msm_gem.c 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898
  1. /*
  2. * Copyright (C) 2013 Red Hat
  3. * Author: Rob Clark <robdclark@gmail.com>
  4. *
  5. * This program is free software; you can redistribute it and/or modify it
  6. * under the terms of the GNU General Public License version 2 as published by
  7. * the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but WITHOUT
  10. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  12. * more details.
  13. *
  14. * You should have received a copy of the GNU General Public License along with
  15. * this program. If not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include <linux/spinlock.h>
  18. #include <linux/shmem_fs.h>
  19. #include <linux/dma-buf.h>
  20. #include <linux/pfn_t.h>
  21. #include "msm_drv.h"
  22. #include "msm_fence.h"
  23. #include "msm_gem.h"
  24. #include "msm_gpu.h"
  25. #include "msm_mmu.h"
  26. static dma_addr_t physaddr(struct drm_gem_object *obj)
  27. {
  28. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  29. struct msm_drm_private *priv = obj->dev->dev_private;
  30. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  31. priv->vram.paddr;
  32. }
  33. static bool use_pages(struct drm_gem_object *obj)
  34. {
  35. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  36. return !msm_obj->vram_node;
  37. }
  38. /* allocate pages from VRAM carveout, used when no IOMMU: */
  39. static struct page **get_pages_vram(struct drm_gem_object *obj,
  40. int npages)
  41. {
  42. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  43. struct msm_drm_private *priv = obj->dev->dev_private;
  44. dma_addr_t paddr;
  45. struct page **p;
  46. int ret, i;
  47. p = drm_malloc_ab(npages, sizeof(struct page *));
  48. if (!p)
  49. return ERR_PTR(-ENOMEM);
  50. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node,
  51. npages, 0, DRM_MM_SEARCH_DEFAULT);
  52. if (ret) {
  53. drm_free_large(p);
  54. return ERR_PTR(ret);
  55. }
  56. paddr = physaddr(obj);
  57. for (i = 0; i < npages; i++) {
  58. p[i] = phys_to_page(paddr);
  59. paddr += PAGE_SIZE;
  60. }
  61. return p;
  62. }
  63. /* called with dev->struct_mutex held */
  64. static struct page **get_pages(struct drm_gem_object *obj)
  65. {
  66. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  67. if (!msm_obj->pages) {
  68. struct drm_device *dev = obj->dev;
  69. struct page **p;
  70. int npages = obj->size >> PAGE_SHIFT;
  71. if (use_pages(obj))
  72. p = drm_gem_get_pages(obj);
  73. else
  74. p = get_pages_vram(obj, npages);
  75. if (IS_ERR(p)) {
  76. dev_err(dev->dev, "could not get pages: %ld\n",
  77. PTR_ERR(p));
  78. return p;
  79. }
  80. msm_obj->pages = p;
  81. msm_obj->sgt = drm_prime_pages_to_sg(p, npages);
  82. if (IS_ERR(msm_obj->sgt)) {
  83. void *ptr = ERR_CAST(msm_obj->sgt);
  84. dev_err(dev->dev, "failed to allocate sgt\n");
  85. msm_obj->sgt = NULL;
  86. return ptr;
  87. }
  88. /* For non-cached buffers, ensure the new pages are clean
  89. * because display controller, GPU, etc. are not coherent:
  90. */
  91. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  92. dma_map_sg(dev->dev, msm_obj->sgt->sgl,
  93. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  94. }
  95. return msm_obj->pages;
  96. }
  97. static void put_pages(struct drm_gem_object *obj)
  98. {
  99. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  100. if (msm_obj->pages) {
  101. /* For non-cached buffers, ensure the new pages are clean
  102. * because display controller, GPU, etc. are not coherent:
  103. */
  104. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  105. dma_unmap_sg(obj->dev->dev, msm_obj->sgt->sgl,
  106. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  107. if (msm_obj->sgt)
  108. sg_free_table(msm_obj->sgt);
  109. kfree(msm_obj->sgt);
  110. if (use_pages(obj))
  111. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  112. else {
  113. drm_mm_remove_node(msm_obj->vram_node);
  114. drm_free_large(msm_obj->pages);
  115. }
  116. msm_obj->pages = NULL;
  117. }
  118. }
  119. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  120. {
  121. struct drm_device *dev = obj->dev;
  122. struct page **p;
  123. mutex_lock(&dev->struct_mutex);
  124. p = get_pages(obj);
  125. mutex_unlock(&dev->struct_mutex);
  126. return p;
  127. }
  128. void msm_gem_put_pages(struct drm_gem_object *obj)
  129. {
  130. /* when we start tracking the pin count, then do something here */
  131. }
  132. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  133. struct vm_area_struct *vma)
  134. {
  135. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  136. vma->vm_flags &= ~VM_PFNMAP;
  137. vma->vm_flags |= VM_MIXEDMAP;
  138. if (msm_obj->flags & MSM_BO_WC) {
  139. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  140. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  141. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  142. } else {
  143. /*
  144. * Shunt off cached objs to shmem file so they have their own
  145. * address_space (so unmap_mapping_range does what we want,
  146. * in particular in the case of mmap'd dmabufs)
  147. */
  148. fput(vma->vm_file);
  149. get_file(obj->filp);
  150. vma->vm_pgoff = 0;
  151. vma->vm_file = obj->filp;
  152. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  153. }
  154. return 0;
  155. }
  156. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  157. {
  158. int ret;
  159. ret = drm_gem_mmap(filp, vma);
  160. if (ret) {
  161. DBG("mmap failed: %d", ret);
  162. return ret;
  163. }
  164. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  165. }
  166. int msm_gem_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
  167. {
  168. struct drm_gem_object *obj = vma->vm_private_data;
  169. struct drm_device *dev = obj->dev;
  170. struct msm_drm_private *priv = dev->dev_private;
  171. struct page **pages;
  172. unsigned long pfn;
  173. pgoff_t pgoff;
  174. int ret;
  175. /* This should only happen if userspace tries to pass a mmap'd
  176. * but unfaulted gem bo vaddr into submit ioctl, triggering
  177. * a page fault while struct_mutex is already held. This is
  178. * not a valid use-case so just bail.
  179. */
  180. if (priv->struct_mutex_task == current)
  181. return VM_FAULT_SIGBUS;
  182. /* Make sure we don't parallel update on a fault, nor move or remove
  183. * something from beneath our feet
  184. */
  185. ret = mutex_lock_interruptible(&dev->struct_mutex);
  186. if (ret)
  187. goto out;
  188. /* make sure we have pages attached now */
  189. pages = get_pages(obj);
  190. if (IS_ERR(pages)) {
  191. ret = PTR_ERR(pages);
  192. goto out_unlock;
  193. }
  194. /* We don't use vmf->pgoff since that has the fake offset: */
  195. pgoff = ((unsigned long)vmf->virtual_address -
  196. vma->vm_start) >> PAGE_SHIFT;
  197. pfn = page_to_pfn(pages[pgoff]);
  198. VERB("Inserting %p pfn %lx, pa %lx", vmf->virtual_address,
  199. pfn, pfn << PAGE_SHIFT);
  200. ret = vm_insert_mixed(vma, (unsigned long)vmf->virtual_address,
  201. __pfn_to_pfn_t(pfn, PFN_DEV));
  202. out_unlock:
  203. mutex_unlock(&dev->struct_mutex);
  204. out:
  205. switch (ret) {
  206. case -EAGAIN:
  207. case 0:
  208. case -ERESTARTSYS:
  209. case -EINTR:
  210. case -EBUSY:
  211. /*
  212. * EBUSY is ok: this just means that another thread
  213. * already did the job.
  214. */
  215. return VM_FAULT_NOPAGE;
  216. case -ENOMEM:
  217. return VM_FAULT_OOM;
  218. default:
  219. return VM_FAULT_SIGBUS;
  220. }
  221. }
  222. /** get mmap offset */
  223. static uint64_t mmap_offset(struct drm_gem_object *obj)
  224. {
  225. struct drm_device *dev = obj->dev;
  226. int ret;
  227. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  228. /* Make it mmapable */
  229. ret = drm_gem_create_mmap_offset(obj);
  230. if (ret) {
  231. dev_err(dev->dev, "could not allocate mmap offset\n");
  232. return 0;
  233. }
  234. return drm_vma_node_offset_addr(&obj->vma_node);
  235. }
  236. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  237. {
  238. uint64_t offset;
  239. mutex_lock(&obj->dev->struct_mutex);
  240. offset = mmap_offset(obj);
  241. mutex_unlock(&obj->dev->struct_mutex);
  242. return offset;
  243. }
  244. static void
  245. put_iova(struct drm_gem_object *obj)
  246. {
  247. struct drm_device *dev = obj->dev;
  248. struct msm_drm_private *priv = obj->dev->dev_private;
  249. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  250. int id;
  251. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  252. for (id = 0; id < ARRAY_SIZE(msm_obj->domain); id++) {
  253. struct msm_mmu *mmu = priv->mmus[id];
  254. if (mmu && msm_obj->domain[id].iova) {
  255. uint32_t offset = msm_obj->domain[id].iova;
  256. mmu->funcs->unmap(mmu, offset, msm_obj->sgt, obj->size);
  257. msm_obj->domain[id].iova = 0;
  258. }
  259. }
  260. }
  261. /* should be called under struct_mutex.. although it can be called
  262. * from atomic context without struct_mutex to acquire an extra
  263. * iova ref if you know one is already held.
  264. *
  265. * That means when I do eventually need to add support for unpinning
  266. * the refcnt counter needs to be atomic_t.
  267. */
  268. int msm_gem_get_iova_locked(struct drm_gem_object *obj, int id,
  269. uint32_t *iova)
  270. {
  271. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  272. int ret = 0;
  273. if (!msm_obj->domain[id].iova) {
  274. struct msm_drm_private *priv = obj->dev->dev_private;
  275. struct page **pages = get_pages(obj);
  276. if (IS_ERR(pages))
  277. return PTR_ERR(pages);
  278. if (iommu_present(&platform_bus_type)) {
  279. struct msm_mmu *mmu = priv->mmus[id];
  280. uint32_t offset;
  281. if (WARN_ON(!mmu))
  282. return -EINVAL;
  283. offset = (uint32_t)mmap_offset(obj);
  284. ret = mmu->funcs->map(mmu, offset, msm_obj->sgt,
  285. obj->size, IOMMU_READ | IOMMU_WRITE);
  286. msm_obj->domain[id].iova = offset;
  287. } else {
  288. msm_obj->domain[id].iova = physaddr(obj);
  289. }
  290. }
  291. if (!ret)
  292. *iova = msm_obj->domain[id].iova;
  293. return ret;
  294. }
  295. /* get iova, taking a reference. Should have a matching put */
  296. int msm_gem_get_iova(struct drm_gem_object *obj, int id, uint32_t *iova)
  297. {
  298. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  299. int ret;
  300. /* this is safe right now because we don't unmap until the
  301. * bo is deleted:
  302. */
  303. if (msm_obj->domain[id].iova) {
  304. *iova = msm_obj->domain[id].iova;
  305. return 0;
  306. }
  307. mutex_lock(&obj->dev->struct_mutex);
  308. ret = msm_gem_get_iova_locked(obj, id, iova);
  309. mutex_unlock(&obj->dev->struct_mutex);
  310. return ret;
  311. }
  312. /* get iova without taking a reference, used in places where you have
  313. * already done a 'msm_gem_get_iova()'.
  314. */
  315. uint32_t msm_gem_iova(struct drm_gem_object *obj, int id)
  316. {
  317. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  318. WARN_ON(!msm_obj->domain[id].iova);
  319. return msm_obj->domain[id].iova;
  320. }
  321. void msm_gem_put_iova(struct drm_gem_object *obj, int id)
  322. {
  323. // XXX TODO ..
  324. // NOTE: probably don't need a _locked() version.. we wouldn't
  325. // normally unmap here, but instead just mark that it could be
  326. // unmapped (if the iova refcnt drops to zero), but then later
  327. // if another _get_iova_locked() fails we can start unmapping
  328. // things that are no longer needed..
  329. }
  330. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  331. struct drm_mode_create_dumb *args)
  332. {
  333. args->pitch = align_pitch(args->width, args->bpp);
  334. args->size = PAGE_ALIGN(args->pitch * args->height);
  335. return msm_gem_new_handle(dev, file, args->size,
  336. MSM_BO_SCANOUT | MSM_BO_WC, &args->handle);
  337. }
  338. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  339. uint32_t handle, uint64_t *offset)
  340. {
  341. struct drm_gem_object *obj;
  342. int ret = 0;
  343. /* GEM does all our handle to object mapping */
  344. obj = drm_gem_object_lookup(file, handle);
  345. if (obj == NULL) {
  346. ret = -ENOENT;
  347. goto fail;
  348. }
  349. *offset = msm_gem_mmap_offset(obj);
  350. drm_gem_object_unreference_unlocked(obj);
  351. fail:
  352. return ret;
  353. }
  354. void *msm_gem_get_vaddr_locked(struct drm_gem_object *obj)
  355. {
  356. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  357. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  358. if (!msm_obj->vaddr) {
  359. struct page **pages = get_pages(obj);
  360. if (IS_ERR(pages))
  361. return ERR_CAST(pages);
  362. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  363. VM_MAP, pgprot_writecombine(PAGE_KERNEL));
  364. if (msm_obj->vaddr == NULL)
  365. return ERR_PTR(-ENOMEM);
  366. }
  367. msm_obj->vmap_count++;
  368. return msm_obj->vaddr;
  369. }
  370. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  371. {
  372. void *ret;
  373. mutex_lock(&obj->dev->struct_mutex);
  374. ret = msm_gem_get_vaddr_locked(obj);
  375. mutex_unlock(&obj->dev->struct_mutex);
  376. return ret;
  377. }
  378. void msm_gem_put_vaddr_locked(struct drm_gem_object *obj)
  379. {
  380. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  381. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  382. WARN_ON(msm_obj->vmap_count < 1);
  383. msm_obj->vmap_count--;
  384. }
  385. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  386. {
  387. mutex_lock(&obj->dev->struct_mutex);
  388. msm_gem_put_vaddr_locked(obj);
  389. mutex_unlock(&obj->dev->struct_mutex);
  390. }
  391. /* Update madvise status, returns true if not purged, else
  392. * false or -errno.
  393. */
  394. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  395. {
  396. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  397. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  398. if (msm_obj->madv != __MSM_MADV_PURGED)
  399. msm_obj->madv = madv;
  400. return (msm_obj->madv != __MSM_MADV_PURGED);
  401. }
  402. void msm_gem_purge(struct drm_gem_object *obj)
  403. {
  404. struct drm_device *dev = obj->dev;
  405. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  406. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  407. WARN_ON(!is_purgeable(msm_obj));
  408. WARN_ON(obj->import_attach);
  409. put_iova(obj);
  410. msm_gem_vunmap(obj);
  411. put_pages(obj);
  412. msm_obj->madv = __MSM_MADV_PURGED;
  413. drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
  414. drm_gem_free_mmap_offset(obj);
  415. /* Our goal here is to return as much of the memory as
  416. * is possible back to the system as we are called from OOM.
  417. * To do this we must instruct the shmfs to drop all of its
  418. * backing pages, *now*.
  419. */
  420. shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
  421. invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
  422. 0, (loff_t)-1);
  423. }
  424. void msm_gem_vunmap(struct drm_gem_object *obj)
  425. {
  426. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  427. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  428. return;
  429. vunmap(msm_obj->vaddr);
  430. msm_obj->vaddr = NULL;
  431. }
  432. /* must be called before _move_to_active().. */
  433. int msm_gem_sync_object(struct drm_gem_object *obj,
  434. struct msm_fence_context *fctx, bool exclusive)
  435. {
  436. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  437. struct reservation_object_list *fobj;
  438. struct fence *fence;
  439. int i, ret;
  440. if (!exclusive) {
  441. /* NOTE: _reserve_shared() must happen before _add_shared_fence(),
  442. * which makes this a slightly strange place to call it. OTOH this
  443. * is a convenient can-fail point to hook it in. (And similar to
  444. * how etnaviv and nouveau handle this.)
  445. */
  446. ret = reservation_object_reserve_shared(msm_obj->resv);
  447. if (ret)
  448. return ret;
  449. }
  450. fobj = reservation_object_get_list(msm_obj->resv);
  451. if (!fobj || (fobj->shared_count == 0)) {
  452. fence = reservation_object_get_excl(msm_obj->resv);
  453. /* don't need to wait on our own fences, since ring is fifo */
  454. if (fence && (fence->context != fctx->context)) {
  455. ret = fence_wait(fence, true);
  456. if (ret)
  457. return ret;
  458. }
  459. }
  460. if (!exclusive || !fobj)
  461. return 0;
  462. for (i = 0; i < fobj->shared_count; i++) {
  463. fence = rcu_dereference_protected(fobj->shared[i],
  464. reservation_object_held(msm_obj->resv));
  465. if (fence->context != fctx->context) {
  466. ret = fence_wait(fence, true);
  467. if (ret)
  468. return ret;
  469. }
  470. }
  471. return 0;
  472. }
  473. void msm_gem_move_to_active(struct drm_gem_object *obj,
  474. struct msm_gpu *gpu, bool exclusive, struct fence *fence)
  475. {
  476. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  477. WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
  478. msm_obj->gpu = gpu;
  479. if (exclusive)
  480. reservation_object_add_excl_fence(msm_obj->resv, fence);
  481. else
  482. reservation_object_add_shared_fence(msm_obj->resv, fence);
  483. list_del_init(&msm_obj->mm_list);
  484. list_add_tail(&msm_obj->mm_list, &gpu->active_list);
  485. }
  486. void msm_gem_move_to_inactive(struct drm_gem_object *obj)
  487. {
  488. struct drm_device *dev = obj->dev;
  489. struct msm_drm_private *priv = dev->dev_private;
  490. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  491. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  492. msm_obj->gpu = NULL;
  493. list_del_init(&msm_obj->mm_list);
  494. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  495. }
  496. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  497. {
  498. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  499. bool write = !!(op & MSM_PREP_WRITE);
  500. unsigned long remain =
  501. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  502. long ret;
  503. ret = reservation_object_wait_timeout_rcu(msm_obj->resv, write,
  504. true, remain);
  505. if (ret == 0)
  506. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  507. else if (ret < 0)
  508. return ret;
  509. /* TODO cache maintenance */
  510. return 0;
  511. }
  512. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  513. {
  514. /* TODO cache maintenance */
  515. return 0;
  516. }
  517. #ifdef CONFIG_DEBUG_FS
  518. static void describe_fence(struct fence *fence, const char *type,
  519. struct seq_file *m)
  520. {
  521. if (!fence_is_signaled(fence))
  522. seq_printf(m, "\t%9s: %s %s seq %u\n", type,
  523. fence->ops->get_driver_name(fence),
  524. fence->ops->get_timeline_name(fence),
  525. fence->seqno);
  526. }
  527. void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
  528. {
  529. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  530. struct reservation_object *robj = msm_obj->resv;
  531. struct reservation_object_list *fobj;
  532. struct fence *fence;
  533. uint64_t off = drm_vma_node_start(&obj->vma_node);
  534. const char *madv;
  535. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  536. switch (msm_obj->madv) {
  537. case __MSM_MADV_PURGED:
  538. madv = " purged";
  539. break;
  540. case MSM_MADV_DONTNEED:
  541. madv = " purgeable";
  542. break;
  543. case MSM_MADV_WILLNEED:
  544. default:
  545. madv = "";
  546. break;
  547. }
  548. seq_printf(m, "%08x: %c %2d (%2d) %08llx %p %zu%s\n",
  549. msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
  550. obj->name, obj->refcount.refcount.counter,
  551. off, msm_obj->vaddr, obj->size, madv);
  552. rcu_read_lock();
  553. fobj = rcu_dereference(robj->fence);
  554. if (fobj) {
  555. unsigned int i, shared_count = fobj->shared_count;
  556. for (i = 0; i < shared_count; i++) {
  557. fence = rcu_dereference(fobj->shared[i]);
  558. describe_fence(fence, "Shared", m);
  559. }
  560. }
  561. fence = rcu_dereference(robj->fence_excl);
  562. if (fence)
  563. describe_fence(fence, "Exclusive", m);
  564. rcu_read_unlock();
  565. }
  566. void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
  567. {
  568. struct msm_gem_object *msm_obj;
  569. int count = 0;
  570. size_t size = 0;
  571. list_for_each_entry(msm_obj, list, mm_list) {
  572. struct drm_gem_object *obj = &msm_obj->base;
  573. seq_printf(m, " ");
  574. msm_gem_describe(obj, m);
  575. count++;
  576. size += obj->size;
  577. }
  578. seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
  579. }
  580. #endif
  581. void msm_gem_free_object(struct drm_gem_object *obj)
  582. {
  583. struct drm_device *dev = obj->dev;
  584. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  585. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  586. /* object should not be on active list: */
  587. WARN_ON(is_active(msm_obj));
  588. list_del(&msm_obj->mm_list);
  589. put_iova(obj);
  590. if (obj->import_attach) {
  591. if (msm_obj->vaddr)
  592. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  593. /* Don't drop the pages for imported dmabuf, as they are not
  594. * ours, just free the array we allocated:
  595. */
  596. if (msm_obj->pages)
  597. drm_free_large(msm_obj->pages);
  598. drm_prime_gem_destroy(obj, msm_obj->sgt);
  599. } else {
  600. msm_gem_vunmap(obj);
  601. put_pages(obj);
  602. }
  603. if (msm_obj->resv == &msm_obj->_resv)
  604. reservation_object_fini(msm_obj->resv);
  605. drm_gem_object_release(obj);
  606. kfree(msm_obj);
  607. }
  608. /* convenience method to construct a GEM buffer object, and userspace handle */
  609. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  610. uint32_t size, uint32_t flags, uint32_t *handle)
  611. {
  612. struct drm_gem_object *obj;
  613. int ret;
  614. ret = mutex_lock_interruptible(&dev->struct_mutex);
  615. if (ret)
  616. return ret;
  617. obj = msm_gem_new(dev, size, flags);
  618. mutex_unlock(&dev->struct_mutex);
  619. if (IS_ERR(obj))
  620. return PTR_ERR(obj);
  621. ret = drm_gem_handle_create(file, obj, handle);
  622. /* drop reference from allocate - handle holds it now */
  623. drm_gem_object_unreference_unlocked(obj);
  624. return ret;
  625. }
  626. static int msm_gem_new_impl(struct drm_device *dev,
  627. uint32_t size, uint32_t flags,
  628. struct reservation_object *resv,
  629. struct drm_gem_object **obj)
  630. {
  631. struct msm_drm_private *priv = dev->dev_private;
  632. struct msm_gem_object *msm_obj;
  633. unsigned sz;
  634. bool use_vram = false;
  635. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  636. switch (flags & MSM_BO_CACHE_MASK) {
  637. case MSM_BO_UNCACHED:
  638. case MSM_BO_CACHED:
  639. case MSM_BO_WC:
  640. break;
  641. default:
  642. dev_err(dev->dev, "invalid cache flag: %x\n",
  643. (flags & MSM_BO_CACHE_MASK));
  644. return -EINVAL;
  645. }
  646. if (!iommu_present(&platform_bus_type))
  647. use_vram = true;
  648. else if ((flags & MSM_BO_STOLEN) && priv->vram.size)
  649. use_vram = true;
  650. if (WARN_ON(use_vram && !priv->vram.size))
  651. return -EINVAL;
  652. sz = sizeof(*msm_obj);
  653. if (use_vram)
  654. sz += sizeof(struct drm_mm_node);
  655. msm_obj = kzalloc(sz, GFP_KERNEL);
  656. if (!msm_obj)
  657. return -ENOMEM;
  658. if (use_vram)
  659. msm_obj->vram_node = (void *)&msm_obj[1];
  660. msm_obj->flags = flags;
  661. msm_obj->madv = MSM_MADV_WILLNEED;
  662. if (resv) {
  663. msm_obj->resv = resv;
  664. } else {
  665. msm_obj->resv = &msm_obj->_resv;
  666. reservation_object_init(msm_obj->resv);
  667. }
  668. INIT_LIST_HEAD(&msm_obj->submit_entry);
  669. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  670. *obj = &msm_obj->base;
  671. return 0;
  672. }
  673. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  674. uint32_t size, uint32_t flags)
  675. {
  676. struct drm_gem_object *obj = NULL;
  677. int ret;
  678. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  679. size = PAGE_ALIGN(size);
  680. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj);
  681. if (ret)
  682. goto fail;
  683. if (use_pages(obj)) {
  684. ret = drm_gem_object_init(dev, obj, size);
  685. if (ret)
  686. goto fail;
  687. } else {
  688. drm_gem_private_object_init(dev, obj, size);
  689. }
  690. return obj;
  691. fail:
  692. drm_gem_object_unreference(obj);
  693. return ERR_PTR(ret);
  694. }
  695. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  696. struct dma_buf *dmabuf, struct sg_table *sgt)
  697. {
  698. struct msm_gem_object *msm_obj;
  699. struct drm_gem_object *obj;
  700. uint32_t size;
  701. int ret, npages;
  702. /* if we don't have IOMMU, don't bother pretending we can import: */
  703. if (!iommu_present(&platform_bus_type)) {
  704. dev_err(dev->dev, "cannot import without IOMMU\n");
  705. return ERR_PTR(-EINVAL);
  706. }
  707. size = PAGE_ALIGN(dmabuf->size);
  708. /* Take mutex so we can modify the inactive list in msm_gem_new_impl */
  709. mutex_lock(&dev->struct_mutex);
  710. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj);
  711. mutex_unlock(&dev->struct_mutex);
  712. if (ret)
  713. goto fail;
  714. drm_gem_private_object_init(dev, obj, size);
  715. npages = size / PAGE_SIZE;
  716. msm_obj = to_msm_bo(obj);
  717. msm_obj->sgt = sgt;
  718. msm_obj->pages = drm_malloc_ab(npages, sizeof(struct page *));
  719. if (!msm_obj->pages) {
  720. ret = -ENOMEM;
  721. goto fail;
  722. }
  723. ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
  724. if (ret)
  725. goto fail;
  726. return obj;
  727. fail:
  728. drm_gem_object_unreference_unlocked(obj);
  729. return ERR_PTR(ret);
  730. }