From: Akhil P Oommen <quic_akhilpo@quicinc.com>
To: Elliot Berman <quic_eberman@quicinc.com>
Cc: Rob Clark <robdclark@gmail.com>, Sean Paul <sean@poorly.run>,
"Konrad Dybcio" <konradybcio@kernel.org>,
Abhinav Kumar <quic_abhinavk@quicinc.com>,
Dmitry Baryshkov <dmitry.baryshkov@linaro.org>,
Marijn Suijten <marijn.suijten@somainline.org>,
David Airlie <airlied@gmail.com>,
"Simona Vetter" <simona@ffwll.ch>,
Pavan Kondeti <quic_pkondeti@quicinc.com>,
<linux-arm-msm@vger.kernel.org>,
<dri-devel@lists.freedesktop.org>,
<freedreno@lists.freedesktop.org>, <linux-kernel@vger.kernel.org>,
<linux-arm-kernel@lists.infradead.org>
Subject: Re: [PATCH] drm/msm/a6xx: Skip gpu secure fw load in EL2 mode
Date: Wed, 11 Dec 2024 08:39:21 +0530 [thread overview]
Message-ID: <0df78884-e734-4d34-adf0-c5cba2a0d9da@quicinc.com> (raw)
In-Reply-To: <20241210125012120-0800.eberman@hu-eberman-lv.qualcomm.com>
On 12/11/2024 2:24 AM, Elliot Berman wrote:
> On Mon, Dec 09, 2024 at 01:49:15PM +0530, Akhil P Oommen wrote:
>> When kernel is booted in EL2, SECVID registers are accessible to the
>> KMD. So we can use that to switch GPU's secure mode to avoid dependency
>> on Zap firmware. Also, we can't load a secure firmware without a
>> hypervisor that supports it.
>>
>> Tested following configurations on sa8775p chipset (Adreno 663 gpu):
>>
>> 1. Gunyah (No KVM) - Loads zap shader based on DT
>> 2. KVM in VHE - Skips zap shader load and programs SECVID register
>> 3. KVM in nVHE - Loads zap shader based on DT
>
> I think this might be misleading. As I understand, KVM in nVHE doesn't
> support loading secure firmware. I'm not aware of any support added to
> make it work. So, the driver will try to load zap shader and it fails
> same as it does today.
>
I see that now. I was trying to document the decision logic in each case.
-Akhil.
>> 4. Kernel in EL2 with CONFIG_KVM=n - Skips zap shader load and
>> programs SECVID register
>>
>> For (1) and (3) configuration, this patch doesn't have any impact.
>> Driver loads secure firmware based on other existing hints.
>>
>> Signed-off-by: Akhil P Oommen <quic_akhilpo@quicinc.com>
>> ---
>> ---
>> drivers/gpu/drm/msm/adreno/a6xx_gpu.c | 82 +++++++++++++++++++++++------------
>> 1 file changed, 54 insertions(+), 28 deletions(-)
>>
>> diff --git a/drivers/gpu/drm/msm/adreno/a6xx_gpu.c b/drivers/gpu/drm/msm/adreno/a6xx_gpu.c
>> index 019610341df1..9dcaa8472430 100644
>> --- a/drivers/gpu/drm/msm/adreno/a6xx_gpu.c
>> +++ b/drivers/gpu/drm/msm/adreno/a6xx_gpu.c
>> @@ -14,6 +14,10 @@
>> #include <linux/pm_domain.h>
>> #include <linux/soc/qcom/llcc-qcom.h>
>>
>> +#ifdef CONFIG_ARM64
>> +#include <asm/virt.h>
>> +#endif
>> +
>> #define GPU_PAS_ID 13
>>
>> static inline bool _a6xx_check_idle(struct msm_gpu *gpu)
>> @@ -998,6 +1002,54 @@ static int a6xx_zap_shader_init(struct msm_gpu *gpu)
>> return ret;
>> }
>>
>> +static int a6xx_switch_secure_mode(struct msm_gpu *gpu)
>> +{
>> + int ret;
>> +
>> +#ifdef CONFIG_ARM64
>> + /*
>> + * We can access SECVID_TRUST_CNTL register when kernel is booted in EL2 mode. So, use it
>> + * to switch the secure mode to avoid the dependency on zap shader.
>> + */
>> + if (is_kernel_in_hyp_mode())
>> + goto direct_switch;
>> +#endif
>> +
>> + /*
>> + * Try to load a zap shader into the secure world. If successful
>> + * we can use the CP to switch out of secure mode. If not then we
>> + * have no resource but to try to switch ourselves out manually. If we
>> + * guessed wrong then access to the RBBM_SECVID_TRUST_CNTL register will
>> + * be blocked and a permissions violation will soon follow.
>> + */
>> + ret = a6xx_zap_shader_init(gpu);
>> + if (ret == -ENODEV) {
>> + /*
>> + * This device does not use zap shader (but print a warning
>> + * just in case someone got their dt wrong.. hopefully they
>> + * have a debug UART to realize the error of their ways...
>> + * if you mess this up you are about to crash horribly)
>> + */
>> + dev_warn_once(gpu->dev->dev,
>> + "Zap shader not enabled - using SECVID_TRUST_CNTL instead\n");
>> + goto direct_switch;
>> + } else if (ret)
>> + return ret;
>> +
>> + OUT_PKT7(gpu->rb[0], CP_SET_SECURE_MODE, 1);
>> + OUT_RING(gpu->rb[0], 0x00000000);
>> +
>> + a6xx_flush(gpu, gpu->rb[0]);
>> + if (!a6xx_idle(gpu, gpu->rb[0]))
>> + return -EINVAL;
>> +
>> + return 0;
>> +
>> +direct_switch:
>> + gpu_write(gpu, REG_A6XX_RBBM_SECVID_TRUST_CNTL, 0x0);
>> + return 0;
>> +}
>> +
>> #define A6XX_INT_MASK (A6XX_RBBM_INT_0_MASK_CP_AHB_ERROR | \
>> A6XX_RBBM_INT_0_MASK_RBBM_ATB_ASYNCFIFO_OVERFLOW | \
>> A6XX_RBBM_INT_0_MASK_CP_HW_ERROR | \
>> @@ -1341,35 +1393,9 @@ static int hw_init(struct msm_gpu *gpu)
>> if (ret)
>> goto out;
>>
>> - /*
>> - * Try to load a zap shader into the secure world. If successful
>> - * we can use the CP to switch out of secure mode. If not then we
>> - * have no resource but to try to switch ourselves out manually. If we
>> - * guessed wrong then access to the RBBM_SECVID_TRUST_CNTL register will
>> - * be blocked and a permissions violation will soon follow.
>> - */
>> - ret = a6xx_zap_shader_init(gpu);
>> - if (!ret) {
>> - OUT_PKT7(gpu->rb[0], CP_SET_SECURE_MODE, 1);
>> - OUT_RING(gpu->rb[0], 0x00000000);
>> -
>> - a6xx_flush(gpu, gpu->rb[0]);
>> - if (!a6xx_idle(gpu, gpu->rb[0]))
>> - return -EINVAL;
>> - } else if (ret == -ENODEV) {
>> - /*
>> - * This device does not use zap shader (but print a warning
>> - * just in case someone got their dt wrong.. hopefully they
>> - * have a debug UART to realize the error of their ways...
>> - * if you mess this up you are about to crash horribly)
>> - */
>> - dev_warn_once(gpu->dev->dev,
>> - "Zap shader not enabled - using SECVID_TRUST_CNTL instead\n");
>> - gpu_write(gpu, REG_A6XX_RBBM_SECVID_TRUST_CNTL, 0x0);
>> - ret = 0;
>> - } else {
>> + ret = a6xx_switch_secure_mode(gpu);
>> + if (!ret)
>> return ret;
>> - }
>>
>> out:
>> if (adreno_has_gmu_wrapper(adreno_gpu))
>>
>> ---
>> base-commit: f4a867a46862c1743501bbe8c813238456ec8699
>> change-id: 20241120-drm-msm-kvm-support-cd6e6744ced6
>>
>> Best regards,
>> --
>> Akhil P Oommen <quic_akhilpo@quicinc.com>
>>
next prev parent reply other threads:[~2024-12-11 3:09 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-12-09 8:19 [PATCH] drm/msm/a6xx: Skip gpu secure fw load in EL2 mode Akhil P Oommen
2024-12-09 15:03 ` Konrad Dybcio
2024-12-09 20:54 ` Akhil P Oommen
2024-12-09 19:54 ` Rob Clark
2024-12-09 20:52 ` Akhil P Oommen
2024-12-09 21:56 ` Rob Clark
2024-12-10 9:13 ` Akhil P Oommen
2024-12-11 1:13 ` Bjorn Andersson
2024-12-11 3:08 ` Akhil P Oommen
2024-12-11 3:43 ` Rob Clark
2024-12-11 7:36 ` Pavan Kondeti
2024-12-11 8:52 ` Dmitry Baryshkov
2024-12-11 8:59 ` Pavan Kondeti
2024-12-10 20:54 ` Elliot Berman
2024-12-11 3:09 ` Akhil P Oommen [this message]
2024-12-10 21:24 ` Marc Zyngier
2024-12-11 0:37 ` Pavan Kondeti
2024-12-11 10:40 ` Marc Zyngier
2024-12-12 5:31 ` Pavan Kondeti
2024-12-12 8:50 ` Marc Zyngier
2024-12-12 10:40 ` Mark Rutland
2024-12-13 3:05 ` Pavan Kondeti
2024-12-10 22:52 ` Connor Abbott
2024-12-11 0:40 ` Pavan Kondeti
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=0df78884-e734-4d34-adf0-c5cba2a0d9da@quicinc.com \
--to=quic_akhilpo@quicinc.com \
--cc=airlied@gmail.com \
--cc=dmitry.baryshkov@linaro.org \
--cc=dri-devel@lists.freedesktop.org \
--cc=freedreno@lists.freedesktop.org \
--cc=konradybcio@kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-arm-msm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=marijn.suijten@somainline.org \
--cc=quic_abhinavk@quicinc.com \
--cc=quic_eberman@quicinc.com \
--cc=quic_pkondeti@quicinc.com \
--cc=robdclark@gmail.com \
--cc=sean@poorly.run \
--cc=simona@ffwll.ch \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox