blob: 2fba3831685af139a44d51122f1c89a616f1c277 [file] [log] [blame]
Patrick Delaunay2a350372019-07-05 17:20:16 +02001// SPDX-License-Identifier: GPL-2.0+ OR BSD-3-Clause
2/*
3 * Copyright (C) 2019, STMicroelectronics - All Rights Reserved
Patrick Delaunay52163d92020-03-24 09:05:00 +01004 *
5 * the st command stboard supports the STMicroelectronics board identification
6 * saved in OTP 59.
7 *
8 * The ST product codification have several element
9 * - "Commercial Product Name" (CPN): type of product board (DKX, EVX)
10 * associated to the board ID "MBxxxx"
11 * - "Finished Good" or "Finish Good" (FG):
12 * effective content of the product without chip STM32MP1xx (LCD, Wifi,…)
13 * - BOM: cost variant for same FG (for example, several provider of the same
14 * component)
15 *
16 * For example
17 * - commercial product = STM32MP157C-EV1 for board MB1263
18 * - Finished Good = EVA32MP157A1$AU1
19 *
20 * Both information are written on board and these information are also saved
21 * in OTP59, with:
22 * bit [31:16] (hex) => Board id, MBxxxx
23 * bit [15:12] (dec) => Variant CPN (1....15)
24 * bit [11:8] (dec) => Revision board (index with A = 1, Z = 26)
25 * bit [7:4] (dec) => Variant FG : finished good index
26 * bit [3:0] (dec) => BOM (01, .... 255)
27 *
28 * and displayed with the format:
29 * Board: MB<Board> Var<VarCPN>.<VarFG> Rev.<Revision>-<BOM>
Patrick Delaunay2a350372019-07-05 17:20:16 +020030 */
31
Patrick Delaunay2a57bcb2020-01-13 15:17:40 +010032#ifndef CONFIG_SPL_BUILD
Patrick Delaunay2a350372019-07-05 17:20:16 +020033#include <common.h>
Simon Glassed38aef2020-05-10 11:40:03 -060034#include <command.h>
Patrick Delaunay2a350372019-07-05 17:20:16 +020035#include <console.h>
36#include <misc.h>
37#include <dm/device.h>
38#include <dm/uclass.h>
39
40static bool check_stboard(u16 board)
41{
42 unsigned int i;
Patrick Delaunay52163d92020-03-24 09:05:00 +010043 /* list of supported ST boards */
Patrick Delaunay2a350372019-07-05 17:20:16 +020044 const u16 st_board_id[] = {
45 0x1272,
46 0x1263,
47 0x1264,
48 0x1298,
49 0x1341,
50 0x1497,
51 };
52
53 for (i = 0; i < ARRAY_SIZE(st_board_id); i++)
54 if (board == st_board_id[i])
55 return true;
56
57 return false;
58}
59
60static void display_stboard(u32 otp)
61{
Patrick Delaunay52163d92020-03-24 09:05:00 +010062 /* display board indentification with OPT coding */
63 printf("Board: MB%04x Var%d.%d Rev.%c-%02d\n",
Patrick Delaunay2a350372019-07-05 17:20:16 +020064 otp >> 16,
65 (otp >> 12) & 0xF,
Patrick Delaunay52163d92020-03-24 09:05:00 +010066 (otp >> 4) & 0xF,
Patrick Delaunay2a350372019-07-05 17:20:16 +020067 ((otp >> 8) & 0xF) - 1 + 'A',
68 otp & 0xF);
69}
70
Simon Glassed38aef2020-05-10 11:40:03 -060071static int do_stboard(struct cmd_tbl *cmdtp, int flag, int argc,
72 char *const argv[])
Patrick Delaunay2a350372019-07-05 17:20:16 +020073{
74 int ret;
Patrick Delaunay3085ee32020-02-12 19:37:39 +010075 u32 otp, lock;
Patrick Delaunay2a350372019-07-05 17:20:16 +020076 u8 revision;
Patrick Delaunay52163d92020-03-24 09:05:00 +010077 unsigned long board, var_cpn, var_fg, bom;
Patrick Delaunay2a350372019-07-05 17:20:16 +020078 struct udevice *dev;
Patrick Delaunay52163d92020-03-24 09:05:00 +010079 int confirmed = argc == 7 && !strcmp(argv[1], "-y");
Patrick Delaunay2a350372019-07-05 17:20:16 +020080
81 argc -= 1 + confirmed;
82 argv += 1 + confirmed;
83
Patrick Delaunay52163d92020-03-24 09:05:00 +010084 if (argc != 0 && argc != 5)
Patrick Delaunay2a350372019-07-05 17:20:16 +020085 return CMD_RET_USAGE;
86
87 ret = uclass_get_device_by_driver(UCLASS_MISC,
Simon Glass65130cd2020-12-28 20:34:56 -070088 DM_DRIVER_GET(stm32mp_bsec),
Patrick Delaunay2a350372019-07-05 17:20:16 +020089 &dev);
90
Patrick Delaunayb7ce0152020-02-12 19:37:36 +010091 ret = misc_read(dev, STM32_BSEC_OTP(BSEC_OTP_BOARD),
Patrick Delaunay2a350372019-07-05 17:20:16 +020092 &otp, sizeof(otp));
93
Patrick Delaunay984c22d2019-08-02 13:08:07 +020094 if (ret < 0) {
Patrick Delaunay2a350372019-07-05 17:20:16 +020095 puts("OTP read error");
96 return CMD_RET_FAILURE;
97 }
98
Patrick Delaunay3085ee32020-02-12 19:37:39 +010099 ret = misc_read(dev, STM32_BSEC_LOCK(BSEC_OTP_BOARD),
100 &lock, sizeof(lock));
101 if (ret < 0) {
102 puts("LOCK read error");
103 return CMD_RET_FAILURE;
104 }
105
Patrick Delaunay2a350372019-07-05 17:20:16 +0200106 if (argc == 0) {
107 if (!otp)
108 puts("Board : OTP board FREE\n");
109 else
110 display_stboard(otp);
Patrick Delaunay3085ee32020-02-12 19:37:39 +0100111 printf(" OTP %d %s locked !\n", BSEC_OTP_BOARD,
112 lock == 1 ? "" : "NOT");
Patrick Delaunay2a350372019-07-05 17:20:16 +0200113 return CMD_RET_SUCCESS;
114 }
115
116 if (otp) {
117 display_stboard(otp);
118 printf("ERROR: OTP board not FREE\n");
119 return CMD_RET_FAILURE;
120 }
121
122 if (strict_strtoul(argv[0], 16, &board) < 0 ||
123 board == 0 || board > 0xFFFF) {
124 printf("argument %d invalid: %s\n", 1, argv[0]);
125 return CMD_RET_USAGE;
126 }
127
Patrick Delaunay52163d92020-03-24 09:05:00 +0100128 if (strict_strtoul(argv[1], 10, &var_cpn) < 0 ||
129 var_cpn == 0 || var_cpn > 15) {
Patrick Delaunay2a350372019-07-05 17:20:16 +0200130 printf("argument %d invalid: %s\n", 2, argv[1]);
131 return CMD_RET_USAGE;
132 }
133
134 revision = argv[2][0] - 'A' + 1;
135 if (strlen(argv[2]) > 1 || revision == 0 || revision > 15) {
136 printf("argument %d invalid: %s\n", 3, argv[2]);
137 return CMD_RET_USAGE;
138 }
139
Patrick Delaunay52163d92020-03-24 09:05:00 +0100140 if (strict_strtoul(argv[3], 10, &var_fg) < 0 ||
141 var_fg > 15) {
142 printf("argument %d invalid: %s\n", 4, argv[3]);
143 return CMD_RET_USAGE;
144 }
145
146 if (strict_strtoul(argv[4], 10, &bom) < 0 ||
Patrick Delaunay2a350372019-07-05 17:20:16 +0200147 bom == 0 || bom > 15) {
148 printf("argument %d invalid: %s\n", 4, argv[3]);
149 return CMD_RET_USAGE;
150 }
151
Patrick Delaunay52163d92020-03-24 09:05:00 +0100152 /* st board indentification value */
153 otp = (board << 16) | (var_cpn << 12) | (revision << 8) |
154 (var_fg << 4) | bom;
Patrick Delaunay2a350372019-07-05 17:20:16 +0200155 display_stboard(otp);
156 printf("=> OTP[%d] = %08X\n", BSEC_OTP_BOARD, otp);
157
158 if (!check_stboard((u16)board)) {
159 printf("Unknown board MB%04x\n", (u16)board);
160 return CMD_RET_FAILURE;
161 }
162 if (!confirmed) {
163 printf("Warning: Programming BOARD in OTP is irreversible!\n");
164 printf("Really perform this OTP programming? <y/N>\n");
165
166 if (!confirm_yesno()) {
167 puts("BOARD programming aborted\n");
168 return CMD_RET_FAILURE;
169 }
170 }
171
172 ret = misc_write(dev, STM32_BSEC_OTP(BSEC_OTP_BOARD),
173 &otp, sizeof(otp));
174
Patrick Delaunay8e0b8fc2020-02-12 19:37:35 +0100175 if (ret < 0) {
Patrick Delaunay2a350372019-07-05 17:20:16 +0200176 puts("BOARD programming error\n");
177 return CMD_RET_FAILURE;
178 }
Patrick Delaunay3085ee32020-02-12 19:37:39 +0100179
180 /* write persistent lock */
181 otp = 1;
182 ret = misc_write(dev, STM32_BSEC_LOCK(BSEC_OTP_BOARD),
183 &otp, sizeof(otp));
184 if (ret < 0) {
185 puts("BOARD lock error\n");
186 return CMD_RET_FAILURE;
187 }
188
Patrick Delaunay2a350372019-07-05 17:20:16 +0200189 puts("BOARD programming done\n");
190
191 return CMD_RET_SUCCESS;
192}
193
Patrick Delaunay52163d92020-03-24 09:05:00 +0100194U_BOOT_CMD(stboard, 7, 0, do_stboard,
Patrick Delaunay2a350372019-07-05 17:20:16 +0200195 "read/write board reference in OTP",
196 "\n"
197 " Print current board information\n"
Patrick Delaunay52163d92020-03-24 09:05:00 +0100198 "stboard [-y] <Board> <VarCPN> <Revision> <VarFG> <BOM>\n"
Patrick Delaunay2a350372019-07-05 17:20:16 +0200199 " Write board information\n"
200 " - Board: xxxx, example 1264 for MB1264\n"
Patrick Delaunay52163d92020-03-24 09:05:00 +0100201 " - VarCPN: 1...15\n"
Patrick Delaunay2a350372019-07-05 17:20:16 +0200202 " - Revision: A...O\n"
Patrick Delaunay52163d92020-03-24 09:05:00 +0100203 " - VarFG: 0...15\n"
Patrick Delaunay2a350372019-07-05 17:20:16 +0200204 " - BOM: 1...15\n");
Patrick Delaunay2a57bcb2020-01-13 15:17:40 +0100205
206#endif