1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Qualcomm self-authenticating modem subsystem remoteproc driver
4  *
5  * Copyright (C) 2016 Linaro Ltd.
6  * Copyright (C) 2014 Sony Mobile Communications AB
7  * Copyright (c) 2012-2013, The Linux Foundation. All rights reserved.
8  */
9 
10 #include <linux/clk.h>
11 #include <linux/delay.h>
12 #include <linux/devcoredump.h>
13 #include <linux/dma-mapping.h>
14 #include <linux/interrupt.h>
15 #include <linux/kernel.h>
16 #include <linux/mfd/syscon.h>
17 #include <linux/module.h>
18 #include <linux/of.h>
19 #include <linux/of_reserved_mem.h>
20 #include <linux/of_platform.h>
21 #include <linux/platform_device.h>
22 #include <linux/pm_domain.h>
23 #include <linux/pm_runtime.h>
24 #include <linux/regmap.h>
25 #include <linux/regulator/consumer.h>
26 #include <linux/remoteproc.h>
27 #include <linux/reset.h>
28 #include <linux/soc/qcom/mdt_loader.h>
29 #include <linux/iopoll.h>
30 #include <linux/slab.h>
31 
32 #include "remoteproc_internal.h"
33 #include "qcom_common.h"
34 #include "qcom_pil_info.h"
35 #include "qcom_q6v5.h"
36 
37 #include <linux/firmware/qcom/qcom_scm.h>
38 
39 #define MPSS_CRASH_REASON_SMEM		421
40 
41 #define MBA_LOG_SIZE			SZ_4K
42 
43 #define MPSS_PAS_ID			5
44 
45 /* RMB Status Register Values */
46 #define RMB_PBL_SUCCESS			0x1
47 
48 #define RMB_MBA_XPU_UNLOCKED		0x1
49 #define RMB_MBA_XPU_UNLOCKED_SCRIBBLED	0x2
50 #define RMB_MBA_META_DATA_AUTH_SUCCESS	0x3
51 #define RMB_MBA_AUTH_COMPLETE		0x4
52 
53 /* PBL/MBA interface registers */
54 #define RMB_MBA_IMAGE_REG		0x00
55 #define RMB_PBL_STATUS_REG		0x04
56 #define RMB_MBA_COMMAND_REG		0x08
57 #define RMB_MBA_STATUS_REG		0x0C
58 #define RMB_PMI_META_DATA_REG		0x10
59 #define RMB_PMI_CODE_START_REG		0x14
60 #define RMB_PMI_CODE_LENGTH_REG		0x18
61 #define RMB_MBA_MSS_STATUS		0x40
62 #define RMB_MBA_ALT_RESET		0x44
63 
64 #define RMB_CMD_META_DATA_READY		0x1
65 #define RMB_CMD_LOAD_READY		0x2
66 
67 /* QDSP6SS Register Offsets */
68 #define QDSP6SS_RESET_REG		0x014
69 #define QDSP6SS_GFMUX_CTL_REG		0x020
70 #define QDSP6SS_PWR_CTL_REG		0x030
71 #define QDSP6SS_MEM_PWR_CTL		0x0B0
72 #define QDSP6V6SS_MEM_PWR_CTL		0x034
73 #define QDSP6SS_STRAP_ACC		0x110
74 #define QDSP6V62SS_BHS_STATUS		0x0C4
75 
76 /* AXI Halt Register Offsets */
77 #define AXI_HALTREQ_REG			0x0
78 #define AXI_HALTACK_REG			0x4
79 #define AXI_IDLE_REG			0x8
80 #define AXI_GATING_VALID_OVERRIDE	BIT(0)
81 
82 #define HALT_ACK_TIMEOUT_US		100000
83 
84 /* QACCEPT Register Offsets */
85 #define QACCEPT_ACCEPT_REG		0x0
86 #define QACCEPT_ACTIVE_REG		0x4
87 #define QACCEPT_DENY_REG		0x8
88 #define QACCEPT_REQ_REG			0xC
89 
90 #define QACCEPT_TIMEOUT_US		50
91 
92 /* QDSP6SS_RESET */
93 #define Q6SS_STOP_CORE			BIT(0)
94 #define Q6SS_CORE_ARES			BIT(1)
95 #define Q6SS_BUS_ARES_ENABLE		BIT(2)
96 
97 /* QDSP6SS CBCR */
98 #define Q6SS_CBCR_CLKEN			BIT(0)
99 #define Q6SS_CBCR_CLKOFF		BIT(31)
100 #define Q6SS_CBCR_TIMEOUT_US		200
101 
102 /* QDSP6SS_GFMUX_CTL */
103 #define Q6SS_CLK_ENABLE			BIT(1)
104 
105 /* QDSP6SS_PWR_CTL */
106 #define Q6SS_L2DATA_SLP_NRET_N_0	BIT(0)
107 #define Q6SS_L2DATA_SLP_NRET_N_1	BIT(1)
108 #define Q6SS_L2DATA_SLP_NRET_N_2	BIT(2)
109 #define Q6SS_L2TAG_SLP_NRET_N		BIT(16)
110 #define Q6SS_ETB_SLP_NRET_N		BIT(17)
111 #define Q6SS_L2DATA_STBY_N		BIT(18)
112 #define Q6SS_SLP_RET_N			BIT(19)
113 #define Q6SS_CLAMP_IO			BIT(20)
114 #define QDSS_BHS_ON			BIT(21)
115 #define QDSS_LDO_BYP			BIT(22)
116 
117 /* QDSP6v55 parameters */
118 #define QDSP6V55_MEM_BITS		GENMASK(16, 8)
119 
120 /* QDSP6v56 parameters */
121 #define QDSP6v56_LDO_BYP		BIT(25)
122 #define QDSP6v56_BHS_ON		BIT(24)
123 #define QDSP6v56_CLAMP_WL		BIT(21)
124 #define QDSP6v56_CLAMP_QMC_MEM		BIT(22)
125 #define QDSP6SS_XO_CBCR		0x0038
126 #define QDSP6SS_ACC_OVERRIDE_VAL		0x20
127 #define QDSP6v55_BHS_EN_REST_ACK	BIT(0)
128 
129 /* QDSP6v65 parameters */
130 #define QDSP6SS_CORE_CBCR		0x20
131 #define QDSP6SS_SLEEP                   0x3C
132 #define QDSP6SS_BOOT_CORE_START         0x400
133 #define QDSP6SS_BOOT_CMD                0x404
134 #define BOOT_FSM_TIMEOUT                10000
135 #define BHS_CHECK_MAX_LOOPS             200
136 
137 struct reg_info {
138 	struct regulator *reg;
139 	int uV;
140 	int uA;
141 };
142 
143 struct qcom_mss_reg_res {
144 	const char *supply;
145 	int uV;
146 	int uA;
147 };
148 
149 struct rproc_hexagon_res {
150 	const char *hexagon_mba_image;
151 	struct qcom_mss_reg_res *proxy_supply;
152 	struct qcom_mss_reg_res *fallback_proxy_supply;
153 	struct qcom_mss_reg_res *active_supply;
154 	char **proxy_clk_names;
155 	char **reset_clk_names;
156 	char **active_clk_names;
157 	char **proxy_pd_names;
158 	int version;
159 	bool need_mem_protection;
160 	bool has_alt_reset;
161 	bool has_mba_logs;
162 	bool has_spare_reg;
163 	bool has_qaccept_regs;
164 	bool has_ext_cntl_regs;
165 	bool has_vq6;
166 };
167 
168 struct q6v5 {
169 	struct device *dev;
170 	struct rproc *rproc;
171 
172 	void __iomem *reg_base;
173 	void __iomem *rmb_base;
174 
175 	struct regmap *halt_map;
176 	struct regmap *conn_map;
177 
178 	u32 halt_q6;
179 	u32 halt_modem;
180 	u32 halt_nc;
181 	u32 halt_vq6;
182 	u32 conn_box;
183 
184 	u32 qaccept_mdm;
185 	u32 qaccept_cx;
186 	u32 qaccept_axi;
187 
188 	u32 axim1_clk_off;
189 	u32 crypto_clk_off;
190 	u32 force_clk_on;
191 	u32 rscc_disable;
192 
193 	struct reset_control *mss_restart;
194 	struct reset_control *pdc_reset;
195 
196 	struct qcom_q6v5 q6v5;
197 
198 	struct clk *active_clks[8];
199 	struct clk *reset_clks[4];
200 	struct clk *proxy_clks[4];
201 	struct device *proxy_pds[3];
202 	int active_clk_count;
203 	int reset_clk_count;
204 	int proxy_clk_count;
205 	int proxy_pd_count;
206 
207 	struct reg_info active_regs[1];
208 	struct reg_info proxy_regs[1];
209 	struct reg_info fallback_proxy_regs[2];
210 	int active_reg_count;
211 	int proxy_reg_count;
212 	int fallback_proxy_reg_count;
213 
214 	bool dump_mba_loaded;
215 	size_t current_dump_size;
216 	size_t total_dump_size;
217 
218 	phys_addr_t mba_phys;
219 	size_t mba_size;
220 	size_t dp_size;
221 
222 	phys_addr_t mdata_phys;
223 	size_t mdata_size;
224 
225 	phys_addr_t mpss_phys;
226 	phys_addr_t mpss_reloc;
227 	size_t mpss_size;
228 
229 	struct qcom_rproc_glink glink_subdev;
230 	struct qcom_rproc_subdev smd_subdev;
231 	struct qcom_rproc_pdm pdm_subdev;
232 	struct qcom_rproc_ssr ssr_subdev;
233 	struct qcom_sysmon *sysmon;
234 	struct platform_device *bam_dmux;
235 	bool need_mem_protection;
236 	bool has_alt_reset;
237 	bool has_mba_logs;
238 	bool has_spare_reg;
239 	bool has_qaccept_regs;
240 	bool has_ext_cntl_regs;
241 	bool has_vq6;
242 	u64 mpss_perm;
243 	u64 mba_perm;
244 	const char *hexagon_mdt_image;
245 	int version;
246 };
247 
248 enum {
249 	MSS_MSM8909,
250 	MSS_MSM8916,
251 	MSS_MSM8953,
252 	MSS_MSM8974,
253 	MSS_MSM8996,
254 	MSS_MSM8998,
255 	MSS_SC7180,
256 	MSS_SC7280,
257 	MSS_SDM660,
258 	MSS_SDM845,
259 };
260 
q6v5_regulator_init(struct device * dev,struct reg_info * regs,const struct qcom_mss_reg_res * reg_res)261 static int q6v5_regulator_init(struct device *dev, struct reg_info *regs,
262 			       const struct qcom_mss_reg_res *reg_res)
263 {
264 	int i;
265 
266 	if (!reg_res)
267 		return 0;
268 
269 	for (i = 0; reg_res[i].supply; i++) {
270 		regs[i].reg = devm_regulator_get(dev, reg_res[i].supply);
271 		if (IS_ERR(regs[i].reg))
272 			return dev_err_probe(dev, PTR_ERR(regs[i].reg),
273 					     "Failed to get %s\n regulator",
274 					     reg_res[i].supply);
275 
276 		regs[i].uV = reg_res[i].uV;
277 		regs[i].uA = reg_res[i].uA;
278 	}
279 
280 	return i;
281 }
282 
q6v5_regulator_enable(struct q6v5 * qproc,struct reg_info * regs,int count)283 static int q6v5_regulator_enable(struct q6v5 *qproc,
284 				 struct reg_info *regs, int count)
285 {
286 	int ret;
287 	int i;
288 
289 	for (i = 0; i < count; i++) {
290 		if (regs[i].uV > 0) {
291 			ret = regulator_set_voltage(regs[i].reg,
292 					regs[i].uV, INT_MAX);
293 			if (ret) {
294 				dev_err(qproc->dev,
295 					"Failed to request voltage for %d.\n",
296 						i);
297 				goto err;
298 			}
299 		}
300 
301 		if (regs[i].uA > 0) {
302 			ret = regulator_set_load(regs[i].reg,
303 						 regs[i].uA);
304 			if (ret < 0) {
305 				dev_err(qproc->dev,
306 					"Failed to set regulator mode\n");
307 				goto err;
308 			}
309 		}
310 
311 		ret = regulator_enable(regs[i].reg);
312 		if (ret) {
313 			dev_err(qproc->dev, "Regulator enable failed\n");
314 			goto err;
315 		}
316 	}
317 
318 	return 0;
319 err:
320 	for (; i >= 0; i--) {
321 		if (regs[i].uV > 0)
322 			regulator_set_voltage(regs[i].reg, 0, INT_MAX);
323 
324 		if (regs[i].uA > 0)
325 			regulator_set_load(regs[i].reg, 0);
326 
327 		regulator_disable(regs[i].reg);
328 	}
329 
330 	return ret;
331 }
332 
q6v5_regulator_disable(struct q6v5 * qproc,struct reg_info * regs,int count)333 static void q6v5_regulator_disable(struct q6v5 *qproc,
334 				   struct reg_info *regs, int count)
335 {
336 	int i;
337 
338 	for (i = 0; i < count; i++) {
339 		if (regs[i].uV > 0)
340 			regulator_set_voltage(regs[i].reg, 0, INT_MAX);
341 
342 		if (regs[i].uA > 0)
343 			regulator_set_load(regs[i].reg, 0);
344 
345 		regulator_disable(regs[i].reg);
346 	}
347 }
348 
q6v5_clk_enable(struct device * dev,struct clk ** clks,int count)349 static int q6v5_clk_enable(struct device *dev,
350 			   struct clk **clks, int count)
351 {
352 	int rc;
353 	int i;
354 
355 	for (i = 0; i < count; i++) {
356 		rc = clk_prepare_enable(clks[i]);
357 		if (rc) {
358 			dev_err(dev, "Clock enable failed\n");
359 			goto err;
360 		}
361 	}
362 
363 	return 0;
364 err:
365 	for (i--; i >= 0; i--)
366 		clk_disable_unprepare(clks[i]);
367 
368 	return rc;
369 }
370 
q6v5_clk_disable(struct device * dev,struct clk ** clks,int count)371 static void q6v5_clk_disable(struct device *dev,
372 			     struct clk **clks, int count)
373 {
374 	int i;
375 
376 	for (i = 0; i < count; i++)
377 		clk_disable_unprepare(clks[i]);
378 }
379 
q6v5_pds_enable(struct q6v5 * qproc,struct device ** pds,size_t pd_count)380 static int q6v5_pds_enable(struct q6v5 *qproc, struct device **pds,
381 			   size_t pd_count)
382 {
383 	int ret;
384 	int i;
385 
386 	for (i = 0; i < pd_count; i++) {
387 		dev_pm_genpd_set_performance_state(pds[i], INT_MAX);
388 		ret = pm_runtime_get_sync(pds[i]);
389 		if (ret < 0) {
390 			pm_runtime_put_noidle(pds[i]);
391 			dev_pm_genpd_set_performance_state(pds[i], 0);
392 			goto unroll_pd_votes;
393 		}
394 	}
395 
396 	return 0;
397 
398 unroll_pd_votes:
399 	for (i--; i >= 0; i--) {
400 		dev_pm_genpd_set_performance_state(pds[i], 0);
401 		pm_runtime_put(pds[i]);
402 	}
403 
404 	return ret;
405 }
406 
q6v5_pds_disable(struct q6v5 * qproc,struct device ** pds,size_t pd_count)407 static void q6v5_pds_disable(struct q6v5 *qproc, struct device **pds,
408 			     size_t pd_count)
409 {
410 	int i;
411 
412 	for (i = 0; i < pd_count; i++) {
413 		dev_pm_genpd_set_performance_state(pds[i], 0);
414 		pm_runtime_put(pds[i]);
415 	}
416 }
417 
q6v5_xfer_mem_ownership(struct q6v5 * qproc,u64 * current_perm,bool local,bool remote,phys_addr_t addr,size_t size)418 static int q6v5_xfer_mem_ownership(struct q6v5 *qproc, u64 *current_perm,
419 				   bool local, bool remote, phys_addr_t addr,
420 				   size_t size)
421 {
422 	struct qcom_scm_vmperm next[2];
423 	int perms = 0;
424 
425 	if (!qproc->need_mem_protection)
426 		return 0;
427 
428 	if (local == !!(*current_perm & BIT(QCOM_SCM_VMID_HLOS)) &&
429 	    remote == !!(*current_perm & BIT(QCOM_SCM_VMID_MSS_MSA)))
430 		return 0;
431 
432 	if (local) {
433 		next[perms].vmid = QCOM_SCM_VMID_HLOS;
434 		next[perms].perm = QCOM_SCM_PERM_RWX;
435 		perms++;
436 	}
437 
438 	if (remote) {
439 		next[perms].vmid = QCOM_SCM_VMID_MSS_MSA;
440 		next[perms].perm = QCOM_SCM_PERM_RW;
441 		perms++;
442 	}
443 
444 	return qcom_scm_assign_mem(addr, ALIGN(size, SZ_4K),
445 				   current_perm, next, perms);
446 }
447 
q6v5_debug_policy_load(struct q6v5 * qproc,void * mba_region)448 static void q6v5_debug_policy_load(struct q6v5 *qproc, void *mba_region)
449 {
450 	const struct firmware *dp_fw;
451 
452 	if (request_firmware_direct(&dp_fw, "msadp", qproc->dev))
453 		return;
454 
455 	if (SZ_1M + dp_fw->size <= qproc->mba_size) {
456 		memcpy(mba_region + SZ_1M, dp_fw->data, dp_fw->size);
457 		qproc->dp_size = dp_fw->size;
458 	}
459 
460 	release_firmware(dp_fw);
461 }
462 
q6v5_load(struct rproc * rproc,const struct firmware * fw)463 static int q6v5_load(struct rproc *rproc, const struct firmware *fw)
464 {
465 	struct q6v5 *qproc = rproc->priv;
466 	void *mba_region;
467 
468 	/* MBA is restricted to a maximum size of 1M */
469 	if (fw->size > qproc->mba_size || fw->size > SZ_1M) {
470 		dev_err(qproc->dev, "MBA firmware load failed\n");
471 		return -EINVAL;
472 	}
473 
474 	mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
475 	if (!mba_region) {
476 		dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
477 			&qproc->mba_phys, qproc->mba_size);
478 		return -EBUSY;
479 	}
480 
481 	memcpy(mba_region, fw->data, fw->size);
482 	q6v5_debug_policy_load(qproc, mba_region);
483 	memunmap(mba_region);
484 
485 	return 0;
486 }
487 
q6v5_reset_assert(struct q6v5 * qproc)488 static int q6v5_reset_assert(struct q6v5 *qproc)
489 {
490 	int ret;
491 
492 	if (qproc->has_alt_reset) {
493 		reset_control_assert(qproc->pdc_reset);
494 		ret = reset_control_reset(qproc->mss_restart);
495 		reset_control_deassert(qproc->pdc_reset);
496 	} else if (qproc->has_spare_reg) {
497 		/*
498 		 * When the AXI pipeline is being reset with the Q6 modem partly
499 		 * operational there is possibility of AXI valid signal to
500 		 * glitch, leading to spurious transactions and Q6 hangs. A work
501 		 * around is employed by asserting the AXI_GATING_VALID_OVERRIDE
502 		 * BIT before triggering Q6 MSS reset. AXI_GATING_VALID_OVERRIDE
503 		 * is withdrawn post MSS assert followed by a MSS deassert,
504 		 * while holding the PDC reset.
505 		 */
506 		reset_control_assert(qproc->pdc_reset);
507 		regmap_update_bits(qproc->conn_map, qproc->conn_box,
508 				   AXI_GATING_VALID_OVERRIDE, 1);
509 		reset_control_assert(qproc->mss_restart);
510 		reset_control_deassert(qproc->pdc_reset);
511 		regmap_update_bits(qproc->conn_map, qproc->conn_box,
512 				   AXI_GATING_VALID_OVERRIDE, 0);
513 		ret = reset_control_deassert(qproc->mss_restart);
514 	} else if (qproc->has_ext_cntl_regs) {
515 		regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
516 		reset_control_assert(qproc->pdc_reset);
517 		reset_control_assert(qproc->mss_restart);
518 		reset_control_deassert(qproc->pdc_reset);
519 		ret = reset_control_deassert(qproc->mss_restart);
520 	} else {
521 		ret = reset_control_assert(qproc->mss_restart);
522 	}
523 
524 	return ret;
525 }
526 
q6v5_reset_deassert(struct q6v5 * qproc)527 static int q6v5_reset_deassert(struct q6v5 *qproc)
528 {
529 	int ret;
530 
531 	if (qproc->has_alt_reset) {
532 		reset_control_assert(qproc->pdc_reset);
533 		writel(1, qproc->rmb_base + RMB_MBA_ALT_RESET);
534 		ret = reset_control_reset(qproc->mss_restart);
535 		writel(0, qproc->rmb_base + RMB_MBA_ALT_RESET);
536 		reset_control_deassert(qproc->pdc_reset);
537 	} else if (qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
538 		ret = reset_control_reset(qproc->mss_restart);
539 	} else {
540 		ret = reset_control_deassert(qproc->mss_restart);
541 	}
542 
543 	return ret;
544 }
545 
q6v5_rmb_pbl_wait(struct q6v5 * qproc,int ms)546 static int q6v5_rmb_pbl_wait(struct q6v5 *qproc, int ms)
547 {
548 	unsigned long timeout;
549 	s32 val;
550 
551 	timeout = jiffies + msecs_to_jiffies(ms);
552 	for (;;) {
553 		val = readl(qproc->rmb_base + RMB_PBL_STATUS_REG);
554 		if (val)
555 			break;
556 
557 		if (time_after(jiffies, timeout))
558 			return -ETIMEDOUT;
559 
560 		msleep(1);
561 	}
562 
563 	return val;
564 }
565 
q6v5_rmb_mba_wait(struct q6v5 * qproc,u32 status,int ms)566 static int q6v5_rmb_mba_wait(struct q6v5 *qproc, u32 status, int ms)
567 {
568 
569 	unsigned long timeout;
570 	s32 val;
571 
572 	timeout = jiffies + msecs_to_jiffies(ms);
573 	for (;;) {
574 		val = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
575 		if (val < 0)
576 			break;
577 
578 		if (!status && val)
579 			break;
580 		else if (status && val == status)
581 			break;
582 
583 		if (time_after(jiffies, timeout))
584 			return -ETIMEDOUT;
585 
586 		msleep(1);
587 	}
588 
589 	return val;
590 }
591 
q6v5_dump_mba_logs(struct q6v5 * qproc)592 static void q6v5_dump_mba_logs(struct q6v5 *qproc)
593 {
594 	struct rproc *rproc = qproc->rproc;
595 	void *data;
596 	void *mba_region;
597 
598 	if (!qproc->has_mba_logs)
599 		return;
600 
601 	if (q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false, qproc->mba_phys,
602 				    qproc->mba_size))
603 		return;
604 
605 	mba_region = memremap(qproc->mba_phys, qproc->mba_size, MEMREMAP_WC);
606 	if (!mba_region)
607 		return;
608 
609 	data = vmalloc(MBA_LOG_SIZE);
610 	if (data) {
611 		memcpy(data, mba_region, MBA_LOG_SIZE);
612 		dev_coredumpv(&rproc->dev, data, MBA_LOG_SIZE, GFP_KERNEL);
613 	}
614 	memunmap(mba_region);
615 }
616 
q6v5proc_reset(struct q6v5 * qproc)617 static int q6v5proc_reset(struct q6v5 *qproc)
618 {
619 	u32 val;
620 	int ret;
621 	int i;
622 
623 	if (qproc->version == MSS_SDM845) {
624 		val = readl(qproc->reg_base + QDSP6SS_SLEEP);
625 		val |= Q6SS_CBCR_CLKEN;
626 		writel(val, qproc->reg_base + QDSP6SS_SLEEP);
627 
628 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
629 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
630 					 Q6SS_CBCR_TIMEOUT_US);
631 		if (ret) {
632 			dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
633 			return -ETIMEDOUT;
634 		}
635 
636 		/* De-assert QDSP6 stop core */
637 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
638 		/* Trigger boot FSM */
639 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
640 
641 		ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
642 				val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
643 		if (ret) {
644 			dev_err(qproc->dev, "Boot FSM failed to complete.\n");
645 			/* Reset the modem so that boot FSM is in reset state */
646 			q6v5_reset_deassert(qproc);
647 			return ret;
648 		}
649 
650 		goto pbl_wait;
651 	} else if (qproc->version == MSS_SC7180 || qproc->version == MSS_SC7280) {
652 		val = readl(qproc->reg_base + QDSP6SS_SLEEP);
653 		val |= Q6SS_CBCR_CLKEN;
654 		writel(val, qproc->reg_base + QDSP6SS_SLEEP);
655 
656 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_SLEEP,
657 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
658 					 Q6SS_CBCR_TIMEOUT_US);
659 		if (ret) {
660 			dev_err(qproc->dev, "QDSP6SS Sleep clock timed out\n");
661 			return -ETIMEDOUT;
662 		}
663 
664 		/* Turn on the XO clock needed for PLL setup */
665 		val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
666 		val |= Q6SS_CBCR_CLKEN;
667 		writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
668 
669 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
670 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
671 					 Q6SS_CBCR_TIMEOUT_US);
672 		if (ret) {
673 			dev_err(qproc->dev, "QDSP6SS XO clock timed out\n");
674 			return -ETIMEDOUT;
675 		}
676 
677 		/* Configure Q6 core CBCR to auto-enable after reset sequence */
678 		val = readl(qproc->reg_base + QDSP6SS_CORE_CBCR);
679 		val |= Q6SS_CBCR_CLKEN;
680 		writel(val, qproc->reg_base + QDSP6SS_CORE_CBCR);
681 
682 		/* De-assert the Q6 stop core signal */
683 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CORE_START);
684 
685 		/* Wait for 10 us for any staggering logic to settle */
686 		usleep_range(10, 20);
687 
688 		/* Trigger the boot FSM to start the Q6 out-of-reset sequence */
689 		writel(1, qproc->reg_base + QDSP6SS_BOOT_CMD);
690 
691 		/* Poll the MSS_STATUS for FSM completion */
692 		ret = readl_poll_timeout(qproc->rmb_base + RMB_MBA_MSS_STATUS,
693 					 val, (val & BIT(0)) != 0, 10, BOOT_FSM_TIMEOUT);
694 		if (ret) {
695 			dev_err(qproc->dev, "Boot FSM failed to complete.\n");
696 			/* Reset the modem so that boot FSM is in reset state */
697 			q6v5_reset_deassert(qproc);
698 			return ret;
699 		}
700 		goto pbl_wait;
701 	} else if (qproc->version == MSS_MSM8909 ||
702 		   qproc->version == MSS_MSM8953 ||
703 		   qproc->version == MSS_MSM8996 ||
704 		   qproc->version == MSS_MSM8998 ||
705 		   qproc->version == MSS_SDM660) {
706 
707 		if (qproc->version != MSS_MSM8909 &&
708 		    qproc->version != MSS_MSM8953)
709 			/* Override the ACC value if required */
710 			writel(QDSP6SS_ACC_OVERRIDE_VAL,
711 			       qproc->reg_base + QDSP6SS_STRAP_ACC);
712 
713 		/* Assert resets, stop core */
714 		val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
715 		val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
716 		writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
717 
718 		/* BHS require xo cbcr to be enabled */
719 		val = readl(qproc->reg_base + QDSP6SS_XO_CBCR);
720 		val |= Q6SS_CBCR_CLKEN;
721 		writel(val, qproc->reg_base + QDSP6SS_XO_CBCR);
722 
723 		/* Read CLKOFF bit to go low indicating CLK is enabled */
724 		ret = readl_poll_timeout(qproc->reg_base + QDSP6SS_XO_CBCR,
725 					 val, !(val & Q6SS_CBCR_CLKOFF), 1,
726 					 Q6SS_CBCR_TIMEOUT_US);
727 		if (ret) {
728 			dev_err(qproc->dev,
729 				"xo cbcr enabling timed out (rc:%d)\n", ret);
730 			return ret;
731 		}
732 		/* Enable power block headswitch and wait for it to stabilize */
733 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
734 		val |= QDSP6v56_BHS_ON;
735 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
736 		val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
737 		udelay(1);
738 
739 		if (qproc->version == MSS_SDM660) {
740 			ret = readl_relaxed_poll_timeout(qproc->reg_base + QDSP6V62SS_BHS_STATUS,
741 							 i, (i & QDSP6v55_BHS_EN_REST_ACK),
742 							 1, BHS_CHECK_MAX_LOOPS);
743 			if (ret == -ETIMEDOUT) {
744 				dev_err(qproc->dev, "BHS_EN_REST_ACK not set!\n");
745 				return -ETIMEDOUT;
746 			}
747 		}
748 
749 		/* Put LDO in bypass mode */
750 		val |= QDSP6v56_LDO_BYP;
751 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
752 
753 		if (qproc->version != MSS_MSM8909) {
754 			int mem_pwr_ctl;
755 
756 			/* Deassert QDSP6 compiler memory clamp */
757 			val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
758 			val &= ~QDSP6v56_CLAMP_QMC_MEM;
759 			writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
760 
761 			/* Deassert memory peripheral sleep and L2 memory standby */
762 			val |= Q6SS_L2DATA_STBY_N | Q6SS_SLP_RET_N;
763 			writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
764 
765 			/* Turn on L1, L2, ETB and JU memories 1 at a time */
766 			if (qproc->version == MSS_MSM8953 ||
767 			    qproc->version == MSS_MSM8996) {
768 				mem_pwr_ctl = QDSP6SS_MEM_PWR_CTL;
769 				i = 19;
770 			} else {
771 				/* MSS_MSM8998, MSS_SDM660 */
772 				mem_pwr_ctl = QDSP6V6SS_MEM_PWR_CTL;
773 				i = 28;
774 			}
775 			val = readl(qproc->reg_base + mem_pwr_ctl);
776 			for (; i >= 0; i--) {
777 				val |= BIT(i);
778 				writel(val, qproc->reg_base + mem_pwr_ctl);
779 				/*
780 				 * Read back value to ensure the write is done then
781 				 * wait for 1us for both memory peripheral and data
782 				 * array to turn on.
783 				 */
784 				val |= readl(qproc->reg_base + mem_pwr_ctl);
785 				udelay(1);
786 			}
787 		} else {
788 			/* Turn on memories */
789 			val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
790 			val |= Q6SS_SLP_RET_N | Q6SS_L2DATA_STBY_N |
791 			       Q6SS_ETB_SLP_NRET_N | QDSP6V55_MEM_BITS;
792 			writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
793 
794 			/* Turn on L2 banks 1 at a time */
795 			for (i = 0; i <= 7; i++) {
796 				val |= BIT(i);
797 				writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
798 			}
799 		}
800 
801 		/* Remove word line clamp */
802 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
803 		val &= ~QDSP6v56_CLAMP_WL;
804 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
805 	} else {
806 		/* Assert resets, stop core */
807 		val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
808 		val |= Q6SS_CORE_ARES | Q6SS_BUS_ARES_ENABLE | Q6SS_STOP_CORE;
809 		writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
810 
811 		/* Enable power block headswitch and wait for it to stabilize */
812 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
813 		val |= QDSS_BHS_ON | QDSS_LDO_BYP;
814 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
815 		val |= readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
816 		udelay(1);
817 		/*
818 		 * Turn on memories. L2 banks should be done individually
819 		 * to minimize inrush current.
820 		 */
821 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
822 		val |= Q6SS_SLP_RET_N | Q6SS_L2TAG_SLP_NRET_N |
823 			Q6SS_ETB_SLP_NRET_N | Q6SS_L2DATA_STBY_N;
824 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
825 		val |= Q6SS_L2DATA_SLP_NRET_N_2;
826 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
827 		val |= Q6SS_L2DATA_SLP_NRET_N_1;
828 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
829 		val |= Q6SS_L2DATA_SLP_NRET_N_0;
830 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
831 	}
832 	/* Remove IO clamp */
833 	val &= ~Q6SS_CLAMP_IO;
834 	writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
835 
836 	/* Bring core out of reset */
837 	val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
838 	val &= ~Q6SS_CORE_ARES;
839 	writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
840 
841 	/* Turn on core clock */
842 	val = readl(qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
843 	val |= Q6SS_CLK_ENABLE;
844 	writel(val, qproc->reg_base + QDSP6SS_GFMUX_CTL_REG);
845 
846 	/* Start core execution */
847 	val = readl(qproc->reg_base + QDSP6SS_RESET_REG);
848 	val &= ~Q6SS_STOP_CORE;
849 	writel(val, qproc->reg_base + QDSP6SS_RESET_REG);
850 
851 pbl_wait:
852 	/* Wait for PBL status */
853 	ret = q6v5_rmb_pbl_wait(qproc, 1000);
854 	if (ret == -ETIMEDOUT) {
855 		dev_err(qproc->dev, "PBL boot timed out\n");
856 	} else if (ret != RMB_PBL_SUCCESS) {
857 		dev_err(qproc->dev, "PBL returned unexpected status %d\n", ret);
858 		ret = -EINVAL;
859 	} else {
860 		ret = 0;
861 	}
862 
863 	return ret;
864 }
865 
q6v5proc_enable_qchannel(struct q6v5 * qproc,struct regmap * map,u32 offset)866 static int q6v5proc_enable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
867 {
868 	unsigned int val;
869 	int ret;
870 
871 	if (!qproc->has_qaccept_regs)
872 		return 0;
873 
874 	if (qproc->has_ext_cntl_regs) {
875 		regmap_write(qproc->conn_map, qproc->rscc_disable, 0);
876 		regmap_write(qproc->conn_map, qproc->force_clk_on, 1);
877 
878 		ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
879 					       !val, 1, Q6SS_CBCR_TIMEOUT_US);
880 		if (ret) {
881 			dev_err(qproc->dev, "failed to enable axim1 clock\n");
882 			return -ETIMEDOUT;
883 		}
884 	}
885 
886 	regmap_write(map, offset + QACCEPT_REQ_REG, 1);
887 
888 	/* Wait for accept */
889 	ret = regmap_read_poll_timeout(map, offset + QACCEPT_ACCEPT_REG, val, val, 5,
890 				       QACCEPT_TIMEOUT_US);
891 	if (ret) {
892 		dev_err(qproc->dev, "qchannel enable failed\n");
893 		return -ETIMEDOUT;
894 	}
895 
896 	return 0;
897 }
898 
q6v5proc_disable_qchannel(struct q6v5 * qproc,struct regmap * map,u32 offset)899 static void q6v5proc_disable_qchannel(struct q6v5 *qproc, struct regmap *map, u32 offset)
900 {
901 	int ret;
902 	unsigned int val, retry;
903 	unsigned int nretry = 10;
904 	bool takedown_complete = false;
905 
906 	if (!qproc->has_qaccept_regs)
907 		return;
908 
909 	while (!takedown_complete && nretry) {
910 		nretry--;
911 
912 		/* Wait for active transactions to complete */
913 		regmap_read_poll_timeout(map, offset + QACCEPT_ACTIVE_REG, val, !val, 5,
914 					 QACCEPT_TIMEOUT_US);
915 
916 		/* Request Q-channel transaction takedown */
917 		regmap_write(map, offset + QACCEPT_REQ_REG, 0);
918 
919 		/*
920 		 * If the request is denied, reset the Q-channel takedown request,
921 		 * wait for active transactions to complete and retry takedown.
922 		 */
923 		retry = 10;
924 		while (retry) {
925 			usleep_range(5, 10);
926 			retry--;
927 			ret = regmap_read(map, offset + QACCEPT_DENY_REG, &val);
928 			if (!ret && val) {
929 				regmap_write(map, offset + QACCEPT_REQ_REG, 1);
930 				break;
931 			}
932 
933 			ret = regmap_read(map, offset + QACCEPT_ACCEPT_REG, &val);
934 			if (!ret && !val) {
935 				takedown_complete = true;
936 				break;
937 			}
938 		}
939 
940 		if (!retry)
941 			break;
942 	}
943 
944 	/* Rely on mss_restart to clear out pending transactions on takedown failure */
945 	if (!takedown_complete)
946 		dev_err(qproc->dev, "qchannel takedown failed\n");
947 }
948 
q6v5proc_halt_axi_port(struct q6v5 * qproc,struct regmap * halt_map,u32 offset)949 static void q6v5proc_halt_axi_port(struct q6v5 *qproc,
950 				   struct regmap *halt_map,
951 				   u32 offset)
952 {
953 	unsigned int val;
954 	int ret;
955 
956 	/* Check if we're already idle */
957 	ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
958 	if (!ret && val)
959 		return;
960 
961 	/* Assert halt request */
962 	regmap_write(halt_map, offset + AXI_HALTREQ_REG, 1);
963 
964 	/* Wait for halt */
965 	regmap_read_poll_timeout(halt_map, offset + AXI_HALTACK_REG, val,
966 				 val, 1000, HALT_ACK_TIMEOUT_US);
967 
968 	ret = regmap_read(halt_map, offset + AXI_IDLE_REG, &val);
969 	if (ret || !val)
970 		dev_err(qproc->dev, "port failed halt\n");
971 
972 	/* Clear halt request (port will remain halted until reset) */
973 	regmap_write(halt_map, offset + AXI_HALTREQ_REG, 0);
974 }
975 
q6v5_mpss_init_image(struct q6v5 * qproc,const struct firmware * fw,const char * fw_name)976 static int q6v5_mpss_init_image(struct q6v5 *qproc, const struct firmware *fw,
977 				const char *fw_name)
978 {
979 	unsigned long dma_attrs = DMA_ATTR_FORCE_CONTIGUOUS;
980 	dma_addr_t phys;
981 	void *metadata;
982 	u64 mdata_perm;
983 	int xferop_ret;
984 	size_t size;
985 	void *ptr;
986 	int ret;
987 
988 	metadata = qcom_mdt_read_metadata(fw, &size, fw_name, qproc->dev);
989 	if (IS_ERR(metadata))
990 		return PTR_ERR(metadata);
991 
992 	if (qproc->mdata_phys) {
993 		if (size > qproc->mdata_size) {
994 			ret = -EINVAL;
995 			dev_err(qproc->dev, "metadata size outside memory range\n");
996 			goto free_metadata;
997 		}
998 
999 		phys = qproc->mdata_phys;
1000 		ptr = memremap(qproc->mdata_phys, size, MEMREMAP_WC);
1001 		if (!ptr) {
1002 			ret = -EBUSY;
1003 			dev_err(qproc->dev, "unable to map memory region: %pa+%zx\n",
1004 				&qproc->mdata_phys, size);
1005 			goto free_metadata;
1006 		}
1007 	} else {
1008 		ptr = dma_alloc_attrs(qproc->dev, size, &phys, GFP_KERNEL, dma_attrs);
1009 		if (!ptr) {
1010 			ret = -ENOMEM;
1011 			dev_err(qproc->dev, "failed to allocate mdt buffer\n");
1012 			goto free_metadata;
1013 		}
1014 	}
1015 
1016 	memcpy(ptr, metadata, size);
1017 
1018 	if (qproc->mdata_phys)
1019 		memunmap(ptr);
1020 
1021 	/* Hypervisor mapping to access metadata by modem */
1022 	mdata_perm = BIT(QCOM_SCM_VMID_HLOS);
1023 	ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, false, true,
1024 				      phys, size);
1025 	if (ret) {
1026 		dev_err(qproc->dev,
1027 			"assigning Q6 access to metadata failed: %d\n", ret);
1028 		ret = -EAGAIN;
1029 		goto free_dma_attrs;
1030 	}
1031 
1032 	writel(phys, qproc->rmb_base + RMB_PMI_META_DATA_REG);
1033 	writel(RMB_CMD_META_DATA_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1034 
1035 	ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_META_DATA_AUTH_SUCCESS, 1000);
1036 	if (ret == -ETIMEDOUT)
1037 		dev_err(qproc->dev, "MPSS header authentication timed out\n");
1038 	else if (ret < 0)
1039 		dev_err(qproc->dev, "MPSS header authentication failed: %d\n", ret);
1040 
1041 	/* Metadata authentication done, remove modem access */
1042 	xferop_ret = q6v5_xfer_mem_ownership(qproc, &mdata_perm, true, false,
1043 					     phys, size);
1044 	if (xferop_ret)
1045 		dev_warn(qproc->dev,
1046 			 "mdt buffer not reclaimed system may become unstable\n");
1047 
1048 free_dma_attrs:
1049 	if (!qproc->mdata_phys)
1050 		dma_free_attrs(qproc->dev, size, ptr, phys, dma_attrs);
1051 free_metadata:
1052 	kfree(metadata);
1053 
1054 	return ret < 0 ? ret : 0;
1055 }
1056 
q6v5_phdr_valid(const struct elf32_phdr * phdr)1057 static bool q6v5_phdr_valid(const struct elf32_phdr *phdr)
1058 {
1059 	if (phdr->p_type != PT_LOAD)
1060 		return false;
1061 
1062 	if ((phdr->p_flags & QCOM_MDT_TYPE_MASK) == QCOM_MDT_TYPE_HASH)
1063 		return false;
1064 
1065 	if (!phdr->p_memsz)
1066 		return false;
1067 
1068 	return true;
1069 }
1070 
q6v5_mba_load(struct q6v5 * qproc)1071 static int q6v5_mba_load(struct q6v5 *qproc)
1072 {
1073 	int ret;
1074 	int xfermemop_ret;
1075 	bool mba_load_err = false;
1076 
1077 	ret = qcom_q6v5_prepare(&qproc->q6v5);
1078 	if (ret)
1079 		return ret;
1080 
1081 	ret = q6v5_pds_enable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1082 	if (ret < 0) {
1083 		dev_err(qproc->dev, "failed to enable proxy power domains\n");
1084 		goto disable_irqs;
1085 	}
1086 
1087 	ret = q6v5_regulator_enable(qproc, qproc->fallback_proxy_regs,
1088 				    qproc->fallback_proxy_reg_count);
1089 	if (ret) {
1090 		dev_err(qproc->dev, "failed to enable fallback proxy supplies\n");
1091 		goto disable_proxy_pds;
1092 	}
1093 
1094 	ret = q6v5_regulator_enable(qproc, qproc->proxy_regs,
1095 				    qproc->proxy_reg_count);
1096 	if (ret) {
1097 		dev_err(qproc->dev, "failed to enable proxy supplies\n");
1098 		goto disable_fallback_proxy_reg;
1099 	}
1100 
1101 	ret = q6v5_clk_enable(qproc->dev, qproc->proxy_clks,
1102 			      qproc->proxy_clk_count);
1103 	if (ret) {
1104 		dev_err(qproc->dev, "failed to enable proxy clocks\n");
1105 		goto disable_proxy_reg;
1106 	}
1107 
1108 	ret = q6v5_regulator_enable(qproc, qproc->active_regs,
1109 				    qproc->active_reg_count);
1110 	if (ret) {
1111 		dev_err(qproc->dev, "failed to enable supplies\n");
1112 		goto disable_proxy_clk;
1113 	}
1114 
1115 	ret = q6v5_clk_enable(qproc->dev, qproc->reset_clks,
1116 			      qproc->reset_clk_count);
1117 	if (ret) {
1118 		dev_err(qproc->dev, "failed to enable reset clocks\n");
1119 		goto disable_vdd;
1120 	}
1121 
1122 	ret = q6v5_reset_deassert(qproc);
1123 	if (ret) {
1124 		dev_err(qproc->dev, "failed to deassert mss restart\n");
1125 		goto disable_reset_clks;
1126 	}
1127 
1128 	ret = q6v5_clk_enable(qproc->dev, qproc->active_clks,
1129 			      qproc->active_clk_count);
1130 	if (ret) {
1131 		dev_err(qproc->dev, "failed to enable clocks\n");
1132 		goto assert_reset;
1133 	}
1134 
1135 	ret = q6v5proc_enable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1136 	if (ret) {
1137 		dev_err(qproc->dev, "failed to enable axi bridge\n");
1138 		goto disable_active_clks;
1139 	}
1140 
1141 	/*
1142 	 * Some versions of the MBA firmware will upon boot wipe the MPSS region as well, so provide
1143 	 * the Q6 access to this region.
1144 	 */
1145 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1146 				      qproc->mpss_phys, qproc->mpss_size);
1147 	if (ret) {
1148 		dev_err(qproc->dev, "assigning Q6 access to mpss memory failed: %d\n", ret);
1149 		goto disable_active_clks;
1150 	}
1151 
1152 	/* Assign MBA image access in DDR to q6 */
1153 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, false, true,
1154 				      qproc->mba_phys, qproc->mba_size);
1155 	if (ret) {
1156 		dev_err(qproc->dev,
1157 			"assigning Q6 access to mba memory failed: %d\n", ret);
1158 		goto disable_active_clks;
1159 	}
1160 
1161 	if (qproc->has_mba_logs)
1162 		qcom_pil_info_store("mba", qproc->mba_phys, MBA_LOG_SIZE);
1163 
1164 	writel(qproc->mba_phys, qproc->rmb_base + RMB_MBA_IMAGE_REG);
1165 	if (qproc->dp_size) {
1166 		writel(qproc->mba_phys + SZ_1M, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1167 		writel(qproc->dp_size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1168 	}
1169 
1170 	ret = q6v5proc_reset(qproc);
1171 	if (ret)
1172 		goto reclaim_mba;
1173 
1174 	ret = q6v5_rmb_mba_wait(qproc, 0, 5000);
1175 	if (ret == -ETIMEDOUT) {
1176 		dev_err(qproc->dev, "MBA boot timed out\n");
1177 		goto halt_axi_ports;
1178 	} else if (ret != RMB_MBA_XPU_UNLOCKED &&
1179 		   ret != RMB_MBA_XPU_UNLOCKED_SCRIBBLED) {
1180 		dev_err(qproc->dev, "MBA returned unexpected status %d\n", ret);
1181 		ret = -EINVAL;
1182 		goto halt_axi_ports;
1183 	}
1184 
1185 	qproc->dump_mba_loaded = true;
1186 	return 0;
1187 
1188 halt_axi_ports:
1189 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1190 	if (qproc->has_vq6)
1191 		q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1192 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1193 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1194 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1195 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1196 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1197 	mba_load_err = true;
1198 reclaim_mba:
1199 	xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1200 						false, qproc->mba_phys,
1201 						qproc->mba_size);
1202 	if (xfermemop_ret) {
1203 		dev_err(qproc->dev,
1204 			"Failed to reclaim mba buffer, system may become unstable\n");
1205 	} else if (mba_load_err) {
1206 		q6v5_dump_mba_logs(qproc);
1207 	}
1208 
1209 disable_active_clks:
1210 	q6v5_clk_disable(qproc->dev, qproc->active_clks,
1211 			 qproc->active_clk_count);
1212 assert_reset:
1213 	q6v5_reset_assert(qproc);
1214 disable_reset_clks:
1215 	q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1216 			 qproc->reset_clk_count);
1217 disable_vdd:
1218 	q6v5_regulator_disable(qproc, qproc->active_regs,
1219 			       qproc->active_reg_count);
1220 disable_proxy_clk:
1221 	q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1222 			 qproc->proxy_clk_count);
1223 disable_proxy_reg:
1224 	q6v5_regulator_disable(qproc, qproc->proxy_regs,
1225 			       qproc->proxy_reg_count);
1226 disable_fallback_proxy_reg:
1227 	q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1228 			       qproc->fallback_proxy_reg_count);
1229 disable_proxy_pds:
1230 	q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1231 disable_irqs:
1232 	qcom_q6v5_unprepare(&qproc->q6v5);
1233 
1234 	return ret;
1235 }
1236 
q6v5_mba_reclaim(struct q6v5 * qproc)1237 static void q6v5_mba_reclaim(struct q6v5 *qproc)
1238 {
1239 	int ret;
1240 	u32 val;
1241 
1242 	qproc->dump_mba_loaded = false;
1243 	qproc->dp_size = 0;
1244 
1245 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_q6);
1246 	if (qproc->has_vq6)
1247 		q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_vq6);
1248 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_modem);
1249 	q6v5proc_halt_axi_port(qproc, qproc->halt_map, qproc->halt_nc);
1250 	if (qproc->version == MSS_MSM8996) {
1251 		/*
1252 		 * To avoid high MX current during LPASS/MSS restart.
1253 		 */
1254 		val = readl(qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1255 		val |= Q6SS_CLAMP_IO | QDSP6v56_CLAMP_WL |
1256 			QDSP6v56_CLAMP_QMC_MEM;
1257 		writel(val, qproc->reg_base + QDSP6SS_PWR_CTL_REG);
1258 	}
1259 
1260 	if (qproc->has_ext_cntl_regs) {
1261 		regmap_write(qproc->conn_map, qproc->rscc_disable, 1);
1262 
1263 		ret = regmap_read_poll_timeout(qproc->halt_map, qproc->axim1_clk_off, val,
1264 					       !val, 1, Q6SS_CBCR_TIMEOUT_US);
1265 		if (ret)
1266 			dev_err(qproc->dev, "failed to enable axim1 clock\n");
1267 
1268 		ret = regmap_read_poll_timeout(qproc->halt_map, qproc->crypto_clk_off, val,
1269 					       !val, 1, Q6SS_CBCR_TIMEOUT_US);
1270 		if (ret)
1271 			dev_err(qproc->dev, "failed to enable crypto clock\n");
1272 	}
1273 
1274 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_mdm);
1275 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_cx);
1276 	q6v5proc_disable_qchannel(qproc, qproc->halt_map, qproc->qaccept_axi);
1277 
1278 	q6v5_reset_assert(qproc);
1279 
1280 	q6v5_clk_disable(qproc->dev, qproc->reset_clks,
1281 			 qproc->reset_clk_count);
1282 	q6v5_clk_disable(qproc->dev, qproc->active_clks,
1283 			 qproc->active_clk_count);
1284 	q6v5_regulator_disable(qproc, qproc->active_regs,
1285 			       qproc->active_reg_count);
1286 
1287 	/* In case of failure or coredump scenario where reclaiming MBA memory
1288 	 * could not happen reclaim it here.
1289 	 */
1290 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true, false,
1291 				      qproc->mba_phys,
1292 				      qproc->mba_size);
1293 	WARN_ON(ret);
1294 
1295 	ret = qcom_q6v5_unprepare(&qproc->q6v5);
1296 	if (ret) {
1297 		q6v5_pds_disable(qproc, qproc->proxy_pds,
1298 				 qproc->proxy_pd_count);
1299 		q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1300 				 qproc->proxy_clk_count);
1301 		q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1302 				       qproc->fallback_proxy_reg_count);
1303 		q6v5_regulator_disable(qproc, qproc->proxy_regs,
1304 				       qproc->proxy_reg_count);
1305 	}
1306 }
1307 
q6v5_reload_mba(struct rproc * rproc)1308 static int q6v5_reload_mba(struct rproc *rproc)
1309 {
1310 	struct q6v5 *qproc = rproc->priv;
1311 	const struct firmware *fw;
1312 	int ret;
1313 
1314 	ret = request_firmware(&fw, rproc->firmware, qproc->dev);
1315 	if (ret < 0)
1316 		return ret;
1317 
1318 	q6v5_load(rproc, fw);
1319 	ret = q6v5_mba_load(qproc);
1320 	release_firmware(fw);
1321 
1322 	return ret;
1323 }
1324 
q6v5_mpss_load(struct q6v5 * qproc)1325 static int q6v5_mpss_load(struct q6v5 *qproc)
1326 {
1327 	const struct elf32_phdr *phdrs;
1328 	const struct elf32_phdr *phdr;
1329 	const struct firmware *seg_fw;
1330 	const struct firmware *fw;
1331 	struct elf32_hdr *ehdr;
1332 	phys_addr_t mpss_reloc;
1333 	phys_addr_t boot_addr;
1334 	phys_addr_t min_addr = PHYS_ADDR_MAX;
1335 	phys_addr_t max_addr = 0;
1336 	u32 code_length;
1337 	bool relocate = false;
1338 	char *fw_name;
1339 	size_t fw_name_len;
1340 	ssize_t offset;
1341 	size_t size = 0;
1342 	void *ptr;
1343 	int ret;
1344 	int i;
1345 
1346 	fw_name_len = strlen(qproc->hexagon_mdt_image);
1347 	if (fw_name_len <= 4)
1348 		return -EINVAL;
1349 
1350 	fw_name = kstrdup(qproc->hexagon_mdt_image, GFP_KERNEL);
1351 	if (!fw_name)
1352 		return -ENOMEM;
1353 
1354 	ret = request_firmware(&fw, fw_name, qproc->dev);
1355 	if (ret < 0) {
1356 		dev_err(qproc->dev, "unable to load %s\n", fw_name);
1357 		goto out;
1358 	}
1359 
1360 	/* Initialize the RMB validator */
1361 	writel(0, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1362 
1363 	ret = q6v5_mpss_init_image(qproc, fw, qproc->hexagon_mdt_image);
1364 	if (ret)
1365 		goto release_firmware;
1366 
1367 	ehdr = (struct elf32_hdr *)fw->data;
1368 	phdrs = (struct elf32_phdr *)(ehdr + 1);
1369 
1370 	for (i = 0; i < ehdr->e_phnum; i++) {
1371 		phdr = &phdrs[i];
1372 
1373 		if (!q6v5_phdr_valid(phdr))
1374 			continue;
1375 
1376 		if (phdr->p_flags & QCOM_MDT_RELOCATABLE)
1377 			relocate = true;
1378 
1379 		if (phdr->p_paddr < min_addr)
1380 			min_addr = phdr->p_paddr;
1381 
1382 		if (phdr->p_paddr + phdr->p_memsz > max_addr)
1383 			max_addr = ALIGN(phdr->p_paddr + phdr->p_memsz, SZ_4K);
1384 	}
1385 
1386 	if (qproc->version == MSS_MSM8953) {
1387 		ret = qcom_scm_pas_mem_setup(MPSS_PAS_ID, qproc->mpss_phys, qproc->mpss_size);
1388 		if (ret) {
1389 			dev_err(qproc->dev,
1390 				"setting up mpss memory failed: %d\n", ret);
1391 			goto release_firmware;
1392 		}
1393 	}
1394 
1395 	/*
1396 	 * In case of a modem subsystem restart on secure devices, the modem
1397 	 * memory can be reclaimed only after MBA is loaded.
1398 	 */
1399 	q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, false,
1400 				qproc->mpss_phys, qproc->mpss_size);
1401 
1402 	/* Share ownership between Linux and MSS, during segment loading */
1403 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, true, true,
1404 				      qproc->mpss_phys, qproc->mpss_size);
1405 	if (ret) {
1406 		dev_err(qproc->dev,
1407 			"assigning Q6 access to mpss memory failed: %d\n", ret);
1408 		ret = -EAGAIN;
1409 		goto release_firmware;
1410 	}
1411 
1412 	mpss_reloc = relocate ? min_addr : qproc->mpss_phys;
1413 	qproc->mpss_reloc = mpss_reloc;
1414 	/* Load firmware segments */
1415 	for (i = 0; i < ehdr->e_phnum; i++) {
1416 		phdr = &phdrs[i];
1417 
1418 		if (!q6v5_phdr_valid(phdr))
1419 			continue;
1420 
1421 		offset = phdr->p_paddr - mpss_reloc;
1422 		if (offset < 0 || offset + phdr->p_memsz > qproc->mpss_size) {
1423 			dev_err(qproc->dev, "segment outside memory range\n");
1424 			ret = -EINVAL;
1425 			goto release_firmware;
1426 		}
1427 
1428 		if (phdr->p_filesz > phdr->p_memsz) {
1429 			dev_err(qproc->dev,
1430 				"refusing to load segment %d with p_filesz > p_memsz\n",
1431 				i);
1432 			ret = -EINVAL;
1433 			goto release_firmware;
1434 		}
1435 
1436 		ptr = memremap(qproc->mpss_phys + offset, phdr->p_memsz, MEMREMAP_WC);
1437 		if (!ptr) {
1438 			dev_err(qproc->dev,
1439 				"unable to map memory region: %pa+%zx-%x\n",
1440 				&qproc->mpss_phys, offset, phdr->p_memsz);
1441 			goto release_firmware;
1442 		}
1443 
1444 		if (phdr->p_filesz && phdr->p_offset < fw->size) {
1445 			/* Firmware is large enough to be non-split */
1446 			if (phdr->p_offset + phdr->p_filesz > fw->size) {
1447 				dev_err(qproc->dev,
1448 					"failed to load segment %d from truncated file %s\n",
1449 					i, fw_name);
1450 				ret = -EINVAL;
1451 				memunmap(ptr);
1452 				goto release_firmware;
1453 			}
1454 
1455 			memcpy(ptr, fw->data + phdr->p_offset, phdr->p_filesz);
1456 		} else if (phdr->p_filesz) {
1457 			/* Replace "xxx.xxx" with "xxx.bxx" */
1458 			sprintf(fw_name + fw_name_len - 3, "b%02d", i);
1459 			ret = request_firmware_into_buf(&seg_fw, fw_name, qproc->dev,
1460 							ptr, phdr->p_filesz);
1461 			if (ret) {
1462 				dev_err(qproc->dev, "failed to load %s\n", fw_name);
1463 				memunmap(ptr);
1464 				goto release_firmware;
1465 			}
1466 
1467 			if (seg_fw->size != phdr->p_filesz) {
1468 				dev_err(qproc->dev,
1469 					"failed to load segment %d from truncated file %s\n",
1470 					i, fw_name);
1471 				ret = -EINVAL;
1472 				release_firmware(seg_fw);
1473 				memunmap(ptr);
1474 				goto release_firmware;
1475 			}
1476 
1477 			release_firmware(seg_fw);
1478 		}
1479 
1480 		if (phdr->p_memsz > phdr->p_filesz) {
1481 			memset(ptr + phdr->p_filesz, 0,
1482 			       phdr->p_memsz - phdr->p_filesz);
1483 		}
1484 		memunmap(ptr);
1485 		size += phdr->p_memsz;
1486 
1487 		code_length = readl(qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1488 		if (!code_length) {
1489 			boot_addr = relocate ? qproc->mpss_phys : min_addr;
1490 			writel(boot_addr, qproc->rmb_base + RMB_PMI_CODE_START_REG);
1491 			writel(RMB_CMD_LOAD_READY, qproc->rmb_base + RMB_MBA_COMMAND_REG);
1492 		}
1493 		writel(size, qproc->rmb_base + RMB_PMI_CODE_LENGTH_REG);
1494 
1495 		ret = readl(qproc->rmb_base + RMB_MBA_STATUS_REG);
1496 		if (ret < 0) {
1497 			dev_err(qproc->dev, "MPSS authentication failed: %d\n",
1498 				ret);
1499 			goto release_firmware;
1500 		}
1501 	}
1502 
1503 	/* Transfer ownership of modem ddr region to q6 */
1504 	ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm, false, true,
1505 				      qproc->mpss_phys, qproc->mpss_size);
1506 	if (ret) {
1507 		dev_err(qproc->dev,
1508 			"assigning Q6 access to mpss memory failed: %d\n", ret);
1509 		ret = -EAGAIN;
1510 		goto release_firmware;
1511 	}
1512 
1513 	ret = q6v5_rmb_mba_wait(qproc, RMB_MBA_AUTH_COMPLETE, 10000);
1514 	if (ret == -ETIMEDOUT)
1515 		dev_err(qproc->dev, "MPSS authentication timed out\n");
1516 	else if (ret < 0)
1517 		dev_err(qproc->dev, "MPSS authentication failed: %d\n", ret);
1518 
1519 	qcom_pil_info_store("modem", qproc->mpss_phys, qproc->mpss_size);
1520 
1521 release_firmware:
1522 	release_firmware(fw);
1523 out:
1524 	kfree(fw_name);
1525 
1526 	return ret < 0 ? ret : 0;
1527 }
1528 
qcom_q6v5_dump_segment(struct rproc * rproc,struct rproc_dump_segment * segment,void * dest,size_t cp_offset,size_t size)1529 static void qcom_q6v5_dump_segment(struct rproc *rproc,
1530 				   struct rproc_dump_segment *segment,
1531 				   void *dest, size_t cp_offset, size_t size)
1532 {
1533 	int ret = 0;
1534 	struct q6v5 *qproc = rproc->priv;
1535 	int offset = segment->da - qproc->mpss_reloc;
1536 	void *ptr = NULL;
1537 
1538 	/* Unlock mba before copying segments */
1539 	if (!qproc->dump_mba_loaded) {
1540 		ret = q6v5_reload_mba(rproc);
1541 		if (!ret) {
1542 			/* Reset ownership back to Linux to copy segments */
1543 			ret = q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1544 						      true, false,
1545 						      qproc->mpss_phys,
1546 						      qproc->mpss_size);
1547 		}
1548 	}
1549 
1550 	if (!ret)
1551 		ptr = memremap(qproc->mpss_phys + offset + cp_offset, size, MEMREMAP_WC);
1552 
1553 	if (ptr) {
1554 		memcpy(dest, ptr, size);
1555 		memunmap(ptr);
1556 	} else {
1557 		memset(dest, 0xff, size);
1558 	}
1559 
1560 	qproc->current_dump_size += size;
1561 
1562 	/* Reclaim mba after copying segments */
1563 	if (qproc->current_dump_size == qproc->total_dump_size) {
1564 		if (qproc->dump_mba_loaded) {
1565 			/* Try to reset ownership back to Q6 */
1566 			q6v5_xfer_mem_ownership(qproc, &qproc->mpss_perm,
1567 						false, true,
1568 						qproc->mpss_phys,
1569 						qproc->mpss_size);
1570 			q6v5_mba_reclaim(qproc);
1571 		}
1572 	}
1573 }
1574 
q6v5_start(struct rproc * rproc)1575 static int q6v5_start(struct rproc *rproc)
1576 {
1577 	struct q6v5 *qproc = rproc->priv;
1578 	int xfermemop_ret;
1579 	int ret;
1580 
1581 	ret = q6v5_mba_load(qproc);
1582 	if (ret)
1583 		return ret;
1584 
1585 	dev_info(qproc->dev, "MBA booted with%s debug policy, loading mpss\n",
1586 		 qproc->dp_size ? "" : "out");
1587 
1588 	ret = q6v5_mpss_load(qproc);
1589 	if (ret)
1590 		goto reclaim_mpss;
1591 
1592 	ret = qcom_q6v5_wait_for_start(&qproc->q6v5, msecs_to_jiffies(5000));
1593 	if (ret == -ETIMEDOUT) {
1594 		dev_err(qproc->dev, "start timed out\n");
1595 		goto reclaim_mpss;
1596 	}
1597 
1598 	xfermemop_ret = q6v5_xfer_mem_ownership(qproc, &qproc->mba_perm, true,
1599 						false, qproc->mba_phys,
1600 						qproc->mba_size);
1601 	if (xfermemop_ret)
1602 		dev_err(qproc->dev,
1603 			"Failed to reclaim mba buffer system may become unstable\n");
1604 
1605 	/* Reset Dump Segment Mask */
1606 	qproc->current_dump_size = 0;
1607 
1608 	return 0;
1609 
1610 reclaim_mpss:
1611 	q6v5_mba_reclaim(qproc);
1612 	q6v5_dump_mba_logs(qproc);
1613 
1614 	return ret;
1615 }
1616 
q6v5_stop(struct rproc * rproc)1617 static int q6v5_stop(struct rproc *rproc)
1618 {
1619 	struct q6v5 *qproc = rproc->priv;
1620 	int ret;
1621 
1622 	ret = qcom_q6v5_request_stop(&qproc->q6v5, qproc->sysmon);
1623 	if (ret == -ETIMEDOUT)
1624 		dev_err(qproc->dev, "timed out on wait\n");
1625 
1626 	q6v5_mba_reclaim(qproc);
1627 
1628 	return 0;
1629 }
1630 
qcom_q6v5_register_dump_segments(struct rproc * rproc,const struct firmware * mba_fw)1631 static int qcom_q6v5_register_dump_segments(struct rproc *rproc,
1632 					    const struct firmware *mba_fw)
1633 {
1634 	const struct firmware *fw;
1635 	const struct elf32_phdr *phdrs;
1636 	const struct elf32_phdr *phdr;
1637 	const struct elf32_hdr *ehdr;
1638 	struct q6v5 *qproc = rproc->priv;
1639 	unsigned long i;
1640 	int ret;
1641 
1642 	ret = request_firmware(&fw, qproc->hexagon_mdt_image, qproc->dev);
1643 	if (ret < 0) {
1644 		dev_err(qproc->dev, "unable to load %s\n",
1645 			qproc->hexagon_mdt_image);
1646 		return ret;
1647 	}
1648 
1649 	rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
1650 
1651 	ehdr = (struct elf32_hdr *)fw->data;
1652 	phdrs = (struct elf32_phdr *)(ehdr + 1);
1653 	qproc->total_dump_size = 0;
1654 
1655 	for (i = 0; i < ehdr->e_phnum; i++) {
1656 		phdr = &phdrs[i];
1657 
1658 		if (!q6v5_phdr_valid(phdr))
1659 			continue;
1660 
1661 		ret = rproc_coredump_add_custom_segment(rproc, phdr->p_paddr,
1662 							phdr->p_memsz,
1663 							qcom_q6v5_dump_segment,
1664 							NULL);
1665 		if (ret)
1666 			break;
1667 
1668 		qproc->total_dump_size += phdr->p_memsz;
1669 	}
1670 
1671 	release_firmware(fw);
1672 	return ret;
1673 }
1674 
q6v5_panic(struct rproc * rproc)1675 static unsigned long q6v5_panic(struct rproc *rproc)
1676 {
1677 	struct q6v5 *qproc = rproc->priv;
1678 
1679 	return qcom_q6v5_panic(&qproc->q6v5);
1680 }
1681 
1682 static const struct rproc_ops q6v5_ops = {
1683 	.start = q6v5_start,
1684 	.stop = q6v5_stop,
1685 	.parse_fw = qcom_q6v5_register_dump_segments,
1686 	.load = q6v5_load,
1687 	.panic = q6v5_panic,
1688 };
1689 
qcom_msa_handover(struct qcom_q6v5 * q6v5)1690 static void qcom_msa_handover(struct qcom_q6v5 *q6v5)
1691 {
1692 	struct q6v5 *qproc = container_of(q6v5, struct q6v5, q6v5);
1693 
1694 	q6v5_clk_disable(qproc->dev, qproc->proxy_clks,
1695 			 qproc->proxy_clk_count);
1696 	q6v5_regulator_disable(qproc, qproc->proxy_regs,
1697 			       qproc->proxy_reg_count);
1698 	q6v5_regulator_disable(qproc, qproc->fallback_proxy_regs,
1699 			       qproc->fallback_proxy_reg_count);
1700 	q6v5_pds_disable(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
1701 }
1702 
q6v5_init_mem(struct q6v5 * qproc,struct platform_device * pdev)1703 static int q6v5_init_mem(struct q6v5 *qproc, struct platform_device *pdev)
1704 {
1705 	struct of_phandle_args args;
1706 	int halt_cell_cnt = 3;
1707 	int ret;
1708 
1709 	qproc->reg_base = devm_platform_ioremap_resource_byname(pdev, "qdsp6");
1710 	if (IS_ERR(qproc->reg_base))
1711 		return PTR_ERR(qproc->reg_base);
1712 
1713 	qproc->rmb_base = devm_platform_ioremap_resource_byname(pdev, "rmb");
1714 	if (IS_ERR(qproc->rmb_base))
1715 		return PTR_ERR(qproc->rmb_base);
1716 
1717 	if (qproc->has_vq6)
1718 		halt_cell_cnt++;
1719 
1720 	ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1721 					       "qcom,halt-regs", halt_cell_cnt, 0, &args);
1722 	if (ret < 0) {
1723 		dev_err(&pdev->dev, "failed to parse qcom,halt-regs\n");
1724 		return -EINVAL;
1725 	}
1726 
1727 	qproc->halt_map = syscon_node_to_regmap(args.np);
1728 	of_node_put(args.np);
1729 	if (IS_ERR(qproc->halt_map))
1730 		return PTR_ERR(qproc->halt_map);
1731 
1732 	qproc->halt_q6 = args.args[0];
1733 	qproc->halt_modem = args.args[1];
1734 	qproc->halt_nc = args.args[2];
1735 
1736 	if (qproc->has_vq6)
1737 		qproc->halt_vq6 = args.args[3];
1738 
1739 	if (qproc->has_qaccept_regs) {
1740 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1741 						       "qcom,qaccept-regs",
1742 						       3, 0, &args);
1743 		if (ret < 0) {
1744 			dev_err(&pdev->dev, "failed to parse qaccept-regs\n");
1745 			return -EINVAL;
1746 		}
1747 
1748 		qproc->qaccept_mdm = args.args[0];
1749 		qproc->qaccept_cx = args.args[1];
1750 		qproc->qaccept_axi = args.args[2];
1751 	}
1752 
1753 	if (qproc->has_ext_cntl_regs) {
1754 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1755 						       "qcom,ext-regs",
1756 						       2, 0, &args);
1757 		if (ret < 0) {
1758 			dev_err(&pdev->dev, "failed to parse ext-regs index 0\n");
1759 			return -EINVAL;
1760 		}
1761 
1762 		qproc->conn_map = syscon_node_to_regmap(args.np);
1763 		of_node_put(args.np);
1764 		if (IS_ERR(qproc->conn_map))
1765 			return PTR_ERR(qproc->conn_map);
1766 
1767 		qproc->force_clk_on = args.args[0];
1768 		qproc->rscc_disable = args.args[1];
1769 
1770 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1771 						       "qcom,ext-regs",
1772 						       2, 1, &args);
1773 		if (ret < 0) {
1774 			dev_err(&pdev->dev, "failed to parse ext-regs index 1\n");
1775 			return -EINVAL;
1776 		}
1777 
1778 		qproc->axim1_clk_off = args.args[0];
1779 		qproc->crypto_clk_off = args.args[1];
1780 	}
1781 
1782 	if (qproc->has_spare_reg) {
1783 		ret = of_parse_phandle_with_fixed_args(pdev->dev.of_node,
1784 						       "qcom,spare-regs",
1785 						       1, 0, &args);
1786 		if (ret < 0) {
1787 			dev_err(&pdev->dev, "failed to parse spare-regs\n");
1788 			return -EINVAL;
1789 		}
1790 
1791 		qproc->conn_map = syscon_node_to_regmap(args.np);
1792 		of_node_put(args.np);
1793 		if (IS_ERR(qproc->conn_map))
1794 			return PTR_ERR(qproc->conn_map);
1795 
1796 		qproc->conn_box = args.args[0];
1797 	}
1798 
1799 	return 0;
1800 }
1801 
q6v5_init_clocks(struct device * dev,struct clk ** clks,char ** clk_names)1802 static int q6v5_init_clocks(struct device *dev, struct clk **clks,
1803 		char **clk_names)
1804 {
1805 	int i;
1806 
1807 	if (!clk_names)
1808 		return 0;
1809 
1810 	for (i = 0; clk_names[i]; i++) {
1811 		clks[i] = devm_clk_get(dev, clk_names[i]);
1812 		if (IS_ERR(clks[i]))
1813 			return dev_err_probe(dev, PTR_ERR(clks[i]),
1814 					     "Failed to get %s clock\n",
1815 					     clk_names[i]);
1816 	}
1817 
1818 	return i;
1819 }
1820 
q6v5_pds_attach(struct device * dev,struct device ** devs,char ** pd_names)1821 static int q6v5_pds_attach(struct device *dev, struct device **devs,
1822 			   char **pd_names)
1823 {
1824 	size_t num_pds = 0;
1825 	int ret;
1826 	int i;
1827 
1828 	if (!pd_names)
1829 		return 0;
1830 
1831 	while (pd_names[num_pds])
1832 		num_pds++;
1833 
1834 	/* Handle single power domain */
1835 	if (num_pds == 1 && dev->pm_domain) {
1836 		devs[0] = dev;
1837 		pm_runtime_enable(dev);
1838 		return 1;
1839 	}
1840 
1841 	for (i = 0; i < num_pds; i++) {
1842 		devs[i] = dev_pm_domain_attach_by_name(dev, pd_names[i]);
1843 		if (IS_ERR_OR_NULL(devs[i])) {
1844 			ret = PTR_ERR(devs[i]) ? : -ENODATA;
1845 			goto unroll_attach;
1846 		}
1847 	}
1848 
1849 	return num_pds;
1850 
1851 unroll_attach:
1852 	for (i--; i >= 0; i--)
1853 		dev_pm_domain_detach(devs[i], false);
1854 
1855 	return ret;
1856 }
1857 
q6v5_pds_detach(struct q6v5 * qproc,struct device ** pds,size_t pd_count)1858 static void q6v5_pds_detach(struct q6v5 *qproc, struct device **pds,
1859 			    size_t pd_count)
1860 {
1861 	struct device *dev = qproc->dev;
1862 	int i;
1863 
1864 	/* Handle single power domain */
1865 	if (pd_count == 1 && dev->pm_domain) {
1866 		pm_runtime_disable(dev);
1867 		return;
1868 	}
1869 
1870 	for (i = 0; i < pd_count; i++)
1871 		dev_pm_domain_detach(pds[i], false);
1872 }
1873 
q6v5_init_reset(struct q6v5 * qproc)1874 static int q6v5_init_reset(struct q6v5 *qproc)
1875 {
1876 	qproc->mss_restart = devm_reset_control_get_exclusive(qproc->dev,
1877 							      "mss_restart");
1878 	if (IS_ERR(qproc->mss_restart)) {
1879 		dev_err(qproc->dev, "failed to acquire mss restart\n");
1880 		return PTR_ERR(qproc->mss_restart);
1881 	}
1882 
1883 	if (qproc->has_alt_reset || qproc->has_spare_reg || qproc->has_ext_cntl_regs) {
1884 		qproc->pdc_reset = devm_reset_control_get_exclusive(qproc->dev,
1885 								    "pdc_reset");
1886 		if (IS_ERR(qproc->pdc_reset)) {
1887 			dev_err(qproc->dev, "failed to acquire pdc reset\n");
1888 			return PTR_ERR(qproc->pdc_reset);
1889 		}
1890 	}
1891 
1892 	return 0;
1893 }
1894 
q6v5_alloc_memory_region(struct q6v5 * qproc)1895 static int q6v5_alloc_memory_region(struct q6v5 *qproc)
1896 {
1897 	struct device_node *child;
1898 	struct reserved_mem *rmem;
1899 	struct device_node *node;
1900 
1901 	/*
1902 	 * In the absence of mba/mpss sub-child, extract the mba and mpss
1903 	 * reserved memory regions from device's memory-region property.
1904 	 */
1905 	child = of_get_child_by_name(qproc->dev->of_node, "mba");
1906 	if (!child) {
1907 		node = of_parse_phandle(qproc->dev->of_node,
1908 					"memory-region", 0);
1909 	} else {
1910 		node = of_parse_phandle(child, "memory-region", 0);
1911 		of_node_put(child);
1912 	}
1913 
1914 	if (!node) {
1915 		dev_err(qproc->dev, "no mba memory-region specified\n");
1916 		return -EINVAL;
1917 	}
1918 
1919 	rmem = of_reserved_mem_lookup(node);
1920 	of_node_put(node);
1921 	if (!rmem) {
1922 		dev_err(qproc->dev, "unable to resolve mba region\n");
1923 		return -EINVAL;
1924 	}
1925 
1926 	qproc->mba_phys = rmem->base;
1927 	qproc->mba_size = rmem->size;
1928 
1929 	if (!child) {
1930 		node = of_parse_phandle(qproc->dev->of_node,
1931 					"memory-region", 1);
1932 	} else {
1933 		child = of_get_child_by_name(qproc->dev->of_node, "mpss");
1934 		node = of_parse_phandle(child, "memory-region", 0);
1935 		of_node_put(child);
1936 	}
1937 
1938 	if (!node) {
1939 		dev_err(qproc->dev, "no mpss memory-region specified\n");
1940 		return -EINVAL;
1941 	}
1942 
1943 	rmem = of_reserved_mem_lookup(node);
1944 	of_node_put(node);
1945 	if (!rmem) {
1946 		dev_err(qproc->dev, "unable to resolve mpss region\n");
1947 		return -EINVAL;
1948 	}
1949 
1950 	qproc->mpss_phys = qproc->mpss_reloc = rmem->base;
1951 	qproc->mpss_size = rmem->size;
1952 
1953 	if (!child) {
1954 		node = of_parse_phandle(qproc->dev->of_node, "memory-region", 2);
1955 	} else {
1956 		child = of_get_child_by_name(qproc->dev->of_node, "metadata");
1957 		node = of_parse_phandle(child, "memory-region", 0);
1958 		of_node_put(child);
1959 	}
1960 
1961 	if (!node)
1962 		return 0;
1963 
1964 	rmem = of_reserved_mem_lookup(node);
1965 	if (!rmem) {
1966 		dev_err(qproc->dev, "unable to resolve metadata region\n");
1967 		return -EINVAL;
1968 	}
1969 
1970 	qproc->mdata_phys = rmem->base;
1971 	qproc->mdata_size = rmem->size;
1972 
1973 	return 0;
1974 }
1975 
q6v5_probe(struct platform_device * pdev)1976 static int q6v5_probe(struct platform_device *pdev)
1977 {
1978 	const struct rproc_hexagon_res *desc;
1979 	struct device_node *node;
1980 	struct q6v5 *qproc;
1981 	struct rproc *rproc;
1982 	const char *mba_image;
1983 	int ret;
1984 
1985 	desc = of_device_get_match_data(&pdev->dev);
1986 	if (!desc)
1987 		return -EINVAL;
1988 
1989 	if (desc->need_mem_protection && !qcom_scm_is_available())
1990 		return -EPROBE_DEFER;
1991 
1992 	mba_image = desc->hexagon_mba_image;
1993 	ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
1994 					    0, &mba_image);
1995 	if (ret < 0 && ret != -EINVAL) {
1996 		dev_err(&pdev->dev, "unable to read mba firmware-name\n");
1997 		return ret;
1998 	}
1999 
2000 	rproc = devm_rproc_alloc(&pdev->dev, pdev->name, &q6v5_ops,
2001 				 mba_image, sizeof(*qproc));
2002 	if (!rproc) {
2003 		dev_err(&pdev->dev, "failed to allocate rproc\n");
2004 		return -ENOMEM;
2005 	}
2006 
2007 	rproc->auto_boot = false;
2008 	rproc_coredump_set_elf_info(rproc, ELFCLASS32, EM_NONE);
2009 
2010 	qproc = rproc->priv;
2011 	qproc->dev = &pdev->dev;
2012 	qproc->rproc = rproc;
2013 	qproc->hexagon_mdt_image = "modem.mdt";
2014 	ret = of_property_read_string_index(pdev->dev.of_node, "firmware-name",
2015 					    1, &qproc->hexagon_mdt_image);
2016 	if (ret < 0 && ret != -EINVAL) {
2017 		dev_err(&pdev->dev, "unable to read mpss firmware-name\n");
2018 		return ret;
2019 	}
2020 
2021 	platform_set_drvdata(pdev, qproc);
2022 
2023 	qproc->has_qaccept_regs = desc->has_qaccept_regs;
2024 	qproc->has_ext_cntl_regs = desc->has_ext_cntl_regs;
2025 	qproc->has_vq6 = desc->has_vq6;
2026 	qproc->has_spare_reg = desc->has_spare_reg;
2027 	ret = q6v5_init_mem(qproc, pdev);
2028 	if (ret)
2029 		return ret;
2030 
2031 	ret = q6v5_alloc_memory_region(qproc);
2032 	if (ret)
2033 		return ret;
2034 
2035 	ret = q6v5_init_clocks(&pdev->dev, qproc->proxy_clks,
2036 			       desc->proxy_clk_names);
2037 	if (ret < 0)
2038 		return ret;
2039 	qproc->proxy_clk_count = ret;
2040 
2041 	ret = q6v5_init_clocks(&pdev->dev, qproc->reset_clks,
2042 			       desc->reset_clk_names);
2043 	if (ret < 0)
2044 		return ret;
2045 	qproc->reset_clk_count = ret;
2046 
2047 	ret = q6v5_init_clocks(&pdev->dev, qproc->active_clks,
2048 			       desc->active_clk_names);
2049 	if (ret < 0)
2050 		return ret;
2051 	qproc->active_clk_count = ret;
2052 
2053 	ret = q6v5_regulator_init(&pdev->dev, qproc->proxy_regs,
2054 				  desc->proxy_supply);
2055 	if (ret < 0)
2056 		return ret;
2057 	qproc->proxy_reg_count = ret;
2058 
2059 	ret = q6v5_regulator_init(&pdev->dev,  qproc->active_regs,
2060 				  desc->active_supply);
2061 	if (ret < 0)
2062 		return ret;
2063 	qproc->active_reg_count = ret;
2064 
2065 	ret = q6v5_pds_attach(&pdev->dev, qproc->proxy_pds,
2066 			      desc->proxy_pd_names);
2067 	/* Fallback to regulators for old device trees */
2068 	if (ret == -ENODATA && desc->fallback_proxy_supply) {
2069 		ret = q6v5_regulator_init(&pdev->dev,
2070 					  qproc->fallback_proxy_regs,
2071 					  desc->fallback_proxy_supply);
2072 		if (ret < 0)
2073 			return ret;
2074 		qproc->fallback_proxy_reg_count = ret;
2075 	} else if (ret < 0) {
2076 		dev_err(&pdev->dev, "Failed to init power domains\n");
2077 		return ret;
2078 	} else {
2079 		qproc->proxy_pd_count = ret;
2080 	}
2081 
2082 	qproc->has_alt_reset = desc->has_alt_reset;
2083 	ret = q6v5_init_reset(qproc);
2084 	if (ret)
2085 		goto detach_proxy_pds;
2086 
2087 	qproc->version = desc->version;
2088 	qproc->need_mem_protection = desc->need_mem_protection;
2089 	qproc->has_mba_logs = desc->has_mba_logs;
2090 
2091 	ret = qcom_q6v5_init(&qproc->q6v5, pdev, rproc, MPSS_CRASH_REASON_SMEM, "modem",
2092 			     qcom_msa_handover);
2093 	if (ret)
2094 		goto detach_proxy_pds;
2095 
2096 	qproc->mpss_perm = BIT(QCOM_SCM_VMID_HLOS);
2097 	qproc->mba_perm = BIT(QCOM_SCM_VMID_HLOS);
2098 	qcom_add_glink_subdev(rproc, &qproc->glink_subdev, "mpss");
2099 	qcom_add_smd_subdev(rproc, &qproc->smd_subdev);
2100 	qcom_add_pdm_subdev(rproc, &qproc->pdm_subdev);
2101 	qcom_add_ssr_subdev(rproc, &qproc->ssr_subdev, "mpss");
2102 	qproc->sysmon = qcom_add_sysmon_subdev(rproc, "modem", 0x12);
2103 	if (IS_ERR(qproc->sysmon)) {
2104 		ret = PTR_ERR(qproc->sysmon);
2105 		goto remove_subdevs;
2106 	}
2107 
2108 	ret = rproc_add(rproc);
2109 	if (ret)
2110 		goto remove_sysmon_subdev;
2111 
2112 	node = of_get_compatible_child(pdev->dev.of_node, "qcom,bam-dmux");
2113 	qproc->bam_dmux = of_platform_device_create(node, NULL, &pdev->dev);
2114 	of_node_put(node);
2115 
2116 	return 0;
2117 
2118 remove_sysmon_subdev:
2119 	qcom_remove_sysmon_subdev(qproc->sysmon);
2120 remove_subdevs:
2121 	qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2122 	qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2123 	qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2124 detach_proxy_pds:
2125 	q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2126 
2127 	return ret;
2128 }
2129 
q6v5_remove(struct platform_device * pdev)2130 static void q6v5_remove(struct platform_device *pdev)
2131 {
2132 	struct q6v5 *qproc = platform_get_drvdata(pdev);
2133 	struct rproc *rproc = qproc->rproc;
2134 
2135 	if (qproc->bam_dmux)
2136 		of_platform_device_destroy(&qproc->bam_dmux->dev, NULL);
2137 	rproc_del(rproc);
2138 
2139 	qcom_q6v5_deinit(&qproc->q6v5);
2140 	qcom_remove_sysmon_subdev(qproc->sysmon);
2141 	qcom_remove_ssr_subdev(rproc, &qproc->ssr_subdev);
2142 	qcom_remove_pdm_subdev(rproc, &qproc->pdm_subdev);
2143 	qcom_remove_smd_subdev(rproc, &qproc->smd_subdev);
2144 	qcom_remove_glink_subdev(rproc, &qproc->glink_subdev);
2145 
2146 	q6v5_pds_detach(qproc, qproc->proxy_pds, qproc->proxy_pd_count);
2147 }
2148 
2149 static const struct rproc_hexagon_res sc7180_mss = {
2150 	.hexagon_mba_image = "mba.mbn",
2151 	.proxy_clk_names = (char*[]){
2152 		"xo",
2153 		NULL
2154 	},
2155 	.reset_clk_names = (char*[]){
2156 		"iface",
2157 		"bus",
2158 		"snoc_axi",
2159 		NULL
2160 	},
2161 	.active_clk_names = (char*[]){
2162 		"mnoc_axi",
2163 		"nav",
2164 		NULL
2165 	},
2166 	.proxy_pd_names = (char*[]){
2167 		"cx",
2168 		"mx",
2169 		"mss",
2170 		NULL
2171 	},
2172 	.need_mem_protection = true,
2173 	.has_alt_reset = false,
2174 	.has_mba_logs = true,
2175 	.has_spare_reg = true,
2176 	.has_qaccept_regs = false,
2177 	.has_ext_cntl_regs = false,
2178 	.has_vq6 = false,
2179 	.version = MSS_SC7180,
2180 };
2181 
2182 static const struct rproc_hexagon_res sc7280_mss = {
2183 	.hexagon_mba_image = "mba.mbn",
2184 	.proxy_clk_names = (char*[]){
2185 		"xo",
2186 		"pka",
2187 		NULL
2188 	},
2189 	.active_clk_names = (char*[]){
2190 		"iface",
2191 		"offline",
2192 		"snoc_axi",
2193 		NULL
2194 	},
2195 	.proxy_pd_names = (char*[]){
2196 		"cx",
2197 		"mss",
2198 		NULL
2199 	},
2200 	.need_mem_protection = true,
2201 	.has_alt_reset = false,
2202 	.has_mba_logs = true,
2203 	.has_spare_reg = false,
2204 	.has_qaccept_regs = true,
2205 	.has_ext_cntl_regs = true,
2206 	.has_vq6 = true,
2207 	.version = MSS_SC7280,
2208 };
2209 
2210 static const struct rproc_hexagon_res sdm660_mss = {
2211 	.hexagon_mba_image = "mba.mbn",
2212 	.proxy_clk_names = (char*[]){
2213 			"xo",
2214 			"qdss",
2215 			"mem",
2216 			NULL
2217 	},
2218 	.active_clk_names = (char*[]){
2219 			"iface",
2220 			"bus",
2221 			"gpll0_mss",
2222 			"mnoc_axi",
2223 			"snoc_axi",
2224 			NULL
2225 	},
2226 	.proxy_pd_names = (char*[]){
2227 			"cx",
2228 			"mx",
2229 			NULL
2230 	},
2231 	.need_mem_protection = true,
2232 	.has_alt_reset = false,
2233 	.has_mba_logs = false,
2234 	.has_spare_reg = false,
2235 	.has_qaccept_regs = false,
2236 	.has_ext_cntl_regs = false,
2237 	.has_vq6 = false,
2238 	.version = MSS_SDM660,
2239 };
2240 
2241 static const struct rproc_hexagon_res sdm845_mss = {
2242 	.hexagon_mba_image = "mba.mbn",
2243 	.proxy_clk_names = (char*[]){
2244 			"xo",
2245 			"prng",
2246 			NULL
2247 	},
2248 	.reset_clk_names = (char*[]){
2249 			"iface",
2250 			"snoc_axi",
2251 			NULL
2252 	},
2253 	.active_clk_names = (char*[]){
2254 			"bus",
2255 			"mem",
2256 			"gpll0_mss",
2257 			"mnoc_axi",
2258 			NULL
2259 	},
2260 	.proxy_pd_names = (char*[]){
2261 			"cx",
2262 			"mx",
2263 			"mss",
2264 			NULL
2265 	},
2266 	.need_mem_protection = true,
2267 	.has_alt_reset = true,
2268 	.has_mba_logs = false,
2269 	.has_spare_reg = false,
2270 	.has_qaccept_regs = false,
2271 	.has_ext_cntl_regs = false,
2272 	.has_vq6 = false,
2273 	.version = MSS_SDM845,
2274 };
2275 
2276 static const struct rproc_hexagon_res msm8998_mss = {
2277 	.hexagon_mba_image = "mba.mbn",
2278 	.proxy_clk_names = (char*[]){
2279 			"xo",
2280 			"qdss",
2281 			"mem",
2282 			NULL
2283 	},
2284 	.active_clk_names = (char*[]){
2285 			"iface",
2286 			"bus",
2287 			"gpll0_mss",
2288 			"mnoc_axi",
2289 			"snoc_axi",
2290 			NULL
2291 	},
2292 	.proxy_pd_names = (char*[]){
2293 			"cx",
2294 			"mx",
2295 			NULL
2296 	},
2297 	.need_mem_protection = true,
2298 	.has_alt_reset = false,
2299 	.has_mba_logs = false,
2300 	.has_spare_reg = false,
2301 	.has_qaccept_regs = false,
2302 	.has_ext_cntl_regs = false,
2303 	.has_vq6 = false,
2304 	.version = MSS_MSM8998,
2305 };
2306 
2307 static const struct rproc_hexagon_res msm8996_mss = {
2308 	.hexagon_mba_image = "mba.mbn",
2309 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2310 		{
2311 			.supply = "pll",
2312 			.uA = 100000,
2313 		},
2314 		{}
2315 	},
2316 	.proxy_clk_names = (char*[]){
2317 			"xo",
2318 			"qdss",
2319 			NULL
2320 	},
2321 	.active_clk_names = (char*[]){
2322 			"iface",
2323 			"bus",
2324 			"mem",
2325 			"gpll0_mss",
2326 			"snoc_axi",
2327 			"mnoc_axi",
2328 			NULL
2329 	},
2330 	.proxy_pd_names = (char*[]){
2331 			"mx",
2332 			"cx",
2333 			NULL
2334 	},
2335 	.need_mem_protection = true,
2336 	.has_alt_reset = false,
2337 	.has_mba_logs = false,
2338 	.has_spare_reg = false,
2339 	.has_qaccept_regs = false,
2340 	.has_ext_cntl_regs = false,
2341 	.has_vq6 = false,
2342 	.version = MSS_MSM8996,
2343 };
2344 
2345 static const struct rproc_hexagon_res msm8909_mss = {
2346 	.hexagon_mba_image = "mba.mbn",
2347 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2348 		{
2349 			.supply = "pll",
2350 			.uA = 100000,
2351 		},
2352 		{}
2353 	},
2354 	.proxy_clk_names = (char*[]){
2355 		"xo",
2356 		NULL
2357 	},
2358 	.active_clk_names = (char*[]){
2359 		"iface",
2360 		"bus",
2361 		"mem",
2362 		NULL
2363 	},
2364 	.proxy_pd_names = (char*[]){
2365 		"mx",
2366 		"cx",
2367 		NULL
2368 	},
2369 	.need_mem_protection = false,
2370 	.has_alt_reset = false,
2371 	.has_mba_logs = false,
2372 	.has_spare_reg = false,
2373 	.has_qaccept_regs = false,
2374 	.has_ext_cntl_regs = false,
2375 	.has_vq6 = false,
2376 	.version = MSS_MSM8909,
2377 };
2378 
2379 static const struct rproc_hexagon_res msm8916_mss = {
2380 	.hexagon_mba_image = "mba.mbn",
2381 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2382 		{
2383 			.supply = "pll",
2384 			.uA = 100000,
2385 		},
2386 		{}
2387 	},
2388 	.fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2389 		{
2390 			.supply = "mx",
2391 			.uV = 1050000,
2392 		},
2393 		{
2394 			.supply = "cx",
2395 			.uA = 100000,
2396 		},
2397 		{}
2398 	},
2399 	.proxy_clk_names = (char*[]){
2400 		"xo",
2401 		NULL
2402 	},
2403 	.active_clk_names = (char*[]){
2404 		"iface",
2405 		"bus",
2406 		"mem",
2407 		NULL
2408 	},
2409 	.proxy_pd_names = (char*[]){
2410 		"mx",
2411 		"cx",
2412 		NULL
2413 	},
2414 	.need_mem_protection = false,
2415 	.has_alt_reset = false,
2416 	.has_mba_logs = false,
2417 	.has_spare_reg = false,
2418 	.has_qaccept_regs = false,
2419 	.has_ext_cntl_regs = false,
2420 	.has_vq6 = false,
2421 	.version = MSS_MSM8916,
2422 };
2423 
2424 static const struct rproc_hexagon_res msm8953_mss = {
2425 	.hexagon_mba_image = "mba.mbn",
2426 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2427 		{
2428 			.supply = "pll",
2429 			.uA = 100000,
2430 		},
2431 		{}
2432 	},
2433 	.proxy_clk_names = (char*[]){
2434 		"xo",
2435 		NULL
2436 	},
2437 	.active_clk_names = (char*[]){
2438 		"iface",
2439 		"bus",
2440 		"mem",
2441 		NULL
2442 	},
2443 	.proxy_pd_names = (char*[]) {
2444 		"cx",
2445 		"mx",
2446 		"mss",
2447 		NULL
2448 	},
2449 	.need_mem_protection = false,
2450 	.has_alt_reset = false,
2451 	.has_mba_logs = false,
2452 	.has_spare_reg = false,
2453 	.has_qaccept_regs = false,
2454 	.has_ext_cntl_regs = false,
2455 	.has_vq6 = false,
2456 	.version = MSS_MSM8953,
2457 };
2458 
2459 static const struct rproc_hexagon_res msm8974_mss = {
2460 	.hexagon_mba_image = "mba.b00",
2461 	.proxy_supply = (struct qcom_mss_reg_res[]) {
2462 		{
2463 			.supply = "pll",
2464 			.uA = 100000,
2465 		},
2466 		{
2467 			.supply = "mx",
2468 			.uV = 1050000,
2469 		},
2470 		{}
2471 	},
2472 	.fallback_proxy_supply = (struct qcom_mss_reg_res[]) {
2473 		{
2474 			.supply = "cx",
2475 			.uA = 100000,
2476 		},
2477 		{}
2478 	},
2479 	.active_supply = (struct qcom_mss_reg_res[]) {
2480 		{
2481 			.supply = "mss",
2482 			.uV = 1050000,
2483 			.uA = 100000,
2484 		},
2485 		{}
2486 	},
2487 	.proxy_clk_names = (char*[]){
2488 		"xo",
2489 		NULL
2490 	},
2491 	.active_clk_names = (char*[]){
2492 		"iface",
2493 		"bus",
2494 		"mem",
2495 		NULL
2496 	},
2497 	.proxy_pd_names = (char*[]){
2498 		"cx",
2499 		NULL
2500 	},
2501 	.need_mem_protection = false,
2502 	.has_alt_reset = false,
2503 	.has_mba_logs = false,
2504 	.has_spare_reg = false,
2505 	.has_qaccept_regs = false,
2506 	.has_ext_cntl_regs = false,
2507 	.has_vq6 = false,
2508 	.version = MSS_MSM8974,
2509 };
2510 
2511 static const struct of_device_id q6v5_of_match[] = {
2512 	{ .compatible = "qcom,q6v5-pil", .data = &msm8916_mss},
2513 	{ .compatible = "qcom,msm8909-mss-pil", .data = &msm8909_mss},
2514 	{ .compatible = "qcom,msm8916-mss-pil", .data = &msm8916_mss},
2515 	{ .compatible = "qcom,msm8953-mss-pil", .data = &msm8953_mss},
2516 	{ .compatible = "qcom,msm8974-mss-pil", .data = &msm8974_mss},
2517 	{ .compatible = "qcom,msm8996-mss-pil", .data = &msm8996_mss},
2518 	{ .compatible = "qcom,msm8998-mss-pil", .data = &msm8998_mss},
2519 	{ .compatible = "qcom,sc7180-mss-pil", .data = &sc7180_mss},
2520 	{ .compatible = "qcom,sc7280-mss-pil", .data = &sc7280_mss},
2521 	{ .compatible = "qcom,sdm660-mss-pil", .data = &sdm660_mss},
2522 	{ .compatible = "qcom,sdm845-mss-pil", .data = &sdm845_mss},
2523 	{ },
2524 };
2525 MODULE_DEVICE_TABLE(of, q6v5_of_match);
2526 
2527 static struct platform_driver q6v5_driver = {
2528 	.probe = q6v5_probe,
2529 	.remove = q6v5_remove,
2530 	.driver = {
2531 		.name = "qcom-q6v5-mss",
2532 		.of_match_table = q6v5_of_match,
2533 	},
2534 };
2535 module_platform_driver(q6v5_driver);
2536 
2537 MODULE_DESCRIPTION("Qualcomm Self-authenticating modem remoteproc driver");
2538 MODULE_LICENSE("GPL v2");
2539