xref: /openbmc/linux/drivers/gpu/drm/msm/msm_gem.c (revision cf11c1f8)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (C) 2013 Red Hat
4  * Author: Rob Clark <robdclark@gmail.com>
5  */
6 
7 #include <linux/dma-map-ops.h>
8 #include <linux/spinlock.h>
9 #include <linux/shmem_fs.h>
10 #include <linux/dma-buf.h>
11 #include <linux/pfn_t.h>
12 
13 #include <drm/drm_prime.h>
14 
15 #include "msm_drv.h"
16 #include "msm_fence.h"
17 #include "msm_gem.h"
18 #include "msm_gpu.h"
19 #include "msm_mmu.h"
20 
21 
22 static dma_addr_t physaddr(struct drm_gem_object *obj)
23 {
24 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
25 	struct msm_drm_private *priv = obj->dev->dev_private;
26 	return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
27 			priv->vram.paddr;
28 }
29 
30 static bool use_pages(struct drm_gem_object *obj)
31 {
32 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
33 	return !msm_obj->vram_node;
34 }
35 
36 /*
37  * Cache sync.. this is a bit over-complicated, to fit dma-mapping
38  * API.  Really GPU cache is out of scope here (handled on cmdstream)
39  * and all we need to do is invalidate newly allocated pages before
40  * mapping to CPU as uncached/writecombine.
41  *
42  * On top of this, we have the added headache, that depending on
43  * display generation, the display's iommu may be wired up to either
44  * the toplevel drm device (mdss), or to the mdp sub-node, meaning
45  * that here we either have dma-direct or iommu ops.
46  *
47  * Let this be a cautionary tail of abstraction gone wrong.
48  */
49 
50 static void sync_for_device(struct msm_gem_object *msm_obj)
51 {
52 	struct device *dev = msm_obj->base.dev->dev;
53 
54 	dma_map_sgtable(dev, msm_obj->sgt, DMA_BIDIRECTIONAL, 0);
55 }
56 
57 static void sync_for_cpu(struct msm_gem_object *msm_obj)
58 {
59 	struct device *dev = msm_obj->base.dev->dev;
60 
61 	dma_unmap_sgtable(dev, msm_obj->sgt, DMA_BIDIRECTIONAL, 0);
62 }
63 
64 /* allocate pages from VRAM carveout, used when no IOMMU: */
65 static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
66 {
67 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
68 	struct msm_drm_private *priv = obj->dev->dev_private;
69 	dma_addr_t paddr;
70 	struct page **p;
71 	int ret, i;
72 
73 	p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
74 	if (!p)
75 		return ERR_PTR(-ENOMEM);
76 
77 	spin_lock(&priv->vram.lock);
78 	ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
79 	spin_unlock(&priv->vram.lock);
80 	if (ret) {
81 		kvfree(p);
82 		return ERR_PTR(ret);
83 	}
84 
85 	paddr = physaddr(obj);
86 	for (i = 0; i < npages; i++) {
87 		p[i] = phys_to_page(paddr);
88 		paddr += PAGE_SIZE;
89 	}
90 
91 	return p;
92 }
93 
94 static struct page **get_pages(struct drm_gem_object *obj)
95 {
96 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
97 
98 	if (!msm_obj->pages) {
99 		struct drm_device *dev = obj->dev;
100 		struct page **p;
101 		int npages = obj->size >> PAGE_SHIFT;
102 
103 		if (use_pages(obj))
104 			p = drm_gem_get_pages(obj);
105 		else
106 			p = get_pages_vram(obj, npages);
107 
108 		if (IS_ERR(p)) {
109 			DRM_DEV_ERROR(dev->dev, "could not get pages: %ld\n",
110 					PTR_ERR(p));
111 			return p;
112 		}
113 
114 		msm_obj->pages = p;
115 
116 		msm_obj->sgt = drm_prime_pages_to_sg(obj->dev, p, npages);
117 		if (IS_ERR(msm_obj->sgt)) {
118 			void *ptr = ERR_CAST(msm_obj->sgt);
119 
120 			DRM_DEV_ERROR(dev->dev, "failed to allocate sgt\n");
121 			msm_obj->sgt = NULL;
122 			return ptr;
123 		}
124 
125 		/* For non-cached buffers, ensure the new pages are clean
126 		 * because display controller, GPU, etc. are not coherent:
127 		 */
128 		if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
129 			sync_for_device(msm_obj);
130 	}
131 
132 	return msm_obj->pages;
133 }
134 
135 static void put_pages_vram(struct drm_gem_object *obj)
136 {
137 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
138 	struct msm_drm_private *priv = obj->dev->dev_private;
139 
140 	spin_lock(&priv->vram.lock);
141 	drm_mm_remove_node(msm_obj->vram_node);
142 	spin_unlock(&priv->vram.lock);
143 
144 	kvfree(msm_obj->pages);
145 }
146 
147 static void put_pages(struct drm_gem_object *obj)
148 {
149 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
150 
151 	if (msm_obj->pages) {
152 		if (msm_obj->sgt) {
153 			/* For non-cached buffers, ensure the new
154 			 * pages are clean because display controller,
155 			 * GPU, etc. are not coherent:
156 			 */
157 			if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
158 				sync_for_cpu(msm_obj);
159 
160 			sg_free_table(msm_obj->sgt);
161 			kfree(msm_obj->sgt);
162 		}
163 
164 		if (use_pages(obj))
165 			drm_gem_put_pages(obj, msm_obj->pages, true, false);
166 		else
167 			put_pages_vram(obj);
168 
169 		msm_obj->pages = NULL;
170 	}
171 }
172 
173 struct page **msm_gem_get_pages(struct drm_gem_object *obj)
174 {
175 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
176 	struct page **p;
177 
178 	msm_gem_lock(obj);
179 
180 	if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
181 		msm_gem_unlock(obj);
182 		return ERR_PTR(-EBUSY);
183 	}
184 
185 	p = get_pages(obj);
186 	msm_gem_unlock(obj);
187 	return p;
188 }
189 
190 void msm_gem_put_pages(struct drm_gem_object *obj)
191 {
192 	/* when we start tracking the pin count, then do something here */
193 }
194 
195 int msm_gem_mmap_obj(struct drm_gem_object *obj,
196 		struct vm_area_struct *vma)
197 {
198 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
199 
200 	vma->vm_flags &= ~VM_PFNMAP;
201 	vma->vm_flags |= VM_MIXEDMAP;
202 
203 	if (msm_obj->flags & MSM_BO_WC) {
204 		vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
205 	} else if (msm_obj->flags & MSM_BO_UNCACHED) {
206 		vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
207 	} else {
208 		/*
209 		 * Shunt off cached objs to shmem file so they have their own
210 		 * address_space (so unmap_mapping_range does what we want,
211 		 * in particular in the case of mmap'd dmabufs)
212 		 */
213 		fput(vma->vm_file);
214 		get_file(obj->filp);
215 		vma->vm_pgoff = 0;
216 		vma->vm_file  = obj->filp;
217 
218 		vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
219 	}
220 
221 	return 0;
222 }
223 
224 int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
225 {
226 	int ret;
227 
228 	ret = drm_gem_mmap(filp, vma);
229 	if (ret) {
230 		DBG("mmap failed: %d", ret);
231 		return ret;
232 	}
233 
234 	return msm_gem_mmap_obj(vma->vm_private_data, vma);
235 }
236 
237 vm_fault_t msm_gem_fault(struct vm_fault *vmf)
238 {
239 	struct vm_area_struct *vma = vmf->vma;
240 	struct drm_gem_object *obj = vma->vm_private_data;
241 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
242 	struct page **pages;
243 	unsigned long pfn;
244 	pgoff_t pgoff;
245 	int err;
246 	vm_fault_t ret;
247 
248 	/*
249 	 * vm_ops.open/drm_gem_mmap_obj and close get and put
250 	 * a reference on obj. So, we dont need to hold one here.
251 	 */
252 	err = msm_gem_lock_interruptible(obj);
253 	if (err) {
254 		ret = VM_FAULT_NOPAGE;
255 		goto out;
256 	}
257 
258 	if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
259 		msm_gem_unlock(obj);
260 		return VM_FAULT_SIGBUS;
261 	}
262 
263 	/* make sure we have pages attached now */
264 	pages = get_pages(obj);
265 	if (IS_ERR(pages)) {
266 		ret = vmf_error(PTR_ERR(pages));
267 		goto out_unlock;
268 	}
269 
270 	/* We don't use vmf->pgoff since that has the fake offset: */
271 	pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
272 
273 	pfn = page_to_pfn(pages[pgoff]);
274 
275 	VERB("Inserting %p pfn %lx, pa %lx", (void *)vmf->address,
276 			pfn, pfn << PAGE_SHIFT);
277 
278 	ret = vmf_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
279 out_unlock:
280 	msm_gem_unlock(obj);
281 out:
282 	return ret;
283 }
284 
285 /** get mmap offset */
286 static uint64_t mmap_offset(struct drm_gem_object *obj)
287 {
288 	struct drm_device *dev = obj->dev;
289 	int ret;
290 
291 	WARN_ON(!msm_gem_is_locked(obj));
292 
293 	/* Make it mmapable */
294 	ret = drm_gem_create_mmap_offset(obj);
295 
296 	if (ret) {
297 		DRM_DEV_ERROR(dev->dev, "could not allocate mmap offset\n");
298 		return 0;
299 	}
300 
301 	return drm_vma_node_offset_addr(&obj->vma_node);
302 }
303 
304 uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
305 {
306 	uint64_t offset;
307 
308 	msm_gem_lock(obj);
309 	offset = mmap_offset(obj);
310 	msm_gem_unlock(obj);
311 	return offset;
312 }
313 
314 static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
315 		struct msm_gem_address_space *aspace)
316 {
317 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
318 	struct msm_gem_vma *vma;
319 
320 	WARN_ON(!msm_gem_is_locked(obj));
321 
322 	vma = kzalloc(sizeof(*vma), GFP_KERNEL);
323 	if (!vma)
324 		return ERR_PTR(-ENOMEM);
325 
326 	vma->aspace = aspace;
327 
328 	list_add_tail(&vma->list, &msm_obj->vmas);
329 
330 	return vma;
331 }
332 
333 static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
334 		struct msm_gem_address_space *aspace)
335 {
336 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
337 	struct msm_gem_vma *vma;
338 
339 	WARN_ON(!msm_gem_is_locked(obj));
340 
341 	list_for_each_entry(vma, &msm_obj->vmas, list) {
342 		if (vma->aspace == aspace)
343 			return vma;
344 	}
345 
346 	return NULL;
347 }
348 
349 static void del_vma(struct msm_gem_vma *vma)
350 {
351 	if (!vma)
352 		return;
353 
354 	list_del(&vma->list);
355 	kfree(vma);
356 }
357 
358 /* Called with msm_obj locked */
359 static void
360 put_iova(struct drm_gem_object *obj)
361 {
362 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
363 	struct msm_gem_vma *vma, *tmp;
364 
365 	WARN_ON(!msm_gem_is_locked(obj));
366 
367 	list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
368 		if (vma->aspace) {
369 			msm_gem_purge_vma(vma->aspace, vma);
370 			msm_gem_close_vma(vma->aspace, vma);
371 		}
372 		del_vma(vma);
373 	}
374 }
375 
376 static int get_iova_locked(struct drm_gem_object *obj,
377 		struct msm_gem_address_space *aspace, uint64_t *iova,
378 		u64 range_start, u64 range_end)
379 {
380 	struct msm_gem_vma *vma;
381 	int ret = 0;
382 
383 	WARN_ON(!msm_gem_is_locked(obj));
384 
385 	vma = lookup_vma(obj, aspace);
386 
387 	if (!vma) {
388 		vma = add_vma(obj, aspace);
389 		if (IS_ERR(vma))
390 			return PTR_ERR(vma);
391 
392 		ret = msm_gem_init_vma(aspace, vma, obj->size >> PAGE_SHIFT,
393 			range_start, range_end);
394 		if (ret) {
395 			del_vma(vma);
396 			return ret;
397 		}
398 	}
399 
400 	*iova = vma->iova;
401 	return 0;
402 }
403 
404 static int msm_gem_pin_iova(struct drm_gem_object *obj,
405 		struct msm_gem_address_space *aspace)
406 {
407 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
408 	struct msm_gem_vma *vma;
409 	struct page **pages;
410 	int prot = IOMMU_READ;
411 
412 	if (!(msm_obj->flags & MSM_BO_GPU_READONLY))
413 		prot |= IOMMU_WRITE;
414 
415 	if (msm_obj->flags & MSM_BO_MAP_PRIV)
416 		prot |= IOMMU_PRIV;
417 
418 	WARN_ON(!msm_gem_is_locked(obj));
419 
420 	if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED))
421 		return -EBUSY;
422 
423 	vma = lookup_vma(obj, aspace);
424 	if (WARN_ON(!vma))
425 		return -EINVAL;
426 
427 	pages = get_pages(obj);
428 	if (IS_ERR(pages))
429 		return PTR_ERR(pages);
430 
431 	return msm_gem_map_vma(aspace, vma, prot,
432 			msm_obj->sgt, obj->size >> PAGE_SHIFT);
433 }
434 
435 static int get_and_pin_iova_range_locked(struct drm_gem_object *obj,
436 		struct msm_gem_address_space *aspace, uint64_t *iova,
437 		u64 range_start, u64 range_end)
438 {
439 	u64 local;
440 	int ret;
441 
442 	WARN_ON(!msm_gem_is_locked(obj));
443 
444 	ret = get_iova_locked(obj, aspace, &local,
445 		range_start, range_end);
446 
447 	if (!ret)
448 		ret = msm_gem_pin_iova(obj, aspace);
449 
450 	if (!ret)
451 		*iova = local;
452 
453 	return ret;
454 }
455 
456 /*
457  * get iova and pin it. Should have a matching put
458  * limits iova to specified range (in pages)
459  */
460 int msm_gem_get_and_pin_iova_range(struct drm_gem_object *obj,
461 		struct msm_gem_address_space *aspace, uint64_t *iova,
462 		u64 range_start, u64 range_end)
463 {
464 	int ret;
465 
466 	msm_gem_lock(obj);
467 	ret = get_and_pin_iova_range_locked(obj, aspace, iova, range_start, range_end);
468 	msm_gem_unlock(obj);
469 
470 	return ret;
471 }
472 
473 int msm_gem_get_and_pin_iova_locked(struct drm_gem_object *obj,
474 		struct msm_gem_address_space *aspace, uint64_t *iova)
475 {
476 	return get_and_pin_iova_range_locked(obj, aspace, iova, 0, U64_MAX);
477 }
478 
479 /* get iova and pin it. Should have a matching put */
480 int msm_gem_get_and_pin_iova(struct drm_gem_object *obj,
481 		struct msm_gem_address_space *aspace, uint64_t *iova)
482 {
483 	return msm_gem_get_and_pin_iova_range(obj, aspace, iova, 0, U64_MAX);
484 }
485 
486 /*
487  * Get an iova but don't pin it. Doesn't need a put because iovas are currently
488  * valid for the life of the object
489  */
490 int msm_gem_get_iova(struct drm_gem_object *obj,
491 		struct msm_gem_address_space *aspace, uint64_t *iova)
492 {
493 	int ret;
494 
495 	msm_gem_lock(obj);
496 	ret = get_iova_locked(obj, aspace, iova, 0, U64_MAX);
497 	msm_gem_unlock(obj);
498 
499 	return ret;
500 }
501 
502 /* get iova without taking a reference, used in places where you have
503  * already done a 'msm_gem_get_and_pin_iova' or 'msm_gem_get_iova'
504  */
505 uint64_t msm_gem_iova(struct drm_gem_object *obj,
506 		struct msm_gem_address_space *aspace)
507 {
508 	struct msm_gem_vma *vma;
509 
510 	msm_gem_lock(obj);
511 	vma = lookup_vma(obj, aspace);
512 	msm_gem_unlock(obj);
513 	WARN_ON(!vma);
514 
515 	return vma ? vma->iova : 0;
516 }
517 
518 /*
519  * Locked variant of msm_gem_unpin_iova()
520  */
521 void msm_gem_unpin_iova_locked(struct drm_gem_object *obj,
522 		struct msm_gem_address_space *aspace)
523 {
524 	struct msm_gem_vma *vma;
525 
526 	WARN_ON(!msm_gem_is_locked(obj));
527 
528 	vma = lookup_vma(obj, aspace);
529 
530 	if (!WARN_ON(!vma))
531 		msm_gem_unmap_vma(aspace, vma);
532 }
533 
534 /*
535  * Unpin a iova by updating the reference counts. The memory isn't actually
536  * purged until something else (shrinker, mm_notifier, destroy, etc) decides
537  * to get rid of it
538  */
539 void msm_gem_unpin_iova(struct drm_gem_object *obj,
540 		struct msm_gem_address_space *aspace)
541 {
542 	msm_gem_lock(obj);
543 	msm_gem_unpin_iova_locked(obj, aspace);
544 	msm_gem_unlock(obj);
545 }
546 
547 int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
548 		struct drm_mode_create_dumb *args)
549 {
550 	args->pitch = align_pitch(args->width, args->bpp);
551 	args->size  = PAGE_ALIGN(args->pitch * args->height);
552 	return msm_gem_new_handle(dev, file, args->size,
553 			MSM_BO_SCANOUT | MSM_BO_WC, &args->handle, "dumb");
554 }
555 
556 int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
557 		uint32_t handle, uint64_t *offset)
558 {
559 	struct drm_gem_object *obj;
560 	int ret = 0;
561 
562 	/* GEM does all our handle to object mapping */
563 	obj = drm_gem_object_lookup(file, handle);
564 	if (obj == NULL) {
565 		ret = -ENOENT;
566 		goto fail;
567 	}
568 
569 	*offset = msm_gem_mmap_offset(obj);
570 
571 	drm_gem_object_put(obj);
572 
573 fail:
574 	return ret;
575 }
576 
577 static void *get_vaddr(struct drm_gem_object *obj, unsigned madv)
578 {
579 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
580 	int ret = 0;
581 
582 	WARN_ON(!msm_gem_is_locked(obj));
583 
584 	if (obj->import_attach)
585 		return ERR_PTR(-ENODEV);
586 
587 	if (WARN_ON(msm_obj->madv > madv)) {
588 		DRM_DEV_ERROR(obj->dev->dev, "Invalid madv state: %u vs %u\n",
589 			msm_obj->madv, madv);
590 		return ERR_PTR(-EBUSY);
591 	}
592 
593 	/* increment vmap_count *before* vmap() call, so shrinker can
594 	 * check vmap_count (is_vunmapable()) outside of msm_obj lock.
595 	 * This guarantees that we won't try to msm_gem_vunmap() this
596 	 * same object from within the vmap() call (while we already
597 	 * hold msm_obj lock)
598 	 */
599 	msm_obj->vmap_count++;
600 
601 	if (!msm_obj->vaddr) {
602 		struct page **pages = get_pages(obj);
603 		if (IS_ERR(pages)) {
604 			ret = PTR_ERR(pages);
605 			goto fail;
606 		}
607 		msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
608 				VM_MAP, pgprot_writecombine(PAGE_KERNEL));
609 		if (msm_obj->vaddr == NULL) {
610 			ret = -ENOMEM;
611 			goto fail;
612 		}
613 	}
614 
615 	return msm_obj->vaddr;
616 
617 fail:
618 	msm_obj->vmap_count--;
619 	return ERR_PTR(ret);
620 }
621 
622 void *msm_gem_get_vaddr_locked(struct drm_gem_object *obj)
623 {
624 	return get_vaddr(obj, MSM_MADV_WILLNEED);
625 }
626 
627 void *msm_gem_get_vaddr(struct drm_gem_object *obj)
628 {
629 	void *ret;
630 
631 	msm_gem_lock(obj);
632 	ret = msm_gem_get_vaddr_locked(obj);
633 	msm_gem_unlock(obj);
634 
635 	return ret;
636 }
637 
638 /*
639  * Don't use this!  It is for the very special case of dumping
640  * submits from GPU hangs or faults, were the bo may already
641  * be MSM_MADV_DONTNEED, but we know the buffer is still on the
642  * active list.
643  */
644 void *msm_gem_get_vaddr_active(struct drm_gem_object *obj)
645 {
646 	return get_vaddr(obj, __MSM_MADV_PURGED);
647 }
648 
649 void msm_gem_put_vaddr_locked(struct drm_gem_object *obj)
650 {
651 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
652 
653 	WARN_ON(!msm_gem_is_locked(obj));
654 	WARN_ON(msm_obj->vmap_count < 1);
655 
656 	msm_obj->vmap_count--;
657 }
658 
659 void msm_gem_put_vaddr(struct drm_gem_object *obj)
660 {
661 	msm_gem_lock(obj);
662 	msm_gem_put_vaddr_locked(obj);
663 	msm_gem_unlock(obj);
664 }
665 
666 /* Update madvise status, returns true if not purged, else
667  * false or -errno.
668  */
669 int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
670 {
671 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
672 
673 	msm_gem_lock(obj);
674 
675 	if (msm_obj->madv != __MSM_MADV_PURGED)
676 		msm_obj->madv = madv;
677 
678 	madv = msm_obj->madv;
679 
680 	msm_gem_unlock(obj);
681 
682 	return (madv != __MSM_MADV_PURGED);
683 }
684 
685 void msm_gem_purge(struct drm_gem_object *obj)
686 {
687 	struct drm_device *dev = obj->dev;
688 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
689 
690 	WARN_ON(!is_purgeable(msm_obj));
691 	WARN_ON(obj->import_attach);
692 
693 	put_iova(obj);
694 
695 	msm_gem_vunmap(obj);
696 
697 	put_pages(obj);
698 
699 	msm_obj->madv = __MSM_MADV_PURGED;
700 
701 	drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
702 	drm_gem_free_mmap_offset(obj);
703 
704 	/* Our goal here is to return as much of the memory as
705 	 * is possible back to the system as we are called from OOM.
706 	 * To do this we must instruct the shmfs to drop all of its
707 	 * backing pages, *now*.
708 	 */
709 	shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
710 
711 	invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
712 			0, (loff_t)-1);
713 }
714 
715 void msm_gem_vunmap(struct drm_gem_object *obj)
716 {
717 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
718 
719 	WARN_ON(!msm_gem_is_locked(obj));
720 
721 	if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
722 		return;
723 
724 	vunmap(msm_obj->vaddr);
725 	msm_obj->vaddr = NULL;
726 }
727 
728 /* must be called before _move_to_active().. */
729 int msm_gem_sync_object(struct drm_gem_object *obj,
730 		struct msm_fence_context *fctx, bool exclusive)
731 {
732 	struct dma_resv_list *fobj;
733 	struct dma_fence *fence;
734 	int i, ret;
735 
736 	fobj = dma_resv_get_list(obj->resv);
737 	if (!fobj || (fobj->shared_count == 0)) {
738 		fence = dma_resv_get_excl(obj->resv);
739 		/* don't need to wait on our own fences, since ring is fifo */
740 		if (fence && (fence->context != fctx->context)) {
741 			ret = dma_fence_wait(fence, true);
742 			if (ret)
743 				return ret;
744 		}
745 	}
746 
747 	if (!exclusive || !fobj)
748 		return 0;
749 
750 	for (i = 0; i < fobj->shared_count; i++) {
751 		fence = rcu_dereference_protected(fobj->shared[i],
752 						dma_resv_held(obj->resv));
753 		if (fence->context != fctx->context) {
754 			ret = dma_fence_wait(fence, true);
755 			if (ret)
756 				return ret;
757 		}
758 	}
759 
760 	return 0;
761 }
762 
763 void msm_gem_active_get(struct drm_gem_object *obj, struct msm_gpu *gpu)
764 {
765 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
766 	struct msm_drm_private *priv = obj->dev->dev_private;
767 
768 	might_sleep();
769 	WARN_ON(!msm_gem_is_locked(obj));
770 	WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
771 
772 	if (!atomic_fetch_inc(&msm_obj->active_count)) {
773 		mutex_lock(&priv->mm_lock);
774 		list_del_init(&msm_obj->mm_list);
775 		list_add_tail(&msm_obj->mm_list, &gpu->active_list);
776 		mutex_unlock(&priv->mm_lock);
777 	}
778 }
779 
780 void msm_gem_active_put(struct drm_gem_object *obj)
781 {
782 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
783 	struct msm_drm_private *priv = obj->dev->dev_private;
784 
785 	might_sleep();
786 
787 	if (!atomic_dec_return(&msm_obj->active_count)) {
788 		mutex_lock(&priv->mm_lock);
789 		list_del_init(&msm_obj->mm_list);
790 		list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
791 		mutex_unlock(&priv->mm_lock);
792 	}
793 }
794 
795 int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
796 {
797 	bool write = !!(op & MSM_PREP_WRITE);
798 	unsigned long remain =
799 		op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
800 	long ret;
801 
802 	ret = dma_resv_wait_timeout_rcu(obj->resv, write,
803 						  true,  remain);
804 	if (ret == 0)
805 		return remain == 0 ? -EBUSY : -ETIMEDOUT;
806 	else if (ret < 0)
807 		return ret;
808 
809 	/* TODO cache maintenance */
810 
811 	return 0;
812 }
813 
814 int msm_gem_cpu_fini(struct drm_gem_object *obj)
815 {
816 	/* TODO cache maintenance */
817 	return 0;
818 }
819 
820 #ifdef CONFIG_DEBUG_FS
821 static void describe_fence(struct dma_fence *fence, const char *type,
822 		struct seq_file *m)
823 {
824 	if (!dma_fence_is_signaled(fence))
825 		seq_printf(m, "\t%9s: %s %s seq %llu\n", type,
826 				fence->ops->get_driver_name(fence),
827 				fence->ops->get_timeline_name(fence),
828 				fence->seqno);
829 }
830 
831 void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
832 {
833 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
834 	struct dma_resv *robj = obj->resv;
835 	struct dma_resv_list *fobj;
836 	struct dma_fence *fence;
837 	struct msm_gem_vma *vma;
838 	uint64_t off = drm_vma_node_start(&obj->vma_node);
839 	const char *madv;
840 
841 	msm_gem_lock(obj);
842 
843 	switch (msm_obj->madv) {
844 	case __MSM_MADV_PURGED:
845 		madv = " purged";
846 		break;
847 	case MSM_MADV_DONTNEED:
848 		madv = " purgeable";
849 		break;
850 	case MSM_MADV_WILLNEED:
851 	default:
852 		madv = "";
853 		break;
854 	}
855 
856 	seq_printf(m, "%08x: %c %2d (%2d) %08llx %p",
857 			msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
858 			obj->name, kref_read(&obj->refcount),
859 			off, msm_obj->vaddr);
860 
861 	seq_printf(m, " %08zu %9s %-32s\n", obj->size, madv, msm_obj->name);
862 
863 	if (!list_empty(&msm_obj->vmas)) {
864 
865 		seq_puts(m, "      vmas:");
866 
867 		list_for_each_entry(vma, &msm_obj->vmas, list) {
868 			const char *name, *comm;
869 			if (vma->aspace) {
870 				struct msm_gem_address_space *aspace = vma->aspace;
871 				struct task_struct *task =
872 					get_pid_task(aspace->pid, PIDTYPE_PID);
873 				if (task) {
874 					comm = kstrdup(task->comm, GFP_KERNEL);
875 				} else {
876 					comm = NULL;
877 				}
878 				name = aspace->name;
879 			} else {
880 				name = comm = NULL;
881 			}
882 			seq_printf(m, " [%s%s%s: aspace=%p, %08llx,%s,inuse=%d]",
883 				name, comm ? ":" : "", comm ? comm : "",
884 				vma->aspace, vma->iova,
885 				vma->mapped ? "mapped" : "unmapped",
886 				vma->inuse);
887 			kfree(comm);
888 		}
889 
890 		seq_puts(m, "\n");
891 	}
892 
893 	rcu_read_lock();
894 	fobj = rcu_dereference(robj->fence);
895 	if (fobj) {
896 		unsigned int i, shared_count = fobj->shared_count;
897 
898 		for (i = 0; i < shared_count; i++) {
899 			fence = rcu_dereference(fobj->shared[i]);
900 			describe_fence(fence, "Shared", m);
901 		}
902 	}
903 
904 	fence = rcu_dereference(robj->fence_excl);
905 	if (fence)
906 		describe_fence(fence, "Exclusive", m);
907 	rcu_read_unlock();
908 
909 	msm_gem_unlock(obj);
910 }
911 
912 void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
913 {
914 	struct msm_gem_object *msm_obj;
915 	int count = 0;
916 	size_t size = 0;
917 
918 	seq_puts(m, "   flags       id ref  offset   kaddr            size     madv      name\n");
919 	list_for_each_entry(msm_obj, list, mm_list) {
920 		struct drm_gem_object *obj = &msm_obj->base;
921 		seq_puts(m, "   ");
922 		msm_gem_describe(obj, m);
923 		count++;
924 		size += obj->size;
925 	}
926 
927 	seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
928 }
929 #endif
930 
931 /* don't call directly!  Use drm_gem_object_put_locked() and friends */
932 void msm_gem_free_object(struct drm_gem_object *obj)
933 {
934 	struct msm_gem_object *msm_obj = to_msm_bo(obj);
935 	struct drm_device *dev = obj->dev;
936 	struct msm_drm_private *priv = dev->dev_private;
937 
938 	/* object should not be on active list: */
939 	WARN_ON(is_active(msm_obj));
940 
941 	mutex_lock(&priv->mm_lock);
942 	list_del(&msm_obj->mm_list);
943 	mutex_unlock(&priv->mm_lock);
944 
945 	msm_gem_lock(obj);
946 
947 	put_iova(obj);
948 
949 	if (obj->import_attach) {
950 		WARN_ON(msm_obj->vaddr);
951 
952 		/* Don't drop the pages for imported dmabuf, as they are not
953 		 * ours, just free the array we allocated:
954 		 */
955 		if (msm_obj->pages)
956 			kvfree(msm_obj->pages);
957 
958 		/* dma_buf_detach() grabs resv lock, so we need to unlock
959 		 * prior to drm_prime_gem_destroy
960 		 */
961 		msm_gem_unlock(obj);
962 
963 		drm_prime_gem_destroy(obj, msm_obj->sgt);
964 	} else {
965 		msm_gem_vunmap(obj);
966 		put_pages(obj);
967 		msm_gem_unlock(obj);
968 	}
969 
970 	drm_gem_object_release(obj);
971 
972 	kfree(msm_obj);
973 }
974 
975 /* convenience method to construct a GEM buffer object, and userspace handle */
976 int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
977 		uint32_t size, uint32_t flags, uint32_t *handle,
978 		char *name)
979 {
980 	struct drm_gem_object *obj;
981 	int ret;
982 
983 	obj = msm_gem_new(dev, size, flags);
984 
985 	if (IS_ERR(obj))
986 		return PTR_ERR(obj);
987 
988 	if (name)
989 		msm_gem_object_set_name(obj, "%s", name);
990 
991 	ret = drm_gem_handle_create(file, obj, handle);
992 
993 	/* drop reference from allocate - handle holds it now */
994 	drm_gem_object_put(obj);
995 
996 	return ret;
997 }
998 
999 static int msm_gem_new_impl(struct drm_device *dev,
1000 		uint32_t size, uint32_t flags,
1001 		struct drm_gem_object **obj)
1002 {
1003 	struct msm_gem_object *msm_obj;
1004 
1005 	switch (flags & MSM_BO_CACHE_MASK) {
1006 	case MSM_BO_UNCACHED:
1007 	case MSM_BO_CACHED:
1008 	case MSM_BO_WC:
1009 		break;
1010 	default:
1011 		DRM_DEV_ERROR(dev->dev, "invalid cache flag: %x\n",
1012 				(flags & MSM_BO_CACHE_MASK));
1013 		return -EINVAL;
1014 	}
1015 
1016 	msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
1017 	if (!msm_obj)
1018 		return -ENOMEM;
1019 
1020 	msm_obj->flags = flags;
1021 	msm_obj->madv = MSM_MADV_WILLNEED;
1022 
1023 	INIT_LIST_HEAD(&msm_obj->submit_entry);
1024 	INIT_LIST_HEAD(&msm_obj->vmas);
1025 
1026 	*obj = &msm_obj->base;
1027 
1028 	return 0;
1029 }
1030 
1031 static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
1032 		uint32_t size, uint32_t flags, bool struct_mutex_locked)
1033 {
1034 	struct msm_drm_private *priv = dev->dev_private;
1035 	struct msm_gem_object *msm_obj;
1036 	struct drm_gem_object *obj = NULL;
1037 	bool use_vram = false;
1038 	int ret;
1039 
1040 	size = PAGE_ALIGN(size);
1041 
1042 	if (!msm_use_mmu(dev))
1043 		use_vram = true;
1044 	else if ((flags & (MSM_BO_STOLEN | MSM_BO_SCANOUT)) && priv->vram.size)
1045 		use_vram = true;
1046 
1047 	if (WARN_ON(use_vram && !priv->vram.size))
1048 		return ERR_PTR(-EINVAL);
1049 
1050 	/* Disallow zero sized objects as they make the underlying
1051 	 * infrastructure grumpy
1052 	 */
1053 	if (size == 0)
1054 		return ERR_PTR(-EINVAL);
1055 
1056 	ret = msm_gem_new_impl(dev, size, flags, &obj);
1057 	if (ret)
1058 		goto fail;
1059 
1060 	msm_obj = to_msm_bo(obj);
1061 
1062 	if (use_vram) {
1063 		struct msm_gem_vma *vma;
1064 		struct page **pages;
1065 
1066 		msm_gem_lock(obj);
1067 
1068 		vma = add_vma(obj, NULL);
1069 		msm_gem_unlock(obj);
1070 		if (IS_ERR(vma)) {
1071 			ret = PTR_ERR(vma);
1072 			goto fail;
1073 		}
1074 
1075 		to_msm_bo(obj)->vram_node = &vma->node;
1076 
1077 		drm_gem_private_object_init(dev, obj, size);
1078 
1079 		pages = get_pages(obj);
1080 		if (IS_ERR(pages)) {
1081 			ret = PTR_ERR(pages);
1082 			goto fail;
1083 		}
1084 
1085 		vma->iova = physaddr(obj);
1086 	} else {
1087 		ret = drm_gem_object_init(dev, obj, size);
1088 		if (ret)
1089 			goto fail;
1090 		/*
1091 		 * Our buffers are kept pinned, so allocating them from the
1092 		 * MOVABLE zone is a really bad idea, and conflicts with CMA.
1093 		 * See comments above new_inode() why this is required _and_
1094 		 * expected if you're going to pin these pages.
1095 		 */
1096 		mapping_set_gfp_mask(obj->filp->f_mapping, GFP_HIGHUSER);
1097 	}
1098 
1099 	mutex_lock(&priv->mm_lock);
1100 	list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
1101 	mutex_unlock(&priv->mm_lock);
1102 
1103 	return obj;
1104 
1105 fail:
1106 	if (struct_mutex_locked) {
1107 		drm_gem_object_put_locked(obj);
1108 	} else {
1109 		drm_gem_object_put(obj);
1110 	}
1111 	return ERR_PTR(ret);
1112 }
1113 
1114 struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
1115 		uint32_t size, uint32_t flags)
1116 {
1117 	return _msm_gem_new(dev, size, flags, true);
1118 }
1119 
1120 struct drm_gem_object *msm_gem_new(struct drm_device *dev,
1121 		uint32_t size, uint32_t flags)
1122 {
1123 	return _msm_gem_new(dev, size, flags, false);
1124 }
1125 
1126 struct drm_gem_object *msm_gem_import(struct drm_device *dev,
1127 		struct dma_buf *dmabuf, struct sg_table *sgt)
1128 {
1129 	struct msm_drm_private *priv = dev->dev_private;
1130 	struct msm_gem_object *msm_obj;
1131 	struct drm_gem_object *obj;
1132 	uint32_t size;
1133 	int ret, npages;
1134 
1135 	/* if we don't have IOMMU, don't bother pretending we can import: */
1136 	if (!msm_use_mmu(dev)) {
1137 		DRM_DEV_ERROR(dev->dev, "cannot import without IOMMU\n");
1138 		return ERR_PTR(-EINVAL);
1139 	}
1140 
1141 	size = PAGE_ALIGN(dmabuf->size);
1142 
1143 	ret = msm_gem_new_impl(dev, size, MSM_BO_WC, &obj);
1144 	if (ret)
1145 		goto fail;
1146 
1147 	drm_gem_private_object_init(dev, obj, size);
1148 
1149 	npages = size / PAGE_SIZE;
1150 
1151 	msm_obj = to_msm_bo(obj);
1152 	msm_gem_lock(obj);
1153 	msm_obj->sgt = sgt;
1154 	msm_obj->pages = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
1155 	if (!msm_obj->pages) {
1156 		msm_gem_unlock(obj);
1157 		ret = -ENOMEM;
1158 		goto fail;
1159 	}
1160 
1161 	ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
1162 	if (ret) {
1163 		msm_gem_unlock(obj);
1164 		goto fail;
1165 	}
1166 
1167 	msm_gem_unlock(obj);
1168 
1169 	mutex_lock(&priv->mm_lock);
1170 	list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
1171 	mutex_unlock(&priv->mm_lock);
1172 
1173 	return obj;
1174 
1175 fail:
1176 	drm_gem_object_put(obj);
1177 	return ERR_PTR(ret);
1178 }
1179 
1180 static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
1181 		uint32_t flags, struct msm_gem_address_space *aspace,
1182 		struct drm_gem_object **bo, uint64_t *iova, bool locked)
1183 {
1184 	void *vaddr;
1185 	struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
1186 	int ret;
1187 
1188 	if (IS_ERR(obj))
1189 		return ERR_CAST(obj);
1190 
1191 	if (iova) {
1192 		ret = msm_gem_get_and_pin_iova(obj, aspace, iova);
1193 		if (ret)
1194 			goto err;
1195 	}
1196 
1197 	vaddr = msm_gem_get_vaddr(obj);
1198 	if (IS_ERR(vaddr)) {
1199 		msm_gem_unpin_iova(obj, aspace);
1200 		ret = PTR_ERR(vaddr);
1201 		goto err;
1202 	}
1203 
1204 	if (bo)
1205 		*bo = obj;
1206 
1207 	return vaddr;
1208 err:
1209 	if (locked)
1210 		drm_gem_object_put_locked(obj);
1211 	else
1212 		drm_gem_object_put(obj);
1213 
1214 	return ERR_PTR(ret);
1215 
1216 }
1217 
1218 void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
1219 		uint32_t flags, struct msm_gem_address_space *aspace,
1220 		struct drm_gem_object **bo, uint64_t *iova)
1221 {
1222 	return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
1223 }
1224 
1225 void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
1226 		uint32_t flags, struct msm_gem_address_space *aspace,
1227 		struct drm_gem_object **bo, uint64_t *iova)
1228 {
1229 	return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);
1230 }
1231 
1232 void msm_gem_kernel_put(struct drm_gem_object *bo,
1233 		struct msm_gem_address_space *aspace, bool locked)
1234 {
1235 	if (IS_ERR_OR_NULL(bo))
1236 		return;
1237 
1238 	msm_gem_put_vaddr(bo);
1239 	msm_gem_unpin_iova(bo, aspace);
1240 
1241 	if (locked)
1242 		drm_gem_object_put_locked(bo);
1243 	else
1244 		drm_gem_object_put(bo);
1245 }
1246 
1247 void msm_gem_object_set_name(struct drm_gem_object *bo, const char *fmt, ...)
1248 {
1249 	struct msm_gem_object *msm_obj = to_msm_bo(bo);
1250 	va_list ap;
1251 
1252 	if (!fmt)
1253 		return;
1254 
1255 	va_start(ap, fmt);
1256 	vsnprintf(msm_obj->name, sizeof(msm_obj->name), fmt, ap);
1257 	va_end(ap);
1258 }
1259