blob: f0cb22cc0dd6e52d715604550f14a049ac12e5b7 [file] [log] [blame]
Brad Volkin351e3db2014-02-18 10:15:46 -08001/*
2 * Copyright © 2013 Intel Corporation
3 *
4 * Permission is hereby granted, free of charge, to any person obtaining a
5 * copy of this software and associated documentation files (the "Software"),
6 * to deal in the Software without restriction, including without limitation
7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8 * and/or sell copies of the Software, and to permit persons to whom the
9 * Software is furnished to do so, subject to the following conditions:
10 *
11 * The above copyright notice and this permission notice (including the next
12 * paragraph) shall be included in all copies or substantial portions of the
13 * Software.
14 *
15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
18 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
20 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
21 * IN THE SOFTWARE.
22 *
23 * Authors:
24 * Brad Volkin <bradley.d.volkin@intel.com>
25 *
26 */
27
28#include "i915_drv.h"
29
30/**
Daniel Vetter122b2502014-04-25 16:59:00 +020031 * DOC: batch buffer command parser
Brad Volkin351e3db2014-02-18 10:15:46 -080032 *
33 * Motivation:
34 * Certain OpenGL features (e.g. transform feedback, performance monitoring)
35 * require userspace code to submit batches containing commands such as
36 * MI_LOAD_REGISTER_IMM to access various registers. Unfortunately, some
37 * generations of the hardware will noop these commands in "unsecure" batches
38 * (which includes all userspace batches submitted via i915) even though the
39 * commands may be safe and represent the intended programming model of the
40 * device.
41 *
42 * The software command parser is similar in operation to the command parsing
43 * done in hardware for unsecure batches. However, the software parser allows
44 * some operations that would be noop'd by hardware, if the parser determines
45 * the operation is safe, and submits the batch as "secure" to prevent hardware
46 * parsing.
47 *
48 * Threats:
49 * At a high level, the hardware (and software) checks attempt to prevent
50 * granting userspace undue privileges. There are three categories of privilege.
51 *
52 * First, commands which are explicitly defined as privileged or which should
53 * only be used by the kernel driver. The parser generally rejects such
54 * commands, though it may allow some from the drm master process.
55 *
56 * Second, commands which access registers. To support correct/enhanced
57 * userspace functionality, particularly certain OpenGL extensions, the parser
58 * provides a whitelist of registers which userspace may safely access (for both
59 * normal and drm master processes).
60 *
61 * Third, commands which access privileged memory (i.e. GGTT, HWS page, etc).
62 * The parser always rejects such commands.
63 *
64 * The majority of the problematic commands fall in the MI_* range, with only a
Chris Wilson33a051a2016-07-27 09:07:26 +010065 * few specific commands on each engine (e.g. PIPE_CONTROL and MI_FLUSH_DW).
Brad Volkin351e3db2014-02-18 10:15:46 -080066 *
67 * Implementation:
Chris Wilson33a051a2016-07-27 09:07:26 +010068 * Each engine maintains tables of commands and registers which the parser
69 * uses in scanning batch buffers submitted to that engine.
Brad Volkin351e3db2014-02-18 10:15:46 -080070 *
71 * Since the set of commands that the parser must check for is significantly
72 * smaller than the number of commands supported, the parser tables contain only
73 * those commands required by the parser. This generally works because command
74 * opcode ranges have standard command length encodings. So for commands that
75 * the parser does not need to check, it can easily skip them. This is
Chris Wilson33a051a2016-07-27 09:07:26 +010076 * implemented via a per-engine length decoding vfunc.
Brad Volkin351e3db2014-02-18 10:15:46 -080077 *
78 * Unfortunately, there are a number of commands that do not follow the standard
79 * length encoding for their opcode range, primarily amongst the MI_* commands.
80 * To handle this, the parser provides a way to define explicit "skip" entries
Chris Wilson33a051a2016-07-27 09:07:26 +010081 * in the per-engine command tables.
Brad Volkin351e3db2014-02-18 10:15:46 -080082 *
83 * Other command table entries map fairly directly to high level categories
84 * mentioned above: rejected, master-only, register whitelist. The parser
85 * implements a number of checks, including the privileged memory checks, via a
86 * general bitmasking mechanism.
87 */
88
Matthew Auld007873b2016-11-23 23:02:27 +000089/*
90 * A command that requires special handling by the command parser.
91 */
92struct drm_i915_cmd_descriptor {
93 /*
94 * Flags describing how the command parser processes the command.
95 *
96 * CMD_DESC_FIXED: The command has a fixed length if this is set,
97 * a length mask if not set
98 * CMD_DESC_SKIP: The command is allowed but does not follow the
99 * standard length encoding for the opcode range in
100 * which it falls
101 * CMD_DESC_REJECT: The command is never allowed
102 * CMD_DESC_REGISTER: The command should be checked against the
103 * register whitelist for the appropriate ring
104 * CMD_DESC_MASTER: The command is allowed if the submitting process
105 * is the DRM master
106 */
107 u32 flags;
108#define CMD_DESC_FIXED (1<<0)
109#define CMD_DESC_SKIP (1<<1)
110#define CMD_DESC_REJECT (1<<2)
111#define CMD_DESC_REGISTER (1<<3)
112#define CMD_DESC_BITMASK (1<<4)
113#define CMD_DESC_MASTER (1<<5)
114
115 /*
116 * The command's unique identification bits and the bitmask to get them.
117 * This isn't strictly the opcode field as defined in the spec and may
118 * also include type, subtype, and/or subop fields.
119 */
120 struct {
121 u32 value;
122 u32 mask;
123 } cmd;
124
125 /*
126 * The command's length. The command is either fixed length (i.e. does
127 * not include a length field) or has a length field mask. The flag
128 * CMD_DESC_FIXED indicates a fixed length. Otherwise, the command has
129 * a length mask. All command entries in a command table must include
130 * length information.
131 */
132 union {
133 u32 fixed;
134 u32 mask;
135 } length;
136
137 /*
138 * Describes where to find a register address in the command to check
139 * against the ring's register whitelist. Only valid if flags has the
140 * CMD_DESC_REGISTER bit set.
141 *
142 * A non-zero step value implies that the command may access multiple
143 * registers in sequence (e.g. LRI), in that case step gives the
144 * distance in dwords between individual offset fields.
145 */
146 struct {
147 u32 offset;
148 u32 mask;
149 u32 step;
150 } reg;
151
152#define MAX_CMD_DESC_BITMASKS 3
153 /*
154 * Describes command checks where a particular dword is masked and
155 * compared against an expected value. If the command does not match
156 * the expected value, the parser rejects it. Only valid if flags has
157 * the CMD_DESC_BITMASK bit set. Only entries where mask is non-zero
158 * are valid.
159 *
160 * If the check specifies a non-zero condition_mask then the parser
161 * only performs the check when the bits specified by condition_mask
162 * are non-zero.
163 */
164 struct {
165 u32 offset;
166 u32 mask;
167 u32 expected;
168 u32 condition_offset;
169 u32 condition_mask;
170 } bits[MAX_CMD_DESC_BITMASKS];
171};
172
173/*
174 * A table of commands requiring special handling by the command parser.
175 *
176 * Each engine has an array of tables. Each table consists of an array of
177 * command descriptors, which must be sorted with command opcodes in
178 * ascending order.
179 */
180struct drm_i915_cmd_table {
181 const struct drm_i915_cmd_descriptor *table;
182 int count;
183};
184
Chris Wilsond6a4ead2016-08-18 17:17:14 +0100185#define STD_MI_OPCODE_SHIFT (32 - 9)
186#define STD_3D_OPCODE_SHIFT (32 - 16)
187#define STD_2D_OPCODE_SHIFT (32 - 10)
188#define STD_MFX_OPCODE_SHIFT (32 - 16)
Chris Wilsonefdfd912016-08-18 17:17:15 +0100189#define MIN_OPCODE_SHIFT 16
Brad Volkin3a6fa982014-02-18 10:15:47 -0800190
191#define CMD(op, opm, f, lm, fl, ...) \
192 { \
193 .flags = (fl) | ((f) ? CMD_DESC_FIXED : 0), \
Chris Wilsond6a4ead2016-08-18 17:17:14 +0100194 .cmd = { (op), ~0u << (opm) }, \
Brad Volkin3a6fa982014-02-18 10:15:47 -0800195 .length = { (lm) }, \
196 __VA_ARGS__ \
197 }
198
199/* Convenience macros to compress the tables */
Chris Wilsond6a4ead2016-08-18 17:17:14 +0100200#define SMI STD_MI_OPCODE_SHIFT
201#define S3D STD_3D_OPCODE_SHIFT
202#define S2D STD_2D_OPCODE_SHIFT
203#define SMFX STD_MFX_OPCODE_SHIFT
Brad Volkin3a6fa982014-02-18 10:15:47 -0800204#define F true
205#define S CMD_DESC_SKIP
206#define R CMD_DESC_REJECT
207#define W CMD_DESC_REGISTER
208#define B CMD_DESC_BITMASK
209#define M CMD_DESC_MASTER
210
211/* Command Mask Fixed Len Action
212 ---------------------------------------------------------- */
213static const struct drm_i915_cmd_descriptor common_cmds[] = {
214 CMD( MI_NOOP, SMI, F, 1, S ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800215 CMD( MI_USER_INTERRUPT, SMI, F, 1, R ),
Brad Volkin17c1eb12014-02-18 10:15:49 -0800216 CMD( MI_WAIT_FOR_EVENT, SMI, F, 1, M ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800217 CMD( MI_ARB_CHECK, SMI, F, 1, S ),
218 CMD( MI_REPORT_HEAD, SMI, F, 1, S ),
219 CMD( MI_SUSPEND_FLUSH, SMI, F, 1, S ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800220 CMD( MI_SEMAPHORE_MBOX, SMI, !F, 0xFF, R ),
221 CMD( MI_STORE_DWORD_INDEX, SMI, !F, 0xFF, R ),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800222 CMD( MI_LOAD_REGISTER_IMM(1), SMI, !F, 0xFF, W,
Francisco Jerez6a65c5b2015-05-29 16:44:13 +0300223 .reg = { .offset = 1, .mask = 0x007FFFFC, .step = 2 } ),
Chris Wilson614f4ad2015-09-02 12:29:40 +0100224 CMD( MI_STORE_REGISTER_MEM, SMI, F, 3, W | B,
Brad Volkind4d48032014-02-18 10:15:54 -0800225 .reg = { .offset = 1, .mask = 0x007FFFFC },
226 .bits = {{
227 .offset = 0,
228 .mask = MI_GLOBAL_GTT,
229 .expected = 0,
230 }}, ),
Chris Wilson614f4ad2015-09-02 12:29:40 +0100231 CMD( MI_LOAD_REGISTER_MEM, SMI, F, 3, W | B,
Brad Volkind4d48032014-02-18 10:15:54 -0800232 .reg = { .offset = 1, .mask = 0x007FFFFC },
233 .bits = {{
234 .offset = 0,
235 .mask = MI_GLOBAL_GTT,
236 .expected = 0,
237 }}, ),
Brad Volkin42c71562014-10-16 12:24:42 -0700238 /*
239 * MI_BATCH_BUFFER_START requires some special handling. It's not
240 * really a 'skip' action but it doesn't seem like it's worth adding
241 * a new action. See i915_parse_cmds().
242 */
Brad Volkin3a6fa982014-02-18 10:15:47 -0800243 CMD( MI_BATCH_BUFFER_START, SMI, !F, 0xFF, S ),
244};
245
246static const struct drm_i915_cmd_descriptor render_cmds[] = {
247 CMD( MI_FLUSH, SMI, F, 1, S ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800248 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800249 CMD( MI_PREDICATE, SMI, F, 1, S ),
250 CMD( MI_TOPOLOGY_FILTER, SMI, F, 1, S ),
Michael H. Nguyen86ef6302014-11-21 09:35:36 -0800251 CMD( MI_SET_APPID, SMI, F, 1, S ),
Hanno Böck9f585822015-07-29 10:29:58 +0200252 CMD( MI_DISPLAY_FLIP, SMI, !F, 0xFF, R ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800253 CMD( MI_SET_CONTEXT, SMI, !F, 0xFF, R ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800254 CMD( MI_URB_CLEAR, SMI, !F, 0xFF, S ),
Brad Volkind4d48032014-02-18 10:15:54 -0800255 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0x3F, B,
256 .bits = {{
257 .offset = 0,
258 .mask = MI_GLOBAL_GTT,
259 .expected = 0,
260 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800261 CMD( MI_UPDATE_GTT, SMI, !F, 0xFF, R ),
Brad Volkind4d48032014-02-18 10:15:54 -0800262 CMD( MI_CLFLUSH, SMI, !F, 0x3FF, B,
263 .bits = {{
264 .offset = 0,
265 .mask = MI_GLOBAL_GTT,
266 .expected = 0,
267 }}, ),
268 CMD( MI_REPORT_PERF_COUNT, SMI, !F, 0x3F, B,
269 .bits = {{
270 .offset = 1,
271 .mask = MI_REPORT_PERF_COUNT_GGTT,
272 .expected = 0,
273 }}, ),
274 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
275 .bits = {{
276 .offset = 0,
277 .mask = MI_GLOBAL_GTT,
278 .expected = 0,
279 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800280 CMD( GFX_OP_3DSTATE_VF_STATISTICS, S3D, F, 1, S ),
281 CMD( PIPELINE_SELECT, S3D, F, 1, S ),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800282 CMD( MEDIA_VFE_STATE, S3D, !F, 0xFFFF, B,
283 .bits = {{
284 .offset = 2,
285 .mask = MEDIA_VFE_STATE_MMIO_ACCESS_MASK,
286 .expected = 0,
287 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800288 CMD( GPGPU_OBJECT, S3D, !F, 0xFF, S ),
289 CMD( GPGPU_WALKER, S3D, !F, 0xFF, S ),
290 CMD( GFX_OP_3DSTATE_SO_DECL_LIST, S3D, !F, 0x1FF, S ),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800291 CMD( GFX_OP_PIPE_CONTROL(5), S3D, !F, 0xFF, B,
292 .bits = {{
293 .offset = 1,
Brad Volkinb18b3962014-02-18 10:15:53 -0800294 .mask = (PIPE_CONTROL_MMIO_WRITE | PIPE_CONTROL_NOTIFY),
Brad Volkinf0a346b2014-02-18 10:15:52 -0800295 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800296 },
297 {
298 .offset = 1,
Brad Volkin114d4f72014-02-18 10:15:55 -0800299 .mask = (PIPE_CONTROL_GLOBAL_GTT_IVB |
300 PIPE_CONTROL_STORE_DATA_INDEX),
Brad Volkind4d48032014-02-18 10:15:54 -0800301 .expected = 0,
302 .condition_offset = 1,
303 .condition_mask = PIPE_CONTROL_POST_SYNC_OP_MASK,
Brad Volkinf0a346b2014-02-18 10:15:52 -0800304 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800305};
306
307static const struct drm_i915_cmd_descriptor hsw_render_cmds[] = {
308 CMD( MI_SET_PREDICATE, SMI, F, 1, S ),
309 CMD( MI_RS_CONTROL, SMI, F, 1, S ),
310 CMD( MI_URB_ATOMIC_ALLOC, SMI, F, 1, S ),
Michael H. Nguyen86ef6302014-11-21 09:35:36 -0800311 CMD( MI_SET_APPID, SMI, F, 1, S ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800312 CMD( MI_RS_CONTEXT, SMI, F, 1, S ),
Brad Volkin17c1eb12014-02-18 10:15:49 -0800313 CMD( MI_LOAD_SCAN_LINES_INCL, SMI, !F, 0x3F, M ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800314 CMD( MI_LOAD_SCAN_LINES_EXCL, SMI, !F, 0x3F, R ),
Kenneth Graunke6761d0a2016-05-06 08:50:14 +0100315 CMD( MI_LOAD_REGISTER_REG, SMI, !F, 0xFF, W,
316 .reg = { .offset = 1, .mask = 0x007FFFFC, .step = 1 } ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800317 CMD( MI_RS_STORE_DATA_IMM, SMI, !F, 0xFF, S ),
318 CMD( MI_LOAD_URB_MEM, SMI, !F, 0xFF, S ),
319 CMD( MI_STORE_URB_MEM, SMI, !F, 0xFF, S ),
320 CMD( GFX_OP_3DSTATE_DX9_CONSTANTF_VS, S3D, !F, 0x7FF, S ),
321 CMD( GFX_OP_3DSTATE_DX9_CONSTANTF_PS, S3D, !F, 0x7FF, S ),
322
323 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_VS, S3D, !F, 0x1FF, S ),
324 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_GS, S3D, !F, 0x1FF, S ),
325 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_HS, S3D, !F, 0x1FF, S ),
326 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_DS, S3D, !F, 0x1FF, S ),
327 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_PS, S3D, !F, 0x1FF, S ),
328};
329
330static const struct drm_i915_cmd_descriptor video_cmds[] = {
Brad Volkin9c640d12014-02-18 10:15:48 -0800331 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
Michael H. Nguyen86ef6302014-11-21 09:35:36 -0800332 CMD( MI_SET_APPID, SMI, F, 1, S ),
Brad Volkind4d48032014-02-18 10:15:54 -0800333 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0xFF, B,
334 .bits = {{
335 .offset = 0,
336 .mask = MI_GLOBAL_GTT,
337 .expected = 0,
338 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800339 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800340 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
341 .bits = {{
342 .offset = 0,
343 .mask = MI_FLUSH_DW_NOTIFY,
344 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800345 },
346 {
347 .offset = 1,
348 .mask = MI_FLUSH_DW_USE_GTT,
349 .expected = 0,
350 .condition_offset = 0,
351 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkin114d4f72014-02-18 10:15:55 -0800352 },
353 {
354 .offset = 0,
355 .mask = MI_FLUSH_DW_STORE_INDEX,
356 .expected = 0,
357 .condition_offset = 0,
358 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkinb18b3962014-02-18 10:15:53 -0800359 }}, ),
Brad Volkind4d48032014-02-18 10:15:54 -0800360 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
361 .bits = {{
362 .offset = 0,
363 .mask = MI_GLOBAL_GTT,
364 .expected = 0,
365 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800366 /*
367 * MFX_WAIT doesn't fit the way we handle length for most commands.
368 * It has a length field but it uses a non-standard length bias.
369 * It is always 1 dword though, so just treat it as fixed length.
370 */
371 CMD( MFX_WAIT, SMFX, F, 1, S ),
372};
373
374static const struct drm_i915_cmd_descriptor vecs_cmds[] = {
Brad Volkin9c640d12014-02-18 10:15:48 -0800375 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
Michael H. Nguyen86ef6302014-11-21 09:35:36 -0800376 CMD( MI_SET_APPID, SMI, F, 1, S ),
Brad Volkind4d48032014-02-18 10:15:54 -0800377 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0xFF, B,
378 .bits = {{
379 .offset = 0,
380 .mask = MI_GLOBAL_GTT,
381 .expected = 0,
382 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800383 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800384 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
385 .bits = {{
386 .offset = 0,
387 .mask = MI_FLUSH_DW_NOTIFY,
388 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800389 },
390 {
391 .offset = 1,
392 .mask = MI_FLUSH_DW_USE_GTT,
393 .expected = 0,
394 .condition_offset = 0,
395 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkin114d4f72014-02-18 10:15:55 -0800396 },
397 {
398 .offset = 0,
399 .mask = MI_FLUSH_DW_STORE_INDEX,
400 .expected = 0,
401 .condition_offset = 0,
402 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkinb18b3962014-02-18 10:15:53 -0800403 }}, ),
Brad Volkind4d48032014-02-18 10:15:54 -0800404 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
405 .bits = {{
406 .offset = 0,
407 .mask = MI_GLOBAL_GTT,
408 .expected = 0,
409 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800410};
411
412static const struct drm_i915_cmd_descriptor blt_cmds[] = {
Brad Volkin9c640d12014-02-18 10:15:48 -0800413 CMD( MI_DISPLAY_FLIP, SMI, !F, 0xFF, R ),
Brad Volkind4d48032014-02-18 10:15:54 -0800414 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0x3FF, B,
415 .bits = {{
416 .offset = 0,
417 .mask = MI_GLOBAL_GTT,
418 .expected = 0,
419 }}, ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800420 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
Brad Volkinb18b3962014-02-18 10:15:53 -0800421 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
422 .bits = {{
423 .offset = 0,
424 .mask = MI_FLUSH_DW_NOTIFY,
425 .expected = 0,
Brad Volkind4d48032014-02-18 10:15:54 -0800426 },
427 {
428 .offset = 1,
429 .mask = MI_FLUSH_DW_USE_GTT,
430 .expected = 0,
431 .condition_offset = 0,
432 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkin114d4f72014-02-18 10:15:55 -0800433 },
434 {
435 .offset = 0,
436 .mask = MI_FLUSH_DW_STORE_INDEX,
437 .expected = 0,
438 .condition_offset = 0,
439 .condition_mask = MI_FLUSH_DW_OP_MASK,
Brad Volkinb18b3962014-02-18 10:15:53 -0800440 }}, ),
Brad Volkin3a6fa982014-02-18 10:15:47 -0800441 CMD( COLOR_BLT, S2D, !F, 0x3F, S ),
442 CMD( SRC_COPY_BLT, S2D, !F, 0x3F, S ),
443};
444
Brad Volkin9c640d12014-02-18 10:15:48 -0800445static const struct drm_i915_cmd_descriptor hsw_blt_cmds[] = {
Brad Volkin17c1eb12014-02-18 10:15:49 -0800446 CMD( MI_LOAD_SCAN_LINES_INCL, SMI, !F, 0x3F, M ),
Brad Volkin9c640d12014-02-18 10:15:48 -0800447 CMD( MI_LOAD_SCAN_LINES_EXCL, SMI, !F, 0x3F, R ),
448};
449
Chris Wilsonefdfd912016-08-18 17:17:15 +0100450static const struct drm_i915_cmd_descriptor noop_desc =
451 CMD(MI_NOOP, SMI, F, 1, S);
452
Brad Volkin3a6fa982014-02-18 10:15:47 -0800453#undef CMD
454#undef SMI
455#undef S3D
456#undef S2D
457#undef SMFX
458#undef F
459#undef S
460#undef R
461#undef W
462#undef B
463#undef M
464
465static const struct drm_i915_cmd_table gen7_render_cmds[] = {
466 { common_cmds, ARRAY_SIZE(common_cmds) },
467 { render_cmds, ARRAY_SIZE(render_cmds) },
468};
469
470static const struct drm_i915_cmd_table hsw_render_ring_cmds[] = {
471 { common_cmds, ARRAY_SIZE(common_cmds) },
472 { render_cmds, ARRAY_SIZE(render_cmds) },
473 { hsw_render_cmds, ARRAY_SIZE(hsw_render_cmds) },
474};
475
476static const struct drm_i915_cmd_table gen7_video_cmds[] = {
477 { common_cmds, ARRAY_SIZE(common_cmds) },
478 { video_cmds, ARRAY_SIZE(video_cmds) },
479};
480
481static const struct drm_i915_cmd_table hsw_vebox_cmds[] = {
482 { common_cmds, ARRAY_SIZE(common_cmds) },
483 { vecs_cmds, ARRAY_SIZE(vecs_cmds) },
484};
485
486static const struct drm_i915_cmd_table gen7_blt_cmds[] = {
487 { common_cmds, ARRAY_SIZE(common_cmds) },
488 { blt_cmds, ARRAY_SIZE(blt_cmds) },
489};
490
Brad Volkin9c640d12014-02-18 10:15:48 -0800491static const struct drm_i915_cmd_table hsw_blt_ring_cmds[] = {
492 { common_cmds, ARRAY_SIZE(common_cmds) },
493 { blt_cmds, ARRAY_SIZE(blt_cmds) },
494 { hsw_blt_cmds, ARRAY_SIZE(hsw_blt_cmds) },
495};
496
Brad Volkin5947de92014-02-18 10:15:50 -0800497/*
498 * Register whitelists, sorted by increasing register offset.
Francisco Jerez4e86f722015-05-29 16:44:14 +0300499 */
500
501/*
502 * An individual whitelist entry granting access to register addr. If
503 * mask is non-zero the argument of immediate register writes will be
504 * AND-ed with mask, and the command will be rejected if the result
505 * doesn't match value.
506 *
507 * Registers with non-zero mask are only allowed to be written using
508 * LRI.
509 */
510struct drm_i915_reg_descriptor {
Ville Syrjäläf0f59a02015-11-18 15:33:26 +0200511 i915_reg_t addr;
Francisco Jerez4e86f722015-05-29 16:44:14 +0300512 u32 mask;
513 u32 value;
514};
515
516/* Convenience macro for adding 32-bit registers. */
Ville Syrjäläe597ef42015-11-06 21:44:40 +0200517#define REG32(_reg, ...) \
518 { .addr = (_reg), __VA_ARGS__ }
Francisco Jerez4e86f722015-05-29 16:44:14 +0300519
520/*
521 * Convenience macro for adding 64-bit registers.
Brad Volkin5947de92014-02-18 10:15:50 -0800522 *
523 * Some registers that userspace accesses are 64 bits. The register
524 * access commands only allow 32-bit accesses. Hence, we have to include
525 * entries for both halves of the 64-bit registers.
526 */
Ville Syrjäläe597ef42015-11-06 21:44:40 +0200527#define REG64(_reg) \
528 { .addr = _reg }, \
529 { .addr = _reg ## _UDW }
530
531#define REG64_IDX(_reg, idx) \
532 { .addr = _reg(idx) }, \
533 { .addr = _reg ## _UDW(idx) }
Brad Volkin5947de92014-02-18 10:15:50 -0800534
Francisco Jerez4e86f722015-05-29 16:44:14 +0300535static const struct drm_i915_reg_descriptor gen7_render_regs[] = {
Jordan Justenc61200c2014-12-11 13:28:09 -0800536 REG64(GPGPU_THREADS_DISPATCHED),
Brad Volkin5947de92014-02-18 10:15:50 -0800537 REG64(HS_INVOCATION_COUNT),
538 REG64(DS_INVOCATION_COUNT),
539 REG64(IA_VERTICES_COUNT),
540 REG64(IA_PRIMITIVES_COUNT),
541 REG64(VS_INVOCATION_COUNT),
542 REG64(GS_INVOCATION_COUNT),
543 REG64(GS_PRIMITIVES_COUNT),
544 REG64(CL_INVOCATION_COUNT),
545 REG64(CL_PRIMITIVES_COUNT),
546 REG64(PS_INVOCATION_COUNT),
547 REG64(PS_DEPTH_COUNT),
Jordan Justena6573e12016-03-06 23:30:26 -0800548 REG64_IDX(RING_TIMESTAMP, RENDER_RING_BASE),
Neil Robertsf1f55cc2014-11-07 19:00:26 +0000549 REG64(MI_PREDICATE_SRC0),
550 REG64(MI_PREDICATE_SRC1),
Francisco Jerez4e86f722015-05-29 16:44:14 +0300551 REG32(GEN7_3DPRIM_END_OFFSET),
552 REG32(GEN7_3DPRIM_START_VERTEX),
553 REG32(GEN7_3DPRIM_VERTEX_COUNT),
554 REG32(GEN7_3DPRIM_INSTANCE_COUNT),
555 REG32(GEN7_3DPRIM_START_INSTANCE),
556 REG32(GEN7_3DPRIM_BASE_VERTEX),
Jordan Justen7b9748c2015-10-01 23:09:58 -0700557 REG32(GEN7_GPGPU_DISPATCHDIMX),
558 REG32(GEN7_GPGPU_DISPATCHDIMY),
559 REG32(GEN7_GPGPU_DISPATCHDIMZ),
Chris Wilson068715b2016-08-18 17:17:11 +0100560 REG64_IDX(RING_TIMESTAMP, BSD_RING_BASE),
Ville Syrjäläe597ef42015-11-06 21:44:40 +0200561 REG64_IDX(GEN7_SO_NUM_PRIMS_WRITTEN, 0),
562 REG64_IDX(GEN7_SO_NUM_PRIMS_WRITTEN, 1),
563 REG64_IDX(GEN7_SO_NUM_PRIMS_WRITTEN, 2),
564 REG64_IDX(GEN7_SO_NUM_PRIMS_WRITTEN, 3),
565 REG64_IDX(GEN7_SO_PRIM_STORAGE_NEEDED, 0),
566 REG64_IDX(GEN7_SO_PRIM_STORAGE_NEEDED, 1),
567 REG64_IDX(GEN7_SO_PRIM_STORAGE_NEEDED, 2),
568 REG64_IDX(GEN7_SO_PRIM_STORAGE_NEEDED, 3),
Francisco Jerez4e86f722015-05-29 16:44:14 +0300569 REG32(GEN7_SO_WRITE_OFFSET(0)),
570 REG32(GEN7_SO_WRITE_OFFSET(1)),
571 REG32(GEN7_SO_WRITE_OFFSET(2)),
572 REG32(GEN7_SO_WRITE_OFFSET(3)),
573 REG32(GEN7_L3SQCREG1),
574 REG32(GEN7_L3CNTLREG2),
575 REG32(GEN7_L3CNTLREG3),
Chris Wilson068715b2016-08-18 17:17:11 +0100576 REG64_IDX(RING_TIMESTAMP, BLT_RING_BASE),
Jordan Justen99c5aec2016-03-06 23:30:28 -0800577};
578
579static const struct drm_i915_reg_descriptor hsw_render_regs[] = {
Jordan Justen1b850662016-03-06 23:30:29 -0800580 REG64_IDX(HSW_CS_GPR, 0),
581 REG64_IDX(HSW_CS_GPR, 1),
582 REG64_IDX(HSW_CS_GPR, 2),
583 REG64_IDX(HSW_CS_GPR, 3),
584 REG64_IDX(HSW_CS_GPR, 4),
585 REG64_IDX(HSW_CS_GPR, 5),
586 REG64_IDX(HSW_CS_GPR, 6),
587 REG64_IDX(HSW_CS_GPR, 7),
588 REG64_IDX(HSW_CS_GPR, 8),
589 REG64_IDX(HSW_CS_GPR, 9),
590 REG64_IDX(HSW_CS_GPR, 10),
591 REG64_IDX(HSW_CS_GPR, 11),
592 REG64_IDX(HSW_CS_GPR, 12),
593 REG64_IDX(HSW_CS_GPR, 13),
594 REG64_IDX(HSW_CS_GPR, 14),
595 REG64_IDX(HSW_CS_GPR, 15),
Francisco Jerezd351f6d2015-05-29 16:44:15 +0300596 REG32(HSW_SCRATCH1,
597 .mask = ~HSW_SCRATCH1_L3_DATA_ATOMICS_DISABLE,
598 .value = 0),
599 REG32(HSW_ROW_CHICKEN3,
600 .mask = ~(HSW_ROW_CHICKEN3_L3_GLOBAL_ATOMICS_DISABLE << 16 |
601 HSW_ROW_CHICKEN3_L3_GLOBAL_ATOMICS_DISABLE),
602 .value = 0),
Brad Volkin5947de92014-02-18 10:15:50 -0800603};
604
Francisco Jerez4e86f722015-05-29 16:44:14 +0300605static const struct drm_i915_reg_descriptor gen7_blt_regs[] = {
Chris Wilson068715b2016-08-18 17:17:11 +0100606 REG64_IDX(RING_TIMESTAMP, RENDER_RING_BASE),
607 REG64_IDX(RING_TIMESTAMP, BSD_RING_BASE),
Francisco Jerez4e86f722015-05-29 16:44:14 +0300608 REG32(BCS_SWCTRL),
Chris Wilson068715b2016-08-18 17:17:11 +0100609 REG64_IDX(RING_TIMESTAMP, BLT_RING_BASE),
Brad Volkin5947de92014-02-18 10:15:50 -0800610};
611
Francisco Jerez4e86f722015-05-29 16:44:14 +0300612static const struct drm_i915_reg_descriptor ivb_master_regs[] = {
613 REG32(FORCEWAKE_MT),
614 REG32(DERRMR),
615 REG32(GEN7_PIPE_DE_LOAD_SL(PIPE_A)),
616 REG32(GEN7_PIPE_DE_LOAD_SL(PIPE_B)),
617 REG32(GEN7_PIPE_DE_LOAD_SL(PIPE_C)),
Brad Volkin220375a2014-02-18 10:15:51 -0800618};
619
Francisco Jerez4e86f722015-05-29 16:44:14 +0300620static const struct drm_i915_reg_descriptor hsw_master_regs[] = {
621 REG32(FORCEWAKE_MT),
622 REG32(DERRMR),
Brad Volkin220375a2014-02-18 10:15:51 -0800623};
624
Brad Volkin5947de92014-02-18 10:15:50 -0800625#undef REG64
Francisco Jerez4e86f722015-05-29 16:44:14 +0300626#undef REG32
Brad Volkin5947de92014-02-18 10:15:50 -0800627
Jordan Justen361b0272016-03-06 23:30:27 -0800628struct drm_i915_reg_table {
629 const struct drm_i915_reg_descriptor *regs;
630 int num_regs;
631 bool master;
632};
633
634static const struct drm_i915_reg_table ivb_render_reg_tables[] = {
635 { gen7_render_regs, ARRAY_SIZE(gen7_render_regs), false },
636 { ivb_master_regs, ARRAY_SIZE(ivb_master_regs), true },
637};
638
639static const struct drm_i915_reg_table ivb_blt_reg_tables[] = {
640 { gen7_blt_regs, ARRAY_SIZE(gen7_blt_regs), false },
641 { ivb_master_regs, ARRAY_SIZE(ivb_master_regs), true },
642};
643
644static const struct drm_i915_reg_table hsw_render_reg_tables[] = {
645 { gen7_render_regs, ARRAY_SIZE(gen7_render_regs), false },
Jordan Justen99c5aec2016-03-06 23:30:28 -0800646 { hsw_render_regs, ARRAY_SIZE(hsw_render_regs), false },
Jordan Justen361b0272016-03-06 23:30:27 -0800647 { hsw_master_regs, ARRAY_SIZE(hsw_master_regs), true },
648};
649
650static const struct drm_i915_reg_table hsw_blt_reg_tables[] = {
651 { gen7_blt_regs, ARRAY_SIZE(gen7_blt_regs), false },
652 { hsw_master_regs, ARRAY_SIZE(hsw_master_regs), true },
653};
654
Brad Volkin351e3db2014-02-18 10:15:46 -0800655static u32 gen7_render_get_cmd_length_mask(u32 cmd_header)
656{
Matthew Aulde3f51ec2016-11-14 22:39:34 +0000657 u32 client = cmd_header >> INSTR_CLIENT_SHIFT;
Brad Volkin351e3db2014-02-18 10:15:46 -0800658 u32 subclient =
659 (cmd_header & INSTR_SUBCLIENT_MASK) >> INSTR_SUBCLIENT_SHIFT;
660
661 if (client == INSTR_MI_CLIENT)
662 return 0x3F;
663 else if (client == INSTR_RC_CLIENT) {
664 if (subclient == INSTR_MEDIA_SUBCLIENT)
665 return 0xFFFF;
666 else
667 return 0xFF;
668 }
669
670 DRM_DEBUG_DRIVER("CMD: Abnormal rcs cmd length! 0x%08X\n", cmd_header);
671 return 0;
672}
673
674static u32 gen7_bsd_get_cmd_length_mask(u32 cmd_header)
675{
Matthew Aulde3f51ec2016-11-14 22:39:34 +0000676 u32 client = cmd_header >> INSTR_CLIENT_SHIFT;
Brad Volkin351e3db2014-02-18 10:15:46 -0800677 u32 subclient =
678 (cmd_header & INSTR_SUBCLIENT_MASK) >> INSTR_SUBCLIENT_SHIFT;
Michael H. Nguyen86ef6302014-11-21 09:35:36 -0800679 u32 op = (cmd_header & INSTR_26_TO_24_MASK) >> INSTR_26_TO_24_SHIFT;
Brad Volkin351e3db2014-02-18 10:15:46 -0800680
681 if (client == INSTR_MI_CLIENT)
682 return 0x3F;
683 else if (client == INSTR_RC_CLIENT) {
Michael H. Nguyen86ef6302014-11-21 09:35:36 -0800684 if (subclient == INSTR_MEDIA_SUBCLIENT) {
685 if (op == 6)
686 return 0xFFFF;
687 else
688 return 0xFFF;
689 } else
Brad Volkin351e3db2014-02-18 10:15:46 -0800690 return 0xFF;
691 }
692
693 DRM_DEBUG_DRIVER("CMD: Abnormal bsd cmd length! 0x%08X\n", cmd_header);
694 return 0;
695}
696
697static u32 gen7_blt_get_cmd_length_mask(u32 cmd_header)
698{
Matthew Aulde3f51ec2016-11-14 22:39:34 +0000699 u32 client = cmd_header >> INSTR_CLIENT_SHIFT;
Brad Volkin351e3db2014-02-18 10:15:46 -0800700
701 if (client == INSTR_MI_CLIENT)
702 return 0x3F;
703 else if (client == INSTR_BC_CLIENT)
704 return 0xFF;
705
706 DRM_DEBUG_DRIVER("CMD: Abnormal blt cmd length! 0x%08X\n", cmd_header);
707 return 0;
708}
709
Chris Wilson33a051a2016-07-27 09:07:26 +0100710static bool validate_cmds_sorted(const struct intel_engine_cs *engine,
Brad Volkin44e895a2014-05-10 14:10:43 -0700711 const struct drm_i915_cmd_table *cmd_tables,
712 int cmd_table_count)
Brad Volkin351e3db2014-02-18 10:15:46 -0800713{
714 int i;
Brad Volkin300233e2014-03-27 11:43:38 -0700715 bool ret = true;
Brad Volkin351e3db2014-02-18 10:15:46 -0800716
Brad Volkin44e895a2014-05-10 14:10:43 -0700717 if (!cmd_tables || cmd_table_count == 0)
Brad Volkin300233e2014-03-27 11:43:38 -0700718 return true;
Brad Volkin351e3db2014-02-18 10:15:46 -0800719
Brad Volkin44e895a2014-05-10 14:10:43 -0700720 for (i = 0; i < cmd_table_count; i++) {
721 const struct drm_i915_cmd_table *table = &cmd_tables[i];
Brad Volkin351e3db2014-02-18 10:15:46 -0800722 u32 previous = 0;
723 int j;
724
725 for (j = 0; j < table->count; j++) {
726 const struct drm_i915_cmd_descriptor *desc =
Hanno Böck84535802015-07-29 10:31:04 +0200727 &table->table[j];
Brad Volkin351e3db2014-02-18 10:15:46 -0800728 u32 curr = desc->cmd.value & desc->cmd.mask;
729
Brad Volkin300233e2014-03-27 11:43:38 -0700730 if (curr < previous) {
Chris Wilson33a051a2016-07-27 09:07:26 +0100731 DRM_ERROR("CMD: %s [%d] command table not sorted: "
732 "table=%d entry=%d cmd=0x%08X prev=0x%08X\n",
733 engine->name, engine->id,
734 i, j, curr, previous);
Brad Volkin300233e2014-03-27 11:43:38 -0700735 ret = false;
736 }
Brad Volkin351e3db2014-02-18 10:15:46 -0800737
738 previous = curr;
739 }
740 }
Brad Volkin300233e2014-03-27 11:43:38 -0700741
742 return ret;
Brad Volkin351e3db2014-02-18 10:15:46 -0800743}
744
Chris Wilson33a051a2016-07-27 09:07:26 +0100745static bool check_sorted(const struct intel_engine_cs *engine,
Francisco Jerez4e86f722015-05-29 16:44:14 +0300746 const struct drm_i915_reg_descriptor *reg_table,
747 int reg_count)
Brad Volkin351e3db2014-02-18 10:15:46 -0800748{
749 int i;
750 u32 previous = 0;
Brad Volkin300233e2014-03-27 11:43:38 -0700751 bool ret = true;
Brad Volkin351e3db2014-02-18 10:15:46 -0800752
753 for (i = 0; i < reg_count; i++) {
Ville Syrjäläf0f59a02015-11-18 15:33:26 +0200754 u32 curr = i915_mmio_reg_offset(reg_table[i].addr);
Brad Volkin351e3db2014-02-18 10:15:46 -0800755
Brad Volkin300233e2014-03-27 11:43:38 -0700756 if (curr < previous) {
Chris Wilson33a051a2016-07-27 09:07:26 +0100757 DRM_ERROR("CMD: %s [%d] register table not sorted: "
758 "entry=%d reg=0x%08X prev=0x%08X\n",
759 engine->name, engine->id,
760 i, curr, previous);
Brad Volkin300233e2014-03-27 11:43:38 -0700761 ret = false;
762 }
Brad Volkin351e3db2014-02-18 10:15:46 -0800763
764 previous = curr;
765 }
Brad Volkin300233e2014-03-27 11:43:38 -0700766
767 return ret;
Brad Volkin351e3db2014-02-18 10:15:46 -0800768}
769
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000770static bool validate_regs_sorted(struct intel_engine_cs *engine)
Brad Volkin351e3db2014-02-18 10:15:46 -0800771{
Jordan Justen361b0272016-03-06 23:30:27 -0800772 int i;
773 const struct drm_i915_reg_table *table;
774
775 for (i = 0; i < engine->reg_table_count; i++) {
776 table = &engine->reg_tables[i];
Chris Wilson33a051a2016-07-27 09:07:26 +0100777 if (!check_sorted(engine, table->regs, table->num_regs))
Jordan Justen361b0272016-03-06 23:30:27 -0800778 return false;
779 }
780
781 return true;
Brad Volkin351e3db2014-02-18 10:15:46 -0800782}
783
Brad Volkin44e895a2014-05-10 14:10:43 -0700784struct cmd_node {
785 const struct drm_i915_cmd_descriptor *desc;
786 struct hlist_node node;
787};
788
789/*
790 * Different command ranges have different numbers of bits for the opcode. For
791 * example, MI commands use bits 31:23 while 3D commands use bits 31:16. The
792 * problem is that, for example, MI commands use bits 22:16 for other fields
793 * such as GGTT vs PPGTT bits. If we include those bits in the mask then when
794 * we mask a command from a batch it could hash to the wrong bucket due to
795 * non-opcode bits being set. But if we don't include those bits, some 3D
796 * commands may hash to the same bucket due to not including opcode bits that
797 * make the command unique. For now, we will risk hashing to the same bucket.
Brad Volkin44e895a2014-05-10 14:10:43 -0700798 */
Chris Wilsond6a4ead2016-08-18 17:17:14 +0100799static inline u32 cmd_header_key(u32 x)
800{
801 u32 shift;
802
803 switch (x >> INSTR_CLIENT_SHIFT) {
804 default:
805 case INSTR_MI_CLIENT:
806 shift = STD_MI_OPCODE_SHIFT;
807 break;
808 case INSTR_RC_CLIENT:
809 shift = STD_3D_OPCODE_SHIFT;
810 break;
811 case INSTR_BC_CLIENT:
812 shift = STD_2D_OPCODE_SHIFT;
813 break;
814 }
815
816 return x >> shift;
817}
Brad Volkin44e895a2014-05-10 14:10:43 -0700818
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000819static int init_hash_table(struct intel_engine_cs *engine,
Brad Volkin44e895a2014-05-10 14:10:43 -0700820 const struct drm_i915_cmd_table *cmd_tables,
821 int cmd_table_count)
822{
823 int i, j;
824
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000825 hash_init(engine->cmd_hash);
Brad Volkin44e895a2014-05-10 14:10:43 -0700826
827 for (i = 0; i < cmd_table_count; i++) {
828 const struct drm_i915_cmd_table *table = &cmd_tables[i];
829
830 for (j = 0; j < table->count; j++) {
831 const struct drm_i915_cmd_descriptor *desc =
832 &table->table[j];
833 struct cmd_node *desc_node =
834 kmalloc(sizeof(*desc_node), GFP_KERNEL);
835
836 if (!desc_node)
837 return -ENOMEM;
838
839 desc_node->desc = desc;
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000840 hash_add(engine->cmd_hash, &desc_node->node,
Chris Wilsond6a4ead2016-08-18 17:17:14 +0100841 cmd_header_key(desc->cmd.value));
Brad Volkin44e895a2014-05-10 14:10:43 -0700842 }
843 }
844
845 return 0;
846}
847
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000848static void fini_hash_table(struct intel_engine_cs *engine)
Brad Volkin44e895a2014-05-10 14:10:43 -0700849{
850 struct hlist_node *tmp;
851 struct cmd_node *desc_node;
852 int i;
853
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000854 hash_for_each_safe(engine->cmd_hash, i, tmp, desc_node, node) {
Brad Volkin44e895a2014-05-10 14:10:43 -0700855 hash_del(&desc_node->node);
856 kfree(desc_node);
857 }
858}
859
Brad Volkin351e3db2014-02-18 10:15:46 -0800860/**
Chris Wilson33a051a2016-07-27 09:07:26 +0100861 * intel_engine_init_cmd_parser() - set cmd parser related fields for an engine
Tvrtko Ursulin14bb2c12016-06-03 14:02:17 +0100862 * @engine: the engine to initialize
Brad Volkin351e3db2014-02-18 10:15:46 -0800863 *
864 * Optionally initializes fields related to batch buffer command parsing in the
Oscar Mateoa4872ba2014-05-22 14:13:33 +0100865 * struct intel_engine_cs based on whether the platform requires software
Brad Volkin351e3db2014-02-18 10:15:46 -0800866 * command parsing.
867 */
Chris Wilson7756e452016-08-18 17:17:10 +0100868void intel_engine_init_cmd_parser(struct intel_engine_cs *engine)
Brad Volkin351e3db2014-02-18 10:15:46 -0800869{
Brad Volkin44e895a2014-05-10 14:10:43 -0700870 const struct drm_i915_cmd_table *cmd_tables;
871 int cmd_table_count;
872 int ret;
873
Chris Wilsonc0336662016-05-06 15:40:21 +0100874 if (!IS_GEN7(engine->i915))
Chris Wilson7756e452016-08-18 17:17:10 +0100875 return;
Brad Volkin351e3db2014-02-18 10:15:46 -0800876
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000877 switch (engine->id) {
Brad Volkin351e3db2014-02-18 10:15:46 -0800878 case RCS:
Chris Wilsonc0336662016-05-06 15:40:21 +0100879 if (IS_HASWELL(engine->i915)) {
Brad Volkin44e895a2014-05-10 14:10:43 -0700880 cmd_tables = hsw_render_ring_cmds;
881 cmd_table_count =
Brad Volkin3a6fa982014-02-18 10:15:47 -0800882 ARRAY_SIZE(hsw_render_ring_cmds);
883 } else {
Brad Volkin44e895a2014-05-10 14:10:43 -0700884 cmd_tables = gen7_render_cmds;
885 cmd_table_count = ARRAY_SIZE(gen7_render_cmds);
Brad Volkin3a6fa982014-02-18 10:15:47 -0800886 }
887
Chris Wilsonc0336662016-05-06 15:40:21 +0100888 if (IS_HASWELL(engine->i915)) {
Jordan Justen361b0272016-03-06 23:30:27 -0800889 engine->reg_tables = hsw_render_reg_tables;
890 engine->reg_table_count = ARRAY_SIZE(hsw_render_reg_tables);
Brad Volkin220375a2014-02-18 10:15:51 -0800891 } else {
Jordan Justen361b0272016-03-06 23:30:27 -0800892 engine->reg_tables = ivb_render_reg_tables;
893 engine->reg_table_count = ARRAY_SIZE(ivb_render_reg_tables);
Brad Volkin220375a2014-02-18 10:15:51 -0800894 }
895
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000896 engine->get_cmd_length_mask = gen7_render_get_cmd_length_mask;
Brad Volkin351e3db2014-02-18 10:15:46 -0800897 break;
898 case VCS:
Brad Volkin44e895a2014-05-10 14:10:43 -0700899 cmd_tables = gen7_video_cmds;
900 cmd_table_count = ARRAY_SIZE(gen7_video_cmds);
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000901 engine->get_cmd_length_mask = gen7_bsd_get_cmd_length_mask;
Brad Volkin351e3db2014-02-18 10:15:46 -0800902 break;
903 case BCS:
Chris Wilsonc0336662016-05-06 15:40:21 +0100904 if (IS_HASWELL(engine->i915)) {
Brad Volkin44e895a2014-05-10 14:10:43 -0700905 cmd_tables = hsw_blt_ring_cmds;
906 cmd_table_count = ARRAY_SIZE(hsw_blt_ring_cmds);
Brad Volkin9c640d12014-02-18 10:15:48 -0800907 } else {
Brad Volkin44e895a2014-05-10 14:10:43 -0700908 cmd_tables = gen7_blt_cmds;
909 cmd_table_count = ARRAY_SIZE(gen7_blt_cmds);
Brad Volkin9c640d12014-02-18 10:15:48 -0800910 }
911
Chris Wilsonc0336662016-05-06 15:40:21 +0100912 if (IS_HASWELL(engine->i915)) {
Jordan Justen361b0272016-03-06 23:30:27 -0800913 engine->reg_tables = hsw_blt_reg_tables;
914 engine->reg_table_count = ARRAY_SIZE(hsw_blt_reg_tables);
Brad Volkin220375a2014-02-18 10:15:51 -0800915 } else {
Jordan Justen361b0272016-03-06 23:30:27 -0800916 engine->reg_tables = ivb_blt_reg_tables;
917 engine->reg_table_count = ARRAY_SIZE(ivb_blt_reg_tables);
Brad Volkin220375a2014-02-18 10:15:51 -0800918 }
919
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000920 engine->get_cmd_length_mask = gen7_blt_get_cmd_length_mask;
Brad Volkin351e3db2014-02-18 10:15:46 -0800921 break;
922 case VECS:
Brad Volkin44e895a2014-05-10 14:10:43 -0700923 cmd_tables = hsw_vebox_cmds;
924 cmd_table_count = ARRAY_SIZE(hsw_vebox_cmds);
Brad Volkin351e3db2014-02-18 10:15:46 -0800925 /* VECS can use the same length_mask function as VCS */
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000926 engine->get_cmd_length_mask = gen7_bsd_get_cmd_length_mask;
Brad Volkin351e3db2014-02-18 10:15:46 -0800927 break;
928 default:
Chris Wilson33a051a2016-07-27 09:07:26 +0100929 MISSING_CASE(engine->id);
Chris Wilson7756e452016-08-18 17:17:10 +0100930 return;
Brad Volkin351e3db2014-02-18 10:15:46 -0800931 }
932
Chris Wilson7756e452016-08-18 17:17:10 +0100933 if (!validate_cmds_sorted(engine, cmd_tables, cmd_table_count)) {
934 DRM_ERROR("%s: command descriptions are not sorted\n",
935 engine->name);
936 return;
937 }
938 if (!validate_regs_sorted(engine)) {
939 DRM_ERROR("%s: registers are not sorted\n", engine->name);
940 return;
941 }
Daniel Vetterbfc882b2014-11-20 00:33:08 +0100942
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000943 ret = init_hash_table(engine, cmd_tables, cmd_table_count);
Daniel Vetterbfc882b2014-11-20 00:33:08 +0100944 if (ret) {
Chris Wilson7756e452016-08-18 17:17:10 +0100945 DRM_ERROR("%s: initialised failed!\n", engine->name);
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000946 fini_hash_table(engine);
Chris Wilson7756e452016-08-18 17:17:10 +0100947 return;
Brad Volkin44e895a2014-05-10 14:10:43 -0700948 }
949
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000950 engine->needs_cmd_parser = true;
Brad Volkin44e895a2014-05-10 14:10:43 -0700951}
952
953/**
Chris Wilson33a051a2016-07-27 09:07:26 +0100954 * intel_engine_cleanup_cmd_parser() - clean up cmd parser related fields
Tvrtko Ursulin14bb2c12016-06-03 14:02:17 +0100955 * @engine: the engine to clean up
Brad Volkin44e895a2014-05-10 14:10:43 -0700956 *
957 * Releases any resources related to command parsing that may have been
Chris Wilson33a051a2016-07-27 09:07:26 +0100958 * initialized for the specified engine.
Brad Volkin44e895a2014-05-10 14:10:43 -0700959 */
Chris Wilson33a051a2016-07-27 09:07:26 +0100960void intel_engine_cleanup_cmd_parser(struct intel_engine_cs *engine)
Brad Volkin44e895a2014-05-10 14:10:43 -0700961{
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000962 if (!engine->needs_cmd_parser)
Brad Volkin44e895a2014-05-10 14:10:43 -0700963 return;
964
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000965 fini_hash_table(engine);
Brad Volkin351e3db2014-02-18 10:15:46 -0800966}
967
968static const struct drm_i915_cmd_descriptor*
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000969find_cmd_in_table(struct intel_engine_cs *engine,
Brad Volkin351e3db2014-02-18 10:15:46 -0800970 u32 cmd_header)
971{
Brad Volkin44e895a2014-05-10 14:10:43 -0700972 struct cmd_node *desc_node;
Brad Volkin351e3db2014-02-18 10:15:46 -0800973
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000974 hash_for_each_possible(engine->cmd_hash, desc_node, node,
Chris Wilsond6a4ead2016-08-18 17:17:14 +0100975 cmd_header_key(cmd_header)) {
Brad Volkin44e895a2014-05-10 14:10:43 -0700976 const struct drm_i915_cmd_descriptor *desc = desc_node->desc;
Chris Wilsond6a4ead2016-08-18 17:17:14 +0100977 if (((cmd_header ^ desc->cmd.value) & desc->cmd.mask) == 0)
Brad Volkin351e3db2014-02-18 10:15:46 -0800978 return desc;
979 }
980
981 return NULL;
982}
983
984/*
985 * Returns a pointer to a descriptor for the command specified by cmd_header.
986 *
987 * The caller must supply space for a default descriptor via the default_desc
Chris Wilson33a051a2016-07-27 09:07:26 +0100988 * parameter. If no descriptor for the specified command exists in the engine's
Brad Volkin351e3db2014-02-18 10:15:46 -0800989 * command parser tables, this function fills in default_desc based on the
Chris Wilson33a051a2016-07-27 09:07:26 +0100990 * engine's default length encoding and returns default_desc.
Brad Volkin351e3db2014-02-18 10:15:46 -0800991 */
992static const struct drm_i915_cmd_descriptor*
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +0000993find_cmd(struct intel_engine_cs *engine,
Brad Volkin351e3db2014-02-18 10:15:46 -0800994 u32 cmd_header,
Chris Wilsonefdfd912016-08-18 17:17:15 +0100995 const struct drm_i915_cmd_descriptor *desc,
Brad Volkin351e3db2014-02-18 10:15:46 -0800996 struct drm_i915_cmd_descriptor *default_desc)
997{
998 u32 mask;
Brad Volkin351e3db2014-02-18 10:15:46 -0800999
Chris Wilsonefdfd912016-08-18 17:17:15 +01001000 if (((cmd_header ^ desc->cmd.value) & desc->cmd.mask) == 0)
1001 return desc;
1002
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +00001003 desc = find_cmd_in_table(engine, cmd_header);
Brad Volkin44e895a2014-05-10 14:10:43 -07001004 if (desc)
1005 return desc;
Brad Volkin351e3db2014-02-18 10:15:46 -08001006
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +00001007 mask = engine->get_cmd_length_mask(cmd_header);
Brad Volkin351e3db2014-02-18 10:15:46 -08001008 if (!mask)
1009 return NULL;
1010
Chris Wilsonefdfd912016-08-18 17:17:15 +01001011 default_desc->cmd.value = cmd_header;
1012 default_desc->cmd.mask = ~0u << MIN_OPCODE_SHIFT;
Brad Volkin351e3db2014-02-18 10:15:46 -08001013 default_desc->length.mask = mask;
Chris Wilsonefdfd912016-08-18 17:17:15 +01001014 default_desc->flags = CMD_DESC_SKIP;
Brad Volkin351e3db2014-02-18 10:15:46 -08001015 return default_desc;
1016}
1017
Francisco Jerez4e86f722015-05-29 16:44:14 +03001018static const struct drm_i915_reg_descriptor *
Chris Wilson76ff4802016-08-18 17:17:17 +01001019__find_reg(const struct drm_i915_reg_descriptor *table, int count, u32 addr)
Brad Volkin351e3db2014-02-18 10:15:46 -08001020{
Chris Wilson76ff4802016-08-18 17:17:17 +01001021 int start = 0, end = count;
1022 while (start < end) {
1023 int mid = start + (end - start) / 2;
1024 int ret = addr - i915_mmio_reg_offset(table[mid].addr);
1025 if (ret < 0)
1026 end = mid;
1027 else if (ret > 0)
1028 start = mid + 1;
1029 else
1030 return &table[mid];
Jordan Justen361b0272016-03-06 23:30:27 -08001031 }
Jordan Justen361b0272016-03-06 23:30:27 -08001032 return NULL;
1033}
1034
1035static const struct drm_i915_reg_descriptor *
Chris Wilson76ff4802016-08-18 17:17:17 +01001036find_reg(const struct intel_engine_cs *engine, bool is_master, u32 addr)
Jordan Justen361b0272016-03-06 23:30:27 -08001037{
Chris Wilson76ff4802016-08-18 17:17:17 +01001038 const struct drm_i915_reg_table *table = engine->reg_tables;
1039 int count = engine->reg_table_count;
Jordan Justen361b0272016-03-06 23:30:27 -08001040
Chris Wilson76ff4802016-08-18 17:17:17 +01001041 do {
Jordan Justen361b0272016-03-06 23:30:27 -08001042 if (!table->master || is_master) {
Chris Wilson76ff4802016-08-18 17:17:17 +01001043 const struct drm_i915_reg_descriptor *reg;
1044
1045 reg = __find_reg(table->regs, table->num_regs, addr);
Jordan Justen361b0272016-03-06 23:30:27 -08001046 if (reg != NULL)
1047 return reg;
Brad Volkin351e3db2014-02-18 10:15:46 -08001048 }
Chris Wilson76ff4802016-08-18 17:17:17 +01001049 } while (table++, --count);
Brad Volkin351e3db2014-02-18 10:15:46 -08001050
Francisco Jerez4e86f722015-05-29 16:44:14 +03001051 return NULL;
Brad Volkin351e3db2014-02-18 10:15:46 -08001052}
1053
Chris Wilson0b537272016-08-18 17:17:12 +01001054/* Returns a vmap'd pointer to dst_obj, which the caller must unmap */
1055static u32 *copy_batch(struct drm_i915_gem_object *dst_obj,
Brad Volkinb9ffd802014-12-11 12:13:10 -08001056 struct drm_i915_gem_object *src_obj,
1057 u32 batch_start_offset,
Chris Wilson0b537272016-08-18 17:17:12 +01001058 u32 batch_len,
1059 bool *needs_clflush_after)
Brad Volkin78a42372014-12-11 12:13:09 -08001060{
Chris Wilson0b537272016-08-18 17:17:12 +01001061 unsigned int src_needs_clflush;
1062 unsigned int dst_needs_clflush;
Chris Wilson52a42ce2016-08-18 17:17:18 +01001063 void *dst, *src;
Chris Wilson17cabf52015-01-14 11:20:57 +00001064 int ret;
Brad Volkinb9ffd802014-12-11 12:13:10 -08001065
Chris Wilson0b537272016-08-18 17:17:12 +01001066 ret = i915_gem_obj_prepare_shmem_read(src_obj, &src_needs_clflush);
1067 if (ret)
Brad Volkin78a42372014-12-11 12:13:09 -08001068 return ERR_PTR(ret);
Brad Volkin78a42372014-12-11 12:13:09 -08001069
Chris Wilson0b537272016-08-18 17:17:12 +01001070 ret = i915_gem_obj_prepare_shmem_write(dst_obj, &dst_needs_clflush);
1071 if (ret) {
1072 dst = ERR_PTR(ret);
Brad Volkin78a42372014-12-11 12:13:09 -08001073 goto unpin_src;
1074 }
1075
Chris Wilson0b537272016-08-18 17:17:12 +01001076 dst = i915_gem_object_pin_map(dst_obj, I915_MAP_WB);
1077 if (IS_ERR(dst))
Chris Wilsoned130332016-08-18 17:17:13 +01001078 goto unpin_dst;
Brad Volkin78a42372014-12-11 12:13:09 -08001079
Chris Wilson52a42ce2016-08-18 17:17:18 +01001080 src = ERR_PTR(-ENODEV);
1081 if (src_needs_clflush &&
Chris Wilsonc4d3ae62017-01-06 15:20:09 +00001082 i915_can_memcpy_from_wc(NULL, batch_start_offset, 0)) {
Chris Wilson52a42ce2016-08-18 17:17:18 +01001083 src = i915_gem_object_pin_map(src_obj, I915_MAP_WC);
1084 if (!IS_ERR(src)) {
1085 i915_memcpy_from_wc(dst,
1086 src + batch_start_offset,
1087 ALIGN(batch_len, 16));
1088 i915_gem_object_unpin_map(src_obj);
1089 }
1090 }
1091 if (IS_ERR(src)) {
1092 void *ptr;
1093 int offset, n;
Brad Volkinb9ffd802014-12-11 12:13:10 -08001094
Chris Wilson52a42ce2016-08-18 17:17:18 +01001095 offset = offset_in_page(batch_start_offset);
Chris Wilson0b537272016-08-18 17:17:12 +01001096
Chris Wilson52a42ce2016-08-18 17:17:18 +01001097 /* We can avoid clflushing partial cachelines before the write
1098 * if we only every write full cache-lines. Since we know that
1099 * both the source and destination are in multiples of
1100 * PAGE_SIZE, we can simply round up to the next cacheline.
1101 * We don't care about copying too much here as we only
1102 * validate up to the end of the batch.
1103 */
1104 if (dst_needs_clflush & CLFLUSH_BEFORE)
1105 batch_len = roundup(batch_len,
1106 boot_cpu_data.x86_clflush_size);
Chris Wilsoned130332016-08-18 17:17:13 +01001107
Chris Wilson52a42ce2016-08-18 17:17:18 +01001108 ptr = dst;
1109 for (n = batch_start_offset >> PAGE_SHIFT; batch_len; n++) {
1110 int len = min_t(int, batch_len, PAGE_SIZE - offset);
Chris Wilsoned130332016-08-18 17:17:13 +01001111
Chris Wilson52a42ce2016-08-18 17:17:18 +01001112 src = kmap_atomic(i915_gem_object_get_page(src_obj, n));
1113 if (src_needs_clflush)
1114 drm_clflush_virt_range(src + offset, len);
1115 memcpy(ptr, src + offset, len);
1116 kunmap_atomic(src);
1117
1118 ptr += len;
1119 batch_len -= len;
1120 offset = 0;
1121 }
Chris Wilsoned130332016-08-18 17:17:13 +01001122 }
Brad Volkin78a42372014-12-11 12:13:09 -08001123
Chris Wilson0b537272016-08-18 17:17:12 +01001124 /* dst_obj is returned with vmap pinned */
1125 *needs_clflush_after = dst_needs_clflush & CLFLUSH_AFTER;
1126
Chris Wilson0b537272016-08-18 17:17:12 +01001127unpin_dst:
1128 i915_gem_obj_finish_shmem_access(dst_obj);
Brad Volkin78a42372014-12-11 12:13:09 -08001129unpin_src:
Chris Wilson43394c72016-08-18 17:16:47 +01001130 i915_gem_obj_finish_shmem_access(src_obj);
Chris Wilson0b537272016-08-18 17:17:12 +01001131 return dst;
Brad Volkin78a42372014-12-11 12:13:09 -08001132}
1133
Tvrtko Ursulin0bc40be2016-03-16 11:00:37 +00001134static bool check_cmd(const struct intel_engine_cs *engine,
Brad Volkinb6510002014-03-27 11:43:39 -07001135 const struct drm_i915_cmd_descriptor *desc,
Francisco Jerez6a65c5b2015-05-29 16:44:13 +03001136 const u32 *cmd, u32 length,
Robert Bragg10ff4012016-11-08 12:51:48 +00001137 const bool is_master)
Brad Volkinb6510002014-03-27 11:43:39 -07001138{
Chris Wilsonea884f02016-08-18 17:17:16 +01001139 if (desc->flags & CMD_DESC_SKIP)
1140 return true;
1141
Brad Volkinb6510002014-03-27 11:43:39 -07001142 if (desc->flags & CMD_DESC_REJECT) {
1143 DRM_DEBUG_DRIVER("CMD: Rejected command: 0x%08X\n", *cmd);
1144 return false;
1145 }
1146
1147 if ((desc->flags & CMD_DESC_MASTER) && !is_master) {
1148 DRM_DEBUG_DRIVER("CMD: Rejected master-only command: 0x%08X\n",
1149 *cmd);
1150 return false;
1151 }
1152
1153 if (desc->flags & CMD_DESC_REGISTER) {
Brad Volkin6e66ea12014-03-28 10:21:50 -07001154 /*
Francisco Jerez6a65c5b2015-05-29 16:44:13 +03001155 * Get the distance between individual register offset
1156 * fields if the command can perform more than one
1157 * access at a time.
Brad Volkin6e66ea12014-03-28 10:21:50 -07001158 */
Francisco Jerez6a65c5b2015-05-29 16:44:13 +03001159 const u32 step = desc->reg.step ? desc->reg.step : length;
1160 u32 offset;
1161
1162 for (offset = desc->reg.offset; offset < length;
1163 offset += step) {
1164 const u32 reg_addr = cmd[offset] & desc->reg.mask;
Francisco Jerez4e86f722015-05-29 16:44:14 +03001165 const struct drm_i915_reg_descriptor *reg =
Chris Wilson76ff4802016-08-18 17:17:17 +01001166 find_reg(engine, is_master, reg_addr);
Francisco Jerez4e86f722015-05-29 16:44:14 +03001167
1168 if (!reg) {
Chris Wilson1d39f282017-04-11 13:43:06 +01001169 DRM_DEBUG_DRIVER("CMD: Rejected register 0x%08X in command: 0x%08X (%s)\n",
1170 reg_addr, *cmd, engine->name);
Francisco Jerez4e86f722015-05-29 16:44:14 +03001171 return false;
1172 }
Francisco Jerez6a65c5b2015-05-29 16:44:13 +03001173
1174 /*
Francisco Jerez4e86f722015-05-29 16:44:14 +03001175 * Check the value written to the register against the
1176 * allowed mask/value pair given in the whitelist entry.
1177 */
1178 if (reg->mask) {
Arun Siluveryf1afe242015-08-04 16:22:20 +01001179 if (desc->cmd.value == MI_LOAD_REGISTER_MEM) {
Francisco Jerez4e86f722015-05-29 16:44:14 +03001180 DRM_DEBUG_DRIVER("CMD: Rejected LRM to masked register 0x%08X\n",
1181 reg_addr);
1182 return false;
1183 }
1184
Kenneth Graunke6761d0a2016-05-06 08:50:14 +01001185 if (desc->cmd.value == MI_LOAD_REGISTER_REG) {
1186 DRM_DEBUG_DRIVER("CMD: Rejected LRR to masked register 0x%08X\n",
1187 reg_addr);
1188 return false;
1189 }
1190
Francisco Jerez4e86f722015-05-29 16:44:14 +03001191 if (desc->cmd.value == MI_LOAD_REGISTER_IMM(1) &&
1192 (offset + 2 > length ||
1193 (cmd[offset + 1] & reg->mask) != reg->value)) {
1194 DRM_DEBUG_DRIVER("CMD: Rejected LRI to masked register 0x%08X\n",
1195 reg_addr);
Francisco Jerez6a65c5b2015-05-29 16:44:13 +03001196 return false;
1197 }
Brad Volkinb6510002014-03-27 11:43:39 -07001198 }
1199 }
1200 }
1201
1202 if (desc->flags & CMD_DESC_BITMASK) {
1203 int i;
1204
1205 for (i = 0; i < MAX_CMD_DESC_BITMASKS; i++) {
1206 u32 dword;
1207
1208 if (desc->bits[i].mask == 0)
1209 break;
1210
1211 if (desc->bits[i].condition_mask != 0) {
1212 u32 offset =
1213 desc->bits[i].condition_offset;
1214 u32 condition = cmd[offset] &
1215 desc->bits[i].condition_mask;
1216
1217 if (condition == 0)
1218 continue;
1219 }
1220
1221 dword = cmd[desc->bits[i].offset] &
1222 desc->bits[i].mask;
1223
1224 if (dword != desc->bits[i].expected) {
Chris Wilson1d39f282017-04-11 13:43:06 +01001225 DRM_DEBUG_DRIVER("CMD: Rejected command 0x%08X for bitmask 0x%08X (exp=0x%08X act=0x%08X) (%s)\n",
Brad Volkinb6510002014-03-27 11:43:39 -07001226 *cmd,
1227 desc->bits[i].mask,
1228 desc->bits[i].expected,
Chris Wilson1d39f282017-04-11 13:43:06 +01001229 dword, engine->name);
Brad Volkinb6510002014-03-27 11:43:39 -07001230 return false;
1231 }
1232 }
1233 }
1234
1235 return true;
1236}
1237
Brad Volkin351e3db2014-02-18 10:15:46 -08001238#define LENGTH_BIAS 2
1239
1240/**
1241 * i915_parse_cmds() - parse a submitted batch buffer for privilege violations
Tvrtko Ursulin14bb2c12016-06-03 14:02:17 +01001242 * @engine: the engine on which the batch is to execute
Brad Volkin351e3db2014-02-18 10:15:46 -08001243 * @batch_obj: the batch buffer in question
Brad Volkin78a42372014-12-11 12:13:09 -08001244 * @shadow_batch_obj: copy of the batch buffer in question
Brad Volkin351e3db2014-02-18 10:15:46 -08001245 * @batch_start_offset: byte offset in the batch at which execution starts
Brad Volkinb9ffd802014-12-11 12:13:10 -08001246 * @batch_len: length of the commands in batch_obj
Brad Volkin351e3db2014-02-18 10:15:46 -08001247 * @is_master: is the submitting process the drm master?
1248 *
1249 * Parses the specified batch buffer looking for privilege violations as
1250 * described in the overview.
1251 *
Brad Volkin42c71562014-10-16 12:24:42 -07001252 * Return: non-zero if the parser finds violations or otherwise fails; -EACCES
1253 * if the batch appears legal but should use hardware parsing
Brad Volkin351e3db2014-02-18 10:15:46 -08001254 */
Chris Wilson33a051a2016-07-27 09:07:26 +01001255int intel_engine_cmd_parser(struct intel_engine_cs *engine,
1256 struct drm_i915_gem_object *batch_obj,
1257 struct drm_i915_gem_object *shadow_batch_obj,
1258 u32 batch_start_offset,
1259 u32 batch_len,
1260 bool is_master)
Brad Volkin351e3db2014-02-18 10:15:46 -08001261{
Chris Wilson0b537272016-08-18 17:17:12 +01001262 u32 *cmd, *batch_end;
Chris Wilsonefdfd912016-08-18 17:17:15 +01001263 struct drm_i915_cmd_descriptor default_desc = noop_desc;
1264 const struct drm_i915_cmd_descriptor *desc = &default_desc;
Chris Wilson0b537272016-08-18 17:17:12 +01001265 bool needs_clflush_after = false;
Chris Wilson17cabf52015-01-14 11:20:57 +00001266 int ret = 0;
Brad Volkin71745372014-12-11 12:13:12 -08001267
Chris Wilson0b537272016-08-18 17:17:12 +01001268 cmd = copy_batch(shadow_batch_obj, batch_obj,
1269 batch_start_offset, batch_len,
1270 &needs_clflush_after);
1271 if (IS_ERR(cmd)) {
Brad Volkin78a42372014-12-11 12:13:09 -08001272 DRM_DEBUG_DRIVER("CMD: Failed to copy batch\n");
Chris Wilson0b537272016-08-18 17:17:12 +01001273 return PTR_ERR(cmd);
Brad Volkin351e3db2014-02-18 10:15:46 -08001274 }
1275
Brad Volkin78a42372014-12-11 12:13:09 -08001276 /*
Brad Volkinb9ffd802014-12-11 12:13:10 -08001277 * We use the batch length as size because the shadow object is as
Brad Volkin78a42372014-12-11 12:13:09 -08001278 * large or larger and copy_batch() will write MI_NOPs to the extra
1279 * space. Parsing should be faster in some cases this way.
1280 */
Chris Wilson0b537272016-08-18 17:17:12 +01001281 batch_end = cmd + (batch_len / sizeof(*batch_end));
Chris Wilson504ae402017-03-10 11:55:18 +00001282 do {
Brad Volkin351e3db2014-02-18 10:15:46 -08001283 u32 length;
1284
Chris Wilson504ae402017-03-10 11:55:18 +00001285 if (*cmd == MI_BATCH_BUFFER_END) {
1286 if (needs_clflush_after) {
Chris Wilson0ce81782017-05-17 13:09:59 +01001287 void *ptr = page_mask_bits(shadow_batch_obj->mm.mapping);
Chris Wilson504ae402017-03-10 11:55:18 +00001288 drm_clflush_virt_range(ptr,
1289 (void *)(cmd + 1) - ptr);
1290 }
Brad Volkin351e3db2014-02-18 10:15:46 -08001291 break;
Chris Wilson504ae402017-03-10 11:55:18 +00001292 }
Brad Volkin351e3db2014-02-18 10:15:46 -08001293
Chris Wilsonefdfd912016-08-18 17:17:15 +01001294 desc = find_cmd(engine, *cmd, desc, &default_desc);
Brad Volkin351e3db2014-02-18 10:15:46 -08001295 if (!desc) {
1296 DRM_DEBUG_DRIVER("CMD: Unrecognized command: 0x%08X\n",
1297 *cmd);
1298 ret = -EINVAL;
1299 break;
1300 }
1301
Brad Volkin42c71562014-10-16 12:24:42 -07001302 /*
1303 * If the batch buffer contains a chained batch, return an
1304 * error that tells the caller to abort and dispatch the
1305 * workload as a non-secure batch.
1306 */
1307 if (desc->cmd.value == MI_BATCH_BUFFER_START) {
1308 ret = -EACCES;
1309 break;
1310 }
1311
Brad Volkin351e3db2014-02-18 10:15:46 -08001312 if (desc->flags & CMD_DESC_FIXED)
1313 length = desc->length.fixed;
1314 else
1315 length = ((*cmd & desc->length.mask) + LENGTH_BIAS);
1316
1317 if ((batch_end - cmd) < length) {
Jani Nikula86a25122014-04-02 11:24:20 +03001318 DRM_DEBUG_DRIVER("CMD: Command length exceeds batch length: 0x%08X length=%u batchlen=%td\n",
Brad Volkin351e3db2014-02-18 10:15:46 -08001319 *cmd,
1320 length,
Jan Moskyto Matejka4b6eab52014-04-28 15:03:23 +02001321 batch_end - cmd);
Brad Volkin351e3db2014-02-18 10:15:46 -08001322 ret = -EINVAL;
1323 break;
1324 }
1325
Robert Bragg10ff4012016-11-08 12:51:48 +00001326 if (!check_cmd(engine, desc, cmd, length, is_master)) {
Robert Bragg9bbeaed2016-11-07 19:49:49 +00001327 ret = -EACCES;
Brad Volkin351e3db2014-02-18 10:15:46 -08001328 break;
1329 }
1330
Brad Volkin351e3db2014-02-18 10:15:46 -08001331 cmd += length;
Chris Wilson504ae402017-03-10 11:55:18 +00001332 if (cmd >= batch_end) {
1333 DRM_DEBUG_DRIVER("CMD: Got to the end of the buffer w/o a BBE cmd!\n");
1334 ret = -EINVAL;
1335 break;
1336 }
1337 } while (1);
Brad Volkin351e3db2014-02-18 10:15:46 -08001338
Chris Wilson0b537272016-08-18 17:17:12 +01001339 i915_gem_object_unpin_map(shadow_batch_obj);
Brad Volkin351e3db2014-02-18 10:15:46 -08001340 return ret;
1341}
Brad Volkind728c8e2014-02-18 10:15:56 -08001342
1343/**
1344 * i915_cmd_parser_get_version() - get the cmd parser version number
Tvrtko Ursulin14bb2c12016-06-03 14:02:17 +01001345 * @dev_priv: i915 device private
Brad Volkind728c8e2014-02-18 10:15:56 -08001346 *
1347 * The cmd parser maintains a simple increasing integer version number suitable
1348 * for passing to userspace clients to determine what operations are permitted.
1349 *
1350 * Return: the current version number of the cmd parser
1351 */
Chris Wilson1ca37122016-05-04 14:25:36 +01001352int i915_cmd_parser_get_version(struct drm_i915_private *dev_priv)
Brad Volkind728c8e2014-02-18 10:15:56 -08001353{
Chris Wilson1ca37122016-05-04 14:25:36 +01001354 struct intel_engine_cs *engine;
Akash Goel3b3f1652016-10-13 22:44:48 +05301355 enum intel_engine_id id;
Chris Wilson1ca37122016-05-04 14:25:36 +01001356 bool active = false;
1357
1358 /* If the command parser is not enabled, report 0 - unsupported */
Akash Goel3b3f1652016-10-13 22:44:48 +05301359 for_each_engine(engine, dev_priv, id) {
Chris Wilson41736a82016-11-24 12:58:51 +00001360 if (engine->needs_cmd_parser) {
Chris Wilson1ca37122016-05-04 14:25:36 +01001361 active = true;
1362 break;
1363 }
1364 }
1365 if (!active)
1366 return 0;
1367
Brad Volkind728c8e2014-02-18 10:15:56 -08001368 /*
1369 * Command parser version history
1370 *
1371 * 1. Initial version. Checks batches and reports violations, but leaves
1372 * hardware parsing enabled (so does not allow new use cases).
Neil Robertsf1f55cc2014-11-07 19:00:26 +00001373 * 2. Allow access to the MI_PREDICATE_SRC0 and
1374 * MI_PREDICATE_SRC1 registers.
Jordan Justenc61200c2014-12-11 13:28:09 -08001375 * 3. Allow access to the GPGPU_THREADS_DISPATCHED register.
Francisco Jerez2bbe6bb2015-06-15 14:03:29 +03001376 * 4. L3 atomic chicken bits of HSW_SCRATCH1 and HSW_ROW_CHICKEN3.
Jordan Justen7b9748c2015-10-01 23:09:58 -07001377 * 5. GPGPU dispatch compute indirect registers.
Jordan Justen6cf07162016-03-06 23:30:30 -08001378 * 6. TIMESTAMP register and Haswell CS GPR registers
Kenneth Graunke6761d0a2016-05-06 08:50:14 +01001379 * 7. Allow MI_LOAD_REGISTER_REG between whitelisted registers.
Robert Bragg9bbeaed2016-11-07 19:49:49 +00001380 * 8. Don't report cmd_check() failures as EINVAL errors to userspace;
1381 * rely on the HW to NOOP disallowed commands as it would without
1382 * the parser enabled.
Robert Bragg10ff4012016-11-08 12:51:48 +00001383 * 9. Don't whitelist or handle oacontrol specially, as ownership
1384 * for oacontrol state is moving to i915-perf.
Brad Volkind728c8e2014-02-18 10:15:56 -08001385 */
Robert Bragg10ff4012016-11-08 12:51:48 +00001386 return 9;
Brad Volkind728c8e2014-02-18 10:15:56 -08001387}