msm_gem.c 26 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112
  1. /*
  2. * Copyright (C) 2013 Red Hat
  3. * Author: Rob Clark <robdclark@gmail.com>
  4. *
  5. * This program is free software; you can redistribute it and/or modify it
  6. * under the terms of the GNU General Public License version 2 as published by
  7. * the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but WITHOUT
  10. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11. * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
  12. * more details.
  13. *
  14. * You should have received a copy of the GNU General Public License along with
  15. * this program. If not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include <linux/spinlock.h>
  18. #include <linux/shmem_fs.h>
  19. #include <linux/dma-buf.h>
  20. #include <linux/pfn_t.h>
  21. #include "msm_drv.h"
  22. #include "msm_fence.h"
  23. #include "msm_gem.h"
  24. #include "msm_gpu.h"
  25. #include "msm_mmu.h"
  26. static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
  27. static dma_addr_t physaddr(struct drm_gem_object *obj)
  28. {
  29. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  30. struct msm_drm_private *priv = obj->dev->dev_private;
  31. return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
  32. priv->vram.paddr;
  33. }
  34. static bool use_pages(struct drm_gem_object *obj)
  35. {
  36. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  37. return !msm_obj->vram_node;
  38. }
  39. /*
  40. * Cache sync.. this is a bit over-complicated, to fit dma-mapping
  41. * API. Really GPU cache is out of scope here (handled on cmdstream)
  42. * and all we need to do is invalidate newly allocated pages before
  43. * mapping to CPU as uncached/writecombine.
  44. *
  45. * On top of this, we have the added headache, that depending on
  46. * display generation, the display's iommu may be wired up to either
  47. * the toplevel drm device (mdss), or to the mdp sub-node, meaning
  48. * that here we either have dma-direct or iommu ops.
  49. *
  50. * Let this be a cautionary tail of abstraction gone wrong.
  51. */
  52. static void sync_for_device(struct msm_gem_object *msm_obj)
  53. {
  54. struct device *dev = msm_obj->base.dev->dev;
  55. if (get_dma_ops(dev) && IS_ENABLED(CONFIG_ARM64)) {
  56. dma_sync_sg_for_device(dev, msm_obj->sgt->sgl,
  57. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  58. } else {
  59. dma_map_sg(dev, msm_obj->sgt->sgl,
  60. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  61. }
  62. }
  63. static void sync_for_cpu(struct msm_gem_object *msm_obj)
  64. {
  65. struct device *dev = msm_obj->base.dev->dev;
  66. if (get_dma_ops(dev) && IS_ENABLED(CONFIG_ARM64)) {
  67. dma_sync_sg_for_cpu(dev, msm_obj->sgt->sgl,
  68. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  69. } else {
  70. dma_unmap_sg(dev, msm_obj->sgt->sgl,
  71. msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
  72. }
  73. }
  74. /* allocate pages from VRAM carveout, used when no IOMMU: */
  75. static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
  76. {
  77. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  78. struct msm_drm_private *priv = obj->dev->dev_private;
  79. dma_addr_t paddr;
  80. struct page **p;
  81. int ret, i;
  82. p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  83. if (!p)
  84. return ERR_PTR(-ENOMEM);
  85. spin_lock(&priv->vram.lock);
  86. ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
  87. spin_unlock(&priv->vram.lock);
  88. if (ret) {
  89. kvfree(p);
  90. return ERR_PTR(ret);
  91. }
  92. paddr = physaddr(obj);
  93. for (i = 0; i < npages; i++) {
  94. p[i] = phys_to_page(paddr);
  95. paddr += PAGE_SIZE;
  96. }
  97. return p;
  98. }
  99. static struct page **get_pages(struct drm_gem_object *obj)
  100. {
  101. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  102. if (!msm_obj->pages) {
  103. struct drm_device *dev = obj->dev;
  104. struct page **p;
  105. int npages = obj->size >> PAGE_SHIFT;
  106. if (use_pages(obj))
  107. p = drm_gem_get_pages(obj);
  108. else
  109. p = get_pages_vram(obj, npages);
  110. if (IS_ERR(p)) {
  111. dev_err(dev->dev, "could not get pages: %ld\n",
  112. PTR_ERR(p));
  113. return p;
  114. }
  115. msm_obj->pages = p;
  116. msm_obj->sgt = drm_prime_pages_to_sg(p, npages);
  117. if (IS_ERR(msm_obj->sgt)) {
  118. void *ptr = ERR_CAST(msm_obj->sgt);
  119. dev_err(dev->dev, "failed to allocate sgt\n");
  120. msm_obj->sgt = NULL;
  121. return ptr;
  122. }
  123. /* For non-cached buffers, ensure the new pages are clean
  124. * because display controller, GPU, etc. are not coherent:
  125. */
  126. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  127. sync_for_device(msm_obj);
  128. }
  129. return msm_obj->pages;
  130. }
  131. static void put_pages_vram(struct drm_gem_object *obj)
  132. {
  133. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  134. struct msm_drm_private *priv = obj->dev->dev_private;
  135. spin_lock(&priv->vram.lock);
  136. drm_mm_remove_node(msm_obj->vram_node);
  137. spin_unlock(&priv->vram.lock);
  138. kvfree(msm_obj->pages);
  139. }
  140. static void put_pages(struct drm_gem_object *obj)
  141. {
  142. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  143. if (msm_obj->pages) {
  144. if (msm_obj->sgt) {
  145. /* For non-cached buffers, ensure the new
  146. * pages are clean because display controller,
  147. * GPU, etc. are not coherent:
  148. */
  149. if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
  150. sync_for_cpu(msm_obj);
  151. sg_free_table(msm_obj->sgt);
  152. kfree(msm_obj->sgt);
  153. }
  154. if (use_pages(obj))
  155. drm_gem_put_pages(obj, msm_obj->pages, true, false);
  156. else
  157. put_pages_vram(obj);
  158. msm_obj->pages = NULL;
  159. }
  160. }
  161. struct page **msm_gem_get_pages(struct drm_gem_object *obj)
  162. {
  163. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  164. struct page **p;
  165. mutex_lock(&msm_obj->lock);
  166. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  167. mutex_unlock(&msm_obj->lock);
  168. return ERR_PTR(-EBUSY);
  169. }
  170. p = get_pages(obj);
  171. mutex_unlock(&msm_obj->lock);
  172. return p;
  173. }
  174. void msm_gem_put_pages(struct drm_gem_object *obj)
  175. {
  176. /* when we start tracking the pin count, then do something here */
  177. }
  178. int msm_gem_mmap_obj(struct drm_gem_object *obj,
  179. struct vm_area_struct *vma)
  180. {
  181. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  182. vma->vm_flags &= ~VM_PFNMAP;
  183. vma->vm_flags |= VM_MIXEDMAP;
  184. if (msm_obj->flags & MSM_BO_WC) {
  185. vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
  186. } else if (msm_obj->flags & MSM_BO_UNCACHED) {
  187. vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
  188. } else {
  189. /*
  190. * Shunt off cached objs to shmem file so they have their own
  191. * address_space (so unmap_mapping_range does what we want,
  192. * in particular in the case of mmap'd dmabufs)
  193. */
  194. fput(vma->vm_file);
  195. get_file(obj->filp);
  196. vma->vm_pgoff = 0;
  197. vma->vm_file = obj->filp;
  198. vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
  199. }
  200. return 0;
  201. }
  202. int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
  203. {
  204. int ret;
  205. ret = drm_gem_mmap(filp, vma);
  206. if (ret) {
  207. DBG("mmap failed: %d", ret);
  208. return ret;
  209. }
  210. return msm_gem_mmap_obj(vma->vm_private_data, vma);
  211. }
  212. vm_fault_t msm_gem_fault(struct vm_fault *vmf)
  213. {
  214. struct vm_area_struct *vma = vmf->vma;
  215. struct drm_gem_object *obj = vma->vm_private_data;
  216. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  217. struct page **pages;
  218. unsigned long pfn;
  219. pgoff_t pgoff;
  220. int err;
  221. vm_fault_t ret;
  222. /*
  223. * vm_ops.open/drm_gem_mmap_obj and close get and put
  224. * a reference on obj. So, we dont need to hold one here.
  225. */
  226. err = mutex_lock_interruptible(&msm_obj->lock);
  227. if (err) {
  228. ret = VM_FAULT_NOPAGE;
  229. goto out;
  230. }
  231. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  232. mutex_unlock(&msm_obj->lock);
  233. return VM_FAULT_SIGBUS;
  234. }
  235. /* make sure we have pages attached now */
  236. pages = get_pages(obj);
  237. if (IS_ERR(pages)) {
  238. ret = vmf_error(PTR_ERR(pages));
  239. goto out_unlock;
  240. }
  241. /* We don't use vmf->pgoff since that has the fake offset: */
  242. pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
  243. pfn = page_to_pfn(pages[pgoff]);
  244. VERB("Inserting %p pfn %lx, pa %lx", (void *)vmf->address,
  245. pfn, pfn << PAGE_SHIFT);
  246. ret = vmf_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
  247. out_unlock:
  248. mutex_unlock(&msm_obj->lock);
  249. out:
  250. return ret;
  251. }
  252. /** get mmap offset */
  253. static uint64_t mmap_offset(struct drm_gem_object *obj)
  254. {
  255. struct drm_device *dev = obj->dev;
  256. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  257. int ret;
  258. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  259. /* Make it mmapable */
  260. ret = drm_gem_create_mmap_offset(obj);
  261. if (ret) {
  262. dev_err(dev->dev, "could not allocate mmap offset\n");
  263. return 0;
  264. }
  265. return drm_vma_node_offset_addr(&obj->vma_node);
  266. }
  267. uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
  268. {
  269. uint64_t offset;
  270. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  271. mutex_lock(&msm_obj->lock);
  272. offset = mmap_offset(obj);
  273. mutex_unlock(&msm_obj->lock);
  274. return offset;
  275. }
  276. static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
  277. struct msm_gem_address_space *aspace)
  278. {
  279. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  280. struct msm_gem_vma *vma;
  281. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  282. vma = kzalloc(sizeof(*vma), GFP_KERNEL);
  283. if (!vma)
  284. return ERR_PTR(-ENOMEM);
  285. vma->aspace = aspace;
  286. list_add_tail(&vma->list, &msm_obj->vmas);
  287. return vma;
  288. }
  289. static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
  290. struct msm_gem_address_space *aspace)
  291. {
  292. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  293. struct msm_gem_vma *vma;
  294. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  295. list_for_each_entry(vma, &msm_obj->vmas, list) {
  296. if (vma->aspace == aspace)
  297. return vma;
  298. }
  299. return NULL;
  300. }
  301. static void del_vma(struct msm_gem_vma *vma)
  302. {
  303. if (!vma)
  304. return;
  305. list_del(&vma->list);
  306. kfree(vma);
  307. }
  308. /* Called with msm_obj->lock locked */
  309. static void
  310. put_iova(struct drm_gem_object *obj)
  311. {
  312. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  313. struct msm_gem_vma *vma, *tmp;
  314. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  315. list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
  316. msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt);
  317. del_vma(vma);
  318. }
  319. }
  320. /* get iova, taking a reference. Should have a matching put */
  321. int msm_gem_get_iova(struct drm_gem_object *obj,
  322. struct msm_gem_address_space *aspace, uint64_t *iova)
  323. {
  324. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  325. struct msm_gem_vma *vma;
  326. int ret = 0;
  327. mutex_lock(&msm_obj->lock);
  328. if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
  329. mutex_unlock(&msm_obj->lock);
  330. return -EBUSY;
  331. }
  332. vma = lookup_vma(obj, aspace);
  333. if (!vma) {
  334. struct page **pages;
  335. vma = add_vma(obj, aspace);
  336. if (IS_ERR(vma)) {
  337. ret = PTR_ERR(vma);
  338. goto unlock;
  339. }
  340. pages = get_pages(obj);
  341. if (IS_ERR(pages)) {
  342. ret = PTR_ERR(pages);
  343. goto fail;
  344. }
  345. ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
  346. obj->size >> PAGE_SHIFT);
  347. if (ret)
  348. goto fail;
  349. }
  350. *iova = vma->iova;
  351. mutex_unlock(&msm_obj->lock);
  352. return 0;
  353. fail:
  354. del_vma(vma);
  355. unlock:
  356. mutex_unlock(&msm_obj->lock);
  357. return ret;
  358. }
  359. /* get iova without taking a reference, used in places where you have
  360. * already done a 'msm_gem_get_iova()'.
  361. */
  362. uint64_t msm_gem_iova(struct drm_gem_object *obj,
  363. struct msm_gem_address_space *aspace)
  364. {
  365. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  366. struct msm_gem_vma *vma;
  367. mutex_lock(&msm_obj->lock);
  368. vma = lookup_vma(obj, aspace);
  369. mutex_unlock(&msm_obj->lock);
  370. WARN_ON(!vma);
  371. return vma ? vma->iova : 0;
  372. }
  373. void msm_gem_put_iova(struct drm_gem_object *obj,
  374. struct msm_gem_address_space *aspace)
  375. {
  376. // XXX TODO ..
  377. // NOTE: probably don't need a _locked() version.. we wouldn't
  378. // normally unmap here, but instead just mark that it could be
  379. // unmapped (if the iova refcnt drops to zero), but then later
  380. // if another _get_iova_locked() fails we can start unmapping
  381. // things that are no longer needed..
  382. }
  383. int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
  384. struct drm_mode_create_dumb *args)
  385. {
  386. args->pitch = align_pitch(args->width, args->bpp);
  387. args->size = PAGE_ALIGN(args->pitch * args->height);
  388. return msm_gem_new_handle(dev, file, args->size,
  389. MSM_BO_SCANOUT | MSM_BO_WC, &args->handle);
  390. }
  391. int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
  392. uint32_t handle, uint64_t *offset)
  393. {
  394. struct drm_gem_object *obj;
  395. int ret = 0;
  396. /* GEM does all our handle to object mapping */
  397. obj = drm_gem_object_lookup(file, handle);
  398. if (obj == NULL) {
  399. ret = -ENOENT;
  400. goto fail;
  401. }
  402. *offset = msm_gem_mmap_offset(obj);
  403. drm_gem_object_put_unlocked(obj);
  404. fail:
  405. return ret;
  406. }
  407. static void *get_vaddr(struct drm_gem_object *obj, unsigned madv)
  408. {
  409. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  410. int ret = 0;
  411. mutex_lock(&msm_obj->lock);
  412. if (WARN_ON(msm_obj->madv > madv)) {
  413. dev_err(obj->dev->dev, "Invalid madv state: %u vs %u\n",
  414. msm_obj->madv, madv);
  415. mutex_unlock(&msm_obj->lock);
  416. return ERR_PTR(-EBUSY);
  417. }
  418. /* increment vmap_count *before* vmap() call, so shrinker can
  419. * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
  420. * This guarantees that we won't try to msm_gem_vunmap() this
  421. * same object from within the vmap() call (while we already
  422. * hold msm_obj->lock)
  423. */
  424. msm_obj->vmap_count++;
  425. if (!msm_obj->vaddr) {
  426. struct page **pages = get_pages(obj);
  427. if (IS_ERR(pages)) {
  428. ret = PTR_ERR(pages);
  429. goto fail;
  430. }
  431. msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
  432. VM_MAP, pgprot_writecombine(PAGE_KERNEL));
  433. if (msm_obj->vaddr == NULL) {
  434. ret = -ENOMEM;
  435. goto fail;
  436. }
  437. }
  438. mutex_unlock(&msm_obj->lock);
  439. return msm_obj->vaddr;
  440. fail:
  441. msm_obj->vmap_count--;
  442. mutex_unlock(&msm_obj->lock);
  443. return ERR_PTR(ret);
  444. }
  445. void *msm_gem_get_vaddr(struct drm_gem_object *obj)
  446. {
  447. return get_vaddr(obj, MSM_MADV_WILLNEED);
  448. }
  449. /*
  450. * Don't use this! It is for the very special case of dumping
  451. * submits from GPU hangs or faults, were the bo may already
  452. * be MSM_MADV_DONTNEED, but we know the buffer is still on the
  453. * active list.
  454. */
  455. void *msm_gem_get_vaddr_active(struct drm_gem_object *obj)
  456. {
  457. return get_vaddr(obj, __MSM_MADV_PURGED);
  458. }
  459. void msm_gem_put_vaddr(struct drm_gem_object *obj)
  460. {
  461. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  462. mutex_lock(&msm_obj->lock);
  463. WARN_ON(msm_obj->vmap_count < 1);
  464. msm_obj->vmap_count--;
  465. mutex_unlock(&msm_obj->lock);
  466. }
  467. /* Update madvise status, returns true if not purged, else
  468. * false or -errno.
  469. */
  470. int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
  471. {
  472. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  473. mutex_lock(&msm_obj->lock);
  474. WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
  475. if (msm_obj->madv != __MSM_MADV_PURGED)
  476. msm_obj->madv = madv;
  477. madv = msm_obj->madv;
  478. mutex_unlock(&msm_obj->lock);
  479. return (madv != __MSM_MADV_PURGED);
  480. }
  481. void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  482. {
  483. struct drm_device *dev = obj->dev;
  484. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  485. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  486. WARN_ON(!is_purgeable(msm_obj));
  487. WARN_ON(obj->import_attach);
  488. mutex_lock_nested(&msm_obj->lock, subclass);
  489. put_iova(obj);
  490. msm_gem_vunmap_locked(obj);
  491. put_pages(obj);
  492. msm_obj->madv = __MSM_MADV_PURGED;
  493. drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
  494. drm_gem_free_mmap_offset(obj);
  495. /* Our goal here is to return as much of the memory as
  496. * is possible back to the system as we are called from OOM.
  497. * To do this we must instruct the shmfs to drop all of its
  498. * backing pages, *now*.
  499. */
  500. shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
  501. invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
  502. 0, (loff_t)-1);
  503. mutex_unlock(&msm_obj->lock);
  504. }
  505. static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
  506. {
  507. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  508. WARN_ON(!mutex_is_locked(&msm_obj->lock));
  509. if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
  510. return;
  511. vunmap(msm_obj->vaddr);
  512. msm_obj->vaddr = NULL;
  513. }
  514. void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
  515. {
  516. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  517. mutex_lock_nested(&msm_obj->lock, subclass);
  518. msm_gem_vunmap_locked(obj);
  519. mutex_unlock(&msm_obj->lock);
  520. }
  521. /* must be called before _move_to_active().. */
  522. int msm_gem_sync_object(struct drm_gem_object *obj,
  523. struct msm_fence_context *fctx, bool exclusive)
  524. {
  525. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  526. struct reservation_object_list *fobj;
  527. struct dma_fence *fence;
  528. int i, ret;
  529. fobj = reservation_object_get_list(msm_obj->resv);
  530. if (!fobj || (fobj->shared_count == 0)) {
  531. fence = reservation_object_get_excl(msm_obj->resv);
  532. /* don't need to wait on our own fences, since ring is fifo */
  533. if (fence && (fence->context != fctx->context)) {
  534. ret = dma_fence_wait(fence, true);
  535. if (ret)
  536. return ret;
  537. }
  538. }
  539. if (!exclusive || !fobj)
  540. return 0;
  541. for (i = 0; i < fobj->shared_count; i++) {
  542. fence = rcu_dereference_protected(fobj->shared[i],
  543. reservation_object_held(msm_obj->resv));
  544. if (fence->context != fctx->context) {
  545. ret = dma_fence_wait(fence, true);
  546. if (ret)
  547. return ret;
  548. }
  549. }
  550. return 0;
  551. }
  552. void msm_gem_move_to_active(struct drm_gem_object *obj,
  553. struct msm_gpu *gpu, bool exclusive, struct dma_fence *fence)
  554. {
  555. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  556. WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
  557. msm_obj->gpu = gpu;
  558. if (exclusive)
  559. reservation_object_add_excl_fence(msm_obj->resv, fence);
  560. else
  561. reservation_object_add_shared_fence(msm_obj->resv, fence);
  562. list_del_init(&msm_obj->mm_list);
  563. list_add_tail(&msm_obj->mm_list, &gpu->active_list);
  564. }
  565. void msm_gem_move_to_inactive(struct drm_gem_object *obj)
  566. {
  567. struct drm_device *dev = obj->dev;
  568. struct msm_drm_private *priv = dev->dev_private;
  569. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  570. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  571. msm_obj->gpu = NULL;
  572. list_del_init(&msm_obj->mm_list);
  573. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  574. }
  575. int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
  576. {
  577. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  578. bool write = !!(op & MSM_PREP_WRITE);
  579. unsigned long remain =
  580. op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
  581. long ret;
  582. ret = reservation_object_wait_timeout_rcu(msm_obj->resv, write,
  583. true, remain);
  584. if (ret == 0)
  585. return remain == 0 ? -EBUSY : -ETIMEDOUT;
  586. else if (ret < 0)
  587. return ret;
  588. /* TODO cache maintenance */
  589. return 0;
  590. }
  591. int msm_gem_cpu_fini(struct drm_gem_object *obj)
  592. {
  593. /* TODO cache maintenance */
  594. return 0;
  595. }
  596. #ifdef CONFIG_DEBUG_FS
  597. static void describe_fence(struct dma_fence *fence, const char *type,
  598. struct seq_file *m)
  599. {
  600. if (!dma_fence_is_signaled(fence))
  601. seq_printf(m, "\t%9s: %s %s seq %u\n", type,
  602. fence->ops->get_driver_name(fence),
  603. fence->ops->get_timeline_name(fence),
  604. fence->seqno);
  605. }
  606. void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
  607. {
  608. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  609. struct reservation_object *robj = msm_obj->resv;
  610. struct reservation_object_list *fobj;
  611. struct dma_fence *fence;
  612. struct msm_gem_vma *vma;
  613. uint64_t off = drm_vma_node_start(&obj->vma_node);
  614. const char *madv;
  615. mutex_lock(&msm_obj->lock);
  616. switch (msm_obj->madv) {
  617. case __MSM_MADV_PURGED:
  618. madv = " purged";
  619. break;
  620. case MSM_MADV_DONTNEED:
  621. madv = " purgeable";
  622. break;
  623. case MSM_MADV_WILLNEED:
  624. default:
  625. madv = "";
  626. break;
  627. }
  628. seq_printf(m, "%08x: %c %2d (%2d) %08llx %p\t",
  629. msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
  630. obj->name, kref_read(&obj->refcount),
  631. off, msm_obj->vaddr);
  632. /* FIXME: we need to print the address space here too */
  633. list_for_each_entry(vma, &msm_obj->vmas, list)
  634. seq_printf(m, " %08llx", vma->iova);
  635. seq_printf(m, " %zu%s\n", obj->size, madv);
  636. rcu_read_lock();
  637. fobj = rcu_dereference(robj->fence);
  638. if (fobj) {
  639. unsigned int i, shared_count = fobj->shared_count;
  640. for (i = 0; i < shared_count; i++) {
  641. fence = rcu_dereference(fobj->shared[i]);
  642. describe_fence(fence, "Shared", m);
  643. }
  644. }
  645. fence = rcu_dereference(robj->fence_excl);
  646. if (fence)
  647. describe_fence(fence, "Exclusive", m);
  648. rcu_read_unlock();
  649. mutex_unlock(&msm_obj->lock);
  650. }
  651. void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
  652. {
  653. struct msm_gem_object *msm_obj;
  654. int count = 0;
  655. size_t size = 0;
  656. list_for_each_entry(msm_obj, list, mm_list) {
  657. struct drm_gem_object *obj = &msm_obj->base;
  658. seq_printf(m, " ");
  659. msm_gem_describe(obj, m);
  660. count++;
  661. size += obj->size;
  662. }
  663. seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
  664. }
  665. #endif
  666. /* don't call directly! Use drm_gem_object_put() and friends */
  667. void msm_gem_free_object(struct drm_gem_object *obj)
  668. {
  669. struct drm_device *dev = obj->dev;
  670. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  671. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  672. /* object should not be on active list: */
  673. WARN_ON(is_active(msm_obj));
  674. list_del(&msm_obj->mm_list);
  675. mutex_lock(&msm_obj->lock);
  676. put_iova(obj);
  677. if (obj->import_attach) {
  678. if (msm_obj->vaddr)
  679. dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
  680. /* Don't drop the pages for imported dmabuf, as they are not
  681. * ours, just free the array we allocated:
  682. */
  683. if (msm_obj->pages)
  684. kvfree(msm_obj->pages);
  685. drm_prime_gem_destroy(obj, msm_obj->sgt);
  686. } else {
  687. msm_gem_vunmap_locked(obj);
  688. put_pages(obj);
  689. }
  690. if (msm_obj->resv == &msm_obj->_resv)
  691. reservation_object_fini(msm_obj->resv);
  692. drm_gem_object_release(obj);
  693. mutex_unlock(&msm_obj->lock);
  694. kfree(msm_obj);
  695. }
  696. /* convenience method to construct a GEM buffer object, and userspace handle */
  697. int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
  698. uint32_t size, uint32_t flags, uint32_t *handle)
  699. {
  700. struct drm_gem_object *obj;
  701. int ret;
  702. obj = msm_gem_new(dev, size, flags);
  703. if (IS_ERR(obj))
  704. return PTR_ERR(obj);
  705. ret = drm_gem_handle_create(file, obj, handle);
  706. /* drop reference from allocate - handle holds it now */
  707. drm_gem_object_put_unlocked(obj);
  708. return ret;
  709. }
  710. static int msm_gem_new_impl(struct drm_device *dev,
  711. uint32_t size, uint32_t flags,
  712. struct reservation_object *resv,
  713. struct drm_gem_object **obj,
  714. bool struct_mutex_locked)
  715. {
  716. struct msm_drm_private *priv = dev->dev_private;
  717. struct msm_gem_object *msm_obj;
  718. switch (flags & MSM_BO_CACHE_MASK) {
  719. case MSM_BO_UNCACHED:
  720. case MSM_BO_CACHED:
  721. case MSM_BO_WC:
  722. break;
  723. default:
  724. dev_err(dev->dev, "invalid cache flag: %x\n",
  725. (flags & MSM_BO_CACHE_MASK));
  726. return -EINVAL;
  727. }
  728. msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
  729. if (!msm_obj)
  730. return -ENOMEM;
  731. mutex_init(&msm_obj->lock);
  732. msm_obj->flags = flags;
  733. msm_obj->madv = MSM_MADV_WILLNEED;
  734. if (resv) {
  735. msm_obj->resv = resv;
  736. } else {
  737. msm_obj->resv = &msm_obj->_resv;
  738. reservation_object_init(msm_obj->resv);
  739. }
  740. INIT_LIST_HEAD(&msm_obj->submit_entry);
  741. INIT_LIST_HEAD(&msm_obj->vmas);
  742. if (struct_mutex_locked) {
  743. WARN_ON(!mutex_is_locked(&dev->struct_mutex));
  744. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  745. } else {
  746. mutex_lock(&dev->struct_mutex);
  747. list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
  748. mutex_unlock(&dev->struct_mutex);
  749. }
  750. *obj = &msm_obj->base;
  751. return 0;
  752. }
  753. static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
  754. uint32_t size, uint32_t flags, bool struct_mutex_locked)
  755. {
  756. struct msm_drm_private *priv = dev->dev_private;
  757. struct drm_gem_object *obj = NULL;
  758. bool use_vram = false;
  759. int ret;
  760. size = PAGE_ALIGN(size);
  761. if (!iommu_present(&platform_bus_type))
  762. use_vram = true;
  763. else if ((flags & MSM_BO_STOLEN) && priv->vram.size)
  764. use_vram = true;
  765. if (WARN_ON(use_vram && !priv->vram.size))
  766. return ERR_PTR(-EINVAL);
  767. /* Disallow zero sized objects as they make the underlying
  768. * infrastructure grumpy
  769. */
  770. if (size == 0)
  771. return ERR_PTR(-EINVAL);
  772. ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
  773. if (ret)
  774. goto fail;
  775. if (use_vram) {
  776. struct msm_gem_vma *vma;
  777. struct page **pages;
  778. struct msm_gem_object *msm_obj = to_msm_bo(obj);
  779. mutex_lock(&msm_obj->lock);
  780. vma = add_vma(obj, NULL);
  781. mutex_unlock(&msm_obj->lock);
  782. if (IS_ERR(vma)) {
  783. ret = PTR_ERR(vma);
  784. goto fail;
  785. }
  786. to_msm_bo(obj)->vram_node = &vma->node;
  787. drm_gem_private_object_init(dev, obj, size);
  788. pages = get_pages(obj);
  789. if (IS_ERR(pages)) {
  790. ret = PTR_ERR(pages);
  791. goto fail;
  792. }
  793. vma->iova = physaddr(obj);
  794. } else {
  795. ret = drm_gem_object_init(dev, obj, size);
  796. if (ret)
  797. goto fail;
  798. }
  799. return obj;
  800. fail:
  801. drm_gem_object_put_unlocked(obj);
  802. return ERR_PTR(ret);
  803. }
  804. struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
  805. uint32_t size, uint32_t flags)
  806. {
  807. return _msm_gem_new(dev, size, flags, true);
  808. }
  809. struct drm_gem_object *msm_gem_new(struct drm_device *dev,
  810. uint32_t size, uint32_t flags)
  811. {
  812. return _msm_gem_new(dev, size, flags, false);
  813. }
  814. struct drm_gem_object *msm_gem_import(struct drm_device *dev,
  815. struct dma_buf *dmabuf, struct sg_table *sgt)
  816. {
  817. struct msm_gem_object *msm_obj;
  818. struct drm_gem_object *obj;
  819. uint32_t size;
  820. int ret, npages;
  821. /* if we don't have IOMMU, don't bother pretending we can import: */
  822. if (!iommu_present(&platform_bus_type)) {
  823. dev_err(dev->dev, "cannot import without IOMMU\n");
  824. return ERR_PTR(-EINVAL);
  825. }
  826. size = PAGE_ALIGN(dmabuf->size);
  827. ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
  828. if (ret)
  829. goto fail;
  830. drm_gem_private_object_init(dev, obj, size);
  831. npages = size / PAGE_SIZE;
  832. msm_obj = to_msm_bo(obj);
  833. mutex_lock(&msm_obj->lock);
  834. msm_obj->sgt = sgt;
  835. msm_obj->pages = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
  836. if (!msm_obj->pages) {
  837. mutex_unlock(&msm_obj->lock);
  838. ret = -ENOMEM;
  839. goto fail;
  840. }
  841. ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
  842. if (ret) {
  843. mutex_unlock(&msm_obj->lock);
  844. goto fail;
  845. }
  846. mutex_unlock(&msm_obj->lock);
  847. return obj;
  848. fail:
  849. drm_gem_object_put_unlocked(obj);
  850. return ERR_PTR(ret);
  851. }
  852. static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  853. uint32_t flags, struct msm_gem_address_space *aspace,
  854. struct drm_gem_object **bo, uint64_t *iova, bool locked)
  855. {
  856. void *vaddr;
  857. struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
  858. int ret;
  859. if (IS_ERR(obj))
  860. return ERR_CAST(obj);
  861. if (iova) {
  862. ret = msm_gem_get_iova(obj, aspace, iova);
  863. if (ret) {
  864. drm_gem_object_put(obj);
  865. return ERR_PTR(ret);
  866. }
  867. }
  868. vaddr = msm_gem_get_vaddr(obj);
  869. if (IS_ERR(vaddr)) {
  870. msm_gem_put_iova(obj, aspace);
  871. drm_gem_object_put(obj);
  872. return ERR_CAST(vaddr);
  873. }
  874. if (bo)
  875. *bo = obj;
  876. return vaddr;
  877. }
  878. void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
  879. uint32_t flags, struct msm_gem_address_space *aspace,
  880. struct drm_gem_object **bo, uint64_t *iova)
  881. {
  882. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
  883. }
  884. void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
  885. uint32_t flags, struct msm_gem_address_space *aspace,
  886. struct drm_gem_object **bo, uint64_t *iova)
  887. {
  888. return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
  889. }