1 /* SPDX-License-Identifier: GPL-2.0-only */
2 /*
3 * Header file for dma buffer sharing framework.
4 *
5 * Copyright(C) 2011 Linaro Limited. All rights reserved.
6 * Author: Sumit Semwal <sumit.semwal@ti.com>
7 *
8 * Many thanks to linaro-mm-sig list, and specially
9 * Arnd Bergmann <arnd@arndb.de>, Rob Clark <rob@ti.com> and
10 * Daniel Vetter <daniel@ffwll.ch> for their support in creation and
11 * refining of this idea.
12 */
13 #ifndef __DMA_BUF_H__
14 #define __DMA_BUF_H__
15
16 #include <linux/iosys-map.h>
17 #include <linux/file.h>
18 #include <linux/err.h>
19 #include <linux/scatterlist.h>
20 #include <linux/list.h>
21 #include <linux/dma-mapping.h>
22 #include <linux/fs.h>
23 #include <linux/dma-fence.h>
24 #include <linux/wait.h>
25
26 struct device;
27 struct dma_buf;
28 struct dma_buf_attachment;
29
30 /**
31 * struct dma_buf_ops - operations possible on struct dma_buf
32 * @vmap: [optional] creates a virtual mapping for the buffer into kernel
33 * address space. Same restrictions as for vmap and friends apply.
34 * @vunmap: [optional] unmaps a vmap from the buffer
35 */
36 struct dma_buf_ops {
37 /**
38 * @cache_sgt_mapping:
39 *
40 * If true the framework will cache the first mapping made for each
41 * attachment. This avoids creating mappings for attachments multiple
42 * times.
43 */
44 bool cache_sgt_mapping;
45
46 /**
47 * @attach:
48 *
49 * This is called from dma_buf_attach() to make sure that a given
50 * &dma_buf_attachment.dev can access the provided &dma_buf. Exporters
51 * which support buffer objects in special locations like VRAM or
52 * device-specific carveout areas should check whether the buffer could
53 * be move to system memory (or directly accessed by the provided
54 * device), and otherwise need to fail the attach operation.
55 *
56 * The exporter should also in general check whether the current
57 * allocation fulfills the DMA constraints of the new device. If this
58 * is not the case, and the allocation cannot be moved, it should also
59 * fail the attach operation.
60 *
61 * Any exporter-private housekeeping data can be stored in the
62 * &dma_buf_attachment.priv pointer.
63 *
64 * This callback is optional.
65 *
66 * Returns:
67 *
68 * 0 on success, negative error code on failure. It might return -EBUSY
69 * to signal that backing storage is already allocated and incompatible
70 * with the requirements of requesting device.
71 */
72 int (*attach)(struct dma_buf *, struct dma_buf_attachment *);
73
74 /**
75 * @detach:
76 *
77 * This is called by dma_buf_detach() to release a &dma_buf_attachment.
78 * Provided so that exporters can clean up any housekeeping for an
79 * &dma_buf_attachment.
80 *
81 * This callback is optional.
82 */
83 void (*detach)(struct dma_buf *, struct dma_buf_attachment *);
84
85 /**
86 * @pin:
87 *
88 * This is called by dma_buf_pin() and lets the exporter know that the
89 * DMA-buf can't be moved any more. Ideally, the exporter should
90 * pin the buffer so that it is generally accessible by all
91 * devices.
92 *
93 * This is called with the &dmabuf.resv object locked and is mutual
94 * exclusive with @cache_sgt_mapping.
95 *
96 * This is called automatically for non-dynamic importers from
97 * dma_buf_attach().
98 *
99 * Note that similar to non-dynamic exporters in their @map_dma_buf
100 * callback the driver must guarantee that the memory is available for
101 * use and cleared of any old data by the time this function returns.
102 * Drivers which pipeline their buffer moves internally must wait for
103 * all moves and clears to complete.
104 *
105 * Returns:
106 *
107 * 0 on success, negative error code on failure.
108 */
109 int (*pin)(struct dma_buf_attachment *attach);
110
111 /**
112 * @unpin:
113 *
114 * This is called by dma_buf_unpin() and lets the exporter know that the
115 * DMA-buf can be moved again.
116 *
117 * This is called with the dmabuf->resv object locked and is mutual
118 * exclusive with @cache_sgt_mapping.
119 *
120 * This callback is optional.
121 */
122 void (*unpin)(struct dma_buf_attachment *attach);
123
124 /**
125 * @map_dma_buf:
126 *
127 * This is called by dma_buf_map_attachment() and is used to map a
128 * shared &dma_buf into device address space, and it is mandatory. It
129 * can only be called if @attach has been called successfully.
130 *
131 * This call may sleep, e.g. when the backing storage first needs to be
132 * allocated, or moved to a location suitable for all currently attached
133 * devices.
134 *
135 * Note that any specific buffer attributes required for this function
136 * should get added to device_dma_parameters accessible via
137 * &device.dma_params from the &dma_buf_attachment. The @attach callback
138 * should also check these constraints.
139 *
140 * If this is being called for the first time, the exporter can now
141 * choose to scan through the list of attachments for this buffer,
142 * collate the requirements of the attached devices, and choose an
143 * appropriate backing storage for the buffer.
144 *
145 * Based on enum dma_data_direction, it might be possible to have
146 * multiple users accessing at the same time (for reading, maybe), or
147 * any other kind of sharing that the exporter might wish to make
148 * available to buffer-users.
149 *
150 * This is always called with the dmabuf->resv object locked when
151 * the dynamic_mapping flag is true.
152 *
153 * Note that for non-dynamic exporters the driver must guarantee that
154 * that the memory is available for use and cleared of any old data by
155 * the time this function returns. Drivers which pipeline their buffer
156 * moves internally must wait for all moves and clears to complete.
157 * Dynamic exporters do not need to follow this rule: For non-dynamic
158 * importers the buffer is already pinned through @pin, which has the
159 * same requirements. Dynamic importers otoh are required to obey the
160 * dma_resv fences.
161 *
162 * Returns:
163 *
164 * A &sg_table scatter list of the backing storage of the DMA buffer,
165 * already mapped into the device address space of the &device attached
166 * with the provided &dma_buf_attachment. The addresses and lengths in
167 * the scatter list are PAGE_SIZE aligned.
168 *
169 * On failure, returns a negative error value wrapped into a pointer.
170 * May also return -EINTR when a signal was received while being
171 * blocked.
172 *
173 * Note that exporters should not try to cache the scatter list, or
174 * return the same one for multiple calls. Caching is done either by the
175 * DMA-BUF code (for non-dynamic importers) or the importer. Ownership
176 * of the scatter list is transferred to the caller, and returned by
177 * @unmap_dma_buf.
178 */
179 struct sg_table * (*map_dma_buf)(struct dma_buf_attachment *,
180 enum dma_data_direction);
181 /**
182 * @unmap_dma_buf:
183 *
184 * This is called by dma_buf_unmap_attachment() and should unmap and
185 * release the &sg_table allocated in @map_dma_buf, and it is mandatory.
186 * For static dma_buf handling this might also unpin the backing
187 * storage if this is the last mapping of the DMA buffer.
188 */
189 void (*unmap_dma_buf)(struct dma_buf_attachment *,
190 struct sg_table *,
191 enum dma_data_direction);
192
193 /* TODO: Add try_map_dma_buf version, to return immed with -EBUSY
194 * if the call would block.
195 */
196
197 /**
198 * @release:
199 *
200 * Called after the last dma_buf_put to release the &dma_buf, and
201 * mandatory.
202 */
203 void (*release)(struct dma_buf *);
204
205 /**
206 * @begin_cpu_access:
207 *
208 * This is called from dma_buf_begin_cpu_access() and allows the
209 * exporter to ensure that the memory is actually coherent for cpu
210 * access. The exporter also needs to ensure that cpu access is coherent
211 * for the access direction. The direction can be used by the exporter
212 * to optimize the cache flushing, i.e. access with a different
213 * direction (read instead of write) might return stale or even bogus
214 * data (e.g. when the exporter needs to copy the data to temporary
215 * storage).
216 *
217 * Note that this is both called through the DMA_BUF_IOCTL_SYNC IOCTL
218 * command for userspace mappings established through @mmap, and also
219 * for kernel mappings established with @vmap.
220 *
221 * This callback is optional.
222 *
223 * Returns:
224 *
225 * 0 on success or a negative error code on failure. This can for
226 * example fail when the backing storage can't be allocated. Can also
227 * return -ERESTARTSYS or -EINTR when the call has been interrupted and
228 * needs to be restarted.
229 */
230 int (*begin_cpu_access)(struct dma_buf *, enum dma_data_direction);
231
232 /**
233 * @end_cpu_access:
234 *
235 * This is called from dma_buf_end_cpu_access() when the importer is
236 * done accessing the CPU. The exporter can use this to flush caches and
237 * undo anything else done in @begin_cpu_access.
238 *
239 * This callback is optional.
240 *
241 * Returns:
242 *
243 * 0 on success or a negative error code on failure. Can return
244 * -ERESTARTSYS or -EINTR when the call has been interrupted and needs
245 * to be restarted.
246 */
247 int (*end_cpu_access)(struct dma_buf *, enum dma_data_direction);
248
249 /**
250 * @mmap:
251 *
252 * This callback is used by the dma_buf_mmap() function
253 *
254 * Note that the mapping needs to be incoherent, userspace is expected
255 * to bracket CPU access using the DMA_BUF_IOCTL_SYNC interface.
256 *
257 * Because dma-buf buffers have invariant size over their lifetime, the
258 * dma-buf core checks whether a vma is too large and rejects such
259 * mappings. The exporter hence does not need to duplicate this check.
260 * Drivers do not need to check this themselves.
261 *
262 * If an exporter needs to manually flush caches and hence needs to fake
263 * coherency for mmap support, it needs to be able to zap all the ptes
264 * pointing at the backing storage. Now linux mm needs a struct
265 * address_space associated with the struct file stored in vma->vm_file
266 * to do that with the function unmap_mapping_range. But the dma_buf
267 * framework only backs every dma_buf fd with the anon_file struct file,
268 * i.e. all dma_bufs share the same file.
269 *
270 * Hence exporters need to setup their own file (and address_space)
271 * association by setting vma->vm_file and adjusting vma->vm_pgoff in
272 * the dma_buf mmap callback. In the specific case of a gem driver the
273 * exporter could use the shmem file already provided by gem (and set
274 * vm_pgoff = 0). Exporters can then zap ptes by unmapping the
275 * corresponding range of the struct address_space associated with their
276 * own file.
277 *
278 * This callback is optional.
279 *
280 * Returns:
281 *
282 * 0 on success or a negative error code on failure.
283 */
284 int (*mmap)(struct dma_buf *, struct vm_area_struct *vma);
285
286 int (*vmap)(struct dma_buf *dmabuf, struct iosys_map *map);
287 void (*vunmap)(struct dma_buf *dmabuf, struct iosys_map *map);
288 };
289
290 /**
291 * struct dma_buf - shared buffer object
292 *
293 * This represents a shared buffer, created by calling dma_buf_export(). The
294 * userspace representation is a normal file descriptor, which can be created by
295 * calling dma_buf_fd().
296 *
297 * Shared dma buffers are reference counted using dma_buf_put() and
298 * get_dma_buf().
299 *
300 * Device DMA access is handled by the separate &struct dma_buf_attachment.
301 */
302 struct dma_buf {
303 /**
304 * @size:
305 *
306 * Size of the buffer; invariant over the lifetime of the buffer.
307 */
308 size_t size;
309
310 /**
311 * @file:
312 *
313 * File pointer used for sharing buffers across, and for refcounting.
314 * See dma_buf_get() and dma_buf_put().
315 */
316 struct file *file;
317
318 /**
319 * @attachments:
320 *
321 * List of dma_buf_attachment that denotes all devices attached,
322 * protected by &dma_resv lock @resv.
323 */
324 struct list_head attachments;
325
326 /** @ops: dma_buf_ops associated with this buffer object. */
327 const struct dma_buf_ops *ops;
328
329 /**
330 * @vmapping_counter:
331 *
332 * Used internally to refcnt the vmaps returned by dma_buf_vmap().
333 * Protected by @lock.
334 */
335 unsigned vmapping_counter;
336
337 /**
338 * @vmap_ptr:
339 * The current vmap ptr if @vmapping_counter > 0. Protected by @lock.
340 */
341 struct iosys_map vmap_ptr;
342
343 /**
344 * @exp_name:
345 *
346 * Name of the exporter; useful for debugging. See the
347 * DMA_BUF_SET_NAME IOCTL.
348 */
349 const char *exp_name;
350
351 /**
352 * @name:
353 *
354 * Userspace-provided name; useful for accounting and debugging,
355 * protected by dma_resv_lock() on @resv and @name_lock for read access.
356 */
357 const char *name;
358
359 /** @name_lock: Spinlock to protect name access for read access. */
360 spinlock_t name_lock;
361
362 /**
363 * @owner:
364 *
365 * Pointer to exporter module; used for refcounting when exporter is a
366 * kernel module.
367 */
368 struct module *owner;
369
370 /** @list_node: node for dma_buf accounting and debugging. */
371 struct list_head list_node;
372
373 /** @priv: exporter specific private data for this buffer object. */
374 void *priv;
375
376 /**
377 * @resv:
378 *
379 * Reservation object linked to this dma-buf.
380 *
381 * IMPLICIT SYNCHRONIZATION RULES:
382 *
383 * Drivers which support implicit synchronization of buffer access as
384 * e.g. exposed in `Implicit Fence Poll Support`_ must follow the
385 * below rules.
386 *
387 * - Drivers must add a read fence through dma_resv_add_fence() with the
388 * DMA_RESV_USAGE_READ flag for anything the userspace API considers a
389 * read access. This highly depends upon the API and window system.
390 *
391 * - Similarly drivers must add a write fence through
392 * dma_resv_add_fence() with the DMA_RESV_USAGE_WRITE flag for
393 * anything the userspace API considers write access.
394 *
395 * - Drivers may just always add a write fence, since that only
396 * causes unnecessary synchronization, but no correctness issues.
397 *
398 * - Some drivers only expose a synchronous userspace API with no
399 * pipelining across drivers. These do not set any fences for their
400 * access. An example here is v4l.
401 *
402 * - Driver should use dma_resv_usage_rw() when retrieving fences as
403 * dependency for implicit synchronization.
404 *
405 * DYNAMIC IMPORTER RULES:
406 *
407 * Dynamic importers, see dma_buf_attachment_is_dynamic(), have
408 * additional constraints on how they set up fences:
409 *
410 * - Dynamic importers must obey the write fences and wait for them to
411 * signal before allowing access to the buffer's underlying storage
412 * through the device.
413 *
414 * - Dynamic importers should set fences for any access that they can't
415 * disable immediately from their &dma_buf_attach_ops.move_notify
416 * callback.
417 *
418 * IMPORTANT:
419 *
420 * All drivers and memory management related functions must obey the
421 * struct dma_resv rules, specifically the rules for updating and
422 * obeying fences. See enum dma_resv_usage for further descriptions.
423 */
424 struct dma_resv *resv;
425
426 /** @poll: for userspace poll support */
427 wait_queue_head_t poll;
428
429 /** @cb_in: for userspace poll support */
430 /** @cb_out: for userspace poll support */
431 struct dma_buf_poll_cb_t {
432 struct dma_fence_cb cb;
433 wait_queue_head_t *poll;
434
435 __poll_t active;
436 } cb_in, cb_out;
437 #ifdef CONFIG_DMABUF_SYSFS_STATS
438 /**
439 * @sysfs_entry:
440 *
441 * For exposing information about this buffer in sysfs. See also
442 * `DMA-BUF statistics`_ for the uapi this enables.
443 */
444 struct dma_buf_sysfs_entry {
445 struct kobject kobj;
446 struct dma_buf *dmabuf;
447 } *sysfs_entry;
448 #endif
449 };
450
451 /**
452 * struct dma_buf_attach_ops - importer operations for an attachment
453 *
454 * Attachment operations implemented by the importer.
455 */
456 struct dma_buf_attach_ops {
457 /**
458 * @allow_peer2peer:
459 *
460 * If this is set to true the importer must be able to handle peer
461 * resources without struct pages.
462 */
463 bool allow_peer2peer;
464
465 /**
466 * @move_notify: [optional] notification that the DMA-buf is moving
467 *
468 * If this callback is provided the framework can avoid pinning the
469 * backing store while mappings exists.
470 *
471 * This callback is called with the lock of the reservation object
472 * associated with the dma_buf held and the mapping function must be
473 * called with this lock held as well. This makes sure that no mapping
474 * is created concurrently with an ongoing move operation.
475 *
476 * Mappings stay valid and are not directly affected by this callback.
477 * But the DMA-buf can now be in a different physical location, so all
478 * mappings should be destroyed and re-created as soon as possible.
479 *
480 * New mappings can be created after this callback returns, and will
481 * point to the new location of the DMA-buf.
482 */
483 void (*move_notify)(struct dma_buf_attachment *attach);
484 };
485
486 /**
487 * struct dma_buf_attachment - holds device-buffer attachment data
488 * @dmabuf: buffer for this attachment.
489 * @dev: device attached to the buffer.
490 * @node: list of dma_buf_attachment, protected by dma_resv lock of the dmabuf.
491 * @sgt: cached mapping.
492 * @dir: direction of cached mapping.
493 * @peer2peer: true if the importer can handle peer resources without pages.
494 * @priv: exporter specific attachment data.
495 * @importer_ops: importer operations for this attachment, if provided
496 * dma_buf_map/unmap_attachment() must be called with the dma_resv lock held.
497 * @importer_priv: importer specific attachment data.
498 *
499 * This structure holds the attachment information between the dma_buf buffer
500 * and its user device(s). The list contains one attachment struct per device
501 * attached to the buffer.
502 *
503 * An attachment is created by calling dma_buf_attach(), and released again by
504 * calling dma_buf_detach(). The DMA mapping itself needed to initiate a
505 * transfer is created by dma_buf_map_attachment() and freed again by calling
506 * dma_buf_unmap_attachment().
507 */
508 struct dma_buf_attachment {
509 struct dma_buf *dmabuf;
510 struct device *dev;
511 struct list_head node;
512 struct sg_table *sgt;
513 enum dma_data_direction dir;
514 bool peer2peer;
515 const struct dma_buf_attach_ops *importer_ops;
516 void *importer_priv;
517 void *priv;
518 };
519
520 /**
521 * struct dma_buf_export_info - holds information needed to export a dma_buf
522 * @exp_name: name of the exporter - useful for debugging.
523 * @owner: pointer to exporter module - used for refcounting kernel module
524 * @ops: Attach allocator-defined dma buf ops to the new buffer
525 * @size: Size of the buffer - invariant over the lifetime of the buffer
526 * @flags: mode flags for the file
527 * @resv: reservation-object, NULL to allocate default one
528 * @priv: Attach private data of allocator to this buffer
529 *
530 * This structure holds the information required to export the buffer. Used
531 * with dma_buf_export() only.
532 */
533 struct dma_buf_export_info {
534 const char *exp_name;
535 struct module *owner;
536 const struct dma_buf_ops *ops;
537 size_t size;
538 int flags;
539 struct dma_resv *resv;
540 void *priv;
541 };
542
543 /**
544 * DEFINE_DMA_BUF_EXPORT_INFO - helper macro for exporters
545 * @name: export-info name
546 *
547 * DEFINE_DMA_BUF_EXPORT_INFO macro defines the &struct dma_buf_export_info,
548 * zeroes it out and pre-populates exp_name in it.
549 */
550 #define DEFINE_DMA_BUF_EXPORT_INFO(name) \
551 struct dma_buf_export_info name = { .exp_name = KBUILD_MODNAME, \
552 .owner = THIS_MODULE }
553
554 /**
555 * get_dma_buf - convenience wrapper for get_file.
556 * @dmabuf: [in] pointer to dma_buf
557 *
558 * Increments the reference count on the dma-buf, needed in case of drivers
559 * that either need to create additional references to the dmabuf on the
560 * kernel side. For example, an exporter that needs to keep a dmabuf ptr
561 * so that subsequent exports don't create a new dmabuf.
562 */
get_dma_buf(struct dma_buf * dmabuf)563 static inline void get_dma_buf(struct dma_buf *dmabuf)
564 {
565 get_file(dmabuf->file);
566 }
567
568 /**
569 * dma_buf_is_dynamic - check if a DMA-buf uses dynamic mappings.
570 * @dmabuf: the DMA-buf to check
571 *
572 * Returns true if a DMA-buf exporter wants to be called with the dma_resv
573 * locked for the map/unmap callbacks, false if it doesn't wants to be called
574 * with the lock held.
575 */
dma_buf_is_dynamic(struct dma_buf * dmabuf)576 static inline bool dma_buf_is_dynamic(struct dma_buf *dmabuf)
577 {
578 return !!dmabuf->ops->pin;
579 }
580
581 /**
582 * dma_buf_attachment_is_dynamic - check if a DMA-buf attachment uses dynamic
583 * mappings
584 * @attach: the DMA-buf attachment to check
585 *
586 * Returns true if a DMA-buf importer wants to call the map/unmap functions with
587 * the dma_resv lock held.
588 */
589 static inline bool
dma_buf_attachment_is_dynamic(struct dma_buf_attachment * attach)590 dma_buf_attachment_is_dynamic(struct dma_buf_attachment *attach)
591 {
592 return !!attach->importer_ops;
593 }
594
595 struct dma_buf_attachment *dma_buf_attach(struct dma_buf *dmabuf,
596 struct device *dev);
597 struct dma_buf_attachment *
598 dma_buf_dynamic_attach(struct dma_buf *dmabuf, struct device *dev,
599 const struct dma_buf_attach_ops *importer_ops,
600 void *importer_priv);
601 void dma_buf_detach(struct dma_buf *dmabuf,
602 struct dma_buf_attachment *attach);
603 int dma_buf_pin(struct dma_buf_attachment *attach);
604 void dma_buf_unpin(struct dma_buf_attachment *attach);
605
606 struct dma_buf *dma_buf_export(const struct dma_buf_export_info *exp_info);
607
608 int dma_buf_fd(struct dma_buf *dmabuf, int flags);
609 struct dma_buf *dma_buf_get(int fd);
610 void dma_buf_put(struct dma_buf *dmabuf);
611
612 struct sg_table *dma_buf_map_attachment(struct dma_buf_attachment *,
613 enum dma_data_direction);
614 void dma_buf_unmap_attachment(struct dma_buf_attachment *, struct sg_table *,
615 enum dma_data_direction);
616 void dma_buf_move_notify(struct dma_buf *dma_buf);
617 int dma_buf_begin_cpu_access(struct dma_buf *dma_buf,
618 enum dma_data_direction dir);
619 int dma_buf_end_cpu_access(struct dma_buf *dma_buf,
620 enum dma_data_direction dir);
621 struct sg_table *
622 dma_buf_map_attachment_unlocked(struct dma_buf_attachment *attach,
623 enum dma_data_direction direction);
624 void dma_buf_unmap_attachment_unlocked(struct dma_buf_attachment *attach,
625 struct sg_table *sg_table,
626 enum dma_data_direction direction);
627
628 int dma_buf_mmap(struct dma_buf *, struct vm_area_struct *,
629 unsigned long);
630 int dma_buf_vmap(struct dma_buf *dmabuf, struct iosys_map *map);
631 void dma_buf_vunmap(struct dma_buf *dmabuf, struct iosys_map *map);
632 int dma_buf_vmap_unlocked(struct dma_buf *dmabuf, struct iosys_map *map);
633 void dma_buf_vunmap_unlocked(struct dma_buf *dmabuf, struct iosys_map *map);
634 #endif /* __DMA_BUF_H__ */
635