Linux Audio

Check our new training course

Loading...
Note: File does not exist in v3.1.
   1// SPDX-License-Identifier: MIT
   2/*
   3 * Copyright © 2016-2019 Intel Corporation
   4 */
   5
   6#include <linux/bitfield.h>
   7#include <linux/firmware.h>
   8#include <linux/highmem.h>
   9
  10#include <drm/drm_cache.h>
  11#include <drm/drm_print.h>
  12
  13#include "gem/i915_gem_lmem.h"
  14#include "gt/intel_gt.h"
  15#include "gt/intel_gt_print.h"
  16#include "intel_gsc_binary_headers.h"
  17#include "intel_gsc_fw.h"
  18#include "intel_uc_fw.h"
  19#include "intel_uc_fw_abi.h"
  20#include "i915_drv.h"
  21#include "i915_reg.h"
  22
  23#if IS_ENABLED(CONFIG_DRM_I915_DEBUG_GEM)
  24#define UNEXPECTED	gt_probe_error
  25#else
  26#define UNEXPECTED	gt_notice
  27#endif
  28
  29static inline struct intel_gt *
  30____uc_fw_to_gt(struct intel_uc_fw *uc_fw, enum intel_uc_fw_type type)
  31{
  32	GEM_BUG_ON(type >= INTEL_UC_FW_NUM_TYPES);
  33
  34	switch (type) {
  35	case INTEL_UC_FW_TYPE_GUC:
  36		return container_of(uc_fw, struct intel_gt, uc.guc.fw);
  37	case INTEL_UC_FW_TYPE_HUC:
  38		return container_of(uc_fw, struct intel_gt, uc.huc.fw);
  39	case INTEL_UC_FW_TYPE_GSC:
  40		return container_of(uc_fw, struct intel_gt, uc.gsc.fw);
  41	}
  42
  43	return NULL;
  44}
  45
  46static inline struct intel_gt *__uc_fw_to_gt(struct intel_uc_fw *uc_fw)
  47{
  48	GEM_BUG_ON(uc_fw->status == INTEL_UC_FIRMWARE_UNINITIALIZED);
  49	return ____uc_fw_to_gt(uc_fw, uc_fw->type);
  50}
  51
  52#ifdef CONFIG_DRM_I915_DEBUG_GUC
  53void intel_uc_fw_change_status(struct intel_uc_fw *uc_fw,
  54			       enum intel_uc_fw_status status)
  55{
  56	uc_fw->__status =  status;
  57	gt_dbg(__uc_fw_to_gt(uc_fw), "%s firmware -> %s\n",
  58	       intel_uc_fw_type_repr(uc_fw->type),
  59	       status == INTEL_UC_FIRMWARE_SELECTED ?
  60	       uc_fw->file_selected.path : intel_uc_fw_status_repr(status));
  61}
  62#endif
  63
  64/*
  65 * List of required GuC and HuC binaries per-platform.
  66 * Must be ordered based on platform + revid, from newer to older.
  67 *
  68 * Note that RKL and ADL-S have the same GuC/HuC device ID's and use the same
  69 * firmware as TGL.
  70 *
  71 * Version numbers:
  72 * Originally, the driver required an exact match major/minor/patch furmware
  73 * file and only supported that one version for any given platform. However,
  74 * the new direction from upstream is to be backwards compatible with all
  75 * prior releases and to be as flexible as possible as to what firmware is
  76 * loaded.
  77 *
  78 * For GuC, the major version number signifies a backwards breaking API change.
  79 * So, new format GuC firmware files are labelled by their major version only.
  80 * For HuC, there is no KMD interaction, hence no version matching requirement.
  81 * So, new format HuC firmware files have no version number at all.
  82 *
  83 * All of which means that the table below must keep all old format files with
  84 * full three point version number. But newer files have reduced requirements.
  85 * Having said that, the driver still needs to track the minor version number
  86 * for GuC at least. As it is useful to report to the user that they are not
  87 * running with a recent enough version for all KMD supported features,
  88 * security fixes, etc. to be enabled.
  89 */
  90#define INTEL_GUC_FIRMWARE_DEFS(fw_def, guc_maj, guc_mmp) \
  91	fw_def(METEORLAKE,   0, guc_maj(mtl,  70, 12, 1)) \
  92	fw_def(DG2,          0, guc_maj(dg2,  70, 12, 1)) \
  93	fw_def(ALDERLAKE_P,  0, guc_maj(adlp, 70, 12, 1)) \
  94	fw_def(ALDERLAKE_P,  0, guc_mmp(adlp, 70, 1, 1)) \
  95	fw_def(ALDERLAKE_P,  0, guc_mmp(adlp, 69, 0, 3)) \
  96	fw_def(ALDERLAKE_S,  0, guc_maj(tgl,  70, 12, 1)) \
  97	fw_def(ALDERLAKE_S,  0, guc_mmp(tgl,  70, 1, 1)) \
  98	fw_def(ALDERLAKE_S,  0, guc_mmp(tgl,  69, 0, 3)) \
  99	fw_def(DG1,          0, guc_maj(dg1,  70, 5, 1)) \
 100	fw_def(ROCKETLAKE,   0, guc_mmp(tgl,  70, 1, 1)) \
 101	fw_def(TIGERLAKE,    0, guc_mmp(tgl,  70, 1, 1)) \
 102	fw_def(JASPERLAKE,   0, guc_mmp(ehl,  70, 1, 1)) \
 103	fw_def(ELKHARTLAKE,  0, guc_mmp(ehl,  70, 1, 1)) \
 104	fw_def(ICELAKE,      0, guc_mmp(icl,  70, 1, 1)) \
 105	fw_def(COMETLAKE,    5, guc_mmp(cml,  70, 1, 1)) \
 106	fw_def(COMETLAKE,    0, guc_mmp(kbl,  70, 1, 1)) \
 107	fw_def(COFFEELAKE,   0, guc_mmp(kbl,  70, 1, 1)) \
 108	fw_def(GEMINILAKE,   0, guc_mmp(glk,  70, 1, 1)) \
 109	fw_def(KABYLAKE,     0, guc_mmp(kbl,  70, 1, 1)) \
 110	fw_def(BROXTON,      0, guc_mmp(bxt,  70, 1, 1)) \
 111	fw_def(SKYLAKE,      0, guc_mmp(skl,  70, 1, 1))
 112
 113#define INTEL_HUC_FIRMWARE_DEFS(fw_def, huc_raw, huc_mmp, huc_gsc) \
 114	fw_def(METEORLAKE,   0, huc_gsc(mtl)) \
 115	fw_def(DG2,          0, huc_gsc(dg2)) \
 116	fw_def(ALDERLAKE_P,  0, huc_raw(tgl)) \
 117	fw_def(ALDERLAKE_P,  0, huc_mmp(tgl,  7, 9, 3)) \
 118	fw_def(ALDERLAKE_S,  0, huc_raw(tgl)) \
 119	fw_def(ALDERLAKE_S,  0, huc_mmp(tgl,  7, 9, 3)) \
 120	fw_def(DG1,          0, huc_raw(dg1)) \
 121	fw_def(ROCKETLAKE,   0, huc_mmp(tgl,  7, 9, 3)) \
 122	fw_def(TIGERLAKE,    0, huc_mmp(tgl,  7, 9, 3)) \
 123	fw_def(JASPERLAKE,   0, huc_mmp(ehl,  9, 0, 0)) \
 124	fw_def(ELKHARTLAKE,  0, huc_mmp(ehl,  9, 0, 0)) \
 125	fw_def(ICELAKE,      0, huc_mmp(icl,  9, 0, 0)) \
 126	fw_def(COMETLAKE,    5, huc_mmp(cml,  4, 0, 0)) \
 127	fw_def(COMETLAKE,    0, huc_mmp(kbl,  4, 0, 0)) \
 128	fw_def(COFFEELAKE,   0, huc_mmp(kbl,  4, 0, 0)) \
 129	fw_def(GEMINILAKE,   0, huc_mmp(glk,  4, 0, 0)) \
 130	fw_def(KABYLAKE,     0, huc_mmp(kbl,  4, 0, 0)) \
 131	fw_def(BROXTON,      0, huc_mmp(bxt,  2, 0, 0)) \
 132	fw_def(SKYLAKE,      0, huc_mmp(skl,  2, 0, 0))
 133
 134/*
 135 * The GSC FW has multiple version (see intel_gsc_uc.h for details); since what
 136 * we care about is the interface, we use the compatibility version in the
 137 * binary names.
 138 * Same as with the GuC, a major version bump indicate a
 139 * backward-incompatible change, while a minor version bump indicates a
 140 * backward-compatible one, so we use only the former in the file name.
 141 */
 142#define INTEL_GSC_FIRMWARE_DEFS(fw_def, gsc_def) \
 143	fw_def(METEORLAKE,   0, gsc_def(mtl, 1, 0))
 144
 145/*
 146 * Set of macros for producing a list of filenames from the above table.
 147 */
 148#define __MAKE_UC_FW_PATH_BLANK(prefix_, name_) \
 149	"i915/" \
 150	__stringify(prefix_) "_" name_ ".bin"
 151
 152#define __MAKE_UC_FW_PATH_MAJOR(prefix_, name_, major_) \
 153	"i915/" \
 154	__stringify(prefix_) "_" name_ "_" \
 155	__stringify(major_) ".bin"
 156
 157#define __MAKE_UC_FW_PATH_MMP(prefix_, name_, major_, minor_, patch_) \
 158	"i915/" \
 159	__stringify(prefix_) "_" name_  "_" \
 160	__stringify(major_) "." \
 161	__stringify(minor_) "." \
 162	__stringify(patch_) ".bin"
 163
 164/* Minor for internal driver use, not part of file name */
 165#define MAKE_GUC_FW_PATH_MAJOR(prefix_, major_, minor_, patch_) \
 166	__MAKE_UC_FW_PATH_MAJOR(prefix_, "guc", major_)
 167
 168#define MAKE_GUC_FW_PATH_MMP(prefix_, major_, minor_, patch_) \
 169	__MAKE_UC_FW_PATH_MMP(prefix_, "guc", major_, minor_, patch_)
 170
 171#define MAKE_HUC_FW_PATH_BLANK(prefix_) \
 172	__MAKE_UC_FW_PATH_BLANK(prefix_, "huc")
 173
 174#define MAKE_HUC_FW_PATH_GSC(prefix_) \
 175	__MAKE_UC_FW_PATH_BLANK(prefix_, "huc_gsc")
 176
 177#define MAKE_HUC_FW_PATH_MMP(prefix_, major_, minor_, patch_) \
 178	__MAKE_UC_FW_PATH_MMP(prefix_, "huc", major_, minor_, patch_)
 179
 180#define MAKE_GSC_FW_PATH(prefix_, major_, minor_) \
 181	__MAKE_UC_FW_PATH_MAJOR(prefix_, "gsc", major_)
 182
 183/*
 184 * All blobs need to be declared via MODULE_FIRMWARE().
 185 * This first expansion of the table macros is solely to provide
 186 * that declaration.
 187 */
 188#define INTEL_UC_MODULE_FW(platform_, revid_, uc_) \
 189	MODULE_FIRMWARE(uc_);
 190
 191INTEL_GUC_FIRMWARE_DEFS(INTEL_UC_MODULE_FW, MAKE_GUC_FW_PATH_MAJOR, MAKE_GUC_FW_PATH_MMP)
 192INTEL_HUC_FIRMWARE_DEFS(INTEL_UC_MODULE_FW, MAKE_HUC_FW_PATH_BLANK, MAKE_HUC_FW_PATH_MMP, MAKE_HUC_FW_PATH_GSC)
 193INTEL_GSC_FIRMWARE_DEFS(INTEL_UC_MODULE_FW, MAKE_GSC_FW_PATH)
 194
 195/*
 196 * The next expansion of the table macros (in __uc_fw_auto_select below) provides
 197 * actual data structures with both the filename and the version information.
 198 * These structure arrays are then iterated over to the list of suitable files
 199 * for the current platform and to then attempt to load those files, in the order
 200 * listed, until one is successfully found.
 201 */
 202struct __packed uc_fw_blob {
 203	const char *path;
 204	bool legacy;
 205	u8 major;
 206	u8 minor;
 207	u8 patch;
 208	bool has_gsc_headers;
 209};
 210
 211#define UC_FW_BLOB_BASE(major_, minor_, patch_, path_) \
 212	.major = major_, \
 213	.minor = minor_, \
 214	.patch = patch_, \
 215	.path = path_,
 216
 217#define UC_FW_BLOB_NEW(major_, minor_, patch_, gsc_, path_) \
 218	{ UC_FW_BLOB_BASE(major_, minor_, patch_, path_) \
 219	  .legacy = false, .has_gsc_headers = gsc_ }
 220
 221#define UC_FW_BLOB_OLD(major_, minor_, patch_, path_) \
 222	{ UC_FW_BLOB_BASE(major_, minor_, patch_, path_) \
 223	  .legacy = true }
 224
 225#define GUC_FW_BLOB(prefix_, major_, minor_, patch_) \
 226	UC_FW_BLOB_NEW(major_, minor_, patch_, false, \
 227		       MAKE_GUC_FW_PATH_MAJOR(prefix_, major_, minor_, patch_))
 228
 229#define GUC_FW_BLOB_MMP(prefix_, major_, minor_, patch_) \
 230	UC_FW_BLOB_OLD(major_, minor_, patch_, \
 231		       MAKE_GUC_FW_PATH_MMP(prefix_, major_, minor_, patch_))
 232
 233#define HUC_FW_BLOB(prefix_) \
 234	UC_FW_BLOB_NEW(0, 0, 0, false, MAKE_HUC_FW_PATH_BLANK(prefix_))
 235
 236#define HUC_FW_BLOB_MMP(prefix_, major_, minor_, patch_) \
 237	UC_FW_BLOB_OLD(major_, minor_, patch_, \
 238		       MAKE_HUC_FW_PATH_MMP(prefix_, major_, minor_, patch_))
 239
 240#define HUC_FW_BLOB_GSC(prefix_) \
 241	UC_FW_BLOB_NEW(0, 0, 0, true, MAKE_HUC_FW_PATH_GSC(prefix_))
 242
 243#define GSC_FW_BLOB(prefix_, major_, minor_) \
 244	UC_FW_BLOB_NEW(major_, minor_, 0, true, \
 245		       MAKE_GSC_FW_PATH(prefix_, major_, minor_))
 246
 247struct __packed uc_fw_platform_requirement {
 248	enum intel_platform p;
 249	u8 rev; /* first platform rev using this FW */
 250	const struct uc_fw_blob blob;
 251};
 252
 253#define MAKE_FW_LIST(platform_, revid_, uc_) \
 254{ \
 255	.p = INTEL_##platform_, \
 256	.rev = revid_, \
 257	.blob = uc_, \
 258},
 259
 260struct fw_blobs_by_type {
 261	const struct uc_fw_platform_requirement *blobs;
 262	u32 count;
 263};
 264
 265static const struct uc_fw_platform_requirement blobs_guc[] = {
 266	INTEL_GUC_FIRMWARE_DEFS(MAKE_FW_LIST, GUC_FW_BLOB, GUC_FW_BLOB_MMP)
 267};
 268
 269static const struct uc_fw_platform_requirement blobs_huc[] = {
 270	INTEL_HUC_FIRMWARE_DEFS(MAKE_FW_LIST, HUC_FW_BLOB, HUC_FW_BLOB_MMP, HUC_FW_BLOB_GSC)
 271};
 272
 273static const struct uc_fw_platform_requirement blobs_gsc[] = {
 274	INTEL_GSC_FIRMWARE_DEFS(MAKE_FW_LIST, GSC_FW_BLOB)
 275};
 276
 277static const struct fw_blobs_by_type blobs_all[INTEL_UC_FW_NUM_TYPES] = {
 278	[INTEL_UC_FW_TYPE_GUC] = { blobs_guc, ARRAY_SIZE(blobs_guc) },
 279	[INTEL_UC_FW_TYPE_HUC] = { blobs_huc, ARRAY_SIZE(blobs_huc) },
 280	[INTEL_UC_FW_TYPE_GSC] = { blobs_gsc, ARRAY_SIZE(blobs_gsc) },
 281};
 282
 283static void
 284__uc_fw_auto_select(struct drm_i915_private *i915, struct intel_uc_fw *uc_fw)
 285{
 286	const struct uc_fw_platform_requirement *fw_blobs;
 287	enum intel_platform p = INTEL_INFO(i915)->platform;
 288	u32 fw_count;
 289	u8 rev = INTEL_REVID(i915);
 290	int i;
 291	bool found;
 292
 293	/*
 294	 * The only difference between the ADL GuC FWs is the HWConfig support.
 295	 * ADL-N does not support HWConfig, so we should use the same binary as
 296	 * ADL-S, otherwise the GuC might attempt to fetch a config table that
 297	 * does not exist.
 298	 */
 299	if (IS_ALDERLAKE_P_N(i915))
 300		p = INTEL_ALDERLAKE_S;
 301
 302	GEM_BUG_ON(uc_fw->type >= ARRAY_SIZE(blobs_all));
 303	fw_blobs = blobs_all[uc_fw->type].blobs;
 304	fw_count = blobs_all[uc_fw->type].count;
 305
 306	found = false;
 307	for (i = 0; i < fw_count && p <= fw_blobs[i].p; i++) {
 308		const struct uc_fw_blob *blob = &fw_blobs[i].blob;
 309
 310		if (p != fw_blobs[i].p)
 311			continue;
 312
 313		if (rev < fw_blobs[i].rev)
 314			continue;
 315
 316		if (uc_fw->file_selected.path) {
 317			/*
 318			 * Continuing an earlier search after a found blob failed to load.
 319			 * Once the previously chosen path has been found, clear it out
 320			 * and let the search continue from there.
 321			 */
 322			if (uc_fw->file_selected.path == blob->path)
 323				uc_fw->file_selected.path = NULL;
 324
 325			continue;
 326		}
 327
 328		uc_fw->file_selected.path = blob->path;
 329		uc_fw->file_wanted.path = blob->path;
 330		uc_fw->file_wanted.ver.major = blob->major;
 331		uc_fw->file_wanted.ver.minor = blob->minor;
 332		uc_fw->file_wanted.ver.patch = blob->patch;
 333		uc_fw->has_gsc_headers = blob->has_gsc_headers;
 334		found = true;
 335		break;
 336	}
 337
 338	if (!found && uc_fw->file_selected.path) {
 339		/* Failed to find a match for the last attempt?! */
 340		uc_fw->file_selected.path = NULL;
 341	}
 342}
 343
 344static bool validate_fw_table_type(struct drm_i915_private *i915, enum intel_uc_fw_type type)
 345{
 346	const struct uc_fw_platform_requirement *fw_blobs;
 347	u32 fw_count;
 348	int i, j;
 349
 350	if (type >= ARRAY_SIZE(blobs_all)) {
 351		drm_err(&i915->drm, "No blob array for %s\n", intel_uc_fw_type_repr(type));
 352		return false;
 353	}
 354
 355	fw_blobs = blobs_all[type].blobs;
 356	fw_count = blobs_all[type].count;
 357
 358	if (!fw_count)
 359		return true;
 360
 361	/* make sure the list is ordered as expected */
 362	for (i = 1; i < fw_count; i++) {
 363		/* Versionless file names must be unique per platform: */
 364		for (j = i + 1; j < fw_count; j++) {
 365			/* Same platform? */
 366			if (fw_blobs[i].p != fw_blobs[j].p)
 367				continue;
 368
 369			if (fw_blobs[i].blob.path != fw_blobs[j].blob.path)
 370				continue;
 371
 372			drm_err(&i915->drm, "Duplicate %s blobs: %s r%u %s%d.%d.%d [%s] matches %s%d.%d.%d [%s]\n",
 373				intel_uc_fw_type_repr(type),
 374				intel_platform_name(fw_blobs[j].p), fw_blobs[j].rev,
 375				fw_blobs[j].blob.legacy ? "L" : "v",
 376				fw_blobs[j].blob.major, fw_blobs[j].blob.minor,
 377				fw_blobs[j].blob.patch, fw_blobs[j].blob.path,
 378				fw_blobs[i].blob.legacy ? "L" : "v",
 379				fw_blobs[i].blob.major, fw_blobs[i].blob.minor,
 380				fw_blobs[i].blob.patch, fw_blobs[i].blob.path);
 381		}
 382
 383		/* Next platform is good: */
 384		if (fw_blobs[i].p < fw_blobs[i - 1].p)
 385			continue;
 386
 387		/* Next platform revision is good: */
 388		if (fw_blobs[i].p == fw_blobs[i - 1].p &&
 389		    fw_blobs[i].rev < fw_blobs[i - 1].rev)
 390			continue;
 391
 392		/* Platform/revision must be in order: */
 393		if (fw_blobs[i].p != fw_blobs[i - 1].p ||
 394		    fw_blobs[i].rev != fw_blobs[i - 1].rev)
 395			goto bad;
 396
 397		/* Next major version is good: */
 398		if (fw_blobs[i].blob.major < fw_blobs[i - 1].blob.major)
 399			continue;
 400
 401		/* New must be before legacy: */
 402		if (!fw_blobs[i].blob.legacy && fw_blobs[i - 1].blob.legacy)
 403			goto bad;
 404
 405		/* New to legacy also means 0.0 to X.Y (HuC), or X.0 to X.Y (GuC) */
 406		if (fw_blobs[i].blob.legacy && !fw_blobs[i - 1].blob.legacy) {
 407			if (!fw_blobs[i - 1].blob.major)
 408				continue;
 409
 410			if (fw_blobs[i].blob.major == fw_blobs[i - 1].blob.major)
 411				continue;
 412		}
 413
 414		/* Major versions must be in order: */
 415		if (fw_blobs[i].blob.major != fw_blobs[i - 1].blob.major)
 416			goto bad;
 417
 418		/* Next minor version is good: */
 419		if (fw_blobs[i].blob.minor < fw_blobs[i - 1].blob.minor)
 420			continue;
 421
 422		/* Minor versions must be in order: */
 423		if (fw_blobs[i].blob.minor != fw_blobs[i - 1].blob.minor)
 424			goto bad;
 425
 426		/* Patch versions must be in order and unique: */
 427		if (fw_blobs[i].blob.patch < fw_blobs[i - 1].blob.patch)
 428			continue;
 429
 430bad:
 431		drm_err(&i915->drm, "Invalid %s blob order: %s r%u %s%d.%d.%d comes before %s r%u %s%d.%d.%d\n",
 432			intel_uc_fw_type_repr(type),
 433			intel_platform_name(fw_blobs[i - 1].p), fw_blobs[i - 1].rev,
 434			fw_blobs[i - 1].blob.legacy ? "L" : "v",
 435			fw_blobs[i - 1].blob.major,
 436			fw_blobs[i - 1].blob.minor,
 437			fw_blobs[i - 1].blob.patch,
 438			intel_platform_name(fw_blobs[i].p), fw_blobs[i].rev,
 439			fw_blobs[i].blob.legacy ? "L" : "v",
 440			fw_blobs[i].blob.major,
 441			fw_blobs[i].blob.minor,
 442			fw_blobs[i].blob.patch);
 443		return false;
 444	}
 445
 446	return true;
 447}
 448
 449static const char *__override_guc_firmware_path(struct drm_i915_private *i915)
 450{
 451	if (i915->params.enable_guc & ENABLE_GUC_MASK)
 452		return i915->params.guc_firmware_path;
 453	return "";
 454}
 455
 456static const char *__override_huc_firmware_path(struct drm_i915_private *i915)
 457{
 458	if (i915->params.enable_guc & ENABLE_GUC_LOAD_HUC)
 459		return i915->params.huc_firmware_path;
 460	return "";
 461}
 462
 463static const char *__override_gsc_firmware_path(struct drm_i915_private *i915)
 464{
 465	return i915->params.gsc_firmware_path;
 466}
 467
 468static void __uc_fw_user_override(struct drm_i915_private *i915, struct intel_uc_fw *uc_fw)
 469{
 470	const char *path = NULL;
 471
 472	switch (uc_fw->type) {
 473	case INTEL_UC_FW_TYPE_GUC:
 474		path = __override_guc_firmware_path(i915);
 475		break;
 476	case INTEL_UC_FW_TYPE_HUC:
 477		path = __override_huc_firmware_path(i915);
 478		break;
 479	case INTEL_UC_FW_TYPE_GSC:
 480		path = __override_gsc_firmware_path(i915);
 481		break;
 482	}
 483
 484	if (unlikely(path)) {
 485		uc_fw->file_selected.path = path;
 486		uc_fw->user_overridden = true;
 487	}
 488}
 489
 490void intel_uc_fw_version_from_gsc_manifest(struct intel_uc_fw_ver *ver,
 491					   const void *data)
 492{
 493	const struct intel_gsc_manifest_header *manifest = data;
 494
 495	ver->major = manifest->fw_version.major;
 496	ver->minor = manifest->fw_version.minor;
 497	ver->patch = manifest->fw_version.hotfix;
 498	ver->build = manifest->fw_version.build;
 499}
 500
 501/**
 502 * intel_uc_fw_init_early - initialize the uC object and select the firmware
 503 * @uc_fw: uC firmware
 504 * @type: type of uC
 505 * @needs_ggtt_mapping: whether the FW needs to be GGTT mapped for loading
 506 *
 507 * Initialize the state of our uC object and relevant tracking and select the
 508 * firmware to fetch and load.
 509 */
 510void intel_uc_fw_init_early(struct intel_uc_fw *uc_fw,
 511			    enum intel_uc_fw_type type,
 512			    bool needs_ggtt_mapping)
 513{
 514	struct intel_gt *gt = ____uc_fw_to_gt(uc_fw, type);
 515	struct drm_i915_private *i915 = gt->i915;
 516
 517	/*
 518	 * we use FIRMWARE_UNINITIALIZED to detect checks against uc_fw->status
 519	 * before we're looked at the HW caps to see if we have uc support
 520	 */
 521	BUILD_BUG_ON(INTEL_UC_FIRMWARE_UNINITIALIZED);
 522	GEM_BUG_ON(uc_fw->status);
 523	GEM_BUG_ON(uc_fw->file_selected.path);
 524
 525	uc_fw->type = type;
 526	uc_fw->needs_ggtt_mapping = needs_ggtt_mapping;
 527
 528	if (HAS_GT_UC(i915)) {
 529		if (!validate_fw_table_type(i915, type)) {
 530			gt->uc.fw_table_invalid = true;
 531			intel_uc_fw_change_status(uc_fw, INTEL_UC_FIRMWARE_NOT_SUPPORTED);
 532			return;
 533		}
 534
 535		__uc_fw_auto_select(i915, uc_fw);
 536		__uc_fw_user_override(i915, uc_fw);
 537	}
 538
 539	intel_uc_fw_change_status(uc_fw, uc_fw->file_selected.path ? *uc_fw->file_selected.path ?
 540				  INTEL_UC_FIRMWARE_SELECTED :
 541				  INTEL_UC_FIRMWARE_DISABLED :
 542				  INTEL_UC_FIRMWARE_NOT_SUPPORTED);
 543}
 544
 545static void __force_fw_fetch_failures(struct intel_uc_fw *uc_fw, int e)
 546{
 547	struct drm_i915_private *i915 = __uc_fw_to_gt(uc_fw)->i915;
 548	bool user = e == -EINVAL;
 549
 550	if (i915_inject_probe_error(i915, e)) {
 551		/* non-existing blob */
 552		uc_fw->file_selected.path = "<invalid>";
 553		uc_fw->user_overridden = user;
 554	} else if (i915_inject_probe_error(i915, e)) {
 555		/* require next major version */
 556		uc_fw->file_wanted.ver.major += 1;
 557		uc_fw->file_wanted.ver.minor = 0;
 558		uc_fw->user_overridden = user;
 559	} else if (i915_inject_probe_error(i915, e)) {
 560		/* require next minor version */
 561		uc_fw->file_wanted.ver.minor += 1;
 562		uc_fw->user_overridden = user;
 563	} else if (uc_fw->file_wanted.ver.major &&
 564		   i915_inject_probe_error(i915, e)) {
 565		/* require prev major version */
 566		uc_fw->file_wanted.ver.major -= 1;
 567		uc_fw->file_wanted.ver.minor = 0;
 568		uc_fw->user_overridden = user;
 569	} else if (uc_fw->file_wanted.ver.minor &&
 570		   i915_inject_probe_error(i915, e)) {
 571		/* require prev minor version - hey, this should work! */
 572		uc_fw->file_wanted.ver.minor -= 1;
 573		uc_fw->user_overridden = user;
 574	} else if (user && i915_inject_probe_error(i915, e)) {
 575		/* officially unsupported platform */
 576		uc_fw->file_wanted.ver.major = 0;
 577		uc_fw->file_wanted.ver.minor = 0;
 578		uc_fw->user_overridden = true;
 579	}
 580}
 581
 582static void uc_unpack_css_version(struct intel_uc_fw_ver *ver, u32 css_value)
 583{
 584	/* Get version numbers from the CSS header */
 585	ver->major = FIELD_GET(CSS_SW_VERSION_UC_MAJOR, css_value);
 586	ver->minor = FIELD_GET(CSS_SW_VERSION_UC_MINOR, css_value);
 587	ver->patch = FIELD_GET(CSS_SW_VERSION_UC_PATCH, css_value);
 588}
 589
 590static void guc_read_css_info(struct intel_uc_fw *uc_fw, struct uc_css_header *css)
 591{
 592	struct intel_guc *guc = container_of(uc_fw, struct intel_guc, fw);
 593
 594	/*
 595	 * The GuC firmware includes an extra version number to specify the
 596	 * submission API level. This allows submission code to work with
 597	 * multiple GuC versions without having to know the absolute firmware
 598	 * version number (there are likely to be multiple firmware releases
 599	 * which all support the same submission API level).
 600	 *
 601	 * Note that the spec for the CSS header defines this version number
 602	 * as 'vf_version' as it was originally intended for virtualisation.
 603	 * However, it is applicable to native submission as well.
 604	 *
 605	 * Unfortunately, due to an oversight, this version number was only
 606	 * exposed in the CSS header from v70.6.0.
 607	 */
 608	if (uc_fw->file_selected.ver.major >= 70) {
 609		if (uc_fw->file_selected.ver.minor >= 6) {
 610			/* v70.6.0 adds CSS header support */
 611			uc_unpack_css_version(&guc->submission_version, css->vf_version);
 612		} else if (uc_fw->file_selected.ver.minor >= 3) {
 613			/* v70.3.0 introduced v1.1.0 */
 614			guc->submission_version.major = 1;
 615			guc->submission_version.minor = 1;
 616			guc->submission_version.patch = 0;
 617		} else {
 618			/* v70.0.0 introduced v1.0.0 */
 619			guc->submission_version.major = 1;
 620			guc->submission_version.minor = 0;
 621			guc->submission_version.patch = 0;
 622		}
 623	} else if (uc_fw->file_selected.ver.major >= 69) {
 624		/* v69.0.0 introduced v0.10.0 */
 625		guc->submission_version.major = 0;
 626		guc->submission_version.minor = 10;
 627		guc->submission_version.patch = 0;
 628	} else {
 629		/* Prior versions were v0.1.0 */
 630		guc->submission_version.major = 0;
 631		guc->submission_version.minor = 1;
 632		guc->submission_version.patch = 0;
 633	}
 634
 635	uc_fw->private_data_size = css->private_data_size;
 636}
 637
 638static int __check_ccs_header(struct intel_gt *gt,
 639			      const void *fw_data, size_t fw_size,
 640			      struct intel_uc_fw *uc_fw)
 641{
 642	struct uc_css_header *css;
 643	size_t size;
 644
 645	/* Check the size of the blob before examining buffer contents */
 646	if (unlikely(fw_size < sizeof(struct uc_css_header))) {
 647		gt_warn(gt, "%s firmware %s: invalid size: %zu < %zu\n",
 648			intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path,
 649			fw_size, sizeof(struct uc_css_header));
 650		return -ENODATA;
 651	}
 652
 653	css = (struct uc_css_header *)fw_data;
 654
 655	/* Check integrity of size values inside CSS header */
 656	size = (css->header_size_dw - css->key_size_dw - css->modulus_size_dw -
 657		css->exponent_size_dw) * sizeof(u32);
 658	if (unlikely(size != sizeof(struct uc_css_header))) {
 659		gt_warn(gt, "%s firmware %s: unexpected header size: %zu != %zu\n",
 660			intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path,
 661			fw_size, sizeof(struct uc_css_header));
 662		return -EPROTO;
 663	}
 664
 665	/* uCode size must calculated from other sizes */
 666	uc_fw->ucode_size = (css->size_dw - css->header_size_dw) * sizeof(u32);
 667
 668	/* now RSA */
 669	uc_fw->rsa_size = css->key_size_dw * sizeof(u32);
 670
 671	/* At least, it should have header, uCode and RSA. Size of all three. */
 672	size = sizeof(struct uc_css_header) + uc_fw->ucode_size + uc_fw->rsa_size;
 673	if (unlikely(fw_size < size)) {
 674		gt_warn(gt, "%s firmware %s: invalid size: %zu < %zu\n",
 675			intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path,
 676			fw_size, size);
 677		return -ENOEXEC;
 678	}
 679
 680	/* Sanity check whether this fw is not larger than whole WOPCM memory */
 681	size = __intel_uc_fw_get_upload_size(uc_fw);
 682	if (unlikely(size >= gt->wopcm.size)) {
 683		gt_warn(gt, "%s firmware %s: invalid size: %zu > %zu\n",
 684			intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path,
 685			size, (size_t)gt->wopcm.size);
 686		return -E2BIG;
 687	}
 688
 689	uc_unpack_css_version(&uc_fw->file_selected.ver, css->sw_version);
 690
 691	if (uc_fw->type == INTEL_UC_FW_TYPE_GUC)
 692		guc_read_css_info(uc_fw, css);
 693
 694	return 0;
 695}
 696
 697static int check_gsc_manifest(struct intel_gt *gt,
 698			      const struct firmware *fw,
 699			      struct intel_uc_fw *uc_fw)
 700{
 701	switch (uc_fw->type) {
 702	case INTEL_UC_FW_TYPE_HUC:
 703		intel_huc_fw_get_binary_info(uc_fw, fw->data, fw->size);
 704		break;
 705	case INTEL_UC_FW_TYPE_GSC:
 706		intel_gsc_fw_get_binary_info(uc_fw, fw->data, fw->size);
 707		break;
 708	default:
 709		MISSING_CASE(uc_fw->type);
 710		return -EINVAL;
 711	}
 712
 713	if (uc_fw->dma_start_offset) {
 714		u32 delta = uc_fw->dma_start_offset;
 715
 716		__check_ccs_header(gt, fw->data + delta, fw->size - delta, uc_fw);
 717	}
 718
 719	return 0;
 720}
 721
 722static int check_ccs_header(struct intel_gt *gt,
 723			    const struct firmware *fw,
 724			    struct intel_uc_fw *uc_fw)
 725{
 726	return __check_ccs_header(gt, fw->data, fw->size, uc_fw);
 727}
 728
 729static bool is_ver_8bit(struct intel_uc_fw_ver *ver)
 730{
 731	return ver->major < 0xFF && ver->minor < 0xFF && ver->patch < 0xFF;
 732}
 733
 734static int guc_check_version_range(struct intel_uc_fw *uc_fw)
 735{
 736	struct intel_guc *guc = container_of(uc_fw, struct intel_guc, fw);
 737	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
 738
 739	/*
 740	 * GuC version number components are defined as being 8-bits.
 741	 * The submission code relies on this to optimise version comparison
 742	 * tests. So enforce the restriction here.
 743	 */
 744
 745	if (!is_ver_8bit(&uc_fw->file_selected.ver)) {
 746		gt_warn(gt, "%s firmware: invalid file version: 0x%02X:%02X:%02X\n",
 747			intel_uc_fw_type_repr(uc_fw->type),
 748			uc_fw->file_selected.ver.major,
 749			uc_fw->file_selected.ver.minor,
 750			uc_fw->file_selected.ver.patch);
 751		return -EINVAL;
 752	}
 753
 754	if (!is_ver_8bit(&guc->submission_version)) {
 755		gt_warn(gt, "%s firmware: invalid submit version: 0x%02X:%02X:%02X\n",
 756			intel_uc_fw_type_repr(uc_fw->type),
 757			guc->submission_version.major,
 758			guc->submission_version.minor,
 759			guc->submission_version.patch);
 760		return -EINVAL;
 761	}
 762
 763	return i915_inject_probe_error(gt->i915, -EINVAL);
 764}
 765
 766static int check_fw_header(struct intel_gt *gt,
 767			   const struct firmware *fw,
 768			   struct intel_uc_fw *uc_fw)
 769{
 770	int err = 0;
 771
 772	if (uc_fw->has_gsc_headers)
 773		err = check_gsc_manifest(gt, fw, uc_fw);
 774	else
 775		err = check_ccs_header(gt, fw, uc_fw);
 776	if (err)
 777		return err;
 778
 779	return 0;
 780}
 781
 782static int try_firmware_load(struct intel_uc_fw *uc_fw, const struct firmware **fw)
 783{
 784	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
 785	struct device *dev = gt->i915->drm.dev;
 786	int err;
 787
 788	err = firmware_request_nowarn(fw, uc_fw->file_selected.path, dev);
 789
 790	if (err)
 791		return err;
 792
 793	if (uc_fw->needs_ggtt_mapping && (*fw)->size > INTEL_UC_RSVD_GGTT_PER_FW) {
 794		gt_err(gt, "%s firmware %s: size (%zuKB) exceeds max supported size (%uKB)\n",
 795		       intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path,
 796		       (*fw)->size / SZ_1K, INTEL_UC_RSVD_GGTT_PER_FW / SZ_1K);
 797
 798		/* try to find another blob to load */
 799		release_firmware(*fw);
 800		*fw = NULL;
 801		return -ENOENT;
 802	}
 803
 804	return 0;
 805}
 806
 807static int check_mtl_huc_guc_compatibility(struct intel_gt *gt,
 808					   struct intel_uc_fw_file *huc_selected)
 809{
 810	struct intel_uc_fw_file *guc_selected = &gt->uc.guc.fw.file_selected;
 811	struct intel_uc_fw_ver *huc_ver = &huc_selected->ver;
 812	struct intel_uc_fw_ver *guc_ver = &guc_selected->ver;
 813	bool new_huc, new_guc;
 814
 815	/* we can only do this check after having fetched both GuC and HuC */
 816	GEM_BUG_ON(!huc_selected->path || !guc_selected->path);
 817
 818	/*
 819	 * Due to changes in the authentication flow for MTL, HuC 8.5.1 or newer
 820	 * requires GuC 70.7.0 or newer. Older HuC binaries will instead require
 821	 * GuC < 70.7.0.
 822	 */
 823	new_huc = huc_ver->major > 8 ||
 824		  (huc_ver->major == 8 && huc_ver->minor > 5) ||
 825		  (huc_ver->major == 8 && huc_ver->minor == 5 && huc_ver->patch >= 1);
 826
 827	new_guc = guc_ver->major > 70 ||
 828		  (guc_ver->major == 70 && guc_ver->minor >= 7);
 829
 830	if (new_huc != new_guc) {
 831		UNEXPECTED(gt, "HuC %u.%u.%u is incompatible with GuC %u.%u.%u\n",
 832			   huc_ver->major, huc_ver->minor, huc_ver->patch,
 833			   guc_ver->major, guc_ver->minor, guc_ver->patch);
 834		gt_info(gt, "MTL GuC 70.7.0+ and HuC 8.5.1+ don't work with older releases\n");
 835		return -ENOEXEC;
 836	}
 837
 838	return 0;
 839}
 840
 841int intel_uc_check_file_version(struct intel_uc_fw *uc_fw, bool *old_ver)
 842{
 843	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
 844	struct intel_uc_fw_file *wanted = &uc_fw->file_wanted;
 845	struct intel_uc_fw_file *selected = &uc_fw->file_selected;
 846	int ret;
 847
 848	/*
 849	 * MTL has some compatibility issues with early GuC/HuC binaries
 850	 * not working with newer ones. This is specific to MTL and we
 851	 * don't expect it to extend to other platforms.
 852	 */
 853	if (IS_METEORLAKE(gt->i915) && uc_fw->type == INTEL_UC_FW_TYPE_HUC) {
 854		ret = check_mtl_huc_guc_compatibility(gt, selected);
 855		if (ret)
 856			return ret;
 857	}
 858
 859	if (!wanted->ver.major || !selected->ver.major)
 860		return 0;
 861
 862	/* Check the file's major version was as it claimed */
 863	if (selected->ver.major != wanted->ver.major) {
 864		UNEXPECTED(gt, "%s firmware %s: unexpected version: %u.%u != %u.%u\n",
 865			   intel_uc_fw_type_repr(uc_fw->type), selected->path,
 866			   selected->ver.major, selected->ver.minor,
 867			   wanted->ver.major, wanted->ver.minor);
 868		if (!intel_uc_fw_is_overridden(uc_fw))
 869			return -ENOEXEC;
 870	} else if (old_ver) {
 871		if (selected->ver.minor < wanted->ver.minor)
 872			*old_ver = true;
 873		else if ((selected->ver.minor == wanted->ver.minor) &&
 874			 (selected->ver.patch < wanted->ver.patch))
 875			*old_ver = true;
 876	}
 877
 878	return 0;
 879}
 880
 881/**
 882 * intel_uc_fw_fetch - fetch uC firmware
 883 * @uc_fw: uC firmware
 884 *
 885 * Fetch uC firmware into GEM obj.
 886 *
 887 * Return: 0 on success, a negative errno code on failure.
 888 */
 889int intel_uc_fw_fetch(struct intel_uc_fw *uc_fw)
 890{
 891	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
 892	struct drm_i915_private *i915 = gt->i915;
 893	struct intel_uc_fw_file file_ideal;
 894	struct drm_i915_gem_object *obj;
 895	const struct firmware *fw = NULL;
 896	bool old_ver = false;
 897	int err;
 898
 899	GEM_BUG_ON(!gt->wopcm.size);
 900	GEM_BUG_ON(!intel_uc_fw_is_enabled(uc_fw));
 901
 902	err = i915_inject_probe_error(i915, -ENXIO);
 903	if (err)
 904		goto fail;
 905
 906	__force_fw_fetch_failures(uc_fw, -EINVAL);
 907	__force_fw_fetch_failures(uc_fw, -ESTALE);
 908
 909	err = try_firmware_load(uc_fw, &fw);
 910	memcpy(&file_ideal, &uc_fw->file_wanted, sizeof(file_ideal));
 911
 912	/* Any error is terminal if overriding. Don't bother searching for older versions */
 913	if (err && intel_uc_fw_is_overridden(uc_fw))
 914		goto fail;
 915
 916	while (err == -ENOENT) {
 917		old_ver = true;
 918
 919		__uc_fw_auto_select(i915, uc_fw);
 920		if (!uc_fw->file_selected.path) {
 921			/*
 922			 * No more options! But set the path back to something
 923			 * valid just in case it gets dereferenced.
 924			 */
 925			uc_fw->file_selected.path = file_ideal.path;
 926
 927			/* Also, preserve the version that was really wanted */
 928			memcpy(&uc_fw->file_wanted, &file_ideal, sizeof(uc_fw->file_wanted));
 929			break;
 930		}
 931
 932		err = try_firmware_load(uc_fw, &fw);
 933	}
 934
 935	if (err)
 936		goto fail;
 937
 938	err = check_fw_header(gt, fw, uc_fw);
 939	if (err)
 940		goto fail;
 941
 942	if (uc_fw->type == INTEL_UC_FW_TYPE_GUC) {
 943		err = guc_check_version_range(uc_fw);
 944		if (err)
 945			goto fail;
 946	}
 947
 948	err = intel_uc_check_file_version(uc_fw, &old_ver);
 949	if (err)
 950		goto fail;
 951
 952	if (old_ver && uc_fw->file_selected.ver.major) {
 953		/* Preserve the version that was really wanted */
 954		memcpy(&uc_fw->file_wanted, &file_ideal, sizeof(uc_fw->file_wanted));
 955
 956		UNEXPECTED(gt, "%s firmware %s (%d.%d.%d) is recommended, but only %s (%d.%d.%d) was found\n",
 957			   intel_uc_fw_type_repr(uc_fw->type),
 958			   uc_fw->file_wanted.path,
 959			   uc_fw->file_wanted.ver.major,
 960			   uc_fw->file_wanted.ver.minor,
 961			   uc_fw->file_wanted.ver.patch,
 962			   uc_fw->file_selected.path,
 963			   uc_fw->file_selected.ver.major,
 964			   uc_fw->file_selected.ver.minor,
 965			   uc_fw->file_selected.ver.patch);
 966		gt_info(gt, "Consider updating your linux-firmware pkg or downloading from %s\n",
 967			INTEL_UC_FIRMWARE_URL);
 968	}
 969
 970	if (HAS_LMEM(i915)) {
 971		obj = i915_gem_object_create_lmem_from_data(i915, fw->data, fw->size);
 972		if (!IS_ERR(obj))
 973			obj->flags |= I915_BO_ALLOC_PM_EARLY;
 974	} else {
 975		obj = i915_gem_object_create_shmem_from_data(i915, fw->data, fw->size);
 976	}
 977
 978	if (IS_ERR(obj)) {
 979		err = PTR_ERR(obj);
 980		goto fail;
 981	}
 982
 983	uc_fw->obj = obj;
 984	uc_fw->size = fw->size;
 985	intel_uc_fw_change_status(uc_fw, INTEL_UC_FIRMWARE_AVAILABLE);
 986
 987	release_firmware(fw);
 988	return 0;
 989
 990fail:
 991	intel_uc_fw_change_status(uc_fw, err == -ENOENT ?
 992				  INTEL_UC_FIRMWARE_MISSING :
 993				  INTEL_UC_FIRMWARE_ERROR);
 994
 995	gt_probe_error(gt, "%s firmware %s: fetch failed %pe\n",
 996		       intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path, ERR_PTR(err));
 997	gt_info(gt, "%s firmware(s) can be downloaded from %s\n",
 998		intel_uc_fw_type_repr(uc_fw->type), INTEL_UC_FIRMWARE_URL);
 999
1000	release_firmware(fw);		/* OK even if fw is NULL */
1001	return err;
1002}
1003
1004static u32 uc_fw_ggtt_offset(struct intel_uc_fw *uc_fw)
1005{
1006	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
1007	struct i915_ggtt *ggtt = gt->ggtt;
1008	struct drm_mm_node *node = &ggtt->uc_fw;
1009	u32 offset = uc_fw->type * INTEL_UC_RSVD_GGTT_PER_FW;
1010
1011	/*
1012	 * The media GT shares the GGTT with the root GT, which means that
1013	 * we need to use different offsets for the binaries on the media GT.
1014	 * To keep the math simple, we use 8MB for the root tile and 8MB for
1015	 * the media one. This will need to be updated if we ever have more
1016	 * than 1 media GT.
1017	 */
1018	BUILD_BUG_ON(INTEL_UC_FW_NUM_TYPES * INTEL_UC_RSVD_GGTT_PER_FW > SZ_8M);
1019	GEM_BUG_ON(gt->type == GT_MEDIA && gt->info.id > 1);
1020	if (gt->type == GT_MEDIA)
1021		offset += SZ_8M;
1022
1023	GEM_BUG_ON(!drm_mm_node_allocated(node));
1024	GEM_BUG_ON(upper_32_bits(node->start));
1025	GEM_BUG_ON(upper_32_bits(node->start + node->size - 1));
1026	GEM_BUG_ON(offset + uc_fw->obj->base.size > node->size);
1027	GEM_BUG_ON(uc_fw->obj->base.size > INTEL_UC_RSVD_GGTT_PER_FW);
1028
1029	return lower_32_bits(node->start + offset);
1030}
1031
1032static void uc_fw_bind_ggtt(struct intel_uc_fw *uc_fw)
1033{
1034	struct drm_i915_gem_object *obj = uc_fw->obj;
1035	struct i915_ggtt *ggtt = __uc_fw_to_gt(uc_fw)->ggtt;
1036	struct i915_vma_resource *vma_res = &uc_fw->vma_res;
1037	u32 pte_flags = 0;
1038
1039	if (!uc_fw->needs_ggtt_mapping)
1040		return;
1041
1042	vma_res->start = uc_fw_ggtt_offset(uc_fw);
1043	vma_res->node_size = obj->base.size;
1044	vma_res->bi.pages = obj->mm.pages;
1045
1046	GEM_BUG_ON(!i915_gem_object_has_pinned_pages(obj));
1047
1048	/* uc_fw->obj cache domains were not controlled across suspend */
1049	if (i915_gem_object_has_struct_page(obj))
1050		drm_clflush_sg(vma_res->bi.pages);
1051
1052	if (i915_gem_object_is_lmem(obj))
1053		pte_flags |= PTE_LM;
1054
1055	if (ggtt->vm.raw_insert_entries)
1056		ggtt->vm.raw_insert_entries(&ggtt->vm, vma_res,
1057					    i915_gem_get_pat_index(ggtt->vm.i915,
1058								   I915_CACHE_NONE),
1059					    pte_flags);
1060	else
1061		ggtt->vm.insert_entries(&ggtt->vm, vma_res,
1062					i915_gem_get_pat_index(ggtt->vm.i915,
1063							       I915_CACHE_NONE),
1064					pte_flags);
1065}
1066
1067static void uc_fw_unbind_ggtt(struct intel_uc_fw *uc_fw)
1068{
1069	struct i915_ggtt *ggtt = __uc_fw_to_gt(uc_fw)->ggtt;
1070	struct i915_vma_resource *vma_res = &uc_fw->vma_res;
1071
1072	if (!vma_res->node_size)
1073		return;
1074
1075	ggtt->vm.clear_range(&ggtt->vm, vma_res->start, vma_res->node_size);
1076}
1077
1078static int uc_fw_xfer(struct intel_uc_fw *uc_fw, u32 dst_offset, u32 dma_flags)
1079{
1080	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
1081	struct intel_uncore *uncore = gt->uncore;
1082	u64 offset;
1083	int ret;
1084
1085	ret = i915_inject_probe_error(gt->i915, -ETIMEDOUT);
1086	if (ret)
1087		return ret;
1088
1089	intel_uncore_forcewake_get(uncore, FORCEWAKE_ALL);
1090
1091	/* Set the source address for the uCode */
1092	offset = uc_fw->vma_res.start + uc_fw->dma_start_offset;
1093	GEM_BUG_ON(upper_32_bits(offset) & 0xFFFF0000);
1094	intel_uncore_write_fw(uncore, DMA_ADDR_0_LOW, lower_32_bits(offset));
1095	intel_uncore_write_fw(uncore, DMA_ADDR_0_HIGH, upper_32_bits(offset));
1096
1097	/* Set the DMA destination */
1098	intel_uncore_write_fw(uncore, DMA_ADDR_1_LOW, dst_offset);
1099	intel_uncore_write_fw(uncore, DMA_ADDR_1_HIGH, DMA_ADDRESS_SPACE_WOPCM);
1100
1101	/*
1102	 * Set the transfer size. The header plus uCode will be copied to WOPCM
1103	 * via DMA, excluding any other components
1104	 */
1105	intel_uncore_write_fw(uncore, DMA_COPY_SIZE,
1106			      sizeof(struct uc_css_header) + uc_fw->ucode_size);
1107
1108	/* Start the DMA */
1109	intel_uncore_write_fw(uncore, DMA_CTRL,
1110			      _MASKED_BIT_ENABLE(dma_flags | START_DMA));
1111
1112	/* Wait for DMA to finish */
1113	ret = intel_wait_for_register_fw(uncore, DMA_CTRL, START_DMA, 0, 100);
1114	if (ret)
1115		gt_err(gt, "DMA for %s fw failed, DMA_CTRL=%u\n",
1116		       intel_uc_fw_type_repr(uc_fw->type),
1117		       intel_uncore_read_fw(uncore, DMA_CTRL));
1118
1119	/* Disable the bits once DMA is over */
1120	intel_uncore_write_fw(uncore, DMA_CTRL, _MASKED_BIT_DISABLE(dma_flags));
1121
1122	intel_uncore_forcewake_put(uncore, FORCEWAKE_ALL);
1123
1124	return ret;
1125}
1126
1127int intel_uc_fw_mark_load_failed(struct intel_uc_fw *uc_fw, int err)
1128{
1129	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
1130
1131	GEM_BUG_ON(!intel_uc_fw_is_loadable(uc_fw));
1132
1133	gt_probe_error(gt, "Failed to load %s firmware %s %pe\n",
1134		       intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path, ERR_PTR(err));
1135	intel_uc_fw_change_status(uc_fw, INTEL_UC_FIRMWARE_LOAD_FAIL);
1136
1137	return err;
1138}
1139
1140/**
1141 * intel_uc_fw_upload - load uC firmware using custom loader
1142 * @uc_fw: uC firmware
1143 * @dst_offset: destination offset
1144 * @dma_flags: flags for flags for dma ctrl
1145 *
1146 * Loads uC firmware and updates internal flags.
1147 *
1148 * Return: 0 on success, non-zero on failure.
1149 */
1150int intel_uc_fw_upload(struct intel_uc_fw *uc_fw, u32 dst_offset, u32 dma_flags)
1151{
1152	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
1153	int err;
1154
1155	/* make sure the status was cleared the last time we reset the uc */
1156	GEM_BUG_ON(intel_uc_fw_is_loaded(uc_fw));
1157
1158	err = i915_inject_probe_error(gt->i915, -ENOEXEC);
1159	if (err)
1160		return err;
1161
1162	if (!intel_uc_fw_is_loadable(uc_fw))
1163		return -ENOEXEC;
1164
1165	/* Call custom loader */
1166	err = uc_fw_xfer(uc_fw, dst_offset, dma_flags);
1167	if (err)
1168		goto fail;
1169
1170	intel_uc_fw_change_status(uc_fw, INTEL_UC_FIRMWARE_TRANSFERRED);
1171	return 0;
1172
1173fail:
1174	return intel_uc_fw_mark_load_failed(uc_fw, err);
1175}
1176
1177static inline bool uc_fw_need_rsa_in_memory(struct intel_uc_fw *uc_fw)
1178{
1179	/*
1180	 * The HW reads the GuC RSA from memory if the key size is > 256 bytes,
1181	 * while it reads it from the 64 RSA registers if it is smaller.
1182	 * The HuC RSA is always read from memory.
1183	 */
1184	return uc_fw->type == INTEL_UC_FW_TYPE_HUC || uc_fw->rsa_size > 256;
1185}
1186
1187static int uc_fw_rsa_data_create(struct intel_uc_fw *uc_fw)
1188{
1189	struct intel_gt *gt = __uc_fw_to_gt(uc_fw);
1190	struct i915_vma *vma;
1191	size_t copied;
1192	void *vaddr;
1193	int err;
1194
1195	err = i915_inject_probe_error(gt->i915, -ENXIO);
1196	if (err)
1197		return err;
1198
1199	if (!uc_fw_need_rsa_in_memory(uc_fw))
1200		return 0;
1201
1202	/*
1203	 * uC firmwares will sit above GUC_GGTT_TOP and will not map through
1204	 * GGTT. Unfortunately, this means that the GuC HW cannot perform the uC
1205	 * authentication from memory, as the RSA offset now falls within the
1206	 * GuC inaccessible range. We resort to perma-pinning an additional vma
1207	 * within the accessible range that only contains the RSA signature.
1208	 * The GuC HW can use this extra pinning to perform the authentication
1209	 * since its GGTT offset will be GuC accessible.
1210	 */
1211	GEM_BUG_ON(uc_fw->rsa_size > PAGE_SIZE);
1212	vma = intel_guc_allocate_vma(&gt->uc.guc, PAGE_SIZE);
1213	if (IS_ERR(vma))
1214		return PTR_ERR(vma);
1215
1216	vaddr = i915_gem_object_pin_map_unlocked(vma->obj,
1217						 intel_gt_coherent_map_type(gt, vma->obj, true));
1218	if (IS_ERR(vaddr)) {
1219		i915_vma_unpin_and_release(&vma, 0);
1220		err = PTR_ERR(vaddr);
1221		goto unpin_out;
1222	}
1223
1224	copied = intel_uc_fw_copy_rsa(uc_fw, vaddr, vma->size);
1225	i915_gem_object_unpin_map(vma->obj);
1226
1227	if (copied < uc_fw->rsa_size) {
1228		err = -ENOMEM;
1229		goto unpin_out;
1230	}
1231
1232	uc_fw->rsa_data = vma;
1233
1234	return 0;
1235
1236unpin_out:
1237	i915_vma_unpin_and_release(&vma, 0);
1238	return err;
1239}
1240
1241static void uc_fw_rsa_data_destroy(struct intel_uc_fw *uc_fw)
1242{
1243	i915_vma_unpin_and_release(&uc_fw->rsa_data, 0);
1244}
1245
1246int intel_uc_fw_init(struct intel_uc_fw *uc_fw)
1247{
1248	int err;
1249
1250	/* this should happen before the load! */
1251	GEM_BUG_ON(intel_uc_fw_is_loaded(uc_fw));
1252
1253	if (!intel_uc_fw_is_available(uc_fw))
1254		return -ENOEXEC;
1255
1256	err = i915_gem_object_pin_pages_unlocked(uc_fw->obj);
1257	if (err) {
1258		gt_dbg(__uc_fw_to_gt(uc_fw), "%s fw pin-pages failed %pe\n",
1259		       intel_uc_fw_type_repr(uc_fw->type), ERR_PTR(err));
1260		goto out;
1261	}
1262
1263	err = uc_fw_rsa_data_create(uc_fw);
1264	if (err) {
1265		gt_dbg(__uc_fw_to_gt(uc_fw), "%s fw rsa data creation failed %pe\n",
1266		       intel_uc_fw_type_repr(uc_fw->type), ERR_PTR(err));
1267		goto out_unpin;
1268	}
1269
1270	uc_fw_bind_ggtt(uc_fw);
1271
1272	return 0;
1273
1274out_unpin:
1275	i915_gem_object_unpin_pages(uc_fw->obj);
1276out:
1277	return err;
1278}
1279
1280void intel_uc_fw_fini(struct intel_uc_fw *uc_fw)
1281{
1282	uc_fw_unbind_ggtt(uc_fw);
1283	uc_fw_rsa_data_destroy(uc_fw);
1284
1285	if (i915_gem_object_has_pinned_pages(uc_fw->obj))
1286		i915_gem_object_unpin_pages(uc_fw->obj);
1287
1288	intel_uc_fw_change_status(uc_fw, INTEL_UC_FIRMWARE_AVAILABLE);
1289}
1290
1291void intel_uc_fw_resume_mapping(struct intel_uc_fw *uc_fw)
1292{
1293	if (!intel_uc_fw_is_available(uc_fw))
1294		return;
1295
1296	if (!i915_gem_object_has_pinned_pages(uc_fw->obj))
1297		return;
1298
1299	uc_fw_bind_ggtt(uc_fw);
1300}
1301
1302/**
1303 * intel_uc_fw_cleanup_fetch - cleanup uC firmware
1304 * @uc_fw: uC firmware
1305 *
1306 * Cleans up uC firmware by releasing the firmware GEM obj.
1307 */
1308void intel_uc_fw_cleanup_fetch(struct intel_uc_fw *uc_fw)
1309{
1310	if (!intel_uc_fw_is_available(uc_fw))
1311		return;
1312
1313	i915_gem_object_put(fetch_and_zero(&uc_fw->obj));
1314
1315	intel_uc_fw_change_status(uc_fw, INTEL_UC_FIRMWARE_SELECTED);
1316}
1317
1318/**
1319 * intel_uc_fw_copy_rsa - copy fw RSA to buffer
1320 *
1321 * @uc_fw: uC firmware
1322 * @dst: dst buffer
1323 * @max_len: max number of bytes to copy
1324 *
1325 * Return: number of copied bytes.
1326 */
1327size_t intel_uc_fw_copy_rsa(struct intel_uc_fw *uc_fw, void *dst, u32 max_len)
1328{
1329	struct intel_memory_region *mr = uc_fw->obj->mm.region;
1330	u32 size = min_t(u32, uc_fw->rsa_size, max_len);
1331	u32 offset = uc_fw->dma_start_offset + sizeof(struct uc_css_header) + uc_fw->ucode_size;
1332	struct sgt_iter iter;
1333	size_t count = 0;
1334	int idx;
1335
1336	/* Called during reset handling, must be atomic [no fs_reclaim] */
1337	GEM_BUG_ON(!intel_uc_fw_is_available(uc_fw));
1338
1339	idx = offset >> PAGE_SHIFT;
1340	offset = offset_in_page(offset);
1341	if (i915_gem_object_has_struct_page(uc_fw->obj)) {
1342		struct page *page;
1343
1344		for_each_sgt_page(page, iter, uc_fw->obj->mm.pages) {
1345			u32 len = min_t(u32, size, PAGE_SIZE - offset);
1346
1347			if (idx > 0) {
1348				idx--;
1349				continue;
1350			}
1351
1352			memcpy_from_page(dst, page, offset, len);
1353
1354			offset = 0;
1355			dst += len;
1356			size -= len;
1357			count += len;
1358			if (!size)
1359				break;
1360		}
1361	} else {
1362		dma_addr_t addr;
1363
1364		for_each_sgt_daddr(addr, iter, uc_fw->obj->mm.pages) {
1365			u32 len = min_t(u32, size, PAGE_SIZE - offset);
1366			void __iomem *vaddr;
1367
1368			if (idx > 0) {
1369				idx--;
1370				continue;
1371			}
1372
1373			vaddr = io_mapping_map_atomic_wc(&mr->iomap,
1374							 addr - mr->region.start);
1375			memcpy_fromio(dst, vaddr + offset, len);
1376			io_mapping_unmap_atomic(vaddr);
1377
1378			offset = 0;
1379			dst += len;
1380			size -= len;
1381			count += len;
1382			if (!size)
1383				break;
1384		}
1385	}
1386
1387	return count;
1388}
1389
1390/**
1391 * intel_uc_fw_dump - dump information about uC firmware
1392 * @uc_fw: uC firmware
1393 * @p: the &drm_printer
1394 *
1395 * Pretty printer for uC firmware.
1396 */
1397void intel_uc_fw_dump(const struct intel_uc_fw *uc_fw, struct drm_printer *p)
1398{
1399	bool got_wanted;
1400
1401	drm_printf(p, "%s firmware: %s\n",
1402		   intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_selected.path);
1403	if (uc_fw->file_selected.path != uc_fw->file_wanted.path)
1404		drm_printf(p, "%s firmware wanted: %s\n",
1405			   intel_uc_fw_type_repr(uc_fw->type), uc_fw->file_wanted.path);
1406	drm_printf(p, "\tstatus: %s\n",
1407		   intel_uc_fw_status_repr(uc_fw->status));
1408
1409	if (uc_fw->file_selected.ver.major < uc_fw->file_wanted.ver.major)
1410		got_wanted = false;
1411	else if ((uc_fw->file_selected.ver.major == uc_fw->file_wanted.ver.major) &&
1412		 (uc_fw->file_selected.ver.minor < uc_fw->file_wanted.ver.minor))
1413		got_wanted = false;
1414	else if ((uc_fw->file_selected.ver.major == uc_fw->file_wanted.ver.major) &&
1415		 (uc_fw->file_selected.ver.minor == uc_fw->file_wanted.ver.minor) &&
1416		 (uc_fw->file_selected.ver.patch < uc_fw->file_wanted.ver.patch))
1417		got_wanted = false;
1418	else
1419		got_wanted = true;
1420
1421	if (!got_wanted)
1422		drm_printf(p, "\tversion: wanted %u.%u.%u, found %u.%u.%u\n",
1423			   uc_fw->file_wanted.ver.major,
1424			   uc_fw->file_wanted.ver.minor,
1425			   uc_fw->file_wanted.ver.patch,
1426			   uc_fw->file_selected.ver.major,
1427			   uc_fw->file_selected.ver.minor,
1428			   uc_fw->file_selected.ver.patch);
1429	else
1430		drm_printf(p, "\tversion: found %u.%u.%u\n",
1431			   uc_fw->file_selected.ver.major,
1432			   uc_fw->file_selected.ver.minor,
1433			   uc_fw->file_selected.ver.patch);
1434	drm_printf(p, "\tuCode: %u bytes\n", uc_fw->ucode_size);
1435	drm_printf(p, "\tRSA: %u bytes\n", uc_fw->rsa_size);
1436}