| // SPDX-License-Identifier: GPL-2.0 |
| |
| /* |
| * Copyright 2016-2019 HabanaLabs, Ltd. |
| * All Rights Reserved. |
| */ |
| |
| #include "habanalabs.h" |
| #include "../include/common/hl_boot_if.h" |
| |
| #include <linux/firmware.h> |
| #include <linux/slab.h> |
| |
| #define FW_FILE_MAX_SIZE 0x1400000 /* maximum size of 20MB */ |
| /** |
| * hl_fw_load_fw_to_device() - Load F/W code to device's memory. |
| * |
| * @hdev: pointer to hl_device structure. |
| * @fw_name: the firmware image name |
| * @dst: IO memory mapped address space to copy firmware to |
| * @src_offset: offset in src FW to copy from |
| * @size: amount of bytes to copy (0 to copy the whole binary) |
| * |
| * Copy fw code from firmware file to device memory. |
| * |
| * Return: 0 on success, non-zero for failure. |
| */ |
| int hl_fw_load_fw_to_device(struct hl_device *hdev, const char *fw_name, |
| void __iomem *dst, u32 src_offset, u32 size) |
| { |
| const struct firmware *fw; |
| const void *fw_data; |
| size_t fw_size; |
| int rc; |
| |
| rc = request_firmware(&fw, fw_name, hdev->dev); |
| if (rc) { |
| dev_err(hdev->dev, "Firmware file %s is not found!\n", fw_name); |
| goto out; |
| } |
| |
| fw_size = fw->size; |
| if ((fw_size % 4) != 0) { |
| dev_err(hdev->dev, "Illegal %s firmware size %zu\n", |
| fw_name, fw_size); |
| rc = -EINVAL; |
| goto out; |
| } |
| |
| dev_dbg(hdev->dev, "%s firmware size == %zu\n", fw_name, fw_size); |
| |
| if (fw_size > FW_FILE_MAX_SIZE) { |
| dev_err(hdev->dev, |
| "FW file size %zu exceeds maximum of %u bytes\n", |
| fw_size, FW_FILE_MAX_SIZE); |
| rc = -EINVAL; |
| goto out; |
| } |
| |
| if (size - src_offset > fw_size) { |
| dev_err(hdev->dev, |
| "size to copy(%u) and offset(%u) are invalid\n", |
| size, src_offset); |
| rc = -EINVAL; |
| goto out; |
| } |
| |
| if (size) |
| fw_size = size; |
| |
| fw_data = (const void *) fw->data; |
| |
| memcpy_toio(dst, fw_data + src_offset, fw_size); |
| |
| out: |
| release_firmware(fw); |
| return rc; |
| } |
| |
| int hl_fw_send_pci_access_msg(struct hl_device *hdev, u32 opcode) |
| { |
| struct cpucp_packet pkt = {}; |
| |
| pkt.ctl = cpu_to_le32(opcode << CPUCP_PKT_CTL_OPCODE_SHIFT); |
| |
| return hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, |
| sizeof(pkt), 0, NULL); |
| } |
| |
| int hl_fw_send_cpu_message(struct hl_device *hdev, u32 hw_queue_id, u32 *msg, |
| u16 len, u32 timeout, u64 *result) |
| { |
| struct hl_hw_queue *queue = &hdev->kernel_queues[hw_queue_id]; |
| struct cpucp_packet *pkt; |
| dma_addr_t pkt_dma_addr; |
| u32 tmp, expected_ack_val; |
| int rc = 0; |
| |
| pkt = hdev->asic_funcs->cpu_accessible_dma_pool_alloc(hdev, len, |
| &pkt_dma_addr); |
| if (!pkt) { |
| dev_err(hdev->dev, |
| "Failed to allocate DMA memory for packet to CPU\n"); |
| return -ENOMEM; |
| } |
| |
| memcpy(pkt, msg, len); |
| |
| mutex_lock(&hdev->send_cpu_message_lock); |
| |
| if (hdev->disabled) |
| goto out; |
| |
| if (hdev->device_cpu_disabled) { |
| rc = -EIO; |
| goto out; |
| } |
| |
| /* set fence to a non valid value */ |
| pkt->fence = UINT_MAX; |
| |
| rc = hl_hw_queue_send_cb_no_cmpl(hdev, hw_queue_id, len, pkt_dma_addr); |
| if (rc) { |
| dev_err(hdev->dev, "Failed to send CB on CPU PQ (%d)\n", rc); |
| goto out; |
| } |
| |
| if (hdev->asic_prop.fw_app_security_map & |
| CPU_BOOT_DEV_STS0_PKT_PI_ACK_EN) |
| expected_ack_val = queue->pi; |
| else |
| expected_ack_val = CPUCP_PACKET_FENCE_VAL; |
| |
| rc = hl_poll_timeout_memory(hdev, &pkt->fence, tmp, |
| (tmp == expected_ack_val), 1000, |
| timeout, true); |
| |
| hl_hw_queue_inc_ci_kernel(hdev, hw_queue_id); |
| |
| if (rc == -ETIMEDOUT) { |
| dev_err(hdev->dev, "Device CPU packet timeout (0x%x)\n", tmp); |
| hdev->device_cpu_disabled = true; |
| goto out; |
| } |
| |
| tmp = le32_to_cpu(pkt->ctl); |
| |
| rc = (tmp & CPUCP_PKT_CTL_RC_MASK) >> CPUCP_PKT_CTL_RC_SHIFT; |
| if (rc) { |
| dev_err(hdev->dev, "F/W ERROR %d for CPU packet %d\n", |
| rc, |
| (tmp & CPUCP_PKT_CTL_OPCODE_MASK) |
| >> CPUCP_PKT_CTL_OPCODE_SHIFT); |
| rc = -EIO; |
| } else if (result) { |
| *result = le64_to_cpu(pkt->result); |
| } |
| |
| out: |
| mutex_unlock(&hdev->send_cpu_message_lock); |
| |
| hdev->asic_funcs->cpu_accessible_dma_pool_free(hdev, len, pkt); |
| |
| return rc; |
| } |
| |
| int hl_fw_unmask_irq(struct hl_device *hdev, u16 event_type) |
| { |
| struct cpucp_packet pkt; |
| u64 result; |
| int rc; |
| |
| memset(&pkt, 0, sizeof(pkt)); |
| |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_UNMASK_RAZWI_IRQ << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| pkt.value = cpu_to_le64(event_type); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| 0, &result); |
| |
| if (rc) |
| dev_err(hdev->dev, "failed to unmask RAZWI IRQ %d", event_type); |
| |
| return rc; |
| } |
| |
| int hl_fw_unmask_irq_arr(struct hl_device *hdev, const u32 *irq_arr, |
| size_t irq_arr_size) |
| { |
| struct cpucp_unmask_irq_arr_packet *pkt; |
| size_t total_pkt_size; |
| u64 result; |
| int rc; |
| |
| total_pkt_size = sizeof(struct cpucp_unmask_irq_arr_packet) + |
| irq_arr_size; |
| |
| /* data should be aligned to 8 bytes in order to CPU-CP to copy it */ |
| total_pkt_size = (total_pkt_size + 0x7) & ~0x7; |
| |
| /* total_pkt_size is casted to u16 later on */ |
| if (total_pkt_size > USHRT_MAX) { |
| dev_err(hdev->dev, "too many elements in IRQ array\n"); |
| return -EINVAL; |
| } |
| |
| pkt = kzalloc(total_pkt_size, GFP_KERNEL); |
| if (!pkt) |
| return -ENOMEM; |
| |
| pkt->length = cpu_to_le32(irq_arr_size / sizeof(irq_arr[0])); |
| memcpy(&pkt->irqs, irq_arr, irq_arr_size); |
| |
| pkt->cpucp_pkt.ctl = cpu_to_le32(CPUCP_PACKET_UNMASK_RAZWI_IRQ_ARRAY << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) pkt, |
| total_pkt_size, 0, &result); |
| |
| if (rc) |
| dev_err(hdev->dev, "failed to unmask IRQ array\n"); |
| |
| kfree(pkt); |
| |
| return rc; |
| } |
| |
| int hl_fw_test_cpu_queue(struct hl_device *hdev) |
| { |
| struct cpucp_packet test_pkt = {}; |
| u64 result; |
| int rc; |
| |
| test_pkt.ctl = cpu_to_le32(CPUCP_PACKET_TEST << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| test_pkt.value = cpu_to_le64(CPUCP_PACKET_FENCE_VAL); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &test_pkt, |
| sizeof(test_pkt), 0, &result); |
| |
| if (!rc) { |
| if (result != CPUCP_PACKET_FENCE_VAL) |
| dev_err(hdev->dev, |
| "CPU queue test failed (%#08llx)\n", result); |
| } else { |
| dev_err(hdev->dev, "CPU queue test failed, error %d\n", rc); |
| } |
| |
| return rc; |
| } |
| |
| void *hl_fw_cpu_accessible_dma_pool_alloc(struct hl_device *hdev, size_t size, |
| dma_addr_t *dma_handle) |
| { |
| u64 kernel_addr; |
| |
| kernel_addr = gen_pool_alloc(hdev->cpu_accessible_dma_pool, size); |
| |
| *dma_handle = hdev->cpu_accessible_dma_address + |
| (kernel_addr - (u64) (uintptr_t) hdev->cpu_accessible_dma_mem); |
| |
| return (void *) (uintptr_t) kernel_addr; |
| } |
| |
| void hl_fw_cpu_accessible_dma_pool_free(struct hl_device *hdev, size_t size, |
| void *vaddr) |
| { |
| gen_pool_free(hdev->cpu_accessible_dma_pool, (u64) (uintptr_t) vaddr, |
| size); |
| } |
| |
| int hl_fw_send_heartbeat(struct hl_device *hdev) |
| { |
| struct cpucp_packet hb_pkt = {}; |
| u64 result; |
| int rc; |
| |
| hb_pkt.ctl = cpu_to_le32(CPUCP_PACKET_TEST << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| hb_pkt.value = cpu_to_le64(CPUCP_PACKET_FENCE_VAL); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &hb_pkt, |
| sizeof(hb_pkt), 0, &result); |
| |
| if ((rc) || (result != CPUCP_PACKET_FENCE_VAL)) |
| rc = -EIO; |
| |
| return rc; |
| } |
| |
| static int fw_read_errors(struct hl_device *hdev, u32 boot_err0_reg, |
| u32 cpu_security_boot_status_reg) |
| { |
| u32 err_val, security_val; |
| |
| /* Some of the firmware status codes are deprecated in newer f/w |
| * versions. In those versions, the errors are reported |
| * in different registers. Therefore, we need to check those |
| * registers and print the exact errors. Moreover, there |
| * may be multiple errors, so we need to report on each error |
| * separately. Some of the error codes might indicate a state |
| * that is not an error per-se, but it is an error in production |
| * environment |
| */ |
| err_val = RREG32(boot_err0_reg); |
| if (!(err_val & CPU_BOOT_ERR0_ENABLED)) |
| return 0; |
| |
| if (err_val & CPU_BOOT_ERR0_DRAM_INIT_FAIL) |
| dev_err(hdev->dev, |
| "Device boot error - DRAM initialization failed\n"); |
| if (err_val & CPU_BOOT_ERR0_FIT_CORRUPTED) |
| dev_err(hdev->dev, "Device boot error - FIT image corrupted\n"); |
| if (err_val & CPU_BOOT_ERR0_TS_INIT_FAIL) |
| dev_err(hdev->dev, |
| "Device boot error - Thermal Sensor initialization failed\n"); |
| if (err_val & CPU_BOOT_ERR0_DRAM_SKIPPED) |
| dev_warn(hdev->dev, |
| "Device boot warning - Skipped DRAM initialization\n"); |
| |
| if (err_val & CPU_BOOT_ERR0_BMC_WAIT_SKIPPED) { |
| if (hdev->bmc_enable) |
| dev_warn(hdev->dev, |
| "Device boot error - Skipped waiting for BMC\n"); |
| else |
| err_val &= ~CPU_BOOT_ERR0_BMC_WAIT_SKIPPED; |
| } |
| |
| if (err_val & CPU_BOOT_ERR0_NIC_DATA_NOT_RDY) |
| dev_err(hdev->dev, |
| "Device boot error - Serdes data from BMC not available\n"); |
| if (err_val & CPU_BOOT_ERR0_NIC_FW_FAIL) |
| dev_err(hdev->dev, |
| "Device boot error - NIC F/W initialization failed\n"); |
| if (err_val & CPU_BOOT_ERR0_SECURITY_NOT_RDY) |
| dev_warn(hdev->dev, |
| "Device boot warning - security not ready\n"); |
| if (err_val & CPU_BOOT_ERR0_SECURITY_FAIL) |
| dev_err(hdev->dev, "Device boot error - security failure\n"); |
| if (err_val & CPU_BOOT_ERR0_EFUSE_FAIL) |
| dev_err(hdev->dev, "Device boot error - eFuse failure\n"); |
| if (err_val & CPU_BOOT_ERR0_PLL_FAIL) |
| dev_err(hdev->dev, "Device boot error - PLL failure\n"); |
| |
| security_val = RREG32(cpu_security_boot_status_reg); |
| if (security_val & CPU_BOOT_DEV_STS0_ENABLED) |
| dev_dbg(hdev->dev, "Device security status %#x\n", |
| security_val); |
| |
| if (err_val & ~CPU_BOOT_ERR0_ENABLED) |
| return -EIO; |
| |
| return 0; |
| } |
| |
| int hl_fw_cpucp_info_get(struct hl_device *hdev, |
| u32 cpu_security_boot_status_reg, |
| u32 boot_err0_reg) |
| { |
| struct asic_fixed_properties *prop = &hdev->asic_prop; |
| struct cpucp_packet pkt = {}; |
| void *cpucp_info_cpu_addr; |
| dma_addr_t cpucp_info_dma_addr; |
| u64 result; |
| int rc; |
| |
| cpucp_info_cpu_addr = |
| hdev->asic_funcs->cpu_accessible_dma_pool_alloc(hdev, |
| sizeof(struct cpucp_info), |
| &cpucp_info_dma_addr); |
| if (!cpucp_info_cpu_addr) { |
| dev_err(hdev->dev, |
| "Failed to allocate DMA memory for CPU-CP info packet\n"); |
| return -ENOMEM; |
| } |
| |
| memset(cpucp_info_cpu_addr, 0, sizeof(struct cpucp_info)); |
| |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_INFO_GET << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| pkt.addr = cpu_to_le64(cpucp_info_dma_addr); |
| pkt.data_max_size = cpu_to_le32(sizeof(struct cpucp_info)); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| HL_CPUCP_INFO_TIMEOUT_USEC, &result); |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to handle CPU-CP info pkt, error %d\n", rc); |
| goto out; |
| } |
| |
| rc = fw_read_errors(hdev, boot_err0_reg, cpu_security_boot_status_reg); |
| if (rc) { |
| dev_err(hdev->dev, "Errors in device boot\n"); |
| goto out; |
| } |
| |
| memcpy(&prop->cpucp_info, cpucp_info_cpu_addr, |
| sizeof(prop->cpucp_info)); |
| |
| rc = hl_build_hwmon_channel_info(hdev, prop->cpucp_info.sensors); |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to build hwmon channel info, error %d\n", rc); |
| rc = -EFAULT; |
| goto out; |
| } |
| |
| /* Read FW application security bits again */ |
| if (hdev->asic_prop.fw_security_status_valid) |
| hdev->asic_prop.fw_app_security_map = |
| RREG32(cpu_security_boot_status_reg); |
| |
| out: |
| hdev->asic_funcs->cpu_accessible_dma_pool_free(hdev, |
| sizeof(struct cpucp_info), cpucp_info_cpu_addr); |
| |
| return rc; |
| } |
| |
| int hl_fw_get_eeprom_data(struct hl_device *hdev, void *data, size_t max_size) |
| { |
| struct cpucp_packet pkt = {}; |
| void *eeprom_info_cpu_addr; |
| dma_addr_t eeprom_info_dma_addr; |
| u64 result; |
| int rc; |
| |
| eeprom_info_cpu_addr = |
| hdev->asic_funcs->cpu_accessible_dma_pool_alloc(hdev, |
| max_size, &eeprom_info_dma_addr); |
| if (!eeprom_info_cpu_addr) { |
| dev_err(hdev->dev, |
| "Failed to allocate DMA memory for CPU-CP EEPROM packet\n"); |
| return -ENOMEM; |
| } |
| |
| memset(eeprom_info_cpu_addr, 0, max_size); |
| |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_EEPROM_DATA_GET << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| pkt.addr = cpu_to_le64(eeprom_info_dma_addr); |
| pkt.data_max_size = cpu_to_le32(max_size); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| HL_CPUCP_EEPROM_TIMEOUT_USEC, &result); |
| |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to handle CPU-CP EEPROM packet, error %d\n", |
| rc); |
| goto out; |
| } |
| |
| /* result contains the actual size */ |
| memcpy(data, eeprom_info_cpu_addr, min((size_t)result, max_size)); |
| |
| out: |
| hdev->asic_funcs->cpu_accessible_dma_pool_free(hdev, max_size, |
| eeprom_info_cpu_addr); |
| |
| return rc; |
| } |
| |
| int hl_fw_cpucp_pci_counters_get(struct hl_device *hdev, |
| struct hl_info_pci_counters *counters) |
| { |
| struct cpucp_packet pkt = {}; |
| u64 result; |
| int rc; |
| |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_PCIE_THROUGHPUT_GET << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| |
| /* Fetch PCI rx counter */ |
| pkt.index = cpu_to_le32(cpucp_pcie_throughput_rx); |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| HL_CPUCP_INFO_TIMEOUT_USEC, &result); |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to handle CPU-CP PCI info pkt, error %d\n", rc); |
| return rc; |
| } |
| counters->rx_throughput = result; |
| |
| memset(&pkt, 0, sizeof(pkt)); |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_PCIE_THROUGHPUT_GET << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| |
| /* Fetch PCI tx counter */ |
| pkt.index = cpu_to_le32(cpucp_pcie_throughput_tx); |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| HL_CPUCP_INFO_TIMEOUT_USEC, &result); |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to handle CPU-CP PCI info pkt, error %d\n", rc); |
| return rc; |
| } |
| counters->tx_throughput = result; |
| |
| /* Fetch PCI replay counter */ |
| memset(&pkt, 0, sizeof(pkt)); |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_PCIE_REPLAY_CNT_GET << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| HL_CPUCP_INFO_TIMEOUT_USEC, &result); |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to handle CPU-CP PCI info pkt, error %d\n", rc); |
| return rc; |
| } |
| counters->replay_cnt = (u32) result; |
| |
| return rc; |
| } |
| |
| int hl_fw_cpucp_total_energy_get(struct hl_device *hdev, u64 *total_energy) |
| { |
| struct cpucp_packet pkt = {}; |
| u64 result; |
| int rc; |
| |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_TOTAL_ENERGY_GET << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| HL_CPUCP_INFO_TIMEOUT_USEC, &result); |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to handle CpuCP total energy pkt, error %d\n", |
| rc); |
| return rc; |
| } |
| |
| *total_energy = result; |
| |
| return rc; |
| } |
| |
| int hl_fw_cpucp_pll_info_get(struct hl_device *hdev, u16 pll_index, |
| u16 *pll_freq_arr) |
| { |
| struct cpucp_packet pkt; |
| u64 result; |
| int rc; |
| |
| memset(&pkt, 0, sizeof(pkt)); |
| |
| pkt.ctl = cpu_to_le32(CPUCP_PACKET_PLL_INFO_GET << |
| CPUCP_PKT_CTL_OPCODE_SHIFT); |
| pkt.pll_type = __cpu_to_le16(pll_index); |
| |
| rc = hdev->asic_funcs->send_cpu_message(hdev, (u32 *) &pkt, sizeof(pkt), |
| HL_CPUCP_INFO_TIMEOUT_USEC, &result); |
| if (rc) |
| dev_err(hdev->dev, "Failed to read PLL info, error %d\n", rc); |
| |
| pll_freq_arr[0] = FIELD_GET(CPUCP_PKT_RES_PLL_OUT0_MASK, result); |
| pll_freq_arr[1] = FIELD_GET(CPUCP_PKT_RES_PLL_OUT1_MASK, result); |
| pll_freq_arr[2] = FIELD_GET(CPUCP_PKT_RES_PLL_OUT2_MASK, result); |
| pll_freq_arr[3] = FIELD_GET(CPUCP_PKT_RES_PLL_OUT3_MASK, result); |
| |
| return rc; |
| } |
| |
| static void detect_cpu_boot_status(struct hl_device *hdev, u32 status) |
| { |
| /* Some of the status codes below are deprecated in newer f/w |
| * versions but we keep them here for backward compatibility |
| */ |
| switch (status) { |
| case CPU_BOOT_STATUS_NA: |
| dev_err(hdev->dev, |
| "Device boot error - BTL did NOT run\n"); |
| break; |
| case CPU_BOOT_STATUS_IN_WFE: |
| dev_err(hdev->dev, |
| "Device boot error - Stuck inside WFE loop\n"); |
| break; |
| case CPU_BOOT_STATUS_IN_BTL: |
| dev_err(hdev->dev, |
| "Device boot error - Stuck in BTL\n"); |
| break; |
| case CPU_BOOT_STATUS_IN_PREBOOT: |
| dev_err(hdev->dev, |
| "Device boot error - Stuck in Preboot\n"); |
| break; |
| case CPU_BOOT_STATUS_IN_SPL: |
| dev_err(hdev->dev, |
| "Device boot error - Stuck in SPL\n"); |
| break; |
| case CPU_BOOT_STATUS_IN_UBOOT: |
| dev_err(hdev->dev, |
| "Device boot error - Stuck in u-boot\n"); |
| break; |
| case CPU_BOOT_STATUS_DRAM_INIT_FAIL: |
| dev_err(hdev->dev, |
| "Device boot error - DRAM initialization failed\n"); |
| break; |
| case CPU_BOOT_STATUS_UBOOT_NOT_READY: |
| dev_err(hdev->dev, |
| "Device boot error - u-boot stopped by user\n"); |
| break; |
| case CPU_BOOT_STATUS_TS_INIT_FAIL: |
| dev_err(hdev->dev, |
| "Device boot error - Thermal Sensor initialization failed\n"); |
| break; |
| default: |
| dev_err(hdev->dev, |
| "Device boot error - Invalid status code %d\n", |
| status); |
| break; |
| } |
| } |
| |
| int hl_fw_read_preboot_status(struct hl_device *hdev, u32 cpu_boot_status_reg, |
| u32 cpu_security_boot_status_reg, u32 boot_err0_reg, |
| u32 timeout) |
| { |
| struct asic_fixed_properties *prop = &hdev->asic_prop; |
| u32 status, security_status; |
| int rc; |
| |
| if (!hdev->cpu_enable) |
| return 0; |
| |
| /* Need to check two possible scenarios: |
| * |
| * CPU_BOOT_STATUS_WAITING_FOR_BOOT_FIT - for newer firmwares where |
| * the preboot is waiting for the boot fit |
| * |
| * All other status values - for older firmwares where the uboot was |
| * loaded from the FLASH |
| */ |
| rc = hl_poll_timeout( |
| hdev, |
| cpu_boot_status_reg, |
| status, |
| (status == CPU_BOOT_STATUS_IN_UBOOT) || |
| (status == CPU_BOOT_STATUS_DRAM_RDY) || |
| (status == CPU_BOOT_STATUS_NIC_FW_RDY) || |
| (status == CPU_BOOT_STATUS_READY_TO_BOOT) || |
| (status == CPU_BOOT_STATUS_SRAM_AVAIL) || |
| (status == CPU_BOOT_STATUS_WAITING_FOR_BOOT_FIT), |
| 10000, |
| timeout); |
| |
| if (rc) { |
| dev_err(hdev->dev, "Failed to read preboot version\n"); |
| detect_cpu_boot_status(hdev, status); |
| fw_read_errors(hdev, boot_err0_reg, |
| cpu_security_boot_status_reg); |
| return -EIO; |
| } |
| |
| rc = hdev->asic_funcs->read_device_fw_version(hdev, FW_COMP_PREBOOT); |
| if (rc) |
| return rc; |
| |
| security_status = RREG32(cpu_security_boot_status_reg); |
| |
| /* We read security status multiple times during boot: |
| * 1. preboot - a. Check whether the security status bits are valid |
| * b. Check whether fw security is enabled |
| * c. Check whether hard reset is done by preboot |
| * 2. boot cpu - a. Fetch boot cpu security status |
| * b. Check whether hard reset is done by boot cpu |
| * 3. FW application - a. Fetch fw application security status |
| * b. Check whether hard reset is done by fw app |
| * |
| * Preboot: |
| * Check security status bit (CPU_BOOT_DEV_STS0_ENABLED), if it is set |
| * check security enabled bit (CPU_BOOT_DEV_STS0_SECURITY_EN) |
| */ |
| if (security_status & CPU_BOOT_DEV_STS0_ENABLED) { |
| prop->fw_security_status_valid = 1; |
| |
| if (security_status & CPU_BOOT_DEV_STS0_SECURITY_EN) |
| prop->fw_security_disabled = false; |
| else |
| prop->fw_security_disabled = true; |
| |
| if (security_status & CPU_BOOT_DEV_STS0_FW_HARD_RST_EN) |
| prop->hard_reset_done_by_fw = true; |
| } else { |
| prop->fw_security_status_valid = 0; |
| prop->fw_security_disabled = true; |
| } |
| |
| dev_dbg(hdev->dev, "Firmware preboot security status %#x\n", |
| security_status); |
| |
| dev_dbg(hdev->dev, "Firmware preboot hard-reset is %s\n", |
| prop->hard_reset_done_by_fw ? "enabled" : "disabled"); |
| |
| dev_info(hdev->dev, "firmware-level security is %s\n", |
| prop->fw_security_disabled ? "disabled" : "enabled"); |
| |
| return 0; |
| } |
| |
| int hl_fw_init_cpu(struct hl_device *hdev, u32 cpu_boot_status_reg, |
| u32 msg_to_cpu_reg, u32 cpu_msg_status_reg, |
| u32 cpu_security_boot_status_reg, u32 boot_err0_reg, |
| bool skip_bmc, u32 cpu_timeout, u32 boot_fit_timeout) |
| { |
| struct asic_fixed_properties *prop = &hdev->asic_prop; |
| u32 status; |
| int rc; |
| |
| if (!(hdev->fw_loading & FW_TYPE_BOOT_CPU)) |
| return 0; |
| |
| dev_info(hdev->dev, "Going to wait for device boot (up to %lds)\n", |
| cpu_timeout / USEC_PER_SEC); |
| |
| /* Wait for boot FIT request */ |
| rc = hl_poll_timeout( |
| hdev, |
| cpu_boot_status_reg, |
| status, |
| status == CPU_BOOT_STATUS_WAITING_FOR_BOOT_FIT, |
| 10000, |
| boot_fit_timeout); |
| |
| if (rc) { |
| dev_dbg(hdev->dev, |
| "No boot fit request received, resuming boot\n"); |
| } else { |
| rc = hdev->asic_funcs->load_boot_fit_to_device(hdev); |
| if (rc) |
| goto out; |
| |
| /* Clear device CPU message status */ |
| WREG32(cpu_msg_status_reg, CPU_MSG_CLR); |
| |
| /* Signal device CPU that boot loader is ready */ |
| WREG32(msg_to_cpu_reg, KMD_MSG_FIT_RDY); |
| |
| /* Poll for CPU device ack */ |
| rc = hl_poll_timeout( |
| hdev, |
| cpu_msg_status_reg, |
| status, |
| status == CPU_MSG_OK, |
| 10000, |
| boot_fit_timeout); |
| |
| if (rc) { |
| dev_err(hdev->dev, |
| "Timeout waiting for boot fit load ack\n"); |
| goto out; |
| } |
| |
| /* Clear message */ |
| WREG32(msg_to_cpu_reg, KMD_MSG_NA); |
| } |
| |
| /* Make sure CPU boot-loader is running */ |
| rc = hl_poll_timeout( |
| hdev, |
| cpu_boot_status_reg, |
| status, |
| (status == CPU_BOOT_STATUS_DRAM_RDY) || |
| (status == CPU_BOOT_STATUS_NIC_FW_RDY) || |
| (status == CPU_BOOT_STATUS_READY_TO_BOOT) || |
| (status == CPU_BOOT_STATUS_SRAM_AVAIL), |
| 10000, |
| cpu_timeout); |
| |
| dev_dbg(hdev->dev, "uboot status = %d\n", status); |
| |
| /* Read U-Boot version now in case we will later fail */ |
| hdev->asic_funcs->read_device_fw_version(hdev, FW_COMP_UBOOT); |
| |
| /* Clear reset status since we need to read it again from boot CPU */ |
| prop->hard_reset_done_by_fw = false; |
| |
| /* Read boot_cpu security bits */ |
| if (prop->fw_security_status_valid) { |
| prop->fw_boot_cpu_security_map = |
| RREG32(cpu_security_boot_status_reg); |
| |
| if (prop->fw_boot_cpu_security_map & |
| CPU_BOOT_DEV_STS0_FW_HARD_RST_EN) |
| prop->hard_reset_done_by_fw = true; |
| |
| dev_dbg(hdev->dev, |
| "Firmware boot CPU security status %#x\n", |
| prop->fw_boot_cpu_security_map); |
| } |
| |
| dev_dbg(hdev->dev, "Firmware boot CPU hard-reset is %s\n", |
| prop->hard_reset_done_by_fw ? "enabled" : "disabled"); |
| |
| if (rc) { |
| detect_cpu_boot_status(hdev, status); |
| rc = -EIO; |
| goto out; |
| } |
| |
| if (!(hdev->fw_loading & FW_TYPE_LINUX)) { |
| dev_info(hdev->dev, "Skip loading Linux F/W\n"); |
| goto out; |
| } |
| |
| if (status == CPU_BOOT_STATUS_SRAM_AVAIL) |
| goto out; |
| |
| dev_info(hdev->dev, |
| "Loading firmware to device, may take some time...\n"); |
| |
| rc = hdev->asic_funcs->load_firmware_to_device(hdev); |
| if (rc) |
| goto out; |
| |
| if (skip_bmc) { |
| WREG32(msg_to_cpu_reg, KMD_MSG_SKIP_BMC); |
| |
| rc = hl_poll_timeout( |
| hdev, |
| cpu_boot_status_reg, |
| status, |
| (status == CPU_BOOT_STATUS_BMC_WAITING_SKIPPED), |
| 10000, |
| cpu_timeout); |
| |
| if (rc) { |
| dev_err(hdev->dev, |
| "Failed to get ACK on skipping BMC, %d\n", |
| status); |
| WREG32(msg_to_cpu_reg, KMD_MSG_NA); |
| rc = -EIO; |
| goto out; |
| } |
| } |
| |
| WREG32(msg_to_cpu_reg, KMD_MSG_FIT_RDY); |
| |
| rc = hl_poll_timeout( |
| hdev, |
| cpu_boot_status_reg, |
| status, |
| (status == CPU_BOOT_STATUS_SRAM_AVAIL), |
| 10000, |
| cpu_timeout); |
| |
| /* Clear message */ |
| WREG32(msg_to_cpu_reg, KMD_MSG_NA); |
| |
| if (rc) { |
| if (status == CPU_BOOT_STATUS_FIT_CORRUPTED) |
| dev_err(hdev->dev, |
| "Device reports FIT image is corrupted\n"); |
| else |
| dev_err(hdev->dev, |
| "Failed to load firmware to device, %d\n", |
| status); |
| |
| rc = -EIO; |
| goto out; |
| } |
| |
| rc = fw_read_errors(hdev, boot_err0_reg, cpu_security_boot_status_reg); |
| if (rc) |
| return rc; |
| |
| /* Clear reset status since we need to read again from app */ |
| prop->hard_reset_done_by_fw = false; |
| |
| /* Read FW application security bits */ |
| if (prop->fw_security_status_valid) { |
| prop->fw_app_security_map = |
| RREG32(cpu_security_boot_status_reg); |
| |
| if (prop->fw_app_security_map & |
| CPU_BOOT_DEV_STS0_FW_HARD_RST_EN) |
| prop->hard_reset_done_by_fw = true; |
| |
| dev_dbg(hdev->dev, |
| "Firmware application CPU security status %#x\n", |
| prop->fw_app_security_map); |
| } |
| |
| dev_dbg(hdev->dev, "Firmware application CPU hard-reset is %s\n", |
| prop->hard_reset_done_by_fw ? "enabled" : "disabled"); |
| |
| dev_info(hdev->dev, "Successfully loaded firmware to device\n"); |
| |
| return 0; |
| |
| out: |
| fw_read_errors(hdev, boot_err0_reg, cpu_security_boot_status_reg); |
| |
| return rc; |
| } |