sde_vm_trusted.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2020-2021, The Linux Foundation. All rights reserved.
  4. */
  5. #define pr_fmt(fmt) "[drm:%s:%d] " fmt, __func__, __LINE__
  6. #include <linux/gunyah/gh_rm_drv.h>
  7. #include <linux/gunyah/gh_irq_lend.h>
  8. #include <linux/gunyah/gh_mem_notifier.h>
  9. #include <linux/sort.h>
  10. #include <linux/bsearch.h>
  11. #include <linux/irq.h>
  12. #include <linux/irqdomain.h>
  13. #include "sde_kms.h"
  14. #include "sde_vm_common.h"
  15. #include "sde_vm.h"
  16. #include "sde_vm_msgq.h"
  17. #define to_vm_trusted(vm) ((struct sde_vm_trusted *)vm)
  18. static int __sgl_cmp(const void *a, const void *b)
  19. {
  20. struct gh_sgl_entry *l = (struct gh_sgl_entry *)a;
  21. struct gh_sgl_entry *r = (struct gh_sgl_entry *)b;
  22. return (l->ipa_base - r->ipa_base);
  23. }
  24. int _sde_vm_validate_sgl(struct gh_sgl_desc *expected,
  25. struct gh_sgl_desc *assigned)
  26. {
  27. u32 idx;
  28. /*
  29. * fragmented address spaces are not supported.
  30. * So the number of sgl entries is expected to be the same.
  31. */
  32. if (expected->n_sgl_entries != assigned->n_sgl_entries)
  33. return -E2BIG;
  34. sort(assigned->sgl_entries, assigned->n_sgl_entries,
  35. sizeof(assigned->sgl_entries[0]), __sgl_cmp, NULL);
  36. for (idx = 0; idx < expected->n_sgl_entries; idx++) {
  37. struct gh_sgl_entry *e = &expected->sgl_entries[idx];
  38. struct gh_sgl_entry *a = &assigned->sgl_entries[idx];
  39. if ((e->ipa_base != a->ipa_base) || (e->size != a->size)) {
  40. SDE_DEBUG("sgl mismatch: (%llu - %llu) vs (%llu - %llu)\n",
  41. e->ipa_base, e->size, a->ipa_base, a->size);
  42. return -EINVAL;
  43. }
  44. }
  45. return 0;
  46. }
  47. static int __irq_cmp(const void *a, const void *b)
  48. {
  49. struct sde_vm_irq_entry *l = (struct sde_vm_irq_entry *)a;
  50. struct sde_vm_irq_entry *r = (struct sde_vm_irq_entry *)b;
  51. return (l->label - r->label);
  52. }
  53. static void sde_vm_mem_lend_notification_handler(enum gh_mem_notifier_tag tag,
  54. unsigned long notif_type,
  55. void *entry_data, void *notif_msg)
  56. {
  57. struct gh_rm_notif_mem_shared_payload *payload;
  58. struct sde_vm_trusted *sde_vm;
  59. if (notif_type != GH_RM_NOTIF_MEM_SHARED ||
  60. tag != GH_MEM_NOTIFIER_TAG_DISPLAY)
  61. return;
  62. if (!entry_data || !notif_msg)
  63. return;
  64. payload = (struct gh_rm_notif_mem_shared_payload *)notif_msg;
  65. if (payload->trans_type != GH_RM_TRANS_TYPE_LEND ||
  66. payload->label != SDE_VM_MEM_LABEL)
  67. return;
  68. sde_vm = (struct sde_vm_trusted *)entry_data;
  69. mutex_lock(&sde_vm->base.vm_res_lock);
  70. sde_vm->base.io_mem_handle = payload->mem_handle;
  71. mutex_unlock(&sde_vm->base.vm_res_lock);
  72. SDE_INFO("mem lend notification for tag: %d label: %d handle: %d\n",
  73. tag, payload->label, payload->mem_handle);
  74. }
  75. void sde_vm_irq_lend_notification_handler(void *req,
  76. unsigned long notif_type, enum gh_irq_label label)
  77. {
  78. SDE_INFO("IRQ LEND notification for label: %d\n", label);
  79. }
  80. static int _sde_vm_release_irq(struct sde_vm *vm)
  81. {
  82. struct sde_vm_trusted *sde_vm = (struct sde_vm_trusted *)vm;
  83. struct sde_vm_irq_desc *irq_desc = sde_vm->irq_desc;
  84. int i, rc = 0;
  85. for (i = atomic_read(&sde_vm->base.n_irq_lent) - 1; i >= 0; i--) {
  86. struct sde_vm_irq_entry *entry = &irq_desc->irq_entries[i];
  87. rc = gh_irq_release(entry->label);
  88. if (rc) {
  89. SDE_ERROR("failed to release IRQ label: %d rc = %d\n",
  90. entry->label, rc);
  91. goto done;
  92. }
  93. atomic_dec(&sde_vm->base.n_irq_lent);
  94. rc = gh_irq_release_notify(entry->label);
  95. if (rc) {
  96. SDE_ERROR(
  97. "irq release notify failed,label: %d rc: %d\n",
  98. entry->label, rc);
  99. goto done;
  100. }
  101. SDE_INFO("sde vm irq release for label: %d succeeded\n",
  102. entry->label);
  103. }
  104. done:
  105. return rc;
  106. }
  107. static int _sde_vm_release_mem(struct sde_vm *vm)
  108. {
  109. int rc = 0;
  110. struct sde_vm_trusted *sde_vm = (struct sde_vm_trusted *)vm;
  111. if (sde_vm->base.io_mem_handle < 0)
  112. return 0;
  113. rc = gh_rm_mem_release(sde_vm->base.io_mem_handle, 0);
  114. if (rc) {
  115. SDE_ERROR("gh_rm_mem_release failed, rc=%d\n", rc);
  116. goto done;
  117. }
  118. rc = gh_rm_mem_notify(sde_vm->base.io_mem_handle,
  119. GH_RM_MEM_NOTIFY_OWNER_RELEASED,
  120. GH_MEM_NOTIFIER_TAG_DISPLAY, 0);
  121. if (rc) {
  122. SDE_ERROR("hyp mem notify on release failed, rc = %d\n", rc);
  123. goto done;
  124. }
  125. sde_vm->base.io_mem_handle = -1;
  126. SDE_INFO("sde vm mem release succeeded\n");
  127. done:
  128. return rc;
  129. }
  130. static int _sde_vm_release(struct sde_kms *kms)
  131. {
  132. struct sde_vm_trusted *sde_vm;
  133. int rc = 0;
  134. if (!kms->vm)
  135. return 0;
  136. sde_vm = to_vm_trusted(kms->vm);
  137. sde_kms_vm_trusted_resource_deinit(kms);
  138. rc = _sde_vm_release_mem(kms->vm);
  139. if (rc) {
  140. SDE_ERROR("mem_release failed, rc = %d\n", rc);
  141. goto end;
  142. }
  143. rc = _sde_vm_release_irq(kms->vm);
  144. if (rc)
  145. SDE_ERROR("irq_release failed, rc = %d\n", rc);
  146. end:
  147. return rc;
  148. }
  149. int _sde_vm_resource_init(struct sde_kms *sde_kms,
  150. struct drm_atomic_state *state)
  151. {
  152. int rc = 0;
  153. rc = sde_kms_vm_trusted_resource_init(sde_kms, state);
  154. if (rc)
  155. SDE_ERROR("vm resource init failed\n");
  156. return rc;
  157. }
  158. int _sde_vm_populate_res(struct sde_kms *sde_kms, struct sde_vm_trusted *vm)
  159. {
  160. struct msm_io_res io_res;
  161. int rc = 0;
  162. INIT_LIST_HEAD(&io_res.mem);
  163. INIT_LIST_HEAD(&io_res.irq);
  164. rc = sde_vm_get_resources(sde_kms, &io_res);
  165. if (rc) {
  166. SDE_ERROR("fail to get resources\n");
  167. return rc;
  168. }
  169. vm->sgl_desc = sde_vm_populate_sgl(&io_res);
  170. if (IS_ERR_OR_NULL(vm->sgl_desc)) {
  171. SDE_ERROR("failed to parse sgl list\n");
  172. return PTR_ERR(vm->sgl_desc);
  173. }
  174. vm->irq_desc = sde_vm_populate_irq(&io_res);
  175. if (IS_ERR_OR_NULL(vm->irq_desc)) {
  176. SDE_ERROR("failed to parse irq list\n");
  177. return PTR_ERR(vm->irq_desc);
  178. }
  179. sort(vm->irq_desc->irq_entries, vm->irq_desc->n_irq,
  180. sizeof(vm->irq_desc->irq_entries[0]), __irq_cmp, NULL);
  181. sort(vm->sgl_desc->sgl_entries, vm->sgl_desc->n_sgl_entries,
  182. sizeof(vm->sgl_desc->sgl_entries[0]), __sgl_cmp, NULL);
  183. return rc;
  184. }
  185. static bool _sde_vm_owns_hw(struct sde_kms *sde_kms)
  186. {
  187. struct sde_vm_trusted *sde_vm;
  188. bool owns_irq, owns_mem_io;
  189. sde_vm = to_vm_trusted(sde_kms->vm);
  190. owns_irq = (sde_vm->irq_desc->n_irq ==
  191. atomic_read(&sde_vm->base.n_irq_lent));
  192. owns_mem_io = (sde_vm->base.io_mem_handle >= 0);
  193. return (owns_irq && owns_mem_io);
  194. }
  195. static void _sde_vm_deinit(struct sde_kms *kms, struct sde_vm_ops *ops)
  196. {
  197. struct sde_vm_trusted *sde_vm;
  198. if (!kms->vm)
  199. return;
  200. sde_vm = to_vm_trusted(kms->vm);
  201. memset(ops, 0, sizeof(*ops));
  202. sde_vm_msgq_deinit(kms->vm);
  203. if (sde_vm->base.mem_notification_cookie)
  204. gh_mem_notifier_unregister(
  205. sde_vm->base.mem_notification_cookie);
  206. kfree(sde_vm->sgl_desc);
  207. if (sde_vm->irq_desc)
  208. sde_vm_free_irq(sde_vm->irq_desc);
  209. kfree(sde_vm);
  210. }
  211. static int _sde_vm_accept_mem(struct sde_vm *vm)
  212. {
  213. struct gh_sgl_desc *sgl_desc;
  214. struct gh_acl_desc *acl_desc;
  215. struct sde_vm_trusted *sde_vm;
  216. int rc = 0;
  217. sde_vm = to_vm_trusted(vm);
  218. acl_desc = sde_vm_populate_acl(GH_TRUSTED_VM);
  219. if (IS_ERR(acl_desc)) {
  220. SDE_ERROR("failed to populate acl data, rc=%ld\n",
  221. PTR_ERR(acl_desc));
  222. rc = PTR_ERR(acl_desc);
  223. goto done;
  224. }
  225. sgl_desc = gh_rm_mem_accept(sde_vm->base.io_mem_handle,
  226. GH_RM_MEM_TYPE_IO,
  227. GH_RM_TRANS_TYPE_LEND,
  228. GH_RM_MEM_ACCEPT_VALIDATE_ACL_ATTRS|
  229. GH_RM_MEM_ACCEPT_VALIDATE_LABEL|
  230. GH_RM_MEM_ACCEPT_DONE,
  231. SDE_VM_MEM_LABEL,
  232. acl_desc, NULL, NULL, 0);
  233. if (IS_ERR_OR_NULL(sgl_desc)) {
  234. SDE_ERROR("gh_rm_mem_accept failed with error, rc=%ld\n",
  235. PTR_ERR(sgl_desc));
  236. rc = -EINVAL;
  237. /* ACCEPT didn't go through. So no need to call the RELEASE */
  238. sde_vm->base.io_mem_handle = -1;
  239. goto accept_fail;
  240. }
  241. rc = _sde_vm_validate_sgl(sde_vm->sgl_desc, sgl_desc);
  242. if (rc) {
  243. SDE_ERROR(
  244. "failed in sgl validation for SDE_VM_MEM_LABEL label, rc = %d\n",
  245. rc);
  246. goto accept_fail;
  247. }
  248. SDE_INFO("mem accept succeeded for SDE_VM_MEM_LABEL label\n");
  249. return 0;
  250. accept_fail:
  251. kfree(acl_desc);
  252. done:
  253. return rc;
  254. }
  255. static int _sde_vm_accept_irq(struct sde_vm *vm)
  256. {
  257. struct sde_vm_trusted *sde_vm;
  258. struct sde_vm_irq_desc *irq_desc;
  259. struct irq_data *exp_irq_data, *acc_irq_data;
  260. int accepted_irq, expected_irq;
  261. int rc = 0, i;
  262. sde_vm = to_vm_trusted(vm);
  263. irq_desc = sde_vm->irq_desc;
  264. for (i = 0; i < irq_desc->n_irq; i++) {
  265. struct sde_vm_irq_entry *irq_entry = &irq_desc->irq_entries[i];
  266. expected_irq = irq_entry->irq;
  267. accepted_irq = gh_irq_accept(irq_entry->label, -1,
  268. IRQ_TYPE_LEVEL_HIGH);
  269. if (accepted_irq < 0) {
  270. SDE_ERROR("failed to accept irq for label: %d\n",
  271. irq_entry->label);
  272. rc = -EINVAL;
  273. goto end;
  274. }
  275. atomic_inc(&sde_vm->base.n_irq_lent);
  276. exp_irq_data = irq_get_irq_data(expected_irq);
  277. if (!exp_irq_data) {
  278. SDE_ERROR("failed to get irq data for irq: %d\n",
  279. expected_irq);
  280. rc = -EINVAL;
  281. goto end;
  282. }
  283. acc_irq_data = irq_get_irq_data(accepted_irq);
  284. if (!acc_irq_data) {
  285. SDE_ERROR("failed to get irq data for irq: %d\n",
  286. accepted_irq);
  287. rc = -EINVAL;
  288. goto end;
  289. }
  290. if (exp_irq_data->hwirq != acc_irq_data->hwirq) {
  291. SDE_ERROR("IRQ mismatch on ACCEPT for label %d\n",
  292. irq_entry->label);
  293. rc = -EINVAL;
  294. goto end;
  295. }
  296. SDE_INFO("IRQ accept succeeded for label %u irq: %lu\n",
  297. irq_entry->label, exp_irq_data->hwirq);
  298. }
  299. end:
  300. return rc;
  301. }
  302. static int _sde_vm_accept(struct sde_kms *kms)
  303. {
  304. int rc = 0;
  305. rc = _sde_vm_accept_mem(kms->vm);
  306. if (rc)
  307. goto res_accept_fail;
  308. rc = _sde_vm_accept_irq(kms->vm);
  309. if (rc)
  310. goto res_accept_fail;
  311. return 0;
  312. res_accept_fail:
  313. _sde_vm_release_irq(kms->vm);
  314. _sde_vm_release_mem(kms->vm);
  315. return rc;
  316. }
  317. static void _sde_vm_set_ops(struct sde_vm_ops *ops)
  318. {
  319. memset(ops, 0, sizeof(*ops));
  320. ops->vm_client_pre_release = sde_vm_pre_release;
  321. ops->vm_client_post_acquire = sde_vm_post_acquire;
  322. ops->vm_release = _sde_vm_release;
  323. ops->vm_acquire = _sde_vm_accept;
  324. ops->vm_owns_hw = _sde_vm_owns_hw;
  325. ops->vm_deinit = _sde_vm_deinit;
  326. ops->vm_prepare_commit = sde_kms_vm_trusted_prepare_commit;
  327. ops->vm_post_commit = sde_kms_vm_trusted_post_commit;
  328. ops->vm_request_valid = sde_vm_request_valid;
  329. ops->vm_acquire_fail_handler = _sde_vm_release;
  330. ops->vm_msg_send = sde_vm_msg_send;
  331. ops->vm_resource_init = _sde_vm_resource_init;
  332. }
  333. int sde_vm_trusted_init(struct sde_kms *kms)
  334. {
  335. struct sde_vm_trusted *sde_vm;
  336. void *cookie;
  337. int rc = 0;
  338. sde_vm = kzalloc(sizeof(*sde_vm), GFP_KERNEL);
  339. if (!sde_vm)
  340. return -ENOMEM;
  341. _sde_vm_set_ops(&sde_vm->base.vm_ops);
  342. sde_vm->base.sde_kms = kms;
  343. mutex_init(&sde_vm->base.vm_res_lock);
  344. /**
  345. * Optimize resource population by reading the entire HW resource
  346. * space once during init. Once trusted vm starts supporting
  347. * per-display space assignment, this read has to be done on each event
  348. * notification.
  349. */
  350. rc = _sde_vm_populate_res(kms, sde_vm);
  351. if (rc) {
  352. SDE_ERROR("failed to populate trusted vm res, rc= %d\n", rc);
  353. goto init_fail;
  354. }
  355. cookie = gh_mem_notifier_register(GH_MEM_NOTIFIER_TAG_DISPLAY,
  356. sde_vm_mem_lend_notification_handler, sde_vm);
  357. if (!cookie) {
  358. SDE_ERROR("fails to register RM mem lend notifier\n");
  359. goto init_fail;
  360. }
  361. sde_vm->base.mem_notification_cookie = cookie;
  362. rc = gh_irq_wait_for_lend_v2(GH_IRQ_LABEL_SDE, GH_PRIMARY_VM,
  363. sde_vm_irq_lend_notification_handler,
  364. (void *)sde_vm);
  365. if (rc) {
  366. SDE_ERROR("wait for irq lend on label: %d failed, rc=%d\n",
  367. GH_IRQ_LABEL_SDE, rc);
  368. goto init_fail;
  369. }
  370. kms->vm = &sde_vm->base;
  371. atomic_set(&sde_vm->base.n_irq_lent, 0);
  372. rc = sde_vm_msgq_init(kms->vm);
  373. if (rc) {
  374. SDE_ERROR("failed to initialize the msgq, rc=%d\n", rc);
  375. goto init_fail;
  376. }
  377. return 0;
  378. init_fail:
  379. _sde_vm_deinit(kms, &sde_vm->base.vm_ops);
  380. return rc;
  381. }