Linux Kernel  3.7.1
 All Data Structures Namespaces Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
vmwgfx_execbuf.c
Go to the documentation of this file.
1 /**************************************************************************
2  *
3  * Copyright © 2009 VMware, Inc., Palo Alto, CA., USA
4  * All Rights Reserved.
5  *
6  * Permission is hereby granted, free of charge, to any person obtaining a
7  * copy of this software and associated documentation files (the
8  * "Software"), to deal in the Software without restriction, including
9  * without limitation the rights to use, copy, modify, merge, publish,
10  * distribute, sub license, and/or sell copies of the Software, and to
11  * permit persons to whom the Software is furnished to do so, subject to
12  * the following conditions:
13  *
14  * The above copyright notice and this permission notice (including the
15  * next paragraph) shall be included in all copies or substantial portions
16  * of the Software.
17  *
18  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20  * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21  * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22  * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23  * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24  * USE OR OTHER DEALINGS IN THE SOFTWARE.
25  *
26  **************************************************************************/
27 
28 #include "vmwgfx_drv.h"
29 #include "vmwgfx_reg.h"
30 #include <drm/ttm/ttm_bo_api.h>
31 #include <drm/ttm/ttm_placement.h>
32 
33 static int vmw_cmd_invalid(struct vmw_private *dev_priv,
34  struct vmw_sw_context *sw_context,
36 {
37  return capable(CAP_SYS_ADMIN) ? : -EINVAL;
38 }
39 
40 static int vmw_cmd_ok(struct vmw_private *dev_priv,
41  struct vmw_sw_context *sw_context,
43 {
44  return 0;
45 }
46 
47 static void vmw_resource_to_validate_list(struct vmw_sw_context *sw_context,
48  struct vmw_resource **p_res)
49 {
50  struct vmw_resource *res = *p_res;
51 
52  if (list_empty(&res->validate_head)) {
53  list_add_tail(&res->validate_head, &sw_context->resource_list);
54  *p_res = NULL;
55  } else
57 }
58 
72 static int vmw_bo_to_validate_list(struct vmw_sw_context *sw_context,
73  struct ttm_buffer_object *bo,
74  uint32_t fence_flags,
75  uint32_t *p_val_node)
76 {
77  uint32_t val_node;
78  struct ttm_validate_buffer *val_buf;
79 
80  val_node = vmw_dmabuf_validate_node(bo, sw_context->cur_val_buf);
81 
82  if (unlikely(val_node >= VMWGFX_MAX_VALIDATIONS)) {
83  DRM_ERROR("Max number of DMA buffers per submission"
84  " exceeded.\n");
85  return -EINVAL;
86  }
87 
88  val_buf = &sw_context->val_bufs[val_node];
89  if (unlikely(val_node == sw_context->cur_val_buf)) {
90  val_buf->new_sync_obj_arg = NULL;
91  val_buf->bo = ttm_bo_reference(bo);
92  list_add_tail(&val_buf->head, &sw_context->validate_nodes);
93  ++sw_context->cur_val_buf;
94  }
95 
96  val_buf->new_sync_obj_arg = (void *)
97  ((unsigned long) val_buf->new_sync_obj_arg | fence_flags);
98  sw_context->fence_flags |= fence_flags;
99 
100  if (p_val_node)
101  *p_val_node = val_node;
102 
103  return 0;
104 }
105 
106 static int vmw_cmd_cid_check(struct vmw_private *dev_priv,
107  struct vmw_sw_context *sw_context,
109 {
110  struct vmw_resource *ctx;
111 
112  struct vmw_cid_cmd {
113  SVGA3dCmdHeader header;
114  __le32 cid;
115  } *cmd;
116  int ret;
117 
118  cmd = container_of(header, struct vmw_cid_cmd, header);
119  if (likely(sw_context->cid_valid && cmd->cid == sw_context->last_cid))
120  return 0;
121 
122  ret = vmw_context_check(dev_priv, sw_context->tfile, cmd->cid,
123  &ctx);
124  if (unlikely(ret != 0)) {
125  DRM_ERROR("Could not find or use context %u\n",
126  (unsigned) cmd->cid);
127  return ret;
128  }
129 
130  sw_context->last_cid = cmd->cid;
131  sw_context->cid_valid = true;
132  sw_context->cur_ctx = ctx;
133  vmw_resource_to_validate_list(sw_context, &ctx);
134 
135  return 0;
136 }
137 
138 static int vmw_cmd_sid_check(struct vmw_private *dev_priv,
139  struct vmw_sw_context *sw_context,
140  uint32_t *sid)
141 {
142  struct vmw_surface *srf;
143  int ret;
144  struct vmw_resource *res;
145 
146  if (*sid == SVGA3D_INVALID_ID)
147  return 0;
148 
149  if (likely((sw_context->sid_valid &&
150  *sid == sw_context->last_sid))) {
151  *sid = sw_context->sid_translation;
152  return 0;
153  }
154 
155  ret = vmw_user_surface_lookup_handle(dev_priv,
156  sw_context->tfile,
157  *sid, &srf);
158  if (unlikely(ret != 0)) {
159  DRM_ERROR("Could ot find or use surface 0x%08x "
160  "address 0x%08lx\n",
161  (unsigned int) *sid,
162  (unsigned long) sid);
163  return ret;
164  }
165 
166  ret = vmw_surface_validate(dev_priv, srf);
167  if (unlikely(ret != 0)) {
168  if (ret != -ERESTARTSYS)
169  DRM_ERROR("Could not validate surface.\n");
170  vmw_surface_unreference(&srf);
171  return ret;
172  }
173 
174  sw_context->last_sid = *sid;
175  sw_context->sid_valid = true;
176  sw_context->sid_translation = srf->res.id;
177  *sid = sw_context->sid_translation;
178 
179  res = &srf->res;
180  vmw_resource_to_validate_list(sw_context, &res);
181 
182  return 0;
183 }
184 
185 
186 static int vmw_cmd_set_render_target_check(struct vmw_private *dev_priv,
187  struct vmw_sw_context *sw_context,
188  SVGA3dCmdHeader *header)
189 {
190  struct vmw_sid_cmd {
191  SVGA3dCmdHeader header;
193  } *cmd;
194  int ret;
195 
196  ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
197  if (unlikely(ret != 0))
198  return ret;
199 
200  cmd = container_of(header, struct vmw_sid_cmd, header);
201  ret = vmw_cmd_sid_check(dev_priv, sw_context, &cmd->body.target.sid);
202  return ret;
203 }
204 
205 static int vmw_cmd_surface_copy_check(struct vmw_private *dev_priv,
206  struct vmw_sw_context *sw_context,
207  SVGA3dCmdHeader *header)
208 {
209  struct vmw_sid_cmd {
210  SVGA3dCmdHeader header;
212  } *cmd;
213  int ret;
214 
215  cmd = container_of(header, struct vmw_sid_cmd, header);
216  ret = vmw_cmd_sid_check(dev_priv, sw_context, &cmd->body.src.sid);
217  if (unlikely(ret != 0))
218  return ret;
219  return vmw_cmd_sid_check(dev_priv, sw_context, &cmd->body.dest.sid);
220 }
221 
222 static int vmw_cmd_stretch_blt_check(struct vmw_private *dev_priv,
223  struct vmw_sw_context *sw_context,
224  SVGA3dCmdHeader *header)
225 {
226  struct vmw_sid_cmd {
227  SVGA3dCmdHeader header;
229  } *cmd;
230  int ret;
231 
232  cmd = container_of(header, struct vmw_sid_cmd, header);
233  ret = vmw_cmd_sid_check(dev_priv, sw_context, &cmd->body.src.sid);
234  if (unlikely(ret != 0))
235  return ret;
236  return vmw_cmd_sid_check(dev_priv, sw_context, &cmd->body.dest.sid);
237 }
238 
239 static int vmw_cmd_blt_surf_screen_check(struct vmw_private *dev_priv,
240  struct vmw_sw_context *sw_context,
241  SVGA3dCmdHeader *header)
242 {
243  struct vmw_sid_cmd {
244  SVGA3dCmdHeader header;
246  } *cmd;
247 
248  cmd = container_of(header, struct vmw_sid_cmd, header);
249 
250  if (unlikely(!sw_context->kernel)) {
251  DRM_ERROR("Kernel only SVGA3d command: %u.\n", cmd->header.id);
252  return -EPERM;
253  }
254 
255  return vmw_cmd_sid_check(dev_priv, sw_context, &cmd->body.srcImage.sid);
256 }
257 
258 static int vmw_cmd_present_check(struct vmw_private *dev_priv,
259  struct vmw_sw_context *sw_context,
260  SVGA3dCmdHeader *header)
261 {
262  struct vmw_sid_cmd {
263  SVGA3dCmdHeader header;
265  } *cmd;
266 
267 
268  cmd = container_of(header, struct vmw_sid_cmd, header);
269 
270  if (unlikely(!sw_context->kernel)) {
271  DRM_ERROR("Kernel only SVGA3d command: %u.\n", cmd->header.id);
272  return -EPERM;
273  }
274 
275  return vmw_cmd_sid_check(dev_priv, sw_context, &cmd->body.sid);
276 }
277 
294 static int vmw_query_bo_switch_prepare(struct vmw_private *dev_priv,
295  uint32_t cid,
296  struct ttm_buffer_object *new_query_bo,
297  struct vmw_sw_context *sw_context)
298 {
299  int ret;
300  bool add_cid = false;
301  uint32_t cid_to_add;
302 
303  if (unlikely(new_query_bo != sw_context->cur_query_bo)) {
304 
305  if (unlikely(new_query_bo->num_pages > 4)) {
306  DRM_ERROR("Query buffer too large.\n");
307  return -EINVAL;
308  }
309 
310  if (unlikely(sw_context->cur_query_bo != NULL)) {
311  BUG_ON(!sw_context->query_cid_valid);
312  add_cid = true;
313  cid_to_add = sw_context->cur_query_cid;
314  ret = vmw_bo_to_validate_list(sw_context,
315  sw_context->cur_query_bo,
317  NULL);
318  if (unlikely(ret != 0))
319  return ret;
320  }
321  sw_context->cur_query_bo = new_query_bo;
322 
323  ret = vmw_bo_to_validate_list(sw_context,
324  dev_priv->dummy_query_bo,
326  NULL);
327  if (unlikely(ret != 0))
328  return ret;
329 
330  }
331 
332  if (unlikely(cid != sw_context->cur_query_cid &&
333  sw_context->query_cid_valid)) {
334  add_cid = true;
335  cid_to_add = sw_context->cur_query_cid;
336  }
337 
338  sw_context->cur_query_cid = cid;
339  sw_context->query_cid_valid = true;
340 
341  if (add_cid) {
342  struct vmw_resource *ctx = sw_context->cur_ctx;
343 
344  if (list_empty(&ctx->query_head))
346  &sw_context->query_list);
347  ret = vmw_bo_to_validate_list(sw_context,
348  dev_priv->dummy_query_bo,
350  NULL);
351  if (unlikely(ret != 0))
352  return ret;
353  }
354  return 0;
355 }
356 
357 
376 static void vmw_query_bo_switch_commit(struct vmw_private *dev_priv,
377  struct vmw_sw_context *sw_context)
378 {
379 
380  struct vmw_resource *ctx, *next_ctx;
381  int ret;
382 
383  /*
384  * The validate list should still hold references to all
385  * contexts here.
386  */
387 
388  list_for_each_entry_safe(ctx, next_ctx, &sw_context->query_list,
389  query_head) {
390  list_del_init(&ctx->query_head);
391 
392  BUG_ON(list_empty(&ctx->validate_head));
393 
394  ret = vmw_fifo_emit_dummy_query(dev_priv, ctx->id);
395 
396  if (unlikely(ret != 0))
397  DRM_ERROR("Out of fifo space for dummy query.\n");
398  }
399 
400  if (dev_priv->pinned_bo != sw_context->cur_query_bo) {
401  if (dev_priv->pinned_bo) {
402  vmw_bo_pin(dev_priv->pinned_bo, false);
403  ttm_bo_unref(&dev_priv->pinned_bo);
404  }
405 
406  vmw_bo_pin(sw_context->cur_query_bo, true);
407 
408  /*
409  * We pin also the dummy_query_bo buffer so that we
410  * don't need to validate it when emitting
411  * dummy queries in context destroy paths.
412  */
413 
414  vmw_bo_pin(dev_priv->dummy_query_bo, true);
415  dev_priv->dummy_query_bo_pinned = true;
416 
417  dev_priv->query_cid = sw_context->cur_query_cid;
418  dev_priv->pinned_bo =
419  ttm_bo_reference(sw_context->cur_query_bo);
420  }
421 }
422 
431 static void vmw_query_switch_backoff(struct vmw_sw_context *sw_context)
432 {
433  struct list_head *list, *next;
434 
435  list_for_each_safe(list, next, &sw_context->query_list) {
436  list_del_init(list);
437  }
438 }
439 
440 static int vmw_translate_guest_ptr(struct vmw_private *dev_priv,
441  struct vmw_sw_context *sw_context,
442  SVGAGuestPtr *ptr,
443  struct vmw_dma_buffer **vmw_bo_p)
444 {
445  struct vmw_dma_buffer *vmw_bo = NULL;
446  struct ttm_buffer_object *bo;
447  uint32_t handle = ptr->gmrId;
448  struct vmw_relocation *reloc;
449  int ret;
450 
451  ret = vmw_user_dmabuf_lookup(sw_context->tfile, handle, &vmw_bo);
452  if (unlikely(ret != 0)) {
453  DRM_ERROR("Could not find or use GMR region.\n");
454  return -EINVAL;
455  }
456  bo = &vmw_bo->base;
457 
458  if (unlikely(sw_context->cur_reloc >= VMWGFX_MAX_RELOCATIONS)) {
459  DRM_ERROR("Max number relocations per submission"
460  " exceeded\n");
461  ret = -EINVAL;
462  goto out_no_reloc;
463  }
464 
465  reloc = &sw_context->relocs[sw_context->cur_reloc++];
466  reloc->location = ptr;
467 
468  ret = vmw_bo_to_validate_list(sw_context, bo, DRM_VMW_FENCE_FLAG_EXEC,
469  &reloc->index);
470  if (unlikely(ret != 0))
471  goto out_no_reloc;
472 
473  *vmw_bo_p = vmw_bo;
474  return 0;
475 
476 out_no_reloc:
477  vmw_dmabuf_unreference(&vmw_bo);
478  vmw_bo_p = NULL;
479  return ret;
480 }
481 
482 static int vmw_cmd_end_query(struct vmw_private *dev_priv,
483  struct vmw_sw_context *sw_context,
484  SVGA3dCmdHeader *header)
485 {
486  struct vmw_dma_buffer *vmw_bo;
487  struct vmw_query_cmd {
488  SVGA3dCmdHeader header;
490  } *cmd;
491  int ret;
492 
493  cmd = container_of(header, struct vmw_query_cmd, header);
494  ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
495  if (unlikely(ret != 0))
496  return ret;
497 
498  ret = vmw_translate_guest_ptr(dev_priv, sw_context,
499  &cmd->q.guestResult,
500  &vmw_bo);
501  if (unlikely(ret != 0))
502  return ret;
503 
504  ret = vmw_query_bo_switch_prepare(dev_priv, cmd->q.cid,
505  &vmw_bo->base, sw_context);
506 
507  vmw_dmabuf_unreference(&vmw_bo);
508  return ret;
509 }
510 
511 static int vmw_cmd_wait_query(struct vmw_private *dev_priv,
512  struct vmw_sw_context *sw_context,
513  SVGA3dCmdHeader *header)
514 {
515  struct vmw_dma_buffer *vmw_bo;
516  struct vmw_query_cmd {
517  SVGA3dCmdHeader header;
519  } *cmd;
520  int ret;
521  struct vmw_resource *ctx;
522 
523  cmd = container_of(header, struct vmw_query_cmd, header);
524  ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
525  if (unlikely(ret != 0))
526  return ret;
527 
528  ret = vmw_translate_guest_ptr(dev_priv, sw_context,
529  &cmd->q.guestResult,
530  &vmw_bo);
531  if (unlikely(ret != 0))
532  return ret;
533 
534  vmw_dmabuf_unreference(&vmw_bo);
535 
536  /*
537  * This wait will act as a barrier for previous waits for this
538  * context.
539  */
540 
541  ctx = sw_context->cur_ctx;
542  if (!list_empty(&ctx->query_head))
543  list_del_init(&ctx->query_head);
544 
545  return 0;
546 }
547 
548 static int vmw_cmd_dma(struct vmw_private *dev_priv,
549  struct vmw_sw_context *sw_context,
550  SVGA3dCmdHeader *header)
551 {
552  struct vmw_dma_buffer *vmw_bo = NULL;
553  struct ttm_buffer_object *bo;
554  struct vmw_surface *srf = NULL;
555  struct vmw_dma_cmd {
556  SVGA3dCmdHeader header;
558  } *cmd;
559  int ret;
560  struct vmw_resource *res;
561 
562  cmd = container_of(header, struct vmw_dma_cmd, header);
563  ret = vmw_translate_guest_ptr(dev_priv, sw_context,
564  &cmd->dma.guest.ptr,
565  &vmw_bo);
566  if (unlikely(ret != 0))
567  return ret;
568 
569  bo = &vmw_bo->base;
570  ret = vmw_user_surface_lookup_handle(dev_priv, sw_context->tfile,
571  cmd->dma.host.sid, &srf);
572  if (ret) {
573  DRM_ERROR("could not find surface\n");
574  goto out_no_reloc;
575  }
576 
577  ret = vmw_surface_validate(dev_priv, srf);
578  if (unlikely(ret != 0)) {
579  if (ret != -ERESTARTSYS)
580  DRM_ERROR("Culd not validate surface.\n");
581  goto out_no_validate;
582  }
583 
584  /*
585  * Patch command stream with device SID.
586  */
587  cmd->dma.host.sid = srf->res.id;
588  vmw_kms_cursor_snoop(srf, sw_context->tfile, bo, header);
589 
590  vmw_dmabuf_unreference(&vmw_bo);
591 
592  res = &srf->res;
593  vmw_resource_to_validate_list(sw_context, &res);
594 
595  return 0;
596 
597 out_no_validate:
598  vmw_surface_unreference(&srf);
599 out_no_reloc:
600  vmw_dmabuf_unreference(&vmw_bo);
601  return ret;
602 }
603 
604 static int vmw_cmd_draw(struct vmw_private *dev_priv,
605  struct vmw_sw_context *sw_context,
606  SVGA3dCmdHeader *header)
607 {
608  struct vmw_draw_cmd {
609  SVGA3dCmdHeader header;
611  } *cmd;
613  (unsigned long)header + sizeof(*cmd));
615  uint32_t i;
616  uint32_t maxnum;
617  int ret;
618 
619  ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
620  if (unlikely(ret != 0))
621  return ret;
622 
623  cmd = container_of(header, struct vmw_draw_cmd, header);
624  maxnum = (header->size - sizeof(cmd->body)) / sizeof(*decl);
625 
626  if (unlikely(cmd->body.numVertexDecls > maxnum)) {
627  DRM_ERROR("Illegal number of vertex declarations.\n");
628  return -EINVAL;
629  }
630 
631  for (i = 0; i < cmd->body.numVertexDecls; ++i, ++decl) {
632  ret = vmw_cmd_sid_check(dev_priv, sw_context,
633  &decl->array.surfaceId);
634  if (unlikely(ret != 0))
635  return ret;
636  }
637 
638  maxnum = (header->size - sizeof(cmd->body) -
639  cmd->body.numVertexDecls * sizeof(*decl)) / sizeof(*range);
640  if (unlikely(cmd->body.numRanges > maxnum)) {
641  DRM_ERROR("Illegal number of index ranges.\n");
642  return -EINVAL;
643  }
644 
645  range = (SVGA3dPrimitiveRange *) decl;
646  for (i = 0; i < cmd->body.numRanges; ++i, ++range) {
647  ret = vmw_cmd_sid_check(dev_priv, sw_context,
648  &range->indexArray.surfaceId);
649  if (unlikely(ret != 0))
650  return ret;
651  }
652  return 0;
653 }
654 
655 
656 static int vmw_cmd_tex_state(struct vmw_private *dev_priv,
657  struct vmw_sw_context *sw_context,
658  SVGA3dCmdHeader *header)
659 {
660  struct vmw_tex_state_cmd {
661  SVGA3dCmdHeader header;
663  };
664 
665  SVGA3dTextureState *last_state = (SVGA3dTextureState *)
666  ((unsigned long) header + header->size + sizeof(header));
667  SVGA3dTextureState *cur_state = (SVGA3dTextureState *)
668  ((unsigned long) header + sizeof(struct vmw_tex_state_cmd));
669  int ret;
670 
671  ret = vmw_cmd_cid_check(dev_priv, sw_context, header);
672  if (unlikely(ret != 0))
673  return ret;
674 
675  for (; cur_state < last_state; ++cur_state) {
676  if (likely(cur_state->name != SVGA3D_TS_BIND_TEXTURE))
677  continue;
678 
679  ret = vmw_cmd_sid_check(dev_priv, sw_context,
680  &cur_state->value);
681  if (unlikely(ret != 0))
682  return ret;
683  }
684 
685  return 0;
686 }
687 
688 static int vmw_cmd_check_define_gmrfb(struct vmw_private *dev_priv,
689  struct vmw_sw_context *sw_context,
690  void *buf)
691 {
692  struct vmw_dma_buffer *vmw_bo;
693  int ret;
694 
695  struct {
696  uint32_t header;
698  } *cmd = buf;
699 
700  ret = vmw_translate_guest_ptr(dev_priv, sw_context,
701  &cmd->body.ptr,
702  &vmw_bo);
703  if (unlikely(ret != 0))
704  return ret;
705 
706  vmw_dmabuf_unreference(&vmw_bo);
707 
708  return ret;
709 }
710 
711 static int vmw_cmd_check_not_3d(struct vmw_private *dev_priv,
712  struct vmw_sw_context *sw_context,
713  void *buf, uint32_t *size)
714 {
715  uint32_t size_remaining = *size;
716  uint32_t cmd_id;
717 
718  cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
719  switch (cmd_id) {
720  case SVGA_CMD_UPDATE:
721  *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdUpdate);
722  break;
724  *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdDefineGMRFB);
725  break;
727  *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
728  break;
730  *size = sizeof(uint32_t) + sizeof(SVGAFifoCmdBlitGMRFBToScreen);
731  break;
732  default:
733  DRM_ERROR("Unsupported SVGA command: %u.\n", cmd_id);
734  return -EINVAL;
735  }
736 
737  if (*size > size_remaining) {
738  DRM_ERROR("Invalid SVGA command (size mismatch):"
739  " %u.\n", cmd_id);
740  return -EINVAL;
741  }
742 
743  if (unlikely(!sw_context->kernel)) {
744  DRM_ERROR("Kernel only SVGA command: %u.\n", cmd_id);
745  return -EPERM;
746  }
747 
748  if (cmd_id == SVGA_CMD_DEFINE_GMRFB)
749  return vmw_cmd_check_define_gmrfb(dev_priv, sw_context, buf);
750 
751  return 0;
752 }
753 
754 typedef int (*vmw_cmd_func) (struct vmw_private *,
755  struct vmw_sw_context *,
756  SVGA3dCmdHeader *);
757 
758 #define VMW_CMD_DEF(cmd, func) \
759  [cmd - SVGA_3D_CMD_BASE] = func
760 
761 static vmw_cmd_func vmw_cmd_funcs[SVGA_3D_CMD_MAX] = {
762  VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DEFINE, &vmw_cmd_invalid),
763  VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DESTROY, &vmw_cmd_invalid),
764  VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_COPY, &vmw_cmd_surface_copy_check),
765  VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_STRETCHBLT, &vmw_cmd_stretch_blt_check),
766  VMW_CMD_DEF(SVGA_3D_CMD_SURFACE_DMA, &vmw_cmd_dma),
767  VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DEFINE, &vmw_cmd_invalid),
768  VMW_CMD_DEF(SVGA_3D_CMD_CONTEXT_DESTROY, &vmw_cmd_invalid),
769  VMW_CMD_DEF(SVGA_3D_CMD_SETTRANSFORM, &vmw_cmd_cid_check),
770  VMW_CMD_DEF(SVGA_3D_CMD_SETZRANGE, &vmw_cmd_cid_check),
771  VMW_CMD_DEF(SVGA_3D_CMD_SETRENDERSTATE, &vmw_cmd_cid_check),
773  &vmw_cmd_set_render_target_check),
774  VMW_CMD_DEF(SVGA_3D_CMD_SETTEXTURESTATE, &vmw_cmd_tex_state),
775  VMW_CMD_DEF(SVGA_3D_CMD_SETMATERIAL, &vmw_cmd_cid_check),
776  VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTDATA, &vmw_cmd_cid_check),
777  VMW_CMD_DEF(SVGA_3D_CMD_SETLIGHTENABLED, &vmw_cmd_cid_check),
778  VMW_CMD_DEF(SVGA_3D_CMD_SETVIEWPORT, &vmw_cmd_cid_check),
779  VMW_CMD_DEF(SVGA_3D_CMD_SETCLIPPLANE, &vmw_cmd_cid_check),
780  VMW_CMD_DEF(SVGA_3D_CMD_CLEAR, &vmw_cmd_cid_check),
781  VMW_CMD_DEF(SVGA_3D_CMD_PRESENT, &vmw_cmd_present_check),
782  VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DEFINE, &vmw_cmd_cid_check),
783  VMW_CMD_DEF(SVGA_3D_CMD_SHADER_DESTROY, &vmw_cmd_cid_check),
784  VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER, &vmw_cmd_cid_check),
785  VMW_CMD_DEF(SVGA_3D_CMD_SET_SHADER_CONST, &vmw_cmd_cid_check),
787  VMW_CMD_DEF(SVGA_3D_CMD_SETSCISSORRECT, &vmw_cmd_cid_check),
788  VMW_CMD_DEF(SVGA_3D_CMD_BEGIN_QUERY, &vmw_cmd_cid_check),
789  VMW_CMD_DEF(SVGA_3D_CMD_END_QUERY, &vmw_cmd_end_query),
790  VMW_CMD_DEF(SVGA_3D_CMD_WAIT_FOR_QUERY, &vmw_cmd_wait_query),
793  &vmw_cmd_blt_surf_screen_check)
794 };
795 
796 static int vmw_cmd_check(struct vmw_private *dev_priv,
797  struct vmw_sw_context *sw_context,
798  void *buf, uint32_t *size)
799 {
800  uint32_t cmd_id;
801  uint32_t size_remaining = *size;
802  SVGA3dCmdHeader *header = (SVGA3dCmdHeader *) buf;
803  int ret;
804 
805  cmd_id = le32_to_cpu(((uint32_t *)buf)[0]);
806  /* Handle any none 3D commands */
807  if (unlikely(cmd_id < SVGA_CMD_MAX))
808  return vmw_cmd_check_not_3d(dev_priv, sw_context, buf, size);
809 
810 
811  cmd_id = le32_to_cpu(header->id);
812  *size = le32_to_cpu(header->size) + sizeof(SVGA3dCmdHeader);
813 
814  cmd_id -= SVGA_3D_CMD_BASE;
815  if (unlikely(*size > size_remaining))
816  goto out_err;
817 
818  if (unlikely(cmd_id >= SVGA_3D_CMD_MAX - SVGA_3D_CMD_BASE))
819  goto out_err;
820 
821  ret = vmw_cmd_funcs[cmd_id](dev_priv, sw_context, header);
822  if (unlikely(ret != 0))
823  goto out_err;
824 
825  return 0;
826 out_err:
827  DRM_ERROR("Illegal / Invalid SVGA3D command: %d\n",
828  cmd_id + SVGA_3D_CMD_BASE);
829  return -EINVAL;
830 }
831 
832 static int vmw_cmd_check_all(struct vmw_private *dev_priv,
833  struct vmw_sw_context *sw_context,
834  void *buf,
835  uint32_t size)
836 {
837  int32_t cur_size = size;
838  int ret;
839 
840  while (cur_size > 0) {
841  size = cur_size;
842  ret = vmw_cmd_check(dev_priv, sw_context, buf, &size);
843  if (unlikely(ret != 0))
844  return ret;
845  buf = (void *)((unsigned long) buf + size);
846  cur_size -= size;
847  }
848 
849  if (unlikely(cur_size != 0)) {
850  DRM_ERROR("Command verifier out of sync.\n");
851  return -EINVAL;
852  }
853 
854  return 0;
855 }
856 
857 static void vmw_free_relocations(struct vmw_sw_context *sw_context)
858 {
859  sw_context->cur_reloc = 0;
860 }
861 
862 static void vmw_apply_relocations(struct vmw_sw_context *sw_context)
863 {
864  uint32_t i;
865  struct vmw_relocation *reloc;
867  struct ttm_buffer_object *bo;
868 
869  for (i = 0; i < sw_context->cur_reloc; ++i) {
870  reloc = &sw_context->relocs[i];
871  validate = &sw_context->val_bufs[reloc->index];
872  bo = validate->bo;
873  if (bo->mem.mem_type == TTM_PL_VRAM) {
874  reloc->location->offset += bo->offset;
876  } else
877  reloc->location->gmrId = bo->mem.start;
878  }
879  vmw_free_relocations(sw_context);
880 }
881 
882 static void vmw_clear_validations(struct vmw_sw_context *sw_context)
883 {
884  struct ttm_validate_buffer *entry, *next;
885  struct vmw_resource *res, *res_next;
886 
887  /*
888  * Drop references to DMA buffers held during command submission.
889  */
890  list_for_each_entry_safe(entry, next, &sw_context->validate_nodes,
891  head) {
892  list_del(&entry->head);
894  ttm_bo_unref(&entry->bo);
895  sw_context->cur_val_buf--;
896  }
897  BUG_ON(sw_context->cur_val_buf != 0);
898 
899  /*
900  * Drop references to resources held during command submission.
901  */
903  list_for_each_entry_safe(res, res_next, &sw_context->resource_list,
904  validate_head) {
905  list_del_init(&res->validate_head);
907  }
908 }
909 
910 static int vmw_validate_single_buffer(struct vmw_private *dev_priv,
911  struct ttm_buffer_object *bo)
912 {
913  int ret;
914 
915 
916  /*
917  * Don't validate pinned buffers.
918  */
919 
920  if (bo == dev_priv->pinned_bo ||
921  (bo == dev_priv->dummy_query_bo &&
922  dev_priv->dummy_query_bo_pinned))
923  return 0;
924 
932  ret = ttm_bo_validate(bo, &vmw_vram_gmr_placement, true, false, false);
933  if (likely(ret == 0 || ret == -ERESTARTSYS))
934  return ret;
935 
941  DRM_INFO("Falling through to VRAM.\n");
942  ret = ttm_bo_validate(bo, &vmw_vram_placement, true, false, false);
943  return ret;
944 }
945 
946 
947 static int vmw_validate_buffers(struct vmw_private *dev_priv,
948  struct vmw_sw_context *sw_context)
949 {
950  struct ttm_validate_buffer *entry;
951  int ret;
952 
953  list_for_each_entry(entry, &sw_context->validate_nodes, head) {
954  ret = vmw_validate_single_buffer(dev_priv, entry->bo);
955  if (unlikely(ret != 0))
956  return ret;
957  }
958  return 0;
959 }
960 
961 static int vmw_resize_cmd_bounce(struct vmw_sw_context *sw_context,
962  uint32_t size)
963 {
964  if (likely(sw_context->cmd_bounce_size >= size))
965  return 0;
966 
967  if (sw_context->cmd_bounce_size == 0)
969 
970  while (sw_context->cmd_bounce_size < size) {
971  sw_context->cmd_bounce_size =
972  PAGE_ALIGN(sw_context->cmd_bounce_size +
973  (sw_context->cmd_bounce_size >> 1));
974  }
975 
976  if (sw_context->cmd_bounce != NULL)
977  vfree(sw_context->cmd_bounce);
978 
979  sw_context->cmd_bounce = vmalloc(sw_context->cmd_bounce_size);
980 
981  if (sw_context->cmd_bounce == NULL) {
982  DRM_ERROR("Failed to allocate command bounce buffer.\n");
983  sw_context->cmd_bounce_size = 0;
984  return -ENOMEM;
985  }
986 
987  return 0;
988 }
989 
1001 int vmw_execbuf_fence_commands(struct drm_file *file_priv,
1002  struct vmw_private *dev_priv,
1003  struct vmw_fence_obj **p_fence,
1004  uint32_t *p_handle)
1005 {
1007  int ret;
1008  bool synced = false;
1009 
1010  /* p_handle implies file_priv. */
1011  BUG_ON(p_handle != NULL && file_priv == NULL);
1012 
1013  ret = vmw_fifo_send_fence(dev_priv, &sequence);
1014  if (unlikely(ret != 0)) {
1015  DRM_ERROR("Fence submission error. Syncing.\n");
1016  synced = true;
1017  }
1018 
1019  if (p_handle != NULL)
1020  ret = vmw_user_fence_create(file_priv, dev_priv->fman,
1021  sequence,
1023  p_fence, p_handle);
1024  else
1025  ret = vmw_fence_create(dev_priv->fman, sequence,
1027  p_fence);
1028 
1029  if (unlikely(ret != 0 && !synced)) {
1030  (void) vmw_fallback_wait(dev_priv, false, false,
1031  sequence, false,
1033  *p_fence = NULL;
1034  }
1035 
1036  return 0;
1037 }
1038 
1059 void
1061  struct vmw_fpriv *vmw_fp,
1062  int ret,
1063  struct drm_vmw_fence_rep __user *user_fence_rep,
1064  struct vmw_fence_obj *fence,
1065  uint32_t fence_handle)
1066 {
1067  struct drm_vmw_fence_rep fence_rep;
1068 
1069  if (user_fence_rep == NULL)
1070  return;
1071 
1072  memset(&fence_rep, 0, sizeof(fence_rep));
1073 
1074  fence_rep.error = ret;
1075  if (ret == 0) {
1076  BUG_ON(fence == NULL);
1077 
1078  fence_rep.handle = fence_handle;
1079  fence_rep.seqno = fence->seqno;
1080  vmw_update_seqno(dev_priv, &dev_priv->fifo);
1081  fence_rep.passed_seqno = dev_priv->last_read_seqno;
1082  }
1083 
1084  /*
1085  * copy_to_user errors will be detected by user space not
1086  * seeing fence_rep::error filled in. Typically
1087  * user-space would have pre-set that member to -EFAULT.
1088  */
1089  ret = copy_to_user(user_fence_rep, &fence_rep,
1090  sizeof(fence_rep));
1091 
1092  /*
1093  * User-space lost the fence object. We need to sync
1094  * and unreference the handle.
1095  */
1096  if (unlikely(ret != 0) && (fence_rep.error == 0)) {
1098  fence_handle, TTM_REF_USAGE);
1099  DRM_ERROR("Fence copy error. Syncing.\n");
1100  (void) vmw_fence_obj_wait(fence, fence->signal_mask,
1101  false, false,
1103  }
1104 }
1105 
1106 int vmw_execbuf_process(struct drm_file *file_priv,
1107  struct vmw_private *dev_priv,
1108  void __user *user_commands,
1109  void *kernel_commands,
1110  uint32_t command_size,
1111  uint64_t throttle_us,
1112  struct drm_vmw_fence_rep __user *user_fence_rep,
1113  struct vmw_fence_obj **out_fence)
1114 {
1115  struct vmw_sw_context *sw_context = &dev_priv->ctx;
1116  struct vmw_fence_obj *fence = NULL;
1117  uint32_t handle;
1118  void *cmd;
1119  int ret;
1120 
1121  ret = mutex_lock_interruptible(&dev_priv->cmdbuf_mutex);
1122  if (unlikely(ret != 0))
1123  return -ERESTARTSYS;
1124 
1125  if (kernel_commands == NULL) {
1126  sw_context->kernel = false;
1127 
1128  ret = vmw_resize_cmd_bounce(sw_context, command_size);
1129  if (unlikely(ret != 0))
1130  goto out_unlock;
1131 
1132 
1133  ret = copy_from_user(sw_context->cmd_bounce,
1134  user_commands, command_size);
1135 
1136  if (unlikely(ret != 0)) {
1137  ret = -EFAULT;
1138  DRM_ERROR("Failed copying commands.\n");
1139  goto out_unlock;
1140  }
1141  kernel_commands = sw_context->cmd_bounce;
1142  } else
1143  sw_context->kernel = true;
1144 
1145  sw_context->tfile = vmw_fpriv(file_priv)->tfile;
1146  sw_context->cid_valid = false;
1147  sw_context->sid_valid = false;
1148  sw_context->cur_reloc = 0;
1149  sw_context->cur_val_buf = 0;
1150  sw_context->fence_flags = 0;
1151  INIT_LIST_HEAD(&sw_context->query_list);
1152  INIT_LIST_HEAD(&sw_context->resource_list);
1153  sw_context->cur_query_bo = dev_priv->pinned_bo;
1154  sw_context->cur_query_cid = dev_priv->query_cid;
1155  sw_context->query_cid_valid = (dev_priv->pinned_bo != NULL);
1156 
1157  INIT_LIST_HEAD(&sw_context->validate_nodes);
1158 
1159  ret = vmw_cmd_check_all(dev_priv, sw_context, kernel_commands,
1160  command_size);
1161  if (unlikely(ret != 0))
1162  goto out_err;
1163 
1164  ret = ttm_eu_reserve_buffers(&sw_context->validate_nodes);
1165  if (unlikely(ret != 0))
1166  goto out_err;
1167 
1168  ret = vmw_validate_buffers(dev_priv, sw_context);
1169  if (unlikely(ret != 0))
1170  goto out_err;
1171 
1172  vmw_apply_relocations(sw_context);
1173 
1174  if (throttle_us) {
1175  ret = vmw_wait_lag(dev_priv, &dev_priv->fifo.marker_queue,
1176  throttle_us);
1177 
1178  if (unlikely(ret != 0))
1179  goto out_throttle;
1180  }
1181 
1182  cmd = vmw_fifo_reserve(dev_priv, command_size);
1183  if (unlikely(cmd == NULL)) {
1184  DRM_ERROR("Failed reserving fifo space for commands.\n");
1185  ret = -ENOMEM;
1186  goto out_throttle;
1187  }
1188 
1189  memcpy(cmd, kernel_commands, command_size);
1190  vmw_fifo_commit(dev_priv, command_size);
1191 
1192  vmw_query_bo_switch_commit(dev_priv, sw_context);
1193  ret = vmw_execbuf_fence_commands(file_priv, dev_priv,
1194  &fence,
1195  (user_fence_rep) ? &handle : NULL);
1196  /*
1197  * This error is harmless, because if fence submission fails,
1198  * vmw_fifo_send_fence will sync. The error will be propagated to
1199  * user-space in @fence_rep
1200  */
1201 
1202  if (ret != 0)
1203  DRM_ERROR("Fence submission error. Syncing.\n");
1204 
1206  (void *) fence);
1207 
1208  vmw_clear_validations(sw_context);
1209  vmw_execbuf_copy_fence_user(dev_priv, vmw_fpriv(file_priv), ret,
1210  user_fence_rep, fence, handle);
1211 
1212  /* Don't unreference when handing fence out */
1213  if (unlikely(out_fence != NULL)) {
1214  *out_fence = fence;
1215  fence = NULL;
1216  } else if (likely(fence != NULL)) {
1217  vmw_fence_obj_unreference(&fence);
1218  }
1219 
1220  mutex_unlock(&dev_priv->cmdbuf_mutex);
1221  return 0;
1222 
1223 out_err:
1224  vmw_free_relocations(sw_context);
1225 out_throttle:
1226  vmw_query_switch_backoff(sw_context);
1228  vmw_clear_validations(sw_context);
1229 out_unlock:
1230  mutex_unlock(&dev_priv->cmdbuf_mutex);
1231  return ret;
1232 }
1233 
1243 static void vmw_execbuf_unpin_panic(struct vmw_private *dev_priv)
1244 {
1245  DRM_ERROR("Can't unpin query buffer. Trying to recover.\n");
1246 
1247  (void) vmw_fallback_wait(dev_priv, false, true, 0, false, 10*HZ);
1248  vmw_bo_pin(dev_priv->pinned_bo, false);
1249  vmw_bo_pin(dev_priv->dummy_query_bo, false);
1250  dev_priv->dummy_query_bo_pinned = false;
1251 }
1252 
1253 
1276  bool only_on_cid_match, uint32_t cid)
1277 {
1278  int ret = 0;
1279  struct list_head validate_list;
1280  struct ttm_validate_buffer pinned_val, query_val;
1281  struct vmw_fence_obj *fence;
1282 
1283  mutex_lock(&dev_priv->cmdbuf_mutex);
1284 
1285  if (dev_priv->pinned_bo == NULL)
1286  goto out_unlock;
1287 
1288  if (only_on_cid_match && cid != dev_priv->query_cid)
1289  goto out_unlock;
1290 
1291  INIT_LIST_HEAD(&validate_list);
1292 
1293  pinned_val.new_sync_obj_arg = (void *)(unsigned long)
1295  pinned_val.bo = ttm_bo_reference(dev_priv->pinned_bo);
1296  list_add_tail(&pinned_val.head, &validate_list);
1297 
1298  query_val.new_sync_obj_arg = pinned_val.new_sync_obj_arg;
1299  query_val.bo = ttm_bo_reference(dev_priv->dummy_query_bo);
1300  list_add_tail(&query_val.head, &validate_list);
1301 
1302  do {
1303  ret = ttm_eu_reserve_buffers(&validate_list);
1304  } while (ret == -ERESTARTSYS);
1305 
1306  if (unlikely(ret != 0)) {
1307  vmw_execbuf_unpin_panic(dev_priv);
1308  goto out_no_reserve;
1309  }
1310 
1311  ret = vmw_fifo_emit_dummy_query(dev_priv, dev_priv->query_cid);
1312  if (unlikely(ret != 0)) {
1313  vmw_execbuf_unpin_panic(dev_priv);
1314  goto out_no_emit;
1315  }
1316 
1317  vmw_bo_pin(dev_priv->pinned_bo, false);
1318  vmw_bo_pin(dev_priv->dummy_query_bo, false);
1319  dev_priv->dummy_query_bo_pinned = false;
1320 
1321  (void) vmw_execbuf_fence_commands(NULL, dev_priv, &fence, NULL);
1322  ttm_eu_fence_buffer_objects(&validate_list, (void *) fence);
1323 
1324  ttm_bo_unref(&query_val.bo);
1325  ttm_bo_unref(&pinned_val.bo);
1326  ttm_bo_unref(&dev_priv->pinned_bo);
1327 
1328 out_unlock:
1329  mutex_unlock(&dev_priv->cmdbuf_mutex);
1330  return;
1331 
1332 out_no_emit:
1333  ttm_eu_backoff_reservation(&validate_list);
1334 out_no_reserve:
1335  ttm_bo_unref(&query_val.bo);
1336  ttm_bo_unref(&pinned_val.bo);
1337  ttm_bo_unref(&dev_priv->pinned_bo);
1338  mutex_unlock(&dev_priv->cmdbuf_mutex);
1339 }
1340 
1341 
1343  struct drm_file *file_priv)
1344 {
1345  struct vmw_private *dev_priv = vmw_priv(dev);
1346  struct drm_vmw_execbuf_arg *arg = (struct drm_vmw_execbuf_arg *)data;
1347  struct vmw_master *vmaster = vmw_master(file_priv->master);
1348  int ret;
1349 
1350  /*
1351  * This will allow us to extend the ioctl argument while
1352  * maintaining backwards compatibility:
1353  * We take different code paths depending on the value of
1354  * arg->version.
1355  */
1356 
1357  if (unlikely(arg->version != DRM_VMW_EXECBUF_VERSION)) {
1358  DRM_ERROR("Incorrect execbuf version.\n");
1359  DRM_ERROR("You're running outdated experimental "
1360  "vmwgfx user-space drivers.");
1361  return -EINVAL;
1362  }
1363 
1364  ret = ttm_read_lock(&vmaster->lock, true);
1365  if (unlikely(ret != 0))
1366  return ret;
1367 
1368  ret = vmw_execbuf_process(file_priv, dev_priv,
1369  (void __user *)(unsigned long)arg->commands,
1370  NULL, arg->command_size, arg->throttle_us,
1371  (void __user *)(unsigned long)arg->fence_rep,
1372  NULL);
1373 
1374  if (unlikely(ret != 0))
1375  goto out_unlock;
1376 
1377  vmw_kms_cursor_post_execbuf(dev_priv);
1378 
1379 out_unlock:
1380  ttm_read_unlock(&vmaster->lock);
1381  return ret;
1382 }