ttm_tt.c revision 1.22
1/* SPDX-License-Identifier: GPL-2.0 OR MIT */ 2/************************************************************************** 3 * 4 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA 5 * All Rights Reserved. 6 * 7 * Permission is hereby granted, free of charge, to any person obtaining a 8 * copy of this software and associated documentation files (the 9 * "Software"), to deal in the Software without restriction, including 10 * without limitation the rights to use, copy, modify, merge, publish, 11 * distribute, sub license, and/or sell copies of the Software, and to 12 * permit persons to whom the Software is furnished to do so, subject to 13 * the following conditions: 14 * 15 * The above copyright notice and this permission notice (including the 16 * next paragraph) shall be included in all copies or substantial portions 17 * of the Software. 18 * 19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL 22 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM, 23 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR 24 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE 25 * USE OR OTHER DEALINGS IN THE SOFTWARE. 26 * 27 **************************************************************************/ 28/* 29 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com> 30 */ 31 32#define pr_fmt(fmt) "[TTM] " fmt 33 34#include <linux/cc_platform.h> 35#include <linux/sched.h> 36#include <linux/shmem_fs.h> 37#include <linux/file.h> 38#include <linux/module.h> 39#include <drm/drm_cache.h> 40#include <drm/drm_device.h> 41#include <drm/drm_util.h> 42#include <drm/ttm/ttm_bo.h> 43#include <drm/ttm/ttm_tt.h> 44 45#include "ttm_module.h" 46 47static unsigned long ttm_pages_limit; 48 49MODULE_PARM_DESC(pages_limit, "Limit for the allocated pages"); 50module_param_named(pages_limit, ttm_pages_limit, ulong, 0644); 51 52static unsigned long ttm_dma32_pages_limit; 53 54MODULE_PARM_DESC(dma32_pages_limit, "Limit for the allocated DMA32 pages"); 55module_param_named(dma32_pages_limit, ttm_dma32_pages_limit, ulong, 0644); 56 57static atomic_long_t ttm_pages_allocated; 58static atomic_long_t ttm_dma32_pages_allocated; 59 60/* 61 * Allocates a ttm structure for the given BO. 62 */ 63int ttm_tt_create(struct ttm_buffer_object *bo, bool zero_alloc) 64{ 65 struct ttm_device *bdev = bo->bdev; 66 struct drm_device *ddev = bo->base.dev; 67 uint32_t page_flags = 0; 68 69 dma_resv_assert_held(bo->base.resv); 70 71 if (bo->ttm) 72 return 0; 73 74 switch (bo->type) { 75 case ttm_bo_type_device: 76 if (zero_alloc) 77 page_flags |= TTM_TT_FLAG_ZERO_ALLOC; 78 break; 79 case ttm_bo_type_kernel: 80 break; 81 case ttm_bo_type_sg: 82 page_flags |= TTM_TT_FLAG_EXTERNAL; 83 break; 84 default: 85 pr_err("Illegal buffer object type\n"); 86 return -EINVAL; 87 } 88 /* 89 * When using dma_alloc_coherent with memory encryption the 90 * mapped TT pages need to be decrypted or otherwise the drivers 91 * will end up sending encrypted mem to the gpu. 92 */ 93 if (bdev->pool.use_dma_alloc && cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) { 94 page_flags |= TTM_TT_FLAG_DECRYPTED; 95 drm_info_once(ddev, "TT memory decryption enabled."); 96 } 97 98 bo->ttm = bdev->funcs->ttm_tt_create(bo, page_flags); 99 if (unlikely(bo->ttm == NULL)) 100 return -ENOMEM; 101 102 WARN_ON(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL_MAPPABLE && 103 !(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL)); 104 105 return 0; 106} 107 108/* 109 * Allocates storage for pointers to the pages that back the ttm. 110 */ 111static int ttm_tt_alloc_page_directory(struct ttm_tt *ttm) 112{ 113 ttm->pages = kvcalloc(ttm->num_pages, sizeof(void*), GFP_KERNEL); 114 if (!ttm->pages) 115 return -ENOMEM; 116 ttm->orders = kvmalloc_array(ttm->num_pages, 117 sizeof(unsigned long), GFP_KERNEL | __GFP_ZERO); 118 if (!ttm->orders) 119 return -ENOMEM; 120 return 0; 121} 122 123static int ttm_dma_tt_alloc_page_directory(struct ttm_tt *ttm) 124{ 125 ttm->pages = kvcalloc(ttm->num_pages, sizeof(*ttm->pages) + 126 sizeof(*ttm->dma_address), GFP_KERNEL); 127 if (!ttm->pages) 128 return -ENOMEM; 129 130 ttm->dma_address = (void *)(ttm->pages + ttm->num_pages); 131 132 ttm->orders = kvmalloc_array(ttm->num_pages, 133 sizeof(unsigned long), 134 GFP_KERNEL | __GFP_ZERO); 135 if (!ttm->orders) 136 return -ENOMEM; 137 return 0; 138} 139 140static int ttm_sg_tt_alloc_page_directory(struct ttm_tt *ttm) 141{ 142 ttm->dma_address = kvcalloc(ttm->num_pages, sizeof(*ttm->dma_address), 143 GFP_KERNEL); 144 if (!ttm->dma_address) 145 return -ENOMEM; 146 147 return 0; 148} 149 150void ttm_tt_destroy(struct ttm_device *bdev, struct ttm_tt *ttm) 151{ 152 bdev->funcs->ttm_tt_destroy(bdev, ttm); 153} 154 155static void ttm_tt_init_fields(struct ttm_tt *ttm, 156 struct ttm_buffer_object *bo, 157 uint32_t page_flags, 158 enum ttm_caching caching, 159 unsigned long extra_pages) 160{ 161 ttm->num_pages = (PAGE_ALIGN(bo->base.size) >> PAGE_SHIFT) + extra_pages; 162 ttm->page_flags = page_flags; 163 ttm->dma_address = NULL; 164 ttm->swap_storage = NULL; 165 ttm->sg = bo->sg; 166 ttm->caching = caching; 167 ttm->dmat = bo->bdev->dmat; 168 ttm->map = NULL; 169 ttm->segs = NULL; 170} 171 172int ttm_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo, 173 uint32_t page_flags, enum ttm_caching caching, 174 unsigned long extra_pages) 175{ 176 ttm_tt_init_fields(ttm, bo, page_flags, caching, extra_pages); 177 178 if (ttm_tt_alloc_page_directory(ttm)) { 179 pr_err("Failed allocating page table\n"); 180 return -ENOMEM; 181 } 182 return 0; 183} 184EXPORT_SYMBOL(ttm_tt_init); 185 186void ttm_tt_fini(struct ttm_tt *ttm) 187{ 188 WARN_ON(ttm->page_flags & TTM_TT_FLAG_PRIV_POPULATED); 189 190 if (ttm->swap_storage) 191 uao_detach(ttm->swap_storage); 192 ttm->swap_storage = NULL; 193 194 if (ttm->pages) 195 kvfree(ttm->pages); 196 else 197 kvfree(ttm->dma_address); 198 kvfree(ttm->orders); 199 ttm->pages = NULL; 200 ttm->dma_address = NULL; 201 ttm->orders = NULL; 202 203 if (ttm->map) 204 bus_dmamap_destroy(ttm->dmat, ttm->map); 205 if (ttm->segs) 206 km_free(ttm->segs, round_page(ttm->num_pages * 207 sizeof(bus_dma_segment_t)), &kv_any, &kp_zero); 208} 209EXPORT_SYMBOL(ttm_tt_fini); 210 211int ttm_sg_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo, 212 uint32_t page_flags, enum ttm_caching caching) 213{ 214 int ret; 215 int flags = BUS_DMA_WAITOK; 216 217 ttm_tt_init_fields(ttm, bo, page_flags, caching, 0); 218 219 if (page_flags & TTM_TT_FLAG_EXTERNAL) 220 ret = ttm_sg_tt_alloc_page_directory(ttm); 221 else 222 ret = ttm_dma_tt_alloc_page_directory(ttm); 223 if (ret) { 224 pr_err("Failed allocating page table\n"); 225 return -ENOMEM; 226 } 227 228 ttm->segs = km_alloc(round_page(ttm->num_pages * 229 sizeof(bus_dma_segment_t)), &kv_any, &kp_zero, &kd_waitok); 230 231 if (bo->bdev->pool.use_dma32 == false) 232 flags |= BUS_DMA_64BIT; 233 if (bus_dmamap_create(ttm->dmat, ttm->num_pages << PAGE_SHIFT, 234 ttm->num_pages, ttm->num_pages << PAGE_SHIFT, 0, flags, 235 &ttm->map)) { 236 km_free(ttm->segs, round_page(ttm->num_pages * 237 sizeof(bus_dma_segment_t)), &kv_any, &kp_zero); 238 if (ttm->pages) { 239 kvfree(ttm->pages); 240 kvfree(ttm->orders); 241 } else 242 kvfree(ttm->dma_address); 243 ttm->pages = NULL; 244 ttm->orders = NULL; 245 ttm->dma_address = NULL; 246 pr_err("Failed allocating page table\n"); 247 return -ENOMEM; 248 } 249 250 return 0; 251} 252EXPORT_SYMBOL(ttm_sg_tt_init); 253 254int ttm_tt_swapin(struct ttm_tt *ttm) 255{ 256 struct uvm_object *swap_storage; 257 struct vm_page *from_page; 258 struct vm_page *to_page; 259 struct pglist plist; 260 int i, ret; 261 262 swap_storage = ttm->swap_storage; 263 BUG_ON(swap_storage == NULL); 264 265 TAILQ_INIT(&plist); 266 if (uvm_obj_wire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT, 267 &plist)) { 268 ret = -ENOMEM; 269 goto out_err; 270 } 271 272 from_page = TAILQ_FIRST(&plist); 273 for (i = 0; i < ttm->num_pages; ++i) { 274 to_page = ttm->pages[i]; 275 if (unlikely(to_page == NULL)) { 276 ret = -ENOMEM; 277 goto out_err; 278 } 279 280 uvm_pagecopy(from_page, to_page); 281 from_page = TAILQ_NEXT(from_page, pageq); 282 } 283 284 uvm_obj_unwire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT); 285 286 uao_detach(swap_storage); 287 ttm->swap_storage = NULL; 288 ttm->page_flags &= ~TTM_TT_FLAG_SWAPPED; 289 290 return 0; 291 292out_err: 293 return ret; 294} 295 296/** 297 * ttm_tt_swapout - swap out tt object 298 * 299 * @bdev: TTM device structure. 300 * @ttm: The struct ttm_tt. 301 * @gfp_flags: Flags to use for memory allocation. 302 * 303 * Swapout a TT object to a shmem_file, return number of pages swapped out or 304 * negative error code. 305 */ 306int ttm_tt_swapout(struct ttm_device *bdev, struct ttm_tt *ttm, 307 gfp_t gfp_flags) 308{ 309 STUB(); 310 return -ENOSYS; 311#ifdef notyet 312 loff_t size = (loff_t)ttm->num_pages << PAGE_SHIFT; 313 struct uvm_object *swap_storage; 314 struct vm_page *from_page; 315 struct vm_page *to_page; 316 int i, ret; 317 318 swap_storage = uao_create(size, 0); 319#ifdef notyet 320 if (IS_ERR(swap_storage)) { 321 pr_err("Failed allocating swap storage\n"); 322 return PTR_ERR(swap_storage); 323 } 324#endif 325 326 for (i = 0; i < ttm->num_pages; ++i) { 327 from_page = ttm->pages[i]; 328 if (unlikely(from_page == NULL)) 329 continue; 330 331 to_page = shmem_read_mapping_page_gfp(swap_space, i, gfp_flags); 332 if (IS_ERR(to_page)) { 333 ret = PTR_ERR(to_page); 334 goto out_err; 335 } 336 copy_highpage(to_page, from_page); 337 set_page_dirty(to_page); 338 mark_page_accessed(to_page); 339 put_page(to_page); 340 } 341 342 ttm_tt_unpopulate(bdev, ttm); 343 ttm->swap_storage = swap_storage; 344 ttm->page_flags |= TTM_TT_FLAG_SWAPPED; 345 346 return ttm->num_pages; 347 348out_err: 349 uao_detach(swap_storage); 350 351 return ret; 352#endif 353} 354 355int ttm_tt_populate(struct ttm_device *bdev, 356 struct ttm_tt *ttm, struct ttm_operation_ctx *ctx) 357{ 358 int ret; 359 360 if (!ttm) 361 return -EINVAL; 362 363 if (ttm_tt_is_populated(ttm)) 364 return 0; 365 366 if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) { 367 atomic_long_add(ttm->num_pages, &ttm_pages_allocated); 368 if (bdev->pool.use_dma32) 369 atomic_long_add(ttm->num_pages, 370 &ttm_dma32_pages_allocated); 371 } 372 373 while (atomic_long_read(&ttm_pages_allocated) > ttm_pages_limit || 374 atomic_long_read(&ttm_dma32_pages_allocated) > 375 ttm_dma32_pages_limit) { 376 377 ret = ttm_global_swapout(ctx, GFP_KERNEL); 378 if (ret == 0) 379 break; 380 if (ret < 0) 381 goto error; 382 } 383 384 if (bdev->funcs->ttm_tt_populate) 385 ret = bdev->funcs->ttm_tt_populate(bdev, ttm, ctx); 386 else 387 ret = ttm_pool_alloc(&bdev->pool, ttm, ctx); 388 if (ret) 389 goto error; 390 391 ttm->page_flags |= TTM_TT_FLAG_PRIV_POPULATED; 392 if (unlikely(ttm->page_flags & TTM_TT_FLAG_SWAPPED)) { 393 ret = ttm_tt_swapin(ttm); 394 if (unlikely(ret != 0)) { 395 ttm_tt_unpopulate(bdev, ttm); 396 return ret; 397 } 398 } 399 400 return 0; 401 402error: 403 if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) { 404 atomic_long_sub(ttm->num_pages, &ttm_pages_allocated); 405 if (bdev->pool.use_dma32) 406 atomic_long_sub(ttm->num_pages, 407 &ttm_dma32_pages_allocated); 408 } 409 return ret; 410} 411EXPORT_SYMBOL(ttm_tt_populate); 412 413void ttm_tt_unpopulate(struct ttm_device *bdev, struct ttm_tt *ttm) 414{ 415 if (!ttm_tt_is_populated(ttm)) 416 return; 417 418 if (bdev->funcs->ttm_tt_unpopulate) 419 bdev->funcs->ttm_tt_unpopulate(bdev, ttm); 420 else 421 ttm_pool_free(&bdev->pool, ttm); 422 423 if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) { 424 atomic_long_sub(ttm->num_pages, &ttm_pages_allocated); 425 if (bdev->pool.use_dma32) 426 atomic_long_sub(ttm->num_pages, 427 &ttm_dma32_pages_allocated); 428 } 429 430 ttm->page_flags &= ~TTM_TT_FLAG_PRIV_POPULATED; 431} 432 433#ifdef CONFIG_DEBUG_FS 434 435/* Test the shrinker functions and dump the result */ 436static int ttm_tt_debugfs_shrink_show(struct seq_file *m, void *data) 437{ 438 struct ttm_operation_ctx ctx = { false, false }; 439 440 seq_printf(m, "%d\n", ttm_global_swapout(&ctx, GFP_KERNEL)); 441 return 0; 442} 443DEFINE_SHOW_ATTRIBUTE(ttm_tt_debugfs_shrink); 444 445#endif 446 447 448/* 449 * ttm_tt_mgr_init - register with the MM shrinker 450 * 451 * Register with the MM shrinker for swapping out BOs. 452 */ 453void ttm_tt_mgr_init(unsigned long num_pages, unsigned long num_dma32_pages) 454{ 455#ifdef CONFIG_DEBUG_FS 456 debugfs_create_file("tt_shrink", 0400, ttm_debugfs_root, NULL, 457 &ttm_tt_debugfs_shrink_fops); 458#endif 459 460 if (!ttm_pages_limit) 461 ttm_pages_limit = num_pages; 462 463 if (!ttm_dma32_pages_limit) 464 ttm_dma32_pages_limit = num_dma32_pages; 465} 466 467static void ttm_kmap_iter_tt_map_local(struct ttm_kmap_iter *iter, 468 struct iosys_map *dmap, 469 pgoff_t i, bus_space_tag_t bst) 470{ 471 struct ttm_kmap_iter_tt *iter_tt = 472 container_of(iter, typeof(*iter_tt), base); 473 474#ifdef __linux__ 475 iosys_map_set_vaddr(dmap, kmap_local_page_prot(iter_tt->tt->pages[i], 476 iter_tt->prot)); 477#else 478 iosys_map_set_vaddr(dmap, kmap_atomic_prot(iter_tt->tt->pages[i], 479 iter_tt->prot)); 480#endif 481} 482 483static void ttm_kmap_iter_tt_unmap_local(struct ttm_kmap_iter *iter, 484 struct iosys_map *map, bus_space_tag_t bst) 485{ 486#ifdef __linux__ 487 kunmap_local(map->vaddr); 488#else 489 kunmap_atomic(map->vaddr); 490#endif 491} 492 493static const struct ttm_kmap_iter_ops ttm_kmap_iter_tt_ops = { 494 .map_local = ttm_kmap_iter_tt_map_local, 495 .unmap_local = ttm_kmap_iter_tt_unmap_local, 496 .maps_tt = true, 497}; 498 499/** 500 * ttm_kmap_iter_tt_init - Initialize a struct ttm_kmap_iter_tt 501 * @iter_tt: The struct ttm_kmap_iter_tt to initialize. 502 * @tt: Struct ttm_tt holding page pointers of the struct ttm_resource. 503 * 504 * Return: Pointer to the embedded struct ttm_kmap_iter. 505 */ 506struct ttm_kmap_iter * 507ttm_kmap_iter_tt_init(struct ttm_kmap_iter_tt *iter_tt, 508 struct ttm_tt *tt) 509{ 510 iter_tt->base.ops = &ttm_kmap_iter_tt_ops; 511 iter_tt->tt = tt; 512 if (tt) 513 iter_tt->prot = ttm_prot_from_caching(tt->caching, PAGE_KERNEL); 514 else 515 iter_tt->prot = PAGE_KERNEL; 516 517 return &iter_tt->base; 518} 519EXPORT_SYMBOL(ttm_kmap_iter_tt_init); 520 521unsigned long ttm_tt_pages_limit(void) 522{ 523 return ttm_pages_limit; 524} 525EXPORT_SYMBOL(ttm_tt_pages_limit); 526