msm_gem.c 25 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075
  1. /*
  2. * Copyright (C) 2013 Red Hat
  3. * Author: Rob Clark <robdclark@gmail.com>
  4. *
  5. * This program is free software; you can redistribute it and/or modify it
  6. * under the terms of the GNU General Public License version 2 as published by
  7. * the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but WITHOUT
  10. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  12. * more details.
  13. *
  14. * You should have received a copy of the GNU General Public License along with
  15. * this program. If not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include <linux/spinlock.h>
  18. #include <linux/shmem_fs.h>
  19. #include <linux/dma-buf.h>
  20. #include <linux/pfn_t.h>
  21. #include "msm_drv.h"
  22. #include "msm_fence.h"
  23. #include "msm_gem.h"
  24. #include "msm_gpu.h"
  25. #include "msm_mmu.h"
  26. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  27. static dma_addr_t physaddr(struct drm_gem_object *obj)
  28. {
  29. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  30. struct msm_drm_private *priv = obj->dev->dev_private;
  31. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  32. priv->vram.paddr;
  33. }
  34. static bool use_pages(struct drm_gem_object *obj)
  35. {
  36. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  37. return !msm_obj->vram_node;
  38. }
  39. /* allocate pages from VRAM carveout, used when no IOMMU: */
  40. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  41. {
  42. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  43. struct msm_drm_private *priv = obj->dev->dev_private;
  44. dma_addr_t paddr;
  45. struct page **p;
  46. int ret, i;
  47. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  48. if (!p)
  49. return ERR_PTR(-ENOMEM);
  50. spin_lock(&priv->vram.lock);
  51. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  52. spin_unlock(&priv->vram.lock);
  53. if (ret) {
  54. kvfree(p);
  55. return ERR_PTR(ret);
  56. }
  57. paddr = physaddr(obj);
  58. for (i = 0; i < npages; i++) {
  59. p[i] = phys_to_page(paddr);
  60. paddr += PAGE_SIZE;
  61. }
  62. return p;
  63. }
  64. static struct page **get_pages(struct drm_gem_object *obj)
  65. {
  66. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  67. if (!msm_obj->pages) {
  68. struct drm_device *dev = obj->dev;
  69. struct page **p;
  70. int npages = obj->size >> PAGE_SHIFT;
  71. if (use_pages(obj))
  72. p = drm_gem_get_pages(obj);
  73. else
  74. p = get_pages_vram(obj, npages);
  75. if (IS_ERR(p)) {
  76. dev_err(dev->dev, "could not get pages: %ld\n",
  77. PTR_ERR(p));
  78. return p;
  79. }
  80. msm_obj->pages = p;
  81. msm_obj->sgt = drm_prime_pages_to_sg(p, npages);
  82. if (IS_ERR(msm_obj->sgt)) {
  83. void *ptr = ERR_CAST(msm_obj->sgt);
  84. dev_err(dev->dev, "failed to allocate sgt\n");
  85. msm_obj->sgt = NULL;
  86. return ptr;
  87. }
  88. /* For non-cached buffers, ensure the new pages are clean
  89. * because display controller, GPU, etc. are not coherent:
  90. */
  91. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  92. dma_map_sg(dev->dev, msm_obj->sgt->sgl,
  93. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  94. }
  95. return msm_obj->pages;
  96. }
  97. static void put_pages_vram(struct drm_gem_object *obj)
  98. {
  99. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  100. struct msm_drm_private *priv = obj->dev->dev_private;
  101. spin_lock(&priv->vram.lock);
  102. drm_mm_remove_node(msm_obj->vram_node);
  103. spin_unlock(&priv->vram.lock);
  104. kvfree(msm_obj->pages);
  105. }
  106. static void put_pages(struct drm_gem_object *obj)
  107. {
  108. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  109. if (msm_obj->pages) {
  110. if (msm_obj->sgt) {
  111. /* For non-cached buffers, ensure the new
  112. * pages are clean because display controller,
  113. * GPU, etc. are not coherent:
  114. */
  115. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  116. dma_unmap_sg(obj->dev->dev, msm_obj->sgt->sgl,
  117. msm_obj->sgt->nents,
  118. DMA_BIDIRECTIONAL);
  119. sg_free_table(msm_obj->sgt);
  120. kfree(msm_obj->sgt);
  121. }
  122. if (use_pages(obj))
  123. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  124. else
  125. put_pages_vram(obj);
  126. msm_obj->pages = NULL;
  127. }
  128. }
  129. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  130. {
  131. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  132. struct page **p;
  133. mutex_lock(&msm_obj->lock);
  134. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  135. mutex_unlock(&msm_obj->lock);
  136. return ERR_PTR(-EBUSY);
  137. }
  138. p = get_pages(obj);
  139. mutex_unlock(&msm_obj->lock);
  140. return p;
  141. }
  142. void msm_gem_put_pages(struct drm_gem_object *obj)
  143. {
  144. /* when we start tracking the pin count, then do something here */
  145. }
  146. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  147. struct vm_area_struct *vma)
  148. {
  149. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  150. vma->vm_flags &= ~VM_PFNMAP;
  151. vma->vm_flags |= VM_MIXEDMAP;
  152. if (msm_obj->flags & MSM_BO_WC) {
  153. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  154. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  155. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  156. } else {
  157. /*
  158. * Shunt off cached objs to shmem file so they have their own
  159. * address_space (so unmap_mapping_range does what we want,
  160. * in particular in the case of mmap'd dmabufs)
  161. */
  162. fput(vma->vm_file);
  163. get_file(obj->filp);
  164. vma->vm_pgoff = 0;
  165. vma->vm_file = obj->filp;
  166. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  167. }
  168. return 0;
  169. }
  170. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  171. {
  172. int ret;
  173. ret = drm_gem_mmap(filp, vma);
  174. if (ret) {
  175. DBG("mmap failed: %d", ret);
  176. return ret;
  177. }
  178. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  179. }
  180. vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  181. {
  182. struct vm_area_struct *vma = vmf->vma;
  183. struct drm_gem_object *obj = vma->vm_private_data;
  184. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  185. struct page **pages;
  186. unsigned long pfn;
  187. pgoff_t pgoff;
  188. int err;
  189. vm_fault_t ret;
  190. /*
  191. * vm_ops.open/drm_gem_mmap_obj and close get and put
  192. * a reference on obj. So, we dont need to hold one here.
  193. */
  194. err = mutex_lock_interruptible(&msm_obj->lock);
  195. if (err) {
  196. ret = VM_FAULT_NOPAGE;
  197. goto out;
  198. }
  199. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  200. mutex_unlock(&msm_obj->lock);
  201. return VM_FAULT_SIGBUS;
  202. }
  203. /* make sure we have pages attached now */
  204. pages = get_pages(obj);
  205. if (IS_ERR(pages)) {
  206. ret = vmf_error(PTR_ERR(pages));
  207. goto out_unlock;
  208. }
  209. /* We don't use vmf->pgoff since that has the fake offset: */
  210. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  211. pfn = page_to_pfn(pages[pgoff]);
  212. VERB("Inserting %p pfn %lx, pa %lx", (void *)vmf->address,
  213. pfn, pfn << PAGE_SHIFT);
  214. ret = vmf_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  215. out_unlock:
  216. mutex_unlock(&msm_obj->lock);
  217. out:
  218. return ret;
  219. }
  220. /** get mmap offset */
  221. static uint64_t mmap_offset(struct drm_gem_object *obj)
  222. {
  223. struct drm_device *dev = obj->dev;
  224. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  225. int ret;
  226. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  227. /* Make it mmapable */
  228. ret = drm_gem_create_mmap_offset(obj);
  229. if (ret) {
  230. dev_err(dev->dev, "could not allocate mmap offset\n");
  231. return 0;
  232. }
  233. return drm_vma_node_offset_addr(&obj->vma_node);
  234. }
  235. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  236. {
  237. uint64_t offset;
  238. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  239. mutex_lock(&msm_obj->lock);
  240. offset = mmap_offset(obj);
  241. mutex_unlock(&msm_obj->lock);
  242. return offset;
  243. }
  244. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  245. struct msm_gem_address_space *aspace)
  246. {
  247. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  248. struct msm_gem_vma *vma;
  249. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  250. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  251. if (!vma)
  252. return ERR_PTR(-ENOMEM);
  253. vma->aspace = aspace;
  254. list_add_tail(&vma->list, &msm_obj->vmas);
  255. return vma;
  256. }
  257. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  258. struct msm_gem_address_space *aspace)
  259. {
  260. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  261. struct msm_gem_vma *vma;
  262. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  263. list_for_each_entry(vma, &msm_obj->vmas, list) {
  264. if (vma->aspace == aspace)
  265. return vma;
  266. }
  267. return NULL;
  268. }
  269. static void del_vma(struct msm_gem_vma *vma)
  270. {
  271. if (!vma)
  272. return;
  273. list_del(&vma->list);
  274. kfree(vma);
  275. }
  276. /* Called with msm_obj->lock locked */
  277. static void
  278. put_iova(struct drm_gem_object *obj)
  279. {
  280. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  281. struct msm_gem_vma *vma, *tmp;
  282. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  283. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  284. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt);
  285. del_vma(vma);
  286. }
  287. }
  288. /* get iova, taking a reference. Should have a matching put */
  289. int msm_gem_get_iova(struct drm_gem_object *obj,
  290. struct msm_gem_address_space *aspace, uint64_t *iova)
  291. {
  292. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  293. struct msm_gem_vma *vma;
  294. int ret = 0;
  295. mutex_lock(&msm_obj->lock);
  296. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  297. mutex_unlock(&msm_obj->lock);
  298. return -EBUSY;
  299. }
  300. vma = lookup_vma(obj, aspace);
  301. if (!vma) {
  302. struct page **pages;
  303. vma = add_vma(obj, aspace);
  304. if (IS_ERR(vma)) {
  305. ret = PTR_ERR(vma);
  306. goto unlock;
  307. }
  308. pages = get_pages(obj);
  309. if (IS_ERR(pages)) {
  310. ret = PTR_ERR(pages);
  311. goto fail;
  312. }
  313. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  314. obj->size >> PAGE_SHIFT);
  315. if (ret)
  316. goto fail;
  317. }
  318. *iova = vma->iova;
  319. mutex_unlock(&msm_obj->lock);
  320. return 0;
  321. fail:
  322. del_vma(vma);
  323. unlock:
  324. mutex_unlock(&msm_obj->lock);
  325. return ret;
  326. }
  327. /* get iova without taking a reference, used in places where you have
  328. * already done a 'msm_gem_get_iova()'.
  329. */
  330. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  331. struct msm_gem_address_space *aspace)
  332. {
  333. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  334. struct msm_gem_vma *vma;
  335. mutex_lock(&msm_obj->lock);
  336. vma = lookup_vma(obj, aspace);
  337. mutex_unlock(&msm_obj->lock);
  338. WARN_ON(!vma);
  339. return vma ? vma->iova : 0;
  340. }
  341. void msm_gem_put_iova(struct drm_gem_object *obj,
  342. struct msm_gem_address_space *aspace)
  343. {
  344. // XXX TODO ..
  345. // NOTE: probably don't need a _locked() version.. we wouldn't
  346. // normally unmap here, but instead just mark that it could be
  347. // unmapped (if the iova refcnt drops to zero), but then later
  348. // if another _get_iova_locked() fails we can start unmapping
  349. // things that are no longer needed..
  350. }
  351. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  352. struct drm_mode_create_dumb *args)
  353. {
  354. args->pitch = align_pitch(args->width, args->bpp);
  355. args->size = PAGE_ALIGN(args->pitch * args->height);
  356. return msm_gem_new_handle(dev, file, args->size,
  357. MSM_BO_SCANOUT | MSM_BO_WC, &args->handle);
  358. }
  359. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  360. uint32_t handle, uint64_t *offset)
  361. {
  362. struct drm_gem_object *obj;
  363. int ret = 0;
  364. /* GEM does all our handle to object mapping */
  365. obj = drm_gem_object_lookup(file, handle);
  366. if (obj == NULL) {
  367. ret = -ENOENT;
  368. goto fail;
  369. }
  370. *offset = msm_gem_mmap_offset(obj);
  371. drm_gem_object_put_unlocked(obj);
  372. fail:
  373. return ret;
  374. }
  375. static void *get_vaddr(struct drm_gem_object *obj, unsigned madv)
  376. {
  377. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  378. int ret = 0;
  379. mutex_lock(&msm_obj->lock);
  380. if (WARN_ON(msm_obj->madv > madv)) {
  381. dev_err(obj->dev->dev, "Invalid madv state: %u vs %u\n",
  382. msm_obj->madv, madv);
  383. mutex_unlock(&msm_obj->lock);
  384. return ERR_PTR(-EBUSY);
  385. }
  386. /* increment vmap_count *before* vmap() call, so shrinker can
  387. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  388. * This guarantees that we won't try to msm_gem_vunmap() this
  389. * same object from within the vmap() call (while we already
  390. * hold msm_obj->lock)
  391. */
  392. msm_obj->vmap_count++;
  393. if (!msm_obj->vaddr) {
  394. struct page **pages = get_pages(obj);
  395. if (IS_ERR(pages)) {
  396. ret = PTR_ERR(pages);
  397. goto fail;
  398. }
  399. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  400. VM_MAP, pgprot_writecombine(PAGE_KERNEL));
  401. if (msm_obj->vaddr == NULL) {
  402. ret = -ENOMEM;
  403. goto fail;
  404. }
  405. }
  406. mutex_unlock(&msm_obj->lock);
  407. return msm_obj->vaddr;
  408. fail:
  409. msm_obj->vmap_count--;
  410. mutex_unlock(&msm_obj->lock);
  411. return ERR_PTR(ret);
  412. }
  413. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  414. {
  415. return get_vaddr(obj, MSM_MADV_WILLNEED);
  416. }
  417. /*
  418. * Don't use this! It is for the very special case of dumping
  419. * submits from GPU hangs or faults, were the bo may already
  420. * be MSM_MADV_DONTNEED, but we know the buffer is still on the
  421. * active list.
  422. */
  423. void *msm_gem_get_vaddr_active(struct drm_gem_object *obj)
  424. {
  425. return get_vaddr(obj, __MSM_MADV_PURGED);
  426. }
  427. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  428. {
  429. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  430. mutex_lock(&msm_obj->lock);
  431. WARN_ON(msm_obj->vmap_count < 1);
  432. msm_obj->vmap_count--;
  433. mutex_unlock(&msm_obj->lock);
  434. }
  435. /* Update madvise status, returns true if not purged, else
  436. * false or -errno.
  437. */
  438. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  439. {
  440. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  441. mutex_lock(&msm_obj->lock);
  442. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  443. if (msm_obj->madv != __MSM_MADV_PURGED)
  444. msm_obj->madv = madv;
  445. madv = msm_obj->madv;
  446. mutex_unlock(&msm_obj->lock);
  447. return (madv != __MSM_MADV_PURGED);
  448. }
  449. void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  450. {
  451. struct drm_device *dev = obj->dev;
  452. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  453. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  454. WARN_ON(!is_purgeable(msm_obj));
  455. WARN_ON(obj->import_attach);
  456. mutex_lock_nested(&msm_obj->lock, subclass);
  457. put_iova(obj);
  458. msm_gem_vunmap_locked(obj);
  459. put_pages(obj);
  460. msm_obj->madv = __MSM_MADV_PURGED;
  461. drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
  462. drm_gem_free_mmap_offset(obj);
  463. /* Our goal here is to return as much of the memory as
  464. * is possible back to the system as we are called from OOM.
  465. * To do this we must instruct the shmfs to drop all of its
  466. * backing pages, *now*.
  467. */
  468. shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
  469. invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
  470. 0, (loff_t)-1);
  471. mutex_unlock(&msm_obj->lock);
  472. }
  473. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  474. {
  475. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  476. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  477. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  478. return;
  479. vunmap(msm_obj->vaddr);
  480. msm_obj->vaddr = NULL;
  481. }
  482. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  483. {
  484. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  485. mutex_lock_nested(&msm_obj->lock, subclass);
  486. msm_gem_vunmap_locked(obj);
  487. mutex_unlock(&msm_obj->lock);
  488. }
  489. /* must be called before _move_to_active().. */
  490. int msm_gem_sync_object(struct drm_gem_object *obj,
  491. struct msm_fence_context *fctx, bool exclusive)
  492. {
  493. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  494. struct reservation_object_list *fobj;
  495. struct dma_fence *fence;
  496. int i, ret;
  497. fobj = reservation_object_get_list(msm_obj->resv);
  498. if (!fobj || (fobj->shared_count == 0)) {
  499. fence = reservation_object_get_excl(msm_obj->resv);
  500. /* don't need to wait on our own fences, since ring is fifo */
  501. if (fence && (fence->context != fctx->context)) {
  502. ret = dma_fence_wait(fence, true);
  503. if (ret)
  504. return ret;
  505. }
  506. }
  507. if (!exclusive || !fobj)
  508. return 0;
  509. for (i = 0; i < fobj->shared_count; i++) {
  510. fence = rcu_dereference_protected(fobj->shared[i],
  511. reservation_object_held(msm_obj->resv));
  512. if (fence->context != fctx->context) {
  513. ret = dma_fence_wait(fence, true);
  514. if (ret)
  515. return ret;
  516. }
  517. }
  518. return 0;
  519. }
  520. void msm_gem_move_to_active(struct drm_gem_object *obj,
  521. struct msm_gpu *gpu, bool exclusive, struct dma_fence *fence)
  522. {
  523. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  524. WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
  525. msm_obj->gpu = gpu;
  526. if (exclusive)
  527. reservation_object_add_excl_fence(msm_obj->resv, fence);
  528. else
  529. reservation_object_add_shared_fence(msm_obj->resv, fence);
  530. list_del_init(&msm_obj->mm_list);
  531. list_add_tail(&msm_obj->mm_list, &gpu->active_list);
  532. }
  533. void msm_gem_move_to_inactive(struct drm_gem_object *obj)
  534. {
  535. struct drm_device *dev = obj->dev;
  536. struct msm_drm_private *priv = dev->dev_private;
  537. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  538. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  539. msm_obj->gpu = NULL;
  540. list_del_init(&msm_obj->mm_list);
  541. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  542. }
  543. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  544. {
  545. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  546. bool write = !!(op & MSM_PREP_WRITE);
  547. unsigned long remain =
  548. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  549. long ret;
  550. ret = reservation_object_wait_timeout_rcu(msm_obj->resv, write,
  551. true, remain);
  552. if (ret == 0)
  553. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  554. else if (ret < 0)
  555. return ret;
  556. /* TODO cache maintenance */
  557. return 0;
  558. }
  559. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  560. {
  561. /* TODO cache maintenance */
  562. return 0;
  563. }
  564. #ifdef CONFIG_DEBUG_FS
  565. static void describe_fence(struct dma_fence *fence, const char *type,
  566. struct seq_file *m)
  567. {
  568. if (!dma_fence_is_signaled(fence))
  569. seq_printf(m, "\t%9s: %s %s seq %u\n", type,
  570. fence->ops->get_driver_name(fence),
  571. fence->ops->get_timeline_name(fence),
  572. fence->seqno);
  573. }
  574. void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
  575. {
  576. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  577. struct reservation_object *robj = msm_obj->resv;
  578. struct reservation_object_list *fobj;
  579. struct dma_fence *fence;
  580. struct msm_gem_vma *vma;
  581. uint64_t off = drm_vma_node_start(&obj->vma_node);
  582. const char *madv;
  583. mutex_lock(&msm_obj->lock);
  584. switch (msm_obj->madv) {
  585. case __MSM_MADV_PURGED:
  586. madv = " purged";
  587. break;
  588. case MSM_MADV_DONTNEED:
  589. madv = " purgeable";
  590. break;
  591. case MSM_MADV_WILLNEED:
  592. default:
  593. madv = "";
  594. break;
  595. }
  596. seq_printf(m, "%08x: %c %2d (%2d) %08llx %p\t",
  597. msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
  598. obj->name, kref_read(&obj->refcount),
  599. off, msm_obj->vaddr);
  600. /* FIXME: we need to print the address space here too */
  601. list_for_each_entry(vma, &msm_obj->vmas, list)
  602. seq_printf(m, " %08llx", vma->iova);
  603. seq_printf(m, " %zu%s\n", obj->size, madv);
  604. rcu_read_lock();
  605. fobj = rcu_dereference(robj->fence);
  606. if (fobj) {
  607. unsigned int i, shared_count = fobj->shared_count;
  608. for (i = 0; i < shared_count; i++) {
  609. fence = rcu_dereference(fobj->shared[i]);
  610. describe_fence(fence, "Shared", m);
  611. }
  612. }
  613. fence = rcu_dereference(robj->fence_excl);
  614. if (fence)
  615. describe_fence(fence, "Exclusive", m);
  616. rcu_read_unlock();
  617. mutex_unlock(&msm_obj->lock);
  618. }
  619. void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
  620. {
  621. struct msm_gem_object *msm_obj;
  622. int count = 0;
  623. size_t size = 0;
  624. list_for_each_entry(msm_obj, list, mm_list) {
  625. struct drm_gem_object *obj = &msm_obj->base;
  626. seq_printf(m, " ");
  627. msm_gem_describe(obj, m);
  628. count++;
  629. size += obj->size;
  630. }
  631. seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
  632. }
  633. #endif
  634. /* don't call directly! Use drm_gem_object_put() and friends */
  635. void msm_gem_free_object(struct drm_gem_object *obj)
  636. {
  637. struct drm_device *dev = obj->dev;
  638. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  639. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  640. /* object should not be on active list: */
  641. WARN_ON(is_active(msm_obj));
  642. list_del(&msm_obj->mm_list);
  643. mutex_lock(&msm_obj->lock);
  644. put_iova(obj);
  645. if (obj->import_attach) {
  646. if (msm_obj->vaddr)
  647. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  648. /* Don't drop the pages for imported dmabuf, as they are not
  649. * ours, just free the array we allocated:
  650. */
  651. if (msm_obj->pages)
  652. kvfree(msm_obj->pages);
  653. drm_prime_gem_destroy(obj, msm_obj->sgt);
  654. } else {
  655. msm_gem_vunmap_locked(obj);
  656. put_pages(obj);
  657. }
  658. if (msm_obj->resv == &msm_obj->_resv)
  659. reservation_object_fini(msm_obj->resv);
  660. drm_gem_object_release(obj);
  661. mutex_unlock(&msm_obj->lock);
  662. kfree(msm_obj);
  663. }
  664. /* convenience method to construct a GEM buffer object, and userspace handle */
  665. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  666. uint32_t size, uint32_t flags, uint32_t *handle)
  667. {
  668. struct drm_gem_object *obj;
  669. int ret;
  670. obj = msm_gem_new(dev, size, flags);
  671. if (IS_ERR(obj))
  672. return PTR_ERR(obj);
  673. ret = drm_gem_handle_create(file, obj, handle);
  674. /* drop reference from allocate - handle holds it now */
  675. drm_gem_object_put_unlocked(obj);
  676. return ret;
  677. }
  678. static int msm_gem_new_impl(struct drm_device *dev,
  679. uint32_t size, uint32_t flags,
  680. struct reservation_object *resv,
  681. struct drm_gem_object **obj,
  682. bool struct_mutex_locked)
  683. {
  684. struct msm_drm_private *priv = dev->dev_private;
  685. struct msm_gem_object *msm_obj;
  686. switch (flags & MSM_BO_CACHE_MASK) {
  687. case MSM_BO_UNCACHED:
  688. case MSM_BO_CACHED:
  689. case MSM_BO_WC:
  690. break;
  691. default:
  692. dev_err(dev->dev, "invalid cache flag: %x\n",
  693. (flags & MSM_BO_CACHE_MASK));
  694. return -EINVAL;
  695. }
  696. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  697. if (!msm_obj)
  698. return -ENOMEM;
  699. mutex_init(&msm_obj->lock);
  700. msm_obj->flags = flags;
  701. msm_obj->madv = MSM_MADV_WILLNEED;
  702. if (resv) {
  703. msm_obj->resv = resv;
  704. } else {
  705. msm_obj->resv = &msm_obj->_resv;
  706. reservation_object_init(msm_obj->resv);
  707. }
  708. INIT_LIST_HEAD(&msm_obj->submit_entry);
  709. INIT_LIST_HEAD(&msm_obj->vmas);
  710. if (struct_mutex_locked) {
  711. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  712. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  713. } else {
  714. mutex_lock(&dev->struct_mutex);
  715. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  716. mutex_unlock(&dev->struct_mutex);
  717. }
  718. *obj = &msm_obj->base;
  719. return 0;
  720. }
  721. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  722. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  723. {
  724. struct msm_drm_private *priv = dev->dev_private;
  725. struct drm_gem_object *obj = NULL;
  726. bool use_vram = false;
  727. int ret;
  728. size = PAGE_ALIGN(size);
  729. if (!iommu_present(&platform_bus_type))
  730. use_vram = true;
  731. else if ((flags & MSM_BO_STOLEN) && priv->vram.size)
  732. use_vram = true;
  733. if (WARN_ON(use_vram && !priv->vram.size))
  734. return ERR_PTR(-EINVAL);
  735. /* Disallow zero sized objects as they make the underlying
  736. * infrastructure grumpy
  737. */
  738. if (size == 0)
  739. return ERR_PTR(-EINVAL);
  740. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  741. if (ret)
  742. goto fail;
  743. if (use_vram) {
  744. struct msm_gem_vma *vma;
  745. struct page **pages;
  746. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  747. mutex_lock(&msm_obj->lock);
  748. vma = add_vma(obj, NULL);
  749. mutex_unlock(&msm_obj->lock);
  750. if (IS_ERR(vma)) {
  751. ret = PTR_ERR(vma);
  752. goto fail;
  753. }
  754. to_msm_bo(obj)->vram_node = &vma->node;
  755. drm_gem_private_object_init(dev, obj, size);
  756. pages = get_pages(obj);
  757. if (IS_ERR(pages)) {
  758. ret = PTR_ERR(pages);
  759. goto fail;
  760. }
  761. vma->iova = physaddr(obj);
  762. } else {
  763. ret = drm_gem_object_init(dev, obj, size);
  764. if (ret)
  765. goto fail;
  766. }
  767. return obj;
  768. fail:
  769. drm_gem_object_put_unlocked(obj);
  770. return ERR_PTR(ret);
  771. }
  772. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  773. uint32_t size, uint32_t flags)
  774. {
  775. return _msm_gem_new(dev, size, flags, true);
  776. }
  777. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  778. uint32_t size, uint32_t flags)
  779. {
  780. return _msm_gem_new(dev, size, flags, false);
  781. }
  782. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  783. struct dma_buf *dmabuf, struct sg_table *sgt)
  784. {
  785. struct msm_gem_object *msm_obj;
  786. struct drm_gem_object *obj;
  787. uint32_t size;
  788. int ret, npages;
  789. /* if we don't have IOMMU, don't bother pretending we can import: */
  790. if (!iommu_present(&platform_bus_type)) {
  791. dev_err(dev->dev, "cannot import without IOMMU\n");
  792. return ERR_PTR(-EINVAL);
  793. }
  794. size = PAGE_ALIGN(dmabuf->size);
  795. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
  796. if (ret)
  797. goto fail;
  798. drm_gem_private_object_init(dev, obj, size);
  799. npages = size / PAGE_SIZE;
  800. msm_obj = to_msm_bo(obj);
  801. mutex_lock(&msm_obj->lock);
  802. msm_obj->sgt = sgt;
  803. msm_obj->pages = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  804. if (!msm_obj->pages) {
  805. mutex_unlock(&msm_obj->lock);
  806. ret = -ENOMEM;
  807. goto fail;
  808. }
  809. ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
  810. if (ret) {
  811. mutex_unlock(&msm_obj->lock);
  812. goto fail;
  813. }
  814. mutex_unlock(&msm_obj->lock);
  815. return obj;
  816. fail:
  817. drm_gem_object_put_unlocked(obj);
  818. return ERR_PTR(ret);
  819. }
  820. static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  821. uint32_t flags, struct msm_gem_address_space *aspace,
  822. struct drm_gem_object **bo, uint64_t *iova, bool locked)
  823. {
  824. void *vaddr;
  825. struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
  826. int ret;
  827. if (IS_ERR(obj))
  828. return ERR_CAST(obj);
  829. if (iova) {
  830. ret = msm_gem_get_iova(obj, aspace, iova);
  831. if (ret) {
  832. drm_gem_object_put(obj);
  833. return ERR_PTR(ret);
  834. }
  835. }
  836. vaddr = msm_gem_get_vaddr(obj);
  837. if (IS_ERR(vaddr)) {
  838. msm_gem_put_iova(obj, aspace);
  839. drm_gem_object_put(obj);
  840. return ERR_CAST(vaddr);
  841. }
  842. if (bo)
  843. *bo = obj;
  844. return vaddr;
  845. }
  846. void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  847. uint32_t flags, struct msm_gem_address_space *aspace,
  848. struct drm_gem_object **bo, uint64_t *iova)
  849. {
  850. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
  851. }
  852. void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
  853. uint32_t flags, struct msm_gem_address_space *aspace,
  854. struct drm_gem_object **bo, uint64_t *iova)
  855. {
  856. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
  857. }