ARM: mm: Recreate kernel mappings in early_paging_init()
[linux/fpc-iii.git] / drivers / net / wireless / iwlwifi / iwl-eeprom-read.c
blobe5f2e362ab0b293665636aad41f844e29dfbf34e
1 /******************************************************************************
3 * This file is provided under a dual BSD/GPLv2 license. When using or
4 * redistributing this file, you may do so under either license.
6 * GPL LICENSE SUMMARY
8 * Copyright(c) 2008 - 2013 Intel Corporation. All rights reserved.
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of version 2 of the GNU General Public License as
12 * published by the Free Software Foundation.
14 * This program is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110,
22 * USA
24 * The full GNU General Public License is included in this distribution
25 * in the file called COPYING.
27 * Contact Information:
28 * Intel Linux Wireless <ilw@linux.intel.com>
29 * Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497
31 * BSD LICENSE
33 * Copyright(c) 2005 - 2013 Intel Corporation. All rights reserved.
34 * All rights reserved.
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
38 * are met:
40 * * Redistributions of source code must retain the above copyright
41 * notice, this list of conditions and the following disclaimer.
42 * * Redistributions in binary form must reproduce the above copyright
43 * notice, this list of conditions and the following disclaimer in
44 * the documentation and/or other materials provided with the
45 * distribution.
46 * * Neither the name Intel Corporation nor the names of its
47 * contributors may be used to endorse or promote products derived
48 * from this software without specific prior written permission.
50 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
51 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
52 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
53 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
54 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
55 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
56 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
57 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
58 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
59 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
60 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
61 *****************************************************************************/
62 #include <linux/types.h>
63 #include <linux/slab.h>
64 #include <linux/export.h>
66 #include "iwl-drv.h"
67 #include "iwl-debug.h"
68 #include "iwl-eeprom-read.h"
69 #include "iwl-io.h"
70 #include "iwl-prph.h"
71 #include "iwl-csr.h"
74 * EEPROM access time values:
76 * Driver initiates EEPROM read by writing byte address << 1 to CSR_EEPROM_REG.
77 * Driver then polls CSR_EEPROM_REG for CSR_EEPROM_REG_READ_VALID_MSK (0x1).
78 * When polling, wait 10 uSec between polling loops, up to a maximum 5000 uSec.
79 * Driver reads 16-bit value from bits 31-16 of CSR_EEPROM_REG.
81 #define IWL_EEPROM_ACCESS_TIMEOUT 5000 /* uSec */
83 #define IWL_EEPROM_SEM_TIMEOUT 10 /* microseconds */
84 #define IWL_EEPROM_SEM_RETRY_LIMIT 1000 /* number of attempts (not time) */
88 * The device's EEPROM semaphore prevents conflicts between driver and uCode
89 * when accessing the EEPROM; each access is a series of pulses to/from the
90 * EEPROM chip, not a single event, so even reads could conflict if they
91 * weren't arbitrated by the semaphore.
94 #define EEPROM_SEM_TIMEOUT 10 /* milliseconds */
95 #define EEPROM_SEM_RETRY_LIMIT 1000 /* number of attempts (not time) */
97 static int iwl_eeprom_acquire_semaphore(struct iwl_trans *trans)
99 u16 count;
100 int ret;
102 for (count = 0; count < EEPROM_SEM_RETRY_LIMIT; count++) {
103 /* Request semaphore */
104 iwl_set_bit(trans, CSR_HW_IF_CONFIG_REG,
105 CSR_HW_IF_CONFIG_REG_BIT_EEPROM_OWN_SEM);
107 /* See if we got it */
108 ret = iwl_poll_bit(trans, CSR_HW_IF_CONFIG_REG,
109 CSR_HW_IF_CONFIG_REG_BIT_EEPROM_OWN_SEM,
110 CSR_HW_IF_CONFIG_REG_BIT_EEPROM_OWN_SEM,
111 EEPROM_SEM_TIMEOUT);
112 if (ret >= 0) {
113 IWL_DEBUG_EEPROM(trans->dev,
114 "Acquired semaphore after %d tries.\n",
115 count+1);
116 return ret;
120 return ret;
123 static void iwl_eeprom_release_semaphore(struct iwl_trans *trans)
125 iwl_clear_bit(trans, CSR_HW_IF_CONFIG_REG,
126 CSR_HW_IF_CONFIG_REG_BIT_EEPROM_OWN_SEM);
129 static int iwl_eeprom_verify_signature(struct iwl_trans *trans, bool nvm_is_otp)
131 u32 gp = iwl_read32(trans, CSR_EEPROM_GP) & CSR_EEPROM_GP_VALID_MSK;
133 IWL_DEBUG_EEPROM(trans->dev, "EEPROM signature=0x%08x\n", gp);
135 switch (gp) {
136 case CSR_EEPROM_GP_BAD_SIG_EEP_GOOD_SIG_OTP:
137 if (!nvm_is_otp) {
138 IWL_ERR(trans, "EEPROM with bad signature: 0x%08x\n",
139 gp);
140 return -ENOENT;
142 return 0;
143 case CSR_EEPROM_GP_GOOD_SIG_EEP_LESS_THAN_4K:
144 case CSR_EEPROM_GP_GOOD_SIG_EEP_MORE_THAN_4K:
145 if (nvm_is_otp) {
146 IWL_ERR(trans, "OTP with bad signature: 0x%08x\n", gp);
147 return -ENOENT;
149 return 0;
150 case CSR_EEPROM_GP_BAD_SIGNATURE_BOTH_EEP_AND_OTP:
151 default:
152 IWL_ERR(trans,
153 "bad EEPROM/OTP signature, type=%s, EEPROM_GP=0x%08x\n",
154 nvm_is_otp ? "OTP" : "EEPROM", gp);
155 return -ENOENT;
159 /******************************************************************************
161 * OTP related functions
163 ******************************************************************************/
165 static void iwl_set_otp_access_absolute(struct iwl_trans *trans)
167 iwl_read32(trans, CSR_OTP_GP_REG);
169 iwl_clear_bit(trans, CSR_OTP_GP_REG,
170 CSR_OTP_GP_REG_OTP_ACCESS_MODE);
173 static int iwl_nvm_is_otp(struct iwl_trans *trans)
175 u32 otpgp;
177 /* OTP only valid for CP/PP and after */
178 switch (trans->hw_rev & CSR_HW_REV_TYPE_MSK) {
179 case CSR_HW_REV_TYPE_NONE:
180 IWL_ERR(trans, "Unknown hardware type\n");
181 return -EIO;
182 case CSR_HW_REV_TYPE_5300:
183 case CSR_HW_REV_TYPE_5350:
184 case CSR_HW_REV_TYPE_5100:
185 case CSR_HW_REV_TYPE_5150:
186 return 0;
187 default:
188 otpgp = iwl_read32(trans, CSR_OTP_GP_REG);
189 if (otpgp & CSR_OTP_GP_REG_DEVICE_SELECT)
190 return 1;
191 return 0;
195 static int iwl_init_otp_access(struct iwl_trans *trans)
197 int ret;
199 /* Enable 40MHz radio clock */
200 iwl_write32(trans, CSR_GP_CNTRL,
201 iwl_read32(trans, CSR_GP_CNTRL) |
202 CSR_GP_CNTRL_REG_FLAG_INIT_DONE);
204 /* wait for clock to be ready */
205 ret = iwl_poll_bit(trans, CSR_GP_CNTRL,
206 CSR_GP_CNTRL_REG_FLAG_MAC_CLOCK_READY,
207 CSR_GP_CNTRL_REG_FLAG_MAC_CLOCK_READY,
208 25000);
209 if (ret < 0) {
210 IWL_ERR(trans, "Time out access OTP\n");
211 } else {
212 iwl_set_bits_prph(trans, APMG_PS_CTRL_REG,
213 APMG_PS_CTRL_VAL_RESET_REQ);
214 udelay(5);
215 iwl_clear_bits_prph(trans, APMG_PS_CTRL_REG,
216 APMG_PS_CTRL_VAL_RESET_REQ);
219 * CSR auto clock gate disable bit -
220 * this is only applicable for HW with OTP shadow RAM
222 if (trans->cfg->base_params->shadow_ram_support)
223 iwl_set_bit(trans, CSR_DBG_LINK_PWR_MGMT_REG,
224 CSR_RESET_LINK_PWR_MGMT_DISABLED);
226 return ret;
229 static int iwl_read_otp_word(struct iwl_trans *trans, u16 addr,
230 __le16 *eeprom_data)
232 int ret = 0;
233 u32 r;
234 u32 otpgp;
236 iwl_write32(trans, CSR_EEPROM_REG,
237 CSR_EEPROM_REG_MSK_ADDR & (addr << 1));
238 ret = iwl_poll_bit(trans, CSR_EEPROM_REG,
239 CSR_EEPROM_REG_READ_VALID_MSK,
240 CSR_EEPROM_REG_READ_VALID_MSK,
241 IWL_EEPROM_ACCESS_TIMEOUT);
242 if (ret < 0) {
243 IWL_ERR(trans, "Time out reading OTP[%d]\n", addr);
244 return ret;
246 r = iwl_read32(trans, CSR_EEPROM_REG);
247 /* check for ECC errors: */
248 otpgp = iwl_read32(trans, CSR_OTP_GP_REG);
249 if (otpgp & CSR_OTP_GP_REG_ECC_UNCORR_STATUS_MSK) {
250 /* stop in this case */
251 /* set the uncorrectable OTP ECC bit for acknowledgement */
252 iwl_set_bit(trans, CSR_OTP_GP_REG,
253 CSR_OTP_GP_REG_ECC_UNCORR_STATUS_MSK);
254 IWL_ERR(trans, "Uncorrectable OTP ECC error, abort OTP read\n");
255 return -EINVAL;
257 if (otpgp & CSR_OTP_GP_REG_ECC_CORR_STATUS_MSK) {
258 /* continue in this case */
259 /* set the correctable OTP ECC bit for acknowledgement */
260 iwl_set_bit(trans, CSR_OTP_GP_REG,
261 CSR_OTP_GP_REG_ECC_CORR_STATUS_MSK);
262 IWL_ERR(trans, "Correctable OTP ECC error, continue read\n");
264 *eeprom_data = cpu_to_le16(r >> 16);
265 return 0;
269 * iwl_is_otp_empty: check for empty OTP
271 static bool iwl_is_otp_empty(struct iwl_trans *trans)
273 u16 next_link_addr = 0;
274 __le16 link_value;
275 bool is_empty = false;
277 /* locate the beginning of OTP link list */
278 if (!iwl_read_otp_word(trans, next_link_addr, &link_value)) {
279 if (!link_value) {
280 IWL_ERR(trans, "OTP is empty\n");
281 is_empty = true;
283 } else {
284 IWL_ERR(trans, "Unable to read first block of OTP list.\n");
285 is_empty = true;
288 return is_empty;
293 * iwl_find_otp_image: find EEPROM image in OTP
294 * finding the OTP block that contains the EEPROM image.
295 * the last valid block on the link list (the block _before_ the last block)
296 * is the block we should read and used to configure the device.
297 * If all the available OTP blocks are full, the last block will be the block
298 * we should read and used to configure the device.
299 * only perform this operation if shadow RAM is disabled
301 static int iwl_find_otp_image(struct iwl_trans *trans,
302 u16 *validblockaddr)
304 u16 next_link_addr = 0, valid_addr;
305 __le16 link_value = 0;
306 int usedblocks = 0;
308 /* set addressing mode to absolute to traverse the link list */
309 iwl_set_otp_access_absolute(trans);
311 /* checking for empty OTP or error */
312 if (iwl_is_otp_empty(trans))
313 return -EINVAL;
316 * start traverse link list
317 * until reach the max number of OTP blocks
318 * different devices have different number of OTP blocks
320 do {
321 /* save current valid block address
322 * check for more block on the link list
324 valid_addr = next_link_addr;
325 next_link_addr = le16_to_cpu(link_value) * sizeof(u16);
326 IWL_DEBUG_EEPROM(trans->dev, "OTP blocks %d addr 0x%x\n",
327 usedblocks, next_link_addr);
328 if (iwl_read_otp_word(trans, next_link_addr, &link_value))
329 return -EINVAL;
330 if (!link_value) {
332 * reach the end of link list, return success and
333 * set address point to the starting address
334 * of the image
336 *validblockaddr = valid_addr;
337 /* skip first 2 bytes (link list pointer) */
338 *validblockaddr += 2;
339 return 0;
341 /* more in the link list, continue */
342 usedblocks++;
343 } while (usedblocks <= trans->cfg->base_params->max_ll_items);
345 /* OTP has no valid blocks */
346 IWL_DEBUG_EEPROM(trans->dev, "OTP has no valid blocks\n");
347 return -EINVAL;
351 * iwl_read_eeprom - read EEPROM contents
353 * Load the EEPROM contents from adapter and return it
354 * and its size.
356 * NOTE: This routine uses the non-debug IO access functions.
358 int iwl_read_eeprom(struct iwl_trans *trans, u8 **eeprom, size_t *eeprom_size)
360 __le16 *e;
361 u32 gp = iwl_read32(trans, CSR_EEPROM_GP);
362 int sz;
363 int ret;
364 u16 addr;
365 u16 validblockaddr = 0;
366 u16 cache_addr = 0;
367 int nvm_is_otp;
369 if (!eeprom || !eeprom_size)
370 return -EINVAL;
372 nvm_is_otp = iwl_nvm_is_otp(trans);
373 if (nvm_is_otp < 0)
374 return nvm_is_otp;
376 sz = trans->cfg->base_params->eeprom_size;
377 IWL_DEBUG_EEPROM(trans->dev, "NVM size = %d\n", sz);
379 e = kmalloc(sz, GFP_KERNEL);
380 if (!e)
381 return -ENOMEM;
383 ret = iwl_eeprom_verify_signature(trans, nvm_is_otp);
384 if (ret < 0) {
385 IWL_ERR(trans, "EEPROM not found, EEPROM_GP=0x%08x\n", gp);
386 goto err_free;
389 /* Make sure driver (instead of uCode) is allowed to read EEPROM */
390 ret = iwl_eeprom_acquire_semaphore(trans);
391 if (ret < 0) {
392 IWL_ERR(trans, "Failed to acquire EEPROM semaphore.\n");
393 goto err_free;
396 if (nvm_is_otp) {
397 ret = iwl_init_otp_access(trans);
398 if (ret) {
399 IWL_ERR(trans, "Failed to initialize OTP access.\n");
400 goto err_unlock;
403 iwl_write32(trans, CSR_EEPROM_GP,
404 iwl_read32(trans, CSR_EEPROM_GP) &
405 ~CSR_EEPROM_GP_IF_OWNER_MSK);
407 iwl_set_bit(trans, CSR_OTP_GP_REG,
408 CSR_OTP_GP_REG_ECC_CORR_STATUS_MSK |
409 CSR_OTP_GP_REG_ECC_UNCORR_STATUS_MSK);
410 /* traversing the linked list if no shadow ram supported */
411 if (!trans->cfg->base_params->shadow_ram_support) {
412 ret = iwl_find_otp_image(trans, &validblockaddr);
413 if (ret)
414 goto err_unlock;
416 for (addr = validblockaddr; addr < validblockaddr + sz;
417 addr += sizeof(u16)) {
418 __le16 eeprom_data;
420 ret = iwl_read_otp_word(trans, addr, &eeprom_data);
421 if (ret)
422 goto err_unlock;
423 e[cache_addr / 2] = eeprom_data;
424 cache_addr += sizeof(u16);
426 } else {
427 /* eeprom is an array of 16bit values */
428 for (addr = 0; addr < sz; addr += sizeof(u16)) {
429 u32 r;
431 iwl_write32(trans, CSR_EEPROM_REG,
432 CSR_EEPROM_REG_MSK_ADDR & (addr << 1));
434 ret = iwl_poll_bit(trans, CSR_EEPROM_REG,
435 CSR_EEPROM_REG_READ_VALID_MSK,
436 CSR_EEPROM_REG_READ_VALID_MSK,
437 IWL_EEPROM_ACCESS_TIMEOUT);
438 if (ret < 0) {
439 IWL_ERR(trans,
440 "Time out reading EEPROM[%d]\n", addr);
441 goto err_unlock;
443 r = iwl_read32(trans, CSR_EEPROM_REG);
444 e[addr / 2] = cpu_to_le16(r >> 16);
448 IWL_DEBUG_EEPROM(trans->dev, "NVM Type: %s\n",
449 nvm_is_otp ? "OTP" : "EEPROM");
451 iwl_eeprom_release_semaphore(trans);
453 *eeprom_size = sz;
454 *eeprom = (u8 *)e;
455 return 0;
457 err_unlock:
458 iwl_eeprom_release_semaphore(trans);
459 err_free:
460 kfree(e);
462 return ret;
464 IWL_EXPORT_SYMBOL(iwl_read_eeprom);