Commits on Mar 29, 2021

  1. soc/amd/*/gpio: include types.h instead of stdint.h to have size_t

    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I7a747d4c28e6d449c054ce83966767e13b51a939
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51782
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    51d6f5c View commit details
    Browse the repository at this point in the history
  2. soc/amd: move PM_RST_CTRL1 register definition to common acpimmio header

    TEST=Verified that this register and the defined bits exist in Cezanne,
    Picasso, Stoneyridge, Bolton and SB800.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I32d1d577b05edab006981516a5aefd822e7b984a
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51783
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    c1042ba View commit details
    Browse the repository at this point in the history
  3. soc/amd/common/block/acpimmio/mmio_util: add fch_disable_kb_rst

    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Suggested-by: Kangheui Won <khwon@chromium.org>
    Change-Id: Ie65e39ffb8c353415f5b68e1e0f378d18eeb7498
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51784
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    f4e90e8 View commit details
    Browse the repository at this point in the history
  4. soc/amd/cezanne: Implement PROVIDES_ROM_SHARING

    BUG=none
    TEST=Build guybrush and verified with the PPR that the register and bits
    are still the same
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I0619f84cf82cbb90ded9dfd58afa6acc9520fb8e
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51780
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Raul E Rangel authored and felixheld committed Mar 29, 2021
    Copy the full SHA
    95b3dc3 View commit details
    Browse the repository at this point in the history
  5. mb/google/guybrush: Enable DISABLE_SPI_FLASH_ROM_SHARING

    Guybrush uses GPIO67 as an input.
    
    BUG=none
    TEST=Boot guybrush
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I10068bb6870b2cb96033cf3893cde71db5c1d709
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51781
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Raul E Rangel authored and felixheld committed Mar 29, 2021
    Copy the full SHA
    2c62df2 View commit details
    Browse the repository at this point in the history
  6. soc/amd: add DISABLE_KEYBOARD_RESET_PIN option

    The KBRST_L pin will cause a reset when driven or pulled low even when
    the GPIO mux is set to GPIO and not native function. So when you want to
    use that pin as general purpose output the keyboard reset input
    functionality needs to be disabled by selecting this option in the
    board's Kconfig file to avoid causing a reset by writing a 0 to the
    output level bit when it's configured as an output.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Suggested-by: Furquan Shaikh <furquan@google.com>
    Change-Id: I517ad551db9321f26afdba15d97ddb61be1f7d51
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51757
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: Kangheui Won <khwon@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    27b295b View commit details
    Browse the repository at this point in the history
  7. mb/google/guybrush: select DISABLE_KEYBOARD_RESET_PIN

    Now that we have the DISABLE_KEYBOARD_RESET_PIN Kconfig option, select
    it and remove the temporary workaround that was implemented in the
    mainboard code in commit 39ef890.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I634d11290dad8c93f10979f06243b1bf84737ae2
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51785
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    a228279 View commit details
    Browse the repository at this point in the history
  8. soc/amd/cezanne,picasso: rename fsp_params.c to fsp_s_params.c

    This file populates the UPD-S data structure that gets passed to the
    FSP-S, so add that s part to make it a bit clearer which FSP parameters
    it'll set up. This is also a preparation to add a fsp_m_params.c file in
    the following patches.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I53786df0909055e66eac675b5580909b7960944f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51833
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    793f371 View commit details
    Browse the repository at this point in the history
  9. soc/amd/picasso: factor out UPD-M configuration from romstage

    Move the parts of romstage.c that populate the UPD-M data structure to
    the newly created fsp_m_params.c file. Since
    platform_fsp_memory_init_params_cb gets called from the FSP driver and
    not directly from car_stage_entry the two code parts in romstage.c
    weren't directly interacting. Since soc/romstage.h only contains the
    mainboard_updm_update function prototype, rename it to soc/fsp.h. This
    patch also removes a few unused includes.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I52c21f13520dbdfab37587d17b3a8a3b1a780f36
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51834
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    dd73714 View commit details
    Browse the repository at this point in the history
  10. soc/amd/cezanne: factor out UPD-M configuration from romstage

    Move the parts of romstage.c that populate the UPD-M data structure to
    the newly created fsp_m_params.c file. Since
    platform_fsp_memory_init_params_cb gets called from the FSP driver and
    not directly from car_stage_entry the two code parts in romstage.c
    weren't directly interacting.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I1f7f5879ac318372042ff703ebbe584ce1c32c91
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51835
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    felixheld committed Mar 29, 2021
    Copy the full SHA
    2421de6 View commit details
    Browse the repository at this point in the history
  11. mb/amd: majolica,mandolin: Remove needless article from warning

    At the end of the built, the line below is printed.
    
        coreboot has been built without an the Microchip EC FW.
    
    Remove *an*, as one article is enough.
    
    Change-Id: I28b24f0f2dade17e30e16cc6d935976e331a7a97
    Signed-off-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51842
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    paulmenzel authored and felixheld committed Mar 29, 2021
    Copy the full SHA
    a5e94fe View commit details
    Browse the repository at this point in the history
  12. soc/amd: smbus: Use correct type for uintptr_t

    Fix the format warning below by using `PRIxPTR`, which is defined as
    unsigned long.
    
        src/soc/amd/common/block/smbus/smbus.c:33:56: error: format specifies type 'size_t' (aka 'unsigned int') but the argument has type 'uintptr_t' (aka 'unsigned long') [-Werror,-Wformat]
                        printk(BIOS_ERR, "Invalid SMBus or ASF base %#zx\n", mmio);
                                                                    ~~~~     ^~~~
                                                                    %#lx
        src/include/console/console.h:60:61: note: expanded from macro 'printk'
        #define printk(LEVEL, fmt, args...) do_printk(LEVEL, fmt, ##args)
                                                             ~~~    ^~~~
        1 error generated.
    
    Change-Id: I727c490d3097dcf36cdbcd4db2852cd49d11785f
    Signed-off-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51843
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    paulmenzel authored and felixheld committed Mar 29, 2021
    Copy the full SHA
    cbd6751 View commit details
    Browse the repository at this point in the history

Commits on Mar 30, 2021

  1. soc/ti/am335x: Add MMC/SD driver

    Adds a driver for the am335x MMC peripheral. This has only been tested
    with SD cards and probably needs some modification to use eMMC or MMC
    cards.
    
    It's also currently a little slow as it only supports reading a block at
    a time.
    
    Change-Id: I5c2b250782cddca17aa46cc8222b9aebef505fb2
    Signed-off-by: Sam Lewis <sam.vr.lewis@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/44384
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    samvrlewis authored and ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    db3fbf2 View commit details
    Browse the repository at this point in the history
  2. mb/ti/beaglebone: Load romstage/ramstage from SD

    Adds a "sd_media" boot_device to allow booting from the SD card. This
    assumes that the generated "MLO" file is placed at a 128KB offset from
    the start of the SD card, to allow for the MBR etc. to be at the start
    of the SD card. Placing the MLO file here allows the AM335x boot ROM to
    load and execute the bootblock stage as well, as 128KB is one of the
    offsets the boot ROM checks when looking for the next stage to execute.
    
    As part of this, a FMD for the Beaglebone has also been defined. It's
    sized at 32M somewhat arbitrarily, as SD cards could allow for much
    bigger payloads.
    
    TEST: Beaglebone boots from bootblock into romstage. Romstage to
    ramstage still doesn't work as it needs RAM initialization first.
    
    Change-Id: I5f6901217fb974808e84aeb679af2f47eeae30fd
    Signed-off-by: Sam Lewis <sam.vr.lewis@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/44385
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    samvrlewis authored and ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    c25d54b View commit details
    Browse the repository at this point in the history
  3. soc/ti/am335x: Add SDRAM initialization driver

    Adds code taken and (barely) adapted from U-Boot (release 2020.04,
    commit 36fec02b1f90b92cf51ec531564f9284eae27ab4) for SDRAM initialization.
    This should in theory work for other configurations than the Beaglebone
    Black's DRAM configuration, but hasn't been tested.
    
    Change-Id: Ib1bc2fa606f7010c8c789aa7a5c37cd41bc484b9
    Signed-off-by: Sam Lewis <sam.vr.lewis@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/44386
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    samvrlewis authored and ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    1d8d99b View commit details
    Browse the repository at this point in the history
  4. mb/ti/beaglebone: Initialize DDR3

    Adds initialisation of 512MB of DDR memory on the BBB to the romstage.
    The parameters for the DDR peripherals are taken from U-Boot.
    
    TEST: Booted from romstage into ramstage. Also successfully managed to
    run the "ram_check" in lib.h.
    
    Change-Id: I692bfd913c8217a78d073d19c5344c9bb40722a8
    Signed-off-by: Sam Lewis <sam.vr.lewis@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/44387
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    samvrlewis authored and ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    7cbf391 View commit details
    Browse the repository at this point in the history
  5. soc/ti/am335x: Map useable RAM

    Maps the useable RAM so that it can be used for booting a payload.
    
    TEST: Booted a simple ELF payload (that just flashes LEDs) on the
    Beaglebone Black.
    
    Change-Id: I7f657c97e4753071c90ba8ca800a96108807e6b9
    Signed-off-by: Sam Lewis <sam.vr.lewis@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/44388
    Reviewed-by: Patrick Rudolph <siro@das-labor.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    samvrlewis authored and ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    f1d196c View commit details
    Browse the repository at this point in the history
  6. security/intel/cbnt: Add an option to generate an unsigned KM

    This is useful if you have external infrastructure to sign KM.
    
    Change-Id: If5e9306366230b75d97e4e1fb271bcd7615abd5f
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51572
    Reviewed-by: Christian Walter <christian.walter@9elements.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    5e0119e View commit details
    Browse the repository at this point in the history
  7. security/intel/cbnt: Add option to generate BPM

    This add an option to generate BPM using the 9elements bg-prov tool
    using a json config file.
    
    A template for the json config file can be obtained via
    "bg-prov template".
    Another option is to extract it from a working configuration:
    "bg-prov read-config".
    
    The option to just include a provided BPM binary is kept.
    
    Change-Id: I38808ca56953b80bac36bd186932d6286a79bebe
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/50411
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Christian Walter <christian.walter@9elements.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    15412c0 View commit details
    Browse the repository at this point in the history
  8. security/intel/cbnt: Add option to generate an unsigned BPM

    Change-Id: Ic1b941f06b44bd3067e5b071af8f7a02499d7827
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51573
    Reviewed-by: Christian Walter <christian.walter@9elements.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    6362df3 View commit details
    Browse the repository at this point in the history
  9. soc/intel/xeon_sp: Prepare for CBnT BPM generation

    To generate a working BPM, boot policy manifest for Intel CBnT the
    tool that generates it, requires ACPI base and PCH PWRM base as input.
    Therefore make it a Kconfig symbol, that can be used in Makefile.inc.
    
    Change-Id: I6f1f9b53e34114682bd3258753f2d5aada9a530d
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51805
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Christian Walter <christian.walter@9elements.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    83a5593 View commit details
    Browse the repository at this point in the history
  10. security/intel/cbnt: Add options to generate BPM from Kconfig

    Use Kconfig options to set BPM fields.
    
    Change-Id: I9f5ffa0f692b06265f992b07a44763ff1aa8dfa7
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/50928
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    ArthurHeymans committed Mar 30, 2021
    Copy the full SHA
    3d5319e View commit details
    Browse the repository at this point in the history
  11. soc/intel/alderlake: Enable logging of wake sources for S0ix

    This change adds elog.c and xhci.c to smm-y for alderlake platforms to
    enable the logging of wake sources in eventlog for S0ix.
    
    BUG=b:183684923
    TEST=Verified on Brya that entry/exit for S0ix are logged in eventlogs.
    295 | 2021-03-29 10:31:48 | S0ix Enter
    296 | 2021-03-29 10:31:58 | S0ix Exit
    297 | 2021-03-29 10:31:58 | Wake Source | RTC Alarm | 0
    
    298 | 2021-03-29 10:32:30 | S0ix Enter
    299 | 2021-03-29 10:32:55 | S0ix Exit
    300 | 2021-03-29 10:32:55 | Wake Source | Power Button | 0
    301 | 2021-03-29 10:32:55 | EC Event | Power Button
    
    305 | 2021-03-29 10:43:13 | S0ix Enter
    306 | 2021-03-29 10:43:14 | S0ix Exit
    307 | 2021-03-29 10:43:14 | Wake Source | PME - XHCI | 0
    308 | 2021-03-29 10:43:14 | Wake Source | PME - XHCI | 0
    309 | 2021-03-29 10:43:14 | Wake Source | PME - XHCI (USB 2.0 port) | 8
    310 | 2021-03-29 10:43:14 | Wake Source | GPE # | 109
    
    Change-Id: Icc836caa797d3bc4e782c6a51492de23e7b49b71
    Signed-off-by: Sugnan Prabhu S <sugnan.prabhu.s@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51839
    Reviewed-by: Paul Menzel <paulepanter@users.sourceforge.net>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    sugnanprabhu authored and Tim Wawrzynczak committed Mar 30, 2021
    Copy the full SHA
    f040f75 View commit details
    Browse the repository at this point in the history
  12. security: vboot: Clarify PCR extension algorithms/sizes

    The PCR algorithms used for vboot are frequently causing confusion (e.g.
    see CB:35645) because depending on the circumstances sometimes a
    (zero-extended) SHA1 value is interpreted as a SHA256, and sometimes a
    SHA256 is interpreted as a SHA1. We can't really "fix" anything here
    because the resulting digests are hardcoded in many generations of
    Chromebooks, but we can document and isolate it better to reduce
    confusion. This patch adds an explanatory comment and fixes both
    algorithms and size passed into the lower-level TPM APIs to their actual
    values (whereas it previously still relied on the TPM 1.2 TSS not
    checking the algorithm type, and the TPM 2.0 TSS only using the size
    value for the TCPA log and not the actual TPM operation).
    
    Signed-off-by: Julius Werner <jwerner@chromium.org>
    Change-Id: Ib0b6ecb8c7e9a405ae966f1049158f1d3820f7e2
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51720
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Andrey Pronin <apronin@chromium.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    jwerner-chromium committed Mar 30, 2021
    Copy the full SHA
    74a0fad View commit details
    Browse the repository at this point in the history
  13. soc/amd/cezanne: Comment the AOAC register access

    Causing the AOAC register access as part of system suspend (S3) causes
    the suspend procedure to be stuck. Comment it for now to unblock
    entering S3 and collecting the power numbers.
    
    BUG=b:181766974
    TEST=Build and boot to OS in Majolica. Enter S3 through "echo mem >
    /sys/power/state".
    
    Change-Id: Ie93bbe393b209b784b9a2257f3916b29d84b25d1
    Signed-off-by: Karthikeyan Ramasubramanian <kramasub@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51926
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    Reviewed-by: Mathew King <mathewk@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    karthikr-google authored and felixheld committed Mar 30, 2021
    Copy the full SHA
    dedd77f View commit details
    Browse the repository at this point in the history

Commits on Mar 31, 2021

  1. mb/google/kukui/var/cozmo: Add RAM ID table

    Add the RAM ID table offset 0x30 for cozmo.
    
    BUG=b:182776048
    BRANCH=kukui
    TEST=emerge-jacuzzi coreboot
    
    Signed-off-by: Lucas Chen <lucas.chen@quanta.corp-partner.google.com>
    Change-Id: Ia29d38f61975c5e29a901adbfad343153628405f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51845
    Reviewed-by: Hung-Te Lin <hungte@chromium.org>
    Reviewed-by: Yu-Ping Wu <yupingso@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Lucas Chen authored and hungte committed Mar 31, 2021
    Copy the full SHA
    6b0ebee View commit details
    Browse the repository at this point in the history
  2. mb/ti/beaglebone: Fix MMAP_HELPER API usage

    This replays the changes made in commit 9b1f3cc (cbfs: Pull
    handling of the CBFS_CACHE mem_pool into CBFS core) for the latest
    work on the BeagleBone port. I hope it's the right thing to do.
    
    Fixes: Makes `master` compile again.
    
    Change-Id: Ia51c66dbe425a662ea2a6b2527b2b6982f587891
    Signed-off-by: Nico Huber <nico.huber@secunet.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51943
    Reviewed-by: Sam Lewis <sam.vr.lewis@gmail.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    n-huber authored and felixheld committed Mar 31, 2021
    Copy the full SHA
    acf230c View commit details
    Browse the repository at this point in the history
  3. mb/google/zork/vilboz: set the eDP phy overriden for WWAN SKU

    Move the eDP phy overridden to variant for WWAN SKU.
    
    BUG=b:171269338
    BRANCH=firmware-zork-13434.B
    TEST=emerge-zork coreboot chromeos-bootimage
    
    Signed-off-by: Chris Wang <chris.wang@amd.corp-partner.google.com>
    Change-Id: I0400e8f78b152f260c632fba3cfa43aeca2f6776
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51938
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Martin Roth <martinroth@google.com>
    ChrisWangAMD authored and Martin Roth committed Mar 31, 2021
    Copy the full SHA
    3e34355 View commit details
    Browse the repository at this point in the history
  4. soc/amd/picasso/acpi: pass correct enum to acpigen_write_CSD_package

    The coordtype parameter of acpigen_write_CSD_package expects a CSD_coord
    enum value, but HW_ALL that got passed as parameter is a PSD_coord enum
    value, so replace that with the correct CSD_HW_ALL enum value.
    
    TEST=Timeless build results in identical binary for Mandolin.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Found-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Change-Id: I90b19345b8dc6d386b6acfa81c6c072dcd6981ca
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51931
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    felixheld authored and Martin Roth committed Mar 31, 2021
    Copy the full SHA
    3920bc9 View commit details
    Browse the repository at this point in the history
  5. soc/amd/common/block/graphics: Don't add VBIOS to cbmem when using GOP

    pci_rom_ssdt reloads the oprom from cbfs. It then places it into cbmem
    and writes the offsets as the ROM ACPI node. The GOP driver modifies the
    VBIOS so we don't want to reread from cbfs. When using GOP we also pass
    the offsets with the VFCT table.
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: Iaf53e750564f1f0e115cd354790da62e672d74b7
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51541
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nikolai Vyssotski <nikolai.vyssotski@amd.corp-partner.google.com>
    Reviewed-by: Martin Roth <martinroth@google.com>
    Raul E Rangel authored and Martin Roth committed Mar 31, 2021
    Copy the full SHA
    a7659eb View commit details
    Browse the repository at this point in the history
  6. mb/google/guybrush: Switch eSPI to 16 MHz

    It looks like we are having SI issues on eSPI at 33 MHz. Switching to 16
    MHz makes everything a lot more stable.
    
    BUG=b:183524609
    TEST=Boot to OS and run `ectool version` 1000 times and see no problems.
    Before with 33 MHz there was an error every few cycles.
    declare -i i=0; while ectool version; do i+=1; echo "$i"; sleep .11; done; echo "Finished: $i"
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I6ab515629703a157c1d1ac6adcf5cf379e80f8ee
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51953
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Reviewed-by: Mathew King <mathewk@chromium.org>
    Reviewed-by: Rob Barnes <robbarnes@google.com>
    Raul E Rangel authored and Martin Roth committed Mar 31, 2021
    Copy the full SHA
    6ef0e80 View commit details
    Browse the repository at this point in the history
  7. mb/google/guybrush: Enable VBOOT_LID_SWITCH

    Needed so get_lid_switch will actually call the EC. Otherwise it
    returns -1.
    
    BUG=b:183524609
    TEST=Depthcharge no longer halts complaining that coreboot didn't sample
    the pin
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I4639b3713d726192e251dcffa14381dd92518fa2
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51954
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Mathew King <mathewk@chromium.org>
    Raul E Rangel authored and Martin Roth committed Mar 31, 2021
    Copy the full SHA
    f63f2f2 View commit details
    Browse the repository at this point in the history

Commits on Apr 1, 2021

  1. soc/amd/cezanne: Add device tree support for I2C

    This allows the cr50 on guybrush to show up in ACPI.
    
    BUG=b:183737011
    TEST=Boot OS and see I2C devices initialized
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: Ifb5679b7bbefbf753217981874bb1bdaef35f6db
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51958
    Reviewed-by: Karthik Ramasubramanian <kramasub@google.com>
    Reviewed-by: Mathew King <mathewk@chromium.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Raul E Rangel authored and felixheld committed Apr 1, 2021
    Copy the full SHA
    32fc4e3 View commit details
    Browse the repository at this point in the history
  2. soc/amd/cezanne: Enable GENERIC_GPIO_LIB

    Needed so we write the correct resource into the ACPI tables.
    
    BUG=b:183737011
    TEST=Boot OS and see GPIO devices working
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I2ba4349e0ed500912db40aa6ef9b649046f4358f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51961
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Reviewed-by: Karthik Ramasubramanian <kramasub@google.com>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Raul E Rangel authored and felixheld committed Apr 1, 2021
    Copy the full SHA
    e925af2 View commit details
    Browse the repository at this point in the history
  3. mb/google/guybrush: Add IRQ numbers

    BUG=b:183737011
    TEST=cat /proc/interrupts and see i2c controllers and gpio controller
    listed
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I5b2f23b2c2a7c4cec198276814d80f545e85aa41
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51959
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Mathew King <mathewk@chromium.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Reviewed-by: Karthik Ramasubramanian <kramasub@google.com>
    Raul E Rangel authored and felixheld committed Apr 1, 2021
    Copy the full SHA
    cce7d82 View commit details
    Browse the repository at this point in the history
  4. mb/google/dedede/var/lantis: Configure Acoustic noise mitigation UPDs

    Enable Acoustic noise mitigation for lantis and set slew rate to 1/4
    which is calibrated value for the board. Other values like PreWake,
    Rampup and RampDown are 0 by default.
    
    BUG=b:183561593
    BRANCH=dedede
    TEST=EE verify acoustic noise test passes.
    
    Change-Id: I5e5f24ed934910726c220678068d085b6ee2bcf6
    Signed-off-by: Tony Huang <tony-huang@quanta.corp-partner.google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51762
    Reviewed-by: Karthik Ramasubramanian <kramasub@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Tony Huang authored and karthikr-google committed Apr 1, 2021
    Copy the full SHA
    ebf380b View commit details
    Browse the repository at this point in the history
  5. google/grunt: Add ALC5682 ACPI I2S machine driver

    The is used for AMD Grunt board which uses ALC5682 and MAX98357 codec.
    kernel driver will need to retrieve MISC FCH memory resource for CLK
    enabling per different CID/HID.
    
    BUG=b:171755306
    BRANCH=master
    TEST=emerge-grunt coreboot
    
    Change-Id: I5f29a2d784a9fc749fff61a9c96c0a487b71a2d7
    Signed-off-by: Kevin Chiu <Kevin.Chiu@quantatw.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51659
    Reviewed-by: Yu-hsuan Hsu <yuhsuan@google.com>
    Reviewed-by: Martin Roth <martinroth@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Kevin Chiu authored and Martin Roth committed Apr 1, 2021
    Copy the full SHA
    d90f8ac View commit details
    Browse the repository at this point in the history
  6. google/trogdor: Don't build for rev0 by default

    We've mostly stopped using Trogdor-rev0 now and are starting to bring up
    rev2 instead. Therefore, the default revisions this builds for should be
    the newer ones.
    
    Signed-off-by: Julius Werner <jwerner@chromium.org>
    Change-Id: Ie433ebb2a03fb1636b5012b4a0567ba6f982579d
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/52007
    Reviewed-by: Doug Anderson <dianders@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    jwerner-chromium committed Apr 1, 2021
    Copy the full SHA
    ffa83fc View commit details
    Browse the repository at this point in the history

Commits on Apr 2, 2021

  1. mb/hp/snb_ivb_laptops: Remove undefined variable in cmos.default

    There is no "volume" defined in cmos.layout now, so removing "volume="
    from cmos.default, otherwise building will fail with
    CONFIG_USE_OPTION_TABLE set.
    
    Change-Id: I1d6bb68fb927882ddcc052b432bb34b42c58eac7
    Signed-off-by: Bill XIE <persmule@hardenedlinux.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51670
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Iru Cai (vimacs) <mytbk920423@gmail.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    persmule authored and Th3Fanbus committed Apr 2, 2021
    Copy the full SHA
    b77f016 View commit details
    Browse the repository at this point in the history
  2. nb/intel/pineview: Correct COMP register write

    Reference code does an and-or operation with zero as or-value, reading
    and writing to the same address. The accessed register is 32-bit, and
    reference code programs bits 22, 21, 20, 16 to zero. However, coreboot
    code reads the value from bits 7..0 instead. Correct this.
    
    Change-Id: I33bf268449c2f799321be81a02bbccff855ee1fe
    Signed-off-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51861
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Th3Fanbus committed Apr 2, 2021
    Copy the full SHA
    07ccc8d View commit details
    Browse the repository at this point in the history
  3. mb/google/brya: change reset signal for GPP_F17 from PLTRST to DEEP

    PCH_INT_ODL (GPP_F17) is used to wake AP from S3, however it was configured
    to reset state on PLT reset assertion. This change reconfigures the pad
    using DEEP instead of PLTRST to retain pad configuration across S3.
    
    BUG=b:178545523
    TEST=manual: verified that asserting PCH_INT_ODL wakes system and the wake
    source is GPP_F17
    
    Signed-off-by: Boris Mittelberg <bmbm@google.com>
    Change-Id: I8df5dafedabc7b6af74c39621f0e1eb7019a9a17
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51829
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    the-sneaky-fox authored and Tim Wawrzynczak committed Apr 2, 2021
    Copy the full SHA
    65fce09 View commit details
    Browse the repository at this point in the history
  4. mainboard/google/brya: Enable tight timestamp

    This change exposes the PCH_INT_ODL line in GPP_F17 as interrupt resource for
    CREC device
    
    BUG=none
    TEST=manual test
    
    Signed-off-by: Boris Mittelberg <bmbm@google.com>
    Change-Id: I0c05160cb7894b5f7beee93a0c93776f973eae56
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51830
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    the-sneaky-fox authored and Tim Wawrzynczak committed Apr 2, 2021
    Copy the full SHA
    6c2f80c View commit details
    Browse the repository at this point in the history
  5. mainboard/google/brya: Disable touchpad as S3 wake source

    This change disables touchpad interrupt, as it sends spurious wake signal
    via GPP_F14 and immediately wakes the system from S3. It happens because
    touchpad's power is gated by deassertion of PLTRST#. The behaviour for
    S0ix is unchanged.
    
    BUG=183738135
    TEST=manually
    
    Signed-off-by: Boris Mittelberg <bmbm@google.com>
    Change-Id: Ia7d282f38d205a94cc43eaa1832729f4606437c9
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51831
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    the-sneaky-fox authored and Tim Wawrzynczak committed Apr 2, 2021
    Copy the full SHA
    9965228 View commit details
    Browse the repository at this point in the history
  6. mb/google/guybrush: Add Elan Touchpad configuration

    Enable Touchpad by configuring the enable GPIO to logic high. Add
    touchpad configuration for ELAN touchpad.
    
    BUG=b:182207444
    TEST=Build and boot to OS in Guybrush. Ensure that the trackpad events
    are detected using evtest.
    
    Change-Id: Ib47fbb33f2b181eb85f6ded98a5b0ce08fbc7b64
    Signed-off-by: Karthikeyan Ramasubramanian <kramasub@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51962
    Reviewed-by: Mathew King <mathewk@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    karthikr-google committed Apr 2, 2021
    Copy the full SHA
    0f41912 View commit details
    Browse the repository at this point in the history
  7. soc/amd/cezanne: Add support to perform early EC sync

    Ideally we would like to perform EC Software Sync in payload. But with
    the hardware requirement (EC_IN_RW) and firmware requirement (TPM
    command to get EC execution environment) not met yet, adding the support
    to perform early EC Software sync. With EFS2 enabled, this will also
    help cr50 to set the boot mode as NORMAL instead of NO_BOOT.
    
    BUG=None
    TEST=Build and Boot to OS in Guybrush. Ensure that the EC software sync
    is successfully complete.
    CBFS: Found 'ecrw.hash' @0x50400 size 0x20 in mcache @0x020171ec
    VB2:check_ec_hash() Hexp RW(active): 2dd8dbb78d0c626358a626037973a3d81982f88f3f38e7f759039bf84e05ccc6
    VB2:check_ec_hash()            Hmir: 2dd8dbb78d0c626358a626037973a3d81982f88f3f38e7f759039bf84e05ccc6
    <snip>
    VB2:check_ec_hash() Heff RW(active): 2dd8dbb78d0c626358a626037973a3d81982f88f3f38e7f759039bf84e05ccc6
    VB2:sync_ec() select_rw=RW(active)
    
    Change-Id: I820e651c6b22a833fef6f17a4ceb5a8cfb6f1616
    Signed-off-by: Karthikeyan Ramasubramanian <kramasub@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/52008
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    karthikr-google authored and Raul Rangel committed Apr 2, 2021
    Copy the full SHA
    ad7c33a View commit details
    Browse the repository at this point in the history
  8. mb/google/guybrush: Enable early EC Software Sync

    BUG=None
    TEST=Build and boot to OS in Guybrush. Ensure that the EC Software Sync
    is complete.
    
    Change-Id: Id8655b6f805e14ce3cb71777c1cc175f45841fcc
    Signed-off-by: Karthikeyan Ramasubramanian <kramasub@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/52009
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    karthikr-google authored and Raul Rangel committed Apr 2, 2021
    Copy the full SHA
    1e36dc0 View commit details
    Browse the repository at this point in the history
  9. mb/intel/adlrvp: Update VBT filenames

    These files were just renamed to put `adlrvp` in between `vbt`
    and the memory technology type.
    
    Change-Id: Icefbac462d0ec9c660541e9cf44686d6dcf82dfd
    Signed-off-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/52032
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Reviewed-by: YH Lin <yueherngl@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Tim Wawrzynczak committed Apr 2, 2021
    Copy the full SHA
    a10cc8a View commit details
    Browse the repository at this point in the history
  10. mb/google/zork/vilboz: Fix audio test failure on LTE SKU

    Use board id to switch acp_i2s_use_external_48mhz_osc enable.
    
    BUG=b:181720406
    BRANCH=firmware-zork-13434.B
    TEST=emerge-zork coreboot chromeos-bootimage
    
    Signed-off-by: John Su <john_su@compal.corp-partner.google.com>
    Change-Id: I085c39accd82bf72e4ebbc0394382ed4a7d4e901
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/51792
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Kangheui Won <khwon@chromium.org>
    John Su authored and furquan-goog committed Apr 2, 2021
    Copy the full SHA
    45e103c View commit details
    Browse the repository at this point in the history
  11. coreboot_tables: Print strapping IDs when adding them to coreboot table

    These used to be printed before CB:46605. Having them in the logs can be
    a huge timesaver when debugging logs sent to you by other people
    (especially from systems that don't boot all the way). Let's add them
    back.
    
    Signed-off-by: Julius Werner <jwerner@chromium.org>
    Change-Id: Ifdbfdd29d25a0937c27113ace776f7aec231a57d
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/52011
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    jwerner-chromium committed Apr 2, 2021
    Copy the full SHA
    0972871 View commit details
    Browse the repository at this point in the history

Commits on Apr 3, 2021

  1. docs/mb/supermicro: add SUM tool for flashing with disabled ME

    Change-Id: I08543c0908a6cb4ef9fb46d0eb3a7aa481fb95d9
    Signed-off-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/49887
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    c0d3z3r0 committed Apr 3, 2021
    Copy the full SHA
    0887fc4 View commit details
    Browse the repository at this point in the history