Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0 OR MIT
  2/**************************************************************************
  3 *
  4 * Copyright © 2018 - 2023 VMware, Inc., Palo Alto, CA., USA
  5 * All Rights Reserved.
  6 *
  7 * Permission is hereby granted, free of charge, to any person obtaining a
  8 * copy of this software and associated documentation files (the
  9 * "Software"), to deal in the Software without restriction, including
 10 * without limitation the rights to use, copy, modify, merge, publish,
 11 * distribute, sub license, and/or sell copies of the Software, and to
 12 * permit persons to whom the Software is furnished to do so, subject to
 13 * the following conditions:
 14 *
 15 * The above copyright notice and this permission notice (including the
 16 * next paragraph) shall be included in all copies or substantial portions
 17 * of the Software.
 18 *
 19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
 22 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
 23 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
 24 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
 25 * USE OR OTHER DEALINGS IN THE SOFTWARE.
 26 *
 27 **************************************************************************/
 28#include "vmwgfx_bo.h"
 29#include "vmwgfx_drv.h"
 30#include "vmwgfx_resource_priv.h"
 31#include "vmwgfx_validation.h"
 32
 33#include <linux/slab.h>
 
 
 34
 35/**
 36 * struct vmw_validation_bo_node - Buffer object validation metadata.
 37 * @base: Metadata used for TTM reservation- and validation.
 38 * @hash: A hash entry used for the duplicate detection hash table.
 39 * @coherent_count: If switching backup buffers, number of new coherent
 40 * resources that will have this buffer as a backup buffer.
 41 *
 42 * Bit fields are used since these structures are allocated and freed in
 43 * large numbers and space conservation is desired.
 44 */
 45struct vmw_validation_bo_node {
 46	struct ttm_validate_buffer base;
 47	struct vmwgfx_hash_item hash;
 48	unsigned int coherent_count;
 
 49};
 
 50/**
 51 * struct vmw_validation_res_node - Resource validation metadata.
 52 * @head: List head for the resource validation list.
 53 * @hash: A hash entry used for the duplicate detection hash table.
 54 * @res: Reference counted resource pointer.
 55 * @new_guest_memory_bo: Non ref-counted pointer to new guest memory buffer
 56 * to be assigned to a resource.
 57 * @new_guest_memory_offset: Offset into the new backup mob for resources
 58 * that can share MOBs.
 59 * @no_buffer_needed: Kernel does not need to allocate a MOB during validation,
 60 * the command stream provides a mob bind operation.
 61 * @switching_guest_memory_bo: The validation process is switching backup MOB.
 62 * @first_usage: True iff the resource has been seen only once in the current
 63 * validation batch.
 64 * @reserved: Whether the resource is currently reserved by this process.
 65 * @dirty_set: Change dirty status of the resource.
 66 * @dirty: Dirty information VMW_RES_DIRTY_XX.
 67 * @private: Optionally additional memory for caller-private data.
 68 *
 69 * Bit fields are used since these structures are allocated and freed in
 70 * large numbers and space conservation is desired.
 71 */
 72struct vmw_validation_res_node {
 73	struct list_head head;
 74	struct vmwgfx_hash_item hash;
 75	struct vmw_resource *res;
 76	struct vmw_bo *new_guest_memory_bo;
 77	unsigned long new_guest_memory_offset;
 78	u32 no_buffer_needed : 1;
 79	u32 switching_guest_memory_bo : 1;
 80	u32 first_usage : 1;
 81	u32 reserved : 1;
 82	u32 dirty : 1;
 83	u32 dirty_set : 1;
 84	unsigned long private[];
 85};
 86
 87/**
 88 * vmw_validation_mem_alloc - Allocate kernel memory from the validation
 89 * context based allocator
 90 * @ctx: The validation context
 91 * @size: The number of bytes to allocated.
 92 *
 93 * The memory allocated may not exceed PAGE_SIZE, and the returned
 94 * address is aligned to sizeof(long). All memory allocated this way is
 95 * reclaimed after validation when calling any of the exported functions:
 96 * vmw_validation_unref_lists()
 97 * vmw_validation_revert()
 98 * vmw_validation_done()
 99 *
100 * Return: Pointer to the allocated memory on success. NULL on failure.
101 */
102void *vmw_validation_mem_alloc(struct vmw_validation_context *ctx,
103			       unsigned int size)
104{
105	void *addr;
106
107	size = vmw_validation_align(size);
108	if (size > PAGE_SIZE)
109		return NULL;
110
111	if (ctx->mem_size_left < size) {
112		struct page *page = alloc_page(GFP_KERNEL | __GFP_ZERO);
 
 
 
 
 
 
 
 
 
 
 
 
113		if (!page)
114			return NULL;
115
 
 
 
116		list_add_tail(&page->lru, &ctx->page_list);
117		ctx->page_address = page_address(page);
118		ctx->mem_size_left = PAGE_SIZE;
119	}
120
121	addr = (void *) (ctx->page_address + (PAGE_SIZE - ctx->mem_size_left));
122	ctx->mem_size_left -= size;
123
124	return addr;
125}
126
127/**
128 * vmw_validation_mem_free - Free all memory allocated using
129 * vmw_validation_mem_alloc()
130 * @ctx: The validation context
131 *
132 * All memory previously allocated for this context using
133 * vmw_validation_mem_alloc() is freed.
134 */
135static void vmw_validation_mem_free(struct vmw_validation_context *ctx)
136{
137	struct page *entry, *next;
138
139	list_for_each_entry_safe(entry, next, &ctx->page_list, lru) {
140		list_del_init(&entry->lru);
141		__free_page(entry);
142	}
143
144	ctx->mem_size_left = 0;
 
 
 
 
 
145}
146
147/**
148 * vmw_validation_find_bo_dup - Find a duplicate buffer object entry in the
149 * validation context's lists.
150 * @ctx: The validation context to search.
151 * @vbo: The buffer object to search for.
152 *
153 * Return: Pointer to the struct vmw_validation_bo_node referencing the
154 * duplicate, or NULL if none found.
155 */
156static struct vmw_validation_bo_node *
157vmw_validation_find_bo_dup(struct vmw_validation_context *ctx,
158			   struct vmw_bo *vbo)
159{
160	struct  vmw_validation_bo_node *bo_node = NULL;
161
162	if (!ctx->merge_dups)
163		return NULL;
164
165	if (ctx->sw_context) {
166		struct vmwgfx_hash_item *hash;
167		unsigned long key = (unsigned long) vbo;
168
169		hash_for_each_possible_rcu(ctx->sw_context->res_ht, hash, head, key) {
170			if (hash->key == key) {
171				bo_node = container_of(hash, typeof(*bo_node), hash);
172				break;
173			}
174		}
175	} else {
176		struct  vmw_validation_bo_node *entry;
177
178		list_for_each_entry(entry, &ctx->bo_list, base.head) {
179			if (entry->base.bo == &vbo->tbo) {
180				bo_node = entry;
181				break;
182			}
183		}
184	}
185
186	return bo_node;
187}
188
189/**
190 * vmw_validation_find_res_dup - Find a duplicate resource entry in the
191 * validation context's lists.
192 * @ctx: The validation context to search.
193 * @res: Reference counted resource pointer.
194 *
195 * Return: Pointer to the struct vmw_validation_bo_node referencing the
196 * duplicate, or NULL if none found.
197 */
198static struct vmw_validation_res_node *
199vmw_validation_find_res_dup(struct vmw_validation_context *ctx,
200			    struct vmw_resource *res)
201{
202	struct  vmw_validation_res_node *res_node = NULL;
203
204	if (!ctx->merge_dups)
205		return NULL;
206
207	if (ctx->sw_context) {
208		struct vmwgfx_hash_item *hash;
209		unsigned long key = (unsigned long) res;
210
211		hash_for_each_possible_rcu(ctx->sw_context->res_ht, hash, head, key) {
212			if (hash->key == key) {
213				res_node = container_of(hash, typeof(*res_node), hash);
214				break;
215			}
216		}
217	} else {
218		struct  vmw_validation_res_node *entry;
219
220		list_for_each_entry(entry, &ctx->resource_ctx_list, head) {
221			if (entry->res == res) {
222				res_node = entry;
223				goto out;
224			}
225		}
226
227		list_for_each_entry(entry, &ctx->resource_list, head) {
228			if (entry->res == res) {
229				res_node = entry;
230				break;
231			}
232		}
233
234	}
235out:
236	return res_node;
237}
238
239/**
240 * vmw_validation_add_bo - Add a buffer object to the validation context.
241 * @ctx: The validation context.
242 * @vbo: The buffer object.
 
 
243 *
244 * Return: Zero on success, negative error code otherwise.
245 */
246int vmw_validation_add_bo(struct vmw_validation_context *ctx,
247			  struct vmw_bo *vbo)
 
 
248{
249	struct vmw_validation_bo_node *bo_node;
250
251	bo_node = vmw_validation_find_bo_dup(ctx, vbo);
252	if (!bo_node) {
 
 
 
 
 
 
253		struct ttm_validate_buffer *val_buf;
 
254
255		bo_node = vmw_validation_mem_alloc(ctx, sizeof(*bo_node));
256		if (!bo_node)
257			return -ENOMEM;
258
259		if (ctx->sw_context) {
260			bo_node->hash.key = (unsigned long) vbo;
261			hash_add_rcu(ctx->sw_context->res_ht, &bo_node->hash.head,
262				bo_node->hash.key);
 
 
 
 
263		}
264		val_buf = &bo_node->base;
265		val_buf->bo = ttm_bo_get_unless_zero(&vbo->tbo);
266		if (!val_buf->bo)
267			return -ESRCH;
268		val_buf->num_shared = 0;
269		list_add_tail(&val_buf->head, &ctx->bo_list);
 
 
270	}
271
272	return 0;
273}
274
275/**
276 * vmw_validation_add_resource - Add a resource to the validation context.
277 * @ctx: The validation context.
278 * @res: The resource.
279 * @priv_size: Size of private, additional metadata.
280 * @dirty: Whether to change dirty status.
281 * @p_node: Output pointer of additional metadata address.
282 * @first_usage: Whether this was the first time this resource was seen.
283 *
284 * Return: Zero on success, negative error code otherwise.
285 */
286int vmw_validation_add_resource(struct vmw_validation_context *ctx,
287				struct vmw_resource *res,
288				size_t priv_size,
289				u32 dirty,
290				void **p_node,
291				bool *first_usage)
292{
293	struct vmw_validation_res_node *node;
 
294
295	node = vmw_validation_find_res_dup(ctx, res);
296	if (node) {
297		node->first_usage = 0;
298		goto out_fill;
299	}
300
301	node = vmw_validation_mem_alloc(ctx, sizeof(*node) + priv_size);
302	if (!node) {
303		VMW_DEBUG_USER("Failed to allocate a resource validation entry.\n");
304		return -ENOMEM;
305	}
306
307	if (ctx->sw_context) {
308		node->hash.key = (unsigned long) res;
309		hash_add_rcu(ctx->sw_context->res_ht, &node->hash.head, node->hash.key);
 
 
 
 
 
310	}
311	node->res = vmw_resource_reference_unless_doomed(res);
312	if (!node->res)
313		return -ESRCH;
314
315	node->first_usage = 1;
316	if (!res->dev_priv->has_mob) {
317		list_add_tail(&node->head, &ctx->resource_list);
318	} else {
319		switch (vmw_res_type(res)) {
320		case vmw_res_context:
321		case vmw_res_dx_context:
322			list_add(&node->head, &ctx->resource_ctx_list);
323			break;
324		case vmw_res_cotable:
325			list_add_tail(&node->head, &ctx->resource_ctx_list);
326			break;
327		default:
328			list_add_tail(&node->head, &ctx->resource_list);
329			break;
330		}
331	}
332
333out_fill:
334	if (dirty) {
335		node->dirty_set = 1;
336		/* Overwriting previous information here is intentional! */
337		node->dirty = (dirty & VMW_RES_DIRTY_SET) ? 1 : 0;
338	}
339	if (first_usage)
340		*first_usage = node->first_usage;
341	if (p_node)
342		*p_node = &node->private;
343
344	return 0;
345}
346
347/**
348 * vmw_validation_res_set_dirty - Register a resource dirty set or clear during
349 * validation.
350 * @ctx: The validation context.
351 * @val_private: The additional meta-data pointer returned when the
352 * resource was registered with the validation context. Used to identify
353 * the resource.
354 * @dirty: Dirty information VMW_RES_DIRTY_XX
355 */
356void vmw_validation_res_set_dirty(struct vmw_validation_context *ctx,
357				  void *val_private, u32 dirty)
358{
359	struct vmw_validation_res_node *val;
360
361	if (!dirty)
362		return;
363
364	val = container_of(val_private, typeof(*val), private);
365	val->dirty_set = 1;
366	/* Overwriting previous information here is intentional! */
367	val->dirty = (dirty & VMW_RES_DIRTY_SET) ? 1 : 0;
368}
369
370/**
371 * vmw_validation_res_switch_backup - Register a backup MOB switch during
372 * validation.
373 * @ctx: The validation context.
374 * @val_private: The additional meta-data pointer returned when the
375 * resource was registered with the validation context. Used to identify
376 * the resource.
377 * @vbo: The new backup buffer object MOB. This buffer object needs to have
378 * already been registered with the validation context.
379 * @guest_memory_offset: Offset into the new backup MOB.
380 */
381void vmw_validation_res_switch_backup(struct vmw_validation_context *ctx,
382				      void *val_private,
383				      struct vmw_bo *vbo,
384				      unsigned long guest_memory_offset)
385{
386	struct vmw_validation_res_node *val;
387
388	val = container_of(val_private, typeof(*val), private);
389
390	val->switching_guest_memory_bo = 1;
391	if (val->first_usage)
392		val->no_buffer_needed = 1;
393
394	val->new_guest_memory_bo = vbo;
395	val->new_guest_memory_offset = guest_memory_offset;
396}
397
398/**
399 * vmw_validation_res_reserve - Reserve all resources registered with this
400 * validation context.
401 * @ctx: The validation context.
402 * @intr: Use interruptible waits when possible.
403 *
404 * Return: Zero on success, -ERESTARTSYS if interrupted. Negative error
405 * code on failure.
406 */
407int vmw_validation_res_reserve(struct vmw_validation_context *ctx,
408			       bool intr)
409{
410	struct vmw_validation_res_node *val;
411	int ret = 0;
412
413	list_splice_init(&ctx->resource_ctx_list, &ctx->resource_list);
414
415	list_for_each_entry(val, &ctx->resource_list, head) {
416		struct vmw_resource *res = val->res;
417
418		ret = vmw_resource_reserve(res, intr, val->no_buffer_needed);
419		if (ret)
420			goto out_unreserve;
421
422		val->reserved = 1;
423		if (res->guest_memory_bo) {
424			struct vmw_bo *vbo = res->guest_memory_bo;
425
426			vmw_bo_placement_set(vbo,
427					     res->func->domain,
428					     res->func->busy_domain);
429			ret = vmw_validation_add_bo(ctx, vbo);
430			if (ret)
431				goto out_unreserve;
432		}
433
434		if (val->switching_guest_memory_bo && val->new_guest_memory_bo &&
435		    res->coherent) {
436			struct vmw_validation_bo_node *bo_node =
437				vmw_validation_find_bo_dup(ctx,
438							   val->new_guest_memory_bo);
439
440			if (WARN_ON(!bo_node)) {
441				ret = -EINVAL;
442				goto out_unreserve;
443			}
444			bo_node->coherent_count++;
445		}
446	}
447
448	return 0;
449
450out_unreserve:
451	vmw_validation_res_unreserve(ctx, true);
452	return ret;
453}
454
455/**
456 * vmw_validation_res_unreserve - Unreserve all reserved resources
457 * registered with this validation context.
458 * @ctx: The validation context.
459 * @backoff: Whether this is a backoff- of a commit-type operation. This
460 * is used to determine whether to switch backup MOBs or not.
461 */
462void vmw_validation_res_unreserve(struct vmw_validation_context *ctx,
463				 bool backoff)
464{
465	struct vmw_validation_res_node *val;
466
467	list_splice_init(&ctx->resource_ctx_list, &ctx->resource_list);
468	if (backoff)
469		list_for_each_entry(val, &ctx->resource_list, head) {
470			if (val->reserved)
471				vmw_resource_unreserve(val->res,
472						       false, false, false,
473						       NULL, 0);
474		}
475	else
476		list_for_each_entry(val, &ctx->resource_list, head) {
477			if (val->reserved)
478				vmw_resource_unreserve(val->res,
479						       val->dirty_set,
480						       val->dirty,
481						       val->switching_guest_memory_bo,
482						       val->new_guest_memory_bo,
483						       val->new_guest_memory_offset);
484		}
485}
486
487/**
488 * vmw_validation_bo_validate_single - Validate a single buffer object.
489 * @bo: The TTM buffer object base.
490 * @interruptible: Whether to perform waits interruptible if possible.
 
491 *
492 * Return: Zero on success, -ERESTARTSYS if interrupted. Negative error
493 * code on failure.
494 */
495static int vmw_validation_bo_validate_single(struct ttm_buffer_object *bo,
496					     bool interruptible)
 
497{
498	struct vmw_bo *vbo = to_vmw_bo(&bo->base);
 
499	struct ttm_operation_ctx ctx = {
500		.interruptible = interruptible,
501		.no_wait_gpu = false
502	};
503	int ret;
504
505	if (atomic_read(&vbo->cpu_writers))
506		return -EBUSY;
507
508	if (vbo->tbo.pin_count > 0)
509		return 0;
510
511	ret = ttm_bo_validate(bo, &vbo->placement, &ctx);
 
 
 
 
 
 
 
 
 
 
512	if (ret == 0 || ret == -ERESTARTSYS)
513		return ret;
514
515	/*
516	 * If that failed, try again, this time evicting
517	 * previous contents.
518	 */
519	ctx.allow_res_evict = true;
520
521	return ttm_bo_validate(bo, &vbo->placement, &ctx);
 
522}
523
524/**
525 * vmw_validation_bo_validate - Validate all buffer objects registered with
526 * the validation context.
527 * @ctx: The validation context.
528 * @intr: Whether to perform waits interruptible if possible.
529 *
530 * Return: Zero on success, -ERESTARTSYS if interrupted,
531 * negative error code on failure.
532 */
533int vmw_validation_bo_validate(struct vmw_validation_context *ctx, bool intr)
534{
535	struct vmw_validation_bo_node *entry;
536	int ret;
537
538	list_for_each_entry(entry, &ctx->bo_list, base.head) {
539		struct vmw_bo *vbo = to_vmw_bo(&entry->base.bo->base);
540
541		ret = vmw_validation_bo_validate_single(entry->base.bo, intr);
542
 
 
 
 
 
 
 
 
543		if (ret)
544			return ret;
545
546		/*
547		 * Rather than having the resource code allocating the bo
548		 * dirty tracker in resource_unreserve() where we can't fail,
549		 * Do it here when validating the buffer object.
550		 */
551		if (entry->coherent_count) {
552			unsigned int coherent_count = entry->coherent_count;
553
554			while (coherent_count) {
555				ret = vmw_bo_dirty_add(vbo);
556				if (ret)
557					return ret;
558
559				coherent_count--;
560			}
561			entry->coherent_count -= coherent_count;
562		}
563
564		if (vbo->dirty)
565			vmw_bo_dirty_scan(vbo);
566	}
567	return 0;
568}
569
570/**
571 * vmw_validation_res_validate - Validate all resources registered with the
572 * validation context.
573 * @ctx: The validation context.
574 * @intr: Whether to perform waits interruptible if possible.
575 *
576 * Before this function is called, all resource backup buffers must have
577 * been validated.
578 *
579 * Return: Zero on success, -ERESTARTSYS if interrupted,
580 * negative error code on failure.
581 */
582int vmw_validation_res_validate(struct vmw_validation_context *ctx, bool intr)
583{
584	struct vmw_validation_res_node *val;
585	int ret;
586
587	list_for_each_entry(val, &ctx->resource_list, head) {
588		struct vmw_resource *res = val->res;
589		struct vmw_bo *backup = res->guest_memory_bo;
590
591		ret = vmw_resource_validate(res, intr, val->dirty_set &&
592					    val->dirty);
593		if (ret) {
594			if (ret != -ERESTARTSYS)
595				DRM_ERROR("Failed to validate resource.\n");
596			return ret;
597		}
598
599		/* Check if the resource switched backup buffer */
600		if (backup && res->guest_memory_bo && backup != res->guest_memory_bo) {
601			struct vmw_bo *vbo = res->guest_memory_bo;
602
603			vmw_bo_placement_set(vbo, res->func->domain,
604					     res->func->busy_domain);
605			ret = vmw_validation_add_bo(ctx, vbo);
606			if (ret)
607				return ret;
608		}
609	}
610	return 0;
611}
612
613/**
614 * vmw_validation_drop_ht - Reset the hash table used for duplicate finding
615 * and unregister it from this validation context.
616 * @ctx: The validation context.
617 *
618 * The hash table used for duplicate finding is an expensive resource and
619 * may be protected by mutexes that may cause deadlocks during resource
620 * unreferencing if held. After resource- and buffer object registering,
621 * there is no longer any use for this hash table, so allow freeing it
622 * either to shorten any mutex locking time, or before resources- and
623 * buffer objects are freed during validation context cleanup.
624 */
625void vmw_validation_drop_ht(struct vmw_validation_context *ctx)
626{
627	struct vmw_validation_bo_node *entry;
628	struct vmw_validation_res_node *val;
629
630	if (!ctx->sw_context)
631		return;
632
633	list_for_each_entry(entry, &ctx->bo_list, base.head)
634		hash_del_rcu(&entry->hash.head);
635
636	list_for_each_entry(val, &ctx->resource_list, head)
637		hash_del_rcu(&val->hash.head);
638
639	list_for_each_entry(val, &ctx->resource_ctx_list, head)
640		hash_del_rcu(&entry->hash.head);
641
642	ctx->sw_context = NULL;
643}
644
645/**
646 * vmw_validation_unref_lists - Unregister previously registered buffer
647 * object and resources.
648 * @ctx: The validation context.
649 *
650 * Note that this function may cause buffer object- and resource destructors
651 * to be invoked.
652 */
653void vmw_validation_unref_lists(struct vmw_validation_context *ctx)
654{
655	struct vmw_validation_bo_node *entry;
656	struct vmw_validation_res_node *val;
657
658	list_for_each_entry(entry, &ctx->bo_list, base.head) {
659		ttm_bo_put(entry->base.bo);
660		entry->base.bo = NULL;
661	}
662
663	list_splice_init(&ctx->resource_ctx_list, &ctx->resource_list);
664	list_for_each_entry(val, &ctx->resource_list, head)
665		vmw_resource_unreference(&val->res);
666
667	/*
668	 * No need to detach each list entry since they are all freed with
669	 * vmw_validation_free_mem. Just make the inaccessible.
670	 */
671	INIT_LIST_HEAD(&ctx->bo_list);
672	INIT_LIST_HEAD(&ctx->resource_list);
673
674	vmw_validation_mem_free(ctx);
675}
676
677/**
678 * vmw_validation_prepare - Prepare a validation context for command
679 * submission.
680 * @ctx: The validation context.
681 * @mutex: The mutex used to protect resource reservation.
682 * @intr: Whether to perform waits interruptible if possible.
683 *
684 * Note that the single reservation mutex @mutex is an unfortunate
685 * construct. Ideally resource reservation should be moved to per-resource
686 * ww_mutexes.
687 * If this functions doesn't return Zero to indicate success, all resources
688 * are left unreserved but still referenced.
689 * Return: Zero on success, -ERESTARTSYS if interrupted, negative error code
690 * on error.
691 */
692int vmw_validation_prepare(struct vmw_validation_context *ctx,
693			   struct mutex *mutex,
694			   bool intr)
695{
696	int ret = 0;
697
698	if (mutex) {
699		if (intr)
700			ret = mutex_lock_interruptible(mutex);
701		else
702			mutex_lock(mutex);
703		if (ret)
704			return -ERESTARTSYS;
705	}
706
707	ctx->res_mutex = mutex;
708	ret = vmw_validation_res_reserve(ctx, intr);
709	if (ret)
710		goto out_no_res_reserve;
711
712	ret = vmw_validation_bo_reserve(ctx, intr);
713	if (ret)
714		goto out_no_bo_reserve;
715
716	ret = vmw_validation_bo_validate(ctx, intr);
717	if (ret)
718		goto out_no_validate;
719
720	ret = vmw_validation_res_validate(ctx, intr);
721	if (ret)
722		goto out_no_validate;
723
724	return 0;
725
726out_no_validate:
727	vmw_validation_bo_backoff(ctx);
728out_no_bo_reserve:
729	vmw_validation_res_unreserve(ctx, true);
730out_no_res_reserve:
731	if (mutex)
732		mutex_unlock(mutex);
733
734	return ret;
735}
736
737/**
738 * vmw_validation_revert - Revert validation actions if command submission
739 * failed.
740 *
741 * @ctx: The validation context.
742 *
743 * The caller still needs to unref resources after a call to this function.
744 */
745void vmw_validation_revert(struct vmw_validation_context *ctx)
746{
747	vmw_validation_bo_backoff(ctx);
748	vmw_validation_res_unreserve(ctx, true);
749	if (ctx->res_mutex)
750		mutex_unlock(ctx->res_mutex);
751	vmw_validation_unref_lists(ctx);
752}
753
754/**
755 * vmw_validation_done - Commit validation actions after command submission
756 * success.
757 * @ctx: The validation context.
758 * @fence: Fence with which to fence all buffer objects taking part in the
759 * command submission.
760 *
761 * The caller does NOT need to unref resources after a call to this function.
762 */
763void vmw_validation_done(struct vmw_validation_context *ctx,
764			 struct vmw_fence_obj *fence)
765{
766	vmw_validation_bo_fence(ctx, fence);
767	vmw_validation_res_unreserve(ctx, false);
768	if (ctx->res_mutex)
769		mutex_unlock(ctx->res_mutex);
770	vmw_validation_unref_lists(ctx);
771}
772
773/**
774 * vmw_validation_preload_bo - Preload the validation memory allocator for a
775 * call to vmw_validation_add_bo().
776 * @ctx: Pointer to the validation context.
777 *
778 * Iff this function returns successfully, the next call to
779 * vmw_validation_add_bo() is guaranteed not to sleep. An error is not fatal
780 * but voids the guarantee.
781 *
782 * Returns: Zero if successful, %-EINVAL otherwise.
783 */
784int vmw_validation_preload_bo(struct vmw_validation_context *ctx)
785{
786	unsigned int size = sizeof(struct vmw_validation_bo_node);
787
788	if (!vmw_validation_mem_alloc(ctx, size))
789		return -ENOMEM;
790
791	ctx->mem_size_left += size;
792	return 0;
793}
794
795/**
796 * vmw_validation_preload_res - Preload the validation memory allocator for a
797 * call to vmw_validation_add_res().
798 * @ctx: Pointer to the validation context.
799 * @size: Size of the validation node extra data. See below.
800 *
801 * Iff this function returns successfully, the next call to
802 * vmw_validation_add_res() with the same or smaller @size is guaranteed not to
803 * sleep. An error is not fatal but voids the guarantee.
804 *
805 * Returns: Zero if successful, %-EINVAL otherwise.
806 */
807int vmw_validation_preload_res(struct vmw_validation_context *ctx,
808			       unsigned int size)
809{
810	size = vmw_validation_align(sizeof(struct vmw_validation_res_node) +
811				    size) +
812		vmw_validation_align(sizeof(struct vmw_validation_bo_node));
813	if (!vmw_validation_mem_alloc(ctx, size))
814		return -ENOMEM;
815
816	ctx->mem_size_left += size;
817	return 0;
818}
819
820/**
821 * vmw_validation_bo_backoff - Unreserve buffer objects registered with a
822 * validation context
823 * @ctx: The validation context
824 *
825 * This function unreserves the buffer objects previously reserved using
826 * vmw_validation_bo_reserve. It's typically used as part of an error path
827 */
828void vmw_validation_bo_backoff(struct vmw_validation_context *ctx)
829{
830	struct vmw_validation_bo_node *entry;
831
832	/*
833	 * Switching coherent resource backup buffers failed.
834	 * Release corresponding buffer object dirty trackers.
835	 */
836	list_for_each_entry(entry, &ctx->bo_list, base.head) {
837		if (entry->coherent_count) {
838			unsigned int coherent_count = entry->coherent_count;
839			struct vmw_bo *vbo = to_vmw_bo(&entry->base.bo->base);
840
841			while (coherent_count--)
842				vmw_bo_dirty_release(vbo);
843		}
844	}
845
846	ttm_eu_backoff_reservation(&ctx->ticket, &ctx->bo_list);
847}
v5.4
  1// SPDX-License-Identifier: GPL-2.0 OR MIT
  2/**************************************************************************
  3 *
  4 * Copyright © 2018 VMware, Inc., Palo Alto, CA., USA
  5 * All Rights Reserved.
  6 *
  7 * Permission is hereby granted, free of charge, to any person obtaining a
  8 * copy of this software and associated documentation files (the
  9 * "Software"), to deal in the Software without restriction, including
 10 * without limitation the rights to use, copy, modify, merge, publish,
 11 * distribute, sub license, and/or sell copies of the Software, and to
 12 * permit persons to whom the Software is furnished to do so, subject to
 13 * the following conditions:
 14 *
 15 * The above copyright notice and this permission notice (including the
 16 * next paragraph) shall be included in all copies or substantial portions
 17 * of the Software.
 18 *
 19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
 22 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
 23 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
 24 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
 25 * USE OR OTHER DEALINGS IN THE SOFTWARE.
 26 *
 27 **************************************************************************/
 
 
 
 
 
 28#include <linux/slab.h>
 29#include "vmwgfx_validation.h"
 30#include "vmwgfx_drv.h"
 31
 32/**
 33 * struct vmw_validation_bo_node - Buffer object validation metadata.
 34 * @base: Metadata used for TTM reservation- and validation.
 35 * @hash: A hash entry used for the duplicate detection hash table.
 36 * @as_mob: Validate as mob.
 37 * @cpu_blit: Validate for cpu blit access.
 38 *
 39 * Bit fields are used since these structures are allocated and freed in
 40 * large numbers and space conservation is desired.
 41 */
 42struct vmw_validation_bo_node {
 43	struct ttm_validate_buffer base;
 44	struct drm_hash_item hash;
 45	u32 as_mob : 1;
 46	u32 cpu_blit : 1;
 47};
 48
 49/**
 50 * struct vmw_validation_res_node - Resource validation metadata.
 51 * @head: List head for the resource validation list.
 52 * @hash: A hash entry used for the duplicate detection hash table.
 53 * @res: Reference counted resource pointer.
 54 * @new_backup: Non ref-counted pointer to new backup buffer to be assigned
 55 * to a resource.
 56 * @new_backup_offset: Offset into the new backup mob for resources that can
 57 * share MOBs.
 58 * @no_buffer_needed: Kernel does not need to allocate a MOB during validation,
 59 * the command stream provides a mob bind operation.
 60 * @switching_backup: The validation process is switching backup MOB.
 61 * @first_usage: True iff the resource has been seen only once in the current
 62 * validation batch.
 63 * @reserved: Whether the resource is currently reserved by this process.
 
 
 64 * @private: Optionally additional memory for caller-private data.
 65 *
 66 * Bit fields are used since these structures are allocated and freed in
 67 * large numbers and space conservation is desired.
 68 */
 69struct vmw_validation_res_node {
 70	struct list_head head;
 71	struct drm_hash_item hash;
 72	struct vmw_resource *res;
 73	struct vmw_buffer_object *new_backup;
 74	unsigned long new_backup_offset;
 75	u32 no_buffer_needed : 1;
 76	u32 switching_backup : 1;
 77	u32 first_usage : 1;
 78	u32 reserved : 1;
 79	u32 dirty : 1;
 80	u32 dirty_set : 1;
 81	unsigned long private[0];
 82};
 83
 84/**
 85 * vmw_validation_mem_alloc - Allocate kernel memory from the validation
 86 * context based allocator
 87 * @ctx: The validation context
 88 * @size: The number of bytes to allocated.
 89 *
 90 * The memory allocated may not exceed PAGE_SIZE, and the returned
 91 * address is aligned to sizeof(long). All memory allocated this way is
 92 * reclaimed after validation when calling any of the exported functions:
 93 * vmw_validation_unref_lists()
 94 * vmw_validation_revert()
 95 * vmw_validation_done()
 96 *
 97 * Return: Pointer to the allocated memory on success. NULL on failure.
 98 */
 99void *vmw_validation_mem_alloc(struct vmw_validation_context *ctx,
100			       unsigned int size)
101{
102	void *addr;
103
104	size = vmw_validation_align(size);
105	if (size > PAGE_SIZE)
106		return NULL;
107
108	if (ctx->mem_size_left < size) {
109		struct page *page;
110
111		if (ctx->vm && ctx->vm_size_left < PAGE_SIZE) {
112			int ret = ctx->vm->reserve_mem(ctx->vm, ctx->vm->gran);
113
114			if (ret)
115				return NULL;
116
117			ctx->vm_size_left += ctx->vm->gran;
118			ctx->total_mem += ctx->vm->gran;
119		}
120
121		page = alloc_page(GFP_KERNEL | __GFP_ZERO);
122		if (!page)
123			return NULL;
124
125		if (ctx->vm)
126			ctx->vm_size_left -= PAGE_SIZE;
127
128		list_add_tail(&page->lru, &ctx->page_list);
129		ctx->page_address = page_address(page);
130		ctx->mem_size_left = PAGE_SIZE;
131	}
132
133	addr = (void *) (ctx->page_address + (PAGE_SIZE - ctx->mem_size_left));
134	ctx->mem_size_left -= size;
135
136	return addr;
137}
138
139/**
140 * vmw_validation_mem_free - Free all memory allocated using
141 * vmw_validation_mem_alloc()
142 * @ctx: The validation context
143 *
144 * All memory previously allocated for this context using
145 * vmw_validation_mem_alloc() is freed.
146 */
147static void vmw_validation_mem_free(struct vmw_validation_context *ctx)
148{
149	struct page *entry, *next;
150
151	list_for_each_entry_safe(entry, next, &ctx->page_list, lru) {
152		list_del_init(&entry->lru);
153		__free_page(entry);
154	}
155
156	ctx->mem_size_left = 0;
157	if (ctx->vm && ctx->total_mem) {
158		ctx->vm->unreserve_mem(ctx->vm, ctx->total_mem);
159		ctx->total_mem = 0;
160		ctx->vm_size_left = 0;
161	}
162}
163
164/**
165 * vmw_validation_find_bo_dup - Find a duplicate buffer object entry in the
166 * validation context's lists.
167 * @ctx: The validation context to search.
168 * @vbo: The buffer object to search for.
169 *
170 * Return: Pointer to the struct vmw_validation_bo_node referencing the
171 * duplicate, or NULL if none found.
172 */
173static struct vmw_validation_bo_node *
174vmw_validation_find_bo_dup(struct vmw_validation_context *ctx,
175			   struct vmw_buffer_object *vbo)
176{
177	struct  vmw_validation_bo_node *bo_node = NULL;
178
179	if (!ctx->merge_dups)
180		return NULL;
181
182	if (ctx->ht) {
183		struct drm_hash_item *hash;
184
185		if (!drm_ht_find_item(ctx->ht, (unsigned long) vbo, &hash))
186			bo_node = container_of(hash, typeof(*bo_node), hash);
 
 
 
 
 
187	} else {
188		struct  vmw_validation_bo_node *entry;
189
190		list_for_each_entry(entry, &ctx->bo_list, base.head) {
191			if (entry->base.bo == &vbo->base) {
192				bo_node = entry;
193				break;
194			}
195		}
196	}
197
198	return bo_node;
199}
200
201/**
202 * vmw_validation_find_res_dup - Find a duplicate resource entry in the
203 * validation context's lists.
204 * @ctx: The validation context to search.
205 * @vbo: The buffer object to search for.
206 *
207 * Return: Pointer to the struct vmw_validation_bo_node referencing the
208 * duplicate, or NULL if none found.
209 */
210static struct vmw_validation_res_node *
211vmw_validation_find_res_dup(struct vmw_validation_context *ctx,
212			    struct vmw_resource *res)
213{
214	struct  vmw_validation_res_node *res_node = NULL;
215
216	if (!ctx->merge_dups)
217		return NULL;
218
219	if (ctx->ht) {
220		struct drm_hash_item *hash;
221
222		if (!drm_ht_find_item(ctx->ht, (unsigned long) res, &hash))
223			res_node = container_of(hash, typeof(*res_node), hash);
 
 
 
 
 
224	} else {
225		struct  vmw_validation_res_node *entry;
226
227		list_for_each_entry(entry, &ctx->resource_ctx_list, head) {
228			if (entry->res == res) {
229				res_node = entry;
230				goto out;
231			}
232		}
233
234		list_for_each_entry(entry, &ctx->resource_list, head) {
235			if (entry->res == res) {
236				res_node = entry;
237				break;
238			}
239		}
240
241	}
242out:
243	return res_node;
244}
245
246/**
247 * vmw_validation_add_bo - Add a buffer object to the validation context.
248 * @ctx: The validation context.
249 * @vbo: The buffer object.
250 * @as_mob: Validate as mob, otherwise suitable for GMR operations.
251 * @cpu_blit: Validate in a page-mappable location.
252 *
253 * Return: Zero on success, negative error code otherwise.
254 */
255int vmw_validation_add_bo(struct vmw_validation_context *ctx,
256			  struct vmw_buffer_object *vbo,
257			  bool as_mob,
258			  bool cpu_blit)
259{
260	struct vmw_validation_bo_node *bo_node;
261
262	bo_node = vmw_validation_find_bo_dup(ctx, vbo);
263	if (bo_node) {
264		if (bo_node->as_mob != as_mob ||
265		    bo_node->cpu_blit != cpu_blit) {
266			DRM_ERROR("Inconsistent buffer usage.\n");
267			return -EINVAL;
268		}
269	} else {
270		struct ttm_validate_buffer *val_buf;
271		int ret;
272
273		bo_node = vmw_validation_mem_alloc(ctx, sizeof(*bo_node));
274		if (!bo_node)
275			return -ENOMEM;
276
277		if (ctx->ht) {
278			bo_node->hash.key = (unsigned long) vbo;
279			ret = drm_ht_insert_item(ctx->ht, &bo_node->hash);
280			if (ret) {
281				DRM_ERROR("Failed to initialize a buffer "
282					  "validation entry.\n");
283				return ret;
284			}
285		}
286		val_buf = &bo_node->base;
287		val_buf->bo = ttm_bo_get_unless_zero(&vbo->base);
288		if (!val_buf->bo)
289			return -ESRCH;
290		val_buf->num_shared = 0;
291		list_add_tail(&val_buf->head, &ctx->bo_list);
292		bo_node->as_mob = as_mob;
293		bo_node->cpu_blit = cpu_blit;
294	}
295
296	return 0;
297}
298
299/**
300 * vmw_validation_add_resource - Add a resource to the validation context.
301 * @ctx: The validation context.
302 * @res: The resource.
303 * @priv_size: Size of private, additional metadata.
304 * @dirty: Whether to change dirty status.
305 * @p_node: Output pointer of additional metadata address.
306 * @first_usage: Whether this was the first time this resource was seen.
307 *
308 * Return: Zero on success, negative error code otherwise.
309 */
310int vmw_validation_add_resource(struct vmw_validation_context *ctx,
311				struct vmw_resource *res,
312				size_t priv_size,
313				u32 dirty,
314				void **p_node,
315				bool *first_usage)
316{
317	struct vmw_validation_res_node *node;
318	int ret;
319
320	node = vmw_validation_find_res_dup(ctx, res);
321	if (node) {
322		node->first_usage = 0;
323		goto out_fill;
324	}
325
326	node = vmw_validation_mem_alloc(ctx, sizeof(*node) + priv_size);
327	if (!node) {
328		VMW_DEBUG_USER("Failed to allocate a resource validation entry.\n");
329		return -ENOMEM;
330	}
331
332	if (ctx->ht) {
333		node->hash.key = (unsigned long) res;
334		ret = drm_ht_insert_item(ctx->ht, &node->hash);
335		if (ret) {
336			DRM_ERROR("Failed to initialize a resource validation "
337				  "entry.\n");
338			return ret;
339		}
340	}
341	node->res = vmw_resource_reference_unless_doomed(res);
342	if (!node->res)
343		return -ESRCH;
344
345	node->first_usage = 1;
346	if (!res->dev_priv->has_mob) {
347		list_add_tail(&node->head, &ctx->resource_list);
348	} else {
349		switch (vmw_res_type(res)) {
350		case vmw_res_context:
351		case vmw_res_dx_context:
352			list_add(&node->head, &ctx->resource_ctx_list);
353			break;
354		case vmw_res_cotable:
355			list_add_tail(&node->head, &ctx->resource_ctx_list);
356			break;
357		default:
358			list_add_tail(&node->head, &ctx->resource_list);
359			break;
360		}
361	}
362
363out_fill:
364	if (dirty) {
365		node->dirty_set = 1;
366		/* Overwriting previous information here is intentional! */
367		node->dirty = (dirty & VMW_RES_DIRTY_SET) ? 1 : 0;
368	}
369	if (first_usage)
370		*first_usage = node->first_usage;
371	if (p_node)
372		*p_node = &node->private;
373
374	return 0;
375}
376
377/**
378 * vmw_validation_res_set_dirty - Register a resource dirty set or clear during
379 * validation.
380 * @ctx: The validation context.
381 * @val_private: The additional meta-data pointer returned when the
382 * resource was registered with the validation context. Used to identify
383 * the resource.
384 * @dirty: Dirty information VMW_RES_DIRTY_XX
385 */
386void vmw_validation_res_set_dirty(struct vmw_validation_context *ctx,
387				  void *val_private, u32 dirty)
388{
389	struct vmw_validation_res_node *val;
390
391	if (!dirty)
392		return;
393
394	val = container_of(val_private, typeof(*val), private);
395	val->dirty_set = 1;
396	/* Overwriting previous information here is intentional! */
397	val->dirty = (dirty & VMW_RES_DIRTY_SET) ? 1 : 0;
398}
399
400/**
401 * vmw_validation_res_switch_backup - Register a backup MOB switch during
402 * validation.
403 * @ctx: The validation context.
404 * @val_private: The additional meta-data pointer returned when the
405 * resource was registered with the validation context. Used to identify
406 * the resource.
407 * @vbo: The new backup buffer object MOB. This buffer object needs to have
408 * already been registered with the validation context.
409 * @backup_offset: Offset into the new backup MOB.
410 */
411void vmw_validation_res_switch_backup(struct vmw_validation_context *ctx,
412				      void *val_private,
413				      struct vmw_buffer_object *vbo,
414				      unsigned long backup_offset)
415{
416	struct vmw_validation_res_node *val;
417
418	val = container_of(val_private, typeof(*val), private);
419
420	val->switching_backup = 1;
421	if (val->first_usage)
422		val->no_buffer_needed = 1;
423
424	val->new_backup = vbo;
425	val->new_backup_offset = backup_offset;
426}
427
428/**
429 * vmw_validation_res_reserve - Reserve all resources registered with this
430 * validation context.
431 * @ctx: The validation context.
432 * @intr: Use interruptible waits when possible.
433 *
434 * Return: Zero on success, -ERESTARTSYS if interrupted. Negative error
435 * code on failure.
436 */
437int vmw_validation_res_reserve(struct vmw_validation_context *ctx,
438			       bool intr)
439{
440	struct vmw_validation_res_node *val;
441	int ret = 0;
442
443	list_splice_init(&ctx->resource_ctx_list, &ctx->resource_list);
444
445	list_for_each_entry(val, &ctx->resource_list, head) {
446		struct vmw_resource *res = val->res;
447
448		ret = vmw_resource_reserve(res, intr, val->no_buffer_needed);
449		if (ret)
450			goto out_unreserve;
451
452		val->reserved = 1;
453		if (res->backup) {
454			struct vmw_buffer_object *vbo = res->backup;
455
456			ret = vmw_validation_add_bo
457				(ctx, vbo, vmw_resource_needs_backup(res),
458				 false);
 
459			if (ret)
460				goto out_unreserve;
461		}
 
 
 
 
 
 
 
 
 
 
 
 
 
462	}
463
464	return 0;
465
466out_unreserve:
467	vmw_validation_res_unreserve(ctx, true);
468	return ret;
469}
470
471/**
472 * vmw_validation_res_unreserve - Unreserve all reserved resources
473 * registered with this validation context.
474 * @ctx: The validation context.
475 * @backoff: Whether this is a backoff- of a commit-type operation. This
476 * is used to determine whether to switch backup MOBs or not.
477 */
478void vmw_validation_res_unreserve(struct vmw_validation_context *ctx,
479				 bool backoff)
480{
481	struct vmw_validation_res_node *val;
482
483	list_splice_init(&ctx->resource_ctx_list, &ctx->resource_list);
484	if (backoff)
485		list_for_each_entry(val, &ctx->resource_list, head) {
486			if (val->reserved)
487				vmw_resource_unreserve(val->res,
488						       false, false, false,
489						       NULL, 0);
490		}
491	else
492		list_for_each_entry(val, &ctx->resource_list, head) {
493			if (val->reserved)
494				vmw_resource_unreserve(val->res,
495						       val->dirty_set,
496						       val->dirty,
497						       val->switching_backup,
498						       val->new_backup,
499						       val->new_backup_offset);
500		}
501}
502
503/**
504 * vmw_validation_bo_validate_single - Validate a single buffer object.
505 * @bo: The TTM buffer object base.
506 * @interruptible: Whether to perform waits interruptible if possible.
507 * @validate_as_mob: Whether to validate in MOB memory.
508 *
509 * Return: Zero on success, -ERESTARTSYS if interrupted. Negative error
510 * code on failure.
511 */
512int vmw_validation_bo_validate_single(struct ttm_buffer_object *bo,
513				      bool interruptible,
514				      bool validate_as_mob)
515{
516	struct vmw_buffer_object *vbo =
517		container_of(bo, struct vmw_buffer_object, base);
518	struct ttm_operation_ctx ctx = {
519		.interruptible = interruptible,
520		.no_wait_gpu = false
521	};
522	int ret;
523
524	if (vbo->pin_count > 0)
 
 
 
525		return 0;
526
527	if (validate_as_mob)
528		return ttm_bo_validate(bo, &vmw_mob_placement, &ctx);
529
530	/**
531	 * Put BO in VRAM if there is space, otherwise as a GMR.
532	 * If there is no space in VRAM and GMR ids are all used up,
533	 * start evicting GMRs to make room. If the DMA buffer can't be
534	 * used as a GMR, this will return -ENOMEM.
535	 */
536
537	ret = ttm_bo_validate(bo, &vmw_vram_gmr_placement, &ctx);
538	if (ret == 0 || ret == -ERESTARTSYS)
539		return ret;
540
541	/**
542	 * If that failed, try VRAM again, this time evicting
543	 * previous contents.
544	 */
 
545
546	ret = ttm_bo_validate(bo, &vmw_vram_placement, &ctx);
547	return ret;
548}
549
550/**
551 * vmw_validation_bo_validate - Validate all buffer objects registered with
552 * the validation context.
553 * @ctx: The validation context.
554 * @intr: Whether to perform waits interruptible if possible.
555 *
556 * Return: Zero on success, -ERESTARTSYS if interrupted,
557 * negative error code on failure.
558 */
559int vmw_validation_bo_validate(struct vmw_validation_context *ctx, bool intr)
560{
561	struct vmw_validation_bo_node *entry;
562	int ret;
563
564	list_for_each_entry(entry, &ctx->bo_list, base.head) {
565		if (entry->cpu_blit) {
566			struct ttm_operation_ctx ctx = {
567				.interruptible = intr,
568				.no_wait_gpu = false
569			};
570
571			ret = ttm_bo_validate(entry->base.bo,
572					      &vmw_nonfixed_placement, &ctx);
573		} else {
574			ret = vmw_validation_bo_validate_single
575			(entry->base.bo, intr, entry->as_mob);
576		}
577		if (ret)
578			return ret;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
579	}
580	return 0;
581}
582
583/**
584 * vmw_validation_res_validate - Validate all resources registered with the
585 * validation context.
586 * @ctx: The validation context.
587 * @intr: Whether to perform waits interruptible if possible.
588 *
589 * Before this function is called, all resource backup buffers must have
590 * been validated.
591 *
592 * Return: Zero on success, -ERESTARTSYS if interrupted,
593 * negative error code on failure.
594 */
595int vmw_validation_res_validate(struct vmw_validation_context *ctx, bool intr)
596{
597	struct vmw_validation_res_node *val;
598	int ret;
599
600	list_for_each_entry(val, &ctx->resource_list, head) {
601		struct vmw_resource *res = val->res;
602		struct vmw_buffer_object *backup = res->backup;
603
604		ret = vmw_resource_validate(res, intr);
 
605		if (ret) {
606			if (ret != -ERESTARTSYS)
607				DRM_ERROR("Failed to validate resource.\n");
608			return ret;
609		}
610
611		/* Check if the resource switched backup buffer */
612		if (backup && res->backup && (backup != res->backup)) {
613			struct vmw_buffer_object *vbo = res->backup;
614
615			ret = vmw_validation_add_bo
616				(ctx, vbo, vmw_resource_needs_backup(res),
617				 false);
618			if (ret)
619				return ret;
620		}
621	}
622	return 0;
623}
624
625/**
626 * vmw_validation_drop_ht - Reset the hash table used for duplicate finding
627 * and unregister it from this validation context.
628 * @ctx: The validation context.
629 *
630 * The hash table used for duplicate finding is an expensive resource and
631 * may be protected by mutexes that may cause deadlocks during resource
632 * unreferencing if held. After resource- and buffer object registering,
633 * there is no longer any use for this hash table, so allow freeing it
634 * either to shorten any mutex locking time, or before resources- and
635 * buffer objects are freed during validation context cleanup.
636 */
637void vmw_validation_drop_ht(struct vmw_validation_context *ctx)
638{
639	struct vmw_validation_bo_node *entry;
640	struct vmw_validation_res_node *val;
641
642	if (!ctx->ht)
643		return;
644
645	list_for_each_entry(entry, &ctx->bo_list, base.head)
646		(void) drm_ht_remove_item(ctx->ht, &entry->hash);
647
648	list_for_each_entry(val, &ctx->resource_list, head)
649		(void) drm_ht_remove_item(ctx->ht, &val->hash);
650
651	list_for_each_entry(val, &ctx->resource_ctx_list, head)
652		(void) drm_ht_remove_item(ctx->ht, &val->hash);
653
654	ctx->ht = NULL;
655}
656
657/**
658 * vmw_validation_unref_lists - Unregister previously registered buffer
659 * object and resources.
660 * @ctx: The validation context.
661 *
662 * Note that this function may cause buffer object- and resource destructors
663 * to be invoked.
664 */
665void vmw_validation_unref_lists(struct vmw_validation_context *ctx)
666{
667	struct vmw_validation_bo_node *entry;
668	struct vmw_validation_res_node *val;
669
670	list_for_each_entry(entry, &ctx->bo_list, base.head) {
671		ttm_bo_put(entry->base.bo);
672		entry->base.bo = NULL;
673	}
674
675	list_splice_init(&ctx->resource_ctx_list, &ctx->resource_list);
676	list_for_each_entry(val, &ctx->resource_list, head)
677		vmw_resource_unreference(&val->res);
678
679	/*
680	 * No need to detach each list entry since they are all freed with
681	 * vmw_validation_free_mem. Just make the inaccessible.
682	 */
683	INIT_LIST_HEAD(&ctx->bo_list);
684	INIT_LIST_HEAD(&ctx->resource_list);
685
686	vmw_validation_mem_free(ctx);
687}
688
689/**
690 * vmw_validation_prepare - Prepare a validation context for command
691 * submission.
692 * @ctx: The validation context.
693 * @mutex: The mutex used to protect resource reservation.
694 * @intr: Whether to perform waits interruptible if possible.
695 *
696 * Note that the single reservation mutex @mutex is an unfortunate
697 * construct. Ideally resource reservation should be moved to per-resource
698 * ww_mutexes.
699 * If this functions doesn't return Zero to indicate success, all resources
700 * are left unreserved but still referenced.
701 * Return: Zero on success, -ERESTARTSYS if interrupted, negative error code
702 * on error.
703 */
704int vmw_validation_prepare(struct vmw_validation_context *ctx,
705			   struct mutex *mutex,
706			   bool intr)
707{
708	int ret = 0;
709
710	if (mutex) {
711		if (intr)
712			ret = mutex_lock_interruptible(mutex);
713		else
714			mutex_lock(mutex);
715		if (ret)
716			return -ERESTARTSYS;
717	}
718
719	ctx->res_mutex = mutex;
720	ret = vmw_validation_res_reserve(ctx, intr);
721	if (ret)
722		goto out_no_res_reserve;
723
724	ret = vmw_validation_bo_reserve(ctx, intr);
725	if (ret)
726		goto out_no_bo_reserve;
727
728	ret = vmw_validation_bo_validate(ctx, intr);
729	if (ret)
730		goto out_no_validate;
731
732	ret = vmw_validation_res_validate(ctx, intr);
733	if (ret)
734		goto out_no_validate;
735
736	return 0;
737
738out_no_validate:
739	vmw_validation_bo_backoff(ctx);
740out_no_bo_reserve:
741	vmw_validation_res_unreserve(ctx, true);
742out_no_res_reserve:
743	if (mutex)
744		mutex_unlock(mutex);
745
746	return ret;
747}
748
749/**
750 * vmw_validation_revert - Revert validation actions if command submission
751 * failed.
752 *
753 * @ctx: The validation context.
754 *
755 * The caller still needs to unref resources after a call to this function.
756 */
757void vmw_validation_revert(struct vmw_validation_context *ctx)
758{
759	vmw_validation_bo_backoff(ctx);
760	vmw_validation_res_unreserve(ctx, true);
761	if (ctx->res_mutex)
762		mutex_unlock(ctx->res_mutex);
763	vmw_validation_unref_lists(ctx);
764}
765
766/**
767 * vmw_validation_cone - Commit validation actions after command submission
768 * success.
769 * @ctx: The validation context.
770 * @fence: Fence with which to fence all buffer objects taking part in the
771 * command submission.
772 *
773 * The caller does NOT need to unref resources after a call to this function.
774 */
775void vmw_validation_done(struct vmw_validation_context *ctx,
776			 struct vmw_fence_obj *fence)
777{
778	vmw_validation_bo_fence(ctx, fence);
779	vmw_validation_res_unreserve(ctx, false);
780	if (ctx->res_mutex)
781		mutex_unlock(ctx->res_mutex);
782	vmw_validation_unref_lists(ctx);
783}
784
785/**
786 * vmw_validation_preload_bo - Preload the validation memory allocator for a
787 * call to vmw_validation_add_bo().
788 * @ctx: Pointer to the validation context.
789 *
790 * Iff this function returns successfully, the next call to
791 * vmw_validation_add_bo() is guaranteed not to sleep. An error is not fatal
792 * but voids the guarantee.
793 *
794 * Returns: Zero if successful, %-EINVAL otherwise.
795 */
796int vmw_validation_preload_bo(struct vmw_validation_context *ctx)
797{
798	unsigned int size = sizeof(struct vmw_validation_bo_node);
799
800	if (!vmw_validation_mem_alloc(ctx, size))
801		return -ENOMEM;
802
803	ctx->mem_size_left += size;
804	return 0;
805}
806
807/**
808 * vmw_validation_preload_res - Preload the validation memory allocator for a
809 * call to vmw_validation_add_res().
810 * @ctx: Pointer to the validation context.
811 * @size: Size of the validation node extra data. See below.
812 *
813 * Iff this function returns successfully, the next call to
814 * vmw_validation_add_res() with the same or smaller @size is guaranteed not to
815 * sleep. An error is not fatal but voids the guarantee.
816 *
817 * Returns: Zero if successful, %-EINVAL otherwise.
818 */
819int vmw_validation_preload_res(struct vmw_validation_context *ctx,
820			       unsigned int size)
821{
822	size = vmw_validation_align(sizeof(struct vmw_validation_res_node) +
823				    size) +
824		vmw_validation_align(sizeof(struct vmw_validation_bo_node));
825	if (!vmw_validation_mem_alloc(ctx, size))
826		return -ENOMEM;
827
828	ctx->mem_size_left += size;
829	return 0;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
830}