card_dev.c 34 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415
  1. /**
  2. * IBM Accelerator Family 'GenWQE'
  3. *
  4. * (C) Copyright IBM Corp. 2013
  5. *
  6. * Author: Frank Haverkamp <haver@linux.vnet.ibm.com>
  7. * Author: Joerg-Stephan Vogt <jsvogt@de.ibm.com>
  8. * Author: Michael Jung <mijung@de.ibm.com>
  9. * Author: Michael Ruettger <michael@ibmra.de>
  10. *
  11. * This program is free software; you can redistribute it and/or modify
  12. * it under the terms of the GNU General Public License (version 2 only)
  13. * as published by the Free Software Foundation.
  14. *
  15. * This program is distributed in the hope that it will be useful,
  16. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  17. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  18. * GNU General Public License for more details.
  19. */
  20. /*
  21. * Character device representation of the GenWQE device. This allows
  22. * user-space applications to communicate with the card.
  23. */
  24. #include <linux/kernel.h>
  25. #include <linux/types.h>
  26. #include <linux/module.h>
  27. #include <linux/pci.h>
  28. #include <linux/string.h>
  29. #include <linux/fs.h>
  30. #include <linux/sched.h>
  31. #include <linux/wait.h>
  32. #include <linux/delay.h>
  33. #include <linux/atomic.h>
  34. #include "card_base.h"
  35. #include "card_ddcb.h"
  36. static int genwqe_open_files(struct genwqe_dev *cd)
  37. {
  38. int rc;
  39. unsigned long flags;
  40. spin_lock_irqsave(&cd->file_lock, flags);
  41. rc = list_empty(&cd->file_list);
  42. spin_unlock_irqrestore(&cd->file_lock, flags);
  43. return !rc;
  44. }
  45. static void genwqe_add_file(struct genwqe_dev *cd, struct genwqe_file *cfile)
  46. {
  47. unsigned long flags;
  48. cfile->owner = current;
  49. spin_lock_irqsave(&cd->file_lock, flags);
  50. list_add(&cfile->list, &cd->file_list);
  51. spin_unlock_irqrestore(&cd->file_lock, flags);
  52. }
  53. static int genwqe_del_file(struct genwqe_dev *cd, struct genwqe_file *cfile)
  54. {
  55. unsigned long flags;
  56. spin_lock_irqsave(&cd->file_lock, flags);
  57. list_del(&cfile->list);
  58. spin_unlock_irqrestore(&cd->file_lock, flags);
  59. return 0;
  60. }
  61. static void genwqe_add_pin(struct genwqe_file *cfile, struct dma_mapping *m)
  62. {
  63. unsigned long flags;
  64. spin_lock_irqsave(&cfile->pin_lock, flags);
  65. list_add(&m->pin_list, &cfile->pin_list);
  66. spin_unlock_irqrestore(&cfile->pin_lock, flags);
  67. }
  68. static int genwqe_del_pin(struct genwqe_file *cfile, struct dma_mapping *m)
  69. {
  70. unsigned long flags;
  71. spin_lock_irqsave(&cfile->pin_lock, flags);
  72. list_del(&m->pin_list);
  73. spin_unlock_irqrestore(&cfile->pin_lock, flags);
  74. return 0;
  75. }
  76. /**
  77. * genwqe_search_pin() - Search for the mapping for a userspace address
  78. * @cfile: Descriptor of opened file
  79. * @u_addr: User virtual address
  80. * @size: Size of buffer
  81. * @dma_addr: DMA address to be updated
  82. *
  83. * Return: Pointer to the corresponding mapping NULL if not found
  84. */
  85. static struct dma_mapping *genwqe_search_pin(struct genwqe_file *cfile,
  86. unsigned long u_addr,
  87. unsigned int size,
  88. void **virt_addr)
  89. {
  90. unsigned long flags;
  91. struct dma_mapping *m;
  92. spin_lock_irqsave(&cfile->pin_lock, flags);
  93. list_for_each_entry(m, &cfile->pin_list, pin_list) {
  94. if ((((u64)m->u_vaddr) <= (u_addr)) &&
  95. (((u64)m->u_vaddr + m->size) >= (u_addr + size))) {
  96. if (virt_addr)
  97. *virt_addr = m->k_vaddr +
  98. (u_addr - (u64)m->u_vaddr);
  99. spin_unlock_irqrestore(&cfile->pin_lock, flags);
  100. return m;
  101. }
  102. }
  103. spin_unlock_irqrestore(&cfile->pin_lock, flags);
  104. return NULL;
  105. }
  106. static void __genwqe_add_mapping(struct genwqe_file *cfile,
  107. struct dma_mapping *dma_map)
  108. {
  109. unsigned long flags;
  110. spin_lock_irqsave(&cfile->map_lock, flags);
  111. list_add(&dma_map->card_list, &cfile->map_list);
  112. spin_unlock_irqrestore(&cfile->map_lock, flags);
  113. }
  114. static void __genwqe_del_mapping(struct genwqe_file *cfile,
  115. struct dma_mapping *dma_map)
  116. {
  117. unsigned long flags;
  118. spin_lock_irqsave(&cfile->map_lock, flags);
  119. list_del(&dma_map->card_list);
  120. spin_unlock_irqrestore(&cfile->map_lock, flags);
  121. }
  122. /**
  123. * __genwqe_search_mapping() - Search for the mapping for a userspace address
  124. * @cfile: descriptor of opened file
  125. * @u_addr: user virtual address
  126. * @size: size of buffer
  127. * @dma_addr: DMA address to be updated
  128. * Return: Pointer to the corresponding mapping NULL if not found
  129. */
  130. static struct dma_mapping *__genwqe_search_mapping(struct genwqe_file *cfile,
  131. unsigned long u_addr,
  132. unsigned int size,
  133. dma_addr_t *dma_addr,
  134. void **virt_addr)
  135. {
  136. unsigned long flags;
  137. struct dma_mapping *m;
  138. struct pci_dev *pci_dev = cfile->cd->pci_dev;
  139. spin_lock_irqsave(&cfile->map_lock, flags);
  140. list_for_each_entry(m, &cfile->map_list, card_list) {
  141. if ((((u64)m->u_vaddr) <= (u_addr)) &&
  142. (((u64)m->u_vaddr + m->size) >= (u_addr + size))) {
  143. /* match found: current is as expected and
  144. addr is in range */
  145. if (dma_addr)
  146. *dma_addr = m->dma_addr +
  147. (u_addr - (u64)m->u_vaddr);
  148. if (virt_addr)
  149. *virt_addr = m->k_vaddr +
  150. (u_addr - (u64)m->u_vaddr);
  151. spin_unlock_irqrestore(&cfile->map_lock, flags);
  152. return m;
  153. }
  154. }
  155. spin_unlock_irqrestore(&cfile->map_lock, flags);
  156. dev_err(&pci_dev->dev,
  157. "[%s] Entry not found: u_addr=%lx, size=%x\n",
  158. __func__, u_addr, size);
  159. return NULL;
  160. }
  161. static void genwqe_remove_mappings(struct genwqe_file *cfile)
  162. {
  163. int i = 0;
  164. struct list_head *node, *next;
  165. struct dma_mapping *dma_map;
  166. struct genwqe_dev *cd = cfile->cd;
  167. struct pci_dev *pci_dev = cfile->cd->pci_dev;
  168. list_for_each_safe(node, next, &cfile->map_list) {
  169. dma_map = list_entry(node, struct dma_mapping, card_list);
  170. list_del_init(&dma_map->card_list);
  171. /*
  172. * This is really a bug, because those things should
  173. * have been already tidied up.
  174. *
  175. * GENWQE_MAPPING_RAW should have been removed via mmunmap().
  176. * GENWQE_MAPPING_SGL_TEMP should be removed by tidy up code.
  177. */
  178. dev_err(&pci_dev->dev,
  179. "[%s] %d. cleanup mapping: u_vaddr=%p "
  180. "u_kaddr=%016lx dma_addr=%lx\n", __func__, i++,
  181. dma_map->u_vaddr, (unsigned long)dma_map->k_vaddr,
  182. (unsigned long)dma_map->dma_addr);
  183. if (dma_map->type == GENWQE_MAPPING_RAW) {
  184. /* we allocated this dynamically */
  185. __genwqe_free_consistent(cd, dma_map->size,
  186. dma_map->k_vaddr,
  187. dma_map->dma_addr);
  188. kfree(dma_map);
  189. } else if (dma_map->type == GENWQE_MAPPING_SGL_TEMP) {
  190. /* we use dma_map statically from the request */
  191. genwqe_user_vunmap(cd, dma_map, NULL);
  192. }
  193. }
  194. }
  195. static void genwqe_remove_pinnings(struct genwqe_file *cfile)
  196. {
  197. struct list_head *node, *next;
  198. struct dma_mapping *dma_map;
  199. struct genwqe_dev *cd = cfile->cd;
  200. list_for_each_safe(node, next, &cfile->pin_list) {
  201. dma_map = list_entry(node, struct dma_mapping, pin_list);
  202. /*
  203. * This is not a bug, because a killed processed might
  204. * not call the unpin ioctl, which is supposed to free
  205. * the resources.
  206. *
  207. * Pinnings are dymically allocated and need to be
  208. * deleted.
  209. */
  210. list_del_init(&dma_map->pin_list);
  211. genwqe_user_vunmap(cd, dma_map, NULL);
  212. kfree(dma_map);
  213. }
  214. }
  215. /**
  216. * genwqe_kill_fasync() - Send signal to all processes with open GenWQE files
  217. *
  218. * E.g. genwqe_send_signal(cd, SIGIO);
  219. */
  220. static int genwqe_kill_fasync(struct genwqe_dev *cd, int sig)
  221. {
  222. unsigned int files = 0;
  223. unsigned long flags;
  224. struct genwqe_file *cfile;
  225. spin_lock_irqsave(&cd->file_lock, flags);
  226. list_for_each_entry(cfile, &cd->file_list, list) {
  227. if (cfile->async_queue)
  228. kill_fasync(&cfile->async_queue, sig, POLL_HUP);
  229. files++;
  230. }
  231. spin_unlock_irqrestore(&cd->file_lock, flags);
  232. return files;
  233. }
  234. static int genwqe_force_sig(struct genwqe_dev *cd, int sig)
  235. {
  236. unsigned int files = 0;
  237. unsigned long flags;
  238. struct genwqe_file *cfile;
  239. spin_lock_irqsave(&cd->file_lock, flags);
  240. list_for_each_entry(cfile, &cd->file_list, list) {
  241. force_sig(sig, cfile->owner);
  242. files++;
  243. }
  244. spin_unlock_irqrestore(&cd->file_lock, flags);
  245. return files;
  246. }
  247. /**
  248. * genwqe_open() - file open
  249. * @inode: file system information
  250. * @filp: file handle
  251. *
  252. * This function is executed whenever an application calls
  253. * open("/dev/genwqe",..).
  254. *
  255. * Return: 0 if successful or <0 if errors
  256. */
  257. static int genwqe_open(struct inode *inode, struct file *filp)
  258. {
  259. struct genwqe_dev *cd;
  260. struct genwqe_file *cfile;
  261. struct pci_dev *pci_dev;
  262. cfile = kzalloc(sizeof(*cfile), GFP_KERNEL);
  263. if (cfile == NULL)
  264. return -ENOMEM;
  265. cd = container_of(inode->i_cdev, struct genwqe_dev, cdev_genwqe);
  266. pci_dev = cd->pci_dev;
  267. cfile->cd = cd;
  268. cfile->filp = filp;
  269. cfile->client = NULL;
  270. spin_lock_init(&cfile->map_lock); /* list of raw memory allocations */
  271. INIT_LIST_HEAD(&cfile->map_list);
  272. spin_lock_init(&cfile->pin_lock); /* list of user pinned memory */
  273. INIT_LIST_HEAD(&cfile->pin_list);
  274. filp->private_data = cfile;
  275. genwqe_add_file(cd, cfile);
  276. return 0;
  277. }
  278. /**
  279. * genwqe_fasync() - Setup process to receive SIGIO.
  280. * @fd: file descriptor
  281. * @filp: file handle
  282. * @mode: file mode
  283. *
  284. * Sending a signal is working as following:
  285. *
  286. * if (cdev->async_queue)
  287. * kill_fasync(&cdev->async_queue, SIGIO, POLL_IN);
  288. *
  289. * Some devices also implement asynchronous notification to indicate
  290. * when the device can be written; in this case, of course,
  291. * kill_fasync must be called with a mode of POLL_OUT.
  292. */
  293. static int genwqe_fasync(int fd, struct file *filp, int mode)
  294. {
  295. struct genwqe_file *cdev = (struct genwqe_file *)filp->private_data;
  296. return fasync_helper(fd, filp, mode, &cdev->async_queue);
  297. }
  298. /**
  299. * genwqe_release() - file close
  300. * @inode: file system information
  301. * @filp: file handle
  302. *
  303. * This function is executed whenever an application calls 'close(fd_genwqe)'
  304. *
  305. * Return: always 0
  306. */
  307. static int genwqe_release(struct inode *inode, struct file *filp)
  308. {
  309. struct genwqe_file *cfile = (struct genwqe_file *)filp->private_data;
  310. struct genwqe_dev *cd = cfile->cd;
  311. /* there must be no entries in these lists! */
  312. genwqe_remove_mappings(cfile);
  313. genwqe_remove_pinnings(cfile);
  314. /* remove this filp from the asynchronously notified filp's */
  315. genwqe_fasync(-1, filp, 0);
  316. /*
  317. * For this to work we must not release cd when this cfile is
  318. * not yet released, otherwise the list entry is invalid,
  319. * because the list itself gets reinstantiated!
  320. */
  321. genwqe_del_file(cd, cfile);
  322. kfree(cfile);
  323. return 0;
  324. }
  325. static void genwqe_vma_open(struct vm_area_struct *vma)
  326. {
  327. /* nothing ... */
  328. }
  329. /**
  330. * genwqe_vma_close() - Called each time when vma is unmapped
  331. *
  332. * Free memory which got allocated by GenWQE mmap().
  333. */
  334. static void genwqe_vma_close(struct vm_area_struct *vma)
  335. {
  336. unsigned long vsize = vma->vm_end - vma->vm_start;
  337. struct inode *inode = vma->vm_file->f_dentry->d_inode;
  338. struct dma_mapping *dma_map;
  339. struct genwqe_dev *cd = container_of(inode->i_cdev, struct genwqe_dev,
  340. cdev_genwqe);
  341. struct pci_dev *pci_dev = cd->pci_dev;
  342. dma_addr_t d_addr = 0;
  343. struct genwqe_file *cfile = vma->vm_private_data;
  344. dma_map = __genwqe_search_mapping(cfile, vma->vm_start, vsize,
  345. &d_addr, NULL);
  346. if (dma_map == NULL) {
  347. dev_err(&pci_dev->dev,
  348. " [%s] err: mapping not found: v=%lx, p=%lx s=%lx\n",
  349. __func__, vma->vm_start, vma->vm_pgoff << PAGE_SHIFT,
  350. vsize);
  351. return;
  352. }
  353. __genwqe_del_mapping(cfile, dma_map);
  354. __genwqe_free_consistent(cd, dma_map->size, dma_map->k_vaddr,
  355. dma_map->dma_addr);
  356. kfree(dma_map);
  357. }
  358. static struct vm_operations_struct genwqe_vma_ops = {
  359. .open = genwqe_vma_open,
  360. .close = genwqe_vma_close,
  361. };
  362. /**
  363. * genwqe_mmap() - Provide contignous buffers to userspace
  364. *
  365. * We use mmap() to allocate contignous buffers used for DMA
  366. * transfers. After the buffer is allocated we remap it to user-space
  367. * and remember a reference to our dma_mapping data structure, where
  368. * we store the associated DMA address and allocated size.
  369. *
  370. * When we receive a DDCB execution request with the ATS bits set to
  371. * plain buffer, we lookup our dma_mapping list to find the
  372. * corresponding DMA address for the associated user-space address.
  373. */
  374. static int genwqe_mmap(struct file *filp, struct vm_area_struct *vma)
  375. {
  376. int rc;
  377. unsigned long pfn, vsize = vma->vm_end - vma->vm_start;
  378. struct genwqe_file *cfile = (struct genwqe_file *)filp->private_data;
  379. struct genwqe_dev *cd = cfile->cd;
  380. struct dma_mapping *dma_map;
  381. if (vsize == 0)
  382. return -EINVAL;
  383. if (get_order(vsize) > MAX_ORDER)
  384. return -ENOMEM;
  385. dma_map = kzalloc(sizeof(struct dma_mapping), GFP_ATOMIC);
  386. if (dma_map == NULL)
  387. return -ENOMEM;
  388. genwqe_mapping_init(dma_map, GENWQE_MAPPING_RAW);
  389. dma_map->u_vaddr = (void *)vma->vm_start;
  390. dma_map->size = vsize;
  391. dma_map->nr_pages = DIV_ROUND_UP(vsize, PAGE_SIZE);
  392. dma_map->k_vaddr = __genwqe_alloc_consistent(cd, vsize,
  393. &dma_map->dma_addr);
  394. if (dma_map->k_vaddr == NULL) {
  395. rc = -ENOMEM;
  396. goto free_dma_map;
  397. }
  398. if (capable(CAP_SYS_ADMIN) && (vsize > sizeof(dma_addr_t)))
  399. *(dma_addr_t *)dma_map->k_vaddr = dma_map->dma_addr;
  400. pfn = virt_to_phys(dma_map->k_vaddr) >> PAGE_SHIFT;
  401. rc = remap_pfn_range(vma,
  402. vma->vm_start,
  403. pfn,
  404. vsize,
  405. vma->vm_page_prot);
  406. if (rc != 0) {
  407. rc = -EFAULT;
  408. goto free_dma_mem;
  409. }
  410. vma->vm_private_data = cfile;
  411. vma->vm_ops = &genwqe_vma_ops;
  412. __genwqe_add_mapping(cfile, dma_map);
  413. return 0;
  414. free_dma_mem:
  415. __genwqe_free_consistent(cd, dma_map->size,
  416. dma_map->k_vaddr,
  417. dma_map->dma_addr);
  418. free_dma_map:
  419. kfree(dma_map);
  420. return rc;
  421. }
  422. /**
  423. * do_flash_update() - Excute flash update (write image or CVPD)
  424. * @cd: genwqe device
  425. * @load: details about image load
  426. *
  427. * Return: 0 if successful
  428. */
  429. #define FLASH_BLOCK 0x40000 /* we use 256k blocks */
  430. static int do_flash_update(struct genwqe_file *cfile,
  431. struct genwqe_bitstream *load)
  432. {
  433. int rc = 0;
  434. int blocks_to_flash;
  435. dma_addr_t dma_addr;
  436. u64 flash = 0;
  437. size_t tocopy = 0;
  438. u8 __user *buf;
  439. u8 *xbuf;
  440. u32 crc;
  441. u8 cmdopts;
  442. struct genwqe_dev *cd = cfile->cd;
  443. struct pci_dev *pci_dev = cd->pci_dev;
  444. if ((load->size & 0x3) != 0)
  445. return -EINVAL;
  446. if (((unsigned long)(load->data_addr) & ~PAGE_MASK) != 0)
  447. return -EINVAL;
  448. /* FIXME Bits have changed for new service layer! */
  449. switch ((char)load->partition) {
  450. case '0':
  451. cmdopts = 0x14;
  452. break; /* download/erase_first/part_0 */
  453. case '1':
  454. cmdopts = 0x1C;
  455. break; /* download/erase_first/part_1 */
  456. case 'v': /* cmdopts = 0x0c (VPD) */
  457. default:
  458. return -EINVAL;
  459. }
  460. buf = (u8 __user *)load->data_addr;
  461. xbuf = __genwqe_alloc_consistent(cd, FLASH_BLOCK, &dma_addr);
  462. if (xbuf == NULL)
  463. return -ENOMEM;
  464. blocks_to_flash = load->size / FLASH_BLOCK;
  465. while (load->size) {
  466. struct genwqe_ddcb_cmd *req;
  467. /*
  468. * We must be 4 byte aligned. Buffer must be 0 appened
  469. * to have defined values when calculating CRC.
  470. */
  471. tocopy = min_t(size_t, load->size, FLASH_BLOCK);
  472. rc = copy_from_user(xbuf, buf, tocopy);
  473. if (rc) {
  474. rc = -EFAULT;
  475. goto free_buffer;
  476. }
  477. crc = genwqe_crc32(xbuf, tocopy, 0xffffffff);
  478. dev_dbg(&pci_dev->dev,
  479. "[%s] DMA: %lx CRC: %08x SZ: %ld %d\n",
  480. __func__, (unsigned long)dma_addr, crc, tocopy,
  481. blocks_to_flash);
  482. /* prepare DDCB for SLU process */
  483. req = ddcb_requ_alloc();
  484. if (req == NULL) {
  485. rc = -ENOMEM;
  486. goto free_buffer;
  487. }
  488. req->cmd = SLCMD_MOVE_FLASH;
  489. req->cmdopts = cmdopts;
  490. /* prepare invariant values */
  491. if (genwqe_get_slu_id(cd) <= 0x2) {
  492. *(__be64 *)&req->__asiv[0] = cpu_to_be64(dma_addr);
  493. *(__be64 *)&req->__asiv[8] = cpu_to_be64(tocopy);
  494. *(__be64 *)&req->__asiv[16] = cpu_to_be64(flash);
  495. *(__be32 *)&req->__asiv[24] = cpu_to_be32(0);
  496. req->__asiv[24] = load->uid;
  497. *(__be32 *)&req->__asiv[28] = cpu_to_be32(crc);
  498. /* for simulation only */
  499. *(__be64 *)&req->__asiv[88] = cpu_to_be64(load->slu_id);
  500. *(__be64 *)&req->__asiv[96] = cpu_to_be64(load->app_id);
  501. req->asiv_length = 32; /* bytes included in crc calc */
  502. } else { /* setup DDCB for ATS architecture */
  503. *(__be64 *)&req->asiv[0] = cpu_to_be64(dma_addr);
  504. *(__be32 *)&req->asiv[8] = cpu_to_be32(tocopy);
  505. *(__be32 *)&req->asiv[12] = cpu_to_be32(0); /* resvd */
  506. *(__be64 *)&req->asiv[16] = cpu_to_be64(flash);
  507. *(__be32 *)&req->asiv[24] = cpu_to_be32(load->uid<<24);
  508. *(__be32 *)&req->asiv[28] = cpu_to_be32(crc);
  509. /* for simulation only */
  510. *(__be64 *)&req->asiv[80] = cpu_to_be64(load->slu_id);
  511. *(__be64 *)&req->asiv[88] = cpu_to_be64(load->app_id);
  512. /* Rd only */
  513. req->ats = 0x4ULL << 44;
  514. req->asiv_length = 40; /* bytes included in crc calc */
  515. }
  516. req->asv_length = 8;
  517. /* For Genwqe5 we get back the calculated CRC */
  518. *(u64 *)&req->asv[0] = 0ULL; /* 0x80 */
  519. rc = __genwqe_execute_raw_ddcb(cd, req);
  520. load->retc = req->retc;
  521. load->attn = req->attn;
  522. load->progress = req->progress;
  523. if (rc < 0) {
  524. ddcb_requ_free(req);
  525. goto free_buffer;
  526. }
  527. if (req->retc != DDCB_RETC_COMPLETE) {
  528. rc = -EIO;
  529. ddcb_requ_free(req);
  530. goto free_buffer;
  531. }
  532. load->size -= tocopy;
  533. flash += tocopy;
  534. buf += tocopy;
  535. blocks_to_flash--;
  536. ddcb_requ_free(req);
  537. }
  538. free_buffer:
  539. __genwqe_free_consistent(cd, FLASH_BLOCK, xbuf, dma_addr);
  540. return rc;
  541. }
  542. static int do_flash_read(struct genwqe_file *cfile,
  543. struct genwqe_bitstream *load)
  544. {
  545. int rc, blocks_to_flash;
  546. dma_addr_t dma_addr;
  547. u64 flash = 0;
  548. size_t tocopy = 0;
  549. u8 __user *buf;
  550. u8 *xbuf;
  551. u8 cmdopts;
  552. struct genwqe_dev *cd = cfile->cd;
  553. struct pci_dev *pci_dev = cd->pci_dev;
  554. struct genwqe_ddcb_cmd *cmd;
  555. if ((load->size & 0x3) != 0)
  556. return -EINVAL;
  557. if (((unsigned long)(load->data_addr) & ~PAGE_MASK) != 0)
  558. return -EINVAL;
  559. /* FIXME Bits have changed for new service layer! */
  560. switch ((char)load->partition) {
  561. case '0':
  562. cmdopts = 0x12;
  563. break; /* upload/part_0 */
  564. case '1':
  565. cmdopts = 0x1A;
  566. break; /* upload/part_1 */
  567. case 'v':
  568. default:
  569. return -EINVAL;
  570. }
  571. buf = (u8 __user *)load->data_addr;
  572. xbuf = __genwqe_alloc_consistent(cd, FLASH_BLOCK, &dma_addr);
  573. if (xbuf == NULL)
  574. return -ENOMEM;
  575. blocks_to_flash = load->size / FLASH_BLOCK;
  576. while (load->size) {
  577. /*
  578. * We must be 4 byte aligned. Buffer must be 0 appened
  579. * to have defined values when calculating CRC.
  580. */
  581. tocopy = min_t(size_t, load->size, FLASH_BLOCK);
  582. dev_dbg(&pci_dev->dev,
  583. "[%s] DMA: %lx SZ: %ld %d\n",
  584. __func__, (unsigned long)dma_addr, tocopy,
  585. blocks_to_flash);
  586. /* prepare DDCB for SLU process */
  587. cmd = ddcb_requ_alloc();
  588. if (cmd == NULL) {
  589. rc = -ENOMEM;
  590. goto free_buffer;
  591. }
  592. cmd->cmd = SLCMD_MOVE_FLASH;
  593. cmd->cmdopts = cmdopts;
  594. /* prepare invariant values */
  595. if (genwqe_get_slu_id(cd) <= 0x2) {
  596. *(__be64 *)&cmd->__asiv[0] = cpu_to_be64(dma_addr);
  597. *(__be64 *)&cmd->__asiv[8] = cpu_to_be64(tocopy);
  598. *(__be64 *)&cmd->__asiv[16] = cpu_to_be64(flash);
  599. *(__be32 *)&cmd->__asiv[24] = cpu_to_be32(0);
  600. cmd->__asiv[24] = load->uid;
  601. *(__be32 *)&cmd->__asiv[28] = cpu_to_be32(0) /* CRC */;
  602. cmd->asiv_length = 32; /* bytes included in crc calc */
  603. } else { /* setup DDCB for ATS architecture */
  604. *(__be64 *)&cmd->asiv[0] = cpu_to_be64(dma_addr);
  605. *(__be32 *)&cmd->asiv[8] = cpu_to_be32(tocopy);
  606. *(__be32 *)&cmd->asiv[12] = cpu_to_be32(0); /* resvd */
  607. *(__be64 *)&cmd->asiv[16] = cpu_to_be64(flash);
  608. *(__be32 *)&cmd->asiv[24] = cpu_to_be32(load->uid<<24);
  609. *(__be32 *)&cmd->asiv[28] = cpu_to_be32(0); /* CRC */
  610. /* rd/wr */
  611. cmd->ats = 0x5ULL << 44;
  612. cmd->asiv_length = 40; /* bytes included in crc calc */
  613. }
  614. cmd->asv_length = 8;
  615. /* we only get back the calculated CRC */
  616. *(u64 *)&cmd->asv[0] = 0ULL; /* 0x80 */
  617. rc = __genwqe_execute_raw_ddcb(cd, cmd);
  618. load->retc = cmd->retc;
  619. load->attn = cmd->attn;
  620. load->progress = cmd->progress;
  621. if ((rc < 0) && (rc != -EBADMSG)) {
  622. ddcb_requ_free(cmd);
  623. goto free_buffer;
  624. }
  625. rc = copy_to_user(buf, xbuf, tocopy);
  626. if (rc) {
  627. rc = -EFAULT;
  628. ddcb_requ_free(cmd);
  629. goto free_buffer;
  630. }
  631. /* We know that we can get retc 0x104 with CRC err */
  632. if (((cmd->retc == DDCB_RETC_FAULT) &&
  633. (cmd->attn != 0x02)) || /* Normally ignore CRC error */
  634. ((cmd->retc == DDCB_RETC_COMPLETE) &&
  635. (cmd->attn != 0x00))) { /* Everything was fine */
  636. rc = -EIO;
  637. ddcb_requ_free(cmd);
  638. goto free_buffer;
  639. }
  640. load->size -= tocopy;
  641. flash += tocopy;
  642. buf += tocopy;
  643. blocks_to_flash--;
  644. ddcb_requ_free(cmd);
  645. }
  646. rc = 0;
  647. free_buffer:
  648. __genwqe_free_consistent(cd, FLASH_BLOCK, xbuf, dma_addr);
  649. return rc;
  650. }
  651. static int genwqe_pin_mem(struct genwqe_file *cfile, struct genwqe_mem *m)
  652. {
  653. int rc;
  654. struct genwqe_dev *cd = cfile->cd;
  655. struct pci_dev *pci_dev = cfile->cd->pci_dev;
  656. struct dma_mapping *dma_map;
  657. unsigned long map_addr;
  658. unsigned long map_size;
  659. if ((m->addr == 0x0) || (m->size == 0))
  660. return -EINVAL;
  661. map_addr = (m->addr & PAGE_MASK);
  662. map_size = round_up(m->size + (m->addr & ~PAGE_MASK), PAGE_SIZE);
  663. dma_map = kzalloc(sizeof(struct dma_mapping), GFP_ATOMIC);
  664. if (dma_map == NULL)
  665. return -ENOMEM;
  666. genwqe_mapping_init(dma_map, GENWQE_MAPPING_SGL_PINNED);
  667. rc = genwqe_user_vmap(cd, dma_map, (void *)map_addr, map_size, NULL);
  668. if (rc != 0) {
  669. dev_err(&pci_dev->dev,
  670. "[%s] genwqe_user_vmap rc=%d\n", __func__, rc);
  671. kfree(dma_map);
  672. return rc;
  673. }
  674. genwqe_add_pin(cfile, dma_map);
  675. return 0;
  676. }
  677. static int genwqe_unpin_mem(struct genwqe_file *cfile, struct genwqe_mem *m)
  678. {
  679. struct genwqe_dev *cd = cfile->cd;
  680. struct dma_mapping *dma_map;
  681. unsigned long map_addr;
  682. unsigned long map_size;
  683. if (m->addr == 0x0)
  684. return -EINVAL;
  685. map_addr = (m->addr & PAGE_MASK);
  686. map_size = round_up(m->size + (m->addr & ~PAGE_MASK), PAGE_SIZE);
  687. dma_map = genwqe_search_pin(cfile, map_addr, map_size, NULL);
  688. if (dma_map == NULL)
  689. return -ENOENT;
  690. genwqe_del_pin(cfile, dma_map);
  691. genwqe_user_vunmap(cd, dma_map, NULL);
  692. kfree(dma_map);
  693. return 0;
  694. }
  695. /**
  696. * ddcb_cmd_cleanup() - Remove dynamically created fixup entries
  697. *
  698. * Only if there are any. Pinnings are not removed.
  699. */
  700. static int ddcb_cmd_cleanup(struct genwqe_file *cfile, struct ddcb_requ *req)
  701. {
  702. unsigned int i;
  703. struct dma_mapping *dma_map;
  704. struct genwqe_dev *cd = cfile->cd;
  705. for (i = 0; i < DDCB_FIXUPS; i++) {
  706. dma_map = &req->dma_mappings[i];
  707. if (dma_mapping_used(dma_map)) {
  708. __genwqe_del_mapping(cfile, dma_map);
  709. genwqe_user_vunmap(cd, dma_map, req);
  710. }
  711. if (req->sgl[i] != NULL) {
  712. genwqe_free_sgl(cd, req->sgl[i],
  713. req->sgl_dma_addr[i],
  714. req->sgl_size[i]);
  715. req->sgl[i] = NULL;
  716. req->sgl_dma_addr[i] = 0x0;
  717. req->sgl_size[i] = 0;
  718. }
  719. }
  720. return 0;
  721. }
  722. /**
  723. * ddcb_cmd_fixups() - Establish DMA fixups/sglists for user memory references
  724. *
  725. * Before the DDCB gets executed we need to handle the fixups. We
  726. * replace the user-space addresses with DMA addresses or do
  727. * additional setup work e.g. generating a scatter-gather list which
  728. * is used to describe the memory referred to in the fixup.
  729. */
  730. static int ddcb_cmd_fixups(struct genwqe_file *cfile, struct ddcb_requ *req)
  731. {
  732. int rc;
  733. unsigned int asiv_offs, i;
  734. struct genwqe_dev *cd = cfile->cd;
  735. struct genwqe_ddcb_cmd *cmd = &req->cmd;
  736. struct dma_mapping *m;
  737. const char *type = "UNKNOWN";
  738. for (i = 0, asiv_offs = 0x00; asiv_offs <= 0x58;
  739. i++, asiv_offs += 0x08) {
  740. u64 u_addr;
  741. dma_addr_t d_addr;
  742. u32 u_size = 0;
  743. u64 ats_flags;
  744. ats_flags = ATS_GET_FLAGS(cmd->ats, asiv_offs);
  745. switch (ats_flags) {
  746. case ATS_TYPE_DATA:
  747. break; /* nothing to do here */
  748. case ATS_TYPE_FLAT_RDWR:
  749. case ATS_TYPE_FLAT_RD: {
  750. u_addr = be64_to_cpu(*((__be64 *)&cmd->
  751. asiv[asiv_offs]));
  752. u_size = be32_to_cpu(*((__be32 *)&cmd->
  753. asiv[asiv_offs + 0x08]));
  754. /*
  755. * No data available. Ignore u_addr in this
  756. * case and set addr to 0. Hardware must not
  757. * fetch the buffer.
  758. */
  759. if (u_size == 0x0) {
  760. *((__be64 *)&cmd->asiv[asiv_offs]) =
  761. cpu_to_be64(0x0);
  762. break;
  763. }
  764. m = __genwqe_search_mapping(cfile, u_addr, u_size,
  765. &d_addr, NULL);
  766. if (m == NULL) {
  767. rc = -EFAULT;
  768. goto err_out;
  769. }
  770. *((__be64 *)&cmd->asiv[asiv_offs]) =
  771. cpu_to_be64(d_addr);
  772. break;
  773. }
  774. case ATS_TYPE_SGL_RDWR:
  775. case ATS_TYPE_SGL_RD: {
  776. int page_offs, nr_pages, offs;
  777. u_addr = be64_to_cpu(*((__be64 *)
  778. &cmd->asiv[asiv_offs]));
  779. u_size = be32_to_cpu(*((__be32 *)
  780. &cmd->asiv[asiv_offs + 0x08]));
  781. /*
  782. * No data available. Ignore u_addr in this
  783. * case and set addr to 0. Hardware must not
  784. * fetch the empty sgl.
  785. */
  786. if (u_size == 0x0) {
  787. *((__be64 *)&cmd->asiv[asiv_offs]) =
  788. cpu_to_be64(0x0);
  789. break;
  790. }
  791. m = genwqe_search_pin(cfile, u_addr, u_size, NULL);
  792. if (m != NULL) {
  793. type = "PINNING";
  794. page_offs = (u_addr -
  795. (u64)m->u_vaddr)/PAGE_SIZE;
  796. } else {
  797. type = "MAPPING";
  798. m = &req->dma_mappings[i];
  799. genwqe_mapping_init(m,
  800. GENWQE_MAPPING_SGL_TEMP);
  801. rc = genwqe_user_vmap(cd, m, (void *)u_addr,
  802. u_size, req);
  803. if (rc != 0)
  804. goto err_out;
  805. __genwqe_add_mapping(cfile, m);
  806. page_offs = 0;
  807. }
  808. offs = offset_in_page(u_addr);
  809. nr_pages = DIV_ROUND_UP(offs + u_size, PAGE_SIZE);
  810. /* create genwqe style scatter gather list */
  811. req->sgl[i] = genwqe_alloc_sgl(cd, m->nr_pages,
  812. &req->sgl_dma_addr[i],
  813. &req->sgl_size[i]);
  814. if (req->sgl[i] == NULL) {
  815. rc = -ENOMEM;
  816. goto err_out;
  817. }
  818. genwqe_setup_sgl(cd, offs, u_size,
  819. req->sgl[i],
  820. req->sgl_dma_addr[i],
  821. req->sgl_size[i],
  822. m->dma_list,
  823. page_offs,
  824. nr_pages);
  825. *((__be64 *)&cmd->asiv[asiv_offs]) =
  826. cpu_to_be64(req->sgl_dma_addr[i]);
  827. break;
  828. }
  829. default:
  830. rc = -EINVAL;
  831. goto err_out;
  832. }
  833. }
  834. return 0;
  835. err_out:
  836. ddcb_cmd_cleanup(cfile, req);
  837. return rc;
  838. }
  839. /**
  840. * genwqe_execute_ddcb() - Execute DDCB using userspace address fixups
  841. *
  842. * The code will build up the translation tables or lookup the
  843. * contignous memory allocation table to find the right translations
  844. * and DMA addresses.
  845. */
  846. static int genwqe_execute_ddcb(struct genwqe_file *cfile,
  847. struct genwqe_ddcb_cmd *cmd)
  848. {
  849. int rc;
  850. struct genwqe_dev *cd = cfile->cd;
  851. struct ddcb_requ *req = container_of(cmd, struct ddcb_requ, cmd);
  852. rc = ddcb_cmd_fixups(cfile, req);
  853. if (rc != 0)
  854. return rc;
  855. rc = __genwqe_execute_raw_ddcb(cd, cmd);
  856. ddcb_cmd_cleanup(cfile, req);
  857. return rc;
  858. }
  859. static int do_execute_ddcb(struct genwqe_file *cfile,
  860. unsigned long arg, int raw)
  861. {
  862. int rc;
  863. struct genwqe_ddcb_cmd *cmd;
  864. struct ddcb_requ *req;
  865. struct genwqe_dev *cd = cfile->cd;
  866. cmd = ddcb_requ_alloc();
  867. if (cmd == NULL)
  868. return -ENOMEM;
  869. req = container_of(cmd, struct ddcb_requ, cmd);
  870. if (copy_from_user(cmd, (void __user *)arg, sizeof(*cmd))) {
  871. ddcb_requ_free(cmd);
  872. return -EFAULT;
  873. }
  874. if (!raw)
  875. rc = genwqe_execute_ddcb(cfile, cmd);
  876. else
  877. rc = __genwqe_execute_raw_ddcb(cd, cmd);
  878. /* Copy back only the modifed fields. Do not copy ASIV
  879. back since the copy got modified by the driver. */
  880. if (copy_to_user((void __user *)arg, cmd,
  881. sizeof(*cmd) - DDCB_ASIV_LENGTH)) {
  882. ddcb_requ_free(cmd);
  883. return -EFAULT;
  884. }
  885. ddcb_requ_free(cmd);
  886. return rc;
  887. }
  888. /**
  889. * genwqe_ioctl() - IO control
  890. * @filp: file handle
  891. * @cmd: command identifier (passed from user)
  892. * @arg: argument (passed from user)
  893. *
  894. * Return: 0 success
  895. */
  896. static long genwqe_ioctl(struct file *filp, unsigned int cmd,
  897. unsigned long arg)
  898. {
  899. int rc = 0;
  900. struct genwqe_file *cfile = (struct genwqe_file *)filp->private_data;
  901. struct genwqe_dev *cd = cfile->cd;
  902. struct genwqe_reg_io __user *io;
  903. u64 val;
  904. u32 reg_offs;
  905. if (_IOC_TYPE(cmd) != GENWQE_IOC_CODE)
  906. return -EINVAL;
  907. switch (cmd) {
  908. case GENWQE_GET_CARD_STATE:
  909. put_user(cd->card_state, (enum genwqe_card_state __user *)arg);
  910. return 0;
  911. /* Register access */
  912. case GENWQE_READ_REG64: {
  913. io = (struct genwqe_reg_io __user *)arg;
  914. if (get_user(reg_offs, &io->num))
  915. return -EFAULT;
  916. if ((reg_offs >= cd->mmio_len) || (reg_offs & 0x7))
  917. return -EINVAL;
  918. val = __genwqe_readq(cd, reg_offs);
  919. put_user(val, &io->val64);
  920. return 0;
  921. }
  922. case GENWQE_WRITE_REG64: {
  923. io = (struct genwqe_reg_io __user *)arg;
  924. if (!capable(CAP_SYS_ADMIN))
  925. return -EPERM;
  926. if ((filp->f_flags & O_ACCMODE) == O_RDONLY)
  927. return -EPERM;
  928. if (get_user(reg_offs, &io->num))
  929. return -EFAULT;
  930. if ((reg_offs >= cd->mmio_len) || (reg_offs & 0x7))
  931. return -EINVAL;
  932. if (get_user(val, &io->val64))
  933. return -EFAULT;
  934. __genwqe_writeq(cd, reg_offs, val);
  935. return 0;
  936. }
  937. case GENWQE_READ_REG32: {
  938. io = (struct genwqe_reg_io __user *)arg;
  939. if (get_user(reg_offs, &io->num))
  940. return -EFAULT;
  941. if ((reg_offs >= cd->mmio_len) || (reg_offs & 0x3))
  942. return -EINVAL;
  943. val = __genwqe_readl(cd, reg_offs);
  944. put_user(val, &io->val64);
  945. return 0;
  946. }
  947. case GENWQE_WRITE_REG32: {
  948. io = (struct genwqe_reg_io __user *)arg;
  949. if (!capable(CAP_SYS_ADMIN))
  950. return -EPERM;
  951. if ((filp->f_flags & O_ACCMODE) == O_RDONLY)
  952. return -EPERM;
  953. if (get_user(reg_offs, &io->num))
  954. return -EFAULT;
  955. if ((reg_offs >= cd->mmio_len) || (reg_offs & 0x3))
  956. return -EINVAL;
  957. if (get_user(val, &io->val64))
  958. return -EFAULT;
  959. __genwqe_writel(cd, reg_offs, val);
  960. return 0;
  961. }
  962. /* Flash update/reading */
  963. case GENWQE_SLU_UPDATE: {
  964. struct genwqe_bitstream load;
  965. if (!genwqe_is_privileged(cd))
  966. return -EPERM;
  967. if ((filp->f_flags & O_ACCMODE) == O_RDONLY)
  968. return -EPERM;
  969. if (copy_from_user(&load, (void __user *)arg,
  970. sizeof(load)))
  971. return -EFAULT;
  972. rc = do_flash_update(cfile, &load);
  973. if (copy_to_user((void __user *)arg, &load, sizeof(load)))
  974. return -EFAULT;
  975. return rc;
  976. }
  977. case GENWQE_SLU_READ: {
  978. struct genwqe_bitstream load;
  979. if (!genwqe_is_privileged(cd))
  980. return -EPERM;
  981. if (genwqe_flash_readback_fails(cd))
  982. return -ENOSPC; /* known to fail for old versions */
  983. if (copy_from_user(&load, (void __user *)arg, sizeof(load)))
  984. return -EFAULT;
  985. rc = do_flash_read(cfile, &load);
  986. if (copy_to_user((void __user *)arg, &load, sizeof(load)))
  987. return -EFAULT;
  988. return rc;
  989. }
  990. /* memory pinning and unpinning */
  991. case GENWQE_PIN_MEM: {
  992. struct genwqe_mem m;
  993. if (copy_from_user(&m, (void __user *)arg, sizeof(m)))
  994. return -EFAULT;
  995. return genwqe_pin_mem(cfile, &m);
  996. }
  997. case GENWQE_UNPIN_MEM: {
  998. struct genwqe_mem m;
  999. if (copy_from_user(&m, (void __user *)arg, sizeof(m)))
  1000. return -EFAULT;
  1001. return genwqe_unpin_mem(cfile, &m);
  1002. }
  1003. /* launch an DDCB and wait for completion */
  1004. case GENWQE_EXECUTE_DDCB:
  1005. return do_execute_ddcb(cfile, arg, 0);
  1006. case GENWQE_EXECUTE_RAW_DDCB: {
  1007. if (!capable(CAP_SYS_ADMIN))
  1008. return -EPERM;
  1009. return do_execute_ddcb(cfile, arg, 1);
  1010. }
  1011. default:
  1012. return -EINVAL;
  1013. }
  1014. return rc;
  1015. }
  1016. #if defined(CONFIG_COMPAT)
  1017. /**
  1018. * genwqe_compat_ioctl() - Compatibility ioctl
  1019. *
  1020. * Called whenever a 32-bit process running under a 64-bit kernel
  1021. * performs an ioctl on /dev/genwqe<n>_card.
  1022. *
  1023. * @filp: file pointer.
  1024. * @cmd: command.
  1025. * @arg: user argument.
  1026. * Return: zero on success or negative number on failure.
  1027. */
  1028. static long genwqe_compat_ioctl(struct file *filp, unsigned int cmd,
  1029. unsigned long arg)
  1030. {
  1031. return genwqe_ioctl(filp, cmd, arg);
  1032. }
  1033. #endif /* defined(CONFIG_COMPAT) */
  1034. static const struct file_operations genwqe_fops = {
  1035. .owner = THIS_MODULE,
  1036. .open = genwqe_open,
  1037. .fasync = genwqe_fasync,
  1038. .mmap = genwqe_mmap,
  1039. .unlocked_ioctl = genwqe_ioctl,
  1040. #if defined(CONFIG_COMPAT)
  1041. .compat_ioctl = genwqe_compat_ioctl,
  1042. #endif
  1043. .release = genwqe_release,
  1044. };
  1045. static int genwqe_device_initialized(struct genwqe_dev *cd)
  1046. {
  1047. return cd->dev != NULL;
  1048. }
  1049. /**
  1050. * genwqe_device_create() - Create and configure genwqe char device
  1051. * @cd: genwqe device descriptor
  1052. *
  1053. * This function must be called before we create any more genwqe
  1054. * character devices, because it is allocating the major and minor
  1055. * number which are supposed to be used by the client drivers.
  1056. */
  1057. int genwqe_device_create(struct genwqe_dev *cd)
  1058. {
  1059. int rc;
  1060. struct pci_dev *pci_dev = cd->pci_dev;
  1061. /*
  1062. * Here starts the individual setup per client. It must
  1063. * initialize its own cdev data structure with its own fops.
  1064. * The appropriate devnum needs to be created. The ranges must
  1065. * not overlap.
  1066. */
  1067. rc = alloc_chrdev_region(&cd->devnum_genwqe, 0,
  1068. GENWQE_MAX_MINOR, GENWQE_DEVNAME);
  1069. if (rc < 0) {
  1070. dev_err(&pci_dev->dev, "err: alloc_chrdev_region failed\n");
  1071. goto err_dev;
  1072. }
  1073. cdev_init(&cd->cdev_genwqe, &genwqe_fops);
  1074. cd->cdev_genwqe.owner = THIS_MODULE;
  1075. rc = cdev_add(&cd->cdev_genwqe, cd->devnum_genwqe, 1);
  1076. if (rc < 0) {
  1077. dev_err(&pci_dev->dev, "err: cdev_add failed\n");
  1078. goto err_add;
  1079. }
  1080. /*
  1081. * Finally the device in /dev/... must be created. The rule is
  1082. * to use card%d_clientname for each created device.
  1083. */
  1084. cd->dev = device_create_with_groups(cd->class_genwqe,
  1085. &cd->pci_dev->dev,
  1086. cd->devnum_genwqe, cd,
  1087. genwqe_attribute_groups,
  1088. GENWQE_DEVNAME "%u_card",
  1089. cd->card_idx);
  1090. if (IS_ERR(cd->dev)) {
  1091. rc = PTR_ERR(cd->dev);
  1092. goto err_cdev;
  1093. }
  1094. rc = genwqe_init_debugfs(cd);
  1095. if (rc != 0)
  1096. goto err_debugfs;
  1097. return 0;
  1098. err_debugfs:
  1099. device_destroy(cd->class_genwqe, cd->devnum_genwqe);
  1100. err_cdev:
  1101. cdev_del(&cd->cdev_genwqe);
  1102. err_add:
  1103. unregister_chrdev_region(cd->devnum_genwqe, GENWQE_MAX_MINOR);
  1104. err_dev:
  1105. cd->dev = NULL;
  1106. return rc;
  1107. }
  1108. static int genwqe_inform_and_stop_processes(struct genwqe_dev *cd)
  1109. {
  1110. int rc;
  1111. unsigned int i;
  1112. struct pci_dev *pci_dev = cd->pci_dev;
  1113. if (!genwqe_open_files(cd))
  1114. return 0;
  1115. dev_warn(&pci_dev->dev, "[%s] send SIGIO and wait ...\n", __func__);
  1116. rc = genwqe_kill_fasync(cd, SIGIO);
  1117. if (rc > 0) {
  1118. /* give kill_timeout seconds to close file descriptors ... */
  1119. for (i = 0; (i < genwqe_kill_timeout) &&
  1120. genwqe_open_files(cd); i++) {
  1121. dev_info(&pci_dev->dev, " %d sec ...", i);
  1122. cond_resched();
  1123. msleep(1000);
  1124. }
  1125. /* if no open files we can safely continue, else ... */
  1126. if (!genwqe_open_files(cd))
  1127. return 0;
  1128. dev_warn(&pci_dev->dev,
  1129. "[%s] send SIGKILL and wait ...\n", __func__);
  1130. rc = genwqe_force_sig(cd, SIGKILL); /* force terminate */
  1131. if (rc) {
  1132. /* Give kill_timout more seconds to end processes */
  1133. for (i = 0; (i < genwqe_kill_timeout) &&
  1134. genwqe_open_files(cd); i++) {
  1135. dev_warn(&pci_dev->dev, " %d sec ...", i);
  1136. cond_resched();
  1137. msleep(1000);
  1138. }
  1139. }
  1140. }
  1141. return 0;
  1142. }
  1143. /**
  1144. * genwqe_device_remove() - Remove genwqe's char device
  1145. *
  1146. * This function must be called after the client devices are removed
  1147. * because it will free the major/minor number range for the genwqe
  1148. * drivers.
  1149. *
  1150. * This function must be robust enough to be called twice.
  1151. */
  1152. int genwqe_device_remove(struct genwqe_dev *cd)
  1153. {
  1154. int rc;
  1155. struct pci_dev *pci_dev = cd->pci_dev;
  1156. if (!genwqe_device_initialized(cd))
  1157. return 1;
  1158. genwqe_inform_and_stop_processes(cd);
  1159. /*
  1160. * We currently do wait until all filedescriptors are
  1161. * closed. This leads to a problem when we abort the
  1162. * application which will decrease this reference from
  1163. * 1/unused to 0/illegal and not from 2/used 1/empty.
  1164. */
  1165. rc = atomic_read(&cd->cdev_genwqe.kobj.kref.refcount);
  1166. if (rc != 1) {
  1167. dev_err(&pci_dev->dev,
  1168. "[%s] err: cdev_genwqe...refcount=%d\n", __func__, rc);
  1169. panic("Fatal err: cannot free resources with pending references!");
  1170. }
  1171. genqwe_exit_debugfs(cd);
  1172. device_destroy(cd->class_genwqe, cd->devnum_genwqe);
  1173. cdev_del(&cd->cdev_genwqe);
  1174. unregister_chrdev_region(cd->devnum_genwqe, GENWQE_MAX_MINOR);
  1175. cd->dev = NULL;
  1176. return 0;
  1177. }