blob: 60fcef1593dd643af7c11f7dd546cba8d11d2115 [file] [log] [blame]
Thomas Hellstromba4e7d92009-06-10 15:20:19 +02001/**************************************************************************
2 *
3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27/*
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
29 */
30
Joe Perches25d04792012-03-16 21:43:50 -070031#define pr_fmt(fmt) "[TTM] " fmt
32
Masahiro Yamada2da83312017-04-24 13:50:20 +090033#include <drm/ttm/ttm_module.h>
34#include <drm/ttm/ttm_bo_driver.h>
35#include <drm/ttm/ttm_placement.h>
David Herrmann72525b32013-07-24 21:08:53 +020036#include <drm/drm_vma_manager.h>
Thomas Hellstromba4e7d92009-06-10 15:20:19 +020037#include <linux/mm.h>
Dan Williams01c8f1c2016-01-15 16:56:40 -080038#include <linux/pfn_t.h>
Thomas Hellstromba4e7d92009-06-10 15:20:19 +020039#include <linux/rbtree.h>
40#include <linux/module.h>
41#include <linux/uaccess.h>
Tom Lendacky95cf9262017-07-17 16:10:26 -050042#include <linux/mem_encrypt.h>
Thomas Hellstromba4e7d92009-06-10 15:20:19 +020043
44#define TTM_BO_VM_NUM_PREFAULT 16
45
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070046static int ttm_bo_vm_fault_idle(struct ttm_buffer_object *bo,
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070047 struct vm_fault *vmf)
48{
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070049 int ret = 0;
50
Christian König5bc73062016-06-15 13:44:01 +020051 if (likely(!bo->moving))
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070052 goto out_unlock;
53
54 /*
55 * Quick non-stalling check for idle.
56 */
Chris Wilsonf54d1862016-10-25 13:00:45 +010057 if (dma_fence_is_signaled(bo->moving))
Christian König5bc73062016-06-15 13:44:01 +020058 goto out_clear;
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070059
60 /*
61 * If possible, avoid waiting for GPU with mmap_sem
62 * held.
63 */
64 if (vmf->flags & FAULT_FLAG_ALLOW_RETRY) {
65 ret = VM_FAULT_RETRY;
66 if (vmf->flags & FAULT_FLAG_RETRY_NOWAIT)
67 goto out_unlock;
68
Nicolai Hähnle3089c1d2017-02-18 22:59:56 +010069 ttm_bo_reference(bo);
Dave Jiang11bac802017-02-24 14:56:41 -080070 up_read(&vmf->vma->vm_mm->mmap_sem);
Chris Wilsonf54d1862016-10-25 13:00:45 +010071 (void) dma_fence_wait(bo->moving, true);
Nicolai Hähnle3089c1d2017-02-18 22:59:56 +010072 ttm_bo_unreserve(bo);
73 ttm_bo_unref(&bo);
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070074 goto out_unlock;
75 }
76
77 /*
78 * Ordinary wait.
79 */
Chris Wilsonf54d1862016-10-25 13:00:45 +010080 ret = dma_fence_wait(bo->moving, true);
Christian König5bc73062016-06-15 13:44:01 +020081 if (unlikely(ret != 0)) {
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070082 ret = (ret != -ERESTARTSYS) ? VM_FAULT_SIGBUS :
83 VM_FAULT_NOPAGE;
Christian König5bc73062016-06-15 13:44:01 +020084 goto out_unlock;
85 }
86
87out_clear:
Chris Wilsonf54d1862016-10-25 13:00:45 +010088 dma_fence_put(bo->moving);
Christian König5bc73062016-06-15 13:44:01 +020089 bo->moving = NULL;
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070090
91out_unlock:
Thomas Hellstromcbe12e72013-10-09 03:18:07 -070092 return ret;
93}
94
Tan Xiaojunc67fa6e2017-12-25 11:43:23 +080095static unsigned long ttm_bo_io_mem_pfn(struct ttm_buffer_object *bo,
96 unsigned long page_offset)
97{
98 struct ttm_bo_device *bdev = bo->bdev;
99
100 if (bdev->driver->io_mem_pfn)
101 return bdev->driver->io_mem_pfn(bo, page_offset);
102
Tan Xiaojune83bf4a2017-12-25 11:43:34 +0800103 return ((bo->mem.bus.base + bo->mem.bus.offset) >> PAGE_SHIFT)
104 + page_offset;
Tan Xiaojunc67fa6e2017-12-25 11:43:23 +0800105}
106
Dave Jiang11bac802017-02-24 14:56:41 -0800107static int ttm_bo_vm_fault(struct vm_fault *vmf)
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200108{
Dave Jiang11bac802017-02-24 14:56:41 -0800109 struct vm_area_struct *vma = vmf->vma;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200110 struct ttm_buffer_object *bo = (struct ttm_buffer_object *)
111 vma->vm_private_data;
112 struct ttm_bo_device *bdev = bo->bdev;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200113 unsigned long page_offset;
114 unsigned long page_last;
115 unsigned long pfn;
116 struct ttm_tt *ttm = NULL;
117 struct page *page;
118 int ret;
119 int i;
Jan Kara1a29d852016-12-14 15:07:01 -0800120 unsigned long address = vmf->address;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200121 int retval = VM_FAULT_NOPAGE;
Thomas Hellstromeba67092010-11-11 09:41:57 +0100122 struct ttm_mem_type_manager *man =
123 &bdev->man[bo->mem.mem_type];
Thomas Hellstrom39438752013-11-06 09:32:59 -0800124 struct vm_area_struct cvma;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200125
126 /*
127 * Work around locking order reversal in fault / nopfn
128 * between mmap_sem and bo_reserve: Perform a trylock operation
Thomas Hellstromc58f0092013-11-14 10:49:05 -0800129 * for reserve, and if it fails, retry the fault after waiting
130 * for the buffer to become unreserved.
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200131 */
Christian Königdfd5e502016-04-06 11:12:03 +0200132 ret = ttm_bo_reserve(bo, true, true, NULL);
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200133 if (unlikely(ret != 0)) {
Thomas Hellstromc58f0092013-11-14 10:49:05 -0800134 if (ret != -EBUSY)
135 return VM_FAULT_NOPAGE;
136
137 if (vmf->flags & FAULT_FLAG_ALLOW_RETRY) {
138 if (!(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
Nicolai Hähnle3089c1d2017-02-18 22:59:56 +0100139 ttm_bo_reference(bo);
Dave Jiang11bac802017-02-24 14:56:41 -0800140 up_read(&vmf->vma->vm_mm->mmap_sem);
Thomas Hellstromc58f0092013-11-14 10:49:05 -0800141 (void) ttm_bo_wait_unreserved(bo);
Nicolai Hähnle3089c1d2017-02-18 22:59:56 +0100142 ttm_bo_unref(&bo);
Thomas Hellstromc58f0092013-11-14 10:49:05 -0800143 }
144
145 return VM_FAULT_RETRY;
146 }
147
148 /*
149 * If we'd want to change locking order to
150 * mmap_sem -> bo::reserve, we'd use a blocking reserve here
151 * instead of retrying the fault...
152 */
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200153 return VM_FAULT_NOPAGE;
154 }
155
Thomas Hellstrom667a50d2014-01-03 11:17:18 +0100156 /*
157 * Refuse to fault imported pages. This should be handled
158 * (if at all) by redirecting mmap to the exporter.
159 */
160 if (bo->ttm && (bo->ttm->page_flags & TTM_PAGE_FLAG_SG)) {
161 retval = VM_FAULT_SIGBUS;
162 goto out_unlock;
163 }
164
Jerome Glisse82c5da62010-04-09 14:39:23 +0200165 if (bdev->driver->fault_reserve_notify) {
166 ret = bdev->driver->fault_reserve_notify(bo);
167 switch (ret) {
168 case 0:
169 break;
170 case -EBUSY:
Jerome Glisse82c5da62010-04-09 14:39:23 +0200171 case -ERESTARTSYS:
172 retval = VM_FAULT_NOPAGE;
173 goto out_unlock;
174 default:
175 retval = VM_FAULT_SIGBUS;
176 goto out_unlock;
177 }
178 }
Dave Airliee024e112009-06-24 09:48:08 +1000179
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200180 /*
181 * Wait for buffer data in transit, due to a pipelined
182 * move.
183 */
Dave Jiang11bac802017-02-24 14:56:41 -0800184 ret = ttm_bo_vm_fault_idle(bo, vmf);
Thomas Hellstromcbe12e72013-10-09 03:18:07 -0700185 if (unlikely(ret != 0)) {
186 retval = ret;
Nicolai Hähnle3089c1d2017-02-18 22:59:56 +0100187
188 if (retval == VM_FAULT_RETRY &&
189 !(vmf->flags & FAULT_FLAG_RETRY_NOWAIT)) {
190 /* The BO has already been unreserved. */
191 return retval;
192 }
193
Thomas Hellstromcbe12e72013-10-09 03:18:07 -0700194 goto out_unlock;
195 }
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200196
Thomas Hellstromeba67092010-11-11 09:41:57 +0100197 ret = ttm_mem_io_lock(man, true);
198 if (unlikely(ret != 0)) {
199 retval = VM_FAULT_NOPAGE;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200200 goto out_unlock;
201 }
Thomas Hellstromeba67092010-11-11 09:41:57 +0100202 ret = ttm_mem_io_reserve_vm(bo);
203 if (unlikely(ret != 0)) {
204 retval = VM_FAULT_SIGBUS;
205 goto out_io_unlock;
206 }
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200207
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200208 page_offset = ((address - vma->vm_start) >> PAGE_SHIFT) +
Thomas Hellstromd3867352013-12-08 23:23:57 -0800209 vma->vm_pgoff - drm_vma_node_start(&bo->vma_node);
210 page_last = vma_pages(vma) + vma->vm_pgoff -
211 drm_vma_node_start(&bo->vma_node);
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200212
213 if (unlikely(page_offset >= bo->num_pages)) {
214 retval = VM_FAULT_SIGBUS;
Thomas Hellstromeba67092010-11-11 09:41:57 +0100215 goto out_io_unlock;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200216 }
217
218 /*
Thomas Hellstrom39438752013-11-06 09:32:59 -0800219 * Make a local vma copy to modify the page_prot member
220 * and vm_flags if necessary. The vma parameter is protected
221 * by mmap_sem in write mode.
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200222 */
Thomas Hellstrom39438752013-11-06 09:32:59 -0800223 cvma = *vma;
224 cvma.vm_page_prot = vm_get_page_prot(cvma.vm_flags);
225
Jerome Glisse82c5da62010-04-09 14:39:23 +0200226 if (bo->mem.bus.is_iomem) {
Thomas Hellstrom39438752013-11-06 09:32:59 -0800227 cvma.vm_page_prot = ttm_io_prot(bo->mem.placement,
228 cvma.vm_page_prot);
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200229 } else {
Roger Hed0cef9f2017-12-21 17:42:50 +0800230 struct ttm_operation_ctx ctx = {
231 .interruptible = false,
232 .no_wait_gpu = false
233 };
234
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200235 ttm = bo->ttm;
Benjamin Herrenschmidt94318d52014-09-04 17:47:23 +1000236 cvma.vm_page_prot = ttm_io_prot(bo->mem.placement,
237 cvma.vm_page_prot);
Jerome Glisseb1e5f172011-11-02 23:59:28 -0400238
239 /* Allocate all page at once, most common usage */
Roger Hed0cef9f2017-12-21 17:42:50 +0800240 if (ttm->bdev->driver->ttm_tt_populate(ttm, &ctx)) {
Jerome Glisseb1e5f172011-11-02 23:59:28 -0400241 retval = VM_FAULT_OOM;
242 goto out_io_unlock;
243 }
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200244 }
245
246 /*
247 * Speculatively prefault a number of pages. Only error on
248 * first page.
249 */
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200250 for (i = 0; i < TTM_BO_VM_NUM_PREFAULT; ++i) {
Tom Lendacky95cf9262017-07-17 16:10:26 -0500251 if (bo->mem.bus.is_iomem) {
252 /* Iomem should not be marked encrypted */
253 cvma.vm_page_prot = pgprot_decrypted(cvma.vm_page_prot);
Tan Xiaojunc67fa6e2017-12-25 11:43:23 +0800254 pfn = ttm_bo_io_mem_pfn(bo, page_offset);
Tom Lendacky95cf9262017-07-17 16:10:26 -0500255 } else {
Jerome Glisseb1e5f172011-11-02 23:59:28 -0400256 page = ttm->pages[page_offset];
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200257 if (unlikely(!page && i == 0)) {
258 retval = VM_FAULT_OOM;
Thomas Hellstromeba67092010-11-11 09:41:57 +0100259 goto out_io_unlock;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200260 } else if (unlikely(!page)) {
261 break;
262 }
Thomas Hellstrom58aa6622014-01-03 11:47:23 +0100263 page->mapping = vma->vm_file->f_mapping;
264 page->index = drm_vma_node_start(&bo->vma_node) +
265 page_offset;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200266 pfn = page_to_pfn(page);
267 }
268
Thomas Hellstrom7dfe8b62014-01-03 09:21:54 +0100269 if (vma->vm_flags & VM_MIXEDMAP)
Dan Williams01c8f1c2016-01-15 16:56:40 -0800270 ret = vm_insert_mixed(&cvma, address,
271 __pfn_to_pfn_t(pfn, PFN_DEV));
Thomas Hellstrom7dfe8b62014-01-03 09:21:54 +0100272 else
273 ret = vm_insert_pfn(&cvma, address, pfn);
274
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200275 /*
276 * Somebody beat us to this PTE or prefaulting to
277 * an already populated PTE, or prefaulting error.
278 */
279
280 if (unlikely((ret == -EBUSY) || (ret != 0 && i > 0)))
281 break;
282 else if (unlikely(ret != 0)) {
283 retval =
284 (ret == -ENOMEM) ? VM_FAULT_OOM : VM_FAULT_SIGBUS;
Thomas Hellstromeba67092010-11-11 09:41:57 +0100285 goto out_io_unlock;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200286 }
287
288 address += PAGE_SIZE;
289 if (unlikely(++page_offset >= page_last))
290 break;
291 }
Thomas Hellstromeba67092010-11-11 09:41:57 +0100292out_io_unlock:
293 ttm_mem_io_unlock(man);
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200294out_unlock:
295 ttm_bo_unreserve(bo);
296 return retval;
297}
298
299static void ttm_bo_vm_open(struct vm_area_struct *vma)
300{
301 struct ttm_buffer_object *bo =
302 (struct ttm_buffer_object *)vma->vm_private_data;
303
Thomas Hellstrom58aa6622014-01-03 11:47:23 +0100304 WARN_ON(bo->bdev->dev_mapping != vma->vm_file->f_mapping);
305
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200306 (void)ttm_bo_reference(bo);
307}
308
309static void ttm_bo_vm_close(struct vm_area_struct *vma)
310{
Jerome Glisse82c5da62010-04-09 14:39:23 +0200311 struct ttm_buffer_object *bo = (struct ttm_buffer_object *)vma->vm_private_data;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200312
313 ttm_bo_unref(&bo);
314 vma->vm_private_data = NULL;
315}
316
Felix Kuehling09ac4fc2017-07-13 17:01:16 -0400317static int ttm_bo_vm_access_kmap(struct ttm_buffer_object *bo,
318 unsigned long offset,
Tom St Denis95244db2018-01-26 09:32:29 -0500319 uint8_t *buf, int len, int write)
Felix Kuehling09ac4fc2017-07-13 17:01:16 -0400320{
321 unsigned long page = offset >> PAGE_SHIFT;
322 unsigned long bytes_left = len;
323 int ret;
324
325 /* Copy a page at a time, that way no extra virtual address
326 * mapping is needed
327 */
328 offset -= page << PAGE_SHIFT;
329 do {
330 unsigned long bytes = min(bytes_left, PAGE_SIZE - offset);
331 struct ttm_bo_kmap_obj map;
332 void *ptr;
333 bool is_iomem;
334
335 ret = ttm_bo_kmap(bo, page, 1, &map);
336 if (ret)
337 return ret;
338
339 ptr = (uint8_t *)ttm_kmap_obj_virtual(&map, &is_iomem) + offset;
340 WARN_ON_ONCE(is_iomem);
341 if (write)
342 memcpy(ptr, buf, bytes);
343 else
344 memcpy(buf, ptr, bytes);
345 ttm_bo_kunmap(&map);
346
347 page++;
Tom St Denis95244db2018-01-26 09:32:29 -0500348 buf += bytes;
Felix Kuehling09ac4fc2017-07-13 17:01:16 -0400349 bytes_left -= bytes;
350 offset = 0;
351 } while (bytes_left);
352
353 return len;
354}
355
356static int ttm_bo_vm_access(struct vm_area_struct *vma, unsigned long addr,
357 void *buf, int len, int write)
358{
359 unsigned long offset = (addr) - vma->vm_start;
360 struct ttm_buffer_object *bo = vma->vm_private_data;
361 int ret;
362
363 if (len < 1 || (offset + len) >> PAGE_SHIFT > bo->num_pages)
364 return -EIO;
365
366 ret = ttm_bo_reserve(bo, true, false, NULL);
367 if (ret)
368 return ret;
369
370 switch (bo->mem.mem_type) {
371 case TTM_PL_SYSTEM:
372 if (unlikely(bo->ttm->page_flags & TTM_PAGE_FLAG_SWAPPED)) {
373 ret = ttm_tt_swapin(bo->ttm);
374 if (unlikely(ret != 0))
375 return ret;
376 }
377 /* fall through */
378 case TTM_PL_TT:
379 ret = ttm_bo_vm_access_kmap(bo, offset, buf, len, write);
380 break;
381 default:
382 if (bo->bdev->driver->access_memory)
383 ret = bo->bdev->driver->access_memory(
384 bo, offset, buf, len, write);
385 else
386 ret = -EIO;
387 }
388
389 ttm_bo_unreserve(bo);
390
391 return ret;
392}
393
Alexey Dobriyanf0f37e22009-09-27 22:29:37 +0400394static const struct vm_operations_struct ttm_bo_vm_ops = {
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200395 .fault = ttm_bo_vm_fault,
396 .open = ttm_bo_vm_open,
Felix Kuehling09ac4fc2017-07-13 17:01:16 -0400397 .close = ttm_bo_vm_close,
398 .access = ttm_bo_vm_access
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200399};
400
David Herrmann72525b32013-07-24 21:08:53 +0200401static struct ttm_buffer_object *ttm_bo_vm_lookup(struct ttm_bo_device *bdev,
402 unsigned long offset,
403 unsigned long pages)
404{
405 struct drm_vma_offset_node *node;
406 struct ttm_buffer_object *bo = NULL;
407
408 drm_vma_offset_lock_lookup(&bdev->vma_manager);
409
410 node = drm_vma_offset_lookup_locked(&bdev->vma_manager, offset, pages);
411 if (likely(node)) {
412 bo = container_of(node, struct ttm_buffer_object, vma_node);
413 if (!kref_get_unless_zero(&bo->kref))
414 bo = NULL;
415 }
416
417 drm_vma_offset_unlock_lookup(&bdev->vma_manager);
418
419 if (!bo)
420 pr_err("Could not find buffer object to map\n");
421
422 return bo;
423}
424
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200425int ttm_bo_mmap(struct file *filp, struct vm_area_struct *vma,
426 struct ttm_bo_device *bdev)
427{
428 struct ttm_bo_driver *driver;
429 struct ttm_buffer_object *bo;
430 int ret;
431
David Herrmann72525b32013-07-24 21:08:53 +0200432 bo = ttm_bo_vm_lookup(bdev, vma->vm_pgoff, vma_pages(vma));
433 if (unlikely(!bo))
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200434 return -EINVAL;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200435
436 driver = bo->bdev->driver;
437 if (unlikely(!driver->verify_access)) {
438 ret = -EPERM;
439 goto out_unref;
440 }
441 ret = driver->verify_access(bo, filp);
442 if (unlikely(ret != 0))
443 goto out_unref;
444
445 vma->vm_ops = &ttm_bo_vm_ops;
446
447 /*
448 * Note: We're transferring the bo reference to
449 * vma->vm_private_data here.
450 */
451
452 vma->vm_private_data = bo;
Thomas Hellstrom7dfe8b62014-01-03 09:21:54 +0100453
454 /*
Thomas Hellstrom0e6d6ec2014-03-12 10:41:32 +0100455 * We'd like to use VM_PFNMAP on shared mappings, where
456 * (vma->vm_flags & VM_SHARED) != 0, for performance reasons,
457 * but for some reason VM_PFNMAP + x86 PAT + write-combine is very
458 * bad for performance. Until that has been sorted out, use
459 * VM_MIXEDMAP on all mappings. See freedesktop.org bug #75719
Thomas Hellstrom7dfe8b62014-01-03 09:21:54 +0100460 */
Thomas Hellstrom0e6d6ec2014-03-12 10:41:32 +0100461 vma->vm_flags |= VM_MIXEDMAP;
Thomas Hellstrom7dfe8b62014-01-03 09:21:54 +0100462 vma->vm_flags |= VM_IO | VM_DONTEXPAND | VM_DONTDUMP;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200463 return 0;
464out_unref:
465 ttm_bo_unref(&bo);
466 return ret;
467}
468EXPORT_SYMBOL(ttm_bo_mmap);
469
470int ttm_fbdev_mmap(struct vm_area_struct *vma, struct ttm_buffer_object *bo)
471{
472 if (vma->vm_pgoff != 0)
473 return -EACCES;
474
475 vma->vm_ops = &ttm_bo_vm_ops;
476 vma->vm_private_data = ttm_bo_reference(bo);
Thomas Hellstrom0e6d6ec2014-03-12 10:41:32 +0100477 vma->vm_flags |= VM_MIXEDMAP;
Thomas Hellstrom7dfe8b62014-01-03 09:21:54 +0100478 vma->vm_flags |= VM_IO | VM_DONTEXPAND;
Thomas Hellstromba4e7d92009-06-10 15:20:19 +0200479 return 0;
480}
481EXPORT_SYMBOL(ttm_fbdev_mmap);