2006-08-22 01:47:33 -06:00
|
|
|
/**************************************************************************
|
|
|
|
*
|
2006-08-22 03:19:53 -06:00
|
|
|
* Copyright 2006 Tungsten Graphics, Inc., Bismarck, ND., USA
|
2006-08-22 01:47:33 -06:00
|
|
|
* All Rights Reserved.
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
|
|
|
* copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sub license, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
|
|
|
|
* DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
|
|
* OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
|
|
* USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice (including the
|
|
|
|
* next paragraph) shall be included in all copies or substantial portions
|
|
|
|
* of the Software.
|
|
|
|
*
|
|
|
|
*
|
|
|
|
**************************************************************************/
|
|
|
|
|
|
|
|
#include "drmP.h"
|
|
|
|
#include <asm/tlbflush.h>
|
|
|
|
|
|
|
|
typedef struct p_mm_entry {
|
|
|
|
struct list_head head;
|
|
|
|
struct mm_struct *mm;
|
|
|
|
atomic_t refcount;
|
|
|
|
} p_mm_entry_t;
|
|
|
|
|
|
|
|
typedef struct drm_val_action {
|
|
|
|
int needs_rx_flush;
|
|
|
|
int evicted_tt;
|
|
|
|
int evicted_vram;
|
|
|
|
int validated;
|
|
|
|
} drm_val_action_t;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We may be manipulating other processes page tables, so for each TTM, keep track of
|
|
|
|
* which mm_structs are currently mapping the ttm so that we can take the appropriate
|
|
|
|
* locks when we modify their page tables. A typical application is when we evict another
|
|
|
|
* process' buffers.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int drm_ttm_add_mm_to_list(drm_ttm_t * ttm, struct mm_struct *mm)
|
|
|
|
{
|
|
|
|
p_mm_entry_t *entry, *n_entry;
|
|
|
|
|
|
|
|
list_for_each_entry(entry, &ttm->p_mm_list, head) {
|
|
|
|
if (mm == entry->mm) {
|
|
|
|
atomic_inc(&entry->refcount);
|
|
|
|
return 0;
|
|
|
|
} else if ((unsigned long)mm < (unsigned long)entry->mm) ;
|
|
|
|
}
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
n_entry = drm_alloc(sizeof(*n_entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
if (!entry) {
|
|
|
|
DRM_ERROR("Allocation of process mm pointer entry failed\n");
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
INIT_LIST_HEAD(&n_entry->head);
|
|
|
|
n_entry->mm = mm;
|
|
|
|
atomic_set(&n_entry->refcount, 0);
|
|
|
|
atomic_inc(&ttm->shared_count);
|
|
|
|
ttm->mm_list_seq++;
|
|
|
|
|
|
|
|
list_add_tail(&n_entry->head, &entry->head);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void drm_ttm_delete_mm(drm_ttm_t * ttm, struct mm_struct *mm)
|
|
|
|
{
|
|
|
|
p_mm_entry_t *entry, *n;
|
|
|
|
list_for_each_entry_safe(entry, n, &ttm->p_mm_list, head) {
|
|
|
|
if (mm == entry->mm) {
|
|
|
|
if (atomic_add_negative(-1, &entry->refcount)) {
|
|
|
|
list_del(&entry->head);
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(entry, sizeof(*entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
atomic_dec(&ttm->shared_count);
|
|
|
|
ttm->mm_list_seq++;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2006-08-22 03:57:08 -06:00
|
|
|
BUG_ON(1);
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
static void drm_ttm_lock_mm(drm_ttm_t * ttm, int mm_sem, int page_table)
|
|
|
|
{
|
|
|
|
p_mm_entry_t *entry;
|
|
|
|
|
|
|
|
list_for_each_entry(entry, &ttm->p_mm_list, head) {
|
|
|
|
if (mm_sem) {
|
|
|
|
down_write(&entry->mm->mmap_sem);
|
|
|
|
}
|
|
|
|
if (page_table) {
|
|
|
|
spin_lock(&entry->mm->page_table_lock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void drm_ttm_unlock_mm(drm_ttm_t * ttm, int mm_sem, int page_table)
|
|
|
|
{
|
|
|
|
p_mm_entry_t *entry;
|
|
|
|
|
|
|
|
list_for_each_entry(entry, &ttm->p_mm_list, head) {
|
|
|
|
if (page_table) {
|
|
|
|
spin_unlock(&entry->mm->page_table_lock);
|
|
|
|
}
|
|
|
|
if (mm_sem) {
|
|
|
|
up_write(&entry->mm->mmap_sem);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ioremap_vmas(drm_ttm_t * ttm, unsigned long page_offset,
|
|
|
|
unsigned long num_pages, unsigned long aper_offset)
|
|
|
|
{
|
|
|
|
struct list_head *list;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
list_for_each(list, &ttm->vma_list->head) {
|
|
|
|
drm_ttm_vma_list_t *entry =
|
|
|
|
list_entry(list, drm_ttm_vma_list_t, head);
|
|
|
|
|
|
|
|
ret = io_remap_pfn_range(entry->vma,
|
|
|
|
entry->vma->vm_start +
|
|
|
|
(page_offset << PAGE_SHIFT),
|
|
|
|
(ttm->aperture_base >> PAGE_SHIFT) +
|
|
|
|
aper_offset, num_pages << PAGE_SHIFT,
|
|
|
|
drm_io_prot(_DRM_AGP, entry->vma));
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
global_flush_tlb();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unmap all vma pages from vmas mapping this ttm.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int unmap_vma_pages(drm_ttm_t * ttm, unsigned long page_offset,
|
|
|
|
unsigned long num_pages)
|
|
|
|
{
|
|
|
|
struct list_head *list;
|
|
|
|
struct page **first_page = ttm->pages + page_offset;
|
|
|
|
struct page **last_page = ttm->pages + (page_offset + num_pages);
|
|
|
|
struct page **cur_page;
|
2006-08-22 03:19:53 -06:00
|
|
|
#if !defined(flush_tlb_mm) && defined(MODULE)
|
|
|
|
int flush_tlb = 0;
|
|
|
|
#endif
|
2006-08-22 01:47:33 -06:00
|
|
|
list_for_each(list, &ttm->vma_list->head) {
|
|
|
|
drm_ttm_vma_list_t *entry =
|
|
|
|
list_entry(list, drm_ttm_vma_list_t, head);
|
|
|
|
drm_clear_vma(entry->vma,
|
|
|
|
entry->vma->vm_start +
|
|
|
|
(page_offset << PAGE_SHIFT),
|
|
|
|
entry->vma->vm_start +
|
|
|
|
((page_offset + num_pages) << PAGE_SHIFT));
|
2006-08-22 03:19:53 -06:00
|
|
|
#if !defined(flush_tlb_mm) && defined(MODULE)
|
|
|
|
flush_tlb = 1;
|
|
|
|
#endif
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
2006-08-22 03:19:53 -06:00
|
|
|
#if !defined(flush_tlb_mm) && defined(MODULE)
|
|
|
|
if (flush_tlb)
|
|
|
|
global_flush_tlb();
|
|
|
|
#endif
|
2006-08-22 01:47:33 -06:00
|
|
|
|
|
|
|
for (cur_page = first_page; cur_page != last_page; ++cur_page) {
|
|
|
|
if (page_mapcount(*cur_page) != 0) {
|
|
|
|
DRM_ERROR("Mapped page detected. Map count is %d\n",
|
|
|
|
page_mapcount(*cur_page));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Free all resources associated with a ttm.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int drm_destroy_ttm(drm_ttm_t * ttm)
|
|
|
|
{
|
|
|
|
|
|
|
|
int i;
|
|
|
|
struct list_head *list, *next;
|
|
|
|
struct page **cur_page;
|
|
|
|
|
|
|
|
if (!ttm)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (atomic_read(&ttm->vma_count) > 0) {
|
2006-08-22 03:57:08 -06:00
|
|
|
ttm->destroy = 1;
|
2006-08-29 10:40:08 -06:00
|
|
|
DRM_ERROR("VMAs are still alive. Skipping destruction.\n");
|
2006-08-22 01:47:33 -06:00
|
|
|
return -EBUSY;
|
2006-08-30 01:57:35 -06:00
|
|
|
}
|
2006-08-22 01:47:33 -06:00
|
|
|
|
2006-08-29 10:40:08 -06:00
|
|
|
DRM_ERROR("Destroying a ttm\n");
|
2006-08-22 01:47:33 -06:00
|
|
|
if (ttm->be_list) {
|
|
|
|
list_for_each_safe(list, next, &ttm->be_list->head) {
|
|
|
|
drm_ttm_backend_list_t *entry =
|
|
|
|
list_entry(list, drm_ttm_backend_list_t, head);
|
|
|
|
drm_destroy_ttm_region(entry);
|
|
|
|
}
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(ttm->be_list, sizeof(*ttm->be_list), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
ttm->be_list = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ttm->pages) {
|
|
|
|
for (i = 0; i < ttm->num_pages; ++i) {
|
|
|
|
cur_page = ttm->pages + i;
|
|
|
|
if (ttm->page_flags &&
|
|
|
|
(ttm->page_flags[i] & DRM_TTM_PAGE_UNCACHED) &&
|
|
|
|
*cur_page && !PageHighMem(*cur_page)) {
|
|
|
|
change_page_attr(*cur_page, 1, PAGE_KERNEL);
|
|
|
|
}
|
|
|
|
if (*cur_page) {
|
|
|
|
ClearPageReserved(*cur_page);
|
|
|
|
__free_page(*cur_page);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
global_flush_tlb();
|
|
|
|
vfree(ttm->pages);
|
|
|
|
ttm->pages = NULL;
|
|
|
|
}
|
2006-08-22 03:19:53 -06:00
|
|
|
|
2006-08-22 01:47:33 -06:00
|
|
|
if (ttm->page_flags) {
|
|
|
|
vfree(ttm->page_flags);
|
|
|
|
ttm->page_flags = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ttm->vma_list) {
|
|
|
|
list_for_each_safe(list, next, &ttm->vma_list->head) {
|
|
|
|
drm_ttm_vma_list_t *entry =
|
|
|
|
list_entry(list, drm_ttm_vma_list_t, head);
|
|
|
|
list_del(list);
|
|
|
|
entry->vma->vm_private_data = NULL;
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(entry, sizeof(*entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(ttm->vma_list, sizeof(*ttm->vma_list), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
ttm->vma_list = NULL;
|
|
|
|
}
|
2006-08-22 03:19:53 -06:00
|
|
|
|
|
|
|
drm_free(ttm, sizeof(*ttm), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize a ttm.
|
|
|
|
* FIXME: Avoid using vmalloc for the page- and page_flags tables?
|
|
|
|
*/
|
|
|
|
|
2006-08-30 01:57:35 -06:00
|
|
|
static drm_ttm_t *drm_init_ttm(struct drm_device *dev, unsigned long size)
|
2006-08-22 01:47:33 -06:00
|
|
|
{
|
|
|
|
|
|
|
|
drm_ttm_t *ttm;
|
|
|
|
|
|
|
|
if (!dev->driver->bo_driver)
|
|
|
|
return NULL;
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
ttm = drm_calloc(1, sizeof(*ttm), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
if (!ttm)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ttm->lhandle = 0;
|
|
|
|
atomic_set(&ttm->vma_count, 0);
|
2006-08-27 11:03:20 -06:00
|
|
|
|
2006-08-22 03:57:08 -06:00
|
|
|
ttm->destroy = 0;
|
2006-08-22 01:47:33 -06:00
|
|
|
ttm->num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
|
|
|
|
|
|
|
|
ttm->page_flags = vmalloc(ttm->num_pages * sizeof(*ttm->page_flags));
|
|
|
|
if (!ttm->page_flags) {
|
|
|
|
drm_destroy_ttm(ttm);
|
|
|
|
DRM_ERROR("Failed allocating page_flags table\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
memset(ttm->page_flags, 0, ttm->num_pages * sizeof(*ttm->page_flags));
|
|
|
|
|
|
|
|
ttm->pages = vmalloc(ttm->num_pages * sizeof(*ttm->pages));
|
|
|
|
if (!ttm->pages) {
|
|
|
|
drm_destroy_ttm(ttm);
|
|
|
|
DRM_ERROR("Failed allocating page table\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
memset(ttm->pages, 0, ttm->num_pages * sizeof(*ttm->pages));
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
ttm->be_list = drm_calloc(1, sizeof(*ttm->be_list), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
if (!ttm->be_list) {
|
|
|
|
DRM_ERROR("Alloc be regions failed\n");
|
|
|
|
drm_destroy_ttm(ttm);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&ttm->be_list->head);
|
|
|
|
INIT_LIST_HEAD(&ttm->p_mm_list);
|
|
|
|
atomic_set(&ttm->shared_count, 0);
|
|
|
|
ttm->mm_list_seq = 0;
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
ttm->vma_list = drm_calloc(1, sizeof(*ttm->vma_list), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
if (!ttm->vma_list) {
|
|
|
|
DRM_ERROR("Alloc vma list failed\n");
|
|
|
|
drm_destroy_ttm(ttm);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&ttm->vma_list->head);
|
|
|
|
|
|
|
|
ttm->lhandle = (unsigned long)ttm;
|
|
|
|
ttm->dev = dev;
|
2006-08-22 03:57:08 -06:00
|
|
|
|
2006-08-22 01:47:33 -06:00
|
|
|
return ttm;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Lock the mmap_sems for processes that are mapping this ttm.
|
|
|
|
* This looks a bit clumsy, since we need to maintain the correct
|
|
|
|
* locking order
|
|
|
|
* mm->mmap_sem
|
|
|
|
* dev->struct_sem;
|
|
|
|
* and while we release dev->struct_sem to lock the mmap_sems,
|
|
|
|
* the mmap_sem list may have been updated. We need to revalidate
|
|
|
|
* it after relocking dev->struc_sem.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int drm_ttm_lock_mmap_sem(drm_ttm_t * ttm)
|
|
|
|
{
|
|
|
|
struct mm_struct **mm_list = NULL, **mm_list_p;
|
|
|
|
uint32_t list_seq;
|
|
|
|
uint32_t cur_count, shared_count;
|
|
|
|
p_mm_entry_t *entry;
|
|
|
|
unsigned i;
|
|
|
|
|
|
|
|
cur_count = 0;
|
|
|
|
list_seq = ttm->mm_list_seq;
|
|
|
|
shared_count = atomic_read(&ttm->shared_count);
|
|
|
|
|
|
|
|
do {
|
|
|
|
if (shared_count > cur_count) {
|
|
|
|
if (mm_list)
|
|
|
|
drm_free(mm_list, sizeof(*mm_list) * cur_count,
|
2006-08-22 03:19:53 -06:00
|
|
|
DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
cur_count = shared_count + 10;
|
|
|
|
mm_list =
|
2006-08-30 01:57:35 -06:00
|
|
|
drm_alloc(sizeof(*mm_list) * cur_count,
|
|
|
|
DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
if (!mm_list)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
mm_list_p = mm_list;
|
|
|
|
list_for_each_entry(entry, &ttm->p_mm_list, head) {
|
|
|
|
*mm_list_p++ = entry->mm;
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_unlock(&ttm->dev->struct_mutex);
|
|
|
|
mm_list_p = mm_list;
|
|
|
|
for (i = 0; i < shared_count; ++i, ++mm_list_p) {
|
|
|
|
down_write(&((*mm_list_p)->mmap_sem));
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_lock(&ttm->dev->struct_mutex);
|
|
|
|
|
|
|
|
if (list_seq != ttm->mm_list_seq) {
|
|
|
|
mm_list_p = mm_list;
|
|
|
|
for (i = 0; i < shared_count; ++i, ++mm_list_p) {
|
|
|
|
up_write(&((*mm_list_p)->mmap_sem));
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
shared_count = atomic_read(&ttm->shared_count);
|
|
|
|
|
|
|
|
} while (list_seq != ttm->mm_list_seq);
|
|
|
|
|
|
|
|
if (mm_list)
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(mm_list, sizeof(*mm_list) * cur_count, DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Change caching policy for range of pages in a ttm.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int drm_set_caching(drm_ttm_t * ttm, unsigned long page_offset,
|
|
|
|
unsigned long num_pages, int noncached,
|
|
|
|
int do_tlbflush)
|
|
|
|
{
|
|
|
|
int i, cur;
|
|
|
|
struct page **cur_page;
|
|
|
|
pgprot_t attr = (noncached) ? PAGE_KERNEL_NOCACHE : PAGE_KERNEL;
|
|
|
|
|
|
|
|
for (i = 0; i < num_pages; ++i) {
|
|
|
|
cur = page_offset + i;
|
|
|
|
cur_page = ttm->pages + cur;
|
|
|
|
if (*cur_page) {
|
|
|
|
if (PageHighMem(*cur_page)) {
|
|
|
|
if (noncached
|
|
|
|
&& page_address(*cur_page) != NULL) {
|
|
|
|
DRM_ERROR
|
|
|
|
("Illegal mapped HighMem Page\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
} else if ((ttm->page_flags[cur] &
|
|
|
|
DRM_TTM_PAGE_UNCACHED) != noncached) {
|
|
|
|
DRM_MASK_VAL(ttm->page_flags[cur],
|
|
|
|
DRM_TTM_PAGE_UNCACHED, noncached);
|
|
|
|
change_page_attr(*cur_page, 1, attr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (do_tlbflush)
|
|
|
|
global_flush_tlb();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unbind a ttm region from the aperture.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int drm_evict_ttm_region(drm_ttm_backend_list_t * entry)
|
|
|
|
{
|
|
|
|
drm_ttm_backend_t *be = entry->be;
|
|
|
|
drm_ttm_t *ttm = entry->owner;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (be) {
|
|
|
|
switch (entry->state) {
|
|
|
|
case ttm_bound:
|
|
|
|
if (ttm && be->needs_cache_adjust(be)) {
|
|
|
|
ret = drm_ttm_lock_mmap_sem(ttm);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2006-08-22 03:57:08 -06:00
|
|
|
drm_ttm_lock_mm(ttm, 0, 1);
|
2006-08-22 01:47:33 -06:00
|
|
|
unmap_vma_pages(ttm, entry->page_offset,
|
|
|
|
entry->num_pages);
|
2006-08-22 03:57:08 -06:00
|
|
|
drm_ttm_unlock_mm(ttm, 0, 1);
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
2006-09-01 10:11:05 -06:00
|
|
|
#ifdef BODEBUG
|
2006-09-01 03:23:21 -06:00
|
|
|
DRM_ERROR("Unbinding\n");
|
2006-09-01 10:11:05 -06:00
|
|
|
#endif
|
2006-08-22 01:47:33 -06:00
|
|
|
be->unbind(entry->be);
|
|
|
|
if (ttm && be->needs_cache_adjust(be)) {
|
|
|
|
drm_set_caching(ttm, entry->page_offset,
|
|
|
|
entry->num_pages, 0, 1);
|
2006-08-22 03:57:08 -06:00
|
|
|
drm_ttm_unlock_mm(ttm, 1, 0);
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
entry->state = ttm_evicted;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void drm_unbind_ttm_region(drm_ttm_backend_list_t * entry)
|
|
|
|
{
|
|
|
|
drm_evict_ttm_region(entry);
|
|
|
|
entry->state = ttm_unbound;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Destroy and clean up all resources associated with a ttm region.
|
|
|
|
* FIXME: release pages to OS when doing this operation.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void drm_destroy_ttm_region(drm_ttm_backend_list_t * entry)
|
|
|
|
{
|
|
|
|
drm_ttm_backend_t *be = entry->be;
|
|
|
|
drm_ttm_t *ttm = entry->owner;
|
|
|
|
uint32_t *cur_page_flags;
|
|
|
|
int i;
|
|
|
|
|
2006-08-29 10:40:08 -06:00
|
|
|
DRM_ERROR("Destroying a TTM region\n");
|
2006-08-22 01:47:33 -06:00
|
|
|
list_del_init(&entry->head);
|
|
|
|
|
|
|
|
drm_unbind_ttm_region(entry);
|
|
|
|
if (be) {
|
|
|
|
be->clear(entry->be);
|
|
|
|
if (be->needs_cache_adjust(be)) {
|
|
|
|
int ret = drm_ttm_lock_mmap_sem(ttm);
|
2006-08-25 10:05:35 -06:00
|
|
|
drm_ttm_lock_mm(ttm, 0, 1);
|
2006-08-30 01:57:35 -06:00
|
|
|
unmap_vma_pages(ttm, entry->page_offset,
|
2006-08-25 10:05:35 -06:00
|
|
|
entry->num_pages);
|
|
|
|
drm_ttm_unlock_mm(ttm, 0, 1);
|
2006-08-22 01:47:33 -06:00
|
|
|
drm_set_caching(ttm, entry->page_offset,
|
|
|
|
entry->num_pages, 0, 1);
|
|
|
|
if (!ret)
|
2006-08-22 03:57:08 -06:00
|
|
|
drm_ttm_unlock_mm(ttm, 1, 0);
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
|
|
|
be->destroy(be);
|
|
|
|
}
|
|
|
|
cur_page_flags = ttm->page_flags + entry->page_offset;
|
|
|
|
for (i = 0; i < entry->num_pages; ++i) {
|
|
|
|
DRM_MASK_VAL(*cur_page_flags, DRM_TTM_PAGE_USED, 0);
|
|
|
|
cur_page_flags++;
|
|
|
|
}
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(entry, sizeof(*entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a ttm region from a range of ttm pages.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int drm_create_ttm_region(drm_ttm_t * ttm, unsigned long page_offset,
|
|
|
|
unsigned long n_pages, int cached,
|
|
|
|
drm_ttm_backend_list_t ** region)
|
|
|
|
{
|
|
|
|
struct page **cur_page;
|
|
|
|
uint32_t *cur_page_flags;
|
|
|
|
drm_ttm_backend_list_t *entry;
|
|
|
|
drm_ttm_backend_t *be;
|
|
|
|
int ret, i;
|
|
|
|
|
|
|
|
if ((page_offset + n_pages) > ttm->num_pages || n_pages == 0) {
|
|
|
|
DRM_ERROR("Region Doesn't fit ttm\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
cur_page_flags = ttm->page_flags + page_offset;
|
|
|
|
for (i = 0; i < n_pages; ++i, ++cur_page_flags) {
|
|
|
|
if (*cur_page_flags & DRM_TTM_PAGE_USED) {
|
|
|
|
DRM_ERROR("TTM region overlap\n");
|
|
|
|
return -EINVAL;
|
|
|
|
} else {
|
|
|
|
DRM_MASK_VAL(*cur_page_flags, DRM_TTM_PAGE_USED,
|
|
|
|
DRM_TTM_PAGE_USED);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
entry = drm_calloc(1, sizeof(*entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
if (!entry)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2006-08-30 01:57:35 -06:00
|
|
|
be = ttm->dev->driver->bo_driver->create_ttm_backend_entry(ttm->dev,
|
|
|
|
cached);
|
2006-08-22 01:47:33 -06:00
|
|
|
if (!be) {
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(entry, sizeof(*entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
DRM_ERROR("Couldn't create backend.\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
entry->state = ttm_unbound;
|
|
|
|
entry->page_offset = page_offset;
|
|
|
|
entry->num_pages = n_pages;
|
|
|
|
entry->be = be;
|
|
|
|
entry->owner = ttm;
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&entry->head);
|
|
|
|
list_add_tail(&entry->head, &ttm->be_list->head);
|
|
|
|
|
|
|
|
for (i = 0; i < entry->num_pages; ++i) {
|
|
|
|
cur_page = ttm->pages + (page_offset + i);
|
|
|
|
if (!*cur_page) {
|
|
|
|
*cur_page = alloc_page(GFP_KERNEL);
|
|
|
|
if (!*cur_page) {
|
|
|
|
DRM_ERROR("Page allocation failed\n");
|
|
|
|
drm_destroy_ttm_region(entry);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
SetPageReserved(*cur_page);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((ret = be->populate(be, n_pages, ttm->pages + page_offset))) {
|
|
|
|
drm_destroy_ttm_region(entry);
|
|
|
|
DRM_ERROR("Couldn't populate backend.\n");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
ttm->aperture_base = be->aperture_base;
|
|
|
|
|
|
|
|
*region = entry;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Bind a ttm region. Set correct caching policy.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int drm_bind_ttm_region(drm_ttm_backend_list_t * region,
|
|
|
|
unsigned long aper_offset)
|
|
|
|
{
|
|
|
|
|
|
|
|
int i;
|
|
|
|
uint32_t *cur_page_flag;
|
|
|
|
int ret = 0;
|
|
|
|
drm_ttm_backend_t *be;
|
|
|
|
drm_ttm_t *ttm;
|
|
|
|
|
|
|
|
if (!region || region->state == ttm_bound)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
be = region->be;
|
|
|
|
ttm = region->owner;
|
|
|
|
|
|
|
|
if (ttm && be->needs_cache_adjust(be)) {
|
|
|
|
ret = drm_ttm_lock_mmap_sem(ttm);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
drm_set_caching(ttm, region->page_offset, region->num_pages,
|
2006-08-22 03:57:08 -06:00
|
|
|
DRM_TTM_PAGE_UNCACHED, 1);
|
2006-08-22 01:47:33 -06:00
|
|
|
} else {
|
|
|
|
DRM_DEBUG("Binding cached\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((ret = be->bind(be, aper_offset))) {
|
|
|
|
if (ttm && be->needs_cache_adjust(be))
|
2006-08-22 03:57:08 -06:00
|
|
|
drm_ttm_unlock_mm(ttm, 1, 0);
|
2006-08-22 01:47:33 -06:00
|
|
|
drm_unbind_ttm_region(region);
|
|
|
|
DRM_ERROR("Couldn't bind backend.\n");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
cur_page_flag = ttm->page_flags + region->page_offset;
|
|
|
|
for (i = 0; i < region->num_pages; ++i) {
|
|
|
|
DRM_MASK_VAL(*cur_page_flag, DRM_TTM_MASK_PFN,
|
|
|
|
(i + aper_offset) << PAGE_SHIFT);
|
|
|
|
cur_page_flag++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ttm && be->needs_cache_adjust(be)) {
|
|
|
|
ioremap_vmas(ttm, region->page_offset, region->num_pages,
|
|
|
|
aper_offset);
|
2006-08-22 03:57:08 -06:00
|
|
|
drm_ttm_unlock_mm(ttm, 1, 0);
|
2006-08-22 01:47:33 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
region->state = ttm_bound;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int drm_rebind_ttm_region(drm_ttm_backend_list_t * entry,
|
|
|
|
unsigned long aper_offset)
|
|
|
|
{
|
|
|
|
return drm_bind_ttm_region(entry, aper_offset);
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Destroy an anonymous ttm region.
|
|
|
|
*/
|
|
|
|
|
|
|
|
void drm_user_destroy_region(drm_ttm_backend_list_t * entry)
|
|
|
|
{
|
|
|
|
drm_ttm_backend_t *be;
|
|
|
|
struct page **cur_page;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!entry || entry->owner)
|
|
|
|
return;
|
|
|
|
|
|
|
|
be = entry->be;
|
|
|
|
if (!be) {
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(entry, sizeof(*entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
be->unbind(be);
|
|
|
|
|
|
|
|
if (entry->anon_pages) {
|
|
|
|
cur_page = entry->anon_pages;
|
|
|
|
for (i = 0; i < entry->anon_locked; ++i) {
|
|
|
|
if (!PageReserved(*cur_page))
|
|
|
|
SetPageDirty(*cur_page);
|
|
|
|
page_cache_release(*cur_page);
|
|
|
|
cur_page++;
|
|
|
|
}
|
|
|
|
vfree(entry->anon_pages);
|
|
|
|
}
|
|
|
|
|
|
|
|
be->destroy(be);
|
2006-08-22 03:19:53 -06:00
|
|
|
drm_free(entry, sizeof(*entry), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a ttm region from an arbitrary region of user pages.
|
|
|
|
* Since this region has no backing ttm, it's owner is set to
|
|
|
|
* null, and it is registered with the file of the caller.
|
|
|
|
* Gets destroyed when the file is closed. We call this an
|
|
|
|
* anonymous ttm region.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int drm_user_create_region(drm_device_t * dev, unsigned long start, int len,
|
|
|
|
drm_ttm_backend_list_t ** entry)
|
|
|
|
{
|
|
|
|
drm_ttm_backend_list_t *tmp;
|
|
|
|
drm_ttm_backend_t *be;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (len <= 0)
|
|
|
|
return -EINVAL;
|
|
|
|
if (!dev->driver->bo_driver->create_ttm_backend_entry)
|
|
|
|
return -EFAULT;
|
|
|
|
|
2006-08-22 03:19:53 -06:00
|
|
|
tmp = drm_calloc(1, sizeof(*tmp), DRM_MEM_TTM);
|
2006-08-22 01:47:33 -06:00
|
|
|
|
|
|
|
if (!tmp)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
be = dev->driver->bo_driver->create_ttm_backend_entry(dev, 1);
|
|
|
|
tmp->be = be;
|
|
|
|
|
|
|
|
if (!be) {
|
|
|
|
drm_user_destroy_region(tmp);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
if (be->needs_cache_adjust(be)) {
|
|
|
|
drm_user_destroy_region(tmp);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
|
|
|
tmp->anon_pages = vmalloc(sizeof(*(tmp->anon_pages)) * len);
|
|
|
|
|
|
|
|
if (!tmp->anon_pages) {
|
|
|
|
drm_user_destroy_region(tmp);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
down_read(¤t->mm->mmap_sem);
|
|
|
|
ret = get_user_pages(current, current->mm, start, len, 1, 0,
|
|
|
|
tmp->anon_pages, NULL);
|
|
|
|
up_read(¤t->mm->mmap_sem);
|
|
|
|
|
|
|
|
if (ret != len) {
|
|
|
|
drm_user_destroy_region(tmp);
|
|
|
|
DRM_ERROR("Could not lock %d pages. Return code was %d\n",
|
|
|
|
len, ret);
|
|
|
|
return -EPERM;
|
|
|
|
}
|
|
|
|
tmp->anon_locked = len;
|
|
|
|
|
|
|
|
ret = be->populate(be, len, tmp->anon_pages);
|
|
|
|
|
|
|
|
if (ret) {
|
|
|
|
drm_user_destroy_region(tmp);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
tmp->state = ttm_unbound;
|
|
|
|
*entry = tmp;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2006-08-27 11:03:20 -06:00
|
|
|
* dev->struct_mutex locked.
|
2006-08-22 01:47:33 -06:00
|
|
|
*/
|
2006-08-30 01:57:35 -06:00
|
|
|
static void drm_ttm_object_remove(drm_device_t * dev, drm_ttm_object_t * object)
|
2006-08-22 01:47:33 -06:00
|
|
|
{
|
2006-08-27 11:03:20 -06:00
|
|
|
drm_map_list_t *list = &object->map_list;
|
|
|
|
drm_local_map_t *map;
|
|
|
|
|
|
|
|
if (list->user_token)
|
|
|
|
drm_ht_remove_item(&dev->map_hash, &list->hash);
|
|
|
|
|
|
|
|
map = list->map;
|
|
|
|
|
|
|
|
if (map) {
|
2006-08-30 01:57:35 -06:00
|
|
|
drm_ttm_t *ttm = (drm_ttm_t *) map->offset;
|
2006-08-27 11:03:20 -06:00
|
|
|
if (ttm) {
|
|
|
|
if (drm_destroy_ttm(ttm) != -EBUSY) {
|
|
|
|
drm_free(map, sizeof(*map), DRM_MEM_TTM);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
drm_free(map, sizeof(*map), DRM_MEM_TTM);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
drm_free(object, sizeof(*object), DRM_MEM_TTM);
|
|
|
|
}
|
|
|
|
|
2006-08-30 01:57:35 -06:00
|
|
|
void drm_ttm_object_deref_locked(drm_device_t * dev, drm_ttm_object_t * to)
|
2006-08-28 08:36:37 -06:00
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&to->usage)) {
|
|
|
|
drm_ttm_object_remove(dev, to);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-30 01:57:35 -06:00
|
|
|
void drm_ttm_object_deref_unlocked(drm_device_t * dev, drm_ttm_object_t * to)
|
2006-08-29 06:52:02 -06:00
|
|
|
{
|
|
|
|
if (atomic_dec_and_test(&to->usage)) {
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
|
|
|
if (atomic_read(&to->usage) == 0)
|
|
|
|
drm_ttm_object_remove(dev, to);
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-27 11:03:20 -06:00
|
|
|
/*
|
|
|
|
* dev->struct_mutex locked.
|
|
|
|
*/
|
2006-08-30 01:57:35 -06:00
|
|
|
static void drm_ttm_user_deref_locked(drm_file_t * priv,
|
|
|
|
drm_user_object_t * base)
|
2006-08-27 11:03:20 -06:00
|
|
|
{
|
2006-08-28 08:36:37 -06:00
|
|
|
drm_ttm_object_deref_locked(priv->head->dev,
|
2006-08-30 01:57:35 -06:00
|
|
|
drm_user_object_entry(base,
|
|
|
|
drm_ttm_object_t,
|
2006-08-28 08:36:37 -06:00
|
|
|
base));
|
2006-08-27 11:03:20 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a ttm and add it to the drm book-keeping.
|
|
|
|
* dev->struct_mutex locked.
|
|
|
|
*/
|
|
|
|
|
2006-08-30 01:57:35 -06:00
|
|
|
int drm_ttm_object_create(drm_device_t * dev, unsigned long size,
|
|
|
|
uint32_t flags, drm_ttm_object_t ** ttm_object)
|
2006-08-27 11:03:20 -06:00
|
|
|
{
|
|
|
|
drm_ttm_object_t *object;
|
2006-08-22 01:47:33 -06:00
|
|
|
drm_map_list_t *list;
|
|
|
|
drm_map_t *map;
|
|
|
|
drm_ttm_t *ttm;
|
|
|
|
|
2006-08-27 11:03:20 -06:00
|
|
|
object = drm_calloc(1, sizeof(*object), DRM_MEM_TTM);
|
2006-08-30 01:57:35 -06:00
|
|
|
if (!object)
|
2006-08-27 11:03:20 -06:00
|
|
|
return -ENOMEM;
|
|
|
|
object->flags = flags;
|
|
|
|
list = &object->map_list;
|
2006-08-30 01:57:35 -06:00
|
|
|
|
2006-08-27 11:03:20 -06:00
|
|
|
list->map = drm_calloc(1, sizeof(*map), DRM_MEM_TTM);
|
|
|
|
if (!list->map) {
|
|
|
|
drm_ttm_object_remove(dev, object);
|
2006-08-22 01:47:33 -06:00
|
|
|
return -ENOMEM;
|
2006-08-27 11:03:20 -06:00
|
|
|
}
|
|
|
|
map = list->map;
|
2006-08-22 01:47:33 -06:00
|
|
|
|
|
|
|
ttm = drm_init_ttm(dev, size);
|
|
|
|
if (!ttm) {
|
|
|
|
DRM_ERROR("Could not create ttm\n");
|
2006-08-27 11:03:20 -06:00
|
|
|
drm_ttm_object_remove(dev, object);
|
2006-08-22 01:47:33 -06:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
map->offset = ttm->lhandle;
|
|
|
|
map->type = _DRM_TTM;
|
|
|
|
map->flags = _DRM_REMOVABLE;
|
2006-08-27 11:45:38 -06:00
|
|
|
map->size = ttm->num_pages * PAGE_SIZE;
|
2006-08-27 11:03:20 -06:00
|
|
|
map->handle = (void *)object;
|
2006-08-30 01:57:35 -06:00
|
|
|
|
|
|
|
if (drm_ht_just_insert_please(&dev->map_hash, &list->hash,
|
|
|
|
(unsigned long)map->handle,
|
2006-08-22 03:19:53 -06:00
|
|
|
32 - PAGE_SHIFT - 3, PAGE_SHIFT,
|
|
|
|
DRM_MAP_HASH_OFFSET)) {
|
2006-08-27 11:03:20 -06:00
|
|
|
drm_ttm_object_remove(dev, object);
|
2006-08-22 01:47:33 -06:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2006-08-25 10:05:35 -06:00
|
|
|
list->user_token = list->hash.key;
|
2006-08-22 01:47:33 -06:00
|
|
|
|
2006-08-27 11:03:20 -06:00
|
|
|
atomic_set(&object->usage, 1);
|
2006-08-27 14:01:33 -06:00
|
|
|
*ttm_object = object;
|
2006-08-22 01:47:33 -06:00
|
|
|
return 0;
|
|
|
|
}
|
2006-08-25 11:03:42 -06:00
|
|
|
|
2006-08-30 01:57:35 -06:00
|
|
|
drm_ttm_object_t *drm_lookup_ttm_object(drm_file_t * priv, uint32_t handle,
|
2006-08-28 08:36:37 -06:00
|
|
|
int check_owner)
|
|
|
|
{
|
|
|
|
drm_user_object_t *uo;
|
|
|
|
drm_ttm_object_t *to;
|
|
|
|
|
|
|
|
uo = drm_lookup_user_object(priv, handle);
|
|
|
|
|
2006-08-30 01:57:35 -06:00
|
|
|
if (!uo || (uo->type != drm_ttm_type))
|
2006-08-28 08:36:37 -06:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (check_owner && priv != uo->owner) {
|
|
|
|
if (!drm_lookup_ref_object(priv, uo, _DRM_REF_USE))
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
to = drm_user_object_entry(uo, drm_ttm_object_t, base);
|
|
|
|
atomic_inc(&to->usage);
|
|
|
|
return to;
|
|
|
|
}
|
|
|
|
|
2006-08-27 13:16:13 -06:00
|
|
|
int drm_ttm_ioctl(DRM_IOCTL_ARGS)
|
2006-08-25 11:03:42 -06:00
|
|
|
{
|
2006-08-30 01:57:35 -06:00
|
|
|
DRM_DEVICE;
|
2006-08-27 11:03:20 -06:00
|
|
|
drm_ttm_arg_t arg;
|
|
|
|
drm_ttm_object_t *entry;
|
|
|
|
drm_user_object_t *uo;
|
|
|
|
unsigned long size;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
DRM_COPY_FROM_USER_IOCTL(arg, (void __user *)data, sizeof(arg));
|
2006-08-30 01:57:35 -06:00
|
|
|
|
|
|
|
switch (arg.op) {
|
2006-08-27 11:03:20 -06:00
|
|
|
case drm_ttm_create:
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
2006-08-29 02:45:34 -06:00
|
|
|
size = arg.size;
|
2006-08-27 11:03:20 -06:00
|
|
|
ret = drm_ttm_object_create(dev, size, arg.flags, &entry);
|
|
|
|
if (ret) {
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
return ret;
|
|
|
|
}
|
2006-08-30 01:57:35 -06:00
|
|
|
ret = drm_add_user_object(priv, &entry->base,
|
2006-08-27 11:03:20 -06:00
|
|
|
arg.flags & DRM_TTM_FLAG_SHAREABLE);
|
|
|
|
if (ret) {
|
|
|
|
drm_ttm_object_remove(dev, entry);
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
return ret;
|
|
|
|
}
|
2006-08-28 08:36:37 -06:00
|
|
|
entry->base.remove = drm_ttm_user_deref_locked;
|
|
|
|
entry->base.type = drm_ttm_type;
|
|
|
|
entry->base.ref_struct_locked = NULL;
|
|
|
|
entry->base.unref = NULL;
|
2006-08-27 11:45:38 -06:00
|
|
|
atomic_inc(&entry->usage);
|
2006-08-27 11:03:20 -06:00
|
|
|
break;
|
|
|
|
case drm_ttm_reference:
|
2006-08-27 11:07:38 -06:00
|
|
|
ret = drm_user_object_ref(priv, arg.handle, drm_ttm_type, &uo);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
2006-08-30 01:57:35 -06:00
|
|
|
entry = drm_lookup_ttm_object(priv, arg.handle, 0);
|
2006-08-27 11:07:38 -06:00
|
|
|
break;
|
2006-08-27 11:03:20 -06:00
|
|
|
case drm_ttm_unreference:
|
|
|
|
return drm_user_object_unref(priv, arg.handle, drm_ttm_type);
|
|
|
|
case drm_ttm_destroy:
|
|
|
|
mutex_lock(&dev->struct_mutex);
|
|
|
|
uo = drm_lookup_user_object(priv, arg.handle);
|
|
|
|
if (!uo || (uo->type != drm_ttm_type) || uo->owner != priv) {
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
ret = drm_remove_user_object(priv, uo);
|
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
return ret;
|
|
|
|
}
|
2006-08-27 11:45:38 -06:00
|
|
|
arg.handle = entry->base.hash.key;
|
|
|
|
arg.user_token = entry->map_list.user_token;
|
2006-08-29 02:45:34 -06:00
|
|
|
arg.size = entry->map_list.map->size;
|
2006-08-28 08:36:37 -06:00
|
|
|
drm_ttm_object_deref_locked(dev, entry);
|
2006-08-27 11:45:38 -06:00
|
|
|
mutex_unlock(&dev->struct_mutex);
|
|
|
|
|
2006-08-27 11:03:20 -06:00
|
|
|
DRM_COPY_TO_USER_IOCTL((void __user *)data, arg, sizeof(arg));
|
2006-08-25 11:03:42 -06:00
|
|
|
return 0;
|
|
|
|
}
|