Merge tag 'drm-intel-fixes-2015-07-15' into drm-intel-next-queued
[deliverable/linux.git] / drivers / gpu / drm / i915 / i915_cmd_parser.c
CommitLineData
351e3db2
BV
1/*
2 * Copyright © 2013 Intel Corporation
3 *
4 * Permission is hereby granted, free of charge, to any person obtaining a
5 * copy of this software and associated documentation files (the "Software"),
6 * to deal in the Software without restriction, including without limitation
7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8 * and/or sell copies of the Software, and to permit persons to whom the
9 * Software is furnished to do so, subject to the following conditions:
10 *
11 * The above copyright notice and this permission notice (including the next
12 * paragraph) shall be included in all copies or substantial portions of the
13 * Software.
14 *
15 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
18 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
20 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
21 * IN THE SOFTWARE.
22 *
23 * Authors:
24 * Brad Volkin <bradley.d.volkin@intel.com>
25 *
26 */
27
28#include "i915_drv.h"
29
30/**
122b2505 31 * DOC: batch buffer command parser
351e3db2
BV
32 *
33 * Motivation:
34 * Certain OpenGL features (e.g. transform feedback, performance monitoring)
35 * require userspace code to submit batches containing commands such as
36 * MI_LOAD_REGISTER_IMM to access various registers. Unfortunately, some
37 * generations of the hardware will noop these commands in "unsecure" batches
38 * (which includes all userspace batches submitted via i915) even though the
39 * commands may be safe and represent the intended programming model of the
40 * device.
41 *
42 * The software command parser is similar in operation to the command parsing
43 * done in hardware for unsecure batches. However, the software parser allows
44 * some operations that would be noop'd by hardware, if the parser determines
45 * the operation is safe, and submits the batch as "secure" to prevent hardware
46 * parsing.
47 *
48 * Threats:
49 * At a high level, the hardware (and software) checks attempt to prevent
50 * granting userspace undue privileges. There are three categories of privilege.
51 *
52 * First, commands which are explicitly defined as privileged or which should
53 * only be used by the kernel driver. The parser generally rejects such
54 * commands, though it may allow some from the drm master process.
55 *
56 * Second, commands which access registers. To support correct/enhanced
57 * userspace functionality, particularly certain OpenGL extensions, the parser
58 * provides a whitelist of registers which userspace may safely access (for both
59 * normal and drm master processes).
60 *
61 * Third, commands which access privileged memory (i.e. GGTT, HWS page, etc).
62 * The parser always rejects such commands.
63 *
64 * The majority of the problematic commands fall in the MI_* range, with only a
65 * few specific commands on each ring (e.g. PIPE_CONTROL and MI_FLUSH_DW).
66 *
67 * Implementation:
68 * Each ring maintains tables of commands and registers which the parser uses in
69 * scanning batch buffers submitted to that ring.
70 *
71 * Since the set of commands that the parser must check for is significantly
72 * smaller than the number of commands supported, the parser tables contain only
73 * those commands required by the parser. This generally works because command
74 * opcode ranges have standard command length encodings. So for commands that
75 * the parser does not need to check, it can easily skip them. This is
32197aab 76 * implemented via a per-ring length decoding vfunc.
351e3db2
BV
77 *
78 * Unfortunately, there are a number of commands that do not follow the standard
79 * length encoding for their opcode range, primarily amongst the MI_* commands.
80 * To handle this, the parser provides a way to define explicit "skip" entries
81 * in the per-ring command tables.
82 *
83 * Other command table entries map fairly directly to high level categories
84 * mentioned above: rejected, master-only, register whitelist. The parser
85 * implements a number of checks, including the privileged memory checks, via a
86 * general bitmasking mechanism.
87 */
88
3a6fa984
BV
89#define STD_MI_OPCODE_MASK 0xFF800000
90#define STD_3D_OPCODE_MASK 0xFFFF0000
91#define STD_2D_OPCODE_MASK 0xFFC00000
92#define STD_MFX_OPCODE_MASK 0xFFFF0000
93
94#define CMD(op, opm, f, lm, fl, ...) \
95 { \
96 .flags = (fl) | ((f) ? CMD_DESC_FIXED : 0), \
97 .cmd = { (op), (opm) }, \
98 .length = { (lm) }, \
99 __VA_ARGS__ \
100 }
101
102/* Convenience macros to compress the tables */
103#define SMI STD_MI_OPCODE_MASK
104#define S3D STD_3D_OPCODE_MASK
105#define S2D STD_2D_OPCODE_MASK
106#define SMFX STD_MFX_OPCODE_MASK
107#define F true
108#define S CMD_DESC_SKIP
109#define R CMD_DESC_REJECT
110#define W CMD_DESC_REGISTER
111#define B CMD_DESC_BITMASK
112#define M CMD_DESC_MASTER
113
114/* Command Mask Fixed Len Action
115 ---------------------------------------------------------- */
116static const struct drm_i915_cmd_descriptor common_cmds[] = {
117 CMD( MI_NOOP, SMI, F, 1, S ),
b18b396b 118 CMD( MI_USER_INTERRUPT, SMI, F, 1, R ),
17c1eb15 119 CMD( MI_WAIT_FOR_EVENT, SMI, F, 1, M ),
3a6fa984
BV
120 CMD( MI_ARB_CHECK, SMI, F, 1, S ),
121 CMD( MI_REPORT_HEAD, SMI, F, 1, S ),
122 CMD( MI_SUSPEND_FLUSH, SMI, F, 1, S ),
9c640d1d
BV
123 CMD( MI_SEMAPHORE_MBOX, SMI, !F, 0xFF, R ),
124 CMD( MI_STORE_DWORD_INDEX, SMI, !F, 0xFF, R ),
f0a346bd 125 CMD( MI_LOAD_REGISTER_IMM(1), SMI, !F, 0xFF, W,
6a65c5b9 126 .reg = { .offset = 1, .mask = 0x007FFFFC, .step = 2 } ),
d4d48035
BV
127 CMD( MI_STORE_REGISTER_MEM(1), SMI, !F, 0xFF, W | B,
128 .reg = { .offset = 1, .mask = 0x007FFFFC },
129 .bits = {{
130 .offset = 0,
131 .mask = MI_GLOBAL_GTT,
132 .expected = 0,
133 }}, ),
9e000847 134 CMD( MI_LOAD_REGISTER_MEM(1), SMI, !F, 0xFF, W | B,
d4d48035
BV
135 .reg = { .offset = 1, .mask = 0x007FFFFC },
136 .bits = {{
137 .offset = 0,
138 .mask = MI_GLOBAL_GTT,
139 .expected = 0,
140 }}, ),
42c7156a
BV
141 /*
142 * MI_BATCH_BUFFER_START requires some special handling. It's not
143 * really a 'skip' action but it doesn't seem like it's worth adding
144 * a new action. See i915_parse_cmds().
145 */
3a6fa984
BV
146 CMD( MI_BATCH_BUFFER_START, SMI, !F, 0xFF, S ),
147};
148
149static const struct drm_i915_cmd_descriptor render_cmds[] = {
150 CMD( MI_FLUSH, SMI, F, 1, S ),
9c640d1d 151 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
3a6fa984
BV
152 CMD( MI_PREDICATE, SMI, F, 1, S ),
153 CMD( MI_TOPOLOGY_FILTER, SMI, F, 1, S ),
9c640d1d 154 CMD( MI_DISPLAY_FLIP, SMI, !F, 0xFF, R ),
86ef630d 155 CMD( MI_SET_APPID, SMI, F, 1, S ),
9c640d1d 156 CMD( MI_SET_CONTEXT, SMI, !F, 0xFF, R ),
3a6fa984 157 CMD( MI_URB_CLEAR, SMI, !F, 0xFF, S ),
d4d48035
BV
158 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0x3F, B,
159 .bits = {{
160 .offset = 0,
161 .mask = MI_GLOBAL_GTT,
162 .expected = 0,
163 }}, ),
9c640d1d 164 CMD( MI_UPDATE_GTT, SMI, !F, 0xFF, R ),
d4d48035
BV
165 CMD( MI_CLFLUSH, SMI, !F, 0x3FF, B,
166 .bits = {{
167 .offset = 0,
168 .mask = MI_GLOBAL_GTT,
169 .expected = 0,
170 }}, ),
171 CMD( MI_REPORT_PERF_COUNT, SMI, !F, 0x3F, B,
172 .bits = {{
173 .offset = 1,
174 .mask = MI_REPORT_PERF_COUNT_GGTT,
175 .expected = 0,
176 }}, ),
177 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
178 .bits = {{
179 .offset = 0,
180 .mask = MI_GLOBAL_GTT,
181 .expected = 0,
182 }}, ),
3a6fa984
BV
183 CMD( GFX_OP_3DSTATE_VF_STATISTICS, S3D, F, 1, S ),
184 CMD( PIPELINE_SELECT, S3D, F, 1, S ),
f0a346bd
BV
185 CMD( MEDIA_VFE_STATE, S3D, !F, 0xFFFF, B,
186 .bits = {{
187 .offset = 2,
188 .mask = MEDIA_VFE_STATE_MMIO_ACCESS_MASK,
189 .expected = 0,
190 }}, ),
3a6fa984
BV
191 CMD( GPGPU_OBJECT, S3D, !F, 0xFF, S ),
192 CMD( GPGPU_WALKER, S3D, !F, 0xFF, S ),
193 CMD( GFX_OP_3DSTATE_SO_DECL_LIST, S3D, !F, 0x1FF, S ),
f0a346bd
BV
194 CMD( GFX_OP_PIPE_CONTROL(5), S3D, !F, 0xFF, B,
195 .bits = {{
196 .offset = 1,
b18b396b 197 .mask = (PIPE_CONTROL_MMIO_WRITE | PIPE_CONTROL_NOTIFY),
f0a346bd 198 .expected = 0,
d4d48035
BV
199 },
200 {
201 .offset = 1,
114d4f70
BV
202 .mask = (PIPE_CONTROL_GLOBAL_GTT_IVB |
203 PIPE_CONTROL_STORE_DATA_INDEX),
d4d48035
BV
204 .expected = 0,
205 .condition_offset = 1,
206 .condition_mask = PIPE_CONTROL_POST_SYNC_OP_MASK,
f0a346bd 207 }}, ),
3a6fa984
BV
208};
209
210static const struct drm_i915_cmd_descriptor hsw_render_cmds[] = {
211 CMD( MI_SET_PREDICATE, SMI, F, 1, S ),
212 CMD( MI_RS_CONTROL, SMI, F, 1, S ),
213 CMD( MI_URB_ATOMIC_ALLOC, SMI, F, 1, S ),
86ef630d 214 CMD( MI_SET_APPID, SMI, F, 1, S ),
3a6fa984 215 CMD( MI_RS_CONTEXT, SMI, F, 1, S ),
17c1eb15 216 CMD( MI_LOAD_SCAN_LINES_INCL, SMI, !F, 0x3F, M ),
9c640d1d
BV
217 CMD( MI_LOAD_SCAN_LINES_EXCL, SMI, !F, 0x3F, R ),
218 CMD( MI_LOAD_REGISTER_REG, SMI, !F, 0xFF, R ),
3a6fa984
BV
219 CMD( MI_RS_STORE_DATA_IMM, SMI, !F, 0xFF, S ),
220 CMD( MI_LOAD_URB_MEM, SMI, !F, 0xFF, S ),
221 CMD( MI_STORE_URB_MEM, SMI, !F, 0xFF, S ),
222 CMD( GFX_OP_3DSTATE_DX9_CONSTANTF_VS, S3D, !F, 0x7FF, S ),
223 CMD( GFX_OP_3DSTATE_DX9_CONSTANTF_PS, S3D, !F, 0x7FF, S ),
224
225 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_VS, S3D, !F, 0x1FF, S ),
226 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_GS, S3D, !F, 0x1FF, S ),
227 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_HS, S3D, !F, 0x1FF, S ),
228 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_DS, S3D, !F, 0x1FF, S ),
229 CMD( GFX_OP_3DSTATE_BINDING_TABLE_EDIT_PS, S3D, !F, 0x1FF, S ),
230};
231
232static const struct drm_i915_cmd_descriptor video_cmds[] = {
9c640d1d 233 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
86ef630d 234 CMD( MI_SET_APPID, SMI, F, 1, S ),
d4d48035
BV
235 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0xFF, B,
236 .bits = {{
237 .offset = 0,
238 .mask = MI_GLOBAL_GTT,
239 .expected = 0,
240 }}, ),
9c640d1d 241 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
b18b396b
BV
242 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
243 .bits = {{
244 .offset = 0,
245 .mask = MI_FLUSH_DW_NOTIFY,
246 .expected = 0,
d4d48035
BV
247 },
248 {
249 .offset = 1,
250 .mask = MI_FLUSH_DW_USE_GTT,
251 .expected = 0,
252 .condition_offset = 0,
253 .condition_mask = MI_FLUSH_DW_OP_MASK,
114d4f70
BV
254 },
255 {
256 .offset = 0,
257 .mask = MI_FLUSH_DW_STORE_INDEX,
258 .expected = 0,
259 .condition_offset = 0,
260 .condition_mask = MI_FLUSH_DW_OP_MASK,
d4d48035
BV
261 }}, ),
262 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
263 .bits = {{
264 .offset = 0,
265 .mask = MI_GLOBAL_GTT,
266 .expected = 0,
b18b396b 267 }}, ),
3a6fa984
BV
268 /*
269 * MFX_WAIT doesn't fit the way we handle length for most commands.
270 * It has a length field but it uses a non-standard length bias.
271 * It is always 1 dword though, so just treat it as fixed length.
272 */
273 CMD( MFX_WAIT, SMFX, F, 1, S ),
274};
275
276static const struct drm_i915_cmd_descriptor vecs_cmds[] = {
9c640d1d 277 CMD( MI_ARB_ON_OFF, SMI, F, 1, R ),
86ef630d 278 CMD( MI_SET_APPID, SMI, F, 1, S ),
d4d48035
BV
279 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0xFF, B,
280 .bits = {{
281 .offset = 0,
282 .mask = MI_GLOBAL_GTT,
283 .expected = 0,
284 }}, ),
9c640d1d 285 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
b18b396b
BV
286 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
287 .bits = {{
288 .offset = 0,
289 .mask = MI_FLUSH_DW_NOTIFY,
290 .expected = 0,
d4d48035
BV
291 },
292 {
293 .offset = 1,
294 .mask = MI_FLUSH_DW_USE_GTT,
295 .expected = 0,
296 .condition_offset = 0,
297 .condition_mask = MI_FLUSH_DW_OP_MASK,
114d4f70
BV
298 },
299 {
300 .offset = 0,
301 .mask = MI_FLUSH_DW_STORE_INDEX,
302 .expected = 0,
303 .condition_offset = 0,
304 .condition_mask = MI_FLUSH_DW_OP_MASK,
d4d48035
BV
305 }}, ),
306 CMD( MI_CONDITIONAL_BATCH_BUFFER_END, SMI, !F, 0xFF, B,
307 .bits = {{
308 .offset = 0,
309 .mask = MI_GLOBAL_GTT,
310 .expected = 0,
b18b396b 311 }}, ),
3a6fa984
BV
312};
313
314static const struct drm_i915_cmd_descriptor blt_cmds[] = {
9c640d1d 315 CMD( MI_DISPLAY_FLIP, SMI, !F, 0xFF, R ),
d4d48035
BV
316 CMD( MI_STORE_DWORD_IMM, SMI, !F, 0x3FF, B,
317 .bits = {{
318 .offset = 0,
319 .mask = MI_GLOBAL_GTT,
320 .expected = 0,
321 }}, ),
9c640d1d 322 CMD( MI_UPDATE_GTT, SMI, !F, 0x3F, R ),
b18b396b
BV
323 CMD( MI_FLUSH_DW, SMI, !F, 0x3F, B,
324 .bits = {{
325 .offset = 0,
326 .mask = MI_FLUSH_DW_NOTIFY,
327 .expected = 0,
d4d48035
BV
328 },
329 {
330 .offset = 1,
331 .mask = MI_FLUSH_DW_USE_GTT,
332 .expected = 0,
333 .condition_offset = 0,
334 .condition_mask = MI_FLUSH_DW_OP_MASK,
114d4f70
BV
335 },
336 {
337 .offset = 0,
338 .mask = MI_FLUSH_DW_STORE_INDEX,
339 .expected = 0,
340 .condition_offset = 0,
341 .condition_mask = MI_FLUSH_DW_OP_MASK,
b18b396b 342 }}, ),
3a6fa984
BV
343 CMD( COLOR_BLT, S2D, !F, 0x3F, S ),
344 CMD( SRC_COPY_BLT, S2D, !F, 0x3F, S ),
345};
346
9c640d1d 347static const struct drm_i915_cmd_descriptor hsw_blt_cmds[] = {
17c1eb15 348 CMD( MI_LOAD_SCAN_LINES_INCL, SMI, !F, 0x3F, M ),
9c640d1d
BV
349 CMD( MI_LOAD_SCAN_LINES_EXCL, SMI, !F, 0x3F, R ),
350};
351
3a6fa984
BV
352#undef CMD
353#undef SMI
354#undef S3D
355#undef S2D
356#undef SMFX
357#undef F
358#undef S
359#undef R
360#undef W
361#undef B
362#undef M
363
364static const struct drm_i915_cmd_table gen7_render_cmds[] = {
365 { common_cmds, ARRAY_SIZE(common_cmds) },
366 { render_cmds, ARRAY_SIZE(render_cmds) },
367};
368
369static const struct drm_i915_cmd_table hsw_render_ring_cmds[] = {
370 { common_cmds, ARRAY_SIZE(common_cmds) },
371 { render_cmds, ARRAY_SIZE(render_cmds) },
372 { hsw_render_cmds, ARRAY_SIZE(hsw_render_cmds) },
373};
374
375static const struct drm_i915_cmd_table gen7_video_cmds[] = {
376 { common_cmds, ARRAY_SIZE(common_cmds) },
377 { video_cmds, ARRAY_SIZE(video_cmds) },
378};
379
380static const struct drm_i915_cmd_table hsw_vebox_cmds[] = {
381 { common_cmds, ARRAY_SIZE(common_cmds) },
382 { vecs_cmds, ARRAY_SIZE(vecs_cmds) },
383};
384
385static const struct drm_i915_cmd_table gen7_blt_cmds[] = {
386 { common_cmds, ARRAY_SIZE(common_cmds) },
387 { blt_cmds, ARRAY_SIZE(blt_cmds) },
388};
389
9c640d1d
BV
390static const struct drm_i915_cmd_table hsw_blt_ring_cmds[] = {
391 { common_cmds, ARRAY_SIZE(common_cmds) },
392 { blt_cmds, ARRAY_SIZE(blt_cmds) },
393 { hsw_blt_cmds, ARRAY_SIZE(hsw_blt_cmds) },
394};
395
5947de9b
BV
396/*
397 * Register whitelists, sorted by increasing register offset.
4e86f725
FJ
398 */
399
400/*
401 * An individual whitelist entry granting access to register addr. If
402 * mask is non-zero the argument of immediate register writes will be
403 * AND-ed with mask, and the command will be rejected if the result
404 * doesn't match value.
405 *
406 * Registers with non-zero mask are only allowed to be written using
407 * LRI.
408 */
409struct drm_i915_reg_descriptor {
410 u32 addr;
411 u32 mask;
412 u32 value;
413};
414
415/* Convenience macro for adding 32-bit registers. */
416#define REG32(address, ...) \
417 { .addr = address, __VA_ARGS__ }
418
419/*
420 * Convenience macro for adding 64-bit registers.
5947de9b
BV
421 *
422 * Some registers that userspace accesses are 64 bits. The register
423 * access commands only allow 32-bit accesses. Hence, we have to include
424 * entries for both halves of the 64-bit registers.
425 */
4e86f725
FJ
426#define REG64(addr) \
427 REG32(addr), REG32(addr + sizeof(u32))
5947de9b 428
4e86f725 429static const struct drm_i915_reg_descriptor gen7_render_regs[] = {
c61200c2 430 REG64(GPGPU_THREADS_DISPATCHED),
5947de9b
BV
431 REG64(HS_INVOCATION_COUNT),
432 REG64(DS_INVOCATION_COUNT),
433 REG64(IA_VERTICES_COUNT),
434 REG64(IA_PRIMITIVES_COUNT),
435 REG64(VS_INVOCATION_COUNT),
436 REG64(GS_INVOCATION_COUNT),
437 REG64(GS_PRIMITIVES_COUNT),
438 REG64(CL_INVOCATION_COUNT),
439 REG64(CL_PRIMITIVES_COUNT),
440 REG64(PS_INVOCATION_COUNT),
441 REG64(PS_DEPTH_COUNT),
4e86f725 442 REG32(OACONTROL), /* Only allowed for LRI and SRM. See below. */
f1f55cc0
NR
443 REG64(MI_PREDICATE_SRC0),
444 REG64(MI_PREDICATE_SRC1),
4e86f725
FJ
445 REG32(GEN7_3DPRIM_END_OFFSET),
446 REG32(GEN7_3DPRIM_START_VERTEX),
447 REG32(GEN7_3DPRIM_VERTEX_COUNT),
448 REG32(GEN7_3DPRIM_INSTANCE_COUNT),
449 REG32(GEN7_3DPRIM_START_INSTANCE),
450 REG32(GEN7_3DPRIM_BASE_VERTEX),
5947de9b
BV
451 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(0)),
452 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(1)),
453 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(2)),
454 REG64(GEN7_SO_NUM_PRIMS_WRITTEN(3)),
113a0476
BV
455 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(0)),
456 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(1)),
457 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(2)),
458 REG64(GEN7_SO_PRIM_STORAGE_NEEDED(3)),
4e86f725
FJ
459 REG32(GEN7_SO_WRITE_OFFSET(0)),
460 REG32(GEN7_SO_WRITE_OFFSET(1)),
461 REG32(GEN7_SO_WRITE_OFFSET(2)),
462 REG32(GEN7_SO_WRITE_OFFSET(3)),
463 REG32(GEN7_L3SQCREG1),
464 REG32(GEN7_L3CNTLREG2),
465 REG32(GEN7_L3CNTLREG3),
d351f6d9
FJ
466 REG32(HSW_SCRATCH1,
467 .mask = ~HSW_SCRATCH1_L3_DATA_ATOMICS_DISABLE,
468 .value = 0),
469 REG32(HSW_ROW_CHICKEN3,
470 .mask = ~(HSW_ROW_CHICKEN3_L3_GLOBAL_ATOMICS_DISABLE << 16 |
471 HSW_ROW_CHICKEN3_L3_GLOBAL_ATOMICS_DISABLE),
472 .value = 0),
5947de9b
BV
473};
474
4e86f725
FJ
475static const struct drm_i915_reg_descriptor gen7_blt_regs[] = {
476 REG32(BCS_SWCTRL),
5947de9b
BV
477};
478
4e86f725
FJ
479static const struct drm_i915_reg_descriptor ivb_master_regs[] = {
480 REG32(FORCEWAKE_MT),
481 REG32(DERRMR),
482 REG32(GEN7_PIPE_DE_LOAD_SL(PIPE_A)),
483 REG32(GEN7_PIPE_DE_LOAD_SL(PIPE_B)),
484 REG32(GEN7_PIPE_DE_LOAD_SL(PIPE_C)),
220375aa
BV
485};
486
4e86f725
FJ
487static const struct drm_i915_reg_descriptor hsw_master_regs[] = {
488 REG32(FORCEWAKE_MT),
489 REG32(DERRMR),
220375aa
BV
490};
491
5947de9b 492#undef REG64
4e86f725 493#undef REG32
5947de9b 494
351e3db2
BV
495static u32 gen7_render_get_cmd_length_mask(u32 cmd_header)
496{
497 u32 client = (cmd_header & INSTR_CLIENT_MASK) >> INSTR_CLIENT_SHIFT;
498 u32 subclient =
499 (cmd_header & INSTR_SUBCLIENT_MASK) >> INSTR_SUBCLIENT_SHIFT;
500
501 if (client == INSTR_MI_CLIENT)
502 return 0x3F;
503 else if (client == INSTR_RC_CLIENT) {
504 if (subclient == INSTR_MEDIA_SUBCLIENT)
505 return 0xFFFF;
506 else
507 return 0xFF;
508 }
509
510 DRM_DEBUG_DRIVER("CMD: Abnormal rcs cmd length! 0x%08X\n", cmd_header);
511 return 0;
512}
513
514static u32 gen7_bsd_get_cmd_length_mask(u32 cmd_header)
515{
516 u32 client = (cmd_header & INSTR_CLIENT_MASK) >> INSTR_CLIENT_SHIFT;
517 u32 subclient =
518 (cmd_header & INSTR_SUBCLIENT_MASK) >> INSTR_SUBCLIENT_SHIFT;
86ef630d 519 u32 op = (cmd_header & INSTR_26_TO_24_MASK) >> INSTR_26_TO_24_SHIFT;
351e3db2
BV
520
521 if (client == INSTR_MI_CLIENT)
522 return 0x3F;
523 else if (client == INSTR_RC_CLIENT) {
86ef630d
MN
524 if (subclient == INSTR_MEDIA_SUBCLIENT) {
525 if (op == 6)
526 return 0xFFFF;
527 else
528 return 0xFFF;
529 } else
351e3db2
BV
530 return 0xFF;
531 }
532
533 DRM_DEBUG_DRIVER("CMD: Abnormal bsd cmd length! 0x%08X\n", cmd_header);
534 return 0;
535}
536
537static u32 gen7_blt_get_cmd_length_mask(u32 cmd_header)
538{
539 u32 client = (cmd_header & INSTR_CLIENT_MASK) >> INSTR_CLIENT_SHIFT;
540
541 if (client == INSTR_MI_CLIENT)
542 return 0x3F;
543 else if (client == INSTR_BC_CLIENT)
544 return 0xFF;
545
546 DRM_DEBUG_DRIVER("CMD: Abnormal blt cmd length! 0x%08X\n", cmd_header);
547 return 0;
548}
549
a4872ba6 550static bool validate_cmds_sorted(struct intel_engine_cs *ring,
44e895a8
BV
551 const struct drm_i915_cmd_table *cmd_tables,
552 int cmd_table_count)
351e3db2
BV
553{
554 int i;
300233ee 555 bool ret = true;
351e3db2 556
44e895a8 557 if (!cmd_tables || cmd_table_count == 0)
300233ee 558 return true;
351e3db2 559
44e895a8
BV
560 for (i = 0; i < cmd_table_count; i++) {
561 const struct drm_i915_cmd_table *table = &cmd_tables[i];
351e3db2
BV
562 u32 previous = 0;
563 int j;
564
565 for (j = 0; j < table->count; j++) {
566 const struct drm_i915_cmd_descriptor *desc =
567 &table->table[i];
568 u32 curr = desc->cmd.value & desc->cmd.mask;
569
300233ee 570 if (curr < previous) {
351e3db2
BV
571 DRM_ERROR("CMD: table not sorted ring=%d table=%d entry=%d cmd=0x%08X prev=0x%08X\n",
572 ring->id, i, j, curr, previous);
300233ee
BV
573 ret = false;
574 }
351e3db2
BV
575
576 previous = curr;
577 }
578 }
300233ee
BV
579
580 return ret;
351e3db2
BV
581}
582
4e86f725
FJ
583static bool check_sorted(int ring_id,
584 const struct drm_i915_reg_descriptor *reg_table,
585 int reg_count)
351e3db2
BV
586{
587 int i;
588 u32 previous = 0;
300233ee 589 bool ret = true;
351e3db2
BV
590
591 for (i = 0; i < reg_count; i++) {
4e86f725 592 u32 curr = reg_table[i].addr;
351e3db2 593
300233ee 594 if (curr < previous) {
351e3db2
BV
595 DRM_ERROR("CMD: table not sorted ring=%d entry=%d reg=0x%08X prev=0x%08X\n",
596 ring_id, i, curr, previous);
300233ee
BV
597 ret = false;
598 }
351e3db2
BV
599
600 previous = curr;
601 }
300233ee
BV
602
603 return ret;
351e3db2
BV
604}
605
a4872ba6 606static bool validate_regs_sorted(struct intel_engine_cs *ring)
351e3db2 607{
300233ee
BV
608 return check_sorted(ring->id, ring->reg_table, ring->reg_count) &&
609 check_sorted(ring->id, ring->master_reg_table,
610 ring->master_reg_count);
351e3db2
BV
611}
612
44e895a8
BV
613struct cmd_node {
614 const struct drm_i915_cmd_descriptor *desc;
615 struct hlist_node node;
616};
617
618/*
619 * Different command ranges have different numbers of bits for the opcode. For
620 * example, MI commands use bits 31:23 while 3D commands use bits 31:16. The
621 * problem is that, for example, MI commands use bits 22:16 for other fields
622 * such as GGTT vs PPGTT bits. If we include those bits in the mask then when
623 * we mask a command from a batch it could hash to the wrong bucket due to
624 * non-opcode bits being set. But if we don't include those bits, some 3D
625 * commands may hash to the same bucket due to not including opcode bits that
626 * make the command unique. For now, we will risk hashing to the same bucket.
627 *
628 * If we attempt to generate a perfect hash, we should be able to look at bits
629 * 31:29 of a command from a batch buffer and use the full mask for that
630 * client. The existing INSTR_CLIENT_MASK/SHIFT defines can be used for this.
631 */
632#define CMD_HASH_MASK STD_MI_OPCODE_MASK
633
a4872ba6 634static int init_hash_table(struct intel_engine_cs *ring,
44e895a8
BV
635 const struct drm_i915_cmd_table *cmd_tables,
636 int cmd_table_count)
637{
638 int i, j;
639
640 hash_init(ring->cmd_hash);
641
642 for (i = 0; i < cmd_table_count; i++) {
643 const struct drm_i915_cmd_table *table = &cmd_tables[i];
644
645 for (j = 0; j < table->count; j++) {
646 const struct drm_i915_cmd_descriptor *desc =
647 &table->table[j];
648 struct cmd_node *desc_node =
649 kmalloc(sizeof(*desc_node), GFP_KERNEL);
650
651 if (!desc_node)
652 return -ENOMEM;
653
654 desc_node->desc = desc;
655 hash_add(ring->cmd_hash, &desc_node->node,
656 desc->cmd.value & CMD_HASH_MASK);
657 }
658 }
659
660 return 0;
661}
662
a4872ba6 663static void fini_hash_table(struct intel_engine_cs *ring)
44e895a8
BV
664{
665 struct hlist_node *tmp;
666 struct cmd_node *desc_node;
667 int i;
668
669 hash_for_each_safe(ring->cmd_hash, i, tmp, desc_node, node) {
670 hash_del(&desc_node->node);
671 kfree(desc_node);
672 }
673}
674
351e3db2
BV
675/**
676 * i915_cmd_parser_init_ring() - set cmd parser related fields for a ringbuffer
677 * @ring: the ringbuffer to initialize
678 *
679 * Optionally initializes fields related to batch buffer command parsing in the
a4872ba6 680 * struct intel_engine_cs based on whether the platform requires software
351e3db2 681 * command parsing.
44e895a8
BV
682 *
683 * Return: non-zero if initialization fails
351e3db2 684 */
a4872ba6 685int i915_cmd_parser_init_ring(struct intel_engine_cs *ring)
351e3db2 686{
44e895a8
BV
687 const struct drm_i915_cmd_table *cmd_tables;
688 int cmd_table_count;
689 int ret;
690
351e3db2 691 if (!IS_GEN7(ring->dev))
44e895a8 692 return 0;
351e3db2
BV
693
694 switch (ring->id) {
695 case RCS:
3a6fa984 696 if (IS_HASWELL(ring->dev)) {
44e895a8
BV
697 cmd_tables = hsw_render_ring_cmds;
698 cmd_table_count =
3a6fa984
BV
699 ARRAY_SIZE(hsw_render_ring_cmds);
700 } else {
44e895a8
BV
701 cmd_tables = gen7_render_cmds;
702 cmd_table_count = ARRAY_SIZE(gen7_render_cmds);
3a6fa984
BV
703 }
704
5947de9b
BV
705 ring->reg_table = gen7_render_regs;
706 ring->reg_count = ARRAY_SIZE(gen7_render_regs);
707
220375aa
BV
708 if (IS_HASWELL(ring->dev)) {
709 ring->master_reg_table = hsw_master_regs;
710 ring->master_reg_count = ARRAY_SIZE(hsw_master_regs);
711 } else {
712 ring->master_reg_table = ivb_master_regs;
713 ring->master_reg_count = ARRAY_SIZE(ivb_master_regs);
714 }
715
351e3db2
BV
716 ring->get_cmd_length_mask = gen7_render_get_cmd_length_mask;
717 break;
718 case VCS:
44e895a8
BV
719 cmd_tables = gen7_video_cmds;
720 cmd_table_count = ARRAY_SIZE(gen7_video_cmds);
351e3db2
BV
721 ring->get_cmd_length_mask = gen7_bsd_get_cmd_length_mask;
722 break;
723 case BCS:
9c640d1d 724 if (IS_HASWELL(ring->dev)) {
44e895a8
BV
725 cmd_tables = hsw_blt_ring_cmds;
726 cmd_table_count = ARRAY_SIZE(hsw_blt_ring_cmds);
9c640d1d 727 } else {
44e895a8
BV
728 cmd_tables = gen7_blt_cmds;
729 cmd_table_count = ARRAY_SIZE(gen7_blt_cmds);
9c640d1d
BV
730 }
731
5947de9b
BV
732 ring->reg_table = gen7_blt_regs;
733 ring->reg_count = ARRAY_SIZE(gen7_blt_regs);
734
220375aa
BV
735 if (IS_HASWELL(ring->dev)) {
736 ring->master_reg_table = hsw_master_regs;
737 ring->master_reg_count = ARRAY_SIZE(hsw_master_regs);
738 } else {
739 ring->master_reg_table = ivb_master_regs;
740 ring->master_reg_count = ARRAY_SIZE(ivb_master_regs);
741 }
742
351e3db2
BV
743 ring->get_cmd_length_mask = gen7_blt_get_cmd_length_mask;
744 break;
745 case VECS:
44e895a8
BV
746 cmd_tables = hsw_vebox_cmds;
747 cmd_table_count = ARRAY_SIZE(hsw_vebox_cmds);
351e3db2
BV
748 /* VECS can use the same length_mask function as VCS */
749 ring->get_cmd_length_mask = gen7_bsd_get_cmd_length_mask;
750 break;
751 default:
752 DRM_ERROR("CMD: cmd_parser_init with unknown ring: %d\n",
753 ring->id);
754 BUG();
755 }
756
44e895a8 757 BUG_ON(!validate_cmds_sorted(ring, cmd_tables, cmd_table_count));
300233ee 758 BUG_ON(!validate_regs_sorted(ring));
44e895a8 759
bfc882b4
DV
760 WARN_ON(!hash_empty(ring->cmd_hash));
761
762 ret = init_hash_table(ring, cmd_tables, cmd_table_count);
763 if (ret) {
764 DRM_ERROR("CMD: cmd_parser_init failed!\n");
765 fini_hash_table(ring);
766 return ret;
44e895a8
BV
767 }
768
769 ring->needs_cmd_parser = true;
770
771 return 0;
772}
773
774/**
775 * i915_cmd_parser_fini_ring() - clean up cmd parser related fields
776 * @ring: the ringbuffer to clean up
777 *
778 * Releases any resources related to command parsing that may have been
779 * initialized for the specified ring.
780 */
a4872ba6 781void i915_cmd_parser_fini_ring(struct intel_engine_cs *ring)
44e895a8
BV
782{
783 if (!ring->needs_cmd_parser)
784 return;
785
786 fini_hash_table(ring);
351e3db2
BV
787}
788
789static const struct drm_i915_cmd_descriptor*
a4872ba6 790find_cmd_in_table(struct intel_engine_cs *ring,
351e3db2
BV
791 u32 cmd_header)
792{
44e895a8 793 struct cmd_node *desc_node;
351e3db2 794
44e895a8
BV
795 hash_for_each_possible(ring->cmd_hash, desc_node, node,
796 cmd_header & CMD_HASH_MASK) {
797 const struct drm_i915_cmd_descriptor *desc = desc_node->desc;
351e3db2
BV
798 u32 masked_cmd = desc->cmd.mask & cmd_header;
799 u32 masked_value = desc->cmd.value & desc->cmd.mask;
800
801 if (masked_cmd == masked_value)
802 return desc;
803 }
804
805 return NULL;
806}
807
808/*
809 * Returns a pointer to a descriptor for the command specified by cmd_header.
810 *
811 * The caller must supply space for a default descriptor via the default_desc
812 * parameter. If no descriptor for the specified command exists in the ring's
813 * command parser tables, this function fills in default_desc based on the
814 * ring's default length encoding and returns default_desc.
815 */
816static const struct drm_i915_cmd_descriptor*
a4872ba6 817find_cmd(struct intel_engine_cs *ring,
351e3db2
BV
818 u32 cmd_header,
819 struct drm_i915_cmd_descriptor *default_desc)
820{
44e895a8 821 const struct drm_i915_cmd_descriptor *desc;
351e3db2 822 u32 mask;
351e3db2 823
44e895a8
BV
824 desc = find_cmd_in_table(ring, cmd_header);
825 if (desc)
826 return desc;
351e3db2
BV
827
828 mask = ring->get_cmd_length_mask(cmd_header);
829 if (!mask)
830 return NULL;
831
832 BUG_ON(!default_desc);
833 default_desc->flags = CMD_DESC_SKIP;
834 default_desc->length.mask = mask;
835
836 return default_desc;
837}
838
4e86f725
FJ
839static const struct drm_i915_reg_descriptor *
840find_reg(const struct drm_i915_reg_descriptor *table,
841 int count, u32 addr)
351e3db2 842{
4e86f725 843 if (table) {
351e3db2
BV
844 int i;
845
846 for (i = 0; i < count; i++) {
4e86f725
FJ
847 if (table[i].addr == addr)
848 return &table[i];
351e3db2
BV
849 }
850 }
851
4e86f725 852 return NULL;
351e3db2
BV
853}
854
17cabf57
CW
855static u32 *vmap_batch(struct drm_i915_gem_object *obj,
856 unsigned start, unsigned len)
351e3db2
BV
857{
858 int i;
859 void *addr = NULL;
860 struct sg_page_iter sg_iter;
17cabf57
CW
861 int first_page = start >> PAGE_SHIFT;
862 int last_page = (len + start + 4095) >> PAGE_SHIFT;
863 int npages = last_page - first_page;
351e3db2
BV
864 struct page **pages;
865
17cabf57 866 pages = drm_malloc_ab(npages, sizeof(*pages));
351e3db2
BV
867 if (pages == NULL) {
868 DRM_DEBUG_DRIVER("Failed to get space for pages\n");
869 goto finish;
870 }
871
872 i = 0;
72c5ba95 873 for_each_sg_page(obj->pages->sgl, &sg_iter, obj->pages->nents, first_page) {
17cabf57 874 pages[i++] = sg_page_iter_page(&sg_iter);
72c5ba95
MK
875 if (i == npages)
876 break;
877 }
351e3db2
BV
878
879 addr = vmap(pages, i, 0, PAGE_KERNEL);
880 if (addr == NULL) {
881 DRM_DEBUG_DRIVER("Failed to vmap pages\n");
882 goto finish;
883 }
884
885finish:
886 if (pages)
887 drm_free_large(pages);
888 return (u32*)addr;
889}
890
78a42377
BV
891/* Returns a vmap'd pointer to dest_obj, which the caller must unmap */
892static u32 *copy_batch(struct drm_i915_gem_object *dest_obj,
b9ffd80e
BV
893 struct drm_i915_gem_object *src_obj,
894 u32 batch_start_offset,
895 u32 batch_len)
78a42377 896{
78a42377 897 int needs_clflush = 0;
17cabf57
CW
898 void *src_base, *src;
899 void *dst = NULL;
900 int ret;
b9ffd80e 901
17cabf57
CW
902 if (batch_len > dest_obj->base.size ||
903 batch_len + batch_start_offset > src_obj->base.size)
b9ffd80e 904 return ERR_PTR(-E2BIG);
78a42377 905
de4e783a
CW
906 if (WARN_ON(dest_obj->pages_pin_count == 0))
907 return ERR_PTR(-ENODEV);
908
78a42377
BV
909 ret = i915_gem_obj_prepare_shmem_read(src_obj, &needs_clflush);
910 if (ret) {
17cabf57 911 DRM_DEBUG_DRIVER("CMD: failed to prepare shadow batch\n");
78a42377
BV
912 return ERR_PTR(ret);
913 }
914
17cabf57 915 src_base = vmap_batch(src_obj, batch_start_offset, batch_len);
b9ffd80e 916 if (!src_base) {
78a42377
BV
917 DRM_DEBUG_DRIVER("CMD: Failed to vmap batch\n");
918 ret = -ENOMEM;
919 goto unpin_src;
920 }
921
78a42377
BV
922 ret = i915_gem_object_set_to_cpu_domain(dest_obj, true);
923 if (ret) {
17cabf57 924 DRM_DEBUG_DRIVER("CMD: Failed to set shadow batch to CPU\n");
78a42377
BV
925 goto unmap_src;
926 }
927
17cabf57
CW
928 dst = vmap_batch(dest_obj, 0, batch_len);
929 if (!dst) {
78a42377
BV
930 DRM_DEBUG_DRIVER("CMD: Failed to vmap shadow batch\n");
931 ret = -ENOMEM;
932 goto unmap_src;
933 }
934
17cabf57
CW
935 src = src_base + offset_in_page(batch_start_offset);
936 if (needs_clflush)
937 drm_clflush_virt_range(src, batch_len);
b9ffd80e 938
17cabf57 939 memcpy(dst, src, batch_len);
78a42377
BV
940
941unmap_src:
b9ffd80e 942 vunmap(src_base);
78a42377
BV
943unpin_src:
944 i915_gem_object_unpin_pages(src_obj);
945
17cabf57 946 return ret ? ERR_PTR(ret) : dst;
78a42377
BV
947}
948
351e3db2
BV
949/**
950 * i915_needs_cmd_parser() - should a given ring use software command parsing?
951 * @ring: the ring in question
952 *
953 * Only certain platforms require software batch buffer command parsing, and
32197aab 954 * only when enabled via module parameter.
351e3db2
BV
955 *
956 * Return: true if the ring requires software command parsing
957 */
a4872ba6 958bool i915_needs_cmd_parser(struct intel_engine_cs *ring)
351e3db2 959{
44e895a8 960 if (!ring->needs_cmd_parser)
351e3db2
BV
961 return false;
962
9beb0ccb 963 if (!USES_PPGTT(ring->dev))
d4d48035
BV
964 return false;
965
351e3db2
BV
966 return (i915.enable_cmd_parser == 1);
967}
968
a4872ba6 969static bool check_cmd(const struct intel_engine_cs *ring,
b651000b 970 const struct drm_i915_cmd_descriptor *desc,
6a65c5b9 971 const u32 *cmd, u32 length,
6e66ea13
BV
972 const bool is_master,
973 bool *oacontrol_set)
b651000b
BV
974{
975 if (desc->flags & CMD_DESC_REJECT) {
976 DRM_DEBUG_DRIVER("CMD: Rejected command: 0x%08X\n", *cmd);
977 return false;
978 }
979
980 if ((desc->flags & CMD_DESC_MASTER) && !is_master) {
981 DRM_DEBUG_DRIVER("CMD: Rejected master-only command: 0x%08X\n",
982 *cmd);
983 return false;
984 }
985
986 if (desc->flags & CMD_DESC_REGISTER) {
6e66ea13 987 /*
6a65c5b9
FJ
988 * Get the distance between individual register offset
989 * fields if the command can perform more than one
990 * access at a time.
6e66ea13 991 */
6a65c5b9
FJ
992 const u32 step = desc->reg.step ? desc->reg.step : length;
993 u32 offset;
994
995 for (offset = desc->reg.offset; offset < length;
996 offset += step) {
997 const u32 reg_addr = cmd[offset] & desc->reg.mask;
4e86f725
FJ
998 const struct drm_i915_reg_descriptor *reg =
999 find_reg(ring->reg_table, ring->reg_count,
1000 reg_addr);
1001
1002 if (!reg && is_master)
1003 reg = find_reg(ring->master_reg_table,
1004 ring->master_reg_count,
1005 reg_addr);
1006
1007 if (!reg) {
1008 DRM_DEBUG_DRIVER("CMD: Rejected register 0x%08X in command: 0x%08X (ring=%d)\n",
1009 reg_addr, *cmd, ring->id);
1010 return false;
1011 }
6a65c5b9
FJ
1012
1013 /*
1014 * OACONTROL requires some special handling for
1015 * writes. We want to make sure that any batch which
1016 * enables OA also disables it before the end of the
1017 * batch. The goal is to prevent one process from
1018 * snooping on the perf data from another process. To do
1019 * that, we need to check the value that will be written
1020 * to the register. Hence, limit OACONTROL writes to
1021 * only MI_LOAD_REGISTER_IMM commands.
1022 */
1023 if (reg_addr == OACONTROL) {
9e000847 1024 if (desc->cmd.value == MI_LOAD_REGISTER_MEM(1)) {
6a65c5b9
FJ
1025 DRM_DEBUG_DRIVER("CMD: Rejected LRM to OACONTROL\n");
1026 return false;
1027 }
1028
1029 if (desc->cmd.value == MI_LOAD_REGISTER_IMM(1))
1030 *oacontrol_set = (cmd[offset + 1] != 0);
00caf019 1031 }
6e66ea13 1032
4e86f725
FJ
1033 /*
1034 * Check the value written to the register against the
1035 * allowed mask/value pair given in the whitelist entry.
1036 */
1037 if (reg->mask) {
9e000847 1038 if (desc->cmd.value == MI_LOAD_REGISTER_MEM(1)) {
4e86f725
FJ
1039 DRM_DEBUG_DRIVER("CMD: Rejected LRM to masked register 0x%08X\n",
1040 reg_addr);
1041 return false;
1042 }
1043
1044 if (desc->cmd.value == MI_LOAD_REGISTER_IMM(1) &&
1045 (offset + 2 > length ||
1046 (cmd[offset + 1] & reg->mask) != reg->value)) {
1047 DRM_DEBUG_DRIVER("CMD: Rejected LRI to masked register 0x%08X\n",
1048 reg_addr);
6a65c5b9
FJ
1049 return false;
1050 }
b651000b
BV
1051 }
1052 }
1053 }
1054
1055 if (desc->flags & CMD_DESC_BITMASK) {
1056 int i;
1057
1058 for (i = 0; i < MAX_CMD_DESC_BITMASKS; i++) {
1059 u32 dword;
1060
1061 if (desc->bits[i].mask == 0)
1062 break;
1063
1064 if (desc->bits[i].condition_mask != 0) {
1065 u32 offset =
1066 desc->bits[i].condition_offset;
1067 u32 condition = cmd[offset] &
1068 desc->bits[i].condition_mask;
1069
1070 if (condition == 0)
1071 continue;
1072 }
1073
1074 dword = cmd[desc->bits[i].offset] &
1075 desc->bits[i].mask;
1076
1077 if (dword != desc->bits[i].expected) {
1078 DRM_DEBUG_DRIVER("CMD: Rejected command 0x%08X for bitmask 0x%08X (exp=0x%08X act=0x%08X) (ring=%d)\n",
1079 *cmd,
1080 desc->bits[i].mask,
1081 desc->bits[i].expected,
1082 dword, ring->id);
1083 return false;
1084 }
1085 }
1086 }
1087
1088 return true;
1089}
1090
351e3db2
BV
1091#define LENGTH_BIAS 2
1092
1093/**
1094 * i915_parse_cmds() - parse a submitted batch buffer for privilege violations
1095 * @ring: the ring on which the batch is to execute
1096 * @batch_obj: the batch buffer in question
78a42377 1097 * @shadow_batch_obj: copy of the batch buffer in question
351e3db2 1098 * @batch_start_offset: byte offset in the batch at which execution starts
b9ffd80e 1099 * @batch_len: length of the commands in batch_obj
351e3db2
BV
1100 * @is_master: is the submitting process the drm master?
1101 *
1102 * Parses the specified batch buffer looking for privilege violations as
1103 * described in the overview.
1104 *
42c7156a
BV
1105 * Return: non-zero if the parser finds violations or otherwise fails; -EACCES
1106 * if the batch appears legal but should use hardware parsing
351e3db2 1107 */
a4872ba6 1108int i915_parse_cmds(struct intel_engine_cs *ring,
351e3db2 1109 struct drm_i915_gem_object *batch_obj,
78a42377 1110 struct drm_i915_gem_object *shadow_batch_obj,
351e3db2 1111 u32 batch_start_offset,
b9ffd80e 1112 u32 batch_len,
351e3db2
BV
1113 bool is_master)
1114{
351e3db2
BV
1115 u32 *cmd, *batch_base, *batch_end;
1116 struct drm_i915_cmd_descriptor default_desc = { 0 };
6e66ea13 1117 bool oacontrol_set = false; /* OACONTROL tracking. See check_cmd() */
17cabf57 1118 int ret = 0;
71745376 1119
b9ffd80e
BV
1120 batch_base = copy_batch(shadow_batch_obj, batch_obj,
1121 batch_start_offset, batch_len);
78a42377
BV
1122 if (IS_ERR(batch_base)) {
1123 DRM_DEBUG_DRIVER("CMD: Failed to copy batch\n");
1124 return PTR_ERR(batch_base);
351e3db2
BV
1125 }
1126
78a42377 1127 /*
b9ffd80e 1128 * We use the batch length as size because the shadow object is as
78a42377
BV
1129 * large or larger and copy_batch() will write MI_NOPs to the extra
1130 * space. Parsing should be faster in some cases this way.
1131 */
17cabf57 1132 batch_end = batch_base + (batch_len / sizeof(*batch_end));
351e3db2 1133
17cabf57 1134 cmd = batch_base;
351e3db2
BV
1135 while (cmd < batch_end) {
1136 const struct drm_i915_cmd_descriptor *desc;
1137 u32 length;
1138
1139 if (*cmd == MI_BATCH_BUFFER_END)
1140 break;
1141
1142 desc = find_cmd(ring, *cmd, &default_desc);
1143 if (!desc) {
1144 DRM_DEBUG_DRIVER("CMD: Unrecognized command: 0x%08X\n",
1145 *cmd);
1146 ret = -EINVAL;
1147 break;
1148 }
1149
42c7156a
BV
1150 /*
1151 * If the batch buffer contains a chained batch, return an
1152 * error that tells the caller to abort and dispatch the
1153 * workload as a non-secure batch.
1154 */
1155 if (desc->cmd.value == MI_BATCH_BUFFER_START) {
1156 ret = -EACCES;
1157 break;
1158 }
1159
351e3db2
BV
1160 if (desc->flags & CMD_DESC_FIXED)
1161 length = desc->length.fixed;
1162 else
1163 length = ((*cmd & desc->length.mask) + LENGTH_BIAS);
1164
1165 if ((batch_end - cmd) < length) {
86a25121 1166 DRM_DEBUG_DRIVER("CMD: Command length exceeds batch length: 0x%08X length=%u batchlen=%td\n",
351e3db2
BV
1167 *cmd,
1168 length,
4b6eab59 1169 batch_end - cmd);
351e3db2
BV
1170 ret = -EINVAL;
1171 break;
1172 }
1173
6a65c5b9
FJ
1174 if (!check_cmd(ring, desc, cmd, length, is_master,
1175 &oacontrol_set)) {
351e3db2
BV
1176 ret = -EINVAL;
1177 break;
1178 }
1179
351e3db2
BV
1180 cmd += length;
1181 }
1182
6e66ea13
BV
1183 if (oacontrol_set) {
1184 DRM_DEBUG_DRIVER("CMD: batch set OACONTROL but did not clear it\n");
1185 ret = -EINVAL;
1186 }
1187
351e3db2
BV
1188 if (cmd >= batch_end) {
1189 DRM_DEBUG_DRIVER("CMD: Got to the end of the buffer w/o a BBE cmd!\n");
1190 ret = -EINVAL;
1191 }
1192
1193 vunmap(batch_base);
1194
351e3db2
BV
1195 return ret;
1196}
d728c8ef
BV
1197
1198/**
1199 * i915_cmd_parser_get_version() - get the cmd parser version number
1200 *
1201 * The cmd parser maintains a simple increasing integer version number suitable
1202 * for passing to userspace clients to determine what operations are permitted.
1203 *
1204 * Return: the current version number of the cmd parser
1205 */
1206int i915_cmd_parser_get_version(void)
1207{
1208 /*
1209 * Command parser version history
1210 *
1211 * 1. Initial version. Checks batches and reports violations, but leaves
1212 * hardware parsing enabled (so does not allow new use cases).
f1f55cc0
NR
1213 * 2. Allow access to the MI_PREDICATE_SRC0 and
1214 * MI_PREDICATE_SRC1 registers.
c61200c2 1215 * 3. Allow access to the GPGPU_THREADS_DISPATCHED register.
d728c8ef 1216 */
c61200c2 1217 return 3;
d728c8ef 1218}
This page took 0.238923 seconds and 5 git commands to generate.