From patchwork Mon Nov 14 23:39:35 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tanmay Shah X-Patchwork-Id: 20097 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2422324wru; Mon, 14 Nov 2022 15:43:29 -0800 (PST) X-Google-Smtp-Source: AA0mqf6t+Vqjjm/IdUwX9td5yImRskceRS03TS67kLvcVbc461JUyzJGDFA50qhlfoFzQ1rVroYM X-Received: by 2002:a17:906:c048:b0:7ae:d116:fabb with SMTP id bm8-20020a170906c04800b007aed116fabbmr10669767ejb.317.1668469409558; Mon, 14 Nov 2022 15:43:29 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1668469409; cv=pass; d=google.com; s=arc-20160816; b=UrZU3v351ZIGb6Mgq79x1NqPDxs36WatR1LMdnWLC3WEwsJ4Aq4aDEFmwEpgs6CxxH aiiz+3GVLaAMlsmaqLmuVlSga/GJY1RxjFA/cONaELcHWpn59IIzXgRoXjHB+mh+I3vD V/mXxU4OxoMnxUgTXFx//Cuqxafo1I71GfaVX7YRi542gfXZHdbE20SpY3EiTCXm5DLb Xf7JquBSwL1URoQ/a5mOdnK9kGgsQaOyivGFtI5I7bS9SSnKbwY3361OwsET3og1Ux0t fAmf+DJt9hJBYAc48KQK6KbRXOzlMd0amEZNJvNPWcPwmWv61YkWaXf2ni9bz0dZLFj0 /lKw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=kUwAHIatgkwkWSZ15ZSKIEMFejzF5rzNQmx/UT0gIzI=; b=IKRYxMdxegLNFmHM2OMWOQdJ0A4zmxP89nSxuxqUNBKLhHOdEDzDTcWsz4iXS/1lEJ s2LdJKdln/5Ih748YmiaLjQdor5KvsrvWhOQ53fAosPJfvMOmHpPGQ5vuXDpjBd0/jJd RMSlKHwjHq/lhICXpCpW+4rFvxOXM2chGt00MZVCat3flP7ehqRayCVfRPNTCYYLTWz2 IT3A5jnj4FT2Wyd9Jyh4HYAQiZ5gC1svlO8GquLPQB5pWvmDtefNyRSYSw7C9G5RYD9G Hdt5zOkwxFx4X/vJfC3Xup0FehdxtIfhLuEvzld4PfURk5n8dkugXTwlz2lBAxA05v0N RieA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=zjtfWa6g; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id kg9-20020a17090776e900b007a1d4f0e7fcsi9047723ejc.655.2022.11.14.15.43.05; Mon, 14 Nov 2022 15:43:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=zjtfWa6g; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237355AbiKNXkz (ORCPT + 99 others); Mon, 14 Nov 2022 18:40:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45586 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229967AbiKNXkt (ORCPT ); Mon, 14 Nov 2022 18:40:49 -0500 Received: from NAM11-BN8-obe.outbound.protection.outlook.com (mail-bn8nam11on2041.outbound.protection.outlook.com [40.107.236.41]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BF5C9101F1; Mon, 14 Nov 2022 15:40:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cKtLNoh4nXgJWn/sFoFiXNZcI1OM4hu6qHZy38xIfpWAhZOYedN4OTurV57mnsVssUcMdnzLRt9kcLM+Rgd6fbNqRY8R+BmeMj7YL4WUU2CXFX1kS4vBvR+yqCvQhGxp4D6eNUaYIkU3AYHSQLJR8sKJMkIzpy6qAfVzCHG70aAVO8DLz7cqSTQDFC4AllO9hcJCOndcAQnHdapQlQiXpF6OyasxqFDqP3vxanPEo75oGU22p2NlkDh5vZ35RmWnBEL6EulrCg2oRNEilenVSu9OA7hw9acbLE1cehbAHPwTejqH07Qz9aE3aBFKr1oJYiZseTnLywEqOQ04ySbmGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kUwAHIatgkwkWSZ15ZSKIEMFejzF5rzNQmx/UT0gIzI=; b=mXD+r2UIHFbfv/bVsPTYsNfBht0mvmTxe90ptlDoTxejaZsS+ru0dC0mwf9VuhNRF1DEnkImX74MzYzl6TeLrOuxpkQHrxxxiLa3B7w7dJlkjztYdWyQhSNwfKgtwK89M0XDa3fXVCs9UGXdk5d5/atGtUGhAri5g0jzYRvUcoKWvG3hYR2KuYBQg51OZBP0Og6DjkVwP+zDI0ZjbcukiVWw5KHHXirrZEaPf+/7fxgUSewQzdOMESFBKP927163VYgg3E0olG/WE3i07cHNve4Eh2mZCMUTn7ZBNbLJsEe+2HGp8YmFoV3PTH+SrUnTiYJFj6oFMb1tpiDP4U0zWg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kUwAHIatgkwkWSZ15ZSKIEMFejzF5rzNQmx/UT0gIzI=; b=zjtfWa6g+MAX2WrzhLymNgIsIFJnrEwGoLG+rqab30bpryfIZ600dGZuLIP5fyulApl9TB2DP8pjf8pRO2/X9pM3sHj0TKJgum550OeuNxJXQa9RNWY/CI+atVGUKT43IuFE/EKt9XQ6s8qKsmaKF4gN3SPpo4OpWYW3/8GklZQ= Received: from MW4PR03CA0003.namprd03.prod.outlook.com (2603:10b6:303:8f::8) by SJ0PR12MB5408.namprd12.prod.outlook.com (2603:10b6:a03:305::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17; Mon, 14 Nov 2022 23:40:45 +0000 Received: from CO1NAM11FT097.eop-nam11.prod.protection.outlook.com (2603:10b6:303:8f:cafe::97) by MW4PR03CA0003.outlook.office365.com (2603:10b6:303:8f::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17 via Frontend Transport; Mon, 14 Nov 2022 23:40:44 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C Received: from SATLEXMB03.amd.com (165.204.84.17) by CO1NAM11FT097.mail.protection.outlook.com (10.13.175.185) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5813.12 via Frontend Transport; Mon, 14 Nov 2022 23:40:44 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:43 -0600 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:43 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Mon, 14 Nov 2022 17:40:42 -0600 From: Tanmay Shah To: , , , , CC: , , , , , Tanmay Shah Subject: [PATCH v11 1/6] dt-bindings: remoteproc: Add Xilinx RPU subsystem bindings Date: Mon, 14 Nov 2022 15:39:35 -0800 Message-ID: <20221114233940.2096237-2-tanmay.shah@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221114233940.2096237-1-tanmay.shah@amd.com> References: <20221114233940.2096237-1-tanmay.shah@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1NAM11FT097:EE_|SJ0PR12MB5408:EE_ X-MS-Office365-Filtering-Correlation-Id: 33fe2285-b0e7-4090-741d-08dac699a644 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB03.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(346002)(39860400002)(376002)(396003)(136003)(451199015)(46966006)(40470700004)(36840700001)(4326008)(336012)(70586007)(8676002)(8936002)(36756003)(70206006)(44832011)(26005)(186003)(5660300002)(1076003)(41300700001)(2616005)(316002)(82740400003)(86362001)(40480700001)(40460700003)(82310400005)(83380400001)(81166007)(426003)(47076005)(36860700001)(2906002)(356005)(6666004)(966005)(6636002)(478600001)(110136005)(54906003)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Nov 2022 23:40:44.6427 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 33fe2285-b0e7-4090-741d-08dac699a644 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT097.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR12MB5408 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749516979720897816?= X-GMAIL-MSGID: =?utf-8?q?1749516979720897816?= Xilinx ZynqMP platform has dual-core ARM Cortex R5 Realtime Processing Unit(RPU) subsystem. This patch adds dt-bindings for RPU subsystem (cluster). Signed-off-by: Tanmay Shah Reviewed-by: Rob Herring --- Changes in v11: - rename binding filename to match with compatible string - change $id: value accordingly as well Changes in v10: - rename example node to remoteproc Changes in v9: - remove power-domains property description - fix nitpicks in description of other properties Changes in v8: - Add 'items:' for sram property Changes in v7: - Add minItems in sram property Changes in v6: - Add maxItems to sram and memory-region property Changes in v5: - Add constraints of the possible values of xlnx,cluster-mode property - fix description of power-domains property for r5 core - Remove reg, address-cells and size-cells properties as it is not required - Fix description of mboxes property - Add description of each memory-region and remove old .txt binding link reference in the description Changes in v4: - Add memory-region, mboxes and mbox-names properties in example Changes in v3: - None .../remoteproc/xlnx,zynqmp-r5fss.yaml | 135 ++++++++++++++++++ include/dt-bindings/power/xlnx-zynqmp-power.h | 6 + 2 files changed, 141 insertions(+) create mode 100644 Documentation/devicetree/bindings/remoteproc/xlnx,zynqmp-r5fss.yaml diff --git a/Documentation/devicetree/bindings/remoteproc/xlnx,zynqmp-r5fss.yaml b/Documentation/devicetree/bindings/remoteproc/xlnx,zynqmp-r5fss.yaml new file mode 100644 index 000000000000..9f677367dd9f --- /dev/null +++ b/Documentation/devicetree/bindings/remoteproc/xlnx,zynqmp-r5fss.yaml @@ -0,0 +1,135 @@ +# SPDX-License-Identifier: (GPL-2.0-only or BSD-2-Clause) +%YAML 1.2 +--- +$id: http://devicetree.org/schemas/remoteproc/xlnx,zynqmp-r5fss.yaml# +$schema: http://devicetree.org/meta-schemas/core.yaml# + +title: Xilinx R5F processor subsystem + +maintainers: + - Ben Levinsky + - Tanmay Shah + +description: | + The Xilinx platforms include a pair of Cortex-R5F processors (RPU) for + real-time processing based on the Cortex-R5F processor core from ARM. + The Cortex-R5F processor implements the Arm v7-R architecture and includes a + floating-point unit that implements the Arm VFPv3 instruction set. + +properties: + compatible: + const: xlnx,zynqmp-r5fss + + xlnx,cluster-mode: + $ref: /schemas/types.yaml#/definitions/uint32 + enum: [0, 1, 2] + description: | + The RPU MPCore can operate in split mode (Dual-processor performance), Safety + lock-step mode(Both RPU cores execute the same code in lock-step, + clock-for-clock) or Single CPU mode (RPU core 0 is held in reset while + core 1 runs normally). The processor does not support dynamic configuration. + Switching between modes is only permitted immediately after a processor reset. + If set to 1 then lockstep mode and if 0 then split mode. + If set to 2 then single CPU mode. When not defined, default will be lockstep mode. + In summary, + 0: split mode + 1: lockstep mode (default) + 2: single cpu mode + +patternProperties: + "^r5f-[a-f0-9]+$": + type: object + description: | + The RPU is located in the Low Power Domain of the Processor Subsystem. + Each processor includes separate L1 instruction and data caches and + tightly coupled memories (TCM). System memory is cacheable, but the TCM + memory space is non-cacheable. + + Each RPU contains one 64KB memory and two 32KB memories that + are accessed via the TCM A and B port interfaces, for a total of 128KB + per processor. In lock-step mode, the processor has access to 256KB of + TCM memory. + + properties: + compatible: + const: xlnx,zynqmp-r5f + + power-domains: + maxItems: 1 + + mboxes: + minItems: 1 + items: + - description: mailbox channel to send data to RPU + - description: mailbox channel to receive data from RPU + + mbox-names: + minItems: 1 + items: + - const: tx + - const: rx + + sram: + $ref: /schemas/types.yaml#/definitions/phandle-array + minItems: 1 + maxItems: 8 + items: + maxItems: 1 + description: | + phandles to one or more reserved on-chip SRAM regions. Other than TCM, + the RPU can execute instructions and access data from the OCM memory, + the main DDR memory, and other system memories. + + The regions should be defined as child nodes of the respective SRAM + node, and should be defined as per the generic bindings in + Documentation/devicetree/bindings/sram/sram.yaml + + memory-region: + description: | + List of phandles to the reserved memory regions associated with the + remoteproc device. This is variable and describes the memories shared with + the remote processor (e.g. remoteproc firmware and carveouts, rpmsg + vrings, ...). This reserved memory region will be allocated in DDR memory. + minItems: 1 + maxItems: 8 + items: + - description: region used for RPU firmware image section + - description: vdev buffer + - description: vring0 + - description: vring1 + additionalItems: true + + required: + - compatible + - power-domains + + unevaluatedProperties: false + +required: + - compatible + +additionalProperties: false + +examples: + - | + remoteproc { + compatible = "xlnx,zynqmp-r5fss"; + xlnx,cluster-mode = <1>; + + r5f-0 { + compatible = "xlnx,zynqmp-r5f"; + power-domains = <&zynqmp_firmware 0x7>; + memory-region = <&rproc_0_fw_image>, <&rpu0vdev0buffer>, <&rpu0vdev0vring0>, <&rpu0vdev0vring1>; + mboxes = <&ipi_mailbox_rpu0 0>, <&ipi_mailbox_rpu0 1>; + mbox-names = "tx", "rx"; + }; + + r5f-1 { + compatible = "xlnx,zynqmp-r5f"; + power-domains = <&zynqmp_firmware 0x8>; + memory-region = <&rproc_1_fw_image>, <&rpu1vdev0buffer>, <&rpu1vdev0vring0>, <&rpu1vdev0vring1>; + mboxes = <&ipi_mailbox_rpu1 0>, <&ipi_mailbox_rpu1 1>; + mbox-names = "tx", "rx"; + }; + }; +... diff --git a/include/dt-bindings/power/xlnx-zynqmp-power.h b/include/dt-bindings/power/xlnx-zynqmp-power.h index 0d9a412fd5e0..618024cbb20d 100644 --- a/include/dt-bindings/power/xlnx-zynqmp-power.h +++ b/include/dt-bindings/power/xlnx-zynqmp-power.h @@ -6,6 +6,12 @@ #ifndef _DT_BINDINGS_ZYNQMP_POWER_H #define _DT_BINDINGS_ZYNQMP_POWER_H +#define PD_RPU_0 7 +#define PD_RPU_1 8 +#define PD_R5_0_ATCM 15 +#define PD_R5_0_BTCM 16 +#define PD_R5_1_ATCM 17 +#define PD_R5_1_BTCM 18 #define PD_USB_0 22 #define PD_USB_1 23 #define PD_TTC_0 24 From patchwork Mon Nov 14 23:39:36 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tanmay Shah X-Patchwork-Id: 20101 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2422950wru; Mon, 14 Nov 2022 15:45:21 -0800 (PST) X-Google-Smtp-Source: AA0mqf5DUjV5b0aVaN+gr/bg7W1rd9Qp/+sLIFN1t2lriSVwbMnGYdfXwnfYCyOYBJ3KHTY5YGMV X-Received: by 2002:a17:907:765c:b0:7ad:49b8:1687 with SMTP id kj28-20020a170907765c00b007ad49b81687mr12013147ejc.407.1668469521305; Mon, 14 Nov 2022 15:45:21 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1668469521; cv=pass; d=google.com; s=arc-20160816; b=OkSe1xtrCH9vNs3QawpEEHjOoXauM20mwSS0nQPy+uXYVxLHAVgZtu7pcBQZV0+UvS 6nHRTMD+JKtdZZo3tjPbN/BQyOWpAIQP3tQJ3VtYlYV8WaCXZS9NEhrHOaLFz1KFqvjL ymJRNtQe67zuUxj0zjPJznZ6EEidpRBesrwq3uNbX+S/B/3x3UW9ylMLdVJ/9pNk3oHN FAeOUDVTFLyncjjaE6/E0Dh8INqBopprKlv1I3h/t3SZlnr7pCYFAHlBkQ8t2rgkK4gL spRdmBx8WmH8qYww20Z3hiGKRuOtulDfFCoU2nu/ZYFsb7LNZT93grRh2ainMUhINkfR kNUw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=YQAqUUEDfoFQHSL1LSSwTe8XScwj5IknDOcwkdo8sNM=; b=kp7g8fBC88/0hNKz6gyuOSX6v/JCfy+PW2sqfQTLg8/RpadAwPZNv49qbeQl9NcFsk m9kL+cKV6LbUK68VZHU5y3xiOoQkdmToEfXbKFH1kHV1JFwTm9uhEzRfOnhqdXh0Aibi riy3JQFLTM3/kexW5hTnjA+5QBLnBXgBmlzvS1qsVcG51R9DsH6+mzp+EBvtt3+gQJ/q T/eDRytTisPY6cV/3GJ4S8l9zwenFhJZBGFwjE2JAC0vinQX2qpPJcYVbG5QV3Dn3nDo 8WXvTooaDOCGIXrc7VMfTAqQx6AjDzVHT4crmyMan5m88R7XGyUBrycDe2GmLHuZzqaO wkSQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=vZOSnHrJ; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o22-20020a170906975600b0078e0e8508fbsi11537006ejy.457.2022.11.14.15.44.57; Mon, 14 Nov 2022 15:45:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=vZOSnHrJ; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237679AbiKNXlD (ORCPT + 99 others); Mon, 14 Nov 2022 18:41:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45594 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236720AbiKNXkv (ORCPT ); Mon, 14 Nov 2022 18:40:51 -0500 Received: from NAM04-MW2-obe.outbound.protection.outlook.com (mail-mw2nam04on2078.outbound.protection.outlook.com [40.107.101.78]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DFF312604; Mon, 14 Nov 2022 15:40:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jkyL5ya1S6r+QEhGEEMCH2qoLSJcJFHJj9I6DzrPDlePqo68BCiW2rLRYhoukR8Hu9EjTgttprG92w2uQ25aLQn1W3I1mTvyWTDEfFxQLo39GE6njJd4tGDfohGMX0yUoq8EUOw2pAnsNFs2TKr39d97n6j+xN0El34damMN7XFeIDN7+9+al08+CZcc2cFAd92HPStncCGPMfpLFsMFC56h9q+SH99ePoUIDjF6qeqH0BfscKE60DBkymEPdEtbhmgGGwmBjQy+ZEvtZ6WPyBfOFNLZP86WXDphe2kDtJhOAZ8vW4m20hq1bz07RTJ5fkc6tim8FOrGTNKvfh2lew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=YQAqUUEDfoFQHSL1LSSwTe8XScwj5IknDOcwkdo8sNM=; b=IJE4Ofg6TAk+c5wMgV4c4NxsVwmXfu4Zsg14oXdme5tZEJHp8X+k4i2QxU1mflO4FSAxbFUcdXRroOZx7DaTDlYCVkziKAtWo0WvSRCh5kNp2xiR8P3GnL+Nm28VoKyoizOkv1MtOGVSEc+1nf94OTGtBvdAonha4ZvBvEWAIh9L2Op4N8p7Hb0a0g7GAKoSjR+VwYlqpUMx3IIUR0b8oEaUbZ3KCeIPLW7UiEP7K948OQ85cfDyrHo0W9GeTPuxaB7D+5HFw95OjmruT1mDtwmDAdlUDGeHlTvT1ZnXgWMfMskrjP2Pa4N8fAmoK3x6XOgjkg1imGiEJ9sLtwuKzg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YQAqUUEDfoFQHSL1LSSwTe8XScwj5IknDOcwkdo8sNM=; b=vZOSnHrJChlTIE5nCN3mL0bTiVy9xLi7rjdNSI7N+aUgL+B/TXf3lE6JNfCFi1PcHEjX1hJKd4X2JkVW2dMVEKXIIXoAIfxryuaQ4xjTwcf8fEgpYHMpbaZJmaN3980S0Qpaj0WN2ZD9WT+dfFdud8LjoAtP/s7eETA32MEqXoc= Received: from DS7PR03CA0136.namprd03.prod.outlook.com (2603:10b6:5:3b4::21) by DM4PR12MB6663.namprd12.prod.outlook.com (2603:10b6:8:bb::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.16; Mon, 14 Nov 2022 23:40:46 +0000 Received: from DM6NAM11FT047.eop-nam11.prod.protection.outlook.com (2603:10b6:5:3b4:cafe::22) by DS7PR03CA0136.outlook.office365.com (2603:10b6:5:3b4::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17 via Frontend Transport; Mon, 14 Nov 2022 23:40:46 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT047.mail.protection.outlook.com (10.13.172.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5813.12 via Frontend Transport; Mon, 14 Nov 2022 23:40:46 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:45 -0600 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:44 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Mon, 14 Nov 2022 17:40:43 -0600 From: Tanmay Shah To: , , , , CC: , , , , , Tanmay Shah Subject: [PATCH v11 2/6] arm64: dts: xilinx: zynqmp: Add RPU subsystem device node Date: Mon, 14 Nov 2022 15:39:36 -0800 Message-ID: <20221114233940.2096237-3-tanmay.shah@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221114233940.2096237-1-tanmay.shah@amd.com> References: <20221114233940.2096237-1-tanmay.shah@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM6NAM11FT047:EE_|DM4PR12MB6663:EE_ X-MS-Office365-Filtering-Correlation-Id: a9954407-4771-46c7-e3a2-08dac699a72c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(346002)(136003)(376002)(39860400002)(396003)(451199015)(40470700004)(46966006)(36840700001)(40480700001)(82310400005)(110136005)(36756003)(6636002)(186003)(336012)(2906002)(1076003)(54906003)(6666004)(478600001)(47076005)(36860700001)(41300700001)(86362001)(426003)(26005)(70586007)(8676002)(82740400003)(70206006)(356005)(81166007)(4326008)(316002)(5660300002)(83380400001)(44832011)(2616005)(40460700003)(8936002)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Nov 2022 23:40:46.2598 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: a9954407-4771-46c7-e3a2-08dac699a72c X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT047.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB6663 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749517096487989008?= X-GMAIL-MSGID: =?utf-8?q?1749517096487989008?= RPU subsystem can be configured in cluster-mode or split mode. Also each r5 core has separate power domains. Signed-off-by: Tanmay Shah Acked-by: Michal Simek --- Changes in v11: - None Changes in v10: - Rename node name to remoteproc Changes in v9: - remove unused labels Changes in v8: - None Changes in v7: - None Changes in v6: - None Changes in v5: - Remove optional reg property from r5fss node - Move r5fss node out of axi node Changes in v4: - Add reserved memory region node and use it in RPU subsystem node Changes in v3: - Fix checkpatch.pl style warning arch/arm64/boot/dts/xilinx/zynqmp.dtsi | 33 ++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) diff --git a/arch/arm64/boot/dts/xilinx/zynqmp.dtsi b/arch/arm64/boot/dts/xilinx/zynqmp.dtsi index a549265e55f6..c0f60833c0ae 100644 --- a/arch/arm64/boot/dts/xilinx/zynqmp.dtsi +++ b/arch/arm64/boot/dts/xilinx/zynqmp.dtsi @@ -100,6 +100,22 @@ opp03 { }; }; + reserved-memory { + #address-cells = <2>; + #size-cells = <2>; + ranges; + + rproc_0_fw_image: memory@3ed00000 { + no-map; + reg = <0x0 0x3ed00000 0x0 0x40000>; + }; + + rproc_1_fw_image: memory@3ef00000 { + no-map; + reg = <0x0 0x3ef00000 0x0 0x40000>; + }; + }; + zynqmp_ipi: zynqmp_ipi { compatible = "xlnx,zynqmp-ipi-mailbox"; interrupt-parent = <&gic>; @@ -203,6 +219,23 @@ fpga_full: fpga-full { ranges; }; + remoteproc { + compatible = "xlnx,zynqmp-r5fss"; + xlnx,cluster-mode = <1>; + + r5f-0 { + compatible = "xlnx,zynqmp-r5f"; + power-domains = <&zynqmp_firmware PD_RPU_0>; + memory-region = <&rproc_0_fw_image>; + }; + + r5f-1 { + compatible = "xlnx,zynqmp-r5f"; + power-domains = <&zynqmp_firmware PD_RPU_1>; + memory-region = <&rproc_1_fw_image>; + }; + }; + amba: axi { compatible = "simple-bus"; #address-cells = <2>; From patchwork Mon Nov 14 23:39:37 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tanmay Shah X-Patchwork-Id: 20100 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2422512wru; Mon, 14 Nov 2022 15:44:06 -0800 (PST) X-Google-Smtp-Source: AA0mqf7Dh2kDz0bF4vZ7lAsUKHszFRI9qjnB/SOfW9b5vawzpw9bjZFm1mzf1r2UUu0RwHhn89F5 X-Received: by 2002:a17:906:a896:b0:7ab:afd4:d7ed with SMTP id ha22-20020a170906a89600b007abafd4d7edmr11761356ejb.228.1668469446408; Mon, 14 Nov 2022 15:44:06 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1668469446; cv=pass; d=google.com; s=arc-20160816; b=jk1E/gZvmw60TyVoe4Hq5HOhvaSGBSFn+IOewG2alS9Jk19tty5cYIg8HOuOi+GijR wHp0aBdQ0In/+6+ZbLFVFTfxThgDm7IYewBpitnLRE20crAtnFEYTnd5X0mzVISdqmtN b+K0gvrPXHNZlXE6KfvdB1PeRunYM0Zqvh/7qM/kjRUriQ6yBZ7478Dhzyez8PisrIoU iStz1z/OYdNAwMM15Al3+KYhsTRH+ujoETdl9gyEb8sSzWfOdqdousM2rqBZUoWpZd89 VT+9R8YmXGCXcrwQwnkAJ/xTBs3A3rPKLre1EKYhV8bcMXPpOMbnsyknIyKbx+uMw369 4OMg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=xNIwE8dSb3xUUhPBchaDfkDUIVjPB7WPWbfBZFNCULY=; b=lp8hNNxPAICXo1oxYM3vPG40bSId7A2hMBLRMp2kpZ8kiBrOGRXsRi5pQ4SJAQkKk1 1rqH2klSHqiwux2oOs9IXSts7jE/tG6PlIoAIKAWpGMpsMu4R2QHhESh0TTpi3IanymI D7FkWeiI3bwh6gnIbbN9pDDx4kU/tbjvL6T5aIjiFMBLe60wdXs7xXBENiX5DoIDNe8X t8T8EVKvW36niwFVPTsdcwgFaEnFUNm0w7J0G29U2DmUHd7FW0z/0exOBpdRdSPbRhC/ GJ33Pxl8NAkoDXvZ5HVsEcjbvXTw9fBtsMhWuIKizv6el3AYJunzdGL99bUUapsQsYR1 mlOA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=qiyAq91R; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p27-20020a17090635db00b00780488c11bbsi7212302ejb.388.2022.11.14.15.43.42; Mon, 14 Nov 2022 15:44:06 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=qiyAq91R; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231201AbiKNXlH (ORCPT + 99 others); Mon, 14 Nov 2022 18:41:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45608 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236922AbiKNXkw (ORCPT ); Mon, 14 Nov 2022 18:40:52 -0500 Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2070.outbound.protection.outlook.com [40.107.92.70]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 63F4312778; Mon, 14 Nov 2022 15:40:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EpO0uqot9dLfv+fqqDhtHLau+h24URkfIebk8Q+DZR+HqsA2U3FNqH2KFXOU3+OxDRCEgp0EFsLGqrLwYJbplbnyqmVKrme79/KOQagGDqLa3UYJT8rmKEXZjcLPxtiifxVBYrj+UFlJRXGixeQ0u/EPOXdgEtMNbAhuckCZ+0awOvaNGy4fQGtJzeuXrqSS5gQTlb1NSmZaL7h/FMZRSWcKch6lDOfuJcgmjvqOd0UqJDpdVFmQYUlmHZfBl/KYm/vz6WA7RDZDD5hVWo+4TY4OcUVJYGoh7qcnTZ376Fk91dSiYw8OpMuN8WbGaoDbtqsq8+WgvYanZlbQW0DCFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=xNIwE8dSb3xUUhPBchaDfkDUIVjPB7WPWbfBZFNCULY=; b=VFyV/dEuaYR/jdH0ZYzA6HPGlHYPglXXjpt+2OfibU0JFVZMX5HTLjjiDhuSQlCJs4d1JtgC2NyG6hkh8AzozawXEsyknJplT6mY7OjF5nldIK+BwJA1/gafCpn6+rUV9LAb7FYSYnKK1cCJO4YgpHEtkwMAN9F+4UmDbyj9M2zzk46jnbeipzSf5xGl1dw51YUwFCMBn+0UKwlsPpTc+grFlSVKSXfjfvxnP4TLvjT63hnsXXA6bl6UvMsa2A0fPC//ArxPFBfqXiTNoUhGrMglp/I3uqq6l+Ocmq+KL5yyMUyav2ZzScrZ/pqWpRsI62DYDTXSTRbLhKpRsDZe0Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xNIwE8dSb3xUUhPBchaDfkDUIVjPB7WPWbfBZFNCULY=; b=qiyAq91RkeLDgakk9dFOXmKAi0hA96MprsX31CiUuuZcvv04f9Mq3e9COYtAcjkMZ6UfHCvIfWAYZkFpKLWstY8JSF9B3FGuoMQaEL4z3lSrQt34I4kCyMxmoDqkATjT33G0VIa7qyj8WdwFXX3RUm2pad/nl5EMkj3sGAZ9jXw= Received: from MW4PR04CA0253.namprd04.prod.outlook.com (2603:10b6:303:88::18) by MW4PR12MB7263.namprd12.prod.outlook.com (2603:10b6:303:226::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17; Mon, 14 Nov 2022 23:40:48 +0000 Received: from CO1NAM11FT031.eop-nam11.prod.protection.outlook.com (2603:10b6:303:88:cafe::96) by MW4PR04CA0253.outlook.office365.com (2603:10b6:303:88::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17 via Frontend Transport; Mon, 14 Nov 2022 23:40:48 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C Received: from SATLEXMB03.amd.com (165.204.84.17) by CO1NAM11FT031.mail.protection.outlook.com (10.13.174.118) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5813.12 via Frontend Transport; Mon, 14 Nov 2022 23:40:48 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:46 -0600 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:45 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Mon, 14 Nov 2022 17:40:44 -0600 From: Tanmay Shah To: , , , , CC: , , , , , Ben Levinsky , "Tanmay Shah" Subject: [PATCH v11 3/6] firmware: xilinx: Add ZynqMP firmware ioctl enums for RPU configuration. Date: Mon, 14 Nov 2022 15:39:37 -0800 Message-ID: <20221114233940.2096237-4-tanmay.shah@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221114233940.2096237-1-tanmay.shah@amd.com> References: <20221114233940.2096237-1-tanmay.shah@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1NAM11FT031:EE_|MW4PR12MB7263:EE_ X-MS-Office365-Filtering-Correlation-Id: 04924da3-92b0-4b56-d027-08dac699a85e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB03.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(396003)(346002)(39860400002)(376002)(136003)(451199015)(36840700001)(46966006)(40470700004)(478600001)(81166007)(110136005)(26005)(6666004)(54906003)(316002)(6636002)(41300700001)(8676002)(70586007)(70206006)(4326008)(36860700001)(40460700003)(356005)(82740400003)(47076005)(83380400001)(2616005)(186003)(336012)(40480700001)(426003)(1076003)(86362001)(8936002)(2906002)(36756003)(5660300002)(44832011)(82310400005)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Nov 2022 23:40:48.2022 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 04924da3-92b0-4b56-d027-08dac699a85e X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT031.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW4PR12MB7263 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749517018415366651?= X-GMAIL-MSGID: =?utf-8?q?1749517018415366651?= From: Ben Levinsky Add ZynqMP firmware ioctl enums for RPU configuration and TCM Nodes for later use via request_node and release_node Signed-off-by: Ben Levinsky Signed-off-by: Tanmay Shah Acked-by: Michal Simek --- include/linux/firmware/xlnx-zynqmp.h | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) Changes in v11: - None Changes in v10: - None Changes in v9: - None Changes in v8: - None Changes in v7: - None Changes in v6: - None Changes in v5: - None Changes in v4: - None Changes in v3: - None diff --git a/include/linux/firmware/xlnx-zynqmp.h b/include/linux/firmware/xlnx-zynqmp.h index 76d2b3ebad84..bdbf855b5eef 100644 --- a/include/linux/firmware/xlnx-zynqmp.h +++ b/include/linux/firmware/xlnx-zynqmp.h @@ -135,6 +135,10 @@ enum pm_ret_status { }; enum pm_ioctl_id { + IOCTL_GET_RPU_OPER_MODE = 0, + IOCTL_SET_RPU_OPER_MODE = 1, + IOCTL_RPU_BOOT_ADDR_CONFIG = 2, + IOCTL_TCM_COMB_CONFIG = 3, IOCTL_SD_DLL_RESET = 6, IOCTL_SET_SD_TAPDELAY = 7, IOCTL_SET_PLL_FRAC_MODE = 8, @@ -175,6 +179,21 @@ enum pm_query_id { PM_QID_CLOCK_GET_MAX_DIVISOR = 13, }; +enum rpu_oper_mode { + PM_RPU_MODE_LOCKSTEP = 0, + PM_RPU_MODE_SPLIT = 1, +}; + +enum rpu_boot_mem { + PM_RPU_BOOTMEM_LOVEC = 0, + PM_RPU_BOOTMEM_HIVEC = 1, +}; + +enum rpu_tcm_comb { + PM_RPU_TCM_SPLIT = 0, + PM_RPU_TCM_COMB = 1, +}; + enum zynqmp_pm_reset_action { PM_RESET_ACTION_RELEASE = 0, PM_RESET_ACTION_ASSERT = 1, From patchwork Mon Nov 14 23:39:38 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tanmay Shah X-Patchwork-Id: 20096 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2422249wru; Mon, 14 Nov 2022 15:43:13 -0800 (PST) X-Google-Smtp-Source: AA0mqf4VsLvi1OiUASrXJNt7jkaBGvopAiMY0L5BHzq77BnHLPZIQl7DzU7JFQRZhBf8eGTj4fQ3 X-Received: by 2002:a17:906:6686:b0:7ad:ca55:20c6 with SMTP id z6-20020a170906668600b007adca5520c6mr12159965ejo.406.1668469393799; Mon, 14 Nov 2022 15:43:13 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1668469393; cv=pass; d=google.com; s=arc-20160816; b=eoahRCnSeV23SEyGLi+gBYtLIKf0yIh+moLMg1cGXrS7fz7HZwvCoFq9kHjqBpu4xL /OOW51Tg+ltqKuzbE2QRZ5pKD3m8kRAXVxO3bBwDSFcf9AhblxU6NwGn1VP3EwpAvAUa tm4tX1JEIzqeiHWbon4pE4pP43+3mbSjYZmavOl40Gzox7xsDfiaI5g0Wxx5aBz1/yjL cIePuIsnV9S01ZgpgTX3rN1w5YQzfonsjDssyulAhfDpY/gfYZBWUm4HQ8O4Su0mbLC7 Y0CA8LIuA6pmSO+v21jyFSBBBdczMvneSKXOaTfy7wgHXTMeEaL7+D1vWZlv8n/Rz/8v Yr5g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=MiSH5iLBgAU5SVkkVkD+Sek7zadNSqe5Ns9L/mffe5A=; b=FWdUojUIiidiqe5Rl/YYr5ZSABcbM3ylbbKb2Pd4JAVpla0f39SwJwMnHesueIfTP8 /pea3xI+/s+M5rF0vFf+JYBwv+vOuZrR8QPxI2Tq3Wz9a1Hx4wZB4yVbTvAEteJp7IIs JArLtm1XAW5waGuUvHCMWVYbDrD2+ZPW7TVSSGDKAM414kYR6P69wOFXRv1PcpL//n5p fWuuLTDCGvWgQgM4vp+8cUwEkUUwIjpJFTJYzeO6q9vBUtzF4on8r3ESnc3F/kxD1EkA bqFCw0TtzogbJ1FeEpGWWf5E/kKPYbU0R0BgUTmhYBsKjF/dCFS3oEYLFUjojGCrYX0F znrA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b="TfzxgOc/"; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b3-20020a170906150300b007aea5ae39b2si7726943ejd.250.2022.11.14.15.42.49; Mon, 14 Nov 2022 15:43:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b="TfzxgOc/"; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237475AbiKNXlA (ORCPT + 99 others); Mon, 14 Nov 2022 18:41:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45596 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236758AbiKNXkv (ORCPT ); Mon, 14 Nov 2022 18:40:51 -0500 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2057.outbound.protection.outlook.com [40.107.93.57]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F398710041; Mon, 14 Nov 2022 15:40:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dNl9Hx9pIYti6EY6llqydtb4DTlLmxJVVqShfccBo/nP+gJUVbg3yfx/MzVqJXYe5ClUjEboHVcxDqFFcrJwdOR1P9xAp7QgHuaifNGVtehvtfR8OsJOSoXkx+vXNyfFeegnhY+nNe0t33aVjm99qcQ+FpDT+jEFAE4AveoIo4PEFS0zbogqFtnpGdYodgu1ZLaWvrVkaTlfykXsprloDOQlBz8uMJPV8br1KJiRm6GJ/jufUkLygZk1cM5pY4zlNNODqaYk/jaLDYvaQpiuLKiaipFAJ0HgFrZ8IJYP1EcTXkKz0Cva9qP4rAKF9UYKPcbBZ72UYTuZesjkE6mIyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MiSH5iLBgAU5SVkkVkD+Sek7zadNSqe5Ns9L/mffe5A=; b=KvCG34DRwX2yGIiSvbMp/BDB61I8Cwrcdrooxxg8GplUSTllPyt9gXrhKKENY7IdoPCw4x5IDVEys8EGv+e2BhztwUWjnCSB3eOBTvqJbY0mC1IVhwCU6lmdaf2PpoaXv1QflnDhruq/cc/va9qhFYHZ3sbsR9GEfI75JoR50aaGy93547o0H5NyNggcqyrROyr9Mc7dU9GJEQRNVWUmnQbcPiop821f+oonkss2X7l9AMY7pAhpPDr4+t2lSzABaN/1remcVeNNFkB/uUshmLvIAQqtQUeCUlDL07YBL9XOLnActtwZJE1ULXuISK4BqTEx51ULIDcIedqmxgETng== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MiSH5iLBgAU5SVkkVkD+Sek7zadNSqe5Ns9L/mffe5A=; b=TfzxgOc/g0chR6ZWh9Vz5KQrOygrzM04C/6wQwyg7r+Q5WJRjWl100foqWXeFiNznctJ2Rn1KYuJdUAcM3yRHet3TK6jbS0JI2n0itWRhVFJObDIY7nYEfUSh0T6g45SaraQ9f1rZIa2yoFTYoN2pIZ5fcOlPde2qx4/gRMtASU= Received: from DM6PR11CA0014.namprd11.prod.outlook.com (2603:10b6:5:190::27) by MN2PR12MB4157.namprd12.prod.outlook.com (2603:10b6:208:1db::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17; Mon, 14 Nov 2022 23:40:48 +0000 Received: from DM6NAM11FT113.eop-nam11.prod.protection.outlook.com (2603:10b6:5:190:cafe::5a) by DM6PR11CA0014.outlook.office365.com (2603:10b6:5:190::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17 via Frontend Transport; Mon, 14 Nov 2022 23:40:47 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT113.mail.protection.outlook.com (10.13.173.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5813.12 via Frontend Transport; Mon, 14 Nov 2022 23:40:47 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:47 -0600 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:47 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Mon, 14 Nov 2022 17:40:46 -0600 From: Tanmay Shah To: , , , , CC: , , , , , Ben Levinsky , "Tanmay Shah" Subject: [PATCH v11 4/6] firmware: xilinx: Add shutdown/wakeup APIs Date: Mon, 14 Nov 2022 15:39:38 -0800 Message-ID: <20221114233940.2096237-5-tanmay.shah@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221114233940.2096237-1-tanmay.shah@amd.com> References: <20221114233940.2096237-1-tanmay.shah@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM6NAM11FT113:EE_|MN2PR12MB4157:EE_ X-MS-Office365-Filtering-Correlation-Id: 07cb2727-b87d-437a-24e7-08dac699a816 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(376002)(346002)(136003)(396003)(39860400002)(451199015)(40470700004)(46966006)(36840700001)(426003)(47076005)(40460700003)(83380400001)(82310400005)(36756003)(82740400003)(86362001)(81166007)(44832011)(8936002)(41300700001)(8676002)(4326008)(70586007)(70206006)(356005)(5660300002)(316002)(110136005)(54906003)(6636002)(26005)(2616005)(36860700001)(2906002)(186003)(1076003)(478600001)(6666004)(40480700001)(336012)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Nov 2022 23:40:47.7728 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 07cb2727-b87d-437a-24e7-08dac699a816 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT113.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB4157 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749516962709272072?= X-GMAIL-MSGID: =?utf-8?q?1749516962709272072?= From: Ben Levinsky Add shutdown/wakeup a resource eemi operations to shutdown or bringup a resource. Note alignment of args matches convention of other fn's in this file. The reason being that the long fn name results in aligned args that otherwise go over 80 chars so shift right to avoid this Signed-off-by: Ben Levinsky Signed-off-by: Tanmay Shah Acked-by: Michal Simek --- Changes in v11: - Rebase on latest rproc-next branch and resolve merge conflicts Changes in v10: - None Changes in v9: - None Changes in v8: - None Changes in v7: - None Changes in v6: - None Changes in v5: - None Changes in v4: - None Changes in v3: - None drivers/firmware/xilinx/zynqmp.c | 35 ++++++++++++++++++++++++++++ include/linux/firmware/xlnx-zynqmp.h | 23 ++++++++++++++++++ 2 files changed, 58 insertions(+) diff --git a/drivers/firmware/xilinx/zynqmp.c b/drivers/firmware/xilinx/zynqmp.c index ff5cabe70a2b..1865e43ed7e7 100644 --- a/drivers/firmware/xilinx/zynqmp.c +++ b/drivers/firmware/xilinx/zynqmp.c @@ -1159,6 +1159,41 @@ int zynqmp_pm_release_node(const u32 node) } EXPORT_SYMBOL_GPL(zynqmp_pm_release_node); +/** + * zynqmp_pm_force_pwrdwn - PM call to request for another PU or subsystem to + * be powered down forcefully + * @node: Node ID of the targeted PU or subsystem + * @ack: Flag to specify whether acknowledge is requested + * + * Return: status, either success or error+reason + */ +int zynqmp_pm_force_pwrdwn(const u32 node, + const enum zynqmp_pm_request_ack ack) +{ + return zynqmp_pm_invoke_fn(PM_FORCE_POWERDOWN, node, ack, 0, 0, NULL); +} +EXPORT_SYMBOL_GPL(zynqmp_pm_force_pwrdwn); + +/** + * zynqmp_pm_request_wake - PM call to wake up selected master or subsystem + * @node: Node ID of the master or subsystem + * @set_addr: Specifies whether the address argument is relevant + * @address: Address from which to resume when woken up + * @ack: Flag to specify whether acknowledge requested + * + * Return: status, either success or error+reason + */ +int zynqmp_pm_request_wake(const u32 node, + const bool set_addr, + const u64 address, + const enum zynqmp_pm_request_ack ack) +{ + /* set_addr flag is encoded into 1st bit of address */ + return zynqmp_pm_invoke_fn(PM_REQUEST_WAKEUP, node, address | set_addr, + address >> 32, ack, NULL); +} +EXPORT_SYMBOL_GPL(zynqmp_pm_request_wake); + /** * zynqmp_pm_set_requirement() - PM call to set requirement for PM slaves * @node: Node ID of the slave diff --git a/include/linux/firmware/xlnx-zynqmp.h b/include/linux/firmware/xlnx-zynqmp.h index bdbf855b5eef..ad3f2bd0c470 100644 --- a/include/linux/firmware/xlnx-zynqmp.h +++ b/include/linux/firmware/xlnx-zynqmp.h @@ -12,6 +12,7 @@ #ifndef __FIRMWARE_ZYNQMP_H__ #define __FIRMWARE_ZYNQMP_H__ +#include #include @@ -87,6 +88,8 @@ enum pm_api_cb_id { enum pm_api_id { PM_GET_API_VERSION = 1, PM_REGISTER_NOTIFIER = 5, + PM_FORCE_POWERDOWN = 8, + PM_REQUEST_WAKEUP = 10, PM_SYSTEM_SHUTDOWN = 12, PM_REQUEST_NODE = 13, PM_RELEASE_NODE = 14, @@ -521,6 +524,12 @@ int zynqmp_pm_is_function_supported(const u32 api_id, const u32 id); int zynqmp_pm_set_feature_config(enum pm_feature_config_id id, u32 value); int zynqmp_pm_get_feature_config(enum pm_feature_config_id id, u32 *payload); int zynqmp_pm_register_sgi(u32 sgi_num, u32 reset); +int zynqmp_pm_force_pwrdwn(const u32 target, + const enum zynqmp_pm_request_ack ack); +int zynqmp_pm_request_wake(const u32 node, + const bool set_addr, + const u64 address, + const enum zynqmp_pm_request_ack ack); int zynqmp_pm_set_sd_config(u32 node, enum pm_sd_config_type config, u32 value); int zynqmp_pm_set_gem_config(u32 node, enum pm_gem_config_type config, u32 value); @@ -795,6 +804,20 @@ static inline int zynqmp_pm_register_sgi(u32 sgi_num, u32 reset) return -ENODEV; } +static inline int zynqmp_pm_force_pwrdwn(const u32 target, + const enum zynqmp_pm_request_ack ack) +{ + return -ENODEV; +} + +static inline int zynqmp_pm_request_wake(const u32 node, + const bool set_addr, + const u64 address, + const enum zynqmp_pm_request_ack ack) +{ + return -ENODEV; +} + static inline int zynqmp_pm_set_sd_config(u32 node, enum pm_sd_config_type config, u32 value) From patchwork Mon Nov 14 23:39:39 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tanmay Shah X-Patchwork-Id: 20098 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2422351wru; Mon, 14 Nov 2022 15:43:33 -0800 (PST) X-Google-Smtp-Source: AA0mqf6WCR5ska+hFxIYcdjD/2RljsdgFI/vyQKlel3ovCXAL/KgfAxHM2NL8mrtSgi6e0FdvH90 X-Received: by 2002:a17:906:a199:b0:7ad:c2ef:4d69 with SMTP id s25-20020a170906a19900b007adc2ef4d69mr12471696ejy.10.1668469413680; Mon, 14 Nov 2022 15:43:33 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1668469413; cv=pass; d=google.com; s=arc-20160816; b=xOA4qZVc8eS+8MhT1JX6wuHa5rchxuEAt9K1ckvNo7+lwV6jD7p3Ek+3Z0LiXQLQI6 FAlpnz95ImWV4N5GNJ9tPLlFRMngP/xktOWdrElI5z+d+Qqu9l8xI2dAG03vsBPXcKDi T2d9+1bb1YyQRD2td92r8663oDK7zbL/LofT88nVhyQ+YRsbDkONjq4Bl90Jz4GBAY+K u4saUPcF7SMHDvAtFTBhNgVldymjYAW9UsJoW57SD6Z7UfKgr4FoV4zcgn7LTvqdfOa/ uor4nSgvWb7V6O5Rbkv0MW89+hx+noVG5NbWtVRJhZF/lISt3kOAQKUvxPiBiTtTxkPh +aIQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=yfHSkigZJdtURcwSRHFbuC2GKLepr1BHHg6iFztP8Pg=; b=DlwLwAyBibWkCzWr03FafhMeVH71RU0vktogQPFdPF6fPZLROD5h/S0dd07qOx1Hte Xn46TKvDoPAo2EqE71iIxqVxzqu9Tj9m3b/I9RrKTDt+gDSg+xnjElohfzw7miK53OhI wLe9/IFJ95SLD+kOZsh89qmZe5mdJQwyRBgHuUEjFHDciJAIO191SzKklWg+P06EtHeW HaqmmpMkVUjnYAYmYVYPbCqgb6wsI3Wwzgvw7ud5vU62ngJBkCe46IWbP2Gdl/9LJli3 at8ZCo+gXa5c0Qf/h+7sfrWpQB0VuhabrHFKQ00mzR1Y8k3Ls06U2lMnoE3l6YqXTuw+ JTNg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=MEX0ZzPQ; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jg30-20020a170907971e00b007881b45441asi10178447ejc.721.2022.11.14.15.43.10; Mon, 14 Nov 2022 15:43:33 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=MEX0ZzPQ; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238010AbiKNXlN (ORCPT + 99 others); Mon, 14 Nov 2022 18:41:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45644 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237149AbiKNXkx (ORCPT ); Mon, 14 Nov 2022 18:40:53 -0500 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2062.outbound.protection.outlook.com [40.107.93.62]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DF3513D07; Mon, 14 Nov 2022 15:40:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hQ1mHsy4sby1tDV1jm8nnHRg/baTkzoF+4gQHxrroMYbRfFqeCJyvjOXViz54c6i9K/9Y/tCxHz6vFpY7aOiUcnJWJrPMQn2sP2bGexqrG6f0SVmcXxUNLQPBSGZDQY6m7seipex0zAqffv/neAdpsTtIwYu+l4C80XF7Q71VTH/JhpeaXVNguesX6wfKScpOCoI0j09LUv9M/y/hGn2S79/FI+TZmFukRjoYWxwT/xxwpGKJXJNqafoH8z8r3lqzI7WedxkoACj/aqolnle3sRd5BXLC8LRvl+yPDwbN6Af7VpmkKVc39lCGsDz2pIiyA10HAnDUeKhWXS4JBFCwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yfHSkigZJdtURcwSRHFbuC2GKLepr1BHHg6iFztP8Pg=; b=bQ7uJPFGNfwLi1oub5h0BhJRxMUAqoEh7Z1+4Oyps1Z3P88c6DyyWJAagWo7EQ+3yNij5iM+HrLf6WyVH/uZ56m5ipG826oQhv88x4OceH0T1MEQOyqd/KpOXNDN8NBlEmlGvO3wGE06Bm7C8qYD9zwtYbo+v2pudBx4DUkcRwunVtMxaETQrKObIo4iSpT1HmRH52IwzC9dtj2kJg0pQukIyxu9t4utFX0777oBsCGf1OgE3SpDe5gfAtssw/WaFrBVSUsNU8vZlkr/+mBrqnjd4tDDxSyqKLoa/hvWOEPG1UtySadapnGWZAuFIgRK5lKTx2p30UWJ8SKoh9KUrw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=yfHSkigZJdtURcwSRHFbuC2GKLepr1BHHg6iFztP8Pg=; b=MEX0ZzPQQI+b+7Py7vOHOnWgweS6wU9xPOHmwSHpWSH47lG7dID9i4egR04rES/y5maCCxEhVdXTwGOYyZqgSqbrauLsJMIRKC5/MlSbCj2kxoau4Ff8FyZyVt2/IW8jZxJyK62RyedzdEMxn3jk2iWcDBEQFvZV/ErKxzuhWKY= Received: from MW4PR04CA0339.namprd04.prod.outlook.com (2603:10b6:303:8a::14) by CH2PR12MB4167.namprd12.prod.outlook.com (2603:10b6:610:7a::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17; Mon, 14 Nov 2022 23:40:50 +0000 Received: from CO1NAM11FT061.eop-nam11.prod.protection.outlook.com (2603:10b6:303:8a:cafe::e0) by MW4PR04CA0339.outlook.office365.com (2603:10b6:303:8a::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17 via Frontend Transport; Mon, 14 Nov 2022 23:40:49 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C Received: from SATLEXMB03.amd.com (165.204.84.17) by CO1NAM11FT061.mail.protection.outlook.com (10.13.175.200) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5813.12 via Frontend Transport; Mon, 14 Nov 2022 23:40:49 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:48 -0600 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:48 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Mon, 14 Nov 2022 17:40:47 -0600 From: Tanmay Shah To: , , , , CC: , , , , , Ben Levinsky , "Tanmay Shah" Subject: [PATCH v11 5/6] firmware: xilinx: Add RPU configuration APIs Date: Mon, 14 Nov 2022 15:39:39 -0800 Message-ID: <20221114233940.2096237-6-tanmay.shah@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221114233940.2096237-1-tanmay.shah@amd.com> References: <20221114233940.2096237-1-tanmay.shah@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CO1NAM11FT061:EE_|CH2PR12MB4167:EE_ X-MS-Office365-Filtering-Correlation-Id: cb0dcebe-227f-47dc-3fee-08dac699a910 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: fZmQdsXRysFEMDL4aytFfpGTEvfQX7jh7CTIZbhlPVb9+w/au657AgZUeW9HcV+7lR9tJ2dommZX762O/vfvbrtXG3NGJHeW8DTmA9UncjfGofF0QVGnnIPEJjCT2XQocwgrI3NHYEnCMsWaGgU8UiQUxlsRVI9T0lJZK7MzL/EVMmfaYR7vNKxYVoXT7W/RhiurSKTiekHpgMRNU5UGXY/MXZ0ar9BFP2dXQi8lhGZ36KVOnMksyZX/KVw6kUvqgc91vAUluko3Zs/x4OsEt8eW04e7PBRiReTP76s02dvvQ7r7cmrx+EpWzTsF4d+QAS2RYIzIiiDyaXIy95wekTMD0YWQdCWxDlZ7OPbAr/Nn+ot2CyFFnomGrzJXYe2ELayspBwUvk7mzPrbnGHDwvsi8kVmG61INlNBPMtnB0WxXaOEUziBFO2jOV5i4vNAqz307Zvmw87QMNrDWsXSRl7xuKBHTZ8NwRgcoAzaHTK0pG92rH2D+PymDGT7o1fNkoKjQH+OMhmL6Gz7R8paBUxr/VYNiKKbS9pjcDgMvIkZo17D6l1bSu1y+qdLy3/+f3MpaN1+1qfDfu0B7r8IHy9eh9Y3nAji5Hd7YHXCkm+q8ejSA3KR+wDp+YduiUCkEqiqK8w79hDe4/99HZlFL063w+/3i2foEig/U4ToL3lNhcbSS79AgmP9DSrz/2AczgFdfiRi0Ta7jZ6/sMnrWs6h48ZQwktpmKescchxwrtHkIhhjAS0LNtMG+qAdZ4icBauD8u6jN+SF89XAQVlv23SuWT0r/uTiJOQZRow4dc= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB03.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(39860400002)(396003)(136003)(376002)(346002)(451199015)(46966006)(36840700001)(40470700004)(426003)(36860700001)(54906003)(6636002)(316002)(40460700003)(2906002)(41300700001)(83380400001)(5660300002)(8936002)(2616005)(36756003)(336012)(44832011)(186003)(47076005)(40480700001)(8676002)(4326008)(26005)(1076003)(70206006)(70586007)(478600001)(82310400005)(6666004)(82740400003)(86362001)(110136005)(356005)(81166007)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Nov 2022 23:40:49.3338 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: cb0dcebe-227f-47dc-3fee-08dac699a910 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT061.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH2PR12MB4167 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749516984044262704?= X-GMAIL-MSGID: =?utf-8?q?1749516984044262704?= From: Ben Levinsky This patch adds APIs to access to configure RPU and its processor-specific memory. That is query the run-time mode of RPU as either split or lockstep as well as API to set this mode. In addition add APIs to access configuration of the RPUs' tightly coupled memory (TCM). Signed-off-by: Ben Levinsky Signed-off-by: Tanmay Shah Acked-by: Michal Simek --- Changes in v11: - Rebase on latest rproc-next branch and resolve merge conflicts Changes in v10: - None Changes in v9: - None Changes in v8: - None Changes in v7: - None Changes in v6: - None Changes in v5: - None Changes in v4: - None Changes in v3: - Add missing function argument documentation drivers/firmware/xilinx/zynqmp.c | 62 ++++++++++++++++++++++++++++ include/linux/firmware/xlnx-zynqmp.h | 18 ++++++++ 2 files changed, 80 insertions(+) diff --git a/drivers/firmware/xilinx/zynqmp.c b/drivers/firmware/xilinx/zynqmp.c index 1865e43ed7e7..e4981e7f3500 100644 --- a/drivers/firmware/xilinx/zynqmp.c +++ b/drivers/firmware/xilinx/zynqmp.c @@ -1159,6 +1159,68 @@ int zynqmp_pm_release_node(const u32 node) } EXPORT_SYMBOL_GPL(zynqmp_pm_release_node); +/** + * zynqmp_pm_get_rpu_mode() - Get RPU mode + * @node_id: Node ID of the device + * @rpu_mode: return by reference value + * either split or lockstep + * + * Return: return 0 on success or error+reason. + * if success, then rpu_mode will be set + * to current rpu mode. + */ +int zynqmp_pm_get_rpu_mode(u32 node_id, enum rpu_oper_mode *rpu_mode) +{ + u32 ret_payload[PAYLOAD_ARG_CNT]; + int ret; + + ret = zynqmp_pm_invoke_fn(PM_IOCTL, node_id, + IOCTL_GET_RPU_OPER_MODE, 0, 0, ret_payload); + + /* only set rpu_mode if no error */ + if (ret == XST_PM_SUCCESS) + *rpu_mode = ret_payload[0]; + + return ret; +} +EXPORT_SYMBOL_GPL(zynqmp_pm_get_rpu_mode); + +/** + * zynqmp_pm_set_rpu_mode() - Set RPU mode + * @node_id: Node ID of the device + * @rpu_mode: Argument 1 to requested IOCTL call. either split or lockstep + * + * This function is used to set RPU mode to split or + * lockstep + * + * Return: Returns status, either success or error+reason + */ +int zynqmp_pm_set_rpu_mode(u32 node_id, enum rpu_oper_mode rpu_mode) +{ + return zynqmp_pm_invoke_fn(PM_IOCTL, node_id, + IOCTL_SET_RPU_OPER_MODE, (u32)rpu_mode, + 0, NULL); +} +EXPORT_SYMBOL_GPL(zynqmp_pm_set_rpu_mode); + +/** + * zynqmp_pm_set_tcm_config - configure TCM + * @node_id: Firmware specific TCM subsystem ID + * @tcm_mode: Argument 1 to requested IOCTL call + * either PM_RPU_TCM_COMB or PM_RPU_TCM_SPLIT + * + * This function is used to set RPU mode to split or combined + * + * Return: status: 0 for success, else failure + */ +int zynqmp_pm_set_tcm_config(u32 node_id, enum rpu_tcm_comb tcm_mode) +{ + return zynqmp_pm_invoke_fn(PM_IOCTL, node_id, + IOCTL_TCM_COMB_CONFIG, (u32)tcm_mode, 0, + NULL); +} +EXPORT_SYMBOL_GPL(zynqmp_pm_set_tcm_config); + /** * zynqmp_pm_force_pwrdwn - PM call to request for another PU or subsystem to * be powered down forcefully diff --git a/include/linux/firmware/xlnx-zynqmp.h b/include/linux/firmware/xlnx-zynqmp.h index ad3f2bd0c470..cf92e739fa3b 100644 --- a/include/linux/firmware/xlnx-zynqmp.h +++ b/include/linux/firmware/xlnx-zynqmp.h @@ -530,6 +530,9 @@ int zynqmp_pm_request_wake(const u32 node, const bool set_addr, const u64 address, const enum zynqmp_pm_request_ack ack); +int zynqmp_pm_get_rpu_mode(u32 node_id, enum rpu_oper_mode *rpu_mode); +int zynqmp_pm_set_rpu_mode(u32 node_id, u32 arg1); +int zynqmp_pm_set_tcm_config(u32 node_id, u32 arg1); int zynqmp_pm_set_sd_config(u32 node, enum pm_sd_config_type config, u32 value); int zynqmp_pm_set_gem_config(u32 node, enum pm_gem_config_type config, u32 value); @@ -818,6 +821,21 @@ static inline int zynqmp_pm_request_wake(const u32 node, return -ENODEV; } +static inline int zynqmp_pm_get_rpu_mode(u32 node_id, enum rpu_oper_mode *rpu_mode) +{ + return -ENODEV; +} + +static inline int zynqmp_pm_set_rpu_mode(u32 node_id, u32 arg1) +{ + return -ENODEV; +} + +static inline int zynqmp_pm_set_tcm_config(u32 node_id, u32 arg1) +{ + return -ENODEV; +} + static inline int zynqmp_pm_set_sd_config(u32 node, enum pm_sd_config_type config, u32 value) From patchwork Mon Nov 14 23:39:40 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tanmay Shah X-Patchwork-Id: 20099 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2422409wru; Mon, 14 Nov 2022 15:43:44 -0800 (PST) X-Google-Smtp-Source: AA0mqf6p6dM3UPjWLuzzoZtxRUlq/ulT1dqc4nQRdyaIygxzeU+tZCJcf6t3ewCZDU9ewBWuXHPM X-Received: by 2002:a17:907:f94:b0:78d:b11f:da01 with SMTP id kb20-20020a1709070f9400b0078db11fda01mr11956336ejc.615.1668469424177; Mon, 14 Nov 2022 15:43:44 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1668469424; cv=pass; d=google.com; s=arc-20160816; b=b++6BO4EfwXwEP2z85WYGC3SA8RPtb99uLJ5ZRLYJusUjBXlLZje/k7U4s6tPAnmhM Q7m2zcWrjkN8OSqH/SIQL7FDPVJ5ZaD4DH4ULo7G5+K8EBG2eOc85HvZxS5LCWbSVo5k bBQ8QgpZ+LL8fz4BTHKHswik6ib9J593xIIU0MkrEXQr4w6i6xFpOMrB/RDFYnfv+Lnv qumzBYZB7I78C3/ljhEAO/XWoBJWbYcUkvsEdFCxcLIUSYDeFvDJLuvRV79A/Ezrl1IJ 1GtR9u0JijCkZZPHv+m7L7k2ZUMpvS7/Qoj3B5pU7kaMZZB8tiC14Sl1BTXeGamb5eUx FGJg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=x7Tzuybs255YcZxcdfEVc42DTWMRRJ5Rbcr+PdowO8I=; b=p+qfZ2mHC2ECPvmVCOBv9lVdAjWVi5FIuuwzXLjVmsnnbGkLfCmB4Ufi/7ikH8HlYj myOvh+PFoD6Swa8TIuZ6kNzikvrOpKlBKX+LO1YD5M6U9bVGvovx0lbLeV/lP6uOpXjZ n4f5dH9dB8MSNj+fcfeFjNMiCs1+S6Hsa2dmi6QYhBuyL2Fr2OoS38T3P3qBu+/U531U kMZYvCjTJLQrCvmANuN1nyB00pcKpssk406x+6PANvaScOcEpws0IiqFh+oFAjk+7ctr 4hlTJDszYop4SgEaUqmost+kXtJLBMFqnpXC9S4Q0D8NiCUoewSo3y74hL5P4SZmm6n5 b/8g== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=pqE8T3Zu; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id xj4-20020a170906db0400b00782f3e3bb71si10948682ejb.912.2022.11.14.15.43.20; Mon, 14 Nov 2022 15:43:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=pqE8T3Zu; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237401AbiKNXlQ (ORCPT + 99 others); Mon, 14 Nov 2022 18:41:16 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45738 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237423AbiKNXk4 (ORCPT ); Mon, 14 Nov 2022 18:40:56 -0500 Received: from NAM12-DM6-obe.outbound.protection.outlook.com (mail-dm6nam12on2085.outbound.protection.outlook.com [40.107.243.85]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EBFBA13EA2; Mon, 14 Nov 2022 15:40:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jc7Bhdzq5JQWy4r5Tit36NOet/6ixsgFubFI6qLVy8TF21/oM9kVYM67miT4dVMGw94axB9Ejzv4fhgtB9gF79+X5SbVDF7aZfw7eFJRsB5Lo/KlIj0f+d06/xQjF1rL6xmvfIJFP4DTQmGf0C9J0VQPii1cF1OQnqetcT9J9vEHiXEimRlBBaK/166UKAIs5/ULMFOTgntYFLiNJ24P8k8z6UggLKssFHpGGeO8pxwbDtAyFJ1KFpPYm6hjpxxKlYyd+0mwvkPahVS2IU3/v1kWZrJDc9plUtOmsBiIFtwxmF39RpWLco2VayCHNmcWVoSIE8YkJUwPa1+K093+Eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=x7Tzuybs255YcZxcdfEVc42DTWMRRJ5Rbcr+PdowO8I=; b=Ukz/3uBb3u167xYpX+OxqFpjnclh6Frw+ND6zE3vzy+Fhr1hrZ/ToIhA+qM7XVgXcOX5LlBKgjXE/ROMlgcMRwJykjehXbkL4Z7UyqhoysPKTNLX5QzUDeCE+7suHapXxNSybaHMwHCTjgNEClgoDOPJZF0dPI0aKT70VVt6+ut1zsXucxuDY3kMFTHZQ3fw+w0rfbgdGn6vw/goeNfT7otM+S+y1gTneWgakSMBG6QiSuwEsGZJMorSlGJhgTymugNwSc3vW8+oQiDv2+NyFo7l9Mo8cUCzHJiJAvwdo2AF28hDlNWQSzc1S9by58KCXxvFlcZx13c6t55SLkuOQQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x7Tzuybs255YcZxcdfEVc42DTWMRRJ5Rbcr+PdowO8I=; b=pqE8T3ZuG6IwKbs5qQwy6O9w7VPWPdN+O9nAWOU67u2ofPaUYhMkqclOR4HEy2lzIDWcChJEhTtQ5VWB4Ler5ry4q261niHxblFVCNcWP8jqU8zN7cM2ZvOeU1maiKAtMUSF+d2Cn7skz7gb6l9X5akt5r2OMP1vQ2dGfTydHzs= Received: from DM6PR11CA0013.namprd11.prod.outlook.com (2603:10b6:5:190::26) by MN2PR12MB4373.namprd12.prod.outlook.com (2603:10b6:208:261::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17; Mon, 14 Nov 2022 23:40:50 +0000 Received: from DM6NAM11FT113.eop-nam11.prod.protection.outlook.com (2603:10b6:5:190:cafe::6c) by DM6PR11CA0013.outlook.office365.com (2603:10b6:5:190::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5813.17 via Frontend Transport; Mon, 14 Nov 2022 23:40:50 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DM6NAM11FT113.mail.protection.outlook.com (10.13.173.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.5813.12 via Frontend Transport; Mon, 14 Nov 2022 23:40:50 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:49 -0600 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Mon, 14 Nov 2022 17:40:49 -0600 Received: from xsjtanmays50.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2375.34 via Frontend Transport; Mon, 14 Nov 2022 17:40:48 -0600 From: Tanmay Shah To: , , , , CC: , , , , , Tanmay Shah , "Ben Levinsky" , kernel test robot Subject: [PATCH v11 6/6] drivers: remoteproc: Add Xilinx r5 remoteproc driver Date: Mon, 14 Nov 2022 15:39:40 -0800 Message-ID: <20221114233940.2096237-7-tanmay.shah@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221114233940.2096237-1-tanmay.shah@amd.com> References: <20221114233940.2096237-1-tanmay.shah@amd.com> MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DM6NAM11FT113:EE_|MN2PR12MB4373:EE_ X-MS-Office365-Filtering-Correlation-Id: eb5d0f80-5120-45c3-9613-08dac699a9b2 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230022)(4636009)(396003)(136003)(39860400002)(346002)(376002)(451199015)(40470700004)(46966006)(36840700001)(81166007)(478600001)(70206006)(4326008)(70586007)(8676002)(6666004)(6636002)(26005)(41300700001)(54906003)(110136005)(316002)(36860700001)(40460700003)(356005)(82740400003)(47076005)(83380400001)(186003)(336012)(426003)(40480700001)(1076003)(2616005)(86362001)(7416002)(66899015)(8936002)(2906002)(82310400005)(5660300002)(36756003)(44832011)(30864003)(36900700001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Nov 2022 23:40:50.4914 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: eb5d0f80-5120-45c3-9613-08dac699a9b2 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DM6NAM11FT113.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB4373 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1749516995096996681?= X-GMAIL-MSGID: =?utf-8?q?1749516995096996681?= This driver enables r5f dual core Real time Processing Unit subsystem available on Xilinx Zynq Ultrascale MPSoC Platform. RPU subsystem (cluster) can be configured in different modes e.g. split mode in which two r5f cores work independent of each other and lock-step mode in which both r5f cores execute same code clock-for-clock and notify if the result is different. The Xilinx r5 Remoteproc Driver boots the RPU cores via calls to the Xilinx Platform Management Unit that handles the R5 configuration, memory access and R5 lifecycle management. The interface to this manager is done in this driver via zynqmp_pm_* function calls. Signed-off-by: Ben Levinsky Signed-off-by: Tanmay Shah Reported-by: kernel test robot --- Changes in v11: - remove redundant < 0 check for function of_get_available_child_count() - remove redundant use of devm_free() - return 'ret' variable rather than masking the real error code when parsing "xlnx,cluster-mode" property fails - call of_reserved_mem_device_release() to release reserved memory in case driver probe fails or driver is removed. Changes in v10: - fix Kconfig unmet dependecy error reported by kernel test robot - fix r5_rproc object mem leak in function zynqmp_r5_add_rproc_core - add explanation of hardcoded TCM nodes - remove redundant ToDo comment - remove redundant check of tcm_bank_count and rmem_count - remove explicit free reserved_mem in zynqmp_r5_get_mem_region_node - fix leaked reference of child_dev during zynqmp_r5_cluster_init Also fix possible crash in exit path release_r5_cores - do not remove mem-region and tcm carveouts explicitly in case of failure. It will be deleted as part of rproc_del. This also simplifies logic to use rproc_add_carveout - fix documentation all over the driver Changes in v9 - replace devm_rproc_alloc with rproc_alloc - %s/until/while/r - remove extra line - %s/i > -1/i >=0/r fix this throughout the driver - fix type of tcm_mode from int to enum rpu_tcm_comb - release &child_pdev->dev references in case of failure - remove zynqmp_r5_core_exit() - undefined memory-region property isn't driver failure - remove tcm bank count check from ops - fix tcm bank turn-off sequence - fix parse_fw function documentation - do not use rproc_mem_entry_init on vdev0buffers - declare variabls in reverse xmas tree order throughout the driver Changes in v8: - None Changes in v7: - None Changes in v6: - None Changes in v5: - None Changes in v4: - Remove redundant header files - use dev_err_probe() to report errors during probe - Fix missing check on error code returned by zynqmp_r5_add_rproc_core() - Fix memory leaks all over the driver when resource allocation fails for any core - make cluster mode check only at one place - remove redundant initialization of variable - remove redundant use of of_node_put() - Fix Comment format problem - Assign offset of zynqmp_tcm_banks instead of duplicating it - Add tcm and memory regions rproc carveouts during prepare instead of parse_fw - Remove rproc_mem_entry object from r5_core - Use put_device() and rproc_del() APIs to fix memory leaks - Replace pr_* with dev_*. This was missed in v3, fix now. - Use "GPL" instead of "GPL v2" in MODULE_LICENSE macro. This was suggested by checkpatch script. Changes in v3: - Fix checkpatch script indentation warning - Remove unused variable from xilinx remoteproc driver - use C style comments, i.e /*...*/ - Remove redundant debug information which can be derived using /proc/device-tree - Fix multilined comment format - s/"final fot TCM"/"final for TCM" - Function devm_kzalloc() does not return an code on error, just NULL. Remove redundant error check for this function throughout the driver. - Fix RPU mode configuration and add documentation accordingly - Get rid of the indentations to match function documentation style with rest of the driver - Fix memory leak by only using r5_rproc->priv and not replace it with new instance - Use 'i' for the outer loop and 'j' for the inner one as per convention - Remove redundant error and NULL checks throughout the driver - Use devm_kcalloc() when more than one element is required - Add memory-regions carveouts during driver probe instead of parse_fw call This removes redundant copy of reserved_mem object in r5_core structure. - Fix memory leak by using of_node_put() - Fix indentation of tcm_mem_map function args - Remove redundant init of variables - Initialize tcm bank size variable for lockstep mode - Replace u32 with phys_addr_t for variable stroing memory bank address - Add documentation of TCM behavior in lockstep mode - Use dev_get_drvdata instead of platform driver API - Remove info level messages - Fix checkpatch.pl warnings - Add documentation for the Xilinx r5f platform to understand driver design drivers/remoteproc/Kconfig | 13 + drivers/remoteproc/Makefile | 1 + drivers/remoteproc/xlnx_r5_remoteproc.c | 1067 +++++++++++++++++++++++ 3 files changed, 1081 insertions(+) create mode 100644 drivers/remoteproc/xlnx_r5_remoteproc.c diff --git a/drivers/remoteproc/Kconfig b/drivers/remoteproc/Kconfig index 166019786653..a850e9f486dd 100644 --- a/drivers/remoteproc/Kconfig +++ b/drivers/remoteproc/Kconfig @@ -352,6 +352,19 @@ config TI_K3_R5_REMOTEPROC It's safe to say N here if you're not interested in utilizing a slave processor. +config XLNX_R5_REMOTEPROC + tristate "Xilinx R5 remoteproc support" + depends on PM && ARCH_ZYNQMP + select ZYNQMP_FIRMWARE + select RPMSG_VIRTIO + select MAILBOX + select ZYNQMP_IPI_MBOX + help + Say y or m here to support Xilinx R5 remote processors via the remote + processor framework. + + It's safe to say N if not interested in using RPU r5f cores. + endif # REMOTEPROC endmenu diff --git a/drivers/remoteproc/Makefile b/drivers/remoteproc/Makefile index 5478c7cb9e07..91314a9b43ce 100644 --- a/drivers/remoteproc/Makefile +++ b/drivers/remoteproc/Makefile @@ -38,3 +38,4 @@ obj-$(CONFIG_ST_SLIM_REMOTEPROC) += st_slim_rproc.o obj-$(CONFIG_STM32_RPROC) += stm32_rproc.o obj-$(CONFIG_TI_K3_DSP_REMOTEPROC) += ti_k3_dsp_remoteproc.o obj-$(CONFIG_TI_K3_R5_REMOTEPROC) += ti_k3_r5_remoteproc.o +obj-$(CONFIG_XLNX_R5_REMOTEPROC) += xlnx_r5_remoteproc.o diff --git a/drivers/remoteproc/xlnx_r5_remoteproc.c b/drivers/remoteproc/xlnx_r5_remoteproc.c new file mode 100644 index 000000000000..2db57d394155 --- /dev/null +++ b/drivers/remoteproc/xlnx_r5_remoteproc.c @@ -0,0 +1,1067 @@ +// SPDX-License-Identifier: GPL-2.0 +/* + * ZynqMP R5 Remote Processor driver + * + */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "remoteproc_internal.h" + +/* + * settings for RPU cluster mode which + * reflects possible values of xlnx,cluster-mode dt-property + */ +enum zynqmp_r5_cluster_mode { + SPLIT_MODE = 0, /* When cores run as separate processor */ + LOCKSTEP_MODE = 1, /* cores execute same code in lockstep,clk-for-clk */ + SINGLE_CPU_MODE = 2, /* core0 is held in reset and only core1 runs */ +}; + +/** + * struct mem_bank_data - Memory Bank description + * + * @addr: Start address of memory bank + * @size: Size of Memory bank + * @pm_domain_id: Power-domains id of memory bank for firmware to turn on/off + * @bank_name: name of the bank for remoteproc framework + */ +struct mem_bank_data { + phys_addr_t addr; + size_t size; + u32 pm_domain_id; + char *bank_name; +}; + +/* + * Hardcoded TCM bank values. This will be removed once TCM bindings are + * accepted for system-dt specifications and upstreamed in linux kernel + */ +static const struct mem_bank_data zynqmp_tcm_banks[] = { + {0xffe00000UL, 0x10000UL, PD_R5_0_ATCM, "atcm0"}, /* TCM 64KB each */ + {0xffe20000UL, 0x10000UL, PD_R5_0_BTCM, "btcm0"}, + {0xffe90000UL, 0x10000UL, PD_R5_1_ATCM, "atcm1"}, + {0xffeb0000UL, 0x10000UL, PD_R5_1_BTCM, "btcm1"}, +}; + +/** + * struct zynqmp_r5_core + * + * @dev: device of RPU instance + * @np: device node of RPU instance + * @tcm_bank_count: number TCM banks accessible to this RPU + * @tcm_banks: array of each TCM bank data + * @rmem_count: Number of reserved mem regions + * @rmem: reserved memory region nodes from device tree + * @rproc: rproc handle + * @pm_domain_id: RPU CPU power domain id + */ +struct zynqmp_r5_core { + struct device *dev; + struct device_node *np; + int tcm_bank_count; + struct mem_bank_data **tcm_banks; + int rmem_count; + struct reserved_mem **rmem; + struct rproc *rproc; + u32 pm_domain_id; +}; + +/** + * struct zynqmp_r5_cluster + * + * @dev: r5f subsystem cluster device node + * @mode: cluster mode of type zynqmp_r5_cluster_mode + * @core_count: number of r5 cores used for this cluster mode + * @r5_cores: Array of pointers pointing to r5 core + */ +struct zynqmp_r5_cluster { + struct device *dev; + enum zynqmp_r5_cluster_mode mode; + int core_count; + struct zynqmp_r5_core **r5_cores; +}; + +/* + * zynqmp_r5_set_mode() + * + * set RPU cluster and TCM operation mode + * + * @r5_core: pointer to zynqmp_r5_core type object + * @fw_reg_val: value expected by firmware to configure RPU cluster mode + * @tcm_mode: value expected by fw to configure TCM mode (lockstep or split) + * + * Return: 0 for success and < 0 for failure + */ +static int zynqmp_r5_set_mode(struct zynqmp_r5_core *r5_core, + enum rpu_oper_mode fw_reg_val, + enum rpu_tcm_comb tcm_mode) +{ + int ret; + + ret = zynqmp_pm_set_rpu_mode(r5_core->pm_domain_id, fw_reg_val); + if (ret < 0) { + dev_err(r5_core->dev, "failed to set RPU mode\n"); + return ret; + } + + ret = zynqmp_pm_set_tcm_config(r5_core->pm_domain_id, tcm_mode); + if (ret < 0) + dev_err(r5_core->dev, "failed to configure TCM\n"); + + return ret; +} + +/* + * zynqmp_r5_rproc_start() + * @rproc: single R5 core's corresponding rproc instance + * + * Start R5 Core from designated boot address. + * + * return 0 on success, otherwise non-zero value on failure + */ +static int zynqmp_r5_rproc_start(struct rproc *rproc) +{ + struct zynqmp_r5_core *r5_core = rproc->priv; + enum rpu_boot_mem bootmem; + int ret; + + /* + * The exception vector pointers (EVP) refer to the base-address of + * exception vectors (for reset, IRQ, FIQ, etc). The reset-vector + * starts at the base-address and subsequent vectors are on 4-byte + * boundaries. + * + * Exception vectors can start either from 0x0000_0000 (LOVEC) or + * from 0xFFFF_0000 (HIVEC) which is mapped in the OCM (On-Chip Memory) + * + * Usually firmware will put Exception vectors at LOVEC. + * + * It is not recommend that you change the exception vector. + * Changing the EVP to HIVEC will result in increased interrupt latency + * and jitter. Also, if the OCM is secured and the Cortex-R5F processor + * is non-secured, then the Cortex-R5F processor cannot access the + * HIVEC exception vectors in the OCM. + */ + bootmem = (rproc->bootaddr >= 0xFFFC0000) ? + PM_RPU_BOOTMEM_HIVEC : PM_RPU_BOOTMEM_LOVEC; + + dev_dbg(r5_core->dev, "RPU boot addr 0x%llx from %s.", rproc->bootaddr, + bootmem == PM_RPU_BOOTMEM_HIVEC ? "OCM" : "TCM"); + + ret = zynqmp_pm_request_wake(r5_core->pm_domain_id, 1, + bootmem, ZYNQMP_PM_REQUEST_ACK_NO); + if (ret) + dev_err(r5_core->dev, + "failed to start RPU = 0x%x\n", r5_core->pm_domain_id); + return ret; +} + +/* + * zynqmp_r5_rproc_stop() + * @rproc: single R5 core's corresponding rproc instance + * + * Power down R5 Core. + * + * return 0 on success, otherwise non-zero value on failure + */ +static int zynqmp_r5_rproc_stop(struct rproc *rproc) +{ + struct zynqmp_r5_core *r5_core = rproc->priv; + int ret; + + ret = zynqmp_pm_force_pwrdwn(r5_core->pm_domain_id, + ZYNQMP_PM_REQUEST_ACK_BLOCKING); + if (ret) + dev_err(r5_core->dev, "failed to stop remoteproc RPU %d\n", ret); + + return ret; +} + +/* + * zynqmp_r5_mem_region_map() + * @rproc: single R5 core's corresponding rproc instance + * @mem: mem descriptor to map reserved memory-regions + * + * Callback to map va for memory-region's carveout. + * + * return 0 on success, otherwise non-zero value on failure + */ +static int zynqmp_r5_mem_region_map(struct rproc *rproc, + struct rproc_mem_entry *mem) +{ + void __iomem *va; + + va = ioremap_wc(mem->dma, mem->len); + if (IS_ERR_OR_NULL(va)) + return -ENOMEM; + + mem->va = (void *)va; + + return 0; +} + +/* + * zynqmp_r5_rproc_mem_unmap + * @rproc: single R5 core's corresponding rproc instance + * @mem: mem entry to unmap + * + * Unmap memory-region carveout + * + * return: always returns 0 + */ +static int zynqmp_r5_mem_region_unmap(struct rproc *rproc, + struct rproc_mem_entry *mem) +{ + iounmap((void __iomem *)mem->va); + return 0; +} + +/* + * add_mem_regions_carveout() + * @rproc: single R5 core's corresponding rproc instance + * + * Construct rproc mem carveouts from memory-region property nodes + * + * return 0 on success, otherwise non-zero value on failure + */ +static int add_mem_regions_carveout(struct rproc *rproc) +{ + struct rproc_mem_entry *rproc_mem; + struct zynqmp_r5_core *r5_core; + struct reserved_mem *rmem; + int i, num_mem_regions; + + r5_core = (struct zynqmp_r5_core *)rproc->priv; + num_mem_regions = r5_core->rmem_count; + + for (i = 0; i < num_mem_regions; i++) { + rmem = r5_core->rmem[i]; + + if (!strncmp(rmem->name, "vdev0buffer", strlen("vdev0buffer"))) { + /* Init reserved memory for vdev buffer */ + rproc_mem = rproc_of_resm_mem_entry_init(&rproc->dev, i, + rmem->size, + rmem->base, + rmem->name); + } else { + /* Register associated reserved memory regions */ + rproc_mem = rproc_mem_entry_init(&rproc->dev, NULL, + (dma_addr_t)rmem->base, + rmem->size, rmem->base, + zynqmp_r5_mem_region_map, + zynqmp_r5_mem_region_unmap, + rmem->name); + } + + if (!rproc_mem) + return -ENOMEM; + + rproc_add_carveout(rproc, rproc_mem); + + dev_dbg(&rproc->dev, "reserved mem carveout %s addr=%llx, size=0x%llx", + rmem->name, rmem->base, rmem->size); + } + + return 0; +} + +/* + * tcm_mem_unmap() + * @rproc: single R5 core's corresponding rproc instance + * @mem: tcm mem entry to unmap + * + * Unmap TCM banks when powering down R5 core. + * + * return always 0 + */ +static int tcm_mem_unmap(struct rproc *rproc, struct rproc_mem_entry *mem) +{ + iounmap((void __iomem *)mem->va); + + return 0; +} + +/* + * tcm_mem_map() + * @rproc: single R5 core's corresponding rproc instance + * @mem: tcm memory entry descriptor + * + * Given TCM bank entry, this func setup virtual address for TCM bank + * remoteproc carveout. It also takes care of va to da address translation + * + * return 0 on success, otherwise non-zero value on failure + */ +static int tcm_mem_map(struct rproc *rproc, + struct rproc_mem_entry *mem) +{ + void __iomem *va; + + va = ioremap_wc(mem->dma, mem->len); + if (IS_ERR_OR_NULL(va)) + return -ENOMEM; + + /* Update memory entry va */ + mem->va = (void *)va; + + /* clear TCMs */ + memset_io(va, 0, mem->len); + + /* + * The R5s expect their TCM banks to be at address 0x0 and 0x2000, + * while on the Linux side they are at 0xffexxxxx. + * + * Zero out the high 12 bits of the address. This will give + * expected values for TCM Banks 0A and 0B (0x0 and 0x20000). + */ + mem->da &= 0x000fffff; + + /* + * TCM Banks 1A and 1B still have to be translated. + * + * Below handle these two banks' absolute addresses (0xffe90000 and + * 0xffeb0000) and convert to the expected relative addresses + * (0x0 and 0x20000). + */ + if (mem->da == 0x90000 || mem->da == 0xB0000) + mem->da -= 0x90000; + + /* if translated TCM bank address is not valid report error */ + if (mem->da != 0x0 && mem->da != 0x20000) { + dev_err(&rproc->dev, "invalid TCM address: %x\n", mem->da); + return -EINVAL; + } + return 0; +} + +/* + * add_tcm_carveout_split_mode() + * @rproc: single R5 core's corresponding rproc instance + * + * allocate and add remoteproc carveout for TCM memory in split mode + * + * return 0 on success, otherwise non-zero value on failure + */ +static int add_tcm_carveout_split_mode(struct rproc *rproc) +{ + struct rproc_mem_entry *rproc_mem; + struct zynqmp_r5_core *r5_core; + int i, num_banks, ret; + phys_addr_t bank_addr; + struct device *dev; + u32 pm_domain_id; + size_t bank_size; + char *bank_name; + + r5_core = (struct zynqmp_r5_core *)rproc->priv; + dev = r5_core->dev; + num_banks = r5_core->tcm_bank_count; + + /* + * Power-on Each 64KB TCM, + * register its address space, map and unmap functions + * and add carveouts accordingly + */ + for (i = 0; i < num_banks; i++) { + bank_addr = r5_core->tcm_banks[i]->addr; + bank_name = r5_core->tcm_banks[i]->bank_name; + bank_size = r5_core->tcm_banks[i]->size; + pm_domain_id = r5_core->tcm_banks[i]->pm_domain_id; + + ret = zynqmp_pm_request_node(pm_domain_id, + ZYNQMP_PM_CAPABILITY_ACCESS, 0, + ZYNQMP_PM_REQUEST_ACK_BLOCKING); + if (ret < 0) { + dev_err(dev, "failed to turn on TCM 0x%x", pm_domain_id); + goto release_tcm_split; + } + + dev_dbg(dev, "TCM carveout split mode %s addr=%llx, size=0x%lx", + bank_name, bank_addr, bank_size); + + rproc_mem = rproc_mem_entry_init(dev, NULL, bank_addr, + bank_size, bank_addr, + tcm_mem_map, tcm_mem_unmap, + bank_name); + if (!rproc_mem) { + ret = -ENOMEM; + zynqmp_pm_release_node(pm_domain_id); + goto release_tcm_split; + } + + rproc_add_carveout(rproc, rproc_mem); + } + + return 0; + +release_tcm_split: + /* If failed, Turn off all TCM banks turned on before */ + for (i--; i >= 0; i--) { + pm_domain_id = r5_core->tcm_banks[i]->pm_domain_id; + zynqmp_pm_release_node(pm_domain_id); + } + return ret; +} + +/* + * add_tcm_carveout_lockstep_mode() + * @rproc: single R5 core's corresponding rproc instance + * + * allocate and add remoteproc carveout for TCM memory in lockstep mode + * + * return 0 on success, otherwise non-zero value on failure + */ +static int add_tcm_carveout_lockstep_mode(struct rproc *rproc) +{ + struct rproc_mem_entry *rproc_mem; + struct zynqmp_r5_core *r5_core; + int i, num_banks, ret; + phys_addr_t bank_addr; + size_t bank_size = 0; + struct device *dev; + u32 pm_domain_id; + char *bank_name; + + r5_core = (struct zynqmp_r5_core *)rproc->priv; + dev = r5_core->dev; + + /* Go through zynqmp banks for r5 node */ + num_banks = r5_core->tcm_bank_count; + + /* + * In lockstep mode, TCM is contiguous memory block + * However, each TCM block still needs to be enabled individually. + * So, Enable each TCM block individually, but add their size + * to create contiguous memory region. + */ + bank_addr = r5_core->tcm_banks[0]->addr; + bank_name = r5_core->tcm_banks[0]->bank_name; + + for (i = 0; i < num_banks; i++) { + bank_size += r5_core->tcm_banks[i]->size; + pm_domain_id = r5_core->tcm_banks[i]->pm_domain_id; + + /* Turn on each TCM bank individually */ + ret = zynqmp_pm_request_node(pm_domain_id, + ZYNQMP_PM_CAPABILITY_ACCESS, 0, + ZYNQMP_PM_REQUEST_ACK_BLOCKING); + if (ret < 0) { + dev_err(dev, "failed to turn on TCM 0x%x", pm_domain_id); + goto release_tcm_lockstep; + } + } + + dev_dbg(dev, "TCM add carveout lockstep mode %s addr=0x%llx, size=0x%lx", + bank_name, bank_addr, bank_size); + + /* Register TCM address range, TCM map and unmap functions */ + rproc_mem = rproc_mem_entry_init(dev, NULL, bank_addr, + bank_size, bank_addr, + tcm_mem_map, tcm_mem_unmap, + bank_name); + if (!rproc_mem) { + ret = -ENOMEM; + goto release_tcm_lockstep; + } + + /* If registration is success, add carveouts */ + rproc_add_carveout(rproc, rproc_mem); + + return 0; + +release_tcm_lockstep: + /* If failed, Turn off all TCM banks turned on before */ + for (i--; i >= 0; i--) { + pm_domain_id = r5_core->tcm_banks[i]->pm_domain_id; + zynqmp_pm_release_node(pm_domain_id); + } + return ret; +} + +/* + * add_tcm_banks() + * @rproc: single R5 core's corresponding rproc instance + * + * allocate and add remoteproc carveouts for TCM memory based on cluster mode + * + * return 0 on success, otherwise non-zero value on failure + */ +static int add_tcm_banks(struct rproc *rproc) +{ + struct zynqmp_r5_cluster *cluster; + struct zynqmp_r5_core *r5_core; + struct device *dev; + + r5_core = (struct zynqmp_r5_core *)rproc->priv; + if (!r5_core) + return -EINVAL; + + dev = r5_core->dev; + + cluster = dev_get_drvdata(dev->parent); + if (!cluster) { + dev_err(dev->parent, "Invalid driver data\n"); + return -EINVAL; + } + + /* + * In lockstep mode TCM banks are one contiguous memory region of 256Kb + * In split mode, each TCM bank is 64Kb and not contiguous. + * We add memory carveouts accordingly. + */ + if (cluster->mode == SPLIT_MODE) + return add_tcm_carveout_split_mode(rproc); + else if (cluster->mode == LOCKSTEP_MODE) + return add_tcm_carveout_lockstep_mode(rproc); + + return -EINVAL; +} + +/* + * zynqmp_r5_parse_fw() + * @rproc: single R5 core's corresponding rproc instance + * @fw: ptr to firmware to be loaded onto r5 core + * + * get resource table if available + * + * return 0 on success, otherwise non-zero value on failure + */ +static int zynqmp_r5_parse_fw(struct rproc *rproc, const struct firmware *fw) +{ + int ret; + + ret = rproc_elf_load_rsc_table(rproc, fw); + if (ret == -EINVAL) { + /* + * resource table only required for IPC. + * if not present, this is not necessarily an error; + * for example, loading r5 hello world application + * so simply inform user and keep going. + */ + dev_info(&rproc->dev, "no resource table found.\n"); + ret = 0; + } + return ret; +} + +/** + * zynqmp_r5_rproc_prepare() + * adds carveouts for TCM bank and reserved memory regions + * + * @rproc: Device node of each rproc + * + * Return: 0 for success else < 0 error code + */ +static int zynqmp_r5_rproc_prepare(struct rproc *rproc) +{ + int ret; + + ret = add_tcm_banks(rproc); + if (ret) { + dev_err(&rproc->dev, "failed to get TCM banks, err %d\n", ret); + return ret; + } + + ret = add_mem_regions_carveout(rproc); + if (ret) { + dev_err(&rproc->dev, "failed to get reserve mem regions %d\n", ret); + return ret; + } + + return 0; +} + +/** + * zynqmp_r5_rproc_unprepare() + * Turns off TCM banks using power-domain id + * + * @rproc: Device node of each rproc + * + * Return: always 0 + */ +static int zynqmp_r5_rproc_unprepare(struct rproc *rproc) +{ + struct zynqmp_r5_core *r5_core; + u32 pm_domain_id; + int i; + + r5_core = (struct zynqmp_r5_core *)rproc->priv; + + for (i = 0; i < r5_core->tcm_bank_count; i++) { + pm_domain_id = r5_core->tcm_banks[i]->pm_domain_id; + if (zynqmp_pm_release_node(pm_domain_id)) + dev_warn(r5_core->dev, + "can't turn off TCM bank 0x%x", pm_domain_id); + } + + return 0; +} + +static const struct rproc_ops zynqmp_r5_rproc_ops = { + .prepare = zynqmp_r5_rproc_prepare, + .unprepare = zynqmp_r5_rproc_unprepare, + .start = zynqmp_r5_rproc_start, + .stop = zynqmp_r5_rproc_stop, + .load = rproc_elf_load_segments, + .parse_fw = zynqmp_r5_parse_fw, + .find_loaded_rsc_table = rproc_elf_find_loaded_rsc_table, + .sanity_check = rproc_elf_sanity_check, + .get_boot_addr = rproc_elf_get_boot_addr, +}; + +/** + * zynqmp_r5_add_rproc_core() + * Allocate and add struct rproc object for each r5f core + * This is called for each individual r5f core + * + * @cdev: Device node of each r5 core + * + * Return: zynqmp_r5_core object for success else error code pointer + */ +static struct zynqmp_r5_core *zynqmp_r5_add_rproc_core(struct device *cdev) +{ + struct zynqmp_r5_core *r5_core; + struct rproc *r5_rproc; + int ret; + + /* Set up DMA mask */ + ret = dma_set_coherent_mask(cdev, DMA_BIT_MASK(32)); + if (ret) + return ERR_PTR(ret); + + /* Allocate remoteproc instance */ + r5_rproc = rproc_alloc(cdev, dev_name(cdev), + &zynqmp_r5_rproc_ops, + NULL, sizeof(struct zynqmp_r5_core)); + if (!r5_rproc) { + dev_err(cdev, "failed to allocate memory for rproc instance\n"); + return ERR_PTR(-ENOMEM); + } + + r5_rproc->auto_boot = false; + r5_core = (struct zynqmp_r5_core *)r5_rproc->priv; + r5_core->dev = cdev; + r5_core->np = dev_of_node(cdev); + if (!r5_core->np) { + dev_err(cdev, "can't get device node for r5 core\n"); + ret = -EINVAL; + goto free_rproc; + } + + /* Add R5 remoteproc core */ + ret = rproc_add(r5_rproc); + if (ret) { + dev_err(cdev, "failed to add r5 remoteproc\n"); + goto free_rproc; + } + + r5_core->rproc = r5_rproc; + return r5_core; + +free_rproc: + rproc_free(r5_rproc); + return ERR_PTR(ret); +} + +/** + * zynqmp_r5_get_tcm_node() + * Ideally this function should parse tcm node and store information + * in r5_core instance. For now, Hardcoded TCM information is used. + * This approach is used as TCM bindings for system-dt is being developed + * + * @cluster: pointer to zynqmp_r5_cluster type object + * + * Return: 0 for success and < 0 error code for failure. + */ +static int zynqmp_r5_get_tcm_node(struct zynqmp_r5_cluster *cluster) +{ + struct device *dev = cluster->dev; + struct zynqmp_r5_core *r5_core; + int tcm_bank_count, tcm_node; + int i, j; + + tcm_bank_count = ARRAY_SIZE(zynqmp_tcm_banks); + + /* count per core tcm banks */ + tcm_bank_count = tcm_bank_count / cluster->core_count; + + /* + * r5 core 0 will use all of TCM banks in lockstep mode. + * In split mode, r5 core0 will use 128k and r5 core1 will use another + * 128k. Assign TCM banks to each core accordingly + */ + tcm_node = 0; + for (i = 0; i < cluster->core_count; i++) { + r5_core = cluster->r5_cores[i]; + r5_core->tcm_banks = devm_kcalloc(dev, tcm_bank_count, + sizeof(struct mem_bank_data *), + GFP_KERNEL); + if (!r5_core->tcm_banks) + return -ENOMEM; + + for (j = 0; j < tcm_bank_count; j++) { + /* + * Use pre-defined TCM reg values. + * Eventually this should be replaced by values + * parsed from dts. + */ + r5_core->tcm_banks[j] = + (struct mem_bank_data *)&zynqmp_tcm_banks[tcm_node]; + tcm_node++; + } + + r5_core->tcm_bank_count = tcm_bank_count; + } + + return 0; +} + +/** + * zynqmp_r5_get_mem_region_node() + * parse memory-region property and get reserved mem regions + * + * @r5_core: pointer to zynqmp_r5_core type object + * + * Return: 0 for success and error code for failure. + */ +static int zynqmp_r5_get_mem_region_node(struct zynqmp_r5_core *r5_core) +{ + struct device_node *np, *rmem_np; + struct reserved_mem **rmem; + int res_mem_count, i; + struct device *dev; + + dev = r5_core->dev; + np = r5_core->np; + + res_mem_count = of_property_count_elems_of_size(np, "memory-region", + sizeof(phandle)); + if (res_mem_count <= 0) { + dev_warn(dev, "failed to get memory-region property %d\n", + res_mem_count); + return 0; + } + + rmem = devm_kcalloc(dev, res_mem_count, + sizeof(struct reserved_mem *), GFP_KERNEL); + if (!rmem) + return -ENOMEM; + + for (i = 0; i < res_mem_count; i++) { + rmem_np = of_parse_phandle(np, "memory-region", i); + if (!rmem_np) + goto release_rmem; + + rmem[i] = of_reserved_mem_lookup(rmem_np); + if (!rmem[i]) { + of_node_put(rmem_np); + goto release_rmem; + } + + of_node_put(rmem_np); + } + + r5_core->rmem_count = res_mem_count; + r5_core->rmem = rmem; + return 0; + +release_rmem: + return -EINVAL; +} + +/* + * zynqmp_r5_core_init() + * Create and initialize zynqmp_r5_core type object + * + * @cluster: pointer to zynqmp_r5_cluster type object + * @fw_reg_val: value expected by firmware to configure RPU cluster mode + * @tcm_mode: value expected by fw to configure TCM mode (lockstep or split) + * + * Return: 0 for success and error code for failure. + */ +static int zynqmp_r5_core_init(struct zynqmp_r5_cluster *cluster, + enum rpu_oper_mode fw_reg_val, + enum rpu_tcm_comb tcm_mode) +{ + struct device *dev = cluster->dev; + struct zynqmp_r5_core *r5_core; + int ret, i; + + ret = zynqmp_r5_get_tcm_node(cluster); + if (ret < 0) { + dev_err(dev, "can't get tcm node, err %d\n", ret); + return ret; + } + + for (i = 0; i < cluster->core_count; i++) { + r5_core = cluster->r5_cores[i]; + + ret = zynqmp_r5_get_mem_region_node(r5_core); + if (ret) + dev_warn(dev, "memory-region prop failed %d\n", ret); + + /* Initialize r5 cores with power-domains parsed from dts */ + ret = of_property_read_u32_index(r5_core->np, "power-domains", + 1, &r5_core->pm_domain_id); + if (ret) { + dev_err(dev, "failed to get power-domains property\n"); + return ret; + } + + ret = zynqmp_r5_set_mode(r5_core, fw_reg_val, tcm_mode); + if (ret) { + dev_err(dev, "failed to set r5 cluster mode %d, err %d\n", + cluster->mode, ret); + return ret; + } + } + + return 0; +} + +/* + * zynqmp_r5_cluster_init() + * Create and initialize zynqmp_r5_cluster type object + * + * @cluster: pointer to zynqmp_r5_cluster type object + * + * Return: 0 for success and error code for failure. + */ +static int zynqmp_r5_cluster_init(struct zynqmp_r5_cluster *cluster) +{ + enum zynqmp_r5_cluster_mode cluster_mode = LOCKSTEP_MODE; + struct device *dev = cluster->dev; + struct device_node *dev_node = dev_of_node(dev); + struct platform_device *child_pdev; + struct zynqmp_r5_core **r5_cores; + enum rpu_oper_mode fw_reg_val; + struct device **child_devs; + struct device_node *child; + enum rpu_tcm_comb tcm_mode; + int core_count, ret, i; + + ret = of_property_read_u32(dev_node, "xlnx,cluster-mode", &cluster_mode); + + /* + * on success returns 0, if not defined then returns -EINVAL, + * In that case, default is LOCKSTEP mode. Other than that + * returns relative error code < 0. + */ + if (ret != -EINVAL && ret != 0) { + dev_err(dev, "Invalid xlnx,cluster-mode property\n"); + return ret; + } + + /* + * For now driver only supports split mode and lockstep mode. + * fail driver probe if either of that is not set in dts. + */ + if (cluster_mode == LOCKSTEP_MODE) { + tcm_mode = PM_RPU_TCM_COMB; + fw_reg_val = PM_RPU_MODE_LOCKSTEP; + } else if (cluster_mode == SPLIT_MODE) { + tcm_mode = PM_RPU_TCM_SPLIT; + fw_reg_val = PM_RPU_MODE_SPLIT; + } else { + dev_err(dev, "driver does not support cluster mode %d\n", cluster_mode); + return -EINVAL; + } + + /* + * Number of cores is decided by number of child nodes of + * r5f subsystem node in dts. If Split mode is used in dts + * 2 child nodes are expected. + * In lockstep mode if two child nodes are available, + * only use first child node and consider it as core0 + * and ignore core1 dt node. + */ + core_count = of_get_available_child_count(dev_node); + if (core_count == 0) { + dev_err(dev, "Invalid number of r5 cores %d", core_count); + return -EINVAL; + } else if (cluster_mode == SPLIT_MODE && core_count != 2) { + dev_err(dev, "Invalid number of r5 cores for split mode\n"); + return -EINVAL; + } else if (cluster_mode == LOCKSTEP_MODE && core_count == 2) { + dev_warn(dev, "Only r5 core0 will be used\n"); + core_count = 1; + } + + child_devs = kcalloc(core_count, sizeof(struct device *), GFP_KERNEL); + if (!child_devs) + return -ENOMEM; + + r5_cores = kcalloc(core_count, + sizeof(struct zynqmp_r5_core *), GFP_KERNEL); + if (!r5_cores) { + kfree(child_devs); + return -ENOMEM; + } + + i = 0; + for_each_available_child_of_node(dev_node, child) { + child_pdev = of_find_device_by_node(child); + if (!child_pdev) { + of_node_put(child); + ret = -ENODEV; + goto release_r5_cores; + } + + child_devs[i] = &child_pdev->dev; + + /* create and add remoteproc instance of type struct rproc */ + r5_cores[i] = zynqmp_r5_add_rproc_core(&child_pdev->dev); + if (IS_ERR(r5_cores[i])) { + of_node_put(child); + ret = PTR_ERR(r5_cores[i]); + r5_cores[i] = NULL; + goto release_r5_cores; + } + + /* + * If two child nodes are available in dts in lockstep mode, + * then ignore second child node. + */ + if (cluster_mode == LOCKSTEP_MODE) { + of_node_put(child); + break; + } + + i++; + } + + cluster->mode = cluster_mode; + cluster->core_count = core_count; + cluster->r5_cores = r5_cores; + + ret = zynqmp_r5_core_init(cluster, fw_reg_val, tcm_mode); + if (ret < 0) { + dev_err(dev, "failed to init r5 core err %d\n", ret); + cluster->core_count = 0; + cluster->r5_cores = NULL; + + /* + * at this point rproc resources for each core are allocated. + * adjust index to free resources in reverse order + */ + i = core_count - 1; + goto release_r5_cores; + } + + kfree(child_devs); + return 0; + +release_r5_cores: + while (i >= 0) { + put_device(child_devs[i]); + if (r5_cores[i]) { + of_reserved_mem_device_release(r5_cores[i]->dev); + rproc_del(r5_cores[i]->rproc); + rproc_free(r5_cores[i]->rproc); + } + i--; + } + kfree(r5_cores); + kfree(child_devs); + return ret; +} + +static void zynqmp_r5_cluster_exit(void *data) +{ + struct platform_device *pdev = (struct platform_device *)data; + struct zynqmp_r5_cluster *cluster; + struct zynqmp_r5_core *r5_core; + int i; + + cluster = (struct zynqmp_r5_cluster *)platform_get_drvdata(pdev); + if (!cluster) + return; + + for (i = 0; i < cluster->core_count; i++) { + r5_core = cluster->r5_cores[i]; + of_reserved_mem_device_release(r5_core->dev); + put_device(r5_core->dev); + rproc_del(r5_core->rproc); + rproc_free(r5_core->rproc); + } + + kfree(cluster->r5_cores); + kfree(cluster); + platform_set_drvdata(pdev, NULL); +} + +/* + * zynqmp_r5_remoteproc_probe() + * parse device-tree, initialize hardware and allocate required resources + * and remoteproc ops + * + * @pdev: domain platform device for R5 cluster + * + * Return: 0 for success and < 0 for failure. + */ +static int zynqmp_r5_remoteproc_probe(struct platform_device *pdev) +{ + struct zynqmp_r5_cluster *cluster; + struct device *dev = &pdev->dev; + int ret; + + cluster = kzalloc(sizeof(*cluster), GFP_KERNEL); + if (!cluster) + return -ENOMEM; + + cluster->dev = dev; + + ret = devm_of_platform_populate(dev); + if (ret) { + dev_err_probe(dev, ret, "failed to populate platform dev\n"); + kfree(cluster); + return ret; + } + + /* wire in so each core can be cleaned up at driver remove */ + platform_set_drvdata(pdev, cluster); + + ret = zynqmp_r5_cluster_init(cluster); + if (ret) { + kfree(cluster); + platform_set_drvdata(pdev, NULL); + dev_err_probe(dev, ret, "Invalid r5f subsystem device tree\n"); + return ret; + } + + ret = devm_add_action_or_reset(dev, zynqmp_r5_cluster_exit, pdev); + if (ret) + return ret; + + return 0; +} + +/* Match table for OF platform binding */ +static const struct of_device_id zynqmp_r5_remoteproc_match[] = { + { .compatible = "xlnx,zynqmp-r5fss", }, + { /* end of list */ }, +}; +MODULE_DEVICE_TABLE(of, zynqmp_r5_remoteproc_match); + +static struct platform_driver zynqmp_r5_remoteproc_driver = { + .probe = zynqmp_r5_remoteproc_probe, + .driver = { + .name = "zynqmp_r5_remoteproc", + .of_match_table = zynqmp_r5_remoteproc_match, + }, +}; +module_platform_driver(zynqmp_r5_remoteproc_driver); + +MODULE_DESCRIPTION("Xilinx R5F remote processor driver"); +MODULE_AUTHOR("Xilinx Inc."); +MODULE_LICENSE("GPL");