msm_gem.c 34 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464
  1. /*
  2. * Copyright (c) 2021 Qualcomm Innovation Center, Inc. All rights reserved.
  3. * Copyright (c) 2018-2021, The Linux Foundation. All rights reserved.
  4. * Copyright (C) 2013 Red Hat
  5. * Author: Rob Clark <[email protected]>
  6. *
  7. * This program is free software; you can redistribute it and/or modify it
  8. * under the terms of the GNU General Public License version 2 as published by
  9. * the Free Software Foundation.
  10. *
  11. * This program is distributed in the hope that it will be useful, but WITHOUT
  12. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  13. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  14. * more details.
  15. *
  16. * You should have received a copy of the GNU General Public License along with
  17. * this program. If not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #include <linux/qcom-dma-mapping.h>
  20. #include <linux/spinlock.h>
  21. #include <linux/shmem_fs.h>
  22. #include <linux/dma-buf.h>
  23. #include <linux/pfn_t.h>
  24. #include <linux/ion.h>
  25. #include "msm_drv.h"
  26. #include "msm_gem.h"
  27. #include "msm_mmu.h"
  28. #include "sde_dbg.h"
  29. #define GUARD_BYTES (BIT(8) - 1)
  30. #define ALIGNED_OFFSET (U32_MAX & ~(GUARD_BYTES))
  31. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  32. static dma_addr_t physaddr(struct drm_gem_object *obj)
  33. {
  34. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  35. struct msm_drm_private *priv = obj->dev->dev_private;
  36. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  37. priv->vram.paddr;
  38. }
  39. static bool use_pages(struct drm_gem_object *obj)
  40. {
  41. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  42. return !msm_obj->vram_node;
  43. }
  44. /* allocate pages from VRAM carveout, used when no IOMMU: */
  45. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  46. {
  47. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  48. struct msm_drm_private *priv = obj->dev->dev_private;
  49. dma_addr_t paddr;
  50. struct page **p;
  51. int ret, i;
  52. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  53. if (!p)
  54. return ERR_PTR(-ENOMEM);
  55. spin_lock(&priv->vram.lock);
  56. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  57. spin_unlock(&priv->vram.lock);
  58. if (ret) {
  59. kvfree(p);
  60. return ERR_PTR(ret);
  61. }
  62. paddr = physaddr(obj);
  63. for (i = 0; i < npages; i++) {
  64. p[i] = phys_to_page(paddr);
  65. paddr += PAGE_SIZE;
  66. }
  67. return p;
  68. }
  69. static struct page **get_pages(struct drm_gem_object *obj)
  70. {
  71. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  72. struct device *aspace_dev;
  73. if (obj->import_attach)
  74. return msm_obj->pages;
  75. if (!msm_obj->pages) {
  76. struct drm_device *dev = obj->dev;
  77. struct page **p;
  78. int npages = obj->size >> PAGE_SHIFT;
  79. if (use_pages(obj))
  80. p = drm_gem_get_pages(obj);
  81. else
  82. p = get_pages_vram(obj, npages);
  83. if (IS_ERR(p)) {
  84. dev_err(dev->dev, "could not get pages: %ld\n",
  85. PTR_ERR(p));
  86. return p;
  87. }
  88. msm_obj->pages = p;
  89. msm_obj->sgt = drm_prime_pages_to_sg(dev, p, npages);
  90. if (IS_ERR(msm_obj->sgt)) {
  91. void *ptr = ERR_CAST(msm_obj->sgt);
  92. dev_err(dev->dev, "failed to allocate sgt\n");
  93. msm_obj->sgt = NULL;
  94. return ptr;
  95. }
  96. if (msm_obj->vram_node) {
  97. goto end;
  98. /*
  99. * For non-cached buffers, ensure the new pages are clean
  100. * because display controller, GPU, etc. are not coherent
  101. */
  102. } else if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED)) {
  103. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  104. if (aspace_dev) {
  105. dma_map_sg(aspace_dev, msm_obj->sgt->sgl,
  106. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  107. /* mark the buffer as external buffer */
  108. msm_obj->flags |= MSM_BO_EXTBUF;
  109. } else {
  110. DRM_ERROR("failed to get aspace_device\n");
  111. }
  112. }
  113. }
  114. end:
  115. return msm_obj->pages;
  116. }
  117. static void put_pages_vram(struct drm_gem_object *obj)
  118. {
  119. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  120. struct msm_drm_private *priv = obj->dev->dev_private;
  121. spin_lock(&priv->vram.lock);
  122. drm_mm_remove_node(msm_obj->vram_node);
  123. spin_unlock(&priv->vram.lock);
  124. kvfree(msm_obj->pages);
  125. }
  126. static void put_pages(struct drm_gem_object *obj)
  127. {
  128. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  129. if (msm_obj->pages) {
  130. if (msm_obj->sgt) {
  131. sg_free_table(msm_obj->sgt);
  132. kfree(msm_obj->sgt);
  133. }
  134. if (use_pages(obj))
  135. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  136. else
  137. put_pages_vram(obj);
  138. msm_obj->pages = NULL;
  139. }
  140. }
  141. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  142. {
  143. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  144. struct page **p;
  145. mutex_lock(&msm_obj->lock);
  146. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  147. mutex_unlock(&msm_obj->lock);
  148. return ERR_PTR(-EBUSY);
  149. }
  150. p = get_pages(obj);
  151. mutex_unlock(&msm_obj->lock);
  152. return p;
  153. }
  154. void msm_gem_put_pages(struct drm_gem_object *obj)
  155. {
  156. /* when we start tracking the pin count, then do something here */
  157. }
  158. void msm_gem_sync(struct drm_gem_object *obj)
  159. {
  160. struct msm_gem_object *msm_obj;
  161. struct device *aspace_dev;
  162. if (!obj)
  163. return;
  164. msm_obj = to_msm_bo(obj);
  165. if (msm_obj->vram_node)
  166. return;
  167. /*
  168. * dma_sync_sg_for_device synchronises a single contiguous or
  169. * scatter/gather mapping for the CPU and device.
  170. */
  171. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  172. if (aspace_dev)
  173. dma_sync_sg_for_device(aspace_dev, msm_obj->sgt->sgl,
  174. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  175. else
  176. DRM_ERROR("failed to get aspace_device\n");
  177. }
  178. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  179. struct vm_area_struct *vma)
  180. {
  181. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  182. vma->vm_flags &= ~VM_PFNMAP;
  183. vma->vm_flags |= VM_MIXEDMAP;
  184. if (msm_obj->flags & MSM_BO_WC) {
  185. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  186. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  187. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  188. } else {
  189. /*
  190. * Shunt off cached objs to shmem file so they have their own
  191. * address_space (so unmap_mapping_range does what we want,
  192. * in particular in the case of mmap'd dmabufs)
  193. */
  194. fput(vma->vm_file);
  195. get_file(obj->filp);
  196. vma->vm_pgoff = 0;
  197. vma->vm_file = obj->filp;
  198. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  199. }
  200. return 0;
  201. }
  202. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  203. {
  204. int ret;
  205. ret = drm_gem_mmap(filp, vma);
  206. if (ret) {
  207. DBG("mmap failed: %d", ret);
  208. return ret;
  209. }
  210. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  211. }
  212. vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  213. {
  214. struct vm_area_struct *vma = vmf->vma;
  215. struct drm_gem_object *obj = vma->vm_private_data;
  216. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  217. struct page **pages;
  218. unsigned long pfn;
  219. pgoff_t pgoff;
  220. int err;
  221. vm_fault_t ret;
  222. /*
  223. * vm_ops.open/drm_gem_mmap_obj and close get and put
  224. * a reference on obj. So, we dont need to hold one here.
  225. */
  226. err = mutex_lock_interruptible(&msm_obj->lock);
  227. if (err) {
  228. ret = VM_FAULT_NOPAGE;
  229. goto out;
  230. }
  231. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  232. mutex_unlock(&msm_obj->lock);
  233. return VM_FAULT_SIGBUS;
  234. }
  235. /* make sure we have pages attached now */
  236. pages = get_pages(obj);
  237. if (IS_ERR(pages)) {
  238. ret = vmf_error(PTR_ERR(pages));
  239. goto out_unlock;
  240. }
  241. /* We don't use vmf->pgoff since that has the fake offset: */
  242. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  243. pfn = page_to_pfn(pages[pgoff]);
  244. VERB("Inserting %pK pfn %lx, pa %lx", (void *)vmf->address,
  245. pfn, pfn << PAGE_SHIFT);
  246. ret = vmf_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  247. out_unlock:
  248. mutex_unlock(&msm_obj->lock);
  249. out:
  250. return ret;
  251. }
  252. /** get mmap offset */
  253. static uint64_t mmap_offset(struct drm_gem_object *obj)
  254. {
  255. struct drm_device *dev = obj->dev;
  256. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  257. int ret;
  258. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  259. /* Make it mmapable */
  260. ret = drm_gem_create_mmap_offset(obj);
  261. if (ret) {
  262. dev_err(dev->dev, "could not allocate mmap offset\n");
  263. return 0;
  264. }
  265. return drm_vma_node_offset_addr(&obj->vma_node);
  266. }
  267. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  268. {
  269. uint64_t offset;
  270. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  271. mutex_lock(&msm_obj->lock);
  272. offset = mmap_offset(obj);
  273. mutex_unlock(&msm_obj->lock);
  274. return offset;
  275. }
  276. dma_addr_t msm_gem_get_dma_addr(struct drm_gem_object *obj)
  277. {
  278. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  279. struct sg_table *sgt;
  280. if (!msm_obj->sgt) {
  281. sgt = dma_buf_map_attachment(obj->import_attach,
  282. DMA_BIDIRECTIONAL);
  283. if (IS_ERR_OR_NULL(sgt)) {
  284. DRM_ERROR("dma_buf_map_attachment failure, err=%ld\n",
  285. PTR_ERR(sgt));
  286. return 0;
  287. }
  288. msm_obj->sgt = sgt;
  289. }
  290. return sg_phys(msm_obj->sgt->sgl);
  291. }
  292. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  293. struct msm_gem_address_space *aspace)
  294. {
  295. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  296. struct msm_gem_vma *vma;
  297. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  298. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  299. if (!vma)
  300. return ERR_PTR(-ENOMEM);
  301. vma->aspace = aspace;
  302. msm_obj->aspace = aspace;
  303. list_add_tail(&vma->list, &msm_obj->vmas);
  304. return vma;
  305. }
  306. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  307. struct msm_gem_address_space *aspace)
  308. {
  309. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  310. struct msm_gem_vma *vma;
  311. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  312. list_for_each_entry(vma, &msm_obj->vmas, list) {
  313. if (vma->aspace == aspace)
  314. return vma;
  315. }
  316. return NULL;
  317. }
  318. static void del_vma(struct msm_gem_vma *vma)
  319. {
  320. if (!vma)
  321. return;
  322. list_del(&vma->list);
  323. kfree(vma);
  324. }
  325. /* Called with msm_obj->lock locked */
  326. static void
  327. put_iova(struct drm_gem_object *obj)
  328. {
  329. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  330. struct msm_gem_vma *vma, *tmp;
  331. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  332. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  333. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  334. msm_obj->flags);
  335. /*
  336. * put_iova removes the domain connected to the obj which makes
  337. * the aspace inaccessible. Store the aspace, as it is used to
  338. * update the active_list during gem_free_obj and gem_purge.
  339. */
  340. msm_obj->aspace = vma->aspace;
  341. del_vma(vma);
  342. }
  343. }
  344. /* get iova, taking a reference. Should have a matching put */
  345. static int msm_gem_get_iova_locked(struct drm_gem_object *obj,
  346. struct msm_gem_address_space *aspace, uint64_t *iova)
  347. {
  348. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  349. struct msm_gem_vma *vma;
  350. int ret = 0;
  351. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  352. vma = lookup_vma(obj, aspace);
  353. if (!vma) {
  354. struct page **pages;
  355. struct device *dev;
  356. struct dma_buf *dmabuf;
  357. bool reattach = false;
  358. unsigned long dma_map_attrs;
  359. dev = msm_gem_get_aspace_device(aspace);
  360. if ((dev && obj->import_attach) &&
  361. ((dev != obj->import_attach->dev) ||
  362. msm_obj->obj_dirty)) {
  363. dmabuf = obj->import_attach->dmabuf;
  364. dma_map_attrs = obj->import_attach->dma_map_attrs;
  365. DRM_DEBUG("detach nsec-dev:%pK attach sec-dev:%pK\n",
  366. obj->import_attach->dev, dev);
  367. SDE_EVT32(obj->import_attach->dev, dev, msm_obj->sgt,
  368. msm_obj->obj_dirty);
  369. if (msm_obj->sgt)
  370. dma_buf_unmap_attachment(obj->import_attach,
  371. msm_obj->sgt, DMA_BIDIRECTIONAL);
  372. dma_buf_detach(dmabuf, obj->import_attach);
  373. obj->import_attach = dma_buf_attach(dmabuf, dev);
  374. if (IS_ERR(obj->import_attach)) {
  375. DRM_ERROR("dma_buf_attach failure, err=%ld\n",
  376. PTR_ERR(obj->import_attach));
  377. ret = PTR_ERR(obj->import_attach);
  378. return ret;
  379. }
  380. /*
  381. * obj->import_attach is created as part of dma_buf_attach.
  382. * Re-apply the dma_map_attr in this case to be in sync
  383. * with iommu_map attrs during map_attachment callback.
  384. */
  385. obj->import_attach->dma_map_attrs |= dma_map_attrs;
  386. msm_obj->obj_dirty = false;
  387. reattach = true;
  388. }
  389. /* perform delayed import for buffers without existing sgt */
  390. if (((msm_obj->flags & MSM_BO_EXTBUF) && !(msm_obj->sgt))
  391. || reattach) {
  392. ret = msm_gem_delayed_import(obj);
  393. if (ret) {
  394. DRM_ERROR("delayed dma-buf import failed %d\n",
  395. ret);
  396. msm_obj->obj_dirty = true;
  397. return ret;
  398. }
  399. }
  400. vma = add_vma(obj, aspace);
  401. if (IS_ERR(vma)) {
  402. ret = PTR_ERR(vma);
  403. return ret;
  404. }
  405. pages = get_pages(obj);
  406. if (IS_ERR(pages)) {
  407. ret = PTR_ERR(pages);
  408. goto fail;
  409. }
  410. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  411. obj->size >> PAGE_SHIFT,
  412. msm_obj->flags);
  413. if (ret)
  414. goto fail;
  415. }
  416. *iova = vma->iova;
  417. if (aspace && !msm_obj->in_active_list) {
  418. mutex_lock(&aspace->list_lock);
  419. msm_gem_add_obj_to_aspace_active_list(aspace, obj);
  420. mutex_unlock(&aspace->list_lock);
  421. }
  422. return 0;
  423. fail:
  424. del_vma(vma);
  425. return ret;
  426. }
  427. static int msm_gem_pin_iova(struct drm_gem_object *obj,
  428. struct msm_gem_address_space *aspace)
  429. {
  430. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  431. struct msm_gem_vma *vma;
  432. struct page **pages;
  433. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  434. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED))
  435. return -EBUSY;
  436. vma = lookup_vma(obj, aspace);
  437. if (WARN_ON(!vma))
  438. return -EINVAL;
  439. pages = get_pages(obj);
  440. if (IS_ERR(pages))
  441. return PTR_ERR(pages);
  442. return msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  443. obj->size >> PAGE_SHIFT, msm_obj->flags);
  444. }
  445. /* get iova and pin it. Should have a matching put */
  446. int msm_gem_get_and_pin_iova(struct drm_gem_object *obj,
  447. struct msm_gem_address_space *aspace, uint64_t *iova)
  448. {
  449. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  450. u64 local;
  451. int ret;
  452. mutex_lock(&msm_obj->lock);
  453. ret = msm_gem_get_iova_locked(obj, aspace, &local);
  454. if (!ret)
  455. ret = msm_gem_pin_iova(obj, aspace);
  456. if (!ret)
  457. *iova = local;
  458. mutex_unlock(&msm_obj->lock);
  459. return ret;
  460. }
  461. int msm_gem_get_iova(struct drm_gem_object *obj,
  462. struct msm_gem_address_space *aspace, uint64_t *iova)
  463. {
  464. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  465. int ret;
  466. mutex_lock(&msm_obj->lock);
  467. ret = msm_gem_get_iova_locked(obj, aspace, iova);
  468. mutex_unlock(&msm_obj->lock);
  469. return ret;
  470. }
  471. /* get iova without taking a reference, used in places where you have
  472. * already done a 'msm_gem_get_iova()'.
  473. */
  474. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  475. struct msm_gem_address_space *aspace)
  476. {
  477. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  478. struct msm_gem_vma *vma;
  479. mutex_lock(&msm_obj->lock);
  480. vma = lookup_vma(obj, aspace);
  481. mutex_unlock(&msm_obj->lock);
  482. WARN_ON(!vma);
  483. return vma ? vma->iova : 0;
  484. }
  485. /*
  486. * Unpin a iova by updating the reference counts. The memory isn't actually
  487. * purged until something else (shrinker, mm_notifier, destroy, etc) decides
  488. * to get rid of it
  489. */
  490. void msm_gem_unpin_iova(struct drm_gem_object *obj,
  491. struct msm_gem_address_space *aspace)
  492. {
  493. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  494. struct msm_gem_vma *vma;
  495. mutex_lock(&msm_obj->lock);
  496. vma = lookup_vma(obj, aspace);
  497. if (!WARN_ON(!vma))
  498. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  499. msm_obj->flags);
  500. mutex_unlock(&msm_obj->lock);
  501. }
  502. void msm_gem_put_iova(struct drm_gem_object *obj,
  503. struct msm_gem_address_space *aspace)
  504. {
  505. // XXX TODO ..
  506. // NOTE: probably don't need a _locked() version.. we wouldn't
  507. // normally unmap here, but instead just mark that it could be
  508. // unmapped (if the iova refcnt drops to zero), but then later
  509. // if another _get_iova_locked() fails we can start unmapping
  510. // things that are no longer needed..
  511. }
  512. void msm_gem_aspace_domain_attach_detach_update(
  513. struct msm_gem_address_space *aspace,
  514. bool is_detach)
  515. {
  516. struct msm_gem_object *msm_obj;
  517. struct drm_gem_object *obj;
  518. struct aspace_client *aclient;
  519. int ret;
  520. uint64_t iova;
  521. if (!aspace)
  522. return;
  523. mutex_lock(&aspace->list_lock);
  524. if (is_detach) {
  525. /* Indicate to clients domain is getting detached */
  526. list_for_each_entry(aclient, &aspace->clients, list) {
  527. if (aclient->cb)
  528. aclient->cb(aclient->cb_data,
  529. is_detach);
  530. }
  531. /**
  532. * Unmap active buffers,
  533. * typically clients should do this when the callback is called,
  534. * but this needs to be done for the buffers which are not
  535. * attached to any planes.
  536. */
  537. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  538. obj = &msm_obj->base;
  539. if (obj->import_attach) {
  540. mutex_lock(&msm_obj->lock);
  541. put_iova(obj);
  542. msm_obj->obj_dirty = true;
  543. mutex_unlock(&msm_obj->lock);
  544. }
  545. }
  546. } else {
  547. /* map active buffers */
  548. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  549. obj = &msm_obj->base;
  550. ret = msm_gem_get_iova(obj, aspace, &iova);
  551. if (ret) {
  552. mutex_unlock(&aspace->list_lock);
  553. return;
  554. }
  555. }
  556. /* Indicate to clients domain is attached */
  557. list_for_each_entry(aclient, &aspace->clients, list) {
  558. if (aclient->cb)
  559. aclient->cb(aclient->cb_data,
  560. is_detach);
  561. }
  562. }
  563. mutex_unlock(&aspace->list_lock);
  564. }
  565. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  566. struct drm_mode_create_dumb *args)
  567. {
  568. args->pitch = align_pitch(args->width, args->bpp);
  569. args->size = PAGE_ALIGN(args->pitch * args->height);
  570. return msm_gem_new_handle(dev, file, args->size,
  571. MSM_BO_SCANOUT | MSM_BO_CACHED, &args->handle, "dumb");
  572. }
  573. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  574. uint32_t handle, uint64_t *offset)
  575. {
  576. struct drm_gem_object *obj;
  577. int ret = 0;
  578. /* GEM does all our handle to object mapping */
  579. obj = drm_gem_object_lookup(file, handle);
  580. if (obj == NULL) {
  581. ret = -ENOENT;
  582. goto fail;
  583. }
  584. *offset = msm_gem_mmap_offset(obj);
  585. drm_gem_object_put(obj);
  586. fail:
  587. return ret;
  588. }
  589. static void *get_vaddr(struct drm_gem_object *obj, unsigned madv)
  590. {
  591. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  592. int ret = 0;
  593. mutex_lock(&msm_obj->lock);
  594. if (WARN_ON(msm_obj->madv > madv)) {
  595. dev_err(obj->dev->dev, "Invalid madv state: %u vs %u\n",
  596. msm_obj->madv, madv);
  597. mutex_unlock(&msm_obj->lock);
  598. return ERR_PTR(-EBUSY);
  599. }
  600. /* increment vmap_count *before* vmap() call, so shrinker can
  601. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  602. * This guarantees that we won't try to msm_gem_vunmap() this
  603. * same object from within the vmap() call (while we already
  604. * hold msm_obj->lock)
  605. */
  606. msm_obj->vmap_count++;
  607. if (!msm_obj->vaddr) {
  608. struct page **pages = get_pages(obj);
  609. if (IS_ERR(pages)) {
  610. ret = PTR_ERR(pages);
  611. goto fail;
  612. }
  613. if (obj->import_attach) {
  614. if (obj->dev && obj->dev->dev && !dev_is_dma_coherent(obj->dev->dev)) {
  615. ret = dma_buf_begin_cpu_access(
  616. obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  617. if (ret)
  618. goto fail;
  619. }
  620. msm_obj->vaddr =
  621. dma_buf_vmap(obj->import_attach->dmabuf);
  622. } else {
  623. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  624. VM_MAP, PAGE_KERNEL);
  625. }
  626. if (msm_obj->vaddr == NULL) {
  627. ret = -ENOMEM;
  628. goto fail;
  629. }
  630. }
  631. mutex_unlock(&msm_obj->lock);
  632. return msm_obj->vaddr;
  633. fail:
  634. msm_obj->vmap_count--;
  635. mutex_unlock(&msm_obj->lock);
  636. return ERR_PTR(ret);
  637. }
  638. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  639. {
  640. return get_vaddr(obj, MSM_MADV_WILLNEED);
  641. }
  642. /*
  643. * Don't use this! It is for the very special case of dumping
  644. * submits from GPU hangs or faults, were the bo may already
  645. * be MSM_MADV_DONTNEED, but we know the buffer is still on the
  646. * active list.
  647. */
  648. void *msm_gem_get_vaddr_active(struct drm_gem_object *obj)
  649. {
  650. return get_vaddr(obj, __MSM_MADV_PURGED);
  651. }
  652. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  653. {
  654. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  655. mutex_lock(&msm_obj->lock);
  656. WARN_ON(msm_obj->vmap_count < 1);
  657. msm_obj->vmap_count--;
  658. mutex_unlock(&msm_obj->lock);
  659. }
  660. /* Update madvise status, returns true if not purged, else
  661. * false or -errno.
  662. */
  663. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  664. {
  665. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  666. mutex_lock(&msm_obj->lock);
  667. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  668. if (msm_obj->madv != __MSM_MADV_PURGED)
  669. msm_obj->madv = madv;
  670. madv = msm_obj->madv;
  671. mutex_unlock(&msm_obj->lock);
  672. return (madv != __MSM_MADV_PURGED);
  673. }
  674. void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  675. {
  676. struct drm_device *dev = obj->dev;
  677. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  678. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  679. WARN_ON(!is_purgeable(msm_obj));
  680. WARN_ON(obj->import_attach);
  681. mutex_lock_nested(&msm_obj->lock, subclass);
  682. put_iova(obj);
  683. if (msm_obj->aspace) {
  684. mutex_lock(&msm_obj->aspace->list_lock);
  685. msm_gem_remove_obj_from_aspace_active_list(msm_obj->aspace,
  686. obj);
  687. mutex_unlock(&msm_obj->aspace->list_lock);
  688. }
  689. msm_gem_vunmap_locked(obj);
  690. put_pages(obj);
  691. msm_obj->madv = __MSM_MADV_PURGED;
  692. drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
  693. drm_gem_free_mmap_offset(obj);
  694. /* Our goal here is to return as much of the memory as
  695. * is possible back to the system as we are called from OOM.
  696. * To do this we must instruct the shmfs to drop all of its
  697. * backing pages, *now*.
  698. */
  699. shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
  700. invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
  701. 0, (loff_t)-1);
  702. mutex_unlock(&msm_obj->lock);
  703. }
  704. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  705. {
  706. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  707. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  708. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  709. return;
  710. if (obj->import_attach) {
  711. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  712. if (obj->dev && obj->dev->dev && !dev_is_dma_coherent(obj->dev->dev))
  713. dma_buf_end_cpu_access(obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  714. } else {
  715. vunmap(msm_obj->vaddr);
  716. }
  717. msm_obj->vaddr = NULL;
  718. }
  719. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  720. {
  721. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  722. mutex_lock_nested(&msm_obj->lock, subclass);
  723. msm_gem_vunmap_locked(obj);
  724. mutex_unlock(&msm_obj->lock);
  725. }
  726. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  727. {
  728. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  729. bool write = !!(op & MSM_PREP_WRITE);
  730. unsigned long remain =
  731. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  732. long ret;
  733. ret = dma_resv_wait_timeout_rcu(msm_obj->resv, write,
  734. true, remain);
  735. if (ret == 0)
  736. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  737. else if (ret < 0)
  738. return ret;
  739. /* TODO cache maintenance */
  740. return 0;
  741. }
  742. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  743. {
  744. /* TODO cache maintenance */
  745. return 0;
  746. }
  747. #ifdef CONFIG_DEBUG_FS
  748. static void describe_fence(struct dma_fence *fence, const char *type,
  749. struct seq_file *m)
  750. {
  751. if (!dma_fence_is_signaled(fence))
  752. seq_printf(m, "\t%9s: %s %s seq %llu\n", type,
  753. fence->ops->get_driver_name(fence),
  754. fence->ops->get_timeline_name(fence),
  755. fence->seqno);
  756. }
  757. void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
  758. {
  759. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  760. struct dma_resv *robj = msm_obj->resv;
  761. struct dma_resv_list *fobj;
  762. struct dma_fence *fence;
  763. struct msm_gem_vma *vma;
  764. uint64_t off = drm_vma_node_start(&obj->vma_node);
  765. const char *madv;
  766. mutex_lock(&msm_obj->lock);
  767. switch (msm_obj->madv) {
  768. case __MSM_MADV_PURGED:
  769. madv = " purged";
  770. break;
  771. case MSM_MADV_DONTNEED:
  772. madv = " purgeable";
  773. break;
  774. case MSM_MADV_WILLNEED:
  775. default:
  776. madv = "";
  777. break;
  778. }
  779. seq_printf(m, "%08x: %c %2d (%2d) %08llx %pK\t",
  780. msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
  781. obj->name, kref_read(&obj->refcount),
  782. off, msm_obj->vaddr);
  783. seq_printf(m, " %08zu %9s %-32s\n", obj->size, madv, msm_obj->name);
  784. if (!list_empty(&msm_obj->vmas)) {
  785. seq_puts(m, " vmas:");
  786. list_for_each_entry(vma, &msm_obj->vmas, list)
  787. seq_printf(m, " [%s: %08llx,%s,inuse=%d]", vma->aspace->name,
  788. vma->iova, vma->mapped ? "mapped" : "unmapped",
  789. vma->inuse);
  790. seq_puts(m, "\n");
  791. }
  792. rcu_read_lock();
  793. fobj = rcu_dereference(robj->fence);
  794. if (fobj) {
  795. unsigned int i, shared_count = fobj->shared_count;
  796. for (i = 0; i < shared_count; i++) {
  797. fence = rcu_dereference(fobj->shared[i]);
  798. describe_fence(fence, "Shared", m);
  799. }
  800. }
  801. fence = rcu_dereference(robj->fence_excl);
  802. if (fence)
  803. describe_fence(fence, "Exclusive", m);
  804. rcu_read_unlock();
  805. mutex_unlock(&msm_obj->lock);
  806. }
  807. void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
  808. {
  809. struct msm_gem_object *msm_obj;
  810. int count = 0;
  811. size_t size = 0;
  812. seq_puts(m, " flags id ref offset kaddr size madv name\n");
  813. list_for_each_entry(msm_obj, list, mm_list) {
  814. struct drm_gem_object *obj = &msm_obj->base;
  815. seq_puts(m, " ");
  816. msm_gem_describe(obj, m);
  817. count++;
  818. size += obj->size;
  819. }
  820. seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
  821. }
  822. #endif
  823. /* don't call directly! Use drm_gem_object_put() and friends */
  824. void msm_gem_free_object(struct drm_gem_object *obj)
  825. {
  826. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  827. struct drm_device *dev = obj->dev;
  828. struct msm_drm_private *priv = dev->dev_private;
  829. /* object should not be on active list: */
  830. WARN_ON(is_active(msm_obj));
  831. mutex_lock(&priv->mm_lock);
  832. list_del(&msm_obj->mm_list);
  833. mutex_unlock(&priv->mm_lock);
  834. mutex_lock(&msm_obj->lock);
  835. put_iova(obj);
  836. if (msm_obj->aspace) {
  837. mutex_lock(&msm_obj->aspace->list_lock);
  838. msm_gem_remove_obj_from_aspace_active_list(msm_obj->aspace,
  839. obj);
  840. mutex_unlock(&msm_obj->aspace->list_lock);
  841. }
  842. if (obj->import_attach) {
  843. if (msm_obj->vaddr)
  844. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  845. /* Don't drop the pages for imported dmabuf, as they are not
  846. * ours, just free the array we allocated:
  847. */
  848. if (msm_obj->pages)
  849. kvfree(msm_obj->pages);
  850. drm_prime_gem_destroy(obj, msm_obj->sgt);
  851. } else {
  852. msm_gem_vunmap_locked(obj);
  853. put_pages(obj);
  854. }
  855. if (msm_obj->resv == &msm_obj->_resv)
  856. dma_resv_fini(msm_obj->resv);
  857. drm_gem_object_release(obj);
  858. mutex_unlock(&msm_obj->lock);
  859. kfree(msm_obj);
  860. }
  861. /* convenience method to construct a GEM buffer object, and userspace handle */
  862. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  863. uint32_t size, uint32_t flags, uint32_t *handle,
  864. char *name)
  865. {
  866. struct drm_gem_object *obj;
  867. int ret;
  868. obj = msm_gem_new(dev, size, flags);
  869. if (IS_ERR(obj))
  870. return PTR_ERR(obj);
  871. if (name)
  872. msm_gem_object_set_name(obj, "%s", name);
  873. ret = drm_gem_handle_create(file, obj, handle);
  874. /* drop reference from allocate - handle holds it now */
  875. drm_gem_object_put(obj);
  876. return ret;
  877. }
  878. static int msm_gem_new_impl(struct drm_device *dev,
  879. uint32_t size, uint32_t flags,
  880. struct dma_resv *resv,
  881. struct drm_gem_object **obj,
  882. bool struct_mutex_locked)
  883. {
  884. struct msm_drm_private *priv = dev->dev_private;
  885. struct msm_gem_object *msm_obj;
  886. switch (flags & MSM_BO_CACHE_MASK) {
  887. case MSM_BO_UNCACHED:
  888. case MSM_BO_CACHED:
  889. case MSM_BO_WC:
  890. break;
  891. default:
  892. dev_err(dev->dev, "invalid cache flag: %x\n",
  893. (flags & MSM_BO_CACHE_MASK));
  894. return -EINVAL;
  895. }
  896. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  897. if (!msm_obj)
  898. return -ENOMEM;
  899. mutex_init(&msm_obj->lock);
  900. msm_obj->flags = flags;
  901. msm_obj->madv = MSM_MADV_WILLNEED;
  902. if (resv) {
  903. msm_obj->resv = resv;
  904. } else {
  905. msm_obj->resv = &msm_obj->_resv;
  906. dma_resv_init(msm_obj->resv);
  907. }
  908. INIT_LIST_HEAD(&msm_obj->submit_entry);
  909. INIT_LIST_HEAD(&msm_obj->vmas);
  910. INIT_LIST_HEAD(&msm_obj->iova_list);
  911. msm_obj->aspace = msm_gem_smmu_address_space_get(dev,
  912. MSM_SMMU_DOMAIN_UNSECURE);
  913. if (IS_ERR(msm_obj->aspace))
  914. msm_obj->aspace = NULL;
  915. msm_obj->in_active_list = false;
  916. msm_obj->obj_dirty = false;
  917. mutex_lock(&priv->mm_lock);
  918. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  919. mutex_unlock(&priv->mm_lock);
  920. *obj = &msm_obj->base;
  921. return 0;
  922. }
  923. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  924. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  925. {
  926. struct msm_drm_private *priv = dev->dev_private;
  927. struct drm_gem_object *obj = NULL;
  928. bool use_vram = false;
  929. int ret;
  930. size = PAGE_ALIGN(size);
  931. if (!iommu_present(&platform_bus_type))
  932. use_vram = true;
  933. else if ((flags & (MSM_BO_STOLEN | MSM_BO_SCANOUT)) && priv->vram.size)
  934. use_vram = true;
  935. if (WARN_ON(use_vram && !priv->vram.size))
  936. return ERR_PTR(-EINVAL);
  937. /* Disallow zero sized objects as they make the underlying
  938. * infrastructure grumpy
  939. */
  940. if (size == 0)
  941. return ERR_PTR(-EINVAL);
  942. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  943. if (ret)
  944. goto fail;
  945. if (use_vram) {
  946. struct msm_gem_vma *vma;
  947. struct page **pages;
  948. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  949. mutex_lock(&msm_obj->lock);
  950. vma = add_vma(obj, NULL);
  951. mutex_unlock(&msm_obj->lock);
  952. if (IS_ERR(vma)) {
  953. ret = PTR_ERR(vma);
  954. goto fail;
  955. }
  956. to_msm_bo(obj)->vram_node = &vma->node;
  957. drm_gem_private_object_init(dev, obj, size);
  958. pages = get_pages(obj);
  959. if (IS_ERR(pages)) {
  960. ret = PTR_ERR(pages);
  961. goto fail;
  962. }
  963. vma->iova = physaddr(obj);
  964. } else {
  965. ret = drm_gem_object_init(dev, obj, size);
  966. if (ret)
  967. goto fail;
  968. }
  969. return obj;
  970. fail:
  971. drm_gem_object_put(obj);
  972. return ERR_PTR(ret);
  973. }
  974. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  975. uint32_t size, uint32_t flags)
  976. {
  977. return _msm_gem_new(dev, size, flags, true);
  978. }
  979. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  980. uint32_t size, uint32_t flags)
  981. {
  982. return _msm_gem_new(dev, size, flags, false);
  983. }
  984. int msm_gem_delayed_import(struct drm_gem_object *obj)
  985. {
  986. struct dma_buf_attachment *attach;
  987. struct sg_table *sgt;
  988. struct msm_gem_object *msm_obj;
  989. int ret = 0;
  990. if (!obj) {
  991. DRM_ERROR("NULL drm gem object\n");
  992. return -EINVAL;
  993. }
  994. msm_obj = to_msm_bo(obj);
  995. if (!obj->import_attach) {
  996. DRM_ERROR("NULL dma_buf_attachment in drm gem object\n");
  997. return -EINVAL;
  998. }
  999. attach = obj->import_attach;
  1000. attach->dma_map_attrs |= DMA_ATTR_DELAYED_UNMAP;
  1001. if (msm_obj->flags & MSM_BO_SKIPSYNC)
  1002. attach->dma_map_attrs |= DMA_ATTR_SKIP_CPU_SYNC;
  1003. /*
  1004. * dma_buf_map_attachment will call dma_map_sg for ion buffer
  1005. * mapping, and iova will get mapped when the function returns.
  1006. */
  1007. sgt = dma_buf_map_attachment(attach, DMA_BIDIRECTIONAL);
  1008. if (IS_ERR(sgt)) {
  1009. ret = PTR_ERR(sgt);
  1010. DRM_ERROR("dma_buf_map_attachment failure, err=%d\n",
  1011. ret);
  1012. goto fail_import;
  1013. }
  1014. msm_obj->sgt = sgt;
  1015. msm_obj->pages = NULL;
  1016. fail_import:
  1017. return ret;
  1018. }
  1019. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  1020. struct dma_buf *dmabuf, struct sg_table *sgt)
  1021. {
  1022. struct msm_gem_object *msm_obj;
  1023. struct drm_gem_object *obj = NULL;
  1024. uint32_t size;
  1025. int ret;
  1026. unsigned long flags = 0;
  1027. size = PAGE_ALIGN(dmabuf->size);
  1028. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj,
  1029. false);
  1030. if (ret)
  1031. goto fail;
  1032. drm_gem_private_object_init(dev, obj, size);
  1033. msm_obj = to_msm_bo(obj);
  1034. mutex_lock(&msm_obj->lock);
  1035. msm_obj->sgt = sgt;
  1036. msm_obj->pages = NULL;
  1037. /*
  1038. * 1) If sg table is NULL, user should call msm_gem_delayed_import
  1039. * to add back the sg table to the drm gem object.
  1040. *
  1041. * 2) Add buffer flag unconditionally for all import cases.
  1042. * # Cached buffer will be attached immediately hence sgt will
  1043. * be available upon gem obj creation.
  1044. * # Un-cached buffer will follow delayed attach hence sgt
  1045. * will be NULL upon gem obj creation.
  1046. */
  1047. msm_obj->flags |= MSM_BO_EXTBUF;
  1048. /*
  1049. * For all uncached buffers, there is no need to perform cache
  1050. * maintenance on dma map/unmap time.
  1051. */
  1052. ret = dma_buf_get_flags(dmabuf, &flags);
  1053. if (ret) {
  1054. DRM_ERROR("dma_buf_get_flags failure, err=%d\n", ret);
  1055. } else if ((flags & ION_FLAG_CACHED) == 0) {
  1056. DRM_DEBUG("Buffer is uncached type\n");
  1057. msm_obj->flags |= MSM_BO_SKIPSYNC;
  1058. }
  1059. mutex_unlock(&msm_obj->lock);
  1060. return obj;
  1061. fail:
  1062. drm_gem_object_put(obj);
  1063. return ERR_PTR(ret);
  1064. }
  1065. static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1066. uint32_t flags, struct msm_gem_address_space *aspace,
  1067. struct drm_gem_object **bo, uint64_t *iova, bool locked)
  1068. {
  1069. void *vaddr;
  1070. struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
  1071. int ret;
  1072. if (IS_ERR(obj))
  1073. return ERR_CAST(obj);
  1074. if (iova) {
  1075. ret = msm_gem_get_iova(obj, aspace, iova);
  1076. if (ret)
  1077. goto err;
  1078. }
  1079. vaddr = msm_gem_get_vaddr(obj);
  1080. if (IS_ERR(vaddr)) {
  1081. msm_gem_put_iova(obj, aspace);
  1082. ret = PTR_ERR(vaddr);
  1083. goto err;
  1084. }
  1085. if (bo)
  1086. *bo = obj;
  1087. return vaddr;
  1088. err:
  1089. if (locked)
  1090. drm_gem_object_put_locked(obj);
  1091. else
  1092. drm_gem_object_put(obj);
  1093. return ERR_PTR(ret);
  1094. }
  1095. void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1096. uint32_t flags, struct msm_gem_address_space *aspace,
  1097. struct drm_gem_object **bo, uint64_t *iova)
  1098. {
  1099. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
  1100. }
  1101. void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
  1102. uint32_t flags, struct msm_gem_address_space *aspace,
  1103. struct drm_gem_object **bo, uint64_t *iova)
  1104. {
  1105. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
  1106. }
  1107. void msm_gem_kernel_put(struct drm_gem_object *bo,
  1108. struct msm_gem_address_space *aspace, bool locked)
  1109. {
  1110. if (IS_ERR_OR_NULL(bo))
  1111. return;
  1112. msm_gem_put_vaddr(bo);
  1113. msm_gem_unpin_iova(bo, aspace);
  1114. if (locked)
  1115. drm_gem_object_put_locked(bo);
  1116. else
  1117. drm_gem_object_put(bo);
  1118. }
  1119. void msm_gem_object_set_name(struct drm_gem_object *bo, const char *fmt, ...)
  1120. {
  1121. struct msm_gem_object *msm_obj = to_msm_bo(bo);
  1122. va_list ap;
  1123. if (!fmt)
  1124. return;
  1125. va_start(ap, fmt);
  1126. vsnprintf(msm_obj->name, sizeof(msm_obj->name), fmt, ap);
  1127. va_end(ap);
  1128. }
  1129. void msm_gem_put_buffer(struct drm_gem_object *gem)
  1130. {
  1131. struct msm_gem_object *msm_gem;
  1132. if (!gem)
  1133. return;
  1134. msm_gem = to_msm_bo(gem);
  1135. msm_gem_put_iova(gem, msm_gem->aspace);
  1136. msm_gem_put_vaddr(gem);
  1137. }
  1138. int msm_gem_get_buffer(struct drm_gem_object *gem,
  1139. struct drm_device *dev, struct drm_framebuffer *fb,
  1140. uint32_t align_size)
  1141. {
  1142. struct msm_gem_object *msm_gem;
  1143. uint32_t size;
  1144. uint64_t iova_aligned;
  1145. int ret = -EINVAL;
  1146. if (!gem) {
  1147. DRM_ERROR("invalid drm gem");
  1148. return ret;
  1149. }
  1150. msm_gem = to_msm_bo(gem);
  1151. size = PAGE_ALIGN(gem->size);
  1152. if (size < (align_size + GUARD_BYTES)) {
  1153. DRM_ERROR("invalid gem size");
  1154. goto exit;
  1155. }
  1156. msm_gem_smmu_address_space_get(dev, MSM_SMMU_DOMAIN_UNSECURE);
  1157. if (PTR_ERR(msm_gem->aspace) == -ENODEV) {
  1158. DRM_DEBUG("IOMMU not present, relying on VRAM.");
  1159. } else if (IS_ERR_OR_NULL(msm_gem->aspace)) {
  1160. ret = PTR_ERR(msm_gem->aspace);
  1161. DRM_ERROR("failed to get aspace");
  1162. goto exit;
  1163. }
  1164. ret = msm_gem_get_iova(gem, msm_gem->aspace, &msm_gem->iova);
  1165. if (ret) {
  1166. DRM_ERROR("failed to get the iova ret %d", ret);
  1167. goto exit;
  1168. }
  1169. msm_gem_get_vaddr(gem);
  1170. if (IS_ERR_OR_NULL(msm_gem->vaddr)) {
  1171. DRM_ERROR("failed to get vaddr");
  1172. goto exit;
  1173. }
  1174. iova_aligned = (msm_gem->iova + GUARD_BYTES) & ALIGNED_OFFSET;
  1175. msm_gem->offset = iova_aligned - msm_gem->iova;
  1176. msm_gem->iova = msm_gem->iova + msm_gem->offset;
  1177. return 0;
  1178. exit:
  1179. msm_gem_put_buffer(gem);
  1180. return ret;
  1181. }