]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/gpu/drm/msm/msm_gem.c
Merge branches 'intel_pstate-fix' and 'cpufreq-x86-fix'
[mirror_ubuntu-artful-kernel.git] / drivers / gpu / drm / msm / msm_gem.c
CommitLineData
c8afe684
RC
1/*
2 * Copyright (C) 2013 Red Hat
3 * Author: Rob Clark <robdclark@gmail.com>
4 *
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 as published by
7 * the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
12 * more details.
13 *
14 * You should have received a copy of the GNU General Public License along with
15 * this program. If not, see <http://www.gnu.org/licenses/>.
16 */
17
18#include <linux/spinlock.h>
19#include <linux/shmem_fs.h>
05b84911 20#include <linux/dma-buf.h>
01c8f1c4 21#include <linux/pfn_t.h>
c8afe684
RC
22
23#include "msm_drv.h"
fde5de6c 24#include "msm_fence.h"
c8afe684 25#include "msm_gem.h"
7198e6b0 26#include "msm_gpu.h"
871d812a 27#include "msm_mmu.h"
c8afe684 28
0e08270a
SS
29static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
30
31
871d812a
RC
32static dma_addr_t physaddr(struct drm_gem_object *obj)
33{
34 struct msm_gem_object *msm_obj = to_msm_bo(obj);
35 struct msm_drm_private *priv = obj->dev->dev_private;
36 return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
37 priv->vram.paddr;
38}
39
072f1f91
RC
40static bool use_pages(struct drm_gem_object *obj)
41{
42 struct msm_gem_object *msm_obj = to_msm_bo(obj);
43 return !msm_obj->vram_node;
44}
45
871d812a 46/* allocate pages from VRAM carveout, used when no IOMMU: */
0e08270a 47static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
871d812a
RC
48{
49 struct msm_gem_object *msm_obj = to_msm_bo(obj);
50 struct msm_drm_private *priv = obj->dev->dev_private;
51 dma_addr_t paddr;
52 struct page **p;
53 int ret, i;
54
2098105e 55 p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
871d812a
RC
56 if (!p)
57 return ERR_PTR(-ENOMEM);
58
0e08270a 59 spin_lock(&priv->vram.lock);
4e64e553 60 ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
0e08270a 61 spin_unlock(&priv->vram.lock);
871d812a 62 if (ret) {
2098105e 63 kvfree(p);
871d812a
RC
64 return ERR_PTR(ret);
65 }
66
67 paddr = physaddr(obj);
68 for (i = 0; i < npages; i++) {
69 p[i] = phys_to_page(paddr);
70 paddr += PAGE_SIZE;
71 }
72
73 return p;
74}
c8afe684 75
c8afe684
RC
76static struct page **get_pages(struct drm_gem_object *obj)
77{
78 struct msm_gem_object *msm_obj = to_msm_bo(obj);
79
80 if (!msm_obj->pages) {
81 struct drm_device *dev = obj->dev;
871d812a 82 struct page **p;
c8afe684
RC
83 int npages = obj->size >> PAGE_SHIFT;
84
072f1f91 85 if (use_pages(obj))
0cdbe8ac 86 p = drm_gem_get_pages(obj);
871d812a
RC
87 else
88 p = get_pages_vram(obj, npages);
89
c8afe684
RC
90 if (IS_ERR(p)) {
91 dev_err(dev->dev, "could not get pages: %ld\n",
92 PTR_ERR(p));
93 return p;
94 }
95
96 msm_obj->sgt = drm_prime_pages_to_sg(p, npages);
1f70e079 97 if (IS_ERR(msm_obj->sgt)) {
c8afe684 98 dev_err(dev->dev, "failed to allocate sgt\n");
1f70e079 99 return ERR_CAST(msm_obj->sgt);
c8afe684
RC
100 }
101
102 msm_obj->pages = p;
103
104 /* For non-cached buffers, ensure the new pages are clean
105 * because display controller, GPU, etc. are not coherent:
106 */
107 if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
108 dma_map_sg(dev->dev, msm_obj->sgt->sgl,
109 msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
110 }
111
112 return msm_obj->pages;
113}
114
0e08270a
SS
115static void put_pages_vram(struct drm_gem_object *obj)
116{
117 struct msm_gem_object *msm_obj = to_msm_bo(obj);
118 struct msm_drm_private *priv = obj->dev->dev_private;
119
120 spin_lock(&priv->vram.lock);
121 drm_mm_remove_node(msm_obj->vram_node);
122 spin_unlock(&priv->vram.lock);
123
124 kvfree(msm_obj->pages);
125}
126
c8afe684
RC
127static void put_pages(struct drm_gem_object *obj)
128{
129 struct msm_gem_object *msm_obj = to_msm_bo(obj);
130
131 if (msm_obj->pages) {
132 /* For non-cached buffers, ensure the new pages are clean
133 * because display controller, GPU, etc. are not coherent:
134 */
135 if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
136 dma_unmap_sg(obj->dev->dev, msm_obj->sgt->sgl,
137 msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
138 sg_free_table(msm_obj->sgt);
139 kfree(msm_obj->sgt);
140
072f1f91 141 if (use_pages(obj))
871d812a 142 drm_gem_put_pages(obj, msm_obj->pages, true, false);
0e08270a
SS
143 else
144 put_pages_vram(obj);
871d812a 145
c8afe684
RC
146 msm_obj->pages = NULL;
147 }
148}
149
05b84911
RC
150struct page **msm_gem_get_pages(struct drm_gem_object *obj)
151{
0e08270a 152 struct msm_gem_object *msm_obj = to_msm_bo(obj);
05b84911 153 struct page **p;
0e08270a
SS
154
155 mutex_lock(&msm_obj->lock);
156
157 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
158 mutex_unlock(&msm_obj->lock);
159 return ERR_PTR(-EBUSY);
160 }
161
05b84911 162 p = get_pages(obj);
0e08270a 163 mutex_unlock(&msm_obj->lock);
05b84911
RC
164 return p;
165}
166
167void msm_gem_put_pages(struct drm_gem_object *obj)
168{
169 /* when we start tracking the pin count, then do something here */
170}
171
c8afe684
RC
172int msm_gem_mmap_obj(struct drm_gem_object *obj,
173 struct vm_area_struct *vma)
174{
175 struct msm_gem_object *msm_obj = to_msm_bo(obj);
176
177 vma->vm_flags &= ~VM_PFNMAP;
178 vma->vm_flags |= VM_MIXEDMAP;
179
180 if (msm_obj->flags & MSM_BO_WC) {
181 vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
182 } else if (msm_obj->flags & MSM_BO_UNCACHED) {
183 vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
184 } else {
185 /*
186 * Shunt off cached objs to shmem file so they have their own
187 * address_space (so unmap_mapping_range does what we want,
188 * in particular in the case of mmap'd dmabufs)
189 */
190 fput(vma->vm_file);
191 get_file(obj->filp);
192 vma->vm_pgoff = 0;
193 vma->vm_file = obj->filp;
194
195 vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
196 }
197
198 return 0;
199}
200
201int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
202{
203 int ret;
204
205 ret = drm_gem_mmap(filp, vma);
206 if (ret) {
207 DBG("mmap failed: %d", ret);
208 return ret;
209 }
210
211 return msm_gem_mmap_obj(vma->vm_private_data, vma);
212}
213
11bac800 214int msm_gem_fault(struct vm_fault *vmf)
c8afe684 215{
11bac800 216 struct vm_area_struct *vma = vmf->vma;
c8afe684 217 struct drm_gem_object *obj = vma->vm_private_data;
0e08270a 218 struct msm_gem_object *msm_obj = to_msm_bo(obj);
c8afe684
RC
219 struct page **pages;
220 unsigned long pfn;
221 pgoff_t pgoff;
222 int ret;
223
0e08270a
SS
224 /*
225 * vm_ops.open/drm_gem_mmap_obj and close get and put
226 * a reference on obj. So, we dont need to hold one here.
c8afe684 227 */
0e08270a 228 ret = mutex_lock_interruptible(&msm_obj->lock);
c8afe684
RC
229 if (ret)
230 goto out;
231
0e08270a
SS
232 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
233 mutex_unlock(&msm_obj->lock);
234 return VM_FAULT_SIGBUS;
235 }
236
c8afe684
RC
237 /* make sure we have pages attached now */
238 pages = get_pages(obj);
239 if (IS_ERR(pages)) {
240 ret = PTR_ERR(pages);
241 goto out_unlock;
242 }
243
244 /* We don't use vmf->pgoff since that has the fake offset: */
1a29d85e 245 pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
c8afe684 246
871d812a 247 pfn = page_to_pfn(pages[pgoff]);
c8afe684 248
1a29d85e 249 VERB("Inserting %p pfn %lx, pa %lx", (void *)vmf->address,
c8afe684
RC
250 pfn, pfn << PAGE_SHIFT);
251
1a29d85e 252 ret = vm_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
c8afe684
RC
253
254out_unlock:
0e08270a 255 mutex_unlock(&msm_obj->lock);
c8afe684
RC
256out:
257 switch (ret) {
258 case -EAGAIN:
c8afe684
RC
259 case 0:
260 case -ERESTARTSYS:
261 case -EINTR:
505886d5
RC
262 case -EBUSY:
263 /*
264 * EBUSY is ok: this just means that another thread
265 * already did the job.
266 */
c8afe684
RC
267 return VM_FAULT_NOPAGE;
268 case -ENOMEM:
269 return VM_FAULT_OOM;
270 default:
271 return VM_FAULT_SIGBUS;
272 }
273}
274
275/** get mmap offset */
276static uint64_t mmap_offset(struct drm_gem_object *obj)
277{
278 struct drm_device *dev = obj->dev;
0e08270a 279 struct msm_gem_object *msm_obj = to_msm_bo(obj);
c8afe684
RC
280 int ret;
281
0e08270a 282 WARN_ON(!mutex_is_locked(&msm_obj->lock));
c8afe684
RC
283
284 /* Make it mmapable */
285 ret = drm_gem_create_mmap_offset(obj);
286
287 if (ret) {
288 dev_err(dev->dev, "could not allocate mmap offset\n");
289 return 0;
290 }
291
292 return drm_vma_node_offset_addr(&obj->vma_node);
293}
294
295uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
296{
297 uint64_t offset;
0e08270a
SS
298 struct msm_gem_object *msm_obj = to_msm_bo(obj);
299
300 mutex_lock(&msm_obj->lock);
c8afe684 301 offset = mmap_offset(obj);
0e08270a 302 mutex_unlock(&msm_obj->lock);
c8afe684
RC
303 return offset;
304}
305
4b85f7f5
RC
306static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
307 struct msm_gem_address_space *aspace)
308{
309 struct msm_gem_object *msm_obj = to_msm_bo(obj);
310 struct msm_gem_vma *vma;
311
0e08270a
SS
312 WARN_ON(!mutex_is_locked(&msm_obj->lock));
313
4b85f7f5
RC
314 vma = kzalloc(sizeof(*vma), GFP_KERNEL);
315 if (!vma)
316 return ERR_PTR(-ENOMEM);
317
318 vma->aspace = aspace;
319
320 list_add_tail(&vma->list, &msm_obj->vmas);
321
322 return vma;
323}
324
325static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
326 struct msm_gem_address_space *aspace)
327{
328 struct msm_gem_object *msm_obj = to_msm_bo(obj);
329 struct msm_gem_vma *vma;
330
0e08270a 331 WARN_ON(!mutex_is_locked(&msm_obj->lock));
4b85f7f5
RC
332
333 list_for_each_entry(vma, &msm_obj->vmas, list) {
334 if (vma->aspace == aspace)
335 return vma;
336 }
337
338 return NULL;
339}
340
341static void del_vma(struct msm_gem_vma *vma)
342{
343 if (!vma)
344 return;
345
346 list_del(&vma->list);
347 kfree(vma);
348}
349
0e08270a 350/* Called with msm_obj->lock locked */
4fe5f65e
RC
351static void
352put_iova(struct drm_gem_object *obj)
353{
4fe5f65e 354 struct msm_gem_object *msm_obj = to_msm_bo(obj);
4b85f7f5 355 struct msm_gem_vma *vma, *tmp;
4fe5f65e 356
0e08270a 357 WARN_ON(!mutex_is_locked(&msm_obj->lock));
4fe5f65e 358
4b85f7f5
RC
359 list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
360 msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt);
361 del_vma(vma);
4fe5f65e
RC
362 }
363}
364
0e08270a
SS
365/* get iova, taking a reference. Should have a matching put */
366int msm_gem_get_iova(struct drm_gem_object *obj,
8bdcd949 367 struct msm_gem_address_space *aspace, uint64_t *iova)
c8afe684
RC
368{
369 struct msm_gem_object *msm_obj = to_msm_bo(obj);
4b85f7f5 370 struct msm_gem_vma *vma;
c8afe684
RC
371 int ret = 0;
372
0e08270a
SS
373 mutex_lock(&msm_obj->lock);
374
375 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
376 mutex_unlock(&msm_obj->lock);
377 return -EBUSY;
378 }
cb1e3818 379
4b85f7f5 380 vma = lookup_vma(obj, aspace);
871d812a 381
4b85f7f5
RC
382 if (!vma) {
383 struct page **pages;
384
385 vma = add_vma(obj, aspace);
71e3dfa1
DC
386 if (IS_ERR(vma)) {
387 ret = PTR_ERR(vma);
388 goto unlock;
389 }
4b85f7f5
RC
390
391 pages = get_pages(obj);
392 if (IS_ERR(pages)) {
393 ret = PTR_ERR(pages);
394 goto fail;
395 }
871d812a 396
4b85f7f5
RC
397 ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
398 obj->size >> PAGE_SHIFT);
399 if (ret)
400 goto fail;
c8afe684
RC
401 }
402
4b85f7f5 403 *iova = vma->iova;
0e08270a
SS
404
405 mutex_unlock(&msm_obj->lock);
4b85f7f5
RC
406 return 0;
407
408fail:
409 del_vma(vma);
71e3dfa1 410unlock:
0e08270a 411 mutex_unlock(&msm_obj->lock);
c8afe684
RC
412 return ret;
413}
414
2638d90a
RC
415/* get iova without taking a reference, used in places where you have
416 * already done a 'msm_gem_get_iova()'.
417 */
8bdcd949
RC
418uint64_t msm_gem_iova(struct drm_gem_object *obj,
419 struct msm_gem_address_space *aspace)
2638d90a 420{
0e08270a 421 struct msm_gem_object *msm_obj = to_msm_bo(obj);
4b85f7f5
RC
422 struct msm_gem_vma *vma;
423
0e08270a 424 mutex_lock(&msm_obj->lock);
4b85f7f5 425 vma = lookup_vma(obj, aspace);
0e08270a 426 mutex_unlock(&msm_obj->lock);
4b85f7f5
RC
427 WARN_ON(!vma);
428
429 return vma ? vma->iova : 0;
2638d90a
RC
430}
431
8bdcd949
RC
432void msm_gem_put_iova(struct drm_gem_object *obj,
433 struct msm_gem_address_space *aspace)
c8afe684
RC
434{
435 // XXX TODO ..
436 // NOTE: probably don't need a _locked() version.. we wouldn't
437 // normally unmap here, but instead just mark that it could be
438 // unmapped (if the iova refcnt drops to zero), but then later
439 // if another _get_iova_locked() fails we can start unmapping
440 // things that are no longer needed..
441}
442
443int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
444 struct drm_mode_create_dumb *args)
445{
446 args->pitch = align_pitch(args->width, args->bpp);
447 args->size = PAGE_ALIGN(args->pitch * args->height);
448 return msm_gem_new_handle(dev, file, args->size,
449 MSM_BO_SCANOUT | MSM_BO_WC, &args->handle);
450}
451
c8afe684
RC
452int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
453 uint32_t handle, uint64_t *offset)
454{
455 struct drm_gem_object *obj;
456 int ret = 0;
457
458 /* GEM does all our handle to object mapping */
a8ad0bd8 459 obj = drm_gem_object_lookup(file, handle);
c8afe684
RC
460 if (obj == NULL) {
461 ret = -ENOENT;
462 goto fail;
463 }
464
465 *offset = msm_gem_mmap_offset(obj);
466
467 drm_gem_object_unreference_unlocked(obj);
468
469fail:
470 return ret;
471}
472
0e08270a 473void *msm_gem_get_vaddr(struct drm_gem_object *obj)
c8afe684
RC
474{
475 struct msm_gem_object *msm_obj = to_msm_bo(obj);
0e08270a
SS
476 int ret = 0;
477
478 mutex_lock(&msm_obj->lock);
479
480 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
481 mutex_unlock(&msm_obj->lock);
482 return ERR_PTR(-EBUSY);
483 }
484
485 /* increment vmap_count *before* vmap() call, so shrinker can
486 * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
487 * This guarantees that we won't try to msm_gem_vunmap() this
488 * same object from within the vmap() call (while we already
489 * hold msm_obj->lock)
490 */
491 msm_obj->vmap_count++;
492
c8afe684
RC
493 if (!msm_obj->vaddr) {
494 struct page **pages = get_pages(obj);
0e08270a
SS
495 if (IS_ERR(pages)) {
496 ret = PTR_ERR(pages);
497 goto fail;
498 }
c8afe684
RC
499 msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
500 VM_MAP, pgprot_writecombine(PAGE_KERNEL));
0e08270a
SS
501 if (msm_obj->vaddr == NULL) {
502 ret = -ENOMEM;
503 goto fail;
504 }
c8afe684 505 }
0e08270a
SS
506
507 mutex_unlock(&msm_obj->lock);
c8afe684 508 return msm_obj->vaddr;
c8afe684 509
0e08270a
SS
510fail:
511 msm_obj->vmap_count--;
512 mutex_unlock(&msm_obj->lock);
513 return ERR_PTR(ret);
c8afe684
RC
514}
515
0e08270a 516void msm_gem_put_vaddr(struct drm_gem_object *obj)
18f23049 517{
e1e9db2c 518 struct msm_gem_object *msm_obj = to_msm_bo(obj);
0e08270a
SS
519
520 mutex_lock(&msm_obj->lock);
e1e9db2c
RC
521 WARN_ON(msm_obj->vmap_count < 1);
522 msm_obj->vmap_count--;
0e08270a 523 mutex_unlock(&msm_obj->lock);
18f23049
RC
524}
525
4cd33c48
RC
526/* Update madvise status, returns true if not purged, else
527 * false or -errno.
528 */
529int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
530{
531 struct msm_gem_object *msm_obj = to_msm_bo(obj);
532
0e08270a
SS
533 mutex_lock(&msm_obj->lock);
534
4cd33c48
RC
535 WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
536
537 if (msm_obj->madv != __MSM_MADV_PURGED)
538 msm_obj->madv = madv;
539
0e08270a
SS
540 madv = msm_obj->madv;
541
542 mutex_unlock(&msm_obj->lock);
543
544 return (madv != __MSM_MADV_PURGED);
4cd33c48
RC
545}
546
0e08270a 547void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
68209390
RC
548{
549 struct drm_device *dev = obj->dev;
550 struct msm_gem_object *msm_obj = to_msm_bo(obj);
551
552 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
553 WARN_ON(!is_purgeable(msm_obj));
554 WARN_ON(obj->import_attach);
555
0e08270a
SS
556 mutex_lock_nested(&msm_obj->lock, subclass);
557
68209390
RC
558 put_iova(obj);
559
0e08270a 560 msm_gem_vunmap_locked(obj);
68209390
RC
561
562 put_pages(obj);
563
564 msm_obj->madv = __MSM_MADV_PURGED;
565
566 drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
567 drm_gem_free_mmap_offset(obj);
568
569 /* Our goal here is to return as much of the memory as
570 * is possible back to the system as we are called from OOM.
571 * To do this we must instruct the shmfs to drop all of its
572 * backing pages, *now*.
573 */
574 shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
575
576 invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
577 0, (loff_t)-1);
0e08270a
SS
578
579 mutex_unlock(&msm_obj->lock);
68209390
RC
580}
581
0e08270a 582static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
e1e9db2c
RC
583{
584 struct msm_gem_object *msm_obj = to_msm_bo(obj);
585
0e08270a
SS
586 WARN_ON(!mutex_is_locked(&msm_obj->lock));
587
e1e9db2c
RC
588 if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
589 return;
590
591 vunmap(msm_obj->vaddr);
592 msm_obj->vaddr = NULL;
593}
594
0e08270a
SS
595void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
596{
597 struct msm_gem_object *msm_obj = to_msm_bo(obj);
598
599 mutex_lock_nested(&msm_obj->lock, subclass);
600 msm_gem_vunmap_locked(obj);
601 mutex_unlock(&msm_obj->lock);
602}
603
b6295f9a
RC
604/* must be called before _move_to_active().. */
605int msm_gem_sync_object(struct drm_gem_object *obj,
606 struct msm_fence_context *fctx, bool exclusive)
607{
608 struct msm_gem_object *msm_obj = to_msm_bo(obj);
609 struct reservation_object_list *fobj;
f54d1867 610 struct dma_fence *fence;
b6295f9a
RC
611 int i, ret;
612
613 if (!exclusive) {
614 /* NOTE: _reserve_shared() must happen before _add_shared_fence(),
615 * which makes this a slightly strange place to call it. OTOH this
616 * is a convenient can-fail point to hook it in. (And similar to
617 * how etnaviv and nouveau handle this.)
618 */
619 ret = reservation_object_reserve_shared(msm_obj->resv);
620 if (ret)
621 return ret;
622 }
623
624 fobj = reservation_object_get_list(msm_obj->resv);
625 if (!fobj || (fobj->shared_count == 0)) {
626 fence = reservation_object_get_excl(msm_obj->resv);
627 /* don't need to wait on our own fences, since ring is fifo */
628 if (fence && (fence->context != fctx->context)) {
f54d1867 629 ret = dma_fence_wait(fence, true);
b6295f9a
RC
630 if (ret)
631 return ret;
632 }
633 }
634
635 if (!exclusive || !fobj)
636 return 0;
637
638 for (i = 0; i < fobj->shared_count; i++) {
639 fence = rcu_dereference_protected(fobj->shared[i],
640 reservation_object_held(msm_obj->resv));
641 if (fence->context != fctx->context) {
f54d1867 642 ret = dma_fence_wait(fence, true);
b6295f9a
RC
643 if (ret)
644 return ret;
645 }
646 }
647
648 return 0;
649}
650
7198e6b0 651void msm_gem_move_to_active(struct drm_gem_object *obj,
f54d1867 652 struct msm_gpu *gpu, bool exclusive, struct dma_fence *fence)
7198e6b0
RC
653{
654 struct msm_gem_object *msm_obj = to_msm_bo(obj);
4cd33c48 655 WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
7198e6b0 656 msm_obj->gpu = gpu;
b6295f9a
RC
657 if (exclusive)
658 reservation_object_add_excl_fence(msm_obj->resv, fence);
bf6811f3 659 else
b6295f9a 660 reservation_object_add_shared_fence(msm_obj->resv, fence);
7198e6b0
RC
661 list_del_init(&msm_obj->mm_list);
662 list_add_tail(&msm_obj->mm_list, &gpu->active_list);
663}
664
665void msm_gem_move_to_inactive(struct drm_gem_object *obj)
666{
667 struct drm_device *dev = obj->dev;
668 struct msm_drm_private *priv = dev->dev_private;
669 struct msm_gem_object *msm_obj = to_msm_bo(obj);
670
671 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
672
673 msm_obj->gpu = NULL;
7198e6b0
RC
674 list_del_init(&msm_obj->mm_list);
675 list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
7198e6b0
RC
676}
677
b6295f9a 678int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
7198e6b0 679{
7198e6b0 680 struct msm_gem_object *msm_obj = to_msm_bo(obj);
b6295f9a 681 bool write = !!(op & MSM_PREP_WRITE);
f755e227
CW
682 unsigned long remain =
683 op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
684 long ret;
685
686 ret = reservation_object_wait_timeout_rcu(msm_obj->resv, write,
687 true, remain);
688 if (ret == 0)
689 return remain == 0 ? -EBUSY : -ETIMEDOUT;
690 else if (ret < 0)
691 return ret;
7198e6b0
RC
692
693 /* TODO cache maintenance */
c8afe684 694
b6295f9a 695 return 0;
7198e6b0 696}
c8afe684 697
7198e6b0
RC
698int msm_gem_cpu_fini(struct drm_gem_object *obj)
699{
700 /* TODO cache maintenance */
c8afe684
RC
701 return 0;
702}
703
704#ifdef CONFIG_DEBUG_FS
f54d1867 705static void describe_fence(struct dma_fence *fence, const char *type,
b6295f9a
RC
706 struct seq_file *m)
707{
f54d1867 708 if (!dma_fence_is_signaled(fence))
b6295f9a
RC
709 seq_printf(m, "\t%9s: %s %s seq %u\n", type,
710 fence->ops->get_driver_name(fence),
711 fence->ops->get_timeline_name(fence),
712 fence->seqno);
713}
714
c8afe684
RC
715void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
716{
c8afe684 717 struct msm_gem_object *msm_obj = to_msm_bo(obj);
b6295f9a
RC
718 struct reservation_object *robj = msm_obj->resv;
719 struct reservation_object_list *fobj;
f54d1867 720 struct dma_fence *fence;
4b85f7f5 721 struct msm_gem_vma *vma;
c8afe684 722 uint64_t off = drm_vma_node_start(&obj->vma_node);
4cd33c48 723 const char *madv;
c8afe684 724
0e08270a 725 mutex_lock(&msm_obj->lock);
b6295f9a 726
4cd33c48
RC
727 switch (msm_obj->madv) {
728 case __MSM_MADV_PURGED:
729 madv = " purged";
730 break;
731 case MSM_MADV_DONTNEED:
732 madv = " purgeable";
733 break;
734 case MSM_MADV_WILLNEED:
735 default:
736 madv = "";
737 break;
738 }
739
667ce33e 740 seq_printf(m, "%08x: %c %2d (%2d) %08llx %p\t",
7198e6b0 741 msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
2c935bc5 742 obj->name, kref_read(&obj->refcount),
667ce33e
RC
743 off, msm_obj->vaddr);
744
4b85f7f5
RC
745 /* FIXME: we need to print the address space here too */
746 list_for_each_entry(vma, &msm_obj->vmas, list)
747 seq_printf(m, " %08llx", vma->iova);
667ce33e
RC
748
749 seq_printf(m, " %zu%s\n", obj->size, madv);
b6295f9a
RC
750
751 rcu_read_lock();
752 fobj = rcu_dereference(robj->fence);
753 if (fobj) {
754 unsigned int i, shared_count = fobj->shared_count;
755
756 for (i = 0; i < shared_count; i++) {
757 fence = rcu_dereference(fobj->shared[i]);
758 describe_fence(fence, "Shared", m);
759 }
760 }
761
762 fence = rcu_dereference(robj->fence_excl);
763 if (fence)
764 describe_fence(fence, "Exclusive", m);
765 rcu_read_unlock();
0e08270a
SS
766
767 mutex_unlock(&msm_obj->lock);
c8afe684
RC
768}
769
770void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
771{
772 struct msm_gem_object *msm_obj;
773 int count = 0;
774 size_t size = 0;
775
776 list_for_each_entry(msm_obj, list, mm_list) {
777 struct drm_gem_object *obj = &msm_obj->base;
778 seq_printf(m, " ");
779 msm_gem_describe(obj, m);
780 count++;
781 size += obj->size;
782 }
783
784 seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
785}
786#endif
787
788void msm_gem_free_object(struct drm_gem_object *obj)
789{
790 struct drm_device *dev = obj->dev;
791 struct msm_gem_object *msm_obj = to_msm_bo(obj);
c8afe684
RC
792
793 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
794
7198e6b0
RC
795 /* object should not be on active list: */
796 WARN_ON(is_active(msm_obj));
797
c8afe684
RC
798 list_del(&msm_obj->mm_list);
799
0e08270a
SS
800 mutex_lock(&msm_obj->lock);
801
4fe5f65e 802 put_iova(obj);
c8afe684 803
05b84911
RC
804 if (obj->import_attach) {
805 if (msm_obj->vaddr)
806 dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
807
808 /* Don't drop the pages for imported dmabuf, as they are not
809 * ours, just free the array we allocated:
810 */
811 if (msm_obj->pages)
2098105e 812 kvfree(msm_obj->pages);
c8afe684 813
f28730c8 814 drm_prime_gem_destroy(obj, msm_obj->sgt);
05b84911 815 } else {
0e08270a 816 msm_gem_vunmap_locked(obj);
05b84911
RC
817 put_pages(obj);
818 }
c8afe684 819
7198e6b0
RC
820 if (msm_obj->resv == &msm_obj->_resv)
821 reservation_object_fini(msm_obj->resv);
822
c8afe684
RC
823 drm_gem_object_release(obj);
824
0e08270a 825 mutex_unlock(&msm_obj->lock);
c8afe684
RC
826 kfree(msm_obj);
827}
828
829/* convenience method to construct a GEM buffer object, and userspace handle */
830int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
831 uint32_t size, uint32_t flags, uint32_t *handle)
832{
833 struct drm_gem_object *obj;
834 int ret;
835
c8afe684
RC
836 obj = msm_gem_new(dev, size, flags);
837
c8afe684
RC
838 if (IS_ERR(obj))
839 return PTR_ERR(obj);
840
841 ret = drm_gem_handle_create(file, obj, handle);
842
843 /* drop reference from allocate - handle holds it now */
844 drm_gem_object_unreference_unlocked(obj);
845
846 return ret;
847}
848
05b84911
RC
849static int msm_gem_new_impl(struct drm_device *dev,
850 uint32_t size, uint32_t flags,
79f0e202 851 struct reservation_object *resv,
0e08270a
SS
852 struct drm_gem_object **obj,
853 bool struct_mutex_locked)
c8afe684
RC
854{
855 struct msm_drm_private *priv = dev->dev_private;
856 struct msm_gem_object *msm_obj;
c8afe684
RC
857
858 switch (flags & MSM_BO_CACHE_MASK) {
859 case MSM_BO_UNCACHED:
860 case MSM_BO_CACHED:
861 case MSM_BO_WC:
862 break;
863 default:
864 dev_err(dev->dev, "invalid cache flag: %x\n",
865 (flags & MSM_BO_CACHE_MASK));
05b84911 866 return -EINVAL;
c8afe684
RC
867 }
868
667ce33e 869 msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
05b84911
RC
870 if (!msm_obj)
871 return -ENOMEM;
c8afe684 872
0e08270a
SS
873 mutex_init(&msm_obj->lock);
874
c8afe684 875 msm_obj->flags = flags;
4cd33c48 876 msm_obj->madv = MSM_MADV_WILLNEED;
c8afe684 877
79f0e202
RC
878 if (resv) {
879 msm_obj->resv = resv;
880 } else {
881 msm_obj->resv = &msm_obj->_resv;
882 reservation_object_init(msm_obj->resv);
883 }
c8afe684 884
7198e6b0 885 INIT_LIST_HEAD(&msm_obj->submit_entry);
4b85f7f5
RC
886 INIT_LIST_HEAD(&msm_obj->vmas);
887
0e08270a
SS
888 if (struct_mutex_locked) {
889 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
890 list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
891 } else {
892 mutex_lock(&dev->struct_mutex);
893 list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
894 mutex_unlock(&dev->struct_mutex);
895 }
c8afe684 896
05b84911
RC
897 *obj = &msm_obj->base;
898
899 return 0;
900}
901
0e08270a
SS
902static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
903 uint32_t size, uint32_t flags, bool struct_mutex_locked)
05b84911 904{
f4839bd5 905 struct msm_drm_private *priv = dev->dev_private;
871d812a 906 struct drm_gem_object *obj = NULL;
f4839bd5 907 bool use_vram = false;
05b84911
RC
908 int ret;
909
05b84911
RC
910 size = PAGE_ALIGN(size);
911
f4839bd5
RC
912 if (!iommu_present(&platform_bus_type))
913 use_vram = true;
914 else if ((flags & MSM_BO_STOLEN) && priv->vram.size)
915 use_vram = true;
916
917 if (WARN_ON(use_vram && !priv->vram.size))
918 return ERR_PTR(-EINVAL);
919
1a5dff5d
JC
920 /* Disallow zero sized objects as they make the underlying
921 * infrastructure grumpy
922 */
923 if (size == 0)
924 return ERR_PTR(-EINVAL);
925
0e08270a 926 ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
05b84911
RC
927 if (ret)
928 goto fail;
929
f4839bd5 930 if (use_vram) {
4b85f7f5 931 struct msm_gem_vma *vma;
f4839bd5 932 struct page **pages;
b3949a9a
HV
933 struct msm_gem_object *msm_obj = to_msm_bo(obj);
934
935 mutex_lock(&msm_obj->lock);
f4839bd5 936
4b85f7f5 937 vma = add_vma(obj, NULL);
b3949a9a 938 mutex_unlock(&msm_obj->lock);
4b85f7f5
RC
939 if (IS_ERR(vma)) {
940 ret = PTR_ERR(vma);
941 goto fail;
942 }
943
944 to_msm_bo(obj)->vram_node = &vma->node;
945
f4839bd5
RC
946 drm_gem_private_object_init(dev, obj, size);
947
f4839bd5
RC
948 pages = get_pages(obj);
949 if (IS_ERR(pages)) {
950 ret = PTR_ERR(pages);
951 goto fail;
952 }
4b85f7f5
RC
953
954 vma->iova = physaddr(obj);
f4839bd5 955 } else {
871d812a
RC
956 ret = drm_gem_object_init(dev, obj, size);
957 if (ret)
958 goto fail;
871d812a 959 }
05b84911
RC
960
961 return obj;
962
963fail:
0e08270a 964 drm_gem_object_unreference_unlocked(obj);
05b84911
RC
965 return ERR_PTR(ret);
966}
967
0e08270a
SS
968struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
969 uint32_t size, uint32_t flags)
970{
971 return _msm_gem_new(dev, size, flags, true);
972}
973
974struct drm_gem_object *msm_gem_new(struct drm_device *dev,
975 uint32_t size, uint32_t flags)
976{
977 return _msm_gem_new(dev, size, flags, false);
978}
979
05b84911 980struct drm_gem_object *msm_gem_import(struct drm_device *dev,
79f0e202 981 struct dma_buf *dmabuf, struct sg_table *sgt)
05b84911
RC
982{
983 struct msm_gem_object *msm_obj;
984 struct drm_gem_object *obj;
79f0e202 985 uint32_t size;
05b84911
RC
986 int ret, npages;
987
871d812a
RC
988 /* if we don't have IOMMU, don't bother pretending we can import: */
989 if (!iommu_present(&platform_bus_type)) {
990 dev_err(dev->dev, "cannot import without IOMMU\n");
991 return ERR_PTR(-EINVAL);
992 }
993
79f0e202 994 size = PAGE_ALIGN(dmabuf->size);
05b84911 995
0e08270a 996 ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
05b84911
RC
997 if (ret)
998 goto fail;
999
1000 drm_gem_private_object_init(dev, obj, size);
1001
1002 npages = size / PAGE_SIZE;
1003
1004 msm_obj = to_msm_bo(obj);
0e08270a 1005 mutex_lock(&msm_obj->lock);
05b84911 1006 msm_obj->sgt = sgt;
2098105e 1007 msm_obj->pages = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
05b84911 1008 if (!msm_obj->pages) {
0e08270a 1009 mutex_unlock(&msm_obj->lock);
05b84911
RC
1010 ret = -ENOMEM;
1011 goto fail;
1012 }
1013
1014 ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
0e08270a
SS
1015 if (ret) {
1016 mutex_unlock(&msm_obj->lock);
05b84911 1017 goto fail;
0e08270a 1018 }
05b84911 1019
0e08270a 1020 mutex_unlock(&msm_obj->lock);
c8afe684
RC
1021 return obj;
1022
1023fail:
e73a8569 1024 drm_gem_object_unreference_unlocked(obj);
c8afe684
RC
1025 return ERR_PTR(ret);
1026}