Commits on Sep 9, 2019

  1. soc/intel/cannonlake: Add ability to disable Heci1

    Decide if HECI1 should be hidden prior to boot to OS.
    
    BUG=none
    TEST=Boot to OS, verify if Heci1 is disabled on hatch system
         using FSP 1344.
    
    Change-Id: I7c63316c8b04fb101d34064daac5ba4fdc05a63c
    Signed-off-by: Bora Guvendik <bora.guvendik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/32992
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Subrata Banik <subrata.banik@intel.com>
    bguvendi authored and subrata-b committed Sep 9, 2019
    Copy the full SHA
    c42ef56 View commit details
    Browse the repository at this point in the history
  2. src/southbridge/amd/pi/hudson/lpc.c: add missing MCFG ACPI table gene…

    …ration
    
    The MCFG ACPI table was not being created.
    
    Signed-off-by: Michał Żygowski <michal.zygowski@3mdeb.com>
    Change-Id: I35bdefb2a565d18917a2f6517d443890f93bd252
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35286
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Rudolph <siro@das-labor.org>
    miczyg1 authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    033435b View commit details
    Browse the repository at this point in the history
  3. mb/asrock/h110m: fix VR domains configuration

    1) VR domains current limit Icc max for Sky/Kaby Lake S is set based
    on the processor TDP [1]. Updates information about this
    
    2) Sets VR voltage limit to 1.52V, as described in the datasheets [2,3]
    
    [1] Change-Id: I303c5dc8ed03e9a98a834a2acfb400022dfc2fde
    [2] page 112-119, 6th Generation Intel(R) Processor Families
        for S-Platforms, Volume 1 of 2, Datasheet, August 2018.
        Document Number: 332687-008EN
    [3] 7th Generation Intel(R) Processor Families for S Platforms and
        Intel(R) Core(TM) X-Series Processor Family Datasheet, Volume 1,
        December 2018, Document Number: 335195-003
    
    Change-Id: I6e1aefde135ffce75a5d837348595aa20aff0513
    Signed-off-by: Maxim Polyakov <max.senia.poliak@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35067
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    maxpoliak authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    a546f11 View commit details
    Browse the repository at this point in the history
  4. mb/asrock/h110m: use VR_CFG_AMP() macro to set PSI threshold

    Change-Id: Iafeb7f7689a16d3b16eb0564c4dd72919a8d1382
    Signed-off-by: Maxim Polyakov <max.senia.poliak@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35068
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    maxpoliak authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    6342c93 View commit details
    Browse the repository at this point in the history
  5. mb/asrock/h110m: remove unsed i2c_voltage settings

    The string "register "i2c_voltage[4]" = "I2C_VOLTAGE_1V8" was mistakenly
    taken from the Intel KBL-RVP8 devicetree.cb. Remove it, since the i2c4
    bus is disabled in the "SerialIoDevMode" register
    
    Change-Id: I44ecd5c22efd66b02a2851dc14a1a95421f39a71
    Signed-off-by: Maxim Polyakov <max.senia.poliak@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35069
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    maxpoliak authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    21353ba View commit details
    Browse the repository at this point in the history
  6. mb/asrock/h110m: disable unused serial buses

    Disable spi0, i2c0 and i2c1 in the “SerialIoDevMode” register for the
    following reasons:
    
    1. when the AMI BIOS is used, these pci devices are disabled in
       lspci.log;
    2. there are no pads in the inteltool.log that use the functions of
       these buses
    
    Change-Id: I01ab10eb3fd41e81a1726805247c2b472d72287c
    Signed-off-by: Maxim Polyakov <max.senia.poliak@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35070
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    maxpoliak authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    a433da7 View commit details
    Browse the repository at this point in the history
  7. mb/asrock/h110m: disable unused sata ports

    Sets all unused sata ports to disable in the device tree
    
    Note:
      SATA4 and SATA5 are located at the bottom of the board, but there
      is no connector for this. Apparently, a board with an increased
      number of ports is very rare. Perhaps this is a separate variant
      of the Asrock motherboard. For this reason, these ports are also
      disabled
    
    Change-Id: I5b3ad372f1d6607cc7b4a78e3c59d2a5ae1d2cf5
    Signed-off-by: Maxim Polyakov <max.senia.poliak@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35071
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    maxpoliak authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    50f4c5a View commit details
    Browse the repository at this point in the history
  8. mb/asrock/h110m: add missing pci devices to tree

    These devices are enabled after initializing in the FSP
    
    Change-Id: I0a15537b6ba56fcf63267641ef2219f24d25d9c4
    Signed-off-by: Maxim Polyakov <max.senia.poliak@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35100
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    maxpoliak authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    59613ee View commit details
    Browse the repository at this point in the history
  9. mb/google/drallion: modify USB setting

    Based on HW schematic to modify USB setting.
    Drallion has two type C on left and two type A on right.
    
    BUG=b:138082886
    BRANCH=N/A
    TEST=N/A
    
    Signed-off-by: Eric Lai <ericr_lai@compal.corp-partner.google.com>
    Change-Id: I925de209635d92ef61ccb9114efebb4b10f30e87
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35283
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Mathew King <mathewk@chromium.org>
    EricRLai authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    d6c2d1d View commit details
    Browse the repository at this point in the history
  10. lib/spd_bin: Extend DDR4 spd information

    From DDR4 SPD spec:
    
    Byte 4 (0x004): SDRAM Density and Banks
    Bits [7, 6]:
    00 = 0 (no bank groups)
    01 = 1 (2 bank groups)
    10 = 2 (4 bank groups)
    11 = reserved
    
    Bit [5, 4] :
    00 = 2 (4 banks)
    01 = 3 (8 banks)
    All others reserved
    
    Separate DDR3 and DDR4 banks. And extened capmb, rows, cols and ranks.
    Separate DDR3 and DDR4 ORGANIZATION/BUS_DEV_WIDTH offset.
    
    Signed-off-by: Eric Lai <ericr_lai@compal.corp-partner.google.com>
    Change-Id: I5f56975ce73d8ed2d4de7d9fd08e5ae86993e731
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35206
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    EricRLai authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    aa8d772 View commit details
    Browse the repository at this point in the history
  11. soc/intel/cannonlake: Allow coreboot to handle SPI lockdown

    This patch disables FSP-S SPI lockdown UPDs and lets coreboot perform
    SPI lockdown (i.e.flash register DLOCK, FLOCKDN, and WRSDIS before
    end of post) in ramstage.
    
    BUG=b:138200201
    TEST=FSP debug build suggests those UPDs are disable now.
    
    Change-Id: Id7a6b9859e058b9f1ec1bd45d2c388c02b8ac18c
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35299
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: V Sowmya <v.sowmya@intel.com>
    subrata-b authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    13e902d View commit details
    Browse the repository at this point in the history
  12. soc/intel/common/block/cse: Add helper function heci_send_receive

    Aggregate sending and receiving HECI messages into a single function.
    
    TEST=Verified sending and receiving reply HECI message on CML RVP & Hatch board
    
    Change-Id: Ic95239eef8591d3aadf56a857c97f3f1e12b16ac
    Signed-off-by: Rizwan Qureshi <rizwan.qureshi@intel.com>
    Signed-off-by: Sridhar Siricilla <sridhar.siricilla@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35224
    Reviewed-by: Subrata Banik <subrata.banik@intel.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    sridharisiricilla authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    a5208f5 View commit details
    Browse the repository at this point in the history
  13. intel/fsp_broadwell_de: Enable CONSOLE_CBMEM by default

    In the very early days of FSP 1.0 this did not work so
    we kept it disabled.
    
    Change-Id: I8a88be6df335598d4c6007a8b7ff307b293e1f97
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35284
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    kmalkki authored and pgeorgi committed Sep 9, 2019
    Copy the full SHA
    445394e View commit details
    Browse the repository at this point in the history
  14. intel/fsp_broadwell_de: Add early timestamps

    Modify intel/fsp_broadwell_de such that timestamp_init() is
    before raminit (and CAR teardown of FSP1.0), adding two new
    early timestamps while doing so.
    
    Other FSP1.0 platforms fsp_baytrail and fsp_rangeley already
    do it this way.
    
    Change-Id: I3b73e4a61622f789a49973a43b21e8028bcb8ca8
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35279
    Reviewed-by: Martin Roth <martinroth@google.com>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki committed Sep 9, 2019
    Copy the full SHA
    03026a2 View commit details
    Browse the repository at this point in the history
  15. arch/x86: Refactor CAR_GLOBAL quirk for FSP1.0

    These platforms return to romstage from FSP only after
    already having torn CAR down. A copy of the entire CAR
    region is available and discoverable via HOB.
    
    Previously, CBMEM console detected on-the-fly that CAR
    migration had happened and relocated cbmem_console_p
    accoringlin with car_sync_var(). However, if the CAR_GLOBAL
    pointing to another object inside CAR is a relative offset
    instead, we have a more generic solution that can be used
    with timestamps code as well.
    
    Change-Id: Ica877b47e68d56189e9d998b5630019d4328a419
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35140
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki authored and Martin Roth committed Sep 9, 2019
    Copy the full SHA
    6fdb223 View commit details
    Browse the repository at this point in the history
  16. soc/amd/common: Add missing stdint.h to lpc.h

    Include the file containing the typedefs for uint_*.
    
    Change-Id: If33765b6dc4236c4b38860bfc4f2cef9b226b81d
    Signed-off-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35269
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Richard Spiegel <richard.spiegel@silverbackltd.com>
    marshall-dawson authored and Martin Roth committed Sep 9, 2019
    Copy the full SHA
    5aacda4 View commit details
    Browse the repository at this point in the history
  17. soc/amd/common/lpc: Add decode disable function

    It is already trivial to set D14F3x44 to 0, but add a function to wipe
    both that and the settings in D14F3x48, along with x48's associated
    addresses.
    
    Change-Id: Ibec25562b2a1568681aea7caf86f00094c436a50
    Signed-off-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35270
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Richard Spiegel <richard.spiegel@silverbackltd.com>
    marshall-dawson authored and Martin Roth committed Sep 9, 2019
    Copy the full SHA
    ba2533f View commit details
    Browse the repository at this point in the history
  18. soc/amd/picasso: Update TSC and monotonic timer

    Picasso's TimeStamp Counter is a new design and different than
    Stoney Ridge.  Although advertised as invariant, the ST TSC did
    not become so until midway through POST making it an unreliable
    source for measuring time.  This is not the case for Picasso.
    
    Remove the Stoney Ridge monotonic timer code and rely on the TSC.
    
    Modify the calculation used in Family 15h of finding the number
    of boost states first, and get the frequency directly out of the
    Pstate0 register.
    
    Signed-off-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Change-Id: I909743483309279eb8c3bf68852d6082381f0dff
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/33765
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Richard Spiegel <richard.spiegel@silverbackltd.com>
    marshall-dawson authored and Martin Roth committed Sep 9, 2019
    Copy the full SHA
    80d0b01 View commit details
    Browse the repository at this point in the history
  19. mb/google/hatch: Distinguish SKU1 and 2 for eMMC and SSD respectively

    1. SKU1 for eMMC
    2. SKU2 for SSD
    
    BUG=b:140008849, b:140573677
    TEST=Verify SSD is disabled when SKU ID = 2/4/21/22
    
    Signed-off-by: Peichao Wang <peichao.wang@bitland.corp-partner.google.com>
    Change-Id: I827e6f1420801d43e0eb4708b8b8ad1692ef7e9f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35204
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-by: Marco Chen <marcochen@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Peichao Wang authored and Martin Roth committed Sep 9, 2019
    Copy the full SHA
    0328a72 View commit details
    Browse the repository at this point in the history

Commits on Sep 10, 2019

  1. soc/intel/skylake: Add option to toggle Hyper-Threading

    Tested on Supermicro X11SSH-TF.
    
    Change-Id: I3ebab68ff868c78105bb4b35abffb92f3ccf1705
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35208
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    PatrickRudolph authored and siro20 committed Sep 10, 2019
    Copy the full SHA
    203061c View commit details
    Browse the repository at this point in the history
  2. mb/google/kahlee/treeya: Tune I2C bus 1, 2 and 3 clock

    Tune I2C bus 1, 2 and 3 clock and make them meet spec.
    
    BUG=b:140665478
    TEST==flash coreboot to the DUT and measure I2C bus 1,2,3 clock
    frequency less than 400KHz
    
    Signed-off-by: Peichao.Wang <peichao.wang@bitland.corp-partner.google.com>
    Change-Id: I6b2a51a866e57d13fe528452e4efdcf17a72317f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35298
    Reviewed-by: Martin Roth <martinroth@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Peichao Wang authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    6322830 View commit details
    Browse the repository at this point in the history
  3. mb/google/octopus: Add a new sku for meep

    Add a new sku4 for meep:
    sku4: Stylus + no rear camera
    
    BUG=b:140360096
    TEST=emerge-octopus coreboot
    
    Change-Id: Icde7f032c0acf7562b5d5f2c6a8b0c2de91c45b2
    Signed-off-by: Wisley Chen <wisley.chen@quantatw.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35300
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Justin TerAvest <teravest@chromium.org>
    WisleyChen authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    188f641 View commit details
    Browse the repository at this point in the history
  4. mb/google/hatch/variants/helios: Modify FPU power on sequence

    pull in the FPU VDDIO turn on to fix the power leakage problem
    on FPU VDDIO and FPU CS during power on sequence.
    
    BUG=b:138638571
    BRANCH=none
    TEST=emerge-hatch coreboot chromeos-bootimage
    
    Signed-off-by: Frank_Chu <frank_chu@pegatron.corp-partner.google.com>
    Change-Id: I3f6bf3676922e987c2e282b697a2333e2d90289e
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/34858
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    FrankChu1008 authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    687c419 View commit details
    Browse the repository at this point in the history
  5. mb/google/poppy/variant/nocturne: add EC_SYNC_GPIO

    Setup EC_PCH_ARCORE_INT_L, tied to GPP_D17, and define as EC_SYNC_GPIO..
    
     - change GPP_D17 definition to PAD_CFG_GPI_APIC_INVERT as
       EC_PCH_ARCORE_INT_L is active low
    
     - add EC_SYNC_GPIO to the group of chromeos_gpios for use by depthcharge
    
    BUG=b:139384979
    BRANCH=none
    TEST="emerge_nocturne coreboot depthcharge chromeos-bootimage",
    flash & boot nocturne in dev mode, verify that volume up and down
    buttons work in the dev screen and that the device boots properly into
    the kernel.
    
    Change-Id: Ia43c622710fde8686c60b836fb8318931d79eb61
    Signed-off-by: Nick Vaccaro <nvaccaro@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35174
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    NickVaccaro authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    9818977 View commit details
    Browse the repository at this point in the history
  6. AUTHORS: Move src/arch/x86 copyrights into AUTHORS file

    As discussed on the mailing list and voted upon, the coreboot project
    is going to move the majority of copyrights out of the headers and into
    an AUTHORS file.  This will happen a bit at a time, as we'll be unifying
    license headers at the same time.
    
    Signed-off-by: Martin Roth <martin@coreboot.org>
    Change-Id: Ifd4329905847d9dd06de67b9a443c8ee50c0e7a7
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35177
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Martin Roth authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    20bbd81 View commit details
    Browse the repository at this point in the history
  7. AUTHORS: Move src/commonlib copyrights into AUTHORS file

    As discussed on the mailing list and voted upon, the coreboot project
    is going to move the majority of copyrights out of the headers and into
    an AUTHORS file.  This will happen a bit at a time, as we'll be unifying
    license headers at the same time.
    
    Signed-off-by: Martin Roth <martin@coreboot.org>
    Change-Id: I4c9351652d81040cc4e7b85bdd1ba85709a74192
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35178
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Martin Roth authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    0443ac2 View commit details
    Browse the repository at this point in the history
  8. AUTHORS: Move src/console copyrights into AUTHORS file

    As discussed on the mailing list and voted upon, the coreboot project
    is going to move the majority of copyrights out of the headers and into
    an AUTHORS file.  This will happen a bit at a time, as we'll be unifying
    license headers at the same time.
    
    Signed-off-by: Martin Roth <martin@coreboot.org>
    Change-Id: I2f350cc3008b17516b5a42cdf07e28d2da5995e9
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35179
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Martin Roth authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    65244a7 View commit details
    Browse the repository at this point in the history
  9. AUTHORS: Move src/cpu/amd copyrights into AUTHORS file

    As discussed on the mailing list and voted upon, the coreboot project
    is going to move the majority of copyrights out of the headers and into
    an AUTHORS file.  This will happen a bit at a time, as we'll be unifying
    license headers at the same time.
    
    Signed-off-by: Martin Roth <martin@coreboot.org>
    Change-Id: I77275adb7c15b242e319805b8a60b7755fa25db5
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35180
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Martin Roth authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    97ea346 View commit details
    Browse the repository at this point in the history
  10. AUTHORS: Move src/cpu/intel copyrights into AUTHORS file

    As discussed on the mailing list and voted upon, the coreboot project
    is going to move the majority of copyrights out of the headers and into
    an AUTHORS file.  This will happen a bit at a time, as we'll be unifying
    license headers at the same time.
    
    Signed-off-by: Martin Roth <martin@coreboot.org>
    Change-Id: I39f52764dc377c25953ef5dba16982a0b4637cdb
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35181
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: David Guckian
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Martin Roth authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    838d8b0 View commit details
    Browse the repository at this point in the history
  11. AUTHORS: Move src/cpu copyrights into AUTHORS file

    As discussed on the mailing list and voted upon, the coreboot project
    is going to move the majority of copyrights out of the headers and into
    an AUTHORS file.  This will happen a bit at a time, as we'll be unifying
    license headers at the same time.
    
    Signed-off-by: Martin Roth <martin@coreboot.org>
    Change-Id: Id6070fb586896653a1e44951a6af8f42f93b5a7b
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35184
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Martin Roth authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    d57ace2 View commit details
    Browse the repository at this point in the history
  12. Add .editorconfig file

    .editorconfig files are widely supported and offer basic configuration
     options for the project.
    
    This sets the indention style, line-ending, character set,  tells the
    editor to make sure there's a newline at the end of the file and to
    strip trailing whitespace.
    
    For directories within the coreboot directory that would prefer a
    different setting, additional  .editorconfig files can be placed in
    those directories to override any of these settings.
    
    See the EditorConfig website for more information.
    https://web.archive.org/web/https://editorconfig.org
    
    Change-Id: Iecf1c5450edb0db533569189aa45233b91997870
    Signed-off-by: Martin Roth <martin@coreboot.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35185
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Martin Roth authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    4e09ebe View commit details
    Browse the repository at this point in the history
  13. crossgcc: Upgrade CMake to 3.15.3

    Changes: https://cmake.org/cmake/help/v3.15/release/3.15.html
    
    Change-Id: Id3283b4a091a5a8afd76235059636bba1c238f0f
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/34895
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    ElyesH authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    9890bd9 View commit details
    Browse the repository at this point in the history
  14. mediatek/mt8183: Add new option for eMCP DDR

    Devices using eMCP may run at a high DRAM frequency (e.g., 3600Mbs)
    while those with discrete DRAM can only run at 3200Mbps. A new option
    MT8183_DRAM_EMCP is added to Kconfig for a mainboard to select,
    depending on whether it supports eMCP or not.
    
    BUG=b:80501386
    BRANCH=none
    TEST=Boots correctly on Kukui
    
    Change-Id: I9b73c8b512db5104896ea0d330d56e63eb50a44b
    Signed-off-by: Huayang Duan <huayang.duan@mediatek.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/34989
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Hung-Te Lin <hungte@chromium.org>
    Huayang Duan authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    8e71ca0 View commit details
    Browse the repository at this point in the history
  15. mb/google/kukui: Enable MT8183_DRAM_EMCP

    MT8183_DRAM_EMCP is enabled for devices using eMCP to run at a high DRAM
    frequency (e.g., 3600Mbps).
    
    BUG=b:80501386
    BRANCH=none
    TEST=Memory test passes on EMCP platform
    
    Change-Id: Icf875427347418f796cbf193070bf047844d2267
    Signed-off-by: Huayang Duan <huayang.duan@mediatek.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/34433
    Reviewed-by: Hung-Te Lin <hungte@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Huayang Duan authored and pgeorgi committed Sep 10, 2019
    Copy the full SHA
    98e338e View commit details
    Browse the repository at this point in the history

Commits on Sep 11, 2019

  1. timestamps: Improve collection for ENV_ROMSTAGE_OR_BEFORE

    Keep track of the active timestamp table location using
    a CAR_GLOBAL variable. Done this way, the entire table
    can be located outside _car_relocatable_data and we only
    switch the pointer to CBMEM and copy the data before
    CAR gets torn down.
    
    Fix comments about requirements of timestamp_init() usage.
    
    Remove timestamp_cache from postcar and ramstage, as CBMEM
    is available early on.
    
    Change-Id: I87370f62db23318069b6fd56ba0d1171d619cb8a
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35032
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki committed Sep 11, 2019
    Copy the full SHA
    3dd23a5 View commit details
    Browse the repository at this point in the history
  2. arch/x86: Move ehci_dbg_info outside _car_relocatable_data

    As code already used CBMEM hooks to switch from CAR to CBMEM
    it was never necessary to have the structure declared inside
    _car_relocatable_data.
    
    Switch to use car_[get|set]_ptr is mostly for consistency, but
    should also enable use of usbdebug with FSP1.0 romstage.
    
    Change-Id: I636251085d84e52a71a1d5d27d795bb94a07422d
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35288
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    kmalkki committed Sep 11, 2019
    Copy the full SHA
    3de9d77 View commit details
    Browse the repository at this point in the history
  3. arch/x86: Drop _car_relocatable_data symbols

    These have become aliases to _car_global_[start|end].
    
    Change-Id: Ibdcaaafdc0e4c6df4a795474903768230d41680d
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35033
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    kmalkki committed Sep 11, 2019
    Copy the full SHA
    1095bfa View commit details
    Browse the repository at this point in the history
  4. arch/x86: Restrict use of _car_global[start|end]

    Restrict the use of symbol names _car_global_[start|end]
    to be used exclusively with CAR_GLOBAL_MIGRATION=y.
    They just alias the start and end of .bss section in CAR.
    
    Change-Id: I36c858a4f181516d4c61f9fd1d5005c7d2c06057
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35034
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    kmalkki committed Sep 11, 2019
    Copy the full SHA
    910490f View commit details
    Browse the repository at this point in the history
  5. soc/intel/common/block/cse: Move me_read_config32() to common code

    me_read_config32() is defined in multiple places, move it to common
    location. Also, this function is usually used for reading HFSTS
    registers, hence move the HFSTS register definitions to common location.
    
    Also add a funtion to check if the CSE device has been enabled in the
    devicetree and it is visible on the bus. This API can be used by
    the caller to check before initiating any HECI communication.
    
    TEST=Verified reading HFSTS registers on CML RVP & Hatch board
    
    Change-Id: Icdbfb6b30a007d469b5e018a313c14586addb130
    Signed-off-by: Sridhar Siricilla <sridhar.siricilla@intel.com>
    Signed-off-by: Rizwan Qureshi <rizwan.qureshi@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35225
    Reviewed-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-by: Aamir Bohra <aamir.bohra@intel.com>
    Reviewed-by: V Sowmya <v.sowmya@intel.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    sridharisiricilla authored and subrata-b committed Sep 11, 2019
    Copy the full SHA
    2cc6691 View commit details
    Browse the repository at this point in the history
  6. emulation/qemu-i440fx/northbridge.c: Fix minor whitespace

    Change-Id: Ifc3825119c8463a7d17a5c162330f49612ae1b85
    Signed-off-by: Himanshu Sahdev <himanshusah@hcl.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35311
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Martin Roth <martinroth@google.com>
    Himanshu Sahdev authored and pgeorgi committed Sep 11, 2019
    Copy the full SHA
    660ff20 View commit details
    Browse the repository at this point in the history
  7. superio/common: fix regression in ssdt

    ITR2 is specified twice here, which leads to the following error message
    in Linux:
    [    0.263591] ACPI BIOS Error (bug): Failure creating named object
    [\_SB.PCI0.LPCB.SIO0.ITR2], AE_ALREADY_EXISTS (20190509/dsfield-633)
    
    Add comments and fix duplicated field.
    As there are no users of this code yet, just rename the fields.
    
    Tested on Supermicro X11SSH-TF.
    
    Change-Id: I4f3307d0992fcf5ad192f412c2bd15d02572a6b0
    Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35294
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    c0d3z3r0 authored and felixheld committed Sep 11, 2019
    Copy the full SHA
    5403a8e View commit details
    Browse the repository at this point in the history
  8. mb/google/drallion: enable Elan and Melfas touch panel

    Drallion uses the same touch panel as Sarien. Copy the deivce
    from Sarien.
    
    BUG=b:140415892,b:138082886
    BRANCH=N/A
    TEST=N/A
    
    Signed-off-by: Eric Lai <ericr_lai@compal.corp-partner.google.com>
    Change-Id: I8e6d2dcf4bd2ed2325137a05811af03692d40342
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35305
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    EricRLai authored and pgeorgi committed Sep 11, 2019
    Copy the full SHA
    3f19e1d View commit details
    Browse the repository at this point in the history
  9. mb/google/hatch: Create dratini variant

    Create dratini variant
    
    BUG=b:140610519
    TEST=emerge-hatch coreboot, and boot into chromeos on proto board
    
    Change-Id: Ied1240d1be831568e4ab4695b893c3f48821f68b
    Signed-off-by: Wisley Chen <wisley.chen@quantatw.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35285
    Reviewed-by: Paul Fagerburg <pfagerburg@chromium.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    WisleyChen authored and pgeorgi committed Sep 11, 2019
    Copy the full SHA
    ded3f90 View commit details
    Browse the repository at this point in the history
  10. src: Remove unneeded include <arch/interrupt.h>

    Change-Id: I3323d25b72dab2f9bc8a575ba41faf059ee1ffc4
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/34933
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    ElyesH authored and pgeorgi committed Sep 11, 2019
    Copy the full SHA
    d249657 View commit details
    Browse the repository at this point in the history
  11. arch/x86: Cache the TSEG region at the top of ram

    This patch adds new API for enabling caching for the TSEG region
    and setting up required MTRR for next stage.
    
    BUG=b:140008206
    TEST=Build and boot CML-Hatch.
    
    Change-Id: I59432c02e04af1b931d77de3f6652b0327ca82bb
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/34995
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    subrata-b authored and pgeorgi committed Sep 11, 2019
    Copy the full SHA
    8edc6dc View commit details
    Browse the repository at this point in the history
  12. intel/fsp2_0: Add help text for FSP_TEMP_RAM_SIZE Kconfig

    For CML & ICL, FSP requires at least heap = 0x10000 and stack = 0x20000.
    Refer to FSP integration guide to know the exact FSP requirement.
    
    BUG=b:140268415
    TEST=Build and boot CML-Hatch and ICL.
    
    Change-Id: Ic1463181b4a9dca136d00cb2f7e3cce4f7e57bd6
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35301
    Reviewed-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    subrata-b authored and pgeorgi committed Sep 11, 2019
    Copy the full SHA
    1d260e6 View commit details
    Browse the repository at this point in the history
  13. futility: Use HOSTPKGCONFIG for host PKG_CONFIG

    futility is built for the host. However, when cross-compiling,
    the target's pkg-config is called to get the library paths which
    can add paths from the cross-compilation tree instead of host.
    e.g. /build/elm/usr/bin/pkg-config gets called instead of /usr/bin/pkg-config
    . /build/elm/usr/bin/pkg-config adds the paths specific to the
    cross-compilation target e.g. /build/elm/usr/lib instead of /usr/lib.
    
    This causes linker to complain that files in library paths do not
    match the architecture. BFD produces a warning while LLD errors out.
    
    Fix this by passing PKG_CONFIG from host when building futility.
    
    BUG=chromium:999217
    TEST=coreboot builds
    BRANCH=None
    
    Cq-Depend: chromium:1778519
    Change-Id: Id3afbf25001cf3daa72f36a290c93136cf9f162d
    Signed-off-by: Patrick Georgi <pgeorgi@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35316
    Reviewed-by: Julius Werner <jwerner@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    m-gupta authored and pgeorgi committed Sep 11, 2019
    Copy the full SHA
    297e9c8 View commit details
    Browse the repository at this point in the history
  14. Revert "security/tpm/tss/tcg-2.0: Add multi digits support to tlcl_ex…

    …tend()"
    
    This reverts commit fdb9805.
    
    CB:33252 wasn't reviewed by a TPM maintainer and breaks abstraction
    layers (pulling TSS-details into TSPI, completely changing
    interpretation of the arguments to tlcl_extend() based on TSS version).
    It's also not clear why it was implemented the way it was (should have
    been much easier and cleaner ways to achieve the same thing).
    
    Since the author is not reacting, let's revert it for now. It can be
    cleaned up and resubmitted later. (Not reverting the header changes
    since those are not objectionable, and there are later patches dependent
    on it.)
    
    Change-Id: Ice44f55c75a0acc07794fe41c757a7bca75406eb
    Signed-off-by: Julius Werner <jwerner@chromium.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35351
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Philipp Deppenwiese <zaolin.daisuki@gmail.com>
    jwerner-chromium authored and zaolin committed Sep 11, 2019
    Copy the full SHA
    b3426c0 View commit details
    Browse the repository at this point in the history

Commits on Sep 12, 2019

  1. soc/{amd, intel}: Make use of common postcar_enable_tseg_cache() API

    This patch removes dedicated function call to make TSEG region cache
    from soc and refers to postcar_enable_tseg_cache().
    
    BUG=b:140008206
    
    Change-Id: I18a032b43a2093c8ae86735c119d8dfee40570b1
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35025
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    subrata-b committed Sep 12, 2019
    Copy the full SHA
    3eff037 View commit details
    Browse the repository at this point in the history
  2. soc/intel/{cnl, icl}: Cache the TSEG region

    This patch helps to save additional ~19ms of booting time in
    normal boot and s3 resume on CML-hatch.
    
    BUG=b:140008206
    TEST=Verified normal boot time on CML-Hatch with latest coreboot
    
    Without this CL:
    Total Time: 929ms
    
    With this CL: (TSEG marked as WB)
    Total Time: 910ms
    
    For test marked TSEG as WP/WC:
    Total Time: ~920ms
    
    Change-Id: Ie92d2c9e50fa299db1cd8c57a6047ea3adaf1452
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35026
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    subrata-b committed Sep 12, 2019
    Copy the full SHA
    0e3c245 View commit details
    Browse the repository at this point in the history