Vladimir Serbinenko (phcoder(a)gmail.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/10191
-gerrit
commit 58625ac1a44bf34b9fb878f7be24879e6dcf3b82
Author: Vladimir Serbinenko <phcoder(a)gmail.com>
Date: Tue May 12 12:39:53 2015 +0200
bd82x6x, ibexpeak: Support fully locking ROM on S3 resume.
Currently only RO-lock is supported. Make full lock available as an option.
Change-Id: …
[View More]Ib68a1e82733a51053a9adc80ac501b6205c6b8a7
Signed-off-by: Vladimir Serbinenko <phcoder(a)gmail.com>
---
src/southbridge/intel/bd82x6x/Kconfig | 25 +++++++++++++++++++++++--
src/southbridge/intel/bd82x6x/finalize.c | 17 ++++++++++-------
2 files changed, 33 insertions(+), 9 deletions(-)
diff --git a/src/southbridge/intel/bd82x6x/Kconfig b/src/southbridge/intel/bd82x6x/Kconfig
index 8c51520..63118e1 100644
--- a/src/southbridge/intel/bd82x6x/Kconfig
+++ b/src/southbridge/intel/bd82x6x/Kconfig
@@ -151,9 +151,19 @@ config LOCK_MANAGEMENT_ENGINE
If unsure, say N.
-config LOCK_SPI_ON_RESUME
+endif
+
+if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216 || SOUTHBRIDGE_INTEL_IBEXPEAK
+
+choice
+ prompt "Flash ROM locking on S3 resume"
+ default LOCK_SPI_ON_RESUME_NONE
+
+config LOCK_SPI_ON_RESUME_NONE
+ bool "Don't lock ROM sections on S3 resume"
+
+config LOCK_SPI_ON_RESUME_RO
bool "Lock all flash ROM sections on S3 resume"
- default n
help
If the flash ROM shall be protected against write accesses from the
operating system (OS), the locking procedure has to be repeated after
@@ -161,4 +171,15 @@ config LOCK_SPI_ON_RESUME
ROM from within your OS. Notice: Even with this option, the write lock
has still to be enabled on the normal boot path (e.g. by the payload).
+config LOCK_SPI_ON_RESUME_NO_ACCESS
+ bool "Lock and disable reads all flash ROM sections on S3 resume"
+ help
+ If the flash ROM shall be protected against write accesses from the
+ operating system (OS), the locking procedure has to be repeated after
+ each resume from S3. Select this if you never want to update the flash
+ ROM from within your OS. Notice: Even with this option, the write lock
+ has still to be enabled on the normal boot path (e.g. by the payload).
+
+endchoice
+
endif
diff --git a/src/southbridge/intel/bd82x6x/finalize.c b/src/southbridge/intel/bd82x6x/finalize.c
index ad2586c..df7b070 100644
--- a/src/southbridge/intel/bd82x6x/finalize.c
+++ b/src/southbridge/intel/bd82x6x/finalize.c
@@ -25,13 +25,16 @@
void intel_pch_finalize_smm(void)
{
-#if CONFIG_LOCK_SPI_ON_RESUME
- /* Copy flash regions from FREG0-4 to PR0-4
- and enable write protection bit31 */
- int i;
- for (i = 0; i < 20; i += 4)
- RCBA32(0x3874 + i) = RCBA32(0x3854 + i) | (1 << 31);
-#endif
+ if (CONFIG_LOCK_SPI_ON_RESUME_RO || CONFIG_LOCK_SPI_ON_RESUME_NO_ACCESS) {
+ /* Copy flash regions from FREG0-4 to PR0-4
+ and enable write protection bit31 */
+ int i;
+ u32 lockmask = (1 << 31);
+ if (CONFIG_LOCK_SPI_ON_RESUME_NO_ACCESS)
+ lockmask |= (1 << 15);
+ for (i = 0; i < 20; i += 4)
+ RCBA32(0x3874 + i) = RCBA32(0x3854 + i) | lockmask;
+ }
/* Set SPI opcode menu */
RCBA16(0x3894) = SPI_OPPREFIX;
[View Less]
the following patch was just integrated into master:
commit e7366daf2ed322aca1a44297c6bd586c8d634316
Author: Vladimir Serbinenko <phcoder(a)gmail.com>
Date: Tue May 12 12:16:08 2015 +0200
Include back the 306ax microcode again.
In ee89435798022021026f511deddf0e3b401ad031 microcode for 306ax
was forgotten in migration.
Without microcode update my machine experiences random hangs and various
misbehaviour.
Change-Id: …
[View More]I61c704d88a8a0ed74a16fb3f80cce08e8515e6e2
Signed-off-by: Vladimir Serbinenko <phcoder(a)gmail.com>
Reviewed-on: http://review.coreboot.org/10180
Tested-by: build bot (Jenkins)
Reviewed-by: Marc Jones <marc.jones(a)se-eng.com>
See http://review.coreboot.org/10180 for details.
-gerrit
[View Less]
Vladimir Serbinenko (phcoder(a)gmail.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/10180
-gerrit
commit 20d5e6348b4fc9394c59c2c2c82df05407884ec3
Author: Vladimir Serbinenko <phcoder(a)gmail.com>
Date: Tue May 12 12:16:08 2015 +0200
Include back the 306ax microcode again.
In ee89435798022021026f511deddf0e3b401ad031 microcode for 306ax
was forgotten in migration.
Without microcode update my machine experiences random …
[View More]hangs and various
misbehaviour.
Change-Id: I61c704d88a8a0ed74a16fb3f80cce08e8515e6e2
Signed-off-by: Vladimir Serbinenko <phcoder(a)gmail.com>
---
src/cpu/intel/model_206ax/microcode_blob.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/src/cpu/intel/model_206ax/microcode_blob.c b/src/cpu/intel/model_206ax/microcode_blob.c
index 5d725ff..3698570 100644
--- a/src/cpu/intel/model_206ax/microcode_blob.c
+++ b/src/cpu/intel/model_206ax/microcode_blob.c
@@ -19,4 +19,5 @@
unsigned microcode[] = {
#include "../../../../3rdparty/blobs/cpu/intel/model_206ax/microcode.h"
+ #include "../../../../3rdparty/blobs/cpu/intel/model_306ax/microcode.h"
};
[View Less]
Vladimir Serbinenko (phcoder(a)gmail.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/10180
-gerrit
commit 8cceae0b1c3a31cc340a605326799bfc5bb1e00b
Author: Vladimir Serbinenko <phcoder(a)gmail.com>
Date: Tue May 12 12:16:08 2015 +0200
Include back the 306ax microcode again.
mrnuke's migration to 3rdparty forgot to include microcode for 306ax.
Breaking commit is ee89435798022021026f511deddf0e3b401ad031.
Without …
[View More]microcode update my machine experiences random hangs and various
misbehaviour.
Change-Id: I61c704d88a8a0ed74a16fb3f80cce08e8515e6e2
Signed-off-by: Vladimir Serbinenko <phcoder(a)gmail.com>
---
src/cpu/intel/model_206ax/microcode_blob.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/src/cpu/intel/model_206ax/microcode_blob.c b/src/cpu/intel/model_206ax/microcode_blob.c
index 5d725ff..3698570 100644
--- a/src/cpu/intel/model_206ax/microcode_blob.c
+++ b/src/cpu/intel/model_206ax/microcode_blob.c
@@ -19,4 +19,5 @@
unsigned microcode[] = {
#include "../../../../3rdparty/blobs/cpu/intel/model_206ax/microcode.h"
+ #include "../../../../3rdparty/blobs/cpu/intel/model_306ax/microcode.h"
};
[View Less]
the following patch was just integrated into master:
commit 522149c310ad8885cd0b58a88cacac24852a541f
Author: Lee Leahy <leroy.p.leahy(a)intel.com>
Date: Fri May 8 11:33:55 2015 -0700
cbmem: Add initial allocation support
Add support to allocate a region just below CBMEM root. This region is
reserved for FSP 1.1 to use for its stack and variables.
BRANCH=none
BUG=None
TEST=Build and run on Braswell
Change-Id: …
[View More]I1d4b36ab366e6f8e036335c56c1756f2dfaab3f5
Signed-off-by: Lee Leahy <leroy.p.leahy(a)intel.com>
Reviewed-on: http://review.coreboot.org/10148
Tested-by: build bot (Jenkins)
Reviewed-by: Aaron Durbin <adurbin(a)chromium.org>
See http://review.coreboot.org/10148 for details.
-gerrit
[View Less]
the following patch was just integrated into master:
commit 0a50d9b35334d03f13b38e21497ba0aae8b16712
Author: Aaron Durbin <adurbin(a)chromium.org>
Date: Tue May 12 16:46:27 2015 -0500
libpayload: x86: correct types used for IO
libpayload on x86 defines u32 and uint32_t as typedefs of
unsigned int. However, the readl/writel routines use long.
With alias checking this throws type punning errors. Align
the readl/writel/inl/outl types with the 32-bit fixed width
…
[View More] ones that are exposed.
Change-Id: Ie51cff8af4596948f6132e3cb743f1bc4ea8f204
Signed-off-by: Aaron Durbin <adurbin(a)chromium.org>
Reviewed-on: http://review.coreboot.org/10186
Tested-by: build bot (Jenkins)
Reviewed-by: Stefan Reinauer <stefan.reinauer(a)coreboot.org>
Reviewed-by: Paul Menzel <paulepanter(a)users.sourceforge.net>
See http://review.coreboot.org/10186 for details.
-gerrit
[View Less]