blob: 64dba53ca54c05c78963e5f873fffc565c8bbb32 [file] [log] [blame]
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001/**************************************************************************
2 *
3 * Copyright © 2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27
28#include "vmwgfx_drv.h"
29#include "vmwgfx_reg.h"
David Howells760285e2012-10-02 18:01:07 +010030#include <drm/ttm/ttm_bo_api.h>
31#include <drm/ttm/ttm_placement.h>
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +000032
Thomas Hellstromc0951b72012-11-20 12:19:35 +000033#define VMW_RES_HT_ORDER 12
34
35/**
36 * struct vmw_resource_relocation - Relocation info for resources
37 *
38 * @head: List head for the software context's relocation list.
39 * @res: Non-ref-counted pointer to the resource.
40 * @offset: Offset of 4 byte entries into the command buffer where the
41 * id that needs fixup is located.
42 */
43struct vmw_resource_relocation {
44 struct list_head head;
45 const struct vmw_resource *res;
46 unsigned long offset;
47};
48
49/**
50 * struct vmw_resource_val_node - Validation info for resources
51 *
52 * @head: List head for the software context's resource list.
53 * @hash: Hash entry for quick resouce to val_node lookup.
54 * @res: Ref-counted pointer to the resource.
55 * @switch_backup: Boolean whether to switch backup buffer on unreserve.
56 * @new_backup: Refcounted pointer to the new backup buffer.
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -070057 * @staged_bindings: If @res is a context, tracks bindings set up during
58 * the command batch. Otherwise NULL.
Thomas Hellstromc0951b72012-11-20 12:19:35 +000059 * @new_backup_offset: New backup buffer offset if @new_backup is non-NUll.
60 * @first_usage: Set to true the first time the resource is referenced in
61 * the command stream.
62 * @no_buffer_needed: Resources do not need to allocate buffer backup on
63 * reservation. The command stream will provide one.
64 */
65struct vmw_resource_val_node {
66 struct list_head head;
67 struct drm_hash_item hash;
68 struct vmw_resource *res;
69 struct vmw_dma_buffer *new_backup;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -070070 struct vmw_ctx_binding_state *staged_bindings;
Thomas Hellstromc0951b72012-11-20 12:19:35 +000071 unsigned long new_backup_offset;
72 bool first_usage;
73 bool no_buffer_needed;
74};
75
76/**
Thomas Hellstromc373d4e2012-11-21 12:22:35 +010077 * struct vmw_cmd_entry - Describe a command for the verifier
78 *
79 * @user_allow: Whether allowed from the execbuf ioctl.
80 * @gb_disable: Whether disabled if guest-backed objects are available.
81 * @gb_enable: Whether enabled iff guest-backed objects are available.
82 */
83struct vmw_cmd_entry {
84 int (*func) (struct vmw_private *, struct vmw_sw_context *,
85 SVGA3dCmdHeader *);
86 bool user_allow;
87 bool gb_disable;
88 bool gb_enable;
89};
90
91#define VMW_CMD_DEF(_cmd, _func, _user_allow, _gb_disable, _gb_enable) \
92 [(_cmd) - SVGA_3D_CMD_BASE] = {(_func), (_user_allow),\
93 (_gb_disable), (_gb_enable)}
94
95/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +000096 * vmw_resource_unreserve - unreserve resources previously reserved for
97 * command submission.
98 *
99 * @list_head: list of resources to unreserve.
100 * @backoff: Whether command submission failed.
101 */
102static void vmw_resource_list_unreserve(struct list_head *list,
103 bool backoff)
104{
105 struct vmw_resource_val_node *val;
106
107 list_for_each_entry(val, list, head) {
108 struct vmw_resource *res = val->res;
109 struct vmw_dma_buffer *new_backup =
110 backoff ? NULL : val->new_backup;
111
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700112 /*
113 * Transfer staged context bindings to the
114 * persistent context binding tracker.
115 */
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700116 if (unlikely(val->staged_bindings)) {
Thomas Hellstrom76c7d182014-01-30 10:46:12 +0100117 if (!backoff) {
118 vmw_context_binding_state_transfer
119 (val->res, val->staged_bindings);
120 }
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700121 kfree(val->staged_bindings);
122 val->staged_bindings = NULL;
123 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000124 vmw_resource_unreserve(res, new_backup,
125 val->new_backup_offset);
126 vmw_dmabuf_unreference(&val->new_backup);
127 }
128}
129
130
131/**
132 * vmw_resource_val_add - Add a resource to the software context's
133 * resource list if it's not already on it.
134 *
135 * @sw_context: Pointer to the software context.
136 * @res: Pointer to the resource.
137 * @p_node On successful return points to a valid pointer to a
138 * struct vmw_resource_val_node, if non-NULL on entry.
139 */
140static int vmw_resource_val_add(struct vmw_sw_context *sw_context,
141 struct vmw_resource *res,
142 struct vmw_resource_val_node **p_node)
143{
144 struct vmw_resource_val_node *node;
145 struct drm_hash_item *hash;
146 int ret;
147
148 if (likely(drm_ht_find_item(&sw_context->res_ht, (unsigned long) res,
149 &hash) == 0)) {
150 node = container_of(hash, struct vmw_resource_val_node, hash);
151 node->first_usage = false;
152 if (unlikely(p_node != NULL))
153 *p_node = node;
154 return 0;
155 }
156
157 node = kzalloc(sizeof(*node), GFP_KERNEL);
158 if (unlikely(node == NULL)) {
159 DRM_ERROR("Failed to allocate a resource validation "
160 "entry.\n");
161 return -ENOMEM;
162 }
163
164 node->hash.key = (unsigned long) res;
165 ret = drm_ht_insert_item(&sw_context->res_ht, &node->hash);
166 if (unlikely(ret != 0)) {
167 DRM_ERROR("Failed to initialize a resource validation "
168 "entry.\n");
169 kfree(node);
170 return ret;
171 }
172 list_add_tail(&node->head, &sw_context->resource_list);
173 node->res = vmw_resource_reference(res);
174 node->first_usage = true;
175
176 if (unlikely(p_node != NULL))
177 *p_node = node;
178
179 return 0;
180}
181
182/**
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100183 * vmw_resource_context_res_add - Put resources previously bound to a context on
184 * the validation list
185 *
186 * @dev_priv: Pointer to a device private structure
187 * @sw_context: Pointer to a software context used for this command submission
188 * @ctx: Pointer to the context resource
189 *
190 * This function puts all resources that were previously bound to @ctx on
191 * the resource validation list. This is part of the context state reemission
192 */
193static int vmw_resource_context_res_add(struct vmw_private *dev_priv,
194 struct vmw_sw_context *sw_context,
195 struct vmw_resource *ctx)
196{
197 struct list_head *binding_list;
198 struct vmw_ctx_binding *entry;
199 int ret = 0;
200 struct vmw_resource *res;
201
202 mutex_lock(&dev_priv->binding_mutex);
203 binding_list = vmw_context_binding_list(ctx);
204
205 list_for_each_entry(entry, binding_list, ctx_list) {
206 res = vmw_resource_reference_unless_doomed(entry->bi.res);
207 if (unlikely(res == NULL))
208 continue;
209
210 ret = vmw_resource_val_add(sw_context, entry->bi.res, NULL);
211 vmw_resource_unreference(&res);
212 if (unlikely(ret != 0))
213 break;
214 }
215
216 mutex_unlock(&dev_priv->binding_mutex);
217 return ret;
218}
219
220/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000221 * vmw_resource_relocation_add - Add a relocation to the relocation list
222 *
223 * @list: Pointer to head of relocation list.
224 * @res: The resource.
225 * @offset: Offset into the command buffer currently being parsed where the
226 * id that needs fixup is located. Granularity is 4 bytes.
227 */
228static int vmw_resource_relocation_add(struct list_head *list,
229 const struct vmw_resource *res,
230 unsigned long offset)
231{
232 struct vmw_resource_relocation *rel;
233
234 rel = kmalloc(sizeof(*rel), GFP_KERNEL);
235 if (unlikely(rel == NULL)) {
236 DRM_ERROR("Failed to allocate a resource relocation.\n");
237 return -ENOMEM;
238 }
239
240 rel->res = res;
241 rel->offset = offset;
242 list_add_tail(&rel->head, list);
243
244 return 0;
245}
246
247/**
248 * vmw_resource_relocations_free - Free all relocations on a list
249 *
250 * @list: Pointer to the head of the relocation list.
251 */
252static void vmw_resource_relocations_free(struct list_head *list)
253{
254 struct vmw_resource_relocation *rel, *n;
255
256 list_for_each_entry_safe(rel, n, list, head) {
257 list_del(&rel->head);
258 kfree(rel);
259 }
260}
261
262/**
263 * vmw_resource_relocations_apply - Apply all relocations on a list
264 *
265 * @cb: Pointer to the start of the command buffer bein patch. This need
266 * not be the same buffer as the one being parsed when the relocation
267 * list was built, but the contents must be the same modulo the
268 * resource ids.
269 * @list: Pointer to the head of the relocation list.
270 */
271static void vmw_resource_relocations_apply(uint32_t *cb,
272 struct list_head *list)
273{
274 struct vmw_resource_relocation *rel;
275
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100276 list_for_each_entry(rel, list, head) {
277 if (likely(rel->res != NULL))
278 cb[rel->offset] = rel->res->id;
279 else
280 cb[rel->offset] = SVGA_3D_CMD_NOP;
281 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000282}
283
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000284static int vmw_cmd_invalid(struct vmw_private *dev_priv,
285 struct vmw_sw_context *sw_context,
286 SVGA3dCmdHeader *header)
287{
288 return capable(CAP_SYS_ADMIN) ? : -EINVAL;
289}
290
291static int vmw_cmd_ok(struct vmw_private *dev_priv,
292 struct vmw_sw_context *sw_context,
293 SVGA3dCmdHeader *header)
294{
295 return 0;
296}
297
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200298/**
299 * vmw_bo_to_validate_list - add a bo to a validate list
300 *
301 * @sw_context: The software context used for this command submission batch.
302 * @bo: The buffer object to add.
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100303 * @validate_as_mob: Validate this buffer as a MOB.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200304 * @p_val_node: If non-NULL Will be updated with the validate node number
305 * on return.
306 *
307 * Returns -EINVAL if the limit of number of buffer objects per command
308 * submission is reached.
309 */
310static int vmw_bo_to_validate_list(struct vmw_sw_context *sw_context,
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700311 struct vmw_dma_buffer *vbo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100312 bool validate_as_mob,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200313 uint32_t *p_val_node)
314{
315 uint32_t val_node;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000316 struct vmw_validate_buffer *vval_buf;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200317 struct ttm_validate_buffer *val_buf;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000318 struct drm_hash_item *hash;
319 int ret;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200320
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700321 if (likely(drm_ht_find_item(&sw_context->res_ht, (unsigned long) vbo,
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000322 &hash) == 0)) {
323 vval_buf = container_of(hash, struct vmw_validate_buffer,
324 hash);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100325 if (unlikely(vval_buf->validate_as_mob != validate_as_mob)) {
326 DRM_ERROR("Inconsistent buffer usage.\n");
327 return -EINVAL;
328 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000329 val_buf = &vval_buf->base;
330 val_node = vval_buf - sw_context->val_bufs;
331 } else {
332 val_node = sw_context->cur_val_buf;
333 if (unlikely(val_node >= VMWGFX_MAX_VALIDATIONS)) {
334 DRM_ERROR("Max number of DMA buffers per submission "
335 "exceeded.\n");
336 return -EINVAL;
337 }
338 vval_buf = &sw_context->val_bufs[val_node];
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700339 vval_buf->hash.key = (unsigned long) vbo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000340 ret = drm_ht_insert_item(&sw_context->res_ht, &vval_buf->hash);
341 if (unlikely(ret != 0)) {
342 DRM_ERROR("Failed to initialize a buffer validation "
343 "entry.\n");
344 return ret;
345 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200346 ++sw_context->cur_val_buf;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000347 val_buf = &vval_buf->base;
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700348 val_buf->bo = ttm_bo_reference(&vbo->base);
Christian Königae9c0af2014-09-04 20:01:52 +0200349 val_buf->shared = false;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000350 list_add_tail(&val_buf->head, &sw_context->validate_nodes);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100351 vval_buf->validate_as_mob = validate_as_mob;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200352 }
353
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200354 if (p_val_node)
355 *p_val_node = val_node;
356
357 return 0;
358}
359
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000360/**
361 * vmw_resources_reserve - Reserve all resources on the sw_context's
362 * resource list.
363 *
364 * @sw_context: Pointer to the software context.
365 *
366 * Note that since vmware's command submission currently is protected by
367 * the cmdbuf mutex, no fancy deadlock avoidance is required for resources,
368 * since only a single thread at once will attempt this.
369 */
370static int vmw_resources_reserve(struct vmw_sw_context *sw_context)
371{
372 struct vmw_resource_val_node *val;
373 int ret;
374
375 list_for_each_entry(val, &sw_context->resource_list, head) {
376 struct vmw_resource *res = val->res;
377
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -0700378 ret = vmw_resource_reserve(res, true, val->no_buffer_needed);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000379 if (unlikely(ret != 0))
380 return ret;
381
382 if (res->backup) {
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700383 struct vmw_dma_buffer *vbo = res->backup;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000384
385 ret = vmw_bo_to_validate_list
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700386 (sw_context, vbo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100387 vmw_resource_needs_backup(res), NULL);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000388
389 if (unlikely(ret != 0))
390 return ret;
391 }
392 }
393 return 0;
394}
395
396/**
397 * vmw_resources_validate - Validate all resources on the sw_context's
398 * resource list.
399 *
400 * @sw_context: Pointer to the software context.
401 *
402 * Before this function is called, all resource backup buffers must have
403 * been validated.
404 */
405static int vmw_resources_validate(struct vmw_sw_context *sw_context)
406{
407 struct vmw_resource_val_node *val;
408 int ret;
409
410 list_for_each_entry(val, &sw_context->resource_list, head) {
411 struct vmw_resource *res = val->res;
412
413 ret = vmw_resource_validate(res);
414 if (unlikely(ret != 0)) {
415 if (ret != -ERESTARTSYS)
416 DRM_ERROR("Failed to validate resource.\n");
417 return ret;
418 }
419 }
420 return 0;
421}
422
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200423
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000424/**
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200425 * vmw_cmd_res_reloc_add - Add a resource to a software context's
426 * relocation- and validation lists.
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000427 *
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200428 * @dev_priv: Pointer to a struct vmw_private identifying the device.
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000429 * @sw_context: Pointer to the software context.
430 * @res_type: Resource type.
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200431 * @id_loc: Pointer to where the id that needs translation is located.
432 * @res: Valid pointer to a struct vmw_resource.
433 * @p_val: If non null, a pointer to the struct vmw_resource_validate_node
434 * used for this resource is returned here.
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000435 */
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200436static int vmw_cmd_res_reloc_add(struct vmw_private *dev_priv,
437 struct vmw_sw_context *sw_context,
438 enum vmw_res_type res_type,
439 uint32_t *id_loc,
440 struct vmw_resource *res,
441 struct vmw_resource_val_node **p_val)
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000442{
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000443 int ret;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200444 struct vmw_resource_val_node *node;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000445
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200446 *p_val = NULL;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000447 ret = vmw_resource_relocation_add(&sw_context->res_relocations,
448 res,
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100449 id_loc - sw_context->buf_start);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000450 if (unlikely(ret != 0))
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200451 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000452
453 ret = vmw_resource_val_add(sw_context, res, &node);
454 if (unlikely(ret != 0))
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200455 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000456
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200457 if (res_type == vmw_res_context && dev_priv->has_mob &&
458 node->first_usage) {
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700459
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200460 /*
461 * Put contexts first on the list to be able to exit
462 * list traversal for contexts early.
463 */
464 list_del(&node->head);
465 list_add(&node->head, &sw_context->resource_list);
466
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100467 ret = vmw_resource_context_res_add(dev_priv, sw_context, res);
468 if (unlikely(ret != 0))
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200469 return ret;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700470 node->staged_bindings =
471 kzalloc(sizeof(*node->staged_bindings), GFP_KERNEL);
472 if (node->staged_bindings == NULL) {
473 DRM_ERROR("Failed to allocate context binding "
474 "information.\n");
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200475 return -ENOMEM;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700476 }
477 INIT_LIST_HEAD(&node->staged_bindings->list);
478 }
479
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200480 if (p_val)
481 *p_val = node;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000482
Thomas Hellstrom9f9cb842014-08-28 11:35:25 +0200483 return 0;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000484}
485
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200486
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000487/**
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100488 * vmw_cmd_res_check - Check that a resource is present and if so, put it
489 * on the resource validate list unless it's already there.
490 *
491 * @dev_priv: Pointer to a device private structure.
492 * @sw_context: Pointer to the software context.
493 * @res_type: Resource type.
494 * @converter: User-space visisble type specific information.
495 * @id_loc: Pointer to the location in the command buffer currently being
496 * parsed from where the user-space resource id handle is located.
497 * @p_val: Pointer to pointer to resource validalidation node. Populated
498 * on exit.
499 */
500static int
501vmw_cmd_res_check(struct vmw_private *dev_priv,
502 struct vmw_sw_context *sw_context,
503 enum vmw_res_type res_type,
504 const struct vmw_user_resource_conv *converter,
505 uint32_t *id_loc,
506 struct vmw_resource_val_node **p_val)
507{
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200508 struct vmw_res_cache_entry *rcache =
509 &sw_context->res_cache[res_type];
510 struct vmw_resource *res;
511 struct vmw_resource_val_node *node;
512 int ret;
513
514 if (*id_loc == SVGA3D_INVALID_ID) {
515 if (p_val)
516 *p_val = NULL;
517 if (res_type == vmw_res_context) {
518 DRM_ERROR("Illegal context invalid id.\n");
519 return -EINVAL;
520 }
521 return 0;
522 }
523
524 /*
525 * Fastpath in case of repeated commands referencing the same
526 * resource
527 */
528
529 if (likely(rcache->valid && *id_loc == rcache->handle)) {
530 const struct vmw_resource *res = rcache->res;
531
532 rcache->node->first_usage = false;
533 if (p_val)
534 *p_val = rcache->node;
535
536 return vmw_resource_relocation_add
537 (&sw_context->res_relocations, res,
538 id_loc - sw_context->buf_start);
539 }
540
541 ret = vmw_user_resource_lookup_handle(dev_priv,
542 sw_context->fp->tfile,
543 *id_loc,
544 converter,
545 &res);
546 if (unlikely(ret != 0)) {
547 DRM_ERROR("Could not find or use resource 0x%08x.\n",
548 (unsigned) *id_loc);
549 dump_stack();
550 return ret;
551 }
552
553 rcache->valid = true;
554 rcache->res = res;
555 rcache->handle = *id_loc;
556
557 ret = vmw_cmd_res_reloc_add(dev_priv, sw_context, res_type, id_loc,
558 res, &node);
559 if (unlikely(ret != 0))
560 goto out_no_reloc;
561
562 rcache->node = node;
563 if (p_val)
564 *p_val = node;
565 vmw_resource_unreference(&res);
566 return 0;
567
568out_no_reloc:
569 BUG_ON(sw_context->error_resource != NULL);
570 sw_context->error_resource = res;
571
572 return ret;
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100573}
574
575/**
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100576 * vmw_rebind_contexts - Rebind all resources previously bound to
577 * referenced contexts.
578 *
579 * @sw_context: Pointer to the software context.
580 *
581 * Rebind context binding points that have been scrubbed because of eviction.
582 */
583static int vmw_rebind_contexts(struct vmw_sw_context *sw_context)
584{
585 struct vmw_resource_val_node *val;
586 int ret;
587
588 list_for_each_entry(val, &sw_context->resource_list, head) {
Thomas Hellstrom18e4a462014-06-09 12:39:22 +0200589 if (unlikely(!val->staged_bindings))
590 break;
Thomas Hellstrom30f82d812014-02-05 08:13:56 +0100591
592 ret = vmw_context_rebind_all(val->res);
593 if (unlikely(ret != 0)) {
594 if (ret != -ERESTARTSYS)
595 DRM_ERROR("Failed to rebind context.\n");
596 return ret;
597 }
598 }
599
600 return 0;
601}
602
603/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000604 * vmw_cmd_cid_check - Check a command header for valid context information.
605 *
606 * @dev_priv: Pointer to a device private structure.
607 * @sw_context: Pointer to the software context.
608 * @header: A command header with an embedded user-space context handle.
609 *
610 * Convenience function: Call vmw_cmd_res_check with the user-space context
611 * handle embedded in @header.
612 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000613static int vmw_cmd_cid_check(struct vmw_private *dev_priv,
614 struct vmw_sw_context *sw_context,
615 SVGA3dCmdHeader *header)
616{
617 struct vmw_cid_cmd {
618 SVGA3dCmdHeader header;
Thomas Hellstrom8e67bbb2014-02-06 12:35:05 +0100619 uint32_t cid;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000620 } *cmd;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000621
622 cmd = container_of(header, struct vmw_cid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000623 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
624 user_context_converter, &cmd->cid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000625}
626
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000627static int vmw_cmd_set_render_target_check(struct vmw_private *dev_priv,
628 struct vmw_sw_context *sw_context,
629 SVGA3dCmdHeader *header)
630{
631 struct vmw_sid_cmd {
632 SVGA3dCmdHeader header;
633 SVGA3dCmdSetRenderTarget body;
634 } *cmd;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700635 struct vmw_resource_val_node *ctx_node;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700636 struct vmw_resource_val_node *res_node;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000637 int ret;
638
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700639 cmd = container_of(header, struct vmw_sid_cmd, header);
640
641 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
642 user_context_converter, &cmd->body.cid,
643 &ctx_node);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000644 if (unlikely(ret != 0))
645 return ret;
646
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000647 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
648 user_surface_converter,
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700649 &cmd->body.target.sid, &res_node);
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700650 if (unlikely(ret != 0))
651 return ret;
652
653 if (dev_priv->has_mob) {
654 struct vmw_ctx_bindinfo bi;
655
656 bi.ctx = ctx_node->res;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -0700657 bi.res = res_node ? res_node->res : NULL;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -0700658 bi.bt = vmw_ctx_binding_rt;
659 bi.i1.rt_type = cmd->body.type;
660 return vmw_context_binding_add(ctx_node->staged_bindings, &bi);
661 }
662
663 return 0;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000664}
665
666static int vmw_cmd_surface_copy_check(struct vmw_private *dev_priv,
667 struct vmw_sw_context *sw_context,
668 SVGA3dCmdHeader *header)
669{
670 struct vmw_sid_cmd {
671 SVGA3dCmdHeader header;
672 SVGA3dCmdSurfaceCopy body;
673 } *cmd;
674 int ret;
675
676 cmd = container_of(header, struct vmw_sid_cmd, header);
Thomas Hellstromc9146cd2015-03-02 23:45:04 -0800677
Thomas Hellstrom6bf6bf02015-06-26 02:22:40 -0700678 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
679 user_surface_converter,
680 &cmd->body.src.sid, NULL);
681 if (ret)
682 return ret;
Thomas Hellstromc9146cd2015-03-02 23:45:04 -0800683
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000684 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
685 user_surface_converter,
686 &cmd->body.dest.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000687}
688
689static int vmw_cmd_stretch_blt_check(struct vmw_private *dev_priv,
690 struct vmw_sw_context *sw_context,
691 SVGA3dCmdHeader *header)
692{
693 struct vmw_sid_cmd {
694 SVGA3dCmdHeader header;
695 SVGA3dCmdSurfaceStretchBlt body;
696 } *cmd;
697 int ret;
698
699 cmd = container_of(header, struct vmw_sid_cmd, header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000700 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
701 user_surface_converter,
702 &cmd->body.src.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000703 if (unlikely(ret != 0))
704 return ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000705 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
706 user_surface_converter,
707 &cmd->body.dest.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000708}
709
710static int vmw_cmd_blt_surf_screen_check(struct vmw_private *dev_priv,
711 struct vmw_sw_context *sw_context,
712 SVGA3dCmdHeader *header)
713{
714 struct vmw_sid_cmd {
715 SVGA3dCmdHeader header;
716 SVGA3dCmdBlitSurfaceToScreen body;
717 } *cmd;
718
719 cmd = container_of(header, struct vmw_sid_cmd, header);
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +0200720
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000721 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
722 user_surface_converter,
723 &cmd->body.srcImage.sid, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000724}
725
726static int vmw_cmd_present_check(struct vmw_private *dev_priv,
727 struct vmw_sw_context *sw_context,
728 SVGA3dCmdHeader *header)
729{
730 struct vmw_sid_cmd {
731 SVGA3dCmdHeader header;
732 SVGA3dCmdPresent body;
733 } *cmd;
734
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +0200735
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000736 cmd = container_of(header, struct vmw_sid_cmd, header);
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +0200737
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000738 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
739 user_surface_converter, &cmd->body.sid,
740 NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000741}
742
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200743/**
744 * vmw_query_bo_switch_prepare - Prepare to switch pinned buffer for queries.
745 *
746 * @dev_priv: The device private structure.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200747 * @new_query_bo: The new buffer holding query results.
748 * @sw_context: The software context used for this command submission.
749 *
750 * This function checks whether @new_query_bo is suitable for holding
751 * query results, and if another buffer currently is pinned for query
752 * results. If so, the function prepares the state of @sw_context for
753 * switching pinned buffers after successful submission of the current
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000754 * command batch.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200755 */
756static int vmw_query_bo_switch_prepare(struct vmw_private *dev_priv,
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700757 struct vmw_dma_buffer *new_query_bo,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200758 struct vmw_sw_context *sw_context)
759{
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000760 struct vmw_res_cache_entry *ctx_entry =
761 &sw_context->res_cache[vmw_res_context];
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200762 int ret;
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000763
764 BUG_ON(!ctx_entry->valid);
765 sw_context->last_query_ctx = ctx_entry->res;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200766
767 if (unlikely(new_query_bo != sw_context->cur_query_bo)) {
768
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700769 if (unlikely(new_query_bo->base.num_pages > 4)) {
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200770 DRM_ERROR("Query buffer too large.\n");
771 return -EINVAL;
772 }
773
774 if (unlikely(sw_context->cur_query_bo != NULL)) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000775 sw_context->needs_post_query_barrier = true;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200776 ret = vmw_bo_to_validate_list(sw_context,
777 sw_context->cur_query_bo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100778 dev_priv->has_mob, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200779 if (unlikely(ret != 0))
780 return ret;
781 }
782 sw_context->cur_query_bo = new_query_bo;
783
784 ret = vmw_bo_to_validate_list(sw_context,
785 dev_priv->dummy_query_bo,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +0100786 dev_priv->has_mob, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200787 if (unlikely(ret != 0))
788 return ret;
789
790 }
791
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200792 return 0;
793}
794
795
796/**
797 * vmw_query_bo_switch_commit - Finalize switching pinned query buffer
798 *
799 * @dev_priv: The device private structure.
800 * @sw_context: The software context used for this command submission batch.
801 *
802 * This function will check if we're switching query buffers, and will then,
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200803 * issue a dummy occlusion query wait used as a query barrier. When the fence
804 * object following that query wait has signaled, we are sure that all
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000805 * preceding queries have finished, and the old query buffer can be unpinned.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200806 * However, since both the new query buffer and the old one are fenced with
807 * that fence, we can do an asynchronus unpin now, and be sure that the
808 * old query buffer won't be moved until the fence has signaled.
809 *
810 * As mentioned above, both the new - and old query buffers need to be fenced
811 * using a sequence emitted *after* calling this function.
812 */
813static void vmw_query_bo_switch_commit(struct vmw_private *dev_priv,
814 struct vmw_sw_context *sw_context)
815{
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200816 /*
817 * The validate list should still hold references to all
818 * contexts here.
819 */
820
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000821 if (sw_context->needs_post_query_barrier) {
822 struct vmw_res_cache_entry *ctx_entry =
823 &sw_context->res_cache[vmw_res_context];
824 struct vmw_resource *ctx;
825 int ret;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200826
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000827 BUG_ON(!ctx_entry->valid);
828 ctx = ctx_entry->res;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200829
830 ret = vmw_fifo_emit_dummy_query(dev_priv, ctx->id);
831
832 if (unlikely(ret != 0))
833 DRM_ERROR("Out of fifo space for dummy query.\n");
834 }
835
836 if (dev_priv->pinned_bo != sw_context->cur_query_bo) {
837 if (dev_priv->pinned_bo) {
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700838 vmw_bo_pin_reserved(dev_priv->pinned_bo, false);
839 vmw_dmabuf_unreference(&dev_priv->pinned_bo);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200840 }
841
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000842 if (!sw_context->needs_post_query_barrier) {
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700843 vmw_bo_pin_reserved(sw_context->cur_query_bo, true);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200844
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000845 /*
846 * We pin also the dummy_query_bo buffer so that we
847 * don't need to validate it when emitting
848 * dummy queries in context destroy paths.
849 */
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200850
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700851 if (!dev_priv->dummy_query_bo_pinned) {
852 vmw_bo_pin_reserved(dev_priv->dummy_query_bo,
853 true);
854 dev_priv->dummy_query_bo_pinned = true;
855 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200856
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000857 BUG_ON(sw_context->last_query_ctx == NULL);
858 dev_priv->query_cid = sw_context->last_query_ctx->id;
859 dev_priv->query_cid_valid = true;
860 dev_priv->pinned_bo =
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700861 vmw_dmabuf_reference(sw_context->cur_query_bo);
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000862 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200863 }
864}
865
866/**
Thomas Hellstromddcda242012-11-21 11:26:55 +0100867 * vmw_translate_mob_pointer - Prepare to translate a user-space buffer
868 * handle to a MOB id.
869 *
870 * @dev_priv: Pointer to a device private structure.
871 * @sw_context: The software context used for this command batch validation.
872 * @id: Pointer to the user-space handle to be translated.
873 * @vmw_bo_p: Points to a location that, on successful return will carry
874 * a reference-counted pointer to the DMA buffer identified by the
875 * user-space handle in @id.
876 *
877 * This function saves information needed to translate a user-space buffer
878 * handle to a MOB id. The translation does not take place immediately, but
879 * during a call to vmw_apply_relocations(). This function builds a relocation
880 * list and a list of buffers to validate. The former needs to be freed using
881 * either vmw_apply_relocations() or vmw_free_relocations(). The latter
882 * needs to be freed using vmw_clear_validations.
883 */
884static int vmw_translate_mob_ptr(struct vmw_private *dev_priv,
885 struct vmw_sw_context *sw_context,
886 SVGAMobId *id,
887 struct vmw_dma_buffer **vmw_bo_p)
888{
889 struct vmw_dma_buffer *vmw_bo = NULL;
Thomas Hellstromddcda242012-11-21 11:26:55 +0100890 uint32_t handle = *id;
891 struct vmw_relocation *reloc;
892 int ret;
893
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100894 ret = vmw_user_dmabuf_lookup(sw_context->fp->tfile, handle, &vmw_bo);
Thomas Hellstromddcda242012-11-21 11:26:55 +0100895 if (unlikely(ret != 0)) {
896 DRM_ERROR("Could not find or use MOB buffer.\n");
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000897 ret = -EINVAL;
898 goto out_no_reloc;
Thomas Hellstromddcda242012-11-21 11:26:55 +0100899 }
Thomas Hellstromddcda242012-11-21 11:26:55 +0100900
901 if (unlikely(sw_context->cur_reloc >= VMWGFX_MAX_RELOCATIONS)) {
902 DRM_ERROR("Max number relocations per submission"
903 " exceeded\n");
904 ret = -EINVAL;
905 goto out_no_reloc;
906 }
907
908 reloc = &sw_context->relocs[sw_context->cur_reloc++];
909 reloc->mob_loc = id;
910 reloc->location = NULL;
911
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700912 ret = vmw_bo_to_validate_list(sw_context, vmw_bo, true, &reloc->index);
Thomas Hellstromddcda242012-11-21 11:26:55 +0100913 if (unlikely(ret != 0))
914 goto out_no_reloc;
915
916 *vmw_bo_p = vmw_bo;
917 return 0;
918
919out_no_reloc:
920 vmw_dmabuf_unreference(&vmw_bo);
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000921 *vmw_bo_p = NULL;
Thomas Hellstromddcda242012-11-21 11:26:55 +0100922 return ret;
923}
924
925/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000926 * vmw_translate_guest_pointer - Prepare to translate a user-space buffer
927 * handle to a valid SVGAGuestPtr
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200928 *
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000929 * @dev_priv: Pointer to a device private structure.
930 * @sw_context: The software context used for this command batch validation.
931 * @ptr: Pointer to the user-space handle to be translated.
932 * @vmw_bo_p: Points to a location that, on successful return will carry
933 * a reference-counted pointer to the DMA buffer identified by the
934 * user-space handle in @id.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200935 *
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000936 * This function saves information needed to translate a user-space buffer
937 * handle to a valid SVGAGuestPtr. The translation does not take place
938 * immediately, but during a call to vmw_apply_relocations().
939 * This function builds a relocation list and a list of buffers to validate.
940 * The former needs to be freed using either vmw_apply_relocations() or
941 * vmw_free_relocations(). The latter needs to be freed using
942 * vmw_clear_validations.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200943 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000944static int vmw_translate_guest_ptr(struct vmw_private *dev_priv,
945 struct vmw_sw_context *sw_context,
946 SVGAGuestPtr *ptr,
947 struct vmw_dma_buffer **vmw_bo_p)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000948{
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000949 struct vmw_dma_buffer *vmw_bo = NULL;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000950 uint32_t handle = ptr->gmrId;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000951 struct vmw_relocation *reloc;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000952 int ret;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000953
Thomas Hellstromd5bde952014-01-31 10:12:10 +0100954 ret = vmw_user_dmabuf_lookup(sw_context->fp->tfile, handle, &vmw_bo);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000955 if (unlikely(ret != 0)) {
956 DRM_ERROR("Could not find or use GMR region.\n");
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000957 ret = -EINVAL;
958 goto out_no_reloc;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000959 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000960
961 if (unlikely(sw_context->cur_reloc >= VMWGFX_MAX_RELOCATIONS)) {
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000962 DRM_ERROR("Max number relocations per submission"
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000963 " exceeded\n");
964 ret = -EINVAL;
965 goto out_no_reloc;
966 }
967
968 reloc = &sw_context->relocs[sw_context->cur_reloc++];
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000969 reloc->location = ptr;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000970
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -0700971 ret = vmw_bo_to_validate_list(sw_context, vmw_bo, false, &reloc->index);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +0200972 if (unlikely(ret != 0))
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000973 goto out_no_reloc;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000974
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000975 *vmw_bo_p = vmw_bo;
976 return 0;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +0000977
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000978out_no_reloc:
979 vmw_dmabuf_unreference(&vmw_bo);
Colin Ian Kingda5efff2015-01-22 15:17:07 +0000980 *vmw_bo_p = NULL;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +0000981 return ret;
982}
983
Thomas Hellstromc0951b72012-11-20 12:19:35 +0000984/**
Thomas Hellstromddcda242012-11-21 11:26:55 +0100985 * vmw_cmd_begin_gb_query - validate a SVGA_3D_CMD_BEGIN_GB_QUERY command.
986 *
987 * @dev_priv: Pointer to a device private struct.
988 * @sw_context: The software context used for this command submission.
989 * @header: Pointer to the command header in the command stream.
990 */
991static int vmw_cmd_begin_gb_query(struct vmw_private *dev_priv,
992 struct vmw_sw_context *sw_context,
993 SVGA3dCmdHeader *header)
994{
995 struct vmw_begin_gb_query_cmd {
996 SVGA3dCmdHeader header;
997 SVGA3dCmdBeginGBQuery q;
998 } *cmd;
999
1000 cmd = container_of(header, struct vmw_begin_gb_query_cmd,
1001 header);
1002
1003 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1004 user_context_converter, &cmd->q.cid,
1005 NULL);
1006}
1007
1008/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001009 * vmw_cmd_begin_query - validate a SVGA_3D_CMD_BEGIN_QUERY command.
1010 *
1011 * @dev_priv: Pointer to a device private struct.
1012 * @sw_context: The software context used for this command submission.
1013 * @header: Pointer to the command header in the command stream.
1014 */
1015static int vmw_cmd_begin_query(struct vmw_private *dev_priv,
1016 struct vmw_sw_context *sw_context,
1017 SVGA3dCmdHeader *header)
1018{
1019 struct vmw_begin_query_cmd {
1020 SVGA3dCmdHeader header;
1021 SVGA3dCmdBeginQuery q;
1022 } *cmd;
1023
1024 cmd = container_of(header, struct vmw_begin_query_cmd,
1025 header);
1026
Thomas Hellstromddcda242012-11-21 11:26:55 +01001027 if (unlikely(dev_priv->has_mob)) {
1028 struct {
1029 SVGA3dCmdHeader header;
1030 SVGA3dCmdBeginGBQuery q;
1031 } gb_cmd;
1032
1033 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
1034
1035 gb_cmd.header.id = SVGA_3D_CMD_BEGIN_GB_QUERY;
1036 gb_cmd.header.size = cmd->header.size;
1037 gb_cmd.q.cid = cmd->q.cid;
1038 gb_cmd.q.type = cmd->q.type;
1039
1040 memcpy(cmd, &gb_cmd, sizeof(*cmd));
1041 return vmw_cmd_begin_gb_query(dev_priv, sw_context, header);
1042 }
1043
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001044 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1045 user_context_converter, &cmd->q.cid,
1046 NULL);
1047}
1048
1049/**
Thomas Hellstromddcda242012-11-21 11:26:55 +01001050 * vmw_cmd_end_gb_query - validate a SVGA_3D_CMD_END_GB_QUERY command.
1051 *
1052 * @dev_priv: Pointer to a device private struct.
1053 * @sw_context: The software context used for this command submission.
1054 * @header: Pointer to the command header in the command stream.
1055 */
1056static int vmw_cmd_end_gb_query(struct vmw_private *dev_priv,
1057 struct vmw_sw_context *sw_context,
1058 SVGA3dCmdHeader *header)
1059{
1060 struct vmw_dma_buffer *vmw_bo;
1061 struct vmw_query_cmd {
1062 SVGA3dCmdHeader header;
1063 SVGA3dCmdEndGBQuery q;
1064 } *cmd;
1065 int ret;
1066
1067 cmd = container_of(header, struct vmw_query_cmd, header);
1068 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1069 if (unlikely(ret != 0))
1070 return ret;
1071
1072 ret = vmw_translate_mob_ptr(dev_priv, sw_context,
1073 &cmd->q.mobid,
1074 &vmw_bo);
1075 if (unlikely(ret != 0))
1076 return ret;
1077
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07001078 ret = vmw_query_bo_switch_prepare(dev_priv, vmw_bo, sw_context);
Thomas Hellstromddcda242012-11-21 11:26:55 +01001079
1080 vmw_dmabuf_unreference(&vmw_bo);
1081 return ret;
1082}
1083
1084/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001085 * vmw_cmd_end_query - validate a SVGA_3D_CMD_END_QUERY command.
1086 *
1087 * @dev_priv: Pointer to a device private struct.
1088 * @sw_context: The software context used for this command submission.
1089 * @header: Pointer to the command header in the command stream.
1090 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001091static int vmw_cmd_end_query(struct vmw_private *dev_priv,
1092 struct vmw_sw_context *sw_context,
1093 SVGA3dCmdHeader *header)
1094{
1095 struct vmw_dma_buffer *vmw_bo;
1096 struct vmw_query_cmd {
1097 SVGA3dCmdHeader header;
1098 SVGA3dCmdEndQuery q;
1099 } *cmd;
1100 int ret;
1101
1102 cmd = container_of(header, struct vmw_query_cmd, header);
Thomas Hellstromddcda242012-11-21 11:26:55 +01001103 if (dev_priv->has_mob) {
1104 struct {
1105 SVGA3dCmdHeader header;
1106 SVGA3dCmdEndGBQuery q;
1107 } gb_cmd;
1108
1109 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
1110
1111 gb_cmd.header.id = SVGA_3D_CMD_END_GB_QUERY;
1112 gb_cmd.header.size = cmd->header.size;
1113 gb_cmd.q.cid = cmd->q.cid;
1114 gb_cmd.q.type = cmd->q.type;
1115 gb_cmd.q.mobid = cmd->q.guestResult.gmrId;
1116 gb_cmd.q.offset = cmd->q.guestResult.offset;
1117
1118 memcpy(cmd, &gb_cmd, sizeof(*cmd));
1119 return vmw_cmd_end_gb_query(dev_priv, sw_context, header);
1120 }
1121
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001122 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1123 if (unlikely(ret != 0))
1124 return ret;
1125
1126 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1127 &cmd->q.guestResult,
1128 &vmw_bo);
1129 if (unlikely(ret != 0))
1130 return ret;
1131
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07001132 ret = vmw_query_bo_switch_prepare(dev_priv, vmw_bo, sw_context);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001133
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001134 vmw_dmabuf_unreference(&vmw_bo);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02001135 return ret;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001136}
1137
Thomas Hellstromddcda242012-11-21 11:26:55 +01001138/**
1139 * vmw_cmd_wait_gb_query - validate a SVGA_3D_CMD_WAIT_GB_QUERY command.
1140 *
1141 * @dev_priv: Pointer to a device private struct.
1142 * @sw_context: The software context used for this command submission.
1143 * @header: Pointer to the command header in the command stream.
1144 */
1145static int vmw_cmd_wait_gb_query(struct vmw_private *dev_priv,
1146 struct vmw_sw_context *sw_context,
1147 SVGA3dCmdHeader *header)
1148{
1149 struct vmw_dma_buffer *vmw_bo;
1150 struct vmw_query_cmd {
1151 SVGA3dCmdHeader header;
1152 SVGA3dCmdWaitForGBQuery q;
1153 } *cmd;
1154 int ret;
1155
1156 cmd = container_of(header, struct vmw_query_cmd, header);
1157 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1158 if (unlikely(ret != 0))
1159 return ret;
1160
1161 ret = vmw_translate_mob_ptr(dev_priv, sw_context,
1162 &cmd->q.mobid,
1163 &vmw_bo);
1164 if (unlikely(ret != 0))
1165 return ret;
1166
1167 vmw_dmabuf_unreference(&vmw_bo);
1168 return 0;
1169}
1170
1171/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001172 * vmw_cmd_wait_query - validate a SVGA_3D_CMD_WAIT_QUERY command.
1173 *
1174 * @dev_priv: Pointer to a device private struct.
1175 * @sw_context: The software context used for this command submission.
1176 * @header: Pointer to the command header in the command stream.
1177 */
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001178static int vmw_cmd_wait_query(struct vmw_private *dev_priv,
1179 struct vmw_sw_context *sw_context,
1180 SVGA3dCmdHeader *header)
1181{
1182 struct vmw_dma_buffer *vmw_bo;
1183 struct vmw_query_cmd {
1184 SVGA3dCmdHeader header;
1185 SVGA3dCmdWaitForQuery q;
1186 } *cmd;
1187 int ret;
1188
1189 cmd = container_of(header, struct vmw_query_cmd, header);
Thomas Hellstromddcda242012-11-21 11:26:55 +01001190 if (dev_priv->has_mob) {
1191 struct {
1192 SVGA3dCmdHeader header;
1193 SVGA3dCmdWaitForGBQuery q;
1194 } gb_cmd;
1195
1196 BUG_ON(sizeof(gb_cmd) != sizeof(*cmd));
1197
1198 gb_cmd.header.id = SVGA_3D_CMD_WAIT_FOR_GB_QUERY;
1199 gb_cmd.header.size = cmd->header.size;
1200 gb_cmd.q.cid = cmd->q.cid;
1201 gb_cmd.q.type = cmd->q.type;
1202 gb_cmd.q.mobid = cmd->q.guestResult.gmrId;
1203 gb_cmd.q.offset = cmd->q.guestResult.offset;
1204
1205 memcpy(cmd, &gb_cmd, sizeof(*cmd));
1206 return vmw_cmd_wait_gb_query(dev_priv, sw_context, header);
1207 }
1208
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001209 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1210 if (unlikely(ret != 0))
1211 return ret;
1212
1213 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1214 &cmd->q.guestResult,
1215 &vmw_bo);
1216 if (unlikely(ret != 0))
1217 return ret;
1218
1219 vmw_dmabuf_unreference(&vmw_bo);
1220 return 0;
1221}
1222
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001223static int vmw_cmd_dma(struct vmw_private *dev_priv,
1224 struct vmw_sw_context *sw_context,
1225 SVGA3dCmdHeader *header)
1226{
1227 struct vmw_dma_buffer *vmw_bo = NULL;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001228 struct vmw_surface *srf = NULL;
1229 struct vmw_dma_cmd {
1230 SVGA3dCmdHeader header;
1231 SVGA3dCmdSurfaceDMA dma;
1232 } *cmd;
1233 int ret;
Thomas Hellstromcbd75e92014-04-15 18:25:48 +02001234 SVGA3dCmdSurfaceDMASuffix *suffix;
1235 uint32_t bo_size;
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001236
1237 cmd = container_of(header, struct vmw_dma_cmd, header);
Thomas Hellstromcbd75e92014-04-15 18:25:48 +02001238 suffix = (SVGA3dCmdSurfaceDMASuffix *)((unsigned long) &cmd->dma +
1239 header->size - sizeof(*suffix));
1240
1241 /* Make sure device and verifier stays in sync. */
1242 if (unlikely(suffix->suffixSize != sizeof(*suffix))) {
1243 DRM_ERROR("Invalid DMA suffix size.\n");
1244 return -EINVAL;
1245 }
1246
Thomas Hellstrom4e4ddd42010-02-21 14:54:55 +00001247 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1248 &cmd->dma.guest.ptr,
1249 &vmw_bo);
1250 if (unlikely(ret != 0))
1251 return ret;
1252
Thomas Hellstromcbd75e92014-04-15 18:25:48 +02001253 /* Make sure DMA doesn't cross BO boundaries. */
1254 bo_size = vmw_bo->base.num_pages * PAGE_SIZE;
1255 if (unlikely(cmd->dma.guest.ptr.offset > bo_size)) {
1256 DRM_ERROR("Invalid DMA offset.\n");
1257 return -EINVAL;
1258 }
1259
1260 bo_size -= cmd->dma.guest.ptr.offset;
1261 if (unlikely(suffix->maximumOffset > bo_size))
1262 suffix->maximumOffset = bo_size;
1263
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001264 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1265 user_surface_converter, &cmd->dma.host.sid,
1266 NULL);
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +02001267 if (unlikely(ret != 0)) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001268 if (unlikely(ret != -ERESTARTSYS))
1269 DRM_ERROR("could not find surface for DMA.\n");
1270 goto out_no_surface;
Thomas Hellstrom5bb39e82011-10-04 20:13:33 +02001271 }
1272
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001273 srf = vmw_res_to_srf(sw_context->res_cache[vmw_res_surface].res);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001274
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001275 vmw_kms_cursor_snoop(srf, sw_context->fp->tfile, &vmw_bo->base,
1276 header);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00001277
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001278out_no_surface:
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001279 vmw_dmabuf_unreference(&vmw_bo);
1280 return ret;
1281}
1282
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001283static int vmw_cmd_draw(struct vmw_private *dev_priv,
1284 struct vmw_sw_context *sw_context,
1285 SVGA3dCmdHeader *header)
1286{
1287 struct vmw_draw_cmd {
1288 SVGA3dCmdHeader header;
1289 SVGA3dCmdDrawPrimitives body;
1290 } *cmd;
1291 SVGA3dVertexDecl *decl = (SVGA3dVertexDecl *)(
1292 (unsigned long)header + sizeof(*cmd));
1293 SVGA3dPrimitiveRange *range;
1294 uint32_t i;
1295 uint32_t maxnum;
1296 int ret;
1297
1298 ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
1299 if (unlikely(ret != 0))
1300 return ret;
1301
1302 cmd = container_of(header, struct vmw_draw_cmd, header);
1303 maxnum = (header->size - sizeof(cmd->body)) / sizeof(*decl);
1304
1305 if (unlikely(cmd->body.numVertexDecls > maxnum)) {
1306 DRM_ERROR("Illegal number of vertex declarations.\n");
1307 return -EINVAL;
1308 }
1309
1310 for (i = 0; i < cmd->body.numVertexDecls; ++i, ++decl) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001311 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1312 user_surface_converter,
1313 &decl->array.surfaceId, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001314 if (unlikely(ret != 0))
1315 return ret;
1316 }
1317
1318 maxnum = (header->size - sizeof(cmd->body) -
1319 cmd->body.numVertexDecls * sizeof(*decl)) / sizeof(*range);
1320 if (unlikely(cmd->body.numRanges > maxnum)) {
1321 DRM_ERROR("Illegal number of index ranges.\n");
1322 return -EINVAL;
1323 }
1324
1325 range = (SVGA3dPrimitiveRange *) decl;
1326 for (i = 0; i < cmd->body.numRanges; ++i, ++range) {
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001327 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1328 user_surface_converter,
1329 &range->indexArray.surfaceId, NULL);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001330 if (unlikely(ret != 0))
1331 return ret;
1332 }
1333 return 0;
1334}
1335
1336
1337static int vmw_cmd_tex_state(struct vmw_private *dev_priv,
1338 struct vmw_sw_context *sw_context,
1339 SVGA3dCmdHeader *header)
1340{
1341 struct vmw_tex_state_cmd {
1342 SVGA3dCmdHeader header;
1343 SVGA3dCmdSetTextureState state;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001344 } *cmd;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001345
1346 SVGA3dTextureState *last_state = (SVGA3dTextureState *)
1347 ((unsigned long) header + header->size + sizeof(header));
1348 SVGA3dTextureState *cur_state = (SVGA3dTextureState *)
1349 ((unsigned long) header + sizeof(struct vmw_tex_state_cmd));
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001350 struct vmw_resource_val_node *ctx_node;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07001351 struct vmw_resource_val_node *res_node;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001352 int ret;
1353
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001354 cmd = container_of(header, struct vmw_tex_state_cmd,
1355 header);
1356
1357 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1358 user_context_converter, &cmd->state.cid,
1359 &ctx_node);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001360 if (unlikely(ret != 0))
1361 return ret;
1362
1363 for (; cur_state < last_state; ++cur_state) {
1364 if (likely(cur_state->name != SVGA3D_TS_BIND_TEXTURE))
1365 continue;
1366
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001367 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1368 user_surface_converter,
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07001369 &cur_state->value, &res_node);
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001370 if (unlikely(ret != 0))
1371 return ret;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001372
1373 if (dev_priv->has_mob) {
1374 struct vmw_ctx_bindinfo bi;
1375
1376 bi.ctx = ctx_node->res;
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07001377 bi.res = res_node ? res_node->res : NULL;
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001378 bi.bt = vmw_ctx_binding_tex;
1379 bi.i1.texture_stage = cur_state->stage;
1380 vmw_context_binding_add(ctx_node->staged_bindings,
1381 &bi);
1382 }
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01001383 }
1384
1385 return 0;
1386}
1387
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001388static int vmw_cmd_check_define_gmrfb(struct vmw_private *dev_priv,
1389 struct vmw_sw_context *sw_context,
1390 void *buf)
1391{
1392 struct vmw_dma_buffer *vmw_bo;
1393 int ret;
1394
1395 struct {
1396 uint32_t header;
1397 SVGAFifoCmdDefineGMRFB body;
1398 } *cmd = buf;
1399
1400 ret = vmw_translate_guest_ptr(dev_priv, sw_context,
1401 &cmd->body.ptr,
1402 &vmw_bo);
1403 if (unlikely(ret != 0))
1404 return ret;
1405
1406 vmw_dmabuf_unreference(&vmw_bo);
1407
1408 return ret;
1409}
1410
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001411/**
Thomas Hellstroma97e2192012-11-21 11:45:13 +01001412 * vmw_cmd_switch_backup - Utility function to handle backup buffer switching
1413 *
1414 * @dev_priv: Pointer to a device private struct.
1415 * @sw_context: The software context being used for this batch.
1416 * @res_type: The resource type.
1417 * @converter: Information about user-space binding for this resource type.
1418 * @res_id: Pointer to the user-space resource handle in the command stream.
1419 * @buf_id: Pointer to the user-space backup buffer handle in the command
1420 * stream.
1421 * @backup_offset: Offset of backup into MOB.
1422 *
1423 * This function prepares for registering a switch of backup buffers
1424 * in the resource metadata just prior to unreserving.
1425 */
1426static int vmw_cmd_switch_backup(struct vmw_private *dev_priv,
1427 struct vmw_sw_context *sw_context,
1428 enum vmw_res_type res_type,
1429 const struct vmw_user_resource_conv
1430 *converter,
1431 uint32_t *res_id,
1432 uint32_t *buf_id,
1433 unsigned long backup_offset)
1434{
1435 int ret;
1436 struct vmw_dma_buffer *dma_buf;
1437 struct vmw_resource_val_node *val_node;
1438
1439 ret = vmw_cmd_res_check(dev_priv, sw_context, res_type,
1440 converter, res_id, &val_node);
1441 if (unlikely(ret != 0))
1442 return ret;
1443
1444 ret = vmw_translate_mob_ptr(dev_priv, sw_context, buf_id, &dma_buf);
1445 if (unlikely(ret != 0))
1446 return ret;
1447
1448 if (val_node->first_usage)
1449 val_node->no_buffer_needed = true;
1450
1451 vmw_dmabuf_unreference(&val_node->new_backup);
1452 val_node->new_backup = dma_buf;
1453 val_node->new_backup_offset = backup_offset;
1454
1455 return 0;
1456}
1457
1458/**
1459 * vmw_cmd_bind_gb_surface - Validate an SVGA_3D_CMD_BIND_GB_SURFACE
1460 * command
1461 *
1462 * @dev_priv: Pointer to a device private struct.
1463 * @sw_context: The software context being used for this batch.
1464 * @header: Pointer to the command header in the command stream.
1465 */
1466static int vmw_cmd_bind_gb_surface(struct vmw_private *dev_priv,
1467 struct vmw_sw_context *sw_context,
1468 SVGA3dCmdHeader *header)
1469{
1470 struct vmw_bind_gb_surface_cmd {
1471 SVGA3dCmdHeader header;
1472 SVGA3dCmdBindGBSurface body;
1473 } *cmd;
1474
1475 cmd = container_of(header, struct vmw_bind_gb_surface_cmd, header);
1476
1477 return vmw_cmd_switch_backup(dev_priv, sw_context, vmw_res_surface,
1478 user_surface_converter,
1479 &cmd->body.sid, &cmd->body.mobid,
1480 0);
1481}
1482
1483/**
1484 * vmw_cmd_update_gb_image - Validate an SVGA_3D_CMD_UPDATE_GB_IMAGE
1485 * command
1486 *
1487 * @dev_priv: Pointer to a device private struct.
1488 * @sw_context: The software context being used for this batch.
1489 * @header: Pointer to the command header in the command stream.
1490 */
1491static int vmw_cmd_update_gb_image(struct vmw_private *dev_priv,
1492 struct vmw_sw_context *sw_context,
1493 SVGA3dCmdHeader *header)
1494{
1495 struct vmw_gb_surface_cmd {
1496 SVGA3dCmdHeader header;
1497 SVGA3dCmdUpdateGBImage body;
1498 } *cmd;
1499
1500 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1501
1502 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1503 user_surface_converter,
1504 &cmd->body.image.sid, NULL);
1505}
1506
1507/**
1508 * vmw_cmd_update_gb_surface - Validate an SVGA_3D_CMD_UPDATE_GB_SURFACE
1509 * command
1510 *
1511 * @dev_priv: Pointer to a device private struct.
1512 * @sw_context: The software context being used for this batch.
1513 * @header: Pointer to the command header in the command stream.
1514 */
1515static int vmw_cmd_update_gb_surface(struct vmw_private *dev_priv,
1516 struct vmw_sw_context *sw_context,
1517 SVGA3dCmdHeader *header)
1518{
1519 struct vmw_gb_surface_cmd {
1520 SVGA3dCmdHeader header;
1521 SVGA3dCmdUpdateGBSurface body;
1522 } *cmd;
1523
1524 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1525
1526 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1527 user_surface_converter,
1528 &cmd->body.sid, NULL);
1529}
1530
1531/**
1532 * vmw_cmd_readback_gb_image - Validate an SVGA_3D_CMD_READBACK_GB_IMAGE
1533 * command
1534 *
1535 * @dev_priv: Pointer to a device private struct.
1536 * @sw_context: The software context being used for this batch.
1537 * @header: Pointer to the command header in the command stream.
1538 */
1539static int vmw_cmd_readback_gb_image(struct vmw_private *dev_priv,
1540 struct vmw_sw_context *sw_context,
1541 SVGA3dCmdHeader *header)
1542{
1543 struct vmw_gb_surface_cmd {
1544 SVGA3dCmdHeader header;
1545 SVGA3dCmdReadbackGBImage body;
1546 } *cmd;
1547
1548 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1549
1550 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1551 user_surface_converter,
1552 &cmd->body.image.sid, NULL);
1553}
1554
1555/**
1556 * vmw_cmd_readback_gb_surface - Validate an SVGA_3D_CMD_READBACK_GB_SURFACE
1557 * command
1558 *
1559 * @dev_priv: Pointer to a device private struct.
1560 * @sw_context: The software context being used for this batch.
1561 * @header: Pointer to the command header in the command stream.
1562 */
1563static int vmw_cmd_readback_gb_surface(struct vmw_private *dev_priv,
1564 struct vmw_sw_context *sw_context,
1565 SVGA3dCmdHeader *header)
1566{
1567 struct vmw_gb_surface_cmd {
1568 SVGA3dCmdHeader header;
1569 SVGA3dCmdReadbackGBSurface body;
1570 } *cmd;
1571
1572 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1573
1574 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1575 user_surface_converter,
1576 &cmd->body.sid, NULL);
1577}
1578
1579/**
1580 * vmw_cmd_invalidate_gb_image - Validate an SVGA_3D_CMD_INVALIDATE_GB_IMAGE
1581 * command
1582 *
1583 * @dev_priv: Pointer to a device private struct.
1584 * @sw_context: The software context being used for this batch.
1585 * @header: Pointer to the command header in the command stream.
1586 */
1587static int vmw_cmd_invalidate_gb_image(struct vmw_private *dev_priv,
1588 struct vmw_sw_context *sw_context,
1589 SVGA3dCmdHeader *header)
1590{
1591 struct vmw_gb_surface_cmd {
1592 SVGA3dCmdHeader header;
1593 SVGA3dCmdInvalidateGBImage body;
1594 } *cmd;
1595
1596 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1597
1598 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1599 user_surface_converter,
1600 &cmd->body.image.sid, NULL);
1601}
1602
1603/**
1604 * vmw_cmd_invalidate_gb_surface - Validate an
1605 * SVGA_3D_CMD_INVALIDATE_GB_SURFACE command
1606 *
1607 * @dev_priv: Pointer to a device private struct.
1608 * @sw_context: The software context being used for this batch.
1609 * @header: Pointer to the command header in the command stream.
1610 */
1611static int vmw_cmd_invalidate_gb_surface(struct vmw_private *dev_priv,
1612 struct vmw_sw_context *sw_context,
1613 SVGA3dCmdHeader *header)
1614{
1615 struct vmw_gb_surface_cmd {
1616 SVGA3dCmdHeader header;
1617 SVGA3dCmdInvalidateGBSurface body;
1618 } *cmd;
1619
1620 cmd = container_of(header, struct vmw_gb_surface_cmd, header);
1621
1622 return vmw_cmd_res_check(dev_priv, sw_context, vmw_res_surface,
1623 user_surface_converter,
1624 &cmd->body.sid, NULL);
1625}
1626
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001627
1628/**
1629 * vmw_cmd_shader_define - Validate an SVGA_3D_CMD_SHADER_DEFINE
1630 * command
1631 *
1632 * @dev_priv: Pointer to a device private struct.
1633 * @sw_context: The software context being used for this batch.
1634 * @header: Pointer to the command header in the command stream.
1635 */
1636static int vmw_cmd_shader_define(struct vmw_private *dev_priv,
1637 struct vmw_sw_context *sw_context,
1638 SVGA3dCmdHeader *header)
1639{
1640 struct vmw_shader_define_cmd {
1641 SVGA3dCmdHeader header;
1642 SVGA3dCmdDefineShader body;
1643 } *cmd;
1644 int ret;
1645 size_t size;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001646 struct vmw_resource_val_node *val;
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001647
1648 cmd = container_of(header, struct vmw_shader_define_cmd,
1649 header);
1650
1651 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1652 user_context_converter, &cmd->body.cid,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001653 &val);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001654 if (unlikely(ret != 0))
1655 return ret;
1656
1657 if (unlikely(!dev_priv->has_mob))
1658 return 0;
1659
1660 size = cmd->header.size - sizeof(cmd->body);
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001661 ret = vmw_compat_shader_add(dev_priv,
1662 vmw_context_res_man(val->res),
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001663 cmd->body.shid, cmd + 1,
1664 cmd->body.type, size,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001665 &sw_context->staged_cmd_res);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001666 if (unlikely(ret != 0))
1667 return ret;
1668
1669 return vmw_resource_relocation_add(&sw_context->res_relocations,
1670 NULL, &cmd->header.id -
1671 sw_context->buf_start);
1672
1673 return 0;
1674}
1675
1676/**
1677 * vmw_cmd_shader_destroy - Validate an SVGA_3D_CMD_SHADER_DESTROY
1678 * command
1679 *
1680 * @dev_priv: Pointer to a device private struct.
1681 * @sw_context: The software context being used for this batch.
1682 * @header: Pointer to the command header in the command stream.
1683 */
1684static int vmw_cmd_shader_destroy(struct vmw_private *dev_priv,
1685 struct vmw_sw_context *sw_context,
1686 SVGA3dCmdHeader *header)
1687{
1688 struct vmw_shader_destroy_cmd {
1689 SVGA3dCmdHeader header;
1690 SVGA3dCmdDestroyShader body;
1691 } *cmd;
1692 int ret;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001693 struct vmw_resource_val_node *val;
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001694
1695 cmd = container_of(header, struct vmw_shader_destroy_cmd,
1696 header);
1697
1698 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1699 user_context_converter, &cmd->body.cid,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001700 &val);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001701 if (unlikely(ret != 0))
1702 return ret;
1703
1704 if (unlikely(!dev_priv->has_mob))
1705 return 0;
1706
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001707 ret = vmw_compat_shader_remove(vmw_context_res_man(val->res),
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001708 cmd->body.shid,
1709 cmd->body.type,
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001710 &sw_context->staged_cmd_res);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001711 if (unlikely(ret != 0))
1712 return ret;
1713
1714 return vmw_resource_relocation_add(&sw_context->res_relocations,
1715 NULL, &cmd->header.id -
1716 sw_context->buf_start);
1717
1718 return 0;
1719}
1720
Thomas Hellstroma97e2192012-11-21 11:45:13 +01001721/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001722 * vmw_cmd_set_shader - Validate an SVGA_3D_CMD_SET_SHADER
1723 * command
1724 *
1725 * @dev_priv: Pointer to a device private struct.
1726 * @sw_context: The software context being used for this batch.
1727 * @header: Pointer to the command header in the command stream.
1728 */
1729static int vmw_cmd_set_shader(struct vmw_private *dev_priv,
1730 struct vmw_sw_context *sw_context,
1731 SVGA3dCmdHeader *header)
1732{
1733 struct vmw_set_shader_cmd {
1734 SVGA3dCmdHeader header;
1735 SVGA3dCmdSetShader body;
1736 } *cmd;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001737 struct vmw_resource_val_node *ctx_node, *res_node = NULL;
1738 struct vmw_ctx_bindinfo bi;
1739 struct vmw_resource *res = NULL;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001740 int ret;
1741
1742 cmd = container_of(header, struct vmw_set_shader_cmd,
1743 header);
1744
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001745 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1746 user_context_converter, &cmd->body.cid,
1747 &ctx_node);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001748 if (unlikely(ret != 0))
1749 return ret;
1750
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001751 if (!dev_priv->has_mob)
1752 return 0;
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001753
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001754 if (cmd->body.shid != SVGA3D_INVALID_ID) {
1755 res = vmw_compat_shader_lookup
1756 (vmw_context_res_man(ctx_node->res),
1757 cmd->body.shid,
1758 cmd->body.type);
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001759
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001760 if (!IS_ERR(res)) {
1761 ret = vmw_cmd_res_reloc_add(dev_priv, sw_context,
1762 vmw_res_shader,
1763 &cmd->body.shid, res,
1764 &res_node);
1765 vmw_resource_unreference(&res);
1766 if (unlikely(ret != 0))
1767 return ret;
1768 }
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07001769 }
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001770
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02001771 if (!res_node) {
1772 ret = vmw_cmd_res_check(dev_priv, sw_context,
1773 vmw_res_shader,
1774 user_shader_converter,
1775 &cmd->body.shid, &res_node);
1776 if (unlikely(ret != 0))
1777 return ret;
1778 }
1779
1780 bi.ctx = ctx_node->res;
1781 bi.res = res_node ? res_node->res : NULL;
1782 bi.bt = vmw_ctx_binding_shader;
1783 bi.i1.shader_type = cmd->body.type;
1784 return vmw_context_binding_add(ctx_node->staged_bindings, &bi);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00001785}
1786
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001787/**
Thomas Hellstrom0ccbbae2014-01-30 11:13:43 +01001788 * vmw_cmd_set_shader_const - Validate an SVGA_3D_CMD_SET_SHADER_CONST
1789 * command
1790 *
1791 * @dev_priv: Pointer to a device private struct.
1792 * @sw_context: The software context being used for this batch.
1793 * @header: Pointer to the command header in the command stream.
1794 */
1795static int vmw_cmd_set_shader_const(struct vmw_private *dev_priv,
1796 struct vmw_sw_context *sw_context,
1797 SVGA3dCmdHeader *header)
1798{
1799 struct vmw_set_shader_const_cmd {
1800 SVGA3dCmdHeader header;
1801 SVGA3dCmdSetShaderConst body;
1802 } *cmd;
1803 int ret;
1804
1805 cmd = container_of(header, struct vmw_set_shader_const_cmd,
1806 header);
1807
1808 ret = vmw_cmd_res_check(dev_priv, sw_context, vmw_res_context,
1809 user_context_converter, &cmd->body.cid,
1810 NULL);
1811 if (unlikely(ret != 0))
1812 return ret;
1813
1814 if (dev_priv->has_mob)
1815 header->id = SVGA_3D_CMD_SET_GB_SHADERCONSTS_INLINE;
1816
1817 return 0;
1818}
1819
1820/**
Thomas Hellstromc74c1622012-11-21 12:10:26 +01001821 * vmw_cmd_bind_gb_shader - Validate an SVGA_3D_CMD_BIND_GB_SHADER
1822 * command
1823 *
1824 * @dev_priv: Pointer to a device private struct.
1825 * @sw_context: The software context being used for this batch.
1826 * @header: Pointer to the command header in the command stream.
1827 */
1828static int vmw_cmd_bind_gb_shader(struct vmw_private *dev_priv,
1829 struct vmw_sw_context *sw_context,
1830 SVGA3dCmdHeader *header)
1831{
1832 struct vmw_bind_gb_shader_cmd {
1833 SVGA3dCmdHeader header;
1834 SVGA3dCmdBindGBShader body;
1835 } *cmd;
1836
1837 cmd = container_of(header, struct vmw_bind_gb_shader_cmd,
1838 header);
1839
1840 return vmw_cmd_switch_backup(dev_priv, sw_context, vmw_res_shader,
1841 user_shader_converter,
1842 &cmd->body.shid, &cmd->body.mobid,
1843 cmd->body.offsetInBytes);
1844}
1845
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001846static int vmw_cmd_check_not_3d(struct vmw_private *dev_priv,
1847 struct vmw_sw_context *sw_context,
1848 void *buf, uint32_t *size)
1849{
1850 uint32_t size_remaining = *size;
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001851 uint32_t cmd_id;
1852
1853 cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
1854 switch (cmd_id) {
1855 case SVGA_CMD_UPDATE:
1856 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdUpdate);
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001857 break;
1858 case SVGA_CMD_DEFINE_GMRFB:
1859 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdDefineGMRFB);
1860 break;
1861 case SVGA_CMD_BLIT_GMRFB_TO_SCREEN:
1862 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
1863 break;
1864 case SVGA_CMD_BLIT_SCREEN_TO_GMRFB:
1865 *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
1866 break;
1867 default:
1868 DRM_ERROR("Unsupported SVGA command: %u.\n", cmd_id);
1869 return -EINVAL;
1870 }
1871
1872 if (*size > size_remaining) {
1873 DRM_ERROR("Invalid SVGA command (size mismatch):"
1874 " %u.\n", cmd_id);
1875 return -EINVAL;
1876 }
1877
Jakob Bornecrantz0cff60c2011-10-04 20:13:27 +02001878 if (unlikely(!sw_context->kernel)) {
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02001879 DRM_ERROR("Kernel only SVGA command: %u.\n", cmd_id);
1880 return -EPERM;
1881 }
1882
1883 if (cmd_id == SVGA_CMD_DEFINE_GMRFB)
1884 return vmw_cmd_check_define_gmrfb(dev_priv, sw_context, buf);
1885
1886 return 0;
1887}
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001888
Thomas Hellstrom4fbd9d22014-02-12 12:37:01 +01001889static const struct vmw_cmd_entry vmw_cmd_entries[SVGA_3D_CMD_MAX] = {
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001890 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DEFINE, &vmw_cmd_invalid,
1891 false, false, false),
1892 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DESTROY, &vmw_cmd_invalid,
1893 false, false, false),
1894 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_COPY, &vmw_cmd_surface_copy_check,
1895 true, false, false),
1896 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_STRETCHBLT, &vmw_cmd_stretch_blt_check,
1897 true, false, false),
1898 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DMA, &vmw_cmd_dma,
1899 true, false, false),
1900 VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DEFINE, &vmw_cmd_invalid,
1901 false, false, false),
1902 VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DESTROY, &vmw_cmd_invalid,
1903 false, false, false),
1904 VMW_CMD_DEF(SVGA_3D_CMD_SETTRANSFORM, &vmw_cmd_cid_check,
1905 true, false, false),
1906 VMW_CMD_DEF(SVGA_3D_CMD_SETZRANGE, &vmw_cmd_cid_check,
1907 true, false, false),
1908 VMW_CMD_DEF(SVGA_3D_CMD_SETRENDERSTATE, &vmw_cmd_cid_check,
1909 true, false, false),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001910 VMW_CMD_DEF(SVGA_3D_CMD_SETRENDERTARGET,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001911 &vmw_cmd_set_render_target_check, true, false, false),
1912 VMW_CMD_DEF(SVGA_3D_CMD_SETTEXTURESTATE, &vmw_cmd_tex_state,
1913 true, false, false),
1914 VMW_CMD_DEF(SVGA_3D_CMD_SETMATERIAL, &vmw_cmd_cid_check,
1915 true, false, false),
1916 VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTDATA, &vmw_cmd_cid_check,
1917 true, false, false),
1918 VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTENABLED, &vmw_cmd_cid_check,
1919 true, false, false),
1920 VMW_CMD_DEF(SVGA_3D_CMD_SETVIEWPORT, &vmw_cmd_cid_check,
1921 true, false, false),
1922 VMW_CMD_DEF(SVGA_3D_CMD_SETCLIPPLANE, &vmw_cmd_cid_check,
1923 true, false, false),
1924 VMW_CMD_DEF(SVGA_3D_CMD_CLEAR, &vmw_cmd_cid_check,
1925 true, false, false),
1926 VMW_CMD_DEF(SVGA_3D_CMD_PRESENT, &vmw_cmd_present_check,
1927 false, false, false),
Thomas Hellstromd5bde952014-01-31 10:12:10 +01001928 VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DEFINE, &vmw_cmd_shader_define,
1929 true, false, false),
1930 VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DESTROY, &vmw_cmd_shader_destroy,
1931 true, false, false),
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001932 VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER, &vmw_cmd_set_shader,
1933 true, false, false),
Thomas Hellstrom0ccbbae2014-01-30 11:13:43 +01001934 VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER_CONST, &vmw_cmd_set_shader_const,
1935 true, false, false),
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001936 VMW_CMD_DEF(SVGA_3D_CMD_DRAW_PRIMITIVES, &vmw_cmd_draw,
1937 true, false, false),
1938 VMW_CMD_DEF(SVGA_3D_CMD_SETSCISSORRECT, &vmw_cmd_cid_check,
1939 true, false, false),
1940 VMW_CMD_DEF(SVGA_3D_CMD_BEGIN_QUERY, &vmw_cmd_begin_query,
1941 true, false, false),
1942 VMW_CMD_DEF(SVGA_3D_CMD_END_QUERY, &vmw_cmd_end_query,
1943 true, false, false),
1944 VMW_CMD_DEF(SVGA_3D_CMD_WAIT_FOR_QUERY, &vmw_cmd_wait_query,
1945 true, false, false),
1946 VMW_CMD_DEF(SVGA_3D_CMD_PRESENT_READBACK, &vmw_cmd_ok,
1947 true, false, false),
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00001948 VMW_CMD_DEF(SVGA_3D_CMD_BLIT_SURFACE_TO_SCREEN,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001949 &vmw_cmd_blt_surf_screen_check, false, false, false),
1950 VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DEFINE_V2, &vmw_cmd_invalid,
1951 false, false, false),
1952 VMW_CMD_DEF(SVGA_3D_CMD_GENERATE_MIPMAPS, &vmw_cmd_invalid,
1953 false, false, false),
1954 VMW_CMD_DEF(SVGA_3D_CMD_ACTIVATE_SURFACE, &vmw_cmd_invalid,
1955 false, false, false),
1956 VMW_CMD_DEF(SVGA_3D_CMD_DEACTIVATE_SURFACE, &vmw_cmd_invalid,
1957 false, false, false),
1958 VMW_CMD_DEF(SVGA_3D_CMD_SCREEN_DMA, &vmw_cmd_invalid,
1959 false, false, false),
1960 VMW_CMD_DEF(SVGA_3D_CMD_SET_UNITY_SURFACE_COOKIE, &vmw_cmd_invalid,
1961 false, false, false),
1962 VMW_CMD_DEF(SVGA_3D_CMD_OPEN_CONTEXT_SURFACE, &vmw_cmd_invalid,
1963 false, false, false),
1964 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_BITBLT, &vmw_cmd_invalid,
1965 false, false, false),
1966 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_TRANSBLT, &vmw_cmd_invalid,
1967 false, false, false),
1968 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_STRETCHBLT, &vmw_cmd_invalid,
1969 false, false, false),
1970 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_COLORFILL, &vmw_cmd_invalid,
1971 false, false, false),
1972 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_ALPHABLEND, &vmw_cmd_invalid,
1973 false, false, false),
1974 VMW_CMD_DEF(SVGA_3D_CMD_LOGICOPS_CLEARTYPEBLEND, &vmw_cmd_invalid,
1975 false, false, false),
1976 VMW_CMD_DEF(SVGA_3D_CMD_SET_OTABLE_BASE, &vmw_cmd_invalid,
1977 false, false, true),
1978 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_OTABLE, &vmw_cmd_invalid,
1979 false, false, true),
1980 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_MOB, &vmw_cmd_invalid,
1981 false, false, true),
1982 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_MOB, &vmw_cmd_invalid,
1983 false, false, true),
1984 VMW_CMD_DEF(SVGA_3D_CMD_REDEFINE_GB_MOB, &vmw_cmd_invalid,
1985 false, false, true),
1986 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_MOB_MAPPING, &vmw_cmd_invalid,
1987 false, false, true),
1988 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_SURFACE, &vmw_cmd_invalid,
1989 false, false, true),
1990 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_SURFACE, &vmw_cmd_invalid,
1991 false, false, true),
1992 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_SURFACE, &vmw_cmd_bind_gb_surface,
1993 true, false, true),
1994 VMW_CMD_DEF(SVGA_3D_CMD_COND_BIND_GB_SURFACE, &vmw_cmd_invalid,
1995 false, false, true),
1996 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_IMAGE, &vmw_cmd_update_gb_image,
1997 true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01001998 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_SURFACE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01001999 &vmw_cmd_update_gb_surface, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002000 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_IMAGE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002001 &vmw_cmd_readback_gb_image, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002002 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_SURFACE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002003 &vmw_cmd_readback_gb_surface, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002004 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_IMAGE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002005 &vmw_cmd_invalidate_gb_image, true, false, true),
Thomas Hellstroma97e2192012-11-21 11:45:13 +01002006 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_SURFACE,
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002007 &vmw_cmd_invalidate_gb_surface, true, false, true),
2008 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_CONTEXT, &vmw_cmd_invalid,
2009 false, false, true),
2010 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_CONTEXT, &vmw_cmd_invalid,
2011 false, false, true),
2012 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_CONTEXT, &vmw_cmd_invalid,
2013 false, false, true),
2014 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_CONTEXT, &vmw_cmd_invalid,
2015 false, false, true),
2016 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_CONTEXT, &vmw_cmd_invalid,
2017 false, false, true),
2018 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_SHADER, &vmw_cmd_invalid,
2019 false, false, true),
2020 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_SHADER, &vmw_cmd_bind_gb_shader,
2021 true, false, true),
2022 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_SHADER, &vmw_cmd_invalid,
2023 false, false, true),
Thomas Hellstromf2a0dcb2014-01-15 10:04:07 +01002024 VMW_CMD_DEF(SVGA_3D_CMD_SET_OTABLE_BASE64, &vmw_cmd_invalid,
Thomas Hellstrom8ba07312013-10-08 02:25:35 -07002025 false, false, false),
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002026 VMW_CMD_DEF(SVGA_3D_CMD_BEGIN_GB_QUERY, &vmw_cmd_begin_gb_query,
2027 true, false, true),
2028 VMW_CMD_DEF(SVGA_3D_CMD_END_GB_QUERY, &vmw_cmd_end_gb_query,
2029 true, false, true),
2030 VMW_CMD_DEF(SVGA_3D_CMD_WAIT_FOR_GB_QUERY, &vmw_cmd_wait_gb_query,
2031 true, false, true),
2032 VMW_CMD_DEF(SVGA_3D_CMD_NOP, &vmw_cmd_ok,
2033 true, false, true),
2034 VMW_CMD_DEF(SVGA_3D_CMD_ENABLE_GART, &vmw_cmd_invalid,
2035 false, false, true),
2036 VMW_CMD_DEF(SVGA_3D_CMD_DISABLE_GART, &vmw_cmd_invalid,
2037 false, false, true),
2038 VMW_CMD_DEF(SVGA_3D_CMD_MAP_MOB_INTO_GART, &vmw_cmd_invalid,
2039 false, false, true),
2040 VMW_CMD_DEF(SVGA_3D_CMD_UNMAP_GART_RANGE, &vmw_cmd_invalid,
2041 false, false, true),
2042 VMW_CMD_DEF(SVGA_3D_CMD_DEFINE_GB_SCREENTARGET, &vmw_cmd_invalid,
2043 false, false, true),
2044 VMW_CMD_DEF(SVGA_3D_CMD_DESTROY_GB_SCREENTARGET, &vmw_cmd_invalid,
2045 false, false, true),
2046 VMW_CMD_DEF(SVGA_3D_CMD_BIND_GB_SCREENTARGET, &vmw_cmd_invalid,
2047 false, false, true),
2048 VMW_CMD_DEF(SVGA_3D_CMD_UPDATE_GB_SCREENTARGET, &vmw_cmd_invalid,
2049 false, false, true),
2050 VMW_CMD_DEF(SVGA_3D_CMD_READBACK_GB_IMAGE_PARTIAL, &vmw_cmd_invalid,
2051 false, false, true),
2052 VMW_CMD_DEF(SVGA_3D_CMD_INVALIDATE_GB_IMAGE_PARTIAL, &vmw_cmd_invalid,
2053 false, false, true),
2054 VMW_CMD_DEF(SVGA_3D_CMD_SET_GB_SHADERCONSTS_INLINE, &vmw_cmd_cid_check,
2055 true, false, true)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002056};
2057
2058static int vmw_cmd_check(struct vmw_private *dev_priv,
2059 struct vmw_sw_context *sw_context,
2060 void *buf, uint32_t *size)
2061{
2062 uint32_t cmd_id;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002063 uint32_t size_remaining = *size;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002064 SVGA3dCmdHeader *header = (SVGA3dCmdHeader *) buf;
2065 int ret;
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002066 const struct vmw_cmd_entry *entry;
2067 bool gb = dev_priv->capabilities & SVGA_CAP_GBOBJECTS;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002068
Jakob Bornecrantz4084fb82011-10-04 20:13:19 +02002069 cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
2070 /* Handle any none 3D commands */
2071 if (unlikely(cmd_id < SVGA_CMD_MAX))
2072 return vmw_cmd_check_not_3d(dev_priv, sw_context, buf, size);
2073
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002074
2075 cmd_id = le32_to_cpu(header->id);
2076 *size = le32_to_cpu(header->size) + sizeof(SVGA3dCmdHeader);
2077
2078 cmd_id -= SVGA_3D_CMD_BASE;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002079 if (unlikely(*size > size_remaining))
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002080 goto out_invalid;
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002081
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002082 if (unlikely(cmd_id >= SVGA_3D_CMD_MAX - SVGA_3D_CMD_BASE))
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002083 goto out_invalid;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002084
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002085 entry = &vmw_cmd_entries[cmd_id];
Thomas Hellstrom36e952c2014-02-12 13:19:36 +01002086 if (unlikely(!entry->func))
2087 goto out_invalid;
2088
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002089 if (unlikely(!entry->user_allow && !sw_context->kernel))
2090 goto out_privileged;
2091
2092 if (unlikely(entry->gb_disable && gb))
2093 goto out_old;
2094
2095 if (unlikely(entry->gb_enable && !gb))
2096 goto out_new;
2097
2098 ret = entry->func(dev_priv, sw_context, header);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002099 if (unlikely(ret != 0))
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002100 goto out_invalid;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002101
2102 return 0;
Thomas Hellstromc373d4e2012-11-21 12:22:35 +01002103out_invalid:
2104 DRM_ERROR("Invalid SVGA3D command: %d\n",
2105 cmd_id + SVGA_3D_CMD_BASE);
2106 return -EINVAL;
2107out_privileged:
2108 DRM_ERROR("Privileged SVGA3D command: %d\n",
2109 cmd_id + SVGA_3D_CMD_BASE);
2110 return -EPERM;
2111out_old:
2112 DRM_ERROR("Deprecated (disallowed) SVGA3D command: %d\n",
2113 cmd_id + SVGA_3D_CMD_BASE);
2114 return -EINVAL;
2115out_new:
2116 DRM_ERROR("SVGA3D command: %d not supported by virtual hardware.\n",
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002117 cmd_id + SVGA_3D_CMD_BASE);
2118 return -EINVAL;
2119}
2120
2121static int vmw_cmd_check_all(struct vmw_private *dev_priv,
2122 struct vmw_sw_context *sw_context,
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002123 void *buf,
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002124 uint32_t size)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002125{
2126 int32_t cur_size = size;
2127 int ret;
2128
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002129 sw_context->buf_start = buf;
2130
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002131 while (cur_size > 0) {
Thomas Hellstrom7a73ba72009-12-22 16:53:41 +01002132 size = cur_size;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002133 ret = vmw_cmd_check(dev_priv, sw_context, buf, &size);
2134 if (unlikely(ret != 0))
2135 return ret;
2136 buf = (void *)((unsigned long) buf + size);
2137 cur_size -= size;
2138 }
2139
2140 if (unlikely(cur_size != 0)) {
2141 DRM_ERROR("Command verifier out of sync.\n");
2142 return -EINVAL;
2143 }
2144
2145 return 0;
2146}
2147
2148static void vmw_free_relocations(struct vmw_sw_context *sw_context)
2149{
2150 sw_context->cur_reloc = 0;
2151}
2152
2153static void vmw_apply_relocations(struct vmw_sw_context *sw_context)
2154{
2155 uint32_t i;
2156 struct vmw_relocation *reloc;
2157 struct ttm_validate_buffer *validate;
2158 struct ttm_buffer_object *bo;
2159
2160 for (i = 0; i < sw_context->cur_reloc; ++i) {
2161 reloc = &sw_context->relocs[i];
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002162 validate = &sw_context->val_bufs[reloc->index].base;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002163 bo = validate->bo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002164 switch (bo->mem.mem_type) {
2165 case TTM_PL_VRAM:
Thomas Hellstrom135cba02010-10-26 21:21:47 +02002166 reloc->location->offset += bo->offset;
2167 reloc->location->gmrId = SVGA_GMR_FRAMEBUFFER;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002168 break;
2169 case VMW_PL_GMR:
Thomas Hellstrom135cba02010-10-26 21:21:47 +02002170 reloc->location->gmrId = bo->mem.start;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002171 break;
Thomas Hellstromddcda242012-11-21 11:26:55 +01002172 case VMW_PL_MOB:
2173 *reloc->mob_loc = bo->mem.start;
2174 break;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002175 default:
2176 BUG();
2177 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002178 }
2179 vmw_free_relocations(sw_context);
2180}
2181
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002182/**
2183 * vmw_resource_list_unrefererence - Free up a resource list and unreference
2184 * all resources referenced by it.
2185 *
2186 * @list: The resource list.
2187 */
2188static void vmw_resource_list_unreference(struct list_head *list)
2189{
2190 struct vmw_resource_val_node *val, *val_next;
2191
2192 /*
2193 * Drop references to resources held during command submission.
2194 */
2195
2196 list_for_each_entry_safe(val, val_next, list, head) {
2197 list_del_init(&val->head);
2198 vmw_resource_unreference(&val->res);
Thomas Hellstromb5c3b1a62013-10-08 02:27:17 -07002199 if (unlikely(val->staged_bindings))
2200 kfree(val->staged_bindings);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002201 kfree(val);
2202 }
2203}
2204
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002205static void vmw_clear_validations(struct vmw_sw_context *sw_context)
2206{
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002207 struct vmw_validate_buffer *entry, *next;
2208 struct vmw_resource_val_node *val;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002209
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002210 /*
2211 * Drop references to DMA buffers held during command submission.
2212 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002213 list_for_each_entry_safe(entry, next, &sw_context->validate_nodes,
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002214 base.head) {
2215 list_del(&entry->base.head);
2216 ttm_bo_unref(&entry->base.bo);
2217 (void) drm_ht_remove_item(&sw_context->res_ht, &entry->hash);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002218 sw_context->cur_val_buf--;
2219 }
2220 BUG_ON(sw_context->cur_val_buf != 0);
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002221
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002222 list_for_each_entry(val, &sw_context->resource_list, head)
2223 (void) drm_ht_remove_item(&sw_context->res_ht, &val->hash);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002224}
2225
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002226int vmw_validate_single_buffer(struct vmw_private *dev_priv,
2227 struct ttm_buffer_object *bo,
2228 bool interruptible,
2229 bool validate_as_mob)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002230{
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002231 struct vmw_dma_buffer *vbo = container_of(bo, struct vmw_dma_buffer,
2232 base);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002233 int ret;
2234
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002235 if (vbo->pin_count > 0)
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002236 return 0;
2237
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002238 if (validate_as_mob)
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002239 return ttm_bo_validate(bo, &vmw_mob_placement, interruptible,
2240 false);
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002241
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01002242 /**
Thomas Hellstrom135cba02010-10-26 21:21:47 +02002243 * Put BO in VRAM if there is space, otherwise as a GMR.
2244 * If there is no space in VRAM and GMR ids are all used up,
2245 * start evicting GMRs to make room. If the DMA buffer can't be
2246 * used as a GMR, this will return -ENOMEM.
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01002247 */
2248
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002249 ret = ttm_bo_validate(bo, &vmw_vram_gmr_placement, interruptible,
2250 false);
Thomas Hellstrom3d3a5b32009-12-08 12:59:34 +01002251 if (likely(ret == 0 || ret == -ERESTARTSYS))
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002252 return ret;
2253
Thomas Hellstrom8ba51522010-01-16 16:05:05 +01002254 /**
2255 * If that failed, try VRAM again, this time evicting
2256 * previous contents.
2257 */
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002258
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002259 ret = ttm_bo_validate(bo, &vmw_vram_placement, interruptible, false);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002260 return ret;
2261}
2262
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002263static int vmw_validate_buffers(struct vmw_private *dev_priv,
2264 struct vmw_sw_context *sw_context)
2265{
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002266 struct vmw_validate_buffer *entry;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002267 int ret;
2268
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002269 list_for_each_entry(entry, &sw_context->validate_nodes, base.head) {
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002270 ret = vmw_validate_single_buffer(dev_priv, entry->base.bo,
Thomas Hellstrom1a4b1722015-06-26 02:03:53 -07002271 true,
Thomas Hellstrom96c5f0d2012-11-21 11:19:53 +01002272 entry->validate_as_mob);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002273 if (unlikely(ret != 0))
2274 return ret;
2275 }
2276 return 0;
2277}
2278
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002279static int vmw_resize_cmd_bounce(struct vmw_sw_context *sw_context,
2280 uint32_t size)
2281{
2282 if (likely(sw_context->cmd_bounce_size >= size))
2283 return 0;
2284
2285 if (sw_context->cmd_bounce_size == 0)
2286 sw_context->cmd_bounce_size = VMWGFX_CMD_BOUNCE_INIT_SIZE;
2287
2288 while (sw_context->cmd_bounce_size < size) {
2289 sw_context->cmd_bounce_size =
2290 PAGE_ALIGN(sw_context->cmd_bounce_size +
2291 (sw_context->cmd_bounce_size >> 1));
2292 }
2293
2294 if (sw_context->cmd_bounce != NULL)
2295 vfree(sw_context->cmd_bounce);
2296
2297 sw_context->cmd_bounce = vmalloc(sw_context->cmd_bounce_size);
2298
2299 if (sw_context->cmd_bounce == NULL) {
2300 DRM_ERROR("Failed to allocate command bounce buffer.\n");
2301 sw_context->cmd_bounce_size = 0;
2302 return -ENOMEM;
2303 }
2304
2305 return 0;
2306}
2307
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002308/**
2309 * vmw_execbuf_fence_commands - create and submit a command stream fence
2310 *
2311 * Creates a fence object and submits a command stream marker.
2312 * If this fails for some reason, We sync the fifo and return NULL.
2313 * It is then safe to fence buffers with a NULL pointer.
Jakob Bornecrantz6070e9f2011-10-04 20:13:16 +02002314 *
2315 * If @p_handle is not NULL @file_priv must also not be NULL. Creates
2316 * a userspace handle if @p_handle is not NULL, otherwise not.
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002317 */
2318
2319int vmw_execbuf_fence_commands(struct drm_file *file_priv,
2320 struct vmw_private *dev_priv,
2321 struct vmw_fence_obj **p_fence,
2322 uint32_t *p_handle)
2323{
2324 uint32_t sequence;
2325 int ret;
2326 bool synced = false;
2327
Jakob Bornecrantz6070e9f2011-10-04 20:13:16 +02002328 /* p_handle implies file_priv. */
2329 BUG_ON(p_handle != NULL && file_priv == NULL);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002330
2331 ret = vmw_fifo_send_fence(dev_priv, &sequence);
2332 if (unlikely(ret != 0)) {
2333 DRM_ERROR("Fence submission error. Syncing.\n");
2334 synced = true;
2335 }
2336
2337 if (p_handle != NULL)
2338 ret = vmw_user_fence_create(file_priv, dev_priv->fman,
Maarten Lankhorstc060a4e2014-03-26 13:06:24 +01002339 sequence, p_fence, p_handle);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002340 else
Maarten Lankhorstc060a4e2014-03-26 13:06:24 +01002341 ret = vmw_fence_create(dev_priv->fman, sequence, p_fence);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002342
2343 if (unlikely(ret != 0 && !synced)) {
2344 (void) vmw_fallback_wait(dev_priv, false, false,
2345 sequence, false,
2346 VMW_FENCE_WAIT_TIMEOUT);
2347 *p_fence = NULL;
2348 }
2349
2350 return 0;
2351}
2352
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002353/**
2354 * vmw_execbuf_copy_fence_user - copy fence object information to
2355 * user-space.
2356 *
2357 * @dev_priv: Pointer to a vmw_private struct.
2358 * @vmw_fp: Pointer to the struct vmw_fpriv representing the calling file.
2359 * @ret: Return value from fence object creation.
2360 * @user_fence_rep: User space address of a struct drm_vmw_fence_rep to
2361 * which the information should be copied.
2362 * @fence: Pointer to the fenc object.
2363 * @fence_handle: User-space fence handle.
2364 *
2365 * This function copies fence information to user-space. If copying fails,
2366 * The user-space struct drm_vmw_fence_rep::error member is hopefully
2367 * left untouched, and if it's preloaded with an -EFAULT by user-space,
2368 * the error will hopefully be detected.
2369 * Also if copying fails, user-space will be unable to signal the fence
2370 * object so we wait for it immediately, and then unreference the
2371 * user-space reference.
2372 */
Thomas Hellstrom57c5ee72011-10-10 12:23:26 +02002373void
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002374vmw_execbuf_copy_fence_user(struct vmw_private *dev_priv,
2375 struct vmw_fpriv *vmw_fp,
2376 int ret,
2377 struct drm_vmw_fence_rep __user *user_fence_rep,
2378 struct vmw_fence_obj *fence,
2379 uint32_t fence_handle)
2380{
2381 struct drm_vmw_fence_rep fence_rep;
2382
2383 if (user_fence_rep == NULL)
2384 return;
2385
Dan Carpenter80d9b242011-10-18 09:10:12 +03002386 memset(&fence_rep, 0, sizeof(fence_rep));
2387
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002388 fence_rep.error = ret;
2389 if (ret == 0) {
2390 BUG_ON(fence == NULL);
2391
2392 fence_rep.handle = fence_handle;
Maarten Lankhorst2298e802014-03-26 14:07:44 +01002393 fence_rep.seqno = fence->base.seqno;
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002394 vmw_update_seqno(dev_priv, &dev_priv->fifo);
2395 fence_rep.passed_seqno = dev_priv->last_read_seqno;
2396 }
2397
2398 /*
2399 * copy_to_user errors will be detected by user space not
2400 * seeing fence_rep::error filled in. Typically
2401 * user-space would have pre-set that member to -EFAULT.
2402 */
2403 ret = copy_to_user(user_fence_rep, &fence_rep,
2404 sizeof(fence_rep));
2405
2406 /*
2407 * User-space lost the fence object. We need to sync
2408 * and unreference the handle.
2409 */
2410 if (unlikely(ret != 0) && (fence_rep.error == 0)) {
2411 ttm_ref_object_base_unref(vmw_fp->tfile,
2412 fence_handle, TTM_REF_USAGE);
2413 DRM_ERROR("Fence copy error. Syncing.\n");
Maarten Lankhorstc060a4e2014-03-26 13:06:24 +01002414 (void) vmw_fence_obj_wait(fence, false, false,
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002415 VMW_FENCE_WAIT_TIMEOUT);
2416 }
2417}
2418
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002419/**
2420 * vmw_execbuf_submit_fifo - Patch a command batch and submit it using
2421 * the fifo.
2422 *
2423 * @dev_priv: Pointer to a device private structure.
2424 * @kernel_commands: Pointer to the unpatched command batch.
2425 * @command_size: Size of the unpatched command batch.
2426 * @sw_context: Structure holding the relocation lists.
2427 *
2428 * Side effects: If this function returns 0, then the command batch
2429 * pointed to by @kernel_commands will have been modified.
2430 */
2431static int vmw_execbuf_submit_fifo(struct vmw_private *dev_priv,
2432 void *kernel_commands,
2433 u32 command_size,
2434 struct vmw_sw_context *sw_context)
2435{
2436 void *cmd = vmw_fifo_reserve(dev_priv, command_size);
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002437
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002438 if (!cmd) {
2439 DRM_ERROR("Failed reserving fifo space for commands.\n");
2440 return -ENOMEM;
2441 }
2442
2443 vmw_apply_relocations(sw_context);
2444 memcpy(cmd, kernel_commands, command_size);
2445 vmw_resource_relocations_apply(cmd, &sw_context->res_relocations);
2446 vmw_resource_relocations_free(&sw_context->res_relocations);
2447 vmw_fifo_commit(dev_priv, command_size);
2448
2449 return 0;
2450}
2451
2452/**
2453 * vmw_execbuf_submit_cmdbuf - Patch a command batch and submit it using
2454 * the command buffer manager.
2455 *
2456 * @dev_priv: Pointer to a device private structure.
2457 * @header: Opaque handle to the command buffer allocation.
2458 * @command_size: Size of the unpatched command batch.
2459 * @sw_context: Structure holding the relocation lists.
2460 *
2461 * Side effects: If this function returns 0, then the command buffer
2462 * represented by @header will have been modified.
2463 */
2464static int vmw_execbuf_submit_cmdbuf(struct vmw_private *dev_priv,
2465 struct vmw_cmdbuf_header *header,
2466 u32 command_size,
2467 struct vmw_sw_context *sw_context)
2468{
2469 void *cmd = vmw_cmdbuf_reserve(dev_priv->cman, command_size,
2470 SVGA3D_INVALID_ID, false, header);
2471
2472 vmw_apply_relocations(sw_context);
2473 vmw_resource_relocations_apply(cmd, &sw_context->res_relocations);
2474 vmw_resource_relocations_free(&sw_context->res_relocations);
2475 vmw_cmdbuf_commit(dev_priv->cman, command_size, header, false);
2476
2477 return 0;
2478}
2479
2480/**
2481 * vmw_execbuf_cmdbuf - Prepare, if possible, a user-space command batch for
2482 * submission using a command buffer.
2483 *
2484 * @dev_priv: Pointer to a device private structure.
2485 * @user_commands: User-space pointer to the commands to be submitted.
2486 * @command_size: Size of the unpatched command batch.
2487 * @header: Out parameter returning the opaque pointer to the command buffer.
2488 *
2489 * This function checks whether we can use the command buffer manager for
2490 * submission and if so, creates a command buffer of suitable size and
2491 * copies the user data into that buffer.
2492 *
2493 * On successful return, the function returns a pointer to the data in the
2494 * command buffer and *@header is set to non-NULL.
2495 * If command buffers could not be used, the function will return the value
2496 * of @kernel_commands on function call. That value may be NULL. In that case,
2497 * the value of *@header will be set to NULL.
2498 * If an error is encountered, the function will return a pointer error value.
2499 * If the function is interrupted by a signal while sleeping, it will return
2500 * -ERESTARTSYS casted to a pointer error value.
2501 */
2502void *vmw_execbuf_cmdbuf(struct vmw_private *dev_priv,
2503 void __user *user_commands,
2504 void *kernel_commands,
2505 u32 command_size,
2506 struct vmw_cmdbuf_header **header)
2507{
2508 size_t cmdbuf_size;
2509 int ret;
2510
2511 *header = NULL;
2512 if (!dev_priv->cman || kernel_commands)
2513 return kernel_commands;
2514
2515 if (command_size > SVGA_CB_MAX_SIZE) {
2516 DRM_ERROR("Command buffer is too large.\n");
2517 return ERR_PTR(-EINVAL);
2518 }
2519
2520 /* If possible, add a little space for fencing. */
2521 cmdbuf_size = command_size + 512;
2522 cmdbuf_size = min_t(size_t, cmdbuf_size, SVGA_CB_MAX_SIZE);
2523 kernel_commands = vmw_cmdbuf_alloc(dev_priv->cman, cmdbuf_size,
2524 true, header);
2525 if (IS_ERR(kernel_commands))
2526 return kernel_commands;
2527
2528 ret = copy_from_user(kernel_commands, user_commands,
2529 command_size);
2530 if (ret) {
2531 DRM_ERROR("Failed copying commands.\n");
2532 vmw_cmdbuf_header_free(*header);
2533 *header = NULL;
2534 return ERR_PTR(-EFAULT);
2535 }
2536
2537 return kernel_commands;
2538}
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002539
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002540int vmw_execbuf_process(struct drm_file *file_priv,
2541 struct vmw_private *dev_priv,
2542 void __user *user_commands,
2543 void *kernel_commands,
2544 uint32_t command_size,
2545 uint64_t throttle_us,
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002546 struct drm_vmw_fence_rep __user *user_fence_rep,
2547 struct vmw_fence_obj **out_fence)
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002548{
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002549 struct vmw_sw_context *sw_context = &dev_priv->ctx;
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002550 struct vmw_fence_obj *fence = NULL;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002551 struct vmw_resource *error_resource;
2552 struct list_head resource_list;
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002553 struct vmw_cmdbuf_header *header;
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002554 struct ww_acquire_ctx ticket;
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002555 uint32_t handle;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002556 int ret;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002557
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002558 if (throttle_us) {
2559 ret = vmw_wait_lag(dev_priv, &dev_priv->fifo.marker_queue,
2560 throttle_us);
2561
2562 if (ret)
2563 return ret;
2564 }
2565
2566 kernel_commands = vmw_execbuf_cmdbuf(dev_priv, user_commands,
2567 kernel_commands, command_size,
2568 &header);
2569 if (IS_ERR(kernel_commands))
2570 return PTR_ERR(kernel_commands);
2571
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002572 ret = mutex_lock_interruptible(&dev_priv->cmdbuf_mutex);
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002573 if (ret) {
2574 ret = -ERESTARTSYS;
2575 goto out_free_header;
2576 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002577
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002578 sw_context->kernel = false;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002579 if (kernel_commands == NULL) {
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002580 ret = vmw_resize_cmd_bounce(sw_context, command_size);
2581 if (unlikely(ret != 0))
2582 goto out_unlock;
2583
2584
2585 ret = copy_from_user(sw_context->cmd_bounce,
2586 user_commands, command_size);
2587
2588 if (unlikely(ret != 0)) {
2589 ret = -EFAULT;
2590 DRM_ERROR("Failed copying commands.\n");
2591 goto out_unlock;
2592 }
2593 kernel_commands = sw_context->cmd_bounce;
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002594 } else if (!header)
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002595 sw_context->kernel = true;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002596
Thomas Hellstromd5bde952014-01-31 10:12:10 +01002597 sw_context->fp = vmw_fpriv(file_priv);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002598 sw_context->cur_reloc = 0;
2599 sw_context->cur_val_buf = 0;
Thomas Hellstromf18c8842011-10-04 20:13:31 +02002600 INIT_LIST_HEAD(&sw_context->resource_list);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002601 sw_context->cur_query_bo = dev_priv->pinned_bo;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002602 sw_context->last_query_ctx = NULL;
2603 sw_context->needs_post_query_barrier = false;
2604 memset(sw_context->res_cache, 0, sizeof(sw_context->res_cache));
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002605 INIT_LIST_HEAD(&sw_context->validate_nodes);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002606 INIT_LIST_HEAD(&sw_context->res_relocations);
2607 if (!sw_context->res_ht_initialized) {
2608 ret = drm_ht_create(&sw_context->res_ht, VMW_RES_HT_ORDER);
2609 if (unlikely(ret != 0))
2610 goto out_unlock;
2611 sw_context->res_ht_initialized = true;
2612 }
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002613 INIT_LIST_HEAD(&sw_context->staged_cmd_res);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002614 INIT_LIST_HEAD(&resource_list);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002615 ret = vmw_cmd_check_all(dev_priv, sw_context, kernel_commands,
2616 command_size);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002617 if (unlikely(ret != 0))
Thomas Hellstromcf5e3412014-01-30 10:58:19 +01002618 goto out_err_nores;
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002619
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002620 ret = vmw_resources_reserve(sw_context);
2621 if (unlikely(ret != 0))
Thomas Hellstromcf5e3412014-01-30 10:58:19 +01002622 goto out_err_nores;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002623
Christian Königaa350712014-12-03 15:46:48 +01002624 ret = ttm_eu_reserve_buffers(&ticket, &sw_context->validate_nodes,
2625 true, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002626 if (unlikely(ret != 0))
2627 goto out_err;
2628
2629 ret = vmw_validate_buffers(dev_priv, sw_context);
2630 if (unlikely(ret != 0))
2631 goto out_err;
2632
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002633 ret = vmw_resources_validate(sw_context);
2634 if (unlikely(ret != 0))
2635 goto out_err;
Thomas Hellstrom1925d452010-05-28 11:21:57 +02002636
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07002637 ret = mutex_lock_interruptible(&dev_priv->binding_mutex);
2638 if (unlikely(ret != 0)) {
2639 ret = -ERESTARTSYS;
2640 goto out_err;
2641 }
2642
Thomas Hellstrom30f82d812014-02-05 08:13:56 +01002643 if (dev_priv->has_mob) {
2644 ret = vmw_rebind_contexts(sw_context);
2645 if (unlikely(ret != 0))
Dan Carpenterb2ad9882014-02-11 19:03:47 +03002646 goto out_unlock_binding;
Thomas Hellstrom30f82d812014-02-05 08:13:56 +01002647 }
2648
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002649 if (!header) {
2650 ret = vmw_execbuf_submit_fifo(dev_priv, kernel_commands,
2651 command_size, sw_context);
2652 } else {
2653 ret = vmw_execbuf_submit_cmdbuf(dev_priv, header, command_size,
2654 sw_context);
2655 header = NULL;
Thomas Hellstrombe38ab62011-08-31 07:42:54 +00002656 }
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002657 if (ret)
2658 goto out_unlock_binding;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002659
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002660 vmw_query_bo_switch_commit(dev_priv, sw_context);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002661 ret = vmw_execbuf_fence_commands(file_priv, dev_priv,
2662 &fence,
2663 (user_fence_rep) ? &handle : NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002664 /*
2665 * This error is harmless, because if fence submission fails,
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002666 * vmw_fifo_send_fence will sync. The error will be propagated to
2667 * user-space in @fence_rep
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002668 */
2669
2670 if (ret != 0)
2671 DRM_ERROR("Fence submission error. Syncing.\n");
2672
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002673 vmw_resource_list_unreserve(&sw_context->resource_list, false);
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07002674 mutex_unlock(&dev_priv->binding_mutex);
2675
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002676 ttm_eu_fence_buffer_objects(&ticket, &sw_context->validate_nodes,
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002677 (void *) fence);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002678
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002679 if (unlikely(dev_priv->pinned_bo != NULL &&
2680 !dev_priv->query_cid_valid))
2681 __vmw_execbuf_release_pinned_bo(dev_priv, fence);
2682
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002683 vmw_clear_validations(sw_context);
Thomas Hellstrom8bf445c2011-10-10 12:23:25 +02002684 vmw_execbuf_copy_fence_user(dev_priv, vmw_fpriv(file_priv), ret,
2685 user_fence_rep, fence, handle);
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002686
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002687 /* Don't unreference when handing fence out */
2688 if (unlikely(out_fence != NULL)) {
2689 *out_fence = fence;
2690 fence = NULL;
2691 } else if (likely(fence != NULL)) {
Thomas Hellstromae2a1042011-09-01 20:18:44 +00002692 vmw_fence_obj_unreference(&fence);
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002693 }
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002694
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002695 list_splice_init(&sw_context->resource_list, &resource_list);
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002696 vmw_cmdbuf_res_commit(&sw_context->staged_cmd_res);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002697 mutex_unlock(&dev_priv->cmdbuf_mutex);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002698
2699 /*
2700 * Unreference resources outside of the cmdbuf_mutex to
2701 * avoid deadlocks in resource destruction paths.
2702 */
2703 vmw_resource_list_unreference(&resource_list);
2704
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002705 return 0;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002706
Thomas Hellstrom173fb7d2013-10-08 02:32:36 -07002707out_unlock_binding:
2708 mutex_unlock(&dev_priv->binding_mutex);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002709out_err:
Thomas Hellstromcf5e3412014-01-30 10:58:19 +01002710 ttm_eu_backoff_reservation(&ticket, &sw_context->validate_nodes);
2711out_err_nores:
2712 vmw_resource_list_unreserve(&sw_context->resource_list, true);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002713 vmw_resource_relocations_free(&sw_context->res_relocations);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002714 vmw_free_relocations(sw_context);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002715 vmw_clear_validations(sw_context);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002716 if (unlikely(dev_priv->pinned_bo != NULL &&
2717 !dev_priv->query_cid_valid))
2718 __vmw_execbuf_release_pinned_bo(dev_priv, NULL);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002719out_unlock:
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002720 list_splice_init(&sw_context->resource_list, &resource_list);
2721 error_resource = sw_context->error_resource;
2722 sw_context->error_resource = NULL;
Thomas Hellstrom18e4a462014-06-09 12:39:22 +02002723 vmw_cmdbuf_res_revert(&sw_context->staged_cmd_res);
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002724 mutex_unlock(&dev_priv->cmdbuf_mutex);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002725
2726 /*
2727 * Unreference resources outside of the cmdbuf_mutex to
2728 * avoid deadlocks in resource destruction paths.
2729 */
2730 vmw_resource_list_unreference(&resource_list);
2731 if (unlikely(error_resource != NULL))
2732 vmw_resource_unreference(&error_resource);
Thomas Hellstrom3eab3d92015-06-25 11:57:56 -07002733out_free_header:
2734 if (header)
2735 vmw_cmdbuf_header_free(header);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002736
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002737 return ret;
2738}
2739
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002740/**
2741 * vmw_execbuf_unpin_panic - Idle the fifo and unpin the query buffer.
2742 *
2743 * @dev_priv: The device private structure.
2744 *
2745 * This function is called to idle the fifo and unpin the query buffer
2746 * if the normal way to do this hits an error, which should typically be
2747 * extremely rare.
2748 */
2749static void vmw_execbuf_unpin_panic(struct vmw_private *dev_priv)
2750{
2751 DRM_ERROR("Can't unpin query buffer. Trying to recover.\n");
2752
2753 (void) vmw_fallback_wait(dev_priv, false, true, 0, false, 10*HZ);
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002754 vmw_bo_pin_reserved(dev_priv->pinned_bo, false);
2755 if (dev_priv->dummy_query_bo_pinned) {
2756 vmw_bo_pin_reserved(dev_priv->dummy_query_bo, false);
2757 dev_priv->dummy_query_bo_pinned = false;
2758 }
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002759}
2760
2761
2762/**
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002763 * __vmw_execbuf_release_pinned_bo - Flush queries and unpin the pinned
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002764 * query bo.
2765 *
2766 * @dev_priv: The device private structure.
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002767 * @fence: If non-NULL should point to a struct vmw_fence_obj issued
2768 * _after_ a query barrier that flushes all queries touching the current
2769 * buffer pointed to by @dev_priv->pinned_bo
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002770 *
2771 * This function should be used to unpin the pinned query bo, or
2772 * as a query barrier when we need to make sure that all queries have
2773 * finished before the next fifo command. (For example on hardware
2774 * context destructions where the hardware may otherwise leak unfinished
2775 * queries).
2776 *
2777 * This function does not return any failure codes, but make attempts
2778 * to do safe unpinning in case of errors.
2779 *
2780 * The function will synchronize on the previous query barrier, and will
2781 * thus not finish until that barrier has executed.
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002782 *
2783 * the @dev_priv->cmdbuf_mutex needs to be held by the current thread
2784 * before calling this function.
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002785 */
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002786void __vmw_execbuf_release_pinned_bo(struct vmw_private *dev_priv,
2787 struct vmw_fence_obj *fence)
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002788{
2789 int ret = 0;
2790 struct list_head validate_list;
2791 struct ttm_validate_buffer pinned_val, query_val;
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002792 struct vmw_fence_obj *lfence = NULL;
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002793 struct ww_acquire_ctx ticket;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002794
2795 if (dev_priv->pinned_bo == NULL)
2796 goto out_unlock;
2797
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002798 INIT_LIST_HEAD(&validate_list);
2799
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002800 pinned_val.bo = ttm_bo_reference(&dev_priv->pinned_bo->base);
Christian Königae9c0af2014-09-04 20:01:52 +02002801 pinned_val.shared = false;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002802 list_add_tail(&pinned_val.head, &validate_list);
2803
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002804 query_val.bo = ttm_bo_reference(&dev_priv->dummy_query_bo->base);
Christian Königae9c0af2014-09-04 20:01:52 +02002805 query_val.shared = false;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002806 list_add_tail(&query_val.head, &validate_list);
2807
Christian Königaa350712014-12-03 15:46:48 +01002808 ret = ttm_eu_reserve_buffers(&ticket, &validate_list,
2809 false, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002810 if (unlikely(ret != 0)) {
2811 vmw_execbuf_unpin_panic(dev_priv);
2812 goto out_no_reserve;
2813 }
2814
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002815 if (dev_priv->query_cid_valid) {
2816 BUG_ON(fence != NULL);
2817 ret = vmw_fifo_emit_dummy_query(dev_priv, dev_priv->query_cid);
2818 if (unlikely(ret != 0)) {
2819 vmw_execbuf_unpin_panic(dev_priv);
2820 goto out_no_emit;
2821 }
2822 dev_priv->query_cid_valid = false;
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002823 }
2824
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002825 vmw_bo_pin_reserved(dev_priv->pinned_bo, false);
2826 if (dev_priv->dummy_query_bo_pinned) {
2827 vmw_bo_pin_reserved(dev_priv->dummy_query_bo, false);
2828 dev_priv->dummy_query_bo_pinned = false;
2829 }
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002830 if (fence == NULL) {
2831 (void) vmw_execbuf_fence_commands(NULL, dev_priv, &lfence,
2832 NULL);
2833 fence = lfence;
2834 }
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002835 ttm_eu_fence_buffer_objects(&ticket, &validate_list, (void *) fence);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002836 if (lfence != NULL)
2837 vmw_fence_obj_unreference(&lfence);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002838
2839 ttm_bo_unref(&query_val.bo);
2840 ttm_bo_unref(&pinned_val.bo);
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002841 vmw_dmabuf_unreference(&dev_priv->pinned_bo);
2842 DRM_INFO("Dummy query bo pin count: %d\n",
2843 dev_priv->dummy_query_bo->pin_count);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002844
2845out_unlock:
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002846 return;
2847
2848out_no_emit:
Maarten Lankhorstecff6652013-06-27 13:48:17 +02002849 ttm_eu_backoff_reservation(&ticket, &validate_list);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002850out_no_reserve:
2851 ttm_bo_unref(&query_val.bo);
2852 ttm_bo_unref(&pinned_val.bo);
Thomas Hellstrom459d0fa2015-06-26 00:25:37 -07002853 vmw_dmabuf_unreference(&dev_priv->pinned_bo);
Thomas Hellstromc0951b72012-11-20 12:19:35 +00002854}
2855
2856/**
2857 * vmw_execbuf_release_pinned_bo - Flush queries and unpin the pinned
2858 * query bo.
2859 *
2860 * @dev_priv: The device private structure.
2861 *
2862 * This function should be used to unpin the pinned query bo, or
2863 * as a query barrier when we need to make sure that all queries have
2864 * finished before the next fifo command. (For example on hardware
2865 * context destructions where the hardware may otherwise leak unfinished
2866 * queries).
2867 *
2868 * This function does not return any failure codes, but make attempts
2869 * to do safe unpinning in case of errors.
2870 *
2871 * The function will synchronize on the previous query barrier, and will
2872 * thus not finish until that barrier has executed.
2873 */
2874void vmw_execbuf_release_pinned_bo(struct vmw_private *dev_priv)
2875{
2876 mutex_lock(&dev_priv->cmdbuf_mutex);
2877 if (dev_priv->query_cid_valid)
2878 __vmw_execbuf_release_pinned_bo(dev_priv, NULL);
Thomas Hellstrome2fa3a72011-10-04 20:13:30 +02002879 mutex_unlock(&dev_priv->cmdbuf_mutex);
2880}
2881
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002882
2883int vmw_execbuf_ioctl(struct drm_device *dev, void *data,
2884 struct drm_file *file_priv)
2885{
2886 struct vmw_private *dev_priv = vmw_priv(dev);
2887 struct drm_vmw_execbuf_arg *arg = (struct drm_vmw_execbuf_arg *)data;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002888 int ret;
2889
2890 /*
2891 * This will allow us to extend the ioctl argument while
2892 * maintaining backwards compatibility:
2893 * We take different code paths depending on the value of
2894 * arg->version.
2895 */
2896
2897 if (unlikely(arg->version != DRM_VMW_EXECBUF_VERSION)) {
2898 DRM_ERROR("Incorrect execbuf version.\n");
2899 DRM_ERROR("You're running outdated experimental "
2900 "vmwgfx user-space drivers.");
2901 return -EINVAL;
2902 }
2903
Thomas Hellstrom294adf72014-02-27 12:34:51 +01002904 ret = ttm_read_lock(&dev_priv->reservation_sem, true);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002905 if (unlikely(ret != 0))
2906 return ret;
2907
2908 ret = vmw_execbuf_process(file_priv, dev_priv,
2909 (void __user *)(unsigned long)arg->commands,
2910 NULL, arg->command_size, arg->throttle_us,
Jakob Bornecrantzbb1bd2f2012-02-09 16:56:43 +01002911 (void __user *)(unsigned long)arg->fence_rep,
2912 NULL);
Thomas Hellstrom5151adb2015-03-09 01:56:21 -07002913 ttm_read_unlock(&dev_priv->reservation_sem);
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002914 if (unlikely(ret != 0))
Thomas Hellstrom5151adb2015-03-09 01:56:21 -07002915 return ret;
Thomas Hellstrom922ade02011-10-04 20:13:17 +02002916
2917 vmw_kms_cursor_post_execbuf(dev_priv);
2918
Thomas Hellstrom5151adb2015-03-09 01:56:21 -07002919 return 0;
Jakob Bornecrantzfb1d9732009-12-10 00:19:58 +00002920}