blob: a7f707eb1c4c31b4acf2072eb6d5cfc2abaeca13 [file] [log] [blame]
Patrick Georgiafd4c872020-05-05 23:43:18 +02001/* Interface to SPI flash */
Patrick Georgiac959032020-05-05 22:49:26 +02002/* SPDX-License-Identifier: GPL-2.0-only */
Stefan Reinauer1c56d9b2012-05-10 11:27:32 -07003#ifndef _SPI_FLASH_H_
4#define _SPI_FLASH_H_
5
6#include <stdint.h>
7#include <stddef.h>
Furquan Shaikh810e2cd2016-12-05 20:32:24 -08008#include <spi-generic.h>
Dan Ehrenberga5aac762015-01-08 10:29:19 -08009#include <boot/coreboot_tables.h>
Stefan Reinauer1c56d9b2012-05-10 11:27:32 -070010
Furquan Shaikh52896c62016-11-22 11:43:58 -080011/* SPI Flash opcodes */
12#define SPI_OPCODE_WREN 0x06
13#define SPI_OPCODE_FAST_READ 0x0b
14
Furquan Shaikhe2fc5e22017-05-17 17:26:01 -070015struct spi_flash;
16
17/*
Patrick Rudolphe63a5f12018-03-12 11:34:53 +010018 * SPI write protection is enforced by locking the status register.
19 * The following modes are known. It depends on the flash chip if the
20 * mode is actually supported.
21 *
22 * PRESERVE : Keep the previous status register lock-down setting (noop)
23 * NONE : Status register isn't locked
24 * PIN : Status register is locked as long as the ~WP pin is active
25 * REBOOT : Status register is locked until power failure
26 * PERMANENT: Status register is permanently locked
27 */
28enum spi_flash_status_reg_lockdown {
29 SPI_WRITE_PROTECTION_PRESERVE = -1,
30 SPI_WRITE_PROTECTION_NONE = 0,
31 SPI_WRITE_PROTECTION_PIN,
32 SPI_WRITE_PROTECTION_REBOOT,
33 SPI_WRITE_PROTECTION_PERMANENT
34};
35
36/*
Furquan Shaikhe2fc5e22017-05-17 17:26:01 -070037 * Representation of SPI flash operations:
38 * read: Flash read operation.
39 * write: Flash write operation.
40 * erase: Flash erase operation.
41 * status: Read flash status register.
42 */
43struct spi_flash_ops {
44 int (*read)(const struct spi_flash *flash, u32 offset, size_t len,
45 void *buf);
46 int (*write)(const struct spi_flash *flash, u32 offset, size_t len,
47 const void *buf);
48 int (*erase)(const struct spi_flash *flash, u32 offset, size_t len);
49 int (*status)(const struct spi_flash *flash, u8 *reg);
Aaron Durbinf584f192020-01-11 14:03:27 -070050};
51
52/* Current code assumes all callbacks are supplied in this object. */
53struct spi_flash_protection_ops {
Patrick Rudolph0f8bf022018-03-09 14:20:25 +010054 /*
55 * Returns 1 if the whole region is software write protected.
56 * Hardware write protection mechanism aren't accounted.
57 * If the write protection could be changed, due to unlocked status
58 * register for example, 0 should be returned.
Patrick Rudolphe63a5f12018-03-12 11:34:53 +010059 * Returns 0 on success.
Patrick Rudolph0f8bf022018-03-09 14:20:25 +010060 */
Aaron Durbinf584f192020-01-11 14:03:27 -070061 int (*get_write)(const struct spi_flash *flash,
Patrick Rudolph0f8bf022018-03-09 14:20:25 +010062 const struct region *region);
Patrick Rudolphe63a5f12018-03-12 11:34:53 +010063 /*
64 * Enable the status register write protection, if supported on the
65 * requested region, and optionally enable status register lock-down.
66 * Returns 0 if the whole region was software write protected.
67 * Hardware write protection mechanism aren't accounted.
68 * If the status register is locked and the requested configuration
69 * doesn't match the selected one, return an error.
70 * Only a single region is supported !
71 *
72 * @return 0 on success
73 */
74 int
Aaron Durbinf584f192020-01-11 14:03:27 -070075 (*set_write)(const struct spi_flash *flash,
Patrick Rudolphe63a5f12018-03-12 11:34:53 +010076 const struct region *region,
Patrick Rudolphe63a5f12018-03-12 11:34:53 +010077 const enum spi_flash_status_reg_lockdown mode);
Patrick Rudolph0f8bf022018-03-09 14:20:25 +010078
Furquan Shaikhe2fc5e22017-05-17 17:26:01 -070079};
80
Aaron Durbin5abeb062020-01-12 15:12:18 -070081struct spi_flash_part_id;
82
Stefan Reinauer1c56d9b2012-05-10 11:27:32 -070083struct spi_flash {
Furquan Shaikh810e2cd2016-12-05 20:32:24 -080084 struct spi_slave spi;
Stefan Tauner630a4182018-08-26 04:26:04 +020085 u8 vendor;
Julius Werner99e45ce2019-06-06 17:03:44 -070086 union {
87 u8 raw;
88 struct {
89 u8 dual_spi : 1;
90 u8 _reserved : 7;
91 };
92 } flags;
Stefan Tauner630a4182018-08-26 04:26:04 +020093 u16 model;
Furquan Shaikhc28984d2016-11-20 21:04:00 -080094 u32 size;
95 u32 sector_size;
Furquan Shaikhfc1a1232017-05-12 00:19:56 -070096 u32 page_size;
Furquan Shaikhc28984d2016-11-20 21:04:00 -080097 u8 erase_cmd;
98 u8 status_cmd;
Aaron Durbind701ef72019-12-27 15:16:17 -070099 u8 pp_cmd; /* Page program command. */
100 u8 wren_cmd; /* Write Enable command. */
Furquan Shaikhe2fc5e22017-05-17 17:26:01 -0700101 const struct spi_flash_ops *ops;
Aaron Durbinf584f192020-01-11 14:03:27 -0700102 /* If !NULL all protection callbacks exist. */
103 const struct spi_flash_protection_ops *prot_ops;
Aaron Durbin5abeb062020-01-12 15:12:18 -0700104 const struct spi_flash_part_id *part;
Stefan Reinauer1c56d9b2012-05-10 11:27:32 -0700105};
106
Furquan Shaikhc28984d2016-11-20 21:04:00 -0800107void lb_spi_flash(struct lb_header *header);
108
109/* SPI Flash Driver Public API */
Furquan Shaikh30221b42017-05-15 14:35:15 -0700110
111/*
112 * Probe for SPI flash chip on given SPI bus and chip select and fill info in
113 * spi_flash structure.
114 *
115 * Params:
116 * bus = SPI Bus # for the flash chip
117 * cs = Chip select # for the flash chip
118 * flash = Pointer to spi flash structure that needs to be filled
119 *
120 * Return value:
121 * 0 = success
122 * non-zero = error
123 */
124int spi_flash_probe(unsigned int bus, unsigned int cs, struct spi_flash *flash);
Furquan Shaikha1491572017-05-17 19:14:06 -0700125
Furquan Shaikhd2fb6ae2016-11-17 20:38:07 -0800126/*
Furquan Shaikha1491572017-05-17 19:14:06 -0700127 * Generic probing for SPI flash chip based on the different flashes provided.
Furquan Shaikh30221b42017-05-15 14:35:15 -0700128 *
129 * Params:
Furquan Shaikha1491572017-05-17 19:14:06 -0700130 * spi = Pointer to spi_slave structure
Furquan Shaikh30221b42017-05-15 14:35:15 -0700131 * flash = Pointer to spi_flash structure that needs to be filled.
132 *
133 * Return value:
Furquan Shaikha1491572017-05-17 19:14:06 -0700134 * 0 = success
Furquan Shaikh30221b42017-05-15 14:35:15 -0700135 * non-zero = error
Furquan Shaikhd2fb6ae2016-11-17 20:38:07 -0800136 */
Furquan Shaikha1491572017-05-17 19:14:06 -0700137int spi_flash_generic_probe(const struct spi_slave *slave,
Furquan Shaikh30221b42017-05-15 14:35:15 -0700138 struct spi_flash *flash);
Stefan Reinauer1c56d9b2012-05-10 11:27:32 -0700139
Furquan Shaikhc28984d2016-11-20 21:04:00 -0800140/* All the following functions return 0 on success and non-zero on error. */
141int spi_flash_read(const struct spi_flash *flash, u32 offset, size_t len,
142 void *buf);
143int spi_flash_write(const struct spi_flash *flash, u32 offset, size_t len,
144 const void *buf);
145int spi_flash_erase(const struct spi_flash *flash, u32 offset, size_t len);
146int spi_flash_status(const struct spi_flash *flash, u8 *reg);
Patrick Rudolph0f8bf022018-03-09 14:20:25 +0100147
148/*
149 * Return the vendor dependent SPI flash write protection state.
150 * @param flash : A SPI flash device
151 * @param region: A subregion of the device's region
152 *
153 * Returns:
154 * -1 on error
155 * 0 if the device doesn't support block protection
156 * 0 if the device doesn't enable block protection
157 * 0 if given range isn't covered by block protection
158 * 1 if given range is covered by block protection
159 */
160int spi_flash_is_write_protected(const struct spi_flash *flash,
161 const struct region *region);
Furquan Shaikhc28984d2016-11-20 21:04:00 -0800162/*
Patrick Rudolphe63a5f12018-03-12 11:34:53 +0100163 * Enable the vendor dependent SPI flash write protection. The region not
164 * covered by write-protection will be set to write-able state.
165 * Only a single write-protected region is supported.
166 * Some flash ICs require the region to be aligned in the block size, sector
167 * size or page size.
168 * Some flash ICs require the region to start at TOP or BOTTOM.
169 *
170 * @param flash : A SPI flash device
171 * @param region: A subregion of the device's region
Patrick Rudolphe63a5f12018-03-12 11:34:53 +0100172 * @param mode: Optional lock-down of status register
173
174 * @return 0 on success
175 */
176int
177spi_flash_set_write_protected(const struct spi_flash *flash,
178 const struct region *region,
Patrick Rudolphe63a5f12018-03-12 11:34:53 +0100179 const enum spi_flash_status_reg_lockdown mode);
180
181/*
Furquan Shaikhc28984d2016-11-20 21:04:00 -0800182 * Some SPI controllers require exclusive access to SPI flash when volatile
183 * operations like erase or write are being performed. In such cases,
184 * volatile_group_begin will gain exclusive access to SPI flash if not already
185 * acquired and volatile_group_end will end exclusive access if this was the
186 * last request in the group. spi_flash_{write,erase} operations call
187 * volatile_group_begin at the start of function and volatile_group_end after
188 * erase/write operation is performed. These functions can also be used by any
189 * components that wish to club multiple volatile operations into a single
190 * group.
191 */
192int spi_flash_volatile_group_begin(const struct spi_flash *flash);
193int spi_flash_volatile_group_end(const struct spi_flash *flash);
194
195/*
196 * These are callbacks for marking the start and end of volatile group as
197 * handled by the chipset. Not every chipset requires this special handling. So,
198 * these functions are expected to be implemented in Kconfig option for volatile
199 * group is enabled (SPI_FLASH_HAS_VOLATILE_GROUP).
200 */
201int chipset_volatile_group_begin(const struct spi_flash *flash);
202int chipset_volatile_group_end(const struct spi_flash *flash);
Dan Ehrenberga5aac762015-01-08 10:29:19 -0800203
Aaron Durbin305c0ca2016-12-03 17:04:06 -0600204/* Return spi_flash object reference for the boot device. This is only valid
Martin Rothf48acbd2020-07-24 12:24:27 -0600205 * if CONFIG(BOOT_DEVICE_SPI_FLASH) is enabled. */
Aaron Durbin305c0ca2016-12-03 17:04:06 -0600206const struct spi_flash *boot_device_spi_flash(void);
207
Aaron Durbin10d65b02017-12-14 14:34:47 -0700208/* Protect a region of spi flash using its controller, if available. Returns
209 * < 0 on error, else 0 on success. */
210int spi_flash_ctrlr_protect_region(const struct spi_flash *flash,
Rizwan Qureshif9f50932018-12-31 15:19:16 +0530211 const struct region *region,
212 const enum ctrlr_prot_type type);
Aaron Durbin10d65b02017-12-14 14:34:47 -0700213
Aaron Durbin851dde82018-04-19 21:15:25 -0600214/*
215 * This function is provided to support spi flash command-response transactions.
216 * Only 2 vectors are supported and the 'func' is called with appropriate
217 * write and read buffers together. This can be used for chipsets that
218 * have specific spi flash controllers that don't conform to the normal
219 * spi xfer API because they are specialized controllers and not generic.
220 *
221 * Returns 0 on success and non-zero on failure.
222 */
223int spi_flash_vector_helper(const struct spi_slave *slave,
224 struct spi_op vectors[], size_t count,
225 int (*func)(const struct spi_slave *slave, const void *dout,
226 size_t bytesout, void *din, size_t bytesin));
227
Furquan Shaikh493937e2020-11-25 17:15:09 -0800228/*
229 * Fill in the memory mapped windows used by the SPI flash device. This is useful for payloads
230 * to identify SPI flash to host space mapping.
231 *
232 * Returns number of windows added to the table.
233 */
234uint32_t spi_flash_get_mmap_windows(struct flash_mmap_window *table);
235
Stefan Reinauer1c56d9b2012-05-10 11:27:32 -0700236#endif /* _SPI_FLASH_H_ */