blob: 698a0e2add5396e249cd60157199a163743ece0f [file] [log] [blame]
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001/**************************************************************************
2 *
3 * Copyright © 2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27
28#include "vmwgfx_drv.h"
29#include "vmwgfx_reg.h"
David Howells760285e2012-10-02 18:01:07 +010030#include <drm/ttm/ttm_bo_api.h>
31#include <drm/ttm/ttm_placement.h>
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +000032
Thomas Hellstromc0951b72012-11-20 12:19:35 +000033#define VMW_RES_HT_ORDER 12
34
35/**
36 * struct vmw_resource_relocation - Relocation info for resources
37 *
38 * @head: List head for the software context's relocation list.
39 * @res: Non-ref-counted pointer to the resource.
40 * @offset: Offset of 4 byte entries into the command buffer where the
41 * id that needs fixup is located.
42 */
43struct vmw_resource_relocation {
44 struct list_head head;
45 const struct vmw_resource *res;
46 unsigned long offset;
47};
48
49/**
50 * struct vmw_resource_val_node - Validation info for resources
51 *
52 * @head: List head for the software context's resource list.
53 * @hash: Hash entry for quick resouce to val_node lookup.
54 * @res: Ref-counted pointer to the resource.
55 * @switch_backup: Boolean whether to switch backup buffer on unreserve.
56 * @new_backup: Refcounted pointer to the new backup buffer.
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -070057 * @staged_bindings: If @res is a context, tracks bindings set up during
58 * the command batch. Otherwise NULL.
Thomas Hellstromc0951b72012-11-20 12:19:35 +000059 * @new_backup_offset: New backup buffer offset if @new_backup is non-NUll.
60 * @first_usage: Set to true the first time the resource is referenced in
61 * the command stream.
62 * @no_buffer_needed: Resources do not need to allocate buffer backup on
63 * reservation. The command stream will provide one.
64 */
65struct vmw_resource_val_node {
66 struct list_head head;
67 struct drm_hash_item hash;
68 struct vmw_resource *res;
69 struct vmw_dma_buffer *new_backup;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -070070 struct vmw_ctx_binding_state *staged_bindings;
Thomas Hellstromc0951b72012-11-20 12:19:35 +000071 unsigned long new_backup_offset;
72 bool first_usage;
73 bool no_buffer_needed;
74};
75
76/**
Thomas Hellstromc373d4e2012-11-21 12:22:35 +010077 * struct vmw_cmd_entry - Describe a command for the verifier
78 *
79 * @user_allow: Whether allowed from the execbuf ioctl.
80 * @gb_disable: Whether disabled if guest-backed objects are available.
81 * @gb_enable: Whether enabled iff guest-backed objects are available.
82 */
83struct vmw_cmd_entry {
84 int (*func) (struct vmw_private *, struct vmw_sw_context *,
85 SVGA3dCmdHeader *);
86 bool user_allow;
87 bool gb_disable;
88 bool gb_enable;
89};
90
91#define VMW_CMD_DEF(_cmd, _func, _user_allow, _gb_disable, _gb_enable) \
92 [(_cmd) - SVGA_3D_CMD_BASE] = {(_func), (_user_allow),\
93 (_gb_disable), (_gb_enable)}
94
95/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +000096 * vmw_resource_unreserve - unreserve resources previously reserved for
97 * command submission.
98 *
99 * @list_head: list of resources to unreserve.
100 * @backoff: Whether command submission failed.
101 */
102static void vmw_resource_list_unreserve(struct list_head *list,
103 bool backoff)
104{
105 struct vmw_resource_val_node *val;
106
107 list_for_each_entry(val, list, head) {
108 struct vmw_resource *res = val->res;
109 struct vmw_dma_buffer *new_backup =
110 backoff ? NULL : val->new_backup;
111
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700112 /*
113 * Transfer staged context bindings to the
114 * persistent context binding tracker.
115 */
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700116 if (unlikely(val->staged_bindings)) {
Thomas Hellstrom76c7d182014-01-30 10:46:12 +0100117 if (!backoff) {
118 vmw_context_binding_state_transfer
119 (val->res, val->staged_bindings);
120 }
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700121 kfree(val->staged_bindings);
122 val->staged_bindings = NULL;
123 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000124 vmw_resource_unreserve(res, new_backup,
125 val->new_backup_offset);
126 vmw_dmabuf_unreference(&val->new_backup);
127 }
128}
129
130
131/**
132 * vmw_resource_val_add - Add a resource to the software context's
133 * resource list if it's not already on it.
134 *
135 * @sw_context: Pointer to the software context.
136 * @res: Pointer to the resource.
137 * @p_node On successful return points to a valid pointer to a
138 * struct vmw_resource_val_node, if non-NULL on entry.
139 */
140static int vmw_resource_val_add(struct vmw_sw_context *sw_context,
141 struct vmw_resource *res,
142 struct vmw_resource_val_node **p_node)
143{
144 struct vmw_resource_val_node *node;
145 struct drm_hash_item *hash;
146 int ret;
147
148 if (likely(drm_ht_find_item(&sw_context->res_ht, (unsigned long) res,
149 &hash) == 0)) {
150 node = container_of(hash, struct vmw_resource_val_node, hash);
151 node->first_usage = false;
152 if (unlikely(p_node != NULL))
153 *p_node = node;
154 return 0;
155 }
156
157 node = kzalloc(sizeof(*node), GFP_KERNEL);
158 if (unlikely(node == NULL)) {
159 DRM_ERROR("Failed to allocate a resource validation "
160 "entry.\n");
161 return -ENOMEM;
162 }
163
164 node->hash.key = (unsigned long) res;
165 ret = drm_ht_insert_item(&sw_context->res_ht, &node->hash);
166 if (unlikely(ret != 0)) {
167 DRM_ERROR("Failed to initialize a resource validation "
168 "entry.\n");
169 kfree(node);
170 return ret;
171 }
172 list_add_tail(&node->head, &sw_context->resource_list);
173 node->res = vmw_resource_reference(res);
174 node->first_usage = true;
175
176 if (unlikely(p_node != NULL))
177 *p_node = node;
178
179 return 0;
180}
181
182/**
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100183 * vmw_resource_context_res_add - Put resources previously bound to a context on
184 * the validation list
185 *
186 * @dev_priv: Pointer to a device private structure
187 * @sw_context: Pointer to a software context used for this command submission
188 * @ctx: Pointer to the context resource
189 *
190 * This function puts all resources that were previously bound to @ctx on
191 * the resource validation list. This is part of the context state reemission
192 */
193static int vmw_resource_context_res_add(struct vmw_private *dev_priv,
194 struct vmw_sw_context *sw_context,
195 struct vmw_resource *ctx)
196{
197 struct list_head *binding_list;
198 struct vmw_ctx_binding *entry;
199 int ret = 0;
200 struct vmw_resource *res;
201
202 mutex_lock(&dev_priv->binding_mutex);
203 binding_list = vmw_context_binding_list(ctx);
204
205 list_for_each_entry(entry, binding_list, ctx_list) {
206 res = vmw_resource_reference_unless_doomed(entry->bi.res);
207 if (unlikely(res == NULL))
208 continue;
209
210 ret = vmw_resource_val_add(sw_context, entry->bi.res, NULL);
211 vmw_resource_unreference(&res);
212 if (unlikely(ret != 0))
213 break;
214 }
215
216 mutex_unlock(&dev_priv->binding_mutex);
217 return ret;
218}
219
220/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000221 * vmw_resource_relocation_add - Add a relocation to the relocation list
222 *
223 * @list: Pointer to head of relocation list.
224 * @res: The resource.
225 * @offset: Offset into the command buffer currently being parsed where the
226 * id that needs fixup is located. Granularity is 4 bytes.
227 */
228static int vmw_resource_relocation_add(struct list_head *list,
229 const struct vmw_resource *res,
230 unsigned long offset)
231{
232 struct vmw_resource_relocation *rel;
233
234 rel = kmalloc(sizeof(*rel), GFP_KERNEL);
235 if (unlikely(rel == NULL)) {
236 DRM_ERROR("Failed to allocate a resource relocation.\n");
237 return -ENOMEM;
238 }
239
240 rel->res = res;
241 rel->offset = offset;
242 list_add_tail(&rel->head, list);
243
244 return 0;
245}
246
247/**
248 * vmw_resource_relocations_free - Free all relocations on a list
249 *
250 * @list: Pointer to the head of the relocation list.
251 */
252static void vmw_resource_relocations_free(struct list_head *list)
253{
254 struct vmw_resource_relocation *rel, *n;
255
256 list_for_each_entry_safe(rel, n, list, head) {
257 list_del(&rel->head);
258 kfree(rel);
259 }
260}
261
262/**
263 * vmw_resource_relocations_apply - Apply all relocations on a list
264 *
265 * @cb: Pointer to the start of the command buffer bein patch. This need
266 * not be the same buffer as the one being parsed when the relocation
267 * list was built, but the contents must be the same modulo the
268 * resource ids.
269 * @list: Pointer to the head of the relocation list.
270 */
271static void vmw_resource_relocations_apply(uint32_t *cb,
272 struct list_head *list)
273{
274 struct vmw_resource_relocation *rel;
275
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100276 list_for_each_entry(rel, list, head) {
277 if (likely(rel->res != NULL))
278 cb[rel->offset] = rel->res->id;
279 else
280 cb[rel->offset] = SVGA_3D_CMD_NOP;
281 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000282}
283
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000284static int vmw_cmd_invalid(struct vmw_private *dev_priv,
285 struct vmw_sw_context *sw_context,
286 SVGA3dCmdHeader *header)
287{
288 return capable(CAP_SYS_ADMIN) ? : -EINVAL;
289}
290
291static int vmw_cmd_ok(struct vmw_private *dev_priv,
292 struct vmw_sw_context *sw_context,
293 SVGA3dCmdHeader *header)
294{
295 return 0;
296}
297
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200298/**
299 * vmw_bo_to_validate_list - add a bo to a validate list
300 *
301 * @sw_context: The software context used for this command submission batch.
302 * @bo: The buffer object to add.
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100303 * @validate_as_mob: Validate this buffer as a MOB.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200304 * @p_val_node: If non-NULL Will be updated with the validate node number
305 * on return.
306 *
307 * Returns -EINVAL if the limit of number of buffer objects per command
308 * submission is reached.
309 */
310static int vmw_bo_to_validate_list(struct vmw_sw_context *sw_context,
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700311 struct vmw_dma_buffer *vbo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100312 bool validate_as_mob,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200313 uint32_t *p_val_node)
314{
315 uint32_t val_node;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000316 struct vmw_validate_buffer *vval_buf;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200317 struct ttm_validate_buffer *val_buf;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000318 struct drm_hash_item *hash;
319 int ret;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200320
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700321 if (likely(drm_ht_find_item(&sw_context->res_ht, (unsigned long) vbo,
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000322 &hash) == 0)) {
323 vval_buf = container_of(hash, struct vmw_validate_buffer,
324 hash);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100325 if (unlikely(vval_buf->validate_as_mob != validate_as_mob)) {
326 DRM_ERROR("Inconsistent buffer usage.\n");
327 return -EINVAL;
328 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000329 val_buf = &vval_buf->base;
330 val_node = vval_buf - sw_context->val_bufs;
331 } else {
332 val_node = sw_context->cur_val_buf;
333 if (unlikely(val_node >= VMWGFX_MAX_VALIDATIONS)) {
334 DRM_ERROR("Max number of DMA buffers per submission "
335 "exceeded.\n");
336 return -EINVAL;
337 }
338 vval_buf = &sw_context->val_bufs[val_node];
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700339 vval_buf->hash.key = (unsigned long) vbo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000340 ret = drm_ht_insert_item(&sw_context->res_ht, &vval_buf->hash);
341 if (unlikely(ret != 0)) {
342 DRM_ERROR("Failed to initialize a buffer validation "
343 "entry.\n");
344 return ret;
345 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200346 ++sw_context->cur_val_buf;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000347 val_buf = &vval_buf->base;
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700348 val_buf->bo = ttm_bo_reference(&vbo->base);
Christian Königae9c0af2014-09-04 20:01:52 +0200349 val_buf->shared = false;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000350 list_add_tail(&val_buf->head, &sw_context->validate_nodes);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100351 vval_buf->validate_as_mob = validate_as_mob;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200352 }
353
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200354 if (p_val_node)
355 *p_val_node = val_node;
356
357 return 0;
358}
359
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000360/**
361 * vmw_resources_reserve - Reserve all resources on the sw_context's
362 * resource list.
363 *
364 * @sw_context: Pointer to the software context.
365 *
366 * Note that since vmware's command submission currently is protected by
367 * the cmdbuf mutex, no fancy deadlock avoidance is required for resources,
368 * since only a single thread at once will attempt this.
369 */
370static int vmw_resources_reserve(struct vmw_sw_context *sw_context)
371{
372 struct vmw_resource_val_node *val;
373 int ret;
374
375 list_for_each_entry(val, &sw_context->resource_list, head) {
376 struct vmw_resource *res = val->res;
377
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -0700378 ret = vmw_resource_reserve(res, true, val->no_buffer_needed);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000379 if (unlikely(ret != 0))
380 return ret;
381
382 if (res->backup) {
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700383 struct vmw_dma_buffer *vbo = res->backup;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000384
385 ret = vmw_bo_to_validate_list
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700386 (sw_context, vbo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100387 vmw_resource_needs_backup(res), NULL);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000388
389 if (unlikely(ret != 0))
390 return ret;
391 }
392 }
393 return 0;
394}
395
396/**
397 * vmw_resources_validate - Validate all resources on the sw_context's
398 * resource list.
399 *
400 * @sw_context: Pointer to the software context.
401 *
402 * Before this function is called, all resource backup buffers must have
403 * been validated.
404 */
405static int vmw_resources_validate(struct vmw_sw_context *sw_context)
406{
407 struct vmw_resource_val_node *val;
408 int ret;
409
410 list_for_each_entry(val, &sw_context->resource_list, head) {
411 struct vmw_resource *res = val->res;
412
413 ret = vmw_resource_validate(res);
414 if (unlikely(ret != 0)) {
415 if (ret != -ERESTARTSYS)
416 DRM_ERROR("Failed to validate resource.\n");
417 return ret;
418 }
419 }
420 return 0;
421}
422
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200423
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000424/**
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200425 * vmw_cmd_res_reloc_add - Add a resource to a software context's
426 * relocation- and validation lists.
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000427 *
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200428 * @dev_priv: Pointer to a struct vmw_private identifying the device.
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000429 * @sw_context: Pointer to the software context.
430 * @res_type: Resource type.
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200431 * @id_loc: Pointer to where the id that needs translation is located.
432 * @res: Valid pointer to a struct vmw_resource.
433 * @p_val: If non null, a pointer to the struct vmw_resource_validate_node
434 * used for this resource is returned here.
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000435 */
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200436static int vmw_cmd_res_reloc_add(struct vmw_private *dev_priv,
437 struct vmw_sw_context *sw_context,
438 enum vmw_res_type res_type,
439 uint32_t *id_loc,
440 struct vmw_resource *res,
441 struct vmw_resource_val_node **p_val)
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000442{
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000443 int ret;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200444 struct vmw_resource_val_node *node;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000445
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200446 *p_val = NULL;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000447 ret = vmw_resource_relocation_add(&sw_context->res_relocations,
448 res,
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100449 id_loc - sw_context->buf_start);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000450 if (unlikely(ret != 0))
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200451 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000452
453 ret = vmw_resource_val_add(sw_context, res, &node);
454 if (unlikely(ret != 0))
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200455 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000456
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200457 if (res_type == vmw_res_context && dev_priv->has_mob &&
458 node->first_usage) {
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700459
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200460 /*
461 * Put contexts first on the list to be able to exit
462 * list traversal for contexts early.
463 */
464 list_del(&node->head);
465 list_add(&node->head, &sw_context->resource_list);
466
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100467 ret = vmw_resource_context_res_add(dev_priv, sw_context, res);
468 if (unlikely(ret != 0))
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200469 return ret;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700470 node->staged_bindings =
471 kzalloc(sizeof(*node->staged_bindings), GFP_KERNEL);
472 if (node->staged_bindings == NULL) {
473 DRM_ERROR("Failed to allocate context binding "
474 "information.\n");
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200475 return -ENOMEM;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700476 }
477 INIT_LIST_HEAD(&node->staged_bindings->list);
478 }
479
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200480 if (p_val)
481 *p_val = node;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000482
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200483 return 0;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000484}
485
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200486
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000487/**
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100488 * vmw_cmd_res_check - Check that a resource is present and if so, put it
489 * on the resource validate list unless it's already there.
490 *
491 * @dev_priv: Pointer to a device private structure.
492 * @sw_context: Pointer to the software context.
493 * @res_type: Resource type.
494 * @converter: User-space visisble type specific information.
495 * @id_loc: Pointer to the location in the command buffer currently being
496 * parsed from where the user-space resource id handle is located.
497 * @p_val: Pointer to pointer to resource validalidation node. Populated
498 * on exit.
499 */
500static int
501vmw_cmd_res_check(struct vmw_private *dev_priv,
502 struct vmw_sw_context *sw_context,
503 enum vmw_res_type res_type,
504 const struct vmw_user_resource_conv *converter,
505 uint32_t *id_loc,
506 struct vmw_resource_val_node **p_val)
507{
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200508 struct vmw_res_cache_entry *rcache =
509 &sw_context->res_cache[res_type];
510 struct vmw_resource *res;
511 struct vmw_resource_val_node *node;
512 int ret;
513
514 if (*id_loc == SVGA3D_INVALID_ID) {
515 if (p_val)
516 *p_val = NULL;
517 if (res_type == vmw_res_context) {
518 DRM_ERROR("Illegal context invalid id.\n");
519 return -EINVAL;
520 }
521 return 0;
522 }
523
524 /*
525 * Fastpath in case of repeated commands referencing the same
526 * resource
527 */
528
529 if (likely(rcache->valid && *id_loc == rcache->handle)) {
530 const struct vmw_resource *res = rcache->res;
531
532 rcache->node->first_usage = false;
533 if (p_val)
534 *p_val = rcache->node;
535
536 return vmw_resource_relocation_add
537 (&sw_context->res_relocations, res,
538 id_loc - sw_context->buf_start);
539 }
540
541 ret = vmw_user_resource_lookup_handle(dev_priv,
542 sw_context->fp->tfile,
543 *id_loc,
544 converter,
545 &res);
546 if (unlikely(ret != 0)) {
547 DRM_ERROR("Could not find or use resource 0x%08x.\n",
548 (unsigned) *id_loc);
549 dump_stack();
550 return ret;
551 }
552
553 rcache->valid = true;
554 rcache->res = res;
555 rcache->handle = *id_loc;
556
557 ret = vmw_cmd_res_reloc_add(dev_priv, sw_context, res_type, id_loc,
558 res, &node);
559 if (unlikely(ret != 0))
560 goto out_no_reloc;
561
562 rcache->node = node;
563 if (p_val)
564 *p_val = node;
565 vmw_resource_unreference(&res);
566 return 0;
567
568out_no_reloc:
569 BUG_ON(sw_context->error_resource != NULL);
570 sw_context->error_resource = res;
571
572 return ret;
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100573}
574
575/**
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100576 * vmw_rebind_contexts - Rebind all resources previously bound to
577 * referenced contexts.
578 *
579 * @sw_context: Pointer to the software context.
580 *
581 * Rebind context binding points that have been scrubbed because of eviction.
582 */
583static int vmw_rebind_contexts(struct vmw_sw_context *sw_context)
584{
585 struct vmw_resource_val_node *val;
586 int ret;
587
588 list_for_each_entry(val, &sw_context->resource_list, head) {
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200589 if (unlikely(!val->staged_bindings))
590 break;
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100591
592 ret = vmw_context_rebind_all(val->res);
593 if (unlikely(ret != 0)) {
594 if (ret != -ERESTARTSYS)
595 DRM_ERROR("Failed to rebind context.\n");
596 return ret;
597 }
598 }
599
600 return 0;
601}
602
603/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000604 * vmw_cmd_cid_check - Check a command header for valid context information.
605 *
606 * @dev_priv: Pointer to a device private structure.
607 * @sw_context: Pointer to the software context.
608 * @header: A command header with an embedded user-space context handle.
609 *
610 * Convenience function: Call vmw_cmd_res_check with the user-space context
611 * handle embedded in @header.
612 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000613static int vmw_cmd_cid_check(struct vmw_private *dev_priv,
614 struct vmw_sw_context *sw_context,
615 SVGA3dCmdHeader *header)
616{
617 struct vmw_cid_cmd {
618 SVGA3dCmdHeader header;
Thomas Hellstrom8e67bbb2014-02-06 12:35:05 +0100619 uint32_t cid;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000620 } *cmd;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000621
622 cmd = container_of(header, struct vmw_cid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000623 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
624 user_context_converter, &cmd->cid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000625}
626
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000627static int vmw_cmd_set_render_target_check(struct vmw_private *dev_priv,
628 struct vmw_sw_context *sw_context,
629 SVGA3dCmdHeader *header)
630{
631 struct vmw_sid_cmd {
632 SVGA3dCmdHeader header;
633 SVGA3dCmdSetRenderTarget body;
634 } *cmd;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700635 struct vmw_resource_val_node *ctx_node;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700636 struct vmw_resource_val_node *res_node;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000637 int ret;
638
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700639 cmd = container_of(header, struct vmw_sid_cmd, header);
640
641 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
642 user_context_converter, &cmd->body.cid,
643 &ctx_node);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000644 if (unlikely(ret != 0))
645 return ret;
646
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000647 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
648 user_surface_converter,
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700649 &cmd->body.target.sid, &res_node);
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700650 if (unlikely(ret != 0))
651 return ret;
652
653 if (dev_priv->has_mob) {
654 struct vmw_ctx_bindinfo bi;
655
656 bi.ctx = ctx_node->res;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700657 bi.res = res_node ? res_node->res : NULL;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700658 bi.bt = vmw_ctx_binding_rt;
659 bi.i1.rt_type = cmd->body.type;
660 return vmw_context_binding_add(ctx_node->staged_bindings, &bi);
661 }
662
663 return 0;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000664}
665
666static int vmw_cmd_surface_copy_check(struct vmw_private *dev_priv,
667 struct vmw_sw_context *sw_context,
668 SVGA3dCmdHeader *header)
669{
670 struct vmw_sid_cmd {
671 SVGA3dCmdHeader header;
672 SVGA3dCmdSurfaceCopy body;
673 } *cmd;
674 int ret;
675
676 cmd = container_of(header, struct vmw_sid_cmd, header);
Thomas Hellstromc9146cd2015-03-02 23:45:04 -0800677
Sinclair Yehf89c6c32015-06-26 01:54:28 -0700678 if (!(sw_context->quirks & VMW_QUIRK_SRC_SID_OK)) {
679 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
680 user_surface_converter,
681 &cmd->body.src.sid, NULL);
682 if (ret != 0)
683 return ret;
684 }
685
686 if (sw_context->quirks & VMW_QUIRK_DST_SID_OK)
Thomas Hellstromc9146cd2015-03-02 23:45:04 -0800687 return 0;
688
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000689 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
690 user_surface_converter,
691 &cmd->body.dest.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000692}
693
694static int vmw_cmd_stretch_blt_check(struct vmw_private *dev_priv,
695 struct vmw_sw_context *sw_context,
696 SVGA3dCmdHeader *header)
697{
698 struct vmw_sid_cmd {
699 SVGA3dCmdHeader header;
700 SVGA3dCmdSurfaceStretchBlt body;
701 } *cmd;
702 int ret;
703
704 cmd = container_of(header, struct vmw_sid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000705 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
706 user_surface_converter,
707 &cmd->body.src.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000708 if (unlikely(ret != 0))
709 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000710 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
711 user_surface_converter,
712 &cmd->body.dest.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000713}
714
715static int vmw_cmd_blt_surf_screen_check(struct vmw_private *dev_priv,
716 struct vmw_sw_context *sw_context,
717 SVGA3dCmdHeader *header)
718{
719 struct vmw_sid_cmd {
720 SVGA3dCmdHeader header;
721 SVGA3dCmdBlitSurfaceToScreen body;
722 } *cmd;
723
724 cmd = container_of(header, struct vmw_sid_cmd, header);
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +0200725
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000726 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
727 user_surface_converter,
728 &cmd->body.srcImage.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000729}
730
731static int vmw_cmd_present_check(struct vmw_private *dev_priv,
732 struct vmw_sw_context *sw_context,
733 SVGA3dCmdHeader *header)
734{
735 struct vmw_sid_cmd {
736 SVGA3dCmdHeader header;
737 SVGA3dCmdPresent body;
738 } *cmd;
739
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +0200740
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000741 cmd = container_of(header, struct vmw_sid_cmd, header);
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +0200742
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000743 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
744 user_surface_converter, &cmd->body.sid,
745 NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000746}
747
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200748/**
749 * vmw_query_bo_switch_prepare - Prepare to switch pinned buffer for queries.
750 *
751 * @dev_priv: The device private structure.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200752 * @new_query_bo: The new buffer holding query results.
753 * @sw_context: The software context used for this command submission.
754 *
755 * This function checks whether @new_query_bo is suitable for holding
756 * query results, and if another buffer currently is pinned for query
757 * results. If so, the function prepares the state of @sw_context for
758 * switching pinned buffers after successful submission of the current
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000759 * command batch.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200760 */
761static int vmw_query_bo_switch_prepare(struct vmw_private *dev_priv,
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700762 struct vmw_dma_buffer *new_query_bo,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200763 struct vmw_sw_context *sw_context)
764{
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000765 struct vmw_res_cache_entry *ctx_entry =
766 &sw_context->res_cache[vmw_res_context];
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200767 int ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000768
769 BUG_ON(!ctx_entry->valid);
770 sw_context->last_query_ctx = ctx_entry->res;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200771
772 if (unlikely(new_query_bo != sw_context->cur_query_bo)) {
773
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700774 if (unlikely(new_query_bo->base.num_pages > 4)) {
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200775 DRM_ERROR("Query buffer too large.\n");
776 return -EINVAL;
777 }
778
779 if (unlikely(sw_context->cur_query_bo != NULL)) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000780 sw_context->needs_post_query_barrier = true;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200781 ret = vmw_bo_to_validate_list(sw_context,
782 sw_context->cur_query_bo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100783 dev_priv->has_mob, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200784 if (unlikely(ret != 0))
785 return ret;
786 }
787 sw_context->cur_query_bo = new_query_bo;
788
789 ret = vmw_bo_to_validate_list(sw_context,
790 dev_priv->dummy_query_bo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100791 dev_priv->has_mob, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200792 if (unlikely(ret != 0))
793 return ret;
794
795 }
796
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200797 return 0;
798}
799
800
801/**
802 * vmw_query_bo_switch_commit - Finalize switching pinned query buffer
803 *
804 * @dev_priv: The device private structure.
805 * @sw_context: The software context used for this command submission batch.
806 *
807 * This function will check if we're switching query buffers, and will then,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200808 * issue a dummy occlusion query wait used as a query barrier. When the fence
809 * object following that query wait has signaled, we are sure that all
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000810 * preceding queries have finished, and the old query buffer can be unpinned.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200811 * However, since both the new query buffer and the old one are fenced with
812 * that fence, we can do an asynchronus unpin now, and be sure that the
813 * old query buffer won't be moved until the fence has signaled.
814 *
815 * As mentioned above, both the new - and old query buffers need to be fenced
816 * using a sequence emitted *after* calling this function.
817 */
818static void vmw_query_bo_switch_commit(struct vmw_private *dev_priv,
819 struct vmw_sw_context *sw_context)
820{
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200821 /*
822 * The validate list should still hold references to all
823 * contexts here.
824 */
825
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000826 if (sw_context->needs_post_query_barrier) {
827 struct vmw_res_cache_entry *ctx_entry =
828 &sw_context->res_cache[vmw_res_context];
829 struct vmw_resource *ctx;
830 int ret;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200831
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000832 BUG_ON(!ctx_entry->valid);
833 ctx = ctx_entry->res;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200834
835 ret = vmw_fifo_emit_dummy_query(dev_priv, ctx->id);
836
837 if (unlikely(ret != 0))
838 DRM_ERROR("Out of fifo space for dummy query.\n");
839 }
840
841 if (dev_priv->pinned_bo != sw_context->cur_query_bo) {
842 if (dev_priv->pinned_bo) {
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700843 vmw_bo_pin_reserved(dev_priv->pinned_bo, false);
844 vmw_dmabuf_unreference(&dev_priv->pinned_bo);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200845 }
846
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000847 if (!sw_context->needs_post_query_barrier) {
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700848 vmw_bo_pin_reserved(sw_context->cur_query_bo, true);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200849
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000850 /*
851 * We pin also the dummy_query_bo buffer so that we
852 * don't need to validate it when emitting
853 * dummy queries in context destroy paths.
854 */
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200855
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700856 if (!dev_priv->dummy_query_bo_pinned) {
857 vmw_bo_pin_reserved(dev_priv->dummy_query_bo,
858 true);
859 dev_priv->dummy_query_bo_pinned = true;
860 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200861
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000862 BUG_ON(sw_context->last_query_ctx == NULL);
863 dev_priv->query_cid = sw_context->last_query_ctx->id;
864 dev_priv->query_cid_valid = true;
865 dev_priv->pinned_bo =
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700866 vmw_dmabuf_reference(sw_context->cur_query_bo);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000867 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200868 }
869}
870
871/**
Thomas Hellstromddcda242012-11-21 11:26:55 +0100872 * vmw_translate_mob_pointer - Prepare to translate a user-space buffer
873 * handle to a MOB id.
874 *
875 * @dev_priv: Pointer to a device private structure.
876 * @sw_context: The software context used for this command batch validation.
877 * @id: Pointer to the user-space handle to be translated.
878 * @vmw_bo_p: Points to a location that, on successful return will carry
879 * a reference-counted pointer to the DMA buffer identified by the
880 * user-space handle in @id.
881 *
882 * This function saves information needed to translate a user-space buffer
883 * handle to a MOB id. The translation does not take place immediately, but
884 * during a call to vmw_apply_relocations(). This function builds a relocation
885 * list and a list of buffers to validate. The former needs to be freed using
886 * either vmw_apply_relocations() or vmw_free_relocations(). The latter
887 * needs to be freed using vmw_clear_validations.
888 */
889static int vmw_translate_mob_ptr(struct vmw_private *dev_priv,
890 struct vmw_sw_context *sw_context,
891 SVGAMobId *id,
892 struct vmw_dma_buffer **vmw_bo_p)
893{
894 struct vmw_dma_buffer *vmw_bo = NULL;
Thomas Hellstromddcda242012-11-21 11:26:55 +0100895 uint32_t handle = *id;
896 struct vmw_relocation *reloc;
897 int ret;
898
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100899 ret = vmw_user_dmabuf_lookup(sw_context->fp->tfile, handle, &vmw_bo);
Thomas Hellstromddcda242012-11-21 11:26:55 +0100900 if (unlikely(ret != 0)) {
901 DRM_ERROR("Could not find or use MOB buffer.\n");
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000902 ret = -EINVAL;
903 goto out_no_reloc;
Thomas Hellstromddcda242012-11-21 11:26:55 +0100904 }
Thomas Hellstromddcda242012-11-21 11:26:55 +0100905
906 if (unlikely(sw_context->cur_reloc >= VMWGFX_MAX_RELOCATIONS)) {
907 DRM_ERROR("Max number relocations per submission"
908 " exceeded\n");
909 ret = -EINVAL;
910 goto out_no_reloc;
911 }
912
913 reloc = &sw_context->relocs[sw_context->cur_reloc++];
914 reloc->mob_loc = id;
915 reloc->location = NULL;
916
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700917 ret = vmw_bo_to_validate_list(sw_context, vmw_bo, true, &reloc->index);
Thomas Hellstromddcda242012-11-21 11:26:55 +0100918 if (unlikely(ret != 0))
919 goto out_no_reloc;
920
921 *vmw_bo_p = vmw_bo;
922 return 0;
923
924out_no_reloc:
925 vmw_dmabuf_unreference(&vmw_bo);
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000926 *vmw_bo_p = NULL;
Thomas Hellstromddcda242012-11-21 11:26:55 +0100927 return ret;
928}
929
930/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000931 * vmw_translate_guest_pointer - Prepare to translate a user-space buffer
932 * handle to a valid SVGAGuestPtr
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200933 *
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000934 * @dev_priv: Pointer to a device private structure.
935 * @sw_context: The software context used for this command batch validation.
936 * @ptr: Pointer to the user-space handle to be translated.
937 * @vmw_bo_p: Points to a location that, on successful return will carry
938 * a reference-counted pointer to the DMA buffer identified by the
939 * user-space handle in @id.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200940 *
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000941 * This function saves information needed to translate a user-space buffer
942 * handle to a valid SVGAGuestPtr. The translation does not take place
943 * immediately, but during a call to vmw_apply_relocations().
944 * This function builds a relocation list and a list of buffers to validate.
945 * The former needs to be freed using either vmw_apply_relocations() or
946 * vmw_free_relocations(). The latter needs to be freed using
947 * vmw_clear_validations.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200948 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000949static int vmw_translate_guest_ptr(struct vmw_private *dev_priv,
950 struct vmw_sw_context *sw_context,
951 SVGAGuestPtr *ptr,
952 struct vmw_dma_buffer **vmw_bo_p)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000953{
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000954 struct vmw_dma_buffer *vmw_bo = NULL;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000955 uint32_t handle = ptr->gmrId;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000956 struct vmw_relocation *reloc;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000957 int ret;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000958
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100959 ret = vmw_user_dmabuf_lookup(sw_context->fp->tfile, handle, &vmw_bo);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000960 if (unlikely(ret != 0)) {
961 DRM_ERROR("Could not find or use GMR region.\n");
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000962 ret = -EINVAL;
963 goto out_no_reloc;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000964 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000965
966 if (unlikely(sw_context->cur_reloc >= VMWGFX_MAX_RELOCATIONS)) {
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000967 DRM_ERROR("Max number relocations per submission"
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000968 " exceeded\n");
969 ret = -EINVAL;
970 goto out_no_reloc;
971 }
972
973 reloc = &sw_context->relocs[sw_context->cur_reloc++];
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000974 reloc->location = ptr;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000975
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700976 ret = vmw_bo_to_validate_list(sw_context, vmw_bo, false, &reloc->index);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200977 if (unlikely(ret != 0))
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000978 goto out_no_reloc;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000979
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000980 *vmw_bo_p = vmw_bo;
981 return 0;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000982
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000983out_no_reloc:
984 vmw_dmabuf_unreference(&vmw_bo);
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000985 *vmw_bo_p = NULL;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000986 return ret;
987}
988
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000989/**
Thomas Hellstromddcda242012-11-21 11:26:55 +0100990 * vmw_cmd_begin_gb_query - validate a SVGA_3D_CMD_BEGIN_GB_QUERY command.
991 *
992 * @dev_priv: Pointer to a device private struct.
993 * @sw_context: The software context used for this command submission.
994 * @header: Pointer to the command header in the command stream.
995 */
996static int vmw_cmd_begin_gb_query(struct vmw_private *dev_priv,
997 struct vmw_sw_context *sw_context,
998 SVGA3dCmdHeader *header)
999{
1000 struct vmw_begin_gb_query_cmd {
1001 SVGA3dCmdHeader header;
1002 SVGA3dCmdBeginGBQuery q;
1003 } *cmd;
1004
1005 cmd = container_of(header, struct vmw_begin_gb_query_cmd,
1006 header);
1007
1008 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1009 user_context_converter, &cmd->q.cid,
1010 NULL);
1011}
1012
1013/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001014 * vmw_cmd_begin_query - validate a SVGA_3D_CMD_BEGIN_QUERY command.
1015 *
1016 * @dev_priv: Pointer to a device private struct.
1017 * @sw_context: The software context used for this command submission.
1018 * @header: Pointer to the command header in the command stream.
1019 */
1020static int vmw_cmd_begin_query(struct vmw_private *dev_priv,
1021 struct vmw_sw_context *sw_context,
1022 SVGA3dCmdHeader *header)
1023{
1024 struct vmw_begin_query_cmd {
1025 SVGA3dCmdHeader header;
1026 SVGA3dCmdBeginQuery q;
1027 } *cmd;
1028
1029 cmd = container_of(header, struct vmw_begin_query_cmd,
1030 header);
1031
Thomas Hellstromddcda242012-11-21 11:26:55 +01001032 if (unlikely(dev_priv->has_mob)) {
1033 struct {
1034 SVGA3dCmdHeader header;
1035 SVGA3dCmdBeginGBQuery q;
1036 } gb_cmd;
1037
1038 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
1039
1040 gb_cmd.header.id = SVGA_3D_CMD_BEGIN_GB_QUERY;
1041 gb_cmd.header.size = cmd->header.size;
1042 gb_cmd.q.cid = cmd->q.cid;
1043 gb_cmd.q.type = cmd->q.type;
1044
1045 memcpy(cmd, &gb_cmd, sizeof(*cmd));
1046 return vmw_cmd_begin_gb_query(dev_priv, sw_context, header);
1047 }
1048
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001049 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1050 user_context_converter, &cmd->q.cid,
1051 NULL);
1052}
1053
1054/**
Thomas Hellstromddcda242012-11-21 11:26:55 +01001055 * vmw_cmd_end_gb_query - validate a SVGA_3D_CMD_END_GB_QUERY command.
1056 *
1057 * @dev_priv: Pointer to a device private struct.
1058 * @sw_context: The software context used for this command submission.
1059 * @header: Pointer to the command header in the command stream.
1060 */
1061static int vmw_cmd_end_gb_query(struct vmw_private *dev_priv,
1062 struct vmw_sw_context *sw_context,
1063 SVGA3dCmdHeader *header)
1064{
1065 struct vmw_dma_buffer *vmw_bo;
1066 struct vmw_query_cmd {
1067 SVGA3dCmdHeader header;
1068 SVGA3dCmdEndGBQuery q;
1069 } *cmd;
1070 int ret;
1071
1072 cmd = container_of(header, struct vmw_query_cmd, header);
1073 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1074 if (unlikely(ret != 0))
1075 return ret;
1076
1077 ret = vmw_translate_mob_ptr(dev_priv, sw_context,
1078 &cmd->q.mobid,
1079 &vmw_bo);
1080 if (unlikely(ret != 0))
1081 return ret;
1082
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07001083 ret = vmw_query_bo_switch_prepare(dev_priv, vmw_bo, sw_context);
Thomas Hellstromddcda242012-11-21 11:26:55 +01001084
1085 vmw_dmabuf_unreference(&vmw_bo);
1086 return ret;
1087}
1088
1089/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001090 * vmw_cmd_end_query - validate a SVGA_3D_CMD_END_QUERY command.
1091 *
1092 * @dev_priv: Pointer to a device private struct.
1093 * @sw_context: The software context used for this command submission.
1094 * @header: Pointer to the command header in the command stream.
1095 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001096static int vmw_cmd_end_query(struct vmw_private *dev_priv,
1097 struct vmw_sw_context *sw_context,
1098 SVGA3dCmdHeader *header)
1099{
1100 struct vmw_dma_buffer *vmw_bo;
1101 struct vmw_query_cmd {
1102 SVGA3dCmdHeader header;
1103 SVGA3dCmdEndQuery q;
1104 } *cmd;
1105 int ret;
1106
1107 cmd = container_of(header, struct vmw_query_cmd, header);
Thomas Hellstromddcda242012-11-21 11:26:55 +01001108 if (dev_priv->has_mob) {
1109 struct {
1110 SVGA3dCmdHeader header;
1111 SVGA3dCmdEndGBQuery q;
1112 } gb_cmd;
1113
1114 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
1115
1116 gb_cmd.header.id = SVGA_3D_CMD_END_GB_QUERY;
1117 gb_cmd.header.size = cmd->header.size;
1118 gb_cmd.q.cid = cmd->q.cid;
1119 gb_cmd.q.type = cmd->q.type;
1120 gb_cmd.q.mobid = cmd->q.guestResult.gmrId;
1121 gb_cmd.q.offset = cmd->q.guestResult.offset;
1122
1123 memcpy(cmd, &gb_cmd, sizeof(*cmd));
1124 return vmw_cmd_end_gb_query(dev_priv, sw_context, header);
1125 }
1126
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001127 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1128 if (unlikely(ret != 0))
1129 return ret;
1130
1131 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1132 &cmd->q.guestResult,
1133 &vmw_bo);
1134 if (unlikely(ret != 0))
1135 return ret;
1136
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07001137 ret = vmw_query_bo_switch_prepare(dev_priv, vmw_bo, sw_context);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001138
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001139 vmw_dmabuf_unreference(&vmw_bo);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001140 return ret;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001141}
1142
Thomas Hellstromddcda242012-11-21 11:26:55 +01001143/**
1144 * vmw_cmd_wait_gb_query - validate a SVGA_3D_CMD_WAIT_GB_QUERY command.
1145 *
1146 * @dev_priv: Pointer to a device private struct.
1147 * @sw_context: The software context used for this command submission.
1148 * @header: Pointer to the command header in the command stream.
1149 */
1150static int vmw_cmd_wait_gb_query(struct vmw_private *dev_priv,
1151 struct vmw_sw_context *sw_context,
1152 SVGA3dCmdHeader *header)
1153{
1154 struct vmw_dma_buffer *vmw_bo;
1155 struct vmw_query_cmd {
1156 SVGA3dCmdHeader header;
1157 SVGA3dCmdWaitForGBQuery q;
1158 } *cmd;
1159 int ret;
1160
1161 cmd = container_of(header, struct vmw_query_cmd, header);
1162 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1163 if (unlikely(ret != 0))
1164 return ret;
1165
1166 ret = vmw_translate_mob_ptr(dev_priv, sw_context,
1167 &cmd->q.mobid,
1168 &vmw_bo);
1169 if (unlikely(ret != 0))
1170 return ret;
1171
1172 vmw_dmabuf_unreference(&vmw_bo);
1173 return 0;
1174}
1175
1176/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001177 * vmw_cmd_wait_query - validate a SVGA_3D_CMD_WAIT_QUERY command.
1178 *
1179 * @dev_priv: Pointer to a device private struct.
1180 * @sw_context: The software context used for this command submission.
1181 * @header: Pointer to the command header in the command stream.
1182 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001183static int vmw_cmd_wait_query(struct vmw_private *dev_priv,
1184 struct vmw_sw_context *sw_context,
1185 SVGA3dCmdHeader *header)
1186{
1187 struct vmw_dma_buffer *vmw_bo;
1188 struct vmw_query_cmd {
1189 SVGA3dCmdHeader header;
1190 SVGA3dCmdWaitForQuery q;
1191 } *cmd;
1192 int ret;
1193
1194 cmd = container_of(header, struct vmw_query_cmd, header);
Thomas Hellstromddcda242012-11-21 11:26:55 +01001195 if (dev_priv->has_mob) {
1196 struct {
1197 SVGA3dCmdHeader header;
1198 SVGA3dCmdWaitForGBQuery q;
1199 } gb_cmd;
1200
1201 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
1202
1203 gb_cmd.header.id = SVGA_3D_CMD_WAIT_FOR_GB_QUERY;
1204 gb_cmd.header.size = cmd->header.size;
1205 gb_cmd.q.cid = cmd->q.cid;
1206 gb_cmd.q.type = cmd->q.type;
1207 gb_cmd.q.mobid = cmd->q.guestResult.gmrId;
1208 gb_cmd.q.offset = cmd->q.guestResult.offset;
1209
1210 memcpy(cmd, &gb_cmd, sizeof(*cmd));
1211 return vmw_cmd_wait_gb_query(dev_priv, sw_context, header);
1212 }
1213
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001214 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1215 if (unlikely(ret != 0))
1216 return ret;
1217
1218 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1219 &cmd->q.guestResult,
1220 &vmw_bo);
1221 if (unlikely(ret != 0))
1222 return ret;
1223
1224 vmw_dmabuf_unreference(&vmw_bo);
1225 return 0;
1226}
1227
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001228static int vmw_cmd_dma(struct vmw_private *dev_priv,
1229 struct vmw_sw_context *sw_context,
1230 SVGA3dCmdHeader *header)
1231{
1232 struct vmw_dma_buffer *vmw_bo = NULL;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001233 struct vmw_surface *srf = NULL;
1234 struct vmw_dma_cmd {
1235 SVGA3dCmdHeader header;
1236 SVGA3dCmdSurfaceDMA dma;
1237 } *cmd;
1238 int ret;
Thomas Hellstromcbd75e92014-04-15 18:25:48 +02001239 SVGA3dCmdSurfaceDMASuffix *suffix;
1240 uint32_t bo_size;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001241
1242 cmd = container_of(header, struct vmw_dma_cmd, header);
Thomas Hellstromcbd75e92014-04-15 18:25:48 +02001243 suffix = (SVGA3dCmdSurfaceDMASuffix *)((unsigned long) &cmd->dma +
1244 header->size - sizeof(*suffix));
1245
1246 /* Make sure device and verifier stays in sync. */
1247 if (unlikely(suffix->suffixSize != sizeof(*suffix))) {
1248 DRM_ERROR("Invalid DMA suffix size.\n");
1249 return -EINVAL;
1250 }
1251
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001252 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1253 &cmd->dma.guest.ptr,
1254 &vmw_bo);
1255 if (unlikely(ret != 0))
1256 return ret;
1257
Thomas Hellstromcbd75e92014-04-15 18:25:48 +02001258 /* Make sure DMA doesn't cross BO boundaries. */
1259 bo_size = vmw_bo->base.num_pages * PAGE_SIZE;
1260 if (unlikely(cmd->dma.guest.ptr.offset > bo_size)) {
1261 DRM_ERROR("Invalid DMA offset.\n");
1262 return -EINVAL;
1263 }
1264
1265 bo_size -= cmd->dma.guest.ptr.offset;
1266 if (unlikely(suffix->maximumOffset > bo_size))
1267 suffix->maximumOffset = bo_size;
1268
Sinclair Yehf89c6c32015-06-26 01:54:28 -07001269 if (sw_context->quirks & VMW_QUIRK_DST_SID_OK)
Thomas Hellstromc9146cd2015-03-02 23:45:04 -08001270 goto out_no_surface;
1271
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001272 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1273 user_surface_converter, &cmd->dma.host.sid,
1274 NULL);
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +02001275 if (unlikely(ret != 0)) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001276 if (unlikely(ret != -ERESTARTSYS))
1277 DRM_ERROR("could not find surface for DMA.\n");
1278 goto out_no_surface;
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +02001279 }
1280
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001281 srf = vmw_res_to_srf(sw_context->res_cache[vmw_res_surface].res);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001282
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001283 vmw_kms_cursor_snoop(srf, sw_context->fp->tfile, &vmw_bo->base,
1284 header);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001285
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001286out_no_surface:
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001287 vmw_dmabuf_unreference(&vmw_bo);
1288 return ret;
1289}
1290
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001291static int vmw_cmd_draw(struct vmw_private *dev_priv,
1292 struct vmw_sw_context *sw_context,
1293 SVGA3dCmdHeader *header)
1294{
1295 struct vmw_draw_cmd {
1296 SVGA3dCmdHeader header;
1297 SVGA3dCmdDrawPrimitives body;
1298 } *cmd;
1299 SVGA3dVertexDecl *decl = (SVGA3dVertexDecl *)(
1300 (unsigned long)header + sizeof(*cmd));
1301 SVGA3dPrimitiveRange *range;
1302 uint32_t i;
1303 uint32_t maxnum;
1304 int ret;
1305
1306 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1307 if (unlikely(ret != 0))
1308 return ret;
1309
1310 cmd = container_of(header, struct vmw_draw_cmd, header);
1311 maxnum = (header->size - sizeof(cmd->body)) / sizeof(*decl);
1312
1313 if (unlikely(cmd->body.numVertexDecls > maxnum)) {
1314 DRM_ERROR("Illegal number of vertex declarations.\n");
1315 return -EINVAL;
1316 }
1317
1318 for (i = 0; i < cmd->body.numVertexDecls; ++i, ++decl) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001319 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1320 user_surface_converter,
1321 &decl->array.surfaceId, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001322 if (unlikely(ret != 0))
1323 return ret;
1324 }
1325
1326 maxnum = (header->size - sizeof(cmd->body) -
1327 cmd->body.numVertexDecls * sizeof(*decl)) / sizeof(*range);
1328 if (unlikely(cmd->body.numRanges > maxnum)) {
1329 DRM_ERROR("Illegal number of index ranges.\n");
1330 return -EINVAL;
1331 }
1332
1333 range = (SVGA3dPrimitiveRange *) decl;
1334 for (i = 0; i < cmd->body.numRanges; ++i, ++range) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001335 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1336 user_surface_converter,
1337 &range->indexArray.surfaceId, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001338 if (unlikely(ret != 0))
1339 return ret;
1340 }
1341 return 0;
1342}
1343
1344
1345static int vmw_cmd_tex_state(struct vmw_private *dev_priv,
1346 struct vmw_sw_context *sw_context,
1347 SVGA3dCmdHeader *header)
1348{
1349 struct vmw_tex_state_cmd {
1350 SVGA3dCmdHeader header;
1351 SVGA3dCmdSetTextureState state;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001352 } *cmd;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001353
1354 SVGA3dTextureState *last_state = (SVGA3dTextureState *)
1355 ((unsigned long) header + header->size + sizeof(header));
1356 SVGA3dTextureState *cur_state = (SVGA3dTextureState *)
1357 ((unsigned long) header + sizeof(struct vmw_tex_state_cmd));
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001358 struct vmw_resource_val_node *ctx_node;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07001359 struct vmw_resource_val_node *res_node;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001360 int ret;
1361
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001362 cmd = container_of(header, struct vmw_tex_state_cmd,
1363 header);
1364
1365 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1366 user_context_converter, &cmd->state.cid,
1367 &ctx_node);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001368 if (unlikely(ret != 0))
1369 return ret;
1370
1371 for (; cur_state < last_state; ++cur_state) {
1372 if (likely(cur_state->name != SVGA3D_TS_BIND_TEXTURE))
1373 continue;
1374
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001375 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1376 user_surface_converter,
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07001377 &cur_state->value, &res_node);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001378 if (unlikely(ret != 0))
1379 return ret;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001380
1381 if (dev_priv->has_mob) {
1382 struct vmw_ctx_bindinfo bi;
1383
1384 bi.ctx = ctx_node->res;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07001385 bi.res = res_node ? res_node->res : NULL;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001386 bi.bt = vmw_ctx_binding_tex;
1387 bi.i1.texture_stage = cur_state->stage;
1388 vmw_context_binding_add(ctx_node->staged_bindings,
1389 &bi);
1390 }
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001391 }
1392
1393 return 0;
1394}
1395
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001396static int vmw_cmd_check_define_gmrfb(struct vmw_private *dev_priv,
1397 struct vmw_sw_context *sw_context,
1398 void *buf)
1399{
1400 struct vmw_dma_buffer *vmw_bo;
1401 int ret;
1402
1403 struct {
1404 uint32_t header;
1405 SVGAFifoCmdDefineGMRFB body;
1406 } *cmd = buf;
1407
1408 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1409 &cmd->body.ptr,
1410 &vmw_bo);
1411 if (unlikely(ret != 0))
1412 return ret;
1413
1414 vmw_dmabuf_unreference(&vmw_bo);
1415
1416 return ret;
1417}
1418
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001419/**
Thomas Hellstroma97e2192012-11-21 11:45:13 +01001420 * vmw_cmd_switch_backup - Utility function to handle backup buffer switching
1421 *
1422 * @dev_priv: Pointer to a device private struct.
1423 * @sw_context: The software context being used for this batch.
1424 * @res_type: The resource type.
1425 * @converter: Information about user-space binding for this resource type.
1426 * @res_id: Pointer to the user-space resource handle in the command stream.
1427 * @buf_id: Pointer to the user-space backup buffer handle in the command
1428 * stream.
1429 * @backup_offset: Offset of backup into MOB.
1430 *
1431 * This function prepares for registering a switch of backup buffers
1432 * in the resource metadata just prior to unreserving.
1433 */
1434static int vmw_cmd_switch_backup(struct vmw_private *dev_priv,
1435 struct vmw_sw_context *sw_context,
1436 enum vmw_res_type res_type,
1437 const struct vmw_user_resource_conv
1438 *converter,
1439 uint32_t *res_id,
1440 uint32_t *buf_id,
1441 unsigned long backup_offset)
1442{
1443 int ret;
1444 struct vmw_dma_buffer *dma_buf;
1445 struct vmw_resource_val_node *val_node;
1446
1447 ret = vmw_cmd_res_check(dev_priv, sw_context, res_type,
1448 converter, res_id, &val_node);
1449 if (unlikely(ret != 0))
1450 return ret;
1451
1452 ret = vmw_translate_mob_ptr(dev_priv, sw_context, buf_id, &dma_buf);
1453 if (unlikely(ret != 0))
1454 return ret;
1455
1456 if (val_node->first_usage)
1457 val_node->no_buffer_needed = true;
1458
1459 vmw_dmabuf_unreference(&val_node->new_backup);
1460 val_node->new_backup = dma_buf;
1461 val_node->new_backup_offset = backup_offset;
1462
1463 return 0;
1464}
1465
1466/**
1467 * vmw_cmd_bind_gb_surface - Validate an SVGA_3D_CMD_BIND_GB_SURFACE
1468 * command
1469 *
1470 * @dev_priv: Pointer to a device private struct.
1471 * @sw_context: The software context being used for this batch.
1472 * @header: Pointer to the command header in the command stream.
1473 */
1474static int vmw_cmd_bind_gb_surface(struct vmw_private *dev_priv,
1475 struct vmw_sw_context *sw_context,
1476 SVGA3dCmdHeader *header)
1477{
1478 struct vmw_bind_gb_surface_cmd {
1479 SVGA3dCmdHeader header;
1480 SVGA3dCmdBindGBSurface body;
1481 } *cmd;
1482
1483 cmd = container_of(header, struct vmw_bind_gb_surface_cmd, header);
1484
1485 return vmw_cmd_switch_backup(dev_priv, sw_context, vmw_res_surface,
1486 user_surface_converter,
1487 &cmd->body.sid, &cmd->body.mobid,
1488 0);
1489}
1490
1491/**
1492 * vmw_cmd_update_gb_image - Validate an SVGA_3D_CMD_UPDATE_GB_IMAGE
1493 * command
1494 *
1495 * @dev_priv: Pointer to a device private struct.
1496 * @sw_context: The software context being used for this batch.
1497 * @header: Pointer to the command header in the command stream.
1498 */
1499static int vmw_cmd_update_gb_image(struct vmw_private *dev_priv,
1500 struct vmw_sw_context *sw_context,
1501 SVGA3dCmdHeader *header)
1502{
1503 struct vmw_gb_surface_cmd {
1504 SVGA3dCmdHeader header;
1505 SVGA3dCmdUpdateGBImage body;
1506 } *cmd;
1507
1508 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1509
Sinclair Yehf89c6c32015-06-26 01:54:28 -07001510 if (sw_context->quirks & VMW_QUIRK_SRC_SID_OK)
1511 return 0;
1512
Thomas Hellstroma97e2192012-11-21 11:45:13 +01001513 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1514 user_surface_converter,
1515 &cmd->body.image.sid, NULL);
1516}
1517
1518/**
1519 * vmw_cmd_update_gb_surface - Validate an SVGA_3D_CMD_UPDATE_GB_SURFACE
1520 * command
1521 *
1522 * @dev_priv: Pointer to a device private struct.
1523 * @sw_context: The software context being used for this batch.
1524 * @header: Pointer to the command header in the command stream.
1525 */
1526static int vmw_cmd_update_gb_surface(struct vmw_private *dev_priv,
1527 struct vmw_sw_context *sw_context,
1528 SVGA3dCmdHeader *header)
1529{
1530 struct vmw_gb_surface_cmd {
1531 SVGA3dCmdHeader header;
1532 SVGA3dCmdUpdateGBSurface body;
1533 } *cmd;
1534
1535 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1536
1537 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1538 user_surface_converter,
1539 &cmd->body.sid, NULL);
1540}
1541
1542/**
1543 * vmw_cmd_readback_gb_image - Validate an SVGA_3D_CMD_READBACK_GB_IMAGE
1544 * command
1545 *
1546 * @dev_priv: Pointer to a device private struct.
1547 * @sw_context: The software context being used for this batch.
1548 * @header: Pointer to the command header in the command stream.
1549 */
1550static int vmw_cmd_readback_gb_image(struct vmw_private *dev_priv,
1551 struct vmw_sw_context *sw_context,
1552 SVGA3dCmdHeader *header)
1553{
1554 struct vmw_gb_surface_cmd {
1555 SVGA3dCmdHeader header;
1556 SVGA3dCmdReadbackGBImage body;
1557 } *cmd;
1558
1559 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1560
1561 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1562 user_surface_converter,
1563 &cmd->body.image.sid, NULL);
1564}
1565
1566/**
1567 * vmw_cmd_readback_gb_surface - Validate an SVGA_3D_CMD_READBACK_GB_SURFACE
1568 * command
1569 *
1570 * @dev_priv: Pointer to a device private struct.
1571 * @sw_context: The software context being used for this batch.
1572 * @header: Pointer to the command header in the command stream.
1573 */
1574static int vmw_cmd_readback_gb_surface(struct vmw_private *dev_priv,
1575 struct vmw_sw_context *sw_context,
1576 SVGA3dCmdHeader *header)
1577{
1578 struct vmw_gb_surface_cmd {
1579 SVGA3dCmdHeader header;
1580 SVGA3dCmdReadbackGBSurface body;
1581 } *cmd;
1582
1583 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1584
1585 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1586 user_surface_converter,
1587 &cmd->body.sid, NULL);
1588}
1589
1590/**
1591 * vmw_cmd_invalidate_gb_image - Validate an SVGA_3D_CMD_INVALIDATE_GB_IMAGE
1592 * command
1593 *
1594 * @dev_priv: Pointer to a device private struct.
1595 * @sw_context: The software context being used for this batch.
1596 * @header: Pointer to the command header in the command stream.
1597 */
1598static int vmw_cmd_invalidate_gb_image(struct vmw_private *dev_priv,
1599 struct vmw_sw_context *sw_context,
1600 SVGA3dCmdHeader *header)
1601{
1602 struct vmw_gb_surface_cmd {
1603 SVGA3dCmdHeader header;
1604 SVGA3dCmdInvalidateGBImage body;
1605 } *cmd;
1606
1607 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1608
1609 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1610 user_surface_converter,
1611 &cmd->body.image.sid, NULL);
1612}
1613
1614/**
1615 * vmw_cmd_invalidate_gb_surface - Validate an
1616 * SVGA_3D_CMD_INVALIDATE_GB_SURFACE command
1617 *
1618 * @dev_priv: Pointer to a device private struct.
1619 * @sw_context: The software context being used for this batch.
1620 * @header: Pointer to the command header in the command stream.
1621 */
1622static int vmw_cmd_invalidate_gb_surface(struct vmw_private *dev_priv,
1623 struct vmw_sw_context *sw_context,
1624 SVGA3dCmdHeader *header)
1625{
1626 struct vmw_gb_surface_cmd {
1627 SVGA3dCmdHeader header;
1628 SVGA3dCmdInvalidateGBSurface body;
1629 } *cmd;
1630
1631 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1632
1633 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1634 user_surface_converter,
1635 &cmd->body.sid, NULL);
1636}
1637
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001638
1639/**
1640 * vmw_cmd_shader_define - Validate an SVGA_3D_CMD_SHADER_DEFINE
1641 * command
1642 *
1643 * @dev_priv: Pointer to a device private struct.
1644 * @sw_context: The software context being used for this batch.
1645 * @header: Pointer to the command header in the command stream.
1646 */
1647static int vmw_cmd_shader_define(struct vmw_private *dev_priv,
1648 struct vmw_sw_context *sw_context,
1649 SVGA3dCmdHeader *header)
1650{
1651 struct vmw_shader_define_cmd {
1652 SVGA3dCmdHeader header;
1653 SVGA3dCmdDefineShader body;
1654 } *cmd;
1655 int ret;
1656 size_t size;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001657 struct vmw_resource_val_node *val;
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001658
1659 cmd = container_of(header, struct vmw_shader_define_cmd,
1660 header);
1661
1662 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1663 user_context_converter, &cmd->body.cid,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001664 &val);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001665 if (unlikely(ret != 0))
1666 return ret;
1667
1668 if (unlikely(!dev_priv->has_mob))
1669 return 0;
1670
1671 size = cmd->header.size - sizeof(cmd->body);
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001672 ret = vmw_compat_shader_add(dev_priv,
1673 vmw_context_res_man(val->res),
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001674 cmd->body.shid, cmd + 1,
1675 cmd->body.type, size,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001676 &sw_context->staged_cmd_res);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001677 if (unlikely(ret != 0))
1678 return ret;
1679
1680 return vmw_resource_relocation_add(&sw_context->res_relocations,
1681 NULL, &cmd->header.id -
1682 sw_context->buf_start);
1683
1684 return 0;
1685}
1686
1687/**
1688 * vmw_cmd_shader_destroy - Validate an SVGA_3D_CMD_SHADER_DESTROY
1689 * command
1690 *
1691 * @dev_priv: Pointer to a device private struct.
1692 * @sw_context: The software context being used for this batch.
1693 * @header: Pointer to the command header in the command stream.
1694 */
1695static int vmw_cmd_shader_destroy(struct vmw_private *dev_priv,
1696 struct vmw_sw_context *sw_context,
1697 SVGA3dCmdHeader *header)
1698{
1699 struct vmw_shader_destroy_cmd {
1700 SVGA3dCmdHeader header;
1701 SVGA3dCmdDestroyShader body;
1702 } *cmd;
1703 int ret;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001704 struct vmw_resource_val_node *val;
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001705
1706 cmd = container_of(header, struct vmw_shader_destroy_cmd,
1707 header);
1708
1709 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1710 user_context_converter, &cmd->body.cid,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001711 &val);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001712 if (unlikely(ret != 0))
1713 return ret;
1714
1715 if (unlikely(!dev_priv->has_mob))
1716 return 0;
1717
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001718 ret = vmw_compat_shader_remove(vmw_context_res_man(val->res),
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001719 cmd->body.shid,
1720 cmd->body.type,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001721 &sw_context->staged_cmd_res);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001722 if (unlikely(ret != 0))
1723 return ret;
1724
1725 return vmw_resource_relocation_add(&sw_context->res_relocations,
1726 NULL, &cmd->header.id -
1727 sw_context->buf_start);
1728
1729 return 0;
1730}
1731
Thomas Hellstroma97e2192012-11-21 11:45:13 +01001732/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001733 * vmw_cmd_set_shader - Validate an SVGA_3D_CMD_SET_SHADER
1734 * command
1735 *
1736 * @dev_priv: Pointer to a device private struct.
1737 * @sw_context: The software context being used for this batch.
1738 * @header: Pointer to the command header in the command stream.
1739 */
1740static int vmw_cmd_set_shader(struct vmw_private *dev_priv,
1741 struct vmw_sw_context *sw_context,
1742 SVGA3dCmdHeader *header)
1743{
1744 struct vmw_set_shader_cmd {
1745 SVGA3dCmdHeader header;
1746 SVGA3dCmdSetShader body;
1747 } *cmd;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001748 struct vmw_resource_val_node *ctx_node, *res_node = NULL;
1749 struct vmw_ctx_bindinfo bi;
1750 struct vmw_resource *res = NULL;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001751 int ret;
1752
1753 cmd = container_of(header, struct vmw_set_shader_cmd,
1754 header);
1755
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001756 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1757 user_context_converter, &cmd->body.cid,
1758 &ctx_node);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001759 if (unlikely(ret != 0))
1760 return ret;
1761
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001762 if (!dev_priv->has_mob)
1763 return 0;
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001764
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001765 if (cmd->body.shid != SVGA3D_INVALID_ID) {
1766 res = vmw_compat_shader_lookup
1767 (vmw_context_res_man(ctx_node->res),
1768 cmd->body.shid,
1769 cmd->body.type);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001770
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001771 if (!IS_ERR(res)) {
1772 ret = vmw_cmd_res_reloc_add(dev_priv, sw_context,
1773 vmw_res_shader,
1774 &cmd->body.shid, res,
1775 &res_node);
1776 vmw_resource_unreference(&res);
1777 if (unlikely(ret != 0))
1778 return ret;
1779 }
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001780 }
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001781
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001782 if (!res_node) {
1783 ret = vmw_cmd_res_check(dev_priv, sw_context,
1784 vmw_res_shader,
1785 user_shader_converter,
1786 &cmd->body.shid, &res_node);
1787 if (unlikely(ret != 0))
1788 return ret;
1789 }
1790
1791 bi.ctx = ctx_node->res;
1792 bi.res = res_node ? res_node->res : NULL;
1793 bi.bt = vmw_ctx_binding_shader;
1794 bi.i1.shader_type = cmd->body.type;
1795 return vmw_context_binding_add(ctx_node->staged_bindings, &bi);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001796}
1797
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001798/**
Thomas Hellstrom0ccbbae2014-01-30 11:13:43 +01001799 * vmw_cmd_set_shader_const - Validate an SVGA_3D_CMD_SET_SHADER_CONST
1800 * command
1801 *
1802 * @dev_priv: Pointer to a device private struct.
1803 * @sw_context: The software context being used for this batch.
1804 * @header: Pointer to the command header in the command stream.
1805 */
1806static int vmw_cmd_set_shader_const(struct vmw_private *dev_priv,
1807 struct vmw_sw_context *sw_context,
1808 SVGA3dCmdHeader *header)
1809{
1810 struct vmw_set_shader_const_cmd {
1811 SVGA3dCmdHeader header;
1812 SVGA3dCmdSetShaderConst body;
1813 } *cmd;
1814 int ret;
1815
1816 cmd = container_of(header, struct vmw_set_shader_const_cmd,
1817 header);
1818
1819 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1820 user_context_converter, &cmd->body.cid,
1821 NULL);
1822 if (unlikely(ret != 0))
1823 return ret;
1824
1825 if (dev_priv->has_mob)
1826 header->id = SVGA_3D_CMD_SET_GB_SHADERCONSTS_INLINE;
1827
1828 return 0;
1829}
1830
1831/**
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001832 * vmw_cmd_bind_gb_shader - Validate an SVGA_3D_CMD_BIND_GB_SHADER
1833 * command
1834 *
1835 * @dev_priv: Pointer to a device private struct.
1836 * @sw_context: The software context being used for this batch.
1837 * @header: Pointer to the command header in the command stream.
1838 */
1839static int vmw_cmd_bind_gb_shader(struct vmw_private *dev_priv,
1840 struct vmw_sw_context *sw_context,
1841 SVGA3dCmdHeader *header)
1842{
1843 struct vmw_bind_gb_shader_cmd {
1844 SVGA3dCmdHeader header;
1845 SVGA3dCmdBindGBShader body;
1846 } *cmd;
1847
1848 cmd = container_of(header, struct vmw_bind_gb_shader_cmd,
1849 header);
1850
1851 return vmw_cmd_switch_backup(dev_priv, sw_context, vmw_res_shader,
1852 user_shader_converter,
1853 &cmd->body.shid, &cmd->body.mobid,
1854 cmd->body.offsetInBytes);
1855}
1856
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001857static int vmw_cmd_check_not_3d(struct vmw_private *dev_priv,
1858 struct vmw_sw_context *sw_context,
1859 void *buf, uint32_t *size)
1860{
1861 uint32_t size_remaining = *size;
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001862 uint32_t cmd_id;
1863
1864 cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
1865 switch (cmd_id) {
1866 case SVGA_CMD_UPDATE:
1867 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdUpdate);
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001868 break;
1869 case SVGA_CMD_DEFINE_GMRFB:
1870 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdDefineGMRFB);
1871 break;
1872 case SVGA_CMD_BLIT_GMRFB_TO_SCREEN:
1873 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
1874 break;
1875 case SVGA_CMD_BLIT_SCREEN_TO_GMRFB:
1876 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
1877 break;
1878 default:
1879 DRM_ERROR("Unsupported SVGA command: %u.\n", cmd_id);
1880 return -EINVAL;
1881 }
1882
1883 if (*size > size_remaining) {
1884 DRM_ERROR("Invalid SVGA command (size mismatch):"
1885 " %u.\n", cmd_id);
1886 return -EINVAL;
1887 }
1888
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +02001889 if (unlikely(!sw_context->kernel)) {
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001890 DRM_ERROR("Kernel only SVGA command: %u.\n", cmd_id);
1891 return -EPERM;
1892 }
1893
1894 if (cmd_id == SVGA_CMD_DEFINE_GMRFB)
1895 return vmw_cmd_check_define_gmrfb(dev_priv, sw_context, buf);
1896
1897 return 0;
1898}
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001899
Thomas Hellstrom4fbd9d22014-02-12 12:37:01 +01001900static const struct vmw_cmd_entry vmw_cmd_entries[SVGA_3D_CMD_MAX] = {
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001901 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DEFINE, &vmw_cmd_invalid,
1902 false, false, false),
1903 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DESTROY, &vmw_cmd_invalid,
1904 false, false, false),
1905 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_COPY, &vmw_cmd_surface_copy_check,
1906 true, false, false),
1907 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_STRETCHBLT, &vmw_cmd_stretch_blt_check,
1908 true, false, false),
1909 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DMA, &vmw_cmd_dma,
1910 true, false, false),
1911 VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DEFINE, &vmw_cmd_invalid,
1912 false, false, false),
1913 VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DESTROY, &vmw_cmd_invalid,
1914 false, false, false),
1915 VMW_CMD_DEF(SVGA_3D_CMD_SETTRANSFORM, &vmw_cmd_cid_check,
1916 true, false, false),
1917 VMW_CMD_DEF(SVGA_3D_CMD_SETZRANGE, &vmw_cmd_cid_check,
1918 true, false, false),
1919 VMW_CMD_DEF(SVGA_3D_CMD_SETRENDERSTATE, &vmw_cmd_cid_check,
1920 true, false, false),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001921 VMW_CMD_DEF(SVGA_3D_CMD_SETRENDERTARGET,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001922 &vmw_cmd_set_render_target_check, true, false, false),
1923 VMW_CMD_DEF(SVGA_3D_CMD_SETTEXTURESTATE, &vmw_cmd_tex_state,
1924 true, false, false),
1925 VMW_CMD_DEF(SVGA_3D_CMD_SETMATERIAL, &vmw_cmd_cid_check,
1926 true, false, false),
1927 VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTDATA, &vmw_cmd_cid_check,
1928 true, false, false),
1929 VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTENABLED, &vmw_cmd_cid_check,
1930 true, false, false),
1931 VMW_CMD_DEF(SVGA_3D_CMD_SETVIEWPORT, &vmw_cmd_cid_check,
1932 true, false, false),
1933 VMW_CMD_DEF(SVGA_3D_CMD_SETCLIPPLANE, &vmw_cmd_cid_check,
1934 true, false, false),
1935 VMW_CMD_DEF(SVGA_3D_CMD_CLEAR, &vmw_cmd_cid_check,
1936 true, false, false),
1937 VMW_CMD_DEF(SVGA_3D_CMD_PRESENT, &vmw_cmd_present_check,
1938 false, false, false),
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001939 VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DEFINE, &vmw_cmd_shader_define,
1940 true, false, false),
1941 VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DESTROY, &vmw_cmd_shader_destroy,
1942 true, false, false),
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001943 VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER, &vmw_cmd_set_shader,
1944 true, false, false),
Thomas Hellstrom0ccbbae2014-01-30 11:13:43 +01001945 VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER_CONST, &vmw_cmd_set_shader_const,
1946 true, false, false),
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001947 VMW_CMD_DEF(SVGA_3D_CMD_DRAW_PRIMITIVES, &vmw_cmd_draw,
1948 true, false, false),
1949 VMW_CMD_DEF(SVGA_3D_CMD_SETSCISSORRECT, &vmw_cmd_cid_check,
1950 true, false, false),
1951 VMW_CMD_DEF(SVGA_3D_CMD_BEGIN_QUERY, &vmw_cmd_begin_query,
1952 true, false, false),
1953 VMW_CMD_DEF(SVGA_3D_CMD_END_QUERY, &vmw_cmd_end_query,
1954 true, false, false),
1955 VMW_CMD_DEF(SVGA_3D_CMD_WAIT_FOR_QUERY, &vmw_cmd_wait_query,
1956 true, false, false),
1957 VMW_CMD_DEF(SVGA_3D_CMD_PRESENT_READBACK, &vmw_cmd_ok,
1958 true, false, false),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001959 VMW_CMD_DEF(SVGA_3D_CMD_BLIT_SURFACE_TO_SCREEN,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001960 &vmw_cmd_blt_surf_screen_check, false, false, false),
1961 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DEFINE_V2, &vmw_cmd_invalid,
1962 false, false, false),
1963 VMW_CMD_DEF(SVGA_3D_CMD_GENERATE_MIPMAPS, &vmw_cmd_invalid,
1964 false, false, false),
1965 VMW_CMD_DEF(SVGA_3D_CMD_ACTIVATE_SURFACE, &vmw_cmd_invalid,
1966 false, false, false),
1967 VMW_CMD_DEF(SVGA_3D_CMD_DEACTIVATE_SURFACE, &vmw_cmd_invalid,
1968 false, false, false),
1969 VMW_CMD_DEF(SVGA_3D_CMD_SCREEN_DMA, &vmw_cmd_invalid,
1970 false, false, false),
1971 VMW_CMD_DEF(SVGA_3D_CMD_SET_UNITY_SURFACE_COOKIE, &vmw_cmd_invalid,
1972 false, false, false),
1973 VMW_CMD_DEF(SVGA_3D_CMD_OPEN_CONTEXT_SURFACE, &vmw_cmd_invalid,
1974 false, false, false),
1975 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_BITBLT, &vmw_cmd_invalid,
1976 false, false, false),
1977 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_TRANSBLT, &vmw_cmd_invalid,
1978 false, false, false),
1979 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_STRETCHBLT, &vmw_cmd_invalid,
1980 false, false, false),
1981 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_COLORFILL, &vmw_cmd_invalid,
1982 false, false, false),
1983 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_ALPHABLEND, &vmw_cmd_invalid,
1984 false, false, false),
1985 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_CLEARTYPEBLEND, &vmw_cmd_invalid,
1986 false, false, false),
1987 VMW_CMD_DEF(SVGA_3D_CMD_SET_OTABLE_BASE, &vmw_cmd_invalid,
1988 false, false, true),
1989 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_OTABLE, &vmw_cmd_invalid,
1990 false, false, true),
1991 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_MOB, &vmw_cmd_invalid,
1992 false, false, true),
1993 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_MOB, &vmw_cmd_invalid,
1994 false, false, true),
1995 VMW_CMD_DEF(SVGA_3D_CMD_REDEFINE_GB_MOB, &vmw_cmd_invalid,
1996 false, false, true),
1997 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_MOB_MAPPING, &vmw_cmd_invalid,
1998 false, false, true),
1999 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_SURFACE, &vmw_cmd_invalid,
2000 false, false, true),
2001 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_SURFACE, &vmw_cmd_invalid,
2002 false, false, true),
2003 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_SURFACE, &vmw_cmd_bind_gb_surface,
2004 true, false, true),
2005 VMW_CMD_DEF(SVGA_3D_CMD_COND_BIND_GB_SURFACE, &vmw_cmd_invalid,
2006 false, false, true),
2007 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_IMAGE, &vmw_cmd_update_gb_image,
2008 true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002009 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_SURFACE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002010 &vmw_cmd_update_gb_surface, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002011 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_IMAGE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002012 &vmw_cmd_readback_gb_image, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002013 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_SURFACE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002014 &vmw_cmd_readback_gb_surface, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002015 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_IMAGE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002016 &vmw_cmd_invalidate_gb_image, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002017 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_SURFACE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002018 &vmw_cmd_invalidate_gb_surface, true, false, true),
2019 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_CONTEXT, &vmw_cmd_invalid,
2020 false, false, true),
2021 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_CONTEXT, &vmw_cmd_invalid,
2022 false, false, true),
2023 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_CONTEXT, &vmw_cmd_invalid,
2024 false, false, true),
2025 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_CONTEXT, &vmw_cmd_invalid,
2026 false, false, true),
2027 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_CONTEXT, &vmw_cmd_invalid,
2028 false, false, true),
2029 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_SHADER, &vmw_cmd_invalid,
2030 false, false, true),
2031 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_SHADER, &vmw_cmd_bind_gb_shader,
2032 true, false, true),
2033 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_SHADER, &vmw_cmd_invalid,
2034 false, false, true),
Thomas Hellstromf2a0dcb2014-01-15 10:04:07 +01002035 VMW_CMD_DEF(SVGA_3D_CMD_SET_OTABLE_BASE64, &vmw_cmd_invalid,
Thomas Hellstrom8ba07312013-10-08 02:25:35 -07002036 false, false, false),
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002037 VMW_CMD_DEF(SVGA_3D_CMD_BEGIN_GB_QUERY, &vmw_cmd_begin_gb_query,
2038 true, false, true),
2039 VMW_CMD_DEF(SVGA_3D_CMD_END_GB_QUERY, &vmw_cmd_end_gb_query,
2040 true, false, true),
2041 VMW_CMD_DEF(SVGA_3D_CMD_WAIT_FOR_GB_QUERY, &vmw_cmd_wait_gb_query,
2042 true, false, true),
2043 VMW_CMD_DEF(SVGA_3D_CMD_NOP, &vmw_cmd_ok,
2044 true, false, true),
2045 VMW_CMD_DEF(SVGA_3D_CMD_ENABLE_GART, &vmw_cmd_invalid,
2046 false, false, true),
2047 VMW_CMD_DEF(SVGA_3D_CMD_DISABLE_GART, &vmw_cmd_invalid,
2048 false, false, true),
2049 VMW_CMD_DEF(SVGA_3D_CMD_MAP_MOB_INTO_GART, &vmw_cmd_invalid,
2050 false, false, true),
2051 VMW_CMD_DEF(SVGA_3D_CMD_UNMAP_GART_RANGE, &vmw_cmd_invalid,
2052 false, false, true),
2053 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_SCREENTARGET, &vmw_cmd_invalid,
2054 false, false, true),
2055 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_SCREENTARGET, &vmw_cmd_invalid,
2056 false, false, true),
2057 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_SCREENTARGET, &vmw_cmd_invalid,
2058 false, false, true),
2059 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_SCREENTARGET, &vmw_cmd_invalid,
2060 false, false, true),
2061 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_IMAGE_PARTIAL, &vmw_cmd_invalid,
2062 false, false, true),
2063 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_IMAGE_PARTIAL, &vmw_cmd_invalid,
2064 false, false, true),
2065 VMW_CMD_DEF(SVGA_3D_CMD_SET_GB_SHADERCONSTS_INLINE, &vmw_cmd_cid_check,
2066 true, false, true)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002067};
2068
2069static int vmw_cmd_check(struct vmw_private *dev_priv,
2070 struct vmw_sw_context *sw_context,
2071 void *buf, uint32_t *size)
2072{
2073 uint32_t cmd_id;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002074 uint32_t size_remaining = *size;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002075 SVGA3dCmdHeader *header = (SVGA3dCmdHeader *) buf;
2076 int ret;
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002077 const struct vmw_cmd_entry *entry;
2078 bool gb = dev_priv->capabilities & SVGA_CAP_GBOBJECTS;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002079
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02002080 cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
2081 /* Handle any none 3D commands */
2082 if (unlikely(cmd_id < SVGA_CMD_MAX))
2083 return vmw_cmd_check_not_3d(dev_priv, sw_context, buf, size);
2084
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002085
2086 cmd_id = le32_to_cpu(header->id);
2087 *size = le32_to_cpu(header->size) + sizeof(SVGA3dCmdHeader);
2088
2089 cmd_id -= SVGA_3D_CMD_BASE;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002090 if (unlikely(*size > size_remaining))
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002091 goto out_invalid;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002092
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002093 if (unlikely(cmd_id >= SVGA_3D_CMD_MAX - SVGA_3D_CMD_BASE))
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002094 goto out_invalid;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002095
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002096 entry = &vmw_cmd_entries[cmd_id];
Thomas Hellstrom36e952c2014-02-12 13:19:36 +01002097 if (unlikely(!entry->func))
2098 goto out_invalid;
2099
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002100 if (unlikely(!entry->user_allow && !sw_context->kernel))
2101 goto out_privileged;
2102
2103 if (unlikely(entry->gb_disable && gb))
2104 goto out_old;
2105
2106 if (unlikely(entry->gb_enable && !gb))
2107 goto out_new;
2108
2109 ret = entry->func(dev_priv, sw_context, header);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002110 if (unlikely(ret != 0))
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002111 goto out_invalid;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002112
2113 return 0;
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002114out_invalid:
2115 DRM_ERROR("Invalid SVGA3D command: %d\n",
2116 cmd_id + SVGA_3D_CMD_BASE);
2117 return -EINVAL;
2118out_privileged:
2119 DRM_ERROR("Privileged SVGA3D command: %d\n",
2120 cmd_id + SVGA_3D_CMD_BASE);
2121 return -EPERM;
2122out_old:
2123 DRM_ERROR("Deprecated (disallowed) SVGA3D command: %d\n",
2124 cmd_id + SVGA_3D_CMD_BASE);
2125 return -EINVAL;
2126out_new:
2127 DRM_ERROR("SVGA3D command: %d not supported by virtual hardware.\n",
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002128 cmd_id + SVGA_3D_CMD_BASE);
2129 return -EINVAL;
2130}
2131
2132static int vmw_cmd_check_all(struct vmw_private *dev_priv,
2133 struct vmw_sw_context *sw_context,
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002134 void *buf,
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002135 uint32_t size)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002136{
2137 int32_t cur_size = size;
2138 int ret;
2139
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002140 sw_context->buf_start = buf;
2141
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002142 while (cur_size > 0) {
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002143 size = cur_size;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002144 ret = vmw_cmd_check(dev_priv, sw_context, buf, &size);
2145 if (unlikely(ret != 0))
2146 return ret;
2147 buf = (void *)((unsigned long) buf + size);
2148 cur_size -= size;
2149 }
2150
2151 if (unlikely(cur_size != 0)) {
2152 DRM_ERROR("Command verifier out of sync.\n");
2153 return -EINVAL;
2154 }
2155
2156 return 0;
2157}
2158
2159static void vmw_free_relocations(struct vmw_sw_context *sw_context)
2160{
2161 sw_context->cur_reloc = 0;
2162}
2163
2164static void vmw_apply_relocations(struct vmw_sw_context *sw_context)
2165{
2166 uint32_t i;
2167 struct vmw_relocation *reloc;
2168 struct ttm_validate_buffer *validate;
2169 struct ttm_buffer_object *bo;
2170
2171 for (i = 0; i < sw_context->cur_reloc; ++i) {
2172 reloc = &sw_context->relocs[i];
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002173 validate = &sw_context->val_bufs[reloc->index].base;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002174 bo = validate->bo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002175 switch (bo->mem.mem_type) {
2176 case TTM_PL_VRAM:
Thomas Hellstrom135cba02010-10-26 21:21:47 +02002177 reloc->location->offset += bo->offset;
2178 reloc->location->gmrId = SVGA_GMR_FRAMEBUFFER;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002179 break;
2180 case VMW_PL_GMR:
Thomas Hellstrom135cba02010-10-26 21:21:47 +02002181 reloc->location->gmrId = bo->mem.start;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002182 break;
Thomas Hellstromddcda242012-11-21 11:26:55 +01002183 case VMW_PL_MOB:
2184 *reloc->mob_loc = bo->mem.start;
2185 break;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002186 default:
2187 BUG();
2188 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002189 }
2190 vmw_free_relocations(sw_context);
2191}
2192
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002193/**
2194 * vmw_resource_list_unrefererence - Free up a resource list and unreference
2195 * all resources referenced by it.
2196 *
2197 * @list: The resource list.
2198 */
2199static void vmw_resource_list_unreference(struct list_head *list)
2200{
2201 struct vmw_resource_val_node *val, *val_next;
2202
2203 /*
2204 * Drop references to resources held during command submission.
2205 */
2206
2207 list_for_each_entry_safe(val, val_next, list, head) {
2208 list_del_init(&val->head);
2209 vmw_resource_unreference(&val->res);
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07002210 if (unlikely(val->staged_bindings))
2211 kfree(val->staged_bindings);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002212 kfree(val);
2213 }
2214}
2215
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002216static void vmw_clear_validations(struct vmw_sw_context *sw_context)
2217{
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002218 struct vmw_validate_buffer *entry, *next;
2219 struct vmw_resource_val_node *val;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002220
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002221 /*
2222 * Drop references to DMA buffers held during command submission.
2223 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002224 list_for_each_entry_safe(entry, next, &sw_context->validate_nodes,
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002225 base.head) {
2226 list_del(&entry->base.head);
2227 ttm_bo_unref(&entry->base.bo);
2228 (void) drm_ht_remove_item(&sw_context->res_ht, &entry->hash);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002229 sw_context->cur_val_buf--;
2230 }
2231 BUG_ON(sw_context->cur_val_buf != 0);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002232
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002233 list_for_each_entry(val, &sw_context->resource_list, head)
2234 (void) drm_ht_remove_item(&sw_context->res_ht, &val->hash);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002235}
2236
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002237int vmw_validate_single_buffer(struct vmw_private *dev_priv,
2238 struct ttm_buffer_object *bo,
2239 bool interruptible,
2240 bool validate_as_mob)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002241{
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002242 struct vmw_dma_buffer *vbo = container_of(bo, struct vmw_dma_buffer,
2243 base);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002244 int ret;
2245
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002246 if (vbo->pin_count > 0)
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002247 return 0;
2248
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002249 if (validate_as_mob)
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002250 return ttm_bo_validate(bo, &vmw_mob_placement, interruptible,
2251 false);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002252
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01002253 /**
Thomas Hellstrom135cba02010-10-26 21:21:47 +02002254 * Put BO in VRAM if there is space, otherwise as a GMR.
2255 * If there is no space in VRAM and GMR ids are all used up,
2256 * start evicting GMRs to make room. If the DMA buffer can't be
2257 * used as a GMR, this will return -ENOMEM.
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01002258 */
2259
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002260 ret = ttm_bo_validate(bo, &vmw_vram_gmr_placement, interruptible,
2261 false);
Thomas Hellstrom3d3a5b32009-12-08 12:59:34 +01002262 if (likely(ret == 0 || ret == -ERESTARTSYS))
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002263 return ret;
2264
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01002265 /**
2266 * If that failed, try VRAM again, this time evicting
2267 * previous contents.
2268 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002269
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002270 ret = ttm_bo_validate(bo, &vmw_vram_placement, interruptible, false);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002271 return ret;
2272}
2273
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002274static int vmw_validate_buffers(struct vmw_private *dev_priv,
2275 struct vmw_sw_context *sw_context)
2276{
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002277 struct vmw_validate_buffer *entry;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002278 int ret;
2279
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002280 list_for_each_entry(entry, &sw_context->validate_nodes, base.head) {
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002281 ret = vmw_validate_single_buffer(dev_priv, entry->base.bo,
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002282 true,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002283 entry->validate_as_mob);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002284 if (unlikely(ret != 0))
2285 return ret;
2286 }
2287 return 0;
2288}
2289
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002290static int vmw_resize_cmd_bounce(struct vmw_sw_context *sw_context,
2291 uint32_t size)
2292{
2293 if (likely(sw_context->cmd_bounce_size >= size))
2294 return 0;
2295
2296 if (sw_context->cmd_bounce_size == 0)
2297 sw_context->cmd_bounce_size = VMWGFX_CMD_BOUNCE_INIT_SIZE;
2298
2299 while (sw_context->cmd_bounce_size < size) {
2300 sw_context->cmd_bounce_size =
2301 PAGE_ALIGN(sw_context->cmd_bounce_size +
2302 (sw_context->cmd_bounce_size >> 1));
2303 }
2304
2305 if (sw_context->cmd_bounce != NULL)
2306 vfree(sw_context->cmd_bounce);
2307
2308 sw_context->cmd_bounce = vmalloc(sw_context->cmd_bounce_size);
2309
2310 if (sw_context->cmd_bounce == NULL) {
2311 DRM_ERROR("Failed to allocate command bounce buffer.\n");
2312 sw_context->cmd_bounce_size = 0;
2313 return -ENOMEM;
2314 }
2315
2316 return 0;
2317}
2318
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002319/**
2320 * vmw_execbuf_fence_commands - create and submit a command stream fence
2321 *
2322 * Creates a fence object and submits a command stream marker.
2323 * If this fails for some reason, We sync the fifo and return NULL.
2324 * It is then safe to fence buffers with a NULL pointer.
Jakob Bornecrantz6070e9f2011-10-04 20:13:16 +02002325 *
2326 * If @p_handle is not NULL @file_priv must also not be NULL. Creates
2327 * a userspace handle if @p_handle is not NULL, otherwise not.
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002328 */
2329
2330int vmw_execbuf_fence_commands(struct drm_file *file_priv,
2331 struct vmw_private *dev_priv,
2332 struct vmw_fence_obj **p_fence,
2333 uint32_t *p_handle)
2334{
2335 uint32_t sequence;
2336 int ret;
2337 bool synced = false;
2338
Jakob Bornecrantz6070e9f2011-10-04 20:13:16 +02002339 /* p_handle implies file_priv. */
2340 BUG_ON(p_handle != NULL && file_priv == NULL);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002341
2342 ret = vmw_fifo_send_fence(dev_priv, &sequence);
2343 if (unlikely(ret != 0)) {
2344 DRM_ERROR("Fence submission error. Syncing.\n");
2345 synced = true;
2346 }
2347
2348 if (p_handle != NULL)
2349 ret = vmw_user_fence_create(file_priv, dev_priv->fman,
Maarten Lankhorstc060a4e2014-03-26 13:06:24 +01002350 sequence, p_fence, p_handle);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002351 else
Maarten Lankhorstc060a4e2014-03-26 13:06:24 +01002352 ret = vmw_fence_create(dev_priv->fman, sequence, p_fence);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002353
2354 if (unlikely(ret != 0 && !synced)) {
2355 (void) vmw_fallback_wait(dev_priv, false, false,
2356 sequence, false,
2357 VMW_FENCE_WAIT_TIMEOUT);
2358 *p_fence = NULL;
2359 }
2360
2361 return 0;
2362}
2363
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002364/**
2365 * vmw_execbuf_copy_fence_user - copy fence object information to
2366 * user-space.
2367 *
2368 * @dev_priv: Pointer to a vmw_private struct.
2369 * @vmw_fp: Pointer to the struct vmw_fpriv representing the calling file.
2370 * @ret: Return value from fence object creation.
2371 * @user_fence_rep: User space address of a struct drm_vmw_fence_rep to
2372 * which the information should be copied.
2373 * @fence: Pointer to the fenc object.
2374 * @fence_handle: User-space fence handle.
2375 *
2376 * This function copies fence information to user-space. If copying fails,
2377 * The user-space struct drm_vmw_fence_rep::error member is hopefully
2378 * left untouched, and if it's preloaded with an -EFAULT by user-space,
2379 * the error will hopefully be detected.
2380 * Also if copying fails, user-space will be unable to signal the fence
2381 * object so we wait for it immediately, and then unreference the
2382 * user-space reference.
2383 */
Thomas Hellstrom57c5ee72011-10-10 12:23:26 +02002384void
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002385vmw_execbuf_copy_fence_user(struct vmw_private *dev_priv,
2386 struct vmw_fpriv *vmw_fp,
2387 int ret,
2388 struct drm_vmw_fence_rep __user *user_fence_rep,
2389 struct vmw_fence_obj *fence,
2390 uint32_t fence_handle)
2391{
2392 struct drm_vmw_fence_rep fence_rep;
2393
2394 if (user_fence_rep == NULL)
2395 return;
2396
Dan Carpenter80d9b242011-10-18 09:10:12 +03002397 memset(&fence_rep, 0, sizeof(fence_rep));
2398
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002399 fence_rep.error = ret;
2400 if (ret == 0) {
2401 BUG_ON(fence == NULL);
2402
2403 fence_rep.handle = fence_handle;
Maarten Lankhorst2298e802014-03-26 14:07:44 +01002404 fence_rep.seqno = fence->base.seqno;
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002405 vmw_update_seqno(dev_priv, &dev_priv->fifo);
2406 fence_rep.passed_seqno = dev_priv->last_read_seqno;
2407 }
2408
2409 /*
2410 * copy_to_user errors will be detected by user space not
2411 * seeing fence_rep::error filled in. Typically
2412 * user-space would have pre-set that member to -EFAULT.
2413 */
2414 ret = copy_to_user(user_fence_rep, &fence_rep,
2415 sizeof(fence_rep));
2416
2417 /*
2418 * User-space lost the fence object. We need to sync
2419 * and unreference the handle.
2420 */
2421 if (unlikely(ret != 0) && (fence_rep.error == 0)) {
2422 ttm_ref_object_base_unref(vmw_fp->tfile,
2423 fence_handle, TTM_REF_USAGE);
2424 DRM_ERROR("Fence copy error. Syncing.\n");
Maarten Lankhorstc060a4e2014-03-26 13:06:24 +01002425 (void) vmw_fence_obj_wait(fence, false, false,
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002426 VMW_FENCE_WAIT_TIMEOUT);
2427 }
2428}
2429
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002430/**
2431 * vmw_execbuf_submit_fifo - Patch a command batch and submit it using
2432 * the fifo.
2433 *
2434 * @dev_priv: Pointer to a device private structure.
2435 * @kernel_commands: Pointer to the unpatched command batch.
2436 * @command_size: Size of the unpatched command batch.
2437 * @sw_context: Structure holding the relocation lists.
2438 *
2439 * Side effects: If this function returns 0, then the command batch
2440 * pointed to by @kernel_commands will have been modified.
2441 */
2442static int vmw_execbuf_submit_fifo(struct vmw_private *dev_priv,
2443 void *kernel_commands,
2444 u32 command_size,
2445 struct vmw_sw_context *sw_context)
2446{
2447 void *cmd = vmw_fifo_reserve(dev_priv, command_size);
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002448
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002449 if (!cmd) {
2450 DRM_ERROR("Failed reserving fifo space for commands.\n");
2451 return -ENOMEM;
2452 }
2453
2454 vmw_apply_relocations(sw_context);
2455 memcpy(cmd, kernel_commands, command_size);
2456 vmw_resource_relocations_apply(cmd, &sw_context->res_relocations);
2457 vmw_resource_relocations_free(&sw_context->res_relocations);
2458 vmw_fifo_commit(dev_priv, command_size);
2459
2460 return 0;
2461}
2462
2463/**
2464 * vmw_execbuf_submit_cmdbuf - Patch a command batch and submit it using
2465 * the command buffer manager.
2466 *
2467 * @dev_priv: Pointer to a device private structure.
2468 * @header: Opaque handle to the command buffer allocation.
2469 * @command_size: Size of the unpatched command batch.
2470 * @sw_context: Structure holding the relocation lists.
2471 *
2472 * Side effects: If this function returns 0, then the command buffer
2473 * represented by @header will have been modified.
2474 */
2475static int vmw_execbuf_submit_cmdbuf(struct vmw_private *dev_priv,
2476 struct vmw_cmdbuf_header *header,
2477 u32 command_size,
2478 struct vmw_sw_context *sw_context)
2479{
2480 void *cmd = vmw_cmdbuf_reserve(dev_priv->cman, command_size,
2481 SVGA3D_INVALID_ID, false, header);
2482
2483 vmw_apply_relocations(sw_context);
2484 vmw_resource_relocations_apply(cmd, &sw_context->res_relocations);
2485 vmw_resource_relocations_free(&sw_context->res_relocations);
2486 vmw_cmdbuf_commit(dev_priv->cman, command_size, header, false);
2487
2488 return 0;
2489}
2490
2491/**
2492 * vmw_execbuf_cmdbuf - Prepare, if possible, a user-space command batch for
2493 * submission using a command buffer.
2494 *
2495 * @dev_priv: Pointer to a device private structure.
2496 * @user_commands: User-space pointer to the commands to be submitted.
2497 * @command_size: Size of the unpatched command batch.
2498 * @header: Out parameter returning the opaque pointer to the command buffer.
2499 *
2500 * This function checks whether we can use the command buffer manager for
2501 * submission and if so, creates a command buffer of suitable size and
2502 * copies the user data into that buffer.
2503 *
2504 * On successful return, the function returns a pointer to the data in the
2505 * command buffer and *@header is set to non-NULL.
2506 * If command buffers could not be used, the function will return the value
2507 * of @kernel_commands on function call. That value may be NULL. In that case,
2508 * the value of *@header will be set to NULL.
2509 * If an error is encountered, the function will return a pointer error value.
2510 * If the function is interrupted by a signal while sleeping, it will return
2511 * -ERESTARTSYS casted to a pointer error value.
2512 */
2513void *vmw_execbuf_cmdbuf(struct vmw_private *dev_priv,
2514 void __user *user_commands,
2515 void *kernel_commands,
2516 u32 command_size,
2517 struct vmw_cmdbuf_header **header)
2518{
2519 size_t cmdbuf_size;
2520 int ret;
2521
2522 *header = NULL;
2523 if (!dev_priv->cman || kernel_commands)
2524 return kernel_commands;
2525
2526 if (command_size > SVGA_CB_MAX_SIZE) {
2527 DRM_ERROR("Command buffer is too large.\n");
2528 return ERR_PTR(-EINVAL);
2529 }
2530
2531 /* If possible, add a little space for fencing. */
2532 cmdbuf_size = command_size + 512;
2533 cmdbuf_size = min_t(size_t, cmdbuf_size, SVGA_CB_MAX_SIZE);
2534 kernel_commands = vmw_cmdbuf_alloc(dev_priv->cman, cmdbuf_size,
2535 true, header);
2536 if (IS_ERR(kernel_commands))
2537 return kernel_commands;
2538
2539 ret = copy_from_user(kernel_commands, user_commands,
2540 command_size);
2541 if (ret) {
2542 DRM_ERROR("Failed copying commands.\n");
2543 vmw_cmdbuf_header_free(*header);
2544 *header = NULL;
2545 return ERR_PTR(-EFAULT);
2546 }
2547
2548 return kernel_commands;
2549}
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002550
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002551int vmw_execbuf_process(struct drm_file *file_priv,
2552 struct vmw_private *dev_priv,
2553 void __user *user_commands,
2554 void *kernel_commands,
2555 uint32_t command_size,
2556 uint64_t throttle_us,
Thomas Hellstromc9146cd2015-03-02 23:45:04 -08002557 uint32_t quirks,
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002558 struct drm_vmw_fence_rep __user *user_fence_rep,
2559 struct vmw_fence_obj **out_fence)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002560{
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002561 struct vmw_sw_context *sw_context = &dev_priv->ctx;
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002562 struct vmw_fence_obj *fence = NULL;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002563 struct vmw_resource *error_resource;
2564 struct list_head resource_list;
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002565 struct vmw_cmdbuf_header *header;
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002566 struct ww_acquire_ctx ticket;
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002567 uint32_t handle;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002568 int ret;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002569
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002570 if (throttle_us) {
2571 ret = vmw_wait_lag(dev_priv, &dev_priv->fifo.marker_queue,
2572 throttle_us);
2573
2574 if (ret)
2575 return ret;
2576 }
2577
2578 kernel_commands = vmw_execbuf_cmdbuf(dev_priv, user_commands,
2579 kernel_commands, command_size,
2580 &header);
2581 if (IS_ERR(kernel_commands))
2582 return PTR_ERR(kernel_commands);
2583
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002584 ret = mutex_lock_interruptible(&dev_priv->cmdbuf_mutex);
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002585 if (ret) {
2586 ret = -ERESTARTSYS;
2587 goto out_free_header;
2588 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002589
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002590 sw_context->kernel = false;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002591 if (kernel_commands == NULL) {
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002592 ret = vmw_resize_cmd_bounce(sw_context, command_size);
2593 if (unlikely(ret != 0))
2594 goto out_unlock;
2595
2596
2597 ret = copy_from_user(sw_context->cmd_bounce,
2598 user_commands, command_size);
2599
2600 if (unlikely(ret != 0)) {
2601 ret = -EFAULT;
2602 DRM_ERROR("Failed copying commands.\n");
2603 goto out_unlock;
2604 }
2605 kernel_commands = sw_context->cmd_bounce;
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002606 } else if (!header)
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002607 sw_context->kernel = true;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002608
Thomas Hellstromd5bde952014-01-31 10:12:10 +01002609 sw_context->fp = vmw_fpriv(file_priv);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002610 sw_context->cur_reloc = 0;
2611 sw_context->cur_val_buf = 0;
Thomas Hellstromc9146cd2015-03-02 23:45:04 -08002612 sw_context->quirks = quirks;
Thomas Hellstromf18c8842011-10-04 20:13:31 +02002613 INIT_LIST_HEAD(&sw_context->resource_list);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002614 sw_context->cur_query_bo = dev_priv->pinned_bo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002615 sw_context->last_query_ctx = NULL;
2616 sw_context->needs_post_query_barrier = false;
2617 memset(sw_context->res_cache, 0, sizeof(sw_context->res_cache));
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002618 INIT_LIST_HEAD(&sw_context->validate_nodes);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002619 INIT_LIST_HEAD(&sw_context->res_relocations);
2620 if (!sw_context->res_ht_initialized) {
2621 ret = drm_ht_create(&sw_context->res_ht, VMW_RES_HT_ORDER);
2622 if (unlikely(ret != 0))
2623 goto out_unlock;
2624 sw_context->res_ht_initialized = true;
2625 }
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002626 INIT_LIST_HEAD(&sw_context->staged_cmd_res);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002627 INIT_LIST_HEAD(&resource_list);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002628 ret = vmw_cmd_check_all(dev_priv, sw_context, kernel_commands,
2629 command_size);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002630 if (unlikely(ret != 0))
Thomas Hellstromcf5e3412014-01-30 10:58:19 +01002631 goto out_err_nores;
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002632
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002633 ret = vmw_resources_reserve(sw_context);
2634 if (unlikely(ret != 0))
Thomas Hellstromcf5e3412014-01-30 10:58:19 +01002635 goto out_err_nores;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002636
Christian Königaa350712014-12-03 15:46:48 +01002637 ret = ttm_eu_reserve_buffers(&ticket, &sw_context->validate_nodes,
2638 true, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002639 if (unlikely(ret != 0))
2640 goto out_err;
2641
2642 ret = vmw_validate_buffers(dev_priv, sw_context);
2643 if (unlikely(ret != 0))
2644 goto out_err;
2645
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002646 ret = vmw_resources_validate(sw_context);
2647 if (unlikely(ret != 0))
2648 goto out_err;
Thomas Hellstrom1925d452010-05-28 11:21:57 +02002649
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07002650 ret = mutex_lock_interruptible(&dev_priv->binding_mutex);
2651 if (unlikely(ret != 0)) {
2652 ret = -ERESTARTSYS;
2653 goto out_err;
2654 }
2655
Thomas Hellstrom30f82d812014-02-05 08:13:56 +01002656 if (dev_priv->has_mob) {
2657 ret = vmw_rebind_contexts(sw_context);
2658 if (unlikely(ret != 0))
Dan Carpenterb2ad9882014-02-11 19:03:47 +03002659 goto out_unlock_binding;
Thomas Hellstrom30f82d812014-02-05 08:13:56 +01002660 }
2661
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002662 if (!header) {
2663 ret = vmw_execbuf_submit_fifo(dev_priv, kernel_commands,
2664 command_size, sw_context);
2665 } else {
2666 ret = vmw_execbuf_submit_cmdbuf(dev_priv, header, command_size,
2667 sw_context);
2668 header = NULL;
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002669 }
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002670 if (ret)
2671 goto out_unlock_binding;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002672
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002673 vmw_query_bo_switch_commit(dev_priv, sw_context);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002674 ret = vmw_execbuf_fence_commands(file_priv, dev_priv,
2675 &fence,
2676 (user_fence_rep) ? &handle : NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002677 /*
2678 * This error is harmless, because if fence submission fails,
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002679 * vmw_fifo_send_fence will sync. The error will be propagated to
2680 * user-space in @fence_rep
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002681 */
2682
2683 if (ret != 0)
2684 DRM_ERROR("Fence submission error. Syncing.\n");
2685
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002686 vmw_resource_list_unreserve(&sw_context->resource_list, false);
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07002687 mutex_unlock(&dev_priv->binding_mutex);
2688
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002689 ttm_eu_fence_buffer_objects(&ticket, &sw_context->validate_nodes,
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002690 (void *) fence);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002691
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002692 if (unlikely(dev_priv->pinned_bo != NULL &&
2693 !dev_priv->query_cid_valid))
2694 __vmw_execbuf_release_pinned_bo(dev_priv, fence);
2695
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002696 vmw_clear_validations(sw_context);
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002697 vmw_execbuf_copy_fence_user(dev_priv, vmw_fpriv(file_priv), ret,
2698 user_fence_rep, fence, handle);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002699
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002700 /* Don't unreference when handing fence out */
2701 if (unlikely(out_fence != NULL)) {
2702 *out_fence = fence;
2703 fence = NULL;
2704 } else if (likely(fence != NULL)) {
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002705 vmw_fence_obj_unreference(&fence);
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002706 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002707
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002708 list_splice_init(&sw_context->resource_list, &resource_list);
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002709 vmw_cmdbuf_res_commit(&sw_context->staged_cmd_res);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002710 mutex_unlock(&dev_priv->cmdbuf_mutex);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002711
2712 /*
2713 * Unreference resources outside of the cmdbuf_mutex to
2714 * avoid deadlocks in resource destruction paths.
2715 */
2716 vmw_resource_list_unreference(&resource_list);
2717
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002718 return 0;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002719
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07002720out_unlock_binding:
2721 mutex_unlock(&dev_priv->binding_mutex);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002722out_err:
Thomas Hellstromcf5e3412014-01-30 10:58:19 +01002723 ttm_eu_backoff_reservation(&ticket, &sw_context->validate_nodes);
2724out_err_nores:
2725 vmw_resource_list_unreserve(&sw_context->resource_list, true);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002726 vmw_resource_relocations_free(&sw_context->res_relocations);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002727 vmw_free_relocations(sw_context);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002728 vmw_clear_validations(sw_context);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002729 if (unlikely(dev_priv->pinned_bo != NULL &&
2730 !dev_priv->query_cid_valid))
2731 __vmw_execbuf_release_pinned_bo(dev_priv, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002732out_unlock:
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002733 list_splice_init(&sw_context->resource_list, &resource_list);
2734 error_resource = sw_context->error_resource;
2735 sw_context->error_resource = NULL;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002736 vmw_cmdbuf_res_revert(&sw_context->staged_cmd_res);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002737 mutex_unlock(&dev_priv->cmdbuf_mutex);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002738
2739 /*
2740 * Unreference resources outside of the cmdbuf_mutex to
2741 * avoid deadlocks in resource destruction paths.
2742 */
2743 vmw_resource_list_unreference(&resource_list);
2744 if (unlikely(error_resource != NULL))
2745 vmw_resource_unreference(&error_resource);
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002746out_free_header:
2747 if (header)
2748 vmw_cmdbuf_header_free(header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002749
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002750 return ret;
2751}
2752
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002753/**
2754 * vmw_execbuf_unpin_panic - Idle the fifo and unpin the query buffer.
2755 *
2756 * @dev_priv: The device private structure.
2757 *
2758 * This function is called to idle the fifo and unpin the query buffer
2759 * if the normal way to do this hits an error, which should typically be
2760 * extremely rare.
2761 */
2762static void vmw_execbuf_unpin_panic(struct vmw_private *dev_priv)
2763{
2764 DRM_ERROR("Can't unpin query buffer. Trying to recover.\n");
2765
2766 (void) vmw_fallback_wait(dev_priv, false, true, 0, false, 10*HZ);
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002767 vmw_bo_pin_reserved(dev_priv->pinned_bo, false);
2768 if (dev_priv->dummy_query_bo_pinned) {
2769 vmw_bo_pin_reserved(dev_priv->dummy_query_bo, false);
2770 dev_priv->dummy_query_bo_pinned = false;
2771 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002772}
2773
2774
2775/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002776 * __vmw_execbuf_release_pinned_bo - Flush queries and unpin the pinned
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002777 * query bo.
2778 *
2779 * @dev_priv: The device private structure.
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002780 * @fence: If non-NULL should point to a struct vmw_fence_obj issued
2781 * _after_ a query barrier that flushes all queries touching the current
2782 * buffer pointed to by @dev_priv->pinned_bo
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002783 *
2784 * This function should be used to unpin the pinned query bo, or
2785 * as a query barrier when we need to make sure that all queries have
2786 * finished before the next fifo command. (For example on hardware
2787 * context destructions where the hardware may otherwise leak unfinished
2788 * queries).
2789 *
2790 * This function does not return any failure codes, but make attempts
2791 * to do safe unpinning in case of errors.
2792 *
2793 * The function will synchronize on the previous query barrier, and will
2794 * thus not finish until that barrier has executed.
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002795 *
2796 * the @dev_priv->cmdbuf_mutex needs to be held by the current thread
2797 * before calling this function.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002798 */
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002799void __vmw_execbuf_release_pinned_bo(struct vmw_private *dev_priv,
2800 struct vmw_fence_obj *fence)
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002801{
2802 int ret = 0;
2803 struct list_head validate_list;
2804 struct ttm_validate_buffer pinned_val, query_val;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002805 struct vmw_fence_obj *lfence = NULL;
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002806 struct ww_acquire_ctx ticket;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002807
2808 if (dev_priv->pinned_bo == NULL)
2809 goto out_unlock;
2810
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002811 INIT_LIST_HEAD(&validate_list);
2812
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002813 pinned_val.bo = ttm_bo_reference(&dev_priv->pinned_bo->base);
Christian Königae9c0af2014-09-04 20:01:52 +02002814 pinned_val.shared = false;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002815 list_add_tail(&pinned_val.head, &validate_list);
2816
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002817 query_val.bo = ttm_bo_reference(&dev_priv->dummy_query_bo->base);
Christian Königae9c0af2014-09-04 20:01:52 +02002818 query_val.shared = false;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002819 list_add_tail(&query_val.head, &validate_list);
2820
Christian Königaa350712014-12-03 15:46:48 +01002821 ret = ttm_eu_reserve_buffers(&ticket, &validate_list,
2822 false, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002823 if (unlikely(ret != 0)) {
2824 vmw_execbuf_unpin_panic(dev_priv);
2825 goto out_no_reserve;
2826 }
2827
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002828 if (dev_priv->query_cid_valid) {
2829 BUG_ON(fence != NULL);
2830 ret = vmw_fifo_emit_dummy_query(dev_priv, dev_priv->query_cid);
2831 if (unlikely(ret != 0)) {
2832 vmw_execbuf_unpin_panic(dev_priv);
2833 goto out_no_emit;
2834 }
2835 dev_priv->query_cid_valid = false;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002836 }
2837
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002838 vmw_bo_pin_reserved(dev_priv->pinned_bo, false);
2839 if (dev_priv->dummy_query_bo_pinned) {
2840 vmw_bo_pin_reserved(dev_priv->dummy_query_bo, false);
2841 dev_priv->dummy_query_bo_pinned = false;
2842 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002843 if (fence == NULL) {
2844 (void) vmw_execbuf_fence_commands(NULL, dev_priv, &lfence,
2845 NULL);
2846 fence = lfence;
2847 }
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002848 ttm_eu_fence_buffer_objects(&ticket, &validate_list, (void *) fence);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002849 if (lfence != NULL)
2850 vmw_fence_obj_unreference(&lfence);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002851
2852 ttm_bo_unref(&query_val.bo);
2853 ttm_bo_unref(&pinned_val.bo);
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002854 vmw_dmabuf_unreference(&dev_priv->pinned_bo);
2855 DRM_INFO("Dummy query bo pin count: %d\n",
2856 dev_priv->dummy_query_bo->pin_count);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002857
2858out_unlock:
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002859 return;
2860
2861out_no_emit:
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002862 ttm_eu_backoff_reservation(&ticket, &validate_list);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002863out_no_reserve:
2864 ttm_bo_unref(&query_val.bo);
2865 ttm_bo_unref(&pinned_val.bo);
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002866 vmw_dmabuf_unreference(&dev_priv->pinned_bo);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002867}
2868
2869/**
2870 * vmw_execbuf_release_pinned_bo - Flush queries and unpin the pinned
2871 * query bo.
2872 *
2873 * @dev_priv: The device private structure.
2874 *
2875 * This function should be used to unpin the pinned query bo, or
2876 * as a query barrier when we need to make sure that all queries have
2877 * finished before the next fifo command. (For example on hardware
2878 * context destructions where the hardware may otherwise leak unfinished
2879 * queries).
2880 *
2881 * This function does not return any failure codes, but make attempts
2882 * to do safe unpinning in case of errors.
2883 *
2884 * The function will synchronize on the previous query barrier, and will
2885 * thus not finish until that barrier has executed.
2886 */
2887void vmw_execbuf_release_pinned_bo(struct vmw_private *dev_priv)
2888{
2889 mutex_lock(&dev_priv->cmdbuf_mutex);
2890 if (dev_priv->query_cid_valid)
2891 __vmw_execbuf_release_pinned_bo(dev_priv, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002892 mutex_unlock(&dev_priv->cmdbuf_mutex);
2893}
2894
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002895
2896int vmw_execbuf_ioctl(struct drm_device *dev, void *data,
2897 struct drm_file *file_priv)
2898{
2899 struct vmw_private *dev_priv = vmw_priv(dev);
2900 struct drm_vmw_execbuf_arg *arg = (struct drm_vmw_execbuf_arg *)data;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002901 int ret;
2902
2903 /*
2904 * This will allow us to extend the ioctl argument while
2905 * maintaining backwards compatibility:
2906 * We take different code paths depending on the value of
2907 * arg->version.
2908 */
2909
2910 if (unlikely(arg->version != DRM_VMW_EXECBUF_VERSION)) {
2911 DRM_ERROR("Incorrect execbuf version.\n");
2912 DRM_ERROR("You're running outdated experimental "
2913 "vmwgfx user-space drivers.");
2914 return -EINVAL;
2915 }
2916
Thomas Hellstrom294adf72014-02-27 12:34:51 +01002917 ret = ttm_read_lock(&dev_priv->reservation_sem, true);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002918 if (unlikely(ret != 0))
2919 return ret;
2920
2921 ret = vmw_execbuf_process(file_priv, dev_priv,
2922 (void __user *)(unsigned long)arg->commands,
2923 NULL, arg->command_size, arg->throttle_us,
Thomas Hellstromc9146cd2015-03-02 23:45:04 -08002924 0,
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002925 (void __user *)(unsigned long)arg->fence_rep,
2926 NULL);
Thomas Hellstrom5151adb2015-03-09 01:56:21 -07002927 ttm_read_unlock(&dev_priv->reservation_sem);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002928 if (unlikely(ret != 0))
Thomas Hellstrom5151adb2015-03-09 01:56:21 -07002929 return ret;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002930
2931 vmw_kms_cursor_post_execbuf(dev_priv);
2932
Thomas Hellstrom5151adb2015-03-09 01:56:21 -07002933 return 0;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002934}