1 /*
2  * Copyright 2016-2018 Advanced Micro Devices, Inc.
3  *
4  * Permission is hereby granted, free of charge, to any person obtaining a
5  * copy of this software and associated documentation files (the "Software"),
6  * to deal in the Software without restriction, including without limitation
7  * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8  * and/or sell copies of the Software, and to permit persons to whom the
9  * Software is furnished to do so, subject to the following conditions:
10  *
11  * The above copyright notice and this permission notice shall be included in
12  * all copies or substantial portions of the Software.
13  *
14  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
17  * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
18  * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
19  * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
20  * OTHER DEALINGS IN THE SOFTWARE.
21  */
22 
23 #include "kfd_priv.h"
24 #include "kfd_events.h"
25 #include "soc15_int.h"
26 #include "kfd_device_queue_manager.h"
27 #include "kfd_smi_events.h"
28 
29 static bool event_interrupt_isr_v9(struct kfd_dev *dev,
30 					const uint32_t *ih_ring_entry,
31 					uint32_t *patched_ihre,
32 					bool *patched_flag)
33 {
34 	uint16_t source_id, client_id, pasid, vmid;
35 	const uint32_t *data = ih_ring_entry;
36 
37 	/* Only handle interrupts from KFD VMIDs */
38 	vmid = SOC15_VMID_FROM_IH_ENTRY(ih_ring_entry);
39 	if (vmid < dev->vm_info.first_vmid_kfd ||
40 	    vmid > dev->vm_info.last_vmid_kfd)
41 		return false;
42 
43 	source_id = SOC15_SOURCE_ID_FROM_IH_ENTRY(ih_ring_entry);
44 	client_id = SOC15_CLIENT_ID_FROM_IH_ENTRY(ih_ring_entry);
45 	pasid = SOC15_PASID_FROM_IH_ENTRY(ih_ring_entry);
46 
47 	/* This is a known issue for gfx9. Under non HWS, pasid is not set
48 	 * in the interrupt payload, so we need to find out the pasid on our
49 	 * own.
50 	 */
51 	if (!pasid && dev->dqm->sched_policy == KFD_SCHED_POLICY_NO_HWS) {
52 		const uint32_t pasid_mask = 0xffff;
53 
54 		*patched_flag = true;
55 		memcpy(patched_ihre, ih_ring_entry,
56 				dev->device_info->ih_ring_entry_size);
57 
58 		pasid = dev->dqm->vmid_pasid[vmid];
59 
60 		/* Patch the pasid field */
61 		patched_ihre[3] = cpu_to_le32((le32_to_cpu(patched_ihre[3])
62 					& ~pasid_mask) | pasid);
63 	}
64 
65 	pr_debug("client id 0x%x, source id %d, vmid %d, pasid 0x%x. raw data:\n",
66 		 client_id, source_id, vmid, pasid);
67 	pr_debug("%8X, %8X, %8X, %8X, %8X, %8X, %8X, %8X.\n",
68 		 data[0], data[1], data[2], data[3],
69 		 data[4], data[5], data[6], data[7]);
70 
71 	/* If there is no valid PASID, it's likely a bug */
72 	if (WARN_ONCE(pasid == 0, "Bug: No PASID in KFD interrupt"))
73 		return false;
74 
75 	/* Interrupt types we care about: various signals and faults.
76 	 * They will be forwarded to a work queue (see below).
77 	 */
78 	return source_id == SOC15_INTSRC_CP_END_OF_PIPE ||
79 		source_id == SOC15_INTSRC_SDMA_TRAP ||
80 		source_id == SOC15_INTSRC_SQ_INTERRUPT_MSG ||
81 		source_id == SOC15_INTSRC_CP_BAD_OPCODE ||
82 		client_id == SOC15_IH_CLIENTID_VMC ||
83 		client_id == SOC15_IH_CLIENTID_VMC1 ||
84 		client_id == SOC15_IH_CLIENTID_UTCL2;
85 }
86 
87 static void event_interrupt_wq_v9(struct kfd_dev *dev,
88 					const uint32_t *ih_ring_entry)
89 {
90 	uint16_t source_id, client_id, pasid, vmid;
91 	uint32_t context_id;
92 
93 	source_id = SOC15_SOURCE_ID_FROM_IH_ENTRY(ih_ring_entry);
94 	client_id = SOC15_CLIENT_ID_FROM_IH_ENTRY(ih_ring_entry);
95 	pasid = SOC15_PASID_FROM_IH_ENTRY(ih_ring_entry);
96 	vmid = SOC15_VMID_FROM_IH_ENTRY(ih_ring_entry);
97 	context_id = SOC15_CONTEXT_ID0_FROM_IH_ENTRY(ih_ring_entry);
98 
99 	if (source_id == SOC15_INTSRC_CP_END_OF_PIPE)
100 		kfd_signal_event_interrupt(pasid, context_id, 32);
101 	else if (source_id == SOC15_INTSRC_SDMA_TRAP)
102 		kfd_signal_event_interrupt(pasid, context_id & 0xfffffff, 28);
103 	else if (source_id == SOC15_INTSRC_SQ_INTERRUPT_MSG)
104 		kfd_signal_event_interrupt(pasid, context_id & 0xffffff, 24);
105 	else if (source_id == SOC15_INTSRC_CP_BAD_OPCODE)
106 		kfd_signal_hw_exception_event(pasid);
107 	else if (client_id == SOC15_IH_CLIENTID_VMC ||
108 		client_id == SOC15_IH_CLIENTID_VMC1 ||
109 		 client_id == SOC15_IH_CLIENTID_UTCL2) {
110 		struct kfd_vm_fault_info info = {0};
111 		uint16_t ring_id = SOC15_RING_ID_FROM_IH_ENTRY(ih_ring_entry);
112 
113 		info.vmid = vmid;
114 		info.mc_id = client_id;
115 		info.page_addr = ih_ring_entry[4] |
116 			(uint64_t)(ih_ring_entry[5] & 0xf) << 32;
117 		info.prot_valid = ring_id & 0x08;
118 		info.prot_read  = ring_id & 0x10;
119 		info.prot_write = ring_id & 0x20;
120 
121 		kfd_smi_event_update_vmfault(dev, pasid);
122 		kfd_process_vm_fault(dev->dqm, pasid);
123 		kfd_signal_vm_fault_event(dev, pasid, &info);
124 	}
125 }
126 
127 const struct kfd_event_interrupt_class event_interrupt_class_v9 = {
128 	.interrupt_isr = event_interrupt_isr_v9,
129 	.interrupt_wq = event_interrupt_wq_v9,
130 };
131