Linux Audio

Check our new training course

Loading...
v3.1
 
  1/**************************************************************************
  2 *
  3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
  4 * All Rights Reserved.
  5 *
  6 * Permission is hereby granted, free of charge, to any person obtaining a
  7 * copy of this software and associated documentation files (the
  8 * "Software"), to deal in the Software without restriction, including
  9 * without limitation the rights to use, copy, modify, merge, publish,
 10 * distribute, sub license, and/or sell copies of the Software, and to
 11 * permit persons to whom the Software is furnished to do so, subject to
 12 * the following conditions:
 13 *
 14 * The above copyright notice and this permission notice (including the
 15 * next paragraph) shall be included in all copies or substantial portions
 16 * of the Software.
 17 *
 18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
 21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
 22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
 23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
 24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
 25 *
 26 **************************************************************************/
 27/*
 28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
 29 */
 30
 
 
 
 31#include <linux/sched.h>
 32#include <linux/highmem.h>
 33#include <linux/pagemap.h>
 34#include <linux/shmem_fs.h>
 35#include <linux/file.h>
 36#include <linux/swap.h>
 37#include <linux/slab.h>
 38#include "drm_cache.h"
 39#include "drm_mem_util.h"
 40#include "ttm/ttm_module.h"
 41#include "ttm/ttm_bo_driver.h"
 42#include "ttm/ttm_placement.h"
 43#include "ttm/ttm_page_alloc.h"
 44
 45static int ttm_tt_swapin(struct ttm_tt *ttm);
 46
 47/**
 48 * Allocates storage for pointers to the pages that back the ttm.
 49 */
 50static void ttm_tt_alloc_page_directory(struct ttm_tt *ttm)
 51{
 52	ttm->pages = drm_calloc_large(ttm->num_pages, sizeof(*ttm->pages));
 53	ttm->dma_address = drm_calloc_large(ttm->num_pages,
 54					    sizeof(*ttm->dma_address));
 55}
 56
 57static void ttm_tt_free_page_directory(struct ttm_tt *ttm)
 58{
 59	drm_free_large(ttm->pages);
 60	ttm->pages = NULL;
 61	drm_free_large(ttm->dma_address);
 62	ttm->dma_address = NULL;
 63}
 64
 65static void ttm_tt_free_user_pages(struct ttm_tt *ttm)
 66{
 67	int write;
 68	int dirty;
 69	struct page *page;
 70	int i;
 71	struct ttm_backend *be = ttm->be;
 72
 73	BUG_ON(!(ttm->page_flags & TTM_PAGE_FLAG_USER));
 74	write = ((ttm->page_flags & TTM_PAGE_FLAG_WRITE) != 0);
 75	dirty = ((ttm->page_flags & TTM_PAGE_FLAG_USER_DIRTY) != 0);
 76
 77	if (be)
 78		be->func->clear(be);
 79
 80	for (i = 0; i < ttm->num_pages; ++i) {
 81		page = ttm->pages[i];
 82		if (page == NULL)
 83			continue;
 84
 85		if (page == ttm->dummy_read_page) {
 86			BUG_ON(write);
 87			continue;
 88		}
 89
 90		if (write && dirty && !PageReserved(page))
 91			set_page_dirty_lock(page);
 92
 93		ttm->pages[i] = NULL;
 94		ttm_mem_global_free(ttm->glob->mem_glob, PAGE_SIZE);
 95		put_page(page);
 96	}
 97	ttm->state = tt_unpopulated;
 98	ttm->first_himem_page = ttm->num_pages;
 99	ttm->last_lomem_page = -1;
100}
101
102static struct page *__ttm_tt_get_page(struct ttm_tt *ttm, int index)
103{
104	struct page *p;
105	struct list_head h;
106	struct ttm_mem_global *mem_glob = ttm->glob->mem_glob;
107	int ret;
108
109	while (NULL == (p = ttm->pages[index])) {
110
111		INIT_LIST_HEAD(&h);
112
113		ret = ttm_get_pages(&h, ttm->page_flags, ttm->caching_state, 1,
114				    &ttm->dma_address[index]);
115
116		if (ret != 0)
117			return NULL;
118
119		p = list_first_entry(&h, struct page, lru);
120
121		ret = ttm_mem_global_alloc_page(mem_glob, p, false, false);
122		if (unlikely(ret != 0))
123			goto out_err;
124
125		if (PageHighMem(p))
126			ttm->pages[--ttm->first_himem_page] = p;
127		else
128			ttm->pages[++ttm->last_lomem_page] = p;
129	}
130	return p;
131out_err:
132	put_page(p);
133	return NULL;
134}
135
136struct page *ttm_tt_get_page(struct ttm_tt *ttm, int index)
137{
138	int ret;
 
 
139
140	if (unlikely(ttm->page_flags & TTM_PAGE_FLAG_SWAPPED)) {
141		ret = ttm_tt_swapin(ttm);
142		if (unlikely(ret != 0))
143			return NULL;
144	}
145	return __ttm_tt_get_page(ttm, index);
146}
147
148int ttm_tt_populate(struct ttm_tt *ttm)
149{
150	struct page *page;
151	unsigned long i;
152	struct ttm_backend *be;
153	int ret;
154
155	if (ttm->state != tt_unpopulated)
156		return 0;
157
158	if (unlikely(ttm->page_flags & TTM_PAGE_FLAG_SWAPPED)) {
159		ret = ttm_tt_swapin(ttm);
160		if (unlikely(ret != 0))
161			return ret;
 
 
 
 
 
 
 
 
 
162	}
163
164	be = ttm->be;
165
166	for (i = 0; i < ttm->num_pages; ++i) {
167		page = __ttm_tt_get_page(ttm, i);
168		if (!page)
169			return -ENOMEM;
 
170	}
171
172	be->func->populate(be, ttm->num_pages, ttm->pages,
173			   ttm->dummy_read_page, ttm->dma_address);
174	ttm->state = tt_unbound;
175	return 0;
176}
177EXPORT_SYMBOL(ttm_tt_populate);
178
179#ifdef CONFIG_X86
180static inline int ttm_tt_set_page_caching(struct page *p,
181					  enum ttm_caching_state c_old,
182					  enum ttm_caching_state c_new)
183{
184	int ret = 0;
185
186	if (PageHighMem(p))
187		return 0;
188
189	if (c_old != tt_cached) {
190		/* p isn't in the default caching state, set it to
191		 * writeback first to free its current memtype. */
192
193		ret = set_pages_wb(p, 1);
194		if (ret)
195			return ret;
196	}
197
198	if (c_new == tt_wc)
199		ret = set_memory_wc((unsigned long) page_address(p), 1);
200	else if (c_new == tt_uncached)
201		ret = set_pages_uc(p, 1);
202
203	return ret;
204}
205#else /* CONFIG_X86 */
206static inline int ttm_tt_set_page_caching(struct page *p,
207					  enum ttm_caching_state c_old,
208					  enum ttm_caching_state c_new)
209{
210	return 0;
211}
212#endif /* CONFIG_X86 */
213
214/*
215 * Change caching policy for the linear kernel map
216 * for range of pages in a ttm.
217 */
218
219static int ttm_tt_set_caching(struct ttm_tt *ttm,
220			      enum ttm_caching_state c_state)
221{
222	int i, j;
223	struct page *cur_page;
224	int ret;
225
226	if (ttm->caching_state == c_state)
227		return 0;
228
229	if (ttm->state == tt_unpopulated) {
230		/* Change caching but don't populate */
231		ttm->caching_state = c_state;
232		return 0;
233	}
234
235	if (ttm->caching_state == tt_cached)
236		drm_clflush_pages(ttm->pages, ttm->num_pages);
237
238	for (i = 0; i < ttm->num_pages; ++i) {
239		cur_page = ttm->pages[i];
240		if (likely(cur_page != NULL)) {
241			ret = ttm_tt_set_page_caching(cur_page,
242						      ttm->caching_state,
243						      c_state);
244			if (unlikely(ret != 0))
245				goto out_err;
246		}
247	}
248
249	ttm->caching_state = c_state;
250
251	return 0;
252
253out_err:
254	for (j = 0; j < i; ++j) {
255		cur_page = ttm->pages[j];
256		if (likely(cur_page != NULL)) {
257			(void)ttm_tt_set_page_caching(cur_page, c_state,
258						      ttm->caching_state);
259		}
260	}
261
262	return ret;
263}
264
265int ttm_tt_set_placement_caching(struct ttm_tt *ttm, uint32_t placement)
266{
267	enum ttm_caching_state state;
268
269	if (placement & TTM_PL_FLAG_WC)
270		state = tt_wc;
271	else if (placement & TTM_PL_FLAG_UNCACHED)
272		state = tt_uncached;
273	else
274		state = tt_cached;
275
276	return ttm_tt_set_caching(ttm, state);
 
277}
278EXPORT_SYMBOL(ttm_tt_set_placement_caching);
279
280static void ttm_tt_free_alloced_pages(struct ttm_tt *ttm)
281{
282	int i;
283	unsigned count = 0;
284	struct list_head h;
285	struct page *cur_page;
286	struct ttm_backend *be = ttm->be;
287
288	INIT_LIST_HEAD(&h);
289
290	if (be)
291		be->func->clear(be);
292	for (i = 0; i < ttm->num_pages; ++i) {
293
294		cur_page = ttm->pages[i];
295		ttm->pages[i] = NULL;
296		if (cur_page) {
297			if (page_count(cur_page) != 1)
298				printk(KERN_ERR TTM_PFX
299				       "Erroneous page count. "
300				       "Leaking pages.\n");
301			ttm_mem_global_free_page(ttm->glob->mem_glob,
302						 cur_page);
303			list_add(&cur_page->lru, &h);
304			count++;
305		}
306	}
307	ttm_put_pages(&h, count, ttm->page_flags, ttm->caching_state,
308		      ttm->dma_address);
309	ttm->state = tt_unpopulated;
310	ttm->first_himem_page = ttm->num_pages;
311	ttm->last_lomem_page = -1;
312}
313
314void ttm_tt_destroy(struct ttm_tt *ttm)
315{
316	struct ttm_backend *be;
317
318	if (unlikely(ttm == NULL))
319		return;
320
321	be = ttm->be;
322	if (likely(be != NULL)) {
323		be->func->destroy(be);
324		ttm->be = NULL;
325	}
326
327	if (likely(ttm->pages != NULL)) {
328		if (ttm->page_flags & TTM_PAGE_FLAG_USER)
329			ttm_tt_free_user_pages(ttm);
330		else
331			ttm_tt_free_alloced_pages(ttm);
332
333		ttm_tt_free_page_directory(ttm);
334	}
335
336	if (!(ttm->page_flags & TTM_PAGE_FLAG_PERSISTENT_SWAP) &&
337	    ttm->swap_storage)
338		fput(ttm->swap_storage);
339
340	kfree(ttm);
341}
 
342
343int ttm_tt_set_user(struct ttm_tt *ttm,
344		    struct task_struct *tsk,
345		    unsigned long start, unsigned long num_pages)
 
 
346{
347	struct mm_struct *mm = tsk->mm;
348	int ret;
349	int write = (ttm->page_flags & TTM_PAGE_FLAG_WRITE) != 0;
350	struct ttm_mem_global *mem_glob = ttm->glob->mem_glob;
351
352	BUG_ON(num_pages != ttm->num_pages);
353	BUG_ON((ttm->page_flags & TTM_PAGE_FLAG_USER) == 0);
354
355	/**
356	 * Account user pages as lowmem pages for now.
357	 */
 
 
358
359	ret = ttm_mem_global_alloc(mem_glob, num_pages * PAGE_SIZE,
360				   false, false);
361	if (unlikely(ret != 0))
362		return ret;
363
364	down_read(&mm->mmap_sem);
365	ret = get_user_pages(tsk, mm, start, num_pages,
366			     write, 0, ttm->pages, NULL);
367	up_read(&mm->mmap_sem);
368
369	if (ret != num_pages && write) {
370		ttm_tt_free_user_pages(ttm);
371		ttm_mem_global_free(mem_glob, num_pages * PAGE_SIZE);
372		return -ENOMEM;
373	}
374
375	ttm->tsk = tsk;
376	ttm->start = start;
377	ttm->state = tt_unbound;
378
379	return 0;
380}
 
381
382struct ttm_tt *ttm_tt_create(struct ttm_bo_device *bdev, unsigned long size,
383			     uint32_t page_flags, struct page *dummy_read_page)
384{
385	struct ttm_bo_driver *bo_driver = bdev->driver;
386	struct ttm_tt *ttm;
387
388	if (!bo_driver)
389		return NULL;
390
391	ttm = kzalloc(sizeof(*ttm), GFP_KERNEL);
392	if (!ttm)
393		return NULL;
394
395	ttm->glob = bdev->glob;
396	ttm->num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
397	ttm->first_himem_page = ttm->num_pages;
398	ttm->last_lomem_page = -1;
399	ttm->caching_state = tt_cached;
400	ttm->page_flags = page_flags;
401
402	ttm->dummy_read_page = dummy_read_page;
403
404	ttm_tt_alloc_page_directory(ttm);
405	if (!ttm->pages) {
406		ttm_tt_destroy(ttm);
407		printk(KERN_ERR TTM_PFX "Failed allocating page table\n");
408		return NULL;
409	}
410	ttm->be = bo_driver->create_ttm_backend_entry(bdev);
411	if (!ttm->be) {
412		ttm_tt_destroy(ttm);
413		printk(KERN_ERR TTM_PFX "Failed creating ttm backend entry\n");
414		return NULL;
415	}
416	ttm->state = tt_unpopulated;
417	return ttm;
418}
 
419
420void ttm_tt_unbind(struct ttm_tt *ttm)
 
421{
422	int ret;
423	struct ttm_backend *be = ttm->be;
424
425	if (ttm->state == tt_bound) {
426		ret = be->func->unbind(be);
427		BUG_ON(ret);
428		ttm->state = tt_unbound;
429	}
430}
431
432int ttm_tt_bind(struct ttm_tt *ttm, struct ttm_mem_reg *bo_mem)
433{
434	int ret = 0;
435	struct ttm_backend *be;
436
437	if (!ttm)
438		return -EINVAL;
439
440	if (ttm->state == tt_bound)
441		return 0;
442
443	be = ttm->be;
444
445	ret = ttm_tt_populate(ttm);
446	if (ret)
447		return ret;
448
449	ret = be->func->bind(be, bo_mem);
450	if (unlikely(ret != 0))
451		return ret;
452
453	ttm->state = tt_bound;
454
455	if (ttm->page_flags & TTM_PAGE_FLAG_USER)
456		ttm->page_flags |= TTM_PAGE_FLAG_USER_DIRTY;
457	return 0;
458}
459EXPORT_SYMBOL(ttm_tt_bind);
460
461static int ttm_tt_swapin(struct ttm_tt *ttm)
462{
463	struct address_space *swap_space;
464	struct file *swap_storage;
465	struct page *from_page;
466	struct page *to_page;
467	void *from_virtual;
468	void *to_virtual;
469	int i;
470	int ret = -ENOMEM;
471
472	if (ttm->page_flags & TTM_PAGE_FLAG_USER) {
473		ret = ttm_tt_set_user(ttm, ttm->tsk, ttm->start,
474				      ttm->num_pages);
475		if (unlikely(ret != 0))
476			return ret;
477
478		ttm->page_flags &= ~TTM_PAGE_FLAG_SWAPPED;
479		return 0;
480	}
481
482	swap_storage = ttm->swap_storage;
483	BUG_ON(swap_storage == NULL);
484
485	swap_space = swap_storage->f_path.dentry->d_inode->i_mapping;
 
486
487	for (i = 0; i < ttm->num_pages; ++i) {
488		from_page = shmem_read_mapping_page(swap_space, i);
 
489		if (IS_ERR(from_page)) {
490			ret = PTR_ERR(from_page);
491			goto out_err;
492		}
493		to_page = __ttm_tt_get_page(ttm, i);
494		if (unlikely(to_page == NULL))
 
495			goto out_err;
 
496
497		preempt_disable();
498		from_virtual = kmap_atomic(from_page, KM_USER0);
499		to_virtual = kmap_atomic(to_page, KM_USER1);
500		memcpy(to_virtual, from_virtual, PAGE_SIZE);
501		kunmap_atomic(to_virtual, KM_USER1);
502		kunmap_atomic(from_virtual, KM_USER0);
503		preempt_enable();
504		page_cache_release(from_page);
505	}
506
507	if (!(ttm->page_flags & TTM_PAGE_FLAG_PERSISTENT_SWAP))
508		fput(swap_storage);
509	ttm->swap_storage = NULL;
510	ttm->page_flags &= ~TTM_PAGE_FLAG_SWAPPED;
511
512	return 0;
 
513out_err:
514	ttm_tt_free_alloced_pages(ttm);
515	return ret;
516}
517
518int ttm_tt_swapout(struct ttm_tt *ttm, struct file *persistent_swap_storage)
 
 
 
 
 
 
 
 
 
 
 
519{
 
520	struct address_space *swap_space;
521	struct file *swap_storage;
522	struct page *from_page;
523	struct page *to_page;
524	void *from_virtual;
525	void *to_virtual;
526	int i;
527	int ret = -ENOMEM;
528
529	BUG_ON(ttm->state != tt_unbound && ttm->state != tt_unpopulated);
530	BUG_ON(ttm->caching_state != tt_cached);
531
532	/*
533	 * For user buffers, just unpin the pages, as there should be
534	 * vma references.
535	 */
536
537	if (ttm->page_flags & TTM_PAGE_FLAG_USER) {
538		ttm_tt_free_user_pages(ttm);
539		ttm->page_flags |= TTM_PAGE_FLAG_SWAPPED;
540		ttm->swap_storage = NULL;
541		return 0;
542	}
543
544	if (!persistent_swap_storage) {
545		swap_storage = shmem_file_setup("ttm swap",
546						ttm->num_pages << PAGE_SHIFT,
547						0);
548		if (unlikely(IS_ERR(swap_storage))) {
549			printk(KERN_ERR "Failed allocating swap storage.\n");
550			return PTR_ERR(swap_storage);
551		}
552	} else
553		swap_storage = persistent_swap_storage;
554
555	swap_space = swap_storage->f_path.dentry->d_inode->i_mapping;
556
557	for (i = 0; i < ttm->num_pages; ++i) {
558		from_page = ttm->pages[i];
559		if (unlikely(from_page == NULL))
560			continue;
561		to_page = shmem_read_mapping_page(swap_space, i);
562		if (unlikely(IS_ERR(to_page))) {
 
563			ret = PTR_ERR(to_page);
564			goto out_err;
565		}
566		preempt_disable();
567		from_virtual = kmap_atomic(from_page, KM_USER0);
568		to_virtual = kmap_atomic(to_page, KM_USER1);
569		memcpy(to_virtual, from_virtual, PAGE_SIZE);
570		kunmap_atomic(to_virtual, KM_USER1);
571		kunmap_atomic(from_virtual, KM_USER0);
572		preempt_enable();
573		set_page_dirty(to_page);
574		mark_page_accessed(to_page);
575		page_cache_release(to_page);
576	}
577
578	ttm_tt_free_alloced_pages(ttm);
579	ttm->swap_storage = swap_storage;
580	ttm->page_flags |= TTM_PAGE_FLAG_SWAPPED;
581	if (persistent_swap_storage)
582		ttm->page_flags |= TTM_PAGE_FLAG_PERSISTENT_SWAP;
583
584	return 0;
585out_err:
586	if (!persistent_swap_storage)
587		fput(swap_storage);
588
589	return ret;
590}
v6.9.4
  1/* SPDX-License-Identifier: GPL-2.0 OR MIT */
  2/**************************************************************************
  3 *
  4 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
  5 * All Rights Reserved.
  6 *
  7 * Permission is hereby granted, free of charge, to any person obtaining a
  8 * copy of this software and associated documentation files (the
  9 * "Software"), to deal in the Software without restriction, including
 10 * without limitation the rights to use, copy, modify, merge, publish,
 11 * distribute, sub license, and/or sell copies of the Software, and to
 12 * permit persons to whom the Software is furnished to do so, subject to
 13 * the following conditions:
 14 *
 15 * The above copyright notice and this permission notice (including the
 16 * next paragraph) shall be included in all copies or substantial portions
 17 * of the Software.
 18 *
 19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
 22 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
 23 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
 24 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
 25 * USE OR OTHER DEALINGS IN THE SOFTWARE.
 26 *
 27 **************************************************************************/
 28/*
 29 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
 30 */
 31
 32#define pr_fmt(fmt) "[TTM] " fmt
 33
 34#include <linux/cc_platform.h>
 35#include <linux/sched.h>
 
 
 36#include <linux/shmem_fs.h>
 37#include <linux/file.h>
 38#include <linux/module.h>
 39#include <drm/drm_cache.h>
 40#include <drm/drm_device.h>
 41#include <drm/drm_util.h>
 42#include <drm/ttm/ttm_bo.h>
 43#include <drm/ttm/ttm_tt.h>
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 44
 45#include "ttm_module.h"
 
 46
 47static unsigned long ttm_pages_limit;
 
 
 
 48
 49MODULE_PARM_DESC(pages_limit, "Limit for the allocated pages");
 50module_param_named(pages_limit, ttm_pages_limit, ulong, 0644);
 
 
 51
 52static unsigned long ttm_dma32_pages_limit;
 
 53
 54MODULE_PARM_DESC(dma32_pages_limit, "Limit for the allocated DMA32 pages");
 55module_param_named(dma32_pages_limit, ttm_dma32_pages_limit, ulong, 0644);
 
 
 
 
 
 
 56
 57static atomic_long_t ttm_pages_allocated;
 58static atomic_long_t ttm_dma32_pages_allocated;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 59
 60/*
 61 * Allocates a ttm structure for the given BO.
 62 */
 63int ttm_tt_create(struct ttm_buffer_object *bo, bool zero_alloc)
 
 
 
 
 
 
 
 
 64{
 65	struct ttm_device *bdev = bo->bdev;
 66	struct drm_device *ddev = bo->base.dev;
 67	uint32_t page_flags = 0;
 68
 69	dma_resv_assert_held(bo->base.resv);
 
 
 
 
 
 
 70
 71	if (bo->ttm)
 
 
 
 
 
 
 
 72		return 0;
 73
 74	switch (bo->type) {
 75	case ttm_bo_type_device:
 76		if (zero_alloc)
 77			page_flags |= TTM_TT_FLAG_ZERO_ALLOC;
 78		break;
 79	case ttm_bo_type_kernel:
 80		break;
 81	case ttm_bo_type_sg:
 82		page_flags |= TTM_TT_FLAG_EXTERNAL;
 83		break;
 84	default:
 85		pr_err("Illegal buffer object type\n");
 86		return -EINVAL;
 87	}
 88	/*
 89	 * When using dma_alloc_coherent with memory encryption the
 90	 * mapped TT pages need to be decrypted or otherwise the drivers
 91	 * will end up sending encrypted mem to the gpu.
 92	 */
 93	if (bdev->pool.use_dma_alloc && cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
 94		page_flags |= TTM_TT_FLAG_DECRYPTED;
 95		drm_info_once(ddev, "TT memory decryption enabled.");
 96	}
 97
 98	bo->ttm = bdev->funcs->ttm_tt_create(bo, page_flags);
 99	if (unlikely(bo->ttm == NULL))
100		return -ENOMEM;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
101
102	WARN_ON(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL_MAPPABLE &&
103		!(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL));
 
 
104
 
 
 
 
 
 
 
105	return 0;
106}
107EXPORT_SYMBOL_FOR_TESTS_ONLY(ttm_tt_create);
108
109/*
110 * Allocates storage for pointers to the pages that back the ttm.
 
111 */
112static int ttm_tt_alloc_page_directory(struct ttm_tt *ttm)
 
 
113{
114	ttm->pages = kvcalloc(ttm->num_pages, sizeof(void*), GFP_KERNEL);
115	if (!ttm->pages)
116		return -ENOMEM;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
117
118	return 0;
 
 
 
 
 
 
 
 
 
 
 
119}
120
121static int ttm_dma_tt_alloc_page_directory(struct ttm_tt *ttm)
122{
123	ttm->pages = kvcalloc(ttm->num_pages, sizeof(*ttm->pages) +
124			      sizeof(*ttm->dma_address), GFP_KERNEL);
125	if (!ttm->pages)
126		return -ENOMEM;
 
 
 
 
127
128	ttm->dma_address = (void *)(ttm->pages + ttm->num_pages);
129	return 0;
130}
 
131
132static int ttm_sg_tt_alloc_page_directory(struct ttm_tt *ttm)
133{
134	ttm->dma_address = kvcalloc(ttm->num_pages, sizeof(*ttm->dma_address),
135				    GFP_KERNEL);
136	if (!ttm->dma_address)
137		return -ENOMEM;
 
 
 
 
 
 
 
138
139	return 0;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
140}
141
142void ttm_tt_destroy(struct ttm_device *bdev, struct ttm_tt *ttm)
143{
144	bdev->funcs->ttm_tt_destroy(bdev, ttm);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
145}
146EXPORT_SYMBOL_FOR_TESTS_ONLY(ttm_tt_destroy);
147
148static void ttm_tt_init_fields(struct ttm_tt *ttm,
149			       struct ttm_buffer_object *bo,
150			       uint32_t page_flags,
151			       enum ttm_caching caching,
152			       unsigned long extra_pages)
153{
154	ttm->num_pages = (PAGE_ALIGN(bo->base.size) >> PAGE_SHIFT) + extra_pages;
155	ttm->page_flags = page_flags;
156	ttm->dma_address = NULL;
157	ttm->swap_storage = NULL;
158	ttm->sg = bo->sg;
159	ttm->caching = caching;
160}
161
162int ttm_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
163		uint32_t page_flags, enum ttm_caching caching,
164		unsigned long extra_pages)
165{
166	ttm_tt_init_fields(ttm, bo, page_flags, caching, extra_pages);
167
168	if (ttm_tt_alloc_page_directory(ttm)) {
169		pr_err("Failed allocating page table\n");
 
 
 
 
 
 
 
 
 
 
 
170		return -ENOMEM;
171	}
 
 
 
 
 
172	return 0;
173}
174EXPORT_SYMBOL(ttm_tt_init);
175
176void ttm_tt_fini(struct ttm_tt *ttm)
 
177{
178	WARN_ON(ttm->page_flags & TTM_TT_FLAG_PRIV_POPULATED);
 
179
180	if (ttm->swap_storage)
181		fput(ttm->swap_storage);
182	ttm->swap_storage = NULL;
 
 
 
 
 
 
 
 
 
 
 
 
183
184	if (ttm->pages)
185		kvfree(ttm->pages);
186	else
187		kvfree(ttm->dma_address);
188	ttm->pages = NULL;
189	ttm->dma_address = NULL;
 
 
 
 
 
 
 
 
190}
191EXPORT_SYMBOL(ttm_tt_fini);
192
193int ttm_sg_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
194		   uint32_t page_flags, enum ttm_caching caching)
195{
196	int ret;
 
 
 
 
 
 
 
 
197
198	ttm_tt_init_fields(ttm, bo, page_flags, caching, 0);
 
 
 
 
 
 
199
200	if (page_flags & TTM_TT_FLAG_EXTERNAL)
201		ret = ttm_sg_tt_alloc_page_directory(ttm);
202	else
203		ret = ttm_dma_tt_alloc_page_directory(ttm);
204	if (ret) {
205		pr_err("Failed allocating page table\n");
206		return -ENOMEM;
207	}
 
 
 
 
 
 
 
 
 
208	return 0;
209}
210EXPORT_SYMBOL(ttm_sg_tt_init);
211
212int ttm_tt_swapin(struct ttm_tt *ttm)
213{
214	struct address_space *swap_space;
215	struct file *swap_storage;
216	struct page *from_page;
217	struct page *to_page;
218	gfp_t gfp_mask;
219	int i, ret;
 
 
 
 
 
 
 
 
 
 
 
 
220
221	swap_storage = ttm->swap_storage;
222	BUG_ON(swap_storage == NULL);
223
224	swap_space = swap_storage->f_mapping;
225	gfp_mask = mapping_gfp_mask(swap_space);
226
227	for (i = 0; i < ttm->num_pages; ++i) {
228		from_page = shmem_read_mapping_page_gfp(swap_space, i,
229							gfp_mask);
230		if (IS_ERR(from_page)) {
231			ret = PTR_ERR(from_page);
232			goto out_err;
233		}
234		to_page = ttm->pages[i];
235		if (unlikely(to_page == NULL)) {
236			ret = -ENOMEM;
237			goto out_err;
238		}
239
240		copy_highpage(to_page, from_page);
241		put_page(from_page);
 
 
 
 
 
 
242	}
243
244	fput(swap_storage);
 
245	ttm->swap_storage = NULL;
246	ttm->page_flags &= ~TTM_TT_FLAG_SWAPPED;
247
248	return 0;
249
250out_err:
 
251	return ret;
252}
253
254/**
255 * ttm_tt_swapout - swap out tt object
256 *
257 * @bdev: TTM device structure.
258 * @ttm: The struct ttm_tt.
259 * @gfp_flags: Flags to use for memory allocation.
260 *
261 * Swapout a TT object to a shmem_file, return number of pages swapped out or
262 * negative error code.
263 */
264int ttm_tt_swapout(struct ttm_device *bdev, struct ttm_tt *ttm,
265		   gfp_t gfp_flags)
266{
267	loff_t size = (loff_t)ttm->num_pages << PAGE_SHIFT;
268	struct address_space *swap_space;
269	struct file *swap_storage;
270	struct page *from_page;
271	struct page *to_page;
272	int i, ret;
 
 
 
 
 
 
273
274	swap_storage = shmem_file_setup("ttm swap", size, 0);
275	if (IS_ERR(swap_storage)) {
276		pr_err("Failed allocating swap storage\n");
277		return PTR_ERR(swap_storage);
 
 
 
 
 
 
278	}
279
280	swap_space = swap_storage->f_mapping;
281	gfp_flags &= mapping_gfp_mask(swap_space);
 
 
 
 
 
 
 
 
 
 
282
283	for (i = 0; i < ttm->num_pages; ++i) {
284		from_page = ttm->pages[i];
285		if (unlikely(from_page == NULL))
286			continue;
287
288		to_page = shmem_read_mapping_page_gfp(swap_space, i, gfp_flags);
289		if (IS_ERR(to_page)) {
290			ret = PTR_ERR(to_page);
291			goto out_err;
292		}
293		copy_highpage(to_page, from_page);
 
 
 
 
 
 
294		set_page_dirty(to_page);
295		mark_page_accessed(to_page);
296		put_page(to_page);
297	}
298
299	ttm_tt_unpopulate(bdev, ttm);
300	ttm->swap_storage = swap_storage;
301	ttm->page_flags |= TTM_TT_FLAG_SWAPPED;
302
303	return ttm->num_pages;
304
 
305out_err:
306	fput(swap_storage);
 
307
308	return ret;
309}
310
311int ttm_tt_populate(struct ttm_device *bdev,
312		    struct ttm_tt *ttm, struct ttm_operation_ctx *ctx)
313{
314	int ret;
315
316	if (!ttm)
317		return -EINVAL;
318
319	if (ttm_tt_is_populated(ttm))
320		return 0;
321
322	if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
323		atomic_long_add(ttm->num_pages, &ttm_pages_allocated);
324		if (bdev->pool.use_dma32)
325			atomic_long_add(ttm->num_pages,
326					&ttm_dma32_pages_allocated);
327	}
328
329	while (atomic_long_read(&ttm_pages_allocated) > ttm_pages_limit ||
330	       atomic_long_read(&ttm_dma32_pages_allocated) >
331	       ttm_dma32_pages_limit) {
332
333		ret = ttm_global_swapout(ctx, GFP_KERNEL);
334		if (ret == 0)
335			break;
336		if (ret < 0)
337			goto error;
338	}
339
340	if (bdev->funcs->ttm_tt_populate)
341		ret = bdev->funcs->ttm_tt_populate(bdev, ttm, ctx);
342	else
343		ret = ttm_pool_alloc(&bdev->pool, ttm, ctx);
344	if (ret)
345		goto error;
346
347	ttm->page_flags |= TTM_TT_FLAG_PRIV_POPULATED;
348	if (unlikely(ttm->page_flags & TTM_TT_FLAG_SWAPPED)) {
349		ret = ttm_tt_swapin(ttm);
350		if (unlikely(ret != 0)) {
351			ttm_tt_unpopulate(bdev, ttm);
352			return ret;
353		}
354	}
355
356	return 0;
357
358error:
359	if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
360		atomic_long_sub(ttm->num_pages, &ttm_pages_allocated);
361		if (bdev->pool.use_dma32)
362			atomic_long_sub(ttm->num_pages,
363					&ttm_dma32_pages_allocated);
364	}
365	return ret;
366}
367EXPORT_SYMBOL(ttm_tt_populate);
368
369void ttm_tt_unpopulate(struct ttm_device *bdev, struct ttm_tt *ttm)
370{
371	if (!ttm_tt_is_populated(ttm))
372		return;
373
374	if (bdev->funcs->ttm_tt_unpopulate)
375		bdev->funcs->ttm_tt_unpopulate(bdev, ttm);
376	else
377		ttm_pool_free(&bdev->pool, ttm);
378
379	if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
380		atomic_long_sub(ttm->num_pages, &ttm_pages_allocated);
381		if (bdev->pool.use_dma32)
382			atomic_long_sub(ttm->num_pages,
383					&ttm_dma32_pages_allocated);
384	}
385
386	ttm->page_flags &= ~TTM_TT_FLAG_PRIV_POPULATED;
387}
388
389#ifdef CONFIG_DEBUG_FS
390
391/* Test the shrinker functions and dump the result */
392static int ttm_tt_debugfs_shrink_show(struct seq_file *m, void *data)
393{
394	struct ttm_operation_ctx ctx = { false, false };
395
396	seq_printf(m, "%d\n", ttm_global_swapout(&ctx, GFP_KERNEL));
397	return 0;
398}
399DEFINE_SHOW_ATTRIBUTE(ttm_tt_debugfs_shrink);
400
401#endif
402
403
404/*
405 * ttm_tt_mgr_init - register with the MM shrinker
406 *
407 * Register with the MM shrinker for swapping out BOs.
408 */
409void ttm_tt_mgr_init(unsigned long num_pages, unsigned long num_dma32_pages)
410{
411#ifdef CONFIG_DEBUG_FS
412	debugfs_create_file("tt_shrink", 0400, ttm_debugfs_root, NULL,
413			    &ttm_tt_debugfs_shrink_fops);
414#endif
415
416	if (!ttm_pages_limit)
417		ttm_pages_limit = num_pages;
418
419	if (!ttm_dma32_pages_limit)
420		ttm_dma32_pages_limit = num_dma32_pages;
421}
422
423static void ttm_kmap_iter_tt_map_local(struct ttm_kmap_iter *iter,
424				       struct iosys_map *dmap,
425				       pgoff_t i)
426{
427	struct ttm_kmap_iter_tt *iter_tt =
428		container_of(iter, typeof(*iter_tt), base);
429
430	iosys_map_set_vaddr(dmap, kmap_local_page_prot(iter_tt->tt->pages[i],
431						       iter_tt->prot));
432}
433
434static void ttm_kmap_iter_tt_unmap_local(struct ttm_kmap_iter *iter,
435					 struct iosys_map *map)
436{
437	kunmap_local(map->vaddr);
438}
439
440static const struct ttm_kmap_iter_ops ttm_kmap_iter_tt_ops = {
441	.map_local = ttm_kmap_iter_tt_map_local,
442	.unmap_local = ttm_kmap_iter_tt_unmap_local,
443	.maps_tt = true,
444};
445
446/**
447 * ttm_kmap_iter_tt_init - Initialize a struct ttm_kmap_iter_tt
448 * @iter_tt: The struct ttm_kmap_iter_tt to initialize.
449 * @tt: Struct ttm_tt holding page pointers of the struct ttm_resource.
450 *
451 * Return: Pointer to the embedded struct ttm_kmap_iter.
452 */
453struct ttm_kmap_iter *
454ttm_kmap_iter_tt_init(struct ttm_kmap_iter_tt *iter_tt,
455		      struct ttm_tt *tt)
456{
457	iter_tt->base.ops = &ttm_kmap_iter_tt_ops;
458	iter_tt->tt = tt;
459	if (tt)
460		iter_tt->prot = ttm_prot_from_caching(tt->caching, PAGE_KERNEL);
461	else
462		iter_tt->prot = PAGE_KERNEL;
463
464	return &iter_tt->base;
465}
466EXPORT_SYMBOL(ttm_kmap_iter_tt_init);
467
468unsigned long ttm_tt_pages_limit(void)
469{
470	return ttm_pages_limit;
471}
472EXPORT_SYMBOL(ttm_tt_pages_limit);