Loading...
1/**************************************************************************
2 *
3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27/*
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
29 */
30
31#define pr_fmt(fmt) "[TTM] " fmt
32
33#include <linux/sched.h>
34#include <linux/highmem.h>
35#include <linux/pagemap.h>
36#include <linux/shmem_fs.h>
37#include <linux/file.h>
38#include <linux/swap.h>
39#include <linux/slab.h>
40#include <linux/export.h>
41#include <drm/drm_cache.h>
42#include <drm/drm_mem_util.h>
43#include <drm/ttm/ttm_module.h>
44#include <drm/ttm/ttm_bo_driver.h>
45#include <drm/ttm/ttm_placement.h>
46#include <drm/ttm/ttm_page_alloc.h>
47
48/**
49 * Allocates storage for pointers to the pages that back the ttm.
50 */
51static void ttm_tt_alloc_page_directory(struct ttm_tt *ttm)
52{
53 ttm->pages = drm_calloc_large(ttm->num_pages, sizeof(void*));
54}
55
56static void ttm_dma_tt_alloc_page_directory(struct ttm_dma_tt *ttm)
57{
58 ttm->ttm.pages = drm_calloc_large(ttm->ttm.num_pages,
59 sizeof(*ttm->ttm.pages) +
60 sizeof(*ttm->dma_address) +
61 sizeof(*ttm->cpu_address));
62 ttm->cpu_address = (void *) (ttm->ttm.pages + ttm->ttm.num_pages);
63 ttm->dma_address = (void *) (ttm->cpu_address + ttm->ttm.num_pages);
64}
65
66#ifdef CONFIG_X86
67static inline int ttm_tt_set_page_caching(struct page *p,
68 enum ttm_caching_state c_old,
69 enum ttm_caching_state c_new)
70{
71 int ret = 0;
72
73 if (PageHighMem(p))
74 return 0;
75
76 if (c_old != tt_cached) {
77 /* p isn't in the default caching state, set it to
78 * writeback first to free its current memtype. */
79
80 ret = set_pages_wb(p, 1);
81 if (ret)
82 return ret;
83 }
84
85 if (c_new == tt_wc)
86 ret = set_memory_wc((unsigned long) page_address(p), 1);
87 else if (c_new == tt_uncached)
88 ret = set_pages_uc(p, 1);
89
90 return ret;
91}
92#else /* CONFIG_X86 */
93static inline int ttm_tt_set_page_caching(struct page *p,
94 enum ttm_caching_state c_old,
95 enum ttm_caching_state c_new)
96{
97 return 0;
98}
99#endif /* CONFIG_X86 */
100
101/*
102 * Change caching policy for the linear kernel map
103 * for range of pages in a ttm.
104 */
105
106static int ttm_tt_set_caching(struct ttm_tt *ttm,
107 enum ttm_caching_state c_state)
108{
109 int i, j;
110 struct page *cur_page;
111 int ret;
112
113 if (ttm->caching_state == c_state)
114 return 0;
115
116 if (ttm->state == tt_unpopulated) {
117 /* Change caching but don't populate */
118 ttm->caching_state = c_state;
119 return 0;
120 }
121
122 if (ttm->caching_state == tt_cached)
123 drm_clflush_pages(ttm->pages, ttm->num_pages);
124
125 for (i = 0; i < ttm->num_pages; ++i) {
126 cur_page = ttm->pages[i];
127 if (likely(cur_page != NULL)) {
128 ret = ttm_tt_set_page_caching(cur_page,
129 ttm->caching_state,
130 c_state);
131 if (unlikely(ret != 0))
132 goto out_err;
133 }
134 }
135
136 ttm->caching_state = c_state;
137
138 return 0;
139
140out_err:
141 for (j = 0; j < i; ++j) {
142 cur_page = ttm->pages[j];
143 if (likely(cur_page != NULL)) {
144 (void)ttm_tt_set_page_caching(cur_page, c_state,
145 ttm->caching_state);
146 }
147 }
148
149 return ret;
150}
151
152int ttm_tt_set_placement_caching(struct ttm_tt *ttm, uint32_t placement)
153{
154 enum ttm_caching_state state;
155
156 if (placement & TTM_PL_FLAG_WC)
157 state = tt_wc;
158 else if (placement & TTM_PL_FLAG_UNCACHED)
159 state = tt_uncached;
160 else
161 state = tt_cached;
162
163 return ttm_tt_set_caching(ttm, state);
164}
165EXPORT_SYMBOL(ttm_tt_set_placement_caching);
166
167void ttm_tt_destroy(struct ttm_tt *ttm)
168{
169 if (unlikely(ttm == NULL))
170 return;
171
172 if (ttm->state == tt_bound) {
173 ttm_tt_unbind(ttm);
174 }
175
176 if (ttm->state == tt_unbound)
177 ttm_tt_unpopulate(ttm);
178
179 if (!(ttm->page_flags & TTM_PAGE_FLAG_PERSISTENT_SWAP) &&
180 ttm->swap_storage)
181 fput(ttm->swap_storage);
182
183 ttm->swap_storage = NULL;
184 ttm->func->destroy(ttm);
185}
186
187int ttm_tt_init(struct ttm_tt *ttm, struct ttm_bo_device *bdev,
188 unsigned long size, uint32_t page_flags,
189 struct page *dummy_read_page)
190{
191 ttm->bdev = bdev;
192 ttm->glob = bdev->glob;
193 ttm->num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
194 ttm->caching_state = tt_cached;
195 ttm->page_flags = page_flags;
196 ttm->dummy_read_page = dummy_read_page;
197 ttm->state = tt_unpopulated;
198 ttm->swap_storage = NULL;
199
200 ttm_tt_alloc_page_directory(ttm);
201 if (!ttm->pages) {
202 ttm_tt_destroy(ttm);
203 pr_err("Failed allocating page table\n");
204 return -ENOMEM;
205 }
206 return 0;
207}
208EXPORT_SYMBOL(ttm_tt_init);
209
210void ttm_tt_fini(struct ttm_tt *ttm)
211{
212 drm_free_large(ttm->pages);
213 ttm->pages = NULL;
214}
215EXPORT_SYMBOL(ttm_tt_fini);
216
217int ttm_dma_tt_init(struct ttm_dma_tt *ttm_dma, struct ttm_bo_device *bdev,
218 unsigned long size, uint32_t page_flags,
219 struct page *dummy_read_page)
220{
221 struct ttm_tt *ttm = &ttm_dma->ttm;
222
223 ttm->bdev = bdev;
224 ttm->glob = bdev->glob;
225 ttm->num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
226 ttm->caching_state = tt_cached;
227 ttm->page_flags = page_flags;
228 ttm->dummy_read_page = dummy_read_page;
229 ttm->state = tt_unpopulated;
230 ttm->swap_storage = NULL;
231
232 INIT_LIST_HEAD(&ttm_dma->pages_list);
233 ttm_dma_tt_alloc_page_directory(ttm_dma);
234 if (!ttm->pages) {
235 ttm_tt_destroy(ttm);
236 pr_err("Failed allocating page table\n");
237 return -ENOMEM;
238 }
239 return 0;
240}
241EXPORT_SYMBOL(ttm_dma_tt_init);
242
243void ttm_dma_tt_fini(struct ttm_dma_tt *ttm_dma)
244{
245 struct ttm_tt *ttm = &ttm_dma->ttm;
246
247 drm_free_large(ttm->pages);
248 ttm->pages = NULL;
249 ttm_dma->cpu_address = NULL;
250 ttm_dma->dma_address = NULL;
251}
252EXPORT_SYMBOL(ttm_dma_tt_fini);
253
254void ttm_tt_unbind(struct ttm_tt *ttm)
255{
256 int ret;
257
258 if (ttm->state == tt_bound) {
259 ret = ttm->func->unbind(ttm);
260 BUG_ON(ret);
261 ttm->state = tt_unbound;
262 }
263}
264
265int ttm_tt_bind(struct ttm_tt *ttm, struct ttm_mem_reg *bo_mem)
266{
267 int ret = 0;
268
269 if (!ttm)
270 return -EINVAL;
271
272 if (ttm->state == tt_bound)
273 return 0;
274
275 ret = ttm->bdev->driver->ttm_tt_populate(ttm);
276 if (ret)
277 return ret;
278
279 ret = ttm->func->bind(ttm, bo_mem);
280 if (unlikely(ret != 0))
281 return ret;
282
283 ttm->state = tt_bound;
284
285 return 0;
286}
287EXPORT_SYMBOL(ttm_tt_bind);
288
289int ttm_tt_swapin(struct ttm_tt *ttm)
290{
291 struct address_space *swap_space;
292 struct file *swap_storage;
293 struct page *from_page;
294 struct page *to_page;
295 int i;
296 int ret = -ENOMEM;
297
298 swap_storage = ttm->swap_storage;
299 BUG_ON(swap_storage == NULL);
300
301 swap_space = file_inode(swap_storage)->i_mapping;
302
303 for (i = 0; i < ttm->num_pages; ++i) {
304 from_page = shmem_read_mapping_page(swap_space, i);
305 if (IS_ERR(from_page)) {
306 ret = PTR_ERR(from_page);
307 goto out_err;
308 }
309 to_page = ttm->pages[i];
310 if (unlikely(to_page == NULL))
311 goto out_err;
312
313 copy_highpage(to_page, from_page);
314 put_page(from_page);
315 }
316
317 if (!(ttm->page_flags & TTM_PAGE_FLAG_PERSISTENT_SWAP))
318 fput(swap_storage);
319 ttm->swap_storage = NULL;
320 ttm->page_flags &= ~TTM_PAGE_FLAG_SWAPPED;
321
322 return 0;
323out_err:
324 return ret;
325}
326
327int ttm_tt_swapout(struct ttm_tt *ttm, struct file *persistent_swap_storage)
328{
329 struct address_space *swap_space;
330 struct file *swap_storage;
331 struct page *from_page;
332 struct page *to_page;
333 int i;
334 int ret = -ENOMEM;
335
336 BUG_ON(ttm->state != tt_unbound && ttm->state != tt_unpopulated);
337 BUG_ON(ttm->caching_state != tt_cached);
338
339 if (!persistent_swap_storage) {
340 swap_storage = shmem_file_setup("ttm swap",
341 ttm->num_pages << PAGE_SHIFT,
342 0);
343 if (IS_ERR(swap_storage)) {
344 pr_err("Failed allocating swap storage\n");
345 return PTR_ERR(swap_storage);
346 }
347 } else
348 swap_storage = persistent_swap_storage;
349
350 swap_space = file_inode(swap_storage)->i_mapping;
351
352 for (i = 0; i < ttm->num_pages; ++i) {
353 from_page = ttm->pages[i];
354 if (unlikely(from_page == NULL))
355 continue;
356 to_page = shmem_read_mapping_page(swap_space, i);
357 if (IS_ERR(to_page)) {
358 ret = PTR_ERR(to_page);
359 goto out_err;
360 }
361 copy_highpage(to_page, from_page);
362 set_page_dirty(to_page);
363 mark_page_accessed(to_page);
364 put_page(to_page);
365 }
366
367 ttm_tt_unpopulate(ttm);
368 ttm->swap_storage = swap_storage;
369 ttm->page_flags |= TTM_PAGE_FLAG_SWAPPED;
370 if (persistent_swap_storage)
371 ttm->page_flags |= TTM_PAGE_FLAG_PERSISTENT_SWAP;
372
373 return 0;
374out_err:
375 if (!persistent_swap_storage)
376 fput(swap_storage);
377
378 return ret;
379}
380
381static void ttm_tt_clear_mapping(struct ttm_tt *ttm)
382{
383 pgoff_t i;
384 struct page **page = ttm->pages;
385
386 if (ttm->page_flags & TTM_PAGE_FLAG_SG)
387 return;
388
389 for (i = 0; i < ttm->num_pages; ++i) {
390 (*page)->mapping = NULL;
391 (*page++)->index = 0;
392 }
393}
394
395void ttm_tt_unpopulate(struct ttm_tt *ttm)
396{
397 if (ttm->state == tt_unpopulated)
398 return;
399
400 ttm_tt_clear_mapping(ttm);
401 ttm->bdev->driver->ttm_tt_unpopulate(ttm);
402}
1/* SPDX-License-Identifier: GPL-2.0 OR MIT */
2/**************************************************************************
3 *
4 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
5 * All Rights Reserved.
6 *
7 * Permission is hereby granted, free of charge, to any person obtaining a
8 * copy of this software and associated documentation files (the
9 * "Software"), to deal in the Software without restriction, including
10 * without limitation the rights to use, copy, modify, merge, publish,
11 * distribute, sub license, and/or sell copies of the Software, and to
12 * permit persons to whom the Software is furnished to do so, subject to
13 * the following conditions:
14 *
15 * The above copyright notice and this permission notice (including the
16 * next paragraph) shall be included in all copies or substantial portions
17 * of the Software.
18 *
19 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
20 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
21 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
22 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
23 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
24 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
25 * USE OR OTHER DEALINGS IN THE SOFTWARE.
26 *
27 **************************************************************************/
28/*
29 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
30 */
31
32#define pr_fmt(fmt) "[TTM] " fmt
33
34#include <linux/cc_platform.h>
35#include <linux/sched.h>
36#include <linux/shmem_fs.h>
37#include <linux/file.h>
38#include <linux/module.h>
39#include <drm/drm_cache.h>
40#include <drm/drm_device.h>
41#include <drm/drm_util.h>
42#include <drm/ttm/ttm_bo.h>
43#include <drm/ttm/ttm_tt.h>
44
45#include "ttm_module.h"
46
47static unsigned long ttm_pages_limit;
48
49MODULE_PARM_DESC(pages_limit, "Limit for the allocated pages");
50module_param_named(pages_limit, ttm_pages_limit, ulong, 0644);
51
52static unsigned long ttm_dma32_pages_limit;
53
54MODULE_PARM_DESC(dma32_pages_limit, "Limit for the allocated DMA32 pages");
55module_param_named(dma32_pages_limit, ttm_dma32_pages_limit, ulong, 0644);
56
57static atomic_long_t ttm_pages_allocated;
58static atomic_long_t ttm_dma32_pages_allocated;
59
60/*
61 * Allocates a ttm structure for the given BO.
62 */
63int ttm_tt_create(struct ttm_buffer_object *bo, bool zero_alloc)
64{
65 struct ttm_device *bdev = bo->bdev;
66 struct drm_device *ddev = bo->base.dev;
67 uint32_t page_flags = 0;
68
69 dma_resv_assert_held(bo->base.resv);
70
71 if (bo->ttm)
72 return 0;
73
74 switch (bo->type) {
75 case ttm_bo_type_device:
76 if (zero_alloc)
77 page_flags |= TTM_TT_FLAG_ZERO_ALLOC;
78 break;
79 case ttm_bo_type_kernel:
80 break;
81 case ttm_bo_type_sg:
82 page_flags |= TTM_TT_FLAG_EXTERNAL;
83 break;
84 default:
85 pr_err("Illegal buffer object type\n");
86 return -EINVAL;
87 }
88 /*
89 * When using dma_alloc_coherent with memory encryption the
90 * mapped TT pages need to be decrypted or otherwise the drivers
91 * will end up sending encrypted mem to the gpu.
92 */
93 if (bdev->pool.use_dma_alloc && cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
94 page_flags |= TTM_TT_FLAG_DECRYPTED;
95 drm_info_once(ddev, "TT memory decryption enabled.");
96 }
97
98 bo->ttm = bdev->funcs->ttm_tt_create(bo, page_flags);
99 if (unlikely(bo->ttm == NULL))
100 return -ENOMEM;
101
102 WARN_ON(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL_MAPPABLE &&
103 !(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL));
104
105 return 0;
106}
107EXPORT_SYMBOL_FOR_TESTS_ONLY(ttm_tt_create);
108
109/*
110 * Allocates storage for pointers to the pages that back the ttm.
111 */
112static int ttm_tt_alloc_page_directory(struct ttm_tt *ttm)
113{
114 ttm->pages = kvcalloc(ttm->num_pages, sizeof(void*), GFP_KERNEL);
115 if (!ttm->pages)
116 return -ENOMEM;
117
118 return 0;
119}
120
121static int ttm_dma_tt_alloc_page_directory(struct ttm_tt *ttm)
122{
123 ttm->pages = kvcalloc(ttm->num_pages, sizeof(*ttm->pages) +
124 sizeof(*ttm->dma_address), GFP_KERNEL);
125 if (!ttm->pages)
126 return -ENOMEM;
127
128 ttm->dma_address = (void *)(ttm->pages + ttm->num_pages);
129 return 0;
130}
131
132static int ttm_sg_tt_alloc_page_directory(struct ttm_tt *ttm)
133{
134 ttm->dma_address = kvcalloc(ttm->num_pages, sizeof(*ttm->dma_address),
135 GFP_KERNEL);
136 if (!ttm->dma_address)
137 return -ENOMEM;
138
139 return 0;
140}
141
142void ttm_tt_destroy(struct ttm_device *bdev, struct ttm_tt *ttm)
143{
144 bdev->funcs->ttm_tt_destroy(bdev, ttm);
145}
146EXPORT_SYMBOL_FOR_TESTS_ONLY(ttm_tt_destroy);
147
148static void ttm_tt_init_fields(struct ttm_tt *ttm,
149 struct ttm_buffer_object *bo,
150 uint32_t page_flags,
151 enum ttm_caching caching,
152 unsigned long extra_pages)
153{
154 ttm->num_pages = (PAGE_ALIGN(bo->base.size) >> PAGE_SHIFT) + extra_pages;
155 ttm->page_flags = page_flags;
156 ttm->dma_address = NULL;
157 ttm->swap_storage = NULL;
158 ttm->sg = bo->sg;
159 ttm->caching = caching;
160}
161
162int ttm_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
163 uint32_t page_flags, enum ttm_caching caching,
164 unsigned long extra_pages)
165{
166 ttm_tt_init_fields(ttm, bo, page_flags, caching, extra_pages);
167
168 if (ttm_tt_alloc_page_directory(ttm)) {
169 pr_err("Failed allocating page table\n");
170 return -ENOMEM;
171 }
172 return 0;
173}
174EXPORT_SYMBOL(ttm_tt_init);
175
176void ttm_tt_fini(struct ttm_tt *ttm)
177{
178 WARN_ON(ttm->page_flags & TTM_TT_FLAG_PRIV_POPULATED);
179
180 if (ttm->swap_storage)
181 fput(ttm->swap_storage);
182 ttm->swap_storage = NULL;
183
184 if (ttm->pages)
185 kvfree(ttm->pages);
186 else
187 kvfree(ttm->dma_address);
188 ttm->pages = NULL;
189 ttm->dma_address = NULL;
190}
191EXPORT_SYMBOL(ttm_tt_fini);
192
193int ttm_sg_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
194 uint32_t page_flags, enum ttm_caching caching)
195{
196 int ret;
197
198 ttm_tt_init_fields(ttm, bo, page_flags, caching, 0);
199
200 if (page_flags & TTM_TT_FLAG_EXTERNAL)
201 ret = ttm_sg_tt_alloc_page_directory(ttm);
202 else
203 ret = ttm_dma_tt_alloc_page_directory(ttm);
204 if (ret) {
205 pr_err("Failed allocating page table\n");
206 return -ENOMEM;
207 }
208 return 0;
209}
210EXPORT_SYMBOL(ttm_sg_tt_init);
211
212int ttm_tt_swapin(struct ttm_tt *ttm)
213{
214 struct address_space *swap_space;
215 struct file *swap_storage;
216 struct page *from_page;
217 struct page *to_page;
218 gfp_t gfp_mask;
219 int i, ret;
220
221 swap_storage = ttm->swap_storage;
222 BUG_ON(swap_storage == NULL);
223
224 swap_space = swap_storage->f_mapping;
225 gfp_mask = mapping_gfp_mask(swap_space);
226
227 for (i = 0; i < ttm->num_pages; ++i) {
228 from_page = shmem_read_mapping_page_gfp(swap_space, i,
229 gfp_mask);
230 if (IS_ERR(from_page)) {
231 ret = PTR_ERR(from_page);
232 goto out_err;
233 }
234 to_page = ttm->pages[i];
235 if (unlikely(to_page == NULL)) {
236 ret = -ENOMEM;
237 goto out_err;
238 }
239
240 copy_highpage(to_page, from_page);
241 put_page(from_page);
242 }
243
244 fput(swap_storage);
245 ttm->swap_storage = NULL;
246 ttm->page_flags &= ~TTM_TT_FLAG_SWAPPED;
247
248 return 0;
249
250out_err:
251 return ret;
252}
253
254/**
255 * ttm_tt_swapout - swap out tt object
256 *
257 * @bdev: TTM device structure.
258 * @ttm: The struct ttm_tt.
259 * @gfp_flags: Flags to use for memory allocation.
260 *
261 * Swapout a TT object to a shmem_file, return number of pages swapped out or
262 * negative error code.
263 */
264int ttm_tt_swapout(struct ttm_device *bdev, struct ttm_tt *ttm,
265 gfp_t gfp_flags)
266{
267 loff_t size = (loff_t)ttm->num_pages << PAGE_SHIFT;
268 struct address_space *swap_space;
269 struct file *swap_storage;
270 struct page *from_page;
271 struct page *to_page;
272 int i, ret;
273
274 swap_storage = shmem_file_setup("ttm swap", size, 0);
275 if (IS_ERR(swap_storage)) {
276 pr_err("Failed allocating swap storage\n");
277 return PTR_ERR(swap_storage);
278 }
279
280 swap_space = swap_storage->f_mapping;
281 gfp_flags &= mapping_gfp_mask(swap_space);
282
283 for (i = 0; i < ttm->num_pages; ++i) {
284 from_page = ttm->pages[i];
285 if (unlikely(from_page == NULL))
286 continue;
287
288 to_page = shmem_read_mapping_page_gfp(swap_space, i, gfp_flags);
289 if (IS_ERR(to_page)) {
290 ret = PTR_ERR(to_page);
291 goto out_err;
292 }
293 copy_highpage(to_page, from_page);
294 set_page_dirty(to_page);
295 mark_page_accessed(to_page);
296 put_page(to_page);
297 }
298
299 ttm_tt_unpopulate(bdev, ttm);
300 ttm->swap_storage = swap_storage;
301 ttm->page_flags |= TTM_TT_FLAG_SWAPPED;
302
303 return ttm->num_pages;
304
305out_err:
306 fput(swap_storage);
307
308 return ret;
309}
310
311int ttm_tt_populate(struct ttm_device *bdev,
312 struct ttm_tt *ttm, struct ttm_operation_ctx *ctx)
313{
314 int ret;
315
316 if (!ttm)
317 return -EINVAL;
318
319 if (ttm_tt_is_populated(ttm))
320 return 0;
321
322 if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
323 atomic_long_add(ttm->num_pages, &ttm_pages_allocated);
324 if (bdev->pool.use_dma32)
325 atomic_long_add(ttm->num_pages,
326 &ttm_dma32_pages_allocated);
327 }
328
329 while (atomic_long_read(&ttm_pages_allocated) > ttm_pages_limit ||
330 atomic_long_read(&ttm_dma32_pages_allocated) >
331 ttm_dma32_pages_limit) {
332
333 ret = ttm_global_swapout(ctx, GFP_KERNEL);
334 if (ret == 0)
335 break;
336 if (ret < 0)
337 goto error;
338 }
339
340 if (bdev->funcs->ttm_tt_populate)
341 ret = bdev->funcs->ttm_tt_populate(bdev, ttm, ctx);
342 else
343 ret = ttm_pool_alloc(&bdev->pool, ttm, ctx);
344 if (ret)
345 goto error;
346
347 ttm->page_flags |= TTM_TT_FLAG_PRIV_POPULATED;
348 if (unlikely(ttm->page_flags & TTM_TT_FLAG_SWAPPED)) {
349 ret = ttm_tt_swapin(ttm);
350 if (unlikely(ret != 0)) {
351 ttm_tt_unpopulate(bdev, ttm);
352 return ret;
353 }
354 }
355
356 return 0;
357
358error:
359 if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
360 atomic_long_sub(ttm->num_pages, &ttm_pages_allocated);
361 if (bdev->pool.use_dma32)
362 atomic_long_sub(ttm->num_pages,
363 &ttm_dma32_pages_allocated);
364 }
365 return ret;
366}
367EXPORT_SYMBOL(ttm_tt_populate);
368
369void ttm_tt_unpopulate(struct ttm_device *bdev, struct ttm_tt *ttm)
370{
371 if (!ttm_tt_is_populated(ttm))
372 return;
373
374 if (bdev->funcs->ttm_tt_unpopulate)
375 bdev->funcs->ttm_tt_unpopulate(bdev, ttm);
376 else
377 ttm_pool_free(&bdev->pool, ttm);
378
379 if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
380 atomic_long_sub(ttm->num_pages, &ttm_pages_allocated);
381 if (bdev->pool.use_dma32)
382 atomic_long_sub(ttm->num_pages,
383 &ttm_dma32_pages_allocated);
384 }
385
386 ttm->page_flags &= ~TTM_TT_FLAG_PRIV_POPULATED;
387}
388
389#ifdef CONFIG_DEBUG_FS
390
391/* Test the shrinker functions and dump the result */
392static int ttm_tt_debugfs_shrink_show(struct seq_file *m, void *data)
393{
394 struct ttm_operation_ctx ctx = { false, false };
395
396 seq_printf(m, "%d\n", ttm_global_swapout(&ctx, GFP_KERNEL));
397 return 0;
398}
399DEFINE_SHOW_ATTRIBUTE(ttm_tt_debugfs_shrink);
400
401#endif
402
403
404/*
405 * ttm_tt_mgr_init - register with the MM shrinker
406 *
407 * Register with the MM shrinker for swapping out BOs.
408 */
409void ttm_tt_mgr_init(unsigned long num_pages, unsigned long num_dma32_pages)
410{
411#ifdef CONFIG_DEBUG_FS
412 debugfs_create_file("tt_shrink", 0400, ttm_debugfs_root, NULL,
413 &ttm_tt_debugfs_shrink_fops);
414#endif
415
416 if (!ttm_pages_limit)
417 ttm_pages_limit = num_pages;
418
419 if (!ttm_dma32_pages_limit)
420 ttm_dma32_pages_limit = num_dma32_pages;
421}
422
423static void ttm_kmap_iter_tt_map_local(struct ttm_kmap_iter *iter,
424 struct iosys_map *dmap,
425 pgoff_t i)
426{
427 struct ttm_kmap_iter_tt *iter_tt =
428 container_of(iter, typeof(*iter_tt), base);
429
430 iosys_map_set_vaddr(dmap, kmap_local_page_prot(iter_tt->tt->pages[i],
431 iter_tt->prot));
432}
433
434static void ttm_kmap_iter_tt_unmap_local(struct ttm_kmap_iter *iter,
435 struct iosys_map *map)
436{
437 kunmap_local(map->vaddr);
438}
439
440static const struct ttm_kmap_iter_ops ttm_kmap_iter_tt_ops = {
441 .map_local = ttm_kmap_iter_tt_map_local,
442 .unmap_local = ttm_kmap_iter_tt_unmap_local,
443 .maps_tt = true,
444};
445
446/**
447 * ttm_kmap_iter_tt_init - Initialize a struct ttm_kmap_iter_tt
448 * @iter_tt: The struct ttm_kmap_iter_tt to initialize.
449 * @tt: Struct ttm_tt holding page pointers of the struct ttm_resource.
450 *
451 * Return: Pointer to the embedded struct ttm_kmap_iter.
452 */
453struct ttm_kmap_iter *
454ttm_kmap_iter_tt_init(struct ttm_kmap_iter_tt *iter_tt,
455 struct ttm_tt *tt)
456{
457 iter_tt->base.ops = &ttm_kmap_iter_tt_ops;
458 iter_tt->tt = tt;
459 if (tt)
460 iter_tt->prot = ttm_prot_from_caching(tt->caching, PAGE_KERNEL);
461 else
462 iter_tt->prot = PAGE_KERNEL;
463
464 return &iter_tt->base;
465}
466EXPORT_SYMBOL(ttm_kmap_iter_tt_init);
467
468unsigned long ttm_tt_pages_limit(void)
469{
470 return ttm_pages_limit;
471}
472EXPORT_SYMBOL(ttm_tt_pages_limit);