]> git.proxmox.com Git - mirror_ubuntu-eoan-kernel.git/blame - drivers/net/wireless/ath/ath6kl/bmi.c
ath6kl: revert USB support
[mirror_ubuntu-eoan-kernel.git] / drivers / net / wireless / ath / ath6kl / bmi.c
CommitLineData
bdcd8170
KV
1/*
2 * Copyright (c) 2004-2011 Atheros Communications Inc.
3 *
4 * Permission to use, copy, modify, and/or distribute this software for any
5 * purpose with or without fee is hereby granted, provided that the above
6 * copyright notice and this permission notice appear in all copies.
7 *
8 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15 */
16
17#include "core.h"
18#include "hif-ops.h"
19#include "target.h"
20#include "debug.h"
21
bdcd8170
KV
22int ath6kl_bmi_done(struct ath6kl *ar)
23{
24 int ret;
25 u32 cid = BMI_DONE;
26
27 if (ar->bmi.done_sent) {
28 ath6kl_dbg(ATH6KL_DBG_BMI, "bmi done skipped\n");
29 return 0;
30 }
31
32 ar->bmi.done_sent = true;
33
66b693c3 34 ret = ath6kl_hif_bmi_write(ar, (u8 *)&cid, sizeof(cid));
bdcd8170
KV
35 if (ret) {
36 ath6kl_err("Unable to send bmi done: %d\n", ret);
37 return ret;
38 }
39
bdcd8170
KV
40 return 0;
41}
42
43int ath6kl_bmi_get_target_info(struct ath6kl *ar,
44 struct ath6kl_bmi_target_info *targ_info)
45{
46 int ret;
47 u32 cid = BMI_GET_TARGET_INFO;
48
49 if (ar->bmi.done_sent) {
50 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
51 return -EACCES;
52 }
53
66b693c3 54 ret = ath6kl_hif_bmi_write(ar, (u8 *)&cid, sizeof(cid));
bdcd8170
KV
55 if (ret) {
56 ath6kl_err("Unable to send get target info: %d\n", ret);
57 return ret;
58 }
59
cb00ec38
JL
60 ret = ath6kl_hif_bmi_read(ar, (u8 *)&targ_info->version,
61 sizeof(targ_info->version));
bdcd8170
KV
62 if (ret) {
63 ath6kl_err("Unable to recv target info: %d\n", ret);
64 return ret;
65 }
66
67 if (le32_to_cpu(targ_info->version) == TARGET_VERSION_SENTINAL) {
68 /* Determine how many bytes are in the Target's targ_info */
66b693c3 69 ret = ath6kl_hif_bmi_read(ar,
bdcd8170 70 (u8 *)&targ_info->byte_count,
cfc301ed 71 sizeof(targ_info->byte_count));
bdcd8170
KV
72 if (ret) {
73 ath6kl_err("unable to read target info byte count: %d\n",
74 ret);
75 return ret;
76 }
77
78 /*
79 * The target's targ_info doesn't match the host's targ_info.
80 * We need to do some backwards compatibility to make this work.
81 */
82 if (le32_to_cpu(targ_info->byte_count) != sizeof(*targ_info)) {
83 WARN_ON(1);
84 return -EINVAL;
85 }
86
87 /* Read the remainder of the targ_info */
66b693c3 88 ret = ath6kl_hif_bmi_read(ar,
bdcd8170
KV
89 ((u8 *)targ_info) +
90 sizeof(targ_info->byte_count),
91 sizeof(*targ_info) -
cfc301ed 92 sizeof(targ_info->byte_count));
bdcd8170
KV
93
94 if (ret) {
95 ath6kl_err("Unable to read target info (%d bytes): %d\n",
96 targ_info->byte_count, ret);
97 return ret;
98 }
99 }
100
101 ath6kl_dbg(ATH6KL_DBG_BMI, "target info (ver: 0x%x type: 0x%x)\n",
102 targ_info->version, targ_info->type);
103
104 return 0;
105}
106
107int ath6kl_bmi_read(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
108{
109 u32 cid = BMI_READ_MEMORY;
110 int ret;
111 u32 offset;
112 u32 len_remain, rx_len;
113 u16 size;
114
115 if (ar->bmi.done_sent) {
116 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
117 return -EACCES;
118 }
119
1f4c894d
KV
120 size = ar->bmi.max_data_size + sizeof(cid) + sizeof(addr) + sizeof(len);
121 if (size > ar->bmi.max_cmd_size) {
bdcd8170
KV
122 WARN_ON(1);
123 return -EINVAL;
124 }
125 memset(ar->bmi.cmd_buf, 0, size);
126
127 ath6kl_dbg(ATH6KL_DBG_BMI,
128 "bmi read memory: device: addr: 0x%x, len: %d\n",
129 addr, len);
130
131 len_remain = len;
132
133 while (len_remain) {
1f4c894d
KV
134 rx_len = (len_remain < ar->bmi.max_data_size) ?
135 len_remain : ar->bmi.max_data_size;
bdcd8170
KV
136 offset = 0;
137 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
138 offset += sizeof(cid);
139 memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
140 offset += sizeof(addr);
141 memcpy(&(ar->bmi.cmd_buf[offset]), &rx_len, sizeof(rx_len));
142 offset += sizeof(len);
143
66b693c3 144 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
145 if (ret) {
146 ath6kl_err("Unable to write to the device: %d\n",
147 ret);
148 return ret;
149 }
66b693c3 150 ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, rx_len);
bdcd8170
KV
151 if (ret) {
152 ath6kl_err("Unable to read from the device: %d\n",
153 ret);
154 return ret;
155 }
156 memcpy(&buf[len - len_remain], ar->bmi.cmd_buf, rx_len);
157 len_remain -= rx_len; addr += rx_len;
158 }
159
160 return 0;
161}
162
163int ath6kl_bmi_write(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
164{
165 u32 cid = BMI_WRITE_MEMORY;
166 int ret;
167 u32 offset;
168 u32 len_remain, tx_len;
169 const u32 header = sizeof(cid) + sizeof(addr) + sizeof(len);
1f4c894d 170 u8 aligned_buf[400];
bdcd8170
KV
171 u8 *src;
172
173 if (ar->bmi.done_sent) {
174 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
175 return -EACCES;
176 }
177
1f4c894d 178 if ((ar->bmi.max_data_size + header) > ar->bmi.max_cmd_size) {
bdcd8170
KV
179 WARN_ON(1);
180 return -EINVAL;
181 }
182
1f4c894d
KV
183 if (WARN_ON(ar->bmi.max_data_size > sizeof(aligned_buf)))
184 return -E2BIG;
185
186 memset(ar->bmi.cmd_buf, 0, ar->bmi.max_data_size + header);
bdcd8170
KV
187
188 ath6kl_dbg(ATH6KL_DBG_BMI,
189 "bmi write memory: addr: 0x%x, len: %d\n", addr, len);
190
191 len_remain = len;
192 while (len_remain) {
193 src = &buf[len - len_remain];
194
1f4c894d 195 if (len_remain < (ar->bmi.max_data_size - header)) {
bdcd8170
KV
196 if (len_remain & 3) {
197 /* align it with 4 bytes */
198 len_remain = len_remain +
199 (4 - (len_remain & 3));
200 memcpy(aligned_buf, src, len_remain);
201 src = aligned_buf;
202 }
203 tx_len = len_remain;
204 } else {
1f4c894d 205 tx_len = (ar->bmi.max_data_size - header);
bdcd8170
KV
206 }
207
208 offset = 0;
209 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
210 offset += sizeof(cid);
211 memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
212 offset += sizeof(addr);
213 memcpy(&(ar->bmi.cmd_buf[offset]), &tx_len, sizeof(tx_len));
214 offset += sizeof(tx_len);
215 memcpy(&(ar->bmi.cmd_buf[offset]), src, tx_len);
216 offset += tx_len;
217
66b693c3 218 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
219 if (ret) {
220 ath6kl_err("Unable to write to the device: %d\n",
221 ret);
222 return ret;
223 }
224 len_remain -= tx_len; addr += tx_len;
225 }
226
227 return 0;
228}
229
230int ath6kl_bmi_execute(struct ath6kl *ar, u32 addr, u32 *param)
231{
232 u32 cid = BMI_EXECUTE;
233 int ret;
234 u32 offset;
235 u16 size;
236
237 if (ar->bmi.done_sent) {
238 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
239 return -EACCES;
240 }
241
242 size = sizeof(cid) + sizeof(addr) + sizeof(param);
1f4c894d 243 if (size > ar->bmi.max_cmd_size) {
bdcd8170
KV
244 WARN_ON(1);
245 return -EINVAL;
246 }
247 memset(ar->bmi.cmd_buf, 0, size);
248
249 ath6kl_dbg(ATH6KL_DBG_BMI, "bmi execute: addr: 0x%x, param: %d)\n",
250 addr, *param);
251
252 offset = 0;
253 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
254 offset += sizeof(cid);
255 memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
256 offset += sizeof(addr);
257 memcpy(&(ar->bmi.cmd_buf[offset]), param, sizeof(*param));
258 offset += sizeof(*param);
259
66b693c3 260 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
261 if (ret) {
262 ath6kl_err("Unable to write to the device: %d\n", ret);
263 return ret;
264 }
265
66b693c3 266 ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, sizeof(*param));
bdcd8170
KV
267 if (ret) {
268 ath6kl_err("Unable to read from the device: %d\n", ret);
269 return ret;
270 }
271
272 memcpy(param, ar->bmi.cmd_buf, sizeof(*param));
273
274 return 0;
275}
276
277int ath6kl_bmi_set_app_start(struct ath6kl *ar, u32 addr)
278{
279 u32 cid = BMI_SET_APP_START;
280 int ret;
281 u32 offset;
282 u16 size;
283
284 if (ar->bmi.done_sent) {
285 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
286 return -EACCES;
287 }
288
289 size = sizeof(cid) + sizeof(addr);
1f4c894d 290 if (size > ar->bmi.max_cmd_size) {
bdcd8170
KV
291 WARN_ON(1);
292 return -EINVAL;
293 }
294 memset(ar->bmi.cmd_buf, 0, size);
295
296 ath6kl_dbg(ATH6KL_DBG_BMI, "bmi set app start: addr: 0x%x\n", addr);
297
298 offset = 0;
299 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
300 offset += sizeof(cid);
301 memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
302 offset += sizeof(addr);
303
66b693c3 304 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
305 if (ret) {
306 ath6kl_err("Unable to write to the device: %d\n", ret);
307 return ret;
308 }
309
310 return 0;
311}
312
313int ath6kl_bmi_reg_read(struct ath6kl *ar, u32 addr, u32 *param)
314{
315 u32 cid = BMI_READ_SOC_REGISTER;
316 int ret;
317 u32 offset;
318 u16 size;
319
320 if (ar->bmi.done_sent) {
321 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
322 return -EACCES;
323 }
324
325 size = sizeof(cid) + sizeof(addr);
1f4c894d 326 if (size > ar->bmi.max_cmd_size) {
bdcd8170
KV
327 WARN_ON(1);
328 return -EINVAL;
329 }
330 memset(ar->bmi.cmd_buf, 0, size);
331
332 ath6kl_dbg(ATH6KL_DBG_BMI, "bmi read SOC reg: addr: 0x%x\n", addr);
333
334 offset = 0;
335 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
336 offset += sizeof(cid);
337 memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
338 offset += sizeof(addr);
339
66b693c3 340 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
341 if (ret) {
342 ath6kl_err("Unable to write to the device: %d\n", ret);
343 return ret;
344 }
345
66b693c3 346 ret = ath6kl_hif_bmi_read(ar, ar->bmi.cmd_buf, sizeof(*param));
bdcd8170
KV
347 if (ret) {
348 ath6kl_err("Unable to read from the device: %d\n", ret);
349 return ret;
350 }
351 memcpy(param, ar->bmi.cmd_buf, sizeof(*param));
352
353 return 0;
354}
355
356int ath6kl_bmi_reg_write(struct ath6kl *ar, u32 addr, u32 param)
357{
358 u32 cid = BMI_WRITE_SOC_REGISTER;
359 int ret;
360 u32 offset;
361 u16 size;
362
363 if (ar->bmi.done_sent) {
364 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
365 return -EACCES;
366 }
367
368 size = sizeof(cid) + sizeof(addr) + sizeof(param);
1f4c894d 369 if (size > ar->bmi.max_cmd_size) {
bdcd8170
KV
370 WARN_ON(1);
371 return -EINVAL;
372 }
373 memset(ar->bmi.cmd_buf, 0, size);
374
375 ath6kl_dbg(ATH6KL_DBG_BMI,
376 "bmi write SOC reg: addr: 0x%x, param: %d\n",
377 addr, param);
378
379 offset = 0;
380 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
381 offset += sizeof(cid);
382 memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
383 offset += sizeof(addr);
384 memcpy(&(ar->bmi.cmd_buf[offset]), &param, sizeof(param));
385 offset += sizeof(param);
386
66b693c3 387 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
388 if (ret) {
389 ath6kl_err("Unable to write to the device: %d\n", ret);
390 return ret;
391 }
392
393 return 0;
394}
395
396int ath6kl_bmi_lz_data(struct ath6kl *ar, u8 *buf, u32 len)
397{
398 u32 cid = BMI_LZ_DATA;
399 int ret;
400 u32 offset;
401 u32 len_remain, tx_len;
402 const u32 header = sizeof(cid) + sizeof(len);
403 u16 size;
404
405 if (ar->bmi.done_sent) {
406 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
407 return -EACCES;
408 }
409
1f4c894d
KV
410 size = ar->bmi.max_data_size + header;
411 if (size > ar->bmi.max_cmd_size) {
bdcd8170
KV
412 WARN_ON(1);
413 return -EINVAL;
414 }
415 memset(ar->bmi.cmd_buf, 0, size);
416
417 ath6kl_dbg(ATH6KL_DBG_BMI, "bmi send LZ data: len: %d)\n",
418 len);
419
420 len_remain = len;
421 while (len_remain) {
1f4c894d
KV
422 tx_len = (len_remain < (ar->bmi.max_data_size - header)) ?
423 len_remain : (ar->bmi.max_data_size - header);
bdcd8170
KV
424
425 offset = 0;
426 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
427 offset += sizeof(cid);
428 memcpy(&(ar->bmi.cmd_buf[offset]), &tx_len, sizeof(tx_len));
429 offset += sizeof(tx_len);
430 memcpy(&(ar->bmi.cmd_buf[offset]), &buf[len - len_remain],
431 tx_len);
432 offset += tx_len;
433
66b693c3 434 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
435 if (ret) {
436 ath6kl_err("Unable to write to the device: %d\n",
437 ret);
438 return ret;
439 }
440
441 len_remain -= tx_len;
442 }
443
444 return 0;
445}
446
447int ath6kl_bmi_lz_stream_start(struct ath6kl *ar, u32 addr)
448{
449 u32 cid = BMI_LZ_STREAM_START;
450 int ret;
451 u32 offset;
452 u16 size;
453
454 if (ar->bmi.done_sent) {
455 ath6kl_err("bmi done sent already, cmd %d disallowed\n", cid);
456 return -EACCES;
457 }
458
459 size = sizeof(cid) + sizeof(addr);
1f4c894d 460 if (size > ar->bmi.max_cmd_size) {
bdcd8170
KV
461 WARN_ON(1);
462 return -EINVAL;
463 }
464 memset(ar->bmi.cmd_buf, 0, size);
465
466 ath6kl_dbg(ATH6KL_DBG_BMI,
467 "bmi LZ stream start: addr: 0x%x)\n",
468 addr);
469
470 offset = 0;
471 memcpy(&(ar->bmi.cmd_buf[offset]), &cid, sizeof(cid));
472 offset += sizeof(cid);
473 memcpy(&(ar->bmi.cmd_buf[offset]), &addr, sizeof(addr));
474 offset += sizeof(addr);
475
66b693c3 476 ret = ath6kl_hif_bmi_write(ar, ar->bmi.cmd_buf, offset);
bdcd8170
KV
477 if (ret) {
478 ath6kl_err("Unable to start LZ stream to the device: %d\n",
479 ret);
480 return ret;
481 }
482
483 return 0;
484}
485
486int ath6kl_bmi_fast_download(struct ath6kl *ar, u32 addr, u8 *buf, u32 len)
487{
488 int ret;
489 u32 last_word = 0;
490 u32 last_word_offset = len & ~0x3;
491 u32 unaligned_bytes = len & 0x3;
492
493 ret = ath6kl_bmi_lz_stream_start(ar, addr);
494 if (ret)
495 return ret;
496
497 if (unaligned_bytes) {
498 /* copy the last word into a zero padded buffer */
499 memcpy(&last_word, &buf[last_word_offset], unaligned_bytes);
500 }
501
502 ret = ath6kl_bmi_lz_data(ar, buf, last_word_offset);
503 if (ret)
504 return ret;
505
506 if (unaligned_bytes)
507 ret = ath6kl_bmi_lz_data(ar, (u8 *)&last_word, 4);
508
509 if (!ret) {
510 /* Close compressed stream and open a new (fake) one.
511 * This serves mainly to flush Target caches. */
512 ret = ath6kl_bmi_lz_stream_start(ar, 0x00);
513 }
514 return ret;
515}
516
5fe4dffb
KV
517void ath6kl_bmi_reset(struct ath6kl *ar)
518{
519 ar->bmi.done_sent = false;
520}
521
bdcd8170
KV
522int ath6kl_bmi_init(struct ath6kl *ar)
523{
1f4c894d
KV
524 if (WARN_ON(ar->bmi.max_data_size == 0))
525 return -EINVAL;
526
527 /* cmd + addr + len + data_size */
528 ar->bmi.max_cmd_size = ar->bmi.max_data_size + (sizeof(u32) * 3);
bdcd8170 529
1f4c894d 530 ar->bmi.cmd_buf = kzalloc(ar->bmi.max_cmd_size, GFP_ATOMIC);
bdcd8170
KV
531 if (!ar->bmi.cmd_buf)
532 return -ENOMEM;
533
534 return 0;
535}
536
537void ath6kl_bmi_cleanup(struct ath6kl *ar)
538{
539 kfree(ar->bmi.cmd_buf);
540 ar->bmi.cmd_buf = NULL;
541}