2013-06-27 19:48:16 +08:00
|
|
|
/*
|
2014-07-01 18:57:54 +08:00
|
|
|
* Copyright (C) 2012-2014 Canonical Ltd (Maarten Lankhorst)
|
2013-06-27 19:48:16 +08:00
|
|
|
*
|
|
|
|
* Based on bo.c which bears the following copyright notice,
|
|
|
|
* but is dual licensed:
|
|
|
|
*
|
|
|
|
* Copyright (c) 2006-2009 VMware, Inc., Palo Alto, CA., USA
|
|
|
|
* All Rights Reserved.
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a
|
|
|
|
* copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sub license, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice (including the
|
|
|
|
* next paragraph) shall be included in all copies or substantial portions
|
|
|
|
* of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
* FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
|
|
|
|
* THE COPYRIGHT HOLDERS, AUTHORS AND/OR ITS SUPPLIERS BE LIABLE FOR ANY CLAIM,
|
|
|
|
* DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
|
|
|
|
* OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
|
|
|
|
* USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*
|
|
|
|
**************************************************************************/
|
|
|
|
/*
|
|
|
|
* Authors: Thomas Hellstrom <thellstrom-at-vmware-dot-com>
|
|
|
|
*/
|
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
#include <linux/dma-resv.h>
|
2013-06-27 19:48:16 +08:00
|
|
|
#include <linux/export.h>
|
dma_resv: prime lockdep annotations
Full audit of everyone:
- i915, radeon, amdgpu should be clean per their maintainers.
- vram helpers should be fine, they don't do command submission, so
really no business holding struct_mutex while doing copy_*_user. But
I haven't checked them all.
- panfrost seems to dma_resv_lock only in panfrost_job_push, which
looks clean.
- v3d holds dma_resv locks in the tail of its v3d_submit_cl_ioctl(),
copying from/to userspace happens all in v3d_lookup_bos which is
outside of the critical section.
- vmwgfx has a bunch of ioctls that do their own copy_*_user:
- vmw_execbuf_process: First this does some copies in
vmw_execbuf_cmdbuf() and also in the vmw_execbuf_process() itself.
Then comes the usual ttm reserve/validate sequence, then actual
submission/fencing, then unreserving, and finally some more
copy_to_user in vmw_execbuf_copy_fence_user. Glossing over tons of
details, but looks all safe.
- vmw_fence_event_ioctl: No ttm_reserve/dma_resv_lock anywhere to be
seen, seems to only create a fence and copy it out.
- a pile of smaller ioctl in vmwgfx_ioctl.c, no reservations to be
found there.
Summary: vmwgfx seems to be fine too.
- virtio: There's virtio_gpu_execbuffer_ioctl, which does all the
copying from userspace before even looking up objects through their
handles, so safe. Plus the getparam/getcaps ioctl, also both safe.
- qxl only has qxl_execbuffer_ioctl, which calls into
qxl_process_single_command. There's a lovely comment before the
__copy_from_user_inatomic that the slowpath should be copied from
i915, but I guess that never happened. Try not to be unlucky and get
your CS data evicted between when it's written and the kernel tries
to read it. The only other copy_from_user is for relocs, but those
are done before qxl_release_reserve_list(), which seems to be the
only thing reserving buffers (in the ttm/dma_resv sense) in that
code. So looks safe.
- A debugfs file in nouveau_debugfs_pstate_set() and the usif ioctl in
usif_ioctl() look safe. nouveau_gem_ioctl_pushbuf() otoh breaks this
everywhere and needs to be fixed up.
v2: Thomas pointed at that vmwgfx calls dma_resv_init while it holds a
dma_resv lock of a different object already. Christian mentioned that
ttm core does this too for ghost objects. intel-gfx-ci highlighted
that i915 has similar issues.
Unfortunately we can't do this in the usual module init functions,
because kernel threads don't have an ->mm - we have to wait around for
some user thread to do this.
Solution is to spawn a worker (but only once). It's horrible, but it
works.
v3: We can allocate mm! (Chris). Horrible worker hack out, clean
initcall solution in.
v4: Annotate with __init (Rob Herring)
Cc: Rob Herring <robh@kernel.org>
Cc: Alex Deucher <alexander.deucher@amd.com>
Cc: Christian König <christian.koenig@amd.com>
Cc: Chris Wilson <chris@chris-wilson.co.uk>
Cc: Thomas Zimmermann <tzimmermann@suse.de>
Cc: Rob Herring <robh@kernel.org>
Cc: Tomeu Vizoso <tomeu.vizoso@collabora.com>
Cc: Eric Anholt <eric@anholt.net>
Cc: Dave Airlie <airlied@redhat.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Cc: Ben Skeggs <bskeggs@redhat.com>
Cc: "VMware Graphics" <linux-graphics-maintainer@vmware.com>
Cc: Thomas Hellstrom <thellstrom@vmware.com>
Reviewed-by: Thomas Hellstrom <thellstrom@vmware.com>
Reviewed-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Chris Wilson <chris@chris-wilson.co.uk>
Tested-by: Chris Wilson <chris@chris-wilson.co.uk>
Signed-off-by: Daniel Vetter <daniel.vetter@intel.com>
Link: https://patchwork.freedesktop.org/patch/msgid/20191104173801.2972-1-daniel.vetter@ffwll.ch
2019-11-05 01:37:59 +08:00
|
|
|
#include <linux/sched/mm.h>
|
2013-06-27 19:48:16 +08:00
|
|
|
|
2016-04-01 04:26:51 +08:00
|
|
|
/**
|
|
|
|
* DOC: Reservation Object Overview
|
|
|
|
*
|
|
|
|
* The reservation object provides a mechanism to manage shared and
|
|
|
|
* exclusive fences associated with a buffer. A reservation object
|
|
|
|
* can have attached one exclusive fence (normally associated with
|
|
|
|
* write operations) or N shared fences (read operations). The RCU
|
|
|
|
* mechanism is used to protect read access to fences from locked
|
|
|
|
* write-side updates.
|
|
|
|
*/
|
|
|
|
|
2018-06-15 16:17:38 +08:00
|
|
|
DEFINE_WD_CLASS(reservation_ww_class);
|
2013-06-27 19:48:16 +08:00
|
|
|
EXPORT_SYMBOL(reservation_ww_class);
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
struct lock_class_key reservation_seqcount_class;
|
|
|
|
EXPORT_SYMBOL(reservation_seqcount_class);
|
|
|
|
|
|
|
|
const char reservation_seqcount_string[] = "reservation_seqcount";
|
|
|
|
EXPORT_SYMBOL(reservation_seqcount_string);
|
|
|
|
|
2019-08-06 19:33:12 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_list_alloc - allocate fence list
|
2019-08-06 19:33:12 +08:00
|
|
|
* @shared_max: number of fences we need space for
|
|
|
|
*
|
2019-08-11 16:06:32 +08:00
|
|
|
* Allocate a new dma_resv_list and make sure to correctly initialize
|
2019-08-06 19:33:12 +08:00
|
|
|
* shared_max.
|
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
static struct dma_resv_list *dma_resv_list_alloc(unsigned int shared_max)
|
2019-08-06 19:33:12 +08:00
|
|
|
{
|
2019-08-11 16:06:32 +08:00
|
|
|
struct dma_resv_list *list;
|
2019-08-06 19:33:12 +08:00
|
|
|
|
|
|
|
list = kmalloc(offsetof(typeof(*list), shared[shared_max]), GFP_KERNEL);
|
|
|
|
if (!list)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
list->shared_max = (ksize(list) - offsetof(typeof(*list), shared)) /
|
|
|
|
sizeof(*list->shared);
|
|
|
|
|
|
|
|
return list;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_list_free - free fence list
|
2019-08-06 19:33:12 +08:00
|
|
|
* @list: list to free
|
|
|
|
*
|
2019-08-11 16:06:32 +08:00
|
|
|
* Free a dma_resv_list and make sure to drop all references.
|
2019-08-06 19:33:12 +08:00
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
static void dma_resv_list_free(struct dma_resv_list *list)
|
2019-08-06 19:33:12 +08:00
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
if (!list)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < list->shared_count; ++i)
|
|
|
|
dma_fence_put(rcu_dereference_protected(list->shared[i], true));
|
|
|
|
|
|
|
|
kfree_rcu(list, rcu);
|
|
|
|
}
|
|
|
|
|
dma_resv: prime lockdep annotations
Full audit of everyone:
- i915, radeon, amdgpu should be clean per their maintainers.
- vram helpers should be fine, they don't do command submission, so
really no business holding struct_mutex while doing copy_*_user. But
I haven't checked them all.
- panfrost seems to dma_resv_lock only in panfrost_job_push, which
looks clean.
- v3d holds dma_resv locks in the tail of its v3d_submit_cl_ioctl(),
copying from/to userspace happens all in v3d_lookup_bos which is
outside of the critical section.
- vmwgfx has a bunch of ioctls that do their own copy_*_user:
- vmw_execbuf_process: First this does some copies in
vmw_execbuf_cmdbuf() and also in the vmw_execbuf_process() itself.
Then comes the usual ttm reserve/validate sequence, then actual
submission/fencing, then unreserving, and finally some more
copy_to_user in vmw_execbuf_copy_fence_user. Glossing over tons of
details, but looks all safe.
- vmw_fence_event_ioctl: No ttm_reserve/dma_resv_lock anywhere to be
seen, seems to only create a fence and copy it out.
- a pile of smaller ioctl in vmwgfx_ioctl.c, no reservations to be
found there.
Summary: vmwgfx seems to be fine too.
- virtio: There's virtio_gpu_execbuffer_ioctl, which does all the
copying from userspace before even looking up objects through their
handles, so safe. Plus the getparam/getcaps ioctl, also both safe.
- qxl only has qxl_execbuffer_ioctl, which calls into
qxl_process_single_command. There's a lovely comment before the
__copy_from_user_inatomic that the slowpath should be copied from
i915, but I guess that never happened. Try not to be unlucky and get
your CS data evicted between when it's written and the kernel tries
to read it. The only other copy_from_user is for relocs, but those
are done before qxl_release_reserve_list(), which seems to be the
only thing reserving buffers (in the ttm/dma_resv sense) in that
code. So looks safe.
- A debugfs file in nouveau_debugfs_pstate_set() and the usif ioctl in
usif_ioctl() look safe. nouveau_gem_ioctl_pushbuf() otoh breaks this
everywhere and needs to be fixed up.
v2: Thomas pointed at that vmwgfx calls dma_resv_init while it holds a
dma_resv lock of a different object already. Christian mentioned that
ttm core does this too for ghost objects. intel-gfx-ci highlighted
that i915 has similar issues.
Unfortunately we can't do this in the usual module init functions,
because kernel threads don't have an ->mm - we have to wait around for
some user thread to do this.
Solution is to spawn a worker (but only once). It's horrible, but it
works.
v3: We can allocate mm! (Chris). Horrible worker hack out, clean
initcall solution in.
v4: Annotate with __init (Rob Herring)
Cc: Rob Herring <robh@kernel.org>
Cc: Alex Deucher <alexander.deucher@amd.com>
Cc: Christian König <christian.koenig@amd.com>
Cc: Chris Wilson <chris@chris-wilson.co.uk>
Cc: Thomas Zimmermann <tzimmermann@suse.de>
Cc: Rob Herring <robh@kernel.org>
Cc: Tomeu Vizoso <tomeu.vizoso@collabora.com>
Cc: Eric Anholt <eric@anholt.net>
Cc: Dave Airlie <airlied@redhat.com>
Cc: Gerd Hoffmann <kraxel@redhat.com>
Cc: Ben Skeggs <bskeggs@redhat.com>
Cc: "VMware Graphics" <linux-graphics-maintainer@vmware.com>
Cc: Thomas Hellstrom <thellstrom@vmware.com>
Reviewed-by: Thomas Hellstrom <thellstrom@vmware.com>
Reviewed-by: Christian König <christian.koenig@amd.com>
Reviewed-by: Chris Wilson <chris@chris-wilson.co.uk>
Tested-by: Chris Wilson <chris@chris-wilson.co.uk>
Signed-off-by: Daniel Vetter <daniel.vetter@intel.com>
Link: https://patchwork.freedesktop.org/patch/msgid/20191104173801.2972-1-daniel.vetter@ffwll.ch
2019-11-05 01:37:59 +08:00
|
|
|
#if IS_ENABLED(CONFIG_LOCKDEP)
|
|
|
|
static void __init dma_resv_lockdep(void)
|
|
|
|
{
|
|
|
|
struct mm_struct *mm = mm_alloc();
|
|
|
|
struct dma_resv obj;
|
|
|
|
|
|
|
|
if (!mm)
|
|
|
|
return;
|
|
|
|
|
|
|
|
dma_resv_init(&obj);
|
|
|
|
|
|
|
|
down_read(&mm->mmap_sem);
|
|
|
|
ww_mutex_lock(&obj.lock, NULL);
|
|
|
|
fs_reclaim_acquire(GFP_KERNEL);
|
|
|
|
fs_reclaim_release(GFP_KERNEL);
|
|
|
|
ww_mutex_unlock(&obj.lock);
|
|
|
|
up_read(&mm->mmap_sem);
|
|
|
|
|
|
|
|
mmput(mm);
|
|
|
|
}
|
|
|
|
subsys_initcall(dma_resv_lockdep);
|
|
|
|
#endif
|
|
|
|
|
2019-06-26 22:31:46 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_init - initialize a reservation object
|
2019-06-26 22:31:46 +08:00
|
|
|
* @obj: the reservation object
|
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
void dma_resv_init(struct dma_resv *obj)
|
2019-06-26 22:31:46 +08:00
|
|
|
{
|
|
|
|
ww_mutex_init(&obj->lock, &reservation_ww_class);
|
2019-08-15 02:24:01 +08:00
|
|
|
|
|
|
|
__seqcount_init(&obj->seq, reservation_seqcount_string,
|
|
|
|
&reservation_seqcount_class);
|
2019-06-26 22:31:46 +08:00
|
|
|
RCU_INIT_POINTER(obj->fence, NULL);
|
|
|
|
RCU_INIT_POINTER(obj->fence_excl, NULL);
|
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL(dma_resv_init);
|
2019-06-26 22:31:46 +08:00
|
|
|
|
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_fini - destroys a reservation object
|
2019-06-26 22:31:46 +08:00
|
|
|
* @obj: the reservation object
|
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
void dma_resv_fini(struct dma_resv *obj)
|
2019-06-26 22:31:46 +08:00
|
|
|
{
|
2019-08-11 16:06:32 +08:00
|
|
|
struct dma_resv_list *fobj;
|
2019-06-26 22:31:46 +08:00
|
|
|
struct dma_fence *excl;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This object should be dead and all references must have
|
|
|
|
* been released to it, so no need to be protected with rcu.
|
|
|
|
*/
|
|
|
|
excl = rcu_dereference_protected(obj->fence_excl, 1);
|
|
|
|
if (excl)
|
|
|
|
dma_fence_put(excl);
|
|
|
|
|
|
|
|
fobj = rcu_dereference_protected(obj->fence, 1);
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_list_free(fobj);
|
2019-06-26 22:31:46 +08:00
|
|
|
ww_mutex_destroy(&obj->lock);
|
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL(dma_resv_fini);
|
2019-06-26 22:31:46 +08:00
|
|
|
|
2016-04-01 04:26:51 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_reserve_shared - Reserve space to add shared fences to
|
|
|
|
* a dma_resv.
|
2016-04-01 04:26:51 +08:00
|
|
|
* @obj: reservation object
|
2018-09-19 22:12:25 +08:00
|
|
|
* @num_fences: number of fences we want to add
|
2016-04-01 04:26:51 +08:00
|
|
|
*
|
2019-08-11 16:06:32 +08:00
|
|
|
* Should be called before dma_resv_add_shared_fence(). Must
|
2016-04-01 04:26:51 +08:00
|
|
|
* be called with obj->lock held.
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Zero for success, or -errno
|
2014-07-01 18:57:54 +08:00
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
int dma_resv_reserve_shared(struct dma_resv *obj, unsigned int num_fences)
|
2014-07-01 18:57:54 +08:00
|
|
|
{
|
2019-08-11 16:06:32 +08:00
|
|
|
struct dma_resv_list *old, *new;
|
2018-08-08 22:01:22 +08:00
|
|
|
unsigned int i, j, k, max;
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_assert_held(obj);
|
2017-06-13 16:26:46 +08:00
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
old = dma_resv_get_list(obj);
|
2014-07-01 18:57:54 +08:00
|
|
|
|
|
|
|
if (old && old->shared_max) {
|
2018-09-19 22:12:25 +08:00
|
|
|
if ((old->shared_count + num_fences) <= old->shared_max)
|
2014-07-01 18:57:54 +08:00
|
|
|
return 0;
|
2018-08-08 22:01:22 +08:00
|
|
|
else
|
2018-09-19 22:12:25 +08:00
|
|
|
max = max(old->shared_count + num_fences,
|
|
|
|
old->shared_max * 2);
|
2017-11-14 22:24:36 +08:00
|
|
|
} else {
|
2018-08-08 22:01:22 +08:00
|
|
|
max = 4;
|
2017-11-14 22:24:36 +08:00
|
|
|
}
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
new = dma_resv_list_alloc(max);
|
2018-08-08 22:01:22 +08:00
|
|
|
if (!new)
|
|
|
|
return -ENOMEM;
|
2014-07-01 18:57:54 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* no need to bump fence refcounts, rcu_read access
|
|
|
|
* requires the use of kref_get_unless_zero, and the
|
|
|
|
* references from the old struct are carried over to
|
|
|
|
* the new.
|
|
|
|
*/
|
2018-08-08 22:01:22 +08:00
|
|
|
for (i = 0, j = 0, k = max; i < (old ? old->shared_count : 0); ++i) {
|
|
|
|
struct dma_fence *fence;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2018-08-08 22:01:22 +08:00
|
|
|
fence = rcu_dereference_protected(old->shared[i],
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_held(obj));
|
2018-08-08 22:01:22 +08:00
|
|
|
if (dma_fence_is_signaled(fence))
|
|
|
|
RCU_INIT_POINTER(new->shared[--k], fence);
|
2017-11-14 22:24:35 +08:00
|
|
|
else
|
2018-08-08 22:01:22 +08:00
|
|
|
RCU_INIT_POINTER(new->shared[j++], fence);
|
2014-07-01 18:57:54 +08:00
|
|
|
}
|
2018-08-08 22:01:22 +08:00
|
|
|
new->shared_count = j;
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2014-07-01 18:58:00 +08:00
|
|
|
/*
|
2019-07-12 16:03:14 +08:00
|
|
|
* We are not changing the effective set of fences here so can
|
|
|
|
* merely update the pointer to the new array; both existing
|
|
|
|
* readers and new readers will see exactly the same set of
|
|
|
|
* active (unsignaled) shared fences. Individual fences and the
|
|
|
|
* old array are protected by RCU and so will not vanish under
|
|
|
|
* the gaze of the rcu_read_lock() readers.
|
2014-07-01 18:58:00 +08:00
|
|
|
*/
|
2019-07-12 16:03:14 +08:00
|
|
|
rcu_assign_pointer(obj->fence, new);
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2017-11-14 22:24:35 +08:00
|
|
|
if (!old)
|
2018-08-08 22:01:22 +08:00
|
|
|
return 0;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2017-11-14 22:24:35 +08:00
|
|
|
/* Drop the references to the signaled fences */
|
2019-07-12 16:03:13 +08:00
|
|
|
for (i = k; i < max; ++i) {
|
2018-08-08 22:01:22 +08:00
|
|
|
struct dma_fence *fence;
|
2017-11-14 22:24:35 +08:00
|
|
|
|
2018-08-08 22:01:22 +08:00
|
|
|
fence = rcu_dereference_protected(new->shared[i],
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_held(obj));
|
2018-08-08 22:01:22 +08:00
|
|
|
dma_fence_put(fence);
|
2017-11-14 22:24:35 +08:00
|
|
|
}
|
|
|
|
kfree_rcu(old, rcu);
|
2018-08-08 22:01:22 +08:00
|
|
|
|
|
|
|
return 0;
|
2014-07-01 18:57:54 +08:00
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL(dma_resv_reserve_shared);
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2016-04-01 04:26:51 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_add_shared_fence - Add a fence to a shared slot
|
2016-04-01 04:26:51 +08:00
|
|
|
* @obj: the reservation object
|
|
|
|
* @fence: the shared fence to add
|
|
|
|
*
|
2014-07-01 18:57:54 +08:00
|
|
|
* Add a fence to a shared slot, obj->lock must be held, and
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_reserve_shared() has been called.
|
2014-07-01 18:57:54 +08:00
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
void dma_resv_add_shared_fence(struct dma_resv *obj, struct dma_fence *fence)
|
2014-07-01 18:57:54 +08:00
|
|
|
{
|
2019-08-11 16:06:32 +08:00
|
|
|
struct dma_resv_list *fobj;
|
2019-08-05 17:14:27 +08:00
|
|
|
struct dma_fence *old;
|
2018-10-26 16:03:02 +08:00
|
|
|
unsigned int i, count;
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2018-08-08 22:01:22 +08:00
|
|
|
dma_fence_get(fence);
|
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_assert_held(obj);
|
2017-06-13 16:26:46 +08:00
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
fobj = dma_resv_get_list(obj);
|
2018-10-26 16:03:02 +08:00
|
|
|
count = fobj->shared_count;
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
preempt_disable();
|
|
|
|
write_seqcount_begin(&obj->seq);
|
|
|
|
|
2018-10-26 16:03:02 +08:00
|
|
|
for (i = 0; i < count; ++i) {
|
2018-08-08 22:01:22 +08:00
|
|
|
|
2019-08-05 17:14:27 +08:00
|
|
|
old = rcu_dereference_protected(fobj->shared[i],
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_held(obj));
|
2019-08-05 17:14:27 +08:00
|
|
|
if (old->context == fence->context ||
|
|
|
|
dma_fence_is_signaled(old))
|
2018-08-08 22:01:22 +08:00
|
|
|
goto replace;
|
|
|
|
}
|
|
|
|
|
|
|
|
BUG_ON(fobj->shared_count >= fobj->shared_max);
|
2019-08-05 17:14:27 +08:00
|
|
|
old = NULL;
|
2018-10-26 16:03:02 +08:00
|
|
|
count++;
|
2018-08-08 22:01:22 +08:00
|
|
|
|
|
|
|
replace:
|
|
|
|
RCU_INIT_POINTER(fobj->shared[i], fence);
|
2018-10-26 16:03:02 +08:00
|
|
|
/* pointer update must be visible before we extend the shared_count */
|
|
|
|
smp_store_mb(fobj->shared_count, count);
|
2019-08-15 02:24:01 +08:00
|
|
|
|
|
|
|
write_seqcount_end(&obj->seq);
|
|
|
|
preempt_enable();
|
2019-08-05 17:14:27 +08:00
|
|
|
dma_fence_put(old);
|
2014-07-01 18:57:54 +08:00
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL(dma_resv_add_shared_fence);
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2016-04-01 04:26:51 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_add_excl_fence - Add an exclusive fence.
|
2016-04-01 04:26:51 +08:00
|
|
|
* @obj: the reservation object
|
|
|
|
* @fence: the shared fence to add
|
|
|
|
*
|
|
|
|
* Add a fence to the exclusive slot. The obj->lock must be held.
|
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
void dma_resv_add_excl_fence(struct dma_resv *obj, struct dma_fence *fence)
|
2014-07-01 18:57:54 +08:00
|
|
|
{
|
2019-08-11 16:06:32 +08:00
|
|
|
struct dma_fence *old_fence = dma_resv_get_excl(obj);
|
|
|
|
struct dma_resv_list *old;
|
2014-07-01 18:57:54 +08:00
|
|
|
u32 i = 0;
|
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_assert_held(obj);
|
2017-06-13 16:26:46 +08:00
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
old = dma_resv_get_list(obj);
|
2014-07-01 18:58:00 +08:00
|
|
|
if (old)
|
2014-07-01 18:57:54 +08:00
|
|
|
i = old->shared_count;
|
|
|
|
|
|
|
|
if (fence)
|
2016-10-25 20:00:45 +08:00
|
|
|
dma_fence_get(fence);
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2014-07-01 18:58:00 +08:00
|
|
|
preempt_disable();
|
2019-08-15 02:24:01 +08:00
|
|
|
write_seqcount_begin(&obj->seq);
|
|
|
|
/* write_seqcount_begin provides the necessary memory barrier */
|
|
|
|
RCU_INIT_POINTER(obj->fence_excl, fence);
|
2014-07-01 18:58:00 +08:00
|
|
|
if (old)
|
2019-08-15 02:24:01 +08:00
|
|
|
old->shared_count = 0;
|
|
|
|
write_seqcount_end(&obj->seq);
|
2014-07-01 18:58:00 +08:00
|
|
|
preempt_enable();
|
2014-07-01 18:57:54 +08:00
|
|
|
|
|
|
|
/* inplace update, no shared fences */
|
|
|
|
while (i--)
|
2016-10-25 20:00:45 +08:00
|
|
|
dma_fence_put(rcu_dereference_protected(old->shared[i],
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_held(obj)));
|
2014-07-01 18:57:54 +08:00
|
|
|
|
2017-08-08 05:32:21 +08:00
|
|
|
dma_fence_put(old_fence);
|
2014-07-01 18:57:54 +08:00
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL(dma_resv_add_excl_fence);
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2017-08-11 01:01:48 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_copy_fences - Copy all fences from src to dst.
|
2017-08-11 01:01:48 +08:00
|
|
|
* @dst: the destination reservation object
|
|
|
|
* @src: the source reservation object
|
|
|
|
*
|
2017-09-05 03:02:45 +08:00
|
|
|
* Copy all fences from src to dst. dst-lock must be held.
|
2017-08-11 01:01:48 +08:00
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
int dma_resv_copy_fences(struct dma_resv *dst, struct dma_resv *src)
|
2017-08-11 01:01:48 +08:00
|
|
|
{
|
2019-08-11 16:06:32 +08:00
|
|
|
struct dma_resv_list *src_list, *dst_list;
|
2017-08-11 01:01:48 +08:00
|
|
|
struct dma_fence *old, *new;
|
2019-08-15 02:24:01 +08:00
|
|
|
unsigned i;
|
2017-08-11 01:01:48 +08:00
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_assert_held(dst);
|
2017-06-13 16:26:46 +08:00
|
|
|
|
2017-09-05 03:02:45 +08:00
|
|
|
rcu_read_lock();
|
2019-08-15 02:24:01 +08:00
|
|
|
src_list = rcu_dereference(src->fence);
|
2017-08-11 01:01:48 +08:00
|
|
|
|
2017-09-05 03:02:45 +08:00
|
|
|
retry:
|
2019-08-15 02:24:01 +08:00
|
|
|
if (src_list) {
|
|
|
|
unsigned shared_count = src_list->shared_count;
|
|
|
|
|
2017-09-05 03:02:45 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
dst_list = dma_resv_list_alloc(shared_count);
|
2017-08-11 01:01:48 +08:00
|
|
|
if (!dst_list)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-09-05 03:02:45 +08:00
|
|
|
rcu_read_lock();
|
2019-08-15 02:24:01 +08:00
|
|
|
src_list = rcu_dereference(src->fence);
|
|
|
|
if (!src_list || src_list->shared_count > shared_count) {
|
2017-09-05 03:02:45 +08:00
|
|
|
kfree(dst_list);
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
dst_list->shared_count = 0;
|
2019-08-15 02:24:01 +08:00
|
|
|
for (i = 0; i < src_list->shared_count; ++i) {
|
2017-09-05 03:02:45 +08:00
|
|
|
struct dma_fence *fence;
|
|
|
|
|
|
|
|
fence = rcu_dereference(src_list->shared[i]);
|
|
|
|
if (test_bit(DMA_FENCE_FLAG_SIGNALED_BIT,
|
|
|
|
&fence->flags))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!dma_fence_get_rcu(fence)) {
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_list_free(dst_list);
|
2019-08-15 02:24:01 +08:00
|
|
|
src_list = rcu_dereference(src->fence);
|
2017-09-05 03:02:45 +08:00
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (dma_fence_is_signaled(fence)) {
|
|
|
|
dma_fence_put(fence);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2017-11-03 04:03:36 +08:00
|
|
|
rcu_assign_pointer(dst_list->shared[dst_list->shared_count++], fence);
|
2017-09-05 03:02:45 +08:00
|
|
|
}
|
2017-08-11 01:01:48 +08:00
|
|
|
} else {
|
|
|
|
dst_list = NULL;
|
|
|
|
}
|
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
new = dma_fence_get_rcu_safe(&src->fence_excl);
|
2017-09-05 03:02:45 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
src_list = dma_resv_get_list(dst);
|
|
|
|
old = dma_resv_get_excl(dst);
|
2017-08-11 01:01:48 +08:00
|
|
|
|
|
|
|
preempt_disable();
|
2019-08-15 02:24:01 +08:00
|
|
|
write_seqcount_begin(&dst->seq);
|
|
|
|
/* write_seqcount_begin provides the necessary memory barrier */
|
|
|
|
RCU_INIT_POINTER(dst->fence_excl, new);
|
|
|
|
RCU_INIT_POINTER(dst->fence, dst_list);
|
|
|
|
write_seqcount_end(&dst->seq);
|
2017-08-11 01:01:48 +08:00
|
|
|
preempt_enable();
|
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
dma_resv_list_free(src_list);
|
2017-08-11 01:01:48 +08:00
|
|
|
dma_fence_put(old);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL(dma_resv_copy_fences);
|
2017-08-11 01:01:48 +08:00
|
|
|
|
2016-04-01 04:26:51 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_get_fences_rcu - Get an object's shared and exclusive
|
2016-04-01 04:26:51 +08:00
|
|
|
* fences without update side lock held
|
|
|
|
* @obj: the reservation object
|
|
|
|
* @pfence_excl: the returned exclusive fence (or NULL)
|
|
|
|
* @pshared_count: the number of shared fences returned
|
|
|
|
* @pshared: the array of shared fence ptrs returned (array is krealloc'd to
|
|
|
|
* the required size, and must be freed by caller)
|
|
|
|
*
|
2018-01-10 20:53:41 +08:00
|
|
|
* Retrieve all fences from the reservation object. If the pointer for the
|
|
|
|
* exclusive fence is not specified the fence is put into the array of the
|
|
|
|
* shared fences as well. Returns either zero or -ENOMEM.
|
2016-04-01 04:26:51 +08:00
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
int dma_resv_get_fences_rcu(struct dma_resv *obj,
|
|
|
|
struct dma_fence **pfence_excl,
|
|
|
|
unsigned *pshared_count,
|
|
|
|
struct dma_fence ***pshared)
|
2014-07-01 18:58:00 +08:00
|
|
|
{
|
2016-10-25 20:00:45 +08:00
|
|
|
struct dma_fence **shared = NULL;
|
|
|
|
struct dma_fence *fence_excl;
|
2016-08-29 15:08:30 +08:00
|
|
|
unsigned int shared_count;
|
|
|
|
int ret = 1;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2016-08-29 15:08:30 +08:00
|
|
|
do {
|
2019-08-11 16:06:32 +08:00
|
|
|
struct dma_resv_list *fobj;
|
2019-08-15 02:24:01 +08:00
|
|
|
unsigned int i, seq;
|
2018-01-10 20:53:41 +08:00
|
|
|
size_t sz = 0;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
shared_count = i = 0;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
|
|
|
rcu_read_lock();
|
2019-08-15 02:24:01 +08:00
|
|
|
seq = read_seqcount_begin(&obj->seq);
|
2016-08-29 15:08:30 +08:00
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
fence_excl = rcu_dereference(obj->fence_excl);
|
2016-10-25 20:00:45 +08:00
|
|
|
if (fence_excl && !dma_fence_get_rcu(fence_excl))
|
2016-08-29 15:08:30 +08:00
|
|
|
goto unlock;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
fobj = rcu_dereference(obj->fence);
|
2018-01-10 20:53:41 +08:00
|
|
|
if (fobj)
|
|
|
|
sz += sizeof(*shared) * fobj->shared_max;
|
|
|
|
|
|
|
|
if (!pfence_excl && fence_excl)
|
|
|
|
sz += sizeof(*shared);
|
|
|
|
|
|
|
|
if (sz) {
|
2016-10-25 20:00:45 +08:00
|
|
|
struct dma_fence **nshared;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
|
|
|
nshared = krealloc(shared, sz,
|
|
|
|
GFP_NOWAIT | __GFP_NOWARN);
|
|
|
|
if (!nshared) {
|
|
|
|
rcu_read_unlock();
|
2019-06-04 20:53:23 +08:00
|
|
|
|
|
|
|
dma_fence_put(fence_excl);
|
|
|
|
fence_excl = NULL;
|
|
|
|
|
2014-07-01 18:58:00 +08:00
|
|
|
nshared = krealloc(shared, sz, GFP_KERNEL);
|
|
|
|
if (nshared) {
|
|
|
|
shared = nshared;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = -ENOMEM;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
shared = nshared;
|
2019-08-15 02:24:01 +08:00
|
|
|
shared_count = fobj ? fobj->shared_count : 0;
|
2014-07-01 18:58:00 +08:00
|
|
|
for (i = 0; i < shared_count; ++i) {
|
2016-08-29 15:08:30 +08:00
|
|
|
shared[i] = rcu_dereference(fobj->shared[i]);
|
2016-10-25 20:00:45 +08:00
|
|
|
if (!dma_fence_get_rcu(shared[i]))
|
2016-08-29 15:08:30 +08:00
|
|
|
break;
|
2014-07-01 18:58:00 +08:00
|
|
|
}
|
2016-08-29 15:08:30 +08:00
|
|
|
}
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
if (i != shared_count || read_seqcount_retry(&obj->seq, seq)) {
|
2016-08-29 15:08:30 +08:00
|
|
|
while (i--)
|
2016-10-25 20:00:45 +08:00
|
|
|
dma_fence_put(shared[i]);
|
|
|
|
dma_fence_put(fence_excl);
|
2016-08-29 15:08:30 +08:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = 0;
|
2014-07-01 18:58:00 +08:00
|
|
|
unlock:
|
|
|
|
rcu_read_unlock();
|
2016-08-29 15:08:30 +08:00
|
|
|
} while (ret);
|
|
|
|
|
2019-08-05 17:49:20 +08:00
|
|
|
if (pfence_excl)
|
|
|
|
*pfence_excl = fence_excl;
|
|
|
|
else if (fence_excl)
|
2019-09-22 15:49:00 +08:00
|
|
|
shared[shared_count++] = fence_excl;
|
2019-08-05 17:49:20 +08:00
|
|
|
|
2016-08-29 15:08:30 +08:00
|
|
|
if (!shared_count) {
|
2014-07-01 18:58:00 +08:00
|
|
|
kfree(shared);
|
2016-08-29 15:08:30 +08:00
|
|
|
shared = NULL;
|
2014-07-01 18:58:00 +08:00
|
|
|
}
|
2016-08-29 15:08:30 +08:00
|
|
|
|
|
|
|
*pshared_count = shared_count;
|
|
|
|
*pshared = shared;
|
2014-07-01 18:58:00 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL_GPL(dma_resv_get_fences_rcu);
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2016-04-01 04:26:51 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_wait_timeout_rcu - Wait on reservation's objects
|
2016-04-01 04:26:51 +08:00
|
|
|
* shared and/or exclusive fences.
|
|
|
|
* @obj: the reservation object
|
|
|
|
* @wait_all: if true, wait on all fences, else wait on just exclusive fence
|
|
|
|
* @intr: if true, do interruptible wait
|
|
|
|
* @timeout: timeout value in jiffies or zero to return immediately
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* Returns -ERESTARTSYS if interrupted, 0 if the wait timed out, or
|
|
|
|
* greater than zer on success.
|
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
long dma_resv_wait_timeout_rcu(struct dma_resv *obj,
|
|
|
|
bool wait_all, bool intr,
|
|
|
|
unsigned long timeout)
|
2014-07-01 18:58:00 +08:00
|
|
|
{
|
2016-10-25 20:00:45 +08:00
|
|
|
struct dma_fence *fence;
|
2019-08-15 02:24:01 +08:00
|
|
|
unsigned seq, shared_count;
|
2016-11-08 05:16:16 +08:00
|
|
|
long ret = timeout ? timeout : 1;
|
2018-01-23 04:00:03 +08:00
|
|
|
int i;
|
2015-01-21 18:35:47 +08:00
|
|
|
|
2014-07-01 18:58:00 +08:00
|
|
|
retry:
|
2019-08-15 02:24:01 +08:00
|
|
|
shared_count = 0;
|
|
|
|
seq = read_seqcount_begin(&obj->seq);
|
2014-07-01 18:58:00 +08:00
|
|
|
rcu_read_lock();
|
2018-01-23 04:00:03 +08:00
|
|
|
i = -1;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
fence = rcu_dereference(obj->fence_excl);
|
2017-08-11 01:01:49 +08:00
|
|
|
if (fence && !test_bit(DMA_FENCE_FLAG_SIGNALED_BIT, &fence->flags)) {
|
|
|
|
if (!dma_fence_get_rcu(fence))
|
|
|
|
goto unlock_retry;
|
|
|
|
|
|
|
|
if (dma_fence_is_signaled(fence)) {
|
|
|
|
dma_fence_put(fence);
|
|
|
|
fence = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
fence = NULL;
|
|
|
|
}
|
|
|
|
|
2018-01-23 04:00:03 +08:00
|
|
|
if (wait_all) {
|
2019-08-15 02:24:01 +08:00
|
|
|
struct dma_resv_list *fobj = rcu_dereference(obj->fence);
|
|
|
|
|
|
|
|
if (fobj)
|
|
|
|
shared_count = fobj->shared_count;
|
|
|
|
|
2018-01-23 04:00:03 +08:00
|
|
|
for (i = 0; !fence && i < shared_count; ++i) {
|
2016-10-25 20:00:45 +08:00
|
|
|
struct dma_fence *lfence = rcu_dereference(fobj->shared[i]);
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2016-10-25 20:00:45 +08:00
|
|
|
if (test_bit(DMA_FENCE_FLAG_SIGNALED_BIT,
|
|
|
|
&lfence->flags))
|
2014-07-01 18:58:00 +08:00
|
|
|
continue;
|
|
|
|
|
2016-10-25 20:00:45 +08:00
|
|
|
if (!dma_fence_get_rcu(lfence))
|
2014-07-01 18:58:00 +08:00
|
|
|
goto unlock_retry;
|
|
|
|
|
2016-10-25 20:00:45 +08:00
|
|
|
if (dma_fence_is_signaled(lfence)) {
|
|
|
|
dma_fence_put(lfence);
|
2014-07-01 18:58:00 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
fence = lfence;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rcu_read_unlock();
|
|
|
|
if (fence) {
|
2019-08-15 02:24:01 +08:00
|
|
|
if (read_seqcount_retry(&obj->seq, seq)) {
|
|
|
|
dma_fence_put(fence);
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
2016-10-25 20:00:45 +08:00
|
|
|
ret = dma_fence_wait_timeout(fence, intr, ret);
|
|
|
|
dma_fence_put(fence);
|
2014-07-01 18:58:00 +08:00
|
|
|
if (ret > 0 && wait_all && (i + 1 < shared_count))
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
unlock_retry:
|
|
|
|
rcu_read_unlock();
|
|
|
|
goto retry;
|
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL_GPL(dma_resv_wait_timeout_rcu);
|
2014-07-01 18:58:00 +08:00
|
|
|
|
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
static inline int dma_resv_test_signaled_single(struct dma_fence *passed_fence)
|
2014-07-01 18:58:00 +08:00
|
|
|
{
|
2016-10-25 20:00:45 +08:00
|
|
|
struct dma_fence *fence, *lfence = passed_fence;
|
2014-07-01 18:58:00 +08:00
|
|
|
int ret = 1;
|
|
|
|
|
2016-10-25 20:00:45 +08:00
|
|
|
if (!test_bit(DMA_FENCE_FLAG_SIGNALED_BIT, &lfence->flags)) {
|
|
|
|
fence = dma_fence_get_rcu(lfence);
|
2014-07-01 18:58:00 +08:00
|
|
|
if (!fence)
|
|
|
|
return -1;
|
|
|
|
|
2016-10-25 20:00:45 +08:00
|
|
|
ret = !!dma_fence_is_signaled(fence);
|
|
|
|
dma_fence_put(fence);
|
2014-07-01 18:58:00 +08:00
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-04-01 04:26:51 +08:00
|
|
|
/**
|
2019-08-11 16:06:32 +08:00
|
|
|
* dma_resv_test_signaled_rcu - Test if a reservation object's
|
2016-04-01 04:26:51 +08:00
|
|
|
* fences have been signaled.
|
|
|
|
* @obj: the reservation object
|
|
|
|
* @test_all: if true, test all fences, otherwise only test the exclusive
|
|
|
|
* fence
|
|
|
|
*
|
|
|
|
* RETURNS
|
|
|
|
* true if all fences signaled, else false
|
|
|
|
*/
|
2019-08-11 16:06:32 +08:00
|
|
|
bool dma_resv_test_signaled_rcu(struct dma_resv *obj, bool test_all)
|
2014-07-01 18:58:00 +08:00
|
|
|
{
|
2019-08-15 02:24:01 +08:00
|
|
|
unsigned seq, shared_count;
|
2016-08-29 15:08:32 +08:00
|
|
|
int ret;
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2016-08-29 15:08:32 +08:00
|
|
|
rcu_read_lock();
|
2014-07-01 18:58:00 +08:00
|
|
|
retry:
|
2016-08-29 15:08:32 +08:00
|
|
|
ret = true;
|
2019-08-15 02:24:01 +08:00
|
|
|
shared_count = 0;
|
|
|
|
seq = read_seqcount_begin(&obj->seq);
|
2014-07-01 18:58:00 +08:00
|
|
|
|
|
|
|
if (test_all) {
|
|
|
|
unsigned i;
|
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
struct dma_resv_list *fobj = rcu_dereference(obj->fence);
|
|
|
|
|
|
|
|
if (fobj)
|
|
|
|
shared_count = fobj->shared_count;
|
|
|
|
|
2014-07-01 18:58:00 +08:00
|
|
|
for (i = 0; i < shared_count; ++i) {
|
2016-10-25 20:00:45 +08:00
|
|
|
struct dma_fence *fence = rcu_dereference(fobj->shared[i]);
|
2014-07-01 18:58:00 +08:00
|
|
|
|
2019-08-11 16:06:32 +08:00
|
|
|
ret = dma_resv_test_signaled_single(fence);
|
2014-07-01 18:58:00 +08:00
|
|
|
if (ret < 0)
|
2016-08-29 15:08:32 +08:00
|
|
|
goto retry;
|
2014-07-01 18:58:00 +08:00
|
|
|
else if (!ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
if (read_seqcount_retry(&obj->seq, seq))
|
2019-08-06 20:19:33 +08:00
|
|
|
goto retry;
|
2014-07-01 18:58:00 +08:00
|
|
|
}
|
|
|
|
|
2019-08-15 02:24:01 +08:00
|
|
|
if (!shared_count) {
|
|
|
|
struct dma_fence *fence_excl = rcu_dereference(obj->fence_excl);
|
|
|
|
|
|
|
|
if (fence_excl) {
|
|
|
|
ret = dma_resv_test_signaled_single(fence_excl);
|
|
|
|
if (ret < 0)
|
|
|
|
goto retry;
|
|
|
|
|
|
|
|
if (read_seqcount_retry(&obj->seq, seq))
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-01 18:58:00 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
return ret;
|
|
|
|
}
|
2019-08-11 16:06:32 +08:00
|
|
|
EXPORT_SYMBOL_GPL(dma_resv_test_signaled_rcu);
|