162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 OR MIT 262306a36Sopenharmony_ci/************************************************************************** 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * Copyright 2009-2023 VMware, Inc., Palo Alto, CA., USA 562306a36Sopenharmony_ci * 662306a36Sopenharmony_ci * Permission is hereby granted, free of charge, to any person obtaining a 762306a36Sopenharmony_ci * copy of this software and associated documentation files (the 862306a36Sopenharmony_ci * "Software"), to deal in the Software without restriction, including 962306a36Sopenharmony_ci * without limitation the rights to use, copy, modify, merge, publish, 1062306a36Sopenharmony_ci * distribute, sub license, and/or sell copies of the Software, and to 1162306a36Sopenharmony_ci * permit persons to whom the Software is furnished to do so, subject to 1262306a36Sopenharmony_ci * the following conditions: 1362306a36Sopenharmony_ci * 1462306a36Sopenharmony_ci * The above copyright notice and this permission notice (including the 1562306a36Sopenharmony_ci * next paragraph) shall be included in all copies or substantial portions 1662306a36Sopenharmony_ci * of the Software. 1762306a36Sopenharmony_ci * 1862306a36Sopenharmony_ci * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 1962306a36Sopenharmony_ci * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 2062306a36Sopenharmony_ci * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL 2162306a36Sopenharmony_ci * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM, 2262306a36Sopenharmony_ci * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR 2362306a36Sopenharmony_ci * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE 2462306a36Sopenharmony_ci * USE OR OTHER DEALINGS IN THE SOFTWARE. 2562306a36Sopenharmony_ci * 2662306a36Sopenharmony_ci **************************************************************************/ 2762306a36Sopenharmony_ci 2862306a36Sopenharmony_ci#include "vmwgfx_bo.h" 2962306a36Sopenharmony_ci#include "vmwgfx_drv.h" 3062306a36Sopenharmony_ci#include <drm/ttm/ttm_placement.h> 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_cistatic const struct ttm_place vram_placement_flags = { 3362306a36Sopenharmony_ci .fpfn = 0, 3462306a36Sopenharmony_ci .lpfn = 0, 3562306a36Sopenharmony_ci .mem_type = TTM_PL_VRAM, 3662306a36Sopenharmony_ci .flags = 0 3762306a36Sopenharmony_ci}; 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_cistatic const struct ttm_place sys_placement_flags = { 4062306a36Sopenharmony_ci .fpfn = 0, 4162306a36Sopenharmony_ci .lpfn = 0, 4262306a36Sopenharmony_ci .mem_type = TTM_PL_SYSTEM, 4362306a36Sopenharmony_ci .flags = 0 4462306a36Sopenharmony_ci}; 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_cistatic const struct ttm_place gmr_placement_flags = { 4762306a36Sopenharmony_ci .fpfn = 0, 4862306a36Sopenharmony_ci .lpfn = 0, 4962306a36Sopenharmony_ci .mem_type = VMW_PL_GMR, 5062306a36Sopenharmony_ci .flags = 0 5162306a36Sopenharmony_ci}; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_cistruct ttm_placement vmw_vram_placement = { 5462306a36Sopenharmony_ci .num_placement = 1, 5562306a36Sopenharmony_ci .placement = &vram_placement_flags, 5662306a36Sopenharmony_ci .num_busy_placement = 1, 5762306a36Sopenharmony_ci .busy_placement = &vram_placement_flags 5862306a36Sopenharmony_ci}; 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_cistatic const struct ttm_place vram_gmr_placement_flags[] = { 6162306a36Sopenharmony_ci { 6262306a36Sopenharmony_ci .fpfn = 0, 6362306a36Sopenharmony_ci .lpfn = 0, 6462306a36Sopenharmony_ci .mem_type = TTM_PL_VRAM, 6562306a36Sopenharmony_ci .flags = 0 6662306a36Sopenharmony_ci }, { 6762306a36Sopenharmony_ci .fpfn = 0, 6862306a36Sopenharmony_ci .lpfn = 0, 6962306a36Sopenharmony_ci .mem_type = VMW_PL_GMR, 7062306a36Sopenharmony_ci .flags = 0 7162306a36Sopenharmony_ci } 7262306a36Sopenharmony_ci}; 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_cistruct ttm_placement vmw_vram_gmr_placement = { 7562306a36Sopenharmony_ci .num_placement = 2, 7662306a36Sopenharmony_ci .placement = vram_gmr_placement_flags, 7762306a36Sopenharmony_ci .num_busy_placement = 1, 7862306a36Sopenharmony_ci .busy_placement = &gmr_placement_flags 7962306a36Sopenharmony_ci}; 8062306a36Sopenharmony_ci 8162306a36Sopenharmony_cistruct ttm_placement vmw_sys_placement = { 8262306a36Sopenharmony_ci .num_placement = 1, 8362306a36Sopenharmony_ci .placement = &sys_placement_flags, 8462306a36Sopenharmony_ci .num_busy_placement = 1, 8562306a36Sopenharmony_ci .busy_placement = &sys_placement_flags 8662306a36Sopenharmony_ci}; 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ciconst size_t vmw_tt_size = sizeof(struct vmw_ttm_tt); 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_ci/** 9162306a36Sopenharmony_ci * __vmw_piter_non_sg_next: Helper functions to advance 9262306a36Sopenharmony_ci * a struct vmw_piter iterator. 9362306a36Sopenharmony_ci * 9462306a36Sopenharmony_ci * @viter: Pointer to the iterator. 9562306a36Sopenharmony_ci * 9662306a36Sopenharmony_ci * These functions return false if past the end of the list, 9762306a36Sopenharmony_ci * true otherwise. Functions are selected depending on the current 9862306a36Sopenharmony_ci * DMA mapping mode. 9962306a36Sopenharmony_ci */ 10062306a36Sopenharmony_cistatic bool __vmw_piter_non_sg_next(struct vmw_piter *viter) 10162306a36Sopenharmony_ci{ 10262306a36Sopenharmony_ci return ++(viter->i) < viter->num_pages; 10362306a36Sopenharmony_ci} 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_cistatic bool __vmw_piter_sg_next(struct vmw_piter *viter) 10662306a36Sopenharmony_ci{ 10762306a36Sopenharmony_ci bool ret = __vmw_piter_non_sg_next(viter); 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci return __sg_page_iter_dma_next(&viter->iter) && ret; 11062306a36Sopenharmony_ci} 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_cistatic dma_addr_t __vmw_piter_dma_addr(struct vmw_piter *viter) 11462306a36Sopenharmony_ci{ 11562306a36Sopenharmony_ci return viter->addrs[viter->i]; 11662306a36Sopenharmony_ci} 11762306a36Sopenharmony_ci 11862306a36Sopenharmony_cistatic dma_addr_t __vmw_piter_sg_addr(struct vmw_piter *viter) 11962306a36Sopenharmony_ci{ 12062306a36Sopenharmony_ci return sg_page_iter_dma_address(&viter->iter); 12162306a36Sopenharmony_ci} 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci 12462306a36Sopenharmony_ci/** 12562306a36Sopenharmony_ci * vmw_piter_start - Initialize a struct vmw_piter. 12662306a36Sopenharmony_ci * 12762306a36Sopenharmony_ci * @viter: Pointer to the iterator to initialize 12862306a36Sopenharmony_ci * @vsgt: Pointer to a struct vmw_sg_table to initialize from 12962306a36Sopenharmony_ci * @p_offset: Pointer offset used to update current array position 13062306a36Sopenharmony_ci * 13162306a36Sopenharmony_ci * Note that we're following the convention of __sg_page_iter_start, so that 13262306a36Sopenharmony_ci * the iterator doesn't point to a valid page after initialization; it has 13362306a36Sopenharmony_ci * to be advanced one step first. 13462306a36Sopenharmony_ci */ 13562306a36Sopenharmony_civoid vmw_piter_start(struct vmw_piter *viter, const struct vmw_sg_table *vsgt, 13662306a36Sopenharmony_ci unsigned long p_offset) 13762306a36Sopenharmony_ci{ 13862306a36Sopenharmony_ci viter->i = p_offset - 1; 13962306a36Sopenharmony_ci viter->num_pages = vsgt->num_pages; 14062306a36Sopenharmony_ci viter->pages = vsgt->pages; 14162306a36Sopenharmony_ci switch (vsgt->mode) { 14262306a36Sopenharmony_ci case vmw_dma_alloc_coherent: 14362306a36Sopenharmony_ci viter->next = &__vmw_piter_non_sg_next; 14462306a36Sopenharmony_ci viter->dma_address = &__vmw_piter_dma_addr; 14562306a36Sopenharmony_ci viter->addrs = vsgt->addrs; 14662306a36Sopenharmony_ci break; 14762306a36Sopenharmony_ci case vmw_dma_map_populate: 14862306a36Sopenharmony_ci case vmw_dma_map_bind: 14962306a36Sopenharmony_ci viter->next = &__vmw_piter_sg_next; 15062306a36Sopenharmony_ci viter->dma_address = &__vmw_piter_sg_addr; 15162306a36Sopenharmony_ci __sg_page_iter_start(&viter->iter.base, vsgt->sgt->sgl, 15262306a36Sopenharmony_ci vsgt->sgt->orig_nents, p_offset); 15362306a36Sopenharmony_ci break; 15462306a36Sopenharmony_ci default: 15562306a36Sopenharmony_ci BUG(); 15662306a36Sopenharmony_ci } 15762306a36Sopenharmony_ci} 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_ci/** 16062306a36Sopenharmony_ci * vmw_ttm_unmap_from_dma - unmap device addresses previsouly mapped for 16162306a36Sopenharmony_ci * TTM pages 16262306a36Sopenharmony_ci * 16362306a36Sopenharmony_ci * @vmw_tt: Pointer to a struct vmw_ttm_backend 16462306a36Sopenharmony_ci * 16562306a36Sopenharmony_ci * Used to free dma mappings previously mapped by vmw_ttm_map_for_dma. 16662306a36Sopenharmony_ci */ 16762306a36Sopenharmony_cistatic void vmw_ttm_unmap_from_dma(struct vmw_ttm_tt *vmw_tt) 16862306a36Sopenharmony_ci{ 16962306a36Sopenharmony_ci struct device *dev = vmw_tt->dev_priv->drm.dev; 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci dma_unmap_sgtable(dev, &vmw_tt->sgt, DMA_BIDIRECTIONAL, 0); 17262306a36Sopenharmony_ci vmw_tt->sgt.nents = vmw_tt->sgt.orig_nents; 17362306a36Sopenharmony_ci} 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci/** 17662306a36Sopenharmony_ci * vmw_ttm_map_for_dma - map TTM pages to get device addresses 17762306a36Sopenharmony_ci * 17862306a36Sopenharmony_ci * @vmw_tt: Pointer to a struct vmw_ttm_backend 17962306a36Sopenharmony_ci * 18062306a36Sopenharmony_ci * This function is used to get device addresses from the kernel DMA layer. 18162306a36Sopenharmony_ci * However, it's violating the DMA API in that when this operation has been 18262306a36Sopenharmony_ci * performed, it's illegal for the CPU to write to the pages without first 18362306a36Sopenharmony_ci * unmapping the DMA mappings, or calling dma_sync_sg_for_cpu(). It is 18462306a36Sopenharmony_ci * therefore only legal to call this function if we know that the function 18562306a36Sopenharmony_ci * dma_sync_sg_for_cpu() is a NOP, and dma_sync_sg_for_device() is at most 18662306a36Sopenharmony_ci * a CPU write buffer flush. 18762306a36Sopenharmony_ci */ 18862306a36Sopenharmony_cistatic int vmw_ttm_map_for_dma(struct vmw_ttm_tt *vmw_tt) 18962306a36Sopenharmony_ci{ 19062306a36Sopenharmony_ci struct device *dev = vmw_tt->dev_priv->drm.dev; 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_ci return dma_map_sgtable(dev, &vmw_tt->sgt, DMA_BIDIRECTIONAL, 0); 19362306a36Sopenharmony_ci} 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci/** 19662306a36Sopenharmony_ci * vmw_ttm_map_dma - Make sure TTM pages are visible to the device 19762306a36Sopenharmony_ci * 19862306a36Sopenharmony_ci * @vmw_tt: Pointer to a struct vmw_ttm_tt 19962306a36Sopenharmony_ci * 20062306a36Sopenharmony_ci * Select the correct function for and make sure the TTM pages are 20162306a36Sopenharmony_ci * visible to the device. Allocate storage for the device mappings. 20262306a36Sopenharmony_ci * If a mapping has already been performed, indicated by the storage 20362306a36Sopenharmony_ci * pointer being non NULL, the function returns success. 20462306a36Sopenharmony_ci */ 20562306a36Sopenharmony_cistatic int vmw_ttm_map_dma(struct vmw_ttm_tt *vmw_tt) 20662306a36Sopenharmony_ci{ 20762306a36Sopenharmony_ci struct vmw_private *dev_priv = vmw_tt->dev_priv; 20862306a36Sopenharmony_ci struct vmw_sg_table *vsgt = &vmw_tt->vsgt; 20962306a36Sopenharmony_ci int ret = 0; 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci if (vmw_tt->mapped) 21262306a36Sopenharmony_ci return 0; 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci vsgt->mode = dev_priv->map_mode; 21562306a36Sopenharmony_ci vsgt->pages = vmw_tt->dma_ttm.pages; 21662306a36Sopenharmony_ci vsgt->num_pages = vmw_tt->dma_ttm.num_pages; 21762306a36Sopenharmony_ci vsgt->addrs = vmw_tt->dma_ttm.dma_address; 21862306a36Sopenharmony_ci vsgt->sgt = NULL; 21962306a36Sopenharmony_ci 22062306a36Sopenharmony_ci switch (dev_priv->map_mode) { 22162306a36Sopenharmony_ci case vmw_dma_map_bind: 22262306a36Sopenharmony_ci case vmw_dma_map_populate: 22362306a36Sopenharmony_ci vsgt->sgt = &vmw_tt->sgt; 22462306a36Sopenharmony_ci ret = sg_alloc_table_from_pages_segment( 22562306a36Sopenharmony_ci &vmw_tt->sgt, vsgt->pages, vsgt->num_pages, 0, 22662306a36Sopenharmony_ci (unsigned long)vsgt->num_pages << PAGE_SHIFT, 22762306a36Sopenharmony_ci dma_get_max_seg_size(dev_priv->drm.dev), GFP_KERNEL); 22862306a36Sopenharmony_ci if (ret) 22962306a36Sopenharmony_ci goto out_sg_alloc_fail; 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_ci ret = vmw_ttm_map_for_dma(vmw_tt); 23262306a36Sopenharmony_ci if (unlikely(ret != 0)) 23362306a36Sopenharmony_ci goto out_map_fail; 23462306a36Sopenharmony_ci 23562306a36Sopenharmony_ci break; 23662306a36Sopenharmony_ci default: 23762306a36Sopenharmony_ci break; 23862306a36Sopenharmony_ci } 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci vmw_tt->mapped = true; 24162306a36Sopenharmony_ci return 0; 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ciout_map_fail: 24462306a36Sopenharmony_ci sg_free_table(vmw_tt->vsgt.sgt); 24562306a36Sopenharmony_ci vmw_tt->vsgt.sgt = NULL; 24662306a36Sopenharmony_ciout_sg_alloc_fail: 24762306a36Sopenharmony_ci return ret; 24862306a36Sopenharmony_ci} 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_ci/** 25162306a36Sopenharmony_ci * vmw_ttm_unmap_dma - Tear down any TTM page device mappings 25262306a36Sopenharmony_ci * 25362306a36Sopenharmony_ci * @vmw_tt: Pointer to a struct vmw_ttm_tt 25462306a36Sopenharmony_ci * 25562306a36Sopenharmony_ci * Tear down any previously set up device DMA mappings and free 25662306a36Sopenharmony_ci * any storage space allocated for them. If there are no mappings set up, 25762306a36Sopenharmony_ci * this function is a NOP. 25862306a36Sopenharmony_ci */ 25962306a36Sopenharmony_cistatic void vmw_ttm_unmap_dma(struct vmw_ttm_tt *vmw_tt) 26062306a36Sopenharmony_ci{ 26162306a36Sopenharmony_ci struct vmw_private *dev_priv = vmw_tt->dev_priv; 26262306a36Sopenharmony_ci 26362306a36Sopenharmony_ci if (!vmw_tt->vsgt.sgt) 26462306a36Sopenharmony_ci return; 26562306a36Sopenharmony_ci 26662306a36Sopenharmony_ci switch (dev_priv->map_mode) { 26762306a36Sopenharmony_ci case vmw_dma_map_bind: 26862306a36Sopenharmony_ci case vmw_dma_map_populate: 26962306a36Sopenharmony_ci vmw_ttm_unmap_from_dma(vmw_tt); 27062306a36Sopenharmony_ci sg_free_table(vmw_tt->vsgt.sgt); 27162306a36Sopenharmony_ci vmw_tt->vsgt.sgt = NULL; 27262306a36Sopenharmony_ci break; 27362306a36Sopenharmony_ci default: 27462306a36Sopenharmony_ci break; 27562306a36Sopenharmony_ci } 27662306a36Sopenharmony_ci vmw_tt->mapped = false; 27762306a36Sopenharmony_ci} 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci/** 28062306a36Sopenharmony_ci * vmw_bo_sg_table - Return a struct vmw_sg_table object for a 28162306a36Sopenharmony_ci * TTM buffer object 28262306a36Sopenharmony_ci * 28362306a36Sopenharmony_ci * @bo: Pointer to a struct ttm_buffer_object 28462306a36Sopenharmony_ci * 28562306a36Sopenharmony_ci * Returns a pointer to a struct vmw_sg_table object. The object should 28662306a36Sopenharmony_ci * not be freed after use. 28762306a36Sopenharmony_ci * Note that for the device addresses to be valid, the buffer object must 28862306a36Sopenharmony_ci * either be reserved or pinned. 28962306a36Sopenharmony_ci */ 29062306a36Sopenharmony_ciconst struct vmw_sg_table *vmw_bo_sg_table(struct ttm_buffer_object *bo) 29162306a36Sopenharmony_ci{ 29262306a36Sopenharmony_ci struct vmw_ttm_tt *vmw_tt = 29362306a36Sopenharmony_ci container_of(bo->ttm, struct vmw_ttm_tt, dma_ttm); 29462306a36Sopenharmony_ci 29562306a36Sopenharmony_ci return &vmw_tt->vsgt; 29662306a36Sopenharmony_ci} 29762306a36Sopenharmony_ci 29862306a36Sopenharmony_ci 29962306a36Sopenharmony_cistatic int vmw_ttm_bind(struct ttm_device *bdev, 30062306a36Sopenharmony_ci struct ttm_tt *ttm, struct ttm_resource *bo_mem) 30162306a36Sopenharmony_ci{ 30262306a36Sopenharmony_ci struct vmw_ttm_tt *vmw_be = 30362306a36Sopenharmony_ci container_of(ttm, struct vmw_ttm_tt, dma_ttm); 30462306a36Sopenharmony_ci int ret = 0; 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_ci if (!bo_mem) 30762306a36Sopenharmony_ci return -EINVAL; 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci if (vmw_be->bound) 31062306a36Sopenharmony_ci return 0; 31162306a36Sopenharmony_ci 31262306a36Sopenharmony_ci ret = vmw_ttm_map_dma(vmw_be); 31362306a36Sopenharmony_ci if (unlikely(ret != 0)) 31462306a36Sopenharmony_ci return ret; 31562306a36Sopenharmony_ci 31662306a36Sopenharmony_ci vmw_be->gmr_id = bo_mem->start; 31762306a36Sopenharmony_ci vmw_be->mem_type = bo_mem->mem_type; 31862306a36Sopenharmony_ci 31962306a36Sopenharmony_ci switch (bo_mem->mem_type) { 32062306a36Sopenharmony_ci case VMW_PL_GMR: 32162306a36Sopenharmony_ci ret = vmw_gmr_bind(vmw_be->dev_priv, &vmw_be->vsgt, 32262306a36Sopenharmony_ci ttm->num_pages, vmw_be->gmr_id); 32362306a36Sopenharmony_ci break; 32462306a36Sopenharmony_ci case VMW_PL_MOB: 32562306a36Sopenharmony_ci if (unlikely(vmw_be->mob == NULL)) { 32662306a36Sopenharmony_ci vmw_be->mob = 32762306a36Sopenharmony_ci vmw_mob_create(ttm->num_pages); 32862306a36Sopenharmony_ci if (unlikely(vmw_be->mob == NULL)) 32962306a36Sopenharmony_ci return -ENOMEM; 33062306a36Sopenharmony_ci } 33162306a36Sopenharmony_ci 33262306a36Sopenharmony_ci ret = vmw_mob_bind(vmw_be->dev_priv, vmw_be->mob, 33362306a36Sopenharmony_ci &vmw_be->vsgt, ttm->num_pages, 33462306a36Sopenharmony_ci vmw_be->gmr_id); 33562306a36Sopenharmony_ci break; 33662306a36Sopenharmony_ci case VMW_PL_SYSTEM: 33762306a36Sopenharmony_ci /* Nothing to be done for a system bind */ 33862306a36Sopenharmony_ci break; 33962306a36Sopenharmony_ci default: 34062306a36Sopenharmony_ci BUG(); 34162306a36Sopenharmony_ci } 34262306a36Sopenharmony_ci vmw_be->bound = true; 34362306a36Sopenharmony_ci return ret; 34462306a36Sopenharmony_ci} 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_cistatic void vmw_ttm_unbind(struct ttm_device *bdev, 34762306a36Sopenharmony_ci struct ttm_tt *ttm) 34862306a36Sopenharmony_ci{ 34962306a36Sopenharmony_ci struct vmw_ttm_tt *vmw_be = 35062306a36Sopenharmony_ci container_of(ttm, struct vmw_ttm_tt, dma_ttm); 35162306a36Sopenharmony_ci 35262306a36Sopenharmony_ci if (!vmw_be->bound) 35362306a36Sopenharmony_ci return; 35462306a36Sopenharmony_ci 35562306a36Sopenharmony_ci switch (vmw_be->mem_type) { 35662306a36Sopenharmony_ci case VMW_PL_GMR: 35762306a36Sopenharmony_ci vmw_gmr_unbind(vmw_be->dev_priv, vmw_be->gmr_id); 35862306a36Sopenharmony_ci break; 35962306a36Sopenharmony_ci case VMW_PL_MOB: 36062306a36Sopenharmony_ci vmw_mob_unbind(vmw_be->dev_priv, vmw_be->mob); 36162306a36Sopenharmony_ci break; 36262306a36Sopenharmony_ci case VMW_PL_SYSTEM: 36362306a36Sopenharmony_ci break; 36462306a36Sopenharmony_ci default: 36562306a36Sopenharmony_ci BUG(); 36662306a36Sopenharmony_ci } 36762306a36Sopenharmony_ci 36862306a36Sopenharmony_ci if (vmw_be->dev_priv->map_mode == vmw_dma_map_bind) 36962306a36Sopenharmony_ci vmw_ttm_unmap_dma(vmw_be); 37062306a36Sopenharmony_ci vmw_be->bound = false; 37162306a36Sopenharmony_ci} 37262306a36Sopenharmony_ci 37362306a36Sopenharmony_ci 37462306a36Sopenharmony_cistatic void vmw_ttm_destroy(struct ttm_device *bdev, struct ttm_tt *ttm) 37562306a36Sopenharmony_ci{ 37662306a36Sopenharmony_ci struct vmw_ttm_tt *vmw_be = 37762306a36Sopenharmony_ci container_of(ttm, struct vmw_ttm_tt, dma_ttm); 37862306a36Sopenharmony_ci 37962306a36Sopenharmony_ci vmw_ttm_unmap_dma(vmw_be); 38062306a36Sopenharmony_ci ttm_tt_fini(ttm); 38162306a36Sopenharmony_ci if (vmw_be->mob) 38262306a36Sopenharmony_ci vmw_mob_destroy(vmw_be->mob); 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci kfree(vmw_be); 38562306a36Sopenharmony_ci} 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ci 38862306a36Sopenharmony_cistatic int vmw_ttm_populate(struct ttm_device *bdev, 38962306a36Sopenharmony_ci struct ttm_tt *ttm, struct ttm_operation_ctx *ctx) 39062306a36Sopenharmony_ci{ 39162306a36Sopenharmony_ci int ret; 39262306a36Sopenharmony_ci 39362306a36Sopenharmony_ci /* TODO: maybe completely drop this ? */ 39462306a36Sopenharmony_ci if (ttm_tt_is_populated(ttm)) 39562306a36Sopenharmony_ci return 0; 39662306a36Sopenharmony_ci 39762306a36Sopenharmony_ci ret = ttm_pool_alloc(&bdev->pool, ttm, ctx); 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ci return ret; 40062306a36Sopenharmony_ci} 40162306a36Sopenharmony_ci 40262306a36Sopenharmony_cistatic void vmw_ttm_unpopulate(struct ttm_device *bdev, 40362306a36Sopenharmony_ci struct ttm_tt *ttm) 40462306a36Sopenharmony_ci{ 40562306a36Sopenharmony_ci struct vmw_ttm_tt *vmw_tt = container_of(ttm, struct vmw_ttm_tt, 40662306a36Sopenharmony_ci dma_ttm); 40762306a36Sopenharmony_ci 40862306a36Sopenharmony_ci vmw_ttm_unbind(bdev, ttm); 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_ci if (vmw_tt->mob) { 41162306a36Sopenharmony_ci vmw_mob_destroy(vmw_tt->mob); 41262306a36Sopenharmony_ci vmw_tt->mob = NULL; 41362306a36Sopenharmony_ci } 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci vmw_ttm_unmap_dma(vmw_tt); 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci ttm_pool_free(&bdev->pool, ttm); 41862306a36Sopenharmony_ci} 41962306a36Sopenharmony_ci 42062306a36Sopenharmony_cistatic struct ttm_tt *vmw_ttm_tt_create(struct ttm_buffer_object *bo, 42162306a36Sopenharmony_ci uint32_t page_flags) 42262306a36Sopenharmony_ci{ 42362306a36Sopenharmony_ci struct vmw_ttm_tt *vmw_be; 42462306a36Sopenharmony_ci int ret; 42562306a36Sopenharmony_ci 42662306a36Sopenharmony_ci vmw_be = kzalloc(sizeof(*vmw_be), GFP_KERNEL); 42762306a36Sopenharmony_ci if (!vmw_be) 42862306a36Sopenharmony_ci return NULL; 42962306a36Sopenharmony_ci 43062306a36Sopenharmony_ci vmw_be->dev_priv = vmw_priv_from_ttm(bo->bdev); 43162306a36Sopenharmony_ci vmw_be->mob = NULL; 43262306a36Sopenharmony_ci 43362306a36Sopenharmony_ci if (vmw_be->dev_priv->map_mode == vmw_dma_alloc_coherent) 43462306a36Sopenharmony_ci ret = ttm_sg_tt_init(&vmw_be->dma_ttm, bo, page_flags, 43562306a36Sopenharmony_ci ttm_cached); 43662306a36Sopenharmony_ci else 43762306a36Sopenharmony_ci ret = ttm_tt_init(&vmw_be->dma_ttm, bo, page_flags, 43862306a36Sopenharmony_ci ttm_cached, 0); 43962306a36Sopenharmony_ci if (unlikely(ret != 0)) 44062306a36Sopenharmony_ci goto out_no_init; 44162306a36Sopenharmony_ci 44262306a36Sopenharmony_ci return &vmw_be->dma_ttm; 44362306a36Sopenharmony_ciout_no_init: 44462306a36Sopenharmony_ci kfree(vmw_be); 44562306a36Sopenharmony_ci return NULL; 44662306a36Sopenharmony_ci} 44762306a36Sopenharmony_ci 44862306a36Sopenharmony_cistatic void vmw_evict_flags(struct ttm_buffer_object *bo, 44962306a36Sopenharmony_ci struct ttm_placement *placement) 45062306a36Sopenharmony_ci{ 45162306a36Sopenharmony_ci *placement = vmw_sys_placement; 45262306a36Sopenharmony_ci} 45362306a36Sopenharmony_ci 45462306a36Sopenharmony_cistatic int vmw_ttm_io_mem_reserve(struct ttm_device *bdev, struct ttm_resource *mem) 45562306a36Sopenharmony_ci{ 45662306a36Sopenharmony_ci struct vmw_private *dev_priv = vmw_priv_from_ttm(bdev); 45762306a36Sopenharmony_ci 45862306a36Sopenharmony_ci switch (mem->mem_type) { 45962306a36Sopenharmony_ci case TTM_PL_SYSTEM: 46062306a36Sopenharmony_ci case VMW_PL_SYSTEM: 46162306a36Sopenharmony_ci case VMW_PL_GMR: 46262306a36Sopenharmony_ci case VMW_PL_MOB: 46362306a36Sopenharmony_ci return 0; 46462306a36Sopenharmony_ci case TTM_PL_VRAM: 46562306a36Sopenharmony_ci mem->bus.offset = (mem->start << PAGE_SHIFT) + 46662306a36Sopenharmony_ci dev_priv->vram_start; 46762306a36Sopenharmony_ci mem->bus.is_iomem = true; 46862306a36Sopenharmony_ci mem->bus.caching = ttm_cached; 46962306a36Sopenharmony_ci break; 47062306a36Sopenharmony_ci default: 47162306a36Sopenharmony_ci return -EINVAL; 47262306a36Sopenharmony_ci } 47362306a36Sopenharmony_ci return 0; 47462306a36Sopenharmony_ci} 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_ci/** 47762306a36Sopenharmony_ci * vmw_move_notify - TTM move_notify_callback 47862306a36Sopenharmony_ci * 47962306a36Sopenharmony_ci * @bo: The TTM buffer object about to move. 48062306a36Sopenharmony_ci * @old_mem: The old memory where we move from 48162306a36Sopenharmony_ci * @new_mem: The struct ttm_resource indicating to what memory 48262306a36Sopenharmony_ci * region the move is taking place. 48362306a36Sopenharmony_ci * 48462306a36Sopenharmony_ci * Calls move_notify for all subsystems needing it. 48562306a36Sopenharmony_ci * (currently only resources). 48662306a36Sopenharmony_ci */ 48762306a36Sopenharmony_cistatic void vmw_move_notify(struct ttm_buffer_object *bo, 48862306a36Sopenharmony_ci struct ttm_resource *old_mem, 48962306a36Sopenharmony_ci struct ttm_resource *new_mem) 49062306a36Sopenharmony_ci{ 49162306a36Sopenharmony_ci vmw_bo_move_notify(bo, new_mem); 49262306a36Sopenharmony_ci vmw_query_move_notify(bo, old_mem, new_mem); 49362306a36Sopenharmony_ci} 49462306a36Sopenharmony_ci 49562306a36Sopenharmony_ci 49662306a36Sopenharmony_ci/** 49762306a36Sopenharmony_ci * vmw_swap_notify - TTM move_notify_callback 49862306a36Sopenharmony_ci * 49962306a36Sopenharmony_ci * @bo: The TTM buffer object about to be swapped out. 50062306a36Sopenharmony_ci */ 50162306a36Sopenharmony_cistatic void vmw_swap_notify(struct ttm_buffer_object *bo) 50262306a36Sopenharmony_ci{ 50362306a36Sopenharmony_ci vmw_bo_swap_notify(bo); 50462306a36Sopenharmony_ci (void) ttm_bo_wait(bo, false, false); 50562306a36Sopenharmony_ci} 50662306a36Sopenharmony_ci 50762306a36Sopenharmony_cistatic bool vmw_memtype_is_system(uint32_t mem_type) 50862306a36Sopenharmony_ci{ 50962306a36Sopenharmony_ci return mem_type == TTM_PL_SYSTEM || mem_type == VMW_PL_SYSTEM; 51062306a36Sopenharmony_ci} 51162306a36Sopenharmony_ci 51262306a36Sopenharmony_cistatic int vmw_move(struct ttm_buffer_object *bo, 51362306a36Sopenharmony_ci bool evict, 51462306a36Sopenharmony_ci struct ttm_operation_ctx *ctx, 51562306a36Sopenharmony_ci struct ttm_resource *new_mem, 51662306a36Sopenharmony_ci struct ttm_place *hop) 51762306a36Sopenharmony_ci{ 51862306a36Sopenharmony_ci struct ttm_resource_manager *new_man; 51962306a36Sopenharmony_ci struct ttm_resource_manager *old_man = NULL; 52062306a36Sopenharmony_ci int ret = 0; 52162306a36Sopenharmony_ci 52262306a36Sopenharmony_ci new_man = ttm_manager_type(bo->bdev, new_mem->mem_type); 52362306a36Sopenharmony_ci if (bo->resource) 52462306a36Sopenharmony_ci old_man = ttm_manager_type(bo->bdev, bo->resource->mem_type); 52562306a36Sopenharmony_ci 52662306a36Sopenharmony_ci if (new_man->use_tt && !vmw_memtype_is_system(new_mem->mem_type)) { 52762306a36Sopenharmony_ci ret = vmw_ttm_bind(bo->bdev, bo->ttm, new_mem); 52862306a36Sopenharmony_ci if (ret) 52962306a36Sopenharmony_ci return ret; 53062306a36Sopenharmony_ci } 53162306a36Sopenharmony_ci 53262306a36Sopenharmony_ci if (!bo->resource || (bo->resource->mem_type == TTM_PL_SYSTEM && 53362306a36Sopenharmony_ci bo->ttm == NULL)) { 53462306a36Sopenharmony_ci ttm_bo_move_null(bo, new_mem); 53562306a36Sopenharmony_ci return 0; 53662306a36Sopenharmony_ci } 53762306a36Sopenharmony_ci 53862306a36Sopenharmony_ci vmw_move_notify(bo, bo->resource, new_mem); 53962306a36Sopenharmony_ci 54062306a36Sopenharmony_ci if (old_man && old_man->use_tt && new_man->use_tt) { 54162306a36Sopenharmony_ci if (vmw_memtype_is_system(bo->resource->mem_type)) { 54262306a36Sopenharmony_ci ttm_bo_move_null(bo, new_mem); 54362306a36Sopenharmony_ci return 0; 54462306a36Sopenharmony_ci } 54562306a36Sopenharmony_ci ret = ttm_bo_wait_ctx(bo, ctx); 54662306a36Sopenharmony_ci if (ret) 54762306a36Sopenharmony_ci goto fail; 54862306a36Sopenharmony_ci 54962306a36Sopenharmony_ci vmw_ttm_unbind(bo->bdev, bo->ttm); 55062306a36Sopenharmony_ci ttm_resource_free(bo, &bo->resource); 55162306a36Sopenharmony_ci ttm_bo_assign_mem(bo, new_mem); 55262306a36Sopenharmony_ci return 0; 55362306a36Sopenharmony_ci } else { 55462306a36Sopenharmony_ci ret = ttm_bo_move_memcpy(bo, ctx, new_mem); 55562306a36Sopenharmony_ci if (ret) 55662306a36Sopenharmony_ci goto fail; 55762306a36Sopenharmony_ci } 55862306a36Sopenharmony_ci return 0; 55962306a36Sopenharmony_cifail: 56062306a36Sopenharmony_ci vmw_move_notify(bo, new_mem, bo->resource); 56162306a36Sopenharmony_ci return ret; 56262306a36Sopenharmony_ci} 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_cistruct ttm_device_funcs vmw_bo_driver = { 56562306a36Sopenharmony_ci .ttm_tt_create = &vmw_ttm_tt_create, 56662306a36Sopenharmony_ci .ttm_tt_populate = &vmw_ttm_populate, 56762306a36Sopenharmony_ci .ttm_tt_unpopulate = &vmw_ttm_unpopulate, 56862306a36Sopenharmony_ci .ttm_tt_destroy = &vmw_ttm_destroy, 56962306a36Sopenharmony_ci .eviction_valuable = ttm_bo_eviction_valuable, 57062306a36Sopenharmony_ci .evict_flags = vmw_evict_flags, 57162306a36Sopenharmony_ci .move = vmw_move, 57262306a36Sopenharmony_ci .swap_notify = vmw_swap_notify, 57362306a36Sopenharmony_ci .io_mem_reserve = &vmw_ttm_io_mem_reserve, 57462306a36Sopenharmony_ci}; 57562306a36Sopenharmony_ci 57662306a36Sopenharmony_ciint vmw_bo_create_and_populate(struct vmw_private *dev_priv, 57762306a36Sopenharmony_ci size_t bo_size, u32 domain, 57862306a36Sopenharmony_ci struct vmw_bo **bo_p) 57962306a36Sopenharmony_ci{ 58062306a36Sopenharmony_ci struct ttm_operation_ctx ctx = { 58162306a36Sopenharmony_ci .interruptible = false, 58262306a36Sopenharmony_ci .no_wait_gpu = false 58362306a36Sopenharmony_ci }; 58462306a36Sopenharmony_ci struct vmw_bo *vbo; 58562306a36Sopenharmony_ci int ret; 58662306a36Sopenharmony_ci struct vmw_bo_params bo_params = { 58762306a36Sopenharmony_ci .domain = domain, 58862306a36Sopenharmony_ci .busy_domain = domain, 58962306a36Sopenharmony_ci .bo_type = ttm_bo_type_kernel, 59062306a36Sopenharmony_ci .size = bo_size, 59162306a36Sopenharmony_ci .pin = true 59262306a36Sopenharmony_ci }; 59362306a36Sopenharmony_ci 59462306a36Sopenharmony_ci ret = vmw_bo_create(dev_priv, &bo_params, &vbo); 59562306a36Sopenharmony_ci if (unlikely(ret != 0)) 59662306a36Sopenharmony_ci return ret; 59762306a36Sopenharmony_ci 59862306a36Sopenharmony_ci ret = ttm_bo_reserve(&vbo->tbo, false, true, NULL); 59962306a36Sopenharmony_ci BUG_ON(ret != 0); 60062306a36Sopenharmony_ci ret = vmw_ttm_populate(vbo->tbo.bdev, vbo->tbo.ttm, &ctx); 60162306a36Sopenharmony_ci if (likely(ret == 0)) { 60262306a36Sopenharmony_ci struct vmw_ttm_tt *vmw_tt = 60362306a36Sopenharmony_ci container_of(vbo->tbo.ttm, struct vmw_ttm_tt, dma_ttm); 60462306a36Sopenharmony_ci ret = vmw_ttm_map_dma(vmw_tt); 60562306a36Sopenharmony_ci } 60662306a36Sopenharmony_ci 60762306a36Sopenharmony_ci ttm_bo_unreserve(&vbo->tbo); 60862306a36Sopenharmony_ci 60962306a36Sopenharmony_ci if (likely(ret == 0)) 61062306a36Sopenharmony_ci *bo_p = vbo; 61162306a36Sopenharmony_ci return ret; 61262306a36Sopenharmony_ci} 613