ttm_bo_vm.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471
  1. /**************************************************************************
  2. *
  3. * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
  4. * All Rights Reserved.
  5. *
  6. * Permission is hereby granted, free of charge, to any person obtaining a
  7. * copy of this software and associated documentation files (the
  8. * "Software"), to deal in the Software without restriction, including
  9. * without limitation the rights to use, copy, modify, merge, publish,
  10. * distribute, sub license, and/or sell copies of the Software, and to
  11. * permit persons to whom the Software is furnished to do so, subject to
  12. * the following conditions:
  13. *
  14. * The above copyright notice and this permission notice (including the
  15. * next paragraph) shall be included in all copies or substantial portions
  16. * of the Software.
  17. *
  18. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  19. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  20. * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
  21. * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
  22. * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
  23. * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
  24. * USE OR OTHER DEALINGS IN THE SOFTWARE.
  25. *
  26. **************************************************************************/
  27. /*
  28. * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
  29. */
  30. #define pr_fmt(fmt) "[TTM] " fmt
  31. #include <drm/ttm/ttm_module.h>
  32. #include <drm/ttm/ttm_bo_driver.h>
  33. #include <drm/ttm/ttm_placement.h>
  34. #include <drm/drm_vma_manager.h>
  35. #include <linux/mm.h>
  36. #include <linux/pfn_t.h>
  37. #include <linux/rbtree.h>
  38. #include <linux/module.h>
  39. #include <linux/uaccess.h>
  40. #include <linux/mem_encrypt.h>
  41. #define TTM_BO_VM_NUM_PREFAULT 16
  42. static int ttm_bo_vm_fault_idle(struct ttm_buffer_object *bo,
  43. struct vm_fault *vmf)
  44. {
  45. int ret = 0;
  46. if (likely(!bo->moving))
  47. goto out_unlock;
  48. /*
  49. * Quick non-stalling check for idle.
  50. */
  51. if (dma_fence_is_signaled(bo->moving))
  52. goto out_clear;
  53. /*
  54. * If possible, avoid waiting for GPU with mmap_sem
  55. * held.
  56. */
  57. if (vmf->flags & FAULT_FLAG_ALLOW_RETRY) {
  58. ret = VM_FAULT_RETRY;
  59. if (vmf->flags & FAULT_FLAG_RETRY_NOWAIT)
  60. goto out_unlock;
  61. ttm_bo_reference(bo);
  62. up_read(&vmf->vma->vm_mm->mmap_sem);
  63. (void) dma_fence_wait(bo->moving, true);
  64. ttm_bo_unreserve(bo);
  65. ttm_bo_unref(&bo);
  66. goto out_unlock;
  67. }
  68. /*
  69. * Ordinary wait.
  70. */
  71. ret = dma_fence_wait(bo->moving, true);
  72. if (unlikely(ret != 0)) {
  73. ret = (ret != -ERESTARTSYS) ? VM_FAULT_SIGBUS :
  74. VM_FAULT_NOPAGE;
  75. goto out_unlock;
  76. }
  77. out_clear:
  78. dma_fence_put(bo->moving);
  79. bo->moving = NULL;
  80. out_unlock:
  81. return ret;
  82. }
  83. static int ttm_bo_vm_fault(struct vm_fault *vmf)
  84. {
  85. struct vm_area_struct *vma = vmf->vma;
  86. struct ttm_buffer_object *bo = (struct ttm_buffer_object *)
  87. vma->vm_private_data;
  88. struct ttm_bo_device *bdev = bo->bdev;
  89. unsigned long page_offset;
  90. unsigned long page_last;
  91. unsigned long pfn;
  92. struct ttm_tt *ttm = NULL;
  93. struct page *page;
  94. int ret;
  95. int i;
  96. unsigned long address = vmf->address;
  97. int retval = VM_FAULT_NOPAGE;
  98. struct ttm_mem_type_manager *man =
  99. &bdev->man[bo->mem.mem_type];
  100. struct vm_area_struct cvma;
  101. /*
  102. * Work around locking order reversal in fault / nopfn
  103. * between mmap_sem and bo_reserve: Perform a trylock operation
  104. * for reserve, and if it fails, retry the fault after waiting
  105. * for the buffer to become unreserved.
  106. */
  107. ret = ttm_bo_reserve(bo, true, true, NULL);
  108. if (unlikely(ret != 0)) {
  109. if (ret != -EBUSY)
  110. return VM_FAULT_NOPAGE;
  111. if (vmf->flags & FAULT_FLAG_ALLOW_RETRY) {
  112. if (!(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
  113. ttm_bo_reference(bo);
  114. up_read(&vmf->vma->vm_mm->mmap_sem);
  115. (void) ttm_bo_wait_unreserved(bo);
  116. ttm_bo_unref(&bo);
  117. }
  118. return VM_FAULT_RETRY;
  119. }
  120. /*
  121. * If we'd want to change locking order to
  122. * mmap_sem -> bo::reserve, we'd use a blocking reserve here
  123. * instead of retrying the fault...
  124. */
  125. return VM_FAULT_NOPAGE;
  126. }
  127. /*
  128. * Refuse to fault imported pages. This should be handled
  129. * (if at all) by redirecting mmap to the exporter.
  130. */
  131. if (bo->ttm && (bo->ttm->page_flags & TTM_PAGE_FLAG_SG)) {
  132. retval = VM_FAULT_SIGBUS;
  133. goto out_unlock;
  134. }
  135. if (bdev->driver->fault_reserve_notify) {
  136. ret = bdev->driver->fault_reserve_notify(bo);
  137. switch (ret) {
  138. case 0:
  139. break;
  140. case -EBUSY:
  141. case -ERESTARTSYS:
  142. retval = VM_FAULT_NOPAGE;
  143. goto out_unlock;
  144. default:
  145. retval = VM_FAULT_SIGBUS;
  146. goto out_unlock;
  147. }
  148. }
  149. /*
  150. * Wait for buffer data in transit, due to a pipelined
  151. * move.
  152. */
  153. ret = ttm_bo_vm_fault_idle(bo, vmf);
  154. if (unlikely(ret != 0)) {
  155. retval = ret;
  156. if (retval == VM_FAULT_RETRY &&
  157. !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
  158. /* The BO has already been unreserved. */
  159. return retval;
  160. }
  161. goto out_unlock;
  162. }
  163. ret = ttm_mem_io_lock(man, true);
  164. if (unlikely(ret != 0)) {
  165. retval = VM_FAULT_NOPAGE;
  166. goto out_unlock;
  167. }
  168. ret = ttm_mem_io_reserve_vm(bo);
  169. if (unlikely(ret != 0)) {
  170. retval = VM_FAULT_SIGBUS;
  171. goto out_io_unlock;
  172. }
  173. page_offset = ((address - vma->vm_start) >> PAGE_SHIFT) +
  174. vma->vm_pgoff - drm_vma_node_start(&bo->vma_node);
  175. page_last = vma_pages(vma) + vma->vm_pgoff -
  176. drm_vma_node_start(&bo->vma_node);
  177. if (unlikely(page_offset >= bo->num_pages)) {
  178. retval = VM_FAULT_SIGBUS;
  179. goto out_io_unlock;
  180. }
  181. /*
  182. * Make a local vma copy to modify the page_prot member
  183. * and vm_flags if necessary. The vma parameter is protected
  184. * by mmap_sem in write mode.
  185. */
  186. cvma = *vma;
  187. cvma.vm_page_prot = vm_get_page_prot(cvma.vm_flags);
  188. if (bo->mem.bus.is_iomem) {
  189. cvma.vm_page_prot = ttm_io_prot(bo->mem.placement,
  190. cvma.vm_page_prot);
  191. } else {
  192. ttm = bo->ttm;
  193. cvma.vm_page_prot = ttm_io_prot(bo->mem.placement,
  194. cvma.vm_page_prot);
  195. /* Allocate all page at once, most common usage */
  196. if (ttm->bdev->driver->ttm_tt_populate(ttm)) {
  197. retval = VM_FAULT_OOM;
  198. goto out_io_unlock;
  199. }
  200. }
  201. /*
  202. * Speculatively prefault a number of pages. Only error on
  203. * first page.
  204. */
  205. for (i = 0; i < TTM_BO_VM_NUM_PREFAULT; ++i) {
  206. if (bo->mem.bus.is_iomem) {
  207. /* Iomem should not be marked encrypted */
  208. cvma.vm_page_prot = pgprot_decrypted(cvma.vm_page_prot);
  209. pfn = bdev->driver->io_mem_pfn(bo, page_offset);
  210. } else {
  211. page = ttm->pages[page_offset];
  212. if (unlikely(!page && i == 0)) {
  213. retval = VM_FAULT_OOM;
  214. goto out_io_unlock;
  215. } else if (unlikely(!page)) {
  216. break;
  217. }
  218. page->mapping = vma->vm_file->f_mapping;
  219. page->index = drm_vma_node_start(&bo->vma_node) +
  220. page_offset;
  221. pfn = page_to_pfn(page);
  222. }
  223. if (vma->vm_flags & VM_MIXEDMAP)
  224. ret = vm_insert_mixed(&cvma, address,
  225. __pfn_to_pfn_t(pfn, PFN_DEV));
  226. else
  227. ret = vm_insert_pfn(&cvma, address, pfn);
  228. /*
  229. * Somebody beat us to this PTE or prefaulting to
  230. * an already populated PTE, or prefaulting error.
  231. */
  232. if (unlikely((ret == -EBUSY) || (ret != 0 && i > 0)))
  233. break;
  234. else if (unlikely(ret != 0)) {
  235. retval =
  236. (ret == -ENOMEM) ? VM_FAULT_OOM : VM_FAULT_SIGBUS;
  237. goto out_io_unlock;
  238. }
  239. address += PAGE_SIZE;
  240. if (unlikely(++page_offset >= page_last))
  241. break;
  242. }
  243. out_io_unlock:
  244. ttm_mem_io_unlock(man);
  245. out_unlock:
  246. ttm_bo_unreserve(bo);
  247. return retval;
  248. }
  249. static void ttm_bo_vm_open(struct vm_area_struct *vma)
  250. {
  251. struct ttm_buffer_object *bo =
  252. (struct ttm_buffer_object *)vma->vm_private_data;
  253. WARN_ON(bo->bdev->dev_mapping != vma->vm_file->f_mapping);
  254. (void)ttm_bo_reference(bo);
  255. }
  256. static void ttm_bo_vm_close(struct vm_area_struct *vma)
  257. {
  258. struct ttm_buffer_object *bo = (struct ttm_buffer_object *)vma->vm_private_data;
  259. ttm_bo_unref(&bo);
  260. vma->vm_private_data = NULL;
  261. }
  262. static int ttm_bo_vm_access_kmap(struct ttm_buffer_object *bo,
  263. unsigned long offset,
  264. void *buf, int len, int write)
  265. {
  266. unsigned long page = offset >> PAGE_SHIFT;
  267. unsigned long bytes_left = len;
  268. int ret;
  269. /* Copy a page at a time, that way no extra virtual address
  270. * mapping is needed
  271. */
  272. offset -= page << PAGE_SHIFT;
  273. do {
  274. unsigned long bytes = min(bytes_left, PAGE_SIZE - offset);
  275. struct ttm_bo_kmap_obj map;
  276. void *ptr;
  277. bool is_iomem;
  278. ret = ttm_bo_kmap(bo, page, 1, &map);
  279. if (ret)
  280. return ret;
  281. ptr = (uint8_t *)ttm_kmap_obj_virtual(&map, &is_iomem) + offset;
  282. WARN_ON_ONCE(is_iomem);
  283. if (write)
  284. memcpy(ptr, buf, bytes);
  285. else
  286. memcpy(buf, ptr, bytes);
  287. ttm_bo_kunmap(&map);
  288. page++;
  289. bytes_left -= bytes;
  290. offset = 0;
  291. } while (bytes_left);
  292. return len;
  293. }
  294. static int ttm_bo_vm_access(struct vm_area_struct *vma, unsigned long addr,
  295. void *buf, int len, int write)
  296. {
  297. unsigned long offset = (addr) - vma->vm_start;
  298. struct ttm_buffer_object *bo = vma->vm_private_data;
  299. int ret;
  300. if (len < 1 || (offset + len) >> PAGE_SHIFT > bo->num_pages)
  301. return -EIO;
  302. ret = ttm_bo_reserve(bo, true, false, NULL);
  303. if (ret)
  304. return ret;
  305. switch (bo->mem.mem_type) {
  306. case TTM_PL_SYSTEM:
  307. if (unlikely(bo->ttm->page_flags & TTM_PAGE_FLAG_SWAPPED)) {
  308. ret = ttm_tt_swapin(bo->ttm);
  309. if (unlikely(ret != 0))
  310. return ret;
  311. }
  312. /* fall through */
  313. case TTM_PL_TT:
  314. ret = ttm_bo_vm_access_kmap(bo, offset, buf, len, write);
  315. break;
  316. default:
  317. if (bo->bdev->driver->access_memory)
  318. ret = bo->bdev->driver->access_memory(
  319. bo, offset, buf, len, write);
  320. else
  321. ret = -EIO;
  322. }
  323. ttm_bo_unreserve(bo);
  324. return ret;
  325. }
  326. static const struct vm_operations_struct ttm_bo_vm_ops = {
  327. .fault = ttm_bo_vm_fault,
  328. .open = ttm_bo_vm_open,
  329. .close = ttm_bo_vm_close,
  330. .access = ttm_bo_vm_access
  331. };
  332. static struct ttm_buffer_object *ttm_bo_vm_lookup(struct ttm_bo_device *bdev,
  333. unsigned long offset,
  334. unsigned long pages)
  335. {
  336. struct drm_vma_offset_node *node;
  337. struct ttm_buffer_object *bo = NULL;
  338. drm_vma_offset_lock_lookup(&bdev->vma_manager);
  339. node = drm_vma_offset_lookup_locked(&bdev->vma_manager, offset, pages);
  340. if (likely(node)) {
  341. bo = container_of(node, struct ttm_buffer_object, vma_node);
  342. if (!kref_get_unless_zero(&bo->kref))
  343. bo = NULL;
  344. }
  345. drm_vma_offset_unlock_lookup(&bdev->vma_manager);
  346. if (!bo)
  347. pr_err("Could not find buffer object to map\n");
  348. return bo;
  349. }
  350. unsigned long ttm_bo_default_io_mem_pfn(struct ttm_buffer_object *bo,
  351. unsigned long page_offset)
  352. {
  353. return ((bo->mem.bus.base + bo->mem.bus.offset) >> PAGE_SHIFT)
  354. + page_offset;
  355. }
  356. EXPORT_SYMBOL(ttm_bo_default_io_mem_pfn);
  357. int ttm_bo_mmap(struct file *filp, struct vm_area_struct *vma,
  358. struct ttm_bo_device *bdev)
  359. {
  360. struct ttm_bo_driver *driver;
  361. struct ttm_buffer_object *bo;
  362. int ret;
  363. bo = ttm_bo_vm_lookup(bdev, vma->vm_pgoff, vma_pages(vma));
  364. if (unlikely(!bo))
  365. return -EINVAL;
  366. driver = bo->bdev->driver;
  367. if (unlikely(!driver->verify_access)) {
  368. ret = -EPERM;
  369. goto out_unref;
  370. }
  371. ret = driver->verify_access(bo, filp);
  372. if (unlikely(ret != 0))
  373. goto out_unref;
  374. vma->vm_ops = &ttm_bo_vm_ops;
  375. /*
  376. * Note: We're transferring the bo reference to
  377. * vma->vm_private_data here.
  378. */
  379. vma->vm_private_data = bo;
  380. /*
  381. * We'd like to use VM_PFNMAP on shared mappings, where
  382. * (vma->vm_flags & VM_SHARED) != 0, for performance reasons,
  383. * but for some reason VM_PFNMAP + x86 PAT + write-combine is very
  384. * bad for performance. Until that has been sorted out, use
  385. * VM_MIXEDMAP on all mappings. See freedesktop.org bug #75719
  386. */
  387. vma->vm_flags |= VM_MIXEDMAP;
  388. vma->vm_flags |= VM_IO | VM_DONTEXPAND | VM_DONTDUMP;
  389. return 0;
  390. out_unref:
  391. ttm_bo_unref(&bo);
  392. return ret;
  393. }
  394. EXPORT_SYMBOL(ttm_bo_mmap);
  395. int ttm_fbdev_mmap(struct vm_area_struct *vma, struct ttm_buffer_object *bo)
  396. {
  397. if (vma->vm_pgoff != 0)
  398. return -EACCES;
  399. vma->vm_ops = &ttm_bo_vm_ops;
  400. vma->vm_private_data = ttm_bo_reference(bo);
  401. vma->vm_flags |= VM_MIXEDMAP;
  402. vma->vm_flags |= VM_IO | VM_DONTEXPAND;
  403. return 0;
  404. }
  405. EXPORT_SYMBOL(ttm_fbdev_mmap);