cvp_fw_load.c 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2020, The Linux Foundation. All rights reserved.
  4. */
  5. #include <linux/of.h>
  6. #include <linux/pm_qos.h>
  7. #include <linux/platform_device.h>
  8. #include <linux/qcom_scm.h>
  9. #include "msm_cvp_debug.h"
  10. #include "cvp_comm_def.h"
  11. #include "cvp_core_hfi.h"
  12. #include "cvp_hfi.h"
  13. #include <linux/of_address.h>
  14. #include <linux/firmware.h>
  15. #include <linux/soc/qcom/mdt_loader.h>
  16. #define MAX_FIRMWARE_NAME_SIZE 128
  17. static int __load_fw_to_memory(struct platform_device *pdev,
  18. const char *fw_name)
  19. {
  20. int rc = 0;
  21. const struct firmware *firmware = NULL;
  22. char firmware_name[MAX_FIRMWARE_NAME_SIZE] = {0};
  23. struct device_node *node = NULL;
  24. struct resource res = {0};
  25. phys_addr_t phys = 0;
  26. size_t res_size = 0;
  27. ssize_t fw_size = 0;
  28. void *virt = NULL;
  29. int pas_id = 0;
  30. if (!fw_name || !(*fw_name) || !pdev) {
  31. dprintk(CVP_ERR, "%s: Invalid inputs\n", __func__);
  32. return -EINVAL;
  33. }
  34. if (strlen(fw_name) >= MAX_FIRMWARE_NAME_SIZE - 4) {
  35. dprintk(CVP_ERR, "%s: Invalid fw name\n", __func__);
  36. return -EINVAL;
  37. }
  38. scnprintf(firmware_name, ARRAY_SIZE(firmware_name), "%s.mdt", fw_name);
  39. rc = of_property_read_u32(pdev->dev.of_node, "pas-id", &pas_id);
  40. if (rc) {
  41. dprintk(CVP_ERR,
  42. "%s: error %d while reading DT for \"pas-id\"\n",
  43. __func__, rc);
  44. goto exit;
  45. }
  46. node = of_parse_phandle(pdev->dev.of_node, "memory-region", 0);
  47. if (!node) {
  48. dprintk(CVP_ERR,
  49. "%s: DT error getting \"memory-region\" property\n",
  50. __func__);
  51. return -EINVAL;
  52. }
  53. rc = of_address_to_resource(node, 0, &res);
  54. if (rc) {
  55. dprintk(CVP_ERR,
  56. "%s: error %d getting \"memory-region\" resource\n",
  57. __func__, rc);
  58. goto exit;
  59. }
  60. phys = res.start;
  61. res_size = (size_t)resource_size(&res);
  62. rc = request_firmware(&firmware, firmware_name, &pdev->dev);
  63. if (rc) {
  64. dprintk(CVP_ERR, "%s: error %d requesting \"%s\"\n",
  65. __func__, rc, firmware_name);
  66. goto exit;
  67. }
  68. fw_size = qcom_mdt_get_size(firmware);
  69. if (fw_size < 0 || res_size < (size_t)fw_size) {
  70. rc = -EINVAL;
  71. dprintk(CVP_ERR,
  72. "%s: Corrupted fw image. Alloc size: %lu, fw size: %ld",
  73. __func__, res_size, fw_size);
  74. goto exit;
  75. }
  76. virt = memremap(phys, res_size, MEMREMAP_WC);
  77. if (!virt) {
  78. rc = -ENOMEM;
  79. dprintk(CVP_ERR, "%s: unable to remap firmware memory\n",
  80. __func__);
  81. goto exit;
  82. }
  83. rc = qcom_mdt_load(&pdev->dev, firmware, firmware_name,
  84. pas_id, virt, phys, res_size, NULL);
  85. if (rc) {
  86. dprintk(CVP_ERR, "%s: error %d loading \"%s\"\n",
  87. __func__, rc, firmware_name);
  88. goto exit;
  89. }
  90. rc = qcom_scm_pas_auth_and_reset(pas_id);
  91. if (rc) {
  92. dprintk(CVP_ERR, "%s: error %d authenticating \"%s\"\n",
  93. __func__, rc, firmware_name);
  94. goto exit;
  95. }
  96. memunmap(virt);
  97. release_firmware(firmware);
  98. dprintk(CVP_CORE, "%s: firmware \"%s\" loaded successfully\n",
  99. __func__, firmware_name);
  100. return pas_id;
  101. exit:
  102. if (virt)
  103. memunmap(virt);
  104. if (firmware)
  105. release_firmware(firmware);
  106. return rc;
  107. }
  108. int load_cvp_fw_impl(struct iris_hfi_device *device)
  109. {
  110. int rc = 0;
  111. if (!device->resources.fw.cookie) {
  112. device->resources.fw.cookie =
  113. __load_fw_to_memory(device->res->pdev,
  114. device->res->fw_name);
  115. if (device->resources.fw.cookie <= 0) {
  116. dprintk(CVP_ERR, "Failed to download firmware\n");
  117. device->resources.fw.cookie = 0;
  118. rc = -ENOMEM;
  119. }
  120. }
  121. return rc;
  122. }
  123. int unload_cvp_fw_impl(struct iris_hfi_device *device)
  124. {
  125. qcom_scm_pas_shutdown(device->resources.fw.cookie);
  126. device->resources.fw.cookie = 0;
  127. return 0;
  128. }