drm/ttm: fix adding foreign BOs to the swap LRU
[deliverable/linux.git] / drivers / gpu / drm / ttm / ttm_bo.c
CommitLineData
ba4e7d97
TH
1/**************************************************************************
2 *
3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27/*
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
29 */
30
25d0479a
JP
31#define pr_fmt(fmt) "[TTM] " fmt
32
760285e7
DH
33#include <drm/ttm/ttm_module.h>
34#include <drm/ttm/ttm_bo_driver.h>
35#include <drm/ttm/ttm_placement.h>
ba4e7d97
TH
36#include <linux/jiffies.h>
37#include <linux/slab.h>
38#include <linux/sched.h>
39#include <linux/mm.h>
40#include <linux/file.h>
41#include <linux/module.h>
60063497 42#include <linux/atomic.h>
f2c24b83 43#include <linux/reservation.h>
ba4e7d97
TH
44
45#define TTM_ASSERT_LOCKED(param)
46#define TTM_DEBUG(fmt, arg...)
47#define TTM_BO_HASH_ORDER 13
48
ba4e7d97 49static int ttm_bo_swapout(struct ttm_mem_shrink *shrink);
a987fcaa
TH
50static void ttm_bo_global_kobj_release(struct kobject *kobj);
51
52static struct attribute ttm_bo_count = {
53 .name = "bo_count",
54 .mode = S_IRUGO
55};
56
f1217ed0
CK
57static inline int ttm_mem_type_from_place(const struct ttm_place *place,
58 uint32_t *mem_type)
fb53f862
JG
59{
60 int i;
61
62 for (i = 0; i <= TTM_PL_PRIV5; i++)
f1217ed0 63 if (place->flags & (1 << i)) {
fb53f862
JG
64 *mem_type = i;
65 return 0;
66 }
67 return -EINVAL;
68}
69
5012f506 70static void ttm_mem_type_debug(struct ttm_bo_device *bdev, int mem_type)
fb53f862 71{
5012f506
JG
72 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
73
25d0479a
JP
74 pr_err(" has_type: %d\n", man->has_type);
75 pr_err(" use_type: %d\n", man->use_type);
76 pr_err(" flags: 0x%08X\n", man->flags);
54c4cd68 77 pr_err(" gpu_offset: 0x%08llX\n", man->gpu_offset);
25d0479a
JP
78 pr_err(" size: %llu\n", man->size);
79 pr_err(" available_caching: 0x%08X\n", man->available_caching);
80 pr_err(" default_caching: 0x%08X\n", man->default_caching);
d961db75
BS
81 if (mem_type != TTM_PL_SYSTEM)
82 (*man->func->debug)(man, TTM_PFX);
fb53f862
JG
83}
84
85static void ttm_bo_mem_space_debug(struct ttm_buffer_object *bo,
86 struct ttm_placement *placement)
87{
fb53f862
JG
88 int i, ret, mem_type;
89
25d0479a
JP
90 pr_err("No space for %p (%lu pages, %luK, %luM)\n",
91 bo, bo->mem.num_pages, bo->mem.size >> 10,
92 bo->mem.size >> 20);
fb53f862 93 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 94 ret = ttm_mem_type_from_place(&placement->placement[i],
fb53f862
JG
95 &mem_type);
96 if (ret)
97 return;
25d0479a 98 pr_err(" placement[%d]=0x%08X (%d)\n",
f1217ed0 99 i, placement->placement[i].flags, mem_type);
5012f506 100 ttm_mem_type_debug(bo->bdev, mem_type);
fb53f862
JG
101 }
102}
103
a987fcaa
TH
104static ssize_t ttm_bo_global_show(struct kobject *kobj,
105 struct attribute *attr,
106 char *buffer)
107{
108 struct ttm_bo_global *glob =
109 container_of(kobj, struct ttm_bo_global, kobj);
110
111 return snprintf(buffer, PAGE_SIZE, "%lu\n",
112 (unsigned long) atomic_read(&glob->bo_count));
113}
114
115static struct attribute *ttm_bo_global_attrs[] = {
116 &ttm_bo_count,
117 NULL
118};
119
52cf25d0 120static const struct sysfs_ops ttm_bo_global_ops = {
a987fcaa
TH
121 .show = &ttm_bo_global_show
122};
123
124static struct kobj_type ttm_bo_glob_kobj_type = {
125 .release = &ttm_bo_global_kobj_release,
126 .sysfs_ops = &ttm_bo_global_ops,
127 .default_attrs = ttm_bo_global_attrs
128};
129
ba4e7d97
TH
130
131static inline uint32_t ttm_bo_type_flags(unsigned type)
132{
133 return 1 << (type);
134}
135
136static void ttm_bo_release_list(struct kref *list_kref)
137{
138 struct ttm_buffer_object *bo =
139 container_of(list_kref, struct ttm_buffer_object, list_kref);
140 struct ttm_bo_device *bdev = bo->bdev;
57de4ba9 141 size_t acc_size = bo->acc_size;
ba4e7d97
TH
142
143 BUG_ON(atomic_read(&bo->list_kref.refcount));
144 BUG_ON(atomic_read(&bo->kref.refcount));
145 BUG_ON(atomic_read(&bo->cpu_writers));
ba4e7d97
TH
146 BUG_ON(bo->mem.mm_node != NULL);
147 BUG_ON(!list_empty(&bo->lru));
148 BUG_ON(!list_empty(&bo->ddestroy));
149
150 if (bo->ttm)
151 ttm_tt_destroy(bo->ttm);
a987fcaa 152 atomic_dec(&bo->glob->bo_count);
5e338405
ML
153 if (bo->resv == &bo->ttm_resv)
154 reservation_object_fini(&bo->ttm_resv);
c58f009e 155 mutex_destroy(&bo->wu_mutex);
ba4e7d97
TH
156 if (bo->destroy)
157 bo->destroy(bo);
158 else {
ba4e7d97
TH
159 kfree(bo);
160 }
57de4ba9 161 ttm_mem_global_free(bdev->glob->mem_glob, acc_size);
ba4e7d97
TH
162}
163
d6ea8886 164void ttm_bo_add_to_lru(struct ttm_buffer_object *bo)
ba4e7d97
TH
165{
166 struct ttm_bo_device *bdev = bo->bdev;
167 struct ttm_mem_type_manager *man;
168
009a9dad 169 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
170
171 if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
172
173 BUG_ON(!list_empty(&bo->lru));
174
175 man = &bdev->man[bo->mem.mem_type];
176 list_add_tail(&bo->lru, &man->lru);
177 kref_get(&bo->list_kref);
178
ed704a43 179 if (bo->ttm && !(bo->ttm->page_flags & TTM_PAGE_FLAG_SG)) {
a987fcaa 180 list_add_tail(&bo->swap, &bo->glob->swap_lru);
ba4e7d97
TH
181 kref_get(&bo->list_kref);
182 }
183 }
184}
34820324 185EXPORT_SYMBOL(ttm_bo_add_to_lru);
ba4e7d97 186
d6ea8886 187int ttm_bo_del_from_lru(struct ttm_buffer_object *bo)
ba4e7d97
TH
188{
189 int put_count = 0;
190
191 if (!list_empty(&bo->swap)) {
192 list_del_init(&bo->swap);
193 ++put_count;
194 }
195 if (!list_empty(&bo->lru)) {
196 list_del_init(&bo->lru);
197 ++put_count;
198 }
199
200 /*
201 * TODO: Add a driver hook to delete from
202 * driver-specific LRU's here.
203 */
204
205 return put_count;
206}
207
ba4e7d97
TH
208static void ttm_bo_ref_bug(struct kref *list_kref)
209{
210 BUG();
211}
212
d6ea8886
DA
213void ttm_bo_list_ref_sub(struct ttm_buffer_object *bo, int count,
214 bool never_free)
215{
2357cbe5
TH
216 kref_sub(&bo->list_kref, count,
217 (never_free) ? ttm_bo_ref_bug : ttm_bo_release_list);
d6ea8886
DA
218}
219
34820324 220void ttm_bo_del_sub_from_lru(struct ttm_buffer_object *bo)
5e45d7df 221{
34820324 222 int put_count;
ecff665f 223
34820324
ML
224 spin_lock(&bo->glob->lru_lock);
225 put_count = ttm_bo_del_from_lru(bo);
226 spin_unlock(&bo->glob->lru_lock);
227 ttm_bo_list_ref_sub(bo, put_count, true);
ecff665f 228}
34820324 229EXPORT_SYMBOL(ttm_bo_del_sub_from_lru);
ecff665f 230
ba4e7d97
TH
231/*
232 * Call bo->mutex locked.
233 */
ba4e7d97
TH
234static int ttm_bo_add_ttm(struct ttm_buffer_object *bo, bool zero_alloc)
235{
236 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 237 struct ttm_bo_global *glob = bo->glob;
ba4e7d97
TH
238 int ret = 0;
239 uint32_t page_flags = 0;
240
241 TTM_ASSERT_LOCKED(&bo->mutex);
242 bo->ttm = NULL;
243
ad49f501
DA
244 if (bdev->need_dma32)
245 page_flags |= TTM_PAGE_FLAG_DMA32;
246
ba4e7d97
TH
247 switch (bo->type) {
248 case ttm_bo_type_device:
249 if (zero_alloc)
250 page_flags |= TTM_PAGE_FLAG_ZERO_ALLOC;
251 case ttm_bo_type_kernel:
649bf3ca
JG
252 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
253 page_flags, glob->dummy_read_page);
ba4e7d97
TH
254 if (unlikely(bo->ttm == NULL))
255 ret = -ENOMEM;
256 break;
129b78bf
DA
257 case ttm_bo_type_sg:
258 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
259 page_flags | TTM_PAGE_FLAG_SG,
260 glob->dummy_read_page);
261 if (unlikely(bo->ttm == NULL)) {
262 ret = -ENOMEM;
263 break;
264 }
265 bo->ttm->sg = bo->sg;
266 break;
ba4e7d97 267 default:
25d0479a 268 pr_err("Illegal buffer object type\n");
ba4e7d97
TH
269 ret = -EINVAL;
270 break;
271 }
272
273 return ret;
274}
275
276static int ttm_bo_handle_move_mem(struct ttm_buffer_object *bo,
277 struct ttm_mem_reg *mem,
9d87fa21 278 bool evict, bool interruptible,
97a875cb 279 bool no_wait_gpu)
ba4e7d97
TH
280{
281 struct ttm_bo_device *bdev = bo->bdev;
282 bool old_is_pci = ttm_mem_reg_is_pci(bdev, &bo->mem);
283 bool new_is_pci = ttm_mem_reg_is_pci(bdev, mem);
284 struct ttm_mem_type_manager *old_man = &bdev->man[bo->mem.mem_type];
285 struct ttm_mem_type_manager *new_man = &bdev->man[mem->mem_type];
286 int ret = 0;
287
288 if (old_is_pci || new_is_pci ||
eba67093
TH
289 ((mem->placement & bo->mem.placement & TTM_PL_MASK_CACHING) == 0)) {
290 ret = ttm_mem_io_lock(old_man, true);
291 if (unlikely(ret != 0))
292 goto out_err;
293 ttm_bo_unmap_virtual_locked(bo);
294 ttm_mem_io_unlock(old_man);
295 }
ba4e7d97
TH
296
297 /*
298 * Create and bind a ttm if required.
299 */
300
8d3bb236
BS
301 if (!(new_man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
302 if (bo->ttm == NULL) {
ff02b13f
BS
303 bool zero = !(old_man->flags & TTM_MEMTYPE_FLAG_FIXED);
304 ret = ttm_bo_add_ttm(bo, zero);
8d3bb236
BS
305 if (ret)
306 goto out_err;
307 }
ba4e7d97
TH
308
309 ret = ttm_tt_set_placement_caching(bo->ttm, mem->placement);
310 if (ret)
87ef9209 311 goto out_err;
ba4e7d97
TH
312
313 if (mem->mem_type != TTM_PL_SYSTEM) {
314 ret = ttm_tt_bind(bo->ttm, mem);
315 if (ret)
316 goto out_err;
317 }
318
319 if (bo->mem.mem_type == TTM_PL_SYSTEM) {
82ef594e
BS
320 if (bdev->driver->move_notify)
321 bdev->driver->move_notify(bo, mem);
ca262a99 322 bo->mem = *mem;
ba4e7d97 323 mem->mm_node = NULL;
ba4e7d97
TH
324 goto moved;
325 }
ba4e7d97
TH
326 }
327
9f1feed2
BS
328 if (bdev->driver->move_notify)
329 bdev->driver->move_notify(bo, mem);
330
ba4e7d97
TH
331 if (!(old_man->flags & TTM_MEMTYPE_FLAG_FIXED) &&
332 !(new_man->flags & TTM_MEMTYPE_FLAG_FIXED))
97a875cb 333 ret = ttm_bo_move_ttm(bo, evict, no_wait_gpu, mem);
ba4e7d97
TH
334 else if (bdev->driver->move)
335 ret = bdev->driver->move(bo, evict, interruptible,
97a875cb 336 no_wait_gpu, mem);
ba4e7d97 337 else
97a875cb 338 ret = ttm_bo_move_memcpy(bo, evict, no_wait_gpu, mem);
ba4e7d97 339
9f1feed2
BS
340 if (ret) {
341 if (bdev->driver->move_notify) {
342 struct ttm_mem_reg tmp_mem = *mem;
343 *mem = bo->mem;
344 bo->mem = tmp_mem;
345 bdev->driver->move_notify(bo, mem);
346 bo->mem = *mem;
014b3440 347 *mem = tmp_mem;
9f1feed2 348 }
ba4e7d97 349
9f1feed2
BS
350 goto out_err;
351 }
dc97b340 352
ba4e7d97
TH
353moved:
354 if (bo->evicted) {
9ef7506f
RC
355 if (bdev->driver->invalidate_caches) {
356 ret = bdev->driver->invalidate_caches(bdev, bo->mem.placement);
357 if (ret)
358 pr_err("Can not flush read caches\n");
359 }
ba4e7d97
TH
360 bo->evicted = false;
361 }
362
363 if (bo->mem.mm_node) {
d961db75 364 bo->offset = (bo->mem.start << PAGE_SHIFT) +
ba4e7d97
TH
365 bdev->man[bo->mem.mem_type].gpu_offset;
366 bo->cur_placement = bo->mem.placement;
354fb52c
TH
367 } else
368 bo->offset = 0;
ba4e7d97
TH
369
370 return 0;
371
372out_err:
373 new_man = &bdev->man[bo->mem.mem_type];
374 if ((new_man->flags & TTM_MEMTYPE_FLAG_FIXED) && bo->ttm) {
375 ttm_tt_unbind(bo->ttm);
376 ttm_tt_destroy(bo->ttm);
377 bo->ttm = NULL;
378 }
379
380 return ret;
381}
382
1df6a2eb 383/**
40d857bb 384 * Call bo::reserved.
1df6a2eb 385 * Will release GPU memory type usage on destruction.
40d857bb
TH
386 * This is the place to put in driver specific hooks to release
387 * driver private resources.
388 * Will release the bo::reserved lock.
1df6a2eb
TH
389 */
390
391static void ttm_bo_cleanup_memtype_use(struct ttm_buffer_object *bo)
392{
dc97b340
JG
393 if (bo->bdev->driver->move_notify)
394 bo->bdev->driver->move_notify(bo, NULL);
395
1df6a2eb 396 if (bo->ttm) {
1df6a2eb
TH
397 ttm_tt_unbind(bo->ttm);
398 ttm_tt_destroy(bo->ttm);
399 bo->ttm = NULL;
1df6a2eb 400 }
40d857bb 401 ttm_bo_mem_put(bo, &bo->mem);
1df6a2eb 402
5e338405 403 ww_mutex_unlock (&bo->resv->lock);
1df6a2eb
TH
404}
405
f2c24b83
ML
406static void ttm_bo_flush_all_fences(struct ttm_buffer_object *bo)
407{
408 struct reservation_object_list *fobj;
409 struct fence *fence;
410 int i;
411
412 fobj = reservation_object_get_list(bo->resv);
413 fence = reservation_object_get_excl(bo->resv);
414 if (fence && !fence->ops->signaled)
415 fence_enable_sw_signaling(fence);
416
417 for (i = 0; fobj && i < fobj->shared_count; ++i) {
418 fence = rcu_dereference_protected(fobj->shared[i],
419 reservation_object_held(bo->resv));
420
421 if (!fence->ops->signaled)
422 fence_enable_sw_signaling(fence);
423 }
424}
425
e1efc9b6 426static void ttm_bo_cleanup_refs_or_queue(struct ttm_buffer_object *bo)
ba4e7d97
TH
427{
428 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 429 struct ttm_bo_global *glob = bo->glob;
e1efc9b6 430 int put_count;
ba4e7d97
TH
431 int ret;
432
4154f051 433 spin_lock(&glob->lru_lock);
0eff2a24 434 ret = __ttm_bo_reserve(bo, false, true, false, NULL);
4154f051 435
dd7cfd64 436 if (!ret) {
f2c24b83 437 if (!ttm_bo_wait(bo, false, false, true)) {
dd7cfd64 438 put_count = ttm_bo_del_from_lru(bo);
ba4e7d97 439
dd7cfd64
ML
440 spin_unlock(&glob->lru_lock);
441 ttm_bo_cleanup_memtype_use(bo);
ba4e7d97 442
dd7cfd64 443 ttm_bo_list_ref_sub(bo, put_count, true);
4154f051 444
dd7cfd64 445 return;
f2c24b83
ML
446 } else
447 ttm_bo_flush_all_fences(bo);
15205fbc
TH
448
449 /*
450 * Make NO_EVICT bos immediately available to
451 * shrinkers, now that they are queued for
452 * destruction.
453 */
454 if (bo->mem.placement & TTM_PL_FLAG_NO_EVICT) {
455 bo->mem.placement &= ~TTM_PL_FLAG_NO_EVICT;
456 ttm_bo_add_to_lru(bo);
457 }
458
c7523083 459 __ttm_bo_unreserve(bo);
15205fbc 460 }
e1efc9b6
TH
461
462 kref_get(&bo->list_kref);
463 list_add_tail(&bo->ddestroy, &bdev->ddestroy);
464 spin_unlock(&glob->lru_lock);
e1efc9b6 465
e1efc9b6
TH
466 schedule_delayed_work(&bdev->wq,
467 ((HZ / 100) < 1) ? 1 : HZ / 100);
468}
469
470/**
85b144f8 471 * function ttm_bo_cleanup_refs_and_unlock
e1efc9b6
TH
472 * If bo idle, remove from delayed- and lru lists, and unref.
473 * If not idle, do nothing.
474 *
85b144f8
ML
475 * Must be called with lru_lock and reservation held, this function
476 * will drop both before returning.
477 *
e1efc9b6 478 * @interruptible Any sleeps should occur interruptibly.
e1efc9b6
TH
479 * @no_wait_gpu Never wait for gpu. Return -EBUSY instead.
480 */
481
85b144f8
ML
482static int ttm_bo_cleanup_refs_and_unlock(struct ttm_buffer_object *bo,
483 bool interruptible,
484 bool no_wait_gpu)
e1efc9b6
TH
485{
486 struct ttm_bo_global *glob = bo->glob;
487 int put_count;
85b144f8 488 int ret;
e1efc9b6 489
85b144f8 490 ret = ttm_bo_wait(bo, false, false, true);
e1efc9b6 491
85b144f8 492 if (ret && !no_wait_gpu) {
472db7ab
ML
493 long lret;
494 ww_mutex_unlock(&bo->resv->lock);
495 spin_unlock(&glob->lru_lock);
496
497 lret = reservation_object_wait_timeout_rcu(bo->resv,
498 true,
499 interruptible,
500 30 * HZ);
501
502 if (lret < 0)
503 return lret;
504 else if (lret == 0)
505 return -EBUSY;
b8e902f2 506
85b144f8 507 spin_lock(&glob->lru_lock);
0eff2a24 508 ret = __ttm_bo_reserve(bo, false, true, false, NULL);
b8e902f2 509
85b144f8
ML
510 /*
511 * We raced, and lost, someone else holds the reservation now,
512 * and is probably busy in ttm_bo_cleanup_memtype_use.
513 *
514 * Even if it's not the case, because we finished waiting any
515 * delayed destruction would succeed, so just return success
516 * here.
517 */
518 if (ret) {
519 spin_unlock(&glob->lru_lock);
520 return 0;
521 }
7040138f
ML
522
523 /*
524 * remove sync_obj with ttm_bo_wait, the wait should be
525 * finished, and no new wait object should have been added.
526 */
7040138f
ML
527 ret = ttm_bo_wait(bo, false, false, true);
528 WARN_ON(ret);
529 }
ba4e7d97 530
85b144f8 531 if (ret || unlikely(list_empty(&bo->ddestroy))) {
c7523083 532 __ttm_bo_unreserve(bo);
a987fcaa 533 spin_unlock(&glob->lru_lock);
85b144f8 534 return ret;
ba4e7d97
TH
535 }
536
e1efc9b6
TH
537 put_count = ttm_bo_del_from_lru(bo);
538 list_del_init(&bo->ddestroy);
539 ++put_count;
540
541 spin_unlock(&glob->lru_lock);
542 ttm_bo_cleanup_memtype_use(bo);
543
d6ea8886 544 ttm_bo_list_ref_sub(bo, put_count, true);
e1efc9b6
TH
545
546 return 0;
ba4e7d97
TH
547}
548
549/**
550 * Traverse the delayed list, and call ttm_bo_cleanup_refs on all
551 * encountered buffers.
552 */
553
554static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all)
555{
a987fcaa 556 struct ttm_bo_global *glob = bdev->glob;
1a961ce0
LB
557 struct ttm_buffer_object *entry = NULL;
558 int ret = 0;
ba4e7d97 559
a987fcaa 560 spin_lock(&glob->lru_lock);
1a961ce0
LB
561 if (list_empty(&bdev->ddestroy))
562 goto out_unlock;
563
564 entry = list_first_entry(&bdev->ddestroy,
565 struct ttm_buffer_object, ddestroy);
566 kref_get(&entry->list_kref);
567
568 for (;;) {
569 struct ttm_buffer_object *nentry = NULL;
570
571 if (entry->ddestroy.next != &bdev->ddestroy) {
572 nentry = list_first_entry(&entry->ddestroy,
573 struct ttm_buffer_object, ddestroy);
ba4e7d97
TH
574 kref_get(&nentry->list_kref);
575 }
ba4e7d97 576
0eff2a24 577 ret = __ttm_bo_reserve(entry, false, true, false, NULL);
63d0a419
ML
578 if (remove_all && ret) {
579 spin_unlock(&glob->lru_lock);
c7523083 580 ret = __ttm_bo_reserve(entry, false, false,
0eff2a24 581 false, NULL);
63d0a419
ML
582 spin_lock(&glob->lru_lock);
583 }
584
85b144f8
ML
585 if (!ret)
586 ret = ttm_bo_cleanup_refs_and_unlock(entry, false,
587 !remove_all);
588 else
589 spin_unlock(&glob->lru_lock);
590
ba4e7d97 591 kref_put(&entry->list_kref, ttm_bo_release_list);
1a961ce0
LB
592 entry = nentry;
593
594 if (ret || !entry)
595 goto out;
ba4e7d97 596
a987fcaa 597 spin_lock(&glob->lru_lock);
1a961ce0 598 if (list_empty(&entry->ddestroy))
ba4e7d97
TH
599 break;
600 }
ba4e7d97 601
1a961ce0
LB
602out_unlock:
603 spin_unlock(&glob->lru_lock);
604out:
605 if (entry)
606 kref_put(&entry->list_kref, ttm_bo_release_list);
ba4e7d97
TH
607 return ret;
608}
609
610static void ttm_bo_delayed_workqueue(struct work_struct *work)
611{
612 struct ttm_bo_device *bdev =
613 container_of(work, struct ttm_bo_device, wq.work);
614
615 if (ttm_bo_delayed_delete(bdev, false)) {
616 schedule_delayed_work(&bdev->wq,
617 ((HZ / 100) < 1) ? 1 : HZ / 100);
618 }
619}
620
621static void ttm_bo_release(struct kref *kref)
622{
623 struct ttm_buffer_object *bo =
624 container_of(kref, struct ttm_buffer_object, kref);
625 struct ttm_bo_device *bdev = bo->bdev;
eba67093 626 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
ba4e7d97 627
72525b3f 628 drm_vma_offset_remove(&bdev->vma_manager, &bo->vma_node);
eba67093
TH
629 ttm_mem_io_lock(man, false);
630 ttm_mem_io_free_vm(bo);
631 ttm_mem_io_unlock(man);
e1efc9b6 632 ttm_bo_cleanup_refs_or_queue(bo);
ba4e7d97 633 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
634}
635
636void ttm_bo_unref(struct ttm_buffer_object **p_bo)
637{
638 struct ttm_buffer_object *bo = *p_bo;
ba4e7d97
TH
639
640 *p_bo = NULL;
ba4e7d97 641 kref_put(&bo->kref, ttm_bo_release);
ba4e7d97
TH
642}
643EXPORT_SYMBOL(ttm_bo_unref);
644
7c5ee536
MG
645int ttm_bo_lock_delayed_workqueue(struct ttm_bo_device *bdev)
646{
647 return cancel_delayed_work_sync(&bdev->wq);
648}
649EXPORT_SYMBOL(ttm_bo_lock_delayed_workqueue);
650
651void ttm_bo_unlock_delayed_workqueue(struct ttm_bo_device *bdev, int resched)
652{
653 if (resched)
654 schedule_delayed_work(&bdev->wq,
655 ((HZ / 100) < 1) ? 1 : HZ / 100);
656}
657EXPORT_SYMBOL(ttm_bo_unlock_delayed_workqueue);
658
ca262a99 659static int ttm_bo_evict(struct ttm_buffer_object *bo, bool interruptible,
97a875cb 660 bool no_wait_gpu)
ba4e7d97 661{
ba4e7d97
TH
662 struct ttm_bo_device *bdev = bo->bdev;
663 struct ttm_mem_reg evict_mem;
ca262a99
JG
664 struct ttm_placement placement;
665 int ret = 0;
ba4e7d97 666
1717c0e2 667 ret = ttm_bo_wait(bo, false, interruptible, no_wait_gpu);
ba4e7d97 668
78ecf091 669 if (unlikely(ret != 0)) {
98ffc415 670 if (ret != -ERESTARTSYS) {
25d0479a 671 pr_err("Failed to expire sync object before buffer eviction\n");
78ecf091 672 }
ba4e7d97
TH
673 goto out;
674 }
675
009a9dad 676 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
677
678 evict_mem = bo->mem;
679 evict_mem.mm_node = NULL;
eba67093
TH
680 evict_mem.bus.io_reserved_vm = false;
681 evict_mem.bus.io_reserved_count = 0;
ba4e7d97 682
7cb7d1d7
JG
683 placement.num_placement = 0;
684 placement.num_busy_placement = 0;
ca262a99
JG
685 bdev->driver->evict_flags(bo, &placement);
686 ret = ttm_bo_mem_space(bo, &placement, &evict_mem, interruptible,
97a875cb 687 no_wait_gpu);
ba4e7d97 688 if (ret) {
fb53f862 689 if (ret != -ERESTARTSYS) {
25d0479a
JP
690 pr_err("Failed to find memory space for buffer 0x%p eviction\n",
691 bo);
fb53f862
JG
692 ttm_bo_mem_space_debug(bo, &placement);
693 }
ba4e7d97
TH
694 goto out;
695 }
696
697 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true, interruptible,
97a875cb 698 no_wait_gpu);
ba4e7d97 699 if (ret) {
98ffc415 700 if (ret != -ERESTARTSYS)
25d0479a 701 pr_err("Buffer eviction failed\n");
42311ff9 702 ttm_bo_mem_put(bo, &evict_mem);
ba4e7d97
TH
703 goto out;
704 }
ca262a99
JG
705 bo->evicted = true;
706out:
707 return ret;
708}
709
710static int ttm_mem_evict_first(struct ttm_bo_device *bdev,
711 uint32_t mem_type,
e300180f 712 const struct ttm_place *place,
97a875cb 713 bool interruptible,
9d87fa21 714 bool no_wait_gpu)
ca262a99
JG
715{
716 struct ttm_bo_global *glob = bdev->glob;
717 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
718 struct ttm_buffer_object *bo;
e7ab2019 719 int ret = -EBUSY, put_count;
ba4e7d97 720
a987fcaa 721 spin_lock(&glob->lru_lock);
e7ab2019 722 list_for_each_entry(bo, &man->lru, lru) {
0eff2a24 723 ret = __ttm_bo_reserve(bo, false, true, false, NULL);
e300180f
MD
724 if (!ret) {
725 if (place && (place->fpfn || place->lpfn)) {
726 /* Don't evict this BO if it's outside of the
727 * requested placement range
728 */
729 if (place->fpfn >= (bo->mem.start + bo->mem.size) ||
730 (place->lpfn && place->lpfn <= bo->mem.start)) {
731 __ttm_bo_unreserve(bo);
732 ret = -EBUSY;
733 continue;
734 }
735 }
736
e7ab2019 737 break;
e300180f 738 }
e7ab2019
ML
739 }
740
741 if (ret) {
9c51ba1d 742 spin_unlock(&glob->lru_lock);
e7ab2019 743 return ret;
9c51ba1d
TH
744 }
745
ca262a99 746 kref_get(&bo->list_kref);
9c51ba1d 747
e1efc9b6 748 if (!list_empty(&bo->ddestroy)) {
e7ab2019
ML
749 ret = ttm_bo_cleanup_refs_and_unlock(bo, interruptible,
750 no_wait_gpu);
e1efc9b6 751 kref_put(&bo->list_kref, ttm_bo_release_list);
b8e902f2 752 return ret;
e1efc9b6
TH
753 }
754
9c51ba1d 755 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 756 spin_unlock(&glob->lru_lock);
9c51ba1d
TH
757
758 BUG_ON(ret != 0);
759
d6ea8886 760 ttm_bo_list_ref_sub(bo, put_count, true);
9c51ba1d 761
97a875cb 762 ret = ttm_bo_evict(bo, interruptible, no_wait_gpu);
ca262a99 763 ttm_bo_unreserve(bo);
9c51ba1d 764
ca262a99 765 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
766 return ret;
767}
768
42311ff9
BS
769void ttm_bo_mem_put(struct ttm_buffer_object *bo, struct ttm_mem_reg *mem)
770{
d961db75 771 struct ttm_mem_type_manager *man = &bo->bdev->man[mem->mem_type];
42311ff9 772
d961db75
BS
773 if (mem->mm_node)
774 (*man->func->put_node)(man, mem);
42311ff9
BS
775}
776EXPORT_SYMBOL(ttm_bo_mem_put);
777
ba4e7d97
TH
778/**
779 * Repeatedly evict memory from the LRU for @mem_type until we create enough
780 * space, or we've evicted everything and there isn't enough space.
781 */
ca262a99
JG
782static int ttm_bo_mem_force_space(struct ttm_buffer_object *bo,
783 uint32_t mem_type,
f1217ed0 784 const struct ttm_place *place,
ca262a99 785 struct ttm_mem_reg *mem,
9d87fa21 786 bool interruptible,
9d87fa21 787 bool no_wait_gpu)
ba4e7d97 788{
ca262a99 789 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 790 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
ba4e7d97
TH
791 int ret;
792
ba4e7d97 793 do {
f1217ed0 794 ret = (*man->func->get_node)(man, bo, place, mem);
ca262a99
JG
795 if (unlikely(ret != 0))
796 return ret;
d961db75 797 if (mem->mm_node)
ba4e7d97 798 break;
e300180f 799 ret = ttm_mem_evict_first(bdev, mem_type, place,
97a875cb 800 interruptible, no_wait_gpu);
ba4e7d97
TH
801 if (unlikely(ret != 0))
802 return ret;
ba4e7d97 803 } while (1);
d961db75 804 if (mem->mm_node == NULL)
ba4e7d97 805 return -ENOMEM;
ba4e7d97
TH
806 mem->mem_type = mem_type;
807 return 0;
808}
809
ae3e8122
TH
810static uint32_t ttm_bo_select_caching(struct ttm_mem_type_manager *man,
811 uint32_t cur_placement,
812 uint32_t proposed_placement)
813{
814 uint32_t caching = proposed_placement & TTM_PL_MASK_CACHING;
815 uint32_t result = proposed_placement & ~TTM_PL_MASK_CACHING;
816
817 /**
818 * Keep current caching if possible.
819 */
820
821 if ((cur_placement & caching) != 0)
822 result |= (cur_placement & caching);
823 else if ((man->default_caching & caching) != 0)
824 result |= man->default_caching;
825 else if ((TTM_PL_FLAG_CACHED & caching) != 0)
826 result |= TTM_PL_FLAG_CACHED;
827 else if ((TTM_PL_FLAG_WC & caching) != 0)
828 result |= TTM_PL_FLAG_WC;
829 else if ((TTM_PL_FLAG_UNCACHED & caching) != 0)
830 result |= TTM_PL_FLAG_UNCACHED;
831
832 return result;
833}
834
ba4e7d97 835static bool ttm_bo_mt_compatible(struct ttm_mem_type_manager *man,
ba4e7d97 836 uint32_t mem_type,
f1217ed0 837 const struct ttm_place *place,
ae3e8122 838 uint32_t *masked_placement)
ba4e7d97
TH
839{
840 uint32_t cur_flags = ttm_bo_type_flags(mem_type);
841
f1217ed0 842 if ((cur_flags & place->flags & TTM_PL_MASK_MEM) == 0)
ba4e7d97
TH
843 return false;
844
f1217ed0 845 if ((place->flags & man->available_caching) == 0)
ba4e7d97 846 return false;
ba4e7d97 847
f1217ed0 848 cur_flags |= (place->flags & man->available_caching);
ae3e8122
TH
849
850 *masked_placement = cur_flags;
ba4e7d97
TH
851 return true;
852}
853
854/**
855 * Creates space for memory region @mem according to its type.
856 *
857 * This function first searches for free space in compatible memory types in
858 * the priority order defined by the driver. If free space isn't found, then
859 * ttm_bo_mem_force_space is attempted in priority order to evict and find
860 * space.
861 */
862int ttm_bo_mem_space(struct ttm_buffer_object *bo,
ca262a99
JG
863 struct ttm_placement *placement,
864 struct ttm_mem_reg *mem,
97a875cb 865 bool interruptible,
9d87fa21 866 bool no_wait_gpu)
ba4e7d97
TH
867{
868 struct ttm_bo_device *bdev = bo->bdev;
869 struct ttm_mem_type_manager *man;
ba4e7d97
TH
870 uint32_t mem_type = TTM_PL_SYSTEM;
871 uint32_t cur_flags = 0;
872 bool type_found = false;
873 bool type_ok = false;
98ffc415 874 bool has_erestartsys = false;
ca262a99 875 int i, ret;
ba4e7d97
TH
876
877 mem->mm_node = NULL;
b6637526 878 for (i = 0; i < placement->num_placement; ++i) {
f1217ed0
CK
879 const struct ttm_place *place = &placement->placement[i];
880
881 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
882 if (ret)
883 return ret;
ba4e7d97 884 man = &bdev->man[mem_type];
e30f3963
TH
885 if (!man->has_type || !man->use_type)
886 continue;
ba4e7d97 887
f1217ed0 888 type_ok = ttm_bo_mt_compatible(man, mem_type, place,
ca262a99 889 &cur_flags);
ba4e7d97
TH
890
891 if (!type_ok)
892 continue;
893
e30f3963 894 type_found = true;
ae3e8122
TH
895 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
896 cur_flags);
ca262a99
JG
897 /*
898 * Use the access and other non-mapping-related flag bits from
899 * the memory placement flags to the current flags
900 */
f1217ed0 901 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 902 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 903
ba4e7d97
TH
904 if (mem_type == TTM_PL_SYSTEM)
905 break;
906
e30f3963
TH
907 ret = (*man->func->get_node)(man, bo, place, mem);
908 if (unlikely(ret))
909 return ret;
910
d961db75 911 if (mem->mm_node)
ba4e7d97
TH
912 break;
913 }
914
d961db75 915 if ((type_ok && (mem_type == TTM_PL_SYSTEM)) || mem->mm_node) {
ba4e7d97
TH
916 mem->mem_type = mem_type;
917 mem->placement = cur_flags;
918 return 0;
919 }
920
b6637526 921 for (i = 0; i < placement->num_busy_placement; ++i) {
f1217ed0
CK
922 const struct ttm_place *place = &placement->busy_placement[i];
923
924 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
925 if (ret)
926 return ret;
ba4e7d97 927 man = &bdev->man[mem_type];
e30f3963 928 if (!man->has_type || !man->use_type)
ba4e7d97 929 continue;
f1217ed0 930 if (!ttm_bo_mt_compatible(man, mem_type, place, &cur_flags))
ba4e7d97
TH
931 continue;
932
e30f3963 933 type_found = true;
ae3e8122
TH
934 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
935 cur_flags);
ca262a99
JG
936 /*
937 * Use the access and other non-mapping-related flag bits from
938 * the memory placement flags to the current flags
939 */
f1217ed0 940 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 941 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 942
0eaddb28
TH
943 if (mem_type == TTM_PL_SYSTEM) {
944 mem->mem_type = mem_type;
945 mem->placement = cur_flags;
946 mem->mm_node = NULL;
947 return 0;
948 }
949
f1217ed0 950 ret = ttm_bo_mem_force_space(bo, mem_type, place, mem,
97a875cb 951 interruptible, no_wait_gpu);
ba4e7d97
TH
952 if (ret == 0 && mem->mm_node) {
953 mem->placement = cur_flags;
954 return 0;
955 }
98ffc415
TH
956 if (ret == -ERESTARTSYS)
957 has_erestartsys = true;
ba4e7d97 958 }
e30f3963
TH
959
960 if (!type_found) {
961 printk(KERN_ERR TTM_PFX "No compatible memory type found.\n");
962 return -EINVAL;
963 }
964
965 return (has_erestartsys) ? -ERESTARTSYS : -ENOMEM;
ba4e7d97
TH
966}
967EXPORT_SYMBOL(ttm_bo_mem_space);
968
6e87fa48 969static int ttm_bo_move_buffer(struct ttm_buffer_object *bo,
ca262a99 970 struct ttm_placement *placement,
97a875cb 971 bool interruptible,
9d87fa21 972 bool no_wait_gpu)
ba4e7d97 973{
ba4e7d97
TH
974 int ret = 0;
975 struct ttm_mem_reg mem;
976
009a9dad 977 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
978
979 /*
980 * FIXME: It's possible to pipeline buffer moves.
981 * Have the driver move function wait for idle when necessary,
982 * instead of doing it here.
983 */
1717c0e2 984 ret = ttm_bo_wait(bo, false, interruptible, no_wait_gpu);
ba4e7d97
TH
985 if (ret)
986 return ret;
ba4e7d97
TH
987 mem.num_pages = bo->num_pages;
988 mem.size = mem.num_pages << PAGE_SHIFT;
989 mem.page_alignment = bo->mem.page_alignment;
eba67093
TH
990 mem.bus.io_reserved_vm = false;
991 mem.bus.io_reserved_count = 0;
ba4e7d97
TH
992 /*
993 * Determine where to move the buffer.
994 */
97a875cb
ML
995 ret = ttm_bo_mem_space(bo, placement, &mem,
996 interruptible, no_wait_gpu);
ba4e7d97
TH
997 if (ret)
998 goto out_unlock;
97a875cb
ML
999 ret = ttm_bo_handle_move_mem(bo, &mem, false,
1000 interruptible, no_wait_gpu);
ba4e7d97 1001out_unlock:
d961db75
BS
1002 if (ret && mem.mm_node)
1003 ttm_bo_mem_put(bo, &mem);
ba4e7d97
TH
1004 return ret;
1005}
1006
59c8e663
TH
1007static bool ttm_bo_mem_compat(struct ttm_placement *placement,
1008 struct ttm_mem_reg *mem,
1009 uint32_t *new_flags)
ba4e7d97 1010{
ca262a99 1011 int i;
e22238ea 1012
ca262a99 1013 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 1014 const struct ttm_place *heap = &placement->placement[i];
9ace2ef7 1015 if (mem->mm_node &&
f1217ed0 1016 (mem->start < heap->fpfn ||
9ace2ef7 1017 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1018 continue;
1019
1020 *new_flags = heap->flags;
59c8e663
TH
1021 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1022 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1023 return true;
1024 }
1025
1026 for (i = 0; i < placement->num_busy_placement; i++) {
f1217ed0 1027 const struct ttm_place *heap = &placement->busy_placement[i];
9ace2ef7 1028 if (mem->mm_node &&
f1217ed0 1029 (mem->start < heap->fpfn ||
9ace2ef7 1030 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1031 continue;
1032
1033 *new_flags = heap->flags;
59c8e663
TH
1034 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1035 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1036 return true;
ca262a99 1037 }
59c8e663
TH
1038
1039 return false;
ba4e7d97
TH
1040}
1041
09855acb
JG
1042int ttm_bo_validate(struct ttm_buffer_object *bo,
1043 struct ttm_placement *placement,
97a875cb 1044 bool interruptible,
9d87fa21 1045 bool no_wait_gpu)
ba4e7d97
TH
1046{
1047 int ret;
59c8e663 1048 uint32_t new_flags;
ba4e7d97 1049
009a9dad 1050 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
1051 /*
1052 * Check whether we need to move buffer.
1053 */
59c8e663 1054 if (!ttm_bo_mem_compat(placement, &bo->mem, &new_flags)) {
97a875cb
ML
1055 ret = ttm_bo_move_buffer(bo, placement, interruptible,
1056 no_wait_gpu);
ca262a99 1057 if (ret)
ba4e7d97 1058 return ret;
ca262a99
JG
1059 } else {
1060 /*
1061 * Use the access and other non-mapping-related flag bits from
1062 * the compatible memory placement flags to the active flags
1063 */
59c8e663 1064 ttm_flag_masked(&bo->mem.placement, new_flags,
ca262a99 1065 ~TTM_PL_MASK_MEMTYPE);
ba4e7d97 1066 }
ba4e7d97
TH
1067 /*
1068 * We might need to add a TTM.
1069 */
ba4e7d97
TH
1070 if (bo->mem.mem_type == TTM_PL_SYSTEM && bo->ttm == NULL) {
1071 ret = ttm_bo_add_ttm(bo, true);
1072 if (ret)
1073 return ret;
1074 }
ba4e7d97
TH
1075 return 0;
1076}
09855acb 1077EXPORT_SYMBOL(ttm_bo_validate);
ba4e7d97 1078
09855acb
JG
1079int ttm_bo_init(struct ttm_bo_device *bdev,
1080 struct ttm_buffer_object *bo,
1081 unsigned long size,
1082 enum ttm_bo_type type,
1083 struct ttm_placement *placement,
1084 uint32_t page_alignment,
09855acb 1085 bool interruptible,
5df23979 1086 struct file *persistent_swap_storage,
09855acb 1087 size_t acc_size,
129b78bf 1088 struct sg_table *sg,
f4f4e3e3 1089 struct reservation_object *resv,
09855acb 1090 void (*destroy) (struct ttm_buffer_object *))
ba4e7d97 1091{
09855acb 1092 int ret = 0;
ba4e7d97 1093 unsigned long num_pages;
57de4ba9 1094 struct ttm_mem_global *mem_glob = bdev->glob->mem_glob;
5e338405 1095 bool locked;
57de4ba9
JG
1096
1097 ret = ttm_mem_global_alloc(mem_glob, acc_size, false, false);
1098 if (ret) {
25d0479a 1099 pr_err("Out of kernel memory\n");
57de4ba9
JG
1100 if (destroy)
1101 (*destroy)(bo);
1102 else
1103 kfree(bo);
1104 return -ENOMEM;
1105 }
ba4e7d97 1106
ba4e7d97
TH
1107 num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
1108 if (num_pages == 0) {
25d0479a 1109 pr_err("Illegal buffer object size\n");
7dfbbdcf
TH
1110 if (destroy)
1111 (*destroy)(bo);
1112 else
1113 kfree(bo);
a393c730 1114 ttm_mem_global_free(mem_glob, acc_size);
ba4e7d97
TH
1115 return -EINVAL;
1116 }
1117 bo->destroy = destroy;
1118
ba4e7d97
TH
1119 kref_init(&bo->kref);
1120 kref_init(&bo->list_kref);
1121 atomic_set(&bo->cpu_writers, 0);
ba4e7d97
TH
1122 INIT_LIST_HEAD(&bo->lru);
1123 INIT_LIST_HEAD(&bo->ddestroy);
1124 INIT_LIST_HEAD(&bo->swap);
eba67093 1125 INIT_LIST_HEAD(&bo->io_reserve_lru);
c58f009e 1126 mutex_init(&bo->wu_mutex);
ba4e7d97 1127 bo->bdev = bdev;
a987fcaa 1128 bo->glob = bdev->glob;
ba4e7d97
TH
1129 bo->type = type;
1130 bo->num_pages = num_pages;
eb6d2c39 1131 bo->mem.size = num_pages << PAGE_SHIFT;
ba4e7d97
TH
1132 bo->mem.mem_type = TTM_PL_SYSTEM;
1133 bo->mem.num_pages = bo->num_pages;
1134 bo->mem.mm_node = NULL;
1135 bo->mem.page_alignment = page_alignment;
eba67093
TH
1136 bo->mem.bus.io_reserved_vm = false;
1137 bo->mem.bus.io_reserved_count = 0;
ba4e7d97
TH
1138 bo->priv_flags = 0;
1139 bo->mem.placement = (TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED);
5df23979 1140 bo->persistent_swap_storage = persistent_swap_storage;
ba4e7d97 1141 bo->acc_size = acc_size;
129b78bf 1142 bo->sg = sg;
f4f4e3e3
ML
1143 if (resv) {
1144 bo->resv = resv;
1145 lockdep_assert_held(&bo->resv->lock.base);
1146 } else {
1147 bo->resv = &bo->ttm_resv;
1148 reservation_object_init(&bo->ttm_resv);
1149 }
a987fcaa 1150 atomic_inc(&bo->glob->bo_count);
72525b3f 1151 drm_vma_node_reset(&bo->vma_node);
ba4e7d97 1152
ba4e7d97
TH
1153 /*
1154 * For ttm_bo_type_device buffers, allocate
1155 * address space from the device.
1156 */
f1217ed0
CK
1157 if (bo->type == ttm_bo_type_device ||
1158 bo->type == ttm_bo_type_sg)
abf19035
DH
1159 ret = drm_vma_offset_add(&bdev->vma_manager, &bo->vma_node,
1160 bo->mem.num_pages);
ba4e7d97 1161
f4f4e3e3
ML
1162 /* passed reservation objects should already be locked,
1163 * since otherwise lockdep will be angered in radeon.
1164 */
1165 if (!resv) {
1166 locked = ww_mutex_trylock(&bo->resv->lock);
1167 WARN_ON(!locked);
1168 }
ba4e7d97 1169
5e338405
ML
1170 if (likely(!ret))
1171 ret = ttm_bo_validate(bo, placement, interruptible, false);
ba4e7d97 1172
33d48cf8 1173 if (!resv) {
f4f4e3e3 1174 ttm_bo_unreserve(bo);
5e338405 1175
33d48cf8
CK
1176 } else if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
1177 spin_lock(&bo->glob->lru_lock);
1178 ttm_bo_add_to_lru(bo);
1179 spin_unlock(&bo->glob->lru_lock);
1180 }
1181
5e338405
ML
1182 if (unlikely(ret))
1183 ttm_bo_unref(&bo);
ba4e7d97
TH
1184
1185 return ret;
1186}
09855acb 1187EXPORT_SYMBOL(ttm_bo_init);
ba4e7d97 1188
57de4ba9
JG
1189size_t ttm_bo_acc_size(struct ttm_bo_device *bdev,
1190 unsigned long bo_size,
1191 unsigned struct_size)
ba4e7d97 1192{
57de4ba9
JG
1193 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1194 size_t size = 0;
ba4e7d97 1195
57de4ba9
JG
1196 size += ttm_round_pot(struct_size);
1197 size += PAGE_ALIGN(npages * sizeof(void *));
1198 size += ttm_round_pot(sizeof(struct ttm_tt));
1199 return size;
ba4e7d97 1200}
57de4ba9
JG
1201EXPORT_SYMBOL(ttm_bo_acc_size);
1202
1203size_t ttm_bo_dma_acc_size(struct ttm_bo_device *bdev,
1204 unsigned long bo_size,
1205 unsigned struct_size)
1206{
1207 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1208 size_t size = 0;
1209
1210 size += ttm_round_pot(struct_size);
1211 size += PAGE_ALIGN(npages * sizeof(void *));
1212 size += PAGE_ALIGN(npages * sizeof(dma_addr_t));
1213 size += ttm_round_pot(sizeof(struct ttm_dma_tt));
1214 return size;
1215}
1216EXPORT_SYMBOL(ttm_bo_dma_acc_size);
ba4e7d97 1217
09855acb
JG
1218int ttm_bo_create(struct ttm_bo_device *bdev,
1219 unsigned long size,
1220 enum ttm_bo_type type,
1221 struct ttm_placement *placement,
1222 uint32_t page_alignment,
09855acb 1223 bool interruptible,
5df23979 1224 struct file *persistent_swap_storage,
09855acb 1225 struct ttm_buffer_object **p_bo)
ba4e7d97
TH
1226{
1227 struct ttm_buffer_object *bo;
57de4ba9 1228 size_t acc_size;
ca262a99 1229 int ret;
ba4e7d97 1230
ba4e7d97 1231 bo = kzalloc(sizeof(*bo), GFP_KERNEL);
a393c730 1232 if (unlikely(bo == NULL))
ba4e7d97 1233 return -ENOMEM;
ba4e7d97 1234
a393c730 1235 acc_size = ttm_bo_acc_size(bdev, size, sizeof(struct ttm_buffer_object));
09855acb 1236 ret = ttm_bo_init(bdev, bo, size, type, placement, page_alignment,
0b91c4a1 1237 interruptible, persistent_swap_storage, acc_size,
f4f4e3e3 1238 NULL, NULL, NULL);
ba4e7d97
TH
1239 if (likely(ret == 0))
1240 *p_bo = bo;
1241
1242 return ret;
1243}
4d798937 1244EXPORT_SYMBOL(ttm_bo_create);
ba4e7d97 1245
ba4e7d97 1246static int ttm_bo_force_list_clean(struct ttm_bo_device *bdev,
ca262a99 1247 unsigned mem_type, bool allow_errors)
ba4e7d97 1248{
ca262a99 1249 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
a987fcaa 1250 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97 1251 int ret;
ba4e7d97
TH
1252
1253 /*
1254 * Can't use standard list traversal since we're unlocking.
1255 */
1256
a987fcaa 1257 spin_lock(&glob->lru_lock);
ca262a99 1258 while (!list_empty(&man->lru)) {
a987fcaa 1259 spin_unlock(&glob->lru_lock);
e300180f 1260 ret = ttm_mem_evict_first(bdev, mem_type, NULL, false, false);
ca262a99
JG
1261 if (ret) {
1262 if (allow_errors) {
1263 return ret;
1264 } else {
25d0479a 1265 pr_err("Cleanup eviction failed\n");
ca262a99
JG
1266 }
1267 }
a987fcaa 1268 spin_lock(&glob->lru_lock);
ba4e7d97 1269 }
a987fcaa 1270 spin_unlock(&glob->lru_lock);
ba4e7d97
TH
1271 return 0;
1272}
1273
1274int ttm_bo_clean_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1275{
c96e7c7a 1276 struct ttm_mem_type_manager *man;
ba4e7d97
TH
1277 int ret = -EINVAL;
1278
1279 if (mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1280 pr_err("Illegal memory type %d\n", mem_type);
ba4e7d97
TH
1281 return ret;
1282 }
c96e7c7a 1283 man = &bdev->man[mem_type];
ba4e7d97
TH
1284
1285 if (!man->has_type) {
25d0479a
JP
1286 pr_err("Trying to take down uninitialized memory manager type %u\n",
1287 mem_type);
ba4e7d97
TH
1288 return ret;
1289 }
1290
1291 man->use_type = false;
1292 man->has_type = false;
1293
1294 ret = 0;
1295 if (mem_type > 0) {
ca262a99 1296 ttm_bo_force_list_clean(bdev, mem_type, false);
ba4e7d97 1297
d961db75 1298 ret = (*man->func->takedown)(man);
ba4e7d97
TH
1299 }
1300
1301 return ret;
1302}
1303EXPORT_SYMBOL(ttm_bo_clean_mm);
1304
1305int ttm_bo_evict_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1306{
1307 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
1308
1309 if (mem_type == 0 || mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1310 pr_err("Illegal memory manager memory type %u\n", mem_type);
ba4e7d97
TH
1311 return -EINVAL;
1312 }
1313
1314 if (!man->has_type) {
25d0479a 1315 pr_err("Memory type %u has not been initialized\n", mem_type);
ba4e7d97
TH
1316 return 0;
1317 }
1318
ca262a99 1319 return ttm_bo_force_list_clean(bdev, mem_type, true);
ba4e7d97
TH
1320}
1321EXPORT_SYMBOL(ttm_bo_evict_mm);
1322
1323int ttm_bo_init_mm(struct ttm_bo_device *bdev, unsigned type,
ca262a99 1324 unsigned long p_size)
ba4e7d97
TH
1325{
1326 int ret = -EINVAL;
1327 struct ttm_mem_type_manager *man;
1328
dbc4a5b8 1329 BUG_ON(type >= TTM_NUM_MEM_TYPES);
ba4e7d97 1330 man = &bdev->man[type];
dbc4a5b8 1331 BUG_ON(man->has_type);
eba67093
TH
1332 man->io_reserve_fastpath = true;
1333 man->use_io_reserve_lru = false;
1334 mutex_init(&man->io_reserve_mutex);
1335 INIT_LIST_HEAD(&man->io_reserve_lru);
ba4e7d97
TH
1336
1337 ret = bdev->driver->init_mem_type(bdev, type, man);
1338 if (ret)
1339 return ret;
d961db75 1340 man->bdev = bdev;
ba4e7d97
TH
1341
1342 ret = 0;
1343 if (type != TTM_PL_SYSTEM) {
d961db75 1344 ret = (*man->func->init)(man, p_size);
ba4e7d97
TH
1345 if (ret)
1346 return ret;
1347 }
1348 man->has_type = true;
1349 man->use_type = true;
1350 man->size = p_size;
1351
1352 INIT_LIST_HEAD(&man->lru);
1353
1354 return 0;
1355}
1356EXPORT_SYMBOL(ttm_bo_init_mm);
1357
a987fcaa
TH
1358static void ttm_bo_global_kobj_release(struct kobject *kobj)
1359{
1360 struct ttm_bo_global *glob =
1361 container_of(kobj, struct ttm_bo_global, kobj);
1362
a987fcaa
TH
1363 ttm_mem_unregister_shrink(glob->mem_glob, &glob->shrink);
1364 __free_page(glob->dummy_read_page);
1365 kfree(glob);
1366}
1367
ba4420c2 1368void ttm_bo_global_release(struct drm_global_reference *ref)
a987fcaa
TH
1369{
1370 struct ttm_bo_global *glob = ref->object;
1371
1372 kobject_del(&glob->kobj);
1373 kobject_put(&glob->kobj);
1374}
1375EXPORT_SYMBOL(ttm_bo_global_release);
1376
ba4420c2 1377int ttm_bo_global_init(struct drm_global_reference *ref)
a987fcaa
TH
1378{
1379 struct ttm_bo_global_ref *bo_ref =
1380 container_of(ref, struct ttm_bo_global_ref, ref);
1381 struct ttm_bo_global *glob = ref->object;
1382 int ret;
1383
1384 mutex_init(&glob->device_list_mutex);
1385 spin_lock_init(&glob->lru_lock);
1386 glob->mem_glob = bo_ref->mem_glob;
1387 glob->dummy_read_page = alloc_page(__GFP_ZERO | GFP_DMA32);
1388
1389 if (unlikely(glob->dummy_read_page == NULL)) {
1390 ret = -ENOMEM;
1391 goto out_no_drp;
1392 }
1393
1394 INIT_LIST_HEAD(&glob->swap_lru);
1395 INIT_LIST_HEAD(&glob->device_list);
1396
1397 ttm_mem_init_shrink(&glob->shrink, ttm_bo_swapout);
1398 ret = ttm_mem_register_shrink(glob->mem_glob, &glob->shrink);
1399 if (unlikely(ret != 0)) {
25d0479a 1400 pr_err("Could not register buffer object swapout\n");
a987fcaa
TH
1401 goto out_no_shrink;
1402 }
1403
a987fcaa
TH
1404 atomic_set(&glob->bo_count, 0);
1405
b642ed06
RD
1406 ret = kobject_init_and_add(
1407 &glob->kobj, &ttm_bo_glob_kobj_type, ttm_get_kobj(), "buffer_objects");
a987fcaa
TH
1408 if (unlikely(ret != 0))
1409 kobject_put(&glob->kobj);
1410 return ret;
1411out_no_shrink:
1412 __free_page(glob->dummy_read_page);
1413out_no_drp:
1414 kfree(glob);
1415 return ret;
1416}
1417EXPORT_SYMBOL(ttm_bo_global_init);
1418
1419
ba4e7d97
TH
1420int ttm_bo_device_release(struct ttm_bo_device *bdev)
1421{
1422 int ret = 0;
1423 unsigned i = TTM_NUM_MEM_TYPES;
1424 struct ttm_mem_type_manager *man;
a987fcaa 1425 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97
TH
1426
1427 while (i--) {
1428 man = &bdev->man[i];
1429 if (man->has_type) {
1430 man->use_type = false;
1431 if ((i != TTM_PL_SYSTEM) && ttm_bo_clean_mm(bdev, i)) {
1432 ret = -EBUSY;
25d0479a
JP
1433 pr_err("DRM memory manager type %d is not clean\n",
1434 i);
ba4e7d97
TH
1435 }
1436 man->has_type = false;
1437 }
1438 }
1439
a987fcaa
TH
1440 mutex_lock(&glob->device_list_mutex);
1441 list_del(&bdev->device_list);
1442 mutex_unlock(&glob->device_list_mutex);
1443
f094cfc6 1444 cancel_delayed_work_sync(&bdev->wq);
ba4e7d97
TH
1445
1446 while (ttm_bo_delayed_delete(bdev, true))
1447 ;
1448
a987fcaa 1449 spin_lock(&glob->lru_lock);
ba4e7d97
TH
1450 if (list_empty(&bdev->ddestroy))
1451 TTM_DEBUG("Delayed destroy list was clean\n");
1452
1453 if (list_empty(&bdev->man[0].lru))
1454 TTM_DEBUG("Swap list was clean\n");
a987fcaa 1455 spin_unlock(&glob->lru_lock);
ba4e7d97 1456
72525b3f 1457 drm_vma_offset_manager_destroy(&bdev->vma_manager);
ba4e7d97 1458
ba4e7d97
TH
1459 return ret;
1460}
1461EXPORT_SYMBOL(ttm_bo_device_release);
1462
ba4e7d97 1463int ttm_bo_device_init(struct ttm_bo_device *bdev,
a987fcaa
TH
1464 struct ttm_bo_global *glob,
1465 struct ttm_bo_driver *driver,
44d847b7 1466 struct address_space *mapping,
51c8b407 1467 uint64_t file_page_offset,
ad49f501 1468 bool need_dma32)
ba4e7d97
TH
1469{
1470 int ret = -EINVAL;
1471
ba4e7d97 1472 bdev->driver = driver;
ba4e7d97
TH
1473
1474 memset(bdev->man, 0, sizeof(bdev->man));
1475
ba4e7d97
TH
1476 /*
1477 * Initialize the system memory buffer type.
1478 * Other types need to be driver / IOCTL initialized.
1479 */
ca262a99 1480 ret = ttm_bo_init_mm(bdev, TTM_PL_SYSTEM, 0);
ba4e7d97 1481 if (unlikely(ret != 0))
a987fcaa 1482 goto out_no_sys;
ba4e7d97 1483
72525b3f
DH
1484 drm_vma_offset_manager_init(&bdev->vma_manager, file_page_offset,
1485 0x10000000);
ba4e7d97 1486 INIT_DELAYED_WORK(&bdev->wq, ttm_bo_delayed_workqueue);
ba4e7d97 1487 INIT_LIST_HEAD(&bdev->ddestroy);
44d847b7 1488 bdev->dev_mapping = mapping;
a987fcaa 1489 bdev->glob = glob;
ad49f501 1490 bdev->need_dma32 = need_dma32;
65705962 1491 bdev->val_seq = 0;
a987fcaa
TH
1492 mutex_lock(&glob->device_list_mutex);
1493 list_add_tail(&bdev->device_list, &glob->device_list);
1494 mutex_unlock(&glob->device_list_mutex);
ba4e7d97
TH
1495
1496 return 0;
a987fcaa 1497out_no_sys:
ba4e7d97
TH
1498 return ret;
1499}
1500EXPORT_SYMBOL(ttm_bo_device_init);
1501
1502/*
1503 * buffer object vm functions.
1504 */
1505
1506bool ttm_mem_reg_is_pci(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
1507{
1508 struct ttm_mem_type_manager *man = &bdev->man[mem->mem_type];
1509
1510 if (!(man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
1511 if (mem->mem_type == TTM_PL_SYSTEM)
1512 return false;
1513
1514 if (man->flags & TTM_MEMTYPE_FLAG_CMA)
1515 return false;
1516
1517 if (mem->placement & TTM_PL_FLAG_CACHED)
1518 return false;
1519 }
1520 return true;
1521}
1522
eba67093 1523void ttm_bo_unmap_virtual_locked(struct ttm_buffer_object *bo)
ba4e7d97
TH
1524{
1525 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 1526
51335df9 1527 drm_vma_node_unmap(&bo->vma_node, bdev->dev_mapping);
eba67093 1528 ttm_mem_io_free_vm(bo);
ba4e7d97 1529}
eba67093
TH
1530
1531void ttm_bo_unmap_virtual(struct ttm_buffer_object *bo)
1532{
1533 struct ttm_bo_device *bdev = bo->bdev;
1534 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
1535
1536 ttm_mem_io_lock(man, false);
1537 ttm_bo_unmap_virtual_locked(bo);
1538 ttm_mem_io_unlock(man);
ba4e7d97 1539}
eba67093
TH
1540
1541
e024e110 1542EXPORT_SYMBOL(ttm_bo_unmap_virtual);
ba4e7d97 1543
ba4e7d97 1544int ttm_bo_wait(struct ttm_buffer_object *bo,
1717c0e2 1545 bool lazy, bool interruptible, bool no_wait)
ba4e7d97 1546{
f2c24b83
ML
1547 struct reservation_object_list *fobj;
1548 struct reservation_object *resv;
1549 struct fence *excl;
1550 long timeout = 15 * HZ;
1551 int i;
7040138f 1552
f2c24b83
ML
1553 resv = bo->resv;
1554 fobj = reservation_object_get_list(resv);
1555 excl = reservation_object_get_excl(resv);
1556 if (excl) {
1557 if (!fence_is_signaled(excl)) {
1558 if (no_wait)
1559 return -EBUSY;
ba4e7d97 1560
f2c24b83
ML
1561 timeout = fence_wait_timeout(excl,
1562 interruptible, timeout);
ba4e7d97 1563 }
f2c24b83 1564 }
ba4e7d97 1565
f2c24b83
ML
1566 for (i = 0; fobj && timeout > 0 && i < fobj->shared_count; ++i) {
1567 struct fence *fence;
1568 fence = rcu_dereference_protected(fobj->shared[i],
1569 reservation_object_held(resv));
ba4e7d97 1570
f2c24b83
ML
1571 if (!fence_is_signaled(fence)) {
1572 if (no_wait)
1573 return -EBUSY;
dd7cfd64 1574
f2c24b83
ML
1575 timeout = fence_wait_timeout(fence,
1576 interruptible, timeout);
ba4e7d97
TH
1577 }
1578 }
f2c24b83
ML
1579
1580 if (timeout < 0)
1581 return timeout;
1582
1583 if (timeout == 0)
1584 return -EBUSY;
1585
1586 reservation_object_add_excl_fence(resv, NULL);
1587 clear_bit(TTM_BO_PRIV_FLAG_MOVING, &bo->priv_flags);
1588 return 0;
ba4e7d97
TH
1589}
1590EXPORT_SYMBOL(ttm_bo_wait);
1591
ba4e7d97
TH
1592int ttm_bo_synccpu_write_grab(struct ttm_buffer_object *bo, bool no_wait)
1593{
1594 int ret = 0;
1595
1596 /*
8cfe92d6 1597 * Using ttm_bo_reserve makes sure the lru lists are updated.
ba4e7d97
TH
1598 */
1599
0eff2a24 1600 ret = ttm_bo_reserve(bo, true, no_wait, false, NULL);
ba4e7d97
TH
1601 if (unlikely(ret != 0))
1602 return ret;
1717c0e2 1603 ret = ttm_bo_wait(bo, false, true, no_wait);
ba4e7d97
TH
1604 if (likely(ret == 0))
1605 atomic_inc(&bo->cpu_writers);
1606 ttm_bo_unreserve(bo);
1607 return ret;
1608}
d1ede145 1609EXPORT_SYMBOL(ttm_bo_synccpu_write_grab);
ba4e7d97
TH
1610
1611void ttm_bo_synccpu_write_release(struct ttm_buffer_object *bo)
1612{
654aa792 1613 atomic_dec(&bo->cpu_writers);
ba4e7d97 1614}
d1ede145 1615EXPORT_SYMBOL(ttm_bo_synccpu_write_release);
ba4e7d97
TH
1616
1617/**
1618 * A buffer object shrink method that tries to swap out the first
1619 * buffer object on the bo_global::swap_lru list.
1620 */
1621
1622static int ttm_bo_swapout(struct ttm_mem_shrink *shrink)
1623{
a987fcaa
TH
1624 struct ttm_bo_global *glob =
1625 container_of(shrink, struct ttm_bo_global, shrink);
ba4e7d97
TH
1626 struct ttm_buffer_object *bo;
1627 int ret = -EBUSY;
1628 int put_count;
1629 uint32_t swap_placement = (TTM_PL_FLAG_CACHED | TTM_PL_FLAG_SYSTEM);
1630
a987fcaa 1631 spin_lock(&glob->lru_lock);
2b7b3ad2 1632 list_for_each_entry(bo, &glob->swap_lru, swap) {
0eff2a24 1633 ret = __ttm_bo_reserve(bo, false, true, false, NULL);
2b7b3ad2
ML
1634 if (!ret)
1635 break;
1636 }
85b144f8 1637
2b7b3ad2
ML
1638 if (ret) {
1639 spin_unlock(&glob->lru_lock);
1640 return ret;
1641 }
e1efc9b6 1642
2b7b3ad2 1643 kref_get(&bo->list_kref);
ba4e7d97 1644
2b7b3ad2
ML
1645 if (!list_empty(&bo->ddestroy)) {
1646 ret = ttm_bo_cleanup_refs_and_unlock(bo, false, false);
1647 kref_put(&bo->list_kref, ttm_bo_release_list);
1648 return ret;
ba4e7d97
TH
1649 }
1650
ba4e7d97 1651 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 1652 spin_unlock(&glob->lru_lock);
ba4e7d97 1653
d6ea8886 1654 ttm_bo_list_ref_sub(bo, put_count, true);
ba4e7d97
TH
1655
1656 /**
1657 * Wait for GPU, then move to system cached.
1658 */
1659
1717c0e2 1660 ret = ttm_bo_wait(bo, false, false, false);
ba4e7d97
TH
1661
1662 if (unlikely(ret != 0))
1663 goto out;
1664
1665 if ((bo->mem.placement & swap_placement) != swap_placement) {
1666 struct ttm_mem_reg evict_mem;
1667
1668 evict_mem = bo->mem;
1669 evict_mem.mm_node = NULL;
1670 evict_mem.placement = TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED;
1671 evict_mem.mem_type = TTM_PL_SYSTEM;
1672
1673 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true,
97a875cb 1674 false, false);
ba4e7d97
TH
1675 if (unlikely(ret != 0))
1676 goto out;
1677 }
1678
1679 ttm_bo_unmap_virtual(bo);
1680
1681 /**
1682 * Swap out. Buffer will be swapped in again as soon as
1683 * anyone tries to access a ttm page.
1684 */
1685
3f09ea4e
TH
1686 if (bo->bdev->driver->swap_notify)
1687 bo->bdev->driver->swap_notify(bo);
1688
5df23979 1689 ret = ttm_tt_swapout(bo->ttm, bo->persistent_swap_storage);
ba4e7d97
TH
1690out:
1691
1692 /**
1693 *
1694 * Unreserve without putting on LRU to avoid swapping out an
1695 * already swapped buffer.
1696 */
1697
c7523083 1698 __ttm_bo_unreserve(bo);
ba4e7d97
TH
1699 kref_put(&bo->list_kref, ttm_bo_release_list);
1700 return ret;
1701}
1702
1703void ttm_bo_swapout_all(struct ttm_bo_device *bdev)
1704{
a987fcaa 1705 while (ttm_bo_swapout(&bdev->glob->shrink) == 0)
ba4e7d97
TH
1706 ;
1707}
e99e1e78 1708EXPORT_SYMBOL(ttm_bo_swapout_all);
c58f009e
TH
1709
1710/**
1711 * ttm_bo_wait_unreserved - interruptible wait for a buffer object to become
1712 * unreserved
1713 *
1714 * @bo: Pointer to buffer
1715 */
1716int ttm_bo_wait_unreserved(struct ttm_buffer_object *bo)
1717{
1718 int ret;
1719
1720 /*
1721 * In the absense of a wait_unlocked API,
1722 * Use the bo::wu_mutex to avoid triggering livelocks due to
1723 * concurrent use of this function. Note that this use of
1724 * bo::wu_mutex can go away if we change locking order to
1725 * mmap_sem -> bo::reserve.
1726 */
1727 ret = mutex_lock_interruptible(&bo->wu_mutex);
1728 if (unlikely(ret != 0))
1729 return -ERESTARTSYS;
1730 if (!ww_mutex_is_locked(&bo->resv->lock))
1731 goto out_unlock;
c7523083 1732 ret = __ttm_bo_reserve(bo, true, false, false, NULL);
c58f009e
TH
1733 if (unlikely(ret != 0))
1734 goto out_unlock;
c7523083 1735 __ttm_bo_unreserve(bo);
c58f009e
TH
1736
1737out_unlock:
1738 mutex_unlock(&bo->wu_mutex);
1739 return ret;
1740}
This page took 0.451607 seconds and 5 git commands to generate.