| /* |
| * Copyright © 2014 Broadcom |
| * |
| * Permission is hereby granted, free of charge, to any person obtaining a |
| * copy of this software and associated documentation files (the "Software"), |
| * to deal in the Software without restriction, including without limitation |
| * the rights to use, copy, modify, merge, publish, distribute, sublicense, |
| * and/or sell copies of the Software, and to permit persons to whom the |
| * Software is furnished to do so, subject to the following conditions: |
| * |
| * The above copyright notice and this permission notice (including the next |
| * paragraph) shall be included in all copies or substantial portions of the |
| * Software. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR |
| * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
| * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL |
| * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER |
| * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING |
| * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS |
| * IN THE SOFTWARE. |
| */ |
| |
| /** |
| * Command list validator for VC4. |
| * |
| * The VC4 has no IOMMU between it and system memory. So, a user with |
| * access to execute command lists could escalate privilege by |
| * overwriting system memory (drawing to it as a framebuffer) or |
| * reading system memory it shouldn't (reading it as a texture, or |
| * uniform data, or vertex data). |
| * |
| * This validates command lists to ensure that all accesses are within |
| * the bounds of the GEM objects referenced. It explicitly whitelists |
| * packets, and looks at the offsets in any address fields to make |
| * sure they're constrained within the BOs they reference. |
| * |
| * Note that because of the validation that's happening anyway, this |
| * is where GEM relocation processing happens. |
| */ |
| |
| #include "uapi/drm/vc4_drm.h" |
| #include "vc4_drv.h" |
| #include "vc4_packet.h" |
| |
| #define VALIDATE_ARGS \ |
| struct vc4_exec_info *exec, \ |
| void *validated, \ |
| void *untrusted |
| |
| /** Return the width in pixels of a 64-byte microtile. */ |
| static uint32_t |
| utile_width(int cpp) |
| { |
| switch (cpp) { |
| case 1: |
| case 2: |
| return 8; |
| case 4: |
| return 4; |
| case 8: |
| return 2; |
| default: |
| DRM_ERROR("unknown cpp: %d\n", cpp); |
| return 1; |
| } |
| } |
| |
| /** Return the height in pixels of a 64-byte microtile. */ |
| static uint32_t |
| utile_height(int cpp) |
| { |
| switch (cpp) { |
| case 1: |
| return 8; |
| case 2: |
| case 4: |
| case 8: |
| return 4; |
| default: |
| DRM_ERROR("unknown cpp: %d\n", cpp); |
| return 1; |
| } |
| } |
| |
| /** |
| * The texture unit decides what tiling format a particular miplevel is using |
| * this function, so we lay out our miptrees accordingly. |
| */ |
| static bool |
| size_is_lt(uint32_t width, uint32_t height, int cpp) |
| { |
| return (width <= 4 * utile_width(cpp) || |
| height <= 4 * utile_height(cpp)); |
| } |
| |
| struct drm_gem_cma_object * |
| vc4_use_bo(struct vc4_exec_info *exec, uint32_t hindex) |
| { |
| struct drm_gem_cma_object *obj; |
| struct vc4_bo *bo; |
| |
| if (hindex >= exec->bo_count) { |
| DRM_ERROR("BO index %d greater than BO count %d\n", |
| hindex, exec->bo_count); |
| return NULL; |
| } |
| obj = exec->bo[hindex]; |
| bo = to_vc4_bo(&obj->base); |
| |
| if (bo->validated_shader) { |
| DRM_ERROR("Trying to use shader BO as something other than " |
| "a shader\n"); |
| return NULL; |
| } |
| |
| return obj; |
| } |
| |
| static struct drm_gem_cma_object * |
| vc4_use_handle(struct vc4_exec_info *exec, uint32_t gem_handles_packet_index) |
| { |
| return vc4_use_bo(exec, exec->bo_index[gem_handles_packet_index]); |
| } |
| |
| static bool |
| validate_bin_pos(struct vc4_exec_info *exec, void *untrusted, uint32_t pos) |
| { |
| /* Note that the untrusted pointer passed to these functions is |
| * incremented past the packet byte. |
| */ |
| return (untrusted - 1 == exec->bin_u + pos); |
| } |
| |
| static uint32_t |
| gl_shader_rec_size(uint32_t pointer_bits) |
| { |
| uint32_t attribute_count = pointer_bits & 7; |
| bool extended = pointer_bits & 8; |
| |
| if (attribute_count == 0) |
| attribute_count = 8; |
| |
| if (extended) |
| return 100 + attribute_count * 4; |
| else |
| return 36 + attribute_count * 8; |
| } |
| |
| bool |
| vc4_check_tex_size(struct vc4_exec_info *exec, struct drm_gem_cma_object *fbo, |
| uint32_t offset, uint8_t tiling_format, |
| uint32_t width, uint32_t height, uint8_t cpp) |
| { |
| uint32_t aligned_width, aligned_height, stride, size; |
| uint32_t utile_w = utile_width(cpp); |
| uint32_t utile_h = utile_height(cpp); |
| |
| /* The shaded vertex format stores signed 12.4 fixed point |
| * (-2048,2047) offsets from the viewport center, so we should |
| * never have a render target larger than 4096. The texture |
| * unit can only sample from 2048x2048, so it's even more |
| * restricted. This lets us avoid worrying about overflow in |
| * our math. |
| */ |
| if (width > 4096 || height > 4096) { |
| DRM_ERROR("Surface dimesions (%d,%d) too large", width, height); |
| return false; |
| } |
| |
| switch (tiling_format) { |
| case VC4_TILING_FORMAT_LINEAR: |
| aligned_width = round_up(width, utile_w); |
| aligned_height = height; |
| break; |
| case VC4_TILING_FORMAT_T: |
| aligned_width = round_up(width, utile_w * 8); |
| aligned_height = round_up(height, utile_h * 8); |
| break; |
| case VC4_TILING_FORMAT_LT: |
| aligned_width = round_up(width, utile_w); |
| aligned_height = round_up(height, utile_h); |
| break; |
| default: |
| DRM_ERROR("buffer tiling %d unsupported\n", tiling_format); |
| return false; |
| } |
| |
| stride = aligned_width * cpp; |
| size = stride * aligned_height; |
| |
| if (size + offset < size || |
| size + offset > fbo->base.size) { |
| DRM_ERROR("Overflow in %dx%d (%dx%d) fbo size (%d + %d > %zd)\n", |
| width, height, |
| aligned_width, aligned_height, |
| size, offset, fbo->base.size); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| static int |
| validate_flush(VALIDATE_ARGS) |
| { |
| if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 1)) { |
| DRM_ERROR("Bin CL must end with VC4_PACKET_FLUSH\n"); |
| return -EINVAL; |
| } |
| exec->found_flush = true; |
| |
| return 0; |
| } |
| |
| static int |
| validate_start_tile_binning(VALIDATE_ARGS) |
| { |
| if (exec->found_start_tile_binning_packet) { |
| DRM_ERROR("Duplicate VC4_PACKET_START_TILE_BINNING\n"); |
| return -EINVAL; |
| } |
| exec->found_start_tile_binning_packet = true; |
| |
| if (!exec->found_tile_binning_mode_config_packet) { |
| DRM_ERROR("missing VC4_PACKET_TILE_BINNING_MODE_CONFIG\n"); |
| return -EINVAL; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| validate_increment_semaphore(VALIDATE_ARGS) |
| { |
| if (!validate_bin_pos(exec, untrusted, exec->args->bin_cl_size - 2)) { |
| DRM_ERROR("Bin CL must end with " |
| "VC4_PACKET_INCREMENT_SEMAPHORE\n"); |
| return -EINVAL; |
| } |
| exec->found_increment_semaphore_packet = true; |
| |
| return 0; |
| } |
| |
| static int |
| validate_indexed_prim_list(VALIDATE_ARGS) |
| { |
| struct drm_gem_cma_object *ib; |
| uint32_t length = *(uint32_t *)(untrusted + 1); |
| uint32_t offset = *(uint32_t *)(untrusted + 5); |
| uint32_t max_index = *(uint32_t *)(untrusted + 9); |
| uint32_t index_size = (*(uint8_t *)(untrusted + 0) >> 4) ? 2 : 1; |
| struct vc4_shader_state *shader_state; |
| |
| /* Check overflow condition */ |
| if (exec->shader_state_count == 0) { |
| DRM_ERROR("shader state must precede primitives\n"); |
| return -EINVAL; |
| } |
| shader_state = &exec->shader_state[exec->shader_state_count - 1]; |
| |
| if (max_index > shader_state->max_index) |
| shader_state->max_index = max_index; |
| |
| ib = vc4_use_handle(exec, 0); |
| if (!ib) |
| return -EINVAL; |
| |
| if (offset > ib->base.size || |
| (ib->base.size - offset) / index_size < length) { |
| DRM_ERROR("IB access overflow (%d + %d*%d > %zd)\n", |
| offset, length, index_size, ib->base.size); |
| return -EINVAL; |
| } |
| |
| *(uint32_t *)(validated + 5) = ib->paddr + offset; |
| |
| return 0; |
| } |
| |
| static int |
| validate_gl_array_primitive(VALIDATE_ARGS) |
| { |
| uint32_t length = *(uint32_t *)(untrusted + 1); |
| uint32_t base_index = *(uint32_t *)(untrusted + 5); |
| uint32_t max_index; |
| struct vc4_shader_state *shader_state; |
| |
| /* Check overflow condition */ |
| if (exec->shader_state_count == 0) { |
| DRM_ERROR("shader state must precede primitives\n"); |
| return -EINVAL; |
| } |
| shader_state = &exec->shader_state[exec->shader_state_count - 1]; |
| |
| if (length + base_index < length) { |
| DRM_ERROR("primitive vertex count overflow\n"); |
| return -EINVAL; |
| } |
| max_index = length + base_index - 1; |
| |
| if (max_index > shader_state->max_index) |
| shader_state->max_index = max_index; |
| |
| return 0; |
| } |
| |
| static int |
| validate_gl_shader_state(VALIDATE_ARGS) |
| { |
| uint32_t i = exec->shader_state_count++; |
| |
| if (i >= exec->shader_state_size) { |
| DRM_ERROR("More requests for shader states than declared\n"); |
| return -EINVAL; |
| } |
| |
| exec->shader_state[i].addr = *(uint32_t *)untrusted; |
| exec->shader_state[i].max_index = 0; |
| |
| if (exec->shader_state[i].addr & ~0xf) { |
| DRM_ERROR("high bits set in GL shader rec reference\n"); |
| return -EINVAL; |
| } |
| |
| *(uint32_t *)validated = (exec->shader_rec_p + |
| exec->shader_state[i].addr); |
| |
| exec->shader_rec_p += |
| roundup(gl_shader_rec_size(exec->shader_state[i].addr), 16); |
| |
| return 0; |
| } |
| |
| static int |
| validate_tile_binning_config(VALIDATE_ARGS) |
| { |
| struct drm_device *dev = exec->exec_bo->base.dev; |
| struct vc4_bo *tile_bo; |
| uint8_t flags; |
| uint32_t tile_state_size, tile_alloc_size; |
| uint32_t tile_count; |
| |
| if (exec->found_tile_binning_mode_config_packet) { |
| DRM_ERROR("Duplicate VC4_PACKET_TILE_BINNING_MODE_CONFIG\n"); |
| return -EINVAL; |
| } |
| exec->found_tile_binning_mode_config_packet = true; |
| |
| exec->bin_tiles_x = *(uint8_t *)(untrusted + 12); |
| exec->bin_tiles_y = *(uint8_t *)(untrusted + 13); |
| tile_count = exec->bin_tiles_x * exec->bin_tiles_y; |
| flags = *(uint8_t *)(untrusted + 14); |
| |
| if (exec->bin_tiles_x == 0 || |
| exec->bin_tiles_y == 0) { |
| DRM_ERROR("Tile binning config of %dx%d too small\n", |
| exec->bin_tiles_x, exec->bin_tiles_y); |
| return -EINVAL; |
| } |
| |
| if (flags & (VC4_BIN_CONFIG_DB_NON_MS | |
| VC4_BIN_CONFIG_TILE_BUFFER_64BIT)) { |
| DRM_ERROR("unsupported binning config flags 0x%02x\n", flags); |
| return -EINVAL; |
| } |
| |
| /* The tile state data array is 48 bytes per tile, and we put it at |
| * the start of a BO containing both it and the tile alloc. |
| */ |
| tile_state_size = 48 * tile_count; |
| |
| /* Since the tile alloc array will follow us, align. */ |
| exec->tile_alloc_offset = roundup(tile_state_size, 4096); |
| |
| *(uint8_t *)(validated + 14) = |
| ((flags & ~(VC4_BIN_CONFIG_ALLOC_INIT_BLOCK_SIZE_MASK | |
| VC4_BIN_CONFIG_ALLOC_BLOCK_SIZE_MASK)) | |
| VC4_BIN_CONFIG_AUTO_INIT_TSDA | |
| VC4_SET_FIELD(VC4_BIN_CONFIG_ALLOC_INIT_BLOCK_SIZE_32, |
| VC4_BIN_CONFIG_ALLOC_INIT_BLOCK_SIZE) | |
| VC4_SET_FIELD(VC4_BIN_CONFIG_ALLOC_BLOCK_SIZE_128, |
| VC4_BIN_CONFIG_ALLOC_BLOCK_SIZE)); |
| |
| /* Initial block size. */ |
| tile_alloc_size = 32 * tile_count; |
| |
| /* |
| * The initial allocation gets rounded to the next 256 bytes before |
| * the hardware starts fulfilling further allocations. |
| */ |
| tile_alloc_size = roundup(tile_alloc_size, 256); |
| |
| /* Add space for the extra allocations. This is what gets used first, |
| * before overflow memory. It must have at least 4096 bytes, but we |
| * want to avoid overflow memory usage if possible. |
| */ |
| tile_alloc_size += 1024 * 1024; |
| |
| tile_bo = vc4_bo_create(dev, exec->tile_alloc_offset + tile_alloc_size, |
| true); |
| exec->tile_bo = &tile_bo->base; |
| if (IS_ERR(exec->tile_bo)) |
| return PTR_ERR(exec->tile_bo); |
| list_add_tail(&tile_bo->unref_head, &exec->unref_list); |
| |
| /* tile alloc address. */ |
| *(uint32_t *)(validated + 0) = (exec->tile_bo->paddr + |
| exec->tile_alloc_offset); |
| /* tile alloc size. */ |
| *(uint32_t *)(validated + 4) = tile_alloc_size; |
| /* tile state address. */ |
| *(uint32_t *)(validated + 8) = exec->tile_bo->paddr; |
| |
| return 0; |
| } |
| |
| static int |
| validate_gem_handles(VALIDATE_ARGS) |
| { |
| memcpy(exec->bo_index, untrusted, sizeof(exec->bo_index)); |
| return 0; |
| } |
| |
| #define VC4_DEFINE_PACKET(packet, func) \ |
| [packet] = { packet ## _SIZE, #packet, func } |
| |
| static const struct cmd_info { |
| uint16_t len; |
| const char *name; |
| int (*func)(struct vc4_exec_info *exec, void *validated, |
| void *untrusted); |
| } cmd_info[] = { |
| VC4_DEFINE_PACKET(VC4_PACKET_HALT, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_NOP, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_FLUSH, validate_flush), |
| VC4_DEFINE_PACKET(VC4_PACKET_FLUSH_ALL, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_START_TILE_BINNING, |
| validate_start_tile_binning), |
| VC4_DEFINE_PACKET(VC4_PACKET_INCREMENT_SEMAPHORE, |
| validate_increment_semaphore), |
| |
| VC4_DEFINE_PACKET(VC4_PACKET_GL_INDEXED_PRIMITIVE, |
| validate_indexed_prim_list), |
| VC4_DEFINE_PACKET(VC4_PACKET_GL_ARRAY_PRIMITIVE, |
| validate_gl_array_primitive), |
| |
| VC4_DEFINE_PACKET(VC4_PACKET_PRIMITIVE_LIST_FORMAT, NULL), |
| |
| VC4_DEFINE_PACKET(VC4_PACKET_GL_SHADER_STATE, validate_gl_shader_state), |
| |
| VC4_DEFINE_PACKET(VC4_PACKET_CONFIGURATION_BITS, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_FLAT_SHADE_FLAGS, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_POINT_SIZE, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_LINE_WIDTH, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_RHT_X_BOUNDARY, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_DEPTH_OFFSET, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_CLIP_WINDOW, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_VIEWPORT_OFFSET, NULL), |
| VC4_DEFINE_PACKET(VC4_PACKET_CLIPPER_XY_SCALING, NULL), |
| /* Note: The docs say this was also 105, but it was 106 in the |
| * initial userland code drop. |
| */ |
| VC4_DEFINE_PACKET(VC4_PACKET_CLIPPER_Z_SCALING, NULL), |
| |
| VC4_DEFINE_PACKET(VC4_PACKET_TILE_BINNING_MODE_CONFIG, |
| validate_tile_binning_config), |
| |
| VC4_DEFINE_PACKET(VC4_PACKET_GEM_HANDLES, validate_gem_handles), |
| }; |
| |
| int |
| vc4_validate_bin_cl(struct drm_device *dev, |
| void *validated, |
| void *unvalidated, |
| struct vc4_exec_info *exec) |
| { |
| uint32_t len = exec->args->bin_cl_size; |
| uint32_t dst_offset = 0; |
| uint32_t src_offset = 0; |
| |
| while (src_offset < len) { |
| void *dst_pkt = validated + dst_offset; |
| void *src_pkt = unvalidated + src_offset; |
| u8 cmd = *(uint8_t *)src_pkt; |
| const struct cmd_info *info; |
| |
| if (cmd >= ARRAY_SIZE(cmd_info)) { |
| DRM_ERROR("0x%08x: packet %d out of bounds\n", |
| src_offset, cmd); |
| return -EINVAL; |
| } |
| |
| info = &cmd_info[cmd]; |
| if (!info->name) { |
| DRM_ERROR("0x%08x: packet %d invalid\n", |
| src_offset, cmd); |
| return -EINVAL; |
| } |
| |
| if (src_offset + info->len > len) { |
| DRM_ERROR("0x%08x: packet %d (%s) length 0x%08x " |
| "exceeds bounds (0x%08x)\n", |
| src_offset, cmd, info->name, info->len, |
| src_offset + len); |
| return -EINVAL; |
| } |
| |
| if (cmd != VC4_PACKET_GEM_HANDLES) |
| memcpy(dst_pkt, src_pkt, info->len); |
| |
| if (info->func && info->func(exec, |
| dst_pkt + 1, |
| src_pkt + 1)) { |
| DRM_ERROR("0x%08x: packet %d (%s) failed to validate\n", |
| src_offset, cmd, info->name); |
| return -EINVAL; |
| } |
| |
| src_offset += info->len; |
| /* GEM handle loading doesn't produce HW packets. */ |
| if (cmd != VC4_PACKET_GEM_HANDLES) |
| dst_offset += info->len; |
| |
| /* When the CL hits halt, it'll stop reading anything else. */ |
| if (cmd == VC4_PACKET_HALT) |
| break; |
| } |
| |
| exec->ct0ea = exec->ct0ca + dst_offset; |
| |
| if (!exec->found_start_tile_binning_packet) { |
| DRM_ERROR("Bin CL missing VC4_PACKET_START_TILE_BINNING\n"); |
| return -EINVAL; |
| } |
| |
| /* The bin CL must be ended with INCREMENT_SEMAPHORE and FLUSH. The |
| * semaphore is used to trigger the render CL to start up, and the |
| * FLUSH is what caps the bin lists with |
| * VC4_PACKET_RETURN_FROM_SUB_LIST (so they jump back to the main |
| * render CL when they get called to) and actually triggers the queued |
| * semaphore increment. |
| */ |
| if (!exec->found_increment_semaphore_packet || !exec->found_flush) { |
| DRM_ERROR("Bin CL missing VC4_PACKET_INCREMENT_SEMAPHORE + " |
| "VC4_PACKET_FLUSH\n"); |
| return -EINVAL; |
| } |
| |
| return 0; |
| } |
| |
| static bool |
| reloc_tex(struct vc4_exec_info *exec, |
| void *uniform_data_u, |
| struct vc4_texture_sample_info *sample, |
| uint32_t texture_handle_index) |
| |
| { |
| struct drm_gem_cma_object *tex; |
| uint32_t p0 = *(uint32_t *)(uniform_data_u + sample->p_offset[0]); |
| uint32_t p1 = *(uint32_t *)(uniform_data_u + sample->p_offset[1]); |
| uint32_t p2 = (sample->p_offset[2] != ~0 ? |
| *(uint32_t *)(uniform_data_u + sample->p_offset[2]) : 0); |
| uint32_t p3 = (sample->p_offset[3] != ~0 ? |
| *(uint32_t *)(uniform_data_u + sample->p_offset[3]) : 0); |
| uint32_t *validated_p0 = exec->uniforms_v + sample->p_offset[0]; |
| uint32_t offset = p0 & VC4_TEX_P0_OFFSET_MASK; |
| uint32_t miplevels = VC4_GET_FIELD(p0, VC4_TEX_P0_MIPLVLS); |
| uint32_t width = VC4_GET_FIELD(p1, VC4_TEX_P1_WIDTH); |
| uint32_t height = VC4_GET_FIELD(p1, VC4_TEX_P1_HEIGHT); |
| uint32_t cpp, tiling_format, utile_w, utile_h; |
| uint32_t i; |
| uint32_t cube_map_stride = 0; |
| enum vc4_texture_data_type type; |
| |
| tex = vc4_use_bo(exec, texture_handle_index); |
| if (!tex) |
| return false; |
| |
| if (sample->is_direct) { |
| uint32_t remaining_size = tex->base.size - p0; |
| |
| if (p0 > tex->base.size - 4) { |
| DRM_ERROR("UBO offset greater than UBO size\n"); |
| goto fail; |
| } |
| if (p1 > remaining_size - 4) { |
| DRM_ERROR("UBO clamp would allow reads " |
| "outside of UBO\n"); |
| goto fail; |
| } |
| *validated_p0 = tex->paddr + p0; |
| return true; |
| } |
| |
| if (width == 0) |
| width = 2048; |
| if (height == 0) |
| height = 2048; |
| |
| if (p0 & VC4_TEX_P0_CMMODE_MASK) { |
| if (VC4_GET_FIELD(p2, VC4_TEX_P2_PTYPE) == |
| VC4_TEX_P2_PTYPE_CUBE_MAP_STRIDE) |
| cube_map_stride = p2 & VC4_TEX_P2_CMST_MASK; |
| if (VC4_GET_FIELD(p3, VC4_TEX_P2_PTYPE) == |
| VC4_TEX_P2_PTYPE_CUBE_MAP_STRIDE) { |
| if (cube_map_stride) { |
| DRM_ERROR("Cube map stride set twice\n"); |
| goto fail; |
| } |
| |
| cube_map_stride = p3 & VC4_TEX_P2_CMST_MASK; |
| } |
| if (!cube_map_stride) { |
| DRM_ERROR("Cube map stride not set\n"); |
| goto fail; |
| } |
| } |
| |
| type = (VC4_GET_FIELD(p0, VC4_TEX_P0_TYPE) | |
| (VC4_GET_FIELD(p1, VC4_TEX_P1_TYPE4) << 4)); |
| |
| switch (type) { |
| case VC4_TEXTURE_TYPE_RGBA8888: |
| case VC4_TEXTURE_TYPE_RGBX8888: |
| case VC4_TEXTURE_TYPE_RGBA32R: |
| cpp = 4; |
| break; |
| case VC4_TEXTURE_TYPE_RGBA4444: |
| case VC4_TEXTURE_TYPE_RGBA5551: |
| case VC4_TEXTURE_TYPE_RGB565: |
| case VC4_TEXTURE_TYPE_LUMALPHA: |
| case VC4_TEXTURE_TYPE_S16F: |
| case VC4_TEXTURE_TYPE_S16: |
| cpp = 2; |
| break; |
| case VC4_TEXTURE_TYPE_LUMINANCE: |
| case VC4_TEXTURE_TYPE_ALPHA: |
| case VC4_TEXTURE_TYPE_S8: |
| cpp = 1; |
| break; |
| case VC4_TEXTURE_TYPE_ETC1: |
| case VC4_TEXTURE_TYPE_BW1: |
| case VC4_TEXTURE_TYPE_A4: |
| case VC4_TEXTURE_TYPE_A1: |
| case VC4_TEXTURE_TYPE_RGBA64: |
| case VC4_TEXTURE_TYPE_YUV422R: |
| default: |
| DRM_ERROR("Texture format %d unsupported\n", type); |
| goto fail; |
| } |
| utile_w = utile_width(cpp); |
| utile_h = utile_height(cpp); |
| |
| if (type == VC4_TEXTURE_TYPE_RGBA32R) { |
| tiling_format = VC4_TILING_FORMAT_LINEAR; |
| } else { |
| if (size_is_lt(width, height, cpp)) |
| tiling_format = VC4_TILING_FORMAT_LT; |
| else |
| tiling_format = VC4_TILING_FORMAT_T; |
| } |
| |
| if (!vc4_check_tex_size(exec, tex, offset + cube_map_stride * 5, |
| tiling_format, width, height, cpp)) { |
| goto fail; |
| } |
| |
| /* The mipmap levels are stored before the base of the texture. Make |
| * sure there is actually space in the BO. |
| */ |
| for (i = 1; i <= miplevels; i++) { |
| uint32_t level_width = max(width >> i, 1u); |
| uint32_t level_height = max(height >> i, 1u); |
| uint32_t aligned_width, aligned_height; |
| uint32_t level_size; |
| |
| /* Once the levels get small enough, they drop from T to LT. */ |
| if (tiling_format == VC4_TILING_FORMAT_T && |
| size_is_lt(level_width, level_height, cpp)) { |
| tiling_format = VC4_TILING_FORMAT_LT; |
| } |
| |
| switch (tiling_format) { |
| case VC4_TILING_FORMAT_T: |
| aligned_width = round_up(level_width, utile_w * 8); |
| aligned_height = round_up(level_height, utile_h * 8); |
| break; |
| case VC4_TILING_FORMAT_LT: |
| aligned_width = round_up(level_width, utile_w); |
| aligned_height = round_up(level_height, utile_h); |
| break; |
| default: |
| aligned_width = round_up(level_width, utile_w); |
| aligned_height = level_height; |
| break; |
| } |
| |
| level_size = aligned_width * cpp * aligned_height; |
| |
| if (offset < level_size) { |
| DRM_ERROR("Level %d (%dx%d -> %dx%d) size %db " |
| "overflowed buffer bounds (offset %d)\n", |
| i, level_width, level_height, |
| aligned_width, aligned_height, |
| level_size, offset); |
| goto fail; |
| } |
| |
| offset -= level_size; |
| } |
| |
| *validated_p0 = tex->paddr + p0; |
| |
| return true; |
| fail: |
| DRM_INFO("Texture p0 at %d: 0x%08x\n", sample->p_offset[0], p0); |
| DRM_INFO("Texture p1 at %d: 0x%08x\n", sample->p_offset[1], p1); |
| DRM_INFO("Texture p2 at %d: 0x%08x\n", sample->p_offset[2], p2); |
| DRM_INFO("Texture p3 at %d: 0x%08x\n", sample->p_offset[3], p3); |
| return false; |
| } |
| |
| static int |
| validate_gl_shader_rec(struct drm_device *dev, |
| struct vc4_exec_info *exec, |
| struct vc4_shader_state *state) |
| { |
| uint32_t *src_handles; |
| void *pkt_u, *pkt_v; |
| static const uint32_t shader_reloc_offsets[] = { |
| 4, /* fs */ |
| 16, /* vs */ |
| 28, /* cs */ |
| }; |
| uint32_t shader_reloc_count = ARRAY_SIZE(shader_reloc_offsets); |
| struct drm_gem_cma_object *bo[shader_reloc_count + 8]; |
| uint32_t nr_attributes, nr_relocs, packet_size; |
| int i; |
| |
| nr_attributes = state->addr & 0x7; |
| if (nr_attributes == 0) |
| nr_attributes = 8; |
| packet_size = gl_shader_rec_size(state->addr); |
| |
| nr_relocs = ARRAY_SIZE(shader_reloc_offsets) + nr_attributes; |
| if (nr_relocs * 4 > exec->shader_rec_size) { |
| DRM_ERROR("overflowed shader recs reading %d handles " |
| "from %d bytes left\n", |
| nr_relocs, exec->shader_rec_size); |
| return -EINVAL; |
| } |
| src_handles = exec->shader_rec_u; |
| exec->shader_rec_u += nr_relocs * 4; |
| exec->shader_rec_size -= nr_relocs * 4; |
| |
| if (packet_size > exec->shader_rec_size) { |
| DRM_ERROR("overflowed shader recs copying %db packet " |
| "from %d bytes left\n", |
| packet_size, exec->shader_rec_size); |
| return -EINVAL; |
| } |
| pkt_u = exec->shader_rec_u; |
| pkt_v = exec->shader_rec_v; |
| memcpy(pkt_v, pkt_u, packet_size); |
| exec->shader_rec_u += packet_size; |
| /* Shader recs have to be aligned to 16 bytes (due to the attribute |
| * flags being in the low bytes), so round the next validated shader |
| * rec address up. This should be safe, since we've got so many |
| * relocations in a shader rec packet. |
| */ |
| BUG_ON(roundup(packet_size, 16) - packet_size > nr_relocs * 4); |
| exec->shader_rec_v += roundup(packet_size, 16); |
| exec->shader_rec_size -= packet_size; |
| |
| if (!(*(uint16_t *)pkt_u & VC4_SHADER_FLAG_FS_SINGLE_THREAD)) { |
| DRM_ERROR("Multi-threaded fragment shaders not supported.\n"); |
| return -EINVAL; |
| } |
| |
| for (i = 0; i < shader_reloc_count; i++) { |
| if (src_handles[i] > exec->bo_count) { |
| DRM_ERROR("Shader handle %d too big\n", src_handles[i]); |
| return -EINVAL; |
| } |
| |
| bo[i] = exec->bo[src_handles[i]]; |
| if (!bo[i]) |
| return -EINVAL; |
| } |
| for (i = shader_reloc_count; i < nr_relocs; i++) { |
| bo[i] = vc4_use_bo(exec, src_handles[i]); |
| if (!bo[i]) |
| return -EINVAL; |
| } |
| |
| for (i = 0; i < shader_reloc_count; i++) { |
| struct vc4_validated_shader_info *validated_shader; |
| uint32_t o = shader_reloc_offsets[i]; |
| uint32_t src_offset = *(uint32_t *)(pkt_u + o); |
| uint32_t *texture_handles_u; |
| void *uniform_data_u; |
| uint32_t tex, uni; |
| |
| *(uint32_t *)(pkt_v + o) = bo[i]->paddr + src_offset; |
| |
| if (src_offset != 0) { |
| DRM_ERROR("Shaders must be at offset 0 of " |
| "the BO.\n"); |
| return -EINVAL; |
| } |
| |
| validated_shader = to_vc4_bo(&bo[i]->base)->validated_shader; |
| if (!validated_shader) |
| return -EINVAL; |
| |
| if (validated_shader->uniforms_src_size > |
| exec->uniforms_size) { |
| DRM_ERROR("Uniforms src buffer overflow\n"); |
| return -EINVAL; |
| } |
| |
| texture_handles_u = exec->uniforms_u; |
| uniform_data_u = (texture_handles_u + |
| validated_shader->num_texture_samples); |
| |
| memcpy(exec->uniforms_v, uniform_data_u, |
| validated_shader->uniforms_size); |
| |
| for (tex = 0; |
| tex < validated_shader->num_texture_samples; |
| tex++) { |
| if (!reloc_tex(exec, |
| uniform_data_u, |
| &validated_shader->texture_samples[tex], |
| texture_handles_u[tex])) { |
| return -EINVAL; |
| } |
| } |
| |
| /* Fill in the uniform slots that need this shader's |
| * start-of-uniforms address (used for resetting the uniform |
| * stream in the presence of control flow). |
| */ |
| for (uni = 0; |
| uni < validated_shader->num_uniform_addr_offsets; |
| uni++) { |
| uint32_t o = validated_shader->uniform_addr_offsets[uni]; |
| ((uint32_t *)exec->uniforms_v)[o] = exec->uniforms_p; |
| } |
| |
| *(uint32_t *)(pkt_v + o + 4) = exec->uniforms_p; |
| |
| exec->uniforms_u += validated_shader->uniforms_src_size; |
| exec->uniforms_v += validated_shader->uniforms_size; |
| exec->uniforms_p += validated_shader->uniforms_size; |
| } |
| |
| for (i = 0; i < nr_attributes; i++) { |
| struct drm_gem_cma_object *vbo = |
| bo[ARRAY_SIZE(shader_reloc_offsets) + i]; |
| uint32_t o = 36 + i * 8; |
| uint32_t offset = *(uint32_t *)(pkt_u + o + 0); |
| uint32_t attr_size = *(uint8_t *)(pkt_u + o + 4) + 1; |
| uint32_t stride = *(uint8_t *)(pkt_u + o + 5); |
| uint32_t max_index; |
| |
| if (state->addr & 0x8) |
| stride |= (*(uint32_t *)(pkt_u + 100 + i * 4)) & ~0xff; |
| |
| if (vbo->base.size < offset || |
| vbo->base.size - offset < attr_size) { |
| DRM_ERROR("BO offset overflow (%d + %d > %zu)\n", |
| offset, attr_size, vbo->base.size); |
| return -EINVAL; |
| } |
| |
| if (stride != 0) { |
| max_index = ((vbo->base.size - offset - attr_size) / |
| stride); |
| if (state->max_index > max_index) { |
| DRM_ERROR("primitives use index %d out of " |
| "supplied %d\n", |
| state->max_index, max_index); |
| return -EINVAL; |
| } |
| } |
| |
| *(uint32_t *)(pkt_v + o) = vbo->paddr + offset; |
| } |
| |
| return 0; |
| } |
| |
| int |
| vc4_validate_shader_recs(struct drm_device *dev, |
| struct vc4_exec_info *exec) |
| { |
| uint32_t i; |
| int ret = 0; |
| |
| for (i = 0; i < exec->shader_state_count; i++) { |
| ret = validate_gl_shader_rec(dev, exec, &exec->shader_state[i]); |
| if (ret) |
| return ret; |
| } |
| |
| return ret; |
| } |