2024-09-09 08:57:42 +00:00
|
|
|
/* Copyright (c) 2012-2015, The Linux Foundation. All rights reserved.
|
2024-09-09 08:52:07 +00:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License version 2 and
|
|
|
|
* only version 2 as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
#include <asm/dma-iommu.h>
|
|
|
|
#include <linux/dma-attrs.h>
|
|
|
|
#include <linux/dma-buf.h>
|
|
|
|
#include <linux/dma-direction.h>
|
|
|
|
#include <linux/iommu.h>
|
|
|
|
#include <linux/msm_dma_iommu_mapping.h>
|
|
|
|
#include <linux/msm_ion.h>
|
2024-09-09 08:52:07 +00:00
|
|
|
#include <linux/slab.h>
|
2024-09-09 08:57:42 +00:00
|
|
|
#include <linux/types.h>
|
|
|
|
#include "media/msm_vidc.h"
|
2024-09-09 08:52:07 +00:00
|
|
|
#include "msm_vidc_debug.h"
|
2024-09-09 08:57:42 +00:00
|
|
|
#include "msm_vidc_resources.h"
|
2024-09-09 08:52:07 +00:00
|
|
|
|
|
|
|
struct smem_client {
|
|
|
|
int mem_type;
|
|
|
|
void *clnt;
|
|
|
|
struct msm_vidc_platform_resources *res;
|
2024-09-09 08:57:42 +00:00
|
|
|
enum session_type session_type;
|
2024-09-09 08:52:07 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static int get_device_address(struct smem_client *smem_client,
|
|
|
|
struct ion_handle *hndl, unsigned long align,
|
2024-09-09 08:57:42 +00:00
|
|
|
ion_phys_addr_t *iova, unsigned long *buffer_size,
|
|
|
|
unsigned long flags, enum hal_buffer buffer_type,
|
|
|
|
struct dma_mapping_info *mapping_info)
|
2024-09-09 08:52:07 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
struct ion_client *clnt = NULL;
|
2024-09-09 08:57:42 +00:00
|
|
|
struct dma_buf *buf = NULL;
|
|
|
|
struct dma_buf_attachment *attach;
|
|
|
|
struct sg_table *table = NULL;
|
|
|
|
struct context_bank_info *cb = NULL;
|
2024-09-09 08:52:07 +00:00
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
if (!iova || !buffer_size || !hndl || !smem_client || !mapping_info) {
|
2024-09-09 08:52:07 +00:00
|
|
|
dprintk(VIDC_ERR, "Invalid params: %p, %p, %p, %p\n",
|
|
|
|
smem_client, hndl, iova, buffer_size);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
clnt = smem_client->clnt;
|
|
|
|
if (!clnt) {
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_ERR, "Invalid client\n");
|
2024-09-09 08:52:07 +00:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
if (is_iommu_present(smem_client->res)) {
|
|
|
|
cb = msm_smem_get_context_bank(smem_client, flags & SMEM_SECURE,
|
|
|
|
buffer_type);
|
|
|
|
if (!cb) {
|
|
|
|
dprintk(VIDC_ERR,
|
|
|
|
"%s: Failed to get context bank device\n",
|
|
|
|
__func__);
|
|
|
|
rc = -EIO;
|
|
|
|
goto mem_map_failed;
|
|
|
|
}
|
2024-09-09 08:52:07 +00:00
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
/* Convert an Ion handle to a dma buf */
|
|
|
|
buf = ion_share_dma_buf(clnt, hndl);
|
|
|
|
if (IS_ERR_OR_NULL(buf)) {
|
|
|
|
rc = PTR_ERR(buf) ?: -ENOMEM;
|
|
|
|
dprintk(VIDC_ERR, "Share ION buf to DMA failed\n");
|
|
|
|
goto mem_map_failed;
|
2024-09-09 08:52:07 +00:00
|
|
|
}
|
2024-09-09 08:57:42 +00:00
|
|
|
|
|
|
|
/* Prepare a dma buf for dma on the given device */
|
|
|
|
attach = dma_buf_attach(buf, cb->dev);
|
|
|
|
if (IS_ERR_OR_NULL(attach)) {
|
|
|
|
rc = PTR_ERR(attach) ?: -ENOMEM;
|
|
|
|
dprintk(VIDC_ERR, "Failed to attach dmabuf\n");
|
|
|
|
goto mem_buf_attach_failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get the scatterlist for the given attachment */
|
|
|
|
table = dma_buf_map_attachment(attach, DMA_BIDIRECTIONAL);
|
|
|
|
if (IS_ERR_OR_NULL(table)) {
|
|
|
|
rc = PTR_ERR(table) ?: -ENOMEM;
|
|
|
|
dprintk(VIDC_ERR, "Failed to map table\n");
|
|
|
|
goto mem_map_table_failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* debug trace's need to be updated later */
|
|
|
|
trace_msm_smem_buffer_iommu_op_start("MAP", 0, 0,
|
|
|
|
align, *iova, *buffer_size);
|
|
|
|
|
|
|
|
/* Map a scatterlist into an SMMU */
|
|
|
|
rc = msm_dma_map_sg_lazy(cb->dev, table->sgl, table->nents,
|
|
|
|
DMA_BIDIRECTIONAL, buf);
|
|
|
|
if (rc != table->nents) {
|
|
|
|
dprintk(VIDC_ERR,
|
|
|
|
"Mapping failed with rc(%d), expected rc(%d)\n",
|
|
|
|
rc, table->nents);
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto mem_map_sg_failed;
|
|
|
|
}
|
|
|
|
if (table->sgl) {
|
|
|
|
dprintk(VIDC_DBG,
|
|
|
|
"%s: CB : %s, DMA buf: %p, device: %p, attach: %p, table: %p, table sgl: %p, rc: %d, dma_address: %pa\n",
|
|
|
|
__func__, cb->name, buf, cb->dev, attach,
|
|
|
|
table, table->sgl, rc,
|
|
|
|
&table->sgl->dma_address);
|
|
|
|
|
|
|
|
*iova = table->sgl->dma_address;
|
|
|
|
*buffer_size = table->sgl->dma_length;
|
|
|
|
} else {
|
|
|
|
dprintk(VIDC_ERR, "sgl is NULL\n");
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto mem_map_sg_failed;
|
|
|
|
}
|
|
|
|
|
|
|
|
mapping_info->dev = cb->dev;
|
|
|
|
mapping_info->mapping = cb->mapping;
|
|
|
|
mapping_info->table = table;
|
|
|
|
mapping_info->attach = attach;
|
|
|
|
mapping_info->buf = buf;
|
|
|
|
|
|
|
|
trace_msm_smem_buffer_iommu_op_end("MAP", 0, 0,
|
|
|
|
align, *iova, *buffer_size);
|
2024-09-09 08:52:07 +00:00
|
|
|
} else {
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_DBG, "Using physical memory address\n");
|
2024-09-09 08:52:07 +00:00
|
|
|
rc = ion_phys(clnt, hndl, iova, (size_t *)buffer_size);
|
2024-09-09 08:57:42 +00:00
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR, "ion memory map failed - %d\n", rc);
|
|
|
|
goto mem_map_failed;
|
|
|
|
}
|
2024-09-09 08:52:07 +00:00
|
|
|
}
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_DBG, "mapped ion handle %p to %pa\n", hndl, iova);
|
2024-09-09 08:52:07 +00:00
|
|
|
return 0;
|
2024-09-09 08:57:42 +00:00
|
|
|
mem_map_sg_failed:
|
|
|
|
dma_buf_unmap_attachment(attach, table, DMA_BIDIRECTIONAL);
|
|
|
|
mem_map_table_failed:
|
|
|
|
dma_buf_detach(buf, attach);
|
|
|
|
mem_buf_attach_failed:
|
|
|
|
dma_buf_put(buf);
|
2024-09-09 08:52:07 +00:00
|
|
|
mem_map_failed:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void put_device_address(struct smem_client *smem_client,
|
2024-09-09 08:57:42 +00:00
|
|
|
struct ion_handle *hndl, u32 flags,
|
|
|
|
struct dma_mapping_info *mapping_info,
|
|
|
|
enum hal_buffer buffer_type)
|
2024-09-09 08:52:07 +00:00
|
|
|
{
|
|
|
|
struct ion_client *clnt = NULL;
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
if (!hndl || !smem_client || !mapping_info) {
|
2024-09-09 08:52:07 +00:00
|
|
|
dprintk(VIDC_WARN, "Invalid params: %p, %p\n",
|
|
|
|
smem_client, hndl);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
if (!mapping_info->dev || !mapping_info->table ||
|
|
|
|
!mapping_info->buf || !mapping_info->attach) {
|
|
|
|
dprintk(VIDC_WARN, "Invalid params:\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2024-09-09 08:52:07 +00:00
|
|
|
clnt = smem_client->clnt;
|
|
|
|
if (!clnt) {
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_WARN, "Invalid client\n");
|
2024-09-09 08:52:07 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (is_iommu_present(smem_client->res)) {
|
|
|
|
dprintk(VIDC_DBG,
|
2024-09-09 08:57:42 +00:00
|
|
|
"Calling dma_unmap_sg - device: %p, address: %pa, buf: %p, table: %p, attach: %p\n",
|
|
|
|
mapping_info->dev,
|
|
|
|
&mapping_info->table->sgl->dma_address,
|
|
|
|
mapping_info->buf, mapping_info->table,
|
|
|
|
mapping_info->attach);
|
|
|
|
|
|
|
|
trace_msm_smem_buffer_iommu_op_start("UNMAP", 0, 0, 0, 0, 0);
|
|
|
|
msm_dma_unmap_sg(mapping_info->dev, mapping_info->table->sgl,
|
|
|
|
mapping_info->table->nents, DMA_BIDIRECTIONAL,
|
|
|
|
mapping_info->buf);
|
|
|
|
dma_buf_unmap_attachment(mapping_info->attach,
|
|
|
|
mapping_info->table, DMA_BIDIRECTIONAL);
|
|
|
|
dma_buf_detach(mapping_info->buf, mapping_info->attach);
|
|
|
|
dma_buf_put(mapping_info->buf);
|
|
|
|
trace_msm_smem_buffer_iommu_op_end("UNMAP", 0, 0, 0, 0, 0);
|
2024-09-09 08:52:07 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ion_user_to_kernel(struct smem_client *client, int fd, u32 offset,
|
|
|
|
struct msm_smem *mem, enum hal_buffer buffer_type)
|
|
|
|
{
|
|
|
|
struct ion_handle *hndl;
|
2024-09-09 08:57:42 +00:00
|
|
|
ion_phys_addr_t iova = 0;
|
2024-09-09 08:52:07 +00:00
|
|
|
unsigned long buffer_size = 0;
|
|
|
|
int rc = 0;
|
2024-09-09 08:57:42 +00:00
|
|
|
unsigned long align = SZ_4K;
|
|
|
|
unsigned long ion_flags = 0;
|
2024-09-09 08:52:07 +00:00
|
|
|
|
|
|
|
hndl = ion_import_dma_buf(client->clnt, fd);
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_DBG, "%s ion handle: %p\n", __func__, hndl);
|
2024-09-09 08:52:07 +00:00
|
|
|
if (IS_ERR_OR_NULL(hndl)) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to get handle: %p, %d, %d, %p\n",
|
|
|
|
client, fd, offset, hndl);
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto fail_import_fd;
|
|
|
|
}
|
|
|
|
mem->kvaddr = NULL;
|
2024-09-09 08:57:42 +00:00
|
|
|
rc = ion_handle_get_flags(client->clnt, hndl, &ion_flags);
|
2024-09-09 08:52:07 +00:00
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to get ion flags: %d\n", rc);
|
|
|
|
goto fail_device_address;
|
|
|
|
}
|
|
|
|
|
|
|
|
mem->buffer_type = buffer_type;
|
2024-09-09 08:57:42 +00:00
|
|
|
if (ion_flags & ION_FLAG_CACHED)
|
|
|
|
mem->flags |= SMEM_CACHED;
|
|
|
|
|
|
|
|
if (ion_flags & ION_FLAG_SECURE)
|
|
|
|
mem->flags |= SMEM_SECURE;
|
2024-09-09 08:52:07 +00:00
|
|
|
|
|
|
|
rc = get_device_address(client, hndl, align, &iova, &buffer_size,
|
2024-09-09 08:57:42 +00:00
|
|
|
mem->flags, buffer_type, &mem->mapping_info);
|
2024-09-09 08:52:07 +00:00
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to get device address: %d\n", rc);
|
|
|
|
goto fail_device_address;
|
|
|
|
}
|
|
|
|
|
|
|
|
mem->mem_type = client->mem_type;
|
|
|
|
mem->smem_priv = hndl;
|
|
|
|
mem->device_addr = iova;
|
|
|
|
mem->size = buffer_size;
|
2024-09-09 08:57:42 +00:00
|
|
|
if ((u32)mem->device_addr != iova) {
|
|
|
|
dprintk(VIDC_ERR, "iova(%pa) truncated to %#x",
|
|
|
|
&iova, (u32)mem->device_addr);
|
|
|
|
goto fail_device_address;
|
|
|
|
}
|
|
|
|
dprintk(VIDC_DBG,
|
|
|
|
"%s: ion_handle = %p, fd = %d, device_addr = %pa, size = %zx, kvaddr = %p, buffer_type = %d, flags = %#lx\n",
|
|
|
|
__func__, mem->smem_priv, fd, &mem->device_addr, mem->size,
|
|
|
|
mem->kvaddr, mem->buffer_type, mem->flags);
|
2024-09-09 08:52:07 +00:00
|
|
|
return rc;
|
|
|
|
fail_device_address:
|
|
|
|
ion_free(client->clnt, hndl);
|
|
|
|
fail_import_fd:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
static int get_secure_flag_for_buffer_type(
|
|
|
|
struct smem_client *client, enum hal_buffer buffer_type)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (!client) {
|
|
|
|
dprintk(VIDC_ERR, "%s - invalid params\n", __func__);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (buffer_type) {
|
|
|
|
case HAL_BUFFER_INPUT:
|
|
|
|
if (client->session_type == MSM_VIDC_ENCODER)
|
|
|
|
return ION_FLAG_CP_PIXEL;
|
|
|
|
else
|
|
|
|
return ION_FLAG_CP_BITSTREAM;
|
|
|
|
case HAL_BUFFER_OUTPUT:
|
|
|
|
case HAL_BUFFER_OUTPUT2:
|
|
|
|
if (client->session_type == MSM_VIDC_ENCODER)
|
|
|
|
return ION_FLAG_CP_BITSTREAM;
|
|
|
|
else
|
|
|
|
return ION_FLAG_CP_PIXEL;
|
|
|
|
case HAL_BUFFER_INTERNAL_SCRATCH:
|
|
|
|
return ION_FLAG_CP_BITSTREAM;
|
|
|
|
case HAL_BUFFER_INTERNAL_SCRATCH_1:
|
|
|
|
return ION_FLAG_CP_NON_PIXEL;
|
|
|
|
case HAL_BUFFER_INTERNAL_SCRATCH_2:
|
|
|
|
return ION_FLAG_CP_PIXEL;
|
|
|
|
case HAL_BUFFER_INTERNAL_PERSIST:
|
|
|
|
return ION_FLAG_CP_BITSTREAM;
|
|
|
|
case HAL_BUFFER_INTERNAL_PERSIST_1:
|
|
|
|
return ION_FLAG_CP_NON_PIXEL;
|
|
|
|
default:
|
|
|
|
WARN(1, "No matching secure flag for buffer type : %x\n",
|
|
|
|
buffer_type);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-09-09 08:52:07 +00:00
|
|
|
static int alloc_ion_mem(struct smem_client *client, size_t size, u32 align,
|
|
|
|
u32 flags, enum hal_buffer buffer_type, struct msm_smem *mem,
|
|
|
|
int map_kernel)
|
|
|
|
{
|
|
|
|
struct ion_handle *hndl;
|
2024-09-09 08:57:42 +00:00
|
|
|
ion_phys_addr_t iova = 0;
|
2024-09-09 08:52:07 +00:00
|
|
|
unsigned long buffer_size = 0;
|
|
|
|
unsigned long heap_mask = 0;
|
|
|
|
int rc = 0;
|
2024-09-09 08:57:42 +00:00
|
|
|
int ion_flags = 0;
|
2024-09-09 08:52:07 +00:00
|
|
|
|
|
|
|
align = ALIGN(align, SZ_4K);
|
|
|
|
size = ALIGN(size, SZ_4K);
|
|
|
|
|
|
|
|
if (is_iommu_present(client->res)) {
|
|
|
|
heap_mask = ION_HEAP(ION_IOMMU_HEAP_ID);
|
|
|
|
} else {
|
|
|
|
dprintk(VIDC_DBG,
|
2024-09-09 08:57:42 +00:00
|
|
|
"allocate shared memory from adsp heap size %zx align %d\n",
|
2024-09-09 08:52:07 +00:00
|
|
|
size, align);
|
|
|
|
heap_mask = ION_HEAP(ION_ADSP_HEAP_ID);
|
|
|
|
}
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
if (flags & SMEM_CACHED)
|
|
|
|
ion_flags |= ION_FLAG_CACHED;
|
|
|
|
|
|
|
|
if (flags & SMEM_SECURE) {
|
|
|
|
int secure_flag =
|
|
|
|
get_secure_flag_for_buffer_type(client, buffer_type);
|
|
|
|
if (secure_flag < 0) {
|
|
|
|
rc = secure_flag;
|
|
|
|
goto fail_shared_mem_alloc;
|
|
|
|
}
|
|
|
|
|
|
|
|
ion_flags |= ION_FLAG_SECURE | secure_flag;
|
|
|
|
heap_mask = ION_HEAP(ION_SECURE_HEAP_ID);
|
2024-09-09 08:52:07 +00:00
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
if (client->res->slave_side_cp) {
|
|
|
|
heap_mask = ION_HEAP(ION_CP_MM_HEAP_ID);
|
|
|
|
size = ALIGN(size, SZ_1M);
|
|
|
|
align = ALIGN(size, SZ_1M);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_msm_smem_buffer_ion_op_start("ALLOC", (u32)buffer_type,
|
|
|
|
heap_mask, size, align, flags, map_kernel);
|
|
|
|
hndl = ion_alloc(client->clnt, size, align, heap_mask, ion_flags);
|
2024-09-09 08:52:07 +00:00
|
|
|
if (IS_ERR_OR_NULL(hndl)) {
|
|
|
|
dprintk(VIDC_ERR,
|
2024-09-09 08:57:42 +00:00
|
|
|
"Failed to allocate shared memory = %p, %zx, %d, %#x\n",
|
2024-09-09 08:52:07 +00:00
|
|
|
client, size, align, flags);
|
|
|
|
rc = -ENOMEM;
|
|
|
|
goto fail_shared_mem_alloc;
|
|
|
|
}
|
2024-09-09 08:57:42 +00:00
|
|
|
trace_msm_smem_buffer_ion_op_end("ALLOC", (u32)buffer_type,
|
|
|
|
heap_mask, size, align, flags, map_kernel);
|
2024-09-09 08:52:07 +00:00
|
|
|
mem->mem_type = client->mem_type;
|
|
|
|
mem->smem_priv = hndl;
|
|
|
|
mem->flags = flags;
|
|
|
|
mem->buffer_type = buffer_type;
|
|
|
|
if (map_kernel) {
|
|
|
|
mem->kvaddr = ion_map_kernel(client->clnt, hndl);
|
2024-09-09 08:57:42 +00:00
|
|
|
if (IS_ERR_OR_NULL(mem->kvaddr)) {
|
2024-09-09 08:52:07 +00:00
|
|
|
dprintk(VIDC_ERR,
|
|
|
|
"Failed to map shared mem in kernel\n");
|
|
|
|
rc = -EIO;
|
|
|
|
goto fail_map;
|
|
|
|
}
|
2024-09-09 08:57:42 +00:00
|
|
|
} else {
|
2024-09-09 08:52:07 +00:00
|
|
|
mem->kvaddr = NULL;
|
2024-09-09 08:57:42 +00:00
|
|
|
}
|
2024-09-09 08:52:07 +00:00
|
|
|
|
|
|
|
rc = get_device_address(client, hndl, align, &iova, &buffer_size,
|
2024-09-09 08:57:42 +00:00
|
|
|
flags, buffer_type, &mem->mapping_info);
|
2024-09-09 08:52:07 +00:00
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to get device address: %d\n",
|
|
|
|
rc);
|
|
|
|
goto fail_device_address;
|
|
|
|
}
|
|
|
|
mem->device_addr = iova;
|
2024-09-09 08:57:42 +00:00
|
|
|
if ((u32)mem->device_addr != iova) {
|
|
|
|
dprintk(VIDC_ERR, "iova(%pa) truncated to %#x",
|
|
|
|
&iova, (u32)mem->device_addr);
|
|
|
|
goto fail_device_address;
|
|
|
|
}
|
2024-09-09 08:52:07 +00:00
|
|
|
mem->size = size;
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_DBG,
|
|
|
|
"%s: ion_handle = %p, device_addr = %pa, size = %#zx, kvaddr = %p, buffer_type = %#x, flags = %#lx\n",
|
|
|
|
__func__, mem->smem_priv, &mem->device_addr,
|
|
|
|
mem->size, mem->kvaddr, mem->buffer_type, mem->flags);
|
2024-09-09 08:52:07 +00:00
|
|
|
return rc;
|
|
|
|
fail_device_address:
|
2024-09-09 08:57:42 +00:00
|
|
|
if (mem->kvaddr)
|
|
|
|
ion_unmap_kernel(client->clnt, hndl);
|
2024-09-09 08:52:07 +00:00
|
|
|
fail_map:
|
|
|
|
ion_free(client->clnt, hndl);
|
|
|
|
fail_shared_mem_alloc:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void free_ion_mem(struct smem_client *client, struct msm_smem *mem)
|
|
|
|
{
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_DBG,
|
|
|
|
"%s: ion_handle = %p, device_addr = %pa, size = %#zx, kvaddr = %p, buffer_type = %#x\n",
|
|
|
|
__func__, mem->smem_priv, &mem->device_addr,
|
|
|
|
mem->size, mem->kvaddr, mem->buffer_type);
|
2024-09-09 08:52:07 +00:00
|
|
|
|
|
|
|
if (mem->device_addr)
|
2024-09-09 08:57:42 +00:00
|
|
|
put_device_address(client, mem->smem_priv, mem->flags,
|
|
|
|
&mem->mapping_info, mem->buffer_type);
|
|
|
|
|
2024-09-09 08:52:07 +00:00
|
|
|
if (mem->kvaddr)
|
|
|
|
ion_unmap_kernel(client->clnt, mem->smem_priv);
|
2024-09-09 08:57:42 +00:00
|
|
|
if (mem->smem_priv) {
|
|
|
|
trace_msm_smem_buffer_ion_op_start("FREE",
|
|
|
|
(u32)mem->buffer_type, -1, mem->size, -1,
|
|
|
|
mem->flags, -1);
|
|
|
|
dprintk(VIDC_DBG,
|
|
|
|
"%s: Freeing handle %p, client: %p\n",
|
|
|
|
__func__, mem->smem_priv, client->clnt);
|
2024-09-09 08:52:07 +00:00
|
|
|
ion_free(client->clnt, mem->smem_priv);
|
2024-09-09 08:57:42 +00:00
|
|
|
trace_msm_smem_buffer_ion_op_end("FREE", (u32)mem->buffer_type,
|
|
|
|
-1, mem->size, -1, mem->flags, -1);
|
|
|
|
}
|
2024-09-09 08:52:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void *ion_new_client(void)
|
|
|
|
{
|
|
|
|
struct ion_client *client = NULL;
|
2024-09-09 08:57:42 +00:00
|
|
|
client = msm_ion_client_create("video_client");
|
2024-09-09 08:52:07 +00:00
|
|
|
if (!client)
|
|
|
|
dprintk(VIDC_ERR, "Failed to create smem client\n");
|
|
|
|
return client;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void ion_delete_client(struct smem_client *client)
|
|
|
|
{
|
|
|
|
ion_client_destroy(client->clnt);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct msm_smem *msm_smem_user_to_kernel(void *clt, int fd, u32 offset,
|
|
|
|
enum hal_buffer buffer_type)
|
|
|
|
{
|
|
|
|
struct smem_client *client = clt;
|
|
|
|
int rc = 0;
|
|
|
|
struct msm_smem *mem;
|
|
|
|
if (fd < 0) {
|
|
|
|
dprintk(VIDC_ERR, "Invalid fd: %d\n", fd);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
mem = kzalloc(sizeof(*mem), GFP_KERNEL);
|
|
|
|
if (!mem) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to allocte shared mem\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
switch (client->mem_type) {
|
|
|
|
case SMEM_ION:
|
|
|
|
rc = ion_user_to_kernel(clt, fd, offset, mem, buffer_type);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dprintk(VIDC_ERR, "Mem type not supported\n");
|
|
|
|
rc = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to allocate shared memory\n");
|
|
|
|
kfree(mem);
|
|
|
|
mem = NULL;
|
|
|
|
}
|
|
|
|
return mem;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ion_cache_operations(struct smem_client *client,
|
|
|
|
struct msm_smem *mem, enum smem_cache_ops cache_op)
|
|
|
|
{
|
|
|
|
unsigned long ionflag = 0;
|
|
|
|
int rc = 0;
|
|
|
|
int msm_cache_ops = 0;
|
|
|
|
if (!mem || !client) {
|
|
|
|
dprintk(VIDC_ERR, "Invalid params: %p, %p\n",
|
|
|
|
mem, client);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
rc = ion_handle_get_flags(client->clnt, mem->smem_priv,
|
|
|
|
&ionflag);
|
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR,
|
|
|
|
"ion_handle_get_flags failed: %d\n", rc);
|
|
|
|
goto cache_op_failed;
|
|
|
|
}
|
|
|
|
if (ION_IS_CACHED(ionflag)) {
|
|
|
|
switch (cache_op) {
|
|
|
|
case SMEM_CACHE_CLEAN:
|
|
|
|
msm_cache_ops = ION_IOC_CLEAN_CACHES;
|
|
|
|
break;
|
|
|
|
case SMEM_CACHE_INVALIDATE:
|
|
|
|
msm_cache_ops = ION_IOC_INV_CACHES;
|
|
|
|
break;
|
|
|
|
case SMEM_CACHE_CLEAN_INVALIDATE:
|
|
|
|
msm_cache_ops = ION_IOC_CLEAN_INV_CACHES;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dprintk(VIDC_ERR, "cache operation not supported\n");
|
|
|
|
rc = -EINVAL;
|
|
|
|
goto cache_op_failed;
|
|
|
|
}
|
|
|
|
rc = msm_ion_do_cache_op(client->clnt,
|
|
|
|
(struct ion_handle *)mem->smem_priv,
|
|
|
|
0, (unsigned long)mem->size,
|
|
|
|
msm_cache_ops);
|
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR,
|
|
|
|
"cache operation failed %d\n", rc);
|
|
|
|
goto cache_op_failed;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
cache_op_failed:
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int msm_smem_cache_operations(void *clt, struct msm_smem *mem,
|
|
|
|
enum smem_cache_ops cache_op)
|
|
|
|
{
|
|
|
|
struct smem_client *client = clt;
|
|
|
|
int rc = 0;
|
|
|
|
if (!client) {
|
|
|
|
dprintk(VIDC_ERR, "Invalid params: %p\n",
|
|
|
|
client);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
switch (client->mem_type) {
|
|
|
|
case SMEM_ION:
|
|
|
|
rc = ion_cache_operations(client, mem, cache_op);
|
|
|
|
if (rc)
|
|
|
|
dprintk(VIDC_ERR,
|
|
|
|
"Failed cache operations: %d\n", rc);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dprintk(VIDC_ERR, "Mem type not supported\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
void *msm_smem_new_client(enum smem_type mtype,
|
2024-09-09 08:57:42 +00:00
|
|
|
void *platform_resources, enum session_type stype)
|
2024-09-09 08:52:07 +00:00
|
|
|
{
|
|
|
|
struct smem_client *client = NULL;
|
|
|
|
void *clnt = NULL;
|
2024-09-09 08:57:42 +00:00
|
|
|
struct msm_vidc_platform_resources *res = platform_resources;
|
2024-09-09 08:52:07 +00:00
|
|
|
switch (mtype) {
|
|
|
|
case SMEM_ION:
|
|
|
|
clnt = ion_new_client();
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dprintk(VIDC_ERR, "Mem type not supported\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (clnt) {
|
|
|
|
client = kzalloc(sizeof(*client), GFP_KERNEL);
|
|
|
|
if (client) {
|
|
|
|
client->mem_type = mtype;
|
|
|
|
client->clnt = clnt;
|
|
|
|
client->res = res;
|
2024-09-09 08:57:42 +00:00
|
|
|
client->session_type = stype;
|
2024-09-09 08:52:07 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
dprintk(VIDC_ERR, "Failed to create new client: mtype = %d\n",
|
|
|
|
mtype);
|
|
|
|
}
|
|
|
|
return client;
|
2024-09-09 08:57:42 +00:00
|
|
|
}
|
2024-09-09 08:52:07 +00:00
|
|
|
|
|
|
|
struct msm_smem *msm_smem_alloc(void *clt, size_t size, u32 align, u32 flags,
|
|
|
|
enum hal_buffer buffer_type, int map_kernel)
|
|
|
|
{
|
|
|
|
struct smem_client *client;
|
|
|
|
int rc = 0;
|
|
|
|
struct msm_smem *mem;
|
|
|
|
client = clt;
|
|
|
|
if (!client) {
|
|
|
|
dprintk(VIDC_ERR, "Invalid client passed\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if (!size) {
|
2024-09-09 08:57:42 +00:00
|
|
|
dprintk(VIDC_ERR, "No need to allocate memory of size: %zx\n",
|
2024-09-09 08:52:07 +00:00
|
|
|
size);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
mem = kzalloc(sizeof(*mem), GFP_KERNEL);
|
|
|
|
if (!mem) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to allocate shared mem\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
switch (client->mem_type) {
|
|
|
|
case SMEM_ION:
|
|
|
|
rc = alloc_ion_mem(client, size, align, flags, buffer_type,
|
|
|
|
mem, map_kernel);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dprintk(VIDC_ERR, "Mem type not supported\n");
|
|
|
|
rc = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (rc) {
|
|
|
|
dprintk(VIDC_ERR, "Failed to allocate shared memory\n");
|
|
|
|
kfree(mem);
|
|
|
|
mem = NULL;
|
|
|
|
}
|
|
|
|
return mem;
|
|
|
|
}
|
|
|
|
|
|
|
|
void msm_smem_free(void *clt, struct msm_smem *mem)
|
|
|
|
{
|
|
|
|
struct smem_client *client = clt;
|
|
|
|
if (!client || !mem) {
|
|
|
|
dprintk(VIDC_ERR, "Invalid client/handle passed\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch (client->mem_type) {
|
|
|
|
case SMEM_ION:
|
|
|
|
free_ion_mem(client, mem);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dprintk(VIDC_ERR, "Mem type not supported\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
kfree(mem);
|
|
|
|
};
|
|
|
|
|
|
|
|
void msm_smem_delete_client(void *clt)
|
|
|
|
{
|
|
|
|
struct smem_client *client = clt;
|
|
|
|
if (!client) {
|
|
|
|
dprintk(VIDC_ERR, "Invalid client passed\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch (client->mem_type) {
|
|
|
|
case SMEM_ION:
|
|
|
|
ion_delete_client(client);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
dprintk(VIDC_ERR, "Mem type not supported\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
kfree(client);
|
|
|
|
}
|
|
|
|
|
2024-09-09 08:57:42 +00:00
|
|
|
struct context_bank_info *msm_smem_get_context_bank(void *clt,
|
|
|
|
bool is_secure, enum hal_buffer buffer_type)
|
2024-09-09 08:52:07 +00:00
|
|
|
{
|
|
|
|
struct smem_client *client = clt;
|
2024-09-09 08:57:42 +00:00
|
|
|
struct context_bank_info *cb = NULL, *match = NULL;
|
|
|
|
|
|
|
|
if (!clt) {
|
|
|
|
dprintk(VIDC_ERR, "%s - invalid params\n", __func__);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* HAL_BUFFER_INPUT is directly mapped to bitstream CB in DT
|
|
|
|
* as the buffer type structure was initially designed
|
|
|
|
* just for decoder. For Encoder, input should be mapped to
|
|
|
|
* pixel CB. So swap the buffer types just in this local scope.
|
|
|
|
*/
|
|
|
|
if (is_secure && client->session_type == MSM_VIDC_ENCODER) {
|
|
|
|
if (buffer_type == HAL_BUFFER_INPUT)
|
|
|
|
buffer_type = HAL_BUFFER_OUTPUT;
|
|
|
|
else if (buffer_type == HAL_BUFFER_OUTPUT)
|
|
|
|
buffer_type = HAL_BUFFER_INPUT;
|
|
|
|
}
|
|
|
|
|
|
|
|
list_for_each_entry(cb, &client->res->context_banks, list) {
|
|
|
|
if (cb->is_secure == is_secure &&
|
|
|
|
cb->buffer_type & buffer_type) {
|
|
|
|
match = cb;
|
|
|
|
dprintk(VIDC_DBG,
|
|
|
|
"context bank found for CB : %s, device: %p mapping: %p\n",
|
|
|
|
match->name, match->dev, match->mapping);
|
2024-09-09 08:52:07 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2024-09-09 08:57:42 +00:00
|
|
|
|
|
|
|
return match;
|
2024-09-09 08:52:07 +00:00
|
|
|
}
|