Edward O'Callaghan (eocallaghan(a)alterapraxis.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/5587
-gerrit
commit c32c1de097de63cb20984b0290f954c8e4cddf0d
Author: Edward O'Callaghan <eocallaghan(a)alterapraxis.com>
Date: Sun Apr 27 22:41:31 2014 +1000
superio/winbound/*: Provide common romstage component
Following the reasoning of:
cf7b498 superio/fintek/*: Factor out generic romstage component
Change-Id: I3e889c0305c012e7556a5dd348e7f1e1ba629a9d
Signed-off-by: Edward O'Callaghan <eocallaghan(a)alterapraxis.com>
---
src/superio/winbond/Kconfig | 21 +++++++++
src/superio/winbond/Makefile.inc | 3 ++
src/superio/winbond/common/early_serial.c | 72 +++++++++++++++++++++++++++++++
src/superio/winbond/common/winbound.h | 29 +++++++++++++
4 files changed, 125 insertions(+)
diff --git a/src/superio/winbond/Kconfig b/src/superio/winbond/Kconfig
index 364b57c..e193548 100644
--- a/src/superio/winbond/Kconfig
+++ b/src/superio/winbond/Kconfig
@@ -2,6 +2,7 @@
## This file is part of the coreboot project.
##
## Copyright (C) 2009 Ronald G. Minnich
+## Copyright (C) 2014 Edward O'Callaghan <eocallaghan(a)alterapraxis.com>
##
## This program is free software; you can redistribute it and/or modify
## it under the terms of the GNU General Public License as published by
@@ -17,19 +18,39 @@
## Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
##
+# Generic Winbound romstage driver - Just enough UART initialisation code for
+# romstage.
+config SUPERIO_WINBOUND_COMMON_ROMSTAGE
+ bool
+
config SUPERIO_WINBOND_W83627DHG
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
+
config SUPERIO_WINBOND_W83627EHG
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
+
config SUPERIO_WINBOND_W83627HF
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
+
config SUPERIO_WINBOND_W83627THG
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
+
config SUPERIO_WINBOND_W83627UHG
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
+
config SUPERIO_WINBOND_W83697HF
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
+
config SUPERIO_WINBOND_W83977F
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
+
config SUPERIO_WINBOND_W83977TF
bool
+ select SUPERIO_WINBOUND_COMMON_ROMSTAGE
diff --git a/src/superio/winbond/Makefile.inc b/src/superio/winbond/Makefile.inc
index 9701baf..beb1b3b 100644
--- a/src/superio/winbond/Makefile.inc
+++ b/src/superio/winbond/Makefile.inc
@@ -17,6 +17,9 @@
## Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
##
+## include generic winbound pre-ram stage driver
+romstage-$(CONFIG_SUPERIO_WINBOUND_COMMON_ROMSTAGE) += common/early_serial.c
+
subdirs-y += w83627dhg
subdirs-y += w83627ehg
subdirs-y += w83627hf
diff --git a/src/superio/winbond/common/early_serial.c b/src/superio/winbond/common/early_serial.c
new file mode 100644
index 0000000..a1390ac
--- /dev/null
+++ b/src/superio/winbond/common/early_serial.c
@@ -0,0 +1,72 @@
+/*
+ * This file is part of the coreboot project.
+ *
+ * Copyright (C) 2014 Edward O'Callaghan <eocallaghan(a)alterapraxis.com>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+/*
+ * A generic romstage (pre-ram) driver for Fintek variant Super I/O chips.
+ *
+ * The following is derived directly from the vendor Winbound's data-sheets:
+ *
+ * To toggle between `configuration mode` and `normal operation mode` as to
+ * manipulation the various LDN's in Fintek Super I/O's we are required to pass
+ * magic numbers `passwords keys`.
+ *
+ * WINBOUND_ENTRY_KEY := enable configuration : 0x87
+ * WINBOUND_EXIT_KEY := disable configuration : 0xAA
+ *
+ * To modify a LDN's configuration register, we use the index port to select
+ * the index of the LDN and then writing to the data port to alter the
+ * parameters. A default index, data port pair is 0x4E, 0x4F respectively, a
+ * user modified pair is 0x2E, 0x2F respectively.
+ *
+ */
+
+#include <arch/io.h>
+#include <device/pnp.h>
+#include <stdint.h>
+#include "winbound.h"
+
+#define WINBOUND_ENTRY_KEY 0x87
+#define WINBOUND_EXIT_KEY 0xAA
+
+/* Enable configuration: pass entry key '0x87' into index port dev. */
+static void pnp_enter_conf_state(device_t dev)
+{
+ u16 port = dev >> 8;
+ outb(WINBOUND_ENTRY_KEY, port);
+ outb(WINBOUND_ENTRY_KEY, port);
+}
+
+/* Disable configuration: pass exit key '0xAA' into index port dev. */
+static void pnp_exit_conf_state(device_t dev)
+{
+ u16 port = dev >> 8;
+ outb(WINBOUND_EXIT_KEY, port);
+}
+
+/* Bring up early serial debugging output before the RAM is initialized. */
+void winbound_enable_serial(device_t dev, u16 iobase)
+{
+ pnp_enter_conf_state(dev);
+ pnp_set_logical_device(dev);
+ pnp_set_enable(dev, 0);
+ pnp_set_iobase(dev, PNP_IDX_IO0, iobase);
+ pnp_set_enable(dev, 1);
+ pnp_exit_conf_state(dev);
+}
diff --git a/src/superio/winbond/common/winbound.h b/src/superio/winbond/common/winbound.h
new file mode 100644
index 0000000..71def7f
--- /dev/null
+++ b/src/superio/winbond/common/winbound.h
@@ -0,0 +1,29 @@
+/*
+ * This file is part of the coreboot project.
+ *
+ * Copyright (C) 2014 Edward O'Callaghan <eocallaghan(a)alterapraxis.com>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#ifndef SUPERIO_WINBOUND_COMMON_ROMSTAGE_H
+#define SUPERIO_WINBOUND_COMMON_ROMSTAGE_H
+
+#include <arch/io.h>
+#include <stdint.h>
+
+void winbound_enable_serial(device_t dev, u16 iobase);
+
+#endif /* SUPERIO_WINBOUND_COMMON_ROMSTAGE_H */
Kyösti Mälkki (kyosti.malkki(a)gmail.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/4308
-gerrit
commit f93ef968bfcce9d633e260259d961bee694b0826
Author: Kyösti Mälkki <kyosti.malkki(a)gmail.com>
Date: Thu Nov 28 18:11:49 2013 +0200
Declare recovery and developer modes without ChromeOS
Change-Id: I33335fb282de2c7bc613dc58d6912c47f3b5c06c
Signed-off-by: Kyösti Mälkki <kyosti.malkki(a)gmail.com>
---
src/Kconfig | 4 ++
src/ec/google/chromeec/ec.c | 2 +-
src/include/bootmode.h | 34 ++++++++++++++++
src/lib/Makefile.inc | 3 ++
src/lib/bootmode.c | 63 +++++++++++++++++++++++++++++
src/northbridge/intel/haswell/raminit.c | 7 +---
src/northbridge/intel/sandybridge/raminit.c | 6 +--
src/vendorcode/google/chromeos/Kconfig | 1 +
src/vendorcode/google/chromeos/chromeos.c | 36 ++---------------
src/vendorcode/google/chromeos/chromeos.h | 9 ++---
10 files changed, 115 insertions(+), 50 deletions(-)
diff --git a/src/Kconfig b/src/Kconfig
index 6356b19..cc80b43 100644
--- a/src/Kconfig
+++ b/src/Kconfig
@@ -300,6 +300,10 @@ config MMCONF_SUPPORT
bool
default n
+config BOOTMODE_STRAPS
+ bool
+ default n
+
source src/console/Kconfig
config HAVE_ACPI_RESUME
diff --git a/src/ec/google/chromeec/ec.c b/src/ec/google/chromeec/ec.c
index f1cefae..c57e18b 100644
--- a/src/ec/google/chromeec/ec.c
+++ b/src/ec/google/chromeec/ec.c
@@ -19,6 +19,7 @@
#include <stdint.h>
#include <console/console.h>
+#include <bootmode.h>
#include <arch/io.h>
#include <delay.h>
#include <arch/hlt.h>
@@ -31,7 +32,6 @@
#endif
#include "ec.h"
#include "ec_commands.h"
-#include <vendorcode/google/chromeos/chromeos.h>
uint8_t google_chromeec_calc_checksum(const uint8_t *data, int size)
{
diff --git a/src/include/bootmode.h b/src/include/bootmode.h
new file mode 100644
index 0000000..c0d7134
--- /dev/null
+++ b/src/include/bootmode.h
@@ -0,0 +1,34 @@
+/*
+ * This file is part of the coreboot project.
+ *
+ * Copyright (C) 2011 The ChromiumOS Authors. All rights reserved.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; version 2 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#ifndef __BOOTMODE_H__
+#define __BOOTMODE_H__
+
+int __attribute__((weak)) get_developer_mode_switch(void);
+int __attribute__((weak)) get_recovery_mode_switch(void);
+
+#if CONFIG_BOOTMODE_STRAPS
+int developer_mode_enabled(void);
+int recovery_mode_enabled(void);
+#else
+static inline int recovery_mode_enabled(void) { return 0; }
+static inline int developer_mode_enabled(void) { return 0; }
+#endif
+
+#endif /* __BOOTMODE_H__ */
diff --git a/src/lib/Makefile.inc b/src/lib/Makefile.inc
index f8cf3b1..8a82058 100644
--- a/src/lib/Makefile.inc
+++ b/src/lib/Makefile.inc
@@ -128,6 +128,9 @@ smm-y += gcc.c
$(obj)/lib/version.ramstage.o : $(obj)/build.h
+romstage-y += bootmode.c
+ramstage-y += bootmode.c
+
ifeq ($(CONFIG_RELOCATABLE_MODULES),y)
ramstage-y += rmodule.c
romstage-$(CONFIG_RELOCATABLE_RAMSTAGE) += rmodule.c
diff --git a/src/lib/bootmode.c b/src/lib/bootmode.c
new file mode 100644
index 0000000..0001c74
--- /dev/null
+++ b/src/lib/bootmode.c
@@ -0,0 +1,63 @@
+/*
+ * This file is part of the coreboot project.
+ *
+ * Copyright (C) 2011 The ChromiumOS Authors. All rights reserved.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; version 2 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#include <bootmode.h>
+#if CONFIG_CHROMEOS || CONFIG_VBOOT_VERIFY_FIRMWARE
+#include <vendorcode/google/chromeos/chromeos.h>
+#endif
+
+#if CONFIG_BOOTMODE_STRAPS
+int developer_mode_enabled(void)
+{
+ if (get_developer_mode_switch && get_developer_mode_switch())
+ return 1;
+#if CONFIG_VBOOT_VERIFY_FIRMWARE
+ if (vboot_enable_developer())
+ return 1;
+#endif
+ return 0;
+}
+
+int recovery_mode_enabled(void)
+{
+ if (get_recovery_mode_switch && get_recovery_mode_switch())
+ return 1;
+#if CONFIG_CHROMEOS
+ /*
+ * This is called in multiple places and has to detect
+ * recovery mode triggered from the EC and via shared
+ * recovery reason set with crossystem.
+ *
+ * If shared recovery reason is set:
+ * - before VbInit then get_recovery_mode_from_vbnv() is true
+ * - after VbInit then vboot_enable_recovery() is true
+ *
+ * Otherwise the mainboard handler for get_recovery_mode_switch()
+ * will detect recovery mode initiated by the EC.
+ */
+ if (get_recovery_mode_from_vbnv())
+ return 1;
+#endif
+#if CONFIG_VBOOT_VERIFY_FIRMWARE
+ if (vboot_enable_recovery())
+ return 1;
+#endif
+ return 0;
+}
+#endif /* CONFIG_BOOTMODE_STRAPS */
diff --git a/src/northbridge/intel/haswell/raminit.c b/src/northbridge/intel/haswell/raminit.c
index 1e020f9..4138c5f 100644
--- a/src/northbridge/intel/haswell/raminit.c
+++ b/src/northbridge/intel/haswell/raminit.c
@@ -18,6 +18,7 @@
*/
#include <console/console.h>
+#include <bootmode.h>
#include <string.h>
#include <arch/hlt.h>
#include <arch/io.h>
@@ -31,12 +32,6 @@
#include "pei_data.h"
#include "haswell.h"
-#if CONFIG_CHROMEOS
-#include <vendorcode/google/chromeos/chromeos.h>
-#else
-#define recovery_mode_enabled(x) 0
-#endif
-
void save_mrc_data(struct pei_data *pei_data)
{
struct mrc_data_container *mrcdata;
diff --git a/src/northbridge/intel/sandybridge/raminit.c b/src/northbridge/intel/sandybridge/raminit.c
index 61e1545..5384996 100644
--- a/src/northbridge/intel/sandybridge/raminit.c
+++ b/src/northbridge/intel/sandybridge/raminit.c
@@ -19,6 +19,7 @@
#include <console/console.h>
#include <console/usb.h>
+#include <bootmode.h>
#include <string.h>
#include <arch/hlt.h>
#include <arch/io.h>
@@ -34,11 +35,6 @@
/* Management Engine is in the southbridge */
#include "southbridge/intel/bd82x6x/me.h"
-#if CONFIG_CHROMEOS
-#include <vendorcode/google/chromeos/chromeos.h>
-#else
-#define recovery_mode_enabled(x) 0
-#endif
/*
* MRC scrambler seed offsets should be reserved in
diff --git a/src/vendorcode/google/chromeos/Kconfig b/src/vendorcode/google/chromeos/Kconfig
index ed358f8..b4838fd 100644
--- a/src/vendorcode/google/chromeos/Kconfig
+++ b/src/vendorcode/google/chromeos/Kconfig
@@ -26,6 +26,7 @@ config CHROMEOS
bool "Build for ChromeOS"
default y
select TPM
+ select BOOTMODE_STRAPS
help
Enable ChromeOS specific features like the GPIO sub table in
the coreboot table. NOTE: Enabling this option on an unsupported
diff --git a/src/vendorcode/google/chromeos/chromeos.c b/src/vendorcode/google/chromeos/chromeos.c
index e917ba1..f8dd7dc 100644
--- a/src/vendorcode/google/chromeos/chromeos.c
+++ b/src/vendorcode/google/chromeos/chromeos.c
@@ -27,7 +27,9 @@
#include <console/console.h>
#if CONFIG_VBOOT_VERIFY_FIRMWARE
-static int vboot_enable_developer(void)
+#include <payload_loader.h>
+
+int vboot_enable_developer(void)
{
struct vboot_handoff *vbho;
@@ -42,7 +44,7 @@ static int vboot_enable_developer(void)
return !!(vbho->init_params.out_flags & VB_INIT_OUT_ENABLE_DEVELOPER);
}
-static int vboot_enable_recovery(void)
+int vboot_enable_recovery(void)
{
struct vboot_handoff *vbho;
@@ -53,36 +55,6 @@ static int vboot_enable_recovery(void)
return !!(vbho->init_params.out_flags & VB_INIT_OUT_ENABLE_RECOVERY);
}
-#else
-static inline int vboot_enable_developer(void) { return 0; }
-static inline int vboot_enable_recovery(void) { return 0; }
-#endif
-
-int developer_mode_enabled(void)
-{
- return get_developer_mode_switch() || vboot_enable_developer();
-}
-
-int recovery_mode_enabled(void)
-{
- /*
- * This is called in multiple places and has to detect
- * recovery mode triggered from the EC and via shared
- * recovery reason set with crossystem.
- *
- * If shared recovery reason is set:
- * - before VbInit then get_recovery_mode_from_vbnv() is true
- * - after VbInit then vboot_enable_recovery() is true
- *
- * Otherwise the mainboard handler for get_recovery_mode_switch()
- * will detect recovery mode initiated by the EC.
- */
- return get_recovery_mode_switch() || get_recovery_mode_from_vbnv() ||
- vboot_enable_recovery();
-}
-
-#if CONFIG_VBOOT_VERIFY_FIRMWARE
-#include <payload_loader.h>
static void *vboot_get_payload(size_t *len)
{
diff --git a/src/vendorcode/google/chromeos/chromeos.h b/src/vendorcode/google/chromeos/chromeos.h
index f6b7dee..e501427 100644
--- a/src/vendorcode/google/chromeos/chromeos.h
+++ b/src/vendorcode/google/chromeos/chromeos.h
@@ -22,10 +22,9 @@
#include <stddef.h>
#include <stdint.h>
+#include <bootmode.h>
/* functions implemented per mainboard: */
-int get_developer_mode_switch(void);
-int get_recovery_mode_switch(void);
int get_write_protect_state(void);
#ifdef __PRE_RAM__
void save_chromeos_gpios(void);
@@ -38,16 +37,14 @@ int vboot_wants_oprom(void);
void read_vbnv(uint8_t *vbnv_copy);
void save_vbnv(const uint8_t *vbnv_copy);
-/* functions implemented in chromeos.c: */
-int developer_mode_enabled(void);
-int recovery_mode_enabled(void);
-
/* functions implemented in vboot.c */
void init_chromeos(int bootmode);
#if CONFIG_VBOOT_VERIFY_FIRMWARE
/* Returns 0 on success < 0 on error. */
int vboot_get_handoff_info(void **addr, uint32_t *size);
+int vboot_enable_developer(void);
+int vboot_enable_recovery(void);
#endif
#include "gnvs.h"
Paul Menzel (paulepanter(a)users.sourceforge.net) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/5581
-gerrit
commit 45f2b36beb987628ede95126e5fe69bca5e03e8c
Author: Paul Menzel <paulepanter(a)users.sourceforge.net>
Date: Sat Apr 26 10:18:12 2014 +0200
drivers/pc80/Kconfig: Do not init PS/2 keyboard if SeaBIOS is chosen as payload
As the Kconfig description of `DRIVERS_PS2_KEYBOARD` says, SeaBIOS is
able to initialize the PS/2 keyboard itself, so it is not necessary to
let coreboot do it.
SeaBIOS is also able to do it faster as discussed in a thread on the
coreboot mailing list from October 2010 [1]. In that thread it was
also proposed to not let coreboot initialize the PS/2 coreboot when
SeaBIOS is used as a payload.
[1] http://www.coreboot.org/pipermail/coreboot/2010-October/thread.html#61310
subject: [coreboot] coreboot+seabios timings
Change-Id: I1248cec3e2ca5b9311e46df8aabf67e14ffd4ea6
Signed-off-by: Paul Menzel <paulepanter(a)users.sourceforge.net>
---
src/drivers/pc80/Kconfig | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/src/drivers/pc80/Kconfig b/src/drivers/pc80/Kconfig
index 3c8fd8c..acd1503 100644
--- a/src/drivers/pc80/Kconfig
+++ b/src/drivers/pc80/Kconfig
@@ -2,7 +2,8 @@
# reliably support PS/2 init themselves.
config DRIVERS_PS2_KEYBOARD
bool "PS/2 keyboard init"
- default y
+ default n if PAYLOAD_SEABIOS
+ default y if !PAYLOAD_SEABIOS
help
Enable this option to initialize PS/2 keyboards found connected
to the PS/2 port.