firmware.c 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2022. Qualcomm Innovation Center, Inc. All rights reserved.
  4. */
  5. #include <linux/types.h>
  6. #include <linux/list.h>
  7. #include <linux/of_address.h>
  8. #include <linux/firmware.h>
  9. #include <linux/qcom_scm.h>
  10. #include <linux/soc/qcom/mdt_loader.h>
  11. #include <linux/soc/qcom/smem.h>
  12. #include "msm_vidc_core.h"
  13. #include "msm_vidc_debug.h"
  14. #include "msm_vidc_dt.h"
  15. #include "msm_vidc_events.h"
  16. #include "firmware.h"
  17. #define MAX_FIRMWARE_NAME_SIZE 128
  18. struct tzbsp_memprot {
  19. u32 cp_start;
  20. u32 cp_size;
  21. u32 cp_nonpixel_start;
  22. u32 cp_nonpixel_size;
  23. };
  24. enum tzbsp_video_state {
  25. TZBSP_VIDEO_STATE_SUSPEND = 0,
  26. TZBSP_VIDEO_STATE_RESUME = 1,
  27. TZBSP_VIDEO_STATE_RESTORE_THRESHOLD = 2,
  28. };
  29. static int protect_cp_mem(struct msm_vidc_core *core)
  30. {
  31. struct tzbsp_memprot memprot;
  32. int rc = 0;
  33. struct context_bank_info *cb;
  34. if (!core)
  35. return -EINVAL;
  36. memprot.cp_start = 0x0;
  37. memprot.cp_size = 0x0;
  38. memprot.cp_nonpixel_start = 0x0;
  39. memprot.cp_nonpixel_size = 0x0;
  40. list_for_each_entry(cb, &core->dt->context_banks, list) {
  41. if (!strcmp(cb->name, "venus_ns")) {
  42. memprot.cp_size = cb->addr_range.start;
  43. d_vpr_h("%s: memprot.cp_size: %#x\n",
  44. __func__, memprot.cp_size);
  45. }
  46. if (!strcmp(cb->name, "venus_sec_non_pixel")) {
  47. memprot.cp_nonpixel_start = cb->addr_range.start;
  48. memprot.cp_nonpixel_size = cb->addr_range.size;
  49. d_vpr_h("%s: cp_nonpixel_start: %#x size: %#x\n",
  50. __func__, memprot.cp_nonpixel_start,
  51. memprot.cp_nonpixel_size);
  52. }
  53. }
  54. rc = qcom_scm_mem_protect_video_var(memprot.cp_start, memprot.cp_size,
  55. memprot.cp_nonpixel_start, memprot.cp_nonpixel_size);
  56. if (rc)
  57. d_vpr_e("Failed to protect memory(%d)\n", rc);
  58. trace_venus_hfi_var_done(
  59. memprot.cp_start, memprot.cp_size,
  60. memprot.cp_nonpixel_start, memprot.cp_nonpixel_size);
  61. return rc;
  62. }
  63. static int __load_fw_to_memory(struct platform_device *pdev,
  64. const char *fw_name)
  65. {
  66. int rc = 0;
  67. const struct firmware *firmware = NULL;
  68. char firmware_name[MAX_FIRMWARE_NAME_SIZE] = { 0 };
  69. struct device_node *node = NULL;
  70. struct resource res = { 0 };
  71. phys_addr_t phys = 0;
  72. size_t res_size = 0;
  73. ssize_t fw_size = 0;
  74. void *virt = NULL;
  75. int pas_id = 0;
  76. if (!fw_name || !(*fw_name) || !pdev) {
  77. d_vpr_e("%s: Invalid inputs\n", __func__);
  78. return -EINVAL;
  79. }
  80. if (strlen(fw_name) >= MAX_FIRMWARE_NAME_SIZE - 4) {
  81. d_vpr_e("%s: Invalid fw name\n", __func__);
  82. return -EINVAL;
  83. }
  84. scnprintf(firmware_name, ARRAY_SIZE(firmware_name), "%s.mbn", fw_name);
  85. rc = of_property_read_u32(pdev->dev.of_node, "pas-id", &pas_id);
  86. if (rc) {
  87. d_vpr_e("%s: failed to read \"pas-id\". error %d\n",
  88. __func__, rc);
  89. goto exit;
  90. }
  91. node = of_parse_phandle(pdev->dev.of_node, "memory-region", 0);
  92. if (!node) {
  93. d_vpr_e("%s: failed to read \"memory-region\"\n",
  94. __func__);
  95. return -EINVAL;
  96. }
  97. rc = of_address_to_resource(node, 0, &res);
  98. if (rc) {
  99. d_vpr_e("%s: failed to read \"memory-region\", error %d\n",
  100. __func__, rc);
  101. goto exit;
  102. }
  103. phys = res.start;
  104. res_size = (size_t)resource_size(&res);
  105. rc = request_firmware(&firmware, firmware_name, &pdev->dev);
  106. if (rc) {
  107. d_vpr_e("%s: failed to request fw \"%s\", error %d\n",
  108. __func__, firmware_name, rc);
  109. goto exit;
  110. }
  111. fw_size = qcom_mdt_get_size(firmware);
  112. if (fw_size < 0 || res_size < (size_t)fw_size) {
  113. rc = -EINVAL;
  114. d_vpr_e("%s: out of bound fw image fw size: %ld, res_size: %lu",
  115. __func__, fw_size, res_size);
  116. goto exit;
  117. }
  118. virt = memremap(phys, res_size, MEMREMAP_WC);
  119. if (!virt) {
  120. d_vpr_e("%s: failed to remap fw memory phys %pa[p]\n",
  121. __func__, phys);
  122. return -ENOMEM;
  123. }
  124. /* prevent system suspend during fw_load */
  125. pm_stay_awake(pdev->dev.parent);
  126. rc = qcom_mdt_load(&pdev->dev, firmware, firmware_name,
  127. pas_id, virt, phys, res_size, NULL);
  128. pm_relax(pdev->dev.parent);
  129. if (rc) {
  130. d_vpr_e("%s: error %d loading fw \"%s\"\n",
  131. __func__, rc, firmware_name);
  132. goto exit;
  133. }
  134. rc = qcom_scm_pas_auth_and_reset(pas_id);
  135. if (rc) {
  136. d_vpr_e("%s: error %d authenticating fw \"%s\"\n",
  137. __func__, rc, firmware_name);
  138. goto exit;
  139. }
  140. memunmap(virt);
  141. release_firmware(firmware);
  142. d_vpr_h("%s: firmware \"%s\" loaded successfully\n",
  143. __func__, firmware_name);
  144. return pas_id;
  145. exit:
  146. if (virt)
  147. memunmap(virt);
  148. if (firmware)
  149. release_firmware(firmware);
  150. return rc;
  151. }
  152. int fw_load(struct msm_vidc_core *core)
  153. {
  154. int rc;
  155. if (!core->dt->fw_cookie) {
  156. core->dt->fw_cookie = __load_fw_to_memory(core->pdev,
  157. core->dt->fw_name);
  158. if (core->dt->fw_cookie <= 0) {
  159. d_vpr_e("%s: firmware download failed %d\n",
  160. __func__, core->dt->fw_cookie);
  161. core->dt->fw_cookie = 0;
  162. return -ENOMEM;
  163. }
  164. }
  165. rc = protect_cp_mem(core);
  166. if (rc) {
  167. d_vpr_e("%s: protect memory failed\n", __func__);
  168. goto fail_protect_mem;
  169. }
  170. return rc;
  171. fail_protect_mem:
  172. if (core->dt->fw_cookie)
  173. qcom_scm_pas_shutdown(core->dt->fw_cookie);
  174. core->dt->fw_cookie = 0;
  175. return rc;
  176. }
  177. int fw_unload(struct msm_vidc_core *core)
  178. {
  179. int ret;
  180. if (!core->dt->fw_cookie)
  181. return -EINVAL;
  182. ret = qcom_scm_pas_shutdown(core->dt->fw_cookie);
  183. if (ret)
  184. d_vpr_e("Firmware unload failed rc=%d\n", ret);
  185. core->dt->fw_cookie = 0;
  186. return ret;
  187. }
  188. int fw_suspend(struct msm_vidc_core *core)
  189. {
  190. return qcom_scm_set_remote_state(TZBSP_VIDEO_STATE_SUSPEND, 0);
  191. }
  192. int fw_resume(struct msm_vidc_core *core)
  193. {
  194. return qcom_scm_set_remote_state(TZBSP_VIDEO_STATE_RESUME, 0);
  195. }