]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blob - drivers/misc/gehc-achc.c
Merge tag 'staging-5.15-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/gregkh...
[mirror_ubuntu-jammy-kernel.git] / drivers / misc / gehc-achc.c
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * datasheet: https://www.nxp.com/docs/en/data-sheet/K20P144M120SF3.pdf
4 *
5 * Copyright (C) 2018-2021 Collabora
6 * Copyright (C) 2018-2021 GE Healthcare
7 */
8
9 #include <linux/delay.h>
10 #include <linux/firmware.h>
11 #include <linux/gpio/consumer.h>
12 #include <linux/kernel.h>
13 #include <linux/module.h>
14 #include <linux/of.h>
15 #include <linux/spi/spi.h>
16
17 #define ACHC_MAX_FREQ_HZ 300000
18 #define ACHC_FAST_READ_FREQ_HZ 1000000
19
20 struct achc_data {
21 struct spi_device *main;
22 struct spi_device *ezport;
23 struct gpio_desc *reset;
24
25 struct mutex device_lock; /* avoid concurrent device access */
26 };
27
28 #define EZPORT_RESET_DELAY_MS 100
29 #define EZPORT_STARTUP_DELAY_MS 200
30 #define EZPORT_WRITE_WAIT_MS 10
31 #define EZPORT_TRANSFER_SIZE 2048
32
33 #define EZPORT_CMD_SP 0x02 /* flash section program */
34 #define EZPORT_CMD_RDSR 0x05 /* read status register */
35 #define EZPORT_CMD_WREN 0x06 /* write enable */
36 #define EZPORT_CMD_FAST_READ 0x0b /* flash read data at high speed */
37 #define EZPORT_CMD_RESET 0xb9 /* reset chip */
38 #define EZPORT_CMD_BE 0xc7 /* bulk erase */
39 #define EZPORT_CMD_SE 0xd8 /* sector erase */
40
41 #define EZPORT_SECTOR_SIZE 4096
42 #define EZPORT_SECTOR_MASK (EZPORT_SECTOR_SIZE - 1)
43
44 #define EZPORT_STATUS_WIP BIT(0) /* write in progress */
45 #define EZPORT_STATUS_WEN BIT(1) /* write enable */
46 #define EZPORT_STATUS_BEDIS BIT(2) /* bulk erase disable */
47 #define EZPORT_STATUS_FLEXRAM BIT(3) /* FlexRAM mode */
48 #define EZPORT_STATUS_WEF BIT(6) /* write error flag */
49 #define EZPORT_STATUS_FS BIT(7) /* flash security */
50
51 static void ezport_reset(struct gpio_desc *reset)
52 {
53 gpiod_set_value(reset, 1);
54 msleep(EZPORT_RESET_DELAY_MS);
55 gpiod_set_value(reset, 0);
56 msleep(EZPORT_STARTUP_DELAY_MS);
57 }
58
59 static int ezport_start_programming(struct spi_device *spi, struct gpio_desc *reset)
60 {
61 struct spi_message msg;
62 struct spi_transfer assert_cs = {
63 .cs_change = 1,
64 };
65 struct spi_transfer release_cs = { };
66 int ret;
67
68 spi_bus_lock(spi->master);
69
70 /* assert chip select */
71 spi_message_init(&msg);
72 spi_message_add_tail(&assert_cs, &msg);
73 ret = spi_sync_locked(spi, &msg);
74 if (ret)
75 goto fail;
76
77 msleep(EZPORT_STARTUP_DELAY_MS);
78
79 /* reset with asserted chip select to switch into programming mode */
80 ezport_reset(reset);
81
82 /* release chip select */
83 spi_message_init(&msg);
84 spi_message_add_tail(&release_cs, &msg);
85 ret = spi_sync_locked(spi, &msg);
86
87 fail:
88 spi_bus_unlock(spi->master);
89 return ret;
90 }
91
92 static void ezport_stop_programming(struct spi_device *spi, struct gpio_desc *reset)
93 {
94 /* reset without asserted chip select to return into normal mode */
95 spi_bus_lock(spi->master);
96 ezport_reset(reset);
97 spi_bus_unlock(spi->master);
98 }
99
100 static int ezport_get_status_register(struct spi_device *spi)
101 {
102 int ret;
103
104 ret = spi_w8r8(spi, EZPORT_CMD_RDSR);
105 if (ret < 0)
106 return ret;
107 if (ret == 0xff) {
108 dev_err(&spi->dev, "Invalid EzPort status, EzPort is not functional!\n");
109 return -EINVAL;
110 }
111
112 return ret;
113 }
114
115 static int ezport_soft_reset(struct spi_device *spi)
116 {
117 u8 cmd = EZPORT_CMD_RESET;
118 int ret;
119
120 ret = spi_write(spi, &cmd, 1);
121 if (ret < 0)
122 return ret;
123
124 msleep(EZPORT_STARTUP_DELAY_MS);
125
126 return 0;
127 }
128
129 static int ezport_send_simple(struct spi_device *spi, u8 cmd)
130 {
131 int ret;
132
133 ret = spi_write(spi, &cmd, 1);
134 if (ret < 0)
135 return ret;
136
137 return ezport_get_status_register(spi);
138 }
139
140 static int ezport_wait_write(struct spi_device *spi, u32 retries)
141 {
142 int ret;
143 u32 i;
144
145 for (i = 0; i < retries; i++) {
146 ret = ezport_get_status_register(spi);
147 if (ret >= 0 && !(ret & EZPORT_STATUS_WIP))
148 break;
149 msleep(EZPORT_WRITE_WAIT_MS);
150 }
151
152 return ret;
153 }
154
155 static int ezport_write_enable(struct spi_device *spi)
156 {
157 int ret = 0, retries = 3;
158
159 for (retries = 0; retries < 3; retries++) {
160 ret = ezport_send_simple(spi, EZPORT_CMD_WREN);
161 if (ret > 0 && ret & EZPORT_STATUS_WEN)
162 break;
163 }
164
165 if (!(ret & EZPORT_STATUS_WEN)) {
166 dev_err(&spi->dev, "EzPort write enable timed out\n");
167 return -ETIMEDOUT;
168 }
169 return 0;
170 }
171
172 static int ezport_bulk_erase(struct spi_device *spi)
173 {
174 int ret;
175 static const u8 cmd = EZPORT_CMD_BE;
176
177 dev_dbg(&spi->dev, "EzPort bulk erase...\n");
178
179 ret = ezport_write_enable(spi);
180 if (ret < 0)
181 return ret;
182
183 ret = spi_write(spi, &cmd, 1);
184 if (ret < 0)
185 return ret;
186
187 ret = ezport_wait_write(spi, 1000);
188 if (ret < 0)
189 return ret;
190
191 return 0;
192 }
193
194 static int ezport_section_erase(struct spi_device *spi, u32 address)
195 {
196 u8 query[] = {EZPORT_CMD_SE, (address >> 16) & 0xff, (address >> 8) & 0xff, address & 0xff};
197 int ret;
198
199 dev_dbg(&spi->dev, "Ezport section erase @ 0x%06x...\n", address);
200
201 if (address & EZPORT_SECTOR_MASK)
202 return -EINVAL;
203
204 ret = ezport_write_enable(spi);
205 if (ret < 0)
206 return ret;
207
208 ret = spi_write(spi, query, sizeof(query));
209 if (ret < 0)
210 return ret;
211
212 return ezport_wait_write(spi, 200);
213 }
214
215 static int ezport_flash_transfer(struct spi_device *spi, u32 address,
216 const u8 *payload, size_t payload_size)
217 {
218 struct spi_transfer xfers[2] = {};
219 u8 *command;
220 int ret;
221
222 dev_dbg(&spi->dev, "EzPort write %zu bytes @ 0x%06x...\n", payload_size, address);
223
224 ret = ezport_write_enable(spi);
225 if (ret < 0)
226 return ret;
227
228 command = kmalloc(4, GFP_KERNEL | GFP_DMA);
229 if (!command)
230 return -ENOMEM;
231
232 command[0] = EZPORT_CMD_SP;
233 command[1] = address >> 16;
234 command[2] = address >> 8;
235 command[3] = address >> 0;
236
237 xfers[0].tx_buf = command;
238 xfers[0].len = 4;
239
240 xfers[1].tx_buf = payload;
241 xfers[1].len = payload_size;
242
243 ret = spi_sync_transfer(spi, xfers, 2);
244 kfree(command);
245 if (ret < 0)
246 return ret;
247
248 return ezport_wait_write(spi, 40);
249 }
250
251 static int ezport_flash_compare(struct spi_device *spi, u32 address,
252 const u8 *payload, size_t payload_size)
253 {
254 struct spi_transfer xfers[2] = {};
255 u8 *buffer;
256 int ret;
257
258 buffer = kmalloc(payload_size + 5, GFP_KERNEL | GFP_DMA);
259 if (!buffer)
260 return -ENOMEM;
261
262 buffer[0] = EZPORT_CMD_FAST_READ;
263 buffer[1] = address >> 16;
264 buffer[2] = address >> 8;
265 buffer[3] = address >> 0;
266
267 xfers[0].tx_buf = buffer;
268 xfers[0].len = 4;
269 xfers[0].speed_hz = ACHC_FAST_READ_FREQ_HZ;
270
271 xfers[1].rx_buf = buffer + 4;
272 xfers[1].len = payload_size + 1;
273 xfers[1].speed_hz = ACHC_FAST_READ_FREQ_HZ;
274
275 ret = spi_sync_transfer(spi, xfers, 2);
276 if (ret)
277 goto err;
278
279 /* FAST_READ receives one dummy byte before the real data */
280 ret = memcmp(payload, buffer + 4 + 1, payload_size);
281 if (ret) {
282 ret = -EBADMSG;
283 dev_dbg(&spi->dev, "Verification failure @ %06x", address);
284 print_hex_dump_bytes("fw: ", DUMP_PREFIX_OFFSET, payload, payload_size);
285 print_hex_dump_bytes("dev: ", DUMP_PREFIX_OFFSET, buffer + 4, payload_size);
286 }
287
288 err:
289 kfree(buffer);
290 return ret;
291 }
292
293 static int ezport_firmware_compare_data(struct spi_device *spi,
294 const u8 *data, size_t size)
295 {
296 int ret;
297 size_t address = 0;
298 size_t transfer_size;
299
300 dev_dbg(&spi->dev, "EzPort compare data with %zu bytes...\n", size);
301
302 ret = ezport_get_status_register(spi);
303 if (ret < 0)
304 return ret;
305
306 if (ret & EZPORT_STATUS_FS) {
307 dev_info(&spi->dev, "Device is in secure mode (status=0x%02x)!\n", ret);
308 dev_info(&spi->dev, "FW verification is not possible\n");
309 return -EACCES;
310 }
311
312 while (size - address > 0) {
313 transfer_size = min((size_t) EZPORT_TRANSFER_SIZE, size - address);
314
315 ret = ezport_flash_compare(spi, address, data+address, transfer_size);
316 if (ret)
317 return ret;
318
319 address += transfer_size;
320 }
321
322 return 0;
323 }
324
325 static int ezport_firmware_flash_data(struct spi_device *spi,
326 const u8 *data, size_t size)
327 {
328 int ret;
329 size_t address = 0;
330 size_t transfer_size;
331
332 dev_dbg(&spi->dev, "EzPort flash data with %zu bytes...\n", size);
333
334 ret = ezport_get_status_register(spi);
335 if (ret < 0)
336 return ret;
337
338 if (ret & EZPORT_STATUS_FS) {
339 ret = ezport_bulk_erase(spi);
340 if (ret < 0)
341 return ret;
342 if (ret & EZPORT_STATUS_FS)
343 return -EINVAL;
344 }
345
346 while (size - address > 0) {
347 if (!(address & EZPORT_SECTOR_MASK)) {
348 ret = ezport_section_erase(spi, address);
349 if (ret < 0)
350 return ret;
351 if (ret & EZPORT_STATUS_WIP || ret & EZPORT_STATUS_WEF)
352 return -EIO;
353 }
354
355 transfer_size = min((size_t) EZPORT_TRANSFER_SIZE, size - address);
356
357 ret = ezport_flash_transfer(spi, address,
358 data+address, transfer_size);
359 if (ret < 0)
360 return ret;
361 else if (ret & EZPORT_STATUS_WIP)
362 return -ETIMEDOUT;
363 else if (ret & EZPORT_STATUS_WEF)
364 return -EIO;
365
366 address += transfer_size;
367 }
368
369 dev_dbg(&spi->dev, "EzPort verify flashed data...\n");
370 ret = ezport_firmware_compare_data(spi, data, size);
371
372 /* allow missing FW verfication in secure mode */
373 if (ret == -EACCES)
374 ret = 0;
375
376 if (ret < 0)
377 dev_err(&spi->dev, "Failed to verify flashed data: %d\n", ret);
378
379 ret = ezport_soft_reset(spi);
380 if (ret < 0)
381 dev_warn(&spi->dev, "EzPort reset failed!\n");
382
383 return ret;
384 }
385
386 static int ezport_firmware_load(struct spi_device *spi, const char *fwname)
387 {
388 const struct firmware *fw;
389 int ret;
390
391 ret = request_firmware(&fw, fwname, &spi->dev);
392 if (ret) {
393 dev_err(&spi->dev, "Could not get firmware: %d\n", ret);
394 return ret;
395 }
396
397 ret = ezport_firmware_flash_data(spi, fw->data, fw->size);
398
399 release_firmware(fw);
400
401 return ret;
402 }
403
404 /**
405 * ezport_flash - flash device firmware
406 * @spi: SPI device for NXP EzPort interface
407 * @reset: the gpio connected to the device reset pin
408 * @fwname: filename of the firmware that should be flashed
409 *
410 * Context: can sleep
411 *
412 * Return: 0 on success; negative errno on failure
413 */
414 static int ezport_flash(struct spi_device *spi, struct gpio_desc *reset, const char *fwname)
415 {
416 int ret;
417
418 ret = ezport_start_programming(spi, reset);
419 if (ret)
420 return ret;
421
422 ret = ezport_firmware_load(spi, fwname);
423
424 ezport_stop_programming(spi, reset);
425
426 if (ret)
427 dev_err(&spi->dev, "Failed to flash firmware: %d\n", ret);
428 else
429 dev_dbg(&spi->dev, "Finished FW flashing!\n");
430
431 return ret;
432 }
433
434 static ssize_t update_firmware_store(struct device *dev, struct device_attribute *attr,
435 const char *buf, size_t count)
436 {
437 struct achc_data *achc = dev_get_drvdata(dev);
438 unsigned long value;
439 int ret;
440
441 ret = kstrtoul(buf, 0, &value);
442 if (ret < 0 || value != 1)
443 return -EINVAL;
444
445 mutex_lock(&achc->device_lock);
446 ret = ezport_flash(achc->ezport, achc->reset, "achc.bin");
447 mutex_unlock(&achc->device_lock);
448
449 if (ret < 0)
450 return ret;
451
452 return count;
453 }
454 static DEVICE_ATTR_WO(update_firmware);
455
456 static ssize_t reset_show(struct device *dev, struct device_attribute *attr, char *buf)
457 {
458 struct achc_data *achc = dev_get_drvdata(dev);
459 int ret;
460
461 mutex_lock(&achc->device_lock);
462 ret = gpiod_get_value(achc->reset);
463 mutex_unlock(&achc->device_lock);
464
465 if (ret < 0)
466 return ret;
467
468 return sysfs_emit(buf, "%d\n", ret);
469 }
470
471 static ssize_t reset_store(struct device *dev, struct device_attribute *attr,
472 const char *buf, size_t count)
473 {
474 struct achc_data *achc = dev_get_drvdata(dev);
475 unsigned long value;
476 int ret;
477
478 ret = kstrtoul(buf, 0, &value);
479 if (ret < 0 || value > 1)
480 return -EINVAL;
481
482 mutex_lock(&achc->device_lock);
483 gpiod_set_value(achc->reset, value);
484 mutex_unlock(&achc->device_lock);
485
486 return count;
487 }
488 static DEVICE_ATTR_RW(reset);
489
490 static struct attribute *gehc_achc_attrs[] = {
491 &dev_attr_update_firmware.attr,
492 &dev_attr_reset.attr,
493 NULL,
494 };
495 ATTRIBUTE_GROUPS(gehc_achc);
496
497 static void unregister_ezport(void *data)
498 {
499 struct spi_device *ezport = data;
500
501 spi_unregister_device(ezport);
502 }
503
504 static int gehc_achc_probe(struct spi_device *spi)
505 {
506 struct achc_data *achc;
507 int ezport_reg, ret;
508
509 spi->max_speed_hz = ACHC_MAX_FREQ_HZ;
510 spi->bits_per_word = 8;
511 spi->mode = SPI_MODE_0;
512
513 achc = devm_kzalloc(&spi->dev, sizeof(*achc), GFP_KERNEL);
514 if (!achc)
515 return -ENOMEM;
516 spi_set_drvdata(spi, achc);
517 achc->main = spi;
518
519 mutex_init(&achc->device_lock);
520
521 ret = of_property_read_u32_index(spi->dev.of_node, "reg", 1, &ezport_reg);
522 if (ret)
523 return dev_err_probe(&spi->dev, ret, "missing second reg entry!\n");
524
525 achc->ezport = spi_new_ancillary_device(spi, ezport_reg);
526 if (IS_ERR(achc->ezport))
527 return PTR_ERR(achc->ezport);
528
529 ret = devm_add_action_or_reset(&spi->dev, unregister_ezport, achc->ezport);
530 if (ret)
531 return ret;
532
533 achc->reset = devm_gpiod_get(&spi->dev, "reset", GPIOD_OUT_LOW);
534 if (IS_ERR(achc->reset))
535 return dev_err_probe(&spi->dev, PTR_ERR(achc->reset), "Could not get reset gpio\n");
536
537 return 0;
538 }
539
540 static const struct spi_device_id gehc_achc_id[] = {
541 { "ge,achc", 0 },
542 { }
543 };
544 MODULE_DEVICE_TABLE(spi, gehc_achc_id);
545
546 static const struct of_device_id gehc_achc_of_match[] = {
547 { .compatible = "ge,achc" },
548 { /* sentinel */ }
549 };
550 MODULE_DEVICE_TABLE(of, gehc_achc_of_match);
551
552 static struct spi_driver gehc_achc_spi_driver = {
553 .driver = {
554 .name = "gehc-achc",
555 .of_match_table = gehc_achc_of_match,
556 .dev_groups = gehc_achc_groups,
557 },
558 .probe = gehc_achc_probe,
559 .id_table = gehc_achc_id,
560 };
561 module_spi_driver(gehc_achc_spi_driver);
562
563 MODULE_DESCRIPTION("GEHC ACHC driver");
564 MODULE_AUTHOR("Sebastian Reichel <sebastian.reichel@collabora.com>");
565 MODULE_LICENSE("GPL");