2009-06-05 19:42:42 +07:00
|
|
|
/*
|
|
|
|
* Copyright 2009 Jerome Glisse.
|
|
|
|
* All Rights Reserved.
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
|
|
|
* copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sub license, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
|
|
|
|
* DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
|
|
* OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
|
|
* USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice (including the
|
|
|
|
* next paragraph) shall be included in all copies or substantial portions
|
|
|
|
* of the Software.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* Authors:
|
|
|
|
* Jerome Glisse <glisse@freedesktop.org>
|
|
|
|
* Thomas Hellstrom <thomas-at-tungstengraphics-dot-com>
|
|
|
|
* Dave Airlie
|
|
|
|
*/
|
2017-04-24 11:50:31 +07:00
|
|
|
#include <drm/ttm/ttm_bo_api.h>
|
|
|
|
#include <drm/ttm/ttm_bo_driver.h>
|
|
|
|
#include <drm/ttm/ttm_placement.h>
|
|
|
|
#include <drm/ttm/ttm_module.h>
|
|
|
|
#include <drm/ttm/ttm_page_alloc.h>
|
2009-06-05 19:42:42 +07:00
|
|
|
#include <drm/drmP.h>
|
|
|
|
#include <drm/radeon_drm.h>
|
2009-08-26 10:13:37 +07:00
|
|
|
#include <linux/seq_file.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 15:04:11 +07:00
|
|
|
#include <linux/slab.h>
|
2013-02-02 01:44:33 +07:00
|
|
|
#include <linux/swiotlb.h>
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
#include <linux/swap.h>
|
|
|
|
#include <linux/pagemap.h>
|
2013-12-19 03:07:39 +07:00
|
|
|
#include <linux/debugfs.h>
|
2009-06-05 19:42:42 +07:00
|
|
|
#include "radeon_reg.h"
|
|
|
|
#include "radeon.h"
|
|
|
|
|
|
|
|
#define DRM_FILE_PAGE_OFFSET (0x100000000ULL >> PAGE_SHIFT)
|
|
|
|
|
2009-08-26 10:13:37 +07:00
|
|
|
static int radeon_ttm_debugfs_init(struct radeon_device *rdev);
|
2013-12-19 03:07:39 +07:00
|
|
|
static void radeon_ttm_debugfs_fini(struct radeon_device *rdev);
|
2009-08-26 10:13:37 +07:00
|
|
|
|
2009-06-05 19:42:42 +07:00
|
|
|
static struct radeon_device *radeon_get_rdev(struct ttm_bo_device *bdev)
|
|
|
|
{
|
|
|
|
struct radeon_mman *mman;
|
|
|
|
struct radeon_device *rdev;
|
|
|
|
|
|
|
|
mman = container_of(bdev, struct radeon_mman, bdev);
|
|
|
|
rdev = container_of(mman, struct radeon_device, mman);
|
|
|
|
return rdev;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Global memory.
|
|
|
|
*/
|
2010-03-09 07:56:52 +07:00
|
|
|
static int radeon_ttm_mem_global_init(struct drm_global_reference *ref)
|
2009-06-05 19:42:42 +07:00
|
|
|
{
|
|
|
|
return ttm_mem_global_init(ref->object);
|
|
|
|
}
|
|
|
|
|
2010-03-09 07:56:52 +07:00
|
|
|
static void radeon_ttm_mem_global_release(struct drm_global_reference *ref)
|
2009-06-05 19:42:42 +07:00
|
|
|
{
|
|
|
|
ttm_mem_global_release(ref->object);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_ttm_global_init(struct radeon_device *rdev)
|
|
|
|
{
|
2010-03-09 07:56:52 +07:00
|
|
|
struct drm_global_reference *global_ref;
|
2009-06-05 19:42:42 +07:00
|
|
|
int r;
|
|
|
|
|
|
|
|
rdev->mman.mem_global_referenced = false;
|
|
|
|
global_ref = &rdev->mman.mem_global_ref;
|
2010-03-09 07:56:52 +07:00
|
|
|
global_ref->global_type = DRM_GLOBAL_TTM_MEM;
|
2009-06-05 19:42:42 +07:00
|
|
|
global_ref->size = sizeof(struct ttm_mem_global);
|
|
|
|
global_ref->init = &radeon_ttm_mem_global_init;
|
|
|
|
global_ref->release = &radeon_ttm_mem_global_release;
|
2010-03-09 07:56:52 +07:00
|
|
|
r = drm_global_item_ref(global_ref);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (r != 0) {
|
2009-08-18 21:51:56 +07:00
|
|
|
DRM_ERROR("Failed setting up TTM memory accounting "
|
|
|
|
"subsystem.\n");
|
2009-06-05 19:42:42 +07:00
|
|
|
return r;
|
|
|
|
}
|
2009-08-18 21:51:56 +07:00
|
|
|
|
|
|
|
rdev->mman.bo_global_ref.mem_glob =
|
|
|
|
rdev->mman.mem_global_ref.object;
|
|
|
|
global_ref = &rdev->mman.bo_global_ref.ref;
|
2010-03-09 07:56:52 +07:00
|
|
|
global_ref->global_type = DRM_GLOBAL_TTM_BO;
|
2009-08-20 15:29:08 +07:00
|
|
|
global_ref->size = sizeof(struct ttm_bo_global);
|
2009-08-18 21:51:56 +07:00
|
|
|
global_ref->init = &ttm_bo_global_init;
|
|
|
|
global_ref->release = &ttm_bo_global_release;
|
2010-03-09 07:56:52 +07:00
|
|
|
r = drm_global_item_ref(global_ref);
|
2009-08-18 21:51:56 +07:00
|
|
|
if (r != 0) {
|
|
|
|
DRM_ERROR("Failed setting up TTM BO subsystem.\n");
|
2010-03-09 07:56:52 +07:00
|
|
|
drm_global_item_unref(&rdev->mman.mem_global_ref);
|
2009-08-18 21:51:56 +07:00
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2009-06-05 19:42:42 +07:00
|
|
|
rdev->mman.mem_global_referenced = true;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void radeon_ttm_global_fini(struct radeon_device *rdev)
|
|
|
|
{
|
|
|
|
if (rdev->mman.mem_global_referenced) {
|
2010-03-09 07:56:52 +07:00
|
|
|
drm_global_item_unref(&rdev->mman.bo_global_ref.ref);
|
|
|
|
drm_global_item_unref(&rdev->mman.mem_global_ref);
|
2009-06-05 19:42:42 +07:00
|
|
|
rdev->mman.mem_global_referenced = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_invalidate_caches(struct ttm_bo_device *bdev, uint32_t flags)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_init_mem_type(struct ttm_bo_device *bdev, uint32_t type,
|
|
|
|
struct ttm_mem_type_manager *man)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev;
|
|
|
|
|
|
|
|
rdev = radeon_get_rdev(bdev);
|
|
|
|
|
|
|
|
switch (type) {
|
|
|
|
case TTM_PL_SYSTEM:
|
|
|
|
/* System memory */
|
|
|
|
man->flags = TTM_MEMTYPE_FLAG_MAPPABLE;
|
|
|
|
man->available_caching = TTM_PL_MASK_CACHING;
|
|
|
|
man->default_caching = TTM_PL_FLAG_CACHED;
|
|
|
|
break;
|
|
|
|
case TTM_PL_TT:
|
2010-08-05 07:48:18 +07:00
|
|
|
man->func = &ttm_bo_manager_func;
|
drm/radeon/kms: simplify memory controller setup V2
Get rid of _location and use _start/_end also simplify the
computation of vram_start|end & gtt_start|end. For R1XX-R2XX
we place VRAM at the same address of PCI aperture, those GPU
shouldn't have much memory and seems to behave better when
setup that way. For R3XX and newer we place VRAM at 0. For
R6XX-R7XX AGP we place VRAM before or after AGP aperture this
might limit to limit the VRAM size but it's very unlikely.
For IGP we don't change the VRAM placement.
Tested on (compiz,quake3,suspend/resume):
PCI/PCIE:RV280,R420,RV515,RV570,RV610,RV710
AGP:RV100,RV280,R420,RV350,RV620(RPB*),RV730
IGP:RS480(RPB*),RS690,RS780(RPB*),RS880
RPB: resume previously broken
V2 correct commit message to reflect more accurately the bug
and move VRAM placement to 0 for most of the GPU to avoid
limiting VRAM.
Signed-off-by: Jerome Glisse <jglisse@redhat.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2010-02-18 04:54:29 +07:00
|
|
|
man->gpu_offset = rdev->mc.gtt_start;
|
2009-06-05 19:42:42 +07:00
|
|
|
man->available_caching = TTM_PL_MASK_CACHING;
|
|
|
|
man->default_caching = TTM_PL_FLAG_CACHED;
|
2009-06-15 21:56:11 +07:00
|
|
|
man->flags = TTM_MEMTYPE_FLAG_MAPPABLE | TTM_MEMTYPE_FLAG_CMA;
|
2015-09-09 21:45:52 +07:00
|
|
|
#if IS_ENABLED(CONFIG_AGP)
|
2009-06-05 19:42:42 +07:00
|
|
|
if (rdev->flags & RADEON_IS_AGP) {
|
2013-12-11 17:34:35 +07:00
|
|
|
if (!rdev->ddev->agp) {
|
2009-06-05 19:42:42 +07:00
|
|
|
DRM_ERROR("AGP is not enabled for memory type %u\n",
|
|
|
|
(unsigned)type);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2009-06-15 21:56:11 +07:00
|
|
|
if (!rdev->ddev->agp->cant_use_aperture)
|
2010-04-09 19:39:24 +07:00
|
|
|
man->flags = TTM_MEMTYPE_FLAG_MAPPABLE;
|
2009-06-05 19:42:42 +07:00
|
|
|
man->available_caching = TTM_PL_FLAG_UNCACHED |
|
|
|
|
TTM_PL_FLAG_WC;
|
|
|
|
man->default_caching = TTM_PL_FLAG_WC;
|
|
|
|
}
|
2010-04-07 17:21:27 +07:00
|
|
|
#endif
|
2009-06-05 19:42:42 +07:00
|
|
|
break;
|
|
|
|
case TTM_PL_VRAM:
|
|
|
|
/* "On-card" video ram */
|
2010-08-05 07:48:18 +07:00
|
|
|
man->func = &ttm_bo_manager_func;
|
drm/radeon/kms: simplify memory controller setup V2
Get rid of _location and use _start/_end also simplify the
computation of vram_start|end & gtt_start|end. For R1XX-R2XX
we place VRAM at the same address of PCI aperture, those GPU
shouldn't have much memory and seems to behave better when
setup that way. For R3XX and newer we place VRAM at 0. For
R6XX-R7XX AGP we place VRAM before or after AGP aperture this
might limit to limit the VRAM size but it's very unlikely.
For IGP we don't change the VRAM placement.
Tested on (compiz,quake3,suspend/resume):
PCI/PCIE:RV280,R420,RV515,RV570,RV610,RV710
AGP:RV100,RV280,R420,RV350,RV620(RPB*),RV730
IGP:RS480(RPB*),RS690,RS780(RPB*),RS880
RPB: resume previously broken
V2 correct commit message to reflect more accurately the bug
and move VRAM placement to 0 for most of the GPU to avoid
limiting VRAM.
Signed-off-by: Jerome Glisse <jglisse@redhat.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2010-02-18 04:54:29 +07:00
|
|
|
man->gpu_offset = rdev->mc.vram_start;
|
2009-06-05 19:42:42 +07:00
|
|
|
man->flags = TTM_MEMTYPE_FLAG_FIXED |
|
|
|
|
TTM_MEMTYPE_FLAG_MAPPABLE;
|
|
|
|
man->available_caching = TTM_PL_FLAG_UNCACHED | TTM_PL_FLAG_WC;
|
|
|
|
man->default_caching = TTM_PL_FLAG_WC;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
DRM_ERROR("Unsupported memory type %u\n", (unsigned)type);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-12-07 21:52:58 +07:00
|
|
|
static void radeon_evict_flags(struct ttm_buffer_object *bo,
|
|
|
|
struct ttm_placement *placement)
|
2009-06-05 19:42:42 +07:00
|
|
|
{
|
2017-07-02 16:06:47 +07:00
|
|
|
static const struct ttm_place placements = {
|
2014-08-27 18:16:04 +07:00
|
|
|
.fpfn = 0,
|
|
|
|
.lpfn = 0,
|
|
|
|
.flags = TTM_PL_MASK_CACHING | TTM_PL_FLAG_SYSTEM
|
|
|
|
};
|
|
|
|
|
2009-12-15 03:02:09 +07:00
|
|
|
struct radeon_bo *rbo;
|
|
|
|
|
|
|
|
if (!radeon_ttm_bo_is_radeon_bo(bo)) {
|
|
|
|
placement->placement = &placements;
|
|
|
|
placement->busy_placement = &placements;
|
|
|
|
placement->num_placement = 1;
|
|
|
|
placement->num_busy_placement = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
rbo = container_of(bo, struct radeon_bo, tbo);
|
2009-06-05 19:42:42 +07:00
|
|
|
switch (bo->mem.mem_type) {
|
2009-12-07 21:52:58 +07:00
|
|
|
case TTM_PL_VRAM:
|
2014-12-03 12:03:49 +07:00
|
|
|
if (rbo->rdev->ring[radeon_copy_ring_index(rbo->rdev)].ready == false)
|
2010-01-13 06:21:49 +07:00
|
|
|
radeon_ttm_placement_from_domain(rbo, RADEON_GEM_DOMAIN_CPU);
|
2014-10-09 16:55:04 +07:00
|
|
|
else if (rbo->rdev->mc.visible_vram_size < rbo->rdev->mc.real_vram_size &&
|
|
|
|
bo->mem.start < (rbo->rdev->mc.visible_vram_size >> PAGE_SHIFT)) {
|
|
|
|
unsigned fpfn = rbo->rdev->mc.visible_vram_size >> PAGE_SHIFT;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* Try evicting to the CPU inaccessible part of VRAM
|
|
|
|
* first, but only set GTT as busy placement, so this
|
|
|
|
* BO will be evicted to GTT rather than causing other
|
|
|
|
* BOs to be evicted from VRAM
|
|
|
|
*/
|
|
|
|
radeon_ttm_placement_from_domain(rbo, RADEON_GEM_DOMAIN_VRAM |
|
|
|
|
RADEON_GEM_DOMAIN_GTT);
|
|
|
|
rbo->placement.num_busy_placement = 0;
|
|
|
|
for (i = 0; i < rbo->placement.num_placement; i++) {
|
|
|
|
if (rbo->placements[i].flags & TTM_PL_FLAG_VRAM) {
|
2017-03-24 17:01:09 +07:00
|
|
|
if (rbo->placements[i].fpfn < fpfn)
|
|
|
|
rbo->placements[i].fpfn = fpfn;
|
2014-10-09 16:55:04 +07:00
|
|
|
} else {
|
|
|
|
rbo->placement.busy_placement =
|
|
|
|
&rbo->placements[i];
|
|
|
|
rbo->placement.num_busy_placement = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else
|
2010-01-13 06:21:49 +07:00
|
|
|
radeon_ttm_placement_from_domain(rbo, RADEON_GEM_DOMAIN_GTT);
|
2009-12-07 21:52:58 +07:00
|
|
|
break;
|
|
|
|
case TTM_PL_TT:
|
2009-06-05 19:42:42 +07:00
|
|
|
default:
|
2009-12-07 21:52:58 +07:00
|
|
|
radeon_ttm_placement_from_domain(rbo, RADEON_GEM_DOMAIN_CPU);
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
2009-12-10 03:57:37 +07:00
|
|
|
*placement = rbo->placement;
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_verify_access(struct ttm_buffer_object *bo, struct file *filp)
|
|
|
|
{
|
2013-08-25 23:28:59 +07:00
|
|
|
struct radeon_bo *rbo = container_of(bo, struct radeon_bo, tbo);
|
|
|
|
|
2016-04-19 20:07:50 +07:00
|
|
|
if (radeon_ttm_tt_has_userptr(bo->ttm))
|
|
|
|
return -EPERM;
|
2016-09-01 19:48:33 +07:00
|
|
|
return drm_vma_node_verify_access(&rbo->gem_base.vma_node,
|
|
|
|
filp->private_data);
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void radeon_move_null(struct ttm_buffer_object *bo,
|
|
|
|
struct ttm_mem_reg *new_mem)
|
|
|
|
{
|
|
|
|
struct ttm_mem_reg *old_mem = &bo->mem;
|
|
|
|
|
|
|
|
BUG_ON(old_mem->mm_node != NULL);
|
|
|
|
*old_mem = *new_mem;
|
|
|
|
new_mem->mm_node = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_move_blit(struct ttm_buffer_object *bo,
|
2012-11-28 18:25:44 +07:00
|
|
|
bool evict, bool no_wait_gpu,
|
2010-04-07 17:21:19 +07:00
|
|
|
struct ttm_mem_reg *new_mem,
|
|
|
|
struct ttm_mem_reg *old_mem)
|
2009-06-05 19:42:42 +07:00
|
|
|
{
|
|
|
|
struct radeon_device *rdev;
|
|
|
|
uint64_t old_start, new_start;
|
2012-05-08 19:24:01 +07:00
|
|
|
struct radeon_fence *fence;
|
2014-09-05 01:01:53 +07:00
|
|
|
unsigned num_pages;
|
2012-05-08 19:24:01 +07:00
|
|
|
int r, ridx;
|
2009-06-05 19:42:42 +07:00
|
|
|
|
|
|
|
rdev = radeon_get_rdev(bo->bdev);
|
2012-05-08 19:24:01 +07:00
|
|
|
ridx = radeon_copy_ring_index(rdev);
|
2016-08-17 14:46:42 +07:00
|
|
|
old_start = (u64)old_mem->start << PAGE_SHIFT;
|
|
|
|
new_start = (u64)new_mem->start << PAGE_SHIFT;
|
2009-06-05 19:42:42 +07:00
|
|
|
|
|
|
|
switch (old_mem->mem_type) {
|
|
|
|
case TTM_PL_VRAM:
|
drm/radeon/kms: simplify memory controller setup V2
Get rid of _location and use _start/_end also simplify the
computation of vram_start|end & gtt_start|end. For R1XX-R2XX
we place VRAM at the same address of PCI aperture, those GPU
shouldn't have much memory and seems to behave better when
setup that way. For R3XX and newer we place VRAM at 0. For
R6XX-R7XX AGP we place VRAM before or after AGP aperture this
might limit to limit the VRAM size but it's very unlikely.
For IGP we don't change the VRAM placement.
Tested on (compiz,quake3,suspend/resume):
PCI/PCIE:RV280,R420,RV515,RV570,RV610,RV710
AGP:RV100,RV280,R420,RV350,RV620(RPB*),RV730
IGP:RS480(RPB*),RS690,RS780(RPB*),RS880
RPB: resume previously broken
V2 correct commit message to reflect more accurately the bug
and move VRAM placement to 0 for most of the GPU to avoid
limiting VRAM.
Signed-off-by: Jerome Glisse <jglisse@redhat.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2010-02-18 04:54:29 +07:00
|
|
|
old_start += rdev->mc.vram_start;
|
2009-06-05 19:42:42 +07:00
|
|
|
break;
|
|
|
|
case TTM_PL_TT:
|
drm/radeon/kms: simplify memory controller setup V2
Get rid of _location and use _start/_end also simplify the
computation of vram_start|end & gtt_start|end. For R1XX-R2XX
we place VRAM at the same address of PCI aperture, those GPU
shouldn't have much memory and seems to behave better when
setup that way. For R3XX and newer we place VRAM at 0. For
R6XX-R7XX AGP we place VRAM before or after AGP aperture this
might limit to limit the VRAM size but it's very unlikely.
For IGP we don't change the VRAM placement.
Tested on (compiz,quake3,suspend/resume):
PCI/PCIE:RV280,R420,RV515,RV570,RV610,RV710
AGP:RV100,RV280,R420,RV350,RV620(RPB*),RV730
IGP:RS480(RPB*),RS690,RS780(RPB*),RS880
RPB: resume previously broken
V2 correct commit message to reflect more accurately the bug
and move VRAM placement to 0 for most of the GPU to avoid
limiting VRAM.
Signed-off-by: Jerome Glisse <jglisse@redhat.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2010-02-18 04:54:29 +07:00
|
|
|
old_start += rdev->mc.gtt_start;
|
2009-06-05 19:42:42 +07:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
DRM_ERROR("Unknown placement %d\n", old_mem->mem_type);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
switch (new_mem->mem_type) {
|
|
|
|
case TTM_PL_VRAM:
|
drm/radeon/kms: simplify memory controller setup V2
Get rid of _location and use _start/_end also simplify the
computation of vram_start|end & gtt_start|end. For R1XX-R2XX
we place VRAM at the same address of PCI aperture, those GPU
shouldn't have much memory and seems to behave better when
setup that way. For R3XX and newer we place VRAM at 0. For
R6XX-R7XX AGP we place VRAM before or after AGP aperture this
might limit to limit the VRAM size but it's very unlikely.
For IGP we don't change the VRAM placement.
Tested on (compiz,quake3,suspend/resume):
PCI/PCIE:RV280,R420,RV515,RV570,RV610,RV710
AGP:RV100,RV280,R420,RV350,RV620(RPB*),RV730
IGP:RS480(RPB*),RS690,RS780(RPB*),RS880
RPB: resume previously broken
V2 correct commit message to reflect more accurately the bug
and move VRAM placement to 0 for most of the GPU to avoid
limiting VRAM.
Signed-off-by: Jerome Glisse <jglisse@redhat.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2010-02-18 04:54:29 +07:00
|
|
|
new_start += rdev->mc.vram_start;
|
2009-06-05 19:42:42 +07:00
|
|
|
break;
|
|
|
|
case TTM_PL_TT:
|
drm/radeon/kms: simplify memory controller setup V2
Get rid of _location and use _start/_end also simplify the
computation of vram_start|end & gtt_start|end. For R1XX-R2XX
we place VRAM at the same address of PCI aperture, those GPU
shouldn't have much memory and seems to behave better when
setup that way. For R3XX and newer we place VRAM at 0. For
R6XX-R7XX AGP we place VRAM before or after AGP aperture this
might limit to limit the VRAM size but it's very unlikely.
For IGP we don't change the VRAM placement.
Tested on (compiz,quake3,suspend/resume):
PCI/PCIE:RV280,R420,RV515,RV570,RV610,RV710
AGP:RV100,RV280,R420,RV350,RV620(RPB*),RV730
IGP:RS480(RPB*),RS690,RS780(RPB*),RS880
RPB: resume previously broken
V2 correct commit message to reflect more accurately the bug
and move VRAM placement to 0 for most of the GPU to avoid
limiting VRAM.
Signed-off-by: Jerome Glisse <jglisse@redhat.com>
Signed-off-by: Dave Airlie <airlied@redhat.com>
2010-02-18 04:54:29 +07:00
|
|
|
new_start += rdev->mc.gtt_start;
|
2009-06-05 19:42:42 +07:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
DRM_ERROR("Unknown placement %d\n", old_mem->mem_type);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2012-05-08 19:24:01 +07:00
|
|
|
if (!rdev->ring[ridx].ready) {
|
2012-01-06 10:11:07 +07:00
|
|
|
DRM_ERROR("Trying to move memory with ring turned off.\n");
|
2009-06-05 19:42:42 +07:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
2011-09-16 23:04:08 +07:00
|
|
|
|
|
|
|
BUILD_BUG_ON((PAGE_SIZE % RADEON_GPU_PAGE_SIZE) != 0);
|
|
|
|
|
2014-09-05 01:01:53 +07:00
|
|
|
num_pages = new_mem->num_pages * (PAGE_SIZE / RADEON_GPU_PAGE_SIZE);
|
|
|
|
fence = radeon_copy(rdev, old_start, new_start, num_pages, bo->resv);
|
|
|
|
if (IS_ERR(fence))
|
|
|
|
return PTR_ERR(fence);
|
|
|
|
|
2016-06-15 18:44:00 +07:00
|
|
|
r = ttm_bo_move_accel_cleanup(bo, &fence->base, evict, new_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
radeon_fence_unref(&fence);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_move_vram_ram(struct ttm_buffer_object *bo,
|
2010-04-07 17:21:19 +07:00
|
|
|
bool evict, bool interruptible,
|
2012-11-28 18:25:44 +07:00
|
|
|
bool no_wait_gpu,
|
2009-06-05 19:42:42 +07:00
|
|
|
struct ttm_mem_reg *new_mem)
|
|
|
|
{
|
2017-04-12 20:33:00 +07:00
|
|
|
struct ttm_operation_ctx ctx = { interruptible, no_wait_gpu };
|
2009-06-05 19:42:42 +07:00
|
|
|
struct radeon_device *rdev;
|
|
|
|
struct ttm_mem_reg *old_mem = &bo->mem;
|
|
|
|
struct ttm_mem_reg tmp_mem;
|
2014-08-27 18:16:04 +07:00
|
|
|
struct ttm_place placements;
|
2009-12-07 21:52:58 +07:00
|
|
|
struct ttm_placement placement;
|
2009-06-05 19:42:42 +07:00
|
|
|
int r;
|
|
|
|
|
|
|
|
rdev = radeon_get_rdev(bo->bdev);
|
|
|
|
tmp_mem = *new_mem;
|
|
|
|
tmp_mem.mm_node = NULL;
|
2009-12-07 21:52:58 +07:00
|
|
|
placement.num_placement = 1;
|
|
|
|
placement.placement = &placements;
|
|
|
|
placement.num_busy_placement = 1;
|
|
|
|
placement.busy_placement = &placements;
|
2014-08-27 18:16:04 +07:00
|
|
|
placements.fpfn = 0;
|
|
|
|
placements.lpfn = 0;
|
|
|
|
placements.flags = TTM_PL_MASK_CACHING | TTM_PL_FLAG_TT;
|
2017-04-12 20:33:00 +07:00
|
|
|
r = ttm_bo_mem_space(bo, &placement, &tmp_mem, &ctx);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (unlikely(r)) {
|
|
|
|
return r;
|
|
|
|
}
|
2009-10-30 10:31:26 +07:00
|
|
|
|
|
|
|
r = ttm_tt_set_placement_caching(bo->ttm, tmp_mem.placement);
|
|
|
|
if (unlikely(r)) {
|
|
|
|
goto out_cleanup;
|
|
|
|
}
|
|
|
|
|
2017-12-21 16:42:51 +07:00
|
|
|
r = ttm_tt_bind(bo->ttm, &tmp_mem, &ctx);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (unlikely(r)) {
|
|
|
|
goto out_cleanup;
|
|
|
|
}
|
2012-11-28 18:25:44 +07:00
|
|
|
r = radeon_move_blit(bo, true, no_wait_gpu, &tmp_mem, old_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (unlikely(r)) {
|
|
|
|
goto out_cleanup;
|
|
|
|
}
|
2017-12-08 19:19:32 +07:00
|
|
|
r = ttm_bo_move_ttm(bo, &ctx, new_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
out_cleanup:
|
2010-08-04 09:07:08 +07:00
|
|
|
ttm_bo_mem_put(bo, &tmp_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_move_ram_vram(struct ttm_buffer_object *bo,
|
2010-04-07 17:21:19 +07:00
|
|
|
bool evict, bool interruptible,
|
2012-11-28 18:25:44 +07:00
|
|
|
bool no_wait_gpu,
|
2009-06-05 19:42:42 +07:00
|
|
|
struct ttm_mem_reg *new_mem)
|
|
|
|
{
|
2017-04-12 20:33:00 +07:00
|
|
|
struct ttm_operation_ctx ctx = { interruptible, no_wait_gpu };
|
2009-06-05 19:42:42 +07:00
|
|
|
struct radeon_device *rdev;
|
|
|
|
struct ttm_mem_reg *old_mem = &bo->mem;
|
|
|
|
struct ttm_mem_reg tmp_mem;
|
2009-12-07 21:52:58 +07:00
|
|
|
struct ttm_placement placement;
|
2014-08-27 18:16:04 +07:00
|
|
|
struct ttm_place placements;
|
2009-06-05 19:42:42 +07:00
|
|
|
int r;
|
|
|
|
|
|
|
|
rdev = radeon_get_rdev(bo->bdev);
|
|
|
|
tmp_mem = *new_mem;
|
|
|
|
tmp_mem.mm_node = NULL;
|
2009-12-07 21:52:58 +07:00
|
|
|
placement.num_placement = 1;
|
|
|
|
placement.placement = &placements;
|
|
|
|
placement.num_busy_placement = 1;
|
|
|
|
placement.busy_placement = &placements;
|
2014-08-27 18:16:04 +07:00
|
|
|
placements.fpfn = 0;
|
|
|
|
placements.lpfn = 0;
|
|
|
|
placements.flags = TTM_PL_MASK_CACHING | TTM_PL_FLAG_TT;
|
2017-04-12 20:33:00 +07:00
|
|
|
r = ttm_bo_mem_space(bo, &placement, &tmp_mem, &ctx);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (unlikely(r)) {
|
|
|
|
return r;
|
|
|
|
}
|
2017-12-08 19:19:32 +07:00
|
|
|
r = ttm_bo_move_ttm(bo, &ctx, &tmp_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (unlikely(r)) {
|
|
|
|
goto out_cleanup;
|
|
|
|
}
|
2012-11-28 18:25:44 +07:00
|
|
|
r = radeon_move_blit(bo, true, no_wait_gpu, new_mem, old_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (unlikely(r)) {
|
|
|
|
goto out_cleanup;
|
|
|
|
}
|
|
|
|
out_cleanup:
|
2010-08-04 09:07:08 +07:00
|
|
|
ttm_bo_mem_put(bo, &tmp_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2017-04-26 21:31:14 +07:00
|
|
|
static int radeon_bo_move(struct ttm_buffer_object *bo, bool evict,
|
|
|
|
struct ttm_operation_ctx *ctx,
|
|
|
|
struct ttm_mem_reg *new_mem)
|
2009-06-05 19:42:42 +07:00
|
|
|
{
|
|
|
|
struct radeon_device *rdev;
|
2016-03-28 14:39:14 +07:00
|
|
|
struct radeon_bo *rbo;
|
2009-06-05 19:42:42 +07:00
|
|
|
struct ttm_mem_reg *old_mem = &bo->mem;
|
|
|
|
int r;
|
|
|
|
|
2017-04-26 21:31:14 +07:00
|
|
|
r = ttm_bo_wait(bo, ctx->interruptible, ctx->no_wait_gpu);
|
2016-06-06 15:17:53 +07:00
|
|
|
if (r)
|
|
|
|
return r;
|
|
|
|
|
2016-03-28 14:39:14 +07:00
|
|
|
/* Can't move a pinned BO */
|
|
|
|
rbo = container_of(bo, struct radeon_bo, tbo);
|
|
|
|
if (WARN_ON_ONCE(rbo->pin_count > 0))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2009-06-05 19:42:42 +07:00
|
|
|
rdev = radeon_get_rdev(bo->bdev);
|
|
|
|
if (old_mem->mem_type == TTM_PL_SYSTEM && bo->ttm == NULL) {
|
|
|
|
radeon_move_null(bo, new_mem);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if ((old_mem->mem_type == TTM_PL_TT &&
|
|
|
|
new_mem->mem_type == TTM_PL_SYSTEM) ||
|
|
|
|
(old_mem->mem_type == TTM_PL_SYSTEM &&
|
|
|
|
new_mem->mem_type == TTM_PL_TT)) {
|
tree-wide: fix assorted typos all over the place
That is "success", "unknown", "through", "performance", "[re|un]mapping"
, "access", "default", "reasonable", "[con]currently", "temperature"
, "channel", "[un]used", "application", "example","hierarchy", "therefore"
, "[over|under]flow", "contiguous", "threshold", "enough" and others.
Signed-off-by: André Goddard Rosa <andre.goddard@gmail.com>
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
2009-11-14 22:09:05 +07:00
|
|
|
/* bind is enough */
|
2009-06-05 19:42:42 +07:00
|
|
|
radeon_move_null(bo, new_mem);
|
|
|
|
return 0;
|
|
|
|
}
|
2012-02-24 05:53:42 +07:00
|
|
|
if (!rdev->ring[radeon_copy_ring_index(rdev)].ready ||
|
|
|
|
rdev->asic->copy.copy == NULL) {
|
2009-06-05 19:42:42 +07:00
|
|
|
/* use memcpy */
|
2009-07-28 17:30:56 +07:00
|
|
|
goto memcpy;
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
if (old_mem->mem_type == TTM_PL_VRAM &&
|
|
|
|
new_mem->mem_type == TTM_PL_SYSTEM) {
|
2017-04-26 21:31:14 +07:00
|
|
|
r = radeon_move_vram_ram(bo, evict, ctx->interruptible,
|
|
|
|
ctx->no_wait_gpu, new_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
} else if (old_mem->mem_type == TTM_PL_SYSTEM &&
|
|
|
|
new_mem->mem_type == TTM_PL_VRAM) {
|
2017-04-26 21:31:14 +07:00
|
|
|
r = radeon_move_ram_vram(bo, evict, ctx->interruptible,
|
|
|
|
ctx->no_wait_gpu, new_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
} else {
|
2017-04-26 21:31:14 +07:00
|
|
|
r = radeon_move_blit(bo, evict, ctx->no_wait_gpu,
|
|
|
|
new_mem, old_mem);
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
2009-07-28 17:30:56 +07:00
|
|
|
|
|
|
|
if (r) {
|
|
|
|
memcpy:
|
2017-12-08 19:19:32 +07:00
|
|
|
r = ttm_bo_move_memcpy(bo, ctx, new_mem);
|
2014-03-02 06:56:18 +07:00
|
|
|
if (r) {
|
|
|
|
return r;
|
|
|
|
}
|
2009-07-28 17:30:56 +07:00
|
|
|
}
|
2014-03-02 06:56:18 +07:00
|
|
|
|
|
|
|
/* update statistics */
|
|
|
|
atomic64_add((u64)bo->num_pages << PAGE_SHIFT, &rdev->num_bytes_moved);
|
|
|
|
return 0;
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
|
|
|
|
2010-04-09 19:39:24 +07:00
|
|
|
static int radeon_ttm_io_mem_reserve(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
|
|
|
|
{
|
|
|
|
struct ttm_mem_type_manager *man = &bdev->man[mem->mem_type];
|
|
|
|
struct radeon_device *rdev = radeon_get_rdev(bdev);
|
|
|
|
|
|
|
|
mem->bus.addr = NULL;
|
|
|
|
mem->bus.offset = 0;
|
|
|
|
mem->bus.size = mem->num_pages << PAGE_SHIFT;
|
|
|
|
mem->bus.base = 0;
|
|
|
|
mem->bus.is_iomem = false;
|
|
|
|
if (!(man->flags & TTM_MEMTYPE_FLAG_MAPPABLE))
|
|
|
|
return -EINVAL;
|
|
|
|
switch (mem->mem_type) {
|
|
|
|
case TTM_PL_SYSTEM:
|
|
|
|
/* system memory */
|
|
|
|
return 0;
|
|
|
|
case TTM_PL_TT:
|
2015-09-09 21:45:52 +07:00
|
|
|
#if IS_ENABLED(CONFIG_AGP)
|
2010-04-09 19:39:24 +07:00
|
|
|
if (rdev->flags & RADEON_IS_AGP) {
|
|
|
|
/* RADEON_IS_AGP is set only if AGP is active */
|
2010-08-05 07:48:18 +07:00
|
|
|
mem->bus.offset = mem->start << PAGE_SHIFT;
|
2010-04-09 19:39:24 +07:00
|
|
|
mem->bus.base = rdev->mc.agp_base;
|
2010-05-19 17:46:22 +07:00
|
|
|
mem->bus.is_iomem = !rdev->ddev->agp->cant_use_aperture;
|
2010-04-09 19:39:24 +07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
case TTM_PL_VRAM:
|
2010-08-05 07:48:18 +07:00
|
|
|
mem->bus.offset = mem->start << PAGE_SHIFT;
|
2010-04-09 19:39:24 +07:00
|
|
|
/* check if it's visible */
|
|
|
|
if ((mem->bus.offset + mem->bus.size) > rdev->mc.visible_vram_size)
|
|
|
|
return -EINVAL;
|
|
|
|
mem->bus.base = rdev->mc.aper_base;
|
|
|
|
mem->bus.is_iomem = true;
|
2011-07-07 06:57:13 +07:00
|
|
|
#ifdef __alpha__
|
|
|
|
/*
|
|
|
|
* Alpha: use bus.addr to hold the ioremap() return,
|
|
|
|
* so we can modify bus.base below.
|
|
|
|
*/
|
|
|
|
if (mem->placement & TTM_PL_FLAG_WC)
|
|
|
|
mem->bus.addr =
|
|
|
|
ioremap_wc(mem->bus.base + mem->bus.offset,
|
|
|
|
mem->bus.size);
|
|
|
|
else
|
|
|
|
mem->bus.addr =
|
|
|
|
ioremap_nocache(mem->bus.base + mem->bus.offset,
|
|
|
|
mem->bus.size);
|
2017-01-24 16:16:16 +07:00
|
|
|
if (!mem->bus.addr)
|
|
|
|
return -ENOMEM;
|
2011-07-07 06:57:13 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Alpha: Use just the bus offset plus
|
|
|
|
* the hose/domain memory base for bus.base.
|
|
|
|
* It then can be used to build PTEs for VRAM
|
|
|
|
* access, as done in ttm_bo_vm_fault().
|
|
|
|
*/
|
|
|
|
mem->bus.base = (mem->bus.base & 0x0ffffffffUL) +
|
|
|
|
rdev->ddev->hose->dense_mem_base;
|
|
|
|
#endif
|
2010-04-09 19:39:24 +07:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void radeon_ttm_io_mem_free(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2011-11-02 07:46:13 +07:00
|
|
|
/*
|
|
|
|
* TTM backend functions.
|
|
|
|
*/
|
|
|
|
struct radeon_ttm_tt {
|
2011-11-10 05:15:26 +07:00
|
|
|
struct ttm_dma_tt ttm;
|
2011-11-02 07:46:13 +07:00
|
|
|
struct radeon_device *rdev;
|
|
|
|
u64 offset;
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
|
|
|
|
uint64_t userptr;
|
|
|
|
struct mm_struct *usermm;
|
|
|
|
uint32_t userflags;
|
2011-11-02 07:46:13 +07:00
|
|
|
};
|
|
|
|
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
/* prepare the sg table with the user pages */
|
|
|
|
static int radeon_ttm_tt_pin_userptr(struct ttm_tt *ttm)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev = radeon_get_rdev(ttm->bdev);
|
|
|
|
struct radeon_ttm_tt *gtt = (void *)ttm;
|
|
|
|
unsigned pinned = 0, nents;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
int write = !(gtt->userflags & RADEON_GEM_USERPTR_READONLY);
|
|
|
|
enum dma_data_direction direction = write ?
|
|
|
|
DMA_BIDIRECTIONAL : DMA_TO_DEVICE;
|
|
|
|
|
|
|
|
if (current->mm != gtt->usermm)
|
|
|
|
return -EPERM;
|
|
|
|
|
2014-08-07 14:36:01 +07:00
|
|
|
if (gtt->userflags & RADEON_GEM_USERPTR_ANONONLY) {
|
|
|
|
/* check that we only pin down anonymous memory
|
|
|
|
to prevent problems with writeback */
|
|
|
|
unsigned long end = gtt->userptr + ttm->num_pages * PAGE_SIZE;
|
|
|
|
struct vm_area_struct *vma;
|
|
|
|
vma = find_vma(gtt->usermm, gtt->userptr);
|
|
|
|
if (!vma || vma->vm_file || vma->vm_end < end)
|
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
do {
|
|
|
|
unsigned num_pages = ttm->num_pages - pinned;
|
|
|
|
uint64_t userptr = gtt->userptr + pinned * PAGE_SIZE;
|
|
|
|
struct page **pages = ttm->pages + pinned;
|
|
|
|
|
2016-10-13 07:20:16 +07:00
|
|
|
r = get_user_pages(userptr, num_pages, write ? FOLL_WRITE : 0,
|
|
|
|
pages, NULL);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
if (r < 0)
|
|
|
|
goto release_pages;
|
|
|
|
|
|
|
|
pinned += r;
|
|
|
|
|
|
|
|
} while (pinned < ttm->num_pages);
|
|
|
|
|
|
|
|
r = sg_alloc_table_from_pages(ttm->sg, ttm->pages, ttm->num_pages, 0,
|
|
|
|
ttm->num_pages << PAGE_SHIFT,
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (r)
|
|
|
|
goto release_sg;
|
|
|
|
|
|
|
|
r = -ENOMEM;
|
|
|
|
nents = dma_map_sg(rdev->dev, ttm->sg->sgl, ttm->sg->nents, direction);
|
|
|
|
if (nents != ttm->sg->nents)
|
|
|
|
goto release_sg;
|
|
|
|
|
|
|
|
drm_prime_sg_to_page_addr_arrays(ttm->sg, ttm->pages,
|
|
|
|
gtt->ttm.dma_address, ttm->num_pages);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
release_sg:
|
|
|
|
kfree(ttm->sg);
|
|
|
|
|
|
|
|
release_pages:
|
2017-11-16 08:37:55 +07:00
|
|
|
release_pages(ttm->pages, pinned);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void radeon_ttm_tt_unpin_userptr(struct ttm_tt *ttm)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev = radeon_get_rdev(ttm->bdev);
|
|
|
|
struct radeon_ttm_tt *gtt = (void *)ttm;
|
2015-05-05 14:24:17 +07:00
|
|
|
struct sg_page_iter sg_iter;
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
|
|
|
|
int write = !(gtt->userflags & RADEON_GEM_USERPTR_READONLY);
|
|
|
|
enum dma_data_direction direction = write ?
|
|
|
|
DMA_BIDIRECTIONAL : DMA_TO_DEVICE;
|
|
|
|
|
2015-03-31 22:36:57 +07:00
|
|
|
/* double check that we don't free the table twice */
|
|
|
|
if (!ttm->sg->sgl)
|
|
|
|
return;
|
|
|
|
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
/* free the sg table and pages again */
|
|
|
|
dma_unmap_sg(rdev->dev, ttm->sg->sgl, ttm->sg->nents, direction);
|
|
|
|
|
2015-05-05 14:24:17 +07:00
|
|
|
for_each_sg_page(ttm->sg->sgl, &sg_iter, ttm->sg->nents, 0) {
|
|
|
|
struct page *page = sg_page_iter_page(&sg_iter);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
if (!(gtt->userflags & RADEON_GEM_USERPTR_READONLY))
|
|
|
|
set_page_dirty(page);
|
|
|
|
|
|
|
|
mark_page_accessed(page);
|
mm, fs: get rid of PAGE_CACHE_* and page_cache_{get,release} macros
PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} macros were introduced *long* time
ago with promise that one day it will be possible to implement page
cache with bigger chunks than PAGE_SIZE.
This promise never materialized. And unlikely will.
We have many places where PAGE_CACHE_SIZE assumed to be equal to
PAGE_SIZE. And it's constant source of confusion on whether
PAGE_CACHE_* or PAGE_* constant should be used in a particular case,
especially on the border between fs and mm.
Global switching to PAGE_CACHE_SIZE != PAGE_SIZE would cause to much
breakage to be doable.
Let's stop pretending that pages in page cache are special. They are
not.
The changes are pretty straight-forward:
- <foo> << (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- <foo> >> (PAGE_CACHE_SHIFT - PAGE_SHIFT) -> <foo>;
- PAGE_CACHE_{SIZE,SHIFT,MASK,ALIGN} -> PAGE_{SIZE,SHIFT,MASK,ALIGN};
- page_cache_get() -> get_page();
- page_cache_release() -> put_page();
This patch contains automated changes generated with coccinelle using
script below. For some reason, coccinelle doesn't patch header files.
I've called spatch for them manually.
The only adjustment after coccinelle is revert of changes to
PAGE_CAHCE_ALIGN definition: we are going to drop it later.
There are few places in the code where coccinelle didn't reach. I'll
fix them manually in a separate patch. Comments and documentation also
will be addressed with the separate patch.
virtual patch
@@
expression E;
@@
- E << (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
expression E;
@@
- E >> (PAGE_CACHE_SHIFT - PAGE_SHIFT)
+ E
@@
@@
- PAGE_CACHE_SHIFT
+ PAGE_SHIFT
@@
@@
- PAGE_CACHE_SIZE
+ PAGE_SIZE
@@
@@
- PAGE_CACHE_MASK
+ PAGE_MASK
@@
expression E;
@@
- PAGE_CACHE_ALIGN(E)
+ PAGE_ALIGN(E)
@@
expression E;
@@
- page_cache_get(E)
+ get_page(E)
@@
expression E;
@@
- page_cache_release(E)
+ put_page(E)
Signed-off-by: Kirill A. Shutemov <kirill.shutemov@linux.intel.com>
Acked-by: Michal Hocko <mhocko@suse.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-04-01 19:29:47 +07:00
|
|
|
put_page(page);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
sg_free_table(ttm->sg);
|
|
|
|
}
|
|
|
|
|
2011-11-02 07:46:13 +07:00
|
|
|
static int radeon_ttm_backend_bind(struct ttm_tt *ttm,
|
|
|
|
struct ttm_mem_reg *bo_mem)
|
|
|
|
{
|
2011-11-10 05:15:26 +07:00
|
|
|
struct radeon_ttm_tt *gtt = (void*)ttm;
|
2014-07-17 17:01:07 +07:00
|
|
|
uint32_t flags = RADEON_GART_PAGE_VALID | RADEON_GART_PAGE_READ |
|
|
|
|
RADEON_GART_PAGE_WRITE;
|
2011-11-02 07:46:13 +07:00
|
|
|
int r;
|
|
|
|
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
if (gtt->userptr) {
|
|
|
|
radeon_ttm_tt_pin_userptr(ttm);
|
|
|
|
flags &= ~RADEON_GART_PAGE_WRITE;
|
|
|
|
}
|
|
|
|
|
2011-11-02 07:46:13 +07:00
|
|
|
gtt->offset = (unsigned long)(bo_mem->start << PAGE_SHIFT);
|
|
|
|
if (!ttm->num_pages) {
|
|
|
|
WARN(1, "nothing to bind %lu pages for mreg %p back %p!\n",
|
|
|
|
ttm->num_pages, bo_mem, ttm);
|
|
|
|
}
|
2014-07-17 17:01:07 +07:00
|
|
|
if (ttm->caching_state == tt_cached)
|
|
|
|
flags |= RADEON_GART_PAGE_SNOOP;
|
|
|
|
r = radeon_gart_bind(gtt->rdev, gtt->offset, ttm->num_pages,
|
|
|
|
ttm->pages, gtt->ttm.dma_address, flags);
|
2011-11-02 07:46:13 +07:00
|
|
|
if (r) {
|
|
|
|
DRM_ERROR("failed to bind %lu pages at 0x%08X\n",
|
|
|
|
ttm->num_pages, (unsigned)gtt->offset);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int radeon_ttm_backend_unbind(struct ttm_tt *ttm)
|
|
|
|
{
|
2011-11-10 05:15:26 +07:00
|
|
|
struct radeon_ttm_tt *gtt = (void *)ttm;
|
2011-11-02 07:46:13 +07:00
|
|
|
|
|
|
|
radeon_gart_unbind(gtt->rdev, gtt->offset, ttm->num_pages);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
|
|
|
|
if (gtt->userptr)
|
|
|
|
radeon_ttm_tt_unpin_userptr(ttm);
|
|
|
|
|
2011-11-02 07:46:13 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void radeon_ttm_backend_destroy(struct ttm_tt *ttm)
|
|
|
|
{
|
2011-11-10 05:15:26 +07:00
|
|
|
struct radeon_ttm_tt *gtt = (void *)ttm;
|
2011-11-02 07:46:13 +07:00
|
|
|
|
2011-11-10 05:15:26 +07:00
|
|
|
ttm_dma_tt_fini(>t->ttm);
|
2011-11-02 07:46:13 +07:00
|
|
|
kfree(gtt);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct ttm_backend_func radeon_backend_func = {
|
|
|
|
.bind = &radeon_ttm_backend_bind,
|
|
|
|
.unbind = &radeon_ttm_backend_unbind,
|
|
|
|
.destroy = &radeon_ttm_backend_destroy,
|
|
|
|
};
|
|
|
|
|
2018-02-22 16:18:14 +07:00
|
|
|
static struct ttm_tt *radeon_ttm_tt_create(struct ttm_buffer_object *bo,
|
|
|
|
uint32_t page_flags)
|
2011-11-02 07:46:13 +07:00
|
|
|
{
|
|
|
|
struct radeon_device *rdev;
|
|
|
|
struct radeon_ttm_tt *gtt;
|
|
|
|
|
2018-02-22 16:18:14 +07:00
|
|
|
rdev = radeon_get_rdev(bo->bdev);
|
2015-09-09 21:45:52 +07:00
|
|
|
#if IS_ENABLED(CONFIG_AGP)
|
2011-11-02 07:46:13 +07:00
|
|
|
if (rdev->flags & RADEON_IS_AGP) {
|
2018-02-22 16:18:14 +07:00
|
|
|
return ttm_agp_tt_create(bo, rdev->ddev->agp->bridge,
|
|
|
|
page_flags);
|
2011-11-02 07:46:13 +07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
gtt = kzalloc(sizeof(struct radeon_ttm_tt), GFP_KERNEL);
|
|
|
|
if (gtt == NULL) {
|
|
|
|
return NULL;
|
|
|
|
}
|
2011-11-10 05:15:26 +07:00
|
|
|
gtt->ttm.ttm.func = &radeon_backend_func;
|
2011-11-02 07:46:13 +07:00
|
|
|
gtt->rdev = rdev;
|
2018-02-22 16:18:14 +07:00
|
|
|
if (ttm_dma_tt_init(>t->ttm, bo, page_flags)) {
|
2011-11-10 05:15:26 +07:00
|
|
|
kfree(gtt);
|
2011-11-02 07:46:13 +07:00
|
|
|
return NULL;
|
|
|
|
}
|
2011-11-10 05:15:26 +07:00
|
|
|
return >t->ttm.ttm;
|
2011-11-02 07:46:13 +07:00
|
|
|
}
|
|
|
|
|
2014-09-17 17:00:05 +07:00
|
|
|
static struct radeon_ttm_tt *radeon_ttm_tt_to_gtt(struct ttm_tt *ttm)
|
|
|
|
{
|
|
|
|
if (!ttm || ttm->func != &radeon_backend_func)
|
|
|
|
return NULL;
|
|
|
|
return (struct radeon_ttm_tt *)ttm;
|
|
|
|
}
|
|
|
|
|
2017-12-21 16:42:50 +07:00
|
|
|
static int radeon_ttm_tt_populate(struct ttm_tt *ttm,
|
|
|
|
struct ttm_operation_ctx *ctx)
|
2011-10-18 04:15:08 +07:00
|
|
|
{
|
2014-09-17 17:00:05 +07:00
|
|
|
struct radeon_ttm_tt *gtt = radeon_ttm_tt_to_gtt(ttm);
|
2011-10-18 04:15:08 +07:00
|
|
|
struct radeon_device *rdev;
|
2012-05-11 05:33:13 +07:00
|
|
|
bool slave = !!(ttm->page_flags & TTM_PAGE_FLAG_SG);
|
2011-10-18 04:15:08 +07:00
|
|
|
|
2014-09-17 17:00:05 +07:00
|
|
|
if (gtt && gtt->userptr) {
|
2015-06-19 11:05:23 +07:00
|
|
|
ttm->sg = kzalloc(sizeof(struct sg_table), GFP_KERNEL);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
if (!ttm->sg)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
ttm->page_flags |= TTM_PAGE_FLAG_SG;
|
|
|
|
ttm->state = tt_unbound;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-05-11 05:33:13 +07:00
|
|
|
if (slave && ttm->sg) {
|
|
|
|
drm_prime_sg_to_page_addr_arrays(ttm->sg, ttm->pages,
|
|
|
|
gtt->ttm.dma_address, ttm->num_pages);
|
|
|
|
ttm->state = tt_unbound;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-10-18 04:15:08 +07:00
|
|
|
rdev = radeon_get_rdev(ttm->bdev);
|
2015-09-09 21:45:52 +07:00
|
|
|
#if IS_ENABLED(CONFIG_AGP)
|
2012-01-04 05:37:37 +07:00
|
|
|
if (rdev->flags & RADEON_IS_AGP) {
|
2017-12-21 16:42:50 +07:00
|
|
|
return ttm_agp_tt_populate(ttm, ctx);
|
2012-01-04 05:37:37 +07:00
|
|
|
}
|
|
|
|
#endif
|
2011-10-18 04:15:08 +07:00
|
|
|
|
|
|
|
#ifdef CONFIG_SWIOTLB
|
2018-02-09 09:44:10 +07:00
|
|
|
if (rdev->need_swiotlb && swiotlb_nr_tbl()) {
|
2017-12-21 16:42:50 +07:00
|
|
|
return ttm_dma_populate(>t->ttm, rdev->dev, ctx);
|
2011-10-18 04:15:08 +07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-12-21 16:42:50 +07:00
|
|
|
return ttm_populate_and_map_pages(rdev->dev, >t->ttm, ctx);
|
2011-10-18 04:15:08 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void radeon_ttm_tt_unpopulate(struct ttm_tt *ttm)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev;
|
2014-09-17 17:00:05 +07:00
|
|
|
struct radeon_ttm_tt *gtt = radeon_ttm_tt_to_gtt(ttm);
|
2012-05-11 05:33:13 +07:00
|
|
|
bool slave = !!(ttm->page_flags & TTM_PAGE_FLAG_SG);
|
|
|
|
|
2014-09-17 17:00:05 +07:00
|
|
|
if (gtt && gtt->userptr) {
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
kfree(ttm->sg);
|
|
|
|
ttm->page_flags &= ~TTM_PAGE_FLAG_SG;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-05-11 05:33:13 +07:00
|
|
|
if (slave)
|
|
|
|
return;
|
2011-10-18 04:15:08 +07:00
|
|
|
|
|
|
|
rdev = radeon_get_rdev(ttm->bdev);
|
2015-09-09 21:45:52 +07:00
|
|
|
#if IS_ENABLED(CONFIG_AGP)
|
2012-01-04 05:37:37 +07:00
|
|
|
if (rdev->flags & RADEON_IS_AGP) {
|
|
|
|
ttm_agp_tt_unpopulate(ttm);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2011-10-18 04:15:08 +07:00
|
|
|
|
|
|
|
#ifdef CONFIG_SWIOTLB
|
2018-02-09 09:44:10 +07:00
|
|
|
if (rdev->need_swiotlb && swiotlb_nr_tbl()) {
|
2011-11-10 05:15:26 +07:00
|
|
|
ttm_dma_unpopulate(>t->ttm, rdev->dev);
|
2011-10-18 04:15:08 +07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-08-18 21:06:34 +07:00
|
|
|
ttm_unmap_and_unpopulate_pages(rdev->dev, >t->ttm);
|
2011-10-18 04:15:08 +07:00
|
|
|
}
|
2011-11-02 07:46:13 +07:00
|
|
|
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
int radeon_ttm_tt_set_userptr(struct ttm_tt *ttm, uint64_t addr,
|
|
|
|
uint32_t flags)
|
|
|
|
{
|
2014-09-17 17:00:05 +07:00
|
|
|
struct radeon_ttm_tt *gtt = radeon_ttm_tt_to_gtt(ttm);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
|
|
|
|
if (gtt == NULL)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
gtt->userptr = addr;
|
|
|
|
gtt->usermm = current->mm;
|
|
|
|
gtt->userflags = flags;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool radeon_ttm_tt_has_userptr(struct ttm_tt *ttm)
|
|
|
|
{
|
2014-09-17 17:00:05 +07:00
|
|
|
struct radeon_ttm_tt *gtt = radeon_ttm_tt_to_gtt(ttm);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
|
|
|
|
if (gtt == NULL)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return !!gtt->userptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool radeon_ttm_tt_is_readonly(struct ttm_tt *ttm)
|
|
|
|
{
|
2014-09-17 17:00:05 +07:00
|
|
|
struct radeon_ttm_tt *gtt = radeon_ttm_tt_to_gtt(ttm);
|
drm/radeon: add userptr support v8
This patch adds an IOCTL for turning a pointer supplied by
userspace into a buffer object.
It imposes several restrictions upon the memory being mapped:
1. It must be page aligned (both start/end addresses, i.e ptr and size).
2. It must be normal system memory, not a pointer into another map of IO
space (e.g. it must not be a GTT mmapping of another object).
3. The BO is mapped into GTT, so the maximum amount of memory mapped at
all times is still the GTT limit.
4. The BO is only mapped readonly for now, so no write support.
5. List of backing pages is only acquired once, so they represent a
snapshot of the first use.
Exporting and sharing as well as mapping of buffer objects created by
this function is forbidden and results in an -EPERM.
v2: squash all previous changes into first public version
v3: fix tabs, map readonly, don't use MM callback any more
v4: set TTM_PAGE_FLAG_SG so that TTM never messes with the pages,
pin/unpin pages on bind/unbind instead of populate/unpopulate
v5: rebased on 3.17-wip, IOCTL renamed to userptr, reject any unknown
flags, better handle READONLY flag, improve permission check
v6: fix ptr cast warning, use set_page_dirty/mark_page_accessed on unpin
v7: add warning about it's availability in the API definition
v8: drop access_ok check, fix VM mapping bits
Signed-off-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Alex Deucher <alexander.deucher@amd.com> (v4)
Reviewed-by: Jérôme Glisse <jglisse@redhat.com> (v4)
Signed-off-by: Alex Deucher <alexander.deucher@amd.com>
2014-08-07 14:36:00 +07:00
|
|
|
|
|
|
|
if (gtt == NULL)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return !!(gtt->userflags & RADEON_GEM_USERPTR_READONLY);
|
|
|
|
}
|
|
|
|
|
2009-06-05 19:42:42 +07:00
|
|
|
static struct ttm_bo_driver radeon_bo_driver = {
|
2011-11-02 07:46:13 +07:00
|
|
|
.ttm_tt_create = &radeon_ttm_tt_create,
|
2011-10-18 04:15:08 +07:00
|
|
|
.ttm_tt_populate = &radeon_ttm_tt_populate,
|
|
|
|
.ttm_tt_unpopulate = &radeon_ttm_tt_unpopulate,
|
2009-06-05 19:42:42 +07:00
|
|
|
.invalidate_caches = &radeon_invalidate_caches,
|
|
|
|
.init_mem_type = &radeon_init_mem_type,
|
2016-08-30 22:26:04 +07:00
|
|
|
.eviction_valuable = ttm_bo_eviction_valuable,
|
2009-06-05 19:42:42 +07:00
|
|
|
.evict_flags = &radeon_evict_flags,
|
|
|
|
.move = &radeon_bo_move,
|
|
|
|
.verify_access = &radeon_verify_access,
|
2009-06-24 06:48:08 +07:00
|
|
|
.move_notify = &radeon_bo_move_notify,
|
|
|
|
.fault_reserve_notify = &radeon_bo_fault_reserve_notify,
|
2010-04-09 19:39:24 +07:00
|
|
|
.io_mem_reserve = &radeon_ttm_io_mem_reserve,
|
|
|
|
.io_mem_free = &radeon_ttm_io_mem_free,
|
2009-06-05 19:42:42 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
int radeon_ttm_init(struct radeon_device *rdev)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
|
|
|
|
r = radeon_ttm_global_init(rdev);
|
|
|
|
if (r) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
/* No others user of address space so set it to 0 */
|
|
|
|
r = ttm_bo_device_init(&rdev->mman.bdev,
|
2009-08-18 21:51:56 +07:00
|
|
|
rdev->mman.bo_global_ref.ref.object,
|
2013-08-14 00:10:30 +07:00
|
|
|
&radeon_bo_driver,
|
|
|
|
rdev->ddev->anon_inode->i_mapping,
|
|
|
|
DRM_FILE_PAGE_OFFSET,
|
2009-07-10 19:36:26 +07:00
|
|
|
rdev->need_dma32);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (r) {
|
|
|
|
DRM_ERROR("failed initializing buffer object driver(%d).\n", r);
|
|
|
|
return r;
|
|
|
|
}
|
2009-12-12 02:36:19 +07:00
|
|
|
rdev->mman.initialized = true;
|
2009-11-20 20:29:23 +07:00
|
|
|
r = ttm_bo_init_mm(&rdev->mman.bdev, TTM_PL_VRAM,
|
2009-12-07 21:52:58 +07:00
|
|
|
rdev->mc.real_vram_size >> PAGE_SHIFT);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (r) {
|
|
|
|
DRM_ERROR("Failed initializing VRAM heap.\n");
|
|
|
|
return r;
|
|
|
|
}
|
2014-03-01 01:50:23 +07:00
|
|
|
/* Change the size here instead of the init above so only lpfn is affected */
|
|
|
|
radeon_ttm_set_active_vram_size(rdev, rdev->mc.visible_vram_size);
|
|
|
|
|
2011-02-18 23:59:16 +07:00
|
|
|
r = radeon_bo_create(rdev, 256 * 1024, PAGE_SIZE, true,
|
2014-09-18 19:11:56 +07:00
|
|
|
RADEON_GEM_DOMAIN_VRAM, 0, NULL,
|
2017-08-08 18:48:52 +07:00
|
|
|
NULL, &rdev->stolen_vga_memory);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (r) {
|
|
|
|
return r;
|
|
|
|
}
|
2017-08-08 18:48:52 +07:00
|
|
|
r = radeon_bo_reserve(rdev->stolen_vga_memory, false);
|
2009-11-20 20:29:23 +07:00
|
|
|
if (r)
|
|
|
|
return r;
|
2017-08-08 18:48:52 +07:00
|
|
|
r = radeon_bo_pin(rdev->stolen_vga_memory, RADEON_GEM_DOMAIN_VRAM, NULL);
|
|
|
|
radeon_bo_unreserve(rdev->stolen_vga_memory);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (r) {
|
2017-08-08 18:48:52 +07:00
|
|
|
radeon_bo_unref(&rdev->stolen_vga_memory);
|
2009-06-05 19:42:42 +07:00
|
|
|
return r;
|
|
|
|
}
|
|
|
|
DRM_INFO("radeon: %uM of VRAM memory ready\n",
|
2013-05-19 02:19:23 +07:00
|
|
|
(unsigned) (rdev->mc.real_vram_size / (1024 * 1024)));
|
2009-11-20 20:29:23 +07:00
|
|
|
r = ttm_bo_init_mm(&rdev->mman.bdev, TTM_PL_TT,
|
2009-12-07 21:52:58 +07:00
|
|
|
rdev->mc.gtt_size >> PAGE_SHIFT);
|
2009-06-05 19:42:42 +07:00
|
|
|
if (r) {
|
|
|
|
DRM_ERROR("Failed initializing GTT heap.\n");
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
DRM_INFO("radeon: %uM of GTT memory ready.\n",
|
2009-09-08 07:10:24 +07:00
|
|
|
(unsigned)(rdev->mc.gtt_size / (1024 * 1024)));
|
2009-08-26 10:13:37 +07:00
|
|
|
|
|
|
|
r = radeon_ttm_debugfs_init(rdev);
|
|
|
|
if (r) {
|
|
|
|
DRM_ERROR("Failed to init debugfs\n");
|
|
|
|
return r;
|
|
|
|
}
|
2009-06-05 19:42:42 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void radeon_ttm_fini(struct radeon_device *rdev)
|
|
|
|
{
|
2009-11-20 20:29:23 +07:00
|
|
|
int r;
|
|
|
|
|
2009-12-12 02:36:19 +07:00
|
|
|
if (!rdev->mman.initialized)
|
|
|
|
return;
|
2013-12-19 03:07:39 +07:00
|
|
|
radeon_ttm_debugfs_fini(rdev);
|
2017-08-08 18:48:52 +07:00
|
|
|
if (rdev->stolen_vga_memory) {
|
|
|
|
r = radeon_bo_reserve(rdev->stolen_vga_memory, false);
|
2009-11-20 20:29:23 +07:00
|
|
|
if (r == 0) {
|
2017-08-08 18:48:52 +07:00
|
|
|
radeon_bo_unpin(rdev->stolen_vga_memory);
|
|
|
|
radeon_bo_unreserve(rdev->stolen_vga_memory);
|
2009-11-20 20:29:23 +07:00
|
|
|
}
|
2017-08-08 18:48:52 +07:00
|
|
|
radeon_bo_unref(&rdev->stolen_vga_memory);
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
|
|
|
ttm_bo_clean_mm(&rdev->mman.bdev, TTM_PL_VRAM);
|
|
|
|
ttm_bo_clean_mm(&rdev->mman.bdev, TTM_PL_TT);
|
|
|
|
ttm_bo_device_release(&rdev->mman.bdev);
|
|
|
|
radeon_gart_fini(rdev);
|
|
|
|
radeon_ttm_global_fini(rdev);
|
2009-12-12 02:36:19 +07:00
|
|
|
rdev->mman.initialized = false;
|
2009-06-05 19:42:42 +07:00
|
|
|
DRM_INFO("radeon: ttm finalized\n");
|
|
|
|
}
|
|
|
|
|
2011-03-14 06:47:24 +07:00
|
|
|
/* this should only be called at bootup or when userspace
|
|
|
|
* isn't running */
|
|
|
|
void radeon_ttm_set_active_vram_size(struct radeon_device *rdev, u64 size)
|
|
|
|
{
|
|
|
|
struct ttm_mem_type_manager *man;
|
|
|
|
|
|
|
|
if (!rdev->mman.initialized)
|
|
|
|
return;
|
|
|
|
|
|
|
|
man = &rdev->mman.bdev.man[TTM_PL_VRAM];
|
|
|
|
/* this just adjusts TTM size idea, which sets lpfn to the correct value */
|
|
|
|
man->size = size >> PAGE_SHIFT;
|
|
|
|
}
|
|
|
|
|
2009-06-05 19:42:42 +07:00
|
|
|
static struct vm_operations_struct radeon_ttm_vm_ops;
|
2009-09-28 01:29:37 +07:00
|
|
|
static const struct vm_operations_struct *ttm_vm_ops = NULL;
|
2009-06-05 19:42:42 +07:00
|
|
|
|
2018-04-16 20:43:51 +07:00
|
|
|
static vm_fault_t radeon_ttm_fault(struct vm_fault *vmf)
|
2009-06-05 19:42:42 +07:00
|
|
|
{
|
|
|
|
struct ttm_buffer_object *bo;
|
2010-04-27 02:52:20 +07:00
|
|
|
struct radeon_device *rdev;
|
2018-04-16 20:43:51 +07:00
|
|
|
vm_fault_t ret;
|
2009-06-05 19:42:42 +07:00
|
|
|
|
2017-02-25 05:56:41 +07:00
|
|
|
bo = (struct ttm_buffer_object *)vmf->vma->vm_private_data;
|
2009-06-05 19:42:42 +07:00
|
|
|
if (bo == NULL) {
|
|
|
|
return VM_FAULT_NOPAGE;
|
|
|
|
}
|
2010-04-27 02:52:20 +07:00
|
|
|
rdev = radeon_get_rdev(bo->bdev);
|
2012-05-11 19:57:18 +07:00
|
|
|
down_read(&rdev->pm.mclk_lock);
|
2018-04-16 20:43:51 +07:00
|
|
|
ret = ttm_vm_ops->fault(vmf);
|
2012-05-11 19:57:18 +07:00
|
|
|
up_read(&rdev->pm.mclk_lock);
|
2018-04-16 20:43:51 +07:00
|
|
|
return ret;
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
int radeon_mmap(struct file *filp, struct vm_area_struct *vma)
|
|
|
|
{
|
|
|
|
struct drm_file *file_priv;
|
|
|
|
struct radeon_device *rdev;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if (unlikely(vma->vm_pgoff < DRM_FILE_PAGE_OFFSET)) {
|
2014-09-23 20:46:47 +07:00
|
|
|
return -EINVAL;
|
2009-06-05 19:42:42 +07:00
|
|
|
}
|
|
|
|
|
2010-09-05 08:52:42 +07:00
|
|
|
file_priv = filp->private_data;
|
2009-06-05 19:42:42 +07:00
|
|
|
rdev = file_priv->minor->dev->dev_private;
|
|
|
|
if (rdev == NULL) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
r = ttm_bo_mmap(filp, vma, &rdev->mman.bdev);
|
|
|
|
if (unlikely(r != 0)) {
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
if (unlikely(ttm_vm_ops == NULL)) {
|
|
|
|
ttm_vm_ops = vma->vm_ops;
|
|
|
|
radeon_ttm_vm_ops = *ttm_vm_ops;
|
|
|
|
radeon_ttm_vm_ops.fault = &radeon_ttm_fault;
|
|
|
|
}
|
|
|
|
vma->vm_ops = &radeon_ttm_vm_ops;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-08-26 10:13:37 +07:00
|
|
|
#if defined(CONFIG_DEBUG_FS)
|
2013-12-12 15:42:40 +07:00
|
|
|
|
2009-08-26 10:13:37 +07:00
|
|
|
static int radeon_mm_dump_table(struct seq_file *m, void *data)
|
|
|
|
{
|
|
|
|
struct drm_info_node *node = (struct drm_info_node *)m->private;
|
2017-08-07 19:03:54 +07:00
|
|
|
unsigned ttm_pl = *(int*)node->info_ent->data;
|
2009-08-26 10:13:37 +07:00
|
|
|
struct drm_device *dev = node->minor->dev;
|
|
|
|
struct radeon_device *rdev = dev->dev_private;
|
2017-08-07 19:03:54 +07:00
|
|
|
struct ttm_mem_type_manager *man = &rdev->mman.bdev.man[ttm_pl];
|
2016-12-29 18:09:24 +07:00
|
|
|
struct drm_printer p = drm_seq_file_printer(m);
|
2009-08-26 10:13:37 +07:00
|
|
|
|
2017-08-07 19:03:54 +07:00
|
|
|
man->func->debug(man, &p);
|
2016-12-29 18:09:24 +07:00
|
|
|
return 0;
|
2009-08-26 10:13:37 +07:00
|
|
|
}
|
2013-12-12 15:42:40 +07:00
|
|
|
|
2017-08-07 19:03:54 +07:00
|
|
|
|
2013-12-12 15:42:40 +07:00
|
|
|
static int ttm_pl_vram = TTM_PL_VRAM;
|
|
|
|
static int ttm_pl_tt = TTM_PL_TT;
|
|
|
|
|
|
|
|
static struct drm_info_list radeon_ttm_debugfs_list[] = {
|
|
|
|
{"radeon_vram_mm", radeon_mm_dump_table, 0, &ttm_pl_vram},
|
|
|
|
{"radeon_gtt_mm", radeon_mm_dump_table, 0, &ttm_pl_tt},
|
|
|
|
{"ttm_page_pool", ttm_page_alloc_debugfs, 0, NULL},
|
|
|
|
#ifdef CONFIG_SWIOTLB
|
|
|
|
{"ttm_dma_page_pool", ttm_dma_page_alloc_debugfs, 0, NULL}
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2013-12-19 03:07:39 +07:00
|
|
|
static int radeon_ttm_vram_open(struct inode *inode, struct file *filep)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev = inode->i_private;
|
|
|
|
i_size_write(inode, rdev->mc.mc_vram_size);
|
|
|
|
filep->private_data = inode->i_private;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t radeon_ttm_vram_read(struct file *f, char __user *buf,
|
|
|
|
size_t size, loff_t *pos)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev = f->private_data;
|
|
|
|
ssize_t result = 0;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if (size & 0x3 || *pos & 0x3)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
while (size) {
|
|
|
|
unsigned long flags;
|
|
|
|
uint32_t value;
|
|
|
|
|
|
|
|
if (*pos >= rdev->mc.mc_vram_size)
|
|
|
|
return result;
|
|
|
|
|
|
|
|
spin_lock_irqsave(&rdev->mmio_idx_lock, flags);
|
|
|
|
WREG32(RADEON_MM_INDEX, ((uint32_t)*pos) | 0x80000000);
|
|
|
|
if (rdev->family >= CHIP_CEDAR)
|
|
|
|
WREG32(EVERGREEN_MM_INDEX_HI, *pos >> 31);
|
|
|
|
value = RREG32(RADEON_MM_DATA);
|
|
|
|
spin_unlock_irqrestore(&rdev->mmio_idx_lock, flags);
|
|
|
|
|
|
|
|
r = put_user(value, (uint32_t *)buf);
|
|
|
|
if (r)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
result += 4;
|
|
|
|
buf += 4;
|
|
|
|
*pos += 4;
|
|
|
|
size -= 4;
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct file_operations radeon_ttm_vram_fops = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.open = radeon_ttm_vram_open,
|
|
|
|
.read = radeon_ttm_vram_read,
|
|
|
|
.llseek = default_llseek
|
|
|
|
};
|
|
|
|
|
2013-12-19 03:07:40 +07:00
|
|
|
static int radeon_ttm_gtt_open(struct inode *inode, struct file *filep)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev = inode->i_private;
|
|
|
|
i_size_write(inode, rdev->mc.gtt_size);
|
|
|
|
filep->private_data = inode->i_private;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static ssize_t radeon_ttm_gtt_read(struct file *f, char __user *buf,
|
|
|
|
size_t size, loff_t *pos)
|
|
|
|
{
|
|
|
|
struct radeon_device *rdev = f->private_data;
|
|
|
|
ssize_t result = 0;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
while (size) {
|
|
|
|
loff_t p = *pos / PAGE_SIZE;
|
|
|
|
unsigned off = *pos & ~PAGE_MASK;
|
2014-03-04 16:34:48 +07:00
|
|
|
size_t cur_size = min_t(size_t, size, PAGE_SIZE - off);
|
2013-12-19 03:07:40 +07:00
|
|
|
struct page *page;
|
|
|
|
void *ptr;
|
|
|
|
|
|
|
|
if (p >= rdev->gart.num_cpu_pages)
|
|
|
|
return result;
|
|
|
|
|
|
|
|
page = rdev->gart.pages[p];
|
|
|
|
if (page) {
|
|
|
|
ptr = kmap(page);
|
|
|
|
ptr += off;
|
|
|
|
|
|
|
|
r = copy_to_user(buf, ptr, cur_size);
|
|
|
|
kunmap(rdev->gart.pages[p]);
|
|
|
|
} else
|
|
|
|
r = clear_user(buf, cur_size);
|
|
|
|
|
|
|
|
if (r)
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
result += cur_size;
|
|
|
|
buf += cur_size;
|
|
|
|
*pos += cur_size;
|
|
|
|
size -= cur_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct file_operations radeon_ttm_gtt_fops = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.open = radeon_ttm_gtt_open,
|
|
|
|
.read = radeon_ttm_gtt_read,
|
|
|
|
.llseek = default_llseek
|
|
|
|
};
|
|
|
|
|
2009-08-26 10:13:37 +07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
static int radeon_ttm_debugfs_init(struct radeon_device *rdev)
|
|
|
|
{
|
2009-09-28 23:27:23 +07:00
|
|
|
#if defined(CONFIG_DEBUG_FS)
|
2013-12-19 03:07:39 +07:00
|
|
|
unsigned count;
|
|
|
|
|
|
|
|
struct drm_minor *minor = rdev->ddev->primary;
|
|
|
|
struct dentry *ent, *root = minor->debugfs_root;
|
|
|
|
|
|
|
|
ent = debugfs_create_file("radeon_vram", S_IFREG | S_IRUGO, root,
|
|
|
|
rdev, &radeon_ttm_vram_fops);
|
|
|
|
if (IS_ERR(ent))
|
|
|
|
return PTR_ERR(ent);
|
|
|
|
rdev->mman.vram = ent;
|
|
|
|
|
2013-12-19 03:07:40 +07:00
|
|
|
ent = debugfs_create_file("radeon_gtt", S_IFREG | S_IRUGO, root,
|
|
|
|
rdev, &radeon_ttm_gtt_fops);
|
|
|
|
if (IS_ERR(ent))
|
|
|
|
return PTR_ERR(ent);
|
|
|
|
rdev->mman.gtt = ent;
|
|
|
|
|
2013-12-19 03:07:39 +07:00
|
|
|
count = ARRAY_SIZE(radeon_ttm_debugfs_list);
|
2009-08-26 10:13:37 +07:00
|
|
|
|
2011-10-18 04:15:08 +07:00
|
|
|
#ifdef CONFIG_SWIOTLB
|
2018-02-09 09:44:10 +07:00
|
|
|
if (!(rdev->need_swiotlb && swiotlb_nr_tbl()))
|
2013-12-12 15:42:40 +07:00
|
|
|
--count;
|
2011-10-18 04:15:08 +07:00
|
|
|
#endif
|
2009-08-26 10:13:37 +07:00
|
|
|
|
2013-12-12 15:42:40 +07:00
|
|
|
return radeon_debugfs_add_files(rdev, radeon_ttm_debugfs_list, count);
|
|
|
|
#else
|
|
|
|
|
2009-08-26 10:13:37 +07:00
|
|
|
return 0;
|
2013-12-12 15:42:40 +07:00
|
|
|
#endif
|
2009-08-26 10:13:37 +07:00
|
|
|
}
|
2013-12-19 03:07:39 +07:00
|
|
|
|
|
|
|
static void radeon_ttm_debugfs_fini(struct radeon_device *rdev)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_DEBUG_FS)
|
|
|
|
|
|
|
|
debugfs_remove(rdev->mman.vram);
|
|
|
|
rdev->mman.vram = NULL;
|
2013-12-19 03:07:40 +07:00
|
|
|
|
|
|
|
debugfs_remove(rdev->mman.gtt);
|
|
|
|
rdev->mman.gtt = NULL;
|
2013-12-19 03:07:39 +07:00
|
|
|
#endif
|
|
|
|
}
|