bmi.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518
  1. // SPDX-License-Identifier: ISC
  2. /*
  3. * Copyright (c) 2005-2011 Atheros Communications Inc.
  4. * Copyright (c) 2011-2014,2016-2017 Qualcomm Atheros, Inc.
  5. */
  6. #include "bmi.h"
  7. #include "hif.h"
  8. #include "debug.h"
  9. #include "htc.h"
  10. #include "hw.h"
  11. void ath10k_bmi_start(struct ath10k *ar)
  12. {
  13. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi start\n");
  14. ar->bmi.done_sent = false;
  15. }
  16. EXPORT_SYMBOL(ath10k_bmi_start);
  17. int ath10k_bmi_done(struct ath10k *ar)
  18. {
  19. struct bmi_cmd cmd;
  20. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.done);
  21. int ret;
  22. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi done\n");
  23. if (ar->bmi.done_sent) {
  24. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi skipped\n");
  25. return 0;
  26. }
  27. ar->bmi.done_sent = true;
  28. cmd.id = __cpu_to_le32(BMI_DONE);
  29. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, NULL, NULL);
  30. if (ret) {
  31. ath10k_warn(ar, "unable to write to the device: %d\n", ret);
  32. return ret;
  33. }
  34. return 0;
  35. }
  36. int ath10k_bmi_get_target_info(struct ath10k *ar,
  37. struct bmi_target_info *target_info)
  38. {
  39. struct bmi_cmd cmd;
  40. union bmi_resp resp;
  41. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.get_target_info);
  42. u32 resplen = sizeof(resp.get_target_info);
  43. int ret;
  44. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi get target info\n");
  45. if (ar->bmi.done_sent) {
  46. ath10k_warn(ar, "BMI Get Target Info Command disallowed\n");
  47. return -EBUSY;
  48. }
  49. cmd.id = __cpu_to_le32(BMI_GET_TARGET_INFO);
  50. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, &resp, &resplen);
  51. if (ret) {
  52. ath10k_warn(ar, "unable to get target info from device\n");
  53. return ret;
  54. }
  55. if (resplen < sizeof(resp.get_target_info)) {
  56. ath10k_warn(ar, "invalid get_target_info response length (%d)\n",
  57. resplen);
  58. return -EIO;
  59. }
  60. target_info->version = __le32_to_cpu(resp.get_target_info.version);
  61. target_info->type = __le32_to_cpu(resp.get_target_info.type);
  62. return 0;
  63. }
  64. #define TARGET_VERSION_SENTINAL 0xffffffffu
  65. int ath10k_bmi_get_target_info_sdio(struct ath10k *ar,
  66. struct bmi_target_info *target_info)
  67. {
  68. struct bmi_cmd cmd;
  69. union bmi_resp resp;
  70. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.get_target_info);
  71. u32 resplen, ver_len;
  72. __le32 tmp;
  73. int ret;
  74. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi get target info SDIO\n");
  75. if (ar->bmi.done_sent) {
  76. ath10k_warn(ar, "BMI Get Target Info Command disallowed\n");
  77. return -EBUSY;
  78. }
  79. cmd.id = __cpu_to_le32(BMI_GET_TARGET_INFO);
  80. /* Step 1: Read 4 bytes of the target info and check if it is
  81. * the special sentinel version word or the first word in the
  82. * version response.
  83. */
  84. resplen = sizeof(u32);
  85. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, &tmp, &resplen);
  86. if (ret) {
  87. ath10k_warn(ar, "unable to read from device\n");
  88. return ret;
  89. }
  90. /* Some SDIO boards have a special sentinel byte before the real
  91. * version response.
  92. */
  93. if (__le32_to_cpu(tmp) == TARGET_VERSION_SENTINAL) {
  94. /* Step 1b: Read the version length */
  95. resplen = sizeof(u32);
  96. ret = ath10k_hif_exchange_bmi_msg(ar, NULL, 0, &tmp,
  97. &resplen);
  98. if (ret) {
  99. ath10k_warn(ar, "unable to read from device\n");
  100. return ret;
  101. }
  102. }
  103. ver_len = __le32_to_cpu(tmp);
  104. /* Step 2: Check the target info length */
  105. if (ver_len != sizeof(resp.get_target_info)) {
  106. ath10k_warn(ar, "Unexpected target info len: %u. Expected: %zu\n",
  107. ver_len, sizeof(resp.get_target_info));
  108. return -EINVAL;
  109. }
  110. /* Step 3: Read the rest of the version response */
  111. resplen = sizeof(resp.get_target_info) - sizeof(u32);
  112. ret = ath10k_hif_exchange_bmi_msg(ar, NULL, 0,
  113. &resp.get_target_info.version,
  114. &resplen);
  115. if (ret) {
  116. ath10k_warn(ar, "unable to read from device\n");
  117. return ret;
  118. }
  119. target_info->version = __le32_to_cpu(resp.get_target_info.version);
  120. target_info->type = __le32_to_cpu(resp.get_target_info.type);
  121. return 0;
  122. }
  123. int ath10k_bmi_read_memory(struct ath10k *ar,
  124. u32 address, void *buffer, u32 length)
  125. {
  126. struct bmi_cmd cmd;
  127. union bmi_resp resp;
  128. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.read_mem);
  129. u32 rxlen;
  130. int ret;
  131. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi read address 0x%x length %d\n",
  132. address, length);
  133. if (ar->bmi.done_sent) {
  134. ath10k_warn(ar, "command disallowed\n");
  135. return -EBUSY;
  136. }
  137. while (length) {
  138. rxlen = min_t(u32, length, BMI_MAX_DATA_SIZE);
  139. cmd.id = __cpu_to_le32(BMI_READ_MEMORY);
  140. cmd.read_mem.addr = __cpu_to_le32(address);
  141. cmd.read_mem.len = __cpu_to_le32(rxlen);
  142. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen,
  143. &resp, &rxlen);
  144. if (ret) {
  145. ath10k_warn(ar, "unable to read from the device (%d)\n",
  146. ret);
  147. return ret;
  148. }
  149. memcpy(buffer, resp.read_mem.payload, rxlen);
  150. address += rxlen;
  151. buffer += rxlen;
  152. length -= rxlen;
  153. }
  154. return 0;
  155. }
  156. EXPORT_SYMBOL(ath10k_bmi_read_memory);
  157. int ath10k_bmi_write_soc_reg(struct ath10k *ar, u32 address, u32 reg_val)
  158. {
  159. struct bmi_cmd cmd;
  160. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.write_soc_reg);
  161. int ret;
  162. ath10k_dbg(ar, ATH10K_DBG_BMI,
  163. "bmi write soc register 0x%08x val 0x%08x\n",
  164. address, reg_val);
  165. if (ar->bmi.done_sent) {
  166. ath10k_warn(ar, "bmi write soc register command in progress\n");
  167. return -EBUSY;
  168. }
  169. cmd.id = __cpu_to_le32(BMI_WRITE_SOC_REGISTER);
  170. cmd.write_soc_reg.addr = __cpu_to_le32(address);
  171. cmd.write_soc_reg.value = __cpu_to_le32(reg_val);
  172. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, NULL, NULL);
  173. if (ret) {
  174. ath10k_warn(ar, "Unable to write soc register to device: %d\n",
  175. ret);
  176. return ret;
  177. }
  178. return 0;
  179. }
  180. int ath10k_bmi_read_soc_reg(struct ath10k *ar, u32 address, u32 *reg_val)
  181. {
  182. struct bmi_cmd cmd;
  183. union bmi_resp resp;
  184. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.read_soc_reg);
  185. u32 resplen = sizeof(resp.read_soc_reg);
  186. int ret;
  187. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi read soc register 0x%08x\n",
  188. address);
  189. if (ar->bmi.done_sent) {
  190. ath10k_warn(ar, "bmi read soc register command in progress\n");
  191. return -EBUSY;
  192. }
  193. cmd.id = __cpu_to_le32(BMI_READ_SOC_REGISTER);
  194. cmd.read_soc_reg.addr = __cpu_to_le32(address);
  195. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, &resp, &resplen);
  196. if (ret) {
  197. ath10k_warn(ar, "Unable to read soc register from device: %d\n",
  198. ret);
  199. return ret;
  200. }
  201. *reg_val = __le32_to_cpu(resp.read_soc_reg.value);
  202. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi read soc register value 0x%08x\n",
  203. *reg_val);
  204. return 0;
  205. }
  206. int ath10k_bmi_write_memory(struct ath10k *ar,
  207. u32 address, const void *buffer, u32 length)
  208. {
  209. struct bmi_cmd cmd;
  210. u32 hdrlen = sizeof(cmd.id) + sizeof(cmd.write_mem);
  211. u32 txlen;
  212. int ret;
  213. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi write address 0x%x length %d\n",
  214. address, length);
  215. if (ar->bmi.done_sent) {
  216. ath10k_warn(ar, "command disallowed\n");
  217. return -EBUSY;
  218. }
  219. while (length) {
  220. txlen = min(length, BMI_MAX_DATA_SIZE - hdrlen);
  221. /* copy before roundup to avoid reading beyond buffer*/
  222. memcpy(cmd.write_mem.payload, buffer, txlen);
  223. txlen = roundup(txlen, 4);
  224. cmd.id = __cpu_to_le32(BMI_WRITE_MEMORY);
  225. cmd.write_mem.addr = __cpu_to_le32(address);
  226. cmd.write_mem.len = __cpu_to_le32(txlen);
  227. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, hdrlen + txlen,
  228. NULL, NULL);
  229. if (ret) {
  230. ath10k_warn(ar, "unable to write to the device (%d)\n",
  231. ret);
  232. return ret;
  233. }
  234. /* fixup roundup() so `length` zeroes out for last chunk */
  235. txlen = min(txlen, length);
  236. address += txlen;
  237. buffer += txlen;
  238. length -= txlen;
  239. }
  240. return 0;
  241. }
  242. int ath10k_bmi_execute(struct ath10k *ar, u32 address, u32 param, u32 *result)
  243. {
  244. struct bmi_cmd cmd;
  245. union bmi_resp resp;
  246. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.execute);
  247. u32 resplen = sizeof(resp.execute);
  248. int ret;
  249. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi execute address 0x%x param 0x%x\n",
  250. address, param);
  251. if (ar->bmi.done_sent) {
  252. ath10k_warn(ar, "command disallowed\n");
  253. return -EBUSY;
  254. }
  255. cmd.id = __cpu_to_le32(BMI_EXECUTE);
  256. cmd.execute.addr = __cpu_to_le32(address);
  257. cmd.execute.param = __cpu_to_le32(param);
  258. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, &resp, &resplen);
  259. if (ret) {
  260. ath10k_warn(ar, "unable to read from the device\n");
  261. return ret;
  262. }
  263. if (resplen < sizeof(resp.execute)) {
  264. ath10k_warn(ar, "invalid execute response length (%d)\n",
  265. resplen);
  266. return -EIO;
  267. }
  268. *result = __le32_to_cpu(resp.execute.result);
  269. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi execute result 0x%x\n", *result);
  270. return 0;
  271. }
  272. static int ath10k_bmi_lz_data_large(struct ath10k *ar, const void *buffer, u32 length)
  273. {
  274. struct bmi_cmd *cmd;
  275. u32 hdrlen = sizeof(cmd->id) + sizeof(cmd->lz_data);
  276. u32 txlen;
  277. int ret;
  278. size_t buf_len;
  279. ath10k_dbg(ar, ATH10K_DBG_BMI, "large bmi lz data buffer 0x%pK length %d\n",
  280. buffer, length);
  281. if (ar->bmi.done_sent) {
  282. ath10k_warn(ar, "command disallowed\n");
  283. return -EBUSY;
  284. }
  285. buf_len = sizeof(*cmd) + BMI_MAX_LARGE_DATA_SIZE - BMI_MAX_DATA_SIZE;
  286. cmd = kzalloc(buf_len, GFP_KERNEL);
  287. if (!cmd)
  288. return -ENOMEM;
  289. while (length) {
  290. txlen = min(length, BMI_MAX_LARGE_DATA_SIZE - hdrlen);
  291. WARN_ON_ONCE(txlen & 3);
  292. cmd->id = __cpu_to_le32(BMI_LZ_DATA);
  293. cmd->lz_data.len = __cpu_to_le32(txlen);
  294. memcpy(cmd->lz_data.payload, buffer, txlen);
  295. ret = ath10k_hif_exchange_bmi_msg(ar, cmd, hdrlen + txlen,
  296. NULL, NULL);
  297. if (ret) {
  298. ath10k_warn(ar, "unable to write to the device\n");
  299. kfree(cmd);
  300. return ret;
  301. }
  302. buffer += txlen;
  303. length -= txlen;
  304. }
  305. kfree(cmd);
  306. return 0;
  307. }
  308. int ath10k_bmi_lz_data(struct ath10k *ar, const void *buffer, u32 length)
  309. {
  310. struct bmi_cmd cmd;
  311. u32 hdrlen = sizeof(cmd.id) + sizeof(cmd.lz_data);
  312. u32 txlen;
  313. int ret;
  314. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi lz data buffer 0x%pK length %d\n",
  315. buffer, length);
  316. if (ar->bmi.done_sent) {
  317. ath10k_warn(ar, "command disallowed\n");
  318. return -EBUSY;
  319. }
  320. while (length) {
  321. txlen = min(length, BMI_MAX_DATA_SIZE - hdrlen);
  322. WARN_ON_ONCE(txlen & 3);
  323. cmd.id = __cpu_to_le32(BMI_LZ_DATA);
  324. cmd.lz_data.len = __cpu_to_le32(txlen);
  325. memcpy(cmd.lz_data.payload, buffer, txlen);
  326. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, hdrlen + txlen,
  327. NULL, NULL);
  328. if (ret) {
  329. ath10k_warn(ar, "unable to write to the device\n");
  330. return ret;
  331. }
  332. buffer += txlen;
  333. length -= txlen;
  334. }
  335. return 0;
  336. }
  337. int ath10k_bmi_lz_stream_start(struct ath10k *ar, u32 address)
  338. {
  339. struct bmi_cmd cmd;
  340. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.lz_start);
  341. int ret;
  342. ath10k_dbg(ar, ATH10K_DBG_BMI, "bmi lz stream start address 0x%x\n",
  343. address);
  344. if (ar->bmi.done_sent) {
  345. ath10k_warn(ar, "command disallowed\n");
  346. return -EBUSY;
  347. }
  348. cmd.id = __cpu_to_le32(BMI_LZ_STREAM_START);
  349. cmd.lz_start.addr = __cpu_to_le32(address);
  350. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, NULL, NULL);
  351. if (ret) {
  352. ath10k_warn(ar, "unable to Start LZ Stream to the device\n");
  353. return ret;
  354. }
  355. return 0;
  356. }
  357. int ath10k_bmi_fast_download(struct ath10k *ar,
  358. u32 address, const void *buffer, u32 length)
  359. {
  360. u8 trailer[4] = {};
  361. u32 head_len = rounddown(length, 4);
  362. u32 trailer_len = length - head_len;
  363. int ret;
  364. ath10k_dbg(ar, ATH10K_DBG_BMI,
  365. "bmi fast download address 0x%x buffer 0x%pK length %d\n",
  366. address, buffer, length);
  367. ret = ath10k_bmi_lz_stream_start(ar, address);
  368. if (ret)
  369. return ret;
  370. /* copy the last word into a zero padded buffer */
  371. if (trailer_len > 0)
  372. memcpy(trailer, buffer + head_len, trailer_len);
  373. if (ar->hw_params.bmi_large_size_download)
  374. ret = ath10k_bmi_lz_data_large(ar, buffer, head_len);
  375. else
  376. ret = ath10k_bmi_lz_data(ar, buffer, head_len);
  377. if (ret)
  378. return ret;
  379. if (trailer_len > 0)
  380. ret = ath10k_bmi_lz_data(ar, trailer, 4);
  381. if (ret != 0)
  382. return ret;
  383. /*
  384. * Close compressed stream and open a new (fake) one.
  385. * This serves mainly to flush Target caches.
  386. */
  387. ret = ath10k_bmi_lz_stream_start(ar, 0x00);
  388. return ret;
  389. }
  390. int ath10k_bmi_set_start(struct ath10k *ar, u32 address)
  391. {
  392. struct bmi_cmd cmd;
  393. u32 cmdlen = sizeof(cmd.id) + sizeof(cmd.set_app_start);
  394. int ret;
  395. if (ar->bmi.done_sent) {
  396. ath10k_warn(ar, "bmi set start command disallowed\n");
  397. return -EBUSY;
  398. }
  399. cmd.id = __cpu_to_le32(BMI_SET_APP_START);
  400. cmd.set_app_start.addr = __cpu_to_le32(address);
  401. ret = ath10k_hif_exchange_bmi_msg(ar, &cmd, cmdlen, NULL, NULL);
  402. if (ret) {
  403. ath10k_warn(ar, "unable to set start to the device:%d\n", ret);
  404. return ret;
  405. }
  406. return 0;
  407. }