Loading...
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * Qualcomm self-authenticating modem subsystem remoteproc driver
4 *
5 * Copyright (C) 2016 Linaro Ltd.
6 * Copyright (C) 2014 Sony Mobile Communications AB
7 * Copyright (c) 2012-2013, The Linux Foundation. All rights reserved.
8 */
9
10#include <linux/clk.h>
11#include <linux/delay.h>
12#include <linux/devcoredump.h>
13#include <linux/dma-mapping.h>
14#include <linux/interrupt.h>
15#include <linux/kernel.h>
16#include <linux/mfd/syscon.h>
17#include <linux/module.h>
18#include <linux/of.h>
19#include <linux/of_reserved_mem.h>
20#include <linux/of_platform.h>
21#include <linux/platform_device.h>
22#include <linux/pm_domain.h>
23#include <linux/pm_runtime.h>
24#include <linux/regmap.h>
25#include <linux/regulator/consumer.h>
26#include <linux/remoteproc.h>
27#include <linux/reset.h>
28#include <linux/soc/qcom/mdt_loader.h>
29#include <linux/iopoll.h>
30#include <linux/slab.h>
31
32#include "remoteproc_internal.h"
33#include "qcom_common.h"
34#include "qcom_pil_info.h"
35#include "qcom_q6v5.h"
36
37#include <linux/firmware/qcom/qcom_scm.h>
38
39#define MPSS_CRASH_REASON_SMEM 421
40
41#define MBA_LOG_SIZE SZ_4K
42
43#define MPSS_PAS_ID 5
44
45/* RMB Status Register Values */
46#define RMB_PBL_SUCCESS 0x1
47
48#define RMB_MBA_XPU_UNLOCKED 0x1
49#define RMB_MBA_XPU_UNLOCKED_SCRIBBLED 0x2
50#define RMB_MBA_META_DATA_AUTH_SUCCESS 0x3
51#define RMB_MBA_AUTH_COMPLETE 0x4
52
53/* PBL/MBA interface registers */
54#define RMB_MBA_IMAGE_REG 0x00
55#define RMB_PBL_STATUS_REG 0x04
56#define RMB_MBA_COMMAND_REG 0x08
57#define RMB_MBA_STATUS_REG 0x0C
58#define RMB_PMI_META_DATA_REG 0x10
59#define RMB_PMI_CODE_START_REG 0x14
60#define RMB_PMI_CODE_LENGTH_REG 0x18
61#define RMB_MBA_MSS_STATUS 0x40
62#define RMB_MBA_ALT_RESET 0x44
63
64#define RMB_CMD_META_DATA_READY 0x1
65#define RMB_CMD_LOAD_READY 0x2
66
67/* QDSP6SS Register Offsets */
68#define QDSP6SS_RESET_REG 0x014
69#define QDSP6SS_GFMUX_CTL_REG 0x020
70#define QDSP6SS_PWR_CTL_REG 0x030
71#define QDSP6SS_MEM_PWR_CTL 0x0B0
72#define QDSP6V6SS_MEM_PWR_CTL 0x034
73#define QDSP6SS_STRAP_ACC 0x110
74#define QDSP6V62SS_BHS_STATUS 0x0C4
75
76/* AXI Halt Register Offsets */
77#define AXI_HALTREQ_REG 0x0
78#define AXI_HALTACK_REG 0x4
79#define AXI_IDLE_REG 0x8
80#define AXI_GATING_VALID_OVERRIDE BIT(0)
81
82#define HALT_ACK_TIMEOUT_US 100000
83
84/* QACCEPT Register Offsets */
85#define QACCEPT_ACCEPT_REG 0x0
86#define QACCEPT_ACTIVE_REG 0x4
87#define QACCEPT_DENY_REG 0x8
88#define QACCEPT_REQ_REG 0xC
89
90#define QACCEPT_TIMEOUT_US 50
91
92/* QDSP6SS_RESET */
93#define Q6SS_STOP_CORE BIT(0)
94#define Q6SS_CORE_ARES BIT(1)
95#define Q6SS_BUS_ARES_ENABLE BIT(2)
96
97/* QDSP6SS CBCR */
98#define Q6SS_CBCR_CLKEN BIT(0)
99#define Q6SS_CBCR_CLKOFF BIT(31)
100#define Q6SS_CBCR_TIMEOUT_US 200
101
102/* QDSP6SS_GFMUX_CTL */
103#define Q6SS_CLK_ENABLE BIT(1)
104
105/* QDSP6SS_PWR_CTL */
106#define Q6SS_L2DATA_SLP_NRET_N_0 BIT(0)
107#define Q6SS_L2DATA_SLP_NRET_N_1 BIT(1)
108#define Q6SS_L2DATA_SLP_NRET_N_2 BIT(2)
109#define Q6SS_L2TAG_SLP_NRET_N BIT(16)
110#define Q6SS_ETB_SLP_NRET_N BIT(17)
111#define Q6SS_L2DATA_STBY_N BIT(18)
112#define Q6SS_SLP_RET_N BIT(19)
113#define Q6SS_CLAMP_IO BIT(20)
114#define QDSS_BHS_ON BIT(21)
115#define QDSS_LDO_BYP BIT(22)
116
117/* QDSP6v55 parameters */
118#define QDSP6V55_MEM_BITS GENMASK(16, 8)
119
120/* QDSP6v56 parameters */
121#define QDSP6v56_LDO_BYP BIT(25)
122#define QDSP6v56_BHS_ON BIT(24)
123#define QDSP6v56_CLAMP_WL BIT(21)
124#define QDSP6v56_CLAMP_QMC_MEM BIT(22)
125#define QDSP6SS_XO_CBCR 0x0038
126#define QDSP6SS_ACC_OVERRIDE_VAL 0x20
127#define QDSP6v55_BHS_EN_REST_ACK BIT(0)
128
129/* QDSP6v65 parameters */
130#define QDSP6SS_CORE_CBCR 0x20
131#define QDSP6SS_SLEEP 0x3C
132#define QDSP6SS_BOOT_CORE_START 0x400
133#define QDSP6SS_BOOT_CMD 0x404
134#define BOOT_FSM_TIMEOUT 10000
135#define BHS_CHECK_MAX_LOOPS 200
136
137struct reg_info {
138 struct regulator *reg;
139 int uV;
140 int uA;
141};
142
143struct qcom_mss_reg_res {
144 const char *supply;
145 int uV;
146 int uA;
147};
148
149struct rproc_hexagon_res {
150 const char *hexagon_mba_image;
151 struct qcom_mss_reg_res *proxy_supply;
152 struct qcom_mss_reg_res *fallback_proxy_supply;
153 struct qcom_mss_reg_res *active_supply;
154 char **proxy_clk_names;
155 char **reset_clk_names;
156 char **active_clk_names;
157 char **proxy_pd_names;
158 int version;
159 bool need_mem_protection;
160 bool has_alt_reset;
161 bool has_mba_logs;
162 bool has_spare_reg;
163 bool has_qaccept_regs;
164 bool has_ext_cntl_regs;
165 bool has_vq6;
166};
167
168struct q6v5 {
169 struct device *dev;
170 struct rproc *rproc;
171
172 void __iomem *reg_base;
173 void __iomem *rmb_base;
174
175 struct regmap *halt_map;
176 struct regmap *conn_map;
177
178 u32 halt_q6;
179 u32 halt_modem;
180 u32 halt_nc;
181 u32 halt_vq6;
182 u32 conn_box;
183
184 u32 qaccept_mdm;
185 u32 qaccept_cx;
186 u32 qaccept_axi;
187
188 u32 axim1_clk_off;
189 u32 crypto_clk_off;
190 u32 force_clk_on;
191 u32 rscc_disable;
192
193 struct reset_control *mss_restart;
194 struct reset_control *pdc_reset;
195
196 struct qcom_q6v5 q6v5;
197
198 struct clk *active_clks[8];
199 struct clk *reset_clks[4];
200 struct clk *proxy_clks[4];
201 struct device *proxy_pds[3];
202 int active_clk_count;
203 int reset_clk_count;
204 int proxy_clk_count;
205 int proxy_pd_count;
206
207 struct reg_info active_regs[1];
208 struct reg_info proxy_regs[1];
209 struct reg_info fallback_proxy_regs[2];
210 int active_reg_count;
211 int proxy_reg_count;
212 int fallback_proxy_reg_count;
213
214 bool dump_mba_loaded;
215 size_t current_dump_size;
216 size_t total_dump_size;
217
218 phys_addr_t mba_phys;
219 size_t mba_size;
220 size_t dp_size;
221
222 phys_addr_t mdata_phys;
223 size_t mdata_size;
224
225 phys_addr_t mpss_phys;
226 phys_addr_t mpss_reloc;
227 size_t mpss_size;
228
229 struct qcom_rproc_glink glink_subdev;
230 struct qcom_rproc_subdev smd_subdev;
231 struct qcom_rproc_ssr ssr_subdev;
232 struct qcom_sysmon *sysmon;
233 struct platform_device *bam_dmux;
234 bool need_mem_protection;
235 bool has_alt_reset;
236 bool has_mba_logs;
237 bool has_spare_reg;
238 bool has_qaccept_regs;
239 bool has_ext_cntl_regs;
240 bool has_vq6;
241 u64 mpss_perm;
242 u64 mba_perm;
243 const char *hexagon_mdt_image;
244 int version;
245};
246
247enum {
248 MSS_MSM8909,
249 MSS_MSM8916,
250 MSS_MSM8953,
251 MSS_MSM8974,
252 MSS_MSM8996,
253 MSS_MSM8998,
254 MSS_SC7180,
255 MSS_SC7280,
256 MSS_SDM660,
257 MSS_SDM845,
258};
259
260static int q6v5_regulator_init(struct device *dev, struct reg_info *regs,
261 const struct qcom_mss_reg_res *reg_res)
262{
263 int rc;
264 int i;
265
266 if (!reg_res)
267 return 0;
268
269 for (i = 0; reg_res[i].supply; i++) {
270 regs[i].reg = devm_regulator_get(dev, reg_res[i].supply);
271 if (IS_ERR(regs[i].reg)) {
272 rc = PTR_ERR(regs[i].reg);
273 if (rc != -EPROBE_DEFER)
274 dev_err(dev, "Failed to get %s\n regulator",
275 reg_res[i].supply);
276 return rc;
277 }
278
279 regs[i].uV = reg_res[i].uV;
280 regs[i].uA = reg_res[i].uA;
281 }
282
283 return i;
284}
285
286static int q6v5_regulator_enable(struct q6v5 *qproc,
287 struct reg_info *regs, int count)
288{
289 int ret;
290 int i;
291
292 for (i = 0; i < count; i++) {
293 if (regs[i].uV > 0) {
294 ret = regulator_set_voltage(regs[i].reg,
295 regs[i].uV, INT_MAX);
296 if (ret) {
297 dev_err(qproc->dev,
298 "Failed to request voltage for %d.\n",
299 i);
300 goto err;
301 }
302 }
303
304 if (regs[i].uA > 0) {
305 ret = regulator_set_load(regs[i].reg,
306 regs[i].uA);
307 if (ret < 0) {
308 dev_err(qproc->dev,
309 "Failed to set regulator mode\n");
310 goto err;
311 }
312 }
313
314 ret = regulator_enable(regs[i].reg);
315 if (ret) {
316 dev_err(qproc->dev, "Regulator enable failed\n");
317 goto err;
318 }
319 }
320
321 return 0;
322err:
323 for (; i >= 0; i--) {
324 if (regs[i].uV > 0)
325 regulator_set_voltage(regs[i].reg, 0, INT_MAX);
326
327 if (regs[i].uA > 0)
328 regulator_set_load(regs[i].reg, 0);
329
330 regulator_disable(regs[i].reg);
331 }
332
333 return ret;
334}
335
336static void q6v5_regulator_disable(struct q6v5 *qproc,
337 struct reg_info *regs, int count)
338{
339 int i;
340
341 for (i = 0; i < count; i++) {
342 if (regs[i].uV > 0)
343 regulator_set_voltage(regs[i].reg, 0, INT_MAX);
344
345 if (regs[i].uA > 0)
346 regulator_set_load(regs[i].reg, 0);
347
348 regulator_disable(regs[i].reg);
349 }
350}
351
352static int q6v5_clk_enable(struct device *dev,
353 struct clk **clks, int count)
354{
355 int rc;
356 int i;
357
358 for (i = 0; i < count; i++) {
359 rc = clk_prepare_enable(clks[i]);
360 if (rc) {
361 dev_err(dev, "Clock enable failed\n");
362 goto err;
363 }
364 }
365
366 return 0;
367err:
368 for (i--; i >= 0; i--)
369 clk_disable_unprepare(clks[i]);
370
371 return rc;
372}
373
374static void q6v5_clk_disable(struct device *dev,
375 struct clk **clks, int count)
376{
377 int i;
378
379 for (i = 0; i < count; i++)
380 clk_disable_unprepare(clks[i]);
381}
382
383static int q6v5_pds_enable(struct q6v5 *qproc, struct device **pds,
384 size_t pd_count)
385{
386 int ret;
387 int i;
388
389 for (i = 0; i < pd_count; i++) {
390 dev_pm_genpd_set_performance_state(pds[i], INT_MAX);
391 ret = pm_runtime_get_sync(pds[i]);
392 if (ret < 0) {
393 pm_runtime_put_noidle(pds[i]);
394 dev_pm_genpd_set_performance_state(pds[i], 0);
395 goto unroll_pd_votes;
396 }
397 }
398
399 return 0;
400
401unroll_pd_votes:
402 for (i--; i >= 0; i--) {
403 dev_pm_genpd_set_performance_state(pds[i], 0);
404 pm_runtime_put(pds[i]);
405 }
406
407 return ret;
408}
409
410static void q6v5_pds_disable(struct q6v5 *qproc, struct device **pds,
411 size_t pd_count)
412{
413 int i;
414
415 for (i = 0; i < pd_count; i++) {
416 dev_pm_genpd_set_performance_state(pds[i], 0);
417 pm_runtime_put(pds[i]);
418 }
419}
420
421static int q6v5_xfer_mem_ownership(struct q6v5 *qproc, u64 *current_perm,
422 bool local, bool remote, phys_addr_t addr,
423 size_t size)
424{
425 struct qcom_scm_vmperm next[2];
426 int perms = 0;
427
428 if (!qproc->need_mem_protection)
429 return 0;
430
431 if (local == !!(*current_perm & BIT(QCOM_SCM_VMID_HLOS)) &&
432 remote == !!(*current_perm & BIT(QCOM_SCM_VMID_MSS_MSA)))
433 return 0;
434
435 if (local) {
436 next[perms].vmid = QCOM_SCM_VMID_HLOS;
437 next[perms].perm = QCOM_SCM_PERM_RWX;
438 perms++;
439 }
440
441 if (remote) {
442 next[perms].vmid = QCOM_SCM_VMID_MSS_MSA;
443 next[perms].perm = QCOM_SCM_PERM_RW;
444 perms++;
445 }
446
447 return qcom_scm_assign_mem(addr, ALIGN(size, SZ_4K),
448 current_perm, next, perms);
449}
450
451static void q6v5_debug_policy_load(struct q6v5 *qproc, void *mba_region)
452{
453 const struct firmware *dp_fw;
454
455 if (request_firmware_direct(&dp_fw, "msadp", qproc->dev))
456 return;
457
458 if (SZ_1M + dp_fw->size <= qproc->mba_size) {
459 memcpy(mba_region + SZ_1M, dp_fw->data, dp_fw->size);
460 qproc->dp_size = dp_fw->size;
461 }
462
463 release_firmware(dp_fw);
464}
465
466static int q6v5_load(struct rproc *rproc, const struct firmware *fw)
467{
468 struct q6v5 *qproc = rproc->priv;
469 void *mba_region;
470
471 /* MBA is restricted to a maximum size of 1M */
472 if (fw->size > qproc->mba_size || fw->size > SZ_1M) {
473 dev_err(qproc->dev, "MBA firmware load failed\n");
474 return -EINVAL;
475 }
476
477 mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
478 if (!mba_region) {
479 dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
480 &qproc->mba_phys, qproc->mba_size);
481 return -EBUSY;
482 }
483
484 memcpy(mba_region, fw->data, fw->size);
485 q6v5_debug_policy_load(qproc, mba_region);
486 memunmap(mba_region);
487
488 return 0;
489}
490
491static int q6v5_reset_assert(struct q6v5 *qproc)
492{
493 int ret;
494
495 if (qproc->has_alt_reset) {
496 reset_control_assert(qproc->pdc_reset);
497 ret = reset_control_reset(qproc->mss_restart);
498 reset_control_deassert(qproc->pdc_reset);
499 } else if (qproc->has_spare_reg) {
500 /*
501 * When the AXI pipeline is being reset with the Q6 modem partly
502 * operational there is possibility of AXI valid signal to
503 * glitch, leading to spurious transactions and Q6 hangs. A work
504 * around is employed by asserting the AXI_GATING_VALID_OVERRIDE
505 * BIT before triggering Q6 MSS reset. AXI_GATING_VALID_OVERRIDE
506 * is withdrawn post MSS assert followed by a MSS deassert,
507 * while holding the PDC reset.
508 */
509 reset_control_assert(qproc->pdc_reset);
510 regmap_update_bits(qproc->conn_map, qproc->conn_box,
511 AXI_GATING_VALID_OVERRIDE, 1);
512 reset_control_assert(qproc->mss_restart);
513 reset_control_deassert(qproc->pdc_reset);
514 regmap_update_bits(qproc->conn_map, qproc->conn_box,
515 AXI_GATING_VALID_OVERRIDE, 0);
516 ret = reset_control_deassert(qproc->mss_restart);
517 } else if (qproc->has_ext_cntl_regs) {
518 regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
519 reset_control_assert(qproc->pdc_reset);
520 reset_control_assert(qproc->mss_restart);
521 reset_control_deassert(qproc->pdc_reset);
522 ret = reset_control_deassert(qproc->mss_restart);
523 } else {
524 ret = reset_control_assert(qproc->mss_restart);
525 }
526
527 return ret;
528}
529
530static int q6v5_reset_deassert(struct q6v5 *qproc)
531{
532 int ret;
533
534 if (qproc->has_alt_reset) {
535 reset_control_assert(qproc->pdc_reset);
536 writel(1, qproc->rmb_base + RMB_MBA_ALT_RESET);
537 ret = reset_control_reset(qproc->mss_restart);
538 writel(0, qproc->rmb_base + RMB_MBA_ALT_RESET);
539 reset_control_deassert(qproc->pdc_reset);
540 } else if (qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
541 ret = reset_control_reset(qproc->mss_restart);
542 } else {
543 ret = reset_control_deassert(qproc->mss_restart);
544 }
545
546 return ret;
547}
548
549static int q6v5_rmb_pbl_wait(struct q6v5 *qproc, int ms)
550{
551 unsigned long timeout;
552 s32 val;
553
554 timeout = jiffies + msecs_to_jiffies(ms);
555 for (;;) {
556 val = readl(qproc->rmb_base + RMB_PBL_STATUS_REG);
557 if (val)
558 break;
559
560 if (time_after(jiffies, timeout))
561 return -ETIMEDOUT;
562
563 msleep(1);
564 }
565
566 return val;
567}
568
569static int q6v5_rmb_mba_wait(struct q6v5 *qproc, u32 status, int ms)
570{
571
572 unsigned long timeout;
573 s32 val;
574
575 timeout = jiffies + msecs_to_jiffies(ms);
576 for (;;) {
577 val = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
578 if (val < 0)
579 break;
580
581 if (!status && val)
582 break;
583 else if (status && val == status)
584 break;
585
586 if (time_after(jiffies, timeout))
587 return -ETIMEDOUT;
588
589 msleep(1);
590 }
591
592 return val;
593}
594
595static void q6v5_dump_mba_logs(struct q6v5 *qproc)
596{
597 struct rproc *rproc = qproc->rproc;
598 void *data;
599 void *mba_region;
600
601 if (!qproc->has_mba_logs)
602 return;
603
604 if (q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false, qproc->mba_phys,
605 qproc->mba_size))
606 return;
607
608 mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
609 if (!mba_region)
610 return;
611
612 data = vmalloc(MBA_LOG_SIZE);
613 if (data) {
614 memcpy(data, mba_region, MBA_LOG_SIZE);
615 dev_coredumpv(&rproc->dev, data, MBA_LOG_SIZE, GFP_KERNEL);
616 }
617 memunmap(mba_region);
618}
619
620static int q6v5proc_reset(struct q6v5 *qproc)
621{
622 u32 val;
623 int ret;
624 int i;
625
626 if (qproc->version == MSS_SDM845) {
627 val = readl(qproc->reg_base + QDSP6SS_SLEEP);
628 val |= Q6SS_CBCR_CLKEN;
629 writel(val, qproc->reg_base + QDSP6SS_SLEEP);
630
631 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
632 val, !(val & Q6SS_CBCR_CLKOFF), 1,
633 Q6SS_CBCR_TIMEOUT_US);
634 if (ret) {
635 dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
636 return -ETIMEDOUT;
637 }
638
639 /* De-assert QDSP6 stop core */
640 writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
641 /* Trigger boot FSM */
642 writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
643
644 ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
645 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
646 if (ret) {
647 dev_err(qproc->dev, "Boot FSM failed to complete.\n");
648 /* Reset the modem so that boot FSM is in reset state */
649 q6v5_reset_deassert(qproc);
650 return ret;
651 }
652
653 goto pbl_wait;
654 } else if (qproc->version == MSS_SC7180 || qproc->version == MSS_SC7280) {
655 val = readl(qproc->reg_base + QDSP6SS_SLEEP);
656 val |= Q6SS_CBCR_CLKEN;
657 writel(val, qproc->reg_base + QDSP6SS_SLEEP);
658
659 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
660 val, !(val & Q6SS_CBCR_CLKOFF), 1,
661 Q6SS_CBCR_TIMEOUT_US);
662 if (ret) {
663 dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
664 return -ETIMEDOUT;
665 }
666
667 /* Turn on the XO clock needed for PLL setup */
668 val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
669 val |= Q6SS_CBCR_CLKEN;
670 writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
671
672 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
673 val, !(val & Q6SS_CBCR_CLKOFF), 1,
674 Q6SS_CBCR_TIMEOUT_US);
675 if (ret) {
676 dev_err(qproc->dev, "QDSP6SS XO clock timed out\n");
677 return -ETIMEDOUT;
678 }
679
680 /* Configure Q6 core CBCR to auto-enable after reset sequence */
681 val = readl(qproc->reg_base + QDSP6SS_CORE_CBCR);
682 val |= Q6SS_CBCR_CLKEN;
683 writel(val, qproc->reg_base + QDSP6SS_CORE_CBCR);
684
685 /* De-assert the Q6 stop core signal */
686 writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
687
688 /* Wait for 10 us for any staggering logic to settle */
689 usleep_range(10, 20);
690
691 /* Trigger the boot FSM to start the Q6 out-of-reset sequence */
692 writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
693
694 /* Poll the MSS_STATUS for FSM completion */
695 ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
696 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
697 if (ret) {
698 dev_err(qproc->dev, "Boot FSM failed to complete.\n");
699 /* Reset the modem so that boot FSM is in reset state */
700 q6v5_reset_deassert(qproc);
701 return ret;
702 }
703 goto pbl_wait;
704 } else if (qproc->version == MSS_MSM8909 ||
705 qproc->version == MSS_MSM8953 ||
706 qproc->version == MSS_MSM8996 ||
707 qproc->version == MSS_MSM8998 ||
708 qproc->version == MSS_SDM660) {
709
710 if (qproc->version != MSS_MSM8909 &&
711 qproc->version != MSS_MSM8953)
712 /* Override the ACC value if required */
713 writel(QDSP6SS_ACC_OVERRIDE_VAL,
714 qproc->reg_base + QDSP6SS_STRAP_ACC);
715
716 /* Assert resets, stop core */
717 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
718 val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
719 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
720
721 /* BHS require xo cbcr to be enabled */
722 val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
723 val |= Q6SS_CBCR_CLKEN;
724 writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
725
726 /* Read CLKOFF bit to go low indicating CLK is enabled */
727 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
728 val, !(val & Q6SS_CBCR_CLKOFF), 1,
729 Q6SS_CBCR_TIMEOUT_US);
730 if (ret) {
731 dev_err(qproc->dev,
732 "xo cbcr enabling timed out (rc:%d)\n", ret);
733 return ret;
734 }
735 /* Enable power block headswitch and wait for it to stabilize */
736 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
737 val |= QDSP6v56_BHS_ON;
738 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
739 val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
740 udelay(1);
741
742 if (qproc->version == MSS_SDM660) {
743 ret = readl_relaxed_poll_timeout(qproc->reg_base + QDSP6V62SS_BHS_STATUS,
744 i, (i & QDSP6v55_BHS_EN_REST_ACK),
745 1, BHS_CHECK_MAX_LOOPS);
746 if (ret == -ETIMEDOUT) {
747 dev_err(qproc->dev, "BHS_EN_REST_ACK not set!\n");
748 return -ETIMEDOUT;
749 }
750 }
751
752 /* Put LDO in bypass mode */
753 val |= QDSP6v56_LDO_BYP;
754 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
755
756 if (qproc->version != MSS_MSM8909) {
757 int mem_pwr_ctl;
758
759 /* Deassert QDSP6 compiler memory clamp */
760 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
761 val &= ~QDSP6v56_CLAMP_QMC_MEM;
762 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
763
764 /* Deassert memory peripheral sleep and L2 memory standby */
765 val |= Q6SS_L2DATA_STBY_N | Q6SS_SLP_RET_N;
766 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
767
768 /* Turn on L1, L2, ETB and JU memories 1 at a time */
769 if (qproc->version == MSS_MSM8953 ||
770 qproc->version == MSS_MSM8996) {
771 mem_pwr_ctl = QDSP6SS_MEM_PWR_CTL;
772 i = 19;
773 } else {
774 /* MSS_MSM8998, MSS_SDM660 */
775 mem_pwr_ctl = QDSP6V6SS_MEM_PWR_CTL;
776 i = 28;
777 }
778 val = readl(qproc->reg_base + mem_pwr_ctl);
779 for (; i >= 0; i--) {
780 val |= BIT(i);
781 writel(val, qproc->reg_base + mem_pwr_ctl);
782 /*
783 * Read back value to ensure the write is done then
784 * wait for 1us for both memory peripheral and data
785 * array to turn on.
786 */
787 val |= readl(qproc->reg_base + mem_pwr_ctl);
788 udelay(1);
789 }
790 } else {
791 /* Turn on memories */
792 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
793 val |= Q6SS_SLP_RET_N | Q6SS_L2DATA_STBY_N |
794 Q6SS_ETB_SLP_NRET_N | QDSP6V55_MEM_BITS;
795 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
796
797 /* Turn on L2 banks 1 at a time */
798 for (i = 0; i <= 7; i++) {
799 val |= BIT(i);
800 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
801 }
802 }
803
804 /* Remove word line clamp */
805 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
806 val &= ~QDSP6v56_CLAMP_WL;
807 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
808 } else {
809 /* Assert resets, stop core */
810 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
811 val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
812 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
813
814 /* Enable power block headswitch and wait for it to stabilize */
815 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
816 val |= QDSS_BHS_ON | QDSS_LDO_BYP;
817 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
818 val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
819 udelay(1);
820 /*
821 * Turn on memories. L2 banks should be done individually
822 * to minimize inrush current.
823 */
824 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
825 val |= Q6SS_SLP_RET_N | Q6SS_L2TAG_SLP_NRET_N |
826 Q6SS_ETB_SLP_NRET_N | Q6SS_L2DATA_STBY_N;
827 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
828 val |= Q6SS_L2DATA_SLP_NRET_N_2;
829 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
830 val |= Q6SS_L2DATA_SLP_NRET_N_1;
831 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
832 val |= Q6SS_L2DATA_SLP_NRET_N_0;
833 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
834 }
835 /* Remove IO clamp */
836 val &= ~Q6SS_CLAMP_IO;
837 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
838
839 /* Bring core out of reset */
840 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
841 val &= ~Q6SS_CORE_ARES;
842 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
843
844 /* Turn on core clock */
845 val = readl(qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
846 val |= Q6SS_CLK_ENABLE;
847 writel(val, qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
848
849 /* Start core execution */
850 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
851 val &= ~Q6SS_STOP_CORE;
852 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
853
854pbl_wait:
855 /* Wait for PBL status */
856 ret = q6v5_rmb_pbl_wait(qproc, 1000);
857 if (ret == -ETIMEDOUT) {
858 dev_err(qproc->dev, "PBL boot timed out\n");
859 } else if (ret != RMB_PBL_SUCCESS) {
860 dev_err(qproc->dev, "PBL returned unexpected status %d\n", ret);
861 ret = -EINVAL;
862 } else {
863 ret = 0;
864 }
865
866 return ret;
867}
868
869static int q6v5proc_enable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
870{
871 unsigned int val;
872 int ret;
873
874 if (!qproc->has_qaccept_regs)
875 return 0;
876
877 if (qproc->has_ext_cntl_regs) {
878 regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
879 regmap_write(qproc->conn_map, qproc->force_clk_on, 1);
880
881 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
882 !val, 1, Q6SS_CBCR_TIMEOUT_US);
883 if (ret) {
884 dev_err(qproc->dev, "failed to enable axim1 clock\n");
885 return -ETIMEDOUT;
886 }
887 }
888
889 regmap_write(map, offset + QACCEPT_REQ_REG, 1);
890
891 /* Wait for accept */
892 ret = regmap_read_poll_timeout(map, offset + QACCEPT_ACCEPT_REG, val, val, 5,
893 QACCEPT_TIMEOUT_US);
894 if (ret) {
895 dev_err(qproc->dev, "qchannel enable failed\n");
896 return -ETIMEDOUT;
897 }
898
899 return 0;
900}
901
902static void q6v5proc_disable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
903{
904 int ret;
905 unsigned int val, retry;
906 unsigned int nretry = 10;
907 bool takedown_complete = false;
908
909 if (!qproc->has_qaccept_regs)
910 return;
911
912 while (!takedown_complete && nretry) {
913 nretry--;
914
915 /* Wait for active transactions to complete */
916 regmap_read_poll_timeout(map, offset + QACCEPT_ACTIVE_REG, val, !val, 5,
917 QACCEPT_TIMEOUT_US);
918
919 /* Request Q-channel transaction takedown */
920 regmap_write(map, offset + QACCEPT_REQ_REG, 0);
921
922 /*
923 * If the request is denied, reset the Q-channel takedown request,
924 * wait for active transactions to complete and retry takedown.
925 */
926 retry = 10;
927 while (retry) {
928 usleep_range(5, 10);
929 retry--;
930 ret = regmap_read(map, offset + QACCEPT_DENY_REG, &val);
931 if (!ret && val) {
932 regmap_write(map, offset + QACCEPT_REQ_REG, 1);
933 break;
934 }
935
936 ret = regmap_read(map, offset + QACCEPT_ACCEPT_REG, &val);
937 if (!ret && !val) {
938 takedown_complete = true;
939 break;
940 }
941 }
942
943 if (!retry)
944 break;
945 }
946
947 /* Rely on mss_restart to clear out pending transactions on takedown failure */
948 if (!takedown_complete)
949 dev_err(qproc->dev, "qchannel takedown failed\n");
950}
951
952static void q6v5proc_halt_axi_port(struct q6v5 *qproc,
953 struct regmap *halt_map,
954 u32 offset)
955{
956 unsigned int val;
957 int ret;
958
959 /* Check if we're already idle */
960 ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
961 if (!ret && val)
962 return;
963
964 /* Assert halt request */
965 regmap_write(halt_map, offset + AXI_HALTREQ_REG, 1);
966
967 /* Wait for halt */
968 regmap_read_poll_timeout(halt_map, offset + AXI_HALTACK_REG, val,
969 val, 1000, HALT_ACK_TIMEOUT_US);
970
971 ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
972 if (ret || !val)
973 dev_err(qproc->dev, "port failed halt\n");
974
975 /* Clear halt request (port will remain halted until reset) */
976 regmap_write(halt_map, offset + AXI_HALTREQ_REG, 0);
977}
978
979static int q6v5_mpss_init_image(struct q6v5 *qproc, const struct firmware *fw,
980 const char *fw_name)
981{
982 unsigned long dma_attrs = DMA_ATTR_FORCE_CONTIGUOUS;
983 dma_addr_t phys;
984 void *metadata;
985 u64 mdata_perm;
986 int xferop_ret;
987 size_t size;
988 void *ptr;
989 int ret;
990
991 metadata = qcom_mdt_read_metadata(fw, &size, fw_name, qproc->dev);
992 if (IS_ERR(metadata))
993 return PTR_ERR(metadata);
994
995 if (qproc->mdata_phys) {
996 if (size > qproc->mdata_size) {
997 ret = -EINVAL;
998 dev_err(qproc->dev, "metadata size outside memory range\n");
999 goto free_metadata;
1000 }
1001
1002 phys = qproc->mdata_phys;
1003 ptr = memremap(qproc->mdata_phys, size, MEMREMAP_WC);
1004 if (!ptr) {
1005 ret = -EBUSY;
1006 dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
1007 &qproc->mdata_phys, size);
1008 goto free_metadata;
1009 }
1010 } else {
1011 ptr = dma_alloc_attrs(qproc->dev, size, &phys, GFP_KERNEL, dma_attrs);
1012 if (!ptr) {
1013 ret = -ENOMEM;
1014 dev_err(qproc->dev, "failed to allocate mdt buffer\n");
1015 goto free_metadata;
1016 }
1017 }
1018
1019 memcpy(ptr, metadata, size);
1020
1021 if (qproc->mdata_phys)
1022 memunmap(ptr);
1023
1024 /* Hypervisor mapping to access metadata by modem */
1025 mdata_perm = BIT(QCOM_SCM_VMID_HLOS);
1026 ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, false, true,
1027 phys, size);
1028 if (ret) {
1029 dev_err(qproc->dev,
1030 "assigning Q6 access to metadata failed: %d\n", ret);
1031 ret = -EAGAIN;
1032 goto free_dma_attrs;
1033 }
1034
1035 writel(phys, qproc->rmb_base + RMB_PMI_META_DATA_REG);
1036 writel(RMB_CMD_META_DATA_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1037
1038 ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_META_DATA_AUTH_SUCCESS, 1000);
1039 if (ret == -ETIMEDOUT)
1040 dev_err(qproc->dev, "MPSS header authentication timed out\n");
1041 else if (ret < 0)
1042 dev_err(qproc->dev, "MPSS header authentication failed: %d\n", ret);
1043
1044 /* Metadata authentication done, remove modem access */
1045 xferop_ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, true, false,
1046 phys, size);
1047 if (xferop_ret)
1048 dev_warn(qproc->dev,
1049 "mdt buffer not reclaimed system may become unstable\n");
1050
1051free_dma_attrs:
1052 if (!qproc->mdata_phys)
1053 dma_free_attrs(qproc->dev, size, ptr, phys, dma_attrs);
1054free_metadata:
1055 kfree(metadata);
1056
1057 return ret < 0 ? ret : 0;
1058}
1059
1060static bool q6v5_phdr_valid(const struct elf32_phdr *phdr)
1061{
1062 if (phdr->p_type != PT_LOAD)
1063 return false;
1064
1065 if ((phdr->p_flags & QCOM_MDT_TYPE_MASK) == QCOM_MDT_TYPE_HASH)
1066 return false;
1067
1068 if (!phdr->p_memsz)
1069 return false;
1070
1071 return true;
1072}
1073
1074static int q6v5_mba_load(struct q6v5 *qproc)
1075{
1076 int ret;
1077 int xfermemop_ret;
1078 bool mba_load_err = false;
1079
1080 ret = qcom_q6v5_prepare(&qproc->q6v5);
1081 if (ret)
1082 return ret;
1083
1084 ret = q6v5_pds_enable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1085 if (ret < 0) {
1086 dev_err(qproc->dev, "failed to enable proxy power domains\n");
1087 goto disable_irqs;
1088 }
1089
1090 ret = q6v5_regulator_enable(qproc, qproc->fallback_proxy_regs,
1091 qproc->fallback_proxy_reg_count);
1092 if (ret) {
1093 dev_err(qproc->dev, "failed to enable fallback proxy supplies\n");
1094 goto disable_proxy_pds;
1095 }
1096
1097 ret = q6v5_regulator_enable(qproc, qproc->proxy_regs,
1098 qproc->proxy_reg_count);
1099 if (ret) {
1100 dev_err(qproc->dev, "failed to enable proxy supplies\n");
1101 goto disable_fallback_proxy_reg;
1102 }
1103
1104 ret = q6v5_clk_enable(qproc->dev, qproc->proxy_clks,
1105 qproc->proxy_clk_count);
1106 if (ret) {
1107 dev_err(qproc->dev, "failed to enable proxy clocks\n");
1108 goto disable_proxy_reg;
1109 }
1110
1111 ret = q6v5_regulator_enable(qproc, qproc->active_regs,
1112 qproc->active_reg_count);
1113 if (ret) {
1114 dev_err(qproc->dev, "failed to enable supplies\n");
1115 goto disable_proxy_clk;
1116 }
1117
1118 ret = q6v5_clk_enable(qproc->dev, qproc->reset_clks,
1119 qproc->reset_clk_count);
1120 if (ret) {
1121 dev_err(qproc->dev, "failed to enable reset clocks\n");
1122 goto disable_vdd;
1123 }
1124
1125 ret = q6v5_reset_deassert(qproc);
1126 if (ret) {
1127 dev_err(qproc->dev, "failed to deassert mss restart\n");
1128 goto disable_reset_clks;
1129 }
1130
1131 ret = q6v5_clk_enable(qproc->dev, qproc->active_clks,
1132 qproc->active_clk_count);
1133 if (ret) {
1134 dev_err(qproc->dev, "failed to enable clocks\n");
1135 goto assert_reset;
1136 }
1137
1138 ret = q6v5proc_enable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1139 if (ret) {
1140 dev_err(qproc->dev, "failed to enable axi bridge\n");
1141 goto disable_active_clks;
1142 }
1143
1144 /*
1145 * Some versions of the MBA firmware will upon boot wipe the MPSS region as well, so provide
1146 * the Q6 access to this region.
1147 */
1148 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1149 qproc->mpss_phys, qproc->mpss_size);
1150 if (ret) {
1151 dev_err(qproc->dev, "assigning Q6 access to mpss memory failed: %d\n", ret);
1152 goto disable_active_clks;
1153 }
1154
1155 /* Assign MBA image access in DDR to q6 */
1156 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, false, true,
1157 qproc->mba_phys, qproc->mba_size);
1158 if (ret) {
1159 dev_err(qproc->dev,
1160 "assigning Q6 access to mba memory failed: %d\n", ret);
1161 goto disable_active_clks;
1162 }
1163
1164 writel(qproc->mba_phys, qproc->rmb_base + RMB_MBA_IMAGE_REG);
1165 if (qproc->dp_size) {
1166 writel(qproc->mba_phys + SZ_1M, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1167 writel(qproc->dp_size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1168 }
1169
1170 ret = q6v5proc_reset(qproc);
1171 if (ret)
1172 goto reclaim_mba;
1173
1174 if (qproc->has_mba_logs)
1175 qcom_pil_info_store("mba", qproc->mba_phys, MBA_LOG_SIZE);
1176
1177 ret = q6v5_rmb_mba_wait(qproc, 0, 5000);
1178 if (ret == -ETIMEDOUT) {
1179 dev_err(qproc->dev, "MBA boot timed out\n");
1180 goto halt_axi_ports;
1181 } else if (ret != RMB_MBA_XPU_UNLOCKED &&
1182 ret != RMB_MBA_XPU_UNLOCKED_SCRIBBLED) {
1183 dev_err(qproc->dev, "MBA returned unexpected status %d\n", ret);
1184 ret = -EINVAL;
1185 goto halt_axi_ports;
1186 }
1187
1188 qproc->dump_mba_loaded = true;
1189 return 0;
1190
1191halt_axi_ports:
1192 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1193 if (qproc->has_vq6)
1194 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1195 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1196 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1197 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1198 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1199 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1200 mba_load_err = true;
1201reclaim_mba:
1202 xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1203 false, qproc->mba_phys,
1204 qproc->mba_size);
1205 if (xfermemop_ret) {
1206 dev_err(qproc->dev,
1207 "Failed to reclaim mba buffer, system may become unstable\n");
1208 } else if (mba_load_err) {
1209 q6v5_dump_mba_logs(qproc);
1210 }
1211
1212disable_active_clks:
1213 q6v5_clk_disable(qproc->dev, qproc->active_clks,
1214 qproc->active_clk_count);
1215assert_reset:
1216 q6v5_reset_assert(qproc);
1217disable_reset_clks:
1218 q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1219 qproc->reset_clk_count);
1220disable_vdd:
1221 q6v5_regulator_disable(qproc, qproc->active_regs,
1222 qproc->active_reg_count);
1223disable_proxy_clk:
1224 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1225 qproc->proxy_clk_count);
1226disable_proxy_reg:
1227 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1228 qproc->proxy_reg_count);
1229disable_fallback_proxy_reg:
1230 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1231 qproc->fallback_proxy_reg_count);
1232disable_proxy_pds:
1233 q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1234disable_irqs:
1235 qcom_q6v5_unprepare(&qproc->q6v5);
1236
1237 return ret;
1238}
1239
1240static void q6v5_mba_reclaim(struct q6v5 *qproc)
1241{
1242 int ret;
1243 u32 val;
1244
1245 qproc->dump_mba_loaded = false;
1246 qproc->dp_size = 0;
1247
1248 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1249 if (qproc->has_vq6)
1250 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1251 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1252 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1253 if (qproc->version == MSS_MSM8996) {
1254 /*
1255 * To avoid high MX current during LPASS/MSS restart.
1256 */
1257 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1258 val |= Q6SS_CLAMP_IO | QDSP6v56_CLAMP_WL |
1259 QDSP6v56_CLAMP_QMC_MEM;
1260 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1261 }
1262
1263 if (qproc->has_ext_cntl_regs) {
1264 regmap_write(qproc->conn_map, qproc->rscc_disable, 1);
1265
1266 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
1267 !val, 1, Q6SS_CBCR_TIMEOUT_US);
1268 if (ret)
1269 dev_err(qproc->dev, "failed to enable axim1 clock\n");
1270
1271 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->crypto_clk_off, val,
1272 !val, 1, Q6SS_CBCR_TIMEOUT_US);
1273 if (ret)
1274 dev_err(qproc->dev, "failed to enable crypto clock\n");
1275 }
1276
1277 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1278 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1279 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1280
1281 q6v5_reset_assert(qproc);
1282
1283 q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1284 qproc->reset_clk_count);
1285 q6v5_clk_disable(qproc->dev, qproc->active_clks,
1286 qproc->active_clk_count);
1287 q6v5_regulator_disable(qproc, qproc->active_regs,
1288 qproc->active_reg_count);
1289
1290 /* In case of failure or coredump scenario where reclaiming MBA memory
1291 * could not happen reclaim it here.
1292 */
1293 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false,
1294 qproc->mba_phys,
1295 qproc->mba_size);
1296 WARN_ON(ret);
1297
1298 ret = qcom_q6v5_unprepare(&qproc->q6v5);
1299 if (ret) {
1300 q6v5_pds_disable(qproc, qproc->proxy_pds,
1301 qproc->proxy_pd_count);
1302 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1303 qproc->proxy_clk_count);
1304 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1305 qproc->fallback_proxy_reg_count);
1306 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1307 qproc->proxy_reg_count);
1308 }
1309}
1310
1311static int q6v5_reload_mba(struct rproc *rproc)
1312{
1313 struct q6v5 *qproc = rproc->priv;
1314 const struct firmware *fw;
1315 int ret;
1316
1317 ret = request_firmware(&fw, rproc->firmware, qproc->dev);
1318 if (ret < 0)
1319 return ret;
1320
1321 q6v5_load(rproc, fw);
1322 ret = q6v5_mba_load(qproc);
1323 release_firmware(fw);
1324
1325 return ret;
1326}
1327
1328static int q6v5_mpss_load(struct q6v5 *qproc)
1329{
1330 const struct elf32_phdr *phdrs;
1331 const struct elf32_phdr *phdr;
1332 const struct firmware *seg_fw;
1333 const struct firmware *fw;
1334 struct elf32_hdr *ehdr;
1335 phys_addr_t mpss_reloc;
1336 phys_addr_t boot_addr;
1337 phys_addr_t min_addr = PHYS_ADDR_MAX;
1338 phys_addr_t max_addr = 0;
1339 u32 code_length;
1340 bool relocate = false;
1341 char *fw_name;
1342 size_t fw_name_len;
1343 ssize_t offset;
1344 size_t size = 0;
1345 void *ptr;
1346 int ret;
1347 int i;
1348
1349 fw_name_len = strlen(qproc->hexagon_mdt_image);
1350 if (fw_name_len <= 4)
1351 return -EINVAL;
1352
1353 fw_name = kstrdup(qproc->hexagon_mdt_image, GFP_KERNEL);
1354 if (!fw_name)
1355 return -ENOMEM;
1356
1357 ret = request_firmware(&fw, fw_name, qproc->dev);
1358 if (ret < 0) {
1359 dev_err(qproc->dev, "unable to load %s\n", fw_name);
1360 goto out;
1361 }
1362
1363 /* Initialize the RMB validator */
1364 writel(0, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1365
1366 ret = q6v5_mpss_init_image(qproc, fw, qproc->hexagon_mdt_image);
1367 if (ret)
1368 goto release_firmware;
1369
1370 ehdr = (struct elf32_hdr *)fw->data;
1371 phdrs = (struct elf32_phdr *)(ehdr + 1);
1372
1373 for (i = 0; i < ehdr->e_phnum; i++) {
1374 phdr = &phdrs[i];
1375
1376 if (!q6v5_phdr_valid(phdr))
1377 continue;
1378
1379 if (phdr->p_flags & QCOM_MDT_RELOCATABLE)
1380 relocate = true;
1381
1382 if (phdr->p_paddr < min_addr)
1383 min_addr = phdr->p_paddr;
1384
1385 if (phdr->p_paddr + phdr->p_memsz > max_addr)
1386 max_addr = ALIGN(phdr->p_paddr + phdr->p_memsz, SZ_4K);
1387 }
1388
1389 if (qproc->version == MSS_MSM8953) {
1390 ret = qcom_scm_pas_mem_setup(MPSS_PAS_ID, qproc->mpss_phys, qproc->mpss_size);
1391 if (ret) {
1392 dev_err(qproc->dev,
1393 "setting up mpss memory failed: %d\n", ret);
1394 goto release_firmware;
1395 }
1396 }
1397
1398 /*
1399 * In case of a modem subsystem restart on secure devices, the modem
1400 * memory can be reclaimed only after MBA is loaded.
1401 */
1402 q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, false,
1403 qproc->mpss_phys, qproc->mpss_size);
1404
1405 /* Share ownership between Linux and MSS, during segment loading */
1406 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, true,
1407 qproc->mpss_phys, qproc->mpss_size);
1408 if (ret) {
1409 dev_err(qproc->dev,
1410 "assigning Q6 access to mpss memory failed: %d\n", ret);
1411 ret = -EAGAIN;
1412 goto release_firmware;
1413 }
1414
1415 mpss_reloc = relocate ? min_addr : qproc->mpss_phys;
1416 qproc->mpss_reloc = mpss_reloc;
1417 /* Load firmware segments */
1418 for (i = 0; i < ehdr->e_phnum; i++) {
1419 phdr = &phdrs[i];
1420
1421 if (!q6v5_phdr_valid(phdr))
1422 continue;
1423
1424 offset = phdr->p_paddr - mpss_reloc;
1425 if (offset < 0 || offset + phdr->p_memsz > qproc->mpss_size) {
1426 dev_err(qproc->dev, "segment outside memory range\n");
1427 ret = -EINVAL;
1428 goto release_firmware;
1429 }
1430
1431 if (phdr->p_filesz > phdr->p_memsz) {
1432 dev_err(qproc->dev,
1433 "refusing to load segment %d with p_filesz > p_memsz\n",
1434 i);
1435 ret = -EINVAL;
1436 goto release_firmware;
1437 }
1438
1439 ptr = memremap(qproc->mpss_phys + offset, phdr->p_memsz, MEMREMAP_WC);
1440 if (!ptr) {
1441 dev_err(qproc->dev,
1442 "unable to map memory region: %pa+%zx-%x\n",
1443 &qproc->mpss_phys, offset, phdr->p_memsz);
1444 goto release_firmware;
1445 }
1446
1447 if (phdr->p_filesz && phdr->p_offset < fw->size) {
1448 /* Firmware is large enough to be non-split */
1449 if (phdr->p_offset + phdr->p_filesz > fw->size) {
1450 dev_err(qproc->dev,
1451 "failed to load segment %d from truncated file %s\n",
1452 i, fw_name);
1453 ret = -EINVAL;
1454 memunmap(ptr);
1455 goto release_firmware;
1456 }
1457
1458 memcpy(ptr, fw->data + phdr->p_offset, phdr->p_filesz);
1459 } else if (phdr->p_filesz) {
1460 /* Replace "xxx.xxx" with "xxx.bxx" */
1461 sprintf(fw_name + fw_name_len - 3, "b%02d", i);
1462 ret = request_firmware_into_buf(&seg_fw, fw_name, qproc->dev,
1463 ptr, phdr->p_filesz);
1464 if (ret) {
1465 dev_err(qproc->dev, "failed to load %s\n", fw_name);
1466 memunmap(ptr);
1467 goto release_firmware;
1468 }
1469
1470 if (seg_fw->size != phdr->p_filesz) {
1471 dev_err(qproc->dev,
1472 "failed to load segment %d from truncated file %s\n",
1473 i, fw_name);
1474 ret = -EINVAL;
1475 release_firmware(seg_fw);
1476 memunmap(ptr);
1477 goto release_firmware;
1478 }
1479
1480 release_firmware(seg_fw);
1481 }
1482
1483 if (phdr->p_memsz > phdr->p_filesz) {
1484 memset(ptr + phdr->p_filesz, 0,
1485 phdr->p_memsz - phdr->p_filesz);
1486 }
1487 memunmap(ptr);
1488 size += phdr->p_memsz;
1489
1490 code_length = readl(qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1491 if (!code_length) {
1492 boot_addr = relocate ? qproc->mpss_phys : min_addr;
1493 writel(boot_addr, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1494 writel(RMB_CMD_LOAD_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1495 }
1496 writel(size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1497
1498 ret = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
1499 if (ret < 0) {
1500 dev_err(qproc->dev, "MPSS authentication failed: %d\n",
1501 ret);
1502 goto release_firmware;
1503 }
1504 }
1505
1506 /* Transfer ownership of modem ddr region to q6 */
1507 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1508 qproc->mpss_phys, qproc->mpss_size);
1509 if (ret) {
1510 dev_err(qproc->dev,
1511 "assigning Q6 access to mpss memory failed: %d\n", ret);
1512 ret = -EAGAIN;
1513 goto release_firmware;
1514 }
1515
1516 ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_AUTH_COMPLETE, 10000);
1517 if (ret == -ETIMEDOUT)
1518 dev_err(qproc->dev, "MPSS authentication timed out\n");
1519 else if (ret < 0)
1520 dev_err(qproc->dev, "MPSS authentication failed: %d\n", ret);
1521
1522 qcom_pil_info_store("modem", qproc->mpss_phys, qproc->mpss_size);
1523
1524release_firmware:
1525 release_firmware(fw);
1526out:
1527 kfree(fw_name);
1528
1529 return ret < 0 ? ret : 0;
1530}
1531
1532static void qcom_q6v5_dump_segment(struct rproc *rproc,
1533 struct rproc_dump_segment *segment,
1534 void *dest, size_t cp_offset, size_t size)
1535{
1536 int ret = 0;
1537 struct q6v5 *qproc = rproc->priv;
1538 int offset = segment->da - qproc->mpss_reloc;
1539 void *ptr = NULL;
1540
1541 /* Unlock mba before copying segments */
1542 if (!qproc->dump_mba_loaded) {
1543 ret = q6v5_reload_mba(rproc);
1544 if (!ret) {
1545 /* Reset ownership back to Linux to copy segments */
1546 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1547 true, false,
1548 qproc->mpss_phys,
1549 qproc->mpss_size);
1550 }
1551 }
1552
1553 if (!ret)
1554 ptr = memremap(qproc->mpss_phys + offset + cp_offset, size, MEMREMAP_WC);
1555
1556 if (ptr) {
1557 memcpy(dest, ptr, size);
1558 memunmap(ptr);
1559 } else {
1560 memset(dest, 0xff, size);
1561 }
1562
1563 qproc->current_dump_size += size;
1564
1565 /* Reclaim mba after copying segments */
1566 if (qproc->current_dump_size == qproc->total_dump_size) {
1567 if (qproc->dump_mba_loaded) {
1568 /* Try to reset ownership back to Q6 */
1569 q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1570 false, true,
1571 qproc->mpss_phys,
1572 qproc->mpss_size);
1573 q6v5_mba_reclaim(qproc);
1574 }
1575 }
1576}
1577
1578static int q6v5_start(struct rproc *rproc)
1579{
1580 struct q6v5 *qproc = rproc->priv;
1581 int xfermemop_ret;
1582 int ret;
1583
1584 ret = q6v5_mba_load(qproc);
1585 if (ret)
1586 return ret;
1587
1588 dev_info(qproc->dev, "MBA booted with%s debug policy, loading mpss\n",
1589 qproc->dp_size ? "" : "out");
1590
1591 ret = q6v5_mpss_load(qproc);
1592 if (ret)
1593 goto reclaim_mpss;
1594
1595 ret = qcom_q6v5_wait_for_start(&qproc->q6v5, msecs_to_jiffies(5000));
1596 if (ret == -ETIMEDOUT) {
1597 dev_err(qproc->dev, "start timed out\n");
1598 goto reclaim_mpss;
1599 }
1600
1601 xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1602 false, qproc->mba_phys,
1603 qproc->mba_size);
1604 if (xfermemop_ret)
1605 dev_err(qproc->dev,
1606 "Failed to reclaim mba buffer system may become unstable\n");
1607
1608 /* Reset Dump Segment Mask */
1609 qproc->current_dump_size = 0;
1610
1611 return 0;
1612
1613reclaim_mpss:
1614 q6v5_mba_reclaim(qproc);
1615 q6v5_dump_mba_logs(qproc);
1616
1617 return ret;
1618}
1619
1620static int q6v5_stop(struct rproc *rproc)
1621{
1622 struct q6v5 *qproc = rproc->priv;
1623 int ret;
1624
1625 ret = qcom_q6v5_request_stop(&qproc->q6v5, qproc->sysmon);
1626 if (ret == -ETIMEDOUT)
1627 dev_err(qproc->dev, "timed out on wait\n");
1628
1629 q6v5_mba_reclaim(qproc);
1630
1631 return 0;
1632}
1633
1634static int qcom_q6v5_register_dump_segments(struct rproc *rproc,
1635 const struct firmware *mba_fw)
1636{
1637 const struct firmware *fw;
1638 const struct elf32_phdr *phdrs;
1639 const struct elf32_phdr *phdr;
1640 const struct elf32_hdr *ehdr;
1641 struct q6v5 *qproc = rproc->priv;
1642 unsigned long i;
1643 int ret;
1644
1645 ret = request_firmware(&fw, qproc->hexagon_mdt_image, qproc->dev);
1646 if (ret < 0) {
1647 dev_err(qproc->dev, "unable to load %s\n",
1648 qproc->hexagon_mdt_image);
1649 return ret;
1650 }
1651
1652 rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
1653
1654 ehdr = (struct elf32_hdr *)fw->data;
1655 phdrs = (struct elf32_phdr *)(ehdr + 1);
1656 qproc->total_dump_size = 0;
1657
1658 for (i = 0; i < ehdr->e_phnum; i++) {
1659 phdr = &phdrs[i];
1660
1661 if (!q6v5_phdr_valid(phdr))
1662 continue;
1663
1664 ret = rproc_coredump_add_custom_segment(rproc, phdr->p_paddr,
1665 phdr->p_memsz,
1666 qcom_q6v5_dump_segment,
1667 NULL);
1668 if (ret)
1669 break;
1670
1671 qproc->total_dump_size += phdr->p_memsz;
1672 }
1673
1674 release_firmware(fw);
1675 return ret;
1676}
1677
1678static unsigned long q6v5_panic(struct rproc *rproc)
1679{
1680 struct q6v5 *qproc = rproc->priv;
1681
1682 return qcom_q6v5_panic(&qproc->q6v5);
1683}
1684
1685static const struct rproc_ops q6v5_ops = {
1686 .start = q6v5_start,
1687 .stop = q6v5_stop,
1688 .parse_fw = qcom_q6v5_register_dump_segments,
1689 .load = q6v5_load,
1690 .panic = q6v5_panic,
1691};
1692
1693static void qcom_msa_handover(struct qcom_q6v5 *q6v5)
1694{
1695 struct q6v5 *qproc = container_of(q6v5, struct q6v5, q6v5);
1696
1697 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1698 qproc->proxy_clk_count);
1699 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1700 qproc->proxy_reg_count);
1701 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1702 qproc->fallback_proxy_reg_count);
1703 q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1704}
1705
1706static int q6v5_init_mem(struct q6v5 *qproc, struct platform_device *pdev)
1707{
1708 struct of_phandle_args args;
1709 int halt_cell_cnt = 3;
1710 int ret;
1711
1712 qproc->reg_base = devm_platform_ioremap_resource_byname(pdev, "qdsp6");
1713 if (IS_ERR(qproc->reg_base))
1714 return PTR_ERR(qproc->reg_base);
1715
1716 qproc->rmb_base = devm_platform_ioremap_resource_byname(pdev, "rmb");
1717 if (IS_ERR(qproc->rmb_base))
1718 return PTR_ERR(qproc->rmb_base);
1719
1720 if (qproc->has_vq6)
1721 halt_cell_cnt++;
1722
1723 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1724 "qcom,halt-regs", halt_cell_cnt, 0, &args);
1725 if (ret < 0) {
1726 dev_err(&pdev->dev, "failed to parse qcom,halt-regs\n");
1727 return -EINVAL;
1728 }
1729
1730 qproc->halt_map = syscon_node_to_regmap(args.np);
1731 of_node_put(args.np);
1732 if (IS_ERR(qproc->halt_map))
1733 return PTR_ERR(qproc->halt_map);
1734
1735 qproc->halt_q6 = args.args[0];
1736 qproc->halt_modem = args.args[1];
1737 qproc->halt_nc = args.args[2];
1738
1739 if (qproc->has_vq6)
1740 qproc->halt_vq6 = args.args[3];
1741
1742 if (qproc->has_qaccept_regs) {
1743 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1744 "qcom,qaccept-regs",
1745 3, 0, &args);
1746 if (ret < 0) {
1747 dev_err(&pdev->dev, "failed to parse qaccept-regs\n");
1748 return -EINVAL;
1749 }
1750
1751 qproc->qaccept_mdm = args.args[0];
1752 qproc->qaccept_cx = args.args[1];
1753 qproc->qaccept_axi = args.args[2];
1754 }
1755
1756 if (qproc->has_ext_cntl_regs) {
1757 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1758 "qcom,ext-regs",
1759 2, 0, &args);
1760 if (ret < 0) {
1761 dev_err(&pdev->dev, "failed to parse ext-regs index 0\n");
1762 return -EINVAL;
1763 }
1764
1765 qproc->conn_map = syscon_node_to_regmap(args.np);
1766 of_node_put(args.np);
1767 if (IS_ERR(qproc->conn_map))
1768 return PTR_ERR(qproc->conn_map);
1769
1770 qproc->force_clk_on = args.args[0];
1771 qproc->rscc_disable = args.args[1];
1772
1773 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1774 "qcom,ext-regs",
1775 2, 1, &args);
1776 if (ret < 0) {
1777 dev_err(&pdev->dev, "failed to parse ext-regs index 1\n");
1778 return -EINVAL;
1779 }
1780
1781 qproc->axim1_clk_off = args.args[0];
1782 qproc->crypto_clk_off = args.args[1];
1783 }
1784
1785 if (qproc->has_spare_reg) {
1786 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1787 "qcom,spare-regs",
1788 1, 0, &args);
1789 if (ret < 0) {
1790 dev_err(&pdev->dev, "failed to parse spare-regs\n");
1791 return -EINVAL;
1792 }
1793
1794 qproc->conn_map = syscon_node_to_regmap(args.np);
1795 of_node_put(args.np);
1796 if (IS_ERR(qproc->conn_map))
1797 return PTR_ERR(qproc->conn_map);
1798
1799 qproc->conn_box = args.args[0];
1800 }
1801
1802 return 0;
1803}
1804
1805static int q6v5_init_clocks(struct device *dev, struct clk **clks,
1806 char **clk_names)
1807{
1808 int i;
1809
1810 if (!clk_names)
1811 return 0;
1812
1813 for (i = 0; clk_names[i]; i++) {
1814 clks[i] = devm_clk_get(dev, clk_names[i]);
1815 if (IS_ERR(clks[i])) {
1816 int rc = PTR_ERR(clks[i]);
1817
1818 if (rc != -EPROBE_DEFER)
1819 dev_err(dev, "Failed to get %s clock\n",
1820 clk_names[i]);
1821 return rc;
1822 }
1823 }
1824
1825 return i;
1826}
1827
1828static int q6v5_pds_attach(struct device *dev, struct device **devs,
1829 char **pd_names)
1830{
1831 size_t num_pds = 0;
1832 int ret;
1833 int i;
1834
1835 if (!pd_names)
1836 return 0;
1837
1838 while (pd_names[num_pds])
1839 num_pds++;
1840
1841 for (i = 0; i < num_pds; i++) {
1842 devs[i] = dev_pm_domain_attach_by_name(dev, pd_names[i]);
1843 if (IS_ERR_OR_NULL(devs[i])) {
1844 ret = PTR_ERR(devs[i]) ? : -ENODATA;
1845 goto unroll_attach;
1846 }
1847 }
1848
1849 return num_pds;
1850
1851unroll_attach:
1852 for (i--; i >= 0; i--)
1853 dev_pm_domain_detach(devs[i], false);
1854
1855 return ret;
1856}
1857
1858static void q6v5_pds_detach(struct q6v5 *qproc, struct device **pds,
1859 size_t pd_count)
1860{
1861 int i;
1862
1863 for (i = 0; i < pd_count; i++)
1864 dev_pm_domain_detach(pds[i], false);
1865}
1866
1867static int q6v5_init_reset(struct q6v5 *qproc)
1868{
1869 qproc->mss_restart = devm_reset_control_get_exclusive(qproc->dev,
1870 "mss_restart");
1871 if (IS_ERR(qproc->mss_restart)) {
1872 dev_err(qproc->dev, "failed to acquire mss restart\n");
1873 return PTR_ERR(qproc->mss_restart);
1874 }
1875
1876 if (qproc->has_alt_reset || qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
1877 qproc->pdc_reset = devm_reset_control_get_exclusive(qproc->dev,
1878 "pdc_reset");
1879 if (IS_ERR(qproc->pdc_reset)) {
1880 dev_err(qproc->dev, "failed to acquire pdc reset\n");
1881 return PTR_ERR(qproc->pdc_reset);
1882 }
1883 }
1884
1885 return 0;
1886}
1887
1888static int q6v5_alloc_memory_region(struct q6v5 *qproc)
1889{
1890 struct device_node *child;
1891 struct reserved_mem *rmem;
1892 struct device_node *node;
1893
1894 /*
1895 * In the absence of mba/mpss sub-child, extract the mba and mpss
1896 * reserved memory regions from device's memory-region property.
1897 */
1898 child = of_get_child_by_name(qproc->dev->of_node, "mba");
1899 if (!child) {
1900 node = of_parse_phandle(qproc->dev->of_node,
1901 "memory-region", 0);
1902 } else {
1903 node = of_parse_phandle(child, "memory-region", 0);
1904 of_node_put(child);
1905 }
1906
1907 if (!node) {
1908 dev_err(qproc->dev, "no mba memory-region specified\n");
1909 return -EINVAL;
1910 }
1911
1912 rmem = of_reserved_mem_lookup(node);
1913 of_node_put(node);
1914 if (!rmem) {
1915 dev_err(qproc->dev, "unable to resolve mba region\n");
1916 return -EINVAL;
1917 }
1918
1919 qproc->mba_phys = rmem->base;
1920 qproc->mba_size = rmem->size;
1921
1922 if (!child) {
1923 node = of_parse_phandle(qproc->dev->of_node,
1924 "memory-region", 1);
1925 } else {
1926 child = of_get_child_by_name(qproc->dev->of_node, "mpss");
1927 node = of_parse_phandle(child, "memory-region", 0);
1928 of_node_put(child);
1929 }
1930
1931 if (!node) {
1932 dev_err(qproc->dev, "no mpss memory-region specified\n");
1933 return -EINVAL;
1934 }
1935
1936 rmem = of_reserved_mem_lookup(node);
1937 of_node_put(node);
1938 if (!rmem) {
1939 dev_err(qproc->dev, "unable to resolve mpss region\n");
1940 return -EINVAL;
1941 }
1942
1943 qproc->mpss_phys = qproc->mpss_reloc = rmem->base;
1944 qproc->mpss_size = rmem->size;
1945
1946 if (!child) {
1947 node = of_parse_phandle(qproc->dev->of_node, "memory-region", 2);
1948 } else {
1949 child = of_get_child_by_name(qproc->dev->of_node, "metadata");
1950 node = of_parse_phandle(child, "memory-region", 0);
1951 of_node_put(child);
1952 }
1953
1954 if (!node)
1955 return 0;
1956
1957 rmem = of_reserved_mem_lookup(node);
1958 if (!rmem) {
1959 dev_err(qproc->dev, "unable to resolve metadata region\n");
1960 return -EINVAL;
1961 }
1962
1963 qproc->mdata_phys = rmem->base;
1964 qproc->mdata_size = rmem->size;
1965
1966 return 0;
1967}
1968
1969static int q6v5_probe(struct platform_device *pdev)
1970{
1971 const struct rproc_hexagon_res *desc;
1972 struct device_node *node;
1973 struct q6v5 *qproc;
1974 struct rproc *rproc;
1975 const char *mba_image;
1976 int ret;
1977
1978 desc = of_device_get_match_data(&pdev->dev);
1979 if (!desc)
1980 return -EINVAL;
1981
1982 if (desc->need_mem_protection && !qcom_scm_is_available())
1983 return -EPROBE_DEFER;
1984
1985 mba_image = desc->hexagon_mba_image;
1986 ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
1987 0, &mba_image);
1988 if (ret < 0 && ret != -EINVAL) {
1989 dev_err(&pdev->dev, "unable to read mba firmware-name\n");
1990 return ret;
1991 }
1992
1993 rproc = rproc_alloc(&pdev->dev, pdev->name, &q6v5_ops,
1994 mba_image, sizeof(*qproc));
1995 if (!rproc) {
1996 dev_err(&pdev->dev, "failed to allocate rproc\n");
1997 return -ENOMEM;
1998 }
1999
2000 rproc->auto_boot = false;
2001 rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
2002
2003 qproc = rproc->priv;
2004 qproc->dev = &pdev->dev;
2005 qproc->rproc = rproc;
2006 qproc->hexagon_mdt_image = "modem.mdt";
2007 ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
2008 1, &qproc->hexagon_mdt_image);
2009 if (ret < 0 && ret != -EINVAL) {
2010 dev_err(&pdev->dev, "unable to read mpss firmware-name\n");
2011 goto free_rproc;
2012 }
2013
2014 platform_set_drvdata(pdev, qproc);
2015
2016 qproc->has_qaccept_regs = desc->has_qaccept_regs;
2017 qproc->has_ext_cntl_regs = desc->has_ext_cntl_regs;
2018 qproc->has_vq6 = desc->has_vq6;
2019 qproc->has_spare_reg = desc->has_spare_reg;
2020 ret = q6v5_init_mem(qproc, pdev);
2021 if (ret)
2022 goto free_rproc;
2023
2024 ret = q6v5_alloc_memory_region(qproc);
2025 if (ret)
2026 goto free_rproc;
2027
2028 ret = q6v5_init_clocks(&pdev->dev, qproc->proxy_clks,
2029 desc->proxy_clk_names);
2030 if (ret < 0) {
2031 dev_err(&pdev->dev, "Failed to get proxy clocks.\n");
2032 goto free_rproc;
2033 }
2034 qproc->proxy_clk_count = ret;
2035
2036 ret = q6v5_init_clocks(&pdev->dev, qproc->reset_clks,
2037 desc->reset_clk_names);
2038 if (ret < 0) {
2039 dev_err(&pdev->dev, "Failed to get reset clocks.\n");
2040 goto free_rproc;
2041 }
2042 qproc->reset_clk_count = ret;
2043
2044 ret = q6v5_init_clocks(&pdev->dev, qproc->active_clks,
2045 desc->active_clk_names);
2046 if (ret < 0) {
2047 dev_err(&pdev->dev, "Failed to get active clocks.\n");
2048 goto free_rproc;
2049 }
2050 qproc->active_clk_count = ret;
2051
2052 ret = q6v5_regulator_init(&pdev->dev, qproc->proxy_regs,
2053 desc->proxy_supply);
2054 if (ret < 0) {
2055 dev_err(&pdev->dev, "Failed to get proxy regulators.\n");
2056 goto free_rproc;
2057 }
2058 qproc->proxy_reg_count = ret;
2059
2060 ret = q6v5_regulator_init(&pdev->dev, qproc->active_regs,
2061 desc->active_supply);
2062 if (ret < 0) {
2063 dev_err(&pdev->dev, "Failed to get active regulators.\n");
2064 goto free_rproc;
2065 }
2066 qproc->active_reg_count = ret;
2067
2068 ret = q6v5_pds_attach(&pdev->dev, qproc->proxy_pds,
2069 desc->proxy_pd_names);
2070 /* Fallback to regulators for old device trees */
2071 if (ret == -ENODATA && desc->fallback_proxy_supply) {
2072 ret = q6v5_regulator_init(&pdev->dev,
2073 qproc->fallback_proxy_regs,
2074 desc->fallback_proxy_supply);
2075 if (ret < 0) {
2076 dev_err(&pdev->dev, "Failed to get fallback proxy regulators.\n");
2077 goto free_rproc;
2078 }
2079 qproc->fallback_proxy_reg_count = ret;
2080 } else if (ret < 0) {
2081 dev_err(&pdev->dev, "Failed to init power domains\n");
2082 goto free_rproc;
2083 } else {
2084 qproc->proxy_pd_count = ret;
2085 }
2086
2087 qproc->has_alt_reset = desc->has_alt_reset;
2088 ret = q6v5_init_reset(qproc);
2089 if (ret)
2090 goto detach_proxy_pds;
2091
2092 qproc->version = desc->version;
2093 qproc->need_mem_protection = desc->need_mem_protection;
2094 qproc->has_mba_logs = desc->has_mba_logs;
2095
2096 ret = qcom_q6v5_init(&qproc->q6v5, pdev, rproc, MPSS_CRASH_REASON_SMEM, "modem",
2097 qcom_msa_handover);
2098 if (ret)
2099 goto detach_proxy_pds;
2100
2101 qproc->mpss_perm = BIT(QCOM_SCM_VMID_HLOS);
2102 qproc->mba_perm = BIT(QCOM_SCM_VMID_HLOS);
2103 qcom_add_glink_subdev(rproc, &qproc->glink_subdev, "mpss");
2104 qcom_add_smd_subdev(rproc, &qproc->smd_subdev);
2105 qcom_add_ssr_subdev(rproc, &qproc->ssr_subdev, "mpss");
2106 qproc->sysmon = qcom_add_sysmon_subdev(rproc, "modem", 0x12);
2107 if (IS_ERR(qproc->sysmon)) {
2108 ret = PTR_ERR(qproc->sysmon);
2109 goto remove_subdevs;
2110 }
2111
2112 ret = rproc_add(rproc);
2113 if (ret)
2114 goto remove_sysmon_subdev;
2115
2116 node = of_get_compatible_child(pdev->dev.of_node, "qcom,bam-dmux");
2117 qproc->bam_dmux = of_platform_device_create(node, NULL, &pdev->dev);
2118 of_node_put(node);
2119
2120 return 0;
2121
2122remove_sysmon_subdev:
2123 qcom_remove_sysmon_subdev(qproc->sysmon);
2124remove_subdevs:
2125 qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2126 qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2127 qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2128detach_proxy_pds:
2129 q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2130free_rproc:
2131 rproc_free(rproc);
2132
2133 return ret;
2134}
2135
2136static void q6v5_remove(struct platform_device *pdev)
2137{
2138 struct q6v5 *qproc = platform_get_drvdata(pdev);
2139 struct rproc *rproc = qproc->rproc;
2140
2141 if (qproc->bam_dmux)
2142 of_platform_device_destroy(&qproc->bam_dmux->dev, NULL);
2143 rproc_del(rproc);
2144
2145 qcom_q6v5_deinit(&qproc->q6v5);
2146 qcom_remove_sysmon_subdev(qproc->sysmon);
2147 qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2148 qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2149 qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2150
2151 q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2152
2153 rproc_free(rproc);
2154}
2155
2156static const struct rproc_hexagon_res sc7180_mss = {
2157 .hexagon_mba_image = "mba.mbn",
2158 .proxy_clk_names = (char*[]){
2159 "xo",
2160 NULL
2161 },
2162 .reset_clk_names = (char*[]){
2163 "iface",
2164 "bus",
2165 "snoc_axi",
2166 NULL
2167 },
2168 .active_clk_names = (char*[]){
2169 "mnoc_axi",
2170 "nav",
2171 NULL
2172 },
2173 .proxy_pd_names = (char*[]){
2174 "cx",
2175 "mx",
2176 "mss",
2177 NULL
2178 },
2179 .need_mem_protection = true,
2180 .has_alt_reset = false,
2181 .has_mba_logs = true,
2182 .has_spare_reg = true,
2183 .has_qaccept_regs = false,
2184 .has_ext_cntl_regs = false,
2185 .has_vq6 = false,
2186 .version = MSS_SC7180,
2187};
2188
2189static const struct rproc_hexagon_res sc7280_mss = {
2190 .hexagon_mba_image = "mba.mbn",
2191 .proxy_clk_names = (char*[]){
2192 "xo",
2193 "pka",
2194 NULL
2195 },
2196 .active_clk_names = (char*[]){
2197 "iface",
2198 "offline",
2199 "snoc_axi",
2200 NULL
2201 },
2202 .proxy_pd_names = (char*[]){
2203 "cx",
2204 "mss",
2205 NULL
2206 },
2207 .need_mem_protection = true,
2208 .has_alt_reset = false,
2209 .has_mba_logs = true,
2210 .has_spare_reg = false,
2211 .has_qaccept_regs = true,
2212 .has_ext_cntl_regs = true,
2213 .has_vq6 = true,
2214 .version = MSS_SC7280,
2215};
2216
2217static const struct rproc_hexagon_res sdm660_mss = {
2218 .hexagon_mba_image = "mba.mbn",
2219 .proxy_clk_names = (char*[]){
2220 "xo",
2221 "qdss",
2222 "mem",
2223 NULL
2224 },
2225 .active_clk_names = (char*[]){
2226 "iface",
2227 "bus",
2228 "gpll0_mss",
2229 "mnoc_axi",
2230 "snoc_axi",
2231 NULL
2232 },
2233 .proxy_pd_names = (char*[]){
2234 "cx",
2235 "mx",
2236 NULL
2237 },
2238 .need_mem_protection = true,
2239 .has_alt_reset = false,
2240 .has_mba_logs = false,
2241 .has_spare_reg = false,
2242 .has_qaccept_regs = false,
2243 .has_ext_cntl_regs = false,
2244 .has_vq6 = false,
2245 .version = MSS_SDM660,
2246};
2247
2248static const struct rproc_hexagon_res sdm845_mss = {
2249 .hexagon_mba_image = "mba.mbn",
2250 .proxy_clk_names = (char*[]){
2251 "xo",
2252 "prng",
2253 NULL
2254 },
2255 .reset_clk_names = (char*[]){
2256 "iface",
2257 "snoc_axi",
2258 NULL
2259 },
2260 .active_clk_names = (char*[]){
2261 "bus",
2262 "mem",
2263 "gpll0_mss",
2264 "mnoc_axi",
2265 NULL
2266 },
2267 .proxy_pd_names = (char*[]){
2268 "cx",
2269 "mx",
2270 "mss",
2271 NULL
2272 },
2273 .need_mem_protection = true,
2274 .has_alt_reset = true,
2275 .has_mba_logs = false,
2276 .has_spare_reg = false,
2277 .has_qaccept_regs = false,
2278 .has_ext_cntl_regs = false,
2279 .has_vq6 = false,
2280 .version = MSS_SDM845,
2281};
2282
2283static const struct rproc_hexagon_res msm8998_mss = {
2284 .hexagon_mba_image = "mba.mbn",
2285 .proxy_clk_names = (char*[]){
2286 "xo",
2287 "qdss",
2288 "mem",
2289 NULL
2290 },
2291 .active_clk_names = (char*[]){
2292 "iface",
2293 "bus",
2294 "gpll0_mss",
2295 "mnoc_axi",
2296 "snoc_axi",
2297 NULL
2298 },
2299 .proxy_pd_names = (char*[]){
2300 "cx",
2301 "mx",
2302 NULL
2303 },
2304 .need_mem_protection = true,
2305 .has_alt_reset = false,
2306 .has_mba_logs = false,
2307 .has_spare_reg = false,
2308 .has_qaccept_regs = false,
2309 .has_ext_cntl_regs = false,
2310 .has_vq6 = false,
2311 .version = MSS_MSM8998,
2312};
2313
2314static const struct rproc_hexagon_res msm8996_mss = {
2315 .hexagon_mba_image = "mba.mbn",
2316 .proxy_supply = (struct qcom_mss_reg_res[]) {
2317 {
2318 .supply = "pll",
2319 .uA = 100000,
2320 },
2321 {}
2322 },
2323 .proxy_clk_names = (char*[]){
2324 "xo",
2325 "qdss",
2326 NULL
2327 },
2328 .active_clk_names = (char*[]){
2329 "iface",
2330 "bus",
2331 "mem",
2332 "gpll0_mss",
2333 "snoc_axi",
2334 "mnoc_axi",
2335 NULL
2336 },
2337 .proxy_pd_names = (char*[]){
2338 "mx",
2339 "cx",
2340 NULL
2341 },
2342 .need_mem_protection = true,
2343 .has_alt_reset = false,
2344 .has_mba_logs = false,
2345 .has_spare_reg = false,
2346 .has_qaccept_regs = false,
2347 .has_ext_cntl_regs = false,
2348 .has_vq6 = false,
2349 .version = MSS_MSM8996,
2350};
2351
2352static const struct rproc_hexagon_res msm8909_mss = {
2353 .hexagon_mba_image = "mba.mbn",
2354 .proxy_supply = (struct qcom_mss_reg_res[]) {
2355 {
2356 .supply = "pll",
2357 .uA = 100000,
2358 },
2359 {}
2360 },
2361 .proxy_clk_names = (char*[]){
2362 "xo",
2363 NULL
2364 },
2365 .active_clk_names = (char*[]){
2366 "iface",
2367 "bus",
2368 "mem",
2369 NULL
2370 },
2371 .proxy_pd_names = (char*[]){
2372 "mx",
2373 "cx",
2374 NULL
2375 },
2376 .need_mem_protection = false,
2377 .has_alt_reset = false,
2378 .has_mba_logs = false,
2379 .has_spare_reg = false,
2380 .has_qaccept_regs = false,
2381 .has_ext_cntl_regs = false,
2382 .has_vq6 = false,
2383 .version = MSS_MSM8909,
2384};
2385
2386static const struct rproc_hexagon_res msm8916_mss = {
2387 .hexagon_mba_image = "mba.mbn",
2388 .proxy_supply = (struct qcom_mss_reg_res[]) {
2389 {
2390 .supply = "pll",
2391 .uA = 100000,
2392 },
2393 {}
2394 },
2395 .fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2396 {
2397 .supply = "mx",
2398 .uV = 1050000,
2399 },
2400 {
2401 .supply = "cx",
2402 .uA = 100000,
2403 },
2404 {}
2405 },
2406 .proxy_clk_names = (char*[]){
2407 "xo",
2408 NULL
2409 },
2410 .active_clk_names = (char*[]){
2411 "iface",
2412 "bus",
2413 "mem",
2414 NULL
2415 },
2416 .proxy_pd_names = (char*[]){
2417 "mx",
2418 "cx",
2419 NULL
2420 },
2421 .need_mem_protection = false,
2422 .has_alt_reset = false,
2423 .has_mba_logs = false,
2424 .has_spare_reg = false,
2425 .has_qaccept_regs = false,
2426 .has_ext_cntl_regs = false,
2427 .has_vq6 = false,
2428 .version = MSS_MSM8916,
2429};
2430
2431static const struct rproc_hexagon_res msm8953_mss = {
2432 .hexagon_mba_image = "mba.mbn",
2433 .proxy_supply = (struct qcom_mss_reg_res[]) {
2434 {
2435 .supply = "pll",
2436 .uA = 100000,
2437 },
2438 {}
2439 },
2440 .proxy_clk_names = (char*[]){
2441 "xo",
2442 NULL
2443 },
2444 .active_clk_names = (char*[]){
2445 "iface",
2446 "bus",
2447 "mem",
2448 NULL
2449 },
2450 .proxy_pd_names = (char*[]) {
2451 "cx",
2452 "mx",
2453 "mss",
2454 NULL
2455 },
2456 .need_mem_protection = false,
2457 .has_alt_reset = false,
2458 .has_mba_logs = false,
2459 .has_spare_reg = false,
2460 .has_qaccept_regs = false,
2461 .has_ext_cntl_regs = false,
2462 .has_vq6 = false,
2463 .version = MSS_MSM8953,
2464};
2465
2466static const struct rproc_hexagon_res msm8974_mss = {
2467 .hexagon_mba_image = "mba.b00",
2468 .proxy_supply = (struct qcom_mss_reg_res[]) {
2469 {
2470 .supply = "pll",
2471 .uA = 100000,
2472 },
2473 {}
2474 },
2475 .fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2476 {
2477 .supply = "mx",
2478 .uV = 1050000,
2479 },
2480 {
2481 .supply = "cx",
2482 .uA = 100000,
2483 },
2484 {}
2485 },
2486 .active_supply = (struct qcom_mss_reg_res[]) {
2487 {
2488 .supply = "mss",
2489 .uV = 1050000,
2490 .uA = 100000,
2491 },
2492 {}
2493 },
2494 .proxy_clk_names = (char*[]){
2495 "xo",
2496 NULL
2497 },
2498 .active_clk_names = (char*[]){
2499 "iface",
2500 "bus",
2501 "mem",
2502 NULL
2503 },
2504 .proxy_pd_names = (char*[]){
2505 "mx",
2506 "cx",
2507 NULL
2508 },
2509 .need_mem_protection = false,
2510 .has_alt_reset = false,
2511 .has_mba_logs = false,
2512 .has_spare_reg = false,
2513 .has_qaccept_regs = false,
2514 .has_ext_cntl_regs = false,
2515 .has_vq6 = false,
2516 .version = MSS_MSM8974,
2517};
2518
2519static const struct of_device_id q6v5_of_match[] = {
2520 { .compatible = "qcom,q6v5-pil", .data = &msm8916_mss},
2521 { .compatible = "qcom,msm8909-mss-pil", .data = &msm8909_mss},
2522 { .compatible = "qcom,msm8916-mss-pil", .data = &msm8916_mss},
2523 { .compatible = "qcom,msm8953-mss-pil", .data = &msm8953_mss},
2524 { .compatible = "qcom,msm8974-mss-pil", .data = &msm8974_mss},
2525 { .compatible = "qcom,msm8996-mss-pil", .data = &msm8996_mss},
2526 { .compatible = "qcom,msm8998-mss-pil", .data = &msm8998_mss},
2527 { .compatible = "qcom,sc7180-mss-pil", .data = &sc7180_mss},
2528 { .compatible = "qcom,sc7280-mss-pil", .data = &sc7280_mss},
2529 { .compatible = "qcom,sdm660-mss-pil", .data = &sdm660_mss},
2530 { .compatible = "qcom,sdm845-mss-pil", .data = &sdm845_mss},
2531 { },
2532};
2533MODULE_DEVICE_TABLE(of, q6v5_of_match);
2534
2535static struct platform_driver q6v5_driver = {
2536 .probe = q6v5_probe,
2537 .remove_new = q6v5_remove,
2538 .driver = {
2539 .name = "qcom-q6v5-mss",
2540 .of_match_table = q6v5_of_match,
2541 },
2542};
2543module_platform_driver(q6v5_driver);
2544
2545MODULE_DESCRIPTION("Qualcomm Self-authenticating modem remoteproc driver");
2546MODULE_LICENSE("GPL v2");
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * Qualcomm self-authenticating modem subsystem remoteproc driver
4 *
5 * Copyright (C) 2016 Linaro Ltd.
6 * Copyright (C) 2014 Sony Mobile Communications AB
7 * Copyright (c) 2012-2013, The Linux Foundation. All rights reserved.
8 */
9
10#include <linux/clk.h>
11#include <linux/delay.h>
12#include <linux/devcoredump.h>
13#include <linux/dma-mapping.h>
14#include <linux/interrupt.h>
15#include <linux/kernel.h>
16#include <linux/mfd/syscon.h>
17#include <linux/module.h>
18#include <linux/of.h>
19#include <linux/of_reserved_mem.h>
20#include <linux/of_platform.h>
21#include <linux/platform_device.h>
22#include <linux/pm_domain.h>
23#include <linux/pm_runtime.h>
24#include <linux/regmap.h>
25#include <linux/regulator/consumer.h>
26#include <linux/remoteproc.h>
27#include <linux/reset.h>
28#include <linux/soc/qcom/mdt_loader.h>
29#include <linux/iopoll.h>
30#include <linux/slab.h>
31
32#include "remoteproc_internal.h"
33#include "qcom_common.h"
34#include "qcom_pil_info.h"
35#include "qcom_q6v5.h"
36
37#include <linux/firmware/qcom/qcom_scm.h>
38
39#define MPSS_CRASH_REASON_SMEM 421
40
41#define MBA_LOG_SIZE SZ_4K
42
43#define MPSS_PAS_ID 5
44
45/* RMB Status Register Values */
46#define RMB_PBL_SUCCESS 0x1
47
48#define RMB_MBA_XPU_UNLOCKED 0x1
49#define RMB_MBA_XPU_UNLOCKED_SCRIBBLED 0x2
50#define RMB_MBA_META_DATA_AUTH_SUCCESS 0x3
51#define RMB_MBA_AUTH_COMPLETE 0x4
52
53/* PBL/MBA interface registers */
54#define RMB_MBA_IMAGE_REG 0x00
55#define RMB_PBL_STATUS_REG 0x04
56#define RMB_MBA_COMMAND_REG 0x08
57#define RMB_MBA_STATUS_REG 0x0C
58#define RMB_PMI_META_DATA_REG 0x10
59#define RMB_PMI_CODE_START_REG 0x14
60#define RMB_PMI_CODE_LENGTH_REG 0x18
61#define RMB_MBA_MSS_STATUS 0x40
62#define RMB_MBA_ALT_RESET 0x44
63
64#define RMB_CMD_META_DATA_READY 0x1
65#define RMB_CMD_LOAD_READY 0x2
66
67/* QDSP6SS Register Offsets */
68#define QDSP6SS_RESET_REG 0x014
69#define QDSP6SS_GFMUX_CTL_REG 0x020
70#define QDSP6SS_PWR_CTL_REG 0x030
71#define QDSP6SS_MEM_PWR_CTL 0x0B0
72#define QDSP6V6SS_MEM_PWR_CTL 0x034
73#define QDSP6SS_STRAP_ACC 0x110
74#define QDSP6V62SS_BHS_STATUS 0x0C4
75
76/* AXI Halt Register Offsets */
77#define AXI_HALTREQ_REG 0x0
78#define AXI_HALTACK_REG 0x4
79#define AXI_IDLE_REG 0x8
80#define AXI_GATING_VALID_OVERRIDE BIT(0)
81
82#define HALT_ACK_TIMEOUT_US 100000
83
84/* QACCEPT Register Offsets */
85#define QACCEPT_ACCEPT_REG 0x0
86#define QACCEPT_ACTIVE_REG 0x4
87#define QACCEPT_DENY_REG 0x8
88#define QACCEPT_REQ_REG 0xC
89
90#define QACCEPT_TIMEOUT_US 50
91
92/* QDSP6SS_RESET */
93#define Q6SS_STOP_CORE BIT(0)
94#define Q6SS_CORE_ARES BIT(1)
95#define Q6SS_BUS_ARES_ENABLE BIT(2)
96
97/* QDSP6SS CBCR */
98#define Q6SS_CBCR_CLKEN BIT(0)
99#define Q6SS_CBCR_CLKOFF BIT(31)
100#define Q6SS_CBCR_TIMEOUT_US 200
101
102/* QDSP6SS_GFMUX_CTL */
103#define Q6SS_CLK_ENABLE BIT(1)
104
105/* QDSP6SS_PWR_CTL */
106#define Q6SS_L2DATA_SLP_NRET_N_0 BIT(0)
107#define Q6SS_L2DATA_SLP_NRET_N_1 BIT(1)
108#define Q6SS_L2DATA_SLP_NRET_N_2 BIT(2)
109#define Q6SS_L2TAG_SLP_NRET_N BIT(16)
110#define Q6SS_ETB_SLP_NRET_N BIT(17)
111#define Q6SS_L2DATA_STBY_N BIT(18)
112#define Q6SS_SLP_RET_N BIT(19)
113#define Q6SS_CLAMP_IO BIT(20)
114#define QDSS_BHS_ON BIT(21)
115#define QDSS_LDO_BYP BIT(22)
116
117/* QDSP6v55 parameters */
118#define QDSP6V55_MEM_BITS GENMASK(16, 8)
119
120/* QDSP6v56 parameters */
121#define QDSP6v56_LDO_BYP BIT(25)
122#define QDSP6v56_BHS_ON BIT(24)
123#define QDSP6v56_CLAMP_WL BIT(21)
124#define QDSP6v56_CLAMP_QMC_MEM BIT(22)
125#define QDSP6SS_XO_CBCR 0x0038
126#define QDSP6SS_ACC_OVERRIDE_VAL 0x20
127#define QDSP6v55_BHS_EN_REST_ACK BIT(0)
128
129/* QDSP6v65 parameters */
130#define QDSP6SS_CORE_CBCR 0x20
131#define QDSP6SS_SLEEP 0x3C
132#define QDSP6SS_BOOT_CORE_START 0x400
133#define QDSP6SS_BOOT_CMD 0x404
134#define BOOT_FSM_TIMEOUT 10000
135#define BHS_CHECK_MAX_LOOPS 200
136
137struct reg_info {
138 struct regulator *reg;
139 int uV;
140 int uA;
141};
142
143struct qcom_mss_reg_res {
144 const char *supply;
145 int uV;
146 int uA;
147};
148
149struct rproc_hexagon_res {
150 const char *hexagon_mba_image;
151 struct qcom_mss_reg_res *proxy_supply;
152 struct qcom_mss_reg_res *fallback_proxy_supply;
153 struct qcom_mss_reg_res *active_supply;
154 char **proxy_clk_names;
155 char **reset_clk_names;
156 char **active_clk_names;
157 char **proxy_pd_names;
158 int version;
159 bool need_mem_protection;
160 bool has_alt_reset;
161 bool has_mba_logs;
162 bool has_spare_reg;
163 bool has_qaccept_regs;
164 bool has_ext_cntl_regs;
165 bool has_vq6;
166};
167
168struct q6v5 {
169 struct device *dev;
170 struct rproc *rproc;
171
172 void __iomem *reg_base;
173 void __iomem *rmb_base;
174
175 struct regmap *halt_map;
176 struct regmap *conn_map;
177
178 u32 halt_q6;
179 u32 halt_modem;
180 u32 halt_nc;
181 u32 halt_vq6;
182 u32 conn_box;
183
184 u32 qaccept_mdm;
185 u32 qaccept_cx;
186 u32 qaccept_axi;
187
188 u32 axim1_clk_off;
189 u32 crypto_clk_off;
190 u32 force_clk_on;
191 u32 rscc_disable;
192
193 struct reset_control *mss_restart;
194 struct reset_control *pdc_reset;
195
196 struct qcom_q6v5 q6v5;
197
198 struct clk *active_clks[8];
199 struct clk *reset_clks[4];
200 struct clk *proxy_clks[4];
201 struct device *proxy_pds[3];
202 int active_clk_count;
203 int reset_clk_count;
204 int proxy_clk_count;
205 int proxy_pd_count;
206
207 struct reg_info active_regs[1];
208 struct reg_info proxy_regs[1];
209 struct reg_info fallback_proxy_regs[2];
210 int active_reg_count;
211 int proxy_reg_count;
212 int fallback_proxy_reg_count;
213
214 bool dump_mba_loaded;
215 size_t current_dump_size;
216 size_t total_dump_size;
217
218 phys_addr_t mba_phys;
219 size_t mba_size;
220 size_t dp_size;
221
222 phys_addr_t mdata_phys;
223 size_t mdata_size;
224
225 phys_addr_t mpss_phys;
226 phys_addr_t mpss_reloc;
227 size_t mpss_size;
228
229 struct qcom_rproc_glink glink_subdev;
230 struct qcom_rproc_subdev smd_subdev;
231 struct qcom_rproc_pdm pdm_subdev;
232 struct qcom_rproc_ssr ssr_subdev;
233 struct qcom_sysmon *sysmon;
234 struct platform_device *bam_dmux;
235 bool need_mem_protection;
236 bool has_alt_reset;
237 bool has_mba_logs;
238 bool has_spare_reg;
239 bool has_qaccept_regs;
240 bool has_ext_cntl_regs;
241 bool has_vq6;
242 u64 mpss_perm;
243 u64 mba_perm;
244 const char *hexagon_mdt_image;
245 int version;
246};
247
248enum {
249 MSS_MSM8909,
250 MSS_MSM8916,
251 MSS_MSM8953,
252 MSS_MSM8974,
253 MSS_MSM8996,
254 MSS_MSM8998,
255 MSS_SC7180,
256 MSS_SC7280,
257 MSS_SDM660,
258 MSS_SDM845,
259};
260
261static int q6v5_regulator_init(struct device *dev, struct reg_info *regs,
262 const struct qcom_mss_reg_res *reg_res)
263{
264 int i;
265
266 if (!reg_res)
267 return 0;
268
269 for (i = 0; reg_res[i].supply; i++) {
270 regs[i].reg = devm_regulator_get(dev, reg_res[i].supply);
271 if (IS_ERR(regs[i].reg))
272 return dev_err_probe(dev, PTR_ERR(regs[i].reg),
273 "Failed to get %s\n regulator",
274 reg_res[i].supply);
275
276 regs[i].uV = reg_res[i].uV;
277 regs[i].uA = reg_res[i].uA;
278 }
279
280 return i;
281}
282
283static int q6v5_regulator_enable(struct q6v5 *qproc,
284 struct reg_info *regs, int count)
285{
286 int ret;
287 int i;
288
289 for (i = 0; i < count; i++) {
290 if (regs[i].uV > 0) {
291 ret = regulator_set_voltage(regs[i].reg,
292 regs[i].uV, INT_MAX);
293 if (ret) {
294 dev_err(qproc->dev,
295 "Failed to request voltage for %d.\n",
296 i);
297 goto err;
298 }
299 }
300
301 if (regs[i].uA > 0) {
302 ret = regulator_set_load(regs[i].reg,
303 regs[i].uA);
304 if (ret < 0) {
305 dev_err(qproc->dev,
306 "Failed to set regulator mode\n");
307 goto err;
308 }
309 }
310
311 ret = regulator_enable(regs[i].reg);
312 if (ret) {
313 dev_err(qproc->dev, "Regulator enable failed\n");
314 goto err;
315 }
316 }
317
318 return 0;
319err:
320 for (; i >= 0; i--) {
321 if (regs[i].uV > 0)
322 regulator_set_voltage(regs[i].reg, 0, INT_MAX);
323
324 if (regs[i].uA > 0)
325 regulator_set_load(regs[i].reg, 0);
326
327 regulator_disable(regs[i].reg);
328 }
329
330 return ret;
331}
332
333static void q6v5_regulator_disable(struct q6v5 *qproc,
334 struct reg_info *regs, int count)
335{
336 int i;
337
338 for (i = 0; i < count; i++) {
339 if (regs[i].uV > 0)
340 regulator_set_voltage(regs[i].reg, 0, INT_MAX);
341
342 if (regs[i].uA > 0)
343 regulator_set_load(regs[i].reg, 0);
344
345 regulator_disable(regs[i].reg);
346 }
347}
348
349static int q6v5_clk_enable(struct device *dev,
350 struct clk **clks, int count)
351{
352 int rc;
353 int i;
354
355 for (i = 0; i < count; i++) {
356 rc = clk_prepare_enable(clks[i]);
357 if (rc) {
358 dev_err(dev, "Clock enable failed\n");
359 goto err;
360 }
361 }
362
363 return 0;
364err:
365 for (i--; i >= 0; i--)
366 clk_disable_unprepare(clks[i]);
367
368 return rc;
369}
370
371static void q6v5_clk_disable(struct device *dev,
372 struct clk **clks, int count)
373{
374 int i;
375
376 for (i = 0; i < count; i++)
377 clk_disable_unprepare(clks[i]);
378}
379
380static int q6v5_pds_enable(struct q6v5 *qproc, struct device **pds,
381 size_t pd_count)
382{
383 int ret;
384 int i;
385
386 for (i = 0; i < pd_count; i++) {
387 dev_pm_genpd_set_performance_state(pds[i], INT_MAX);
388 ret = pm_runtime_get_sync(pds[i]);
389 if (ret < 0) {
390 pm_runtime_put_noidle(pds[i]);
391 dev_pm_genpd_set_performance_state(pds[i], 0);
392 goto unroll_pd_votes;
393 }
394 }
395
396 return 0;
397
398unroll_pd_votes:
399 for (i--; i >= 0; i--) {
400 dev_pm_genpd_set_performance_state(pds[i], 0);
401 pm_runtime_put(pds[i]);
402 }
403
404 return ret;
405}
406
407static void q6v5_pds_disable(struct q6v5 *qproc, struct device **pds,
408 size_t pd_count)
409{
410 int i;
411
412 for (i = 0; i < pd_count; i++) {
413 dev_pm_genpd_set_performance_state(pds[i], 0);
414 pm_runtime_put(pds[i]);
415 }
416}
417
418static int q6v5_xfer_mem_ownership(struct q6v5 *qproc, u64 *current_perm,
419 bool local, bool remote, phys_addr_t addr,
420 size_t size)
421{
422 struct qcom_scm_vmperm next[2];
423 int perms = 0;
424
425 if (!qproc->need_mem_protection)
426 return 0;
427
428 if (local == !!(*current_perm & BIT(QCOM_SCM_VMID_HLOS)) &&
429 remote == !!(*current_perm & BIT(QCOM_SCM_VMID_MSS_MSA)))
430 return 0;
431
432 if (local) {
433 next[perms].vmid = QCOM_SCM_VMID_HLOS;
434 next[perms].perm = QCOM_SCM_PERM_RWX;
435 perms++;
436 }
437
438 if (remote) {
439 next[perms].vmid = QCOM_SCM_VMID_MSS_MSA;
440 next[perms].perm = QCOM_SCM_PERM_RW;
441 perms++;
442 }
443
444 return qcom_scm_assign_mem(addr, ALIGN(size, SZ_4K),
445 current_perm, next, perms);
446}
447
448static void q6v5_debug_policy_load(struct q6v5 *qproc, void *mba_region)
449{
450 const struct firmware *dp_fw;
451
452 if (request_firmware_direct(&dp_fw, "msadp", qproc->dev))
453 return;
454
455 if (SZ_1M + dp_fw->size <= qproc->mba_size) {
456 memcpy(mba_region + SZ_1M, dp_fw->data, dp_fw->size);
457 qproc->dp_size = dp_fw->size;
458 }
459
460 release_firmware(dp_fw);
461}
462
463static int q6v5_load(struct rproc *rproc, const struct firmware *fw)
464{
465 struct q6v5 *qproc = rproc->priv;
466 void *mba_region;
467
468 /* MBA is restricted to a maximum size of 1M */
469 if (fw->size > qproc->mba_size || fw->size > SZ_1M) {
470 dev_err(qproc->dev, "MBA firmware load failed\n");
471 return -EINVAL;
472 }
473
474 mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
475 if (!mba_region) {
476 dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
477 &qproc->mba_phys, qproc->mba_size);
478 return -EBUSY;
479 }
480
481 memcpy(mba_region, fw->data, fw->size);
482 q6v5_debug_policy_load(qproc, mba_region);
483 memunmap(mba_region);
484
485 return 0;
486}
487
488static int q6v5_reset_assert(struct q6v5 *qproc)
489{
490 int ret;
491
492 if (qproc->has_alt_reset) {
493 reset_control_assert(qproc->pdc_reset);
494 ret = reset_control_reset(qproc->mss_restart);
495 reset_control_deassert(qproc->pdc_reset);
496 } else if (qproc->has_spare_reg) {
497 /*
498 * When the AXI pipeline is being reset with the Q6 modem partly
499 * operational there is possibility of AXI valid signal to
500 * glitch, leading to spurious transactions and Q6 hangs. A work
501 * around is employed by asserting the AXI_GATING_VALID_OVERRIDE
502 * BIT before triggering Q6 MSS reset. AXI_GATING_VALID_OVERRIDE
503 * is withdrawn post MSS assert followed by a MSS deassert,
504 * while holding the PDC reset.
505 */
506 reset_control_assert(qproc->pdc_reset);
507 regmap_update_bits(qproc->conn_map, qproc->conn_box,
508 AXI_GATING_VALID_OVERRIDE, 1);
509 reset_control_assert(qproc->mss_restart);
510 reset_control_deassert(qproc->pdc_reset);
511 regmap_update_bits(qproc->conn_map, qproc->conn_box,
512 AXI_GATING_VALID_OVERRIDE, 0);
513 ret = reset_control_deassert(qproc->mss_restart);
514 } else if (qproc->has_ext_cntl_regs) {
515 regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
516 reset_control_assert(qproc->pdc_reset);
517 reset_control_assert(qproc->mss_restart);
518 reset_control_deassert(qproc->pdc_reset);
519 ret = reset_control_deassert(qproc->mss_restart);
520 } else {
521 ret = reset_control_assert(qproc->mss_restart);
522 }
523
524 return ret;
525}
526
527static int q6v5_reset_deassert(struct q6v5 *qproc)
528{
529 int ret;
530
531 if (qproc->has_alt_reset) {
532 reset_control_assert(qproc->pdc_reset);
533 writel(1, qproc->rmb_base + RMB_MBA_ALT_RESET);
534 ret = reset_control_reset(qproc->mss_restart);
535 writel(0, qproc->rmb_base + RMB_MBA_ALT_RESET);
536 reset_control_deassert(qproc->pdc_reset);
537 } else if (qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
538 ret = reset_control_reset(qproc->mss_restart);
539 } else {
540 ret = reset_control_deassert(qproc->mss_restart);
541 }
542
543 return ret;
544}
545
546static int q6v5_rmb_pbl_wait(struct q6v5 *qproc, int ms)
547{
548 unsigned long timeout;
549 s32 val;
550
551 timeout = jiffies + msecs_to_jiffies(ms);
552 for (;;) {
553 val = readl(qproc->rmb_base + RMB_PBL_STATUS_REG);
554 if (val)
555 break;
556
557 if (time_after(jiffies, timeout))
558 return -ETIMEDOUT;
559
560 msleep(1);
561 }
562
563 return val;
564}
565
566static int q6v5_rmb_mba_wait(struct q6v5 *qproc, u32 status, int ms)
567{
568
569 unsigned long timeout;
570 s32 val;
571
572 timeout = jiffies + msecs_to_jiffies(ms);
573 for (;;) {
574 val = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
575 if (val < 0)
576 break;
577
578 if (!status && val)
579 break;
580 else if (status && val == status)
581 break;
582
583 if (time_after(jiffies, timeout))
584 return -ETIMEDOUT;
585
586 msleep(1);
587 }
588
589 return val;
590}
591
592static void q6v5_dump_mba_logs(struct q6v5 *qproc)
593{
594 struct rproc *rproc = qproc->rproc;
595 void *data;
596 void *mba_region;
597
598 if (!qproc->has_mba_logs)
599 return;
600
601 if (q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false, qproc->mba_phys,
602 qproc->mba_size))
603 return;
604
605 mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
606 if (!mba_region)
607 return;
608
609 data = vmalloc(MBA_LOG_SIZE);
610 if (data) {
611 memcpy(data, mba_region, MBA_LOG_SIZE);
612 dev_coredumpv(&rproc->dev, data, MBA_LOG_SIZE, GFP_KERNEL);
613 }
614 memunmap(mba_region);
615}
616
617static int q6v5proc_reset(struct q6v5 *qproc)
618{
619 u32 val;
620 int ret;
621 int i;
622
623 if (qproc->version == MSS_SDM845) {
624 val = readl(qproc->reg_base + QDSP6SS_SLEEP);
625 val |= Q6SS_CBCR_CLKEN;
626 writel(val, qproc->reg_base + QDSP6SS_SLEEP);
627
628 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
629 val, !(val & Q6SS_CBCR_CLKOFF), 1,
630 Q6SS_CBCR_TIMEOUT_US);
631 if (ret) {
632 dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
633 return -ETIMEDOUT;
634 }
635
636 /* De-assert QDSP6 stop core */
637 writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
638 /* Trigger boot FSM */
639 writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
640
641 ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
642 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
643 if (ret) {
644 dev_err(qproc->dev, "Boot FSM failed to complete.\n");
645 /* Reset the modem so that boot FSM is in reset state */
646 q6v5_reset_deassert(qproc);
647 return ret;
648 }
649
650 goto pbl_wait;
651 } else if (qproc->version == MSS_SC7180 || qproc->version == MSS_SC7280) {
652 val = readl(qproc->reg_base + QDSP6SS_SLEEP);
653 val |= Q6SS_CBCR_CLKEN;
654 writel(val, qproc->reg_base + QDSP6SS_SLEEP);
655
656 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
657 val, !(val & Q6SS_CBCR_CLKOFF), 1,
658 Q6SS_CBCR_TIMEOUT_US);
659 if (ret) {
660 dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
661 return -ETIMEDOUT;
662 }
663
664 /* Turn on the XO clock needed for PLL setup */
665 val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
666 val |= Q6SS_CBCR_CLKEN;
667 writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
668
669 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
670 val, !(val & Q6SS_CBCR_CLKOFF), 1,
671 Q6SS_CBCR_TIMEOUT_US);
672 if (ret) {
673 dev_err(qproc->dev, "QDSP6SS XO clock timed out\n");
674 return -ETIMEDOUT;
675 }
676
677 /* Configure Q6 core CBCR to auto-enable after reset sequence */
678 val = readl(qproc->reg_base + QDSP6SS_CORE_CBCR);
679 val |= Q6SS_CBCR_CLKEN;
680 writel(val, qproc->reg_base + QDSP6SS_CORE_CBCR);
681
682 /* De-assert the Q6 stop core signal */
683 writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
684
685 /* Wait for 10 us for any staggering logic to settle */
686 usleep_range(10, 20);
687
688 /* Trigger the boot FSM to start the Q6 out-of-reset sequence */
689 writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
690
691 /* Poll the MSS_STATUS for FSM completion */
692 ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
693 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
694 if (ret) {
695 dev_err(qproc->dev, "Boot FSM failed to complete.\n");
696 /* Reset the modem so that boot FSM is in reset state */
697 q6v5_reset_deassert(qproc);
698 return ret;
699 }
700 goto pbl_wait;
701 } else if (qproc->version == MSS_MSM8909 ||
702 qproc->version == MSS_MSM8953 ||
703 qproc->version == MSS_MSM8996 ||
704 qproc->version == MSS_MSM8998 ||
705 qproc->version == MSS_SDM660) {
706
707 if (qproc->version != MSS_MSM8909 &&
708 qproc->version != MSS_MSM8953)
709 /* Override the ACC value if required */
710 writel(QDSP6SS_ACC_OVERRIDE_VAL,
711 qproc->reg_base + QDSP6SS_STRAP_ACC);
712
713 /* Assert resets, stop core */
714 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
715 val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
716 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
717
718 /* BHS require xo cbcr to be enabled */
719 val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
720 val |= Q6SS_CBCR_CLKEN;
721 writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
722
723 /* Read CLKOFF bit to go low indicating CLK is enabled */
724 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
725 val, !(val & Q6SS_CBCR_CLKOFF), 1,
726 Q6SS_CBCR_TIMEOUT_US);
727 if (ret) {
728 dev_err(qproc->dev,
729 "xo cbcr enabling timed out (rc:%d)\n", ret);
730 return ret;
731 }
732 /* Enable power block headswitch and wait for it to stabilize */
733 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
734 val |= QDSP6v56_BHS_ON;
735 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
736 val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
737 udelay(1);
738
739 if (qproc->version == MSS_SDM660) {
740 ret = readl_relaxed_poll_timeout(qproc->reg_base + QDSP6V62SS_BHS_STATUS,
741 i, (i & QDSP6v55_BHS_EN_REST_ACK),
742 1, BHS_CHECK_MAX_LOOPS);
743 if (ret == -ETIMEDOUT) {
744 dev_err(qproc->dev, "BHS_EN_REST_ACK not set!\n");
745 return -ETIMEDOUT;
746 }
747 }
748
749 /* Put LDO in bypass mode */
750 val |= QDSP6v56_LDO_BYP;
751 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
752
753 if (qproc->version != MSS_MSM8909) {
754 int mem_pwr_ctl;
755
756 /* Deassert QDSP6 compiler memory clamp */
757 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
758 val &= ~QDSP6v56_CLAMP_QMC_MEM;
759 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
760
761 /* Deassert memory peripheral sleep and L2 memory standby */
762 val |= Q6SS_L2DATA_STBY_N | Q6SS_SLP_RET_N;
763 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
764
765 /* Turn on L1, L2, ETB and JU memories 1 at a time */
766 if (qproc->version == MSS_MSM8953 ||
767 qproc->version == MSS_MSM8996) {
768 mem_pwr_ctl = QDSP6SS_MEM_PWR_CTL;
769 i = 19;
770 } else {
771 /* MSS_MSM8998, MSS_SDM660 */
772 mem_pwr_ctl = QDSP6V6SS_MEM_PWR_CTL;
773 i = 28;
774 }
775 val = readl(qproc->reg_base + mem_pwr_ctl);
776 for (; i >= 0; i--) {
777 val |= BIT(i);
778 writel(val, qproc->reg_base + mem_pwr_ctl);
779 /*
780 * Read back value to ensure the write is done then
781 * wait for 1us for both memory peripheral and data
782 * array to turn on.
783 */
784 val |= readl(qproc->reg_base + mem_pwr_ctl);
785 udelay(1);
786 }
787 } else {
788 /* Turn on memories */
789 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
790 val |= Q6SS_SLP_RET_N | Q6SS_L2DATA_STBY_N |
791 Q6SS_ETB_SLP_NRET_N | QDSP6V55_MEM_BITS;
792 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
793
794 /* Turn on L2 banks 1 at a time */
795 for (i = 0; i <= 7; i++) {
796 val |= BIT(i);
797 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
798 }
799 }
800
801 /* Remove word line clamp */
802 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
803 val &= ~QDSP6v56_CLAMP_WL;
804 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
805 } else {
806 /* Assert resets, stop core */
807 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
808 val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
809 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
810
811 /* Enable power block headswitch and wait for it to stabilize */
812 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
813 val |= QDSS_BHS_ON | QDSS_LDO_BYP;
814 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
815 val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
816 udelay(1);
817 /*
818 * Turn on memories. L2 banks should be done individually
819 * to minimize inrush current.
820 */
821 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
822 val |= Q6SS_SLP_RET_N | Q6SS_L2TAG_SLP_NRET_N |
823 Q6SS_ETB_SLP_NRET_N | Q6SS_L2DATA_STBY_N;
824 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
825 val |= Q6SS_L2DATA_SLP_NRET_N_2;
826 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
827 val |= Q6SS_L2DATA_SLP_NRET_N_1;
828 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
829 val |= Q6SS_L2DATA_SLP_NRET_N_0;
830 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
831 }
832 /* Remove IO clamp */
833 val &= ~Q6SS_CLAMP_IO;
834 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
835
836 /* Bring core out of reset */
837 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
838 val &= ~Q6SS_CORE_ARES;
839 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
840
841 /* Turn on core clock */
842 val = readl(qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
843 val |= Q6SS_CLK_ENABLE;
844 writel(val, qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
845
846 /* Start core execution */
847 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
848 val &= ~Q6SS_STOP_CORE;
849 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
850
851pbl_wait:
852 /* Wait for PBL status */
853 ret = q6v5_rmb_pbl_wait(qproc, 1000);
854 if (ret == -ETIMEDOUT) {
855 dev_err(qproc->dev, "PBL boot timed out\n");
856 } else if (ret != RMB_PBL_SUCCESS) {
857 dev_err(qproc->dev, "PBL returned unexpected status %d\n", ret);
858 ret = -EINVAL;
859 } else {
860 ret = 0;
861 }
862
863 return ret;
864}
865
866static int q6v5proc_enable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
867{
868 unsigned int val;
869 int ret;
870
871 if (!qproc->has_qaccept_regs)
872 return 0;
873
874 if (qproc->has_ext_cntl_regs) {
875 regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
876 regmap_write(qproc->conn_map, qproc->force_clk_on, 1);
877
878 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
879 !val, 1, Q6SS_CBCR_TIMEOUT_US);
880 if (ret) {
881 dev_err(qproc->dev, "failed to enable axim1 clock\n");
882 return -ETIMEDOUT;
883 }
884 }
885
886 regmap_write(map, offset + QACCEPT_REQ_REG, 1);
887
888 /* Wait for accept */
889 ret = regmap_read_poll_timeout(map, offset + QACCEPT_ACCEPT_REG, val, val, 5,
890 QACCEPT_TIMEOUT_US);
891 if (ret) {
892 dev_err(qproc->dev, "qchannel enable failed\n");
893 return -ETIMEDOUT;
894 }
895
896 return 0;
897}
898
899static void q6v5proc_disable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
900{
901 int ret;
902 unsigned int val, retry;
903 unsigned int nretry = 10;
904 bool takedown_complete = false;
905
906 if (!qproc->has_qaccept_regs)
907 return;
908
909 while (!takedown_complete && nretry) {
910 nretry--;
911
912 /* Wait for active transactions to complete */
913 regmap_read_poll_timeout(map, offset + QACCEPT_ACTIVE_REG, val, !val, 5,
914 QACCEPT_TIMEOUT_US);
915
916 /* Request Q-channel transaction takedown */
917 regmap_write(map, offset + QACCEPT_REQ_REG, 0);
918
919 /*
920 * If the request is denied, reset the Q-channel takedown request,
921 * wait for active transactions to complete and retry takedown.
922 */
923 retry = 10;
924 while (retry) {
925 usleep_range(5, 10);
926 retry--;
927 ret = regmap_read(map, offset + QACCEPT_DENY_REG, &val);
928 if (!ret && val) {
929 regmap_write(map, offset + QACCEPT_REQ_REG, 1);
930 break;
931 }
932
933 ret = regmap_read(map, offset + QACCEPT_ACCEPT_REG, &val);
934 if (!ret && !val) {
935 takedown_complete = true;
936 break;
937 }
938 }
939
940 if (!retry)
941 break;
942 }
943
944 /* Rely on mss_restart to clear out pending transactions on takedown failure */
945 if (!takedown_complete)
946 dev_err(qproc->dev, "qchannel takedown failed\n");
947}
948
949static void q6v5proc_halt_axi_port(struct q6v5 *qproc,
950 struct regmap *halt_map,
951 u32 offset)
952{
953 unsigned int val;
954 int ret;
955
956 /* Check if we're already idle */
957 ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
958 if (!ret && val)
959 return;
960
961 /* Assert halt request */
962 regmap_write(halt_map, offset + AXI_HALTREQ_REG, 1);
963
964 /* Wait for halt */
965 regmap_read_poll_timeout(halt_map, offset + AXI_HALTACK_REG, val,
966 val, 1000, HALT_ACK_TIMEOUT_US);
967
968 ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
969 if (ret || !val)
970 dev_err(qproc->dev, "port failed halt\n");
971
972 /* Clear halt request (port will remain halted until reset) */
973 regmap_write(halt_map, offset + AXI_HALTREQ_REG, 0);
974}
975
976static int q6v5_mpss_init_image(struct q6v5 *qproc, const struct firmware *fw,
977 const char *fw_name)
978{
979 unsigned long dma_attrs = DMA_ATTR_FORCE_CONTIGUOUS;
980 dma_addr_t phys;
981 void *metadata;
982 u64 mdata_perm;
983 int xferop_ret;
984 size_t size;
985 void *ptr;
986 int ret;
987
988 metadata = qcom_mdt_read_metadata(fw, &size, fw_name, qproc->dev);
989 if (IS_ERR(metadata))
990 return PTR_ERR(metadata);
991
992 if (qproc->mdata_phys) {
993 if (size > qproc->mdata_size) {
994 ret = -EINVAL;
995 dev_err(qproc->dev, "metadata size outside memory range\n");
996 goto free_metadata;
997 }
998
999 phys = qproc->mdata_phys;
1000 ptr = memremap(qproc->mdata_phys, size, MEMREMAP_WC);
1001 if (!ptr) {
1002 ret = -EBUSY;
1003 dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
1004 &qproc->mdata_phys, size);
1005 goto free_metadata;
1006 }
1007 } else {
1008 ptr = dma_alloc_attrs(qproc->dev, size, &phys, GFP_KERNEL, dma_attrs);
1009 if (!ptr) {
1010 ret = -ENOMEM;
1011 dev_err(qproc->dev, "failed to allocate mdt buffer\n");
1012 goto free_metadata;
1013 }
1014 }
1015
1016 memcpy(ptr, metadata, size);
1017
1018 if (qproc->mdata_phys)
1019 memunmap(ptr);
1020
1021 /* Hypervisor mapping to access metadata by modem */
1022 mdata_perm = BIT(QCOM_SCM_VMID_HLOS);
1023 ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, false, true,
1024 phys, size);
1025 if (ret) {
1026 dev_err(qproc->dev,
1027 "assigning Q6 access to metadata failed: %d\n", ret);
1028 ret = -EAGAIN;
1029 goto free_dma_attrs;
1030 }
1031
1032 writel(phys, qproc->rmb_base + RMB_PMI_META_DATA_REG);
1033 writel(RMB_CMD_META_DATA_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1034
1035 ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_META_DATA_AUTH_SUCCESS, 1000);
1036 if (ret == -ETIMEDOUT)
1037 dev_err(qproc->dev, "MPSS header authentication timed out\n");
1038 else if (ret < 0)
1039 dev_err(qproc->dev, "MPSS header authentication failed: %d\n", ret);
1040
1041 /* Metadata authentication done, remove modem access */
1042 xferop_ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, true, false,
1043 phys, size);
1044 if (xferop_ret)
1045 dev_warn(qproc->dev,
1046 "mdt buffer not reclaimed system may become unstable\n");
1047
1048free_dma_attrs:
1049 if (!qproc->mdata_phys)
1050 dma_free_attrs(qproc->dev, size, ptr, phys, dma_attrs);
1051free_metadata:
1052 kfree(metadata);
1053
1054 return ret < 0 ? ret : 0;
1055}
1056
1057static bool q6v5_phdr_valid(const struct elf32_phdr *phdr)
1058{
1059 if (phdr->p_type != PT_LOAD)
1060 return false;
1061
1062 if ((phdr->p_flags & QCOM_MDT_TYPE_MASK) == QCOM_MDT_TYPE_HASH)
1063 return false;
1064
1065 if (!phdr->p_memsz)
1066 return false;
1067
1068 return true;
1069}
1070
1071static int q6v5_mba_load(struct q6v5 *qproc)
1072{
1073 int ret;
1074 int xfermemop_ret;
1075 bool mba_load_err = false;
1076
1077 ret = qcom_q6v5_prepare(&qproc->q6v5);
1078 if (ret)
1079 return ret;
1080
1081 ret = q6v5_pds_enable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1082 if (ret < 0) {
1083 dev_err(qproc->dev, "failed to enable proxy power domains\n");
1084 goto disable_irqs;
1085 }
1086
1087 ret = q6v5_regulator_enable(qproc, qproc->fallback_proxy_regs,
1088 qproc->fallback_proxy_reg_count);
1089 if (ret) {
1090 dev_err(qproc->dev, "failed to enable fallback proxy supplies\n");
1091 goto disable_proxy_pds;
1092 }
1093
1094 ret = q6v5_regulator_enable(qproc, qproc->proxy_regs,
1095 qproc->proxy_reg_count);
1096 if (ret) {
1097 dev_err(qproc->dev, "failed to enable proxy supplies\n");
1098 goto disable_fallback_proxy_reg;
1099 }
1100
1101 ret = q6v5_clk_enable(qproc->dev, qproc->proxy_clks,
1102 qproc->proxy_clk_count);
1103 if (ret) {
1104 dev_err(qproc->dev, "failed to enable proxy clocks\n");
1105 goto disable_proxy_reg;
1106 }
1107
1108 ret = q6v5_regulator_enable(qproc, qproc->active_regs,
1109 qproc->active_reg_count);
1110 if (ret) {
1111 dev_err(qproc->dev, "failed to enable supplies\n");
1112 goto disable_proxy_clk;
1113 }
1114
1115 ret = q6v5_clk_enable(qproc->dev, qproc->reset_clks,
1116 qproc->reset_clk_count);
1117 if (ret) {
1118 dev_err(qproc->dev, "failed to enable reset clocks\n");
1119 goto disable_vdd;
1120 }
1121
1122 ret = q6v5_reset_deassert(qproc);
1123 if (ret) {
1124 dev_err(qproc->dev, "failed to deassert mss restart\n");
1125 goto disable_reset_clks;
1126 }
1127
1128 ret = q6v5_clk_enable(qproc->dev, qproc->active_clks,
1129 qproc->active_clk_count);
1130 if (ret) {
1131 dev_err(qproc->dev, "failed to enable clocks\n");
1132 goto assert_reset;
1133 }
1134
1135 ret = q6v5proc_enable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1136 if (ret) {
1137 dev_err(qproc->dev, "failed to enable axi bridge\n");
1138 goto disable_active_clks;
1139 }
1140
1141 /*
1142 * Some versions of the MBA firmware will upon boot wipe the MPSS region as well, so provide
1143 * the Q6 access to this region.
1144 */
1145 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1146 qproc->mpss_phys, qproc->mpss_size);
1147 if (ret) {
1148 dev_err(qproc->dev, "assigning Q6 access to mpss memory failed: %d\n", ret);
1149 goto disable_active_clks;
1150 }
1151
1152 /* Assign MBA image access in DDR to q6 */
1153 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, false, true,
1154 qproc->mba_phys, qproc->mba_size);
1155 if (ret) {
1156 dev_err(qproc->dev,
1157 "assigning Q6 access to mba memory failed: %d\n", ret);
1158 goto disable_active_clks;
1159 }
1160
1161 if (qproc->has_mba_logs)
1162 qcom_pil_info_store("mba", qproc->mba_phys, MBA_LOG_SIZE);
1163
1164 writel(qproc->mba_phys, qproc->rmb_base + RMB_MBA_IMAGE_REG);
1165 if (qproc->dp_size) {
1166 writel(qproc->mba_phys + SZ_1M, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1167 writel(qproc->dp_size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1168 }
1169
1170 ret = q6v5proc_reset(qproc);
1171 if (ret)
1172 goto reclaim_mba;
1173
1174 ret = q6v5_rmb_mba_wait(qproc, 0, 5000);
1175 if (ret == -ETIMEDOUT) {
1176 dev_err(qproc->dev, "MBA boot timed out\n");
1177 goto halt_axi_ports;
1178 } else if (ret != RMB_MBA_XPU_UNLOCKED &&
1179 ret != RMB_MBA_XPU_UNLOCKED_SCRIBBLED) {
1180 dev_err(qproc->dev, "MBA returned unexpected status %d\n", ret);
1181 ret = -EINVAL;
1182 goto halt_axi_ports;
1183 }
1184
1185 qproc->dump_mba_loaded = true;
1186 return 0;
1187
1188halt_axi_ports:
1189 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1190 if (qproc->has_vq6)
1191 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1192 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1193 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1194 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1195 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1196 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1197 mba_load_err = true;
1198reclaim_mba:
1199 xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1200 false, qproc->mba_phys,
1201 qproc->mba_size);
1202 if (xfermemop_ret) {
1203 dev_err(qproc->dev,
1204 "Failed to reclaim mba buffer, system may become unstable\n");
1205 } else if (mba_load_err) {
1206 q6v5_dump_mba_logs(qproc);
1207 }
1208
1209disable_active_clks:
1210 q6v5_clk_disable(qproc->dev, qproc->active_clks,
1211 qproc->active_clk_count);
1212assert_reset:
1213 q6v5_reset_assert(qproc);
1214disable_reset_clks:
1215 q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1216 qproc->reset_clk_count);
1217disable_vdd:
1218 q6v5_regulator_disable(qproc, qproc->active_regs,
1219 qproc->active_reg_count);
1220disable_proxy_clk:
1221 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1222 qproc->proxy_clk_count);
1223disable_proxy_reg:
1224 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1225 qproc->proxy_reg_count);
1226disable_fallback_proxy_reg:
1227 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1228 qproc->fallback_proxy_reg_count);
1229disable_proxy_pds:
1230 q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1231disable_irqs:
1232 qcom_q6v5_unprepare(&qproc->q6v5);
1233
1234 return ret;
1235}
1236
1237static void q6v5_mba_reclaim(struct q6v5 *qproc)
1238{
1239 int ret;
1240 u32 val;
1241
1242 qproc->dump_mba_loaded = false;
1243 qproc->dp_size = 0;
1244
1245 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1246 if (qproc->has_vq6)
1247 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1248 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1249 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1250 if (qproc->version == MSS_MSM8996) {
1251 /*
1252 * To avoid high MX current during LPASS/MSS restart.
1253 */
1254 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1255 val |= Q6SS_CLAMP_IO | QDSP6v56_CLAMP_WL |
1256 QDSP6v56_CLAMP_QMC_MEM;
1257 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1258 }
1259
1260 if (qproc->has_ext_cntl_regs) {
1261 regmap_write(qproc->conn_map, qproc->rscc_disable, 1);
1262
1263 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
1264 !val, 1, Q6SS_CBCR_TIMEOUT_US);
1265 if (ret)
1266 dev_err(qproc->dev, "failed to enable axim1 clock\n");
1267
1268 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->crypto_clk_off, val,
1269 !val, 1, Q6SS_CBCR_TIMEOUT_US);
1270 if (ret)
1271 dev_err(qproc->dev, "failed to enable crypto clock\n");
1272 }
1273
1274 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1275 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1276 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1277
1278 q6v5_reset_assert(qproc);
1279
1280 q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1281 qproc->reset_clk_count);
1282 q6v5_clk_disable(qproc->dev, qproc->active_clks,
1283 qproc->active_clk_count);
1284 q6v5_regulator_disable(qproc, qproc->active_regs,
1285 qproc->active_reg_count);
1286
1287 /* In case of failure or coredump scenario where reclaiming MBA memory
1288 * could not happen reclaim it here.
1289 */
1290 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false,
1291 qproc->mba_phys,
1292 qproc->mba_size);
1293 WARN_ON(ret);
1294
1295 ret = qcom_q6v5_unprepare(&qproc->q6v5);
1296 if (ret) {
1297 q6v5_pds_disable(qproc, qproc->proxy_pds,
1298 qproc->proxy_pd_count);
1299 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1300 qproc->proxy_clk_count);
1301 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1302 qproc->fallback_proxy_reg_count);
1303 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1304 qproc->proxy_reg_count);
1305 }
1306}
1307
1308static int q6v5_reload_mba(struct rproc *rproc)
1309{
1310 struct q6v5 *qproc = rproc->priv;
1311 const struct firmware *fw;
1312 int ret;
1313
1314 ret = request_firmware(&fw, rproc->firmware, qproc->dev);
1315 if (ret < 0)
1316 return ret;
1317
1318 q6v5_load(rproc, fw);
1319 ret = q6v5_mba_load(qproc);
1320 release_firmware(fw);
1321
1322 return ret;
1323}
1324
1325static int q6v5_mpss_load(struct q6v5 *qproc)
1326{
1327 const struct elf32_phdr *phdrs;
1328 const struct elf32_phdr *phdr;
1329 const struct firmware *seg_fw;
1330 const struct firmware *fw;
1331 struct elf32_hdr *ehdr;
1332 phys_addr_t mpss_reloc;
1333 phys_addr_t boot_addr;
1334 phys_addr_t min_addr = PHYS_ADDR_MAX;
1335 phys_addr_t max_addr = 0;
1336 u32 code_length;
1337 bool relocate = false;
1338 char *fw_name;
1339 size_t fw_name_len;
1340 ssize_t offset;
1341 size_t size = 0;
1342 void *ptr;
1343 int ret;
1344 int i;
1345
1346 fw_name_len = strlen(qproc->hexagon_mdt_image);
1347 if (fw_name_len <= 4)
1348 return -EINVAL;
1349
1350 fw_name = kstrdup(qproc->hexagon_mdt_image, GFP_KERNEL);
1351 if (!fw_name)
1352 return -ENOMEM;
1353
1354 ret = request_firmware(&fw, fw_name, qproc->dev);
1355 if (ret < 0) {
1356 dev_err(qproc->dev, "unable to load %s\n", fw_name);
1357 goto out;
1358 }
1359
1360 /* Initialize the RMB validator */
1361 writel(0, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1362
1363 ret = q6v5_mpss_init_image(qproc, fw, qproc->hexagon_mdt_image);
1364 if (ret)
1365 goto release_firmware;
1366
1367 ehdr = (struct elf32_hdr *)fw->data;
1368 phdrs = (struct elf32_phdr *)(ehdr + 1);
1369
1370 for (i = 0; i < ehdr->e_phnum; i++) {
1371 phdr = &phdrs[i];
1372
1373 if (!q6v5_phdr_valid(phdr))
1374 continue;
1375
1376 if (phdr->p_flags & QCOM_MDT_RELOCATABLE)
1377 relocate = true;
1378
1379 if (phdr->p_paddr < min_addr)
1380 min_addr = phdr->p_paddr;
1381
1382 if (phdr->p_paddr + phdr->p_memsz > max_addr)
1383 max_addr = ALIGN(phdr->p_paddr + phdr->p_memsz, SZ_4K);
1384 }
1385
1386 if (qproc->version == MSS_MSM8953) {
1387 ret = qcom_scm_pas_mem_setup(MPSS_PAS_ID, qproc->mpss_phys, qproc->mpss_size);
1388 if (ret) {
1389 dev_err(qproc->dev,
1390 "setting up mpss memory failed: %d\n", ret);
1391 goto release_firmware;
1392 }
1393 }
1394
1395 /*
1396 * In case of a modem subsystem restart on secure devices, the modem
1397 * memory can be reclaimed only after MBA is loaded.
1398 */
1399 q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, false,
1400 qproc->mpss_phys, qproc->mpss_size);
1401
1402 /* Share ownership between Linux and MSS, during segment loading */
1403 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, true,
1404 qproc->mpss_phys, qproc->mpss_size);
1405 if (ret) {
1406 dev_err(qproc->dev,
1407 "assigning Q6 access to mpss memory failed: %d\n", ret);
1408 ret = -EAGAIN;
1409 goto release_firmware;
1410 }
1411
1412 mpss_reloc = relocate ? min_addr : qproc->mpss_phys;
1413 qproc->mpss_reloc = mpss_reloc;
1414 /* Load firmware segments */
1415 for (i = 0; i < ehdr->e_phnum; i++) {
1416 phdr = &phdrs[i];
1417
1418 if (!q6v5_phdr_valid(phdr))
1419 continue;
1420
1421 offset = phdr->p_paddr - mpss_reloc;
1422 if (offset < 0 || offset + phdr->p_memsz > qproc->mpss_size) {
1423 dev_err(qproc->dev, "segment outside memory range\n");
1424 ret = -EINVAL;
1425 goto release_firmware;
1426 }
1427
1428 if (phdr->p_filesz > phdr->p_memsz) {
1429 dev_err(qproc->dev,
1430 "refusing to load segment %d with p_filesz > p_memsz\n",
1431 i);
1432 ret = -EINVAL;
1433 goto release_firmware;
1434 }
1435
1436 ptr = memremap(qproc->mpss_phys + offset, phdr->p_memsz, MEMREMAP_WC);
1437 if (!ptr) {
1438 dev_err(qproc->dev,
1439 "unable to map memory region: %pa+%zx-%x\n",
1440 &qproc->mpss_phys, offset, phdr->p_memsz);
1441 goto release_firmware;
1442 }
1443
1444 if (phdr->p_filesz && phdr->p_offset < fw->size) {
1445 /* Firmware is large enough to be non-split */
1446 if (phdr->p_offset + phdr->p_filesz > fw->size) {
1447 dev_err(qproc->dev,
1448 "failed to load segment %d from truncated file %s\n",
1449 i, fw_name);
1450 ret = -EINVAL;
1451 memunmap(ptr);
1452 goto release_firmware;
1453 }
1454
1455 memcpy(ptr, fw->data + phdr->p_offset, phdr->p_filesz);
1456 } else if (phdr->p_filesz) {
1457 /* Replace "xxx.xxx" with "xxx.bxx" */
1458 sprintf(fw_name + fw_name_len - 3, "b%02d", i);
1459 ret = request_firmware_into_buf(&seg_fw, fw_name, qproc->dev,
1460 ptr, phdr->p_filesz);
1461 if (ret) {
1462 dev_err(qproc->dev, "failed to load %s\n", fw_name);
1463 memunmap(ptr);
1464 goto release_firmware;
1465 }
1466
1467 if (seg_fw->size != phdr->p_filesz) {
1468 dev_err(qproc->dev,
1469 "failed to load segment %d from truncated file %s\n",
1470 i, fw_name);
1471 ret = -EINVAL;
1472 release_firmware(seg_fw);
1473 memunmap(ptr);
1474 goto release_firmware;
1475 }
1476
1477 release_firmware(seg_fw);
1478 }
1479
1480 if (phdr->p_memsz > phdr->p_filesz) {
1481 memset(ptr + phdr->p_filesz, 0,
1482 phdr->p_memsz - phdr->p_filesz);
1483 }
1484 memunmap(ptr);
1485 size += phdr->p_memsz;
1486
1487 code_length = readl(qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1488 if (!code_length) {
1489 boot_addr = relocate ? qproc->mpss_phys : min_addr;
1490 writel(boot_addr, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1491 writel(RMB_CMD_LOAD_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1492 }
1493 writel(size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1494
1495 ret = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
1496 if (ret < 0) {
1497 dev_err(qproc->dev, "MPSS authentication failed: %d\n",
1498 ret);
1499 goto release_firmware;
1500 }
1501 }
1502
1503 /* Transfer ownership of modem ddr region to q6 */
1504 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1505 qproc->mpss_phys, qproc->mpss_size);
1506 if (ret) {
1507 dev_err(qproc->dev,
1508 "assigning Q6 access to mpss memory failed: %d\n", ret);
1509 ret = -EAGAIN;
1510 goto release_firmware;
1511 }
1512
1513 ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_AUTH_COMPLETE, 10000);
1514 if (ret == -ETIMEDOUT)
1515 dev_err(qproc->dev, "MPSS authentication timed out\n");
1516 else if (ret < 0)
1517 dev_err(qproc->dev, "MPSS authentication failed: %d\n", ret);
1518
1519 qcom_pil_info_store("modem", qproc->mpss_phys, qproc->mpss_size);
1520
1521release_firmware:
1522 release_firmware(fw);
1523out:
1524 kfree(fw_name);
1525
1526 return ret < 0 ? ret : 0;
1527}
1528
1529static void qcom_q6v5_dump_segment(struct rproc *rproc,
1530 struct rproc_dump_segment *segment,
1531 void *dest, size_t cp_offset, size_t size)
1532{
1533 int ret = 0;
1534 struct q6v5 *qproc = rproc->priv;
1535 int offset = segment->da - qproc->mpss_reloc;
1536 void *ptr = NULL;
1537
1538 /* Unlock mba before copying segments */
1539 if (!qproc->dump_mba_loaded) {
1540 ret = q6v5_reload_mba(rproc);
1541 if (!ret) {
1542 /* Reset ownership back to Linux to copy segments */
1543 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1544 true, false,
1545 qproc->mpss_phys,
1546 qproc->mpss_size);
1547 }
1548 }
1549
1550 if (!ret)
1551 ptr = memremap(qproc->mpss_phys + offset + cp_offset, size, MEMREMAP_WC);
1552
1553 if (ptr) {
1554 memcpy(dest, ptr, size);
1555 memunmap(ptr);
1556 } else {
1557 memset(dest, 0xff, size);
1558 }
1559
1560 qproc->current_dump_size += size;
1561
1562 /* Reclaim mba after copying segments */
1563 if (qproc->current_dump_size == qproc->total_dump_size) {
1564 if (qproc->dump_mba_loaded) {
1565 /* Try to reset ownership back to Q6 */
1566 q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1567 false, true,
1568 qproc->mpss_phys,
1569 qproc->mpss_size);
1570 q6v5_mba_reclaim(qproc);
1571 }
1572 }
1573}
1574
1575static int q6v5_start(struct rproc *rproc)
1576{
1577 struct q6v5 *qproc = rproc->priv;
1578 int xfermemop_ret;
1579 int ret;
1580
1581 ret = q6v5_mba_load(qproc);
1582 if (ret)
1583 return ret;
1584
1585 dev_info(qproc->dev, "MBA booted with%s debug policy, loading mpss\n",
1586 qproc->dp_size ? "" : "out");
1587
1588 ret = q6v5_mpss_load(qproc);
1589 if (ret)
1590 goto reclaim_mpss;
1591
1592 ret = qcom_q6v5_wait_for_start(&qproc->q6v5, msecs_to_jiffies(5000));
1593 if (ret == -ETIMEDOUT) {
1594 dev_err(qproc->dev, "start timed out\n");
1595 goto reclaim_mpss;
1596 }
1597
1598 xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1599 false, qproc->mba_phys,
1600 qproc->mba_size);
1601 if (xfermemop_ret)
1602 dev_err(qproc->dev,
1603 "Failed to reclaim mba buffer system may become unstable\n");
1604
1605 /* Reset Dump Segment Mask */
1606 qproc->current_dump_size = 0;
1607
1608 return 0;
1609
1610reclaim_mpss:
1611 q6v5_mba_reclaim(qproc);
1612 q6v5_dump_mba_logs(qproc);
1613
1614 return ret;
1615}
1616
1617static int q6v5_stop(struct rproc *rproc)
1618{
1619 struct q6v5 *qproc = rproc->priv;
1620 int ret;
1621
1622 ret = qcom_q6v5_request_stop(&qproc->q6v5, qproc->sysmon);
1623 if (ret == -ETIMEDOUT)
1624 dev_err(qproc->dev, "timed out on wait\n");
1625
1626 q6v5_mba_reclaim(qproc);
1627
1628 return 0;
1629}
1630
1631static int qcom_q6v5_register_dump_segments(struct rproc *rproc,
1632 const struct firmware *mba_fw)
1633{
1634 const struct firmware *fw;
1635 const struct elf32_phdr *phdrs;
1636 const struct elf32_phdr *phdr;
1637 const struct elf32_hdr *ehdr;
1638 struct q6v5 *qproc = rproc->priv;
1639 unsigned long i;
1640 int ret;
1641
1642 ret = request_firmware(&fw, qproc->hexagon_mdt_image, qproc->dev);
1643 if (ret < 0) {
1644 dev_err(qproc->dev, "unable to load %s\n",
1645 qproc->hexagon_mdt_image);
1646 return ret;
1647 }
1648
1649 rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
1650
1651 ehdr = (struct elf32_hdr *)fw->data;
1652 phdrs = (struct elf32_phdr *)(ehdr + 1);
1653 qproc->total_dump_size = 0;
1654
1655 for (i = 0; i < ehdr->e_phnum; i++) {
1656 phdr = &phdrs[i];
1657
1658 if (!q6v5_phdr_valid(phdr))
1659 continue;
1660
1661 ret = rproc_coredump_add_custom_segment(rproc, phdr->p_paddr,
1662 phdr->p_memsz,
1663 qcom_q6v5_dump_segment,
1664 NULL);
1665 if (ret)
1666 break;
1667
1668 qproc->total_dump_size += phdr->p_memsz;
1669 }
1670
1671 release_firmware(fw);
1672 return ret;
1673}
1674
1675static unsigned long q6v5_panic(struct rproc *rproc)
1676{
1677 struct q6v5 *qproc = rproc->priv;
1678
1679 return qcom_q6v5_panic(&qproc->q6v5);
1680}
1681
1682static const struct rproc_ops q6v5_ops = {
1683 .start = q6v5_start,
1684 .stop = q6v5_stop,
1685 .parse_fw = qcom_q6v5_register_dump_segments,
1686 .load = q6v5_load,
1687 .panic = q6v5_panic,
1688};
1689
1690static void qcom_msa_handover(struct qcom_q6v5 *q6v5)
1691{
1692 struct q6v5 *qproc = container_of(q6v5, struct q6v5, q6v5);
1693
1694 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1695 qproc->proxy_clk_count);
1696 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1697 qproc->proxy_reg_count);
1698 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1699 qproc->fallback_proxy_reg_count);
1700 q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1701}
1702
1703static int q6v5_init_mem(struct q6v5 *qproc, struct platform_device *pdev)
1704{
1705 struct of_phandle_args args;
1706 int halt_cell_cnt = 3;
1707 int ret;
1708
1709 qproc->reg_base = devm_platform_ioremap_resource_byname(pdev, "qdsp6");
1710 if (IS_ERR(qproc->reg_base))
1711 return PTR_ERR(qproc->reg_base);
1712
1713 qproc->rmb_base = devm_platform_ioremap_resource_byname(pdev, "rmb");
1714 if (IS_ERR(qproc->rmb_base))
1715 return PTR_ERR(qproc->rmb_base);
1716
1717 if (qproc->has_vq6)
1718 halt_cell_cnt++;
1719
1720 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1721 "qcom,halt-regs", halt_cell_cnt, 0, &args);
1722 if (ret < 0) {
1723 dev_err(&pdev->dev, "failed to parse qcom,halt-regs\n");
1724 return -EINVAL;
1725 }
1726
1727 qproc->halt_map = syscon_node_to_regmap(args.np);
1728 of_node_put(args.np);
1729 if (IS_ERR(qproc->halt_map))
1730 return PTR_ERR(qproc->halt_map);
1731
1732 qproc->halt_q6 = args.args[0];
1733 qproc->halt_modem = args.args[1];
1734 qproc->halt_nc = args.args[2];
1735
1736 if (qproc->has_vq6)
1737 qproc->halt_vq6 = args.args[3];
1738
1739 if (qproc->has_qaccept_regs) {
1740 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1741 "qcom,qaccept-regs",
1742 3, 0, &args);
1743 if (ret < 0) {
1744 dev_err(&pdev->dev, "failed to parse qaccept-regs\n");
1745 return -EINVAL;
1746 }
1747
1748 qproc->qaccept_mdm = args.args[0];
1749 qproc->qaccept_cx = args.args[1];
1750 qproc->qaccept_axi = args.args[2];
1751 }
1752
1753 if (qproc->has_ext_cntl_regs) {
1754 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1755 "qcom,ext-regs",
1756 2, 0, &args);
1757 if (ret < 0) {
1758 dev_err(&pdev->dev, "failed to parse ext-regs index 0\n");
1759 return -EINVAL;
1760 }
1761
1762 qproc->conn_map = syscon_node_to_regmap(args.np);
1763 of_node_put(args.np);
1764 if (IS_ERR(qproc->conn_map))
1765 return PTR_ERR(qproc->conn_map);
1766
1767 qproc->force_clk_on = args.args[0];
1768 qproc->rscc_disable = args.args[1];
1769
1770 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1771 "qcom,ext-regs",
1772 2, 1, &args);
1773 if (ret < 0) {
1774 dev_err(&pdev->dev, "failed to parse ext-regs index 1\n");
1775 return -EINVAL;
1776 }
1777
1778 qproc->axim1_clk_off = args.args[0];
1779 qproc->crypto_clk_off = args.args[1];
1780 }
1781
1782 if (qproc->has_spare_reg) {
1783 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1784 "qcom,spare-regs",
1785 1, 0, &args);
1786 if (ret < 0) {
1787 dev_err(&pdev->dev, "failed to parse spare-regs\n");
1788 return -EINVAL;
1789 }
1790
1791 qproc->conn_map = syscon_node_to_regmap(args.np);
1792 of_node_put(args.np);
1793 if (IS_ERR(qproc->conn_map))
1794 return PTR_ERR(qproc->conn_map);
1795
1796 qproc->conn_box = args.args[0];
1797 }
1798
1799 return 0;
1800}
1801
1802static int q6v5_init_clocks(struct device *dev, struct clk **clks,
1803 char **clk_names)
1804{
1805 int i;
1806
1807 if (!clk_names)
1808 return 0;
1809
1810 for (i = 0; clk_names[i]; i++) {
1811 clks[i] = devm_clk_get(dev, clk_names[i]);
1812 if (IS_ERR(clks[i]))
1813 return dev_err_probe(dev, PTR_ERR(clks[i]),
1814 "Failed to get %s clock\n",
1815 clk_names[i]);
1816 }
1817
1818 return i;
1819}
1820
1821static int q6v5_pds_attach(struct device *dev, struct device **devs,
1822 char **pd_names)
1823{
1824 size_t num_pds = 0;
1825 int ret;
1826 int i;
1827
1828 if (!pd_names)
1829 return 0;
1830
1831 while (pd_names[num_pds])
1832 num_pds++;
1833
1834 for (i = 0; i < num_pds; i++) {
1835 devs[i] = dev_pm_domain_attach_by_name(dev, pd_names[i]);
1836 if (IS_ERR_OR_NULL(devs[i])) {
1837 ret = PTR_ERR(devs[i]) ? : -ENODATA;
1838 goto unroll_attach;
1839 }
1840 }
1841
1842 return num_pds;
1843
1844unroll_attach:
1845 for (i--; i >= 0; i--)
1846 dev_pm_domain_detach(devs[i], false);
1847
1848 return ret;
1849}
1850
1851static void q6v5_pds_detach(struct q6v5 *qproc, struct device **pds,
1852 size_t pd_count)
1853{
1854 int i;
1855
1856 for (i = 0; i < pd_count; i++)
1857 dev_pm_domain_detach(pds[i], false);
1858}
1859
1860static int q6v5_init_reset(struct q6v5 *qproc)
1861{
1862 qproc->mss_restart = devm_reset_control_get_exclusive(qproc->dev,
1863 "mss_restart");
1864 if (IS_ERR(qproc->mss_restart)) {
1865 dev_err(qproc->dev, "failed to acquire mss restart\n");
1866 return PTR_ERR(qproc->mss_restart);
1867 }
1868
1869 if (qproc->has_alt_reset || qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
1870 qproc->pdc_reset = devm_reset_control_get_exclusive(qproc->dev,
1871 "pdc_reset");
1872 if (IS_ERR(qproc->pdc_reset)) {
1873 dev_err(qproc->dev, "failed to acquire pdc reset\n");
1874 return PTR_ERR(qproc->pdc_reset);
1875 }
1876 }
1877
1878 return 0;
1879}
1880
1881static int q6v5_alloc_memory_region(struct q6v5 *qproc)
1882{
1883 struct device_node *child;
1884 struct reserved_mem *rmem;
1885 struct device_node *node;
1886
1887 /*
1888 * In the absence of mba/mpss sub-child, extract the mba and mpss
1889 * reserved memory regions from device's memory-region property.
1890 */
1891 child = of_get_child_by_name(qproc->dev->of_node, "mba");
1892 if (!child) {
1893 node = of_parse_phandle(qproc->dev->of_node,
1894 "memory-region", 0);
1895 } else {
1896 node = of_parse_phandle(child, "memory-region", 0);
1897 of_node_put(child);
1898 }
1899
1900 if (!node) {
1901 dev_err(qproc->dev, "no mba memory-region specified\n");
1902 return -EINVAL;
1903 }
1904
1905 rmem = of_reserved_mem_lookup(node);
1906 of_node_put(node);
1907 if (!rmem) {
1908 dev_err(qproc->dev, "unable to resolve mba region\n");
1909 return -EINVAL;
1910 }
1911
1912 qproc->mba_phys = rmem->base;
1913 qproc->mba_size = rmem->size;
1914
1915 if (!child) {
1916 node = of_parse_phandle(qproc->dev->of_node,
1917 "memory-region", 1);
1918 } else {
1919 child = of_get_child_by_name(qproc->dev->of_node, "mpss");
1920 node = of_parse_phandle(child, "memory-region", 0);
1921 of_node_put(child);
1922 }
1923
1924 if (!node) {
1925 dev_err(qproc->dev, "no mpss memory-region specified\n");
1926 return -EINVAL;
1927 }
1928
1929 rmem = of_reserved_mem_lookup(node);
1930 of_node_put(node);
1931 if (!rmem) {
1932 dev_err(qproc->dev, "unable to resolve mpss region\n");
1933 return -EINVAL;
1934 }
1935
1936 qproc->mpss_phys = qproc->mpss_reloc = rmem->base;
1937 qproc->mpss_size = rmem->size;
1938
1939 if (!child) {
1940 node = of_parse_phandle(qproc->dev->of_node, "memory-region", 2);
1941 } else {
1942 child = of_get_child_by_name(qproc->dev->of_node, "metadata");
1943 node = of_parse_phandle(child, "memory-region", 0);
1944 of_node_put(child);
1945 }
1946
1947 if (!node)
1948 return 0;
1949
1950 rmem = of_reserved_mem_lookup(node);
1951 if (!rmem) {
1952 dev_err(qproc->dev, "unable to resolve metadata region\n");
1953 return -EINVAL;
1954 }
1955
1956 qproc->mdata_phys = rmem->base;
1957 qproc->mdata_size = rmem->size;
1958
1959 return 0;
1960}
1961
1962static int q6v5_probe(struct platform_device *pdev)
1963{
1964 const struct rproc_hexagon_res *desc;
1965 struct device_node *node;
1966 struct q6v5 *qproc;
1967 struct rproc *rproc;
1968 const char *mba_image;
1969 int ret;
1970
1971 desc = of_device_get_match_data(&pdev->dev);
1972 if (!desc)
1973 return -EINVAL;
1974
1975 if (desc->need_mem_protection && !qcom_scm_is_available())
1976 return -EPROBE_DEFER;
1977
1978 mba_image = desc->hexagon_mba_image;
1979 ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
1980 0, &mba_image);
1981 if (ret < 0 && ret != -EINVAL) {
1982 dev_err(&pdev->dev, "unable to read mba firmware-name\n");
1983 return ret;
1984 }
1985
1986 rproc = devm_rproc_alloc(&pdev->dev, pdev->name, &q6v5_ops,
1987 mba_image, sizeof(*qproc));
1988 if (!rproc) {
1989 dev_err(&pdev->dev, "failed to allocate rproc\n");
1990 return -ENOMEM;
1991 }
1992
1993 rproc->auto_boot = false;
1994 rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
1995
1996 qproc = rproc->priv;
1997 qproc->dev = &pdev->dev;
1998 qproc->rproc = rproc;
1999 qproc->hexagon_mdt_image = "modem.mdt";
2000 ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
2001 1, &qproc->hexagon_mdt_image);
2002 if (ret < 0 && ret != -EINVAL) {
2003 dev_err(&pdev->dev, "unable to read mpss firmware-name\n");
2004 return ret;
2005 }
2006
2007 platform_set_drvdata(pdev, qproc);
2008
2009 qproc->has_qaccept_regs = desc->has_qaccept_regs;
2010 qproc->has_ext_cntl_regs = desc->has_ext_cntl_regs;
2011 qproc->has_vq6 = desc->has_vq6;
2012 qproc->has_spare_reg = desc->has_spare_reg;
2013 ret = q6v5_init_mem(qproc, pdev);
2014 if (ret)
2015 return ret;
2016
2017 ret = q6v5_alloc_memory_region(qproc);
2018 if (ret)
2019 return ret;
2020
2021 ret = q6v5_init_clocks(&pdev->dev, qproc->proxy_clks,
2022 desc->proxy_clk_names);
2023 if (ret < 0)
2024 return ret;
2025 qproc->proxy_clk_count = ret;
2026
2027 ret = q6v5_init_clocks(&pdev->dev, qproc->reset_clks,
2028 desc->reset_clk_names);
2029 if (ret < 0)
2030 return ret;
2031 qproc->reset_clk_count = ret;
2032
2033 ret = q6v5_init_clocks(&pdev->dev, qproc->active_clks,
2034 desc->active_clk_names);
2035 if (ret < 0)
2036 return ret;
2037 qproc->active_clk_count = ret;
2038
2039 ret = q6v5_regulator_init(&pdev->dev, qproc->proxy_regs,
2040 desc->proxy_supply);
2041 if (ret < 0)
2042 return ret;
2043 qproc->proxy_reg_count = ret;
2044
2045 ret = q6v5_regulator_init(&pdev->dev, qproc->active_regs,
2046 desc->active_supply);
2047 if (ret < 0)
2048 return ret;
2049 qproc->active_reg_count = ret;
2050
2051 ret = q6v5_pds_attach(&pdev->dev, qproc->proxy_pds,
2052 desc->proxy_pd_names);
2053 /* Fallback to regulators for old device trees */
2054 if (ret == -ENODATA && desc->fallback_proxy_supply) {
2055 ret = q6v5_regulator_init(&pdev->dev,
2056 qproc->fallback_proxy_regs,
2057 desc->fallback_proxy_supply);
2058 if (ret < 0)
2059 return ret;
2060 qproc->fallback_proxy_reg_count = ret;
2061 } else if (ret < 0) {
2062 dev_err(&pdev->dev, "Failed to init power domains\n");
2063 return ret;
2064 } else {
2065 qproc->proxy_pd_count = ret;
2066 }
2067
2068 qproc->has_alt_reset = desc->has_alt_reset;
2069 ret = q6v5_init_reset(qproc);
2070 if (ret)
2071 goto detach_proxy_pds;
2072
2073 qproc->version = desc->version;
2074 qproc->need_mem_protection = desc->need_mem_protection;
2075 qproc->has_mba_logs = desc->has_mba_logs;
2076
2077 ret = qcom_q6v5_init(&qproc->q6v5, pdev, rproc, MPSS_CRASH_REASON_SMEM, "modem",
2078 qcom_msa_handover);
2079 if (ret)
2080 goto detach_proxy_pds;
2081
2082 qproc->mpss_perm = BIT(QCOM_SCM_VMID_HLOS);
2083 qproc->mba_perm = BIT(QCOM_SCM_VMID_HLOS);
2084 qcom_add_glink_subdev(rproc, &qproc->glink_subdev, "mpss");
2085 qcom_add_smd_subdev(rproc, &qproc->smd_subdev);
2086 qcom_add_pdm_subdev(rproc, &qproc->pdm_subdev);
2087 qcom_add_ssr_subdev(rproc, &qproc->ssr_subdev, "mpss");
2088 qproc->sysmon = qcom_add_sysmon_subdev(rproc, "modem", 0x12);
2089 if (IS_ERR(qproc->sysmon)) {
2090 ret = PTR_ERR(qproc->sysmon);
2091 goto remove_subdevs;
2092 }
2093
2094 ret = rproc_add(rproc);
2095 if (ret)
2096 goto remove_sysmon_subdev;
2097
2098 node = of_get_compatible_child(pdev->dev.of_node, "qcom,bam-dmux");
2099 qproc->bam_dmux = of_platform_device_create(node, NULL, &pdev->dev);
2100 of_node_put(node);
2101
2102 return 0;
2103
2104remove_sysmon_subdev:
2105 qcom_remove_sysmon_subdev(qproc->sysmon);
2106remove_subdevs:
2107 qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2108 qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2109 qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2110detach_proxy_pds:
2111 q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2112
2113 return ret;
2114}
2115
2116static void q6v5_remove(struct platform_device *pdev)
2117{
2118 struct q6v5 *qproc = platform_get_drvdata(pdev);
2119 struct rproc *rproc = qproc->rproc;
2120
2121 if (qproc->bam_dmux)
2122 of_platform_device_destroy(&qproc->bam_dmux->dev, NULL);
2123 rproc_del(rproc);
2124
2125 qcom_q6v5_deinit(&qproc->q6v5);
2126 qcom_remove_sysmon_subdev(qproc->sysmon);
2127 qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2128 qcom_remove_pdm_subdev(rproc, &qproc->pdm_subdev);
2129 qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2130 qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2131
2132 q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2133}
2134
2135static const struct rproc_hexagon_res sc7180_mss = {
2136 .hexagon_mba_image = "mba.mbn",
2137 .proxy_clk_names = (char*[]){
2138 "xo",
2139 NULL
2140 },
2141 .reset_clk_names = (char*[]){
2142 "iface",
2143 "bus",
2144 "snoc_axi",
2145 NULL
2146 },
2147 .active_clk_names = (char*[]){
2148 "mnoc_axi",
2149 "nav",
2150 NULL
2151 },
2152 .proxy_pd_names = (char*[]){
2153 "cx",
2154 "mx",
2155 "mss",
2156 NULL
2157 },
2158 .need_mem_protection = true,
2159 .has_alt_reset = false,
2160 .has_mba_logs = true,
2161 .has_spare_reg = true,
2162 .has_qaccept_regs = false,
2163 .has_ext_cntl_regs = false,
2164 .has_vq6 = false,
2165 .version = MSS_SC7180,
2166};
2167
2168static const struct rproc_hexagon_res sc7280_mss = {
2169 .hexagon_mba_image = "mba.mbn",
2170 .proxy_clk_names = (char*[]){
2171 "xo",
2172 "pka",
2173 NULL
2174 },
2175 .active_clk_names = (char*[]){
2176 "iface",
2177 "offline",
2178 "snoc_axi",
2179 NULL
2180 },
2181 .proxy_pd_names = (char*[]){
2182 "cx",
2183 "mss",
2184 NULL
2185 },
2186 .need_mem_protection = true,
2187 .has_alt_reset = false,
2188 .has_mba_logs = true,
2189 .has_spare_reg = false,
2190 .has_qaccept_regs = true,
2191 .has_ext_cntl_regs = true,
2192 .has_vq6 = true,
2193 .version = MSS_SC7280,
2194};
2195
2196static const struct rproc_hexagon_res sdm660_mss = {
2197 .hexagon_mba_image = "mba.mbn",
2198 .proxy_clk_names = (char*[]){
2199 "xo",
2200 "qdss",
2201 "mem",
2202 NULL
2203 },
2204 .active_clk_names = (char*[]){
2205 "iface",
2206 "bus",
2207 "gpll0_mss",
2208 "mnoc_axi",
2209 "snoc_axi",
2210 NULL
2211 },
2212 .proxy_pd_names = (char*[]){
2213 "cx",
2214 "mx",
2215 NULL
2216 },
2217 .need_mem_protection = true,
2218 .has_alt_reset = false,
2219 .has_mba_logs = false,
2220 .has_spare_reg = false,
2221 .has_qaccept_regs = false,
2222 .has_ext_cntl_regs = false,
2223 .has_vq6 = false,
2224 .version = MSS_SDM660,
2225};
2226
2227static const struct rproc_hexagon_res sdm845_mss = {
2228 .hexagon_mba_image = "mba.mbn",
2229 .proxy_clk_names = (char*[]){
2230 "xo",
2231 "prng",
2232 NULL
2233 },
2234 .reset_clk_names = (char*[]){
2235 "iface",
2236 "snoc_axi",
2237 NULL
2238 },
2239 .active_clk_names = (char*[]){
2240 "bus",
2241 "mem",
2242 "gpll0_mss",
2243 "mnoc_axi",
2244 NULL
2245 },
2246 .proxy_pd_names = (char*[]){
2247 "cx",
2248 "mx",
2249 "mss",
2250 NULL
2251 },
2252 .need_mem_protection = true,
2253 .has_alt_reset = true,
2254 .has_mba_logs = false,
2255 .has_spare_reg = false,
2256 .has_qaccept_regs = false,
2257 .has_ext_cntl_regs = false,
2258 .has_vq6 = false,
2259 .version = MSS_SDM845,
2260};
2261
2262static const struct rproc_hexagon_res msm8998_mss = {
2263 .hexagon_mba_image = "mba.mbn",
2264 .proxy_clk_names = (char*[]){
2265 "xo",
2266 "qdss",
2267 "mem",
2268 NULL
2269 },
2270 .active_clk_names = (char*[]){
2271 "iface",
2272 "bus",
2273 "gpll0_mss",
2274 "mnoc_axi",
2275 "snoc_axi",
2276 NULL
2277 },
2278 .proxy_pd_names = (char*[]){
2279 "cx",
2280 "mx",
2281 NULL
2282 },
2283 .need_mem_protection = true,
2284 .has_alt_reset = false,
2285 .has_mba_logs = false,
2286 .has_spare_reg = false,
2287 .has_qaccept_regs = false,
2288 .has_ext_cntl_regs = false,
2289 .has_vq6 = false,
2290 .version = MSS_MSM8998,
2291};
2292
2293static const struct rproc_hexagon_res msm8996_mss = {
2294 .hexagon_mba_image = "mba.mbn",
2295 .proxy_supply = (struct qcom_mss_reg_res[]) {
2296 {
2297 .supply = "pll",
2298 .uA = 100000,
2299 },
2300 {}
2301 },
2302 .proxy_clk_names = (char*[]){
2303 "xo",
2304 "qdss",
2305 NULL
2306 },
2307 .active_clk_names = (char*[]){
2308 "iface",
2309 "bus",
2310 "mem",
2311 "gpll0_mss",
2312 "snoc_axi",
2313 "mnoc_axi",
2314 NULL
2315 },
2316 .proxy_pd_names = (char*[]){
2317 "mx",
2318 "cx",
2319 NULL
2320 },
2321 .need_mem_protection = true,
2322 .has_alt_reset = false,
2323 .has_mba_logs = false,
2324 .has_spare_reg = false,
2325 .has_qaccept_regs = false,
2326 .has_ext_cntl_regs = false,
2327 .has_vq6 = false,
2328 .version = MSS_MSM8996,
2329};
2330
2331static const struct rproc_hexagon_res msm8909_mss = {
2332 .hexagon_mba_image = "mba.mbn",
2333 .proxy_supply = (struct qcom_mss_reg_res[]) {
2334 {
2335 .supply = "pll",
2336 .uA = 100000,
2337 },
2338 {}
2339 },
2340 .proxy_clk_names = (char*[]){
2341 "xo",
2342 NULL
2343 },
2344 .active_clk_names = (char*[]){
2345 "iface",
2346 "bus",
2347 "mem",
2348 NULL
2349 },
2350 .proxy_pd_names = (char*[]){
2351 "mx",
2352 "cx",
2353 NULL
2354 },
2355 .need_mem_protection = false,
2356 .has_alt_reset = false,
2357 .has_mba_logs = false,
2358 .has_spare_reg = false,
2359 .has_qaccept_regs = false,
2360 .has_ext_cntl_regs = false,
2361 .has_vq6 = false,
2362 .version = MSS_MSM8909,
2363};
2364
2365static const struct rproc_hexagon_res msm8916_mss = {
2366 .hexagon_mba_image = "mba.mbn",
2367 .proxy_supply = (struct qcom_mss_reg_res[]) {
2368 {
2369 .supply = "pll",
2370 .uA = 100000,
2371 },
2372 {}
2373 },
2374 .fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2375 {
2376 .supply = "mx",
2377 .uV = 1050000,
2378 },
2379 {
2380 .supply = "cx",
2381 .uA = 100000,
2382 },
2383 {}
2384 },
2385 .proxy_clk_names = (char*[]){
2386 "xo",
2387 NULL
2388 },
2389 .active_clk_names = (char*[]){
2390 "iface",
2391 "bus",
2392 "mem",
2393 NULL
2394 },
2395 .proxy_pd_names = (char*[]){
2396 "mx",
2397 "cx",
2398 NULL
2399 },
2400 .need_mem_protection = false,
2401 .has_alt_reset = false,
2402 .has_mba_logs = false,
2403 .has_spare_reg = false,
2404 .has_qaccept_regs = false,
2405 .has_ext_cntl_regs = false,
2406 .has_vq6 = false,
2407 .version = MSS_MSM8916,
2408};
2409
2410static const struct rproc_hexagon_res msm8953_mss = {
2411 .hexagon_mba_image = "mba.mbn",
2412 .proxy_supply = (struct qcom_mss_reg_res[]) {
2413 {
2414 .supply = "pll",
2415 .uA = 100000,
2416 },
2417 {}
2418 },
2419 .proxy_clk_names = (char*[]){
2420 "xo",
2421 NULL
2422 },
2423 .active_clk_names = (char*[]){
2424 "iface",
2425 "bus",
2426 "mem",
2427 NULL
2428 },
2429 .proxy_pd_names = (char*[]) {
2430 "cx",
2431 "mx",
2432 "mss",
2433 NULL
2434 },
2435 .need_mem_protection = false,
2436 .has_alt_reset = false,
2437 .has_mba_logs = false,
2438 .has_spare_reg = false,
2439 .has_qaccept_regs = false,
2440 .has_ext_cntl_regs = false,
2441 .has_vq6 = false,
2442 .version = MSS_MSM8953,
2443};
2444
2445static const struct rproc_hexagon_res msm8974_mss = {
2446 .hexagon_mba_image = "mba.b00",
2447 .proxy_supply = (struct qcom_mss_reg_res[]) {
2448 {
2449 .supply = "pll",
2450 .uA = 100000,
2451 },
2452 {}
2453 },
2454 .fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2455 {
2456 .supply = "mx",
2457 .uV = 1050000,
2458 },
2459 {
2460 .supply = "cx",
2461 .uA = 100000,
2462 },
2463 {}
2464 },
2465 .active_supply = (struct qcom_mss_reg_res[]) {
2466 {
2467 .supply = "mss",
2468 .uV = 1050000,
2469 .uA = 100000,
2470 },
2471 {}
2472 },
2473 .proxy_clk_names = (char*[]){
2474 "xo",
2475 NULL
2476 },
2477 .active_clk_names = (char*[]){
2478 "iface",
2479 "bus",
2480 "mem",
2481 NULL
2482 },
2483 .proxy_pd_names = (char*[]){
2484 "mx",
2485 "cx",
2486 NULL
2487 },
2488 .need_mem_protection = false,
2489 .has_alt_reset = false,
2490 .has_mba_logs = false,
2491 .has_spare_reg = false,
2492 .has_qaccept_regs = false,
2493 .has_ext_cntl_regs = false,
2494 .has_vq6 = false,
2495 .version = MSS_MSM8974,
2496};
2497
2498static const struct of_device_id q6v5_of_match[] = {
2499 { .compatible = "qcom,q6v5-pil", .data = &msm8916_mss},
2500 { .compatible = "qcom,msm8909-mss-pil", .data = &msm8909_mss},
2501 { .compatible = "qcom,msm8916-mss-pil", .data = &msm8916_mss},
2502 { .compatible = "qcom,msm8953-mss-pil", .data = &msm8953_mss},
2503 { .compatible = "qcom,msm8974-mss-pil", .data = &msm8974_mss},
2504 { .compatible = "qcom,msm8996-mss-pil", .data = &msm8996_mss},
2505 { .compatible = "qcom,msm8998-mss-pil", .data = &msm8998_mss},
2506 { .compatible = "qcom,sc7180-mss-pil", .data = &sc7180_mss},
2507 { .compatible = "qcom,sc7280-mss-pil", .data = &sc7280_mss},
2508 { .compatible = "qcom,sdm660-mss-pil", .data = &sdm660_mss},
2509 { .compatible = "qcom,sdm845-mss-pil", .data = &sdm845_mss},
2510 { },
2511};
2512MODULE_DEVICE_TABLE(of, q6v5_of_match);
2513
2514static struct platform_driver q6v5_driver = {
2515 .probe = q6v5_probe,
2516 .remove = q6v5_remove,
2517 .driver = {
2518 .name = "qcom-q6v5-mss",
2519 .of_match_table = q6v5_of_match,
2520 },
2521};
2522module_platform_driver(q6v5_driver);
2523
2524MODULE_DESCRIPTION("Qualcomm Self-authenticating modem remoteproc driver");
2525MODULE_LICENSE("GPL v2");