msm_gem.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386
  1. /*
  2. * Copyright (c) 2021-2022 Qualcomm Innovation Center, Inc. All rights reserved.
  3. * Copyright (c) 2018-2021, The Linux Foundation. All rights reserved.
  4. * Copyright (C) 2013 Red Hat
  5. * Author: Rob Clark <[email protected]>
  6. *
  7. * This program is free software; you can redistribute it and/or modify it
  8. * under the terms of the GNU General Public License version 2 as published by
  9. * the Free Software Foundation.
  10. *
  11. * This program is distributed in the hope that it will be useful, but WITHOUT
  12. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  13. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  14. * more details.
  15. *
  16. * You should have received a copy of the GNU General Public License along with
  17. * this program. If not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #include <linux/qcom-dma-mapping.h>
  20. #include <linux/spinlock.h>
  21. #include <linux/shmem_fs.h>
  22. #include <linux/dma-buf.h>
  23. #include <linux/pfn_t.h>
  24. #include <linux/version.h>
  25. #include <linux/module.h>
  26. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  27. #include <linux/ion.h>
  28. #endif
  29. #include "msm_drv.h"
  30. #include "msm_gem.h"
  31. #include "msm_mmu.h"
  32. #include "sde_dbg.h"
  33. #define GUARD_BYTES (BIT(8) - 1)
  34. #define ALIGNED_OFFSET (U32_MAX & ~(GUARD_BYTES))
  35. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  36. static dma_addr_t physaddr(struct drm_gem_object *obj)
  37. {
  38. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  39. struct msm_drm_private *priv = obj->dev->dev_private;
  40. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  41. priv->vram.paddr;
  42. }
  43. static bool use_pages(struct drm_gem_object *obj)
  44. {
  45. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  46. return !msm_obj->vram_node;
  47. }
  48. /* allocate pages from VRAM carveout, used when no IOMMU: */
  49. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  50. {
  51. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  52. struct msm_drm_private *priv = obj->dev->dev_private;
  53. dma_addr_t paddr;
  54. struct page **p;
  55. int ret, i;
  56. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  57. if (!p)
  58. return ERR_PTR(-ENOMEM);
  59. spin_lock(&priv->vram.lock);
  60. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  61. spin_unlock(&priv->vram.lock);
  62. if (ret) {
  63. kvfree(p);
  64. return ERR_PTR(ret);
  65. }
  66. paddr = physaddr(obj);
  67. for (i = 0; i < npages; i++) {
  68. p[i] = phys_to_page(paddr);
  69. paddr += PAGE_SIZE;
  70. }
  71. return p;
  72. }
  73. static struct page **get_pages(struct drm_gem_object *obj)
  74. {
  75. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  76. struct device *aspace_dev;
  77. if (obj->import_attach)
  78. return msm_obj->pages;
  79. if (!msm_obj->pages) {
  80. struct drm_device *dev = obj->dev;
  81. struct page **p;
  82. int npages = obj->size >> PAGE_SHIFT;
  83. if (use_pages(obj))
  84. p = drm_gem_get_pages(obj);
  85. else
  86. p = get_pages_vram(obj, npages);
  87. if (IS_ERR(p)) {
  88. DISP_DEV_ERR(dev->dev, "could not get pages: %ld\n",
  89. PTR_ERR(p));
  90. return p;
  91. }
  92. msm_obj->pages = p;
  93. msm_obj->sgt = drm_prime_pages_to_sg(dev, p, npages);
  94. if (IS_ERR(msm_obj->sgt)) {
  95. void *ptr = ERR_CAST(msm_obj->sgt);
  96. DISP_DEV_ERR(dev->dev, "failed to allocate sgt\n");
  97. msm_obj->sgt = NULL;
  98. return ptr;
  99. }
  100. if (msm_obj->vram_node) {
  101. goto end;
  102. /*
  103. * For non-cached buffers, ensure the new pages are clean
  104. * because display controller, GPU, etc. are not coherent
  105. */
  106. } else if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED)) {
  107. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  108. if (aspace_dev) {
  109. dma_map_sg(aspace_dev, msm_obj->sgt->sgl,
  110. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  111. /* mark the buffer as external buffer */
  112. msm_obj->flags |= MSM_BO_EXTBUF;
  113. } else {
  114. DRM_ERROR("failed to get aspace_device\n");
  115. }
  116. }
  117. }
  118. end:
  119. return msm_obj->pages;
  120. }
  121. static void put_pages_vram(struct drm_gem_object *obj)
  122. {
  123. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  124. struct msm_drm_private *priv = obj->dev->dev_private;
  125. spin_lock(&priv->vram.lock);
  126. drm_mm_remove_node(msm_obj->vram_node);
  127. spin_unlock(&priv->vram.lock);
  128. kvfree(msm_obj->pages);
  129. }
  130. static void put_pages(struct drm_gem_object *obj)
  131. {
  132. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  133. if (msm_obj->pages) {
  134. if (msm_obj->sgt) {
  135. sg_free_table(msm_obj->sgt);
  136. kfree(msm_obj->sgt);
  137. }
  138. if (use_pages(obj))
  139. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  140. else
  141. put_pages_vram(obj);
  142. msm_obj->pages = NULL;
  143. }
  144. }
  145. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  146. {
  147. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  148. struct page **p;
  149. mutex_lock(&msm_obj->lock);
  150. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  151. mutex_unlock(&msm_obj->lock);
  152. return ERR_PTR(-EBUSY);
  153. }
  154. p = get_pages(obj);
  155. mutex_unlock(&msm_obj->lock);
  156. return p;
  157. }
  158. void msm_gem_put_pages(struct drm_gem_object *obj)
  159. {
  160. /* when we start tracking the pin count, then do something here */
  161. }
  162. void msm_gem_sync(struct drm_gem_object *obj)
  163. {
  164. struct msm_gem_object *msm_obj;
  165. struct device *aspace_dev;
  166. if (!obj)
  167. return;
  168. msm_obj = to_msm_bo(obj);
  169. if (msm_obj->vram_node)
  170. return;
  171. /*
  172. * dma_sync_sg_for_device synchronises a single contiguous or
  173. * scatter/gather mapping for the CPU and device.
  174. */
  175. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  176. if (aspace_dev)
  177. dma_sync_sg_for_device(aspace_dev, msm_obj->sgt->sgl,
  178. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  179. else
  180. DRM_ERROR("failed to get aspace_device\n");
  181. }
  182. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  183. struct vm_area_struct *vma)
  184. {
  185. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  186. vma->vm_flags &= ~VM_PFNMAP;
  187. vma->vm_flags |= VM_MIXEDMAP;
  188. if (msm_obj->flags & MSM_BO_WC) {
  189. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  190. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  191. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  192. } else {
  193. /*
  194. * Shunt off cached objs to shmem file so they have their own
  195. * address_space (so unmap_mapping_range does what we want,
  196. * in particular in the case of mmap'd dmabufs)
  197. */
  198. fput(vma->vm_file);
  199. get_file(obj->filp);
  200. vma->vm_pgoff = 0;
  201. vma->vm_file = obj->filp;
  202. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  203. }
  204. return 0;
  205. }
  206. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  207. {
  208. int ret;
  209. ret = drm_gem_mmap(filp, vma);
  210. if (ret) {
  211. DBG("mmap failed: %d", ret);
  212. return ret;
  213. }
  214. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  215. }
  216. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  217. static vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  218. #else
  219. vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  220. #endif
  221. {
  222. struct vm_area_struct *vma = vmf->vma;
  223. struct drm_gem_object *obj = vma->vm_private_data;
  224. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  225. struct page **pages;
  226. unsigned long pfn;
  227. pgoff_t pgoff;
  228. int err;
  229. vm_fault_t ret;
  230. /*
  231. * vm_ops.open/drm_gem_mmap_obj and close get and put
  232. * a reference on obj. So, we dont need to hold one here.
  233. */
  234. err = mutex_lock_interruptible(&msm_obj->lock);
  235. if (err) {
  236. ret = VM_FAULT_NOPAGE;
  237. goto out;
  238. }
  239. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  240. mutex_unlock(&msm_obj->lock);
  241. return VM_FAULT_SIGBUS;
  242. }
  243. /* make sure we have pages attached now */
  244. pages = get_pages(obj);
  245. if (IS_ERR(pages)) {
  246. ret = vmf_error(PTR_ERR(pages));
  247. goto out_unlock;
  248. }
  249. /* We don't use vmf->pgoff since that has the fake offset: */
  250. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  251. pfn = page_to_pfn(pages[pgoff]);
  252. VERB("Inserting %pK pfn %lx, pa %lx", (void *)vmf->address,
  253. pfn, pfn << PAGE_SHIFT);
  254. ret = vmf_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  255. out_unlock:
  256. mutex_unlock(&msm_obj->lock);
  257. out:
  258. return ret;
  259. }
  260. /** get mmap offset */
  261. static uint64_t mmap_offset(struct drm_gem_object *obj)
  262. {
  263. struct drm_device *dev = obj->dev;
  264. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  265. int ret;
  266. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  267. /* Make it mmapable */
  268. ret = drm_gem_create_mmap_offset(obj);
  269. if (ret) {
  270. DISP_DEV_ERR(dev->dev, "could not allocate mmap offset\n");
  271. return 0;
  272. }
  273. return drm_vma_node_offset_addr(&obj->vma_node);
  274. }
  275. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  276. {
  277. uint64_t offset;
  278. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  279. mutex_lock(&msm_obj->lock);
  280. offset = mmap_offset(obj);
  281. mutex_unlock(&msm_obj->lock);
  282. return offset;
  283. }
  284. dma_addr_t msm_gem_get_dma_addr(struct drm_gem_object *obj)
  285. {
  286. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  287. struct sg_table *sgt;
  288. if (!msm_obj->sgt) {
  289. sgt = dma_buf_map_attachment(obj->import_attach,
  290. DMA_BIDIRECTIONAL);
  291. if (IS_ERR_OR_NULL(sgt)) {
  292. DRM_ERROR("dma_buf_map_attachment failure, err=%ld\n",
  293. PTR_ERR(sgt));
  294. return 0;
  295. }
  296. msm_obj->sgt = sgt;
  297. }
  298. return sg_phys(msm_obj->sgt->sgl);
  299. }
  300. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  301. struct msm_gem_address_space *aspace)
  302. {
  303. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  304. struct msm_gem_vma *vma;
  305. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  306. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  307. if (!vma)
  308. return ERR_PTR(-ENOMEM);
  309. vma->aspace = aspace;
  310. msm_obj->aspace = aspace;
  311. list_add_tail(&vma->list, &msm_obj->vmas);
  312. return vma;
  313. }
  314. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  315. struct msm_gem_address_space *aspace)
  316. {
  317. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  318. struct msm_gem_vma *vma;
  319. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  320. list_for_each_entry(vma, &msm_obj->vmas, list) {
  321. if (vma->aspace == aspace)
  322. return vma;
  323. }
  324. return NULL;
  325. }
  326. static void del_vma(struct msm_gem_vma *vma)
  327. {
  328. if (!vma)
  329. return;
  330. list_del(&vma->list);
  331. kfree(vma);
  332. }
  333. /* Called with msm_obj->lock locked */
  334. static void
  335. put_iova(struct drm_gem_object *obj)
  336. {
  337. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  338. struct msm_gem_vma *vma, *tmp;
  339. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  340. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  341. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  342. msm_obj->flags);
  343. /*
  344. * put_iova removes the domain connected to the obj which makes
  345. * the aspace inaccessible. Store the aspace, as it is used to
  346. * update the active_list during gem_free_obj and gem_purge.
  347. */
  348. msm_obj->aspace = vma->aspace;
  349. del_vma(vma);
  350. }
  351. }
  352. /* get iova, taking a reference. Should have a matching put */
  353. static int msm_gem_get_iova_locked(struct drm_gem_object *obj,
  354. struct msm_gem_address_space *aspace, uint64_t *iova)
  355. {
  356. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  357. struct msm_gem_vma *vma;
  358. int ret = 0;
  359. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  360. vma = lookup_vma(obj, aspace);
  361. if (!vma) {
  362. struct page **pages;
  363. struct device *dev;
  364. struct dma_buf *dmabuf;
  365. bool reattach = false;
  366. unsigned long dma_map_attrs;
  367. dev = msm_gem_get_aspace_device(aspace);
  368. if ((dev && obj->import_attach) &&
  369. ((dev != obj->import_attach->dev) ||
  370. msm_obj->obj_dirty)) {
  371. if (of_device_is_compatible(dev->of_node, "qcom,smmu_sde_unsec") &&
  372. of_device_is_compatible(obj->import_attach->dev->of_node,
  373. "qcom,smmu_sde_sec")) {
  374. SDE_EVT32(obj->import_attach->dev, dev, msm_obj->sgt,
  375. msm_obj->obj_dirty);
  376. DRM_ERROR("gem obj found mapped to %s, now requesting map on %s",
  377. dev_name(obj->import_attach->dev), dev_name(dev));
  378. return -EINVAL;
  379. }
  380. dmabuf = obj->import_attach->dmabuf;
  381. dma_map_attrs = obj->import_attach->dma_map_attrs;
  382. DRM_DEBUG("detach nsec-dev:%pK attach sec-dev:%pK\n",
  383. obj->import_attach->dev, dev);
  384. SDE_EVT32(obj->import_attach->dev, dev, msm_obj->sgt,
  385. msm_obj->obj_dirty);
  386. if (msm_obj->sgt)
  387. dma_buf_unmap_attachment(obj->import_attach,
  388. msm_obj->sgt, DMA_BIDIRECTIONAL);
  389. dma_buf_detach(dmabuf, obj->import_attach);
  390. obj->import_attach = dma_buf_attach(dmabuf, dev);
  391. if (IS_ERR(obj->import_attach)) {
  392. DRM_ERROR("dma_buf_attach failure, err=%ld\n",
  393. PTR_ERR(obj->import_attach));
  394. ret = PTR_ERR(obj->import_attach);
  395. return ret;
  396. }
  397. /*
  398. * obj->import_attach is created as part of dma_buf_attach.
  399. * Re-apply the dma_map_attr in this case to be in sync
  400. * with iommu_map attrs during map_attachment callback.
  401. */
  402. obj->import_attach->dma_map_attrs |= dma_map_attrs;
  403. msm_obj->obj_dirty = false;
  404. reattach = true;
  405. }
  406. /* perform delayed import for buffers without existing sgt */
  407. if (((msm_obj->flags & MSM_BO_EXTBUF) && !(msm_obj->sgt))
  408. || reattach) {
  409. ret = msm_gem_delayed_import(obj);
  410. if (ret) {
  411. DRM_ERROR("delayed dma-buf import failed %d\n",
  412. ret);
  413. msm_obj->obj_dirty = true;
  414. return ret;
  415. }
  416. }
  417. vma = add_vma(obj, aspace);
  418. if (IS_ERR(vma)) {
  419. ret = PTR_ERR(vma);
  420. return ret;
  421. }
  422. pages = get_pages(obj);
  423. if (IS_ERR(pages)) {
  424. ret = PTR_ERR(pages);
  425. goto fail;
  426. }
  427. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  428. obj->size >> PAGE_SHIFT,
  429. msm_obj->flags);
  430. if (ret)
  431. goto fail;
  432. }
  433. *iova = vma->iova;
  434. if (aspace && !msm_obj->in_active_list) {
  435. mutex_lock(&aspace->list_lock);
  436. msm_gem_add_obj_to_aspace_active_list(aspace, obj);
  437. mutex_unlock(&aspace->list_lock);
  438. }
  439. return 0;
  440. fail:
  441. del_vma(vma);
  442. return ret;
  443. }
  444. int msm_gem_get_iova(struct drm_gem_object *obj,
  445. struct msm_gem_address_space *aspace, uint64_t *iova)
  446. {
  447. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  448. int ret;
  449. mutex_lock(&msm_obj->lock);
  450. ret = msm_gem_get_iova_locked(obj, aspace, iova);
  451. mutex_unlock(&msm_obj->lock);
  452. return ret;
  453. }
  454. /* get iova without taking a reference, used in places where you have
  455. * already done a 'msm_gem_get_iova()'.
  456. */
  457. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  458. struct msm_gem_address_space *aspace)
  459. {
  460. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  461. struct msm_gem_vma *vma;
  462. mutex_lock(&msm_obj->lock);
  463. vma = lookup_vma(obj, aspace);
  464. mutex_unlock(&msm_obj->lock);
  465. WARN_ON(!vma);
  466. return vma ? vma->iova : 0;
  467. }
  468. /*
  469. * Unpin a iova by updating the reference counts. The memory isn't actually
  470. * purged until something else (shrinker, mm_notifier, destroy, etc) decides
  471. * to get rid of it
  472. */
  473. void msm_gem_unpin_iova(struct drm_gem_object *obj,
  474. struct msm_gem_address_space *aspace)
  475. {
  476. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  477. struct msm_gem_vma *vma;
  478. mutex_lock(&msm_obj->lock);
  479. vma = lookup_vma(obj, aspace);
  480. if (!WARN_ON(!vma))
  481. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  482. msm_obj->flags);
  483. mutex_unlock(&msm_obj->lock);
  484. }
  485. void msm_gem_put_iova(struct drm_gem_object *obj,
  486. struct msm_gem_address_space *aspace)
  487. {
  488. // XXX TODO ..
  489. // NOTE: probably don't need a _locked() version.. we wouldn't
  490. // normally unmap here, but instead just mark that it could be
  491. // unmapped (if the iova refcnt drops to zero), but then later
  492. // if another _get_iova_locked() fails we can start unmapping
  493. // things that are no longer needed..
  494. }
  495. void msm_gem_aspace_domain_attach_detach_update(
  496. struct msm_gem_address_space *aspace,
  497. bool is_detach)
  498. {
  499. struct msm_gem_object *msm_obj;
  500. struct drm_gem_object *obj;
  501. struct aspace_client *aclient;
  502. int ret;
  503. uint64_t iova;
  504. if (!aspace)
  505. return;
  506. mutex_lock(&aspace->list_lock);
  507. if (is_detach) {
  508. /* Indicate to clients domain is getting detached */
  509. list_for_each_entry(aclient, &aspace->clients, list) {
  510. if (aclient->cb)
  511. aclient->cb(aclient->cb_data,
  512. is_detach);
  513. }
  514. /**
  515. * Unmap active buffers,
  516. * typically clients should do this when the callback is called,
  517. * but this needs to be done for the buffers which are not
  518. * attached to any planes.
  519. */
  520. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  521. obj = &msm_obj->base;
  522. if (obj->import_attach) {
  523. mutex_lock(&msm_obj->lock);
  524. put_iova(obj);
  525. msm_obj->obj_dirty = true;
  526. mutex_unlock(&msm_obj->lock);
  527. }
  528. }
  529. } else {
  530. /* map active buffers */
  531. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  532. obj = &msm_obj->base;
  533. ret = msm_gem_get_iova(obj, aspace, &iova);
  534. if (ret) {
  535. mutex_unlock(&aspace->list_lock);
  536. return;
  537. }
  538. }
  539. /* Indicate to clients domain is attached */
  540. list_for_each_entry(aclient, &aspace->clients, list) {
  541. if (aclient->cb)
  542. aclient->cb(aclient->cb_data,
  543. is_detach);
  544. }
  545. }
  546. mutex_unlock(&aspace->list_lock);
  547. }
  548. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  549. struct drm_mode_create_dumb *args)
  550. {
  551. args->pitch = align_pitch(args->width, args->bpp);
  552. args->size = PAGE_ALIGN(args->pitch * args->height);
  553. return msm_gem_new_handle(dev, file, args->size,
  554. MSM_BO_SCANOUT | MSM_BO_CACHED, &args->handle, "dumb");
  555. }
  556. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  557. uint32_t handle, uint64_t *offset)
  558. {
  559. struct drm_gem_object *obj;
  560. int ret = 0;
  561. /* GEM does all our handle to object mapping */
  562. obj = drm_gem_object_lookup(file, handle);
  563. if (obj == NULL) {
  564. ret = -ENOENT;
  565. goto fail;
  566. }
  567. *offset = msm_gem_mmap_offset(obj);
  568. drm_gem_object_put(obj);
  569. fail:
  570. return ret;
  571. }
  572. static void *get_vaddr(struct drm_gem_object *obj, unsigned madv)
  573. {
  574. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  575. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  576. struct iosys_map map;
  577. #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  578. struct dma_buf_map map;
  579. #endif
  580. int ret = 0;
  581. mutex_lock(&msm_obj->lock);
  582. if (WARN_ON(msm_obj->madv > madv)) {
  583. DISP_DEV_ERR(obj->dev->dev, "Invalid madv state: %u vs %u\n",
  584. msm_obj->madv, madv);
  585. mutex_unlock(&msm_obj->lock);
  586. return ERR_PTR(-EBUSY);
  587. }
  588. /* increment vmap_count *before* vmap() call, so shrinker can
  589. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  590. * This guarantees that we won't try to msm_gem_vunmap() this
  591. * same object from within the vmap() call (while we already
  592. * hold msm_obj->lock)
  593. */
  594. msm_obj->vmap_count++;
  595. if (!msm_obj->vaddr) {
  596. struct page **pages = get_pages(obj);
  597. if (IS_ERR(pages)) {
  598. ret = PTR_ERR(pages);
  599. goto fail;
  600. }
  601. if (obj->import_attach) {
  602. if (obj->dev && obj->dev->dev && !dev_is_dma_coherent(obj->dev->dev)) {
  603. ret = dma_buf_begin_cpu_access(
  604. obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  605. if (ret)
  606. goto fail;
  607. }
  608. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  609. ret = dma_buf_vmap(obj->import_attach->dmabuf, &map);
  610. if (ret)
  611. goto fail;
  612. msm_obj->vaddr = map.vaddr;
  613. #else
  614. msm_obj->vaddr = dma_buf_vmap(obj->import_attach->dmabuf);
  615. #endif
  616. } else {
  617. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  618. VM_MAP, PAGE_KERNEL);
  619. }
  620. if (msm_obj->vaddr == NULL) {
  621. ret = -ENOMEM;
  622. goto fail;
  623. }
  624. }
  625. mutex_unlock(&msm_obj->lock);
  626. return msm_obj->vaddr;
  627. fail:
  628. msm_obj->vmap_count--;
  629. mutex_unlock(&msm_obj->lock);
  630. return ERR_PTR(ret);
  631. }
  632. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  633. {
  634. return get_vaddr(obj, MSM_MADV_WILLNEED);
  635. }
  636. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  637. {
  638. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  639. mutex_lock(&msm_obj->lock);
  640. WARN_ON(msm_obj->vmap_count < 1);
  641. msm_obj->vmap_count--;
  642. mutex_unlock(&msm_obj->lock);
  643. }
  644. /* Update madvise status, returns true if not purged, else
  645. * false or -errno.
  646. */
  647. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  648. {
  649. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  650. mutex_lock(&msm_obj->lock);
  651. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  652. if (msm_obj->madv != __MSM_MADV_PURGED)
  653. msm_obj->madv = madv;
  654. madv = msm_obj->madv;
  655. mutex_unlock(&msm_obj->lock);
  656. return (madv != __MSM_MADV_PURGED);
  657. }
  658. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  659. {
  660. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  661. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  662. struct iosys_map map = IOSYS_MAP_INIT_VADDR(msm_obj->vaddr);
  663. #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  664. struct dma_buf_map map = DMA_BUF_MAP_INIT_VADDR(msm_obj->vaddr);
  665. #endif
  666. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  667. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  668. return;
  669. if (obj->import_attach) {
  670. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  671. dma_buf_vunmap(obj->import_attach->dmabuf, &map);
  672. dma_buf_end_cpu_access(obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  673. #else
  674. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  675. if (obj->dev && obj->dev->dev && !dev_is_dma_coherent(obj->dev->dev))
  676. dma_buf_end_cpu_access(obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  677. #endif
  678. } else {
  679. vunmap(msm_obj->vaddr);
  680. }
  681. msm_obj->vaddr = NULL;
  682. }
  683. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  684. {
  685. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  686. mutex_lock_nested(&msm_obj->lock, subclass);
  687. msm_gem_vunmap_locked(obj);
  688. mutex_unlock(&msm_obj->lock);
  689. }
  690. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  691. {
  692. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  693. bool write = !!(op & MSM_PREP_WRITE);
  694. unsigned long remain =
  695. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  696. long ret;
  697. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  698. ret = dma_resv_wait_timeout(msm_obj->resv, write, true, remain);
  699. #else
  700. ret = dma_resv_wait_timeout_rcu(msm_obj->resv, write, true, remain);
  701. #endif
  702. if (ret == 0)
  703. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  704. else if (ret < 0)
  705. return ret;
  706. /* TODO cache maintenance */
  707. return 0;
  708. }
  709. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  710. {
  711. /* TODO cache maintenance */
  712. return 0;
  713. }
  714. /* don't call directly! Use drm_gem_object_put() and friends */
  715. void msm_gem_free_object(struct drm_gem_object *obj)
  716. {
  717. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  718. struct drm_device *dev = obj->dev;
  719. struct msm_drm_private *priv = dev->dev_private;
  720. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  721. struct iosys_map map = IOSYS_MAP_INIT_VADDR(msm_obj->vaddr);
  722. #elif (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  723. struct dma_buf_map map = DMA_BUF_MAP_INIT_VADDR(msm_obj->vaddr);
  724. #endif
  725. /* object should not be on active list: */
  726. WARN_ON(is_active(msm_obj));
  727. mutex_lock(&priv->mm_lock);
  728. list_del(&msm_obj->mm_list);
  729. mutex_unlock(&priv->mm_lock);
  730. mutex_lock(&msm_obj->lock);
  731. put_iova(obj);
  732. if (msm_obj->aspace) {
  733. mutex_lock(&msm_obj->aspace->list_lock);
  734. msm_gem_remove_obj_from_aspace_active_list(msm_obj->aspace,
  735. obj);
  736. mutex_unlock(&msm_obj->aspace->list_lock);
  737. }
  738. if (obj->import_attach) {
  739. if (msm_obj->vaddr)
  740. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  741. dma_buf_vunmap(obj->import_attach->dmabuf, &map);
  742. #else
  743. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  744. #endif
  745. /* Don't drop the pages for imported dmabuf, as they are not
  746. * ours, just free the array we allocated:
  747. */
  748. if (msm_obj->pages)
  749. kvfree(msm_obj->pages);
  750. drm_prime_gem_destroy(obj, msm_obj->sgt);
  751. } else {
  752. msm_gem_vunmap_locked(obj);
  753. put_pages(obj);
  754. }
  755. if (msm_obj->resv == &msm_obj->_resv)
  756. dma_resv_fini(msm_obj->resv);
  757. drm_gem_object_release(obj);
  758. mutex_unlock(&msm_obj->lock);
  759. kfree(msm_obj);
  760. }
  761. /* convenience method to construct a GEM buffer object, and userspace handle */
  762. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  763. uint32_t size, uint32_t flags, uint32_t *handle,
  764. char *name)
  765. {
  766. struct drm_gem_object *obj;
  767. int ret;
  768. obj = msm_gem_new(dev, size, flags);
  769. if (IS_ERR(obj))
  770. return PTR_ERR(obj);
  771. if (name)
  772. msm_gem_object_set_name(obj, "%s", name);
  773. ret = drm_gem_handle_create(file, obj, handle);
  774. /* drop reference from allocate - handle holds it now */
  775. drm_gem_object_put(obj);
  776. return ret;
  777. }
  778. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  779. static const struct vm_operations_struct vm_ops = {
  780. .fault = msm_gem_fault,
  781. .open = drm_gem_vm_open,
  782. .close = drm_gem_vm_close,
  783. };
  784. static const struct drm_gem_object_funcs msm_gem_object_funcs = {
  785. .free = msm_gem_free_object,
  786. .pin = msm_gem_prime_pin,
  787. .unpin = msm_gem_prime_unpin,
  788. .get_sg_table = msm_gem_prime_get_sg_table,
  789. .vmap = msm_gem_prime_vmap,
  790. .vunmap = msm_gem_prime_vunmap,
  791. .vm_ops = &vm_ops,
  792. };
  793. #endif
  794. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  795. static int msm_gem_new_impl(struct drm_device *dev,
  796. uint32_t size, uint32_t flags,
  797. struct dma_resv *resv,
  798. struct drm_gem_object **obj)
  799. {
  800. #else
  801. static int msm_gem_new_impl(struct drm_device *dev,
  802. uint32_t size, uint32_t flags,
  803. struct dma_resv *resv,
  804. struct drm_gem_object **obj,
  805. bool struct_mutex_locked)
  806. {
  807. struct msm_drm_private *priv = dev->dev_private;
  808. #endif
  809. struct msm_gem_object *msm_obj;
  810. switch (flags & MSM_BO_CACHE_MASK) {
  811. case MSM_BO_UNCACHED:
  812. case MSM_BO_CACHED:
  813. case MSM_BO_WC:
  814. break;
  815. default:
  816. DISP_DEV_ERR(dev->dev, "invalid cache flag: %x\n",
  817. (flags & MSM_BO_CACHE_MASK));
  818. return -EINVAL;
  819. }
  820. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  821. if (!msm_obj)
  822. return -ENOMEM;
  823. mutex_init(&msm_obj->lock);
  824. msm_obj->flags = flags;
  825. msm_obj->madv = MSM_MADV_WILLNEED;
  826. if (resv) {
  827. msm_obj->resv = resv;
  828. } else {
  829. msm_obj->resv = &msm_obj->_resv;
  830. dma_resv_init(msm_obj->resv);
  831. }
  832. INIT_LIST_HEAD(&msm_obj->submit_entry);
  833. INIT_LIST_HEAD(&msm_obj->vmas);
  834. INIT_LIST_HEAD(&msm_obj->iova_list);
  835. msm_obj->aspace = msm_gem_smmu_address_space_get(dev,
  836. MSM_SMMU_DOMAIN_UNSECURE);
  837. if (IS_ERR(msm_obj->aspace))
  838. msm_obj->aspace = NULL;
  839. msm_obj->in_active_list = false;
  840. msm_obj->obj_dirty = false;
  841. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  842. mutex_lock(&priv->mm_lock);
  843. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  844. mutex_unlock(&priv->mm_lock);
  845. #endif
  846. *obj = &msm_obj->base;
  847. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  848. (*obj)->funcs = &msm_gem_object_funcs;
  849. #endif
  850. return 0;
  851. }
  852. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  853. struct drm_gem_object *msm_gem_new(struct drm_device *dev, uint32_t size, uint32_t flags)
  854. #else
  855. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  856. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  857. #endif
  858. {
  859. struct msm_drm_private *priv = dev->dev_private;
  860. struct msm_gem_object *msm_obj;
  861. struct drm_gem_object *obj = NULL;
  862. bool use_vram = false;
  863. int ret;
  864. size = PAGE_ALIGN(size);
  865. if (!iommu_present(&platform_bus_type))
  866. use_vram = true;
  867. else if ((flags & (MSM_BO_STOLEN | MSM_BO_SCANOUT)) && priv->vram.size)
  868. use_vram = true;
  869. if (WARN_ON(use_vram && !priv->vram.size))
  870. return ERR_PTR(-EINVAL);
  871. /* Disallow zero sized objects as they make the underlying
  872. * infrastructure grumpy
  873. */
  874. if (size == 0)
  875. return ERR_PTR(-EINVAL);
  876. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  877. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj);
  878. #else
  879. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  880. #endif
  881. if (ret)
  882. goto fail;
  883. msm_obj = to_msm_bo(obj);
  884. if (use_vram) {
  885. struct msm_gem_vma *vma;
  886. struct page **pages;
  887. mutex_lock(&msm_obj->lock);
  888. vma = add_vma(obj, NULL);
  889. mutex_unlock(&msm_obj->lock);
  890. if (IS_ERR(vma)) {
  891. ret = PTR_ERR(vma);
  892. goto fail;
  893. }
  894. to_msm_bo(obj)->vram_node = &vma->node;
  895. drm_gem_private_object_init(dev, obj, size);
  896. pages = get_pages(obj);
  897. if (IS_ERR(pages)) {
  898. ret = PTR_ERR(pages);
  899. goto fail;
  900. }
  901. vma->iova = physaddr(obj);
  902. } else {
  903. ret = drm_gem_object_init(dev, obj, size);
  904. if (ret)
  905. goto fail;
  906. /*
  907. * Our buffers are kept pinned, so allocating them from the
  908. * MOVABLE zone is a really bad idea, and conflicts with CMA.
  909. * See comments above new_inode() why this is required _and_
  910. * expected if you're going to pin these pages.
  911. */
  912. mapping_set_gfp_mask(obj->filp->f_mapping, GFP_HIGHUSER);
  913. }
  914. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  915. mutex_lock(&priv->mm_lock);
  916. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  917. mutex_unlock(&priv->mm_lock);
  918. #endif
  919. return obj;
  920. fail:
  921. drm_gem_object_put(obj);
  922. return ERR_PTR(ret);
  923. }
  924. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  925. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  926. uint32_t size, uint32_t flags)
  927. {
  928. return _msm_gem_new(dev, size, flags, true);
  929. }
  930. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  931. uint32_t size, uint32_t flags)
  932. {
  933. return _msm_gem_new(dev, size, flags, false);
  934. }
  935. #endif
  936. int msm_gem_delayed_import(struct drm_gem_object *obj)
  937. {
  938. struct dma_buf_attachment *attach;
  939. struct sg_table *sgt;
  940. struct msm_gem_object *msm_obj;
  941. int ret = 0;
  942. if (!obj) {
  943. DRM_ERROR("NULL drm gem object\n");
  944. return -EINVAL;
  945. }
  946. msm_obj = to_msm_bo(obj);
  947. if (!obj->import_attach) {
  948. DRM_ERROR("NULL dma_buf_attachment in drm gem object\n");
  949. return -EINVAL;
  950. }
  951. attach = obj->import_attach;
  952. attach->dma_map_attrs |= DMA_ATTR_DELAYED_UNMAP;
  953. /*
  954. * dma_buf_map_attachment will call dma_map_sg for ion buffer
  955. * mapping, and iova will get mapped when the function returns.
  956. */
  957. sgt = dma_buf_map_attachment(attach, DMA_BIDIRECTIONAL);
  958. if (IS_ERR(sgt)) {
  959. ret = PTR_ERR(sgt);
  960. DRM_ERROR("dma_buf_map_attachment failure, err=%d\n",
  961. ret);
  962. goto fail_import;
  963. }
  964. msm_obj->sgt = sgt;
  965. msm_obj->pages = NULL;
  966. fail_import:
  967. return ret;
  968. }
  969. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  970. struct dma_buf *dmabuf, struct sg_table *sgt)
  971. {
  972. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  973. struct msm_drm_private *priv = dev->dev_private;
  974. #endif
  975. struct msm_gem_object *msm_obj;
  976. struct drm_gem_object *obj = NULL;
  977. uint32_t size;
  978. int ret;
  979. size = PAGE_ALIGN(dmabuf->size);
  980. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  981. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj);
  982. #else
  983. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
  984. #endif
  985. if (ret)
  986. goto fail;
  987. drm_gem_private_object_init(dev, obj, size);
  988. msm_obj = to_msm_bo(obj);
  989. mutex_lock(&msm_obj->lock);
  990. msm_obj->sgt = sgt;
  991. msm_obj->pages = NULL;
  992. /*
  993. * 1) If sg table is NULL, user should call msm_gem_delayed_import
  994. * to add back the sg table to the drm gem object.
  995. *
  996. * 2) Add buffer flag unconditionally for all import cases.
  997. * # Cached buffer will be attached immediately hence sgt will
  998. * be available upon gem obj creation.
  999. * # Un-cached buffer will follow delayed attach hence sgt
  1000. * will be NULL upon gem obj creation.
  1001. */
  1002. msm_obj->flags |= MSM_BO_EXTBUF;
  1003. mutex_unlock(&msm_obj->lock);
  1004. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 15, 0))
  1005. mutex_lock(&priv->mm_lock);
  1006. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  1007. mutex_unlock(&priv->mm_lock);
  1008. #endif
  1009. return obj;
  1010. fail:
  1011. drm_gem_object_put(obj);
  1012. return ERR_PTR(ret);
  1013. }
  1014. #if (LINUX_VERSION_CODE < KERNEL_VERSION(5, 15, 0))
  1015. static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1016. uint32_t flags, struct msm_gem_address_space *aspace,
  1017. struct drm_gem_object **bo, uint64_t *iova, bool locked)
  1018. {
  1019. void *vaddr;
  1020. struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
  1021. int ret;
  1022. if (IS_ERR(obj))
  1023. return ERR_CAST(obj);
  1024. if (iova) {
  1025. ret = msm_gem_get_iova(obj, aspace, iova);
  1026. if (ret)
  1027. goto err;
  1028. }
  1029. vaddr = msm_gem_get_vaddr(obj);
  1030. if (IS_ERR(vaddr)) {
  1031. msm_gem_put_iova(obj, aspace);
  1032. ret = PTR_ERR(vaddr);
  1033. goto err;
  1034. }
  1035. if (bo)
  1036. *bo = obj;
  1037. return vaddr;
  1038. err:
  1039. if (locked)
  1040. drm_gem_object_put_locked(obj);
  1041. else
  1042. drm_gem_object_put(obj);
  1043. return ERR_PTR(ret);
  1044. }
  1045. void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1046. uint32_t flags, struct msm_gem_address_space *aspace,
  1047. struct drm_gem_object **bo, uint64_t *iova)
  1048. {
  1049. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
  1050. }
  1051. void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
  1052. uint32_t flags, struct msm_gem_address_space *aspace,
  1053. struct drm_gem_object **bo, uint64_t *iova)
  1054. {
  1055. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
  1056. }
  1057. void msm_gem_kernel_put(struct drm_gem_object *bo,
  1058. struct msm_gem_address_space *aspace, bool locked)
  1059. {
  1060. if (IS_ERR_OR_NULL(bo))
  1061. return;
  1062. msm_gem_put_vaddr(bo);
  1063. msm_gem_unpin_iova(bo, aspace);
  1064. if (locked)
  1065. drm_gem_object_put_locked(bo);
  1066. else
  1067. drm_gem_object_put(bo);
  1068. }
  1069. #endif
  1070. void msm_gem_object_set_name(struct drm_gem_object *bo, const char *fmt, ...)
  1071. {
  1072. struct msm_gem_object *msm_obj = to_msm_bo(bo);
  1073. va_list ap;
  1074. if (!fmt)
  1075. return;
  1076. va_start(ap, fmt);
  1077. vsnprintf(msm_obj->name, sizeof(msm_obj->name), fmt, ap);
  1078. va_end(ap);
  1079. }
  1080. void msm_gem_put_buffer(struct drm_gem_object *gem)
  1081. {
  1082. struct msm_gem_object *msm_gem;
  1083. if (!gem)
  1084. return;
  1085. msm_gem = to_msm_bo(gem);
  1086. msm_gem_put_iova(gem, msm_gem->aspace);
  1087. msm_gem_put_vaddr(gem);
  1088. }
  1089. int msm_gem_get_buffer(struct drm_gem_object *gem,
  1090. struct drm_device *dev, struct drm_framebuffer *fb,
  1091. uint32_t align_size)
  1092. {
  1093. struct msm_gem_object *msm_gem;
  1094. uint32_t size;
  1095. uint64_t iova_aligned;
  1096. int ret = -EINVAL;
  1097. if (!gem) {
  1098. DRM_ERROR("invalid drm gem");
  1099. return ret;
  1100. }
  1101. msm_gem = to_msm_bo(gem);
  1102. size = PAGE_ALIGN(gem->size);
  1103. if (size < (align_size + GUARD_BYTES)) {
  1104. DRM_ERROR("invalid gem size");
  1105. goto exit;
  1106. }
  1107. msm_gem_smmu_address_space_get(dev, MSM_SMMU_DOMAIN_UNSECURE);
  1108. if (PTR_ERR(msm_gem->aspace) == -ENODEV) {
  1109. DRM_DEBUG("IOMMU not present, relying on VRAM.");
  1110. } else if (IS_ERR_OR_NULL(msm_gem->aspace)) {
  1111. ret = PTR_ERR(msm_gem->aspace);
  1112. DRM_ERROR("failed to get aspace");
  1113. goto exit;
  1114. }
  1115. ret = msm_gem_get_iova(gem, msm_gem->aspace, &msm_gem->iova);
  1116. if (ret) {
  1117. DRM_ERROR("failed to get the iova ret %d", ret);
  1118. goto exit;
  1119. }
  1120. msm_gem_get_vaddr(gem);
  1121. if (IS_ERR_OR_NULL(msm_gem->vaddr)) {
  1122. DRM_ERROR("failed to get vaddr");
  1123. goto exit;
  1124. }
  1125. iova_aligned = (msm_gem->iova + GUARD_BYTES) & ALIGNED_OFFSET;
  1126. msm_gem->offset = iova_aligned - msm_gem->iova;
  1127. msm_gem->iova = msm_gem->iova + msm_gem->offset;
  1128. return 0;
  1129. exit:
  1130. msm_gem_put_buffer(gem);
  1131. return ret;
  1132. }
  1133. #if (LINUX_VERSION_CODE >= KERNEL_VERSION(5, 19, 0))
  1134. MODULE_IMPORT_NS(DMA_BUF);
  1135. #endif