blob: ad95dce12a9cdd8e1912a8c7bcacf1c3d453c844 [file] [log] [blame]
Andrey Petrov465fc132016-02-25 14:16:33 -08001/*
2 * This file is part of the coreboot project.
3 *
Andrey Petrov465fc132016-02-25 14:16:33 -08004 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
Martin Rothcddd6002019-09-23 17:38:27 -06008 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
Andrey Petrov465fc132016-02-25 14:16:33 -080013 */
14
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010015#include <security/vboot/antirollback.h>
Aaron Durbinb4302502016-07-17 17:04:37 -050016#include <arch/symbols.h>
Aaron Durbin31be2c92016-12-03 22:08:20 -060017#include <assert.h>
Joel Kitching9a292282020-03-06 13:44:50 +080018#include <bootmode.h>
Aaron Durbind04639b2016-07-17 23:23:59 -050019#include <cbfs.h>
Aaron Durbin27928682016-07-15 22:32:28 -050020#include <cbmem.h>
Patrick Rudolphf677d172018-10-01 19:17:11 +020021#include <cf9_reset.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080022#include <console/console.h>
Furquan Shaikh5aea5882016-07-30 18:10:05 -070023#include <elog.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080024#include <fsp/api.h>
25#include <fsp/util.h>
26#include <memrange.h>
Aaron Durbindecd0622017-12-15 12:26:40 -070027#include <mrc_cache.h>
Aaron Durbind04639b2016-07-17 23:23:59 -050028#include <program_loading.h>
Aaron Durbinb4302502016-07-17 17:04:37 -050029#include <romstage_handoff.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080030#include <string.h>
Aaron Durbind04639b2016-07-17 23:23:59 -050031#include <symbols.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080032#include <timestamp.h>
Philipp Deppenwiesefea24292017-10-17 17:02:29 +020033#include <security/vboot/vboot_common.h>
Philipp Deppenwiese80961af2018-02-27 22:14:34 +010034#include <security/tpm/tspi.h>
Furquan Shaikh2db5bac2016-11-07 23:57:48 -080035#include <vb2_api.h>
Philipp Deppenwiese80961af2018-02-27 22:14:34 +010036#include <fsp/memory_init.h>
Elyes HAOUASbd1683d2019-05-15 21:05:37 +020037#include <types.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080038
Kyösti Mälkkic9871502019-09-03 07:03:39 +030039static uint8_t temp_ram[CONFIG_FSP_TEMP_RAM_SIZE] __aligned(sizeof(uint64_t));
40
Joel Kitching2c8243c2019-03-11 17:47:24 +080041/* TPM MRC hash functionality depends on vboot starting before memory init. */
42_Static_assert(!CONFIG(FSP2_0_USES_TPM_MRC_HASH) ||
43 CONFIG(VBOOT_STARTS_IN_BOOTBLOCK),
44 "for TPM MRC hash functionality, vboot must start in bootblock");
45
Aaron Durbinf0ec8242016-07-18 11:24:36 -050046static void save_memory_training_data(bool s3wake, uint32_t fsp_version)
Aaron Durbinb4302502016-07-17 17:04:37 -050047{
Aaron Durbinb4302502016-07-17 17:04:37 -050048 size_t mrc_data_size;
49 const void *mrc_data;
Aaron Durbinf0ec8242016-07-18 11:24:36 -050050
Julius Wernercd49cce2019-03-05 16:53:33 -080051 if (!CONFIG(CACHE_MRC_SETTINGS) || s3wake)
Aaron Durbinf0ec8242016-07-18 11:24:36 -050052 return;
53
54 mrc_data = fsp_find_nv_storage_data(&mrc_data_size);
55 if (!mrc_data) {
56 printk(BIOS_ERR, "Couldn't find memory training data HOB.\n");
57 return;
58 }
59
60 /*
61 * Save MRC Data to CBMEM. By always saving the data this forces
62 * a retrain after a trip through Chrome OS recovery path. The
63 * code which saves the data to flash doesn't write if the latest
64 * training data matches this one.
65 */
Aaron Durbin31be2c92016-12-03 22:08:20 -060066 if (mrc_cache_stash_data(MRC_TRAINING_DATA, fsp_version, mrc_data,
67 mrc_data_size) < 0)
68 printk(BIOS_ERR, "Failed to stash MRC data\n");
Furquan Shaikh2db5bac2016-11-07 23:57:48 -080069
Julius Wernercd49cce2019-03-05 16:53:33 -080070 if (CONFIG(FSP2_0_USES_TPM_MRC_HASH))
Philipp Deppenwiese80961af2018-02-27 22:14:34 +010071 mrc_cache_update_hash(mrc_data, mrc_data_size);
Aaron Durbinf0ec8242016-07-18 11:24:36 -050072}
73
Lee Leahy9671faa2016-07-24 18:18:52 -070074static void do_fsp_post_memory_init(bool s3wake, uint32_t fsp_version)
Aaron Durbinf0ec8242016-07-18 11:24:36 -050075{
76 struct range_entry fsp_mem;
Aaron Durbinb4302502016-07-17 17:04:37 -050077
Michael Niewöhnerbc1dbb32019-10-24 22:58:25 +020078 fsp_find_reserved_memory(&fsp_mem);
Aaron Durbinb4302502016-07-17 17:04:37 -050079
80 /* initialize cbmem by adding FSP reserved memory first thing */
81 if (!s3wake) {
82 cbmem_initialize_empty_id_size(CBMEM_ID_FSP_RESERVED_MEMORY,
83 range_entry_size(&fsp_mem));
84 } else if (cbmem_initialize_id_size(CBMEM_ID_FSP_RESERVED_MEMORY,
85 range_entry_size(&fsp_mem))) {
Julius Wernercd49cce2019-03-05 16:53:33 -080086 if (CONFIG(HAVE_ACPI_RESUME)) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -070087 printk(BIOS_ERR,
Lee Leahyac3b0a62016-07-27 07:40:25 -070088 "Failed to recover CBMEM in S3 resume.\n");
Aaron Durbinb4302502016-07-17 17:04:37 -050089 /* Failed S3 resume, reset to come up cleanly */
Patrick Rudolphf677d172018-10-01 19:17:11 +020090 /* FIXME: A "system" reset is likely enough: */
91 full_reset();
Aaron Durbinb4302502016-07-17 17:04:37 -050092 }
93 }
94
95 /* make sure FSP memory is reserved in cbmem */
96 if (range_entry_base(&fsp_mem) !=
97 (uintptr_t)cbmem_find(CBMEM_ID_FSP_RESERVED_MEMORY))
Lee Leahy9671faa2016-07-24 18:18:52 -070098 die("Failed to accommodate FSP reserved memory request!\n");
Aaron Durbinb4302502016-07-17 17:04:37 -050099
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500100 save_memory_training_data(s3wake, fsp_version);
Aaron Durbinb4302502016-07-17 17:04:37 -0500101
102 /* Create romstage handof information */
Aaron Durbin77e13992016-11-29 17:43:04 -0600103 romstage_handoff_init(s3wake);
Aaron Durbinb4302502016-07-17 17:04:37 -0500104}
105
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530106static void fsp_fill_mrc_cache(FSPM_ARCH_UPD *arch_upd, uint32_t fsp_version)
Aaron Durbinb4302502016-07-17 17:04:37 -0500107{
Aaron Durbin31be2c92016-12-03 22:08:20 -0600108 struct region_device rdev;
109 void *data;
Aaron Durbinb4302502016-07-17 17:04:37 -0500110
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500111 arch_upd->NvsBufferPtr = NULL;
112
Julius Wernercd49cce2019-03-05 16:53:33 -0800113 if (!CONFIG(CACHE_MRC_SETTINGS))
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500114 return;
115
Aaron Durbin31be2c92016-12-03 22:08:20 -0600116 /*
117 * In recovery mode, force retraining:
118 * 1. Recovery cache is not supported, or
119 * 2. Memory retrain switch is set.
120 */
121 if (vboot_recovery_mode_enabled()) {
Julius Wernercd49cce2019-03-05 16:53:33 -0800122 if (!CONFIG(HAS_RECOVERY_MRC_CACHE))
Aaron Durbin31be2c92016-12-03 22:08:20 -0600123 return;
Joel Kitching9a292282020-03-06 13:44:50 +0800124 if (get_recovery_mode_retrain_switch())
Aaron Durbin31be2c92016-12-03 22:08:20 -0600125 return;
126 }
Aaron Durbin98ea6362016-07-18 11:31:53 -0500127
Aaron Durbin31be2c92016-12-03 22:08:20 -0600128 if (mrc_cache_get_current(MRC_TRAINING_DATA, fsp_version, &rdev) < 0)
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500129 return;
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500130
Aaron Durbin31be2c92016-12-03 22:08:20 -0600131 /* Assume boot device is memory mapped. */
Julius Wernercd49cce2019-03-05 16:53:33 -0800132 assert(CONFIG(BOOT_DEVICE_MEMORY_MAPPED));
Aaron Durbin31be2c92016-12-03 22:08:20 -0600133 data = rdev_mmap_full(&rdev);
134
135 if (data == NULL)
136 return;
137
Julius Wernercd49cce2019-03-05 16:53:33 -0800138 if (CONFIG(FSP2_0_USES_TPM_MRC_HASH) &&
Philipp Deppenwiese80961af2018-02-27 22:14:34 +0100139 !mrc_cache_verify_hash(data, region_device_sz(&rdev)))
Furquan Shaikh2db5bac2016-11-07 23:57:48 -0800140 return;
141
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500142 /* MRC cache found */
Aaron Durbin31be2c92016-12-03 22:08:20 -0600143 arch_upd->NvsBufferPtr = data;
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530144
145 printk(BIOS_SPEW, "MRC cache found, size %zx\n",
146 region_device_sz(&rdev));
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500147}
148
Aaron Durbin02e504c2016-07-18 11:53:10 -0500149static enum cb_err check_region_overlap(const struct memranges *ranges,
150 const char *description,
151 uintptr_t begin, uintptr_t end)
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500152{
Aaron Durbin02e504c2016-07-18 11:53:10 -0500153 const struct range_entry *r;
154
155 memranges_each_entry(r, ranges) {
156 if (end <= range_entry_base(r))
157 continue;
158 if (begin >= range_entry_end(r))
159 continue;
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700160 printk(BIOS_CRIT, "'%s' overlaps currently running program: "
Aaron Durbin02e504c2016-07-18 11:53:10 -0500161 "[%p, %p)\n", description, (void *)begin, (void *)end);
162 return CB_ERR;
163 }
164
165 return CB_SUCCESS;
166}
Kyösti Mälkkic9871502019-09-03 07:03:39 +0300167
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530168static enum cb_err setup_fsp_stack_frame(FSPM_ARCH_UPD *arch_upd,
169 const struct memranges *memmap)
Aaron Durbin02e504c2016-07-18 11:53:10 -0500170{
171 uintptr_t stack_begin;
172 uintptr_t stack_end;
173
Aaron Durbinb4302502016-07-17 17:04:37 -0500174 /*
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530175 * FSPM_UPD passed here is populated with default values
176 * provided by the blob itself. We let FSPM use top of CAR
177 * region of the size it requests.
Aaron Durbinb4302502016-07-17 17:04:37 -0500178 */
Aaron Durbin02e504c2016-07-18 11:53:10 -0500179 stack_end = (uintptr_t)_car_region_end;
180 stack_begin = stack_end - arch_upd->StackSize;
Aaron Durbin02e504c2016-07-18 11:53:10 -0500181 if (check_region_overlap(memmap, "FSPM stack", stack_begin,
182 stack_end) != CB_SUCCESS)
183 return CB_ERR;
184
185 arch_upd->StackBase = (void *)stack_begin;
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530186 return CB_SUCCESS;
187}
188
189static enum cb_err fsp_fill_common_arch_params(FSPM_ARCH_UPD *arch_upd,
190 bool s3wake, uint32_t fsp_version,
191 const struct memranges *memmap)
192{
Kyösti Mälkkic9871502019-09-03 07:03:39 +0300193 /*
194 * FSP 2.1 version would use same stack as coreboot instead of
195 * setting up separate stack frame. FSP 2.1 would not relocate stack
196 * top and does not reinitialize stack pointer. The parameters passed
197 * as StackBase and StackSize are actually for temporary RAM and HOBs
198 * and are not related to FSP stack at all.
199 */
200 if (CONFIG(FSP_USES_CB_STACK)) {
201 arch_upd->StackBase = temp_ram;
202 arch_upd->StackSize = sizeof(temp_ram);
203 } else if (setup_fsp_stack_frame(arch_upd, memmap)) {
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530204 return CB_ERR;
Kyösti Mälkkic9871502019-09-03 07:03:39 +0300205 }
Aaron Durbinb4302502016-07-17 17:04:37 -0500206
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530207 fsp_fill_mrc_cache(arch_upd, fsp_version);
Aaron Durbinb4302502016-07-17 17:04:37 -0500208
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530209 /* Configure bootmode */
210 if (s3wake) {
211 /*
212 * For S3 resume case, if valid mrc cache data is not found or
213 * RECOVERY_MRC_CACHE hash verification fails, the S3 data
214 * pointer would be null and S3 resume fails with fsp-m
215 * returning error. Invoking a reset here saves time.
216 */
217 if (!arch_upd->NvsBufferPtr)
Patrick Rudolphf677d172018-10-01 19:17:11 +0200218 /* FIXME: A "system" reset is likely enough: */
219 full_reset();
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530220 arch_upd->BootMode = FSP_BOOT_ON_S3_RESUME;
221 } else {
222 if (arch_upd->NvsBufferPtr)
223 arch_upd->BootMode =
224 FSP_BOOT_ASSUMING_NO_CONFIGURATION_CHANGES;
225 else
226 arch_upd->BootMode = FSP_BOOT_WITH_FULL_CONFIGURATION;
227 }
Aaron Durbin02e504c2016-07-18 11:53:10 -0500228
Marshall Dawson22d66ef2019-08-30 14:52:37 -0600229 printk(BIOS_SPEW, "bootmode is set to: %d\n", arch_upd->BootMode);
Aamir Bohra276c06a2017-12-26 17:54:45 +0530230
Aaron Durbin02e504c2016-07-18 11:53:10 -0500231 return CB_SUCCESS;
Aaron Durbinb4302502016-07-17 17:04:37 -0500232}
233
Aaron Durbin64031672018-04-21 14:45:32 -0600234__weak
Aaron Durbina3cecb22017-04-25 21:58:10 -0500235uint8_t fsp_memory_mainboard_version(void)
236{
237 return 0;
238}
239
Aaron Durbin64031672018-04-21 14:45:32 -0600240__weak
Aaron Durbina3cecb22017-04-25 21:58:10 -0500241uint8_t fsp_memory_soc_version(void)
242{
243 return 0;
244}
245
246/*
247 * Allow SoC and/or mainboard to bump the revision of the FSP setting
248 * number. The FSP spec uses the low 8 bits as the build number. Take over
249 * bits 3:0 for the SoC setting and bits 7:4 for the mainboard. That way
250 * a tweak in the settings will bump the version used to track the cached
251 * setting which triggers retraining when the FSP version hasn't changed, but
252 * the SoC or mainboard settings have.
253 */
254static uint32_t fsp_memory_settings_version(const struct fsp_header *hdr)
255{
256 /* Use the full FSP version by default. */
257 uint32_t ver = hdr->fsp_revision;
258
Julius Wernercd49cce2019-03-05 16:53:33 -0800259 if (!CONFIG(FSP_PLATFORM_MEMORY_SETTINGS_VERSIONS))
Aaron Durbina3cecb22017-04-25 21:58:10 -0500260 return ver;
261
262 ver &= ~0xff;
263 ver |= (0xf & fsp_memory_mainboard_version()) << 4;
264 ver |= (0xf & fsp_memory_soc_version()) << 0;
265
266 return ver;
267}
268
Lee Leahy9671faa2016-07-24 18:18:52 -0700269static void do_fsp_memory_init(struct fsp_header *hdr, bool s3wake,
Aaron Durbin02e504c2016-07-18 11:53:10 -0500270 const struct memranges *memmap)
Andrey Petrov465fc132016-02-25 14:16:33 -0800271{
Brandon Breitensteinc31ba0e2016-07-27 17:34:45 -0700272 uint32_t status;
Andrey Petrov465fc132016-02-25 14:16:33 -0800273 fsp_memory_init_fn fsp_raminit;
Brandon Breitensteinc31ba0e2016-07-27 17:34:45 -0700274 FSPM_UPD fspm_upd, *upd;
275 FSPM_ARCH_UPD *arch_upd;
Aaron Durbina3cecb22017-04-25 21:58:10 -0500276 uint32_t fsp_version;
Andrey Petrov465fc132016-02-25 14:16:33 -0800277
Furquan Shaikh585210a2018-10-16 11:54:37 -0700278 post_code(POST_MEM_PREINIT_PREP_START);
Andrey Petrov465fc132016-02-25 14:16:33 -0800279
Aaron Durbina3cecb22017-04-25 21:58:10 -0500280 fsp_version = fsp_memory_settings_version(hdr);
281
Brandon Breitensteinc31ba0e2016-07-27 17:34:45 -0700282 upd = (FSPM_UPD *)(hdr->cfg_region_offset + hdr->image_base);
Andrey Petrov465fc132016-02-25 14:16:33 -0800283
Lee Leahye686ee82017-03-10 08:45:30 -0800284 if (upd->FspUpdHeader.Signature != FSPM_UPD_SIGNATURE)
Keith Shortbb41aba2019-05-16 14:07:43 -0600285 die_with_post_code(POST_INVALID_VENDOR_BINARY,
286 "Invalid FSPM signature!\n");
Andrey Petrov465fc132016-02-25 14:16:33 -0800287
288 /* Copy the default values from the UPD area */
289 memcpy(&fspm_upd, upd, sizeof(fspm_upd));
290
Aaron Durbin02e504c2016-07-18 11:53:10 -0500291 arch_upd = &fspm_upd.FspmArchUpd;
292
Aaron Durbin27928682016-07-15 22:32:28 -0500293 /* Reserve enough memory under TOLUD to save CBMEM header */
Aaron Durbin02e504c2016-07-18 11:53:10 -0500294 arch_upd->BootLoaderTolumSize = cbmem_overhead_size();
Aaron Durbin27928682016-07-15 22:32:28 -0500295
Aaron Durbinb4302502016-07-17 17:04:37 -0500296 /* Fill common settings on behalf of chipset. */
Aaron Durbina3cecb22017-04-25 21:58:10 -0500297 if (fsp_fill_common_arch_params(arch_upd, s3wake, fsp_version,
Aaron Durbin02e504c2016-07-18 11:53:10 -0500298 memmap) != CB_SUCCESS)
Keith Shortbb41aba2019-05-16 14:07:43 -0600299 die_with_post_code(POST_INVALID_VENDOR_BINARY,
300 "FSPM_ARCH_UPD not found!\n");
Aaron Durbinb4302502016-07-17 17:04:37 -0500301
Andrey Petrov465fc132016-02-25 14:16:33 -0800302 /* Give SoC and mainboard a chance to update the UPD */
Aaron Durbina3cecb22017-04-25 21:58:10 -0500303 platform_fsp_memory_init_params_cb(&fspm_upd, fsp_version);
Andrey Petrov465fc132016-02-25 14:16:33 -0800304
Julius Wernercd49cce2019-03-05 16:53:33 -0800305 if (CONFIG(MMA))
Pratik Prajapatiffc934d2016-11-18 14:36:34 -0800306 setup_mma(&fspm_upd.FspmConfig);
307
Furquan Shaikh585210a2018-10-16 11:54:37 -0700308 post_code(POST_MEM_PREINIT_PREP_END);
309
Andrey Petrov465fc132016-02-25 14:16:33 -0800310 /* Call FspMemoryInit */
311 fsp_raminit = (void *)(hdr->image_base + hdr->memory_init_entry_offset);
Lee Leahyac3b0a62016-07-27 07:40:25 -0700312 fsp_debug_before_memory_init(fsp_raminit, upd, &fspm_upd);
Andrey Petrov465fc132016-02-25 14:16:33 -0800313
Alexandru Gagniucc4ea8f72016-05-23 12:16:58 -0700314 post_code(POST_FSP_MEMORY_INIT);
Andrey Petrov465fc132016-02-25 14:16:33 -0800315 timestamp_add_now(TS_FSP_MEMORY_INIT_START);
Lee Leahyac3b0a62016-07-27 07:40:25 -0700316 status = fsp_raminit(&fspm_upd, fsp_get_hob_list_ptr());
Subrata Banik0755ab92017-07-12 15:31:06 +0530317 post_code(POST_FSP_MEMORY_EXIT);
Andrey Petrov465fc132016-02-25 14:16:33 -0800318 timestamp_add_now(TS_FSP_MEMORY_INIT_END);
319
Lee Leahy9671faa2016-07-24 18:18:52 -0700320 /* Handle any errors returned by FspMemoryInit */
Aaron Durbinf41f2aa2016-07-18 12:03:58 -0500321 fsp_handle_reset(status);
Lee Leahy9671faa2016-07-24 18:18:52 -0700322 if (status != FSP_SUCCESS) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700323 printk(BIOS_CRIT, "FspMemoryInit returned 0x%08x\n", status);
Keith Short24302632019-05-16 14:08:31 -0600324 die_with_post_code(POST_RAM_FAILURE,
325 "FspMemoryInit returned an error!\n");
Lee Leahy9671faa2016-07-24 18:18:52 -0700326 }
Aaron Durbinf41f2aa2016-07-18 12:03:58 -0500327
Aaron Durbina3cecb22017-04-25 21:58:10 -0500328 do_fsp_post_memory_init(s3wake, fsp_version);
Matthew Garrett78b58a42018-07-28 16:53:16 -0700329
330 /*
331 * fsp_debug_after_memory_init() checks whether the end of the tolum
332 * region is the same as the top of cbmem, so must be called here
333 * after cbmem has been initialised in do_fsp_post_memory_init().
334 */
335 fsp_debug_after_memory_init(status);
Andrey Petrov465fc132016-02-25 14:16:33 -0800336}
337
Aaron Durbind04639b2016-07-17 23:23:59 -0500338/* Load the binary into the memory specified by the info header. */
339static enum cb_err load_fspm_mem(struct fsp_header *hdr,
Aaron Durbin02e504c2016-07-18 11:53:10 -0500340 const struct region_device *rdev,
341 const struct memranges *memmap)
Aaron Durbind04639b2016-07-17 23:23:59 -0500342{
Aaron Durbind04639b2016-07-17 23:23:59 -0500343 uintptr_t fspm_begin;
344 uintptr_t fspm_end;
345
346 if (fsp_validate_component(hdr, rdev) != CB_SUCCESS)
347 return CB_ERR;
348
349 fspm_begin = hdr->image_base;
350 fspm_end = fspm_begin + hdr->image_size;
351
Aaron Durbin02e504c2016-07-18 11:53:10 -0500352 if (check_region_overlap(memmap, "FSPM", fspm_begin, fspm_end) !=
353 CB_SUCCESS)
Aaron Durbind04639b2016-07-17 23:23:59 -0500354 return CB_ERR;
Aaron Durbind04639b2016-07-17 23:23:59 -0500355
356 /* Load binary into memory at provided address. */
357 if (rdev_readat(rdev, (void *)fspm_begin, 0, fspm_end - fspm_begin) < 0)
358 return CB_ERR;
359
360 return CB_SUCCESS;
361}
362
363/* Handle the case when FSPM is running XIP. */
364static enum cb_err load_fspm_xip(struct fsp_header *hdr,
365 const struct region_device *rdev)
366{
367 void *base;
368
369 if (fsp_validate_component(hdr, rdev) != CB_SUCCESS)
370 return CB_ERR;
371
372 base = rdev_mmap_full(rdev);
373 if ((uintptr_t)base != hdr->image_base) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700374 printk(BIOS_CRIT, "FSPM XIP base does not match: %p vs %p\n",
Aaron Durbind04639b2016-07-17 23:23:59 -0500375 (void *)(uintptr_t)hdr->image_base, base);
376 return CB_ERR;
377 }
378
379 /*
380 * Since the component is XIP it's already in the address space. Thus,
381 * there's no need to rdev_munmap().
382 */
383 return CB_SUCCESS;
384}
385
Lee Leahy9671faa2016-07-24 18:18:52 -0700386void fsp_memory_init(bool s3wake)
Andrey Petrov465fc132016-02-25 14:16:33 -0800387{
388 struct fsp_header hdr;
Aaron Durbind04639b2016-07-17 23:23:59 -0500389 enum cb_err status;
390 struct cbfsf file_desc;
391 struct region_device file_data;
392 const char *name = CONFIG_FSP_M_CBFS;
Aaron Durbin02e504c2016-07-18 11:53:10 -0500393 struct memranges memmap;
Marshall Dawsone3aa4242019-10-16 21:53:21 -0600394 struct range_entry prog_ranges[2];
Andrey Petrov465fc132016-02-25 14:16:33 -0800395
Kyösti Mälkki7f50afb2019-09-11 17:12:26 +0300396 elog_boot_notify(s3wake);
Furquan Shaikh5aea5882016-07-30 18:10:05 -0700397
Aaron Durbind04639b2016-07-17 23:23:59 -0500398 if (cbfs_boot_locate(&file_desc, name, NULL)) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700399 printk(BIOS_CRIT, "Could not locate %s in CBFS\n", name);
Lee Leahy9671faa2016-07-24 18:18:52 -0700400 die("FSPM not available!\n");
Aaron Durbind04639b2016-07-17 23:23:59 -0500401 }
402
403 cbfs_file_data(&file_data, &file_desc);
404
Aaron Durbin02e504c2016-07-18 11:53:10 -0500405 /* Build up memory map of romstage address space including CAR. */
Marshall Dawsone3aa4242019-10-16 21:53:21 -0600406 memranges_init_empty(&memmap, &prog_ranges[0], ARRAY_SIZE(prog_ranges));
407 if (ENV_CACHE_AS_RAM)
408 memranges_insert(&memmap, (uintptr_t)_car_region_start,
409 _car_unallocated_start - _car_region_start, 0);
Julius Werner7e0dea62019-02-20 18:39:22 -0800410 memranges_insert(&memmap, (uintptr_t)_program, REGION_SIZE(program), 0);
Aaron Durbin02e504c2016-07-18 11:53:10 -0500411
Julius Wernercd49cce2019-03-05 16:53:33 -0800412 if (!CONFIG(FSP_M_XIP))
Aaron Durbin02e504c2016-07-18 11:53:10 -0500413 status = load_fspm_mem(&hdr, &file_data, &memmap);
Aaron Durbind04639b2016-07-17 23:23:59 -0500414 else
415 status = load_fspm_xip(&hdr, &file_data);
416
Lee Leahye686ee82017-03-10 08:45:30 -0800417 if (status != CB_SUCCESS)
Lee Leahy9671faa2016-07-24 18:18:52 -0700418 die("Loading FSPM failed!\n");
Aaron Durbind04639b2016-07-17 23:23:59 -0500419
420 /* Signal that FSP component has been loaded. */
421 prog_segment_loaded(hdr.image_base, hdr.image_size, SEG_FINAL);
Andrey Petrov465fc132016-02-25 14:16:33 -0800422
Kyösti Mälkki216db612019-09-11 09:57:14 +0300423 timestamp_add_now(TS_BEFORE_INITRAM);
424
Lee Leahy9671faa2016-07-24 18:18:52 -0700425 do_fsp_memory_init(&hdr, s3wake, &memmap);
Kyösti Mälkki0889e932019-08-18 07:40:43 +0300426
427 timestamp_add_now(TS_AFTER_INITRAM);
Andrey Petrov465fc132016-02-25 14:16:33 -0800428}