Commits on May 27, 2021

  1. soc/amd/picasso: add devicetree setting for PSPP policy

    Since the default for the corresponding UPD of the Picasso FSP is
    DXIO_PSPP_POWERSAVE and the devicetree default is DXIO_PSPP_PERFORMANCE,
    add a deviectree setting for each board that's using the Picasso SoC
    code to not change the setting for the existing boards.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I0008ebb0c0f339ed3bdf24ab95a20aa83d5be2c9
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54934
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    felixheld committed May 27, 2021
    Copy the full SHA
    0fec867 View commit details
    Browse the repository at this point in the history
  2. Mancomb: Add firmware config CBI definitions

    The firmware config field in CBI lets us control initialization
    parameters based on the OEM design.
    
    BUG=b:188713024
    TEST=Build
    
    Signed-off-by: Martin Roth <martinroth@chromium.org>
    Change-Id: I56ddc7218688919f20f41e0f143419c39d83849d
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54732
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    Martin Roth authored and Martin Roth committed May 27, 2021
    Copy the full SHA
    c5a56b8 View commit details
    Browse the repository at this point in the history
  3. soc/amd/common/block: Fix missing include in acp.h

    We were missing the stdint.h header, and the header was sorted
    incorrectly in chip.h
    
    BUG=non
    TEST=build guybrush
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I209d3c9c48e5b06b2a56759af51cf2858eb99f51
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54922
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Raul E Rangel committed May 27, 2021
    Copy the full SHA
    9d8f905 View commit details
    Browse the repository at this point in the history
  4. mb/google/guybrush,mancomb: enable crypto coprocessor PCIe device

    This fixes the following error from the Linux kernel:
    ccp 0000:03:00.2: ioremap failed
    ccp 0000:03:00.2: initialization failed
    ccp: probe of 0000:03:00.2 failed with error -12
    
    BUG=b:186575712,b:189202985
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I5cbc620001d3c21c538b62ab2811b6e07269feb2
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54962
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    felixheld committed May 27, 2021
    Copy the full SHA
    1028a41 View commit details
    Browse the repository at this point in the history
  5. mb/amd/majolica: enable crypto coprocessor PCIe device

    This fixes the following error from the Linux kernel:
    ccp 0000:03:00.2: ioremap failed
    ccp 0000:03:00.2: initialization failed
    ccp: probe of 0000:03:00.2 failed with error -12
    
    BUG=b:186575712,b:189202985
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: Id1c6a6cbbdda2cb22e81e2b52b364617d6765e09
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54963
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    felixheld committed May 27, 2021
    Copy the full SHA
    9d8a5ba View commit details
    Browse the repository at this point in the history
  6. tpm: Remove USER_TPMx options, make TPM1/TPM2 menuconfig visible

    We would like to have an easy way to completely disable TPM support on a
    board. For boards that don't pre-select a TPM protocol via the
    MAINBOARD_HAS_TPMx options, this is already possible with the
    USER_NO_TPM option. In order to make this available for all boards, this
    patch just removes the whole USER_TPMx option group and directly makes
    the TPM1 and TPM2 options visible to menuconfig. The MAINBOARD_HAS_TPMx
    options can still be used to select defaults and to prevent selection of
    a protocol that the TPM is known to not support, but the NO_TPM option
    always remains available.
    
    Also fix some mainboards that selected TPM2 directly, which they're not
    supposed to do (that's what MAINBOARD_HAS_TPM2 is for), and add a
    missing dependency to TPM_CR50 so it is set correctly for a NO_TPM
    scenario.
    
    Signed-off-by: Julius Werner <jwerner@chromium.org>
    Change-Id: Ib0a73da3c42fa4e8deffecb53f29ee38cbb51a93
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54641
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Christian Walter <christian.walter@9elements.com>
    jwerner-chromium committed May 27, 2021
    Copy the full SHA
    8ad9379 View commit details
    Browse the repository at this point in the history
  7. cbmem: Introduce "early" init hooks for console

    Over the last couple of years we have continuously added more and more
    CBMEM init hooks related to different independent components. One
    disadvantage of the API is that it can not model any dependencies
    between the different hooks, and their order is essentially undefined
    (based on link order). For most hooks this is not a problem, and in fact
    it's probably not a bad thing to discourage implicit dependencies
    between unrelated components like this... but one resource the
    components obviously all share is CBMEM, and since many CBMEM init hooks
    are used to create new CBMEM areas, the arbitrary order means that the
    order of these areas becomes unpredictable.
    
    Generally code using CBMEM should not care where exactly an area is
    allocated, but one exception is the persistent CBMEM console which
    relies (on a best effort basis) on always getting allocated at the same
    address on every boot. This is, technically, a hack, but it's a pretty
    harmless hack that has served us reasonably well so far and would be
    difficult to realize in a more robust way (without adding a lot of new
    infrastructure). Most of the time, coreboot will allocate the same CBMEM
    areas in the same order with the same sizes on every boot, and this all
    kinda works out (and since it's only a debug console, we don't need to
    be afraid of the odd one-in-a-million edge case breaking it).
    
    But one reproducible difference we can have between boots is the vboot
    boot mode (e.g. normal vs. recovery boot), and we had just kinda gotten
    lucky in the past that we didn't have differences in CBMEM allocations
    in different boot modes. With the recent addition of the RW_MCACHE
    (which does not get allocated in recovery mode), this is no longer true,
    and as a result CBMEM consoles can no longer persist between normal and
    recovery modes.
    
    The somewhat kludgy but simple solution is to just create a new class of
    specifically "early" CBMEM init hooks that will always run before all
    the others. While arbitrarily partitioning hooks into "early" and "not
    early" without any precise definition of what these things mean may seem
    a bit haphazard, I think it will be good enough in practice for the very
    few cases where this matters and beats building anything much more
    complicated (FWIW Linux has been doing something similar for years with
    device suspend/resume ordering). Since the current use case only relates
    to CBMEM allocation ordering and you can only really be "first" if you
    allocate in romstage, the "early" hook is only available in romstage for
    now (could be expanded later if we find a use case for it).
    
    Signed-off-by: Julius Werner <jwerner@chromium.org>
    Change-Id: If2c849a89f07a87d448ec1edbad4ce404afb0746
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54737
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    jwerner-chromium committed May 27, 2021
    Copy the full SHA
    913a47a View commit details
    Browse the repository at this point in the history

Commits on May 28, 2021

  1. mb/intel/ehlcrb: Upload EHL CRB GPIO configs

    Initial upload of the GPIO configs for EHL CRB.
    This CL also includes the UART GPIO configs in early GPIO table.
    
    Signed-off-by: Lean Sheng Tan <lean.sheng.tan@intel.com>
    Change-Id: Ied4cbb34149b0b837597c0fc17dc5956f3ca409e
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54891
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Tan, Lean Sheng authored and wzeh committed May 28, 2021
    Copy the full SHA
    6948df1 View commit details
    Browse the repository at this point in the history
  2. ec/google/wilco: Extend description of EC_GOOGLE_WILCO

    Change-Id: Ia278b538a8904651d16c37d095972fa78e264288
    Link: https://mail.coreboot.org/hyperkitty/list/coreboot@coreboot.org/thread/7S5OJMLQUEIU6YK36JTTRINF5OOCI66V/
    Signed-off-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54929
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    paulmenzel authored and wzeh committed May 28, 2021
    Copy the full SHA
    1bc6b06 View commit details
    Browse the repository at this point in the history
  3. mainboard/google/brya: Add S3/S0ix wake events AC connect/disconnect

    Enabling AC connect/disconnect wake events in brya to meet Chrome OS
    wake requirements.
    These changes are similar to Volteer and Shadowmountain.
    
    BUG=none
    BRANCH=None
    TEST=manual tested DUT wakes for AC connect/disconnect in S0ix
    
    Change-Id: I14b3efd429e3aa701af534f150baf35fcdeb9f35
    Signed-off-by: madhusudanarao amara <madhusudanarao.amara@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54855
    Reviewed-by: Maulik V Vaghela <maulik.v.vaghela@intel.com>
    Reviewed-by: Sooraj Govindan <sooraj.govindan@intel.corp-partner.google.com>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    amaramad authored and wzeh committed May 28, 2021
    Copy the full SHA
    c2c4a00 View commit details
    Browse the repository at this point in the history
  4. mb/intel/adlrvp_m: Disable unused TBT ports from device tree

    These PCIe and DMA ports are not available for adlrvp_m.
    
    BUG=none
    TEST=Boot device
    
    Signed-off-by: Bernardo Perez Priego <bernardo.perez.priego@intel.com>
    Change-Id: Ic568c692fbb82fb3fc70c0cafc2328f8fa2cd74d
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54885
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    perezpri authored and wzeh committed May 28, 2021
    Copy the full SHA
    e3a079c View commit details
    Browse the repository at this point in the history
  5. cpu/x86/entry16.S: Make Intel CBnT TOCTOU safe

    Intel CBnT (and Boot Guard) makes the chain of trust TOCTOU safe by
    setting up NEM (non eviction mode) in the ACM. The CBnT IBB (Initial
    BootBlock) therefore should not disable caching.
    
    Sidenote: the MSR macros are taken from the slimbootloader project.
    
    TESTED: ocp/Deltalake boot with and without CBnT and also a broken
    CBnT setup.
    
    Change-Id: Id2031e4e406655e14198e45f137ba152f8b6f567
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54010
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Christian Walter <christian.walter@9elements.com>
    ArthurHeymans authored and wzeh committed May 28, 2021
    Copy the full SHA
    e7266e8 View commit details
    Browse the repository at this point in the history
  6. ec/kontron/kempld: Guard macro parameters

    Add parentheses around macro parameters to avoid operation order issues.
    
    Change-Id: I2d4552abaeda5702619cc53e9dfae1f17b048e67
    Signed-off-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54952
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Th3Fanbus authored and wzeh committed May 28, 2021
    Copy the full SHA
    f696d79 View commit details
    Browse the repository at this point in the history
  7. nb/intel/x4x/rcven.c: Guard macro parameters

    Add parentheses around macro parameters to avoid operation order issues.
    
    Change-Id: I9528f3d6b221854fddd2db6d2b45c63bfdda0092
    Signed-off-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54953
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Th3Fanbus authored and wzeh committed May 28, 2021
    Copy the full SHA
    d059112 View commit details
    Browse the repository at this point in the history
  8. option: Turn CMOS option backend into choice

    In order to add more option backends, transform the current CMOS option
    backend into a Kconfig choice. Replace the `select` directives, as they
    cannot be used with choice options.
    
    Change-Id: Id3180e9991f0e763b4bae93a92d40668e7fc99bc
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54728
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Th3Fanbus committed May 28, 2021
    Copy the full SHA
    17852e6 View commit details
    Browse the repository at this point in the history
  9. option: Allow mainboards to implement the API

    Some mainboards need a mainboard-specific mechanism to access option
    values. Allow mainboards to implement the option API. Also, add some
    documentation about the current option API, and describe when should
    one reimplement the option API in mainboard code: only when the code
    is mainboard-specific to comply with externally-imposed constraints.
    
    Change-Id: Idccdb9a008b1ebb89821961659f27b1c0b17d29c
    Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
    Signed-off-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54729
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Th3Fanbus committed May 28, 2021
    Copy the full SHA
    9bc780f View commit details
    Browse the repository at this point in the history
  10. mb/prodrive/hermes: Simplify read_write_config signature

    The `write_offset` parameter is always zero. Remove it.
    
    Change-Id: Ib63cb25904ad6c1c7424a9c01d8bf1e84c08453b
    Signed-off-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/52884
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Th3Fanbus committed May 28, 2021
    Copy the full SHA
    f1e8535 View commit details
    Browse the repository at this point in the history
  11. mb/prodrive/hermes: Rename EEPROM access functions

    Change-Id: I84b9ef080f1ac91ea6f7273457b882677abf70d3
    Signed-off-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/52885
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Th3Fanbus committed May 28, 2021
    Copy the full SHA
    10c65b4 View commit details
    Browse the repository at this point in the history
  12. Documentation: Update real time chat options

    Change-Id: I3035266c5e035b954c0d709bd2c09069128c3340
    Signed-off-by: Patrick Georgi <pgeorgi@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55010
    Reviewed-by:  Felix Singer <felixsinger@posteo.net>
    Reviewed-by: Swift Geek (Sebastian Grzywna) <swiftgeek@gmail.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    pgeorgi committed May 28, 2021
    Copy the full SHA
    34d5f91 View commit details
    Browse the repository at this point in the history
  13. soc/amd/picasso: fix MCACHE on psp_verstage RO boot

    On RW boot path psp_verstage call cbfs_map which calls chain of
    _cbfs_alloc, cbfs_boot_lookup and cbfs_get_boot_device. Then
    cbfs_get_boot_device initializes MCACHE which is used later.
    
    However on RO boot path psp_verstage doesn't try to find anything in the
    CBFS which results RO MCACHE not to be initialized. Add
    cbfs_get_boot_device(true) to explicitly initialize MCACHE on recovery
    boot.
    
    BUG=b:177091575
    BRANCH=none
    TEST=build and boot jelboz
    
    Signed-off-by: Kangheui Won <khwon@chromium.org>
    Change-Id: I6c4b522fef5a4affd215faa122bdf6b53190cf3d
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54711
    Reviewed-by: Julius Werner <jwerner@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Kangheui Won authored and felixheld committed May 28, 2021
    Copy the full SHA
    9752725 View commit details
    Browse the repository at this point in the history
  14. Documentation: Fix named link

    The syntax requires two bracketed fields.
    
    Change-Id: I98ebe714e57f50017755eed7888f0dd2637a3066
    Signed-off-by: Patrick Georgi <pgeorgi@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55019
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-by:  Felix Singer <felixsinger@posteo.net>
    pgeorgi committed May 28, 2021
    Copy the full SHA
    5a45c41 View commit details
    Browse the repository at this point in the history
  15. Documentation: Fix up toctree

    Some files weren't properly hooked up, making Sphinx complain.
    
    Change-Id: If959fa63d4ddbc3916c49c5ad6602e76b12a7e60
    Signed-off-by: Patrick Georgi <pgeorgi@google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55020
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
    Reviewed-by:  Felix Singer <felixsinger@posteo.net>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    pgeorgi committed May 28, 2021
    Copy the full SHA
    7109925 View commit details
    Browse the repository at this point in the history
  16. mb/amd/bilby,cereme,mandolin: change PSPP policy to balanced

    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I7571ed92b3c3fa79581e2c7342960ca31451af1f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54935
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    felixheld committed May 28, 2021
    Copy the full SHA
    f3819bd View commit details
    Browse the repository at this point in the history
  17. mb/google/dedede: Update Storo setting for PEN detection.

    Update devicetree and gpio driving of storo that enable stylus
    Updates the GPIO configuration for GPP_C12 to
    PAD_CFG_GPI_GPIO_DRIVER and device tree entry for PENH device to
    use WAKEUP_ROUTE_GPIO_IRQ.
    
    BUG=b:188519508,b:188365033
    BRANCH=dedede
    TEST=build bios and the pen behavior can be detected.
    
    Change-Id: I2ffc969569b3ca29ba76326140f958a9707199f7
    Signed-off-by: Zanxi Chen <chenzanxi@huaqin.corp-partner.google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54762
    Reviewed-by: Karthik Ramasubramanian <kramasub@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    chenzanxi1995 authored and felixheld committed May 28, 2021
    Copy the full SHA
    dfaab1b View commit details
    Browse the repository at this point in the history
  18. mb/google/volteer/var/collis: Update DPTF parameters

    Update the first version DPTF parameters received from the thermal team.
    
    BUG=b:188936764
    TEST=emerge-volteer coreboot chromeos-bootimage
    
    Cq-Depend: chrome-internal:3851737
    Signed-off-by: FrankChu <frank_chu@pegatron.corp-partner.google.com>
    Change-Id: Id14b1d0bdd48c65eafbdd2e80b4611c86781be00
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54858
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Sumeet R Pawnikar <sumeet.r.pawnikar@intel.com>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    FrankChu1008 authored and felixheld committed May 28, 2021
    Copy the full SHA
    91350a1 View commit details
    Browse the repository at this point in the history
  19. arch/x86/timestamp.inc: Remove unused file

    This is a romcc compiled bootblock leftover.
    
    Change-Id: I8d4f8bcdac7e15d60540157e9d2ac98603320977
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55007
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    ArthurHeymans authored and felixheld committed May 28, 2021
    Copy the full SHA
    05b6b37 View commit details
    Browse the repository at this point in the history
  20. vendorcode/intel/fsp: Update to include post PRQ UPDs for Tiger Lake

    Update FSP headers for Tiger Lake platform generated based on FSP
    version 4133 to include post PRQ UPDs.
    
    BUG=b:188452018
    BRANCH=none
    TEST=build voxel
    
    Signed-off-by: Srinidhi N Kaushik <srinidhi.n.kaushik@intel.com>
    Change-Id: I493391294391c1222a1aa5fdb86baad968abf7a6
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54811
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    snkaushi authored and felixheld committed May 28, 2021
    Copy the full SHA
    eab9290 View commit details
    Browse the repository at this point in the history
  21. mb/kontron/mal10: Use mainboard_ops driver for GPIO configuration

    `mainboard_silicon_init_params()` should *only* be used for configuring
    FSP options which can not be configured anywhere else. Therefore, use
    the init phase from the mainboard_ops driver for configuring the GPIOs.
    
    Signed-off-by: Felix Singer <felixsinger@posteo.net>
    Change-Id: Ia01091938ac113cb5cf95f046609a1ebf3620806
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/48143
    Reviewed-by: Maxim Polyakov <max.senia.poliak@gmail.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    felixsinger authored and felixheld committed May 28, 2021
    Copy the full SHA
    83e0b97 View commit details
    Browse the repository at this point in the history

Commits on May 29, 2021

  1. drivers/intel/fsp2_0: Make fsp_temp_ram_exit() function static

    fsp_temp_ram_exit() function is only getting called by
    late_car_teardown() function inside temp_ram_exit.c file.
    Hence, make function as static and removed from include/fsp/api.h.
    
    Change-Id: I2239400e475482bc21f771d41a5ac524222d40fc
    Signed-off-by: Subrata Banik <subrata.banik@intel.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55025
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    subrata-b committed May 29, 2021
    Copy the full SHA
    de77449 View commit details
    Browse the repository at this point in the history

Commits on May 30, 2021

  1. Apply more uses for Kconfig TPM

    Change-Id: I54b296563940cd46fe9da9fe789b746f2fc1987d
    Signed-off-by: Kyösti Mälkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55016
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Aaron Durbin <adurbin@chromium.org>
    Reviewed-by: Julius Werner <jwerner@chromium.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    kmalkki authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    f303b4f View commit details
    Browse the repository at this point in the history
  2. soc/intel/elkhartlake: Update FSP-M UPD related configs

    Upload the FSP-M UPD configs. This CL also updated the chip.h and
    devicetree.cb with the relevant variables and configs.
    This CL also updated the GPIO related settings (PMC & SD card) in
    devicetree.cb.
    
    Signed-off-by: Lean Sheng Tan <lean.sheng.tan@intel.com>
    Change-Id: If6321064b37535b390cf3dd7c41a719c598a0cd7
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54892
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-by: Mario Scheithauer <mario.scheithauer@siemens.com>
    Tan, Lean Sheng authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    33f8fc6 View commit details
    Browse the repository at this point in the history
  3. soc/intel/elkhartlake: Update FADT table

    Update FADT table per relevant PM settings:
    Fix PM Timer block access size and disable C2 and C3 states for the CPU.
    Further on, set the century byte offset in FADT to point to the common location in CMOS.
    
    Signed-off-by: Lean Sheng Tan <lean.sheng.tan@intel.com>
    Change-Id: I72a57bf8ec61c3eabc4522c2695ae4b16979f188
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54958
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Tan, Lean Sheng authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    f156f73 View commit details
    Browse the repository at this point in the history
  4. arch/x86/acpi_bert_storage: change return type of bert_errors_present

    The return value is a boolean, so use the bool type. Also add the
    types.h header to have the bool type defined. Also change type of
    bert_region_broken static variable to bool.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I13d6472deeb26ba92d257761df069e32d9b2e5d4
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55023
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    felixheld authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    0a88c60 View commit details
    Browse the repository at this point in the history
  5. mb/siemens/{mc_apl2,...,mc_apl6}: Do early UART pad configuration

    With commit 405f229 (soc/intel/*: drop UART pad configuration from
    common code) the UART pad configuration was dropped from common SoC
    code. Through a second commit 5ff17ed (mb/siemens/mc_apl1: do UART
    pad configuration at board-level) the UART pad configuration was made
    for mc_apl1 baseboard. This change is also needed for all other mc_apl
    boards.
    
    Change-Id: If78726d9b141e4e7580cca3267f49c1a5b95d7fa
    Signed-off-by: Mario Scheithauer <mario.scheithauer@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54911
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
    mscheithauer authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    6be8a51 View commit details
    Browse the repository at this point in the history
  6. mb/siemens/mc_apl1: Move gpio.c from baseboard to mc_apl1

    Variant mc_apl1 is the only one that uses gpio.c from baseboard. For
    this reason, gpio.c is moved from baseboard to mc_apl1.
    
    Change-Id: Ie2ba8181dfe887df9abbbd648f2cbdc6ffc65530
    Signed-off-by: Mario Scheithauer <mario.scheithauer@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54945
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-by: Michael Niewöhner <foss@mniewoehner.de>
    mscheithauer authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    a701be1 View commit details
    Browse the repository at this point in the history
  7. Update vboot submodule to upstream main

    Updating from commit id e681c37:
        change node locked version expectations
    
    to commit id b38e3a63:
        cros_ec: Use boot mode to check if EC can be trusted
    
    Change-Id: Id6de185af85a61a3843b302fef6fa0d4d3c17aef
    Signed-off-by: Daisuke Nojiri <dnojiri@chromium.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55026
    Reviewed-by: Julius Werner <jwerner@chromium.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    dnojiri authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    e570663 View commit details
    Browse the repository at this point in the history
  8. soc/intel/alderlake: Add placeholder SPD file

    Change-Id: I38eb4bb684c511fff5ae148091c066682e9c35cb
    Signed-off-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55021
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Furquan Shaikh <furquan@google.com>
    Tim Wawrzynczak authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    fcb6a80 View commit details
    Browse the repository at this point in the history
  9. mb/intel/adlrvp_m: add ec device entry to devicetree

    TEST=Boot to OS and verify acpi tables.
    
    Signed-off-by: Bora Guvendik <bora.guvendik@intel.com>
    Change-Id: I3c78ac44afa3515acef9ea2d59f22f95e6b45e90
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54490
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-by: John Zhao <john.zhao@intel.corp-partner.google.com>
    Reviewed-by: John Zhao <john.zhao@intel.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    bguvendi authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    3585dc5 View commit details
    Browse the repository at this point in the history
  10. cpu/x86/smm: Fix uintptr_t type mismatches in print statements

    The 64-bit compiler x86_64-linux-gnu-gcc-10 aborts the build with the
    format warning below:
    
            CC         ramstage/cpu/x86/smm/smm_module_loader.o
        src/cpu/x86/smm/smm_module_loader.c: In function 'smm_create_map':
        src/cpu/x86/smm/smm_module_loader.c:146:19: error: format '%zx' expects argument of type 'size_t', but argument 3 has type 'uintptr_t' {aka 'long unsigned int'} [-Werror=format=]
          146 |     "    smbase %zx  entry %zx\n",
              |                 ~~^
              |                   |
              |                   unsigned int
              |                 %lx
          147 |     cpus[i].smbase, cpus[i].entry);
              |     ~~~~~~~~~~~~~~
              |            |
              |            uintptr_t {aka long unsigned int}
    
    In coreboot `uintptr_t` is defined in `src/include/stdint.h`:
    
         typedef unsigned long      uintptr_t;
    
    As `size_t` is defined as `long unsigned int` in i386-elf (32-bit), the
    length modifier `z` matches there. With x86_64-elf/x86_64-linux-gnu
    (64-bit) and `-m32` `size_t` is defined as `unsigned int` resulting in a
    type mismatch. Normally, `PRIxPTR` would need to be used as a length
    modifier, but as coreboot always defines `uintptr_t` to `unsigned long`
    (and in `src/include/inttypes.h` also defines `PRIxPTR` as `"lx"`), use
    the length modifier `l` to make the code more readable.
    
    Found-by: x86_64-linux-gnu-gcc-10 (Debian 10.2.1-6) 10.2.1 20210110
    Fixes: afb7a81 ("cpu/x86/smm: Introduce SMM module loader version 2")
    Signed-off-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Change-Id: I32bff397c8a033fe34390e6c1a7dfe773707a4e8
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54341
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    paulmenzel authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    2ea9595 View commit details
    Browse the repository at this point in the history
  11. cpu/x86/smm: Fix size_t type mismatch in print statement

    The 64-bit compiler x86_64-linux-gnu-gcc-10 aborts the build with the
    format warning below:
    
            CC         ramstage/cpu/x86/smm/smm_module_loader.o
        src/cpu/x86/smm/smm_module_loader.c: In function 'smm_module_setup_stub':
        src/cpu/x86/smm/smm_module_loader.c:360:70: error: format '%lx' expects argument of type 'long unsigned int', but argument 5 has type 'unsigned int' [-Werror=format=]
          360 |   printk(BIOS_ERR, "%s: state save size: %zx : smm_entry_offset -> %lx\n",
              |                                                                    ~~^
              |                                                                      |
              |                                                                      long unsigned int
              |                                                                    %x
    
    As `size_t` is defined as `long unsigned int` in i386-elf (32-bit), the
    length modifier `l` matches there. With x86_64-elf/x86_64-linux-gnu
    (64-bit) and `-m32` `size_t` is defined as `unsigned int` resulting in a
    type mismatch. So, use the correct length modifier `z` for the type
    `size_t`.
    
    Found-by: x86_64-linux-gnu-gcc-10 (Debian 10.2.1-6) 10.2.1 20210110
    Fixes: afb7a81 ("cpu/x86/smm: Introduce SMM module loader version 2")
    Signed-off-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Change-Id: I4172e0f4dc40437250da89b7720a5c1e5fbab709
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54342
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    paulmenzel authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    85ac067 View commit details
    Browse the repository at this point in the history
  12. cpu/x86/smm: Fix u32 type mismatch in print statement

    The 64-bit compiler x86_64-linux-gnu-gcc-10 aborts the build with the
    format warning below:
    
            CC         ramstage/cpu/x86/smm/smm_module_loader.o
        src/cpu/x86/smm/smm_module_loader.c:415:42: error: format '%lx' expects argument of type 'long unsigned int', but argument 4 has type 'u32' {aka 'unsigned int'} [-Werror=format=]
          415 |  printk(BIOS_DEBUG, "%s: stack_end = 0x%lx\n",
              |                                        ~~^
              |                                          |
              |                                          long unsigned int
              |                                        %x
          416 |   __func__, stub_params->stack_top - total_stack_size);
              |             ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
              |                                    |
              |                                    u32 {aka unsigned int}
    
    The size of `size_t` differs between i386-elf (32-bit) and
    x86_64-elf/x86_64-linux-gnu (64-bit).
    
    Unfortunately, coreboot hardcodes
    
        src/include/inttypes.h:#define PRIx32  "x"
    
    so `PRIx32` cannot be used.
    
    There use `z` as length modifier, as size_t should be always big enough
    to hold the value.
    
    Found-by: x86_64-linux-gnu-gcc-10 (Debian 10.2.1-6) 10.2.1 20210110
    Fixes: afb7a81 ("cpu/x86/smm: Introduce SMM module loader version 2")
    Change-Id: Ib504bc5e5b19f62d4702b7f485522a2ee3d26685
    Signed-off-by: Paul Menzel <pmenzel@molgen.mpg.de>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54343
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    paulmenzel authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    50e9d38 View commit details
    Browse the repository at this point in the history
  13. drivers/i2c/rx6110sa: Add a Kconfig switch to disable ACPI support

    In commit b64db83 a basic ACPI support was added to the driver.
    With this support an SSDT-entry is created for this RTC and it is now
    visible to the OS via ACPI. In Linux the PNP-devices, which are
    reported over ACPI, are scanned rather early and if the entry is found,
    the device is claimed even if there is no driver available yet.
    In this case, when the native RTC-driver without ACPI-support is loaded
    and tries to register this device, the RTC is already blocked by the
    PNP-drivers and cannot be used anymore. This leads to a non-usable RTC
    on kernels where the needed ACPI-extension is not yet merged into the
    RTC driver.
    
    This patch provides a way to disable the ACPI-support for the RTC if
    needed.
    
    Change-Id: Ic65794d409d13a78d17275c86ec14ee6f04cd2a6
    Signed-off-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55003
    Reviewed-by: Mario Scheithauer <mario.scheithauer@siemens.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    wzeh authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    964948d View commit details
    Browse the repository at this point in the history
  14. mb/siemens/mc_apl{1,2,3,5,6}: Disable ACPI-support for RX6110

    Already released Linux versions did not have the needed ACPI-extension
    in the RTC driver. If the ACPI-Support is enabled for the RTC, this
    older Linux will not be able to use this device as it will be claimed by
    the PNP-drivers. As there is no way to avoid that an older Linux kernel
    meets a newer coreboot in the field, we need to disable the ACPI
    support for the RTC for the mc_apl-based mainboards.
    
    Change-Id: I9f9939ba3234dc3654a4ef8a498649453941ebdf
    Signed-off-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55004
    Reviewed-by: Mario Scheithauer <mario.scheithauer@siemens.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    wzeh authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    80d5a05 View commit details
    Browse the repository at this point in the history
  15. lib/rtc: Add sanity check for time and date

    Add a function to check sanity of a given RTC date and time.
    Invalid values in terms of overrun ranges of the registers can lead to
    strange issues in the OS.
    
    Change-Id: I0a381d445c894eee4f82b50fe86dad22cc587605
    Signed-off-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54913
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    wzeh authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    1724b74 View commit details
    Browse the repository at this point in the history
  16. drivers/pc80/mc146818rtc: Check date and time for sanity

    There are cases where the RTC_VRT bit in register D stays set after a
    power failure while the real date and time registers can contain rubbish
    values (can happen when RTC is not buffered). If we do not detect this
    invalid date and/or time here and keep it, Linux will use these bad
    values for the initial timekeeper init. This in turn can lead to dates
    before 1970 in user land which can break a lot assumptions.
    
    To fix this, check date and time sanity when the RTC is initialized and
    reset the values if needed.
    
    Change-Id: I5bc600c78bab50c70372600347f63156df127012
    Signed-off-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54914
    Reviewed-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    wzeh authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    6860189 View commit details
    Browse the repository at this point in the history
  17. tests/Makefile.inc: Move generated headers to corresponding build dir

    Test-local config override headers were generated to paths missing
    /tests/ infix, thus creating divergent tree in build output directory.
    This patch fixes it moving generated config headers to the test-local
    build directory.
    
    Signed-off-by: Jakub Czapiga <jacz@semihalf.com>
    Change-Id: Ic5f3ba287ba3e9f5897cbaac64e88c2809f52d73
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54917
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Fagerburg <pfagerburg@chromium.org>
    semihalf-czapiga-jakub authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    203698a View commit details
    Browse the repository at this point in the history
  18. soc/amd/common/block/espi: Explicitly assert PLTRST#

    PLTRST# is currently asserted and latched when eSPI_RST# gets asserted.
    If eSPI_RST# isn't used on a platform or it doesn't properly assert
    in all cases, then PLTRST# will never be asserted. This could result in
    the AP and EC being out of sync.
    
    BUG=b:188188172, b:188935533
    TEST=Warm reset guybrush with partial #22 rework. Verify that peripheral
    channel is correctly reset.
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I20d12edf3efc6100096e24aa8d1aec76bbde264f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54884
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Rob Barnes <robbarnes@google.com>
    Raul E Rangel authored and pgeorgi committed May 30, 2021
    Copy the full SHA
    43aa527 View commit details
    Browse the repository at this point in the history

Commits on May 31, 2021

  1. soc/amd/cezanne: Add pre-FSPM call to the mainboard

    The Guybrush platform needs to set up some GPIOs immediately before the
    FSP-M runs.  Add a platform specific call.  This will be used in a
    follow-on commit.
    
    BUG=b:184796302, b:184598323
    TEST=Build
    
    Signed-off-by: Martin Roth <martinroth@chromium.org>
    Change-Id: I37d2625ff426347852e98a9a50f15368e0213449
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54638
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Martin Roth authored and Martin Roth committed May 31, 2021
    Copy the full SHA
    9d9dae1 View commit details
    Browse the repository at this point in the history

Commits on Jun 1, 2021

  1. cpu/intel/car/romstage.c: Drop unused function argument

    This is a leftover when migrating to C_ENV_BOOTBLOCK
    
    Change-Id: Ibc610cd15448632dc13d87094853d9b981e2679b
    Signed-off-by: Arthur Heymans <arthur@aheymans.xyz>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55062
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    ArthurHeymans authored and pgeorgi committed Jun 1, 2021
    Copy the full SHA
    cdb8150 View commit details
    Browse the repository at this point in the history
  2. soc/intel/elkhartlake: Update FSP-S UPD LPSS related configs

    Add Silicon upd settings for LPSS (GSPI/UART/I2C).
    
    Signed-off-by: Lean Sheng Tan <lean.sheng.tan@intel.com>
    Change-Id: Ib0c3cd1d37ff9892d09d6d86ac50e230549c7e53
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/54959
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Tan, Lean Sheng authored and pgeorgi committed Jun 1, 2021
    Copy the full SHA
    09133c7 View commit details
    Browse the repository at this point in the history