.../bindings/remoteproc/qcom,pas-common.yaml | 3 + arch/arm64/boot/dts/qcom/Makefile | 10 + arch/arm64/boot/dts/qcom/lemans-el2.dtso | 41 +++ drivers/firmware/qcom/qcom_scm.c | 368 ++++++++++++++++++--- drivers/firmware/qcom/qcom_scm.h | 1 + drivers/remoteproc/qcom_q6v5_pas.c | 166 ++++++++-- drivers/soc/qcom/mdt_loader.c | 42 ++- include/linux/firmware/qcom/qcom_scm.h | 30 +- include/linux/soc/qcom/mdt_loader.h | 22 +- 9 files changed, 577 insertions(+), 106 deletions(-)
In May 2025, we discussed the challenges at Linaro Connect 2025 [1]
related to Secure PAS remoteproc enablement when Linux is running at EL2
for Qualcomm SoCs.
[1] https://resources.linaro.org/en/resource/sF8jXifdb9V1mUefdbfafa
Below, is the summary of the discussion.
Qualcomm is working to enable remote processors on the SA8775p SoC with
a Linux host running at EL2. In doing so, it has encountered several
challenges related to how the remoteproc framework is handled when Linux
runs at EL1.
One of the main challenges arises from differences in how IOMMU
translation is currently managed on SoCs running the Qualcomm EL2
hypervisor (QHEE), where IOMMU translation for any device is entirely
owned by the hypervisor. Additionally, the firmware for remote
processors does not contain a resource table, which would typically
include the necessary IOMMU configuration settings.
Qualcomm SoCs running with QHEE (EL2) have been utilizing the Peripheral
Authentication Service (PAS) from TrustZone (TZ) firmware to securely
authenticate and reset remote processors via a single SMC call,
_auth_and_reset_. This call is first trapped by QHEE, which then invokes
TZ for authentication. Once authentication is complete, the call returns
to QHEE, which sets up the IOMMU translation scheme for the remote
processors and subsequently brings them out of reset. The design of the
Qualcomm EL2 hypervisor dictates that the Linux host OS running at EL1
is not permitted to configure IOMMU translation for remote processors,
and only a single-stage translation is configured.
To make the remote processor bring-up (PAS) sequence
hypervisor-independent, the auth_and_reset SMC call is now handled
entirely by TZ. However, the issue of IOMMU configuration remains
unresolved, for example a scenario, when KVM host at EL2 has no
knowledge of the remote processors’ IOMMU settings. This is being
addressed by overlaying the IOMMU properties when the SoC runs a Linux
host at EL2. SMC call is being provided from the TrustZone firmware to
retrieve the resource table for a given subsystem.
There are also remote processors such as those for video, camera, and
graphics that do not use the remoteproc framework to manage their
lifecycle. Instead, they rely on the Qualcomm PAS service to
authenticate their firmware. These processors also need to be brought
out of reset when Linux is running at EL2. The client drivers for these
processors use the MDT loader function to load and authenticate
firmware. Similar to the Qualcomm remoteproc PAS driver, they also need
to retrieve the resource table, create a shared memory bridge
(shmbridge), and map the resources before bringing the processors out of
reset.
It is based on next-20251120 and tested on SA8775p which is now called
Lemans IOT platform and does not addresses DMA problem discussed at
[1] which is future scope of the series.
Changes in v8: https://lore.kernel.org/lkml/20251113-kvm-rproc-v7-v7-0-df4910b7c20a@oss.qualcomm.com/
- Addressed suggestion from Stephen which was regarding commit message(9/14),
debug log(12/14) suggestion, and return type change(4/14).
- Added R-b tag on 10/14 .
Changes in v7: https://lore.kernel.org/lkml/20251104-kvm_rproc_v6-v6-0-7017b0adc24e@oss.qualcomm.com/
- Addressed Bryan suggestion to modify commit message on 2/14 .
- Repharsed commit message based on Krzysztof comment made on 1/14.
- Addressed Konrad suggestion
o To remove pas metadata data structure.
o Added his suggestion on adding retry in rsc_table SCM call.
o Added his rephrased version of comment made in 12/14
Changes in v6: https://lore.kernel.org/lkml/20251013-kvm_rprocv5-v5-0-d609ed766061@oss.qualcomm.com/
- Added comments made by Bryan to save some cycles and added in 2/14
which could change patch order.
- Renamed qcom_scm_pas_context_init to devm_qcom_scm_pas_context_init()
- Replaced devm_kzalloc with kzalloc for output_rt in scm function as
remoteproc framework does not usage devm_ api for resource table
pointer which is cause mem-abort issue start/stop test.
- Removed union usage and redundant code from qcom_scm_pas_prep_and_init_image().
Changes in v5: https://lore.kernel.org/lkml/20251007-kvm_rprocv4_next-20251007-v4-0-de841623af3c@oss.qualcomm.com/
- Replaced minitems with maxitems.
- Addressed comments made by Bryan, Mani and Konrad.
- Fixed some of highlighted issues in v4.
- Added a new patch which removes qcom_mdt_pas_init() from exported
symbol list.
- Slight change in v4's 5/12, so that it does use qcom_mdt_pas_load()
directly while it should use in the commit where it gets introduced.
Hence, reordered the patches a bit like v4 5/12 comes early before
4/12.
Changes in v4: https://lore.kernel.org/lkml/20250921-kvm_rproc_pas-v3-0-458f09647920@oss.qualcomm.com/
- Fixed kernel robot warning/errors.
- Reworded some of the commit log, code comment as per suggestion from Bryan.
- Added support of gpdsp0 and gpdsp1 and disabled iris node.
- Add R-b tag to some of the reviewed patches.
- Rename struct qcom_scm_pas_cxt to qcom_scm_pas_context.
Changes in v3: https://lore.kernel.org/lkml/20250819165447.4149674-1-mukesh.ojha@oss.qualcomm.com/
- Dropped video subsystem enablement for now, could add it in future
or on a separate series.
- Addressed most of the suggestion from Stephen and Bryan like some
remoteproc code checking resource table presence or right error
code propagation above the layer.
- Added leman-el2 overlay file.
- Added missed iommus binding which was missed last series.
- Separated qcom_mdt_pas_load() patch and its usage.
- Patch numbering got changed compared to last version
Changes in v2: https://lore.kernel.org/lkml/20241004212359.2263502-1-quic_mojha@quicinc.com/
- A lot has changed from the V1 and a fresh look would be preferred.
- Removed approach where device tree contain devmem resources in
remoteproc node.
- SHMbridge need to created for both carveout and metadata memory
shared to TZ in a new way.
- Now, resource table would be given by SMC call which need to mapped
along with carveout before triggering _auth_and_reset_.
- IOMMU properties need to be added to firmware devices tree node when Linux
control IOMMU.
---
Mukesh Ojha (14):
dt-bindings: remoteproc: qcom,pas: Add iommus property
firmware: qcom_scm: Remove redundant piece of code
firmware: qcom_scm: Rename peripheral as pas_id
firmware: qcom_scm: Introduce PAS context initialization helper function
remoteproc: pas: Replace metadata context with PAS context structure
soc: qcom: mdtloader: Add PAS context aware qcom_mdt_pas_load() function
soc: qcom: mdtloader: Remove qcom_mdt_pas_init() from exported symbols
firmware: qcom_scm: Add a prep version of auth_and_reset function
firmware: qcom_scm: Refactor qcom_scm_pas_init_image()
firmware: qcom_scm: Add SHM bridge handling for PAS when running without QHEE
firmware: qcom_scm: Add qcom_scm_pas_get_rsc_table() to get resource table
remoteproc: pas: Extend parse_fw callback to fetch resources via SMC call
remoteproc: qcom: pas: Enable Secure PAS support with IOMMU managed by Linux
arm64: dts: qcom: Add EL2 overlay for Lemans
.../bindings/remoteproc/qcom,pas-common.yaml | 3 +
arch/arm64/boot/dts/qcom/Makefile | 10 +
arch/arm64/boot/dts/qcom/lemans-el2.dtso | 41 +++
drivers/firmware/qcom/qcom_scm.c | 368 ++++++++++++++++++---
drivers/firmware/qcom/qcom_scm.h | 1 +
drivers/remoteproc/qcom_q6v5_pas.c | 166 ++++++++--
drivers/soc/qcom/mdt_loader.c | 42 ++-
include/linux/firmware/qcom/qcom_scm.h | 30 +-
include/linux/soc/qcom/mdt_loader.h | 22 +-
9 files changed, 577 insertions(+), 106 deletions(-)
---
base-commit: 88cbd8ac379cf5ce68b7efcfd4d1484a6871ee0b
change-id: 20251121-kvm_rproc_v8-5618000321fb
Best regards,
--
-Mukesh Ojha
On 21/11/2025 11:01, Mukesh Ojha wrote: > In May 2025, we discussed the challenges at Linaro Connect 2025 [1] > related to Secure PAS remoteproc enablement when Linux is running at EL2 > for Qualcomm SoCs. > > [1] https://resources.linaro.org/en/resource/sF8jXifdb9V1mUefdbfafa > > Below, is the summary of the discussion. > > Qualcomm is working to enable remote processors on the SA8775p SoC with > a Linux host running at EL2. In doing so, it has encountered several > challenges related to how the remoteproc framework is handled when Linux > runs at EL1. > > One of the main challenges arises from differences in how IOMMU > translation is currently managed on SoCs running the Qualcomm EL2 > hypervisor (QHEE), where IOMMU translation for any device is entirely > owned by the hypervisor. Additionally, the firmware for remote > processors does not contain a resource table, which would typically > include the necessary IOMMU configuration settings. > > Qualcomm SoCs running with QHEE (EL2) have been utilizing the Peripheral > Authentication Service (PAS) from TrustZone (TZ) firmware to securely > authenticate and reset remote processors via a single SMC call, > _auth_and_reset_. This call is first trapped by QHEE, which then invokes > TZ for authentication. Once authentication is complete, the call returns > to QHEE, which sets up the IOMMU translation scheme for the remote > processors and subsequently brings them out of reset. The design of the > Qualcomm EL2 hypervisor dictates that the Linux host OS running at EL1 > is not permitted to configure IOMMU translation for remote processors, > and only a single-stage translation is configured. > > To make the remote processor bring-up (PAS) sequence > hypervisor-independent, the auth_and_reset SMC call is now handled > entirely by TZ. However, the issue of IOMMU configuration remains > unresolved, for example a scenario, when KVM host at EL2 has no > knowledge of the remote processors’ IOMMU settings. This is being > addressed by overlaying the IOMMU properties when the SoC runs a Linux > host at EL2. SMC call is being provided from the TrustZone firmware to > retrieve the resource table for a given subsystem. > > There are also remote processors such as those for video, camera, and > graphics that do not use the remoteproc framework to manage their > lifecycle. Instead, they rely on the Qualcomm PAS service to > authenticate their firmware. These processors also need to be brought > out of reset when Linux is running at EL2. The client drivers for these > processors use the MDT loader function to load and authenticate > firmware. Similar to the Qualcomm remoteproc PAS driver, they also need > to retrieve the resource table, create a shared memory bridge > (shmbridge), and map the resources before bringing the processors out of > reset. > > It is based on next-20251120 and tested on SA8775p which is now called > Lemans IOT platform and does not addresses DMA problem discussed at > [1] which is future scope of the series. > > Changes in v8: https://lore.kernel.org/lkml/20251113-kvm-rproc-v7-v7-0-df4910b7c20a@oss.qualcomm.com/ > - Addressed suggestion from Stephen which was regarding commit message(9/14), > debug log(12/14) suggestion, and return type change(4/14). > - Added R-b tag on 10/14 . Sorry. Did we actually come up with a cogent reason to omit the video firmware loading here ? AFAIU it is required for Lemans and Glymur - leaving it out is blocking getting video stuff done and storing up trouble. What exactly is the blockage - is it something you want help with ? --- bod
On Fri, Nov 21, 2025 at 11:27:57AM +0000, Bryan O'Donoghue wrote: > On 21/11/2025 11:01, Mukesh Ojha wrote: > > In May 2025, we discussed the challenges at Linaro Connect 2025 [1] > > related to Secure PAS remoteproc enablement when Linux is running at EL2 > > for Qualcomm SoCs. > > > > [1] https://resources.linaro.org/en/resource/sF8jXifdb9V1mUefdbfafa > > > > Below, is the summary of the discussion. > > > > Qualcomm is working to enable remote processors on the SA8775p SoC with > > a Linux host running at EL2. In doing so, it has encountered several > > challenges related to how the remoteproc framework is handled when Linux > > runs at EL1. > > > > One of the main challenges arises from differences in how IOMMU > > translation is currently managed on SoCs running the Qualcomm EL2 > > hypervisor (QHEE), where IOMMU translation for any device is entirely > > owned by the hypervisor. Additionally, the firmware for remote > > processors does not contain a resource table, which would typically > > include the necessary IOMMU configuration settings. > > > > Qualcomm SoCs running with QHEE (EL2) have been utilizing the Peripheral > > Authentication Service (PAS) from TrustZone (TZ) firmware to securely > > authenticate and reset remote processors via a single SMC call, > > _auth_and_reset_. This call is first trapped by QHEE, which then invokes > > TZ for authentication. Once authentication is complete, the call returns > > to QHEE, which sets up the IOMMU translation scheme for the remote > > processors and subsequently brings them out of reset. The design of the > > Qualcomm EL2 hypervisor dictates that the Linux host OS running at EL1 > > is not permitted to configure IOMMU translation for remote processors, > > and only a single-stage translation is configured. > > > > To make the remote processor bring-up (PAS) sequence > > hypervisor-independent, the auth_and_reset SMC call is now handled > > entirely by TZ. However, the issue of IOMMU configuration remains > > unresolved, for example a scenario, when KVM host at EL2 has no > > knowledge of the remote processors’ IOMMU settings. This is being > > addressed by overlaying the IOMMU properties when the SoC runs a Linux > > host at EL2. SMC call is being provided from the TrustZone firmware to > > retrieve the resource table for a given subsystem. > > > > There are also remote processors such as those for video, camera, and > > graphics that do not use the remoteproc framework to manage their > > lifecycle. Instead, they rely on the Qualcomm PAS service to > > authenticate their firmware. These processors also need to be brought > > out of reset when Linux is running at EL2. The client drivers for these > > processors use the MDT loader function to load and authenticate > > firmware. Similar to the Qualcomm remoteproc PAS driver, they also need > > to retrieve the resource table, create a shared memory bridge > > (shmbridge), and map the resources before bringing the processors out of > > reset. > > > > It is based on next-20251120 and tested on SA8775p which is now called > > Lemans IOT platform and does not addresses DMA problem discussed at > > [1] which is future scope of the series. > > > > Changes in v8: https://lore.kernel.org/lkml/20251113-kvm-rproc-v7-v7-0-df4910b7c20a@oss.qualcomm.com/ > > - Addressed suggestion from Stephen which was regarding commit message(9/14), > > debug log(12/14) suggestion, and return type change(4/14). > > - Added R-b tag on 10/14 . > Sorry. > > Did we actually come up with a cogent reason to omit the video firmware > loading here ? > > AFAIU it is required for Lemans and Glymur - leaving it out is blocking > getting video stuff done and storing up trouble. > > What exactly is the blockage - is it something you want help with ? I replied to you here[1] and given my reason..till something concluded on "multi-cell IOMMU[2]", I can not add video and block what is working already. [1] https://lore.kernel.org/lkml/20251105081421.f6j7ks5bd4dfgr67@hu-mojha-hyd.qualcomm.com/ [2] https://lore.kernel.org/lkml/cover.1762235099.git.charan.kalla@oss.qualcomm.com/ > > --- > bod -- -Mukesh Ojha
On 21/11/2025 11:37, Mukesh Ojha wrote:
>> Sorry.
>>
>> Did we actually come up with a cogent reason to omit the video firmware
>> loading here ?
>>
>> AFAIU it is required for Lemans and Glymur - leaving it out is blocking
>> getting video stuff done and storing up trouble.
>>
>> What exactly is the blockage - is it something you want help with ?
> I replied to you here[1] and given my reason..till something concluded on
> "multi-cell IOMMU[2]", I can not add video and block what is working
> already.
>
> [1]
> https://lore.kernel.org/lkml/20251105081421.f6j7ks5bd4dfgr67@hu-mojha-
> hyd.qualcomm.com/
Why though ?
You are mixing together the issue of multiple SIDs and the original
loading of firmware which could easily reuse the venus method of
&iris {
video-firmware {
iommus = <&apss_smmu hex>;
};
};
That binding got dropped because it was unused in Iris.
https://lore.kernel.org/lkml/05d40a3b-cc13-b704-cac7-0ecbeea0e59d@quicinc.com/
I still fail to see why we are waiting for multi-cell IOMMU to land,
when it is expected to and what the VPU enablement story is upstream in
the meantime.
Blocked it seems.
---
bod
On 11/21/25 12:37 PM, Mukesh Ojha wrote: > On Fri, Nov 21, 2025 at 11:27:57AM +0000, Bryan O'Donoghue wrote: >> On 21/11/2025 11:01, Mukesh Ojha wrote: >>> In May 2025, we discussed the challenges at Linaro Connect 2025 [1] >>> related to Secure PAS remoteproc enablement when Linux is running at EL2 >>> for Qualcomm SoCs. >>> >>> [1] https://resources.linaro.org/en/resource/sF8jXifdb9V1mUefdbfafa >>> >>> Below, is the summary of the discussion. >>> >>> Qualcomm is working to enable remote processors on the SA8775p SoC with >>> a Linux host running at EL2. In doing so, it has encountered several >>> challenges related to how the remoteproc framework is handled when Linux >>> runs at EL1. >>> >>> One of the main challenges arises from differences in how IOMMU >>> translation is currently managed on SoCs running the Qualcomm EL2 >>> hypervisor (QHEE), where IOMMU translation for any device is entirely >>> owned by the hypervisor. Additionally, the firmware for remote >>> processors does not contain a resource table, which would typically >>> include the necessary IOMMU configuration settings. >>> >>> Qualcomm SoCs running with QHEE (EL2) have been utilizing the Peripheral >>> Authentication Service (PAS) from TrustZone (TZ) firmware to securely >>> authenticate and reset remote processors via a single SMC call, >>> _auth_and_reset_. This call is first trapped by QHEE, which then invokes >>> TZ for authentication. Once authentication is complete, the call returns >>> to QHEE, which sets up the IOMMU translation scheme for the remote >>> processors and subsequently brings them out of reset. The design of the >>> Qualcomm EL2 hypervisor dictates that the Linux host OS running at EL1 >>> is not permitted to configure IOMMU translation for remote processors, >>> and only a single-stage translation is configured. >>> >>> To make the remote processor bring-up (PAS) sequence >>> hypervisor-independent, the auth_and_reset SMC call is now handled >>> entirely by TZ. However, the issue of IOMMU configuration remains >>> unresolved, for example a scenario, when KVM host at EL2 has no >>> knowledge of the remote processors’ IOMMU settings. This is being >>> addressed by overlaying the IOMMU properties when the SoC runs a Linux >>> host at EL2. SMC call is being provided from the TrustZone firmware to >>> retrieve the resource table for a given subsystem. >>> >>> There are also remote processors such as those for video, camera, and >>> graphics that do not use the remoteproc framework to manage their >>> lifecycle. Instead, they rely on the Qualcomm PAS service to >>> authenticate their firmware. These processors also need to be brought >>> out of reset when Linux is running at EL2. The client drivers for these >>> processors use the MDT loader function to load and authenticate >>> firmware. Similar to the Qualcomm remoteproc PAS driver, they also need >>> to retrieve the resource table, create a shared memory bridge >>> (shmbridge), and map the resources before bringing the processors out of >>> reset. >>> >>> It is based on next-20251120 and tested on SA8775p which is now called >>> Lemans IOT platform and does not addresses DMA problem discussed at >>> [1] which is future scope of the series. >>> >>> Changes in v8: https://lore.kernel.org/lkml/20251113-kvm-rproc-v7-v7-0-df4910b7c20a@oss.qualcomm.com/ >>> - Addressed suggestion from Stephen which was regarding commit message(9/14), >>> debug log(12/14) suggestion, and return type change(4/14). >>> - Added R-b tag on 10/14 . >> Sorry. >> >> Did we actually come up with a cogent reason to omit the video firmware >> loading here ? >> >> AFAIU it is required for Lemans and Glymur - leaving it out is blocking >> getting video stuff done and storing up trouble. >> >> What exactly is the blockage - is it something you want help with ? > > I replied to you here[1] and given my reason..till something concluded on > "multi-cell IOMMU[2]", I can not add video and block what is working > already. > > [1] > https://lore.kernel.org/lkml/20251105081421.f6j7ks5bd4dfgr67@hu-mojha-hyd.qualcomm.com/ > > [2] > https://lore.kernel.org/lkml/cover.1762235099.git.charan.kalla@oss.qualcomm.com/ I see that the following files call qcom_scm_pas_auth_.*(): drivers/firmware/qcom/qcom_scm.c drivers/gpu/drm/msm/adreno/adreno_gpu.c drivers/media/platform/qcom/iris/iris_firmware.c drivers/media/platform/qcom/venus/firmware.c drivers/net/ipa/ipa_main.c drivers/net/wireless/ath/ath12k/ahb.c drivers/remoteproc/qcom_q6v5_pas.c drivers/remoteproc/qcom_wcnss.c iris is difficult, rproc is done, adreno doesn't need it.. would ath12k_ahb or IPA be affected by this series as well? Konrad
On Fri, Nov 21, 2025 at 04:08:36PM +0100, Konrad Dybcio wrote: > On 11/21/25 12:37 PM, Mukesh Ojha wrote: > > On Fri, Nov 21, 2025 at 11:27:57AM +0000, Bryan O'Donoghue wrote: > >> On 21/11/2025 11:01, Mukesh Ojha wrote: > >>> In May 2025, we discussed the challenges at Linaro Connect 2025 [1] > >>> related to Secure PAS remoteproc enablement when Linux is running at EL2 > >>> for Qualcomm SoCs. > >>> > >>> [1] https://resources.linaro.org/en/resource/sF8jXifdb9V1mUefdbfafa > >>> > >>> Below, is the summary of the discussion. > >>> > >>> Qualcomm is working to enable remote processors on the SA8775p SoC with > >>> a Linux host running at EL2. In doing so, it has encountered several > >>> challenges related to how the remoteproc framework is handled when Linux > >>> runs at EL1. > >>> > >>> One of the main challenges arises from differences in how IOMMU > >>> translation is currently managed on SoCs running the Qualcomm EL2 > >>> hypervisor (QHEE), where IOMMU translation for any device is entirely > >>> owned by the hypervisor. Additionally, the firmware for remote > >>> processors does not contain a resource table, which would typically > >>> include the necessary IOMMU configuration settings. > >>> > >>> Qualcomm SoCs running with QHEE (EL2) have been utilizing the Peripheral > >>> Authentication Service (PAS) from TrustZone (TZ) firmware to securely > >>> authenticate and reset remote processors via a single SMC call, > >>> _auth_and_reset_. This call is first trapped by QHEE, which then invokes > >>> TZ for authentication. Once authentication is complete, the call returns > >>> to QHEE, which sets up the IOMMU translation scheme for the remote > >>> processors and subsequently brings them out of reset. The design of the > >>> Qualcomm EL2 hypervisor dictates that the Linux host OS running at EL1 > >>> is not permitted to configure IOMMU translation for remote processors, > >>> and only a single-stage translation is configured. > >>> > >>> To make the remote processor bring-up (PAS) sequence > >>> hypervisor-independent, the auth_and_reset SMC call is now handled > >>> entirely by TZ. However, the issue of IOMMU configuration remains > >>> unresolved, for example a scenario, when KVM host at EL2 has no > >>> knowledge of the remote processors’ IOMMU settings. This is being > >>> addressed by overlaying the IOMMU properties when the SoC runs a Linux > >>> host at EL2. SMC call is being provided from the TrustZone firmware to > >>> retrieve the resource table for a given subsystem. > >>> > >>> There are also remote processors such as those for video, camera, and > >>> graphics that do not use the remoteproc framework to manage their > >>> lifecycle. Instead, they rely on the Qualcomm PAS service to > >>> authenticate their firmware. These processors also need to be brought > >>> out of reset when Linux is running at EL2. The client drivers for these > >>> processors use the MDT loader function to load and authenticate > >>> firmware. Similar to the Qualcomm remoteproc PAS driver, they also need > >>> to retrieve the resource table, create a shared memory bridge > >>> (shmbridge), and map the resources before bringing the processors out of > >>> reset. > >>> > >>> It is based on next-20251120 and tested on SA8775p which is now called > >>> Lemans IOT platform and does not addresses DMA problem discussed at > >>> [1] which is future scope of the series. > >>> > >>> Changes in v8: https://lore.kernel.org/lkml/20251113-kvm-rproc-v7-v7-0-df4910b7c20a@oss.qualcomm.com/ > >>> - Addressed suggestion from Stephen which was regarding commit message(9/14), > >>> debug log(12/14) suggestion, and return type change(4/14). > >>> - Added R-b tag on 10/14 . > >> Sorry. > >> > >> Did we actually come up with a cogent reason to omit the video firmware > >> loading here ? > >> > >> AFAIU it is required for Lemans and Glymur - leaving it out is blocking > >> getting video stuff done and storing up trouble. > >> > >> What exactly is the blockage - is it something you want help with ? > > > > I replied to you here[1] and given my reason..till something concluded on > > "multi-cell IOMMU[2]", I can not add video and block what is working > > already. > > > > [1] > > https://lore.kernel.org/lkml/20251105081421.f6j7ks5bd4dfgr67@hu-mojha-hyd.qualcomm.com/ > > > > [2] > > https://lore.kernel.org/lkml/cover.1762235099.git.charan.kalla@oss.qualcomm.com/ > > I see that the following files call qcom_scm_pas_auth_.*(): > > drivers/firmware/qcom/qcom_scm.c > drivers/gpu/drm/msm/adreno/adreno_gpu.c > drivers/media/platform/qcom/iris/iris_firmware.c > drivers/media/platform/qcom/venus/firmware.c > drivers/net/ipa/ipa_main.c > drivers/net/wireless/ath/ath12k/ahb.c > drivers/remoteproc/qcom_q6v5_pas.c > drivers/remoteproc/qcom_wcnss.c > > iris is difficult, rproc is done, adreno doesn't need it.. > > would ath12k_ahb or IPA be affected by this series as well? Yes, they would be affected, and the modem as well, when Linux is running at EL2. However, I do not see them present in any of the QLi and targeted compute SoCs at the moment. Therefore, our firmware does not support it yet. > > Konrad -- -Mukesh Ojha
On 11/24/25 7:45 AM, Mukesh Ojha wrote: > On Fri, Nov 21, 2025 at 04:08:36PM +0100, Konrad Dybcio wrote: >> On 11/21/25 12:37 PM, Mukesh Ojha wrote: >>> On Fri, Nov 21, 2025 at 11:27:57AM +0000, Bryan O'Donoghue wrote: >>>> On 21/11/2025 11:01, Mukesh Ojha wrote: >>>>> In May 2025, we discussed the challenges at Linaro Connect 2025 [1] >>>>> related to Secure PAS remoteproc enablement when Linux is running at EL2 >>>>> for Qualcomm SoCs. >>>>> >>>>> [1] https://resources.linaro.org/en/resource/sF8jXifdb9V1mUefdbfafa >>>>> >>>>> Below, is the summary of the discussion. >>>>> >>>>> Qualcomm is working to enable remote processors on the SA8775p SoC with >>>>> a Linux host running at EL2. In doing so, it has encountered several >>>>> challenges related to how the remoteproc framework is handled when Linux >>>>> runs at EL1. >>>>> >>>>> One of the main challenges arises from differences in how IOMMU >>>>> translation is currently managed on SoCs running the Qualcomm EL2 >>>>> hypervisor (QHEE), where IOMMU translation for any device is entirely >>>>> owned by the hypervisor. Additionally, the firmware for remote >>>>> processors does not contain a resource table, which would typically >>>>> include the necessary IOMMU configuration settings. >>>>> >>>>> Qualcomm SoCs running with QHEE (EL2) have been utilizing the Peripheral >>>>> Authentication Service (PAS) from TrustZone (TZ) firmware to securely >>>>> authenticate and reset remote processors via a single SMC call, >>>>> _auth_and_reset_. This call is first trapped by QHEE, which then invokes >>>>> TZ for authentication. Once authentication is complete, the call returns >>>>> to QHEE, which sets up the IOMMU translation scheme for the remote >>>>> processors and subsequently brings them out of reset. The design of the >>>>> Qualcomm EL2 hypervisor dictates that the Linux host OS running at EL1 >>>>> is not permitted to configure IOMMU translation for remote processors, >>>>> and only a single-stage translation is configured. >>>>> >>>>> To make the remote processor bring-up (PAS) sequence >>>>> hypervisor-independent, the auth_and_reset SMC call is now handled >>>>> entirely by TZ. However, the issue of IOMMU configuration remains >>>>> unresolved, for example a scenario, when KVM host at EL2 has no >>>>> knowledge of the remote processors’ IOMMU settings. This is being >>>>> addressed by overlaying the IOMMU properties when the SoC runs a Linux >>>>> host at EL2. SMC call is being provided from the TrustZone firmware to >>>>> retrieve the resource table for a given subsystem. >>>>> >>>>> There are also remote processors such as those for video, camera, and >>>>> graphics that do not use the remoteproc framework to manage their >>>>> lifecycle. Instead, they rely on the Qualcomm PAS service to >>>>> authenticate their firmware. These processors also need to be brought >>>>> out of reset when Linux is running at EL2. The client drivers for these >>>>> processors use the MDT loader function to load and authenticate >>>>> firmware. Similar to the Qualcomm remoteproc PAS driver, they also need >>>>> to retrieve the resource table, create a shared memory bridge >>>>> (shmbridge), and map the resources before bringing the processors out of >>>>> reset. >>>>> >>>>> It is based on next-20251120 and tested on SA8775p which is now called >>>>> Lemans IOT platform and does not addresses DMA problem discussed at >>>>> [1] which is future scope of the series. >>>>> >>>>> Changes in v8: https://lore.kernel.org/lkml/20251113-kvm-rproc-v7-v7-0-df4910b7c20a@oss.qualcomm.com/ >>>>> - Addressed suggestion from Stephen which was regarding commit message(9/14), >>>>> debug log(12/14) suggestion, and return type change(4/14). >>>>> - Added R-b tag on 10/14 . >>>> Sorry. >>>> >>>> Did we actually come up with a cogent reason to omit the video firmware >>>> loading here ? >>>> >>>> AFAIU it is required for Lemans and Glymur - leaving it out is blocking >>>> getting video stuff done and storing up trouble. >>>> >>>> What exactly is the blockage - is it something you want help with ? >>> >>> I replied to you here[1] and given my reason..till something concluded on >>> "multi-cell IOMMU[2]", I can not add video and block what is working >>> already. >>> >>> [1] >>> https://lore.kernel.org/lkml/20251105081421.f6j7ks5bd4dfgr67@hu-mojha-hyd.qualcomm.com/ >>> >>> [2] >>> https://lore.kernel.org/lkml/cover.1762235099.git.charan.kalla@oss.qualcomm.com/ >> >> I see that the following files call qcom_scm_pas_auth_.*(): >> >> drivers/firmware/qcom/qcom_scm.c >> drivers/gpu/drm/msm/adreno/adreno_gpu.c >> drivers/media/platform/qcom/iris/iris_firmware.c >> drivers/media/platform/qcom/venus/firmware.c >> drivers/net/ipa/ipa_main.c >> drivers/net/wireless/ath/ath12k/ahb.c >> drivers/remoteproc/qcom_q6v5_pas.c >> drivers/remoteproc/qcom_wcnss.c >> >> iris is difficult, rproc is done, adreno doesn't need it.. >> >> would ath12k_ahb or IPA be affected by this series as well? > > Yes, they would be affected, and the modem as well, when Linux is > running at EL2. However, I do not see them present in any of the QLi and > targeted compute SoCs at the moment. Therefore, our firmware does not > support it yet. Hamoa's little brother should have ath12k_ahb.. and I assume IPA is present on at least some platforms where there's a modem (QCM6490?) Konrad
On Mon, Nov 24, 2025 at 12:33:47PM +0100, Konrad Dybcio wrote: > On 11/24/25 7:45 AM, Mukesh Ojha wrote: > > On Fri, Nov 21, 2025 at 04:08:36PM +0100, Konrad Dybcio wrote: > >> On 11/21/25 12:37 PM, Mukesh Ojha wrote: > >>> On Fri, Nov 21, 2025 at 11:27:57AM +0000, Bryan O'Donoghue wrote: > >>>> On 21/11/2025 11:01, Mukesh Ojha wrote: > >>>>> In May 2025, we discussed the challenges at Linaro Connect 2025 [1] > >>>>> related to Secure PAS remoteproc enablement when Linux is running at EL2 > >>>>> for Qualcomm SoCs. > >>>>> > >>>>> [1] https://resources.linaro.org/en/resource/sF8jXifdb9V1mUefdbfafa > >>>>> [...] > >>>>> > >>>>> Changes in v8: https://lore.kernel.org/lkml/20251113-kvm-rproc-v7-v7-0-df4910b7c20a@oss.qualcomm.com/ > >>>>> - Addressed suggestion from Stephen which was regarding commit message(9/14), > >>>>> debug log(12/14) suggestion, and return type change(4/14). > >>>>> - Added R-b tag on 10/14 . > >>>> Sorry. > >>>> > >>>> Did we actually come up with a cogent reason to omit the video firmware > >>>> loading here ? > >>>> > >>>> AFAIU it is required for Lemans and Glymur - leaving it out is blocking > >>>> getting video stuff done and storing up trouble. > >>>> > >>>> What exactly is the blockage - is it something you want help with ? > >>> > >>> I replied to you here[1] and given my reason..till something concluded on > >>> "multi-cell IOMMU[2]", I can not add video and block what is working > >>> already. > >>> > >>> [1] > >>> https://lore.kernel.org/lkml/20251105081421.f6j7ks5bd4dfgr67@hu-mojha-hyd.qualcomm.com/ > >>> > >>> [2] > >>> https://lore.kernel.org/lkml/cover.1762235099.git.charan.kalla@oss.qualcomm.com/ > >> > >> I see that the following files call qcom_scm_pas_auth_.*(): > >> > >> drivers/firmware/qcom/qcom_scm.c > >> drivers/gpu/drm/msm/adreno/adreno_gpu.c > >> drivers/media/platform/qcom/iris/iris_firmware.c > >> drivers/media/platform/qcom/venus/firmware.c > >> drivers/net/ipa/ipa_main.c > >> drivers/net/wireless/ath/ath12k/ahb.c > >> drivers/remoteproc/qcom_q6v5_pas.c > >> drivers/remoteproc/qcom_wcnss.c > >> > >> iris is difficult, rproc is done, adreno doesn't need it.. > >> > >> would ath12k_ahb or IPA be affected by this series as well? > > > > Yes, they would be affected, and the modem as well, when Linux is > > running at EL2. However, I do not see them present in any of the QLi and > > targeted compute SoCs at the moment. Therefore, our firmware does not > > support it yet. > > Hamoa's little brother should have ath12k_ahb.. and I assume IPA is > present on at least some platforms where there's a modem (QCM6490?) Sure, We will add the support for IP's when there is a need for SoC running Linux at EL2 (backed by firmware). > > Konrad -- -Mukesh Ojha
© 2016 - 2025 Red Hat, Inc.