sde_vm_trusted.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2022 Qualcomm Innovation Center, Inc. All rights reserved.
  4. * Copyright (c) 2020-2021, The Linux Foundation. All rights reserved.
  5. */
  6. #define pr_fmt(fmt) "[drm:%s:%d] " fmt, __func__, __LINE__
  7. #include <linux/gunyah/gh_rm_drv.h>
  8. #include <linux/gunyah/gh_irq_lend.h>
  9. #include <linux/gunyah/gh_mem_notifier.h>
  10. #include <linux/sort.h>
  11. #include <linux/bsearch.h>
  12. #include <linux/irq.h>
  13. #include <linux/irqdomain.h>
  14. #include "sde_kms.h"
  15. #include "sde_vm_common.h"
  16. #include "sde_vm.h"
  17. #include "sde_vm_msgq.h"
  18. #define to_vm_trusted(vm) ((struct sde_vm_trusted *)vm)
  19. static int __sgl_cmp(const void *a, const void *b)
  20. {
  21. struct gh_sgl_entry *l = (struct gh_sgl_entry *)a;
  22. struct gh_sgl_entry *r = (struct gh_sgl_entry *)b;
  23. return (l->ipa_base - r->ipa_base);
  24. }
  25. int _sde_vm_validate_sgl(struct gh_sgl_desc *expected,
  26. struct gh_sgl_desc *assigned)
  27. {
  28. u32 idx;
  29. /*
  30. * fragmented address spaces are not supported.
  31. * So the number of sgl entries is expected to be the same.
  32. */
  33. if (expected->n_sgl_entries != assigned->n_sgl_entries)
  34. return -E2BIG;
  35. sort(assigned->sgl_entries, assigned->n_sgl_entries,
  36. sizeof(assigned->sgl_entries[0]), __sgl_cmp, NULL);
  37. for (idx = 0; idx < expected->n_sgl_entries; idx++) {
  38. struct gh_sgl_entry *e = &expected->sgl_entries[idx];
  39. struct gh_sgl_entry *a = &assigned->sgl_entries[idx];
  40. if ((e->ipa_base != a->ipa_base) || (e->size != a->size)) {
  41. SDE_DEBUG("sgl mismatch: (%llu - %llu) vs (%llu - %llu)\n",
  42. e->ipa_base, e->size, a->ipa_base, a->size);
  43. return -EINVAL;
  44. }
  45. }
  46. return 0;
  47. }
  48. static int __irq_cmp(const void *a, const void *b)
  49. {
  50. struct sde_vm_irq_entry *l = (struct sde_vm_irq_entry *)a;
  51. struct sde_vm_irq_entry *r = (struct sde_vm_irq_entry *)b;
  52. return (l->label - r->label);
  53. }
  54. static void sde_vm_mem_lend_notification_handler(enum gh_mem_notifier_tag tag,
  55. unsigned long notif_type,
  56. void *entry_data, void *notif_msg)
  57. {
  58. struct gh_rm_notif_mem_shared_payload *payload;
  59. struct sde_vm_trusted *sde_vm;
  60. if (notif_type != GH_RM_NOTIF_MEM_SHARED ||
  61. tag != GH_MEM_NOTIFIER_TAG_DISPLAY)
  62. return;
  63. if (!entry_data || !notif_msg)
  64. return;
  65. payload = (struct gh_rm_notif_mem_shared_payload *)notif_msg;
  66. if (payload->trans_type != GH_RM_TRANS_TYPE_LEND ||
  67. payload->label != SDE_VM_MEM_LABEL)
  68. return;
  69. sde_vm = (struct sde_vm_trusted *)entry_data;
  70. mutex_lock(&sde_vm->base.vm_res_lock);
  71. sde_vm->base.io_mem_handle = payload->mem_handle;
  72. mutex_unlock(&sde_vm->base.vm_res_lock);
  73. SDE_INFO("mem lend notification for tag: %d label: %d handle: %d\n",
  74. tag, payload->label, payload->mem_handle);
  75. }
  76. void sde_vm_irq_lend_notification_handler(void *req,
  77. unsigned long notif_type, enum gh_irq_label label)
  78. {
  79. SDE_INFO("IRQ LEND notification for label: %d\n", label);
  80. }
  81. static int _sde_vm_release_irq(struct sde_vm *vm)
  82. {
  83. struct sde_vm_trusted *sde_vm = (struct sde_vm_trusted *)vm;
  84. struct sde_vm_irq_desc *irq_desc = sde_vm->irq_desc;
  85. int i, rc = 0;
  86. for (i = atomic_read(&sde_vm->base.n_irq_lent) - 1; i >= 0; i--) {
  87. struct sde_vm_irq_entry *entry = &irq_desc->irq_entries[i];
  88. rc = gh_irq_release(entry->label);
  89. if (rc) {
  90. SDE_ERROR("failed to release IRQ label: %d rc = %d\n",
  91. entry->label, rc);
  92. goto done;
  93. }
  94. atomic_dec(&sde_vm->base.n_irq_lent);
  95. rc = gh_irq_release_notify(entry->label);
  96. if (rc) {
  97. SDE_ERROR(
  98. "irq release notify failed,label: %d rc: %d\n",
  99. entry->label, rc);
  100. goto done;
  101. }
  102. SDE_INFO("sde vm irq release for label: %d succeeded\n",
  103. entry->label);
  104. }
  105. done:
  106. return rc;
  107. }
  108. static int _sde_vm_release_mem(struct sde_vm *vm)
  109. {
  110. int rc = 0;
  111. struct sde_vm_trusted *sde_vm = (struct sde_vm_trusted *)vm;
  112. if (sde_vm->base.io_mem_handle < 0)
  113. return 0;
  114. rc = gh_rm_mem_release(sde_vm->base.io_mem_handle, 0);
  115. if (rc) {
  116. SDE_ERROR("gh_rm_mem_release failed, rc=%d\n", rc);
  117. goto done;
  118. }
  119. rc = gh_rm_mem_notify(sde_vm->base.io_mem_handle,
  120. GH_RM_MEM_NOTIFY_OWNER_RELEASED,
  121. GH_MEM_NOTIFIER_TAG_DISPLAY, 0);
  122. if (rc) {
  123. SDE_ERROR("hyp mem notify on release failed, rc = %d\n", rc);
  124. goto done;
  125. }
  126. sde_vm->base.io_mem_handle = -1;
  127. SDE_INFO("sde vm mem release succeeded\n");
  128. done:
  129. return rc;
  130. }
  131. static int _sde_vm_release(struct sde_kms *kms)
  132. {
  133. struct sde_vm_trusted *sde_vm;
  134. int rc = 0;
  135. if (!kms->vm)
  136. return 0;
  137. sde_vm = to_vm_trusted(kms->vm);
  138. sde_kms_vm_trusted_resource_deinit(kms);
  139. rc = _sde_vm_release_irq(kms->vm);
  140. if (rc)
  141. SDE_ERROR("irq_release failed, rc = %d\n", rc);
  142. rc = _sde_vm_release_mem(kms->vm);
  143. if (rc) {
  144. SDE_ERROR("mem_release failed, rc = %d\n", rc);
  145. goto end;
  146. }
  147. end:
  148. return rc;
  149. }
  150. int _sde_vm_resource_init(struct sde_kms *sde_kms,
  151. struct drm_atomic_state *state)
  152. {
  153. int rc = 0;
  154. rc = sde_kms_vm_trusted_resource_init(sde_kms, state);
  155. if (rc)
  156. SDE_ERROR("vm resource init failed\n");
  157. return rc;
  158. }
  159. int _sde_vm_populate_res(struct sde_kms *sde_kms, struct sde_vm_trusted *vm)
  160. {
  161. struct msm_io_res io_res;
  162. int rc = 0;
  163. INIT_LIST_HEAD(&io_res.mem);
  164. INIT_LIST_HEAD(&io_res.irq);
  165. rc = sde_vm_get_resources(sde_kms, &io_res);
  166. if (rc) {
  167. SDE_ERROR("fail to get resources\n");
  168. return rc;
  169. }
  170. vm->sgl_desc = sde_vm_populate_sgl(&io_res);
  171. if (IS_ERR_OR_NULL(vm->sgl_desc)) {
  172. SDE_ERROR("failed to parse sgl list\n");
  173. return PTR_ERR(vm->sgl_desc);
  174. }
  175. vm->irq_desc = sde_vm_populate_irq(&io_res);
  176. if (IS_ERR_OR_NULL(vm->irq_desc)) {
  177. SDE_ERROR("failed to parse irq list\n");
  178. return PTR_ERR(vm->irq_desc);
  179. }
  180. sort(vm->irq_desc->irq_entries, vm->irq_desc->n_irq,
  181. sizeof(vm->irq_desc->irq_entries[0]), __irq_cmp, NULL);
  182. sort(vm->sgl_desc->sgl_entries, vm->sgl_desc->n_sgl_entries,
  183. sizeof(vm->sgl_desc->sgl_entries[0]), __sgl_cmp, NULL);
  184. return rc;
  185. }
  186. static bool _sde_vm_owns_hw(struct sde_kms *sde_kms)
  187. {
  188. struct sde_vm_trusted *sde_vm;
  189. bool owns_irq, owns_mem_io;
  190. sde_vm = to_vm_trusted(sde_kms->vm);
  191. owns_irq = (sde_vm->irq_desc->n_irq ==
  192. atomic_read(&sde_vm->base.n_irq_lent));
  193. owns_mem_io = (sde_vm->base.io_mem_handle >= 0);
  194. return (owns_irq && owns_mem_io);
  195. }
  196. static void _sde_vm_deinit(struct sde_kms *kms, struct sde_vm_ops *ops)
  197. {
  198. struct sde_vm_trusted *sde_vm;
  199. if (!kms->vm)
  200. return;
  201. sde_vm = to_vm_trusted(kms->vm);
  202. memset(ops, 0, sizeof(*ops));
  203. sde_vm_msgq_deinit(kms->vm);
  204. if (sde_vm->base.mem_notification_cookie)
  205. gh_mem_notifier_unregister(
  206. sde_vm->base.mem_notification_cookie);
  207. kfree(sde_vm->sgl_desc);
  208. if (sde_vm->irq_desc)
  209. sde_vm_free_irq(sde_vm->irq_desc);
  210. kfree(sde_vm);
  211. }
  212. static int _sde_vm_accept_mem(struct sde_vm *vm)
  213. {
  214. struct gh_sgl_desc *sgl_desc;
  215. struct gh_acl_desc *acl_desc;
  216. struct sde_vm_trusted *sde_vm;
  217. int rc = 0;
  218. sde_vm = to_vm_trusted(vm);
  219. acl_desc = sde_vm_populate_acl(GH_TRUSTED_VM);
  220. if (IS_ERR(acl_desc)) {
  221. SDE_ERROR("failed to populate acl data, rc=%ld\n",
  222. PTR_ERR(acl_desc));
  223. rc = PTR_ERR(acl_desc);
  224. goto done;
  225. }
  226. sgl_desc = gh_rm_mem_accept(sde_vm->base.io_mem_handle,
  227. GH_RM_MEM_TYPE_IO,
  228. GH_RM_TRANS_TYPE_LEND,
  229. GH_RM_MEM_ACCEPT_VALIDATE_ACL_ATTRS|
  230. GH_RM_MEM_ACCEPT_VALIDATE_LABEL|
  231. GH_RM_MEM_ACCEPT_DONE,
  232. SDE_VM_MEM_LABEL,
  233. acl_desc, NULL, NULL, 0);
  234. if (IS_ERR_OR_NULL(sgl_desc)) {
  235. SDE_ERROR("gh_rm_mem_accept failed with error, rc=%ld\n",
  236. PTR_ERR(sgl_desc));
  237. rc = -EINVAL;
  238. /* ACCEPT didn't go through. So no need to call the RELEASE */
  239. sde_vm->base.io_mem_handle = -1;
  240. goto accept_fail;
  241. }
  242. rc = _sde_vm_validate_sgl(sde_vm->sgl_desc, sgl_desc);
  243. if (rc) {
  244. SDE_ERROR(
  245. "failed in sgl validation for SDE_VM_MEM_LABEL label, rc = %d\n",
  246. rc);
  247. goto accept_fail;
  248. }
  249. SDE_INFO("mem accept succeeded for SDE_VM_MEM_LABEL label\n");
  250. return 0;
  251. accept_fail:
  252. kfree(acl_desc);
  253. done:
  254. return rc;
  255. }
  256. static int _sde_vm_accept_irq(struct sde_vm *vm)
  257. {
  258. struct sde_vm_trusted *sde_vm;
  259. struct sde_vm_irq_desc *irq_desc;
  260. struct irq_data *exp_irq_data, *acc_irq_data;
  261. int accepted_irq, expected_irq;
  262. int rc = 0, i;
  263. sde_vm = to_vm_trusted(vm);
  264. irq_desc = sde_vm->irq_desc;
  265. for (i = 0; i < irq_desc->n_irq; i++) {
  266. struct sde_vm_irq_entry *irq_entry = &irq_desc->irq_entries[i];
  267. expected_irq = irq_entry->irq;
  268. accepted_irq = gh_irq_accept(irq_entry->label, -1,
  269. IRQ_TYPE_LEVEL_HIGH);
  270. if (accepted_irq < 0) {
  271. SDE_ERROR("failed to accept irq for label: %d\n",
  272. irq_entry->label);
  273. rc = -EINVAL;
  274. goto end;
  275. }
  276. atomic_inc(&sde_vm->base.n_irq_lent);
  277. exp_irq_data = irq_get_irq_data(expected_irq);
  278. if (!exp_irq_data) {
  279. SDE_ERROR("failed to get irq data for irq: %d\n",
  280. expected_irq);
  281. rc = -EINVAL;
  282. goto end;
  283. }
  284. acc_irq_data = irq_get_irq_data(accepted_irq);
  285. if (!acc_irq_data) {
  286. SDE_ERROR("failed to get irq data for irq: %d\n",
  287. accepted_irq);
  288. rc = -EINVAL;
  289. goto end;
  290. }
  291. if (exp_irq_data->hwirq != acc_irq_data->hwirq) {
  292. SDE_ERROR("IRQ mismatch on ACCEPT for label %d\n",
  293. irq_entry->label);
  294. rc = -EINVAL;
  295. goto end;
  296. }
  297. SDE_INFO("IRQ accept succeeded for label %u irq: %lu\n",
  298. irq_entry->label, exp_irq_data->hwirq);
  299. }
  300. end:
  301. return rc;
  302. }
  303. static int _sde_vm_accept(struct sde_kms *kms)
  304. {
  305. int rc = 0;
  306. rc = _sde_vm_accept_mem(kms->vm);
  307. if (rc)
  308. goto res_accept_fail;
  309. rc = _sde_vm_accept_irq(kms->vm);
  310. if (rc)
  311. goto res_accept_fail;
  312. return 0;
  313. res_accept_fail:
  314. _sde_vm_release_irq(kms->vm);
  315. _sde_vm_release_mem(kms->vm);
  316. return rc;
  317. }
  318. static void _sde_vm_set_ops(struct sde_vm_ops *ops)
  319. {
  320. memset(ops, 0, sizeof(*ops));
  321. ops->vm_client_pre_release = sde_vm_pre_release;
  322. ops->vm_client_post_acquire = sde_vm_post_acquire;
  323. ops->vm_release = _sde_vm_release;
  324. ops->vm_acquire = _sde_vm_accept;
  325. ops->vm_owns_hw = _sde_vm_owns_hw;
  326. ops->vm_deinit = _sde_vm_deinit;
  327. ops->vm_prepare_commit = sde_kms_vm_trusted_prepare_commit;
  328. ops->vm_post_commit = sde_kms_vm_trusted_post_commit;
  329. ops->vm_request_valid = sde_vm_request_valid;
  330. ops->vm_acquire_fail_handler = _sde_vm_release;
  331. ops->vm_msg_send = sde_vm_msg_send;
  332. ops->vm_resource_init = _sde_vm_resource_init;
  333. }
  334. int sde_vm_trusted_init(struct sde_kms *kms)
  335. {
  336. struct sde_vm_trusted *sde_vm;
  337. void *cookie;
  338. int rc = 0;
  339. sde_vm = kzalloc(sizeof(*sde_vm), GFP_KERNEL);
  340. if (!sde_vm)
  341. return -ENOMEM;
  342. _sde_vm_set_ops(&sde_vm->base.vm_ops);
  343. sde_vm->base.sde_kms = kms;
  344. mutex_init(&sde_vm->base.vm_res_lock);
  345. /**
  346. * Optimize resource population by reading the entire HW resource
  347. * space once during init. Once trusted vm starts supporting
  348. * per-display space assignment, this read has to be done on each event
  349. * notification.
  350. */
  351. rc = _sde_vm_populate_res(kms, sde_vm);
  352. if (rc) {
  353. SDE_ERROR("failed to populate trusted vm res, rc= %d\n", rc);
  354. goto init_fail;
  355. }
  356. cookie = gh_mem_notifier_register(GH_MEM_NOTIFIER_TAG_DISPLAY,
  357. sde_vm_mem_lend_notification_handler, sde_vm);
  358. if (!cookie) {
  359. SDE_ERROR("fails to register RM mem lend notifier\n");
  360. goto init_fail;
  361. }
  362. sde_vm->base.mem_notification_cookie = cookie;
  363. rc = gh_irq_wait_for_lend_v2(GH_IRQ_LABEL_SDE, GH_PRIMARY_VM,
  364. sde_vm_irq_lend_notification_handler,
  365. (void *)sde_vm);
  366. if (rc) {
  367. SDE_ERROR("wait for irq lend on label: %d failed, rc=%d\n",
  368. GH_IRQ_LABEL_SDE, rc);
  369. goto init_fail;
  370. }
  371. kms->vm = &sde_vm->base;
  372. atomic_set(&sde_vm->base.n_irq_lent, 0);
  373. rc = sde_vm_msgq_init(kms->vm);
  374. if (rc) {
  375. SDE_ERROR("failed to initialize the msgq, rc=%d\n", rc);
  376. goto init_fail;
  377. }
  378. return 0;
  379. init_fail:
  380. _sde_vm_deinit(kms, &sde_vm->base.vm_ops);
  381. return rc;
  382. }