Kyösti Mälkki (kyosti.malkki(a)gmail.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/4308
-gerrit
commit abc6e96927bdebc6be4f6f7ad8a0ed13936333e6
Author: Kyösti Mälkki <kyosti.malkki(a)gmail.com>
Date: Thu Nov 28 18:11:49 2013 +0200
Declare recovery and developer modes outside ChromeOS
Move the implementation for recovery and developer modes from
vendorcode/google/chromes to lib/.
Change-Id: I33335fb282de2c7bc613dc58d6912c47f3b5c06c
Signed-off-by: Kyösti Mälkki <kyosti.malkki(a)gmail.com>
---
src/Kconfig | 4 ++
src/ec/google/chromeec/ec.c | 2 +-
src/include/bootmode.h | 34 ++++++++++++++++
src/lib/Makefile.inc | 3 ++
src/lib/bootmode.c | 63 +++++++++++++++++++++++++++++
src/northbridge/intel/haswell/raminit.c | 7 +---
src/northbridge/intel/sandybridge/raminit.c | 6 +--
src/vendorcode/google/chromeos/Kconfig | 1 +
src/vendorcode/google/chromeos/chromeos.c | 36 ++---------------
src/vendorcode/google/chromeos/chromeos.h | 9 ++---
10 files changed, 115 insertions(+), 50 deletions(-)
diff --git a/src/Kconfig b/src/Kconfig
index 6356b19..cc80b43 100644
--- a/src/Kconfig
+++ b/src/Kconfig
@@ -300,6 +300,10 @@ config MMCONF_SUPPORT
bool
default n
+config BOOTMODE_STRAPS
+ bool
+ default n
+
source src/console/Kconfig
config HAVE_ACPI_RESUME
diff --git a/src/ec/google/chromeec/ec.c b/src/ec/google/chromeec/ec.c
index f1cefae..c57e18b 100644
--- a/src/ec/google/chromeec/ec.c
+++ b/src/ec/google/chromeec/ec.c
@@ -19,6 +19,7 @@
#include <stdint.h>
#include <console/console.h>
+#include <bootmode.h>
#include <arch/io.h>
#include <delay.h>
#include <arch/hlt.h>
@@ -31,7 +32,6 @@
#endif
#include "ec.h"
#include "ec_commands.h"
-#include <vendorcode/google/chromeos/chromeos.h>
uint8_t google_chromeec_calc_checksum(const uint8_t *data, int size)
{
diff --git a/src/include/bootmode.h b/src/include/bootmode.h
new file mode 100644
index 0000000..d64bf93
--- /dev/null
+++ b/src/include/bootmode.h
@@ -0,0 +1,34 @@
+/*
+ * This file is part of the coreboot project.
+ *
+ * Copyright (C) 2011 The ChromiumOS Authors. All rights reserved.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; version 2 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#ifndef __BOOTMODE_H__
+#define __BOOTMODE_H__
+
+int get_developer_mode_switch(void);
+int get_recovery_mode_switch(void);
+
+#if CONFIG_BOOTMODE_STRAPS
+int developer_mode_enabled(void);
+int recovery_mode_enabled(void);
+#else
+static inline int recovery_mode_enabled(void) { return 0; }
+static inline int developer_mode_enabled(void) { return 0; }
+#endif
+
+#endif /* __BOOTMODE_H__ */
diff --git a/src/lib/Makefile.inc b/src/lib/Makefile.inc
index f8cf3b1..8a82058 100644
--- a/src/lib/Makefile.inc
+++ b/src/lib/Makefile.inc
@@ -128,6 +128,9 @@ smm-y += gcc.c
$(obj)/lib/version.ramstage.o : $(obj)/build.h
+romstage-y += bootmode.c
+ramstage-y += bootmode.c
+
ifeq ($(CONFIG_RELOCATABLE_MODULES),y)
ramstage-y += rmodule.c
romstage-$(CONFIG_RELOCATABLE_RAMSTAGE) += rmodule.c
diff --git a/src/lib/bootmode.c b/src/lib/bootmode.c
new file mode 100644
index 0000000..156321f
--- /dev/null
+++ b/src/lib/bootmode.c
@@ -0,0 +1,63 @@
+/*
+ * This file is part of the coreboot project.
+ *
+ * Copyright (C) 2011 The ChromiumOS Authors. All rights reserved.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; version 2 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#include <bootmode.h>
+#if CONFIG_CHROMEOS || CONFIG_VBOOT_VERIFY_FIRMWARE
+#include <vendorcode/google/chromeos/chromeos.h>
+#endif
+
+#if CONFIG_BOOTMODE_STRAPS
+int developer_mode_enabled(void)
+{
+ if (get_developer_mode_switch())
+ return 1;
+#if CONFIG_VBOOT_VERIFY_FIRMWARE
+ if (vboot_enable_developer())
+ return 1;
+#endif
+ return 0;
+}
+
+/*
+ * This is called in multiple places and has to detect
+ * recovery mode triggered from the EC and via shared
+ * recovery reason set with crossystem.
+ *
+ * If shared recovery reason is set:
+ * - before VbInit then get_recovery_mode_from_vbnv() is true
+ * - after VbInit then vboot_enable_recovery() is true
+ *
+ * Otherwise the mainboard handler for get_recovery_mode_switch()
+ * will detect recovery mode initiated by the EC.
+ */
+int recovery_mode_enabled(void)
+{
+ if (get_recovery_mode_switch())
+ return 1;
+#if CONFIG_CHROMEOS
+ if (get_recovery_mode_from_vbnv())
+ return 1;
+#endif
+#if CONFIG_VBOOT_VERIFY_FIRMWARE
+ if (vboot_enable_recovery())
+ return 1;
+#endif
+ return 0;
+}
+#endif /* CONFIG_BOOTMODE_STRAPS */
diff --git a/src/northbridge/intel/haswell/raminit.c b/src/northbridge/intel/haswell/raminit.c
index 1e020f9..4138c5f 100644
--- a/src/northbridge/intel/haswell/raminit.c
+++ b/src/northbridge/intel/haswell/raminit.c
@@ -18,6 +18,7 @@
*/
#include <console/console.h>
+#include <bootmode.h>
#include <string.h>
#include <arch/hlt.h>
#include <arch/io.h>
@@ -31,12 +32,6 @@
#include "pei_data.h"
#include "haswell.h"
-#if CONFIG_CHROMEOS
-#include <vendorcode/google/chromeos/chromeos.h>
-#else
-#define recovery_mode_enabled(x) 0
-#endif
-
void save_mrc_data(struct pei_data *pei_data)
{
struct mrc_data_container *mrcdata;
diff --git a/src/northbridge/intel/sandybridge/raminit.c b/src/northbridge/intel/sandybridge/raminit.c
index 61e1545..5384996 100644
--- a/src/northbridge/intel/sandybridge/raminit.c
+++ b/src/northbridge/intel/sandybridge/raminit.c
@@ -19,6 +19,7 @@
#include <console/console.h>
#include <console/usb.h>
+#include <bootmode.h>
#include <string.h>
#include <arch/hlt.h>
#include <arch/io.h>
@@ -34,11 +35,6 @@
/* Management Engine is in the southbridge */
#include "southbridge/intel/bd82x6x/me.h"
-#if CONFIG_CHROMEOS
-#include <vendorcode/google/chromeos/chromeos.h>
-#else
-#define recovery_mode_enabled(x) 0
-#endif
/*
* MRC scrambler seed offsets should be reserved in
diff --git a/src/vendorcode/google/chromeos/Kconfig b/src/vendorcode/google/chromeos/Kconfig
index ed358f8..b4838fd 100644
--- a/src/vendorcode/google/chromeos/Kconfig
+++ b/src/vendorcode/google/chromeos/Kconfig
@@ -26,6 +26,7 @@ config CHROMEOS
bool "Build for ChromeOS"
default y
select TPM
+ select BOOTMODE_STRAPS
help
Enable ChromeOS specific features like the GPIO sub table in
the coreboot table. NOTE: Enabling this option on an unsupported
diff --git a/src/vendorcode/google/chromeos/chromeos.c b/src/vendorcode/google/chromeos/chromeos.c
index e917ba1..f8dd7dc 100644
--- a/src/vendorcode/google/chromeos/chromeos.c
+++ b/src/vendorcode/google/chromeos/chromeos.c
@@ -27,7 +27,9 @@
#include <console/console.h>
#if CONFIG_VBOOT_VERIFY_FIRMWARE
-static int vboot_enable_developer(void)
+#include <payload_loader.h>
+
+int vboot_enable_developer(void)
{
struct vboot_handoff *vbho;
@@ -42,7 +44,7 @@ static int vboot_enable_developer(void)
return !!(vbho->init_params.out_flags & VB_INIT_OUT_ENABLE_DEVELOPER);
}
-static int vboot_enable_recovery(void)
+int vboot_enable_recovery(void)
{
struct vboot_handoff *vbho;
@@ -53,36 +55,6 @@ static int vboot_enable_recovery(void)
return !!(vbho->init_params.out_flags & VB_INIT_OUT_ENABLE_RECOVERY);
}
-#else
-static inline int vboot_enable_developer(void) { return 0; }
-static inline int vboot_enable_recovery(void) { return 0; }
-#endif
-
-int developer_mode_enabled(void)
-{
- return get_developer_mode_switch() || vboot_enable_developer();
-}
-
-int recovery_mode_enabled(void)
-{
- /*
- * This is called in multiple places and has to detect
- * recovery mode triggered from the EC and via shared
- * recovery reason set with crossystem.
- *
- * If shared recovery reason is set:
- * - before VbInit then get_recovery_mode_from_vbnv() is true
- * - after VbInit then vboot_enable_recovery() is true
- *
- * Otherwise the mainboard handler for get_recovery_mode_switch()
- * will detect recovery mode initiated by the EC.
- */
- return get_recovery_mode_switch() || get_recovery_mode_from_vbnv() ||
- vboot_enable_recovery();
-}
-
-#if CONFIG_VBOOT_VERIFY_FIRMWARE
-#include <payload_loader.h>
static void *vboot_get_payload(size_t *len)
{
diff --git a/src/vendorcode/google/chromeos/chromeos.h b/src/vendorcode/google/chromeos/chromeos.h
index 0af26dc..9430276 100644
--- a/src/vendorcode/google/chromeos/chromeos.h
+++ b/src/vendorcode/google/chromeos/chromeos.h
@@ -22,10 +22,9 @@
#include <stddef.h>
#include <stdint.h>
+#include <bootmode.h>
/* functions implemented per mainboard: */
-int get_developer_mode_switch(void);
-int get_recovery_mode_switch(void);
int get_write_protect_state(void);
#ifdef __PRE_RAM__
void save_chromeos_gpios(void);
@@ -39,16 +38,14 @@ extern int oprom_is_loaded;
void read_vbnv(uint8_t *vbnv_copy);
void save_vbnv(const uint8_t *vbnv_copy);
-/* functions implemented in chromeos.c: */
-int developer_mode_enabled(void);
-int recovery_mode_enabled(void);
-
/* functions implemented in vboot.c */
void init_chromeos(int bootmode);
#if CONFIG_VBOOT_VERIFY_FIRMWARE
/* Returns 0 on success < 0 on error. */
int vboot_get_handoff_info(void **addr, uint32_t *size);
+int vboot_enable_developer(void);
+int vboot_enable_recovery(void);
#endif
#include "gnvs.h"
Kyösti Mälkki (kyosti.malkki(a)gmail.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/5605
-gerrit
commit e1eadfad524fda2bbab7d37fe0b8ee905105b071
Author: Kyösti Mälkki <kyosti.malkki(a)gmail.com>
Date: Tue Apr 29 07:11:39 2014 +0300
SPI: Use common dependency in Kconfig
Change-Id: I11118a4fe1e05017349feae004f98a17bb02386b
Signed-off-by: Kyösti Mälkki <kyosti.malkki(a)gmail.com>
---
src/drivers/spi/Kconfig | 16 +++++-----------
1 file changed, 5 insertions(+), 11 deletions(-)
diff --git a/src/drivers/spi/Kconfig b/src/drivers/spi/Kconfig
index 8ce6def..5135dfb 100644
--- a/src/drivers/spi/Kconfig
+++ b/src/drivers/spi/Kconfig
@@ -24,17 +24,18 @@ config SPI_FLASH
Select this option if your chipset driver needs to store certain
data in the SPI flash.
+if SPI_FLASH
+
config SPI_FLASH_SMM
bool "SPI flash driver support in SMM"
default n
- depends on SPI_FLASH && HAVE_SMI_HANDLER
+ depends on HAVE_SMI_HANDLER
help
Select this option if you want SPI flash support in SMM.
config SPI_FLASH_AMIC
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by AMIC.
@@ -42,7 +43,6 @@ config SPI_FLASH_AMIC
config SPI_FLASH_EON
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by EON.
@@ -50,7 +50,6 @@ config SPI_FLASH_EON
config SPI_FLASH_MACRONIX
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by Macronix.
@@ -58,7 +57,6 @@ config SPI_FLASH_MACRONIX
config SPI_FLASH_SPANSION
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by Spansion.
@@ -66,7 +64,6 @@ config SPI_FLASH_SPANSION
config SPI_FLASH_SST
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by SST.
@@ -74,7 +71,6 @@ config SPI_FLASH_SST
config SPI_FLASH_STMICRO
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by ST MICRO.
@@ -82,7 +78,6 @@ config SPI_FLASH_STMICRO
config SPI_FLASH_WINBOND
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by Winbond.
@@ -90,7 +85,6 @@ config SPI_FLASH_WINBOND
config SPI_FLASH_NO_FAST_READ
bool "Disable Fast Read command"
default n
- depends on SPI_FLASH
help
Select this option if your setup requires to avoid "fast read"s
from the SPI flash parts.
@@ -98,7 +92,6 @@ config SPI_FLASH_NO_FAST_READ
config SPI_FLASH_GIGADEVICE
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by Gigadevice.
@@ -106,7 +99,8 @@ config SPI_FLASH_GIGADEVICE
config SPI_FLASH_ADESTO
bool
default y
- depends on SPI_FLASH
help
Select this option if your chipset driver needs to store certain
data in the SPI flash and your SPI flash is made by Adesto Technologies.
+
+endif # SPI_FLASH
Edward O'Callaghan (eocallaghan(a)alterapraxis.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/5603
-gerrit
commit bb5ea7bbc710ddfd0537f9632de1dd386b57b917
Author: Edward O'Callaghan <eocallaghan(a)alterapraxis.com>
Date: Tue Apr 29 13:59:54 2014 +1000
mainboard/*: Use generic winbond romstage in place of w83627thg
Use the generic implementation of winbond in place of the model specific
w83627thg_enable_serial() as so that it maybe removed later.
Change-Id: Ice1a0dc428de9a3ddfb79e877fb03c7a8e09665f
Signed-off-by: Edward O'Callaghan <eocallaghan(a)alterapraxis.com>
---
src/mainboard/lanner/em8510/romstage.c | 5 +++--
src/mainboard/msi/ms7135/romstage.c | 3 ++-
src/mainboard/winent/mb6047/romstage.c | 3 ++-
3 files changed, 7 insertions(+), 4 deletions(-)
diff --git a/src/mainboard/lanner/em8510/romstage.c b/src/mainboard/lanner/em8510/romstage.c
index 335f9ec..4ae5c12 100644
--- a/src/mainboard/lanner/em8510/romstage.c
+++ b/src/mainboard/lanner/em8510/romstage.c
@@ -34,6 +34,7 @@
#include "southbridge/intel/i82801dx/i82801dx.h"
#include "northbridge/intel/i855/raminit.h"
#include "northbridge/intel/i855/debug.c"
+#include <superio/winbond/common/winbond.h>
#include <superio/winbond/w83627thg/w83627thg.h>
#include "cpu/x86/bist.h"
@@ -56,8 +57,8 @@ void main(unsigned long bist)
#endif
}
- w83627thg_enable_serial(SERIAL_DEV, CONFIG_TTYS0_BASE);
- console_init();
+ winbond_enable_serial(SERIAL_DEV, CONFIG_TTYS0_BASE);
+ console_init();
/* Halt if there was a built in self test failure */
report_bist_failure(bist);
diff --git a/src/mainboard/msi/ms7135/romstage.c b/src/mainboard/msi/ms7135/romstage.c
index ccb420a..15c02f5 100644
--- a/src/mainboard/msi/ms7135/romstage.c
+++ b/src/mainboard/msi/ms7135/romstage.c
@@ -31,6 +31,7 @@
#include <pc80/mc146818rtc.h>
#include "cpu/x86/lapic.h"
#include "northbridge/amd/amdk8/reset_test.c"
+#include <superio/winbond/common/winbond.h>
#include <superio/winbond/w83627thg/w83627thg.h>
#include <cpu/amd/model_fxx_rev.h>
#include <console/console.h>
@@ -127,7 +128,7 @@ void cache_as_ram_main(unsigned long bist, unsigned long cpu_init_detectedx)
if (bist == 0)
bsp_apicid = init_cpus(cpu_init_detectedx);
- w83627thg_enable_serial(SERIAL_DEV, CONFIG_TTYS0_BASE);
+ winbond_enable_serial(SERIAL_DEV, CONFIG_TTYS0_BASE);
console_init();
/* Halt if there was a built in self test failure */
diff --git a/src/mainboard/winent/mb6047/romstage.c b/src/mainboard/winent/mb6047/romstage.c
index 07f235c..a725beb 100644
--- a/src/mainboard/winent/mb6047/romstage.c
+++ b/src/mainboard/winent/mb6047/romstage.c
@@ -16,6 +16,7 @@
#include "cpu/x86/lapic.h"
#include "northbridge/amd/amdk8/reset_test.c"
#include "northbridge/amd/amdk8/debug.c"
+#include <superio/winbond/common/winbond.h>
#include <superio/winbond/w83627thg/w83627thg.h>
#include "cpu/x86/bist.h"
#include "northbridge/amd/amdk8/setup_resource_map.c"
@@ -84,7 +85,7 @@ void cache_as_ram_main(unsigned long bist, unsigned long cpu_init_detectedx)
// post_code(0x32);
- w83627thg_enable_serial(SERIAL_DEV, CONFIG_TTYS0_BASE);
+ winbond_enable_serial(SERIAL_DEV, CONFIG_TTYS0_BASE);
console_init();
/* Halt if there was a built in self test failure */