From nobody Wed Apr 8 04:41:11 2026 Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 27CA13E8699 for ; Tue, 10 Mar 2026 20:21:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=205.220.168.131 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773174110; cv=none; b=YVaqWloPtvmLRUqTyDWi/LCWgJ8hNQZB+YWkCB5S4yjimqh+1pxL9Gzc43M/On+szB6FbwojapIX8b32J7pUa/YlEdw/pJSQJzZyFmLytY8t0BuMKX0tszcMT81GsdexOEe7R9T3z9cHpz871Qk0XVyjWr6TBoyPYm8LT3jIjMw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1773174110; c=relaxed/simple; bh=dPaYhz5WrNn4l2Exbmn17f/435P8WoEizkP3B6PTFzY=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=odfBiS0auoVbv11+o4aLByyk9I3/Sob+Lfe5cMqh0xM8yDGljXMZDaNlZgJj2QPzWgtAatajfrHgJxmJdtnllIB2U3GQROhvrGM4W49y6JG5yed10mrvlU+Eo1YWpUA9pKXEZnIxPfUREtwVMu0sFkX8SuHii7Yk4AFUUb6wsac= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com; spf=pass smtp.mailfrom=oss.qualcomm.com; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b=HQL1QpS6; dkim=pass (2048-bit key) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com header.b=EUHcgmeo; arc=none smtp.client-ip=205.220.168.131 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=oss.qualcomm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=oss.qualcomm.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=qualcomm.com header.i=@qualcomm.com header.b="HQL1QpS6"; dkim=pass (2048-bit key) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com header.b="EUHcgmeo" Received: from pps.filterd (m0279864.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 62AGAjDj1265992 for ; Tue, 10 Mar 2026 20:21:48 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=qcppdkim1; bh= VCdzm9lFxRWxv/OGB66sjGQmhg7GtSvSgtFyJmtFvU8=; b=HQL1QpS6PGBC/FZA PX4YjsgO0EBnSchfNwcBS3m6TU+NNlCLcGrQtQkorNh0FzaHM5W1qBUSH4t40Ywe rnqKPE+bKNZHgqY6cQwf4xlvZZWCp452mWOUukXFDr0W7J54/mR69MCA3ZBbLonf /r1SEgJueONA3Z83MxDPYnNQIwaW3hnRpauSnUkZh7U9UoVPrYU2J/tcDo7QurKO wSAkOiSXKoaEchsvNOOrD/jiFQaBVl6utpry/KlB+nytq6sReLZ5m7oxRucUenoE NsMcKBaLuf/yCIWvjHH7ul8NkWRIdrXIa0DVm0Olsw2A8tyt4D9vZ4VeTQZGe++R 9biJ7Q== Received: from mail-pf1-f198.google.com (mail-pf1-f198.google.com [209.85.210.198]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4ctpkfh0jx-1 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Tue, 10 Mar 2026 20:21:48 +0000 (GMT) Received: by mail-pf1-f198.google.com with SMTP id d2e1a72fcca58-829b7ed8964so2426861b3a.2 for ; Tue, 10 Mar 2026 13:21:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oss.qualcomm.com; s=google; t=1773174108; x=1773778908; darn=vger.kernel.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=VCdzm9lFxRWxv/OGB66sjGQmhg7GtSvSgtFyJmtFvU8=; b=EUHcgmeo9Mj1muhpQy5B9BiLL/WBo2xjeLfeRaVZUS4WemEJHKAc6CuEojlGuUCZP8 CX8E1Cm7Hy4fdCUgBFJ6wZj7bKYZB8t+CXjem434xZrnHu/oZAyApS4eWxldxkXelmMM 5fcD1TdqOmi6xtxWGwfPXhe1wBIGstJOGGDIR29rBJheIYsx33vkGVrnx4Bl5fZwG5sV PBBp4fzFrD3eZHRn6mSSWvsdWuXXX+UoYsq/UpioE7fDXxL5aiOfXYJhObcDWBCdbb9i ID8I0jOSGvCFaIrAumUZhjTzGlsMJ174/6tSDOl+f/tA437kZgDb7x8JK/ZZcgXhe9us zT/w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1773174108; x=1773778908; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=VCdzm9lFxRWxv/OGB66sjGQmhg7GtSvSgtFyJmtFvU8=; b=ny9sak2TkD1ZhIoAWGjb6mXsJcirWQ8FfxTxA6axL5bJ5D8Dj/8vfyONpwCvUh8F4u LTNzFElyWyTDzr2Zl0+fBorQEXs/ZKkyp7K5Tw8A93TJLymLzD8SBLlafk/G58wKCeLM k9zSjV9FcnPCsyEHd0nUp68S8qWUUui6logjkJAIgKuSJOpQyX6XXr+rk7zJdyk1uxwq o2pmKYQF76GCzLYU19v4yqQCpSxLC8EAlXPKOZ6gBEn51WoToPPYvVLRJiHwXTFAN519 Kakk+diw3nw/v5M6p/meX4sxV21JbY4Y9uvu9r/El2HE/i7AqSYHA9ZUiWguaptUZhrh HGSQ== X-Forwarded-Encrypted: i=1; AJvYcCWZLlQttQ+3yNl4kaFid+r3tiSds84sydbOG5oE7T6Pv2MxO1V3G4sfI3gt8bnFaBQLp7/iEtCq5dTsYNI=@vger.kernel.org X-Gm-Message-State: AOJu0Ywb8HczC1CxbHzlx1FP0xlxZrsHK+c7xaE1LCZfZqD0kZc1JFl2 uV/PLhlMTyhsnEV44K4NF42HZW0YSQKaHMavO0yN46W0Nbz/P7sg2VTsijlEKeKqP2HgdwGMy2y Gj7oEmnYEdNMe52Z6YsXXRgyuGT3/wmvcoCIUfq9X6EymLbrwkleLod1XnGJPw0G3y1E= X-Gm-Gg: ATEYQzwH0MjyWWSeRpHiY4jqEAEjKrt3MNSnApn71BYvUvTOjVZYD6LXYFd9nogaBHi zeNsufz67/BtBx/LrUTPMfnCidazPxoiUrswQP6hW6tNGYoEIZ9pp6xsXDJ+UY+cT+yeO57Vo/I NSbG3M0NuVta/KpxRNauuQsY9gA9pm3gv8kIoG+HWgxIZoNkWOWgAULktuh+rXpvf8qgFOpqbaI DiLLl/KWr+KJvqDxFW0qWyVqNjMt+8cs2+B2vwMZ7NHKDSCYzYc+DYpPyHgAyWG32cYfyxbw4f/ taUCKGPAuxNTeGrRu23YEjoSy7KTuQ9V3i9BXNsrpiVy24j6f6EH/YHX5/JvCgo/a3a5xrJE4lj aMIEXxs7tmwr+0i/HmNt8A5o2cVWLwfiDM9kZcJXHeipHl+X4 X-Received: by 2002:a05:6a00:4b10:b0:81f:4dfe:ddd5 with SMTP id d2e1a72fcca58-829f70733aamr147798b3a.4.1773174107380; Tue, 10 Mar 2026 13:21:47 -0700 (PDT) X-Received: by 2002:a05:6a00:4b10:b0:81f:4dfe:ddd5 with SMTP id d2e1a72fcca58-829f70733aamr147769b3a.4.1773174106642; Tue, 10 Mar 2026 13:21:46 -0700 (PDT) Received: from hu-mojha-hyd.qualcomm.com ([202.46.23.25]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-829f6dc2d0asm115262b3a.13.2026.03.10.13.21.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Mar 2026 13:21:46 -0700 (PDT) From: Mukesh Ojha Date: Wed, 11 Mar 2026 01:46:06 +0530 Subject: [PATCH v2 22/25] soc: qcom: Add minidump backend driver Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-Id: <20260311-minidump-v2-v2-22-f91cedc6f99e@oss.qualcomm.com> References: <20260311-minidump-v2-v2-0-f91cedc6f99e@oss.qualcomm.com> In-Reply-To: <20260311-minidump-v2-v2-0-f91cedc6f99e@oss.qualcomm.com> To: Jonathan Corbet , Shuah Khan , Eugen Hristev , Arnd Bergmann , Dennis Zhou , Tejun Heo , Christoph Lameter , Andrew Morton , Thomas Gleixner , Peter Zijlstra , Anna-Maria Behnsen , Frederic Weisbecker , Ingo Molnar , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Valentin Schneider , David Hildenbrand , Lorenzo Stoakes , "Liam R. Howlett" , Vlastimil Babka , Mike Rapoport , Suren Baghdasaryan , Michal Hocko , Kees Cook , Brendan Jackman , Johannes Weiner , Zi Yan , Chris Li , Kairui Song , Kemeng Shi , Nhat Pham , Baoquan He , Barry Song , Youngjun Park , Petr Mladek , John Ogness , Sergey Senozhatsky , Bjorn Andersson , Mathieu Poirier , Konrad Dybcio , Mukesh Ojha , Rob Herring , Krzysztof Kozlowski , Conor Dooley , Saravana Kannan Cc: workflows@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-arm-msm@vger.kernel.org, linux-remoteproc@vger.kernel.org, devicetree@vger.kernel.org X-Mailer: b4 0.14-dev-f7c49 X-Developer-Signature: v=1; a=ed25519-sha256; t=1773173756; l=10956; i=mukesh.ojha@oss.qualcomm.com; s=20250708; h=from:subject:message-id; bh=RDT7v6bqYk5bgglut/PG+8UNw5M1qTcxV6gcC7IX5m8=; b=6AemMMzEj5Dcxm3yu8ESj11geNVlW4Nj1GEwJAOJ9eDH9gXDzgGOuIBfr3oWn4RQBrTsomaxJ Id1S77WZvDVDh1w7OTBnW+ynij8GaYSu7aKk6/IJZndYW8gs6ezdeuh X-Developer-Key: i=mukesh.ojha@oss.qualcomm.com; a=ed25519; pk=eX8dr/7d4HJz/HEXZIpe3c+Ukopa/wZmxH+5YV3gdNc= X-Proofpoint-GUID: x9_3YhhCcPUs_Xs_oLxSWCAVi21Y0rLl X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMzEwMDE3NyBTYWx0ZWRfX9XJd2Or2PwtE lhqFFnvoEXd1b74kEZRYSJCk5LQBlqy2p34HUfYLTgum7bWNrZgbAnQb84Mw6tsYFXJ7qbLJoG/ idDvm9tae49rTYmUhXo8uG/8nnfuS41MPxYq07+mEn6tnxbPnyTbkogZuNKK1RczOzJAGV8dhqH PridSVO7k7JWFont0kxnR5mG5iQ6OgJYohq/+Ktn/km5qc1w+rKW04Y5lwybKRguv6rvVAUcZIj ZR5jcTWYr6MqNEKej+0XZkIvIrA8QdW6T3C5kOuTJz3sKnNFe6hly3arR2qPEXve01ROgdAWbyj 9QX0Nec1foeWWgk9Wp0kOUSOK7fLe6Htuq+CgkTSJw3yUL4Yfg1yOThhBnBwVzAX1Zt4MQ+rm+L S1+AbLpcwV1XOx+xR5yVoObGaPLHpfs0Uhtft6kvl1q+BvONPjiZt9iIUab2s277b5T+W7/edxm QoPtkCBBLRgB3nzaOIg== X-Proofpoint-ORIG-GUID: x9_3YhhCcPUs_Xs_oLxSWCAVi21Y0rLl X-Authority-Analysis: v=2.4 cv=Gq5PO01C c=1 sm=1 tr=0 ts=69b07d5c cx=c_pps a=m5Vt/hrsBiPMCU0y4gIsQw==:117 a=ZePRamnt/+rB5gQjfz0u9A==:17 a=IkcTkHD0fZMA:10 a=Yq5XynenixoA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22 a=u7WPNUs3qKkmUXheDGA7:22 a=DJpcGTmdVt4CTyJn9g5Z:22 a=KKAkSRfTAAAA:8 a=EUspDBNiAAAA:8 a=nZcrojPlbim1gEWq_fIA:9 a=QEXdDO2ut3YA:10 a=IoOABgeZipijB_acs4fv:22 a=cvBusfyB2V15izCimMoJ:22 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-03-10_04,2026-03-09_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 suspectscore=0 malwarescore=0 bulkscore=0 lowpriorityscore=0 spamscore=0 adultscore=0 clxscore=1015 priorityscore=1501 impostorscore=0 phishscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2602130000 definitions=main-2603100177 From: Eugen Hristev Qualcomm Minidump is a backend driver that manages the minidump shared memory table on Qualcomm platforms. It uses the meminspect table that it parses in order to obtain inspection entries from the kernel and convert them into regions. Regions are afterwards being registered into the shared memory's Minidump table of contents. Further, Qualcomm boot firmware can read the table of contents and dump the memory accordingly, as per the firmware requirements. Signed-off-by: Eugen Hristev Signed-off-by: Mukesh Ojha --- drivers/soc/qcom/Kconfig | 13 ++ drivers/soc/qcom/Makefile | 1 + drivers/soc/qcom/minidump.c | 272 ++++++++++++++++++++++++++++++++++= ++++ include/linux/soc/qcom/minidump.h | 4 + 4 files changed, 290 insertions(+) diff --git a/drivers/soc/qcom/Kconfig b/drivers/soc/qcom/Kconfig index 2caadbbcf830..be768537528e 100644 --- a/drivers/soc/qcom/Kconfig +++ b/drivers/soc/qcom/Kconfig @@ -180,6 +180,19 @@ config QCOM_SMEM The driver provides an interface to items in a heap shared among all processors in a Qualcomm platform. =20 +config QCOM_MINIDUMP + tristate "Qualcomm Minidump memory inspection driver" + depends on ARCH_QCOM || COMPILE_TEST + depends on QCOM_SMEM + help + Say y here to enable the Qualcomm Minidump memory inspection driver. + This driver uses memory inspection mechanism to register minidump + regions with the Qualcomm firmware, into the shared memory. + The registered regions are being linked into the minidump table + of contents. + Further on, the firmware will be able to read the table of contents + and extract the memory regions on case-by-case basis. + config QCOM_SMD_RPM tristate "Qualcomm Resource Power Manager (RPM) over SMD" depends on ARCH_QCOM || COMPILE_TEST diff --git a/drivers/soc/qcom/Makefile b/drivers/soc/qcom/Makefile index b7f1d2a57367..3e5a2cacccd4 100644 --- a/drivers/soc/qcom/Makefile +++ b/drivers/soc/qcom/Makefile @@ -25,6 +25,7 @@ qcom_rpmh-y +=3D rpmh.o obj-$(CONFIG_QCOM_SMD_RPM) +=3D rpm-proc.o smd-rpm.o obj-$(CONFIG_QCOM_SMEM) +=3D smem.o obj-$(CONFIG_QCOM_SMEM_STATE) +=3D smem_state.o +obj-$(CONFIG_QCOM_MINIDUMP) +=3D minidump.o CFLAGS_smp2p.o :=3D -I$(src) obj-$(CONFIG_QCOM_SMP2P) +=3D smp2p.o obj-$(CONFIG_QCOM_SMSM) +=3D smsm.o diff --git a/drivers/soc/qcom/minidump.c b/drivers/soc/qcom/minidump.c new file mode 100644 index 000000000000..8d2e5047b5d9 --- /dev/null +++ b/drivers/soc/qcom/minidump.c @@ -0,0 +1,272 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Qualcomm Minidump kernel inspect driver + * Copyright (C) 2016,2024-2025 Linaro Ltd + * Copyright (C) 2015 Sony Mobile Communications Inc + * Copyright (c) 2012-2013, The Linux Foundation. All rights reserved. + */ + +#include +#include +#include +#include +#include +#include +#include +#include +#include + +/** + * struct minidump - Minidump driver data information + * + * @dev: Minidump device struct. + * @toc: Minidump table of contents subsystem. + * @regions: Minidump regions array. + * @nb: Notifier block to register to meminspect. + */ +struct minidump { + struct device *dev; + struct minidump_subsystem *toc; + struct minidump_region *regions; + struct notifier_block nb; +}; + +static const char * const meminspect_id_to_md_string[] =3D { + "", + "ELF", + "vmcoreinfo", + "config", + "totalram", + "cpu_possible", + "cpu_present", + "cpu_online", + "cpu_active", + "mem_section", + "jiffies", + "linux_banner", + "nr_threads", + "nr_irqs", + "tainted_mask", + "taint_flags", + "node_states", + "__per_cpu_offset", + "nr_swapfiles", + "init_uts_ns", + "printk_rb_static", + "printk_rb_dynamic", + "prb", + "prb_descs", + "prb_infos", + "prb_data", + "high_memory", + "init_mm", + "init_mm_pgd", +}; + +/** + * qcom_md_table_init() - Initialize the minidump table + * @md: minidump data + * @mdss_toc: minidump subsystem table of contents + * + * Return: On success, it returns 0 and negative error value on failure. + */ +static int qcom_md_table_init(struct minidump *md, + struct minidump_subsystem *mdss_toc) +{ + md->toc =3D mdss_toc; + md->regions =3D devm_kcalloc(md->dev, MAX_NUM_REGIONS, + sizeof(*md->regions), GFP_KERNEL); + if (!md->regions) + return -ENOMEM; + + md->toc->regions_baseptr =3D cpu_to_le64(virt_to_phys(md->regions)); + md->toc->enabled =3D cpu_to_le32(MINIDUMP_SS_ENABLED); + md->toc->status =3D cpu_to_le32(1); + md->toc->region_count =3D cpu_to_le32(0); + + /* Tell bootloader not to encrypt the regions of this subsystem */ + md->toc->encryption_status =3D cpu_to_le32(MINIDUMP_SS_ENCR_DONE); + md->toc->encryption_required =3D cpu_to_le32(MINIDUMP_SS_ENCR_NOTREQ); + + return 0; +} + +/** + * qcom_md_get_region_index() - Lookup minidump region by id + * @md: minidump data + * @id: minidump region id + * + * Return: On success, it returns the internal region index, on failure, + * returns negative error value + */ +static int qcom_md_get_region_index(struct minidump *md, int id) +{ + unsigned int count =3D le32_to_cpu(md->toc->region_count); + unsigned int i; + + for (i =3D 0; i < count; i++) + if (md->regions[i].seq_num =3D=3D id) + return i; + + return -ENOENT; +} + +/** + * register_md_region() - Register a new minidump region + * @priv: private data + * @e: pointer to inspect entry + * + * Return: None + */ +static void __maybe_unused register_md_region(void *priv, + const struct inspect_entry *e) +{ + unsigned int num_region, region_cnt; + const char *name =3D "unknown"; + struct minidump_region *mdr; + struct minidump *md =3D priv; + + if (!(e->va || e->pa) || !e->size) { + dev_dbg(md->dev, "invalid region requested\n"); + return; + } + + if (e->id < ARRAY_SIZE(meminspect_id_to_md_string)) + name =3D meminspect_id_to_md_string[e->id]; + + if (qcom_md_get_region_index(md, e->id) >=3D 0) { + dev_dbg(md->dev, "%s:%d region is already registered\n", + name, e->id); + return; + } + + /* Check if there is a room for a new entry */ + num_region =3D le32_to_cpu(md->toc->region_count); + if (num_region >=3D MAX_NUM_REGIONS) { + dev_dbg(md->dev, "maximum region limit %u reached\n", + num_region); + return; + } + + region_cnt =3D le32_to_cpu(md->toc->region_count); + mdr =3D &md->regions[region_cnt]; + scnprintf(mdr->name, MAX_REGION_NAME_LENGTH, "K%.8s", name); + mdr->seq_num =3D e->id; + if (e->pa) + mdr->address =3D cpu_to_le64(e->pa); + else if (e->va) + mdr->address =3D cpu_to_le64(__pa(e->va)); + mdr->size =3D cpu_to_le64(ALIGN(e->size, 4)); + mdr->valid =3D cpu_to_le32(MINIDUMP_REGION_VALID); + region_cnt++; + md->toc->region_count =3D cpu_to_le32(region_cnt); + + dev_dbg(md->dev, "%s:%d region registered %llx:%llx\n", + mdr->name, mdr->seq_num, mdr->address, mdr->size); +} + +/** + * unregister_md_region() - Unregister a previously registered minidump re= gion + * @priv: private data + * @e: pointer to inspect entry + * + * Return: None + */ +static void __maybe_unused unregister_md_region(void *priv, + const struct inspect_entry *e) +{ + struct minidump_region *mdr; + struct minidump *md =3D priv; + unsigned int region_cnt; + unsigned int idx; + + idx =3D qcom_md_get_region_index(md, e->id); + if (idx < 0) { + dev_dbg(md->dev, "%d region is not present\n", e->id); + return; + } + + mdr =3D &md->regions[0]; + region_cnt =3D le32_to_cpu(md->toc->region_count); + + /* + * Left shift one position all the regions located after the + * region being removed, in order to fill the gap. + * Then, zero out the last region at the end. + */ + memmove(&mdr[idx], &mdr[idx + 1], (region_cnt - idx - 1) * sizeof(*mdr)); + memset(&mdr[region_cnt - 1], 0, sizeof(*mdr)); + region_cnt--; + md->toc->region_count =3D cpu_to_le32(region_cnt); +} + +static int qcom_md_notifier_cb(struct notifier_block *nb, + unsigned long code, void *entry) +{ + struct minidump *md =3D container_of(nb, struct minidump, nb); + + if (code =3D=3D MEMINSPECT_NOTIFIER_ADD) + register_md_region(md, entry); + else if (code =3D=3D MEMINSPECT_NOTIFIER_REMOVE) + unregister_md_region(md, entry); + + return 0; +} + +static int qcom_md_probe(struct platform_device *pdev) +{ + struct minidump_global_toc *mdgtoc; + struct device *dev =3D &pdev->dev; + struct minidump *md; + size_t size; + int ret; + + md =3D devm_kzalloc(dev, sizeof(*md), GFP_KERNEL); + if (!md) + return -ENOMEM; + platform_set_drvdata(pdev, md); + + md->dev =3D dev; + md->nb.notifier_call =3D qcom_md_notifier_cb; + + mdgtoc =3D qcom_smem_get(QCOM_SMEM_HOST_ANY, SBL_MINIDUMP_SMEM_ID, &size); + if (IS_ERR(mdgtoc)) { + ret =3D PTR_ERR(mdgtoc); + dev_err_probe(dev, ret, "Couldn't find minidump smem item\n"); + } + + if (size < sizeof(*mdgtoc) || !mdgtoc->status) + dev_err_probe(dev, -EINVAL, "minidump table not ready\n"); + + ret =3D qcom_md_table_init(md, &mdgtoc->subsystems[MINIDUMP_SUBSYSTEM_APS= S]); + if (ret) + dev_err_probe(dev, ret, "Could not initialize table\n"); + + meminspect_notifier_register(&md->nb); + + meminspect_lock_traverse(md, register_md_region); + return 0; +} + +static void qcom_md_remove(struct platform_device *pdev) +{ + struct minidump *md =3D platform_get_drvdata(pdev); + + meminspect_notifier_unregister(&md->nb); + meminspect_lock_traverse(md, unregister_md_region); +} + +static struct platform_driver qcom_md_driver =3D { + .probe =3D qcom_md_probe, + .remove =3D qcom_md_remove, + .driver =3D { + .name =3D "qcom-minidump", + }, +}; + +module_platform_driver(qcom_md_driver); + +MODULE_AUTHOR("Eugen Hristev "); +MODULE_AUTHOR("Mukesh Ojha "); +MODULE_DESCRIPTION("Qualcomm minidump inspect driver"); +MODULE_LICENSE("GPL"); diff --git a/include/linux/soc/qcom/minidump.h b/include/linux/soc/qcom/min= idump.h index 25247a6216e2..f90b61feb550 100644 --- a/include/linux/soc/qcom/minidump.h +++ b/include/linux/soc/qcom/minidump.h @@ -10,12 +10,16 @@ #ifndef __QCOM_MINIDUMP_H__ #define __QCOM_MINIDUMP_H__ =20 +#define MINIDUMP_SUBSYSTEM_APSS 0 #define MAX_NUM_OF_SS 10 #define MAX_REGION_NAME_LENGTH 16 #define SBL_MINIDUMP_SMEM_ID 602 #define MINIDUMP_REGION_VALID ('V' << 24 | 'A' << 16 | 'L' << 8 | 'I' << = 0) #define MINIDUMP_SS_ENCR_DONE ('D' << 24 | 'O' << 16 | 'N' << 8 | 'E' << = 0) +#define MINIDUMP_SS_ENCR_NOTREQ (0 << 24 | 0 << 16 | 'N' << 8 | 'R' << 0) #define MINIDUMP_SS_ENABLED ('E' << 24 | 'N' << 16 | 'B' << 8 | 'L' << 0) +#define MAX_NUM_REGIONS 201 + =20 /** * struct minidump_region - Minidump region --=20 2.50.1