Commits on Jan 25, 2022

  1. soc/intel/elkhartlake: Introduce Intel PSE

    The IntelĀ® Programmable Services Engine (IntelĀ® PSE) is a
    dedicated offload engine for IoT functions powered by an ARM
    Cortex-M7 microcontroller. It provides independent, low-DMIPS
    computing and low-speed I/Os for IoT applications, plus
    dedicated services for real-time computing and time-sensitive
    synchronization.
    
    The PSE hosts new functions, including remote out-of-band
    device management, network proxy, embedded controller lite
    and sensor hub.
    
    This CL enables the user to provide the base address of the
    PSE FW blob which will then be loaded by the FSP-S onto the
    ARM controller. PSE FW will do the initialization work of
    PSE controller and its peripherals. The loading of PSE FW
    should have negligible impact on boot time unless PSE
    controller could not locate the PSE FW and FSP will attempt to
    redo PSE FW loading and wait for PSE handshake until it times
    out. Once PSE controller locate the PSE FW, it will do
    initialization concurrently by itself with coreboot booting.
    
    It also adds PSE related FSP-S UPD settings which enable the
    setup of peripheral ownership (assigned to the PSE or x86
    subsystem) and interrupts. These assignments need to take
    place at a given point in the boot process and cannot be
    changed later.
    
    To verify if PSE FW is loaded properly, the user could enable
    PchPseShellEnabled flag and the log will be printed at PSE UART
    2.
    
    For further info please refer to doc #611825 (for HW overview)
    and #614110 (for PSE EDS).
    
    Signed-off-by: Lean Sheng Tan <lean.sheng.tan@intel.com>
    Change-Id: Ifea08fb82fea18ef66bab04b3ce378e79a0afbf7
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/55367
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Lean Sheng Tan authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    5cd7579 View commit details
    Browse the repository at this point in the history
  2. soc/intel/elkhartlake: Add PSE TSN support

    Enable PSE GBE with following changes:
    1. Configure PCH GBE related FSP UPD flags
    2. Add PSE GBE ACPI devices
    3. Refactor PCH GBE FSP-S code and merge it together
       with PSE GBE code
    
    Signed-off-by: Lean Sheng Tan <lean.sheng.tan@intel.com>
    Change-Id: If3807ff5a4578be7b2c67064525fa5099950986a
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/56633
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Lean Sheng Tan authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    7760fe4 View commit details
    Browse the repository at this point in the history
  3. soc/intel/common: Include Alder Lake-N device IDs

    Add Alder Lake-N System Agent, PCIE, UFS, IPU and CNVI device IDs.
    Document: Alder Lake N Platform EDS Volume 1 (Doc# 645548)
    
    Signed-off-by: Usha P <usha.p@intel.com>
    Change-Id: I0a383816f818b794cf1211766c27937b3b8daa31
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61161
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Subrata Banik <subratabanik@google.com>
    Reviewed-by: Kangheui Won <khwon@chromium.org>
    usha555 authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    8f2df28 View commit details
    Browse the repository at this point in the history
  4. mb/google/brya/variants/volmar: Configure GPIOs according to schematics

    Update initial gpio configuration for volmar
    
    BUG=b:211891086
    TEST=FW_NAME=volmar emerge-brya coreboot
    
    Signed-off-by: David Wu <david_wu@quanta.corp-partner.google.com>
    Change-Id: I1bd3f1b3807b546d5a827ac89f0dc9bc8aaec40a
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61206
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nick Vaccaro <nvaccaro@google.com>
    Reviewed-by: Ren Kuo <ren.kuo@quanta.corp-partner.google.com>
    David Wu authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    10b2c73 View commit details
    Browse the repository at this point in the history
  5. mb/google/brya/var/volmar: Enable EC keyboard backlight

    Enable EC keyboard backlight for volmar.
    
    BUG=b:211891086
    TEST=FW_NAME=volmar emerge-brya coreboot chromeos-bootimage
    
    Signed-off-by: David Wu <david_wu@quanta.corp-partner.google.com>
    Change-Id: I24ec7c8ca770cb438aabcf16b252032eef6d734d
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61298
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-by: Ren Kuo <ren.kuo@quanta.corp-partner.google.com>
    David Wu authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    ff99f12 View commit details
    Browse the repository at this point in the history
  6. soc/intel/adl: Replace dt HeciEnabled by HECI1 disable config

    Since Tiger Lake platform, the HECI1 device can be disabled on
    Alder Lake platform using two different mechanism:
    A. Using PMC IPC command 0xA9.
    B. Sending SBI message under SMM.
    
    In current scope of Alder Lake the default implementation is using
    (B) sending sbi message under SMM. A follow up patch to add the
    possible options and let platform to choose the applicable one.
    
    List of changes:
    1. Drop `HeciEnabled` from dt and dt chip configuration.
    2. Replace all logic that disables HECI1 based on the `HeciEnabled`
    chip config with `DISABLE_HECI1_AT_PRE_BOOT` config.
    3. Default enable HECI1 device in `chipset.cb` to ensure the HECI1
    device can undergo the PCI enumeration and later based on the
    mainboard policy the HECI1 device can be disabled.
    
    Mainboards that choose to make HECI1 enable during boot don't override
    `DISABLE_HECI1_AT_PRE_BOOT` config.
    
    Signed-off-by: Subrata Banik <subratabanik@google.com>
    Change-Id: Ie673e634fbc0bdece419c379d417b08dfb4819e2
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60731
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Lean Sheng Tan <sheng.tan@9elements.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    subrata-b authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    7f8ab00 View commit details
    Browse the repository at this point in the history
  7. drivers/intel/fsp2_0: Make FSP Notify Phase APIs optional

    The FSP API is used to notify the FSP about different phases in the
    boot process. The current FSP specification supports three notify
    phases:
     - Post PCI enumeration
     - Ready to Boot
     - End of Firmware
    
    This patch attempts to make calling into the FSP Notify Phase APIs
    optional by using native coreboot implementations to perform the
    required lock down and chipset register configuration prior boot to
    payload.
    
    BUG=b:211954778
    TEST=Able to build brya without any compilation issue and coreboot
    log with this code changes when SKIP_FSP_NOTIFY_PHASE_READY_TO_BOOT
    and SKIP_FSP_NOTIFY_PHASE_END_OF_FIRMWARE config enabled.
    
    coreboot skipped calling FSP notify phase: 00000040.
    coreboot skipped calling FSP notify phase: 000000f0.
    
    Signed-off-by: Subrata Banik <subratabanik@google.com>
    Change-Id: Ia95e9ec25ae797f2ac8e1c74145cf21e59867d64
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60402
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Lean Sheng Tan <sheng.tan@9elements.com>
    Reviewed-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    subrata-b authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    e8feab0 View commit details
    Browse the repository at this point in the history
  8. lib/cbmem_console,console: Resurrect CONSOLE_CBMEM_DUMP_TO_UART

    Chromebooks normally run with non-serial enabled firmware because
    writing to the UART console is very slow. This unfortunately makes
    debugging boot errors more difficult. We tend to rely on port 80s and/or
    the vboot recovery code.
    
    When CONSOLE_CBMEM_DUMP_TO_UART is selected it will dump the entire
    cbmem console to the UART whenever `vboot_reboot()` is called. We don't
    incur any boot time penalty in the happy path, but still retain the
    ability to access the logs when an error occurs.
    
    The previous implementation was using a hard coded UART index and
    `get_uart_baudrate` was always returning 0 since `CONFIG_TTYS0_BAUD`
    wasn't defined. This change makes it so the UART console properties are
    available when CONSOLE_CBMEM_DUMP_TO_UART is set. This results in the
    following .config diff:
    
        +CONFIG_UART_FOR_CONSOLE=0
        +CONFIG_TTYS0_BASE=0x3f8
        +CONFIG_TTYS0_LCS=3
        +CONFIG_CONSOLE_SERIAL_115200=y
        +CONFIG_TTYS0_BAUD=115200
    
    This functionality is especially helpful on Guybrush. PSP Verstage is
    run on S0i3 resume. Today, if there is an error, the cbmem console is
    lost since it lives in the PSP SRAM.
    
    BUG=b:213828947, b:215599230
    TEST=Build non-serial guybrush FW and verify no serial output happens in
    happy path. Inject a vboot error and perform an S0i3 suspend/resume.
    Verify CBMEM console gets dumped to the correct UART.
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I997942204603362e51876a9ae25e493fe527437b
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61305
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Julius Werner <jwerner@chromium.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Raul E Rangel authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    6ec3dd2 View commit details
    Browse the repository at this point in the history
  9. northbridge/intel/i945: Change types to uintptr_t where appropriate

    Prepares compilation for x86_64 by avoiding casts to different sizes.
    
    Current patch fixes:
    1.
    src/northbridge/intel/i945/raminit.c: In function 'ram_read32':
    src/northbridge/intel/i945/raminit.c:77:16: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
       77 |         read32((void *)offset);
          |                ^
    
    2.
    src/northbridge/intel/i945/rcven.c: In function 'sample_strobes':
    src/northbridge/intel/i945/rcven.c:29:24: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
       29 |                 read32((void *)addr);
          |                        ^
    src/northbridge/intel/i945/rcven.c:30:24: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
       30 |                 read32((void *)(addr + 0x80));
          |                        ^
    
    3.
    src/northbridge/intel/i945/gma.c: In function 'intel_gma_init_lvds':
    src/northbridge/intel/i945/gma.c:98:16: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
       98 |                (void *)pgfx, mmiobase, piobase, pphysbase);
          |                ^
    src/northbridge/intel/i945/gma.c:359:25: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
      359 |                         (void *)pgfx, hactive * vactive * 4);
          |                         ^
    src/northbridge/intel/i945/gma.c:360:24: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
      360 |                 memset((void *)pgfx, 0x00, hactive * vactive * 4);
          |                        ^
    src/northbridge/intel/i945/gma.c: In function 'intel_gma_init_vga':
    src/northbridge/intel/i945/gma.c:384:17: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
      384 |                 (u32)mmiobase, piobase, pphysbase);
          |
    
    4.
    src/northbridge/intel/i945/northbridge.c: In function 'mch_domain_read_resources':
    src/northbridge/intel/i945/northbridge.c:64:23: warning: cast from pointer to integer of different size [-Wpointer-to-int-cast]
       64 |         cbmem_topk = ((uint32_t)cbmem_top() / KiB);
          |                       ^
    
    Change-Id: I5ac7a1cb5d85a346114f909047d5a7c21ddb43e9
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61117
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    ElyesH authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    964055d View commit details
    Browse the repository at this point in the history
  10. soc/intel/ehl: Add Kconfig option to disable reset on TCO expiration

    The TCO timer is the default watchdog of an x86 host and can reset the
    system once it has expired for the second time. There are applications
    where this reset is not acceptable while the TCO is used. In these
    applications the TCO expire event generates an interrupt and software
    takes care. There is a bit in the TCO1_CNT register on Elkhart Lake to
    prevent this reset on expiration (called NO_REBOOT, see doc #636722 ).
    This bit can either be strapped on hardware or set in this register to
    avoid the reset on expiration. While the hardware strap cannot be
    overridden in software, the pure software solution is more flexible.
    Unfortunately, the location for this bit differs among the different
    platforms. This is why it has to be handled on soc level rather than on
    TCO common code level.
    
    This commit adds a Kconfig option where NO_REBOOT can be enabled. This
    makes it easy to reach this feature over to the mainboard where it can
    be selected if needed.
    
    Change-Id: Iaa81bfbe688edd717aa02db86f0a93fecdfcd16b
    Signed-off-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61177
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    wzeh authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    0099832 View commit details
    Browse the repository at this point in the history
  11. mb/siemens/mc_ehl: Prevent reset when TCO expires

    In order to guarantee data integrity an expired TCO must not hard reset
    the board. Select the Kconfig switch to prevent this reset.
    
    Change-Id: I04080c6bcd486e3a406438cc7a703165bb6945a0
    Signed-off-by: Werner Zeh <werner.zeh@siemens.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61178
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    wzeh authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    52ac424 View commit details
    Browse the repository at this point in the history
  12. mb/google/brya/var/taniks: Run time probe for NVMe SSD and MMC

    Taniks will use two PCIE port signals with one slot, one CLK and one
    CLKREQ at next build. In order to accommodate this, probe statements
    are added to the devicetree. This only affects NVME SSD and EMMC.
    
    BUG=b:215040000
    TEST=Build FSP with debug output enabled, and observe the correct root
    ports being initialized depending on the FW_CONFIG values for BOOT_EMMC
    and BOOT_NVME.
    
    Cq-Depend:chromium:3397561
    Signed-off-by: Joey Peng <joey.peng@lcfc.corp-partner.google.com>
    Change-Id: I2ead505088f19fd3bf9768b541838395c82ef051
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61170
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Joey Peng authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    0251ecd View commit details
    Browse the repository at this point in the history
  13. mb/google/brya/var/taniks: swap TPM i2c with TS i2c for next build

    Taniks is going to exchange i2c port for touchscreen and cr50.
    
    BUG=b:215039999
    TEST=emerge-brya coreboot
    
    Cq-Depend:chromium:3397562
    Signed-off-by: Joey Peng <joey.peng@lcfc.corp-partner.google.com>
    Change-Id: I179949887f6d8f4bbdff7d806319e2ac368ebc2c
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61169
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Joey Peng authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    51ede8a View commit details
    Browse the repository at this point in the history
  14. mb/google/brya/var/taniks: Modify DPTF settings for taniks

    Update DPTF settings provided by thermal team
    
    BUG=b:215033682
    TEST=build and tested on taniks board
    
    Signed-off-by: Joey Peng <joey.peng@lcfc.corp-partner.google.com>
    Change-Id: Ic6860980b06e876dd4c21af26752ab6c1a3f7fff
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61337
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Joey Peng authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    b65c301 View commit details
    Browse the repository at this point in the history
  15. mb/system76: Enable SrcClk pin for CPU PCIe RPs

    This reverts commit bd9b044 ("mb/system76: rtd3: Remove SrcClk pin
    on CPU RP").
    
    Previously, RTD3 expected a PCH index for the root port and did not work
    with the CPU PCIe RP present on TGL, so SrcClk pin was disabled.
    
    Set them now that RTD3 supports mapping the index for the CPU RP.
    
    Change-Id: Ia7519b9f5a2be52cd5575615c28d20371a26996b
    Signed-off-by: Tim Crawford <tcrawford@system76.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60914
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-by: Jeremy Soller <jeremy@system76.com>
    crawfxrd authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    2a404b5 View commit details
    Browse the repository at this point in the history
  16. soc/amd/cezanne: FSP: Add UPD entry for eDP tuning

    The FSP gets these values from the UPD and sets the internal values.
    
    The document about eDP tuning is attached in issue tracker of this
    ticket, at the issue tracker b/203061533#comment6.
    
    BUG=b:203061533
    
    Cq-Depend: chrome-internal:4303901
    Change-Id: I9b85faac4f2fa1fb2c14bb85b615346d4379baac
    Signed-off-by: Zheng Bao <fishbaozi@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/59918
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Huang <patrick.huang@amd.corp-partner.google.com>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    fishbaoz authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    8b54c0e View commit details
    Browse the repository at this point in the history
  17. mb/google/guybrush/var/nipperkin: Add Board values for eDP tuning

    Reference test document, update tuning registers from pass experiment
    setting of phy_settings.
    The document about eDP tuning can be gotten from the issue tracker of
    this ticket, at the issue tracker b/203061533#comment6.
    
    BUG=b:203061533
    
    Change-Id: I7aa8c594d9f5caa6b2523dac079aef89e623c56f
    Signed-off-by: Zheng Bao <fishbaozi@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/59919
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Patrick Huang <patrick.huang@amd.corp-partner.google.com>
    Reviewed-by: Jason Glenesk <jason.glenesk@gmail.com>
    Reviewed-by: Raul Rangel <rrangel@chromium.org>
    fishbaoz authored and felixheld committed Jan 25, 2022
    Copy the full SHA
    73674a7 View commit details
    Browse the repository at this point in the history

Commits on Jan 26, 2022

  1. soc/amd/common: Don't reserve VERSTAGE region when using PSP verstage

    The VERSTAGE region is only needed when running verstage in the x86.
    
    This change reduces the early ram size by 512 KiB when using PSP
    verstage.
    
    BUG=none
    TEST=Boot guybrush to OS
    
    Signed-off-by: Raul E Rangel <rrangel@chromium.org>
    Change-Id: I45ce421397807dbb1eb48aedd05209b91e89aa4f
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61190
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Raul E Rangel authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    a36f9ab View commit details
    Browse the repository at this point in the history
  2. soc/mediatek/mt8186: Update PWRAP arbiter enable bit

    There is no wakeup source when we test function of suspend and resume.
    The root cause is that the monitor enable bit of PWRAP is not configured
    correctly.
    
    BUG=b:213255218, b:214978483
    TEST=receive wakeup source from MT6366 successfully
    
    Signed-off-by: Rex-BC Chen <rex-bc.chen@mediatek.com>
    Change-Id: I324d18fa5d3cd745c35fcf0f207e1b444b5e898b
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61330
    Reviewed-by: Yu-Ping Wu <yupingso@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Rex-BC Chen authored and hungte committed Jan 26, 2022
    Copy the full SHA
    978930e View commit details
    Browse the repository at this point in the history
  3. soc/amd/cezanne,picasso,sabrina: factor out get_threads_per_core

    This code is common to at least all Zen-based APUs (Picasso, Cezanne,
    Sabrina) and is also useful outside of the SoC-specific dynamic ACPI
    table generation code.
    
    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: Ie96d4429fb6ed9223efed9b3c754e04052d7ca7c
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61357
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Rob Barnes <robbarnes@google.com>
    Reviewed-by: Chris Wang <chris.wang@amd.corp-partner.google.com>
    Reviewed-by: Eric Peers <epeers@google.com>
    felixheld committed Jan 26, 2022
    Copy the full SHA
    d4b5ad0 View commit details
    Browse the repository at this point in the history
  4. mb/google/guybrush/dewatt: Add variant to disable HDMI

    For one specific type of APU, it doesn't have HDMI. When we detect
    this APU, we need to explicitly disable HDMI in DDI settings,
    otherwise the system would freeze.
    
    get_cpu_count() == 4 && get_threads_per_core() == 2: This case is for
    2 Core and 4 Thread CPU (2C/4T for short).
    get_cpu_count() == 2: This is for 2C/2T. This is for a possible future case.
    
    BUG=b:208677293
    
    Change-Id: I8d0fa96818a768b7960d92821b927dbc622675ae
    Signed-off-by: Zheng Bao <fishbaozi@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61260
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Reviewed-by: Chris Wang <chris.wang@amd.corp-partner.google.com>
    fishbaoz authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    a3525af View commit details
    Browse the repository at this point in the history
  5. soc/intel/common/gpio: Perform GPIO PAD lock outside SMM

    This patch performs GPIO PAD lock configuration in non-smm mode.
    Typically, coreboot enables SMI at latest boot phase post FSP-S,
    hence, FSP-S might get chance to perform GPP lock configuration.
    
    With this code changes, coreboot is able to perform GPIO PAD
    lock configuration early in the boot flow, prior to calling FSP-S.
    
    Also, this patch ensures to have two possible options as per GPIO
    BWG to lock the GPIO PAD configuration.
    1. Using SBI message with opcode 0x13
    2. Using Private Configuration Register (PCR)
    
    BUG=b:211573253, b:211950520
    TEST=Able to build and boot brya variant with this code change.
    
    Signed-off-by: Subrata Banik <subratabanik@google.com>
    Change-Id: I71b4e2f24303b6acb56debd581bd6bc818b6f926
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60801
    Reviewed-by: Nick Vaccaro <nvaccaro@google.com>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    subrata-b committed Jan 26, 2022
    Copy the full SHA
    fe678cb View commit details
    Browse the repository at this point in the history
  6. soc/intel/common/gpio: Rework PAD config macro to add lock support

    This patch extends `struct pad_config` to add new variable for gpio
    lock action.
    
    Additionally, it creates new GPIO PAD configuration macros that perform
    GPIO pad configuration and pad lock configuration as well.
    
    List of new macros are:
    1.Ā PAD_CFG_NF_LOCK
    2.Ā PAD_CFG_GPO_LOCK
    3.Ā PAD_CFG_GPI_LOCK
    4.Ā PAD_CFG_GPI_TRIG_OWN_LOCK
    5.Ā PAD_CFG_GPI_GPIO_DRIVER_LOCK
    6.Ā PAD_CFG_GPI_INT_LOCK
    7.Ā PAD_CFG_GPI_APIC_LOCK
    8.Ā PAD_CFG_GPI_IRQ_WAKE_LOCK
    
    Mainboard users can use the above macros to lock the PAD after
    configuration.
    
    So far on IA chipset, the default GPIO pad lock configuration reset
    type is POWERGOOD hence, it's recommended as per GPIO BWG (doc: 630603)
    to configure the GPP PAD reset type the same as lock configuration
    reset type to avoid GPP reset value misconfiguration issue.
    
    BUG=b:211573253, b:211950520
    
    Signed-off-by: Subrata Banik <subratabanik@google.com>
    Change-Id: Ibf8b0a845005ad545266d995449d0aa711f45a61
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60774
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Reviewed-by: Nick Vaccaro <nvaccaro@google.com>
    subrata-b committed Jan 26, 2022
    Copy the full SHA
    7e8a0e6 View commit details
    Browse the repository at this point in the history
  7. soc/intel/alderlake: Skip FSP to unlock GPIO Pads

    This patch makes FSP-S skip unlocking the GPIO Pads.
    
    BUG=b:211573253, b:211950520
    TEST=FSP-S debug log below:
    
    Without this change:
    UnlockGpioPads= 1
    
    With this changes
    UnlockGpioPads= 0
    
    Signed-off-by: Subrata Banik <subratabanik@google.com>
    Change-Id: I236a19a67372e9668e304d0054d477daff6a0266
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60993
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Reviewed-by: Nick Vaccaro <nvaccaro@google.com>
    subrata-b committed Jan 26, 2022
    Copy the full SHA
    393b093 View commit details
    Browse the repository at this point in the history
  8. soc/intel/alderlake: Choose non-posted write to lock GPIO PAD

    Set the SOC_INTEL_COMMON_BLOCK_GPIO_LOCK_USING_SBI config on Alder Lake
    to instruct Pad Configuration Lock to use non-posted sideband writes as
    posted write is not supported on Alder Lake while locking GPIO pads.
    
    BUG=b:211573253, b:211950520
    TEST=None
    
    Signed-off-by: Subrata Banik <subratabanik@google.com>
    Change-Id: Id8d394b97de9c328b3f75df3649d7efc782f006b
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60966
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Nick Vaccaro <nvaccaro@google.com>
    Reviewed-by: Maulik V Vaghela <maulik.v.vaghela@intel.com>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    subrata-b committed Jan 26, 2022
    Copy the full SHA
    af2f8b9 View commit details
    Browse the repository at this point in the history
  9. soc/mediatek/mt8186: Use BIT() macro for arbiter enable bit

    Replace (1 << x) with BIT(x) in pmic_wrap.h.
    
    BUG=none
    TEST=build pass
    
    Signed-off-by: Rex-BC Chen <rex-bc.chen@mediatek.com>
    Change-Id: I463589f02065a228a8af74447b4586e5b54e0b3b
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61351
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Yu-Ping Wu <yupingso@google.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Rex-BC Chen authored and hungte committed Jan 26, 2022
    Copy the full SHA
    707aa2a View commit details
    Browse the repository at this point in the history
  10. soc/intel/alderlake: Add GPIO Controller device ID for ADL-N

    Add PCH ACPI Device ID for Alder Lake N SOC GPIO Controller.
    Document: Alder Lake N Platform EDS Volume 1 (Doc# 645548)
    
    Signed-off-by: Usha P <usha.p@intel.com>
    Change-Id: I6eb15751dd303b4b445cb64f25a040302e50c09d
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61172
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Kangheui Won <khwon@chromium.org>
    Reviewed-by: Maulik V Vaghela <maulik.v.vaghela@intel.com>
    usha555 authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    f1b11e7 View commit details
    Browse the repository at this point in the history
  11. mb/google/guybrush/var/dewatt: Update touchpad GPIO configuration

    Update GPIO configuration to fix Synaptics touchpad can't wakeup system from s0i3.
    
    BUG=b:214143249
    TEST=emerge-guybrush coreboot chromeos-bootimage; Tested Synaptics touchpad wakeup from S3 with proto build.
    
    Signed-off-by: Kenneth Chan <kenneth.chan@quanta.corp-partner.google.com>
    Change-Id: I29734595d37283adc6fd4a0ed17f51a5c9061796
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61174
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Rob Barnes <robbarnes@google.com>
    Kenneth Chan authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    d03b824 View commit details
    Browse the repository at this point in the history
  12. mb/google/guybrush/var/dewatt: Update Elan touchpad interrupt trigger

    Update Elan touchpad interrupt trigger to level low from edge low to keep consistency with Synaptics touchpad. Checked with Elan PM Iris and other projects(spherion), the touchpad can be set to edge or level low trigger.
    
    Sepherion Elan touchpad IRQ setting: https://source.chromium.org/chromiumos/chromiumos/codesearch/+/main:src/third_party/kernel/v5.4/arch/arm64/boot/dts/mediatek/mt8192-asurada.dtsi;l=415?q=mt8192-asurada.dtsi&ss=chromiumos%2Fchromiumos%2Fcodesearch:src%2Fthird_party%2Fkernel%2F
    
    BUG=b:214143249
    TEST=emerge-guybrush coreboot chromeos-bootimage; Tested Elan and Synaptics touchpad wakeup from s0i3 well with proto build.
    
    Signed-off-by: Kenneth Chan <kenneth.chan@quanta.corp-partner.google.com>
    Change-Id: Ifac49b131cadc1f8838bb6243ad6d17feb272bd2
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61365
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Rob Barnes <robbarnes@google.com>
    Kenneth Chan authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    18167d4 View commit details
    Browse the repository at this point in the history
  13. MAINTAINERS: add maintainers for soc/amd/sabrina

    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: I8630b8ac472af94bbeede2bcadf4d0a750b44e5c
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61359
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    felixheld committed Jan 26, 2022
    Copy the full SHA
    2e88d06 View commit details
    Browse the repository at this point in the history
  14. MAINTAINERS: add maintainers for mb/amd/chausie

    Signed-off-by: Felix Held <felix-coreboot@felixheld.de>
    Change-Id: Ie39e42407fe4677d4c8e991824588d2d598a73ae
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61360
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Marshall Dawson <marshalldawson3rd@gmail.com>
    felixheld committed Jan 26, 2022
    Copy the full SHA
    d575c8d View commit details
    Browse the repository at this point in the history
  15. mb/google/brya/var/kano: Reduce reset delay time to 20ms for ELAN TS

    Set register "reset_delay_ms" to 20 to reduce power resume time.
    
    BUG=b:204009580
    TEST=tested on kano
    
    Signed-off-by: David Wu <david_wu@quanta.corp-partner.google.com>
    Change-Id: Ib0695edd7c342c65df9138b1590281c5f442769b
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61338
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    David Wu authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    2e7b78b View commit details
    Browse the repository at this point in the history
  16. util/mb/google: add support for brask

    Add the file templates for creating a new variant of Brask.
    
    BUG=b:215091592
    TEST=new_variant.py and build coreboot pass for the new variant.
    
    Change-Id: I67e4ed450d6033fed7419bd7c76c127ecd942fe8
    Signed-off-by: Zhuohao Lee <zhuohao@chromium.org>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61184
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Zhuohao Lee authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    d9e50b1 View commit details
    Browse the repository at this point in the history
  17. Revert "mb/google/brya/var/brask: Configure the ISOLATE pin of LAN"

    This reverts commit 2bf2e6d.
    
    According to the latest schematics, Brask supports D3-Hot for RTL8125
    and does not need to operate the ISOLATE pin.
    
    BUG=b:193750191
    BRANCH=None
    TEST=emerge-brask coreboot chromeos-bootimage
         Test with command suspend_stress_test
    
    Change-Id: Ica6bfb810887861f6b17ff527373824547e2406c
    Signed-off-by: Alan Huang <alan-huang@quanta.corp-partner.google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61023
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    AlanhuangQuanta authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    6e4b81c View commit details
    Browse the repository at this point in the history
  18. soc/intel/denverton_ns: Fix logging level

    Level should match that used in print_num_status_bits().
    
    Change-Id: I1beb65e4c141e195dd59eaa2bf55fff6e7dc910d
    Signed-off-by: Kyƶsti MƤlkki <kyosti.malkki@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61144
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Jeff Daly <jeffd@silicom-usa.com>
    Reviewed-by: HAOUAS Elyes <ehaouas@noos.fr>
    kmalkki authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    69d92de View commit details
    Browse the repository at this point in the history
  19. soc/intel/cannonlake: Add PcieRpHotPlug config to FSP-M

    Commit b67c5ed [3rdparty/fsp: Update submodule pointer to newest master]
    updated the FSP binaries/headers for Comet Lake, which included a change
    moving PcieRpHotPlug from FSP-S to FSP-M. Unfortunately the existing
    UDP in FSP-S was left in and deprecated, which allowed the change to go
    unnoticed until it was discovered that hotplug wasn't working.
    
    Since other related platforms (WHL, CFL) share the SoC code but use
    different FSP packages, add the setting of the PcieRpHotPlug UPD to
    romstage/FSP-M and guard it with '#if CONFIG(SOC_INTEL_COMETLAKE)'.
    
    Test: build/boot Purism Librem 14, verify WiFi killswitch operates
    as expected / WiFi is re-enabled when turning switch to on position.
    
    Change-Id: I4e1c2ea909933ab21921e63ddeb31cefe1ceef13
    Signed-off-by: Matt DeVillier <matt.devillier@puri.sm>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61377
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Michael Niewƶhner <foss@mniewoehner.de>
    Reviewed-by: Paul Menzel <paulepanter@mailbox.org>
    Reviewed-by: Nico Huber <nico.h@gmx.de>
    MrChromebox authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    74b85f2 View commit details
    Browse the repository at this point in the history
  20. vc/amd/agesa: fix out-of-bounds read

    Fix the out-of-bounds read issue found by Coverity.
    
    TEST=none
    
    Signed-off-by: Jason Nien <finaljason@gmail.com>
    Change-Id: I01e134cb6b025bf7cb5030cd9378297d7f6df509
    Reported-by: Coverity (CID:1376956)
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/58803
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Jason Nien authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    98d76cb View commit details
    Browse the repository at this point in the history
  21. src: Add missing 'void' in function definition

    Change-Id: I7fa1f9402b177a036f08bf99c98a6191c35fa0b5
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61371
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Jason Glenesk <jason.glenesk@gmail.com>
    Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
    ElyesH authored and felixheld committed Jan 26, 2022
    Copy the full SHA
    eb9e63f View commit details
    Browse the repository at this point in the history

Commits on Jan 27, 2022

  1. mb/google/zork/var/vilboz: Add new memory K4AAG165WB-BCWE

    Add new ram_id:1100 for memory part K4AAG165WB-BCWE.
    
    BUG=b:212507858
    TEST=Generate new spd file and build coreboot.
    Then boot from the DUT with new memory K4AAG165WB-BCWE
    
    Signed-off-by: Frank Wu <frank_wu@compal.corp-partner.google.com>
    Change-Id: I4e409a5a5a3b3d1b0013d2c020eeb4c0aeec51ba
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/60191
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Reviewed-by: Kangheui Won <khwon@chromium.org>
    Frank-Wu-718 authored and subrata-b committed Jan 27, 2022
    Copy the full SHA
    2cd3384 View commit details
    Browse the repository at this point in the history
  2. soc/intel/skylake: move heci_init() from bootblock to romstage

    Aligns with all other soc/intel/common platforms calling heci_init().
    
    Test: build/boot Purism Librem 13v2
    
    Change-Id: I43029426c5683077c111b3382cf4c8773b3e5b20
    Signed-off-by: Matt DeVillier <matt.devillier@puri.sm>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61378
    Reviewed-by: Subrata Banik <subratabanik@google.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    MrChromebox authored and subrata-b committed Jan 27, 2022
    Copy the full SHA
    96eb676 View commit details
    Browse the repository at this point in the history
  3. soc/intel/common/cse: Drop CSE library usage in bootblock

    This patch drops the CSE common code block from getting compiled
    in bootblock without any SoC code using heci communication so
    early in the boot flow.
    
    BUG=none
    TEST=Able to build brya, purism/librem_skl without any compilation issue.
    
    Signed-off-by: Subrata Banik <subratabanik@google.com>
    Change-Id: Ib4d221c6f19b60aeaf64696e64d0c4209dbf14e7
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61382
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    Reviewed-by: EricR Lai <ericr_lai@compal.corp-partner.google.com>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    Reviewed-by: Matt DeVillier <matt.devillier@gmail.com>
    subrata-b committed Jan 27, 2022
    Copy the full SHA
    d87b0c3 View commit details
    Browse the repository at this point in the history
  4. mb/google/brya/var/brask: set tcc_offset value to 10ā„ƒ

    Set tcc_offset value to 10 in devicetree for Thermal Control Circuit
    (TCC) activation feature. This value is suggested by Thermal team.
    
    BUG=b:214890058
    BRANCH=None
    TEST=build pass
    
    Signed-off-by: David Wu <david_wu@quanta.corp-partner.google.com>
    Change-Id: I86acb172ed427d45973b9360e0413978cbd46645
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61142
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
    David Wu authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    2bff154 View commit details
    Browse the repository at this point in the history
  5. mb/google/brya/variants/volmar: Init devicetree for volmar

    Init basic override devicetree based on schematics
    
    BUG=b:211891086
    TEST=FW_NAME="volmar" emerge-brya coreboot chromeos-bootimage
    
    Signed-off-by: David Wu <david_wu@quanta.corp-partner.google.com>
    Change-Id: I40b364e3df2f04a6b828f4f288667b96b6e0bd22
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61299
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Ren Kuo <ren.kuo@quanta.corp-partner.google.com>
    David Wu authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    79effad View commit details
    Browse the repository at this point in the history
  6. mb/google/dedede/var/metaknight: Set core display clock to 172.8 MHz

    When using the default initial core display clock frequency, Metaknight
    has a rare stability issue where the startup of Chrome OS in secure mode
    may hang. Slowing the initial core display clock frequency down to
    172.8 MHz as per Intel recommendation avoids this problem.
    
    The CdClock=0xff is set in dedede baseboard,and we overwrite it as 0x0
    (172.8 MHz) for metaknight.
    
    BUG=None
    BRANCH=dedede
    TEST=Build firmware and verify on fail DUTs.
         Check the DUTs can boot up in secure mode well.
    
    Change-Id: I987277fec2656fe6f10827bc6685d3d04093235e
    Signed-off-by: David Wu <david_wu@quanta.corp-partner.google.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61327
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Ren Kuo <ren.kuo@quanta.corp-partner.google.com>
    David Wu authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    8d6c1c2 View commit details
    Browse the repository at this point in the history
  7. mb/google/kukui: Add dedicated memory map for kappa

    Add a dedicated memory mapping table starting at index 0x40:
    0x40 SAMSUNG 4GB LP4X	K4UBE3D4AA-MGCR
    0x41 HYNIX 4GB QDP LP4X	H9HCNNNCPMALHR-NEE
    0x42 MICRON 4GB LP4X	MT53E1G32D4NQ-046 WT:E
    0x43 MICRON 4GB LP4X	MT53E1G32D2NP-046 WT:A
    0x44 MICRON 4GB LP4X	MT53E1G32D2NP-046 WT:B
    0x45 HYNIX 4GB LP4X	H54G56CYRBX247
    0x46 SAMSUNG 4GB LP4X	K4UBE3D4AB-MGCL
    0x48 SAMSUNG 4GB LP4X	K4UBE3D4AA-MGCL
    0x49 MICRON 8GB LP4X	MT53E2G32D4NQ-046 WT:A
    0x4A HYNIX 4GB QDP LP4X	H9HCNNNCPMMLXR-NEE
    0x4B Micron		MT29VZZZAD9GQFSM
    
    BUG=b:162379736
    BRANCH=kukui
    TEST=emerge-jacuzzi coreboot
    
    Signed-off-by: Kevin Chiu <kevin.chiu@quantatw.com>
    Change-Id: I97f296cb8c35fd2f979a05d0b97a0562c1b472f3
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/57442
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Yu-Ping Wu <yupingso@google.com>
    Kevin Chiu authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    2c7e498 View commit details
    Browse the repository at this point in the history
  8. mb/google/kukui: Add DRAM support for burnet/esche

    0x18 MICRON 4GB LP4X	MT53E1G32D2NP-046 WT:B
    0x19 HYNIX 4GB LP4X	H54G56CYRBX247
    0x1a SAMSUNG 4GB LP4X	K4UBE3D4AB-MGCL
    0x1b HYNIX 8GB LP4X	H54G68CYRBX248
    
    BUG=b:165768895
    BRANCH=kukui
    TEST=emerge-jacuzzi coreboot
    
    Change-Id: Ib1c09ff2b88bf121de702985680b2388c0fb8427
    Signed-off-by: Kevin Chiu <kevin.chiu.17802@gmail.com>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61265
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Yu-Ping Wu <yupingso@google.com>
    Kevin Chiu authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    30f05c4 View commit details
    Browse the repository at this point in the history
  9. nb/intel/sandybridge/raminit_mrc.c: Use <smbios.h> macros

    Use macros defined in <smbios.h> for 'ddr_type' and 'bus_width'
    
    Change-Id: I0501147139387cd9b5c7ec6b7ba7f8a5c5bd18bb
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61398
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    ElyesH authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    62b23c1 View commit details
    Browse the repository at this point in the history
  10. nb/intel/sandybridge/raminit_mrc.c: Use DDR3_SPD_SODIMM macro

    Change-Id: Ibbb6e6d44b1415b18aa59310f4d36d61b9a2a080
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61399
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    ElyesH authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    a233eb4 View commit details
    Browse the repository at this point in the history
  11. nb/intel/sandybridge/raminit_mrc.c: Use <device/dram/ddr3.h> macros

    Change-Id: Icca870d1c97a2737dec3f31b0f2e4c3222c711ae
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61400
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    ElyesH authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    921b99e View commit details
    Browse the repository at this point in the history
  12. cpu/intel/socket_FCBGA559: Drop 'select SSE'

    SSE is already selected by SSE2 through model_106cx/Kconfig
    
    Change-Id: I31b8345fdd901e1d05df5fa8351db3255f9cf9cb
    Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
    Reviewed-on: https://review.coreboot.org/c/coreboot/+/61316
    Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
    Reviewed-by: Angel Pons <th3fanbus@gmail.com>
    ElyesH authored and felixheld committed Jan 27, 2022
    Copy the full SHA
    ec31cf1 View commit details
    Browse the repository at this point in the history