sde_vm_trusted.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2020, The Linux Foundation. All rights reserved.
  4. */
  5. #include <linux/haven/hh_rm_drv.h>
  6. #include <linux/haven/hh_irq_lend.h>
  7. #include <linux/haven/hh_mem_notifier.h>
  8. #include <linux/sort.h>
  9. #include <linux/bsearch.h>
  10. #include <linux/irq.h>
  11. #include <linux/irqdomain.h>
  12. #include "sde_kms.h"
  13. #include "sde_vm_common.h"
  14. #include "sde_vm.h"
  15. #define to_vm_trusted(vm) ((struct sde_vm_trusted *)vm)
  16. static int __sgl_cmp(const void *a, const void *b)
  17. {
  18. struct hh_sgl_entry *l = (struct hh_sgl_entry *)a;
  19. struct hh_sgl_entry *r = (struct hh_sgl_entry *)b;
  20. return (l->ipa_base - r->ipa_base);
  21. }
  22. int _sde_vm_validate_sgl(struct hh_sgl_desc *expected,
  23. struct hh_sgl_desc *assigned)
  24. {
  25. u32 idx;
  26. /*
  27. * fragmented address spaces are not supported.
  28. * So the number of sgl entries is expected to be the same.
  29. */
  30. if (expected->n_sgl_entries != assigned->n_sgl_entries)
  31. return -E2BIG;
  32. sort(assigned->sgl_entries, assigned->n_sgl_entries,
  33. sizeof(assigned->sgl_entries[0]), __sgl_cmp, NULL);
  34. for (idx = 0; idx < expected->n_sgl_entries; idx++) {
  35. struct hh_sgl_entry *e = &expected->sgl_entries[idx];
  36. struct hh_sgl_entry *a = &assigned->sgl_entries[idx];
  37. if ((e->ipa_base != a->ipa_base) || (e->size != a->size)) {
  38. SDE_DEBUG("sgl mismatch: (%ld - %d) vs (%ld - %d)\n",
  39. e->ipa_base, e->size, a->ipa_base, a->size);
  40. return -EINVAL;
  41. }
  42. }
  43. return 0;
  44. }
  45. static int __irq_cmp(const void *a, const void *b)
  46. {
  47. struct sde_vm_irq_entry *l = (struct sde_vm_irq_entry *)a;
  48. struct sde_vm_irq_entry *r = (struct sde_vm_irq_entry *)b;
  49. return (l->label - r->label);
  50. }
  51. static void sde_vm_mem_lend_notification_handler(enum hh_mem_notifier_tag tag,
  52. unsigned long notif_type,
  53. void *entry_data, void *notif_msg)
  54. {
  55. struct hh_rm_notif_mem_shared_payload *payload;
  56. struct sde_vm_trusted *sde_vm;
  57. if (notif_type != HH_RM_NOTIF_MEM_SHARED ||
  58. tag != HH_MEM_NOTIFIER_TAG_DISPLAY)
  59. return;
  60. if (!entry_data || !notif_msg)
  61. return;
  62. payload = (struct hh_rm_notif_mem_shared_payload *)notif_msg;
  63. if (payload->trans_type != HH_RM_TRANS_TYPE_LEND ||
  64. payload->label != SDE_VM_MEM_LABEL)
  65. return;
  66. sde_vm = (struct sde_vm_trusted *)entry_data;
  67. mutex_lock(&sde_vm->base.vm_res_lock);
  68. sde_vm->base.io_mem_handle = payload->mem_handle;
  69. mutex_unlock(&sde_vm->base.vm_res_lock);
  70. SDE_INFO("mem lend notification for tag: %d label: %d handle: %d\n",
  71. tag, payload->label, payload->mem_handle);
  72. }
  73. void sde_vm_irq_lend_notification_handler(void *req,
  74. unsigned long notif_type, enum hh_irq_label label)
  75. {
  76. SDE_INFO("IRQ LEND notification for label: %d\n", label);
  77. }
  78. static int _sde_vm_release_irq(struct sde_vm *vm)
  79. {
  80. struct sde_vm_trusted *sde_vm = (struct sde_vm_trusted *)vm;
  81. struct sde_vm_irq_desc *irq_desc = sde_vm->irq_desc;
  82. int i, rc = 0;
  83. for (i = atomic_read(&sde_vm->base.n_irq_lent) - 1; i >= 0; i--) {
  84. struct sde_vm_irq_entry *entry = &irq_desc->irq_entries[i];
  85. rc = hh_irq_release(entry->label);
  86. if (rc) {
  87. SDE_ERROR("failed to release IRQ label: %d rc = %d\n",
  88. entry->label, rc);
  89. goto done;
  90. }
  91. atomic_dec(&sde_vm->base.n_irq_lent);
  92. rc = hh_irq_release_notify(entry->label);
  93. if (rc) {
  94. SDE_ERROR(
  95. "irq release notify failed,label: %d rc: %d\n",
  96. entry->label, rc);
  97. goto done;
  98. }
  99. SDE_INFO("sde vm irq release for label: %d succeeded\n",
  100. entry->label);
  101. }
  102. done:
  103. return rc;
  104. }
  105. static int _sde_vm_release_mem(struct sde_vm *vm)
  106. {
  107. int rc = 0;
  108. struct sde_vm_trusted *sde_vm = (struct sde_vm_trusted *)vm;
  109. if (sde_vm->base.io_mem_handle < 0)
  110. return 0;
  111. rc = hh_rm_mem_release(sde_vm->base.io_mem_handle, 0);
  112. if (rc) {
  113. SDE_ERROR("hh_rm_mem_release failed, rc=%d\n", rc);
  114. goto done;
  115. }
  116. rc = hh_rm_mem_notify(sde_vm->base.io_mem_handle,
  117. HH_RM_MEM_NOTIFY_OWNER_RELEASED,
  118. HH_MEM_NOTIFIER_TAG_DISPLAY, 0);
  119. if (rc) {
  120. SDE_ERROR("hyp mem notify on release failed, rc = %d\n", rc);
  121. goto done;
  122. }
  123. sde_vm->base.io_mem_handle = -1;
  124. SDE_INFO("sde vm mem release succeeded\n");
  125. done:
  126. return rc;
  127. }
  128. static int _sde_vm_release(struct sde_kms *kms)
  129. {
  130. struct sde_vm_trusted *sde_vm;
  131. int rc = 0;
  132. if (!kms->vm)
  133. return 0;
  134. sde_vm = to_vm_trusted(kms->vm);
  135. sde_kms_vm_trusted_resource_deinit(kms);
  136. rc = _sde_vm_release_mem(kms->vm);
  137. if (rc) {
  138. SDE_ERROR("mem_release failed, rc = %d\n", rc);
  139. goto end;
  140. }
  141. rc = _sde_vm_release_irq(kms->vm);
  142. if (rc)
  143. SDE_ERROR("irq_release failed, rc = %d\n", rc);
  144. end:
  145. return rc;
  146. }
  147. int _sde_vm_populate_res(struct sde_kms *sde_kms, struct sde_vm_trusted *vm)
  148. {
  149. struct msm_io_res io_res;
  150. int rc = 0;
  151. INIT_LIST_HEAD(&io_res.mem);
  152. INIT_LIST_HEAD(&io_res.irq);
  153. rc = sde_vm_get_resources(sde_kms, &io_res);
  154. if (rc) {
  155. SDE_ERROR("fail to get resources\n");
  156. return rc;
  157. }
  158. vm->sgl_desc = sde_vm_populate_sgl(&io_res);
  159. if (IS_ERR_OR_NULL(vm->sgl_desc)) {
  160. SDE_ERROR("failed to parse sgl list\n");
  161. return PTR_ERR(vm->sgl_desc);
  162. }
  163. vm->irq_desc = sde_vm_populate_irq(&io_res);
  164. if (IS_ERR_OR_NULL(vm->irq_desc)) {
  165. SDE_ERROR("failed to parse irq list\n");
  166. return PTR_ERR(vm->irq_desc);
  167. }
  168. sort(vm->irq_desc->irq_entries, vm->irq_desc->n_irq,
  169. sizeof(vm->irq_desc->irq_entries[0]), __irq_cmp, NULL);
  170. sort(vm->sgl_desc->sgl_entries, vm->sgl_desc->n_sgl_entries,
  171. sizeof(vm->sgl_desc->sgl_entries[0]), __sgl_cmp, NULL);
  172. return rc;
  173. }
  174. static bool _sde_vm_owns_hw(struct sde_kms *sde_kms)
  175. {
  176. struct sde_vm_trusted *sde_vm;
  177. bool owns_irq, owns_mem_io;
  178. sde_vm = to_vm_trusted(sde_kms->vm);
  179. owns_irq = (sde_vm->irq_desc->n_irq ==
  180. atomic_read(&sde_vm->base.n_irq_lent));
  181. owns_mem_io = (sde_vm->base.io_mem_handle >= 0);
  182. return (owns_irq && owns_mem_io);
  183. }
  184. static void _sde_vm_deinit(struct sde_kms *kms, struct sde_vm_ops *ops)
  185. {
  186. struct sde_vm_trusted *sde_vm;
  187. if (!kms->vm)
  188. return;
  189. sde_vm = to_vm_trusted(kms->vm);
  190. memset(ops, 0, sizeof(*ops));
  191. if (sde_vm->base.mem_notification_cookie)
  192. hh_mem_notifier_unregister(
  193. sde_vm->base.mem_notification_cookie);
  194. kfree(sde_vm->sgl_desc);
  195. if (sde_vm->irq_desc)
  196. sde_vm_free_irq(sde_vm->irq_desc);
  197. kfree(sde_vm);
  198. }
  199. static int _sde_vm_accept_mem(struct sde_vm *vm)
  200. {
  201. struct hh_sgl_desc *sgl_desc;
  202. struct hh_acl_desc *acl_desc;
  203. struct sde_vm_trusted *sde_vm;
  204. int rc = 0;
  205. sde_vm = to_vm_trusted(vm);
  206. acl_desc = sde_vm_populate_acl(HH_TRUSTED_VM);
  207. if (IS_ERR(acl_desc)) {
  208. SDE_ERROR("failed to populate acl data, rc=%d\n",
  209. PTR_ERR(acl_desc));
  210. rc = PTR_ERR(acl_desc);
  211. goto done;
  212. }
  213. sgl_desc = hh_rm_mem_accept(sde_vm->base.io_mem_handle,
  214. HH_RM_MEM_TYPE_IO,
  215. HH_RM_TRANS_TYPE_LEND,
  216. HH_RM_MEM_ACCEPT_VALIDATE_ACL_ATTRS|
  217. HH_RM_MEM_ACCEPT_VALIDATE_LABEL|
  218. HH_RM_MEM_ACCEPT_DONE,
  219. SDE_VM_MEM_LABEL,
  220. acl_desc, NULL, NULL, 0);
  221. if (IS_ERR_OR_NULL(sgl_desc)) {
  222. SDE_ERROR("hh_rm_mem_accept failed with error, rc=%d\n",
  223. PTR_ERR(sgl_desc));
  224. rc = -EINVAL;
  225. /* ACCEPT didn't go through. So no need to call the RELEASE */
  226. sde_vm->base.io_mem_handle = -1;
  227. goto accept_fail;
  228. }
  229. rc = _sde_vm_validate_sgl(sde_vm->sgl_desc, sgl_desc);
  230. if (rc) {
  231. SDE_ERROR(
  232. "failed in sgl validation for SDE_VM_MEM_LABEL label, rc = %d\n",
  233. rc);
  234. goto accept_fail;
  235. }
  236. SDE_INFO("mem accept succeeded for SDE_VM_MEM_LABEL label\n");
  237. return 0;
  238. accept_fail:
  239. kfree(acl_desc);
  240. done:
  241. return rc;
  242. }
  243. static int _sde_vm_accept_irq(struct sde_vm *vm)
  244. {
  245. struct sde_vm_trusted *sde_vm;
  246. struct sde_vm_irq_desc *irq_desc;
  247. struct irq_data *exp_irq_data, *acc_irq_data;
  248. int accepted_irq, expected_irq;
  249. int rc = 0, i;
  250. sde_vm = to_vm_trusted(vm);
  251. irq_desc = sde_vm->irq_desc;
  252. for (i = 0; i < irq_desc->n_irq; i++) {
  253. struct sde_vm_irq_entry *irq_entry = &irq_desc->irq_entries[i];
  254. expected_irq = irq_entry->irq;
  255. accepted_irq = hh_irq_accept(irq_entry->label, -1,
  256. IRQ_TYPE_LEVEL_HIGH);
  257. if (accepted_irq < 0) {
  258. SDE_ERROR("failed to accept irq for label: %d\n",
  259. irq_entry->label);
  260. rc = -EINVAL;
  261. goto end;
  262. }
  263. atomic_inc(&sde_vm->base.n_irq_lent);
  264. exp_irq_data = irq_get_irq_data(expected_irq);
  265. if (!exp_irq_data) {
  266. SDE_ERROR("failed to get irq data for irq: %d\n",
  267. exp_irq_data);
  268. rc = -EINVAL;
  269. goto end;
  270. }
  271. acc_irq_data = irq_get_irq_data(accepted_irq);
  272. if (!acc_irq_data) {
  273. SDE_ERROR("failed to get irq data for irq: %d\n",
  274. accepted_irq);
  275. rc = -EINVAL;
  276. goto end;
  277. }
  278. if (exp_irq_data->hwirq != acc_irq_data->hwirq) {
  279. SDE_ERROR("IRQ mismatch on ACCEPT for label %d\n",
  280. irq_entry->label);
  281. rc = -EINVAL;
  282. goto end;
  283. }
  284. SDE_INFO("IRQ accept succeeded for label %d irq: %d\n",
  285. irq_entry->label, exp_irq_data->hwirq);
  286. }
  287. end:
  288. return rc;
  289. }
  290. static int _sde_vm_accept(struct sde_kms *kms)
  291. {
  292. int rc = 0;
  293. rc = _sde_vm_accept_mem(kms->vm);
  294. if (rc)
  295. goto res_accept_fail;
  296. rc = _sde_vm_accept_irq(kms->vm);
  297. if (rc)
  298. goto res_accept_fail;
  299. rc = sde_kms_vm_trusted_resource_init(kms);
  300. if (rc) {
  301. SDE_ERROR("vm resource init failed\n");
  302. goto res_accept_fail;
  303. }
  304. goto end;
  305. res_accept_fail:
  306. _sde_vm_release_irq(kms->vm);
  307. _sde_vm_release_mem(kms->vm);
  308. end:
  309. return rc;
  310. }
  311. static void _sde_vm_set_ops(struct sde_vm_ops *ops)
  312. {
  313. memset(ops, 0, sizeof(*ops));
  314. ops->vm_client_pre_release = sde_vm_pre_release;
  315. ops->vm_client_post_acquire = sde_vm_post_acquire;
  316. ops->vm_release = _sde_vm_release;
  317. ops->vm_acquire = _sde_vm_accept;
  318. ops->vm_owns_hw = _sde_vm_owns_hw;
  319. ops->vm_deinit = _sde_vm_deinit;
  320. ops->vm_prepare_commit = sde_kms_vm_trusted_prepare_commit;
  321. ops->vm_post_commit = sde_kms_vm_trusted_post_commit;
  322. ops->vm_request_valid = sde_vm_request_valid;
  323. ops->vm_acquire_fail_handler = _sde_vm_release;
  324. }
  325. int sde_vm_trusted_init(struct sde_kms *kms)
  326. {
  327. struct sde_vm_trusted *sde_vm;
  328. void *cookie;
  329. int rc = 0;
  330. sde_vm = kzalloc(sizeof(*sde_vm), GFP_KERNEL);
  331. if (!sde_vm)
  332. return -ENOMEM;
  333. _sde_vm_set_ops(&sde_vm->base.vm_ops);
  334. sde_vm->base.sde_kms = kms;
  335. mutex_init(&sde_vm->base.vm_res_lock);
  336. /**
  337. * Optimize resource population by reading the entire HW resource
  338. * space once during init. Once trusted vm starts supporting
  339. * per-display space assignment, this read has to be done on each event
  340. * notification.
  341. */
  342. rc = _sde_vm_populate_res(kms, sde_vm);
  343. if (rc) {
  344. SDE_ERROR("failed to populate trusted vm res, rc= %d\n", rc);
  345. goto init_fail;
  346. }
  347. cookie = hh_mem_notifier_register(HH_MEM_NOTIFIER_TAG_DISPLAY,
  348. sde_vm_mem_lend_notification_handler, sde_vm);
  349. if (!cookie) {
  350. SDE_ERROR("fails to register RM mem lend notifier\n");
  351. goto init_fail;
  352. }
  353. sde_vm->base.mem_notification_cookie = cookie;
  354. rc = hh_irq_wait_for_lend_v2(HH_IRQ_LABEL_SDE, HH_PRIMARY_VM,
  355. sde_vm_irq_lend_notification_handler,
  356. (void *)sde_vm);
  357. if (rc) {
  358. SDE_ERROR("wait for irq lend on label: %d failed, rc=%d\n",
  359. HH_IRQ_LABEL_SDE, rc);
  360. goto init_fail;
  361. }
  362. kms->vm = &sde_vm->base;
  363. atomic_set(&sde_vm->base.n_irq_lent, 0);
  364. return 0;
  365. init_fail:
  366. _sde_vm_deinit(kms, &sde_vm->base.vm_ops);
  367. return rc;
  368. }