sde_vm_trusted.c 9.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2020, The Linux Foundation. All rights reserved.
  4. */
  5. #include <linux/haven/hh_rm_drv.h>
  6. #include <linux/haven/hh_irq_lend.h>
  7. #include <linux/haven/hh_mem_notifier.h>
  8. #include <linux/sort.h>
  9. #include <linux/bsearch.h>
  10. #include <linux/irq.h>
  11. #include <linux/irqdomain.h>
  12. #include "sde_kms.h"
  13. #include "sde_vm_common.h"
  14. #include "sde_vm.h"
  15. #define to_vm_trusted(vm) ((struct sde_vm_trusted *)vm)
  16. static int __sgl_cmp(const void *a, const void *b)
  17. {
  18. struct hh_sgl_entry *l = (struct hh_sgl_entry *)a;
  19. struct hh_sgl_entry *r = (struct hh_sgl_entry *)b;
  20. return (l->ipa_base - r->ipa_base);
  21. }
  22. int _sde_vm_validate_sgl(struct hh_sgl_desc *expected,
  23. struct hh_sgl_desc *assigned)
  24. {
  25. u32 idx;
  26. /*
  27. * fragmented address spaces are not supported.
  28. * So the number of sgl entries is expected to be the same.
  29. */
  30. if (expected->n_sgl_entries != assigned->n_sgl_entries)
  31. return -E2BIG;
  32. sort(assigned->sgl_entries, assigned->n_sgl_entries,
  33. sizeof(assigned->sgl_entries[0]), __sgl_cmp, NULL);
  34. for (idx = 0; idx < expected->n_sgl_entries; idx++) {
  35. struct hh_sgl_entry *e = &expected->sgl_entries[idx];
  36. struct hh_sgl_entry *a = &assigned->sgl_entries[idx];
  37. if ((e->ipa_base != a->ipa_base) || (e->size != a->size)) {
  38. SDE_DEBUG("sgl mismatch: (%ld - %d) vs (%ld - %d)\n",
  39. e->ipa_base, e->size, a->ipa_base, a->size);
  40. return -EINVAL;
  41. }
  42. }
  43. return 0;
  44. }
  45. static int __irq_cmp(const void *a, const void *b)
  46. {
  47. struct sde_vm_irq_entry *l = (struct sde_vm_irq_entry *)a;
  48. struct sde_vm_irq_entry *r = (struct sde_vm_irq_entry *)b;
  49. return (l->label - r->label);
  50. }
  51. void sde_vm_irq_lend_notification_handler(void *req, enum hh_irq_label label)
  52. {
  53. struct sde_vm_trusted *sde_vm;
  54. struct sde_kms *sde_kms;
  55. struct sde_vm_irq_desc *irq_desc;
  56. struct sde_vm_irq_entry irq_temp, *found = NULL;
  57. struct irq_data *exp_irq_data, *acc_irq_data;
  58. int accepted_irq, expected_irq;
  59. if (!req) {
  60. SDE_ERROR("invalid data on lend notification\n");
  61. return;
  62. }
  63. sde_vm = to_vm_trusted(req);
  64. sde_kms = sde_vm->base.sde_kms;
  65. irq_desc = sde_vm->irq_desc;
  66. mutex_lock(&sde_vm->base.vm_res_lock);
  67. memset(&irq_temp, 0, sizeof(irq_temp));
  68. irq_temp.label = label;
  69. found = bsearch((void *)&irq_temp, (void *)irq_desc->irq_entries,
  70. irq_desc->n_irq, sizeof(struct sde_vm_irq_entry),
  71. __irq_cmp);
  72. if (!found) {
  73. SDE_ERROR("irq mismatch for label: %d irq: %d\n",
  74. irq_temp.label, irq_temp.irq);
  75. goto end;
  76. }
  77. expected_irq = found->irq;
  78. accepted_irq = hh_irq_accept(label, -1, IRQ_TYPE_LEVEL_HIGH);
  79. if (accepted_irq < 0) {
  80. SDE_ERROR("failed to accept irq for label: %d\n");
  81. goto end;
  82. }
  83. exp_irq_data = irq_get_irq_data(expected_irq);
  84. if (!exp_irq_data) {
  85. SDE_ERROR("failed to get irq data for irq: %d\n", exp_irq_data);
  86. goto end;
  87. }
  88. acc_irq_data = irq_get_irq_data(accepted_irq);
  89. if (!acc_irq_data) {
  90. SDE_ERROR("failed to get irq data for irq: %d\n", accepted_irq);
  91. goto end;
  92. }
  93. if (exp_irq_data->hwirq != acc_irq_data->hwirq) {
  94. SDE_ERROR("IRQ mismatch on ACCEPT for label %d\n", label);
  95. goto end;
  96. }
  97. SDE_INFO("IRQ accept succeeded for label %d irq: %d\n", label,
  98. exp_irq_data->hwirq);
  99. atomic_inc(&sde_vm->base.n_irq_lent);
  100. end:
  101. mutex_unlock(&sde_vm->base.vm_res_lock);
  102. }
  103. static void sde_vm_mem_lend_notification_handler(enum hh_mem_notifier_tag tag,
  104. unsigned long notif_type,
  105. void *entry_data, void *notif_msg)
  106. {
  107. struct hh_rm_notif_mem_shared_payload *payload;
  108. struct hh_sgl_desc *sgl_desc;
  109. struct hh_acl_desc *acl_desc;
  110. struct sde_kms *sde_kms;
  111. struct sde_vm_trusted *sde_vm;
  112. int rc = 0;
  113. if (notif_type != HH_RM_NOTIF_MEM_SHARED ||
  114. tag != HH_MEM_NOTIFIER_TAG_DISPLAY)
  115. return;
  116. if (!entry_data || !notif_msg)
  117. return;
  118. payload = (struct hh_rm_notif_mem_shared_payload *)notif_msg;
  119. if (payload->trans_type != HH_RM_TRANS_TYPE_LEND ||
  120. payload->label != SDE_VM_MEM_LABEL)
  121. return;
  122. sde_vm = (struct sde_vm_trusted *)entry_data;
  123. sde_kms = sde_vm->base.sde_kms;
  124. mutex_lock(&sde_vm->base.vm_res_lock);
  125. acl_desc = sde_vm_populate_acl(HH_TRUSTED_VM);
  126. if (IS_ERR(acl_desc)) {
  127. SDE_ERROR("failed to populate acl data, rc=%d\n",
  128. PTR_ERR(acl_desc));
  129. goto acl_fail;
  130. }
  131. sgl_desc = hh_rm_mem_accept(payload->mem_handle, HH_RM_MEM_TYPE_IO,
  132. HH_RM_TRANS_TYPE_LEND,
  133. HH_RM_MEM_ACCEPT_VALIDATE_ACL_ATTRS|
  134. HH_RM_MEM_ACCEPT_VALIDATE_LABEL|
  135. HH_RM_MEM_ACCEPT_DONE,
  136. payload->label,
  137. acl_desc, NULL, NULL, 0);
  138. if (IS_ERR_OR_NULL(sgl_desc)) {
  139. SDE_ERROR("hh_rm_mem_accept failed with error, rc=%d\n",
  140. PTR_ERR(sgl_desc));
  141. goto accept_fail;
  142. }
  143. rc = _sde_vm_validate_sgl(sde_vm->sgl_desc, sgl_desc);
  144. if (rc) {
  145. SDE_ERROR("failed in sgl validation for label: %d, rc = %d\n",
  146. payload->label, rc);
  147. goto accept_fail;
  148. }
  149. sde_vm->base.io_mem_handle = payload->mem_handle;
  150. SDE_INFO("mem accept succeeded for tag: %d label: %d\n", tag,
  151. payload->label);
  152. accept_fail:
  153. kfree(acl_desc);
  154. acl_fail:
  155. mutex_unlock(&sde_vm->base.vm_res_lock);
  156. }
  157. static int _sde_vm_release_irq(struct sde_vm *vm)
  158. {
  159. struct sde_vm_trusted *sde_vm = (struct sde_vm_trusted *)vm;
  160. struct sde_vm_irq_desc *irq_desc = sde_vm->irq_desc;
  161. int i, rc = 0;
  162. for (i = 0; i < irq_desc->n_irq; i++) {
  163. struct sde_vm_irq_entry *entry = &irq_desc->irq_entries[i];
  164. rc = hh_irq_release(entry->label);
  165. if (rc) {
  166. SDE_ERROR("failed to release IRQ label: %d rc = %d\n",
  167. entry->label, rc);
  168. return rc;
  169. }
  170. atomic_dec(&sde_vm->base.n_irq_lent);
  171. }
  172. SDE_INFO("sde vm irq release succeeded, rc = %d\n", rc);
  173. return rc;
  174. }
  175. static int _sde_vm_release(struct sde_kms *kms)
  176. {
  177. struct sde_vm_trusted *sde_vm;
  178. int rc = 0;
  179. if (!kms->vm)
  180. return 0;
  181. sde_vm = to_vm_trusted(kms->vm);
  182. mutex_lock(&sde_vm->base.vm_res_lock);
  183. rc = hh_rm_mem_release(sde_vm->base.io_mem_handle, 0);
  184. if (rc) {
  185. SDE_ERROR("hh_rm_mem_release failed, rc=%d\n", rc);
  186. goto end;
  187. }
  188. rc = hh_rm_mem_notify(sde_vm->base.io_mem_handle,
  189. HH_RM_MEM_NOTIFY_OWNER, HH_MEM_NOTIFIER_TAG_DISPLAY, 0);
  190. if (rc) {
  191. SDE_ERROR("hyp mem notify on release failed, rc = %d\n", rc);
  192. goto end;
  193. }
  194. sde_vm->base.io_mem_handle = -1;
  195. SDE_INFO("sde vm mem release succeeded, rc = %d\n", rc);
  196. rc = _sde_vm_release_irq(kms->vm);
  197. if (rc) {
  198. SDE_ERROR("irq_release failed, rc = %d\n", rc);
  199. goto end;
  200. }
  201. end:
  202. mutex_unlock(&sde_vm->base.vm_res_lock);
  203. return rc;
  204. }
  205. int _sde_vm_populate_res(struct sde_kms *sde_kms, struct sde_vm_trusted *vm)
  206. {
  207. struct msm_io_res io_res;
  208. int rc = 0;
  209. INIT_LIST_HEAD(&io_res.mem);
  210. INIT_LIST_HEAD(&io_res.irq);
  211. rc = sde_vm_get_resources(sde_kms, &io_res);
  212. if (rc) {
  213. SDE_ERROR("fail to get resources\n");
  214. return rc;
  215. }
  216. vm->sgl_desc = sde_vm_populate_sgl(&io_res);
  217. if (IS_ERR_OR_NULL(vm->sgl_desc)) {
  218. SDE_ERROR("failed to parse sgl list\n");
  219. return PTR_ERR(vm->sgl_desc);
  220. }
  221. vm->irq_desc = sde_vm_populate_irq(&io_res);
  222. if (IS_ERR_OR_NULL(vm->irq_desc)) {
  223. SDE_ERROR("failed to parse irq list\n");
  224. return PTR_ERR(vm->irq_desc);
  225. }
  226. sort(vm->irq_desc->irq_entries, vm->irq_desc->n_irq,
  227. sizeof(vm->irq_desc->irq_entries[0]), __irq_cmp, NULL);
  228. sort(vm->sgl_desc->sgl_entries, vm->sgl_desc->n_sgl_entries,
  229. sizeof(vm->sgl_desc->sgl_entries[0]), __sgl_cmp, NULL);
  230. return rc;
  231. }
  232. static bool sde_vm_owns_hw(struct sde_kms *sde_kms)
  233. {
  234. struct sde_vm_trusted *sde_vm;
  235. bool owns_irq, owns_mem_io;
  236. sde_vm = to_vm_trusted(sde_kms->vm);
  237. owns_irq = (sde_vm->irq_desc->n_irq ==
  238. atomic_read(&sde_vm->base.n_irq_lent));
  239. owns_mem_io = (sde_vm->base.io_mem_handle >= 0);
  240. return (owns_irq && owns_mem_io);
  241. }
  242. static void _sde_vm_deinit(struct sde_kms *kms, struct sde_vm_ops *ops)
  243. {
  244. struct sde_vm_trusted *sde_vm;
  245. if (!kms->vm)
  246. return;
  247. sde_vm = to_vm_trusted(kms->vm);
  248. memset(ops, 0, sizeof(*ops));
  249. if (sde_vm->base.mem_notification_cookie)
  250. hh_mem_notifier_unregister(
  251. sde_vm->base.mem_notification_cookie);
  252. kfree(sde_vm->sgl_desc);
  253. if (sde_vm->irq_desc)
  254. sde_vm_free_irq(sde_vm->irq_desc);
  255. kfree(sde_vm);
  256. }
  257. static void _sde_vm_set_ops(struct sde_vm_ops *ops)
  258. {
  259. memset(ops, 0, sizeof(*ops));
  260. ops->vm_release = _sde_vm_release;
  261. ops->vm_owns_hw = sde_vm_owns_hw;
  262. ops->vm_deinit = _sde_vm_deinit;
  263. }
  264. int sde_vm_trusted_init(struct sde_kms *kms, struct sde_vm_ops *ops)
  265. {
  266. struct sde_vm_trusted *sde_vm;
  267. void *cookie;
  268. int rc = 0;
  269. sde_vm = kzalloc(sizeof(*sde_vm), GFP_KERNEL);
  270. if (!sde_vm)
  271. return -ENOMEM;
  272. _sde_vm_set_ops(ops);
  273. sde_vm->base.sde_kms = kms;
  274. mutex_init(&sde_vm->base.vm_res_lock);
  275. /**
  276. * Optimize resource population by reading the entire HW resource
  277. * space once during init. Once trusted vm starts supporting
  278. * per-display space assignment, this read has to be done on each event
  279. * notification.
  280. */
  281. rc = _sde_vm_populate_res(kms, sde_vm);
  282. if (rc) {
  283. SDE_ERROR("failed to populate trusted vm res, rc= %d\n", rc);
  284. goto init_fail;
  285. }
  286. cookie = hh_mem_notifier_register(HH_MEM_NOTIFIER_TAG_DISPLAY,
  287. sde_vm_mem_lend_notification_handler, sde_vm);
  288. if (!cookie) {
  289. SDE_ERROR("fails to register RM mem lend notifier\n");
  290. goto init_fail;
  291. }
  292. sde_vm->base.mem_notification_cookie = cookie;
  293. rc = hh_irq_wait_for_lend(HH_IRQ_LABEL_SDE, HH_PRIMARY_VM,
  294. sde_vm_irq_lend_notification_handler,
  295. (void *)sde_vm);
  296. if (rc) {
  297. SDE_ERROR("wait for irq lend on label: %d failed, rc=%d\n",
  298. HH_IRQ_LABEL_SDE, rc);
  299. goto init_fail;
  300. }
  301. kms->vm = &sde_vm->base;
  302. atomic_set(&sde_vm->base.n_irq_lent, 0);
  303. return 0;
  304. init_fail:
  305. _sde_vm_deinit(kms, ops);
  306. return rc;
  307. }