]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/gpu/drm/ttm/ttm_bo.c
drm/ttm: remove TTM_BO_PRIV_FLAG_MOVING
[mirror_ubuntu-artful-kernel.git] / drivers / gpu / drm / ttm / ttm_bo.c
CommitLineData
ba4e7d97
TH
1/**************************************************************************
2 *
3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27/*
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
29 */
30
25d0479a
JP
31#define pr_fmt(fmt) "[TTM] " fmt
32
760285e7
DH
33#include <drm/ttm/ttm_module.h>
34#include <drm/ttm/ttm_bo_driver.h>
35#include <drm/ttm/ttm_placement.h>
ba4e7d97
TH
36#include <linux/jiffies.h>
37#include <linux/slab.h>
38#include <linux/sched.h>
39#include <linux/mm.h>
40#include <linux/file.h>
41#include <linux/module.h>
60063497 42#include <linux/atomic.h>
f2c24b83 43#include <linux/reservation.h>
ba4e7d97
TH
44
45#define TTM_ASSERT_LOCKED(param)
46#define TTM_DEBUG(fmt, arg...)
47#define TTM_BO_HASH_ORDER 13
48
ba4e7d97 49static int ttm_bo_swapout(struct ttm_mem_shrink *shrink);
a987fcaa
TH
50static void ttm_bo_global_kobj_release(struct kobject *kobj);
51
52static struct attribute ttm_bo_count = {
53 .name = "bo_count",
54 .mode = S_IRUGO
55};
56
f1217ed0
CK
57static inline int ttm_mem_type_from_place(const struct ttm_place *place,
58 uint32_t *mem_type)
fb53f862
JG
59{
60 int i;
61
62 for (i = 0; i <= TTM_PL_PRIV5; i++)
f1217ed0 63 if (place->flags & (1 << i)) {
fb53f862
JG
64 *mem_type = i;
65 return 0;
66 }
67 return -EINVAL;
68}
69
5012f506 70static void ttm_mem_type_debug(struct ttm_bo_device *bdev, int mem_type)
fb53f862 71{
5012f506
JG
72 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
73
25d0479a
JP
74 pr_err(" has_type: %d\n", man->has_type);
75 pr_err(" use_type: %d\n", man->use_type);
76 pr_err(" flags: 0x%08X\n", man->flags);
54c4cd68 77 pr_err(" gpu_offset: 0x%08llX\n", man->gpu_offset);
25d0479a
JP
78 pr_err(" size: %llu\n", man->size);
79 pr_err(" available_caching: 0x%08X\n", man->available_caching);
80 pr_err(" default_caching: 0x%08X\n", man->default_caching);
d961db75
BS
81 if (mem_type != TTM_PL_SYSTEM)
82 (*man->func->debug)(man, TTM_PFX);
fb53f862
JG
83}
84
85static void ttm_bo_mem_space_debug(struct ttm_buffer_object *bo,
86 struct ttm_placement *placement)
87{
fb53f862
JG
88 int i, ret, mem_type;
89
25d0479a
JP
90 pr_err("No space for %p (%lu pages, %luK, %luM)\n",
91 bo, bo->mem.num_pages, bo->mem.size >> 10,
92 bo->mem.size >> 20);
fb53f862 93 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 94 ret = ttm_mem_type_from_place(&placement->placement[i],
fb53f862
JG
95 &mem_type);
96 if (ret)
97 return;
25d0479a 98 pr_err(" placement[%d]=0x%08X (%d)\n",
f1217ed0 99 i, placement->placement[i].flags, mem_type);
5012f506 100 ttm_mem_type_debug(bo->bdev, mem_type);
fb53f862
JG
101 }
102}
103
a987fcaa
TH
104static ssize_t ttm_bo_global_show(struct kobject *kobj,
105 struct attribute *attr,
106 char *buffer)
107{
108 struct ttm_bo_global *glob =
109 container_of(kobj, struct ttm_bo_global, kobj);
110
111 return snprintf(buffer, PAGE_SIZE, "%lu\n",
112 (unsigned long) atomic_read(&glob->bo_count));
113}
114
115static struct attribute *ttm_bo_global_attrs[] = {
116 &ttm_bo_count,
117 NULL
118};
119
52cf25d0 120static const struct sysfs_ops ttm_bo_global_ops = {
a987fcaa
TH
121 .show = &ttm_bo_global_show
122};
123
124static struct kobj_type ttm_bo_glob_kobj_type = {
125 .release = &ttm_bo_global_kobj_release,
126 .sysfs_ops = &ttm_bo_global_ops,
127 .default_attrs = ttm_bo_global_attrs
128};
129
ba4e7d97
TH
130
131static inline uint32_t ttm_bo_type_flags(unsigned type)
132{
133 return 1 << (type);
134}
135
136static void ttm_bo_release_list(struct kref *list_kref)
137{
138 struct ttm_buffer_object *bo =
139 container_of(list_kref, struct ttm_buffer_object, list_kref);
140 struct ttm_bo_device *bdev = bo->bdev;
57de4ba9 141 size_t acc_size = bo->acc_size;
ba4e7d97
TH
142
143 BUG_ON(atomic_read(&bo->list_kref.refcount));
144 BUG_ON(atomic_read(&bo->kref.refcount));
145 BUG_ON(atomic_read(&bo->cpu_writers));
ba4e7d97
TH
146 BUG_ON(bo->mem.mm_node != NULL);
147 BUG_ON(!list_empty(&bo->lru));
148 BUG_ON(!list_empty(&bo->ddestroy));
149
4279cb14 150 ttm_tt_destroy(bo->ttm);
a987fcaa 151 atomic_dec(&bo->glob->bo_count);
5bc73067 152 fence_put(bo->moving);
5e338405
ML
153 if (bo->resv == &bo->ttm_resv)
154 reservation_object_fini(&bo->ttm_resv);
c58f009e 155 mutex_destroy(&bo->wu_mutex);
ba4e7d97
TH
156 if (bo->destroy)
157 bo->destroy(bo);
158 else {
ba4e7d97
TH
159 kfree(bo);
160 }
57de4ba9 161 ttm_mem_global_free(bdev->glob->mem_glob, acc_size);
ba4e7d97
TH
162}
163
d6ea8886 164void ttm_bo_add_to_lru(struct ttm_buffer_object *bo)
ba4e7d97
TH
165{
166 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 167
009a9dad 168 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
169
170 if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
171
172 BUG_ON(!list_empty(&bo->lru));
173
98c2872a 174 list_add(&bo->lru, bdev->driver->lru_tail(bo));
ba4e7d97
TH
175 kref_get(&bo->list_kref);
176
ed704a43 177 if (bo->ttm && !(bo->ttm->page_flags & TTM_PAGE_FLAG_SG)) {
98c2872a 178 list_add(&bo->swap, bdev->driver->swap_lru_tail(bo));
ba4e7d97
TH
179 kref_get(&bo->list_kref);
180 }
181 }
182}
34820324 183EXPORT_SYMBOL(ttm_bo_add_to_lru);
ba4e7d97 184
d6ea8886 185int ttm_bo_del_from_lru(struct ttm_buffer_object *bo)
ba4e7d97 186{
c3ea576e 187 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97
TH
188 int put_count = 0;
189
c3ea576e
CK
190 if (bdev->driver->lru_removal)
191 bdev->driver->lru_removal(bo);
192
ba4e7d97
TH
193 if (!list_empty(&bo->swap)) {
194 list_del_init(&bo->swap);
195 ++put_count;
196 }
197 if (!list_empty(&bo->lru)) {
198 list_del_init(&bo->lru);
199 ++put_count;
200 }
201
ba4e7d97
TH
202 return put_count;
203}
204
ba4e7d97
TH
205static void ttm_bo_ref_bug(struct kref *list_kref)
206{
207 BUG();
208}
209
d6ea8886
DA
210void ttm_bo_list_ref_sub(struct ttm_buffer_object *bo, int count,
211 bool never_free)
212{
2357cbe5
TH
213 kref_sub(&bo->list_kref, count,
214 (never_free) ? ttm_bo_ref_bug : ttm_bo_release_list);
d6ea8886
DA
215}
216
34820324 217void ttm_bo_del_sub_from_lru(struct ttm_buffer_object *bo)
5e45d7df 218{
34820324 219 int put_count;
ecff665f 220
34820324
ML
221 spin_lock(&bo->glob->lru_lock);
222 put_count = ttm_bo_del_from_lru(bo);
223 spin_unlock(&bo->glob->lru_lock);
224 ttm_bo_list_ref_sub(bo, put_count, true);
ecff665f 225}
34820324 226EXPORT_SYMBOL(ttm_bo_del_sub_from_lru);
ecff665f 227
ab749618
CK
228void ttm_bo_move_to_lru_tail(struct ttm_buffer_object *bo)
229{
230 struct ttm_bo_device *bdev = bo->bdev;
56fc3502 231 int put_count = 0;
ab749618
CK
232
233 lockdep_assert_held(&bo->resv->lock.base);
234
c3ea576e
CK
235 if (bdev->driver->lru_removal)
236 bdev->driver->lru_removal(bo);
237
56fc3502
FC
238 put_count = ttm_bo_del_from_lru(bo);
239 ttm_bo_list_ref_sub(bo, put_count, true);
240 ttm_bo_add_to_lru(bo);
ab749618
CK
241}
242EXPORT_SYMBOL(ttm_bo_move_to_lru_tail);
243
98c2872a
CK
244struct list_head *ttm_bo_default_lru_tail(struct ttm_buffer_object *bo)
245{
246 return bo->bdev->man[bo->mem.mem_type].lru.prev;
247}
248EXPORT_SYMBOL(ttm_bo_default_lru_tail);
249
250struct list_head *ttm_bo_default_swap_lru_tail(struct ttm_buffer_object *bo)
251{
252 return bo->glob->swap_lru.prev;
253}
254EXPORT_SYMBOL(ttm_bo_default_swap_lru_tail);
255
ba4e7d97
TH
256/*
257 * Call bo->mutex locked.
258 */
ba4e7d97
TH
259static int ttm_bo_add_ttm(struct ttm_buffer_object *bo, bool zero_alloc)
260{
261 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 262 struct ttm_bo_global *glob = bo->glob;
ba4e7d97
TH
263 int ret = 0;
264 uint32_t page_flags = 0;
265
266 TTM_ASSERT_LOCKED(&bo->mutex);
267 bo->ttm = NULL;
268
ad49f501
DA
269 if (bdev->need_dma32)
270 page_flags |= TTM_PAGE_FLAG_DMA32;
271
ba4e7d97
TH
272 switch (bo->type) {
273 case ttm_bo_type_device:
274 if (zero_alloc)
275 page_flags |= TTM_PAGE_FLAG_ZERO_ALLOC;
276 case ttm_bo_type_kernel:
649bf3ca
JG
277 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
278 page_flags, glob->dummy_read_page);
ba4e7d97
TH
279 if (unlikely(bo->ttm == NULL))
280 ret = -ENOMEM;
281 break;
129b78bf
DA
282 case ttm_bo_type_sg:
283 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
284 page_flags | TTM_PAGE_FLAG_SG,
285 glob->dummy_read_page);
286 if (unlikely(bo->ttm == NULL)) {
287 ret = -ENOMEM;
288 break;
289 }
290 bo->ttm->sg = bo->sg;
291 break;
ba4e7d97 292 default:
25d0479a 293 pr_err("Illegal buffer object type\n");
ba4e7d97
TH
294 ret = -EINVAL;
295 break;
296 }
297
298 return ret;
299}
300
301static int ttm_bo_handle_move_mem(struct ttm_buffer_object *bo,
302 struct ttm_mem_reg *mem,
9d87fa21 303 bool evict, bool interruptible,
97a875cb 304 bool no_wait_gpu)
ba4e7d97
TH
305{
306 struct ttm_bo_device *bdev = bo->bdev;
307 bool old_is_pci = ttm_mem_reg_is_pci(bdev, &bo->mem);
308 bool new_is_pci = ttm_mem_reg_is_pci(bdev, mem);
309 struct ttm_mem_type_manager *old_man = &bdev->man[bo->mem.mem_type];
310 struct ttm_mem_type_manager *new_man = &bdev->man[mem->mem_type];
311 int ret = 0;
312
313 if (old_is_pci || new_is_pci ||
eba67093
TH
314 ((mem->placement & bo->mem.placement & TTM_PL_MASK_CACHING) == 0)) {
315 ret = ttm_mem_io_lock(old_man, true);
316 if (unlikely(ret != 0))
317 goto out_err;
318 ttm_bo_unmap_virtual_locked(bo);
319 ttm_mem_io_unlock(old_man);
320 }
ba4e7d97
TH
321
322 /*
323 * Create and bind a ttm if required.
324 */
325
8d3bb236
BS
326 if (!(new_man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
327 if (bo->ttm == NULL) {
ff02b13f
BS
328 bool zero = !(old_man->flags & TTM_MEMTYPE_FLAG_FIXED);
329 ret = ttm_bo_add_ttm(bo, zero);
8d3bb236
BS
330 if (ret)
331 goto out_err;
332 }
ba4e7d97
TH
333
334 ret = ttm_tt_set_placement_caching(bo->ttm, mem->placement);
335 if (ret)
87ef9209 336 goto out_err;
ba4e7d97
TH
337
338 if (mem->mem_type != TTM_PL_SYSTEM) {
339 ret = ttm_tt_bind(bo->ttm, mem);
340 if (ret)
341 goto out_err;
342 }
343
344 if (bo->mem.mem_type == TTM_PL_SYSTEM) {
82ef594e
BS
345 if (bdev->driver->move_notify)
346 bdev->driver->move_notify(bo, mem);
ca262a99 347 bo->mem = *mem;
ba4e7d97 348 mem->mm_node = NULL;
ba4e7d97
TH
349 goto moved;
350 }
ba4e7d97
TH
351 }
352
9f1feed2
BS
353 if (bdev->driver->move_notify)
354 bdev->driver->move_notify(bo, mem);
355
ba4e7d97
TH
356 if (!(old_man->flags & TTM_MEMTYPE_FLAG_FIXED) &&
357 !(new_man->flags & TTM_MEMTYPE_FLAG_FIXED))
97a875cb 358 ret = ttm_bo_move_ttm(bo, evict, no_wait_gpu, mem);
ba4e7d97
TH
359 else if (bdev->driver->move)
360 ret = bdev->driver->move(bo, evict, interruptible,
97a875cb 361 no_wait_gpu, mem);
ba4e7d97 362 else
77dfc28b
CK
363 ret = ttm_bo_move_memcpy(bo, evict, interruptible,
364 no_wait_gpu, mem);
ba4e7d97 365
9f1feed2
BS
366 if (ret) {
367 if (bdev->driver->move_notify) {
368 struct ttm_mem_reg tmp_mem = *mem;
369 *mem = bo->mem;
370 bo->mem = tmp_mem;
371 bdev->driver->move_notify(bo, mem);
372 bo->mem = *mem;
014b3440 373 *mem = tmp_mem;
9f1feed2 374 }
ba4e7d97 375
9f1feed2
BS
376 goto out_err;
377 }
dc97b340 378
ba4e7d97
TH
379moved:
380 if (bo->evicted) {
9ef7506f
RC
381 if (bdev->driver->invalidate_caches) {
382 ret = bdev->driver->invalidate_caches(bdev, bo->mem.placement);
383 if (ret)
384 pr_err("Can not flush read caches\n");
385 }
ba4e7d97
TH
386 bo->evicted = false;
387 }
388
389 if (bo->mem.mm_node) {
d961db75 390 bo->offset = (bo->mem.start << PAGE_SHIFT) +
ba4e7d97
TH
391 bdev->man[bo->mem.mem_type].gpu_offset;
392 bo->cur_placement = bo->mem.placement;
354fb52c
TH
393 } else
394 bo->offset = 0;
ba4e7d97
TH
395
396 return 0;
397
398out_err:
399 new_man = &bdev->man[bo->mem.mem_type];
4279cb14 400 if (new_man->flags & TTM_MEMTYPE_FLAG_FIXED) {
ba4e7d97
TH
401 ttm_tt_destroy(bo->ttm);
402 bo->ttm = NULL;
403 }
404
405 return ret;
406}
407
1df6a2eb 408/**
40d857bb 409 * Call bo::reserved.
1df6a2eb 410 * Will release GPU memory type usage on destruction.
40d857bb
TH
411 * This is the place to put in driver specific hooks to release
412 * driver private resources.
413 * Will release the bo::reserved lock.
1df6a2eb
TH
414 */
415
416static void ttm_bo_cleanup_memtype_use(struct ttm_buffer_object *bo)
417{
dc97b340
JG
418 if (bo->bdev->driver->move_notify)
419 bo->bdev->driver->move_notify(bo, NULL);
420
4279cb14
CK
421 ttm_tt_destroy(bo->ttm);
422 bo->ttm = NULL;
40d857bb 423 ttm_bo_mem_put(bo, &bo->mem);
1df6a2eb 424
5e338405 425 ww_mutex_unlock (&bo->resv->lock);
1df6a2eb
TH
426}
427
f2c24b83
ML
428static void ttm_bo_flush_all_fences(struct ttm_buffer_object *bo)
429{
430 struct reservation_object_list *fobj;
431 struct fence *fence;
432 int i;
433
434 fobj = reservation_object_get_list(bo->resv);
435 fence = reservation_object_get_excl(bo->resv);
436 if (fence && !fence->ops->signaled)
437 fence_enable_sw_signaling(fence);
438
439 for (i = 0; fobj && i < fobj->shared_count; ++i) {
440 fence = rcu_dereference_protected(fobj->shared[i],
441 reservation_object_held(bo->resv));
442
443 if (!fence->ops->signaled)
444 fence_enable_sw_signaling(fence);
445 }
446}
447
e1efc9b6 448static void ttm_bo_cleanup_refs_or_queue(struct ttm_buffer_object *bo)
ba4e7d97
TH
449{
450 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 451 struct ttm_bo_global *glob = bo->glob;
e1efc9b6 452 int put_count;
ba4e7d97
TH
453 int ret;
454
4154f051 455 spin_lock(&glob->lru_lock);
dfd5e50e 456 ret = __ttm_bo_reserve(bo, false, true, NULL);
4154f051 457
dd7cfd64 458 if (!ret) {
8aa6d4fc 459 if (!ttm_bo_wait(bo, false, true)) {
dd7cfd64 460 put_count = ttm_bo_del_from_lru(bo);
ba4e7d97 461
dd7cfd64
ML
462 spin_unlock(&glob->lru_lock);
463 ttm_bo_cleanup_memtype_use(bo);
ba4e7d97 464
dd7cfd64 465 ttm_bo_list_ref_sub(bo, put_count, true);
4154f051 466
dd7cfd64 467 return;
f2c24b83
ML
468 } else
469 ttm_bo_flush_all_fences(bo);
15205fbc
TH
470
471 /*
472 * Make NO_EVICT bos immediately available to
473 * shrinkers, now that they are queued for
474 * destruction.
475 */
476 if (bo->mem.placement & TTM_PL_FLAG_NO_EVICT) {
477 bo->mem.placement &= ~TTM_PL_FLAG_NO_EVICT;
478 ttm_bo_add_to_lru(bo);
479 }
480
c7523083 481 __ttm_bo_unreserve(bo);
15205fbc 482 }
e1efc9b6
TH
483
484 kref_get(&bo->list_kref);
485 list_add_tail(&bo->ddestroy, &bdev->ddestroy);
486 spin_unlock(&glob->lru_lock);
e1efc9b6 487
e1efc9b6
TH
488 schedule_delayed_work(&bdev->wq,
489 ((HZ / 100) < 1) ? 1 : HZ / 100);
490}
491
492/**
85b144f8 493 * function ttm_bo_cleanup_refs_and_unlock
e1efc9b6
TH
494 * If bo idle, remove from delayed- and lru lists, and unref.
495 * If not idle, do nothing.
496 *
85b144f8
ML
497 * Must be called with lru_lock and reservation held, this function
498 * will drop both before returning.
499 *
e1efc9b6 500 * @interruptible Any sleeps should occur interruptibly.
e1efc9b6
TH
501 * @no_wait_gpu Never wait for gpu. Return -EBUSY instead.
502 */
503
85b144f8
ML
504static int ttm_bo_cleanup_refs_and_unlock(struct ttm_buffer_object *bo,
505 bool interruptible,
506 bool no_wait_gpu)
e1efc9b6
TH
507{
508 struct ttm_bo_global *glob = bo->glob;
509 int put_count;
85b144f8 510 int ret;
e1efc9b6 511
8aa6d4fc 512 ret = ttm_bo_wait(bo, false, true);
e1efc9b6 513
85b144f8 514 if (ret && !no_wait_gpu) {
472db7ab
ML
515 long lret;
516 ww_mutex_unlock(&bo->resv->lock);
517 spin_unlock(&glob->lru_lock);
518
519 lret = reservation_object_wait_timeout_rcu(bo->resv,
520 true,
521 interruptible,
522 30 * HZ);
523
524 if (lret < 0)
525 return lret;
526 else if (lret == 0)
527 return -EBUSY;
b8e902f2 528
85b144f8 529 spin_lock(&glob->lru_lock);
dfd5e50e 530 ret = __ttm_bo_reserve(bo, false, true, NULL);
b8e902f2 531
85b144f8
ML
532 /*
533 * We raced, and lost, someone else holds the reservation now,
534 * and is probably busy in ttm_bo_cleanup_memtype_use.
535 *
536 * Even if it's not the case, because we finished waiting any
537 * delayed destruction would succeed, so just return success
538 * here.
539 */
540 if (ret) {
541 spin_unlock(&glob->lru_lock);
542 return 0;
543 }
7040138f
ML
544
545 /*
546 * remove sync_obj with ttm_bo_wait, the wait should be
547 * finished, and no new wait object should have been added.
548 */
8aa6d4fc 549 ret = ttm_bo_wait(bo, false, true);
7040138f
ML
550 WARN_ON(ret);
551 }
ba4e7d97 552
85b144f8 553 if (ret || unlikely(list_empty(&bo->ddestroy))) {
c7523083 554 __ttm_bo_unreserve(bo);
a987fcaa 555 spin_unlock(&glob->lru_lock);
85b144f8 556 return ret;
ba4e7d97
TH
557 }
558
e1efc9b6
TH
559 put_count = ttm_bo_del_from_lru(bo);
560 list_del_init(&bo->ddestroy);
561 ++put_count;
562
563 spin_unlock(&glob->lru_lock);
564 ttm_bo_cleanup_memtype_use(bo);
565
d6ea8886 566 ttm_bo_list_ref_sub(bo, put_count, true);
e1efc9b6
TH
567
568 return 0;
ba4e7d97
TH
569}
570
571/**
572 * Traverse the delayed list, and call ttm_bo_cleanup_refs on all
573 * encountered buffers.
574 */
575
576static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all)
577{
a987fcaa 578 struct ttm_bo_global *glob = bdev->glob;
1a961ce0
LB
579 struct ttm_buffer_object *entry = NULL;
580 int ret = 0;
ba4e7d97 581
a987fcaa 582 spin_lock(&glob->lru_lock);
1a961ce0
LB
583 if (list_empty(&bdev->ddestroy))
584 goto out_unlock;
585
586 entry = list_first_entry(&bdev->ddestroy,
587 struct ttm_buffer_object, ddestroy);
588 kref_get(&entry->list_kref);
589
590 for (;;) {
591 struct ttm_buffer_object *nentry = NULL;
592
593 if (entry->ddestroy.next != &bdev->ddestroy) {
594 nentry = list_first_entry(&entry->ddestroy,
595 struct ttm_buffer_object, ddestroy);
ba4e7d97
TH
596 kref_get(&nentry->list_kref);
597 }
ba4e7d97 598
dfd5e50e 599 ret = __ttm_bo_reserve(entry, false, true, NULL);
63d0a419
ML
600 if (remove_all && ret) {
601 spin_unlock(&glob->lru_lock);
dfd5e50e 602 ret = __ttm_bo_reserve(entry, false, false, NULL);
63d0a419
ML
603 spin_lock(&glob->lru_lock);
604 }
605
85b144f8
ML
606 if (!ret)
607 ret = ttm_bo_cleanup_refs_and_unlock(entry, false,
608 !remove_all);
609 else
610 spin_unlock(&glob->lru_lock);
611
ba4e7d97 612 kref_put(&entry->list_kref, ttm_bo_release_list);
1a961ce0
LB
613 entry = nentry;
614
615 if (ret || !entry)
616 goto out;
ba4e7d97 617
a987fcaa 618 spin_lock(&glob->lru_lock);
1a961ce0 619 if (list_empty(&entry->ddestroy))
ba4e7d97
TH
620 break;
621 }
ba4e7d97 622
1a961ce0
LB
623out_unlock:
624 spin_unlock(&glob->lru_lock);
625out:
626 if (entry)
627 kref_put(&entry->list_kref, ttm_bo_release_list);
ba4e7d97
TH
628 return ret;
629}
630
631static void ttm_bo_delayed_workqueue(struct work_struct *work)
632{
633 struct ttm_bo_device *bdev =
634 container_of(work, struct ttm_bo_device, wq.work);
635
636 if (ttm_bo_delayed_delete(bdev, false)) {
637 schedule_delayed_work(&bdev->wq,
638 ((HZ / 100) < 1) ? 1 : HZ / 100);
639 }
640}
641
642static void ttm_bo_release(struct kref *kref)
643{
644 struct ttm_buffer_object *bo =
645 container_of(kref, struct ttm_buffer_object, kref);
646 struct ttm_bo_device *bdev = bo->bdev;
eba67093 647 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
ba4e7d97 648
72525b3f 649 drm_vma_offset_remove(&bdev->vma_manager, &bo->vma_node);
eba67093
TH
650 ttm_mem_io_lock(man, false);
651 ttm_mem_io_free_vm(bo);
652 ttm_mem_io_unlock(man);
e1efc9b6 653 ttm_bo_cleanup_refs_or_queue(bo);
ba4e7d97 654 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
655}
656
657void ttm_bo_unref(struct ttm_buffer_object **p_bo)
658{
659 struct ttm_buffer_object *bo = *p_bo;
ba4e7d97
TH
660
661 *p_bo = NULL;
ba4e7d97 662 kref_put(&bo->kref, ttm_bo_release);
ba4e7d97
TH
663}
664EXPORT_SYMBOL(ttm_bo_unref);
665
7c5ee536
MG
666int ttm_bo_lock_delayed_workqueue(struct ttm_bo_device *bdev)
667{
668 return cancel_delayed_work_sync(&bdev->wq);
669}
670EXPORT_SYMBOL(ttm_bo_lock_delayed_workqueue);
671
672void ttm_bo_unlock_delayed_workqueue(struct ttm_bo_device *bdev, int resched)
673{
674 if (resched)
675 schedule_delayed_work(&bdev->wq,
676 ((HZ / 100) < 1) ? 1 : HZ / 100);
677}
678EXPORT_SYMBOL(ttm_bo_unlock_delayed_workqueue);
679
ca262a99 680static int ttm_bo_evict(struct ttm_buffer_object *bo, bool interruptible,
97a875cb 681 bool no_wait_gpu)
ba4e7d97 682{
ba4e7d97
TH
683 struct ttm_bo_device *bdev = bo->bdev;
684 struct ttm_mem_reg evict_mem;
ca262a99
JG
685 struct ttm_placement placement;
686 int ret = 0;
ba4e7d97 687
009a9dad 688 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
689
690 evict_mem = bo->mem;
691 evict_mem.mm_node = NULL;
eba67093
TH
692 evict_mem.bus.io_reserved_vm = false;
693 evict_mem.bus.io_reserved_count = 0;
ba4e7d97 694
7cb7d1d7
JG
695 placement.num_placement = 0;
696 placement.num_busy_placement = 0;
ca262a99
JG
697 bdev->driver->evict_flags(bo, &placement);
698 ret = ttm_bo_mem_space(bo, &placement, &evict_mem, interruptible,
97a875cb 699 no_wait_gpu);
ba4e7d97 700 if (ret) {
fb53f862 701 if (ret != -ERESTARTSYS) {
25d0479a
JP
702 pr_err("Failed to find memory space for buffer 0x%p eviction\n",
703 bo);
fb53f862
JG
704 ttm_bo_mem_space_debug(bo, &placement);
705 }
ba4e7d97
TH
706 goto out;
707 }
708
709 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true, interruptible,
97a875cb 710 no_wait_gpu);
17d33bc9 711 if (unlikely(ret)) {
98ffc415 712 if (ret != -ERESTARTSYS)
25d0479a 713 pr_err("Buffer eviction failed\n");
42311ff9 714 ttm_bo_mem_put(bo, &evict_mem);
ba4e7d97
TH
715 goto out;
716 }
ca262a99
JG
717 bo->evicted = true;
718out:
719 return ret;
720}
721
722static int ttm_mem_evict_first(struct ttm_bo_device *bdev,
723 uint32_t mem_type,
e300180f 724 const struct ttm_place *place,
97a875cb 725 bool interruptible,
9d87fa21 726 bool no_wait_gpu)
ca262a99
JG
727{
728 struct ttm_bo_global *glob = bdev->glob;
729 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
730 struct ttm_buffer_object *bo;
e7ab2019 731 int ret = -EBUSY, put_count;
ba4e7d97 732
a987fcaa 733 spin_lock(&glob->lru_lock);
e7ab2019 734 list_for_each_entry(bo, &man->lru, lru) {
dfd5e50e 735 ret = __ttm_bo_reserve(bo, false, true, NULL);
e300180f
MD
736 if (!ret) {
737 if (place && (place->fpfn || place->lpfn)) {
738 /* Don't evict this BO if it's outside of the
739 * requested placement range
740 */
741 if (place->fpfn >= (bo->mem.start + bo->mem.size) ||
742 (place->lpfn && place->lpfn <= bo->mem.start)) {
743 __ttm_bo_unreserve(bo);
744 ret = -EBUSY;
745 continue;
746 }
747 }
748
e7ab2019 749 break;
e300180f 750 }
e7ab2019
ML
751 }
752
753 if (ret) {
9c51ba1d 754 spin_unlock(&glob->lru_lock);
e7ab2019 755 return ret;
9c51ba1d
TH
756 }
757
ca262a99 758 kref_get(&bo->list_kref);
9c51ba1d 759
e1efc9b6 760 if (!list_empty(&bo->ddestroy)) {
e7ab2019
ML
761 ret = ttm_bo_cleanup_refs_and_unlock(bo, interruptible,
762 no_wait_gpu);
e1efc9b6 763 kref_put(&bo->list_kref, ttm_bo_release_list);
b8e902f2 764 return ret;
e1efc9b6
TH
765 }
766
9c51ba1d 767 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 768 spin_unlock(&glob->lru_lock);
9c51ba1d
TH
769
770 BUG_ON(ret != 0);
771
d6ea8886 772 ttm_bo_list_ref_sub(bo, put_count, true);
9c51ba1d 773
97a875cb 774 ret = ttm_bo_evict(bo, interruptible, no_wait_gpu);
ca262a99 775 ttm_bo_unreserve(bo);
9c51ba1d 776
ca262a99 777 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
778 return ret;
779}
780
42311ff9
BS
781void ttm_bo_mem_put(struct ttm_buffer_object *bo, struct ttm_mem_reg *mem)
782{
d961db75 783 struct ttm_mem_type_manager *man = &bo->bdev->man[mem->mem_type];
42311ff9 784
d961db75
BS
785 if (mem->mm_node)
786 (*man->func->put_node)(man, mem);
42311ff9
BS
787}
788EXPORT_SYMBOL(ttm_bo_mem_put);
789
ba4e7d97
TH
790/**
791 * Repeatedly evict memory from the LRU for @mem_type until we create enough
792 * space, or we've evicted everything and there isn't enough space.
793 */
ca262a99
JG
794static int ttm_bo_mem_force_space(struct ttm_buffer_object *bo,
795 uint32_t mem_type,
f1217ed0 796 const struct ttm_place *place,
ca262a99 797 struct ttm_mem_reg *mem,
9d87fa21 798 bool interruptible,
9d87fa21 799 bool no_wait_gpu)
ba4e7d97 800{
ca262a99 801 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 802 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
ba4e7d97
TH
803 int ret;
804
ba4e7d97 805 do {
f1217ed0 806 ret = (*man->func->get_node)(man, bo, place, mem);
ca262a99
JG
807 if (unlikely(ret != 0))
808 return ret;
d961db75 809 if (mem->mm_node)
ba4e7d97 810 break;
e300180f 811 ret = ttm_mem_evict_first(bdev, mem_type, place,
97a875cb 812 interruptible, no_wait_gpu);
ba4e7d97
TH
813 if (unlikely(ret != 0))
814 return ret;
ba4e7d97 815 } while (1);
d961db75 816 if (mem->mm_node == NULL)
ba4e7d97 817 return -ENOMEM;
ba4e7d97
TH
818 mem->mem_type = mem_type;
819 return 0;
820}
821
ae3e8122
TH
822static uint32_t ttm_bo_select_caching(struct ttm_mem_type_manager *man,
823 uint32_t cur_placement,
824 uint32_t proposed_placement)
825{
826 uint32_t caching = proposed_placement & TTM_PL_MASK_CACHING;
827 uint32_t result = proposed_placement & ~TTM_PL_MASK_CACHING;
828
829 /**
830 * Keep current caching if possible.
831 */
832
833 if ((cur_placement & caching) != 0)
834 result |= (cur_placement & caching);
835 else if ((man->default_caching & caching) != 0)
836 result |= man->default_caching;
837 else if ((TTM_PL_FLAG_CACHED & caching) != 0)
838 result |= TTM_PL_FLAG_CACHED;
839 else if ((TTM_PL_FLAG_WC & caching) != 0)
840 result |= TTM_PL_FLAG_WC;
841 else if ((TTM_PL_FLAG_UNCACHED & caching) != 0)
842 result |= TTM_PL_FLAG_UNCACHED;
843
844 return result;
845}
846
ba4e7d97 847static bool ttm_bo_mt_compatible(struct ttm_mem_type_manager *man,
ba4e7d97 848 uint32_t mem_type,
f1217ed0 849 const struct ttm_place *place,
ae3e8122 850 uint32_t *masked_placement)
ba4e7d97
TH
851{
852 uint32_t cur_flags = ttm_bo_type_flags(mem_type);
853
f1217ed0 854 if ((cur_flags & place->flags & TTM_PL_MASK_MEM) == 0)
ba4e7d97
TH
855 return false;
856
f1217ed0 857 if ((place->flags & man->available_caching) == 0)
ba4e7d97 858 return false;
ba4e7d97 859
f1217ed0 860 cur_flags |= (place->flags & man->available_caching);
ae3e8122
TH
861
862 *masked_placement = cur_flags;
ba4e7d97
TH
863 return true;
864}
865
866/**
867 * Creates space for memory region @mem according to its type.
868 *
869 * This function first searches for free space in compatible memory types in
870 * the priority order defined by the driver. If free space isn't found, then
871 * ttm_bo_mem_force_space is attempted in priority order to evict and find
872 * space.
873 */
874int ttm_bo_mem_space(struct ttm_buffer_object *bo,
ca262a99
JG
875 struct ttm_placement *placement,
876 struct ttm_mem_reg *mem,
97a875cb 877 bool interruptible,
9d87fa21 878 bool no_wait_gpu)
ba4e7d97
TH
879{
880 struct ttm_bo_device *bdev = bo->bdev;
881 struct ttm_mem_type_manager *man;
ba4e7d97
TH
882 uint32_t mem_type = TTM_PL_SYSTEM;
883 uint32_t cur_flags = 0;
884 bool type_found = false;
885 bool type_ok = false;
98ffc415 886 bool has_erestartsys = false;
ca262a99 887 int i, ret;
ba4e7d97
TH
888
889 mem->mm_node = NULL;
b6637526 890 for (i = 0; i < placement->num_placement; ++i) {
f1217ed0
CK
891 const struct ttm_place *place = &placement->placement[i];
892
893 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
894 if (ret)
895 return ret;
ba4e7d97 896 man = &bdev->man[mem_type];
e30f3963
TH
897 if (!man->has_type || !man->use_type)
898 continue;
ba4e7d97 899
f1217ed0 900 type_ok = ttm_bo_mt_compatible(man, mem_type, place,
ca262a99 901 &cur_flags);
ba4e7d97
TH
902
903 if (!type_ok)
904 continue;
905
e30f3963 906 type_found = true;
ae3e8122
TH
907 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
908 cur_flags);
ca262a99
JG
909 /*
910 * Use the access and other non-mapping-related flag bits from
911 * the memory placement flags to the current flags
912 */
f1217ed0 913 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 914 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 915
ba4e7d97
TH
916 if (mem_type == TTM_PL_SYSTEM)
917 break;
918
e30f3963
TH
919 ret = (*man->func->get_node)(man, bo, place, mem);
920 if (unlikely(ret))
921 return ret;
922
d961db75 923 if (mem->mm_node)
ba4e7d97
TH
924 break;
925 }
926
d961db75 927 if ((type_ok && (mem_type == TTM_PL_SYSTEM)) || mem->mm_node) {
ba4e7d97
TH
928 mem->mem_type = mem_type;
929 mem->placement = cur_flags;
930 return 0;
931 }
932
b6637526 933 for (i = 0; i < placement->num_busy_placement; ++i) {
f1217ed0
CK
934 const struct ttm_place *place = &placement->busy_placement[i];
935
936 ret = ttm_mem_type_from_place(place, &mem_type);
ca262a99
JG
937 if (ret)
938 return ret;
ba4e7d97 939 man = &bdev->man[mem_type];
e30f3963 940 if (!man->has_type || !man->use_type)
ba4e7d97 941 continue;
f1217ed0 942 if (!ttm_bo_mt_compatible(man, mem_type, place, &cur_flags))
ba4e7d97
TH
943 continue;
944
e30f3963 945 type_found = true;
ae3e8122
TH
946 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
947 cur_flags);
ca262a99
JG
948 /*
949 * Use the access and other non-mapping-related flag bits from
950 * the memory placement flags to the current flags
951 */
f1217ed0 952 ttm_flag_masked(&cur_flags, place->flags,
ca262a99 953 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 954
0eaddb28
TH
955 if (mem_type == TTM_PL_SYSTEM) {
956 mem->mem_type = mem_type;
957 mem->placement = cur_flags;
958 mem->mm_node = NULL;
959 return 0;
960 }
961
f1217ed0 962 ret = ttm_bo_mem_force_space(bo, mem_type, place, mem,
97a875cb 963 interruptible, no_wait_gpu);
ba4e7d97
TH
964 if (ret == 0 && mem->mm_node) {
965 mem->placement = cur_flags;
966 return 0;
967 }
98ffc415
TH
968 if (ret == -ERESTARTSYS)
969 has_erestartsys = true;
ba4e7d97 970 }
e30f3963
TH
971
972 if (!type_found) {
973 printk(KERN_ERR TTM_PFX "No compatible memory type found.\n");
974 return -EINVAL;
975 }
976
977 return (has_erestartsys) ? -ERESTARTSYS : -ENOMEM;
ba4e7d97
TH
978}
979EXPORT_SYMBOL(ttm_bo_mem_space);
980
6e87fa48 981static int ttm_bo_move_buffer(struct ttm_buffer_object *bo,
ca262a99 982 struct ttm_placement *placement,
97a875cb 983 bool interruptible,
9d87fa21 984 bool no_wait_gpu)
ba4e7d97 985{
ba4e7d97
TH
986 int ret = 0;
987 struct ttm_mem_reg mem;
988
009a9dad 989 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97 990
ba4e7d97
TH
991 mem.num_pages = bo->num_pages;
992 mem.size = mem.num_pages << PAGE_SHIFT;
993 mem.page_alignment = bo->mem.page_alignment;
eba67093
TH
994 mem.bus.io_reserved_vm = false;
995 mem.bus.io_reserved_count = 0;
ba4e7d97
TH
996 /*
997 * Determine where to move the buffer.
998 */
97a875cb
ML
999 ret = ttm_bo_mem_space(bo, placement, &mem,
1000 interruptible, no_wait_gpu);
ba4e7d97
TH
1001 if (ret)
1002 goto out_unlock;
97a875cb
ML
1003 ret = ttm_bo_handle_move_mem(bo, &mem, false,
1004 interruptible, no_wait_gpu);
ba4e7d97 1005out_unlock:
d961db75
BS
1006 if (ret && mem.mm_node)
1007 ttm_bo_mem_put(bo, &mem);
ba4e7d97
TH
1008 return ret;
1009}
1010
59c8e663
TH
1011static bool ttm_bo_mem_compat(struct ttm_placement *placement,
1012 struct ttm_mem_reg *mem,
1013 uint32_t *new_flags)
ba4e7d97 1014{
ca262a99 1015 int i;
e22238ea 1016
ca262a99 1017 for (i = 0; i < placement->num_placement; i++) {
f1217ed0 1018 const struct ttm_place *heap = &placement->placement[i];
9ace2ef7 1019 if (mem->mm_node &&
f1217ed0 1020 (mem->start < heap->fpfn ||
9ace2ef7 1021 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1022 continue;
1023
1024 *new_flags = heap->flags;
59c8e663
TH
1025 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1026 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1027 return true;
1028 }
1029
1030 for (i = 0; i < placement->num_busy_placement; i++) {
f1217ed0 1031 const struct ttm_place *heap = &placement->busy_placement[i];
9ace2ef7 1032 if (mem->mm_node &&
f1217ed0 1033 (mem->start < heap->fpfn ||
9ace2ef7 1034 (heap->lpfn != 0 && (mem->start + mem->num_pages) > heap->lpfn)))
f1217ed0
CK
1035 continue;
1036
1037 *new_flags = heap->flags;
59c8e663
TH
1038 if ((*new_flags & mem->placement & TTM_PL_MASK_CACHING) &&
1039 (*new_flags & mem->placement & TTM_PL_MASK_MEM))
1040 return true;
ca262a99 1041 }
59c8e663
TH
1042
1043 return false;
ba4e7d97
TH
1044}
1045
09855acb
JG
1046int ttm_bo_validate(struct ttm_buffer_object *bo,
1047 struct ttm_placement *placement,
97a875cb 1048 bool interruptible,
9d87fa21 1049 bool no_wait_gpu)
ba4e7d97
TH
1050{
1051 int ret;
59c8e663 1052 uint32_t new_flags;
ba4e7d97 1053
009a9dad 1054 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
1055 /*
1056 * Check whether we need to move buffer.
1057 */
59c8e663 1058 if (!ttm_bo_mem_compat(placement, &bo->mem, &new_flags)) {
97a875cb
ML
1059 ret = ttm_bo_move_buffer(bo, placement, interruptible,
1060 no_wait_gpu);
ca262a99 1061 if (ret)
ba4e7d97 1062 return ret;
ca262a99
JG
1063 } else {
1064 /*
1065 * Use the access and other non-mapping-related flag bits from
1066 * the compatible memory placement flags to the active flags
1067 */
59c8e663 1068 ttm_flag_masked(&bo->mem.placement, new_flags,
ca262a99 1069 ~TTM_PL_MASK_MEMTYPE);
ba4e7d97 1070 }
ba4e7d97
TH
1071 /*
1072 * We might need to add a TTM.
1073 */
ba4e7d97
TH
1074 if (bo->mem.mem_type == TTM_PL_SYSTEM && bo->ttm == NULL) {
1075 ret = ttm_bo_add_ttm(bo, true);
1076 if (ret)
1077 return ret;
1078 }
ba4e7d97
TH
1079 return 0;
1080}
09855acb 1081EXPORT_SYMBOL(ttm_bo_validate);
ba4e7d97 1082
09855acb
JG
1083int ttm_bo_init(struct ttm_bo_device *bdev,
1084 struct ttm_buffer_object *bo,
1085 unsigned long size,
1086 enum ttm_bo_type type,
1087 struct ttm_placement *placement,
1088 uint32_t page_alignment,
09855acb 1089 bool interruptible,
5df23979 1090 struct file *persistent_swap_storage,
09855acb 1091 size_t acc_size,
129b78bf 1092 struct sg_table *sg,
f4f4e3e3 1093 struct reservation_object *resv,
09855acb 1094 void (*destroy) (struct ttm_buffer_object *))
ba4e7d97 1095{
09855acb 1096 int ret = 0;
ba4e7d97 1097 unsigned long num_pages;
57de4ba9 1098 struct ttm_mem_global *mem_glob = bdev->glob->mem_glob;
5e338405 1099 bool locked;
57de4ba9
JG
1100
1101 ret = ttm_mem_global_alloc(mem_glob, acc_size, false, false);
1102 if (ret) {
25d0479a 1103 pr_err("Out of kernel memory\n");
57de4ba9
JG
1104 if (destroy)
1105 (*destroy)(bo);
1106 else
1107 kfree(bo);
1108 return -ENOMEM;
1109 }
ba4e7d97 1110
ba4e7d97
TH
1111 num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
1112 if (num_pages == 0) {
25d0479a 1113 pr_err("Illegal buffer object size\n");
7dfbbdcf
TH
1114 if (destroy)
1115 (*destroy)(bo);
1116 else
1117 kfree(bo);
a393c730 1118 ttm_mem_global_free(mem_glob, acc_size);
ba4e7d97
TH
1119 return -EINVAL;
1120 }
1121 bo->destroy = destroy;
1122
ba4e7d97
TH
1123 kref_init(&bo->kref);
1124 kref_init(&bo->list_kref);
1125 atomic_set(&bo->cpu_writers, 0);
ba4e7d97
TH
1126 INIT_LIST_HEAD(&bo->lru);
1127 INIT_LIST_HEAD(&bo->ddestroy);
1128 INIT_LIST_HEAD(&bo->swap);
eba67093 1129 INIT_LIST_HEAD(&bo->io_reserve_lru);
c58f009e 1130 mutex_init(&bo->wu_mutex);
ba4e7d97 1131 bo->bdev = bdev;
a987fcaa 1132 bo->glob = bdev->glob;
ba4e7d97
TH
1133 bo->type = type;
1134 bo->num_pages = num_pages;
eb6d2c39 1135 bo->mem.size = num_pages << PAGE_SHIFT;
ba4e7d97
TH
1136 bo->mem.mem_type = TTM_PL_SYSTEM;
1137 bo->mem.num_pages = bo->num_pages;
1138 bo->mem.mm_node = NULL;
1139 bo->mem.page_alignment = page_alignment;
eba67093
TH
1140 bo->mem.bus.io_reserved_vm = false;
1141 bo->mem.bus.io_reserved_count = 0;
5bc73067 1142 bo->moving = NULL;
ba4e7d97 1143 bo->mem.placement = (TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED);
5df23979 1144 bo->persistent_swap_storage = persistent_swap_storage;
ba4e7d97 1145 bo->acc_size = acc_size;
129b78bf 1146 bo->sg = sg;
f4f4e3e3
ML
1147 if (resv) {
1148 bo->resv = resv;
1149 lockdep_assert_held(&bo->resv->lock.base);
1150 } else {
1151 bo->resv = &bo->ttm_resv;
1152 reservation_object_init(&bo->ttm_resv);
1153 }
a987fcaa 1154 atomic_inc(&bo->glob->bo_count);
72525b3f 1155 drm_vma_node_reset(&bo->vma_node);
ba4e7d97 1156
ba4e7d97
TH
1157 /*
1158 * For ttm_bo_type_device buffers, allocate
1159 * address space from the device.
1160 */
f1217ed0
CK
1161 if (bo->type == ttm_bo_type_device ||
1162 bo->type == ttm_bo_type_sg)
abf19035
DH
1163 ret = drm_vma_offset_add(&bdev->vma_manager, &bo->vma_node,
1164 bo->mem.num_pages);
ba4e7d97 1165
f4f4e3e3
ML
1166 /* passed reservation objects should already be locked,
1167 * since otherwise lockdep will be angered in radeon.
1168 */
1169 if (!resv) {
1170 locked = ww_mutex_trylock(&bo->resv->lock);
1171 WARN_ON(!locked);
1172 }
ba4e7d97 1173
5e338405
ML
1174 if (likely(!ret))
1175 ret = ttm_bo_validate(bo, placement, interruptible, false);
ba4e7d97 1176
33d48cf8 1177 if (!resv) {
f4f4e3e3 1178 ttm_bo_unreserve(bo);
5e338405 1179
33d48cf8
CK
1180 } else if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
1181 spin_lock(&bo->glob->lru_lock);
1182 ttm_bo_add_to_lru(bo);
1183 spin_unlock(&bo->glob->lru_lock);
1184 }
1185
5e338405
ML
1186 if (unlikely(ret))
1187 ttm_bo_unref(&bo);
ba4e7d97
TH
1188
1189 return ret;
1190}
09855acb 1191EXPORT_SYMBOL(ttm_bo_init);
ba4e7d97 1192
57de4ba9
JG
1193size_t ttm_bo_acc_size(struct ttm_bo_device *bdev,
1194 unsigned long bo_size,
1195 unsigned struct_size)
ba4e7d97 1196{
57de4ba9
JG
1197 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1198 size_t size = 0;
ba4e7d97 1199
57de4ba9 1200 size += ttm_round_pot(struct_size);
85621630 1201 size += ttm_round_pot(npages * sizeof(void *));
57de4ba9
JG
1202 size += ttm_round_pot(sizeof(struct ttm_tt));
1203 return size;
ba4e7d97 1204}
57de4ba9
JG
1205EXPORT_SYMBOL(ttm_bo_acc_size);
1206
1207size_t ttm_bo_dma_acc_size(struct ttm_bo_device *bdev,
1208 unsigned long bo_size,
1209 unsigned struct_size)
1210{
1211 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1212 size_t size = 0;
1213
1214 size += ttm_round_pot(struct_size);
85621630 1215 size += ttm_round_pot(npages * (2*sizeof(void *) + sizeof(dma_addr_t)));
57de4ba9
JG
1216 size += ttm_round_pot(sizeof(struct ttm_dma_tt));
1217 return size;
1218}
1219EXPORT_SYMBOL(ttm_bo_dma_acc_size);
ba4e7d97 1220
09855acb
JG
1221int ttm_bo_create(struct ttm_bo_device *bdev,
1222 unsigned long size,
1223 enum ttm_bo_type type,
1224 struct ttm_placement *placement,
1225 uint32_t page_alignment,
09855acb 1226 bool interruptible,
5df23979 1227 struct file *persistent_swap_storage,
09855acb 1228 struct ttm_buffer_object **p_bo)
ba4e7d97
TH
1229{
1230 struct ttm_buffer_object *bo;
57de4ba9 1231 size_t acc_size;
ca262a99 1232 int ret;
ba4e7d97 1233
ba4e7d97 1234 bo = kzalloc(sizeof(*bo), GFP_KERNEL);
a393c730 1235 if (unlikely(bo == NULL))
ba4e7d97 1236 return -ENOMEM;
ba4e7d97 1237
a393c730 1238 acc_size = ttm_bo_acc_size(bdev, size, sizeof(struct ttm_buffer_object));
09855acb 1239 ret = ttm_bo_init(bdev, bo, size, type, placement, page_alignment,
0b91c4a1 1240 interruptible, persistent_swap_storage, acc_size,
f4f4e3e3 1241 NULL, NULL, NULL);
ba4e7d97
TH
1242 if (likely(ret == 0))
1243 *p_bo = bo;
1244
1245 return ret;
1246}
4d798937 1247EXPORT_SYMBOL(ttm_bo_create);
ba4e7d97 1248
ba4e7d97 1249static int ttm_bo_force_list_clean(struct ttm_bo_device *bdev,
ca262a99 1250 unsigned mem_type, bool allow_errors)
ba4e7d97 1251{
ca262a99 1252 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
a987fcaa 1253 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97 1254 int ret;
ba4e7d97
TH
1255
1256 /*
1257 * Can't use standard list traversal since we're unlocking.
1258 */
1259
a987fcaa 1260 spin_lock(&glob->lru_lock);
ca262a99 1261 while (!list_empty(&man->lru)) {
a987fcaa 1262 spin_unlock(&glob->lru_lock);
e300180f 1263 ret = ttm_mem_evict_first(bdev, mem_type, NULL, false, false);
ca262a99
JG
1264 if (ret) {
1265 if (allow_errors) {
1266 return ret;
1267 } else {
25d0479a 1268 pr_err("Cleanup eviction failed\n");
ca262a99
JG
1269 }
1270 }
a987fcaa 1271 spin_lock(&glob->lru_lock);
ba4e7d97 1272 }
a987fcaa 1273 spin_unlock(&glob->lru_lock);
ba4e7d97
TH
1274 return 0;
1275}
1276
1277int ttm_bo_clean_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1278{
c96e7c7a 1279 struct ttm_mem_type_manager *man;
ba4e7d97
TH
1280 int ret = -EINVAL;
1281
1282 if (mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1283 pr_err("Illegal memory type %d\n", mem_type);
ba4e7d97
TH
1284 return ret;
1285 }
c96e7c7a 1286 man = &bdev->man[mem_type];
ba4e7d97
TH
1287
1288 if (!man->has_type) {
25d0479a
JP
1289 pr_err("Trying to take down uninitialized memory manager type %u\n",
1290 mem_type);
ba4e7d97
TH
1291 return ret;
1292 }
1293
1294 man->use_type = false;
1295 man->has_type = false;
1296
1297 ret = 0;
1298 if (mem_type > 0) {
ca262a99 1299 ttm_bo_force_list_clean(bdev, mem_type, false);
ba4e7d97 1300
d961db75 1301 ret = (*man->func->takedown)(man);
ba4e7d97
TH
1302 }
1303
1304 return ret;
1305}
1306EXPORT_SYMBOL(ttm_bo_clean_mm);
1307
1308int ttm_bo_evict_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1309{
1310 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
1311
1312 if (mem_type == 0 || mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1313 pr_err("Illegal memory manager memory type %u\n", mem_type);
ba4e7d97
TH
1314 return -EINVAL;
1315 }
1316
1317 if (!man->has_type) {
25d0479a 1318 pr_err("Memory type %u has not been initialized\n", mem_type);
ba4e7d97
TH
1319 return 0;
1320 }
1321
ca262a99 1322 return ttm_bo_force_list_clean(bdev, mem_type, true);
ba4e7d97
TH
1323}
1324EXPORT_SYMBOL(ttm_bo_evict_mm);
1325
1326int ttm_bo_init_mm(struct ttm_bo_device *bdev, unsigned type,
ca262a99 1327 unsigned long p_size)
ba4e7d97
TH
1328{
1329 int ret = -EINVAL;
1330 struct ttm_mem_type_manager *man;
1331
dbc4a5b8 1332 BUG_ON(type >= TTM_NUM_MEM_TYPES);
ba4e7d97 1333 man = &bdev->man[type];
dbc4a5b8 1334 BUG_ON(man->has_type);
eba67093
TH
1335 man->io_reserve_fastpath = true;
1336 man->use_io_reserve_lru = false;
1337 mutex_init(&man->io_reserve_mutex);
1338 INIT_LIST_HEAD(&man->io_reserve_lru);
ba4e7d97
TH
1339
1340 ret = bdev->driver->init_mem_type(bdev, type, man);
1341 if (ret)
1342 return ret;
d961db75 1343 man->bdev = bdev;
ba4e7d97
TH
1344
1345 ret = 0;
1346 if (type != TTM_PL_SYSTEM) {
d961db75 1347 ret = (*man->func->init)(man, p_size);
ba4e7d97
TH
1348 if (ret)
1349 return ret;
1350 }
1351 man->has_type = true;
1352 man->use_type = true;
1353 man->size = p_size;
1354
1355 INIT_LIST_HEAD(&man->lru);
1356
1357 return 0;
1358}
1359EXPORT_SYMBOL(ttm_bo_init_mm);
1360
a987fcaa
TH
1361static void ttm_bo_global_kobj_release(struct kobject *kobj)
1362{
1363 struct ttm_bo_global *glob =
1364 container_of(kobj, struct ttm_bo_global, kobj);
1365
a987fcaa
TH
1366 ttm_mem_unregister_shrink(glob->mem_glob, &glob->shrink);
1367 __free_page(glob->dummy_read_page);
1368 kfree(glob);
1369}
1370
ba4420c2 1371void ttm_bo_global_release(struct drm_global_reference *ref)
a987fcaa
TH
1372{
1373 struct ttm_bo_global *glob = ref->object;
1374
1375 kobject_del(&glob->kobj);
1376 kobject_put(&glob->kobj);
1377}
1378EXPORT_SYMBOL(ttm_bo_global_release);
1379
ba4420c2 1380int ttm_bo_global_init(struct drm_global_reference *ref)
a987fcaa
TH
1381{
1382 struct ttm_bo_global_ref *bo_ref =
1383 container_of(ref, struct ttm_bo_global_ref, ref);
1384 struct ttm_bo_global *glob = ref->object;
1385 int ret;
1386
1387 mutex_init(&glob->device_list_mutex);
1388 spin_lock_init(&glob->lru_lock);
1389 glob->mem_glob = bo_ref->mem_glob;
1390 glob->dummy_read_page = alloc_page(__GFP_ZERO | GFP_DMA32);
1391
1392 if (unlikely(glob->dummy_read_page == NULL)) {
1393 ret = -ENOMEM;
1394 goto out_no_drp;
1395 }
1396
1397 INIT_LIST_HEAD(&glob->swap_lru);
1398 INIT_LIST_HEAD(&glob->device_list);
1399
1400 ttm_mem_init_shrink(&glob->shrink, ttm_bo_swapout);
1401 ret = ttm_mem_register_shrink(glob->mem_glob, &glob->shrink);
1402 if (unlikely(ret != 0)) {
25d0479a 1403 pr_err("Could not register buffer object swapout\n");
a987fcaa
TH
1404 goto out_no_shrink;
1405 }
1406
a987fcaa
TH
1407 atomic_set(&glob->bo_count, 0);
1408
b642ed06
RD
1409 ret = kobject_init_and_add(
1410 &glob->kobj, &ttm_bo_glob_kobj_type, ttm_get_kobj(), "buffer_objects");
a987fcaa
TH
1411 if (unlikely(ret != 0))
1412 kobject_put(&glob->kobj);
1413 return ret;
1414out_no_shrink:
1415 __free_page(glob->dummy_read_page);
1416out_no_drp:
1417 kfree(glob);
1418 return ret;
1419}
1420EXPORT_SYMBOL(ttm_bo_global_init);
1421
1422
ba4e7d97
TH
1423int ttm_bo_device_release(struct ttm_bo_device *bdev)
1424{
1425 int ret = 0;
1426 unsigned i = TTM_NUM_MEM_TYPES;
1427 struct ttm_mem_type_manager *man;
a987fcaa 1428 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97
TH
1429
1430 while (i--) {
1431 man = &bdev->man[i];
1432 if (man->has_type) {
1433 man->use_type = false;
1434 if ((i != TTM_PL_SYSTEM) && ttm_bo_clean_mm(bdev, i)) {
1435 ret = -EBUSY;
25d0479a
JP
1436 pr_err("DRM memory manager type %d is not clean\n",
1437 i);
ba4e7d97
TH
1438 }
1439 man->has_type = false;
1440 }
1441 }
1442
a987fcaa
TH
1443 mutex_lock(&glob->device_list_mutex);
1444 list_del(&bdev->device_list);
1445 mutex_unlock(&glob->device_list_mutex);
1446
f094cfc6 1447 cancel_delayed_work_sync(&bdev->wq);
ba4e7d97
TH
1448
1449 while (ttm_bo_delayed_delete(bdev, true))
1450 ;
1451
a987fcaa 1452 spin_lock(&glob->lru_lock);
ba4e7d97
TH
1453 if (list_empty(&bdev->ddestroy))
1454 TTM_DEBUG("Delayed destroy list was clean\n");
1455
1456 if (list_empty(&bdev->man[0].lru))
1457 TTM_DEBUG("Swap list was clean\n");
a987fcaa 1458 spin_unlock(&glob->lru_lock);
ba4e7d97 1459
72525b3f 1460 drm_vma_offset_manager_destroy(&bdev->vma_manager);
ba4e7d97 1461
ba4e7d97
TH
1462 return ret;
1463}
1464EXPORT_SYMBOL(ttm_bo_device_release);
1465
ba4e7d97 1466int ttm_bo_device_init(struct ttm_bo_device *bdev,
a987fcaa
TH
1467 struct ttm_bo_global *glob,
1468 struct ttm_bo_driver *driver,
44d847b7 1469 struct address_space *mapping,
51c8b407 1470 uint64_t file_page_offset,
ad49f501 1471 bool need_dma32)
ba4e7d97
TH
1472{
1473 int ret = -EINVAL;
1474
ba4e7d97 1475 bdev->driver = driver;
ba4e7d97
TH
1476
1477 memset(bdev->man, 0, sizeof(bdev->man));
1478
ba4e7d97
TH
1479 /*
1480 * Initialize the system memory buffer type.
1481 * Other types need to be driver / IOCTL initialized.
1482 */
ca262a99 1483 ret = ttm_bo_init_mm(bdev, TTM_PL_SYSTEM, 0);
ba4e7d97 1484 if (unlikely(ret != 0))
a987fcaa 1485 goto out_no_sys;
ba4e7d97 1486
72525b3f
DH
1487 drm_vma_offset_manager_init(&bdev->vma_manager, file_page_offset,
1488 0x10000000);
ba4e7d97 1489 INIT_DELAYED_WORK(&bdev->wq, ttm_bo_delayed_workqueue);
ba4e7d97 1490 INIT_LIST_HEAD(&bdev->ddestroy);
44d847b7 1491 bdev->dev_mapping = mapping;
a987fcaa 1492 bdev->glob = glob;
ad49f501 1493 bdev->need_dma32 = need_dma32;
a987fcaa
TH
1494 mutex_lock(&glob->device_list_mutex);
1495 list_add_tail(&bdev->device_list, &glob->device_list);
1496 mutex_unlock(&glob->device_list_mutex);
ba4e7d97
TH
1497
1498 return 0;
a987fcaa 1499out_no_sys:
ba4e7d97
TH
1500 return ret;
1501}
1502EXPORT_SYMBOL(ttm_bo_device_init);
1503
1504/*
1505 * buffer object vm functions.
1506 */
1507
1508bool ttm_mem_reg_is_pci(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
1509{
1510 struct ttm_mem_type_manager *man = &bdev->man[mem->mem_type];
1511
1512 if (!(man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
1513 if (mem->mem_type == TTM_PL_SYSTEM)
1514 return false;
1515
1516 if (man->flags & TTM_MEMTYPE_FLAG_CMA)
1517 return false;
1518
1519 if (mem->placement & TTM_PL_FLAG_CACHED)
1520 return false;
1521 }
1522 return true;
1523}
1524
eba67093 1525void ttm_bo_unmap_virtual_locked(struct ttm_buffer_object *bo)
ba4e7d97
TH
1526{
1527 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 1528
51335df9 1529 drm_vma_node_unmap(&bo->vma_node, bdev->dev_mapping);
eba67093 1530 ttm_mem_io_free_vm(bo);
ba4e7d97 1531}
eba67093
TH
1532
1533void ttm_bo_unmap_virtual(struct ttm_buffer_object *bo)
1534{
1535 struct ttm_bo_device *bdev = bo->bdev;
1536 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
1537
1538 ttm_mem_io_lock(man, false);
1539 ttm_bo_unmap_virtual_locked(bo);
1540 ttm_mem_io_unlock(man);
ba4e7d97 1541}
eba67093
TH
1542
1543
e024e110 1544EXPORT_SYMBOL(ttm_bo_unmap_virtual);
ba4e7d97 1545
ba4e7d97 1546int ttm_bo_wait(struct ttm_buffer_object *bo,
8aa6d4fc 1547 bool interruptible, bool no_wait)
ba4e7d97 1548{
f2c24b83
ML
1549 struct reservation_object_list *fobj;
1550 struct reservation_object *resv;
1551 struct fence *excl;
1552 long timeout = 15 * HZ;
1553 int i;
7040138f 1554
f2c24b83
ML
1555 resv = bo->resv;
1556 fobj = reservation_object_get_list(resv);
1557 excl = reservation_object_get_excl(resv);
1558 if (excl) {
1559 if (!fence_is_signaled(excl)) {
1560 if (no_wait)
1561 return -EBUSY;
ba4e7d97 1562
f2c24b83
ML
1563 timeout = fence_wait_timeout(excl,
1564 interruptible, timeout);
ba4e7d97 1565 }
f2c24b83 1566 }
ba4e7d97 1567
f2c24b83
ML
1568 for (i = 0; fobj && timeout > 0 && i < fobj->shared_count; ++i) {
1569 struct fence *fence;
1570 fence = rcu_dereference_protected(fobj->shared[i],
1571 reservation_object_held(resv));
ba4e7d97 1572
f2c24b83
ML
1573 if (!fence_is_signaled(fence)) {
1574 if (no_wait)
1575 return -EBUSY;
dd7cfd64 1576
f2c24b83
ML
1577 timeout = fence_wait_timeout(fence,
1578 interruptible, timeout);
ba4e7d97
TH
1579 }
1580 }
f2c24b83
ML
1581
1582 if (timeout < 0)
1583 return timeout;
1584
1585 if (timeout == 0)
1586 return -EBUSY;
1587
1588 reservation_object_add_excl_fence(resv, NULL);
f2c24b83 1589 return 0;
ba4e7d97
TH
1590}
1591EXPORT_SYMBOL(ttm_bo_wait);
1592
ba4e7d97
TH
1593int ttm_bo_synccpu_write_grab(struct ttm_buffer_object *bo, bool no_wait)
1594{
1595 int ret = 0;
1596
1597 /*
8cfe92d6 1598 * Using ttm_bo_reserve makes sure the lru lists are updated.
ba4e7d97
TH
1599 */
1600
dfd5e50e 1601 ret = ttm_bo_reserve(bo, true, no_wait, NULL);
ba4e7d97
TH
1602 if (unlikely(ret != 0))
1603 return ret;
8aa6d4fc 1604 ret = ttm_bo_wait(bo, true, no_wait);
ba4e7d97
TH
1605 if (likely(ret == 0))
1606 atomic_inc(&bo->cpu_writers);
1607 ttm_bo_unreserve(bo);
1608 return ret;
1609}
d1ede145 1610EXPORT_SYMBOL(ttm_bo_synccpu_write_grab);
ba4e7d97
TH
1611
1612void ttm_bo_synccpu_write_release(struct ttm_buffer_object *bo)
1613{
654aa792 1614 atomic_dec(&bo->cpu_writers);
ba4e7d97 1615}
d1ede145 1616EXPORT_SYMBOL(ttm_bo_synccpu_write_release);
ba4e7d97
TH
1617
1618/**
1619 * A buffer object shrink method that tries to swap out the first
1620 * buffer object on the bo_global::swap_lru list.
1621 */
1622
1623static int ttm_bo_swapout(struct ttm_mem_shrink *shrink)
1624{
a987fcaa
TH
1625 struct ttm_bo_global *glob =
1626 container_of(shrink, struct ttm_bo_global, shrink);
ba4e7d97
TH
1627 struct ttm_buffer_object *bo;
1628 int ret = -EBUSY;
1629 int put_count;
1630 uint32_t swap_placement = (TTM_PL_FLAG_CACHED | TTM_PL_FLAG_SYSTEM);
1631
a987fcaa 1632 spin_lock(&glob->lru_lock);
2b7b3ad2 1633 list_for_each_entry(bo, &glob->swap_lru, swap) {
dfd5e50e 1634 ret = __ttm_bo_reserve(bo, false, true, NULL);
2b7b3ad2
ML
1635 if (!ret)
1636 break;
1637 }
85b144f8 1638
2b7b3ad2
ML
1639 if (ret) {
1640 spin_unlock(&glob->lru_lock);
1641 return ret;
1642 }
e1efc9b6 1643
2b7b3ad2 1644 kref_get(&bo->list_kref);
ba4e7d97 1645
2b7b3ad2
ML
1646 if (!list_empty(&bo->ddestroy)) {
1647 ret = ttm_bo_cleanup_refs_and_unlock(bo, false, false);
1648 kref_put(&bo->list_kref, ttm_bo_release_list);
1649 return ret;
ba4e7d97
TH
1650 }
1651
ba4e7d97 1652 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 1653 spin_unlock(&glob->lru_lock);
ba4e7d97 1654
d6ea8886 1655 ttm_bo_list_ref_sub(bo, put_count, true);
ba4e7d97
TH
1656
1657 /**
61ede070 1658 * Move to system cached
ba4e7d97
TH
1659 */
1660
ba4e7d97
TH
1661 if ((bo->mem.placement & swap_placement) != swap_placement) {
1662 struct ttm_mem_reg evict_mem;
1663
1664 evict_mem = bo->mem;
1665 evict_mem.mm_node = NULL;
1666 evict_mem.placement = TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED;
1667 evict_mem.mem_type = TTM_PL_SYSTEM;
1668
1669 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true,
97a875cb 1670 false, false);
ba4e7d97
TH
1671 if (unlikely(ret != 0))
1672 goto out;
1673 }
1674
61ede070
CK
1675 /**
1676 * Make sure BO is idle.
1677 */
1678
1679 ret = ttm_bo_wait(bo, false, false);
1680 if (unlikely(ret != 0))
1681 goto out;
1682
ba4e7d97
TH
1683 ttm_bo_unmap_virtual(bo);
1684
1685 /**
1686 * Swap out. Buffer will be swapped in again as soon as
1687 * anyone tries to access a ttm page.
1688 */
1689
3f09ea4e
TH
1690 if (bo->bdev->driver->swap_notify)
1691 bo->bdev->driver->swap_notify(bo);
1692
5df23979 1693 ret = ttm_tt_swapout(bo->ttm, bo->persistent_swap_storage);
ba4e7d97
TH
1694out:
1695
1696 /**
1697 *
1698 * Unreserve without putting on LRU to avoid swapping out an
1699 * already swapped buffer.
1700 */
1701
c7523083 1702 __ttm_bo_unreserve(bo);
ba4e7d97
TH
1703 kref_put(&bo->list_kref, ttm_bo_release_list);
1704 return ret;
1705}
1706
1707void ttm_bo_swapout_all(struct ttm_bo_device *bdev)
1708{
a987fcaa 1709 while (ttm_bo_swapout(&bdev->glob->shrink) == 0)
ba4e7d97
TH
1710 ;
1711}
e99e1e78 1712EXPORT_SYMBOL(ttm_bo_swapout_all);
c58f009e
TH
1713
1714/**
1715 * ttm_bo_wait_unreserved - interruptible wait for a buffer object to become
1716 * unreserved
1717 *
1718 * @bo: Pointer to buffer
1719 */
1720int ttm_bo_wait_unreserved(struct ttm_buffer_object *bo)
1721{
1722 int ret;
1723
1724 /*
1725 * In the absense of a wait_unlocked API,
1726 * Use the bo::wu_mutex to avoid triggering livelocks due to
1727 * concurrent use of this function. Note that this use of
1728 * bo::wu_mutex can go away if we change locking order to
1729 * mmap_sem -> bo::reserve.
1730 */
1731 ret = mutex_lock_interruptible(&bo->wu_mutex);
1732 if (unlikely(ret != 0))
1733 return -ERESTARTSYS;
1734 if (!ww_mutex_is_locked(&bo->resv->lock))
1735 goto out_unlock;
dfd5e50e 1736 ret = __ttm_bo_reserve(bo, true, false, NULL);
c58f009e
TH
1737 if (unlikely(ret != 0))
1738 goto out_unlock;
c7523083 1739 __ttm_bo_unreserve(bo);
c58f009e
TH
1740
1741out_unlock:
1742 mutex_unlock(&bo->wu_mutex);
1743 return ret;
1744}