vmwgfx_buffer.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859
  1. /**************************************************************************
  2. *
  3. * Copyright © 2009 VMware, Inc., Palo Alto, CA., USA
  4. * All Rights Reserved.
  5. *
  6. * Permission is hereby granted, free of charge, to any person obtaining a
  7. * copy of this software and associated documentation files (the
  8. * "Software"), to deal in the Software without restriction, including
  9. * without limitation the rights to use, copy, modify, merge, publish,
  10. * distribute, sub license, and/or sell copies of the Software, and to
  11. * permit persons to whom the Software is furnished to do so, subject to
  12. * the following conditions:
  13. *
  14. * The above copyright notice and this permission notice (including the
  15. * next paragraph) shall be included in all copies or substantial portions
  16. * of the Software.
  17. *
  18. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  19. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  20. * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
  21. * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
  22. * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
  23. * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
  24. * USE OR OTHER DEALINGS IN THE SOFTWARE.
  25. *
  26. **************************************************************************/
  27. #include "vmwgfx_drv.h"
  28. #include <drm/ttm/ttm_bo_driver.h>
  29. #include <drm/ttm/ttm_placement.h>
  30. #include <drm/ttm/ttm_page_alloc.h>
  31. static uint32_t vram_placement_flags = TTM_PL_FLAG_VRAM |
  32. TTM_PL_FLAG_CACHED;
  33. static uint32_t vram_ne_placement_flags = TTM_PL_FLAG_VRAM |
  34. TTM_PL_FLAG_CACHED |
  35. TTM_PL_FLAG_NO_EVICT;
  36. static uint32_t sys_placement_flags = TTM_PL_FLAG_SYSTEM |
  37. TTM_PL_FLAG_CACHED;
  38. static uint32_t sys_ne_placement_flags = TTM_PL_FLAG_SYSTEM |
  39. TTM_PL_FLAG_CACHED |
  40. TTM_PL_FLAG_NO_EVICT;
  41. static uint32_t gmr_placement_flags = VMW_PL_FLAG_GMR |
  42. TTM_PL_FLAG_CACHED;
  43. static uint32_t gmr_ne_placement_flags = VMW_PL_FLAG_GMR |
  44. TTM_PL_FLAG_CACHED |
  45. TTM_PL_FLAG_NO_EVICT;
  46. static uint32_t mob_placement_flags = VMW_PL_FLAG_MOB |
  47. TTM_PL_FLAG_CACHED;
  48. struct ttm_placement vmw_vram_placement = {
  49. .fpfn = 0,
  50. .lpfn = 0,
  51. .num_placement = 1,
  52. .placement = &vram_placement_flags,
  53. .num_busy_placement = 1,
  54. .busy_placement = &vram_placement_flags
  55. };
  56. static uint32_t vram_gmr_placement_flags[] = {
  57. TTM_PL_FLAG_VRAM | TTM_PL_FLAG_CACHED,
  58. VMW_PL_FLAG_GMR | TTM_PL_FLAG_CACHED
  59. };
  60. static uint32_t gmr_vram_placement_flags[] = {
  61. VMW_PL_FLAG_GMR | TTM_PL_FLAG_CACHED,
  62. TTM_PL_FLAG_VRAM | TTM_PL_FLAG_CACHED
  63. };
  64. struct ttm_placement vmw_vram_gmr_placement = {
  65. .fpfn = 0,
  66. .lpfn = 0,
  67. .num_placement = 2,
  68. .placement = vram_gmr_placement_flags,
  69. .num_busy_placement = 1,
  70. .busy_placement = &gmr_placement_flags
  71. };
  72. static uint32_t vram_gmr_ne_placement_flags[] = {
  73. TTM_PL_FLAG_VRAM | TTM_PL_FLAG_CACHED | TTM_PL_FLAG_NO_EVICT,
  74. VMW_PL_FLAG_GMR | TTM_PL_FLAG_CACHED | TTM_PL_FLAG_NO_EVICT
  75. };
  76. struct ttm_placement vmw_vram_gmr_ne_placement = {
  77. .fpfn = 0,
  78. .lpfn = 0,
  79. .num_placement = 2,
  80. .placement = vram_gmr_ne_placement_flags,
  81. .num_busy_placement = 1,
  82. .busy_placement = &gmr_ne_placement_flags
  83. };
  84. struct ttm_placement vmw_vram_sys_placement = {
  85. .fpfn = 0,
  86. .lpfn = 0,
  87. .num_placement = 1,
  88. .placement = &vram_placement_flags,
  89. .num_busy_placement = 1,
  90. .busy_placement = &sys_placement_flags
  91. };
  92. struct ttm_placement vmw_vram_ne_placement = {
  93. .fpfn = 0,
  94. .lpfn = 0,
  95. .num_placement = 1,
  96. .placement = &vram_ne_placement_flags,
  97. .num_busy_placement = 1,
  98. .busy_placement = &vram_ne_placement_flags
  99. };
  100. struct ttm_placement vmw_sys_placement = {
  101. .fpfn = 0,
  102. .lpfn = 0,
  103. .num_placement = 1,
  104. .placement = &sys_placement_flags,
  105. .num_busy_placement = 1,
  106. .busy_placement = &sys_placement_flags
  107. };
  108. struct ttm_placement vmw_sys_ne_placement = {
  109. .fpfn = 0,
  110. .lpfn = 0,
  111. .num_placement = 1,
  112. .placement = &sys_ne_placement_flags,
  113. .num_busy_placement = 1,
  114. .busy_placement = &sys_ne_placement_flags
  115. };
  116. static uint32_t evictable_placement_flags[] = {
  117. TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED,
  118. TTM_PL_FLAG_VRAM | TTM_PL_FLAG_CACHED,
  119. VMW_PL_FLAG_GMR | TTM_PL_FLAG_CACHED,
  120. VMW_PL_FLAG_MOB | TTM_PL_FLAG_CACHED
  121. };
  122. struct ttm_placement vmw_evictable_placement = {
  123. .fpfn = 0,
  124. .lpfn = 0,
  125. .num_placement = 4,
  126. .placement = evictable_placement_flags,
  127. .num_busy_placement = 1,
  128. .busy_placement = &sys_placement_flags
  129. };
  130. struct ttm_placement vmw_srf_placement = {
  131. .fpfn = 0,
  132. .lpfn = 0,
  133. .num_placement = 1,
  134. .num_busy_placement = 2,
  135. .placement = &gmr_placement_flags,
  136. .busy_placement = gmr_vram_placement_flags
  137. };
  138. struct ttm_placement vmw_mob_placement = {
  139. .fpfn = 0,
  140. .lpfn = 0,
  141. .num_placement = 1,
  142. .num_busy_placement = 1,
  143. .placement = &mob_placement_flags,
  144. .busy_placement = &mob_placement_flags
  145. };
  146. struct vmw_ttm_tt {
  147. struct ttm_dma_tt dma_ttm;
  148. struct vmw_private *dev_priv;
  149. int gmr_id;
  150. struct vmw_mob *mob;
  151. int mem_type;
  152. struct sg_table sgt;
  153. struct vmw_sg_table vsgt;
  154. uint64_t sg_alloc_size;
  155. bool mapped;
  156. };
  157. const size_t vmw_tt_size = sizeof(struct vmw_ttm_tt);
  158. /**
  159. * Helper functions to advance a struct vmw_piter iterator.
  160. *
  161. * @viter: Pointer to the iterator.
  162. *
  163. * These functions return false if past the end of the list,
  164. * true otherwise. Functions are selected depending on the current
  165. * DMA mapping mode.
  166. */
  167. static bool __vmw_piter_non_sg_next(struct vmw_piter *viter)
  168. {
  169. return ++(viter->i) < viter->num_pages;
  170. }
  171. static bool __vmw_piter_sg_next(struct vmw_piter *viter)
  172. {
  173. return __sg_page_iter_next(&viter->iter);
  174. }
  175. /**
  176. * Helper functions to return a pointer to the current page.
  177. *
  178. * @viter: Pointer to the iterator
  179. *
  180. * These functions return a pointer to the page currently
  181. * pointed to by @viter. Functions are selected depending on the
  182. * current mapping mode.
  183. */
  184. static struct page *__vmw_piter_non_sg_page(struct vmw_piter *viter)
  185. {
  186. return viter->pages[viter->i];
  187. }
  188. static struct page *__vmw_piter_sg_page(struct vmw_piter *viter)
  189. {
  190. return sg_page_iter_page(&viter->iter);
  191. }
  192. /**
  193. * Helper functions to return the DMA address of the current page.
  194. *
  195. * @viter: Pointer to the iterator
  196. *
  197. * These functions return the DMA address of the page currently
  198. * pointed to by @viter. Functions are selected depending on the
  199. * current mapping mode.
  200. */
  201. static dma_addr_t __vmw_piter_phys_addr(struct vmw_piter *viter)
  202. {
  203. return page_to_phys(viter->pages[viter->i]);
  204. }
  205. static dma_addr_t __vmw_piter_dma_addr(struct vmw_piter *viter)
  206. {
  207. return viter->addrs[viter->i];
  208. }
  209. static dma_addr_t __vmw_piter_sg_addr(struct vmw_piter *viter)
  210. {
  211. return sg_page_iter_dma_address(&viter->iter);
  212. }
  213. /**
  214. * vmw_piter_start - Initialize a struct vmw_piter.
  215. *
  216. * @viter: Pointer to the iterator to initialize
  217. * @vsgt: Pointer to a struct vmw_sg_table to initialize from
  218. *
  219. * Note that we're following the convention of __sg_page_iter_start, so that
  220. * the iterator doesn't point to a valid page after initialization; it has
  221. * to be advanced one step first.
  222. */
  223. void vmw_piter_start(struct vmw_piter *viter, const struct vmw_sg_table *vsgt,
  224. unsigned long p_offset)
  225. {
  226. viter->i = p_offset - 1;
  227. viter->num_pages = vsgt->num_pages;
  228. switch (vsgt->mode) {
  229. case vmw_dma_phys:
  230. viter->next = &__vmw_piter_non_sg_next;
  231. viter->dma_address = &__vmw_piter_phys_addr;
  232. viter->page = &__vmw_piter_non_sg_page;
  233. viter->pages = vsgt->pages;
  234. break;
  235. case vmw_dma_alloc_coherent:
  236. viter->next = &__vmw_piter_non_sg_next;
  237. viter->dma_address = &__vmw_piter_dma_addr;
  238. viter->page = &__vmw_piter_non_sg_page;
  239. viter->addrs = vsgt->addrs;
  240. viter->pages = vsgt->pages;
  241. break;
  242. case vmw_dma_map_populate:
  243. case vmw_dma_map_bind:
  244. viter->next = &__vmw_piter_sg_next;
  245. viter->dma_address = &__vmw_piter_sg_addr;
  246. viter->page = &__vmw_piter_sg_page;
  247. __sg_page_iter_start(&viter->iter, vsgt->sgt->sgl,
  248. vsgt->sgt->orig_nents, p_offset);
  249. break;
  250. default:
  251. BUG();
  252. }
  253. }
  254. /**
  255. * vmw_ttm_unmap_from_dma - unmap device addresses previsouly mapped for
  256. * TTM pages
  257. *
  258. * @vmw_tt: Pointer to a struct vmw_ttm_backend
  259. *
  260. * Used to free dma mappings previously mapped by vmw_ttm_map_for_dma.
  261. */
  262. static void vmw_ttm_unmap_from_dma(struct vmw_ttm_tt *vmw_tt)
  263. {
  264. struct device *dev = vmw_tt->dev_priv->dev->dev;
  265. dma_unmap_sg(dev, vmw_tt->sgt.sgl, vmw_tt->sgt.nents,
  266. DMA_BIDIRECTIONAL);
  267. vmw_tt->sgt.nents = vmw_tt->sgt.orig_nents;
  268. }
  269. /**
  270. * vmw_ttm_map_for_dma - map TTM pages to get device addresses
  271. *
  272. * @vmw_tt: Pointer to a struct vmw_ttm_backend
  273. *
  274. * This function is used to get device addresses from the kernel DMA layer.
  275. * However, it's violating the DMA API in that when this operation has been
  276. * performed, it's illegal for the CPU to write to the pages without first
  277. * unmapping the DMA mappings, or calling dma_sync_sg_for_cpu(). It is
  278. * therefore only legal to call this function if we know that the function
  279. * dma_sync_sg_for_cpu() is a NOP, and dma_sync_sg_for_device() is at most
  280. * a CPU write buffer flush.
  281. */
  282. static int vmw_ttm_map_for_dma(struct vmw_ttm_tt *vmw_tt)
  283. {
  284. struct device *dev = vmw_tt->dev_priv->dev->dev;
  285. int ret;
  286. ret = dma_map_sg(dev, vmw_tt->sgt.sgl, vmw_tt->sgt.orig_nents,
  287. DMA_BIDIRECTIONAL);
  288. if (unlikely(ret == 0))
  289. return -ENOMEM;
  290. vmw_tt->sgt.nents = ret;
  291. return 0;
  292. }
  293. /**
  294. * vmw_ttm_map_dma - Make sure TTM pages are visible to the device
  295. *
  296. * @vmw_tt: Pointer to a struct vmw_ttm_tt
  297. *
  298. * Select the correct function for and make sure the TTM pages are
  299. * visible to the device. Allocate storage for the device mappings.
  300. * If a mapping has already been performed, indicated by the storage
  301. * pointer being non NULL, the function returns success.
  302. */
  303. static int vmw_ttm_map_dma(struct vmw_ttm_tt *vmw_tt)
  304. {
  305. struct vmw_private *dev_priv = vmw_tt->dev_priv;
  306. struct ttm_mem_global *glob = vmw_mem_glob(dev_priv);
  307. struct vmw_sg_table *vsgt = &vmw_tt->vsgt;
  308. struct vmw_piter iter;
  309. dma_addr_t old;
  310. int ret = 0;
  311. static size_t sgl_size;
  312. static size_t sgt_size;
  313. if (vmw_tt->mapped)
  314. return 0;
  315. vsgt->mode = dev_priv->map_mode;
  316. vsgt->pages = vmw_tt->dma_ttm.ttm.pages;
  317. vsgt->num_pages = vmw_tt->dma_ttm.ttm.num_pages;
  318. vsgt->addrs = vmw_tt->dma_ttm.dma_address;
  319. vsgt->sgt = &vmw_tt->sgt;
  320. switch (dev_priv->map_mode) {
  321. case vmw_dma_map_bind:
  322. case vmw_dma_map_populate:
  323. if (unlikely(!sgl_size)) {
  324. sgl_size = ttm_round_pot(sizeof(struct scatterlist));
  325. sgt_size = ttm_round_pot(sizeof(struct sg_table));
  326. }
  327. vmw_tt->sg_alloc_size = sgt_size + sgl_size * vsgt->num_pages;
  328. ret = ttm_mem_global_alloc(glob, vmw_tt->sg_alloc_size, false,
  329. true);
  330. if (unlikely(ret != 0))
  331. return ret;
  332. ret = sg_alloc_table_from_pages(&vmw_tt->sgt, vsgt->pages,
  333. vsgt->num_pages, 0,
  334. (unsigned long)
  335. vsgt->num_pages << PAGE_SHIFT,
  336. GFP_KERNEL);
  337. if (unlikely(ret != 0))
  338. goto out_sg_alloc_fail;
  339. if (vsgt->num_pages > vmw_tt->sgt.nents) {
  340. uint64_t over_alloc =
  341. sgl_size * (vsgt->num_pages -
  342. vmw_tt->sgt.nents);
  343. ttm_mem_global_free(glob, over_alloc);
  344. vmw_tt->sg_alloc_size -= over_alloc;
  345. }
  346. ret = vmw_ttm_map_for_dma(vmw_tt);
  347. if (unlikely(ret != 0))
  348. goto out_map_fail;
  349. break;
  350. default:
  351. break;
  352. }
  353. old = ~((dma_addr_t) 0);
  354. vmw_tt->vsgt.num_regions = 0;
  355. for (vmw_piter_start(&iter, vsgt, 0); vmw_piter_next(&iter);) {
  356. dma_addr_t cur = vmw_piter_dma_addr(&iter);
  357. if (cur != old + PAGE_SIZE)
  358. vmw_tt->vsgt.num_regions++;
  359. old = cur;
  360. }
  361. vmw_tt->mapped = true;
  362. return 0;
  363. out_map_fail:
  364. sg_free_table(vmw_tt->vsgt.sgt);
  365. vmw_tt->vsgt.sgt = NULL;
  366. out_sg_alloc_fail:
  367. ttm_mem_global_free(glob, vmw_tt->sg_alloc_size);
  368. return ret;
  369. }
  370. /**
  371. * vmw_ttm_unmap_dma - Tear down any TTM page device mappings
  372. *
  373. * @vmw_tt: Pointer to a struct vmw_ttm_tt
  374. *
  375. * Tear down any previously set up device DMA mappings and free
  376. * any storage space allocated for them. If there are no mappings set up,
  377. * this function is a NOP.
  378. */
  379. static void vmw_ttm_unmap_dma(struct vmw_ttm_tt *vmw_tt)
  380. {
  381. struct vmw_private *dev_priv = vmw_tt->dev_priv;
  382. if (!vmw_tt->vsgt.sgt)
  383. return;
  384. switch (dev_priv->map_mode) {
  385. case vmw_dma_map_bind:
  386. case vmw_dma_map_populate:
  387. vmw_ttm_unmap_from_dma(vmw_tt);
  388. sg_free_table(vmw_tt->vsgt.sgt);
  389. vmw_tt->vsgt.sgt = NULL;
  390. ttm_mem_global_free(vmw_mem_glob(dev_priv),
  391. vmw_tt->sg_alloc_size);
  392. break;
  393. default:
  394. break;
  395. }
  396. vmw_tt->mapped = false;
  397. }
  398. /**
  399. * vmw_bo_map_dma - Make sure buffer object pages are visible to the device
  400. *
  401. * @bo: Pointer to a struct ttm_buffer_object
  402. *
  403. * Wrapper around vmw_ttm_map_dma, that takes a TTM buffer object pointer
  404. * instead of a pointer to a struct vmw_ttm_backend as argument.
  405. * Note that the buffer object must be either pinned or reserved before
  406. * calling this function.
  407. */
  408. int vmw_bo_map_dma(struct ttm_buffer_object *bo)
  409. {
  410. struct vmw_ttm_tt *vmw_tt =
  411. container_of(bo->ttm, struct vmw_ttm_tt, dma_ttm.ttm);
  412. return vmw_ttm_map_dma(vmw_tt);
  413. }
  414. /**
  415. * vmw_bo_unmap_dma - Make sure buffer object pages are visible to the device
  416. *
  417. * @bo: Pointer to a struct ttm_buffer_object
  418. *
  419. * Wrapper around vmw_ttm_unmap_dma, that takes a TTM buffer object pointer
  420. * instead of a pointer to a struct vmw_ttm_backend as argument.
  421. */
  422. void vmw_bo_unmap_dma(struct ttm_buffer_object *bo)
  423. {
  424. struct vmw_ttm_tt *vmw_tt =
  425. container_of(bo->ttm, struct vmw_ttm_tt, dma_ttm.ttm);
  426. vmw_ttm_unmap_dma(vmw_tt);
  427. }
  428. /**
  429. * vmw_bo_sg_table - Return a struct vmw_sg_table object for a
  430. * TTM buffer object
  431. *
  432. * @bo: Pointer to a struct ttm_buffer_object
  433. *
  434. * Returns a pointer to a struct vmw_sg_table object. The object should
  435. * not be freed after use.
  436. * Note that for the device addresses to be valid, the buffer object must
  437. * either be reserved or pinned.
  438. */
  439. const struct vmw_sg_table *vmw_bo_sg_table(struct ttm_buffer_object *bo)
  440. {
  441. struct vmw_ttm_tt *vmw_tt =
  442. container_of(bo->ttm, struct vmw_ttm_tt, dma_ttm.ttm);
  443. return &vmw_tt->vsgt;
  444. }
  445. static int vmw_ttm_bind(struct ttm_tt *ttm, struct ttm_mem_reg *bo_mem)
  446. {
  447. struct vmw_ttm_tt *vmw_be =
  448. container_of(ttm, struct vmw_ttm_tt, dma_ttm.ttm);
  449. int ret;
  450. ret = vmw_ttm_map_dma(vmw_be);
  451. if (unlikely(ret != 0))
  452. return ret;
  453. vmw_be->gmr_id = bo_mem->start;
  454. vmw_be->mem_type = bo_mem->mem_type;
  455. switch (bo_mem->mem_type) {
  456. case VMW_PL_GMR:
  457. return vmw_gmr_bind(vmw_be->dev_priv, &vmw_be->vsgt,
  458. ttm->num_pages, vmw_be->gmr_id);
  459. case VMW_PL_MOB:
  460. if (unlikely(vmw_be->mob == NULL)) {
  461. vmw_be->mob =
  462. vmw_mob_create(ttm->num_pages);
  463. if (unlikely(vmw_be->mob == NULL))
  464. return -ENOMEM;
  465. }
  466. return vmw_mob_bind(vmw_be->dev_priv, vmw_be->mob,
  467. &vmw_be->vsgt, ttm->num_pages,
  468. vmw_be->gmr_id);
  469. default:
  470. BUG();
  471. }
  472. return 0;
  473. }
  474. static int vmw_ttm_unbind(struct ttm_tt *ttm)
  475. {
  476. struct vmw_ttm_tt *vmw_be =
  477. container_of(ttm, struct vmw_ttm_tt, dma_ttm.ttm);
  478. switch (vmw_be->mem_type) {
  479. case VMW_PL_GMR:
  480. vmw_gmr_unbind(vmw_be->dev_priv, vmw_be->gmr_id);
  481. break;
  482. case VMW_PL_MOB:
  483. vmw_mob_unbind(vmw_be->dev_priv, vmw_be->mob);
  484. break;
  485. default:
  486. BUG();
  487. }
  488. if (vmw_be->dev_priv->map_mode == vmw_dma_map_bind)
  489. vmw_ttm_unmap_dma(vmw_be);
  490. return 0;
  491. }
  492. static void vmw_ttm_destroy(struct ttm_tt *ttm)
  493. {
  494. struct vmw_ttm_tt *vmw_be =
  495. container_of(ttm, struct vmw_ttm_tt, dma_ttm.ttm);
  496. vmw_ttm_unmap_dma(vmw_be);
  497. if (vmw_be->dev_priv->map_mode == vmw_dma_alloc_coherent)
  498. ttm_dma_tt_fini(&vmw_be->dma_ttm);
  499. else
  500. ttm_tt_fini(ttm);
  501. if (vmw_be->mob)
  502. vmw_mob_destroy(vmw_be->mob);
  503. kfree(vmw_be);
  504. }
  505. static int vmw_ttm_populate(struct ttm_tt *ttm)
  506. {
  507. struct vmw_ttm_tt *vmw_tt =
  508. container_of(ttm, struct vmw_ttm_tt, dma_ttm.ttm);
  509. struct vmw_private *dev_priv = vmw_tt->dev_priv;
  510. struct ttm_mem_global *glob = vmw_mem_glob(dev_priv);
  511. int ret;
  512. if (ttm->state != tt_unpopulated)
  513. return 0;
  514. if (dev_priv->map_mode == vmw_dma_alloc_coherent) {
  515. size_t size =
  516. ttm_round_pot(ttm->num_pages * sizeof(dma_addr_t));
  517. ret = ttm_mem_global_alloc(glob, size, false, true);
  518. if (unlikely(ret != 0))
  519. return ret;
  520. ret = ttm_dma_populate(&vmw_tt->dma_ttm, dev_priv->dev->dev);
  521. if (unlikely(ret != 0))
  522. ttm_mem_global_free(glob, size);
  523. } else
  524. ret = ttm_pool_populate(ttm);
  525. return ret;
  526. }
  527. static void vmw_ttm_unpopulate(struct ttm_tt *ttm)
  528. {
  529. struct vmw_ttm_tt *vmw_tt = container_of(ttm, struct vmw_ttm_tt,
  530. dma_ttm.ttm);
  531. struct vmw_private *dev_priv = vmw_tt->dev_priv;
  532. struct ttm_mem_global *glob = vmw_mem_glob(dev_priv);
  533. if (vmw_tt->mob) {
  534. vmw_mob_destroy(vmw_tt->mob);
  535. vmw_tt->mob = NULL;
  536. }
  537. vmw_ttm_unmap_dma(vmw_tt);
  538. if (dev_priv->map_mode == vmw_dma_alloc_coherent) {
  539. size_t size =
  540. ttm_round_pot(ttm->num_pages * sizeof(dma_addr_t));
  541. ttm_dma_unpopulate(&vmw_tt->dma_ttm, dev_priv->dev->dev);
  542. ttm_mem_global_free(glob, size);
  543. } else
  544. ttm_pool_unpopulate(ttm);
  545. }
  546. static struct ttm_backend_func vmw_ttm_func = {
  547. .bind = vmw_ttm_bind,
  548. .unbind = vmw_ttm_unbind,
  549. .destroy = vmw_ttm_destroy,
  550. };
  551. static struct ttm_tt *vmw_ttm_tt_create(struct ttm_bo_device *bdev,
  552. unsigned long size, uint32_t page_flags,
  553. struct page *dummy_read_page)
  554. {
  555. struct vmw_ttm_tt *vmw_be;
  556. int ret;
  557. vmw_be = kzalloc(sizeof(*vmw_be), GFP_KERNEL);
  558. if (!vmw_be)
  559. return NULL;
  560. vmw_be->dma_ttm.ttm.func = &vmw_ttm_func;
  561. vmw_be->dev_priv = container_of(bdev, struct vmw_private, bdev);
  562. vmw_be->mob = NULL;
  563. if (vmw_be->dev_priv->map_mode == vmw_dma_alloc_coherent)
  564. ret = ttm_dma_tt_init(&vmw_be->dma_ttm, bdev, size, page_flags,
  565. dummy_read_page);
  566. else
  567. ret = ttm_tt_init(&vmw_be->dma_ttm.ttm, bdev, size, page_flags,
  568. dummy_read_page);
  569. if (unlikely(ret != 0))
  570. goto out_no_init;
  571. return &vmw_be->dma_ttm.ttm;
  572. out_no_init:
  573. kfree(vmw_be);
  574. return NULL;
  575. }
  576. static int vmw_invalidate_caches(struct ttm_bo_device *bdev, uint32_t flags)
  577. {
  578. return 0;
  579. }
  580. static int vmw_init_mem_type(struct ttm_bo_device *bdev, uint32_t type,
  581. struct ttm_mem_type_manager *man)
  582. {
  583. switch (type) {
  584. case TTM_PL_SYSTEM:
  585. /* System memory */
  586. man->flags = TTM_MEMTYPE_FLAG_MAPPABLE;
  587. man->available_caching = TTM_PL_FLAG_CACHED;
  588. man->default_caching = TTM_PL_FLAG_CACHED;
  589. break;
  590. case TTM_PL_VRAM:
  591. /* "On-card" video ram */
  592. man->func = &ttm_bo_manager_func;
  593. man->gpu_offset = 0;
  594. man->flags = TTM_MEMTYPE_FLAG_FIXED | TTM_MEMTYPE_FLAG_MAPPABLE;
  595. man->available_caching = TTM_PL_FLAG_CACHED;
  596. man->default_caching = TTM_PL_FLAG_CACHED;
  597. break;
  598. case VMW_PL_GMR:
  599. case VMW_PL_MOB:
  600. /*
  601. * "Guest Memory Regions" is an aperture like feature with
  602. * one slot per bo. There is an upper limit of the number of
  603. * slots as well as the bo size.
  604. */
  605. man->func = &vmw_gmrid_manager_func;
  606. man->gpu_offset = 0;
  607. man->flags = TTM_MEMTYPE_FLAG_CMA | TTM_MEMTYPE_FLAG_MAPPABLE;
  608. man->available_caching = TTM_PL_FLAG_CACHED;
  609. man->default_caching = TTM_PL_FLAG_CACHED;
  610. break;
  611. default:
  612. DRM_ERROR("Unsupported memory type %u\n", (unsigned)type);
  613. return -EINVAL;
  614. }
  615. return 0;
  616. }
  617. static void vmw_evict_flags(struct ttm_buffer_object *bo,
  618. struct ttm_placement *placement)
  619. {
  620. *placement = vmw_sys_placement;
  621. }
  622. static int vmw_verify_access(struct ttm_buffer_object *bo, struct file *filp)
  623. {
  624. struct ttm_object_file *tfile =
  625. vmw_fpriv((struct drm_file *)filp->private_data)->tfile;
  626. return vmw_user_dmabuf_verify_access(bo, tfile);
  627. }
  628. static int vmw_ttm_io_mem_reserve(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
  629. {
  630. struct ttm_mem_type_manager *man = &bdev->man[mem->mem_type];
  631. struct vmw_private *dev_priv = container_of(bdev, struct vmw_private, bdev);
  632. mem->bus.addr = NULL;
  633. mem->bus.is_iomem = false;
  634. mem->bus.offset = 0;
  635. mem->bus.size = mem->num_pages << PAGE_SHIFT;
  636. mem->bus.base = 0;
  637. if (!(man->flags & TTM_MEMTYPE_FLAG_MAPPABLE))
  638. return -EINVAL;
  639. switch (mem->mem_type) {
  640. case TTM_PL_SYSTEM:
  641. case VMW_PL_GMR:
  642. case VMW_PL_MOB:
  643. return 0;
  644. case TTM_PL_VRAM:
  645. mem->bus.offset = mem->start << PAGE_SHIFT;
  646. mem->bus.base = dev_priv->vram_start;
  647. mem->bus.is_iomem = true;
  648. break;
  649. default:
  650. return -EINVAL;
  651. }
  652. return 0;
  653. }
  654. static void vmw_ttm_io_mem_free(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
  655. {
  656. }
  657. static int vmw_ttm_fault_reserve_notify(struct ttm_buffer_object *bo)
  658. {
  659. return 0;
  660. }
  661. /**
  662. * FIXME: We're using the old vmware polling method to sync.
  663. * Do this with fences instead.
  664. */
  665. static void *vmw_sync_obj_ref(void *sync_obj)
  666. {
  667. return (void *)
  668. vmw_fence_obj_reference((struct vmw_fence_obj *) sync_obj);
  669. }
  670. static void vmw_sync_obj_unref(void **sync_obj)
  671. {
  672. vmw_fence_obj_unreference((struct vmw_fence_obj **) sync_obj);
  673. }
  674. static int vmw_sync_obj_flush(void *sync_obj)
  675. {
  676. vmw_fence_obj_flush((struct vmw_fence_obj *) sync_obj);
  677. return 0;
  678. }
  679. static bool vmw_sync_obj_signaled(void *sync_obj)
  680. {
  681. return vmw_fence_obj_signaled((struct vmw_fence_obj *) sync_obj,
  682. DRM_VMW_FENCE_FLAG_EXEC);
  683. }
  684. static int vmw_sync_obj_wait(void *sync_obj, bool lazy, bool interruptible)
  685. {
  686. return vmw_fence_obj_wait((struct vmw_fence_obj *) sync_obj,
  687. DRM_VMW_FENCE_FLAG_EXEC,
  688. lazy, interruptible,
  689. VMW_FENCE_WAIT_TIMEOUT);
  690. }
  691. /**
  692. * vmw_move_notify - TTM move_notify_callback
  693. *
  694. * @bo: The TTM buffer object about to move.
  695. * @mem: The truct ttm_mem_reg indicating to what memory
  696. * region the move is taking place.
  697. *
  698. * Calls move_notify for all subsystems needing it.
  699. * (currently only resources).
  700. */
  701. static void vmw_move_notify(struct ttm_buffer_object *bo,
  702. struct ttm_mem_reg *mem)
  703. {
  704. vmw_resource_move_notify(bo, mem);
  705. }
  706. /**
  707. * vmw_swap_notify - TTM move_notify_callback
  708. *
  709. * @bo: The TTM buffer object about to be swapped out.
  710. */
  711. static void vmw_swap_notify(struct ttm_buffer_object *bo)
  712. {
  713. struct ttm_bo_device *bdev = bo->bdev;
  714. spin_lock(&bdev->fence_lock);
  715. ttm_bo_wait(bo, false, false, false);
  716. spin_unlock(&bdev->fence_lock);
  717. }
  718. struct ttm_bo_driver vmw_bo_driver = {
  719. .ttm_tt_create = &vmw_ttm_tt_create,
  720. .ttm_tt_populate = &vmw_ttm_populate,
  721. .ttm_tt_unpopulate = &vmw_ttm_unpopulate,
  722. .invalidate_caches = vmw_invalidate_caches,
  723. .init_mem_type = vmw_init_mem_type,
  724. .evict_flags = vmw_evict_flags,
  725. .move = NULL,
  726. .verify_access = vmw_verify_access,
  727. .sync_obj_signaled = vmw_sync_obj_signaled,
  728. .sync_obj_wait = vmw_sync_obj_wait,
  729. .sync_obj_flush = vmw_sync_obj_flush,
  730. .sync_obj_unref = vmw_sync_obj_unref,
  731. .sync_obj_ref = vmw_sync_obj_ref,
  732. .move_notify = vmw_move_notify,
  733. .swap_notify = vmw_swap_notify,
  734. .fault_reserve_notify = &vmw_ttm_fault_reserve_notify,
  735. .io_mem_reserve = &vmw_ttm_io_mem_reserve,
  736. .io_mem_free = &vmw_ttm_io_mem_free,
  737. };