47 +02001393 reloc->location->gmrId = bo->mem.start;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001394 break;
Thomas Hellstromddcda242012-11-21 11:26:55 +01001395 case VMW_PL_MOB:
1396 *reloc->mob_loc = bo->mem.start;
1397 break;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001398 default:
1399 BUG();
1400 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001401 }
1402 vmw_free_relocations(sw_context);
1403}
1404
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001405/**
1406 * vmw_resource_list_unrefererence - Free up a resource list and unreference
1407 * all resources referenced by it.
1408 *
1409 * @list: The resource list.
1410 */
1411static void vmw_resource_list_unreference(struct list_head *list)
1412{
1413 struct vmw_resource_val_node *val, *val_next;
1414
1415 /*
1416 * Drop references to resources held during command submission.
1417 */
1418
1419 list_for_each_entry_safe(val, val_next, list, head) {
1420 list_del_init(&val->head);
1421 vmw_resource_unreference(&val->res);
1422 kfree(val);
1423 }
1424}
1425
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001426static void vmw_clear_validations(struct vmw_sw_context *sw_context)
1427{
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001428 struct vmw_validate_buffer *entry, *next;
1429 struct vmw_resource_val_node *val;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001430
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001431 /*
1432 * Drop references to DMA buffers held during command submission.
1433 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001434 list_for_each_entry_safe(entry, next, &sw_context->validate_nodes,
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001435 base.head) {
1436 list_del(&entry->base.head);
1437 ttm_bo_unref(&entry->base.bo);
1438 (void) drm_ht_remove_item(&sw_context->res_ht, &entry->hash);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001439 sw_context->cur_val_buf--;
1440 }
1441 BUG_ON(sw_context->cur_val_buf != 0);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001442
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001443 list_for_each_entry(val, &sw_context->resource_list, head)
1444 (void) drm_ht_remove_item(&sw_context->res_ht, &val->hash);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001445}
1446
1447static int vmw_validate_single_buffer(struct vmw_private *dev_priv,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01001448 struct ttm_buffer_object *bo,
1449 bool validate_as_mob)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001450{
1451 int ret;
1452
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001453
1454 /*
1455 * Don't validate pinned buffers.
1456 */
1457
1458 if (bo == dev_priv->pinned_bo ||
1459 (bo == dev_priv->dummy_query_bo &&
1460 dev_priv->dummy_query_bo_pinned))
1461 return 0;
1462
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01001463 if (validate_as_mob)
1464 return ttm_bo_validate(bo, &vmw_mob_placement, true, false);
1465
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01001466 /**
Thomas Hellstrom135cba02010-10-26 21:21:47 +02001467 * Put BO in VRAM if there is space, otherwise as a GMR.
1468 * If there is no space in VRAM and GMR ids are all used up,
1469 * start evicting GMRs to make room. If the DMA buffer can't be
1470 * used as a GMR, this will return -ENOMEM.
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01001471 */
1472
Maarten Lankhorst97a875c2012-11-28 11:25:44 +00001473 ret = ttm_bo_validate(bo, &vmw_vram_gmr_placement, true, false);
Thomas Hellstrom3d3a5b32009-12-08 12:59:34 +01001474 if (likely(ret == 0 || ret == -ERESTARTSYS))
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001475 return ret;
1476
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01001477 /**
1478 * If that failed, try VRAM again, this time evicting
1479 * previous contents.
1480 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001481
Thomas Hellstrom135cba02010-10-26 21:21:47 +02001482 DRM_INFO("Falling through to VRAM.\n");
Maarten Lankhorst97a875c2012-11-28 11:25:44 +00001483 ret = ttm_bo_validate(bo, &vmw_vram_placement, true, false);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001484 return ret;
1485}
1486
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001487static int vmw_validate_buffers(struct vmw_private *dev_priv,
1488 struct vmw_sw_context *sw_context)
1489{
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001490 struct vmw_validate_buffer *entry;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001491 int ret;
1492
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001493 list_for_each_entry(entry, &sw_context->validate_nodes, base.head) {
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01001494 ret = vmw_validate_single_buffer(dev_priv, entry->base.bo,
1495 entry->validate_as_mob);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001496 if (unlikely(ret != 0))
1497 return ret;
1498 }
1499 return 0;
1500}
1501
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001502static int vmw_resize_cmd_bounce(struct vmw_sw_context *sw_context,
1503 uint32_t size)
1504{
1505 if (likely(sw_context->cmd_bounce_size >= size))
1506 return 0;
1507
1508 if (sw_context->cmd_bounce_size == 0)
1509 sw_context->cmd_bounce_size = VMWGFX_CMD_BOUNCE_INIT_SIZE;
1510
1511 while (sw_context->cmd_bounce_size < size) {
1512 sw_context->cmd_bounce_size =
1513 PAGE_ALIGN(sw_context->cmd_bounce_size +
1514 (sw_context->cmd_bounce_size >> 1));
1515 }
1516
1517 if (sw_context->cmd_bounce != NULL)
1518 vfree(sw_context->cmd_bounce);
1519
1520 sw_context->cmd_bounce = vmalloc(sw_context->cmd_bounce_size);
1521
1522 if (sw_context->cmd_bounce == NULL) {
1523 DRM_ERROR("Failed to allocate command bounce buffer.\n");
1524 sw_context->cmd_bounce_size = 0;
1525 return -ENOMEM;
1526 }
1527
1528 return 0;
1529}
1530
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001531/**
1532 * vmw_execbuf_fence_commands - create and submit a command stream fence
1533 *
1534 * Creates a fence object and submits a command stream marker.
1535 * If this fails for some reason, We sync the fifo and return NULL.
1536 * It is then safe to fence buffers with a NULL pointer.
Jakob Bornecrantz6070e9f2011-10-04 20:13:16 +02001537 *
1538 * If @p_handle is not NULL @file_priv must also not be NULL. Creates
1539 * a userspace handle if @p_handle is not NULL, otherwise not.
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001540 */
1541
1542int vmw_execbuf_fence_commands(struct drm_file *file_priv,
1543 struct vmw_private *dev_priv,
1544 struct vmw_fence_obj **p_fence,
1545 uint32_t *p_handle)
1546{
1547 uint32_t sequence;
1548 int ret;
1549 bool synced = false;
1550
Jakob Bornecrantz6070e9f2011-10-04 20:13:16 +02001551 /* p_handle implies file_priv. */
1552 BUG_ON(p_handle != NULL && file_priv == NULL);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001553
1554 ret = vmw_fifo_send_fence(dev_priv, &sequence);
1555 if (unlikely(ret != 0)) {
1556 DRM_ERROR("Fence submission error. Syncing.\n");
1557 synced = true;
1558 }
1559
1560 if (p_handle != NULL)
1561 ret = vmw_user_fence_create(file_priv, dev_priv->fman,
1562 sequence,
1563 DRM_VMW_FENCE_FLAG_EXEC,
1564 p_fence, p_handle);
1565 else
1566 ret = vmw_fence_create(dev_priv->fman, sequence,
1567 DRM_VMW_FENCE_FLAG_EXEC,
1568 p_fence);
1569
1570 if (unlikely(ret != 0 && !synced)) {
1571 (void) vmw_fallback_wait(dev_priv, false, false,
1572 sequence, false,
1573 VMW_FENCE_WAIT_TIMEOUT);
1574 *p_fence = NULL;
1575 }
1576
1577 return 0;
1578}
1579
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02001580/**
1581 * vmw_execbuf_copy_fence_user - copy fence object information to
1582 * user-space.
1583 *
1584 * @dev_priv: Pointer to a vmw_private struct.
1585 * @vmw_fp: Pointer to the struct vmw_fpriv representing the calling file.
1586 * @ret: Return value from fence object creation.
1587 * @user_fence_rep: User space address of a struct drm_vmw_fence_rep to
1588 * which the information should be copied.
1589 * @fence: Pointer to the fenc object.
1590 * @fence_handle: User-space fence handle.
1591 *
1592 * This function copies fence information to user-space. If copying fails,
1593 * The user-space struct drm_vmw_fence_rep::error member is hopefully
1594 * left untouched, and if it's preloaded with an -EFAULT by user-space,
1595 * the error will hopefully be detected.
1596 * Also if copying fails, user-space will be unable to signal the fence
1597 * object so we wait for it immediately, and then unreference the
1598 * user-space reference.
1599 */
Thomas Hellstrom57c5ee72011-10-10 12:23:26 +02001600void
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02001601vmw_execbuf_copy_fence_user(struct vmw_private *dev_priv,
1602 struct vmw_fpriv *vmw_fp,
1603 int ret,
1604 struct drm_vmw_fence_rep __user *user_fence_rep,
1605 struct vmw_fence_obj *fence,
1606 uint32_t fence_handle)
1607{
1608 struct drm_vmw_fence_rep fence_rep;
1609
1610 if (user_fence_rep == NULL)
1611 return;
1612
Dan Carpenter80d9b242011-10-18 09:10:12 +03001613 memset(&fence_rep, 0, sizeof(fence_rep));
1614
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02001615 fence_rep.error = ret;
1616 if (ret == 0) {
1617 BUG_ON(fence == NULL);
1618
1619 fence_rep.handle = fence_handle;
1620 fence_rep.seqno = fence->seqno;
1621 vmw_update_seqno(dev_priv, &dev_priv->fifo);
1622 fence_rep.passed_seqno = dev_priv->last_read_seqno;
1623 }
1624
1625 /*
1626 * copy_to_user errors will be detected by user space not
1627 * seeing fence_rep::error filled in. Typically
1628 * user-space would have pre-set that member to -EFAULT.
1629 */
1630 ret = copy_to_user(user_fence_rep, &fence_rep,
1631 sizeof(fence_rep));
1632
1633 /*
1634 * User-space lost the fence object. We need to sync
1635 * and unreference the handle.
1636 */
1637 if (unlikely(ret != 0) && (fence_rep.error == 0)) {
1638 ttm_ref_object_base_unref(vmw_fp->tfile,
1639 fence_handle, TTM_REF_USAGE);
1640 DRM_ERROR("Fence copy error. Syncing.\n");
1641 (void) vmw_fence_obj_wait(fence, fence->signal_mask,
1642 false, false,
1643 VMW_FENCE_WAIT_TIMEOUT);
1644 }
1645}
1646
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001647int vmw_execbuf_process(struct drm_file *file_priv,
1648 struct vmw_private *dev_priv,
1649 void __user *user_commands,
1650 void *kernel_commands,
1651 uint32_t command_size,
1652 uint64_t throttle_us,
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01001653 struct drm_vmw_fence_rep __user *user_fence_rep,
1654 struct vmw_fence_obj **out_fence)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001655{
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001656 struct vmw_sw_context *sw_context = &dev_priv->ctx;
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01001657 struct vmw_fence_obj *fence = NULL;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001658 struct vmw_resource *error_resource;
1659 struct list_head resource_list;
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001660 struct ww_acquire_ctx ticket;
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001661 uint32_t handle;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001662 void *cmd;
1663 int ret;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001664
1665 ret = mutex_lock_interruptible(&dev_priv->cmdbuf_mutex);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001666 if (unlikely(ret != 0))
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001667 return -ERESTARTSYS;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001668
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001669 if (kernel_commands == NULL) {
1670 sw_context->kernel = false;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001671
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001672 ret = vmw_resize_cmd_bounce(sw_context, command_size);
1673 if (unlikely(ret != 0))
1674 goto out_unlock;
1675
1676
1677 ret = copy_from_user(sw_context->cmd_bounce,
1678 user_commands, command_size);
1679
1680 if (unlikely(ret != 0)) {
1681 ret = -EFAULT;
1682 DRM_ERROR("Failed copying commands.\n");
1683 goto out_unlock;
1684 }
1685 kernel_commands = sw_context->cmd_bounce;
1686 } else
1687 sw_context->kernel = true;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001688
1689 sw_context->tfile = vmw_fpriv(file_priv)->tfile;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001690 sw_context->cur_reloc = 0;
1691 sw_context->cur_val_buf = 0;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001692 sw_context->fence_flags = 0;
Thomas Hellstromf18c8842011-10-04 20:13:31 +02001693 INIT_LIST_HEAD(&sw_context->resource_list);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001694 sw_context->cur_query_bo = dev_priv->pinned_bo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001695 sw_context->last_query_ctx = NULL;
1696 sw_context->needs_post_query_barrier = false;
1697 memset(sw_context->res_cache, 0, sizeof(sw_context->res_cache));
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001698 INIT_LIST_HEAD(&sw_context->validate_nodes);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001699 INIT_LIST_HEAD(&sw_context->res_relocations);
1700 if (!sw_context->res_ht_initialized) {
1701 ret = drm_ht_create(&sw_context->res_ht, VMW_RES_HT_ORDER);
1702 if (unlikely(ret != 0))
1703 goto out_unlock;
1704 sw_context->res_ht_initialized = true;
1705 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001706
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001707 INIT_LIST_HEAD(&resource_list);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001708 ret = vmw_cmd_check_all(dev_priv, sw_context, kernel_commands,
1709 command_size);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001710 if (unlikely(ret != 0))
1711 goto out_err;
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001712
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001713 ret = vmw_resources_reserve(sw_context);
1714 if (unlikely(ret != 0))
1715 goto out_err;
1716
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001717 ret = ttm_eu_reserve_buffers(&ticket, &sw_context->validate_nodes);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001718 if (unlikely(ret != 0))
1719 goto out_err;
1720
1721 ret = vmw_validate_buffers(dev_priv, sw_context);
1722 if (unlikely(ret != 0))
1723 goto out_err;
1724
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001725 ret = vmw_resources_validate(sw_context);
1726 if (unlikely(ret != 0))
1727 goto out_err;
Thomas Hellstrom1925d452010-05-28 11:21:57 +02001728
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001729 if (throttle_us) {
Thomas Hellstrom6bcd8d3c2011-09-01 20:18:42 +00001730 ret = vmw_wait_lag(dev_priv, &dev_priv->fifo.marker_queue,
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001731 throttle_us);
Thomas Hellstrom1925d452010-05-28 11:21:57 +02001732
1733 if (unlikely(ret != 0))
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001734 goto out_err;
Thomas Hellstrom1925d452010-05-28 11:21:57 +02001735 }
1736
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001737 cmd = vmw_fifo_reserve(dev_priv, command_size);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001738 if (unlikely(cmd == NULL)) {
1739 DRM_ERROR("Failed reserving fifo space for commands.\n");
1740 ret = -ENOMEM;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001741 goto out_err;
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001742 }
1743
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001744 vmw_apply_relocations(sw_context);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001745 memcpy(cmd, kernel_commands, command_size);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001746
1747 vmw_resource_relocations_apply(cmd, &sw_context->res_relocations);
1748 vmw_resource_relocations_free(&sw_context->res_relocations);
1749
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001750 vmw_fifo_commit(dev_priv, command_size);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001751
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001752 vmw_query_bo_switch_commit(dev_priv, sw_context);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001753 ret = vmw_execbuf_fence_commands(file_priv, dev_priv,
1754 &fence,
1755 (user_fence_rep) ? &handle : NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001756 /*
1757 * This error is harmless, because if fence submission fails,
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001758 * vmw_fifo_send_fence will sync. The error will be propagated to
1759 * user-space in @fence_rep
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001760 */
1761
1762 if (ret != 0)
1763 DRM_ERROR("Fence submission error. Syncing.\n");
1764
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001765 vmw_resource_list_unreserve(&sw_context->resource_list, false);
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001766 ttm_eu_fence_buffer_objects(&ticket, &sw_context->validate_nodes,
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001767 (void *) fence);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001768
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001769 if (unlikely(dev_priv->pinned_bo != NULL &&
1770 !dev_priv->query_cid_valid))
1771 __vmw_execbuf_release_pinned_bo(dev_priv, fence);
1772
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001773 vmw_clear_validations(sw_context);
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02001774 vmw_execbuf_copy_fence_user(dev_priv, vmw_fpriv(file_priv), ret,
1775 user_fence_rep, fence, handle);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001776
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01001777 /* Don't unreference when handing fence out */
1778 if (unlikely(out_fence != NULL)) {
1779 *out_fence = fence;
1780 fence = NULL;
1781 } else if (likely(fence != NULL)) {
Thomas Hellstromae2a1042011-09-01 20:18:44 +00001782 vmw_fence_obj_unreference(&fence);
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01001783 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001784
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001785 list_splice_init(&sw_context->resource_list, &resource_list);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001786 mutex_unlock(&dev_priv->cmdbuf_mutex);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001787
1788 /*
1789 * Unreference resources outside of the cmdbuf_mutex to
1790 * avoid deadlocks in resource destruction paths.
1791 */
1792 vmw_resource_list_unreference(&resource_list);
1793
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001794 return 0;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001795
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001796out_err:
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001797 vmw_resource_relocations_free(&sw_context->res_relocations);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001798 vmw_free_relocations(sw_context);
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001799 ttm_eu_backoff_reservation(&ticket, &sw_context->validate_nodes);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001800 vmw_resource_list_unreserve(&sw_context->resource_list, true);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001801 vmw_clear_validations(sw_context);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001802 if (unlikely(dev_priv->pinned_bo != NULL &&
1803 !dev_priv->query_cid_valid))
1804 __vmw_execbuf_release_pinned_bo(dev_priv, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001805out_unlock:
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001806 list_splice_init(&sw_context->resource_list, &resource_list);
1807 error_resource = sw_context->error_resource;
1808 sw_context->error_resource = NULL;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001809 mutex_unlock(&dev_priv->cmdbuf_mutex);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001810
1811 /*
1812 * Unreference resources outside of the cmdbuf_mutex to
1813 * avoid deadlocks in resource destruction paths.
1814 */
1815 vmw_resource_list_unreference(&resource_list);
1816 if (unlikely(error_resource != NULL))
1817 vmw_resource_unreference(&error_resource);
1818
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001819 return ret;
1820}
1821
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001822/**
1823 * vmw_execbuf_unpin_panic - Idle the fifo and unpin the query buffer.
1824 *
1825 * @dev_priv: The device private structure.
1826 *
1827 * This function is called to idle the fifo and unpin the query buffer
1828 * if the normal way to do this hits an error, which should typically be
1829 * extremely rare.
1830 */
1831static void vmw_execbuf_unpin_panic(struct vmw_private *dev_priv)
1832{
1833 DRM_ERROR("Can't unpin query buffer. Trying to recover.\n");
1834
1835 (void) vmw_fallback_wait(dev_priv, false, true, 0, false, 10*HZ);
1836 vmw_bo_pin(dev_priv->pinned_bo, false);
1837 vmw_bo_pin(dev_priv->dummy_query_bo, false);
1838 dev_priv->dummy_query_bo_pinned = false;
1839}
1840
1841
1842/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001843 * __vmw_execbuf_release_pinned_bo - Flush queries and unpin the pinned
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001844 * query bo.
1845 *
1846 * @dev_priv: The device private structure.
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001847 * @fence: If non-NULL should point to a struct vmw_fence_obj issued
1848 * _after_ a query barrier that flushes all queries touching the current
1849 * buffer pointed to by @dev_priv->pinned_bo
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001850 *
1851 * This function should be used to unpin the pinned query bo, or
1852 * as a query barrier when we need to make sure that all queries have
1853 * finished before the next fifo command. (For example on hardware
1854 * context destructions where the hardware may otherwise leak unfinished
1855 * queries).
1856 *
1857 * This function does not return any failure codes, but make attempts
1858 * to do safe unpinning in case of errors.
1859 *
1860 * The function will synchronize on the previous query barrier, and will
1861 * thus not finish until that barrier has executed.
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001862 *
1863 * the @dev_priv->cmdbuf_mutex needs to be held by the current thread
1864 * before calling this function.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001865 */
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001866void __vmw_execbuf_release_pinned_bo(struct vmw_private *dev_priv,
1867 struct vmw_fence_obj *fence)
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001868{
1869 int ret = 0;
1870 struct list_head validate_list;
1871 struct ttm_validate_buffer pinned_val, query_val;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001872 struct vmw_fence_obj *lfence = NULL;
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001873 struct ww_acquire_ctx ticket;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001874
1875 if (dev_priv->pinned_bo == NULL)
1876 goto out_unlock;
1877
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001878 INIT_LIST_HEAD(&validate_list);
1879
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001880 pinned_val.bo = ttm_bo_reference(dev_priv->pinned_bo);
1881 list_add_tail(&pinned_val.head, &validate_list);
1882
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001883 query_val.bo = ttm_bo_reference(dev_priv->dummy_query_bo);
1884 list_add_tail(&query_val.head, &validate_list);
1885
1886 do {
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001887 ret = ttm_eu_reserve_buffers(&ticket, &validate_list);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001888 } while (ret == -ERESTARTSYS);
1889
1890 if (unlikely(ret != 0)) {
1891 vmw_execbuf_unpin_panic(dev_priv);
1892 goto out_no_reserve;
1893 }
1894
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001895 if (dev_priv->query_cid_valid) {
1896 BUG_ON(fence != NULL);
1897 ret = vmw_fifo_emit_dummy_query(dev_priv, dev_priv->query_cid);
1898 if (unlikely(ret != 0)) {
1899 vmw_execbuf_unpin_panic(dev_priv);
1900 goto out_no_emit;
1901 }
1902 dev_priv->query_cid_valid = false;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001903 }
1904
1905 vmw_bo_pin(dev_priv->pinned_bo, false);
1906 vmw_bo_pin(dev_priv->dummy_query_bo, false);
1907 dev_priv->dummy_query_bo_pinned = false;
1908
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001909 if (fence == NULL) {
1910 (void) vmw_execbuf_fence_commands(NULL, dev_priv, &lfence,
1911 NULL);
1912 fence = lfence;
1913 }
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001914 ttm_eu_fence_buffer_objects(&ticket, &validate_list, (void *) fence);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001915 if (lfence != NULL)
1916 vmw_fence_obj_unreference(&lfence);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001917
1918 ttm_bo_unref(&query_val.bo);
1919 ttm_bo_unref(&pinned_val.bo);
1920 ttm_bo_unref(&dev_priv->pinned_bo);
1921
1922out_unlock:
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001923 return;
1924
1925out_no_emit:
Maarten Lankhorstecff6652013-06-27 13:48:17 +02001926 ttm_eu_backoff_reservation(&ticket, &validate_list);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001927out_no_reserve:
1928 ttm_bo_unref(&query_val.bo);
1929 ttm_bo_unref(&pinned_val.bo);
1930 ttm_bo_unref(&dev_priv->pinned_bo);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001931}
1932
1933/**
1934 * vmw_execbuf_release_pinned_bo - Flush queries and unpin the pinned
1935 * query bo.
1936 *
1937 * @dev_priv: The device private structure.
1938 *
1939 * This function should be used to unpin the pinned query bo, or
1940 * as a query barrier when we need to make sure that all queries have
1941 * finished before the next fifo command. (For example on hardware
1942 * context destructions where the hardware may otherwise leak unfinished
1943 * queries).
1944 *
1945 * This function does not return any failure codes, but make attempts
1946 * to do safe unpinning in case of errors.
1947 *
1948 * The function will synchronize on the previous query barrier, and will
1949 * thus not finish until that barrier has executed.
1950 */
1951void vmw_execbuf_release_pinned_bo(struct vmw_private *dev_priv)
1952{
1953 mutex_lock(&dev_priv->cmdbuf_mutex);
1954 if (dev_priv->query_cid_valid)
1955 __vmw_execbuf_release_pinned_bo(dev_priv, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001956 mutex_unlock(&dev_priv->cmdbuf_mutex);
1957}
1958
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001959
1960int vmw_execbuf_ioctl(struct drm_device *dev, void *data,
1961 struct drm_file *file_priv)
1962{
1963 struct vmw_private *dev_priv = vmw_priv(dev);
1964 struct drm_vmw_execbuf_arg *arg = (struct drm_vmw_execbuf_arg *)data;
1965 struct vmw_master *vmaster = vmw_master(file_priv->master);
1966 int ret;
1967
1968 /*
1969 * This will allow us to extend the ioctl argument while
1970 * maintaining backwards compatibility:
1971 * We take different code paths depending on the value of
1972 * arg->version.
1973 */
1974
1975 if (unlikely(arg->version != DRM_VMW_EXECBUF_VERSION)) {
1976 DRM_ERROR("Incorrect execbuf version.\n");
1977 DRM_ERROR("You're running outdated experimental "
1978 "vmwgfx user-space drivers.");
1979 return -EINVAL;
1980 }
1981
1982 ret = ttm_read_lock(&vmaster->lock, true);
1983 if (unlikely(ret != 0))
1984 return ret;
1985
1986 ret = vmw_execbuf_process(file_priv, dev_priv,
1987 (void __user *)(unsigned long)arg->commands,
1988 NULL, arg->command_size, arg->throttle_us,
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01001989 (void __user *)(unsigned long)arg->fence_rep,
1990 NULL);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02001991
1992 if (unlikely(ret != 0))
1993 goto out_unlock;
1994
1995 vmw_kms_cursor_post_execbuf(dev_priv);
1996
1997out_unlock:
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001998 ttm_read_unlock(&vmaster->lock);
1999 return ret;
2000}