bmi.c 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541
  1. /*
  2. * Copyright (c) 2004-2011 Atheros Communications Inc.
  3. *
  4. * Permission to use, copy, modify, and/or distribute this software for any
  5. * purpose with or without fee is hereby granted, provided that the above
  6. * copyright notice and this permission notice appear in all copies.
  7. *
  8. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  9. * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  10. * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  11. * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  12. * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  13. * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  14. * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  15. */
  16. #include "core.h"
  17. #include "hif-ops.h"
  18. #include "target.h"
  19. #include "debug.h"
  20. int ath6kl_bmi_done(struct ath6kl *ar)
  21. {
  22. int ret;
  23. u32 cid = BMI_DONE;
  24. if (ar->bmi.done_sent) {
  25. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi done skipped\n");
  26. return 0;
  27. }
  28. ar->bmi.done_sent = true;
  29. ret = ath6kl_hif_bmi_write(ar, (u8 *)&cid, sizeof(cid));
  30. if (ret) {
  31. ath6kl_err("Unable to send bmi done: %d\n", ret);
  32. return ret;
  33. }
  34. return 0;
  35. }
  36. int ath6kl_bmi_get_target_info(struct ath6kl *ar,
  37. struct ath6kl_bmi_target_info *targ_info)
  38. {
  39. int ret;
  40. u32 cid = BMI_GET_TARGET_INFO;
  41. if (ar->bmi.done_sent) {
  42. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  43. return -EACCES;
  44. }
  45. ret = ath6kl_hif_bmi_write(ar, (u8 *)&cid, sizeof(cid));
  46. if (ret) {
  47. ath6kl_err("Unable to send get target info: %d\n", ret);
  48. return ret;
  49. }
  50. ret = ath6kl_hif_bmi_read(ar, (u8 *)&targ_info->version,
  51. sizeof(targ_info->version));
  52. if (ret) {
  53. ath6kl_err("Unable to recv target info: %d\n", ret);
  54. return ret;
  55. }
  56. if (le32_to_cpu(targ_info->version) == TARGET_VERSION_SENTINAL) {
  57. /* Determine how many bytes are in the Target's targ_info */
  58. ret = ath6kl_hif_bmi_read(ar,
  59. (u8 *)&targ_info->byte_count,
  60. sizeof(targ_info->byte_count));
  61. if (ret) {
  62. ath6kl_err("unable to read target info byte count: %d\n",
  63. ret);
  64. return ret;
  65. }
  66. /*
  67. * The target's targ_info doesn't match the host's targ_info.
  68. * We need to do some backwards compatibility to make this work.
  69. */
  70. if (le32_to_cpu(targ_info->byte_count) != sizeof(*targ_info)) {
  71. WARN_ON(1);
  72. return -EINVAL;
  73. }
  74. /* Read the remainder of the targ_info */
  75. ret = ath6kl_hif_bmi_read(ar,
  76. ((u8 *)targ_info) +
  77. sizeof(targ_info->byte_count),
  78. sizeof(*targ_info) -
  79. sizeof(targ_info->byte_count));
  80. if (ret) {
  81. ath6kl_err("Unable to read target info (%d bytes): %d\n",
  82. targ_info->byte_count, ret);
  83. return ret;
  84. }
  85. }
  86. ath6kl_dbg(ATH6KL_DBG_BMI, "target info (ver: 0x%x type: 0x%x)\n",
  87. targ_info->version, targ_info->type);
  88. return 0;
  89. }
  90. int ath6kl_bmi_read(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
  91. {
  92. u32 cid = BMI_READ_MEMORY;
  93. int ret;
  94. u32 offset;
  95. u32 len_remain, rx_len;
  96. u16 size;
  97. if (ar->bmi.done_sent) {
  98. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  99. return -EACCES;
  100. }
  101. size = ar->bmi.max_data_size + sizeof(cid) + sizeof(addr) + sizeof(len);
  102. if (size > ar->bmi.max_cmd_size) {
  103. WARN_ON(1);
  104. return -EINVAL;
  105. }
  106. memset(ar->bmi.cmd_buf, 0, size);
  107. ath6kl_dbg(ATH6KL_DBG_BMI,
  108. "bmi read memory: device: addr: 0x%x, len: %d\n",
  109. addr, len);
  110. len_remain = len;
  111. while (len_remain) {
  112. rx_len = (len_remain < ar->bmi.max_data_size) ?
  113. len_remain : ar->bmi.max_data_size;
  114. offset = 0;
  115. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  116. offset += sizeof(cid);
  117. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  118. offset += sizeof(addr);
  119. memcpy(&(ar->bmi.cmd_buf[offset]), &rx_len, sizeof(rx_len));
  120. offset += sizeof(len);
  121. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  122. if (ret) {
  123. ath6kl_err("Unable to write to the device: %d\n",
  124. ret);
  125. return ret;
  126. }
  127. ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, rx_len);
  128. if (ret) {
  129. ath6kl_err("Unable to read from the device: %d\n",
  130. ret);
  131. return ret;
  132. }
  133. memcpy(&buf[len - len_remain], ar->bmi.cmd_buf, rx_len);
  134. len_remain -= rx_len; addr += rx_len;
  135. }
  136. return 0;
  137. }
  138. int ath6kl_bmi_write(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
  139. {
  140. u32 cid = BMI_WRITE_MEMORY;
  141. int ret;
  142. u32 offset;
  143. u32 len_remain, tx_len;
  144. const u32 header = sizeof(cid) + sizeof(addr) + sizeof(len);
  145. u8 aligned_buf[400];
  146. u8 *src;
  147. if (ar->bmi.done_sent) {
  148. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  149. return -EACCES;
  150. }
  151. if ((ar->bmi.max_data_size + header) > ar->bmi.max_cmd_size) {
  152. WARN_ON(1);
  153. return -EINVAL;
  154. }
  155. if (WARN_ON(ar->bmi.max_data_size > sizeof(aligned_buf)))
  156. return -E2BIG;
  157. memset(ar->bmi.cmd_buf, 0, ar->bmi.max_data_size + header);
  158. ath6kl_dbg(ATH6KL_DBG_BMI,
  159. "bmi write memory: addr: 0x%x, len: %d\n", addr, len);
  160. len_remain = len;
  161. while (len_remain) {
  162. src = &buf[len - len_remain];
  163. if (len_remain < (ar->bmi.max_data_size - header)) {
  164. if (len_remain & 3) {
  165. /* align it with 4 bytes */
  166. len_remain = len_remain +
  167. (4 - (len_remain & 3));
  168. memcpy(aligned_buf, src, len_remain);
  169. src = aligned_buf;
  170. }
  171. tx_len = len_remain;
  172. } else {
  173. tx_len = (ar->bmi.max_data_size - header);
  174. }
  175. offset = 0;
  176. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  177. offset += sizeof(cid);
  178. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  179. offset += sizeof(addr);
  180. memcpy(&(ar->bmi.cmd_buf[offset]), &tx_len, sizeof(tx_len));
  181. offset += sizeof(tx_len);
  182. memcpy(&(ar->bmi.cmd_buf[offset]), src, tx_len);
  183. offset += tx_len;
  184. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  185. if (ret) {
  186. ath6kl_err("Unable to write to the device: %d\n",
  187. ret);
  188. return ret;
  189. }
  190. len_remain -= tx_len; addr += tx_len;
  191. }
  192. return 0;
  193. }
  194. int ath6kl_bmi_execute(struct ath6kl *ar, u32 addr, u32 *param)
  195. {
  196. u32 cid = BMI_EXECUTE;
  197. int ret;
  198. u32 offset;
  199. u16 size;
  200. if (ar->bmi.done_sent) {
  201. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  202. return -EACCES;
  203. }
  204. size = sizeof(cid) + sizeof(addr) + sizeof(param);
  205. if (size > ar->bmi.max_cmd_size) {
  206. WARN_ON(1);
  207. return -EINVAL;
  208. }
  209. memset(ar->bmi.cmd_buf, 0, size);
  210. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi execute: addr: 0x%x, param: %d)\n",
  211. addr, *param);
  212. offset = 0;
  213. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  214. offset += sizeof(cid);
  215. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  216. offset += sizeof(addr);
  217. memcpy(&(ar->bmi.cmd_buf[offset]), param, sizeof(*param));
  218. offset += sizeof(*param);
  219. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  220. if (ret) {
  221. ath6kl_err("Unable to write to the device: %d\n", ret);
  222. return ret;
  223. }
  224. ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, sizeof(*param));
  225. if (ret) {
  226. ath6kl_err("Unable to read from the device: %d\n", ret);
  227. return ret;
  228. }
  229. memcpy(param, ar->bmi.cmd_buf, sizeof(*param));
  230. return 0;
  231. }
  232. int ath6kl_bmi_set_app_start(struct ath6kl *ar, u32 addr)
  233. {
  234. u32 cid = BMI_SET_APP_START;
  235. int ret;
  236. u32 offset;
  237. u16 size;
  238. if (ar->bmi.done_sent) {
  239. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  240. return -EACCES;
  241. }
  242. size = sizeof(cid) + sizeof(addr);
  243. if (size > ar->bmi.max_cmd_size) {
  244. WARN_ON(1);
  245. return -EINVAL;
  246. }
  247. memset(ar->bmi.cmd_buf, 0, size);
  248. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi set app start: addr: 0x%x\n", addr);
  249. offset = 0;
  250. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  251. offset += sizeof(cid);
  252. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  253. offset += sizeof(addr);
  254. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  255. if (ret) {
  256. ath6kl_err("Unable to write to the device: %d\n", ret);
  257. return ret;
  258. }
  259. return 0;
  260. }
  261. int ath6kl_bmi_reg_read(struct ath6kl *ar, u32 addr, u32 *param)
  262. {
  263. u32 cid = BMI_READ_SOC_REGISTER;
  264. int ret;
  265. u32 offset;
  266. u16 size;
  267. if (ar->bmi.done_sent) {
  268. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  269. return -EACCES;
  270. }
  271. size = sizeof(cid) + sizeof(addr);
  272. if (size > ar->bmi.max_cmd_size) {
  273. WARN_ON(1);
  274. return -EINVAL;
  275. }
  276. memset(ar->bmi.cmd_buf, 0, size);
  277. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi read SOC reg: addr: 0x%x\n", addr);
  278. offset = 0;
  279. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  280. offset += sizeof(cid);
  281. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  282. offset += sizeof(addr);
  283. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  284. if (ret) {
  285. ath6kl_err("Unable to write to the device: %d\n", ret);
  286. return ret;
  287. }
  288. ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, sizeof(*param));
  289. if (ret) {
  290. ath6kl_err("Unable to read from the device: %d\n", ret);
  291. return ret;
  292. }
  293. memcpy(param, ar->bmi.cmd_buf, sizeof(*param));
  294. return 0;
  295. }
  296. int ath6kl_bmi_reg_write(struct ath6kl *ar, u32 addr, u32 param)
  297. {
  298. u32 cid = BMI_WRITE_SOC_REGISTER;
  299. int ret;
  300. u32 offset;
  301. u16 size;
  302. if (ar->bmi.done_sent) {
  303. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  304. return -EACCES;
  305. }
  306. size = sizeof(cid) + sizeof(addr) + sizeof(param);
  307. if (size > ar->bmi.max_cmd_size) {
  308. WARN_ON(1);
  309. return -EINVAL;
  310. }
  311. memset(ar->bmi.cmd_buf, 0, size);
  312. ath6kl_dbg(ATH6KL_DBG_BMI,
  313. "bmi write SOC reg: addr: 0x%x, param: %d\n",
  314. addr, param);
  315. offset = 0;
  316. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  317. offset += sizeof(cid);
  318. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  319. offset += sizeof(addr);
  320. memcpy(&(ar->bmi.cmd_buf[offset]), &param, sizeof(param));
  321. offset += sizeof(param);
  322. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  323. if (ret) {
  324. ath6kl_err("Unable to write to the device: %d\n", ret);
  325. return ret;
  326. }
  327. return 0;
  328. }
  329. int ath6kl_bmi_lz_data(struct ath6kl *ar, u8 *buf, u32 len)
  330. {
  331. u32 cid = BMI_LZ_DATA;
  332. int ret;
  333. u32 offset;
  334. u32 len_remain, tx_len;
  335. const u32 header = sizeof(cid) + sizeof(len);
  336. u16 size;
  337. if (ar->bmi.done_sent) {
  338. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  339. return -EACCES;
  340. }
  341. size = ar->bmi.max_data_size + header;
  342. if (size > ar->bmi.max_cmd_size) {
  343. WARN_ON(1);
  344. return -EINVAL;
  345. }
  346. memset(ar->bmi.cmd_buf, 0, size);
  347. ath6kl_dbg(ATH6KL_DBG_BMI, "bmi send LZ data: len: %d)\n",
  348. len);
  349. len_remain = len;
  350. while (len_remain) {
  351. tx_len = (len_remain < (ar->bmi.max_data_size - header)) ?
  352. len_remain : (ar->bmi.max_data_size - header);
  353. offset = 0;
  354. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  355. offset += sizeof(cid);
  356. memcpy(&(ar->bmi.cmd_buf[offset]), &tx_len, sizeof(tx_len));
  357. offset += sizeof(tx_len);
  358. memcpy(&(ar->bmi.cmd_buf[offset]), &buf[len - len_remain],
  359. tx_len);
  360. offset += tx_len;
  361. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  362. if (ret) {
  363. ath6kl_err("Unable to write to the device: %d\n",
  364. ret);
  365. return ret;
  366. }
  367. len_remain -= tx_len;
  368. }
  369. return 0;
  370. }
  371. int ath6kl_bmi_lz_stream_start(struct ath6kl *ar, u32 addr)
  372. {
  373. u32 cid = BMI_LZ_STREAM_START;
  374. int ret;
  375. u32 offset;
  376. u16 size;
  377. if (ar->bmi.done_sent) {
  378. ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
  379. return -EACCES;
  380. }
  381. size = sizeof(cid) + sizeof(addr);
  382. if (size > ar->bmi.max_cmd_size) {
  383. WARN_ON(1);
  384. return -EINVAL;
  385. }
  386. memset(ar->bmi.cmd_buf, 0, size);
  387. ath6kl_dbg(ATH6KL_DBG_BMI,
  388. "bmi LZ stream start: addr: 0x%x)\n",
  389. addr);
  390. offset = 0;
  391. memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
  392. offset += sizeof(cid);
  393. memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
  394. offset += sizeof(addr);
  395. ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
  396. if (ret) {
  397. ath6kl_err("Unable to start LZ stream to the device: %d\n",
  398. ret);
  399. return ret;
  400. }
  401. return 0;
  402. }
  403. int ath6kl_bmi_fast_download(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
  404. {
  405. int ret;
  406. u32 last_word = 0;
  407. u32 last_word_offset = len & ~0x3;
  408. u32 unaligned_bytes = len & 0x3;
  409. ret = ath6kl_bmi_lz_stream_start(ar, addr);
  410. if (ret)
  411. return ret;
  412. if (unaligned_bytes) {
  413. /* copy the last word into a zero padded buffer */
  414. memcpy(&last_word, &buf[last_word_offset], unaligned_bytes);
  415. }
  416. ret = ath6kl_bmi_lz_data(ar, buf, last_word_offset);
  417. if (ret)
  418. return ret;
  419. if (unaligned_bytes)
  420. ret = ath6kl_bmi_lz_data(ar, (u8 *)&last_word, 4);
  421. if (!ret) {
  422. /* Close compressed stream and open a new (fake) one.
  423. * This serves mainly to flush Target caches. */
  424. ret = ath6kl_bmi_lz_stream_start(ar, 0x00);
  425. }
  426. return ret;
  427. }
  428. void ath6kl_bmi_reset(struct ath6kl *ar)
  429. {
  430. ar->bmi.done_sent = false;
  431. }
  432. int ath6kl_bmi_init(struct ath6kl *ar)
  433. {
  434. if (WARN_ON(ar->bmi.max_data_size == 0))
  435. return -EINVAL;
  436. /* cmd + addr + len + data_size */
  437. ar->bmi.max_cmd_size = ar->bmi.max_data_size + (sizeof(u32) * 3);
  438. ar->bmi.cmd_buf = kzalloc(ar->bmi.max_cmd_size, GFP_ATOMIC);
  439. if (!ar->bmi.cmd_buf)
  440. return -ENOMEM;
  441. return 0;
  442. }
  443. void ath6kl_bmi_cleanup(struct ath6kl *ar)
  444. {
  445. kfree(ar->bmi.cmd_buf);
  446. ar->bmi.cmd_buf = NULL;
  447. }