blob: f163704b6ce5ead1e6873c6426e2af5f44b91003 [file] [log] [blame]
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001/*
2 * Remote Processor Framework
3 *
4 * Copyright (C) 2011 Texas Instruments, Inc.
5 * Copyright (C) 2011 Google, Inc.
6 *
7 * Ohad Ben-Cohen <ohad@wizery.com>
8 * Brian Swetland <swetland@google.com>
9 * Mark Grosen <mgrosen@ti.com>
10 * Fernando Guzman Lugo <fernando.lugo@ti.com>
11 * Suman Anna <s-anna@ti.com>
12 * Robert Tivy <rtivy@ti.com>
13 * Armando Uribe De Leon <x0095078@ti.com>
14 *
15 * This program is free software; you can redistribute it and/or
16 * modify it under the terms of the GNU General Public License
17 * version 2 as published by the Free Software Foundation.
18 *
19 * This program is distributed in the hope that it will be useful,
20 * but WITHOUT ANY WARRANTY; without even the implied warranty of
21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 * GNU General Public License for more details.
23 */
24
25#define pr_fmt(fmt) "%s: " fmt, __func__
26
27#include <linux/kernel.h>
28#include <linux/module.h>
29#include <linux/device.h>
30#include <linux/slab.h>
31#include <linux/mutex.h>
32#include <linux/dma-mapping.h>
33#include <linux/firmware.h>
34#include <linux/string.h>
35#include <linux/debugfs.h>
36#include <linux/remoteproc.h>
37#include <linux/iommu.h>
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +030038#include <linux/idr.h>
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020039#include <linux/elf.h>
40#include <linux/virtio_ids.h>
41#include <linux/virtio_ring.h>
Ohad Ben-Cohencf59d3e2012-01-31 15:23:41 +020042#include <asm/byteorder.h>
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020043
44#include "remoteproc_internal.h"
45
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020046typedef int (*rproc_handle_resources_t)(struct rproc *rproc,
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +020047 struct resource_table *table, int len);
48typedef int (*rproc_handle_resource_t)(struct rproc *rproc, void *, int avail);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020049
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +030050/* Unique indices for remoteproc devices */
51static DEFINE_IDA(rproc_dev_index);
52
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -050053static const char * const rproc_crash_names[] = {
54 [RPROC_MMUFAULT] = "mmufault",
55};
56
57/* translate rproc_crash_type to string */
58static const char *rproc_crash_to_string(enum rproc_crash_type type)
59{
60 if (type < ARRAY_SIZE(rproc_crash_names))
61 return rproc_crash_names[type];
62 return "unkown";
63}
64
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020065/*
66 * This is the IOMMU fault handler we register with the IOMMU API
67 * (when relevant; not all remote processors access memory through
68 * an IOMMU).
69 *
70 * IOMMU core will invoke this handler whenever the remote processor
71 * will try to access an unmapped device address.
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020072 */
73static int rproc_iommu_fault(struct iommu_domain *domain, struct device *dev,
Ohad Ben-Cohen77ca2332012-05-21 20:20:05 +030074 unsigned long iova, int flags, void *token)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020075{
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -050076 struct rproc *rproc = token;
77
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020078 dev_err(dev, "iommu fault: da 0x%lx flags 0x%x\n", iova, flags);
79
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -050080 rproc_report_crash(rproc, RPROC_MMUFAULT);
81
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020082 /*
83 * Let the iommu core know we're not really handling this fault;
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -050084 * we just used it as a recovery trigger.
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020085 */
86 return -ENOSYS;
87}
88
89static int rproc_enable_iommu(struct rproc *rproc)
90{
91 struct iommu_domain *domain;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +030092 struct device *dev = rproc->dev.parent;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +020093 int ret;
94
95 /*
96 * We currently use iommu_present() to decide if an IOMMU
97 * setup is needed.
98 *
99 * This works for simple cases, but will easily fail with
100 * platforms that do have an IOMMU, but not for this specific
101 * rproc.
102 *
103 * This will be easily solved by introducing hw capabilities
104 * that will be set by the remoteproc driver.
105 */
106 if (!iommu_present(dev->bus)) {
Mark Grosen0798e1d2011-12-13 08:41:47 +0200107 dev_dbg(dev, "iommu not found\n");
108 return 0;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200109 }
110
111 domain = iommu_domain_alloc(dev->bus);
112 if (!domain) {
113 dev_err(dev, "can't alloc iommu domain\n");
114 return -ENOMEM;
115 }
116
Ohad Ben-Cohen77ca2332012-05-21 20:20:05 +0300117 iommu_set_fault_handler(domain, rproc_iommu_fault, rproc);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200118
119 ret = iommu_attach_device(domain, dev);
120 if (ret) {
121 dev_err(dev, "can't attach iommu device: %d\n", ret);
122 goto free_domain;
123 }
124
125 rproc->domain = domain;
126
127 return 0;
128
129free_domain:
130 iommu_domain_free(domain);
131 return ret;
132}
133
134static void rproc_disable_iommu(struct rproc *rproc)
135{
136 struct iommu_domain *domain = rproc->domain;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300137 struct device *dev = rproc->dev.parent;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200138
139 if (!domain)
140 return;
141
142 iommu_detach_device(domain, dev);
143 iommu_domain_free(domain);
144
145 return;
146}
147
148/*
149 * Some remote processors will ask us to allocate them physically contiguous
150 * memory regions (which we call "carveouts"), and map them to specific
151 * device addresses (which are hardcoded in the firmware).
152 *
153 * They may then ask us to copy objects into specific device addresses (e.g.
154 * code/data sections) or expose us certain symbols in other device address
155 * (e.g. their trace buffer).
156 *
157 * This function is an internal helper with which we can go over the allocated
158 * carveouts and translate specific device address to kernel virtual addresses
159 * so we can access the referenced memory.
160 *
161 * Note: phys_to_virt(iommu_iova_to_phys(rproc->domain, da)) will work too,
162 * but only on kernel direct mapped RAM memory. Instead, we're just using
163 * here the output of the DMA API, which should be more correct.
164 */
Sjur Brændeland72854fb2012-07-15 11:25:27 +0300165void *rproc_da_to_va(struct rproc *rproc, u64 da, int len)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200166{
167 struct rproc_mem_entry *carveout;
168 void *ptr = NULL;
169
170 list_for_each_entry(carveout, &rproc->carveouts, node) {
171 int offset = da - carveout->da;
172
173 /* try next carveout if da is too small */
174 if (offset < 0)
175 continue;
176
177 /* try next carveout if da is too large */
178 if (offset + len > carveout->len)
179 continue;
180
181 ptr = carveout->va + offset;
182
183 break;
184 }
185
186 return ptr;
187}
Sjur Brændeland4afc89d2012-06-19 10:08:18 +0300188EXPORT_SYMBOL(rproc_da_to_va);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200189
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300190int rproc_alloc_vring(struct rproc_vdev *rvdev, int i)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200191{
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100192 struct rproc *rproc = rvdev->rproc;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300193 struct device *dev = &rproc->dev;
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300194 struct rproc_vring *rvring = &rvdev->vring[i];
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100195 dma_addr_t dma;
196 void *va;
197 int ret, size, notifyid;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200198
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300199 /* actual size of vring (in bytes) */
200 size = PAGE_ALIGN(vring_size(rvring->len, rvring->align));
201
202 if (!idr_pre_get(&rproc->notifyids, GFP_KERNEL)) {
203 dev_err(dev, "idr_pre_get failed\n");
204 return -ENOMEM;
205 }
206
207 /*
208 * Allocate non-cacheable memory for the vring. In the future
209 * this call will also configure the IOMMU for us
210 * TODO: let the rproc know the da of this vring
211 */
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300212 va = dma_alloc_coherent(dev->parent, size, &dma, GFP_KERNEL);
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300213 if (!va) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300214 dev_err(dev->parent, "dma_alloc_coherent failed\n");
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300215 return -EINVAL;
216 }
217
218 /*
219 * Assign an rproc-wide unique index for this vring
220 * TODO: assign a notifyid for rvdev updates as well
221 * TODO: let the rproc know the notifyid of this vring
222 * TODO: support predefined notifyids (via resource table)
223 */
224 ret = idr_get_new(&rproc->notifyids, rvring, &notifyid);
225 if (ret) {
226 dev_err(dev, "idr_get_new failed: %d\n", ret);
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300227 dma_free_coherent(dev->parent, size, va, dma);
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300228 return ret;
229 }
230
Sjur Brændeland099a3f32012-09-18 20:32:45 +0200231 /* Store largest notifyid */
232 rproc->max_notifyid = max(rproc->max_notifyid, notifyid);
233
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300234 dev_dbg(dev, "vring%d: va %p dma %x size %x idr %d\n", i, va,
235 dma, size, notifyid);
236
237 rvring->va = va;
238 rvring->dma = dma;
239 rvring->notifyid = notifyid;
240
241 return 0;
242}
243
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200244static int
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300245rproc_parse_vring(struct rproc_vdev *rvdev, struct fw_rsc_vdev *rsc, int i)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200246{
247 struct rproc *rproc = rvdev->rproc;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300248 struct device *dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200249 struct fw_rsc_vdev_vring *vring = &rsc->vring[i];
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300250 struct rproc_vring *rvring = &rvdev->vring[i];
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200251
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100252 dev_dbg(dev, "vdev rsc: vring%d: da %x, qsz %d, align %d\n",
253 i, vring->da, vring->num, vring->align);
254
255 /* make sure reserved bytes are zeroes */
256 if (vring->reserved) {
257 dev_err(dev, "vring rsc has non zero reserved bytes\n");
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200258 return -EINVAL;
259 }
260
Ohad Ben-Cohen63140e02012-02-29 14:42:13 +0200261 /* verify queue size and vring alignment are sane */
262 if (!vring->num || !vring->align) {
263 dev_err(dev, "invalid qsz (%d) or alignment (%d)\n",
264 vring->num, vring->align);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200265 return -EINVAL;
266 }
267
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300268 rvring->len = vring->num;
269 rvring->align = vring->align;
270 rvring->rvdev = rvdev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200271
272 return 0;
273}
274
Sjur Brændeland099a3f32012-09-18 20:32:45 +0200275static int rproc_max_notifyid(int id, void *p, void *data)
276{
277 int *maxid = data;
278 *maxid = max(*maxid, id);
279 return 0;
280}
281
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300282void rproc_free_vring(struct rproc_vring *rvring)
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100283{
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300284 int size = PAGE_ALIGN(vring_size(rvring->len, rvring->align));
285 struct rproc *rproc = rvring->rvdev->rproc;
Sjur Brændeland099a3f32012-09-18 20:32:45 +0200286 int maxid = 0;
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100287
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300288 dma_free_coherent(rproc->dev.parent, size, rvring->va, rvring->dma);
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300289 idr_remove(&rproc->notifyids, rvring->notifyid);
Sjur Brændeland099a3f32012-09-18 20:32:45 +0200290
291 /* Find the largest remaining notifyid */
292 idr_for_each(&rproc->notifyids, rproc_max_notifyid, &maxid);
293 rproc->max_notifyid = maxid;
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100294}
295
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200296/**
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200297 * rproc_handle_vdev() - handle a vdev fw resource
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200298 * @rproc: the remote processor
299 * @rsc: the vring resource descriptor
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200300 * @avail: size of available data (for sanity checking the image)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200301 *
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100302 * This resource entry requests the host to statically register a virtio
303 * device (vdev), and setup everything needed to support it. It contains
304 * everything needed to make it possible: the virtio device id, virtio
305 * device features, vrings information, virtio config space, etc...
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200306 *
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100307 * Before registering the vdev, the vrings are allocated from non-cacheable
308 * physically contiguous memory. Currently we only support two vrings per
309 * remote processor (temporary limitation). We might also want to consider
310 * doing the vring allocation only later when ->find_vqs() is invoked, and
311 * then release them upon ->del_vqs().
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200312 *
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100313 * Note: @da is currently not really handled correctly: we dynamically
314 * allocate it using the DMA API, ignoring requested hard coded addresses,
315 * and we don't take care of any required IOMMU programming. This is all
316 * going to be taken care of when the generic iommu-based DMA API will be
317 * merged. Meanwhile, statically-addressed iommu-based firmware images should
318 * use RSC_DEVMEM resource entries to map their required @da to the physical
319 * address of their base CMA region (ouch, hacky!).
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200320 *
321 * Returns 0 on success, or an appropriate error code otherwise
322 */
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200323static int rproc_handle_vdev(struct rproc *rproc, struct fw_rsc_vdev *rsc,
324 int avail)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200325{
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300326 struct device *dev = &rproc->dev;
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100327 struct rproc_vdev *rvdev;
328 int i, ret;
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200329
330 /* make sure resource isn't truncated */
331 if (sizeof(*rsc) + rsc->num_of_vrings * sizeof(struct fw_rsc_vdev_vring)
332 + rsc->config_len > avail) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300333 dev_err(dev, "vdev rsc is truncated\n");
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200334 return -EINVAL;
335 }
336
337 /* make sure reserved bytes are zeroes */
338 if (rsc->reserved[0] || rsc->reserved[1]) {
339 dev_err(dev, "vdev rsc has non zero reserved bytes\n");
340 return -EINVAL;
341 }
342
343 dev_dbg(dev, "vdev rsc: id %d, dfeatures %x, cfg len %d, %d vrings\n",
344 rsc->id, rsc->dfeatures, rsc->config_len, rsc->num_of_vrings);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200345
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100346 /* we currently support only two vrings per rvdev */
347 if (rsc->num_of_vrings > ARRAY_SIZE(rvdev->vring)) {
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200348 dev_err(dev, "too many vrings: %d\n", rsc->num_of_vrings);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200349 return -EINVAL;
350 }
351
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100352 rvdev = kzalloc(sizeof(struct rproc_vdev), GFP_KERNEL);
353 if (!rvdev)
354 return -ENOMEM;
355
356 rvdev->rproc = rproc;
357
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300358 /* parse the vrings */
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200359 for (i = 0; i < rsc->num_of_vrings; i++) {
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300360 ret = rproc_parse_vring(rvdev, rsc, i);
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100361 if (ret)
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300362 goto free_rvdev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200363 }
364
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100365 /* remember the device features */
366 rvdev->dfeatures = rsc->dfeatures;
367
368 list_add_tail(&rvdev->node, &rproc->rvdevs);
369
370 /* it is now safe to add the virtio device */
371 ret = rproc_add_virtio_dev(rvdev, rsc->id);
372 if (ret)
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300373 goto free_rvdev;
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100374
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200375 return 0;
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100376
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +0300377free_rvdev:
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100378 kfree(rvdev);
379 return ret;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200380}
381
382/**
383 * rproc_handle_trace() - handle a shared trace buffer resource
384 * @rproc: the remote processor
385 * @rsc: the trace resource descriptor
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200386 * @avail: size of available data (for sanity checking the image)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200387 *
388 * In case the remote processor dumps trace logs into memory,
389 * export it via debugfs.
390 *
391 * Currently, the 'da' member of @rsc should contain the device address
392 * where the remote processor is dumping the traces. Later we could also
393 * support dynamically allocating this address using the generic
394 * DMA API (but currently there isn't a use case for that).
395 *
396 * Returns 0 on success, or an appropriate error code otherwise
397 */
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200398static int rproc_handle_trace(struct rproc *rproc, struct fw_rsc_trace *rsc,
399 int avail)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200400{
401 struct rproc_mem_entry *trace;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300402 struct device *dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200403 void *ptr;
404 char name[15];
405
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200406 if (sizeof(*rsc) > avail) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300407 dev_err(dev, "trace rsc is truncated\n");
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200408 return -EINVAL;
409 }
410
411 /* make sure reserved bytes are zeroes */
412 if (rsc->reserved) {
413 dev_err(dev, "trace rsc has non zero reserved bytes\n");
414 return -EINVAL;
415 }
416
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200417 /* what's the kernel address of this resource ? */
418 ptr = rproc_da_to_va(rproc, rsc->da, rsc->len);
419 if (!ptr) {
420 dev_err(dev, "erroneous trace resource entry\n");
421 return -EINVAL;
422 }
423
424 trace = kzalloc(sizeof(*trace), GFP_KERNEL);
425 if (!trace) {
426 dev_err(dev, "kzalloc trace failed\n");
427 return -ENOMEM;
428 }
429
430 /* set the trace buffer dma properties */
431 trace->len = rsc->len;
432 trace->va = ptr;
433
434 /* make sure snprintf always null terminates, even if truncating */
435 snprintf(name, sizeof(name), "trace%d", rproc->num_traces);
436
437 /* create the debugfs entry */
438 trace->priv = rproc_create_trace_file(name, rproc, trace);
439 if (!trace->priv) {
440 trace->va = NULL;
441 kfree(trace);
442 return -EINVAL;
443 }
444
445 list_add_tail(&trace->node, &rproc->traces);
446
447 rproc->num_traces++;
448
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200449 dev_dbg(dev, "%s added: va %p, da 0x%x, len 0x%x\n", name, ptr,
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200450 rsc->da, rsc->len);
451
452 return 0;
453}
454
455/**
456 * rproc_handle_devmem() - handle devmem resource entry
457 * @rproc: remote processor handle
458 * @rsc: the devmem resource entry
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200459 * @avail: size of available data (for sanity checking the image)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200460 *
461 * Remote processors commonly need to access certain on-chip peripherals.
462 *
463 * Some of these remote processors access memory via an iommu device,
464 * and might require us to configure their iommu before they can access
465 * the on-chip peripherals they need.
466 *
467 * This resource entry is a request to map such a peripheral device.
468 *
469 * These devmem entries will contain the physical address of the device in
470 * the 'pa' member. If a specific device address is expected, then 'da' will
471 * contain it (currently this is the only use case supported). 'len' will
472 * contain the size of the physical region we need to map.
473 *
474 * Currently we just "trust" those devmem entries to contain valid physical
475 * addresses, but this is going to change: we want the implementations to
476 * tell us ranges of physical addresses the firmware is allowed to request,
477 * and not allow firmwares to request access to physical addresses that
478 * are outside those ranges.
479 */
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200480static int rproc_handle_devmem(struct rproc *rproc, struct fw_rsc_devmem *rsc,
481 int avail)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200482{
483 struct rproc_mem_entry *mapping;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300484 struct device *dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200485 int ret;
486
487 /* no point in handling this resource without a valid iommu domain */
488 if (!rproc->domain)
489 return -EINVAL;
490
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200491 if (sizeof(*rsc) > avail) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300492 dev_err(dev, "devmem rsc is truncated\n");
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200493 return -EINVAL;
494 }
495
496 /* make sure reserved bytes are zeroes */
497 if (rsc->reserved) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300498 dev_err(dev, "devmem rsc has non zero reserved bytes\n");
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200499 return -EINVAL;
500 }
501
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200502 mapping = kzalloc(sizeof(*mapping), GFP_KERNEL);
503 if (!mapping) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300504 dev_err(dev, "kzalloc mapping failed\n");
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200505 return -ENOMEM;
506 }
507
508 ret = iommu_map(rproc->domain, rsc->da, rsc->pa, rsc->len, rsc->flags);
509 if (ret) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300510 dev_err(dev, "failed to map devmem: %d\n", ret);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200511 goto out;
512 }
513
514 /*
515 * We'll need this info later when we'll want to unmap everything
516 * (e.g. on shutdown).
517 *
518 * We can't trust the remote processor not to change the resource
519 * table, so we must maintain this info independently.
520 */
521 mapping->da = rsc->da;
522 mapping->len = rsc->len;
523 list_add_tail(&mapping->node, &rproc->mappings);
524
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300525 dev_dbg(dev, "mapped devmem pa 0x%x, da 0x%x, len 0x%x\n",
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200526 rsc->pa, rsc->da, rsc->len);
527
528 return 0;
529
530out:
531 kfree(mapping);
532 return ret;
533}
534
535/**
536 * rproc_handle_carveout() - handle phys contig memory allocation requests
537 * @rproc: rproc handle
538 * @rsc: the resource entry
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200539 * @avail: size of available data (for image validation)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200540 *
541 * This function will handle firmware requests for allocation of physically
542 * contiguous memory regions.
543 *
544 * These request entries should come first in the firmware's resource table,
545 * as other firmware entries might request placing other data objects inside
546 * these memory regions (e.g. data/code segments, trace resource entries, ...).
547 *
548 * Allocating memory this way helps utilizing the reserved physical memory
549 * (e.g. CMA) more efficiently, and also minimizes the number of TLB entries
550 * needed to map it (in case @rproc is using an IOMMU). Reducing the TLB
551 * pressure is important; it may have a substantial impact on performance.
552 */
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200553static int rproc_handle_carveout(struct rproc *rproc,
554 struct fw_rsc_carveout *rsc, int avail)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200555{
556 struct rproc_mem_entry *carveout, *mapping;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300557 struct device *dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200558 dma_addr_t dma;
559 void *va;
560 int ret;
561
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200562 if (sizeof(*rsc) > avail) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300563 dev_err(dev, "carveout rsc is truncated\n");
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200564 return -EINVAL;
565 }
566
567 /* make sure reserved bytes are zeroes */
568 if (rsc->reserved) {
569 dev_err(dev, "carveout rsc has non zero reserved bytes\n");
570 return -EINVAL;
571 }
572
573 dev_dbg(dev, "carveout rsc: da %x, pa %x, len %x, flags %x\n",
574 rsc->da, rsc->pa, rsc->len, rsc->flags);
575
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200576 carveout = kzalloc(sizeof(*carveout), GFP_KERNEL);
577 if (!carveout) {
578 dev_err(dev, "kzalloc carveout failed\n");
Dan Carpenter7168d912012-09-25 10:01:56 +0300579 return -ENOMEM;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200580 }
581
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300582 va = dma_alloc_coherent(dev->parent, rsc->len, &dma, GFP_KERNEL);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200583 if (!va) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300584 dev_err(dev->parent, "dma_alloc_coherent err: %d\n", rsc->len);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200585 ret = -ENOMEM;
586 goto free_carv;
587 }
588
589 dev_dbg(dev, "carveout va %p, dma %x, len 0x%x\n", va, dma, rsc->len);
590
591 /*
592 * Ok, this is non-standard.
593 *
594 * Sometimes we can't rely on the generic iommu-based DMA API
595 * to dynamically allocate the device address and then set the IOMMU
596 * tables accordingly, because some remote processors might
597 * _require_ us to use hard coded device addresses that their
598 * firmware was compiled with.
599 *
600 * In this case, we must use the IOMMU API directly and map
601 * the memory to the device address as expected by the remote
602 * processor.
603 *
604 * Obviously such remote processor devices should not be configured
605 * to use the iommu-based DMA API: we expect 'dma' to contain the
606 * physical address in this case.
607 */
608 if (rproc->domain) {
Dan Carpenter7168d912012-09-25 10:01:56 +0300609 mapping = kzalloc(sizeof(*mapping), GFP_KERNEL);
610 if (!mapping) {
611 dev_err(dev, "kzalloc mapping failed\n");
612 ret = -ENOMEM;
613 goto dma_free;
614 }
615
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200616 ret = iommu_map(rproc->domain, rsc->da, dma, rsc->len,
617 rsc->flags);
618 if (ret) {
619 dev_err(dev, "iommu_map failed: %d\n", ret);
Dan Carpenter7168d912012-09-25 10:01:56 +0300620 goto free_mapping;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200621 }
622
623 /*
624 * We'll need this info later when we'll want to unmap
625 * everything (e.g. on shutdown).
626 *
627 * We can't trust the remote processor not to change the
628 * resource table, so we must maintain this info independently.
629 */
630 mapping->da = rsc->da;
631 mapping->len = rsc->len;
632 list_add_tail(&mapping->node, &rproc->mappings);
633
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200634 dev_dbg(dev, "carveout mapped 0x%x to 0x%x\n", rsc->da, dma);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200635 }
636
Ohad Ben-Cohen0e49b722012-07-01 11:30:57 +0300637 /*
638 * Some remote processors might need to know the pa
639 * even though they are behind an IOMMU. E.g., OMAP4's
640 * remote M3 processor needs this so it can control
641 * on-chip hardware accelerators that are not behind
642 * the IOMMU, and therefor must know the pa.
643 *
644 * Generally we don't want to expose physical addresses
645 * if we don't have to (remote processors are generally
646 * _not_ trusted), so we might want to do this only for
647 * remote processor that _must_ have this (e.g. OMAP4's
648 * dual M3 subsystem).
649 *
650 * Non-IOMMU processors might also want to have this info.
651 * In this case, the device address and the physical address
652 * are the same.
653 */
654 rsc->pa = dma;
655
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200656 carveout->va = va;
657 carveout->len = rsc->len;
658 carveout->dma = dma;
659 carveout->da = rsc->da;
660
661 list_add_tail(&carveout->node, &rproc->carveouts);
662
663 return 0;
664
Dan Carpenter7168d912012-09-25 10:01:56 +0300665free_mapping:
666 kfree(mapping);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200667dma_free:
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300668 dma_free_coherent(dev->parent, rsc->len, va, dma);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200669free_carv:
670 kfree(carveout);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200671 return ret;
672}
673
Ohad Ben-Cohene12bc142012-01-31 16:07:27 +0200674/*
675 * A lookup table for resource handlers. The indices are defined in
676 * enum fw_resource_type.
677 */
678static rproc_handle_resource_t rproc_handle_rsc[] = {
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200679 [RSC_CARVEOUT] = (rproc_handle_resource_t)rproc_handle_carveout,
680 [RSC_DEVMEM] = (rproc_handle_resource_t)rproc_handle_devmem,
681 [RSC_TRACE] = (rproc_handle_resource_t)rproc_handle_trace,
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100682 [RSC_VDEV] = NULL, /* VDEVs were handled upon registrarion */
Ohad Ben-Cohene12bc142012-01-31 16:07:27 +0200683};
684
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200685/* handle firmware resource entries before booting the remote processor */
686static int
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200687rproc_handle_boot_rsc(struct rproc *rproc, struct resource_table *table, int len)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200688{
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300689 struct device *dev = &rproc->dev;
Ohad Ben-Cohene12bc142012-01-31 16:07:27 +0200690 rproc_handle_resource_t handler;
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200691 int ret = 0, i;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200692
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200693 for (i = 0; i < table->num; i++) {
694 int offset = table->offset[i];
695 struct fw_rsc_hdr *hdr = (void *)table + offset;
696 int avail = len - offset - sizeof(*hdr);
697 void *rsc = (void *)hdr + sizeof(*hdr);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200698
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200699 /* make sure table isn't truncated */
700 if (avail < 0) {
701 dev_err(dev, "rsc table is truncated\n");
702 return -EINVAL;
703 }
704
705 dev_dbg(dev, "rsc: type %d\n", hdr->type);
706
707 if (hdr->type >= RSC_LAST) {
708 dev_warn(dev, "unsupported resource %d\n", hdr->type);
Ohad Ben-Cohene12bc142012-01-31 16:07:27 +0200709 continue;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200710 }
711
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200712 handler = rproc_handle_rsc[hdr->type];
Ohad Ben-Cohene12bc142012-01-31 16:07:27 +0200713 if (!handler)
714 continue;
715
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200716 ret = handler(rproc, rsc, avail);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200717 if (ret)
718 break;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200719 }
720
721 return ret;
722}
723
724/* handle firmware resource entries while registering the remote processor */
725static int
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200726rproc_handle_virtio_rsc(struct rproc *rproc, struct resource_table *table, int len)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200727{
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300728 struct device *dev = &rproc->dev;
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200729 int ret = 0, i;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200730
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200731 for (i = 0; i < table->num; i++) {
732 int offset = table->offset[i];
733 struct fw_rsc_hdr *hdr = (void *)table + offset;
734 int avail = len - offset - sizeof(*hdr);
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100735 struct fw_rsc_vdev *vrsc;
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200736
737 /* make sure table isn't truncated */
738 if (avail < 0) {
739 dev_err(dev, "rsc table is truncated\n");
740 return -EINVAL;
741 }
742
743 dev_dbg(dev, "%s: rsc type %d\n", __func__, hdr->type);
744
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100745 if (hdr->type != RSC_VDEV)
746 continue;
747
748 vrsc = (struct fw_rsc_vdev *)hdr->data;
749
750 ret = rproc_handle_vdev(rproc, vrsc, avail);
751 if (ret)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200752 break;
Ohad Ben-Cohenfd2c15e2012-02-01 21:56:16 +0200753 }
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200754
755 return ret;
756}
757
758/**
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200759 * rproc_resource_cleanup() - clean up and free all acquired resources
760 * @rproc: rproc handle
761 *
762 * This function will free all resources acquired for @rproc, and it
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +0100763 * is called whenever @rproc either shuts down or fails to boot.
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200764 */
765static void rproc_resource_cleanup(struct rproc *rproc)
766{
767 struct rproc_mem_entry *entry, *tmp;
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300768 struct device *dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200769
770 /* clean up debugfs trace entries */
771 list_for_each_entry_safe(entry, tmp, &rproc->traces, node) {
772 rproc_remove_trace_file(entry->priv);
773 rproc->num_traces--;
774 list_del(&entry->node);
775 kfree(entry);
776 }
777
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200778 /* clean up carveout allocations */
779 list_for_each_entry_safe(entry, tmp, &rproc->carveouts, node) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300780 dma_free_coherent(dev->parent, entry->len, entry->va, entry->dma);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200781 list_del(&entry->node);
782 kfree(entry);
783 }
784
785 /* clean up iommu mapping entries */
786 list_for_each_entry_safe(entry, tmp, &rproc->mappings, node) {
787 size_t unmapped;
788
789 unmapped = iommu_unmap(rproc->domain, entry->da, entry->len);
790 if (unmapped != entry->len) {
791 /* nothing much to do besides complaining */
Sjur Brændelande981f6d2012-06-10 14:37:07 +0300792 dev_err(dev, "failed to unmap %u/%zu\n", entry->len,
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200793 unmapped);
794 }
795
796 list_del(&entry->node);
797 kfree(entry);
798 }
799}
800
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200801/*
802 * take a firmware and boot a remote processor with it.
803 */
804static int rproc_fw_boot(struct rproc *rproc, const struct firmware *fw)
805{
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +0300806 struct device *dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200807 const char *name = rproc->firmware;
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100808 struct resource_table *table;
809 int ret, tablesz;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200810
811 ret = rproc_fw_sanity_check(rproc, fw);
812 if (ret)
813 return ret;
814
Sjur Brændelande981f6d2012-06-10 14:37:07 +0300815 dev_info(dev, "Booting fw image %s, size %zd\n", name, fw->size);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200816
817 /*
818 * if enabling an IOMMU isn't relevant for this rproc, this is
819 * just a nop
820 */
821 ret = rproc_enable_iommu(rproc);
822 if (ret) {
823 dev_err(dev, "can't enable iommu: %d\n", ret);
824 return ret;
825 }
826
Sjur Brændeland3e5f9eb2012-06-19 09:56:44 +0300827 rproc->bootaddr = rproc_get_boot_addr(rproc, fw);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200828
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100829 /* look for the resource table */
Sjur Brændelandbd484982012-06-19 09:55:34 +0300830 table = rproc_find_rsc_table(rproc, fw, &tablesz);
Sjur Brændeland30338cf2012-06-10 14:37:51 +0300831 if (!table) {
832 ret = -EINVAL;
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100833 goto clean_up;
Sjur Brændeland30338cf2012-06-10 14:37:51 +0300834 }
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100835
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200836 /* handle fw resources which are required to boot rproc */
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100837 ret = rproc_handle_boot_rsc(rproc, table, tablesz);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200838 if (ret) {
839 dev_err(dev, "Failed to process resources: %d\n", ret);
840 goto clean_up;
841 }
842
843 /* load the ELF segments to memory */
Sjur Brændelandbd484982012-06-19 09:55:34 +0300844 ret = rproc_load_segments(rproc, fw);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200845 if (ret) {
846 dev_err(dev, "Failed to load program segments: %d\n", ret);
847 goto clean_up;
848 }
849
850 /* power up the remote processor */
851 ret = rproc->ops->start(rproc);
852 if (ret) {
853 dev_err(dev, "can't start rproc %s: %d\n", rproc->name, ret);
854 goto clean_up;
855 }
856
857 rproc->state = RPROC_RUNNING;
858
859 dev_info(dev, "remote processor %s is now up\n", rproc->name);
860
861 return 0;
862
863clean_up:
864 rproc_resource_cleanup(rproc);
865 rproc_disable_iommu(rproc);
866 return ret;
867}
868
869/*
870 * take a firmware and look for virtio devices to register.
871 *
872 * Note: this function is called asynchronously upon registration of the
873 * remote processor (so we must wait until it completes before we try
874 * to unregister the device. one other option is just to use kref here,
875 * that might be cleaner).
876 */
877static void rproc_fw_config_virtio(const struct firmware *fw, void *context)
878{
879 struct rproc *rproc = context;
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100880 struct resource_table *table;
881 int ret, tablesz;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200882
883 if (rproc_fw_sanity_check(rproc, fw) < 0)
884 goto out;
885
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100886 /* look for the resource table */
Sjur Brændelandbd484982012-06-19 09:55:34 +0300887 table = rproc_find_rsc_table(rproc, fw, &tablesz);
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100888 if (!table)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200889 goto out;
Ohad Ben-Cohen1e3e2c72012-02-13 21:47:49 +0100890
891 /* look for virtio devices and register them */
892 ret = rproc_handle_virtio_rsc(rproc, table, tablesz);
893 if (ret)
894 goto out;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200895
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200896out:
Jesper Juhl3cc6e782012-04-09 22:51:25 +0200897 release_firmware(fw);
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +0300898 /* allow rproc_del() contexts, if any, to proceed */
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200899 complete_all(&rproc->firmware_loading_complete);
900}
901
Fernando Guzman Lugo70b85ef2012-08-30 13:26:13 -0500902static int rproc_add_virtio_devices(struct rproc *rproc)
903{
904 int ret;
905
906 /* rproc_del() calls must wait until async loader completes */
907 init_completion(&rproc->firmware_loading_complete);
908
909 /*
910 * We must retrieve early virtio configuration info from
911 * the firmware (e.g. whether to register a virtio device,
912 * what virtio features does it support, ...).
913 *
914 * We're initiating an asynchronous firmware loading, so we can
915 * be built-in kernel code, without hanging the boot process.
916 */
917 ret = request_firmware_nowait(THIS_MODULE, FW_ACTION_HOTPLUG,
918 rproc->firmware, &rproc->dev, GFP_KERNEL,
919 rproc, rproc_fw_config_virtio);
920 if (ret < 0) {
921 dev_err(&rproc->dev, "request_firmware_nowait err: %d\n", ret);
922 complete_all(&rproc->firmware_loading_complete);
923 }
924
925 return ret;
926}
927
928/**
929 * rproc_trigger_recovery() - recover a remoteproc
930 * @rproc: the remote processor
931 *
932 * The recovery is done by reseting all the virtio devices, that way all the
933 * rpmsg drivers will be reseted along with the remote processor making the
934 * remoteproc functional again.
935 *
936 * This function can sleep, so it cannot be called from atomic context.
937 */
938int rproc_trigger_recovery(struct rproc *rproc)
939{
940 struct rproc_vdev *rvdev, *rvtmp;
941
942 dev_err(&rproc->dev, "recovering %s\n", rproc->name);
943
944 init_completion(&rproc->crash_comp);
945
946 /* clean up remote vdev entries */
947 list_for_each_entry_safe(rvdev, rvtmp, &rproc->rvdevs, node)
948 rproc_remove_virtio_dev(rvdev);
949
950 /* wait until there is no more rproc users */
951 wait_for_completion(&rproc->crash_comp);
952
953 return rproc_add_virtio_devices(rproc);
954}
955
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200956/**
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -0500957 * rproc_crash_handler_work() - handle a crash
958 *
959 * This function needs to handle everything related to a crash, like cpu
960 * registers and stack dump, information to help to debug the fatal error, etc.
961 */
962static void rproc_crash_handler_work(struct work_struct *work)
963{
964 struct rproc *rproc = container_of(work, struct rproc, crash_handler);
965 struct device *dev = &rproc->dev;
966
967 dev_dbg(dev, "enter %s\n", __func__);
968
969 mutex_lock(&rproc->lock);
970
971 if (rproc->state == RPROC_CRASHED || rproc->state == RPROC_OFFLINE) {
972 /* handle only the first crash detected */
973 mutex_unlock(&rproc->lock);
974 return;
975 }
976
977 rproc->state = RPROC_CRASHED;
978 dev_err(dev, "handling crash #%u in %s\n", ++rproc->crash_cnt,
979 rproc->name);
980
981 mutex_unlock(&rproc->lock);
982
Fernando Guzman Lugo2e37abb2012-09-18 12:26:35 +0300983 if (!rproc->recovery_disabled)
984 rproc_trigger_recovery(rproc);
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -0500985}
986
987/**
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +0200988 * rproc_boot() - boot a remote processor
989 * @rproc: handle of a remote processor
990 *
991 * Boot a remote processor (i.e. load its firmware, power it on, ...).
992 *
993 * If the remote processor is already powered on, this function immediately
994 * returns (successfully).
995 *
996 * Returns 0 on success, and an appropriate error value otherwise.
997 */
998int rproc_boot(struct rproc *rproc)
999{
1000 const struct firmware *firmware_p;
1001 struct device *dev;
1002 int ret;
1003
1004 if (!rproc) {
1005 pr_err("invalid rproc handle\n");
1006 return -EINVAL;
1007 }
1008
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001009 dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001010
1011 ret = mutex_lock_interruptible(&rproc->lock);
1012 if (ret) {
1013 dev_err(dev, "can't lock rproc %s: %d\n", rproc->name, ret);
1014 return ret;
1015 }
1016
1017 /* loading a firmware is required */
1018 if (!rproc->firmware) {
1019 dev_err(dev, "%s: no firmware to load\n", __func__);
1020 ret = -EINVAL;
1021 goto unlock_mutex;
1022 }
1023
1024 /* prevent underlying implementation from being removed */
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001025 if (!try_module_get(dev->parent->driver->owner)) {
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001026 dev_err(dev, "%s: can't get owner\n", __func__);
1027 ret = -EINVAL;
1028 goto unlock_mutex;
1029 }
1030
1031 /* skip the boot process if rproc is already powered up */
1032 if (atomic_inc_return(&rproc->power) > 1) {
1033 ret = 0;
1034 goto unlock_mutex;
1035 }
1036
1037 dev_info(dev, "powering up %s\n", rproc->name);
1038
1039 /* load firmware */
1040 ret = request_firmware(&firmware_p, rproc->firmware, dev);
1041 if (ret < 0) {
1042 dev_err(dev, "request_firmware failed: %d\n", ret);
1043 goto downref_rproc;
1044 }
1045
1046 ret = rproc_fw_boot(rproc, firmware_p);
1047
1048 release_firmware(firmware_p);
1049
1050downref_rproc:
1051 if (ret) {
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001052 module_put(dev->parent->driver->owner);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001053 atomic_dec(&rproc->power);
1054 }
1055unlock_mutex:
1056 mutex_unlock(&rproc->lock);
1057 return ret;
1058}
1059EXPORT_SYMBOL(rproc_boot);
1060
1061/**
1062 * rproc_shutdown() - power off the remote processor
1063 * @rproc: the remote processor
1064 *
1065 * Power off a remote processor (previously booted with rproc_boot()).
1066 *
1067 * In case @rproc is still being used by an additional user(s), then
1068 * this function will just decrement the power refcount and exit,
1069 * without really powering off the device.
1070 *
1071 * Every call to rproc_boot() must (eventually) be accompanied by a call
1072 * to rproc_shutdown(). Calling rproc_shutdown() redundantly is a bug.
1073 *
1074 * Notes:
1075 * - we're not decrementing the rproc's refcount, only the power refcount.
1076 * which means that the @rproc handle stays valid even after rproc_shutdown()
1077 * returns, and users can still use it with a subsequent rproc_boot(), if
1078 * needed.
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001079 */
1080void rproc_shutdown(struct rproc *rproc)
1081{
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001082 struct device *dev = &rproc->dev;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001083 int ret;
1084
1085 ret = mutex_lock_interruptible(&rproc->lock);
1086 if (ret) {
1087 dev_err(dev, "can't lock rproc %s: %d\n", rproc->name, ret);
1088 return;
1089 }
1090
1091 /* if the remote proc is still needed, bail out */
1092 if (!atomic_dec_and_test(&rproc->power))
1093 goto out;
1094
1095 /* power off the remote processor */
1096 ret = rproc->ops->stop(rproc);
1097 if (ret) {
1098 atomic_inc(&rproc->power);
1099 dev_err(dev, "can't stop rproc: %d\n", ret);
1100 goto out;
1101 }
1102
1103 /* clean up all acquired resources */
1104 rproc_resource_cleanup(rproc);
1105
1106 rproc_disable_iommu(rproc);
1107
Fernando Guzman Lugo70b85ef2012-08-30 13:26:13 -05001108 /* if in crash state, unlock crash handler */
1109 if (rproc->state == RPROC_CRASHED)
1110 complete_all(&rproc->crash_comp);
1111
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001112 rproc->state = RPROC_OFFLINE;
1113
1114 dev_info(dev, "stopped remote processor %s\n", rproc->name);
1115
1116out:
1117 mutex_unlock(&rproc->lock);
1118 if (!ret)
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001119 module_put(dev->parent->driver->owner);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001120}
1121EXPORT_SYMBOL(rproc_shutdown);
1122
1123/**
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001124 * rproc_add() - register a remote processor
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001125 * @rproc: the remote processor handle to register
1126 *
1127 * Registers @rproc with the remoteproc framework, after it has been
1128 * allocated with rproc_alloc().
1129 *
1130 * This is called by the platform-specific rproc implementation, whenever
1131 * a new remote processor device is probed.
1132 *
1133 * Returns 0 on success and an appropriate error code otherwise.
1134 *
1135 * Note: this function initiates an asynchronous firmware loading
1136 * context, which will look for virtio devices supported by the rproc's
1137 * firmware.
1138 *
1139 * If found, those virtio devices will be created and added, so as a result
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +01001140 * of registering this remote processor, additional virtio drivers might be
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001141 * probed.
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001142 */
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001143int rproc_add(struct rproc *rproc)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001144{
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001145 struct device *dev = &rproc->dev;
Fernando Guzman Lugo70b85ef2012-08-30 13:26:13 -05001146 int ret;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001147
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001148 ret = device_add(dev);
1149 if (ret < 0)
1150 return ret;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001151
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001152 dev_info(dev, "%s is available\n", rproc->name);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001153
Ohad Ben-Cohen489d1292011-12-21 11:25:43 +02001154 dev_info(dev, "Note: remoteproc is still under development and considered experimental.\n");
1155 dev_info(dev, "THE BINARY FORMAT IS NOT YET FINALIZED, and backward compatibility isn't yet guaranteed.\n");
1156
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001157 /* create debugfs entries */
1158 rproc_create_debug_dir(rproc);
1159
Fernando Guzman Lugo70b85ef2012-08-30 13:26:13 -05001160 return rproc_add_virtio_devices(rproc);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001161}
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001162EXPORT_SYMBOL(rproc_add);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001163
1164/**
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001165 * rproc_type_release() - release a remote processor instance
1166 * @dev: the rproc's device
1167 *
1168 * This function should _never_ be called directly.
1169 *
1170 * It will be called by the driver core when no one holds a valid pointer
1171 * to @dev anymore.
1172 */
1173static void rproc_type_release(struct device *dev)
1174{
1175 struct rproc *rproc = container_of(dev, struct rproc, dev);
1176
Ohad Ben-Cohen7183a2a2012-05-30 22:02:24 +03001177 dev_info(&rproc->dev, "releasing %s\n", rproc->name);
1178
1179 rproc_delete_debug_dir(rproc);
1180
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001181 idr_remove_all(&rproc->notifyids);
1182 idr_destroy(&rproc->notifyids);
1183
1184 if (rproc->index >= 0)
1185 ida_simple_remove(&rproc_dev_index, rproc->index);
1186
1187 kfree(rproc);
1188}
1189
1190static struct device_type rproc_type = {
1191 .name = "remoteproc",
1192 .release = rproc_type_release,
1193};
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001194
1195/**
1196 * rproc_alloc() - allocate a remote processor handle
1197 * @dev: the underlying device
1198 * @name: name of this remote processor
1199 * @ops: platform-specific handlers (mainly start/stop)
1200 * @firmware: name of firmware file to load
1201 * @len: length of private data needed by the rproc driver (in bytes)
1202 *
1203 * Allocates a new remote processor handle, but does not register
1204 * it yet.
1205 *
1206 * This function should be used by rproc implementations during initialization
1207 * of the remote processor.
1208 *
1209 * After creating an rproc handle using this function, and when ready,
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001210 * implementations should then call rproc_add() to complete
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001211 * the registration of the remote processor.
1212 *
1213 * On success the new rproc is returned, and on failure, NULL.
1214 *
1215 * Note: _never_ directly deallocate @rproc, even if it was not registered
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001216 * yet. Instead, when you need to unroll rproc_alloc(), use rproc_put().
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001217 */
1218struct rproc *rproc_alloc(struct device *dev, const char *name,
1219 const struct rproc_ops *ops,
1220 const char *firmware, int len)
1221{
1222 struct rproc *rproc;
1223
1224 if (!dev || !name || !ops)
1225 return NULL;
1226
1227 rproc = kzalloc(sizeof(struct rproc) + len, GFP_KERNEL);
1228 if (!rproc) {
1229 dev_err(dev, "%s: kzalloc failed\n", __func__);
1230 return NULL;
1231 }
1232
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001233 rproc->name = name;
1234 rproc->ops = ops;
1235 rproc->firmware = firmware;
1236 rproc->priv = &rproc[1];
1237
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001238 device_initialize(&rproc->dev);
1239 rproc->dev.parent = dev;
1240 rproc->dev.type = &rproc_type;
1241
1242 /* Assign a unique device index and name */
1243 rproc->index = ida_simple_get(&rproc_dev_index, 0, 0, GFP_KERNEL);
1244 if (rproc->index < 0) {
1245 dev_err(dev, "ida_simple_get failed: %d\n", rproc->index);
1246 put_device(&rproc->dev);
1247 return NULL;
1248 }
1249
1250 dev_set_name(&rproc->dev, "remoteproc%d", rproc->index);
1251
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001252 atomic_set(&rproc->power, 0);
1253
Sjur Brændeland4afc89d2012-06-19 10:08:18 +03001254 /* Set ELF as the default fw_ops handler */
1255 rproc->fw_ops = &rproc_elf_fw_ops;
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001256
1257 mutex_init(&rproc->lock);
1258
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +01001259 idr_init(&rproc->notifyids);
1260
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001261 INIT_LIST_HEAD(&rproc->carveouts);
1262 INIT_LIST_HEAD(&rproc->mappings);
1263 INIT_LIST_HEAD(&rproc->traces);
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +01001264 INIT_LIST_HEAD(&rproc->rvdevs);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001265
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -05001266 INIT_WORK(&rproc->crash_handler, rproc_crash_handler_work);
Fernando Guzman Lugo70b85ef2012-08-30 13:26:13 -05001267 init_completion(&rproc->crash_comp);
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -05001268
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001269 rproc->state = RPROC_OFFLINE;
1270
1271 return rproc;
1272}
1273EXPORT_SYMBOL(rproc_alloc);
1274
1275/**
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001276 * rproc_put() - unroll rproc_alloc()
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001277 * @rproc: the remote processor handle
1278 *
Ohad Ben-Cohenc6b5a272012-07-02 11:41:16 +03001279 * This function decrements the rproc dev refcount.
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001280 *
Ohad Ben-Cohenc6b5a272012-07-02 11:41:16 +03001281 * If no one holds any reference to rproc anymore, then its refcount would
1282 * now drop to zero, and it would be freed.
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001283 */
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001284void rproc_put(struct rproc *rproc)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001285{
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001286 put_device(&rproc->dev);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001287}
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001288EXPORT_SYMBOL(rproc_put);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001289
1290/**
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001291 * rproc_del() - unregister a remote processor
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001292 * @rproc: rproc handle to unregister
1293 *
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001294 * This function should be called when the platform specific rproc
1295 * implementation decides to remove the rproc device. it should
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001296 * _only_ be called if a previous invocation of rproc_add()
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001297 * has completed successfully.
1298 *
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001299 * After rproc_del() returns, @rproc isn't freed yet, because
Ohad Ben-Cohenc6b5a272012-07-02 11:41:16 +03001300 * of the outstanding reference created by rproc_alloc. To decrement that
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001301 * one last refcount, one still needs to call rproc_put().
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001302 *
1303 * Returns 0 on success and -EINVAL if @rproc isn't valid.
1304 */
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001305int rproc_del(struct rproc *rproc)
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001306{
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +03001307 struct rproc_vdev *rvdev, *tmp;
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +01001308
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001309 if (!rproc)
1310 return -EINVAL;
1311
1312 /* if rproc is just being registered, wait */
1313 wait_for_completion(&rproc->firmware_loading_complete);
1314
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +01001315 /* clean up remote vdev entries */
Ohad Ben-Cohen6db20ea2012-05-17 14:23:59 +03001316 list_for_each_entry_safe(rvdev, tmp, &rproc->rvdevs, node)
Ohad Ben-Cohen7a186942012-02-13 22:30:39 +01001317 rproc_remove_virtio_dev(rvdev);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001318
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001319 device_del(&rproc->dev);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001320
1321 return 0;
1322}
Ohad Ben-Cohen160e7c82012-07-04 16:25:06 +03001323EXPORT_SYMBOL(rproc_del);
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001324
Fernando Guzman Lugo8afd5192012-08-30 13:26:12 -05001325/**
1326 * rproc_report_crash() - rproc crash reporter function
1327 * @rproc: remote processor
1328 * @type: crash type
1329 *
1330 * This function must be called every time a crash is detected by the low-level
1331 * drivers implementing a specific remoteproc. This should not be called from a
1332 * non-remoteproc driver.
1333 *
1334 * This function can be called from atomic/interrupt context.
1335 */
1336void rproc_report_crash(struct rproc *rproc, enum rproc_crash_type type)
1337{
1338 if (!rproc) {
1339 pr_err("NULL rproc pointer\n");
1340 return;
1341 }
1342
1343 dev_err(&rproc->dev, "crash detected in %s: type %s\n",
1344 rproc->name, rproc_crash_to_string(type));
1345
1346 /* create a new task to handle the error */
1347 schedule_work(&rproc->crash_handler);
1348}
1349EXPORT_SYMBOL(rproc_report_crash);
1350
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001351static int __init remoteproc_init(void)
1352{
1353 rproc_init_debugfs();
Ohad Ben-Cohenb5ab5e22012-05-30 22:01:25 +03001354
Ohad Ben-Cohen400e64d2011-10-20 16:52:46 +02001355 return 0;
1356}
1357module_init(remoteproc_init);
1358
1359static void __exit remoteproc_exit(void)
1360{
1361 rproc_exit_debugfs();
1362}
1363module_exit(remoteproc_exit);
1364
1365MODULE_LICENSE("GPL v2");
1366MODULE_DESCRIPTION("Generic Remote Processor Framework");