msm_gem.c 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428
  1. /*
  2. * Copyright (c) 2018-2021, The Linux Foundation. All rights reserved.
  3. * Copyright (C) 2013 Red Hat
  4. * Author: Rob Clark <[email protected]>
  5. *
  6. * This program is free software; you can redistribute it and/or modify it
  7. * under the terms of the GNU General Public License version 2 as published by
  8. * the Free Software Foundation.
  9. *
  10. * This program is distributed in the hope that it will be useful, but WITHOUT
  11. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  12. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  13. * more details.
  14. *
  15. * You should have received a copy of the GNU General Public License along with
  16. * this program. If not, see <http://www.gnu.org/licenses/>.
  17. */
  18. #include <linux/spinlock.h>
  19. #include <linux/shmem_fs.h>
  20. #include <linux/dma-buf.h>
  21. #include <linux/pfn_t.h>
  22. #include <linux/ion.h>
  23. #include "msm_drv.h"
  24. #include "msm_gem.h"
  25. #include "msm_mmu.h"
  26. #include "sde_dbg.h"
  27. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  28. static dma_addr_t physaddr(struct drm_gem_object *obj)
  29. {
  30. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  31. struct msm_drm_private *priv = obj->dev->dev_private;
  32. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  33. priv->vram.paddr;
  34. }
  35. static bool use_pages(struct drm_gem_object *obj)
  36. {
  37. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  38. return !msm_obj->vram_node;
  39. }
  40. /* allocate pages from VRAM carveout, used when no IOMMU: */
  41. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  42. {
  43. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  44. struct msm_drm_private *priv = obj->dev->dev_private;
  45. dma_addr_t paddr;
  46. struct page **p;
  47. int ret, i;
  48. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  49. if (!p)
  50. return ERR_PTR(-ENOMEM);
  51. spin_lock(&priv->vram.lock);
  52. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  53. spin_unlock(&priv->vram.lock);
  54. if (ret) {
  55. kvfree(p);
  56. return ERR_PTR(ret);
  57. }
  58. paddr = physaddr(obj);
  59. for (i = 0; i < npages; i++) {
  60. p[i] = phys_to_page(paddr);
  61. paddr += PAGE_SIZE;
  62. }
  63. return p;
  64. }
  65. static struct page **get_pages(struct drm_gem_object *obj)
  66. {
  67. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  68. struct device *aspace_dev;
  69. if (obj->import_attach)
  70. return msm_obj->pages;
  71. if (!msm_obj->pages) {
  72. struct drm_device *dev = obj->dev;
  73. struct page **p;
  74. int npages = obj->size >> PAGE_SHIFT;
  75. if (use_pages(obj))
  76. p = drm_gem_get_pages(obj);
  77. else
  78. p = get_pages_vram(obj, npages);
  79. if (IS_ERR(p)) {
  80. dev_err(dev->dev, "could not get pages: %ld\n",
  81. PTR_ERR(p));
  82. return p;
  83. }
  84. msm_obj->pages = p;
  85. msm_obj->sgt = drm_prime_pages_to_sg(dev, p, npages);
  86. if (IS_ERR(msm_obj->sgt)) {
  87. void *ptr = ERR_CAST(msm_obj->sgt);
  88. dev_err(dev->dev, "failed to allocate sgt\n");
  89. msm_obj->sgt = NULL;
  90. return ptr;
  91. }
  92. if (msm_obj->vram_node) {
  93. goto end;
  94. /*
  95. * For non-cached buffers, ensure the new pages are clean
  96. * because display controller, GPU, etc. are not coherent
  97. */
  98. } else if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED)) {
  99. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  100. if (aspace_dev) {
  101. dma_map_sg(aspace_dev, msm_obj->sgt->sgl,
  102. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  103. /* mark the buffer as external buffer */
  104. msm_obj->flags |= MSM_BO_EXTBUF;
  105. } else {
  106. DRM_ERROR("failed to get aspace_device\n");
  107. }
  108. }
  109. }
  110. end:
  111. return msm_obj->pages;
  112. }
  113. static void put_pages_vram(struct drm_gem_object *obj)
  114. {
  115. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  116. struct msm_drm_private *priv = obj->dev->dev_private;
  117. spin_lock(&priv->vram.lock);
  118. drm_mm_remove_node(msm_obj->vram_node);
  119. spin_unlock(&priv->vram.lock);
  120. kvfree(msm_obj->pages);
  121. }
  122. static void put_pages(struct drm_gem_object *obj)
  123. {
  124. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  125. if (msm_obj->pages) {
  126. if (msm_obj->sgt) {
  127. sg_free_table(msm_obj->sgt);
  128. kfree(msm_obj->sgt);
  129. }
  130. if (use_pages(obj))
  131. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  132. else
  133. put_pages_vram(obj);
  134. msm_obj->pages = NULL;
  135. }
  136. }
  137. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  138. {
  139. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  140. struct page **p;
  141. mutex_lock(&msm_obj->lock);
  142. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  143. mutex_unlock(&msm_obj->lock);
  144. return ERR_PTR(-EBUSY);
  145. }
  146. p = get_pages(obj);
  147. mutex_unlock(&msm_obj->lock);
  148. return p;
  149. }
  150. void msm_gem_put_pages(struct drm_gem_object *obj)
  151. {
  152. /* when we start tracking the pin count, then do something here */
  153. }
  154. void msm_gem_sync(struct drm_gem_object *obj)
  155. {
  156. struct msm_gem_object *msm_obj;
  157. struct device *aspace_dev;
  158. if (!obj)
  159. return;
  160. msm_obj = to_msm_bo(obj);
  161. if (msm_obj->vram_node)
  162. return;
  163. /*
  164. * dma_sync_sg_for_device synchronises a single contiguous or
  165. * scatter/gather mapping for the CPU and device.
  166. */
  167. aspace_dev = msm_gem_get_aspace_device(msm_obj->aspace);
  168. if (aspace_dev)
  169. dma_sync_sg_for_device(aspace_dev, msm_obj->sgt->sgl,
  170. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  171. else
  172. DRM_ERROR("failed to get aspace_device\n");
  173. }
  174. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  175. struct vm_area_struct *vma)
  176. {
  177. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  178. vma->vm_flags &= ~VM_PFNMAP;
  179. vma->vm_flags |= VM_MIXEDMAP;
  180. if (msm_obj->flags & MSM_BO_WC) {
  181. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  182. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  183. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  184. } else {
  185. /*
  186. * Shunt off cached objs to shmem file so they have their own
  187. * address_space (so unmap_mapping_range does what we want,
  188. * in particular in the case of mmap'd dmabufs)
  189. */
  190. fput(vma->vm_file);
  191. get_file(obj->filp);
  192. vma->vm_pgoff = 0;
  193. vma->vm_file = obj->filp;
  194. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  195. }
  196. return 0;
  197. }
  198. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  199. {
  200. int ret;
  201. ret = drm_gem_mmap(filp, vma);
  202. if (ret) {
  203. DBG("mmap failed: %d", ret);
  204. return ret;
  205. }
  206. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  207. }
  208. vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  209. {
  210. struct vm_area_struct *vma = vmf->vma;
  211. struct drm_gem_object *obj = vma->vm_private_data;
  212. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  213. struct page **pages;
  214. unsigned long pfn;
  215. pgoff_t pgoff;
  216. int err;
  217. vm_fault_t ret;
  218. /*
  219. * vm_ops.open/drm_gem_mmap_obj and close get and put
  220. * a reference on obj. So, we dont need to hold one here.
  221. */
  222. err = mutex_lock_interruptible(&msm_obj->lock);
  223. if (err) {
  224. ret = VM_FAULT_NOPAGE;
  225. goto out;
  226. }
  227. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  228. mutex_unlock(&msm_obj->lock);
  229. return VM_FAULT_SIGBUS;
  230. }
  231. /* make sure we have pages attached now */
  232. pages = get_pages(obj);
  233. if (IS_ERR(pages)) {
  234. ret = vmf_error(PTR_ERR(pages));
  235. goto out_unlock;
  236. }
  237. /* We don't use vmf->pgoff since that has the fake offset: */
  238. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  239. pfn = page_to_pfn(pages[pgoff]);
  240. VERB("Inserting %pK pfn %lx, pa %lx", (void *)vmf->address,
  241. pfn, pfn << PAGE_SHIFT);
  242. ret = vmf_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  243. out_unlock:
  244. mutex_unlock(&msm_obj->lock);
  245. out:
  246. return ret;
  247. }
  248. /** get mmap offset */
  249. static uint64_t mmap_offset(struct drm_gem_object *obj)
  250. {
  251. struct drm_device *dev = obj->dev;
  252. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  253. int ret;
  254. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  255. /* Make it mmapable */
  256. ret = drm_gem_create_mmap_offset(obj);
  257. if (ret) {
  258. dev_err(dev->dev, "could not allocate mmap offset\n");
  259. return 0;
  260. }
  261. return drm_vma_node_offset_addr(&obj->vma_node);
  262. }
  263. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  264. {
  265. uint64_t offset;
  266. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  267. mutex_lock(&msm_obj->lock);
  268. offset = mmap_offset(obj);
  269. mutex_unlock(&msm_obj->lock);
  270. return offset;
  271. }
  272. dma_addr_t msm_gem_get_dma_addr(struct drm_gem_object *obj)
  273. {
  274. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  275. struct sg_table *sgt;
  276. if (!msm_obj->sgt) {
  277. sgt = dma_buf_map_attachment(obj->import_attach,
  278. DMA_BIDIRECTIONAL);
  279. if (IS_ERR_OR_NULL(sgt)) {
  280. DRM_ERROR("dma_buf_map_attachment failure, err=%ld\n",
  281. PTR_ERR(sgt));
  282. return 0;
  283. }
  284. msm_obj->sgt = sgt;
  285. }
  286. return sg_phys(msm_obj->sgt->sgl);
  287. }
  288. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  289. struct msm_gem_address_space *aspace)
  290. {
  291. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  292. struct msm_gem_vma *vma;
  293. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  294. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  295. if (!vma)
  296. return ERR_PTR(-ENOMEM);
  297. vma->aspace = aspace;
  298. msm_obj->aspace = aspace;
  299. list_add_tail(&vma->list, &msm_obj->vmas);
  300. return vma;
  301. }
  302. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  303. struct msm_gem_address_space *aspace)
  304. {
  305. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  306. struct msm_gem_vma *vma;
  307. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  308. list_for_each_entry(vma, &msm_obj->vmas, list) {
  309. if (vma->aspace == aspace)
  310. return vma;
  311. }
  312. return NULL;
  313. }
  314. static void del_vma(struct msm_gem_vma *vma)
  315. {
  316. if (!vma)
  317. return;
  318. list_del(&vma->list);
  319. kfree(vma);
  320. }
  321. /* Called with msm_obj->lock locked */
  322. static void
  323. put_iova(struct drm_gem_object *obj)
  324. {
  325. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  326. struct msm_gem_vma *vma, *tmp;
  327. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  328. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  329. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  330. msm_obj->flags);
  331. /*
  332. * put_iova removes the domain connected to the obj which makes
  333. * the aspace inaccessible. Store the aspace, as it is used to
  334. * update the active_list during gem_free_obj and gem_purge.
  335. */
  336. msm_obj->aspace = vma->aspace;
  337. del_vma(vma);
  338. }
  339. }
  340. /* get iova, taking a reference. Should have a matching put */
  341. static int msm_gem_get_iova_locked(struct drm_gem_object *obj,
  342. struct msm_gem_address_space *aspace, uint64_t *iova)
  343. {
  344. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  345. struct msm_gem_vma *vma;
  346. int ret = 0;
  347. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  348. vma = lookup_vma(obj, aspace);
  349. if (!vma) {
  350. struct page **pages;
  351. struct device *dev;
  352. struct dma_buf *dmabuf;
  353. bool reattach = false;
  354. unsigned long dma_map_attrs;
  355. dev = msm_gem_get_aspace_device(aspace);
  356. if ((dev && obj->import_attach) &&
  357. ((dev != obj->import_attach->dev) ||
  358. msm_obj->obj_dirty)) {
  359. dmabuf = obj->import_attach->dmabuf;
  360. dma_map_attrs = obj->import_attach->dma_map_attrs;
  361. DRM_DEBUG("detach nsec-dev:%pK attach sec-dev:%pK\n",
  362. obj->import_attach->dev, dev);
  363. SDE_EVT32(obj->import_attach->dev, dev, msm_obj->sgt,
  364. msm_obj->obj_dirty);
  365. if (msm_obj->sgt)
  366. dma_buf_unmap_attachment(obj->import_attach,
  367. msm_obj->sgt, DMA_BIDIRECTIONAL);
  368. dma_buf_detach(dmabuf, obj->import_attach);
  369. obj->import_attach = dma_buf_attach(dmabuf, dev);
  370. if (IS_ERR(obj->import_attach)) {
  371. DRM_ERROR("dma_buf_attach failure, err=%ld\n",
  372. PTR_ERR(obj->import_attach));
  373. ret = PTR_ERR(obj->import_attach);
  374. return ret;
  375. }
  376. /*
  377. * obj->import_attach is created as part of dma_buf_attach.
  378. * Re-apply the dma_map_attr in this case to be in sync
  379. * with iommu_map attrs during map_attachment callback.
  380. */
  381. obj->import_attach->dma_map_attrs |= dma_map_attrs;
  382. msm_obj->obj_dirty = false;
  383. reattach = true;
  384. }
  385. /* perform delayed import for buffers without existing sgt */
  386. if (((msm_obj->flags & MSM_BO_EXTBUF) && !(msm_obj->sgt))
  387. || reattach) {
  388. ret = msm_gem_delayed_import(obj);
  389. if (ret) {
  390. DRM_ERROR("delayed dma-buf import failed %d\n",
  391. ret);
  392. return ret;
  393. }
  394. }
  395. vma = add_vma(obj, aspace);
  396. if (IS_ERR(vma)) {
  397. ret = PTR_ERR(vma);
  398. return ret;
  399. }
  400. pages = get_pages(obj);
  401. if (IS_ERR(pages)) {
  402. ret = PTR_ERR(pages);
  403. goto fail;
  404. }
  405. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  406. obj->size >> PAGE_SHIFT,
  407. msm_obj->flags);
  408. if (ret)
  409. goto fail;
  410. }
  411. *iova = vma->iova;
  412. if (aspace && !msm_obj->in_active_list) {
  413. mutex_lock(&aspace->list_lock);
  414. msm_gem_add_obj_to_aspace_active_list(aspace, obj);
  415. mutex_unlock(&aspace->list_lock);
  416. }
  417. return 0;
  418. fail:
  419. del_vma(vma);
  420. return ret;
  421. }
  422. static int msm_gem_pin_iova(struct drm_gem_object *obj,
  423. struct msm_gem_address_space *aspace)
  424. {
  425. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  426. struct msm_gem_vma *vma;
  427. struct page **pages;
  428. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  429. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED))
  430. return -EBUSY;
  431. vma = lookup_vma(obj, aspace);
  432. if (WARN_ON(!vma))
  433. return -EINVAL;
  434. pages = get_pages(obj);
  435. if (IS_ERR(pages))
  436. return PTR_ERR(pages);
  437. return msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  438. obj->size >> PAGE_SHIFT, msm_obj->flags);
  439. }
  440. /* get iova and pin it. Should have a matching put */
  441. int msm_gem_get_and_pin_iova(struct drm_gem_object *obj,
  442. struct msm_gem_address_space *aspace, uint64_t *iova)
  443. {
  444. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  445. u64 local;
  446. int ret;
  447. mutex_lock(&msm_obj->lock);
  448. ret = msm_gem_get_iova_locked(obj, aspace, &local);
  449. if (!ret)
  450. ret = msm_gem_pin_iova(obj, aspace);
  451. if (!ret)
  452. *iova = local;
  453. mutex_unlock(&msm_obj->lock);
  454. return ret;
  455. }
  456. int msm_gem_get_iova(struct drm_gem_object *obj,
  457. struct msm_gem_address_space *aspace, uint64_t *iova)
  458. {
  459. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  460. int ret;
  461. mutex_lock(&msm_obj->lock);
  462. ret = msm_gem_get_iova_locked(obj, aspace, iova);
  463. mutex_unlock(&msm_obj->lock);
  464. return ret;
  465. }
  466. /* get iova without taking a reference, used in places where you have
  467. * already done a 'msm_gem_get_iova()'.
  468. */
  469. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  470. struct msm_gem_address_space *aspace)
  471. {
  472. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  473. struct msm_gem_vma *vma;
  474. mutex_lock(&msm_obj->lock);
  475. vma = lookup_vma(obj, aspace);
  476. mutex_unlock(&msm_obj->lock);
  477. WARN_ON(!vma);
  478. return vma ? vma->iova : 0;
  479. }
  480. /*
  481. * Unpin a iova by updating the reference counts. The memory isn't actually
  482. * purged until something else (shrinker, mm_notifier, destroy, etc) decides
  483. * to get rid of it
  484. */
  485. void msm_gem_unpin_iova(struct drm_gem_object *obj,
  486. struct msm_gem_address_space *aspace)
  487. {
  488. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  489. struct msm_gem_vma *vma;
  490. mutex_lock(&msm_obj->lock);
  491. vma = lookup_vma(obj, aspace);
  492. if (!WARN_ON(!vma))
  493. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt,
  494. msm_obj->flags);
  495. mutex_unlock(&msm_obj->lock);
  496. }
  497. void msm_gem_put_iova(struct drm_gem_object *obj,
  498. struct msm_gem_address_space *aspace)
  499. {
  500. // XXX TODO ..
  501. // NOTE: probably don't need a _locked() version.. we wouldn't
  502. // normally unmap here, but instead just mark that it could be
  503. // unmapped (if the iova refcnt drops to zero), but then later
  504. // if another _get_iova_locked() fails we can start unmapping
  505. // things that are no longer needed..
  506. }
  507. void msm_gem_aspace_domain_attach_detach_update(
  508. struct msm_gem_address_space *aspace,
  509. bool is_detach)
  510. {
  511. struct msm_gem_object *msm_obj;
  512. struct drm_gem_object *obj;
  513. struct aspace_client *aclient;
  514. int ret;
  515. uint64_t iova;
  516. if (!aspace)
  517. return;
  518. mutex_lock(&aspace->list_lock);
  519. if (is_detach) {
  520. /* Indicate to clients domain is getting detached */
  521. list_for_each_entry(aclient, &aspace->clients, list) {
  522. if (aclient->cb)
  523. aclient->cb(aclient->cb_data,
  524. is_detach);
  525. }
  526. /**
  527. * Unmap active buffers,
  528. * typically clients should do this when the callback is called,
  529. * but this needs to be done for the buffers which are not
  530. * attached to any planes.
  531. */
  532. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  533. obj = &msm_obj->base;
  534. if (obj->import_attach) {
  535. mutex_lock(&msm_obj->lock);
  536. put_iova(obj);
  537. msm_obj->obj_dirty = true;
  538. mutex_unlock(&msm_obj->lock);
  539. }
  540. }
  541. } else {
  542. /* map active buffers */
  543. list_for_each_entry(msm_obj, &aspace->active_list, iova_list) {
  544. obj = &msm_obj->base;
  545. ret = msm_gem_get_iova(obj, aspace, &iova);
  546. if (ret) {
  547. mutex_unlock(&aspace->list_lock);
  548. return;
  549. }
  550. }
  551. /* Indicate to clients domain is attached */
  552. list_for_each_entry(aclient, &aspace->clients, list) {
  553. if (aclient->cb)
  554. aclient->cb(aclient->cb_data,
  555. is_detach);
  556. }
  557. }
  558. mutex_unlock(&aspace->list_lock);
  559. }
  560. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  561. struct drm_mode_create_dumb *args)
  562. {
  563. args->pitch = align_pitch(args->width, args->bpp);
  564. args->size = PAGE_ALIGN(args->pitch * args->height);
  565. return msm_gem_new_handle(dev, file, args->size,
  566. MSM_BO_SCANOUT | MSM_BO_WC, &args->handle, "dumb");
  567. }
  568. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  569. uint32_t handle, uint64_t *offset)
  570. {
  571. struct drm_gem_object *obj;
  572. int ret = 0;
  573. /* GEM does all our handle to object mapping */
  574. obj = drm_gem_object_lookup(file, handle);
  575. if (obj == NULL) {
  576. ret = -ENOENT;
  577. goto fail;
  578. }
  579. *offset = msm_gem_mmap_offset(obj);
  580. drm_gem_object_put(obj);
  581. fail:
  582. return ret;
  583. }
  584. static void *get_vaddr(struct drm_gem_object *obj, unsigned madv)
  585. {
  586. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  587. int ret = 0;
  588. mutex_lock(&msm_obj->lock);
  589. if (WARN_ON(msm_obj->madv > madv)) {
  590. dev_err(obj->dev->dev, "Invalid madv state: %u vs %u\n",
  591. msm_obj->madv, madv);
  592. mutex_unlock(&msm_obj->lock);
  593. return ERR_PTR(-EBUSY);
  594. }
  595. /* increment vmap_count *before* vmap() call, so shrinker can
  596. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  597. * This guarantees that we won't try to msm_gem_vunmap() this
  598. * same object from within the vmap() call (while we already
  599. * hold msm_obj->lock)
  600. */
  601. msm_obj->vmap_count++;
  602. if (!msm_obj->vaddr) {
  603. struct page **pages = get_pages(obj);
  604. if (IS_ERR(pages)) {
  605. ret = PTR_ERR(pages);
  606. goto fail;
  607. }
  608. if (obj->import_attach) {
  609. ret = dma_buf_begin_cpu_access(
  610. obj->import_attach->dmabuf, DMA_BIDIRECTIONAL);
  611. if (ret)
  612. goto fail;
  613. msm_obj->vaddr =
  614. dma_buf_vmap(obj->import_attach->dmabuf);
  615. } else {
  616. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  617. VM_MAP, pgprot_writecombine(PAGE_KERNEL));
  618. }
  619. if (msm_obj->vaddr == NULL) {
  620. ret = -ENOMEM;
  621. goto fail;
  622. }
  623. }
  624. mutex_unlock(&msm_obj->lock);
  625. return msm_obj->vaddr;
  626. fail:
  627. msm_obj->vmap_count--;
  628. mutex_unlock(&msm_obj->lock);
  629. return ERR_PTR(ret);
  630. }
  631. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  632. {
  633. return get_vaddr(obj, MSM_MADV_WILLNEED);
  634. }
  635. /*
  636. * Don't use this! It is for the very special case of dumping
  637. * submits from GPU hangs or faults, were the bo may already
  638. * be MSM_MADV_DONTNEED, but we know the buffer is still on the
  639. * active list.
  640. */
  641. void *msm_gem_get_vaddr_active(struct drm_gem_object *obj)
  642. {
  643. return get_vaddr(obj, __MSM_MADV_PURGED);
  644. }
  645. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  646. {
  647. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  648. mutex_lock(&msm_obj->lock);
  649. WARN_ON(msm_obj->vmap_count < 1);
  650. msm_obj->vmap_count--;
  651. mutex_unlock(&msm_obj->lock);
  652. }
  653. /* Update madvise status, returns true if not purged, else
  654. * false or -errno.
  655. */
  656. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  657. {
  658. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  659. mutex_lock(&msm_obj->lock);
  660. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  661. if (msm_obj->madv != __MSM_MADV_PURGED)
  662. msm_obj->madv = madv;
  663. madv = msm_obj->madv;
  664. mutex_unlock(&msm_obj->lock);
  665. return (madv != __MSM_MADV_PURGED);
  666. }
  667. void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  668. {
  669. struct drm_device *dev = obj->dev;
  670. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  671. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  672. WARN_ON(!is_purgeable(msm_obj));
  673. WARN_ON(obj->import_attach);
  674. mutex_lock_nested(&msm_obj->lock, subclass);
  675. put_iova(obj);
  676. if (msm_obj->aspace) {
  677. mutex_lock(&msm_obj->aspace->list_lock);
  678. msm_gem_remove_obj_from_aspace_active_list(msm_obj->aspace,
  679. obj);
  680. mutex_unlock(&msm_obj->aspace->list_lock);
  681. }
  682. msm_gem_vunmap_locked(obj);
  683. put_pages(obj);
  684. msm_obj->madv = __MSM_MADV_PURGED;
  685. drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
  686. drm_gem_free_mmap_offset(obj);
  687. /* Our goal here is to return as much of the memory as
  688. * is possible back to the system as we are called from OOM.
  689. * To do this we must instruct the shmfs to drop all of its
  690. * backing pages, *now*.
  691. */
  692. shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
  693. invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
  694. 0, (loff_t)-1);
  695. mutex_unlock(&msm_obj->lock);
  696. }
  697. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  698. {
  699. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  700. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  701. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  702. return;
  703. if (obj->import_attach) {
  704. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  705. dma_buf_end_cpu_access(obj->import_attach->dmabuf,
  706. DMA_BIDIRECTIONAL);
  707. } else {
  708. vunmap(msm_obj->vaddr);
  709. }
  710. msm_obj->vaddr = NULL;
  711. }
  712. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  713. {
  714. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  715. mutex_lock_nested(&msm_obj->lock, subclass);
  716. msm_gem_vunmap_locked(obj);
  717. mutex_unlock(&msm_obj->lock);
  718. }
  719. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  720. {
  721. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  722. bool write = !!(op & MSM_PREP_WRITE);
  723. unsigned long remain =
  724. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  725. long ret;
  726. ret = dma_resv_wait_timeout_rcu(msm_obj->resv, write,
  727. true, remain);
  728. if (ret == 0)
  729. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  730. else if (ret < 0)
  731. return ret;
  732. /* TODO cache maintenance */
  733. return 0;
  734. }
  735. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  736. {
  737. /* TODO cache maintenance */
  738. return 0;
  739. }
  740. #ifdef CONFIG_DEBUG_FS
  741. static void describe_fence(struct dma_fence *fence, const char *type,
  742. struct seq_file *m)
  743. {
  744. if (!dma_fence_is_signaled(fence))
  745. seq_printf(m, "\t%9s: %s %s seq %llu\n", type,
  746. fence->ops->get_driver_name(fence),
  747. fence->ops->get_timeline_name(fence),
  748. fence->seqno);
  749. }
  750. void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
  751. {
  752. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  753. struct dma_resv *robj = msm_obj->resv;
  754. struct dma_resv_list *fobj;
  755. struct dma_fence *fence;
  756. struct msm_gem_vma *vma;
  757. uint64_t off = drm_vma_node_start(&obj->vma_node);
  758. const char *madv;
  759. mutex_lock(&msm_obj->lock);
  760. switch (msm_obj->madv) {
  761. case __MSM_MADV_PURGED:
  762. madv = " purged";
  763. break;
  764. case MSM_MADV_DONTNEED:
  765. madv = " purgeable";
  766. break;
  767. case MSM_MADV_WILLNEED:
  768. default:
  769. madv = "";
  770. break;
  771. }
  772. seq_printf(m, "%08x: %c %2d (%2d) %08llx %pK\t",
  773. msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
  774. obj->name, kref_read(&obj->refcount),
  775. off, msm_obj->vaddr);
  776. seq_printf(m, " %08zu %9s %-32s\n", obj->size, madv, msm_obj->name);
  777. if (!list_empty(&msm_obj->vmas)) {
  778. seq_puts(m, " vmas:");
  779. list_for_each_entry(vma, &msm_obj->vmas, list)
  780. seq_printf(m, " [%s: %08llx,%s,inuse=%d]", vma->aspace->name,
  781. vma->iova, vma->mapped ? "mapped" : "unmapped",
  782. vma->inuse);
  783. seq_puts(m, "\n");
  784. }
  785. rcu_read_lock();
  786. fobj = rcu_dereference(robj->fence);
  787. if (fobj) {
  788. unsigned int i, shared_count = fobj->shared_count;
  789. for (i = 0; i < shared_count; i++) {
  790. fence = rcu_dereference(fobj->shared[i]);
  791. describe_fence(fence, "Shared", m);
  792. }
  793. }
  794. fence = rcu_dereference(robj->fence_excl);
  795. if (fence)
  796. describe_fence(fence, "Exclusive", m);
  797. rcu_read_unlock();
  798. mutex_unlock(&msm_obj->lock);
  799. }
  800. void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
  801. {
  802. struct msm_gem_object *msm_obj;
  803. int count = 0;
  804. size_t size = 0;
  805. seq_puts(m, " flags id ref offset kaddr size madv name\n");
  806. list_for_each_entry(msm_obj, list, mm_list) {
  807. struct drm_gem_object *obj = &msm_obj->base;
  808. seq_puts(m, " ");
  809. msm_gem_describe(obj, m);
  810. count++;
  811. size += obj->size;
  812. }
  813. seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
  814. }
  815. #endif
  816. /* don't call directly! Use drm_gem_object_put() and friends */
  817. void msm_gem_free_object(struct drm_gem_object *obj)
  818. {
  819. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  820. struct drm_device *dev = obj->dev;
  821. struct msm_drm_private *priv = dev->dev_private;
  822. if (llist_add(&msm_obj->freed, &priv->free_list))
  823. queue_work(priv->wq, &priv->free_work);
  824. }
  825. static void free_object(struct msm_gem_object *msm_obj)
  826. {
  827. struct drm_gem_object *obj = &msm_obj->base;
  828. /* object should not be on active list: */
  829. WARN_ON(is_active(msm_obj));
  830. list_del(&msm_obj->mm_list);
  831. mutex_lock(&msm_obj->lock);
  832. put_iova(obj);
  833. if (msm_obj->aspace) {
  834. mutex_lock(&msm_obj->aspace->list_lock);
  835. msm_gem_remove_obj_from_aspace_active_list(msm_obj->aspace,
  836. obj);
  837. mutex_unlock(&msm_obj->aspace->list_lock);
  838. }
  839. if (obj->import_attach) {
  840. if (msm_obj->vaddr)
  841. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  842. /* Don't drop the pages for imported dmabuf, as they are not
  843. * ours, just free the array we allocated:
  844. */
  845. if (msm_obj->pages)
  846. kvfree(msm_obj->pages);
  847. drm_prime_gem_destroy(obj, msm_obj->sgt);
  848. } else {
  849. msm_gem_vunmap_locked(obj);
  850. put_pages(obj);
  851. }
  852. if (msm_obj->resv == &msm_obj->_resv)
  853. dma_resv_fini(msm_obj->resv);
  854. drm_gem_object_release(obj);
  855. mutex_unlock(&msm_obj->lock);
  856. kfree(msm_obj);
  857. }
  858. void msm_gem_free_work(struct work_struct *work)
  859. {
  860. struct msm_drm_private *priv = container_of(work, struct msm_drm_private, free_work);
  861. struct drm_device *dev = priv->dev;
  862. struct llist_node *freed;
  863. struct msm_gem_object *msm_obj, *next;
  864. while ((freed = llist_del_all(&priv->free_list))) {
  865. mutex_lock(&dev->struct_mutex);
  866. llist_for_each_entry_safe(msm_obj, next, freed, freed)
  867. free_object(msm_obj);
  868. mutex_unlock(&dev->struct_mutex);
  869. if (need_resched())
  870. break;
  871. }
  872. }
  873. /* convenience method to construct a GEM buffer object, and userspace handle */
  874. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  875. uint32_t size, uint32_t flags, uint32_t *handle,
  876. char *name)
  877. {
  878. struct drm_gem_object *obj;
  879. int ret;
  880. obj = msm_gem_new(dev, size, flags);
  881. if (IS_ERR(obj))
  882. return PTR_ERR(obj);
  883. if (name)
  884. msm_gem_object_set_name(obj, "%s", name);
  885. ret = drm_gem_handle_create(file, obj, handle);
  886. /* drop reference from allocate - handle holds it now */
  887. drm_gem_object_put(obj);
  888. return ret;
  889. }
  890. static int msm_gem_new_impl(struct drm_device *dev,
  891. uint32_t size, uint32_t flags,
  892. struct dma_resv *resv,
  893. struct drm_gem_object **obj,
  894. bool struct_mutex_locked)
  895. {
  896. struct msm_drm_private *priv = dev->dev_private;
  897. struct msm_gem_object *msm_obj;
  898. switch (flags & MSM_BO_CACHE_MASK) {
  899. case MSM_BO_UNCACHED:
  900. case MSM_BO_CACHED:
  901. case MSM_BO_WC:
  902. break;
  903. default:
  904. dev_err(dev->dev, "invalid cache flag: %x\n",
  905. (flags & MSM_BO_CACHE_MASK));
  906. return -EINVAL;
  907. }
  908. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  909. if (!msm_obj)
  910. return -ENOMEM;
  911. mutex_init(&msm_obj->lock);
  912. msm_obj->flags = flags;
  913. msm_obj->madv = MSM_MADV_WILLNEED;
  914. if (resv) {
  915. msm_obj->resv = resv;
  916. } else {
  917. msm_obj->resv = &msm_obj->_resv;
  918. dma_resv_init(msm_obj->resv);
  919. }
  920. INIT_LIST_HEAD(&msm_obj->submit_entry);
  921. INIT_LIST_HEAD(&msm_obj->vmas);
  922. INIT_LIST_HEAD(&msm_obj->iova_list);
  923. msm_obj->aspace = msm_gem_smmu_address_space_get(dev,
  924. MSM_SMMU_DOMAIN_UNSECURE);
  925. if (IS_ERR(msm_obj->aspace))
  926. msm_obj->aspace = NULL;
  927. msm_obj->in_active_list = false;
  928. msm_obj->obj_dirty = false;
  929. if (struct_mutex_locked) {
  930. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  931. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  932. } else {
  933. mutex_lock(&dev->struct_mutex);
  934. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  935. mutex_unlock(&dev->struct_mutex);
  936. }
  937. *obj = &msm_obj->base;
  938. return 0;
  939. }
  940. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  941. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  942. {
  943. struct msm_drm_private *priv = dev->dev_private;
  944. struct drm_gem_object *obj = NULL;
  945. bool use_vram = false;
  946. int ret;
  947. size = PAGE_ALIGN(size);
  948. if (!iommu_present(&platform_bus_type))
  949. use_vram = true;
  950. else if ((flags & (MSM_BO_STOLEN | MSM_BO_SCANOUT)) && priv->vram.size)
  951. use_vram = true;
  952. if (WARN_ON(use_vram && !priv->vram.size))
  953. return ERR_PTR(-EINVAL);
  954. /* Disallow zero sized objects as they make the underlying
  955. * infrastructure grumpy
  956. */
  957. if (size == 0)
  958. return ERR_PTR(-EINVAL);
  959. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  960. if (ret)
  961. goto fail;
  962. if (use_vram) {
  963. struct msm_gem_vma *vma;
  964. struct page **pages;
  965. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  966. mutex_lock(&msm_obj->lock);
  967. vma = add_vma(obj, NULL);
  968. mutex_unlock(&msm_obj->lock);
  969. if (IS_ERR(vma)) {
  970. ret = PTR_ERR(vma);
  971. goto fail;
  972. }
  973. to_msm_bo(obj)->vram_node = &vma->node;
  974. drm_gem_private_object_init(dev, obj, size);
  975. pages = get_pages(obj);
  976. if (IS_ERR(pages)) {
  977. ret = PTR_ERR(pages);
  978. goto fail;
  979. }
  980. vma->iova = physaddr(obj);
  981. } else {
  982. ret = drm_gem_object_init(dev, obj, size);
  983. if (ret)
  984. goto fail;
  985. }
  986. return obj;
  987. fail:
  988. drm_gem_object_put(obj);
  989. return ERR_PTR(ret);
  990. }
  991. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  992. uint32_t size, uint32_t flags)
  993. {
  994. return _msm_gem_new(dev, size, flags, true);
  995. }
  996. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  997. uint32_t size, uint32_t flags)
  998. {
  999. return _msm_gem_new(dev, size, flags, false);
  1000. }
  1001. int msm_gem_delayed_import(struct drm_gem_object *obj)
  1002. {
  1003. struct dma_buf_attachment *attach;
  1004. struct sg_table *sgt;
  1005. struct msm_gem_object *msm_obj;
  1006. int ret = 0;
  1007. if (!obj) {
  1008. DRM_ERROR("NULL drm gem object\n");
  1009. return -EINVAL;
  1010. }
  1011. msm_obj = to_msm_bo(obj);
  1012. if (!obj->import_attach) {
  1013. DRM_ERROR("NULL dma_buf_attachment in drm gem object\n");
  1014. return -EINVAL;
  1015. }
  1016. attach = obj->import_attach;
  1017. attach->dma_map_attrs |= DMA_ATTR_DELAYED_UNMAP;
  1018. if (msm_obj->flags & MSM_BO_SKIPSYNC)
  1019. attach->dma_map_attrs |= DMA_ATTR_SKIP_CPU_SYNC;
  1020. /*
  1021. * All SMMU mapping are generated with cache hint.
  1022. * SSPP cache hint will control the LLCC access.
  1023. */
  1024. if (msm_obj->flags & MSM_BO_KEEPATTRS)
  1025. attach->dma_map_attrs |=
  1026. (DMA_ATTR_IOMMU_USE_UPSTREAM_HINT |
  1027. DMA_ATTR_IOMMU_USE_LLC_NWA);
  1028. /*
  1029. * dma_buf_map_attachment will call dma_map_sg for ion buffer
  1030. * mapping, and iova will get mapped when the function returns.
  1031. */
  1032. sgt = dma_buf_map_attachment(attach, DMA_BIDIRECTIONAL);
  1033. if (IS_ERR(sgt)) {
  1034. ret = PTR_ERR(sgt);
  1035. DRM_ERROR("dma_buf_map_attachment failure, err=%d\n",
  1036. ret);
  1037. goto fail_import;
  1038. }
  1039. msm_obj->sgt = sgt;
  1040. msm_obj->pages = NULL;
  1041. fail_import:
  1042. return ret;
  1043. }
  1044. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  1045. struct dma_buf *dmabuf, struct sg_table *sgt)
  1046. {
  1047. struct msm_gem_object *msm_obj;
  1048. struct drm_gem_object *obj = NULL;
  1049. uint32_t size;
  1050. int ret;
  1051. unsigned long flags = 0;
  1052. size = PAGE_ALIGN(dmabuf->size);
  1053. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj,
  1054. false);
  1055. if (ret)
  1056. goto fail;
  1057. drm_gem_private_object_init(dev, obj, size);
  1058. msm_obj = to_msm_bo(obj);
  1059. mutex_lock(&msm_obj->lock);
  1060. msm_obj->sgt = sgt;
  1061. msm_obj->pages = NULL;
  1062. /*
  1063. * 1) If sg table is NULL, user should call msm_gem_delayed_import
  1064. * to add back the sg table to the drm gem object.
  1065. *
  1066. * 2) Add buffer flag unconditionally for all import cases.
  1067. * # Cached buffer will be attached immediately hence sgt will
  1068. * be available upon gem obj creation.
  1069. * # Un-cached buffer will follow delayed attach hence sgt
  1070. * will be NULL upon gem obj creation.
  1071. */
  1072. msm_obj->flags |= MSM_BO_EXTBUF;
  1073. /*
  1074. * For all uncached buffers, there is no need to perform cache
  1075. * maintenance on dma map/unmap time.
  1076. */
  1077. ret = dma_buf_get_flags(dmabuf, &flags);
  1078. if (ret) {
  1079. DRM_ERROR("dma_buf_get_flags failure, err=%d\n", ret);
  1080. } else if ((flags & ION_FLAG_CACHED) == 0) {
  1081. DRM_DEBUG("Buffer is uncached type\n");
  1082. msm_obj->flags |= MSM_BO_SKIPSYNC;
  1083. }
  1084. mutex_unlock(&msm_obj->lock);
  1085. return obj;
  1086. fail:
  1087. drm_gem_object_put(obj);
  1088. return ERR_PTR(ret);
  1089. }
  1090. static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1091. uint32_t flags, struct msm_gem_address_space *aspace,
  1092. struct drm_gem_object **bo, uint64_t *iova, bool locked)
  1093. {
  1094. void *vaddr;
  1095. struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
  1096. int ret;
  1097. if (IS_ERR(obj))
  1098. return ERR_CAST(obj);
  1099. if (iova) {
  1100. ret = msm_gem_get_iova(obj, aspace, iova);
  1101. if (ret)
  1102. goto err;
  1103. }
  1104. vaddr = msm_gem_get_vaddr(obj);
  1105. if (IS_ERR(vaddr)) {
  1106. msm_gem_put_iova(obj, aspace);
  1107. ret = PTR_ERR(vaddr);
  1108. goto err;
  1109. }
  1110. if (bo)
  1111. *bo = obj;
  1112. return vaddr;
  1113. err:
  1114. if (locked)
  1115. drm_gem_object_put_locked(obj);
  1116. else
  1117. drm_gem_object_put(obj);
  1118. return ERR_PTR(ret);
  1119. }
  1120. void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  1121. uint32_t flags, struct msm_gem_address_space *aspace,
  1122. struct drm_gem_object **bo, uint64_t *iova)
  1123. {
  1124. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
  1125. }
  1126. void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
  1127. uint32_t flags, struct msm_gem_address_space *aspace,
  1128. struct drm_gem_object **bo, uint64_t *iova)
  1129. {
  1130. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
  1131. }
  1132. void msm_gem_kernel_put(struct drm_gem_object *bo,
  1133. struct msm_gem_address_space *aspace, bool locked)
  1134. {
  1135. if (IS_ERR_OR_NULL(bo))
  1136. return;
  1137. msm_gem_put_vaddr(bo);
  1138. msm_gem_unpin_iova(bo, aspace);
  1139. if (locked)
  1140. drm_gem_object_put_locked(bo);
  1141. else
  1142. drm_gem_object_put(bo);
  1143. }
  1144. void msm_gem_object_set_name(struct drm_gem_object *bo, const char *fmt, ...)
  1145. {
  1146. struct msm_gem_object *msm_obj = to_msm_bo(bo);
  1147. va_list ap;
  1148. if (!fmt)
  1149. return;
  1150. va_start(ap, fmt);
  1151. vsnprintf(msm_obj->name, sizeof(msm_obj->name), fmt, ap);
  1152. va_end(ap);
  1153. }