synx.c 68 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2019-2021, The Linux Foundation. All rights reserved.
  4. * Copyright (c) 2022-2023, Qualcomm Innovation Center, Inc. All rights reserved.
  5. */
  6. #include <linux/atomic.h>
  7. #include <linux/file.h>
  8. #include <linux/fs.h>
  9. #include <linux/module.h>
  10. #include <linux/poll.h>
  11. #include <linux/random.h>
  12. #include <linux/remoteproc/qcom_rproc.h>
  13. #include <linux/slab.h>
  14. #include <linux/sync_file.h>
  15. #include <linux/uaccess.h>
  16. #include <linux/vmalloc.h>
  17. #include "synx_debugfs.h"
  18. #include "synx_private.h"
  19. #include "synx_util.h"
  20. struct synx_device *synx_dev;
  21. static atomic64_t synx_counter = ATOMIC64_INIT(1);
  22. void synx_external_callback(s32 sync_obj, int status, void *data)
  23. {
  24. struct synx_signal_cb *signal_cb = data;
  25. if (IS_ERR_OR_NULL(signal_cb)) {
  26. dprintk(SYNX_ERR,
  27. "invalid payload from external obj %d [%d]\n",
  28. sync_obj, status);
  29. return;
  30. }
  31. signal_cb->status = status;
  32. signal_cb->ext_sync_id = sync_obj;
  33. signal_cb->flag = SYNX_SIGNAL_FROM_CALLBACK;
  34. dprintk(SYNX_DBG,
  35. "external callback from %d on handle %u\n",
  36. sync_obj, signal_cb->handle);
  37. /*
  38. * invoke the handler directly as external callback
  39. * is invoked from separate task.
  40. * avoids creation of separate task again.
  41. */
  42. synx_signal_handler(&signal_cb->cb_dispatch);
  43. }
  44. EXPORT_SYMBOL(synx_external_callback);
  45. bool synx_fence_enable_signaling(struct dma_fence *fence)
  46. {
  47. return true;
  48. }
  49. const char *synx_fence_driver_name(struct dma_fence *fence)
  50. {
  51. return "Global Synx driver";
  52. }
  53. void synx_fence_release(struct dma_fence *fence)
  54. {
  55. /* release the memory allocated during create */
  56. kfree(fence->lock);
  57. kfree(fence);
  58. dprintk(SYNX_MEM, "released backing fence %pK\n", fence);
  59. }
  60. EXPORT_SYMBOL(synx_fence_release);
  61. static struct dma_fence_ops synx_fence_ops = {
  62. .wait = dma_fence_default_wait,
  63. .enable_signaling = synx_fence_enable_signaling,
  64. .get_driver_name = synx_fence_driver_name,
  65. .get_timeline_name = synx_fence_driver_name,
  66. .release = synx_fence_release,
  67. };
  68. static int synx_create_sync_fd(struct dma_fence *fence)
  69. {
  70. int fd;
  71. struct sync_file *sync_file;
  72. if (IS_ERR_OR_NULL(fence))
  73. return -SYNX_INVALID;
  74. fd = get_unused_fd_flags(O_CLOEXEC);
  75. if (fd < 0)
  76. return fd;
  77. sync_file = sync_file_create(fence);
  78. if (IS_ERR_OR_NULL(sync_file)) {
  79. dprintk(SYNX_ERR, "error creating sync file\n");
  80. goto err;
  81. }
  82. fd_install(fd, sync_file->file);
  83. return fd;
  84. err:
  85. put_unused_fd(fd);
  86. return -SYNX_INVALID;
  87. }
  88. void *synx_get_fence(struct synx_session *session,
  89. u32 h_synx)
  90. {
  91. struct synx_client *client;
  92. struct synx_handle_coredata *synx_data;
  93. struct synx_coredata *synx_obj;
  94. struct dma_fence *fence = NULL;
  95. client = synx_get_client(session);
  96. if (IS_ERR_OR_NULL(client))
  97. return NULL;
  98. synx_data = synx_util_acquire_handle(client, h_synx);
  99. synx_obj = synx_util_obtain_object(synx_data);
  100. if (IS_ERR_OR_NULL(synx_obj) ||
  101. IS_ERR_OR_NULL(synx_obj->fence)) {
  102. dprintk(SYNX_ERR,
  103. "[sess :%llu] invalid handle access %u\n",
  104. client->id, h_synx);
  105. goto fail;
  106. }
  107. mutex_lock(&synx_obj->obj_lock);
  108. fence = synx_obj->fence;
  109. /* obtain an additional reference to the fence */
  110. dma_fence_get(fence);
  111. mutex_unlock(&synx_obj->obj_lock);
  112. fail:
  113. synx_util_release_handle(synx_data);
  114. synx_put_client(client);
  115. return fence;
  116. }
  117. EXPORT_SYMBOL(synx_get_fence);
  118. static int synx_native_check_bind(struct synx_client *client,
  119. struct synx_create_params *params)
  120. {
  121. int rc;
  122. u32 h_synx;
  123. struct synx_entry_64 *ext_entry;
  124. struct synx_map_entry *entry;
  125. if (IS_ERR_OR_NULL(params->fence))
  126. return -SYNX_INVALID;
  127. ext_entry = synx_util_retrieve_data(params->fence,
  128. synx_util_map_params_to_type(params->flags));
  129. if (IS_ERR_OR_NULL(ext_entry))
  130. return -SYNX_NOENT;
  131. h_synx = ext_entry->data[0];
  132. synx_util_remove_data(params->fence,
  133. synx_util_map_params_to_type(params->flags));
  134. entry = synx_util_get_map_entry(h_synx);
  135. if (IS_ERR_OR_NULL(entry))
  136. /* possible cleanup, retry to alloc new handle */
  137. return -SYNX_NOENT;
  138. rc = synx_util_init_handle(client, entry->synx_obj,
  139. &h_synx, entry);
  140. if (rc != SYNX_SUCCESS) {
  141. dprintk(SYNX_ERR,
  142. "[sess :%llu] new handle init failed\n",
  143. client->id);
  144. goto fail;
  145. }
  146. *params->h_synx = h_synx;
  147. return SYNX_SUCCESS;
  148. fail:
  149. synx_util_release_map_entry(entry);
  150. return rc;
  151. }
  152. static int synx_native_create_core(struct synx_client *client,
  153. struct synx_create_params *params)
  154. {
  155. int rc;
  156. struct synx_coredata *synx_obj;
  157. struct synx_map_entry *map_entry;
  158. if (IS_ERR_OR_NULL(client) || IS_ERR_OR_NULL(params) ||
  159. IS_ERR_OR_NULL(params->h_synx))
  160. return -SYNX_INVALID;
  161. synx_obj = kzalloc(sizeof(*synx_obj), GFP_KERNEL);
  162. if (IS_ERR_OR_NULL(synx_obj))
  163. return -SYNX_NOMEM;
  164. rc = synx_util_init_coredata(synx_obj, params,
  165. &synx_fence_ops, client->dma_context);
  166. if (rc) {
  167. dprintk(SYNX_ERR,
  168. "[sess :%llu] handle allocation failed\n",
  169. client->id);
  170. kfree(synx_obj);
  171. goto fail;
  172. }
  173. map_entry = synx_util_insert_to_map(synx_obj,
  174. *params->h_synx, 0);
  175. if (IS_ERR_OR_NULL(map_entry)) {
  176. rc = PTR_ERR(map_entry);
  177. synx_util_put_object(synx_obj);
  178. goto fail;
  179. }
  180. rc = synx_util_add_callback(synx_obj, *params->h_synx);
  181. if (rc != SYNX_SUCCESS) {
  182. synx_util_release_map_entry(map_entry);
  183. goto fail;
  184. }
  185. rc = synx_util_init_handle(client, synx_obj,
  186. params->h_synx, map_entry);
  187. if (rc < 0) {
  188. dprintk(SYNX_ERR,
  189. "[sess :%llu] unable to init new handle\n",
  190. client->id);
  191. synx_util_release_map_entry(map_entry);
  192. goto fail;
  193. }
  194. dprintk(SYNX_MEM,
  195. "[sess :%llu] allocated %u, core %pK, fence %pK\n",
  196. client->id, *params->h_synx, synx_obj, synx_obj->fence);
  197. return SYNX_SUCCESS;
  198. fail:
  199. return rc;
  200. }
  201. int synx_create(struct synx_session *session,
  202. struct synx_create_params *params)
  203. {
  204. int rc = -SYNX_NOENT;
  205. struct synx_client *client;
  206. struct synx_external_desc_v2 ext_desc = {0};
  207. if (IS_ERR_OR_NULL(params) || IS_ERR_OR_NULL(params->h_synx) ||
  208. params->flags > SYNX_CREATE_MAX_FLAGS) {
  209. dprintk(SYNX_ERR, "invalid create arguments\n");
  210. return -SYNX_INVALID;
  211. }
  212. if (params->flags & SYNX_CREATE_DMA_FENCE) {
  213. dprintk(SYNX_ERR,
  214. "handle create with native fence not supported\n");
  215. return -SYNX_NOSUPPORT;
  216. }
  217. client = synx_get_client(session);
  218. if (IS_ERR_OR_NULL(client))
  219. return -SYNX_INVALID;
  220. *params->h_synx = 0;
  221. do {
  222. /* create with external fence */
  223. if (!IS_ERR_OR_NULL(params->fence))
  224. rc = synx_native_check_bind(client, params);
  225. if (rc == -SYNX_NOENT) {
  226. rc = synx_native_create_core(client, params);
  227. if (rc == SYNX_SUCCESS &&
  228. !IS_ERR_OR_NULL(params->fence)) {
  229. /* save external fence details */
  230. rc = synx_util_save_data(params->fence,
  231. synx_util_map_params_to_type(params->flags),
  232. *params->h_synx);
  233. if (rc == -SYNX_ALREADY) {
  234. /*
  235. * raced with create on same fence from
  236. * another client. clear the allocated
  237. * handle and retry.
  238. */
  239. synx_native_release_core(client, *params->h_synx);
  240. *params->h_synx = 0;
  241. rc = -SYNX_NOENT;
  242. continue;
  243. } else if (rc != SYNX_SUCCESS) {
  244. dprintk(SYNX_ERR,
  245. "allocating handle failed=%d", rc);
  246. synx_native_release_core(client, *params->h_synx);
  247. break;
  248. }
  249. /* bind with external fence */
  250. ext_desc.id = *((u32 *)params->fence);
  251. ext_desc.type = synx_util_map_params_to_type(params->flags);
  252. rc = synx_bind(session, *params->h_synx, ext_desc);
  253. if (rc != SYNX_SUCCESS) {
  254. dprintk(SYNX_ERR,
  255. "[sess :%llu] bind external fence failed\n",
  256. client->id);
  257. synx_native_release_core(client, *params->h_synx);
  258. goto fail;
  259. }
  260. }
  261. }
  262. if (rc == SYNX_SUCCESS)
  263. dprintk(SYNX_VERB,
  264. "[sess :%llu] handle allocated %u\n",
  265. client->id, *params->h_synx);
  266. break;
  267. } while (true);
  268. fail:
  269. synx_put_client(client);
  270. return rc;
  271. }
  272. EXPORT_SYMBOL(synx_create);
  273. int synx_native_signal_core(struct synx_coredata *synx_obj,
  274. u32 status,
  275. bool cb_signal,
  276. u64 ext_sync_id)
  277. {
  278. int rc = 0;
  279. int ret;
  280. u32 i = 0;
  281. u32 idx = 0;
  282. s32 sync_id;
  283. u32 type;
  284. void *data = NULL;
  285. struct synx_bind_desc bind_descs[SYNX_MAX_NUM_BINDINGS];
  286. struct bind_operations *bind_ops = NULL;
  287. if (IS_ERR_OR_NULL(synx_obj))
  288. return -SYNX_INVALID;
  289. synx_util_callback_dispatch(synx_obj, status);
  290. /*
  291. * signal the external bound sync obj/s even if fence signal fails,
  292. * w/ error signal state (set above) to prevent deadlock
  293. */
  294. if (synx_obj->num_bound_synxs > 0) {
  295. memset(bind_descs, 0,
  296. sizeof(struct synx_bind_desc) * SYNX_MAX_NUM_BINDINGS);
  297. for (i = 0; i < synx_obj->num_bound_synxs; i++) {
  298. /* signal invoked by external sync obj */
  299. if (cb_signal &&
  300. (ext_sync_id ==
  301. synx_obj->bound_synxs[i].external_desc.id)) {
  302. dprintk(SYNX_VERB,
  303. "skipping signaling inbound sync: %llu\n",
  304. ext_sync_id);
  305. type = synx_obj->bound_synxs[i].external_desc.type;
  306. memset(&synx_obj->bound_synxs[i], 0,
  307. sizeof(struct synx_bind_desc));
  308. /* clear the hash table entry */
  309. synx_util_remove_data(&ext_sync_id, type);
  310. continue;
  311. }
  312. memcpy(&bind_descs[idx++],
  313. &synx_obj->bound_synxs[i],
  314. sizeof(struct synx_bind_desc));
  315. /* clear the memory, its been backed up above */
  316. memset(&synx_obj->bound_synxs[i], 0,
  317. sizeof(struct synx_bind_desc));
  318. }
  319. synx_obj->num_bound_synxs = 0;
  320. }
  321. for (i = 0; i < idx; i++) {
  322. sync_id = bind_descs[i].external_desc.id;
  323. data = bind_descs[i].external_data;
  324. type = bind_descs[i].external_desc.type;
  325. bind_ops = synx_util_get_bind_ops(type);
  326. if (IS_ERR_OR_NULL(bind_ops)) {
  327. dprintk(SYNX_ERR,
  328. "invalid bind ops for type: %u\n", type);
  329. kfree(data);
  330. continue;
  331. }
  332. /* clear the hash table entry */
  333. synx_util_remove_data(&sync_id, type);
  334. /*
  335. * we are already signaled, so don't want to
  336. * recursively be signaled
  337. */
  338. ret = bind_ops->deregister_callback(
  339. synx_external_callback, data, sync_id);
  340. if (ret < 0) {
  341. dprintk(SYNX_ERR,
  342. "deregistration fail on %d, type: %u, err=%d\n",
  343. sync_id, type, ret);
  344. continue;
  345. }
  346. dprintk(SYNX_VERB,
  347. "signal external sync: %d, type: %u, status: %u\n",
  348. sync_id, type, status);
  349. /* optional function to enable external signaling */
  350. if (bind_ops->enable_signaling) {
  351. ret = bind_ops->enable_signaling(sync_id);
  352. if (ret < 0)
  353. dprintk(SYNX_ERR,
  354. "enabling fail on %d, type: %u, err=%d\n",
  355. sync_id, type, ret);
  356. }
  357. ret = bind_ops->signal(sync_id, status);
  358. if (ret < 0)
  359. dprintk(SYNX_ERR,
  360. "signaling fail on %d, type: %u, err=%d\n",
  361. sync_id, type, ret);
  362. /*
  363. * release the memory allocated for external data.
  364. * It is safe to release this memory as external cb
  365. * has been already deregistered before this.
  366. */
  367. kfree(data);
  368. }
  369. return rc;
  370. }
  371. int synx_native_signal_fence(struct synx_coredata *synx_obj,
  372. u32 status)
  373. {
  374. int rc = 0;
  375. unsigned long flags;
  376. if (IS_ERR_OR_NULL(synx_obj) || IS_ERR_OR_NULL(synx_obj->fence))
  377. return -SYNX_INVALID;
  378. if (status <= SYNX_STATE_ACTIVE) {
  379. dprintk(SYNX_ERR, "signaling with wrong status: %u\n",
  380. status);
  381. return -SYNX_INVALID;
  382. }
  383. if (synx_util_is_merged_object(synx_obj)) {
  384. dprintk(SYNX_ERR, "signaling a composite handle\n");
  385. return -SYNX_INVALID;
  386. }
  387. if (synx_util_get_object_status(synx_obj) !=
  388. SYNX_STATE_ACTIVE)
  389. return -SYNX_ALREADY;
  390. if (IS_ERR_OR_NULL(synx_obj->signal_cb)) {
  391. dprintk(SYNX_ERR, "signal cb in bad state\n");
  392. return -SYNX_INVALID;
  393. }
  394. /*
  395. * remove registered callback for the fence
  396. * so it does not invoke the signal through callback again
  397. */
  398. if (!dma_fence_remove_callback(synx_obj->fence,
  399. &synx_obj->signal_cb->fence_cb)) {
  400. dprintk(SYNX_ERR, "callback could not be removed\n");
  401. return -SYNX_INVALID;
  402. }
  403. dprintk(SYNX_MEM, "signal cb destroyed %pK\n",
  404. synx_obj->signal_cb);
  405. kfree(synx_obj->signal_cb);
  406. synx_obj->signal_cb = NULL;
  407. /* releasing reference held by signal cb */
  408. synx_util_put_object(synx_obj);
  409. spin_lock_irqsave(synx_obj->fence->lock, flags);
  410. /* check the status again acquiring lock to avoid errors */
  411. if (synx_util_get_object_status_locked(synx_obj) !=
  412. SYNX_STATE_ACTIVE) {
  413. spin_unlock_irqrestore(synx_obj->fence->lock, flags);
  414. return -SYNX_ALREADY;
  415. }
  416. /* set fence error to model {signal w/ error} */
  417. if (status != SYNX_STATE_SIGNALED_SUCCESS)
  418. dma_fence_set_error(synx_obj->fence, -status);
  419. rc = dma_fence_signal_locked(synx_obj->fence);
  420. if (rc)
  421. dprintk(SYNX_ERR,
  422. "signaling fence %pK failed=%d\n",
  423. synx_obj->fence, rc);
  424. spin_unlock_irqrestore(synx_obj->fence->lock, flags);
  425. return rc;
  426. }
  427. int synx_native_signal_merged_fence(struct synx_coredata *synx_obj, u32 status)
  428. {
  429. int rc = SYNX_SUCCESS;
  430. unsigned long flags;
  431. int i = 0, num_fences = 0;
  432. struct synx_coredata **synx_child_obj = NULL;
  433. rc = synx_get_child_coredata(synx_obj, &synx_child_obj, &num_fences);
  434. if (rc != SYNX_SUCCESS)
  435. return rc;
  436. for(i = 0; i < num_fences; i++)
  437. {
  438. if (IS_ERR_OR_NULL(synx_child_obj[i]) || IS_ERR_OR_NULL(synx_child_obj[i]->fence)) {
  439. dprintk(SYNX_ERR, "Invalid child coredata %d\n", i);
  440. rc = -SYNX_NOENT;
  441. goto fail;
  442. }
  443. mutex_lock(&synx_child_obj[i]->obj_lock);
  444. spin_lock_irqsave(synx_child_obj[i]->fence->lock, flags);
  445. if (synx_util_get_object_status_locked(synx_child_obj[i]) != SYNX_STATE_ACTIVE ||
  446. !synx_util_is_global_object(synx_child_obj[i]))
  447. {
  448. spin_unlock_irqrestore(synx_child_obj[i]->fence->lock, flags);
  449. mutex_unlock(&synx_child_obj[i]->obj_lock);
  450. continue;
  451. }
  452. spin_unlock_irqrestore(synx_child_obj[i]->fence->lock, flags);
  453. rc = synx_native_signal_fence(synx_child_obj[i], status);
  454. mutex_unlock(&synx_child_obj[i]->obj_lock);
  455. }
  456. fail:
  457. kfree(synx_child_obj);
  458. return rc;
  459. }
  460. void synx_signal_handler(struct work_struct *cb_dispatch)
  461. {
  462. int rc = SYNX_SUCCESS;
  463. u32 idx;
  464. struct synx_signal_cb *signal_cb =
  465. container_of(cb_dispatch, struct synx_signal_cb, cb_dispatch);
  466. struct synx_coredata *synx_obj = signal_cb->synx_obj;
  467. u32 h_synx = signal_cb->handle;
  468. u32 status = signal_cb->status;
  469. if ((signal_cb->flag & SYNX_SIGNAL_FROM_FENCE) &&
  470. (synx_util_is_global_handle(h_synx) ||
  471. synx_util_is_global_object(synx_obj))) {
  472. idx = (IS_ERR_OR_NULL(synx_obj)) ?
  473. synx_util_global_idx(h_synx) :
  474. synx_obj->global_idx;
  475. if (synx_global_get_status(idx) == SYNX_STATE_ACTIVE) {
  476. rc = synx_global_update_status(idx, status);
  477. if (rc != SYNX_SUCCESS)
  478. dprintk(SYNX_ERR,
  479. "global status update of %u failed=%d\n",
  480. h_synx, rc);
  481. }
  482. /*
  483. * We are decrementing the reference here assuming this code will be
  484. * executed after handle is released. But in case if clients signal
  485. * dma fence in middle of execution sequence, then we will put
  486. * one reference thus deleting the global idx. As of now clients cannot
  487. * signal dma fence.
  488. */
  489. if (IS_ERR_OR_NULL(synx_obj))
  490. synx_global_put_ref(idx);
  491. }
  492. /*
  493. * when invoked from external callback, possible for
  494. * all local clients to have released the handle coredata.
  495. */
  496. if (IS_ERR_OR_NULL(synx_obj)) {
  497. dprintk(SYNX_WARN,
  498. "handle %d has no local clients\n",
  499. h_synx);
  500. dprintk(SYNX_MEM, "signal cb destroyed %pK\n",
  501. signal_cb);
  502. kfree(signal_cb);
  503. return;
  504. }
  505. if (rc != SYNX_SUCCESS) {
  506. dprintk(SYNX_ERR,
  507. "global status update for %u failed=%d\n",
  508. h_synx, rc);
  509. goto fail;
  510. }
  511. mutex_lock(&synx_obj->obj_lock);
  512. if (signal_cb->flag & SYNX_SIGNAL_FROM_IPC) {
  513. if (synx_util_is_merged_object(synx_obj))
  514. rc = synx_native_signal_merged_fence(synx_obj, status);
  515. else
  516. rc = synx_native_signal_fence(synx_obj, status);
  517. }
  518. if (rc != SYNX_SUCCESS) {
  519. mutex_unlock(&synx_obj->obj_lock);
  520. dprintk(SYNX_ERR,
  521. "failed to signal fence %u with err=%d\n",
  522. h_synx, rc);
  523. goto fail;
  524. }
  525. if (rc == SYNX_SUCCESS)
  526. rc = synx_native_signal_core(synx_obj, status,
  527. (signal_cb->flag & SYNX_SIGNAL_FROM_CALLBACK) ?
  528. true : false, signal_cb->ext_sync_id);
  529. mutex_unlock(&synx_obj->obj_lock);
  530. if (rc != SYNX_SUCCESS)
  531. dprintk(SYNX_ERR,
  532. "internal signaling %u failed=%d",
  533. h_synx, rc);
  534. fail:
  535. /* release reference held by signal cb */
  536. synx_util_put_object(synx_obj);
  537. dprintk(SYNX_MEM, "signal cb destroyed %pK\n", signal_cb);
  538. kfree(signal_cb);
  539. dprintk(SYNX_VERB, "signal handle %u dispatch complete=%d",
  540. h_synx, rc);
  541. }
  542. /* function would be called from atomic context */
  543. void synx_fence_callback(struct dma_fence *fence,
  544. struct dma_fence_cb *cb)
  545. {
  546. s32 status;
  547. struct synx_signal_cb *signal_cb =
  548. container_of(cb, struct synx_signal_cb, fence_cb);
  549. dprintk(SYNX_DBG,
  550. "callback from external fence %pK for handle %u\n",
  551. fence, signal_cb->handle);
  552. /* other signal_cb members would be set during cb registration */
  553. status = dma_fence_get_status_locked(fence);
  554. /*
  555. * dma_fence_get_status_locked API returns 1 if signaled,
  556. * 0 if ACTIVE,
  557. * and negative error code in case of any failure
  558. */
  559. if (status == 1)
  560. status = SYNX_STATE_SIGNALED_SUCCESS;
  561. else if (status < 0)
  562. status = SYNX_STATE_SIGNALED_EXTERNAL;
  563. signal_cb->status = status;
  564. INIT_WORK(&signal_cb->cb_dispatch, synx_signal_handler);
  565. queue_work(synx_dev->wq_cb, &signal_cb->cb_dispatch);
  566. }
  567. EXPORT_SYMBOL(synx_fence_callback);
  568. static int synx_signal_offload_job(
  569. struct synx_client *client,
  570. struct synx_coredata *synx_obj,
  571. u32 h_synx, u32 status)
  572. {
  573. int rc = SYNX_SUCCESS;
  574. struct synx_signal_cb *signal_cb;
  575. signal_cb = kzalloc(sizeof(*signal_cb), GFP_ATOMIC);
  576. if (IS_ERR_OR_NULL(signal_cb)) {
  577. rc = -SYNX_NOMEM;
  578. goto fail;
  579. }
  580. /*
  581. * since the signal will be queued to separate thread,
  582. * to ensure the synx coredata pointer remain valid, get
  583. * additional reference, thus avoiding any potential
  584. * use-after-free.
  585. */
  586. synx_util_get_object(synx_obj);
  587. signal_cb->handle = h_synx;
  588. signal_cb->status = status;
  589. signal_cb->synx_obj = synx_obj;
  590. signal_cb->flag = SYNX_SIGNAL_FROM_CLIENT;
  591. dprintk(SYNX_VERB,
  592. "[sess :%llu] signal work queued for %u\n",
  593. client->id, h_synx);
  594. INIT_WORK(&signal_cb->cb_dispatch, synx_signal_handler);
  595. queue_work(synx_dev->wq_cb, &signal_cb->cb_dispatch);
  596. fail:
  597. return rc;
  598. }
  599. int synx_signal(struct synx_session *session, u32 h_synx, u32 status)
  600. {
  601. int rc = SYNX_SUCCESS;
  602. struct synx_client *client;
  603. struct synx_handle_coredata *synx_data = NULL;
  604. struct synx_coredata *synx_obj;
  605. client = synx_get_client(session);
  606. if (IS_ERR_OR_NULL(client))
  607. return -SYNX_INVALID;
  608. if (status <= SYNX_STATE_ACTIVE) {
  609. dprintk(SYNX_ERR,
  610. "[sess :%llu] signaling with wrong status: %u\n",
  611. client->id, status);
  612. rc = -SYNX_INVALID;
  613. goto fail;
  614. }
  615. synx_data = synx_util_acquire_handle(client, h_synx);
  616. synx_obj = synx_util_obtain_object(synx_data);
  617. if (IS_ERR_OR_NULL(synx_obj) ||
  618. IS_ERR_OR_NULL(synx_obj->fence)) {
  619. dprintk(SYNX_ERR,
  620. "[sess :%llu] invalid handle access %u\n",
  621. client->id, h_synx);
  622. rc = -SYNX_INVALID;
  623. goto fail;
  624. }
  625. mutex_lock(&synx_obj->obj_lock);
  626. if (synx_util_is_global_handle(h_synx) ||
  627. synx_util_is_global_object(synx_obj))
  628. rc = synx_global_update_status(
  629. synx_obj->global_idx, status);
  630. if (rc != SYNX_SUCCESS) {
  631. mutex_unlock(&synx_obj->obj_lock);
  632. dprintk(SYNX_ERR,
  633. "[sess :%llu] status update %d failed=%d\n",
  634. client->id, h_synx, rc);
  635. goto fail;
  636. }
  637. /*
  638. * offload callback dispatch and external fence
  639. * notification to separate worker thread, if any.
  640. */
  641. if (synx_obj->num_bound_synxs ||
  642. !list_empty(&synx_obj->reg_cbs_list))
  643. rc = synx_signal_offload_job(client, synx_obj,
  644. h_synx, status);
  645. rc = synx_native_signal_fence(synx_obj, status);
  646. if (rc != SYNX_SUCCESS)
  647. dprintk(SYNX_ERR,
  648. "[sess :%llu] signaling %u failed=%d\n",
  649. client->id, h_synx, rc);
  650. mutex_unlock(&synx_obj->obj_lock);
  651. fail:
  652. synx_util_release_handle(synx_data);
  653. synx_put_client(client);
  654. return rc;
  655. }
  656. EXPORT_SYMBOL(synx_signal);
  657. static int synx_match_payload(struct synx_kernel_payload *cb_payload,
  658. struct synx_kernel_payload *payload)
  659. {
  660. int rc = 0;
  661. if (IS_ERR_OR_NULL(cb_payload) || IS_ERR_OR_NULL(payload))
  662. return -SYNX_INVALID;
  663. if ((cb_payload->cb_func == payload->cb_func) &&
  664. (cb_payload->data == payload->data)) {
  665. if (payload->cancel_cb_func) {
  666. cb_payload->cb_func =
  667. payload->cancel_cb_func;
  668. rc = 1;
  669. } else {
  670. rc = 2;
  671. dprintk(SYNX_VERB,
  672. "kernel cb de-registration success\n");
  673. }
  674. }
  675. return rc;
  676. }
  677. int synx_async_wait(struct synx_session *session,
  678. struct synx_callback_params *params)
  679. {
  680. int rc = 0;
  681. u32 idx;
  682. u32 status;
  683. struct synx_client *client;
  684. struct synx_handle_coredata *synx_data;
  685. struct synx_coredata *synx_obj;
  686. struct synx_cb_data *synx_cb;
  687. struct synx_kernel_payload payload;
  688. if (IS_ERR_OR_NULL(session) || IS_ERR_OR_NULL(params))
  689. return -SYNX_INVALID;
  690. if (params->timeout_ms != SYNX_NO_TIMEOUT)
  691. return -SYNX_NOSUPPORT;
  692. client = synx_get_client(session);
  693. if (IS_ERR_OR_NULL(client))
  694. return -SYNX_INVALID;
  695. synx_data = synx_util_acquire_handle(client, params->h_synx);
  696. synx_obj = synx_util_obtain_object(synx_data);
  697. if (IS_ERR_OR_NULL(synx_obj)) {
  698. dprintk(SYNX_ERR,
  699. "[sess :%llu] invalid handle access %u\n",
  700. client->id, params->h_synx);
  701. rc = -SYNX_INVALID;
  702. goto fail;
  703. }
  704. mutex_lock(&synx_obj->obj_lock);
  705. synx_cb = kzalloc(sizeof(*synx_cb), GFP_ATOMIC);
  706. if (IS_ERR_OR_NULL(synx_cb)) {
  707. rc = -SYNX_NOMEM;
  708. goto release;
  709. }
  710. payload.h_synx = params->h_synx;
  711. payload.cb_func = params->cb_func;
  712. payload.data = params->userdata;
  713. /* allocate a free index from client cb table */
  714. rc = synx_util_alloc_cb_entry(client, &payload, &idx);
  715. if (rc) {
  716. dprintk(SYNX_ERR,
  717. "[sess :%llu] error allocating cb entry\n",
  718. client->id);
  719. kfree(synx_cb);
  720. goto release;
  721. }
  722. if (synx_util_is_global_handle(params->h_synx) ||
  723. synx_util_is_global_object(synx_obj)) {
  724. status = synx_global_test_status_set_wait(
  725. synx_util_global_idx(params->h_synx),
  726. SYNX_CORE_APSS);
  727. if (status != SYNX_STATE_ACTIVE) {
  728. if (synx_util_is_merged_object(synx_obj))
  729. synx_native_signal_merged_fence(synx_obj, status);
  730. else
  731. synx_native_signal_fence(synx_obj, status);
  732. }
  733. }
  734. else
  735. status = synx_util_get_object_status(synx_obj);
  736. synx_cb->session = session;
  737. synx_cb->idx = idx;
  738. INIT_WORK(&synx_cb->cb_dispatch, synx_util_cb_dispatch);
  739. /* add callback if object still ACTIVE, dispatch if SIGNALED */
  740. if (status == SYNX_STATE_ACTIVE) {
  741. dprintk(SYNX_VERB,
  742. "[sess :%llu] callback added for handle %u\n",
  743. client->id, params->h_synx);
  744. list_add(&synx_cb->node, &synx_obj->reg_cbs_list);
  745. } else {
  746. synx_cb->status = status;
  747. dprintk(SYNX_VERB,
  748. "[sess :%llu] callback queued for handle %u\n",
  749. client->id, params->h_synx);
  750. queue_work(synx_dev->wq_cb,
  751. &synx_cb->cb_dispatch);
  752. }
  753. release:
  754. mutex_unlock(&synx_obj->obj_lock);
  755. fail:
  756. synx_util_release_handle(synx_data);
  757. synx_put_client(client);
  758. return rc;
  759. }
  760. EXPORT_SYMBOL(synx_async_wait);
  761. int synx_cancel_async_wait(
  762. struct synx_session *session,
  763. struct synx_callback_params *params)
  764. {
  765. int rc = 0, ret = 0;
  766. u32 status;
  767. bool match_found = false;
  768. struct synx_client *client;
  769. struct synx_handle_coredata *synx_data;
  770. struct synx_coredata *synx_obj;
  771. struct synx_kernel_payload payload;
  772. struct synx_cb_data *synx_cb, *synx_cb_temp;
  773. struct synx_client_cb *cb_payload;
  774. if (IS_ERR_OR_NULL(session) || IS_ERR_OR_NULL(params))
  775. return -SYNX_INVALID;
  776. client = synx_get_client(session);
  777. if (IS_ERR_OR_NULL(client))
  778. return -SYNX_INVALID;
  779. synx_data = synx_util_acquire_handle(client, params->h_synx);
  780. synx_obj = synx_util_obtain_object(synx_data);
  781. if (IS_ERR_OR_NULL(synx_obj)) {
  782. dprintk(SYNX_ERR,
  783. "[sess :%llu] invalid handle access %u\n",
  784. client->id, params->h_synx);
  785. rc = -SYNX_INVALID;
  786. goto fail;
  787. }
  788. mutex_lock(&synx_obj->obj_lock);
  789. if (synx_util_is_external_object(synx_obj)) {
  790. dprintk(SYNX_ERR,
  791. "cannot cancel wait on external fence\n");
  792. goto release;
  793. }
  794. payload.h_synx = params->h_synx;
  795. payload.cb_func = params->cb_func;
  796. payload.data = params->userdata;
  797. payload.cancel_cb_func = params->cancel_cb_func;
  798. status = synx_util_get_object_status(synx_obj);
  799. if (status != SYNX_STATE_ACTIVE) {
  800. dprintk(SYNX_ERR,
  801. "handle %u already signaled cannot cancel\n",
  802. params->h_synx);
  803. rc = -SYNX_INVALID;
  804. goto release;
  805. }
  806. status = SYNX_CALLBACK_RESULT_CANCELED;
  807. /* remove all cb payloads mayching the deregister call */
  808. list_for_each_entry_safe(synx_cb, synx_cb_temp,
  809. &synx_obj->reg_cbs_list, node) {
  810. if (synx_cb->session != session) {
  811. continue;
  812. } else if (synx_cb->idx == 0 ||
  813. synx_cb->idx >= SYNX_MAX_OBJS) {
  814. /*
  815. * this should not happen. Even if it does,
  816. * the allocated memory will be cleaned up
  817. * when object is destroyed, preventing any
  818. * memory leaks.
  819. */
  820. dprintk(SYNX_ERR,
  821. "[sess :%llu] invalid callback data\n",
  822. client->id);
  823. continue;
  824. }
  825. cb_payload = &client->cb_table[synx_cb->idx];
  826. ret = synx_match_payload(&cb_payload->kernel_cb, &payload);
  827. switch (ret) {
  828. case 1:
  829. /* queue the cancel cb work */
  830. list_del_init(&synx_cb->node);
  831. synx_cb->status = status;
  832. queue_work(synx_dev->wq_cb,
  833. &synx_cb->cb_dispatch);
  834. match_found = true;
  835. break;
  836. case 2:
  837. /* no cancellation cb */
  838. if (synx_util_clear_cb_entry(client, cb_payload))
  839. dprintk(SYNX_ERR,
  840. "[sess :%llu] error clearing cb %u\n",
  841. client->id, params->h_synx);
  842. list_del_init(&synx_cb->node);
  843. kfree(synx_cb);
  844. match_found = true;
  845. break;
  846. default:
  847. break;
  848. }
  849. }
  850. if (!match_found)
  851. rc = -SYNX_INVALID;
  852. release:
  853. mutex_unlock(&synx_obj->obj_lock);
  854. fail:
  855. synx_util_release_handle(synx_data);
  856. synx_put_client(client);
  857. return rc;
  858. }
  859. EXPORT_SYMBOL(synx_cancel_async_wait);
  860. int synx_merge(struct synx_session *session,
  861. struct synx_merge_params *params)
  862. {
  863. int rc, i, num_signaled = 0;
  864. u32 count = 0, h_child, status = SYNX_STATE_ACTIVE;
  865. u32 *h_child_list = NULL, *h_child_idx_list = NULL;
  866. struct synx_client *client;
  867. struct dma_fence **fences = NULL;
  868. struct synx_map_entry *map_entry;
  869. struct synx_coredata *synx_obj, *synx_obj_child;
  870. struct synx_handle_coredata *synx_data_child;
  871. if (IS_ERR_OR_NULL(session) || IS_ERR_OR_NULL(params))
  872. return -SYNX_INVALID;
  873. if (IS_ERR_OR_NULL(params->h_synxs) ||
  874. IS_ERR_OR_NULL(params->h_merged_obj)) {
  875. dprintk(SYNX_ERR, "invalid arguments\n");
  876. return -SYNX_INVALID;
  877. }
  878. client = synx_get_client(session);
  879. if (IS_ERR_OR_NULL(client))
  880. return -SYNX_INVALID;
  881. rc = synx_util_validate_merge(client, params->h_synxs,
  882. params->num_objs, &fences, &count);
  883. if (rc < 0) {
  884. dprintk(SYNX_ERR,
  885. "[sess :%llu] merge validation failed\n",
  886. client->id);
  887. rc = -SYNX_INVALID;
  888. goto fail;
  889. }
  890. synx_obj = kzalloc(sizeof(*synx_obj), GFP_KERNEL);
  891. if (IS_ERR_OR_NULL(synx_obj)) {
  892. rc = -SYNX_NOMEM;
  893. goto fail;
  894. }
  895. rc = synx_util_init_group_coredata(synx_obj, fences,
  896. params, count, client->dma_context);
  897. if (rc) {
  898. dprintk(SYNX_ERR,
  899. "[sess :%llu] error initializing merge handle\n",
  900. client->id);
  901. goto clean_up;
  902. }
  903. map_entry = synx_util_insert_to_map(synx_obj,
  904. *params->h_merged_obj, 0);
  905. if (IS_ERR_OR_NULL(map_entry)) {
  906. rc = PTR_ERR(map_entry);
  907. goto clean_up;
  908. }
  909. rc = synx_util_add_callback(synx_obj, *params->h_merged_obj);
  910. if (rc != SYNX_SUCCESS)
  911. goto clear;
  912. rc = synx_util_init_handle(client, synx_obj,
  913. params->h_merged_obj, map_entry);
  914. if (rc) {
  915. dprintk(SYNX_ERR,
  916. "[sess :%llu] unable to init merge handle %u\n",
  917. client->id, *params->h_merged_obj);
  918. dma_fence_put(synx_obj->fence);
  919. goto clear;
  920. }
  921. h_child_list = kzalloc(count*4, GFP_KERNEL);
  922. if (IS_ERR_OR_NULL(h_child_list)) {
  923. rc = -SYNX_NOMEM;
  924. goto clear;
  925. }
  926. h_child_idx_list = kzalloc(count*4, GFP_KERNEL);
  927. if (IS_ERR_OR_NULL(h_child_idx_list)) {
  928. rc = -SYNX_NOMEM;
  929. goto clear;
  930. }
  931. for (i = 0; i < count; i++) {
  932. h_child = synx_util_get_fence_entry((u64)fences[i], 1);
  933. if (!synx_util_is_global_handle(h_child))
  934. continue;
  935. h_child_list[num_signaled] = h_child;
  936. h_child_idx_list[num_signaled++] = synx_util_global_idx(h_child);
  937. }
  938. if (params->flags & SYNX_MERGE_GLOBAL_FENCE) {
  939. rc = synx_global_merge(h_child_idx_list, num_signaled,
  940. synx_util_global_idx(*params->h_merged_obj));
  941. if (rc != SYNX_SUCCESS) {
  942. dprintk(SYNX_ERR, "global merge failed\n");
  943. kfree(h_child_list);
  944. kfree(h_child_idx_list);
  945. goto clear;
  946. }
  947. }
  948. else {
  949. for(i = 0; i < num_signaled; i++) {
  950. status = synx_global_test_status_set_wait(synx_util_global_idx(h_child_list[i]), SYNX_CORE_APSS);
  951. if (status != SYNX_STATE_ACTIVE) {
  952. synx_data_child = synx_util_acquire_handle(client, h_child_list[i]);
  953. synx_obj_child = synx_util_obtain_object(synx_data_child);
  954. if (IS_ERR_OR_NULL(synx_obj_child)) {
  955. dprintk(SYNX_ERR,
  956. "[sess :%llu] invalid child handle %u\n",
  957. client->id, h_child_list[i]);
  958. continue;
  959. }
  960. rc = synx_native_signal_fence(synx_obj_child, status);
  961. if (rc != SYNX_SUCCESS)
  962. dprintk(SYNX_ERR, "h_synx %u failed with status %d\n", h_child_list[i], rc);
  963. }
  964. }
  965. }
  966. dprintk(SYNX_MEM,
  967. "[sess :%llu] merge allocated %u, core %pK, fence %pK\n",
  968. client->id, *params->h_merged_obj, synx_obj,
  969. synx_obj->fence);
  970. kfree(h_child_list);
  971. kfree(h_child_idx_list);
  972. synx_put_client(client);
  973. return SYNX_SUCCESS;
  974. clear:
  975. synx_util_release_map_entry(map_entry);
  976. clean_up:
  977. kfree(synx_obj);
  978. fail:
  979. synx_util_merge_error(client, params->h_synxs, count);
  980. if (params->num_objs && params->num_objs <= count)
  981. kfree(fences);
  982. synx_put_client(client);
  983. return rc;
  984. }
  985. EXPORT_SYMBOL(synx_merge);
  986. int synx_native_release_core(struct synx_client *client,
  987. u32 h_synx)
  988. {
  989. int rc = -SYNX_INVALID;
  990. struct synx_handle_coredata *curr, *synx_handle = NULL;
  991. spin_lock_bh(&client->handle_map_lock);
  992. hash_for_each_possible(client->handle_map,
  993. curr, node, h_synx) {
  994. if (curr->key == h_synx &&
  995. curr->rel_count != 0) {
  996. curr->rel_count--;
  997. synx_handle = curr;
  998. rc = SYNX_SUCCESS;
  999. break;
  1000. }
  1001. }
  1002. spin_unlock_bh(&client->handle_map_lock);
  1003. /* release the reference obtained at synx creation */
  1004. synx_util_release_handle(synx_handle);
  1005. return rc;
  1006. }
  1007. int synx_release(struct synx_session *session, u32 h_synx)
  1008. {
  1009. int rc = 0;
  1010. struct synx_client *client;
  1011. client = synx_get_client(session);
  1012. if (IS_ERR_OR_NULL(client))
  1013. return -SYNX_INVALID;
  1014. rc = synx_native_release_core(client, h_synx);
  1015. synx_put_client(client);
  1016. return rc;
  1017. }
  1018. EXPORT_SYMBOL(synx_release);
  1019. int synx_wait(struct synx_session *session,
  1020. u32 h_synx, u64 timeout_ms)
  1021. {
  1022. int rc = 0;
  1023. unsigned long timeleft;
  1024. struct synx_client *client;
  1025. struct synx_handle_coredata *synx_data;
  1026. struct synx_coredata *synx_obj;
  1027. client = synx_get_client(session);
  1028. if (IS_ERR_OR_NULL(client))
  1029. return -SYNX_INVALID;
  1030. synx_data = synx_util_acquire_handle(client, h_synx);
  1031. synx_obj = synx_util_obtain_object(synx_data);
  1032. if (IS_ERR_OR_NULL(synx_obj) || IS_ERR_OR_NULL(synx_obj->fence)) {
  1033. dprintk(SYNX_ERR,
  1034. "[sess :%llu] invalid handle access %u\n",
  1035. client->id, h_synx);
  1036. rc = -SYNX_INVALID;
  1037. goto fail;
  1038. }
  1039. if (synx_util_is_global_handle(h_synx)) {
  1040. rc = synx_global_test_status_set_wait(
  1041. synx_util_global_idx(h_synx), SYNX_CORE_APSS);
  1042. if (rc != SYNX_STATE_ACTIVE) {
  1043. mutex_lock(&synx_obj->obj_lock);
  1044. if (synx_util_is_merged_object(synx_obj))
  1045. synx_native_signal_merged_fence(synx_obj, rc);
  1046. else
  1047. synx_native_signal_fence(synx_obj, rc);
  1048. mutex_unlock(&synx_obj->obj_lock);
  1049. goto status;
  1050. }
  1051. }
  1052. timeleft = dma_fence_wait_timeout(synx_obj->fence, (bool) 0,
  1053. msecs_to_jiffies(timeout_ms));
  1054. if (timeleft <= 0) {
  1055. dprintk(SYNX_ERR,
  1056. "[sess :%llu] wait timeout for handle %u\n",
  1057. client->id, h_synx);
  1058. rc = -ETIMEDOUT;
  1059. goto fail;
  1060. }
  1061. status:
  1062. mutex_lock(&synx_obj->obj_lock);
  1063. rc = synx_util_get_object_status(synx_obj);
  1064. mutex_unlock(&synx_obj->obj_lock);
  1065. fail:
  1066. synx_util_release_handle(synx_data);
  1067. synx_put_client(client);
  1068. return rc;
  1069. }
  1070. EXPORT_SYMBOL(synx_wait);
  1071. int synx_bind(struct synx_session *session,
  1072. u32 h_synx,
  1073. struct synx_external_desc_v2 external_sync)
  1074. {
  1075. int rc = 0;
  1076. u32 i;
  1077. u32 bound_idx;
  1078. struct synx_client *client;
  1079. struct synx_handle_coredata *synx_data = NULL;
  1080. struct synx_coredata *synx_obj;
  1081. struct synx_signal_cb *data = NULL;
  1082. struct bind_operations *bind_ops = NULL;
  1083. client = synx_get_client(session);
  1084. if (IS_ERR_OR_NULL(client))
  1085. return -SYNX_INVALID;
  1086. synx_data = synx_util_acquire_handle(client, h_synx);
  1087. synx_obj = synx_util_obtain_object(synx_data);
  1088. if (IS_ERR_OR_NULL(synx_obj)) {
  1089. if (rc || synx_data)
  1090. dprintk(SYNX_ERR,
  1091. "[sess :%llu] invalid handle access %u\n",
  1092. client->id, h_synx);
  1093. goto fail;
  1094. }
  1095. bind_ops = synx_util_get_bind_ops(external_sync.type);
  1096. if (IS_ERR_OR_NULL(bind_ops)) {
  1097. dprintk(SYNX_ERR,
  1098. "[sess :%llu] invalid bind ops for %u\n",
  1099. client->id, external_sync.type);
  1100. rc = -SYNX_INVALID;
  1101. goto fail;
  1102. }
  1103. mutex_lock(&synx_obj->obj_lock);
  1104. if (synx_util_is_merged_object(synx_obj)) {
  1105. dprintk(SYNX_ERR,
  1106. "[sess :%llu] cannot bind to composite handle %u\n",
  1107. client->id, h_synx);
  1108. rc = -SYNX_INVALID;
  1109. goto release;
  1110. }
  1111. if (synx_obj->num_bound_synxs >= SYNX_MAX_NUM_BINDINGS) {
  1112. dprintk(SYNX_ERR,
  1113. "[sess :%llu] max bindings reached for handle %u\n",
  1114. client->id, h_synx);
  1115. rc = -SYNX_NOMEM;
  1116. goto release;
  1117. }
  1118. /* don't bind external sync obj if already done */
  1119. for (i = 0; i < synx_obj->num_bound_synxs; i++) {
  1120. if ((external_sync.id ==
  1121. synx_obj->bound_synxs[i].external_desc.id) &&
  1122. (external_sync.type ==
  1123. synx_obj->bound_synxs[i].external_desc.type)){
  1124. dprintk(SYNX_ERR,
  1125. "[sess :%llu] duplicate bind for sync %llu\n",
  1126. client->id, external_sync.id);
  1127. rc = -SYNX_ALREADY;
  1128. goto release;
  1129. }
  1130. }
  1131. data = kzalloc(sizeof(*data), GFP_KERNEL);
  1132. if (IS_ERR_OR_NULL(data)) {
  1133. rc = -SYNX_NOMEM;
  1134. goto release;
  1135. }
  1136. /* get additional reference since passing pointer to cb */
  1137. synx_util_get_object(synx_obj);
  1138. /* data passed to external callback */
  1139. data->handle = h_synx;
  1140. data->synx_obj = synx_obj;
  1141. bound_idx = synx_obj->num_bound_synxs;
  1142. memcpy(&synx_obj->bound_synxs[bound_idx],
  1143. &external_sync, sizeof(struct synx_external_desc_v2));
  1144. synx_obj->bound_synxs[bound_idx].external_data = data;
  1145. synx_obj->num_bound_synxs++;
  1146. mutex_unlock(&synx_obj->obj_lock);
  1147. rc = bind_ops->register_callback(synx_external_callback,
  1148. data, external_sync.id);
  1149. if (rc) {
  1150. dprintk(SYNX_ERR,
  1151. "[sess :%llu] callback reg failed for %llu\n",
  1152. client->id, external_sync.id);
  1153. mutex_lock(&synx_obj->obj_lock);
  1154. memset(&synx_obj->bound_synxs[bound_idx], 0,
  1155. sizeof(struct synx_external_desc_v2));
  1156. synx_obj->num_bound_synxs--;
  1157. mutex_unlock(&synx_obj->obj_lock);
  1158. synx_util_put_object(synx_obj);
  1159. kfree(data);
  1160. goto fail;
  1161. }
  1162. synx_util_release_handle(synx_data);
  1163. dprintk(SYNX_DBG,
  1164. "[sess :%llu] ext sync %llu bound to handle %u\n",
  1165. client->id, external_sync.id, h_synx);
  1166. synx_put_client(client);
  1167. return SYNX_SUCCESS;
  1168. release:
  1169. mutex_unlock(&synx_obj->obj_lock);
  1170. fail:
  1171. synx_util_release_handle(synx_data);
  1172. synx_put_client(client);
  1173. return rc;
  1174. }
  1175. EXPORT_SYMBOL(synx_bind);
  1176. int synx_get_status(struct synx_session *session,
  1177. u32 h_synx)
  1178. {
  1179. int rc = 0;
  1180. struct synx_client *client;
  1181. struct synx_handle_coredata *synx_data;
  1182. struct synx_coredata *synx_obj;
  1183. client = synx_get_client(session);
  1184. if (IS_ERR_OR_NULL(client))
  1185. return -SYNX_INVALID;
  1186. synx_data = synx_util_acquire_handle(client, h_synx);
  1187. synx_obj = synx_util_obtain_object(synx_data);
  1188. if (IS_ERR_OR_NULL(synx_obj) ||
  1189. IS_ERR_OR_NULL(synx_obj->fence)) {
  1190. dprintk(SYNX_ERR,
  1191. "[sess :%llu] invalid handle access %u\n",
  1192. client->id, h_synx);
  1193. rc = -SYNX_INVALID;
  1194. goto fail;
  1195. }
  1196. if (synx_util_is_global_handle(h_synx)) {
  1197. rc = synx_global_get_status(
  1198. synx_util_global_idx(h_synx));
  1199. if (rc != SYNX_STATE_ACTIVE) {
  1200. dprintk(SYNX_VERB,
  1201. "[sess :%llu] handle %u in status %d\n",
  1202. client->id, h_synx, rc);
  1203. goto fail;
  1204. }
  1205. }
  1206. mutex_lock(&synx_obj->obj_lock);
  1207. rc = synx_util_get_object_status(synx_obj);
  1208. mutex_unlock(&synx_obj->obj_lock);
  1209. dprintk(SYNX_VERB,
  1210. "[sess :%llu] handle %u status %d\n",
  1211. client->id, h_synx, rc);
  1212. fail:
  1213. synx_util_release_handle(synx_data);
  1214. synx_put_client(client);
  1215. return rc;
  1216. }
  1217. EXPORT_SYMBOL(synx_get_status);
  1218. static struct synx_map_entry *synx_handle_conversion(
  1219. struct synx_client *client,
  1220. u32 *h_synx, struct synx_map_entry *old_entry)
  1221. {
  1222. int rc;
  1223. struct synx_map_entry *map_entry = NULL;
  1224. struct synx_coredata *synx_obj;
  1225. if (IS_ERR_OR_NULL(old_entry)) {
  1226. old_entry = synx_util_get_map_entry(*h_synx);
  1227. if (IS_ERR_OR_NULL(old_entry)) {
  1228. rc = PTR_ERR(old_entry);
  1229. dprintk(SYNX_ERR,
  1230. "invalid import handle %u err=%d",
  1231. *h_synx, rc);
  1232. return old_entry;
  1233. }
  1234. }
  1235. synx_obj = old_entry->synx_obj;
  1236. BUG_ON(synx_obj == NULL);
  1237. mutex_lock(&synx_obj->obj_lock);
  1238. synx_util_get_object(synx_obj);
  1239. if (synx_obj->global_idx != 0) {
  1240. *h_synx = synx_encode_handle(
  1241. synx_obj->global_idx, SYNX_CORE_APSS, true);
  1242. map_entry = synx_util_get_map_entry(*h_synx);
  1243. if (IS_ERR_OR_NULL(map_entry)) {
  1244. /* raced with release from last global client */
  1245. map_entry = synx_util_insert_to_map(synx_obj,
  1246. *h_synx, 0);
  1247. if (IS_ERR_OR_NULL(map_entry)) {
  1248. rc = PTR_ERR(map_entry);
  1249. dprintk(SYNX_ERR,
  1250. "addition of %u to map failed=%d",
  1251. *h_synx, rc);
  1252. }
  1253. }
  1254. } else {
  1255. synx_obj->map_count++;
  1256. rc = synx_alloc_global_handle(h_synx);
  1257. if (rc == SYNX_SUCCESS) {
  1258. synx_obj->global_idx =
  1259. synx_util_global_idx(*h_synx);
  1260. synx_obj->type |= SYNX_CREATE_GLOBAL_FENCE;
  1261. map_entry = synx_util_insert_to_map(synx_obj,
  1262. *h_synx, 0);
  1263. if (IS_ERR_OR_NULL(map_entry)) {
  1264. rc = PTR_ERR(map_entry);
  1265. synx_global_put_ref(
  1266. synx_util_global_idx(*h_synx));
  1267. dprintk(SYNX_ERR,
  1268. "insertion of %u to map failed=%d",
  1269. *h_synx, rc);
  1270. }
  1271. }
  1272. }
  1273. mutex_unlock(&synx_obj->obj_lock);
  1274. if (IS_ERR_OR_NULL(map_entry))
  1275. synx_util_put_object(synx_obj);
  1276. synx_util_release_map_entry(old_entry);
  1277. return map_entry;
  1278. }
  1279. static int synx_native_import_handle(struct synx_client *client,
  1280. struct synx_import_indv_params *params)
  1281. {
  1282. int rc = SYNX_SUCCESS;
  1283. u32 h_synx, core_id;
  1284. struct synx_map_entry *map_entry, *old_entry;
  1285. struct synx_coredata *synx_obj;
  1286. struct synx_handle_coredata *synx_data = NULL, *curr;
  1287. char name[SYNX_OBJ_NAME_LEN] = {0};
  1288. struct synx_create_params c_params = {0};
  1289. if (IS_ERR_OR_NULL(client) || IS_ERR_OR_NULL(params) ||
  1290. IS_ERR_OR_NULL(params->fence) ||
  1291. IS_ERR_OR_NULL(params->new_h_synx))
  1292. return -SYNX_INVALID;
  1293. h_synx = *((u32 *)params->fence);
  1294. /* check if already mapped to client */
  1295. spin_lock_bh(&client->handle_map_lock);
  1296. hash_for_each_possible(client->handle_map,
  1297. curr, node, h_synx) {
  1298. if (curr->key == h_synx &&
  1299. curr->rel_count != 0 &&
  1300. (synx_util_is_global_handle(h_synx) ||
  1301. params->flags & SYNX_IMPORT_LOCAL_FENCE)) {
  1302. curr->rel_count++;
  1303. kref_get(&curr->refcount);
  1304. synx_data = curr;
  1305. break;
  1306. }
  1307. }
  1308. spin_unlock_bh(&client->handle_map_lock);
  1309. if (synx_data) {
  1310. *params->new_h_synx = h_synx;
  1311. return SYNX_SUCCESS;
  1312. }
  1313. map_entry = synx_util_get_map_entry(h_synx);
  1314. if (IS_ERR_OR_NULL(map_entry)) {
  1315. core_id = (h_synx & SYNX_OBJ_CORE_ID_MASK)
  1316. >> SYNX_HANDLE_INDEX_BITS;
  1317. if (core_id == SYNX_CORE_APSS) {
  1318. dprintk(SYNX_ERR,
  1319. "[sess :%llu] invalid import handle %u\n",
  1320. client->id, h_synx);
  1321. return -SYNX_INVALID;
  1322. } else if (synx_util_is_global_handle(h_synx)) {
  1323. /* import global handle created in another core */
  1324. synx_util_map_import_params_to_create(params, &c_params);
  1325. scnprintf(name, SYNX_OBJ_NAME_LEN, "import-client-%d",
  1326. current->pid);
  1327. c_params.name = name;
  1328. c_params.h_synx = &h_synx;
  1329. rc = synx_native_create_core(client, &c_params);
  1330. if (rc != SYNX_SUCCESS)
  1331. return rc;
  1332. *params->new_h_synx = h_synx;
  1333. return SYNX_SUCCESS;
  1334. }
  1335. dprintk(SYNX_ERR,
  1336. "[sess :%llu] invalid handle %u\n",
  1337. client->id, h_synx);
  1338. return -SYNX_INVALID;
  1339. }
  1340. synx_obj = map_entry->synx_obj;
  1341. BUG_ON(synx_obj == NULL);
  1342. if ((params->flags & SYNX_IMPORT_GLOBAL_FENCE) &&
  1343. !synx_util_is_global_handle(h_synx)) {
  1344. old_entry = map_entry;
  1345. map_entry = synx_handle_conversion(client, &h_synx,
  1346. old_entry);
  1347. }
  1348. if (rc != SYNX_SUCCESS)
  1349. return rc;
  1350. *params->new_h_synx = h_synx;
  1351. rc = synx_util_init_handle(client, map_entry->synx_obj,
  1352. params->new_h_synx, map_entry);
  1353. if (rc != SYNX_SUCCESS) {
  1354. dprintk(SYNX_ERR,
  1355. "[sess :%llu] init of imported handle %u failed=%d\n",
  1356. client->id, h_synx, rc);
  1357. synx_util_release_map_entry(map_entry);
  1358. }
  1359. return rc;
  1360. }
  1361. static int synx_native_import_fence(struct synx_client *client,
  1362. struct synx_import_indv_params *params)
  1363. {
  1364. int rc = SYNX_SUCCESS;
  1365. u32 curr_h_synx;
  1366. u32 global;
  1367. struct synx_create_params c_params = {0};
  1368. char name[SYNX_OBJ_NAME_LEN] = {0};
  1369. struct synx_fence_entry *entry;
  1370. struct synx_map_entry *map_entry = NULL;
  1371. struct synx_handle_coredata *synx_data = NULL, *curr;
  1372. if (IS_ERR_OR_NULL(client) || IS_ERR_OR_NULL(params) ||
  1373. IS_ERR_OR_NULL(params->fence) ||
  1374. IS_ERR_OR_NULL(params->new_h_synx))
  1375. return -SYNX_INVALID;
  1376. global = SYNX_IMPORT_GLOBAL_FENCE & params->flags;
  1377. retry:
  1378. *params->new_h_synx =
  1379. synx_util_get_fence_entry((u64)params->fence, global);
  1380. if (*params->new_h_synx == 0) {
  1381. /* create a new synx obj and add to fence map */
  1382. synx_util_map_import_params_to_create(params, &c_params);
  1383. scnprintf(name, SYNX_OBJ_NAME_LEN, "import-client-%d",
  1384. current->pid);
  1385. c_params.name = name;
  1386. c_params.h_synx = params->new_h_synx;
  1387. c_params.fence = params->fence;
  1388. rc = synx_native_create_core(client, &c_params);
  1389. if (rc != SYNX_SUCCESS)
  1390. return rc;
  1391. curr_h_synx = *params->new_h_synx;
  1392. entry = kzalloc(sizeof(*entry), GFP_KERNEL);
  1393. if (IS_ERR_OR_NULL(entry)) {
  1394. rc = -SYNX_NOMEM;
  1395. curr_h_synx = *c_params.h_synx;
  1396. goto fail;
  1397. }
  1398. do {
  1399. entry->key = (u64)params->fence;
  1400. if (global)
  1401. entry->g_handle = *params->new_h_synx;
  1402. else
  1403. entry->l_handle = *params->new_h_synx;
  1404. rc = synx_util_insert_fence_entry(entry,
  1405. params->new_h_synx, global);
  1406. if (rc == SYNX_SUCCESS) {
  1407. dprintk(SYNX_DBG,
  1408. "mapped fence %pK to new handle %u\n",
  1409. params->fence, *params->new_h_synx);
  1410. break;
  1411. } else if (rc == -SYNX_ALREADY) {
  1412. /*
  1413. * release the new handle allocated
  1414. * and use the available handle
  1415. * already mapped instead.
  1416. */
  1417. map_entry = synx_util_get_map_entry(
  1418. *params->new_h_synx);
  1419. if (IS_ERR_OR_NULL(map_entry)) {
  1420. /* race with fence release, need to retry */
  1421. dprintk(SYNX_DBG,
  1422. "re-attempting handle import\n");
  1423. *params->new_h_synx = curr_h_synx;
  1424. continue;
  1425. }
  1426. rc = synx_util_init_handle(client,
  1427. map_entry->synx_obj,
  1428. params->new_h_synx, map_entry);
  1429. dprintk(SYNX_DBG, "mapped fence %pK to handle %u\n",
  1430. params->fence, *params->new_h_synx);
  1431. goto release;
  1432. } else {
  1433. dprintk(SYNX_ERR,
  1434. "importing fence %pK failed, err=%d\n",
  1435. params->fence, rc);
  1436. goto release;
  1437. }
  1438. } while (true);
  1439. } else {
  1440. /* check if already mapped to client */
  1441. spin_lock_bh(&client->handle_map_lock);
  1442. hash_for_each_possible(client->handle_map,
  1443. curr, node, *params->new_h_synx) {
  1444. if (curr->key == *params->new_h_synx &&
  1445. curr->rel_count != 0) {
  1446. curr->rel_count++;
  1447. kref_get(&curr->refcount);
  1448. synx_data = curr;
  1449. break;
  1450. }
  1451. }
  1452. spin_unlock_bh(&client->handle_map_lock);
  1453. if (synx_data) {
  1454. dprintk(SYNX_DBG, "mapped fence %pK to handle %u\n",
  1455. params->fence, *params->new_h_synx);
  1456. return SYNX_SUCCESS;
  1457. }
  1458. if (global && !synx_util_is_global_handle(
  1459. *params->new_h_synx))
  1460. map_entry = synx_handle_conversion(client,
  1461. params->new_h_synx, NULL);
  1462. else
  1463. map_entry = synx_util_get_map_entry(
  1464. *params->new_h_synx);
  1465. if (IS_ERR_OR_NULL(map_entry)) {
  1466. /* race with fence release, need to retry */
  1467. dprintk(SYNX_DBG, "re-attempting handle import\n");
  1468. goto retry;
  1469. }
  1470. rc = synx_util_init_handle(client, map_entry->synx_obj,
  1471. params->new_h_synx, map_entry);
  1472. dprintk(SYNX_DBG, "mapped fence %pK to existing handle %u\n",
  1473. params->fence, *params->new_h_synx);
  1474. }
  1475. return rc;
  1476. release:
  1477. kfree(entry);
  1478. fail:
  1479. synx_native_release_core(client, curr_h_synx);
  1480. return rc;
  1481. }
  1482. static int synx_native_import_indv(struct synx_client *client,
  1483. struct synx_import_indv_params *params)
  1484. {
  1485. int rc = -SYNX_INVALID;
  1486. if (IS_ERR_OR_NULL(params) ||
  1487. IS_ERR_OR_NULL(params->new_h_synx) ||
  1488. IS_ERR_OR_NULL(params->fence)) {
  1489. dprintk(SYNX_ERR, "invalid import arguments\n");
  1490. return -SYNX_INVALID;
  1491. }
  1492. if (likely(params->flags & SYNX_IMPORT_DMA_FENCE))
  1493. rc = synx_native_import_fence(client, params);
  1494. else if (params->flags & SYNX_IMPORT_SYNX_FENCE)
  1495. rc = synx_native_import_handle(client, params);
  1496. dprintk(SYNX_DBG,
  1497. "[sess :%llu] import of fence %pK %s, handle %u\n",
  1498. client->id, params->fence,
  1499. rc ? "failed" : "successful",
  1500. rc ? 0 : *params->new_h_synx);
  1501. return rc;
  1502. }
  1503. static int synx_native_import_arr(struct synx_client *client,
  1504. struct synx_import_arr_params *params)
  1505. {
  1506. u32 i;
  1507. int rc = SYNX_SUCCESS;
  1508. if (IS_ERR_OR_NULL(params) || params->num_fences == 0) {
  1509. dprintk(SYNX_ERR, "invalid import arr arguments\n");
  1510. return -SYNX_INVALID;
  1511. }
  1512. for (i = 0; i < params->num_fences; i++) {
  1513. rc = synx_native_import_indv(client, &params->list[i]);
  1514. if (rc != SYNX_SUCCESS) {
  1515. dprintk(SYNX_ERR,
  1516. "importing fence[%u] %pK failed=%d\n",
  1517. i, params->list[i].fence, rc);
  1518. break;
  1519. }
  1520. }
  1521. if (rc != SYNX_SUCCESS)
  1522. while (i--) {
  1523. /* release the imported handles and cleanup */
  1524. if (synx_native_release_core(client,
  1525. *params->list[i].new_h_synx) != SYNX_SUCCESS)
  1526. dprintk(SYNX_ERR,
  1527. "error cleaning up imported handle[%u] %u\n",
  1528. i, *params->list[i].new_h_synx);
  1529. }
  1530. return rc;
  1531. }
  1532. int synx_import(struct synx_session *session,
  1533. struct synx_import_params *params)
  1534. {
  1535. int rc = 0;
  1536. struct synx_client *client;
  1537. if (IS_ERR_OR_NULL(params)) {
  1538. dprintk(SYNX_ERR, "invalid import arguments\n");
  1539. return -SYNX_INVALID;
  1540. }
  1541. client = synx_get_client(session);
  1542. if (IS_ERR_OR_NULL(client))
  1543. return -SYNX_INVALID;
  1544. /* import fence based on its type */
  1545. if (params->type == SYNX_IMPORT_ARR_PARAMS)
  1546. rc = synx_native_import_arr(client, &params->arr);
  1547. else
  1548. rc = synx_native_import_indv(client, &params->indv);
  1549. synx_put_client(client);
  1550. return rc;
  1551. }
  1552. EXPORT_SYMBOL(synx_import);
  1553. static int synx_handle_create(struct synx_private_ioctl_arg *k_ioctl,
  1554. struct synx_session *session)
  1555. {
  1556. int result;
  1557. int csl_fence;
  1558. struct synx_create_v2 create_info;
  1559. struct synx_create_params params = {0};
  1560. if (k_ioctl->size != sizeof(create_info))
  1561. return -SYNX_INVALID;
  1562. if (copy_from_user(&create_info,
  1563. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1564. k_ioctl->size))
  1565. return -EFAULT;
  1566. params.h_synx = &create_info.synx_obj;
  1567. params.name = create_info.name;
  1568. params.flags = create_info.flags;
  1569. if (create_info.flags & SYNX_CREATE_CSL_FENCE) {
  1570. csl_fence = create_info.desc.id[0];
  1571. params.fence = &csl_fence;
  1572. }
  1573. result = synx_create(session, &params);
  1574. if (!result)
  1575. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1576. &create_info,
  1577. k_ioctl->size))
  1578. return -EFAULT;
  1579. return result;
  1580. }
  1581. static int synx_handle_getstatus(struct synx_private_ioctl_arg *k_ioctl,
  1582. struct synx_session *session)
  1583. {
  1584. struct synx_signal_v2 signal_info;
  1585. if (k_ioctl->size != sizeof(signal_info))
  1586. return -SYNX_INVALID;
  1587. if (copy_from_user(&signal_info,
  1588. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1589. k_ioctl->size))
  1590. return -EFAULT;
  1591. signal_info.synx_state =
  1592. synx_get_status(session, signal_info.synx_obj);
  1593. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1594. &signal_info,
  1595. k_ioctl->size))
  1596. return -EFAULT;
  1597. return SYNX_SUCCESS;
  1598. }
  1599. static int synx_handle_import(struct synx_private_ioctl_arg *k_ioctl,
  1600. struct synx_session *session)
  1601. {
  1602. struct synx_import_info import_info;
  1603. struct synx_import_params params = {0};
  1604. if (k_ioctl->size != sizeof(import_info))
  1605. return -SYNX_INVALID;
  1606. if (copy_from_user(&import_info,
  1607. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1608. k_ioctl->size))
  1609. return -EFAULT;
  1610. if (import_info.flags & SYNX_IMPORT_SYNX_FENCE)
  1611. params.indv.fence = &import_info.synx_obj;
  1612. else if (import_info.flags & SYNX_IMPORT_DMA_FENCE)
  1613. params.indv.fence =
  1614. sync_file_get_fence(import_info.desc.id[0]);
  1615. params.type = SYNX_IMPORT_INDV_PARAMS;
  1616. params.indv.flags = import_info.flags;
  1617. params.indv.new_h_synx = &import_info.new_synx_obj;
  1618. if (synx_import(session, &params))
  1619. return -SYNX_INVALID;
  1620. if (import_info.flags & SYNX_IMPORT_DMA_FENCE)
  1621. dma_fence_put(params.indv.fence);
  1622. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1623. &import_info,
  1624. k_ioctl->size))
  1625. return -EFAULT;
  1626. return SYNX_SUCCESS;
  1627. }
  1628. static int synx_handle_import_arr(
  1629. struct synx_private_ioctl_arg *k_ioctl,
  1630. struct synx_session *session)
  1631. {
  1632. int rc = -SYNX_INVALID;
  1633. u32 idx = 0;
  1634. struct synx_client *client;
  1635. struct synx_import_arr_info arr_info;
  1636. struct synx_import_info *arr;
  1637. struct synx_import_indv_params params = {0};
  1638. if (k_ioctl->size != sizeof(arr_info))
  1639. return -SYNX_INVALID;
  1640. if (copy_from_user(&arr_info,
  1641. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1642. k_ioctl->size))
  1643. return -EFAULT;
  1644. arr = kcalloc(arr_info.num_objs,
  1645. sizeof(*arr), GFP_KERNEL);
  1646. if (IS_ERR_OR_NULL(arr))
  1647. return -ENOMEM;
  1648. client = synx_get_client(session);
  1649. if (IS_ERR_OR_NULL(client)) {
  1650. rc = PTR_ERR(client);
  1651. goto clean;
  1652. }
  1653. if (copy_from_user(arr,
  1654. u64_to_user_ptr(arr_info.list),
  1655. sizeof(*arr) * arr_info.num_objs)) {
  1656. rc = -EFAULT;
  1657. goto fail;
  1658. }
  1659. while (idx < arr_info.num_objs) {
  1660. params.new_h_synx = &arr[idx].new_synx_obj;
  1661. params.flags = arr[idx].flags;
  1662. if (arr[idx].flags & SYNX_IMPORT_SYNX_FENCE)
  1663. params.fence = &arr[idx].synx_obj;
  1664. if (arr[idx].flags & SYNX_IMPORT_DMA_FENCE)
  1665. params.fence =
  1666. sync_file_get_fence(arr[idx].desc.id[0]);
  1667. rc = synx_native_import_indv(client, &params);
  1668. if (rc != SYNX_SUCCESS)
  1669. break;
  1670. idx++;
  1671. }
  1672. /* release allocated handles in case of failure */
  1673. if (rc != SYNX_SUCCESS) {
  1674. while (idx > 0)
  1675. synx_native_release_core(client,
  1676. arr[--idx].new_synx_obj);
  1677. } else {
  1678. if (copy_to_user(u64_to_user_ptr(arr_info.list),
  1679. arr,
  1680. sizeof(*arr) * arr_info.num_objs)) {
  1681. rc = -EFAULT;
  1682. goto fail;
  1683. }
  1684. }
  1685. fail:
  1686. synx_put_client(client);
  1687. clean:
  1688. kfree(arr);
  1689. return rc;
  1690. }
  1691. static int synx_handle_export(struct synx_private_ioctl_arg *k_ioctl,
  1692. struct synx_session *session)
  1693. {
  1694. return -SYNX_INVALID;
  1695. }
  1696. static int synx_handle_signal(struct synx_private_ioctl_arg *k_ioctl,
  1697. struct synx_session *session)
  1698. {
  1699. struct synx_signal_v2 signal_info;
  1700. if (k_ioctl->size != sizeof(signal_info))
  1701. return -SYNX_INVALID;
  1702. if (copy_from_user(&signal_info,
  1703. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1704. k_ioctl->size))
  1705. return -EFAULT;
  1706. return synx_signal(session, signal_info.synx_obj,
  1707. signal_info.synx_state);
  1708. }
  1709. static int synx_handle_merge(struct synx_private_ioctl_arg *k_ioctl,
  1710. struct synx_session *session)
  1711. {
  1712. u32 *h_synxs;
  1713. int result;
  1714. struct synx_merge_v2 merge_info;
  1715. struct synx_merge_params params = {0};
  1716. if (k_ioctl->size != sizeof(merge_info))
  1717. return -SYNX_INVALID;
  1718. if (copy_from_user(&merge_info,
  1719. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1720. k_ioctl->size))
  1721. return -EFAULT;
  1722. if (merge_info.num_objs >= SYNX_MAX_OBJS)
  1723. return -SYNX_INVALID;
  1724. h_synxs = kcalloc(merge_info.num_objs,
  1725. sizeof(*h_synxs), GFP_KERNEL);
  1726. if (IS_ERR_OR_NULL(h_synxs))
  1727. return -ENOMEM;
  1728. if (copy_from_user(h_synxs,
  1729. u64_to_user_ptr(merge_info.synx_objs),
  1730. sizeof(u32) * merge_info.num_objs)) {
  1731. kfree(h_synxs);
  1732. return -EFAULT;
  1733. }
  1734. params.num_objs = merge_info.num_objs;
  1735. params.h_synxs = h_synxs;
  1736. params.flags = merge_info.flags;
  1737. params.h_merged_obj = &merge_info.merged;
  1738. result = synx_merge(session, &params);
  1739. if (!result)
  1740. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1741. &merge_info,
  1742. k_ioctl->size)) {
  1743. kfree(h_synxs);
  1744. return -EFAULT;
  1745. }
  1746. kfree(h_synxs);
  1747. return result;
  1748. }
  1749. static int synx_handle_wait(struct synx_private_ioctl_arg *k_ioctl,
  1750. struct synx_session *session)
  1751. {
  1752. struct synx_wait_v2 wait_info;
  1753. if (k_ioctl->size != sizeof(wait_info))
  1754. return -SYNX_INVALID;
  1755. if (copy_from_user(&wait_info,
  1756. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1757. k_ioctl->size))
  1758. return -EFAULT;
  1759. k_ioctl->result = synx_wait(session,
  1760. wait_info.synx_obj, wait_info.timeout_ms);
  1761. return SYNX_SUCCESS;
  1762. }
  1763. static int synx_handle_async_wait(
  1764. struct synx_private_ioctl_arg *k_ioctl,
  1765. struct synx_session *session)
  1766. {
  1767. int rc = 0;
  1768. struct synx_userpayload_info_v2 user_data;
  1769. struct synx_callback_params params = {0};
  1770. if (k_ioctl->size != sizeof(user_data))
  1771. return -SYNX_INVALID;
  1772. if (copy_from_user(&user_data,
  1773. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1774. k_ioctl->size))
  1775. return -EFAULT;
  1776. params.h_synx = user_data.synx_obj;
  1777. params.cb_func = synx_util_default_user_callback;
  1778. params.userdata = (void *)user_data.payload[0];
  1779. params.timeout_ms = user_data.payload[2];
  1780. rc = synx_async_wait(session, &params);
  1781. if (rc)
  1782. dprintk(SYNX_ERR,
  1783. "user cb registration failed for handle %d\n",
  1784. user_data.synx_obj);
  1785. return rc;
  1786. }
  1787. static int synx_handle_cancel_async_wait(
  1788. struct synx_private_ioctl_arg *k_ioctl,
  1789. struct synx_session *session)
  1790. {
  1791. int rc = 0;
  1792. struct synx_userpayload_info_v2 user_data;
  1793. struct synx_callback_params params = {0};
  1794. if (k_ioctl->size != sizeof(user_data))
  1795. return -SYNX_INVALID;
  1796. if (copy_from_user(&user_data,
  1797. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1798. k_ioctl->size))
  1799. return -EFAULT;
  1800. params.h_synx = user_data.synx_obj;
  1801. params.cb_func = synx_util_default_user_callback;
  1802. params.userdata = (void *)user_data.payload[0];
  1803. rc = synx_cancel_async_wait(session, &params);
  1804. if (rc)
  1805. dprintk(SYNX_ERR,
  1806. "user cb deregistration failed for handle %d\n",
  1807. user_data.synx_obj);
  1808. return rc;
  1809. }
  1810. static int synx_handle_bind(struct synx_private_ioctl_arg *k_ioctl,
  1811. struct synx_session *session)
  1812. {
  1813. struct synx_bind_v2 synx_bind_info;
  1814. if (k_ioctl->size != sizeof(synx_bind_info))
  1815. return -SYNX_INVALID;
  1816. if (copy_from_user(&synx_bind_info,
  1817. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1818. k_ioctl->size))
  1819. return -EFAULT;
  1820. k_ioctl->result = synx_bind(session,
  1821. synx_bind_info.synx_obj,
  1822. synx_bind_info.ext_sync_desc);
  1823. return k_ioctl->result;
  1824. }
  1825. static int synx_handle_release(struct synx_private_ioctl_arg *k_ioctl,
  1826. struct synx_session *session)
  1827. {
  1828. struct synx_info release_info;
  1829. if (k_ioctl->size != sizeof(release_info))
  1830. return -SYNX_INVALID;
  1831. if (copy_from_user(&release_info,
  1832. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1833. k_ioctl->size))
  1834. return -EFAULT;
  1835. return synx_release(session, release_info.synx_obj);
  1836. }
  1837. static int synx_handle_get_fence(struct synx_private_ioctl_arg *k_ioctl,
  1838. struct synx_session *session)
  1839. {
  1840. struct synx_fence_fd fence_fd;
  1841. struct dma_fence *fence;
  1842. if (k_ioctl->size != sizeof(fence_fd))
  1843. return -SYNX_INVALID;
  1844. if (copy_from_user(&fence_fd,
  1845. u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1846. k_ioctl->size))
  1847. return -EFAULT;
  1848. fence = synx_get_fence(session, fence_fd.synx_obj);
  1849. fence_fd.fd = synx_create_sync_fd(fence);
  1850. /*
  1851. * release additional reference taken in synx_get_fence.
  1852. * additional reference ensures the fence is valid and
  1853. * does not race with handle/fence release.
  1854. */
  1855. dma_fence_put(fence);
  1856. if (copy_to_user(u64_to_user_ptr(k_ioctl->ioctl_ptr),
  1857. &fence_fd, k_ioctl->size))
  1858. return -EFAULT;
  1859. return SYNX_SUCCESS;
  1860. }
  1861. static long synx_ioctl(struct file *filep,
  1862. unsigned int cmd,
  1863. unsigned long arg)
  1864. {
  1865. s32 rc = 0;
  1866. struct synx_private_ioctl_arg k_ioctl;
  1867. struct synx_session *session = filep->private_data;
  1868. if (cmd != SYNX_PRIVATE_IOCTL_CMD) {
  1869. dprintk(SYNX_ERR, "invalid ioctl cmd\n");
  1870. return -ENOIOCTLCMD;
  1871. }
  1872. if (copy_from_user(&k_ioctl,
  1873. (struct synx_private_ioctl_arg *)arg,
  1874. sizeof(k_ioctl))) {
  1875. dprintk(SYNX_ERR, "invalid ioctl args\n");
  1876. return -EFAULT;
  1877. }
  1878. if (!k_ioctl.ioctl_ptr)
  1879. return -SYNX_INVALID;
  1880. dprintk(SYNX_VERB, "[sess :%llu] Enter cmd %u from pid %d\n",
  1881. ((struct synx_client *)session)->id,
  1882. k_ioctl.id, current->pid);
  1883. switch (k_ioctl.id) {
  1884. case SYNX_CREATE:
  1885. rc = synx_handle_create(&k_ioctl, session);
  1886. break;
  1887. case SYNX_RELEASE:
  1888. rc = synx_handle_release(&k_ioctl, session);
  1889. break;
  1890. case SYNX_REGISTER_PAYLOAD:
  1891. rc = synx_handle_async_wait(&k_ioctl,
  1892. session);
  1893. break;
  1894. case SYNX_DEREGISTER_PAYLOAD:
  1895. rc = synx_handle_cancel_async_wait(&k_ioctl,
  1896. session);
  1897. break;
  1898. case SYNX_SIGNAL:
  1899. rc = synx_handle_signal(&k_ioctl, session);
  1900. break;
  1901. case SYNX_MERGE:
  1902. rc = synx_handle_merge(&k_ioctl, session);
  1903. break;
  1904. case SYNX_WAIT:
  1905. rc = synx_handle_wait(&k_ioctl, session);
  1906. if (copy_to_user((void *)arg,
  1907. &k_ioctl,
  1908. sizeof(k_ioctl))) {
  1909. dprintk(SYNX_ERR, "invalid ioctl args\n");
  1910. rc = -EFAULT;
  1911. }
  1912. break;
  1913. case SYNX_BIND:
  1914. rc = synx_handle_bind(&k_ioctl, session);
  1915. break;
  1916. case SYNX_GETSTATUS:
  1917. rc = synx_handle_getstatus(&k_ioctl, session);
  1918. break;
  1919. case SYNX_IMPORT:
  1920. rc = synx_handle_import(&k_ioctl, session);
  1921. break;
  1922. case SYNX_IMPORT_ARR:
  1923. rc = synx_handle_import_arr(&k_ioctl, session);
  1924. break;
  1925. case SYNX_EXPORT:
  1926. rc = synx_handle_export(&k_ioctl, session);
  1927. break;
  1928. case SYNX_GETFENCE_FD:
  1929. rc = synx_handle_get_fence(&k_ioctl, session);
  1930. break;
  1931. default:
  1932. rc = -SYNX_INVALID;
  1933. }
  1934. dprintk(SYNX_VERB, "[sess :%llu] exit with status %d\n",
  1935. ((struct synx_client *)session)->id, rc);
  1936. return rc;
  1937. }
  1938. static ssize_t synx_read(struct file *filep,
  1939. char __user *buf, size_t size, loff_t *f_pos)
  1940. {
  1941. ssize_t rc = 0;
  1942. struct synx_client *client = NULL;
  1943. struct synx_client_cb *cb;
  1944. struct synx_session *session = filep->private_data;
  1945. struct synx_userpayload_info_v2 data;
  1946. if (size != sizeof(struct synx_userpayload_info_v2)) {
  1947. dprintk(SYNX_ERR, "invalid read size\n");
  1948. return -SYNX_INVALID;
  1949. }
  1950. client = synx_get_client(session);
  1951. if (IS_ERR_OR_NULL(client))
  1952. return -SYNX_INVALID;
  1953. mutex_lock(&client->event_q_lock);
  1954. cb = list_first_entry_or_null(&client->event_q,
  1955. struct synx_client_cb, node);
  1956. if (IS_ERR_OR_NULL(cb)) {
  1957. mutex_unlock(&client->event_q_lock);
  1958. rc = 0;
  1959. goto fail;
  1960. }
  1961. if (cb->idx == 0 || cb->idx >= SYNX_MAX_OBJS) {
  1962. dprintk(SYNX_ERR, "invalid index\n");
  1963. mutex_unlock(&client->event_q_lock);
  1964. rc = -SYNX_INVALID;
  1965. goto fail;
  1966. }
  1967. list_del_init(&cb->node);
  1968. mutex_unlock(&client->event_q_lock);
  1969. rc = size;
  1970. data.synx_obj = cb->kernel_cb.h_synx;
  1971. data.reserved = cb->kernel_cb.status;
  1972. data.payload[0] = (u64)cb->kernel_cb.data;
  1973. if (copy_to_user(buf,
  1974. &data,
  1975. sizeof(struct synx_userpayload_info_v2))) {
  1976. dprintk(SYNX_ERR, "couldn't copy user callback data\n");
  1977. rc = -EFAULT;
  1978. }
  1979. if (synx_util_clear_cb_entry(client, cb))
  1980. dprintk(SYNX_ERR,
  1981. "[sess :%llu] error clearing cb for handle %u\n",
  1982. client->id, data.synx_obj);
  1983. fail:
  1984. synx_put_client(client);
  1985. return rc;
  1986. }
  1987. static unsigned int synx_poll(struct file *filep,
  1988. struct poll_table_struct *poll_table)
  1989. {
  1990. int rc = 0;
  1991. struct synx_client *client;
  1992. struct synx_session *session = filep->private_data;
  1993. client = synx_get_client(session);
  1994. if (IS_ERR_OR_NULL(client)) {
  1995. dprintk(SYNX_ERR, "invalid session in poll\n");
  1996. return SYNX_SUCCESS;
  1997. }
  1998. poll_wait(filep, &client->event_wq, poll_table);
  1999. mutex_lock(&client->event_q_lock);
  2000. if (!list_empty(&client->event_q))
  2001. rc = POLLPRI;
  2002. mutex_unlock(&client->event_q_lock);
  2003. synx_put_client(client);
  2004. return rc;
  2005. }
  2006. struct synx_session *synx_initialize(
  2007. struct synx_initialization_params *params)
  2008. {
  2009. struct synx_client *client;
  2010. if (IS_ERR_OR_NULL(params))
  2011. return ERR_PTR(-SYNX_INVALID);
  2012. client = vzalloc(sizeof(*client));
  2013. if (IS_ERR_OR_NULL(client))
  2014. return ERR_PTR(-SYNX_NOMEM);
  2015. if (params->name)
  2016. strlcpy(client->name, params->name, sizeof(client->name));
  2017. client->active = true;
  2018. client->dma_context = dma_fence_context_alloc(1);
  2019. client->id = atomic64_inc_return(&synx_counter);
  2020. kref_init(&client->refcount);
  2021. spin_lock_init(&client->handle_map_lock);
  2022. mutex_init(&client->event_q_lock);
  2023. INIT_LIST_HEAD(&client->event_q);
  2024. init_waitqueue_head(&client->event_wq);
  2025. /* zero idx not allowed */
  2026. set_bit(0, client->cb_bitmap);
  2027. spin_lock_bh(&synx_dev->native->metadata_map_lock);
  2028. hash_add(synx_dev->native->client_metadata_map,
  2029. &client->node, (u64)client);
  2030. spin_unlock_bh(&synx_dev->native->metadata_map_lock);
  2031. dprintk(SYNX_INFO, "[sess :%llu] session created %s\n",
  2032. client->id, params->name);
  2033. return (struct synx_session *)client;
  2034. }
  2035. EXPORT_SYMBOL(synx_initialize);
  2036. int synx_uninitialize(struct synx_session *session)
  2037. {
  2038. struct synx_client *client = NULL, *curr;
  2039. spin_lock_bh(&synx_dev->native->metadata_map_lock);
  2040. hash_for_each_possible(synx_dev->native->client_metadata_map,
  2041. curr, node, (u64)session) {
  2042. if (curr == (struct synx_client *)session) {
  2043. if (curr->active) {
  2044. curr->active = false;
  2045. client = curr;
  2046. }
  2047. break;
  2048. }
  2049. }
  2050. spin_unlock_bh(&synx_dev->native->metadata_map_lock);
  2051. /* release the reference obtained at synx init */
  2052. synx_put_client(client);
  2053. return SYNX_SUCCESS;
  2054. }
  2055. EXPORT_SYMBOL(synx_uninitialize);
  2056. static int synx_open(struct inode *inode, struct file *filep)
  2057. {
  2058. int rc = 0;
  2059. char name[SYNX_OBJ_NAME_LEN];
  2060. struct synx_initialization_params params = {0};
  2061. dprintk(SYNX_VERB, "Enter pid: %d\n", current->pid);
  2062. scnprintf(name, SYNX_OBJ_NAME_LEN, "umd-client-%d", current->pid);
  2063. params.name = name;
  2064. params.id = SYNX_CLIENT_NATIVE;
  2065. filep->private_data = synx_initialize(&params);
  2066. if (IS_ERR_OR_NULL(filep->private_data)) {
  2067. dprintk(SYNX_ERR, "session allocation failed for pid: %d\n",
  2068. current->pid);
  2069. rc = PTR_ERR(filep->private_data);
  2070. } else {
  2071. dprintk(SYNX_VERB, "allocated new session for pid: %d\n",
  2072. current->pid);
  2073. }
  2074. return rc;
  2075. }
  2076. static int synx_close(struct inode *inode, struct file *filep)
  2077. {
  2078. struct synx_session *session = filep->private_data;
  2079. return synx_uninitialize(session);
  2080. }
  2081. static const struct file_operations synx_fops = {
  2082. .owner = THIS_MODULE,
  2083. .open = synx_open,
  2084. .read = synx_read,
  2085. .release = synx_close,
  2086. .poll = synx_poll,
  2087. .unlocked_ioctl = synx_ioctl,
  2088. #ifdef CONFIG_COMPAT
  2089. .compat_ioctl = synx_ioctl,
  2090. #endif
  2091. };
  2092. int synx_register_ops(
  2093. const struct synx_register_params *params)
  2094. {
  2095. s32 rc = 0;
  2096. struct synx_registered_ops *client_ops;
  2097. if (!synx_dev || !params || !params->name ||
  2098. !synx_util_is_valid_bind_type(params->type) ||
  2099. !params->ops.register_callback ||
  2100. !params->ops.deregister_callback ||
  2101. !params->ops.signal) {
  2102. dprintk(SYNX_ERR, "invalid register params\n");
  2103. return -SYNX_INVALID;
  2104. }
  2105. mutex_lock(&synx_dev->vtbl_lock);
  2106. client_ops = &synx_dev->bind_vtbl[params->type];
  2107. if (!client_ops->valid) {
  2108. client_ops->valid = true;
  2109. memcpy(&client_ops->ops, &params->ops,
  2110. sizeof(client_ops->ops));
  2111. strlcpy(client_ops->name, params->name,
  2112. sizeof(client_ops->name));
  2113. client_ops->type = params->type;
  2114. dprintk(SYNX_INFO,
  2115. "registered bind ops type %u for %s\n",
  2116. params->type, params->name);
  2117. } else {
  2118. dprintk(SYNX_WARN,
  2119. "client already registered for type %u by %s\n",
  2120. client_ops->type, client_ops->name);
  2121. rc = -SYNX_ALREADY;
  2122. }
  2123. mutex_unlock(&synx_dev->vtbl_lock);
  2124. return rc;
  2125. }
  2126. EXPORT_SYMBOL(synx_register_ops);
  2127. int synx_deregister_ops(
  2128. const struct synx_register_params *params)
  2129. {
  2130. struct synx_registered_ops *client_ops;
  2131. if (IS_ERR_OR_NULL(params) || params->name ||
  2132. !synx_util_is_valid_bind_type(params->type)) {
  2133. dprintk(SYNX_ERR, "invalid params\n");
  2134. return -SYNX_INVALID;
  2135. }
  2136. mutex_lock(&synx_dev->vtbl_lock);
  2137. client_ops = &synx_dev->bind_vtbl[params->type];
  2138. memset(client_ops, 0, sizeof(*client_ops));
  2139. dprintk(SYNX_INFO, "deregistered bind ops for %s\n",
  2140. params->name);
  2141. mutex_unlock(&synx_dev->vtbl_lock);
  2142. return SYNX_SUCCESS;
  2143. }
  2144. EXPORT_SYMBOL(synx_deregister_ops);
  2145. void synx_ipc_handler(struct work_struct *cb_dispatch)
  2146. {
  2147. struct synx_signal_cb *signal_cb =
  2148. container_of(cb_dispatch, struct synx_signal_cb, cb_dispatch);
  2149. struct synx_map_entry *map_entry;
  2150. map_entry = synx_util_get_map_entry(signal_cb->handle);
  2151. if (IS_ERR_OR_NULL(map_entry)) {
  2152. dprintk(SYNX_WARN,
  2153. "no clients to notify for %u\n",
  2154. signal_cb->handle);
  2155. dprintk(SYNX_MEM, "signal cb destroyed %pK\n", signal_cb);
  2156. kfree(signal_cb);
  2157. return;
  2158. }
  2159. /* get reference on synx coredata for signal cb */
  2160. synx_util_get_object(map_entry->synx_obj);
  2161. signal_cb->synx_obj = map_entry->synx_obj;
  2162. synx_util_release_map_entry(map_entry);
  2163. synx_signal_handler(&signal_cb->cb_dispatch);
  2164. }
  2165. int synx_ipc_callback(u32 client_id,
  2166. s64 data, void *priv)
  2167. {
  2168. struct synx_signal_cb *signal_cb;
  2169. u32 status = (u32)data;
  2170. u32 handle = (u32)(data >> 32);
  2171. signal_cb = kzalloc(sizeof(*signal_cb), GFP_ATOMIC);
  2172. if (IS_ERR_OR_NULL(signal_cb))
  2173. return -SYNX_NOMEM;
  2174. dprintk(SYNX_DBG,
  2175. "signal notification for %u received with status %u\n",
  2176. handle, status);
  2177. signal_cb->status = status;
  2178. signal_cb->handle = handle;
  2179. signal_cb->flag = SYNX_SIGNAL_FROM_IPC;
  2180. INIT_WORK(&signal_cb->cb_dispatch, synx_ipc_handler);
  2181. queue_work(synx_dev->wq_cb, &signal_cb->cb_dispatch);
  2182. return SYNX_SUCCESS;
  2183. }
  2184. EXPORT_SYMBOL(synx_ipc_callback);
  2185. int synx_recover(enum synx_client_id id)
  2186. {
  2187. u32 core_id;
  2188. core_id = synx_util_map_client_id_to_core(id);
  2189. if (core_id >= SYNX_CORE_MAX) {
  2190. dprintk(SYNX_ERR, "invalid client id %u\n", id);
  2191. return -SYNX_INVALID;
  2192. }
  2193. switch (core_id) {
  2194. case SYNX_CORE_EVA:
  2195. case SYNX_CORE_IRIS:
  2196. case SYNX_CORE_ICP:
  2197. break;
  2198. default:
  2199. dprintk(SYNX_ERR, "recovery not supported on %u\n", id);
  2200. return -SYNX_NOSUPPORT;
  2201. }
  2202. return synx_global_recover(core_id);
  2203. }
  2204. EXPORT_SYMBOL(synx_recover);
  2205. static int synx_local_mem_init(void)
  2206. {
  2207. if (!synx_dev->native)
  2208. return -SYNX_INVALID;
  2209. hash_init(synx_dev->native->client_metadata_map);
  2210. hash_init(synx_dev->native->fence_map);
  2211. hash_init(synx_dev->native->global_map);
  2212. hash_init(synx_dev->native->local_map);
  2213. hash_init(synx_dev->native->csl_fence_map);
  2214. spin_lock_init(&synx_dev->native->metadata_map_lock);
  2215. spin_lock_init(&synx_dev->native->fence_map_lock);
  2216. spin_lock_init(&synx_dev->native->global_map_lock);
  2217. spin_lock_init(&synx_dev->native->local_map_lock);
  2218. spin_lock_init(&synx_dev->native->csl_map_lock);
  2219. /* zero idx not allowed */
  2220. set_bit(0, synx_dev->native->bitmap);
  2221. return 0;
  2222. }
  2223. static int synx_cdsp_restart_notifier(struct notifier_block *nb,
  2224. unsigned long code, void *data)
  2225. {
  2226. struct synx_cdsp_ssr *cdsp_ssr = &synx_dev->cdsp_ssr;
  2227. if (&cdsp_ssr->nb != nb) {
  2228. dprintk(SYNX_ERR, "Invalid SSR Notifier block\n");
  2229. return NOTIFY_BAD;
  2230. }
  2231. switch (code) {
  2232. case QCOM_SSR_BEFORE_SHUTDOWN:
  2233. break;
  2234. case QCOM_SSR_AFTER_SHUTDOWN:
  2235. if (cdsp_ssr->ssrcnt != 0) {
  2236. dprintk(SYNX_INFO, "Cleaning up global memory\n");
  2237. synx_global_recover(SYNX_CORE_NSP);
  2238. }
  2239. break;
  2240. case QCOM_SSR_BEFORE_POWERUP:
  2241. break;
  2242. case QCOM_SSR_AFTER_POWERUP:
  2243. dprintk(SYNX_DBG, "CDSP is up");
  2244. if (cdsp_ssr->ssrcnt == 0)
  2245. cdsp_ssr->ssrcnt++;
  2246. break;
  2247. default:
  2248. dprintk(SYNX_ERR, "Unknown status code for CDSP SSR\n");
  2249. break;
  2250. }
  2251. return NOTIFY_DONE;
  2252. }
  2253. static int __init synx_init(void)
  2254. {
  2255. int rc;
  2256. dprintk(SYNX_INFO, "device initialization start\n");
  2257. synx_dev = kzalloc(sizeof(*synx_dev), GFP_KERNEL);
  2258. if (IS_ERR_OR_NULL(synx_dev))
  2259. return -SYNX_NOMEM;
  2260. rc = alloc_chrdev_region(&synx_dev->dev, 0, 1, SYNX_DEVICE_NAME);
  2261. if (rc < 0) {
  2262. dprintk(SYNX_ERR, "region allocation failed\n");
  2263. goto alloc_fail;
  2264. }
  2265. cdev_init(&synx_dev->cdev, &synx_fops);
  2266. synx_dev->cdev.owner = THIS_MODULE;
  2267. rc = cdev_add(&synx_dev->cdev, synx_dev->dev, 1);
  2268. if (rc < 0) {
  2269. dprintk(SYNX_ERR, "device registation failed\n");
  2270. goto reg_fail;
  2271. }
  2272. synx_dev->class = class_create(THIS_MODULE, SYNX_DEVICE_NAME);
  2273. device_create(synx_dev->class, NULL, synx_dev->dev,
  2274. NULL, SYNX_DEVICE_NAME);
  2275. synx_dev->wq_cb = alloc_workqueue(SYNX_WQ_CB_NAME,
  2276. WQ_HIGHPRI | WQ_UNBOUND, SYNX_WQ_CB_THREADS);
  2277. synx_dev->wq_cleanup = alloc_workqueue(SYNX_WQ_CLEANUP_NAME,
  2278. WQ_HIGHPRI | WQ_UNBOUND, SYNX_WQ_CLEANUP_THREADS);
  2279. if (!synx_dev->wq_cb || !synx_dev->wq_cleanup) {
  2280. dprintk(SYNX_ERR,
  2281. "high priority work queue creation failed\n");
  2282. rc = -SYNX_INVALID;
  2283. goto fail;
  2284. }
  2285. synx_dev->native = vzalloc(sizeof(*synx_dev->native));
  2286. if (IS_ERR_OR_NULL(synx_dev->native))
  2287. goto fail;
  2288. mutex_init(&synx_dev->vtbl_lock);
  2289. mutex_init(&synx_dev->error_lock);
  2290. INIT_LIST_HEAD(&synx_dev->error_list);
  2291. synx_dev->debugfs_root = synx_init_debugfs_dir(synx_dev);
  2292. rc = synx_global_mem_init();
  2293. if (rc) {
  2294. dprintk(SYNX_ERR, "shared mem init failed, err=%d\n", rc);
  2295. goto err;
  2296. }
  2297. synx_dev->cdsp_ssr.ssrcnt = 0;
  2298. synx_dev->cdsp_ssr.nb.notifier_call = synx_cdsp_restart_notifier;
  2299. synx_dev->cdsp_ssr.handle =
  2300. qcom_register_ssr_notifier("cdsp", &synx_dev->cdsp_ssr.nb);
  2301. if (synx_dev->cdsp_ssr.handle == NULL) {
  2302. dprintk(SYNX_ERR, "SSR registration failed\n");
  2303. goto err;
  2304. }
  2305. ipclite_register_client(synx_ipc_callback, NULL);
  2306. synx_local_mem_init();
  2307. dprintk(SYNX_INFO, "device initialization success\n");
  2308. return 0;
  2309. err:
  2310. vfree(synx_dev->native);
  2311. fail:
  2312. device_destroy(synx_dev->class, synx_dev->dev);
  2313. class_destroy(synx_dev->class);
  2314. reg_fail:
  2315. unregister_chrdev_region(synx_dev->dev, 1);
  2316. alloc_fail:
  2317. kfree(synx_dev);
  2318. synx_dev = NULL;
  2319. return rc;
  2320. }
  2321. static void __exit synx_exit(void)
  2322. {
  2323. struct error_node *err_node, *err_node_tmp;
  2324. flush_workqueue(synx_dev->wq_cb);
  2325. flush_workqueue(synx_dev->wq_cleanup);
  2326. device_destroy(synx_dev->class, synx_dev->dev);
  2327. class_destroy(synx_dev->class);
  2328. cdev_del(&synx_dev->cdev);
  2329. unregister_chrdev_region(synx_dev->dev, 1);
  2330. synx_remove_debugfs_dir(synx_dev);
  2331. /* release uncleared error nodes */
  2332. list_for_each_entry_safe(
  2333. err_node, err_node_tmp,
  2334. &synx_dev->error_list,
  2335. node) {
  2336. list_del(&err_node->node);
  2337. kfree(err_node);
  2338. }
  2339. mutex_destroy(&synx_dev->vtbl_lock);
  2340. mutex_destroy(&synx_dev->error_lock);
  2341. vfree(synx_dev->native);
  2342. kfree(synx_dev);
  2343. }
  2344. module_init(synx_init);
  2345. module_exit(synx_exit);
  2346. MODULE_DESCRIPTION("Global Synx Driver");
  2347. MODULE_LICENSE("GPL v2");