ttm_bo_vm.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481
  1. /* SPDX-License-Identifier: GPL-2.0 OR MIT */
  2. /**************************************************************************
  3. *
  4. * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
  5. * All Rights Reserved.
  6. *
  7. * Permission is hereby granted, free of charge, to any person obtaining a
  8. * copy of this software and associated documentation files (the
  9. * "Software"), to deal in the Software without restriction, including
  10. * without limitation the rights to use, copy, modify, merge, publish,
  11. * distribute, sub license, and/or sell copies of the Software, and to
  12. * permit persons to whom the Software is furnished to do so, subject to
  13. * the following conditions:
  14. *
  15. * The above copyright notice and this permission notice (including the
  16. * next paragraph) shall be included in all copies or substantial portions
  17. * of the Software.
  18. *
  19. * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  20. * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  21. * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
  22. * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
  23. * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
  24. * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
  25. * USE OR OTHER DEALINGS IN THE SOFTWARE.
  26. *
  27. **************************************************************************/
  28. /*
  29. * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
  30. */
  31. #define pr_fmt(fmt) "[TTM] " fmt
  32. #include <drm/ttm/ttm_module.h>
  33. #include <drm/ttm/ttm_bo_driver.h>
  34. #include <drm/ttm/ttm_placement.h>
  35. #include <drm/drm_vma_manager.h>
  36. #include <linux/mm.h>
  37. #include <linux/pfn_t.h>
  38. #include <linux/rbtree.h>
  39. #include <linux/module.h>
  40. #include <linux/uaccess.h>
  41. #include <linux/mem_encrypt.h>
  42. #define TTM_BO_VM_NUM_PREFAULT 16
  43. static vm_fault_t ttm_bo_vm_fault_idle(struct ttm_buffer_object *bo,
  44. struct vm_fault *vmf)
  45. {
  46. vm_fault_t ret = 0;
  47. int err = 0;
  48. if (likely(!bo->moving))
  49. goto out_unlock;
  50. /*
  51. * Quick non-stalling check for idle.
  52. */
  53. if (dma_fence_is_signaled(bo->moving))
  54. goto out_clear;
  55. /*
  56. * If possible, avoid waiting for GPU with mmap_sem
  57. * held.
  58. */
  59. if (vmf->flags & FAULT_FLAG_ALLOW_RETRY) {
  60. ret = VM_FAULT_RETRY;
  61. if (vmf->flags & FAULT_FLAG_RETRY_NOWAIT)
  62. goto out_unlock;
  63. ttm_bo_get(bo);
  64. up_read(&vmf->vma->vm_mm->mmap_sem);
  65. (void) dma_fence_wait(bo->moving, true);
  66. ttm_bo_unreserve(bo);
  67. ttm_bo_put(bo);
  68. goto out_unlock;
  69. }
  70. /*
  71. * Ordinary wait.
  72. */
  73. err = dma_fence_wait(bo->moving, true);
  74. if (unlikely(err != 0)) {
  75. ret = (err != -ERESTARTSYS) ? VM_FAULT_SIGBUS :
  76. VM_FAULT_NOPAGE;
  77. goto out_unlock;
  78. }
  79. out_clear:
  80. dma_fence_put(bo->moving);
  81. bo->moving = NULL;
  82. out_unlock:
  83. return ret;
  84. }
  85. static unsigned long ttm_bo_io_mem_pfn(struct ttm_buffer_object *bo,
  86. unsigned long page_offset)
  87. {
  88. struct ttm_bo_device *bdev = bo->bdev;
  89. if (bdev->driver->io_mem_pfn)
  90. return bdev->driver->io_mem_pfn(bo, page_offset);
  91. return ((bo->mem.bus.base + bo->mem.bus.offset) >> PAGE_SHIFT)
  92. + page_offset;
  93. }
  94. static vm_fault_t ttm_bo_vm_fault(struct vm_fault *vmf)
  95. {
  96. struct vm_area_struct *vma = vmf->vma;
  97. struct ttm_buffer_object *bo = (struct ttm_buffer_object *)
  98. vma->vm_private_data;
  99. struct ttm_bo_device *bdev = bo->bdev;
  100. unsigned long page_offset;
  101. unsigned long page_last;
  102. unsigned long pfn;
  103. struct ttm_tt *ttm = NULL;
  104. struct page *page;
  105. int err;
  106. int i;
  107. vm_fault_t ret = VM_FAULT_NOPAGE;
  108. unsigned long address = vmf->address;
  109. struct ttm_mem_type_manager *man =
  110. &bdev->man[bo->mem.mem_type];
  111. struct vm_area_struct cvma;
  112. /*
  113. * Work around locking order reversal in fault / nopfn
  114. * between mmap_sem and bo_reserve: Perform a trylock operation
  115. * for reserve, and if it fails, retry the fault after waiting
  116. * for the buffer to become unreserved.
  117. */
  118. err = ttm_bo_reserve(bo, true, true, NULL);
  119. if (unlikely(err != 0)) {
  120. if (err != -EBUSY)
  121. return VM_FAULT_NOPAGE;
  122. if (vmf->flags & FAULT_FLAG_ALLOW_RETRY) {
  123. if (!(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
  124. ttm_bo_get(bo);
  125. up_read(&vmf->vma->vm_mm->mmap_sem);
  126. (void) ttm_bo_wait_unreserved(bo);
  127. ttm_bo_put(bo);
  128. }
  129. return VM_FAULT_RETRY;
  130. }
  131. /*
  132. * If we'd want to change locking order to
  133. * mmap_sem -> bo::reserve, we'd use a blocking reserve here
  134. * instead of retrying the fault...
  135. */
  136. return VM_FAULT_NOPAGE;
  137. }
  138. /*
  139. * Refuse to fault imported pages. This should be handled
  140. * (if at all) by redirecting mmap to the exporter.
  141. */
  142. if (bo->ttm && (bo->ttm->page_flags & TTM_PAGE_FLAG_SG)) {
  143. ret = VM_FAULT_SIGBUS;
  144. goto out_unlock;
  145. }
  146. if (bdev->driver->fault_reserve_notify) {
  147. err = bdev->driver->fault_reserve_notify(bo);
  148. switch (err) {
  149. case 0:
  150. break;
  151. case -EBUSY:
  152. case -ERESTARTSYS:
  153. ret = VM_FAULT_NOPAGE;
  154. goto out_unlock;
  155. default:
  156. ret = VM_FAULT_SIGBUS;
  157. goto out_unlock;
  158. }
  159. }
  160. /*
  161. * Wait for buffer data in transit, due to a pipelined
  162. * move.
  163. */
  164. ret = ttm_bo_vm_fault_idle(bo, vmf);
  165. if (unlikely(ret != 0)) {
  166. if (ret == VM_FAULT_RETRY &&
  167. !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
  168. /* The BO has already been unreserved. */
  169. return ret;
  170. }
  171. goto out_unlock;
  172. }
  173. err = ttm_mem_io_lock(man, true);
  174. if (unlikely(err != 0)) {
  175. ret = VM_FAULT_NOPAGE;
  176. goto out_unlock;
  177. }
  178. err = ttm_mem_io_reserve_vm(bo);
  179. if (unlikely(err != 0)) {
  180. ret = VM_FAULT_SIGBUS;
  181. goto out_io_unlock;
  182. }
  183. page_offset = ((address - vma->vm_start) >> PAGE_SHIFT) +
  184. vma->vm_pgoff - drm_vma_node_start(&bo->vma_node);
  185. page_last = vma_pages(vma) + vma->vm_pgoff -
  186. drm_vma_node_start(&bo->vma_node);
  187. if (unlikely(page_offset >= bo->num_pages)) {
  188. ret = VM_FAULT_SIGBUS;
  189. goto out_io_unlock;
  190. }
  191. /*
  192. * Make a local vma copy to modify the page_prot member
  193. * and vm_flags if necessary. The vma parameter is protected
  194. * by mmap_sem in write mode.
  195. */
  196. cvma = *vma;
  197. cvma.vm_page_prot = vm_get_page_prot(cvma.vm_flags);
  198. if (bo->mem.bus.is_iomem) {
  199. cvma.vm_page_prot = ttm_io_prot(bo->mem.placement,
  200. cvma.vm_page_prot);
  201. } else {
  202. struct ttm_operation_ctx ctx = {
  203. .interruptible = false,
  204. .no_wait_gpu = false,
  205. .flags = TTM_OPT_FLAG_FORCE_ALLOC
  206. };
  207. ttm = bo->ttm;
  208. cvma.vm_page_prot = ttm_io_prot(bo->mem.placement,
  209. cvma.vm_page_prot);
  210. /* Allocate all page at once, most common usage */
  211. if (ttm_tt_populate(ttm, &ctx)) {
  212. ret = VM_FAULT_OOM;
  213. goto out_io_unlock;
  214. }
  215. }
  216. /*
  217. * Speculatively prefault a number of pages. Only error on
  218. * first page.
  219. */
  220. for (i = 0; i < TTM_BO_VM_NUM_PREFAULT; ++i) {
  221. if (bo->mem.bus.is_iomem) {
  222. /* Iomem should not be marked encrypted */
  223. cvma.vm_page_prot = pgprot_decrypted(cvma.vm_page_prot);
  224. pfn = ttm_bo_io_mem_pfn(bo, page_offset);
  225. } else {
  226. page = ttm->pages[page_offset];
  227. if (unlikely(!page && i == 0)) {
  228. ret = VM_FAULT_OOM;
  229. goto out_io_unlock;
  230. } else if (unlikely(!page)) {
  231. break;
  232. }
  233. page->index = drm_vma_node_start(&bo->vma_node) +
  234. page_offset;
  235. pfn = page_to_pfn(page);
  236. }
  237. if (vma->vm_flags & VM_MIXEDMAP)
  238. ret = vmf_insert_mixed(&cvma, address,
  239. __pfn_to_pfn_t(pfn, PFN_DEV));
  240. else
  241. ret = vmf_insert_pfn(&cvma, address, pfn);
  242. /*
  243. * Somebody beat us to this PTE or prefaulting to
  244. * an already populated PTE, or prefaulting error.
  245. */
  246. if (unlikely((ret == VM_FAULT_NOPAGE && i > 0)))
  247. break;
  248. else if (unlikely(ret & VM_FAULT_ERROR))
  249. goto out_io_unlock;
  250. address += PAGE_SIZE;
  251. if (unlikely(++page_offset >= page_last))
  252. break;
  253. }
  254. ret = VM_FAULT_NOPAGE;
  255. out_io_unlock:
  256. ttm_mem_io_unlock(man);
  257. out_unlock:
  258. ttm_bo_unreserve(bo);
  259. return ret;
  260. }
  261. static void ttm_bo_vm_open(struct vm_area_struct *vma)
  262. {
  263. struct ttm_buffer_object *bo =
  264. (struct ttm_buffer_object *)vma->vm_private_data;
  265. WARN_ON(bo->bdev->dev_mapping != vma->vm_file->f_mapping);
  266. ttm_bo_get(bo);
  267. }
  268. static void ttm_bo_vm_close(struct vm_area_struct *vma)
  269. {
  270. struct ttm_buffer_object *bo = (struct ttm_buffer_object *)vma->vm_private_data;
  271. ttm_bo_put(bo);
  272. vma->vm_private_data = NULL;
  273. }
  274. static int ttm_bo_vm_access_kmap(struct ttm_buffer_object *bo,
  275. unsigned long offset,
  276. uint8_t *buf, int len, int write)
  277. {
  278. unsigned long page = offset >> PAGE_SHIFT;
  279. unsigned long bytes_left = len;
  280. int ret;
  281. /* Copy a page at a time, that way no extra virtual address
  282. * mapping is needed
  283. */
  284. offset -= page << PAGE_SHIFT;
  285. do {
  286. unsigned long bytes = min(bytes_left, PAGE_SIZE - offset);
  287. struct ttm_bo_kmap_obj map;
  288. void *ptr;
  289. bool is_iomem;
  290. ret = ttm_bo_kmap(bo, page, 1, &map);
  291. if (ret)
  292. return ret;
  293. ptr = (uint8_t *)ttm_kmap_obj_virtual(&map, &is_iomem) + offset;
  294. WARN_ON_ONCE(is_iomem);
  295. if (write)
  296. memcpy(ptr, buf, bytes);
  297. else
  298. memcpy(buf, ptr, bytes);
  299. ttm_bo_kunmap(&map);
  300. page++;
  301. buf += bytes;
  302. bytes_left -= bytes;
  303. offset = 0;
  304. } while (bytes_left);
  305. return len;
  306. }
  307. static int ttm_bo_vm_access(struct vm_area_struct *vma, unsigned long addr,
  308. void *buf, int len, int write)
  309. {
  310. unsigned long offset = (addr) - vma->vm_start;
  311. struct ttm_buffer_object *bo = vma->vm_private_data;
  312. int ret;
  313. if (len < 1 || (offset + len) >> PAGE_SHIFT > bo->num_pages)
  314. return -EIO;
  315. ret = ttm_bo_reserve(bo, true, false, NULL);
  316. if (ret)
  317. return ret;
  318. switch (bo->mem.mem_type) {
  319. case TTM_PL_SYSTEM:
  320. if (unlikely(bo->ttm->page_flags & TTM_PAGE_FLAG_SWAPPED)) {
  321. ret = ttm_tt_swapin(bo->ttm);
  322. if (unlikely(ret != 0))
  323. return ret;
  324. }
  325. /* fall through */
  326. case TTM_PL_TT:
  327. ret = ttm_bo_vm_access_kmap(bo, offset, buf, len, write);
  328. break;
  329. default:
  330. if (bo->bdev->driver->access_memory)
  331. ret = bo->bdev->driver->access_memory(
  332. bo, offset, buf, len, write);
  333. else
  334. ret = -EIO;
  335. }
  336. ttm_bo_unreserve(bo);
  337. return ret;
  338. }
  339. static const struct vm_operations_struct ttm_bo_vm_ops = {
  340. .fault = ttm_bo_vm_fault,
  341. .open = ttm_bo_vm_open,
  342. .close = ttm_bo_vm_close,
  343. .access = ttm_bo_vm_access
  344. };
  345. static struct ttm_buffer_object *ttm_bo_vm_lookup(struct ttm_bo_device *bdev,
  346. unsigned long offset,
  347. unsigned long pages)
  348. {
  349. struct drm_vma_offset_node *node;
  350. struct ttm_buffer_object *bo = NULL;
  351. drm_vma_offset_lock_lookup(&bdev->vma_manager);
  352. node = drm_vma_offset_lookup_locked(&bdev->vma_manager, offset, pages);
  353. if (likely(node)) {
  354. bo = container_of(node, struct ttm_buffer_object, vma_node);
  355. bo = ttm_bo_get_unless_zero(bo);
  356. }
  357. drm_vma_offset_unlock_lookup(&bdev->vma_manager);
  358. if (!bo)
  359. pr_err("Could not find buffer object to map\n");
  360. return bo;
  361. }
  362. int ttm_bo_mmap(struct file *filp, struct vm_area_struct *vma,
  363. struct ttm_bo_device *bdev)
  364. {
  365. struct ttm_bo_driver *driver;
  366. struct ttm_buffer_object *bo;
  367. int ret;
  368. bo = ttm_bo_vm_lookup(bdev, vma->vm_pgoff, vma_pages(vma));
  369. if (unlikely(!bo))
  370. return -EINVAL;
  371. driver = bo->bdev->driver;
  372. if (unlikely(!driver->verify_access)) {
  373. ret = -EPERM;
  374. goto out_unref;
  375. }
  376. ret = driver->verify_access(bo, filp);
  377. if (unlikely(ret != 0))
  378. goto out_unref;
  379. vma->vm_ops = &ttm_bo_vm_ops;
  380. /*
  381. * Note: We're transferring the bo reference to
  382. * vma->vm_private_data here.
  383. */
  384. vma->vm_private_data = bo;
  385. /*
  386. * We'd like to use VM_PFNMAP on shared mappings, where
  387. * (vma->vm_flags & VM_SHARED) != 0, for performance reasons,
  388. * but for some reason VM_PFNMAP + x86 PAT + write-combine is very
  389. * bad for performance. Until that has been sorted out, use
  390. * VM_MIXEDMAP on all mappings. See freedesktop.org bug #75719
  391. */
  392. vma->vm_flags |= VM_MIXEDMAP;
  393. vma->vm_flags |= VM_IO | VM_DONTEXPAND | VM_DONTDUMP;
  394. return 0;
  395. out_unref:
  396. ttm_bo_put(bo);
  397. return ret;
  398. }
  399. EXPORT_SYMBOL(ttm_bo_mmap);
  400. int ttm_fbdev_mmap(struct vm_area_struct *vma, struct ttm_buffer_object *bo)
  401. {
  402. if (vma->vm_pgoff != 0)
  403. return -EACCES;
  404. ttm_bo_get(bo);
  405. vma->vm_ops = &ttm_bo_vm_ops;
  406. vma->vm_private_data = bo;
  407. vma->vm_flags |= VM_MIXEDMAP;
  408. vma->vm_flags |= VM_IO | VM_DONTEXPAND;
  409. return 0;
  410. }
  411. EXPORT_SYMBOL(ttm_fbdev_mmap);