synx.c 68 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2019-2021, The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2022-2023, Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #include <linux/atomic.h>
  7. #include <linux/file.h>
  8. #include <linux/fs.h>
  9. #include <linux/module.h>
  10. #include <linux/poll.h>
  11. #include <linux/random.h>
  12. #include <linux/remoteproc/qcom_rproc.h>
  13. #include <linux/slab.h>
  14. #include <linux/sync_file.h>
  15. #include <linux/uaccess.h>
  16. #include <linux/vmalloc.h>
  17. #include "synx_debugfs.h"
  18. #include "synx_private.h"
  19. #include "synx_util.h"
  20. struct synx_device *synx_dev;
  21. static atomic64_t synx_counter = ATOMIC64_INIT(1);
  22. void synx_external_callback(s32 sync_obj, int status, void *data)
  23. {
  24. struct synx_signal_cb *signal_cb = data;
  25. if (IS_ERR_OR_NULL(signal_cb)) {
  26. dprintk(SYNX_ERR,
  27. "invalid payload from external obj %d [%d]\n",
  28. sync_obj, status);
  29. return;
  30. }
  31. signal_cb->status = status;
  32. signal_cb->ext_sync_id = sync_obj;
  33. signal_cb->flag = SYNX_SIGNAL_FROM_CALLBACK;
  34. dprintk(SYNX_DBG,
  35. "external callback from %d on handle %u\n",
  36. sync_obj, signal_cb->handle);
  37. /*
  38. * invoke the handler directly as external callback
  39. * is invoked from separate task.
  40. * avoids creation of separate task again.
  41. */
  42. synx_signal_handler(&signal_cb->cb_dispatch);
  43. }
  44. EXPORT_SYMBOL(synx_external_callback);
  45. bool synx_fence_enable_signaling(struct dma_fence *fence)
  46. {
  47. return true;
  48. }
  49. const char *synx_fence_driver_name(struct dma_fence *fence)
  50. {
  51. return "Global Synx driver";
  52. }
  53. void synx_fence_release(struct dma_fence *fence)
  54. {
  55. /* release the memory allocated during create */
  56. kfree(fence->lock);
  57. kfree(fence);
  58. dprintk(SYNX_MEM, "released backing fence %pK\n", fence);
  59. }
  60. EXPORT_SYMBOL(synx_fence_release);
  61. static struct dma_fence_ops synx_fence_ops = {
  62. .wait = dma_fence_default_wait,
  63. .enable_signaling = synx_fence_enable_signaling,
  64. .get_driver_name = synx_fence_driver_name,
  65. .get_timeline_name = synx_fence_driver_name,
  66. .release = synx_fence_release,
  67. };
  68. static int synx_create_sync_fd(struct dma_fence *fence)
  69. {
  70. int fd;
  71. struct sync_file *sync_file;
  72. if (IS_ERR_OR_NULL(fence))
  73. return -SYNX_INVALID;
  74. fd = get_unused_fd_flags(O_CLOEXEC);
  75. if (fd < 0)
  76. return fd;
  77. sync_file = sync_file_create(fence);
  78. if (IS_ERR_OR_NULL(sync_file)) {
  79. dprintk(SYNX_ERR, "error creating sync file\n");
  80. goto err;
  81. }
  82. fd_install(fd, sync_file->file);
  83. return fd;
  84. err:
  85. put_unused_fd(fd);
  86. return -SYNX_INVALID;
  87. }
  88. void *synx_get_fence(struct synx_session *session,
  89. u32 h_synx)
  90. {
  91. struct synx_client *client;
  92. struct synx_handle_coredata *synx_data;
  93. struct synx_coredata *synx_obj;
  94. struct dma_fence *fence = NULL;
  95. client = synx_get_client(session);
  96. if (IS_ERR_OR_NULL(client))
  97. return NULL;
  98. synx_data = synx_util_acquire_handle(client, h_synx);
  99. synx_obj = synx_util_obtain_object(synx_data);
  100. if (IS_ERR_OR_NULL(synx_obj) ||
  101. IS_ERR_OR_NULL(synx_obj->fence)) {
  102. dprintk(SYNX_ERR,
  103. "[sess :%llu] invalid handle access %u\n",
  104. client->id, h_synx);
  105. goto fail;
  106. }
  107. mutex_lock(&synx_obj->obj_lock);
  108. fence = synx_obj->fence;
  109. /* obtain an additional reference to the fence */
  110. dma_fence_get(fence);
  111. mutex_unlock(&synx_obj->obj_lock);
  112. fail:
  113. synx_util_release_handle(synx_data);
  114. synx_put_client(client);
  115. return fence;
  116. }
  117. EXPORT_SYMBOL(synx_get_fence);
  118. static int synx_native_check_bind(struct synx_client *client,
  119. struct synx_create_params *params)
  120. {
  121. int rc;
  122. u32 h_synx;
  123. struct synx_entry_64 *ext_entry;
  124. struct synx_map_entry *entry;
  125. if (IS_ERR_OR_NULL(params->fence))
  126. return -SYNX_INVALID;
  127. ext_entry = synx_util_retrieve_data(params->fence,
  128. synx_util_map_params_to_type(params->flags));
  129. if (IS_ERR_OR_NULL(ext_entry))
  130. return -SYNX_NOENT;
  131. h_synx = ext_entry->data[0];
  132. synx_util_remove_data(params->fence,
  133. synx_util_map_params_to_type(params->flags));
  134. entry = synx_util_get_map_entry(h_synx);
  135. if (IS_ERR_OR_NULL(entry))
  136. /* possible cleanup, retry to alloc new handle */
  137. return -SYNX_NOENT;
  138. rc = synx_util_init_handle(client, entry->synx_obj,
  139. &h_synx, entry);
  140. if (rc != SYNX_SUCCESS) {
  141. dprintk(SYNX_ERR,
  142. "[sess :%llu] new handle init failed\n",
  143. client->id);
  144. goto fail;
  145. }
  146. *params->h_synx = h_synx;
  147. return SYNX_SUCCESS;
  148. fail:
  149. synx_util_release_map_entry(entry);
  150. return rc;
  151. }
  152. static int synx_native_create_core(struct synx_client *client,
  153. struct synx_create_params *params)
  154. {
  155. int rc;
  156. struct synx_coredata *synx_obj;
  157. struct synx_map_entry *map_entry;
  158. if (IS_ERR_OR_NULL(client) || IS_ERR_OR_NULL(params) ||
  159. IS_ERR_OR_NULL(params->h_synx))
  160. return -SYNX_INVALID;
  161. synx_obj = kzalloc(sizeof(*synx_obj), GFP_KERNEL);
  162. if (IS_ERR_OR_NULL(synx_obj))
  163. return -SYNX_NOMEM;
  164. rc = synx_util_init_coredata(synx_obj, params,
  165. &synx_fence_ops, client->dma_context);
  166. if (rc) {
  167. dprintk(SYNX_ERR,
  168. "[sess :%llu] handle allocation failed\n",
  169. client->id);
  170. kfree(synx_obj);
  171. goto fail;
  172. }
  173. map_entry = synx_util_insert_to_map(synx_obj,
  174. *params->h_synx, 0);
  175. if (IS_ERR_OR_NULL(map_entry)) {
  176. rc = PTR_ERR(map_entry);
  177. synx_util_put_object(synx_obj);
  178. goto fail;
  179. }
  180. rc = synx_util_add_callback(synx_obj, *params->h_synx);
  181. if (rc != SYNX_SUCCESS) {
  182. synx_util_release_map_entry(map_entry);
  183. goto fail;
  184. }
  185. rc = synx_util_init_handle(client, synx_obj,
  186. params->h_synx, map_entry);
  187. if (rc < 0) {
  188. dprintk(SYNX_ERR,
  189. "[sess :%llu] unable to init new handle\n",
  190. client->id);
  191. synx_util_release_map_entry(map_entry);
  192. goto fail;
  193. }
  194. dprintk(SYNX_MEM,
  195. "[sess :%llu] allocated %u, core %pK, fence %pK\n",
  196. client->id, *params->h_synx, synx_obj, synx_obj->fence);
  197. return SYNX_SUCCESS;
  198. fail:
  199. return rc;
  200. }
  201. int synx_create(struct synx_session *session,
  202. struct synx_create_params *params)
  203. {
  204. int rc = -SYNX_NOENT;
  205. struct synx_client *client;
  206. struct synx_external_desc_v2 ext_desc = {0};
  207. if (IS_ERR_OR_NULL(params) || IS_ERR_OR_NULL(params->h_synx) ||
  208. params->flags > SYNX_CREATE_MAX_FLAGS) {
  209. dprintk(SYNX_ERR, "invalid create arguments\n");
  210. return -SYNX_INVALID;
  211. }
  212. if (params->flags & SYNX_CREATE_DMA_FENCE) {
  213. dprintk(SYNX_ERR,
  214. "handle create with native fence not supported\n");
  215. return -SYNX_NOSUPPORT;
  216. }
  217. client = synx_get_client(session);
  218. if (IS_ERR_OR_NULL(client))
  219. return -SYNX_INVALID;
  220. *params->h_synx = 0;
  221. do {
  222. /* create with external fence */
  223. if (!IS_ERR_OR_NULL(params->fence))
  224. rc = synx_native_check_bind(client, params);
  225. if (rc == -SYNX_NOENT) {
  226. rc = synx_native_create_core(client, params);
  227. if (rc == SYNX_SUCCESS &&
  228. !IS_ERR_OR_NULL(params->fence)) {
  229. /* save external fence details */
  230. rc = synx_util_save_data(params->fence,
  231. synx_util_map_params_to_type(params->flags),
  232. *params->h_synx);
  233. if (rc == -SYNX_ALREADY) {
  234. /*
  235. * raced with create on same fence from
  236. * another client. clear the allocated
  237. * handle and retry.
  238. */
  239. synx_native_release_core(client, *params->h_synx);
  240. *params->h_synx = 0;
  241. rc = -SYNX_NOENT;
  242. continue;
  243. } else if (rc != SYNX_SUCCESS) {
  244. dprintk(SYNX_ERR,
  245. "allocating handle failed=%d", rc);
  246. synx_native_release_core(client, *params->h_synx);
  247. break;
  248. }
  249. /* bind with external fence */
  250. ext_desc.id = *((u32 *)params->fence);
  251. ext_desc.type = synx_util_map_params_to_type(params->flags);
  252. rc = synx_bind(session, *params->h_synx, ext_desc);
  253. if (rc != SYNX_SUCCESS) {
  254. dprintk(SYNX_ERR,
  255. "[sess :%llu] bind external fence failed\n",
  256. client->id);
  257. synx_native_release_core(client, *params->h_synx);
  258. goto fail;
  259. }
  260. }
  261. }
  262. if (rc == SYNX_SUCCESS)
  263. dprintk(SYNX_VERB,
  264. "[sess :%llu] handle allocated %u\n",
  265. client->id, *params->h_synx);
  266. break;
  267. } while (true);
  268. fail:
  269. synx_put_client(client);
  270. return rc;
  271. }
  272. EXPORT_SYMBOL(synx_create);
  273. int synx_native_signal_core(struct synx_coredata *synx_obj,
  274. u32 status,
  275. bool cb_signal,
  276. u64 ext_sync_id)
  277. {
  278. int rc = 0;
  279. int ret;
  280. u32 i = 0;
  281. u32 idx = 0;
  282. s32 sync_id;
  283. u32 type;
  284. void *data = NULL;
  285. struct synx_bind_desc bind_descs[SYNX_MAX_NUM_BINDINGS];
  286. struct bind_operations *bind_ops = NULL;
  287. if (IS_ERR_OR_NULL(synx_obj))
  288. return -SYNX_INVALID;
  289. synx_util_callback_dispatch(synx_obj, status);
  290. /*
  291. * signal the external bound sync obj/s even if fence signal fails,
  292. * w/ error signal state (set above) to prevent deadlock
  293. */
  294. if (synx_obj->num_bound_synxs > 0) {
  295. memset(bind_descs, 0,
  296. sizeof(struct synx_bind_desc) * SYNX_MAX_NUM_BINDINGS);
  297. for (i = 0; i < synx_obj->num_bound_synxs; i++) {
  298. /* signal invoked by external sync obj */
  299. if (cb_signal &&
  300. (ext_sync_id ==
  301. synx_obj->bound_synxs[i].external_desc.id)) {
  302. dprintk(SYNX_VERB,
  303. "skipping signaling inbound sync: %llu\n",
  304. ext_sync_id);
  305. type = synx_obj->bound_synxs[i].external_desc.type;
  306. memset(&synx_obj->bound_synxs[i], 0,
  307. sizeof(struct synx_bind_desc));
  308. /* clear the hash table entry */
  309. synx_util_remove_data(&ext_sync_id, type);
  310. continue;
  311. }
  312. memcpy(&bind_descs[idx++],
  313. &synx_obj->bound_synxs[i],
  314. sizeof(struct synx_bind_desc));
  315. /* clear the memory, its been backed up above */
  316. memset(&synx_obj->bound_synxs[i], 0,
  317. sizeof(struct synx_bind_desc));
  318. }
  319. synx_obj->num_bound_synxs = 0;
  320. }
  321. for (i = 0; i < idx; i++) {
  322. sync_id = bind_descs[i].external_desc.id;
  323. data = bind_descs[i].external_data;
  324. type = bind_descs[i].external_desc.type;
  325. bind_ops = synx_util_get_bind_ops(type);
  326. if (IS_ERR_OR_NULL(bind_ops)) {
  327. dprintk(SYNX_ERR,
  328. "invalid bind ops for type: %u\n", type);
  329. kfree(data);
  330. continue;
  331. }
  332. /* clear the hash table entry */
  333. synx_util_remove_data(&sync_id, type);
  334. /*
  335. * we are already signaled, so don't want to
  336. * recursively be signaled
  337. */
  338. ret = bind_ops->deregister_callback(
  339. synx_external_callback, data, sync_id);
  340. if (ret < 0) {
  341. dprintk(SYNX_ERR,
  342. "deregistration fail on %d, type: %u, err=%d\n",
  343. sync_id, type, ret);
  344. continue;
  345. }
  346. dprintk(SYNX_VERB,
  347. "signal external sync: %d, type: %u, status: %u\n",
  348. sync_id, type, status);
  349. /* optional function to enable external signaling */
  350. if (bind_ops->enable_signaling) {
  351. ret = bind_ops->enable_signaling(sync_id);
  352. if (ret < 0)
  353. dprintk(SYNX_ERR,
  354. "enabling fail on %d, type: %u, err=%d\n",
  355. sync_id, type, ret);
  356. }
  357. ret = bind_ops->signal(sync_id, status);
  358. if (ret < 0)
  359. dprintk(SYNX_ERR,
  360. "signaling fail on %d, type: %u, err=%d\n",
  361. sync_id, type, ret);
  362. /*
  363. * release the memory allocated for external data.
  364. * It is safe to release this memory as external cb
  365. * has been already deregistered before this.
  366. */
  367. kfree(data);
  368. }
  369. return rc;
  370. }
  371. int synx_native_signal_fence(struct synx_coredata *synx_obj,
  372. u32 status)
  373. {
  374. int rc = 0;
  375. unsigned long flags;
  376. if (IS_ERR_OR_NULL(synx_obj) || IS_ERR_OR_NULL(synx_obj->fence))
  377. return -SYNX_INVALID;
  378. if (status <= SYNX_STATE_ACTIVE) {
  379. dprintk(SYNX_ERR, "signaling with wrong status: %u\n",
  380. status);
  381. return -SYNX_INVALID;
  382. }
  383. if (synx_util_is_merged_object(synx_obj)) {
  384. dprintk(SYNX_ERR, "signaling a composite handle\n");
  385. return -SYNX_INVALID;
  386. }
  387. if (synx_util_get_object_status(synx_obj) !=
  388. SYNX_STATE_ACTIVE)
  389. return -SYNX_ALREADY;
  390. if (IS_ERR_OR_NULL(synx_obj->signal_cb)) {
  391. dprintk(SYNX_ERR, "signal cb in bad state\n");
  392. return -SYNX_INVALID;
  393. }
  394. /*
  395. * remove registered callback for the fence
  396. * so it does not invoke the signal through callback again
  397. */
  398. if (!dma_fence_remove_callback(synx_obj->fence,
  399. &synx_obj->signal_cb->fence_cb)) {
  400. dprintk(SYNX_ERR, "callback could not be removed\n");
  401. return -SYNX_INVALID;
  402. }
  403. dprintk(SYNX_MEM, "signal cb destroyed %pK\n",
  404. synx_obj->signal_cb);
  405. kfree(synx_obj->signal_cb);
  406. synx_obj->signal_cb = NULL;
  407. /* releasing reference held by signal cb */
  408. synx_util_put_object(synx_obj);
  409. spin_lock_irqsave(synx_obj->fence->lock, flags);
  410. /* check the status again acquiring lock to avoid errors */
  411. if (synx_util_get_object_status_locked(synx_obj) !=
  412. SYNX_STATE_ACTIVE) {
  413. spin_unlock_irqrestore(synx_obj->fence->lock, flags);
  414. return -SYNX_ALREADY;
  415. }
  416. /* set fence error to model {signal w/ error} */
  417. if (status != SYNX_STATE_SIGNALED_SUCCESS)
  418. dma_fence_set_error(synx_obj->fence, -status);
  419. rc = dma_fence_signal_locked(synx_obj->fence);
  420. if (rc)
  421. dprintk(SYNX_ERR,
  422. "signaling fence %pK failed=%d\n",
  423. synx_obj->fence, rc);
  424. spin_unlock_irqrestore(synx_obj->fence->lock, flags);
  425. return rc;
  426. }
  427. int synx_native_signal_merged_fence(struct synx_coredata *synx_obj, u32 status)
  428. {
  429. int rc = SYNX_SUCCESS;
  430. unsigned long flags;
  431. int i = 0, num_fences = 0;
  432. struct synx_coredata **synx_child_obj = NULL;
  433. rc = synx_get_child_coredata(synx_obj, &synx_child_obj, &num_fences);
  434. if (rc != SYNX_SUCCESS)
  435. return rc;
  436. for(i = 0; i < num_fences; i++)
  437. {
  438. if (IS_ERR_OR_NULL(synx_child_obj[i]) || IS_ERR_OR_NULL(synx_child_obj[i]->fence)) {
  439. dprintk(SYNX_ERR, "Invalid child coredata %d\n", i);
  440. rc = -SYNX_NOENT;
  441. goto fail;
  442. }
  443. mutex_lock(&synx_child_obj[i]->obj_lock);
  444. spin_lock_irqsave(synx_child_obj[i]->fence->lock, flags);
  445. if (synx_util_get_object_status_locked(synx_child_obj[i]) != SYNX_STATE_ACTIVE ||
  446. !synx_util_is_global_object(synx_child_obj[i]))
  447. {
  448. spin_unlock_irqrestore(synx_child_obj[i]->fence->lock, flags);
  449. mutex_unlock(&synx_child_obj[i]->obj_lock);
  450. continue;
  451. }
  452. spin_unlock_irqrestore(synx_child_obj[i]->fence->lock, flags);
  453. rc = synx_native_signal_fence(synx_child_obj[i], status);
  454. mutex_unlock(&synx_child_obj[i]->obj_lock);
  455. }
  456. fail:
  457. kfree(synx_child_obj);
  458. return rc;
  459. }
  460. void synx_signal_handler(struct work_struct *cb_dispatch)
  461. {
  462. int rc = SYNX_SUCCESS;
  463. u32 idx;
  464. struct synx_signal_cb *signal_cb =
  465. container_of(cb_dispatch, struct synx_signal_cb, cb_dispatch);
  466. struct synx_coredata *synx_obj = signal_cb->synx_obj;
  467. u32 h_synx = signal_cb->handle;
  468. u32 status = signal_cb->status;
  469. if ((signal_cb->flag & SYNX_SIGNAL_FROM_FENCE) &&
  470. (synx_util_is_global_handle(h_synx) ||
  471. synx_util_is_global_object(synx_obj))) {
  472. idx = (IS_ERR_OR_NULL(synx_obj)) ?
  473. synx_util_global_idx(h_synx) :
  474. synx_obj->global_idx;
  475. rc = synx_global_update_status(idx, status);
  476. if (rc != SYNX_SUCCESS)
  477. dprintk(SYNX_ERR,
  478. "global status update of %u failed=%d\n",
  479. h_synx, rc);
  480. /*
  481. * We are decrementing the reference here assuming this code will be
  482. * executed after handle is released. But in case if clients signal
  483. * dma fence in middle of execution sequence, then we will put
  484. * one reference thus deleting the global idx. As of now clients cannot
  485. * signal dma fence.
  486. */
  487. synx_global_put_ref(idx);
  488. }
  489. /*
  490. * when invoked from external callback, possible for
  491. * all local clients to have released the handle coredata.
  492. */
  493. if (IS_ERR_OR_NULL(synx_obj)) {
  494. dprintk(SYNX_WARN,
  495. "handle %d has no local clients\n",
  496. h_synx);
  497. dprintk(SYNX_MEM, "signal cb destroyed %pK\n",
  498. signal_cb);
  499. kfree(signal_cb);
  500. return;
  501. }
  502. if (rc != SYNX_SUCCESS) {
  503. dprintk(SYNX_ERR,
  504. "global status update for %u failed=%d\n",
  505. h_synx, rc);
  506. goto fail;
  507. }
  508. mutex_lock(&synx_obj->obj_lock);
  509. if (signal_cb->flag & SYNX_SIGNAL_FROM_IPC) {
  510. if (synx_util_is_merged_object(synx_obj))
  511. rc = synx_native_signal_merged_fence(synx_obj, status);
  512. else
  513. rc = synx_native_signal_fence(synx_obj, status);
  514. }
  515. if (rc == SYNX_SUCCESS && !synx_util_is_merged_object(synx_obj))
  516. rc = synx_native_signal_core(synx_obj, status,
  517. (signal_cb->flag & SYNX_SIGNAL_FROM_CALLBACK) ?
  518. true : false, signal_cb->ext_sync_id);
  519. mutex_unlock(&synx_obj->obj_lock);
  520. if (rc != SYNX_SUCCESS)
  521. dprintk(SYNX_ERR,
  522. "internal signaling %u failed=%d",
  523. h_synx, rc);
  524. fail:
  525. /* release reference held by signal cb */
  526. synx_util_put_object(synx_obj);
  527. dprintk(SYNX_MEM, "signal cb destroyed %pK\n", signal_cb);
  528. kfree(signal_cb);
  529. dprintk(SYNX_VERB, "signal handle %u dispatch complete=%d",
  530. h_synx, rc);
  531. }
  532. /* function would be called from atomic context */
  533. void synx_fence_callback(struct dma_fence *fence,
  534. struct dma_fence_cb *cb)
  535. {
  536. s32 status;
  537. struct synx_signal_cb *signal_cb =
  538. container_of(cb, struct synx_signal_cb, fence_cb);
  539. dprintk(SYNX_DBG,
  540. "callback from external fence %pK for handle %u\n",
  541. fence, signal_cb->handle);
  542. /* other signal_cb members would be set during cb registration */
  543. status = dma_fence_get_status_locked(fence);
  544. /*
  545. * dma_fence_get_status_locked API returns 1 if signaled,
  546. * 0 if ACTIVE,
  547. * and negative error code in case of any failure
  548. */
  549. if (status == 1)
  550. status = SYNX_STATE_SIGNALED_SUCCESS;
  551. else if (status < 0)
  552. status = SYNX_STATE_SIGNALED_EXTERNAL;
  553. signal_cb->status = status;
  554. INIT_WORK(&signal_cb->cb_dispatch, synx_signal_handler);
  555. queue_work(synx_dev->wq_cb, &signal_cb->cb_dispatch);
  556. }
  557. EXPORT_SYMBOL(synx_fence_callback);
  558. static int synx_signal_offload_job(
  559. struct synx_client *client,
  560. struct synx_coredata *synx_obj,
  561. u32 h_synx, u32 status)
  562. {
  563. int rc = SYNX_SUCCESS;
  564. struct synx_signal_cb *signal_cb;
  565. signal_cb = kzalloc(sizeof(*signal_cb), GFP_ATOMIC);
  566. if (IS_ERR_OR_NULL(signal_cb)) {
  567. rc = -SYNX_NOMEM;
  568. goto fail;
  569. }
  570. /*
  571. * since the signal will be queued to separate thread,
  572. * to ensure the synx coredata pointer remain valid, get
  573. * additional reference, thus avoiding any potential
  574. * use-after-free.
  575. */
  576. synx_util_get_object(synx_obj);
  577. signal_cb->handle = h_synx;
  578. signal_cb->status = status;
  579. signal_cb->synx_obj = synx_obj;
  580. signal_cb->flag = SYNX_SIGNAL_FROM_CLIENT;
  581. dprintk(SYNX_VERB,
  582. "[sess :%llu] signal work queued for %u\n",
  583. client->id, h_synx);
  584. INIT_WORK(&signal_cb->cb_dispatch, synx_signal_handler);
  585. queue_work(synx_dev->wq_cb, &signal_cb->cb_dispatch);
  586. fail:
  587. return rc;
  588. }
  589. int synx_signal(struct synx_session *session, u32 h_synx, u32 status)
  590. {
  591. int rc = SYNX_SUCCESS;
  592. struct synx_client *client;
  593. struct synx_handle_coredata *synx_data = NULL;
  594. struct synx_coredata *synx_obj;
  595. client = synx_get_client(session);
  596. if (IS_ERR_OR_NULL(client))
  597. return -SYNX_INVALID;
  598. if (status <= SYNX_STATE_ACTIVE) {
  599. dprintk(SYNX_ERR,
  600. "[sess :%llu] signaling with wrong status: %u\n",
  601. client->id, status);
  602. rc = -SYNX_INVALID;
  603. goto fail;
  604. }
  605. synx_data = synx_util_acquire_handle(client, h_synx);
  606. synx_obj = synx_util_obtain_object(synx_data);
  607. if (IS_ERR_OR_NULL(synx_obj) ||
  608. IS_ERR_OR_NULL(synx_obj->fence)) {
  609. dprintk(SYNX_ERR,
  610. "[sess :%llu] invalid handle access %u\n",
  611. client->id, h_synx);
  612. rc = -SYNX_INVALID;
  613. goto fail;
  614. }
  615. mutex_lock(&synx_obj->obj_lock);
  616. if (synx_util_is_global_handle(h_synx) ||
  617. synx_util_is_global_object(synx_obj))
  618. rc = synx_global_update_status(
  619. synx_obj->global_idx, status);
  620. if (rc != SYNX_SUCCESS) {
  621. mutex_unlock(&synx_obj->obj_lock);
  622. dprintk(SYNX_ERR,
  623. "[sess :%llu] status update %d failed=%d\n",
  624. client->id, h_synx, rc);
  625. goto fail;
  626. }
  627. /*
  628. * offload callback dispatch and external fence
  629. * notification to separate worker thread, if any.
  630. */
  631. if (synx_obj->num_bound_synxs ||
  632. !list_empty(&synx_obj->reg_cbs_list))
  633. rc = synx_signal_offload_job(client, synx_obj,
  634. h_synx, status);
  635. rc = synx_native_signal_fence(synx_obj, status);
  636. if (rc != SYNX_SUCCESS)
  637. dprintk(SYNX_ERR,
  638. "[sess :%llu] signaling %u failed=%d\n",
  639. client->id, h_synx, rc);
  640. mutex_unlock(&synx_obj->obj_lock);
  641. fail:
  642. synx_util_release_handle(synx_data);
  643. synx_put_client(client);
  644. return rc;
  645. }
  646. EXPORT_SYMBOL(synx_signal);
  647. static int synx_match_payload(struct synx_kernel_payload *cb_payload,
  648. struct synx_kernel_payload *payload)
  649. {
  650. int rc = 0;
  651. if (IS_ERR_OR_NULL(cb_payload) || IS_ERR_OR_NULL(payload))
  652. return -SYNX_INVALID;
  653. if ((cb_payload->cb_func == payload->cb_func) &&
  654. (cb_payload->data == payload->data)) {
  655. if (payload->cancel_cb_func) {
  656. cb_payload->cb_func =
  657. payload->cancel_cb_func;
  658. rc = 1;
  659. } else {
  660. rc = 2;
  661. dprintk(SYNX_VERB,
  662. "kernel cb de-registration success\n");
  663. }
  664. }
  665. return rc;
  666. }
  667. int synx_async_wait(struct synx_session *session,
  668. struct synx_callback_params *params)
  669. {
  670. int rc = 0;
  671. u32 idx;
  672. u32 status;
  673. struct synx_client *client;
  674. struct synx_handle_coredata *synx_data;
  675. struct synx_coredata *synx_obj;
  676. struct synx_cb_data *synx_cb;
  677. struct synx_kernel_payload payload;
  678. if (IS_ERR_OR_NULL(session) || IS_ERR_OR_NULL(params))
  679. return -SYNX_INVALID;
  680. if (params->timeout_ms != SYNX_NO_TIMEOUT)
  681. return -SYNX_NOSUPPORT;
  682. client = synx_get_client(session);
  683. if (IS_ERR_OR_NULL(client))
  684. return -SYNX_INVALID;
  685. synx_data = synx_util_acquire_handle(client, params->h_synx);
  686. synx_obj = synx_util_obtain_object(synx_data);
  687. if (IS_ERR_OR_NULL(synx_obj)) {
  688. dprintk(SYNX_ERR,
  689. "[sess :%llu] invalid handle access %u\n",
  690. client->id, params->h_synx);
  691. rc = -SYNX_INVALID;
  692. goto fail;
  693. }
  694. mutex_lock(&synx_obj->obj_lock);
  695. synx_cb = kzalloc(sizeof(*synx_cb), GFP_ATOMIC);
  696. if (IS_ERR_OR_NULL(synx_cb)) {
  697. rc = -SYNX_NOMEM;
  698. goto release;
  699. }
  700. payload.h_synx = params->h_synx;
  701. payload.cb_func = params->cb_func;
  702. payload.data = params->userdata;
  703. /* allocate a free index from client cb table */
  704. rc = synx_util_alloc_cb_entry(client, &payload, &idx);
  705. if (rc) {
  706. dprintk(SYNX_ERR,
  707. "[sess :%llu] error allocating cb entry\n",
  708. client->id);
  709. kfree(synx_cb);
  710. goto release;
  711. }
  712. if (synx_util_is_global_handle(params->h_synx) ||
  713. synx_util_is_global_object(synx_obj)) {
  714. status = synx_global_test_status_set_wait(
  715. synx_util_global_idx(params->h_synx),
  716. SYNX_CORE_APSS);
  717. if (status != SYNX_STATE_ACTIVE) {
  718. if (synx_util_is_merged_object(synx_obj))
  719. synx_native_signal_merged_fence(synx_obj, status);
  720. else
  721. synx_native_signal_fence(synx_obj, status);
  722. }
  723. }
  724. else
  725. status = synx_util_get_object_status(synx_obj);
  726. synx_cb->session = session;
  727. synx_cb->idx = idx;
  728. INIT_WORK(&synx_cb->cb_dispatch, synx_util_cb_dispatch);
  729. /* add callback if object still ACTIVE, dispatch if SIGNALED */
  730. if (status == SYNX_STATE_ACTIVE) {
  731. dprintk(SYNX_VERB,
  732. "[sess :%llu] callback added for handle %u\n",
  733. client->id, params->h_synx);
  734. list_add(&synx_cb->node, &synx_obj->reg_cbs_list);
  735. } else {
  736. synx_cb->status = status;
  737. dprintk(SYNX_VERB,
  738. "[sess :%llu] callback queued for handle %u\n",
  739. client->id, params->h_synx);
  740. queue_work(synx_dev->wq_cb,
  741. &synx_cb->cb_dispatch);
  742. }
  743. release:
  744. mutex_unlock(&synx_obj->obj_lock);
  745. fail:
  746. synx_util_release_handle(synx_data);
  747. synx_put_client(client);
  748. return rc;
  749. }
  750. EXPORT_SYMBOL(synx_async_wait);
  751. int synx_cancel_async_wait(
  752. struct synx_session *session,
  753. struct synx_callback_params *params)
  754. {
  755. int rc = 0, ret = 0;
  756. u32 status;
  757. bool match_found = false;
  758. struct synx_client *client;
  759. struct synx_handle_coredata *synx_data;
  760. struct synx_coredata *synx_obj;
  761. struct synx_kernel_payload payload;
  762. struct synx_cb_data *synx_cb, *synx_cb_temp;
  763. struct synx_client_cb *cb_payload;
  764. if (IS_ERR_OR_NULL(session) || IS_ERR_OR_NULL(params))
  765. return -SYNX_INVALID;
  766. client = synx_get_client(session);
  767. if (IS_ERR_OR_NULL(client))
  768. return -SYNX_INVALID;
  769. synx_data = synx_util_acquire_handle(client, params->h_synx);
  770. synx_obj = synx_util_obtain_object(synx_data);
  771. if (IS_ERR_OR_NULL(synx_obj)) {
  772. dprintk(SYNX_ERR,
  773. "[sess :%llu] invalid handle access %u\n",
  774. client->id, params->h_synx);
  775. rc = -SYNX_INVALID;
  776. goto fail;
  777. }
  778. mutex_lock(&synx_obj->obj_lock);
  779. if (synx_util_is_external_object(synx_obj)) {
  780. dprintk(SYNX_ERR,
  781. "cannot cancel wait on external fence\n");
  782. goto release;
  783. }
  784. payload.h_synx = params->h_synx;
  785. payload.cb_func = params->cb_func;
  786. payload.data = params->userdata;
  787. payload.cancel_cb_func = params->cancel_cb_func;
  788. status = synx_util_get_object_status(synx_obj);
  789. if (status != SYNX_STATE_ACTIVE) {
  790. dprintk(SYNX_ERR,
  791. "handle %u already signaled cannot cancel\n",
  792. params->h_synx);
  793. rc = -SYNX_INVALID;
  794. goto release;
  795. }
  796. status = SYNX_CALLBACK_RESULT_CANCELED;
  797. /* remove all cb payloads mayching the deregister call */
  798. list_for_each_entry_safe(synx_cb, synx_cb_temp,
  799. &synx_obj->reg_cbs_list, node) {
  800. if (synx_cb->session != session) {
  801. continue;
  802. } else if (synx_cb->idx == 0 ||
  803. synx_cb->idx >= SYNX_MAX_OBJS) {
  804. /*
  805. * this should not happen. Even if it does,
  806. * the allocated memory will be cleaned up
  807. * when object is destroyed, preventing any
  808. * memory leaks.
  809. */
  810. dprintk(SYNX_ERR,
  811. "[sess :%llu] invalid callback data\n",
  812. client->id);
  813. continue;
  814. }
  815. cb_payload = &client->cb_table[synx_cb->idx];
  816. ret = synx_match_payload(&cb_payload->kernel_cb, &payload);
  817. switch (ret) {
  818. case 1:
  819. /* queue the cancel cb work */
  820. list_del_init(&synx_cb->node);
  821. synx_cb->status = status;
  822. queue_work(synx_dev->wq_cb,
  823. &synx_cb->cb_dispatch);
  824. match_found = true;
  825. break;
  826. case 2:
  827. /* no cancellation cb */
  828. if (synx_util_clear_cb_entry(client, cb_payload))
  829. dprintk(SYNX_ERR,
  830. "[sess :%llu] error clearing cb %u\n",
  831. client->id, params->h_synx);
  832. list_del_init(&synx_cb->node);
  833. kfree(synx_cb);
  834. match_found = true;
  835. break;
  836. default:
  837. break;
  838. }
  839. }
  840. if (!match_found)
  841. rc = -SYNX_INVALID;
  842. release:
  843. mutex_unlock(&synx_obj->obj_lock);
  844. fail:
  845. synx_util_release_handle(synx_data);
  846. synx_put_client(client);
  847. return rc;
  848. }
  849. EXPORT_SYMBOL(synx_cancel_async_wait);
  850. int synx_merge(struct synx_session *session,
  851. struct synx_merge_params *params)
  852. {
  853. int rc, i, num_signaled = 0;
  854. u32 count = 0, h_child, status = SYNX_STATE_ACTIVE;
  855. u32 *h_child_list = NULL, *h_child_idx_list = NULL;
  856. struct synx_client *client;
  857. struct dma_fence **fences = NULL;
  858. struct synx_map_entry *map_entry;
  859. struct synx_coredata *synx_obj, *synx_obj_child;
  860. struct synx_handle_coredata *synx_data_child;
  861. if (IS_ERR_OR_NULL(session) || IS_ERR_OR_NULL(params))
  862. return -SYNX_INVALID;
  863. if (IS_ERR_OR_NULL(params->h_synxs) ||
  864. IS_ERR_OR_NULL(params->h_merged_obj)) {
  865. dprintk(SYNX_ERR, "invalid arguments\n");
  866. return -SYNX_INVALID;
  867. }
  868. client = synx_get_client(session);
  869. if (IS_ERR_OR_NULL(client))
  870. return -SYNX_INVALID;
  871. rc = synx_util_validate_merge(client, params->h_synxs,
  872. params->num_objs, &fences, &count);
  873. if (rc < 0) {
  874. dprintk(SYNX_ERR,
  875. "[sess :%llu] merge validation failed\n",
  876. client->id);
  877. rc = -SYNX_INVALID;
  878. goto fail;
  879. }
  880. synx_obj = kzalloc(sizeof(*synx_obj), GFP_KERNEL);
  881. if (IS_ERR_OR_NULL(synx_obj)) {
  882. rc = -SYNX_NOMEM;
  883. goto fail;
  884. }
  885. rc = synx_util_init_group_coredata(synx_obj, fences,
  886. params, count, client->dma_context);
  887. if (rc) {
  888. dprintk(SYNX_ERR,
  889. "[sess :%llu] error initializing merge handle\n",
  890. client->id);
  891. goto clean_up;
  892. }
  893. map_entry = synx_util_insert_to_map(synx_obj,
  894. *params->h_merged_obj, 0);
  895. if (IS_ERR_OR_NULL(map_entry)) {
  896. rc = PTR_ERR(map_entry);
  897. goto clean_up;
  898. }
  899. rc = synx_util_init_handle(client, synx_obj,
  900. params->h_merged_obj, map_entry);
  901. if (rc) {
  902. dprintk(SYNX_ERR,
  903. "[sess :%llu] unable to init merge handle %u\n",
  904. client->id, *params->h_merged_obj);
  905. dma_fence_put(synx_obj->fence);
  906. goto clear;
  907. }
  908. h_child_list = kzalloc(count*4, GFP_KERNEL);
  909. if (IS_ERR_OR_NULL(h_child_list)) {
  910. rc = -SYNX_NOMEM;
  911. goto clear;
  912. }
  913. h_child_idx_list = kzalloc(count*4, GFP_KERNEL);
  914. if (IS_ERR_OR_NULL(h_child_idx_list)) {
  915. rc = -SYNX_NOMEM;
  916. goto clear;
  917. }
  918. for (i = 0; i < count; i++) {
  919. h_child = synx_util_get_fence_entry((u64)fences[i], 1);
  920. if (!synx_util_is_global_handle(h_child))
  921. continue;
  922. h_child_list[num_signaled] = h_child;
  923. h_child_idx_list[num_signaled++] = synx_util_global_idx(h_child);
  924. }
  925. if (params->flags & SYNX_MERGE_GLOBAL_FENCE) {
  926. rc = synx_global_merge(h_child_idx_list, num_signaled,
  927. synx_util_global_idx(*params->h_merged_obj));
  928. if (rc != SYNX_SUCCESS) {
  929. dprintk(SYNX_ERR, "global merge failed\n");
  930. kfree(h_child_list);
  931. kfree(h_child_idx_list);
  932. goto clear;
  933. }
  934. }
  935. else {
  936. for(i = 0; i < num_signaled; i++) {
  937. status = synx_global_test_status_set_wait(synx_util_global_idx(h_child_list[i]), SYNX_CORE_APSS);
  938. if (status != SYNX_STATE_ACTIVE) {
  939. synx_data_child = synx_util_acquire_handle(client, h_child_list[i]);
  940. synx_obj_child = synx_util_obtain_object(synx_data_child);
  941. if (IS_ERR_OR_NULL(synx_obj_child)) {
  942. dprintk(SYNX_ERR,
  943. "[sess :%llu] invalid child handle %u\n",
  944. client->id, h_child_list[i]);
  945. continue;
  946. }
  947. rc = synx_native_signal_fence(synx_obj_child, status);
  948. if (rc != SYNX_SUCCESS)
  949. dprintk(SYNX_ERR, "h_synx %u failed with status %d\n", h_child_list[i], rc);
  950. }
  951. }
  952. }
  953. dprintk(SYNX_MEM,
  954. "[sess :%llu] merge allocated %u, core %pK, fence %pK\n",
  955. client->id, *params->h_merged_obj, synx_obj,
  956. synx_obj->fence);
  957. kfree(h_child_list);
  958. kfree(h_child_idx_list);
  959. synx_put_client(client);
  960. return SYNX_SUCCESS;
  961. clear:
  962. synx_util_release_map_entry(map_entry);
  963. clean_up:
  964. kfree(synx_obj);
  965. fail:
  966. synx_util_merge_error(client, params->h_synxs, count);
  967. if (params->num_objs && params->num_objs <= count)
  968. kfree(fences);
  969. synx_put_client(client);
  970. return rc;
  971. }
  972. EXPORT_SYMBOL(synx_merge);
  973. int synx_native_release_core(struct synx_client *client,
  974. u32 h_synx)
  975. {
  976. int rc = -SYNX_INVALID;
  977. struct synx_handle_coredata *curr, *synx_handle = NULL;
  978. spin_lock_bh(&client->handle_map_lock);
  979. hash_for_each_possible(client->handle_map,
  980. curr, node, h_synx) {
  981. if (curr->key == h_synx &&
  982. curr->rel_count != 0) {
  983. curr->rel_count--;
  984. synx_handle = curr;
  985. rc = SYNX_SUCCESS;
  986. break;
  987. }
  988. }
  989. spin_unlock_bh(&client->handle_map_lock);
  990. /* release the reference obtained at synx creation */
  991. synx_util_release_handle(synx_handle);
  992. return rc;
  993. }
  994. int synx_release(struct synx_session *session, u32 h_synx)
  995. {
  996. int rc = 0;
  997. struct synx_client *client;
  998. client = synx_get_client(session);
  999. if (IS_ERR_OR_NULL(client))
  1000. return -SYNX_INVALID;
  1001. rc = synx_native_release_core(client, h_synx);
  1002. synx_put_client(client);
  1003. return rc;
  1004. }
  1005. EXPORT_SYMBOL(synx_release);
  1006. int synx_wait(struct synx_session *session,
  1007. u32 h_synx, u64 timeout_ms)
  1008. {
  1009. int rc = 0;
  1010. unsigned long timeleft;
  1011. struct synx_client *client;
  1012. struct synx_handle_coredata *synx_data;
  1013. struct synx_coredata *synx_obj;
  1014. client = synx_get_client(session);
  1015. if (IS_ERR_OR_NULL(client))
  1016. return -SYNX_INVALID;
  1017. synx_data = synx_util_acquire_handle(client, h_synx);
  1018. synx_obj = synx_util_obtain_object(synx_data);
  1019. if (IS_ERR_OR_NULL(synx_obj) || IS_ERR_OR_NULL(synx_obj->fence)) {
  1020. dprintk(SYNX_ERR,
  1021. "[sess :%llu] invalid handle access %u\n",
  1022. client->id, h_synx);
  1023. rc = -SYNX_INVALID;
  1024. goto fail;
  1025. }
  1026. if (synx_util_is_global_handle(h_synx)) {
  1027. rc = synx_global_test_status_set_wait(
  1028. synx_util_global_idx(h_synx), SYNX_CORE_APSS);
  1029. if (rc != SYNX_STATE_ACTIVE) {
  1030. mutex_lock(&synx_obj->obj_lock);
  1031. if (synx_util_is_merged_object(synx_obj))
  1032. synx_native_signal_merged_fence(synx_obj, rc);
  1033. else
  1034. synx_native_signal_fence(synx_obj, rc);
  1035. mutex_unlock(&synx_obj->obj_lock);
  1036. goto status;
  1037. }
  1038. }
  1039. timeleft = dma_fence_wait_timeout(synx_obj->fence, (bool) 0,
  1040. msecs_to_jiffies(timeout_ms));
  1041. if (timeleft <= 0) {
  1042. dprintk(SYNX_ERR,
  1043. "[sess :%llu] wait timeout for handle %u\n",
  1044. client->id, h_synx);
  1045. rc = -ETIMEDOUT;
  1046. goto fail;
  1047. }
  1048. status:
  1049. mutex_lock(&synx_obj->obj_lock);
  1050. rc = synx_util_get_object_status(synx_obj);
  1051. mutex_unlock(&synx_obj->obj_lock);
  1052. fail:
  1053. synx_util_release_handle(synx_data);
  1054. synx_put_client(client);
  1055. return rc;
  1056. }
  1057. EXPORT_SYMBOL(synx_wait);
  1058. int synx_bind(struct synx_session *session,
  1059. u32 h_synx,
  1060. struct synx_external_desc_v2 external_sync)
  1061. {
  1062. int rc = 0;
  1063. u32 i;
  1064. u32 bound_idx;
  1065. struct synx_client *client;
  1066. struct synx_handle_coredata *synx_data = NULL;
  1067. struct synx_coredata *synx_obj;
  1068. struct synx_signal_cb *data = NULL;
  1069. struct bind_operations *bind_ops = NULL;
  1070. client = synx_get_client(session);
  1071. if (IS_ERR_OR_NULL(client))
  1072. return -SYNX_INVALID;
  1073. synx_data = synx_util_acquire_handle(client, h_synx);
  1074. synx_obj = synx_util_obtain_object(synx_data);
  1075. if (IS_ERR_OR_NULL(synx_obj)) {
  1076. if (rc || synx_data)
  1077. dprintk(SYNX_ERR,
  1078. "[sess :%llu] invalid handle access %u\n",
  1079. client->id, h_synx);
  1080. goto fail;
  1081. }
  1082. bind_ops = synx_util_get_bind_ops(external_sync.type);
  1083. if (IS_ERR_OR_NULL(bind_ops)) {
  1084. dprintk(SYNX_ERR,
  1085. "[sess :%llu] invalid bind ops for %u\n",
  1086. client->id, external_sync.type);
  1087. rc = -SYNX_INVALID;
  1088. goto fail;
  1089. }
  1090. mutex_lock(&synx_obj->obj_lock);
  1091. if (synx_util_is_merged_object(synx_obj)) {
  1092. dprintk(SYNX_ERR,
  1093. "[sess :%llu] cannot bind to composite handle %u\n",
  1094. client->id, h_synx);
  1095. rc = -SYNX_INVALID;
  1096. goto release;
  1097. }
  1098. if (synx_obj->num_bound_synxs >= SYNX_MAX_NUM_BINDINGS) {
  1099. dprintk(SYNX_ERR,
  1100. "[sess :%llu] max bindings reached for handle %u\n",
  1101. client->id, h_synx);
  1102. rc = -SYNX_NOMEM;
  1103. goto release;
  1104. }
  1105. /* don't bind external sync obj if already done */
  1106. for (i = 0; i < synx_obj->num_bound_synxs; i++) {
  1107. if ((external_sync.id ==
  1108. synx_obj->bound_synxs[i].external_desc.id) &&
  1109. (external_sync.type ==
  1110. synx_obj->bound_synxs[i].external_desc.type)){
  1111. dprintk(SYNX_ERR,
  1112. "[sess :%llu] duplicate bind for sync %llu\n",
  1113. client->id, external_sync.id);
  1114. rc = -SYNX_ALREADY;
  1115. goto release;
  1116. }
  1117. }
  1118. data = kzalloc(sizeof(*data), GFP_KERNEL);
  1119. if (IS_ERR_OR_NULL(data)) {
  1120. rc = -SYNX_NOMEM;
  1121. goto release;
  1122. }
  1123. /* get additional reference since passing pointer to cb */
  1124. synx_util_get_object(synx_obj);
  1125. /* data passed to external callback */
  1126. data->handle = h_synx;
  1127. data->synx_obj = synx_obj;
  1128. bound_idx = synx_obj->num_bound_synxs;
  1129. memcpy(&synx_obj->bound_synxs[bound_idx],
  1130. &external_sync, sizeof(struct synx_external_desc_v2));
  1131. synx_obj->bound_synxs[bound_idx].external_data = data;
  1132. synx_obj->num_bound_synxs++;
  1133. mutex_unlock(&synx_obj->obj_lock);
  1134. rc = bind_ops->register_callback(synx_external_callback,
  1135. data, external_sync.id);
  1136. if (rc) {
  1137. dprintk(SYNX_ERR,
  1138. "[sess :%llu] callback reg failed for %llu\n",
  1139. client->id, external_sync.id);
  1140. mutex_lock(&synx_obj->obj_lock);
  1141. memset(&synx_obj->bound_synxs[bound_idx], 0,
  1142. sizeof(struct synx_external_desc_v2));
  1143. synx_obj->num_bound_synxs--;
  1144. mutex_unlock(&synx_obj->obj_lock);
  1145. synx_util_put_object(synx_obj);
  1146. kfree(data);
  1147. goto fail;
  1148. }
  1149. synx_util_release_handle(synx_data);
  1150. dprintk(SYNX_DBG,
  1151. "[sess :%llu] ext sync %llu bound to handle %u\n",
  1152. client->id, external_sync.id, h_synx);
  1153. synx_put_client(client);
  1154. return SYNX_SUCCESS;
  1155. release:
  1156. mutex_unlock(&synx_obj->obj_lock);
  1157. fail:
  1158. synx_util_release_handle(synx_data);
  1159. synx_put_client(client);
  1160. return rc;
  1161. }
  1162. EXPORT_SYMBOL(synx_bind);
  1163. int synx_get_status(struct synx_session *session,
  1164. u32 h_synx)
  1165. {
  1166. int rc = 0;
  1167. struct synx_client *client;
  1168. struct synx_handle_coredata *synx_data;
  1169. struct synx_coredata *synx_obj;
  1170. client = synx_get_client(session);
  1171. if (IS_ERR_OR_NULL(client))
  1172. return -SYNX_INVALID;
  1173. synx_data = synx_util_acquire_handle(client, h_synx);
  1174. synx_obj = synx_util_obtain_object(synx_data);
  1175. if (IS_ERR_OR_NULL(synx_obj) ||
  1176. IS_ERR_OR_NULL(synx_obj->fence)) {
  1177. dprintk(SYNX_ERR,
  1178. "[sess :%llu] invalid handle access %u\n",
  1179. client->id, h_synx);
  1180. rc = -SYNX_INVALID;
  1181. goto fail;
  1182. }
  1183. if (synx_util_is_global_handle(h_synx)) {
  1184. rc = synx_global_get_status(
  1185. synx_util_global_idx(h_synx));
  1186. if (rc != SYNX_STATE_ACTIVE) {
  1187. dprintk(SYNX_VERB,
  1188. "[sess :%llu] handle %u in status %d\n",
  1189. client->id, h_synx, rc);
  1190. goto fail;
  1191. }
  1192. }
  1193. mutex_lock(&synx_obj->obj_lock);
  1194. rc = synx_util_get_object_status(synx_obj);
  1195. mutex_unlock(&synx_obj->obj_lock);
  1196. dprintk(SYNX_VERB,
  1197. "[sess :%llu] handle %u status %d\n",
  1198. client->id, h_synx, rc);
  1199. fail:
  1200. synx_util_release_handle(synx_data);
  1201. synx_put_client(client);
  1202. return rc;
  1203. }
  1204. EXPORT_SYMBOL(synx_get_status);
  1205. static struct synx_map_entry *synx_handle_conversion(
  1206. struct synx_client *client,
  1207. u32 *h_synx, struct synx_map_entry *old_entry)
  1208. {
  1209. int rc;
  1210. struct synx_map_entry *map_entry = NULL;
  1211. struct synx_coredata *synx_obj;
  1212. if (IS_ERR_OR_NULL(old_entry)) {
  1213. old_entry = synx_util_get_map_entry(*h_synx);
  1214. if (IS_ERR_OR_NULL(old_entry)) {
  1215. rc = PTR_ERR(old_entry);
  1216. dprintk(SYNX_ERR,
  1217. "invalid import handle %u err=%d",
  1218. *h_synx, rc);
  1219. return old_entry;
  1220. }
  1221. }
  1222. synx_obj = old_entry->synx_obj;
  1223. BUG_ON(synx_obj == NULL);
  1224. mutex_lock(&synx_obj->obj_lock);
  1225. synx_util_get_object(synx_obj);
  1226. if (synx_obj->global_idx != 0) {
  1227. *h_synx = synx_encode_handle(
  1228. synx_obj->global_idx, SYNX_CORE_APSS, true);
  1229. map_entry = synx_util_get_map_entry(*h_synx);
  1230. if (IS_ERR_OR_NULL(map_entry)) {
  1231. /* raced with release from last global client */
  1232. map_entry = synx_util_insert_to_map(synx_obj,
  1233. *h_synx, 0);
  1234. if (IS_ERR_OR_NULL(map_entry)) {
  1235. rc = PTR_ERR(map_entry);
  1236. dprintk(SYNX_ERR,
  1237. "addition of %u to map failed=%d",
  1238. *h_synx, rc);
  1239. }
  1240. }
  1241. } else {
  1242. synx_obj->map_count++;
  1243. rc = synx_alloc_global_handle(h_synx);
  1244. if (rc == SYNX_SUCCESS) {
  1245. synx_obj->global_idx =
  1246. synx_util_global_idx(*h_synx);
  1247. synx_obj->type |= SYNX_CREATE_GLOBAL_FENCE;
  1248. map_entry = synx_util_insert_to_map(synx_obj,
  1249. *h_synx, 0);
  1250. if (IS_ERR_OR_NULL(map_entry)) {
  1251. rc = PTR_ERR(map_entry);
  1252. synx_global_put_ref(
  1253. synx_util_global_idx(*h_synx));
  1254. dprintk(SYNX_ERR,
  1255. "insertion of %u to map failed=%d",
  1256. *h_synx, rc);
  1257. }
  1258. }
  1259. }
  1260. mutex_unlock(&synx_obj->obj_lock);
  1261. if (IS_ERR_OR_NULL(map_entry))
  1262. synx_util_put_object(synx_obj);
  1263. synx_util_release_map_entry(old_entry);
  1264. return map_entry;
  1265. }
  1266. static int synx_native_import_handle(struct synx_client *client,
  1267. struct synx_import_indv_params *params)
  1268. {
  1269. int rc = SYNX_SUCCESS;
  1270. u32 h_synx, core_id;
  1271. struct synx_map_entry *map_entry, *old_entry;
  1272. struct synx_coredata *synx_obj;
  1273. struct synx_handle_coredata *synx_data = NULL, *curr;
  1274. char name[SYNX_OBJ_NAME_LEN] = {0};
  1275. struct synx_create_params c_params = {0};
  1276. if (IS_ERR_OR_NULL(client) || IS_ERR_OR_NULL(params) ||
  1277. IS_ERR_OR_NULL(params->fence) ||
  1278. IS_ERR_OR_NULL(params->new_h_synx))
  1279. return -SYNX_INVALID;
  1280. h_synx = *((u32 *)params->fence);
  1281. /* check if already mapped to client */
  1282. spin_lock_bh(&client->handle_map_lock);
  1283. hash_for_each_possible(client->handle_map,
  1284. curr, node, h_synx) {
  1285. if (curr->key == h_synx &&
  1286. curr->rel_count != 0 &&
  1287. (synx_util_is_global_handle(h_synx) ||
  1288. params->flags & SYNX_IMPORT_LOCAL_FENCE)) {
  1289. curr->rel_count++;
  1290. kref_get(&curr->refcount);
  1291. synx_data = curr;
  1292. break;
  1293. }
  1294. }
  1295. spin_unlock_bh(&client->handle_map_lock);
  1296. if (synx_data) {
  1297. *params->new_h_synx = h_synx;
  1298. return SYNX_SUCCESS;
  1299. }
  1300. map_entry = synx_util_get_map_entry(h_synx);
  1301. if (IS_ERR_OR_NULL(map_entry)) {
  1302. core_id = (h_synx & SYNX_OBJ_CORE_ID_MASK)
  1303. >> SYNX_HANDLE_INDEX_BITS;
  1304. if (core_id == SYNX_CORE_APSS) {
  1305. dprintk(SYNX_ERR,
  1306. "[sess :%llu] invalid import handle %u\n",
  1307. client->id, h_synx);
  1308. return -SYNX_INVALID;
  1309. } else if (synx_util_is_global_handle(h_synx)) {
  1310. /* import global handle created in another core */
  1311. synx_util_map_import_params_to_create(params, &c_params);
  1312. scnprintf(name, SYNX_OBJ_NAME_LEN, "import-client-%d",
  1313. current->pid);
  1314. c_params.name = name;
  1315. c_params.h_synx = &h_synx;
  1316. rc = synx_native_create_core(client, &c_params);
  1317. if (rc != SYNX_SUCCESS)
  1318. return rc;
  1319. *params->new_h_synx = h_synx;
  1320. return SYNX_SUCCESS;
  1321. }
  1322. dprintk(SYNX_ERR,
  1323. "[sess :%llu] invalid handle %u\n",
  1324. client->id, h_synx);
  1325. return -SYNX_INVALID;
  1326. }
  1327. synx_obj = map_entry->synx_obj;
  1328. BUG_ON(synx_obj == NULL);
  1329. if ((params->flags & SYNX_IMPORT_GLOBAL_FENCE) &&
  1330. !synx_util_is_global_handle(h_synx)) {
  1331. old_entry = map_entry;
  1332. map_entry = synx_handle_conversion(client, &h_synx,
  1333. old_entry);
  1334. }
  1335. if (rc != SYNX_SUCCESS)
  1336. return rc;
  1337. *params->new_h_synx = h_synx;
  1338. rc = synx_util_init_handle(client, map_entry->synx_obj,
  1339. params->new_h_synx, map_entry);
  1340. if (rc != SYNX_SUCCESS) {
  1341. dprintk(SYNX_ERR,
  1342. "[sess :%llu] init of imported handle %u failed=%d\n",
  1343. client->id, h_synx, rc);
  1344. synx_util_release_map_entry(map_entry);
  1345. }
  1346. return rc;
  1347. }
  1348. static int synx_native_import_fence(struct synx_client *client,
  1349. struct synx_import_indv_params *params)
  1350. {
  1351. int rc = SYNX_SUCCESS;
  1352. u32 curr_h_synx;
  1353. u32 global;
  1354. struct synx_create_params c_params = {0};
  1355. char name[SYNX_OBJ_NAME_LEN] = {0};
  1356. struct synx_fence_entry *entry;
  1357. struct synx_map_entry *map_entry = NULL;
  1358. struct synx_handle_coredata *synx_data = NULL, *curr;
  1359. if (IS_ERR_OR_NULL(client) || IS_ERR_OR_NULL(params) ||
  1360. IS_ERR_OR_NULL(params->fence) ||
  1361. IS_ERR_OR_NULL(params->new_h_synx))
  1362. return -SYNX_INVALID;
  1363. global = SYNX_IMPORT_GLOBAL_FENCE & params->flags;
  1364. retry:
  1365. *params->new_h_synx =
  1366. synx_util_get_fence_entry((u64)params->fence, global);
  1367. if (*params->new_h_synx == 0) {
  1368. /* create a new synx obj and add to fence map */
  1369. synx_util_map_import_params_to_create(params, &c_params);
  1370. scnprintf(name, SYNX_OBJ_NAME_LEN, "import-client-%d",
  1371. current->pid);
  1372. c_params.name = name;
  1373. c_params.h_synx = params->new_h_synx;
  1374. c_params.fence = params->fence;
  1375. rc = synx_native_create_core(client, &c_params);
  1376. if (rc != SYNX_SUCCESS)
  1377. return rc;
  1378. curr_h_synx = *params->new_h_synx;
  1379. entry = kzalloc(sizeof(*entry), GFP_KERNEL);
  1380. if (IS_ERR_OR_NULL(entry)) {
  1381. rc = -SYNX_NOMEM;
  1382. curr_h_synx = *c_params.h_synx;
  1383. goto fail;
  1384. }
  1385. do {
  1386. entry->key = (u64)params->fence;
  1387. if (global)
  1388. entry->g_handle = *params->new_h_synx;
  1389. else
  1390. entry->l_handle = *params->new_h_synx;
  1391. rc = synx_util_insert_fence_entry(entry,
  1392. params->new_h_synx, global);
  1393. if (rc == SYNX_SUCCESS) {
  1394. dprintk(SYNX_DBG,
  1395. "mapped fence %pK to new handle %u\n",
  1396. params->fence, *params->new_h_synx);
  1397. break;
  1398. } else if (rc == -SYNX_ALREADY) {
  1399. /*
  1400. * release the new handle allocated
  1401. * and use the available handle
  1402. * already mapped instead.
  1403. */
  1404. map_entry = synx_util_get_map_entry(
  1405. *params->new_h_synx);
  1406. if (IS_ERR_OR_NULL(map_entry)) {
  1407. /* race with fence release, need to retry */
  1408. dprintk(SYNX_DBG,
  1409. "re-attempting handle import\n");
  1410. *params->new_h_synx = curr_h_synx;
  1411. continue;
  1412. }
  1413. rc = synx_util_init_handle(client,
  1414. map_entry->synx_obj,
  1415. params->new_h_synx, map_entry);
  1416. dprintk(SYNX_DBG, "mapped fence %pK to handle %u\n",
  1417. params->fence, *params->new_h_synx);
  1418. goto release;
  1419. } else {
  1420. dprintk(SYNX_ERR,
  1421. "importing fence %pK failed, err=%d\n",
  1422. params->fence, rc);
  1423. goto release;
  1424. }
  1425. } while (true);
  1426. } else {
  1427. /* check if already mapped to client */
  1428. spin_lock_bh(&client->handle_map_lock);
  1429. hash_for_each_possible(client->handle_map,
  1430. curr, node, *params->new_h_synx) {
  1431. if (curr->key == *params->new_h_synx &&
  1432. curr->rel_count != 0) {
  1433. curr->rel_count++;
  1434. kref_get(&curr->refcount);
  1435. synx_data = curr;
  1436. break;
  1437. }
  1438. }
  1439. spin_unlock_bh(&client->handle_map_lock);
  1440. if (synx_data) {
  1441. dprintk(SYNX_DBG, "mapped fence %pK to handle %u\n",
  1442. params->fence, *params->new_h_synx);
  1443. return SYNX_SUCCESS;
  1444. }
  1445. if (global && !synx_util_is_global_handle(
  1446. *params->new_h_synx))
  1447. map_entry = synx_handle_conversion(client,
  1448. params->new_h_synx, NULL);
  1449. else
  1450. map_entry = synx_util_get_map_entry(
  1451. *params->new_h_synx);
  1452. if (IS_ERR_OR_NULL(map_entry)) {
  1453. /* race with fence release, need to retry */
  1454. dprintk(SYNX_DBG, "re-attempting handle import\n");
  1455. goto retry;
  1456. }
  1457. rc = synx_util_init_handle(client, map_entry->synx_obj,
  1458. params->new_h_synx, map_entry);
  1459. dprintk(SYNX_DBG, "mapped fence %pK to existing handle %u\n",
  1460. params->fence, *params->new_h_synx);
  1461. }
  1462. return rc;
  1463. release:
  1464. kfree(entry);
  1465. fail:
  1466. synx_native_release_core(client, curr_h_synx);
  1467. return rc;
  1468. }
  1469. static int synx_native_import_indv(struct synx_client *client,
  1470. struct synx_import_indv_params *params)
  1471. {
  1472. int rc = -SYNX_INVALID;
  1473. if (IS_ERR_OR_NULL(params) ||
  1474. IS_ERR_OR_NULL(params->new_h_synx) ||
  1475. IS_ERR_OR_NULL(params->fence)) {
  1476. dprintk(SYNX_ERR, "invalid import arguments\n");
  1477. return -SYNX_INVALID;
  1478. }
  1479. if (likely(params->flags & SYNX_IMPORT_DMA_FENCE))
  1480. rc = synx_native_import_fence(client, params);
  1481. else if (params->flags & SYNX_IMPORT_SYNX_FENCE)
  1482. rc = synx_native_import_handle(client, params);
  1483. dprintk(SYNX_DBG,
  1484. "[sess :%llu] import of fence %pK %s, handle %u\n",
  1485. client->id, params->fence,
  1486. rc ? "failed" : "successful",
  1487. rc ? 0 : *params->new_h_synx);
  1488. return rc;
  1489. }
  1490. static int synx_native_import_arr(struct synx_client *client,
  1491. struct synx_import_arr_params *params)
  1492. {
  1493. u32 i;
  1494. int rc = SYNX_SUCCESS;
  1495. if (IS_ERR_OR_NULL(params) || params->num_fences == 0) {
  1496. dprintk(SYNX_ERR, "invalid import arr arguments\n");
  1497. return -SYNX_INVALID;
  1498. }
  1499. for (i = 0; i < params->num_fences; i++) {
  1500. rc = synx_native_import_indv(client, &params->list[i]);
  1501. if (rc != SYNX_SUCCESS) {
  1502. dprintk(SYNX_ERR,
  1503. "importing fence[%u] %pK failed=%d\n",
  1504. i, params->list[i].fence, rc);
  1505. break;
  1506. }
  1507. }
  1508. if (rc != SYNX_SUCCESS)
  1509. while (i--) {
  1510. /* release the imported handles and cleanup */
  1511. if (synx_native_release_core(client,
  1512. *params->list[i].new_h_synx) != SYNX_SUCCESS)
  1513. dprintk(SYNX_ERR,
  1514. "error cleaning up imported handle[%u] %u\n",
  1515. i, *params->list[i].new_h_synx);
  1516. }
  1517. return rc;
  1518. }
  1519. int synx_import(struct synx_session *session,
  1520. struct synx_import_params *params)
  1521. {
  1522. int rc = 0;
  1523. struct synx_client *client;
  1524. if (IS_ERR_OR_NULL(params)) {
  1525. dprintk(SYNX_ERR, "invalid import arguments\n");
  1526. return -SYNX_INVALID;
  1527. }
  1528. client = synx_get_client(session);
  1529. if (IS_ERR_OR_NULL(client))
  1530. return -SYNX_INVALID;
  1531. /* import fence based on its type */
  1532. if (params->type == SYNX_IMPORT_ARR_PARAMS)
  1533. rc = synx_native_import_arr(client, &params->arr);
  1534. else
  1535. rc = synx_native_import_indv(client, &params->indv);
  1536. synx_put_client(client);
  1537. return rc;
  1538. }
  1539. EXPORT_SYMBOL(synx_import);
  1540. static int synx_handle_create(struct synx_private_ioctl_arg *k_ioctl,
  1541. struct synx_session *session)
  1542. {
  1543. int result;
  1544. int csl_fence;
  1545. struct synx_create_v2 create_info;
  1546. struct synx_create_params params = {0};
  1547. if (k_ioctl->size != sizeof(create_info))
  1548. return -SYNX_INVALID;
  1549. if (copy_from_user(&create_info,
  1550. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1551. k_ioctl->size))
  1552. return -EFAULT;
  1553. params.h_synx = &create_info.synx_obj;
  1554. params.name = create_info.name;
  1555. params.flags = create_info.flags;
  1556. if (create_info.flags & SYNX_CREATE_CSL_FENCE) {
  1557. csl_fence = create_info.desc.id[0];
  1558. params.fence = &csl_fence;
  1559. }
  1560. result = synx_create(session, &params);
  1561. if (!result)
  1562. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1563. &create_info,
  1564. k_ioctl->size))
  1565. return -EFAULT;
  1566. return result;
  1567. }
  1568. static int synx_handle_getstatus(struct synx_private_ioctl_arg *k_ioctl,
  1569. struct synx_session *session)
  1570. {
  1571. struct synx_signal_v2 signal_info;
  1572. if (k_ioctl->size != sizeof(signal_info))
  1573. return -SYNX_INVALID;
  1574. if (copy_from_user(&signal_info,
  1575. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1576. k_ioctl->size))
  1577. return -EFAULT;
  1578. signal_info.synx_state =
  1579. synx_get_status(session, signal_info.synx_obj);
  1580. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1581. &signal_info,
  1582. k_ioctl->size))
  1583. return -EFAULT;
  1584. return SYNX_SUCCESS;
  1585. }
  1586. static int synx_handle_import(struct synx_private_ioctl_arg *k_ioctl,
  1587. struct synx_session *session)
  1588. {
  1589. struct synx_import_info import_info;
  1590. struct synx_import_params params = {0};
  1591. if (k_ioctl->size != sizeof(import_info))
  1592. return -SYNX_INVALID;
  1593. if (copy_from_user(&import_info,
  1594. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1595. k_ioctl->size))
  1596. return -EFAULT;
  1597. if (import_info.flags & SYNX_IMPORT_SYNX_FENCE)
  1598. params.indv.fence = &import_info.synx_obj;
  1599. else if (import_info.flags & SYNX_IMPORT_DMA_FENCE)
  1600. params.indv.fence =
  1601. sync_file_get_fence(import_info.desc.id[0]);
  1602. params.type = SYNX_IMPORT_INDV_PARAMS;
  1603. params.indv.flags = import_info.flags;
  1604. params.indv.new_h_synx = &import_info.new_synx_obj;
  1605. if (synx_import(session, &params))
  1606. return -SYNX_INVALID;
  1607. if (import_info.flags & SYNX_IMPORT_DMA_FENCE)
  1608. dma_fence_put(params.indv.fence);
  1609. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1610. &import_info,
  1611. k_ioctl->size))
  1612. return -EFAULT;
  1613. return SYNX_SUCCESS;
  1614. }
  1615. static int synx_handle_import_arr(
  1616. struct synx_private_ioctl_arg *k_ioctl,
  1617. struct synx_session *session)
  1618. {
  1619. int rc = -SYNX_INVALID;
  1620. u32 idx = 0;
  1621. struct synx_client *client;
  1622. struct synx_import_arr_info arr_info;
  1623. struct synx_import_info *arr;
  1624. struct synx_import_indv_params params = {0};
  1625. if (k_ioctl->size != sizeof(arr_info))
  1626. return -SYNX_INVALID;
  1627. if (copy_from_user(&arr_info,
  1628. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1629. k_ioctl->size))
  1630. return -EFAULT;
  1631. arr = kcalloc(arr_info.num_objs,
  1632. sizeof(*arr), GFP_KERNEL);
  1633. if (IS_ERR_OR_NULL(arr))
  1634. return -ENOMEM;
  1635. client = synx_get_client(session);
  1636. if (IS_ERR_OR_NULL(client)) {
  1637. rc = PTR_ERR(client);
  1638. goto clean;
  1639. }
  1640. if (copy_from_user(arr,
  1641. u64_to_user_ptr(arr_info.list),
  1642. sizeof(*arr) * arr_info.num_objs)) {
  1643. rc = -EFAULT;
  1644. goto fail;
  1645. }
  1646. while (idx < arr_info.num_objs) {
  1647. params.new_h_synx = &arr[idx].new_synx_obj;
  1648. params.flags = arr[idx].flags;
  1649. if (arr[idx].flags & SYNX_IMPORT_SYNX_FENCE)
  1650. params.fence = &arr[idx].synx_obj;
  1651. if (arr[idx].flags & SYNX_IMPORT_DMA_FENCE)
  1652. params.fence =
  1653. sync_file_get_fence(arr[idx].desc.id[0]);
  1654. rc = synx_native_import_indv(client, &params);
  1655. if (rc != SYNX_SUCCESS)
  1656. break;
  1657. idx++;
  1658. }
  1659. /* release allocated handles in case of failure */
  1660. if (rc != SYNX_SUCCESS) {
  1661. while (idx > 0)
  1662. synx_native_release_core(client,
  1663. arr[--idx].new_synx_obj);
  1664. } else {
  1665. if (copy_to_user(u64_to_user_ptr(arr_info.list),
  1666. arr,
  1667. sizeof(*arr) * arr_info.num_objs)) {
  1668. rc = -EFAULT;
  1669. goto fail;
  1670. }
  1671. }
  1672. fail:
  1673. synx_put_client(client);
  1674. clean:
  1675. kfree(arr);
  1676. return rc;
  1677. }
  1678. static int synx_handle_export(struct synx_private_ioctl_arg *k_ioctl,
  1679. struct synx_session *session)
  1680. {
  1681. return -SYNX_INVALID;
  1682. }
  1683. static int synx_handle_signal(struct synx_private_ioctl_arg *k_ioctl,
  1684. struct synx_session *session)
  1685. {
  1686. struct synx_signal_v2 signal_info;
  1687. if (k_ioctl->size != sizeof(signal_info))
  1688. return -SYNX_INVALID;
  1689. if (copy_from_user(&signal_info,
  1690. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1691. k_ioctl->size))
  1692. return -EFAULT;
  1693. return synx_signal(session, signal_info.synx_obj,
  1694. signal_info.synx_state);
  1695. }
  1696. static int synx_handle_merge(struct synx_private_ioctl_arg *k_ioctl,
  1697. struct synx_session *session)
  1698. {
  1699. u32 *h_synxs;
  1700. int result;
  1701. struct synx_merge_v2 merge_info;
  1702. struct synx_merge_params params = {0};
  1703. if (k_ioctl->size != sizeof(merge_info))
  1704. return -SYNX_INVALID;
  1705. if (copy_from_user(&merge_info,
  1706. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1707. k_ioctl->size))
  1708. return -EFAULT;
  1709. if (merge_info.num_objs >= SYNX_MAX_OBJS)
  1710. return -SYNX_INVALID;
  1711. h_synxs = kcalloc(merge_info.num_objs,
  1712. sizeof(*h_synxs), GFP_KERNEL);
  1713. if (IS_ERR_OR_NULL(h_synxs))
  1714. return -ENOMEM;
  1715. if (copy_from_user(h_synxs,
  1716. u64_to_user_ptr(merge_info.synx_objs),
  1717. sizeof(u32) * merge_info.num_objs)) {
  1718. kfree(h_synxs);
  1719. return -EFAULT;
  1720. }
  1721. params.num_objs = merge_info.num_objs;
  1722. params.h_synxs = h_synxs;
  1723. params.flags = merge_info.flags;
  1724. params.h_merged_obj = &merge_info.merged;
  1725. result = synx_merge(session, &params);
  1726. if (!result)
  1727. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1728. &merge_info,
  1729. k_ioctl->size)) {
  1730. kfree(h_synxs);
  1731. return -EFAULT;
  1732. }
  1733. kfree(h_synxs);
  1734. return result;
  1735. }
  1736. static int synx_handle_wait(struct synx_private_ioctl_arg *k_ioctl,
  1737. struct synx_session *session)
  1738. {
  1739. struct synx_wait_v2 wait_info;
  1740. if (k_ioctl->size != sizeof(wait_info))
  1741. return -SYNX_INVALID;
  1742. if (copy_from_user(&wait_info,
  1743. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1744. k_ioctl->size))
  1745. return -EFAULT;
  1746. k_ioctl->result = synx_wait(session,
  1747. wait_info.synx_obj, wait_info.timeout_ms);
  1748. return SYNX_SUCCESS;
  1749. }
  1750. static int synx_handle_async_wait(
  1751. struct synx_private_ioctl_arg *k_ioctl,
  1752. struct synx_session *session)
  1753. {
  1754. int rc = 0;
  1755. struct synx_userpayload_info_v2 user_data;
  1756. struct synx_callback_params params = {0};
  1757. if (k_ioctl->size != sizeof(user_data))
  1758. return -SYNX_INVALID;
  1759. if (copy_from_user(&user_data,
  1760. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1761. k_ioctl->size))
  1762. return -EFAULT;
  1763. params.h_synx = user_data.synx_obj;
  1764. params.cb_func = synx_util_default_user_callback;
  1765. params.userdata = (void *)user_data.payload[0];
  1766. params.timeout_ms = user_data.payload[2];
  1767. rc = synx_async_wait(session, &params);
  1768. if (rc)
  1769. dprintk(SYNX_ERR,
  1770. "user cb registration failed for handle %d\n",
  1771. user_data.synx_obj);
  1772. return rc;
  1773. }
  1774. static int synx_handle_cancel_async_wait(
  1775. struct synx_private_ioctl_arg *k_ioctl,
  1776. struct synx_session *session)
  1777. {
  1778. int rc = 0;
  1779. struct synx_userpayload_info_v2 user_data;
  1780. struct synx_callback_params params = {0};
  1781. if (k_ioctl->size != sizeof(user_data))
  1782. return -SYNX_INVALID;
  1783. if (copy_from_user(&user_data,
  1784. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1785. k_ioctl->size))
  1786. return -EFAULT;
  1787. params.h_synx = user_data.synx_obj;
  1788. params.cb_func = synx_util_default_user_callback;
  1789. params.userdata = (void *)user_data.payload[0];
  1790. rc = synx_cancel_async_wait(session, &params);
  1791. if (rc)
  1792. dprintk(SYNX_ERR,
  1793. "user cb deregistration failed for handle %d\n",
  1794. user_data.synx_obj);
  1795. return rc;
  1796. }
  1797. static int synx_handle_bind(struct synx_private_ioctl_arg *k_ioctl,
  1798. struct synx_session *session)
  1799. {
  1800. struct synx_bind_v2 synx_bind_info;
  1801. if (k_ioctl->size != sizeof(synx_bind_info))
  1802. return -SYNX_INVALID;
  1803. if (copy_from_user(&synx_bind_info,
  1804. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1805. k_ioctl->size))
  1806. return -EFAULT;
  1807. k_ioctl->result = synx_bind(session,
  1808. synx_bind_info.synx_obj,
  1809. synx_bind_info.ext_sync_desc);
  1810. return k_ioctl->result;
  1811. }
  1812. static int synx_handle_release(struct synx_private_ioctl_arg *k_ioctl,
  1813. struct synx_session *session)
  1814. {
  1815. struct synx_info release_info;
  1816. if (k_ioctl->size != sizeof(release_info))
  1817. return -SYNX_INVALID;
  1818. if (copy_from_user(&release_info,
  1819. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1820. k_ioctl->size))
  1821. return -EFAULT;
  1822. return synx_release(session, release_info.synx_obj);
  1823. }
  1824. static int synx_handle_get_fence(struct synx_private_ioctl_arg *k_ioctl,
  1825. struct synx_session *session)
  1826. {
  1827. struct synx_fence_fd fence_fd;
  1828. struct dma_fence *fence;
  1829. if (k_ioctl->size != sizeof(fence_fd))
  1830. return -SYNX_INVALID;
  1831. if (copy_from_user(&fence_fd,
  1832. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1833. k_ioctl->size))
  1834. return -EFAULT;
  1835. fence = synx_get_fence(session, fence_fd.synx_obj);
  1836. fence_fd.fd = synx_create_sync_fd(fence);
  1837. /*
  1838. * release additional reference taken in synx_get_fence.
  1839. * additional reference ensures the fence is valid and
  1840. * does not race with handle/fence release.
  1841. */
  1842. dma_fence_put(fence);
  1843. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1844. &fence_fd, k_ioctl->size))
  1845. return -EFAULT;
  1846. return SYNX_SUCCESS;
  1847. }
  1848. static long synx_ioctl(struct file *filep,
  1849. unsigned int cmd,
  1850. unsigned long arg)
  1851. {
  1852. s32 rc = 0;
  1853. struct synx_private_ioctl_arg k_ioctl;
  1854. struct synx_session *session = filep->private_data;
  1855. if (cmd != SYNX_PRIVATE_IOCTL_CMD) {
  1856. dprintk(SYNX_ERR, "invalid ioctl cmd\n");
  1857. return -ENOIOCTLCMD;
  1858. }
  1859. if (copy_from_user(&k_ioctl,
  1860. (struct synx_private_ioctl_arg *)arg,
  1861. sizeof(k_ioctl))) {
  1862. dprintk(SYNX_ERR, "invalid ioctl args\n");
  1863. return -EFAULT;
  1864. }
  1865. if (!k_ioctl.ioctl_ptr)
  1866. return -SYNX_INVALID;
  1867. dprintk(SYNX_VERB, "[sess :%llu] Enter cmd %u from pid %d\n",
  1868. ((struct synx_client *)session)->id,
  1869. k_ioctl.id, current->pid);
  1870. switch (k_ioctl.id) {
  1871. case SYNX_CREATE:
  1872. rc = synx_handle_create(&k_ioctl, session);
  1873. break;
  1874. case SYNX_RELEASE:
  1875. rc = synx_handle_release(&k_ioctl, session);
  1876. break;
  1877. case SYNX_REGISTER_PAYLOAD:
  1878. rc = synx_handle_async_wait(&k_ioctl,
  1879. session);
  1880. break;
  1881. case SYNX_DEREGISTER_PAYLOAD:
  1882. rc = synx_handle_cancel_async_wait(&k_ioctl,
  1883. session);
  1884. break;
  1885. case SYNX_SIGNAL:
  1886. rc = synx_handle_signal(&k_ioctl, session);
  1887. break;
  1888. case SYNX_MERGE:
  1889. rc = synx_handle_merge(&k_ioctl, session);
  1890. break;
  1891. case SYNX_WAIT:
  1892. rc = synx_handle_wait(&k_ioctl, session);
  1893. if (copy_to_user((void *)arg,
  1894. &k_ioctl,
  1895. sizeof(k_ioctl))) {
  1896. dprintk(SYNX_ERR, "invalid ioctl args\n");
  1897. rc = -EFAULT;
  1898. }
  1899. break;
  1900. case SYNX_BIND:
  1901. rc = synx_handle_bind(&k_ioctl, session);
  1902. break;
  1903. case SYNX_GETSTATUS:
  1904. rc = synx_handle_getstatus(&k_ioctl, session);
  1905. break;
  1906. case SYNX_IMPORT:
  1907. rc = synx_handle_import(&k_ioctl, session);
  1908. break;
  1909. case SYNX_IMPORT_ARR:
  1910. rc = synx_handle_import_arr(&k_ioctl, session);
  1911. break;
  1912. case SYNX_EXPORT:
  1913. rc = synx_handle_export(&k_ioctl, session);
  1914. break;
  1915. case SYNX_GETFENCE_FD:
  1916. rc = synx_handle_get_fence(&k_ioctl, session);
  1917. break;
  1918. default:
  1919. rc = -SYNX_INVALID;
  1920. }
  1921. dprintk(SYNX_VERB, "[sess :%llu] exit with status %d\n",
  1922. ((struct synx_client *)session)->id, rc);
  1923. return rc;
  1924. }
  1925. static ssize_t synx_read(struct file *filep,
  1926. char __user *buf, size_t size, loff_t *f_pos)
  1927. {
  1928. ssize_t rc = 0;
  1929. struct synx_client *client = NULL;
  1930. struct synx_client_cb *cb;
  1931. struct synx_session *session = filep->private_data;
  1932. struct synx_userpayload_info_v2 data;
  1933. if (size != sizeof(struct synx_userpayload_info_v2)) {
  1934. dprintk(SYNX_ERR, "invalid read size\n");
  1935. return -SYNX_INVALID;
  1936. }
  1937. client = synx_get_client(session);
  1938. if (IS_ERR_OR_NULL(client))
  1939. return -SYNX_INVALID;
  1940. mutex_lock(&client->event_q_lock);
  1941. cb = list_first_entry_or_null(&client->event_q,
  1942. struct synx_client_cb, node);
  1943. if (IS_ERR_OR_NULL(cb)) {
  1944. mutex_unlock(&client->event_q_lock);
  1945. rc = 0;
  1946. goto fail;
  1947. }
  1948. if (cb->idx == 0 || cb->idx >= SYNX_MAX_OBJS) {
  1949. dprintk(SYNX_ERR, "invalid index\n");
  1950. mutex_unlock(&client->event_q_lock);
  1951. rc = -SYNX_INVALID;
  1952. goto fail;
  1953. }
  1954. list_del_init(&cb->node);
  1955. mutex_unlock(&client->event_q_lock);
  1956. rc = size;
  1957. data.synx_obj = cb->kernel_cb.h_synx;
  1958. data.reserved = cb->kernel_cb.status;
  1959. data.payload[0] = (u64)cb->kernel_cb.data;
  1960. if (copy_to_user(buf,
  1961. &data,
  1962. sizeof(struct synx_userpayload_info_v2))) {
  1963. dprintk(SYNX_ERR, "couldn't copy user callback data\n");
  1964. rc = -EFAULT;
  1965. }
  1966. if (synx_util_clear_cb_entry(client, cb))
  1967. dprintk(SYNX_ERR,
  1968. "[sess :%llu] error clearing cb for handle %u\n",
  1969. client->id, data.synx_obj);
  1970. fail:
  1971. synx_put_client(client);
  1972. return rc;
  1973. }
  1974. static unsigned int synx_poll(struct file *filep,
  1975. struct poll_table_struct *poll_table)
  1976. {
  1977. int rc = 0;
  1978. struct synx_client *client;
  1979. struct synx_session *session = filep->private_data;
  1980. client = synx_get_client(session);
  1981. if (IS_ERR_OR_NULL(client)) {
  1982. dprintk(SYNX_ERR, "invalid session in poll\n");
  1983. return SYNX_SUCCESS;
  1984. }
  1985. poll_wait(filep, &client->event_wq, poll_table);
  1986. mutex_lock(&client->event_q_lock);
  1987. if (!list_empty(&client->event_q))
  1988. rc = POLLPRI;
  1989. mutex_unlock(&client->event_q_lock);
  1990. synx_put_client(client);
  1991. return rc;
  1992. }
  1993. struct synx_session *synx_initialize(
  1994. struct synx_initialization_params *params)
  1995. {
  1996. struct synx_client *client;
  1997. if (IS_ERR_OR_NULL(params))
  1998. return ERR_PTR(-SYNX_INVALID);
  1999. client = vzalloc(sizeof(*client));
  2000. if (IS_ERR_OR_NULL(client))
  2001. return ERR_PTR(-SYNX_NOMEM);
  2002. if (params->name)
  2003. strlcpy(client->name, params->name, sizeof(client->name));
  2004. client->active = true;
  2005. client->dma_context = dma_fence_context_alloc(1);
  2006. client->id = atomic64_inc_return(&synx_counter);
  2007. kref_init(&client->refcount);
  2008. spin_lock_init(&client->handle_map_lock);
  2009. mutex_init(&client->event_q_lock);
  2010. INIT_LIST_HEAD(&client->event_q);
  2011. init_waitqueue_head(&client->event_wq);
  2012. /* zero idx not allowed */
  2013. set_bit(0, client->cb_bitmap);
  2014. spin_lock_bh(&synx_dev->native->metadata_map_lock);
  2015. hash_add(synx_dev->native->client_metadata_map,
  2016. &client->node, (u64)client);
  2017. spin_unlock_bh(&synx_dev->native->metadata_map_lock);
  2018. dprintk(SYNX_INFO, "[sess :%llu] session created %s\n",
  2019. client->id, params->name);
  2020. return (struct synx_session *)client;
  2021. }
  2022. EXPORT_SYMBOL(synx_initialize);
  2023. int synx_uninitialize(struct synx_session *session)
  2024. {
  2025. struct synx_client *client = NULL, *curr;
  2026. spin_lock_bh(&synx_dev->native->metadata_map_lock);
  2027. hash_for_each_possible(synx_dev->native->client_metadata_map,
  2028. curr, node, (u64)session) {
  2029. if (curr == (struct synx_client *)session) {
  2030. if (curr->active) {
  2031. curr->active = false;
  2032. client = curr;
  2033. }
  2034. break;
  2035. }
  2036. }
  2037. spin_unlock_bh(&synx_dev->native->metadata_map_lock);
  2038. /* release the reference obtained at synx init */
  2039. synx_put_client(client);
  2040. return SYNX_SUCCESS;
  2041. }
  2042. EXPORT_SYMBOL(synx_uninitialize);
  2043. static int synx_open(struct inode *inode, struct file *filep)
  2044. {
  2045. int rc = 0;
  2046. char name[SYNX_OBJ_NAME_LEN];
  2047. struct synx_initialization_params params = {0};
  2048. dprintk(SYNX_VERB, "Enter pid: %d\n", current->pid);
  2049. scnprintf(name, SYNX_OBJ_NAME_LEN, "umd-client-%d", current->pid);
  2050. params.name = name;
  2051. params.id = SYNX_CLIENT_NATIVE;
  2052. filep->private_data = synx_initialize(&params);
  2053. if (IS_ERR_OR_NULL(filep->private_data)) {
  2054. dprintk(SYNX_ERR, "session allocation failed for pid: %d\n",
  2055. current->pid);
  2056. rc = PTR_ERR(filep->private_data);
  2057. } else {
  2058. dprintk(SYNX_VERB, "allocated new session for pid: %d\n",
  2059. current->pid);
  2060. }
  2061. return rc;
  2062. }
  2063. static int synx_close(struct inode *inode, struct file *filep)
  2064. {
  2065. struct synx_session *session = filep->private_data;
  2066. return synx_uninitialize(session);
  2067. }
  2068. static const struct file_operations synx_fops = {
  2069. .owner = THIS_MODULE,
  2070. .open = synx_open,
  2071. .read = synx_read,
  2072. .release = synx_close,
  2073. .poll = synx_poll,
  2074. .unlocked_ioctl = synx_ioctl,
  2075. #ifdef CONFIG_COMPAT
  2076. .compat_ioctl = synx_ioctl,
  2077. #endif
  2078. };
  2079. int synx_register_ops(
  2080. const struct synx_register_params *params)
  2081. {
  2082. s32 rc = 0;
  2083. struct synx_registered_ops *client_ops;
  2084. if (!synx_dev || !params || !params->name ||
  2085. !synx_util_is_valid_bind_type(params->type) ||
  2086. !params->ops.register_callback ||
  2087. !params->ops.deregister_callback ||
  2088. !params->ops.signal) {
  2089. dprintk(SYNX_ERR, "invalid register params\n");
  2090. return -SYNX_INVALID;
  2091. }
  2092. mutex_lock(&synx_dev->vtbl_lock);
  2093. client_ops = &synx_dev->bind_vtbl[params->type];
  2094. if (!client_ops->valid) {
  2095. client_ops->valid = true;
  2096. memcpy(&client_ops->ops, &params->ops,
  2097. sizeof(client_ops->ops));
  2098. strlcpy(client_ops->name, params->name,
  2099. sizeof(client_ops->name));
  2100. client_ops->type = params->type;
  2101. dprintk(SYNX_INFO,
  2102. "registered bind ops type %u for %s\n",
  2103. params->type, params->name);
  2104. } else {
  2105. dprintk(SYNX_WARN,
  2106. "client already registered for type %u by %s\n",
  2107. client_ops->type, client_ops->name);
  2108. rc = -SYNX_ALREADY;
  2109. }
  2110. mutex_unlock(&synx_dev->vtbl_lock);
  2111. return rc;
  2112. }
  2113. EXPORT_SYMBOL(synx_register_ops);
  2114. int synx_deregister_ops(
  2115. const struct synx_register_params *params)
  2116. {
  2117. struct synx_registered_ops *client_ops;
  2118. if (IS_ERR_OR_NULL(params) || params->name ||
  2119. !synx_util_is_valid_bind_type(params->type)) {
  2120. dprintk(SYNX_ERR, "invalid params\n");
  2121. return -SYNX_INVALID;
  2122. }
  2123. mutex_lock(&synx_dev->vtbl_lock);
  2124. client_ops = &synx_dev->bind_vtbl[params->type];
  2125. memset(client_ops, 0, sizeof(*client_ops));
  2126. dprintk(SYNX_INFO, "deregistered bind ops for %s\n",
  2127. params->name);
  2128. mutex_unlock(&synx_dev->vtbl_lock);
  2129. return SYNX_SUCCESS;
  2130. }
  2131. EXPORT_SYMBOL(synx_deregister_ops);
  2132. void synx_ipc_handler(struct work_struct *cb_dispatch)
  2133. {
  2134. struct synx_signal_cb *signal_cb =
  2135. container_of(cb_dispatch, struct synx_signal_cb, cb_dispatch);
  2136. struct synx_map_entry *map_entry;
  2137. map_entry = synx_util_get_map_entry(signal_cb->handle);
  2138. if (IS_ERR_OR_NULL(map_entry)) {
  2139. dprintk(SYNX_WARN,
  2140. "no clients to notify for %u\n",
  2141. signal_cb->handle);
  2142. dprintk(SYNX_MEM, "signal cb destroyed %pK\n", signal_cb);
  2143. kfree(signal_cb);
  2144. return;
  2145. }
  2146. /* get reference on synx coredata for signal cb */
  2147. synx_util_get_object(map_entry->synx_obj);
  2148. signal_cb->synx_obj = map_entry->synx_obj;
  2149. synx_util_release_map_entry(map_entry);
  2150. synx_signal_handler(&signal_cb->cb_dispatch);
  2151. }
  2152. int synx_ipc_callback(u32 client_id,
  2153. s64 data, void *priv)
  2154. {
  2155. struct synx_signal_cb *signal_cb;
  2156. u32 status = (u32)data;
  2157. u32 handle = (u32)(data >> 32);
  2158. signal_cb = kzalloc(sizeof(*signal_cb), GFP_ATOMIC);
  2159. if (IS_ERR_OR_NULL(signal_cb))
  2160. return -SYNX_NOMEM;
  2161. dprintk(SYNX_DBG,
  2162. "signal notification for %u received with status %u\n",
  2163. handle, status);
  2164. signal_cb->status = status;
  2165. signal_cb->handle = handle;
  2166. signal_cb->flag = SYNX_SIGNAL_FROM_IPC;
  2167. INIT_WORK(&signal_cb->cb_dispatch, synx_ipc_handler);
  2168. queue_work(synx_dev->wq_cb, &signal_cb->cb_dispatch);
  2169. return SYNX_SUCCESS;
  2170. }
  2171. EXPORT_SYMBOL(synx_ipc_callback);
  2172. int synx_recover(enum synx_client_id id)
  2173. {
  2174. u32 core_id;
  2175. core_id = synx_util_map_client_id_to_core(id);
  2176. if (core_id >= SYNX_CORE_MAX) {
  2177. dprintk(SYNX_ERR, "invalid client id %u\n", id);
  2178. return -SYNX_INVALID;
  2179. }
  2180. switch (core_id) {
  2181. case SYNX_CORE_EVA:
  2182. case SYNX_CORE_IRIS:
  2183. case SYNX_CORE_ICP:
  2184. break;
  2185. default:
  2186. dprintk(SYNX_ERR, "recovery not supported on %u\n", id);
  2187. return -SYNX_NOSUPPORT;
  2188. }
  2189. return synx_global_recover(core_id);
  2190. }
  2191. EXPORT_SYMBOL(synx_recover);
  2192. static int synx_local_mem_init(void)
  2193. {
  2194. if (!synx_dev->native)
  2195. return -SYNX_INVALID;
  2196. hash_init(synx_dev->native->client_metadata_map);
  2197. hash_init(synx_dev->native->fence_map);
  2198. hash_init(synx_dev->native->global_map);
  2199. hash_init(synx_dev->native->local_map);
  2200. hash_init(synx_dev->native->csl_fence_map);
  2201. spin_lock_init(&synx_dev->native->metadata_map_lock);
  2202. spin_lock_init(&synx_dev->native->fence_map_lock);
  2203. spin_lock_init(&synx_dev->native->global_map_lock);
  2204. spin_lock_init(&synx_dev->native->local_map_lock);
  2205. spin_lock_init(&synx_dev->native->csl_map_lock);
  2206. /* zero idx not allowed */
  2207. set_bit(0, synx_dev->native->bitmap);
  2208. return 0;
  2209. }
  2210. static int synx_cdsp_restart_notifier(struct notifier_block *nb,
  2211. unsigned long code, void *data)
  2212. {
  2213. struct synx_cdsp_ssr *cdsp_ssr = &synx_dev->cdsp_ssr;
  2214. if (&cdsp_ssr->nb != nb) {
  2215. dprintk(SYNX_ERR, "Invalid SSR Notifier block\n");
  2216. return NOTIFY_BAD;
  2217. }
  2218. switch (code) {
  2219. case QCOM_SSR_BEFORE_SHUTDOWN:
  2220. break;
  2221. case QCOM_SSR_AFTER_SHUTDOWN:
  2222. if (cdsp_ssr->ssrcnt != 0) {
  2223. dprintk(SYNX_INFO, "Cleaning up global memory\n");
  2224. synx_global_recover(SYNX_CORE_NSP);
  2225. }
  2226. break;
  2227. case QCOM_SSR_BEFORE_POWERUP:
  2228. break;
  2229. case QCOM_SSR_AFTER_POWERUP:
  2230. dprintk(SYNX_DBG, "CDSP is up");
  2231. if (cdsp_ssr->ssrcnt == 0)
  2232. cdsp_ssr->ssrcnt++;
  2233. break;
  2234. default:
  2235. dprintk(SYNX_ERR, "Unknown status code for CDSP SSR\n");
  2236. break;
  2237. }
  2238. return NOTIFY_DONE;
  2239. }
  2240. static int __init synx_init(void)
  2241. {
  2242. int rc;
  2243. dprintk(SYNX_INFO, "device initialization start\n");
  2244. synx_dev = kzalloc(sizeof(*synx_dev), GFP_KERNEL);
  2245. if (IS_ERR_OR_NULL(synx_dev))
  2246. return -SYNX_NOMEM;
  2247. rc = alloc_chrdev_region(&synx_dev->dev, 0, 1, SYNX_DEVICE_NAME);
  2248. if (rc < 0) {
  2249. dprintk(SYNX_ERR, "region allocation failed\n");
  2250. goto alloc_fail;
  2251. }
  2252. cdev_init(&synx_dev->cdev, &synx_fops);
  2253. synx_dev->cdev.owner = THIS_MODULE;
  2254. rc = cdev_add(&synx_dev->cdev, synx_dev->dev, 1);
  2255. if (rc < 0) {
  2256. dprintk(SYNX_ERR, "device registation failed\n");
  2257. goto reg_fail;
  2258. }
  2259. synx_dev->class = class_create(THIS_MODULE, SYNX_DEVICE_NAME);
  2260. device_create(synx_dev->class, NULL, synx_dev->dev,
  2261. NULL, SYNX_DEVICE_NAME);
  2262. synx_dev->wq_cb = alloc_workqueue(SYNX_WQ_CB_NAME,
  2263. WQ_HIGHPRI | WQ_UNBOUND, SYNX_WQ_CB_THREADS);
  2264. synx_dev->wq_cleanup = alloc_workqueue(SYNX_WQ_CLEANUP_NAME,
  2265. WQ_HIGHPRI | WQ_UNBOUND, SYNX_WQ_CLEANUP_THREADS);
  2266. if (!synx_dev->wq_cb || !synx_dev->wq_cleanup) {
  2267. dprintk(SYNX_ERR,
  2268. "high priority work queue creation failed\n");
  2269. rc = -SYNX_INVALID;
  2270. goto fail;
  2271. }
  2272. synx_dev->native = vzalloc(sizeof(*synx_dev->native));
  2273. if (IS_ERR_OR_NULL(synx_dev->native))
  2274. goto fail;
  2275. mutex_init(&synx_dev->vtbl_lock);
  2276. mutex_init(&synx_dev->error_lock);
  2277. INIT_LIST_HEAD(&synx_dev->error_list);
  2278. synx_dev->debugfs_root = synx_init_debugfs_dir(synx_dev);
  2279. rc = synx_global_mem_init();
  2280. if (rc) {
  2281. dprintk(SYNX_ERR, "shared mem init failed, err=%d\n", rc);
  2282. goto err;
  2283. }
  2284. synx_dev->cdsp_ssr.ssrcnt = 0;
  2285. synx_dev->cdsp_ssr.nb.notifier_call = synx_cdsp_restart_notifier;
  2286. synx_dev->cdsp_ssr.handle =
  2287. qcom_register_ssr_notifier("cdsp", &synx_dev->cdsp_ssr.nb);
  2288. if (synx_dev->cdsp_ssr.handle == NULL) {
  2289. dprintk(SYNX_ERR, "SSR registration failed\n");
  2290. goto err;
  2291. }
  2292. ipclite_register_client(synx_ipc_callback, NULL);
  2293. synx_local_mem_init();
  2294. dprintk(SYNX_INFO, "device initialization success\n");
  2295. return 0;
  2296. err:
  2297. vfree(synx_dev->native);
  2298. fail:
  2299. device_destroy(synx_dev->class, synx_dev->dev);
  2300. class_destroy(synx_dev->class);
  2301. reg_fail:
  2302. unregister_chrdev_region(synx_dev->dev, 1);
  2303. alloc_fail:
  2304. kfree(synx_dev);
  2305. synx_dev = NULL;
  2306. return rc;
  2307. }
  2308. static void __exit synx_exit(void)
  2309. {
  2310. struct error_node *err_node, *err_node_tmp;
  2311. flush_workqueue(synx_dev->wq_cb);
  2312. flush_workqueue(synx_dev->wq_cleanup);
  2313. device_destroy(synx_dev->class, synx_dev->dev);
  2314. class_destroy(synx_dev->class);
  2315. cdev_del(&synx_dev->cdev);
  2316. unregister_chrdev_region(synx_dev->dev, 1);
  2317. synx_remove_debugfs_dir(synx_dev);
  2318. /* release uncleared error nodes */
  2319. list_for_each_entry_safe(
  2320. err_node, err_node_tmp,
  2321. &synx_dev->error_list,
  2322. node) {
  2323. list_del(&err_node->node);
  2324. kfree(err_node);
  2325. }
  2326. mutex_destroy(&synx_dev->vtbl_lock);
  2327. mutex_destroy(&synx_dev->error_lock);
  2328. vfree(synx_dev->native);
  2329. kfree(synx_dev);
  2330. }
  2331. module_init(synx_init);
  2332. module_exit(synx_exit);
  2333. MODULE_DESCRIPTION("Global Synx Driver");
  2334. MODULE_LICENSE("GPL v2");