/* SPDX-License-Identifier: GPL-2.0-only */ #define __SIMPLE_DEVICE__ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define FLASH_MMIO_SIZE (16 * MiB) #define FLASH_BASE_ADDR ((0xffffffff - FLASH_MMIO_SIZE) + 1) /* * Get the FAST_SPIBAR. */ void *fast_spi_get_bar(void) { const pci_devfn_t dev = PCH_DEV_SPI; uintptr_t bar; bar = pci_read_config32(dev, PCI_BASE_ADDRESS_0); assert(bar != 0); /* * Bits 31-12 are the base address as per EDS for SPI, * Don't care about 0-11 bit */ return (void *)(bar & ~PCI_BASE_ADDRESS_MEM_ATTR_MASK); } /* * Disable the BIOS write protect and Enable Prefetching and Caching. */ void fast_spi_init(void) { const pci_devfn_t dev = PCH_DEV_SPI; uint8_t bios_cntl; bios_cntl = pci_read_config8(dev, SPI_BIOS_CONTROL); /* Disable the BIOS write protect so write commands are allowed. */ bios_cntl &= ~SPI_BIOS_CONTROL_EISS; bios_cntl |= SPI_BIOS_CONTROL_WPD; /* Enable Prefetching and caching. */ bios_cntl |= SPI_BIOS_CONTROL_PREFETCH_ENABLE; bios_cntl &= ~SPI_BIOS_CONTROL_CACHE_DISABLE; pci_write_config8(dev, SPI_BIOS_CONTROL, bios_cntl); } /* * Set FAST_SPIBAR BIOS Control register based on input bit field. */ static void fast_spi_set_bios_control_reg(uint32_t bios_cntl_bit) { const pci_devfn_t dev = PCH_DEV_SPI; uint32_t bc_cntl; assert((bios_cntl_bit & (bios_cntl_bit - 1)) == 0); bc_cntl = pci_read_config32(dev, SPI_BIOS_CONTROL); bc_cntl |= bios_cntl_bit; pci_write_config32(dev, SPI_BIOS_CONTROL, bc_cntl); } /* * Ensure an additional read back after performing lock down */ static void fast_spi_read_post_write(uint8_t reg) { pci_read_config8(PCH_DEV_SPI, reg); } /* * Set FAST_SPIBAR BIOS Control BILD bit. */ void fast_spi_set_bios_interface_lock_down(void) { fast_spi_set_bios_control_reg(SPI_BIOS_CONTROL_BILD); fast_spi_read_post_write(SPI_BIOS_CONTROL); } /* * Set FAST_SPIBAR BIOS Control LE bit. */ void fast_spi_set_lock_enable(void) { fast_spi_set_bios_control_reg(SPI_BIOS_CONTROL_LOCK_ENABLE); fast_spi_read_post_write(SPI_BIOS_CONTROL); } /* * Set FAST_SPIBAR BIOS Control EXT BIOS LE bit. */ void fast_spi_set_ext_bios_lock_enable(void) { if (!CONFIG(FAST_SPI_SUPPORTS_EXT_BIOS_WINDOW)) return; fast_spi_set_bios_control_reg(SPI_BIOS_CONTROL_EXT_BIOS_LOCK_ENABLE); fast_spi_read_post_write(SPI_BIOS_CONTROL); } /* * Set FAST_SPIBAR BIOS Control EISS bit. */ void fast_spi_set_eiss(void) { fast_spi_set_bios_control_reg(SPI_BIOS_CONTROL_EISS); fast_spi_read_post_write(SPI_BIOS_CONTROL); } /* * Set FAST_SPI opcode menu. */ void fast_spi_set_opcode_menu(void) { void *spibar = fast_spi_get_bar(); write16(spibar + SPIBAR_PREOP, SPI_OPPREFIX); write16(spibar + SPIBAR_OPTYPE, SPI_OPTYPE); write32(spibar + SPIBAR_OPMENU_LOWER, SPI_OPMENU_LOWER); write32(spibar + SPIBAR_OPMENU_UPPER, SPI_OPMENU_UPPER); } /* * Lock FAST_SPIBAR. * Use 16bit write to avoid touching two upper bytes what may cause the write * cycle to fail in case a prior transaction has not completed. * While WRSDIS is lockable with FLOCKDN, writing both in the same * cycle is guaranteed to work by design. * * Avoid read->modify->write not to clear RW1C bits unintentionally. */ void fast_spi_lock_bar(void) { void *spibar = fast_spi_get_bar(); uint16_t hsfs = SPIBAR_HSFSTS_FLOCKDN | SPIBAR_HSFSTS_PRR34_LOCKDN; if (CONFIG(FAST_SPI_DISABLE_WRITE_STATUS)) hsfs |= SPIBAR_HSFSTS_WRSDIS; write16(spibar + SPIBAR_HSFSTS_CTL, hsfs); } /* * Set FAST_SPIBAR + DLOCK (0x0C) register bits to discrete lock the * FAST_SPI Protected Range (PR) registers. */ void fast_spi_pr_dlock(void) { void *spibar = fast_spi_get_bar(); uint32_t dlock; dlock = read32(spibar + SPIBAR_DLOCK); dlock |= (SPIBAR_DLOCK_PR0LOCKDN | SPIBAR_DLOCK_PR1LOCKDN | SPIBAR_DLOCK_PR2LOCKDN | SPIBAR_DLOCK_PR3LOCKDN | SPIBAR_DLOCK_PR4LOCKDN); write32(spibar + SPIBAR_DLOCK, dlock); } /* * Set FAST_SPIBAR + VSCC0 (0xC4) register VCL (bit 30). */ void fast_spi_vscc0_lock(void) { void *spibar = fast_spi_get_bar(); /* * SPI Flash Programming Guide Section 5.5.2 describes Vendor Component Lock (VCL). * It is recommended to set the VCL bit. VCL applies to both VSCC0 and VSCC1. * Without this bit being set, it is possible to modify Host/GbE VSCC register(s), * which might results in undesired host and integrated GbE Serial Flash * functionality. */ setbits32(spibar + SPIBAR_SFDP0_VSCC0, SPIBAR_VSCC0_VCL); } /* * Set FAST_SPIBAR Soft Reset Data Register value. */ void fast_spi_set_strap_msg_data(uint32_t soft_reset_data) { void *spibar = fast_spi_get_bar(); uint32_t ssl, ssms; /* Set Strap Lock Disable */ ssl = read32(spibar + SPIBAR_RESET_LOCK); ssl &= ~SPIBAR_RESET_LOCK_ENABLE; write32(spibar + SPIBAR_RESET_LOCK, ssl); /* Write Soft Reset Data register at SPIBAR0 offset 0xF8[0:15] */ write32(spibar + SPIBAR_RESET_DATA, soft_reset_data); /* Set Strap Mux Select set to '1' */ ssms = read32(spibar + SPIBAR_RESET_CTRL); ssms |= SPIBAR_RESET_CTRL_SSMC; write32(spibar + SPIBAR_RESET_CTRL, ssms); /* Set Strap Lock Enable */ ssl = read32(spibar + SPIBAR_RESET_LOCK); ssl |= SPIBAR_RESET_LOCK_ENABLE; write32(spibar + SPIBAR_RESET_LOCK, ssl); } static void fast_spi_enable_cache_range(unsigned int base, unsigned int size) { if (ENV_RAMSTAGE) { mtrr_use_temp_range(base, size, MTRR_TYPE_WRPROT); return; } const int type = MTRR_TYPE_WRPROT; int mtrr = get_free_var_mtrr(); if (mtrr == -1) { printk(BIOS_WARNING, "ROM caching failed due to no free MTRR available!\n"); return; } set_var_mtrr(mtrr, base, size, type); } /* * Returns bios_start and fills in size of the BIOS region. */ size_t fast_spi_get_bios_region(size_t *bios_size) { size_t bios_start, bios_end; /* * BIOS_BFPREG provides info about BIOS Flash Primary Region * Base and Limit. * Base and Limit fields are in units of 4KiB. */ uint32_t val = read32(fast_spi_get_bar() + SPIBAR_BFPREG); bios_start = (val & SPIBAR_BFPREG_PRB_MASK) * 4 * KiB; bios_end = (((val & SPIBAR_BFPREG_PRL_MASK) >> SPIBAR_BFPREG_PRL_SHIFT) + 1) * 4 * KiB; *bios_size = bios_end - bios_start; return bios_start; } static bool fast_spi_ext_bios_cache_range(uintptr_t *base, size_t *size) { uint32_t alignment; if (!CONFIG(FAST_SPI_SUPPORTS_EXT_BIOS_WINDOW)) return false; fast_spi_get_ext_bios_window(base, size); /* Enable extended bios only if Size of Bios region is greater than 16MiB */ if (*size == 0 || *base == 0) return false; /* Round to power of two */ alignment = 1UL << (log2_ceil(*size)); *size = ALIGN_UP(*size, alignment); *base = ALIGN_DOWN(*base, *size); return true; } static void fast_spi_cache_ext_bios_window(void) { size_t ext_bios_size; uintptr_t ext_bios_base; if (!fast_spi_ext_bios_cache_range(&ext_bios_base, &ext_bios_size)) return; fast_spi_enable_cache_range(ext_bios_base, ext_bios_size); } void fast_spi_cache_ext_bios_postcar(struct postcar_frame *pcf) { size_t ext_bios_size; uintptr_t ext_bios_base; const int type = MTRR_TYPE_WRPROT; if (!fast_spi_ext_bios_cache_range(&ext_bios_base, &ext_bios_size)) return; postcar_frame_add_mtrr(pcf, ext_bios_base, ext_bios_size, type); } void fast_spi_cache_bios_region(void) { size_t bios_size; uint32_t alignment; uintptr_t base; /* Only the IFD BIOS region is memory mapped (at top of 4G) */ fast_spi_get_bios_region(&bios_size); /* LOCAL APIC default address is 0xFEE0000, bios_size over 16MB will * cause memory type conflict when setting memory type to write * protection, so limit the cached BIOS region to be no more than 16MB. * */ bios_size = MIN(bios_size, 16 * MiB); if (bios_size <= 0) return; /* Round to power of two */ alignment = 1UL << (log2_ceil(bios_size)); bios_size = ALIGN_UP(bios_size, alignment); base = 4ULL*GiB - bios_size; fast_spi_enable_cache_range(base, bios_size); /* Check if caching is needed for extended bios region if supported */ fast_spi_cache_ext_bios_window(); } /* * Enable extended BIOS support * Checks BIOS region in the flashmap, if its more than 16Mib, enables extended BIOS * region support. */ static void fast_spi_enable_ext_bios(void) { const pci_devfn_t dev = PCH_DEV_SPI; if (!CONFIG(FAST_SPI_SUPPORTS_EXT_BIOS_WINDOW)) return; #if CONFIG(FAST_SPI_SUPPORTS_EXT_BIOS_WINDOW) /* * Ensure that the base for the extended window in host space is a multiple of 32 MiB * and size is fixed at 32 MiB. Controller assumes that the extended window has a fixed * size of 32 MiB even if the actual BIOS region is smaller. The mapping of the BIOS * region happens at the top of the extended window in this case. */ _Static_assert(ALIGN_UP(CONFIG_EXT_BIOS_WIN_BASE, 32 * MiB) == CONFIG_EXT_BIOS_WIN_BASE, "Extended BIOS window base must be a multiple of 32 * MiB!"); _Static_assert(CONFIG_EXT_BIOS_WIN_SIZE == (32 * MiB), "Only 32MiB windows are supported for extended BIOS!"); #endif /* Configure Source decode for Extended BIOS Region */ if (enable_gpmr(CONFIG_EXT_BIOS_WIN_BASE, CONFIG_EXT_BIOS_WIN_SIZE, soc_get_spi_psf_destination_id()) == CB_ERR) return; /* Program EXT_BIOS_BAR1 with obtained ext_bios_base */ pci_write_config32(dev, SPI_CFG_BAR1, CONFIG_EXT_BIOS_WIN_BASE | PCI_BASE_ADDRESS_SPACE_MEMORY); /* * Since the top 16MiB of the BIOS region is always decoded by the standard window * below the 4G boundary, we need to map the rest of the BIOS region that lies * below the top 16MiB in the extended window. Thus, EXT_BIOS_LIMIT will be set to * 16MiB. This determines the maximum address in the SPI flash space that is mapped * to the top of the extended window in the host address space. EXT_BIOS_LIMIT is * basically the offset from the end of the BIOS region that will be mapped to the top * of the extended window. * This enables the decoding as follows: -Standard decode window: (bios_region_top - 16MiB) to bios_region_top -Extended decode window: (bios_region_top - 16MiB - MIN(extended_window_size, bios_size - 16MiB)) to (bios_region_top - 16MiB). */ pci_or_config32(dev, SPI_BIOS_CONTROL, SPI_BIOS_CONTROL_EXT_BIOS_LIMIT(16 * MiB)); /* Program EXT_BIOS EN */ pci_or_config32(dev, SPI_BIOS_CONTROL, SPI_BIOS_CONTROL_EXT_BIOS_ENABLE); } /* * Program temporary BAR for SPI in case any of the stages before ramstage need * to access FAST_SPI MMIO regs. Ramstage will assign a new BAR during PCI * enumeration. */ void fast_spi_early_init(uintptr_t spi_base_address) { const pci_devfn_t dev = PCH_DEV_SPI; uint16_t pcireg; /* Assign Resources to SPI Controller */ /* Clear BIT 1-2 SPI Command Register */ pcireg = pci_read_config16(dev, PCI_COMMAND); pcireg &= ~(PCI_COMMAND_MASTER | PCI_COMMAND_MEMORY); pci_write_config16(dev, PCI_COMMAND, pcireg); /* Program Temporary BAR for SPI */ pci_write_config32(dev, PCI_BASE_ADDRESS_0, spi_base_address | PCI_BASE_ADDRESS_SPACE_MEMORY); /* * Enable extended bios support. Since it configures memory BAR, this is done before * enabling MMIO space. */ fast_spi_enable_ext_bios(); /* Enable Bus Master and MMIO Space */ pci_or_config16(dev, PCI_COMMAND, PCI_COMMAND_MASTER | PCI_COMMAND_MEMORY); /* Initialize SPI to allow BIOS to write/erase on flash. */ fast_spi_init(); } /* Clear SPI Synchronous SMI status bit and return its value. */ bool fast_spi_clear_sync_smi_status(void) { const uint32_t bios_cntl = pci_read_config32(PCH_DEV_SPI, SPI_BIOS_CONTROL); const bool smi_asserted = bios_cntl & SPI_BIOS_CONTROL_SYNC_SS; /* * Do not unconditionally write 1 to clear SYNC_SS. Hardware could set * SYNC_SS here (after we read but before we write SPI_BIOS_CONTROL), * and the event would be lost when unconditionally clearing SYNC_SS. */ pci_write_config32(PCH_DEV_SPI, SPI_BIOS_CONTROL, bios_cntl); return smi_asserted; } /* Read SPI Write Protect disable status. */ bool fast_spi_wpd_status(void) { return pci_read_config16(PCH_DEV_SPI, SPI_BIOS_CONTROL) & SPI_BIOS_CONTROL_WPD; } /* Enable SPI Write Protect. */ void fast_spi_enable_wp(void) { const pci_devfn_t dev = PCH_DEV_SPI; uint8_t bios_cntl; bios_cntl = pci_read_config8(dev, SPI_BIOS_CONTROL); bios_cntl &= ~SPI_BIOS_CONTROL_WPD; pci_write_config8(dev, SPI_BIOS_CONTROL, bios_cntl); } /* Disable SPI Write Protect. */ void fast_spi_disable_wp(void) { const pci_devfn_t dev = PCH_DEV_SPI; uint8_t bios_cntl; bios_cntl = pci_read_config8(dev, SPI_BIOS_CONTROL); bios_cntl |= SPI_BIOS_CONTROL_WPD; pci_write_config8(dev, SPI_BIOS_CONTROL, bios_cntl); } void fast_spi_clear_outstanding_status(void) { void *spibar = fast_spi_get_bar(); /* Make sure all W1C status bits get cleared. */ write32(spibar + SPIBAR_HSFSTS_CTL, SPIBAR_HSFSTS_W1C_BITS); } /* As there is no official ACPI ID for this controller use the generic PNP ID for now. */ static const char *fast_spi_acpi_hid(const struct device *dev) { return "PNP0C02"; } static const char *fast_spi_acpi_name(const struct device *dev) { return "FSPI"; } /* * Generate an ACPI entry for the SPI controller. This way the allocated resources * for the SPI controller can be communicated to the OS even if the device is * not visible on PCI (because it is hidden) and therefore can not be probed by the OS. */ static void fast_spi_fill_ssdt(const struct device *dev) { const char *scope = acpi_device_scope(dev); const char *hid = fast_spi_acpi_hid(dev); struct resource *res; /* Do not add SSDT if the fast SPI device is hidden. */ if (dev->hidden || !CONFIG(FAST_SPI_GENERATE_SSDT)) return; if (!scope || !hid) return; res = probe_resource(dev, PCI_BASE_ADDRESS_0); if (!res) return; /* Scope */ acpigen_write_scope(scope); /* Device */ acpigen_write_device(acpi_device_name(dev)); acpigen_write_name_string("_HID", hid); acpi_device_write_uid(dev); acpigen_write_name_string("_DDN", "ACPI Fast SPI"); acpigen_write_STA(acpi_device_status(dev)); /* Resources */ acpigen_write_name("_CRS"); acpigen_write_resourcetemplate_header(); /* Add BAR0 resource. */ acpigen_write_mem32fixed(1, res->base, res->size); acpigen_write_resourcetemplate_footer(); acpigen_pop_len(); /* Device */ acpigen_pop_len(); /* Scope */ } static void fast_spi_read_resources(struct device *dev) { /* Read standard PCI resources. */ pci_dev_read_resources(dev); /* Add SPI flash MMIO window as a reserved resource. */ mmio_resource_kb(dev, 0, FLASH_BASE_ADDR / KiB, FLASH_MMIO_SIZE / KiB); } static struct device_operations fast_spi_dev_ops = { .read_resources = fast_spi_read_resources, .set_resources = pci_dev_set_resources, .enable_resources = pci_dev_enable_resources, .acpi_fill_ssdt = fast_spi_fill_ssdt, .acpi_name = fast_spi_acpi_name, }; static const unsigned short pci_device_ids[] = { PCI_DID_INTEL_ADP_M_N_HWSEQ_SPI, PCI_DID_INTEL_ADP_P_HWSEQ_SPI, PCI_DID_INTEL_ADP_S_HWSEQ_SPI, PCI_DID_INTEL_APL_HWSEQ_SPI, PCI_DID_INTEL_GLK_HWSEQ_SPI, PCI_DID_INTEL_CMP_HWSEQ_SPI, PCI_DID_INTEL_CMP_H_HWSEQ_SPI, PCI_DID_INTEL_CNL_HWSEQ_SPI, PCI_DID_INTEL_CNP_H_HWSEQ_SPI, PCI_DID_INTEL_ICP_HWSEQ_SPI, PCI_DID_INTEL_JSP_HWSEQ_SPI, PCI_DID_INTEL_LWB_SPI, PCI_DID_INTEL_LWB_SPI_SUPER, PCI_DID_INTEL_MCC_SPI0, PCI_DID_INTEL_MTL_HWSEQ_SPI, PCI_DID_INTEL_SPR_HWSEQ_SPI, PCI_DID_INTEL_TGP_SPI0, 0 }; static const struct pci_driver fast_spi __pci_driver = { .ops = &fast_spi_dev_ops, .vendor = PCI_VID_INTEL, .devices = pci_device_ids, };