From patchwork Mon Jul 17 08:56:48 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stanimir Varbanov X-Patchwork-Id: 107875 Delivered-To: patch@linaro.org Received: by 10.140.101.44 with SMTP id t41csp4255345qge; Mon, 17 Jul 2017 01:58:35 -0700 (PDT) X-Received: by 10.84.217.153 with SMTP id p25mr9253944pli.218.1500281915651; Mon, 17 Jul 2017 01:58:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1500281915; cv=none; d=google.com; s=arc-20160816; b=Qd8ZM24XayeaBmEJVDH06RnSWpIKdt8Txd1kiAa5GzPiw61fXK6Cywo3ByL7dqqOXZ LqoaUqPBvJMYHskawojFnUPCwliGTZpDE4dt8IrHjfj28R+fxqU8tvH282n+1Gt2O6Hh 7hc319mLFFL9CwXqTmsNT9F9Oo9svY9Df4+zS6/vQQhGCKTLgYNML5nCNnRg3owsi+IF 5ULRcyYlh5QvG+dVNumStv4jzo9AgJZr6QwqmdfHLTT+NaiprhqQQ0p04S2peMWe3JdS QQ2v+izY1r0gM9QCRJL5WYA3QDcnIkP/M70O/yxDjg8rGOtfg51FSMNErSQmy7GFO9oP yfeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=qJtC2VoguUZc8bWVivXDFZ+GD3fuRnfJx2KA1C/uNBM=; b=C4WKMaX9dxkUZVYnZZjLZNMWqTq2RnYEujYR1BEa0f3JXXVf2tQY3Rd4jOuSZkTzGt alacrgy0ia+sbViYSiK4XxSkjCz349ll9vWiiiAwhFa6ei/rGCs1QT8DuBYRS/etzx2f proUiZUCMpnaZJZJUurP12qdJtJzBk3ko+0pUZ/W9iv/4OGiipA9ZR04vUg7HLVEl69D saFv/NmXFTmACNmi5bz1ebwPvfEmOIw0r+tDr9Z4UIEDYfAyyPEhACIyTKR0cjU07pKC IcpuTfSSw5B1SXD9I3mjoZ/6gtrYLVwoJU9rNidPdhOS3p0+lTvqJsJUhKJaDXBydcvQ shdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.b=fsHoYsoJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g11si12377881pln.576.2017.07.17.01.58.35; Mon, 17 Jul 2017 01:58:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.b=fsHoYsoJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751402AbdGQI6d (ORCPT + 25 others); Mon, 17 Jul 2017 04:58:33 -0400 Received: from mail-wm0-f51.google.com ([74.125.82.51]:33618 "EHLO mail-wm0-f51.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751278AbdGQI6a (ORCPT ); Mon, 17 Jul 2017 04:58:30 -0400 Received: by mail-wm0-f51.google.com with SMTP id t70so20791151wmt.0 for ; Mon, 17 Jul 2017 01:58:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=qJtC2VoguUZc8bWVivXDFZ+GD3fuRnfJx2KA1C/uNBM=; b=fsHoYsoJwKJi+gMmO4T/yiDp4tNASeSUq0FoFurf2BAm1bS9PROsWr4TPVTuoOAHQ9 KFDBMSKIfN1Q5AeuTfLzUrAmgJHq02qNdB6UCQJb/RmcHiy6YvLqDYc7c1eToGvLor5I TyyT1IAn8PyqWMnbe0SIGZn4gmQuylZlv0w2E= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=qJtC2VoguUZc8bWVivXDFZ+GD3fuRnfJx2KA1C/uNBM=; b=QvMs5x2xerD58ge6l/EzB2tvYn1KaJe4HcN57RZef9al51Hp/qWPxxxc70bpaSBD8C EsSxffPtXiAfzyBmXUkoHTTExZfK1ajT77Nb9vXCRh1O25dhfQu4khNIDe8U49mMP/GP SLgQ8ob7TXBsapCRCEA2VEcYZT2gGMmc363hkpPeaHQ3eXaP3IBnkn5azaMKKLWz9V75 EE2KenGrAxHlCaIFot+d0AG5XmPqB48BFG4yyzi0HVOHLzCM88kpFuR9X+2C7BX4aP8X Jq22S5/5IUoDMwUMl53zZ66nzEamzOIb6OWfLeFq7CHz3oUE/TV8AG+QC0dQBA/AG16A C8sQ== X-Gm-Message-State: AIVw110q5DhaTlZ820JmPP7ulUwgFKb2Msa0XG0YnUIXlqxDULPBaJms IQvc30HAXuUUI0Nn X-Received: by 10.28.189.214 with SMTP id n205mr3294452wmf.122.1500281909508; Mon, 17 Jul 2017 01:58:29 -0700 (PDT) Received: from localhost.localdomain ([37.157.136.206]) by smtp.gmail.com with ESMTPSA id q17sm11558700wmd.4.2017.07.17.01.58.04 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 17 Jul 2017 01:58:05 -0700 (PDT) From: Stanimir Varbanov To: Mauro Carvalho Chehab Cc: Hans Verkuil , Arnd Bergmann , linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, Stanimir Varbanov Subject: [PATCH 2/4] media: venus: don't abuse dma_alloc for non-DMA allocations Date: Mon, 17 Jul 2017 11:56:48 +0300 Message-Id: <20170717085650.12185-3-stanimir.varbanov@linaro.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170717085650.12185-1-stanimir.varbanov@linaro.org> References: <20170717085650.12185-1-stanimir.varbanov@linaro.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In venus_boot(), we pass a pointer to a phys_addr_t into dmam_alloc_coherent, which the compiler warns about: platform/qcom/venus/firmware.c: In function 'venus_boot': platform/qcom/venus/firmware.c:63:49: error: passing argument 3 of 'dmam_alloc_coherent' from incompatible pointer type [-Werror=incompatible-pointer-types] To avoid the error refactor venus_boot function by discard dma_alloc_coherent usage because we don't want to map the memory for the device. The meaning of venus_boot is to copy the content of the firmware buffer into the reserved (and memblock removed) block of memory and pass the physical address to the remote processor. Now we parse memory-region property by hand and memremap the physical address to CPU, call mdt_load to load firmware segments into proper places and unmap reserved memory. Fixes: af2c3834c8ca ("[media] media: venus: adding core part and helper functions") Signed-off-by: Stanimir Varbanov --- drivers/media/platform/qcom/venus/core.c | 10 ++-- drivers/media/platform/qcom/venus/core.h | 1 - drivers/media/platform/qcom/venus/firmware.c | 74 ++++++++++++---------------- drivers/media/platform/qcom/venus/firmware.h | 5 +- 4 files changed, 39 insertions(+), 51 deletions(-) -- 2.11.0 diff --git a/drivers/media/platform/qcom/venus/core.c b/drivers/media/platform/qcom/venus/core.c index 694f57a78288..a70368cb713f 100644 --- a/drivers/media/platform/qcom/venus/core.c +++ b/drivers/media/platform/qcom/venus/core.c @@ -76,7 +76,7 @@ static void venus_sys_error_handler(struct work_struct *work) hfi_core_deinit(core, true); hfi_destroy(core); mutex_lock(&core->lock); - venus_shutdown(&core->dev_fw); + venus_shutdown(core->dev); pm_runtime_put_sync(core->dev); @@ -84,7 +84,7 @@ static void venus_sys_error_handler(struct work_struct *work) pm_runtime_get_sync(core->dev); - ret |= venus_boot(core->dev, &core->dev_fw, core->res->fwname); + ret |= venus_boot(core->dev, core->res->fwname); ret |= hfi_core_resume(core, true); @@ -207,7 +207,7 @@ static int venus_probe(struct platform_device *pdev) if (ret < 0) goto err_runtime_disable; - ret = venus_boot(dev, &core->dev_fw, core->res->fwname); + ret = venus_boot(dev, core->res->fwname); if (ret) goto err_runtime_disable; @@ -238,7 +238,7 @@ static int venus_probe(struct platform_device *pdev) err_core_deinit: hfi_core_deinit(core, false); err_venus_shutdown: - venus_shutdown(&core->dev_fw); + venus_shutdown(dev); err_runtime_disable: pm_runtime_set_suspended(dev); pm_runtime_disable(dev); @@ -259,7 +259,7 @@ static int venus_remove(struct platform_device *pdev) WARN_ON(ret); hfi_destroy(core); - venus_shutdown(&core->dev_fw); + venus_shutdown(dev); of_platform_depopulate(dev); pm_runtime_put_sync(dev); diff --git a/drivers/media/platform/qcom/venus/core.h b/drivers/media/platform/qcom/venus/core.h index e542700eee32..cba092bcb76d 100644 --- a/drivers/media/platform/qcom/venus/core.h +++ b/drivers/media/platform/qcom/venus/core.h @@ -101,7 +101,6 @@ struct venus_core { struct device *dev; struct device *dev_dec; struct device *dev_enc; - struct device dev_fw; struct mutex lock; struct list_head instances; atomic_t insts_count; diff --git a/drivers/media/platform/qcom/venus/firmware.c b/drivers/media/platform/qcom/venus/firmware.c index 1b1a4f355918..d6d9560c1c19 100644 --- a/drivers/media/platform/qcom/venus/firmware.c +++ b/drivers/media/platform/qcom/venus/firmware.c @@ -12,29 +12,27 @@ * */ -#include +#include #include #include +#include #include -#include -#include +#include #include +#include #include #include "firmware.h" #define VENUS_PAS_ID 9 -#define VENUS_FW_MEM_SIZE SZ_8M +#define VENUS_FW_MEM_SIZE (6 * SZ_1M) -static void device_release_dummy(struct device *dev) -{ - of_reserved_mem_device_release(dev); -} - -int venus_boot(struct device *parent, struct device *fw_dev, const char *fwname) +int venus_boot(struct device *dev, const char *fwname) { const struct firmware *mdt; + struct device_node *node; phys_addr_t mem_phys; + struct resource r; ssize_t fw_size; size_t mem_size; void *mem_va; @@ -43,66 +41,58 @@ int venus_boot(struct device *parent, struct device *fw_dev, const char *fwname) if (!qcom_scm_is_available()) return -EPROBE_DEFER; - fw_dev->parent = parent; - fw_dev->release = device_release_dummy; + node = of_parse_phandle(dev->of_node, "memory-region", 0); + if (!node) { + dev_err(dev, "no memory-region specified\n"); + return -EINVAL; + } - ret = dev_set_name(fw_dev, "%s:%s", dev_name(parent), "firmware"); + ret = of_address_to_resource(node, 0, &r); if (ret) return ret; - ret = device_register(fw_dev); - if (ret < 0) - return ret; + mem_phys = r.start; + mem_size = resource_size(&r); - ret = of_reserved_mem_device_init_by_idx(fw_dev, parent->of_node, 0); - if (ret) - goto err_unreg_device; + if (mem_size < VENUS_FW_MEM_SIZE) + return -EINVAL; - mem_size = VENUS_FW_MEM_SIZE; - - mem_va = dmam_alloc_coherent(fw_dev, mem_size, &mem_phys, GFP_KERNEL); + mem_va = memremap(r.start, mem_size, MEMREMAP_WC); if (!mem_va) { - ret = -ENOMEM; - goto err_unreg_device; + dev_err(dev, "unable to map memory region: %pa+%zx\n", + &r.start, mem_size); + return -ENOMEM; } - ret = request_firmware(&mdt, fwname, fw_dev); + ret = request_firmware(&mdt, fwname, dev); if (ret < 0) - goto err_unreg_device; + goto err_unmap; fw_size = qcom_mdt_get_size(mdt); if (fw_size < 0) { ret = fw_size; release_firmware(mdt); - goto err_unreg_device; + goto err_unmap; } - ret = qcom_mdt_load(fw_dev, mdt, fwname, VENUS_PAS_ID, mem_va, mem_phys, + ret = qcom_mdt_load(dev, mdt, fwname, VENUS_PAS_ID, mem_va, mem_phys, mem_size); release_firmware(mdt); if (ret) - goto err_unreg_device; + goto err_unmap; ret = qcom_scm_pas_auth_and_reset(VENUS_PAS_ID); if (ret) - goto err_unreg_device; - - return 0; + goto err_unmap; -err_unreg_device: - device_unregister(fw_dev); +err_unmap: + memunmap(mem_va); return ret; } -int venus_shutdown(struct device *fw_dev) +int venus_shutdown(struct device *dev) { - int ret; - - ret = qcom_scm_pas_shutdown(VENUS_PAS_ID); - device_unregister(fw_dev); - memset(fw_dev, 0, sizeof(*fw_dev)); - - return ret; + return qcom_scm_pas_shutdown(VENUS_PAS_ID); } diff --git a/drivers/media/platform/qcom/venus/firmware.h b/drivers/media/platform/qcom/venus/firmware.h index f81a98979798..428efb56d339 100644 --- a/drivers/media/platform/qcom/venus/firmware.h +++ b/drivers/media/platform/qcom/venus/firmware.h @@ -16,8 +16,7 @@ struct device; -int venus_boot(struct device *parent, struct device *fw_dev, - const char *fwname); -int venus_shutdown(struct device *fw_dev); +int venus_boot(struct device *dev, const char *fwname); +int venus_shutdown(struct device *dev); #endif