Message ID | 20171115123151.3038-2-christian.koenig@amd.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On 15/11/17 01:31 PM, Christian König wrote: > There is no guarantee that the next entry on the ddelete list stays on > the list when we drop the locks. > > Completely rework this mess by moving processed entries on a temporary > list. > > Signed-off-by: Christian König <christian.koenig@amd.com> [...] > static void ttm_bo_delayed_workqueue(struct work_struct *work) > { > struct ttm_bo_device *bdev = > container_of(work, struct ttm_bo_device, wq.work); > + unsigned long delay = ((HZ / 100) < 1) ? 1 : HZ / 100; > > - if (ttm_bo_delayed_delete(bdev, false)) { > - schedule_delayed_work(&bdev->wq, > - ((HZ / 100) < 1) ? 1 : HZ / 100); > - } > + if (!ttm_bo_delayed_delete(bdev, false)) > + schedule_delayed_work(&bdev->wq, delay); > } Would be better to only add the ! here and leave the rest of this function unchanged in this patch. The cleanup can be done in a separate patch. Other than that, both patches are Reviewed-and-Tested-by: Michel Dänzer <michel.daenzer@amd.com>
Hi, Christian, While this has probably already been committed, and looks like a nice cleanup there are two things below I think needs fixing. On 11/15/2017 01:31 PM, Christian König wrote: > There is no guarantee that the next entry on the ddelete list stays on > the list when we drop the locks. > > Completely rework this mess by moving processed entries on a temporary > list. > > Signed-off-by: Christian König <christian.koenig@amd.com> > --- > drivers/gpu/drm/ttm/ttm_bo.c | 77 ++++++++++++++------------------------------ > 1 file changed, 25 insertions(+), 52 deletions(-) > > diff --git a/drivers/gpu/drm/ttm/ttm_bo.c b/drivers/gpu/drm/ttm/ttm_bo.c > index 7c1eac4f4b4b..ad0afdd71f21 100644 > --- a/drivers/gpu/drm/ttm/ttm_bo.c > +++ b/drivers/gpu/drm/ttm/ttm_bo.c > @@ -572,71 +572,47 @@ static int ttm_bo_cleanup_refs(struct ttm_buffer_object *bo, > * Traverse the delayed list, and call ttm_bo_cleanup_refs on all > * encountered buffers. > */ > - > -static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all) > +static bool ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all) > { > struct ttm_bo_global *glob = bdev->glob; > - struct ttm_buffer_object *entry = NULL; > - int ret = 0; > - > - spin_lock(&glob->lru_lock); > - if (list_empty(&bdev->ddestroy)) > - goto out_unlock; > + struct list_head removed; > + bool empty; > > - entry = list_first_entry(&bdev->ddestroy, > - struct ttm_buffer_object, ddestroy); > - kref_get(&entry->list_kref); > + INIT_LIST_HEAD(&removed); > > - for (;;) { > - struct ttm_buffer_object *nentry = NULL; > - > - if (entry->ddestroy.next != &bdev->ddestroy) { > - nentry = list_first_entry(&entry->ddestroy, > - struct ttm_buffer_object, ddestroy); > - kref_get(&nentry->list_kref); > - } > - > - ret = reservation_object_trylock(entry->resv) ? 0 : -EBUSY; > - if (remove_all && ret) { > - spin_unlock(&glob->lru_lock); > - ret = reservation_object_lock(entry->resv, NULL); > - spin_lock(&glob->lru_lock); > - } > + spin_lock(&glob->lru_lock); > + while (!list_empty(&bdev->ddestroy)) { > + struct ttm_buffer_object *bo; > > - if (!ret) > - ret = ttm_bo_cleanup_refs(entry, false, !remove_all, > - true); > - else > - spin_unlock(&glob->lru_lock); > + bo = list_first_entry(&bdev->ddestroy, struct ttm_buffer_object, > + ddestroy); > + kref_get(&bo->list_kref); > + list_move_tail(&bo->ddestroy, &removed); > + spin_unlock(&glob->lru_lock); > > - kref_put(&entry->list_kref, ttm_bo_release_list); > - entry = nentry; > + reservation_object_lock(bo->resv, NULL); Reservation may be a long lived lock, and typically if the object is reserved here, it's being evicted somewhere and there might be a substantial stall, which isn't really acceptable in the global workqueue. Better to move on to the next bo. This function was really intended to be non-blocking, unless remove_all == true. I even think it's safe to keep the spinlock held on tryreserve? > > - if (ret || !entry) > - goto out; > + spin_lock(&glob->lru_lock); > + ttm_bo_cleanup_refs(bo, false, !remove_all, true); > > + kref_put(&bo->list_kref, ttm_bo_release_list); Calling a release function in atomic context is a bad thing. Nobody knows what locks needs to be taken in the release function and such code is prone to lock inversion and sleep-while-atomic bugs. Not long ago vfree() was even forbidden from atomic context. But here it's easily avoidable. /Thomas
On 12/13/2017 09:55 PM, Thomas Hellstrom wrote: > Hi, Christian, > > While this has probably already been committed, and looks like a nice > cleanup there are two things below I think needs fixing. > > On 11/15/2017 01:31 PM, Christian König wrote: >> There is no guarantee that the next entry on the ddelete list stays on >> the list when we drop the locks. >> >> Completely rework this mess by moving processed entries on a temporary >> list. >> >> Signed-off-by: Christian König <christian.koenig@amd.com> >> --- >> drivers/gpu/drm/ttm/ttm_bo.c | 77 >> ++++++++++++++------------------------------ >> 1 file changed, 25 insertions(+), 52 deletions(-) >> >> diff --git a/drivers/gpu/drm/ttm/ttm_bo.c b/drivers/gpu/drm/ttm/ttm_bo.c >> index 7c1eac4f4b4b..ad0afdd71f21 100644 >> --- a/drivers/gpu/drm/ttm/ttm_bo.c >> +++ b/drivers/gpu/drm/ttm/ttm_bo.c >> @@ -572,71 +572,47 @@ static int ttm_bo_cleanup_refs(struct >> ttm_buffer_object *bo, >> * Traverse the delayed list, and call ttm_bo_cleanup_refs on all >> * encountered buffers. >> */ >> - >> -static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool >> remove_all) >> +static bool ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool >> remove_all) >> { >> struct ttm_bo_global *glob = bdev->glob; >> - struct ttm_buffer_object *entry = NULL; >> - int ret = 0; >> - >> - spin_lock(&glob->lru_lock); >> - if (list_empty(&bdev->ddestroy)) >> - goto out_unlock; >> + struct list_head removed; >> + bool empty; >> - entry = list_first_entry(&bdev->ddestroy, >> - struct ttm_buffer_object, ddestroy); >> - kref_get(&entry->list_kref); >> + INIT_LIST_HEAD(&removed); >> - for (;;) { >> - struct ttm_buffer_object *nentry = NULL; >> - >> - if (entry->ddestroy.next != &bdev->ddestroy) { >> - nentry = list_first_entry(&entry->ddestroy, >> - struct ttm_buffer_object, ddestroy); >> - kref_get(&nentry->list_kref); >> - } >> - >> - ret = reservation_object_trylock(entry->resv) ? 0 : -EBUSY; >> - if (remove_all && ret) { >> - spin_unlock(&glob->lru_lock); >> - ret = reservation_object_lock(entry->resv, NULL); >> - spin_lock(&glob->lru_lock); >> - } >> + spin_lock(&glob->lru_lock); >> + while (!list_empty(&bdev->ddestroy)) { >> + struct ttm_buffer_object *bo; >> - if (!ret) >> - ret = ttm_bo_cleanup_refs(entry, false, !remove_all, >> - true); >> - else >> - spin_unlock(&glob->lru_lock); >> + bo = list_first_entry(&bdev->ddestroy, struct >> ttm_buffer_object, >> + ddestroy); >> + kref_get(&bo->list_kref); >> + list_move_tail(&bo->ddestroy, &removed); >> + spin_unlock(&glob->lru_lock); >> - kref_put(&entry->list_kref, ttm_bo_release_list); >> - entry = nentry; >> + reservation_object_lock(bo->resv, NULL); > > Reservation may be a long lived lock, and typically if the object is > reserved here, it's being evicted somewhere and there might be a > substantial stall, which isn't really acceptable in the global > workqueue. Better to move on to the next bo. > This function was really intended to be non-blocking, unless > remove_all == true. I even think it's safe to keep the spinlock held > on tryreserve? > >> - if (ret || !entry) >> - goto out; >> + spin_lock(&glob->lru_lock); >> + ttm_bo_cleanup_refs(bo, false, !remove_all, true); >> + kref_put(&bo->list_kref, ttm_bo_release_list); > > Calling a release function in atomic context is a bad thing. Nobody > knows what locks needs to be taken in the release function and such > code is prone to lock inversion and sleep-while-atomic bugs. Not long > ago vfree() was even forbidden from atomic context. But here it's > easily avoidable. Hmm. It actually looks like ttm_bo_cleanup_refs unlocks the glob->lru_lock just loke ttm_bo_cleanup_refs_and_unlock did, so my latter comment actually isn't correct. Intuitively removing the "unlock" prefix from the function would also mean that the unlocking functionality went away, but that doesn't seem to be the case. Also the commit message "needed for the next patch" isn't very helpful when the next patch is actually commited much later... The first comment about trylocking still holds, though. /Thomas > > /Thomas > > > _______________________________________________ > dri-devel mailing list > dri-devel@lists.freedesktop.org > https://lists.freedesktop.org/mailman/listinfo/dri-devel
Am 14.12.2017 um 08:24 schrieb Thomas Hellstrom: > On 12/13/2017 09:55 PM, Thomas Hellstrom wrote: >> Hi, Christian, >> >> While this has probably already been committed, and looks like a nice >> cleanup there are two things below I think needs fixing. >> >> On 11/15/2017 01:31 PM, Christian König wrote: >>> There is no guarantee that the next entry on the ddelete list stays on >>> the list when we drop the locks. >>> >>> Completely rework this mess by moving processed entries on a temporary >>> list. >>> >>> Signed-off-by: Christian König <christian.koenig@amd.com> >>> --- >>> drivers/gpu/drm/ttm/ttm_bo.c | 77 >>> ++++++++++++++------------------------------ >>> 1 file changed, 25 insertions(+), 52 deletions(-) >>> >>> diff --git a/drivers/gpu/drm/ttm/ttm_bo.c >>> b/drivers/gpu/drm/ttm/ttm_bo.c >>> index 7c1eac4f4b4b..ad0afdd71f21 100644 >>> --- a/drivers/gpu/drm/ttm/ttm_bo.c >>> +++ b/drivers/gpu/drm/ttm/ttm_bo.c >>> @@ -572,71 +572,47 @@ static int ttm_bo_cleanup_refs(struct >>> ttm_buffer_object *bo, >>> * Traverse the delayed list, and call ttm_bo_cleanup_refs on all >>> * encountered buffers. >>> */ >>> - >>> -static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool >>> remove_all) >>> +static bool ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool >>> remove_all) >>> { >>> struct ttm_bo_global *glob = bdev->glob; >>> - struct ttm_buffer_object *entry = NULL; >>> - int ret = 0; >>> - >>> - spin_lock(&glob->lru_lock); >>> - if (list_empty(&bdev->ddestroy)) >>> - goto out_unlock; >>> + struct list_head removed; >>> + bool empty; >>> - entry = list_first_entry(&bdev->ddestroy, >>> - struct ttm_buffer_object, ddestroy); >>> - kref_get(&entry->list_kref); >>> + INIT_LIST_HEAD(&removed); >>> - for (;;) { >>> - struct ttm_buffer_object *nentry = NULL; >>> - >>> - if (entry->ddestroy.next != &bdev->ddestroy) { >>> - nentry = list_first_entry(&entry->ddestroy, >>> - struct ttm_buffer_object, ddestroy); >>> - kref_get(&nentry->list_kref); >>> - } >>> - >>> - ret = reservation_object_trylock(entry->resv) ? 0 : -EBUSY; >>> - if (remove_all && ret) { >>> - spin_unlock(&glob->lru_lock); >>> - ret = reservation_object_lock(entry->resv, NULL); >>> - spin_lock(&glob->lru_lock); >>> - } >>> + spin_lock(&glob->lru_lock); >>> + while (!list_empty(&bdev->ddestroy)) { >>> + struct ttm_buffer_object *bo; >>> - if (!ret) >>> - ret = ttm_bo_cleanup_refs(entry, false, !remove_all, >>> - true); >>> - else >>> - spin_unlock(&glob->lru_lock); >>> + bo = list_first_entry(&bdev->ddestroy, struct >>> ttm_buffer_object, >>> + ddestroy); >>> + kref_get(&bo->list_kref); >>> + list_move_tail(&bo->ddestroy, &removed); >>> + spin_unlock(&glob->lru_lock); >>> - kref_put(&entry->list_kref, ttm_bo_release_list); >>> - entry = nentry; >>> + reservation_object_lock(bo->resv, NULL); >> >> Reservation may be a long lived lock, and typically if the object is >> reserved here, it's being evicted somewhere and there might be a >> substantial stall, which isn't really acceptable in the global >> workqueue. Better to move on to the next bo. >> This function was really intended to be non-blocking, unless >> remove_all == true. I even think it's safe to keep the spinlock held >> on tryreserve? This approach doesn't really work with shared reservation objects and was actually the originally reason why I stumbled over the function being a bit buggy. The reservation object is a really busy lock because of all the command submission going on. So when you only have a single trylock every few ms it is rather unlikely that you can actually grab it. We ended up with tons of objects on the ddestroy list which couldn't be reaped because of this. At least amdgpu tries to avoid to wait for any GPU operation while holding the reservation locks, so at least for us that shouldn't be an issue any more. And I'm going to pipeline delayed deletes as well rather soon. What we could do here is to use a test like "bo->resv == &bo->ttm_resv" and only trylock if it isn't a shared reservation object. How about that? Regards, Christian. >> >>> - if (ret || !entry) >>> - goto out; >>> + spin_lock(&glob->lru_lock); >>> + ttm_bo_cleanup_refs(bo, false, !remove_all, true); >>> + kref_put(&bo->list_kref, ttm_bo_release_list); >> >> Calling a release function in atomic context is a bad thing. Nobody >> knows what locks needs to be taken in the release function and such >> code is prone to lock inversion and sleep-while-atomic bugs. Not long >> ago vfree() was even forbidden from atomic context. But here it's >> easily avoidable. > > Hmm. It actually looks like ttm_bo_cleanup_refs unlocks the > glob->lru_lock just loke ttm_bo_cleanup_refs_and_unlock did, so my > latter comment actually isn't correct. Intuitively removing the > "unlock" prefix from the function would also mean that the unlocking > functionality went away, but that doesn't seem to be the case. Also > the commit message "needed for the next patch" isn't very helpful when > the next patch is actually commited much later... > > The first comment about trylocking still holds, though. > > /Thomas > > > >> >> /Thomas >> >> >> _______________________________________________ >> dri-devel mailing list >> dri-devel@lists.freedesktop.org >> https://lists.freedesktop.org/mailman/listinfo/dri-devel > >
On 12/14/2017 02:17 PM, Christian König wrote: > Am 14.12.2017 um 08:24 schrieb Thomas Hellstrom: >> On 12/13/2017 09:55 PM, Thomas Hellstrom wrote: >>> Hi, Christian, >>> >>> While this has probably already been committed, and looks like a >>> nice cleanup there are two things below I think needs fixing. >>> >>> On 11/15/2017 01:31 PM, Christian König wrote: >>>> There is no guarantee that the next entry on the ddelete list stays on >>>> the list when we drop the locks. >>>> >>>> Completely rework this mess by moving processed entries on a temporary >>>> list. >>>> >>>> Signed-off-by: Christian König <christian.koenig@amd.com> >>>> --- >>>> drivers/gpu/drm/ttm/ttm_bo.c | 77 >>>> ++++++++++++++------------------------------ >>>> 1 file changed, 25 insertions(+), 52 deletions(-) >>>> >>>> diff --git a/drivers/gpu/drm/ttm/ttm_bo.c >>>> b/drivers/gpu/drm/ttm/ttm_bo.c >>>> index 7c1eac4f4b4b..ad0afdd71f21 100644 >>>> --- a/drivers/gpu/drm/ttm/ttm_bo.c >>>> +++ b/drivers/gpu/drm/ttm/ttm_bo.c >>>> @@ -572,71 +572,47 @@ static int ttm_bo_cleanup_refs(struct >>>> ttm_buffer_object *bo, >>>> * Traverse the delayed list, and call ttm_bo_cleanup_refs on all >>>> * encountered buffers. >>>> */ >>>> - >>>> -static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool >>>> remove_all) >>>> +static bool ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool >>>> remove_all) >>>> { >>>> struct ttm_bo_global *glob = bdev->glob; >>>> - struct ttm_buffer_object *entry = NULL; >>>> - int ret = 0; >>>> - >>>> - spin_lock(&glob->lru_lock); >>>> - if (list_empty(&bdev->ddestroy)) >>>> - goto out_unlock; >>>> + struct list_head removed; >>>> + bool empty; >>>> - entry = list_first_entry(&bdev->ddestroy, >>>> - struct ttm_buffer_object, ddestroy); >>>> - kref_get(&entry->list_kref); >>>> + INIT_LIST_HEAD(&removed); >>>> - for (;;) { >>>> - struct ttm_buffer_object *nentry = NULL; >>>> - >>>> - if (entry->ddestroy.next != &bdev->ddestroy) { >>>> - nentry = list_first_entry(&entry->ddestroy, >>>> - struct ttm_buffer_object, ddestroy); >>>> - kref_get(&nentry->list_kref); >>>> - } >>>> - >>>> - ret = reservation_object_trylock(entry->resv) ? 0 : -EBUSY; >>>> - if (remove_all && ret) { >>>> - spin_unlock(&glob->lru_lock); >>>> - ret = reservation_object_lock(entry->resv, NULL); >>>> - spin_lock(&glob->lru_lock); >>>> - } >>>> + spin_lock(&glob->lru_lock); >>>> + while (!list_empty(&bdev->ddestroy)) { >>>> + struct ttm_buffer_object *bo; >>>> - if (!ret) >>>> - ret = ttm_bo_cleanup_refs(entry, false, !remove_all, >>>> - true); >>>> - else >>>> - spin_unlock(&glob->lru_lock); >>>> + bo = list_first_entry(&bdev->ddestroy, struct >>>> ttm_buffer_object, >>>> + ddestroy); >>>> + kref_get(&bo->list_kref); >>>> + list_move_tail(&bo->ddestroy, &removed); >>>> + spin_unlock(&glob->lru_lock); >>>> - kref_put(&entry->list_kref, ttm_bo_release_list); >>>> - entry = nentry; >>>> + reservation_object_lock(bo->resv, NULL); >>> >>> Reservation may be a long lived lock, and typically if the object is >>> reserved here, it's being evicted somewhere and there might be a >>> substantial stall, which isn't really acceptable in the global >>> workqueue. Better to move on to the next bo. >>> This function was really intended to be non-blocking, unless >>> remove_all == true. I even think it's safe to keep the spinlock held >>> on tryreserve? > > This approach doesn't really work with shared reservation objects and > was actually the originally reason why I stumbled over the function > being a bit buggy. > Actually I think it was correct, but very non-deterministic and difficult to follow. Both me and Maarten had our passes trying to make it look better but failed :(. It relied on the ddestroy list node either being on the ddestroy list or not on a list at all. So if the ->next pointer was on the list, we'd continue iteration, even though the object might have moved on the list. But it looks much better now. > The reservation object is a really busy lock because of all the > command submission going on. So when you only have a single trylock > every few ms it is rather unlikely that you can actually grab it. We > ended up with tons of objects on the ddestroy list which couldn't be > reaped because of this. OK, I see. > > > At least amdgpu tries to avoid to wait for any GPU operation while > holding the reservation locks, so at least for us that shouldn't be an > issue any more. And I'm going to pipeline delayed deletes as well > rather soon. > > What we could do here is to use a test like "bo->resv == > &bo->ttm_resv" and only trylock if it isn't a shared reservation > object. How about that? Either that or a private workqueue separate from the global one is fine with me. Thanks, Thomas > > Regards, > Christian. > >>> >>>> - if (ret || !entry) >>>> - goto out; >>>> + spin_lock(&glob->lru_lock); >>>> + ttm_bo_cleanup_refs(bo, false, !remove_all, true); >>>> + kref_put(&bo->list_kref, ttm_bo_release_list); >>> >>> Calling a release function in atomic context is a bad thing. Nobody >>> knows what locks needs to be taken in the release function and such >>> code is prone to lock inversion and sleep-while-atomic bugs. Not >>> long ago vfree() was even forbidden from atomic context. But here >>> it's easily avoidable. >> >> Hmm. It actually looks like ttm_bo_cleanup_refs unlocks the >> glob->lru_lock just loke ttm_bo_cleanup_refs_and_unlock did, so my >> latter comment actually isn't correct. Intuitively removing the >> "unlock" prefix from the function would also mean that the unlocking >> functionality went away, but that doesn't seem to be the case. Also >> the commit message "needed for the next patch" isn't very helpful >> when the next patch is actually commited much later... >> >> The first comment about trylocking still holds, though. >> >> /Thomas >> >> >> >>> >>> /Thomas >>> >>> >>> _______________________________________________ >>> dri-devel mailing list >>> dri-devel@lists.freedesktop.org >>> https://lists.freedesktop.org/mailman/listinfo/dri-devel >> >>
diff --git a/drivers/gpu/drm/ttm/ttm_bo.c b/drivers/gpu/drm/ttm/ttm_bo.c index 7c1eac4f4b4b..ad0afdd71f21 100644 --- a/drivers/gpu/drm/ttm/ttm_bo.c +++ b/drivers/gpu/drm/ttm/ttm_bo.c @@ -572,71 +572,47 @@ static int ttm_bo_cleanup_refs(struct ttm_buffer_object *bo, * Traverse the delayed list, and call ttm_bo_cleanup_refs on all * encountered buffers. */ - -static int ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all) +static bool ttm_bo_delayed_delete(struct ttm_bo_device *bdev, bool remove_all) { struct ttm_bo_global *glob = bdev->glob; - struct ttm_buffer_object *entry = NULL; - int ret = 0; - - spin_lock(&glob->lru_lock); - if (list_empty(&bdev->ddestroy)) - goto out_unlock; + struct list_head removed; + bool empty; - entry = list_first_entry(&bdev->ddestroy, - struct ttm_buffer_object, ddestroy); - kref_get(&entry->list_kref); + INIT_LIST_HEAD(&removed); - for (;;) { - struct ttm_buffer_object *nentry = NULL; - - if (entry->ddestroy.next != &bdev->ddestroy) { - nentry = list_first_entry(&entry->ddestroy, - struct ttm_buffer_object, ddestroy); - kref_get(&nentry->list_kref); - } - - ret = reservation_object_trylock(entry->resv) ? 0 : -EBUSY; - if (remove_all && ret) { - spin_unlock(&glob->lru_lock); - ret = reservation_object_lock(entry->resv, NULL); - spin_lock(&glob->lru_lock); - } + spin_lock(&glob->lru_lock); + while (!list_empty(&bdev->ddestroy)) { + struct ttm_buffer_object *bo; - if (!ret) - ret = ttm_bo_cleanup_refs(entry, false, !remove_all, - true); - else - spin_unlock(&glob->lru_lock); + bo = list_first_entry(&bdev->ddestroy, struct ttm_buffer_object, + ddestroy); + kref_get(&bo->list_kref); + list_move_tail(&bo->ddestroy, &removed); + spin_unlock(&glob->lru_lock); - kref_put(&entry->list_kref, ttm_bo_release_list); - entry = nentry; + reservation_object_lock(bo->resv, NULL); - if (ret || !entry) - goto out; + spin_lock(&glob->lru_lock); + ttm_bo_cleanup_refs(bo, false, !remove_all, true); + kref_put(&bo->list_kref, ttm_bo_release_list); spin_lock(&glob->lru_lock); - if (list_empty(&entry->ddestroy)) - break; } - -out_unlock: + list_splice_tail(&removed, &bdev->ddestroy); + empty = list_empty(&bdev->ddestroy); spin_unlock(&glob->lru_lock); -out: - if (entry) - kref_put(&entry->list_kref, ttm_bo_release_list); - return ret; + + return empty; } static void ttm_bo_delayed_workqueue(struct work_struct *work) { struct ttm_bo_device *bdev = container_of(work, struct ttm_bo_device, wq.work); + unsigned long delay = ((HZ / 100) < 1) ? 1 : HZ / 100; - if (ttm_bo_delayed_delete(bdev, false)) { - schedule_delayed_work(&bdev->wq, - ((HZ / 100) < 1) ? 1 : HZ / 100); - } + if (!ttm_bo_delayed_delete(bdev, false)) + schedule_delayed_work(&bdev->wq, delay); } static void ttm_bo_release(struct kref *kref) @@ -1573,13 +1549,10 @@ int ttm_bo_device_release(struct ttm_bo_device *bdev) cancel_delayed_work_sync(&bdev->wq); - while (ttm_bo_delayed_delete(bdev, true)) - ; - - spin_lock(&glob->lru_lock); - if (list_empty(&bdev->ddestroy)) + if (ttm_bo_delayed_delete(bdev, true)) TTM_DEBUG("Delayed destroy list was clean\n"); + spin_lock(&glob->lru_lock); for (i = 0; i < TTM_MAX_BO_PRIORITY; ++i) if (list_empty(&bdev->man[0].lru[0])) TTM_DEBUG("Swap list %d was clean\n", i);
There is no guarantee that the next entry on the ddelete list stays on the list when we drop the locks. Completely rework this mess by moving processed entries on a temporary list. Signed-off-by: Christian König <christian.koenig@amd.com> --- drivers/gpu/drm/ttm/ttm_bo.c | 77 ++++++++++++++------------------------------ 1 file changed, 25 insertions(+), 52 deletions(-)