1/*
2 * Copyright 2016-2018 Advanced Micro Devices, Inc.
3 *
4 * Permission is hereby granted, free of charge, to any person obtaining a
5 * copy of this software and associated documentation files (the "Software"),
6 * to deal in the Software without restriction, including without limitation
7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8 * and/or sell copies of the Software, and to permit persons to whom the
9 * Software is furnished to do so, subject to the following conditions:
10 *
11 * The above copyright notice and this permission notice shall be included in
12 * all copies or substantial portions of the Software.
13 *
14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
18 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
20 * OTHER DEALINGS IN THE SOFTWARE.
21 */
22
23#include "kfd_priv.h"
24#include "kfd_events.h"
25#include "soc15_int.h"
26#include "kfd_device_queue_manager.h"
27
28static bool event_interrupt_isr_v9(struct kfd_dev *dev,
29 const uint32_t *ih_ring_entry,
30 uint32_t *patched_ihre,
31 bool *patched_flag)
32{
33 uint16_t source_id, client_id, pasid, vmid;
34 const uint32_t *data = ih_ring_entry;
35
36 /* Only handle interrupts from KFD VMIDs */
37 vmid = SOC15_VMID_FROM_IH_ENTRY(ih_ring_entry);
38 if (vmid < dev->vm_info.first_vmid_kfd ||
39 vmid > dev->vm_info.last_vmid_kfd)
40 return 0;
41
42 source_id = SOC15_SOURCE_ID_FROM_IH_ENTRY(ih_ring_entry);
43 client_id = SOC15_CLIENT_ID_FROM_IH_ENTRY(ih_ring_entry);
44 pasid = SOC15_PASID_FROM_IH_ENTRY(ih_ring_entry);
45
46 /* This is a known issue for gfx9. Under non HWS, pasid is not set
47 * in the interrupt payload, so we need to find out the pasid on our
48 * own.
49 */
50 if (!pasid && dev->dqm->sched_policy == KFD_SCHED_POLICY_NO_HWS) {
51 const uint32_t pasid_mask = 0xffff;
52
53 *patched_flag = true;
54 memcpy(patched_ihre, ih_ring_entry,
55 dev->device_info->ih_ring_entry_size);
56
57 pasid = dev->kfd2kgd->get_atc_vmid_pasid_mapping_pasid(
58 dev->kgd, vmid);
59
60 /* Patch the pasid field */
61 patched_ihre[3] = cpu_to_le32((le32_to_cpu(patched_ihre[3])
62 & ~pasid_mask) | pasid);
63 }
64
65 pr_debug("client id 0x%x, source id %d, vmid %d, pasid 0x%x. raw data:\n",
66 client_id, source_id, vmid, pasid);
67 pr_debug("%8X, %8X, %8X, %8X, %8X, %8X, %8X, %8X.\n",
68 data[0], data[1], data[2], data[3],
69 data[4], data[5], data[6], data[7]);
70
71 /* If there is no valid PASID, it's likely a bug */
72 if (WARN_ONCE(pasid == 0, "Bug: No PASID in KFD interrupt"))
73 return 0;
74
75 /* Interrupt types we care about: various signals and faults.
76 * They will be forwarded to a work queue (see below).
77 */
78 return source_id == SOC15_INTSRC_CP_END_OF_PIPE ||
79 source_id == SOC15_INTSRC_SDMA_TRAP ||
80 source_id == SOC15_INTSRC_SQ_INTERRUPT_MSG ||
81 source_id == SOC15_INTSRC_CP_BAD_OPCODE ||
82 client_id == SOC15_IH_CLIENTID_VMC ||
83 client_id == SOC15_IH_CLIENTID_UTCL2;
84}
85
86static void event_interrupt_wq_v9(struct kfd_dev *dev,
87 const uint32_t *ih_ring_entry)
88{
89 uint16_t source_id, client_id, pasid, vmid;
90 uint32_t context_id;
91
92 source_id = SOC15_SOURCE_ID_FROM_IH_ENTRY(ih_ring_entry);
93 client_id = SOC15_CLIENT_ID_FROM_IH_ENTRY(ih_ring_entry);
94 pasid = SOC15_PASID_FROM_IH_ENTRY(ih_ring_entry);
95 vmid = SOC15_VMID_FROM_IH_ENTRY(ih_ring_entry);
96 context_id = SOC15_CONTEXT_ID0_FROM_IH_ENTRY(ih_ring_entry);
97
98 if (source_id == SOC15_INTSRC_CP_END_OF_PIPE)
99 kfd_signal_event_interrupt(pasid, context_id, 32);
100 else if (source_id == SOC15_INTSRC_SDMA_TRAP)
101 kfd_signal_event_interrupt(pasid, context_id & 0xfffffff, 28);
102 else if (source_id == SOC15_INTSRC_SQ_INTERRUPT_MSG)
103 kfd_signal_event_interrupt(pasid, context_id & 0xffffff, 24);
104 else if (source_id == SOC15_INTSRC_CP_BAD_OPCODE)
105 kfd_signal_hw_exception_event(pasid);
106 else if (client_id == SOC15_IH_CLIENTID_VMC ||
107 client_id == SOC15_IH_CLIENTID_UTCL2) {
108 struct kfd_vm_fault_info info = {0};
109 uint16_t ring_id = SOC15_RING_ID_FROM_IH_ENTRY(ih_ring_entry);
110
111 info.vmid = vmid;
112 info.mc_id = client_id;
113 info.page_addr = ih_ring_entry[4] |
114 (uint64_t)(ih_ring_entry[5] & 0xf) << 32;
115 info.prot_valid = ring_id & 0x08;
116 info.prot_read = ring_id & 0x10;
117 info.prot_write = ring_id & 0x20;
118
119 kfd_process_vm_fault(dev->dqm, pasid);
120 kfd_signal_vm_fault_event(dev, pasid, &info);
121 }
122}
123
124const struct kfd_event_interrupt_class event_interrupt_class_v9 = {
125 .interrupt_isr = event_interrupt_isr_v9,
126 .interrupt_wq = event_interrupt_wq_v9,
127};
128