xref: /openbmc/linux/drivers/remoteproc/qcom_q6v5_mss.c (revision b694e3c604e999343258c49e574abd7be012e726)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Qualcomm self-authenticating modem subsystem remoteproc driver
4  *
5  * Copyright (C) 2016 Linaro Ltd.
6  * Copyright (C) 2014 Sony Mobile Communications AB
7  * Copyright (c) 2012-2013, The Linux Foundation. All rights reserved.
8  */
9 
10 #include <linux/clk.h>
11 #include <linux/delay.h>
12 #include <linux/devcoredump.h>
13 #include <linux/dma-mapping.h>
14 #include <linux/interrupt.h>
15 #include <linux/kernel.h>
16 #include <linux/mfd/syscon.h>
17 #include <linux/module.h>
18 #include <linux/of.h>
19 #include <linux/of_reserved_mem.h>
20 #include <linux/of_platform.h>
21 #include <linux/platform_device.h>
22 #include <linux/pm_domain.h>
23 #include <linux/pm_runtime.h>
24 #include <linux/regmap.h>
25 #include <linux/regulator/consumer.h>
26 #include <linux/remoteproc.h>
27 #include <linux/reset.h>
28 #include <linux/soc/qcom/mdt_loader.h>
29 #include <linux/iopoll.h>
30 #include <linux/slab.h>
31 
32 #include "remoteproc_internal.h"
33 #include "qcom_common.h"
34 #include "qcom_pil_info.h"
35 #include "qcom_q6v5.h"
36 
37 #include <linux/firmware/qcom/qcom_scm.h>
38 
39 #define MPSS_CRASH_REASON_SMEM		421
40 
41 #define MBA_LOG_SIZE			SZ_4K
42 
43 #define MPSS_PAS_ID			5
44 
45 /* RMB Status Register Values */
46 #define RMB_PBL_SUCCESS			0x1
47 
48 #define RMB_MBA_XPU_UNLOCKED		0x1
49 #define RMB_MBA_XPU_UNLOCKED_SCRIBBLED	0x2
50 #define RMB_MBA_META_DATA_AUTH_SUCCESS	0x3
51 #define RMB_MBA_AUTH_COMPLETE		0x4
52 
53 /* PBL/MBA interface registers */
54 #define RMB_MBA_IMAGE_REG		0x00
55 #define RMB_PBL_STATUS_REG		0x04
56 #define RMB_MBA_COMMAND_REG		0x08
57 #define RMB_MBA_STATUS_REG		0x0C
58 #define RMB_PMI_META_DATA_REG		0x10
59 #define RMB_PMI_CODE_START_REG		0x14
60 #define RMB_PMI_CODE_LENGTH_REG		0x18
61 #define RMB_MBA_MSS_STATUS		0x40
62 #define RMB_MBA_ALT_RESET		0x44
63 
64 #define RMB_CMD_META_DATA_READY		0x1
65 #define RMB_CMD_LOAD_READY		0x2
66 
67 /* QDSP6SS Register Offsets */
68 #define QDSP6SS_RESET_REG		0x014
69 #define QDSP6SS_GFMUX_CTL_REG		0x020
70 #define QDSP6SS_PWR_CTL_REG		0x030
71 #define QDSP6SS_MEM_PWR_CTL		0x0B0
72 #define QDSP6V6SS_MEM_PWR_CTL		0x034
73 #define QDSP6SS_STRAP_ACC		0x110
74 #define QDSP6V62SS_BHS_STATUS		0x0C4
75 
76 /* AXI Halt Register Offsets */
77 #define AXI_HALTREQ_REG			0x0
78 #define AXI_HALTACK_REG			0x4
79 #define AXI_IDLE_REG			0x8
80 #define AXI_GATING_VALID_OVERRIDE	BIT(0)
81 
82 #define HALT_ACK_TIMEOUT_US		100000
83 
84 /* QACCEPT Register Offsets */
85 #define QACCEPT_ACCEPT_REG		0x0
86 #define QACCEPT_ACTIVE_REG		0x4
87 #define QACCEPT_DENY_REG		0x8
88 #define QACCEPT_REQ_REG			0xC
89 
90 #define QACCEPT_TIMEOUT_US		50
91 
92 /* QDSP6SS_RESET */
93 #define Q6SS_STOP_CORE			BIT(0)
94 #define Q6SS_CORE_ARES			BIT(1)
95 #define Q6SS_BUS_ARES_ENABLE		BIT(2)
96 
97 /* QDSP6SS CBCR */
98 #define Q6SS_CBCR_CLKEN			BIT(0)
99 #define Q6SS_CBCR_CLKOFF		BIT(31)
100 #define Q6SS_CBCR_TIMEOUT_US		200
101 
102 /* QDSP6SS_GFMUX_CTL */
103 #define Q6SS_CLK_ENABLE			BIT(1)
104 
105 /* QDSP6SS_PWR_CTL */
106 #define Q6SS_L2DATA_SLP_NRET_N_0	BIT(0)
107 #define Q6SS_L2DATA_SLP_NRET_N_1	BIT(1)
108 #define Q6SS_L2DATA_SLP_NRET_N_2	BIT(2)
109 #define Q6SS_L2TAG_SLP_NRET_N		BIT(16)
110 #define Q6SS_ETB_SLP_NRET_N		BIT(17)
111 #define Q6SS_L2DATA_STBY_N		BIT(18)
112 #define Q6SS_SLP_RET_N			BIT(19)
113 #define Q6SS_CLAMP_IO			BIT(20)
114 #define QDSS_BHS_ON			BIT(21)
115 #define QDSS_LDO_BYP			BIT(22)
116 
117 /* QDSP6v55 parameters */
118 #define QDSP6V55_MEM_BITS		GENMASK(16, 8)
119 
120 /* QDSP6v56 parameters */
121 #define QDSP6v56_LDO_BYP		BIT(25)
122 #define QDSP6v56_BHS_ON		BIT(24)
123 #define QDSP6v56_CLAMP_WL		BIT(21)
124 #define QDSP6v56_CLAMP_QMC_MEM		BIT(22)
125 #define QDSP6SS_XO_CBCR		0x0038
126 #define QDSP6SS_ACC_OVERRIDE_VAL		0x20
127 #define QDSP6v55_BHS_EN_REST_ACK	BIT(0)
128 
129 /* QDSP6v65 parameters */
130 #define QDSP6SS_CORE_CBCR		0x20
131 #define QDSP6SS_SLEEP                   0x3C
132 #define QDSP6SS_BOOT_CORE_START         0x400
133 #define QDSP6SS_BOOT_CMD                0x404
134 #define BOOT_FSM_TIMEOUT                10000
135 #define BHS_CHECK_MAX_LOOPS             200
136 
137 struct reg_info {
138 	struct regulator *reg;
139 	int uV;
140 	int uA;
141 };
142 
143 struct qcom_mss_reg_res {
144 	const char *supply;
145 	int uV;
146 	int uA;
147 };
148 
149 struct rproc_hexagon_res {
150 	const char *hexagon_mba_image;
151 	struct qcom_mss_reg_res *proxy_supply;
152 	struct qcom_mss_reg_res *fallback_proxy_supply;
153 	struct qcom_mss_reg_res *active_supply;
154 	char **proxy_clk_names;
155 	char **reset_clk_names;
156 	char **active_clk_names;
157 	char **proxy_pd_names;
158 	int version;
159 	bool need_mem_protection;
160 	bool has_alt_reset;
161 	bool has_mba_logs;
162 	bool has_spare_reg;
163 	bool has_qaccept_regs;
164 	bool has_ext_cntl_regs;
165 	bool has_vq6;
166 };
167 
168 struct q6v5 {
169 	struct device *dev;
170 	struct rproc *rproc;
171 
172 	void __iomem *reg_base;
173 	void __iomem *rmb_base;
174 
175 	struct regmap *halt_map;
176 	struct regmap *conn_map;
177 
178 	u32 halt_q6;
179 	u32 halt_modem;
180 	u32 halt_nc;
181 	u32 halt_vq6;
182 	u32 conn_box;
183 
184 	u32 qaccept_mdm;
185 	u32 qaccept_cx;
186 	u32 qaccept_axi;
187 
188 	u32 axim1_clk_off;
189 	u32 crypto_clk_off;
190 	u32 force_clk_on;
191 	u32 rscc_disable;
192 
193 	struct reset_control *mss_restart;
194 	struct reset_control *pdc_reset;
195 
196 	struct qcom_q6v5 q6v5;
197 
198 	struct clk *active_clks[8];
199 	struct clk *reset_clks[4];
200 	struct clk *proxy_clks[4];
201 	struct device *proxy_pds[3];
202 	int active_clk_count;
203 	int reset_clk_count;
204 	int proxy_clk_count;
205 	int proxy_pd_count;
206 
207 	struct reg_info active_regs[1];
208 	struct reg_info proxy_regs[1];
209 	struct reg_info fallback_proxy_regs[2];
210 	int active_reg_count;
211 	int proxy_reg_count;
212 	int fallback_proxy_reg_count;
213 
214 	bool dump_mba_loaded;
215 	size_t current_dump_size;
216 	size_t total_dump_size;
217 
218 	phys_addr_t mba_phys;
219 	size_t mba_size;
220 	size_t dp_size;
221 
222 	phys_addr_t mdata_phys;
223 	size_t mdata_size;
224 
225 	phys_addr_t mpss_phys;
226 	phys_addr_t mpss_reloc;
227 	size_t mpss_size;
228 
229 	struct qcom_rproc_glink glink_subdev;
230 	struct qcom_rproc_subdev smd_subdev;
231 	struct qcom_rproc_ssr ssr_subdev;
232 	struct qcom_sysmon *sysmon;
233 	struct platform_device *bam_dmux;
234 	bool need_mem_protection;
235 	bool has_alt_reset;
236 	bool has_mba_logs;
237 	bool has_spare_reg;
238 	bool has_qaccept_regs;
239 	bool has_ext_cntl_regs;
240 	bool has_vq6;
241 	u64 mpss_perm;
242 	u64 mba_perm;
243 	const char *hexagon_mdt_image;
244 	int version;
245 };
246 
247 enum {
248 	MSS_MSM8909,
249 	MSS_MSM8916,
250 	MSS_MSM8953,
251 	MSS_MSM8974,
252 	MSS_MSM8996,
253 	MSS_MSM8998,
254 	MSS_SC7180,
255 	MSS_SC7280,
256 	MSS_SDM660,
257 	MSS_SDM845,
258 };
259 
q6v5_regulator_init(struct device * dev,struct reg_info * regs,const struct qcom_mss_reg_res * reg_res)260 static int q6v5_regulator_init(struct device *dev, struct reg_info *regs,
261 			       const struct qcom_mss_reg_res *reg_res)
262 {
263 	int rc;
264 	int i;
265 
266 	if (!reg_res)
267 		return 0;
268 
269 	for (i = 0; reg_res[i].supply; i++) {
270 		regs[i].reg = devm_regulator_get(dev, reg_res[i].supply);
271 		if (IS_ERR(regs[i].reg)) {
272 			rc = PTR_ERR(regs[i].reg);
273 			if (rc != -EPROBE_DEFER)
274 				dev_err(dev, "Failed to get %s\n regulator",
275 					reg_res[i].supply);
276 			return rc;
277 		}
278 
279 		regs[i].uV = reg_res[i].uV;
280 		regs[i].uA = reg_res[i].uA;
281 	}
282 
283 	return i;
284 }
285 
q6v5_regulator_enable(struct q6v5 * qproc,struct reg_info * regs,int count)286 static int q6v5_regulator_enable(struct q6v5 *qproc,
287 				 struct reg_info *regs, int count)
288 {
289 	int ret;
290 	int i;
291 
292 	for (i = 0; i < count; i++) {
293 		if (regs[i].uV > 0) {
294 			ret = regulator_set_voltage(regs[i].reg,
295 					regs[i].uV, INT_MAX);
296 			if (ret) {
297 				dev_err(qproc->dev,
298 					"Failed to request voltage for %d.\n",
299 						i);
300 				goto err;
301 			}
302 		}
303 
304 		if (regs[i].uA > 0) {
305 			ret = regulator_set_load(regs[i].reg,
306 						 regs[i].uA);
307 			if (ret < 0) {
308 				dev_err(qproc->dev,
309 					"Failed to set regulator mode\n");
310 				goto err;
311 			}
312 		}
313 
314 		ret = regulator_enable(regs[i].reg);
315 		if (ret) {
316 			dev_err(qproc->dev, "Regulator enable failed\n");
317 			goto err;
318 		}
319 	}
320 
321 	return 0;
322 err:
323 	for (; i >= 0; i--) {
324 		if (regs[i].uV > 0)
325 			regulator_set_voltage(regs[i].reg, 0, INT_MAX);
326 
327 		if (regs[i].uA > 0)
328 			regulator_set_load(regs[i].reg, 0);
329 
330 		regulator_disable(regs[i].reg);
331 	}
332 
333 	return ret;
334 }
335 
q6v5_regulator_disable(struct q6v5 * qproc,struct reg_info * regs,int count)336 static void q6v5_regulator_disable(struct q6v5 *qproc,
337 				   struct reg_info *regs, int count)
338 {
339 	int i;
340 
341 	for (i = 0; i < count; i++) {
342 		if (regs[i].uV > 0)
343 			regulator_set_voltage(regs[i].reg, 0, INT_MAX);
344 
345 		if (regs[i].uA > 0)
346 			regulator_set_load(regs[i].reg, 0);
347 
348 		regulator_disable(regs[i].reg);
349 	}
350 }
351 
q6v5_clk_enable(struct device * dev,struct clk ** clks,int count)352 static int q6v5_clk_enable(struct device *dev,
353 			   struct clk **clks, int count)
354 {
355 	int rc;
356 	int i;
357 
358 	for (i = 0; i < count; i++) {
359 		rc = clk_prepare_enable(clks[i]);
360 		if (rc) {
361 			dev_err(dev, "Clock enable failed\n");
362 			goto err;
363 		}
364 	}
365 
366 	return 0;
367 err:
368 	for (i--; i >= 0; i--)
369 		clk_disable_unprepare(clks[i]);
370 
371 	return rc;
372 }
373 
q6v5_clk_disable(struct device * dev,struct clk ** clks,int count)374 static void q6v5_clk_disable(struct device *dev,
375 			     struct clk **clks, int count)
376 {
377 	int i;
378 
379 	for (i = 0; i < count; i++)
380 		clk_disable_unprepare(clks[i]);
381 }
382 
q6v5_pds_enable(struct q6v5 * qproc,struct device ** pds,size_t pd_count)383 static int q6v5_pds_enable(struct q6v5 *qproc, struct device **pds,
384 			   size_t pd_count)
385 {
386 	int ret;
387 	int i;
388 
389 	for (i = 0; i < pd_count; i++) {
390 		dev_pm_genpd_set_performance_state(pds[i], INT_MAX);
391 		ret = pm_runtime_get_sync(pds[i]);
392 		if (ret < 0) {
393 			pm_runtime_put_noidle(pds[i]);
394 			dev_pm_genpd_set_performance_state(pds[i], 0);
395 			goto unroll_pd_votes;
396 		}
397 	}
398 
399 	return 0;
400 
401 unroll_pd_votes:
402 	for (i--; i >= 0; i--) {
403 		dev_pm_genpd_set_performance_state(pds[i], 0);
404 		pm_runtime_put(pds[i]);
405 	}
406 
407 	return ret;
408 }
409 
q6v5_pds_disable(struct q6v5 * qproc,struct device ** pds,size_t pd_count)410 static void q6v5_pds_disable(struct q6v5 *qproc, struct device **pds,
411 			     size_t pd_count)
412 {
413 	int i;
414 
415 	for (i = 0; i < pd_count; i++) {
416 		dev_pm_genpd_set_performance_state(pds[i], 0);
417 		pm_runtime_put(pds[i]);
418 	}
419 }
420 
q6v5_xfer_mem_ownership(struct q6v5 * qproc,u64 * current_perm,bool local,bool remote,phys_addr_t addr,size_t size)421 static int q6v5_xfer_mem_ownership(struct q6v5 *qproc, u64 *current_perm,
422 				   bool local, bool remote, phys_addr_t addr,
423 				   size_t size)
424 {
425 	struct qcom_scm_vmperm next[2];
426 	int perms = 0;
427 
428 	if (!qproc->need_mem_protection)
429 		return 0;
430 
431 	if (local == !!(*current_perm & BIT(QCOM_SCM_VMID_HLOS)) &&
432 	    remote == !!(*current_perm & BIT(QCOM_SCM_VMID_MSS_MSA)))
433 		return 0;
434 
435 	if (local) {
436 		next[perms].vmid = QCOM_SCM_VMID_HLOS;
437 		next[perms].perm = QCOM_SCM_PERM_RWX;
438 		perms++;
439 	}
440 
441 	if (remote) {
442 		next[perms].vmid = QCOM_SCM_VMID_MSS_MSA;
443 		next[perms].perm = QCOM_SCM_PERM_RW;
444 		perms++;
445 	}
446 
447 	return qcom_scm_assign_mem(addr, ALIGN(size, SZ_4K),
448 				   current_perm, next, perms);
449 }
450 
q6v5_debug_policy_load(struct q6v5 * qproc,void * mba_region)451 static void q6v5_debug_policy_load(struct q6v5 *qproc, void *mba_region)
452 {
453 	const struct firmware *dp_fw;
454 
455 	if (request_firmware_direct(&dp_fw, "msadp", qproc->dev))
456 		return;
457 
458 	if (SZ_1M + dp_fw->size <= qproc->mba_size) {
459 		memcpy(mba_region + SZ_1M, dp_fw->data, dp_fw->size);
460 		qproc->dp_size = dp_fw->size;
461 	}
462 
463 	release_firmware(dp_fw);
464 }
465 
q6v5_load(struct rproc * rproc,const struct firmware * fw)466 static int q6v5_load(struct rproc *rproc, const struct firmware *fw)
467 {
468 	struct q6v5 *qproc = rproc->priv;
469 	void *mba_region;
470 
471 	/* MBA is restricted to a maximum size of 1M */
472 	if (fw->size > qproc->mba_size || fw->size > SZ_1M) {
473 		dev_err(qproc->dev, "MBA firmware load failed\n");
474 		return -EINVAL;
475 	}
476 
477 	mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
478 	if (!mba_region) {
479 		dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
480 			&qproc->mba_phys, qproc->mba_size);
481 		return -EBUSY;
482 	}
483 
484 	memcpy(mba_region, fw->data, fw->size);
485 	q6v5_debug_policy_load(qproc, mba_region);
486 	memunmap(mba_region);
487 
488 	return 0;
489 }
490 
q6v5_reset_assert(struct q6v5 * qproc)491 static int q6v5_reset_assert(struct q6v5 *qproc)
492 {
493 	int ret;
494 
495 	if (qproc->has_alt_reset) {
496 		reset_control_assert(qproc->pdc_reset);
497 		ret = reset_control_reset(qproc->mss_restart);
498 		reset_control_deassert(qproc->pdc_reset);
499 	} else if (qproc->has_spare_reg) {
500 		/*
501 		 * When the AXI pipeline is being reset with the Q6 modem partly
502 		 * operational there is possibility of AXI valid signal to
503 		 * glitch, leading to spurious transactions and Q6 hangs. A work
504 		 * around is employed by asserting the AXI_GATING_VALID_OVERRIDE
505 		 * BIT before triggering Q6 MSS reset. AXI_GATING_VALID_OVERRIDE
506 		 * is withdrawn post MSS assert followed by a MSS deassert,
507 		 * while holding the PDC reset.
508 		 */
509 		reset_control_assert(qproc->pdc_reset);
510 		regmap_update_bits(qproc->conn_map, qproc->conn_box,
511 				   AXI_GATING_VALID_OVERRIDE, 1);
512 		reset_control_assert(qproc->mss_restart);
513 		reset_control_deassert(qproc->pdc_reset);
514 		regmap_update_bits(qproc->conn_map, qproc->conn_box,
515 				   AXI_GATING_VALID_OVERRIDE, 0);
516 		ret = reset_control_deassert(qproc->mss_restart);
517 	} else if (qproc->has_ext_cntl_regs) {
518 		regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
519 		reset_control_assert(qproc->pdc_reset);
520 		reset_control_assert(qproc->mss_restart);
521 		reset_control_deassert(qproc->pdc_reset);
522 		ret = reset_control_deassert(qproc->mss_restart);
523 	} else {
524 		ret = reset_control_assert(qproc->mss_restart);
525 	}
526 
527 	return ret;
528 }
529 
q6v5_reset_deassert(struct q6v5 * qproc)530 static int q6v5_reset_deassert(struct q6v5 *qproc)
531 {
532 	int ret;
533 
534 	if (qproc->has_alt_reset) {
535 		reset_control_assert(qproc->pdc_reset);
536 		writel(1, qproc->rmb_base + RMB_MBA_ALT_RESET);
537 		ret = reset_control_reset(qproc->mss_restart);
538 		writel(0, qproc->rmb_base + RMB_MBA_ALT_RESET);
539 		reset_control_deassert(qproc->pdc_reset);
540 	} else if (qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
541 		ret = reset_control_reset(qproc->mss_restart);
542 	} else {
543 		ret = reset_control_deassert(qproc->mss_restart);
544 	}
545 
546 	return ret;
547 }
548 
q6v5_rmb_pbl_wait(struct q6v5 * qproc,int ms)549 static int q6v5_rmb_pbl_wait(struct q6v5 *qproc, int ms)
550 {
551 	unsigned long timeout;
552 	s32 val;
553 
554 	timeout = jiffies + msecs_to_jiffies(ms);
555 	for (;;) {
556 		val = readl(qproc->rmb_base + RMB_PBL_STATUS_REG);
557 		if (val)
558 			break;
559 
560 		if (time_after(jiffies, timeout))
561 			return -ETIMEDOUT;
562 
563 		msleep(1);
564 	}
565 
566 	return val;
567 }
568 
q6v5_rmb_mba_wait(struct q6v5 * qproc,u32 status,int ms)569 static int q6v5_rmb_mba_wait(struct q6v5 *qproc, u32 status, int ms)
570 {
571 
572 	unsigned long timeout;
573 	s32 val;
574 
575 	timeout = jiffies + msecs_to_jiffies(ms);
576 	for (;;) {
577 		val = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
578 		if (val < 0)
579 			break;
580 
581 		if (!status && val)
582 			break;
583 		else if (status && val == status)
584 			break;
585 
586 		if (time_after(jiffies, timeout))
587 			return -ETIMEDOUT;
588 
589 		msleep(1);
590 	}
591 
592 	return val;
593 }
594 
q6v5_dump_mba_logs(struct q6v5 * qproc)595 static void q6v5_dump_mba_logs(struct q6v5 *qproc)
596 {
597 	struct rproc *rproc = qproc->rproc;
598 	void *data;
599 	void *mba_region;
600 
601 	if (!qproc->has_mba_logs)
602 		return;
603 
604 	if (q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false, qproc->mba_phys,
605 				    qproc->mba_size))
606 		return;
607 
608 	mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
609 	if (!mba_region)
610 		return;
611 
612 	data = vmalloc(MBA_LOG_SIZE);
613 	if (data) {
614 		memcpy(data, mba_region, MBA_LOG_SIZE);
615 		dev_coredumpv(&rproc->dev, data, MBA_LOG_SIZE, GFP_KERNEL);
616 	}
617 	memunmap(mba_region);
618 }
619 
q6v5proc_reset(struct q6v5 * qproc)620 static int q6v5proc_reset(struct q6v5 *qproc)
621 {
622 	u32 val;
623 	int ret;
624 	int i;
625 
626 	if (qproc->version == MSS_SDM845) {
627 		val = readl(qproc->reg_base + QDSP6SS_SLEEP);
628 		val |= Q6SS_CBCR_CLKEN;
629 		writel(val, qproc->reg_base + QDSP6SS_SLEEP);
630 
631 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
632 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
633 					 Q6SS_CBCR_TIMEOUT_US);
634 		if (ret) {
635 			dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
636 			return -ETIMEDOUT;
637 		}
638 
639 		/* De-assert QDSP6 stop core */
640 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
641 		/* Trigger boot FSM */
642 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
643 
644 		ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
645 				val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
646 		if (ret) {
647 			dev_err(qproc->dev, "Boot FSM failed to complete.\n");
648 			/* Reset the modem so that boot FSM is in reset state */
649 			q6v5_reset_deassert(qproc);
650 			return ret;
651 		}
652 
653 		goto pbl_wait;
654 	} else if (qproc->version == MSS_SC7180 || qproc->version == MSS_SC7280) {
655 		val = readl(qproc->reg_base + QDSP6SS_SLEEP);
656 		val |= Q6SS_CBCR_CLKEN;
657 		writel(val, qproc->reg_base + QDSP6SS_SLEEP);
658 
659 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
660 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
661 					 Q6SS_CBCR_TIMEOUT_US);
662 		if (ret) {
663 			dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
664 			return -ETIMEDOUT;
665 		}
666 
667 		/* Turn on the XO clock needed for PLL setup */
668 		val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
669 		val |= Q6SS_CBCR_CLKEN;
670 		writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
671 
672 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
673 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
674 					 Q6SS_CBCR_TIMEOUT_US);
675 		if (ret) {
676 			dev_err(qproc->dev, "QDSP6SS XO clock timed out\n");
677 			return -ETIMEDOUT;
678 		}
679 
680 		/* Configure Q6 core CBCR to auto-enable after reset sequence */
681 		val = readl(qproc->reg_base + QDSP6SS_CORE_CBCR);
682 		val |= Q6SS_CBCR_CLKEN;
683 		writel(val, qproc->reg_base + QDSP6SS_CORE_CBCR);
684 
685 		/* De-assert the Q6 stop core signal */
686 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
687 
688 		/* Wait for 10 us for any staggering logic to settle */
689 		usleep_range(10, 20);
690 
691 		/* Trigger the boot FSM to start the Q6 out-of-reset sequence */
692 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
693 
694 		/* Poll the MSS_STATUS for FSM completion */
695 		ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
696 					 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
697 		if (ret) {
698 			dev_err(qproc->dev, "Boot FSM failed to complete.\n");
699 			/* Reset the modem so that boot FSM is in reset state */
700 			q6v5_reset_deassert(qproc);
701 			return ret;
702 		}
703 		goto pbl_wait;
704 	} else if (qproc->version == MSS_MSM8909 ||
705 		   qproc->version == MSS_MSM8953 ||
706 		   qproc->version == MSS_MSM8996 ||
707 		   qproc->version == MSS_MSM8998 ||
708 		   qproc->version == MSS_SDM660) {
709 
710 		if (qproc->version != MSS_MSM8909 &&
711 		    qproc->version != MSS_MSM8953)
712 			/* Override the ACC value if required */
713 			writel(QDSP6SS_ACC_OVERRIDE_VAL,
714 			       qproc->reg_base + QDSP6SS_STRAP_ACC);
715 
716 		/* Assert resets, stop core */
717 		val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
718 		val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
719 		writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
720 
721 		/* BHS require xo cbcr to be enabled */
722 		val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
723 		val |= Q6SS_CBCR_CLKEN;
724 		writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
725 
726 		/* Read CLKOFF bit to go low indicating CLK is enabled */
727 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
728 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
729 					 Q6SS_CBCR_TIMEOUT_US);
730 		if (ret) {
731 			dev_err(qproc->dev,
732 				"xo cbcr enabling timed out (rc:%d)\n", ret);
733 			return ret;
734 		}
735 		/* Enable power block headswitch and wait for it to stabilize */
736 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
737 		val |= QDSP6v56_BHS_ON;
738 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
739 		val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
740 		udelay(1);
741 
742 		if (qproc->version == MSS_SDM660) {
743 			ret = readl_relaxed_poll_timeout(qproc->reg_base + QDSP6V62SS_BHS_STATUS,
744 							 i, (i & QDSP6v55_BHS_EN_REST_ACK),
745 							 1, BHS_CHECK_MAX_LOOPS);
746 			if (ret == -ETIMEDOUT) {
747 				dev_err(qproc->dev, "BHS_EN_REST_ACK not set!\n");
748 				return -ETIMEDOUT;
749 			}
750 		}
751 
752 		/* Put LDO in bypass mode */
753 		val |= QDSP6v56_LDO_BYP;
754 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
755 
756 		if (qproc->version != MSS_MSM8909) {
757 			int mem_pwr_ctl;
758 
759 			/* Deassert QDSP6 compiler memory clamp */
760 			val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
761 			val &= ~QDSP6v56_CLAMP_QMC_MEM;
762 			writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
763 
764 			/* Deassert memory peripheral sleep and L2 memory standby */
765 			val |= Q6SS_L2DATA_STBY_N | Q6SS_SLP_RET_N;
766 			writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
767 
768 			/* Turn on L1, L2, ETB and JU memories 1 at a time */
769 			if (qproc->version == MSS_MSM8953 ||
770 			    qproc->version == MSS_MSM8996) {
771 				mem_pwr_ctl = QDSP6SS_MEM_PWR_CTL;
772 				i = 19;
773 			} else {
774 				/* MSS_MSM8998, MSS_SDM660 */
775 				mem_pwr_ctl = QDSP6V6SS_MEM_PWR_CTL;
776 				i = 28;
777 			}
778 			val = readl(qproc->reg_base + mem_pwr_ctl);
779 			for (; i >= 0; i--) {
780 				val |= BIT(i);
781 				writel(val, qproc->reg_base + mem_pwr_ctl);
782 				/*
783 				 * Read back value to ensure the write is done then
784 				 * wait for 1us for both memory peripheral and data
785 				 * array to turn on.
786 				 */
787 				val |= readl(qproc->reg_base + mem_pwr_ctl);
788 				udelay(1);
789 			}
790 		} else {
791 			/* Turn on memories */
792 			val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
793 			val |= Q6SS_SLP_RET_N | Q6SS_L2DATA_STBY_N |
794 			       Q6SS_ETB_SLP_NRET_N | QDSP6V55_MEM_BITS;
795 			writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
796 
797 			/* Turn on L2 banks 1 at a time */
798 			for (i = 0; i <= 7; i++) {
799 				val |= BIT(i);
800 				writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
801 			}
802 		}
803 
804 		/* Remove word line clamp */
805 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
806 		val &= ~QDSP6v56_CLAMP_WL;
807 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
808 	} else {
809 		/* Assert resets, stop core */
810 		val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
811 		val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
812 		writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
813 
814 		/* Enable power block headswitch and wait for it to stabilize */
815 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
816 		val |= QDSS_BHS_ON | QDSS_LDO_BYP;
817 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
818 		val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
819 		udelay(1);
820 		/*
821 		 * Turn on memories. L2 banks should be done individually
822 		 * to minimize inrush current.
823 		 */
824 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
825 		val |= Q6SS_SLP_RET_N | Q6SS_L2TAG_SLP_NRET_N |
826 			Q6SS_ETB_SLP_NRET_N | Q6SS_L2DATA_STBY_N;
827 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
828 		val |= Q6SS_L2DATA_SLP_NRET_N_2;
829 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
830 		val |= Q6SS_L2DATA_SLP_NRET_N_1;
831 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
832 		val |= Q6SS_L2DATA_SLP_NRET_N_0;
833 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
834 	}
835 	/* Remove IO clamp */
836 	val &= ~Q6SS_CLAMP_IO;
837 	writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
838 
839 	/* Bring core out of reset */
840 	val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
841 	val &= ~Q6SS_CORE_ARES;
842 	writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
843 
844 	/* Turn on core clock */
845 	val = readl(qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
846 	val |= Q6SS_CLK_ENABLE;
847 	writel(val, qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
848 
849 	/* Start core execution */
850 	val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
851 	val &= ~Q6SS_STOP_CORE;
852 	writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
853 
854 pbl_wait:
855 	/* Wait for PBL status */
856 	ret = q6v5_rmb_pbl_wait(qproc, 1000);
857 	if (ret == -ETIMEDOUT) {
858 		dev_err(qproc->dev, "PBL boot timed out\n");
859 	} else if (ret != RMB_PBL_SUCCESS) {
860 		dev_err(qproc->dev, "PBL returned unexpected status %d\n", ret);
861 		ret = -EINVAL;
862 	} else {
863 		ret = 0;
864 	}
865 
866 	return ret;
867 }
868 
q6v5proc_enable_qchannel(struct q6v5 * qproc,struct regmap * map,u32 offset)869 static int q6v5proc_enable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
870 {
871 	unsigned int val;
872 	int ret;
873 
874 	if (!qproc->has_qaccept_regs)
875 		return 0;
876 
877 	if (qproc->has_ext_cntl_regs) {
878 		regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
879 		regmap_write(qproc->conn_map, qproc->force_clk_on, 1);
880 
881 		ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
882 					       !val, 1, Q6SS_CBCR_TIMEOUT_US);
883 		if (ret) {
884 			dev_err(qproc->dev, "failed to enable axim1 clock\n");
885 			return -ETIMEDOUT;
886 		}
887 	}
888 
889 	regmap_write(map, offset + QACCEPT_REQ_REG, 1);
890 
891 	/* Wait for accept */
892 	ret = regmap_read_poll_timeout(map, offset + QACCEPT_ACCEPT_REG, val, val, 5,
893 				       QACCEPT_TIMEOUT_US);
894 	if (ret) {
895 		dev_err(qproc->dev, "qchannel enable failed\n");
896 		return -ETIMEDOUT;
897 	}
898 
899 	return 0;
900 }
901 
q6v5proc_disable_qchannel(struct q6v5 * qproc,struct regmap * map,u32 offset)902 static void q6v5proc_disable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
903 {
904 	int ret;
905 	unsigned int val, retry;
906 	unsigned int nretry = 10;
907 	bool takedown_complete = false;
908 
909 	if (!qproc->has_qaccept_regs)
910 		return;
911 
912 	while (!takedown_complete && nretry) {
913 		nretry--;
914 
915 		/* Wait for active transactions to complete */
916 		regmap_read_poll_timeout(map, offset + QACCEPT_ACTIVE_REG, val, !val, 5,
917 					 QACCEPT_TIMEOUT_US);
918 
919 		/* Request Q-channel transaction takedown */
920 		regmap_write(map, offset + QACCEPT_REQ_REG, 0);
921 
922 		/*
923 		 * If the request is denied, reset the Q-channel takedown request,
924 		 * wait for active transactions to complete and retry takedown.
925 		 */
926 		retry = 10;
927 		while (retry) {
928 			usleep_range(5, 10);
929 			retry--;
930 			ret = regmap_read(map, offset + QACCEPT_DENY_REG, &val);
931 			if (!ret && val) {
932 				regmap_write(map, offset + QACCEPT_REQ_REG, 1);
933 				break;
934 			}
935 
936 			ret = regmap_read(map, offset + QACCEPT_ACCEPT_REG, &val);
937 			if (!ret && !val) {
938 				takedown_complete = true;
939 				break;
940 			}
941 		}
942 
943 		if (!retry)
944 			break;
945 	}
946 
947 	/* Rely on mss_restart to clear out pending transactions on takedown failure */
948 	if (!takedown_complete)
949 		dev_err(qproc->dev, "qchannel takedown failed\n");
950 }
951 
q6v5proc_halt_axi_port(struct q6v5 * qproc,struct regmap * halt_map,u32 offset)952 static void q6v5proc_halt_axi_port(struct q6v5 *qproc,
953 				   struct regmap *halt_map,
954 				   u32 offset)
955 {
956 	unsigned int val;
957 	int ret;
958 
959 	/* Check if we're already idle */
960 	ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
961 	if (!ret && val)
962 		return;
963 
964 	/* Assert halt request */
965 	regmap_write(halt_map, offset + AXI_HALTREQ_REG, 1);
966 
967 	/* Wait for halt */
968 	regmap_read_poll_timeout(halt_map, offset + AXI_HALTACK_REG, val,
969 				 val, 1000, HALT_ACK_TIMEOUT_US);
970 
971 	ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
972 	if (ret || !val)
973 		dev_err(qproc->dev, "port failed halt\n");
974 
975 	/* Clear halt request (port will remain halted until reset) */
976 	regmap_write(halt_map, offset + AXI_HALTREQ_REG, 0);
977 }
978 
q6v5_mpss_init_image(struct q6v5 * qproc,const struct firmware * fw,const char * fw_name)979 static int q6v5_mpss_init_image(struct q6v5 *qproc, const struct firmware *fw,
980 				const char *fw_name)
981 {
982 	unsigned long dma_attrs = DMA_ATTR_FORCE_CONTIGUOUS;
983 	dma_addr_t phys;
984 	void *metadata;
985 	u64 mdata_perm;
986 	int xferop_ret;
987 	size_t size;
988 	void *ptr;
989 	int ret;
990 
991 	metadata = qcom_mdt_read_metadata(fw, &size, fw_name, qproc->dev);
992 	if (IS_ERR(metadata))
993 		return PTR_ERR(metadata);
994 
995 	if (qproc->mdata_phys) {
996 		if (size > qproc->mdata_size) {
997 			ret = -EINVAL;
998 			dev_err(qproc->dev, "metadata size outside memory range\n");
999 			goto free_metadata;
1000 		}
1001 
1002 		phys = qproc->mdata_phys;
1003 		ptr = memremap(qproc->mdata_phys, size, MEMREMAP_WC);
1004 		if (!ptr) {
1005 			ret = -EBUSY;
1006 			dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
1007 				&qproc->mdata_phys, size);
1008 			goto free_metadata;
1009 		}
1010 	} else {
1011 		ptr = dma_alloc_attrs(qproc->dev, size, &phys, GFP_KERNEL, dma_attrs);
1012 		if (!ptr) {
1013 			ret = -ENOMEM;
1014 			dev_err(qproc->dev, "failed to allocate mdt buffer\n");
1015 			goto free_metadata;
1016 		}
1017 	}
1018 
1019 	memcpy(ptr, metadata, size);
1020 
1021 	if (qproc->mdata_phys)
1022 		memunmap(ptr);
1023 
1024 	/* Hypervisor mapping to access metadata by modem */
1025 	mdata_perm = BIT(QCOM_SCM_VMID_HLOS);
1026 	ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, false, true,
1027 				      phys, size);
1028 	if (ret) {
1029 		dev_err(qproc->dev,
1030 			"assigning Q6 access to metadata failed: %d\n", ret);
1031 		ret = -EAGAIN;
1032 		goto free_dma_attrs;
1033 	}
1034 
1035 	writel(phys, qproc->rmb_base + RMB_PMI_META_DATA_REG);
1036 	writel(RMB_CMD_META_DATA_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1037 
1038 	ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_META_DATA_AUTH_SUCCESS, 1000);
1039 	if (ret == -ETIMEDOUT)
1040 		dev_err(qproc->dev, "MPSS header authentication timed out\n");
1041 	else if (ret < 0)
1042 		dev_err(qproc->dev, "MPSS header authentication failed: %d\n", ret);
1043 
1044 	/* Metadata authentication done, remove modem access */
1045 	xferop_ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, true, false,
1046 					     phys, size);
1047 	if (xferop_ret)
1048 		dev_warn(qproc->dev,
1049 			 "mdt buffer not reclaimed system may become unstable\n");
1050 
1051 free_dma_attrs:
1052 	if (!qproc->mdata_phys)
1053 		dma_free_attrs(qproc->dev, size, ptr, phys, dma_attrs);
1054 free_metadata:
1055 	kfree(metadata);
1056 
1057 	return ret < 0 ? ret : 0;
1058 }
1059 
q6v5_phdr_valid(const struct elf32_phdr * phdr)1060 static bool q6v5_phdr_valid(const struct elf32_phdr *phdr)
1061 {
1062 	if (phdr->p_type != PT_LOAD)
1063 		return false;
1064 
1065 	if ((phdr->p_flags & QCOM_MDT_TYPE_MASK) == QCOM_MDT_TYPE_HASH)
1066 		return false;
1067 
1068 	if (!phdr->p_memsz)
1069 		return false;
1070 
1071 	return true;
1072 }
1073 
q6v5_mba_load(struct q6v5 * qproc)1074 static int q6v5_mba_load(struct q6v5 *qproc)
1075 {
1076 	int ret;
1077 	int xfermemop_ret;
1078 	bool mba_load_err = false;
1079 
1080 	ret = qcom_q6v5_prepare(&qproc->q6v5);
1081 	if (ret)
1082 		return ret;
1083 
1084 	ret = q6v5_pds_enable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1085 	if (ret < 0) {
1086 		dev_err(qproc->dev, "failed to enable proxy power domains\n");
1087 		goto disable_irqs;
1088 	}
1089 
1090 	ret = q6v5_regulator_enable(qproc, qproc->fallback_proxy_regs,
1091 				    qproc->fallback_proxy_reg_count);
1092 	if (ret) {
1093 		dev_err(qproc->dev, "failed to enable fallback proxy supplies\n");
1094 		goto disable_proxy_pds;
1095 	}
1096 
1097 	ret = q6v5_regulator_enable(qproc, qproc->proxy_regs,
1098 				    qproc->proxy_reg_count);
1099 	if (ret) {
1100 		dev_err(qproc->dev, "failed to enable proxy supplies\n");
1101 		goto disable_fallback_proxy_reg;
1102 	}
1103 
1104 	ret = q6v5_clk_enable(qproc->dev, qproc->proxy_clks,
1105 			      qproc->proxy_clk_count);
1106 	if (ret) {
1107 		dev_err(qproc->dev, "failed to enable proxy clocks\n");
1108 		goto disable_proxy_reg;
1109 	}
1110 
1111 	ret = q6v5_regulator_enable(qproc, qproc->active_regs,
1112 				    qproc->active_reg_count);
1113 	if (ret) {
1114 		dev_err(qproc->dev, "failed to enable supplies\n");
1115 		goto disable_proxy_clk;
1116 	}
1117 
1118 	ret = q6v5_clk_enable(qproc->dev, qproc->reset_clks,
1119 			      qproc->reset_clk_count);
1120 	if (ret) {
1121 		dev_err(qproc->dev, "failed to enable reset clocks\n");
1122 		goto disable_vdd;
1123 	}
1124 
1125 	ret = q6v5_reset_deassert(qproc);
1126 	if (ret) {
1127 		dev_err(qproc->dev, "failed to deassert mss restart\n");
1128 		goto disable_reset_clks;
1129 	}
1130 
1131 	ret = q6v5_clk_enable(qproc->dev, qproc->active_clks,
1132 			      qproc->active_clk_count);
1133 	if (ret) {
1134 		dev_err(qproc->dev, "failed to enable clocks\n");
1135 		goto assert_reset;
1136 	}
1137 
1138 	ret = q6v5proc_enable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1139 	if (ret) {
1140 		dev_err(qproc->dev, "failed to enable axi bridge\n");
1141 		goto disable_active_clks;
1142 	}
1143 
1144 	/*
1145 	 * Some versions of the MBA firmware will upon boot wipe the MPSS region as well, so provide
1146 	 * the Q6 access to this region.
1147 	 */
1148 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1149 				      qproc->mpss_phys, qproc->mpss_size);
1150 	if (ret) {
1151 		dev_err(qproc->dev, "assigning Q6 access to mpss memory failed: %d\n", ret);
1152 		goto disable_active_clks;
1153 	}
1154 
1155 	/* Assign MBA image access in DDR to q6 */
1156 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, false, true,
1157 				      qproc->mba_phys, qproc->mba_size);
1158 	if (ret) {
1159 		dev_err(qproc->dev,
1160 			"assigning Q6 access to mba memory failed: %d\n", ret);
1161 		goto disable_active_clks;
1162 	}
1163 
1164 	if (qproc->has_mba_logs)
1165 		qcom_pil_info_store("mba", qproc->mba_phys, MBA_LOG_SIZE);
1166 
1167 	writel(qproc->mba_phys, qproc->rmb_base + RMB_MBA_IMAGE_REG);
1168 	if (qproc->dp_size) {
1169 		writel(qproc->mba_phys + SZ_1M, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1170 		writel(qproc->dp_size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1171 	}
1172 
1173 	ret = q6v5proc_reset(qproc);
1174 	if (ret)
1175 		goto reclaim_mba;
1176 
1177 	ret = q6v5_rmb_mba_wait(qproc, 0, 5000);
1178 	if (ret == -ETIMEDOUT) {
1179 		dev_err(qproc->dev, "MBA boot timed out\n");
1180 		goto halt_axi_ports;
1181 	} else if (ret != RMB_MBA_XPU_UNLOCKED &&
1182 		   ret != RMB_MBA_XPU_UNLOCKED_SCRIBBLED) {
1183 		dev_err(qproc->dev, "MBA returned unexpected status %d\n", ret);
1184 		ret = -EINVAL;
1185 		goto halt_axi_ports;
1186 	}
1187 
1188 	qproc->dump_mba_loaded = true;
1189 	return 0;
1190 
1191 halt_axi_ports:
1192 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1193 	if (qproc->has_vq6)
1194 		q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1195 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1196 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1197 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1198 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1199 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1200 	mba_load_err = true;
1201 reclaim_mba:
1202 	xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1203 						false, qproc->mba_phys,
1204 						qproc->mba_size);
1205 	if (xfermemop_ret) {
1206 		dev_err(qproc->dev,
1207 			"Failed to reclaim mba buffer, system may become unstable\n");
1208 	} else if (mba_load_err) {
1209 		q6v5_dump_mba_logs(qproc);
1210 	}
1211 
1212 disable_active_clks:
1213 	q6v5_clk_disable(qproc->dev, qproc->active_clks,
1214 			 qproc->active_clk_count);
1215 assert_reset:
1216 	q6v5_reset_assert(qproc);
1217 disable_reset_clks:
1218 	q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1219 			 qproc->reset_clk_count);
1220 disable_vdd:
1221 	q6v5_regulator_disable(qproc, qproc->active_regs,
1222 			       qproc->active_reg_count);
1223 disable_proxy_clk:
1224 	q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1225 			 qproc->proxy_clk_count);
1226 disable_proxy_reg:
1227 	q6v5_regulator_disable(qproc, qproc->proxy_regs,
1228 			       qproc->proxy_reg_count);
1229 disable_fallback_proxy_reg:
1230 	q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1231 			       qproc->fallback_proxy_reg_count);
1232 disable_proxy_pds:
1233 	q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1234 disable_irqs:
1235 	qcom_q6v5_unprepare(&qproc->q6v5);
1236 
1237 	return ret;
1238 }
1239 
q6v5_mba_reclaim(struct q6v5 * qproc)1240 static void q6v5_mba_reclaim(struct q6v5 *qproc)
1241 {
1242 	int ret;
1243 	u32 val;
1244 
1245 	qproc->dump_mba_loaded = false;
1246 	qproc->dp_size = 0;
1247 
1248 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1249 	if (qproc->has_vq6)
1250 		q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1251 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1252 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1253 	if (qproc->version == MSS_MSM8996) {
1254 		/*
1255 		 * To avoid high MX current during LPASS/MSS restart.
1256 		 */
1257 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1258 		val |= Q6SS_CLAMP_IO | QDSP6v56_CLAMP_WL |
1259 			QDSP6v56_CLAMP_QMC_MEM;
1260 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1261 	}
1262 
1263 	if (qproc->has_ext_cntl_regs) {
1264 		regmap_write(qproc->conn_map, qproc->rscc_disable, 1);
1265 
1266 		ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
1267 					       !val, 1, Q6SS_CBCR_TIMEOUT_US);
1268 		if (ret)
1269 			dev_err(qproc->dev, "failed to enable axim1 clock\n");
1270 
1271 		ret = regmap_read_poll_timeout(qproc->halt_map, qproc->crypto_clk_off, val,
1272 					       !val, 1, Q6SS_CBCR_TIMEOUT_US);
1273 		if (ret)
1274 			dev_err(qproc->dev, "failed to enable crypto clock\n");
1275 	}
1276 
1277 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1278 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1279 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1280 
1281 	q6v5_reset_assert(qproc);
1282 
1283 	q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1284 			 qproc->reset_clk_count);
1285 	q6v5_clk_disable(qproc->dev, qproc->active_clks,
1286 			 qproc->active_clk_count);
1287 	q6v5_regulator_disable(qproc, qproc->active_regs,
1288 			       qproc->active_reg_count);
1289 
1290 	/* In case of failure or coredump scenario where reclaiming MBA memory
1291 	 * could not happen reclaim it here.
1292 	 */
1293 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false,
1294 				      qproc->mba_phys,
1295 				      qproc->mba_size);
1296 	WARN_ON(ret);
1297 
1298 	ret = qcom_q6v5_unprepare(&qproc->q6v5);
1299 	if (ret) {
1300 		q6v5_pds_disable(qproc, qproc->proxy_pds,
1301 				 qproc->proxy_pd_count);
1302 		q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1303 				 qproc->proxy_clk_count);
1304 		q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1305 				       qproc->fallback_proxy_reg_count);
1306 		q6v5_regulator_disable(qproc, qproc->proxy_regs,
1307 				       qproc->proxy_reg_count);
1308 	}
1309 }
1310 
q6v5_reload_mba(struct rproc * rproc)1311 static int q6v5_reload_mba(struct rproc *rproc)
1312 {
1313 	struct q6v5 *qproc = rproc->priv;
1314 	const struct firmware *fw;
1315 	int ret;
1316 
1317 	ret = request_firmware(&fw, rproc->firmware, qproc->dev);
1318 	if (ret < 0)
1319 		return ret;
1320 
1321 	q6v5_load(rproc, fw);
1322 	ret = q6v5_mba_load(qproc);
1323 	release_firmware(fw);
1324 
1325 	return ret;
1326 }
1327 
q6v5_mpss_load(struct q6v5 * qproc)1328 static int q6v5_mpss_load(struct q6v5 *qproc)
1329 {
1330 	const struct elf32_phdr *phdrs;
1331 	const struct elf32_phdr *phdr;
1332 	const struct firmware *seg_fw;
1333 	const struct firmware *fw;
1334 	struct elf32_hdr *ehdr;
1335 	phys_addr_t mpss_reloc;
1336 	phys_addr_t boot_addr;
1337 	phys_addr_t min_addr = PHYS_ADDR_MAX;
1338 	phys_addr_t max_addr = 0;
1339 	u32 code_length;
1340 	bool relocate = false;
1341 	char *fw_name;
1342 	size_t fw_name_len;
1343 	ssize_t offset;
1344 	size_t size = 0;
1345 	void *ptr;
1346 	int ret;
1347 	int i;
1348 
1349 	fw_name_len = strlen(qproc->hexagon_mdt_image);
1350 	if (fw_name_len <= 4)
1351 		return -EINVAL;
1352 
1353 	fw_name = kstrdup(qproc->hexagon_mdt_image, GFP_KERNEL);
1354 	if (!fw_name)
1355 		return -ENOMEM;
1356 
1357 	ret = request_firmware(&fw, fw_name, qproc->dev);
1358 	if (ret < 0) {
1359 		dev_err(qproc->dev, "unable to load %s\n", fw_name);
1360 		goto out;
1361 	}
1362 
1363 	/* Initialize the RMB validator */
1364 	writel(0, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1365 
1366 	ret = q6v5_mpss_init_image(qproc, fw, qproc->hexagon_mdt_image);
1367 	if (ret)
1368 		goto release_firmware;
1369 
1370 	ehdr = (struct elf32_hdr *)fw->data;
1371 	phdrs = (struct elf32_phdr *)(ehdr + 1);
1372 
1373 	for (i = 0; i < ehdr->e_phnum; i++) {
1374 		phdr = &phdrs[i];
1375 
1376 		if (!q6v5_phdr_valid(phdr))
1377 			continue;
1378 
1379 		if (phdr->p_flags & QCOM_MDT_RELOCATABLE)
1380 			relocate = true;
1381 
1382 		if (phdr->p_paddr < min_addr)
1383 			min_addr = phdr->p_paddr;
1384 
1385 		if (phdr->p_paddr + phdr->p_memsz > max_addr)
1386 			max_addr = ALIGN(phdr->p_paddr + phdr->p_memsz, SZ_4K);
1387 	}
1388 
1389 	if (qproc->version == MSS_MSM8953) {
1390 		ret = qcom_scm_pas_mem_setup(MPSS_PAS_ID, qproc->mpss_phys, qproc->mpss_size);
1391 		if (ret) {
1392 			dev_err(qproc->dev,
1393 				"setting up mpss memory failed: %d\n", ret);
1394 			goto release_firmware;
1395 		}
1396 	}
1397 
1398 	/*
1399 	 * In case of a modem subsystem restart on secure devices, the modem
1400 	 * memory can be reclaimed only after MBA is loaded.
1401 	 */
1402 	q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, false,
1403 				qproc->mpss_phys, qproc->mpss_size);
1404 
1405 	/* Share ownership between Linux and MSS, during segment loading */
1406 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, true,
1407 				      qproc->mpss_phys, qproc->mpss_size);
1408 	if (ret) {
1409 		dev_err(qproc->dev,
1410 			"assigning Q6 access to mpss memory failed: %d\n", ret);
1411 		ret = -EAGAIN;
1412 		goto release_firmware;
1413 	}
1414 
1415 	mpss_reloc = relocate ? min_addr : qproc->mpss_phys;
1416 	qproc->mpss_reloc = mpss_reloc;
1417 	/* Load firmware segments */
1418 	for (i = 0; i < ehdr->e_phnum; i++) {
1419 		phdr = &phdrs[i];
1420 
1421 		if (!q6v5_phdr_valid(phdr))
1422 			continue;
1423 
1424 		offset = phdr->p_paddr - mpss_reloc;
1425 		if (offset < 0 || offset + phdr->p_memsz > qproc->mpss_size) {
1426 			dev_err(qproc->dev, "segment outside memory range\n");
1427 			ret = -EINVAL;
1428 			goto release_firmware;
1429 		}
1430 
1431 		if (phdr->p_filesz > phdr->p_memsz) {
1432 			dev_err(qproc->dev,
1433 				"refusing to load segment %d with p_filesz > p_memsz\n",
1434 				i);
1435 			ret = -EINVAL;
1436 			goto release_firmware;
1437 		}
1438 
1439 		ptr = memremap(qproc->mpss_phys + offset, phdr->p_memsz, MEMREMAP_WC);
1440 		if (!ptr) {
1441 			dev_err(qproc->dev,
1442 				"unable to map memory region: %pa+%zx-%x\n",
1443 				&qproc->mpss_phys, offset, phdr->p_memsz);
1444 			goto release_firmware;
1445 		}
1446 
1447 		if (phdr->p_filesz && phdr->p_offset < fw->size) {
1448 			/* Firmware is large enough to be non-split */
1449 			if (phdr->p_offset + phdr->p_filesz > fw->size) {
1450 				dev_err(qproc->dev,
1451 					"failed to load segment %d from truncated file %s\n",
1452 					i, fw_name);
1453 				ret = -EINVAL;
1454 				memunmap(ptr);
1455 				goto release_firmware;
1456 			}
1457 
1458 			memcpy(ptr, fw->data + phdr->p_offset, phdr->p_filesz);
1459 		} else if (phdr->p_filesz) {
1460 			/* Replace "xxx.xxx" with "xxx.bxx" */
1461 			sprintf(fw_name + fw_name_len - 3, "b%02d", i);
1462 			ret = request_firmware_into_buf(&seg_fw, fw_name, qproc->dev,
1463 							ptr, phdr->p_filesz);
1464 			if (ret) {
1465 				dev_err(qproc->dev, "failed to load %s\n", fw_name);
1466 				memunmap(ptr);
1467 				goto release_firmware;
1468 			}
1469 
1470 			if (seg_fw->size != phdr->p_filesz) {
1471 				dev_err(qproc->dev,
1472 					"failed to load segment %d from truncated file %s\n",
1473 					i, fw_name);
1474 				ret = -EINVAL;
1475 				release_firmware(seg_fw);
1476 				memunmap(ptr);
1477 				goto release_firmware;
1478 			}
1479 
1480 			release_firmware(seg_fw);
1481 		}
1482 
1483 		if (phdr->p_memsz > phdr->p_filesz) {
1484 			memset(ptr + phdr->p_filesz, 0,
1485 			       phdr->p_memsz - phdr->p_filesz);
1486 		}
1487 		memunmap(ptr);
1488 		size += phdr->p_memsz;
1489 
1490 		code_length = readl(qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1491 		if (!code_length) {
1492 			boot_addr = relocate ? qproc->mpss_phys : min_addr;
1493 			writel(boot_addr, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1494 			writel(RMB_CMD_LOAD_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1495 		}
1496 		writel(size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1497 
1498 		ret = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
1499 		if (ret < 0) {
1500 			dev_err(qproc->dev, "MPSS authentication failed: %d\n",
1501 				ret);
1502 			goto release_firmware;
1503 		}
1504 	}
1505 
1506 	/* Transfer ownership of modem ddr region to q6 */
1507 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1508 				      qproc->mpss_phys, qproc->mpss_size);
1509 	if (ret) {
1510 		dev_err(qproc->dev,
1511 			"assigning Q6 access to mpss memory failed: %d\n", ret);
1512 		ret = -EAGAIN;
1513 		goto release_firmware;
1514 	}
1515 
1516 	ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_AUTH_COMPLETE, 10000);
1517 	if (ret == -ETIMEDOUT)
1518 		dev_err(qproc->dev, "MPSS authentication timed out\n");
1519 	else if (ret < 0)
1520 		dev_err(qproc->dev, "MPSS authentication failed: %d\n", ret);
1521 
1522 	qcom_pil_info_store("modem", qproc->mpss_phys, qproc->mpss_size);
1523 
1524 release_firmware:
1525 	release_firmware(fw);
1526 out:
1527 	kfree(fw_name);
1528 
1529 	return ret < 0 ? ret : 0;
1530 }
1531 
qcom_q6v5_dump_segment(struct rproc * rproc,struct rproc_dump_segment * segment,void * dest,size_t cp_offset,size_t size)1532 static void qcom_q6v5_dump_segment(struct rproc *rproc,
1533 				   struct rproc_dump_segment *segment,
1534 				   void *dest, size_t cp_offset, size_t size)
1535 {
1536 	int ret = 0;
1537 	struct q6v5 *qproc = rproc->priv;
1538 	int offset = segment->da - qproc->mpss_reloc;
1539 	void *ptr = NULL;
1540 
1541 	/* Unlock mba before copying segments */
1542 	if (!qproc->dump_mba_loaded) {
1543 		ret = q6v5_reload_mba(rproc);
1544 		if (!ret) {
1545 			/* Reset ownership back to Linux to copy segments */
1546 			ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1547 						      true, false,
1548 						      qproc->mpss_phys,
1549 						      qproc->mpss_size);
1550 		}
1551 	}
1552 
1553 	if (!ret)
1554 		ptr = memremap(qproc->mpss_phys + offset + cp_offset, size, MEMREMAP_WC);
1555 
1556 	if (ptr) {
1557 		memcpy(dest, ptr, size);
1558 		memunmap(ptr);
1559 	} else {
1560 		memset(dest, 0xff, size);
1561 	}
1562 
1563 	qproc->current_dump_size += size;
1564 
1565 	/* Reclaim mba after copying segments */
1566 	if (qproc->current_dump_size == qproc->total_dump_size) {
1567 		if (qproc->dump_mba_loaded) {
1568 			/* Try to reset ownership back to Q6 */
1569 			q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1570 						false, true,
1571 						qproc->mpss_phys,
1572 						qproc->mpss_size);
1573 			q6v5_mba_reclaim(qproc);
1574 		}
1575 	}
1576 }
1577 
q6v5_start(struct rproc * rproc)1578 static int q6v5_start(struct rproc *rproc)
1579 {
1580 	struct q6v5 *qproc = rproc->priv;
1581 	int xfermemop_ret;
1582 	int ret;
1583 
1584 	ret = q6v5_mba_load(qproc);
1585 	if (ret)
1586 		return ret;
1587 
1588 	dev_info(qproc->dev, "MBA booted with%s debug policy, loading mpss\n",
1589 		 qproc->dp_size ? "" : "out");
1590 
1591 	ret = q6v5_mpss_load(qproc);
1592 	if (ret)
1593 		goto reclaim_mpss;
1594 
1595 	ret = qcom_q6v5_wait_for_start(&qproc->q6v5, msecs_to_jiffies(5000));
1596 	if (ret == -ETIMEDOUT) {
1597 		dev_err(qproc->dev, "start timed out\n");
1598 		goto reclaim_mpss;
1599 	}
1600 
1601 	xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1602 						false, qproc->mba_phys,
1603 						qproc->mba_size);
1604 	if (xfermemop_ret)
1605 		dev_err(qproc->dev,
1606 			"Failed to reclaim mba buffer system may become unstable\n");
1607 
1608 	/* Reset Dump Segment Mask */
1609 	qproc->current_dump_size = 0;
1610 
1611 	return 0;
1612 
1613 reclaim_mpss:
1614 	q6v5_mba_reclaim(qproc);
1615 	q6v5_dump_mba_logs(qproc);
1616 
1617 	return ret;
1618 }
1619 
q6v5_stop(struct rproc * rproc)1620 static int q6v5_stop(struct rproc *rproc)
1621 {
1622 	struct q6v5 *qproc = rproc->priv;
1623 	int ret;
1624 
1625 	ret = qcom_q6v5_request_stop(&qproc->q6v5, qproc->sysmon);
1626 	if (ret == -ETIMEDOUT)
1627 		dev_err(qproc->dev, "timed out on wait\n");
1628 
1629 	q6v5_mba_reclaim(qproc);
1630 
1631 	return 0;
1632 }
1633 
qcom_q6v5_register_dump_segments(struct rproc * rproc,const struct firmware * mba_fw)1634 static int qcom_q6v5_register_dump_segments(struct rproc *rproc,
1635 					    const struct firmware *mba_fw)
1636 {
1637 	const struct firmware *fw;
1638 	const struct elf32_phdr *phdrs;
1639 	const struct elf32_phdr *phdr;
1640 	const struct elf32_hdr *ehdr;
1641 	struct q6v5 *qproc = rproc->priv;
1642 	unsigned long i;
1643 	int ret;
1644 
1645 	ret = request_firmware(&fw, qproc->hexagon_mdt_image, qproc->dev);
1646 	if (ret < 0) {
1647 		dev_err(qproc->dev, "unable to load %s\n",
1648 			qproc->hexagon_mdt_image);
1649 		return ret;
1650 	}
1651 
1652 	rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
1653 
1654 	ehdr = (struct elf32_hdr *)fw->data;
1655 	phdrs = (struct elf32_phdr *)(ehdr + 1);
1656 	qproc->total_dump_size = 0;
1657 
1658 	for (i = 0; i < ehdr->e_phnum; i++) {
1659 		phdr = &phdrs[i];
1660 
1661 		if (!q6v5_phdr_valid(phdr))
1662 			continue;
1663 
1664 		ret = rproc_coredump_add_custom_segment(rproc, phdr->p_paddr,
1665 							phdr->p_memsz,
1666 							qcom_q6v5_dump_segment,
1667 							NULL);
1668 		if (ret)
1669 			break;
1670 
1671 		qproc->total_dump_size += phdr->p_memsz;
1672 	}
1673 
1674 	release_firmware(fw);
1675 	return ret;
1676 }
1677 
q6v5_panic(struct rproc * rproc)1678 static unsigned long q6v5_panic(struct rproc *rproc)
1679 {
1680 	struct q6v5 *qproc = rproc->priv;
1681 
1682 	return qcom_q6v5_panic(&qproc->q6v5);
1683 }
1684 
1685 static const struct rproc_ops q6v5_ops = {
1686 	.start = q6v5_start,
1687 	.stop = q6v5_stop,
1688 	.parse_fw = qcom_q6v5_register_dump_segments,
1689 	.load = q6v5_load,
1690 	.panic = q6v5_panic,
1691 };
1692 
qcom_msa_handover(struct qcom_q6v5 * q6v5)1693 static void qcom_msa_handover(struct qcom_q6v5 *q6v5)
1694 {
1695 	struct q6v5 *qproc = container_of(q6v5, struct q6v5, q6v5);
1696 
1697 	q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1698 			 qproc->proxy_clk_count);
1699 	q6v5_regulator_disable(qproc, qproc->proxy_regs,
1700 			       qproc->proxy_reg_count);
1701 	q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1702 			       qproc->fallback_proxy_reg_count);
1703 	q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1704 }
1705 
q6v5_init_mem(struct q6v5 * qproc,struct platform_device * pdev)1706 static int q6v5_init_mem(struct q6v5 *qproc, struct platform_device *pdev)
1707 {
1708 	struct of_phandle_args args;
1709 	int halt_cell_cnt = 3;
1710 	int ret;
1711 
1712 	qproc->reg_base = devm_platform_ioremap_resource_byname(pdev, "qdsp6");
1713 	if (IS_ERR(qproc->reg_base))
1714 		return PTR_ERR(qproc->reg_base);
1715 
1716 	qproc->rmb_base = devm_platform_ioremap_resource_byname(pdev, "rmb");
1717 	if (IS_ERR(qproc->rmb_base))
1718 		return PTR_ERR(qproc->rmb_base);
1719 
1720 	if (qproc->has_vq6)
1721 		halt_cell_cnt++;
1722 
1723 	ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1724 					       "qcom,halt-regs", halt_cell_cnt, 0, &args);
1725 	if (ret < 0) {
1726 		dev_err(&pdev->dev, "failed to parse qcom,halt-regs\n");
1727 		return -EINVAL;
1728 	}
1729 
1730 	qproc->halt_map = syscon_node_to_regmap(args.np);
1731 	of_node_put(args.np);
1732 	if (IS_ERR(qproc->halt_map))
1733 		return PTR_ERR(qproc->halt_map);
1734 
1735 	qproc->halt_q6 = args.args[0];
1736 	qproc->halt_modem = args.args[1];
1737 	qproc->halt_nc = args.args[2];
1738 
1739 	if (qproc->has_vq6)
1740 		qproc->halt_vq6 = args.args[3];
1741 
1742 	if (qproc->has_qaccept_regs) {
1743 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1744 						       "qcom,qaccept-regs",
1745 						       3, 0, &args);
1746 		if (ret < 0) {
1747 			dev_err(&pdev->dev, "failed to parse qaccept-regs\n");
1748 			return -EINVAL;
1749 		}
1750 
1751 		qproc->qaccept_mdm = args.args[0];
1752 		qproc->qaccept_cx = args.args[1];
1753 		qproc->qaccept_axi = args.args[2];
1754 	}
1755 
1756 	if (qproc->has_ext_cntl_regs) {
1757 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1758 						       "qcom,ext-regs",
1759 						       2, 0, &args);
1760 		if (ret < 0) {
1761 			dev_err(&pdev->dev, "failed to parse ext-regs index 0\n");
1762 			return -EINVAL;
1763 		}
1764 
1765 		qproc->conn_map = syscon_node_to_regmap(args.np);
1766 		of_node_put(args.np);
1767 		if (IS_ERR(qproc->conn_map))
1768 			return PTR_ERR(qproc->conn_map);
1769 
1770 		qproc->force_clk_on = args.args[0];
1771 		qproc->rscc_disable = args.args[1];
1772 
1773 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1774 						       "qcom,ext-regs",
1775 						       2, 1, &args);
1776 		if (ret < 0) {
1777 			dev_err(&pdev->dev, "failed to parse ext-regs index 1\n");
1778 			return -EINVAL;
1779 		}
1780 
1781 		qproc->axim1_clk_off = args.args[0];
1782 		qproc->crypto_clk_off = args.args[1];
1783 	}
1784 
1785 	if (qproc->has_spare_reg) {
1786 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1787 						       "qcom,spare-regs",
1788 						       1, 0, &args);
1789 		if (ret < 0) {
1790 			dev_err(&pdev->dev, "failed to parse spare-regs\n");
1791 			return -EINVAL;
1792 		}
1793 
1794 		qproc->conn_map = syscon_node_to_regmap(args.np);
1795 		of_node_put(args.np);
1796 		if (IS_ERR(qproc->conn_map))
1797 			return PTR_ERR(qproc->conn_map);
1798 
1799 		qproc->conn_box = args.args[0];
1800 	}
1801 
1802 	return 0;
1803 }
1804 
q6v5_init_clocks(struct device * dev,struct clk ** clks,char ** clk_names)1805 static int q6v5_init_clocks(struct device *dev, struct clk **clks,
1806 		char **clk_names)
1807 {
1808 	int i;
1809 
1810 	if (!clk_names)
1811 		return 0;
1812 
1813 	for (i = 0; clk_names[i]; i++) {
1814 		clks[i] = devm_clk_get(dev, clk_names[i]);
1815 		if (IS_ERR(clks[i])) {
1816 			int rc = PTR_ERR(clks[i]);
1817 
1818 			if (rc != -EPROBE_DEFER)
1819 				dev_err(dev, "Failed to get %s clock\n",
1820 					clk_names[i]);
1821 			return rc;
1822 		}
1823 	}
1824 
1825 	return i;
1826 }
1827 
q6v5_pds_attach(struct device * dev,struct device ** devs,char ** pd_names)1828 static int q6v5_pds_attach(struct device *dev, struct device **devs,
1829 			   char **pd_names)
1830 {
1831 	size_t num_pds = 0;
1832 	int ret;
1833 	int i;
1834 
1835 	if (!pd_names)
1836 		return 0;
1837 
1838 	while (pd_names[num_pds])
1839 		num_pds++;
1840 
1841 	/* Handle single power domain */
1842 	if (num_pds == 1 && dev->pm_domain) {
1843 		devs[0] = dev;
1844 		pm_runtime_enable(dev);
1845 		return 1;
1846 	}
1847 
1848 	for (i = 0; i < num_pds; i++) {
1849 		devs[i] = dev_pm_domain_attach_by_name(dev, pd_names[i]);
1850 		if (IS_ERR_OR_NULL(devs[i])) {
1851 			ret = PTR_ERR(devs[i]) ? : -ENODATA;
1852 			goto unroll_attach;
1853 		}
1854 	}
1855 
1856 	return num_pds;
1857 
1858 unroll_attach:
1859 	for (i--; i >= 0; i--)
1860 		dev_pm_domain_detach(devs[i], false);
1861 
1862 	return ret;
1863 }
1864 
q6v5_pds_detach(struct q6v5 * qproc,struct device ** pds,size_t pd_count)1865 static void q6v5_pds_detach(struct q6v5 *qproc, struct device **pds,
1866 			    size_t pd_count)
1867 {
1868 	struct device *dev = qproc->dev;
1869 	int i;
1870 
1871 	/* Handle single power domain */
1872 	if (pd_count == 1 && dev->pm_domain) {
1873 		pm_runtime_disable(dev);
1874 		return;
1875 	}
1876 
1877 	for (i = 0; i < pd_count; i++)
1878 		dev_pm_domain_detach(pds[i], false);
1879 }
1880 
q6v5_init_reset(struct q6v5 * qproc)1881 static int q6v5_init_reset(struct q6v5 *qproc)
1882 {
1883 	qproc->mss_restart = devm_reset_control_get_exclusive(qproc->dev,
1884 							      "mss_restart");
1885 	if (IS_ERR(qproc->mss_restart)) {
1886 		dev_err(qproc->dev, "failed to acquire mss restart\n");
1887 		return PTR_ERR(qproc->mss_restart);
1888 	}
1889 
1890 	if (qproc->has_alt_reset || qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
1891 		qproc->pdc_reset = devm_reset_control_get_exclusive(qproc->dev,
1892 								    "pdc_reset");
1893 		if (IS_ERR(qproc->pdc_reset)) {
1894 			dev_err(qproc->dev, "failed to acquire pdc reset\n");
1895 			return PTR_ERR(qproc->pdc_reset);
1896 		}
1897 	}
1898 
1899 	return 0;
1900 }
1901 
q6v5_alloc_memory_region(struct q6v5 * qproc)1902 static int q6v5_alloc_memory_region(struct q6v5 *qproc)
1903 {
1904 	struct device_node *child;
1905 	struct reserved_mem *rmem;
1906 	struct device_node *node;
1907 
1908 	/*
1909 	 * In the absence of mba/mpss sub-child, extract the mba and mpss
1910 	 * reserved memory regions from device's memory-region property.
1911 	 */
1912 	child = of_get_child_by_name(qproc->dev->of_node, "mba");
1913 	if (!child) {
1914 		node = of_parse_phandle(qproc->dev->of_node,
1915 					"memory-region", 0);
1916 	} else {
1917 		node = of_parse_phandle(child, "memory-region", 0);
1918 		of_node_put(child);
1919 	}
1920 
1921 	if (!node) {
1922 		dev_err(qproc->dev, "no mba memory-region specified\n");
1923 		return -EINVAL;
1924 	}
1925 
1926 	rmem = of_reserved_mem_lookup(node);
1927 	of_node_put(node);
1928 	if (!rmem) {
1929 		dev_err(qproc->dev, "unable to resolve mba region\n");
1930 		return -EINVAL;
1931 	}
1932 
1933 	qproc->mba_phys = rmem->base;
1934 	qproc->mba_size = rmem->size;
1935 
1936 	if (!child) {
1937 		node = of_parse_phandle(qproc->dev->of_node,
1938 					"memory-region", 1);
1939 	} else {
1940 		child = of_get_child_by_name(qproc->dev->of_node, "mpss");
1941 		node = of_parse_phandle(child, "memory-region", 0);
1942 		of_node_put(child);
1943 	}
1944 
1945 	if (!node) {
1946 		dev_err(qproc->dev, "no mpss memory-region specified\n");
1947 		return -EINVAL;
1948 	}
1949 
1950 	rmem = of_reserved_mem_lookup(node);
1951 	of_node_put(node);
1952 	if (!rmem) {
1953 		dev_err(qproc->dev, "unable to resolve mpss region\n");
1954 		return -EINVAL;
1955 	}
1956 
1957 	qproc->mpss_phys = qproc->mpss_reloc = rmem->base;
1958 	qproc->mpss_size = rmem->size;
1959 
1960 	if (!child) {
1961 		node = of_parse_phandle(qproc->dev->of_node, "memory-region", 2);
1962 	} else {
1963 		child = of_get_child_by_name(qproc->dev->of_node, "metadata");
1964 		node = of_parse_phandle(child, "memory-region", 0);
1965 		of_node_put(child);
1966 	}
1967 
1968 	if (!node)
1969 		return 0;
1970 
1971 	rmem = of_reserved_mem_lookup(node);
1972 	if (!rmem) {
1973 		dev_err(qproc->dev, "unable to resolve metadata region\n");
1974 		return -EINVAL;
1975 	}
1976 
1977 	qproc->mdata_phys = rmem->base;
1978 	qproc->mdata_size = rmem->size;
1979 
1980 	return 0;
1981 }
1982 
q6v5_probe(struct platform_device * pdev)1983 static int q6v5_probe(struct platform_device *pdev)
1984 {
1985 	const struct rproc_hexagon_res *desc;
1986 	struct device_node *node;
1987 	struct q6v5 *qproc;
1988 	struct rproc *rproc;
1989 	const char *mba_image;
1990 	int ret;
1991 
1992 	desc = of_device_get_match_data(&pdev->dev);
1993 	if (!desc)
1994 		return -EINVAL;
1995 
1996 	if (desc->need_mem_protection && !qcom_scm_is_available())
1997 		return -EPROBE_DEFER;
1998 
1999 	mba_image = desc->hexagon_mba_image;
2000 	ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
2001 					    0, &mba_image);
2002 	if (ret < 0 && ret != -EINVAL) {
2003 		dev_err(&pdev->dev, "unable to read mba firmware-name\n");
2004 		return ret;
2005 	}
2006 
2007 	rproc = rproc_alloc(&pdev->dev, pdev->name, &q6v5_ops,
2008 			    mba_image, sizeof(*qproc));
2009 	if (!rproc) {
2010 		dev_err(&pdev->dev, "failed to allocate rproc\n");
2011 		return -ENOMEM;
2012 	}
2013 
2014 	rproc->auto_boot = false;
2015 	rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
2016 
2017 	qproc = rproc->priv;
2018 	qproc->dev = &pdev->dev;
2019 	qproc->rproc = rproc;
2020 	qproc->hexagon_mdt_image = "modem.mdt";
2021 	ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
2022 					    1, &qproc->hexagon_mdt_image);
2023 	if (ret < 0 && ret != -EINVAL) {
2024 		dev_err(&pdev->dev, "unable to read mpss firmware-name\n");
2025 		goto free_rproc;
2026 	}
2027 
2028 	platform_set_drvdata(pdev, qproc);
2029 
2030 	qproc->has_qaccept_regs = desc->has_qaccept_regs;
2031 	qproc->has_ext_cntl_regs = desc->has_ext_cntl_regs;
2032 	qproc->has_vq6 = desc->has_vq6;
2033 	qproc->has_spare_reg = desc->has_spare_reg;
2034 	ret = q6v5_init_mem(qproc, pdev);
2035 	if (ret)
2036 		goto free_rproc;
2037 
2038 	ret = q6v5_alloc_memory_region(qproc);
2039 	if (ret)
2040 		goto free_rproc;
2041 
2042 	ret = q6v5_init_clocks(&pdev->dev, qproc->proxy_clks,
2043 			       desc->proxy_clk_names);
2044 	if (ret < 0) {
2045 		dev_err(&pdev->dev, "Failed to get proxy clocks.\n");
2046 		goto free_rproc;
2047 	}
2048 	qproc->proxy_clk_count = ret;
2049 
2050 	ret = q6v5_init_clocks(&pdev->dev, qproc->reset_clks,
2051 			       desc->reset_clk_names);
2052 	if (ret < 0) {
2053 		dev_err(&pdev->dev, "Failed to get reset clocks.\n");
2054 		goto free_rproc;
2055 	}
2056 	qproc->reset_clk_count = ret;
2057 
2058 	ret = q6v5_init_clocks(&pdev->dev, qproc->active_clks,
2059 			       desc->active_clk_names);
2060 	if (ret < 0) {
2061 		dev_err(&pdev->dev, "Failed to get active clocks.\n");
2062 		goto free_rproc;
2063 	}
2064 	qproc->active_clk_count = ret;
2065 
2066 	ret = q6v5_regulator_init(&pdev->dev, qproc->proxy_regs,
2067 				  desc->proxy_supply);
2068 	if (ret < 0) {
2069 		dev_err(&pdev->dev, "Failed to get proxy regulators.\n");
2070 		goto free_rproc;
2071 	}
2072 	qproc->proxy_reg_count = ret;
2073 
2074 	ret = q6v5_regulator_init(&pdev->dev,  qproc->active_regs,
2075 				  desc->active_supply);
2076 	if (ret < 0) {
2077 		dev_err(&pdev->dev, "Failed to get active regulators.\n");
2078 		goto free_rproc;
2079 	}
2080 	qproc->active_reg_count = ret;
2081 
2082 	ret = q6v5_pds_attach(&pdev->dev, qproc->proxy_pds,
2083 			      desc->proxy_pd_names);
2084 	/* Fallback to regulators for old device trees */
2085 	if (ret == -ENODATA && desc->fallback_proxy_supply) {
2086 		ret = q6v5_regulator_init(&pdev->dev,
2087 					  qproc->fallback_proxy_regs,
2088 					  desc->fallback_proxy_supply);
2089 		if (ret < 0) {
2090 			dev_err(&pdev->dev, "Failed to get fallback proxy regulators.\n");
2091 			goto free_rproc;
2092 		}
2093 		qproc->fallback_proxy_reg_count = ret;
2094 	} else if (ret < 0) {
2095 		dev_err(&pdev->dev, "Failed to init power domains\n");
2096 		goto free_rproc;
2097 	} else {
2098 		qproc->proxy_pd_count = ret;
2099 	}
2100 
2101 	qproc->has_alt_reset = desc->has_alt_reset;
2102 	ret = q6v5_init_reset(qproc);
2103 	if (ret)
2104 		goto detach_proxy_pds;
2105 
2106 	qproc->version = desc->version;
2107 	qproc->need_mem_protection = desc->need_mem_protection;
2108 	qproc->has_mba_logs = desc->has_mba_logs;
2109 
2110 	ret = qcom_q6v5_init(&qproc->q6v5, pdev, rproc, MPSS_CRASH_REASON_SMEM, "modem",
2111 			     qcom_msa_handover);
2112 	if (ret)
2113 		goto detach_proxy_pds;
2114 
2115 	qproc->mpss_perm = BIT(QCOM_SCM_VMID_HLOS);
2116 	qproc->mba_perm = BIT(QCOM_SCM_VMID_HLOS);
2117 	qcom_add_glink_subdev(rproc, &qproc->glink_subdev, "mpss");
2118 	qcom_add_smd_subdev(rproc, &qproc->smd_subdev);
2119 	qcom_add_ssr_subdev(rproc, &qproc->ssr_subdev, "mpss");
2120 	qproc->sysmon = qcom_add_sysmon_subdev(rproc, "modem", 0x12);
2121 	if (IS_ERR(qproc->sysmon)) {
2122 		ret = PTR_ERR(qproc->sysmon);
2123 		goto remove_subdevs;
2124 	}
2125 
2126 	ret = rproc_add(rproc);
2127 	if (ret)
2128 		goto remove_sysmon_subdev;
2129 
2130 	node = of_get_compatible_child(pdev->dev.of_node, "qcom,bam-dmux");
2131 	qproc->bam_dmux = of_platform_device_create(node, NULL, &pdev->dev);
2132 	of_node_put(node);
2133 
2134 	return 0;
2135 
2136 remove_sysmon_subdev:
2137 	qcom_remove_sysmon_subdev(qproc->sysmon);
2138 remove_subdevs:
2139 	qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2140 	qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2141 	qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2142 detach_proxy_pds:
2143 	q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2144 free_rproc:
2145 	rproc_free(rproc);
2146 
2147 	return ret;
2148 }
2149 
q6v5_remove(struct platform_device * pdev)2150 static void q6v5_remove(struct platform_device *pdev)
2151 {
2152 	struct q6v5 *qproc = platform_get_drvdata(pdev);
2153 	struct rproc *rproc = qproc->rproc;
2154 
2155 	if (qproc->bam_dmux)
2156 		of_platform_device_destroy(&qproc->bam_dmux->dev, NULL);
2157 	rproc_del(rproc);
2158 
2159 	qcom_q6v5_deinit(&qproc->q6v5);
2160 	qcom_remove_sysmon_subdev(qproc->sysmon);
2161 	qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2162 	qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2163 	qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2164 
2165 	q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2166 
2167 	rproc_free(rproc);
2168 }
2169 
2170 static const struct rproc_hexagon_res sc7180_mss = {
2171 	.hexagon_mba_image = "mba.mbn",
2172 	.proxy_clk_names = (char*[]){
2173 		"xo",
2174 		NULL
2175 	},
2176 	.reset_clk_names = (char*[]){
2177 		"iface",
2178 		"bus",
2179 		"snoc_axi",
2180 		NULL
2181 	},
2182 	.active_clk_names = (char*[]){
2183 		"mnoc_axi",
2184 		"nav",
2185 		NULL
2186 	},
2187 	.proxy_pd_names = (char*[]){
2188 		"cx",
2189 		"mx",
2190 		"mss",
2191 		NULL
2192 	},
2193 	.need_mem_protection = true,
2194 	.has_alt_reset = false,
2195 	.has_mba_logs = true,
2196 	.has_spare_reg = true,
2197 	.has_qaccept_regs = false,
2198 	.has_ext_cntl_regs = false,
2199 	.has_vq6 = false,
2200 	.version = MSS_SC7180,
2201 };
2202 
2203 static const struct rproc_hexagon_res sc7280_mss = {
2204 	.hexagon_mba_image = "mba.mbn",
2205 	.proxy_clk_names = (char*[]){
2206 		"xo",
2207 		"pka",
2208 		NULL
2209 	},
2210 	.active_clk_names = (char*[]){
2211 		"iface",
2212 		"offline",
2213 		"snoc_axi",
2214 		NULL
2215 	},
2216 	.proxy_pd_names = (char*[]){
2217 		"cx",
2218 		"mss",
2219 		NULL
2220 	},
2221 	.need_mem_protection = true,
2222 	.has_alt_reset = false,
2223 	.has_mba_logs = true,
2224 	.has_spare_reg = false,
2225 	.has_qaccept_regs = true,
2226 	.has_ext_cntl_regs = true,
2227 	.has_vq6 = true,
2228 	.version = MSS_SC7280,
2229 };
2230 
2231 static const struct rproc_hexagon_res sdm660_mss = {
2232 	.hexagon_mba_image = "mba.mbn",
2233 	.proxy_clk_names = (char*[]){
2234 			"xo",
2235 			"qdss",
2236 			"mem",
2237 			NULL
2238 	},
2239 	.active_clk_names = (char*[]){
2240 			"iface",
2241 			"bus",
2242 			"gpll0_mss",
2243 			"mnoc_axi",
2244 			"snoc_axi",
2245 			NULL
2246 	},
2247 	.proxy_pd_names = (char*[]){
2248 			"cx",
2249 			"mx",
2250 			NULL
2251 	},
2252 	.need_mem_protection = true,
2253 	.has_alt_reset = false,
2254 	.has_mba_logs = false,
2255 	.has_spare_reg = false,
2256 	.has_qaccept_regs = false,
2257 	.has_ext_cntl_regs = false,
2258 	.has_vq6 = false,
2259 	.version = MSS_SDM660,
2260 };
2261 
2262 static const struct rproc_hexagon_res sdm845_mss = {
2263 	.hexagon_mba_image = "mba.mbn",
2264 	.proxy_clk_names = (char*[]){
2265 			"xo",
2266 			"prng",
2267 			NULL
2268 	},
2269 	.reset_clk_names = (char*[]){
2270 			"iface",
2271 			"snoc_axi",
2272 			NULL
2273 	},
2274 	.active_clk_names = (char*[]){
2275 			"bus",
2276 			"mem",
2277 			"gpll0_mss",
2278 			"mnoc_axi",
2279 			NULL
2280 	},
2281 	.proxy_pd_names = (char*[]){
2282 			"cx",
2283 			"mx",
2284 			"mss",
2285 			NULL
2286 	},
2287 	.need_mem_protection = true,
2288 	.has_alt_reset = true,
2289 	.has_mba_logs = false,
2290 	.has_spare_reg = false,
2291 	.has_qaccept_regs = false,
2292 	.has_ext_cntl_regs = false,
2293 	.has_vq6 = false,
2294 	.version = MSS_SDM845,
2295 };
2296 
2297 static const struct rproc_hexagon_res msm8998_mss = {
2298 	.hexagon_mba_image = "mba.mbn",
2299 	.proxy_clk_names = (char*[]){
2300 			"xo",
2301 			"qdss",
2302 			"mem",
2303 			NULL
2304 	},
2305 	.active_clk_names = (char*[]){
2306 			"iface",
2307 			"bus",
2308 			"gpll0_mss",
2309 			"mnoc_axi",
2310 			"snoc_axi",
2311 			NULL
2312 	},
2313 	.proxy_pd_names = (char*[]){
2314 			"cx",
2315 			"mx",
2316 			NULL
2317 	},
2318 	.need_mem_protection = true,
2319 	.has_alt_reset = false,
2320 	.has_mba_logs = false,
2321 	.has_spare_reg = false,
2322 	.has_qaccept_regs = false,
2323 	.has_ext_cntl_regs = false,
2324 	.has_vq6 = false,
2325 	.version = MSS_MSM8998,
2326 };
2327 
2328 static const struct rproc_hexagon_res msm8996_mss = {
2329 	.hexagon_mba_image = "mba.mbn",
2330 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2331 		{
2332 			.supply = "pll",
2333 			.uA = 100000,
2334 		},
2335 		{}
2336 	},
2337 	.proxy_clk_names = (char*[]){
2338 			"xo",
2339 			"pnoc",
2340 			"qdss",
2341 			NULL
2342 	},
2343 	.active_clk_names = (char*[]){
2344 			"iface",
2345 			"bus",
2346 			"mem",
2347 			"gpll0_mss",
2348 			"snoc_axi",
2349 			"mnoc_axi",
2350 			NULL
2351 	},
2352 	.proxy_pd_names = (char*[]){
2353 			"mx",
2354 			"cx",
2355 			NULL
2356 	},
2357 	.need_mem_protection = true,
2358 	.has_alt_reset = false,
2359 	.has_mba_logs = false,
2360 	.has_spare_reg = false,
2361 	.has_qaccept_regs = false,
2362 	.has_ext_cntl_regs = false,
2363 	.has_vq6 = false,
2364 	.version = MSS_MSM8996,
2365 };
2366 
2367 static const struct rproc_hexagon_res msm8909_mss = {
2368 	.hexagon_mba_image = "mba.mbn",
2369 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2370 		{
2371 			.supply = "pll",
2372 			.uA = 100000,
2373 		},
2374 		{}
2375 	},
2376 	.proxy_clk_names = (char*[]){
2377 		"xo",
2378 		NULL
2379 	},
2380 	.active_clk_names = (char*[]){
2381 		"iface",
2382 		"bus",
2383 		"mem",
2384 		NULL
2385 	},
2386 	.proxy_pd_names = (char*[]){
2387 		"mx",
2388 		"cx",
2389 		NULL
2390 	},
2391 	.need_mem_protection = false,
2392 	.has_alt_reset = false,
2393 	.has_mba_logs = false,
2394 	.has_spare_reg = false,
2395 	.has_qaccept_regs = false,
2396 	.has_ext_cntl_regs = false,
2397 	.has_vq6 = false,
2398 	.version = MSS_MSM8909,
2399 };
2400 
2401 static const struct rproc_hexagon_res msm8916_mss = {
2402 	.hexagon_mba_image = "mba.mbn",
2403 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2404 		{
2405 			.supply = "pll",
2406 			.uA = 100000,
2407 		},
2408 		{}
2409 	},
2410 	.fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2411 		{
2412 			.supply = "mx",
2413 			.uV = 1050000,
2414 		},
2415 		{
2416 			.supply = "cx",
2417 			.uA = 100000,
2418 		},
2419 		{}
2420 	},
2421 	.proxy_clk_names = (char*[]){
2422 		"xo",
2423 		NULL
2424 	},
2425 	.active_clk_names = (char*[]){
2426 		"iface",
2427 		"bus",
2428 		"mem",
2429 		NULL
2430 	},
2431 	.proxy_pd_names = (char*[]){
2432 		"mx",
2433 		"cx",
2434 		NULL
2435 	},
2436 	.need_mem_protection = false,
2437 	.has_alt_reset = false,
2438 	.has_mba_logs = false,
2439 	.has_spare_reg = false,
2440 	.has_qaccept_regs = false,
2441 	.has_ext_cntl_regs = false,
2442 	.has_vq6 = false,
2443 	.version = MSS_MSM8916,
2444 };
2445 
2446 static const struct rproc_hexagon_res msm8953_mss = {
2447 	.hexagon_mba_image = "mba.mbn",
2448 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2449 		{
2450 			.supply = "pll",
2451 			.uA = 100000,
2452 		},
2453 		{}
2454 	},
2455 	.proxy_clk_names = (char*[]){
2456 		"xo",
2457 		NULL
2458 	},
2459 	.active_clk_names = (char*[]){
2460 		"iface",
2461 		"bus",
2462 		"mem",
2463 		NULL
2464 	},
2465 	.proxy_pd_names = (char*[]) {
2466 		"cx",
2467 		"mx",
2468 		"mss",
2469 		NULL
2470 	},
2471 	.need_mem_protection = false,
2472 	.has_alt_reset = false,
2473 	.has_mba_logs = false,
2474 	.has_spare_reg = false,
2475 	.has_qaccept_regs = false,
2476 	.has_ext_cntl_regs = false,
2477 	.has_vq6 = false,
2478 	.version = MSS_MSM8953,
2479 };
2480 
2481 static const struct rproc_hexagon_res msm8974_mss = {
2482 	.hexagon_mba_image = "mba.b00",
2483 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2484 		{
2485 			.supply = "pll",
2486 			.uA = 100000,
2487 		},
2488 		{
2489 			.supply = "mx",
2490 			.uV = 1050000,
2491 		},
2492 		{}
2493 	},
2494 	.fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2495 		{
2496 			.supply = "cx",
2497 			.uA = 100000,
2498 		},
2499 		{}
2500 	},
2501 	.active_supply = (struct qcom_mss_reg_res[]) {
2502 		{
2503 			.supply = "mss",
2504 			.uV = 1050000,
2505 			.uA = 100000,
2506 		},
2507 		{}
2508 	},
2509 	.proxy_clk_names = (char*[]){
2510 		"xo",
2511 		NULL
2512 	},
2513 	.active_clk_names = (char*[]){
2514 		"iface",
2515 		"bus",
2516 		"mem",
2517 		NULL
2518 	},
2519 	.proxy_pd_names = (char*[]){
2520 		"cx",
2521 		NULL
2522 	},
2523 	.need_mem_protection = false,
2524 	.has_alt_reset = false,
2525 	.has_mba_logs = false,
2526 	.has_spare_reg = false,
2527 	.has_qaccept_regs = false,
2528 	.has_ext_cntl_regs = false,
2529 	.has_vq6 = false,
2530 	.version = MSS_MSM8974,
2531 };
2532 
2533 static const struct of_device_id q6v5_of_match[] = {
2534 	{ .compatible = "qcom,q6v5-pil", .data = &msm8916_mss},
2535 	{ .compatible = "qcom,msm8909-mss-pil", .data = &msm8909_mss},
2536 	{ .compatible = "qcom,msm8916-mss-pil", .data = &msm8916_mss},
2537 	{ .compatible = "qcom,msm8953-mss-pil", .data = &msm8953_mss},
2538 	{ .compatible = "qcom,msm8974-mss-pil", .data = &msm8974_mss},
2539 	{ .compatible = "qcom,msm8996-mss-pil", .data = &msm8996_mss},
2540 	{ .compatible = "qcom,msm8998-mss-pil", .data = &msm8998_mss},
2541 	{ .compatible = "qcom,sc7180-mss-pil", .data = &sc7180_mss},
2542 	{ .compatible = "qcom,sc7280-mss-pil", .data = &sc7280_mss},
2543 	{ .compatible = "qcom,sdm660-mss-pil", .data = &sdm660_mss},
2544 	{ .compatible = "qcom,sdm845-mss-pil", .data = &sdm845_mss},
2545 	{ },
2546 };
2547 MODULE_DEVICE_TABLE(of, q6v5_of_match);
2548 
2549 static struct platform_driver q6v5_driver = {
2550 	.probe = q6v5_probe,
2551 	.remove_new = q6v5_remove,
2552 	.driver = {
2553 		.name = "qcom-q6v5-mss",
2554 		.of_match_table = q6v5_of_match,
2555 	},
2556 };
2557 module_platform_driver(q6v5_driver);
2558 
2559 MODULE_DESCRIPTION("Qualcomm Self-authenticating modem remoteproc driver");
2560 MODULE_LICENSE("GPL v2");
2561