firewall.c 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /* Copyright (c) 2010-2020 NVIDIA Corporation */
  3. #include "drm.h"
  4. #include "submit.h"
  5. #include "uapi.h"
  6. struct tegra_drm_firewall {
  7. struct tegra_drm_submit_data *submit;
  8. struct tegra_drm_client *client;
  9. u32 *data;
  10. u32 pos;
  11. u32 end;
  12. u32 class;
  13. };
  14. static int fw_next(struct tegra_drm_firewall *fw, u32 *word)
  15. {
  16. if (fw->pos == fw->end)
  17. return -EINVAL;
  18. *word = fw->data[fw->pos++];
  19. return 0;
  20. }
  21. static bool fw_check_addr_valid(struct tegra_drm_firewall *fw, u32 offset)
  22. {
  23. u32 i;
  24. for (i = 0; i < fw->submit->num_used_mappings; i++) {
  25. struct tegra_drm_mapping *m = fw->submit->used_mappings[i].mapping;
  26. if (offset >= m->iova && offset <= m->iova_end)
  27. return true;
  28. }
  29. return false;
  30. }
  31. static int fw_check_reg(struct tegra_drm_firewall *fw, u32 offset)
  32. {
  33. bool is_addr;
  34. u32 word;
  35. int err;
  36. err = fw_next(fw, &word);
  37. if (err)
  38. return err;
  39. if (!fw->client->ops->is_addr_reg)
  40. return 0;
  41. is_addr = fw->client->ops->is_addr_reg(fw->client->base.dev, fw->class,
  42. offset);
  43. if (!is_addr)
  44. return 0;
  45. if (!fw_check_addr_valid(fw, word))
  46. return -EINVAL;
  47. return 0;
  48. }
  49. static int fw_check_regs_seq(struct tegra_drm_firewall *fw, u32 offset,
  50. u32 count, bool incr)
  51. {
  52. u32 i;
  53. for (i = 0; i < count; i++) {
  54. if (fw_check_reg(fw, offset))
  55. return -EINVAL;
  56. if (incr)
  57. offset++;
  58. }
  59. return 0;
  60. }
  61. static int fw_check_regs_mask(struct tegra_drm_firewall *fw, u32 offset,
  62. u16 mask)
  63. {
  64. unsigned long bmask = mask;
  65. unsigned int bit;
  66. for_each_set_bit(bit, &bmask, 16) {
  67. if (fw_check_reg(fw, offset+bit))
  68. return -EINVAL;
  69. }
  70. return 0;
  71. }
  72. static int fw_check_regs_imm(struct tegra_drm_firewall *fw, u32 offset)
  73. {
  74. bool is_addr;
  75. if (!fw->client->ops->is_addr_reg)
  76. return 0;
  77. is_addr = fw->client->ops->is_addr_reg(fw->client->base.dev, fw->class,
  78. offset);
  79. if (is_addr)
  80. return -EINVAL;
  81. return 0;
  82. }
  83. static int fw_check_class(struct tegra_drm_firewall *fw, u32 class)
  84. {
  85. if (!fw->client->ops->is_valid_class) {
  86. if (class == fw->client->base.class)
  87. return 0;
  88. else
  89. return -EINVAL;
  90. }
  91. if (!fw->client->ops->is_valid_class(class))
  92. return -EINVAL;
  93. return 0;
  94. }
  95. enum {
  96. HOST1X_OPCODE_SETCLASS = 0x00,
  97. HOST1X_OPCODE_INCR = 0x01,
  98. HOST1X_OPCODE_NONINCR = 0x02,
  99. HOST1X_OPCODE_MASK = 0x03,
  100. HOST1X_OPCODE_IMM = 0x04,
  101. HOST1X_OPCODE_RESTART = 0x05,
  102. HOST1X_OPCODE_GATHER = 0x06,
  103. HOST1X_OPCODE_SETSTRMID = 0x07,
  104. HOST1X_OPCODE_SETAPPID = 0x08,
  105. HOST1X_OPCODE_SETPYLD = 0x09,
  106. HOST1X_OPCODE_INCR_W = 0x0a,
  107. HOST1X_OPCODE_NONINCR_W = 0x0b,
  108. HOST1X_OPCODE_GATHER_W = 0x0c,
  109. HOST1X_OPCODE_RESTART_W = 0x0d,
  110. HOST1X_OPCODE_EXTEND = 0x0e,
  111. };
  112. int tegra_drm_fw_validate(struct tegra_drm_client *client, u32 *data, u32 start,
  113. u32 words, struct tegra_drm_submit_data *submit,
  114. u32 *job_class)
  115. {
  116. struct tegra_drm_firewall fw = {
  117. .submit = submit,
  118. .client = client,
  119. .data = data,
  120. .pos = start,
  121. .end = start+words,
  122. .class = *job_class,
  123. };
  124. bool payload_valid = false;
  125. u32 payload;
  126. int err;
  127. while (fw.pos != fw.end) {
  128. u32 word, opcode, offset, count, mask, class;
  129. err = fw_next(&fw, &word);
  130. if (err)
  131. return err;
  132. opcode = (word & 0xf0000000) >> 28;
  133. switch (opcode) {
  134. case HOST1X_OPCODE_SETCLASS:
  135. offset = word >> 16 & 0xfff;
  136. mask = word & 0x3f;
  137. class = (word >> 6) & 0x3ff;
  138. err = fw_check_class(&fw, class);
  139. fw.class = class;
  140. *job_class = class;
  141. if (!err)
  142. err = fw_check_regs_mask(&fw, offset, mask);
  143. if (err)
  144. dev_warn(client->base.dev,
  145. "illegal SETCLASS(offset=0x%x, mask=0x%x, class=0x%x) at word %u",
  146. offset, mask, class, fw.pos-1);
  147. break;
  148. case HOST1X_OPCODE_INCR:
  149. offset = (word >> 16) & 0xfff;
  150. count = word & 0xffff;
  151. err = fw_check_regs_seq(&fw, offset, count, true);
  152. if (err)
  153. dev_warn(client->base.dev,
  154. "illegal INCR(offset=0x%x, count=%u) in class 0x%x at word %u",
  155. offset, count, fw.class, fw.pos-1);
  156. break;
  157. case HOST1X_OPCODE_NONINCR:
  158. offset = (word >> 16) & 0xfff;
  159. count = word & 0xffff;
  160. err = fw_check_regs_seq(&fw, offset, count, false);
  161. if (err)
  162. dev_warn(client->base.dev,
  163. "illegal NONINCR(offset=0x%x, count=%u) in class 0x%x at word %u",
  164. offset, count, fw.class, fw.pos-1);
  165. break;
  166. case HOST1X_OPCODE_MASK:
  167. offset = (word >> 16) & 0xfff;
  168. mask = word & 0xffff;
  169. err = fw_check_regs_mask(&fw, offset, mask);
  170. if (err)
  171. dev_warn(client->base.dev,
  172. "illegal MASK(offset=0x%x, mask=0x%x) in class 0x%x at word %u",
  173. offset, mask, fw.class, fw.pos-1);
  174. break;
  175. case HOST1X_OPCODE_IMM:
  176. /* IMM cannot reasonably be used to write a pointer */
  177. offset = (word >> 16) & 0xfff;
  178. err = fw_check_regs_imm(&fw, offset);
  179. if (err)
  180. dev_warn(client->base.dev,
  181. "illegal IMM(offset=0x%x) in class 0x%x at word %u",
  182. offset, fw.class, fw.pos-1);
  183. break;
  184. case HOST1X_OPCODE_SETPYLD:
  185. payload = word & 0xffff;
  186. payload_valid = true;
  187. break;
  188. case HOST1X_OPCODE_INCR_W:
  189. if (!payload_valid)
  190. return -EINVAL;
  191. offset = word & 0x3fffff;
  192. err = fw_check_regs_seq(&fw, offset, payload, true);
  193. if (err)
  194. dev_warn(client->base.dev,
  195. "illegal INCR_W(offset=0x%x) in class 0x%x at word %u",
  196. offset, fw.class, fw.pos-1);
  197. break;
  198. case HOST1X_OPCODE_NONINCR_W:
  199. if (!payload_valid)
  200. return -EINVAL;
  201. offset = word & 0x3fffff;
  202. err = fw_check_regs_seq(&fw, offset, payload, false);
  203. if (err)
  204. dev_warn(client->base.dev,
  205. "illegal NONINCR(offset=0x%x) in class 0x%x at word %u",
  206. offset, fw.class, fw.pos-1);
  207. break;
  208. default:
  209. dev_warn(client->base.dev, "illegal opcode at word %u",
  210. fw.pos-1);
  211. return -EINVAL;
  212. }
  213. if (err)
  214. return err;
  215. }
  216. return 0;
  217. }