kfd_int_process_v9.c revision 1.2
1/*
2 * Copyright 2016-2018 Advanced Micro Devices, Inc.
3 *
4 * Permission is hereby granted, free of charge, to any person obtaining a
5 * copy of this software and associated documentation files (the "Software"),
6 * to deal in the Software without restriction, including without limitation
7 * the rights to use, copy, modify, merge, publish, distribute, sublicense,
8 * and/or sell copies of the Software, and to permit persons to whom the
9 * Software is furnished to do so, subject to the following conditions:
10 *
11 * The above copyright notice and this permission notice shall be included in
12 * all copies or substantial portions of the Software.
13 *
14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.  IN NO EVENT SHALL
17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR
18 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
20 * OTHER DEALINGS IN THE SOFTWARE.
21 */
22
23#include "kfd_priv.h"
24#include "kfd_events.h"
25#include "soc15_int.h"
26#include "kfd_device_queue_manager.h"
27
28static bool event_interrupt_isr_v9(struct kfd_dev *dev,
29					const uint32_t *ih_ring_entry,
30					uint32_t *patched_ihre,
31					bool *patched_flag)
32{
33	uint16_t source_id, client_id, pasid, vmid;
34	const uint32_t *data = ih_ring_entry;
35
36	/* Only handle interrupts from KFD VMIDs */
37	vmid = SOC15_VMID_FROM_IH_ENTRY(ih_ring_entry);
38	if (vmid < dev->vm_info.first_vmid_kfd ||
39	    vmid > dev->vm_info.last_vmid_kfd)
40		return 0;
41
42	source_id = SOC15_SOURCE_ID_FROM_IH_ENTRY(ih_ring_entry);
43	client_id = SOC15_CLIENT_ID_FROM_IH_ENTRY(ih_ring_entry);
44	pasid = SOC15_PASID_FROM_IH_ENTRY(ih_ring_entry);
45
46	/* This is a known issue for gfx9. Under non HWS, pasid is not set
47	 * in the interrupt payload, so we need to find out the pasid on our
48	 * own.
49	 */
50	if (!pasid && dev->dqm->sched_policy == KFD_SCHED_POLICY_NO_HWS) {
51		const uint32_t pasid_mask = 0xffff;
52
53		*patched_flag = true;
54		memcpy(patched_ihre, ih_ring_entry,
55				dev->device_info->ih_ring_entry_size);
56
57		pasid = dev->dqm->vmid_pasid[vmid];
58
59		/* Patch the pasid field */
60		patched_ihre[3] = cpu_to_le32((le32_to_cpu(patched_ihre[3])
61					& ~pasid_mask) | pasid);
62	}
63
64	pr_debug("client id 0x%x, source id %d, vmid %d, pasid 0x%x. raw data:\n",
65		 client_id, source_id, vmid, pasid);
66	pr_debug("%8X, %8X, %8X, %8X, %8X, %8X, %8X, %8X.\n",
67		 data[0], data[1], data[2], data[3],
68		 data[4], data[5], data[6], data[7]);
69
70	/* If there is no valid PASID, it's likely a bug */
71	if (WARN_ONCE(pasid == 0, "Bug: No PASID in KFD interrupt"))
72		return 0;
73
74	/* Interrupt types we care about: various signals and faults.
75	 * They will be forwarded to a work queue (see below).
76	 */
77	return source_id == SOC15_INTSRC_CP_END_OF_PIPE ||
78		source_id == SOC15_INTSRC_SDMA_TRAP ||
79		source_id == SOC15_INTSRC_SQ_INTERRUPT_MSG ||
80		source_id == SOC15_INTSRC_CP_BAD_OPCODE ||
81		client_id == SOC15_IH_CLIENTID_VMC ||
82		client_id == SOC15_IH_CLIENTID_VMC1 ||
83		client_id == SOC15_IH_CLIENTID_UTCL2;
84}
85
86static void event_interrupt_wq_v9(struct kfd_dev *dev,
87					const uint32_t *ih_ring_entry)
88{
89	uint16_t source_id, client_id, pasid, vmid;
90	uint32_t context_id;
91
92	source_id = SOC15_SOURCE_ID_FROM_IH_ENTRY(ih_ring_entry);
93	client_id = SOC15_CLIENT_ID_FROM_IH_ENTRY(ih_ring_entry);
94	pasid = SOC15_PASID_FROM_IH_ENTRY(ih_ring_entry);
95	vmid = SOC15_VMID_FROM_IH_ENTRY(ih_ring_entry);
96	context_id = SOC15_CONTEXT_ID0_FROM_IH_ENTRY(ih_ring_entry);
97
98	if (source_id == SOC15_INTSRC_CP_END_OF_PIPE)
99		kfd_signal_event_interrupt(pasid, context_id, 32);
100	else if (source_id == SOC15_INTSRC_SDMA_TRAP)
101		kfd_signal_event_interrupt(pasid, context_id & 0xfffffff, 28);
102	else if (source_id == SOC15_INTSRC_SQ_INTERRUPT_MSG)
103		kfd_signal_event_interrupt(pasid, context_id & 0xffffff, 24);
104	else if (source_id == SOC15_INTSRC_CP_BAD_OPCODE)
105		kfd_signal_hw_exception_event(pasid);
106	else if (client_id == SOC15_IH_CLIENTID_VMC ||
107		client_id == SOC15_IH_CLIENTID_VMC1 ||
108		 client_id == SOC15_IH_CLIENTID_UTCL2) {
109		struct kfd_vm_fault_info info = {0};
110		uint16_t ring_id = SOC15_RING_ID_FROM_IH_ENTRY(ih_ring_entry);
111
112		info.vmid = vmid;
113		info.mc_id = client_id;
114		info.page_addr = ih_ring_entry[4] |
115			(uint64_t)(ih_ring_entry[5] & 0xf) << 32;
116		info.prot_valid = ring_id & 0x08;
117		info.prot_read  = ring_id & 0x10;
118		info.prot_write = ring_id & 0x20;
119
120		kfd_process_vm_fault(dev->dqm, pasid);
121		kfd_signal_vm_fault_event(dev, pasid, &info);
122	}
123}
124
125const struct kfd_event_interrupt_class event_interrupt_class_v9 = {
126	.interrupt_isr = event_interrupt_isr_v9,
127	.interrupt_wq = event_interrupt_wq_v9,
128};
129