18c2ecf20Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
28c2ecf20Sopenharmony_ci#include <linux/compat.h>
38c2ecf20Sopenharmony_ci#include <linux/dma-mapping.h>
48c2ecf20Sopenharmony_ci#include <linux/iommu.h>
58c2ecf20Sopenharmony_ci#include <linux/module.h>
68c2ecf20Sopenharmony_ci#include <linux/poll.h>
78c2ecf20Sopenharmony_ci#include <linux/slab.h>
88c2ecf20Sopenharmony_ci#include <linux/uacce.h>
98c2ecf20Sopenharmony_ci
108c2ecf20Sopenharmony_cistatic struct class *uacce_class;
118c2ecf20Sopenharmony_cistatic dev_t uacce_devt;
128c2ecf20Sopenharmony_cistatic DEFINE_XARRAY_ALLOC(uacce_xa);
138c2ecf20Sopenharmony_ci
148c2ecf20Sopenharmony_ci/*
158c2ecf20Sopenharmony_ci * If the parent driver or the device disappears, the queue state is invalid and
168c2ecf20Sopenharmony_ci * ops are not usable anymore.
178c2ecf20Sopenharmony_ci */
188c2ecf20Sopenharmony_cistatic bool uacce_queue_is_valid(struct uacce_queue *q)
198c2ecf20Sopenharmony_ci{
208c2ecf20Sopenharmony_ci	return q->state == UACCE_Q_INIT || q->state == UACCE_Q_STARTED;
218c2ecf20Sopenharmony_ci}
228c2ecf20Sopenharmony_ci
238c2ecf20Sopenharmony_cistatic int uacce_start_queue(struct uacce_queue *q)
248c2ecf20Sopenharmony_ci{
258c2ecf20Sopenharmony_ci	int ret;
268c2ecf20Sopenharmony_ci
278c2ecf20Sopenharmony_ci	if (q->state != UACCE_Q_INIT)
288c2ecf20Sopenharmony_ci		return -EINVAL;
298c2ecf20Sopenharmony_ci
308c2ecf20Sopenharmony_ci	if (q->uacce->ops->start_queue) {
318c2ecf20Sopenharmony_ci		ret = q->uacce->ops->start_queue(q);
328c2ecf20Sopenharmony_ci		if (ret < 0)
338c2ecf20Sopenharmony_ci			return ret;
348c2ecf20Sopenharmony_ci	}
358c2ecf20Sopenharmony_ci
368c2ecf20Sopenharmony_ci	q->state = UACCE_Q_STARTED;
378c2ecf20Sopenharmony_ci	return 0;
388c2ecf20Sopenharmony_ci}
398c2ecf20Sopenharmony_ci
408c2ecf20Sopenharmony_cistatic int uacce_put_queue(struct uacce_queue *q)
418c2ecf20Sopenharmony_ci{
428c2ecf20Sopenharmony_ci	struct uacce_device *uacce = q->uacce;
438c2ecf20Sopenharmony_ci
448c2ecf20Sopenharmony_ci	if ((q->state == UACCE_Q_STARTED) && uacce->ops->stop_queue)
458c2ecf20Sopenharmony_ci		uacce->ops->stop_queue(q);
468c2ecf20Sopenharmony_ci
478c2ecf20Sopenharmony_ci	if ((q->state == UACCE_Q_INIT || q->state == UACCE_Q_STARTED) &&
488c2ecf20Sopenharmony_ci	     uacce->ops->put_queue)
498c2ecf20Sopenharmony_ci		uacce->ops->put_queue(q);
508c2ecf20Sopenharmony_ci
518c2ecf20Sopenharmony_ci	q->state = UACCE_Q_ZOMBIE;
528c2ecf20Sopenharmony_ci
538c2ecf20Sopenharmony_ci	return 0;
548c2ecf20Sopenharmony_ci}
558c2ecf20Sopenharmony_ci
568c2ecf20Sopenharmony_cistatic long uacce_fops_unl_ioctl(struct file *filep,
578c2ecf20Sopenharmony_ci				 unsigned int cmd, unsigned long arg)
588c2ecf20Sopenharmony_ci{
598c2ecf20Sopenharmony_ci	struct uacce_queue *q = filep->private_data;
608c2ecf20Sopenharmony_ci	struct uacce_device *uacce = q->uacce;
618c2ecf20Sopenharmony_ci	long ret = -ENXIO;
628c2ecf20Sopenharmony_ci
638c2ecf20Sopenharmony_ci	/*
648c2ecf20Sopenharmony_ci	 * uacce->ops->ioctl() may take the mmap_lock when copying arg to/from
658c2ecf20Sopenharmony_ci	 * user. Avoid a circular lock dependency with uacce_fops_mmap(), which
668c2ecf20Sopenharmony_ci	 * gets called with mmap_lock held, by taking uacce->mutex instead of
678c2ecf20Sopenharmony_ci	 * q->mutex. Doing this in uacce_fops_mmap() is not possible because
688c2ecf20Sopenharmony_ci	 * uacce_fops_open() calls iommu_sva_bind_device(), which takes
698c2ecf20Sopenharmony_ci	 * mmap_lock, while holding uacce->mutex.
708c2ecf20Sopenharmony_ci	 */
718c2ecf20Sopenharmony_ci	mutex_lock(&uacce->mutex);
728c2ecf20Sopenharmony_ci	if (!uacce_queue_is_valid(q))
738c2ecf20Sopenharmony_ci		goto out_unlock;
748c2ecf20Sopenharmony_ci
758c2ecf20Sopenharmony_ci	switch (cmd) {
768c2ecf20Sopenharmony_ci	case UACCE_CMD_START_Q:
778c2ecf20Sopenharmony_ci		ret = uacce_start_queue(q);
788c2ecf20Sopenharmony_ci		break;
798c2ecf20Sopenharmony_ci	case UACCE_CMD_PUT_Q:
808c2ecf20Sopenharmony_ci		ret = uacce_put_queue(q);
818c2ecf20Sopenharmony_ci		break;
828c2ecf20Sopenharmony_ci	default:
838c2ecf20Sopenharmony_ci		if (uacce->ops->ioctl)
848c2ecf20Sopenharmony_ci			ret = uacce->ops->ioctl(q, cmd, arg);
858c2ecf20Sopenharmony_ci		else
868c2ecf20Sopenharmony_ci			ret = -EINVAL;
878c2ecf20Sopenharmony_ci	}
888c2ecf20Sopenharmony_ciout_unlock:
898c2ecf20Sopenharmony_ci	mutex_unlock(&uacce->mutex);
908c2ecf20Sopenharmony_ci	return ret;
918c2ecf20Sopenharmony_ci}
928c2ecf20Sopenharmony_ci
938c2ecf20Sopenharmony_ci#ifdef CONFIG_COMPAT
948c2ecf20Sopenharmony_cistatic long uacce_fops_compat_ioctl(struct file *filep,
958c2ecf20Sopenharmony_ci				   unsigned int cmd, unsigned long arg)
968c2ecf20Sopenharmony_ci{
978c2ecf20Sopenharmony_ci	arg = (unsigned long)compat_ptr(arg);
988c2ecf20Sopenharmony_ci
998c2ecf20Sopenharmony_ci	return uacce_fops_unl_ioctl(filep, cmd, arg);
1008c2ecf20Sopenharmony_ci}
1018c2ecf20Sopenharmony_ci#endif
1028c2ecf20Sopenharmony_ci
1038c2ecf20Sopenharmony_cistatic int uacce_bind_queue(struct uacce_device *uacce, struct uacce_queue *q)
1048c2ecf20Sopenharmony_ci{
1058c2ecf20Sopenharmony_ci	u32 pasid;
1068c2ecf20Sopenharmony_ci	struct iommu_sva *handle;
1078c2ecf20Sopenharmony_ci
1088c2ecf20Sopenharmony_ci	if (!(uacce->flags & UACCE_DEV_SVA))
1098c2ecf20Sopenharmony_ci		return 0;
1108c2ecf20Sopenharmony_ci
1118c2ecf20Sopenharmony_ci	handle = iommu_sva_bind_device(uacce->parent, current->mm, NULL);
1128c2ecf20Sopenharmony_ci	if (IS_ERR(handle))
1138c2ecf20Sopenharmony_ci		return PTR_ERR(handle);
1148c2ecf20Sopenharmony_ci
1158c2ecf20Sopenharmony_ci	pasid = iommu_sva_get_pasid(handle);
1168c2ecf20Sopenharmony_ci	if (pasid == IOMMU_PASID_INVALID) {
1178c2ecf20Sopenharmony_ci		iommu_sva_unbind_device(handle);
1188c2ecf20Sopenharmony_ci		return -ENODEV;
1198c2ecf20Sopenharmony_ci	}
1208c2ecf20Sopenharmony_ci
1218c2ecf20Sopenharmony_ci	q->handle = handle;
1228c2ecf20Sopenharmony_ci	q->pasid = pasid;
1238c2ecf20Sopenharmony_ci	return 0;
1248c2ecf20Sopenharmony_ci}
1258c2ecf20Sopenharmony_ci
1268c2ecf20Sopenharmony_cistatic void uacce_unbind_queue(struct uacce_queue *q)
1278c2ecf20Sopenharmony_ci{
1288c2ecf20Sopenharmony_ci	if (!q->handle)
1298c2ecf20Sopenharmony_ci		return;
1308c2ecf20Sopenharmony_ci	iommu_sva_unbind_device(q->handle);
1318c2ecf20Sopenharmony_ci	q->handle = NULL;
1328c2ecf20Sopenharmony_ci}
1338c2ecf20Sopenharmony_ci
1348c2ecf20Sopenharmony_cistatic int uacce_fops_open(struct inode *inode, struct file *filep)
1358c2ecf20Sopenharmony_ci{
1368c2ecf20Sopenharmony_ci	struct uacce_device *uacce;
1378c2ecf20Sopenharmony_ci	struct uacce_queue *q;
1388c2ecf20Sopenharmony_ci	int ret = 0;
1398c2ecf20Sopenharmony_ci
1408c2ecf20Sopenharmony_ci	uacce = xa_load(&uacce_xa, iminor(inode));
1418c2ecf20Sopenharmony_ci	if (!uacce)
1428c2ecf20Sopenharmony_ci		return -ENODEV;
1438c2ecf20Sopenharmony_ci
1448c2ecf20Sopenharmony_ci	q = kzalloc(sizeof(struct uacce_queue), GFP_KERNEL);
1458c2ecf20Sopenharmony_ci	if (!q)
1468c2ecf20Sopenharmony_ci		return -ENOMEM;
1478c2ecf20Sopenharmony_ci
1488c2ecf20Sopenharmony_ci	mutex_lock(&uacce->mutex);
1498c2ecf20Sopenharmony_ci
1508c2ecf20Sopenharmony_ci	if (!uacce->parent) {
1518c2ecf20Sopenharmony_ci		ret = -EINVAL;
1528c2ecf20Sopenharmony_ci		goto out_with_mem;
1538c2ecf20Sopenharmony_ci	}
1548c2ecf20Sopenharmony_ci
1558c2ecf20Sopenharmony_ci	ret = uacce_bind_queue(uacce, q);
1568c2ecf20Sopenharmony_ci	if (ret)
1578c2ecf20Sopenharmony_ci		goto out_with_mem;
1588c2ecf20Sopenharmony_ci
1598c2ecf20Sopenharmony_ci	q->uacce = uacce;
1608c2ecf20Sopenharmony_ci
1618c2ecf20Sopenharmony_ci	if (uacce->ops->get_queue) {
1628c2ecf20Sopenharmony_ci		ret = uacce->ops->get_queue(uacce, q->pasid, q);
1638c2ecf20Sopenharmony_ci		if (ret < 0)
1648c2ecf20Sopenharmony_ci			goto out_with_bond;
1658c2ecf20Sopenharmony_ci	}
1668c2ecf20Sopenharmony_ci
1678c2ecf20Sopenharmony_ci	init_waitqueue_head(&q->wait);
1688c2ecf20Sopenharmony_ci	filep->private_data = q;
1698c2ecf20Sopenharmony_ci	uacce->inode = inode;
1708c2ecf20Sopenharmony_ci	q->state = UACCE_Q_INIT;
1718c2ecf20Sopenharmony_ci	mutex_init(&q->mutex);
1728c2ecf20Sopenharmony_ci	list_add(&q->list, &uacce->queues);
1738c2ecf20Sopenharmony_ci	mutex_unlock(&uacce->mutex);
1748c2ecf20Sopenharmony_ci
1758c2ecf20Sopenharmony_ci	return 0;
1768c2ecf20Sopenharmony_ci
1778c2ecf20Sopenharmony_ciout_with_bond:
1788c2ecf20Sopenharmony_ci	uacce_unbind_queue(q);
1798c2ecf20Sopenharmony_ciout_with_mem:
1808c2ecf20Sopenharmony_ci	kfree(q);
1818c2ecf20Sopenharmony_ci	mutex_unlock(&uacce->mutex);
1828c2ecf20Sopenharmony_ci	return ret;
1838c2ecf20Sopenharmony_ci}
1848c2ecf20Sopenharmony_ci
1858c2ecf20Sopenharmony_cistatic int uacce_fops_release(struct inode *inode, struct file *filep)
1868c2ecf20Sopenharmony_ci{
1878c2ecf20Sopenharmony_ci	struct uacce_queue *q = filep->private_data;
1888c2ecf20Sopenharmony_ci	struct uacce_device *uacce = q->uacce;
1898c2ecf20Sopenharmony_ci
1908c2ecf20Sopenharmony_ci	mutex_lock(&uacce->mutex);
1918c2ecf20Sopenharmony_ci	uacce_put_queue(q);
1928c2ecf20Sopenharmony_ci	uacce_unbind_queue(q);
1938c2ecf20Sopenharmony_ci	list_del(&q->list);
1948c2ecf20Sopenharmony_ci	mutex_unlock(&uacce->mutex);
1958c2ecf20Sopenharmony_ci	kfree(q);
1968c2ecf20Sopenharmony_ci
1978c2ecf20Sopenharmony_ci	return 0;
1988c2ecf20Sopenharmony_ci}
1998c2ecf20Sopenharmony_ci
2008c2ecf20Sopenharmony_cistatic void uacce_vma_close(struct vm_area_struct *vma)
2018c2ecf20Sopenharmony_ci{
2028c2ecf20Sopenharmony_ci	struct uacce_queue *q = vma->vm_private_data;
2038c2ecf20Sopenharmony_ci	struct uacce_qfile_region *qfr = NULL;
2048c2ecf20Sopenharmony_ci
2058c2ecf20Sopenharmony_ci	if (vma->vm_pgoff < UACCE_MAX_REGION)
2068c2ecf20Sopenharmony_ci		qfr = q->qfrs[vma->vm_pgoff];
2078c2ecf20Sopenharmony_ci
2088c2ecf20Sopenharmony_ci	kfree(qfr);
2098c2ecf20Sopenharmony_ci}
2108c2ecf20Sopenharmony_ci
2118c2ecf20Sopenharmony_cistatic const struct vm_operations_struct uacce_vm_ops = {
2128c2ecf20Sopenharmony_ci	.close = uacce_vma_close,
2138c2ecf20Sopenharmony_ci};
2148c2ecf20Sopenharmony_ci
2158c2ecf20Sopenharmony_cistatic int uacce_fops_mmap(struct file *filep, struct vm_area_struct *vma)
2168c2ecf20Sopenharmony_ci{
2178c2ecf20Sopenharmony_ci	struct uacce_queue *q = filep->private_data;
2188c2ecf20Sopenharmony_ci	struct uacce_device *uacce = q->uacce;
2198c2ecf20Sopenharmony_ci	struct uacce_qfile_region *qfr;
2208c2ecf20Sopenharmony_ci	enum uacce_qfrt type = UACCE_MAX_REGION;
2218c2ecf20Sopenharmony_ci	int ret = 0;
2228c2ecf20Sopenharmony_ci
2238c2ecf20Sopenharmony_ci	if (vma->vm_pgoff < UACCE_MAX_REGION)
2248c2ecf20Sopenharmony_ci		type = vma->vm_pgoff;
2258c2ecf20Sopenharmony_ci	else
2268c2ecf20Sopenharmony_ci		return -EINVAL;
2278c2ecf20Sopenharmony_ci
2288c2ecf20Sopenharmony_ci	qfr = kzalloc(sizeof(*qfr), GFP_KERNEL);
2298c2ecf20Sopenharmony_ci	if (!qfr)
2308c2ecf20Sopenharmony_ci		return -ENOMEM;
2318c2ecf20Sopenharmony_ci
2328c2ecf20Sopenharmony_ci	vma->vm_flags |= VM_DONTCOPY | VM_DONTEXPAND | VM_WIPEONFORK;
2338c2ecf20Sopenharmony_ci	vma->vm_ops = &uacce_vm_ops;
2348c2ecf20Sopenharmony_ci	vma->vm_private_data = q;
2358c2ecf20Sopenharmony_ci	qfr->type = type;
2368c2ecf20Sopenharmony_ci
2378c2ecf20Sopenharmony_ci	mutex_lock(&q->mutex);
2388c2ecf20Sopenharmony_ci	if (!uacce_queue_is_valid(q)) {
2398c2ecf20Sopenharmony_ci		ret = -ENXIO;
2408c2ecf20Sopenharmony_ci		goto out_with_lock;
2418c2ecf20Sopenharmony_ci	}
2428c2ecf20Sopenharmony_ci
2438c2ecf20Sopenharmony_ci	if (q->qfrs[type]) {
2448c2ecf20Sopenharmony_ci		ret = -EEXIST;
2458c2ecf20Sopenharmony_ci		goto out_with_lock;
2468c2ecf20Sopenharmony_ci	}
2478c2ecf20Sopenharmony_ci
2488c2ecf20Sopenharmony_ci	switch (type) {
2498c2ecf20Sopenharmony_ci	case UACCE_QFRT_MMIO:
2508c2ecf20Sopenharmony_ci		if (!uacce->ops->mmap) {
2518c2ecf20Sopenharmony_ci			ret = -EINVAL;
2528c2ecf20Sopenharmony_ci			goto out_with_lock;
2538c2ecf20Sopenharmony_ci		}
2548c2ecf20Sopenharmony_ci
2558c2ecf20Sopenharmony_ci		ret = uacce->ops->mmap(q, vma, qfr);
2568c2ecf20Sopenharmony_ci		if (ret)
2578c2ecf20Sopenharmony_ci			goto out_with_lock;
2588c2ecf20Sopenharmony_ci
2598c2ecf20Sopenharmony_ci		break;
2608c2ecf20Sopenharmony_ci
2618c2ecf20Sopenharmony_ci	case UACCE_QFRT_DUS:
2628c2ecf20Sopenharmony_ci		if (!uacce->ops->mmap) {
2638c2ecf20Sopenharmony_ci			ret = -EINVAL;
2648c2ecf20Sopenharmony_ci			goto out_with_lock;
2658c2ecf20Sopenharmony_ci		}
2668c2ecf20Sopenharmony_ci
2678c2ecf20Sopenharmony_ci		ret = uacce->ops->mmap(q, vma, qfr);
2688c2ecf20Sopenharmony_ci		if (ret)
2698c2ecf20Sopenharmony_ci			goto out_with_lock;
2708c2ecf20Sopenharmony_ci		break;
2718c2ecf20Sopenharmony_ci
2728c2ecf20Sopenharmony_ci	default:
2738c2ecf20Sopenharmony_ci		ret = -EINVAL;
2748c2ecf20Sopenharmony_ci		goto out_with_lock;
2758c2ecf20Sopenharmony_ci	}
2768c2ecf20Sopenharmony_ci
2778c2ecf20Sopenharmony_ci	q->qfrs[type] = qfr;
2788c2ecf20Sopenharmony_ci	mutex_unlock(&q->mutex);
2798c2ecf20Sopenharmony_ci
2808c2ecf20Sopenharmony_ci	return ret;
2818c2ecf20Sopenharmony_ci
2828c2ecf20Sopenharmony_ciout_with_lock:
2838c2ecf20Sopenharmony_ci	mutex_unlock(&q->mutex);
2848c2ecf20Sopenharmony_ci	kfree(qfr);
2858c2ecf20Sopenharmony_ci	return ret;
2868c2ecf20Sopenharmony_ci}
2878c2ecf20Sopenharmony_ci
2888c2ecf20Sopenharmony_cistatic __poll_t uacce_fops_poll(struct file *file, poll_table *wait)
2898c2ecf20Sopenharmony_ci{
2908c2ecf20Sopenharmony_ci	struct uacce_queue *q = file->private_data;
2918c2ecf20Sopenharmony_ci	struct uacce_device *uacce = q->uacce;
2928c2ecf20Sopenharmony_ci	__poll_t ret = 0;
2938c2ecf20Sopenharmony_ci
2948c2ecf20Sopenharmony_ci	mutex_lock(&q->mutex);
2958c2ecf20Sopenharmony_ci	if (!uacce_queue_is_valid(q))
2968c2ecf20Sopenharmony_ci		goto out_unlock;
2978c2ecf20Sopenharmony_ci
2988c2ecf20Sopenharmony_ci	poll_wait(file, &q->wait, wait);
2998c2ecf20Sopenharmony_ci
3008c2ecf20Sopenharmony_ci	if (uacce->ops->is_q_updated && uacce->ops->is_q_updated(q))
3018c2ecf20Sopenharmony_ci		ret = EPOLLIN | EPOLLRDNORM;
3028c2ecf20Sopenharmony_ci
3038c2ecf20Sopenharmony_ciout_unlock:
3048c2ecf20Sopenharmony_ci	mutex_unlock(&q->mutex);
3058c2ecf20Sopenharmony_ci	return ret;
3068c2ecf20Sopenharmony_ci}
3078c2ecf20Sopenharmony_ci
3088c2ecf20Sopenharmony_cistatic const struct file_operations uacce_fops = {
3098c2ecf20Sopenharmony_ci	.owner		= THIS_MODULE,
3108c2ecf20Sopenharmony_ci	.open		= uacce_fops_open,
3118c2ecf20Sopenharmony_ci	.release	= uacce_fops_release,
3128c2ecf20Sopenharmony_ci	.unlocked_ioctl	= uacce_fops_unl_ioctl,
3138c2ecf20Sopenharmony_ci#ifdef CONFIG_COMPAT
3148c2ecf20Sopenharmony_ci	.compat_ioctl	= uacce_fops_compat_ioctl,
3158c2ecf20Sopenharmony_ci#endif
3168c2ecf20Sopenharmony_ci	.mmap		= uacce_fops_mmap,
3178c2ecf20Sopenharmony_ci	.poll		= uacce_fops_poll,
3188c2ecf20Sopenharmony_ci};
3198c2ecf20Sopenharmony_ci
3208c2ecf20Sopenharmony_ci#define to_uacce_device(dev) container_of(dev, struct uacce_device, dev)
3218c2ecf20Sopenharmony_ci
3228c2ecf20Sopenharmony_cistatic ssize_t api_show(struct device *dev,
3238c2ecf20Sopenharmony_ci			struct device_attribute *attr, char *buf)
3248c2ecf20Sopenharmony_ci{
3258c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
3268c2ecf20Sopenharmony_ci
3278c2ecf20Sopenharmony_ci	return sprintf(buf, "%s\n", uacce->api_ver);
3288c2ecf20Sopenharmony_ci}
3298c2ecf20Sopenharmony_ci
3308c2ecf20Sopenharmony_cistatic ssize_t flags_show(struct device *dev,
3318c2ecf20Sopenharmony_ci			  struct device_attribute *attr, char *buf)
3328c2ecf20Sopenharmony_ci{
3338c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
3348c2ecf20Sopenharmony_ci
3358c2ecf20Sopenharmony_ci	return sprintf(buf, "%u\n", uacce->flags);
3368c2ecf20Sopenharmony_ci}
3378c2ecf20Sopenharmony_ci
3388c2ecf20Sopenharmony_cistatic ssize_t available_instances_show(struct device *dev,
3398c2ecf20Sopenharmony_ci					struct device_attribute *attr,
3408c2ecf20Sopenharmony_ci					char *buf)
3418c2ecf20Sopenharmony_ci{
3428c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
3438c2ecf20Sopenharmony_ci
3448c2ecf20Sopenharmony_ci	if (!uacce->ops->get_available_instances)
3458c2ecf20Sopenharmony_ci		return -ENODEV;
3468c2ecf20Sopenharmony_ci
3478c2ecf20Sopenharmony_ci	return sprintf(buf, "%d\n",
3488c2ecf20Sopenharmony_ci		       uacce->ops->get_available_instances(uacce));
3498c2ecf20Sopenharmony_ci}
3508c2ecf20Sopenharmony_ci
3518c2ecf20Sopenharmony_cistatic ssize_t algorithms_show(struct device *dev,
3528c2ecf20Sopenharmony_ci			       struct device_attribute *attr, char *buf)
3538c2ecf20Sopenharmony_ci{
3548c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
3558c2ecf20Sopenharmony_ci
3568c2ecf20Sopenharmony_ci	return sprintf(buf, "%s\n", uacce->algs);
3578c2ecf20Sopenharmony_ci}
3588c2ecf20Sopenharmony_ci
3598c2ecf20Sopenharmony_cistatic ssize_t region_mmio_size_show(struct device *dev,
3608c2ecf20Sopenharmony_ci				     struct device_attribute *attr, char *buf)
3618c2ecf20Sopenharmony_ci{
3628c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
3638c2ecf20Sopenharmony_ci
3648c2ecf20Sopenharmony_ci	return sprintf(buf, "%lu\n",
3658c2ecf20Sopenharmony_ci		       uacce->qf_pg_num[UACCE_QFRT_MMIO] << PAGE_SHIFT);
3668c2ecf20Sopenharmony_ci}
3678c2ecf20Sopenharmony_ci
3688c2ecf20Sopenharmony_cistatic ssize_t region_dus_size_show(struct device *dev,
3698c2ecf20Sopenharmony_ci				    struct device_attribute *attr, char *buf)
3708c2ecf20Sopenharmony_ci{
3718c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
3728c2ecf20Sopenharmony_ci
3738c2ecf20Sopenharmony_ci	return sprintf(buf, "%lu\n",
3748c2ecf20Sopenharmony_ci		       uacce->qf_pg_num[UACCE_QFRT_DUS] << PAGE_SHIFT);
3758c2ecf20Sopenharmony_ci}
3768c2ecf20Sopenharmony_ci
3778c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(api);
3788c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(flags);
3798c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(available_instances);
3808c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(algorithms);
3818c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(region_mmio_size);
3828c2ecf20Sopenharmony_cistatic DEVICE_ATTR_RO(region_dus_size);
3838c2ecf20Sopenharmony_ci
3848c2ecf20Sopenharmony_cistatic struct attribute *uacce_dev_attrs[] = {
3858c2ecf20Sopenharmony_ci	&dev_attr_api.attr,
3868c2ecf20Sopenharmony_ci	&dev_attr_flags.attr,
3878c2ecf20Sopenharmony_ci	&dev_attr_available_instances.attr,
3888c2ecf20Sopenharmony_ci	&dev_attr_algorithms.attr,
3898c2ecf20Sopenharmony_ci	&dev_attr_region_mmio_size.attr,
3908c2ecf20Sopenharmony_ci	&dev_attr_region_dus_size.attr,
3918c2ecf20Sopenharmony_ci	NULL,
3928c2ecf20Sopenharmony_ci};
3938c2ecf20Sopenharmony_ci
3948c2ecf20Sopenharmony_cistatic umode_t uacce_dev_is_visible(struct kobject *kobj,
3958c2ecf20Sopenharmony_ci				    struct attribute *attr, int n)
3968c2ecf20Sopenharmony_ci{
3978c2ecf20Sopenharmony_ci	struct device *dev = kobj_to_dev(kobj);
3988c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
3998c2ecf20Sopenharmony_ci
4008c2ecf20Sopenharmony_ci	if (((attr == &dev_attr_region_mmio_size.attr) &&
4018c2ecf20Sopenharmony_ci	    (!uacce->qf_pg_num[UACCE_QFRT_MMIO])) ||
4028c2ecf20Sopenharmony_ci	    ((attr == &dev_attr_region_dus_size.attr) &&
4038c2ecf20Sopenharmony_ci	    (!uacce->qf_pg_num[UACCE_QFRT_DUS])))
4048c2ecf20Sopenharmony_ci		return 0;
4058c2ecf20Sopenharmony_ci
4068c2ecf20Sopenharmony_ci	return attr->mode;
4078c2ecf20Sopenharmony_ci}
4088c2ecf20Sopenharmony_ci
4098c2ecf20Sopenharmony_cistatic struct attribute_group uacce_dev_group = {
4108c2ecf20Sopenharmony_ci	.is_visible	= uacce_dev_is_visible,
4118c2ecf20Sopenharmony_ci	.attrs		= uacce_dev_attrs,
4128c2ecf20Sopenharmony_ci};
4138c2ecf20Sopenharmony_ci
4148c2ecf20Sopenharmony_ci__ATTRIBUTE_GROUPS(uacce_dev);
4158c2ecf20Sopenharmony_ci
4168c2ecf20Sopenharmony_cistatic void uacce_release(struct device *dev)
4178c2ecf20Sopenharmony_ci{
4188c2ecf20Sopenharmony_ci	struct uacce_device *uacce = to_uacce_device(dev);
4198c2ecf20Sopenharmony_ci
4208c2ecf20Sopenharmony_ci	kfree(uacce);
4218c2ecf20Sopenharmony_ci}
4228c2ecf20Sopenharmony_ci
4238c2ecf20Sopenharmony_ci/**
4248c2ecf20Sopenharmony_ci * uacce_alloc() - alloc an accelerator
4258c2ecf20Sopenharmony_ci * @parent: pointer of uacce parent device
4268c2ecf20Sopenharmony_ci * @interface: pointer of uacce_interface for register
4278c2ecf20Sopenharmony_ci *
4288c2ecf20Sopenharmony_ci * Returns uacce pointer if success and ERR_PTR if not
4298c2ecf20Sopenharmony_ci * Need check returned negotiated uacce->flags
4308c2ecf20Sopenharmony_ci */
4318c2ecf20Sopenharmony_cistruct uacce_device *uacce_alloc(struct device *parent,
4328c2ecf20Sopenharmony_ci				 struct uacce_interface *interface)
4338c2ecf20Sopenharmony_ci{
4348c2ecf20Sopenharmony_ci	unsigned int flags = interface->flags;
4358c2ecf20Sopenharmony_ci	struct uacce_device *uacce;
4368c2ecf20Sopenharmony_ci	int ret;
4378c2ecf20Sopenharmony_ci
4388c2ecf20Sopenharmony_ci	uacce = kzalloc(sizeof(struct uacce_device), GFP_KERNEL);
4398c2ecf20Sopenharmony_ci	if (!uacce)
4408c2ecf20Sopenharmony_ci		return ERR_PTR(-ENOMEM);
4418c2ecf20Sopenharmony_ci
4428c2ecf20Sopenharmony_ci	if (flags & UACCE_DEV_SVA) {
4438c2ecf20Sopenharmony_ci		ret = iommu_dev_enable_feature(parent, IOMMU_DEV_FEAT_SVA);
4448c2ecf20Sopenharmony_ci		if (ret)
4458c2ecf20Sopenharmony_ci			flags &= ~UACCE_DEV_SVA;
4468c2ecf20Sopenharmony_ci	}
4478c2ecf20Sopenharmony_ci
4488c2ecf20Sopenharmony_ci	uacce->parent = parent;
4498c2ecf20Sopenharmony_ci	uacce->flags = flags;
4508c2ecf20Sopenharmony_ci	uacce->ops = interface->ops;
4518c2ecf20Sopenharmony_ci
4528c2ecf20Sopenharmony_ci	ret = xa_alloc(&uacce_xa, &uacce->dev_id, uacce, xa_limit_32b,
4538c2ecf20Sopenharmony_ci		       GFP_KERNEL);
4548c2ecf20Sopenharmony_ci	if (ret < 0)
4558c2ecf20Sopenharmony_ci		goto err_with_uacce;
4568c2ecf20Sopenharmony_ci
4578c2ecf20Sopenharmony_ci	INIT_LIST_HEAD(&uacce->queues);
4588c2ecf20Sopenharmony_ci	mutex_init(&uacce->mutex);
4598c2ecf20Sopenharmony_ci	device_initialize(&uacce->dev);
4608c2ecf20Sopenharmony_ci	uacce->dev.devt = MKDEV(MAJOR(uacce_devt), uacce->dev_id);
4618c2ecf20Sopenharmony_ci	uacce->dev.class = uacce_class;
4628c2ecf20Sopenharmony_ci	uacce->dev.groups = uacce_dev_groups;
4638c2ecf20Sopenharmony_ci	uacce->dev.parent = uacce->parent;
4648c2ecf20Sopenharmony_ci	uacce->dev.release = uacce_release;
4658c2ecf20Sopenharmony_ci	dev_set_name(&uacce->dev, "%s-%d", interface->name, uacce->dev_id);
4668c2ecf20Sopenharmony_ci
4678c2ecf20Sopenharmony_ci	return uacce;
4688c2ecf20Sopenharmony_ci
4698c2ecf20Sopenharmony_cierr_with_uacce:
4708c2ecf20Sopenharmony_ci	if (flags & UACCE_DEV_SVA)
4718c2ecf20Sopenharmony_ci		iommu_dev_disable_feature(uacce->parent, IOMMU_DEV_FEAT_SVA);
4728c2ecf20Sopenharmony_ci	kfree(uacce);
4738c2ecf20Sopenharmony_ci	return ERR_PTR(ret);
4748c2ecf20Sopenharmony_ci}
4758c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(uacce_alloc);
4768c2ecf20Sopenharmony_ci
4778c2ecf20Sopenharmony_ci/**
4788c2ecf20Sopenharmony_ci * uacce_register() - add the accelerator to cdev and export to user space
4798c2ecf20Sopenharmony_ci * @uacce: The initialized uacce device
4808c2ecf20Sopenharmony_ci *
4818c2ecf20Sopenharmony_ci * Return 0 if register succeeded, or an error.
4828c2ecf20Sopenharmony_ci */
4838c2ecf20Sopenharmony_ciint uacce_register(struct uacce_device *uacce)
4848c2ecf20Sopenharmony_ci{
4858c2ecf20Sopenharmony_ci	if (!uacce)
4868c2ecf20Sopenharmony_ci		return -ENODEV;
4878c2ecf20Sopenharmony_ci
4888c2ecf20Sopenharmony_ci	uacce->cdev = cdev_alloc();
4898c2ecf20Sopenharmony_ci	if (!uacce->cdev)
4908c2ecf20Sopenharmony_ci		return -ENOMEM;
4918c2ecf20Sopenharmony_ci
4928c2ecf20Sopenharmony_ci	uacce->cdev->ops = &uacce_fops;
4938c2ecf20Sopenharmony_ci	uacce->cdev->owner = THIS_MODULE;
4948c2ecf20Sopenharmony_ci
4958c2ecf20Sopenharmony_ci	return cdev_device_add(uacce->cdev, &uacce->dev);
4968c2ecf20Sopenharmony_ci}
4978c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(uacce_register);
4988c2ecf20Sopenharmony_ci
4998c2ecf20Sopenharmony_ci/**
5008c2ecf20Sopenharmony_ci * uacce_remove() - remove the accelerator
5018c2ecf20Sopenharmony_ci * @uacce: the accelerator to remove
5028c2ecf20Sopenharmony_ci */
5038c2ecf20Sopenharmony_civoid uacce_remove(struct uacce_device *uacce)
5048c2ecf20Sopenharmony_ci{
5058c2ecf20Sopenharmony_ci	struct uacce_queue *q, *next_q;
5068c2ecf20Sopenharmony_ci
5078c2ecf20Sopenharmony_ci	if (!uacce)
5088c2ecf20Sopenharmony_ci		return;
5098c2ecf20Sopenharmony_ci	/*
5108c2ecf20Sopenharmony_ci	 * unmap remaining mapping from user space, preventing user still
5118c2ecf20Sopenharmony_ci	 * access the mmaped area while parent device is already removed
5128c2ecf20Sopenharmony_ci	 */
5138c2ecf20Sopenharmony_ci	if (uacce->inode)
5148c2ecf20Sopenharmony_ci		unmap_mapping_range(uacce->inode->i_mapping, 0, 0, 1);
5158c2ecf20Sopenharmony_ci
5168c2ecf20Sopenharmony_ci	/*
5178c2ecf20Sopenharmony_ci	 * uacce_fops_open() may be running concurrently, even after we remove
5188c2ecf20Sopenharmony_ci	 * the cdev. Holding uacce->mutex ensures that open() does not obtain a
5198c2ecf20Sopenharmony_ci	 * removed uacce device.
5208c2ecf20Sopenharmony_ci	 */
5218c2ecf20Sopenharmony_ci	mutex_lock(&uacce->mutex);
5228c2ecf20Sopenharmony_ci	/* ensure no open queue remains */
5238c2ecf20Sopenharmony_ci	list_for_each_entry_safe(q, next_q, &uacce->queues, list) {
5248c2ecf20Sopenharmony_ci		/*
5258c2ecf20Sopenharmony_ci		 * Taking q->mutex ensures that fops do not use the defunct
5268c2ecf20Sopenharmony_ci		 * uacce->ops after the queue is disabled.
5278c2ecf20Sopenharmony_ci		 */
5288c2ecf20Sopenharmony_ci		mutex_lock(&q->mutex);
5298c2ecf20Sopenharmony_ci		uacce_put_queue(q);
5308c2ecf20Sopenharmony_ci		mutex_unlock(&q->mutex);
5318c2ecf20Sopenharmony_ci		uacce_unbind_queue(q);
5328c2ecf20Sopenharmony_ci	}
5338c2ecf20Sopenharmony_ci
5348c2ecf20Sopenharmony_ci	/* disable sva now since no opened queues */
5358c2ecf20Sopenharmony_ci	if (uacce->flags & UACCE_DEV_SVA)
5368c2ecf20Sopenharmony_ci		iommu_dev_disable_feature(uacce->parent, IOMMU_DEV_FEAT_SVA);
5378c2ecf20Sopenharmony_ci
5388c2ecf20Sopenharmony_ci	if (uacce->cdev)
5398c2ecf20Sopenharmony_ci		cdev_device_del(uacce->cdev, &uacce->dev);
5408c2ecf20Sopenharmony_ci	xa_erase(&uacce_xa, uacce->dev_id);
5418c2ecf20Sopenharmony_ci	/*
5428c2ecf20Sopenharmony_ci	 * uacce exists as long as there are open fds, but ops will be freed
5438c2ecf20Sopenharmony_ci	 * now. Ensure that bugs cause NULL deref rather than use-after-free.
5448c2ecf20Sopenharmony_ci	 */
5458c2ecf20Sopenharmony_ci	uacce->ops = NULL;
5468c2ecf20Sopenharmony_ci	uacce->parent = NULL;
5478c2ecf20Sopenharmony_ci	mutex_unlock(&uacce->mutex);
5488c2ecf20Sopenharmony_ci	put_device(&uacce->dev);
5498c2ecf20Sopenharmony_ci}
5508c2ecf20Sopenharmony_ciEXPORT_SYMBOL_GPL(uacce_remove);
5518c2ecf20Sopenharmony_ci
5528c2ecf20Sopenharmony_cistatic int __init uacce_init(void)
5538c2ecf20Sopenharmony_ci{
5548c2ecf20Sopenharmony_ci	int ret;
5558c2ecf20Sopenharmony_ci
5568c2ecf20Sopenharmony_ci	uacce_class = class_create(THIS_MODULE, UACCE_NAME);
5578c2ecf20Sopenharmony_ci	if (IS_ERR(uacce_class))
5588c2ecf20Sopenharmony_ci		return PTR_ERR(uacce_class);
5598c2ecf20Sopenharmony_ci
5608c2ecf20Sopenharmony_ci	ret = alloc_chrdev_region(&uacce_devt, 0, MINORMASK, UACCE_NAME);
5618c2ecf20Sopenharmony_ci	if (ret)
5628c2ecf20Sopenharmony_ci		class_destroy(uacce_class);
5638c2ecf20Sopenharmony_ci
5648c2ecf20Sopenharmony_ci	return ret;
5658c2ecf20Sopenharmony_ci}
5668c2ecf20Sopenharmony_ci
5678c2ecf20Sopenharmony_cistatic __exit void uacce_exit(void)
5688c2ecf20Sopenharmony_ci{
5698c2ecf20Sopenharmony_ci	unregister_chrdev_region(uacce_devt, MINORMASK);
5708c2ecf20Sopenharmony_ci	class_destroy(uacce_class);
5718c2ecf20Sopenharmony_ci}
5728c2ecf20Sopenharmony_ci
5738c2ecf20Sopenharmony_cisubsys_initcall(uacce_init);
5748c2ecf20Sopenharmony_cimodule_exit(uacce_exit);
5758c2ecf20Sopenharmony_ci
5768c2ecf20Sopenharmony_ciMODULE_LICENSE("GPL");
5778c2ecf20Sopenharmony_ciMODULE_AUTHOR("Hisilicon Tech. Co., Ltd.");
5788c2ecf20Sopenharmony_ciMODULE_DESCRIPTION("Accelerator interface for Userland applications");
579