msm_gem.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389
  1. /*
  2. * Copyright (c) 2021-2023 Qualcomm Innovation Center, Inc. All rights reserved.
  3. * Copyright (c) 2018-2021, The Linux Foundation. All rights reserved.
  4. * Copyright (C) 2013 Red Hat
  5. * Author: Rob Clark <[email protected]>
  6. *
  7. * This program is free software; you can redistribute it and/or modify it
  8. * under the terms of the GNU General Public License version 2 as published by
  9. * the Free Software Foundation.
  10. *
  11. * This program is distributed in the hope that it will be useful, but WITHOUT
  12. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  13. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  14. * more details.
  15. *
  16. * You should have received a copy of the GNU General Public License along with
  17. * this program. If not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #include <linux/qcom-dma-mapping.h>
  20. #include <linux/spinlock.h>
  21. #include <linux/shmem_fs.h>
  22. #include <linux/dma-buf.h>
  23. #include <linux/pfn_t.h>
  24. #include <linux/version.h>
  25. #include <linux/module.h>
  26. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  27. #include <linux/ion.h>
  28. #endif
  29. #include "msm_drv.h"
  30. #include "msm_gem.h"
  31. #include "msm_mmu.h"
  32. #include "sde_dbg.h"
  33. #define GUARD_BYTES (BIT(8) - 1)
  34. #define ALIGNED_OFFSET (U32_MAX & ~(GUARD_BYTES))
  35. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  36. static dma_addr_t physaddr(struct drm_gem_object *obj)
  37. {
  38. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  39. struct msm_drm_private *priv = obj->dev->dev_private;
  40. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  41. priv->vram.paddr;
  42. }
  43. static bool use_pages(struct drm_gem_object *obj)
  44. {
  45. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  46. return !msm_obj->vram_node;
  47. }
  48. /* allocate pages from VRAM carveout, used when no IOMMU: */
  49. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  50. {
  51. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  52. struct msm_drm_private *priv = obj->dev->dev_private;
  53. dma_addr_t paddr;
  54. struct page **p;
  55. int ret, i;
  56. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  57. if (!p)
  58. return ERR_PTR(-ENOMEM);
  59. spin_lock(&priv->vram.lock);
  60. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  61. spin_unlock(&priv->vram.lock);
  62. if (ret) {
  63. kvfree(p);
  64. return ERR_PTR(ret);
  65. }
  66. paddr = physaddr(obj);
  67. for (i = 0; i < npages; i++) {
  68. p[i] = phys_to_page(paddr);
  69. paddr += PAGE_SIZE;
  70. }
  71. return p;
  72. }
  73. static struct page **get_pages(struct drm_gem_object *obj)
  74. {
  75. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  76. struct device *aspace_dev;
  77. if (obj->import_attach)
  78. return msm_obj->pages;
  79. if (!msm_obj->pages) {
  80. struct drm_device *dev = obj->dev;
  81. struct page **p;
  82. int npages = obj->size >> PAGE_SHIFT;
  83. if (use_pages(obj))
  84. p = drm_gem_get_pages(obj);
  85. else
  86. p = get_pages_vram(obj, npages);
  87. if (IS_ERR(p)) {
  88. DISP_DEV_ERR(dev->dev, "could not get pages: %ld\n",
  89. PTR_ERR(p));
  90. return p;
  91. }
  92. msm_obj->pages = p;
  93. msm_obj->sgt = drm_prime_pages_to_sg(dev, p, npages);
  94. if (IS_ERR(msm_obj->sgt)) {
  95. void *ptr = ERR_CAST(msm_obj->sgt);
  96. DISP_DEV_ERR(dev->dev, "failed to allocate sgt\n");
  97. msm_obj->sgt = NULL;
  98. return ptr;
  99. }
  100. if (msm_obj->vram_node) {
  101. goto end;
  102. /*
  103. * For non-cached buffers, ensure the new pages are clean
  104. * because display controller, GPU, etc. are not coherent
  105. */
  106. } else if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED)) {
  107. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  108. if (aspace_dev) {
  109. dma_map_sg(aspace_dev, msm_obj->sgt->sgl,
  110. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  111. /* mark the buffer as external buffer */
  112. msm_obj->flags |= MSM_BO_EXTBUF;
  113. } else {
  114. DRM_ERROR("failed to get aspace_device\n");
  115. }
  116. }
  117. }
  118. end:
  119. return msm_obj->pages;
  120. }
  121. static void put_pages_vram(struct drm_gem_object *obj)
  122. {
  123. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  124. struct msm_drm_private *priv = obj->dev->dev_private;
  125. spin_lock(&priv->vram.lock);
  126. drm_mm_remove_node(msm_obj->vram_node);
  127. spin_unlock(&priv->vram.lock);
  128. kvfree(msm_obj->pages);
  129. }
  130. static void put_pages(struct drm_gem_object *obj)
  131. {
  132. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  133. if (msm_obj->pages) {
  134. if (msm_obj->sgt) {
  135. sg_free_table(msm_obj->sgt);
  136. kfree(msm_obj->sgt);
  137. }
  138. if (use_pages(obj))
  139. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  140. else
  141. put_pages_vram(obj);
  142. msm_obj->pages = NULL;
  143. }
  144. }
  145. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  146. {
  147. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  148. struct page **p;
  149. mutex_lock(&msm_obj->lock);
  150. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  151. mutex_unlock(&msm_obj->lock);
  152. return ERR_PTR(-EBUSY);
  153. }
  154. p = get_pages(obj);
  155. mutex_unlock(&msm_obj->lock);
  156. return p;
  157. }
  158. void msm_gem_put_pages(struct drm_gem_object *obj)
  159. {
  160. /* when we start tracking the pin count, then do something here */
  161. }
  162. void msm_gem_sync(struct drm_gem_object *obj)
  163. {
  164. struct msm_gem_object *msm_obj;
  165. struct device *aspace_dev;
  166. if (!obj)
  167. return;
  168. msm_obj = to_msm_bo(obj);
  169. if (msm_obj->vram_node)
  170. return;
  171. /*
  172. * dma_sync_sg_for_device synchronises a single contiguous or
  173. * scatter/gather mapping for the CPU and device.
  174. */
  175. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  176. if (aspace_dev)
  177. dma_sync_sg_for_device(aspace_dev, msm_obj->sgt->sgl,
  178. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  179. else
  180. DRM_ERROR("failed to get aspace_device\n");
  181. }
  182. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  183. struct vm_area_struct *vma)
  184. {
  185. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  186. #if (LINUX_VERSION_CODE < KERNEL_VERSION(6, 1, 25))
  187. vma->vm_flags &= ~VM_PFNMAP;
  188. vma->vm_flags |= VM_MIXEDMAP;
  189. #else
  190. vm_flags_mod(vma, VM_MIXEDMAP, VM_PFNMAP);
  191. #endif
  192. if (msm_obj->flags & MSM_BO_WC) {
  193. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  194. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  195. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  196. } else {
  197. /*
  198. * Shunt off cached objs to shmem file so they have their own
  199. * address_space (so unmap_mapping_range does what we want,
  200. * in particular in the case of mmap'd dmabufs)
  201. */
  202. fput(vma->vm_file);
  203. get_file(obj->filp);
  204. vma->vm_pgoff = 0;
  205. vma->vm_file = obj->filp;
  206. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  207. }
  208. return 0;
  209. }
  210. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  211. {
  212. int ret;
  213. ret = drm_gem_mmap(filp, vma);
  214. if (ret) {
  215. DBG("mmap failed: %d", ret);
  216. return ret;
  217. }
  218. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  219. }
  220. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  221. static vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  222. #else
  223. vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  224. #endif
  225. {
  226. struct vm_area_struct *vma = vmf->vma;
  227. struct drm_gem_object *obj = vma->vm_private_data;
  228. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  229. struct page **pages;
  230. unsigned long pfn;
  231. pgoff_t pgoff;
  232. int err;
  233. vm_fault_t ret;
  234. /*
  235. * vm_ops.open/drm_gem_mmap_obj and close get and put
  236. * a reference on obj. So, we dont need to hold one here.
  237. */
  238. err = mutex_lock_interruptible(&msm_obj->lock);
  239. if (err) {
  240. ret = VM_FAULT_NOPAGE;
  241. goto out;
  242. }
  243. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  244. mutex_unlock(&msm_obj->lock);
  245. return VM_FAULT_SIGBUS;
  246. }
  247. /* make sure we have pages attached now */
  248. pages = get_pages(obj);
  249. if (IS_ERR(pages)) {
  250. ret = vmf_error(PTR_ERR(pages));
  251. goto out_unlock;
  252. }
  253. /* We don't use vmf->pgoff since that has the fake offset: */
  254. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  255. pfn = page_to_pfn(pages[pgoff]);
  256. VERB("Inserting %pK pfn %lx, pa %lx", (void *)vmf->address,
  257. pfn, pfn << PAGE_SHIFT);
  258. ret = vmf_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  259. out_unlock:
  260. mutex_unlock(&msm_obj->lock);
  261. out:
  262. return ret;
  263. }
  264. /** get mmap offset */
  265. static uint64_t mmap_offset(struct drm_gem_object *obj)
  266. {
  267. struct drm_device *dev = obj->dev;
  268. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  269. int ret;
  270. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  271. /* Make it mmapable */
  272. ret = drm_gem_create_mmap_offset(obj);
  273. if (ret) {
  274. DISP_DEV_ERR(dev->dev, "could not allocate mmap offset\n");
  275. return 0;
  276. }
  277. return drm_vma_node_offset_addr(&obj->vma_node);
  278. }
  279. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  280. {
  281. uint64_t offset;
  282. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  283. mutex_lock(&msm_obj->lock);
  284. offset = mmap_offset(obj);
  285. mutex_unlock(&msm_obj->lock);
  286. return offset;
  287. }
  288. dma_addr_t msm_gem_get_dma_addr(struct drm_gem_object *obj)
  289. {
  290. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  291. struct sg_table *sgt;
  292. if (!msm_obj->sgt) {
  293. sgt = dma_buf_map_attachment(obj->import_attach,
  294. DMA_BIDIRECTIONAL);
  295. if (IS_ERR_OR_NULL(sgt)) {
  296. DRM_ERROR("dma_buf_map_attachment failure, err=%ld\n",
  297. PTR_ERR(sgt));
  298. return 0;
  299. }
  300. msm_obj->sgt = sgt;
  301. }
  302. return sg_dma_address(msm_obj->sgt->sgl);
  303. }
  304. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  305. struct msm_gem_address_space *aspace)
  306. {
  307. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  308. struct msm_gem_vma *vma;
  309. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  310. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  311. if (!vma)
  312. return ERR_PTR(-ENOMEM);
  313. vma->aspace = aspace;
  314. msm_obj->aspace = aspace;
  315. list_add_tail(&vma->list, &msm_obj->vmas);
  316. return vma;
  317. }
  318. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  319. struct msm_gem_address_space *aspace)
  320. {
  321. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  322. struct msm_gem_vma *vma;
  323. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  324. list_for_each_entry(vma, &msm_obj->vmas, list) {
  325. if (vma->aspace == aspace)
  326. return vma;
  327. }
  328. return NULL;
  329. }
  330. static void del_vma(struct msm_gem_vma *vma)
  331. {
  332. if (!vma)
  333. return;
  334. list_del(&vma->list);
  335. kfree(vma);
  336. }
  337. /* Called with msm_obj->lock locked */
  338. static void
  339. put_iova(struct drm_gem_object *obj)
  340. {
  341. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  342. struct msm_gem_vma *vma, *tmp;
  343. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  344. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  345. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  346. msm_obj->flags);
  347. /*
  348. * put_iova removes the domain connected to the obj which makes
  349. * the aspace inaccessible. Store the aspace, as it is used to
  350. * update the active_list during gem_free_obj and gem_purge.
  351. */
  352. msm_obj->aspace = vma->aspace;
  353. del_vma(vma);
  354. }
  355. }
  356. /* get iova, taking a reference. Should have a matching put */
  357. static int msm_gem_get_iova_locked(struct drm_gem_object *obj,
  358. struct msm_gem_address_space *aspace, uint64_t *iova)
  359. {
  360. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  361. struct msm_gem_vma *vma;
  362. int ret = 0;
  363. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  364. vma = lookup_vma(obj, aspace);
  365. if (!vma) {
  366. struct page **pages;
  367. struct device *dev;
  368. struct dma_buf *dmabuf;
  369. bool reattach = false;
  370. unsigned long dma_map_attrs;
  371. dev = msm_gem_get_aspace_device(aspace);
  372. if ((dev && obj->import_attach) &&
  373. ((dev != obj->import_attach->dev) ||
  374. msm_obj->obj_dirty)) {
  375. if (of_device_is_compatible(dev->of_node, "qcom,smmu_sde_unsec") &&
  376. of_device_is_compatible(obj->import_attach->dev->of_node,
  377. "qcom,smmu_sde_sec")) {
  378. SDE_EVT32(obj->import_attach->dev, dev, msm_obj->sgt,
  379. msm_obj->obj_dirty);
  380. DRM_ERROR("gem obj found mapped to %s, now requesting map on %s",
  381. dev_name(obj->import_attach->dev), dev_name(dev));
  382. return -EINVAL;
  383. }
  384. dmabuf = obj->import_attach->dmabuf;
  385. dma_map_attrs = obj->import_attach->dma_map_attrs;
  386. DRM_DEBUG("detach nsec-dev:%pK attach sec-dev:%pK\n",
  387. obj->import_attach->dev, dev);
  388. SDE_EVT32(obj->import_attach->dev, dev, msm_obj->sgt,
  389. msm_obj->obj_dirty);
  390. if (msm_obj->sgt)
  391. dma_buf_unmap_attachment(obj->import_attach,
  392. msm_obj->sgt, DMA_BIDIRECTIONAL);
  393. dma_buf_detach(dmabuf, obj->import_attach);
  394. obj->import_attach = dma_buf_attach(dmabuf, dev);
  395. if (IS_ERR(obj->import_attach)) {
  396. DRM_ERROR("dma_buf_attach failure, err=%ld\n",
  397. PTR_ERR(obj->import_attach));
  398. ret = PTR_ERR(obj->import_attach);
  399. return ret;
  400. }
  401. /*
  402. * obj->import_attach is created as part of dma_buf_attach.
  403. * Re-apply the dma_map_attr in this case to be in sync
  404. * with iommu_map attrs during map_attachment callback.
  405. */
  406. obj->import_attach->dma_map_attrs |= dma_map_attrs;
  407. msm_obj->obj_dirty = false;
  408. reattach = true;
  409. }
  410. /* perform delayed import for buffers without existing sgt */
  411. if (((msm_obj->flags & MSM_BO_EXTBUF) && !(msm_obj->sgt))
  412. || reattach) {
  413. ret = msm_gem_delayed_import(obj);
  414. if (ret) {
  415. DRM_ERROR("delayed dma-buf import failed %d\n",
  416. ret);
  417. msm_obj->obj_dirty = true;
  418. return ret;
  419. }
  420. }
  421. vma = add_vma(obj, aspace);
  422. if (IS_ERR(vma)) {
  423. ret = PTR_ERR(vma);
  424. return ret;
  425. }
  426. pages = get_pages(obj);
  427. if (IS_ERR(pages)) {
  428. ret = PTR_ERR(pages);
  429. goto fail;
  430. }
  431. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  432. obj->size >> PAGE_SHIFT,
  433. msm_obj->flags);
  434. if (ret)
  435. goto fail;
  436. }
  437. *iova = vma->iova;
  438. if (aspace && !msm_obj->in_active_list) {
  439. mutex_lock(&aspace->list_lock);
  440. msm_gem_add_obj_to_aspace_active_list(aspace, obj);
  441. mutex_unlock(&aspace->list_lock);
  442. }
  443. return 0;
  444. fail:
  445. del_vma(vma);
  446. return ret;
  447. }
  448. int msm_gem_get_iova(struct drm_gem_object *obj,
  449. struct msm_gem_address_space *aspace, uint64_t *iova)
  450. {
  451. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  452. int ret;
  453. mutex_lock(&msm_obj->lock);
  454. ret = msm_gem_get_iova_locked(obj, aspace, iova);
  455. mutex_unlock(&msm_obj->lock);
  456. return ret;
  457. }
  458. /* get iova without taking a reference, used in places where you have
  459. * already done a 'msm_gem_get_iova()'.
  460. */
  461. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  462. struct msm_gem_address_space *aspace)
  463. {
  464. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  465. struct msm_gem_vma *vma;
  466. mutex_lock(&msm_obj->lock);
  467. vma = lookup_vma(obj, aspace);
  468. mutex_unlock(&msm_obj->lock);
  469. WARN_ON(!vma);
  470. return vma ? vma->iova : 0;
  471. }
  472. /*
  473. * Unpin a iova by updating the reference counts. The memory isn't actually
  474. * purged until something else (shrinker, mm_notifier, destroy, etc) decides
  475. * to get rid of it
  476. */
  477. void msm_gem_unpin_iova(struct drm_gem_object *obj,
  478. struct msm_gem_address_space *aspace)
  479. {
  480. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  481. struct msm_gem_vma *vma;
  482. mutex_lock(&msm_obj->lock);
  483. vma = lookup_vma(obj, aspace);
  484. if (!WARN_ON(!vma))
  485. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  486. msm_obj->flags);
  487. mutex_unlock(&msm_obj->lock);
  488. }
  489. void msm_gem_put_iova(struct drm_gem_object *obj,
  490. struct msm_gem_address_space *aspace)
  491. {
  492. // XXX TODO ..
  493. // NOTE: probably don't need a _locked() version.. we wouldn't
  494. // normally unmap here, but instead just mark that it could be
  495. // unmapped (if the iova refcnt drops to zero), but then later
  496. // if another _get_iova_locked() fails we can start unmapping
  497. // things that are no longer needed..
  498. }
  499. void msm_gem_aspace_domain_attach_detach_update(
  500. struct msm_gem_address_space *aspace,
  501. bool is_detach)
  502. {
  503. struct msm_gem_object *msm_obj;
  504. struct drm_gem_object *obj;
  505. struct aspace_client *aclient;
  506. int ret;
  507. uint64_t iova;
  508. if (!aspace)
  509. return;
  510. mutex_lock(&aspace->list_lock);
  511. if (is_detach) {
  512. /* Indicate to clients domain is getting detached */
  513. list_for_each_entry(aclient, &aspace->clients, list) {
  514. if (aclient->cb)
  515. aclient->cb(aclient->cb_data,
  516. is_detach);
  517. }
  518. /**
  519. * Unmap active buffers,
  520. * typically clients should do this when the callback is called,
  521. * but this needs to be done for the buffers which are not
  522. * attached to any planes.
  523. */
  524. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  525. obj = &msm_obj->base;
  526. if (obj->import_attach) {
  527. mutex_lock(&msm_obj->lock);
  528. put_iova(obj);
  529. msm_obj->obj_dirty = true;
  530. mutex_unlock(&msm_obj->lock);
  531. }
  532. }
  533. } else {
  534. /* map active buffers */
  535. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  536. obj = &msm_obj->base;
  537. ret = msm_gem_get_iova(obj, aspace, &iova);
  538. if (ret) {
  539. mutex_unlock(&aspace->list_lock);
  540. return;
  541. }
  542. }
  543. /* Indicate to clients domain is attached */
  544. list_for_each_entry(aclient, &aspace->clients, list) {
  545. if (aclient->cb)
  546. aclient->cb(aclient->cb_data,
  547. is_detach);
  548. }
  549. }
  550. mutex_unlock(&aspace->list_lock);
  551. }
  552. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  553. struct drm_mode_create_dumb *args)
  554. {
  555. args->pitch = align_pitch(args->width, args->bpp);
  556. args->size = PAGE_ALIGN(args->pitch * args->height);
  557. return msm_gem_new_handle(dev, file, args->size,
  558. MSM_BO_SCANOUT | MSM_BO_CACHED, &args->handle, "dumb");
  559. }
  560. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  561. uint32_t handle, uint64_t *offset)
  562. {
  563. struct drm_gem_object *obj;
  564. int ret = 0;
  565. /* GEM does all our handle to object mapping */
  566. obj = drm_gem_object_lookup(file, handle);
  567. if (obj == NULL) {
  568. ret = -ENOENT;
  569. goto fail;
  570. }
  571. *offset = msm_gem_mmap_offset(obj);
  572. drm_gem_object_put(obj);
  573. fail:
  574. return ret;
  575. }
  576. static void *get_vaddr(struct drm_gem_object *obj, unsigned madv)
  577. {
  578. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  579. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  580. struct iosys_map map;
  581. #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  582. struct dma_buf_map map;
  583. #endif
  584. int ret = 0;
  585. mutex_lock(&msm_obj->lock);
  586. if (WARN_ON(msm_obj->madv > madv)) {
  587. DISP_DEV_ERR(obj->dev->dev, "Invalid madv state: %u vs %u\n",
  588. msm_obj->madv, madv);
  589. mutex_unlock(&msm_obj->lock);
  590. return ERR_PTR(-EBUSY);
  591. }
  592. /* increment vmap_count *before* vmap() call, so shrinker can
  593. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  594. * This guarantees that we won't try to msm_gem_vunmap() this
  595. * same object from within the vmap() call (while we already
  596. * hold msm_obj->lock)
  597. */
  598. msm_obj->vmap_count++;
  599. if (!msm_obj->vaddr) {
  600. struct page **pages = get_pages(obj);
  601. if (IS_ERR(pages)) {
  602. ret = PTR_ERR(pages);
  603. goto fail;
  604. }
  605. if (obj->import_attach) {
  606. if (obj->dev && obj->dev->dev && !dev_is_dma_coherent(obj->dev->dev)) {
  607. ret = dma_buf_begin_cpu_access(
  608. obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  609. if (ret)
  610. goto fail;
  611. }
  612. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  613. ret = dma_buf_vmap(obj->import_attach->dmabuf, &map);
  614. if (ret)
  615. goto fail;
  616. msm_obj->vaddr = map.vaddr;
  617. #else
  618. msm_obj->vaddr = dma_buf_vmap(obj->import_attach->dmabuf);
  619. #endif
  620. } else {
  621. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  622. VM_MAP, PAGE_KERNEL);
  623. }
  624. if (msm_obj->vaddr == NULL) {
  625. ret = -ENOMEM;
  626. goto fail;
  627. }
  628. }
  629. mutex_unlock(&msm_obj->lock);
  630. return msm_obj->vaddr;
  631. fail:
  632. msm_obj->vmap_count--;
  633. mutex_unlock(&msm_obj->lock);
  634. return ERR_PTR(ret);
  635. }
  636. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  637. {
  638. return get_vaddr(obj, MSM_MADV_WILLNEED);
  639. }
  640. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  641. {
  642. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  643. mutex_lock(&msm_obj->lock);
  644. WARN_ON(msm_obj->vmap_count < 1);
  645. msm_obj->vmap_count--;
  646. mutex_unlock(&msm_obj->lock);
  647. }
  648. /* Update madvise status, returns true if not purged, else
  649. * false or -errno.
  650. */
  651. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  652. {
  653. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  654. mutex_lock(&msm_obj->lock);
  655. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  656. if (msm_obj->madv != __MSM_MADV_PURGED)
  657. msm_obj->madv = madv;
  658. madv = msm_obj->madv;
  659. mutex_unlock(&msm_obj->lock);
  660. return (madv != __MSM_MADV_PURGED);
  661. }
  662. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  663. {
  664. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  665. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  666. struct iosys_map map = IOSYS_MAP_INIT_VADDR(msm_obj->vaddr);
  667. #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  668. struct dma_buf_map map = DMA_BUF_MAP_INIT_VADDR(msm_obj->vaddr);
  669. #endif
  670. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  671. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  672. return;
  673. if (obj->import_attach) {
  674. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  675. dma_buf_vunmap(obj->import_attach->dmabuf, &map);
  676. #else
  677. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  678. #endif
  679. if (obj->dev && obj->dev->dev && !dev_is_dma_coherent(obj->dev->dev))
  680. dma_buf_end_cpu_access(obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  681. } else {
  682. vunmap(msm_obj->vaddr);
  683. }
  684. msm_obj->vaddr = NULL;
  685. }
  686. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  687. {
  688. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  689. mutex_lock_nested(&msm_obj->lock, subclass);
  690. msm_gem_vunmap_locked(obj);
  691. mutex_unlock(&msm_obj->lock);
  692. }
  693. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  694. {
  695. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  696. bool write = !!(op & MSM_PREP_WRITE);
  697. unsigned long remain =
  698. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  699. long ret;
  700. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  701. ret = dma_resv_wait_timeout(msm_obj->resv, write, true, remain);
  702. #else
  703. ret = dma_resv_wait_timeout_rcu(msm_obj->resv, write, true, remain);
  704. #endif
  705. if (ret == 0)
  706. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  707. else if (ret < 0)
  708. return ret;
  709. /* TODO cache maintenance */
  710. return 0;
  711. }
  712. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  713. {
  714. /* TODO cache maintenance */
  715. return 0;
  716. }
  717. /* don't call directly! Use drm_gem_object_put() and friends */
  718. void msm_gem_free_object(struct drm_gem_object *obj)
  719. {
  720. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  721. struct drm_device *dev = obj->dev;
  722. struct msm_drm_private *priv = dev->dev_private;
  723. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  724. struct iosys_map map = IOSYS_MAP_INIT_VADDR(msm_obj->vaddr);
  725. #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  726. struct dma_buf_map map = DMA_BUF_MAP_INIT_VADDR(msm_obj->vaddr);
  727. #endif
  728. /* object should not be on active list: */
  729. WARN_ON(is_active(msm_obj));
  730. mutex_lock(&priv->mm_lock);
  731. list_del(&msm_obj->mm_list);
  732. mutex_unlock(&priv->mm_lock);
  733. mutex_lock(&msm_obj->lock);
  734. put_iova(obj);
  735. if (msm_obj->aspace) {
  736. mutex_lock(&msm_obj->aspace->list_lock);
  737. msm_gem_remove_obj_from_aspace_active_list(msm_obj->aspace,
  738. obj);
  739. mutex_unlock(&msm_obj->aspace->list_lock);
  740. }
  741. if (obj->import_attach) {
  742. if (msm_obj->vaddr)
  743. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  744. dma_buf_vunmap(obj->import_attach->dmabuf, &map);
  745. #else
  746. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  747. #endif
  748. /* Don't drop the pages for imported dmabuf, as they are not
  749. * ours, just free the array we allocated:
  750. */
  751. if (msm_obj->pages)
  752. kvfree(msm_obj->pages);
  753. drm_prime_gem_destroy(obj, msm_obj->sgt);
  754. } else {
  755. msm_gem_vunmap_locked(obj);
  756. put_pages(obj);
  757. }
  758. if (msm_obj->resv == &msm_obj->_resv)
  759. dma_resv_fini(msm_obj->resv);
  760. drm_gem_object_release(obj);
  761. mutex_unlock(&msm_obj->lock);
  762. kfree(msm_obj);
  763. }
  764. /* convenience method to construct a GEM buffer object, and userspace handle */
  765. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  766. uint32_t size, uint32_t flags, uint32_t *handle,
  767. char *name)
  768. {
  769. struct drm_gem_object *obj;
  770. int ret;
  771. obj = msm_gem_new(dev, size, flags);
  772. if (IS_ERR(obj))
  773. return PTR_ERR(obj);
  774. if (name)
  775. msm_gem_object_set_name(obj, "%s", name);
  776. ret = drm_gem_handle_create(file, obj, handle);
  777. /* drop reference from allocate - handle holds it now */
  778. drm_gem_object_put(obj);
  779. return ret;
  780. }
  781. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  782. static const struct vm_operations_struct vm_ops = {
  783. .fault = msm_gem_fault,
  784. .open = drm_gem_vm_open,
  785. .close = drm_gem_vm_close,
  786. };
  787. static const struct drm_gem_object_funcs msm_gem_object_funcs = {
  788. .free = msm_gem_free_object,
  789. .pin = msm_gem_prime_pin,
  790. .unpin = msm_gem_prime_unpin,
  791. .get_sg_table = msm_gem_prime_get_sg_table,
  792. .vmap = msm_gem_prime_vmap,
  793. .vunmap = msm_gem_prime_vunmap,
  794. .vm_ops = &vm_ops,
  795. };
  796. #endif
  797. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  798. static int msm_gem_new_impl(struct drm_device *dev,
  799. uint32_t size, uint32_t flags,
  800. struct dma_resv *resv,
  801. struct drm_gem_object **obj)
  802. {
  803. #else
  804. static int msm_gem_new_impl(struct drm_device *dev,
  805. uint32_t size, uint32_t flags,
  806. struct dma_resv *resv,
  807. struct drm_gem_object **obj,
  808. bool struct_mutex_locked)
  809. {
  810. struct msm_drm_private *priv = dev->dev_private;
  811. #endif
  812. struct msm_gem_object *msm_obj;
  813. switch (flags & MSM_BO_CACHE_MASK) {
  814. case MSM_BO_UNCACHED:
  815. case MSM_BO_CACHED:
  816. case MSM_BO_WC:
  817. break;
  818. default:
  819. DISP_DEV_ERR(dev->dev, "invalid cache flag: %x\n",
  820. (flags & MSM_BO_CACHE_MASK));
  821. return -EINVAL;
  822. }
  823. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  824. if (!msm_obj)
  825. return -ENOMEM;
  826. mutex_init(&msm_obj->lock);
  827. msm_obj->flags = flags;
  828. msm_obj->madv = MSM_MADV_WILLNEED;
  829. if (resv) {
  830. msm_obj->resv = resv;
  831. } else {
  832. msm_obj->resv = &msm_obj->_resv;
  833. dma_resv_init(msm_obj->resv);
  834. }
  835. INIT_LIST_HEAD(&msm_obj->submit_entry);
  836. INIT_LIST_HEAD(&msm_obj->vmas);
  837. INIT_LIST_HEAD(&msm_obj->iova_list);
  838. msm_obj->aspace = msm_gem_smmu_address_space_get(dev,
  839. MSM_SMMU_DOMAIN_UNSECURE);
  840. if (IS_ERR(msm_obj->aspace))
  841. msm_obj->aspace = NULL;
  842. msm_obj->in_active_list = false;
  843. msm_obj->obj_dirty = false;
  844. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  845. mutex_lock(&priv->mm_lock);
  846. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  847. mutex_unlock(&priv->mm_lock);
  848. #endif
  849. *obj = &msm_obj->base;
  850. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  851. (*obj)->funcs = &msm_gem_object_funcs;
  852. #endif
  853. return 0;
  854. }
  855. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  856. struct drm_gem_object *msm_gem_new(struct drm_device *dev, uint32_t size, uint32_t flags)
  857. #else
  858. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  859. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  860. #endif
  861. {
  862. struct msm_drm_private *priv = dev->dev_private;
  863. struct msm_gem_object *msm_obj;
  864. struct drm_gem_object *obj = NULL;
  865. bool use_vram = false;
  866. int ret;
  867. size = PAGE_ALIGN(size);
  868. if (!iommu_present(&platform_bus_type))
  869. use_vram = true;
  870. else if ((flags & (MSM_BO_STOLEN | MSM_BO_SCANOUT)) && priv->vram.size)
  871. use_vram = true;
  872. if (WARN_ON(use_vram && !priv->vram.size))
  873. return ERR_PTR(-EINVAL);
  874. /* Disallow zero sized objects as they make the underlying
  875. * infrastructure grumpy
  876. */
  877. if (size == 0)
  878. return ERR_PTR(-EINVAL);
  879. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  880. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj);
  881. #else
  882. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  883. #endif
  884. if (ret)
  885. goto fail;
  886. msm_obj = to_msm_bo(obj);
  887. if (use_vram) {
  888. struct msm_gem_vma *vma;
  889. struct page **pages;
  890. mutex_lock(&msm_obj->lock);
  891. vma = add_vma(obj, NULL);
  892. mutex_unlock(&msm_obj->lock);
  893. if (IS_ERR(vma)) {
  894. ret = PTR_ERR(vma);
  895. goto fail;
  896. }
  897. to_msm_bo(obj)->vram_node = &vma->node;
  898. drm_gem_private_object_init(dev, obj, size);
  899. pages = get_pages(obj);
  900. if (IS_ERR(pages)) {
  901. ret = PTR_ERR(pages);
  902. goto fail;
  903. }
  904. vma->iova = physaddr(obj);
  905. } else {
  906. ret = drm_gem_object_init(dev, obj, size);
  907. if (ret)
  908. goto fail;
  909. /*
  910. * Our buffers are kept pinned, so allocating them from the
  911. * MOVABLE zone is a really bad idea, and conflicts with CMA.
  912. * See comments above new_inode() why this is required _and_
  913. * expected if you're going to pin these pages.
  914. */
  915. mapping_set_gfp_mask(obj->filp->f_mapping, GFP_HIGHUSER);
  916. }
  917. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  918. mutex_lock(&priv->mm_lock);
  919. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  920. mutex_unlock(&priv->mm_lock);
  921. #endif
  922. return obj;
  923. fail:
  924. drm_gem_object_put(obj);
  925. return ERR_PTR(ret);
  926. }
  927. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  928. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  929. uint32_t size, uint32_t flags)
  930. {
  931. return _msm_gem_new(dev, size, flags, true);
  932. }
  933. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  934. uint32_t size, uint32_t flags)
  935. {
  936. return _msm_gem_new(dev, size, flags, false);
  937. }
  938. #endif
  939. int msm_gem_delayed_import(struct drm_gem_object *obj)
  940. {
  941. struct dma_buf_attachment *attach;
  942. struct sg_table *sgt;
  943. struct msm_gem_object *msm_obj;
  944. int ret = 0;
  945. if (!obj) {
  946. DRM_ERROR("NULL drm gem object\n");
  947. return -EINVAL;
  948. }
  949. msm_obj = to_msm_bo(obj);
  950. if (!obj->import_attach) {
  951. DRM_ERROR("NULL dma_buf_attachment in drm gem object\n");
  952. return -EINVAL;
  953. }
  954. attach = obj->import_attach;
  955. attach->dma_map_attrs |= DMA_ATTR_DELAYED_UNMAP;
  956. /*
  957. * dma_buf_map_attachment will call dma_map_sg for ion buffer
  958. * mapping, and iova will get mapped when the function returns.
  959. */
  960. sgt = dma_buf_map_attachment(attach, DMA_BIDIRECTIONAL);
  961. if (IS_ERR(sgt)) {
  962. ret = PTR_ERR(sgt);
  963. DRM_ERROR("dma_buf_map_attachment failure, err=%d\n",
  964. ret);
  965. goto fail_import;
  966. }
  967. msm_obj->sgt = sgt;
  968. msm_obj->pages = NULL;
  969. fail_import:
  970. return ret;
  971. }
  972. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  973. struct dma_buf *dmabuf, struct sg_table *sgt)
  974. {
  975. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  976. struct msm_drm_private *priv = dev->dev_private;
  977. #endif
  978. struct msm_gem_object *msm_obj;
  979. struct drm_gem_object *obj = NULL;
  980. uint32_t size;
  981. int ret;
  982. size = PAGE_ALIGN(dmabuf->size);
  983. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  984. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj);
  985. #else
  986. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
  987. #endif
  988. if (ret)
  989. goto fail;
  990. drm_gem_private_object_init(dev, obj, size);
  991. msm_obj = to_msm_bo(obj);
  992. mutex_lock(&msm_obj->lock);
  993. msm_obj->sgt = sgt;
  994. msm_obj->pages = NULL;
  995. /*
  996. * 1) If sg table is NULL, user should call msm_gem_delayed_import
  997. * to add back the sg table to the drm gem object.
  998. *
  999. * 2) Add buffer flag unconditionally for all import cases.
  1000. * # Cached buffer will be attached immediately hence sgt will
  1001. * be available upon gem obj creation.
  1002. * # Un-cached buffer will follow delayed attach hence sgt
  1003. * will be NULL upon gem obj creation.
  1004. */
  1005. msm_obj->flags |= MSM_BO_EXTBUF;
  1006. mutex_unlock(&msm_obj->lock);
  1007. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  1008. mutex_lock(&priv->mm_lock);
  1009. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  1010. mutex_unlock(&priv->mm_lock);
  1011. #endif
  1012. return obj;
  1013. fail:
  1014. drm_gem_object_put(obj);
  1015. return ERR_PTR(ret);
  1016. }
  1017. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  1018. static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1019. uint32_t flags, struct msm_gem_address_space *aspace,
  1020. struct drm_gem_object **bo, uint64_t *iova, bool locked)
  1021. {
  1022. void *vaddr;
  1023. struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
  1024. int ret;
  1025. if (IS_ERR(obj))
  1026. return ERR_CAST(obj);
  1027. if (iova) {
  1028. ret = msm_gem_get_iova(obj, aspace, iova);
  1029. if (ret)
  1030. goto err;
  1031. }
  1032. vaddr = msm_gem_get_vaddr(obj);
  1033. if (IS_ERR(vaddr)) {
  1034. msm_gem_put_iova(obj, aspace);
  1035. ret = PTR_ERR(vaddr);
  1036. goto err;
  1037. }
  1038. if (bo)
  1039. *bo = obj;
  1040. return vaddr;
  1041. err:
  1042. if (locked)
  1043. drm_gem_object_put_locked(obj);
  1044. else
  1045. drm_gem_object_put(obj);
  1046. return ERR_PTR(ret);
  1047. }
  1048. void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1049. uint32_t flags, struct msm_gem_address_space *aspace,
  1050. struct drm_gem_object **bo, uint64_t *iova)
  1051. {
  1052. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
  1053. }
  1054. void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
  1055. uint32_t flags, struct msm_gem_address_space *aspace,
  1056. struct drm_gem_object **bo, uint64_t *iova)
  1057. {
  1058. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
  1059. }
  1060. void msm_gem_kernel_put(struct drm_gem_object *bo,
  1061. struct msm_gem_address_space *aspace, bool locked)
  1062. {
  1063. if (IS_ERR_OR_NULL(bo))
  1064. return;
  1065. msm_gem_put_vaddr(bo);
  1066. msm_gem_unpin_iova(bo, aspace);
  1067. if (locked)
  1068. drm_gem_object_put_locked(bo);
  1069. else
  1070. drm_gem_object_put(bo);
  1071. }
  1072. #endif
  1073. void msm_gem_object_set_name(struct drm_gem_object *bo, const char *fmt, ...)
  1074. {
  1075. struct msm_gem_object *msm_obj = to_msm_bo(bo);
  1076. va_list ap;
  1077. if (!fmt)
  1078. return;
  1079. va_start(ap, fmt);
  1080. vsnprintf(msm_obj->name, sizeof(msm_obj->name), fmt, ap);
  1081. va_end(ap);
  1082. }
  1083. void msm_gem_put_buffer(struct drm_gem_object *gem)
  1084. {
  1085. struct msm_gem_object *msm_gem;
  1086. if (!gem)
  1087. return;
  1088. msm_gem = to_msm_bo(gem);
  1089. msm_gem_put_iova(gem, msm_gem->aspace);
  1090. msm_gem_put_vaddr(gem);
  1091. }
  1092. int msm_gem_get_buffer(struct drm_gem_object *gem,
  1093. struct drm_device *dev, struct drm_framebuffer *fb,
  1094. uint32_t align_size)
  1095. {
  1096. struct msm_gem_object *msm_gem;
  1097. uint32_t size;
  1098. uint64_t iova_aligned;
  1099. int ret = -EINVAL;
  1100. if (!gem) {
  1101. DRM_ERROR("invalid drm gem");
  1102. return ret;
  1103. }
  1104. msm_gem = to_msm_bo(gem);
  1105. size = PAGE_ALIGN(gem->size);
  1106. if (size < (align_size + GUARD_BYTES)) {
  1107. DRM_ERROR("invalid gem size");
  1108. goto exit;
  1109. }
  1110. msm_gem_smmu_address_space_get(dev, MSM_SMMU_DOMAIN_UNSECURE);
  1111. if (PTR_ERR(msm_gem->aspace) == -ENODEV) {
  1112. DRM_DEBUG("IOMMU not present, relying on VRAM.");
  1113. } else if (IS_ERR_OR_NULL(msm_gem->aspace)) {
  1114. ret = PTR_ERR(msm_gem->aspace);
  1115. DRM_ERROR("failed to get aspace");
  1116. goto exit;
  1117. }
  1118. ret = msm_gem_get_iova(gem, msm_gem->aspace, &msm_gem->iova);
  1119. if (ret) {
  1120. DRM_ERROR("failed to get the iova ret %d", ret);
  1121. goto exit;
  1122. }
  1123. msm_gem_get_vaddr(gem);
  1124. if (IS_ERR_OR_NULL(msm_gem->vaddr)) {
  1125. DRM_ERROR("failed to get vaddr");
  1126. goto exit;
  1127. }
  1128. iova_aligned = (msm_gem->iova + GUARD_BYTES) & ALIGNED_OFFSET;
  1129. msm_gem->offset = iova_aligned - msm_gem->iova;
  1130. msm_gem->iova = msm_gem->iova + msm_gem->offset;
  1131. return 0;
  1132. exit:
  1133. msm_gem_put_buffer(gem);
  1134. return ret;
  1135. }
  1136. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  1137. MODULE_IMPORT_NS(DMA_BUF);
  1138. #endif