blob: 4fe547171a5f06705b3cedc4476720a76a36ba4c [file] [log] [blame]
Mike Frysingerffdb20b2013-12-03 16:43:27 -07001/*
2 * Simulate a SPI flash
3 *
4 * Copyright (c) 2011-2013 The Chromium OS Authors.
5 * See file CREDITS for list of people who contributed to this
6 * project.
7 *
8 * Licensed under the GPL-2 or later.
9 */
10
Simon Glassc3aed5d2018-10-01 11:55:13 -060011#define LOG_CATEGORY UCLASS_SPI_FLASH
12
Mike Frysingerffdb20b2013-12-03 16:43:27 -070013#include <common.h>
Simon Glassb6c29562014-10-13 23:42:08 -060014#include <dm.h>
Simon Glassf7ae49f2020-05-10 11:40:05 -060015#include <log.h>
Mike Frysingerffdb20b2013-12-03 16:43:27 -070016#include <malloc.h>
17#include <spi.h>
18#include <os.h>
19
20#include <spi_flash.h>
21#include "sf_internal.h"
22
23#include <asm/getopt.h>
24#include <asm/spi.h>
25#include <asm/state.h>
Simon Glassb6c29562014-10-13 23:42:08 -060026#include <dm/device-internal.h>
27#include <dm/lists.h>
28#include <dm/uclass-internal.h>
29
Mike Frysingerffdb20b2013-12-03 16:43:27 -070030/*
31 * The different states that our SPI flash transitions between.
32 * We need to keep track of this across multiple xfer calls since
33 * the SPI bus could possibly call down into us multiple times.
34 */
35enum sandbox_sf_state {
36 SF_CMD, /* default state -- we're awaiting a command */
37 SF_ID, /* read the flash's (jedec) ID code */
38 SF_ADDR, /* processing the offset in the flash to read/etc... */
39 SF_READ, /* reading data from the flash */
40 SF_WRITE, /* writing data to the flash, i.e. page programming */
41 SF_ERASE, /* erase the flash */
42 SF_READ_STATUS, /* read the flash's status register */
43 SF_READ_STATUS1, /* read the flash's status register upper 8 bits*/
Simon Glassb6c29562014-10-13 23:42:08 -060044 SF_WRITE_STATUS, /* write the flash's status register */
Mike Frysingerffdb20b2013-12-03 16:43:27 -070045};
46
47static const char *sandbox_sf_state_name(enum sandbox_sf_state state)
48{
49 static const char * const states[] = {
50 "CMD", "ID", "ADDR", "READ", "WRITE", "ERASE", "READ_STATUS",
Simon Glassb6c29562014-10-13 23:42:08 -060051 "READ_STATUS1", "WRITE_STATUS",
Mike Frysingerffdb20b2013-12-03 16:43:27 -070052 };
53 return states[state];
54}
55
56/* Bits for the status register */
57#define STAT_WIP (1 << 0)
58#define STAT_WEL (1 << 1)
Simon Glassa58986c2018-11-06 15:21:41 -070059#define STAT_BP_SHIFT 2
60#define STAT_BP_MASK (7 << STAT_BP_SHIFT)
Mike Frysingerffdb20b2013-12-03 16:43:27 -070061
62/* Assume all SPI flashes have 3 byte addresses since they do atm */
63#define SF_ADDR_LEN 3
64
Simon Glass110bdee2014-09-15 06:33:19 -060065#define IDCODE_LEN 3
Mike Frysingerffdb20b2013-12-03 16:43:27 -070066
67/* Used to quickly bulk erase backing store */
68static u8 sandbox_sf_0xff[0x1000];
69
70/* Internal state data for each SPI flash */
71struct sandbox_spi_flash {
Simon Glassb6c29562014-10-13 23:42:08 -060072 unsigned int cs; /* Chip select we are attached to */
Mike Frysingerffdb20b2013-12-03 16:43:27 -070073 /*
74 * As we receive data over the SPI bus, our flash transitions
75 * between states. For example, we start off in the SF_CMD
76 * state where the first byte tells us what operation to perform
77 * (such as read or write the flash). But the operation itself
78 * can go through a few states such as first reading in the
79 * offset in the flash to perform the requested operation.
80 * Thus "state" stores the exact state that our machine is in
81 * while "cmd" stores the overall command we're processing.
82 */
83 enum sandbox_sf_state state;
84 uint cmd;
Simon Glass110bdee2014-09-15 06:33:19 -060085 /* Erase size of current erase command */
86 uint erase_size;
Mike Frysingerffdb20b2013-12-03 16:43:27 -070087 /* Current position in the flash; used when reading/writing/etc... */
88 uint off;
89 /* How many address bytes we've consumed */
90 uint addr_bytes, pad_addr_bytes;
91 /* The current flash status (see STAT_XXX defines above) */
92 u16 status;
93 /* Data describing the flash we're emulating */
Vignesh Rc4e88622019-02-05 11:29:23 +053094 const struct flash_info *data;
Mike Frysingerffdb20b2013-12-03 16:43:27 -070095 /* The file on disk to serv up data from */
96 int fd;
97};
98
Simon Glassb6c29562014-10-13 23:42:08 -060099struct sandbox_spi_flash_plat_data {
100 const char *filename;
101 const char *device_name;
102 int bus;
103 int cs;
104};
105
Simon Glassa58986c2018-11-06 15:21:41 -0700106void sandbox_sf_set_block_protect(struct udevice *dev, int bp_mask)
107{
108 struct sandbox_spi_flash *sbsf = dev_get_priv(dev);
109
110 sbsf->status &= ~STAT_BP_MASK;
111 sbsf->status |= bp_mask << STAT_BP_SHIFT;
112}
113
Simon Glassb6c29562014-10-13 23:42:08 -0600114/**
115 * This is a very strange probe function. If it has platform data (which may
116 * have come from the device tree) then this function gets the filename and
Simon Glass1289e962018-10-01 11:55:09 -0600117 * device type from there.
Simon Glassb6c29562014-10-13 23:42:08 -0600118 */
119static int sandbox_sf_probe(struct udevice *dev)
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700120{
121 /* spec = idcode:file */
Simon Glassb6c29562014-10-13 23:42:08 -0600122 struct sandbox_spi_flash *sbsf = dev_get_priv(dev);
Simon Glass110bdee2014-09-15 06:33:19 -0600123 size_t len, idname_len;
Vignesh Rc4e88622019-02-05 11:29:23 +0530124 const struct flash_info *data;
Simon Glassc69cda22020-12-03 16:55:20 -0700125 struct sandbox_spi_flash_plat_data *pdata = dev_get_plat(dev);
Simon Glassb6c29562014-10-13 23:42:08 -0600126 struct sandbox_state *state = state_get_current();
Simon Glass8a8d24b2020-12-03 16:55:23 -0700127 struct dm_spi_slave_plat *slave_plat;
Simon Glassb6c29562014-10-13 23:42:08 -0600128 struct udevice *bus = dev->parent;
129 const char *spec = NULL;
Simon Glass66613f52018-10-01 11:55:19 -0600130 struct udevice *emul;
Simon Glassb6c29562014-10-13 23:42:08 -0600131 int ret = 0;
132 int cs = -1;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700133
Simon Glass8b85dfc2020-12-16 21:20:07 -0700134 debug("%s: bus %d, looking for emul=%p: ", __func__, dev_seq(bus), dev);
Simon Glass66613f52018-10-01 11:55:19 -0600135 ret = sandbox_spi_get_emul(state, bus, dev, &emul);
136 if (ret) {
Simon Glass832adb22015-05-04 11:31:10 -0600137 printf("Error: Unknown chip select for device '%s'\n",
Simon Glass66613f52018-10-01 11:55:19 -0600138 dev->name);
139 return ret;
Simon Glassb6c29562014-10-13 23:42:08 -0600140 }
Simon Glasscaa4daa2020-12-03 16:55:18 -0700141 slave_plat = dev_get_parent_plat(dev);
Simon Glass66613f52018-10-01 11:55:19 -0600142 cs = slave_plat->cs;
Simon Glassb6c29562014-10-13 23:42:08 -0600143 debug("found at cs %d\n", cs);
144
145 if (!pdata->filename) {
Simon Glass1289e962018-10-01 11:55:09 -0600146 printf("Error: No filename available\n");
147 return -EINVAL;
Simon Glassb6c29562014-10-13 23:42:08 -0600148 }
Simon Glass1289e962018-10-01 11:55:09 -0600149 spec = strchr(pdata->device_name, ',');
150 if (spec)
151 spec++;
152 else
153 spec = pdata->device_name;
154 idname_len = strlen(spec);
Simon Glassb6c29562014-10-13 23:42:08 -0600155 debug("%s: device='%s'\n", __func__, spec);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700156
Vignesh Rc4e88622019-02-05 11:29:23 +0530157 for (data = spi_nor_ids; data->name; data++) {
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700158 len = strlen(data->name);
159 if (idname_len != len)
160 continue;
Simon Glassb6c29562014-10-13 23:42:08 -0600161 if (!strncasecmp(spec, data->name, len))
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700162 break;
163 }
Simon Glass110bdee2014-09-15 06:33:19 -0600164 if (!data->name) {
Simon Glass20f655d2016-02-24 09:14:54 -0700165 printf("%s: unknown flash '%*s'\n", __func__, (int)idname_len,
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700166 spec);
Simon Glassb6c29562014-10-13 23:42:08 -0600167 ret = -EINVAL;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700168 goto error;
169 }
170
171 if (sandbox_sf_0xff[0] == 0x00)
172 memset(sandbox_sf_0xff, 0xff, sizeof(sandbox_sf_0xff));
173
Simon Glassb6c29562014-10-13 23:42:08 -0600174 sbsf->fd = os_open(pdata->filename, 02);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700175 if (sbsf->fd == -1) {
Simon Glass20f655d2016-02-24 09:14:54 -0700176 printf("%s: unable to open file '%s'\n", __func__,
Simon Glassb6c29562014-10-13 23:42:08 -0600177 pdata->filename);
178 ret = -EIO;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700179 goto error;
180 }
181
182 sbsf->data = data;
Simon Glassb6c29562014-10-13 23:42:08 -0600183 sbsf->cs = cs;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700184
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700185 return 0;
186
187 error:
Simon Glass1603bf32015-01-25 08:27:09 -0700188 debug("%s: Got error %d\n", __func__, ret);
Simon Glassb6c29562014-10-13 23:42:08 -0600189 return ret;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700190}
191
Simon Glassb6c29562014-10-13 23:42:08 -0600192static int sandbox_sf_remove(struct udevice *dev)
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700193{
Simon Glassb6c29562014-10-13 23:42:08 -0600194 struct sandbox_spi_flash *sbsf = dev_get_priv(dev);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700195
196 os_close(sbsf->fd);
Simon Glassb6c29562014-10-13 23:42:08 -0600197
198 return 0;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700199}
200
Simon Glassb6c29562014-10-13 23:42:08 -0600201static void sandbox_sf_cs_activate(struct udevice *dev)
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700202{
Simon Glassb6c29562014-10-13 23:42:08 -0600203 struct sandbox_spi_flash *sbsf = dev_get_priv(dev);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700204
Simon Glassc3aed5d2018-10-01 11:55:13 -0600205 log_content("sandbox_sf: CS activated; state is fresh!\n");
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700206
207 /* CS is asserted, so reset state */
208 sbsf->off = 0;
209 sbsf->addr_bytes = 0;
210 sbsf->pad_addr_bytes = 0;
211 sbsf->state = SF_CMD;
212 sbsf->cmd = SF_CMD;
213}
214
Simon Glassb6c29562014-10-13 23:42:08 -0600215static void sandbox_sf_cs_deactivate(struct udevice *dev)
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700216{
Simon Glassc3aed5d2018-10-01 11:55:13 -0600217 log_content("sandbox_sf: CS deactivated; cmd done processing!\n");
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700218}
219
Simon Glassb6c29562014-10-13 23:42:08 -0600220/*
221 * There are times when the data lines are allowed to tristate. What
222 * is actually sensed on the line depends on the hardware. It could
223 * always be 0xFF/0x00 (if there are pull ups/downs), or things could
224 * float and so we'd get garbage back. This func encapsulates that
225 * scenario so we can worry about the details here.
226 */
227static void sandbox_spi_tristate(u8 *buf, uint len)
228{
229 /* XXX: make this into a user config option ? */
230 memset(buf, 0xff, len);
231}
232
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700233/* Figure out what command this stream is telling us to do */
234static int sandbox_sf_process_cmd(struct sandbox_spi_flash *sbsf, const u8 *rx,
235 u8 *tx)
236{
237 enum sandbox_sf_state oldstate = sbsf->state;
238
239 /* We need to output a byte for the cmd byte we just ate */
Simon Glassb6c29562014-10-13 23:42:08 -0600240 if (tx)
241 sandbox_spi_tristate(tx, 1);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700242
243 sbsf->cmd = rx[0];
244 switch (sbsf->cmd) {
Vignesh Rc4e88622019-02-05 11:29:23 +0530245 case SPINOR_OP_RDID:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700246 sbsf->state = SF_ID;
247 sbsf->cmd = SF_ID;
248 break;
Vignesh Rc4e88622019-02-05 11:29:23 +0530249 case SPINOR_OP_READ_FAST:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700250 sbsf->pad_addr_bytes = 1;
Heinrich Schuchardt278c9b22023-04-01 09:38:05 +0200251 fallthrough;
Vignesh Rc4e88622019-02-05 11:29:23 +0530252 case SPINOR_OP_READ:
253 case SPINOR_OP_PP:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700254 sbsf->state = SF_ADDR;
255 break;
Vignesh Rc4e88622019-02-05 11:29:23 +0530256 case SPINOR_OP_WRDI:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700257 debug(" write disabled\n");
258 sbsf->status &= ~STAT_WEL;
259 break;
Vignesh Rc4e88622019-02-05 11:29:23 +0530260 case SPINOR_OP_RDSR:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700261 sbsf->state = SF_READ_STATUS;
262 break;
Vignesh Rc4e88622019-02-05 11:29:23 +0530263 case SPINOR_OP_RDSR2:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700264 sbsf->state = SF_READ_STATUS1;
265 break;
Vignesh Rc4e88622019-02-05 11:29:23 +0530266 case SPINOR_OP_WREN:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700267 debug(" write enabled\n");
268 sbsf->status |= STAT_WEL;
269 break;
Vignesh Rc4e88622019-02-05 11:29:23 +0530270 case SPINOR_OP_WRSR:
Simon Glassb6c29562014-10-13 23:42:08 -0600271 sbsf->state = SF_WRITE_STATUS;
272 break;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700273 default: {
Simon Glass110bdee2014-09-15 06:33:19 -0600274 int flags = sbsf->data->flags;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700275
Simon Glass110bdee2014-09-15 06:33:19 -0600276 /* we only support erase here */
Vignesh Rc4e88622019-02-05 11:29:23 +0530277 if (sbsf->cmd == SPINOR_OP_CHIP_ERASE) {
Simon Glass110bdee2014-09-15 06:33:19 -0600278 sbsf->erase_size = sbsf->data->sector_size *
Jagan Tekieccb6be2016-10-30 23:16:15 +0530279 sbsf->data->n_sectors;
Vignesh Rc4e88622019-02-05 11:29:23 +0530280 } else if (sbsf->cmd == SPINOR_OP_BE_4K && (flags & SECT_4K)) {
Simon Glass110bdee2014-09-15 06:33:19 -0600281 sbsf->erase_size = 4 << 10;
Vignesh Rc4e88622019-02-05 11:29:23 +0530282 } else if (sbsf->cmd == SPINOR_OP_SE && !(flags & SECT_4K)) {
Simon Glass110bdee2014-09-15 06:33:19 -0600283 sbsf->erase_size = 64 << 10;
284 } else {
285 debug(" cmd unknown: %#x\n", sbsf->cmd);
Simon Glassb6c29562014-10-13 23:42:08 -0600286 return -EIO;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700287 }
Simon Glass110bdee2014-09-15 06:33:19 -0600288 sbsf->state = SF_ADDR;
289 break;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700290 }
291 }
292
293 if (oldstate != sbsf->state)
Simon Glassc3aed5d2018-10-01 11:55:13 -0600294 log_content(" cmd: transition to %s state\n",
295 sandbox_sf_state_name(sbsf->state));
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700296
297 return 0;
298}
299
300int sandbox_erase_part(struct sandbox_spi_flash *sbsf, int size)
301{
302 int todo;
303 int ret;
304
305 while (size > 0) {
Masahiro Yamadab4141192014-11-07 03:03:31 +0900306 todo = min(size, (int)sizeof(sandbox_sf_0xff));
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700307 ret = os_write(sbsf->fd, sandbox_sf_0xff, todo);
308 if (ret != todo)
309 return ret;
310 size -= todo;
311 }
312
313 return 0;
314}
315
Simon Glassb6c29562014-10-13 23:42:08 -0600316static int sandbox_sf_xfer(struct udevice *dev, unsigned int bitlen,
317 const void *rxp, void *txp, unsigned long flags)
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700318{
Simon Glassb6c29562014-10-13 23:42:08 -0600319 struct sandbox_spi_flash *sbsf = dev_get_priv(dev);
320 const uint8_t *rx = rxp;
321 uint8_t *tx = txp;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700322 uint cnt, pos = 0;
Simon Glassb6c29562014-10-13 23:42:08 -0600323 int bytes = bitlen / 8;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700324 int ret;
325
Simon Glassc3aed5d2018-10-01 11:55:13 -0600326 log_content("sandbox_sf: state:%x(%s) bytes:%u\n", sbsf->state,
327 sandbox_sf_state_name(sbsf->state), bytes);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700328
Simon Glassb6c29562014-10-13 23:42:08 -0600329 if ((flags & SPI_XFER_BEGIN))
330 sandbox_sf_cs_activate(dev);
331
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700332 if (sbsf->state == SF_CMD) {
333 /* Figure out the initial state */
Simon Glassb6c29562014-10-13 23:42:08 -0600334 ret = sandbox_sf_process_cmd(sbsf, rx, tx);
335 if (ret)
336 return ret;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700337 ++pos;
338 }
339
340 /* Process the remaining data */
341 while (pos < bytes) {
342 switch (sbsf->state) {
343 case SF_ID: {
344 u8 id;
345
Simon Glassc3aed5d2018-10-01 11:55:13 -0600346 log_content(" id: off:%u tx:", sbsf->off);
Simon Glass110bdee2014-09-15 06:33:19 -0600347 if (sbsf->off < IDCODE_LEN) {
348 /* Extract correct byte from ID 0x00aabbcc */
Jagan Teki523b4e32016-10-30 23:16:12 +0530349 id = ((JEDEC_MFR(sbsf->data) << 16) |
350 JEDEC_ID(sbsf->data)) >>
Simon Glass110bdee2014-09-15 06:33:19 -0600351 (8 * (IDCODE_LEN - 1 - sbsf->off));
352 } else {
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700353 id = 0;
Simon Glass110bdee2014-09-15 06:33:19 -0600354 }
Simon Glassc3aed5d2018-10-01 11:55:13 -0600355 log_content("%d %02x\n", sbsf->off, id);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700356 tx[pos++] = id;
357 ++sbsf->off;
358 break;
359 }
360 case SF_ADDR:
Simon Glassc3aed5d2018-10-01 11:55:13 -0600361 log_content(" addr: bytes:%u rx:%02x ",
362 sbsf->addr_bytes, rx[pos]);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700363
364 if (sbsf->addr_bytes++ < SF_ADDR_LEN)
365 sbsf->off = (sbsf->off << 8) | rx[pos];
Simon Glassc3aed5d2018-10-01 11:55:13 -0600366 log_content("addr:%06x\n", sbsf->off);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700367
Simon Glassb6c29562014-10-13 23:42:08 -0600368 if (tx)
369 sandbox_spi_tristate(&tx[pos], 1);
370 pos++;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700371
372 /* See if we're done processing */
373 if (sbsf->addr_bytes <
374 SF_ADDR_LEN + sbsf->pad_addr_bytes)
375 break;
376
377 /* Next state! */
378 if (os_lseek(sbsf->fd, sbsf->off, OS_SEEK_SET) < 0) {
379 puts("sandbox_sf: os_lseek() failed");
Simon Glassb6c29562014-10-13 23:42:08 -0600380 return -EIO;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700381 }
382 switch (sbsf->cmd) {
Vignesh Rc4e88622019-02-05 11:29:23 +0530383 case SPINOR_OP_READ_FAST:
384 case SPINOR_OP_READ:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700385 sbsf->state = SF_READ;
386 break;
Vignesh Rc4e88622019-02-05 11:29:23 +0530387 case SPINOR_OP_PP:
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700388 sbsf->state = SF_WRITE;
389 break;
390 default:
391 /* assume erase state ... */
392 sbsf->state = SF_ERASE;
393 goto case_sf_erase;
394 }
Simon Glassc3aed5d2018-10-01 11:55:13 -0600395 log_content(" cmd: transition to %s state\n",
396 sandbox_sf_state_name(sbsf->state));
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700397 break;
398 case SF_READ:
399 /*
400 * XXX: need to handle exotic behavior:
401 * - reading past end of device
402 */
403
404 cnt = bytes - pos;
Simon Glassc3aed5d2018-10-01 11:55:13 -0600405 log_content(" tx: read(%u)\n", cnt);
Simon Glassb6c29562014-10-13 23:42:08 -0600406 assert(tx);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700407 ret = os_read(sbsf->fd, tx + pos, cnt);
408 if (ret < 0) {
Simon Glassb6c29562014-10-13 23:42:08 -0600409 puts("sandbox_sf: os_read() failed\n");
410 return -EIO;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700411 }
412 pos += ret;
413 break;
414 case SF_READ_STATUS:
Simon Glassc3aed5d2018-10-01 11:55:13 -0600415 log_content(" read status: %#x\n", sbsf->status);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700416 cnt = bytes - pos;
417 memset(tx + pos, sbsf->status, cnt);
418 pos += cnt;
419 break;
420 case SF_READ_STATUS1:
Simon Glassc3aed5d2018-10-01 11:55:13 -0600421 log_content(" read status: %#x\n", sbsf->status);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700422 cnt = bytes - pos;
423 memset(tx + pos, sbsf->status >> 8, cnt);
424 pos += cnt;
425 break;
Simon Glassb6c29562014-10-13 23:42:08 -0600426 case SF_WRITE_STATUS:
Simon Glassc3aed5d2018-10-01 11:55:13 -0600427 log_content(" write status: %#x (ignored)\n", rx[pos]);
Simon Glassb6c29562014-10-13 23:42:08 -0600428 pos = bytes;
429 break;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700430 case SF_WRITE:
431 /*
432 * XXX: need to handle exotic behavior:
433 * - unaligned addresses
434 * - more than a page (256) worth of data
435 * - reading past end of device
436 */
437 if (!(sbsf->status & STAT_WEL)) {
438 puts("sandbox_sf: write enable not set before write\n");
439 goto done;
440 }
441
442 cnt = bytes - pos;
Simon Glassc3aed5d2018-10-01 11:55:13 -0600443 log_content(" rx: write(%u)\n", cnt);
Simon Glassb6c29562014-10-13 23:42:08 -0600444 if (tx)
445 sandbox_spi_tristate(&tx[pos], cnt);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700446 ret = os_write(sbsf->fd, rx + pos, cnt);
447 if (ret < 0) {
448 puts("sandbox_spi: os_write() failed\n");
Simon Glassb6c29562014-10-13 23:42:08 -0600449 return -EIO;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700450 }
451 pos += ret;
452 sbsf->status &= ~STAT_WEL;
453 break;
454 case SF_ERASE:
455 case_sf_erase: {
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700456 if (!(sbsf->status & STAT_WEL)) {
457 puts("sandbox_sf: write enable not set before erase\n");
458 goto done;
459 }
460
461 /* verify address is aligned */
Simon Glass110bdee2014-09-15 06:33:19 -0600462 if (sbsf->off & (sbsf->erase_size - 1)) {
Simon Glassc3aed5d2018-10-01 11:55:13 -0600463 log_content(" sector erase: cmd:%#x needs align:%#x, but we got %#x\n",
464 sbsf->cmd, sbsf->erase_size,
465 sbsf->off);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700466 sbsf->status &= ~STAT_WEL;
467 goto done;
468 }
469
Simon Glassc3aed5d2018-10-01 11:55:13 -0600470 log_content(" sector erase addr: %u, size: %u\n",
471 sbsf->off, sbsf->erase_size);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700472
473 cnt = bytes - pos;
Simon Glassb6c29562014-10-13 23:42:08 -0600474 if (tx)
475 sandbox_spi_tristate(&tx[pos], cnt);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700476 pos += cnt;
477
478 /*
479 * TODO(vapier@gentoo.org): latch WIP in status, and
480 * delay before clearing it ?
481 */
Simon Glass110bdee2014-09-15 06:33:19 -0600482 ret = sandbox_erase_part(sbsf, sbsf->erase_size);
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700483 sbsf->status &= ~STAT_WEL;
484 if (ret) {
Simon Glassc3aed5d2018-10-01 11:55:13 -0600485 log_content("sandbox_sf: Erase failed\n");
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700486 goto done;
487 }
488 goto done;
489 }
490 default:
Simon Glassc3aed5d2018-10-01 11:55:13 -0600491 log_content(" ??? no idea what to do ???\n");
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700492 goto done;
493 }
494 }
495
496 done:
Simon Glassb6c29562014-10-13 23:42:08 -0600497 if (flags & SPI_XFER_END)
498 sandbox_sf_cs_deactivate(dev);
499 return pos == bytes ? 0 : -EIO;
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700500}
501
Simon Glassd1998a92020-12-03 16:55:21 -0700502int sandbox_sf_of_to_plat(struct udevice *dev)
Simon Glassb6c29562014-10-13 23:42:08 -0600503{
Simon Glassc69cda22020-12-03 16:55:20 -0700504 struct sandbox_spi_flash_plat_data *pdata = dev_get_plat(dev);
Simon Glassb6c29562014-10-13 23:42:08 -0600505
Simon Glassa1181792017-05-18 20:09:58 -0600506 pdata->filename = dev_read_string(dev, "sandbox,filename");
507 pdata->device_name = dev_read_string(dev, "compatible");
Simon Glassb6c29562014-10-13 23:42:08 -0600508 if (!pdata->filename || !pdata->device_name) {
509 debug("%s: Missing properties, filename=%s, device_name=%s\n",
510 __func__, pdata->filename, pdata->device_name);
511 return -EINVAL;
512 }
513
514 return 0;
515}
516
517static const struct dm_spi_emul_ops sandbox_sf_emul_ops = {
Mike Frysingerffdb20b2013-12-03 16:43:27 -0700518 .xfer = sandbox_sf_xfer,
519};
520
Simon Glassb6c29562014-10-13 23:42:08 -0600521#ifdef CONFIG_SPI_FLASH
Simon Glassb6c29562014-10-13 23:42:08 -0600522int sandbox_sf_bind_emul(struct sandbox_state *state, int busnum, int cs,
Simon Glass008dcdd2018-06-11 13:07:16 -0600523 struct udevice *bus, ofnode node, const char *spec)
Simon Glassb6c29562014-10-13 23:42:08 -0600524{
525 struct udevice *emul;
526 char name[20], *str;
527 struct driver *drv;
528 int ret;
529
530 /* now the emulator */
531 strncpy(name, spec, sizeof(name) - 6);
532 name[sizeof(name) - 6] = '\0';
533 strcat(name, "-emul");
Simon Glassb6c29562014-10-13 23:42:08 -0600534 drv = lists_driver_lookup_name("sandbox_sf_emul");
535 if (!drv) {
536 puts("Cannot find sandbox_sf_emul driver\n");
537 return -ENOENT;
538 }
Simon Glassfb952832018-06-12 00:05:01 -0600539 str = strdup(name);
540 if (!str)
541 return -ENOMEM;
Simon Glass734206d2020-11-28 17:50:01 -0700542 ret = device_bind(bus, drv, str, NULL, node, &emul);
Simon Glassb6c29562014-10-13 23:42:08 -0600543 if (ret) {
Simon Glassfb952832018-06-12 00:05:01 -0600544 free(str);
Simon Glassb6c29562014-10-13 23:42:08 -0600545 printf("Cannot create emul device for spec '%s' (err=%d)\n",
546 spec, ret);
547 return ret;
548 }
549 state->spi[busnum][cs].emul = emul;
550
551 return 0;
552}
553
554void sandbox_sf_unbind_emul(struct sandbox_state *state, int busnum, int cs)
555{
Simon Glassd0cff032015-01-25 08:27:12 -0700556 struct udevice *dev;
557
558 dev = state->spi[busnum][cs].emul;
Stefan Roese706865a2017-03-20 12:51:48 +0100559 device_remove(dev, DM_REMOVE_NORMAL);
Simon Glassd0cff032015-01-25 08:27:12 -0700560 device_unbind(dev);
Simon Glassb6c29562014-10-13 23:42:08 -0600561 state->spi[busnum][cs].emul = NULL;
562}
563
Simon Glassb6c29562014-10-13 23:42:08 -0600564int sandbox_spi_get_emul(struct sandbox_state *state,
565 struct udevice *bus, struct udevice *slave,
566 struct udevice **emulp)
567{
568 struct sandbox_spi_info *info;
Simon Glass8b85dfc2020-12-16 21:20:07 -0700569 int busnum = dev_seq(bus);
Simon Glassb6c29562014-10-13 23:42:08 -0600570 int cs = spi_chip_select(slave);
571 int ret;
572
573 info = &state->spi[busnum][cs];
574 if (!info->emul) {
575 /* Use the same device tree node as the SPI flash device */
576 debug("%s: busnum=%u, cs=%u: binding SPI flash emulation: ",
577 __func__, busnum, cs);
578 ret = sandbox_sf_bind_emul(state, busnum, cs, bus,
Simon Glass008dcdd2018-06-11 13:07:16 -0600579 dev_ofnode(slave), slave->name);
Simon Glassb6c29562014-10-13 23:42:08 -0600580 if (ret) {
581 debug("failed (err=%d)\n", ret);
582 return ret;
583 }
584 debug("OK\n");
585 }
586 *emulp = info->emul;
587
588 return 0;
589}
Simon Glassb6c29562014-10-13 23:42:08 -0600590#endif
591
592static const struct udevice_id sandbox_sf_ids[] = {
593 { .compatible = "sandbox,spi-flash" },
594 { }
595};
596
597U_BOOT_DRIVER(sandbox_sf_emul) = {
598 .name = "sandbox_sf_emul",
599 .id = UCLASS_SPI_EMUL,
600 .of_match = sandbox_sf_ids,
Simon Glassd1998a92020-12-03 16:55:21 -0700601 .of_to_plat = sandbox_sf_of_to_plat,
Simon Glassb6c29562014-10-13 23:42:08 -0600602 .probe = sandbox_sf_probe,
603 .remove = sandbox_sf_remove,
Simon Glass41575d82020-12-03 16:55:17 -0700604 .priv_auto = sizeof(struct sandbox_spi_flash),
Simon Glasscaa4daa2020-12-03 16:55:18 -0700605 .plat_auto = sizeof(struct sandbox_spi_flash_plat_data),
Simon Glassb6c29562014-10-13 23:42:08 -0600606 .ops = &sandbox_sf_emul_ops,
607};