msm_gem.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020
  1. /*
  2. * Copyright (C) 2013 Red Hat
  3. * Author: Rob Clark <robdclark@gmail.com>
  4. *
  5. * This program is free software; you can redistribute it and/or modify it
  6. * under the terms of the GNU General Public License version 2 as published by
  7. * the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but WITHOUT
  10. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  12. * more details.
  13. *
  14. * You should have received a copy of the GNU General Public License along with
  15. * this program. If not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include <linux/spinlock.h>
  18. #include <linux/shmem_fs.h>
  19. #include <linux/dma-buf.h>
  20. #include <linux/pfn_t.h>
  21. #include "msm_drv.h"
  22. #include "msm_fence.h"
  23. #include "msm_gem.h"
  24. #include "msm_gpu.h"
  25. #include "msm_mmu.h"
  26. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  27. static dma_addr_t physaddr(struct drm_gem_object *obj)
  28. {
  29. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  30. struct msm_drm_private *priv = obj->dev->dev_private;
  31. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  32. priv->vram.paddr;
  33. }
  34. static bool use_pages(struct drm_gem_object *obj)
  35. {
  36. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  37. return !msm_obj->vram_node;
  38. }
  39. /* allocate pages from VRAM carveout, used when no IOMMU: */
  40. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  41. {
  42. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  43. struct msm_drm_private *priv = obj->dev->dev_private;
  44. dma_addr_t paddr;
  45. struct page **p;
  46. int ret, i;
  47. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  48. if (!p)
  49. return ERR_PTR(-ENOMEM);
  50. spin_lock(&priv->vram.lock);
  51. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  52. spin_unlock(&priv->vram.lock);
  53. if (ret) {
  54. kvfree(p);
  55. return ERR_PTR(ret);
  56. }
  57. paddr = physaddr(obj);
  58. for (i = 0; i < npages; i++) {
  59. p[i] = phys_to_page(paddr);
  60. paddr += PAGE_SIZE;
  61. }
  62. return p;
  63. }
  64. static struct page **get_pages(struct drm_gem_object *obj)
  65. {
  66. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  67. if (!msm_obj->pages) {
  68. struct drm_device *dev = obj->dev;
  69. struct page **p;
  70. int npages = obj->size >> PAGE_SHIFT;
  71. if (use_pages(obj))
  72. p = drm_gem_get_pages(obj);
  73. else
  74. p = get_pages_vram(obj, npages);
  75. if (IS_ERR(p)) {
  76. dev_err(dev->dev, "could not get pages: %ld\n",
  77. PTR_ERR(p));
  78. return p;
  79. }
  80. msm_obj->sgt = drm_prime_pages_to_sg(p, npages);
  81. if (IS_ERR(msm_obj->sgt)) {
  82. dev_err(dev->dev, "failed to allocate sgt\n");
  83. return ERR_CAST(msm_obj->sgt);
  84. }
  85. msm_obj->pages = p;
  86. /* For non-cached buffers, ensure the new pages are clean
  87. * because display controller, GPU, etc. are not coherent:
  88. */
  89. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  90. dma_map_sg(dev->dev, msm_obj->sgt->sgl,
  91. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  92. }
  93. return msm_obj->pages;
  94. }
  95. static void put_pages_vram(struct drm_gem_object *obj)
  96. {
  97. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  98. struct msm_drm_private *priv = obj->dev->dev_private;
  99. spin_lock(&priv->vram.lock);
  100. drm_mm_remove_node(msm_obj->vram_node);
  101. spin_unlock(&priv->vram.lock);
  102. kvfree(msm_obj->pages);
  103. }
  104. static void put_pages(struct drm_gem_object *obj)
  105. {
  106. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  107. if (msm_obj->pages) {
  108. /* For non-cached buffers, ensure the new pages are clean
  109. * because display controller, GPU, etc. are not coherent:
  110. */
  111. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  112. dma_unmap_sg(obj->dev->dev, msm_obj->sgt->sgl,
  113. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  114. sg_free_table(msm_obj->sgt);
  115. kfree(msm_obj->sgt);
  116. if (use_pages(obj))
  117. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  118. else
  119. put_pages_vram(obj);
  120. msm_obj->pages = NULL;
  121. }
  122. }
  123. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  124. {
  125. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  126. struct page **p;
  127. mutex_lock(&msm_obj->lock);
  128. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  129. mutex_unlock(&msm_obj->lock);
  130. return ERR_PTR(-EBUSY);
  131. }
  132. p = get_pages(obj);
  133. mutex_unlock(&msm_obj->lock);
  134. return p;
  135. }
  136. void msm_gem_put_pages(struct drm_gem_object *obj)
  137. {
  138. /* when we start tracking the pin count, then do something here */
  139. }
  140. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  141. struct vm_area_struct *vma)
  142. {
  143. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  144. vma->vm_flags &= ~VM_PFNMAP;
  145. vma->vm_flags |= VM_MIXEDMAP;
  146. if (msm_obj->flags & MSM_BO_WC) {
  147. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  148. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  149. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  150. } else {
  151. /*
  152. * Shunt off cached objs to shmem file so they have their own
  153. * address_space (so unmap_mapping_range does what we want,
  154. * in particular in the case of mmap'd dmabufs)
  155. */
  156. fput(vma->vm_file);
  157. get_file(obj->filp);
  158. vma->vm_pgoff = 0;
  159. vma->vm_file = obj->filp;
  160. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  161. }
  162. return 0;
  163. }
  164. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  165. {
  166. int ret;
  167. ret = drm_gem_mmap(filp, vma);
  168. if (ret) {
  169. DBG("mmap failed: %d", ret);
  170. return ret;
  171. }
  172. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  173. }
  174. int msm_gem_fault(struct vm_fault *vmf)
  175. {
  176. struct vm_area_struct *vma = vmf->vma;
  177. struct drm_gem_object *obj = vma->vm_private_data;
  178. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  179. struct page **pages;
  180. unsigned long pfn;
  181. pgoff_t pgoff;
  182. int ret;
  183. /*
  184. * vm_ops.open/drm_gem_mmap_obj and close get and put
  185. * a reference on obj. So, we dont need to hold one here.
  186. */
  187. ret = mutex_lock_interruptible(&msm_obj->lock);
  188. if (ret)
  189. goto out;
  190. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  191. mutex_unlock(&msm_obj->lock);
  192. return VM_FAULT_SIGBUS;
  193. }
  194. /* make sure we have pages attached now */
  195. pages = get_pages(obj);
  196. if (IS_ERR(pages)) {
  197. ret = PTR_ERR(pages);
  198. goto out_unlock;
  199. }
  200. /* We don't use vmf->pgoff since that has the fake offset: */
  201. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  202. pfn = page_to_pfn(pages[pgoff]);
  203. VERB("Inserting %p pfn %lx, pa %lx", (void *)vmf->address,
  204. pfn, pfn << PAGE_SHIFT);
  205. ret = vm_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  206. out_unlock:
  207. mutex_unlock(&msm_obj->lock);
  208. out:
  209. switch (ret) {
  210. case -EAGAIN:
  211. case 0:
  212. case -ERESTARTSYS:
  213. case -EINTR:
  214. case -EBUSY:
  215. /*
  216. * EBUSY is ok: this just means that another thread
  217. * already did the job.
  218. */
  219. return VM_FAULT_NOPAGE;
  220. case -ENOMEM:
  221. return VM_FAULT_OOM;
  222. default:
  223. return VM_FAULT_SIGBUS;
  224. }
  225. }
  226. /** get mmap offset */
  227. static uint64_t mmap_offset(struct drm_gem_object *obj)
  228. {
  229. struct drm_device *dev = obj->dev;
  230. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  231. int ret;
  232. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  233. /* Make it mmapable */
  234. ret = drm_gem_create_mmap_offset(obj);
  235. if (ret) {
  236. dev_err(dev->dev, "could not allocate mmap offset\n");
  237. return 0;
  238. }
  239. return drm_vma_node_offset_addr(&obj->vma_node);
  240. }
  241. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  242. {
  243. uint64_t offset;
  244. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  245. mutex_lock(&msm_obj->lock);
  246. offset = mmap_offset(obj);
  247. mutex_unlock(&msm_obj->lock);
  248. return offset;
  249. }
  250. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  251. struct msm_gem_address_space *aspace)
  252. {
  253. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  254. struct msm_gem_vma *vma;
  255. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  256. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  257. if (!vma)
  258. return ERR_PTR(-ENOMEM);
  259. vma->aspace = aspace;
  260. list_add_tail(&vma->list, &msm_obj->vmas);
  261. return vma;
  262. }
  263. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  264. struct msm_gem_address_space *aspace)
  265. {
  266. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  267. struct msm_gem_vma *vma;
  268. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  269. list_for_each_entry(vma, &msm_obj->vmas, list) {
  270. if (vma->aspace == aspace)
  271. return vma;
  272. }
  273. return NULL;
  274. }
  275. static void del_vma(struct msm_gem_vma *vma)
  276. {
  277. if (!vma)
  278. return;
  279. list_del(&vma->list);
  280. kfree(vma);
  281. }
  282. /* Called with msm_obj->lock locked */
  283. static void
  284. put_iova(struct drm_gem_object *obj)
  285. {
  286. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  287. struct msm_gem_vma *vma, *tmp;
  288. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  289. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  290. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt);
  291. del_vma(vma);
  292. }
  293. }
  294. /* get iova, taking a reference. Should have a matching put */
  295. int msm_gem_get_iova(struct drm_gem_object *obj,
  296. struct msm_gem_address_space *aspace, uint64_t *iova)
  297. {
  298. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  299. struct msm_gem_vma *vma;
  300. int ret = 0;
  301. mutex_lock(&msm_obj->lock);
  302. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  303. mutex_unlock(&msm_obj->lock);
  304. return -EBUSY;
  305. }
  306. vma = lookup_vma(obj, aspace);
  307. if (!vma) {
  308. struct page **pages;
  309. vma = add_vma(obj, aspace);
  310. if (IS_ERR(vma))
  311. return PTR_ERR(vma);
  312. pages = get_pages(obj);
  313. if (IS_ERR(pages)) {
  314. ret = PTR_ERR(pages);
  315. goto fail;
  316. }
  317. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  318. obj->size >> PAGE_SHIFT);
  319. if (ret)
  320. goto fail;
  321. }
  322. *iova = vma->iova;
  323. mutex_unlock(&msm_obj->lock);
  324. return 0;
  325. fail:
  326. del_vma(vma);
  327. mutex_unlock(&msm_obj->lock);
  328. return ret;
  329. }
  330. /* get iova without taking a reference, used in places where you have
  331. * already done a 'msm_gem_get_iova()'.
  332. */
  333. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  334. struct msm_gem_address_space *aspace)
  335. {
  336. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  337. struct msm_gem_vma *vma;
  338. mutex_lock(&msm_obj->lock);
  339. vma = lookup_vma(obj, aspace);
  340. mutex_unlock(&msm_obj->lock);
  341. WARN_ON(!vma);
  342. return vma ? vma->iova : 0;
  343. }
  344. void msm_gem_put_iova(struct drm_gem_object *obj,
  345. struct msm_gem_address_space *aspace)
  346. {
  347. // XXX TODO ..
  348. // NOTE: probably don't need a _locked() version.. we wouldn't
  349. // normally unmap here, but instead just mark that it could be
  350. // unmapped (if the iova refcnt drops to zero), but then later
  351. // if another _get_iova_locked() fails we can start unmapping
  352. // things that are no longer needed..
  353. }
  354. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  355. struct drm_mode_create_dumb *args)
  356. {
  357. args->pitch = align_pitch(args->width, args->bpp);
  358. args->size = PAGE_ALIGN(args->pitch * args->height);
  359. return msm_gem_new_handle(dev, file, args->size,
  360. MSM_BO_SCANOUT | MSM_BO_WC, &args->handle);
  361. }
  362. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  363. uint32_t handle, uint64_t *offset)
  364. {
  365. struct drm_gem_object *obj;
  366. int ret = 0;
  367. /* GEM does all our handle to object mapping */
  368. obj = drm_gem_object_lookup(file, handle);
  369. if (obj == NULL) {
  370. ret = -ENOENT;
  371. goto fail;
  372. }
  373. *offset = msm_gem_mmap_offset(obj);
  374. drm_gem_object_unreference_unlocked(obj);
  375. fail:
  376. return ret;
  377. }
  378. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  379. {
  380. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  381. int ret = 0;
  382. mutex_lock(&msm_obj->lock);
  383. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  384. mutex_unlock(&msm_obj->lock);
  385. return ERR_PTR(-EBUSY);
  386. }
  387. /* increment vmap_count *before* vmap() call, so shrinker can
  388. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  389. * This guarantees that we won't try to msm_gem_vunmap() this
  390. * same object from within the vmap() call (while we already
  391. * hold msm_obj->lock)
  392. */
  393. msm_obj->vmap_count++;
  394. if (!msm_obj->vaddr) {
  395. struct page **pages = get_pages(obj);
  396. if (IS_ERR(pages)) {
  397. ret = PTR_ERR(pages);
  398. goto fail;
  399. }
  400. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  401. VM_MAP, pgprot_writecombine(PAGE_KERNEL));
  402. if (msm_obj->vaddr == NULL) {
  403. ret = -ENOMEM;
  404. goto fail;
  405. }
  406. }
  407. mutex_unlock(&msm_obj->lock);
  408. return msm_obj->vaddr;
  409. fail:
  410. msm_obj->vmap_count--;
  411. mutex_unlock(&msm_obj->lock);
  412. return ERR_PTR(ret);
  413. }
  414. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  415. {
  416. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  417. mutex_lock(&msm_obj->lock);
  418. WARN_ON(msm_obj->vmap_count < 1);
  419. msm_obj->vmap_count--;
  420. mutex_unlock(&msm_obj->lock);
  421. }
  422. /* Update madvise status, returns true if not purged, else
  423. * false or -errno.
  424. */
  425. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  426. {
  427. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  428. mutex_lock(&msm_obj->lock);
  429. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  430. if (msm_obj->madv != __MSM_MADV_PURGED)
  431. msm_obj->madv = madv;
  432. madv = msm_obj->madv;
  433. mutex_unlock(&msm_obj->lock);
  434. return (madv != __MSM_MADV_PURGED);
  435. }
  436. void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  437. {
  438. struct drm_device *dev = obj->dev;
  439. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  440. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  441. WARN_ON(!is_purgeable(msm_obj));
  442. WARN_ON(obj->import_attach);
  443. mutex_lock_nested(&msm_obj->lock, subclass);
  444. put_iova(obj);
  445. msm_gem_vunmap_locked(obj);
  446. put_pages(obj);
  447. msm_obj->madv = __MSM_MADV_PURGED;
  448. drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
  449. drm_gem_free_mmap_offset(obj);
  450. /* Our goal here is to return as much of the memory as
  451. * is possible back to the system as we are called from OOM.
  452. * To do this we must instruct the shmfs to drop all of its
  453. * backing pages, *now*.
  454. */
  455. shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
  456. invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
  457. 0, (loff_t)-1);
  458. mutex_unlock(&msm_obj->lock);
  459. }
  460. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  461. {
  462. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  463. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  464. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  465. return;
  466. vunmap(msm_obj->vaddr);
  467. msm_obj->vaddr = NULL;
  468. }
  469. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  470. {
  471. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  472. mutex_lock_nested(&msm_obj->lock, subclass);
  473. msm_gem_vunmap_locked(obj);
  474. mutex_unlock(&msm_obj->lock);
  475. }
  476. /* must be called before _move_to_active().. */
  477. int msm_gem_sync_object(struct drm_gem_object *obj,
  478. struct msm_fence_context *fctx, bool exclusive)
  479. {
  480. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  481. struct reservation_object_list *fobj;
  482. struct dma_fence *fence;
  483. int i, ret;
  484. if (!exclusive) {
  485. /* NOTE: _reserve_shared() must happen before _add_shared_fence(),
  486. * which makes this a slightly strange place to call it. OTOH this
  487. * is a convenient can-fail point to hook it in. (And similar to
  488. * how etnaviv and nouveau handle this.)
  489. */
  490. ret = reservation_object_reserve_shared(msm_obj->resv);
  491. if (ret)
  492. return ret;
  493. }
  494. fobj = reservation_object_get_list(msm_obj->resv);
  495. if (!fobj || (fobj->shared_count == 0)) {
  496. fence = reservation_object_get_excl(msm_obj->resv);
  497. /* don't need to wait on our own fences, since ring is fifo */
  498. if (fence && (fence->context != fctx->context)) {
  499. ret = dma_fence_wait(fence, true);
  500. if (ret)
  501. return ret;
  502. }
  503. }
  504. if (!exclusive || !fobj)
  505. return 0;
  506. for (i = 0; i < fobj->shared_count; i++) {
  507. fence = rcu_dereference_protected(fobj->shared[i],
  508. reservation_object_held(msm_obj->resv));
  509. if (fence->context != fctx->context) {
  510. ret = dma_fence_wait(fence, true);
  511. if (ret)
  512. return ret;
  513. }
  514. }
  515. return 0;
  516. }
  517. void msm_gem_move_to_active(struct drm_gem_object *obj,
  518. struct msm_gpu *gpu, bool exclusive, struct dma_fence *fence)
  519. {
  520. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  521. WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
  522. msm_obj->gpu = gpu;
  523. if (exclusive)
  524. reservation_object_add_excl_fence(msm_obj->resv, fence);
  525. else
  526. reservation_object_add_shared_fence(msm_obj->resv, fence);
  527. list_del_init(&msm_obj->mm_list);
  528. list_add_tail(&msm_obj->mm_list, &gpu->active_list);
  529. }
  530. void msm_gem_move_to_inactive(struct drm_gem_object *obj)
  531. {
  532. struct drm_device *dev = obj->dev;
  533. struct msm_drm_private *priv = dev->dev_private;
  534. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  535. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  536. msm_obj->gpu = NULL;
  537. list_del_init(&msm_obj->mm_list);
  538. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  539. }
  540. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  541. {
  542. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  543. bool write = !!(op & MSM_PREP_WRITE);
  544. unsigned long remain =
  545. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  546. long ret;
  547. ret = reservation_object_wait_timeout_rcu(msm_obj->resv, write,
  548. true, remain);
  549. if (ret == 0)
  550. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  551. else if (ret < 0)
  552. return ret;
  553. /* TODO cache maintenance */
  554. return 0;
  555. }
  556. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  557. {
  558. /* TODO cache maintenance */
  559. return 0;
  560. }
  561. #ifdef CONFIG_DEBUG_FS
  562. static void describe_fence(struct dma_fence *fence, const char *type,
  563. struct seq_file *m)
  564. {
  565. if (!dma_fence_is_signaled(fence))
  566. seq_printf(m, "\t%9s: %s %s seq %u\n", type,
  567. fence->ops->get_driver_name(fence),
  568. fence->ops->get_timeline_name(fence),
  569. fence->seqno);
  570. }
  571. void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
  572. {
  573. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  574. struct reservation_object *robj = msm_obj->resv;
  575. struct reservation_object_list *fobj;
  576. struct dma_fence *fence;
  577. struct msm_gem_vma *vma;
  578. uint64_t off = drm_vma_node_start(&obj->vma_node);
  579. const char *madv;
  580. mutex_lock(&msm_obj->lock);
  581. switch (msm_obj->madv) {
  582. case __MSM_MADV_PURGED:
  583. madv = " purged";
  584. break;
  585. case MSM_MADV_DONTNEED:
  586. madv = " purgeable";
  587. break;
  588. case MSM_MADV_WILLNEED:
  589. default:
  590. madv = "";
  591. break;
  592. }
  593. seq_printf(m, "%08x: %c %2d (%2d) %08llx %p\t",
  594. msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
  595. obj->name, kref_read(&obj->refcount),
  596. off, msm_obj->vaddr);
  597. /* FIXME: we need to print the address space here too */
  598. list_for_each_entry(vma, &msm_obj->vmas, list)
  599. seq_printf(m, " %08llx", vma->iova);
  600. seq_printf(m, " %zu%s\n", obj->size, madv);
  601. rcu_read_lock();
  602. fobj = rcu_dereference(robj->fence);
  603. if (fobj) {
  604. unsigned int i, shared_count = fobj->shared_count;
  605. for (i = 0; i < shared_count; i++) {
  606. fence = rcu_dereference(fobj->shared[i]);
  607. describe_fence(fence, "Shared", m);
  608. }
  609. }
  610. fence = rcu_dereference(robj->fence_excl);
  611. if (fence)
  612. describe_fence(fence, "Exclusive", m);
  613. rcu_read_unlock();
  614. mutex_unlock(&msm_obj->lock);
  615. }
  616. void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
  617. {
  618. struct msm_gem_object *msm_obj;
  619. int count = 0;
  620. size_t size = 0;
  621. list_for_each_entry(msm_obj, list, mm_list) {
  622. struct drm_gem_object *obj = &msm_obj->base;
  623. seq_printf(m, " ");
  624. msm_gem_describe(obj, m);
  625. count++;
  626. size += obj->size;
  627. }
  628. seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
  629. }
  630. #endif
  631. void msm_gem_free_object(struct drm_gem_object *obj)
  632. {
  633. struct drm_device *dev = obj->dev;
  634. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  635. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  636. /* object should not be on active list: */
  637. WARN_ON(is_active(msm_obj));
  638. list_del(&msm_obj->mm_list);
  639. mutex_lock(&msm_obj->lock);
  640. put_iova(obj);
  641. if (obj->import_attach) {
  642. if (msm_obj->vaddr)
  643. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  644. /* Don't drop the pages for imported dmabuf, as they are not
  645. * ours, just free the array we allocated:
  646. */
  647. if (msm_obj->pages)
  648. kvfree(msm_obj->pages);
  649. drm_prime_gem_destroy(obj, msm_obj->sgt);
  650. } else {
  651. msm_gem_vunmap_locked(obj);
  652. put_pages(obj);
  653. }
  654. if (msm_obj->resv == &msm_obj->_resv)
  655. reservation_object_fini(msm_obj->resv);
  656. drm_gem_object_release(obj);
  657. mutex_unlock(&msm_obj->lock);
  658. kfree(msm_obj);
  659. }
  660. /* convenience method to construct a GEM buffer object, and userspace handle */
  661. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  662. uint32_t size, uint32_t flags, uint32_t *handle)
  663. {
  664. struct drm_gem_object *obj;
  665. int ret;
  666. obj = msm_gem_new(dev, size, flags);
  667. if (IS_ERR(obj))
  668. return PTR_ERR(obj);
  669. ret = drm_gem_handle_create(file, obj, handle);
  670. /* drop reference from allocate - handle holds it now */
  671. drm_gem_object_unreference_unlocked(obj);
  672. return ret;
  673. }
  674. static int msm_gem_new_impl(struct drm_device *dev,
  675. uint32_t size, uint32_t flags,
  676. struct reservation_object *resv,
  677. struct drm_gem_object **obj,
  678. bool struct_mutex_locked)
  679. {
  680. struct msm_drm_private *priv = dev->dev_private;
  681. struct msm_gem_object *msm_obj;
  682. switch (flags & MSM_BO_CACHE_MASK) {
  683. case MSM_BO_UNCACHED:
  684. case MSM_BO_CACHED:
  685. case MSM_BO_WC:
  686. break;
  687. default:
  688. dev_err(dev->dev, "invalid cache flag: %x\n",
  689. (flags & MSM_BO_CACHE_MASK));
  690. return -EINVAL;
  691. }
  692. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  693. if (!msm_obj)
  694. return -ENOMEM;
  695. mutex_init(&msm_obj->lock);
  696. msm_obj->flags = flags;
  697. msm_obj->madv = MSM_MADV_WILLNEED;
  698. if (resv) {
  699. msm_obj->resv = resv;
  700. } else {
  701. msm_obj->resv = &msm_obj->_resv;
  702. reservation_object_init(msm_obj->resv);
  703. }
  704. INIT_LIST_HEAD(&msm_obj->submit_entry);
  705. INIT_LIST_HEAD(&msm_obj->vmas);
  706. if (struct_mutex_locked) {
  707. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  708. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  709. } else {
  710. mutex_lock(&dev->struct_mutex);
  711. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  712. mutex_unlock(&dev->struct_mutex);
  713. }
  714. *obj = &msm_obj->base;
  715. return 0;
  716. }
  717. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  718. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  719. {
  720. struct msm_drm_private *priv = dev->dev_private;
  721. struct drm_gem_object *obj = NULL;
  722. bool use_vram = false;
  723. int ret;
  724. size = PAGE_ALIGN(size);
  725. if (!iommu_present(&platform_bus_type))
  726. use_vram = true;
  727. else if ((flags & MSM_BO_STOLEN) && priv->vram.size)
  728. use_vram = true;
  729. if (WARN_ON(use_vram && !priv->vram.size))
  730. return ERR_PTR(-EINVAL);
  731. /* Disallow zero sized objects as they make the underlying
  732. * infrastructure grumpy
  733. */
  734. if (size == 0)
  735. return ERR_PTR(-EINVAL);
  736. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  737. if (ret)
  738. goto fail;
  739. if (use_vram) {
  740. struct msm_gem_vma *vma;
  741. struct page **pages;
  742. vma = add_vma(obj, NULL);
  743. if (IS_ERR(vma)) {
  744. ret = PTR_ERR(vma);
  745. goto fail;
  746. }
  747. to_msm_bo(obj)->vram_node = &vma->node;
  748. drm_gem_private_object_init(dev, obj, size);
  749. pages = get_pages(obj);
  750. if (IS_ERR(pages)) {
  751. ret = PTR_ERR(pages);
  752. goto fail;
  753. }
  754. vma->iova = physaddr(obj);
  755. } else {
  756. ret = drm_gem_object_init(dev, obj, size);
  757. if (ret)
  758. goto fail;
  759. }
  760. return obj;
  761. fail:
  762. drm_gem_object_unreference_unlocked(obj);
  763. return ERR_PTR(ret);
  764. }
  765. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  766. uint32_t size, uint32_t flags)
  767. {
  768. return _msm_gem_new(dev, size, flags, true);
  769. }
  770. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  771. uint32_t size, uint32_t flags)
  772. {
  773. return _msm_gem_new(dev, size, flags, false);
  774. }
  775. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  776. struct dma_buf *dmabuf, struct sg_table *sgt)
  777. {
  778. struct msm_gem_object *msm_obj;
  779. struct drm_gem_object *obj;
  780. uint32_t size;
  781. int ret, npages;
  782. /* if we don't have IOMMU, don't bother pretending we can import: */
  783. if (!iommu_present(&platform_bus_type)) {
  784. dev_err(dev->dev, "cannot import without IOMMU\n");
  785. return ERR_PTR(-EINVAL);
  786. }
  787. size = PAGE_ALIGN(dmabuf->size);
  788. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
  789. if (ret)
  790. goto fail;
  791. drm_gem_private_object_init(dev, obj, size);
  792. npages = size / PAGE_SIZE;
  793. msm_obj = to_msm_bo(obj);
  794. mutex_lock(&msm_obj->lock);
  795. msm_obj->sgt = sgt;
  796. msm_obj->pages = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  797. if (!msm_obj->pages) {
  798. mutex_unlock(&msm_obj->lock);
  799. ret = -ENOMEM;
  800. goto fail;
  801. }
  802. ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
  803. if (ret) {
  804. mutex_unlock(&msm_obj->lock);
  805. goto fail;
  806. }
  807. mutex_unlock(&msm_obj->lock);
  808. return obj;
  809. fail:
  810. drm_gem_object_unreference_unlocked(obj);
  811. return ERR_PTR(ret);
  812. }