drm/ttm: remove no_gpu_wait param from ttm_bo_move_accel_cleanup
[deliverable/linux.git] / drivers / gpu / drm / ttm / ttm_bo.c
CommitLineData
ba4e7d97
TH
1/**************************************************************************
2 *
3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27/*
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
29 */
30
25d0479a
JP
31#define pr_fmt(fmt) "[TTM] " fmt
32
760285e7
DH
33#include <drm/ttm/ttm_module.h>
34#include <drm/ttm/ttm_bo_driver.h>
35#include <drm/ttm/ttm_placement.h>
ba4e7d97
TH
36#include <linux/jiffies.h>
37#include <linux/slab.h>
38#include <linux/sched.h>
39#include <linux/mm.h>
40#include <linux/file.h>
41#include <linux/module.h>
60063497 42#include <linux/atomic.h>
f2c24b83 43#include <linux/reservation.h>
ba4e7d97
TH
44
45#define TTM_ASSERT_LOCKED(param)
46#define TTM_DEBUG(fmt, arg...)
47#define TTM_BO_HASH_ORDER 13
48
ba4e7d97 49static int ttm_bo_swapout(struct ttm_mem_shrink *shrink);
a987fcaa
TH
50static void ttm_bo_global_kobj_release(struct kobject *kobj);
51
52static struct attribute ttm_bo_count = {
53 .name = "bo_count",
54 .mode = S_IRUGO
55};
56
f1217ed0
CK
57static inline int ttm_mem_type_from_place(const struct ttm_place *place,
58 uint32_t *mem_type)
fb53f862
JG
59{
60 int i;
61
62 for (i = 0; i <= TTM_PL_PRIV5; i++)
f1217ed0 63 if (place->flags & (1 << i)) {
fb53f862
JG
64 *mem_type = i;
65 return 0;
66 }
67 return -EINVAL;
68}
69
5012f506 70static void ttm_mem_type_debug(struct ttm_bo_device *bdev, int mem_type)
fb53f862 71{
5012f506
JG
72 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
73
25d0479a
JP
74 pr_err(" has_type: %d\n", man->has_type);
75 pr_err(" use_type: %d\n", man->use_type);
76 pr_err(" flags: 0x%08X\n", man->flags);
54c4cd68 77 pr_err(" gpu_offset: 0x%08llX\n", man->gpu_offset);
25d0479a
JP
78 pr_err(" size: %llu\n", man->size);
79 pr_err(" available_caching: 0x%08X\n", man->available_caching);
80 pr_err(" default_caching: 0x%08X\n", man->default_caching);
d961db75
BS
81 if (mem_type != TTM_PL_SYSTEM)
82 (*man->func->debug)(man, TTM_PFX);
fb53f862
JG
83}
84
85static void ttm_bo_mem_space_debug(struct ttm_buffer_object *bo,
86 struct ttm_placement *placement)
87{
fb53f862
JG
88 int i, ret, mem_type;
89
25d0479a
JP
90 pr_err("No space for %p (%lu pages, %luK, %luM)\n",
91 bo, bo->mem.num_pages, bo->mem.size >> 10,
92 bo->mem.size >> 20);
fb53f862 93 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 94 ret = ttm_mem_type_from_place(&placement->placement[i],
fb53f862
JG
95 &mem_type);
96 if (ret)
97 return;
25d0479a 98 pr_err(" placement[%d]=0x%08X (%d)\n",
f1217ed0 99 i, placement->placement[i].flags, mem_type);
5012f506 100 ttm_mem_type_debug(bo->bdev, mem_type);
fb53f862
JG
101 }
102}
103
a987fcaa
TH
104static ssize_t ttm_bo_global_show(struct kobject *kobj,
105 struct attribute *attr,
106 char *buffer)
107{
108 struct ttm_bo_global *glob =
109 container_of(kobj, struct ttm_bo_global, kobj);
110
111 return snprintf(buffer, PAGE_SIZE, "%lu\n",
112 (unsigned long) atomic_read(&glob->bo_count));
113}
114
115static struct attribute *ttm_bo_global_attrs[] = {
116 &ttm_bo_count,
117 NULL
118};
119
52cf25d0 120static const struct sysfs_ops ttm_bo_global_ops = {
a987fcaa
TH
121 .show = &ttm_bo_global_show
122};
123
124static struct kobj_type ttm_bo_glob_kobj_type = {
125 .release = &ttm_bo_global_kobj_release,
126 .sysfs_ops = &ttm_bo_global_ops,
127 .default_attrs = ttm_bo_global_attrs
128};
129
ba4e7d97
TH
130
131static inline uint32_t ttm_bo_type_flags(unsigned type)
132{
133 return 1 << (type);
134}
135
136static void ttm_bo_release_list(struct kref *list_kref)
137{
138 struct ttm_buffer_object *bo =
139 container_of(list_kref, struct ttm_buffer_object, list_kref);
140 struct ttm_bo_device *bdev = bo->bdev;
57de4ba9 141 size_t acc_size = bo->acc_size;
ba4e7d97
TH
142
143 BUG_ON(atomic_read(&bo->list_kref.refcount));
144 BUG_ON(atomic_read(&bo->kref.refcount));
145 BUG_ON(atomic_read(&bo->cpu_writers));
ba4e7d97
TH
146 BUG_ON(bo->mem.mm_node != NULL);
147 BUG_ON(!list_empty(&bo->lru));
148 BUG_ON(!list_empty(&bo->ddestroy));
149
4279cb14 150 ttm_tt_destroy(bo->ttm);
a987fcaa 151 atomic_dec(&bo->glob->bo_count);
5e338405
ML
152 if (bo->resv == &bo->ttm_resv)
153 reservation_object_fini(&bo->ttm_resv);
c58f009e 154 mutex_destroy(&bo->wu_mutex);
ba4e7d97
TH
155 if (bo->destroy)
156 bo->destroy(bo);
157 else {
ba4e7d97
TH
158 kfree(bo);
159 }
57de4ba9 160 ttm_mem_global_free(bdev->glob->mem_glob, acc_size);
ba4e7d97
TH
161}
162
d6ea8886 163void ttm_bo_add_to_lru(struct ttm_buffer_object *bo)
ba4e7d97
TH
164{
165 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 166
009a9dad 167 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
168
169 if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
170
171 BUG_ON(!list_empty(&bo->lru));
172
98c2872a 173 list_add(&bo->lru, bdev->driver->lru_tail(bo));
ba4e7d97
TH
174 kref_get(&bo->list_kref);
175
ed704a43 176 if (bo->ttm && !(bo->ttm->page_flags & TTM_PAGE_FLAG_SG)) {
98c2872a 177 list_add(&bo->swap, bdev->driver->swap_lru_tail(bo));
ba4e7d97
TH
178 kref_get(&bo->list_kref);
179 }
180 }
181}
34820324 182EXPORT_SYMBOL(ttm_bo_add_to_lru);
ba4e7d97 183
d6ea8886 184int ttm_bo_del_from_lru(struct ttm_buffer_object *bo)
ba4e7d97 185{
c3ea576e 186 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97
TH
187 int put_count = 0;
188
c3ea576e
CK
189 if (bdev->driver->lru_removal)
190 bdev->driver->lru_removal(bo);
191
ba4e7d97
TH
192 if (!list_empty(&bo->swap)) {
193 list_del_init(&bo->swap);
194 ++put_count;
195 }
196 if (!list_empty(&bo->lru)) {
197 list_del_init(&bo->lru);
198 ++put_count;
199 }
200
ba4e7d97
TH
201 return put_count;
202}
203
ba4e7d97
TH
204static void ttm_bo_ref_bug(struct kref *list_kref)
205{
206 BUG();
207}
208
d6ea8886
DA
209void ttm_bo_list_ref_sub(struct ttm_buffer_object *bo, int count,
210 bool never_free)
211{
2357cbe5
TH
212 kref_sub(&bo->list_kref, count,
213 (never_free) ? ttm_bo_ref_bug : ttm_bo_release_list);
d6ea8886
DA
214}
215
34820324 216void ttm_bo_del_sub_from_lru(struct ttm_buffer_object *bo)
5e45d7df 217{
34820324 218 int put_count;
ecff665f 219
34820324
ML
220 spin_lock(&bo->glob->lru_lock);
221 put_count = ttm_bo_del_from_lru(bo);
222 spin_unlock(&bo->glob->lru_lock);
223 ttm_bo_list_ref_sub(bo, put_count, true);
ecff665f 224}
34820324 225EXPORT_SYMBOL(ttm_bo_del_sub_from_lru);
ecff665f 226
ab749618
CK
227void ttm_bo_move_to_lru_tail(struct ttm_buffer_object *bo)
228{
229 struct ttm_bo_device *bdev = bo->bdev;
56fc3502 230 int put_count = 0;
ab749618
CK
231
232 lockdep_assert_held(&bo->resv->lock.base);
233
c3ea576e
CK
234 if (bdev->driver->lru_removal)
235 bdev->driver->lru_removal(bo);
236
56fc3502
FC
237 put_count = ttm_bo_del_from_lru(bo);
238 ttm_bo_list_ref_sub(bo, put_count, true);
239 ttm_bo_add_to_lru(bo);
ab749618
CK
240}
241EXPORT_SYMBOL(ttm_bo_move_to_lru_tail);
242
98c2872a
CK
243struct list_head *ttm_bo_default_lru_tail(struct ttm_buffer_object *bo)
244{
245 return bo->bdev->man[bo->mem.mem_type].lru.prev;
246}
247EXPORT_SYMBOL(ttm_bo_default_lru_tail);
248
249struct list_head *ttm_bo_default_swap_lru_tail(struct ttm_buffer_object *bo)
250{
251 return bo->glob->swap_lru.prev;
252}
253EXPORT_SYMBOL(ttm_bo_default_swap_lru_tail);
254
ba4e7d97
TH
255/*
256 * Call bo->mutex locked.
257 */
ba4e7d97
TH
258static int ttm_bo_add_ttm(struct ttm_buffer_object *bo, bool zero_alloc)
259{
260 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 261 struct ttm_bo_global *glob = bo->glob;
ba4e7d97
TH
262 int ret = 0;
263 uint32_t page_flags = 0;
264
265 TTM_ASSERT_LOCKED(&bo->mutex);
266 bo->ttm = NULL;
267
ad49f501
DA
268 if (bdev->need_dma32)
269 page_flags |= TTM_PAGE_FLAG_DMA32;
270
ba4e7d97
TH
271 switch (bo->type) {
272 case ttm_bo_type_device:
273 if (zero_alloc)
274 page_flags |= TTM_PAGE_FLAG_ZERO_ALLOC;
275 case ttm_bo_type_kernel:
649bf3ca
JG
276 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
277 page_flags, glob->dummy_read_page);
ba4e7d97
TH
278 if (unlikely(bo->ttm == NULL))
279 ret = -ENOMEM;
280 break;
129b78bf
DA
281 case ttm_bo_type_sg:
282 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
283 page_flags | TTM_PAGE_FLAG_SG,
284 glob->dummy_read_page);
285 if (unlikely(bo->ttm == NULL)) {
286 ret = -ENOMEM;
287 break;
288 }
289 bo->ttm->sg = bo->sg;
290 break;
ba4e7d97 291 default:
25d0479a 292 pr_err("Illegal buffer object type\n");
ba4e7d97
TH
293 ret = -EINVAL;
294 break;
295 }
296
297 return ret;
298}
299
300static int ttm_bo_handle_move_mem(struct ttm_buffer_object *bo,
301 struct ttm_mem_reg *mem,
9d87fa21 302 bool evict, bool interruptible,
97a875cb 303 bool no_wait_gpu)
ba4e7d97
TH
304{
305 struct ttm_bo_device *bdev = bo->bdev;
306 bool old_is_pci = ttm_mem_reg_is_pci(bdev, &bo->mem);
307 bool new_is_pci = ttm_mem_reg_is_pci(bdev, mem);
308 struct ttm_mem_type_manager *old_man = &bdev->man[bo->mem.mem_type];
309 struct ttm_mem_type_manager *new_man = &bdev->man[mem->mem_type];
310 int ret = 0;
311
312 if (old_is_pci || new_is_pci ||
eba67093
TH
313 ((mem->placement & bo->mem.placement & TTM_PL_MASK_CACHING) == 0)) {
314 ret = ttm_mem_io_lock(old_man, true);
315 if (unlikely(ret != 0))
316 goto out_err;
317 ttm_bo_unmap_virtual_locked(bo);
318 ttm_mem_io_unlock(old_man);
319 }
ba4e7d97
TH
320
321 /*
322 * Create and bind a ttm if required.
323 */
324
8d3bb236
BS
325 if (!(new_man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
326 if (bo->ttm == NULL) {
ff02b13f
BS
327 bool zero = !(old_man->flags & TTM_MEMTYPE_FLAG_FIXED);
328 ret = ttm_bo_add_ttm(bo, zero);
8d3bb236
BS
329 if (ret)
330 goto out_err;
331 }
ba4e7d97
TH
332
333 ret = ttm_tt_set_placement_caching(bo->ttm, mem->placement);
334 if (ret)
87ef9209 335 goto out_err;
ba4e7d97
TH
336
337 if (mem->mem_type != TTM_PL_SYSTEM) {
338 ret = ttm_tt_bind(bo->ttm, mem);
339 if (ret)
340 goto out_err;
341 }
342
343 if (bo->mem.mem_type == TTM_PL_SYSTEM) {
82ef594e
BS
344 if (bdev->driver->move_notify)
345 bdev->driver->move_notify(bo, mem);
ca262a99 346 bo->mem = *mem;
ba4e7d97 347 mem->mm_node = NULL;
ba4e7d97
TH
348 goto moved;
349 }
ba4e7d97
TH
350 }
351
9f1feed2
BS
352 if (bdev->driver->move_notify)
353 bdev->driver->move_notify(bo, mem);
354
ba4e7d97
TH
355 if (!(old_man->flags & TTM_MEMTYPE_FLAG_FIXED) &&
356 !(new_man->flags & TTM_MEMTYPE_FLAG_FIXED))
97a875cb 357 ret = ttm_bo_move_ttm(bo, evict, no_wait_gpu, mem);
ba4e7d97
TH
358 else if (bdev->driver->move)
359 ret = bdev->driver->move(bo, evict, interruptible,
97a875cb 360 no_wait_gpu, mem);
ba4e7d97 361 else
77dfc28b
CK
362 ret = ttm_bo_move_memcpy(bo, evict, interruptible,
363 no_wait_gpu, mem);
ba4e7d97 364
9f1feed2
BS
365 if (ret) {
366 if (bdev->driver->move_notify) {
367 struct ttm_mem_reg tmp_mem = *mem;
368 *mem = bo->mem;
369 bo->mem = tmp_mem;
370 bdev->driver->move_notify(bo, mem);
371 bo->mem = *mem;
014b3440 372 *mem = tmp_mem;
9f1feed2 373 }
ba4e7d97 374
9f1feed2
BS
375 goto out_err;
376 }
dc97b340 377
ba4e7d97
TH
378moved:
379 if (bo->evicted) {
9ef7506f
RC
380 if (bdev->driver->invalidate_caches) {
381 ret = bdev->driver->invalidate_caches(bdev, bo->mem.placement);
382 if (ret)
383 pr_err("Can not flush read caches\n");
384 }
ba4e7d97
TH
385 bo->evicted = false;
386 }
387
388 if (bo->mem.mm_node) {
d961db75 389 bo->offset = (bo->mem.start << PAGE_SHIFT) +
ba4e7d97
TH
390 bdev->man[bo->mem.mem_type].gpu_offset;
391 bo->cur_placement = bo->mem.placement;
354fb52c
TH
392 } else
393 bo->offset = 0;
ba4e7d97
TH
394
395 return 0;
396
397out_err:
398 new_man = &bdev->man[bo->mem.mem_type];
4279cb14 399 if (new_man->flags & TTM_MEMTYPE_FLAG_FIXED) {
ba4e7d97
TH
400 ttm_tt_destroy(bo->ttm);
401 bo->ttm = NULL;
402 }
403
404 return ret;
405}
406
1df6a2eb 407/**
40d857bb 408 * Call bo::reserved.
1df6a2eb 409 * Will release GPU memory type usage on destruction.
40d857bb
TH
410 * This is the place to put in driver specific hooks to release
411 * driver private resources.
412 * Will release the bo::reserved lock.
1df6a2eb
TH
413 */
414
415static void ttm_bo_cleanup_memtype_use(struct ttm_buffer_object *bo)
416{
dc97b340
JG
417 if (bo->bdev->driver->move_notify)
418 bo->bdev->driver->move_notify(bo, NULL);
419
4279cb14
CK
420 ttm_tt_destroy(bo->ttm);
421 bo->ttm = NULL;
40d857bb 422 ttm_bo_mem_put(bo, &bo->mem);
1df6a2eb 423
5e338405 424 ww_mutex_unlock (&bo->resv->lock);
1df6a2eb
TH
425}
426
f2c24b83
ML
427static void ttm_bo_flush_all_fences(struct ttm_buffer_object *bo)
428{
429 struct reservation_object_list *fobj;
430 struct fence *fence;
431 int i;
432
433 fobj = reservation_object_get_list(bo->resv);
434 fence = reservation_object_get_excl(bo->resv);
435 if (fence && !fence->ops->signaled)
436 fence_enable_sw_signaling(fence);
437
438 for (i = 0; fobj && i < fobj->shared_count; ++i) {
439 fence = rcu_dereference_protected(fobj->shared[i],
440 reservation_object_held(bo->resv));
441
442 if (!fence->ops->signaled)
443 fence_enable_sw_signaling(fence);
444 }
445}
446
e1efc9b6 447static void ttm_bo_cleanup_refs_or_queue(struct ttm_buffer_object *bo)
ba4e7d97
TH
448{
449 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 450 struct ttm_bo_global *glob = bo->glob;
e1efc9b6 451 int put_count;
ba4e7d97
TH
452 int ret;
453
4154f051 454 spin_lock(&glob->lru_lock);
dfd5e50e 455 ret = __ttm_bo_reserve(bo, false, true, NULL);
4154f051 456
dd7cfd64 457 if (!ret) {
8aa6d4fc 458 if (!ttm_bo_wait(bo, false, true)) {
dd7cfd64 459 put_count = ttm_bo_del_from_lru(bo);
ba4e7d97 460
dd7cfd64
ML
461 spin_unlock(&glob->lru_lock);
462 ttm_bo_cleanup_memtype_use(bo);
ba4e7d97 463
dd7cfd64 464 ttm_bo_list_ref_sub(bo, put_count, true);
4154f051 465
dd7cfd64 466 return;
f2c24b83
ML
467 } else
468 ttm_bo_flush_all_fences(bo);
15205fbc
TH
469
470 /*
471 * Make NO_EVICT bos immediately available to
472 * shrinkers, now that they are queued for
473 * destruction.
474 */
475 if (bo->mem.placement & TTM_PL_FLAG_NO_EVICT) {
476 bo->mem.placement &= ~TTM_PL_FLAG_NO_EVICT;
477 ttm_bo_add_to_lru(bo);
478 }
479
c7523083 480 __ttm_bo_unreserve(bo);
15205fbc 481 }
e1efc9b6
TH
482
483 kref_get(&bo->list_kref);
484 list_add_tail(&bo->ddestroy, &bdev->ddestroy);
485 spin_unlock(&glob->lru_lock);
e1efc9b6 486
e1efc9b6
TH
487 schedule_delayed_work(&bdev->wq,
488 ((HZ / 100) < 1) ? 1 : HZ / 100);
489}
490
491/**
85b144f8 492 * function ttm_bo_cleanup_refs_and_unlock
e1efc9b6
TH
493 * If bo idle, remove from delayed- and lru lists, and unref.
494 * If not idle, do nothing.
495 *
85b144f8
ML
496 * Must be called with lru_lock and reservation held, this function
497 * will drop both before returning.
498 *
e1efc9b6 499 * @interruptible Any sleeps should occur interruptibly.
e1efc9b6
TH
500 * @no_wait_gpu Never wait for gpu. Return -EBUSY instead.
501 */
502
85b144f8
ML
503static int ttm_bo_cleanup_refs_and_unlock(struct ttm_buffer_object *bo,
504 bool interruptible,
505 bool no_wait_gpu)
e1efc9b6
TH
506{
507 struct ttm_bo_global *glob = bo->glob;
508 int put_count;
85b144f8 509 int ret;
e1efc9b6 510
8aa6d4fc 511 ret = ttm_bo_wait(bo, false, true);
e1efc9b6 512
85b144f8 513 if (ret && !no_wait_gpu) {
472db7ab
ML
514 long lret;
515 ww_mutex_unlock(&bo->resv->lock);
516 spin_unlock(&glob->lru_lock);
517
518 lret = reservation_object_wait_timeout_rcu(bo->resv,
519 true,
520 interruptible,
521 30 * HZ);
522
523 if (lret < 0)
524 return lret;
525 else if (lret == 0)
526 return -EBUSY;
b8e902f2 527
85b144f8 528 spin_lock(&glob->lru_lock);
dfd5e50e 529 ret = __ttm_bo_reserve(bo, false, true, NULL);
b8e902f2 530
85b144f8
ML
531 /*
532 * We raced, and lost, someone else holds the reservation now,
533 * and is probably busy in ttm_bo_cleanup_memtype_use.
534 *
535 * Even if it's not the case, because we finished waiting any
536 * delayed destruction would succeed, so just return success
537 * here.
538 */
539 if (ret) {
540 spin_unlock(&glob->lru_lock);
541 return 0;
542 }
7040138f
ML
543
544 /*
545 * remove sync_obj with ttm_bo_wait, the wait should be
546 * finished, and no new wait object should have been added.
547 */
8aa6d4fc 548 ret = ttm_bo_wait(bo, false, true);
7040138f
ML
549 WARN_ON(ret);
550 }
ba4e7d97 551
85b144f8 552 if (ret || unlikely(list_empty(&bo->ddestroy))) {
c7523083 553 __ttm_bo_unreserve(bo);
a987fcaa 554 spin_unlock(&glob->lru_lock);
85b144f8 555 return ret;
ba4e7d97
TH
556 }
557
e1efc9b6
TH
558 put_count = ttm_bo_del_from_lru(bo);
559 list_del_init(&bo->ddestroy);
560 ++put_count;
561
562 spin_unlock(&glob->lru_lock);
563 ttm_bo_cleanup_memtype_use(bo);
564
d6ea8886 565 ttm_bo_list_ref_sub(bo, put_count, true);
e1efc9b6
TH
566
567 return 0;
ba4e7d97
TH
568}
569
570/**
571 * Traverse the delayed list, and call ttm_bo_cleanup_refs on all
572 * encountered buffers.
573 */
574
575static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all)
576{
a987fcaa 577 struct ttm_bo_global *glob = bdev->glob;
1a961ce0
LB
578 struct ttm_buffer_object *entry = NULL;
579 int ret = 0;
ba4e7d97 580
a987fcaa 581 spin_lock(&glob->lru_lock);
1a961ce0
LB
582 if (list_empty(&bdev->ddestroy))
583 goto out_unlock;
584
585 entry = list_first_entry(&bdev->ddestroy,
586 struct ttm_buffer_object, ddestroy);
587 kref_get(&entry->list_kref);
588
589 for (;;) {
590 struct ttm_buffer_object *nentry = NULL;
591
592 if (entry->ddestroy.next != &bdev->ddestroy) {
593 nentry = list_first_entry(&entry->ddestroy,
594 struct ttm_buffer_object, ddestroy);
ba4e7d97
TH
595 kref_get(&nentry->list_kref);
596 }
ba4e7d97 597
dfd5e50e 598 ret = __ttm_bo_reserve(entry, false, true, NULL);
63d0a419
ML
599 if (remove_all && ret) {
600 spin_unlock(&glob->lru_lock);
dfd5e50e 601 ret = __ttm_bo_reserve(entry, false, false, NULL);
63d0a419
ML
602 spin_lock(&glob->lru_lock);
603 }
604
85b144f8
ML
605 if (!ret)
606 ret = ttm_bo_cleanup_refs_and_unlock(entry, false,
607 !remove_all);
608 else
609 spin_unlock(&glob->lru_lock);
610
ba4e7d97 611 kref_put(&entry->list_kref, ttm_bo_release_list);
1a961ce0
LB
612 entry = nentry;
613
614 if (ret || !entry)
615 goto out;
ba4e7d97 616
a987fcaa 617 spin_lock(&glob->lru_lock);
1a961ce0 618 if (list_empty(&entry->ddestroy))
ba4e7d97
TH
619 break;
620 }
ba4e7d97 621
1a961ce0
LB
622out_unlock:
623 spin_unlock(&glob->lru_lock);
624out:
625 if (entry)
626 kref_put(&entry->list_kref, ttm_bo_release_list);
ba4e7d97
TH
627 return ret;
628}
629
630static void ttm_bo_delayed_workqueue(struct work_struct *work)
631{
632 struct ttm_bo_device *bdev =
633 container_of(work, struct ttm_bo_device, wq.work);
634
635 if (ttm_bo_delayed_delete(bdev, false)) {
636 schedule_delayed_work(&bdev->wq,
637 ((HZ / 100) < 1) ? 1 : HZ / 100);
638 }
639}
640
641static void ttm_bo_release(struct kref *kref)
642{
643 struct ttm_buffer_object *bo =
644 container_of(kref, struct ttm_buffer_object, kref);
645 struct ttm_bo_device *bdev = bo->bdev;
eba67093 646 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
ba4e7d97 647
72525b3f 648 drm_vma_offset_remove(&bdev->vma_manager, &bo->vma_node);
eba67093
TH
649 ttm_mem_io_lock(man, false);
650 ttm_mem_io_free_vm(bo);
651 ttm_mem_io_unlock(man);
e1efc9b6 652 ttm_bo_cleanup_refs_or_queue(bo);
ba4e7d97 653 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
654}
655
656void ttm_bo_unref(struct ttm_buffer_object **p_bo)
657{
658 struct ttm_buffer_object *bo = *p_bo;
ba4e7d97
TH
659
660 *p_bo = NULL;
ba4e7d97 661 kref_put(&bo->kref, ttm_bo_release);
ba4e7d97
TH
662}
663EXPORT_SYMBOL(ttm_bo_unref);
664
7c5ee536
MG
665int ttm_bo_lock_delayed_workqueue(struct ttm_bo_device *bdev)
666{
667 return cancel_delayed_work_sync(&bdev->wq);
668}
669EXPORT_SYMBOL(ttm_bo_lock_delayed_workqueue);
670
671void ttm_bo_unlock_delayed_workqueue(struct ttm_bo_device *bdev, int resched)
672{
673 if (resched)
674 schedule_delayed_work(&bdev->wq,
675 ((HZ / 100) < 1) ? 1 : HZ / 100);
676}
677EXPORT_SYMBOL(ttm_bo_unlock_delayed_workqueue);
678
ca262a99 679static int ttm_bo_evict(struct ttm_buffer_object *bo, bool interruptible,
97a875cb 680 bool no_wait_gpu)
ba4e7d97 681{
ba4e7d97
TH
682 struct ttm_bo_device *bdev = bo->bdev;
683 struct ttm_mem_reg evict_mem;
ca262a99
JG
684 struct ttm_placement placement;
685 int ret = 0;
ba4e7d97 686
009a9dad 687 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
688
689 evict_mem = bo->mem;
690 evict_mem.mm_node = NULL;
eba67093
TH
691 evict_mem.bus.io_reserved_vm = false;
692 evict_mem.bus.io_reserved_count = 0;
ba4e7d97 693
7cb7d1d7
JG
694 placement.num_placement = 0;
695 placement.num_busy_placement = 0;
ca262a99
JG
696 bdev->driver->evict_flags(bo, &placement);
697 ret = ttm_bo_mem_space(bo, &placement, &evict_mem, interruptible,
97a875cb 698 no_wait_gpu);
ba4e7d97 699 if (ret) {
fb53f862 700 if (ret != -ERESTARTSYS) {
25d0479a
JP
701 pr_err("Failed to find memory space for buffer 0x%p eviction\n",
702 bo);
fb53f862
JG
703 ttm_bo_mem_space_debug(bo, &placement);
704 }
ba4e7d97
TH
705 goto out;
706 }
707
708 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true, interruptible,
97a875cb 709 no_wait_gpu);
17d33bc9 710 if (unlikely(ret)) {
98ffc415 711 if (ret != -ERESTARTSYS)
25d0479a 712 pr_err("Buffer eviction failed\n");
42311ff9 713 ttm_bo_mem_put(bo, &evict_mem);
ba4e7d97
TH
714 goto out;
715 }
ca262a99
JG
716 bo->evicted = true;
717out:
718 return ret;
719}
720
721static int ttm_mem_evict_first(struct ttm_bo_device *bdev,
722 uint32_t mem_type,
e300180f 723 const struct ttm_place *place,
97a875cb 724 bool interruptible,
9d87fa21 725 bool no_wait_gpu)
ca262a99
JG
726{
727 struct ttm_bo_global *glob = bdev->glob;
728 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
729 struct ttm_buffer_object *bo;
e7ab2019 730 int ret = -EBUSY, put_count;
ba4e7d97 731
a987fcaa 732 spin_lock(&glob->lru_lock);
e7ab2019 733 list_for_each_entry(bo, &man->lru, lru) {
dfd5e50e 734 ret = __ttm_bo_reserve(bo, false, true, NULL);
e300180f
MD
735 if (!ret) {
736 if (place && (place->fpfn || place->lpfn)) {
737 /* Don't evict this BO if it's outside of the
738 * requested placement range
739 */
740 if (place->fpfn >= (bo->mem.start + bo->mem.size) ||
741 (place->lpfn && place->lpfn <= bo->mem.start)) {
742 __ttm_bo_unreserve(bo);
743 ret = -EBUSY;
744 continue;
745 }
746 }
747
e7ab2019 748 break;
e300180f 749 }
e7ab2019
ML
750 }
751
752 if (ret) {
9c51ba1d 753 spin_unlock(&glob->lru_lock);
e7ab2019 754 return ret;
9c51ba1d
TH
755 }
756
ca262a99 757 kref_get(&bo->list_kref);
9c51ba1d 758
e1efc9b6 759 if (!list_empty(&bo->ddestroy)) {
e7ab2019
ML
760 ret = ttm_bo_cleanup_refs_and_unlock(bo, interruptible,
761 no_wait_gpu);
e1efc9b6 762 kref_put(&bo->list_kref, ttm_bo_release_list);
b8e902f2 763 return ret;
e1efc9b6
TH
764 }
765
9c51ba1d 766 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 767 spin_unlock(&glob->lru_lock);
9c51ba1d
TH
768
769 BUG_ON(ret != 0);
770
d6ea8886 771 ttm_bo_list_ref_sub(bo, put_count, true);
9c51ba1d 772
97a875cb 773 ret = ttm_bo_evict(bo, interruptible, no_wait_gpu);
ca262a99 774 ttm_bo_unreserve(bo);
9c51ba1d 775
ca262a99 776 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
777 return ret;
778}
779
42311ff9
BS
780void ttm_bo_mem_put(struct ttm_buffer_object *bo, struct ttm_mem_reg *mem)
781{
d961db75 782 struct ttm_mem_type_manager *man = &bo->bdev->man[mem->mem_type];
42311ff9 783
d961db75
BS
784 if (mem->mm_node)
785 (*man->func->put_node)(man, mem);
42311ff9
BS
786}
787EXPORT_SYMBOL(ttm_bo_mem_put);
788
ba4e7d97
TH
789/**
790 * Repeatedly evict memory from the LRU for @mem_type until we create enough
791 * space, or we've evicted everything and there isn't enough space.
792 */
ca262a99
JG
793static int ttm_bo_mem_force_space(struct ttm_buffer_object *bo,
794 uint32_t mem_type,
f1217ed0 795 const struct ttm_place *place,
ca262a99 796 struct ttm_mem_reg *mem,
9d87fa21 797 bool interruptible,
9d87fa21 798 bool no_wait_gpu)
ba4e7d97 799{
ca262a99 800 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 801 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
ba4e7d97
TH
802 int ret;
803
ba4e7d97 804 do {
f1217ed0 805 ret = (*man->func->get_node)(man, bo, place, mem);
ca262a99
JG
806 if (unlikely(ret != 0))
807 return ret;
d961db75 808 if (mem->mm_node)
ba4e7d97 809 break;
e300180f 810 ret = ttm_mem_evict_first(bdev, mem_type, place,
97a875cb 811 interruptible, no_wait_gpu);
ba4e7d97
TH
812 if (unlikely(ret != 0))
813 return ret;
ba4e7d97 814 } while (1);
d961db75 815 if (mem->mm_node == NULL)
ba4e7d97 816 return -ENOMEM;
ba4e7d97
TH
817 mem->mem_type = mem_type;
818 return 0;
819}
820
ae3e8122
TH
821static uint32_t ttm_bo_select_caching(struct ttm_mem_type_manager *man,
822 uint32_t cur_placement,
823 uint32_t proposed_placement)
824{
825 uint32_t caching = proposed_placement & TTM_PL_MASK_CACHING;
826 uint32_t result = proposed_placement & ~TTM_PL_MASK_CACHING;
827
828 /**
829 * Keep current caching if possible.
830 */
831
832 if ((cur_placement & caching) != 0)
833 result |= (cur_placement & caching);
834 else if ((man->default_caching & caching) != 0)
835 result |= man->default_caching;
836 else if ((TTM_PL_FLAG_CACHED & caching) != 0)
837 result |= TTM_PL_FLAG_CACHED;
838 else if ((TTM_PL_FLAG_WC & caching) != 0)
839 result |= TTM_PL_FLAG_WC;
840 else if ((TTM_PL_FLAG_UNCACHED & caching) != 0)
841 result |= TTM_PL_FLAG_UNCACHED;
842
843 return result;
844}
845
ba4e7d97 846static bool ttm_bo_mt_compatible(struct ttm_mem_type_manager *man,
ba4e7d97 847 uint32_t mem_type,
f1217ed0 848 const struct ttm_place *place,
ae3e8122 849 uint32_t *masked_placement)
ba4e7d97
TH
850{
851 uint32_t cur_flags = ttm_bo_type_flags(mem_type);
852
f1217ed0 853 if ((cur_flags & place->flags & TTM_PL_MASK_MEM) == 0)
ba4e7d97
TH
854 return false;
855
f1217ed0 856 if ((place->flags & man->available_caching) == 0)
ba4e7d97 857 return false;
ba4e7d97 858
f1217ed0 859 cur_flags |= (place->flags & man->available_caching);
ae3e8122
TH
860
861 *masked_placement = cur_flags;
ba4e7d97
TH
862 return true;
863}
864
865/**
866 * Creates space for memory region @mem according to its type.
867 *
868 * This function first searches for free space in compatible memory types in
869 * the priority order defined by the driver. If free space isn't found, then
870 * ttm_bo_mem_force_space is attempted in priority order to evict and find
871 * space.
872 */
873int ttm_bo_mem_space(struct ttm_buffer_object *bo,
ca262a99
JG
874 struct ttm_placement *placement,
875 struct ttm_mem_reg *mem,
97a875cb 876 bool interruptible,
9d87fa21 877 bool no_wait_gpu)
ba4e7d97
TH
878{
879 struct ttm_bo_device *bdev = bo->bdev;
880 struct ttm_mem_type_manager *man;
ba4e7d97
TH
881 uint32_t mem_type = TTM_PL_SYSTEM;
882 uint32_t cur_flags = 0;
883 bool type_found = false;
884 bool type_ok = false;
98ffc415 885 bool has_erestartsys = false;
ca262a99 886 int i, ret;
ba4e7d97
TH
887
888 mem->mm_node = NULL;
b6637526 889 for (i = 0; i < placement->num_placement; ++i) {
f1217ed0
CK
890 const struct ttm_place *place = &placement->placement[i];
891
892 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
893 if (ret)
894 return ret;
ba4e7d97 895 man = &bdev->man[mem_type];
e30f3963
TH
896 if (!man->has_type || !man->use_type)
897 continue;
ba4e7d97 898
f1217ed0 899 type_ok = ttm_bo_mt_compatible(man, mem_type, place,
ca262a99 900 &cur_flags);
ba4e7d97
TH
901
902 if (!type_ok)
903 continue;
904
e30f3963 905 type_found = true;
ae3e8122
TH
906 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
907 cur_flags);
ca262a99
JG
908 /*
909 * Use the access and other non-mapping-related flag bits from
910 * the memory placement flags to the current flags
911 */
f1217ed0 912 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 913 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 914
ba4e7d97
TH
915 if (mem_type == TTM_PL_SYSTEM)
916 break;
917
e30f3963
TH
918 ret = (*man->func->get_node)(man, bo, place, mem);
919 if (unlikely(ret))
920 return ret;
921
d961db75 922 if (mem->mm_node)
ba4e7d97
TH
923 break;
924 }
925
d961db75 926 if ((type_ok && (mem_type == TTM_PL_SYSTEM)) || mem->mm_node) {
ba4e7d97
TH
927 mem->mem_type = mem_type;
928 mem->placement = cur_flags;
929 return 0;
930 }
931
b6637526 932 for (i = 0; i < placement->num_busy_placement; ++i) {
f1217ed0
CK
933 const struct ttm_place *place = &placement->busy_placement[i];
934
935 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
936 if (ret)
937 return ret;
ba4e7d97 938 man = &bdev->man[mem_type];
e30f3963 939 if (!man->has_type || !man->use_type)
ba4e7d97 940 continue;
f1217ed0 941 if (!ttm_bo_mt_compatible(man, mem_type, place, &cur_flags))
ba4e7d97
TH
942 continue;
943
e30f3963 944 type_found = true;
ae3e8122
TH
945 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
946 cur_flags);
ca262a99
JG
947 /*
948 * Use the access and other non-mapping-related flag bits from
949 * the memory placement flags to the current flags
950 */
f1217ed0 951 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 952 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 953
0eaddb28
TH
954 if (mem_type == TTM_PL_SYSTEM) {
955 mem->mem_type = mem_type;
956 mem->placement = cur_flags;
957 mem->mm_node = NULL;
958 return 0;
959 }
960
f1217ed0 961 ret = ttm_bo_mem_force_space(bo, mem_type, place, mem,
97a875cb 962 interruptible, no_wait_gpu);
ba4e7d97
TH
963 if (ret == 0 && mem->mm_node) {
964 mem->placement = cur_flags;
965 return 0;
966 }
98ffc415
TH
967 if (ret == -ERESTARTSYS)
968 has_erestartsys = true;
ba4e7d97 969 }
e30f3963
TH
970
971 if (!type_found) {
972 printk(KERN_ERR TTM_PFX "No compatible memory type found.\n");
973 return -EINVAL;
974 }
975
976 return (has_erestartsys) ? -ERESTARTSYS : -ENOMEM;
ba4e7d97
TH
977}
978EXPORT_SYMBOL(ttm_bo_mem_space);
979
6e87fa48 980static int ttm_bo_move_buffer(struct ttm_buffer_object *bo,
ca262a99 981 struct ttm_placement *placement,
97a875cb 982 bool interruptible,
9d87fa21 983 bool no_wait_gpu)
ba4e7d97 984{
ba4e7d97
TH
985 int ret = 0;
986 struct ttm_mem_reg mem;
987
009a9dad 988 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97 989
ba4e7d97
TH
990 mem.num_pages = bo->num_pages;
991 mem.size = mem.num_pages << PAGE_SHIFT;
992 mem.page_alignment = bo->mem.page_alignment;
eba67093
TH
993 mem.bus.io_reserved_vm = false;
994 mem.bus.io_reserved_count = 0;
ba4e7d97
TH
995 /*
996 * Determine where to move the buffer.
997 */
97a875cb
ML
998 ret = ttm_bo_mem_space(bo, placement, &mem,
999 interruptible, no_wait_gpu);
ba4e7d97
TH
1000 if (ret)
1001 goto out_unlock;
97a875cb
ML
1002 ret = ttm_bo_handle_move_mem(bo, &mem, false,
1003 interruptible, no_wait_gpu);
ba4e7d97 1004out_unlock:
d961db75
BS
1005 if (ret && mem.mm_node)
1006 ttm_bo_mem_put(bo, &mem);
ba4e7d97
TH
1007 return ret;
1008}
1009
59c8e663
TH
1010static bool ttm_bo_mem_compat(struct ttm_placement *placement,
1011 struct ttm_mem_reg *mem,
1012 uint32_t *new_flags)
ba4e7d97 1013{
ca262a99 1014 int i;
e22238ea 1015
ca262a99 1016 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 1017 const struct ttm_place *heap = &placement->placement[i];
9ace2ef7 1018 if (mem->mm_node &&
f1217ed0 1019 (mem->start < heap->fpfn ||
9ace2ef7 1020 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1021 continue;
1022
1023 *new_flags = heap->flags;
59c8e663
TH
1024 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1025 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1026 return true;
1027 }
1028
1029 for (i = 0; i < placement->num_busy_placement; i++) {
f1217ed0 1030 const struct ttm_place *heap = &placement->busy_placement[i];
9ace2ef7 1031 if (mem->mm_node &&
f1217ed0 1032 (mem->start < heap->fpfn ||
9ace2ef7 1033 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1034 continue;
1035
1036 *new_flags = heap->flags;
59c8e663
TH
1037 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1038 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1039 return true;
ca262a99 1040 }
59c8e663
TH
1041
1042 return false;
ba4e7d97
TH
1043}
1044
09855acb
JG
1045int ttm_bo_validate(struct ttm_buffer_object *bo,
1046 struct ttm_placement *placement,
97a875cb 1047 bool interruptible,
9d87fa21 1048 bool no_wait_gpu)
ba4e7d97
TH
1049{
1050 int ret;
59c8e663 1051 uint32_t new_flags;
ba4e7d97 1052
009a9dad 1053 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
1054 /*
1055 * Check whether we need to move buffer.
1056 */
59c8e663 1057 if (!ttm_bo_mem_compat(placement, &bo->mem, &new_flags)) {
97a875cb
ML
1058 ret = ttm_bo_move_buffer(bo, placement, interruptible,
1059 no_wait_gpu);
ca262a99 1060 if (ret)
ba4e7d97 1061 return ret;
ca262a99
JG
1062 } else {
1063 /*
1064 * Use the access and other non-mapping-related flag bits from
1065 * the compatible memory placement flags to the active flags
1066 */
59c8e663 1067 ttm_flag_masked(&bo->mem.placement, new_flags,
ca262a99 1068 ~TTM_PL_MASK_MEMTYPE);
ba4e7d97 1069 }
ba4e7d97
TH
1070 /*
1071 * We might need to add a TTM.
1072 */
ba4e7d97
TH
1073 if (bo->mem.mem_type == TTM_PL_SYSTEM && bo->ttm == NULL) {
1074 ret = ttm_bo_add_ttm(bo, true);
1075 if (ret)
1076 return ret;
1077 }
ba4e7d97
TH
1078 return 0;
1079}
09855acb 1080EXPORT_SYMBOL(ttm_bo_validate);
ba4e7d97 1081
09855acb
JG
1082int ttm_bo_init(struct ttm_bo_device *bdev,
1083 struct ttm_buffer_object *bo,
1084 unsigned long size,
1085 enum ttm_bo_type type,
1086 struct ttm_placement *placement,
1087 uint32_t page_alignment,
09855acb 1088 bool interruptible,
5df23979 1089 struct file *persistent_swap_storage,
09855acb 1090 size_t acc_size,
129b78bf 1091 struct sg_table *sg,
f4f4e3e3 1092 struct reservation_object *resv,
09855acb 1093 void (*destroy) (struct ttm_buffer_object *))
ba4e7d97 1094{
09855acb 1095 int ret = 0;
ba4e7d97 1096 unsigned long num_pages;
57de4ba9 1097 struct ttm_mem_global *mem_glob = bdev->glob->mem_glob;
5e338405 1098 bool locked;
57de4ba9
JG
1099
1100 ret = ttm_mem_global_alloc(mem_glob, acc_size, false, false);
1101 if (ret) {
25d0479a 1102 pr_err("Out of kernel memory\n");
57de4ba9
JG
1103 if (destroy)
1104 (*destroy)(bo);
1105 else
1106 kfree(bo);
1107 return -ENOMEM;
1108 }
ba4e7d97 1109
ba4e7d97
TH
1110 num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
1111 if (num_pages == 0) {
25d0479a 1112 pr_err("Illegal buffer object size\n");
7dfbbdcf
TH
1113 if (destroy)
1114 (*destroy)(bo);
1115 else
1116 kfree(bo);
a393c730 1117 ttm_mem_global_free(mem_glob, acc_size);
ba4e7d97
TH
1118 return -EINVAL;
1119 }
1120 bo->destroy = destroy;
1121
ba4e7d97
TH
1122 kref_init(&bo->kref);
1123 kref_init(&bo->list_kref);
1124 atomic_set(&bo->cpu_writers, 0);
ba4e7d97
TH
1125 INIT_LIST_HEAD(&bo->lru);
1126 INIT_LIST_HEAD(&bo->ddestroy);
1127 INIT_LIST_HEAD(&bo->swap);
eba67093 1128 INIT_LIST_HEAD(&bo->io_reserve_lru);
c58f009e 1129 mutex_init(&bo->wu_mutex);
ba4e7d97 1130 bo->bdev = bdev;
a987fcaa 1131 bo->glob = bdev->glob;
ba4e7d97
TH
1132 bo->type = type;
1133 bo->num_pages = num_pages;
eb6d2c39 1134 bo->mem.size = num_pages << PAGE_SHIFT;
ba4e7d97
TH
1135 bo->mem.mem_type = TTM_PL_SYSTEM;
1136 bo->mem.num_pages = bo->num_pages;
1137 bo->mem.mm_node = NULL;
1138 bo->mem.page_alignment = page_alignment;
eba67093
TH
1139 bo->mem.bus.io_reserved_vm = false;
1140 bo->mem.bus.io_reserved_count = 0;
ba4e7d97
TH
1141 bo->priv_flags = 0;
1142 bo->mem.placement = (TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED);
5df23979 1143 bo->persistent_swap_storage = persistent_swap_storage;
ba4e7d97 1144 bo->acc_size = acc_size;
129b78bf 1145 bo->sg = sg;
f4f4e3e3
ML
1146 if (resv) {
1147 bo->resv = resv;
1148 lockdep_assert_held(&bo->resv->lock.base);
1149 } else {
1150 bo->resv = &bo->ttm_resv;
1151 reservation_object_init(&bo->ttm_resv);
1152 }
a987fcaa 1153 atomic_inc(&bo->glob->bo_count);
72525b3f 1154 drm_vma_node_reset(&bo->vma_node);
ba4e7d97 1155
ba4e7d97
TH
1156 /*
1157 * For ttm_bo_type_device buffers, allocate
1158 * address space from the device.
1159 */
f1217ed0
CK
1160 if (bo->type == ttm_bo_type_device ||
1161 bo->type == ttm_bo_type_sg)
abf19035
DH
1162 ret = drm_vma_offset_add(&bdev->vma_manager, &bo->vma_node,
1163 bo->mem.num_pages);
ba4e7d97 1164
f4f4e3e3
ML
1165 /* passed reservation objects should already be locked,
1166 * since otherwise lockdep will be angered in radeon.
1167 */
1168 if (!resv) {
1169 locked = ww_mutex_trylock(&bo->resv->lock);
1170 WARN_ON(!locked);
1171 }
ba4e7d97 1172
5e338405
ML
1173 if (likely(!ret))
1174 ret = ttm_bo_validate(bo, placement, interruptible, false);
ba4e7d97 1175
33d48cf8 1176 if (!resv) {
f4f4e3e3 1177 ttm_bo_unreserve(bo);
5e338405 1178
33d48cf8
CK
1179 } else if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
1180 spin_lock(&bo->glob->lru_lock);
1181 ttm_bo_add_to_lru(bo);
1182 spin_unlock(&bo->glob->lru_lock);
1183 }
1184
5e338405
ML
1185 if (unlikely(ret))
1186 ttm_bo_unref(&bo);
ba4e7d97
TH
1187
1188 return ret;
1189}
09855acb 1190EXPORT_SYMBOL(ttm_bo_init);
ba4e7d97 1191
57de4ba9
JG
1192size_t ttm_bo_acc_size(struct ttm_bo_device *bdev,
1193 unsigned long bo_size,
1194 unsigned struct_size)
ba4e7d97 1195{
57de4ba9
JG
1196 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1197 size_t size = 0;
ba4e7d97 1198
57de4ba9 1199 size += ttm_round_pot(struct_size);
85621630 1200 size += ttm_round_pot(npages * sizeof(void *));
57de4ba9
JG
1201 size += ttm_round_pot(sizeof(struct ttm_tt));
1202 return size;
ba4e7d97 1203}
57de4ba9
JG
1204EXPORT_SYMBOL(ttm_bo_acc_size);
1205
1206size_t ttm_bo_dma_acc_size(struct ttm_bo_device *bdev,
1207 unsigned long bo_size,
1208 unsigned struct_size)
1209{
1210 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1211 size_t size = 0;
1212
1213 size += ttm_round_pot(struct_size);
85621630 1214 size += ttm_round_pot(npages * (2*sizeof(void *) + sizeof(dma_addr_t)));
57de4ba9
JG
1215 size += ttm_round_pot(sizeof(struct ttm_dma_tt));
1216 return size;
1217}
1218EXPORT_SYMBOL(ttm_bo_dma_acc_size);
ba4e7d97 1219
09855acb
JG
1220int ttm_bo_create(struct ttm_bo_device *bdev,
1221 unsigned long size,
1222 enum ttm_bo_type type,
1223 struct ttm_placement *placement,
1224 uint32_t page_alignment,
09855acb 1225 bool interruptible,
5df23979 1226 struct file *persistent_swap_storage,
09855acb 1227 struct ttm_buffer_object **p_bo)
ba4e7d97
TH
1228{
1229 struct ttm_buffer_object *bo;
57de4ba9 1230 size_t acc_size;
ca262a99 1231 int ret;
ba4e7d97 1232
ba4e7d97 1233 bo = kzalloc(sizeof(*bo), GFP_KERNEL);
a393c730 1234 if (unlikely(bo == NULL))
ba4e7d97 1235 return -ENOMEM;
ba4e7d97 1236
a393c730 1237 acc_size = ttm_bo_acc_size(bdev, size, sizeof(struct ttm_buffer_object));
09855acb 1238 ret = ttm_bo_init(bdev, bo, size, type, placement, page_alignment,
0b91c4a1 1239 interruptible, persistent_swap_storage, acc_size,
f4f4e3e3 1240 NULL, NULL, NULL);
ba4e7d97
TH
1241 if (likely(ret == 0))
1242 *p_bo = bo;
1243
1244 return ret;
1245}
4d798937 1246EXPORT_SYMBOL(ttm_bo_create);
ba4e7d97 1247
ba4e7d97 1248static int ttm_bo_force_list_clean(struct ttm_bo_device *bdev,
ca262a99 1249 unsigned mem_type, bool allow_errors)
ba4e7d97 1250{
ca262a99 1251 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
a987fcaa 1252 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97 1253 int ret;
ba4e7d97
TH
1254
1255 /*
1256 * Can't use standard list traversal since we're unlocking.
1257 */
1258
a987fcaa 1259 spin_lock(&glob->lru_lock);
ca262a99 1260 while (!list_empty(&man->lru)) {
a987fcaa 1261 spin_unlock(&glob->lru_lock);
e300180f 1262 ret = ttm_mem_evict_first(bdev, mem_type, NULL, false, false);
ca262a99
JG
1263 if (ret) {
1264 if (allow_errors) {
1265 return ret;
1266 } else {
25d0479a 1267 pr_err("Cleanup eviction failed\n");
ca262a99
JG
1268 }
1269 }
a987fcaa 1270 spin_lock(&glob->lru_lock);
ba4e7d97 1271 }
a987fcaa 1272 spin_unlock(&glob->lru_lock);
ba4e7d97
TH
1273 return 0;
1274}
1275
1276int ttm_bo_clean_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1277{
c96e7c7a 1278 struct ttm_mem_type_manager *man;
ba4e7d97
TH
1279 int ret = -EINVAL;
1280
1281 if (mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1282 pr_err("Illegal memory type %d\n", mem_type);
ba4e7d97
TH
1283 return ret;
1284 }
c96e7c7a 1285 man = &bdev->man[mem_type];
ba4e7d97
TH
1286
1287 if (!man->has_type) {
25d0479a
JP
1288 pr_err("Trying to take down uninitialized memory manager type %u\n",
1289 mem_type);
ba4e7d97
TH
1290 return ret;
1291 }
1292
1293 man->use_type = false;
1294 man->has_type = false;
1295
1296 ret = 0;
1297 if (mem_type > 0) {
ca262a99 1298 ttm_bo_force_list_clean(bdev, mem_type, false);
ba4e7d97 1299
d961db75 1300 ret = (*man->func->takedown)(man);
ba4e7d97
TH
1301 }
1302
1303 return ret;
1304}
1305EXPORT_SYMBOL(ttm_bo_clean_mm);
1306
1307int ttm_bo_evict_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1308{
1309 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
1310
1311 if (mem_type == 0 || mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1312 pr_err("Illegal memory manager memory type %u\n", mem_type);
ba4e7d97
TH
1313 return -EINVAL;
1314 }
1315
1316 if (!man->has_type) {
25d0479a 1317 pr_err("Memory type %u has not been initialized\n", mem_type);
ba4e7d97
TH
1318 return 0;
1319 }
1320
ca262a99 1321 return ttm_bo_force_list_clean(bdev, mem_type, true);
ba4e7d97
TH
1322}
1323EXPORT_SYMBOL(ttm_bo_evict_mm);
1324
1325int ttm_bo_init_mm(struct ttm_bo_device *bdev, unsigned type,
ca262a99 1326 unsigned long p_size)
ba4e7d97
TH
1327{
1328 int ret = -EINVAL;
1329 struct ttm_mem_type_manager *man;
1330
dbc4a5b8 1331 BUG_ON(type >= TTM_NUM_MEM_TYPES);
ba4e7d97 1332 man = &bdev->man[type];
dbc4a5b8 1333 BUG_ON(man->has_type);
eba67093
TH
1334 man->io_reserve_fastpath = true;
1335 man->use_io_reserve_lru = false;
1336 mutex_init(&man->io_reserve_mutex);
1337 INIT_LIST_HEAD(&man->io_reserve_lru);
ba4e7d97
TH
1338
1339 ret = bdev->driver->init_mem_type(bdev, type, man);
1340 if (ret)
1341 return ret;
d961db75 1342 man->bdev = bdev;
ba4e7d97
TH
1343
1344 ret = 0;
1345 if (type != TTM_PL_SYSTEM) {
d961db75 1346 ret = (*man->func->init)(man, p_size);
ba4e7d97
TH
1347 if (ret)
1348 return ret;
1349 }
1350 man->has_type = true;
1351 man->use_type = true;
1352 man->size = p_size;
1353
1354 INIT_LIST_HEAD(&man->lru);
1355
1356 return 0;
1357}
1358EXPORT_SYMBOL(ttm_bo_init_mm);
1359
a987fcaa
TH
1360static void ttm_bo_global_kobj_release(struct kobject *kobj)
1361{
1362 struct ttm_bo_global *glob =
1363 container_of(kobj, struct ttm_bo_global, kobj);
1364
a987fcaa
TH
1365 ttm_mem_unregister_shrink(glob->mem_glob, &glob->shrink);
1366 __free_page(glob->dummy_read_page);
1367 kfree(glob);
1368}
1369
ba4420c2 1370void ttm_bo_global_release(struct drm_global_reference *ref)
a987fcaa
TH
1371{
1372 struct ttm_bo_global *glob = ref->object;
1373
1374 kobject_del(&glob->kobj);
1375 kobject_put(&glob->kobj);
1376}
1377EXPORT_SYMBOL(ttm_bo_global_release);
1378
ba4420c2 1379int ttm_bo_global_init(struct drm_global_reference *ref)
a987fcaa
TH
1380{
1381 struct ttm_bo_global_ref *bo_ref =
1382 container_of(ref, struct ttm_bo_global_ref, ref);
1383 struct ttm_bo_global *glob = ref->object;
1384 int ret;
1385
1386 mutex_init(&glob->device_list_mutex);
1387 spin_lock_init(&glob->lru_lock);
1388 glob->mem_glob = bo_ref->mem_glob;
1389 glob->dummy_read_page = alloc_page(__GFP_ZERO | GFP_DMA32);
1390
1391 if (unlikely(glob->dummy_read_page == NULL)) {
1392 ret = -ENOMEM;
1393 goto out_no_drp;
1394 }
1395
1396 INIT_LIST_HEAD(&glob->swap_lru);
1397 INIT_LIST_HEAD(&glob->device_list);
1398
1399 ttm_mem_init_shrink(&glob->shrink, ttm_bo_swapout);
1400 ret = ttm_mem_register_shrink(glob->mem_glob, &glob->shrink);
1401 if (unlikely(ret != 0)) {
25d0479a 1402 pr_err("Could not register buffer object swapout\n");
a987fcaa
TH
1403 goto out_no_shrink;
1404 }
1405
a987fcaa
TH
1406 atomic_set(&glob->bo_count, 0);
1407
b642ed06
RD
1408 ret = kobject_init_and_add(
1409 &glob->kobj, &ttm_bo_glob_kobj_type, ttm_get_kobj(), "buffer_objects");
a987fcaa
TH
1410 if (unlikely(ret != 0))
1411 kobject_put(&glob->kobj);
1412 return ret;
1413out_no_shrink:
1414 __free_page(glob->dummy_read_page);
1415out_no_drp:
1416 kfree(glob);
1417 return ret;
1418}
1419EXPORT_SYMBOL(ttm_bo_global_init);
1420
1421
ba4e7d97
TH
1422int ttm_bo_device_release(struct ttm_bo_device *bdev)
1423{
1424 int ret = 0;
1425 unsigned i = TTM_NUM_MEM_TYPES;
1426 struct ttm_mem_type_manager *man;
a987fcaa 1427 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97
TH
1428
1429 while (i--) {
1430 man = &bdev->man[i];
1431 if (man->has_type) {
1432 man->use_type = false;
1433 if ((i != TTM_PL_SYSTEM) && ttm_bo_clean_mm(bdev, i)) {
1434 ret = -EBUSY;
25d0479a
JP
1435 pr_err("DRM memory manager type %d is not clean\n",
1436 i);
ba4e7d97
TH
1437 }
1438 man->has_type = false;
1439 }
1440 }
1441
a987fcaa
TH
1442 mutex_lock(&glob->device_list_mutex);
1443 list_del(&bdev->device_list);
1444 mutex_unlock(&glob->device_list_mutex);
1445
f094cfc6 1446 cancel_delayed_work_sync(&bdev->wq);
ba4e7d97
TH
1447
1448 while (ttm_bo_delayed_delete(bdev, true))
1449 ;
1450
a987fcaa 1451 spin_lock(&glob->lru_lock);
ba4e7d97
TH
1452 if (list_empty(&bdev->ddestroy))
1453 TTM_DEBUG("Delayed destroy list was clean\n");
1454
1455 if (list_empty(&bdev->man[0].lru))
1456 TTM_DEBUG("Swap list was clean\n");
a987fcaa 1457 spin_unlock(&glob->lru_lock);
ba4e7d97 1458
72525b3f 1459 drm_vma_offset_manager_destroy(&bdev->vma_manager);
ba4e7d97 1460
ba4e7d97
TH
1461 return ret;
1462}
1463EXPORT_SYMBOL(ttm_bo_device_release);
1464
ba4e7d97 1465int ttm_bo_device_init(struct ttm_bo_device *bdev,
a987fcaa
TH
1466 struct ttm_bo_global *glob,
1467 struct ttm_bo_driver *driver,
44d847b7 1468 struct address_space *mapping,
51c8b407 1469 uint64_t file_page_offset,
ad49f501 1470 bool need_dma32)
ba4e7d97
TH
1471{
1472 int ret = -EINVAL;
1473
ba4e7d97 1474 bdev->driver = driver;
ba4e7d97
TH
1475
1476 memset(bdev->man, 0, sizeof(bdev->man));
1477
ba4e7d97
TH
1478 /*
1479 * Initialize the system memory buffer type.
1480 * Other types need to be driver / IOCTL initialized.
1481 */
ca262a99 1482 ret = ttm_bo_init_mm(bdev, TTM_PL_SYSTEM, 0);
ba4e7d97 1483 if (unlikely(ret != 0))
a987fcaa 1484 goto out_no_sys;
ba4e7d97 1485
72525b3f
DH
1486 drm_vma_offset_manager_init(&bdev->vma_manager, file_page_offset,
1487 0x10000000);
ba4e7d97 1488 INIT_DELAYED_WORK(&bdev->wq, ttm_bo_delayed_workqueue);
ba4e7d97 1489 INIT_LIST_HEAD(&bdev->ddestroy);
44d847b7 1490 bdev->dev_mapping = mapping;
a987fcaa 1491 bdev->glob = glob;
ad49f501 1492 bdev->need_dma32 = need_dma32;
a987fcaa
TH
1493 mutex_lock(&glob->device_list_mutex);
1494 list_add_tail(&bdev->device_list, &glob->device_list);
1495 mutex_unlock(&glob->device_list_mutex);
ba4e7d97
TH
1496
1497 return 0;
a987fcaa 1498out_no_sys:
ba4e7d97
TH
1499 return ret;
1500}
1501EXPORT_SYMBOL(ttm_bo_device_init);
1502
1503/*
1504 * buffer object vm functions.
1505 */
1506
1507bool ttm_mem_reg_is_pci(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
1508{
1509 struct ttm_mem_type_manager *man = &bdev->man[mem->mem_type];
1510
1511 if (!(man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
1512 if (mem->mem_type == TTM_PL_SYSTEM)
1513 return false;
1514
1515 if (man->flags & TTM_MEMTYPE_FLAG_CMA)
1516 return false;
1517
1518 if (mem->placement & TTM_PL_FLAG_CACHED)
1519 return false;
1520 }
1521 return true;
1522}
1523
eba67093 1524void ttm_bo_unmap_virtual_locked(struct ttm_buffer_object *bo)
ba4e7d97
TH
1525{
1526 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 1527
51335df9 1528 drm_vma_node_unmap(&bo->vma_node, bdev->dev_mapping);
eba67093 1529 ttm_mem_io_free_vm(bo);
ba4e7d97 1530}
eba67093
TH
1531
1532void ttm_bo_unmap_virtual(struct ttm_buffer_object *bo)
1533{
1534 struct ttm_bo_device *bdev = bo->bdev;
1535 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
1536
1537 ttm_mem_io_lock(man, false);
1538 ttm_bo_unmap_virtual_locked(bo);
1539 ttm_mem_io_unlock(man);
ba4e7d97 1540}
eba67093
TH
1541
1542
e024e110 1543EXPORT_SYMBOL(ttm_bo_unmap_virtual);
ba4e7d97 1544
ba4e7d97 1545int ttm_bo_wait(struct ttm_buffer_object *bo,
8aa6d4fc 1546 bool interruptible, bool no_wait)
ba4e7d97 1547{
f2c24b83
ML
1548 struct reservation_object_list *fobj;
1549 struct reservation_object *resv;
1550 struct fence *excl;
1551 long timeout = 15 * HZ;
1552 int i;
7040138f 1553
f2c24b83
ML
1554 resv = bo->resv;
1555 fobj = reservation_object_get_list(resv);
1556 excl = reservation_object_get_excl(resv);
1557 if (excl) {
1558 if (!fence_is_signaled(excl)) {
1559 if (no_wait)
1560 return -EBUSY;
ba4e7d97 1561
f2c24b83
ML
1562 timeout = fence_wait_timeout(excl,
1563 interruptible, timeout);
ba4e7d97 1564 }
f2c24b83 1565 }
ba4e7d97 1566
f2c24b83
ML
1567 for (i = 0; fobj && timeout > 0 && i < fobj->shared_count; ++i) {
1568 struct fence *fence;
1569 fence = rcu_dereference_protected(fobj->shared[i],
1570 reservation_object_held(resv));
ba4e7d97 1571
f2c24b83
ML
1572 if (!fence_is_signaled(fence)) {
1573 if (no_wait)
1574 return -EBUSY;
dd7cfd64 1575
f2c24b83
ML
1576 timeout = fence_wait_timeout(fence,
1577 interruptible, timeout);
ba4e7d97
TH
1578 }
1579 }
f2c24b83
ML
1580
1581 if (timeout < 0)
1582 return timeout;
1583
1584 if (timeout == 0)
1585 return -EBUSY;
1586
1587 reservation_object_add_excl_fence(resv, NULL);
1588 clear_bit(TTM_BO_PRIV_FLAG_MOVING, &bo->priv_flags);
1589 return 0;
ba4e7d97
TH
1590}
1591EXPORT_SYMBOL(ttm_bo_wait);
1592
ba4e7d97
TH
1593int ttm_bo_synccpu_write_grab(struct ttm_buffer_object *bo, bool no_wait)
1594{
1595 int ret = 0;
1596
1597 /*
8cfe92d6 1598 * Using ttm_bo_reserve makes sure the lru lists are updated.
ba4e7d97
TH
1599 */
1600
dfd5e50e 1601 ret = ttm_bo_reserve(bo, true, no_wait, NULL);
ba4e7d97
TH
1602 if (unlikely(ret != 0))
1603 return ret;
8aa6d4fc 1604 ret = ttm_bo_wait(bo, true, no_wait);
ba4e7d97
TH
1605 if (likely(ret == 0))
1606 atomic_inc(&bo->cpu_writers);
1607 ttm_bo_unreserve(bo);
1608 return ret;
1609}
d1ede145 1610EXPORT_SYMBOL(ttm_bo_synccpu_write_grab);
ba4e7d97
TH
1611
1612void ttm_bo_synccpu_write_release(struct ttm_buffer_object *bo)
1613{
654aa792 1614 atomic_dec(&bo->cpu_writers);
ba4e7d97 1615}
d1ede145 1616EXPORT_SYMBOL(ttm_bo_synccpu_write_release);
ba4e7d97
TH
1617
1618/**
1619 * A buffer object shrink method that tries to swap out the first
1620 * buffer object on the bo_global::swap_lru list.
1621 */
1622
1623static int ttm_bo_swapout(struct ttm_mem_shrink *shrink)
1624{
a987fcaa
TH
1625 struct ttm_bo_global *glob =
1626 container_of(shrink, struct ttm_bo_global, shrink);
ba4e7d97
TH
1627 struct ttm_buffer_object *bo;
1628 int ret = -EBUSY;
1629 int put_count;
1630 uint32_t swap_placement = (TTM_PL_FLAG_CACHED | TTM_PL_FLAG_SYSTEM);
1631
a987fcaa 1632 spin_lock(&glob->lru_lock);
2b7b3ad2 1633 list_for_each_entry(bo, &glob->swap_lru, swap) {
dfd5e50e 1634 ret = __ttm_bo_reserve(bo, false, true, NULL);
2b7b3ad2
ML
1635 if (!ret)
1636 break;
1637 }
85b144f8 1638
2b7b3ad2
ML
1639 if (ret) {
1640 spin_unlock(&glob->lru_lock);
1641 return ret;
1642 }
e1efc9b6 1643
2b7b3ad2 1644 kref_get(&bo->list_kref);
ba4e7d97 1645
2b7b3ad2
ML
1646 if (!list_empty(&bo->ddestroy)) {
1647 ret = ttm_bo_cleanup_refs_and_unlock(bo, false, false);
1648 kref_put(&bo->list_kref, ttm_bo_release_list);
1649 return ret;
ba4e7d97
TH
1650 }
1651
ba4e7d97 1652 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 1653 spin_unlock(&glob->lru_lock);
ba4e7d97 1654
d6ea8886 1655 ttm_bo_list_ref_sub(bo, put_count, true);
ba4e7d97
TH
1656
1657 /**
61ede070 1658 * Move to system cached
ba4e7d97
TH
1659 */
1660
ba4e7d97
TH
1661 if ((bo->mem.placement & swap_placement) != swap_placement) {
1662 struct ttm_mem_reg evict_mem;
1663
1664 evict_mem = bo->mem;
1665 evict_mem.mm_node = NULL;
1666 evict_mem.placement = TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED;
1667 evict_mem.mem_type = TTM_PL_SYSTEM;
1668
1669 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true,
97a875cb 1670 false, false);
ba4e7d97
TH
1671 if (unlikely(ret != 0))
1672 goto out;
1673 }
1674
61ede070
CK
1675 /**
1676 * Make sure BO is idle.
1677 */
1678
1679 ret = ttm_bo_wait(bo, false, false);
1680 if (unlikely(ret != 0))
1681 goto out;
1682
ba4e7d97
TH
1683 ttm_bo_unmap_virtual(bo);
1684
1685 /**
1686 * Swap out. Buffer will be swapped in again as soon as
1687 * anyone tries to access a ttm page.
1688 */
1689
3f09ea4e
TH
1690 if (bo->bdev->driver->swap_notify)
1691 bo->bdev->driver->swap_notify(bo);
1692
5df23979 1693 ret = ttm_tt_swapout(bo->ttm, bo->persistent_swap_storage);
ba4e7d97
TH
1694out:
1695
1696 /**
1697 *
1698 * Unreserve without putting on LRU to avoid swapping out an
1699 * already swapped buffer.
1700 */
1701
c7523083 1702 __ttm_bo_unreserve(bo);
ba4e7d97
TH
1703 kref_put(&bo->list_kref, ttm_bo_release_list);
1704 return ret;
1705}
1706
1707void ttm_bo_swapout_all(struct ttm_bo_device *bdev)
1708{
a987fcaa 1709 while (ttm_bo_swapout(&bdev->glob->shrink) == 0)
ba4e7d97
TH
1710 ;
1711}
e99e1e78 1712EXPORT_SYMBOL(ttm_bo_swapout_all);
c58f009e
TH
1713
1714/**
1715 * ttm_bo_wait_unreserved - interruptible wait for a buffer object to become
1716 * unreserved
1717 *
1718 * @bo: Pointer to buffer
1719 */
1720int ttm_bo_wait_unreserved(struct ttm_buffer_object *bo)
1721{
1722 int ret;
1723
1724 /*
1725 * In the absense of a wait_unlocked API,
1726 * Use the bo::wu_mutex to avoid triggering livelocks due to
1727 * concurrent use of this function. Note that this use of
1728 * bo::wu_mutex can go away if we change locking order to
1729 * mmap_sem -> bo::reserve.
1730 */
1731 ret = mutex_lock_interruptible(&bo->wu_mutex);
1732 if (unlikely(ret != 0))
1733 return -ERESTARTSYS;
1734 if (!ww_mutex_is_locked(&bo->resv->lock))
1735 goto out_unlock;
dfd5e50e 1736 ret = __ttm_bo_reserve(bo, true, false, NULL);
c58f009e
TH
1737 if (unlikely(ret != 0))
1738 goto out_unlock;
c7523083 1739 __ttm_bo_unreserve(bo);
c58f009e
TH
1740
1741out_unlock:
1742 mutex_unlock(&bo->wu_mutex);
1743 return ret;
1744}
This page took 0.745989 seconds and 5 git commands to generate.