blob: c45856bcc8b910c568f611c011ee9df91e423326 [file] [log] [blame]
Brad Volkin351e3db2014-02-18 10:15:46 -08001/*
2 * Copyright © 2013 Intel Corporation
3 *
4 * Permission is hereby granted, free of charge, to any person obtaining a
5 * copy of this software and associated documentation files (the "Software"),
6 * to deal in the Software without restriction, including without limitation
7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8 * and/or sell copies of the Software, and to permit persons to whom the
9 * Software is furnished to do so, subject to the following conditions:
10 *
11 * The above copyright notice and this permission notice (including the next
12 * paragraph) shall be included in all copies or substantial portions of the
13 * Software.
14 *
15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
18 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
20 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
21 * IN THE SOFTWARE.
22 *
23 * Authors:
24 * Brad Volkin <bradley.d.volkin@intel.com>
25 *
26 */
27
28#include "i915_drv.h"
29
30/**
Daniel Vetter122b2502014-04-25 16:59:00 +020031 * DOC: batch buffer command parser
Brad Volkin351e3db2014-02-18 10:15:46 -080032 *
33 * Motivation:
34 * Certain OpenGL features (e.g. transform feedback, performance monitoring)
35 * require userspace code to submit batches containing commands such as
36 * MI_LOAD_REGISTER_IMM to access various registers. Unfortunately, some
37 * generations of the hardware will noop these commands in "unsecure" batches
38 * (which includes all userspace batches submitted via i915) even though the
39 * commands may be safe and represent the intended programming model of the
40 * device.
41 *
42 * The software command parser is similar in operation to the command parsing
43 * done in hardware for unsecure batches. However, the software parser allows
44 * some operations that would be noop'd by hardware, if the parser determines
45 * the operation is safe, and submits the batch as "secure" to prevent hardware
46 * parsing.
47 *
48 * Threats:
49 * At a high level, the hardware (and software) checks attempt to prevent
50 * granting userspace undue privileges. There are three categories of privilege.
51 *
52 * First, commands which are explicitly defined as privileged or which should
53 * only be used by the kernel driver. The parser generally rejects such
54 * commands, though it may allow some from the drm master process.
55 *
56 * Second, commands which access registers. To support correct/enhanced
57 * userspace functionality, particularly certain OpenGL extensions, the parser
58 * provides a whitelist of registers which userspace may safely access (for both
59 * normal and drm master processes).
60 *
61 * Third, commands which access privileged memory (i.e. GGTT, HWS page, etc).
62 * The parser always rejects such commands.
63 *
64 * The majority of the problematic commands fall in the MI_* range, with only a
65 * few specific commands on each ring (e.g. PIPE_CONTROL and MI_FLUSH_DW).
66 *
67 * Implementation:
68 * Each ring maintains tables of commands and registers which the parser uses in
69 * scanning batch buffers submitted to that ring.
70 *
71 * Since the set of commands that the parser must check for is significantly
72 * smaller than the number of commands supported, the parser tables contain only
73 * those commands required by the parser. This generally works because command
74 * opcode ranges have standard command length encodings. So for commands that
75 * the parser does not need to check, it can easily skip them. This is
76 * implementated via a per-ring length decoding vfunc.
77 *
78 * Unfortunately, there are a number of commands that do not follow the standard
79 * length encoding for their opcode range, primarily amongst the MI_* commands.
80 * To handle this, the parser provides a way to define explicit "skip" entries
81 * in the per-ring command tables.
82 *
83 * Other command table entries map fairly directly to high level categories
84 * mentioned above: rejected, master-only, register whitelist. The parser
85 * implements a number of checks, including the privileged memory checks, via a
86 * general bitmasking mechanism.
87 */
88
Brad Volkin3a6fa982014-02-18 10:15:47 -080089#define STD_MI_OPCODE_MASK 0xFF800000
90#define STD_3D_OPCODE_MASK 0xFFFF0000
91#define STD_2D_OPCODE_MASK 0xFFC00000
92#define STD_MFX_OPCODE_MASK 0xFFFF0000
93
94#define CMD(op, opm, f, lm, fl, ...) \
95 { \
96 .flags = (fl) | ((f) ? CMD_DESC_FIXED : 0), \
97 .cmd = { (op), (opm) }, \
98 .length = { (lm) }, \
99 __VA_ARGS__ \
100 }
101
102/* Convenience macros to compress the tables */
103#define SMI STD_MI_OPCODE_MASK
104#define S3D STD_3D_OPCODE_MASK
105#define S2D STD_2D_OPCODE_MASK
106#define SMFX STD_MFX_OPCODE_MASK
107#define F true
108#define S CMD_DESC_SKIP
109#define R CMD_DESC_REJECT
110#define W CMD_DESC_REGISTER
111#define B CMD_DESC_BITMASK
112#define M CMD_DESC_MASTER
113
114/* Command Mask Fixed Len Action
115 ---------------------------------------------------------- */
116static const struct drm_i915_cmd_descriptor common_cmds[] = {
117 CMD( MI_NOOP, SMI, F, 1, S ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800118 CMD( MI_USER_INTERRUPT, SMI, F, 1, R ),
Brad Volkin17c1eb12014-02-18 10:15:49 -0800119 CMD( MI_WAIT_FOR_EVENT, SMI, F, 1, M ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800120 CMD( MI_ARB_CHECK, SMI, F, 1, S ),
121 CMD( MI_REPORT_HEAD, SMI, F, 1, S ),
122 CMD( MI_SUSPEND_FLUSH, SMI, F, 1, S ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800123 CMD( MI_SEMAPHORE_MBOX, SMI, !F, 0xFF, R ),
124 CMD( MI_STORE_DWORD_INDEX, SMI, !F, 0xFF, R ),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800125 CMD( MI_LOAD_REGISTER_IMM(1), SMI, !F, 0xFF, W,
126 .reg = { .offset = 1, .mask = 0x007FFFFC } ),
Brad Volkind4d48032014-02-18 10:15:54 -0800127 CMD( MI_STORE_REGISTER_MEM(1), SMI, !F, 0xFF, W | B,
128 .reg = { .offset = 1, .mask = 0x007FFFFC },
129 .bits = {{
130 .offset = 0,
131 .mask = MI_GLOBAL_GTT,
132 .expected = 0,
133 }}, ),
134 CMD( MI_LOAD_REGISTER_MEM, SMI, !F, 0xFF, W | B,
135 .reg = { .offset = 1, .mask = 0x007FFFFC },
136 .bits = {{
137 .offset = 0,
138 .mask = MI_GLOBAL_GTT,
139 .expected = 0,
140 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800141 CMD( MI_BATCH_BUFFER_START, SMI, !F, 0xFF, S ),
142};
143
144static const struct drm_i915_cmd_descriptor render_cmds[] = {
145 CMD( MI_FLUSH, SMI, F, 1, S ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800146 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800147 CMD( MI_PREDICATE, SMI, F, 1, S ),
148 CMD( MI_TOPOLOGY_FILTER, SMI, F, 1, S ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800149 CMD( MI_DISPLAY_FLIP, SMI, !F, 0xFF, R ),
150 CMD( MI_SET_CONTEXT, SMI, !F, 0xFF, R ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800151 CMD( MI_URB_CLEAR, SMI, !F, 0xFF, S ),
Brad Volkind4d48032014-02-18 10:15:54 -0800152 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0x3F, B,
153 .bits = {{
154 .offset = 0,
155 .mask = MI_GLOBAL_GTT,
156 .expected = 0,
157 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800158 CMD( MI_UPDATE_GTT, SMI, !F, 0xFF, R ),
Brad Volkind4d48032014-02-18 10:15:54 -0800159 CMD( MI_CLFLUSH, SMI, !F, 0x3FF, B,
160 .bits = {{
161 .offset = 0,
162 .mask = MI_GLOBAL_GTT,
163 .expected = 0,
164 }}, ),
165 CMD( MI_REPORT_PERF_COUNT, SMI, !F, 0x3F, B,
166 .bits = {{
167 .offset = 1,
168 .mask = MI_REPORT_PERF_COUNT_GGTT,
169 .expected = 0,
170 }}, ),
171 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
172 .bits = {{
173 .offset = 0,
174 .mask = MI_GLOBAL_GTT,
175 .expected = 0,
176 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800177 CMD( GFX_OP_3DSTATE_VF_STATISTICS, S3D, F, 1, S ),
178 CMD( PIPELINE_SELECT, S3D, F, 1, S ),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800179 CMD( MEDIA_VFE_STATE, S3D, !F, 0xFFFF, B,
180 .bits = {{
181 .offset = 2,
182 .mask = MEDIA_VFE_STATE_MMIO_ACCESS_MASK,
183 .expected = 0,
184 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800185 CMD( GPGPU_OBJECT, S3D, !F, 0xFF, S ),
186 CMD( GPGPU_WALKER, S3D, !F, 0xFF, S ),
187 CMD( GFX_OP_3DSTATE_SO_DECL_LIST, S3D, !F, 0x1FF, S ),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800188 CMD( GFX_OP_PIPE_CONTROL(5), S3D, !F, 0xFF, B,
189 .bits = {{
190 .offset = 1,
Brad Volkinb18b3962014-02-18 10:15:53 -0800191 .mask = (PIPE_CONTROL_MMIO_WRITE | PIPE_CONTROL_NOTIFY),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800192 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800193 },
194 {
195 .offset = 1,
Brad Volkin114d4f72014-02-18 10:15:55 -0800196 .mask = (PIPE_CONTROL_GLOBAL_GTT_IVB |
197 PIPE_CONTROL_STORE_DATA_INDEX),
Brad Volkind4d48032014-02-18 10:15:54 -0800198 .expected = 0,
199 .condition_offset = 1,
200 .condition_mask = PIPE_CONTROL_POST_SYNC_OP_MASK,
Brad Volkinf0a346b2014-02-18 10:15:52 -0800201 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800202};
203
204static const struct drm_i915_cmd_descriptor hsw_render_cmds[] = {
205 CMD( MI_SET_PREDICATE, SMI, F, 1, S ),
206 CMD( MI_RS_CONTROL, SMI, F, 1, S ),
207 CMD( MI_URB_ATOMIC_ALLOC, SMI, F, 1, S ),
208 CMD( MI_RS_CONTEXT, SMI, F, 1, S ),
Brad Volkin17c1eb12014-02-18 10:15:49 -0800209 CMD( MI_LOAD_SCAN_LINES_INCL, SMI, !F, 0x3F, M ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800210 CMD( MI_LOAD_SCAN_LINES_EXCL, SMI, !F, 0x3F, R ),
211 CMD( MI_LOAD_REGISTER_REG, SMI, !F, 0xFF, R ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800212 CMD( MI_RS_STORE_DATA_IMM, SMI, !F, 0xFF, S ),
213 CMD( MI_LOAD_URB_MEM, SMI, !F, 0xFF, S ),
214 CMD( MI_STORE_URB_MEM, SMI, !F, 0xFF, S ),
215 CMD( GFX_OP_3DSTATE_DX9_CONSTANTF_VS, S3D, !F, 0x7FF, S ),
216 CMD( GFX_OP_3DSTATE_DX9_CONSTANTF_PS, S3D, !F, 0x7FF, S ),
217
218 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_VS, S3D, !F, 0x1FF, S ),
219 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_GS, S3D, !F, 0x1FF, S ),
220 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_HS, S3D, !F, 0x1FF, S ),
221 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_DS, S3D, !F, 0x1FF, S ),
222 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_PS, S3D, !F, 0x1FF, S ),
223};
224
225static const struct drm_i915_cmd_descriptor video_cmds[] = {
Brad Volkin9c640d12014-02-18 10:15:48 -0800226 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
Brad Volkind4d48032014-02-18 10:15:54 -0800227 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0xFF, B,
228 .bits = {{
229 .offset = 0,
230 .mask = MI_GLOBAL_GTT,
231 .expected = 0,
232 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800233 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800234 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
235 .bits = {{
236 .offset = 0,
237 .mask = MI_FLUSH_DW_NOTIFY,
238 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800239 },
240 {
241 .offset = 1,
242 .mask = MI_FLUSH_DW_USE_GTT,
243 .expected = 0,
244 .condition_offset = 0,
245 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkin114d4f72014-02-18 10:15:55 -0800246 },
247 {
248 .offset = 0,
249 .mask = MI_FLUSH_DW_STORE_INDEX,
250 .expected = 0,
251 .condition_offset = 0,
252 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkinb18b3962014-02-18 10:15:53 -0800253 }}, ),
Brad Volkind4d48032014-02-18 10:15:54 -0800254 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
255 .bits = {{
256 .offset = 0,
257 .mask = MI_GLOBAL_GTT,
258 .expected = 0,
259 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800260 /*
261 * MFX_WAIT doesn't fit the way we handle length for most commands.
262 * It has a length field but it uses a non-standard length bias.
263 * It is always 1 dword though, so just treat it as fixed length.
264 */
265 CMD( MFX_WAIT, SMFX, F, 1, S ),
266};
267
268static const struct drm_i915_cmd_descriptor vecs_cmds[] = {
Brad Volkin9c640d12014-02-18 10:15:48 -0800269 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
Brad Volkind4d48032014-02-18 10:15:54 -0800270 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0xFF, B,
271 .bits = {{
272 .offset = 0,
273 .mask = MI_GLOBAL_GTT,
274 .expected = 0,
275 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800276 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800277 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
278 .bits = {{
279 .offset = 0,
280 .mask = MI_FLUSH_DW_NOTIFY,
281 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800282 },
283 {
284 .offset = 1,
285 .mask = MI_FLUSH_DW_USE_GTT,
286 .expected = 0,
287 .condition_offset = 0,
288 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkin114d4f72014-02-18 10:15:55 -0800289 },
290 {
291 .offset = 0,
292 .mask = MI_FLUSH_DW_STORE_INDEX,
293 .expected = 0,
294 .condition_offset = 0,
295 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkinb18b3962014-02-18 10:15:53 -0800296 }}, ),
Brad Volkind4d48032014-02-18 10:15:54 -0800297 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
298 .bits = {{
299 .offset = 0,
300 .mask = MI_GLOBAL_GTT,
301 .expected = 0,
302 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800303};
304
305static const struct drm_i915_cmd_descriptor blt_cmds[] = {
Brad Volkin9c640d12014-02-18 10:15:48 -0800306 CMD( MI_DISPLAY_FLIP, SMI, !F, 0xFF, R ),
Brad Volkind4d48032014-02-18 10:15:54 -0800307 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0x3FF, B,
308 .bits = {{
309 .offset = 0,
310 .mask = MI_GLOBAL_GTT,
311 .expected = 0,
312 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800313 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800314 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
315 .bits = {{
316 .offset = 0,
317 .mask = MI_FLUSH_DW_NOTIFY,
318 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800319 },
320 {
321 .offset = 1,
322 .mask = MI_FLUSH_DW_USE_GTT,
323 .expected = 0,
324 .condition_offset = 0,
325 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkin114d4f72014-02-18 10:15:55 -0800326 },
327 {
328 .offset = 0,
329 .mask = MI_FLUSH_DW_STORE_INDEX,
330 .expected = 0,
331 .condition_offset = 0,
332 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkinb18b3962014-02-18 10:15:53 -0800333 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800334 CMD( COLOR_BLT, S2D, !F, 0x3F, S ),
335 CMD( SRC_COPY_BLT, S2D, !F, 0x3F, S ),
336};
337
Brad Volkin9c640d12014-02-18 10:15:48 -0800338static const struct drm_i915_cmd_descriptor hsw_blt_cmds[] = {
Brad Volkin17c1eb12014-02-18 10:15:49 -0800339 CMD( MI_LOAD_SCAN_LINES_INCL, SMI, !F, 0x3F, M ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800340 CMD( MI_LOAD_SCAN_LINES_EXCL, SMI, !F, 0x3F, R ),
341};
342
Brad Volkin3a6fa982014-02-18 10:15:47 -0800343#undef CMD
344#undef SMI
345#undef S3D
346#undef S2D
347#undef SMFX
348#undef F
349#undef S
350#undef R
351#undef W
352#undef B
353#undef M
354
355static const struct drm_i915_cmd_table gen7_render_cmds[] = {
356 { common_cmds, ARRAY_SIZE(common_cmds) },
357 { render_cmds, ARRAY_SIZE(render_cmds) },
358};
359
360static const struct drm_i915_cmd_table hsw_render_ring_cmds[] = {
361 { common_cmds, ARRAY_SIZE(common_cmds) },
362 { render_cmds, ARRAY_SIZE(render_cmds) },
363 { hsw_render_cmds, ARRAY_SIZE(hsw_render_cmds) },
364};
365
366static const struct drm_i915_cmd_table gen7_video_cmds[] = {
367 { common_cmds, ARRAY_SIZE(common_cmds) },
368 { video_cmds, ARRAY_SIZE(video_cmds) },
369};
370
371static const struct drm_i915_cmd_table hsw_vebox_cmds[] = {
372 { common_cmds, ARRAY_SIZE(common_cmds) },
373 { vecs_cmds, ARRAY_SIZE(vecs_cmds) },
374};
375
376static const struct drm_i915_cmd_table gen7_blt_cmds[] = {
377 { common_cmds, ARRAY_SIZE(common_cmds) },
378 { blt_cmds, ARRAY_SIZE(blt_cmds) },
379};
380
Brad Volkin9c640d12014-02-18 10:15:48 -0800381static const struct drm_i915_cmd_table hsw_blt_ring_cmds[] = {
382 { common_cmds, ARRAY_SIZE(common_cmds) },
383 { blt_cmds, ARRAY_SIZE(blt_cmds) },
384 { hsw_blt_cmds, ARRAY_SIZE(hsw_blt_cmds) },
385};
386
Brad Volkin5947de92014-02-18 10:15:50 -0800387/*
388 * Register whitelists, sorted by increasing register offset.
389 *
390 * Some registers that userspace accesses are 64 bits. The register
391 * access commands only allow 32-bit accesses. Hence, we have to include
392 * entries for both halves of the 64-bit registers.
393 */
394
395/* Convenience macro for adding 64-bit registers */
396#define REG64(addr) (addr), (addr + sizeof(u32))
397
398static const u32 gen7_render_regs[] = {
399 REG64(HS_INVOCATION_COUNT),
400 REG64(DS_INVOCATION_COUNT),
401 REG64(IA_VERTICES_COUNT),
402 REG64(IA_PRIMITIVES_COUNT),
403 REG64(VS_INVOCATION_COUNT),
404 REG64(GS_INVOCATION_COUNT),
405 REG64(GS_PRIMITIVES_COUNT),
406 REG64(CL_INVOCATION_COUNT),
407 REG64(CL_PRIMITIVES_COUNT),
408 REG64(PS_INVOCATION_COUNT),
409 REG64(PS_DEPTH_COUNT),
Brad Volkin6e66ea12014-03-28 10:21:50 -0700410 OACONTROL, /* Only allowed for LRI and SRM. See below. */
Brad Volkin113a0472014-04-08 14:18:58 -0700411 GEN7_3DPRIM_END_OFFSET,
412 GEN7_3DPRIM_START_VERTEX,
413 GEN7_3DPRIM_VERTEX_COUNT,
414 GEN7_3DPRIM_INSTANCE_COUNT,
415 GEN7_3DPRIM_START_INSTANCE,
416 GEN7_3DPRIM_BASE_VERTEX,
Brad Volkin5947de92014-02-18 10:15:50 -0800417 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(0)),
418 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(1)),
419 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(2)),
420 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(3)),
Brad Volkin113a0472014-04-08 14:18:58 -0700421 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(0)),
422 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(1)),
423 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(2)),
424 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(3)),
Brad Volkin5947de92014-02-18 10:15:50 -0800425 GEN7_SO_WRITE_OFFSET(0),
426 GEN7_SO_WRITE_OFFSET(1),
427 GEN7_SO_WRITE_OFFSET(2),
428 GEN7_SO_WRITE_OFFSET(3),
Brad Volkinc9224fa2014-06-17 14:10:34 -0700429 GEN7_L3SQCREG1,
430 GEN7_L3CNTLREG2,
431 GEN7_L3CNTLREG3,
Brad Volkin5947de92014-02-18 10:15:50 -0800432};
433
434static const u32 gen7_blt_regs[] = {
435 BCS_SWCTRL,
436};
437
Brad Volkin220375a2014-02-18 10:15:51 -0800438static const u32 ivb_master_regs[] = {
439 FORCEWAKE_MT,
440 DERRMR,
441 GEN7_PIPE_DE_LOAD_SL(PIPE_A),
442 GEN7_PIPE_DE_LOAD_SL(PIPE_B),
443 GEN7_PIPE_DE_LOAD_SL(PIPE_C),
444};
445
446static const u32 hsw_master_regs[] = {
447 FORCEWAKE_MT,
448 DERRMR,
449};
450
Brad Volkin5947de92014-02-18 10:15:50 -0800451#undef REG64
452
Brad Volkin351e3db2014-02-18 10:15:46 -0800453static u32 gen7_render_get_cmd_length_mask(u32 cmd_header)
454{
455 u32 client = (cmd_header & INSTR_CLIENT_MASK) >> INSTR_CLIENT_SHIFT;
456 u32 subclient =
457 (cmd_header & INSTR_SUBCLIENT_MASK) >> INSTR_SUBCLIENT_SHIFT;
458
459 if (client == INSTR_MI_CLIENT)
460 return 0x3F;
461 else if (client == INSTR_RC_CLIENT) {
462 if (subclient == INSTR_MEDIA_SUBCLIENT)
463 return 0xFFFF;
464 else
465 return 0xFF;
466 }
467
468 DRM_DEBUG_DRIVER("CMD: Abnormal rcs cmd length! 0x%08X\n", cmd_header);
469 return 0;
470}
471
472static u32 gen7_bsd_get_cmd_length_mask(u32 cmd_header)
473{
474 u32 client = (cmd_header & INSTR_CLIENT_MASK) >> INSTR_CLIENT_SHIFT;
475 u32 subclient =
476 (cmd_header & INSTR_SUBCLIENT_MASK) >> INSTR_SUBCLIENT_SHIFT;
477
478 if (client == INSTR_MI_CLIENT)
479 return 0x3F;
480 else if (client == INSTR_RC_CLIENT) {
481 if (subclient == INSTR_MEDIA_SUBCLIENT)
482 return 0xFFF;
483 else
484 return 0xFF;
485 }
486
487 DRM_DEBUG_DRIVER("CMD: Abnormal bsd cmd length! 0x%08X\n", cmd_header);
488 return 0;
489}
490
491static u32 gen7_blt_get_cmd_length_mask(u32 cmd_header)
492{
493 u32 client = (cmd_header & INSTR_CLIENT_MASK) >> INSTR_CLIENT_SHIFT;
494
495 if (client == INSTR_MI_CLIENT)
496 return 0x3F;
497 else if (client == INSTR_BC_CLIENT)
498 return 0xFF;
499
500 DRM_DEBUG_DRIVER("CMD: Abnormal blt cmd length! 0x%08X\n", cmd_header);
501 return 0;
502}
503
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100504static bool validate_cmds_sorted(struct intel_engine_cs *ring,
Brad Volkin44e895a2014-05-10 14:10:43 -0700505 const struct drm_i915_cmd_table *cmd_tables,
506 int cmd_table_count)
Brad Volkin351e3db2014-02-18 10:15:46 -0800507{
508 int i;
Brad Volkin300233e2014-03-27 11:43:38 -0700509 bool ret = true;
Brad Volkin351e3db2014-02-18 10:15:46 -0800510
Brad Volkin44e895a2014-05-10 14:10:43 -0700511 if (!cmd_tables || cmd_table_count == 0)
Brad Volkin300233e2014-03-27 11:43:38 -0700512 return true;
Brad Volkin351e3db2014-02-18 10:15:46 -0800513
Brad Volkin44e895a2014-05-10 14:10:43 -0700514 for (i = 0; i < cmd_table_count; i++) {
515 const struct drm_i915_cmd_table *table = &cmd_tables[i];
Brad Volkin351e3db2014-02-18 10:15:46 -0800516 u32 previous = 0;
517 int j;
518
519 for (j = 0; j < table->count; j++) {
520 const struct drm_i915_cmd_descriptor *desc =
521 &table->table[i];
522 u32 curr = desc->cmd.value & desc->cmd.mask;
523
Brad Volkin300233e2014-03-27 11:43:38 -0700524 if (curr < previous) {
Brad Volkin351e3db2014-02-18 10:15:46 -0800525 DRM_ERROR("CMD: table not sorted ring=%d table=%d entry=%d cmd=0x%08X prev=0x%08X\n",
526 ring->id, i, j, curr, previous);
Brad Volkin300233e2014-03-27 11:43:38 -0700527 ret = false;
528 }
Brad Volkin351e3db2014-02-18 10:15:46 -0800529
530 previous = curr;
531 }
532 }
Brad Volkin300233e2014-03-27 11:43:38 -0700533
534 return ret;
Brad Volkin351e3db2014-02-18 10:15:46 -0800535}
536
Brad Volkin300233e2014-03-27 11:43:38 -0700537static bool check_sorted(int ring_id, const u32 *reg_table, int reg_count)
Brad Volkin351e3db2014-02-18 10:15:46 -0800538{
539 int i;
540 u32 previous = 0;
Brad Volkin300233e2014-03-27 11:43:38 -0700541 bool ret = true;
Brad Volkin351e3db2014-02-18 10:15:46 -0800542
543 for (i = 0; i < reg_count; i++) {
544 u32 curr = reg_table[i];
545
Brad Volkin300233e2014-03-27 11:43:38 -0700546 if (curr < previous) {
Brad Volkin351e3db2014-02-18 10:15:46 -0800547 DRM_ERROR("CMD: table not sorted ring=%d entry=%d reg=0x%08X prev=0x%08X\n",
548 ring_id, i, curr, previous);
Brad Volkin300233e2014-03-27 11:43:38 -0700549 ret = false;
550 }
Brad Volkin351e3db2014-02-18 10:15:46 -0800551
552 previous = curr;
553 }
Brad Volkin300233e2014-03-27 11:43:38 -0700554
555 return ret;
Brad Volkin351e3db2014-02-18 10:15:46 -0800556}
557
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100558static bool validate_regs_sorted(struct intel_engine_cs *ring)
Brad Volkin351e3db2014-02-18 10:15:46 -0800559{
Brad Volkin300233e2014-03-27 11:43:38 -0700560 return check_sorted(ring->id, ring->reg_table, ring->reg_count) &&
561 check_sorted(ring->id, ring->master_reg_table,
562 ring->master_reg_count);
Brad Volkin351e3db2014-02-18 10:15:46 -0800563}
564
Brad Volkin44e895a2014-05-10 14:10:43 -0700565struct cmd_node {
566 const struct drm_i915_cmd_descriptor *desc;
567 struct hlist_node node;
568};
569
570/*
571 * Different command ranges have different numbers of bits for the opcode. For
572 * example, MI commands use bits 31:23 while 3D commands use bits 31:16. The
573 * problem is that, for example, MI commands use bits 22:16 for other fields
574 * such as GGTT vs PPGTT bits. If we include those bits in the mask then when
575 * we mask a command from a batch it could hash to the wrong bucket due to
576 * non-opcode bits being set. But if we don't include those bits, some 3D
577 * commands may hash to the same bucket due to not including opcode bits that
578 * make the command unique. For now, we will risk hashing to the same bucket.
579 *
580 * If we attempt to generate a perfect hash, we should be able to look at bits
581 * 31:29 of a command from a batch buffer and use the full mask for that
582 * client. The existing INSTR_CLIENT_MASK/SHIFT defines can be used for this.
583 */
584#define CMD_HASH_MASK STD_MI_OPCODE_MASK
585
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100586static int init_hash_table(struct intel_engine_cs *ring,
Brad Volkin44e895a2014-05-10 14:10:43 -0700587 const struct drm_i915_cmd_table *cmd_tables,
588 int cmd_table_count)
589{
590 int i, j;
591
592 hash_init(ring->cmd_hash);
593
594 for (i = 0; i < cmd_table_count; i++) {
595 const struct drm_i915_cmd_table *table = &cmd_tables[i];
596
597 for (j = 0; j < table->count; j++) {
598 const struct drm_i915_cmd_descriptor *desc =
599 &table->table[j];
600 struct cmd_node *desc_node =
601 kmalloc(sizeof(*desc_node), GFP_KERNEL);
602
603 if (!desc_node)
604 return -ENOMEM;
605
606 desc_node->desc = desc;
607 hash_add(ring->cmd_hash, &desc_node->node,
608 desc->cmd.value & CMD_HASH_MASK);
609 }
610 }
611
612 return 0;
613}
614
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100615static void fini_hash_table(struct intel_engine_cs *ring)
Brad Volkin44e895a2014-05-10 14:10:43 -0700616{
617 struct hlist_node *tmp;
618 struct cmd_node *desc_node;
619 int i;
620
621 hash_for_each_safe(ring->cmd_hash, i, tmp, desc_node, node) {
622 hash_del(&desc_node->node);
623 kfree(desc_node);
624 }
625}
626
Brad Volkin351e3db2014-02-18 10:15:46 -0800627/**
628 * i915_cmd_parser_init_ring() - set cmd parser related fields for a ringbuffer
629 * @ring: the ringbuffer to initialize
630 *
631 * Optionally initializes fields related to batch buffer command parsing in the
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100632 * struct intel_engine_cs based on whether the platform requires software
Brad Volkin351e3db2014-02-18 10:15:46 -0800633 * command parsing.
Brad Volkin44e895a2014-05-10 14:10:43 -0700634 *
635 * Return: non-zero if initialization fails
Brad Volkin351e3db2014-02-18 10:15:46 -0800636 */
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100637int i915_cmd_parser_init_ring(struct intel_engine_cs *ring)
Brad Volkin351e3db2014-02-18 10:15:46 -0800638{
Brad Volkin44e895a2014-05-10 14:10:43 -0700639 const struct drm_i915_cmd_table *cmd_tables;
640 int cmd_table_count;
641 int ret;
642
Brad Volkin351e3db2014-02-18 10:15:46 -0800643 if (!IS_GEN7(ring->dev))
Brad Volkin44e895a2014-05-10 14:10:43 -0700644 return 0;
Brad Volkin351e3db2014-02-18 10:15:46 -0800645
646 switch (ring->id) {
647 case RCS:
Brad Volkin3a6fa982014-02-18 10:15:47 -0800648 if (IS_HASWELL(ring->dev)) {
Brad Volkin44e895a2014-05-10 14:10:43 -0700649 cmd_tables = hsw_render_ring_cmds;
650 cmd_table_count =
Brad Volkin3a6fa982014-02-18 10:15:47 -0800651 ARRAY_SIZE(hsw_render_ring_cmds);
652 } else {
Brad Volkin44e895a2014-05-10 14:10:43 -0700653 cmd_tables = gen7_render_cmds;
654 cmd_table_count = ARRAY_SIZE(gen7_render_cmds);
Brad Volkin3a6fa982014-02-18 10:15:47 -0800655 }
656
Brad Volkin5947de92014-02-18 10:15:50 -0800657 ring->reg_table = gen7_render_regs;
658 ring->reg_count = ARRAY_SIZE(gen7_render_regs);
659
Brad Volkin220375a2014-02-18 10:15:51 -0800660 if (IS_HASWELL(ring->dev)) {
661 ring->master_reg_table = hsw_master_regs;
662 ring->master_reg_count = ARRAY_SIZE(hsw_master_regs);
663 } else {
664 ring->master_reg_table = ivb_master_regs;
665 ring->master_reg_count = ARRAY_SIZE(ivb_master_regs);
666 }
667
Brad Volkin351e3db2014-02-18 10:15:46 -0800668 ring->get_cmd_length_mask = gen7_render_get_cmd_length_mask;
669 break;
670 case VCS:
Brad Volkin44e895a2014-05-10 14:10:43 -0700671 cmd_tables = gen7_video_cmds;
672 cmd_table_count = ARRAY_SIZE(gen7_video_cmds);
Brad Volkin351e3db2014-02-18 10:15:46 -0800673 ring->get_cmd_length_mask = gen7_bsd_get_cmd_length_mask;
674 break;
675 case BCS:
Brad Volkin9c640d12014-02-18 10:15:48 -0800676 if (IS_HASWELL(ring->dev)) {
Brad Volkin44e895a2014-05-10 14:10:43 -0700677 cmd_tables = hsw_blt_ring_cmds;
678 cmd_table_count = ARRAY_SIZE(hsw_blt_ring_cmds);
Brad Volkin9c640d12014-02-18 10:15:48 -0800679 } else {
Brad Volkin44e895a2014-05-10 14:10:43 -0700680 cmd_tables = gen7_blt_cmds;
681 cmd_table_count = ARRAY_SIZE(gen7_blt_cmds);
Brad Volkin9c640d12014-02-18 10:15:48 -0800682 }
683
Brad Volkin5947de92014-02-18 10:15:50 -0800684 ring->reg_table = gen7_blt_regs;
685 ring->reg_count = ARRAY_SIZE(gen7_blt_regs);
686
Brad Volkin220375a2014-02-18 10:15:51 -0800687 if (IS_HASWELL(ring->dev)) {
688 ring->master_reg_table = hsw_master_regs;
689 ring->master_reg_count = ARRAY_SIZE(hsw_master_regs);
690 } else {
691 ring->master_reg_table = ivb_master_regs;
692 ring->master_reg_count = ARRAY_SIZE(ivb_master_regs);
693 }
694
Brad Volkin351e3db2014-02-18 10:15:46 -0800695 ring->get_cmd_length_mask = gen7_blt_get_cmd_length_mask;
696 break;
697 case VECS:
Brad Volkin44e895a2014-05-10 14:10:43 -0700698 cmd_tables = hsw_vebox_cmds;
699 cmd_table_count = ARRAY_SIZE(hsw_vebox_cmds);
Brad Volkin351e3db2014-02-18 10:15:46 -0800700 /* VECS can use the same length_mask function as VCS */
701 ring->get_cmd_length_mask = gen7_bsd_get_cmd_length_mask;
702 break;
703 default:
704 DRM_ERROR("CMD: cmd_parser_init with unknown ring: %d\n",
705 ring->id);
706 BUG();
707 }
708
Brad Volkin44e895a2014-05-10 14:10:43 -0700709 BUG_ON(!validate_cmds_sorted(ring, cmd_tables, cmd_table_count));
Brad Volkin300233e2014-03-27 11:43:38 -0700710 BUG_ON(!validate_regs_sorted(ring));
Brad Volkin44e895a2014-05-10 14:10:43 -0700711
712 ret = init_hash_table(ring, cmd_tables, cmd_table_count);
713 if (ret) {
714 DRM_ERROR("CMD: cmd_parser_init failed!\n");
715 fini_hash_table(ring);
716 return ret;
717 }
718
719 ring->needs_cmd_parser = true;
720
721 return 0;
722}
723
724/**
725 * i915_cmd_parser_fini_ring() - clean up cmd parser related fields
726 * @ring: the ringbuffer to clean up
727 *
728 * Releases any resources related to command parsing that may have been
729 * initialized for the specified ring.
730 */
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100731void i915_cmd_parser_fini_ring(struct intel_engine_cs *ring)
Brad Volkin44e895a2014-05-10 14:10:43 -0700732{
733 if (!ring->needs_cmd_parser)
734 return;
735
736 fini_hash_table(ring);
Brad Volkin351e3db2014-02-18 10:15:46 -0800737}
738
739static const struct drm_i915_cmd_descriptor*
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100740find_cmd_in_table(struct intel_engine_cs *ring,
Brad Volkin351e3db2014-02-18 10:15:46 -0800741 u32 cmd_header)
742{
Brad Volkin44e895a2014-05-10 14:10:43 -0700743 struct cmd_node *desc_node;
Brad Volkin351e3db2014-02-18 10:15:46 -0800744
Brad Volkin44e895a2014-05-10 14:10:43 -0700745 hash_for_each_possible(ring->cmd_hash, desc_node, node,
746 cmd_header & CMD_HASH_MASK) {
747 const struct drm_i915_cmd_descriptor *desc = desc_node->desc;
Brad Volkin351e3db2014-02-18 10:15:46 -0800748 u32 masked_cmd = desc->cmd.mask & cmd_header;
749 u32 masked_value = desc->cmd.value & desc->cmd.mask;
750
751 if (masked_cmd == masked_value)
752 return desc;
753 }
754
755 return NULL;
756}
757
758/*
759 * Returns a pointer to a descriptor for the command specified by cmd_header.
760 *
761 * The caller must supply space for a default descriptor via the default_desc
762 * parameter. If no descriptor for the specified command exists in the ring's
763 * command parser tables, this function fills in default_desc based on the
764 * ring's default length encoding and returns default_desc.
765 */
766static const struct drm_i915_cmd_descriptor*
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100767find_cmd(struct intel_engine_cs *ring,
Brad Volkin351e3db2014-02-18 10:15:46 -0800768 u32 cmd_header,
769 struct drm_i915_cmd_descriptor *default_desc)
770{
Brad Volkin44e895a2014-05-10 14:10:43 -0700771 const struct drm_i915_cmd_descriptor *desc;
Brad Volkin351e3db2014-02-18 10:15:46 -0800772 u32 mask;
Brad Volkin351e3db2014-02-18 10:15:46 -0800773
Brad Volkin44e895a2014-05-10 14:10:43 -0700774 desc = find_cmd_in_table(ring, cmd_header);
775 if (desc)
776 return desc;
Brad Volkin351e3db2014-02-18 10:15:46 -0800777
778 mask = ring->get_cmd_length_mask(cmd_header);
779 if (!mask)
780 return NULL;
781
782 BUG_ON(!default_desc);
783 default_desc->flags = CMD_DESC_SKIP;
784 default_desc->length.mask = mask;
785
786 return default_desc;
787}
788
789static bool valid_reg(const u32 *table, int count, u32 addr)
790{
791 if (table && count != 0) {
792 int i;
793
794 for (i = 0; i < count; i++) {
795 if (table[i] == addr)
796 return true;
797 }
798 }
799
800 return false;
801}
802
803static u32 *vmap_batch(struct drm_i915_gem_object *obj)
804{
805 int i;
806 void *addr = NULL;
807 struct sg_page_iter sg_iter;
808 struct page **pages;
809
810 pages = drm_malloc_ab(obj->base.size >> PAGE_SHIFT, sizeof(*pages));
811 if (pages == NULL) {
812 DRM_DEBUG_DRIVER("Failed to get space for pages\n");
813 goto finish;
814 }
815
816 i = 0;
817 for_each_sg_page(obj->pages->sgl, &sg_iter, obj->pages->nents, 0) {
818 pages[i] = sg_page_iter_page(&sg_iter);
819 i++;
820 }
821
822 addr = vmap(pages, i, 0, PAGE_KERNEL);
823 if (addr == NULL) {
824 DRM_DEBUG_DRIVER("Failed to vmap pages\n");
825 goto finish;
826 }
827
828finish:
829 if (pages)
830 drm_free_large(pages);
831 return (u32*)addr;
832}
833
834/**
835 * i915_needs_cmd_parser() - should a given ring use software command parsing?
836 * @ring: the ring in question
837 *
838 * Only certain platforms require software batch buffer command parsing, and
839 * only when enabled via module paramter.
840 *
841 * Return: true if the ring requires software command parsing
842 */
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100843bool i915_needs_cmd_parser(struct intel_engine_cs *ring)
Brad Volkin351e3db2014-02-18 10:15:46 -0800844{
Brad Volkin44e895a2014-05-10 14:10:43 -0700845 if (!ring->needs_cmd_parser)
Brad Volkin351e3db2014-02-18 10:15:46 -0800846 return false;
847
Brad Volkind4d48032014-02-18 10:15:54 -0800848 /*
849 * XXX: VLV is Gen7 and therefore has cmd_tables, but has PPGTT
850 * disabled. That will cause all of the parser's PPGTT checks to
851 * fail. For now, disable parsing when PPGTT is off.
852 */
Daniel Vetter896ab1a2014-08-06 15:04:51 +0200853 if (USES_PPGTT(ring->dev))
Brad Volkind4d48032014-02-18 10:15:54 -0800854 return false;
855
Brad Volkin351e3db2014-02-18 10:15:46 -0800856 return (i915.enable_cmd_parser == 1);
857}
858
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100859static bool check_cmd(const struct intel_engine_cs *ring,
Brad Volkinb6510002014-03-27 11:43:39 -0700860 const struct drm_i915_cmd_descriptor *desc,
861 const u32 *cmd,
Brad Volkin6e66ea12014-03-28 10:21:50 -0700862 const bool is_master,
863 bool *oacontrol_set)
Brad Volkinb6510002014-03-27 11:43:39 -0700864{
865 if (desc->flags & CMD_DESC_REJECT) {
866 DRM_DEBUG_DRIVER("CMD: Rejected command: 0x%08X\n", *cmd);
867 return false;
868 }
869
870 if ((desc->flags & CMD_DESC_MASTER) && !is_master) {
871 DRM_DEBUG_DRIVER("CMD: Rejected master-only command: 0x%08X\n",
872 *cmd);
873 return false;
874 }
875
876 if (desc->flags & CMD_DESC_REGISTER) {
877 u32 reg_addr = cmd[desc->reg.offset] & desc->reg.mask;
878
Brad Volkin6e66ea12014-03-28 10:21:50 -0700879 /*
880 * OACONTROL requires some special handling for writes. We
881 * want to make sure that any batch which enables OA also
882 * disables it before the end of the batch. The goal is to
883 * prevent one process from snooping on the perf data from
884 * another process. To do that, we need to check the value
885 * that will be written to the register. Hence, limit
886 * OACONTROL writes to only MI_LOAD_REGISTER_IMM commands.
887 */
888 if (reg_addr == OACONTROL) {
889 if (desc->cmd.value == MI_LOAD_REGISTER_MEM)
890 return false;
891
892 if (desc->cmd.value == MI_LOAD_REGISTER_IMM(1))
893 *oacontrol_set = (cmd[2] != 0);
894 }
895
Brad Volkinb6510002014-03-27 11:43:39 -0700896 if (!valid_reg(ring->reg_table,
897 ring->reg_count, reg_addr)) {
898 if (!is_master ||
899 !valid_reg(ring->master_reg_table,
900 ring->master_reg_count,
901 reg_addr)) {
902 DRM_DEBUG_DRIVER("CMD: Rejected register 0x%08X in command: 0x%08X (ring=%d)\n",
903 reg_addr,
904 *cmd,
905 ring->id);
906 return false;
907 }
908 }
909 }
910
911 if (desc->flags & CMD_DESC_BITMASK) {
912 int i;
913
914 for (i = 0; i < MAX_CMD_DESC_BITMASKS; i++) {
915 u32 dword;
916
917 if (desc->bits[i].mask == 0)
918 break;
919
920 if (desc->bits[i].condition_mask != 0) {
921 u32 offset =
922 desc->bits[i].condition_offset;
923 u32 condition = cmd[offset] &
924 desc->bits[i].condition_mask;
925
926 if (condition == 0)
927 continue;
928 }
929
930 dword = cmd[desc->bits[i].offset] &
931 desc->bits[i].mask;
932
933 if (dword != desc->bits[i].expected) {
934 DRM_DEBUG_DRIVER("CMD: Rejected command 0x%08X for bitmask 0x%08X (exp=0x%08X act=0x%08X) (ring=%d)\n",
935 *cmd,
936 desc->bits[i].mask,
937 desc->bits[i].expected,
938 dword, ring->id);
939 return false;
940 }
941 }
942 }
943
944 return true;
945}
946
Brad Volkin351e3db2014-02-18 10:15:46 -0800947#define LENGTH_BIAS 2
948
949/**
950 * i915_parse_cmds() - parse a submitted batch buffer for privilege violations
951 * @ring: the ring on which the batch is to execute
952 * @batch_obj: the batch buffer in question
953 * @batch_start_offset: byte offset in the batch at which execution starts
954 * @is_master: is the submitting process the drm master?
955 *
956 * Parses the specified batch buffer looking for privilege violations as
957 * described in the overview.
958 *
959 * Return: non-zero if the parser finds violations or otherwise fails
960 */
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100961int i915_parse_cmds(struct intel_engine_cs *ring,
Brad Volkin351e3db2014-02-18 10:15:46 -0800962 struct drm_i915_gem_object *batch_obj,
963 u32 batch_start_offset,
964 bool is_master)
965{
966 int ret = 0;
967 u32 *cmd, *batch_base, *batch_end;
968 struct drm_i915_cmd_descriptor default_desc = { 0 };
969 int needs_clflush = 0;
Brad Volkin6e66ea12014-03-28 10:21:50 -0700970 bool oacontrol_set = false; /* OACONTROL tracking. See check_cmd() */
Brad Volkin351e3db2014-02-18 10:15:46 -0800971
972 ret = i915_gem_obj_prepare_shmem_read(batch_obj, &needs_clflush);
973 if (ret) {
974 DRM_DEBUG_DRIVER("CMD: failed to prep read\n");
975 return ret;
976 }
977
978 batch_base = vmap_batch(batch_obj);
979 if (!batch_base) {
980 DRM_DEBUG_DRIVER("CMD: Failed to vmap batch\n");
981 i915_gem_object_unpin_pages(batch_obj);
982 return -ENOMEM;
983 }
984
985 if (needs_clflush)
986 drm_clflush_virt_range((char *)batch_base, batch_obj->base.size);
987
988 cmd = batch_base + (batch_start_offset / sizeof(*cmd));
989 batch_end = cmd + (batch_obj->base.size / sizeof(*batch_end));
990
991 while (cmd < batch_end) {
992 const struct drm_i915_cmd_descriptor *desc;
993 u32 length;
994
995 if (*cmd == MI_BATCH_BUFFER_END)
996 break;
997
998 desc = find_cmd(ring, *cmd, &default_desc);
999 if (!desc) {
1000 DRM_DEBUG_DRIVER("CMD: Unrecognized command: 0x%08X\n",
1001 *cmd);
1002 ret = -EINVAL;
1003 break;
1004 }
1005
1006 if (desc->flags & CMD_DESC_FIXED)
1007 length = desc->length.fixed;
1008 else
1009 length = ((*cmd & desc->length.mask) + LENGTH_BIAS);
1010
1011 if ((batch_end - cmd) < length) {
Jani Nikula86a25122014-04-02 11:24:20 +03001012 DRM_DEBUG_DRIVER("CMD: Command length exceeds batch length: 0x%08X length=%u batchlen=%td\n",
Brad Volkin351e3db2014-02-18 10:15:46 -08001013 *cmd,
1014 length,
Jan Moskyto Matejka4b6eab52014-04-28 15:03:23 +02001015 batch_end - cmd);
Brad Volkin351e3db2014-02-18 10:15:46 -08001016 ret = -EINVAL;
1017 break;
1018 }
1019
Brad Volkin6e66ea12014-03-28 10:21:50 -07001020 if (!check_cmd(ring, desc, cmd, is_master, &oacontrol_set)) {
Brad Volkin351e3db2014-02-18 10:15:46 -08001021 ret = -EINVAL;
1022 break;
1023 }
1024
Brad Volkin351e3db2014-02-18 10:15:46 -08001025 cmd += length;
1026 }
1027
Brad Volkin6e66ea12014-03-28 10:21:50 -07001028 if (oacontrol_set) {
1029 DRM_DEBUG_DRIVER("CMD: batch set OACONTROL but did not clear it\n");
1030 ret = -EINVAL;
1031 }
1032
Brad Volkin351e3db2014-02-18 10:15:46 -08001033 if (cmd >= batch_end) {
1034 DRM_DEBUG_DRIVER("CMD: Got to the end of the buffer w/o a BBE cmd!\n");
1035 ret = -EINVAL;
1036 }
1037
1038 vunmap(batch_base);
1039
1040 i915_gem_object_unpin_pages(batch_obj);
1041
1042 return ret;
1043}
Brad Volkind728c8e2014-02-18 10:15:56 -08001044
1045/**
1046 * i915_cmd_parser_get_version() - get the cmd parser version number
1047 *
1048 * The cmd parser maintains a simple increasing integer version number suitable
1049 * for passing to userspace clients to determine what operations are permitted.
1050 *
1051 * Return: the current version number of the cmd parser
1052 */
1053int i915_cmd_parser_get_version(void)
1054{
1055 /*
1056 * Command parser version history
1057 *
1058 * 1. Initial version. Checks batches and reports violations, but leaves
1059 * hardware parsing enabled (so does not allow new use cases).
1060 */
1061 return 1;
1062}