xref: /linux/drivers/gpu/drm/xe/xe_bo.h (revision fe7fad476ec8153a8b8767a08114e3e4a58a837e)
1 /* SPDX-License-Identifier: MIT */
2 /*
3  * Copyright © 2021 Intel Corporation
4  */
5 
6 #ifndef _XE_BO_H_
7 #define _XE_BO_H_
8 
9 #include <drm/ttm/ttm_tt.h>
10 
11 #include "xe_bo_types.h"
12 #include "xe_macros.h"
13 #include "xe_vm_types.h"
14 #include "xe_vm.h"
15 
16 #define XE_DEFAULT_GTT_SIZE_MB          3072ULL /* 3GB by default */
17 
18 #define XE_BO_FLAG_USER		BIT(0)
19 /* The bits below need to be contiguous, or things break */
20 #define XE_BO_FLAG_SYSTEM		BIT(1)
21 #define XE_BO_FLAG_VRAM0		BIT(2)
22 #define XE_BO_FLAG_VRAM1		BIT(3)
23 #define XE_BO_FLAG_VRAM_MASK		(XE_BO_FLAG_VRAM0 | XE_BO_FLAG_VRAM1)
24 /* -- */
25 #define XE_BO_FLAG_STOLEN		BIT(4)
26 #define XE_BO_FLAG_VRAM_IF_DGFX(tile)	(IS_DGFX(tile_to_xe(tile)) ? \
27 					 XE_BO_FLAG_VRAM0 << (tile)->id : \
28 					 XE_BO_FLAG_SYSTEM)
29 #define XE_BO_FLAG_GGTT			BIT(5)
30 #define XE_BO_FLAG_IGNORE_MIN_PAGE_SIZE BIT(6)
31 #define XE_BO_FLAG_PINNED		BIT(7)
32 #define XE_BO_FLAG_NO_RESV_EVICT	BIT(8)
33 #define XE_BO_FLAG_DEFER_BACKING	BIT(9)
34 #define XE_BO_FLAG_SCANOUT		BIT(10)
35 #define XE_BO_FLAG_FIXED_PLACEMENT	BIT(11)
36 #define XE_BO_FLAG_PAGETABLE		BIT(12)
37 #define XE_BO_FLAG_NEEDS_CPU_ACCESS	BIT(13)
38 #define XE_BO_FLAG_NEEDS_UC		BIT(14)
39 #define XE_BO_FLAG_NEEDS_64K		BIT(15)
40 #define XE_BO_FLAG_NEEDS_2M		BIT(16)
41 #define XE_BO_FLAG_GGTT_INVALIDATE	BIT(17)
42 #define XE_BO_FLAG_GGTT0                BIT(18)
43 #define XE_BO_FLAG_GGTT1                BIT(19)
44 #define XE_BO_FLAG_GGTT2                BIT(20)
45 #define XE_BO_FLAG_GGTT3                BIT(21)
46 #define XE_BO_FLAG_GGTT_ALL             (XE_BO_FLAG_GGTT0 | \
47 					 XE_BO_FLAG_GGTT1 | \
48 					 XE_BO_FLAG_GGTT2 | \
49 					 XE_BO_FLAG_GGTT3)
50 
51 /* this one is trigger internally only */
52 #define XE_BO_FLAG_INTERNAL_TEST	BIT(30)
53 #define XE_BO_FLAG_INTERNAL_64K		BIT(31)
54 
55 #define XE_BO_FLAG_GGTTx(tile) \
56 	(XE_BO_FLAG_GGTT0 << (tile)->id)
57 
58 #define XE_PTE_SHIFT			12
59 #define XE_PAGE_SIZE			(1 << XE_PTE_SHIFT)
60 #define XE_PTE_MASK			(XE_PAGE_SIZE - 1)
61 #define XE_PDE_SHIFT			(XE_PTE_SHIFT - 3)
62 #define XE_PDES				(1 << XE_PDE_SHIFT)
63 #define XE_PDE_MASK			(XE_PDES - 1)
64 
65 #define XE_64K_PTE_SHIFT		16
66 #define XE_64K_PAGE_SIZE		(1 << XE_64K_PTE_SHIFT)
67 #define XE_64K_PTE_MASK			(XE_64K_PAGE_SIZE - 1)
68 #define XE_64K_PDE_MASK			(XE_PDE_MASK >> 4)
69 
70 #define XE_PL_SYSTEM		TTM_PL_SYSTEM
71 #define XE_PL_TT		TTM_PL_TT
72 #define XE_PL_VRAM0		TTM_PL_VRAM
73 #define XE_PL_VRAM1		(XE_PL_VRAM0 + 1)
74 #define XE_PL_STOLEN		(TTM_NUM_MEM_TYPES - 1)
75 
76 #define XE_BO_PROPS_INVALID	(-1)
77 
78 #define XE_PCI_BARRIER_MMAP_OFFSET	(0x50 << XE_PTE_SHIFT)
79 
80 struct sg_table;
81 
82 struct xe_bo *xe_bo_alloc(void);
83 void xe_bo_free(struct xe_bo *bo);
84 
85 struct xe_bo *___xe_bo_create_locked(struct xe_device *xe, struct xe_bo *bo,
86 				     struct xe_tile *tile, struct dma_resv *resv,
87 				     struct ttm_lru_bulk_move *bulk, size_t size,
88 				     u16 cpu_caching, enum ttm_bo_type type,
89 				     u32 flags);
90 struct xe_bo *
91 xe_bo_create_locked_range(struct xe_device *xe,
92 			  struct xe_tile *tile, struct xe_vm *vm,
93 			  size_t size, u64 start, u64 end,
94 			  enum ttm_bo_type type, u32 flags, u64 alignment);
95 struct xe_bo *xe_bo_create_locked(struct xe_device *xe, struct xe_tile *tile,
96 				  struct xe_vm *vm, size_t size,
97 				  enum ttm_bo_type type, u32 flags);
98 struct xe_bo *xe_bo_create(struct xe_device *xe, struct xe_tile *tile,
99 			   struct xe_vm *vm, size_t size,
100 			   enum ttm_bo_type type, u32 flags);
101 struct xe_bo *xe_bo_create_user(struct xe_device *xe, struct xe_tile *tile,
102 				struct xe_vm *vm, size_t size,
103 				u16 cpu_caching,
104 				u32 flags);
105 struct xe_bo *xe_bo_create_pin_map(struct xe_device *xe, struct xe_tile *tile,
106 				   struct xe_vm *vm, size_t size,
107 				   enum ttm_bo_type type, u32 flags);
108 struct xe_bo *xe_bo_create_pin_map_at(struct xe_device *xe, struct xe_tile *tile,
109 				      struct xe_vm *vm, size_t size, u64 offset,
110 				      enum ttm_bo_type type, u32 flags);
111 struct xe_bo *xe_bo_create_pin_map_at_aligned(struct xe_device *xe,
112 					      struct xe_tile *tile,
113 					      struct xe_vm *vm,
114 					      size_t size, u64 offset,
115 					      enum ttm_bo_type type, u32 flags,
116 					      u64 alignment);
117 struct xe_bo *xe_bo_create_from_data(struct xe_device *xe, struct xe_tile *tile,
118 				     const void *data, size_t size,
119 				     enum ttm_bo_type type, u32 flags);
120 struct xe_bo *xe_managed_bo_create_pin_map(struct xe_device *xe, struct xe_tile *tile,
121 					   size_t size, u32 flags);
122 struct xe_bo *xe_managed_bo_create_from_data(struct xe_device *xe, struct xe_tile *tile,
123 					     const void *data, size_t size, u32 flags);
124 int xe_managed_bo_reinit_in_vram(struct xe_device *xe, struct xe_tile *tile, struct xe_bo **src);
125 
126 int xe_bo_placement_for_flags(struct xe_device *xe, struct xe_bo *bo,
127 			      u32 bo_flags);
128 
129 static inline struct xe_bo *ttm_to_xe_bo(const struct ttm_buffer_object *bo)
130 {
131 	return container_of(bo, struct xe_bo, ttm);
132 }
133 
134 static inline struct xe_bo *gem_to_xe_bo(const struct drm_gem_object *obj)
135 {
136 	return container_of(obj, struct xe_bo, ttm.base);
137 }
138 
139 #define xe_bo_device(bo) ttm_to_xe_device((bo)->ttm.bdev)
140 
141 static inline struct xe_bo *xe_bo_get(struct xe_bo *bo)
142 {
143 	if (bo)
144 		drm_gem_object_get(&bo->ttm.base);
145 
146 	return bo;
147 }
148 
149 void xe_bo_put(struct xe_bo *bo);
150 
151 static inline void __xe_bo_unset_bulk_move(struct xe_bo *bo)
152 {
153 	if (bo)
154 		ttm_bo_set_bulk_move(&bo->ttm, NULL);
155 }
156 
157 static inline void xe_bo_assert_held(struct xe_bo *bo)
158 {
159 	if (bo)
160 		dma_resv_assert_held((bo)->ttm.base.resv);
161 }
162 
163 int xe_bo_lock(struct xe_bo *bo, bool intr);
164 
165 void xe_bo_unlock(struct xe_bo *bo);
166 
167 static inline void xe_bo_unlock_vm_held(struct xe_bo *bo)
168 {
169 	if (bo) {
170 		XE_WARN_ON(bo->vm && bo->ttm.base.resv != xe_vm_resv(bo->vm));
171 		if (bo->vm)
172 			xe_vm_assert_held(bo->vm);
173 		else
174 			dma_resv_unlock(bo->ttm.base.resv);
175 	}
176 }
177 
178 int xe_bo_pin_external(struct xe_bo *bo);
179 int xe_bo_pin(struct xe_bo *bo);
180 void xe_bo_unpin_external(struct xe_bo *bo);
181 void xe_bo_unpin(struct xe_bo *bo);
182 int xe_bo_validate(struct xe_bo *bo, struct xe_vm *vm, bool allow_res_evict);
183 
184 static inline bool xe_bo_is_pinned(struct xe_bo *bo)
185 {
186 	return bo->ttm.pin_count;
187 }
188 
189 static inline bool xe_bo_is_protected(const struct xe_bo *bo)
190 {
191 	return bo->pxp_key_instance;
192 }
193 
194 static inline void xe_bo_unpin_map_no_vm(struct xe_bo *bo)
195 {
196 	if (likely(bo)) {
197 		xe_bo_lock(bo, false);
198 		xe_bo_unpin(bo);
199 		xe_bo_unlock(bo);
200 
201 		xe_bo_put(bo);
202 	}
203 }
204 
205 bool xe_bo_is_xe_bo(struct ttm_buffer_object *bo);
206 dma_addr_t __xe_bo_addr(struct xe_bo *bo, u64 offset, size_t page_size);
207 dma_addr_t xe_bo_addr(struct xe_bo *bo, u64 offset, size_t page_size);
208 
209 static inline dma_addr_t
210 xe_bo_main_addr(struct xe_bo *bo, size_t page_size)
211 {
212 	return xe_bo_addr(bo, 0, page_size);
213 }
214 
215 static inline u32
216 __xe_bo_ggtt_addr(struct xe_bo *bo, u8 tile_id)
217 {
218 	struct xe_ggtt_node *ggtt_node = bo->ggtt_node[tile_id];
219 
220 	if (XE_WARN_ON(!ggtt_node))
221 		return 0;
222 
223 	XE_WARN_ON(ggtt_node->base.size > bo->size);
224 	XE_WARN_ON(ggtt_node->base.start + ggtt_node->base.size > (1ull << 32));
225 	return ggtt_node->base.start;
226 }
227 
228 static inline u32
229 xe_bo_ggtt_addr(struct xe_bo *bo)
230 {
231 	xe_assert(xe_bo_device(bo), bo->tile);
232 
233 	return __xe_bo_ggtt_addr(bo, bo->tile->id);
234 }
235 
236 int xe_bo_vmap(struct xe_bo *bo);
237 void xe_bo_vunmap(struct xe_bo *bo);
238 int xe_bo_read(struct xe_bo *bo, u64 offset, void *dst, int size);
239 
240 bool mem_type_is_vram(u32 mem_type);
241 bool xe_bo_is_vram(struct xe_bo *bo);
242 bool xe_bo_is_stolen(struct xe_bo *bo);
243 bool xe_bo_is_stolen_devmem(struct xe_bo *bo);
244 bool xe_bo_is_vm_bound(struct xe_bo *bo);
245 bool xe_bo_has_single_placement(struct xe_bo *bo);
246 uint64_t vram_region_gpu_offset(struct ttm_resource *res);
247 
248 bool xe_bo_can_migrate(struct xe_bo *bo, u32 mem_type);
249 
250 int xe_bo_migrate(struct xe_bo *bo, u32 mem_type);
251 int xe_bo_evict(struct xe_bo *bo, bool force_alloc);
252 
253 int xe_bo_evict_pinned(struct xe_bo *bo);
254 int xe_bo_restore_pinned(struct xe_bo *bo);
255 
256 extern const struct ttm_device_funcs xe_ttm_funcs;
257 extern const char *const xe_mem_type_to_name[];
258 
259 int xe_gem_create_ioctl(struct drm_device *dev, void *data,
260 			struct drm_file *file);
261 int xe_gem_mmap_offset_ioctl(struct drm_device *dev, void *data,
262 			     struct drm_file *file);
263 void xe_bo_runtime_pm_release_mmap_offset(struct xe_bo *bo);
264 
265 int xe_bo_dumb_create(struct drm_file *file_priv,
266 		      struct drm_device *dev,
267 		      struct drm_mode_create_dumb *args);
268 
269 bool xe_bo_needs_ccs_pages(struct xe_bo *bo);
270 
271 static inline size_t xe_bo_ccs_pages_start(struct xe_bo *bo)
272 {
273 	return PAGE_ALIGN(bo->ttm.base.size);
274 }
275 
276 static inline bool xe_bo_has_pages(struct xe_bo *bo)
277 {
278 	if ((bo->ttm.ttm && ttm_tt_is_populated(bo->ttm.ttm)) ||
279 	    xe_bo_is_vram(bo))
280 		return true;
281 
282 	return false;
283 }
284 
285 void __xe_bo_release_dummy(struct kref *kref);
286 
287 /**
288  * xe_bo_put_deferred() - Put a buffer object with delayed final freeing
289  * @bo: The bo to put.
290  * @deferred: List to which to add the buffer object if we cannot put, or
291  * NULL if the function is to put unconditionally.
292  *
293  * Since the final freeing of an object includes both sleeping and (!)
294  * memory allocation in the dma_resv individualization, it's not ok
295  * to put an object from atomic context nor from within a held lock
296  * tainted by reclaim. In such situations we want to defer the final
297  * freeing until we've exited the restricting context, or in the worst
298  * case to a workqueue.
299  * This function either puts the object if possible without the refcount
300  * reaching zero, or adds it to the @deferred list if that was not possible.
301  * The caller needs to follow up with a call to xe_bo_put_commit() to actually
302  * put the bo iff this function returns true. It's safe to always
303  * follow up with a call to xe_bo_put_commit().
304  * TODO: It's TTM that is the villain here. Perhaps TTM should add an
305  * interface like this.
306  *
307  * Return: true if @bo was the first object put on the @freed list,
308  * false otherwise.
309  */
310 static inline bool
311 xe_bo_put_deferred(struct xe_bo *bo, struct llist_head *deferred)
312 {
313 	if (!deferred) {
314 		xe_bo_put(bo);
315 		return false;
316 	}
317 
318 	if (!kref_put(&bo->ttm.base.refcount, __xe_bo_release_dummy))
319 		return false;
320 
321 	return llist_add(&bo->freed, deferred);
322 }
323 
324 void xe_bo_put_commit(struct llist_head *deferred);
325 
326 struct sg_table *xe_bo_sg(struct xe_bo *bo);
327 
328 /*
329  * xe_sg_segment_size() - Provides upper limit for sg segment size.
330  * @dev: device pointer
331  *
332  * Returns the maximum segment size for the 'struct scatterlist'
333  * elements.
334  */
335 static inline unsigned int xe_sg_segment_size(struct device *dev)
336 {
337 	struct scatterlist __maybe_unused sg;
338 	size_t max = BIT_ULL(sizeof(sg.length) * 8) - 1;
339 
340 	max = min_t(size_t, max, dma_max_mapping_size(dev));
341 
342 	/*
343 	 * The iommu_dma_map_sg() function ensures iova allocation doesn't
344 	 * cross dma segment boundary. It does so by padding some sg elements.
345 	 * This can cause overflow, ending up with sg->length being set to 0.
346 	 * Avoid this by ensuring maximum segment size is half of 'max'
347 	 * rounded down to PAGE_SIZE.
348 	 */
349 	return round_down(max / 2, PAGE_SIZE);
350 }
351 
352 #if IS_ENABLED(CONFIG_DRM_XE_KUNIT_TEST)
353 /**
354  * xe_bo_is_mem_type - Whether the bo currently resides in the given
355  * TTM memory type
356  * @bo: The bo to check.
357  * @mem_type: The TTM memory type.
358  *
359  * Return: true iff the bo resides in @mem_type, false otherwise.
360  */
361 static inline bool xe_bo_is_mem_type(struct xe_bo *bo, u32 mem_type)
362 {
363 	xe_bo_assert_held(bo);
364 	return bo->ttm.resource->mem_type == mem_type;
365 }
366 #endif
367 #endif
368