17f4dd379Sjsg /* SPDX-License-Identifier: GPL-2.0 OR MIT */
21099013bSjsg /**************************************************************************
31099013bSjsg *
41099013bSjsg * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
51099013bSjsg * All Rights Reserved.
61099013bSjsg *
71099013bSjsg * Permission is hereby granted, free of charge, to any person obtaining a
81099013bSjsg * copy of this software and associated documentation files (the
91099013bSjsg * "Software"), to deal in the Software without restriction, including
101099013bSjsg * without limitation the rights to use, copy, modify, merge, publish,
111099013bSjsg * distribute, sub license, and/or sell copies of the Software, and to
121099013bSjsg * permit persons to whom the Software is furnished to do so, subject to
131099013bSjsg * the following conditions:
141099013bSjsg *
151099013bSjsg * The above copyright notice and this permission notice (including the
161099013bSjsg * next paragraph) shall be included in all copies or substantial portions
171099013bSjsg * of the Software.
181099013bSjsg *
191099013bSjsg * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
201099013bSjsg * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
211099013bSjsg * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
221099013bSjsg * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
231099013bSjsg * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
241099013bSjsg * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
251099013bSjsg * USE OR OTHER DEALINGS IN THE SOFTWARE.
261099013bSjsg *
271099013bSjsg **************************************************************************/
281099013bSjsg /*
291099013bSjsg * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
301099013bSjsg */
311099013bSjsg
321099013bSjsg #define pr_fmt(fmt) "[TTM] " fmt
331099013bSjsg
345f11f933Sjsg #include <linux/cc_platform.h>
357f4dd379Sjsg #include <linux/sched.h>
367f4dd379Sjsg #include <linux/shmem_fs.h>
377f4dd379Sjsg #include <linux/file.h>
381bb76ff1Sjsg #include <linux/module.h>
397f4dd379Sjsg #include <drm/drm_cache.h>
405f11f933Sjsg #include <drm/drm_device.h>
415f11f933Sjsg #include <drm/drm_util.h>
42f005ef32Sjsg #include <drm/ttm/ttm_bo.h>
43f005ef32Sjsg #include <drm/ttm/ttm_tt.h>
447f4dd379Sjsg
455ca02815Sjsg #include "ttm_module.h"
465ca02815Sjsg
475ca02815Sjsg static unsigned long ttm_pages_limit;
485ca02815Sjsg
495ca02815Sjsg MODULE_PARM_DESC(pages_limit, "Limit for the allocated pages");
505ca02815Sjsg module_param_named(pages_limit, ttm_pages_limit, ulong, 0644);
515ca02815Sjsg
525ca02815Sjsg static unsigned long ttm_dma32_pages_limit;
535ca02815Sjsg
545ca02815Sjsg MODULE_PARM_DESC(dma32_pages_limit, "Limit for the allocated DMA32 pages");
555ca02815Sjsg module_param_named(dma32_pages_limit, ttm_dma32_pages_limit, ulong, 0644);
565ca02815Sjsg
575ca02815Sjsg static atomic_long_t ttm_pages_allocated;
585ca02815Sjsg static atomic_long_t ttm_dma32_pages_allocated;
595ca02815Sjsg
605ca02815Sjsg /*
617f4dd379Sjsg * Allocates a ttm structure for the given BO.
627f4dd379Sjsg */
ttm_tt_create(struct ttm_buffer_object * bo,bool zero_alloc)637f4dd379Sjsg int ttm_tt_create(struct ttm_buffer_object *bo, bool zero_alloc)
647f4dd379Sjsg {
655ca02815Sjsg struct ttm_device *bdev = bo->bdev;
665f11f933Sjsg struct drm_device *ddev = bo->base.dev;
677f4dd379Sjsg uint32_t page_flags = 0;
687f4dd379Sjsg
69c349dbc7Sjsg dma_resv_assert_held(bo->base.resv);
707f4dd379Sjsg
71ad8b1aafSjsg if (bo->ttm)
72ad8b1aafSjsg return 0;
73ad8b1aafSjsg
747f4dd379Sjsg switch (bo->type) {
757f4dd379Sjsg case ttm_bo_type_device:
767f4dd379Sjsg if (zero_alloc)
771bb76ff1Sjsg page_flags |= TTM_TT_FLAG_ZERO_ALLOC;
787f4dd379Sjsg break;
797f4dd379Sjsg case ttm_bo_type_kernel:
807f4dd379Sjsg break;
817f4dd379Sjsg case ttm_bo_type_sg:
821bb76ff1Sjsg page_flags |= TTM_TT_FLAG_EXTERNAL;
837f4dd379Sjsg break;
847f4dd379Sjsg default:
857f4dd379Sjsg pr_err("Illegal buffer object type\n");
867f4dd379Sjsg return -EINVAL;
877f4dd379Sjsg }
885f11f933Sjsg /*
895f11f933Sjsg * When using dma_alloc_coherent with memory encryption the
905f11f933Sjsg * mapped TT pages need to be decrypted or otherwise the drivers
915f11f933Sjsg * will end up sending encrypted mem to the gpu.
925f11f933Sjsg */
935f11f933Sjsg if (bdev->pool.use_dma_alloc && cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT)) {
945f11f933Sjsg page_flags |= TTM_TT_FLAG_DECRYPTED;
95*605668f9Sjsg drm_info_once(ddev, "TT memory decryption enabled.");
965f11f933Sjsg }
977f4dd379Sjsg
985ca02815Sjsg bo->ttm = bdev->funcs->ttm_tt_create(bo, page_flags);
997f4dd379Sjsg if (unlikely(bo->ttm == NULL))
1007f4dd379Sjsg return -ENOMEM;
1017f4dd379Sjsg
1021bb76ff1Sjsg WARN_ON(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL_MAPPABLE &&
1031bb76ff1Sjsg !(bo->ttm->page_flags & TTM_TT_FLAG_EXTERNAL));
1041bb76ff1Sjsg
1057f4dd379Sjsg return 0;
1067f4dd379Sjsg }
1071099013bSjsg
1085ca02815Sjsg /*
1091099013bSjsg * Allocates storage for pointers to the pages that back the ttm.
1101099013bSjsg */
ttm_tt_alloc_page_directory(struct ttm_tt * ttm)1117f4dd379Sjsg static int ttm_tt_alloc_page_directory(struct ttm_tt *ttm)
1121099013bSjsg {
1131bb76ff1Sjsg ttm->pages = kvcalloc(ttm->num_pages, sizeof(void*), GFP_KERNEL);
1147f4dd379Sjsg if (!ttm->pages)
1157f4dd379Sjsg return -ENOMEM;
1165ca02815Sjsg ttm->orders = kvmalloc_array(ttm->num_pages,
1171bb76ff1Sjsg sizeof(unsigned long), GFP_KERNEL | __GFP_ZERO);
1185ca02815Sjsg if (!ttm->orders)
1195ca02815Sjsg return -ENOMEM;
1207f4dd379Sjsg return 0;
1211099013bSjsg }
1221099013bSjsg
ttm_dma_tt_alloc_page_directory(struct ttm_tt * ttm)1235ca02815Sjsg static int ttm_dma_tt_alloc_page_directory(struct ttm_tt *ttm)
1241099013bSjsg {
1251bb76ff1Sjsg ttm->pages = kvcalloc(ttm->num_pages, sizeof(*ttm->pages) +
1261bb76ff1Sjsg sizeof(*ttm->dma_address), GFP_KERNEL);
1275ca02815Sjsg if (!ttm->pages)
1287f4dd379Sjsg return -ENOMEM;
1295ca02815Sjsg
1305ca02815Sjsg ttm->dma_address = (void *)(ttm->pages + ttm->num_pages);
1315ca02815Sjsg
1325ca02815Sjsg ttm->orders = kvmalloc_array(ttm->num_pages,
1335ca02815Sjsg sizeof(unsigned long),
1345ca02815Sjsg GFP_KERNEL | __GFP_ZERO);
1355ca02815Sjsg if (!ttm->orders)
1365ca02815Sjsg return -ENOMEM;
1377f4dd379Sjsg return 0;
1381099013bSjsg }
1391099013bSjsg
ttm_sg_tt_alloc_page_directory(struct ttm_tt * ttm)1405ca02815Sjsg static int ttm_sg_tt_alloc_page_directory(struct ttm_tt *ttm)
1417f4dd379Sjsg {
1421bb76ff1Sjsg ttm->dma_address = kvcalloc(ttm->num_pages, sizeof(*ttm->dma_address),
1431bb76ff1Sjsg GFP_KERNEL);
1447f4dd379Sjsg if (!ttm->dma_address)
1457f4dd379Sjsg return -ENOMEM;
1461bb76ff1Sjsg
1477f4dd379Sjsg return 0;
1487f4dd379Sjsg }
1497f4dd379Sjsg
ttm_tt_destroy(struct ttm_device * bdev,struct ttm_tt * ttm)1505ca02815Sjsg void ttm_tt_destroy(struct ttm_device *bdev, struct ttm_tt *ttm)
151ad8b1aafSjsg {
1525ca02815Sjsg bdev->funcs->ttm_tt_destroy(bdev, ttm);
1531099013bSjsg }
1541099013bSjsg
ttm_tt_init_fields(struct ttm_tt * ttm,struct ttm_buffer_object * bo,uint32_t page_flags,enum ttm_caching caching,unsigned long extra_pages)155c349dbc7Sjsg static void ttm_tt_init_fields(struct ttm_tt *ttm,
156c349dbc7Sjsg struct ttm_buffer_object *bo,
1575ca02815Sjsg uint32_t page_flags,
1581bb76ff1Sjsg enum ttm_caching caching,
1591bb76ff1Sjsg unsigned long extra_pages)
1601099013bSjsg {
1611bb76ff1Sjsg ttm->num_pages = (PAGE_ALIGN(bo->base.size) >> PAGE_SHIFT) + extra_pages;
1621099013bSjsg ttm->page_flags = page_flags;
1635ca02815Sjsg ttm->dma_address = NULL;
1641099013bSjsg ttm->swap_storage = NULL;
1657f4dd379Sjsg ttm->sg = bo->sg;
1665ca02815Sjsg ttm->caching = caching;
167fb366a91Sjsg ttm->dmat = bo->bdev->dmat;
168fb366a91Sjsg ttm->map = NULL;
169fb366a91Sjsg ttm->segs = NULL;
1707f4dd379Sjsg }
1711099013bSjsg
ttm_tt_init(struct ttm_tt * ttm,struct ttm_buffer_object * bo,uint32_t page_flags,enum ttm_caching caching,unsigned long extra_pages)1727f4dd379Sjsg int ttm_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
1731bb76ff1Sjsg uint32_t page_flags, enum ttm_caching caching,
1741bb76ff1Sjsg unsigned long extra_pages)
1757f4dd379Sjsg {
1761bb76ff1Sjsg ttm_tt_init_fields(ttm, bo, page_flags, caching, extra_pages);
1777f4dd379Sjsg
1787f4dd379Sjsg if (ttm_tt_alloc_page_directory(ttm)) {
179d765308cSjsg pr_err("Failed allocating page table\n");
1801099013bSjsg return -ENOMEM;
1811099013bSjsg }
1821099013bSjsg return 0;
1831099013bSjsg }
1841099013bSjsg EXPORT_SYMBOL(ttm_tt_init);
1851099013bSjsg
ttm_tt_fini(struct ttm_tt * ttm)186e4d605f7Sjsg void ttm_tt_fini(struct ttm_tt *ttm)
1871099013bSjsg {
1881bb76ff1Sjsg WARN_ON(ttm->page_flags & TTM_TT_FLAG_PRIV_POPULATED);
1891bb76ff1Sjsg
1901bb76ff1Sjsg if (ttm->swap_storage)
1911bb76ff1Sjsg uao_detach(ttm->swap_storage);
1921bb76ff1Sjsg ttm->swap_storage = NULL;
1931bb76ff1Sjsg
1945ca02815Sjsg if (ttm->pages)
1957f4dd379Sjsg kvfree(ttm->pages);
1965ca02815Sjsg else
1975ca02815Sjsg kvfree(ttm->dma_address);
1985ca02815Sjsg kvfree(ttm->orders);
1991099013bSjsg ttm->pages = NULL;
2005ca02815Sjsg ttm->dma_address = NULL;
2015ca02815Sjsg ttm->orders = NULL;
2025ca02815Sjsg
203fb366a91Sjsg if (ttm->map)
2045ca02815Sjsg bus_dmamap_destroy(ttm->dmat, ttm->map);
205fb366a91Sjsg if (ttm->segs)
2065ca02815Sjsg km_free(ttm->segs, round_page(ttm->num_pages *
2075ca02815Sjsg sizeof(bus_dma_segment_t)), &kv_any, &kp_zero);
2081099013bSjsg }
2091099013bSjsg EXPORT_SYMBOL(ttm_tt_fini);
2101099013bSjsg
ttm_sg_tt_init(struct ttm_tt * ttm,struct ttm_buffer_object * bo,uint32_t page_flags,enum ttm_caching caching)2115ca02815Sjsg int ttm_sg_tt_init(struct ttm_tt *ttm, struct ttm_buffer_object *bo,
2125ca02815Sjsg uint32_t page_flags, enum ttm_caching caching)
2131099013bSjsg {
2147f4dd379Sjsg int ret;
2155ca02815Sjsg int flags = BUS_DMA_WAITOK;
2167f4dd379Sjsg
2171bb76ff1Sjsg ttm_tt_init_fields(ttm, bo, page_flags, caching, 0);
2187f4dd379Sjsg
2191bb76ff1Sjsg if (page_flags & TTM_TT_FLAG_EXTERNAL)
2205ca02815Sjsg ret = ttm_sg_tt_alloc_page_directory(ttm);
2217f4dd379Sjsg else
2225ca02815Sjsg ret = ttm_dma_tt_alloc_page_directory(ttm);
2237f4dd379Sjsg if (ret) {
2247f4dd379Sjsg pr_err("Failed allocating page table\n");
2257f4dd379Sjsg return -ENOMEM;
2267f4dd379Sjsg }
2277f4dd379Sjsg
2285ca02815Sjsg ttm->segs = km_alloc(round_page(ttm->num_pages *
22952755b20Sjsg sizeof(bus_dma_segment_t)), &kv_any, &kp_zero, &kd_waitok);
2307f4dd379Sjsg
2315ca02815Sjsg if (bo->bdev->pool.use_dma32 == false)
232804f6649Skettenis flags |= BUS_DMA_64BIT;
2335ca02815Sjsg if (bus_dmamap_create(ttm->dmat, ttm->num_pages << PAGE_SHIFT,
234804f6649Skettenis ttm->num_pages, ttm->num_pages << PAGE_SHIFT, 0, flags,
2355ca02815Sjsg &ttm->map)) {
2365ca02815Sjsg km_free(ttm->segs, round_page(ttm->num_pages *
23752755b20Sjsg sizeof(bus_dma_segment_t)), &kv_any, &kp_zero);
2385ca02815Sjsg if (ttm->pages) {
23979915d4eSjsg kvfree(ttm->pages);
2405ca02815Sjsg kvfree(ttm->orders);
2415ca02815Sjsg } else
2425ca02815Sjsg kvfree(ttm->dma_address);
24379915d4eSjsg ttm->pages = NULL;
2445ca02815Sjsg ttm->orders = NULL;
2455ca02815Sjsg ttm->dma_address = NULL;
2467f4dd379Sjsg pr_err("Failed allocating page table\n");
2477f4dd379Sjsg return -ENOMEM;
2487f4dd379Sjsg }
2497f4dd379Sjsg
2507f4dd379Sjsg return 0;
2517f4dd379Sjsg }
2527f4dd379Sjsg EXPORT_SYMBOL(ttm_sg_tt_init);
2537f4dd379Sjsg
ttm_tt_swapin(struct ttm_tt * ttm)254e4d605f7Sjsg int ttm_tt_swapin(struct ttm_tt *ttm)
2551099013bSjsg {
2561099013bSjsg struct uvm_object *swap_storage;
2571099013bSjsg struct vm_page *from_page;
2581099013bSjsg struct vm_page *to_page;
2591099013bSjsg struct pglist plist;
2605ca02815Sjsg int i, ret;
2611099013bSjsg
2621099013bSjsg swap_storage = ttm->swap_storage;
2631099013bSjsg BUG_ON(swap_storage == NULL);
2641099013bSjsg
2651099013bSjsg TAILQ_INIT(&plist);
2665ca02815Sjsg if (uvm_obj_wire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT,
2675ca02815Sjsg &plist)) {
2685ca02815Sjsg ret = -ENOMEM;
2691099013bSjsg goto out_err;
2705ca02815Sjsg }
2711099013bSjsg
2721099013bSjsg from_page = TAILQ_FIRST(&plist);
2731099013bSjsg for (i = 0; i < ttm->num_pages; ++i) {
2741099013bSjsg to_page = ttm->pages[i];
2755ca02815Sjsg if (unlikely(to_page == NULL)) {
2765ca02815Sjsg ret = -ENOMEM;
2771099013bSjsg goto out_err;
2785ca02815Sjsg }
2791099013bSjsg
2801099013bSjsg uvm_pagecopy(from_page, to_page);
2811099013bSjsg from_page = TAILQ_NEXT(from_page, pageq);
2821099013bSjsg }
2831099013bSjsg
284da3d0110Smpi uvm_obj_unwire(swap_storage, 0, ttm->num_pages << PAGE_SHIFT);
2851099013bSjsg
2861099013bSjsg uao_detach(swap_storage);
2871099013bSjsg ttm->swap_storage = NULL;
2881bb76ff1Sjsg ttm->page_flags &= ~TTM_TT_FLAG_SWAPPED;
2891099013bSjsg
2901099013bSjsg return 0;
2915ca02815Sjsg
2921099013bSjsg out_err:
2931099013bSjsg return ret;
2941099013bSjsg }
2951099013bSjsg
2965ca02815Sjsg /**
2975ca02815Sjsg * ttm_tt_swapout - swap out tt object
2985ca02815Sjsg *
2995ca02815Sjsg * @bdev: TTM device structure.
3005ca02815Sjsg * @ttm: The struct ttm_tt.
3015ca02815Sjsg * @gfp_flags: Flags to use for memory allocation.
3025ca02815Sjsg *
3035ca02815Sjsg * Swapout a TT object to a shmem_file, return number of pages swapped out or
3045ca02815Sjsg * negative error code.
3055ca02815Sjsg */
ttm_tt_swapout(struct ttm_device * bdev,struct ttm_tt * ttm,gfp_t gfp_flags)3065ca02815Sjsg int ttm_tt_swapout(struct ttm_device *bdev, struct ttm_tt *ttm,
3075ca02815Sjsg gfp_t gfp_flags)
3081099013bSjsg {
3095ca02815Sjsg STUB();
3105ca02815Sjsg return -ENOSYS;
3115ca02815Sjsg #ifdef notyet
3125ca02815Sjsg loff_t size = (loff_t)ttm->num_pages << PAGE_SHIFT;
3131099013bSjsg struct uvm_object *swap_storage;
3141099013bSjsg struct vm_page *from_page;
3151099013bSjsg struct vm_page *to_page;
3165ca02815Sjsg int i, ret;
3171099013bSjsg
3185ca02815Sjsg swap_storage = uao_create(size, 0);
3191099013bSjsg #ifdef notyet
3207f4dd379Sjsg if (IS_ERR(swap_storage)) {
3211099013bSjsg pr_err("Failed allocating swap storage\n");
3221099013bSjsg return PTR_ERR(swap_storage);
3231099013bSjsg }
3241099013bSjsg #endif
3251099013bSjsg
3261099013bSjsg for (i = 0; i < ttm->num_pages; ++i) {
3271099013bSjsg from_page = ttm->pages[i];
3281099013bSjsg if (unlikely(from_page == NULL))
3291099013bSjsg continue;
3307f4dd379Sjsg
3315ca02815Sjsg to_page = shmem_read_mapping_page_gfp(swap_space, i, gfp_flags);
3325ca02815Sjsg if (IS_ERR(to_page)) {
3335ca02815Sjsg ret = PTR_ERR(to_page);
3345ca02815Sjsg goto out_err;
3355ca02815Sjsg }
3365ca02815Sjsg copy_highpage(to_page, from_page);
3371099013bSjsg set_page_dirty(to_page);
3381099013bSjsg mark_page_accessed(to_page);
3395ca02815Sjsg put_page(to_page);
3401099013bSjsg }
3411099013bSjsg
342ad8b1aafSjsg ttm_tt_unpopulate(bdev, ttm);
3431099013bSjsg ttm->swap_storage = swap_storage;
3441bb76ff1Sjsg ttm->page_flags |= TTM_TT_FLAG_SWAPPED;
3451099013bSjsg
3465ca02815Sjsg return ttm->num_pages;
3475ca02815Sjsg
3481099013bSjsg out_err:
3491099013bSjsg uao_detach(swap_storage);
3501099013bSjsg
3511099013bSjsg return ret;
3525ca02815Sjsg #endif
3531099013bSjsg }
3547ccd5a2cSjsg
ttm_tt_populate(struct ttm_device * bdev,struct ttm_tt * ttm,struct ttm_operation_ctx * ctx)3555ca02815Sjsg int ttm_tt_populate(struct ttm_device *bdev,
356ad8b1aafSjsg struct ttm_tt *ttm, struct ttm_operation_ctx *ctx)
3577f4dd379Sjsg {
3587f4dd379Sjsg int ret;
3597f4dd379Sjsg
360ad8b1aafSjsg if (!ttm)
361ad8b1aafSjsg return -EINVAL;
362ad8b1aafSjsg
363ad8b1aafSjsg if (ttm_tt_is_populated(ttm))
3647f4dd379Sjsg return 0;
3657f4dd379Sjsg
3661bb76ff1Sjsg if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
3675ca02815Sjsg atomic_long_add(ttm->num_pages, &ttm_pages_allocated);
3685ca02815Sjsg if (bdev->pool.use_dma32)
3695ca02815Sjsg atomic_long_add(ttm->num_pages,
3705ca02815Sjsg &ttm_dma32_pages_allocated);
3715ca02815Sjsg }
3725ca02815Sjsg
3735ca02815Sjsg while (atomic_long_read(&ttm_pages_allocated) > ttm_pages_limit ||
3745ca02815Sjsg atomic_long_read(&ttm_dma32_pages_allocated) >
3755ca02815Sjsg ttm_dma32_pages_limit) {
3765ca02815Sjsg
3775ca02815Sjsg ret = ttm_global_swapout(ctx, GFP_KERNEL);
3785ca02815Sjsg if (ret == 0)
3795ca02815Sjsg break;
3805ca02815Sjsg if (ret < 0)
3815ca02815Sjsg goto error;
3825ca02815Sjsg }
3835ca02815Sjsg
3845ca02815Sjsg if (bdev->funcs->ttm_tt_populate)
3855ca02815Sjsg ret = bdev->funcs->ttm_tt_populate(bdev, ttm, ctx);
3867f4dd379Sjsg else
3875ca02815Sjsg ret = ttm_pool_alloc(&bdev->pool, ttm, ctx);
3885ca02815Sjsg if (ret)
3895ca02815Sjsg goto error;
3905ca02815Sjsg
3911bb76ff1Sjsg ttm->page_flags |= TTM_TT_FLAG_PRIV_POPULATED;
3921bb76ff1Sjsg if (unlikely(ttm->page_flags & TTM_TT_FLAG_SWAPPED)) {
3935ca02815Sjsg ret = ttm_tt_swapin(ttm);
3945ca02815Sjsg if (unlikely(ret != 0)) {
3955ca02815Sjsg ttm_tt_unpopulate(bdev, ttm);
3965ca02815Sjsg return ret;
3975ca02815Sjsg }
3985ca02815Sjsg }
3995ca02815Sjsg
4005ca02815Sjsg return 0;
4015ca02815Sjsg
4025ca02815Sjsg error:
4031bb76ff1Sjsg if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
4045ca02815Sjsg atomic_long_sub(ttm->num_pages, &ttm_pages_allocated);
4055ca02815Sjsg if (bdev->pool.use_dma32)
4065ca02815Sjsg atomic_long_sub(ttm->num_pages,
4075ca02815Sjsg &ttm_dma32_pages_allocated);
4085ca02815Sjsg }
4097f4dd379Sjsg return ret;
4107f4dd379Sjsg }
411ad8b1aafSjsg EXPORT_SYMBOL(ttm_tt_populate);
4127f4dd379Sjsg
ttm_tt_unpopulate(struct ttm_device * bdev,struct ttm_tt * ttm)4135ca02815Sjsg void ttm_tt_unpopulate(struct ttm_device *bdev, struct ttm_tt *ttm)
4147ccd5a2cSjsg {
415ad8b1aafSjsg if (!ttm_tt_is_populated(ttm))
4167ccd5a2cSjsg return;
4177ccd5a2cSjsg
4185ca02815Sjsg if (bdev->funcs->ttm_tt_unpopulate)
4195ca02815Sjsg bdev->funcs->ttm_tt_unpopulate(bdev, ttm);
4207f4dd379Sjsg else
4215ca02815Sjsg ttm_pool_free(&bdev->pool, ttm);
4225ca02815Sjsg
4231bb76ff1Sjsg if (!(ttm->page_flags & TTM_TT_FLAG_EXTERNAL)) {
4245ca02815Sjsg atomic_long_sub(ttm->num_pages, &ttm_pages_allocated);
4255ca02815Sjsg if (bdev->pool.use_dma32)
4265ca02815Sjsg atomic_long_sub(ttm->num_pages,
4275ca02815Sjsg &ttm_dma32_pages_allocated);
4287ccd5a2cSjsg }
4295ca02815Sjsg
4301bb76ff1Sjsg ttm->page_flags &= ~TTM_TT_FLAG_PRIV_POPULATED;
4315ca02815Sjsg }
4325ca02815Sjsg
4335ca02815Sjsg #ifdef CONFIG_DEBUG_FS
4345ca02815Sjsg
4355ca02815Sjsg /* Test the shrinker functions and dump the result */
ttm_tt_debugfs_shrink_show(struct seq_file * m,void * data)4365ca02815Sjsg static int ttm_tt_debugfs_shrink_show(struct seq_file *m, void *data)
4375ca02815Sjsg {
4385ca02815Sjsg struct ttm_operation_ctx ctx = { false, false };
4395ca02815Sjsg
4405ca02815Sjsg seq_printf(m, "%d\n", ttm_global_swapout(&ctx, GFP_KERNEL));
4415ca02815Sjsg return 0;
4425ca02815Sjsg }
4435ca02815Sjsg DEFINE_SHOW_ATTRIBUTE(ttm_tt_debugfs_shrink);
4445ca02815Sjsg
4455ca02815Sjsg #endif
4465ca02815Sjsg
4475ca02815Sjsg
4485ca02815Sjsg /*
4495ca02815Sjsg * ttm_tt_mgr_init - register with the MM shrinker
4505ca02815Sjsg *
4515ca02815Sjsg * Register with the MM shrinker for swapping out BOs.
4525ca02815Sjsg */
ttm_tt_mgr_init(unsigned long num_pages,unsigned long num_dma32_pages)4535ca02815Sjsg void ttm_tt_mgr_init(unsigned long num_pages, unsigned long num_dma32_pages)
4545ca02815Sjsg {
4555ca02815Sjsg #ifdef CONFIG_DEBUG_FS
4565ca02815Sjsg debugfs_create_file("tt_shrink", 0400, ttm_debugfs_root, NULL,
4575ca02815Sjsg &ttm_tt_debugfs_shrink_fops);
4585ca02815Sjsg #endif
4595ca02815Sjsg
4605ca02815Sjsg if (!ttm_pages_limit)
4615ca02815Sjsg ttm_pages_limit = num_pages;
4625ca02815Sjsg
4635ca02815Sjsg if (!ttm_dma32_pages_limit)
4645ca02815Sjsg ttm_dma32_pages_limit = num_dma32_pages;
4655ca02815Sjsg }
4665ca02815Sjsg
ttm_kmap_iter_tt_map_local(struct ttm_kmap_iter * iter,struct iosys_map * dmap,pgoff_t i,bus_space_tag_t bst)4675ca02815Sjsg static void ttm_kmap_iter_tt_map_local(struct ttm_kmap_iter *iter,
4681bb76ff1Sjsg struct iosys_map *dmap,
4695ca02815Sjsg pgoff_t i, bus_space_tag_t bst)
4705ca02815Sjsg {
4715ca02815Sjsg struct ttm_kmap_iter_tt *iter_tt =
4725ca02815Sjsg container_of(iter, typeof(*iter_tt), base);
4735ca02815Sjsg
4745ca02815Sjsg #ifdef __linux__
4751bb76ff1Sjsg iosys_map_set_vaddr(dmap, kmap_local_page_prot(iter_tt->tt->pages[i],
4765ca02815Sjsg iter_tt->prot));
4775ca02815Sjsg #else
4781bb76ff1Sjsg iosys_map_set_vaddr(dmap, kmap_atomic_prot(iter_tt->tt->pages[i],
4795ca02815Sjsg iter_tt->prot));
4805ca02815Sjsg #endif
4815ca02815Sjsg }
4825ca02815Sjsg
ttm_kmap_iter_tt_unmap_local(struct ttm_kmap_iter * iter,struct iosys_map * map,bus_space_tag_t bst)4835ca02815Sjsg static void ttm_kmap_iter_tt_unmap_local(struct ttm_kmap_iter *iter,
4841bb76ff1Sjsg struct iosys_map *map, bus_space_tag_t bst)
4855ca02815Sjsg {
4865ca02815Sjsg #ifdef __linux__
4875ca02815Sjsg kunmap_local(map->vaddr);
4885ca02815Sjsg #else
4895ca02815Sjsg kunmap_atomic(map->vaddr);
4905ca02815Sjsg #endif
4915ca02815Sjsg }
4925ca02815Sjsg
4935ca02815Sjsg static const struct ttm_kmap_iter_ops ttm_kmap_iter_tt_ops = {
4945ca02815Sjsg .map_local = ttm_kmap_iter_tt_map_local,
4955ca02815Sjsg .unmap_local = ttm_kmap_iter_tt_unmap_local,
4965ca02815Sjsg .maps_tt = true,
4975ca02815Sjsg };
4985ca02815Sjsg
4995ca02815Sjsg /**
5005ca02815Sjsg * ttm_kmap_iter_tt_init - Initialize a struct ttm_kmap_iter_tt
5015ca02815Sjsg * @iter_tt: The struct ttm_kmap_iter_tt to initialize.
5025ca02815Sjsg * @tt: Struct ttm_tt holding page pointers of the struct ttm_resource.
5035ca02815Sjsg *
5045ca02815Sjsg * Return: Pointer to the embedded struct ttm_kmap_iter.
5055ca02815Sjsg */
5065ca02815Sjsg struct ttm_kmap_iter *
ttm_kmap_iter_tt_init(struct ttm_kmap_iter_tt * iter_tt,struct ttm_tt * tt)5075ca02815Sjsg ttm_kmap_iter_tt_init(struct ttm_kmap_iter_tt *iter_tt,
5085ca02815Sjsg struct ttm_tt *tt)
5095ca02815Sjsg {
5105ca02815Sjsg iter_tt->base.ops = &ttm_kmap_iter_tt_ops;
5115ca02815Sjsg iter_tt->tt = tt;
5125ca02815Sjsg if (tt)
5135ca02815Sjsg iter_tt->prot = ttm_prot_from_caching(tt->caching, PAGE_KERNEL);
5145ca02815Sjsg else
5155ca02815Sjsg iter_tt->prot = PAGE_KERNEL;
5165ca02815Sjsg
5175ca02815Sjsg return &iter_tt->base;
5185ca02815Sjsg }
5195ca02815Sjsg EXPORT_SYMBOL(ttm_kmap_iter_tt_init);
520f005ef32Sjsg
ttm_tt_pages_limit(void)521f005ef32Sjsg unsigned long ttm_tt_pages_limit(void)
522f005ef32Sjsg {
523f005ef32Sjsg return ttm_pages_limit;
524f005ef32Sjsg }
525f005ef32Sjsg EXPORT_SYMBOL(ttm_tt_pages_limit);
526