From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by spool.mail.gandi.net (Postfix) with ESMTPS id 93763AC0060 for ; Thu, 11 Jan 2024 00:04:24 +0000 (UTC) DKIM-Signature: a=rsa-sha256; bh=/Mh9L6yBwZnG7cR/Q88y9jYFmiC912+6NXqeN6nXSq8=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Type:Content-Transfer-Encoding; s=20140610; t=1704931463; v=1; b=QwSVvAHpPNnMLAl6mbJeEUG1xjDTDrnou1BK9Ze+wKHJriG67hpaGhGdzXlUz1TN46t/RAgP MRuxC98iFHaWnWmiujfMkdapIiVHkZ/DmIBzmWseNBsK25tGyM/ZJc4GeJFeRV0wGONnHfWm4CA OYzPBoGkHnEE39Oo4nD7D9d4= X-Received: by 127.0.0.2 with SMTP id gohEYY7687511xyJ11xgDU8M; Wed, 10 Jan 2024 16:04:23 -0800 X-Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.9360.1704931457664934038 for ; Wed, 10 Jan 2024 16:04:17 -0800 X-Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 4AFBD1595; Wed, 10 Jan 2024 16:05:03 -0800 (PST) X-Received: from u200865.usa.arm.com (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 268663F5A1; Wed, 10 Jan 2024 16:04:17 -0800 (PST) From: "Jeremy Linton" To: devel@edk2.groups.io Cc: ardb+tianocore@kernel.org, quic_llindhol@quicinc.com, Jeremy Linton Subject: [edk2-devel] [PATCH 7/7] Platform/RaspberryPi: Add SPI flash variable store. Date: Wed, 10 Jan 2024 18:04:10 -0600 Message-ID: <20240111000412.2734985-8-jeremy.linton@arm.com> In-Reply-To: <20240111000412.2734985-1-jeremy.linton@arm.com> References: <20240111000412.2734985-1-jeremy.linton@arm.com> MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,jeremy.linton@arm.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: Pzv0Xva1WVxFsmr1RMRp25Skx7686176AA= Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-GND-Status: LEGIT Authentication-Results: spool.mail.gandi.net; dkim=pass header.d=groups.io header.s=20140610 header.b=QwSVvAHp; dmarc=fail reason="SPF not aligned (relaxed), DKIM not aligned (relaxed)" header.from=arm.com (policy=none); spf=pass (spool.mail.gandi.net: domain of bounce@groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce@groups.io The RPi4 has a 512KB SPI flash, which depending on RPi and firmware revision has 300-180K free. We can use this storage to persist variables when the OS is running or over firmware upgrades. The problem is that the SPI is pin mux'ed with the PWM audio, so we want to leave the PWM configured for OS use. And of course there is the problem of sharing the GPIO block with OS's that are aware of it. Hence a previous patch set which moves the GPIO and some of the low level i2c/etc devices into its own SSDT, and disables them by default. This patch, adds a few SPI access functions directly to the variable store rather than creating another runtime service since the early boot ordering is critical. These functions are of the form ReadSpi(), WriteSpi(), DisableSpiWp(), etc all with Spi in the name. On top of that a few "Flash" routines are created which provide high level functions for reading/writing and walking the portion of the SPI flash we use to clone the variable store region. Importantly WalkFlashVolume() walks the entire SPI flash region, which has a simple header structure containing filename+len for each region of the flash, to return how much of the capacity is being utilized by the existing bootloader/etc firmware. So, if this is a RPi4, and there is sufficient space, and that space doesn't have a valid varstore header we erase it and flush the RPI's varstore region to the SPI. Then we note its starting offset in mFvInstance->FlashOffset. >From then on, writes to the EFI_FW_VOL_BLOCK_DEVICE are written to both the RAM copy as well as the SPI flash. If the empty region has a valid header we read the entire region overtop of the one being passed as part of the RPi's BL33, and continue as above. At ready to boot we re-enable the LDO, and then during the dump vars check, we check for DT or the GPIO being enabled and disable the runtime SPI updates because we can't be sure of what the OS might be doing with the GPIO. The dual ACPI and DT mode, leaves it enabled (if GPIO is disabled) so care should be taken. Now, one of the problems here is that with the LDO enabled any SPI accesses can be heard over the speakers as pops, buzzes, or scratchy tones. This is happening even without this patch because TFA and/or the rpi low level firmware doesn't itself assure the LDO is disabled during resets, so the early SoC startup is quite noisy. We add to this, but alongside that a couple fairly trivial TFA patchs, to mute it before reset, and again assure its off before releasing to us solve a large part of this problem. That said, this can now happen during runtime as well. Generally the OS's aren't doing a lot of variable updates, but when they do its generally barely noticable clicks since we aren't going through the long process of muting/unmuting the LDO which itself causes a pop. So, this patch fixes a whole bunch of bugs on github that exist because the variable store isn't persisted. It also fixes a rather large bug in the existing variable store code caused by the FaultTolerantWriteDxe erasing the entire variable store region when it garbage collects during startup. That latter bug is the result of FvbGetLbaAddress reading recently erased data from the VolumeHeader before its been recreated, and results in random UEFI crashes. Signed-off-by: Jeremy Linton --- .../Drivers/VarBlockServiceDxe/FvbInfo.c | 8 +- .../VarBlockServiceDxe/VarBlockService.c | 669 +++++++++++++++++- .../VarBlockServiceDxe/VarBlockService.h | 10 + .../VarBlockServiceDxe/VarBlockServiceDxe.c | 69 +- .../VarBlockServiceDxe/VarBlockServiceDxe.inf | 7 + Platform/RaspberryPi/RPi4/RPi4.dsc | 5 +- 6 files changed, 743 insertions(+), 25 deletions(-) diff --git a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/FvbInfo.c b/Pl= atform/RaspberryPi/Drivers/VarBlockServiceDxe/FvbInfo.c index 0e0c108dba..ee18f327e6 100644 --- a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/FvbInfo.c +++ b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/FvbInfo.c @@ -11,12 +11,7 @@ #include #include #include - -typedef struct { - UINT64 FvLength; - EFI_FIRMWARE_VOLUME_HEADER FvbInfo; - EFI_FV_BLOCK_MAP_ENTRY End[1]; -} EFI_FVB_MEDIA_INFO; +#include "VarBlockService.h" =20 EFI_FVB_MEDIA_INFO mPlatformFvbMediaInfo[] =3D { // @@ -38,6 +33,7 @@ EFI_FVB_MEDIA_INFO mPlatformFvbMediaInfo[] =3D { FixedPcdGet32 (PcdNvStorageEventLogSize), EFI_FVH_SIGNATURE, EFI_FVB2_MEMORY_MAPPED | + EFI_FVB2_STICKY_WRITE | EFI_FVB2_READ_ENABLED_CAP | EFI_FVB2_READ_STATUS | EFI_FVB2_WRITE_ENABLED_CAP | diff --git a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServic= e.c b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockService.c index 572309439a..3b83d7ead8 100644 --- a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockService.c +++ b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockService.c @@ -7,17 +7,28 @@ * **/ =20 +#include + +#include +#include + #include #include +#include =20 #include #include #include #include #include +#include +#include #include +#include #include =20 +#include + #include "VarBlockService.h" =20 #define EFI_FVB2_STATUS \ @@ -85,6 +96,470 @@ EFI_FW_VOL_BLOCK_DEVICE mFvbDeviceTemplate =3D { } }; =20 +/* + * This is a derived approximation for the number of BCM2835_SPI_CS + * register reads that can be accomplished in 1US on a bcm2711. + */ +#define SPI_CS_READS_PER_US 25 + +STATIC +VOID +SpiDelay ( + IN UINTN micro_sec + ) +/*++ + + Routine Description: + Delay loop based on how fast we can read SPI controller + state rather than a hardcoded delay since we are a runtime + service. + + Arguments: + micro_sec - Approximate number of micro seconds to delay. + + Returns: +--*/ +{ + UINT32 looping; + for (looping =3D 0; looping < micro_sec; looping++) { + UINT32 looping2; + // + // RPi4 does about 25 reg reads per micro second + // + for (looping2 =3D 0; looping2 < SPI_CS_READS_PER_US; looping2++) { + MmioRead32 (mFvInstance->SpiBase+BCM2835_SPI_CS); + } + } +} + +STATIC +INT32 +DoSpiCommand ( + UINT8 *Buffer, + UINTN in_len, + UINTN out_len) +/*++ + + Routine Description: + Read and/or Write data on the SPI bus. A buffer with + data to write/read is passed and this routine then writes + out_len data on the SPI bus, and reads in_len data back + into the buffer starting at the first location. Obviously + this means that the buffer must be greater than the largest + of in_len or out_len + + Arguments: + in_len - bytes to read from the SPI to buffer + out_len - bytes to write on the SPI from buffer + + Returns: + number of bytes read into buffer. +--*/ +{ + int cur_byte; + UINT32 ret =3D 0; + + MmioWrite32 (mFvInstance->SpiBase + BCM2835_SPI_CS, BCM2835_SPI_CS_TA); + + for (cur_byte =3D 0 ;cur_byte < in_len + out_len; cur_byte++) + { + int loop =3D 10000*SPI_CS_READS_PER_US; + + while ((MmioRead32 (mFvInstance->SpiBase + BCM2835_SPI_CS) & BCM2835_S= PI_CS_TXD) =3D=3D 0) { + loop--; + if (loop =3D=3D 0) { + DEBUG ((DEBUG_ERROR, "Write timeout %X\n", MmioRead32 (mFvInstance= ->SpiBase+BCM2835_SPI_CS))); + ret =3D -1; + break; + } + } + + if (cur_byte < out_len) { + MmioWrite32 (mFvInstance->SpiBase + BCM2835_SPI_FIFO, Buffer[cur_byt= e]); + } else { + MmioWrite32 (mFvInstance->SpiBase + BCM2835_SPI_FIFO, 0); + } + + loop =3D 10000 * SPI_CS_READS_PER_US; + while ((MmioRead32 (mFvInstance->SpiBase + BCM2835_SPI_CS) & BCM2835_S= PI_CS_RXD) =3D=3D 0) { + loop--; + if (loop =3D=3D 0) { + DEBUG ((DEBUG_ERROR, "Read timeout %X\n", MmioRead32 (mFvInstance-= >SpiBase+BCM2835_SPI_CS))); + ret =3D -1; + break; + } + } + + if (cur_byte < out_len) { + MmioRead32 (mFvInstance->SpiBase + BCM2835_SPI_FIFO); + } else { + ret++; + Buffer[cur_byte - out_len] =3D MmioRead32 (mFvInstance->SpiBase + BC= M2835_SPI_FIFO); + } + } + + MmioWrite32 (mFvInstance->SpiBase + BCM2835_SPI_CS, 0); + + SpiDelay (1); //wait for /CS to settle + + return ret; +} + +#if ((RPI_MODEL =3D=3D 4) && (SPI_VARIABLES)) +STATIC +INT32 +ReadDeviceId (VOID) +/*++ + + Routine Description: + Sends the SPI device identification command then checks to see + if its a winbond we recognize, and returns the expected capacity. + + Arguments: + + Returns: + Capacity of attached device +--*/ +{ + UINT8 Buffer[32]; + Buffer[0] =3D 0x9F; + + DoSpiCommand (Buffer, 3, 1); //EF 30 31 is the winbond W25X40CL on the= base rpi4 + if (Buffer[0] !=3D 0xEF) { + DEBUG ((DEBUG_INFO, "ReadDeviceId %02X %02X %02X\n", + Buffer[0], Buffer[1], Buffer[2])); + } + // Lets assume we understand JEDEC type 0x30 + if (Buffer[1] =3D=3D 0x30) { + // it should be 512K + return 1 << Buffer[2]; //not really standard... + } + + return 0; +} + + +STATIC +INT32 +ReadSpi ( + UINT32 Addr, + UINT8 *Buffer, + UINT32 Len) +/*++ + + Routine Description: + Reads Len bytes of data at flash Addr into Buffer + + Arguments: + Addr - Flash device address + Buffer - Buffer where data is returned, this + buffer must be at least 5 bytes long to + hold the command. + Len - Number of bytes to read into Buffer + + Returns: + Number of bytes read +--*/ +{ + INT32 ret; + Buffer[0] =3D 0x0B; //send read data + Buffer[1] =3D (Addr >> 16) & 0xFF; // address MSB + Buffer[2] =3D (Addr >> 8) & 0xFF; // + Buffer[3] =3D Addr & 0xFF; // address LSB + Buffer[4] =3D 0; + + ret =3D DoSpiCommand (Buffer, Len, 5); + return ret; +} + +STATIC +UINT32 +WalkFlashVolume (VOID) +/*++ + + Routine Description: + Walk the RPi's SPI flash volume to determine if there is + free space we may consume as the backing store for a UEFI + variable store volume. This is fairly safe as the entire volume + can be recovered using the Raspberry Pi OS image tool to create + an EEPROM update disk. We aren't going to bother to + attempt to contain it in their volume format, rather hiding in + the free/unclaimed space. If this space is corrupted via an update + done outside of our control, we will fallback to the original + RPI_EFI.FD variables. AKA we should never really be worse off. + + + Arguments: + None + + Returns: + A value that can be assigned to mFvInstance->FlashOffset + as the location we may right, otherwise 0. +--*/ +{ + UINT32 total_data; + UINT32 device_size; + UINT8 buffer[32]; + + device_size =3D ReadDeviceId (); + // newer write location 00051100 + + for (total_data =3D 0; total_data < device_size; ) { + UINT32 len; + if (ReadSpi (total_data, buffer, 24) =3D=3D 24) { + len =3D 0; + len +=3D (*(UINT8 *)&buffer[5]) << 16; + len +=3D (*(UINT8 *)&buffer[6]) << 8; + len +=3D (*(UINT8 *)&buffer[7]); + + // round up to nearest 8 byte align + len +=3D 7; + len &=3D 0xFFFFF8; + + buffer[24]=3D0; + DEBUG ((DEBUG_INFO, "%X len=3D%d filename=3D%a \n", *(UINT32 *)buffe= r, + len, (char *)&buffer[8])); + if (*(UINT32 *)buffer =3D=3D 0xFFFFFFFF) { + break; + } + total_data +=3D 8 + len; + } else { + DEBUG ((DEBUG_ERROR, "Didn't get correct amount of data from SPI, ab= ort its use\n")); + return 0; + } + } + + DEBUG ((DEBUG_INFO, "First free sector at %X free space remaining %dK \n= ", total_data,(device_size-total_data)/1024)); + if ((device_size - total_data) > SIZE_128KB) { + //start at the next 4k page + total_data =3D (total_data + SIZE_4KB) & 0xFFFFE000; + DEBUG ((DEBUG_INFO, "Start of Fv at %X\n", total_data)); + } else { + total_data =3D 0; + } + + return total_data; +} + + +STATIC +INT32 +FlashRead ( + UINT32 Addr, + UINT8 *Buffer, + UINT32 Len) +/*++ + + Routine Description: + Reads Len data from variable storage area into Buffer + + Arguments: + Addr - Offset into variable store region + Buffer - Buffer where data is returned, this + buffer must be at least 5 bytes long to + hold the command. + Len - Number of bytes to read into Buffer + + Returns: + Number of bytes read +--*/ +{ + return ReadSpi (mFvInstance->FlashOffset + Addr, Buffer, Len); +} +#endif + +STATIC +VOID +DisableSpiWp (VOID) +/*++ + + Routine Description: + Sends SPI flash command to disable write protection + + Arguments: + + Returns: + +--*/ +{ + UINT8 Buffer[32]; + Buffer[0] =3D 0x06; + + DoSpiCommand (Buffer, 0, 1); +} + +STATIC +INT32 +ReadSpiStatus (VOID) +/*++ + + Routine Description: + Sends SPI get status command + Arguments: + + Returns: + Status of flash device +--*/ +{ + UINT8 Buffer[32]; + Buffer[0] =3D 0x05; + + DoSpiCommand (Buffer, 1, 1); + + return Buffer[0]; +} + + +STATIC +VOID +WriteSpi ( + UINT32 Addr, + UINT8 *SrcBuffer, + UINT32 Len) +/*++ + + Routine Description: + Writes Len bytes of SrcBuffer to SPI flash. The max write len is a si= ngle + 256 byte block, but this routine deals with the case where its misali= gned + across two flash blocks. + + Arguments: + Addr - Flash device address + SrcBuffer - Buffer from which data is written to the SPI flash + Len - Number of bytes to write + + Returns: + Nothing +--*/ +{ + UINT8 Buffer[280]; + UINTN loop; + int additional =3D 0; + + if (Len > 256) Len =3D 256; + + // check if request crosses boundary + if (((Addr + Len - 1) & 0xFFFFFF00) !=3D (Addr & 0xFFFFFF00)) { + additional =3D (Addr + Len) & 0xFF; + Len -=3D additional; + } + + do { + + DisableSpiWp (); + + while (ReadSpiStatus () !=3D 2) { + DEBUG ((DEBUG_INFO, "Spi status %X \n", ReadSpiStatus ())); + } + + Buffer[0] =3D 0x02; //write len + Buffer[1] =3D (Addr >> 16) & 0xFF; + Buffer[2] =3D (Addr >> 8) & 0xFF; + Buffer[3] =3D Addr & 0xFF; + + CopyMem (&Buffer[4], SrcBuffer, Len); + + DoSpiCommand (Buffer, 0, 4+Len); + + loop =3D Len * 30000 * SPI_CS_READS_PER_US; + while (ReadSpiStatus () & 0x3) { + loop--; + if (loop =3D=3D 0) { + DEBUG ((DEBUG_ERROR, "Write still busy, continue\n")); + break; + } + } + + // deal with second block + if (additional) { + Addr +=3D Len; + SrcBuffer +=3D Len; + Len =3D additional; + additional =3D 0; + } else { + Len =3D 0; + } + + } while (Len); +} + + +STATIC +VOID +Erase4kSpi ( + UINT32 Addr) +/*++ + + Routine Description: + Erases a complete SPI flash page, which in this + case is 4k at the given address. + + Arguments: + Addr - Flash device address + + Returns: + Nothing +--*/ +{ + UINT8 Buffer[32]; + int loop =3D 300000 * SPI_CS_READS_PER_US; + + DisableSpiWp (); + + Buffer[0] =3D 0x20; //erase 4k + Buffer[1] =3D (Addr >> 16) & 0xFF; + Buffer[2] =3D (Addr >> 8) & 0xFF; + Buffer[3] =3D Addr & 0xFF; + + DoSpiCommand (Buffer, 0, 4); + + while (ReadSpiStatus () & 0x3) { + loop--; + if (loop =3D=3D 0) { + DEBUG ((DEBUG_ERROR, "Erase still busy \n")); + break; + } + } +} + +STATIC +VOID +FlashWrite ( + IN UINTN Address, + IN UINT8 *Buffer, + IN UINTN NumBytes + ) +/*++ + + Routine Description: + Writes Len bytes of SrcBuffer to flash variable storage. This routine= breaks + the writes into blocks <=3D 256 bytes, which is the max that can be w= ritten with + the SPI flash commands we are using. + + Arguments: + Address - Variable store offset + Buffer - data buffer to write + NumBytes - bytes in buffer to write + + Returns: + +--*/ +{ + UINTN Off=3DAddress; + + while (NumBytes>0) { + int write_bytes =3D NumBytes; + if (write_bytes > 256) { + write_bytes =3D 256; + } + WriteSpi (mFvInstance->FlashOffset + Off, Buffer, write_bytes); + + Off +=3D write_bytes; + Buffer +=3D write_bytes; + NumBytes -=3D write_bytes; + } +} + =20 EFI_STATUS VarStoreWrite ( @@ -93,8 +568,47 @@ VarStoreWrite ( IN UINT8 *Buffer ) { + + if (AddressFvBase) { + return EFI_INVALID_PARAMETER; + } + CopyMem ((VOID*)Address, Buffer, *NumBytes); - mFvInstance->Dirty =3D TRUE; + + if (mFvInstance->FlashOffset) { + GpioPinFuncSet (40, GPIO_FSEL_ALT4); + GpioPinFuncSet (41, GPIO_FSEL_ALT4); + + FlashWrite (Address-mFvInstance->FvBase, Buffer, *NumBytes); + + GpioPinFuncSet (40, GPIO_FSEL_ALT0); + GpioPinFuncSet (41, GPIO_FSEL_ALT0); + } else { + mFvInstance->Dirty =3D TRUE; + } + + return EFI_SUCCESS; +} + +EFI_STATUS +FlashErase ( + IN UINTN Address, + IN UINTN LbaLength + ) + +{ + UINTN Off=3DAddress; + + while (LbaLength>0) { + int erase_bytes =3D LbaLength; + if (erase_bytes > 4096) { + erase_bytes =3D 4096; + } + Erase4kSpi (mFvInstance->FlashOffset + Off); + + Off +=3D erase_bytes; + LbaLength -=3D erase_bytes; + } =20 return EFI_SUCCESS; } @@ -106,8 +620,22 @@ VarStoreErase ( IN UINTN LbaLength ) { + if (AddressFvBase) { + return EFI_INVALID_PARAMETER; + } SetMem ((VOID*)Address, LbaLength, 0xff); - mFvInstance->Dirty =3D TRUE; + + if (mFvInstance->FlashOffset) { + GpioPinFuncSet (40, GPIO_FSEL_ALT4); + GpioPinFuncSet (41, GPIO_FSEL_ALT4); + + FlashErase (Address-mFvInstance->FvBase, LbaLength); + + GpioPinFuncSet (40, GPIO_FSEL_ALT0); + GpioPinFuncSet (41, GPIO_FSEL_ALT0); + } else { + mFvInstance->Dirty =3D TRUE; + } =20 return EFI_SUCCESS; } @@ -151,6 +679,7 @@ FvbGetLbaAddress ( =20 --*/ { + UINT32 NumBlocks; UINT32 BlockLength; UINTN Offset; @@ -166,8 +695,16 @@ FvbGetLbaAddress ( // Parse the blockmap of the FV to find which map entry the Lba belongs = to. // while (TRUE) { - NumBlocks =3D BlockMap->NumBlocks; - BlockLength =3D BlockMap->Length; + if (BlockMap->NumBlocks=3D=3D0xFFFFFFFF) { + NumBlocks =3D mFvInstance->NumOfBlocks; + } else { + NumBlocks =3D BlockMap->NumBlocks; + } + if (BlockMap->Length=3D=3D0xFFFFFFFF) { + BlockLength =3D mFvInstance->BlockSize; + } else { + BlockLength =3D BlockMap->Length; + } =20 if (NumBlocks =3D=3D 0 || BlockLength =3D=3D 0) { return EFI_INVALID_PARAMETER; @@ -199,6 +736,7 @@ FvbGetLbaAddress ( Offset =3D Offset + NumBlocks * BlockLength; BlockMap++; } + } =20 =20 @@ -371,6 +909,19 @@ FvbSetVolumeAttributes ( *AttribPtr =3D (*AttribPtr) | NewStatus; *Attributes =3D *AttribPtr; =20 + if (mFvInstance->FlashOffset) { + GpioPinFuncSet (40, GPIO_FSEL_ALT4); + GpioPinFuncSet (41, GPIO_FSEL_ALT4); + + FlashErase (0, 0x1000); + FlashWrite (0, (UINT8*)mFvInstance->VolumeHeader, 0x1000); + + GpioPinFuncSet (40, GPIO_FSEL_ALT0); + GpioPinFuncSet (41, GPIO_FSEL_ALT0); + + } + + return EFI_SUCCESS; } =20 @@ -416,12 +967,16 @@ FvbProtocolGetBlockSize ( =20 --*/ { - return FvbGetLbaAddress ( - Lba, - NULL, - BlockSize, - NumOfBlocks - ); + EFI_STATUS Status; + + Status =3D FvbGetLbaAddress ( + Lba, + NULL, + BlockSize, + NumOfBlocks + ); + + return Status; } =20 =20 @@ -602,7 +1157,7 @@ FvbProtocolWrite ( EFI_FVB_ATTRIBUTES_2 Attributes; UINTN LbaAddress; UINTN LbaLength; - EFI_STATUS Status; + EFI_STATUS Status =3D EFI_SUCCESS; EFI_STATUS ReturnStatus; =20 // @@ -637,6 +1192,7 @@ FvbProtocolWrite ( return EFI_INVALID_PARAMETER; } =20 + // forces this write to split if (LbaLength < (*NumBytes + Offset)) { *NumBytes =3D (UINT32)(LbaLength - Offset); Status =3D EFI_BAD_BUFFER_SIZE; @@ -789,8 +1345,6 @@ ValidateFvHeader ( Expected =3D (UINT16)(((UINTN)FwVolHeader->Checksum + 0x10000 - Checksum) & 0xfff= f); =20 - DEBUG ((DEBUG_INFO, "FV@%p Checksum is 0x%x, expected 0x%x\n", - FwVolHeader, FwVolHeader->Checksum, Expected)); return EFI_NOT_FOUND; } =20 @@ -798,6 +1352,20 @@ ValidateFvHeader ( } =20 =20 +extern EFI_EVENT VirtualAddressChangeEvent; + +EFI_STATUS +EFIAPI +FvbUnload ( + IN EFI_HANDLE ImageHandle +) +{ + gBS->CloseEvent (VirtualAddressChangeEvent); + return EFI_SUCCESS; +} + + + EFI_STATUS EFIAPI FvbInitialize ( @@ -825,6 +1393,7 @@ FvbInitialize ( UINTN NumOfBlocks; RETURN_STATUS PcdStatus; UINTN StartOffset; + EFI_FIRMWARE_VOLUME_HEADER SpiBuffer[2]; =20 BaseAddress =3D PcdGet32 (PcdNvStorageVariableBase); Length =3D (FixedPcdGet32 (PcdFlashNvStorageVariableSize) + @@ -833,6 +1402,7 @@ FvbInitialize ( FixedPcdGet32 (PcdNvStorageEventLogSize)); StartOffset =3D BaseAddress - FixedPcdGet64 (PcdFdBaseAddress); =20 + BufferSize =3D sizeof (EFI_FW_VOL_INSTANCE); =20 mFvInstance =3D AllocateRuntimeZeroPool (BufferSize); @@ -842,11 +1412,78 @@ FvbInitialize ( =20 mFvInstance->FvBase =3D (UINTN)BaseAddress; mFvInstance->FvLength =3D (UINTN)Length; - mFvInstance->Offset =3D StartOffset; + mFvInstance->BlockSize =3D FixedPcdGet32 (PcdFirmwareBlockSize); + mFvInstance->Offset =3D StartOffset; // Start offset of RPI_EFI.FD file /* * Should I parse config.txt instead and find the real name? */ mFvInstance->MappedFile =3D L"RPI_EFI.FD"; + /* + * SPI Control + */ + mFvInstance->SpiBase =3D BCM2836_SPI0_BASE_ADDRESS; + mFvInstance->FlashOffset =3D 0; + mFvInstance->DisableRuntime =3D 0; + + ZeroMem (SpiBuffer, sizeof (EFI_FIRMWARE_VOLUME_HEADER) * 2); +#if ((RPI_MODEL =3D=3D 4) && (SPI_VARIABLES)) + /* + * On the RPI4 there is a 512KB flash chip + * used to store the low level bcm2711 bootstrap code + * and the XHCI firmware on newer devices. It has between + * ~330K and ~180K available depending on model/version + * Possibly less as its consumed for other purposes. + * It shares a GPIO pin with the 3.5mm audio port (pwm) + * so accessing it causes pops, shzzzz and bzzz + * noices that are sometimes audible even without us. + * During reboot for example. Newer TFA's will presumably + * help us out and disable the audio amp at shutdown + * and leave it disabled during startup. That means + * that this code can bzzzz if TFA hasn't assured the + * audio is off for us. + * + * Runtime audio pops are audible although barely noticable + * in Windows and DT based linux boots. Although the larger + * problem is configuring the GPIO pins. As such we disable + * runtime persistance if either DT boot mode, or ACPI GPIO + * is enabled. + */ + + GpioPinFuncSet (40, GPIO_FSEL_ALT4); + GpioPinFuncSet (41, GPIO_FSEL_ALT4); + GpioPinFuncSet (42, GPIO_FSEL_ALT4); + GpioPinFuncSet (43, GPIO_FSEL_ALT4); + GpioPinFuncSet (44, GPIO_FSEL_ALT4); + GpioPinFuncSet (45, GPIO_FSEL_ALT4); + + GpioSetPull (43, GPIO_PULL_DOWN); + GpioSetPull (44, GPIO_PULL_DOWN); + GpioSetPull (45, GPIO_PULL_DOWN); + + mFvInstance->FlashOffset =3D WalkFlashVolume (); + + if (mFvInstance->FlashOffset) { + if (FlashRead (0, (UINT8*)SpiBuffer, sizeof (EFI_FIRMWARE_VOLUME_HEADE= R)*2) + !=3D sizeof (EFI_FIRMWARE_VOLUME_HEADER) * 2) { + DEBUG ((DEBUG_ERROR, "Unable to read data from SPI\n")); + mFvInstance->FlashOffset =3D 0; + } else { + Status =3D ValidateFvHeader (SpiBuffer); + if (EFI_ERROR (Status)) { + DEBUG ((DEBUG_INFO, "Invalid header on SPI, recreate volume\n")); + FlashErase (0, Length); + FlashWrite (0, (UINT8*)BaseAddress, Length); + } + + // read the entire varstore... + if (FlashRead (0, (UINT8*)BaseAddress, Length) !=3D Length) { + DEBUG ((DEBUG_ERROR, "Failed to read entire flash region\n")); + } + } + } + GpioPinFuncSet (40, GPIO_FSEL_ALT0); + GpioPinFuncSet (41, GPIO_FSEL_ALT0); +#endif =20 Status =3D ValidateFvHeader (mFvInstance->VolumeHeader); if (!EFI_ERROR (Status)) { @@ -903,7 +1540,9 @@ FvbInitialize ( } =20 // - // The total number of blocks in the FV. + // The total number of blocks in the FV. This should match: + // PcdFlashNvStorageVariableSize + PcdFlashNvStorageFtwWorkingSize + + // PcdFlashNvStorageFtwSpareSize + PcdNvStorageEventLogSize / PcdFirmwar= eBlockSize // mFvInstance->NumOfBlocks =3D NumOfBlocks; =20 diff --git a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServic= e.h b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockService.h index b65c26453d..1b4f6bd877 100644 --- a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockService.h +++ b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockService.h @@ -30,9 +30,13 @@ typedef struct { UINTN FvLength; UINTN Offset; UINTN NumOfBlocks; + UINTN BlockSize; EFI_DEVICE_PATH_PROTOCOL *Device; CHAR16 *MappedFile; BOOLEAN Dirty; + UINTN SpiBase; + UINTN FlashOffset; + UINTN DisableRuntime; } EFI_FW_VOL_INSTANCE; =20 extern EFI_FW_VOL_INSTANCE *mFvInstance; @@ -208,4 +212,10 @@ FileClose ( IN EFI_FILE_PROTOCOL *File ); =20 +typedef struct { + UINT64 FvLength; + EFI_FIRMWARE_VOLUME_HEADER FvbInfo; + EFI_FV_BLOCK_MAP_ENTRY End[1]; +} EFI_FVB_MEDIA_INFO; + #endif diff --git a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServic= eDxe.c b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServiceDxe= .c index 4071a3fca4..72ca5fafa2 100644 --- a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServiceDxe.c +++ b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServiceDxe.c @@ -8,8 +8,10 @@ * **/ =20 +#include +#include #include "VarBlockService.h" - +#include "ConfigVars.h" // // Minimum delay to enact before reset, when variables are dirty (in =CE= =BCs). // Needed to ensure that SSD-based USB 3.0 devices have time to flush thei= r @@ -104,11 +106,18 @@ FvbVirtualAddressChangeEvent ( =20 --*/ { + if (mFvInstance->DisableRuntime) { + mFvInstance->FlashOffset =3D 0; //disable flash writes + } + + EfiConvertPointer (0x0, (VOID**)&mFvInstance->SpiBase); EfiConvertPointer (0x0, (VOID**)&mFvInstance->FvBase); EfiConvertPointer (0x0, (VOID**)&mFvInstance->VolumeHeader); EfiConvertPointer (0x0, (VOID**)&mFvInstance); + GpioSetupRuntime (); } =20 +EFI_EVENT VirtualAddressChangeEvent; =20 VOID InstallVirtualAddressChangeHandler ( @@ -116,7 +125,6 @@ InstallVirtualAddressChangeHandler ( ) { EFI_STATUS Status; - EFI_EVENT VirtualAddressChangeEvent; =20 Status =3D gBS->CreateEventEx ( EVT_NOTIFY_SIGNAL, @@ -175,6 +183,16 @@ DumpVars ( =20 if (!mFvInstance->Dirty) { DEBUG ((DEBUG_INFO, "Variables not dirty, not dumping!\n")); + // if there is a valid SPI flash volume in use, don't delay the reset + if (mFvInstance->FlashOffset) { + PcdSet32S (PcdPlatformResetDelay, 0); + } + if ((PcdGet32 (PcdSystemTableMode) !=3D SYSTEM_TABLE_MODE_ACPI ) || + PcdGet32 (PcdEnableGpio)) { + DEBUG ((DEBUG_INFO, "Runtime variable support turned off!\n")); + mFvInstance->DisableRuntime =3D TRUE; + } + return; } =20 @@ -200,6 +218,24 @@ DumpVars ( mFvInstance->Dirty =3D FALSE; } =20 +STATIC +VOID +EnableAudioLdo (VOID) +{ + EFI_STATUS Status; + RASPBERRY_PI_FIRMWARE_PROTOCOL *mFwProtocol; + + Status =3D gBS->LocateProtocol (&gRaspberryPiFirmwareProtocolGuid, + NULL, (VOID**)&mFwProtocol); + ASSERT_EFI_ERROR (Status); + if (EFI_ERROR (Status)) { + return; + } + + mFwProtocol->SetLdoRegState (1); + ASSERT_EFI_ERROR (Status); +} + =20 VOID ReadyToBootHandler ( @@ -230,6 +266,21 @@ ReadyToBootHandler ( DumpVars (NULL, NULL); Status =3D gBS->CloseEvent (Event); ASSERT_EFI_ERROR (Status); + + EnableAudioLdo (); +} + + + +VOID +ExitBootServicesHandler ( + IN EFI_EVENT Event, + IN VOID *Context + ) +{ + if (mFvInstance->DisableRuntime) { + mFvInstance->FlashOffset =3D 0; //disable flash writes + } } =20 =20 @@ -241,6 +292,7 @@ InstallDumpVarEventHandlers ( EFI_STATUS Status; EFI_EVENT ResetEvent; EFI_EVENT ReadyToBootEvent; + EFI_EVENT ExitBootServicesEvent; =20 Status =3D gBS->CreateEventEx ( EVT_NOTIFY_SIGNAL, @@ -261,6 +313,19 @@ InstallDumpVarEventHandlers ( &ReadyToBootEvent ); ASSERT_EFI_ERROR (Status); + + // use exit boot services now too because we can't + // depend on address space changes following Ards + // removal of the call in linux.. + Status =3D gBS->CreateEvent ( + EVT_SIGNAL_EXIT_BOOT_SERVICES, + TPL_CALLBACK, + ExitBootServicesHandler, + NULL, + &ExitBootServicesEvent + ); + ASSERT_EFI_ERROR (Status); + } =20 =20 diff --git a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServic= eDxe.inf b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServiceD= xe.inf index c2edb25bd4..4362dddbca 100644 --- a/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServiceDxe.in= f +++ b/Platform/RaspberryPi/Drivers/VarBlockServiceDxe/VarBlockServiceDxe.in= f @@ -17,6 +17,7 @@ MODULE_TYPE =3D DXE_RUNTIME_DRIVER VERSION_STRING =3D 1.0 ENTRY_POINT =3D FvbInitialize + UNLOAD =3D FvbUnload =20 # # The following information is for reference only and not required by the = build @@ -37,6 +38,7 @@ MdePkg/MdePkg.dec MdeModulePkg/MdeModulePkg.dec Platform/RaspberryPi/RaspberryPi.dec + Silicon/Broadcom/Bcm283x/Bcm283x.dec =20 [LibraryClasses] BaseLib @@ -44,6 +46,7 @@ DebugLib DevicePathLib DxeServicesTableLib + GpioLib MemoryAllocationLib PcdLib UefiBootServicesTableLib @@ -61,6 +64,7 @@ gEfiBlockIoProtocolGuid gEfiFirmwareVolumeBlockProtocolGuid # PROTOCOL SOMETIMES_PRODU= CED gEfiDevicePathProtocolGuid # PROTOCOL SOMETIMES_PRODU= CED + gRaspberryPiFirmwareProtocolGuid ## CONSUMES =20 [FixedPcd] gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableSize @@ -75,12 +79,15 @@ gArmTokenSpaceGuid.PcdFdSize =20 [Pcd] + gBcm283xTokenSpaceGuid.PcdBcm283xRegistersAddress gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwWorkingBase gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageFtwSpareBase gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase gRaspberryPiTokenSpaceGuid.PcdNvStorageEventLogBase gRaspberryPiTokenSpaceGuid.PcdPlatformResetDelay gEfiMdeModulePkgTokenSpaceGuid.PcdFlashNvStorageVariableBase64 + gRaspberryPiTokenSpaceGuid.PcdSystemTableMode + gRaspberryPiTokenSpaceGuid.PcdEnableGpio =20 [FeaturePcd] =20 diff --git a/Platform/RaspberryPi/RPi4/RPi4.dsc b/Platform/RaspberryPi/RPi4= /RPi4.dsc index 869b88926f..a49b3433ac 100644 --- a/Platform/RaspberryPi/RPi4/RPi4.dsc +++ b/Platform/RaspberryPi/RPi4/RPi4.dsc @@ -32,6 +32,7 @@ DEFINE SECURE_BOOT_ENABLE =3D FALSE DEFINE INCLUDE_TFTP_COMMAND =3D FALSE DEFINE DEBUG_PRINT_ERROR_LEVEL =3D 0x8000004F + DEFINE SPI_VARIABLES =3D 0 =20 !ifndef TFA_BUILD_ARTIFACTS # @@ -88,7 +89,7 @@ HiiLib|MdeModulePkg/Library/UefiHiiLib/UefiHiiLib.inf UefiHiiServicesLib|MdeModulePkg/Library/UefiHiiServicesLib/UefiHiiServic= esLib.inf SortLib|MdeModulePkg/Library/UefiSortLib/UefiSortLib.inf - ImagePropertiesRecordLib|MdeModulePkg/Library/ImagePropertiesRecordLib/I= magePropertiesRecordLib.inf + ImagePropertiesRecordLib|MdeModulePkg/Library/ImagePropertiesRecordLib/I= magePropertiesRecordLib.inf =20 UefiRuntimeLib|MdePkg/Library/UefiRuntimeLib/UefiRuntimeLib.inf OrderedCollectionLib|MdePkg/Library/BaseOrderedCollectionRedBlackTreeLib= /BaseOrderedCollectionRedBlackTreeLib.inf @@ -249,7 +250,7 @@ ##########################################################################= ######################### =20 [BuildOptions] - GCC:*_*_*_CC_FLAGS =3D -DRPI_MODEL=3D4 + GCC:*_*_*_CC_FLAGS =3D -DRPI_MODEL=3D4 -DSPI_VARIABLES=3D$(SPI_= VARIABLES) GCC:*_*_*_PP_FLAGS =3D -DRPI_MODEL=3D4 GCC:*_*_*_ASLPP_FLAGS =3D -DRPI_MODEL=3D4 GCC:*_*_*_ASLCC_FLAGS =3D -DRPI_MODEL=3D4 --=20 2.43.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#113556): https://edk2.groups.io/g/devel/message/113556 Mute This Topic: https://groups.io/mt/103653093/7686176 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-