msm_gem.c 25 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072
  1. /*
  2. * Copyright (C) 2013 Red Hat
  3. * Author: Rob Clark <robdclark@gmail.com>
  4. *
  5. * This program is free software; you can redistribute it and/or modify it
  6. * under the terms of the GNU General Public License version 2 as published by
  7. * the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but WITHOUT
  10. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  12. * more details.
  13. *
  14. * You should have received a copy of the GNU General Public License along with
  15. * this program. If not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include <linux/spinlock.h>
  18. #include <linux/shmem_fs.h>
  19. #include <linux/dma-buf.h>
  20. #include <linux/pfn_t.h>
  21. #include "msm_drv.h"
  22. #include "msm_fence.h"
  23. #include "msm_gem.h"
  24. #include "msm_gpu.h"
  25. #include "msm_mmu.h"
  26. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  27. static dma_addr_t physaddr(struct drm_gem_object *obj)
  28. {
  29. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  30. struct msm_drm_private *priv = obj->dev->dev_private;
  31. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  32. priv->vram.paddr;
  33. }
  34. static bool use_pages(struct drm_gem_object *obj)
  35. {
  36. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  37. return !msm_obj->vram_node;
  38. }
  39. /* allocate pages from VRAM carveout, used when no IOMMU: */
  40. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  41. {
  42. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  43. struct msm_drm_private *priv = obj->dev->dev_private;
  44. dma_addr_t paddr;
  45. struct page **p;
  46. int ret, i;
  47. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  48. if (!p)
  49. return ERR_PTR(-ENOMEM);
  50. spin_lock(&priv->vram.lock);
  51. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  52. spin_unlock(&priv->vram.lock);
  53. if (ret) {
  54. kvfree(p);
  55. return ERR_PTR(ret);
  56. }
  57. paddr = physaddr(obj);
  58. for (i = 0; i < npages; i++) {
  59. p[i] = phys_to_page(paddr);
  60. paddr += PAGE_SIZE;
  61. }
  62. return p;
  63. }
  64. static struct page **get_pages(struct drm_gem_object *obj)
  65. {
  66. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  67. if (!msm_obj->pages) {
  68. struct drm_device *dev = obj->dev;
  69. struct page **p;
  70. int npages = obj->size >> PAGE_SHIFT;
  71. if (use_pages(obj))
  72. p = drm_gem_get_pages(obj);
  73. else
  74. p = get_pages_vram(obj, npages);
  75. if (IS_ERR(p)) {
  76. dev_err(dev->dev, "could not get pages: %ld\n",
  77. PTR_ERR(p));
  78. return p;
  79. }
  80. msm_obj->sgt = drm_prime_pages_to_sg(p, npages);
  81. if (IS_ERR(msm_obj->sgt)) {
  82. dev_err(dev->dev, "failed to allocate sgt\n");
  83. return ERR_CAST(msm_obj->sgt);
  84. }
  85. msm_obj->pages = p;
  86. /* For non-cached buffers, ensure the new pages are clean
  87. * because display controller, GPU, etc. are not coherent:
  88. */
  89. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  90. dma_map_sg(dev->dev, msm_obj->sgt->sgl,
  91. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  92. }
  93. return msm_obj->pages;
  94. }
  95. static void put_pages_vram(struct drm_gem_object *obj)
  96. {
  97. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  98. struct msm_drm_private *priv = obj->dev->dev_private;
  99. spin_lock(&priv->vram.lock);
  100. drm_mm_remove_node(msm_obj->vram_node);
  101. spin_unlock(&priv->vram.lock);
  102. kvfree(msm_obj->pages);
  103. }
  104. static void put_pages(struct drm_gem_object *obj)
  105. {
  106. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  107. if (msm_obj->pages) {
  108. /* For non-cached buffers, ensure the new pages are clean
  109. * because display controller, GPU, etc. are not coherent:
  110. */
  111. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  112. dma_unmap_sg(obj->dev->dev, msm_obj->sgt->sgl,
  113. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  114. sg_free_table(msm_obj->sgt);
  115. kfree(msm_obj->sgt);
  116. if (use_pages(obj))
  117. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  118. else
  119. put_pages_vram(obj);
  120. msm_obj->pages = NULL;
  121. }
  122. }
  123. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  124. {
  125. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  126. struct page **p;
  127. mutex_lock(&msm_obj->lock);
  128. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  129. mutex_unlock(&msm_obj->lock);
  130. return ERR_PTR(-EBUSY);
  131. }
  132. p = get_pages(obj);
  133. mutex_unlock(&msm_obj->lock);
  134. return p;
  135. }
  136. void msm_gem_put_pages(struct drm_gem_object *obj)
  137. {
  138. /* when we start tracking the pin count, then do something here */
  139. }
  140. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  141. struct vm_area_struct *vma)
  142. {
  143. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  144. vma->vm_flags &= ~VM_PFNMAP;
  145. vma->vm_flags |= VM_MIXEDMAP;
  146. if (msm_obj->flags & MSM_BO_WC) {
  147. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  148. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  149. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  150. } else {
  151. /*
  152. * Shunt off cached objs to shmem file so they have their own
  153. * address_space (so unmap_mapping_range does what we want,
  154. * in particular in the case of mmap'd dmabufs)
  155. */
  156. fput(vma->vm_file);
  157. get_file(obj->filp);
  158. vma->vm_pgoff = 0;
  159. vma->vm_file = obj->filp;
  160. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  161. }
  162. return 0;
  163. }
  164. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  165. {
  166. int ret;
  167. ret = drm_gem_mmap(filp, vma);
  168. if (ret) {
  169. DBG("mmap failed: %d", ret);
  170. return ret;
  171. }
  172. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  173. }
  174. int msm_gem_fault(struct vm_fault *vmf)
  175. {
  176. struct vm_area_struct *vma = vmf->vma;
  177. struct drm_gem_object *obj = vma->vm_private_data;
  178. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  179. struct page **pages;
  180. unsigned long pfn;
  181. pgoff_t pgoff;
  182. int ret;
  183. /*
  184. * vm_ops.open/drm_gem_mmap_obj and close get and put
  185. * a reference on obj. So, we dont need to hold one here.
  186. */
  187. ret = mutex_lock_interruptible(&msm_obj->lock);
  188. if (ret)
  189. goto out;
  190. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  191. mutex_unlock(&msm_obj->lock);
  192. return VM_FAULT_SIGBUS;
  193. }
  194. /* make sure we have pages attached now */
  195. pages = get_pages(obj);
  196. if (IS_ERR(pages)) {
  197. ret = PTR_ERR(pages);
  198. goto out_unlock;
  199. }
  200. /* We don't use vmf->pgoff since that has the fake offset: */
  201. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  202. pfn = page_to_pfn(pages[pgoff]);
  203. VERB("Inserting %p pfn %lx, pa %lx", (void *)vmf->address,
  204. pfn, pfn << PAGE_SHIFT);
  205. ret = vm_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  206. out_unlock:
  207. mutex_unlock(&msm_obj->lock);
  208. out:
  209. switch (ret) {
  210. case -EAGAIN:
  211. case 0:
  212. case -ERESTARTSYS:
  213. case -EINTR:
  214. case -EBUSY:
  215. /*
  216. * EBUSY is ok: this just means that another thread
  217. * already did the job.
  218. */
  219. return VM_FAULT_NOPAGE;
  220. case -ENOMEM:
  221. return VM_FAULT_OOM;
  222. default:
  223. return VM_FAULT_SIGBUS;
  224. }
  225. }
  226. /** get mmap offset */
  227. static uint64_t mmap_offset(struct drm_gem_object *obj)
  228. {
  229. struct drm_device *dev = obj->dev;
  230. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  231. int ret;
  232. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  233. /* Make it mmapable */
  234. ret = drm_gem_create_mmap_offset(obj);
  235. if (ret) {
  236. dev_err(dev->dev, "could not allocate mmap offset\n");
  237. return 0;
  238. }
  239. return drm_vma_node_offset_addr(&obj->vma_node);
  240. }
  241. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  242. {
  243. uint64_t offset;
  244. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  245. mutex_lock(&msm_obj->lock);
  246. offset = mmap_offset(obj);
  247. mutex_unlock(&msm_obj->lock);
  248. return offset;
  249. }
  250. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  251. struct msm_gem_address_space *aspace)
  252. {
  253. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  254. struct msm_gem_vma *vma;
  255. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  256. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  257. if (!vma)
  258. return ERR_PTR(-ENOMEM);
  259. vma->aspace = aspace;
  260. list_add_tail(&vma->list, &msm_obj->vmas);
  261. return vma;
  262. }
  263. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  264. struct msm_gem_address_space *aspace)
  265. {
  266. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  267. struct msm_gem_vma *vma;
  268. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  269. list_for_each_entry(vma, &msm_obj->vmas, list) {
  270. if (vma->aspace == aspace)
  271. return vma;
  272. }
  273. return NULL;
  274. }
  275. static void del_vma(struct msm_gem_vma *vma)
  276. {
  277. if (!vma)
  278. return;
  279. list_del(&vma->list);
  280. kfree(vma);
  281. }
  282. /* Called with msm_obj->lock locked */
  283. static void
  284. put_iova(struct drm_gem_object *obj)
  285. {
  286. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  287. struct msm_gem_vma *vma, *tmp;
  288. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  289. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  290. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt);
  291. del_vma(vma);
  292. }
  293. }
  294. /* get iova, taking a reference. Should have a matching put */
  295. int msm_gem_get_iova(struct drm_gem_object *obj,
  296. struct msm_gem_address_space *aspace, uint64_t *iova)
  297. {
  298. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  299. struct msm_gem_vma *vma;
  300. int ret = 0;
  301. mutex_lock(&msm_obj->lock);
  302. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  303. mutex_unlock(&msm_obj->lock);
  304. return -EBUSY;
  305. }
  306. vma = lookup_vma(obj, aspace);
  307. if (!vma) {
  308. struct page **pages;
  309. vma = add_vma(obj, aspace);
  310. if (IS_ERR(vma)) {
  311. ret = PTR_ERR(vma);
  312. goto unlock;
  313. }
  314. pages = get_pages(obj);
  315. if (IS_ERR(pages)) {
  316. ret = PTR_ERR(pages);
  317. goto fail;
  318. }
  319. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  320. obj->size >> PAGE_SHIFT);
  321. if (ret)
  322. goto fail;
  323. }
  324. *iova = vma->iova;
  325. mutex_unlock(&msm_obj->lock);
  326. return 0;
  327. fail:
  328. del_vma(vma);
  329. unlock:
  330. mutex_unlock(&msm_obj->lock);
  331. return ret;
  332. }
  333. /* get iova without taking a reference, used in places where you have
  334. * already done a 'msm_gem_get_iova()'.
  335. */
  336. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  337. struct msm_gem_address_space *aspace)
  338. {
  339. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  340. struct msm_gem_vma *vma;
  341. mutex_lock(&msm_obj->lock);
  342. vma = lookup_vma(obj, aspace);
  343. mutex_unlock(&msm_obj->lock);
  344. WARN_ON(!vma);
  345. return vma ? vma->iova : 0;
  346. }
  347. void msm_gem_put_iova(struct drm_gem_object *obj,
  348. struct msm_gem_address_space *aspace)
  349. {
  350. // XXX TODO ..
  351. // NOTE: probably don't need a _locked() version.. we wouldn't
  352. // normally unmap here, but instead just mark that it could be
  353. // unmapped (if the iova refcnt drops to zero), but then later
  354. // if another _get_iova_locked() fails we can start unmapping
  355. // things that are no longer needed..
  356. }
  357. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  358. struct drm_mode_create_dumb *args)
  359. {
  360. args->pitch = align_pitch(args->width, args->bpp);
  361. args->size = PAGE_ALIGN(args->pitch * args->height);
  362. return msm_gem_new_handle(dev, file, args->size,
  363. MSM_BO_SCANOUT | MSM_BO_WC, &args->handle);
  364. }
  365. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  366. uint32_t handle, uint64_t *offset)
  367. {
  368. struct drm_gem_object *obj;
  369. int ret = 0;
  370. /* GEM does all our handle to object mapping */
  371. obj = drm_gem_object_lookup(file, handle);
  372. if (obj == NULL) {
  373. ret = -ENOENT;
  374. goto fail;
  375. }
  376. *offset = msm_gem_mmap_offset(obj);
  377. drm_gem_object_unreference_unlocked(obj);
  378. fail:
  379. return ret;
  380. }
  381. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  382. {
  383. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  384. int ret = 0;
  385. mutex_lock(&msm_obj->lock);
  386. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  387. mutex_unlock(&msm_obj->lock);
  388. return ERR_PTR(-EBUSY);
  389. }
  390. /* increment vmap_count *before* vmap() call, so shrinker can
  391. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  392. * This guarantees that we won't try to msm_gem_vunmap() this
  393. * same object from within the vmap() call (while we already
  394. * hold msm_obj->lock)
  395. */
  396. msm_obj->vmap_count++;
  397. if (!msm_obj->vaddr) {
  398. struct page **pages = get_pages(obj);
  399. if (IS_ERR(pages)) {
  400. ret = PTR_ERR(pages);
  401. goto fail;
  402. }
  403. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  404. VM_MAP, pgprot_writecombine(PAGE_KERNEL));
  405. if (msm_obj->vaddr == NULL) {
  406. ret = -ENOMEM;
  407. goto fail;
  408. }
  409. }
  410. mutex_unlock(&msm_obj->lock);
  411. return msm_obj->vaddr;
  412. fail:
  413. msm_obj->vmap_count--;
  414. mutex_unlock(&msm_obj->lock);
  415. return ERR_PTR(ret);
  416. }
  417. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  418. {
  419. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  420. mutex_lock(&msm_obj->lock);
  421. WARN_ON(msm_obj->vmap_count < 1);
  422. msm_obj->vmap_count--;
  423. mutex_unlock(&msm_obj->lock);
  424. }
  425. /* Update madvise status, returns true if not purged, else
  426. * false or -errno.
  427. */
  428. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  429. {
  430. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  431. mutex_lock(&msm_obj->lock);
  432. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  433. if (msm_obj->madv != __MSM_MADV_PURGED)
  434. msm_obj->madv = madv;
  435. madv = msm_obj->madv;
  436. mutex_unlock(&msm_obj->lock);
  437. return (madv != __MSM_MADV_PURGED);
  438. }
  439. void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  440. {
  441. struct drm_device *dev = obj->dev;
  442. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  443. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  444. WARN_ON(!is_purgeable(msm_obj));
  445. WARN_ON(obj->import_attach);
  446. mutex_lock_nested(&msm_obj->lock, subclass);
  447. put_iova(obj);
  448. msm_gem_vunmap_locked(obj);
  449. put_pages(obj);
  450. msm_obj->madv = __MSM_MADV_PURGED;
  451. drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
  452. drm_gem_free_mmap_offset(obj);
  453. /* Our goal here is to return as much of the memory as
  454. * is possible back to the system as we are called from OOM.
  455. * To do this we must instruct the shmfs to drop all of its
  456. * backing pages, *now*.
  457. */
  458. shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
  459. invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
  460. 0, (loff_t)-1);
  461. mutex_unlock(&msm_obj->lock);
  462. }
  463. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  464. {
  465. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  466. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  467. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  468. return;
  469. vunmap(msm_obj->vaddr);
  470. msm_obj->vaddr = NULL;
  471. }
  472. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  473. {
  474. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  475. mutex_lock_nested(&msm_obj->lock, subclass);
  476. msm_gem_vunmap_locked(obj);
  477. mutex_unlock(&msm_obj->lock);
  478. }
  479. /* must be called before _move_to_active().. */
  480. int msm_gem_sync_object(struct drm_gem_object *obj,
  481. struct msm_fence_context *fctx, bool exclusive)
  482. {
  483. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  484. struct reservation_object_list *fobj;
  485. struct dma_fence *fence;
  486. int i, ret;
  487. if (!exclusive) {
  488. /* NOTE: _reserve_shared() must happen before _add_shared_fence(),
  489. * which makes this a slightly strange place to call it. OTOH this
  490. * is a convenient can-fail point to hook it in. (And similar to
  491. * how etnaviv and nouveau handle this.)
  492. */
  493. ret = reservation_object_reserve_shared(msm_obj->resv);
  494. if (ret)
  495. return ret;
  496. }
  497. fobj = reservation_object_get_list(msm_obj->resv);
  498. if (!fobj || (fobj->shared_count == 0)) {
  499. fence = reservation_object_get_excl(msm_obj->resv);
  500. /* don't need to wait on our own fences, since ring is fifo */
  501. if (fence && (fence->context != fctx->context)) {
  502. ret = dma_fence_wait(fence, true);
  503. if (ret)
  504. return ret;
  505. }
  506. }
  507. if (!exclusive || !fobj)
  508. return 0;
  509. for (i = 0; i < fobj->shared_count; i++) {
  510. fence = rcu_dereference_protected(fobj->shared[i],
  511. reservation_object_held(msm_obj->resv));
  512. if (fence->context != fctx->context) {
  513. ret = dma_fence_wait(fence, true);
  514. if (ret)
  515. return ret;
  516. }
  517. }
  518. return 0;
  519. }
  520. void msm_gem_move_to_active(struct drm_gem_object *obj,
  521. struct msm_gpu *gpu, bool exclusive, struct dma_fence *fence)
  522. {
  523. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  524. WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
  525. msm_obj->gpu = gpu;
  526. if (exclusive)
  527. reservation_object_add_excl_fence(msm_obj->resv, fence);
  528. else
  529. reservation_object_add_shared_fence(msm_obj->resv, fence);
  530. list_del_init(&msm_obj->mm_list);
  531. list_add_tail(&msm_obj->mm_list, &gpu->active_list);
  532. }
  533. void msm_gem_move_to_inactive(struct drm_gem_object *obj)
  534. {
  535. struct drm_device *dev = obj->dev;
  536. struct msm_drm_private *priv = dev->dev_private;
  537. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  538. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  539. msm_obj->gpu = NULL;
  540. list_del_init(&msm_obj->mm_list);
  541. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  542. }
  543. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  544. {
  545. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  546. bool write = !!(op & MSM_PREP_WRITE);
  547. unsigned long remain =
  548. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  549. long ret;
  550. ret = reservation_object_wait_timeout_rcu(msm_obj->resv, write,
  551. true, remain);
  552. if (ret == 0)
  553. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  554. else if (ret < 0)
  555. return ret;
  556. /* TODO cache maintenance */
  557. return 0;
  558. }
  559. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  560. {
  561. /* TODO cache maintenance */
  562. return 0;
  563. }
  564. #ifdef CONFIG_DEBUG_FS
  565. static void describe_fence(struct dma_fence *fence, const char *type,
  566. struct seq_file *m)
  567. {
  568. if (!dma_fence_is_signaled(fence))
  569. seq_printf(m, "\t%9s: %s %s seq %u\n", type,
  570. fence->ops->get_driver_name(fence),
  571. fence->ops->get_timeline_name(fence),
  572. fence->seqno);
  573. }
  574. void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
  575. {
  576. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  577. struct reservation_object *robj = msm_obj->resv;
  578. struct reservation_object_list *fobj;
  579. struct dma_fence *fence;
  580. struct msm_gem_vma *vma;
  581. uint64_t off = drm_vma_node_start(&obj->vma_node);
  582. const char *madv;
  583. mutex_lock(&msm_obj->lock);
  584. switch (msm_obj->madv) {
  585. case __MSM_MADV_PURGED:
  586. madv = " purged";
  587. break;
  588. case MSM_MADV_DONTNEED:
  589. madv = " purgeable";
  590. break;
  591. case MSM_MADV_WILLNEED:
  592. default:
  593. madv = "";
  594. break;
  595. }
  596. seq_printf(m, "%08x: %c %2d (%2d) %08llx %p\t",
  597. msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
  598. obj->name, kref_read(&obj->refcount),
  599. off, msm_obj->vaddr);
  600. /* FIXME: we need to print the address space here too */
  601. list_for_each_entry(vma, &msm_obj->vmas, list)
  602. seq_printf(m, " %08llx", vma->iova);
  603. seq_printf(m, " %zu%s\n", obj->size, madv);
  604. rcu_read_lock();
  605. fobj = rcu_dereference(robj->fence);
  606. if (fobj) {
  607. unsigned int i, shared_count = fobj->shared_count;
  608. for (i = 0; i < shared_count; i++) {
  609. fence = rcu_dereference(fobj->shared[i]);
  610. describe_fence(fence, "Shared", m);
  611. }
  612. }
  613. fence = rcu_dereference(robj->fence_excl);
  614. if (fence)
  615. describe_fence(fence, "Exclusive", m);
  616. rcu_read_unlock();
  617. mutex_unlock(&msm_obj->lock);
  618. }
  619. void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
  620. {
  621. struct msm_gem_object *msm_obj;
  622. int count = 0;
  623. size_t size = 0;
  624. list_for_each_entry(msm_obj, list, mm_list) {
  625. struct drm_gem_object *obj = &msm_obj->base;
  626. seq_printf(m, " ");
  627. msm_gem_describe(obj, m);
  628. count++;
  629. size += obj->size;
  630. }
  631. seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
  632. }
  633. #endif
  634. void msm_gem_free_object(struct drm_gem_object *obj)
  635. {
  636. struct drm_device *dev = obj->dev;
  637. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  638. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  639. /* object should not be on active list: */
  640. WARN_ON(is_active(msm_obj));
  641. list_del(&msm_obj->mm_list);
  642. mutex_lock(&msm_obj->lock);
  643. put_iova(obj);
  644. if (obj->import_attach) {
  645. if (msm_obj->vaddr)
  646. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  647. /* Don't drop the pages for imported dmabuf, as they are not
  648. * ours, just free the array we allocated:
  649. */
  650. if (msm_obj->pages)
  651. kvfree(msm_obj->pages);
  652. drm_prime_gem_destroy(obj, msm_obj->sgt);
  653. } else {
  654. msm_gem_vunmap_locked(obj);
  655. put_pages(obj);
  656. }
  657. if (msm_obj->resv == &msm_obj->_resv)
  658. reservation_object_fini(msm_obj->resv);
  659. drm_gem_object_release(obj);
  660. mutex_unlock(&msm_obj->lock);
  661. kfree(msm_obj);
  662. }
  663. /* convenience method to construct a GEM buffer object, and userspace handle */
  664. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  665. uint32_t size, uint32_t flags, uint32_t *handle)
  666. {
  667. struct drm_gem_object *obj;
  668. int ret;
  669. obj = msm_gem_new(dev, size, flags);
  670. if (IS_ERR(obj))
  671. return PTR_ERR(obj);
  672. ret = drm_gem_handle_create(file, obj, handle);
  673. /* drop reference from allocate - handle holds it now */
  674. drm_gem_object_unreference_unlocked(obj);
  675. return ret;
  676. }
  677. static int msm_gem_new_impl(struct drm_device *dev,
  678. uint32_t size, uint32_t flags,
  679. struct reservation_object *resv,
  680. struct drm_gem_object **obj,
  681. bool struct_mutex_locked)
  682. {
  683. struct msm_drm_private *priv = dev->dev_private;
  684. struct msm_gem_object *msm_obj;
  685. switch (flags & MSM_BO_CACHE_MASK) {
  686. case MSM_BO_UNCACHED:
  687. case MSM_BO_CACHED:
  688. case MSM_BO_WC:
  689. break;
  690. default:
  691. dev_err(dev->dev, "invalid cache flag: %x\n",
  692. (flags & MSM_BO_CACHE_MASK));
  693. return -EINVAL;
  694. }
  695. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  696. if (!msm_obj)
  697. return -ENOMEM;
  698. mutex_init(&msm_obj->lock);
  699. msm_obj->flags = flags;
  700. msm_obj->madv = MSM_MADV_WILLNEED;
  701. if (resv) {
  702. msm_obj->resv = resv;
  703. } else {
  704. msm_obj->resv = &msm_obj->_resv;
  705. reservation_object_init(msm_obj->resv);
  706. }
  707. INIT_LIST_HEAD(&msm_obj->submit_entry);
  708. INIT_LIST_HEAD(&msm_obj->vmas);
  709. if (struct_mutex_locked) {
  710. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  711. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  712. } else {
  713. mutex_lock(&dev->struct_mutex);
  714. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  715. mutex_unlock(&dev->struct_mutex);
  716. }
  717. *obj = &msm_obj->base;
  718. return 0;
  719. }
  720. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  721. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  722. {
  723. struct msm_drm_private *priv = dev->dev_private;
  724. struct drm_gem_object *obj = NULL;
  725. bool use_vram = false;
  726. int ret;
  727. size = PAGE_ALIGN(size);
  728. if (!iommu_present(&platform_bus_type))
  729. use_vram = true;
  730. else if ((flags & MSM_BO_STOLEN) && priv->vram.size)
  731. use_vram = true;
  732. if (WARN_ON(use_vram && !priv->vram.size))
  733. return ERR_PTR(-EINVAL);
  734. /* Disallow zero sized objects as they make the underlying
  735. * infrastructure grumpy
  736. */
  737. if (size == 0)
  738. return ERR_PTR(-EINVAL);
  739. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  740. if (ret)
  741. goto fail;
  742. if (use_vram) {
  743. struct msm_gem_vma *vma;
  744. struct page **pages;
  745. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  746. mutex_lock(&msm_obj->lock);
  747. vma = add_vma(obj, NULL);
  748. mutex_unlock(&msm_obj->lock);
  749. if (IS_ERR(vma)) {
  750. ret = PTR_ERR(vma);
  751. goto fail;
  752. }
  753. to_msm_bo(obj)->vram_node = &vma->node;
  754. drm_gem_private_object_init(dev, obj, size);
  755. pages = get_pages(obj);
  756. if (IS_ERR(pages)) {
  757. ret = PTR_ERR(pages);
  758. goto fail;
  759. }
  760. vma->iova = physaddr(obj);
  761. } else {
  762. ret = drm_gem_object_init(dev, obj, size);
  763. if (ret)
  764. goto fail;
  765. }
  766. return obj;
  767. fail:
  768. drm_gem_object_unreference_unlocked(obj);
  769. return ERR_PTR(ret);
  770. }
  771. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  772. uint32_t size, uint32_t flags)
  773. {
  774. return _msm_gem_new(dev, size, flags, true);
  775. }
  776. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  777. uint32_t size, uint32_t flags)
  778. {
  779. return _msm_gem_new(dev, size, flags, false);
  780. }
  781. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  782. struct dma_buf *dmabuf, struct sg_table *sgt)
  783. {
  784. struct msm_gem_object *msm_obj;
  785. struct drm_gem_object *obj;
  786. uint32_t size;
  787. int ret, npages;
  788. /* if we don't have IOMMU, don't bother pretending we can import: */
  789. if (!iommu_present(&platform_bus_type)) {
  790. dev_err(dev->dev, "cannot import without IOMMU\n");
  791. return ERR_PTR(-EINVAL);
  792. }
  793. size = PAGE_ALIGN(dmabuf->size);
  794. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
  795. if (ret)
  796. goto fail;
  797. drm_gem_private_object_init(dev, obj, size);
  798. npages = size / PAGE_SIZE;
  799. msm_obj = to_msm_bo(obj);
  800. mutex_lock(&msm_obj->lock);
  801. msm_obj->sgt = sgt;
  802. msm_obj->pages = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  803. if (!msm_obj->pages) {
  804. mutex_unlock(&msm_obj->lock);
  805. ret = -ENOMEM;
  806. goto fail;
  807. }
  808. ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
  809. if (ret) {
  810. mutex_unlock(&msm_obj->lock);
  811. goto fail;
  812. }
  813. mutex_unlock(&msm_obj->lock);
  814. return obj;
  815. fail:
  816. drm_gem_object_unreference_unlocked(obj);
  817. return ERR_PTR(ret);
  818. }
  819. static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  820. uint32_t flags, struct msm_gem_address_space *aspace,
  821. struct drm_gem_object **bo, uint64_t *iova, bool locked)
  822. {
  823. void *vaddr;
  824. struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
  825. int ret;
  826. if (IS_ERR(obj))
  827. return ERR_CAST(obj);
  828. if (iova) {
  829. ret = msm_gem_get_iova(obj, aspace, iova);
  830. if (ret) {
  831. drm_gem_object_unreference(obj);
  832. return ERR_PTR(ret);
  833. }
  834. }
  835. vaddr = msm_gem_get_vaddr(obj);
  836. if (!vaddr) {
  837. msm_gem_put_iova(obj, aspace);
  838. drm_gem_object_unreference(obj);
  839. return ERR_PTR(-ENOMEM);
  840. }
  841. if (bo)
  842. *bo = obj;
  843. return vaddr;
  844. }
  845. void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  846. uint32_t flags, struct msm_gem_address_space *aspace,
  847. struct drm_gem_object **bo, uint64_t *iova)
  848. {
  849. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
  850. }
  851. void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
  852. uint32_t flags, struct msm_gem_address_space *aspace,
  853. struct drm_gem_object **bo, uint64_t *iova)
  854. {
  855. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
  856. }