2 * Copyright (C) 2013 Red Hat
3 * Author: Rob Clark <robdclark@gmail.com>
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 as published by
7 * the Free Software Foundation.
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * You should have received a copy of the GNU General Public License along with
15 * this program. If not, see <http://www.gnu.org/licenses/>.
18 #include <linux/spinlock.h>
19 #include <linux/shmem_fs.h>
20 #include <linux/dma-buf.h>
21 #include <linux/pfn_t.h>
24 #include "msm_fence.h"
29 static void msm_gem_vunmap_locked(struct drm_gem_object *obj);
32 static dma_addr_t physaddr(struct drm_gem_object *obj)
34 struct msm_gem_object *msm_obj = to_msm_bo(obj);
35 struct msm_drm_private *priv = obj->dev->dev_private;
36 return (((dma_addr_t)msm_obj->vram_node->start) << PAGE_SHIFT) +
40 static bool use_pages(struct drm_gem_object *obj)
42 struct msm_gem_object *msm_obj = to_msm_bo(obj);
43 return !msm_obj->vram_node;
46 /* allocate pages from VRAM carveout, used when no IOMMU: */
47 static struct page **get_pages_vram(struct drm_gem_object *obj, int npages)
49 struct msm_gem_object *msm_obj = to_msm_bo(obj);
50 struct msm_drm_private *priv = obj->dev->dev_private;
55 p = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
57 return ERR_PTR(-ENOMEM);
59 spin_lock(&priv->vram.lock);
60 ret = drm_mm_insert_node(&priv->vram.mm, msm_obj->vram_node, npages);
61 spin_unlock(&priv->vram.lock);
67 paddr = physaddr(obj);
68 for (i = 0; i < npages; i++) {
69 p[i] = phys_to_page(paddr);
76 static struct page **get_pages(struct drm_gem_object *obj)
78 struct msm_gem_object *msm_obj = to_msm_bo(obj);
80 if (!msm_obj->pages) {
81 struct drm_device *dev = obj->dev;
83 int npages = obj->size >> PAGE_SHIFT;
86 p = drm_gem_get_pages(obj);
88 p = get_pages_vram(obj, npages);
91 dev_err(dev->dev, "could not get pages: %ld\n",
96 msm_obj->sgt = drm_prime_pages_to_sg(p, npages);
97 if (IS_ERR(msm_obj->sgt)) {
98 dev_err(dev->dev, "failed to allocate sgt\n");
99 return ERR_CAST(msm_obj->sgt);
104 /* For non-cached buffers, ensure the new pages are clean
105 * because display controller, GPU, etc. are not coherent:
107 if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
108 dma_map_sg(dev->dev, msm_obj->sgt->sgl,
109 msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
112 return msm_obj->pages;
115 static void put_pages_vram(struct drm_gem_object *obj)
117 struct msm_gem_object *msm_obj = to_msm_bo(obj);
118 struct msm_drm_private *priv = obj->dev->dev_private;
120 spin_lock(&priv->vram.lock);
121 drm_mm_remove_node(msm_obj->vram_node);
122 spin_unlock(&priv->vram.lock);
124 kvfree(msm_obj->pages);
127 static void put_pages(struct drm_gem_object *obj)
129 struct msm_gem_object *msm_obj = to_msm_bo(obj);
131 if (msm_obj->pages) {
132 /* For non-cached buffers, ensure the new pages are clean
133 * because display controller, GPU, etc. are not coherent:
135 if (msm_obj->flags & (MSM_BO_WC|MSM_BO_UNCACHED))
136 dma_unmap_sg(obj->dev->dev, msm_obj->sgt->sgl,
137 msm_obj->sgt->nents, DMA_BIDIRECTIONAL);
138 sg_free_table(msm_obj->sgt);
142 drm_gem_put_pages(obj, msm_obj->pages, true, false);
146 msm_obj->pages = NULL;
150 struct page **msm_gem_get_pages(struct drm_gem_object *obj)
152 struct msm_gem_object *msm_obj = to_msm_bo(obj);
155 mutex_lock(&msm_obj->lock);
157 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
158 mutex_unlock(&msm_obj->lock);
159 return ERR_PTR(-EBUSY);
163 mutex_unlock(&msm_obj->lock);
167 void msm_gem_put_pages(struct drm_gem_object *obj)
169 /* when we start tracking the pin count, then do something here */
172 int msm_gem_mmap_obj(struct drm_gem_object *obj,
173 struct vm_area_struct *vma)
175 struct msm_gem_object *msm_obj = to_msm_bo(obj);
177 vma->vm_flags &= ~VM_PFNMAP;
178 vma->vm_flags |= VM_MIXEDMAP;
180 if (msm_obj->flags & MSM_BO_WC) {
181 vma->vm_page_prot = pgprot_writecombine(vm_get_page_prot(vma->vm_flags));
182 } else if (msm_obj->flags & MSM_BO_UNCACHED) {
183 vma->vm_page_prot = pgprot_noncached(vm_get_page_prot(vma->vm_flags));
186 * Shunt off cached objs to shmem file so they have their own
187 * address_space (so unmap_mapping_range does what we want,
188 * in particular in the case of mmap'd dmabufs)
193 vma->vm_file = obj->filp;
195 vma->vm_page_prot = vm_get_page_prot(vma->vm_flags);
201 int msm_gem_mmap(struct file *filp, struct vm_area_struct *vma)
205 ret = drm_gem_mmap(filp, vma);
207 DBG("mmap failed: %d", ret);
211 return msm_gem_mmap_obj(vma->vm_private_data, vma);
214 int msm_gem_fault(struct vm_fault *vmf)
216 struct vm_area_struct *vma = vmf->vma;
217 struct drm_gem_object *obj = vma->vm_private_data;
218 struct msm_gem_object *msm_obj = to_msm_bo(obj);
225 * vm_ops.open/drm_gem_mmap_obj and close get and put
226 * a reference on obj. So, we dont need to hold one here.
228 ret = mutex_lock_interruptible(&msm_obj->lock);
232 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
233 mutex_unlock(&msm_obj->lock);
234 return VM_FAULT_SIGBUS;
237 /* make sure we have pages attached now */
238 pages = get_pages(obj);
240 ret = PTR_ERR(pages);
244 /* We don't use vmf->pgoff since that has the fake offset: */
245 pgoff = (vmf->address - vma->vm_start) >> PAGE_SHIFT;
247 pfn = page_to_pfn(pages[pgoff]);
249 VERB("Inserting %p pfn %lx, pa %lx", (void *)vmf->address,
250 pfn, pfn << PAGE_SHIFT);
252 ret = vm_insert_mixed(vma, vmf->address, __pfn_to_pfn_t(pfn, PFN_DEV));
255 mutex_unlock(&msm_obj->lock);
264 * EBUSY is ok: this just means that another thread
265 * already did the job.
267 return VM_FAULT_NOPAGE;
271 return VM_FAULT_SIGBUS;
275 /** get mmap offset */
276 static uint64_t mmap_offset(struct drm_gem_object *obj)
278 struct drm_device *dev = obj->dev;
279 struct msm_gem_object *msm_obj = to_msm_bo(obj);
282 WARN_ON(!mutex_is_locked(&msm_obj->lock));
284 /* Make it mmapable */
285 ret = drm_gem_create_mmap_offset(obj);
288 dev_err(dev->dev, "could not allocate mmap offset\n");
292 return drm_vma_node_offset_addr(&obj->vma_node);
295 uint64_t msm_gem_mmap_offset(struct drm_gem_object *obj)
298 struct msm_gem_object *msm_obj = to_msm_bo(obj);
300 mutex_lock(&msm_obj->lock);
301 offset = mmap_offset(obj);
302 mutex_unlock(&msm_obj->lock);
306 static struct msm_gem_vma *add_vma(struct drm_gem_object *obj,
307 struct msm_gem_address_space *aspace)
309 struct msm_gem_object *msm_obj = to_msm_bo(obj);
310 struct msm_gem_vma *vma;
312 WARN_ON(!mutex_is_locked(&msm_obj->lock));
314 vma = kzalloc(sizeof(*vma), GFP_KERNEL);
316 return ERR_PTR(-ENOMEM);
318 vma->aspace = aspace;
320 list_add_tail(&vma->list, &msm_obj->vmas);
325 static struct msm_gem_vma *lookup_vma(struct drm_gem_object *obj,
326 struct msm_gem_address_space *aspace)
328 struct msm_gem_object *msm_obj = to_msm_bo(obj);
329 struct msm_gem_vma *vma;
331 WARN_ON(!mutex_is_locked(&msm_obj->lock));
333 list_for_each_entry(vma, &msm_obj->vmas, list) {
334 if (vma->aspace == aspace)
341 static void del_vma(struct msm_gem_vma *vma)
346 list_del(&vma->list);
350 /* Called with msm_obj->lock locked */
352 put_iova(struct drm_gem_object *obj)
354 struct msm_gem_object *msm_obj = to_msm_bo(obj);
355 struct msm_gem_vma *vma, *tmp;
357 WARN_ON(!mutex_is_locked(&msm_obj->lock));
359 list_for_each_entry_safe(vma, tmp, &msm_obj->vmas, list) {
360 msm_gem_unmap_vma(vma->aspace, vma, msm_obj->sgt);
365 /* get iova, taking a reference. Should have a matching put */
366 int msm_gem_get_iova(struct drm_gem_object *obj,
367 struct msm_gem_address_space *aspace, uint64_t *iova)
369 struct msm_gem_object *msm_obj = to_msm_bo(obj);
370 struct msm_gem_vma *vma;
373 mutex_lock(&msm_obj->lock);
375 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
376 mutex_unlock(&msm_obj->lock);
380 vma = lookup_vma(obj, aspace);
385 vma = add_vma(obj, aspace);
391 pages = get_pages(obj);
393 ret = PTR_ERR(pages);
397 ret = msm_gem_map_vma(aspace, vma, msm_obj->sgt,
398 obj->size >> PAGE_SHIFT);
405 mutex_unlock(&msm_obj->lock);
411 mutex_unlock(&msm_obj->lock);
415 /* get iova without taking a reference, used in places where you have
416 * already done a 'msm_gem_get_iova()'.
418 uint64_t msm_gem_iova(struct drm_gem_object *obj,
419 struct msm_gem_address_space *aspace)
421 struct msm_gem_object *msm_obj = to_msm_bo(obj);
422 struct msm_gem_vma *vma;
424 mutex_lock(&msm_obj->lock);
425 vma = lookup_vma(obj, aspace);
426 mutex_unlock(&msm_obj->lock);
429 return vma ? vma->iova : 0;
432 void msm_gem_put_iova(struct drm_gem_object *obj,
433 struct msm_gem_address_space *aspace)
436 // NOTE: probably don't need a _locked() version.. we wouldn't
437 // normally unmap here, but instead just mark that it could be
438 // unmapped (if the iova refcnt drops to zero), but then later
439 // if another _get_iova_locked() fails we can start unmapping
440 // things that are no longer needed..
443 int msm_gem_dumb_create(struct drm_file *file, struct drm_device *dev,
444 struct drm_mode_create_dumb *args)
446 args->pitch = align_pitch(args->width, args->bpp);
447 args->size = PAGE_ALIGN(args->pitch * args->height);
448 return msm_gem_new_handle(dev, file, args->size,
449 MSM_BO_SCANOUT | MSM_BO_WC, &args->handle);
452 int msm_gem_dumb_map_offset(struct drm_file *file, struct drm_device *dev,
453 uint32_t handle, uint64_t *offset)
455 struct drm_gem_object *obj;
458 /* GEM does all our handle to object mapping */
459 obj = drm_gem_object_lookup(file, handle);
465 *offset = msm_gem_mmap_offset(obj);
467 drm_gem_object_unreference_unlocked(obj);
473 void *msm_gem_get_vaddr(struct drm_gem_object *obj)
475 struct msm_gem_object *msm_obj = to_msm_bo(obj);
478 mutex_lock(&msm_obj->lock);
480 if (WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED)) {
481 mutex_unlock(&msm_obj->lock);
482 return ERR_PTR(-EBUSY);
485 /* increment vmap_count *before* vmap() call, so shrinker can
486 * check vmap_count (is_vunmapable()) outside of msm_obj->lock.
487 * This guarantees that we won't try to msm_gem_vunmap() this
488 * same object from within the vmap() call (while we already
489 * hold msm_obj->lock)
491 msm_obj->vmap_count++;
493 if (!msm_obj->vaddr) {
494 struct page **pages = get_pages(obj);
496 ret = PTR_ERR(pages);
499 msm_obj->vaddr = vmap(pages, obj->size >> PAGE_SHIFT,
500 VM_MAP, pgprot_writecombine(PAGE_KERNEL));
501 if (msm_obj->vaddr == NULL) {
507 mutex_unlock(&msm_obj->lock);
508 return msm_obj->vaddr;
511 msm_obj->vmap_count--;
512 mutex_unlock(&msm_obj->lock);
516 void msm_gem_put_vaddr(struct drm_gem_object *obj)
518 struct msm_gem_object *msm_obj = to_msm_bo(obj);
520 mutex_lock(&msm_obj->lock);
521 WARN_ON(msm_obj->vmap_count < 1);
522 msm_obj->vmap_count--;
523 mutex_unlock(&msm_obj->lock);
526 /* Update madvise status, returns true if not purged, else
529 int msm_gem_madvise(struct drm_gem_object *obj, unsigned madv)
531 struct msm_gem_object *msm_obj = to_msm_bo(obj);
533 mutex_lock(&msm_obj->lock);
535 WARN_ON(!mutex_is_locked(&obj->dev->struct_mutex));
537 if (msm_obj->madv != __MSM_MADV_PURGED)
538 msm_obj->madv = madv;
540 madv = msm_obj->madv;
542 mutex_unlock(&msm_obj->lock);
544 return (madv != __MSM_MADV_PURGED);
547 void msm_gem_purge(struct drm_gem_object *obj, enum msm_gem_lock subclass)
549 struct drm_device *dev = obj->dev;
550 struct msm_gem_object *msm_obj = to_msm_bo(obj);
552 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
553 WARN_ON(!is_purgeable(msm_obj));
554 WARN_ON(obj->import_attach);
556 mutex_lock_nested(&msm_obj->lock, subclass);
560 msm_gem_vunmap_locked(obj);
564 msm_obj->madv = __MSM_MADV_PURGED;
566 drm_vma_node_unmap(&obj->vma_node, dev->anon_inode->i_mapping);
567 drm_gem_free_mmap_offset(obj);
569 /* Our goal here is to return as much of the memory as
570 * is possible back to the system as we are called from OOM.
571 * To do this we must instruct the shmfs to drop all of its
572 * backing pages, *now*.
574 shmem_truncate_range(file_inode(obj->filp), 0, (loff_t)-1);
576 invalidate_mapping_pages(file_inode(obj->filp)->i_mapping,
579 mutex_unlock(&msm_obj->lock);
582 static void msm_gem_vunmap_locked(struct drm_gem_object *obj)
584 struct msm_gem_object *msm_obj = to_msm_bo(obj);
586 WARN_ON(!mutex_is_locked(&msm_obj->lock));
588 if (!msm_obj->vaddr || WARN_ON(!is_vunmapable(msm_obj)))
591 vunmap(msm_obj->vaddr);
592 msm_obj->vaddr = NULL;
595 void msm_gem_vunmap(struct drm_gem_object *obj, enum msm_gem_lock subclass)
597 struct msm_gem_object *msm_obj = to_msm_bo(obj);
599 mutex_lock_nested(&msm_obj->lock, subclass);
600 msm_gem_vunmap_locked(obj);
601 mutex_unlock(&msm_obj->lock);
604 /* must be called before _move_to_active().. */
605 int msm_gem_sync_object(struct drm_gem_object *obj,
606 struct msm_fence_context *fctx, bool exclusive)
608 struct msm_gem_object *msm_obj = to_msm_bo(obj);
609 struct reservation_object_list *fobj;
610 struct dma_fence *fence;
613 fobj = reservation_object_get_list(msm_obj->resv);
614 if (!fobj || (fobj->shared_count == 0)) {
615 fence = reservation_object_get_excl(msm_obj->resv);
616 /* don't need to wait on our own fences, since ring is fifo */
617 if (fence && (fence->context != fctx->context)) {
618 ret = dma_fence_wait(fence, true);
624 if (!exclusive || !fobj)
627 for (i = 0; i < fobj->shared_count; i++) {
628 fence = rcu_dereference_protected(fobj->shared[i],
629 reservation_object_held(msm_obj->resv));
630 if (fence->context != fctx->context) {
631 ret = dma_fence_wait(fence, true);
640 void msm_gem_move_to_active(struct drm_gem_object *obj,
641 struct msm_gpu *gpu, bool exclusive, struct dma_fence *fence)
643 struct msm_gem_object *msm_obj = to_msm_bo(obj);
644 WARN_ON(msm_obj->madv != MSM_MADV_WILLNEED);
647 reservation_object_add_excl_fence(msm_obj->resv, fence);
649 reservation_object_add_shared_fence(msm_obj->resv, fence);
650 list_del_init(&msm_obj->mm_list);
651 list_add_tail(&msm_obj->mm_list, &gpu->active_list);
654 void msm_gem_move_to_inactive(struct drm_gem_object *obj)
656 struct drm_device *dev = obj->dev;
657 struct msm_drm_private *priv = dev->dev_private;
658 struct msm_gem_object *msm_obj = to_msm_bo(obj);
660 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
663 list_del_init(&msm_obj->mm_list);
664 list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
667 int msm_gem_cpu_prep(struct drm_gem_object *obj, uint32_t op, ktime_t *timeout)
669 struct msm_gem_object *msm_obj = to_msm_bo(obj);
670 bool write = !!(op & MSM_PREP_WRITE);
671 unsigned long remain =
672 op & MSM_PREP_NOSYNC ? 0 : timeout_to_jiffies(timeout);
675 ret = reservation_object_wait_timeout_rcu(msm_obj->resv, write,
678 return remain == 0 ? -EBUSY : -ETIMEDOUT;
682 /* TODO cache maintenance */
687 int msm_gem_cpu_fini(struct drm_gem_object *obj)
689 /* TODO cache maintenance */
693 #ifdef CONFIG_DEBUG_FS
694 static void describe_fence(struct dma_fence *fence, const char *type,
697 if (!dma_fence_is_signaled(fence))
698 seq_printf(m, "\t%9s: %s %s seq %u\n", type,
699 fence->ops->get_driver_name(fence),
700 fence->ops->get_timeline_name(fence),
704 void msm_gem_describe(struct drm_gem_object *obj, struct seq_file *m)
706 struct msm_gem_object *msm_obj = to_msm_bo(obj);
707 struct reservation_object *robj = msm_obj->resv;
708 struct reservation_object_list *fobj;
709 struct dma_fence *fence;
710 struct msm_gem_vma *vma;
711 uint64_t off = drm_vma_node_start(&obj->vma_node);
714 mutex_lock(&msm_obj->lock);
716 switch (msm_obj->madv) {
717 case __MSM_MADV_PURGED:
720 case MSM_MADV_DONTNEED:
723 case MSM_MADV_WILLNEED:
729 seq_printf(m, "%08x: %c %2d (%2d) %08llx %p\t",
730 msm_obj->flags, is_active(msm_obj) ? 'A' : 'I',
731 obj->name, kref_read(&obj->refcount),
732 off, msm_obj->vaddr);
734 /* FIXME: we need to print the address space here too */
735 list_for_each_entry(vma, &msm_obj->vmas, list)
736 seq_printf(m, " %08llx", vma->iova);
738 seq_printf(m, " %zu%s\n", obj->size, madv);
741 fobj = rcu_dereference(robj->fence);
743 unsigned int i, shared_count = fobj->shared_count;
745 for (i = 0; i < shared_count; i++) {
746 fence = rcu_dereference(fobj->shared[i]);
747 describe_fence(fence, "Shared", m);
751 fence = rcu_dereference(robj->fence_excl);
753 describe_fence(fence, "Exclusive", m);
756 mutex_unlock(&msm_obj->lock);
759 void msm_gem_describe_objects(struct list_head *list, struct seq_file *m)
761 struct msm_gem_object *msm_obj;
765 list_for_each_entry(msm_obj, list, mm_list) {
766 struct drm_gem_object *obj = &msm_obj->base;
768 msm_gem_describe(obj, m);
773 seq_printf(m, "Total %d objects, %zu bytes\n", count, size);
777 void msm_gem_free_object(struct drm_gem_object *obj)
779 struct drm_device *dev = obj->dev;
780 struct msm_gem_object *msm_obj = to_msm_bo(obj);
782 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
784 /* object should not be on active list: */
785 WARN_ON(is_active(msm_obj));
787 list_del(&msm_obj->mm_list);
789 mutex_lock(&msm_obj->lock);
793 if (obj->import_attach) {
795 dma_buf_vunmap(obj->import_attach->dmabuf, msm_obj->vaddr);
797 /* Don't drop the pages for imported dmabuf, as they are not
798 * ours, just free the array we allocated:
801 kvfree(msm_obj->pages);
803 drm_prime_gem_destroy(obj, msm_obj->sgt);
805 msm_gem_vunmap_locked(obj);
809 if (msm_obj->resv == &msm_obj->_resv)
810 reservation_object_fini(msm_obj->resv);
812 drm_gem_object_release(obj);
814 mutex_unlock(&msm_obj->lock);
818 /* convenience method to construct a GEM buffer object, and userspace handle */
819 int msm_gem_new_handle(struct drm_device *dev, struct drm_file *file,
820 uint32_t size, uint32_t flags, uint32_t *handle)
822 struct drm_gem_object *obj;
825 obj = msm_gem_new(dev, size, flags);
830 ret = drm_gem_handle_create(file, obj, handle);
832 /* drop reference from allocate - handle holds it now */
833 drm_gem_object_unreference_unlocked(obj);
838 static int msm_gem_new_impl(struct drm_device *dev,
839 uint32_t size, uint32_t flags,
840 struct reservation_object *resv,
841 struct drm_gem_object **obj,
842 bool struct_mutex_locked)
844 struct msm_drm_private *priv = dev->dev_private;
845 struct msm_gem_object *msm_obj;
847 switch (flags & MSM_BO_CACHE_MASK) {
848 case MSM_BO_UNCACHED:
853 dev_err(dev->dev, "invalid cache flag: %x\n",
854 (flags & MSM_BO_CACHE_MASK));
858 msm_obj = kzalloc(sizeof(*msm_obj), GFP_KERNEL);
862 mutex_init(&msm_obj->lock);
864 msm_obj->flags = flags;
865 msm_obj->madv = MSM_MADV_WILLNEED;
868 msm_obj->resv = resv;
870 msm_obj->resv = &msm_obj->_resv;
871 reservation_object_init(msm_obj->resv);
874 INIT_LIST_HEAD(&msm_obj->submit_entry);
875 INIT_LIST_HEAD(&msm_obj->vmas);
877 if (struct_mutex_locked) {
878 WARN_ON(!mutex_is_locked(&dev->struct_mutex));
879 list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
881 mutex_lock(&dev->struct_mutex);
882 list_add_tail(&msm_obj->mm_list, &priv->inactive_list);
883 mutex_unlock(&dev->struct_mutex);
886 *obj = &msm_obj->base;
891 static struct drm_gem_object *_msm_gem_new(struct drm_device *dev,
892 uint32_t size, uint32_t flags, bool struct_mutex_locked)
894 struct msm_drm_private *priv = dev->dev_private;
895 struct drm_gem_object *obj = NULL;
896 bool use_vram = false;
899 size = PAGE_ALIGN(size);
901 if (!iommu_present(&platform_bus_type))
903 else if ((flags & MSM_BO_STOLEN) && priv->vram.size)
906 if (WARN_ON(use_vram && !priv->vram.size))
907 return ERR_PTR(-EINVAL);
909 /* Disallow zero sized objects as they make the underlying
910 * infrastructure grumpy
913 return ERR_PTR(-EINVAL);
915 ret = msm_gem_new_impl(dev, size, flags, NULL, &obj, struct_mutex_locked);
920 struct msm_gem_vma *vma;
922 struct msm_gem_object *msm_obj = to_msm_bo(obj);
924 mutex_lock(&msm_obj->lock);
926 vma = add_vma(obj, NULL);
927 mutex_unlock(&msm_obj->lock);
933 to_msm_bo(obj)->vram_node = &vma->node;
935 drm_gem_private_object_init(dev, obj, size);
937 pages = get_pages(obj);
939 ret = PTR_ERR(pages);
943 vma->iova = physaddr(obj);
945 ret = drm_gem_object_init(dev, obj, size);
953 drm_gem_object_unreference_unlocked(obj);
957 struct drm_gem_object *msm_gem_new_locked(struct drm_device *dev,
958 uint32_t size, uint32_t flags)
960 return _msm_gem_new(dev, size, flags, true);
963 struct drm_gem_object *msm_gem_new(struct drm_device *dev,
964 uint32_t size, uint32_t flags)
966 return _msm_gem_new(dev, size, flags, false);
969 struct drm_gem_object *msm_gem_import(struct drm_device *dev,
970 struct dma_buf *dmabuf, struct sg_table *sgt)
972 struct msm_gem_object *msm_obj;
973 struct drm_gem_object *obj;
977 /* if we don't have IOMMU, don't bother pretending we can import: */
978 if (!iommu_present(&platform_bus_type)) {
979 dev_err(dev->dev, "cannot import without IOMMU\n");
980 return ERR_PTR(-EINVAL);
983 size = PAGE_ALIGN(dmabuf->size);
985 ret = msm_gem_new_impl(dev, size, MSM_BO_WC, dmabuf->resv, &obj, false);
989 drm_gem_private_object_init(dev, obj, size);
991 npages = size / PAGE_SIZE;
993 msm_obj = to_msm_bo(obj);
994 mutex_lock(&msm_obj->lock);
996 msm_obj->pages = kvmalloc_array(npages, sizeof(struct page *), GFP_KERNEL);
997 if (!msm_obj->pages) {
998 mutex_unlock(&msm_obj->lock);
1003 ret = drm_prime_sg_to_page_addr_arrays(sgt, msm_obj->pages, NULL, npages);
1005 mutex_unlock(&msm_obj->lock);
1009 mutex_unlock(&msm_obj->lock);
1013 drm_gem_object_unreference_unlocked(obj);
1014 return ERR_PTR(ret);
1017 static void *_msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
1018 uint32_t flags, struct msm_gem_address_space *aspace,
1019 struct drm_gem_object **bo, uint64_t *iova, bool locked)
1022 struct drm_gem_object *obj = _msm_gem_new(dev, size, flags, locked);
1026 return ERR_CAST(obj);
1029 ret = msm_gem_get_iova(obj, aspace, iova);
1031 drm_gem_object_unreference(obj);
1032 return ERR_PTR(ret);
1036 vaddr = msm_gem_get_vaddr(obj);
1037 if (IS_ERR(vaddr)) {
1038 msm_gem_put_iova(obj, aspace);
1039 drm_gem_object_unreference(obj);
1040 return ERR_CAST(vaddr);
1049 void *msm_gem_kernel_new(struct drm_device *dev, uint32_t size,
1050 uint32_t flags, struct msm_gem_address_space *aspace,
1051 struct drm_gem_object **bo, uint64_t *iova)
1053 return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, false);
1056 void *msm_gem_kernel_new_locked(struct drm_device *dev, uint32_t size,
1057 uint32_t flags, struct msm_gem_address_space *aspace,
1058 struct drm_gem_object **bo, uint64_t *iova)
1060 return _msm_gem_kernel_new(dev, size, flags, aspace, bo, iova, true);