drm/ttm: convert to unified vma offset manager
[deliverable/linux.git] / drivers / gpu / drm / ttm / ttm_bo.c
CommitLineData
ba4e7d97
TH
1/**************************************************************************
2 *
3 * Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
4 * All Rights Reserved.
5 *
6 * Permission is hereby granted, free of charge, to any person obtaining a
7 * copy of this software and associated documentation files (the
8 * "Software"), to deal in the Software without restriction, including
9 * without limitation the rights to use, copy, modify, merge, publish,
10 * distribute, sub license, and/or sell copies of the Software, and to
11 * permit persons to whom the Software is furnished to do so, subject to
12 * the following conditions:
13 *
14 * The above copyright notice and this permission notice (including the
15 * next paragraph) shall be included in all copies or substantial portions
16 * of the Software.
17 *
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
21 * THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
22 * DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
23 * OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
24 * USE OR OTHER DEALINGS IN THE SOFTWARE.
25 *
26 **************************************************************************/
27/*
28 * Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
29 */
30
25d0479a
JP
31#define pr_fmt(fmt) "[TTM] " fmt
32
760285e7
DH
33#include <drm/ttm/ttm_module.h>
34#include <drm/ttm/ttm_bo_driver.h>
35#include <drm/ttm/ttm_placement.h>
ba4e7d97
TH
36#include <linux/jiffies.h>
37#include <linux/slab.h>
38#include <linux/sched.h>
39#include <linux/mm.h>
40#include <linux/file.h>
41#include <linux/module.h>
60063497 42#include <linux/atomic.h>
ba4e7d97
TH
43
44#define TTM_ASSERT_LOCKED(param)
45#define TTM_DEBUG(fmt, arg...)
46#define TTM_BO_HASH_ORDER 13
47
48static int ttm_bo_setup_vm(struct ttm_buffer_object *bo);
ba4e7d97 49static int ttm_bo_swapout(struct ttm_mem_shrink *shrink);
a987fcaa
TH
50static void ttm_bo_global_kobj_release(struct kobject *kobj);
51
52static struct attribute ttm_bo_count = {
53 .name = "bo_count",
54 .mode = S_IRUGO
55};
56
fb53f862
JG
57static inline int ttm_mem_type_from_flags(uint32_t flags, uint32_t *mem_type)
58{
59 int i;
60
61 for (i = 0; i <= TTM_PL_PRIV5; i++)
62 if (flags & (1 << i)) {
63 *mem_type = i;
64 return 0;
65 }
66 return -EINVAL;
67}
68
5012f506 69static void ttm_mem_type_debug(struct ttm_bo_device *bdev, int mem_type)
fb53f862 70{
5012f506
JG
71 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
72
25d0479a
JP
73 pr_err(" has_type: %d\n", man->has_type);
74 pr_err(" use_type: %d\n", man->use_type);
75 pr_err(" flags: 0x%08X\n", man->flags);
76 pr_err(" gpu_offset: 0x%08lX\n", man->gpu_offset);
77 pr_err(" size: %llu\n", man->size);
78 pr_err(" available_caching: 0x%08X\n", man->available_caching);
79 pr_err(" default_caching: 0x%08X\n", man->default_caching);
d961db75
BS
80 if (mem_type != TTM_PL_SYSTEM)
81 (*man->func->debug)(man, TTM_PFX);
fb53f862
JG
82}
83
84static void ttm_bo_mem_space_debug(struct ttm_buffer_object *bo,
85 struct ttm_placement *placement)
86{
fb53f862
JG
87 int i, ret, mem_type;
88
25d0479a
JP
89 pr_err("No space for %p (%lu pages, %luK, %luM)\n",
90 bo, bo->mem.num_pages, bo->mem.size >> 10,
91 bo->mem.size >> 20);
fb53f862
JG
92 for (i = 0; i < placement->num_placement; i++) {
93 ret = ttm_mem_type_from_flags(placement->placement[i],
94 &mem_type);
95 if (ret)
96 return;
25d0479a
JP
97 pr_err(" placement[%d]=0x%08X (%d)\n",
98 i, placement->placement[i], mem_type);
5012f506 99 ttm_mem_type_debug(bo->bdev, mem_type);
fb53f862
JG
100 }
101}
102
a987fcaa
TH
103static ssize_t ttm_bo_global_show(struct kobject *kobj,
104 struct attribute *attr,
105 char *buffer)
106{
107 struct ttm_bo_global *glob =
108 container_of(kobj, struct ttm_bo_global, kobj);
109
110 return snprintf(buffer, PAGE_SIZE, "%lu\n",
111 (unsigned long) atomic_read(&glob->bo_count));
112}
113
114static struct attribute *ttm_bo_global_attrs[] = {
115 &ttm_bo_count,
116 NULL
117};
118
52cf25d0 119static const struct sysfs_ops ttm_bo_global_ops = {
a987fcaa
TH
120 .show = &ttm_bo_global_show
121};
122
123static struct kobj_type ttm_bo_glob_kobj_type = {
124 .release = &ttm_bo_global_kobj_release,
125 .sysfs_ops = &ttm_bo_global_ops,
126 .default_attrs = ttm_bo_global_attrs
127};
128
ba4e7d97
TH
129
130static inline uint32_t ttm_bo_type_flags(unsigned type)
131{
132 return 1 << (type);
133}
134
135static void ttm_bo_release_list(struct kref *list_kref)
136{
137 struct ttm_buffer_object *bo =
138 container_of(list_kref, struct ttm_buffer_object, list_kref);
139 struct ttm_bo_device *bdev = bo->bdev;
57de4ba9 140 size_t acc_size = bo->acc_size;
ba4e7d97
TH
141
142 BUG_ON(atomic_read(&bo->list_kref.refcount));
143 BUG_ON(atomic_read(&bo->kref.refcount));
144 BUG_ON(atomic_read(&bo->cpu_writers));
145 BUG_ON(bo->sync_obj != NULL);
146 BUG_ON(bo->mem.mm_node != NULL);
147 BUG_ON(!list_empty(&bo->lru));
148 BUG_ON(!list_empty(&bo->ddestroy));
149
150 if (bo->ttm)
151 ttm_tt_destroy(bo->ttm);
a987fcaa 152 atomic_dec(&bo->glob->bo_count);
5e338405
ML
153 if (bo->resv == &bo->ttm_resv)
154 reservation_object_fini(&bo->ttm_resv);
155
ba4e7d97
TH
156 if (bo->destroy)
157 bo->destroy(bo);
158 else {
ba4e7d97
TH
159 kfree(bo);
160 }
57de4ba9 161 ttm_mem_global_free(bdev->glob->mem_glob, acc_size);
ba4e7d97
TH
162}
163
d6ea8886 164void ttm_bo_add_to_lru(struct ttm_buffer_object *bo)
ba4e7d97
TH
165{
166 struct ttm_bo_device *bdev = bo->bdev;
167 struct ttm_mem_type_manager *man;
168
009a9dad 169 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
170
171 if (!(bo->mem.placement & TTM_PL_FLAG_NO_EVICT)) {
172
173 BUG_ON(!list_empty(&bo->lru));
174
175 man = &bdev->man[bo->mem.mem_type];
176 list_add_tail(&bo->lru, &man->lru);
177 kref_get(&bo->list_kref);
178
179 if (bo->ttm != NULL) {
a987fcaa 180 list_add_tail(&bo->swap, &bo->glob->swap_lru);
ba4e7d97
TH
181 kref_get(&bo->list_kref);
182 }
183 }
184}
34820324 185EXPORT_SYMBOL(ttm_bo_add_to_lru);
ba4e7d97 186
d6ea8886 187int ttm_bo_del_from_lru(struct ttm_buffer_object *bo)
ba4e7d97
TH
188{
189 int put_count = 0;
190
191 if (!list_empty(&bo->swap)) {
192 list_del_init(&bo->swap);
193 ++put_count;
194 }
195 if (!list_empty(&bo->lru)) {
196 list_del_init(&bo->lru);
197 ++put_count;
198 }
199
200 /*
201 * TODO: Add a driver hook to delete from
202 * driver-specific LRU's here.
203 */
204
205 return put_count;
206}
207
ba4e7d97
TH
208static void ttm_bo_ref_bug(struct kref *list_kref)
209{
210 BUG();
211}
212
d6ea8886
DA
213void ttm_bo_list_ref_sub(struct ttm_buffer_object *bo, int count,
214 bool never_free)
215{
2357cbe5
TH
216 kref_sub(&bo->list_kref, count,
217 (never_free) ? ttm_bo_ref_bug : ttm_bo_release_list);
d6ea8886
DA
218}
219
34820324 220void ttm_bo_del_sub_from_lru(struct ttm_buffer_object *bo)
5e45d7df 221{
34820324 222 int put_count;
ecff665f 223
34820324
ML
224 spin_lock(&bo->glob->lru_lock);
225 put_count = ttm_bo_del_from_lru(bo);
226 spin_unlock(&bo->glob->lru_lock);
227 ttm_bo_list_ref_sub(bo, put_count, true);
ecff665f 228}
34820324 229EXPORT_SYMBOL(ttm_bo_del_sub_from_lru);
ecff665f 230
ba4e7d97
TH
231/*
232 * Call bo->mutex locked.
233 */
ba4e7d97
TH
234static int ttm_bo_add_ttm(struct ttm_buffer_object *bo, bool zero_alloc)
235{
236 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 237 struct ttm_bo_global *glob = bo->glob;
ba4e7d97
TH
238 int ret = 0;
239 uint32_t page_flags = 0;
240
241 TTM_ASSERT_LOCKED(&bo->mutex);
242 bo->ttm = NULL;
243
ad49f501
DA
244 if (bdev->need_dma32)
245 page_flags |= TTM_PAGE_FLAG_DMA32;
246
ba4e7d97
TH
247 switch (bo->type) {
248 case ttm_bo_type_device:
249 if (zero_alloc)
250 page_flags |= TTM_PAGE_FLAG_ZERO_ALLOC;
251 case ttm_bo_type_kernel:
649bf3ca
JG
252 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
253 page_flags, glob->dummy_read_page);
ba4e7d97
TH
254 if (unlikely(bo->ttm == NULL))
255 ret = -ENOMEM;
256 break;
129b78bf
DA
257 case ttm_bo_type_sg:
258 bo->ttm = bdev->driver->ttm_tt_create(bdev, bo->num_pages << PAGE_SHIFT,
259 page_flags | TTM_PAGE_FLAG_SG,
260 glob->dummy_read_page);
261 if (unlikely(bo->ttm == NULL)) {
262 ret = -ENOMEM;
263 break;
264 }
265 bo->ttm->sg = bo->sg;
266 break;
ba4e7d97 267 default:
25d0479a 268 pr_err("Illegal buffer object type\n");
ba4e7d97
TH
269 ret = -EINVAL;
270 break;
271 }
272
273 return ret;
274}
275
276static int ttm_bo_handle_move_mem(struct ttm_buffer_object *bo,
277 struct ttm_mem_reg *mem,
9d87fa21 278 bool evict, bool interruptible,
97a875cb 279 bool no_wait_gpu)
ba4e7d97
TH
280{
281 struct ttm_bo_device *bdev = bo->bdev;
282 bool old_is_pci = ttm_mem_reg_is_pci(bdev, &bo->mem);
283 bool new_is_pci = ttm_mem_reg_is_pci(bdev, mem);
284 struct ttm_mem_type_manager *old_man = &bdev->man[bo->mem.mem_type];
285 struct ttm_mem_type_manager *new_man = &bdev->man[mem->mem_type];
286 int ret = 0;
287
288 if (old_is_pci || new_is_pci ||
eba67093
TH
289 ((mem->placement & bo->mem.placement & TTM_PL_MASK_CACHING) == 0)) {
290 ret = ttm_mem_io_lock(old_man, true);
291 if (unlikely(ret != 0))
292 goto out_err;
293 ttm_bo_unmap_virtual_locked(bo);
294 ttm_mem_io_unlock(old_man);
295 }
ba4e7d97
TH
296
297 /*
298 * Create and bind a ttm if required.
299 */
300
8d3bb236
BS
301 if (!(new_man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
302 if (bo->ttm == NULL) {
ff02b13f
BS
303 bool zero = !(old_man->flags & TTM_MEMTYPE_FLAG_FIXED);
304 ret = ttm_bo_add_ttm(bo, zero);
8d3bb236
BS
305 if (ret)
306 goto out_err;
307 }
ba4e7d97
TH
308
309 ret = ttm_tt_set_placement_caching(bo->ttm, mem->placement);
310 if (ret)
87ef9209 311 goto out_err;
ba4e7d97
TH
312
313 if (mem->mem_type != TTM_PL_SYSTEM) {
314 ret = ttm_tt_bind(bo->ttm, mem);
315 if (ret)
316 goto out_err;
317 }
318
319 if (bo->mem.mem_type == TTM_PL_SYSTEM) {
82ef594e
BS
320 if (bdev->driver->move_notify)
321 bdev->driver->move_notify(bo, mem);
ca262a99 322 bo->mem = *mem;
ba4e7d97 323 mem->mm_node = NULL;
ba4e7d97
TH
324 goto moved;
325 }
ba4e7d97
TH
326 }
327
9f1feed2
BS
328 if (bdev->driver->move_notify)
329 bdev->driver->move_notify(bo, mem);
330
ba4e7d97
TH
331 if (!(old_man->flags & TTM_MEMTYPE_FLAG_FIXED) &&
332 !(new_man->flags & TTM_MEMTYPE_FLAG_FIXED))
97a875cb 333 ret = ttm_bo_move_ttm(bo, evict, no_wait_gpu, mem);
ba4e7d97
TH
334 else if (bdev->driver->move)
335 ret = bdev->driver->move(bo, evict, interruptible,
97a875cb 336 no_wait_gpu, mem);
ba4e7d97 337 else
97a875cb 338 ret = ttm_bo_move_memcpy(bo, evict, no_wait_gpu, mem);
ba4e7d97 339
9f1feed2
BS
340 if (ret) {
341 if (bdev->driver->move_notify) {
342 struct ttm_mem_reg tmp_mem = *mem;
343 *mem = bo->mem;
344 bo->mem = tmp_mem;
345 bdev->driver->move_notify(bo, mem);
346 bo->mem = *mem;
014b3440 347 *mem = tmp_mem;
9f1feed2 348 }
ba4e7d97 349
9f1feed2
BS
350 goto out_err;
351 }
dc97b340 352
ba4e7d97
TH
353moved:
354 if (bo->evicted) {
355 ret = bdev->driver->invalidate_caches(bdev, bo->mem.placement);
356 if (ret)
25d0479a 357 pr_err("Can not flush read caches\n");
ba4e7d97
TH
358 bo->evicted = false;
359 }
360
361 if (bo->mem.mm_node) {
d961db75 362 bo->offset = (bo->mem.start << PAGE_SHIFT) +
ba4e7d97
TH
363 bdev->man[bo->mem.mem_type].gpu_offset;
364 bo->cur_placement = bo->mem.placement;
354fb52c
TH
365 } else
366 bo->offset = 0;
ba4e7d97
TH
367
368 return 0;
369
370out_err:
371 new_man = &bdev->man[bo->mem.mem_type];
372 if ((new_man->flags & TTM_MEMTYPE_FLAG_FIXED) && bo->ttm) {
373 ttm_tt_unbind(bo->ttm);
374 ttm_tt_destroy(bo->ttm);
375 bo->ttm = NULL;
376 }
377
378 return ret;
379}
380
1df6a2eb 381/**
40d857bb 382 * Call bo::reserved.
1df6a2eb 383 * Will release GPU memory type usage on destruction.
40d857bb
TH
384 * This is the place to put in driver specific hooks to release
385 * driver private resources.
386 * Will release the bo::reserved lock.
1df6a2eb
TH
387 */
388
389static void ttm_bo_cleanup_memtype_use(struct ttm_buffer_object *bo)
390{
dc97b340
JG
391 if (bo->bdev->driver->move_notify)
392 bo->bdev->driver->move_notify(bo, NULL);
393
1df6a2eb 394 if (bo->ttm) {
1df6a2eb
TH
395 ttm_tt_unbind(bo->ttm);
396 ttm_tt_destroy(bo->ttm);
397 bo->ttm = NULL;
1df6a2eb 398 }
40d857bb 399 ttm_bo_mem_put(bo, &bo->mem);
1df6a2eb 400
5e338405 401 ww_mutex_unlock (&bo->resv->lock);
1df6a2eb
TH
402}
403
e1efc9b6 404static void ttm_bo_cleanup_refs_or_queue(struct ttm_buffer_object *bo)
ba4e7d97
TH
405{
406 struct ttm_bo_device *bdev = bo->bdev;
a987fcaa 407 struct ttm_bo_global *glob = bo->glob;
4154f051 408 struct ttm_bo_driver *driver = bdev->driver;
aa123268 409 void *sync_obj = NULL;
e1efc9b6 410 int put_count;
ba4e7d97
TH
411 int ret;
412
4154f051 413 spin_lock(&glob->lru_lock);
63d0a419 414 ret = ttm_bo_reserve_nolru(bo, false, true, false, 0);
4154f051 415
702adba2 416 spin_lock(&bdev->fence_lock);
1717c0e2 417 (void) ttm_bo_wait(bo, false, false, true);
4154f051 418 if (!ret && !bo->sync_obj) {
702adba2 419 spin_unlock(&bdev->fence_lock);
1df6a2eb 420 put_count = ttm_bo_del_from_lru(bo);
ba4e7d97 421
40d857bb 422 spin_unlock(&glob->lru_lock);
1df6a2eb 423 ttm_bo_cleanup_memtype_use(bo);
ba4e7d97 424
d6ea8886 425 ttm_bo_list_ref_sub(bo, put_count, true);
ba4e7d97 426
e1efc9b6 427 return;
ba4e7d97 428 }
aa123268
TH
429 if (bo->sync_obj)
430 sync_obj = driver->sync_obj_ref(bo->sync_obj);
4154f051
ML
431 spin_unlock(&bdev->fence_lock);
432
5e338405
ML
433 if (!ret)
434 ww_mutex_unlock(&bo->resv->lock);
e1efc9b6
TH
435
436 kref_get(&bo->list_kref);
437 list_add_tail(&bo->ddestroy, &bdev->ddestroy);
438 spin_unlock(&glob->lru_lock);
e1efc9b6 439
aa123268 440 if (sync_obj) {
dedfdffd 441 driver->sync_obj_flush(sync_obj);
aa123268
TH
442 driver->sync_obj_unref(&sync_obj);
443 }
e1efc9b6
TH
444 schedule_delayed_work(&bdev->wq,
445 ((HZ / 100) < 1) ? 1 : HZ / 100);
446}
447
448/**
85b144f8 449 * function ttm_bo_cleanup_refs_and_unlock
e1efc9b6
TH
450 * If bo idle, remove from delayed- and lru lists, and unref.
451 * If not idle, do nothing.
452 *
85b144f8
ML
453 * Must be called with lru_lock and reservation held, this function
454 * will drop both before returning.
455 *
e1efc9b6 456 * @interruptible Any sleeps should occur interruptibly.
e1efc9b6
TH
457 * @no_wait_gpu Never wait for gpu. Return -EBUSY instead.
458 */
459
85b144f8
ML
460static int ttm_bo_cleanup_refs_and_unlock(struct ttm_buffer_object *bo,
461 bool interruptible,
462 bool no_wait_gpu)
e1efc9b6 463{
702adba2 464 struct ttm_bo_device *bdev = bo->bdev;
85b144f8 465 struct ttm_bo_driver *driver = bdev->driver;
e1efc9b6
TH
466 struct ttm_bo_global *glob = bo->glob;
467 int put_count;
85b144f8 468 int ret;
e1efc9b6 469
702adba2 470 spin_lock(&bdev->fence_lock);
85b144f8 471 ret = ttm_bo_wait(bo, false, false, true);
e1efc9b6 472
85b144f8
ML
473 if (ret && !no_wait_gpu) {
474 void *sync_obj;
e1efc9b6 475
85b144f8
ML
476 /*
477 * Take a reference to the fence and unreserve,
478 * at this point the buffer should be dead, so
479 * no new sync objects can be attached.
480 */
0953e76e 481 sync_obj = driver->sync_obj_ref(bo->sync_obj);
85b144f8 482 spin_unlock(&bdev->fence_lock);
26cc40a8 483
5e338405 484 ww_mutex_unlock(&bo->resv->lock);
26cc40a8 485 spin_unlock(&glob->lru_lock);
26cc40a8 486
85b144f8
ML
487 ret = driver->sync_obj_wait(sync_obj, false, interruptible);
488 driver->sync_obj_unref(&sync_obj);
489 if (ret)
b8e902f2
TH
490 return ret;
491
85b144f8
ML
492 /*
493 * remove sync_obj with ttm_bo_wait, the wait should be
494 * finished, and no new wait object should have been added.
495 */
496 spin_lock(&bdev->fence_lock);
497 ret = ttm_bo_wait(bo, false, false, true);
498 WARN_ON(ret);
499 spin_unlock(&bdev->fence_lock);
500 if (ret)
501 return ret;
ba4e7d97 502
85b144f8 503 spin_lock(&glob->lru_lock);
63d0a419 504 ret = ttm_bo_reserve_nolru(bo, false, true, false, 0);
b8e902f2 505
85b144f8
ML
506 /*
507 * We raced, and lost, someone else holds the reservation now,
508 * and is probably busy in ttm_bo_cleanup_memtype_use.
509 *
510 * Even if it's not the case, because we finished waiting any
511 * delayed destruction would succeed, so just return success
512 * here.
513 */
514 if (ret) {
515 spin_unlock(&glob->lru_lock);
516 return 0;
517 }
518 } else
519 spin_unlock(&bdev->fence_lock);
ba4e7d97 520
85b144f8 521 if (ret || unlikely(list_empty(&bo->ddestroy))) {
5e338405 522 ww_mutex_unlock(&bo->resv->lock);
a987fcaa 523 spin_unlock(&glob->lru_lock);
85b144f8 524 return ret;
ba4e7d97
TH
525 }
526
e1efc9b6
TH
527 put_count = ttm_bo_del_from_lru(bo);
528 list_del_init(&bo->ddestroy);
529 ++put_count;
530
531 spin_unlock(&glob->lru_lock);
532 ttm_bo_cleanup_memtype_use(bo);
533
d6ea8886 534 ttm_bo_list_ref_sub(bo, put_count, true);
e1efc9b6
TH
535
536 return 0;
ba4e7d97
TH
537}
538
539/**
540 * Traverse the delayed list, and call ttm_bo_cleanup_refs on all
541 * encountered buffers.
542 */
543
544static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all)
545{
a987fcaa 546 struct ttm_bo_global *glob = bdev->glob;
1a961ce0
LB
547 struct ttm_buffer_object *entry = NULL;
548 int ret = 0;
ba4e7d97 549
a987fcaa 550 spin_lock(&glob->lru_lock);
1a961ce0
LB
551 if (list_empty(&bdev->ddestroy))
552 goto out_unlock;
553
554 entry = list_first_entry(&bdev->ddestroy,
555 struct ttm_buffer_object, ddestroy);
556 kref_get(&entry->list_kref);
557
558 for (;;) {
559 struct ttm_buffer_object *nentry = NULL;
560
561 if (entry->ddestroy.next != &bdev->ddestroy) {
562 nentry = list_first_entry(&entry->ddestroy,
563 struct ttm_buffer_object, ddestroy);
ba4e7d97
TH
564 kref_get(&nentry->list_kref);
565 }
ba4e7d97 566
63d0a419
ML
567 ret = ttm_bo_reserve_nolru(entry, false, true, false, 0);
568 if (remove_all && ret) {
569 spin_unlock(&glob->lru_lock);
570 ret = ttm_bo_reserve_nolru(entry, false, false,
571 false, 0);
572 spin_lock(&glob->lru_lock);
573 }
574
85b144f8
ML
575 if (!ret)
576 ret = ttm_bo_cleanup_refs_and_unlock(entry, false,
577 !remove_all);
578 else
579 spin_unlock(&glob->lru_lock);
580
ba4e7d97 581 kref_put(&entry->list_kref, ttm_bo_release_list);
1a961ce0
LB
582 entry = nentry;
583
584 if (ret || !entry)
585 goto out;
ba4e7d97 586
a987fcaa 587 spin_lock(&glob->lru_lock);
1a961ce0 588 if (list_empty(&entry->ddestroy))
ba4e7d97
TH
589 break;
590 }
ba4e7d97 591
1a961ce0
LB
592out_unlock:
593 spin_unlock(&glob->lru_lock);
594out:
595 if (entry)
596 kref_put(&entry->list_kref, ttm_bo_release_list);
ba4e7d97
TH
597 return ret;
598}
599
600static void ttm_bo_delayed_workqueue(struct work_struct *work)
601{
602 struct ttm_bo_device *bdev =
603 container_of(work, struct ttm_bo_device, wq.work);
604
605 if (ttm_bo_delayed_delete(bdev, false)) {
606 schedule_delayed_work(&bdev->wq,
607 ((HZ / 100) < 1) ? 1 : HZ / 100);
608 }
609}
610
611static void ttm_bo_release(struct kref *kref)
612{
613 struct ttm_buffer_object *bo =
614 container_of(kref, struct ttm_buffer_object, kref);
615 struct ttm_bo_device *bdev = bo->bdev;
eba67093 616 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
ba4e7d97 617
72525b3f 618 drm_vma_offset_remove(&bdev->vma_manager, &bo->vma_node);
eba67093
TH
619 ttm_mem_io_lock(man, false);
620 ttm_mem_io_free_vm(bo);
621 ttm_mem_io_unlock(man);
e1efc9b6 622 ttm_bo_cleanup_refs_or_queue(bo);
ba4e7d97 623 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
624}
625
626void ttm_bo_unref(struct ttm_buffer_object **p_bo)
627{
628 struct ttm_buffer_object *bo = *p_bo;
ba4e7d97
TH
629
630 *p_bo = NULL;
ba4e7d97 631 kref_put(&bo->kref, ttm_bo_release);
ba4e7d97
TH
632}
633EXPORT_SYMBOL(ttm_bo_unref);
634
7c5ee536
MG
635int ttm_bo_lock_delayed_workqueue(struct ttm_bo_device *bdev)
636{
637 return cancel_delayed_work_sync(&bdev->wq);
638}
639EXPORT_SYMBOL(ttm_bo_lock_delayed_workqueue);
640
641void ttm_bo_unlock_delayed_workqueue(struct ttm_bo_device *bdev, int resched)
642{
643 if (resched)
644 schedule_delayed_work(&bdev->wq,
645 ((HZ / 100) < 1) ? 1 : HZ / 100);
646}
647EXPORT_SYMBOL(ttm_bo_unlock_delayed_workqueue);
648
ca262a99 649static int ttm_bo_evict(struct ttm_buffer_object *bo, bool interruptible,
97a875cb 650 bool no_wait_gpu)
ba4e7d97 651{
ba4e7d97
TH
652 struct ttm_bo_device *bdev = bo->bdev;
653 struct ttm_mem_reg evict_mem;
ca262a99
JG
654 struct ttm_placement placement;
655 int ret = 0;
ba4e7d97 656
702adba2 657 spin_lock(&bdev->fence_lock);
1717c0e2 658 ret = ttm_bo_wait(bo, false, interruptible, no_wait_gpu);
702adba2 659 spin_unlock(&bdev->fence_lock);
ba4e7d97 660
78ecf091 661 if (unlikely(ret != 0)) {
98ffc415 662 if (ret != -ERESTARTSYS) {
25d0479a 663 pr_err("Failed to expire sync object before buffer eviction\n");
78ecf091 664 }
ba4e7d97
TH
665 goto out;
666 }
667
009a9dad 668 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
669
670 evict_mem = bo->mem;
671 evict_mem.mm_node = NULL;
eba67093
TH
672 evict_mem.bus.io_reserved_vm = false;
673 evict_mem.bus.io_reserved_count = 0;
ba4e7d97 674
7cb7d1d7
JG
675 placement.fpfn = 0;
676 placement.lpfn = 0;
677 placement.num_placement = 0;
678 placement.num_busy_placement = 0;
ca262a99
JG
679 bdev->driver->evict_flags(bo, &placement);
680 ret = ttm_bo_mem_space(bo, &placement, &evict_mem, interruptible,
97a875cb 681 no_wait_gpu);
ba4e7d97 682 if (ret) {
fb53f862 683 if (ret != -ERESTARTSYS) {
25d0479a
JP
684 pr_err("Failed to find memory space for buffer 0x%p eviction\n",
685 bo);
fb53f862
JG
686 ttm_bo_mem_space_debug(bo, &placement);
687 }
ba4e7d97
TH
688 goto out;
689 }
690
691 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true, interruptible,
97a875cb 692 no_wait_gpu);
ba4e7d97 693 if (ret) {
98ffc415 694 if (ret != -ERESTARTSYS)
25d0479a 695 pr_err("Buffer eviction failed\n");
42311ff9 696 ttm_bo_mem_put(bo, &evict_mem);
ba4e7d97
TH
697 goto out;
698 }
ca262a99
JG
699 bo->evicted = true;
700out:
701 return ret;
702}
703
704static int ttm_mem_evict_first(struct ttm_bo_device *bdev,
705 uint32_t mem_type,
97a875cb 706 bool interruptible,
9d87fa21 707 bool no_wait_gpu)
ca262a99
JG
708{
709 struct ttm_bo_global *glob = bdev->glob;
710 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
711 struct ttm_buffer_object *bo;
e7ab2019 712 int ret = -EBUSY, put_count;
ba4e7d97 713
a987fcaa 714 spin_lock(&glob->lru_lock);
e7ab2019 715 list_for_each_entry(bo, &man->lru, lru) {
63d0a419 716 ret = ttm_bo_reserve_nolru(bo, false, true, false, 0);
e7ab2019
ML
717 if (!ret)
718 break;
719 }
720
721 if (ret) {
9c51ba1d 722 spin_unlock(&glob->lru_lock);
e7ab2019 723 return ret;
9c51ba1d
TH
724 }
725
ca262a99 726 kref_get(&bo->list_kref);
9c51ba1d 727
e1efc9b6 728 if (!list_empty(&bo->ddestroy)) {
e7ab2019
ML
729 ret = ttm_bo_cleanup_refs_and_unlock(bo, interruptible,
730 no_wait_gpu);
e1efc9b6 731 kref_put(&bo->list_kref, ttm_bo_release_list);
b8e902f2 732 return ret;
e1efc9b6
TH
733 }
734
9c51ba1d 735 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 736 spin_unlock(&glob->lru_lock);
9c51ba1d
TH
737
738 BUG_ON(ret != 0);
739
d6ea8886 740 ttm_bo_list_ref_sub(bo, put_count, true);
9c51ba1d 741
97a875cb 742 ret = ttm_bo_evict(bo, interruptible, no_wait_gpu);
ca262a99 743 ttm_bo_unreserve(bo);
9c51ba1d 744
ca262a99 745 kref_put(&bo->list_kref, ttm_bo_release_list);
ba4e7d97
TH
746 return ret;
747}
748
42311ff9
BS
749void ttm_bo_mem_put(struct ttm_buffer_object *bo, struct ttm_mem_reg *mem)
750{
d961db75 751 struct ttm_mem_type_manager *man = &bo->bdev->man[mem->mem_type];
42311ff9 752
d961db75
BS
753 if (mem->mm_node)
754 (*man->func->put_node)(man, mem);
42311ff9
BS
755}
756EXPORT_SYMBOL(ttm_bo_mem_put);
757
ba4e7d97
TH
758/**
759 * Repeatedly evict memory from the LRU for @mem_type until we create enough
760 * space, or we've evicted everything and there isn't enough space.
761 */
ca262a99
JG
762static int ttm_bo_mem_force_space(struct ttm_buffer_object *bo,
763 uint32_t mem_type,
764 struct ttm_placement *placement,
765 struct ttm_mem_reg *mem,
9d87fa21 766 bool interruptible,
9d87fa21 767 bool no_wait_gpu)
ba4e7d97 768{
ca262a99 769 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 770 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
ba4e7d97
TH
771 int ret;
772
ba4e7d97 773 do {
d961db75 774 ret = (*man->func->get_node)(man, bo, placement, mem);
ca262a99
JG
775 if (unlikely(ret != 0))
776 return ret;
d961db75 777 if (mem->mm_node)
ba4e7d97 778 break;
97a875cb
ML
779 ret = ttm_mem_evict_first(bdev, mem_type,
780 interruptible, no_wait_gpu);
ba4e7d97
TH
781 if (unlikely(ret != 0))
782 return ret;
ba4e7d97 783 } while (1);
d961db75 784 if (mem->mm_node == NULL)
ba4e7d97 785 return -ENOMEM;
ba4e7d97
TH
786 mem->mem_type = mem_type;
787 return 0;
788}
789
ae3e8122
TH
790static uint32_t ttm_bo_select_caching(struct ttm_mem_type_manager *man,
791 uint32_t cur_placement,
792 uint32_t proposed_placement)
793{
794 uint32_t caching = proposed_placement & TTM_PL_MASK_CACHING;
795 uint32_t result = proposed_placement & ~TTM_PL_MASK_CACHING;
796
797 /**
798 * Keep current caching if possible.
799 */
800
801 if ((cur_placement & caching) != 0)
802 result |= (cur_placement & caching);
803 else if ((man->default_caching & caching) != 0)
804 result |= man->default_caching;
805 else if ((TTM_PL_FLAG_CACHED & caching) != 0)
806 result |= TTM_PL_FLAG_CACHED;
807 else if ((TTM_PL_FLAG_WC & caching) != 0)
808 result |= TTM_PL_FLAG_WC;
809 else if ((TTM_PL_FLAG_UNCACHED & caching) != 0)
810 result |= TTM_PL_FLAG_UNCACHED;
811
812 return result;
813}
814
ba4e7d97 815static bool ttm_bo_mt_compatible(struct ttm_mem_type_manager *man,
ba4e7d97 816 uint32_t mem_type,
ae3e8122
TH
817 uint32_t proposed_placement,
818 uint32_t *masked_placement)
ba4e7d97
TH
819{
820 uint32_t cur_flags = ttm_bo_type_flags(mem_type);
821
ae3e8122 822 if ((cur_flags & proposed_placement & TTM_PL_MASK_MEM) == 0)
ba4e7d97
TH
823 return false;
824
ae3e8122 825 if ((proposed_placement & man->available_caching) == 0)
ba4e7d97 826 return false;
ba4e7d97 827
ae3e8122
TH
828 cur_flags |= (proposed_placement & man->available_caching);
829
830 *masked_placement = cur_flags;
ba4e7d97
TH
831 return true;
832}
833
834/**
835 * Creates space for memory region @mem according to its type.
836 *
837 * This function first searches for free space in compatible memory types in
838 * the priority order defined by the driver. If free space isn't found, then
839 * ttm_bo_mem_force_space is attempted in priority order to evict and find
840 * space.
841 */
842int ttm_bo_mem_space(struct ttm_buffer_object *bo,
ca262a99
JG
843 struct ttm_placement *placement,
844 struct ttm_mem_reg *mem,
97a875cb 845 bool interruptible,
9d87fa21 846 bool no_wait_gpu)
ba4e7d97
TH
847{
848 struct ttm_bo_device *bdev = bo->bdev;
849 struct ttm_mem_type_manager *man;
ba4e7d97
TH
850 uint32_t mem_type = TTM_PL_SYSTEM;
851 uint32_t cur_flags = 0;
852 bool type_found = false;
853 bool type_ok = false;
98ffc415 854 bool has_erestartsys = false;
ca262a99 855 int i, ret;
ba4e7d97
TH
856
857 mem->mm_node = NULL;
b6637526 858 for (i = 0; i < placement->num_placement; ++i) {
ca262a99
JG
859 ret = ttm_mem_type_from_flags(placement->placement[i],
860 &mem_type);
861 if (ret)
862 return ret;
ba4e7d97
TH
863 man = &bdev->man[mem_type];
864
865 type_ok = ttm_bo_mt_compatible(man,
ca262a99
JG
866 mem_type,
867 placement->placement[i],
868 &cur_flags);
ba4e7d97
TH
869
870 if (!type_ok)
871 continue;
872
ae3e8122
TH
873 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
874 cur_flags);
ca262a99
JG
875 /*
876 * Use the access and other non-mapping-related flag bits from
877 * the memory placement flags to the current flags
878 */
879 ttm_flag_masked(&cur_flags, placement->placement[i],
880 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 881
ba4e7d97
TH
882 if (mem_type == TTM_PL_SYSTEM)
883 break;
884
885 if (man->has_type && man->use_type) {
886 type_found = true;
d961db75 887 ret = (*man->func->get_node)(man, bo, placement, mem);
ca262a99
JG
888 if (unlikely(ret))
889 return ret;
ba4e7d97 890 }
d961db75 891 if (mem->mm_node)
ba4e7d97
TH
892 break;
893 }
894
d961db75 895 if ((type_ok && (mem_type == TTM_PL_SYSTEM)) || mem->mm_node) {
ba4e7d97
TH
896 mem->mem_type = mem_type;
897 mem->placement = cur_flags;
898 return 0;
899 }
900
901 if (!type_found)
902 return -EINVAL;
903
b6637526
DA
904 for (i = 0; i < placement->num_busy_placement; ++i) {
905 ret = ttm_mem_type_from_flags(placement->busy_placement[i],
ca262a99
JG
906 &mem_type);
907 if (ret)
908 return ret;
ba4e7d97 909 man = &bdev->man[mem_type];
ba4e7d97
TH
910 if (!man->has_type)
911 continue;
ba4e7d97 912 if (!ttm_bo_mt_compatible(man,
ca262a99 913 mem_type,
b6637526 914 placement->busy_placement[i],
ca262a99 915 &cur_flags))
ba4e7d97
TH
916 continue;
917
ae3e8122
TH
918 cur_flags = ttm_bo_select_caching(man, bo->mem.placement,
919 cur_flags);
ca262a99
JG
920 /*
921 * Use the access and other non-mapping-related flag bits from
922 * the memory placement flags to the current flags
923 */
b6637526 924 ttm_flag_masked(&cur_flags, placement->busy_placement[i],
ca262a99 925 ~TTM_PL_MASK_MEMTYPE);
ae3e8122 926
0eaddb28
TH
927
928 if (mem_type == TTM_PL_SYSTEM) {
929 mem->mem_type = mem_type;
930 mem->placement = cur_flags;
931 mem->mm_node = NULL;
932 return 0;
933 }
934
ca262a99 935 ret = ttm_bo_mem_force_space(bo, mem_type, placement, mem,
97a875cb 936 interruptible, no_wait_gpu);
ba4e7d97
TH
937 if (ret == 0 && mem->mm_node) {
938 mem->placement = cur_flags;
939 return 0;
940 }
98ffc415
TH
941 if (ret == -ERESTARTSYS)
942 has_erestartsys = true;
ba4e7d97 943 }
98ffc415 944 ret = (has_erestartsys) ? -ERESTARTSYS : -ENOMEM;
ba4e7d97
TH
945 return ret;
946}
947EXPORT_SYMBOL(ttm_bo_mem_space);
948
ba4e7d97 949int ttm_bo_move_buffer(struct ttm_buffer_object *bo,
ca262a99 950 struct ttm_placement *placement,
97a875cb 951 bool interruptible,
9d87fa21 952 bool no_wait_gpu)
ba4e7d97 953{
ba4e7d97
TH
954 int ret = 0;
955 struct ttm_mem_reg mem;
702adba2 956 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 957
009a9dad 958 lockdep_assert_held(&bo->resv->lock.base);
ba4e7d97
TH
959
960 /*
961 * FIXME: It's possible to pipeline buffer moves.
962 * Have the driver move function wait for idle when necessary,
963 * instead of doing it here.
964 */
702adba2 965 spin_lock(&bdev->fence_lock);
1717c0e2 966 ret = ttm_bo_wait(bo, false, interruptible, no_wait_gpu);
702adba2 967 spin_unlock(&bdev->fence_lock);
ba4e7d97
TH
968 if (ret)
969 return ret;
ba4e7d97
TH
970 mem.num_pages = bo->num_pages;
971 mem.size = mem.num_pages << PAGE_SHIFT;
972 mem.page_alignment = bo->mem.page_alignment;
eba67093
TH
973 mem.bus.io_reserved_vm = false;
974 mem.bus.io_reserved_count = 0;
ba4e7d97
TH
975 /*
976 * Determine where to move the buffer.
977 */
97a875cb
ML
978 ret = ttm_bo_mem_space(bo, placement, &mem,
979 interruptible, no_wait_gpu);
ba4e7d97
TH
980 if (ret)
981 goto out_unlock;
97a875cb
ML
982 ret = ttm_bo_handle_move_mem(bo, &mem, false,
983 interruptible, no_wait_gpu);
ba4e7d97 984out_unlock:
d961db75
BS
985 if (ret && mem.mm_node)
986 ttm_bo_mem_put(bo, &mem);
ba4e7d97
TH
987 return ret;
988}
989
ca262a99 990static int ttm_bo_mem_compat(struct ttm_placement *placement,
ba4e7d97
TH
991 struct ttm_mem_reg *mem)
992{
ca262a99 993 int i;
e22238ea 994
d961db75
BS
995 if (mem->mm_node && placement->lpfn != 0 &&
996 (mem->start < placement->fpfn ||
997 mem->start + mem->num_pages > placement->lpfn))
e22238ea 998 return -1;
ca262a99
JG
999
1000 for (i = 0; i < placement->num_placement; i++) {
1001 if ((placement->placement[i] & mem->placement &
1002 TTM_PL_MASK_CACHING) &&
1003 (placement->placement[i] & mem->placement &
1004 TTM_PL_MASK_MEM))
1005 return i;
1006 }
1007 return -1;
ba4e7d97
TH
1008}
1009
09855acb
JG
1010int ttm_bo_validate(struct ttm_buffer_object *bo,
1011 struct ttm_placement *placement,
97a875cb 1012 bool interruptible,
9d87fa21 1013 bool no_wait_gpu)
ba4e7d97
TH
1014{
1015 int ret;
1016
009a9dad 1017 lockdep_assert_held(&bo->resv->lock.base);
ca262a99
JG
1018 /* Check that range is valid */
1019 if (placement->lpfn || placement->fpfn)
1020 if (placement->fpfn > placement->lpfn ||
1021 (placement->lpfn - placement->fpfn) < bo->num_pages)
1022 return -EINVAL;
ba4e7d97
TH
1023 /*
1024 * Check whether we need to move buffer.
1025 */
ca262a99
JG
1026 ret = ttm_bo_mem_compat(placement, &bo->mem);
1027 if (ret < 0) {
97a875cb
ML
1028 ret = ttm_bo_move_buffer(bo, placement, interruptible,
1029 no_wait_gpu);
ca262a99 1030 if (ret)
ba4e7d97 1031 return ret;
ca262a99
JG
1032 } else {
1033 /*
1034 * Use the access and other non-mapping-related flag bits from
1035 * the compatible memory placement flags to the active flags
1036 */
1037 ttm_flag_masked(&bo->mem.placement, placement->placement[ret],
1038 ~TTM_PL_MASK_MEMTYPE);
ba4e7d97 1039 }
ba4e7d97
TH
1040 /*
1041 * We might need to add a TTM.
1042 */
ba4e7d97
TH
1043 if (bo->mem.mem_type == TTM_PL_SYSTEM && bo->ttm == NULL) {
1044 ret = ttm_bo_add_ttm(bo, true);
1045 if (ret)
1046 return ret;
1047 }
ba4e7d97
TH
1048 return 0;
1049}
09855acb 1050EXPORT_SYMBOL(ttm_bo_validate);
ba4e7d97 1051
09855acb
JG
1052int ttm_bo_check_placement(struct ttm_buffer_object *bo,
1053 struct ttm_placement *placement)
ba4e7d97 1054{
29e190e0
TH
1055 BUG_ON((placement->fpfn || placement->lpfn) &&
1056 (bo->mem.num_pages > (placement->lpfn - placement->fpfn)));
ba4e7d97 1057
ba4e7d97
TH
1058 return 0;
1059}
1060
09855acb
JG
1061int ttm_bo_init(struct ttm_bo_device *bdev,
1062 struct ttm_buffer_object *bo,
1063 unsigned long size,
1064 enum ttm_bo_type type,
1065 struct ttm_placement *placement,
1066 uint32_t page_alignment,
09855acb 1067 bool interruptible,
5df23979 1068 struct file *persistent_swap_storage,
09855acb 1069 size_t acc_size,
129b78bf 1070 struct sg_table *sg,
09855acb 1071 void (*destroy) (struct ttm_buffer_object *))
ba4e7d97 1072{
09855acb 1073 int ret = 0;
ba4e7d97 1074 unsigned long num_pages;
57de4ba9 1075 struct ttm_mem_global *mem_glob = bdev->glob->mem_glob;
5e338405 1076 bool locked;
57de4ba9
JG
1077
1078 ret = ttm_mem_global_alloc(mem_glob, acc_size, false, false);
1079 if (ret) {
25d0479a 1080 pr_err("Out of kernel memory\n");
57de4ba9
JG
1081 if (destroy)
1082 (*destroy)(bo);
1083 else
1084 kfree(bo);
1085 return -ENOMEM;
1086 }
ba4e7d97 1087
ba4e7d97
TH
1088 num_pages = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
1089 if (num_pages == 0) {
25d0479a 1090 pr_err("Illegal buffer object size\n");
7dfbbdcf
TH
1091 if (destroy)
1092 (*destroy)(bo);
1093 else
1094 kfree(bo);
a393c730 1095 ttm_mem_global_free(mem_glob, acc_size);
ba4e7d97
TH
1096 return -EINVAL;
1097 }
1098 bo->destroy = destroy;
1099
ba4e7d97
TH
1100 kref_init(&bo->kref);
1101 kref_init(&bo->list_kref);
1102 atomic_set(&bo->cpu_writers, 0);
ba4e7d97
TH
1103 INIT_LIST_HEAD(&bo->lru);
1104 INIT_LIST_HEAD(&bo->ddestroy);
1105 INIT_LIST_HEAD(&bo->swap);
eba67093 1106 INIT_LIST_HEAD(&bo->io_reserve_lru);
ba4e7d97 1107 bo->bdev = bdev;
a987fcaa 1108 bo->glob = bdev->glob;
ba4e7d97
TH
1109 bo->type = type;
1110 bo->num_pages = num_pages;
eb6d2c39 1111 bo->mem.size = num_pages << PAGE_SHIFT;
ba4e7d97
TH
1112 bo->mem.mem_type = TTM_PL_SYSTEM;
1113 bo->mem.num_pages = bo->num_pages;
1114 bo->mem.mm_node = NULL;
1115 bo->mem.page_alignment = page_alignment;
eba67093
TH
1116 bo->mem.bus.io_reserved_vm = false;
1117 bo->mem.bus.io_reserved_count = 0;
ba4e7d97
TH
1118 bo->priv_flags = 0;
1119 bo->mem.placement = (TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED);
5df23979 1120 bo->persistent_swap_storage = persistent_swap_storage;
ba4e7d97 1121 bo->acc_size = acc_size;
129b78bf 1122 bo->sg = sg;
5e338405
ML
1123 bo->resv = &bo->ttm_resv;
1124 reservation_object_init(bo->resv);
a987fcaa 1125 atomic_inc(&bo->glob->bo_count);
72525b3f 1126 drm_vma_node_reset(&bo->vma_node);
ba4e7d97 1127
09855acb 1128 ret = ttm_bo_check_placement(bo, placement);
ba4e7d97 1129
ba4e7d97
TH
1130 /*
1131 * For ttm_bo_type_device buffers, allocate
1132 * address space from the device.
1133 */
5e338405
ML
1134 if (likely(!ret) &&
1135 (bo->type == ttm_bo_type_device ||
1136 bo->type == ttm_bo_type_sg))
ba4e7d97 1137 ret = ttm_bo_setup_vm(bo);
ba4e7d97 1138
5e338405
ML
1139 locked = ww_mutex_trylock(&bo->resv->lock);
1140 WARN_ON(!locked);
ba4e7d97 1141
5e338405
ML
1142 if (likely(!ret))
1143 ret = ttm_bo_validate(bo, placement, interruptible, false);
ba4e7d97 1144
ba4e7d97 1145 ttm_bo_unreserve(bo);
5e338405
ML
1146
1147 if (unlikely(ret))
1148 ttm_bo_unref(&bo);
ba4e7d97
TH
1149
1150 return ret;
1151}
09855acb 1152EXPORT_SYMBOL(ttm_bo_init);
ba4e7d97 1153
57de4ba9
JG
1154size_t ttm_bo_acc_size(struct ttm_bo_device *bdev,
1155 unsigned long bo_size,
1156 unsigned struct_size)
ba4e7d97 1157{
57de4ba9
JG
1158 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1159 size_t size = 0;
ba4e7d97 1160
57de4ba9
JG
1161 size += ttm_round_pot(struct_size);
1162 size += PAGE_ALIGN(npages * sizeof(void *));
1163 size += ttm_round_pot(sizeof(struct ttm_tt));
1164 return size;
ba4e7d97 1165}
57de4ba9
JG
1166EXPORT_SYMBOL(ttm_bo_acc_size);
1167
1168size_t ttm_bo_dma_acc_size(struct ttm_bo_device *bdev,
1169 unsigned long bo_size,
1170 unsigned struct_size)
1171{
1172 unsigned npages = (PAGE_ALIGN(bo_size)) >> PAGE_SHIFT;
1173 size_t size = 0;
1174
1175 size += ttm_round_pot(struct_size);
1176 size += PAGE_ALIGN(npages * sizeof(void *));
1177 size += PAGE_ALIGN(npages * sizeof(dma_addr_t));
1178 size += ttm_round_pot(sizeof(struct ttm_dma_tt));
1179 return size;
1180}
1181EXPORT_SYMBOL(ttm_bo_dma_acc_size);
ba4e7d97 1182
09855acb
JG
1183int ttm_bo_create(struct ttm_bo_device *bdev,
1184 unsigned long size,
1185 enum ttm_bo_type type,
1186 struct ttm_placement *placement,
1187 uint32_t page_alignment,
09855acb 1188 bool interruptible,
5df23979 1189 struct file *persistent_swap_storage,
09855acb 1190 struct ttm_buffer_object **p_bo)
ba4e7d97
TH
1191{
1192 struct ttm_buffer_object *bo;
57de4ba9 1193 size_t acc_size;
ca262a99 1194 int ret;
ba4e7d97 1195
ba4e7d97 1196 bo = kzalloc(sizeof(*bo), GFP_KERNEL);
a393c730 1197 if (unlikely(bo == NULL))
ba4e7d97 1198 return -ENOMEM;
ba4e7d97 1199
a393c730 1200 acc_size = ttm_bo_acc_size(bdev, size, sizeof(struct ttm_buffer_object));
09855acb 1201 ret = ttm_bo_init(bdev, bo, size, type, placement, page_alignment,
0b91c4a1
MS
1202 interruptible, persistent_swap_storage, acc_size,
1203 NULL, NULL);
ba4e7d97
TH
1204 if (likely(ret == 0))
1205 *p_bo = bo;
1206
1207 return ret;
1208}
4d798937 1209EXPORT_SYMBOL(ttm_bo_create);
ba4e7d97 1210
ba4e7d97 1211static int ttm_bo_force_list_clean(struct ttm_bo_device *bdev,
ca262a99 1212 unsigned mem_type, bool allow_errors)
ba4e7d97 1213{
ca262a99 1214 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
a987fcaa 1215 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97 1216 int ret;
ba4e7d97
TH
1217
1218 /*
1219 * Can't use standard list traversal since we're unlocking.
1220 */
1221
a987fcaa 1222 spin_lock(&glob->lru_lock);
ca262a99 1223 while (!list_empty(&man->lru)) {
a987fcaa 1224 spin_unlock(&glob->lru_lock);
97a875cb 1225 ret = ttm_mem_evict_first(bdev, mem_type, false, false);
ca262a99
JG
1226 if (ret) {
1227 if (allow_errors) {
1228 return ret;
1229 } else {
25d0479a 1230 pr_err("Cleanup eviction failed\n");
ca262a99
JG
1231 }
1232 }
a987fcaa 1233 spin_lock(&glob->lru_lock);
ba4e7d97 1234 }
a987fcaa 1235 spin_unlock(&glob->lru_lock);
ba4e7d97
TH
1236 return 0;
1237}
1238
1239int ttm_bo_clean_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1240{
c96e7c7a 1241 struct ttm_mem_type_manager *man;
ba4e7d97
TH
1242 int ret = -EINVAL;
1243
1244 if (mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1245 pr_err("Illegal memory type %d\n", mem_type);
ba4e7d97
TH
1246 return ret;
1247 }
c96e7c7a 1248 man = &bdev->man[mem_type];
ba4e7d97
TH
1249
1250 if (!man->has_type) {
25d0479a
JP
1251 pr_err("Trying to take down uninitialized memory manager type %u\n",
1252 mem_type);
ba4e7d97
TH
1253 return ret;
1254 }
1255
1256 man->use_type = false;
1257 man->has_type = false;
1258
1259 ret = 0;
1260 if (mem_type > 0) {
ca262a99 1261 ttm_bo_force_list_clean(bdev, mem_type, false);
ba4e7d97 1262
d961db75 1263 ret = (*man->func->takedown)(man);
ba4e7d97
TH
1264 }
1265
1266 return ret;
1267}
1268EXPORT_SYMBOL(ttm_bo_clean_mm);
1269
1270int ttm_bo_evict_mm(struct ttm_bo_device *bdev, unsigned mem_type)
1271{
1272 struct ttm_mem_type_manager *man = &bdev->man[mem_type];
1273
1274 if (mem_type == 0 || mem_type >= TTM_NUM_MEM_TYPES) {
25d0479a 1275 pr_err("Illegal memory manager memory type %u\n", mem_type);
ba4e7d97
TH
1276 return -EINVAL;
1277 }
1278
1279 if (!man->has_type) {
25d0479a 1280 pr_err("Memory type %u has not been initialized\n", mem_type);
ba4e7d97
TH
1281 return 0;
1282 }
1283
ca262a99 1284 return ttm_bo_force_list_clean(bdev, mem_type, true);
ba4e7d97
TH
1285}
1286EXPORT_SYMBOL(ttm_bo_evict_mm);
1287
1288int ttm_bo_init_mm(struct ttm_bo_device *bdev, unsigned type,
ca262a99 1289 unsigned long p_size)
ba4e7d97
TH
1290{
1291 int ret = -EINVAL;
1292 struct ttm_mem_type_manager *man;
1293
dbc4a5b8 1294 BUG_ON(type >= TTM_NUM_MEM_TYPES);
ba4e7d97 1295 man = &bdev->man[type];
dbc4a5b8 1296 BUG_ON(man->has_type);
eba67093
TH
1297 man->io_reserve_fastpath = true;
1298 man->use_io_reserve_lru = false;
1299 mutex_init(&man->io_reserve_mutex);
1300 INIT_LIST_HEAD(&man->io_reserve_lru);
ba4e7d97
TH
1301
1302 ret = bdev->driver->init_mem_type(bdev, type, man);
1303 if (ret)
1304 return ret;
d961db75 1305 man->bdev = bdev;
ba4e7d97
TH
1306
1307 ret = 0;
1308 if (type != TTM_PL_SYSTEM) {
d961db75 1309 ret = (*man->func->init)(man, p_size);
ba4e7d97
TH
1310 if (ret)
1311 return ret;
1312 }
1313 man->has_type = true;
1314 man->use_type = true;
1315 man->size = p_size;
1316
1317 INIT_LIST_HEAD(&man->lru);
1318
1319 return 0;
1320}
1321EXPORT_SYMBOL(ttm_bo_init_mm);
1322
a987fcaa
TH
1323static void ttm_bo_global_kobj_release(struct kobject *kobj)
1324{
1325 struct ttm_bo_global *glob =
1326 container_of(kobj, struct ttm_bo_global, kobj);
1327
a987fcaa
TH
1328 ttm_mem_unregister_shrink(glob->mem_glob, &glob->shrink);
1329 __free_page(glob->dummy_read_page);
1330 kfree(glob);
1331}
1332
ba4420c2 1333void ttm_bo_global_release(struct drm_global_reference *ref)
a987fcaa
TH
1334{
1335 struct ttm_bo_global *glob = ref->object;
1336
1337 kobject_del(&glob->kobj);
1338 kobject_put(&glob->kobj);
1339}
1340EXPORT_SYMBOL(ttm_bo_global_release);
1341
ba4420c2 1342int ttm_bo_global_init(struct drm_global_reference *ref)
a987fcaa
TH
1343{
1344 struct ttm_bo_global_ref *bo_ref =
1345 container_of(ref, struct ttm_bo_global_ref, ref);
1346 struct ttm_bo_global *glob = ref->object;
1347 int ret;
1348
1349 mutex_init(&glob->device_list_mutex);
1350 spin_lock_init(&glob->lru_lock);
1351 glob->mem_glob = bo_ref->mem_glob;
1352 glob->dummy_read_page = alloc_page(__GFP_ZERO | GFP_DMA32);
1353
1354 if (unlikely(glob->dummy_read_page == NULL)) {
1355 ret = -ENOMEM;
1356 goto out_no_drp;
1357 }
1358
1359 INIT_LIST_HEAD(&glob->swap_lru);
1360 INIT_LIST_HEAD(&glob->device_list);
1361
1362 ttm_mem_init_shrink(&glob->shrink, ttm_bo_swapout);
1363 ret = ttm_mem_register_shrink(glob->mem_glob, &glob->shrink);
1364 if (unlikely(ret != 0)) {
25d0479a 1365 pr_err("Could not register buffer object swapout\n");
a987fcaa
TH
1366 goto out_no_shrink;
1367 }
1368
a987fcaa
TH
1369 atomic_set(&glob->bo_count, 0);
1370
b642ed06
RD
1371 ret = kobject_init_and_add(
1372 &glob->kobj, &ttm_bo_glob_kobj_type, ttm_get_kobj(), "buffer_objects");
a987fcaa
TH
1373 if (unlikely(ret != 0))
1374 kobject_put(&glob->kobj);
1375 return ret;
1376out_no_shrink:
1377 __free_page(glob->dummy_read_page);
1378out_no_drp:
1379 kfree(glob);
1380 return ret;
1381}
1382EXPORT_SYMBOL(ttm_bo_global_init);
1383
1384
ba4e7d97
TH
1385int ttm_bo_device_release(struct ttm_bo_device *bdev)
1386{
1387 int ret = 0;
1388 unsigned i = TTM_NUM_MEM_TYPES;
1389 struct ttm_mem_type_manager *man;
a987fcaa 1390 struct ttm_bo_global *glob = bdev->glob;
ba4e7d97
TH
1391
1392 while (i--) {
1393 man = &bdev->man[i];
1394 if (man->has_type) {
1395 man->use_type = false;
1396 if ((i != TTM_PL_SYSTEM) && ttm_bo_clean_mm(bdev, i)) {
1397 ret = -EBUSY;
25d0479a
JP
1398 pr_err("DRM memory manager type %d is not clean\n",
1399 i);
ba4e7d97
TH
1400 }
1401 man->has_type = false;
1402 }
1403 }
1404
a987fcaa
TH
1405 mutex_lock(&glob->device_list_mutex);
1406 list_del(&bdev->device_list);
1407 mutex_unlock(&glob->device_list_mutex);
1408
f094cfc6 1409 cancel_delayed_work_sync(&bdev->wq);
ba4e7d97
TH
1410
1411 while (ttm_bo_delayed_delete(bdev, true))
1412 ;
1413
a987fcaa 1414 spin_lock(&glob->lru_lock);
ba4e7d97
TH
1415 if (list_empty(&bdev->ddestroy))
1416 TTM_DEBUG("Delayed destroy list was clean\n");
1417
1418 if (list_empty(&bdev->man[0].lru))
1419 TTM_DEBUG("Swap list was clean\n");
a987fcaa 1420 spin_unlock(&glob->lru_lock);
ba4e7d97 1421
72525b3f 1422 drm_vma_offset_manager_destroy(&bdev->vma_manager);
ba4e7d97 1423
ba4e7d97
TH
1424 return ret;
1425}
1426EXPORT_SYMBOL(ttm_bo_device_release);
1427
ba4e7d97 1428int ttm_bo_device_init(struct ttm_bo_device *bdev,
a987fcaa
TH
1429 struct ttm_bo_global *glob,
1430 struct ttm_bo_driver *driver,
51c8b407 1431 uint64_t file_page_offset,
ad49f501 1432 bool need_dma32)
ba4e7d97
TH
1433{
1434 int ret = -EINVAL;
1435
ba4e7d97 1436 bdev->driver = driver;
ba4e7d97
TH
1437
1438 memset(bdev->man, 0, sizeof(bdev->man));
1439
ba4e7d97
TH
1440 /*
1441 * Initialize the system memory buffer type.
1442 * Other types need to be driver / IOCTL initialized.
1443 */
ca262a99 1444 ret = ttm_bo_init_mm(bdev, TTM_PL_SYSTEM, 0);
ba4e7d97 1445 if (unlikely(ret != 0))
a987fcaa 1446 goto out_no_sys;
ba4e7d97 1447
72525b3f
DH
1448 drm_vma_offset_manager_init(&bdev->vma_manager, file_page_offset,
1449 0x10000000);
ba4e7d97 1450 INIT_DELAYED_WORK(&bdev->wq, ttm_bo_delayed_workqueue);
ba4e7d97 1451 INIT_LIST_HEAD(&bdev->ddestroy);
ba4e7d97 1452 bdev->dev_mapping = NULL;
a987fcaa 1453 bdev->glob = glob;
ad49f501 1454 bdev->need_dma32 = need_dma32;
65705962 1455 bdev->val_seq = 0;
702adba2 1456 spin_lock_init(&bdev->fence_lock);
a987fcaa
TH
1457 mutex_lock(&glob->device_list_mutex);
1458 list_add_tail(&bdev->device_list, &glob->device_list);
1459 mutex_unlock(&glob->device_list_mutex);
ba4e7d97
TH
1460
1461 return 0;
a987fcaa 1462out_no_sys:
ba4e7d97
TH
1463 return ret;
1464}
1465EXPORT_SYMBOL(ttm_bo_device_init);
1466
1467/*
1468 * buffer object vm functions.
1469 */
1470
1471bool ttm_mem_reg_is_pci(struct ttm_bo_device *bdev, struct ttm_mem_reg *mem)
1472{
1473 struct ttm_mem_type_manager *man = &bdev->man[mem->mem_type];
1474
1475 if (!(man->flags & TTM_MEMTYPE_FLAG_FIXED)) {
1476 if (mem->mem_type == TTM_PL_SYSTEM)
1477 return false;
1478
1479 if (man->flags & TTM_MEMTYPE_FLAG_CMA)
1480 return false;
1481
1482 if (mem->placement & TTM_PL_FLAG_CACHED)
1483 return false;
1484 }
1485 return true;
1486}
1487
eba67093 1488void ttm_bo_unmap_virtual_locked(struct ttm_buffer_object *bo)
ba4e7d97
TH
1489{
1490 struct ttm_bo_device *bdev = bo->bdev;
72525b3f 1491 loff_t offset, holelen;
ba4e7d97
TH
1492
1493 if (!bdev->dev_mapping)
1494 return;
72525b3f
DH
1495
1496 if (drm_vma_node_has_offset(&bo->vma_node)) {
1497 offset = (loff_t) drm_vma_node_offset_addr(&bo->vma_node);
1498 holelen = ((loff_t) bo->mem.num_pages) << PAGE_SHIFT;
1499
1500 unmap_mapping_range(bdev->dev_mapping, offset, holelen, 1);
1501 }
eba67093 1502 ttm_mem_io_free_vm(bo);
ba4e7d97 1503}
eba67093
TH
1504
1505void ttm_bo_unmap_virtual(struct ttm_buffer_object *bo)
1506{
1507 struct ttm_bo_device *bdev = bo->bdev;
1508 struct ttm_mem_type_manager *man = &bdev->man[bo->mem.mem_type];
1509
1510 ttm_mem_io_lock(man, false);
1511 ttm_bo_unmap_virtual_locked(bo);
1512 ttm_mem_io_unlock(man);
ba4e7d97 1513}
eba67093
TH
1514
1515
e024e110 1516EXPORT_SYMBOL(ttm_bo_unmap_virtual);
ba4e7d97 1517
ba4e7d97
TH
1518/**
1519 * ttm_bo_setup_vm:
1520 *
1521 * @bo: the buffer to allocate address space for
1522 *
1523 * Allocate address space in the drm device so that applications
1524 * can mmap the buffer and access the contents. This only
1525 * applies to ttm_bo_type_device objects as others are not
1526 * placed in the drm device address space.
1527 */
1528
1529static int ttm_bo_setup_vm(struct ttm_buffer_object *bo)
1530{
1531 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 1532
72525b3f
DH
1533 return drm_vma_offset_add(&bdev->vma_manager, &bo->vma_node,
1534 bo->mem.num_pages);
ba4e7d97
TH
1535}
1536
1537int ttm_bo_wait(struct ttm_buffer_object *bo,
1717c0e2 1538 bool lazy, bool interruptible, bool no_wait)
ba4e7d97
TH
1539{
1540 struct ttm_bo_driver *driver = bo->bdev->driver;
702adba2 1541 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97 1542 void *sync_obj;
ba4e7d97
TH
1543 int ret = 0;
1544
1717c0e2 1545 if (likely(bo->sync_obj == NULL))
ba4e7d97
TH
1546 return 0;
1547
1717c0e2 1548 while (bo->sync_obj) {
ba4e7d97 1549
dedfdffd 1550 if (driver->sync_obj_signaled(bo->sync_obj)) {
1717c0e2
DA
1551 void *tmp_obj = bo->sync_obj;
1552 bo->sync_obj = NULL;
1553 clear_bit(TTM_BO_PRIV_FLAG_MOVING, &bo->priv_flags);
1554 spin_unlock(&bdev->fence_lock);
1555 driver->sync_obj_unref(&tmp_obj);
1556 spin_lock(&bdev->fence_lock);
ba4e7d97
TH
1557 continue;
1558 }
1559
1560 if (no_wait)
1561 return -EBUSY;
1562
1717c0e2 1563 sync_obj = driver->sync_obj_ref(bo->sync_obj);
702adba2 1564 spin_unlock(&bdev->fence_lock);
dedfdffd 1565 ret = driver->sync_obj_wait(sync_obj,
ba4e7d97
TH
1566 lazy, interruptible);
1567 if (unlikely(ret != 0)) {
1568 driver->sync_obj_unref(&sync_obj);
702adba2 1569 spin_lock(&bdev->fence_lock);
ba4e7d97
TH
1570 return ret;
1571 }
702adba2 1572 spin_lock(&bdev->fence_lock);
5fb4ef0e 1573 if (likely(bo->sync_obj == sync_obj)) {
1717c0e2
DA
1574 void *tmp_obj = bo->sync_obj;
1575 bo->sync_obj = NULL;
1576 clear_bit(TTM_BO_PRIV_FLAG_MOVING,
1577 &bo->priv_flags);
1578 spin_unlock(&bdev->fence_lock);
1579 driver->sync_obj_unref(&sync_obj);
1580 driver->sync_obj_unref(&tmp_obj);
1581 spin_lock(&bdev->fence_lock);
fee280d3 1582 } else {
702adba2 1583 spin_unlock(&bdev->fence_lock);
fee280d3 1584 driver->sync_obj_unref(&sync_obj);
702adba2 1585 spin_lock(&bdev->fence_lock);
ba4e7d97
TH
1586 }
1587 }
1588 return 0;
1589}
1590EXPORT_SYMBOL(ttm_bo_wait);
1591
ba4e7d97
TH
1592int ttm_bo_synccpu_write_grab(struct ttm_buffer_object *bo, bool no_wait)
1593{
702adba2 1594 struct ttm_bo_device *bdev = bo->bdev;
ba4e7d97
TH
1595 int ret = 0;
1596
1597 /*
8cfe92d6 1598 * Using ttm_bo_reserve makes sure the lru lists are updated.
ba4e7d97
TH
1599 */
1600
1601 ret = ttm_bo_reserve(bo, true, no_wait, false, 0);
1602 if (unlikely(ret != 0))
1603 return ret;
702adba2 1604 spin_lock(&bdev->fence_lock);
1717c0e2 1605 ret = ttm_bo_wait(bo, false, true, no_wait);
702adba2 1606 spin_unlock(&bdev->fence_lock);
ba4e7d97
TH
1607 if (likely(ret == 0))
1608 atomic_inc(&bo->cpu_writers);
1609 ttm_bo_unreserve(bo);
1610 return ret;
1611}
d1ede145 1612EXPORT_SYMBOL(ttm_bo_synccpu_write_grab);
ba4e7d97
TH
1613
1614void ttm_bo_synccpu_write_release(struct ttm_buffer_object *bo)
1615{
654aa792 1616 atomic_dec(&bo->cpu_writers);
ba4e7d97 1617}
d1ede145 1618EXPORT_SYMBOL(ttm_bo_synccpu_write_release);
ba4e7d97
TH
1619
1620/**
1621 * A buffer object shrink method that tries to swap out the first
1622 * buffer object on the bo_global::swap_lru list.
1623 */
1624
1625static int ttm_bo_swapout(struct ttm_mem_shrink *shrink)
1626{
a987fcaa
TH
1627 struct ttm_bo_global *glob =
1628 container_of(shrink, struct ttm_bo_global, shrink);
ba4e7d97
TH
1629 struct ttm_buffer_object *bo;
1630 int ret = -EBUSY;
1631 int put_count;
1632 uint32_t swap_placement = (TTM_PL_FLAG_CACHED | TTM_PL_FLAG_SYSTEM);
1633
a987fcaa 1634 spin_lock(&glob->lru_lock);
2b7b3ad2 1635 list_for_each_entry(bo, &glob->swap_lru, swap) {
63d0a419 1636 ret = ttm_bo_reserve_nolru(bo, false, true, false, 0);
2b7b3ad2
ML
1637 if (!ret)
1638 break;
1639 }
85b144f8 1640
2b7b3ad2
ML
1641 if (ret) {
1642 spin_unlock(&glob->lru_lock);
1643 return ret;
1644 }
e1efc9b6 1645
2b7b3ad2 1646 kref_get(&bo->list_kref);
ba4e7d97 1647
2b7b3ad2
ML
1648 if (!list_empty(&bo->ddestroy)) {
1649 ret = ttm_bo_cleanup_refs_and_unlock(bo, false, false);
1650 kref_put(&bo->list_kref, ttm_bo_release_list);
1651 return ret;
ba4e7d97
TH
1652 }
1653
ba4e7d97 1654 put_count = ttm_bo_del_from_lru(bo);
a987fcaa 1655 spin_unlock(&glob->lru_lock);
ba4e7d97 1656
d6ea8886 1657 ttm_bo_list_ref_sub(bo, put_count, true);
ba4e7d97
TH
1658
1659 /**
1660 * Wait for GPU, then move to system cached.
1661 */
1662
702adba2 1663 spin_lock(&bo->bdev->fence_lock);
1717c0e2 1664 ret = ttm_bo_wait(bo, false, false, false);
702adba2 1665 spin_unlock(&bo->bdev->fence_lock);
ba4e7d97
TH
1666
1667 if (unlikely(ret != 0))
1668 goto out;
1669
1670 if ((bo->mem.placement & swap_placement) != swap_placement) {
1671 struct ttm_mem_reg evict_mem;
1672
1673 evict_mem = bo->mem;
1674 evict_mem.mm_node = NULL;
1675 evict_mem.placement = TTM_PL_FLAG_SYSTEM | TTM_PL_FLAG_CACHED;
1676 evict_mem.mem_type = TTM_PL_SYSTEM;
1677
1678 ret = ttm_bo_handle_move_mem(bo, &evict_mem, true,
97a875cb 1679 false, false);
ba4e7d97
TH
1680 if (unlikely(ret != 0))
1681 goto out;
1682 }
1683
1684 ttm_bo_unmap_virtual(bo);
1685
1686 /**
1687 * Swap out. Buffer will be swapped in again as soon as
1688 * anyone tries to access a ttm page.
1689 */
1690
3f09ea4e
TH
1691 if (bo->bdev->driver->swap_notify)
1692 bo->bdev->driver->swap_notify(bo);
1693
5df23979 1694 ret = ttm_tt_swapout(bo->ttm, bo->persistent_swap_storage);
ba4e7d97
TH
1695out:
1696
1697 /**
1698 *
1699 * Unreserve without putting on LRU to avoid swapping out an
1700 * already swapped buffer.
1701 */
1702
5e338405 1703 ww_mutex_unlock(&bo->resv->lock);
ba4e7d97
TH
1704 kref_put(&bo->list_kref, ttm_bo_release_list);
1705 return ret;
1706}
1707
1708void ttm_bo_swapout_all(struct ttm_bo_device *bdev)
1709{
a987fcaa 1710 while (ttm_bo_swapout(&bdev->glob->shrink) == 0)
ba4e7d97
TH
1711 ;
1712}
e99e1e78 1713EXPORT_SYMBOL(ttm_bo_swapout_all);
This page took 0.426991 seconds and 5 git commands to generate.