xref: /linux/drivers/gpu/nova-core/firmware/gsp.rs (revision 07fdad3a93756b872da7b53647715c48d0f4a2d0)
1 // SPDX-License-Identifier: GPL-2.0
2 
3 use core::mem::size_of_val;
4 
5 use kernel::device;
6 use kernel::dma::{DataDirection, DmaAddress};
7 use kernel::kvec;
8 use kernel::prelude::*;
9 use kernel::scatterlist::{Owned, SGTable};
10 
11 use crate::dma::DmaObject;
12 use crate::firmware::riscv::RiscvFirmware;
13 use crate::gpu::{Architecture, Chipset};
14 use crate::gsp::GSP_PAGE_SIZE;
15 
16 /// Ad-hoc and temporary module to extract sections from ELF images.
17 ///
18 /// Some firmware images are currently packaged as ELF files, where sections names are used as keys
19 /// to specific and related bits of data. Future firmware versions are scheduled to move away from
20 /// that scheme before nova-core becomes stable, which means this module will eventually be
21 /// removed.
22 mod elf {
23     use core::mem::size_of;
24 
25     use kernel::bindings;
26     use kernel::str::CStr;
27     use kernel::transmute::FromBytes;
28 
29     /// Newtype to provide a [`FromBytes`] implementation.
30     #[repr(transparent)]
31     struct Elf64Hdr(bindings::elf64_hdr);
32     // SAFETY: all bit patterns are valid for this type, and it doesn't use interior mutability.
33     unsafe impl FromBytes for Elf64Hdr {}
34 
35     #[repr(transparent)]
36     struct Elf64SHdr(bindings::elf64_shdr);
37     // SAFETY: all bit patterns are valid for this type, and it doesn't use interior mutability.
38     unsafe impl FromBytes for Elf64SHdr {}
39 
40     /// Tries to extract section with name `name` from the ELF64 image `elf`, and returns it.
41     pub(super) fn elf64_section<'a, 'b>(elf: &'a [u8], name: &'b str) -> Option<&'a [u8]> {
42         let hdr = &elf
43             .get(0..size_of::<bindings::elf64_hdr>())
44             .and_then(Elf64Hdr::from_bytes)?
45             .0;
46 
47         // Get all the section headers.
48         let mut shdr = {
49             let shdr_num = usize::from(hdr.e_shnum);
50             let shdr_start = usize::try_from(hdr.e_shoff).ok()?;
51             let shdr_end = shdr_num
52                 .checked_mul(size_of::<Elf64SHdr>())
53                 .and_then(|v| v.checked_add(shdr_start))?;
54 
55             elf.get(shdr_start..shdr_end)
56                 .map(|slice| slice.chunks_exact(size_of::<Elf64SHdr>()))?
57         };
58 
59         // Get the strings table.
60         let strhdr = shdr
61             .clone()
62             .nth(usize::from(hdr.e_shstrndx))
63             .and_then(Elf64SHdr::from_bytes)?;
64 
65         // Find the section which name matches `name` and return it.
66         shdr.find(|&sh| {
67             let Some(hdr) = Elf64SHdr::from_bytes(sh) else {
68                 return false;
69             };
70 
71             let Some(name_idx) = strhdr
72                 .0
73                 .sh_offset
74                 .checked_add(u64::from(hdr.0.sh_name))
75                 .and_then(|idx| usize::try_from(idx).ok())
76             else {
77                 return false;
78             };
79 
80             // Get the start of the name.
81             elf.get(name_idx..)
82                 // Stop at the first `0`.
83                 .and_then(|nstr| nstr.get(0..=nstr.iter().position(|b| *b == 0)?))
84                 // Convert into CStr. This should never fail because of the line above.
85                 .and_then(|nstr| CStr::from_bytes_with_nul(nstr).ok())
86                 // Convert into str.
87                 .and_then(|c_str| c_str.to_str().ok())
88                 // Check that the name matches.
89                 .map(|str| str == name)
90                 .unwrap_or(false)
91         })
92         // Return the slice containing the section.
93         .and_then(|sh| {
94             let hdr = Elf64SHdr::from_bytes(sh)?;
95             let start = usize::try_from(hdr.0.sh_offset).ok()?;
96             let end = usize::try_from(hdr.0.sh_size)
97                 .ok()
98                 .and_then(|sh_size| start.checked_add(sh_size))?;
99 
100             elf.get(start..end)
101         })
102     }
103 }
104 
105 /// GSP firmware with 3-level radix page tables for the GSP bootloader.
106 ///
107 /// The bootloader expects firmware to be mapped starting at address 0 in GSP's virtual address
108 /// space:
109 ///
110 /// ```text
111 /// Level 0:  1 page, 1 entry         -> points to first level 1 page
112 /// Level 1:  Multiple pages/entries  -> each entry points to a level 2 page
113 /// Level 2:  Multiple pages/entries  -> each entry points to a firmware page
114 /// ```
115 ///
116 /// Each page is 4KB, each entry is 8 bytes (64-bit DMA address).
117 /// Also known as "Radix3" firmware.
118 #[pin_data]
119 pub(crate) struct GspFirmware {
120     /// The GSP firmware inside a [`VVec`], device-mapped via a SG table.
121     #[pin]
122     fw: SGTable<Owned<VVec<u8>>>,
123     /// Level 2 page table whose entries contain DMA addresses of firmware pages.
124     #[pin]
125     level2: SGTable<Owned<VVec<u8>>>,
126     /// Level 1 page table whose entries contain DMA addresses of level 2 pages.
127     #[pin]
128     level1: SGTable<Owned<VVec<u8>>>,
129     /// Level 0 page table (single 4KB page) with one entry: DMA address of first level 1 page.
130     level0: DmaObject,
131     /// Size in bytes of the firmware contained in [`Self::fw`].
132     size: usize,
133     /// Device-mapped GSP signatures matching the GPU's [`Chipset`].
134     signatures: DmaObject,
135     /// GSP bootloader, verifies the GSP firmware before loading and running it.
136     bootloader: RiscvFirmware,
137 }
138 
139 impl GspFirmware {
140     /// Loads the GSP firmware binaries, map them into `dev`'s address-space, and creates the page
141     /// tables expected by the GSP bootloader to load it.
142     pub(crate) fn new<'a, 'b>(
143         dev: &'a device::Device<device::Bound>,
144         chipset: Chipset,
145         ver: &'b str,
146     ) -> Result<impl PinInit<Self, Error> + 'a> {
147         let fw = super::request_firmware(dev, chipset, "gsp", ver)?;
148 
149         let fw_section = elf::elf64_section(fw.data(), ".fwimage").ok_or(EINVAL)?;
150 
151         let sigs_section = match chipset.arch() {
152             Architecture::Ampere => ".fwsignature_ga10x",
153             _ => return Err(ENOTSUPP),
154         };
155         let signatures = elf::elf64_section(fw.data(), sigs_section)
156             .ok_or(EINVAL)
157             .and_then(|data| DmaObject::from_data(dev, data))?;
158 
159         let size = fw_section.len();
160 
161         // Move the firmware into a vmalloc'd vector and map it into the device address
162         // space.
163         let fw_vvec = VVec::with_capacity(fw_section.len(), GFP_KERNEL)
164             .and_then(|mut v| {
165                 v.extend_from_slice(fw_section, GFP_KERNEL)?;
166                 Ok(v)
167             })
168             .map_err(|_| ENOMEM)?;
169 
170         let bl = super::request_firmware(dev, chipset, "bootloader", ver)?;
171         let bootloader = RiscvFirmware::new(dev, &bl)?;
172 
173         Ok(try_pin_init!(Self {
174             fw <- SGTable::new(dev, fw_vvec, DataDirection::ToDevice, GFP_KERNEL),
175             level2 <- {
176                 // Allocate the level 2 page table, map the firmware onto it, and map it into the
177                 // device address space.
178                 VVec::<u8>::with_capacity(
179                     fw.iter().count() * core::mem::size_of::<u64>(),
180                     GFP_KERNEL,
181                 )
182                 .map_err(|_| ENOMEM)
183                 .and_then(|level2| map_into_lvl(&fw, level2))
184                 .map(|level2| SGTable::new(dev, level2, DataDirection::ToDevice, GFP_KERNEL))?
185             },
186             level1 <- {
187                 // Allocate the level 1 page table, map the level 2 page table onto it, and map it
188                 // into the device address space.
189                 VVec::<u8>::with_capacity(
190                     level2.iter().count() * core::mem::size_of::<u64>(),
191                     GFP_KERNEL,
192                 )
193                 .map_err(|_| ENOMEM)
194                 .and_then(|level1| map_into_lvl(&level2, level1))
195                 .map(|level1| SGTable::new(dev, level1, DataDirection::ToDevice, GFP_KERNEL))?
196             },
197             level0: {
198                 // Allocate the level 0 page table as a device-visible DMA object, and map the
199                 // level 1 page table onto it.
200 
201                 // Level 0 page table data.
202                 let mut level0_data = kvec![0u8; GSP_PAGE_SIZE]?;
203 
204                 // Fill level 1 page entry.
205                 #[allow(clippy::useless_conversion)]
206                 let level1_entry = u64::from(level1.iter().next().unwrap().dma_address());
207                 let dst = &mut level0_data[..size_of_val(&level1_entry)];
208                 dst.copy_from_slice(&level1_entry.to_le_bytes());
209 
210                 // Turn the level0 page table into a [`DmaObject`].
211                 DmaObject::from_data(dev, &level0_data)?
212             },
213             size,
214             signatures,
215             bootloader,
216         }))
217     }
218 
219     #[expect(unused)]
220     /// Returns the DMA handle of the radix3 level 0 page table.
221     pub(crate) fn radix3_dma_handle(&self) -> DmaAddress {
222         self.level0.dma_handle()
223     }
224 }
225 
226 /// Build a page table from a scatter-gather list.
227 ///
228 /// Takes each DMA-mapped region from `sg_table` and writes page table entries
229 /// for all 4KB pages within that region. For example, a 16KB SG entry becomes
230 /// 4 consecutive page table entries.
231 fn map_into_lvl(sg_table: &SGTable<Owned<VVec<u8>>>, mut dst: VVec<u8>) -> Result<VVec<u8>> {
232     for sg_entry in sg_table.iter() {
233         // Number of pages we need to map.
234         let num_pages = (sg_entry.dma_len() as usize).div_ceil(GSP_PAGE_SIZE);
235 
236         for i in 0..num_pages {
237             let entry = sg_entry.dma_address() + (i as u64 * GSP_PAGE_SIZE as u64);
238             dst.extend_from_slice(&entry.to_le_bytes(), GFP_KERNEL)?;
239         }
240     }
241 
242     Ok(dst)
243 }
244