blob: 3dafcf8ad98f7ea63d8e2a738be0d608ebabc6b3 [file] [log] [blame]
Andrey Petrov465fc132016-02-25 14:16:33 -08001/*
2 * This file is part of the coreboot project.
3 *
Lee Leahy47bd2d92016-07-24 18:12:16 -07004 * Copyright (C) 2015-2016 Intel Corp.
Andrey Petrov465fc132016-02-25 14:16:33 -08005 * (Written by Andrey Petrov <andrey.petrov@intel.com> for Intel Corp.)
6 * (Written by Alexandru Gagniuc <alexandrux.gagniuc@intel.com> for Intel Corp.)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 */
13
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +010014#include <security/vboot/antirollback.h>
Aaron Durbinb4302502016-07-17 17:04:37 -050015#include <arch/symbols.h>
Aaron Durbin31be2c92016-12-03 22:08:20 -060016#include <assert.h>
Aaron Durbind04639b2016-07-17 23:23:59 -050017#include <cbfs.h>
Aaron Durbin27928682016-07-15 22:32:28 -050018#include <cbmem.h>
Patrick Rudolphf677d172018-10-01 19:17:11 +020019#include <cf9_reset.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080020#include <console/console.h>
Furquan Shaikh5aea5882016-07-30 18:10:05 -070021#include <elog.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080022#include <fsp/api.h>
23#include <fsp/util.h>
24#include <memrange.h>
Aaron Durbindecd0622017-12-15 12:26:40 -070025#include <mrc_cache.h>
Aaron Durbind04639b2016-07-17 23:23:59 -050026#include <program_loading.h>
Aaron Durbinb4302502016-07-17 17:04:37 -050027#include <romstage_handoff.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080028#include <string.h>
Aaron Durbind04639b2016-07-17 23:23:59 -050029#include <symbols.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080030#include <timestamp.h>
Philipp Deppenwiesefea24292017-10-17 17:02:29 +020031#include <security/vboot/vboot_common.h>
Philipp Deppenwiese80961af2018-02-27 22:14:34 +010032#include <security/tpm/tspi.h>
Furquan Shaikh2db5bac2016-11-07 23:57:48 -080033#include <vb2_api.h>
Philipp Deppenwiese80961af2018-02-27 22:14:34 +010034#include <fsp/memory_init.h>
Andrey Petrov465fc132016-02-25 14:16:33 -080035
Aaron Durbinf0ec8242016-07-18 11:24:36 -050036static void save_memory_training_data(bool s3wake, uint32_t fsp_version)
Aaron Durbinb4302502016-07-17 17:04:37 -050037{
Aaron Durbinb4302502016-07-17 17:04:37 -050038 size_t mrc_data_size;
39 const void *mrc_data;
Aaron Durbinf0ec8242016-07-18 11:24:36 -050040
Julius Wernercd49cce2019-03-05 16:53:33 -080041 if (!CONFIG(CACHE_MRC_SETTINGS) || s3wake)
Aaron Durbinf0ec8242016-07-18 11:24:36 -050042 return;
43
44 mrc_data = fsp_find_nv_storage_data(&mrc_data_size);
45 if (!mrc_data) {
46 printk(BIOS_ERR, "Couldn't find memory training data HOB.\n");
47 return;
48 }
49
50 /*
51 * Save MRC Data to CBMEM. By always saving the data this forces
52 * a retrain after a trip through Chrome OS recovery path. The
53 * code which saves the data to flash doesn't write if the latest
54 * training data matches this one.
55 */
Aaron Durbin31be2c92016-12-03 22:08:20 -060056 if (mrc_cache_stash_data(MRC_TRAINING_DATA, fsp_version, mrc_data,
57 mrc_data_size) < 0)
58 printk(BIOS_ERR, "Failed to stash MRC data\n");
Furquan Shaikh2db5bac2016-11-07 23:57:48 -080059
Julius Wernercd49cce2019-03-05 16:53:33 -080060 if (CONFIG(FSP2_0_USES_TPM_MRC_HASH))
Philipp Deppenwiese80961af2018-02-27 22:14:34 +010061 mrc_cache_update_hash(mrc_data, mrc_data_size);
Aaron Durbinf0ec8242016-07-18 11:24:36 -050062}
63
Lee Leahy9671faa2016-07-24 18:18:52 -070064static void do_fsp_post_memory_init(bool s3wake, uint32_t fsp_version)
Aaron Durbinf0ec8242016-07-18 11:24:36 -050065{
66 struct range_entry fsp_mem;
Aaron Durbinb4302502016-07-17 17:04:37 -050067
Lee Leahy52d0c682016-08-01 15:47:42 -070068 if (fsp_find_reserved_memory(&fsp_mem))
69 die("Failed to find FSP_RESERVED_MEMORY_RESOURCE_HOB!\n");
Aaron Durbinb4302502016-07-17 17:04:37 -050070
71 /* initialize cbmem by adding FSP reserved memory first thing */
72 if (!s3wake) {
73 cbmem_initialize_empty_id_size(CBMEM_ID_FSP_RESERVED_MEMORY,
74 range_entry_size(&fsp_mem));
75 } else if (cbmem_initialize_id_size(CBMEM_ID_FSP_RESERVED_MEMORY,
76 range_entry_size(&fsp_mem))) {
Julius Wernercd49cce2019-03-05 16:53:33 -080077 if (CONFIG(HAVE_ACPI_RESUME)) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -070078 printk(BIOS_ERR,
Lee Leahyac3b0a62016-07-27 07:40:25 -070079 "Failed to recover CBMEM in S3 resume.\n");
Aaron Durbinb4302502016-07-17 17:04:37 -050080 /* Failed S3 resume, reset to come up cleanly */
Patrick Rudolphf677d172018-10-01 19:17:11 +020081 /* FIXME: A "system" reset is likely enough: */
82 full_reset();
Aaron Durbinb4302502016-07-17 17:04:37 -050083 }
84 }
85
86 /* make sure FSP memory is reserved in cbmem */
87 if (range_entry_base(&fsp_mem) !=
88 (uintptr_t)cbmem_find(CBMEM_ID_FSP_RESERVED_MEMORY))
Lee Leahy9671faa2016-07-24 18:18:52 -070089 die("Failed to accommodate FSP reserved memory request!\n");
Aaron Durbinb4302502016-07-17 17:04:37 -050090
Aaron Durbinf0ec8242016-07-18 11:24:36 -050091 save_memory_training_data(s3wake, fsp_version);
Aaron Durbinb4302502016-07-17 17:04:37 -050092
93 /* Create romstage handof information */
Aaron Durbin77e13992016-11-29 17:43:04 -060094 romstage_handoff_init(s3wake);
Youness Alaoui676887d2018-02-07 11:49:35 -050095
96 /*
97 * Initialize the TPM, unless the TPM was already initialized
98 * in verstage and used to verify romstage.
99 */
Julius Wernercd49cce2019-03-05 16:53:33 -0800100 if ((CONFIG(TPM1) || CONFIG(TPM2)) &&
101 !CONFIG(VBOOT_STARTS_IN_BOOTBLOCK))
Philipp Deppenwiesec07f8fb2018-02-27 19:40:52 +0100102 tpm_setup(s3wake);
Aaron Durbinb4302502016-07-17 17:04:37 -0500103}
104
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530105static void fsp_fill_mrc_cache(FSPM_ARCH_UPD *arch_upd, uint32_t fsp_version)
Aaron Durbinb4302502016-07-17 17:04:37 -0500106{
Aaron Durbin31be2c92016-12-03 22:08:20 -0600107 struct region_device rdev;
108 void *data;
Aaron Durbinb4302502016-07-17 17:04:37 -0500109
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500110 arch_upd->NvsBufferPtr = NULL;
111
Julius Wernercd49cce2019-03-05 16:53:33 -0800112 if (!CONFIG(CACHE_MRC_SETTINGS))
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500113 return;
114
Aaron Durbin31be2c92016-12-03 22:08:20 -0600115 /*
116 * In recovery mode, force retraining:
117 * 1. Recovery cache is not supported, or
118 * 2. Memory retrain switch is set.
119 */
120 if (vboot_recovery_mode_enabled()) {
Julius Wernercd49cce2019-03-05 16:53:33 -0800121 if (!CONFIG(HAS_RECOVERY_MRC_CACHE))
Aaron Durbin31be2c92016-12-03 22:08:20 -0600122 return;
123 if (vboot_recovery_mode_memory_retrain())
124 return;
125 }
Aaron Durbin98ea6362016-07-18 11:31:53 -0500126
Aaron Durbin31be2c92016-12-03 22:08:20 -0600127 if (mrc_cache_get_current(MRC_TRAINING_DATA, fsp_version, &rdev) < 0)
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500128 return;
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500129
Aaron Durbin31be2c92016-12-03 22:08:20 -0600130 /* Assume boot device is memory mapped. */
Julius Wernercd49cce2019-03-05 16:53:33 -0800131 assert(CONFIG(BOOT_DEVICE_MEMORY_MAPPED));
Aaron Durbin31be2c92016-12-03 22:08:20 -0600132 data = rdev_mmap_full(&rdev);
133
134 if (data == NULL)
135 return;
136
Julius Wernercd49cce2019-03-05 16:53:33 -0800137 if (CONFIG(FSP2_0_USES_TPM_MRC_HASH) &&
Philipp Deppenwiese80961af2018-02-27 22:14:34 +0100138 !mrc_cache_verify_hash(data, region_device_sz(&rdev)))
Furquan Shaikh2db5bac2016-11-07 23:57:48 -0800139 return;
140
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500141 /* MRC cache found */
Aaron Durbin31be2c92016-12-03 22:08:20 -0600142 arch_upd->NvsBufferPtr = data;
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530143
144 printk(BIOS_SPEW, "MRC cache found, size %zx\n",
145 region_device_sz(&rdev));
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500146}
147
Aaron Durbin02e504c2016-07-18 11:53:10 -0500148static enum cb_err check_region_overlap(const struct memranges *ranges,
149 const char *description,
150 uintptr_t begin, uintptr_t end)
Aaron Durbinf0ec8242016-07-18 11:24:36 -0500151{
Aaron Durbin02e504c2016-07-18 11:53:10 -0500152 const struct range_entry *r;
153
154 memranges_each_entry(r, ranges) {
155 if (end <= range_entry_base(r))
156 continue;
157 if (begin >= range_entry_end(r))
158 continue;
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700159 printk(BIOS_CRIT, "'%s' overlaps currently running program: "
Aaron Durbin02e504c2016-07-18 11:53:10 -0500160 "[%p, %p)\n", description, (void *)begin, (void *)end);
161 return CB_ERR;
162 }
163
164 return CB_SUCCESS;
165}
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530166static enum cb_err setup_fsp_stack_frame(FSPM_ARCH_UPD *arch_upd,
167 const struct memranges *memmap)
Aaron Durbin02e504c2016-07-18 11:53:10 -0500168{
169 uintptr_t stack_begin;
170 uintptr_t stack_end;
171
Aaron Durbinb4302502016-07-17 17:04:37 -0500172 /*
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530173 * FSP 2.1 version would use same stack as coreboot instead of
174 * setting up seprate stack frame. FSP 2.1 would not relocate stack
175 * top and does not reinitialize stack pointer.
176 */
Julius Wernercd49cce2019-03-05 16:53:33 -0800177 if (CONFIG(FSP_USES_CB_STACK)) {
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530178 arch_upd->StackBase = (void *)_car_stack_end;
179 arch_upd->StackSize = CONFIG_DCACHE_BSP_STACK_SIZE;
180 return CB_SUCCESS;
181 }
182
183 /*
184 * FSPM_UPD passed here is populated with default values
185 * provided by the blob itself. We let FSPM use top of CAR
186 * region of the size it requests.
Aaron Durbinb4302502016-07-17 17:04:37 -0500187 */
Aaron Durbin02e504c2016-07-18 11:53:10 -0500188 stack_end = (uintptr_t)_car_region_end;
189 stack_begin = stack_end - arch_upd->StackSize;
Aaron Durbin02e504c2016-07-18 11:53:10 -0500190 if (check_region_overlap(memmap, "FSPM stack", stack_begin,
191 stack_end) != CB_SUCCESS)
192 return CB_ERR;
193
194 arch_upd->StackBase = (void *)stack_begin;
Aamir Bohra6d569e0c2018-08-27 13:36:15 +0530195 return CB_SUCCESS;
196}
197
198static enum cb_err fsp_fill_common_arch_params(FSPM_ARCH_UPD *arch_upd,
199 bool s3wake, uint32_t fsp_version,
200 const struct memranges *memmap)
201{
202 if (setup_fsp_stack_frame(arch_upd, memmap))
203 return CB_ERR;
Aaron Durbinb4302502016-07-17 17:04:37 -0500204
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530205 fsp_fill_mrc_cache(arch_upd, fsp_version);
Aaron Durbinb4302502016-07-17 17:04:37 -0500206
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530207 /* Configure bootmode */
208 if (s3wake) {
209 /*
210 * For S3 resume case, if valid mrc cache data is not found or
211 * RECOVERY_MRC_CACHE hash verification fails, the S3 data
212 * pointer would be null and S3 resume fails with fsp-m
213 * returning error. Invoking a reset here saves time.
214 */
215 if (!arch_upd->NvsBufferPtr)
Patrick Rudolphf677d172018-10-01 19:17:11 +0200216 /* FIXME: A "system" reset is likely enough: */
217 full_reset();
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530218 arch_upd->BootMode = FSP_BOOT_ON_S3_RESUME;
219 } else {
220 if (arch_upd->NvsBufferPtr)
221 arch_upd->BootMode =
222 FSP_BOOT_ASSUMING_NO_CONFIGURATION_CHANGES;
223 else
224 arch_upd->BootMode = FSP_BOOT_WITH_FULL_CONFIGURATION;
225 }
Aaron Durbin02e504c2016-07-18 11:53:10 -0500226
Aamir Bohra69cd62c2018-01-08 11:01:34 +0530227 printk(BIOS_SPEW, "bootmode is set to :%d\n", arch_upd->BootMode);
Aamir Bohra276c06a2017-12-26 17:54:45 +0530228
Aaron Durbin02e504c2016-07-18 11:53:10 -0500229 return CB_SUCCESS;
Aaron Durbinb4302502016-07-17 17:04:37 -0500230}
231
Aaron Durbin64031672018-04-21 14:45:32 -0600232__weak
Aaron Durbina3cecb22017-04-25 21:58:10 -0500233uint8_t fsp_memory_mainboard_version(void)
234{
235 return 0;
236}
237
Aaron Durbin64031672018-04-21 14:45:32 -0600238__weak
Aaron Durbina3cecb22017-04-25 21:58:10 -0500239uint8_t fsp_memory_soc_version(void)
240{
241 return 0;
242}
243
244/*
245 * Allow SoC and/or mainboard to bump the revision of the FSP setting
246 * number. The FSP spec uses the low 8 bits as the build number. Take over
247 * bits 3:0 for the SoC setting and bits 7:4 for the mainboard. That way
248 * a tweak in the settings will bump the version used to track the cached
249 * setting which triggers retraining when the FSP version hasn't changed, but
250 * the SoC or mainboard settings have.
251 */
252static uint32_t fsp_memory_settings_version(const struct fsp_header *hdr)
253{
254 /* Use the full FSP version by default. */
255 uint32_t ver = hdr->fsp_revision;
256
Julius Wernercd49cce2019-03-05 16:53:33 -0800257 if (!CONFIG(FSP_PLATFORM_MEMORY_SETTINGS_VERSIONS))
Aaron Durbina3cecb22017-04-25 21:58:10 -0500258 return ver;
259
260 ver &= ~0xff;
261 ver |= (0xf & fsp_memory_mainboard_version()) << 4;
262 ver |= (0xf & fsp_memory_soc_version()) << 0;
263
264 return ver;
265}
266
Lee Leahy9671faa2016-07-24 18:18:52 -0700267static void do_fsp_memory_init(struct fsp_header *hdr, bool s3wake,
Aaron Durbin02e504c2016-07-18 11:53:10 -0500268 const struct memranges *memmap)
Andrey Petrov465fc132016-02-25 14:16:33 -0800269{
Brandon Breitensteinc31ba0e2016-07-27 17:34:45 -0700270 uint32_t status;
Andrey Petrov465fc132016-02-25 14:16:33 -0800271 fsp_memory_init_fn fsp_raminit;
Brandon Breitensteinc31ba0e2016-07-27 17:34:45 -0700272 FSPM_UPD fspm_upd, *upd;
273 FSPM_ARCH_UPD *arch_upd;
Aaron Durbina3cecb22017-04-25 21:58:10 -0500274 uint32_t fsp_version;
Andrey Petrov465fc132016-02-25 14:16:33 -0800275
Furquan Shaikh585210a2018-10-16 11:54:37 -0700276 post_code(POST_MEM_PREINIT_PREP_START);
Andrey Petrov465fc132016-02-25 14:16:33 -0800277
Aaron Durbina3cecb22017-04-25 21:58:10 -0500278 fsp_version = fsp_memory_settings_version(hdr);
279
Brandon Breitensteinc31ba0e2016-07-27 17:34:45 -0700280 upd = (FSPM_UPD *)(hdr->cfg_region_offset + hdr->image_base);
Andrey Petrov465fc132016-02-25 14:16:33 -0800281
Lee Leahye686ee82017-03-10 08:45:30 -0800282 if (upd->FspUpdHeader.Signature != FSPM_UPD_SIGNATURE)
Lee Leahy9671faa2016-07-24 18:18:52 -0700283 die("Invalid FSPM signature!\n");
Andrey Petrov465fc132016-02-25 14:16:33 -0800284
285 /* Copy the default values from the UPD area */
286 memcpy(&fspm_upd, upd, sizeof(fspm_upd));
287
Aaron Durbin02e504c2016-07-18 11:53:10 -0500288 arch_upd = &fspm_upd.FspmArchUpd;
289
Aaron Durbin27928682016-07-15 22:32:28 -0500290 /* Reserve enough memory under TOLUD to save CBMEM header */
Aaron Durbin02e504c2016-07-18 11:53:10 -0500291 arch_upd->BootLoaderTolumSize = cbmem_overhead_size();
Aaron Durbin27928682016-07-15 22:32:28 -0500292
Aaron Durbinb4302502016-07-17 17:04:37 -0500293 /* Fill common settings on behalf of chipset. */
Aaron Durbina3cecb22017-04-25 21:58:10 -0500294 if (fsp_fill_common_arch_params(arch_upd, s3wake, fsp_version,
Aaron Durbin02e504c2016-07-18 11:53:10 -0500295 memmap) != CB_SUCCESS)
Lee Leahy9671faa2016-07-24 18:18:52 -0700296 die("FSPM_ARCH_UPD not found!\n");
Aaron Durbinb4302502016-07-17 17:04:37 -0500297
Andrey Petrov465fc132016-02-25 14:16:33 -0800298 /* Give SoC and mainboard a chance to update the UPD */
Aaron Durbina3cecb22017-04-25 21:58:10 -0500299 platform_fsp_memory_init_params_cb(&fspm_upd, fsp_version);
Andrey Petrov465fc132016-02-25 14:16:33 -0800300
Julius Wernercd49cce2019-03-05 16:53:33 -0800301 if (CONFIG(MMA))
Pratik Prajapatiffc934d2016-11-18 14:36:34 -0800302 setup_mma(&fspm_upd.FspmConfig);
303
Furquan Shaikh585210a2018-10-16 11:54:37 -0700304 post_code(POST_MEM_PREINIT_PREP_END);
305
Andrey Petrov465fc132016-02-25 14:16:33 -0800306 /* Call FspMemoryInit */
307 fsp_raminit = (void *)(hdr->image_base + hdr->memory_init_entry_offset);
Lee Leahyac3b0a62016-07-27 07:40:25 -0700308 fsp_debug_before_memory_init(fsp_raminit, upd, &fspm_upd);
Andrey Petrov465fc132016-02-25 14:16:33 -0800309
Alexandru Gagniucc4ea8f72016-05-23 12:16:58 -0700310 post_code(POST_FSP_MEMORY_INIT);
Andrey Petrov465fc132016-02-25 14:16:33 -0800311 timestamp_add_now(TS_FSP_MEMORY_INIT_START);
Lee Leahyac3b0a62016-07-27 07:40:25 -0700312 status = fsp_raminit(&fspm_upd, fsp_get_hob_list_ptr());
Subrata Banik0755ab92017-07-12 15:31:06 +0530313 post_code(POST_FSP_MEMORY_EXIT);
Andrey Petrov465fc132016-02-25 14:16:33 -0800314 timestamp_add_now(TS_FSP_MEMORY_INIT_END);
315
Lee Leahyac3b0a62016-07-27 07:40:25 -0700316 fsp_debug_after_memory_init(status);
Andrey Petrov465fc132016-02-25 14:16:33 -0800317
Lee Leahy9671faa2016-07-24 18:18:52 -0700318 /* Handle any errors returned by FspMemoryInit */
Aaron Durbinf41f2aa2016-07-18 12:03:58 -0500319 fsp_handle_reset(status);
Lee Leahy9671faa2016-07-24 18:18:52 -0700320 if (status != FSP_SUCCESS) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700321 printk(BIOS_CRIT, "FspMemoryInit returned 0x%08x\n", status);
Lee Leahy9671faa2016-07-24 18:18:52 -0700322 die("FspMemoryInit returned an error!\n");
323 }
Aaron Durbinf41f2aa2016-07-18 12:03:58 -0500324
Aaron Durbina3cecb22017-04-25 21:58:10 -0500325 do_fsp_post_memory_init(s3wake, fsp_version);
Andrey Petrov465fc132016-02-25 14:16:33 -0800326}
327
Aaron Durbind04639b2016-07-17 23:23:59 -0500328/* Load the binary into the memory specified by the info header. */
329static enum cb_err load_fspm_mem(struct fsp_header *hdr,
Aaron Durbin02e504c2016-07-18 11:53:10 -0500330 const struct region_device *rdev,
331 const struct memranges *memmap)
Aaron Durbind04639b2016-07-17 23:23:59 -0500332{
Aaron Durbind04639b2016-07-17 23:23:59 -0500333 uintptr_t fspm_begin;
334 uintptr_t fspm_end;
335
336 if (fsp_validate_component(hdr, rdev) != CB_SUCCESS)
337 return CB_ERR;
338
339 fspm_begin = hdr->image_base;
340 fspm_end = fspm_begin + hdr->image_size;
341
Aaron Durbin02e504c2016-07-18 11:53:10 -0500342 if (check_region_overlap(memmap, "FSPM", fspm_begin, fspm_end) !=
343 CB_SUCCESS)
Aaron Durbind04639b2016-07-17 23:23:59 -0500344 return CB_ERR;
Aaron Durbind04639b2016-07-17 23:23:59 -0500345
346 /* Load binary into memory at provided address. */
347 if (rdev_readat(rdev, (void *)fspm_begin, 0, fspm_end - fspm_begin) < 0)
348 return CB_ERR;
349
350 return CB_SUCCESS;
351}
352
353/* Handle the case when FSPM is running XIP. */
354static enum cb_err load_fspm_xip(struct fsp_header *hdr,
355 const struct region_device *rdev)
356{
357 void *base;
358
359 if (fsp_validate_component(hdr, rdev) != CB_SUCCESS)
360 return CB_ERR;
361
362 base = rdev_mmap_full(rdev);
363 if ((uintptr_t)base != hdr->image_base) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700364 printk(BIOS_CRIT, "FSPM XIP base does not match: %p vs %p\n",
Aaron Durbind04639b2016-07-17 23:23:59 -0500365 (void *)(uintptr_t)hdr->image_base, base);
366 return CB_ERR;
367 }
368
369 /*
370 * Since the component is XIP it's already in the address space. Thus,
371 * there's no need to rdev_munmap().
372 */
373 return CB_SUCCESS;
374}
375
Lee Leahy9671faa2016-07-24 18:18:52 -0700376void fsp_memory_init(bool s3wake)
Andrey Petrov465fc132016-02-25 14:16:33 -0800377{
378 struct fsp_header hdr;
Aaron Durbind04639b2016-07-17 23:23:59 -0500379 enum cb_err status;
380 struct cbfsf file_desc;
381 struct region_device file_data;
382 const char *name = CONFIG_FSP_M_CBFS;
Aaron Durbin02e504c2016-07-18 11:53:10 -0500383 struct memranges memmap;
384 struct range_entry freeranges[2];
Andrey Petrov465fc132016-02-25 14:16:33 -0800385
Julius Wernercd49cce2019-03-05 16:53:33 -0800386 if (CONFIG(ELOG_BOOT_COUNT) && !s3wake)
Furquan Shaikh5aea5882016-07-30 18:10:05 -0700387 boot_count_increment();
388
Aaron Durbind04639b2016-07-17 23:23:59 -0500389 if (cbfs_boot_locate(&file_desc, name, NULL)) {
Lee Leahyb20d4ba2016-07-31 16:49:28 -0700390 printk(BIOS_CRIT, "Could not locate %s in CBFS\n", name);
Lee Leahy9671faa2016-07-24 18:18:52 -0700391 die("FSPM not available!\n");
Aaron Durbind04639b2016-07-17 23:23:59 -0500392 }
393
394 cbfs_file_data(&file_data, &file_desc);
395
Aaron Durbin02e504c2016-07-18 11:53:10 -0500396 /* Build up memory map of romstage address space including CAR. */
397 memranges_init_empty(&memmap, &freeranges[0], ARRAY_SIZE(freeranges));
398 memranges_insert(&memmap, (uintptr_t)_car_region_start,
399 _car_relocatable_data_end - _car_region_start, 0);
Julius Werner7e0dea62019-02-20 18:39:22 -0800400 memranges_insert(&memmap, (uintptr_t)_program, REGION_SIZE(program), 0);
Aaron Durbin02e504c2016-07-18 11:53:10 -0500401
Julius Wernercd49cce2019-03-05 16:53:33 -0800402 if (!CONFIG(FSP_M_XIP))
Aaron Durbin02e504c2016-07-18 11:53:10 -0500403 status = load_fspm_mem(&hdr, &file_data, &memmap);
Aaron Durbind04639b2016-07-17 23:23:59 -0500404 else
405 status = load_fspm_xip(&hdr, &file_data);
406
Lee Leahye686ee82017-03-10 08:45:30 -0800407 if (status != CB_SUCCESS)
Lee Leahy9671faa2016-07-24 18:18:52 -0700408 die("Loading FSPM failed!\n");
Aaron Durbind04639b2016-07-17 23:23:59 -0500409
410 /* Signal that FSP component has been loaded. */
411 prog_segment_loaded(hdr.image_base, hdr.image_size, SEG_FINAL);
Andrey Petrov465fc132016-02-25 14:16:33 -0800412
Lee Leahy9671faa2016-07-24 18:18:52 -0700413 do_fsp_memory_init(&hdr, s3wake, &memmap);
Andrey Petrov465fc132016-02-25 14:16:33 -0800414}