diff options
Diffstat (limited to 'chip/stm32/flash-stm32f0.c')
-rw-r--r-- | chip/stm32/flash-stm32f0.c | 86 |
1 files changed, 82 insertions, 4 deletions
diff --git a/chip/stm32/flash-stm32f0.c b/chip/stm32/flash-stm32f0.c index 229fd108af..e047854d0a 100644 --- a/chip/stm32/flash-stm32f0.c +++ b/chip/stm32/flash-stm32f0.c @@ -8,6 +8,7 @@ #include "common.h" #include "flash.h" #include "registers.h" +#include "util.h" /*****************************************************************************/ /* Physical layer APIs */ @@ -17,6 +18,10 @@ int flash_physical_get_protect(int block) return !(STM32_FLASH_WRPR & (1 << block)); } +/* + * Note: This does not need to update _NOW flags, as get_protect_flags + * in common code already does so. + */ uint32_t flash_physical_get_protect_flags(void) { uint32_t flags = 0; @@ -25,8 +30,71 @@ uint32_t flash_physical_get_protect_flags(void) uint32_t wrp23 = REG32(STM32_OPTB_BASE + STM32_OPTB_WRP23); #endif - if (STM32_FLASH_WRPR == 0) - flags |= EC_FLASH_PROTECT_ALL_NOW; + /* + * We only need to return detailed flags if we want to protect RW or + * ROLLBACK independently (EC_FLASH_PROTECT_RO_AT_BOOT should be set + * by pstate logic). + */ +#if defined(CONFIG_FLASH_PROTECT_RW) + /* Flags that must be set for each region. */ + const int mask_flags[] = { + [FLASH_REGION_RW] = EC_FLASH_PROTECT_RW_AT_BOOT, + [FLASH_REGION_RO] = EC_FLASH_PROTECT_RO_AT_BOOT, + }; + /* + * Sets up required mask for wrp01/23 registers: for protection to be + * set, values set in the mask must be zeros, values in the mask << 8 + * must be ones. + * + * Note that these masks are actually static, and could be precomputed + * at build time to save flash space. + */ + uint32_t wrp_mask[FLASH_REGION_COUNT][2]; + int i; + int shift = 0; + int reg = 0; + + memset(wrp_mask, 0, sizeof(wrp_mask)); + + /* Scan flash protection */ + for (i = 0; i < PHYSICAL_BANKS; i++) { + /* Default: RW. */ + int region = FLASH_REGION_RW; + + if (i >= WP_BANK_OFFSET && + i < WP_BANK_OFFSET + WP_BANK_COUNT) + region = FLASH_REGION_RO; + + switch (i) { + case 8: +#if CONFIG_FLASH_SIZE > 64 * 1024 + case 24: +#endif + shift += 8; + break; +#if CONFIG_FLASH_SIZE > 64 * 1024 + case 16: + reg = 1; + shift = 0; + break; +#endif + } + + wrp_mask[region][reg] |= 1 << shift; + shift++; + } + + for (i = 0; i < FLASH_REGION_COUNT; i++) { + if (!(wrp01 & wrp_mask[i][0]) && + (wrp01 & wrp_mask[i][0] << 8) == (wrp_mask[i][0] << 8)) +#if CONFIG_FLASH_SIZE > 64 * 1024 + if (!(wrp23 & wrp_mask[i][1]) && + (wrp23 & wrp_mask[i][1] << 8) == + (wrp_mask[i][1] << 8)) +#endif + flags |= mask_flags[i]; + } +#endif /* CONFIG_FLASH_PROTECT_RW */ if (wrp01 == 0xff00ff00) #if CONFIG_FLASH_SIZE > 64 * 1024 @@ -51,8 +119,12 @@ int flash_physical_restore_state(void) uint32_t flash_physical_get_valid_flags(void) { return EC_FLASH_PROTECT_RO_AT_BOOT | - EC_FLASH_PROTECT_ALL_AT_BOOT | EC_FLASH_PROTECT_RO_NOW | +#ifdef CONFIG_FLASH_PROTECT_RW + EC_FLASH_PROTECT_RW_AT_BOOT | + EC_FLASH_PROTECT_RW_NOW | +#endif + EC_FLASH_PROTECT_ALL_AT_BOOT | EC_FLASH_PROTECT_ALL_NOW; } @@ -65,12 +137,18 @@ uint32_t flash_physical_get_writable_flags(uint32_t cur_flags) ret |= EC_FLASH_PROTECT_RO_AT_BOOT; /* - * RW at-boot state can be set if WP GPIO is asserted and can always + * ALL/RW at-boot state can be set if WP GPIO is asserted and can always * be cleared. */ if (cur_flags & (EC_FLASH_PROTECT_ALL_AT_BOOT | EC_FLASH_PROTECT_GPIO_ASSERTED)) ret |= EC_FLASH_PROTECT_ALL_AT_BOOT; +#ifdef CONFIG_FLASH_PROTECT_RW + if (cur_flags & (EC_FLASH_PROTECT_RW_AT_BOOT | + EC_FLASH_PROTECT_GPIO_ASSERTED)) + ret |= EC_FLASH_PROTECT_RW_AT_BOOT; +#endif + return ret; } |