1*0d6140beSAndroid Build Coastguard Worker /*
2*0d6140beSAndroid Build Coastguard Worker * This file is part of the flashrom project.
3*0d6140beSAndroid Build Coastguard Worker *
4*0d6140beSAndroid Build Coastguard Worker * Copyright (C) 2011-2012 Stefan Tauner
5*0d6140beSAndroid Build Coastguard Worker *
6*0d6140beSAndroid Build Coastguard Worker * This program is free software; you can redistribute it and/or modify
7*0d6140beSAndroid Build Coastguard Worker * it under the terms of the GNU General Public License as published by
8*0d6140beSAndroid Build Coastguard Worker * the Free Software Foundation; version 2 of the License.
9*0d6140beSAndroid Build Coastguard Worker *
10*0d6140beSAndroid Build Coastguard Worker * This program is distributed in the hope that it will be useful,
11*0d6140beSAndroid Build Coastguard Worker * but WITHOUT ANY WARRANTY; without even the implied warranty of
12*0d6140beSAndroid Build Coastguard Worker * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13*0d6140beSAndroid Build Coastguard Worker * GNU General Public License for more details.
14*0d6140beSAndroid Build Coastguard Worker */
15*0d6140beSAndroid Build Coastguard Worker
16*0d6140beSAndroid Build Coastguard Worker #include <stdint.h>
17*0d6140beSAndroid Build Coastguard Worker #include <stdlib.h>
18*0d6140beSAndroid Build Coastguard Worker #include <string.h>
19*0d6140beSAndroid Build Coastguard Worker #include "flash.h"
20*0d6140beSAndroid Build Coastguard Worker #include "spi.h"
21*0d6140beSAndroid Build Coastguard Worker #include "chipdrivers.h"
22*0d6140beSAndroid Build Coastguard Worker
spi_sfdp_read_sfdp_chunk(struct flashctx * flash,uint32_t address,uint8_t * buf,int len)23*0d6140beSAndroid Build Coastguard Worker static int spi_sfdp_read_sfdp_chunk(struct flashctx *flash, uint32_t address, uint8_t *buf, int len)
24*0d6140beSAndroid Build Coastguard Worker {
25*0d6140beSAndroid Build Coastguard Worker int i, ret;
26*0d6140beSAndroid Build Coastguard Worker uint8_t *newbuf;
27*0d6140beSAndroid Build Coastguard Worker const unsigned char cmd[JEDEC_SFDP_OUTSIZE] = {
28*0d6140beSAndroid Build Coastguard Worker JEDEC_SFDP,
29*0d6140beSAndroid Build Coastguard Worker (address >> 16) & 0xff,
30*0d6140beSAndroid Build Coastguard Worker (address >> 8) & 0xff,
31*0d6140beSAndroid Build Coastguard Worker (address >> 0) & 0xff,
32*0d6140beSAndroid Build Coastguard Worker /* FIXME: the following dummy byte explodes on some programmers.
33*0d6140beSAndroid Build Coastguard Worker * One workaround is to read the dummy byte
34*0d6140beSAndroid Build Coastguard Worker * instead and discard its value.
35*0d6140beSAndroid Build Coastguard Worker */
36*0d6140beSAndroid Build Coastguard Worker 0
37*0d6140beSAndroid Build Coastguard Worker };
38*0d6140beSAndroid Build Coastguard Worker msg_cspew("%s: addr=0x%"PRIx32", len=%d, data:\n", __func__, address, len);
39*0d6140beSAndroid Build Coastguard Worker newbuf = malloc(len + 1);
40*0d6140beSAndroid Build Coastguard Worker if (!newbuf)
41*0d6140beSAndroid Build Coastguard Worker return SPI_PROGRAMMER_ERROR;
42*0d6140beSAndroid Build Coastguard Worker ret = spi_send_command(flash, sizeof(cmd) - 1, len + 1, cmd, newbuf);
43*0d6140beSAndroid Build Coastguard Worker memmove(buf, newbuf + 1, len);
44*0d6140beSAndroid Build Coastguard Worker free(newbuf);
45*0d6140beSAndroid Build Coastguard Worker if (ret)
46*0d6140beSAndroid Build Coastguard Worker return ret;
47*0d6140beSAndroid Build Coastguard Worker for (i = 0; i < len; i++)
48*0d6140beSAndroid Build Coastguard Worker msg_cspew(" 0x%02x", buf[i]);
49*0d6140beSAndroid Build Coastguard Worker msg_cspew("\n");
50*0d6140beSAndroid Build Coastguard Worker return 0;
51*0d6140beSAndroid Build Coastguard Worker }
52*0d6140beSAndroid Build Coastguard Worker
spi_sfdp_read_sfdp(struct flashctx * flash,uint32_t address,uint8_t * buf,int len)53*0d6140beSAndroid Build Coastguard Worker static int spi_sfdp_read_sfdp(struct flashctx *flash, uint32_t address, uint8_t *buf, int len)
54*0d6140beSAndroid Build Coastguard Worker {
55*0d6140beSAndroid Build Coastguard Worker /* FIXME: There are different upper bounds for the number of bytes to
56*0d6140beSAndroid Build Coastguard Worker * read on the various programmers (even depending on the rest of the
57*0d6140beSAndroid Build Coastguard Worker * structure of the transaction). 2 is a safe bet. */
58*0d6140beSAndroid Build Coastguard Worker int maxstep = 2;
59*0d6140beSAndroid Build Coastguard Worker int ret = 0;
60*0d6140beSAndroid Build Coastguard Worker while (len > 0) {
61*0d6140beSAndroid Build Coastguard Worker int step = min(len, maxstep);
62*0d6140beSAndroid Build Coastguard Worker ret = spi_sfdp_read_sfdp_chunk(flash, address, buf, step);
63*0d6140beSAndroid Build Coastguard Worker if (ret)
64*0d6140beSAndroid Build Coastguard Worker return ret;
65*0d6140beSAndroid Build Coastguard Worker address += step;
66*0d6140beSAndroid Build Coastguard Worker buf += step;
67*0d6140beSAndroid Build Coastguard Worker len -= step;
68*0d6140beSAndroid Build Coastguard Worker }
69*0d6140beSAndroid Build Coastguard Worker return ret;
70*0d6140beSAndroid Build Coastguard Worker }
71*0d6140beSAndroid Build Coastguard Worker
72*0d6140beSAndroid Build Coastguard Worker struct sfdp_tbl_hdr {
73*0d6140beSAndroid Build Coastguard Worker uint8_t id;
74*0d6140beSAndroid Build Coastguard Worker uint8_t v_minor;
75*0d6140beSAndroid Build Coastguard Worker uint8_t v_major;
76*0d6140beSAndroid Build Coastguard Worker uint8_t len;
77*0d6140beSAndroid Build Coastguard Worker uint32_t ptp; /* 24b pointer */
78*0d6140beSAndroid Build Coastguard Worker };
79*0d6140beSAndroid Build Coastguard Worker
sfdp_add_uniform_eraser(struct flashchip * chip,uint8_t opcode,uint32_t block_size)80*0d6140beSAndroid Build Coastguard Worker static int sfdp_add_uniform_eraser(struct flashchip *chip, uint8_t opcode, uint32_t block_size)
81*0d6140beSAndroid Build Coastguard Worker {
82*0d6140beSAndroid Build Coastguard Worker int i;
83*0d6140beSAndroid Build Coastguard Worker uint32_t total_size = chip->total_size * 1024;
84*0d6140beSAndroid Build Coastguard Worker enum block_erase_func erasefn = spi25_get_erasefn_from_opcode(opcode);
85*0d6140beSAndroid Build Coastguard Worker
86*0d6140beSAndroid Build Coastguard Worker if (erasefn == NO_BLOCK_ERASE_FUNC || total_size == 0 || block_size == 0 ||
87*0d6140beSAndroid Build Coastguard Worker total_size % block_size != 0) {
88*0d6140beSAndroid Build Coastguard Worker msg_cdbg("%s: invalid input, please report to "
89*0d6140beSAndroid Build Coastguard Worker "[email protected]\n", __func__);
90*0d6140beSAndroid Build Coastguard Worker return 1;
91*0d6140beSAndroid Build Coastguard Worker }
92*0d6140beSAndroid Build Coastguard Worker
93*0d6140beSAndroid Build Coastguard Worker for (i = 0; i < NUM_ERASEFUNCTIONS; i++) {
94*0d6140beSAndroid Build Coastguard Worker struct block_eraser *eraser = &chip->block_erasers[i];
95*0d6140beSAndroid Build Coastguard Worker /* Check for duplicates (including (some) non-uniform ones). */
96*0d6140beSAndroid Build Coastguard Worker if (eraser->eraseblocks[0].size == block_size &&
97*0d6140beSAndroid Build Coastguard Worker eraser->block_erase == erasefn) {
98*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" Tried to add a duplicate block eraser: "
99*0d6140beSAndroid Build Coastguard Worker "%"PRId32" x %"PRId32" B with opcode 0x%02x.\n",
100*0d6140beSAndroid Build Coastguard Worker total_size/block_size, block_size, opcode);
101*0d6140beSAndroid Build Coastguard Worker return 1;
102*0d6140beSAndroid Build Coastguard Worker }
103*0d6140beSAndroid Build Coastguard Worker if (eraser->eraseblocks[0].size != 0 ||
104*0d6140beSAndroid Build Coastguard Worker eraser->block_erase != NO_BLOCK_ERASE_FUNC) {
105*0d6140beSAndroid Build Coastguard Worker msg_cspew(" Block Eraser %d is already occupied.\n",
106*0d6140beSAndroid Build Coastguard Worker i);
107*0d6140beSAndroid Build Coastguard Worker continue;
108*0d6140beSAndroid Build Coastguard Worker }
109*0d6140beSAndroid Build Coastguard Worker
110*0d6140beSAndroid Build Coastguard Worker eraser->block_erase = erasefn;
111*0d6140beSAndroid Build Coastguard Worker eraser->eraseblocks[0].size = block_size;
112*0d6140beSAndroid Build Coastguard Worker eraser->eraseblocks[0].count = total_size/block_size;
113*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" Block eraser %d: %"PRId32" x %"PRId32" B with opcode "
114*0d6140beSAndroid Build Coastguard Worker "0x%02x\n", i, total_size/block_size, block_size,
115*0d6140beSAndroid Build Coastguard Worker opcode);
116*0d6140beSAndroid Build Coastguard Worker return 0;
117*0d6140beSAndroid Build Coastguard Worker }
118*0d6140beSAndroid Build Coastguard Worker msg_cinfo("%s: Not enough space to store another eraser (i=%d)."
119*0d6140beSAndroid Build Coastguard Worker " Please report this at [email protected]\n",
120*0d6140beSAndroid Build Coastguard Worker __func__, i);
121*0d6140beSAndroid Build Coastguard Worker return 1;
122*0d6140beSAndroid Build Coastguard Worker }
123*0d6140beSAndroid Build Coastguard Worker
sfdp_fill_flash(struct flashchip * chip,uint8_t * buf,uint16_t len)124*0d6140beSAndroid Build Coastguard Worker static int sfdp_fill_flash(struct flashchip *chip, uint8_t *buf, uint16_t len)
125*0d6140beSAndroid Build Coastguard Worker {
126*0d6140beSAndroid Build Coastguard Worker uint8_t opcode_4k_erase = 0xFF;
127*0d6140beSAndroid Build Coastguard Worker uint32_t tmp32;
128*0d6140beSAndroid Build Coastguard Worker uint8_t tmp8;
129*0d6140beSAndroid Build Coastguard Worker uint32_t total_size; /* in bytes */
130*0d6140beSAndroid Build Coastguard Worker uint32_t block_size;
131*0d6140beSAndroid Build Coastguard Worker int j;
132*0d6140beSAndroid Build Coastguard Worker
133*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Parsing JEDEC flash parameter table... ");
134*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("\n");
135*0d6140beSAndroid Build Coastguard Worker
136*0d6140beSAndroid Build Coastguard Worker /* 1. double word */
137*0d6140beSAndroid Build Coastguard Worker tmp32 = ((unsigned int)buf[(4 * 0) + 0]);
138*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[(4 * 0) + 1]) << 8;
139*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[(4 * 0) + 2]) << 16;
140*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[(4 * 0) + 3]) << 24;
141*0d6140beSAndroid Build Coastguard Worker
142*0d6140beSAndroid Build Coastguard Worker tmp8 = (tmp32 >> 17) & 0x3;
143*0d6140beSAndroid Build Coastguard Worker switch (tmp8) {
144*0d6140beSAndroid Build Coastguard Worker case 0x0:
145*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" 3-Byte only addressing.\n");
146*0d6140beSAndroid Build Coastguard Worker break;
147*0d6140beSAndroid Build Coastguard Worker case 0x1:
148*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" 3-Byte (and optionally 4-Byte) addressing.\n");
149*0d6140beSAndroid Build Coastguard Worker break;
150*0d6140beSAndroid Build Coastguard Worker case 0x2:
151*0d6140beSAndroid Build Coastguard Worker msg_cdbg(" 4-Byte only addressing (not supported by "
152*0d6140beSAndroid Build Coastguard Worker "flashrom).\n");
153*0d6140beSAndroid Build Coastguard Worker return 1;
154*0d6140beSAndroid Build Coastguard Worker default:
155*0d6140beSAndroid Build Coastguard Worker msg_cdbg(" Required addressing mode (0x%x) not supported.\n",
156*0d6140beSAndroid Build Coastguard Worker tmp8);
157*0d6140beSAndroid Build Coastguard Worker return 1;
158*0d6140beSAndroid Build Coastguard Worker }
159*0d6140beSAndroid Build Coastguard Worker
160*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" Status register is ");
161*0d6140beSAndroid Build Coastguard Worker if (tmp32 & (1 << 3)) {
162*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("volatile and writes to the status register have to "
163*0d6140beSAndroid Build Coastguard Worker "be enabled with ");
164*0d6140beSAndroid Build Coastguard Worker if (tmp32 & (1 << 4)) {
165*0d6140beSAndroid Build Coastguard Worker chip->feature_bits = FEATURE_WRSR_WREN;
166*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("WREN (0x06).\n");
167*0d6140beSAndroid Build Coastguard Worker } else {
168*0d6140beSAndroid Build Coastguard Worker chip->feature_bits = FEATURE_WRSR_EWSR;
169*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("EWSR (0x50).\n");
170*0d6140beSAndroid Build Coastguard Worker }
171*0d6140beSAndroid Build Coastguard Worker } else {
172*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("non-volatile and the standard does not allow "
173*0d6140beSAndroid Build Coastguard Worker "vendors to tell us whether EWSR/WREN is needed for "
174*0d6140beSAndroid Build Coastguard Worker "status register writes - assuming EWSR.\n");
175*0d6140beSAndroid Build Coastguard Worker chip->feature_bits = FEATURE_WRSR_EWSR;
176*0d6140beSAndroid Build Coastguard Worker }
177*0d6140beSAndroid Build Coastguard Worker
178*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" Write chunk size is ");
179*0d6140beSAndroid Build Coastguard Worker if (tmp32 & (1 << 2)) {
180*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("at least 64 B.\n");
181*0d6140beSAndroid Build Coastguard Worker chip->page_size = 64;
182*0d6140beSAndroid Build Coastguard Worker chip->write = SPI_CHIP_WRITE256;
183*0d6140beSAndroid Build Coastguard Worker } else {
184*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("1 B only.\n");
185*0d6140beSAndroid Build Coastguard Worker chip->page_size = 256;
186*0d6140beSAndroid Build Coastguard Worker chip->write = SPI_CHIP_WRITE1;
187*0d6140beSAndroid Build Coastguard Worker }
188*0d6140beSAndroid Build Coastguard Worker
189*0d6140beSAndroid Build Coastguard Worker if ((tmp32 & 0x3) == 0x1) {
190*0d6140beSAndroid Build Coastguard Worker opcode_4k_erase = (tmp32 >> 8) & 0xFF;
191*0d6140beSAndroid Build Coastguard Worker msg_cspew(" 4kB erase opcode is 0x%02x.\n", opcode_4k_erase);
192*0d6140beSAndroid Build Coastguard Worker /* add the eraser later, because we don't know total_size yet */
193*0d6140beSAndroid Build Coastguard Worker } else
194*0d6140beSAndroid Build Coastguard Worker msg_cspew(" 4kB erase opcode is not defined.\n");
195*0d6140beSAndroid Build Coastguard Worker
196*0d6140beSAndroid Build Coastguard Worker /* 2. double word */
197*0d6140beSAndroid Build Coastguard Worker tmp32 = ((unsigned int)buf[(4 * 1) + 0]);
198*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[(4 * 1) + 1]) << 8;
199*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[(4 * 1) + 2]) << 16;
200*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[(4 * 1) + 3]) << 24;
201*0d6140beSAndroid Build Coastguard Worker
202*0d6140beSAndroid Build Coastguard Worker if (tmp32 & (1 << 31)) {
203*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Flash chip size >= 4 Gb/512 MB not supported.\n");
204*0d6140beSAndroid Build Coastguard Worker return 1;
205*0d6140beSAndroid Build Coastguard Worker }
206*0d6140beSAndroid Build Coastguard Worker total_size = ((tmp32 & 0x7FFFFFFF) + 1) / 8;
207*0d6140beSAndroid Build Coastguard Worker chip->total_size = total_size / 1024;
208*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" Flash chip size is %d kB.\n", chip->total_size);
209*0d6140beSAndroid Build Coastguard Worker if (total_size > (1 << 24)) {
210*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Flash chip size is bigger than what 3-Byte addressing "
211*0d6140beSAndroid Build Coastguard Worker "can access.\n");
212*0d6140beSAndroid Build Coastguard Worker return 1;
213*0d6140beSAndroid Build Coastguard Worker }
214*0d6140beSAndroid Build Coastguard Worker
215*0d6140beSAndroid Build Coastguard Worker if (opcode_4k_erase != 0xFF)
216*0d6140beSAndroid Build Coastguard Worker sfdp_add_uniform_eraser(chip, opcode_4k_erase, 4 * 1024);
217*0d6140beSAndroid Build Coastguard Worker
218*0d6140beSAndroid Build Coastguard Worker /* FIXME: double words 3-7 contain unused fast read information */
219*0d6140beSAndroid Build Coastguard Worker
220*0d6140beSAndroid Build Coastguard Worker if (len == 4 * 4) {
221*0d6140beSAndroid Build Coastguard Worker msg_cdbg(" It seems like this chip supports the preliminary "
222*0d6140beSAndroid Build Coastguard Worker "Intel version of SFDP, skipping processing of double "
223*0d6140beSAndroid Build Coastguard Worker "words 3-9.\n");
224*0d6140beSAndroid Build Coastguard Worker goto done;
225*0d6140beSAndroid Build Coastguard Worker }
226*0d6140beSAndroid Build Coastguard Worker
227*0d6140beSAndroid Build Coastguard Worker /* 8. double word */
228*0d6140beSAndroid Build Coastguard Worker for (j = 0; j < 4; j++) {
229*0d6140beSAndroid Build Coastguard Worker /* 7 double words from the start + 2 bytes for every eraser */
230*0d6140beSAndroid Build Coastguard Worker tmp8 = buf[(4 * 7) + (j * 2)];
231*0d6140beSAndroid Build Coastguard Worker msg_cspew(" Erase Sector Type %d Size: 0x%02x\n", j + 1,
232*0d6140beSAndroid Build Coastguard Worker tmp8);
233*0d6140beSAndroid Build Coastguard Worker if (tmp8 == 0) {
234*0d6140beSAndroid Build Coastguard Worker msg_cspew(" Erase Sector Type %d is unused.\n", j);
235*0d6140beSAndroid Build Coastguard Worker continue;
236*0d6140beSAndroid Build Coastguard Worker }
237*0d6140beSAndroid Build Coastguard Worker if (tmp8 >= 31) {
238*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" Block size of erase Sector Type %d (2^%d) "
239*0d6140beSAndroid Build Coastguard Worker "is too big for flashrom.\n", j, tmp8);
240*0d6140beSAndroid Build Coastguard Worker continue;
241*0d6140beSAndroid Build Coastguard Worker }
242*0d6140beSAndroid Build Coastguard Worker block_size = 1 << (tmp8); /* block_size = 2 ^ field */
243*0d6140beSAndroid Build Coastguard Worker
244*0d6140beSAndroid Build Coastguard Worker tmp8 = buf[(4 * 7) + (j * 2) + 1];
245*0d6140beSAndroid Build Coastguard Worker msg_cspew(" Erase Sector Type %d Opcode: 0x%02x\n", j + 1,
246*0d6140beSAndroid Build Coastguard Worker tmp8);
247*0d6140beSAndroid Build Coastguard Worker sfdp_add_uniform_eraser(chip, tmp8, block_size);
248*0d6140beSAndroid Build Coastguard Worker }
249*0d6140beSAndroid Build Coastguard Worker
250*0d6140beSAndroid Build Coastguard Worker done:
251*0d6140beSAndroid Build Coastguard Worker msg_cdbg("done.\n");
252*0d6140beSAndroid Build Coastguard Worker return 0;
253*0d6140beSAndroid Build Coastguard Worker }
254*0d6140beSAndroid Build Coastguard Worker
probe_spi_sfdp(struct flashctx * flash)255*0d6140beSAndroid Build Coastguard Worker int probe_spi_sfdp(struct flashctx *flash)
256*0d6140beSAndroid Build Coastguard Worker {
257*0d6140beSAndroid Build Coastguard Worker int ret = 0;
258*0d6140beSAndroid Build Coastguard Worker uint8_t buf[8];
259*0d6140beSAndroid Build Coastguard Worker uint32_t tmp32;
260*0d6140beSAndroid Build Coastguard Worker uint8_t nph;
261*0d6140beSAndroid Build Coastguard Worker /* need to limit the table loop by comparing i to uint8_t nph hence: */
262*0d6140beSAndroid Build Coastguard Worker uint16_t i;
263*0d6140beSAndroid Build Coastguard Worker struct sfdp_tbl_hdr *hdrs;
264*0d6140beSAndroid Build Coastguard Worker uint8_t *hbuf;
265*0d6140beSAndroid Build Coastguard Worker uint8_t *tbuf;
266*0d6140beSAndroid Build Coastguard Worker
267*0d6140beSAndroid Build Coastguard Worker if (spi_sfdp_read_sfdp(flash, 0x00, buf, 4)) {
268*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Receiving SFDP signature failed.\n");
269*0d6140beSAndroid Build Coastguard Worker return 0;
270*0d6140beSAndroid Build Coastguard Worker }
271*0d6140beSAndroid Build Coastguard Worker tmp32 = buf[0];
272*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[1]) << 8;
273*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[2]) << 16;
274*0d6140beSAndroid Build Coastguard Worker tmp32 |= ((unsigned int)buf[3]) << 24;
275*0d6140beSAndroid Build Coastguard Worker
276*0d6140beSAndroid Build Coastguard Worker if (tmp32 != 0x50444653) {
277*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("Signature = 0x%08"PRIx32" (should be 0x50444653)\n", tmp32);
278*0d6140beSAndroid Build Coastguard Worker msg_cdbg("No SFDP signature found.\n");
279*0d6140beSAndroid Build Coastguard Worker return 0;
280*0d6140beSAndroid Build Coastguard Worker }
281*0d6140beSAndroid Build Coastguard Worker
282*0d6140beSAndroid Build Coastguard Worker if (spi_sfdp_read_sfdp(flash, 0x04, buf, 3)) {
283*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Receiving SFDP revision and number of parameter "
284*0d6140beSAndroid Build Coastguard Worker "headers (NPH) failed. ");
285*0d6140beSAndroid Build Coastguard Worker return 0;
286*0d6140beSAndroid Build Coastguard Worker }
287*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("SFDP revision = %d.%d\n", buf[1], buf[0]);
288*0d6140beSAndroid Build Coastguard Worker if (buf[1] != 0x01) {
289*0d6140beSAndroid Build Coastguard Worker msg_cdbg("The chip supports an unknown version of SFDP. "
290*0d6140beSAndroid Build Coastguard Worker "Aborting SFDP probe!\n");
291*0d6140beSAndroid Build Coastguard Worker return 0;
292*0d6140beSAndroid Build Coastguard Worker }
293*0d6140beSAndroid Build Coastguard Worker nph = buf[2];
294*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("SFDP number of parameter headers is %d (NPH = %d).\n",
295*0d6140beSAndroid Build Coastguard Worker nph + 1, nph);
296*0d6140beSAndroid Build Coastguard Worker
297*0d6140beSAndroid Build Coastguard Worker /* Fetch all parameter headers, even if we don't use them all (yet). */
298*0d6140beSAndroid Build Coastguard Worker hbuf = malloc((nph + 1) * 8);
299*0d6140beSAndroid Build Coastguard Worker hdrs = malloc((nph + 1) * sizeof(*hdrs));
300*0d6140beSAndroid Build Coastguard Worker if (hbuf == NULL || hdrs == NULL ) {
301*0d6140beSAndroid Build Coastguard Worker msg_gerr("Out of memory!\n");
302*0d6140beSAndroid Build Coastguard Worker goto cleanup_hdrs;
303*0d6140beSAndroid Build Coastguard Worker }
304*0d6140beSAndroid Build Coastguard Worker if (spi_sfdp_read_sfdp(flash, 0x08, hbuf, (nph + 1) * 8)) {
305*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Receiving SFDP parameter table headers failed.\n");
306*0d6140beSAndroid Build Coastguard Worker goto cleanup_hdrs;
307*0d6140beSAndroid Build Coastguard Worker }
308*0d6140beSAndroid Build Coastguard Worker
309*0d6140beSAndroid Build Coastguard Worker for (i = 0; i <= nph; i++) {
310*0d6140beSAndroid Build Coastguard Worker uint16_t len;
311*0d6140beSAndroid Build Coastguard Worker hdrs[i].id = hbuf[(8 * i) + 0];
312*0d6140beSAndroid Build Coastguard Worker hdrs[i].v_minor = hbuf[(8 * i) + 1];
313*0d6140beSAndroid Build Coastguard Worker hdrs[i].v_major = hbuf[(8 * i) + 2];
314*0d6140beSAndroid Build Coastguard Worker hdrs[i].len = hbuf[(8 * i) + 3];
315*0d6140beSAndroid Build Coastguard Worker hdrs[i].ptp = hbuf[(8 * i) + 4];
316*0d6140beSAndroid Build Coastguard Worker hdrs[i].ptp |= ((unsigned int)hbuf[(8 * i) + 5]) << 8;
317*0d6140beSAndroid Build Coastguard Worker hdrs[i].ptp |= ((unsigned int)hbuf[(8 * i) + 6]) << 16;
318*0d6140beSAndroid Build Coastguard Worker msg_cdbg2("\nSFDP parameter table header %d/%d:\n", i, nph);
319*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" ID 0x%02x, version %d.%d\n", hdrs[i].id,
320*0d6140beSAndroid Build Coastguard Worker hdrs[i].v_major, hdrs[i].v_minor);
321*0d6140beSAndroid Build Coastguard Worker len = hdrs[i].len * 4;
322*0d6140beSAndroid Build Coastguard Worker tmp32 = hdrs[i].ptp;
323*0d6140beSAndroid Build Coastguard Worker msg_cdbg2(" Length %d B, Parameter Table Pointer 0x%06"PRIx32"\n",
324*0d6140beSAndroid Build Coastguard Worker len, tmp32);
325*0d6140beSAndroid Build Coastguard Worker
326*0d6140beSAndroid Build Coastguard Worker if (tmp32 + len >= (1 << 24)) {
327*0d6140beSAndroid Build Coastguard Worker msg_cdbg("SFDP Parameter Table %d supposedly overflows "
328*0d6140beSAndroid Build Coastguard Worker "addressable SFDP area. This most\nprobably "
329*0d6140beSAndroid Build Coastguard Worker "indicates a corrupt SFDP parameter table "
330*0d6140beSAndroid Build Coastguard Worker "header. Skipping it.\n", i);
331*0d6140beSAndroid Build Coastguard Worker continue;
332*0d6140beSAndroid Build Coastguard Worker }
333*0d6140beSAndroid Build Coastguard Worker
334*0d6140beSAndroid Build Coastguard Worker tbuf = malloc(len);
335*0d6140beSAndroid Build Coastguard Worker if (tbuf == NULL) {
336*0d6140beSAndroid Build Coastguard Worker msg_gerr("Out of memory!\n");
337*0d6140beSAndroid Build Coastguard Worker goto cleanup_hdrs;
338*0d6140beSAndroid Build Coastguard Worker }
339*0d6140beSAndroid Build Coastguard Worker if (spi_sfdp_read_sfdp(flash, tmp32, tbuf, len)){
340*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Fetching SFDP parameter table %d failed.\n",
341*0d6140beSAndroid Build Coastguard Worker i);
342*0d6140beSAndroid Build Coastguard Worker free(tbuf);
343*0d6140beSAndroid Build Coastguard Worker continue;
344*0d6140beSAndroid Build Coastguard Worker }
345*0d6140beSAndroid Build Coastguard Worker msg_cspew(" Parameter table contents:\n");
346*0d6140beSAndroid Build Coastguard Worker for (tmp32 = 0; tmp32 < len; tmp32++) {
347*0d6140beSAndroid Build Coastguard Worker if ((tmp32 % 8) == 0) {
348*0d6140beSAndroid Build Coastguard Worker msg_cspew(" 0x%04"PRIx32": ", tmp32);
349*0d6140beSAndroid Build Coastguard Worker }
350*0d6140beSAndroid Build Coastguard Worker msg_cspew(" %02x", tbuf[tmp32]);
351*0d6140beSAndroid Build Coastguard Worker if ((tmp32 % 8) == 7) {
352*0d6140beSAndroid Build Coastguard Worker msg_cspew("\n");
353*0d6140beSAndroid Build Coastguard Worker continue;
354*0d6140beSAndroid Build Coastguard Worker }
355*0d6140beSAndroid Build Coastguard Worker if ((tmp32 % 8) == 3) {
356*0d6140beSAndroid Build Coastguard Worker msg_cspew(" ");
357*0d6140beSAndroid Build Coastguard Worker continue;
358*0d6140beSAndroid Build Coastguard Worker }
359*0d6140beSAndroid Build Coastguard Worker }
360*0d6140beSAndroid Build Coastguard Worker msg_cspew("\n");
361*0d6140beSAndroid Build Coastguard Worker
362*0d6140beSAndroid Build Coastguard Worker if (i == 0) { /* Mandatory JEDEC SFDP parameter table */
363*0d6140beSAndroid Build Coastguard Worker if (hdrs[i].id != 0)
364*0d6140beSAndroid Build Coastguard Worker msg_cdbg("ID of the mandatory JEDEC SFDP "
365*0d6140beSAndroid Build Coastguard Worker "parameter table is not 0 as demanded "
366*0d6140beSAndroid Build Coastguard Worker "by JESD216 (warning only).\n");
367*0d6140beSAndroid Build Coastguard Worker
368*0d6140beSAndroid Build Coastguard Worker if (hdrs[i].v_major != 0x01) {
369*0d6140beSAndroid Build Coastguard Worker msg_cdbg("The chip contains an unknown "
370*0d6140beSAndroid Build Coastguard Worker "version of the JEDEC flash "
371*0d6140beSAndroid Build Coastguard Worker "parameters table, skipping it.\n");
372*0d6140beSAndroid Build Coastguard Worker } else if (len != 4 * 4 && len < 9 * 4) {
373*0d6140beSAndroid Build Coastguard Worker msg_cdbg("Length of the mandatory JEDEC SFDP "
374*0d6140beSAndroid Build Coastguard Worker "parameter table is wrong (%d B), "
375*0d6140beSAndroid Build Coastguard Worker "skipping it.\n", len);
376*0d6140beSAndroid Build Coastguard Worker } else if (sfdp_fill_flash(flash->chip, tbuf, len) == 0)
377*0d6140beSAndroid Build Coastguard Worker ret = 1;
378*0d6140beSAndroid Build Coastguard Worker }
379*0d6140beSAndroid Build Coastguard Worker free(tbuf);
380*0d6140beSAndroid Build Coastguard Worker }
381*0d6140beSAndroid Build Coastguard Worker
382*0d6140beSAndroid Build Coastguard Worker cleanup_hdrs:
383*0d6140beSAndroid Build Coastguard Worker free(hdrs);
384*0d6140beSAndroid Build Coastguard Worker free(hbuf);
385*0d6140beSAndroid Build Coastguard Worker return ret;
386*0d6140beSAndroid Build Coastguard Worker }
387