Commits on Nov 7, 2019

  1. mb/google/hatch/variants/helios: Modify touchscreen power on sequence

    The previous values do not affect the touchscreen function.  But, the
    previous values cause the power leakage in S0ix.
    
    from b/142368161:
    
    1. Modify GPP_D: The specification define T1 >= 10ms. We change it to
       12ms for a safety and low impact value in our mind.  Enable pin as
       GPP_D9 is define to be AVDD in specification. Set it to 10ms to
       make it to be the final one to pull low during power off sequence .
    
    2. Add GPP_C4: If we set stop_off_delay_ms to be 1.  The true T4 we
       got will be 300us . Set stop_off_delay_ms to be 2 . True T4 will be
       500us . So we change it to 5 to be a low impact value in our mind
       according to the true T4 value we got .
    
    BUG=b:142368161
    BRANCH=Master
    TEST=emerge-hatch coreboot chromeos-bootimage
         ./util/abuild/abuild -p none -t google/hatch -x -a
    
    Signed-off-by: YenLu Chen <kane_chen@pegatron.corp-partner.google.com>
    Change-Id: I86c920ff1d5c0b510adde8a37f60003072d5f4e7
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35907
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: Shelley Chen <shchen@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    PegaKaneChen authored and Shelley Chen committed Nov 7, 2019
    Copy the full SHA
    46b125a View commit details
    Browse the repository at this point in the history
  2. mainboard/google: Allow Hatch variants to read SPD data over SMBus

    All Hatch variants so far embed static SPD data encoded within the
    firmware image. However we wish the flexibility for romstage
    implementations that allow for reading the SPD data dynamically over
    SMBus. This romstage variant allows for reading the SPD data over
    SMBus.
    
    V.2: Dispence with memcpy().
    V.3: Revert back to previous patch with memcpy().
    V.4: Rewrite again to avoid memcpy().
    
    BRANCH=none
    BUG=b:143134702
    TEST=./util/abuild/abuild -p none -t google/hatch -x -a
    
    Change-Id: I3516a46b91840a9f6d1f4cffb2553d939d79cda2
    Signed-off-by: Edward O'Callaghan <quasisec@chromium.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36449
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Edward O'Callaghan authored and furquan-goog committed Nov 7, 2019
    Copy the full SHA
    881f9cb View commit details
    Browse the repository at this point in the history
  3. hatch: Create puff variant

    Includes:
     - gpio mappings,
     - overridetree.cb,
     - kconfig adjustments for reading spd over smbus.
    
    V.2: Rework devicetree with comments and drop some useless gpio maps.
    
    BUG=b:141658115
    TEST=./util/abuild/abuild -p none -t google/hatch -x -a
    
    Change-Id: I6449c4fcc1df702ed4f0d35afd7b0981e4c72323
    Signed-off-by: Edward O'Callaghan <quasisec@chromium.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36452
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Edward O'Callaghan authored and furquan-goog committed Nov 7, 2019
    Copy the full SHA
    3042af6 View commit details
    Browse the repository at this point in the history
  4. Rangeley: Fix incorrect BCLK

    Not all Rangeley SKUs have a fixed 100MHz BCLK.
    
    As per BIOS Writer's Guide, BCLK is available in MSR_FSB_FREQ 0xCD[1:0].
    Using fixed BCLK was causing wrong values of core frequencies in _PSS table
    for SKUs that do not have BCLK=100MHz.
    
    Change-Id: Id8e0244fab0283b74870950cb00a95aab2a7201f
    Signed-off-by: Hannah Williams <hannah.williams@dell.com>
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/35348
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki authored and pgeorgi committed Nov 7, 2019
    Copy the full SHA
    32c8de1 View commit details
    Browse the repository at this point in the history
  5. lib/cbfs: Add fallback to RO region to cbfs_boot_locate

    With this change cbfs_boot_locate will check the RO (COREBOOT) region if
    a file can not be found in the active RW region. By doing so it is not
    required to duplicate static files that are not intended to be updated
    to the RW regions.
    
    The coreboot image can still be updated by adding the file to the RW
    region.
    
    This change is intended to support VBOOT on systems with a small flash
    device.
    
    BUG=N/A
    TEST=tested on facebook fbg1701
    
    Change-Id: I81ceaf927280cef9a3f09621c796c451e9115211
    Signed-off-by: Wim Vervoorn <wvervoorn@eltan.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36545
    Reviewed-by: Frans Hendriks <fhendriks@eltan.com>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    wvervoorn authored and pgeorgi committed Nov 7, 2019
    Copy the full SHA
    114e2e8 View commit details
    Browse the repository at this point in the history
  6. soc/intel/icelake: Refactor pch_early_init() code

    This patch keeps required pch_early_init() function like ABASE programming,
    GPE and RTC init into bootblock and moves remaining functions like
    TCO configuration and SMBUS init into romstage/pch.c in order to maintain
    only required chipset programming for bootblock and verstage.
    
    TEST=Able to build and boot ICL DE system.
    
    Change-Id: I4f0914242c3215f6bf76e41c468f544361a740d8
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36627
    Reviewed-by: Aamir Bohra <aamir.bohra@intel.com>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: Maulik V Vaghela <maulik.v.vaghela@intel.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    subrata-b authored and pgeorgi committed Nov 7, 2019
    Copy the full SHA
    1b1a26a View commit details
    Browse the repository at this point in the history
  7. soc/intel/{apl,dnv,quark}: Use strip_quotes for FSP options

    The commit 8fc523e (drivers/intel/fsp2_0: Use strip_quotes for cbfs
    filenames) breaks the Siemens APL mainboards as FSP-M never returns once
    it is called. The reason for this is that the -b option is missing when
    adding the FSP package to cbfs via cbfstool.
    This patch fixes this issue.
    
    TEST=tested on siemens/mc_apl5
    
    Change-Id: I48e5fa36e1ad799d09714f53a3041f73b8ec3550
    Signed-off-by: Mario Scheithauer <mario.scheithauer@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36645
    Reviewed-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-by: David Guckian
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    mscheithauer authored and pgeorgi committed Nov 7, 2019
    Copy the full SHA
    4e07403 View commit details
    Browse the repository at this point in the history

Commits on Nov 8, 2019

  1. mb/google/hatch/var/akemi: disable unused USB port for Akemi platform

    Akemi platform dosen't support WWAN device and unused USB2 port 3, 4,
    5, 7, 8 and USB3 port 3, 4, 5 so close them.
    
    BUG=None
    TEST=FW_NAME="akemi" emerge-hatch coreboot chromeos-ec
    chromeos-bootimage
    
    Signed-off-by: Peichao.Wang <peichao.wang@bitland.corp-partner.google.com>
    Change-Id: I7eff4da77caea7d4fe46597320be134d34d78a22
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36644
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Peichao Wang authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    07f798d View commit details
    Browse the repository at this point in the history
  2. mb/facebook/fbg1701: Remove some preprocessor guards

    Change-Id: Ia7289fa8337e1a93e620a52a67ca8cbdd78a66bc
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36633
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Wim Vervoorn <wvervoorn@eltan.com>
    Reviewed-by: Frans Hendriks <fhendriks@eltan.com>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    dd227a7 View commit details
    Browse the repository at this point in the history
  3. eltan/security: Remove some preprocessor guards

    We generally let garbage-collection take care of unused functions.
    While at it, move some related variable declarations in to the
    header file and declare them const like they should be.
    
    Change-Id: I7c6fa15bd45f861f13b6123ccb14c55415e42bc7
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36632
    Reviewed-by: Wim Vervoorn <wvervoorn@eltan.com>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    ed8eaab View commit details
    Browse the repository at this point in the history
  4. eltan/security: Replace __BOOTBLOCK__ with ENV_BOOTBLOCK

    Change-Id: I6ec5a33cd6a6342adfe73c050e0c376bbefad96a
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36634
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Wim Vervoorn <wvervoorn@eltan.com>
    Reviewed-by: Frans Hendriks <fhendriks@eltan.com>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    bf43f9e View commit details
    Browse the repository at this point in the history
  5. eltan/security: Replace __PRE_RAM__ with ENV_ROMSTAGE_OR_BEFORE

    Change-Id: Id56a63a67b7eb70dce6687bb9c2734a711f611b3
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36635
    Reviewed-by: Wim Vervoorn <wvervoorn@eltan.com>
    Reviewed-by: Frans Hendriks <fhendriks@eltan.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    c7fa911 View commit details
    Browse the repository at this point in the history
  6. intel/braswell: Remove duplicate set_max_freq() prototypes

    Change-Id: I13ec9f477c64831848fb0e80b97bfbc10896c195
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36640
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Frans Hendriks <fhendriks@eltan.com>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    44f1af2 View commit details
    Browse the repository at this point in the history
  7. arch/x86: Drop some __SMM__ guards

    Change-Id: I64063bbae5b44f1f24566609a7f770c6d5f69fac
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36637
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    82c0e7e View commit details
    Browse the repository at this point in the history
  8. sb,soc/intel: Reduce preprocessor use with ME debugging

    Change-Id: Iedd54730f140b6a7a40834f00d558ed99a345077
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36639
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    c86fc8e View commit details
    Browse the repository at this point in the history
  9. ELOG, soc/intel: Avoid some preprocessor use

    Change-Id: I5378573f37daa4f09db332023027deda677c7aeb
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36646
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    056fbe4 View commit details
    Browse the repository at this point in the history
  10. google/parrot: Remove ELOG_GSMI from EC

    EC_HOST_EVENT_xxx are only defined with ec/chromeec.
    
    Change-Id: Idf7b04edc3fce147f7857691ce7d6a0ce03f43fe
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36649
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    kmalkki authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    254933f View commit details
    Browse the repository at this point in the history
  11. configs/config.facebook_fbg1701: Add config file

    Enable vendorcode measured and verified boot.
    Use VBOOT test key for VENDORCODE_ELTAN_VBOOT_KEY_FILE
    
    BUG=N/A
    TEST=booting Embedded Linux 4.20 kernel on Facebook FBG1701
    
    Change-Id: Ia2cb3bb873b2d5e7e9031e5b249d86605d8e0945
    Signed-off-by: Frans Hendriks <fhendriks@eltan.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/34343
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Georgi <pgeorgi@google.com>
    FransHendriks authored and pgeorgi committed Nov 8, 2019
    Copy the full SHA
    76ffa88 View commit details
    Browse the repository at this point in the history
  12. google/stout: Remove ELOG_GSMI from EC

    EC_HOST_EVENT_xxx are only defined with ec/chromeec.
    
    Change-Id: Ie0a1349ab460142dc2744155a422b5ee22528e4c
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36663
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    kmalkki committed Nov 8, 2019
    Copy the full SHA
    f307ffb View commit details
    Browse the repository at this point in the history

Commits on Nov 9, 2019

  1. soc/intel/tigerlake/bootblock: Do initial SoC commit till bootblock

    Clone entirely from Icelake
    
    List of changes on top off initial icelake clone
    1. Replace "Icelake" with "Tigerlake"
    2. Replace "icl" with "tgl"
    3. Replace "icp" with "tgp"
    4. Rename structure based on Icelake with Tigerlake
    5. Add CPU/PCH/SA EDS document number and chapter number
    6. Add required headers into include/soc/ from ICL directory
    
    Tiger Lake specific changes will follow in subsequent patches.
    1. Add Tigerlake specific device IDs (CPU/PCH/SA)
    
    Change-Id: Id7a05f4b183028550d805f02a8078ab69862a62e
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36550
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Maulik V Vaghela <maulik.v.vaghela@intel.com>
    subrata-b committed Nov 9, 2019
    Copy the full SHA
    930c31c View commit details
    Browse the repository at this point in the history
  2. soc/intel/tigerlake/romstage: Do initial SoC commit till romstage

    Clone entirely from Icelake
    
    List of changes on top off initial icelake clone
    1. Replace "Icelake" with "Tigerlake"
    2. Replace "icl" with "tgl"
    3. Replace "icp" with "tgp"
    4. Rename structure based on Icelake with Tigerlake
    5. Remove and clean below files
       5.a Clean up upd override in fsp_params.c,
    	will be added once FSP available.
       5.b Remove __weak functions from fsp_params.c
    6. Add CPU/PCH/SA EDS document number and chapter number
    7. Add required headers into include/soc/ from ICL directory
    
    Change-Id: I24980c196efb2c5569996ca4fb315c256cf9de87
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36552
    Reviewed-by: Maulik V Vaghela <maulik.v.vaghela@intel.com>
    Reviewed-by: Ronak Kanabar <ronak.kanabar@intel.com>
    Reviewed-by: Rizwan Qureshi <rizwan.qureshi@intel.com>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    subrata-b committed Nov 9, 2019
    Copy the full SHA
    baf6d6e View commit details
    Browse the repository at this point in the history
  3. soc/intel/tigerlake: Do initial SoC commit till ramstage

    Clone entirely from Icelake
    
    List of changes on top off initial icelake clone
    1. Replace "Icelake" with "Tigerlake"
    2. Replace "icl" with "tgl"
    3. Replace "icp" with "tgp"
    4. Rename structure based on Icelake with Tigerlake
    5. Remove and clean below files
       5.a Clean up upd override in fsp_params.c,
    	will be added once FSP available.
       5.b Remove __weak functions from fsp_params.c
       5.c Remove dGPU over PCIE enable Kconfig option
    6. Add CPU/PCH/SA EDS document number and chapter number
    7. Remove unnecessary headers from .c files based on review
    
    Tiger Lake specific changes will follow in subsequent patches.
    1. Include GPIO controller delta over ICL
    2. FSP-S related UPD overrides as applicable
    
    Change-Id: Id95e2fa9b7a7c6b3b9233d2c438b25a6c4904bbb
    Signed-off-by: Ravi Sarawadi <ravishankar.sarawadi@intel.com>
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36087
    Reviewed-by: Maulik V Vaghela <maulik.v.vaghela@intel.com>
    Reviewed-by: Ronak Kanabar <ronak.kanabar@intel.com>
    Reviewed-by: Rizwan Qureshi <rizwan.qureshi@intel.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    subrata-b committed Nov 9, 2019
    Copy the full SHA
    91e89c5 View commit details
    Browse the repository at this point in the history
  4. soc/intel/tigerlake/acpi: Copy acpi directory from icelake

    Clone entirely from Icelake
    
    List of changes on top off initial icelake clone
    1. Removed Descriptor Name for Memory mapped SPI flash and
    local APIC in northbridge.asl
    2. Rearranged code in gpio.asl to move RBUF object under _CRS
    and made the file use ASL2.0 syntax.
    3. Make use of absolute path for scs.asl
    4. Remove unused smbus.asl
    5. Rearranged code in nothbridge.asl to move MCRS object under _CRS,
    use absolute variable path and added TODO for further clean up.
    6. Refer absolute variable path in scs.asl
    
    Change-Id: If967cb5904f543ce21eb6e89421df0e5673d2238
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36553
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Duncan Laurie <dlaurie@chromium.org>
    subrata-b committed Nov 9, 2019
    Copy the full SHA
    b8df689 View commit details
    Browse the repository at this point in the history
  5. mb/asus/p5ql-em: Add mainboard

    Tested, working:
    - First dimm slot of each channel
    - USB, SATA
    - CPU FSB at 800, 1067 and 1333MHz
    - Libgfxinit on DVI and VGA slot
    - PCI slot
    - Realtek NIC (configure MAC address in Kconfig)
    - PEG slot
    - PS2 keyboard
    
    Tested, not working:
    - second dimm slot for each channel. Those are hooked up to the second
      rank of the channel, instead of rank 3 and 4. The raminit does not
      support such setups.
    
    Untested:
    - PCIe x1 slot, likely works fine
    - HDMI
    
    Tested using SeaBIOS 1.12, Linux 4.19.
    
    Change-Id: I88fe9c66dae079cd7eedcc9736c5922defbc0e5a
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/31323
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    ArthurHeymans committed Nov 9, 2019
    Copy the full SHA
    7e4bfe4 View commit details
    Browse the repository at this point in the history
  6. ELOG: Introduce elog_gsmi variants

    This avoids a lot of if (CONFIG(ELOG_GSMI)) boilerplate.
    
    Change-Id: I87d25c820daedeb33b3b474a6632a89ea80b0867
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36647
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki committed Nov 9, 2019
    Copy the full SHA
    9dd1a12 View commit details
    Browse the repository at this point in the history
  7. ELOG: Avoid some preprocessor use

    Change-Id: I8daf8868af2e8c2b07b0dda0eeaf863f2f550c59
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36648
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki committed Nov 9, 2019
    Copy the full SHA
    be5317f View commit details
    Browse the repository at this point in the history
  8. arch/x86: Replace some __SMM__ guards

    We generally do not guard source in attempts to reduce
    the final object sizes, but rely on garbage collection.
    
    Most of the __unused attributes inserted here will be
    removed when remaining __SIMPLE_DEVICE__ guards can
    be removed.
    
    Change-Id: I2440931fab4f41d7e8249c082e6c9b5a9cd0ef13
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36641
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    kmalkki committed Nov 9, 2019
    Copy the full SHA
    21d6a27 View commit details
    Browse the repository at this point in the history
  9. Kconfig: Remove untrue comment

    In the vast majority of cases the bootdevice is the bottleneck and
    compression increases bootspeed.
    
    Change-Id: Id0c11cf6d9a605d24e3148abb8d11a65d48a4529
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36675
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    ArthurHeymans authored and i-c-o-n committed Nov 9, 2019
    Copy the full SHA
    7f22933 View commit details
    Browse the repository at this point in the history

Commits on Nov 10, 2019

  1. arch/riscv: Pass cbmem_top to ramstage via calling argument

    Tested on the Qemu-Virt target both 32 and 64 bit.
    
    Change-Id: I5c74cd5d3ee292931c5bbd2e4075f88381429f72
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36558
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    55069d1 View commit details
    Browse the repository at this point in the history
  2. lib/Kconfig: Remove RAMSTAGE_CBMEM_TOP_ARG

    All targets now have the _cbmem_top_ptr symbol populated via calling
    arguments or in the nvidia/tegra210 case worked around by populating
    it with cbmem_top_chipset explicitly at the start of ramstage, so the
    Kconfig guarding this behavior can be removed.
    
    Change-Id: Ie7467629e58700e4d29f6e735840c22ed687f880
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36422
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Reviewed-by: Michael Niewöhner
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    c4c5d85 View commit details
    Browse the repository at this point in the history
  3. soc/intel/common/sa: Remove EBDA dependency

    Saving cbmem_top across stages is not needed anymore so EBDA should
    not be used. The guard to cbmem_top_chipset implementation was
    inappropriate.
    
    Change-Id: Ibbb3534b88de4f7b6fc39675a77461265605e56e
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36614
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Michael Niewöhner
    ArthurHeymans committed Nov 10, 2019
    Copy the full SHA
    cf5af24 View commit details
    Browse the repository at this point in the history
  4. soc/intel/common/ebda: Drop code

    There is no need to use EBDA to pass cbmem_top from romstage to
    later stages.
    
    Change-Id: I46e2459ff3c785f530cabc5930004ef920ffc89a
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36362
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Michael Niewöhner
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    ArthurHeymans committed Nov 10, 2019
    Copy the full SHA
    005e25d View commit details
    Browse the repository at this point in the history
  5. arch/x86: Remove EARLY_EBDA_INIT support

    This is unused now.
    
    Change-Id: Ie8bc1d6761d66c5e1dda40c34c940cdba90646d2
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36363
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Michael Niewöhner
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    ArthurHeymans committed Nov 10, 2019
    Copy the full SHA
    8b7cd43 View commit details
    Browse the repository at this point in the history
  6. lib/cbmem: Remove the cbmem_top_init() hook

    This hook is unused and with the need for initializing storage to
    share cbmem_top over other stages gone, there is likely no future
    need for this.
    
    Change-Id: I4ba9daea61b6d7b8949bbd2c4fb71d0a0fa20d93
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36369
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Reviewed-by: Michael Niewöhner
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    ArthurHeymans committed Nov 10, 2019
    Copy the full SHA
    1c54bc4 View commit details
    Browse the repository at this point in the history
  7. sb/intel/common: Make linking rtc.c conditional

    Change-Id: I7321da453c0d9bb4a142c3c93103d8dc0ff416b7
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/33201
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    074730c View commit details
    Browse the repository at this point in the history
  8. sb/intel/common: Make COMMON_RESET optional

    Change-Id: Id706919835100903dd4ebac2bbd2f3a44c2b6b60
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36003
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Rudolph <siro@das-labor.org>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    23a6c79 View commit details
    Browse the repository at this point in the history
  9. sb/intel/common: Remove the SOUTHBRIDGE_INTEL_COMMON Kconfig symbol

    All code in southbridge/intel/common is now properly guarded by a
    Kconfig symbol, making SOUTHBRIDGE_INTEL_COMMON obsolete.
    
    Change-Id: Ifeccfaa9534f903e3f3543e1f9f3d5f3345b461e
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36438
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    1d4bdda View commit details
    Browse the repository at this point in the history
  10. soc/intel/broadwell: Use common SB RTC code

    Change-Id: Iedb9a8962ac1b4107e9192b0be610fb92d2cfdc6
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/33202
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    2abbe46 View commit details
    Browse the repository at this point in the history
  11. soc/intel/broadwell: Use common INTEL_SB SPI code

    Change-Id: Id906733ac3719c8d6835aad52ca87beb81b5771d
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/33203
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    95755dd View commit details
    Browse the repository at this point in the history
  12. soc/intel/broadwell: Don't reinitialize SPI after lockdown

    With the common southbridge SPI code reinitialization after lockdown
    is not necessary, hence the SMM finalize call becomes a no-op.
    
    Change-Id: I4d7c6ba91dc9f0e0ce4e3228fdf859d5f3d5abf4
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36004
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    5efee3a View commit details
    Browse the repository at this point in the history
  13. soc/intel/broadwell: Use common sb code for SPI lockdown configuration

    Change-Id: I5a8239f4e9e1f9728074ff5452c95d3138965d82
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36005
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    3c1e986 View commit details
    Browse the repository at this point in the history
  14. soc/intel/braswell: Update microcode before FSP

    The google FSP Braswell version has broken microcode update code and
    FSP checks at some point if the installed microcode version is non
    zero, so coreboot has to update it before calling FSP-T.
    
    This is fixed with newer FSP releases by Intel, but doing updates in
    coreboot won't hurt.
    
    Tested with both Intel FSP and google FSP.
    
    Change-Id: I3e81329854e823dc66fec191adbed617bb37d649
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36198
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    8256ca0 View commit details
    Browse the repository at this point in the history
  15. drivers/intel/fsp1_1: Fake microcode update to make FSP happy

    The FSP loops through microcode updates and at the end checks if
    the microcode revision is not zero. Since we update the microcode
    before loading FSP, this is the case and a fake microcode can be
    passed to the FSP.
    
    The advantage is that the Kconfig symbols to specify the location and
    the size of the microcode blob can be dropped.
    
    Change-Id: I63cfb7b19e9795da85566733fb4c1ff989e85d03
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36255
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans authored and i-c-o-n committed Nov 10, 2019
    Copy the full SHA
    12440ce View commit details
    Browse the repository at this point in the history

Commits on Nov 11, 2019

  1. Documentation: Add some significant 4.11 release notes

    Change-Id: Ia881cfa9382d0b2fa2652696b912030af942b68a
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36625
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    PatrickRudolph authored and pgeorgi committed Nov 11, 2019
    Copy the full SHA
    1b95501 View commit details
    Browse the repository at this point in the history
  2. libpayload: usbmsc: update return value of CSW transfer

    When the first CSW transfer failed, get_csw function will retry
    CSW transfer again, but the return value is not updated.
    
    Change-Id: I289916baa08d0a189d659164a0002347f6f435db
    Signed-off-by: Changqi Hu <changqi.hu@mediatek.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36678
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Hung-Te Lin <hungte@chromium.org>
    Reviewed-by: Julius Werner <jwerner@chromium.org>
    Changqi Hu authored and pgeorgi committed Nov 11, 2019
    Copy the full SHA
    bc2f9a3 View commit details
    Browse the repository at this point in the history
  3. include/device: add pci mmio cfg address helpers

    Add helpers for getting the pci mmio cfg address for a register.
    
    Change-Id: Ie6fe22cacc7241a51d47cbe9fc64f30fa49d5a80
    Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36686
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    c0d3z3r0 authored and pgeorgi committed Nov 11, 2019
    Copy the full SHA
    8f22136 View commit details
    Browse the repository at this point in the history
  4. soc/intel/common: pmclib: add API to get ETR register address

    Add a new API to get the ETR register address.
    
    Change-Id: I706f3e220d639a6133625e3cb7267f7009006af2
    Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36565
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    c0d3z3r0 authored and pgeorgi committed Nov 11, 2019
    Copy the full SHA
    2855209 View commit details
    Browse the repository at this point in the history
  5. soc/intel/apollolake: add soc implementation for ETR address API

    Add soc implementation for the new ETR address API.
    
    Change-Id: I1832f5f14055fc3dbb502289035130ca7a5d6d33
    Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36566
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    c0d3z3r0 authored and pgeorgi committed Nov 11, 2019
    Copy the full SHA
    b4d960b View commit details
    Browse the repository at this point in the history
  6. soc/intel/cannonlake: add soc implementation for ETR address API

    Add soc implementation for the new ETR address API.
    
    Change-Id: Ifc128099185a2c40ec3e7c5f84fcc42227c93f28
    Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36567
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    c0d3z3r0 authored and pgeorgi committed Nov 11, 2019
    Copy the full SHA
    93d215c View commit details
    Browse the repository at this point in the history
  7. soc/intel/icelake: add soc implementation for ETR address API

    Add soc implementation for the new ETR address API.
    
    Change-Id: I8383a60c2c4988948ab8b3e9a54330269d217868
    Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/36568
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    c0d3z3r0 authored and pgeorgi committed Nov 11, 2019
    Copy the full SHA
    e919390 View commit details
    Browse the repository at this point in the history