1 // SPDX-License-Identifier: GPL-2.0-only
3 * Qualcomm self-authenticating modem subsystem remoteproc driver
5 * Copyright (C) 2016 Linaro Ltd.
6 * Copyright (C) 2014 Sony Mobile Communications AB
7 * Copyright (c) 2012-2013, The Linux Foundation. All rights reserved.
10 #include <linux/clk.h>
11 #include <linux/delay.h>
12 #include <linux/devcoredump.h>
13 #include <linux/dma-mapping.h>
14 #include <linux/interrupt.h>
15 #include <linux/kernel.h>
16 #include <linux/mfd/syscon.h>
17 #include <linux/module.h>
18 #include <linux/of_address.h>
19 #include <linux/of_device.h>
20 #include <linux/platform_device.h>
21 #include <linux/pm_domain.h>
22 #include <linux/pm_runtime.h>
23 #include <linux/regmap.h>
24 #include <linux/regulator/consumer.h>
25 #include <linux/remoteproc.h>
26 #include <linux/reset.h>
27 #include <linux/soc/qcom/mdt_loader.h>
28 #include <linux/iopoll.h>
29 #include <linux/slab.h>
31 #include "remoteproc_internal.h"
32 #include "qcom_common.h"
33 #include "qcom_pil_info.h"
34 #include "qcom_q6v5.h"
36 #include <linux/qcom_scm.h>
38 #define MPSS_CRASH_REASON_SMEM 421
40 #define MBA_LOG_SIZE SZ_4K
42 /* RMB Status Register Values */
43 #define RMB_PBL_SUCCESS 0x1
45 #define RMB_MBA_XPU_UNLOCKED 0x1
46 #define RMB_MBA_XPU_UNLOCKED_SCRIBBLED 0x2
47 #define RMB_MBA_META_DATA_AUTH_SUCCESS 0x3
48 #define RMB_MBA_AUTH_COMPLETE 0x4
50 /* PBL/MBA interface registers */
51 #define RMB_MBA_IMAGE_REG 0x00
52 #define RMB_PBL_STATUS_REG 0x04
53 #define RMB_MBA_COMMAND_REG 0x08
54 #define RMB_MBA_STATUS_REG 0x0C
55 #define RMB_PMI_META_DATA_REG 0x10
56 #define RMB_PMI_CODE_START_REG 0x14
57 #define RMB_PMI_CODE_LENGTH_REG 0x18
58 #define RMB_MBA_MSS_STATUS 0x40
59 #define RMB_MBA_ALT_RESET 0x44
61 #define RMB_CMD_META_DATA_READY 0x1
62 #define RMB_CMD_LOAD_READY 0x2
64 /* QDSP6SS Register Offsets */
65 #define QDSP6SS_RESET_REG 0x014
66 #define QDSP6SS_GFMUX_CTL_REG 0x020
67 #define QDSP6SS_PWR_CTL_REG 0x030
68 #define QDSP6SS_MEM_PWR_CTL 0x0B0
69 #define QDSP6V6SS_MEM_PWR_CTL 0x034
70 #define QDSP6SS_STRAP_ACC 0x110
72 /* AXI Halt Register Offsets */
73 #define AXI_HALTREQ_REG 0x0
74 #define AXI_HALTACK_REG 0x4
75 #define AXI_IDLE_REG 0x8
76 #define AXI_GATING_VALID_OVERRIDE BIT(0)
78 #define HALT_ACK_TIMEOUT_US 100000
80 /* QACCEPT Register Offsets */
81 #define QACCEPT_ACCEPT_REG 0x0
82 #define QACCEPT_ACTIVE_REG 0x4
83 #define QACCEPT_DENY_REG 0x8
84 #define QACCEPT_REQ_REG 0xC
86 #define QACCEPT_TIMEOUT_US 50
89 #define Q6SS_STOP_CORE BIT(0)
90 #define Q6SS_CORE_ARES BIT(1)
91 #define Q6SS_BUS_ARES_ENABLE BIT(2)
94 #define Q6SS_CBCR_CLKEN BIT(0)
95 #define Q6SS_CBCR_CLKOFF BIT(31)
96 #define Q6SS_CBCR_TIMEOUT_US 200
98 /* QDSP6SS_GFMUX_CTL */
99 #define Q6SS_CLK_ENABLE BIT(1)
101 /* QDSP6SS_PWR_CTL */
102 #define Q6SS_L2DATA_SLP_NRET_N_0 BIT(0)
103 #define Q6SS_L2DATA_SLP_NRET_N_1 BIT(1)
104 #define Q6SS_L2DATA_SLP_NRET_N_2 BIT(2)
105 #define Q6SS_L2TAG_SLP_NRET_N BIT(16)
106 #define Q6SS_ETB_SLP_NRET_N BIT(17)
107 #define Q6SS_L2DATA_STBY_N BIT(18)
108 #define Q6SS_SLP_RET_N BIT(19)
109 #define Q6SS_CLAMP_IO BIT(20)
110 #define QDSS_BHS_ON BIT(21)
111 #define QDSS_LDO_BYP BIT(22)
113 /* QDSP6v56 parameters */
114 #define QDSP6v56_LDO_BYP BIT(25)
115 #define QDSP6v56_BHS_ON BIT(24)
116 #define QDSP6v56_CLAMP_WL BIT(21)
117 #define QDSP6v56_CLAMP_QMC_MEM BIT(22)
118 #define QDSP6SS_XO_CBCR 0x0038
119 #define QDSP6SS_ACC_OVERRIDE_VAL 0x20
121 /* QDSP6v65 parameters */
122 #define QDSP6SS_CORE_CBCR 0x20
123 #define QDSP6SS_SLEEP 0x3C
124 #define QDSP6SS_BOOT_CORE_START 0x400
125 #define QDSP6SS_BOOT_CMD 0x404
126 #define BOOT_FSM_TIMEOUT 10000
129 struct regulator *reg;
134 struct qcom_mss_reg_res {
140 struct rproc_hexagon_res {
141 const char *hexagon_mba_image;
142 struct qcom_mss_reg_res *proxy_supply;
143 struct qcom_mss_reg_res *fallback_proxy_supply;
144 struct qcom_mss_reg_res *active_supply;
145 char **proxy_clk_names;
146 char **reset_clk_names;
147 char **active_clk_names;
148 char **proxy_pd_names;
150 bool need_mem_protection;
154 bool has_qaccept_regs;
155 bool has_ext_cntl_regs;
163 void __iomem *reg_base;
164 void __iomem *rmb_base;
166 struct regmap *halt_map;
167 struct regmap *conn_map;
184 struct reset_control *mss_restart;
185 struct reset_control *pdc_reset;
187 struct qcom_q6v5 q6v5;
189 struct clk *active_clks[8];
190 struct clk *reset_clks[4];
191 struct clk *proxy_clks[4];
192 struct device *proxy_pds[3];
193 int active_clk_count;
198 struct reg_info active_regs[1];
199 struct reg_info proxy_regs[1];
200 struct reg_info fallback_proxy_regs[2];
201 int active_reg_count;
203 int fallback_proxy_reg_count;
205 bool dump_mba_loaded;
206 size_t current_dump_size;
207 size_t total_dump_size;
209 phys_addr_t mba_phys;
213 phys_addr_t mpss_phys;
214 phys_addr_t mpss_reloc;
217 struct qcom_rproc_glink glink_subdev;
218 struct qcom_rproc_subdev smd_subdev;
219 struct qcom_rproc_ssr ssr_subdev;
220 struct qcom_sysmon *sysmon;
221 struct platform_device *bam_dmux;
222 bool need_mem_protection;
226 bool has_qaccept_regs;
227 bool has_ext_cntl_regs;
231 const char *hexagon_mdt_image;
245 static int q6v5_regulator_init(struct device *dev, struct reg_info *regs,
246 const struct qcom_mss_reg_res *reg_res)
254 for (i = 0; reg_res[i].supply; i++) {
255 regs[i].reg = devm_regulator_get(dev, reg_res[i].supply);
256 if (IS_ERR(regs[i].reg)) {
257 rc = PTR_ERR(regs[i].reg);
258 if (rc != -EPROBE_DEFER)
259 dev_err(dev, "Failed to get %s\n regulator",
264 regs[i].uV = reg_res[i].uV;
265 regs[i].uA = reg_res[i].uA;
271 static int q6v5_regulator_enable(struct q6v5 *qproc,
272 struct reg_info *regs, int count)
277 for (i = 0; i < count; i++) {
278 if (regs[i].uV > 0) {
279 ret = regulator_set_voltage(regs[i].reg,
280 regs[i].uV, INT_MAX);
283 "Failed to request voltage for %d.\n",
289 if (regs[i].uA > 0) {
290 ret = regulator_set_load(regs[i].reg,
294 "Failed to set regulator mode\n");
299 ret = regulator_enable(regs[i].reg);
301 dev_err(qproc->dev, "Regulator enable failed\n");
308 for (; i >= 0; i--) {
310 regulator_set_voltage(regs[i].reg, 0, INT_MAX);
313 regulator_set_load(regs[i].reg, 0);
315 regulator_disable(regs[i].reg);
321 static void q6v5_regulator_disable(struct q6v5 *qproc,
322 struct reg_info *regs, int count)
326 for (i = 0; i < count; i++) {
328 regulator_set_voltage(regs[i].reg, 0, INT_MAX);
331 regulator_set_load(regs[i].reg, 0);
333 regulator_disable(regs[i].reg);
337 static int q6v5_clk_enable(struct device *dev,
338 struct clk **clks, int count)
343 for (i = 0; i < count; i++) {
344 rc = clk_prepare_enable(clks[i]);
346 dev_err(dev, "Clock enable failed\n");
353 for (i--; i >= 0; i--)
354 clk_disable_unprepare(clks[i]);
359 static void q6v5_clk_disable(struct device *dev,
360 struct clk **clks, int count)
364 for (i = 0; i < count; i++)
365 clk_disable_unprepare(clks[i]);
368 static int q6v5_pds_enable(struct q6v5 *qproc, struct device **pds,
374 for (i = 0; i < pd_count; i++) {
375 dev_pm_genpd_set_performance_state(pds[i], INT_MAX);
376 ret = pm_runtime_get_sync(pds[i]);
378 pm_runtime_put_noidle(pds[i]);
379 dev_pm_genpd_set_performance_state(pds[i], 0);
380 goto unroll_pd_votes;
387 for (i--; i >= 0; i--) {
388 dev_pm_genpd_set_performance_state(pds[i], 0);
389 pm_runtime_put(pds[i]);
395 static void q6v5_pds_disable(struct q6v5 *qproc, struct device **pds,
400 for (i = 0; i < pd_count; i++) {
401 dev_pm_genpd_set_performance_state(pds[i], 0);
402 pm_runtime_put(pds[i]);
406 static int q6v5_xfer_mem_ownership(struct q6v5 *qproc, int *current_perm,
407 bool local, bool remote, phys_addr_t addr,
410 struct qcom_scm_vmperm next[2];
413 if (!qproc->need_mem_protection)
416 if (local == !!(*current_perm & BIT(QCOM_SCM_VMID_HLOS)) &&
417 remote == !!(*current_perm & BIT(QCOM_SCM_VMID_MSS_MSA)))
421 next[perms].vmid = QCOM_SCM_VMID_HLOS;
422 next[perms].perm = QCOM_SCM_PERM_RWX;
427 next[perms].vmid = QCOM_SCM_VMID_MSS_MSA;
428 next[perms].perm = QCOM_SCM_PERM_RW;
432 return qcom_scm_assign_mem(addr, ALIGN(size, SZ_4K),
433 current_perm, next, perms);
436 static void q6v5_debug_policy_load(struct q6v5 *qproc, void *mba_region)
438 const struct firmware *dp_fw;
440 if (request_firmware_direct(&dp_fw, "msadp", qproc->dev))
443 if (SZ_1M + dp_fw->size <= qproc->mba_size) {
444 memcpy(mba_region + SZ_1M, dp_fw->data, dp_fw->size);
445 qproc->dp_size = dp_fw->size;
448 release_firmware(dp_fw);
451 static int q6v5_load(struct rproc *rproc, const struct firmware *fw)
453 struct q6v5 *qproc = rproc->priv;
456 /* MBA is restricted to a maximum size of 1M */
457 if (fw->size > qproc->mba_size || fw->size > SZ_1M) {
458 dev_err(qproc->dev, "MBA firmware load failed\n");
462 mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
464 dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
465 &qproc->mba_phys, qproc->mba_size);
469 memcpy(mba_region, fw->data, fw->size);
470 q6v5_debug_policy_load(qproc, mba_region);
471 memunmap(mba_region);
476 static int q6v5_reset_assert(struct q6v5 *qproc)
480 if (qproc->has_alt_reset) {
481 reset_control_assert(qproc->pdc_reset);
482 ret = reset_control_reset(qproc->mss_restart);
483 reset_control_deassert(qproc->pdc_reset);
484 } else if (qproc->has_spare_reg) {
486 * When the AXI pipeline is being reset with the Q6 modem partly
487 * operational there is possibility of AXI valid signal to
488 * glitch, leading to spurious transactions and Q6 hangs. A work
489 * around is employed by asserting the AXI_GATING_VALID_OVERRIDE
490 * BIT before triggering Q6 MSS reset. AXI_GATING_VALID_OVERRIDE
491 * is withdrawn post MSS assert followed by a MSS deassert,
492 * while holding the PDC reset.
494 reset_control_assert(qproc->pdc_reset);
495 regmap_update_bits(qproc->conn_map, qproc->conn_box,
496 AXI_GATING_VALID_OVERRIDE, 1);
497 reset_control_assert(qproc->mss_restart);
498 reset_control_deassert(qproc->pdc_reset);
499 regmap_update_bits(qproc->conn_map, qproc->conn_box,
500 AXI_GATING_VALID_OVERRIDE, 0);
501 ret = reset_control_deassert(qproc->mss_restart);
502 } else if (qproc->has_ext_cntl_regs) {
503 regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
504 reset_control_assert(qproc->pdc_reset);
505 reset_control_assert(qproc->mss_restart);
506 reset_control_deassert(qproc->pdc_reset);
507 ret = reset_control_deassert(qproc->mss_restart);
509 ret = reset_control_assert(qproc->mss_restart);
515 static int q6v5_reset_deassert(struct q6v5 *qproc)
519 if (qproc->has_alt_reset) {
520 reset_control_assert(qproc->pdc_reset);
521 writel(1, qproc->rmb_base + RMB_MBA_ALT_RESET);
522 ret = reset_control_reset(qproc->mss_restart);
523 writel(0, qproc->rmb_base + RMB_MBA_ALT_RESET);
524 reset_control_deassert(qproc->pdc_reset);
525 } else if (qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
526 ret = reset_control_reset(qproc->mss_restart);
528 ret = reset_control_deassert(qproc->mss_restart);
534 static int q6v5_rmb_pbl_wait(struct q6v5 *qproc, int ms)
536 unsigned long timeout;
539 timeout = jiffies + msecs_to_jiffies(ms);
541 val = readl(qproc->rmb_base + RMB_PBL_STATUS_REG);
545 if (time_after(jiffies, timeout))
554 static int q6v5_rmb_mba_wait(struct q6v5 *qproc, u32 status, int ms)
557 unsigned long timeout;
560 timeout = jiffies + msecs_to_jiffies(ms);
562 val = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
568 else if (status && val == status)
571 if (time_after(jiffies, timeout))
580 static void q6v5_dump_mba_logs(struct q6v5 *qproc)
582 struct rproc *rproc = qproc->rproc;
586 if (!qproc->has_mba_logs)
589 if (q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false, qproc->mba_phys,
593 mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
597 data = vmalloc(MBA_LOG_SIZE);
599 memcpy(data, mba_region, MBA_LOG_SIZE);
600 dev_coredumpv(&rproc->dev, data, MBA_LOG_SIZE, GFP_KERNEL);
602 memunmap(mba_region);
605 static int q6v5proc_reset(struct q6v5 *qproc)
611 if (qproc->version == MSS_SDM845) {
612 val = readl(qproc->reg_base + QDSP6SS_SLEEP);
613 val |= Q6SS_CBCR_CLKEN;
614 writel(val, qproc->reg_base + QDSP6SS_SLEEP);
616 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
617 val, !(val & Q6SS_CBCR_CLKOFF), 1,
618 Q6SS_CBCR_TIMEOUT_US);
620 dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
624 /* De-assert QDSP6 stop core */
625 writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
626 /* Trigger boot FSM */
627 writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
629 ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
630 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
632 dev_err(qproc->dev, "Boot FSM failed to complete.\n");
633 /* Reset the modem so that boot FSM is in reset state */
634 q6v5_reset_deassert(qproc);
639 } else if (qproc->version == MSS_SC7180 || qproc->version == MSS_SC7280) {
640 val = readl(qproc->reg_base + QDSP6SS_SLEEP);
641 val |= Q6SS_CBCR_CLKEN;
642 writel(val, qproc->reg_base + QDSP6SS_SLEEP);
644 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
645 val, !(val & Q6SS_CBCR_CLKOFF), 1,
646 Q6SS_CBCR_TIMEOUT_US);
648 dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
652 /* Turn on the XO clock needed for PLL setup */
653 val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
654 val |= Q6SS_CBCR_CLKEN;
655 writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
657 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
658 val, !(val & Q6SS_CBCR_CLKOFF), 1,
659 Q6SS_CBCR_TIMEOUT_US);
661 dev_err(qproc->dev, "QDSP6SS XO clock timed out\n");
665 /* Configure Q6 core CBCR to auto-enable after reset sequence */
666 val = readl(qproc->reg_base + QDSP6SS_CORE_CBCR);
667 val |= Q6SS_CBCR_CLKEN;
668 writel(val, qproc->reg_base + QDSP6SS_CORE_CBCR);
670 /* De-assert the Q6 stop core signal */
671 writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
673 /* Wait for 10 us for any staggering logic to settle */
674 usleep_range(10, 20);
676 /* Trigger the boot FSM to start the Q6 out-of-reset sequence */
677 writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
679 /* Poll the MSS_STATUS for FSM completion */
680 ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
681 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
683 dev_err(qproc->dev, "Boot FSM failed to complete.\n");
684 /* Reset the modem so that boot FSM is in reset state */
685 q6v5_reset_deassert(qproc);
689 } else if (qproc->version == MSS_MSM8996 ||
690 qproc->version == MSS_MSM8998) {
693 /* Override the ACC value if required */
694 writel(QDSP6SS_ACC_OVERRIDE_VAL,
695 qproc->reg_base + QDSP6SS_STRAP_ACC);
697 /* Assert resets, stop core */
698 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
699 val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
700 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
702 /* BHS require xo cbcr to be enabled */
703 val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
704 val |= Q6SS_CBCR_CLKEN;
705 writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
707 /* Read CLKOFF bit to go low indicating CLK is enabled */
708 ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
709 val, !(val & Q6SS_CBCR_CLKOFF), 1,
710 Q6SS_CBCR_TIMEOUT_US);
713 "xo cbcr enabling timed out (rc:%d)\n", ret);
716 /* Enable power block headswitch and wait for it to stabilize */
717 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
718 val |= QDSP6v56_BHS_ON;
719 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
720 val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
723 /* Put LDO in bypass mode */
724 val |= QDSP6v56_LDO_BYP;
725 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
727 /* Deassert QDSP6 compiler memory clamp */
728 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
729 val &= ~QDSP6v56_CLAMP_QMC_MEM;
730 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
732 /* Deassert memory peripheral sleep and L2 memory standby */
733 val |= Q6SS_L2DATA_STBY_N | Q6SS_SLP_RET_N;
734 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
736 /* Turn on L1, L2, ETB and JU memories 1 at a time */
737 if (qproc->version == MSS_MSM8996) {
738 mem_pwr_ctl = QDSP6SS_MEM_PWR_CTL;
742 mem_pwr_ctl = QDSP6V6SS_MEM_PWR_CTL;
745 val = readl(qproc->reg_base + mem_pwr_ctl);
746 for (; i >= 0; i--) {
748 writel(val, qproc->reg_base + mem_pwr_ctl);
750 * Read back value to ensure the write is done then
751 * wait for 1us for both memory peripheral and data
754 val |= readl(qproc->reg_base + mem_pwr_ctl);
757 /* Remove word line clamp */
758 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
759 val &= ~QDSP6v56_CLAMP_WL;
760 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
762 /* Assert resets, stop core */
763 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
764 val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
765 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
767 /* Enable power block headswitch and wait for it to stabilize */
768 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
769 val |= QDSS_BHS_ON | QDSS_LDO_BYP;
770 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
771 val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
774 * Turn on memories. L2 banks should be done individually
775 * to minimize inrush current.
777 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
778 val |= Q6SS_SLP_RET_N | Q6SS_L2TAG_SLP_NRET_N |
779 Q6SS_ETB_SLP_NRET_N | Q6SS_L2DATA_STBY_N;
780 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
781 val |= Q6SS_L2DATA_SLP_NRET_N_2;
782 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
783 val |= Q6SS_L2DATA_SLP_NRET_N_1;
784 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
785 val |= Q6SS_L2DATA_SLP_NRET_N_0;
786 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
788 /* Remove IO clamp */
789 val &= ~Q6SS_CLAMP_IO;
790 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
792 /* Bring core out of reset */
793 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
794 val &= ~Q6SS_CORE_ARES;
795 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
797 /* Turn on core clock */
798 val = readl(qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
799 val |= Q6SS_CLK_ENABLE;
800 writel(val, qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
802 /* Start core execution */
803 val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
804 val &= ~Q6SS_STOP_CORE;
805 writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
808 /* Wait for PBL status */
809 ret = q6v5_rmb_pbl_wait(qproc, 1000);
810 if (ret == -ETIMEDOUT) {
811 dev_err(qproc->dev, "PBL boot timed out\n");
812 } else if (ret != RMB_PBL_SUCCESS) {
813 dev_err(qproc->dev, "PBL returned unexpected status %d\n", ret);
822 static int q6v5proc_enable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
827 if (!qproc->has_qaccept_regs)
830 if (qproc->has_ext_cntl_regs) {
831 regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
832 regmap_write(qproc->conn_map, qproc->force_clk_on, 1);
834 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
835 !val, 1, Q6SS_CBCR_TIMEOUT_US);
837 dev_err(qproc->dev, "failed to enable axim1 clock\n");
842 regmap_write(map, offset + QACCEPT_REQ_REG, 1);
844 /* Wait for accept */
845 ret = regmap_read_poll_timeout(map, offset + QACCEPT_ACCEPT_REG, val, val, 5,
848 dev_err(qproc->dev, "qchannel enable failed\n");
855 static void q6v5proc_disable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
858 unsigned int val, retry;
859 unsigned int nretry = 10;
860 bool takedown_complete = false;
862 if (!qproc->has_qaccept_regs)
865 while (!takedown_complete && nretry) {
868 /* Wait for active transactions to complete */
869 regmap_read_poll_timeout(map, offset + QACCEPT_ACTIVE_REG, val, !val, 5,
872 /* Request Q-channel transaction takedown */
873 regmap_write(map, offset + QACCEPT_REQ_REG, 0);
876 * If the request is denied, reset the Q-channel takedown request,
877 * wait for active transactions to complete and retry takedown.
883 ret = regmap_read(map, offset + QACCEPT_DENY_REG, &val);
885 regmap_write(map, offset + QACCEPT_REQ_REG, 1);
889 ret = regmap_read(map, offset + QACCEPT_ACCEPT_REG, &val);
891 takedown_complete = true;
900 /* Rely on mss_restart to clear out pending transactions on takedown failure */
901 if (!takedown_complete)
902 dev_err(qproc->dev, "qchannel takedown failed\n");
905 static void q6v5proc_halt_axi_port(struct q6v5 *qproc,
906 struct regmap *halt_map,
912 /* Check if we're already idle */
913 ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
917 /* Assert halt request */
918 regmap_write(halt_map, offset + AXI_HALTREQ_REG, 1);
921 regmap_read_poll_timeout(halt_map, offset + AXI_HALTACK_REG, val,
922 val, 1000, HALT_ACK_TIMEOUT_US);
924 ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
926 dev_err(qproc->dev, "port failed halt\n");
928 /* Clear halt request (port will remain halted until reset) */
929 regmap_write(halt_map, offset + AXI_HALTREQ_REG, 0);
932 static int q6v5_mpss_init_image(struct q6v5 *qproc, const struct firmware *fw,
935 unsigned long dma_attrs = DMA_ATTR_FORCE_CONTIGUOUS;
944 metadata = qcom_mdt_read_metadata(fw, &size, fw_name, qproc->dev);
945 if (IS_ERR(metadata))
946 return PTR_ERR(metadata);
948 ptr = dma_alloc_attrs(qproc->dev, size, &phys, GFP_KERNEL, dma_attrs);
951 dev_err(qproc->dev, "failed to allocate mdt buffer\n");
955 memcpy(ptr, metadata, size);
957 /* Hypervisor mapping to access metadata by modem */
958 mdata_perm = BIT(QCOM_SCM_VMID_HLOS);
959 ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, false, true,
963 "assigning Q6 access to metadata failed: %d\n", ret);
968 writel(phys, qproc->rmb_base + RMB_PMI_META_DATA_REG);
969 writel(RMB_CMD_META_DATA_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
971 ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_META_DATA_AUTH_SUCCESS, 1000);
972 if (ret == -ETIMEDOUT)
973 dev_err(qproc->dev, "MPSS header authentication timed out\n");
975 dev_err(qproc->dev, "MPSS header authentication failed: %d\n", ret);
977 /* Metadata authentication done, remove modem access */
978 xferop_ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, true, false,
982 "mdt buffer not reclaimed system may become unstable\n");
985 dma_free_attrs(qproc->dev, size, ptr, phys, dma_attrs);
988 return ret < 0 ? ret : 0;
991 static bool q6v5_phdr_valid(const struct elf32_phdr *phdr)
993 if (phdr->p_type != PT_LOAD)
996 if ((phdr->p_flags & QCOM_MDT_TYPE_MASK) == QCOM_MDT_TYPE_HASH)
1005 static int q6v5_mba_load(struct q6v5 *qproc)
1009 bool mba_load_err = false;
1011 ret = qcom_q6v5_prepare(&qproc->q6v5);
1015 ret = q6v5_pds_enable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1017 dev_err(qproc->dev, "failed to enable proxy power domains\n");
1021 ret = q6v5_regulator_enable(qproc, qproc->fallback_proxy_regs,
1022 qproc->fallback_proxy_reg_count);
1024 dev_err(qproc->dev, "failed to enable fallback proxy supplies\n");
1025 goto disable_proxy_pds;
1028 ret = q6v5_regulator_enable(qproc, qproc->proxy_regs,
1029 qproc->proxy_reg_count);
1031 dev_err(qproc->dev, "failed to enable proxy supplies\n");
1032 goto disable_fallback_proxy_reg;
1035 ret = q6v5_clk_enable(qproc->dev, qproc->proxy_clks,
1036 qproc->proxy_clk_count);
1038 dev_err(qproc->dev, "failed to enable proxy clocks\n");
1039 goto disable_proxy_reg;
1042 ret = q6v5_regulator_enable(qproc, qproc->active_regs,
1043 qproc->active_reg_count);
1045 dev_err(qproc->dev, "failed to enable supplies\n");
1046 goto disable_proxy_clk;
1049 ret = q6v5_clk_enable(qproc->dev, qproc->reset_clks,
1050 qproc->reset_clk_count);
1052 dev_err(qproc->dev, "failed to enable reset clocks\n");
1056 ret = q6v5_reset_deassert(qproc);
1058 dev_err(qproc->dev, "failed to deassert mss restart\n");
1059 goto disable_reset_clks;
1062 ret = q6v5_clk_enable(qproc->dev, qproc->active_clks,
1063 qproc->active_clk_count);
1065 dev_err(qproc->dev, "failed to enable clocks\n");
1069 ret = q6v5proc_enable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1071 dev_err(qproc->dev, "failed to enable axi bridge\n");
1072 goto disable_active_clks;
1076 * Some versions of the MBA firmware will upon boot wipe the MPSS region as well, so provide
1077 * the Q6 access to this region.
1079 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1080 qproc->mpss_phys, qproc->mpss_size);
1082 dev_err(qproc->dev, "assigning Q6 access to mpss memory failed: %d\n", ret);
1083 goto disable_active_clks;
1086 /* Assign MBA image access in DDR to q6 */
1087 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, false, true,
1088 qproc->mba_phys, qproc->mba_size);
1091 "assigning Q6 access to mba memory failed: %d\n", ret);
1092 goto disable_active_clks;
1095 writel(qproc->mba_phys, qproc->rmb_base + RMB_MBA_IMAGE_REG);
1096 if (qproc->dp_size) {
1097 writel(qproc->mba_phys + SZ_1M, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1098 writel(qproc->dp_size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1101 ret = q6v5proc_reset(qproc);
1105 ret = q6v5_rmb_mba_wait(qproc, 0, 5000);
1106 if (ret == -ETIMEDOUT) {
1107 dev_err(qproc->dev, "MBA boot timed out\n");
1108 goto halt_axi_ports;
1109 } else if (ret != RMB_MBA_XPU_UNLOCKED &&
1110 ret != RMB_MBA_XPU_UNLOCKED_SCRIBBLED) {
1111 dev_err(qproc->dev, "MBA returned unexpected status %d\n", ret);
1113 goto halt_axi_ports;
1116 qproc->dump_mba_loaded = true;
1120 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1122 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1123 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1124 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1125 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1126 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1127 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1128 mba_load_err = true;
1130 xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1131 false, qproc->mba_phys,
1133 if (xfermemop_ret) {
1135 "Failed to reclaim mba buffer, system may become unstable\n");
1136 } else if (mba_load_err) {
1137 q6v5_dump_mba_logs(qproc);
1140 disable_active_clks:
1141 q6v5_clk_disable(qproc->dev, qproc->active_clks,
1142 qproc->active_clk_count);
1144 q6v5_reset_assert(qproc);
1146 q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1147 qproc->reset_clk_count);
1149 q6v5_regulator_disable(qproc, qproc->active_regs,
1150 qproc->active_reg_count);
1152 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1153 qproc->proxy_clk_count);
1155 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1156 qproc->proxy_reg_count);
1157 disable_fallback_proxy_reg:
1158 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1159 qproc->fallback_proxy_reg_count);
1161 q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1163 qcom_q6v5_unprepare(&qproc->q6v5);
1168 static void q6v5_mba_reclaim(struct q6v5 *qproc)
1173 qproc->dump_mba_loaded = false;
1176 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1178 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1179 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1180 q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1181 if (qproc->version == MSS_MSM8996) {
1183 * To avoid high MX current during LPASS/MSS restart.
1185 val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1186 val |= Q6SS_CLAMP_IO | QDSP6v56_CLAMP_WL |
1187 QDSP6v56_CLAMP_QMC_MEM;
1188 writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1191 if (qproc->has_ext_cntl_regs) {
1192 regmap_write(qproc->conn_map, qproc->rscc_disable, 1);
1194 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
1195 !val, 1, Q6SS_CBCR_TIMEOUT_US);
1197 dev_err(qproc->dev, "failed to enable axim1 clock\n");
1199 ret = regmap_read_poll_timeout(qproc->halt_map, qproc->crypto_clk_off, val,
1200 !val, 1, Q6SS_CBCR_TIMEOUT_US);
1202 dev_err(qproc->dev, "failed to enable crypto clock\n");
1205 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1206 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1207 q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1209 q6v5_reset_assert(qproc);
1211 q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1212 qproc->reset_clk_count);
1213 q6v5_clk_disable(qproc->dev, qproc->active_clks,
1214 qproc->active_clk_count);
1215 q6v5_regulator_disable(qproc, qproc->active_regs,
1216 qproc->active_reg_count);
1218 /* In case of failure or coredump scenario where reclaiming MBA memory
1219 * could not happen reclaim it here.
1221 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false,
1226 ret = qcom_q6v5_unprepare(&qproc->q6v5);
1228 q6v5_pds_disable(qproc, qproc->proxy_pds,
1229 qproc->proxy_pd_count);
1230 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1231 qproc->proxy_clk_count);
1232 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1233 qproc->fallback_proxy_reg_count);
1234 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1235 qproc->proxy_reg_count);
1239 static int q6v5_reload_mba(struct rproc *rproc)
1241 struct q6v5 *qproc = rproc->priv;
1242 const struct firmware *fw;
1245 ret = request_firmware(&fw, rproc->firmware, qproc->dev);
1249 q6v5_load(rproc, fw);
1250 ret = q6v5_mba_load(qproc);
1251 release_firmware(fw);
1256 static int q6v5_mpss_load(struct q6v5 *qproc)
1258 const struct elf32_phdr *phdrs;
1259 const struct elf32_phdr *phdr;
1260 const struct firmware *seg_fw;
1261 const struct firmware *fw;
1262 struct elf32_hdr *ehdr;
1263 phys_addr_t mpss_reloc;
1264 phys_addr_t boot_addr;
1265 phys_addr_t min_addr = PHYS_ADDR_MAX;
1266 phys_addr_t max_addr = 0;
1268 bool relocate = false;
1277 fw_name_len = strlen(qproc->hexagon_mdt_image);
1278 if (fw_name_len <= 4)
1281 fw_name = kstrdup(qproc->hexagon_mdt_image, GFP_KERNEL);
1285 ret = request_firmware(&fw, fw_name, qproc->dev);
1287 dev_err(qproc->dev, "unable to load %s\n", fw_name);
1291 /* Initialize the RMB validator */
1292 writel(0, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1294 ret = q6v5_mpss_init_image(qproc, fw, qproc->hexagon_mdt_image);
1296 goto release_firmware;
1298 ehdr = (struct elf32_hdr *)fw->data;
1299 phdrs = (struct elf32_phdr *)(ehdr + 1);
1301 for (i = 0; i < ehdr->e_phnum; i++) {
1304 if (!q6v5_phdr_valid(phdr))
1307 if (phdr->p_flags & QCOM_MDT_RELOCATABLE)
1310 if (phdr->p_paddr < min_addr)
1311 min_addr = phdr->p_paddr;
1313 if (phdr->p_paddr + phdr->p_memsz > max_addr)
1314 max_addr = ALIGN(phdr->p_paddr + phdr->p_memsz, SZ_4K);
1318 * In case of a modem subsystem restart on secure devices, the modem
1319 * memory can be reclaimed only after MBA is loaded.
1321 q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, false,
1322 qproc->mpss_phys, qproc->mpss_size);
1324 /* Share ownership between Linux and MSS, during segment loading */
1325 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, true,
1326 qproc->mpss_phys, qproc->mpss_size);
1329 "assigning Q6 access to mpss memory failed: %d\n", ret);
1331 goto release_firmware;
1334 mpss_reloc = relocate ? min_addr : qproc->mpss_phys;
1335 qproc->mpss_reloc = mpss_reloc;
1336 /* Load firmware segments */
1337 for (i = 0; i < ehdr->e_phnum; i++) {
1340 if (!q6v5_phdr_valid(phdr))
1343 offset = phdr->p_paddr - mpss_reloc;
1344 if (offset < 0 || offset + phdr->p_memsz > qproc->mpss_size) {
1345 dev_err(qproc->dev, "segment outside memory range\n");
1347 goto release_firmware;
1350 if (phdr->p_filesz > phdr->p_memsz) {
1352 "refusing to load segment %d with p_filesz > p_memsz\n",
1355 goto release_firmware;
1358 ptr = memremap(qproc->mpss_phys + offset, phdr->p_memsz, MEMREMAP_WC);
1361 "unable to map memory region: %pa+%zx-%x\n",
1362 &qproc->mpss_phys, offset, phdr->p_memsz);
1363 goto release_firmware;
1366 if (phdr->p_filesz && phdr->p_offset < fw->size) {
1367 /* Firmware is large enough to be non-split */
1368 if (phdr->p_offset + phdr->p_filesz > fw->size) {
1370 "failed to load segment %d from truncated file %s\n",
1374 goto release_firmware;
1377 memcpy(ptr, fw->data + phdr->p_offset, phdr->p_filesz);
1378 } else if (phdr->p_filesz) {
1379 /* Replace "xxx.xxx" with "xxx.bxx" */
1380 sprintf(fw_name + fw_name_len - 3, "b%02d", i);
1381 ret = request_firmware_into_buf(&seg_fw, fw_name, qproc->dev,
1382 ptr, phdr->p_filesz);
1384 dev_err(qproc->dev, "failed to load %s\n", fw_name);
1386 goto release_firmware;
1389 if (seg_fw->size != phdr->p_filesz) {
1391 "failed to load segment %d from truncated file %s\n",
1394 release_firmware(seg_fw);
1396 goto release_firmware;
1399 release_firmware(seg_fw);
1402 if (phdr->p_memsz > phdr->p_filesz) {
1403 memset(ptr + phdr->p_filesz, 0,
1404 phdr->p_memsz - phdr->p_filesz);
1407 size += phdr->p_memsz;
1409 code_length = readl(qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1411 boot_addr = relocate ? qproc->mpss_phys : min_addr;
1412 writel(boot_addr, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1413 writel(RMB_CMD_LOAD_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1415 writel(size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1417 ret = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
1419 dev_err(qproc->dev, "MPSS authentication failed: %d\n",
1421 goto release_firmware;
1425 /* Transfer ownership of modem ddr region to q6 */
1426 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1427 qproc->mpss_phys, qproc->mpss_size);
1430 "assigning Q6 access to mpss memory failed: %d\n", ret);
1432 goto release_firmware;
1435 ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_AUTH_COMPLETE, 10000);
1436 if (ret == -ETIMEDOUT)
1437 dev_err(qproc->dev, "MPSS authentication timed out\n");
1439 dev_err(qproc->dev, "MPSS authentication failed: %d\n", ret);
1441 qcom_pil_info_store("modem", qproc->mpss_phys, qproc->mpss_size);
1444 release_firmware(fw);
1448 return ret < 0 ? ret : 0;
1451 static void qcom_q6v5_dump_segment(struct rproc *rproc,
1452 struct rproc_dump_segment *segment,
1453 void *dest, size_t cp_offset, size_t size)
1456 struct q6v5 *qproc = rproc->priv;
1457 int offset = segment->da - qproc->mpss_reloc;
1460 /* Unlock mba before copying segments */
1461 if (!qproc->dump_mba_loaded) {
1462 ret = q6v5_reload_mba(rproc);
1464 /* Reset ownership back to Linux to copy segments */
1465 ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1473 ptr = memremap(qproc->mpss_phys + offset + cp_offset, size, MEMREMAP_WC);
1476 memcpy(dest, ptr, size);
1479 memset(dest, 0xff, size);
1482 qproc->current_dump_size += size;
1484 /* Reclaim mba after copying segments */
1485 if (qproc->current_dump_size == qproc->total_dump_size) {
1486 if (qproc->dump_mba_loaded) {
1487 /* Try to reset ownership back to Q6 */
1488 q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1492 q6v5_mba_reclaim(qproc);
1497 static int q6v5_start(struct rproc *rproc)
1499 struct q6v5 *qproc = (struct q6v5 *)rproc->priv;
1503 ret = q6v5_mba_load(qproc);
1507 dev_info(qproc->dev, "MBA booted with%s debug policy, loading mpss\n",
1508 qproc->dp_size ? "" : "out");
1510 ret = q6v5_mpss_load(qproc);
1514 ret = qcom_q6v5_wait_for_start(&qproc->q6v5, msecs_to_jiffies(5000));
1515 if (ret == -ETIMEDOUT) {
1516 dev_err(qproc->dev, "start timed out\n");
1520 xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1521 false, qproc->mba_phys,
1525 "Failed to reclaim mba buffer system may become unstable\n");
1527 /* Reset Dump Segment Mask */
1528 qproc->current_dump_size = 0;
1533 q6v5_mba_reclaim(qproc);
1534 q6v5_dump_mba_logs(qproc);
1539 static int q6v5_stop(struct rproc *rproc)
1541 struct q6v5 *qproc = (struct q6v5 *)rproc->priv;
1544 ret = qcom_q6v5_request_stop(&qproc->q6v5, qproc->sysmon);
1545 if (ret == -ETIMEDOUT)
1546 dev_err(qproc->dev, "timed out on wait\n");
1548 q6v5_mba_reclaim(qproc);
1553 static int qcom_q6v5_register_dump_segments(struct rproc *rproc,
1554 const struct firmware *mba_fw)
1556 const struct firmware *fw;
1557 const struct elf32_phdr *phdrs;
1558 const struct elf32_phdr *phdr;
1559 const struct elf32_hdr *ehdr;
1560 struct q6v5 *qproc = rproc->priv;
1564 ret = request_firmware(&fw, qproc->hexagon_mdt_image, qproc->dev);
1566 dev_err(qproc->dev, "unable to load %s\n",
1567 qproc->hexagon_mdt_image);
1571 rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
1573 ehdr = (struct elf32_hdr *)fw->data;
1574 phdrs = (struct elf32_phdr *)(ehdr + 1);
1575 qproc->total_dump_size = 0;
1577 for (i = 0; i < ehdr->e_phnum; i++) {
1580 if (!q6v5_phdr_valid(phdr))
1583 ret = rproc_coredump_add_custom_segment(rproc, phdr->p_paddr,
1585 qcom_q6v5_dump_segment,
1590 qproc->total_dump_size += phdr->p_memsz;
1593 release_firmware(fw);
1597 static const struct rproc_ops q6v5_ops = {
1598 .start = q6v5_start,
1600 .parse_fw = qcom_q6v5_register_dump_segments,
1604 static void qcom_msa_handover(struct qcom_q6v5 *q6v5)
1606 struct q6v5 *qproc = container_of(q6v5, struct q6v5, q6v5);
1608 q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1609 qproc->proxy_clk_count);
1610 q6v5_regulator_disable(qproc, qproc->proxy_regs,
1611 qproc->proxy_reg_count);
1612 q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1613 qproc->fallback_proxy_reg_count);
1614 q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1617 static int q6v5_init_mem(struct q6v5 *qproc, struct platform_device *pdev)
1619 struct of_phandle_args args;
1620 int halt_cell_cnt = 3;
1623 qproc->reg_base = devm_platform_ioremap_resource_byname(pdev, "qdsp6");
1624 if (IS_ERR(qproc->reg_base))
1625 return PTR_ERR(qproc->reg_base);
1627 qproc->rmb_base = devm_platform_ioremap_resource_byname(pdev, "rmb");
1628 if (IS_ERR(qproc->rmb_base))
1629 return PTR_ERR(qproc->rmb_base);
1634 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1635 "qcom,halt-regs", halt_cell_cnt, 0, &args);
1637 dev_err(&pdev->dev, "failed to parse qcom,halt-regs\n");
1641 qproc->halt_map = syscon_node_to_regmap(args.np);
1642 of_node_put(args.np);
1643 if (IS_ERR(qproc->halt_map))
1644 return PTR_ERR(qproc->halt_map);
1646 qproc->halt_q6 = args.args[0];
1647 qproc->halt_modem = args.args[1];
1648 qproc->halt_nc = args.args[2];
1651 qproc->halt_vq6 = args.args[3];
1653 if (qproc->has_qaccept_regs) {
1654 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1655 "qcom,qaccept-regs",
1658 dev_err(&pdev->dev, "failed to parse qaccept-regs\n");
1662 qproc->qaccept_mdm = args.args[0];
1663 qproc->qaccept_cx = args.args[1];
1664 qproc->qaccept_axi = args.args[2];
1667 if (qproc->has_ext_cntl_regs) {
1668 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1672 dev_err(&pdev->dev, "failed to parse ext-regs index 0\n");
1676 qproc->conn_map = syscon_node_to_regmap(args.np);
1677 of_node_put(args.np);
1678 if (IS_ERR(qproc->conn_map))
1679 return PTR_ERR(qproc->conn_map);
1681 qproc->force_clk_on = args.args[0];
1682 qproc->rscc_disable = args.args[1];
1684 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1688 dev_err(&pdev->dev, "failed to parse ext-regs index 1\n");
1692 qproc->axim1_clk_off = args.args[0];
1693 qproc->crypto_clk_off = args.args[1];
1696 if (qproc->has_spare_reg) {
1697 ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1701 dev_err(&pdev->dev, "failed to parse spare-regs\n");
1705 qproc->conn_map = syscon_node_to_regmap(args.np);
1706 of_node_put(args.np);
1707 if (IS_ERR(qproc->conn_map))
1708 return PTR_ERR(qproc->conn_map);
1710 qproc->conn_box = args.args[0];
1716 static int q6v5_init_clocks(struct device *dev, struct clk **clks,
1724 for (i = 0; clk_names[i]; i++) {
1725 clks[i] = devm_clk_get(dev, clk_names[i]);
1726 if (IS_ERR(clks[i])) {
1727 int rc = PTR_ERR(clks[i]);
1729 if (rc != -EPROBE_DEFER)
1730 dev_err(dev, "Failed to get %s clock\n",
1739 static int q6v5_pds_attach(struct device *dev, struct device **devs,
1749 while (pd_names[num_pds])
1752 for (i = 0; i < num_pds; i++) {
1753 devs[i] = dev_pm_domain_attach_by_name(dev, pd_names[i]);
1754 if (IS_ERR_OR_NULL(devs[i])) {
1755 ret = PTR_ERR(devs[i]) ? : -ENODATA;
1763 for (i--; i >= 0; i--)
1764 dev_pm_domain_detach(devs[i], false);
1769 static void q6v5_pds_detach(struct q6v5 *qproc, struct device **pds,
1774 for (i = 0; i < pd_count; i++)
1775 dev_pm_domain_detach(pds[i], false);
1778 static int q6v5_init_reset(struct q6v5 *qproc)
1780 qproc->mss_restart = devm_reset_control_get_exclusive(qproc->dev,
1782 if (IS_ERR(qproc->mss_restart)) {
1783 dev_err(qproc->dev, "failed to acquire mss restart\n");
1784 return PTR_ERR(qproc->mss_restart);
1787 if (qproc->has_alt_reset || qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
1788 qproc->pdc_reset = devm_reset_control_get_exclusive(qproc->dev,
1790 if (IS_ERR(qproc->pdc_reset)) {
1791 dev_err(qproc->dev, "failed to acquire pdc reset\n");
1792 return PTR_ERR(qproc->pdc_reset);
1799 static int q6v5_alloc_memory_region(struct q6v5 *qproc)
1801 struct device_node *child;
1802 struct device_node *node;
1807 * In the absence of mba/mpss sub-child, extract the mba and mpss
1808 * reserved memory regions from device's memory-region property.
1810 child = of_get_child_by_name(qproc->dev->of_node, "mba");
1812 node = of_parse_phandle(qproc->dev->of_node,
1813 "memory-region", 0);
1815 node = of_parse_phandle(child, "memory-region", 0);
1819 ret = of_address_to_resource(node, 0, &r);
1822 dev_err(qproc->dev, "unable to resolve mba region\n");
1826 qproc->mba_phys = r.start;
1827 qproc->mba_size = resource_size(&r);
1830 node = of_parse_phandle(qproc->dev->of_node,
1831 "memory-region", 1);
1833 child = of_get_child_by_name(qproc->dev->of_node, "mpss");
1834 node = of_parse_phandle(child, "memory-region", 0);
1838 ret = of_address_to_resource(node, 0, &r);
1841 dev_err(qproc->dev, "unable to resolve mpss region\n");
1845 qproc->mpss_phys = qproc->mpss_reloc = r.start;
1846 qproc->mpss_size = resource_size(&r);
1851 static int q6v5_probe(struct platform_device *pdev)
1853 const struct rproc_hexagon_res *desc;
1854 struct device_node *node;
1856 struct rproc *rproc;
1857 const char *mba_image;
1860 desc = of_device_get_match_data(&pdev->dev);
1864 if (desc->need_mem_protection && !qcom_scm_is_available())
1865 return -EPROBE_DEFER;
1867 mba_image = desc->hexagon_mba_image;
1868 ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
1870 if (ret < 0 && ret != -EINVAL) {
1871 dev_err(&pdev->dev, "unable to read mba firmware-name\n");
1875 rproc = rproc_alloc(&pdev->dev, pdev->name, &q6v5_ops,
1876 mba_image, sizeof(*qproc));
1878 dev_err(&pdev->dev, "failed to allocate rproc\n");
1882 rproc->auto_boot = false;
1883 rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
1885 qproc = (struct q6v5 *)rproc->priv;
1886 qproc->dev = &pdev->dev;
1887 qproc->rproc = rproc;
1888 qproc->hexagon_mdt_image = "modem.mdt";
1889 ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
1890 1, &qproc->hexagon_mdt_image);
1891 if (ret < 0 && ret != -EINVAL) {
1892 dev_err(&pdev->dev, "unable to read mpss firmware-name\n");
1896 platform_set_drvdata(pdev, qproc);
1898 qproc->has_qaccept_regs = desc->has_qaccept_regs;
1899 qproc->has_ext_cntl_regs = desc->has_ext_cntl_regs;
1900 qproc->has_vq6 = desc->has_vq6;
1901 qproc->has_spare_reg = desc->has_spare_reg;
1902 ret = q6v5_init_mem(qproc, pdev);
1906 ret = q6v5_alloc_memory_region(qproc);
1910 ret = q6v5_init_clocks(&pdev->dev, qproc->proxy_clks,
1911 desc->proxy_clk_names);
1913 dev_err(&pdev->dev, "Failed to get proxy clocks.\n");
1916 qproc->proxy_clk_count = ret;
1918 ret = q6v5_init_clocks(&pdev->dev, qproc->reset_clks,
1919 desc->reset_clk_names);
1921 dev_err(&pdev->dev, "Failed to get reset clocks.\n");
1924 qproc->reset_clk_count = ret;
1926 ret = q6v5_init_clocks(&pdev->dev, qproc->active_clks,
1927 desc->active_clk_names);
1929 dev_err(&pdev->dev, "Failed to get active clocks.\n");
1932 qproc->active_clk_count = ret;
1934 ret = q6v5_regulator_init(&pdev->dev, qproc->proxy_regs,
1935 desc->proxy_supply);
1937 dev_err(&pdev->dev, "Failed to get proxy regulators.\n");
1940 qproc->proxy_reg_count = ret;
1942 ret = q6v5_regulator_init(&pdev->dev, qproc->active_regs,
1943 desc->active_supply);
1945 dev_err(&pdev->dev, "Failed to get active regulators.\n");
1948 qproc->active_reg_count = ret;
1950 ret = q6v5_pds_attach(&pdev->dev, qproc->proxy_pds,
1951 desc->proxy_pd_names);
1952 /* Fallback to regulators for old device trees */
1953 if (ret == -ENODATA && desc->fallback_proxy_supply) {
1954 ret = q6v5_regulator_init(&pdev->dev,
1955 qproc->fallback_proxy_regs,
1956 desc->fallback_proxy_supply);
1958 dev_err(&pdev->dev, "Failed to get fallback proxy regulators.\n");
1961 qproc->fallback_proxy_reg_count = ret;
1962 } else if (ret < 0) {
1963 dev_err(&pdev->dev, "Failed to init power domains\n");
1966 qproc->proxy_pd_count = ret;
1969 qproc->has_alt_reset = desc->has_alt_reset;
1970 ret = q6v5_init_reset(qproc);
1972 goto detach_proxy_pds;
1974 qproc->version = desc->version;
1975 qproc->need_mem_protection = desc->need_mem_protection;
1976 qproc->has_mba_logs = desc->has_mba_logs;
1978 ret = qcom_q6v5_init(&qproc->q6v5, pdev, rproc, MPSS_CRASH_REASON_SMEM, "modem",
1981 goto detach_proxy_pds;
1983 qproc->mpss_perm = BIT(QCOM_SCM_VMID_HLOS);
1984 qproc->mba_perm = BIT(QCOM_SCM_VMID_HLOS);
1985 qcom_add_glink_subdev(rproc, &qproc->glink_subdev, "mpss");
1986 qcom_add_smd_subdev(rproc, &qproc->smd_subdev);
1987 qcom_add_ssr_subdev(rproc, &qproc->ssr_subdev, "mpss");
1988 qproc->sysmon = qcom_add_sysmon_subdev(rproc, "modem", 0x12);
1989 if (IS_ERR(qproc->sysmon)) {
1990 ret = PTR_ERR(qproc->sysmon);
1991 goto remove_subdevs;
1994 ret = rproc_add(rproc);
1996 goto remove_sysmon_subdev;
1998 node = of_get_compatible_child(pdev->dev.of_node, "qcom,bam-dmux");
1999 qproc->bam_dmux = of_platform_device_create(node, NULL, &pdev->dev);
2004 remove_sysmon_subdev:
2005 qcom_remove_sysmon_subdev(qproc->sysmon);
2007 qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2008 qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2009 qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2011 q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2018 static int q6v5_remove(struct platform_device *pdev)
2020 struct q6v5 *qproc = platform_get_drvdata(pdev);
2021 struct rproc *rproc = qproc->rproc;
2023 if (qproc->bam_dmux)
2024 of_platform_device_destroy(&qproc->bam_dmux->dev, NULL);
2027 qcom_q6v5_deinit(&qproc->q6v5);
2028 qcom_remove_sysmon_subdev(qproc->sysmon);
2029 qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2030 qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2031 qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2033 q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2040 static const struct rproc_hexagon_res sc7180_mss = {
2041 .hexagon_mba_image = "mba.mbn",
2042 .proxy_clk_names = (char*[]){
2046 .reset_clk_names = (char*[]){
2052 .active_clk_names = (char*[]){
2057 .proxy_pd_names = (char*[]){
2063 .need_mem_protection = true,
2064 .has_alt_reset = false,
2065 .has_mba_logs = true,
2066 .has_spare_reg = true,
2067 .has_qaccept_regs = false,
2068 .has_ext_cntl_regs = false,
2070 .version = MSS_SC7180,
2073 static const struct rproc_hexagon_res sc7280_mss = {
2074 .hexagon_mba_image = "mba.mbn",
2075 .proxy_clk_names = (char*[]){
2080 .active_clk_names = (char*[]){
2086 .proxy_pd_names = (char*[]){
2091 .need_mem_protection = true,
2092 .has_alt_reset = false,
2093 .has_mba_logs = true,
2094 .has_spare_reg = false,
2095 .has_qaccept_regs = true,
2096 .has_ext_cntl_regs = true,
2098 .version = MSS_SC7280,
2101 static const struct rproc_hexagon_res sdm845_mss = {
2102 .hexagon_mba_image = "mba.mbn",
2103 .proxy_clk_names = (char*[]){
2108 .reset_clk_names = (char*[]){
2113 .active_clk_names = (char*[]){
2120 .proxy_pd_names = (char*[]){
2126 .need_mem_protection = true,
2127 .has_alt_reset = true,
2128 .has_mba_logs = false,
2129 .has_spare_reg = false,
2130 .has_qaccept_regs = false,
2131 .has_ext_cntl_regs = false,
2133 .version = MSS_SDM845,
2136 static const struct rproc_hexagon_res msm8998_mss = {
2137 .hexagon_mba_image = "mba.mbn",
2138 .proxy_clk_names = (char*[]){
2144 .active_clk_names = (char*[]){
2152 .proxy_pd_names = (char*[]){
2157 .need_mem_protection = true,
2158 .has_alt_reset = false,
2159 .has_mba_logs = false,
2160 .has_spare_reg = false,
2161 .has_qaccept_regs = false,
2162 .has_ext_cntl_regs = false,
2164 .version = MSS_MSM8998,
2167 static const struct rproc_hexagon_res msm8996_mss = {
2168 .hexagon_mba_image = "mba.mbn",
2169 .proxy_supply = (struct qcom_mss_reg_res[]) {
2176 .proxy_clk_names = (char*[]){
2182 .active_clk_names = (char*[]){
2191 .need_mem_protection = true,
2192 .has_alt_reset = false,
2193 .has_mba_logs = false,
2194 .has_spare_reg = false,
2195 .has_qaccept_regs = false,
2196 .has_ext_cntl_regs = false,
2198 .version = MSS_MSM8996,
2201 static const struct rproc_hexagon_res msm8916_mss = {
2202 .hexagon_mba_image = "mba.mbn",
2203 .proxy_supply = (struct qcom_mss_reg_res[]) {
2210 .fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2221 .proxy_clk_names = (char*[]){
2225 .active_clk_names = (char*[]){
2231 .proxy_pd_names = (char*[]){
2236 .need_mem_protection = false,
2237 .has_alt_reset = false,
2238 .has_mba_logs = false,
2239 .has_spare_reg = false,
2240 .has_qaccept_regs = false,
2241 .has_ext_cntl_regs = false,
2243 .version = MSS_MSM8916,
2246 static const struct rproc_hexagon_res msm8974_mss = {
2247 .hexagon_mba_image = "mba.b00",
2248 .proxy_supply = (struct qcom_mss_reg_res[]) {
2255 .fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2266 .active_supply = (struct qcom_mss_reg_res[]) {
2274 .proxy_clk_names = (char*[]){
2278 .active_clk_names = (char*[]){
2284 .proxy_pd_names = (char*[]){
2289 .need_mem_protection = false,
2290 .has_alt_reset = false,
2291 .has_mba_logs = false,
2292 .has_spare_reg = false,
2293 .has_qaccept_regs = false,
2294 .has_ext_cntl_regs = false,
2296 .version = MSS_MSM8974,
2299 static const struct of_device_id q6v5_of_match[] = {
2300 { .compatible = "qcom,q6v5-pil", .data = &msm8916_mss},
2301 { .compatible = "qcom,msm8916-mss-pil", .data = &msm8916_mss},
2302 { .compatible = "qcom,msm8974-mss-pil", .data = &msm8974_mss},
2303 { .compatible = "qcom,msm8996-mss-pil", .data = &msm8996_mss},
2304 { .compatible = "qcom,msm8998-mss-pil", .data = &msm8998_mss},
2305 { .compatible = "qcom,sc7180-mss-pil", .data = &sc7180_mss},
2306 { .compatible = "qcom,sc7280-mss-pil", .data = &sc7280_mss},
2307 { .compatible = "qcom,sdm845-mss-pil", .data = &sdm845_mss},
2310 MODULE_DEVICE_TABLE(of, q6v5_of_match);
2312 static struct platform_driver q6v5_driver = {
2313 .probe = q6v5_probe,
2314 .remove = q6v5_remove,
2316 .name = "qcom-q6v5-mss",
2317 .of_match_table = q6v5_of_match,
2320 module_platform_driver(q6v5_driver);
2322 MODULE_DESCRIPTION("Qualcomm Self-authenticating modem remoteproc driver");
2323 MODULE_LICENSE("GPL v2");