vmwgfx_fence.c 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098
  1. /**************************************************************************
  2. *
  3. * Copyright © 2011 VMware, Inc., Palo Alto, CA., USA
  4. * All Rights Reserved.
  5. *
  6. * Permission is hereby granted, free of charge, to any person obtaining a
  7. * copy of this software and associated documentation files (the
  8. * "Software"), to deal in the Software without restriction, including
  9. * without limitation the rights to use, copy, modify, merge, publish,
  10. * distribute, sub license, and/or sell copies of the Software, and to
  11. * permit persons to whom the Software is furnished to do so, subject to
  12. * the following conditions:
  13. *
  14. * The above copyright notice and this permission notice (including the
  15. * next paragraph) shall be included in all copies or substantial portions
  16. * of the Software.
  17. *
  18. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  19. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  20. * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
  21. * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
  22. * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
  23. * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
  24. * USE OR OTHER DEALINGS IN THE SOFTWARE.
  25. *
  26. **************************************************************************/
  27. #include "drmP.h"
  28. #include "vmwgfx_drv.h"
  29. #define VMW_FENCE_WRAP (1 << 31)
  30. struct vmw_fence_manager {
  31. int num_fence_objects;
  32. struct vmw_private *dev_priv;
  33. spinlock_t lock;
  34. struct list_head fence_list;
  35. struct work_struct work;
  36. u32 user_fence_size;
  37. u32 fence_size;
  38. u32 event_fence_action_size;
  39. bool fifo_down;
  40. struct list_head cleanup_list;
  41. uint32_t pending_actions[VMW_ACTION_MAX];
  42. struct mutex goal_irq_mutex;
  43. bool goal_irq_on; /* Protected by @goal_irq_mutex */
  44. bool seqno_valid; /* Protected by @lock, and may not be set to true
  45. without the @goal_irq_mutex held. */
  46. };
  47. struct vmw_user_fence {
  48. struct ttm_base_object base;
  49. struct vmw_fence_obj fence;
  50. };
  51. /**
  52. * struct vmw_event_fence_action - fence action that delivers a drm event.
  53. *
  54. * @e: A struct drm_pending_event that controls the event delivery.
  55. * @action: A struct vmw_fence_action to hook up to a fence.
  56. * @fence: A referenced pointer to the fence to keep it alive while @action
  57. * hangs on it.
  58. * @dev: Pointer to a struct drm_device so we can access the event stuff.
  59. * @kref: Both @e and @action has destructors, so we need to refcount.
  60. * @size: Size accounted for this object.
  61. * @tv_sec: If non-null, the variable pointed to will be assigned
  62. * current time tv_sec val when the fence signals.
  63. * @tv_usec: Must be set if @tv_sec is set, and the variable pointed to will
  64. * be assigned the current time tv_usec val when the fence signals.
  65. */
  66. struct vmw_event_fence_action {
  67. struct vmw_fence_action action;
  68. struct drm_pending_event *event;
  69. struct vmw_fence_obj *fence;
  70. struct drm_device *dev;
  71. uint32_t *tv_sec;
  72. uint32_t *tv_usec;
  73. };
  74. /**
  75. * Note on fencing subsystem usage of irqs:
  76. * Typically the vmw_fences_update function is called
  77. *
  78. * a) When a new fence seqno has been submitted by the fifo code.
  79. * b) On-demand when we have waiters. Sleeping waiters will switch on the
  80. * ANY_FENCE irq and call vmw_fences_update function each time an ANY_FENCE
  81. * irq is received. When the last fence waiter is gone, that IRQ is masked
  82. * away.
  83. *
  84. * In situations where there are no waiters and we don't submit any new fences,
  85. * fence objects may not be signaled. This is perfectly OK, since there are
  86. * no consumers of the signaled data, but that is NOT ok when there are fence
  87. * actions attached to a fence. The fencing subsystem then makes use of the
  88. * FENCE_GOAL irq and sets the fence goal seqno to that of the next fence
  89. * which has an action attached, and each time vmw_fences_update is called,
  90. * the subsystem makes sure the fence goal seqno is updated.
  91. *
  92. * The fence goal seqno irq is on as long as there are unsignaled fence
  93. * objects with actions attached to them.
  94. */
  95. static void vmw_fence_obj_destroy_locked(struct kref *kref)
  96. {
  97. struct vmw_fence_obj *fence =
  98. container_of(kref, struct vmw_fence_obj, kref);
  99. struct vmw_fence_manager *fman = fence->fman;
  100. unsigned int num_fences;
  101. list_del_init(&fence->head);
  102. num_fences = --fman->num_fence_objects;
  103. spin_unlock_irq(&fman->lock);
  104. if (fence->destroy)
  105. fence->destroy(fence);
  106. else
  107. kfree(fence);
  108. spin_lock_irq(&fman->lock);
  109. }
  110. /**
  111. * Execute signal actions on fences recently signaled.
  112. * This is done from a workqueue so we don't have to execute
  113. * signal actions from atomic context.
  114. */
  115. static void vmw_fence_work_func(struct work_struct *work)
  116. {
  117. struct vmw_fence_manager *fman =
  118. container_of(work, struct vmw_fence_manager, work);
  119. struct list_head list;
  120. struct vmw_fence_action *action, *next_action;
  121. bool seqno_valid;
  122. do {
  123. INIT_LIST_HEAD(&list);
  124. mutex_lock(&fman->goal_irq_mutex);
  125. spin_lock_irq(&fman->lock);
  126. list_splice_init(&fman->cleanup_list, &list);
  127. seqno_valid = fman->seqno_valid;
  128. spin_unlock_irq(&fman->lock);
  129. if (!seqno_valid && fman->goal_irq_on) {
  130. fman->goal_irq_on = false;
  131. vmw_goal_waiter_remove(fman->dev_priv);
  132. }
  133. mutex_unlock(&fman->goal_irq_mutex);
  134. if (list_empty(&list))
  135. return;
  136. /*
  137. * At this point, only we should be able to manipulate the
  138. * list heads of the actions we have on the private list.
  139. * hence fman::lock not held.
  140. */
  141. list_for_each_entry_safe(action, next_action, &list, head) {
  142. list_del_init(&action->head);
  143. if (action->cleanup)
  144. action->cleanup(action);
  145. }
  146. } while (1);
  147. }
  148. struct vmw_fence_manager *vmw_fence_manager_init(struct vmw_private *dev_priv)
  149. {
  150. struct vmw_fence_manager *fman = kzalloc(sizeof(*fman), GFP_KERNEL);
  151. if (unlikely(fman == NULL))
  152. return NULL;
  153. fman->dev_priv = dev_priv;
  154. spin_lock_init(&fman->lock);
  155. INIT_LIST_HEAD(&fman->fence_list);
  156. INIT_LIST_HEAD(&fman->cleanup_list);
  157. INIT_WORK(&fman->work, &vmw_fence_work_func);
  158. fman->fifo_down = true;
  159. fman->user_fence_size = ttm_round_pot(sizeof(struct vmw_user_fence));
  160. fman->fence_size = ttm_round_pot(sizeof(struct vmw_fence_obj));
  161. fman->event_fence_action_size =
  162. ttm_round_pot(sizeof(struct vmw_event_fence_action));
  163. mutex_init(&fman->goal_irq_mutex);
  164. return fman;
  165. }
  166. void vmw_fence_manager_takedown(struct vmw_fence_manager *fman)
  167. {
  168. unsigned long irq_flags;
  169. bool lists_empty;
  170. (void) cancel_work_sync(&fman->work);
  171. spin_lock_irqsave(&fman->lock, irq_flags);
  172. lists_empty = list_empty(&fman->fence_list) &&
  173. list_empty(&fman->cleanup_list);
  174. spin_unlock_irqrestore(&fman->lock, irq_flags);
  175. BUG_ON(!lists_empty);
  176. kfree(fman);
  177. }
  178. static int vmw_fence_obj_init(struct vmw_fence_manager *fman,
  179. struct vmw_fence_obj *fence,
  180. u32 seqno,
  181. uint32_t mask,
  182. void (*destroy) (struct vmw_fence_obj *fence))
  183. {
  184. unsigned long irq_flags;
  185. unsigned int num_fences;
  186. int ret = 0;
  187. fence->seqno = seqno;
  188. INIT_LIST_HEAD(&fence->seq_passed_actions);
  189. fence->fman = fman;
  190. fence->signaled = 0;
  191. fence->signal_mask = mask;
  192. kref_init(&fence->kref);
  193. fence->destroy = destroy;
  194. init_waitqueue_head(&fence->queue);
  195. spin_lock_irqsave(&fman->lock, irq_flags);
  196. if (unlikely(fman->fifo_down)) {
  197. ret = -EBUSY;
  198. goto out_unlock;
  199. }
  200. list_add_tail(&fence->head, &fman->fence_list);
  201. num_fences = ++fman->num_fence_objects;
  202. out_unlock:
  203. spin_unlock_irqrestore(&fman->lock, irq_flags);
  204. return ret;
  205. }
  206. struct vmw_fence_obj *vmw_fence_obj_reference(struct vmw_fence_obj *fence)
  207. {
  208. if (unlikely(fence == NULL))
  209. return NULL;
  210. kref_get(&fence->kref);
  211. return fence;
  212. }
  213. /**
  214. * vmw_fence_obj_unreference
  215. *
  216. * Note that this function may not be entered with disabled irqs since
  217. * it may re-enable them in the destroy function.
  218. *
  219. */
  220. void vmw_fence_obj_unreference(struct vmw_fence_obj **fence_p)
  221. {
  222. struct vmw_fence_obj *fence = *fence_p;
  223. struct vmw_fence_manager *fman;
  224. if (unlikely(fence == NULL))
  225. return;
  226. fman = fence->fman;
  227. *fence_p = NULL;
  228. spin_lock_irq(&fman->lock);
  229. BUG_ON(atomic_read(&fence->kref.refcount) == 0);
  230. kref_put(&fence->kref, vmw_fence_obj_destroy_locked);
  231. spin_unlock_irq(&fman->lock);
  232. }
  233. void vmw_fences_perform_actions(struct vmw_fence_manager *fman,
  234. struct list_head *list)
  235. {
  236. struct vmw_fence_action *action, *next_action;
  237. list_for_each_entry_safe(action, next_action, list, head) {
  238. list_del_init(&action->head);
  239. fman->pending_actions[action->type]--;
  240. if (action->seq_passed != NULL)
  241. action->seq_passed(action);
  242. /*
  243. * Add the cleanup action to the cleanup list so that
  244. * it will be performed by a worker task.
  245. */
  246. list_add_tail(&action->head, &fman->cleanup_list);
  247. }
  248. }
  249. /**
  250. * vmw_fence_goal_new_locked - Figure out a new device fence goal
  251. * seqno if needed.
  252. *
  253. * @fman: Pointer to a fence manager.
  254. * @passed_seqno: The seqno the device currently signals as passed.
  255. *
  256. * This function should be called with the fence manager lock held.
  257. * It is typically called when we have a new passed_seqno, and
  258. * we might need to update the fence goal. It checks to see whether
  259. * the current fence goal has already passed, and, in that case,
  260. * scans through all unsignaled fences to get the next fence object with an
  261. * action attached, and sets the seqno of that fence as a new fence goal.
  262. *
  263. * returns true if the device goal seqno was updated. False otherwise.
  264. */
  265. static bool vmw_fence_goal_new_locked(struct vmw_fence_manager *fman,
  266. u32 passed_seqno)
  267. {
  268. u32 goal_seqno;
  269. __le32 __iomem *fifo_mem;
  270. struct vmw_fence_obj *fence;
  271. if (likely(!fman->seqno_valid))
  272. return false;
  273. fifo_mem = fman->dev_priv->mmio_virt;
  274. goal_seqno = ioread32(fifo_mem + SVGA_FIFO_FENCE_GOAL);
  275. if (likely(passed_seqno - goal_seqno >= VMW_FENCE_WRAP))
  276. return false;
  277. fman->seqno_valid = false;
  278. list_for_each_entry(fence, &fman->fence_list, head) {
  279. if (!list_empty(&fence->seq_passed_actions)) {
  280. fman->seqno_valid = true;
  281. iowrite32(fence->seqno,
  282. fifo_mem + SVGA_FIFO_FENCE_GOAL);
  283. break;
  284. }
  285. }
  286. return true;
  287. }
  288. /**
  289. * vmw_fence_goal_check_locked - Replace the device fence goal seqno if
  290. * needed.
  291. *
  292. * @fence: Pointer to a struct vmw_fence_obj the seqno of which should be
  293. * considered as a device fence goal.
  294. *
  295. * This function should be called with the fence manager lock held.
  296. * It is typically called when an action has been attached to a fence to
  297. * check whether the seqno of that fence should be used for a fence
  298. * goal interrupt. This is typically needed if the current fence goal is
  299. * invalid, or has a higher seqno than that of the current fence object.
  300. *
  301. * returns true if the device goal seqno was updated. False otherwise.
  302. */
  303. static bool vmw_fence_goal_check_locked(struct vmw_fence_obj *fence)
  304. {
  305. u32 goal_seqno;
  306. __le32 __iomem *fifo_mem;
  307. if (fence->signaled & DRM_VMW_FENCE_FLAG_EXEC)
  308. return false;
  309. fifo_mem = fence->fman->dev_priv->mmio_virt;
  310. goal_seqno = ioread32(fifo_mem + SVGA_FIFO_FENCE_GOAL);
  311. if (likely(fence->fman->seqno_valid &&
  312. goal_seqno - fence->seqno < VMW_FENCE_WRAP))
  313. return false;
  314. iowrite32(fence->seqno, fifo_mem + SVGA_FIFO_FENCE_GOAL);
  315. fence->fman->seqno_valid = true;
  316. return true;
  317. }
  318. void vmw_fences_update(struct vmw_fence_manager *fman)
  319. {
  320. unsigned long flags;
  321. struct vmw_fence_obj *fence, *next_fence;
  322. struct list_head action_list;
  323. bool needs_rerun;
  324. uint32_t seqno, new_seqno;
  325. __le32 __iomem *fifo_mem = fman->dev_priv->mmio_virt;
  326. seqno = ioread32(fifo_mem + SVGA_FIFO_FENCE);
  327. rerun:
  328. spin_lock_irqsave(&fman->lock, flags);
  329. list_for_each_entry_safe(fence, next_fence, &fman->fence_list, head) {
  330. if (seqno - fence->seqno < VMW_FENCE_WRAP) {
  331. list_del_init(&fence->head);
  332. fence->signaled |= DRM_VMW_FENCE_FLAG_EXEC;
  333. INIT_LIST_HEAD(&action_list);
  334. list_splice_init(&fence->seq_passed_actions,
  335. &action_list);
  336. vmw_fences_perform_actions(fman, &action_list);
  337. wake_up_all(&fence->queue);
  338. } else
  339. break;
  340. }
  341. needs_rerun = vmw_fence_goal_new_locked(fman, seqno);
  342. if (!list_empty(&fman->cleanup_list))
  343. (void) schedule_work(&fman->work);
  344. spin_unlock_irqrestore(&fman->lock, flags);
  345. /*
  346. * Rerun if the fence goal seqno was updated, and the
  347. * hardware might have raced with that update, so that
  348. * we missed a fence_goal irq.
  349. */
  350. if (unlikely(needs_rerun)) {
  351. new_seqno = ioread32(fifo_mem + SVGA_FIFO_FENCE);
  352. if (new_seqno != seqno) {
  353. seqno = new_seqno;
  354. goto rerun;
  355. }
  356. }
  357. }
  358. bool vmw_fence_obj_signaled(struct vmw_fence_obj *fence,
  359. uint32_t flags)
  360. {
  361. struct vmw_fence_manager *fman = fence->fman;
  362. unsigned long irq_flags;
  363. uint32_t signaled;
  364. spin_lock_irqsave(&fman->lock, irq_flags);
  365. signaled = fence->signaled;
  366. spin_unlock_irqrestore(&fman->lock, irq_flags);
  367. flags &= fence->signal_mask;
  368. if ((signaled & flags) == flags)
  369. return 1;
  370. if ((signaled & DRM_VMW_FENCE_FLAG_EXEC) == 0)
  371. vmw_fences_update(fman);
  372. spin_lock_irqsave(&fman->lock, irq_flags);
  373. signaled = fence->signaled;
  374. spin_unlock_irqrestore(&fman->lock, irq_flags);
  375. return ((signaled & flags) == flags);
  376. }
  377. int vmw_fence_obj_wait(struct vmw_fence_obj *fence,
  378. uint32_t flags, bool lazy,
  379. bool interruptible, unsigned long timeout)
  380. {
  381. struct vmw_private *dev_priv = fence->fman->dev_priv;
  382. long ret;
  383. if (likely(vmw_fence_obj_signaled(fence, flags)))
  384. return 0;
  385. vmw_fifo_ping_host(dev_priv, SVGA_SYNC_GENERIC);
  386. vmw_seqno_waiter_add(dev_priv);
  387. if (interruptible)
  388. ret = wait_event_interruptible_timeout
  389. (fence->queue,
  390. vmw_fence_obj_signaled(fence, flags),
  391. timeout);
  392. else
  393. ret = wait_event_timeout
  394. (fence->queue,
  395. vmw_fence_obj_signaled(fence, flags),
  396. timeout);
  397. vmw_seqno_waiter_remove(dev_priv);
  398. if (unlikely(ret == 0))
  399. ret = -EBUSY;
  400. else if (likely(ret > 0))
  401. ret = 0;
  402. return ret;
  403. }
  404. void vmw_fence_obj_flush(struct vmw_fence_obj *fence)
  405. {
  406. struct vmw_private *dev_priv = fence->fman->dev_priv;
  407. vmw_fifo_ping_host(dev_priv, SVGA_SYNC_GENERIC);
  408. }
  409. static void vmw_fence_destroy(struct vmw_fence_obj *fence)
  410. {
  411. struct vmw_fence_manager *fman = fence->fman;
  412. kfree(fence);
  413. /*
  414. * Free kernel space accounting.
  415. */
  416. ttm_mem_global_free(vmw_mem_glob(fman->dev_priv),
  417. fman->fence_size);
  418. }
  419. int vmw_fence_create(struct vmw_fence_manager *fman,
  420. uint32_t seqno,
  421. uint32_t mask,
  422. struct vmw_fence_obj **p_fence)
  423. {
  424. struct ttm_mem_global *mem_glob = vmw_mem_glob(fman->dev_priv);
  425. struct vmw_fence_obj *fence;
  426. int ret;
  427. ret = ttm_mem_global_alloc(mem_glob, fman->fence_size,
  428. false, false);
  429. if (unlikely(ret != 0))
  430. return ret;
  431. fence = kzalloc(sizeof(*fence), GFP_KERNEL);
  432. if (unlikely(fence == NULL)) {
  433. ret = -ENOMEM;
  434. goto out_no_object;
  435. }
  436. ret = vmw_fence_obj_init(fman, fence, seqno, mask,
  437. vmw_fence_destroy);
  438. if (unlikely(ret != 0))
  439. goto out_err_init;
  440. *p_fence = fence;
  441. return 0;
  442. out_err_init:
  443. kfree(fence);
  444. out_no_object:
  445. ttm_mem_global_free(mem_glob, fman->fence_size);
  446. return ret;
  447. }
  448. static void vmw_user_fence_destroy(struct vmw_fence_obj *fence)
  449. {
  450. struct vmw_user_fence *ufence =
  451. container_of(fence, struct vmw_user_fence, fence);
  452. struct vmw_fence_manager *fman = fence->fman;
  453. kfree(ufence);
  454. /*
  455. * Free kernel space accounting.
  456. */
  457. ttm_mem_global_free(vmw_mem_glob(fman->dev_priv),
  458. fman->user_fence_size);
  459. }
  460. static void vmw_user_fence_base_release(struct ttm_base_object **p_base)
  461. {
  462. struct ttm_base_object *base = *p_base;
  463. struct vmw_user_fence *ufence =
  464. container_of(base, struct vmw_user_fence, base);
  465. struct vmw_fence_obj *fence = &ufence->fence;
  466. *p_base = NULL;
  467. vmw_fence_obj_unreference(&fence);
  468. }
  469. int vmw_user_fence_create(struct drm_file *file_priv,
  470. struct vmw_fence_manager *fman,
  471. uint32_t seqno,
  472. uint32_t mask,
  473. struct vmw_fence_obj **p_fence,
  474. uint32_t *p_handle)
  475. {
  476. struct ttm_object_file *tfile = vmw_fpriv(file_priv)->tfile;
  477. struct vmw_user_fence *ufence;
  478. struct vmw_fence_obj *tmp;
  479. struct ttm_mem_global *mem_glob = vmw_mem_glob(fman->dev_priv);
  480. int ret;
  481. /*
  482. * Kernel memory space accounting, since this object may
  483. * be created by a user-space request.
  484. */
  485. ret = ttm_mem_global_alloc(mem_glob, fman->user_fence_size,
  486. false, false);
  487. if (unlikely(ret != 0))
  488. return ret;
  489. ufence = kzalloc(sizeof(*ufence), GFP_KERNEL);
  490. if (unlikely(ufence == NULL)) {
  491. ret = -ENOMEM;
  492. goto out_no_object;
  493. }
  494. ret = vmw_fence_obj_init(fman, &ufence->fence, seqno,
  495. mask, vmw_user_fence_destroy);
  496. if (unlikely(ret != 0)) {
  497. kfree(ufence);
  498. goto out_no_object;
  499. }
  500. /*
  501. * The base object holds a reference which is freed in
  502. * vmw_user_fence_base_release.
  503. */
  504. tmp = vmw_fence_obj_reference(&ufence->fence);
  505. ret = ttm_base_object_init(tfile, &ufence->base, false,
  506. VMW_RES_FENCE,
  507. &vmw_user_fence_base_release, NULL);
  508. if (unlikely(ret != 0)) {
  509. /*
  510. * Free the base object's reference
  511. */
  512. vmw_fence_obj_unreference(&tmp);
  513. goto out_err;
  514. }
  515. *p_fence = &ufence->fence;
  516. *p_handle = ufence->base.hash.key;
  517. return 0;
  518. out_err:
  519. tmp = &ufence->fence;
  520. vmw_fence_obj_unreference(&tmp);
  521. out_no_object:
  522. ttm_mem_global_free(mem_glob, fman->user_fence_size);
  523. return ret;
  524. }
  525. /**
  526. * vmw_fence_fifo_down - signal all unsignaled fence objects.
  527. */
  528. void vmw_fence_fifo_down(struct vmw_fence_manager *fman)
  529. {
  530. unsigned long irq_flags;
  531. struct list_head action_list;
  532. int ret;
  533. /*
  534. * The list may be altered while we traverse it, so always
  535. * restart when we've released the fman->lock.
  536. */
  537. spin_lock_irqsave(&fman->lock, irq_flags);
  538. fman->fifo_down = true;
  539. while (!list_empty(&fman->fence_list)) {
  540. struct vmw_fence_obj *fence =
  541. list_entry(fman->fence_list.prev, struct vmw_fence_obj,
  542. head);
  543. kref_get(&fence->kref);
  544. spin_unlock_irq(&fman->lock);
  545. ret = vmw_fence_obj_wait(fence, fence->signal_mask,
  546. false, false,
  547. VMW_FENCE_WAIT_TIMEOUT);
  548. if (unlikely(ret != 0)) {
  549. list_del_init(&fence->head);
  550. fence->signaled |= DRM_VMW_FENCE_FLAG_EXEC;
  551. INIT_LIST_HEAD(&action_list);
  552. list_splice_init(&fence->seq_passed_actions,
  553. &action_list);
  554. vmw_fences_perform_actions(fman, &action_list);
  555. wake_up_all(&fence->queue);
  556. }
  557. spin_lock_irq(&fman->lock);
  558. BUG_ON(!list_empty(&fence->head));
  559. kref_put(&fence->kref, vmw_fence_obj_destroy_locked);
  560. }
  561. spin_unlock_irqrestore(&fman->lock, irq_flags);
  562. }
  563. void vmw_fence_fifo_up(struct vmw_fence_manager *fman)
  564. {
  565. unsigned long irq_flags;
  566. spin_lock_irqsave(&fman->lock, irq_flags);
  567. fman->fifo_down = false;
  568. spin_unlock_irqrestore(&fman->lock, irq_flags);
  569. }
  570. int vmw_fence_obj_wait_ioctl(struct drm_device *dev, void *data,
  571. struct drm_file *file_priv)
  572. {
  573. struct drm_vmw_fence_wait_arg *arg =
  574. (struct drm_vmw_fence_wait_arg *)data;
  575. unsigned long timeout;
  576. struct ttm_base_object *base;
  577. struct vmw_fence_obj *fence;
  578. struct ttm_object_file *tfile = vmw_fpriv(file_priv)->tfile;
  579. int ret;
  580. uint64_t wait_timeout = ((uint64_t)arg->timeout_us * HZ);
  581. /*
  582. * 64-bit division not present on 32-bit systems, so do an
  583. * approximation. (Divide by 1000000).
  584. */
  585. wait_timeout = (wait_timeout >> 20) + (wait_timeout >> 24) -
  586. (wait_timeout >> 26);
  587. if (!arg->cookie_valid) {
  588. arg->cookie_valid = 1;
  589. arg->kernel_cookie = jiffies + wait_timeout;
  590. }
  591. base = ttm_base_object_lookup(tfile, arg->handle);
  592. if (unlikely(base == NULL)) {
  593. printk(KERN_ERR "Wait invalid fence object handle "
  594. "0x%08lx.\n",
  595. (unsigned long)arg->handle);
  596. return -EINVAL;
  597. }
  598. fence = &(container_of(base, struct vmw_user_fence, base)->fence);
  599. timeout = jiffies;
  600. if (time_after_eq(timeout, (unsigned long)arg->kernel_cookie)) {
  601. ret = ((vmw_fence_obj_signaled(fence, arg->flags)) ?
  602. 0 : -EBUSY);
  603. goto out;
  604. }
  605. timeout = (unsigned long)arg->kernel_cookie - timeout;
  606. ret = vmw_fence_obj_wait(fence, arg->flags, arg->lazy, true, timeout);
  607. out:
  608. ttm_base_object_unref(&base);
  609. /*
  610. * Optionally unref the fence object.
  611. */
  612. if (ret == 0 && (arg->wait_options & DRM_VMW_WAIT_OPTION_UNREF))
  613. return ttm_ref_object_base_unref(tfile, arg->handle,
  614. TTM_REF_USAGE);
  615. return ret;
  616. }
  617. int vmw_fence_obj_signaled_ioctl(struct drm_device *dev, void *data,
  618. struct drm_file *file_priv)
  619. {
  620. struct drm_vmw_fence_signaled_arg *arg =
  621. (struct drm_vmw_fence_signaled_arg *) data;
  622. struct ttm_base_object *base;
  623. struct vmw_fence_obj *fence;
  624. struct vmw_fence_manager *fman;
  625. struct ttm_object_file *tfile = vmw_fpriv(file_priv)->tfile;
  626. struct vmw_private *dev_priv = vmw_priv(dev);
  627. base = ttm_base_object_lookup(tfile, arg->handle);
  628. if (unlikely(base == NULL)) {
  629. printk(KERN_ERR "Fence signaled invalid fence object handle "
  630. "0x%08lx.\n",
  631. (unsigned long)arg->handle);
  632. return -EINVAL;
  633. }
  634. fence = &(container_of(base, struct vmw_user_fence, base)->fence);
  635. fman = fence->fman;
  636. arg->signaled = vmw_fence_obj_signaled(fence, arg->flags);
  637. spin_lock_irq(&fman->lock);
  638. arg->signaled_flags = fence->signaled;
  639. arg->passed_seqno = dev_priv->last_read_seqno;
  640. spin_unlock_irq(&fman->lock);
  641. ttm_base_object_unref(&base);
  642. return 0;
  643. }
  644. int vmw_fence_obj_unref_ioctl(struct drm_device *dev, void *data,
  645. struct drm_file *file_priv)
  646. {
  647. struct drm_vmw_fence_arg *arg =
  648. (struct drm_vmw_fence_arg *) data;
  649. return ttm_ref_object_base_unref(vmw_fpriv(file_priv)->tfile,
  650. arg->handle,
  651. TTM_REF_USAGE);
  652. }
  653. /**
  654. * vmw_event_fence_action_seq_passed
  655. *
  656. * @action: The struct vmw_fence_action embedded in a struct
  657. * vmw_event_fence_action.
  658. *
  659. * This function is called when the seqno of the fence where @action is
  660. * attached has passed. It queues the event on the submitter's event list.
  661. * This function is always called from atomic context, and may be called
  662. * from irq context.
  663. */
  664. static void vmw_event_fence_action_seq_passed(struct vmw_fence_action *action)
  665. {
  666. struct vmw_event_fence_action *eaction =
  667. container_of(action, struct vmw_event_fence_action, action);
  668. struct drm_device *dev = eaction->dev;
  669. struct drm_file *file_priv = eaction->event->file_priv;
  670. unsigned long irq_flags;
  671. spin_lock_irqsave(&dev->event_lock, irq_flags);
  672. if (likely(eaction->tv_sec != NULL)) {
  673. struct timeval tv;
  674. do_gettimeofday(&tv);
  675. *eaction->tv_sec = tv.tv_sec;
  676. *eaction->tv_usec = tv.tv_usec;
  677. }
  678. list_add_tail(&eaction->event->link, &file_priv->event_list);
  679. wake_up_all(&file_priv->event_wait);
  680. spin_unlock_irqrestore(&dev->event_lock, irq_flags);
  681. }
  682. /**
  683. * vmw_event_fence_action_cleanup
  684. *
  685. * @action: The struct vmw_fence_action embedded in a struct
  686. * vmw_event_fence_action.
  687. *
  688. * This function is the struct vmw_fence_action destructor. It's typically
  689. * called from a workqueue.
  690. */
  691. static void vmw_event_fence_action_cleanup(struct vmw_fence_action *action)
  692. {
  693. struct vmw_event_fence_action *eaction =
  694. container_of(action, struct vmw_event_fence_action, action);
  695. vmw_fence_obj_unreference(&eaction->fence);
  696. kfree(eaction);
  697. }
  698. /**
  699. * vmw_fence_obj_add_action - Add an action to a fence object.
  700. *
  701. * @fence - The fence object.
  702. * @action - The action to add.
  703. *
  704. * Note that the action callbacks may be executed before this function
  705. * returns.
  706. */
  707. void vmw_fence_obj_add_action(struct vmw_fence_obj *fence,
  708. struct vmw_fence_action *action)
  709. {
  710. struct vmw_fence_manager *fman = fence->fman;
  711. unsigned long irq_flags;
  712. bool run_update = false;
  713. mutex_lock(&fman->goal_irq_mutex);
  714. spin_lock_irqsave(&fman->lock, irq_flags);
  715. fman->pending_actions[action->type]++;
  716. if (fence->signaled & DRM_VMW_FENCE_FLAG_EXEC) {
  717. struct list_head action_list;
  718. INIT_LIST_HEAD(&action_list);
  719. list_add_tail(&action->head, &action_list);
  720. vmw_fences_perform_actions(fman, &action_list);
  721. } else {
  722. list_add_tail(&action->head, &fence->seq_passed_actions);
  723. /*
  724. * This function may set fman::seqno_valid, so it must
  725. * be run with the goal_irq_mutex held.
  726. */
  727. run_update = vmw_fence_goal_check_locked(fence);
  728. }
  729. spin_unlock_irqrestore(&fman->lock, irq_flags);
  730. if (run_update) {
  731. if (!fman->goal_irq_on) {
  732. fman->goal_irq_on = true;
  733. vmw_goal_waiter_add(fman->dev_priv);
  734. }
  735. vmw_fences_update(fman);
  736. }
  737. mutex_unlock(&fman->goal_irq_mutex);
  738. }
  739. /**
  740. * vmw_event_fence_action_create - Post an event for sending when a fence
  741. * object seqno has passed.
  742. *
  743. * @file_priv: The file connection on which the event should be posted.
  744. * @fence: The fence object on which to post the event.
  745. * @event: Event to be posted. This event should've been alloced
  746. * using k[mz]alloc, and should've been completely initialized.
  747. * @interruptible: Interruptible waits if possible.
  748. *
  749. * As a side effect, the object pointed to by @event may have been
  750. * freed when this function returns. If this function returns with
  751. * an error code, the caller needs to free that object.
  752. */
  753. int vmw_event_fence_action_queue(struct drm_file *file_priv,
  754. struct vmw_fence_obj *fence,
  755. struct drm_pending_event *event,
  756. uint32_t *tv_sec,
  757. uint32_t *tv_usec,
  758. bool interruptible)
  759. {
  760. struct vmw_event_fence_action *eaction;
  761. struct vmw_fence_manager *fman = fence->fman;
  762. eaction = kzalloc(sizeof(*eaction), GFP_KERNEL);
  763. if (unlikely(eaction == NULL))
  764. return -ENOMEM;
  765. eaction->event = event;
  766. eaction->action.seq_passed = vmw_event_fence_action_seq_passed;
  767. eaction->action.cleanup = vmw_event_fence_action_cleanup;
  768. eaction->action.type = VMW_ACTION_EVENT;
  769. eaction->fence = vmw_fence_obj_reference(fence);
  770. eaction->dev = fman->dev_priv->dev;
  771. eaction->tv_sec = tv_sec;
  772. eaction->tv_usec = tv_usec;
  773. vmw_fence_obj_add_action(fence, &eaction->action);
  774. return 0;
  775. }
  776. struct vmw_event_fence_pending {
  777. struct drm_pending_event base;
  778. struct drm_vmw_event_fence event;
  779. };
  780. int vmw_event_fence_action_create(struct drm_file *file_priv,
  781. struct vmw_fence_obj *fence,
  782. uint32_t flags,
  783. uint64_t user_data,
  784. bool interruptible)
  785. {
  786. struct vmw_event_fence_pending *event;
  787. struct drm_device *dev = fence->fman->dev_priv->dev;
  788. unsigned long irq_flags;
  789. int ret;
  790. spin_lock_irqsave(&dev->event_lock, irq_flags);
  791. ret = (file_priv->event_space < sizeof(event->event)) ? -EBUSY : 0;
  792. if (likely(ret == 0))
  793. file_priv->event_space -= sizeof(event->event);
  794. spin_unlock_irqrestore(&dev->event_lock, irq_flags);
  795. if (unlikely(ret != 0)) {
  796. DRM_ERROR("Failed to allocate event space for this file.\n");
  797. goto out_no_space;
  798. }
  799. event = kzalloc(sizeof(event->event), GFP_KERNEL);
  800. if (unlikely(event == NULL)) {
  801. DRM_ERROR("Failed to allocate an event.\n");
  802. ret = -ENOMEM;
  803. goto out_no_event;
  804. }
  805. event->event.base.type = DRM_VMW_EVENT_FENCE_SIGNALED;
  806. event->event.base.length = sizeof(*event);
  807. event->event.user_data = user_data;
  808. event->base.event = &event->event.base;
  809. event->base.file_priv = file_priv;
  810. event->base.destroy = (void (*) (struct drm_pending_event *)) kfree;
  811. if (flags & DRM_VMW_FE_FLAG_REQ_TIME)
  812. ret = vmw_event_fence_action_queue(file_priv, fence,
  813. &event->base,
  814. &event->event.tv_sec,
  815. &event->event.tv_usec,
  816. interruptible);
  817. else
  818. ret = vmw_event_fence_action_queue(file_priv, fence,
  819. &event->base,
  820. NULL,
  821. NULL,
  822. interruptible);
  823. if (ret != 0)
  824. goto out_no_queue;
  825. out_no_queue:
  826. event->base.destroy(&event->base);
  827. out_no_event:
  828. spin_lock_irqsave(&dev->event_lock, irq_flags);
  829. file_priv->event_space += sizeof(*event);
  830. spin_unlock_irqrestore(&dev->event_lock, irq_flags);
  831. out_no_space:
  832. return ret;
  833. }
  834. int vmw_fence_event_ioctl(struct drm_device *dev, void *data,
  835. struct drm_file *file_priv)
  836. {
  837. struct vmw_private *dev_priv = vmw_priv(dev);
  838. struct drm_vmw_fence_event_arg *arg =
  839. (struct drm_vmw_fence_event_arg *) data;
  840. struct vmw_fence_obj *fence = NULL;
  841. struct vmw_fpriv *vmw_fp = vmw_fpriv(file_priv);
  842. struct drm_vmw_fence_rep __user *user_fence_rep =
  843. (struct drm_vmw_fence_rep __user *)(unsigned long)
  844. arg->fence_rep;
  845. uint32_t handle;
  846. int ret;
  847. /*
  848. * Look up an existing fence object,
  849. * and if user-space wants a new reference,
  850. * add one.
  851. */
  852. if (arg->handle) {
  853. struct ttm_base_object *base =
  854. ttm_base_object_lookup(vmw_fp->tfile, arg->handle);
  855. if (unlikely(base == NULL)) {
  856. DRM_ERROR("Fence event invalid fence object handle "
  857. "0x%08lx.\n",
  858. (unsigned long)arg->handle);
  859. return -EINVAL;
  860. }
  861. fence = &(container_of(base, struct vmw_user_fence,
  862. base)->fence);
  863. (void) vmw_fence_obj_reference(fence);
  864. if (user_fence_rep != NULL) {
  865. bool existed;
  866. ret = ttm_ref_object_add(vmw_fp->tfile, base,
  867. TTM_REF_USAGE, &existed);
  868. if (unlikely(ret != 0)) {
  869. DRM_ERROR("Failed to reference a fence "
  870. "object.\n");
  871. goto out_no_ref_obj;
  872. }
  873. handle = base->hash.key;
  874. }
  875. ttm_base_object_unref(&base);
  876. }
  877. /*
  878. * Create a new fence object.
  879. */
  880. if (!fence) {
  881. ret = vmw_execbuf_fence_commands(file_priv, dev_priv,
  882. &fence,
  883. (user_fence_rep) ?
  884. &handle : NULL);
  885. if (unlikely(ret != 0)) {
  886. DRM_ERROR("Fence event failed to create fence.\n");
  887. return ret;
  888. }
  889. }
  890. BUG_ON(fence == NULL);
  891. if (arg->flags & DRM_VMW_FE_FLAG_REQ_TIME)
  892. ret = vmw_event_fence_action_create(file_priv, fence,
  893. arg->flags,
  894. arg->user_data,
  895. true);
  896. else
  897. ret = vmw_event_fence_action_create(file_priv, fence,
  898. arg->flags,
  899. arg->user_data,
  900. true);
  901. if (unlikely(ret != 0)) {
  902. if (ret != -ERESTARTSYS)
  903. DRM_ERROR("Failed to attach event to fence.\n");
  904. goto out_no_create;
  905. }
  906. vmw_execbuf_copy_fence_user(dev_priv, vmw_fp, 0, user_fence_rep, fence,
  907. handle);
  908. vmw_fence_obj_unreference(&fence);
  909. return 0;
  910. out_no_create:
  911. if (user_fence_rep != NULL)
  912. ttm_ref_object_base_unref(vmw_fpriv(file_priv)->tfile,
  913. handle, TTM_REF_USAGE);
  914. out_no_ref_obj:
  915. vmw_fence_obj_unreference(&fence);
  916. return ret;
  917. }