Merge remote-tracking branches 'asoc/topic/fsl-spdif', 'asoc/topic/hdmi', 'asoc/topic...
[linux-2.6-block.git] / drivers / gpu / drm / ttm / ttm_bo.c
CommitLineData
ba4e7d97
TH
1/**************************************************************************
2 *
3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27/*
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
29 */
30
25d0479a
JP
31#define pr_fmt(fmt) "[TTM] " fmt
32
760285e7
DH
33#include <drm/ttm/ttm_module.h>
34#include <drm/ttm/ttm_bo_driver.h>
35#include <drm/ttm/ttm_placement.h>
ba4e7d97
TH
36#include <linux/jiffies.h>
37#include <linux/slab.h>
38#include <linux/sched.h>
39#include <linux/mm.h>
40#include <linux/file.h>
41#include <linux/module.h>
60063497 42#include <linux/atomic.h>
f2c24b83 43#include <linux/reservation.h>
ba4e7d97
TH
44
45#define TTM_ASSERT_LOCKED(param)
46#define TTM_DEBUG(fmt, arg...)
47#define TTM_BO_HASH_ORDER 13
48
ba4e7d97 49static int ttm_bo_swapout(struct ttm_mem_shrink *shrink);
a987fcaa
TH
50static void ttm_bo_global_kobj_release(struct kobject *kobj);
51
52static struct attribute ttm_bo_count = {
53 .name = "bo_count",
54 .mode = S_IRUGO
55};
56
f1217ed0
CK
57static inline int ttm_mem_type_from_place(const struct ttm_place *place,
58 uint32_t *mem_type)
fb53f862
JG
59{
60 int i;
61
62 for (i = 0; i <= TTM_PL_PRIV5; i++)
f1217ed0 63 if (place->flags & (1 << i)) {
fb53f862
JG
64 *mem_type = i;
65 return 0;
66 }
67 return -EINVAL;
68}
69
5012f506 70static void ttm_mem_type_debug(struct ttm_bo_device *bdev, int mem_type)
fb53f862 71{
5012f506
JG
72 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
73
25d0479a
JP
74 pr_err(" has_type: %d\n", man->has_type);
75 pr_err(" use_type: %d\n", man->use_type);
76 pr_err(" flags: 0x%08X\n", man->flags);
54c4cd68 77 pr_err(" gpu_offset: 0x%08llX\n", man->gpu_offset);
25d0479a
JP
78 pr_err(" size: %llu\n", man->size);
79 pr_err(" available_caching: 0x%08X\n", man->available_caching);
80 pr_err(" default_caching: 0x%08X\n", man->default_caching);
d961db75
BS
81 if (mem_type != TTM_PL_SYSTEM)
82 (*man->func->debug)(man, TTM_PFX);
fb53f862
JG
83}
84
85static void ttm_bo_mem_space_debug(struct ttm_buffer_object *bo,
86 struct ttm_placement *placement)
87{
fb53f862
JG
88 int i, ret, mem_type;
89
25d0479a
JP
90 pr_err("No space for %p (%lu pages, %luK, %luM)\n",
91 bo, bo->mem.num_pages, bo->mem.size >> 10,
92 bo->mem.size >> 20);
fb53f862 93 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 94 ret = ttm_mem_type_from_place(&placement->placement[i],
fb53f862
JG
95 &mem_type);
96 if (ret)
97 return;
25d0479a 98 pr_err(" placement[%d]=0x%08X (%d)\n",
f1217ed0 99 i, placement->placement[i].flags, mem_type);
5012f506 100 ttm_mem_type_debug(bo->bdev, mem_type);
fb53f862
JG
101 }
102}
103
a987fcaa
TH
104static ssize_t ttm_bo_global_show(struct kobject *kobj,
105 struct attribute *attr,
106 char *buffer)
107{
108 struct ttm_bo_global *glob =
109 container_of(kobj, struct ttm_bo_global, kobj);
110
111 return snprintf(buffer, PAGE_SIZE, "%lu\n",
112 (unsigned long) atomic_read(&glob->bo_count));
113}
114
115static struct attribute *ttm_bo_global_attrs[] = {
116 &ttm_bo_count,
117 NULL
118};
119
52cf25d0 120static const struct sysfs_ops ttm_bo_global_ops = {
a987fcaa
TH
121 .show = &ttm_bo_global_show
122};
123
124static struct kobj_type ttm_bo_glob_kobj_type = {
125 .release = &ttm_bo_global_kobj_release,
126 .sysfs_ops = &ttm_bo_global_ops,
127 .default_attrs = ttm_bo_global_attrs
128};
129
ba4e7d97
TH
130
131static inline uint32_t ttm_bo_type_flags(unsigned type)
132{
133 return 1 << (type);
134}
135
136static void ttm_bo_release_list(struct kref *list_kref)
137{
138 struct ttm_buffer_object *bo =
139 container_of(list_kref, struct ttm_buffer_object, list_kref);
140 struct ttm_bo_device *bdev = bo->bdev;
57de4ba9 141 size_t acc_size = bo->acc_size;
ba4e7d97
TH
142
143 BUG_ON(atomic_read(&bo->list_kref.refcount));
144 BUG_ON(atomic_read(&bo->kref.refcount));
145 BUG_ON(atomic_read(&bo->cpu_writers));
ba4e7d97
TH
146 BUG_ON(bo->mem.mm_node != NULL);
147 BUG_ON(!list_empty(&bo->lru));
148 BUG_ON(!list_empty(&bo->ddestroy));
149
150 if (bo->ttm)
151 ttm_tt_destroy(bo->ttm);
a987fcaa 152 atomic_dec(&bo->glob->bo_count);
5e338405
ML
153 if (bo->resv == &bo->ttm_resv)
154 reservation_object_fini(&bo->ttm_resv);
c58f009e 155 mutex_destroy(&bo->wu_mutex);
ba4e7d97
TH
156 if (bo->destroy)
157 bo->destroy(bo);
158 else {
ba4e7d97
TH
159 kfree(bo);
160 }
57de4ba9 161 ttm_mem_global_free(bdev->glob->mem_glob, acc_size);
ba4e7d97
TH
162}
163
d6ea8886 164void ttm_bo_add_to_lru(struct ttm_buffer_object *bo)
ba4e7d97
TH
165{
166 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 167
009a9dad 168 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
169
170 if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
171
172 BUG_ON(!list_empty(&bo->lru));
173
98c2872a 174 list_add(&bo->lru, bdev->driver->lru_tail(bo));
ba4e7d97
TH
175 kref_get(&bo->list_kref);
176
ed704a43 177 if (bo->ttm && !(bo->ttm->page_flags & TTM_PAGE_FLAG_SG)) {
98c2872a 178 list_add(&bo->swap, bdev->driver->swap_lru_tail(bo));
ba4e7d97
TH
179 kref_get(&bo->list_kref);
180 }
181 }
182}
34820324 183EXPORT_SYMBOL(ttm_bo_add_to_lru);
ba4e7d97 184
d6ea8886 185int ttm_bo_del_from_lru(struct ttm_buffer_object *bo)
ba4e7d97 186{
c3ea576e 187 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97
TH
188 int put_count = 0;
189
c3ea576e
CK
190 if (bdev->driver->lru_removal)
191 bdev->driver->lru_removal(bo);
192
ba4e7d97
TH
193 if (!list_empty(&bo->swap)) {
194 list_del_init(&bo->swap);
195 ++put_count;
196 }
197 if (!list_empty(&bo->lru)) {
198 list_del_init(&bo->lru);
199 ++put_count;
200 }
201
ba4e7d97
TH
202 return put_count;
203}
204
ba4e7d97
TH
205static void ttm_bo_ref_bug(struct kref *list_kref)
206{
207 BUG();
208}
209
d6ea8886
DA
210void ttm_bo_list_ref_sub(struct ttm_buffer_object *bo, int count,
211 bool never_free)
212{
2357cbe5
TH
213 kref_sub(&bo->list_kref, count,
214 (never_free) ? ttm_bo_ref_bug : ttm_bo_release_list);
d6ea8886
DA
215}
216
34820324 217void ttm_bo_del_sub_from_lru(struct ttm_buffer_object *bo)
5e45d7df 218{
34820324 219 int put_count;
ecff665f 220
34820324
ML
221 spin_lock(&bo->glob->lru_lock);
222 put_count = ttm_bo_del_from_lru(bo);
223 spin_unlock(&bo->glob->lru_lock);
224 ttm_bo_list_ref_sub(bo, put_count, true);
ecff665f 225}
34820324 226EXPORT_SYMBOL(ttm_bo_del_sub_from_lru);
ecff665f 227
ab749618
CK
228void ttm_bo_move_to_lru_tail(struct ttm_buffer_object *bo)
229{
230 struct ttm_bo_device *bdev = bo->bdev;
56fc3502 231 int put_count = 0;
ab749618
CK
232
233 lockdep_assert_held(&bo->resv->lock.base);
234
c3ea576e
CK
235 if (bdev->driver->lru_removal)
236 bdev->driver->lru_removal(bo);
237
56fc3502
FC
238 put_count = ttm_bo_del_from_lru(bo);
239 ttm_bo_list_ref_sub(bo, put_count, true);
240 ttm_bo_add_to_lru(bo);
ab749618
CK
241}
242EXPORT_SYMBOL(ttm_bo_move_to_lru_tail);
243
98c2872a
CK
244struct list_head *ttm_bo_default_lru_tail(struct ttm_buffer_object *bo)
245{
246 return bo->bdev->man[bo->mem.mem_type].lru.prev;
247}
248EXPORT_SYMBOL(ttm_bo_default_lru_tail);
249
250struct list_head *ttm_bo_default_swap_lru_tail(struct ttm_buffer_object *bo)
251{
252 return bo->glob->swap_lru.prev;
253}
254EXPORT_SYMBOL(ttm_bo_default_swap_lru_tail);
255
ba4e7d97
TH
256/*
257 * Call bo->mutex locked.
258 */
ba4e7d97
TH
259static int ttm_bo_add_ttm(struct ttm_buffer_object *bo, bool zero_alloc)
260{
261 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 262 struct ttm_bo_global *glob = bo->glob;
ba4e7d97
TH
263 int ret = 0;
264 uint32_t page_flags = 0;
265
266 TTM_ASSERT_LOCKED(&bo->mutex);
267 bo->ttm = NULL;
268
ad49f501
DA
269 if (bdev->need_dma32)
270 page_flags |= TTM_PAGE_FLAG_DMA32;
271
ba4e7d97
TH
272 switch (bo->type) {
273 case ttm_bo_type_device:
274 if (zero_alloc)
275 page_flags |= TTM_PAGE_FLAG_ZERO_ALLOC;
276 case ttm_bo_type_kernel:
649bf3ca
JG
277 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
278 page_flags, glob->dummy_read_page);
ba4e7d97
TH
279 if (unlikely(bo->ttm == NULL))
280 ret = -ENOMEM;
281 break;
129b78bf
DA
282 case ttm_bo_type_sg:
283 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
284 page_flags | TTM_PAGE_FLAG_SG,
285 glob->dummy_read_page);
286 if (unlikely(bo->ttm == NULL)) {
287 ret = -ENOMEM;
288 break;
289 }
290 bo->ttm->sg = bo->sg;
291 break;
ba4e7d97 292 default:
25d0479a 293 pr_err("Illegal buffer object type\n");
ba4e7d97
TH
294 ret = -EINVAL;
295 break;
296 }
297
298 return ret;
299}
300
301static int ttm_bo_handle_move_mem(struct ttm_buffer_object *bo,
302 struct ttm_mem_reg *mem,
9d87fa21 303 bool evict, bool interruptible,
97a875cb 304 bool no_wait_gpu)
ba4e7d97
TH
305{
306 struct ttm_bo_device *bdev = bo->bdev;
307 bool old_is_pci = ttm_mem_reg_is_pci(bdev, &bo->mem);
308 bool new_is_pci = ttm_mem_reg_is_pci(bdev, mem);
309 struct ttm_mem_type_manager *old_man = &bdev->man[bo->mem.mem_type];
310 struct ttm_mem_type_manager *new_man = &bdev->man[mem->mem_type];
311 int ret = 0;
312
313 if (old_is_pci || new_is_pci ||
eba67093
TH
314 ((mem->placement & bo->mem.placement & TTM_PL_MASK_CACHING) == 0)) {
315 ret = ttm_mem_io_lock(old_man, true);
316 if (unlikely(ret != 0))
317 goto out_err;
318 ttm_bo_unmap_virtual_locked(bo);
319 ttm_mem_io_unlock(old_man);
320 }
ba4e7d97
TH
321
322 /*
323 * Create and bind a ttm if required.
324 */
325
8d3bb236
BS
326 if (!(new_man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
327 if (bo->ttm == NULL) {
ff02b13f
BS
328 bool zero = !(old_man->flags & TTM_MEMTYPE_FLAG_FIXED);
329 ret = ttm_bo_add_ttm(bo, zero);
8d3bb236
BS
330 if (ret)
331 goto out_err;
332 }
ba4e7d97
TH
333
334 ret = ttm_tt_set_placement_caching(bo->ttm, mem->placement);
335 if (ret)
87ef9209 336 goto out_err;
ba4e7d97
TH
337
338 if (mem->mem_type != TTM_PL_SYSTEM) {
339 ret = ttm_tt_bind(bo->ttm, mem);
340 if (ret)
341 goto out_err;
342 }
343
344 if (bo->mem.mem_type == TTM_PL_SYSTEM) {
82ef594e
BS
345 if (bdev->driver->move_notify)
346 bdev->driver->move_notify(bo, mem);
ca262a99 347 bo->mem = *mem;
ba4e7d97 348 mem->mm_node = NULL;
ba4e7d97
TH
349 goto moved;
350 }
ba4e7d97
TH
351 }
352
9f1feed2
BS
353 if (bdev->driver->move_notify)
354 bdev->driver->move_notify(bo, mem);
355
ba4e7d97
TH
356 if (!(old_man->flags & TTM_MEMTYPE_FLAG_FIXED) &&
357 !(new_man->flags & TTM_MEMTYPE_FLAG_FIXED))
97a875cb 358 ret = ttm_bo_move_ttm(bo, evict, no_wait_gpu, mem);
ba4e7d97
TH
359 else if (bdev->driver->move)
360 ret = bdev->driver->move(bo, evict, interruptible,
97a875cb 361 no_wait_gpu, mem);
ba4e7d97 362 else
97a875cb 363 ret = ttm_bo_move_memcpy(bo, evict, no_wait_gpu, mem);
ba4e7d97 364
9f1feed2
BS
365 if (ret) {
366 if (bdev->driver->move_notify) {
367 struct ttm_mem_reg tmp_mem = *mem;
368 *mem = bo->mem;
369 bo->mem = tmp_mem;
370 bdev->driver->move_notify(bo, mem);
371 bo->mem = *mem;
014b3440 372 *mem = tmp_mem;
9f1feed2 373 }
ba4e7d97 374
9f1feed2
BS
375 goto out_err;
376 }
dc97b340 377
ba4e7d97
TH
378moved:
379 if (bo->evicted) {
9ef7506f
RC
380 if (bdev->driver->invalidate_caches) {
381 ret = bdev->driver->invalidate_caches(bdev, bo->mem.placement);
382 if (ret)
383 pr_err("Can not flush read caches\n");
384 }
ba4e7d97
TH
385 bo->evicted = false;
386 }
387
388 if (bo->mem.mm_node) {
d961db75 389 bo->offset = (bo->mem.start << PAGE_SHIFT) +
ba4e7d97
TH
390 bdev->man[bo->mem.mem_type].gpu_offset;
391 bo->cur_placement = bo->mem.placement;
354fb52c
TH
392 } else
393 bo->offset = 0;
ba4e7d97
TH
394
395 return 0;
396
397out_err:
398 new_man = &bdev->man[bo->mem.mem_type];
399 if ((new_man->flags & TTM_MEMTYPE_FLAG_FIXED) && bo->ttm) {
400 ttm_tt_unbind(bo->ttm);
401 ttm_tt_destroy(bo->ttm);
402 bo->ttm = NULL;
403 }
404
405 return ret;
406}
407
1df6a2eb 408/**
40d857bb 409 * Call bo::reserved.
1df6a2eb 410 * Will release GPU memory type usage on destruction.
40d857bb
TH
411 * This is the place to put in driver specific hooks to release
412 * driver private resources.
413 * Will release the bo::reserved lock.
1df6a2eb
TH
414 */
415
416static void ttm_bo_cleanup_memtype_use(struct ttm_buffer_object *bo)
417{
dc97b340
JG
418 if (bo->bdev->driver->move_notify)
419 bo->bdev->driver->move_notify(bo, NULL);
420
1df6a2eb 421 if (bo->ttm) {
1df6a2eb
TH
422 ttm_tt_unbind(bo->ttm);
423 ttm_tt_destroy(bo->ttm);
424 bo->ttm = NULL;
1df6a2eb 425 }
40d857bb 426 ttm_bo_mem_put(bo, &bo->mem);
1df6a2eb 427
5e338405 428 ww_mutex_unlock (&bo->resv->lock);
1df6a2eb
TH
429}
430
f2c24b83
ML
431static void ttm_bo_flush_all_fences(struct ttm_buffer_object *bo)
432{
433 struct reservation_object_list *fobj;
434 struct fence *fence;
435 int i;
436
437 fobj = reservation_object_get_list(bo->resv);
438 fence = reservation_object_get_excl(bo->resv);
439 if (fence && !fence->ops->signaled)
440 fence_enable_sw_signaling(fence);
441
442 for (i = 0; fobj && i < fobj->shared_count; ++i) {
443 fence = rcu_dereference_protected(fobj->shared[i],
444 reservation_object_held(bo->resv));
445
446 if (!fence->ops->signaled)
447 fence_enable_sw_signaling(fence);
448 }
449}
450
e1efc9b6 451static void ttm_bo_cleanup_refs_or_queue(struct ttm_buffer_object *bo)
ba4e7d97
TH
452{
453 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 454 struct ttm_bo_global *glob = bo->glob;
e1efc9b6 455 int put_count;
ba4e7d97
TH
456 int ret;
457
4154f051 458 spin_lock(&glob->lru_lock);
dfd5e50e 459 ret = __ttm_bo_reserve(bo, false, true, NULL);
4154f051 460
dd7cfd64 461 if (!ret) {
8aa6d4fc 462 if (!ttm_bo_wait(bo, false, true)) {
dd7cfd64 463 put_count = ttm_bo_del_from_lru(bo);
ba4e7d97 464
dd7cfd64
ML
465 spin_unlock(&glob->lru_lock);
466 ttm_bo_cleanup_memtype_use(bo);
ba4e7d97 467
dd7cfd64 468 ttm_bo_list_ref_sub(bo, put_count, true);
4154f051 469
dd7cfd64 470 return;
f2c24b83
ML
471 } else
472 ttm_bo_flush_all_fences(bo);
15205fbc
TH
473
474 /*
475 * Make NO_EVICT bos immediately available to
476 * shrinkers, now that they are queued for
477 * destruction.
478 */
479 if (bo->mem.placement & TTM_PL_FLAG_NO_EVICT) {
480 bo->mem.placement &= ~TTM_PL_FLAG_NO_EVICT;
481 ttm_bo_add_to_lru(bo);
482 }
483
c7523083 484 __ttm_bo_unreserve(bo);
15205fbc 485 }
e1efc9b6
TH
486
487 kref_get(&bo->list_kref);
488 list_add_tail(&bo->ddestroy, &bdev->ddestroy);
489 spin_unlock(&glob->lru_lock);
e1efc9b6 490
e1efc9b6
TH
491 schedule_delayed_work(&bdev->wq,
492 ((HZ / 100) < 1) ? 1 : HZ / 100);
493}
494
495/**
85b144f8 496 * function ttm_bo_cleanup_refs_and_unlock
e1efc9b6
TH
497 * If bo idle, remove from delayed- and lru lists, and unref.
498 * If not idle, do nothing.
499 *
85b144f8
ML
500 * Must be called with lru_lock and reservation held, this function
501 * will drop both before returning.
502 *
e1efc9b6 503 * @interruptible Any sleeps should occur interruptibly.
e1efc9b6
TH
504 * @no_wait_gpu Never wait for gpu. Return -EBUSY instead.
505 */
506
85b144f8
ML
507static int ttm_bo_cleanup_refs_and_unlock(struct ttm_buffer_object *bo,
508 bool interruptible,
509 bool no_wait_gpu)
e1efc9b6
TH
510{
511 struct ttm_bo_global *glob = bo->glob;
512 int put_count;
85b144f8 513 int ret;
e1efc9b6 514
8aa6d4fc 515 ret = ttm_bo_wait(bo, false, true);
e1efc9b6 516
85b144f8 517 if (ret && !no_wait_gpu) {
472db7ab
ML
518 long lret;
519 ww_mutex_unlock(&bo->resv->lock);
520 spin_unlock(&glob->lru_lock);
521
522 lret = reservation_object_wait_timeout_rcu(bo->resv,
523 true,
524 interruptible,
525 30 * HZ);
526
527 if (lret < 0)
528 return lret;
529 else if (lret == 0)
530 return -EBUSY;
b8e902f2 531
85b144f8 532 spin_lock(&glob->lru_lock);
dfd5e50e 533 ret = __ttm_bo_reserve(bo, false, true, NULL);
b8e902f2 534
85b144f8
ML
535 /*
536 * We raced, and lost, someone else holds the reservation now,
537 * and is probably busy in ttm_bo_cleanup_memtype_use.
538 *
539 * Even if it's not the case, because we finished waiting any
540 * delayed destruction would succeed, so just return success
541 * here.
542 */
543 if (ret) {
544 spin_unlock(&glob->lru_lock);
545 return 0;
546 }
7040138f
ML
547
548 /*
549 * remove sync_obj with ttm_bo_wait, the wait should be
550 * finished, and no new wait object should have been added.
551 */
8aa6d4fc 552 ret = ttm_bo_wait(bo, false, true);
7040138f
ML
553 WARN_ON(ret);
554 }
ba4e7d97 555
85b144f8 556 if (ret || unlikely(list_empty(&bo->ddestroy))) {
c7523083 557 __ttm_bo_unreserve(bo);
a987fcaa 558 spin_unlock(&glob->lru_lock);
85b144f8 559 return ret;
ba4e7d97
TH
560 }
561
e1efc9b6
TH
562 put_count = ttm_bo_del_from_lru(bo);
563 list_del_init(&bo->ddestroy);
564 ++put_count;
565
566 spin_unlock(&glob->lru_lock);
567 ttm_bo_cleanup_memtype_use(bo);
568
d6ea8886 569 ttm_bo_list_ref_sub(bo, put_count, true);
e1efc9b6
TH
570
571 return 0;
ba4e7d97
TH
572}
573
574/**
575 * Traverse the delayed list, and call ttm_bo_cleanup_refs on all
576 * encountered buffers.
577 */
578
579static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all)
580{
a987fcaa 581 struct ttm_bo_global *glob = bdev->glob;
1a961ce0
LB
582 struct ttm_buffer_object *entry = NULL;
583 int ret = 0;
ba4e7d97 584
a987fcaa 585 spin_lock(&glob->lru_lock);
1a961ce0
LB
586 if (list_empty(&bdev->ddestroy))
587 goto out_unlock;
588
589 entry = list_first_entry(&bdev->ddestroy,
590 struct ttm_buffer_object, ddestroy);
591 kref_get(&entry->list_kref);
592
593 for (;;) {
594 struct ttm_buffer_object *nentry = NULL;
595
596 if (entry->ddestroy.next != &bdev->ddestroy) {
597 nentry = list_first_entry(&entry->ddestroy,
598 struct ttm_buffer_object, ddestroy);
ba4e7d97
TH
599 kref_get(&nentry->list_kref);
600 }
ba4e7d97 601
dfd5e50e 602 ret = __ttm_bo_reserve(entry, false, true, NULL);
63d0a419
ML
603 if (remove_all && ret) {
604 spin_unlock(&glob->lru_lock);
dfd5e50e 605 ret = __ttm_bo_reserve(entry, false, false, NULL);
63d0a419
ML
606 spin_lock(&glob->lru_lock);
607 }
608
85b144f8
ML
609 if (!ret)
610 ret = ttm_bo_cleanup_refs_and_unlock(entry, false,
611 !remove_all);
612 else
613 spin_unlock(&glob->lru_lock);
614
ba4e7d97 615 kref_put(&entry->list_kref, ttm_bo_release_list);
1a961ce0
LB
616 entry = nentry;
617
618 if (ret || !entry)
619 goto out;
ba4e7d97 620
a987fcaa 621 spin_lock(&glob->lru_lock);
1a961ce0 622 if (list_empty(&entry->ddestroy))
ba4e7d97
TH
623 break;
624 }
ba4e7d97 625
1a961ce0
LB
626out_unlock:
627 spin_unlock(&glob->lru_lock);
628out:
629 if (entry)
630 kref_put(&entry->list_kref, ttm_bo_release_list);
ba4e7d97
TH
631 return ret;
632}
633
634static void ttm_bo_delayed_workqueue(struct work_struct *work)
635{
636 struct ttm_bo_device *bdev =
637 container_of(work, struct ttm_bo_device, wq.work);
638
639 if (ttm_bo_delayed_delete(bdev, false)) {
640 schedule_delayed_work(&bdev->wq,
641 ((HZ / 100) < 1) ? 1 : HZ / 100);
642 }
643}
644
645static void ttm_bo_release(struct kref *kref)
646{
647 struct ttm_buffer_object *bo =
648 container_of(kref, struct ttm_buffer_object, kref);
649 struct ttm_bo_device *bdev = bo->bdev;
eba67093 650 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
ba4e7d97 651
72525b3f 652 drm_vma_offset_remove(&bdev->vma_manager, &bo->vma_node);
eba67093
TH
653 ttm_mem_io_lock(man, false);
654 ttm_mem_io_free_vm(bo);
655 ttm_mem_io_unlock(man);
e1efc9b6 656 ttm_bo_cleanup_refs_or_queue(bo);
ba4e7d97 657 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
658}
659
660void ttm_bo_unref(struct ttm_buffer_object **p_bo)
661{
662 struct ttm_buffer_object *bo = *p_bo;
ba4e7d97
TH
663
664 *p_bo = NULL;
ba4e7d97 665 kref_put(&bo->kref, ttm_bo_release);
ba4e7d97
TH
666}
667EXPORT_SYMBOL(ttm_bo_unref);
668
7c5ee536
MG
669int ttm_bo_lock_delayed_workqueue(struct ttm_bo_device *bdev)
670{
671 return cancel_delayed_work_sync(&bdev->wq);
672}
673EXPORT_SYMBOL(ttm_bo_lock_delayed_workqueue);
674
675void ttm_bo_unlock_delayed_workqueue(struct ttm_bo_device *bdev, int resched)
676{
677 if (resched)
678 schedule_delayed_work(&bdev->wq,
679 ((HZ / 100) < 1) ? 1 : HZ / 100);
680}
681EXPORT_SYMBOL(ttm_bo_unlock_delayed_workqueue);
682
ca262a99 683static int ttm_bo_evict(struct ttm_buffer_object *bo, bool interruptible,
97a875cb 684 bool no_wait_gpu)
ba4e7d97 685{
ba4e7d97
TH
686 struct ttm_bo_device *bdev = bo->bdev;
687 struct ttm_mem_reg evict_mem;
ca262a99
JG
688 struct ttm_placement placement;
689 int ret = 0;
ba4e7d97 690
8aa6d4fc 691 ret = ttm_bo_wait(bo, interruptible, no_wait_gpu);
ba4e7d97 692
78ecf091 693 if (unlikely(ret != 0)) {
98ffc415 694 if (ret != -ERESTARTSYS) {
25d0479a 695 pr_err("Failed to expire sync object before buffer eviction\n");
78ecf091 696 }
ba4e7d97
TH
697 goto out;
698 }
699
009a9dad 700 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
701
702 evict_mem = bo->mem;
703 evict_mem.mm_node = NULL;
eba67093
TH
704 evict_mem.bus.io_reserved_vm = false;
705 evict_mem.bus.io_reserved_count = 0;
ba4e7d97 706
7cb7d1d7
JG
707 placement.num_placement = 0;
708 placement.num_busy_placement = 0;
ca262a99
JG
709 bdev->driver->evict_flags(bo, &placement);
710 ret = ttm_bo_mem_space(bo, &placement, &evict_mem, interruptible,
97a875cb 711 no_wait_gpu);
ba4e7d97 712 if (ret) {
fb53f862 713 if (ret != -ERESTARTSYS) {
25d0479a
JP
714 pr_err("Failed to find memory space for buffer 0x%p eviction\n",
715 bo);
fb53f862
JG
716 ttm_bo_mem_space_debug(bo, &placement);
717 }
ba4e7d97
TH
718 goto out;
719 }
720
721 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true, interruptible,
97a875cb 722 no_wait_gpu);
ba4e7d97 723 if (ret) {
98ffc415 724 if (ret != -ERESTARTSYS)
25d0479a 725 pr_err("Buffer eviction failed\n");
42311ff9 726 ttm_bo_mem_put(bo, &evict_mem);
ba4e7d97
TH
727 goto out;
728 }
ca262a99
JG
729 bo->evicted = true;
730out:
731 return ret;
732}
733
734static int ttm_mem_evict_first(struct ttm_bo_device *bdev,
735 uint32_t mem_type,
e300180f 736 const struct ttm_place *place,
97a875cb 737 bool interruptible,
9d87fa21 738 bool no_wait_gpu)
ca262a99
JG
739{
740 struct ttm_bo_global *glob = bdev->glob;
741 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
742 struct ttm_buffer_object *bo;
e7ab2019 743 int ret = -EBUSY, put_count;
ba4e7d97 744
a987fcaa 745 spin_lock(&glob->lru_lock);
e7ab2019 746 list_for_each_entry(bo, &man->lru, lru) {
dfd5e50e 747 ret = __ttm_bo_reserve(bo, false, true, NULL);
e300180f
MD
748 if (!ret) {
749 if (place && (place->fpfn || place->lpfn)) {
750 /* Don't evict this BO if it's outside of the
751 * requested placement range
752 */
753 if (place->fpfn >= (bo->mem.start + bo->mem.size) ||
754 (place->lpfn && place->lpfn <= bo->mem.start)) {
755 __ttm_bo_unreserve(bo);
756 ret = -EBUSY;
757 continue;
758 }
759 }
760
e7ab2019 761 break;
e300180f 762 }
e7ab2019
ML
763 }
764
765 if (ret) {
9c51ba1d 766 spin_unlock(&glob->lru_lock);
e7ab2019 767 return ret;
9c51ba1d
TH
768 }
769
ca262a99 770 kref_get(&bo->list_kref);
9c51ba1d 771
e1efc9b6 772 if (!list_empty(&bo->ddestroy)) {
e7ab2019
ML
773 ret = ttm_bo_cleanup_refs_and_unlock(bo, interruptible,
774 no_wait_gpu);
e1efc9b6 775 kref_put(&bo->list_kref, ttm_bo_release_list);
b8e902f2 776 return ret;
e1efc9b6
TH
777 }
778
9c51ba1d 779 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 780 spin_unlock(&glob->lru_lock);
9c51ba1d
TH
781
782 BUG_ON(ret != 0);
783
d6ea8886 784 ttm_bo_list_ref_sub(bo, put_count, true);
9c51ba1d 785
97a875cb 786 ret = ttm_bo_evict(bo, interruptible, no_wait_gpu);
ca262a99 787 ttm_bo_unreserve(bo);
9c51ba1d 788
ca262a99 789 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
790 return ret;
791}
792
42311ff9
BS
793void ttm_bo_mem_put(struct ttm_buffer_object *bo, struct ttm_mem_reg *mem)
794{
d961db75 795 struct ttm_mem_type_manager *man = &bo->bdev->man[mem->mem_type];
42311ff9 796
d961db75
BS
797 if (mem->mm_node)
798 (*man->func->put_node)(man, mem);
42311ff9
BS
799}
800EXPORT_SYMBOL(ttm_bo_mem_put);
801
ba4e7d97
TH
802/**
803 * Repeatedly evict memory from the LRU for @mem_type until we create enough
804 * space, or we've evicted everything and there isn't enough space.
805 */
ca262a99
JG
806static int ttm_bo_mem_force_space(struct ttm_buffer_object *bo,
807 uint32_t mem_type,
f1217ed0 808 const struct ttm_place *place,
ca262a99 809 struct ttm_mem_reg *mem,
9d87fa21 810 bool interruptible,
9d87fa21 811 bool no_wait_gpu)
ba4e7d97 812{
ca262a99 813 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 814 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
ba4e7d97
TH
815 int ret;
816
ba4e7d97 817 do {
f1217ed0 818 ret = (*man->func->get_node)(man, bo, place, mem);
ca262a99
JG
819 if (unlikely(ret != 0))
820 return ret;
d961db75 821 if (mem->mm_node)
ba4e7d97 822 break;
e300180f 823 ret = ttm_mem_evict_first(bdev, mem_type, place,
97a875cb 824 interruptible, no_wait_gpu);
ba4e7d97
TH
825 if (unlikely(ret != 0))
826 return ret;
ba4e7d97 827 } while (1);
d961db75 828 if (mem->mm_node == NULL)
ba4e7d97 829 return -ENOMEM;
ba4e7d97
TH
830 mem->mem_type = mem_type;
831 return 0;
832}
833
ae3e8122
TH
834static uint32_t ttm_bo_select_caching(struct ttm_mem_type_manager *man,
835 uint32_t cur_placement,
836 uint32_t proposed_placement)
837{
838 uint32_t caching = proposed_placement & TTM_PL_MASK_CACHING;
839 uint32_t result = proposed_placement & ~TTM_PL_MASK_CACHING;
840
841 /**
842 * Keep current caching if possible.
843 */
844
845 if ((cur_placement & caching) != 0)
846 result |= (cur_placement & caching);
847 else if ((man->default_caching & caching) != 0)
848 result |= man->default_caching;
849 else if ((TTM_PL_FLAG_CACHED & caching) != 0)
850 result |= TTM_PL_FLAG_CACHED;
851 else if ((TTM_PL_FLAG_WC & caching) != 0)
852 result |= TTM_PL_FLAG_WC;
853 else if ((TTM_PL_FLAG_UNCACHED & caching) != 0)
854 result |= TTM_PL_FLAG_UNCACHED;
855
856 return result;
857}
858
ba4e7d97 859static bool ttm_bo_mt_compatible(struct ttm_mem_type_manager *man,
ba4e7d97 860 uint32_t mem_type,
f1217ed0 861 const struct ttm_place *place,
ae3e8122 862 uint32_t *masked_placement)
ba4e7d97
TH
863{
864 uint32_t cur_flags = ttm_bo_type_flags(mem_type);
865
f1217ed0 866 if ((cur_flags & place->flags & TTM_PL_MASK_MEM) == 0)
ba4e7d97
TH
867 return false;
868
f1217ed0 869 if ((place->flags & man->available_caching) == 0)
ba4e7d97 870 return false;
ba4e7d97 871
f1217ed0 872 cur_flags |= (place->flags & man->available_caching);
ae3e8122
TH
873
874 *masked_placement = cur_flags;
ba4e7d97
TH
875 return true;
876}
877
878/**
879 * Creates space for memory region @mem according to its type.
880 *
881 * This function first searches for free space in compatible memory types in
882 * the priority order defined by the driver. If free space isn't found, then
883 * ttm_bo_mem_force_space is attempted in priority order to evict and find
884 * space.
885 */
886int ttm_bo_mem_space(struct ttm_buffer_object *bo,
ca262a99
JG
887 struct ttm_placement *placement,
888 struct ttm_mem_reg *mem,
97a875cb 889 bool interruptible,
9d87fa21 890 bool no_wait_gpu)
ba4e7d97
TH
891{
892 struct ttm_bo_device *bdev = bo->bdev;
893 struct ttm_mem_type_manager *man;
ba4e7d97
TH
894 uint32_t mem_type = TTM_PL_SYSTEM;
895 uint32_t cur_flags = 0;
896 bool type_found = false;
897 bool type_ok = false;
98ffc415 898 bool has_erestartsys = false;
ca262a99 899 int i, ret;
ba4e7d97
TH
900
901 mem->mm_node = NULL;
b6637526 902 for (i = 0; i < placement->num_placement; ++i) {
f1217ed0
CK
903 const struct ttm_place *place = &placement->placement[i];
904
905 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
906 if (ret)
907 return ret;
ba4e7d97 908 man = &bdev->man[mem_type];
e30f3963
TH
909 if (!man->has_type || !man->use_type)
910 continue;
ba4e7d97 911
f1217ed0 912 type_ok = ttm_bo_mt_compatible(man, mem_type, place,
ca262a99 913 &cur_flags);
ba4e7d97
TH
914
915 if (!type_ok)
916 continue;
917
e30f3963 918 type_found = true;
ae3e8122
TH
919 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
920 cur_flags);
ca262a99
JG
921 /*
922 * Use the access and other non-mapping-related flag bits from
923 * the memory placement flags to the current flags
924 */
f1217ed0 925 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 926 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 927
ba4e7d97
TH
928 if (mem_type == TTM_PL_SYSTEM)
929 break;
930
e30f3963
TH
931 ret = (*man->func->get_node)(man, bo, place, mem);
932 if (unlikely(ret))
933 return ret;
934
d961db75 935 if (mem->mm_node)
ba4e7d97
TH
936 break;
937 }
938
d961db75 939 if ((type_ok && (mem_type == TTM_PL_SYSTEM)) || mem->mm_node) {
ba4e7d97
TH
940 mem->mem_type = mem_type;
941 mem->placement = cur_flags;
942 return 0;
943 }
944
b6637526 945 for (i = 0; i < placement->num_busy_placement; ++i) {
f1217ed0
CK
946 const struct ttm_place *place = &placement->busy_placement[i];
947
948 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
949 if (ret)
950 return ret;
ba4e7d97 951 man = &bdev->man[mem_type];
e30f3963 952 if (!man->has_type || !man->use_type)
ba4e7d97 953 continue;
f1217ed0 954 if (!ttm_bo_mt_compatible(man, mem_type, place, &cur_flags))
ba4e7d97
TH
955 continue;
956
e30f3963 957 type_found = true;
ae3e8122
TH
958 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
959 cur_flags);
ca262a99
JG
960 /*
961 * Use the access and other non-mapping-related flag bits from
962 * the memory placement flags to the current flags
963 */
f1217ed0 964 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 965 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 966
0eaddb28
TH
967 if (mem_type == TTM_PL_SYSTEM) {
968 mem->mem_type = mem_type;
969 mem->placement = cur_flags;
970 mem->mm_node = NULL;
971 return 0;
972 }
973
f1217ed0 974 ret = ttm_bo_mem_force_space(bo, mem_type, place, mem,
97a875cb 975 interruptible, no_wait_gpu);
ba4e7d97
TH
976 if (ret == 0 && mem->mm_node) {
977 mem->placement = cur_flags;
978 return 0;
979 }
98ffc415
TH
980 if (ret == -ERESTARTSYS)
981 has_erestartsys = true;
ba4e7d97 982 }
e30f3963
TH
983
984 if (!type_found) {
985 printk(KERN_ERR TTM_PFX "No compatible memory type found.\n");
986 return -EINVAL;
987 }
988
989 return (has_erestartsys) ? -ERESTARTSYS : -ENOMEM;
ba4e7d97
TH
990}
991EXPORT_SYMBOL(ttm_bo_mem_space);
992
6e87fa48 993static int ttm_bo_move_buffer(struct ttm_buffer_object *bo,
ca262a99 994 struct ttm_placement *placement,
97a875cb 995 bool interruptible,
9d87fa21 996 bool no_wait_gpu)
ba4e7d97 997{
ba4e7d97
TH
998 int ret = 0;
999 struct ttm_mem_reg mem;
1000
009a9dad 1001 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
1002
1003 /*
5ee7b41a
CK
1004 * Don't wait for the BO on initial allocation. This is important when
1005 * the BO has an imported reservation object.
ba4e7d97 1006 */
5ee7b41a
CK
1007 if (bo->mem.mem_type != TTM_PL_SYSTEM || bo->ttm != NULL) {
1008 /*
1009 * FIXME: It's possible to pipeline buffer moves.
1010 * Have the driver move function wait for idle when necessary,
1011 * instead of doing it here.
1012 */
8aa6d4fc 1013 ret = ttm_bo_wait(bo, interruptible, no_wait_gpu);
5ee7b41a
CK
1014 if (ret)
1015 return ret;
1016 }
ba4e7d97
TH
1017 mem.num_pages = bo->num_pages;
1018 mem.size = mem.num_pages << PAGE_SHIFT;
1019 mem.page_alignment = bo->mem.page_alignment;
eba67093
TH
1020 mem.bus.io_reserved_vm = false;
1021 mem.bus.io_reserved_count = 0;
ba4e7d97
TH
1022 /*
1023 * Determine where to move the buffer.
1024 */
97a875cb
ML
1025 ret = ttm_bo_mem_space(bo, placement, &mem,
1026 interruptible, no_wait_gpu);
ba4e7d97
TH
1027 if (ret)
1028 goto out_unlock;
97a875cb
ML
1029 ret = ttm_bo_handle_move_mem(bo, &mem, false,
1030 interruptible, no_wait_gpu);
ba4e7d97 1031out_unlock:
d961db75
BS
1032 if (ret && mem.mm_node)
1033 ttm_bo_mem_put(bo, &mem);
ba4e7d97
TH
1034 return ret;
1035}
1036
94477bff
SY
1037bool ttm_bo_mem_compat(struct ttm_placement *placement,
1038 struct ttm_mem_reg *mem,
1039 uint32_t *new_flags)
ba4e7d97 1040{
ca262a99 1041 int i;
e22238ea 1042
ca262a99 1043 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 1044 const struct ttm_place *heap = &placement->placement[i];
9ace2ef7 1045 if (mem->mm_node &&
f1217ed0 1046 (mem->start < heap->fpfn ||
9ace2ef7 1047 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1048 continue;
1049
1050 *new_flags = heap->flags;
59c8e663
TH
1051 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1052 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1053 return true;
1054 }
1055
1056 for (i = 0; i < placement->num_busy_placement; i++) {
f1217ed0 1057 const struct ttm_place *heap = &placement->busy_placement[i];
9ace2ef7 1058 if (mem->mm_node &&
f1217ed0 1059 (mem->start < heap->fpfn ||
9ace2ef7 1060 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1061 continue;
1062
1063 *new_flags = heap->flags;
59c8e663
TH
1064 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1065 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1066 return true;
ca262a99 1067 }
59c8e663
TH
1068
1069 return false;
ba4e7d97 1070}
94477bff 1071EXPORT_SYMBOL(ttm_bo_mem_compat);
ba4e7d97 1072
09855acb
JG
1073int ttm_bo_validate(struct ttm_buffer_object *bo,
1074 struct ttm_placement *placement,
97a875cb 1075 bool interruptible,
9d87fa21 1076 bool no_wait_gpu)
ba4e7d97
TH
1077{
1078 int ret;
59c8e663 1079 uint32_t new_flags;
ba4e7d97 1080
009a9dad 1081 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
1082 /*
1083 * Check whether we need to move buffer.
1084 */
59c8e663 1085 if (!ttm_bo_mem_compat(placement, &bo->mem, &new_flags)) {
97a875cb
ML
1086 ret = ttm_bo_move_buffer(bo, placement, interruptible,
1087 no_wait_gpu);
ca262a99 1088 if (ret)
ba4e7d97 1089 return ret;
ca262a99
JG
1090 } else {
1091 /*
1092 * Use the access and other non-mapping-related flag bits from
1093 * the compatible memory placement flags to the active flags
1094 */
59c8e663 1095 ttm_flag_masked(&bo->mem.placement, new_flags,
ca262a99 1096 ~TTM_PL_MASK_MEMTYPE);
ba4e7d97 1097 }
ba4e7d97
TH
1098 /*
1099 * We might need to add a TTM.
1100 */
ba4e7d97
TH
1101 if (bo->mem.mem_type == TTM_PL_SYSTEM && bo->ttm == NULL) {
1102 ret = ttm_bo_add_ttm(bo, true);
1103 if (ret)
1104 return ret;
1105 }
ba4e7d97
TH
1106 return 0;
1107}
09855acb 1108EXPORT_SYMBOL(ttm_bo_validate);
ba4e7d97 1109
09855acb
JG
1110int ttm_bo_init(struct ttm_bo_device *bdev,
1111 struct ttm_buffer_object *bo,
1112 unsigned long size,
1113 enum ttm_bo_type type,
1114 struct ttm_placement *placement,
1115 uint32_t page_alignment,
09855acb 1116 bool interruptible,
5df23979 1117 struct file *persistent_swap_storage,
09855acb 1118 size_t acc_size,
129b78bf 1119 struct sg_table *sg,
f4f4e3e3 1120 struct reservation_object *resv,
09855acb 1121 void (*destroy) (struct ttm_buffer_object *))
ba4e7d97 1122{
09855acb 1123 int ret = 0;
ba4e7d97 1124 unsigned long num_pages;
57de4ba9 1125 struct ttm_mem_global *mem_glob = bdev->glob->mem_glob;
5e338405 1126 bool locked;
57de4ba9
JG
1127
1128 ret = ttm_mem_global_alloc(mem_glob, acc_size, false, false);
1129 if (ret) {
25d0479a 1130 pr_err("Out of kernel memory\n");
57de4ba9
JG
1131 if (destroy)
1132 (*destroy)(bo);
1133 else
1134 kfree(bo);
1135 return -ENOMEM;
1136 }
ba4e7d97 1137
ba4e7d97
TH
1138 num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
1139 if (num_pages == 0) {
25d0479a 1140 pr_err("Illegal buffer object size\n");
7dfbbdcf
TH
1141 if (destroy)
1142 (*destroy)(bo);
1143 else
1144 kfree(bo);
a393c730 1145 ttm_mem_global_free(mem_glob, acc_size);
ba4e7d97
TH
1146 return -EINVAL;
1147 }
1148 bo->destroy = destroy;
1149
ba4e7d97
TH
1150 kref_init(&bo->kref);
1151 kref_init(&bo->list_kref);
1152 atomic_set(&bo->cpu_writers, 0);
ba4e7d97
TH
1153 INIT_LIST_HEAD(&bo->lru);
1154 INIT_LIST_HEAD(&bo->ddestroy);
1155 INIT_LIST_HEAD(&bo->swap);
eba67093 1156 INIT_LIST_HEAD(&bo->io_reserve_lru);
c58f009e 1157 mutex_init(&bo->wu_mutex);
ba4e7d97 1158 bo->bdev = bdev;
a987fcaa 1159 bo->glob = bdev->glob;
ba4e7d97
TH
1160 bo->type = type;
1161 bo->num_pages = num_pages;
eb6d2c39 1162 bo->mem.size = num_pages << PAGE_SHIFT;
ba4e7d97
TH
1163 bo->mem.mem_type = TTM_PL_SYSTEM;
1164 bo->mem.num_pages = bo->num_pages;
1165 bo->mem.mm_node = NULL;
1166 bo->mem.page_alignment = page_alignment;
eba67093
TH
1167 bo->mem.bus.io_reserved_vm = false;
1168 bo->mem.bus.io_reserved_count = 0;
ba4e7d97
TH
1169 bo->priv_flags = 0;
1170 bo->mem.placement = (TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED);
5df23979 1171 bo->persistent_swap_storage = persistent_swap_storage;
ba4e7d97 1172 bo->acc_size = acc_size;
129b78bf 1173 bo->sg = sg;
f4f4e3e3
ML
1174 if (resv) {
1175 bo->resv = resv;
1176 lockdep_assert_held(&bo->resv->lock.base);
1177 } else {
1178 bo->resv = &bo->ttm_resv;
1179 reservation_object_init(&bo->ttm_resv);
1180 }
a987fcaa 1181 atomic_inc(&bo->glob->bo_count);
72525b3f 1182 drm_vma_node_reset(&bo->vma_node);
ba4e7d97 1183
ba4e7d97
TH
1184 /*
1185 * For ttm_bo_type_device buffers, allocate
1186 * address space from the device.
1187 */
f1217ed0
CK
1188 if (bo->type == ttm_bo_type_device ||
1189 bo->type == ttm_bo_type_sg)
abf19035
DH
1190 ret = drm_vma_offset_add(&bdev->vma_manager, &bo->vma_node,
1191 bo->mem.num_pages);
ba4e7d97 1192
f4f4e3e3
ML
1193 /* passed reservation objects should already be locked,
1194 * since otherwise lockdep will be angered in radeon.
1195 */
1196 if (!resv) {
1197 locked = ww_mutex_trylock(&bo->resv->lock);
1198 WARN_ON(!locked);
1199 }
ba4e7d97 1200
5e338405
ML
1201 if (likely(!ret))
1202 ret = ttm_bo_validate(bo, placement, interruptible, false);
ba4e7d97 1203
33d48cf8 1204 if (!resv) {
f4f4e3e3 1205 ttm_bo_unreserve(bo);
5e338405 1206
33d48cf8
CK
1207 } else if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
1208 spin_lock(&bo->glob->lru_lock);
1209 ttm_bo_add_to_lru(bo);
1210 spin_unlock(&bo->glob->lru_lock);
1211 }
1212
5e338405
ML
1213 if (unlikely(ret))
1214 ttm_bo_unref(&bo);
ba4e7d97
TH
1215
1216 return ret;
1217}
09855acb 1218EXPORT_SYMBOL(ttm_bo_init);
ba4e7d97 1219
57de4ba9
JG
1220size_t ttm_bo_acc_size(struct ttm_bo_device *bdev,
1221 unsigned long bo_size,
1222 unsigned struct_size)
ba4e7d97 1223{
57de4ba9
JG
1224 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1225 size_t size = 0;
ba4e7d97 1226
57de4ba9 1227 size += ttm_round_pot(struct_size);
85621630 1228 size += ttm_round_pot(npages * sizeof(void *));
57de4ba9
JG
1229 size += ttm_round_pot(sizeof(struct ttm_tt));
1230 return size;
ba4e7d97 1231}
57de4ba9
JG
1232EXPORT_SYMBOL(ttm_bo_acc_size);
1233
1234size_t ttm_bo_dma_acc_size(struct ttm_bo_device *bdev,
1235 unsigned long bo_size,
1236 unsigned struct_size)
1237{
1238 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1239 size_t size = 0;
1240
1241 size += ttm_round_pot(struct_size);
85621630 1242 size += ttm_round_pot(npages * (2*sizeof(void *) + sizeof(dma_addr_t)));
57de4ba9
JG
1243 size += ttm_round_pot(sizeof(struct ttm_dma_tt));
1244 return size;
1245}
1246EXPORT_SYMBOL(ttm_bo_dma_acc_size);
ba4e7d97 1247
09855acb
JG
1248int ttm_bo_create(struct ttm_bo_device *bdev,
1249 unsigned long size,
1250 enum ttm_bo_type type,
1251 struct ttm_placement *placement,
1252 uint32_t page_alignment,
09855acb 1253 bool interruptible,
5df23979 1254 struct file *persistent_swap_storage,
09855acb 1255 struct ttm_buffer_object **p_bo)
ba4e7d97
TH
1256{
1257 struct ttm_buffer_object *bo;
57de4ba9 1258 size_t acc_size;
ca262a99 1259 int ret;
ba4e7d97 1260
ba4e7d97 1261 bo = kzalloc(sizeof(*bo), GFP_KERNEL);
a393c730 1262 if (unlikely(bo == NULL))
ba4e7d97 1263 return -ENOMEM;
ba4e7d97 1264
a393c730 1265 acc_size = ttm_bo_acc_size(bdev, size, sizeof(struct ttm_buffer_object));
09855acb 1266 ret = ttm_bo_init(bdev, bo, size, type, placement, page_alignment,
0b91c4a1 1267 interruptible, persistent_swap_storage, acc_size,
f4f4e3e3 1268 NULL, NULL, NULL);
ba4e7d97
TH
1269 if (likely(ret == 0))
1270 *p_bo = bo;
1271
1272 return ret;
1273}
4d798937 1274EXPORT_SYMBOL(ttm_bo_create);
ba4e7d97 1275
ba4e7d97 1276static int ttm_bo_force_list_clean(struct ttm_bo_device *bdev,
ca262a99 1277 unsigned mem_type, bool allow_errors)
ba4e7d97 1278{
ca262a99 1279 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
a987fcaa 1280 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97 1281 int ret;
ba4e7d97
TH
1282
1283 /*
1284 * Can't use standard list traversal since we're unlocking.
1285 */
1286
a987fcaa 1287 spin_lock(&glob->lru_lock);
ca262a99 1288 while (!list_empty(&man->lru)) {
a987fcaa 1289 spin_unlock(&glob->lru_lock);
e300180f 1290 ret = ttm_mem_evict_first(bdev, mem_type, NULL, false, false);
ca262a99
JG
1291 if (ret) {
1292 if (allow_errors) {
1293 return ret;
1294 } else {
25d0479a 1295 pr_err("Cleanup eviction failed\n");
ca262a99
JG
1296 }
1297 }
a987fcaa 1298 spin_lock(&glob->lru_lock);
ba4e7d97 1299 }
a987fcaa 1300 spin_unlock(&glob->lru_lock);
ba4e7d97
TH
1301 return 0;
1302}
1303
1304int ttm_bo_clean_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1305{
c96e7c7a 1306 struct ttm_mem_type_manager *man;
ba4e7d97
TH
1307 int ret = -EINVAL;
1308
1309 if (mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1310 pr_err("Illegal memory type %d\n", mem_type);
ba4e7d97
TH
1311 return ret;
1312 }
c96e7c7a 1313 man = &bdev->man[mem_type];
ba4e7d97
TH
1314
1315 if (!man->has_type) {
25d0479a
JP
1316 pr_err("Trying to take down uninitialized memory manager type %u\n",
1317 mem_type);
ba4e7d97
TH
1318 return ret;
1319 }
1320
1321 man->use_type = false;
1322 man->has_type = false;
1323
1324 ret = 0;
1325 if (mem_type > 0) {
ca262a99 1326 ttm_bo_force_list_clean(bdev, mem_type, false);
ba4e7d97 1327
d961db75 1328 ret = (*man->func->takedown)(man);
ba4e7d97
TH
1329 }
1330
1331 return ret;
1332}
1333EXPORT_SYMBOL(ttm_bo_clean_mm);
1334
1335int ttm_bo_evict_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1336{
1337 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
1338
1339 if (mem_type == 0 || mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1340 pr_err("Illegal memory manager memory type %u\n", mem_type);
ba4e7d97
TH
1341 return -EINVAL;
1342 }
1343
1344 if (!man->has_type) {
25d0479a 1345 pr_err("Memory type %u has not been initialized\n", mem_type);
ba4e7d97
TH
1346 return 0;
1347 }
1348
ca262a99 1349 return ttm_bo_force_list_clean(bdev, mem_type, true);
ba4e7d97
TH
1350}
1351EXPORT_SYMBOL(ttm_bo_evict_mm);
1352
1353int ttm_bo_init_mm(struct ttm_bo_device *bdev, unsigned type,
ca262a99 1354 unsigned long p_size)
ba4e7d97
TH
1355{
1356 int ret = -EINVAL;
1357 struct ttm_mem_type_manager *man;
1358
dbc4a5b8 1359 BUG_ON(type >= TTM_NUM_MEM_TYPES);
ba4e7d97 1360 man = &bdev->man[type];
dbc4a5b8 1361 BUG_ON(man->has_type);
eba67093
TH
1362 man->io_reserve_fastpath = true;
1363 man->use_io_reserve_lru = false;
1364 mutex_init(&man->io_reserve_mutex);
1365 INIT_LIST_HEAD(&man->io_reserve_lru);
ba4e7d97
TH
1366
1367 ret = bdev->driver->init_mem_type(bdev, type, man);
1368 if (ret)
1369 return ret;
d961db75 1370 man->bdev = bdev;
ba4e7d97
TH
1371
1372 ret = 0;
1373 if (type != TTM_PL_SYSTEM) {
d961db75 1374 ret = (*man->func->init)(man, p_size);
ba4e7d97
TH
1375 if (ret)
1376 return ret;
1377 }
1378 man->has_type = true;
1379 man->use_type = true;
1380 man->size = p_size;
1381
1382 INIT_LIST_HEAD(&man->lru);
1383
1384 return 0;
1385}
1386EXPORT_SYMBOL(ttm_bo_init_mm);
1387
a987fcaa
TH
1388static void ttm_bo_global_kobj_release(struct kobject *kobj)
1389{
1390 struct ttm_bo_global *glob =
1391 container_of(kobj, struct ttm_bo_global, kobj);
1392
a987fcaa
TH
1393 ttm_mem_unregister_shrink(glob->mem_glob, &glob->shrink);
1394 __free_page(glob->dummy_read_page);
1395 kfree(glob);
1396}
1397
ba4420c2 1398void ttm_bo_global_release(struct drm_global_reference *ref)
a987fcaa
TH
1399{
1400 struct ttm_bo_global *glob = ref->object;
1401
1402 kobject_del(&glob->kobj);
1403 kobject_put(&glob->kobj);
1404}
1405EXPORT_SYMBOL(ttm_bo_global_release);
1406
ba4420c2 1407int ttm_bo_global_init(struct drm_global_reference *ref)
a987fcaa
TH
1408{
1409 struct ttm_bo_global_ref *bo_ref =
1410 container_of(ref, struct ttm_bo_global_ref, ref);
1411 struct ttm_bo_global *glob = ref->object;
1412 int ret;
1413
1414 mutex_init(&glob->device_list_mutex);
1415 spin_lock_init(&glob->lru_lock);
1416 glob->mem_glob = bo_ref->mem_glob;
1417 glob->dummy_read_page = alloc_page(__GFP_ZERO | GFP_DMA32);
1418
1419 if (unlikely(glob->dummy_read_page == NULL)) {
1420 ret = -ENOMEM;
1421 goto out_no_drp;
1422 }
1423
1424 INIT_LIST_HEAD(&glob->swap_lru);
1425 INIT_LIST_HEAD(&glob->device_list);
1426
1427 ttm_mem_init_shrink(&glob->shrink, ttm_bo_swapout);
1428 ret = ttm_mem_register_shrink(glob->mem_glob, &glob->shrink);
1429 if (unlikely(ret != 0)) {
25d0479a 1430 pr_err("Could not register buffer object swapout\n");
a987fcaa
TH
1431 goto out_no_shrink;
1432 }
1433
a987fcaa
TH
1434 atomic_set(&glob->bo_count, 0);
1435
b642ed06
RD
1436 ret = kobject_init_and_add(
1437 &glob->kobj, &ttm_bo_glob_kobj_type, ttm_get_kobj(), "buffer_objects");
a987fcaa
TH
1438 if (unlikely(ret != 0))
1439 kobject_put(&glob->kobj);
1440 return ret;
1441out_no_shrink:
1442 __free_page(glob->dummy_read_page);
1443out_no_drp:
1444 kfree(glob);
1445 return ret;
1446}
1447EXPORT_SYMBOL(ttm_bo_global_init);
1448
1449
ba4e7d97
TH
1450int ttm_bo_device_release(struct ttm_bo_device *bdev)
1451{
1452 int ret = 0;
1453 unsigned i = TTM_NUM_MEM_TYPES;
1454 struct ttm_mem_type_manager *man;
a987fcaa 1455 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97
TH
1456
1457 while (i--) {
1458 man = &bdev->man[i];
1459 if (man->has_type) {
1460 man->use_type = false;
1461 if ((i != TTM_PL_SYSTEM) && ttm_bo_clean_mm(bdev, i)) {
1462 ret = -EBUSY;
25d0479a
JP
1463 pr_err("DRM memory manager type %d is not clean\n",
1464 i);
ba4e7d97
TH
1465 }
1466 man->has_type = false;
1467 }
1468 }
1469
a987fcaa
TH
1470 mutex_lock(&glob->device_list_mutex);
1471 list_del(&bdev->device_list);
1472 mutex_unlock(&glob->device_list_mutex);
1473
f094cfc6 1474 cancel_delayed_work_sync(&bdev->wq);
ba4e7d97
TH
1475
1476 while (ttm_bo_delayed_delete(bdev, true))
1477 ;
1478
a987fcaa 1479 spin_lock(&glob->lru_lock);
ba4e7d97
TH
1480 if (list_empty(&bdev->ddestroy))
1481 TTM_DEBUG("Delayed destroy list was clean\n");
1482
1483 if (list_empty(&bdev->man[0].lru))
1484 TTM_DEBUG("Swap list was clean\n");
a987fcaa 1485 spin_unlock(&glob->lru_lock);
ba4e7d97 1486
72525b3f 1487 drm_vma_offset_manager_destroy(&bdev->vma_manager);
ba4e7d97 1488
ba4e7d97
TH
1489 return ret;
1490}
1491EXPORT_SYMBOL(ttm_bo_device_release);
1492
ba4e7d97 1493int ttm_bo_device_init(struct ttm_bo_device *bdev,
a987fcaa
TH
1494 struct ttm_bo_global *glob,
1495 struct ttm_bo_driver *driver,
44d847b7 1496 struct address_space *mapping,
51c8b407 1497 uint64_t file_page_offset,
ad49f501 1498 bool need_dma32)
ba4e7d97
TH
1499{
1500 int ret = -EINVAL;
1501
ba4e7d97 1502 bdev->driver = driver;
ba4e7d97
TH
1503
1504 memset(bdev->man, 0, sizeof(bdev->man));
1505
ba4e7d97
TH
1506 /*
1507 * Initialize the system memory buffer type.
1508 * Other types need to be driver / IOCTL initialized.
1509 */
ca262a99 1510 ret = ttm_bo_init_mm(bdev, TTM_PL_SYSTEM, 0);
ba4e7d97 1511 if (unlikely(ret != 0))
a987fcaa 1512 goto out_no_sys;
ba4e7d97 1513
72525b3f
DH
1514 drm_vma_offset_manager_init(&bdev->vma_manager, file_page_offset,
1515 0x10000000);
ba4e7d97 1516 INIT_DELAYED_WORK(&bdev->wq, ttm_bo_delayed_workqueue);
ba4e7d97 1517 INIT_LIST_HEAD(&bdev->ddestroy);
44d847b7 1518 bdev->dev_mapping = mapping;
a987fcaa 1519 bdev->glob = glob;
ad49f501 1520 bdev->need_dma32 = need_dma32;
a987fcaa
TH
1521 mutex_lock(&glob->device_list_mutex);
1522 list_add_tail(&bdev->device_list, &glob->device_list);
1523 mutex_unlock(&glob->device_list_mutex);
ba4e7d97
TH
1524
1525 return 0;
a987fcaa 1526out_no_sys:
ba4e7d97
TH
1527 return ret;
1528}
1529EXPORT_SYMBOL(ttm_bo_device_init);
1530
1531/*
1532 * buffer object vm functions.
1533 */
1534
1535bool ttm_mem_reg_is_pci(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
1536{
1537 struct ttm_mem_type_manager *man = &bdev->man[mem->mem_type];
1538
1539 if (!(man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
1540 if (mem->mem_type == TTM_PL_SYSTEM)
1541 return false;
1542
1543 if (man->flags & TTM_MEMTYPE_FLAG_CMA)
1544 return false;
1545
1546 if (mem->placement & TTM_PL_FLAG_CACHED)
1547 return false;
1548 }
1549 return true;
1550}
1551
eba67093 1552void ttm_bo_unmap_virtual_locked(struct ttm_buffer_object *bo)
ba4e7d97
TH
1553{
1554 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 1555
51335df9 1556 drm_vma_node_unmap(&bo->vma_node, bdev->dev_mapping);
eba67093 1557 ttm_mem_io_free_vm(bo);
ba4e7d97 1558}
eba67093
TH
1559
1560void ttm_bo_unmap_virtual(struct ttm_buffer_object *bo)
1561{
1562 struct ttm_bo_device *bdev = bo->bdev;
1563 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
1564
1565 ttm_mem_io_lock(man, false);
1566 ttm_bo_unmap_virtual_locked(bo);
1567 ttm_mem_io_unlock(man);
ba4e7d97 1568}
eba67093
TH
1569
1570
e024e110 1571EXPORT_SYMBOL(ttm_bo_unmap_virtual);
ba4e7d97 1572
ba4e7d97 1573int ttm_bo_wait(struct ttm_buffer_object *bo,
8aa6d4fc 1574 bool interruptible, bool no_wait)
ba4e7d97 1575{
f2c24b83
ML
1576 struct reservation_object_list *fobj;
1577 struct reservation_object *resv;
1578 struct fence *excl;
1579 long timeout = 15 * HZ;
1580 int i;
7040138f 1581
f2c24b83
ML
1582 resv = bo->resv;
1583 fobj = reservation_object_get_list(resv);
1584 excl = reservation_object_get_excl(resv);
1585 if (excl) {
1586 if (!fence_is_signaled(excl)) {
1587 if (no_wait)
1588 return -EBUSY;
ba4e7d97 1589
f2c24b83
ML
1590 timeout = fence_wait_timeout(excl,
1591 interruptible, timeout);
ba4e7d97 1592 }
f2c24b83 1593 }
ba4e7d97 1594
f2c24b83
ML
1595 for (i = 0; fobj && timeout > 0 && i < fobj->shared_count; ++i) {
1596 struct fence *fence;
1597 fence = rcu_dereference_protected(fobj->shared[i],
1598 reservation_object_held(resv));
ba4e7d97 1599
f2c24b83
ML
1600 if (!fence_is_signaled(fence)) {
1601 if (no_wait)
1602 return -EBUSY;
dd7cfd64 1603
f2c24b83
ML
1604 timeout = fence_wait_timeout(fence,
1605 interruptible, timeout);
ba4e7d97
TH
1606 }
1607 }
f2c24b83
ML
1608
1609 if (timeout < 0)
1610 return timeout;
1611
1612 if (timeout == 0)
1613 return -EBUSY;
1614
1615 reservation_object_add_excl_fence(resv, NULL);
1616 clear_bit(TTM_BO_PRIV_FLAG_MOVING, &bo->priv_flags);
1617 return 0;
ba4e7d97
TH
1618}
1619EXPORT_SYMBOL(ttm_bo_wait);
1620
ba4e7d97
TH
1621int ttm_bo_synccpu_write_grab(struct ttm_buffer_object *bo, bool no_wait)
1622{
1623 int ret = 0;
1624
1625 /*
8cfe92d6 1626 * Using ttm_bo_reserve makes sure the lru lists are updated.
ba4e7d97
TH
1627 */
1628
dfd5e50e 1629 ret = ttm_bo_reserve(bo, true, no_wait, NULL);
ba4e7d97
TH
1630 if (unlikely(ret != 0))
1631 return ret;
8aa6d4fc 1632 ret = ttm_bo_wait(bo, true, no_wait);
ba4e7d97
TH
1633 if (likely(ret == 0))
1634 atomic_inc(&bo->cpu_writers);
1635 ttm_bo_unreserve(bo);
1636 return ret;
1637}
d1ede145 1638EXPORT_SYMBOL(ttm_bo_synccpu_write_grab);
ba4e7d97
TH
1639
1640void ttm_bo_synccpu_write_release(struct ttm_buffer_object *bo)
1641{
654aa792 1642 atomic_dec(&bo->cpu_writers);
ba4e7d97 1643}
d1ede145 1644EXPORT_SYMBOL(ttm_bo_synccpu_write_release);
ba4e7d97
TH
1645
1646/**
1647 * A buffer object shrink method that tries to swap out the first
1648 * buffer object on the bo_global::swap_lru list.
1649 */
1650
1651static int ttm_bo_swapout(struct ttm_mem_shrink *shrink)
1652{
a987fcaa
TH
1653 struct ttm_bo_global *glob =
1654 container_of(shrink, struct ttm_bo_global, shrink);
ba4e7d97
TH
1655 struct ttm_buffer_object *bo;
1656 int ret = -EBUSY;
1657 int put_count;
1658 uint32_t swap_placement = (TTM_PL_FLAG_CACHED | TTM_PL_FLAG_SYSTEM);
1659
a987fcaa 1660 spin_lock(&glob->lru_lock);
2b7b3ad2 1661 list_for_each_entry(bo, &glob->swap_lru, swap) {
dfd5e50e 1662 ret = __ttm_bo_reserve(bo, false, true, NULL);
2b7b3ad2
ML
1663 if (!ret)
1664 break;
1665 }
85b144f8 1666
2b7b3ad2
ML
1667 if (ret) {
1668 spin_unlock(&glob->lru_lock);
1669 return ret;
1670 }
e1efc9b6 1671
2b7b3ad2 1672 kref_get(&bo->list_kref);
ba4e7d97 1673
2b7b3ad2
ML
1674 if (!list_empty(&bo->ddestroy)) {
1675 ret = ttm_bo_cleanup_refs_and_unlock(bo, false, false);
1676 kref_put(&bo->list_kref, ttm_bo_release_list);
1677 return ret;
ba4e7d97
TH
1678 }
1679
ba4e7d97 1680 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 1681 spin_unlock(&glob->lru_lock);
ba4e7d97 1682
d6ea8886 1683 ttm_bo_list_ref_sub(bo, put_count, true);
ba4e7d97
TH
1684
1685 /**
1686 * Wait for GPU, then move to system cached.
1687 */
1688
8aa6d4fc 1689 ret = ttm_bo_wait(bo, false, false);
ba4e7d97
TH
1690
1691 if (unlikely(ret != 0))
1692 goto out;
1693
1694 if ((bo->mem.placement & swap_placement) != swap_placement) {
1695 struct ttm_mem_reg evict_mem;
1696
1697 evict_mem = bo->mem;
1698 evict_mem.mm_node = NULL;
1699 evict_mem.placement = TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED;
1700 evict_mem.mem_type = TTM_PL_SYSTEM;
1701
1702 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true,
97a875cb 1703 false, false);
ba4e7d97
TH
1704 if (unlikely(ret != 0))
1705 goto out;
1706 }
1707
1708 ttm_bo_unmap_virtual(bo);
1709
1710 /**
1711 * Swap out. Buffer will be swapped in again as soon as
1712 * anyone tries to access a ttm page.
1713 */
1714
3f09ea4e
TH
1715 if (bo->bdev->driver->swap_notify)
1716 bo->bdev->driver->swap_notify(bo);
1717
5df23979 1718 ret = ttm_tt_swapout(bo->ttm, bo->persistent_swap_storage);
ba4e7d97
TH
1719out:
1720
1721 /**
1722 *
1723 * Unreserve without putting on LRU to avoid swapping out an
1724 * already swapped buffer.
1725 */
1726
c7523083 1727 __ttm_bo_unreserve(bo);
ba4e7d97
TH
1728 kref_put(&bo->list_kref, ttm_bo_release_list);
1729 return ret;
1730}
1731
1732void ttm_bo_swapout_all(struct ttm_bo_device *bdev)
1733{
a987fcaa 1734 while (ttm_bo_swapout(&bdev->glob->shrink) == 0)
ba4e7d97
TH
1735 ;
1736}
e99e1e78 1737EXPORT_SYMBOL(ttm_bo_swapout_all);
c58f009e
TH
1738
1739/**
1740 * ttm_bo_wait_unreserved - interruptible wait for a buffer object to become
1741 * unreserved
1742 *
1743 * @bo: Pointer to buffer
1744 */
1745int ttm_bo_wait_unreserved(struct ttm_buffer_object *bo)
1746{
1747 int ret;
1748
1749 /*
1750 * In the absense of a wait_unlocked API,
1751 * Use the bo::wu_mutex to avoid triggering livelocks due to
1752 * concurrent use of this function. Note that this use of
1753 * bo::wu_mutex can go away if we change locking order to
1754 * mmap_sem -> bo::reserve.
1755 */
1756 ret = mutex_lock_interruptible(&bo->wu_mutex);
1757 if (unlikely(ret != 0))
1758 return -ERESTARTSYS;
1759 if (!ww_mutex_is_locked(&bo->resv->lock))
1760 goto out_unlock;
dfd5e50e 1761 ret = __ttm_bo_reserve(bo, true, false, NULL);
c58f009e
TH
1762 if (unlikely(ret != 0))
1763 goto out_unlock;
c7523083 1764 __ttm_bo_unreserve(bo);
c58f009e
TH
1765
1766out_unlock:
1767 mutex_unlock(&bo->wu_mutex);
1768 return ret;
1769}