bmi.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547
  1. /*
  2. * Copyright (c) 2004-2011 Atheros Communications Inc.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for any
  5. * purpose with or without fee is hereby granted, provided that the above
  6. * copyright notice and this permission notice appear in all copies.
  7. *
  8. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  9. * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  10. * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  11. * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  12. * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  13. * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  14. * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  15. */
  16. #include "core.h"
  17. #include "hif-ops.h"
  18. #include "target.h"
  19. #include "debug.h"
  20. int ath6kl_bmi_done(struct ath6kl *ar)
  21. {
  22. int ret;
  23. u32 cid = BMI_DONE;
  24. if (ar->bmi.done_sent) {
  25. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi done skipped\n");
  26. return 0;
  27. }
  28. ar->bmi.done_sent = true;
  29. ret = ath6kl_hif_bmi_write(ar, (u8 *)&cid, sizeof(cid));
  30. if (ret) {
  31. ath6kl_err("Unable to send bmi done: %d\n", ret);
  32. return ret;
  33. }
  34. return 0;
  35. }
  36. int ath6kl_bmi_get_target_info(struct ath6kl *ar,
  37. struct ath6kl_bmi_target_info *targ_info)
  38. {
  39. int ret;
  40. u32 cid = BMI_GET_TARGET_INFO;
  41. if (ar->bmi.done_sent) {
  42. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  43. return -EACCES;
  44. }
  45. ret = ath6kl_hif_bmi_write(ar, (u8 *)&cid, sizeof(cid));
  46. if (ret) {
  47. ath6kl_err("Unable to send get target info: %d\n", ret);
  48. return ret;
  49. }
  50. if (ar->hif_type == ATH6KL_HIF_TYPE_USB) {
  51. ret = ath6kl_hif_bmi_read(ar, (u8 *)targ_info,
  52. sizeof(*targ_info));
  53. } else {
  54. ret = ath6kl_hif_bmi_read(ar, (u8 *)&targ_info->version,
  55. sizeof(targ_info->version));
  56. }
  57. if (ret) {
  58. ath6kl_err("Unable to recv target info: %d\n", ret);
  59. return ret;
  60. }
  61. if (le32_to_cpu(targ_info->version) == TARGET_VERSION_SENTINAL) {
  62. /* Determine how many bytes are in the Target's targ_info */
  63. ret = ath6kl_hif_bmi_read(ar,
  64. (u8 *)&targ_info->byte_count,
  65. sizeof(targ_info->byte_count));
  66. if (ret) {
  67. ath6kl_err("unable to read target info byte count: %d\n",
  68. ret);
  69. return ret;
  70. }
  71. /*
  72. * The target's targ_info doesn't match the host's targ_info.
  73. * We need to do some backwards compatibility to make this work.
  74. */
  75. if (le32_to_cpu(targ_info->byte_count) != sizeof(*targ_info)) {
  76. WARN_ON(1);
  77. return -EINVAL;
  78. }
  79. /* Read the remainder of the targ_info */
  80. ret = ath6kl_hif_bmi_read(ar,
  81. ((u8 *)targ_info) +
  82. sizeof(targ_info->byte_count),
  83. sizeof(*targ_info) -
  84. sizeof(targ_info->byte_count));
  85. if (ret) {
  86. ath6kl_err("Unable to read target info (%d bytes): %d\n",
  87. targ_info->byte_count, ret);
  88. return ret;
  89. }
  90. }
  91. ath6kl_dbg(ATH6KL_DBG_BMI, "target info (ver: 0x%x type: 0x%x)\n",
  92. targ_info->version, targ_info->type);
  93. return 0;
  94. }
  95. int ath6kl_bmi_read(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
  96. {
  97. u32 cid = BMI_READ_MEMORY;
  98. int ret;
  99. u32 offset;
  100. u32 len_remain, rx_len;
  101. u16 size;
  102. if (ar->bmi.done_sent) {
  103. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  104. return -EACCES;
  105. }
  106. size = ar->bmi.max_data_size + sizeof(cid) + sizeof(addr) + sizeof(len);
  107. if (size > ar->bmi.max_cmd_size) {
  108. WARN_ON(1);
  109. return -EINVAL;
  110. }
  111. memset(ar->bmi.cmd_buf, 0, size);
  112. ath6kl_dbg(ATH6KL_DBG_BMI,
  113. "bmi read memory: device: addr: 0x%x, len: %d\n",
  114. addr, len);
  115. len_remain = len;
  116. while (len_remain) {
  117. rx_len = (len_remain < ar->bmi.max_data_size) ?
  118. len_remain : ar->bmi.max_data_size;
  119. offset = 0;
  120. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  121. offset += sizeof(cid);
  122. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  123. offset += sizeof(addr);
  124. memcpy(&(ar->bmi.cmd_buf[offset]), &rx_len, sizeof(rx_len));
  125. offset += sizeof(len);
  126. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  127. if (ret) {
  128. ath6kl_err("Unable to write to the device: %d\n",
  129. ret);
  130. return ret;
  131. }
  132. ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, rx_len);
  133. if (ret) {
  134. ath6kl_err("Unable to read from the device: %d\n",
  135. ret);
  136. return ret;
  137. }
  138. memcpy(&buf[len - len_remain], ar->bmi.cmd_buf, rx_len);
  139. len_remain -= rx_len; addr += rx_len;
  140. }
  141. return 0;
  142. }
  143. int ath6kl_bmi_write(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
  144. {
  145. u32 cid = BMI_WRITE_MEMORY;
  146. int ret;
  147. u32 offset;
  148. u32 len_remain, tx_len;
  149. const u32 header = sizeof(cid) + sizeof(addr) + sizeof(len);
  150. u8 aligned_buf[400];
  151. u8 *src;
  152. if (ar->bmi.done_sent) {
  153. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  154. return -EACCES;
  155. }
  156. if ((ar->bmi.max_data_size + header) > ar->bmi.max_cmd_size) {
  157. WARN_ON(1);
  158. return -EINVAL;
  159. }
  160. if (WARN_ON(ar->bmi.max_data_size > sizeof(aligned_buf)))
  161. return -E2BIG;
  162. memset(ar->bmi.cmd_buf, 0, ar->bmi.max_data_size + header);
  163. ath6kl_dbg(ATH6KL_DBG_BMI,
  164. "bmi write memory: addr: 0x%x, len: %d\n", addr, len);
  165. len_remain = len;
  166. while (len_remain) {
  167. src = &buf[len - len_remain];
  168. if (len_remain < (ar->bmi.max_data_size - header)) {
  169. if (len_remain & 3) {
  170. /* align it with 4 bytes */
  171. len_remain = len_remain +
  172. (4 - (len_remain & 3));
  173. memcpy(aligned_buf, src, len_remain);
  174. src = aligned_buf;
  175. }
  176. tx_len = len_remain;
  177. } else {
  178. tx_len = (ar->bmi.max_data_size - header);
  179. }
  180. offset = 0;
  181. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  182. offset += sizeof(cid);
  183. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  184. offset += sizeof(addr);
  185. memcpy(&(ar->bmi.cmd_buf[offset]), &tx_len, sizeof(tx_len));
  186. offset += sizeof(tx_len);
  187. memcpy(&(ar->bmi.cmd_buf[offset]), src, tx_len);
  188. offset += tx_len;
  189. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  190. if (ret) {
  191. ath6kl_err("Unable to write to the device: %d\n",
  192. ret);
  193. return ret;
  194. }
  195. len_remain -= tx_len; addr += tx_len;
  196. }
  197. return 0;
  198. }
  199. int ath6kl_bmi_execute(struct ath6kl *ar, u32 addr, u32 *param)
  200. {
  201. u32 cid = BMI_EXECUTE;
  202. int ret;
  203. u32 offset;
  204. u16 size;
  205. if (ar->bmi.done_sent) {
  206. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  207. return -EACCES;
  208. }
  209. size = sizeof(cid) + sizeof(addr) + sizeof(param);
  210. if (size > ar->bmi.max_cmd_size) {
  211. WARN_ON(1);
  212. return -EINVAL;
  213. }
  214. memset(ar->bmi.cmd_buf, 0, size);
  215. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi execute: addr: 0x%x, param: %d)\n",
  216. addr, *param);
  217. offset = 0;
  218. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  219. offset += sizeof(cid);
  220. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  221. offset += sizeof(addr);
  222. memcpy(&(ar->bmi.cmd_buf[offset]), param, sizeof(*param));
  223. offset += sizeof(*param);
  224. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  225. if (ret) {
  226. ath6kl_err("Unable to write to the device: %d\n", ret);
  227. return ret;
  228. }
  229. ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, sizeof(*param));
  230. if (ret) {
  231. ath6kl_err("Unable to read from the device: %d\n", ret);
  232. return ret;
  233. }
  234. memcpy(param, ar->bmi.cmd_buf, sizeof(*param));
  235. return 0;
  236. }
  237. int ath6kl_bmi_set_app_start(struct ath6kl *ar, u32 addr)
  238. {
  239. u32 cid = BMI_SET_APP_START;
  240. int ret;
  241. u32 offset;
  242. u16 size;
  243. if (ar->bmi.done_sent) {
  244. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  245. return -EACCES;
  246. }
  247. size = sizeof(cid) + sizeof(addr);
  248. if (size > ar->bmi.max_cmd_size) {
  249. WARN_ON(1);
  250. return -EINVAL;
  251. }
  252. memset(ar->bmi.cmd_buf, 0, size);
  253. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi set app start: addr: 0x%x\n", addr);
  254. offset = 0;
  255. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  256. offset += sizeof(cid);
  257. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  258. offset += sizeof(addr);
  259. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  260. if (ret) {
  261. ath6kl_err("Unable to write to the device: %d\n", ret);
  262. return ret;
  263. }
  264. return 0;
  265. }
  266. int ath6kl_bmi_reg_read(struct ath6kl *ar, u32 addr, u32 *param)
  267. {
  268. u32 cid = BMI_READ_SOC_REGISTER;
  269. int ret;
  270. u32 offset;
  271. u16 size;
  272. if (ar->bmi.done_sent) {
  273. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  274. return -EACCES;
  275. }
  276. size = sizeof(cid) + sizeof(addr);
  277. if (size > ar->bmi.max_cmd_size) {
  278. WARN_ON(1);
  279. return -EINVAL;
  280. }
  281. memset(ar->bmi.cmd_buf, 0, size);
  282. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi read SOC reg: addr: 0x%x\n", addr);
  283. offset = 0;
  284. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  285. offset += sizeof(cid);
  286. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  287. offset += sizeof(addr);
  288. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  289. if (ret) {
  290. ath6kl_err("Unable to write to the device: %d\n", ret);
  291. return ret;
  292. }
  293. ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, sizeof(*param));
  294. if (ret) {
  295. ath6kl_err("Unable to read from the device: %d\n", ret);
  296. return ret;
  297. }
  298. memcpy(param, ar->bmi.cmd_buf, sizeof(*param));
  299. return 0;
  300. }
  301. int ath6kl_bmi_reg_write(struct ath6kl *ar, u32 addr, u32 param)
  302. {
  303. u32 cid = BMI_WRITE_SOC_REGISTER;
  304. int ret;
  305. u32 offset;
  306. u16 size;
  307. if (ar->bmi.done_sent) {
  308. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  309. return -EACCES;
  310. }
  311. size = sizeof(cid) + sizeof(addr) + sizeof(param);
  312. if (size > ar->bmi.max_cmd_size) {
  313. WARN_ON(1);
  314. return -EINVAL;
  315. }
  316. memset(ar->bmi.cmd_buf, 0, size);
  317. ath6kl_dbg(ATH6KL_DBG_BMI,
  318. "bmi write SOC reg: addr: 0x%x, param: %d\n",
  319. addr, param);
  320. offset = 0;
  321. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  322. offset += sizeof(cid);
  323. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  324. offset += sizeof(addr);
  325. memcpy(&(ar->bmi.cmd_buf[offset]), &param, sizeof(param));
  326. offset += sizeof(param);
  327. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  328. if (ret) {
  329. ath6kl_err("Unable to write to the device: %d\n", ret);
  330. return ret;
  331. }
  332. return 0;
  333. }
  334. int ath6kl_bmi_lz_data(struct ath6kl *ar, u8 *buf, u32 len)
  335. {
  336. u32 cid = BMI_LZ_DATA;
  337. int ret;
  338. u32 offset;
  339. u32 len_remain, tx_len;
  340. const u32 header = sizeof(cid) + sizeof(len);
  341. u16 size;
  342. if (ar->bmi.done_sent) {
  343. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  344. return -EACCES;
  345. }
  346. size = ar->bmi.max_data_size + header;
  347. if (size > ar->bmi.max_cmd_size) {
  348. WARN_ON(1);
  349. return -EINVAL;
  350. }
  351. memset(ar->bmi.cmd_buf, 0, size);
  352. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi send LZ data: len: %d)\n",
  353. len);
  354. len_remain = len;
  355. while (len_remain) {
  356. tx_len = (len_remain < (ar->bmi.max_data_size - header)) ?
  357. len_remain : (ar->bmi.max_data_size - header);
  358. offset = 0;
  359. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  360. offset += sizeof(cid);
  361. memcpy(&(ar->bmi.cmd_buf[offset]), &tx_len, sizeof(tx_len));
  362. offset += sizeof(tx_len);
  363. memcpy(&(ar->bmi.cmd_buf[offset]), &buf[len - len_remain],
  364. tx_len);
  365. offset += tx_len;
  366. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  367. if (ret) {
  368. ath6kl_err("Unable to write to the device: %d\n",
  369. ret);
  370. return ret;
  371. }
  372. len_remain -= tx_len;
  373. }
  374. return 0;
  375. }
  376. int ath6kl_bmi_lz_stream_start(struct ath6kl *ar, u32 addr)
  377. {
  378. u32 cid = BMI_LZ_STREAM_START;
  379. int ret;
  380. u32 offset;
  381. u16 size;
  382. if (ar->bmi.done_sent) {
  383. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  384. return -EACCES;
  385. }
  386. size = sizeof(cid) + sizeof(addr);
  387. if (size > ar->bmi.max_cmd_size) {
  388. WARN_ON(1);
  389. return -EINVAL;
  390. }
  391. memset(ar->bmi.cmd_buf, 0, size);
  392. ath6kl_dbg(ATH6KL_DBG_BMI,
  393. "bmi LZ stream start: addr: 0x%x)\n",
  394. addr);
  395. offset = 0;
  396. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  397. offset += sizeof(cid);
  398. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  399. offset += sizeof(addr);
  400. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  401. if (ret) {
  402. ath6kl_err("Unable to start LZ stream to the device: %d\n",
  403. ret);
  404. return ret;
  405. }
  406. return 0;
  407. }
  408. int ath6kl_bmi_fast_download(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
  409. {
  410. int ret;
  411. u32 last_word = 0;
  412. u32 last_word_offset = len & ~0x3;
  413. u32 unaligned_bytes = len & 0x3;
  414. ret = ath6kl_bmi_lz_stream_start(ar, addr);
  415. if (ret)
  416. return ret;
  417. if (unaligned_bytes) {
  418. /* copy the last word into a zero padded buffer */
  419. memcpy(&last_word, &buf[last_word_offset], unaligned_bytes);
  420. }
  421. ret = ath6kl_bmi_lz_data(ar, buf, last_word_offset);
  422. if (ret)
  423. return ret;
  424. if (unaligned_bytes)
  425. ret = ath6kl_bmi_lz_data(ar, (u8 *)&last_word, 4);
  426. if (!ret) {
  427. /* Close compressed stream and open a new (fake) one.
  428. * This serves mainly to flush Target caches. */
  429. ret = ath6kl_bmi_lz_stream_start(ar, 0x00);
  430. }
  431. return ret;
  432. }
  433. void ath6kl_bmi_reset(struct ath6kl *ar)
  434. {
  435. ar->bmi.done_sent = false;
  436. }
  437. int ath6kl_bmi_init(struct ath6kl *ar)
  438. {
  439. if (WARN_ON(ar->bmi.max_data_size == 0))
  440. return -EINVAL;
  441. /* cmd + addr + len + data_size */
  442. ar->bmi.max_cmd_size = ar->bmi.max_data_size + (sizeof(u32) * 3);
  443. ar->bmi.cmd_buf = kzalloc(ar->bmi.max_cmd_size, GFP_ATOMIC);
  444. if (!ar->bmi.cmd_buf)
  445. return -ENOMEM;
  446. return 0;
  447. }
  448. void ath6kl_bmi_cleanup(struct ath6kl *ar)
  449. {
  450. kfree(ar->bmi.cmd_buf);
  451. ar->bmi.cmd_buf = NULL;
  452. }