From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 197F51075262 for ; Thu, 19 Mar 2026 06:32:22 +0000 (UTC) Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 6BE2310E85B; Thu, 19 Mar 2026 06:32:21 +0000 (UTC) Authentication-Results: gabe.freedesktop.org; dkim=pass (2048-bit key; unprotected) header.d=qualcomm.com header.i=@qualcomm.com header.b="ebcPUkaW"; dkim=pass (2048-bit key; unprotected) header.d=oss.qualcomm.com header.i=@oss.qualcomm.com header.b="hnvM5TFe"; dkim-atps=neutral Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by gabe.freedesktop.org (Postfix) with ESMTPS id F41DF10E85B for ; Thu, 19 Mar 2026 06:32:19 +0000 (UTC) Received: from pps.filterd (m0279873.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 62J5XNEW1369776 for ; Thu, 19 Mar 2026 06:32:19 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qualcomm.com; h= cc:content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=qcppdkim1; bh= SK5UC/KQfXR1hLzmHDReuvjdixzY1PbWgrbCpHiLeF0=; b=ebcPUkaW9oJu8yva 0yfSTPPAgxp/thYUY/nTBkttzRAKiZ4RXwFsDqG4aYFYJsoEukWedCLP0MsVfnei UlgcCYcVStIGnJKk8ashT+wSYlSGgiPJe063d0Rcjvc4RtNEZolQbMwmj3HtibYi Ns7C1uKipKzCglVwmv4GnMLiCSlRbBJc10ntlJtardQS1EFUXdaUk2uUxROdfmZ7 Oz2/0tqNUUlr4o7Xii8RyDPAV+t/5TEBsSxGXjeDuoVRLKkdZsFnVZnRoXcakUgt mEe5HIoH9cNbVNhLHrk6QCssPYOrIuWSqO16Ll1bcbBzbSM9VzdZJ5jfPQp1Y6cu 1wZxMw== Received: from mail-pl1-f198.google.com (mail-pl1-f198.google.com [209.85.214.198]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 4d0akxg90e-1 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT) for ; Thu, 19 Mar 2026 06:32:18 +0000 (GMT) Received: by mail-pl1-f198.google.com with SMTP id d9443c01a7336-2aeb90532f6so7674135ad.0 for ; Wed, 18 Mar 2026 23:32:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oss.qualcomm.com; s=google; t=1773901938; x=1774506738; darn=lists.freedesktop.org; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:from:to:cc:subject:date:message-id :reply-to; bh=SK5UC/KQfXR1hLzmHDReuvjdixzY1PbWgrbCpHiLeF0=; b=hnvM5TFehObQIjhaEJW+rtfdsD0qTRmCzBym4YPgXLrkLd1d2xsQ78B9o88zCEbeQ5 nAZ0Ds6NXtWXzv8PpAGdd5rT3WY8jESSXWw2lKubFLuXIuRnr3sNl0NU9QyZKbAz+Ar4 667DOK2bAlw+LRHE0+q0J2Qw4uhkr8C31LcK3EF+hsCj2T3Y4G1ZbnT3OW0oQHY0hmBB 2d2U94n2QoZLu0642N5fQJ9lMQ5SrZf6HS6szurB9oFMup24ZhBnnzJu3NqyTaRk3e/y BKPNiCYsLXCdyjjuEIrEVT4R8UckPauPfEtOcU+7fj6jYS2aHrTnWPdewaY9GBKXFk+m o6cg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1773901938; x=1774506738; h=cc:to:in-reply-to:references:message-id:content-transfer-encoding :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=SK5UC/KQfXR1hLzmHDReuvjdixzY1PbWgrbCpHiLeF0=; b=Xc3/BSW8DV/9NZy7TajrrxspHY+Ax5H5AStdqyKwhuT0au9Daswt2gWUauEFxn6mPh Lly4ZtDWVw7vVSrLvn4UiqYXhraDCXaV0RWgN59p7lPZF+ifSUbqDvD0hUNwZQIr90he NtJqEHsNs0L3RBolyGQkKbcfY8S7rSgMG7gnMMXmUrl2Gd+YH14B++U6X703GI3Fbqyl DtFNrm4YztBuEYdDLyHd1d/lTR1MaXpWS5h7jHBAkvtXHMF/IOwTkeBgRRO8fl2/kq/G 0ozjelPWn3eRBktaHrv20t55ZpoCwI1b4RXOH+wjTYun5JPBIrxaLALuS6vtrwglW7lD q4ZA== X-Forwarded-Encrypted: i=1; AJvYcCWR2eqVDAMqUTskqABPrpSNJFYk6C86oYkGtKV0Y09vy9rDJnvfZ8t0C9yR7Uk9it7UQ3Uw5PVXcHg=@lists.freedesktop.org X-Gm-Message-State: AOJu0Yx22EUxZ5L4Hf2SiGeGoB7fI4zA4LCPMbpMLsaCX75Yx8MbnIBJ MeNmCmn45aDtBg7ZlnR+NPhyy2/u3QuxG2tea2jPaoO7xrC6R8hF/PecBMZ95/KgC/pLLVI9Prn R99nPxPxv7ShH/KDZiqL0o1BkaamFuFZDTq5NuSaO93d2cM651Y4ucOA901+D6/tIcyDWnKI= X-Gm-Gg: ATEYQzy/uyLFe7qXmJXjBmEDCla3vNWT9u5R+w1bdzMzXgEFFU8/abhJs0gLrwT5boz aQ1zq2pc8GkQDC64SRH3SMrhLVVGRCnSuwbglvMYu9YsGZizR6AFZWhZENGCVew8tB2g1PkpAEN nx0OiCjotQdXO3C8Wy1s7ATT6+HjWdTr035No9Cc+J6mfWOATduJRInM/QaNQfhuaoNNPSSiYOC iRmge5fdClLFn8jfAlatI/gPrMnN+5R7PhFeLTvRIVoDG9cnkxW6DeVGvVfu/K/tHovoHYUNHa8 b2PN+xUq9+kCnJ1rYmyq7ccoEAY70Wf8VdVKhZ1BiqDiQx0R0CQ72IB8sTYRgKJVq1eoTJ+q3/C 8AatXw8tTU4bj0F//WaPsy86IUh3orY6mle0es3MUeyDX+/HzewA= X-Received: by 2002:a17:902:da8e:b0:2b0:694d:f5db with SMTP id d9443c01a7336-2b06e45c620mr59693335ad.52.1773901937942; Wed, 18 Mar 2026 23:32:17 -0700 (PDT) X-Received: by 2002:a17:902:da8e:b0:2b0:694d:f5db with SMTP id d9443c01a7336-2b06e45c620mr59692945ad.52.1773901937400; Wed, 18 Mar 2026 23:32:17 -0700 (PDT) Received: from hu-batta-hyd.qualcomm.com ([202.46.23.25]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2b06e603937sm48572485ad.57.2026.03.18.23.32.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Mar 2026 23:32:17 -0700 (PDT) From: Kishore Batta Date: Thu, 19 Mar 2026 12:01:47 +0530 Subject: [PATCH v4 7/9] bus: mhi: Capture DDR training data using command mode MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20260319-sahara_protocol_new_v2-v4-7-47ad79308762@oss.qualcomm.com> References: <20260319-sahara_protocol_new_v2-v4-0-47ad79308762@oss.qualcomm.com> In-Reply-To: <20260319-sahara_protocol_new_v2-v4-0-47ad79308762@oss.qualcomm.com> To: Jonathan Corbet , Shuah Khan , Jeff Hugo , Carl Vanderlip , Oded Gabbay , Manivannan Sadhasivam , andersson@kernel.org Cc: linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, dri-devel@lists.freedesktop.org, mhi@lists.linux.dev, Kishore Batta X-Mailer: b4 0.14.2 X-Developer-Signature: v=1; a=ed25519-sha256; t=1773901902; l=14768; i=kishore.batta@oss.qualcomm.com; s=20260206; h=from:subject:message-id; bh=P1IzXcVjmKfRaow4rEqobZUMjX/s+CE8w3S3MJsIlfk=; b=zEC/kYGnB124qB+qHzLb8dKZywS62/Cl00jR0RZRUisp+8C8Si1G/MwO7qNaAqgn3Pgw9a9TN mynQKR6ZiriCL5/2I2vEGiHkIf0/xeQuy9Lq3u6PAzU+ZXnyuvbXPL0 X-Developer-Key: i=kishore.batta@oss.qualcomm.com; a=ed25519; pk=vJo8RvTf+HZpRLK2oOIljmbn9l3zFkibCGh+blaqZCw= X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwMzE5MDA0OSBTYWx0ZWRfXy5HTm6I/LD4h 495kRtv5C3/AcuAieEybKk9vgrX3b3dCOg1/XvT7jzPFfzJi99DdENv1oaW0eySV6SXnd474R2L 7qU+9AT4KMc6bs/u8eYEeayQ/yTEIo8XfPXQwaTPgPZ9J9PTPfcB8kgvAOj8ftsm7/yg6oykKca btP42fKgGRoGJlVWXck7dkWQukfKcKefgrTJt/faJFlF16OGXgOBfWg+MSzzDGRkSrO1kSLW2LN sYFSpPRyE9rT7+SBh+j74u6sTBLeAvDLqWpHeK6l36utAVBZIGMeWMcxq7/rR0u7q5MKM7/RDU0 bmfIHPArYm8kwq/JlDucsNy2FPAa7f4+Jl9K/U0N8fKE0bH7rbQqWYJZb9j5hPR6MIYnDOBI9zT qwJrWzjhia9wSBu/FnLQQgi9Swr+IzXttN+NER9DAr0TW/4yrTLeXW6/wyRWrzQs+I+h2bzFLvU hNomKNQXK6ahulGnHNg== X-Proofpoint-GUID: USpLEV7f7k2BISAb-Pl_TNGTKbTbu1Js X-Authority-Analysis: v=2.4 cv=ZeMQ98VA c=1 sm=1 tr=0 ts=69bb9873 cx=c_pps a=MTSHoo12Qbhz2p7MsH1ifg==:117 a=ZePRamnt/+rB5gQjfz0u9A==:17 a=IkcTkHD0fZMA:10 a=Yq5XynenixoA:10 a=s4-Qcg_JpJYA:10 a=VkNPw1HP01LnGYTKEx00:22 a=u7WPNUs3qKkmUXheDGA7:22 a=rJkE3RaqiGZ5pbrm-msn:22 a=EUspDBNiAAAA:8 a=_u4x-iUupSARUiuVX_kA:9 a=QEXdDO2ut3YA:10 a=GvdueXVYPmCkWapjIL-Q:22 X-Proofpoint-ORIG-GUID: USpLEV7f7k2BISAb-Pl_TNGTKbTbu1Js X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-03-19_01,2026-03-17_02,2025-10-01_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 impostorscore=0 malwarescore=0 priorityscore=1501 adultscore=0 bulkscore=0 clxscore=1015 spamscore=0 suspectscore=0 phishscore=0 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2603050001 definitions=main-2603190049 X-BeenThere: dri-devel@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Direct Rendering Infrastructure - Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dri-devel-bounces@lists.freedesktop.org Sender: "dri-devel" During early boot, devices may perform DDR training and produce training data that can be reused on subsequent boots to reduce initialization time. The sahara protocol provides a command mode flow to transfer this training data to the host, but the driver currently does not handle command mode and drops the training payload. Add Sahara command mode support to retrieve DDR training data from the device. When the device enters command mode and sends CMD_READY, query the support command list and request DDR training data using EXECUTE and EXECUTE_DATA. Allocate receive buffers based on the reported response size and copy the raw payload directly from the MHI DL completion callback. Store the captured training data in controller-scoped memory using devres, so it remains available after sahara channel teardown. Also distinguish raw payload completion from control packets in the DL callback, avoiding misinterpretation of training data as protocol messages, and requeue the RX buffer after switching back to IMAGE_TX_PENDING to allow the boot flow to continue. Signed-off-by: Kishore Batta --- drivers/bus/mhi/sahara/sahara.c | 328 +++++++++++++++++++++++++++++++++++++++- 1 file changed, 320 insertions(+), 8 deletions(-) diff --git a/drivers/bus/mhi/sahara/sahara.c b/drivers/bus/mhi/sahara/sahara.c index 0a0f578aaa47ab2c4ca0765666b392fb9936ddd5..c88f1220199ac4373d3552167870c19a0d5f23b9 100644 --- a/drivers/bus/mhi/sahara/sahara.c +++ b/drivers/bus/mhi/sahara/sahara.c @@ -5,11 +5,14 @@ */ #include +#include +#include #include #include #include #include #include +#include #include #include #include @@ -60,8 +63,16 @@ #define SAHARA_RESET_LENGTH 0x8 #define SAHARA_MEM_DEBUG64_LENGTH 0x18 #define SAHARA_MEM_READ64_LENGTH 0x18 - +#define SAHARA_COMMAND_READY_LENGTH 0x8 +#define SAHARA_COMMAND_EXEC_RESP_LENGTH 0x10 +#define SAHARA_COMMAND_EXECUTE_LENGTH 0xc +#define SAHARA_COMMAND_EXEC_DATA_LENGTH 0xc +#define SAHARA_SWITCH_MODE_LENGTH 0xc + +#define SAHARA_EXEC_CMD_GET_COMMAND_ID_LIST 0x8 +#define SAHARA_EXEC_CMD_GET_TRAINING_DATA 0x9 #define SAHARA_DDR_TRAINING_IMG_ID 34 +#define SAHARA_NUM_CMD_BUF SAHARA_NUM_TX_BUF struct sahara_packet { __le32 cmd; @@ -97,6 +108,19 @@ struct sahara_packet { __le64 memory_address; __le64 memory_length; } memory_read64; + struct { + __le32 client_command; + } command_execute; + struct { + __le32 client_command; + __le32 response_length; + } command_execute_resp; + struct { + __le32 client_command; + } command_exec_data; + struct { + __le32 mode; + } mode_switch; }; }; @@ -163,6 +187,7 @@ struct sahara_context { struct work_struct fw_work; struct work_struct dump_work; struct work_struct read_data_work; + struct work_struct cmd_work; struct mhi_device *mhi_dev; const char * const *image_table; u32 table_size; @@ -183,6 +208,24 @@ struct sahara_context { bool is_mem_dump_mode; bool non_streaming; const char *fw_folder; + bool is_cmd_mode; + bool receiving_trng_data; + size_t trng_size; + size_t trng_rcvd; + u32 trng_nbuf; + char *cmd_buff[SAHARA_NUM_CMD_BUF]; +}; + +/* + * Controller-scoped training data store (per MHI controller device). + * Stored as devres resource on mhi_dev->mhi_cntrl->mhi_dev->dev. + */ +struct sahara_ctrl_trng_data { + struct mutex lock; /* Protects data, size, copied and receiving */ + void *data; + size_t size; + size_t copied; + bool receiving; }; struct sahara_variant { @@ -330,6 +373,48 @@ static int sahara_request_fw(struct sahara_context *context, const char *path) return ret; } +static void sahara_ctrl_trng_release(struct device *dev, void *res) +{ + struct sahara_ctrl_trng_data *ct = res; + + mutex_lock(&ct->lock); + kfree(ct->data); + ct->data = NULL; + ct->size = 0; + ct->copied = 0; + ct->receiving = false; + mutex_unlock(&ct->lock); +} + +static int sahara_ctrl_trng_match(struct device *dev, void *res, void *match_data) +{ + /* Exactly one instance per controller */ + return 1; +} + +static struct sahara_ctrl_trng_data *sahara_ctrl_trng_get(struct device *dev) +{ + struct sahara_ctrl_trng_data *ct; + + ct = devres_find(dev, sahara_ctrl_trng_release, + sahara_ctrl_trng_match, NULL); + if (ct) + return ct; + + ct = devres_alloc(sahara_ctrl_trng_release, sizeof(*ct), GFP_KERNEL); + if (!ct) + return NULL; + + mutex_init(&ct->lock); + ct->data = NULL; + ct->size = 0; + ct->copied = 0; + ct->receiving = false; + + devres_add(dev, ct); + return ct; +} + static int sahara_find_image(struct sahara_context *context, u32 image_id) { char *fw_path; @@ -423,6 +508,11 @@ static void sahara_send_reset(struct sahara_context *context) context->is_mem_dump_mode = false; context->read_data_offset = 0; context->read_data_length = 0; + context->is_cmd_mode = false; + context->receiving_trng_data = false; + context->trng_size = 0; + context->trng_rcvd = 0; + context->trng_nbuf = 0; context->tx[0]->cmd = cpu_to_le32(SAHARA_RESET_CMD); context->tx[0]->length = cpu_to_le32(SAHARA_RESET_LENGTH); @@ -458,7 +548,8 @@ static void sahara_hello(struct sahara_context *context) if (le32_to_cpu(context->rx->hello.mode) != SAHARA_MODE_IMAGE_TX_PENDING && le32_to_cpu(context->rx->hello.mode) != SAHARA_MODE_IMAGE_TX_COMPLETE && - le32_to_cpu(context->rx->hello.mode) != SAHARA_MODE_MEMORY_DEBUG) { + le32_to_cpu(context->rx->hello.mode) != SAHARA_MODE_MEMORY_DEBUG && + le32_to_cpu(context->rx->hello.mode) != SAHARA_MODE_COMMAND) { dev_err(&context->mhi_dev->dev, "Unsupported hello packet - mode %d\n", le32_to_cpu(context->rx->hello.mode)); return; @@ -477,6 +568,153 @@ static void sahara_hello(struct sahara_context *context) dev_err(&context->mhi_dev->dev, "Unable to send hello response %d\n", ret); } +static void sahara_switch_mode_to_img_tx(struct sahara_context *context) +{ + int ret; + + context->tx[0]->cmd = cpu_to_le32(SAHARA_SWITCH_MODE_CMD); + context->tx[0]->length = cpu_to_le32(SAHARA_SWITCH_MODE_LENGTH); + context->tx[0]->mode_switch.mode = cpu_to_le32(SAHARA_MODE_IMAGE_TX_PENDING); + + ret = mhi_queue_buf(context->mhi_dev, DMA_TO_DEVICE, context->tx[0], + SAHARA_SWITCH_MODE_LENGTH, MHI_EOT); + + if (ret) + dev_err(&context->mhi_dev->dev, "Unable to send mode switch %d\n", ret); +} + +static void sahara_command_execute(struct sahara_context *context, u32 client_command) +{ + int ret; + + context->tx[0]->cmd = cpu_to_le32(SAHARA_EXECUTE_CMD); + context->tx[0]->length = cpu_to_le32(SAHARA_COMMAND_EXECUTE_LENGTH); + context->tx[0]->command_execute.client_command = cpu_to_le32(client_command); + + ret = mhi_queue_buf(context->mhi_dev, DMA_TO_DEVICE, context->tx[0], + SAHARA_COMMAND_EXECUTE_LENGTH, MHI_EOT); + if (ret) + dev_err(&context->mhi_dev->dev, "Unable to send command execute %d\n", ret); +} + +static void sahara_command_execute_data(struct sahara_context *context, u32 client_command) +{ + int ret; + + context->tx[0]->cmd = cpu_to_le32(SAHARA_EXECUTE_DATA_CMD); + context->tx[0]->length = cpu_to_le32(SAHARA_COMMAND_EXEC_DATA_LENGTH); + context->tx[0]->command_exec_data.client_command = cpu_to_le32(client_command); + + ret = mhi_queue_buf(context->mhi_dev, DMA_TO_DEVICE, context->tx[0], + SAHARA_COMMAND_EXEC_DATA_LENGTH, MHI_EOT); + if (ret) + dev_err(&context->mhi_dev->dev, "Unable to send execute data %d\n", ret); +} + +static void sahara_command_ready(struct sahara_context *context) +{ + if (le32_to_cpu(context->rx->length) != SAHARA_COMMAND_READY_LENGTH) { + dev_err(&context->mhi_dev->dev, + "Malformed command ready packet - length %u\n", + le32_to_cpu(context->rx->length)); + return; + } + + context->is_cmd_mode = true; + context->receiving_trng_data = false; + + sahara_command_execute(context, SAHARA_EXEC_CMD_GET_COMMAND_ID_LIST); +} + +static void sahara_command_execute_resp(struct sahara_context *context) +{ + struct device *dev = &context->mhi_dev->mhi_cntrl->mhi_dev->dev; + struct sahara_ctrl_trng_data *ct; + u32 client_cmd, resp_len; + int ret; + u64 remaining; + u32 i; + + if (le32_to_cpu(context->rx->length) != SAHARA_COMMAND_EXEC_RESP_LENGTH || + le32_to_cpu(context->rx->command_execute_resp.response_length) < 0) { + dev_err(&context->mhi_dev->dev, + "Malformed command execute resp packet - length %d\n", + le32_to_cpu(context->rx->length)); + return; + } + + client_cmd = le32_to_cpu(context->rx->command_execute_resp.client_command); + resp_len = le32_to_cpu(context->rx->command_execute_resp.response_length); + + sahara_command_execute_data(context, client_cmd); + + if (client_cmd == SAHARA_EXEC_CMD_GET_COMMAND_ID_LIST) { + sahara_command_execute(context, SAHARA_EXEC_CMD_GET_TRAINING_DATA); + return; + } + + if (client_cmd != SAHARA_EXEC_CMD_GET_TRAINING_DATA) + return; + + ct = sahara_ctrl_trng_get(dev); + if (!ct) { + context->is_cmd_mode = false; + sahara_switch_mode_to_img_tx(context); + return; + } + + mutex_lock(&ct->lock); + kfree(ct->data); + ct->data = kzalloc(resp_len, GFP_KERNEL); + ct->size = resp_len; + ct->copied = 0; + ct->receiving = true; + mutex_unlock(&ct->lock); + + if (!ct->data) { + context->is_cmd_mode = false; + sahara_switch_mode_to_img_tx(context); + return; + } + + context->trng_size = resp_len; + context->trng_rcvd = 0; + context->receiving_trng_data = true; + + remaining = resp_len; + for (i = 0; i < SAHARA_NUM_CMD_BUF && remaining; i++) { + size_t pkt = min_t(size_t, remaining, SAHARA_PACKET_MAX_SIZE); + + ret = mhi_queue_buf(context->mhi_dev, DMA_FROM_DEVICE, + context->cmd_buff[i], pkt, + (remaining <= pkt) ? MHI_EOT : MHI_CHAIN); + if (ret) + break; + + remaining -= pkt; + } + + context->trng_nbuf = i; +} + +static void sahara_command_processing(struct work_struct *work) +{ + struct sahara_context *context = container_of(work, struct sahara_context, cmd_work); + int ret; + + if (le32_to_cpu(context->rx->cmd) == SAHARA_EXECUTE_RESP_CMD) + sahara_command_execute_resp(context); + + if (!context->receiving_trng_data) { + ret = mhi_queue_buf(context->mhi_dev, DMA_FROM_DEVICE, + context->rx, SAHARA_PACKET_MAX_SIZE, MHI_EOT); + + if (ret) + dev_err(&context->mhi_dev->dev, + "Unable to requeue rx buf %d\n", ret); + } +} + static int read_data_helper(struct sahara_context *context, int buf_index) { enum mhi_flags mhi_flag; @@ -703,6 +941,9 @@ static void sahara_processing(struct work_struct *work) case SAHARA_MEM_DEBUG64_CMD: sahara_memory_debug64(context); break; + case SAHARA_CMD_READY_CMD: + sahara_command_ready(context); + break; default: dev_err(&context->mhi_dev->dev, "Unknown command %d\n", le32_to_cpu(context->rx->cmd)); @@ -1003,6 +1244,20 @@ static int sahara_mhi_probe(struct mhi_device *mhi_dev, const struct mhi_device_ INIT_WORK(&context->fw_work, sahara_processing); INIT_WORK(&context->dump_work, sahara_dump_processing); INIT_WORK(&context->read_data_work, sahara_read_data_processing); + INIT_WORK(&context->cmd_work, sahara_command_processing); + + for (i = 0; i < SAHARA_NUM_CMD_BUF; i++) { + context->cmd_buff[i] = devm_kzalloc(&mhi_dev->dev, + SAHARA_PACKET_MAX_SIZE, GFP_KERNEL); + if (!context->cmd_buff[i]) + return -ENOMEM; + } + + context->is_cmd_mode = false; + context->receiving_trng_data = false; + context->trng_size = 0; + context->trng_rcvd = 0; + context->trng_nbuf = 0; context->active_image_id = SAHARA_IMAGE_ID_NONE; dev_set_drvdata(&mhi_dev->dev, context); @@ -1026,6 +1281,7 @@ static void sahara_mhi_remove(struct mhi_device *mhi_dev) cancel_work_sync(&context->fw_work); cancel_work_sync(&context->dump_work); + cancel_work_sync(&context->cmd_work); vfree(context->mem_dump); sahara_release_image(context); mhi_unprepare_from_transfer(mhi_dev); @@ -1042,15 +1298,71 @@ static void sahara_mhi_ul_xfer_cb(struct mhi_device *mhi_dev, struct mhi_result static void sahara_mhi_dl_xfer_cb(struct mhi_device *mhi_dev, struct mhi_result *mhi_result) { struct sahara_context *context = dev_get_drvdata(&mhi_dev->dev); + struct sahara_ctrl_trng_data *ct; + struct device *dev; + size_t copy; + int ret; + u32 i; + + if (mhi_result->transaction_status) + return; + + /* + * Raw training payload completions arrive for cmd_buff[] buffers. + * Do not schedule cmd_work for those. + */ + if (context->is_cmd_mode && context->receiving_trng_data && + mhi_result->buf_addr != context->rx) { + dev = &context->mhi_dev->mhi_cntrl->mhi_dev->dev; + ct = sahara_ctrl_trng_get(dev); + if (!ct) + return; - if (!mhi_result->transaction_status) { - context->rx_size = mhi_result->bytes_xferd; - if (context->is_mem_dump_mode) - schedule_work(&context->dump_work); - else - schedule_work(&context->fw_work); + for (i = 0; i < context->trng_nbuf; i++) { + if (mhi_result->buf_addr == context->cmd_buff[i]) { + mutex_lock(&ct->lock); + copy = min_t(size_t, mhi_result->bytes_xferd, + ct->size - ct->copied); + memcpy((u8 *)ct->data + ct->copied, + mhi_result->buf_addr, copy); + ct->copied += copy; + mutex_unlock(&ct->lock); + + context->trng_rcvd += copy; + + if (context->trng_rcvd >= context->trng_size) { + mutex_lock(&ct->lock); + ct->receiving = false; + mutex_unlock(&ct->lock); + + context->receiving_trng_data = false; + context->is_cmd_mode = false; + + sahara_switch_mode_to_img_tx(context); + ret = mhi_queue_buf(context->mhi_dev, + DMA_FROM_DEVICE, + context->rx, + SAHARA_PACKET_MAX_SIZE, + MHI_EOT); + if (ret) + dev_err(&context->mhi_dev->dev, + "Unable to requeue rx buf %d\n", ret); + } + return; + } + } + return; } + /* Normal Rx completion */ + context->rx_size = mhi_result->bytes_xferd; + if (context->is_mem_dump_mode) + schedule_work(&context->dump_work); + else if (context->is_cmd_mode) + schedule_work(&context->cmd_work); + else + schedule_work(&context->fw_work); + } static const struct mhi_device_id sahara_mhi_match_table[] = { -- 2.34.1