ttm_tt.c revision 1.8
1/* SPDX-License-Identifier: GPL-2.0 OR MIT */
2/**************************************************************************
3 *
4 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
5 * All Rights Reserved.
6 *
7 * Permission is hereby granted, free of charge, to any person obtaining a
8 * copy of this software and associated documentation files (the
9 * "Software"), to deal in the Software without restriction, including
10 * without limitation the rights to use, copy, modify, merge, publish,
11 * distribute, sub license, and/or sell copies of the Software, and to
12 * permit persons to whom the Software is furnished to do so, subject to
13 * the following conditions:
14 *
15 * The above copyright notice and this permission notice (including the
16 * next paragraph) shall be included in all copies or substantial portions
17 * of the Software.
18 *
19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
22 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
23 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
24 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
25 * USE OR OTHER DEALINGS IN THE SOFTWARE.
26 *
27 **************************************************************************/
28/*
29 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
30 */
31
32#define pr_fmt(fmt) "[TTM] " fmt
33
34#include <linux/sched.h>
35#include <linux/pagemap.h>
36#include <linux/shmem_fs.h>
37#include <linux/file.h>
38#include <linux/export.h>
39#include <drm/drm_cache.h>
40#include <drm/ttm/ttm_bo_driver.h>
41#include <drm/ttm/ttm_page_alloc.h>
42#include <drm/ttm/ttm_set_memory.h>
43
44/**
45 * Allocates a ttm structure for the given BO.
46 */
47int ttm_tt_create(struct ttm_buffer_object *bo, bool zero_alloc)
48{
49	struct ttm_bo_device *bdev = bo->bdev;
50	uint32_t page_flags = 0;
51
52	reservation_object_assert_held(bo->resv);
53
54	if (bdev->need_dma32)
55		page_flags |= TTM_PAGE_FLAG_DMA32;
56
57	if (bdev->no_retry)
58		page_flags |= TTM_PAGE_FLAG_NO_RETRY;
59
60	switch (bo->type) {
61	case ttm_bo_type_device:
62		if (zero_alloc)
63			page_flags |= TTM_PAGE_FLAG_ZERO_ALLOC;
64		break;
65	case ttm_bo_type_kernel:
66		break;
67	case ttm_bo_type_sg:
68		page_flags |= TTM_PAGE_FLAG_SG;
69		break;
70	default:
71		bo->ttm = NULL;
72		pr_err("Illegal buffer object type\n");
73		return -EINVAL;
74	}
75
76	bo->ttm = bdev->driver->ttm_tt_create(bo, page_flags);
77	if (unlikely(bo->ttm == NULL))
78		return -ENOMEM;
79
80	return 0;
81}
82
83/**
84 * Allocates storage for pointers to the pages that back the ttm.
85 */
86static int ttm_tt_alloc_page_directory(struct ttm_tt *ttm)
87{
88	ttm->pages = kvmalloc_array(ttm->num_pages, sizeof(void*),
89			GFP_KERNEL | __GFP_ZERO);
90	if (!ttm->pages)
91		return -ENOMEM;
92	return 0;
93}
94
95static int ttm_dma_tt_alloc_page_directory(struct ttm_dma_tt *ttm)
96{
97	ttm->ttm.pages = kvmalloc_array(ttm->ttm.num_pages,
98					  sizeof(*ttm->ttm.pages) +
99					  sizeof(*ttm->dma_address),
100					  GFP_KERNEL | __GFP_ZERO);
101	if (!ttm->ttm.pages)
102		return -ENOMEM;
103	ttm->dma_address = (void *) (ttm->ttm.pages + ttm->ttm.num_pages);
104	return 0;
105}
106
107static int ttm_sg_tt_alloc_page_directory(struct ttm_dma_tt *ttm)
108{
109	ttm->dma_address = kvmalloc_array(ttm->ttm.num_pages,
110					  sizeof(*ttm->dma_address),
111					  GFP_KERNEL | __GFP_ZERO);
112	if (!ttm->dma_address)
113		return -ENOMEM;
114	return 0;
115}
116
117static int ttm_tt_set_page_caching(struct vm_page *p,
118				   enum ttm_caching_state c_old,
119				   enum ttm_caching_state c_new)
120{
121	int ret = 0;
122
123	if (PageHighMem(p))
124		return 0;
125
126	if (c_old != tt_cached) {
127		/* p isn't in the default caching state, set it to
128		 * writeback first to free its current memtype. */
129
130		ret = ttm_set_pages_wb(p, 1);
131		if (ret)
132			return ret;
133	}
134
135	if (c_new == tt_wc)
136		ret = ttm_set_pages_wc(p, 1);
137	else if (c_new == tt_uncached)
138		ret = ttm_set_pages_uc(p, 1);
139
140	return ret;
141}
142
143/*
144 * Change caching policy for the linear kernel map
145 * for range of pages in a ttm.
146 */
147
148static int ttm_tt_set_caching(struct ttm_tt *ttm,
149			      enum ttm_caching_state c_state)
150{
151	int i, j;
152	struct vm_page *cur_page;
153	int ret;
154
155	if (ttm->caching_state == c_state)
156		return 0;
157
158	if (ttm->state == tt_unpopulated) {
159		/* Change caching but don't populate */
160		ttm->caching_state = c_state;
161		return 0;
162	}
163
164	if (ttm->caching_state == tt_cached)
165		drm_clflush_pages(ttm->pages, ttm->num_pages);
166
167	for (i = 0; i < ttm->num_pages; ++i) {
168		cur_page = ttm->pages[i];
169		if (likely(cur_page != NULL)) {
170			ret = ttm_tt_set_page_caching(cur_page,
171						      ttm->caching_state,
172						      c_state);
173			if (unlikely(ret != 0))
174				goto out_err;
175		}
176	}
177
178	ttm->caching_state = c_state;
179
180	return 0;
181
182out_err:
183	for (j = 0; j < i; ++j) {
184		cur_page = ttm->pages[j];
185		if (likely(cur_page != NULL)) {
186			(void)ttm_tt_set_page_caching(cur_page, c_state,
187						      ttm->caching_state);
188		}
189	}
190
191	return ret;
192}
193
194int ttm_tt_set_placement_caching(struct ttm_tt *ttm, uint32_t placement)
195{
196	enum ttm_caching_state state;
197
198	if (placement & TTM_PL_FLAG_WC)
199		state = tt_wc;
200	else if (placement & TTM_PL_FLAG_UNCACHED)
201		state = tt_uncached;
202	else
203		state = tt_cached;
204
205	return ttm_tt_set_caching(ttm, state);
206}
207EXPORT_SYMBOL(ttm_tt_set_placement_caching);
208
209void ttm_tt_destroy(struct ttm_tt *ttm)
210{
211	if (ttm == NULL)
212		return;
213
214	ttm_tt_unbind(ttm);
215
216	if (ttm->state == tt_unbound)
217		ttm_tt_unpopulate(ttm);
218
219	if (!(ttm->page_flags & TTM_PAGE_FLAG_PERSISTENT_SWAP) &&
220	    ttm->swap_storage)
221		uao_detach(ttm->swap_storage);
222
223	ttm->swap_storage = NULL;
224	ttm->func->destroy(ttm);
225}
226
227void ttm_tt_init_fields(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
228			uint32_t page_flags)
229{
230	ttm->bdev = bo->bdev;
231	ttm->num_pages = bo->num_pages;
232	ttm->caching_state = tt_cached;
233	ttm->page_flags = page_flags;
234	ttm->state = tt_unpopulated;
235	ttm->swap_storage = NULL;
236	ttm->sg = bo->sg;
237}
238
239int ttm_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
240		uint32_t page_flags)
241{
242	ttm_tt_init_fields(ttm, bo, page_flags);
243
244	if (ttm_tt_alloc_page_directory(ttm)) {
245		ttm_tt_destroy(ttm);
246		pr_err("Failed allocating page table\n");
247		return -ENOMEM;
248	}
249	return 0;
250}
251EXPORT_SYMBOL(ttm_tt_init);
252
253void ttm_tt_fini(struct ttm_tt *ttm)
254{
255	kvfree(ttm->pages);
256	ttm->pages = NULL;
257}
258EXPORT_SYMBOL(ttm_tt_fini);
259
260int ttm_dma_tt_init(struct ttm_dma_tt *ttm_dma, struct ttm_buffer_object *bo,
261		    uint32_t page_flags)
262{
263	struct ttm_tt *ttm = &ttm_dma->ttm;
264
265	ttm_tt_init_fields(ttm, bo, page_flags);
266
267	INIT_LIST_HEAD(&ttm_dma->pages_list);
268	if (ttm_dma_tt_alloc_page_directory(ttm_dma)) {
269		ttm_tt_destroy(ttm);
270		pr_err("Failed allocating page table\n");
271		return -ENOMEM;
272	}
273
274	ttm_dma->segs =  mallocarray(ttm->num_pages,
275	    sizeof(bus_dma_segment_t), M_DRM, M_WAITOK | M_ZERO);
276
277	ttm_dma->dmat = bo->bdev->dmat;
278
279	if (bus_dmamap_create(ttm_dma->dmat, ttm->num_pages << PAGE_SHIFT,
280	    ttm->num_pages, ttm->num_pages << PAGE_SHIFT, 0, BUS_DMA_WAITOK,
281	    &ttm_dma->map)) {
282		free(ttm_dma->segs, M_DRM, 0);
283		ttm_tt_destroy(ttm);
284		pr_err("Failed allocating page table\n");
285		return -ENOMEM;
286	}
287
288	return 0;
289}
290EXPORT_SYMBOL(ttm_dma_tt_init);
291
292int ttm_sg_tt_init(struct ttm_dma_tt *ttm_dma, struct ttm_buffer_object *bo,
293		   uint32_t page_flags)
294{
295	struct ttm_tt *ttm = &ttm_dma->ttm;
296	int ret;
297
298	ttm_tt_init_fields(ttm, bo, page_flags);
299
300	INIT_LIST_HEAD(&ttm_dma->pages_list);
301	if (page_flags & TTM_PAGE_FLAG_SG)
302		ret = ttm_sg_tt_alloc_page_directory(ttm_dma);
303	else
304		ret = ttm_dma_tt_alloc_page_directory(ttm_dma);
305	if (ret) {
306		ttm_tt_destroy(ttm);
307		pr_err("Failed allocating page table\n");
308		return -ENOMEM;
309	}
310
311	ttm_dma->segs =  mallocarray(ttm->num_pages,
312	    sizeof(bus_dma_segment_t), M_DRM, M_WAITOK | M_ZERO);
313
314	ttm_dma->dmat = bo->bdev->dmat;
315
316	if (bus_dmamap_create(ttm_dma->dmat, ttm->num_pages << PAGE_SHIFT,
317	    ttm->num_pages, ttm->num_pages << PAGE_SHIFT, 0, BUS_DMA_WAITOK,
318	    &ttm_dma->map)) {
319		free(ttm_dma->segs, M_DRM, 0);
320		ttm_tt_destroy(ttm);
321		pr_err("Failed allocating page table\n");
322		return -ENOMEM;
323	}
324
325	return 0;
326}
327EXPORT_SYMBOL(ttm_sg_tt_init);
328
329void ttm_dma_tt_fini(struct ttm_dma_tt *ttm_dma)
330{
331	struct ttm_tt *ttm = &ttm_dma->ttm;
332
333	if (ttm->pages)
334		kvfree(ttm->pages);
335	else
336		kvfree(ttm_dma->dma_address);
337	ttm->pages = NULL;
338	ttm_dma->dma_address = NULL;
339
340	bus_dmamap_destroy(ttm_dma->dmat, ttm_dma->map);
341	free(ttm_dma->segs, M_DRM, 0);
342}
343EXPORT_SYMBOL(ttm_dma_tt_fini);
344
345void ttm_tt_unbind(struct ttm_tt *ttm)
346{
347	int ret;
348
349	if (ttm->state == tt_bound) {
350		ret = ttm->func->unbind(ttm);
351		BUG_ON(ret);
352		ttm->state = tt_unbound;
353	}
354}
355
356int ttm_tt_bind(struct ttm_tt *ttm, struct ttm_mem_reg *bo_mem,
357		struct ttm_operation_ctx *ctx)
358{
359	int ret = 0;
360
361	if (!ttm)
362		return -EINVAL;
363
364	if (ttm->state == tt_bound)
365		return 0;
366
367	ret = ttm_tt_populate(ttm, ctx);
368	if (ret)
369		return ret;
370
371	ret = ttm->func->bind(ttm, bo_mem);
372	if (unlikely(ret != 0))
373		return ret;
374
375	ttm->state = tt_bound;
376
377	return 0;
378}
379EXPORT_SYMBOL(ttm_tt_bind);
380
381int ttm_tt_swapin(struct ttm_tt *ttm)
382{
383	struct uvm_object *swap_storage;
384	struct vm_page *from_page;
385	struct vm_page *to_page;
386	struct pglist plist;
387	int i;
388	int ret = -ENOMEM;
389
390	swap_storage = ttm->swap_storage;
391	BUG_ON(swap_storage == NULL);
392
393	TAILQ_INIT(&plist);
394	if (uvm_objwire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT, &plist))
395		goto out_err;
396
397	from_page = TAILQ_FIRST(&plist);
398	for (i = 0; i < ttm->num_pages; ++i) {
399		to_page = ttm->pages[i];
400		if (unlikely(to_page == NULL))
401			goto out_err;
402
403		uvm_pagecopy(from_page, to_page);
404		from_page = TAILQ_NEXT(from_page, pageq);
405	}
406
407	uvm_objunwire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT);
408
409	if (!(ttm->page_flags & TTM_PAGE_FLAG_PERSISTENT_SWAP))
410		uao_detach(swap_storage);
411	ttm->swap_storage = NULL;
412	ttm->page_flags &= ~TTM_PAGE_FLAG_SWAPPED;
413
414	return 0;
415out_err:
416	return ret;
417}
418
419int ttm_tt_swapout(struct ttm_tt *ttm, struct uvm_object *persistent_swap_storage)
420{
421	struct uvm_object *swap_storage;
422	struct vm_page *from_page;
423	struct vm_page *to_page;
424	struct pglist plist;
425	int i;
426	int ret = -ENOMEM;
427
428	BUG_ON(ttm->state != tt_unbound && ttm->state != tt_unpopulated);
429	BUG_ON(ttm->caching_state != tt_cached);
430
431	if (!persistent_swap_storage) {
432		swap_storage = uao_create(ttm->num_pages << PAGE_SHIFT, 0);
433#ifdef notyet
434		if (IS_ERR(swap_storage)) {
435			pr_err("Failed allocating swap storage\n");
436			return PTR_ERR(swap_storage);
437		}
438#endif
439	} else {
440		swap_storage = persistent_swap_storage;
441	}
442
443	TAILQ_INIT(&plist);
444	if (uvm_objwire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT, &plist))
445		goto out_err;
446
447	to_page = TAILQ_FIRST(&plist);
448	for (i = 0; i < ttm->num_pages; ++i) {
449		from_page = ttm->pages[i];
450		if (unlikely(from_page == NULL))
451			continue;
452
453		uvm_pagecopy(from_page, to_page);
454#ifdef notyet
455		set_page_dirty(to_page);
456		mark_page_accessed(to_page);
457#endif
458		to_page = TAILQ_NEXT(to_page, pageq);
459	}
460
461	uvm_objunwire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT);
462
463	ttm->bdev->driver->ttm_tt_unpopulate(ttm);
464	ttm->swap_storage = swap_storage;
465	ttm->page_flags |= TTM_PAGE_FLAG_SWAPPED;
466	if (persistent_swap_storage)
467		ttm->page_flags |= TTM_PAGE_FLAG_PERSISTENT_SWAP;
468
469	return 0;
470out_err:
471	if (!persistent_swap_storage)
472		uao_detach(swap_storage);
473
474	return ret;
475}
476
477static void ttm_tt_add_mapping(struct ttm_tt *ttm)
478{
479#ifdef __linux__
480	pgoff_t i;
481
482	if (ttm->page_flags & TTM_PAGE_FLAG_SG)
483		return;
484
485	for (i = 0; i < ttm->num_pages; ++i)
486		ttm->pages[i]->mapping = ttm->bdev->dev_mapping;
487#endif
488}
489
490int ttm_tt_populate(struct ttm_tt *ttm, struct ttm_operation_ctx *ctx)
491{
492	int ret;
493
494	if (ttm->state != tt_unpopulated)
495		return 0;
496
497	if (ttm->bdev->driver->ttm_tt_populate)
498		ret = ttm->bdev->driver->ttm_tt_populate(ttm, ctx);
499	else
500		ret = ttm_pool_populate(ttm, ctx);
501	if (!ret)
502		ttm_tt_add_mapping(ttm);
503	return ret;
504}
505
506static void ttm_tt_clear_mapping(struct ttm_tt *ttm)
507{
508	int i;
509	struct vm_page *page;
510
511	if (ttm->page_flags & TTM_PAGE_FLAG_SG)
512		return;
513
514	for (i = 0; i < ttm->num_pages; ++i) {
515		page = ttm->pages[i];
516		if (unlikely(page == NULL))
517			continue;
518		pmap_page_protect(page, PROT_NONE);
519	}
520}
521
522void ttm_tt_unpopulate(struct ttm_tt *ttm)
523{
524	if (ttm->state == tt_unpopulated)
525		return;
526
527	ttm_tt_clear_mapping(ttm);
528	if (ttm->bdev->driver->ttm_tt_unpopulate)
529		ttm->bdev->driver->ttm_tt_unpopulate(ttm);
530	else
531		ttm_pool_unpopulate(ttm);
532}
533