Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v5.5-rc5 413 lines 12 kB view raw
1// SPDX-License-Identifier: GPL-2.0-only 2/* 3 * Firmware loading. 4 * 5 * Copyright (c) 2017-2019, Silicon Laboratories, Inc. 6 * Copyright (c) 2010, ST-Ericsson 7 */ 8#include <linux/firmware.h> 9#include <linux/slab.h> 10#include <linux/mm.h> 11#include <linux/bitfield.h> 12 13#include "fwio.h" 14#include "wfx.h" 15#include "hwio.h" 16 17// Addresses below are in SRAM area 18#define WFX_DNLD_FIFO 0x09004000 19#define DNLD_BLOCK_SIZE 0x0400 20#define DNLD_FIFO_SIZE 0x8000 // (32 * DNLD_BLOCK_SIZE) 21// Download Control Area (DCA) 22#define WFX_DCA_IMAGE_SIZE 0x0900C000 23#define WFX_DCA_PUT 0x0900C004 24#define WFX_DCA_GET 0x0900C008 25#define WFX_DCA_HOST_STATUS 0x0900C00C 26#define HOST_READY 0x87654321 27#define HOST_INFO_READ 0xA753BD99 28#define HOST_UPLOAD_PENDING 0xABCDDCBA 29#define HOST_UPLOAD_COMPLETE 0xD4C64A99 30#define HOST_OK_TO_JUMP 0x174FC882 31#define WFX_DCA_NCP_STATUS 0x0900C010 32#define NCP_NOT_READY 0x12345678 33#define NCP_READY 0x87654321 34#define NCP_INFO_READY 0xBD53EF99 35#define NCP_DOWNLOAD_PENDING 0xABCDDCBA 36#define NCP_DOWNLOAD_COMPLETE 0xCAFEFECA 37#define NCP_AUTH_OK 0xD4C64A99 38#define NCP_AUTH_FAIL 0x174FC882 39#define NCP_PUB_KEY_RDY 0x7AB41D19 40#define WFX_DCA_FW_SIGNATURE 0x0900C014 41#define FW_SIGNATURE_SIZE 0x40 42#define WFX_DCA_FW_HASH 0x0900C054 43#define FW_HASH_SIZE 0x08 44#define WFX_DCA_FW_VERSION 0x0900C05C 45#define FW_VERSION_SIZE 0x04 46#define WFX_DCA_RESERVED 0x0900C060 47#define DCA_RESERVED_SIZE 0x20 48#define WFX_STATUS_INFO 0x0900C080 49#define WFX_BOOTLOADER_LABEL 0x0900C084 50#define BOOTLOADER_LABEL_SIZE 0x3C 51#define WFX_PTE_INFO 0x0900C0C0 52#define PTE_INFO_KEYSET_IDX 0x0D 53#define PTE_INFO_SIZE 0x10 54#define WFX_ERR_INFO 0x0900C0D0 55#define ERR_INVALID_SEC_TYPE 0x05 56#define ERR_SIG_VERIF_FAILED 0x0F 57#define ERR_AES_CTRL_KEY 0x10 58#define ERR_ECC_PUB_KEY 0x11 59#define ERR_MAC_KEY 0x18 60 61#define DCA_TIMEOUT 50 // milliseconds 62#define WAKEUP_TIMEOUT 200 // milliseconds 63 64static const char * const fwio_error_strings[] = { 65 [ERR_INVALID_SEC_TYPE] = "Invalid section type or wrong encryption", 66 [ERR_SIG_VERIF_FAILED] = "Signature verification failed", 67 [ERR_AES_CTRL_KEY] = "AES control key not initialized", 68 [ERR_ECC_PUB_KEY] = "ECC public key not initialized", 69 [ERR_MAC_KEY] = "MAC key not initialized", 70}; 71 72/* 73 * request_firmware() allocate data using vmalloc(). It is not compatible with 74 * underlying hardware that use DMA. Function below detect this case and 75 * allocate a bounce buffer if necessary. 76 * 77 * Notice that, in doubt, you can enable CONFIG_DEBUG_SG to ask kernel to 78 * detect this problem at runtime (else, kernel silently fail). 79 * 80 * NOTE: it may also be possible to use 'pages' from struct firmware and avoid 81 * bounce buffer 82 */ 83static int sram_write_dma_safe(struct wfx_dev *wdev, u32 addr, const u8 *buf, 84 size_t len) 85{ 86 int ret; 87 const u8 *tmp; 88 89 if (!virt_addr_valid(buf)) { 90 tmp = kmemdup(buf, len, GFP_KERNEL); 91 if (!tmp) 92 return -ENOMEM; 93 } else { 94 tmp = buf; 95 } 96 ret = sram_buf_write(wdev, addr, tmp, len); 97 if (!virt_addr_valid(buf)) 98 kfree(tmp); 99 return ret; 100} 101 102int get_firmware(struct wfx_dev *wdev, u32 keyset_chip, 103 const struct firmware **fw, int *file_offset) 104{ 105 int keyset_file; 106 char filename[256]; 107 const char *data; 108 int ret; 109 110 snprintf(filename, sizeof(filename), "%s_%02X.sec", wdev->pdata.file_fw, 111 keyset_chip); 112 ret = firmware_request_nowarn(fw, filename, wdev->dev); 113 if (ret) { 114 dev_info(wdev->dev, "can't load %s, falling back to %s.sec\n", 115 filename, wdev->pdata.file_fw); 116 snprintf(filename, sizeof(filename), "%s.sec", 117 wdev->pdata.file_fw); 118 ret = request_firmware(fw, filename, wdev->dev); 119 if (ret) { 120 dev_err(wdev->dev, "can't load %s\n", filename); 121 *fw = NULL; 122 return ret; 123 } 124 } 125 126 data = (*fw)->data; 127 if (memcmp(data, "KEYSET", 6) != 0) { 128 // Legacy firmware format 129 *file_offset = 0; 130 keyset_file = 0x90; 131 } else { 132 *file_offset = 8; 133 keyset_file = (hex_to_bin(data[6]) * 16) | hex_to_bin(data[7]); 134 if (keyset_file < 0) { 135 dev_err(wdev->dev, "%s corrupted\n", filename); 136 release_firmware(*fw); 137 *fw = NULL; 138 return -EINVAL; 139 } 140 } 141 if (keyset_file != keyset_chip) { 142 dev_err(wdev->dev, "firmware keyset is incompatible with chip (file: 0x%02X, chip: 0x%02X)\n", 143 keyset_file, keyset_chip); 144 release_firmware(*fw); 145 *fw = NULL; 146 return -ENODEV; 147 } 148 wdev->keyset = keyset_file; 149 return 0; 150} 151 152static int wait_ncp_status(struct wfx_dev *wdev, u32 status) 153{ 154 ktime_t now, start; 155 u32 reg; 156 int ret; 157 158 start = ktime_get(); 159 for (;;) { 160 ret = sram_reg_read(wdev, WFX_DCA_NCP_STATUS, &reg); 161 if (ret < 0) 162 return -EIO; 163 now = ktime_get(); 164 if (reg == status) 165 break; 166 if (ktime_after(now, ktime_add_ms(start, DCA_TIMEOUT))) 167 return -ETIMEDOUT; 168 } 169 if (ktime_compare(now, start)) 170 dev_dbg(wdev->dev, "chip answer after %lldus\n", 171 ktime_us_delta(now, start)); 172 else 173 dev_dbg(wdev->dev, "chip answer immediately\n"); 174 return 0; 175} 176 177static int upload_firmware(struct wfx_dev *wdev, const u8 *data, size_t len) 178{ 179 int ret; 180 u32 offs, bytes_done; 181 ktime_t now, start; 182 183 if (len % DNLD_BLOCK_SIZE) { 184 dev_err(wdev->dev, "firmware size is not aligned. Buffer overrun will occur\n"); 185 return -EIO; 186 } 187 offs = 0; 188 while (offs < len) { 189 start = ktime_get(); 190 for (;;) { 191 ret = sram_reg_read(wdev, WFX_DCA_GET, &bytes_done); 192 if (ret < 0) 193 return ret; 194 now = ktime_get(); 195 if (offs + 196 DNLD_BLOCK_SIZE - bytes_done < DNLD_FIFO_SIZE) 197 break; 198 if (ktime_after(now, ktime_add_ms(start, DCA_TIMEOUT))) 199 return -ETIMEDOUT; 200 } 201 if (ktime_compare(now, start)) 202 dev_dbg(wdev->dev, "answer after %lldus\n", 203 ktime_us_delta(now, start)); 204 205 ret = sram_write_dma_safe(wdev, WFX_DNLD_FIFO + 206 (offs % DNLD_FIFO_SIZE), 207 data + offs, DNLD_BLOCK_SIZE); 208 if (ret < 0) 209 return ret; 210 211 // WFx seems to not support writing 0 in this register during 212 // first loop 213 offs += DNLD_BLOCK_SIZE; 214 ret = sram_reg_write(wdev, WFX_DCA_PUT, offs); 215 if (ret < 0) 216 return ret; 217 } 218 return 0; 219} 220 221static void print_boot_status(struct wfx_dev *wdev) 222{ 223 u32 val32; 224 225 sram_reg_read(wdev, WFX_STATUS_INFO, &val32); 226 if (val32 == 0x12345678) { 227 dev_info(wdev->dev, "no error reported by secure boot\n"); 228 } else { 229 sram_reg_read(wdev, WFX_ERR_INFO, &val32); 230 if (val32 < ARRAY_SIZE(fwio_error_strings) && 231 fwio_error_strings[val32]) 232 dev_info(wdev->dev, "secure boot error: %s\n", 233 fwio_error_strings[val32]); 234 else 235 dev_info(wdev->dev, 236 "secure boot error: Unknown (0x%02x)\n", 237 val32); 238 } 239} 240 241static int load_firmware_secure(struct wfx_dev *wdev) 242{ 243 const struct firmware *fw = NULL; 244 int header_size; 245 int fw_offset; 246 ktime_t start; 247 u8 *buf; 248 int ret; 249 250 BUILD_BUG_ON(PTE_INFO_SIZE > BOOTLOADER_LABEL_SIZE); 251 buf = kmalloc(BOOTLOADER_LABEL_SIZE + 1, GFP_KERNEL); 252 if (!buf) 253 return -ENOMEM; 254 255 sram_reg_write(wdev, WFX_DCA_HOST_STATUS, HOST_READY); 256 ret = wait_ncp_status(wdev, NCP_INFO_READY); 257 if (ret) 258 goto error; 259 260 sram_buf_read(wdev, WFX_BOOTLOADER_LABEL, buf, BOOTLOADER_LABEL_SIZE); 261 buf[BOOTLOADER_LABEL_SIZE] = 0; 262 dev_dbg(wdev->dev, "bootloader: \"%s\"\n", buf); 263 264 sram_buf_read(wdev, WFX_PTE_INFO, buf, PTE_INFO_SIZE); 265 ret = get_firmware(wdev, buf[PTE_INFO_KEYSET_IDX], &fw, &fw_offset); 266 if (ret) 267 goto error; 268 header_size = fw_offset + FW_SIGNATURE_SIZE + FW_HASH_SIZE; 269 270 sram_reg_write(wdev, WFX_DCA_HOST_STATUS, HOST_INFO_READ); 271 ret = wait_ncp_status(wdev, NCP_READY); 272 if (ret) 273 goto error; 274 275 sram_reg_write(wdev, WFX_DNLD_FIFO, 0xFFFFFFFF); // Fifo init 276 sram_write_dma_safe(wdev, WFX_DCA_FW_VERSION, "\x01\x00\x00\x00", 277 FW_VERSION_SIZE); 278 sram_write_dma_safe(wdev, WFX_DCA_FW_SIGNATURE, fw->data + fw_offset, 279 FW_SIGNATURE_SIZE); 280 sram_write_dma_safe(wdev, WFX_DCA_FW_HASH, 281 fw->data + fw_offset + FW_SIGNATURE_SIZE, 282 FW_HASH_SIZE); 283 sram_reg_write(wdev, WFX_DCA_IMAGE_SIZE, fw->size - header_size); 284 sram_reg_write(wdev, WFX_DCA_HOST_STATUS, HOST_UPLOAD_PENDING); 285 ret = wait_ncp_status(wdev, NCP_DOWNLOAD_PENDING); 286 if (ret) 287 goto error; 288 289 start = ktime_get(); 290 ret = upload_firmware(wdev, fw->data + header_size, 291 fw->size - header_size); 292 if (ret) 293 goto error; 294 dev_dbg(wdev->dev, "firmware load after %lldus\n", 295 ktime_us_delta(ktime_get(), start)); 296 297 sram_reg_write(wdev, WFX_DCA_HOST_STATUS, HOST_UPLOAD_COMPLETE); 298 ret = wait_ncp_status(wdev, NCP_AUTH_OK); 299 // Legacy ROM support 300 if (ret < 0) 301 ret = wait_ncp_status(wdev, NCP_PUB_KEY_RDY); 302 if (ret < 0) 303 goto error; 304 sram_reg_write(wdev, WFX_DCA_HOST_STATUS, HOST_OK_TO_JUMP); 305 306error: 307 kfree(buf); 308 if (fw) 309 release_firmware(fw); 310 if (ret) 311 print_boot_status(wdev); 312 return ret; 313} 314 315static int init_gpr(struct wfx_dev *wdev) 316{ 317 int ret, i; 318 static const struct { 319 int index; 320 u32 value; 321 } gpr_init[] = { 322 { 0x07, 0x208775 }, 323 { 0x08, 0x2EC020 }, 324 { 0x09, 0x3C3C3C }, 325 { 0x0B, 0x322C44 }, 326 { 0x0C, 0xA06497 }, 327 }; 328 329 for (i = 0; i < ARRAY_SIZE(gpr_init); i++) { 330 ret = igpr_reg_write(wdev, gpr_init[i].index, 331 gpr_init[i].value); 332 if (ret < 0) 333 return ret; 334 dev_dbg(wdev->dev, " index %02x: %08x\n", gpr_init[i].index, 335 gpr_init[i].value); 336 } 337 return 0; 338} 339 340int wfx_init_device(struct wfx_dev *wdev) 341{ 342 int ret; 343 int hw_revision, hw_type; 344 int wakeup_timeout = 50; // ms 345 ktime_t now, start; 346 u32 reg; 347 348 reg = CFG_DIRECT_ACCESS_MODE | CFG_CPU_RESET | CFG_WORD_MODE2; 349 if (wdev->pdata.use_rising_clk) 350 reg |= CFG_CLK_RISE_EDGE; 351 ret = config_reg_write(wdev, reg); 352 if (ret < 0) { 353 dev_err(wdev->dev, "bus returned an error during first write access. Host configuration error?\n"); 354 return -EIO; 355 } 356 357 ret = config_reg_read(wdev, &reg); 358 if (ret < 0) { 359 dev_err(wdev->dev, "bus returned an error during first read access. Bus configuration error?\n"); 360 return -EIO; 361 } 362 if (reg == 0 || reg == ~0) { 363 dev_err(wdev->dev, "chip mute. Bus configuration error or chip wasn't reset?\n"); 364 return -EIO; 365 } 366 dev_dbg(wdev->dev, "initial config register value: %08x\n", reg); 367 368 hw_revision = FIELD_GET(CFG_DEVICE_ID_MAJOR, reg); 369 if (hw_revision == 0 || hw_revision > 2) { 370 dev_err(wdev->dev, "bad hardware revision number: %d\n", 371 hw_revision); 372 return -ENODEV; 373 } 374 hw_type = FIELD_GET(CFG_DEVICE_ID_TYPE, reg); 375 if (hw_type == 1) { 376 dev_notice(wdev->dev, "development hardware detected\n"); 377 wakeup_timeout = 2000; 378 } 379 380 ret = init_gpr(wdev); 381 if (ret < 0) 382 return ret; 383 384 ret = control_reg_write(wdev, CTRL_WLAN_WAKEUP); 385 if (ret < 0) 386 return -EIO; 387 start = ktime_get(); 388 for (;;) { 389 ret = control_reg_read(wdev, &reg); 390 now = ktime_get(); 391 if (reg & CTRL_WLAN_READY) 392 break; 393 if (ktime_after(now, ktime_add_ms(start, wakeup_timeout))) { 394 dev_err(wdev->dev, "chip didn't wake up. Chip wasn't reset?\n"); 395 return -ETIMEDOUT; 396 } 397 } 398 dev_dbg(wdev->dev, "chip wake up after %lldus\n", 399 ktime_us_delta(now, start)); 400 401 ret = config_reg_write_bits(wdev, CFG_CPU_RESET, 0); 402 if (ret < 0) 403 return ret; 404 ret = load_firmware_secure(wdev); 405 if (ret < 0) 406 return ret; 407 ret = config_reg_write_bits(wdev, 408 CFG_DIRECT_ACCESS_MODE | 409 CFG_IRQ_ENABLE_DATA | 410 CFG_IRQ_ENABLE_WRDY, 411 CFG_IRQ_ENABLE_DATA); 412 return ret; 413}