blob: 2453d126947056cc70b432a0b9b4a38d732a539a [file] [log] [blame]
Hareesh Gundu525f63e2019-09-18 13:35:26 +05301/* Copyright (c) 2002,2007-2019, The Linux Foundation. All rights reserved.
Shrenuj Bansala419c792016-10-20 14:05:11 -07002 *
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License version 2 and
5 * only version 2 as published by the Free Software Foundation.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 */
13
14#include <linux/export.h>
15#include <linux/vmalloc.h>
16#include <asm/cacheflush.h>
17#include <linux/slab.h>
18#include <linux/kmemleak.h>
19#include <linux/highmem.h>
20#include <linux/scatterlist.h>
21#include <soc/qcom/scm.h>
22#include <soc/qcom/secure_buffer.h>
Deepak Kumarf1ffe202017-06-21 13:12:33 +053023#include <linux/ratelimit.h>
Shrenuj Bansala419c792016-10-20 14:05:11 -070024
25#include "kgsl.h"
26#include "kgsl_sharedmem.h"
27#include "kgsl_device.h"
28#include "kgsl_log.h"
29#include "kgsl_mmu.h"
Shrenuj Bansala419c792016-10-20 14:05:11 -070030
31/*
32 * The user can set this from debugfs to force failed memory allocations to
33 * fail without trying OOM first. This is a debug setting useful for
34 * stress applications that want to test failure cases without pushing the
35 * system into unrecoverable OOM panics
36 */
37
38static bool sharedmem_noretry_flag;
39
40static DEFINE_MUTEX(kernel_map_global_lock);
41
42struct cp2_mem_chunks {
43 unsigned int chunk_list;
44 unsigned int chunk_list_size;
45 unsigned int chunk_size;
46} __attribute__ ((__packed__));
47
48struct cp2_lock_req {
49 struct cp2_mem_chunks chunks;
50 unsigned int mem_usage;
51 unsigned int lock;
52} __attribute__ ((__packed__));
53
54#define MEM_PROTECT_LOCK_ID2 0x0A
55#define MEM_PROTECT_LOCK_ID2_FLAT 0x11
56
57/* An attribute for showing per-process memory statistics */
58struct kgsl_mem_entry_attribute {
59 struct attribute attr;
60 int memtype;
61 ssize_t (*show)(struct kgsl_process_private *priv,
62 int type, char *buf);
63};
64
65#define to_mem_entry_attr(a) \
66container_of(a, struct kgsl_mem_entry_attribute, attr)
67
68#define __MEM_ENTRY_ATTR(_type, _name, _show) \
69{ \
70 .attr = { .name = __stringify(_name), .mode = 0444 }, \
71 .memtype = _type, \
72 .show = _show, \
73}
74
75/*
76 * A structure to hold the attributes for a particular memory type.
77 * For each memory type in each process we store the current and maximum
78 * memory usage and display the counts in sysfs. This structure and
79 * the following macro allow us to simplify the definition for those
80 * adding new memory types
81 */
82
83struct mem_entry_stats {
84 int memtype;
85 struct kgsl_mem_entry_attribute attr;
86 struct kgsl_mem_entry_attribute max_attr;
87};
88
89
90#define MEM_ENTRY_STAT(_type, _name) \
91{ \
92 .memtype = _type, \
93 .attr = __MEM_ENTRY_ATTR(_type, _name, mem_entry_show), \
94 .max_attr = __MEM_ENTRY_ATTR(_type, _name##_max, \
95 mem_entry_max_show), \
96}
97
98static void kgsl_cma_unlock_secure(struct kgsl_memdesc *memdesc);
99
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530100static ssize_t
101imported_mem_show(struct kgsl_process_private *priv,
102 int type, char *buf)
103{
104 struct kgsl_mem_entry *entry;
105 uint64_t imported_mem = 0;
106 int id = 0;
107
108 spin_lock(&priv->mem_lock);
109 for (entry = idr_get_next(&priv->mem_idr, &id); entry;
110 id++, entry = idr_get_next(&priv->mem_idr, &id)) {
111
112 int egl_surface_count = 0, egl_image_count = 0;
Deepak Kumar2df15222018-05-15 10:09:29 +0530113 struct kgsl_memdesc *m = &entry->memdesc;
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530114
Deepak Kumar2df15222018-05-15 10:09:29 +0530115 if ((kgsl_memdesc_usermem_type(m) != KGSL_MEM_ENTRY_ION) ||
116 entry->pending_free || (kgsl_mem_entry_get(entry) == 0))
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530117 continue;
118 spin_unlock(&priv->mem_lock);
119
Deepak Kumar2df15222018-05-15 10:09:29 +0530120 kgsl_get_egl_counts(entry, &egl_surface_count,
121 &egl_image_count);
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530122
Deepak Kumar2df15222018-05-15 10:09:29 +0530123 if (kgsl_memdesc_get_memtype(m) ==
124 KGSL_MEMTYPE_EGL_SURFACE)
125 imported_mem += m->size;
126 else if (egl_surface_count == 0) {
127 uint64_t size = m->size;
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530128
Deepak Kumar2df15222018-05-15 10:09:29 +0530129 do_div(size, (egl_image_count ?
130 egl_image_count : 1));
131 imported_mem += size;
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530132 }
133
134 kgsl_mem_entry_put(entry);
135 spin_lock(&priv->mem_lock);
136 }
137 spin_unlock(&priv->mem_lock);
138
139 return scnprintf(buf, PAGE_SIZE, "%llu\n", imported_mem);
140}
141
142static ssize_t
143gpumem_mapped_show(struct kgsl_process_private *priv,
144 int type, char *buf)
145{
146 return scnprintf(buf, PAGE_SIZE, "%llu\n",
147 priv->gpumem_mapped);
148}
149
150static ssize_t
151gpumem_unmapped_show(struct kgsl_process_private *priv, int type, char *buf)
152{
153 if (priv->gpumem_mapped > priv->stats[type].cur)
154 return -EIO;
155
156 return scnprintf(buf, PAGE_SIZE, "%llu\n",
157 priv->stats[type].cur - priv->gpumem_mapped);
158}
159
160static struct kgsl_mem_entry_attribute debug_memstats[] = {
161 __MEM_ENTRY_ATTR(0, imported_mem, imported_mem_show),
162 __MEM_ENTRY_ATTR(0, gpumem_mapped, gpumem_mapped_show),
163 __MEM_ENTRY_ATTR(KGSL_MEM_ENTRY_KERNEL, gpumem_unmapped,
164 gpumem_unmapped_show),
165};
166
Shrenuj Bansala419c792016-10-20 14:05:11 -0700167/**
168 * Show the current amount of memory allocated for the given memtype
169 */
170
171static ssize_t
172mem_entry_show(struct kgsl_process_private *priv, int type, char *buf)
173{
174 return snprintf(buf, PAGE_SIZE, "%llu\n", priv->stats[type].cur);
175}
176
177/**
178 * Show the maximum memory allocated for the given memtype through the life of
179 * the process
180 */
181
182static ssize_t
183mem_entry_max_show(struct kgsl_process_private *priv, int type, char *buf)
184{
185 return snprintf(buf, PAGE_SIZE, "%llu\n", priv->stats[type].max);
186}
187
188static ssize_t mem_entry_sysfs_show(struct kobject *kobj,
189 struct attribute *attr, char *buf)
190{
191 struct kgsl_mem_entry_attribute *pattr = to_mem_entry_attr(attr);
192 struct kgsl_process_private *priv;
193 ssize_t ret;
194
195 /*
Lynus Vaza8590632017-11-15 19:55:01 +0530196 * kgsl_process_init_sysfs takes a refcount to the process_private,
197 * which is put when the kobj is released. This implies that priv will
198 * not be freed until this function completes, and no further locking
199 * is needed.
Shrenuj Bansala419c792016-10-20 14:05:11 -0700200 */
201 priv = kobj ? container_of(kobj, struct kgsl_process_private, kobj) :
202 NULL;
203
204 if (priv && pattr->show)
205 ret = pattr->show(priv, pattr->memtype, buf);
206 else
207 ret = -EIO;
208
209 return ret;
210}
211
Lynus Vaza8590632017-11-15 19:55:01 +0530212static void mem_entry_release(struct kobject *kobj)
213{
214 struct kgsl_process_private *priv;
215
216 priv = container_of(kobj, struct kgsl_process_private, kobj);
217 /* Put the refcount we got in kgsl_process_init_sysfs */
218 kgsl_process_private_put(priv);
219}
220
Shrenuj Bansala419c792016-10-20 14:05:11 -0700221static const struct sysfs_ops mem_entry_sysfs_ops = {
222 .show = mem_entry_sysfs_show,
223};
224
225static struct kobj_type ktype_mem_entry = {
226 .sysfs_ops = &mem_entry_sysfs_ops,
Lynus Vaza8590632017-11-15 19:55:01 +0530227 .release = &mem_entry_release,
Shrenuj Bansala419c792016-10-20 14:05:11 -0700228};
229
230static struct mem_entry_stats mem_stats[] = {
231 MEM_ENTRY_STAT(KGSL_MEM_ENTRY_KERNEL, kernel),
232 MEM_ENTRY_STAT(KGSL_MEM_ENTRY_USER, user),
233#ifdef CONFIG_ION
234 MEM_ENTRY_STAT(KGSL_MEM_ENTRY_ION, ion),
235#endif
236};
237
238void
239kgsl_process_uninit_sysfs(struct kgsl_process_private *private)
240{
241 int i;
242
243 for (i = 0; i < ARRAY_SIZE(mem_stats); i++) {
244 sysfs_remove_file(&private->kobj, &mem_stats[i].attr.attr);
245 sysfs_remove_file(&private->kobj,
246 &mem_stats[i].max_attr.attr);
247 }
248
249 kobject_put(&private->kobj);
Shrenuj Bansala419c792016-10-20 14:05:11 -0700250}
251
252/**
253 * kgsl_process_init_sysfs() - Initialize and create sysfs files for a process
254 *
255 * @device: Pointer to kgsl device struct
256 * @private: Pointer to the structure for the process
257 *
258 * kgsl_process_init_sysfs() is called at the time of creating the
259 * process struct when a process opens the kgsl device for the first time.
260 * This function creates the sysfs files for the process.
261 */
262void kgsl_process_init_sysfs(struct kgsl_device *device,
263 struct kgsl_process_private *private)
264{
265 unsigned char name[16];
266 int i;
267
268 /* Keep private valid until the sysfs enries are removed. */
269 kgsl_process_private_get(private);
270
Archana Sriramd66ae7b2020-10-18 23:34:04 +0530271 snprintf(name, sizeof(name), "%d", pid_nr(private->pid));
Shrenuj Bansala419c792016-10-20 14:05:11 -0700272
273 if (kobject_init_and_add(&private->kobj, &ktype_mem_entry,
274 kgsl_driver.prockobj, name)) {
275 WARN(1, "Unable to add sysfs dir '%s'\n", name);
276 return;
277 }
278
279 for (i = 0; i < ARRAY_SIZE(mem_stats); i++) {
280 if (sysfs_create_file(&private->kobj,
281 &mem_stats[i].attr.attr))
282 WARN(1, "Couldn't create sysfs file '%s'\n",
283 mem_stats[i].attr.attr.name);
284
285 if (sysfs_create_file(&private->kobj,
286 &mem_stats[i].max_attr.attr))
287 WARN(1, "Couldn't create sysfs file '%s'\n",
288 mem_stats[i].max_attr.attr.name);
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530289 }
Shrenuj Bansala419c792016-10-20 14:05:11 -0700290
Amit Kushwaha7c843c22018-04-09 20:41:14 +0530291 for (i = 0; i < ARRAY_SIZE(debug_memstats); i++) {
292 if (sysfs_create_file(&private->kobj,
293 &debug_memstats[i].attr))
294 WARN(1, "Couldn't create sysfs file '%s'\n",
295 debug_memstats[i].attr.name);
Shrenuj Bansala419c792016-10-20 14:05:11 -0700296 }
297}
298
299static ssize_t kgsl_drv_memstat_show(struct device *dev,
300 struct device_attribute *attr,
301 char *buf)
302{
303 uint64_t val = 0;
304
305 if (!strcmp(attr->attr.name, "vmalloc"))
306 val = atomic_long_read(&kgsl_driver.stats.vmalloc);
307 else if (!strcmp(attr->attr.name, "vmalloc_max"))
308 val = atomic_long_read(&kgsl_driver.stats.vmalloc_max);
309 else if (!strcmp(attr->attr.name, "page_alloc"))
310 val = atomic_long_read(&kgsl_driver.stats.page_alloc);
311 else if (!strcmp(attr->attr.name, "page_alloc_max"))
312 val = atomic_long_read(&kgsl_driver.stats.page_alloc_max);
313 else if (!strcmp(attr->attr.name, "coherent"))
314 val = atomic_long_read(&kgsl_driver.stats.coherent);
315 else if (!strcmp(attr->attr.name, "coherent_max"))
316 val = atomic_long_read(&kgsl_driver.stats.coherent_max);
317 else if (!strcmp(attr->attr.name, "secure"))
318 val = atomic_long_read(&kgsl_driver.stats.secure);
319 else if (!strcmp(attr->attr.name, "secure_max"))
320 val = atomic_long_read(&kgsl_driver.stats.secure_max);
321 else if (!strcmp(attr->attr.name, "mapped"))
322 val = atomic_long_read(&kgsl_driver.stats.mapped);
323 else if (!strcmp(attr->attr.name, "mapped_max"))
324 val = atomic_long_read(&kgsl_driver.stats.mapped_max);
325
326 return snprintf(buf, PAGE_SIZE, "%llu\n", val);
327}
328
329static ssize_t kgsl_drv_full_cache_threshold_store(struct device *dev,
330 struct device_attribute *attr,
331 const char *buf, size_t count)
332{
333 int ret;
334 unsigned int thresh = 0;
335
336 ret = kgsl_sysfs_store(buf, &thresh);
337 if (ret)
338 return ret;
339
340 kgsl_driver.full_cache_threshold = thresh;
341 return count;
342}
343
344static ssize_t kgsl_drv_full_cache_threshold_show(struct device *dev,
345 struct device_attribute *attr,
346 char *buf)
347{
348 return snprintf(buf, PAGE_SIZE, "%d\n",
349 kgsl_driver.full_cache_threshold);
350}
351
352static DEVICE_ATTR(vmalloc, 0444, kgsl_drv_memstat_show, NULL);
353static DEVICE_ATTR(vmalloc_max, 0444, kgsl_drv_memstat_show, NULL);
354static DEVICE_ATTR(page_alloc, 0444, kgsl_drv_memstat_show, NULL);
355static DEVICE_ATTR(page_alloc_max, 0444, kgsl_drv_memstat_show, NULL);
356static DEVICE_ATTR(coherent, 0444, kgsl_drv_memstat_show, NULL);
357static DEVICE_ATTR(coherent_max, 0444, kgsl_drv_memstat_show, NULL);
358static DEVICE_ATTR(secure, 0444, kgsl_drv_memstat_show, NULL);
359static DEVICE_ATTR(secure_max, 0444, kgsl_drv_memstat_show, NULL);
360static DEVICE_ATTR(mapped, 0444, kgsl_drv_memstat_show, NULL);
361static DEVICE_ATTR(mapped_max, 0444, kgsl_drv_memstat_show, NULL);
362static DEVICE_ATTR(full_cache_threshold, 0644,
363 kgsl_drv_full_cache_threshold_show,
364 kgsl_drv_full_cache_threshold_store);
365
366static const struct device_attribute *drv_attr_list[] = {
367 &dev_attr_vmalloc,
368 &dev_attr_vmalloc_max,
369 &dev_attr_page_alloc,
370 &dev_attr_page_alloc_max,
371 &dev_attr_coherent,
372 &dev_attr_coherent_max,
373 &dev_attr_secure,
374 &dev_attr_secure_max,
375 &dev_attr_mapped,
376 &dev_attr_mapped_max,
377 &dev_attr_full_cache_threshold,
378 NULL
379};
380
381void
382kgsl_sharedmem_uninit_sysfs(void)
383{
384 kgsl_remove_device_sysfs_files(&kgsl_driver.virtdev, drv_attr_list);
385}
386
387int
388kgsl_sharedmem_init_sysfs(void)
389{
390 return kgsl_create_device_sysfs_files(&kgsl_driver.virtdev,
391 drv_attr_list);
392}
393
394static int kgsl_cma_alloc_secure(struct kgsl_device *device,
395 struct kgsl_memdesc *memdesc, uint64_t size);
396
397static int kgsl_allocate_secure(struct kgsl_device *device,
398 struct kgsl_memdesc *memdesc,
399 uint64_t size) {
400 int ret;
401
402 if (MMU_FEATURE(&device->mmu, KGSL_MMU_HYP_SECURE_ALLOC))
403 ret = kgsl_sharedmem_page_alloc_user(memdesc, size);
404 else
405 ret = kgsl_cma_alloc_secure(device, memdesc, size);
406
407 return ret;
408}
409
410int kgsl_allocate_user(struct kgsl_device *device,
411 struct kgsl_memdesc *memdesc,
412 uint64_t size, uint64_t flags)
413{
414 int ret;
415
Lynus Vaz90d98b52018-04-09 14:45:36 +0530416 kgsl_memdesc_init(device, memdesc, flags);
Shrenuj Bansala419c792016-10-20 14:05:11 -0700417
418 if (kgsl_mmu_get_mmutype(device) == KGSL_MMU_TYPE_NONE)
419 ret = kgsl_sharedmem_alloc_contig(device, memdesc, size);
420 else if (flags & KGSL_MEMFLAGS_SECURE)
421 ret = kgsl_allocate_secure(device, memdesc, size);
422 else
423 ret = kgsl_sharedmem_page_alloc_user(memdesc, size);
424
425 return ret;
426}
427
428static int kgsl_page_alloc_vmfault(struct kgsl_memdesc *memdesc,
429 struct vm_area_struct *vma,
430 struct vm_fault *vmf)
431{
432 int pgoff;
433 unsigned int offset;
434
435 offset = ((unsigned long) vmf->virtual_address - vma->vm_start);
436
437 if (offset >= memdesc->size)
438 return VM_FAULT_SIGBUS;
439
440 pgoff = offset >> PAGE_SHIFT;
441
442 if (pgoff < memdesc->page_count) {
443 struct page *page = memdesc->pages[pgoff];
444
445 get_page(page);
446 vmf->page = page;
447
Shrenuj Bansala419c792016-10-20 14:05:11 -0700448 return 0;
449 }
450
451 return VM_FAULT_SIGBUS;
452}
453
454/*
455 * kgsl_page_alloc_unmap_kernel() - Unmap the memory in memdesc
456 *
457 * @memdesc: The memory descriptor which contains information about the memory
458 *
459 * Unmaps the memory mapped into kernel address space
460 */
461static void kgsl_page_alloc_unmap_kernel(struct kgsl_memdesc *memdesc)
462{
463 mutex_lock(&kernel_map_global_lock);
464 if (!memdesc->hostptr) {
465 /* If already unmapped the refcount should be 0 */
466 WARN_ON(memdesc->hostptr_count);
467 goto done;
468 }
469 memdesc->hostptr_count--;
470 if (memdesc->hostptr_count)
471 goto done;
472 vunmap(memdesc->hostptr);
473
474 atomic_long_sub(memdesc->size, &kgsl_driver.stats.vmalloc);
475 memdesc->hostptr = NULL;
476done:
477 mutex_unlock(&kernel_map_global_lock);
478}
479
480static void kgsl_page_alloc_free(struct kgsl_memdesc *memdesc)
481{
482 kgsl_page_alloc_unmap_kernel(memdesc);
483 /* we certainly do not expect the hostptr to still be mapped */
484 BUG_ON(memdesc->hostptr);
485
486 /* Secure buffers need to be unlocked before being freed */
487 if (memdesc->priv & KGSL_MEMDESC_TZ_LOCKED) {
488 int ret;
489 int dest_perms = PERM_READ | PERM_WRITE | PERM_EXEC;
490 int source_vm = VMID_CP_PIXEL;
491 int dest_vm = VMID_HLOS;
492
493 ret = hyp_assign_table(memdesc->sgt, &source_vm, 1,
494 &dest_vm, &dest_perms, 1);
495 if (ret) {
496 pr_err("Secure buf unlock failed: gpuaddr: %llx size: %llx ret: %d\n",
497 memdesc->gpuaddr, memdesc->size, ret);
498 BUG();
499 }
500
501 atomic_long_sub(memdesc->size, &kgsl_driver.stats.secure);
502 } else {
503 atomic_long_sub(memdesc->size, &kgsl_driver.stats.page_alloc);
504 }
505
506 if (memdesc->priv & KGSL_MEMDESC_TZ_LOCKED) {
507 struct sg_page_iter sg_iter;
508
509 for_each_sg_page(memdesc->sgt->sgl, &sg_iter,
510 memdesc->sgt->nents, 0)
511 ClearPagePrivate(sg_page_iter_page(&sg_iter));
512
513 }
514
515 /* Free pages using the pages array for non secure paged memory */
516 if (memdesc->pages != NULL)
517 kgsl_pool_free_pages(memdesc->pages, memdesc->page_count);
518 else
519 kgsl_pool_free_sgt(memdesc->sgt);
520
521}
522
523/*
524 * kgsl_page_alloc_map_kernel - Map the memory in memdesc to kernel address
525 * space
526 *
527 * @memdesc - The memory descriptor which contains information about the memory
528 *
529 * Return: 0 on success else error code
530 */
531static int kgsl_page_alloc_map_kernel(struct kgsl_memdesc *memdesc)
532{
533 int ret = 0;
534
535 /* Sanity check - don't map more than we could possibly chew */
536 if (memdesc->size > ULONG_MAX)
537 return -ENOMEM;
538
539 mutex_lock(&kernel_map_global_lock);
540 if ((!memdesc->hostptr) && (memdesc->pages != NULL)) {
541 pgprot_t page_prot = pgprot_writecombine(PAGE_KERNEL);
542
543 memdesc->hostptr = vmap(memdesc->pages, memdesc->page_count,
544 VM_IOREMAP, page_prot);
545 if (memdesc->hostptr)
546 KGSL_STATS_ADD(memdesc->size,
547 &kgsl_driver.stats.vmalloc,
548 &kgsl_driver.stats.vmalloc_max);
549 else
550 ret = -ENOMEM;
551 }
552 if (memdesc->hostptr)
553 memdesc->hostptr_count++;
554
555 mutex_unlock(&kernel_map_global_lock);
556
557 return ret;
558}
559
560static int kgsl_contiguous_vmfault(struct kgsl_memdesc *memdesc,
561 struct vm_area_struct *vma,
562 struct vm_fault *vmf)
563{
564 unsigned long offset, pfn;
565 int ret;
566
567 offset = ((unsigned long) vmf->virtual_address - vma->vm_start) >>
568 PAGE_SHIFT;
569
570 pfn = (memdesc->physaddr >> PAGE_SHIFT) + offset;
571 ret = vm_insert_pfn(vma, (unsigned long) vmf->virtual_address, pfn);
572
573 if (ret == -ENOMEM || ret == -EAGAIN)
574 return VM_FAULT_OOM;
575 else if (ret == -EFAULT)
576 return VM_FAULT_SIGBUS;
577
Shrenuj Bansala419c792016-10-20 14:05:11 -0700578 return VM_FAULT_NOPAGE;
579}
580
581static void kgsl_cma_coherent_free(struct kgsl_memdesc *memdesc)
582{
583 unsigned long attrs = 0;
584
585 if (memdesc->hostptr) {
586 if (memdesc->priv & KGSL_MEMDESC_SECURE) {
587 atomic_long_sub(memdesc->size,
588 &kgsl_driver.stats.secure);
589
590 kgsl_cma_unlock_secure(memdesc);
Hareesh Gundu525f63e2019-09-18 13:35:26 +0530591 attrs = memdesc->attrs;
Shrenuj Bansala419c792016-10-20 14:05:11 -0700592 } else
593 atomic_long_sub(memdesc->size,
594 &kgsl_driver.stats.coherent);
595
596 dma_free_attrs(memdesc->dev, (size_t) memdesc->size,
597 memdesc->hostptr, memdesc->physaddr, attrs);
598 }
599}
600
601/* Global */
602static struct kgsl_memdesc_ops kgsl_page_alloc_ops = {
603 .free = kgsl_page_alloc_free,
604 .vmflags = VM_DONTDUMP | VM_DONTEXPAND | VM_DONTCOPY,
605 .vmfault = kgsl_page_alloc_vmfault,
606 .map_kernel = kgsl_page_alloc_map_kernel,
607 .unmap_kernel = kgsl_page_alloc_unmap_kernel,
608};
609
610/* CMA ops - used during NOMMU mode */
611static struct kgsl_memdesc_ops kgsl_cma_ops = {
612 .free = kgsl_cma_coherent_free,
613 .vmflags = VM_DONTDUMP | VM_PFNMAP | VM_DONTEXPAND | VM_DONTCOPY,
614 .vmfault = kgsl_contiguous_vmfault,
615};
616
617#ifdef CONFIG_ARM64
618/*
619 * For security reasons, ARMv8 doesn't allow invalidate only on read-only
620 * mapping. It would be performance prohibitive to read the permissions on
621 * the buffer before the operation. Every use case that we have found does not
622 * assume that an invalidate operation is invalidate only, so we feel
623 * comfortable turning invalidates into flushes for these targets
624 */
625static inline unsigned int _fixup_cache_range_op(unsigned int op)
626{
627 if (op == KGSL_CACHE_OP_INV)
628 return KGSL_CACHE_OP_FLUSH;
629 return op;
630}
631#else
632static inline unsigned int _fixup_cache_range_op(unsigned int op)
633{
634 return op;
635}
636#endif
637
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530638static inline void _cache_op(unsigned int op,
639 const void *start, const void *end)
640{
641 /*
642 * The dmac_xxx_range functions handle addresses and sizes that
643 * are not aligned to the cacheline size correctly.
644 */
645 switch (_fixup_cache_range_op(op)) {
646 case KGSL_CACHE_OP_FLUSH:
647 dmac_flush_range(start, end);
648 break;
649 case KGSL_CACHE_OP_CLEAN:
650 dmac_clean_range(start, end);
651 break;
652 case KGSL_CACHE_OP_INV:
653 dmac_inv_range(start, end);
654 break;
655 }
656}
657
658static int kgsl_do_cache_op(struct page *page, void *addr,
659 uint64_t offset, uint64_t size, unsigned int op)
660{
661 if (page != NULL) {
662 unsigned long pfn = page_to_pfn(page) + offset / PAGE_SIZE;
663 /*
664 * page_address() returns the kernel virtual address of page.
665 * For high memory kernel virtual address exists only if page
666 * has been mapped. So use a version of kmap rather than
667 * page_address() for high memory.
668 */
669 if (PageHighMem(page)) {
670 offset &= ~PAGE_MASK;
671
672 do {
673 unsigned int len = size;
674
675 if (len + offset > PAGE_SIZE)
676 len = PAGE_SIZE - offset;
677
678 page = pfn_to_page(pfn++);
679 addr = kmap_atomic(page);
680 _cache_op(op, addr + offset,
681 addr + offset + len);
682 kunmap_atomic(addr);
683
684 size -= len;
685 offset = 0;
686 } while (size);
687
688 return 0;
689 }
690
691 addr = page_address(page);
692 }
693
694 _cache_op(op, addr + offset, addr + offset + (size_t) size);
695 return 0;
696}
697
Shrenuj Bansala419c792016-10-20 14:05:11 -0700698int kgsl_cache_range_op(struct kgsl_memdesc *memdesc, uint64_t offset,
699 uint64_t size, unsigned int op)
700{
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530701 void *addr = NULL;
Deepak Kumarcbadd1f2017-05-23 13:13:35 +0530702 struct sg_table *sgt = NULL;
703 struct scatterlist *sg;
704 unsigned int i, pos = 0;
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530705 int ret = 0;
Shrenuj Bansala419c792016-10-20 14:05:11 -0700706
707 if (size == 0 || size > UINT_MAX)
708 return -EINVAL;
709
710 /* Make sure that the offset + size does not overflow */
711 if ((offset + size < offset) || (offset + size < size))
712 return -ERANGE;
713
Shrenuj Bansala419c792016-10-20 14:05:11 -0700714 /* Check that offset+length does not exceed memdesc->size */
715 if (offset + size > memdesc->size)
716 return -ERANGE;
717
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530718 if (memdesc->hostptr) {
719 addr = memdesc->hostptr;
720 /* Make sure the offset + size do not overflow the address */
721 if (addr + ((size_t) offset + (size_t) size) < addr)
722 return -ERANGE;
Shrenuj Bansala419c792016-10-20 14:05:11 -0700723
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530724 ret = kgsl_do_cache_op(NULL, addr, offset, size, op);
725 return ret;
Shrenuj Bansala419c792016-10-20 14:05:11 -0700726 }
727
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530728 /*
729 * If the buffer is not to mapped to kernel, perform cache
730 * operations after mapping to kernel.
731 */
Deepak Kumarcbadd1f2017-05-23 13:13:35 +0530732 if (memdesc->sgt != NULL)
733 sgt = memdesc->sgt;
734 else {
735 if (memdesc->pages == NULL)
736 return ret;
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530737
Deepak Kumarcbadd1f2017-05-23 13:13:35 +0530738 sgt = kgsl_alloc_sgt_from_pages(memdesc);
739 if (IS_ERR(sgt))
740 return PTR_ERR(sgt);
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530741 }
Deepak Kumarcbadd1f2017-05-23 13:13:35 +0530742
743 for_each_sg(sgt->sgl, sg, sgt->nents, i) {
744 uint64_t sg_offset, sg_left;
745
746 if (offset >= (pos + sg->length)) {
747 pos += sg->length;
748 continue;
749 }
750 sg_offset = offset > pos ? offset - pos : 0;
751 sg_left = (sg->length - sg_offset > size) ? size :
752 sg->length - sg_offset;
753 ret = kgsl_do_cache_op(sg_page(sg), NULL, sg_offset,
754 sg_left, op);
755 size -= sg_left;
756 if (size == 0)
757 break;
758 pos += sg->length;
759 }
760
761 if (memdesc->sgt == NULL)
762 kgsl_free_sgt(sgt);
763
Hareesh Gundu2e943a32017-04-21 15:38:13 +0530764 return ret;
Shrenuj Bansala419c792016-10-20 14:05:11 -0700765}
766EXPORT_SYMBOL(kgsl_cache_range_op);
767
Lynus Vaz90d98b52018-04-09 14:45:36 +0530768void kgsl_memdesc_init(struct kgsl_device *device,
769 struct kgsl_memdesc *memdesc, uint64_t flags)
770{
771 struct kgsl_mmu *mmu = &device->mmu;
772 unsigned int align;
773
774 memset(memdesc, 0, sizeof(*memdesc));
775 /* Turn off SVM if the system doesn't support it */
776 if (!kgsl_mmu_use_cpu_map(mmu))
777 flags &= ~((uint64_t) KGSL_MEMFLAGS_USE_CPU_MAP);
778
779 /* Secure memory disables advanced addressing modes */
780 if (flags & KGSL_MEMFLAGS_SECURE)
781 flags &= ~((uint64_t) KGSL_MEMFLAGS_USE_CPU_MAP);
782
783 /* Disable IO coherence if it is not supported on the chip */
784 if (!MMU_FEATURE(mmu, KGSL_MMU_IO_COHERENT))
785 flags &= ~((uint64_t) KGSL_MEMFLAGS_IOCOHERENT);
786
787 if (MMU_FEATURE(mmu, KGSL_MMU_NEED_GUARD_PAGE))
788 memdesc->priv |= KGSL_MEMDESC_GUARD_PAGE;
789
790 if (flags & KGSL_MEMFLAGS_SECURE)
791 memdesc->priv |= KGSL_MEMDESC_SECURE;
792
793 memdesc->flags = flags;
794 memdesc->dev = device->dev->parent;
795
796 align = max_t(unsigned int,
797 (memdesc->flags & KGSL_MEMALIGN_MASK) >> KGSL_MEMALIGN_SHIFT,
798 ilog2(PAGE_SIZE));
799 kgsl_memdesc_set_align(memdesc, align);
800}
801
Shrenuj Bansala419c792016-10-20 14:05:11 -0700802int
803kgsl_sharedmem_page_alloc_user(struct kgsl_memdesc *memdesc,
804 uint64_t size)
805{
806 int ret = 0;
807 unsigned int j, page_size, len_alloc;
808 unsigned int pcount = 0;
809 size_t len;
810 unsigned int align;
811
Deepak Kumarf1ffe202017-06-21 13:12:33 +0530812 static DEFINE_RATELIMIT_STATE(_rs,
813 DEFAULT_RATELIMIT_INTERVAL,
814 DEFAULT_RATELIMIT_BURST);
815
Shrenuj Bansala419c792016-10-20 14:05:11 -0700816 size = PAGE_ALIGN(size);
817 if (size == 0 || size > UINT_MAX)
818 return -EINVAL;
819
820 align = (memdesc->flags & KGSL_MEMALIGN_MASK) >> KGSL_MEMALIGN_SHIFT;
821
Deepak Kumarc71e9ca2018-03-14 17:04:53 +0530822 /*
823 * As 1MB is the max supported page size, use the alignment
824 * corresponding to 1MB page to make sure higher order pages
825 * are used if possible for a given memory size. Also, we
826 * don't need to update alignment in memdesc flags in case
827 * higher order page is used, as memdesc flags represent the
828 * virtual alignment specified by the user which is anyways
829 * getting satisfied.
830 */
831 if (align < ilog2(SZ_1M))
832 align = ilog2(SZ_1M);
833
Hareesh Gunduf32a49f2016-11-21 19:18:29 +0530834 page_size = kgsl_get_page_size(size, align);
Shrenuj Bansala419c792016-10-20 14:05:11 -0700835
836 /*
837 * The alignment cannot be less than the intended page size - it can be
838 * larger however to accommodate hardware quirks
839 */
840
841 if (align < ilog2(page_size)) {
842 kgsl_memdesc_set_align(memdesc, ilog2(page_size));
843 align = ilog2(page_size);
844 }
845
846 /*
847 * There needs to be enough room in the page array to be able to
848 * service the allocation entirely with PAGE_SIZE sized chunks
849 */
850
851 len_alloc = PAGE_ALIGN(size) >> PAGE_SHIFT;
852
853 memdesc->ops = &kgsl_page_alloc_ops;
854
855 /*
856 * Allocate space to store the list of pages. This is an array of
857 * pointers so we can track 1024 pages per page of allocation.
858 * Keep this array around for non global non secure buffers that
859 * are allocated by kgsl. This helps with improving the vm fault
860 * routine by finding the faulted page in constant time.
861 */
862
863 memdesc->pages = kgsl_malloc(len_alloc * sizeof(struct page *));
Lynus Vazae902682017-06-21 12:09:37 +0530864 memdesc->page_count = 0;
865 memdesc->size = 0;
Shrenuj Bansala419c792016-10-20 14:05:11 -0700866
867 if (memdesc->pages == NULL) {
868 ret = -ENOMEM;
869 goto done;
870 }
871
872 len = size;
873
874 while (len > 0) {
875 int page_count;
876
877 page_count = kgsl_pool_alloc_page(&page_size,
878 memdesc->pages + pcount,
879 len_alloc - pcount,
880 &align);
881 if (page_count <= 0) {
882 if (page_count == -EAGAIN)
883 continue;
884
885 /*
886 * Update sglen and memdesc size,as requested allocation
887 * not served fully. So that they can be correctly freed
888 * in kgsl_sharedmem_free().
889 */
890 memdesc->size = (size - len);
891
Deepak Kumarf1ffe202017-06-21 13:12:33 +0530892 if (sharedmem_noretry_flag != true &&
893 __ratelimit(&_rs))
Shrenuj Bansala419c792016-10-20 14:05:11 -0700894 KGSL_CORE_ERR(
895 "Out of memory: only allocated %lldKB of %lldKB requested\n",
896 (size - len) >> 10, size >> 10);
897
898 ret = -ENOMEM;
899 goto done;
900 }
901
902 pcount += page_count;
903 len -= page_size;
904 memdesc->size += page_size;
905 memdesc->page_count += page_count;
906
907 /* Get the needed page size for the next iteration */
Hareesh Gunduf32a49f2016-11-21 19:18:29 +0530908 page_size = kgsl_get_page_size(len, align);
Shrenuj Bansala419c792016-10-20 14:05:11 -0700909 }
910
911 /* Call to the hypervisor to lock any secure buffer allocations */
912 if (memdesc->flags & KGSL_MEMFLAGS_SECURE) {
913 unsigned int i;
914 struct scatterlist *sg;
915 int dest_perms = PERM_READ | PERM_WRITE;
916 int source_vm = VMID_HLOS;
917 int dest_vm = VMID_CP_PIXEL;
918
919 memdesc->sgt = kmalloc(sizeof(struct sg_table), GFP_KERNEL);
920 if (memdesc->sgt == NULL) {
921 ret = -ENOMEM;
922 goto done;
923 }
924
925 ret = sg_alloc_table_from_pages(memdesc->sgt, memdesc->pages,
926 memdesc->page_count, 0, memdesc->size, GFP_KERNEL);
927 if (ret) {
928 kfree(memdesc->sgt);
929 goto done;
930 }
931
932 ret = hyp_assign_table(memdesc->sgt, &source_vm, 1,
933 &dest_vm, &dest_perms, 1);
934 if (ret) {
935 sg_free_table(memdesc->sgt);
936 kfree(memdesc->sgt);
937 memdesc->sgt = NULL;
938 goto done;
939 }
940
941 /* Set private bit for each sg to indicate that its secured */
942 for_each_sg(memdesc->sgt->sgl, sg, memdesc->sgt->nents, i)
943 SetPagePrivate(sg_page(sg));
944
945 memdesc->priv |= KGSL_MEMDESC_TZ_LOCKED;
946
947 /* Record statistics */
948 KGSL_STATS_ADD(memdesc->size, &kgsl_driver.stats.secure,
949 &kgsl_driver.stats.secure_max);
950
951 /*
952 * We don't need the array for secure buffers because they are
953 * not mapped to CPU
954 */
955 kgsl_free(memdesc->pages);
956 memdesc->pages = NULL;
957 memdesc->page_count = 0;
958
959 /* Don't map and zero the locked secure buffer */
960 goto done;
961 }
962
963 KGSL_STATS_ADD(memdesc->size, &kgsl_driver.stats.page_alloc,
964 &kgsl_driver.stats.page_alloc_max);
965
966done:
967 if (ret) {
968 if (memdesc->pages) {
969 unsigned int count = 1;
970
971 for (j = 0; j < pcount; j += count) {
972 count = 1 << compound_order(memdesc->pages[j]);
973 kgsl_pool_free_page(memdesc->pages[j]);
974 }
975 }
976
977 kgsl_free(memdesc->pages);
978 memset(memdesc, 0, sizeof(*memdesc));
979 }
980
981 return ret;
982}
983
984void kgsl_sharedmem_free(struct kgsl_memdesc *memdesc)
985{
986 if (memdesc == NULL || memdesc->size == 0)
987 return;
988
989 /* Make sure the memory object has been unmapped */
990 kgsl_mmu_put_gpuaddr(memdesc);
991
992 if (memdesc->ops && memdesc->ops->free)
993 memdesc->ops->free(memdesc);
994
995 if (memdesc->sgt) {
996 sg_free_table(memdesc->sgt);
997 kfree(memdesc->sgt);
998 }
999
1000 if (memdesc->pages)
1001 kgsl_free(memdesc->pages);
Shrenuj Bansala419c792016-10-20 14:05:11 -07001002}
1003EXPORT_SYMBOL(kgsl_sharedmem_free);
1004
1005int
1006kgsl_sharedmem_readl(const struct kgsl_memdesc *memdesc,
1007 uint32_t *dst,
1008 uint64_t offsetbytes)
1009{
1010 uint32_t *src;
1011
1012 if (WARN_ON(memdesc == NULL || memdesc->hostptr == NULL ||
1013 dst == NULL))
1014 return -EINVAL;
1015
1016 WARN_ON(offsetbytes % sizeof(uint32_t) != 0);
1017 if (offsetbytes % sizeof(uint32_t) != 0)
1018 return -EINVAL;
1019
1020 WARN_ON(offsetbytes > (memdesc->size - sizeof(uint32_t)));
1021 if (offsetbytes > (memdesc->size - sizeof(uint32_t)))
1022 return -ERANGE;
1023
1024 /*
1025 * We are reading shared memory between CPU and GPU.
1026 * Make sure reads before this are complete
1027 */
1028 rmb();
1029 src = (uint32_t *)(memdesc->hostptr + offsetbytes);
1030 *dst = *src;
1031 return 0;
1032}
1033EXPORT_SYMBOL(kgsl_sharedmem_readl);
1034
1035int
1036kgsl_sharedmem_writel(struct kgsl_device *device,
1037 const struct kgsl_memdesc *memdesc,
1038 uint64_t offsetbytes,
1039 uint32_t src)
1040{
1041 uint32_t *dst;
1042
1043 if (WARN_ON(memdesc == NULL || memdesc->hostptr == NULL))
1044 return -EINVAL;
1045
1046 WARN_ON(offsetbytes % sizeof(uint32_t) != 0);
1047 if (offsetbytes % sizeof(uint32_t) != 0)
1048 return -EINVAL;
1049
1050 WARN_ON(offsetbytes > (memdesc->size - sizeof(uint32_t)));
1051 if (offsetbytes > (memdesc->size - sizeof(uint32_t)))
1052 return -ERANGE;
1053 dst = (uint32_t *)(memdesc->hostptr + offsetbytes);
1054 *dst = src;
1055
1056 /*
1057 * We are writing to shared memory between CPU and GPU.
1058 * Make sure write above is posted immediately
1059 */
1060 wmb();
1061
1062 return 0;
1063}
1064EXPORT_SYMBOL(kgsl_sharedmem_writel);
1065
1066int
1067kgsl_sharedmem_readq(const struct kgsl_memdesc *memdesc,
1068 uint64_t *dst,
1069 uint64_t offsetbytes)
1070{
1071 uint64_t *src;
1072
1073 if (WARN_ON(memdesc == NULL || memdesc->hostptr == NULL ||
1074 dst == NULL))
1075 return -EINVAL;
1076
1077 WARN_ON(offsetbytes % sizeof(uint32_t) != 0);
1078 if (offsetbytes % sizeof(uint32_t) != 0)
1079 return -EINVAL;
1080
1081 WARN_ON(offsetbytes > (memdesc->size - sizeof(uint32_t)));
1082 if (offsetbytes > (memdesc->size - sizeof(uint32_t)))
1083 return -ERANGE;
1084
1085 /*
1086 * We are reading shared memory between CPU and GPU.
1087 * Make sure reads before this are complete
1088 */
1089 rmb();
1090 src = (uint64_t *)(memdesc->hostptr + offsetbytes);
1091 *dst = *src;
1092 return 0;
1093}
1094EXPORT_SYMBOL(kgsl_sharedmem_readq);
1095
1096int
1097kgsl_sharedmem_writeq(struct kgsl_device *device,
1098 const struct kgsl_memdesc *memdesc,
1099 uint64_t offsetbytes,
1100 uint64_t src)
1101{
1102 uint64_t *dst;
1103
1104 if (WARN_ON(memdesc == NULL || memdesc->hostptr == NULL))
1105 return -EINVAL;
1106
1107 WARN_ON(offsetbytes % sizeof(uint32_t) != 0);
1108 if (offsetbytes % sizeof(uint32_t) != 0)
1109 return -EINVAL;
1110
1111 WARN_ON(offsetbytes > (memdesc->size - sizeof(uint32_t)));
1112 if (offsetbytes > (memdesc->size - sizeof(uint32_t)))
1113 return -ERANGE;
1114 dst = (uint64_t *)(memdesc->hostptr + offsetbytes);
1115 *dst = src;
1116
1117 /*
1118 * We are writing to shared memory between CPU and GPU.
1119 * Make sure write above is posted immediately
1120 */
1121 wmb();
1122
1123 return 0;
1124}
1125EXPORT_SYMBOL(kgsl_sharedmem_writeq);
1126
1127int
1128kgsl_sharedmem_set(struct kgsl_device *device,
1129 const struct kgsl_memdesc *memdesc, uint64_t offsetbytes,
1130 unsigned int value, uint64_t sizebytes)
1131{
1132 if (WARN_ON(memdesc == NULL || memdesc->hostptr == NULL))
1133 return -EINVAL;
1134
1135 if (WARN_ON(offsetbytes + sizebytes > memdesc->size))
1136 return -EINVAL;
1137
1138 memset(memdesc->hostptr + offsetbytes, value, sizebytes);
1139 return 0;
1140}
1141EXPORT_SYMBOL(kgsl_sharedmem_set);
1142
1143static const char * const memtype_str[] = {
1144 [KGSL_MEMTYPE_OBJECTANY] = "any(0)",
1145 [KGSL_MEMTYPE_FRAMEBUFFER] = "framebuffer",
1146 [KGSL_MEMTYPE_RENDERBUFFER] = "renderbuffer",
1147 [KGSL_MEMTYPE_ARRAYBUFFER] = "arraybuffer",
1148 [KGSL_MEMTYPE_ELEMENTARRAYBUFFER] = "elementarraybuffer",
1149 [KGSL_MEMTYPE_VERTEXARRAYBUFFER] = "vertexarraybuffer",
1150 [KGSL_MEMTYPE_TEXTURE] = "texture",
1151 [KGSL_MEMTYPE_SURFACE] = "surface",
1152 [KGSL_MEMTYPE_EGL_SURFACE] = "egl_surface",
1153 [KGSL_MEMTYPE_GL] = "gl",
1154 [KGSL_MEMTYPE_CL] = "cl",
1155 [KGSL_MEMTYPE_CL_BUFFER_MAP] = "cl_buffer_map",
1156 [KGSL_MEMTYPE_CL_BUFFER_NOMAP] = "cl_buffer_nomap",
1157 [KGSL_MEMTYPE_CL_IMAGE_MAP] = "cl_image_map",
1158 [KGSL_MEMTYPE_CL_IMAGE_NOMAP] = "cl_image_nomap",
1159 [KGSL_MEMTYPE_CL_KERNEL_STACK] = "cl_kernel_stack",
1160 [KGSL_MEMTYPE_COMMAND] = "command",
1161 [KGSL_MEMTYPE_2D] = "2d",
1162 [KGSL_MEMTYPE_EGL_IMAGE] = "egl_image",
1163 [KGSL_MEMTYPE_EGL_SHADOW] = "egl_shadow",
1164 [KGSL_MEMTYPE_MULTISAMPLE] = "egl_multisample",
1165 /* KGSL_MEMTYPE_KERNEL handled below, to avoid huge array */
1166};
1167
1168void kgsl_get_memory_usage(char *name, size_t name_size, uint64_t memflags)
1169{
1170 unsigned int type = MEMFLAGS(memflags, KGSL_MEMTYPE_MASK,
1171 KGSL_MEMTYPE_SHIFT);
1172
1173 if (type == KGSL_MEMTYPE_KERNEL)
1174 strlcpy(name, "kernel", name_size);
1175 else if (type < ARRAY_SIZE(memtype_str) && memtype_str[type] != NULL)
1176 strlcpy(name, memtype_str[type], name_size);
1177 else
Young Hwan Kwak8cc418d2017-09-07 16:29:27 +08001178 snprintf(name, name_size, "VK/others(%3d)", type);
Shrenuj Bansala419c792016-10-20 14:05:11 -07001179}
1180EXPORT_SYMBOL(kgsl_get_memory_usage);
1181
1182int kgsl_sharedmem_alloc_contig(struct kgsl_device *device,
1183 struct kgsl_memdesc *memdesc, uint64_t size)
1184{
1185 int result = 0;
1186
1187 size = PAGE_ALIGN(size);
1188 if (size == 0 || size > SIZE_MAX)
1189 return -EINVAL;
1190
1191 memdesc->size = size;
1192 memdesc->ops = &kgsl_cma_ops;
1193 memdesc->dev = device->dev->parent;
1194
1195 memdesc->hostptr = dma_alloc_attrs(memdesc->dev, (size_t) size,
1196 &memdesc->physaddr, GFP_KERNEL, 0);
1197
1198 if (memdesc->hostptr == NULL) {
1199 result = -ENOMEM;
1200 goto err;
1201 }
1202
1203 result = memdesc_sg_dma(memdesc, memdesc->physaddr, size);
1204 if (result)
1205 goto err;
1206
1207 /* Record statistics */
1208
1209 if (kgsl_mmu_get_mmutype(device) == KGSL_MMU_TYPE_NONE)
1210 memdesc->gpuaddr = memdesc->physaddr;
1211
1212 KGSL_STATS_ADD(size, &kgsl_driver.stats.coherent,
1213 &kgsl_driver.stats.coherent_max);
1214
1215err:
1216 if (result)
1217 kgsl_sharedmem_free(memdesc);
1218
1219 return result;
1220}
1221EXPORT_SYMBOL(kgsl_sharedmem_alloc_contig);
1222
1223static int scm_lock_chunk(struct kgsl_memdesc *memdesc, int lock)
1224{
1225 struct cp2_lock_req request;
1226 unsigned int resp;
1227 unsigned int *chunk_list;
1228 struct scm_desc desc = {0};
1229 int result;
1230
1231 /*
1232 * Flush the virt addr range before sending the memory to the
1233 * secure environment to ensure the data is actually present
1234 * in RAM
1235 *
1236 * Chunk_list holds the physical address of secure memory.
1237 * Pass in the virtual address of chunk_list to flush.
1238 * Chunk_list size is 1 because secure memory is physically
1239 * contiguous.
1240 */
1241 chunk_list = kzalloc(sizeof(unsigned int), GFP_KERNEL);
1242 if (!chunk_list)
1243 return -ENOMEM;
1244
1245 chunk_list[0] = memdesc->physaddr;
1246 dmac_flush_range((void *)chunk_list, (void *)chunk_list + 1);
1247
1248 request.chunks.chunk_list = virt_to_phys(chunk_list);
1249 /*
1250 * virt_to_phys(chunk_list) may be an address > 4GB. It is guaranteed
1251 * that when using scm_call (the older interface), the phys addresses
1252 * will be restricted to below 4GB.
1253 */
1254 desc.args[0] = virt_to_phys(chunk_list);
1255 desc.args[1] = request.chunks.chunk_list_size = 1;
1256 desc.args[2] = request.chunks.chunk_size = (unsigned int) memdesc->size;
1257 desc.args[3] = request.mem_usage = 0;
1258 desc.args[4] = request.lock = lock;
1259 desc.args[5] = 0;
1260 desc.arginfo = SCM_ARGS(6, SCM_RW, SCM_VAL, SCM_VAL, SCM_VAL, SCM_VAL,
1261 SCM_VAL);
1262 kmap_flush_unused();
1263 kmap_atomic_flush_unused();
1264 if (!is_scm_armv8()) {
1265 result = scm_call(SCM_SVC_MP, MEM_PROTECT_LOCK_ID2,
1266 &request, sizeof(request), &resp, sizeof(resp));
1267 } else {
1268 result = scm_call2(SCM_SIP_FNID(SCM_SVC_MP,
1269 MEM_PROTECT_LOCK_ID2_FLAT), &desc);
1270 resp = desc.ret[0];
1271 }
1272
1273 kfree(chunk_list);
1274 return result;
1275}
1276
1277static int kgsl_cma_alloc_secure(struct kgsl_device *device,
1278 struct kgsl_memdesc *memdesc, uint64_t size)
1279{
1280 struct kgsl_iommu *iommu = KGSL_IOMMU_PRIV(device);
1281 int result = 0;
1282 size_t aligned;
1283
1284 /* Align size to 1M boundaries */
1285 aligned = ALIGN(size, SZ_1M);
1286
1287 /* The SCM call uses an unsigned int for the size */
1288 if (aligned == 0 || aligned > UINT_MAX)
1289 return -EINVAL;
1290
1291 /*
1292 * If there is more than a page gap between the requested size and the
1293 * aligned size we don't need to add more memory for a guard page. Yay!
1294 */
1295
1296 if (memdesc->priv & KGSL_MEMDESC_GUARD_PAGE)
1297 if (aligned - size >= SZ_4K)
1298 memdesc->priv &= ~KGSL_MEMDESC_GUARD_PAGE;
1299
1300 memdesc->size = aligned;
1301 memdesc->ops = &kgsl_cma_ops;
1302 memdesc->dev = iommu->ctx[KGSL_IOMMU_CONTEXT_SECURE].dev;
1303
1304 memdesc->attrs |= DMA_ATTR_STRONGLY_ORDERED;
1305
1306 memdesc->hostptr = dma_alloc_attrs(memdesc->dev, aligned,
1307 &memdesc->physaddr, GFP_KERNEL, memdesc->attrs);
1308
1309 if (memdesc->hostptr == NULL) {
1310 result = -ENOMEM;
1311 goto err;
1312 }
1313
1314 result = memdesc_sg_dma(memdesc, memdesc->physaddr, aligned);
1315 if (result)
1316 goto err;
1317
1318 result = scm_lock_chunk(memdesc, 1);
1319
1320 if (result != 0)
1321 goto err;
1322
1323 /* Set the private bit to indicate that we've secured this */
1324 SetPagePrivate(sg_page(memdesc->sgt->sgl));
1325
1326 memdesc->priv |= KGSL_MEMDESC_TZ_LOCKED;
1327
1328 /* Record statistics */
1329 KGSL_STATS_ADD(aligned, &kgsl_driver.stats.secure,
1330 &kgsl_driver.stats.secure_max);
1331err:
1332 if (result)
1333 kgsl_sharedmem_free(memdesc);
1334
1335 return result;
1336}
1337
1338/**
1339 * kgsl_cma_unlock_secure() - Unlock secure memory by calling TZ
1340 * @memdesc: memory descriptor
1341 */
1342static void kgsl_cma_unlock_secure(struct kgsl_memdesc *memdesc)
1343{
1344 if (memdesc->size == 0 || !(memdesc->priv & KGSL_MEMDESC_TZ_LOCKED))
1345 return;
1346
1347 if (!scm_lock_chunk(memdesc, 0))
1348 ClearPagePrivate(sg_page(memdesc->sgt->sgl));
1349}
1350
1351void kgsl_sharedmem_set_noretry(bool val)
1352{
1353 sharedmem_noretry_flag = val;
1354}
1355
1356bool kgsl_sharedmem_get_noretry(void)
1357{
1358 return sharedmem_noretry_flag;
1359}