Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp2087274iog; Sun, 19 Jun 2022 07:05:48 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tilZa8vkKP+ktG5IJJ0lpYlvmeFK3VmGPUXlKHKhiF/sSrdG1CZQnbGy50GMjZK0IdNzFF X-Received: by 2002:a17:90a:4216:b0:1ec:a909:2b16 with SMTP id o22-20020a17090a421600b001eca9092b16mr175570pjg.86.1655647548382; Sun, 19 Jun 2022 07:05:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655647548; cv=none; d=google.com; s=arc-20160816; b=k9f8b4S6YkLi6m1ixtQWQpwTx9AKVp+rVDIPkiwHTooKG/w8QUI3WzPJjx/kvvd0I3 u6hyLtWfTlaHM2gyrm0eFO6gCnLs0PuMBZw+gC2saf97gKpklTi9IA64Obaa8bATthvZ qBCPYYEI6yb60lMHuA25cQxok6pKJiNhiWkHvj0I2xr8CKSPh0dlVeuPOTSHP04qvO9l ntsTOtzGdvNSxohnT/s2lZ+weRE3OtFbLn47g6CpwP+ftQSs27GYnPj1Nj6Lkg9cWZ6f UAXCM92+Cfe4yclL1gbwfoyTx1TT6ITzg0ULQr9vkrys/lWhL6/RJ2j8eJhpC73zb5xU Z9rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=klMlOzVzA0wfq3qp/oJUtfZFb+MM5mKsKLzZgiag3cQ=; b=AEbnOiIyRatP3fMps4k11ApR+SR4iyxGIAG0Z3ZCcXRtiJNRmZYaotQ/MOG9I2poH9 hI8EAZuHcV1S/buY9wVSTLeaZmimBCp1aPQXTVqzdpWODX06Q+EeP7YbcZnedFDXDqCM WhVtb6Z4EK5y1yrRuSNku6ryYYU+xx/Tj4rwBkIlJ7W8G7Qqp/FVQoHHE5thGkythImk so/PULRaw3V3R/Qlmdk5Lv+bYQviYuEv6S7V3yvjcSFPlsXe8G9jBA6Ul5gyD0f5PkGR 8GRIz3XI/MKsLmedijkABTHbbo94gWPByDhe8De1kXfNSnDuGLLlCfr0JpflCyVnHB03 bdTg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=DN6YEV3s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d9-20020a056a00244900b005109299b02fsi13809082pfj.113.2022.06.19.07.05.31; Sun, 19 Jun 2022 07:05:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=DN6YEV3s; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237317AbiFSNie (ORCPT + 99 others); Sun, 19 Jun 2022 09:38:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35146 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237050AbiFSNiJ (ORCPT ); Sun, 19 Jun 2022 09:38:09 -0400 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0225FE79 for ; Sun, 19 Jun 2022 06:38:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1655645888; x=1687181888; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=FqQD8V1tZDNnF7Zs/RsGtMzs5YtWuA1/y2GnU/ZA+R8=; b=DN6YEV3s7R4mQ3sRClJQYWQybD8qNAvjoiB2vXRdkbRTLCdE3Hwsx4db budG/QHwbL/J43UVzUpHazusdFbwcy/S52mQvl2GAxwXyRJhUXZ93x/vw /2F1dLvrR5t8IAw93Rb1nAHDovlc3Jmjy7L3fORdHdUd4j5W4WhZDKlwR Ho0h7E/HRiTVr5p1/kE+fGxjxGhgHyZhVgQht1cIB7E/oGbE/tPg//I6P pfhPTAffHa5I3LPVsrJve22QRbTAuKExCc24eX9L4ZbumipnxT7BbFd/r obRLp85KVU9ZOKRLIIydrSbuSg/HfTaDvFoTavFwMRlANCYOiL87nb335 w==; X-IronPort-AV: E=McAfee;i="6400,9594,10380"; a="305164722" X-IronPort-AV: E=Sophos;i="5.92,306,1650956400"; d="scan'208";a="305164722" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jun 2022 06:38:08 -0700 X-IronPort-AV: E=Sophos;i="5.92,306,1650956400"; d="scan'208";a="676158564" Received: from sannilnx.jer.intel.com ([10.12.26.157]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jun 2022 06:38:05 -0700 From: Alexander Usyskin To: Greg Kroah-Hartman , Jani Nikula , Joonas Lahtinen , Rodrigo Vivi , David Airlie , Daniel Vetter , Tvrtko Ursulin Cc: Tomas Winkler , Alexander Usyskin , Vitaly Lubart , intel-gfx@lists.freedesktop.org, linux-kernel@vger.kernel.org, Daniele Ceraolo Spurio Subject: [PATCH v3 10/14] mei: mkhi: add memory ready command Date: Sun, 19 Jun 2022 16:37:17 +0300 Message-Id: <20220619133721.523546-11-alexander.usyskin@intel.com> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20220619133721.523546-1-alexander.usyskin@intel.com> References: <20220619133721.523546-1-alexander.usyskin@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tomas Winkler Add GSC memory ready command. The command indicates to the firmware that extend operation memory was setup and the firmware may enter PXP mode. CC: Daniele Ceraolo Spurio Signed-off-by: Tomas Winkler --- drivers/misc/mei/mkhi.h | 14 +++++++++++++- 1 file changed, 13 insertions(+), 1 deletion(-) diff --git a/drivers/misc/mei/mkhi.h b/drivers/misc/mei/mkhi.h index 27a9b476904e..ea9fe487cb0f 100644 --- a/drivers/misc/mei/mkhi.h +++ b/drivers/misc/mei/mkhi.h @@ -1,6 +1,6 @@ /* SPDX-License-Identifier: GPL-2.0 */ /* - * Copyright (c) 2003-2020, Intel Corporation. All rights reserved. + * Copyright (c) 2003-2021, Intel Corporation. All rights reserved. * Intel Management Engine Interface (Intel MEI) Linux driver */ @@ -18,6 +18,13 @@ #define MCHI_GROUP_ID 0xA +#define MKHI_GROUP_ID_GFX 0x30 +#define MKHI_GFX_RESET_WARN_CMD_REQ 0x0 +#define MKHI_GFX_MEMORY_READY_CMD_REQ 0x1 + +/* Allow transition to PXP mode without approval */ +#define MKHI_GFX_MEM_READY_PXP_ALLOWED 0x1 + struct mkhi_rule_id { __le16 rule_type; u8 feature_id; @@ -42,4 +49,9 @@ struct mkhi_msg { u8 data[]; } __packed; +struct mkhi_gfx_mem_ready { + struct mkhi_msg_hdr hdr; + uint32_t flags; +} __packed; + #endif /* _MEI_MKHI_H_ */ -- 2.32.0