xref: /openbmc/linux/drivers/gpu/drm/vmwgfx/vmwgfx_bo.c (revision e2bd6bad)
1 // SPDX-License-Identifier: GPL-2.0 OR MIT
2 /**************************************************************************
3  *
4  * Copyright © 2011-2018 VMware, Inc., Palo Alto, CA., USA
5  * All Rights Reserved.
6  *
7  * Permission is hereby granted, free of charge, to any person obtaining a
8  * copy of this software and associated documentation files (the
9  * "Software"), to deal in the Software without restriction, including
10  * without limitation the rights to use, copy, modify, merge, publish,
11  * distribute, sub license, and/or sell copies of the Software, and to
12  * permit persons to whom the Software is furnished to do so, subject to
13  * the following conditions:
14  *
15  * The above copyright notice and this permission notice (including the
16  * next paragraph) shall be included in all copies or substantial portions
17  * of the Software.
18  *
19  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
20  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
21  * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
22  * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
23  * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
24  * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
25  * USE OR OTHER DEALINGS IN THE SOFTWARE.
26  *
27  **************************************************************************/
28 
29 #include <drm/ttm/ttm_placement.h>
30 
31 #include "vmwgfx_drv.h"
32 #include "ttm_object.h"
33 
34 
35 /**
36  * struct vmw_user_buffer_object - User-space-visible buffer object
37  *
38  * @prime: The prime object providing user visibility.
39  * @vbo: The struct vmw_buffer_object
40  */
41 struct vmw_user_buffer_object {
42 	struct ttm_prime_object prime;
43 	struct vmw_buffer_object vbo;
44 };
45 
46 
47 /**
48  * vmw_buffer_object - Convert a struct ttm_buffer_object to a struct
49  * vmw_buffer_object.
50  *
51  * @bo: Pointer to the TTM buffer object.
52  * Return: Pointer to the struct vmw_buffer_object embedding the
53  * TTM buffer object.
54  */
55 static struct vmw_buffer_object *
56 vmw_buffer_object(struct ttm_buffer_object *bo)
57 {
58 	return container_of(bo, struct vmw_buffer_object, base);
59 }
60 
61 
62 /**
63  * vmw_user_buffer_object - Convert a struct ttm_buffer_object to a struct
64  * vmw_user_buffer_object.
65  *
66  * @bo: Pointer to the TTM buffer object.
67  * Return: Pointer to the struct vmw_buffer_object embedding the TTM buffer
68  * object.
69  */
70 static struct vmw_user_buffer_object *
71 vmw_user_buffer_object(struct ttm_buffer_object *bo)
72 {
73 	struct vmw_buffer_object *vmw_bo = vmw_buffer_object(bo);
74 
75 	return container_of(vmw_bo, struct vmw_user_buffer_object, vbo);
76 }
77 
78 
79 /**
80  * vmw_bo_pin_in_placement - Validate a buffer to placement.
81  *
82  * @dev_priv:  Driver private.
83  * @buf:  DMA buffer to move.
84  * @placement:  The placement to pin it.
85  * @interruptible:  Use interruptible wait.
86  * Return: Zero on success, Negative error code on failure. In particular
87  * -ERESTARTSYS if interrupted by a signal
88  */
89 int vmw_bo_pin_in_placement(struct vmw_private *dev_priv,
90 			    struct vmw_buffer_object *buf,
91 			    struct ttm_placement *placement,
92 			    bool interruptible)
93 {
94 	struct ttm_operation_ctx ctx = {interruptible, false };
95 	struct ttm_buffer_object *bo = &buf->base;
96 	int ret;
97 	uint32_t new_flags;
98 
99 	ret = ttm_write_lock(&dev_priv->reservation_sem, interruptible);
100 	if (unlikely(ret != 0))
101 		return ret;
102 
103 	vmw_execbuf_release_pinned_bo(dev_priv);
104 
105 	ret = ttm_bo_reserve(bo, interruptible, false, NULL);
106 	if (unlikely(ret != 0))
107 		goto err;
108 
109 	if (buf->base.pin_count > 0)
110 		ret = ttm_bo_mem_compat(placement, &bo->mem,
111 					&new_flags) == true ? 0 : -EINVAL;
112 	else
113 		ret = ttm_bo_validate(bo, placement, &ctx);
114 
115 	if (!ret)
116 		vmw_bo_pin_reserved(buf, true);
117 
118 	ttm_bo_unreserve(bo);
119 
120 err:
121 	ttm_write_unlock(&dev_priv->reservation_sem);
122 	return ret;
123 }
124 
125 
126 /**
127  * vmw_bo_pin_in_vram_or_gmr - Move a buffer to vram or gmr.
128  *
129  * This function takes the reservation_sem in write mode.
130  * Flushes and unpins the query bo to avoid failures.
131  *
132  * @dev_priv:  Driver private.
133  * @buf:  DMA buffer to move.
134  * @interruptible:  Use interruptible wait.
135  * Return: Zero on success, Negative error code on failure. In particular
136  * -ERESTARTSYS if interrupted by a signal
137  */
138 int vmw_bo_pin_in_vram_or_gmr(struct vmw_private *dev_priv,
139 			      struct vmw_buffer_object *buf,
140 			      bool interruptible)
141 {
142 	struct ttm_operation_ctx ctx = {interruptible, false };
143 	struct ttm_buffer_object *bo = &buf->base;
144 	int ret;
145 	uint32_t new_flags;
146 
147 	ret = ttm_write_lock(&dev_priv->reservation_sem, interruptible);
148 	if (unlikely(ret != 0))
149 		return ret;
150 
151 	vmw_execbuf_release_pinned_bo(dev_priv);
152 
153 	ret = ttm_bo_reserve(bo, interruptible, false, NULL);
154 	if (unlikely(ret != 0))
155 		goto err;
156 
157 	if (buf->base.pin_count > 0) {
158 		ret = ttm_bo_mem_compat(&vmw_vram_gmr_placement, &bo->mem,
159 					&new_flags) == true ? 0 : -EINVAL;
160 		goto out_unreserve;
161 	}
162 
163 	ret = ttm_bo_validate(bo, &vmw_vram_gmr_placement, &ctx);
164 	if (likely(ret == 0) || ret == -ERESTARTSYS)
165 		goto out_unreserve;
166 
167 	ret = ttm_bo_validate(bo, &vmw_vram_placement, &ctx);
168 
169 out_unreserve:
170 	if (!ret)
171 		vmw_bo_pin_reserved(buf, true);
172 
173 	ttm_bo_unreserve(bo);
174 err:
175 	ttm_write_unlock(&dev_priv->reservation_sem);
176 	return ret;
177 }
178 
179 
180 /**
181  * vmw_bo_pin_in_vram - Move a buffer to vram.
182  *
183  * This function takes the reservation_sem in write mode.
184  * Flushes and unpins the query bo to avoid failures.
185  *
186  * @dev_priv:  Driver private.
187  * @buf:  DMA buffer to move.
188  * @interruptible:  Use interruptible wait.
189  * Return: Zero on success, Negative error code on failure. In particular
190  * -ERESTARTSYS if interrupted by a signal
191  */
192 int vmw_bo_pin_in_vram(struct vmw_private *dev_priv,
193 		       struct vmw_buffer_object *buf,
194 		       bool interruptible)
195 {
196 	return vmw_bo_pin_in_placement(dev_priv, buf, &vmw_vram_placement,
197 				       interruptible);
198 }
199 
200 
201 /**
202  * vmw_bo_pin_in_start_of_vram - Move a buffer to start of vram.
203  *
204  * This function takes the reservation_sem in write mode.
205  * Flushes and unpins the query bo to avoid failures.
206  *
207  * @dev_priv:  Driver private.
208  * @buf:  DMA buffer to pin.
209  * @interruptible:  Use interruptible wait.
210  * Return: Zero on success, Negative error code on failure. In particular
211  * -ERESTARTSYS if interrupted by a signal
212  */
213 int vmw_bo_pin_in_start_of_vram(struct vmw_private *dev_priv,
214 				struct vmw_buffer_object *buf,
215 				bool interruptible)
216 {
217 	struct ttm_operation_ctx ctx = {interruptible, false };
218 	struct ttm_buffer_object *bo = &buf->base;
219 	struct ttm_placement placement;
220 	struct ttm_place place;
221 	int ret = 0;
222 	uint32_t new_flags;
223 
224 	place = vmw_vram_placement.placement[0];
225 	place.lpfn = bo->mem.num_pages;
226 	placement.num_placement = 1;
227 	placement.placement = &place;
228 	placement.num_busy_placement = 1;
229 	placement.busy_placement = &place;
230 
231 	ret = ttm_write_lock(&dev_priv->reservation_sem, interruptible);
232 	if (unlikely(ret != 0))
233 		return ret;
234 
235 	vmw_execbuf_release_pinned_bo(dev_priv);
236 	ret = ttm_bo_reserve(bo, interruptible, false, NULL);
237 	if (unlikely(ret != 0))
238 		goto err_unlock;
239 
240 	/*
241 	 * Is this buffer already in vram but not at the start of it?
242 	 * In that case, evict it first because TTM isn't good at handling
243 	 * that situation.
244 	 */
245 	if (bo->mem.mem_type == TTM_PL_VRAM &&
246 	    bo->mem.start < bo->mem.num_pages &&
247 	    bo->mem.start > 0 &&
248 	    buf->base.pin_count == 0) {
249 		ctx.interruptible = false;
250 		(void) ttm_bo_validate(bo, &vmw_sys_placement, &ctx);
251 	}
252 
253 	if (buf->base.pin_count > 0)
254 		ret = ttm_bo_mem_compat(&placement, &bo->mem,
255 					&new_flags) == true ? 0 : -EINVAL;
256 	else
257 		ret = ttm_bo_validate(bo, &placement, &ctx);
258 
259 	/* For some reason we didn't end up at the start of vram */
260 	WARN_ON(ret == 0 && bo->mem.start != 0);
261 	if (!ret)
262 		vmw_bo_pin_reserved(buf, true);
263 
264 	ttm_bo_unreserve(bo);
265 err_unlock:
266 	ttm_write_unlock(&dev_priv->reservation_sem);
267 
268 	return ret;
269 }
270 
271 
272 /**
273  * vmw_bo_unpin - Unpin the buffer given buffer, does not move the buffer.
274  *
275  * This function takes the reservation_sem in write mode.
276  *
277  * @dev_priv:  Driver private.
278  * @buf:  DMA buffer to unpin.
279  * @interruptible:  Use interruptible wait.
280  * Return: Zero on success, Negative error code on failure. In particular
281  * -ERESTARTSYS if interrupted by a signal
282  */
283 int vmw_bo_unpin(struct vmw_private *dev_priv,
284 		 struct vmw_buffer_object *buf,
285 		 bool interruptible)
286 {
287 	struct ttm_buffer_object *bo = &buf->base;
288 	int ret;
289 
290 	ret = ttm_read_lock(&dev_priv->reservation_sem, interruptible);
291 	if (unlikely(ret != 0))
292 		return ret;
293 
294 	ret = ttm_bo_reserve(bo, interruptible, false, NULL);
295 	if (unlikely(ret != 0))
296 		goto err;
297 
298 	vmw_bo_pin_reserved(buf, false);
299 
300 	ttm_bo_unreserve(bo);
301 
302 err:
303 	ttm_read_unlock(&dev_priv->reservation_sem);
304 	return ret;
305 }
306 
307 /**
308  * vmw_bo_get_guest_ptr - Get the guest ptr representing the current placement
309  * of a buffer.
310  *
311  * @bo: Pointer to a struct ttm_buffer_object. Must be pinned or reserved.
312  * @ptr: SVGAGuestPtr returning the result.
313  */
314 void vmw_bo_get_guest_ptr(const struct ttm_buffer_object *bo,
315 			  SVGAGuestPtr *ptr)
316 {
317 	if (bo->mem.mem_type == TTM_PL_VRAM) {
318 		ptr->gmrId = SVGA_GMR_FRAMEBUFFER;
319 		ptr->offset = bo->mem.start << PAGE_SHIFT;
320 	} else {
321 		ptr->gmrId = bo->mem.start;
322 		ptr->offset = 0;
323 	}
324 }
325 
326 
327 /**
328  * vmw_bo_pin_reserved - Pin or unpin a buffer object without moving it.
329  *
330  * @vbo: The buffer object. Must be reserved.
331  * @pin: Whether to pin or unpin.
332  *
333  */
334 void vmw_bo_pin_reserved(struct vmw_buffer_object *vbo, bool pin)
335 {
336 	struct ttm_operation_ctx ctx = { false, true };
337 	struct ttm_place pl;
338 	struct ttm_placement placement;
339 	struct ttm_buffer_object *bo = &vbo->base;
340 	uint32_t old_mem_type = bo->mem.mem_type;
341 	int ret;
342 
343 	dma_resv_assert_held(bo->base.resv);
344 
345 	if (pin == !!bo->pin_count)
346 		return;
347 
348 	pl.fpfn = 0;
349 	pl.lpfn = 0;
350 	pl.mem_type = bo->mem.mem_type;
351 	pl.flags = bo->mem.placement;
352 
353 	memset(&placement, 0, sizeof(placement));
354 	placement.num_placement = 1;
355 	placement.placement = &pl;
356 
357 	ret = ttm_bo_validate(bo, &placement, &ctx);
358 
359 	BUG_ON(ret != 0 || bo->mem.mem_type != old_mem_type);
360 
361 	if (pin)
362 		ttm_bo_pin(bo);
363 	else
364 		ttm_bo_unpin(bo);
365 }
366 
367 /**
368  * vmw_bo_map_and_cache - Map a buffer object and cache the map
369  *
370  * @vbo: The buffer object to map
371  * Return: A kernel virtual address or NULL if mapping failed.
372  *
373  * This function maps a buffer object into the kernel address space, or
374  * returns the virtual kernel address of an already existing map. The virtual
375  * address remains valid as long as the buffer object is pinned or reserved.
376  * The cached map is torn down on either
377  * 1) Buffer object move
378  * 2) Buffer object swapout
379  * 3) Buffer object destruction
380  *
381  */
382 void *vmw_bo_map_and_cache(struct vmw_buffer_object *vbo)
383 {
384 	struct ttm_buffer_object *bo = &vbo->base;
385 	bool not_used;
386 	void *virtual;
387 	int ret;
388 
389 	virtual = ttm_kmap_obj_virtual(&vbo->map, &not_used);
390 	if (virtual)
391 		return virtual;
392 
393 	ret = ttm_bo_kmap(bo, 0, bo->mem.num_pages, &vbo->map);
394 	if (ret)
395 		DRM_ERROR("Buffer object map failed: %d.\n", ret);
396 
397 	return ttm_kmap_obj_virtual(&vbo->map, &not_used);
398 }
399 
400 
401 /**
402  * vmw_bo_unmap - Tear down a cached buffer object map.
403  *
404  * @vbo: The buffer object whose map we are tearing down.
405  *
406  * This function tears down a cached map set up using
407  * vmw_buffer_object_map_and_cache().
408  */
409 void vmw_bo_unmap(struct vmw_buffer_object *vbo)
410 {
411 	if (vbo->map.bo == NULL)
412 		return;
413 
414 	ttm_bo_kunmap(&vbo->map);
415 }
416 
417 
418 /**
419  * vmw_bo_acc_size - Calculate the pinned memory usage of buffers
420  *
421  * @dev_priv: Pointer to a struct vmw_private identifying the device.
422  * @size: The requested buffer size.
423  * @user: Whether this is an ordinary dma buffer or a user dma buffer.
424  */
425 static size_t vmw_bo_acc_size(struct vmw_private *dev_priv, size_t size,
426 			      bool user)
427 {
428 	static size_t struct_size, user_struct_size;
429 	size_t num_pages = PAGE_ALIGN(size) >> PAGE_SHIFT;
430 	size_t page_array_size = ttm_round_pot(num_pages * sizeof(void *));
431 
432 	if (unlikely(struct_size == 0)) {
433 		size_t backend_size = ttm_round_pot(vmw_tt_size);
434 
435 		struct_size = backend_size +
436 			ttm_round_pot(sizeof(struct vmw_buffer_object));
437 		user_struct_size = backend_size +
438 		  ttm_round_pot(sizeof(struct vmw_user_buffer_object)) +
439 				      TTM_OBJ_EXTRA_SIZE;
440 	}
441 
442 	if (dev_priv->map_mode == vmw_dma_alloc_coherent)
443 		page_array_size +=
444 			ttm_round_pot(num_pages * sizeof(dma_addr_t));
445 
446 	return ((user) ? user_struct_size : struct_size) +
447 		page_array_size;
448 }
449 
450 
451 /**
452  * vmw_bo_bo_free - vmw buffer object destructor
453  *
454  * @bo: Pointer to the embedded struct ttm_buffer_object
455  */
456 void vmw_bo_bo_free(struct ttm_buffer_object *bo)
457 {
458 	struct vmw_buffer_object *vmw_bo = vmw_buffer_object(bo);
459 
460 	WARN_ON(vmw_bo->dirty);
461 	WARN_ON(!RB_EMPTY_ROOT(&vmw_bo->res_tree));
462 	vmw_bo_unmap(vmw_bo);
463 	kfree(vmw_bo);
464 }
465 
466 
467 /**
468  * vmw_user_bo_destroy - vmw buffer object destructor
469  *
470  * @bo: Pointer to the embedded struct ttm_buffer_object
471  */
472 static void vmw_user_bo_destroy(struct ttm_buffer_object *bo)
473 {
474 	struct vmw_user_buffer_object *vmw_user_bo = vmw_user_buffer_object(bo);
475 	struct vmw_buffer_object *vbo = &vmw_user_bo->vbo;
476 
477 	WARN_ON(vbo->dirty);
478 	WARN_ON(!RB_EMPTY_ROOT(&vbo->res_tree));
479 	vmw_bo_unmap(vbo);
480 	ttm_prime_object_kfree(vmw_user_bo, prime);
481 }
482 
483 /**
484  * vmw_bo_create_kernel - Create a pinned BO for internal kernel use.
485  *
486  * @dev_priv: Pointer to the device private struct
487  * @size: size of the BO we need
488  * @placement: where to put it
489  * @p_bo: resulting BO
490  *
491  * Creates and pin a simple BO for in kernel use.
492  */
493 int vmw_bo_create_kernel(struct vmw_private *dev_priv, unsigned long size,
494 			 struct ttm_placement *placement,
495 			 struct ttm_buffer_object **p_bo)
496 {
497 	unsigned npages = PAGE_ALIGN(size) >> PAGE_SHIFT;
498 	struct ttm_operation_ctx ctx = { false, false };
499 	struct ttm_buffer_object *bo;
500 	size_t acc_size;
501 	int ret;
502 
503 	bo = kzalloc(sizeof(*bo), GFP_KERNEL);
504 	if (unlikely(!bo))
505 		return -ENOMEM;
506 
507 	acc_size = ttm_round_pot(sizeof(*bo));
508 	acc_size += ttm_round_pot(npages * sizeof(void *));
509 	acc_size += ttm_round_pot(sizeof(struct ttm_tt));
510 
511 	ret = ttm_mem_global_alloc(&ttm_mem_glob, acc_size, &ctx);
512 	if (unlikely(ret))
513 		goto error_free;
514 
515 	ret = ttm_bo_init_reserved(&dev_priv->bdev, bo, size,
516 				   ttm_bo_type_device, placement, 0,
517 				   &ctx, NULL, NULL, NULL);
518 	if (unlikely(ret))
519 		goto error_account;
520 
521 	ttm_bo_pin(bo);
522 	ttm_bo_unreserve(bo);
523 	*p_bo = bo;
524 
525 	return 0;
526 
527 error_account:
528 	ttm_mem_global_free(&ttm_mem_glob, acc_size);
529 
530 error_free:
531 	kfree(bo);
532 	return ret;
533 }
534 
535 /**
536  * vmw_bo_init - Initialize a vmw buffer object
537  *
538  * @dev_priv: Pointer to the device private struct
539  * @vmw_bo: Pointer to the struct vmw_buffer_object to initialize.
540  * @size: Buffer object size in bytes.
541  * @placement: Initial placement.
542  * @interruptible: Whether waits should be performed interruptible.
543  * @pin: If the BO should be created pinned at a fixed location.
544  * @bo_free: The buffer object destructor.
545  * Returns: Zero on success, negative error code on error.
546  *
547  * Note that on error, the code will free the buffer object.
548  */
549 int vmw_bo_init(struct vmw_private *dev_priv,
550 		struct vmw_buffer_object *vmw_bo,
551 		size_t size, struct ttm_placement *placement,
552 		bool interruptible, bool pin,
553 		void (*bo_free)(struct ttm_buffer_object *bo))
554 {
555 	struct ttm_operation_ctx ctx = { interruptible, false };
556 	struct ttm_device *bdev = &dev_priv->bdev;
557 	size_t acc_size;
558 	int ret;
559 	bool user = (bo_free == &vmw_user_bo_destroy);
560 
561 	WARN_ON_ONCE(!bo_free && (!user && (bo_free != vmw_bo_bo_free)));
562 
563 	acc_size = vmw_bo_acc_size(dev_priv, size, user);
564 	memset(vmw_bo, 0, sizeof(*vmw_bo));
565 	BUILD_BUG_ON(TTM_MAX_BO_PRIORITY <= 3);
566 	vmw_bo->base.priority = 3;
567 	vmw_bo->res_tree = RB_ROOT;
568 
569 	ret = ttm_mem_global_alloc(&ttm_mem_glob, acc_size, &ctx);
570 	if (unlikely(ret))
571 		return ret;
572 
573 	ret = ttm_bo_init_reserved(bdev, &vmw_bo->base, size,
574 				   ttm_bo_type_device, placement,
575 				   0, &ctx, NULL, NULL, bo_free);
576 	if (unlikely(ret)) {
577 		ttm_mem_global_free(&ttm_mem_glob, acc_size);
578 		return ret;
579 	}
580 
581 	if (pin)
582 		ttm_bo_pin(&vmw_bo->base);
583 	ttm_bo_unreserve(&vmw_bo->base);
584 	return 0;
585 }
586 
587 
588 /**
589  * vmw_user_bo_release - TTM reference base object release callback for
590  * vmw user buffer objects
591  *
592  * @p_base: The TTM base object pointer about to be unreferenced.
593  *
594  * Clears the TTM base object pointer and drops the reference the
595  * base object has on the underlying struct vmw_buffer_object.
596  */
597 static void vmw_user_bo_release(struct ttm_base_object **p_base)
598 {
599 	struct vmw_user_buffer_object *vmw_user_bo;
600 	struct ttm_base_object *base = *p_base;
601 
602 	*p_base = NULL;
603 
604 	if (unlikely(base == NULL))
605 		return;
606 
607 	vmw_user_bo = container_of(base, struct vmw_user_buffer_object,
608 				   prime.base);
609 	ttm_bo_put(&vmw_user_bo->vbo.base);
610 }
611 
612 
613 /**
614  * vmw_user_bo_ref_obj-release - TTM synccpu reference object release callback
615  * for vmw user buffer objects
616  *
617  * @base: Pointer to the TTM base object
618  * @ref_type: Reference type of the reference reaching zero.
619  *
620  * Called when user-space drops its last synccpu reference on the buffer
621  * object, Either explicitly or as part of a cleanup file close.
622  */
623 static void vmw_user_bo_ref_obj_release(struct ttm_base_object *base,
624 					enum ttm_ref_type ref_type)
625 {
626 	struct vmw_user_buffer_object *user_bo;
627 
628 	user_bo = container_of(base, struct vmw_user_buffer_object, prime.base);
629 
630 	switch (ref_type) {
631 	case TTM_REF_SYNCCPU_WRITE:
632 		atomic_dec(&user_bo->vbo.cpu_writers);
633 		break;
634 	default:
635 		WARN_ONCE(true, "Undefined buffer object reference release.\n");
636 	}
637 }
638 
639 
640 /**
641  * vmw_user_bo_alloc - Allocate a user buffer object
642  *
643  * @dev_priv: Pointer to a struct device private.
644  * @tfile: Pointer to a struct ttm_object_file on which to register the user
645  * object.
646  * @size: Size of the buffer object.
647  * @shareable: Boolean whether the buffer is shareable with other open files.
648  * @handle: Pointer to where the handle value should be assigned.
649  * @p_vbo: Pointer to where the refcounted struct vmw_buffer_object pointer
650  * should be assigned.
651  * @p_base: The TTM base object pointer about to be allocated.
652  * Return: Zero on success, negative error code on error.
653  */
654 int vmw_user_bo_alloc(struct vmw_private *dev_priv,
655 		      struct ttm_object_file *tfile,
656 		      uint32_t size,
657 		      bool shareable,
658 		      uint32_t *handle,
659 		      struct vmw_buffer_object **p_vbo,
660 		      struct ttm_base_object **p_base)
661 {
662 	struct vmw_user_buffer_object *user_bo;
663 	int ret;
664 
665 	user_bo = kzalloc(sizeof(*user_bo), GFP_KERNEL);
666 	if (unlikely(!user_bo)) {
667 		DRM_ERROR("Failed to allocate a buffer.\n");
668 		return -ENOMEM;
669 	}
670 
671 	ret = vmw_bo_init(dev_priv, &user_bo->vbo, size,
672 			  (dev_priv->has_mob) ?
673 			  &vmw_sys_placement :
674 			  &vmw_vram_sys_placement, true, false,
675 			  &vmw_user_bo_destroy);
676 	if (unlikely(ret != 0))
677 		return ret;
678 
679 	ttm_bo_get(&user_bo->vbo.base);
680 	ret = ttm_prime_object_init(tfile,
681 				    size,
682 				    &user_bo->prime,
683 				    shareable,
684 				    ttm_buffer_type,
685 				    &vmw_user_bo_release,
686 				    &vmw_user_bo_ref_obj_release);
687 	if (unlikely(ret != 0)) {
688 		ttm_bo_put(&user_bo->vbo.base);
689 		goto out_no_base_object;
690 	}
691 
692 	*p_vbo = &user_bo->vbo;
693 	if (p_base) {
694 		*p_base = &user_bo->prime.base;
695 		kref_get(&(*p_base)->refcount);
696 	}
697 	*handle = user_bo->prime.base.handle;
698 
699 out_no_base_object:
700 	return ret;
701 }
702 
703 
704 /**
705  * vmw_user_bo_verify_access - verify access permissions on this
706  * buffer object.
707  *
708  * @bo: Pointer to the buffer object being accessed
709  * @tfile: Identifying the caller.
710  */
711 int vmw_user_bo_verify_access(struct ttm_buffer_object *bo,
712 			      struct ttm_object_file *tfile)
713 {
714 	struct vmw_user_buffer_object *vmw_user_bo;
715 
716 	if (unlikely(bo->destroy != vmw_user_bo_destroy))
717 		return -EPERM;
718 
719 	vmw_user_bo = vmw_user_buffer_object(bo);
720 
721 	/* Check that the caller has opened the object. */
722 	if (likely(ttm_ref_object_exists(tfile, &vmw_user_bo->prime.base)))
723 		return 0;
724 
725 	DRM_ERROR("Could not grant buffer access.\n");
726 	return -EPERM;
727 }
728 
729 
730 /**
731  * vmw_user_bo_synccpu_grab - Grab a struct vmw_user_buffer_object for cpu
732  * access, idling previous GPU operations on the buffer and optionally
733  * blocking it for further command submissions.
734  *
735  * @user_bo: Pointer to the buffer object being grabbed for CPU access
736  * @tfile: Identifying the caller.
737  * @flags: Flags indicating how the grab should be performed.
738  * Return: Zero on success, Negative error code on error. In particular,
739  * -EBUSY will be returned if a dontblock operation is requested and the
740  * buffer object is busy, and -ERESTARTSYS will be returned if a wait is
741  * interrupted by a signal.
742  *
743  * A blocking grab will be automatically released when @tfile is closed.
744  */
745 static int vmw_user_bo_synccpu_grab(struct vmw_user_buffer_object *user_bo,
746 				    struct ttm_object_file *tfile,
747 				    uint32_t flags)
748 {
749 	bool nonblock = !!(flags & drm_vmw_synccpu_dontblock);
750 	struct ttm_buffer_object *bo = &user_bo->vbo.base;
751 	bool existed;
752 	int ret;
753 
754 	if (flags & drm_vmw_synccpu_allow_cs) {
755 		long lret;
756 
757 		lret = dma_resv_wait_timeout_rcu
758 			(bo->base.resv, true, true,
759 			 nonblock ? 0 : MAX_SCHEDULE_TIMEOUT);
760 		if (!lret)
761 			return -EBUSY;
762 		else if (lret < 0)
763 			return lret;
764 		return 0;
765 	}
766 
767 	ret = ttm_bo_reserve(bo, true, nonblock, NULL);
768 	if (unlikely(ret != 0))
769 		return ret;
770 
771 	ret = ttm_bo_wait(bo, true, nonblock);
772 	if (likely(ret == 0))
773 		atomic_inc(&user_bo->vbo.cpu_writers);
774 
775 	ttm_bo_unreserve(bo);
776 	if (unlikely(ret != 0))
777 		return ret;
778 
779 	ret = ttm_ref_object_add(tfile, &user_bo->prime.base,
780 				 TTM_REF_SYNCCPU_WRITE, &existed, false);
781 	if (ret != 0 || existed)
782 		atomic_dec(&user_bo->vbo.cpu_writers);
783 
784 	return ret;
785 }
786 
787 /**
788  * vmw_user_bo_synccpu_release - Release a previous grab for CPU access,
789  * and unblock command submission on the buffer if blocked.
790  *
791  * @handle: Handle identifying the buffer object.
792  * @tfile: Identifying the caller.
793  * @flags: Flags indicating the type of release.
794  */
795 static int vmw_user_bo_synccpu_release(uint32_t handle,
796 					   struct ttm_object_file *tfile,
797 					   uint32_t flags)
798 {
799 	if (!(flags & drm_vmw_synccpu_allow_cs))
800 		return ttm_ref_object_base_unref(tfile, handle,
801 						 TTM_REF_SYNCCPU_WRITE);
802 
803 	return 0;
804 }
805 
806 
807 /**
808  * vmw_user_bo_synccpu_ioctl - ioctl function implementing the synccpu
809  * functionality.
810  *
811  * @dev: Identifies the drm device.
812  * @data: Pointer to the ioctl argument.
813  * @file_priv: Identifies the caller.
814  * Return: Zero on success, negative error code on error.
815  *
816  * This function checks the ioctl arguments for validity and calls the
817  * relevant synccpu functions.
818  */
819 int vmw_user_bo_synccpu_ioctl(struct drm_device *dev, void *data,
820 			      struct drm_file *file_priv)
821 {
822 	struct drm_vmw_synccpu_arg *arg =
823 		(struct drm_vmw_synccpu_arg *) data;
824 	struct vmw_buffer_object *vbo;
825 	struct vmw_user_buffer_object *user_bo;
826 	struct ttm_object_file *tfile = vmw_fpriv(file_priv)->tfile;
827 	struct ttm_base_object *buffer_base;
828 	int ret;
829 
830 	if ((arg->flags & (drm_vmw_synccpu_read | drm_vmw_synccpu_write)) == 0
831 	    || (arg->flags & ~(drm_vmw_synccpu_read | drm_vmw_synccpu_write |
832 			       drm_vmw_synccpu_dontblock |
833 			       drm_vmw_synccpu_allow_cs)) != 0) {
834 		DRM_ERROR("Illegal synccpu flags.\n");
835 		return -EINVAL;
836 	}
837 
838 	switch (arg->op) {
839 	case drm_vmw_synccpu_grab:
840 		ret = vmw_user_bo_lookup(tfile, arg->handle, &vbo,
841 					     &buffer_base);
842 		if (unlikely(ret != 0))
843 			return ret;
844 
845 		user_bo = container_of(vbo, struct vmw_user_buffer_object,
846 				       vbo);
847 		ret = vmw_user_bo_synccpu_grab(user_bo, tfile, arg->flags);
848 		vmw_bo_unreference(&vbo);
849 		ttm_base_object_unref(&buffer_base);
850 		if (unlikely(ret != 0 && ret != -ERESTARTSYS &&
851 			     ret != -EBUSY)) {
852 			DRM_ERROR("Failed synccpu grab on handle 0x%08x.\n",
853 				  (unsigned int) arg->handle);
854 			return ret;
855 		}
856 		break;
857 	case drm_vmw_synccpu_release:
858 		ret = vmw_user_bo_synccpu_release(arg->handle, tfile,
859 						  arg->flags);
860 		if (unlikely(ret != 0)) {
861 			DRM_ERROR("Failed synccpu release on handle 0x%08x.\n",
862 				  (unsigned int) arg->handle);
863 			return ret;
864 		}
865 		break;
866 	default:
867 		DRM_ERROR("Invalid synccpu operation.\n");
868 		return -EINVAL;
869 	}
870 
871 	return 0;
872 }
873 
874 
875 /**
876  * vmw_bo_alloc_ioctl - ioctl function implementing the buffer object
877  * allocation functionality.
878  *
879  * @dev: Identifies the drm device.
880  * @data: Pointer to the ioctl argument.
881  * @file_priv: Identifies the caller.
882  * Return: Zero on success, negative error code on error.
883  *
884  * This function checks the ioctl arguments for validity and allocates a
885  * struct vmw_user_buffer_object bo.
886  */
887 int vmw_bo_alloc_ioctl(struct drm_device *dev, void *data,
888 		       struct drm_file *file_priv)
889 {
890 	struct vmw_private *dev_priv = vmw_priv(dev);
891 	union drm_vmw_alloc_dmabuf_arg *arg =
892 	    (union drm_vmw_alloc_dmabuf_arg *)data;
893 	struct drm_vmw_alloc_dmabuf_req *req = &arg->req;
894 	struct drm_vmw_dmabuf_rep *rep = &arg->rep;
895 	struct vmw_buffer_object *vbo;
896 	uint32_t handle;
897 	int ret;
898 
899 	ret = ttm_read_lock(&dev_priv->reservation_sem, true);
900 	if (unlikely(ret != 0))
901 		return ret;
902 
903 	ret = vmw_user_bo_alloc(dev_priv, vmw_fpriv(file_priv)->tfile,
904 				req->size, false, &handle, &vbo,
905 				NULL);
906 	if (unlikely(ret != 0))
907 		goto out_no_bo;
908 
909 	rep->handle = handle;
910 	rep->map_handle = drm_vma_node_offset_addr(&vbo->base.base.vma_node);
911 	rep->cur_gmr_id = handle;
912 	rep->cur_gmr_offset = 0;
913 
914 	vmw_bo_unreference(&vbo);
915 
916 out_no_bo:
917 	ttm_read_unlock(&dev_priv->reservation_sem);
918 
919 	return ret;
920 }
921 
922 
923 /**
924  * vmw_bo_unref_ioctl - Generic handle close ioctl.
925  *
926  * @dev: Identifies the drm device.
927  * @data: Pointer to the ioctl argument.
928  * @file_priv: Identifies the caller.
929  * Return: Zero on success, negative error code on error.
930  *
931  * This function checks the ioctl arguments for validity and closes a
932  * handle to a TTM base object, optionally freeing the object.
933  */
934 int vmw_bo_unref_ioctl(struct drm_device *dev, void *data,
935 		       struct drm_file *file_priv)
936 {
937 	struct drm_vmw_unref_dmabuf_arg *arg =
938 	    (struct drm_vmw_unref_dmabuf_arg *)data;
939 
940 	return ttm_ref_object_base_unref(vmw_fpriv(file_priv)->tfile,
941 					 arg->handle,
942 					 TTM_REF_USAGE);
943 }
944 
945 
946 /**
947  * vmw_user_bo_lookup - Look up a vmw user buffer object from a handle.
948  *
949  * @tfile: The TTM object file the handle is registered with.
950  * @handle: The user buffer object handle
951  * @out: Pointer to a where a pointer to the embedded
952  * struct vmw_buffer_object should be placed.
953  * @p_base: Pointer to where a pointer to the TTM base object should be
954  * placed, or NULL if no such pointer is required.
955  * Return: Zero on success, Negative error code on error.
956  *
957  * Both the output base object pointer and the vmw buffer object pointer
958  * will be refcounted.
959  */
960 int vmw_user_bo_lookup(struct ttm_object_file *tfile,
961 		       uint32_t handle, struct vmw_buffer_object **out,
962 		       struct ttm_base_object **p_base)
963 {
964 	struct vmw_user_buffer_object *vmw_user_bo;
965 	struct ttm_base_object *base;
966 
967 	base = ttm_base_object_lookup(tfile, handle);
968 	if (unlikely(base == NULL)) {
969 		DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
970 			  (unsigned long)handle);
971 		return -ESRCH;
972 	}
973 
974 	if (unlikely(ttm_base_object_type(base) != ttm_buffer_type)) {
975 		ttm_base_object_unref(&base);
976 		DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
977 			  (unsigned long)handle);
978 		return -EINVAL;
979 	}
980 
981 	vmw_user_bo = container_of(base, struct vmw_user_buffer_object,
982 				   prime.base);
983 	ttm_bo_get(&vmw_user_bo->vbo.base);
984 	if (p_base)
985 		*p_base = base;
986 	else
987 		ttm_base_object_unref(&base);
988 	*out = &vmw_user_bo->vbo;
989 
990 	return 0;
991 }
992 
993 /**
994  * vmw_user_bo_noref_lookup - Look up a vmw user buffer object without reference
995  * @tfile: The TTM object file the handle is registered with.
996  * @handle: The user buffer object handle.
997  *
998  * This function looks up a struct vmw_user_bo and returns a pointer to the
999  * struct vmw_buffer_object it derives from without refcounting the pointer.
1000  * The returned pointer is only valid until vmw_user_bo_noref_release() is
1001  * called, and the object pointed to by the returned pointer may be doomed.
1002  * Any persistent usage of the object requires a refcount to be taken using
1003  * ttm_bo_reference_unless_doomed(). Iff this function returns successfully it
1004  * needs to be paired with vmw_user_bo_noref_release() and no sleeping-
1005  * or scheduling functions may be called inbetween these function calls.
1006  *
1007  * Return: A struct vmw_buffer_object pointer if successful or negative
1008  * error pointer on failure.
1009  */
1010 struct vmw_buffer_object *
1011 vmw_user_bo_noref_lookup(struct ttm_object_file *tfile, u32 handle)
1012 {
1013 	struct vmw_user_buffer_object *vmw_user_bo;
1014 	struct ttm_base_object *base;
1015 
1016 	base = ttm_base_object_noref_lookup(tfile, handle);
1017 	if (!base) {
1018 		DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
1019 			  (unsigned long)handle);
1020 		return ERR_PTR(-ESRCH);
1021 	}
1022 
1023 	if (unlikely(ttm_base_object_type(base) != ttm_buffer_type)) {
1024 		ttm_base_object_noref_release();
1025 		DRM_ERROR("Invalid buffer object handle 0x%08lx.\n",
1026 			  (unsigned long)handle);
1027 		return ERR_PTR(-EINVAL);
1028 	}
1029 
1030 	vmw_user_bo = container_of(base, struct vmw_user_buffer_object,
1031 				   prime.base);
1032 	return &vmw_user_bo->vbo;
1033 }
1034 
1035 /**
1036  * vmw_user_bo_reference - Open a handle to a vmw user buffer object.
1037  *
1038  * @tfile: The TTM object file to register the handle with.
1039  * @vbo: The embedded vmw buffer object.
1040  * @handle: Pointer to where the new handle should be placed.
1041  * Return: Zero on success, Negative error code on error.
1042  */
1043 int vmw_user_bo_reference(struct ttm_object_file *tfile,
1044 			  struct vmw_buffer_object *vbo,
1045 			  uint32_t *handle)
1046 {
1047 	struct vmw_user_buffer_object *user_bo;
1048 
1049 	if (vbo->base.destroy != vmw_user_bo_destroy)
1050 		return -EINVAL;
1051 
1052 	user_bo = container_of(vbo, struct vmw_user_buffer_object, vbo);
1053 
1054 	*handle = user_bo->prime.base.handle;
1055 	return ttm_ref_object_add(tfile, &user_bo->prime.base,
1056 				  TTM_REF_USAGE, NULL, false);
1057 }
1058 
1059 
1060 /**
1061  * vmw_bo_fence_single - Utility function to fence a single TTM buffer
1062  *                       object without unreserving it.
1063  *
1064  * @bo:             Pointer to the struct ttm_buffer_object to fence.
1065  * @fence:          Pointer to the fence. If NULL, this function will
1066  *                  insert a fence into the command stream..
1067  *
1068  * Contrary to the ttm_eu version of this function, it takes only
1069  * a single buffer object instead of a list, and it also doesn't
1070  * unreserve the buffer object, which needs to be done separately.
1071  */
1072 void vmw_bo_fence_single(struct ttm_buffer_object *bo,
1073 			 struct vmw_fence_obj *fence)
1074 {
1075 	struct ttm_device *bdev = bo->bdev;
1076 
1077 	struct vmw_private *dev_priv =
1078 		container_of(bdev, struct vmw_private, bdev);
1079 
1080 	if (fence == NULL) {
1081 		vmw_execbuf_fence_commands(NULL, dev_priv, &fence, NULL);
1082 		dma_resv_add_excl_fence(bo->base.resv, &fence->base);
1083 		dma_fence_put(&fence->base);
1084 	} else
1085 		dma_resv_add_excl_fence(bo->base.resv, &fence->base);
1086 }
1087 
1088 
1089 /**
1090  * vmw_dumb_create - Create a dumb kms buffer
1091  *
1092  * @file_priv: Pointer to a struct drm_file identifying the caller.
1093  * @dev: Pointer to the drm device.
1094  * @args: Pointer to a struct drm_mode_create_dumb structure
1095  * Return: Zero on success, negative error code on failure.
1096  *
1097  * This is a driver callback for the core drm create_dumb functionality.
1098  * Note that this is very similar to the vmw_bo_alloc ioctl, except
1099  * that the arguments have a different format.
1100  */
1101 int vmw_dumb_create(struct drm_file *file_priv,
1102 		    struct drm_device *dev,
1103 		    struct drm_mode_create_dumb *args)
1104 {
1105 	struct vmw_private *dev_priv = vmw_priv(dev);
1106 	struct vmw_buffer_object *vbo;
1107 	int ret;
1108 
1109 	args->pitch = args->width * ((args->bpp + 7) / 8);
1110 	args->size = args->pitch * args->height;
1111 
1112 	ret = ttm_read_lock(&dev_priv->reservation_sem, true);
1113 	if (unlikely(ret != 0))
1114 		return ret;
1115 
1116 	ret = vmw_user_bo_alloc(dev_priv, vmw_fpriv(file_priv)->tfile,
1117 				    args->size, false, &args->handle,
1118 				    &vbo, NULL);
1119 	if (unlikely(ret != 0))
1120 		goto out_no_bo;
1121 
1122 	vmw_bo_unreference(&vbo);
1123 out_no_bo:
1124 	ttm_read_unlock(&dev_priv->reservation_sem);
1125 	return ret;
1126 }
1127 
1128 
1129 /**
1130  * vmw_dumb_map_offset - Return the address space offset of a dumb buffer
1131  *
1132  * @file_priv: Pointer to a struct drm_file identifying the caller.
1133  * @dev: Pointer to the drm device.
1134  * @handle: Handle identifying the dumb buffer.
1135  * @offset: The address space offset returned.
1136  * Return: Zero on success, negative error code on failure.
1137  *
1138  * This is a driver callback for the core drm dumb_map_offset functionality.
1139  */
1140 int vmw_dumb_map_offset(struct drm_file *file_priv,
1141 			struct drm_device *dev, uint32_t handle,
1142 			uint64_t *offset)
1143 {
1144 	struct ttm_object_file *tfile = vmw_fpriv(file_priv)->tfile;
1145 	struct vmw_buffer_object *out_buf;
1146 	int ret;
1147 
1148 	ret = vmw_user_bo_lookup(tfile, handle, &out_buf, NULL);
1149 	if (ret != 0)
1150 		return -EINVAL;
1151 
1152 	*offset = drm_vma_node_offset_addr(&out_buf->base.base.vma_node);
1153 	vmw_bo_unreference(&out_buf);
1154 	return 0;
1155 }
1156 
1157 
1158 /**
1159  * vmw_dumb_destroy - Destroy a dumb boffer
1160  *
1161  * @file_priv: Pointer to a struct drm_file identifying the caller.
1162  * @dev: Pointer to the drm device.
1163  * @handle: Handle identifying the dumb buffer.
1164  * Return: Zero on success, negative error code on failure.
1165  *
1166  * This is a driver callback for the core drm dumb_destroy functionality.
1167  */
1168 int vmw_dumb_destroy(struct drm_file *file_priv,
1169 		     struct drm_device *dev,
1170 		     uint32_t handle)
1171 {
1172 	return ttm_ref_object_base_unref(vmw_fpriv(file_priv)->tfile,
1173 					 handle, TTM_REF_USAGE);
1174 }
1175 
1176 
1177 /**
1178  * vmw_bo_swap_notify - swapout notify callback.
1179  *
1180  * @bo: The buffer object to be swapped out.
1181  */
1182 void vmw_bo_swap_notify(struct ttm_buffer_object *bo)
1183 {
1184 	/* Is @bo embedded in a struct vmw_buffer_object? */
1185 	if (bo->destroy != vmw_bo_bo_free &&
1186 	    bo->destroy != vmw_user_bo_destroy)
1187 		return;
1188 
1189 	/* Kill any cached kernel maps before swapout */
1190 	vmw_bo_unmap(vmw_buffer_object(bo));
1191 }
1192 
1193 
1194 /**
1195  * vmw_bo_move_notify - TTM move_notify_callback
1196  *
1197  * @bo: The TTM buffer object about to move.
1198  * @mem: The struct ttm_resource indicating to what memory
1199  *       region the move is taking place.
1200  *
1201  * Detaches cached maps and device bindings that require that the
1202  * buffer doesn't move.
1203  */
1204 void vmw_bo_move_notify(struct ttm_buffer_object *bo,
1205 			struct ttm_resource *mem)
1206 {
1207 	struct vmw_buffer_object *vbo;
1208 
1209 	/* Make sure @bo is embedded in a struct vmw_buffer_object? */
1210 	if (bo->destroy != vmw_bo_bo_free &&
1211 	    bo->destroy != vmw_user_bo_destroy)
1212 		return;
1213 
1214 	vbo = container_of(bo, struct vmw_buffer_object, base);
1215 
1216 	/*
1217 	 * Kill any cached kernel maps before move to or from VRAM.
1218 	 * With other types of moves, the underlying pages stay the same,
1219 	 * and the map can be kept.
1220 	 */
1221 	if (mem->mem_type == TTM_PL_VRAM || bo->mem.mem_type == TTM_PL_VRAM)
1222 		vmw_bo_unmap(vbo);
1223 
1224 	/*
1225 	 * If we're moving a backup MOB out of MOB placement, then make sure we
1226 	 * read back all resource content first, and unbind the MOB from
1227 	 * the resource.
1228 	 */
1229 	if (mem->mem_type != VMW_PL_MOB && bo->mem.mem_type == VMW_PL_MOB)
1230 		vmw_resource_unbind_list(vbo);
1231 }
1232