Paul Menzel has posted comments on this change. ( https://review.coreboot.org/c/coreboot/+/29005 )
Change subject: soc/intel/cannonlake: Set PCIEXPWAK_DIS if WAKE# pin is not enabled
......................................................................
Patch Set 1: Code-Review+1
--
To view, visit https://review.coreboot.org/c/coreboot/+/29005
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I4ab3bbba1da79dbf1790c99c611195cffbda1511
Gerrit-Change-Number: 29005
Gerrit-PatchSet: 1
Gerrit-Owner: Furquan Shaikh <furquan(a)google.com>
Gerrit-Reviewer: Paul Menzel <paulepanter(a)users.sourceforge.net>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-Comment-Date: Tue, 26 Feb 2019 12:26:55 +0000
Gerrit-HasComments: No
Gerrit-Has-Labels: Yes
Gerrit-MessageType: comment
Paul Menzel has posted comments on this change. ( https://review.coreboot.org/c/coreboot/+/31585 )
Change subject: ec/google/chromeec: fix the error status handling
......................................................................
Patch Set 5: Code-Review+1
--
To view, visit https://review.coreboot.org/c/coreboot/+/31585
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I7f0a8a61d01d942cba57036a17dd527fdbbf940c
Gerrit-Change-Number: 31585
Gerrit-PatchSet: 5
Gerrit-Owner: YH Lin <yueherngl(a)google.com>
Gerrit-Reviewer: Aaron Durbin <adurbin(a)chromium.org>
Gerrit-Reviewer: Daisuke Nojiri <dnojiri(a)chromium.org>
Gerrit-Reviewer: Hung-Te Lin <hungte(a)chromium.org>
Gerrit-Reviewer: Patrick Georgi <pgeorgi(a)google.com>
Gerrit-Reviewer: Paul Menzel <paulepanter(a)users.sourceforge.net>
Gerrit-Reviewer: YH Lin <yueherngl(a)google.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-Comment-Date: Tue, 26 Feb 2019 12:04:35 +0000
Gerrit-HasComments: No
Gerrit-Has-Labels: Yes
Gerrit-MessageType: comment
Hello Werner Zeh, Aaron Durbin, Julius Werner, Patrick Rudolph, Paul Menzel, David Hendricks, build bot (Jenkins), Patrick Georgi,
I'd like you to reexamine a change. Please visit
https://review.coreboot.org/c/coreboot/+/29563
to look at the new patch set (#51).
Change subject: security/tpm: Fix TCPA log feature
......................................................................
security/tpm: Fix TCPA log feature
Until now the TCPA log wasn't working correctly.
* Refactor TCPA log code.
* Add TCPA log dump fucntion.
* Make TCPA log available in bootblock.
* Fix TCPA log formatting.
* Add x86 and Cavium memory for early log.
Change-Id: Ic93133531b84318f48940d34bded48cbae739c44
Signed-off-by: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
---
A Documentation/security/index.md
M Documentation/security/vboot/measured_boot.md
M src/arch/x86/car.ld
M src/commonlib/include/commonlib/tcpa_log_serialized.h
M src/include/memlayout.h
M src/security/tpm/tspi.h
M src/security/tpm/tspi/log.c
M src/security/tpm/tspi/tspi.c
M src/security/vboot/Kconfig
M src/security/vboot/secdata_tpm.c
M src/security/vboot/symbols.h
M src/security/vboot/vboot_crtm.c
M src/soc/cavium/cn81xx/include/soc/memlayout.ld
M src/soc/imgtec/pistachio/include/soc/memlayout.ld
M src/soc/mediatek/mt8173/include/soc/memlayout.ld
M src/soc/mediatek/mt8183/include/soc/memlayout.ld
M src/soc/nvidia/tegra124/include/soc/memlayout.ld
M src/soc/nvidia/tegra210/include/soc/memlayout.ld
M src/soc/samsung/exynos5250/include/soc/memlayout.ld
M util/cbmem/cbmem.c
20 files changed, 313 insertions(+), 81 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/63/29563/51
--
To view, visit https://review.coreboot.org/c/coreboot/+/29563
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Ic93133531b84318f48940d34bded48cbae739c44
Gerrit-Change-Number: 29563
Gerrit-PatchSet: 51
Gerrit-Owner: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Gerrit-Reviewer: Aaron Durbin <adurbin(a)chromium.org>
Gerrit-Reviewer: David Hendricks <david.hendricks(a)gmail.com>
Gerrit-Reviewer: Julius Werner <jwerner(a)chromium.org>
Gerrit-Reviewer: Patrick Georgi <pgeorgi(a)google.com>
Gerrit-Reviewer: Patrick Rudolph <patrick.rudolph(a)9elements.com>
Gerrit-Reviewer: Paul Menzel <paulepanter(a)users.sourceforge.net>
Gerrit-Reviewer: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Gerrit-Reviewer: Werner Zeh <werner.zeh(a)siemens.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Patrick Rudolph
Gerrit-CC: Patrick Rudolph <siro(a)das-labor.org>
Gerrit-MessageType: newpatchset
Daisuke Nojiri has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/31613
Change subject: ec/google/chromeec: Clarify return value of google_chromeec_command
......................................................................
ec/google/chromeec: Clarify return value of google_chromeec_command
This patch clarifies the definition of google_chromeec_command.
Currently absence of the definition isn't causing any problem because
wrapper APIs check 'ret != 0' or wrapper APIs check 'ret < 0' for an
interface which returns only negative error codes.
However, there is a chance that a new wrapper API will be addedl which
check 'ret < 0' to catch errors, assuming other interfaces behave the same.
Or existing wrapper APIs will be broken as soon as they're compiled for
another interface.
BUG=chromium:935038
TEST=none
Signed-off-by: Daisuke Nojiri <dnojiri(a)chromium.org>
Change-Id: I2ce7109b5f2a1d5294f167719730bc1f039ba03f
---
M src/ec/google/chromeec/ec.h
1 file changed, 6 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/13/31613/1
diff --git a/src/ec/google/chromeec/ec.h b/src/ec/google/chromeec/ec.h
index 70b2b52..7a38336 100644
--- a/src/ec/google/chromeec/ec.h
+++ b/src/ec/google/chromeec/ec.h
@@ -155,6 +155,12 @@
int crosec_command_proto(struct chromeec_command *cec_command,
crosec_io_t crosec_io, void *context);
+/**
+ * Send a command to a CrOS EC
+ *
+ * @param cec_command: CrOS EC command to send
+ * @return 0 for success. Non-zero for error.
+ */
int google_chromeec_command(struct chromeec_command *cec_command);
struct google_chromeec_event_info {
--
To view, visit https://review.coreboot.org/c/coreboot/+/31613
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I2ce7109b5f2a1d5294f167719730bc1f039ba03f
Gerrit-Change-Number: 31613
Gerrit-PatchSet: 1
Gerrit-Owner: Daisuke Nojiri <dnojiri(a)chromium.org>
Gerrit-MessageType: newchange
Patrick Georgi has submitted this change and it was merged. ( https://review.coreboot.org/c/coreboot/+/31586 )
Change subject: flapjack: get sku_id from ec (cbi)
......................................................................
flapjack: get sku_id from ec (cbi)
On flapjack, retrieve the board information via CBI interface.
Also reserving 0x2 sku_id for the case of un-provisioned board as this is the id
used prior to the readiness of cbi.
BUG=b:123676982
BRANCH=kukui
TEST=provisioned cbi info and verify the sku_id.
Signed-off-by: YH Lin <yueherngl(a)google.com>
Change-Id: Iad7a52df38e2045abbdded8ba0a1f1544de961fc
Reviewed-on: https://review.coreboot.org/c/31586
Reviewed-by: Daisuke Nojiri <dnojiri(a)chromium.org>
Tested-by: build bot (Jenkins) <no-reply(a)coreboot.org>
---
M src/mainboard/google/kukui/boardid.c
1 file changed, 11 insertions(+), 0 deletions(-)
Approvals:
build bot (Jenkins): Verified
Daisuke Nojiri: Looks good to me, approved
YH Lin: Looks good to me, approved
diff --git a/src/mainboard/google/kukui/boardid.c b/src/mainboard/google/kukui/boardid.c
index 2420e78..2af93c8 100644
--- a/src/mainboard/google/kukui/boardid.c
+++ b/src/mainboard/google/kukui/boardid.c
@@ -16,8 +16,11 @@
#include <assert.h>
#include <boardid.h>
#include <soc/auxadc.h>
+#include <ec/google/chromeec/ec.h>
#include <stddef.h>
+#define FLAPJACK_UNDEF_SKU_ID 2 /* For all un-provisioned Flapjack boards */
+
static uint32_t get_index(unsigned int channel, uint32_t *cached_id)
{
static const int voltages[] = {
@@ -64,6 +67,14 @@
{
static uint32_t cached_sku_id = BOARD_ID_INIT;
+ /* On Flapjack, getting the SKU via CBI */
+ if (IS_ENABLED(CONFIG_BOARD_GOOGLE_FLAPJACK)) {
+ if (cached_sku_id == BOARD_ID_INIT &&
+ google_chromeec_cbi_get_sku_id(&cached_sku_id))
+ cached_sku_id = FLAPJACK_UNDEF_SKU_ID;
+ return cached_sku_id;
+ }
+
/* Quirk for KUKUI: All P1/SKU0 had incorrectly set SKU=1. */
if (IS_ENABLED(CONFIG_BOARD_GOOGLE_KUKUI)) {
if (cached_sku_id == BOARD_ID_INIT && board_id() == 1) {
--
To view, visit https://review.coreboot.org/c/coreboot/+/31586
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Iad7a52df38e2045abbdded8ba0a1f1544de961fc
Gerrit-Change-Number: 31586
Gerrit-PatchSet: 4
Gerrit-Owner: YH Lin <yueherngl(a)google.com>
Gerrit-Reviewer: Daisuke Nojiri <dnojiri(a)chromium.org>
Gerrit-Reviewer: Hung-Te Lin <hungte(a)chromium.org>
Gerrit-Reviewer: Nick Sanders <nsanders(a)chromium.org>
Gerrit-Reviewer: Patrick Georgi <pgeorgi(a)google.com>
Gerrit-Reviewer: YH Lin <yueherngl(a)google.com>
Gerrit-Reviewer: You-Cheng Syu <youcheng(a)google.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Paul Menzel <paulepanter(a)users.sourceforge.net>
Gerrit-MessageType: merged
Patrick Rudolph has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/31567
Change subject: soc/cavium/cn81xx: Enable RNG for DRAM init
......................................................................
soc/cavium/cn81xx: Enable RNG for DRAM init
The Cavium DRAM init might use the RNG for pattern generation.
Initialize it before running DRAM init.
Tested on OpenCellular Elgon.
The RNG generates non identical numbers.
Change-Id: I886f920e9941793fb76b56cc5a24a42e23b082e0
Signed-off-by: Patrick Rudolph <patrick.rudolph(a)9elements.com>
---
M src/soc/cavium/cn81xx/sdram.c
1 file changed, 50 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/67/31567/1
diff --git a/src/soc/cavium/cn81xx/sdram.c b/src/soc/cavium/cn81xx/sdram.c
index 2342b04..f434265 100644
--- a/src/soc/cavium/cn81xx/sdram.c
+++ b/src/soc/cavium/cn81xx/sdram.c
@@ -3,6 +3,7 @@
*
* Copyright 2018 Facebook, Inc.
* Copyright 2003-2017 Cavium Inc. <support(a)cavium.com>
+ * Copyright 2019 9elements Agency GmbH
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
@@ -28,17 +29,66 @@
#include <libbdk-hal/bdk-utils.h>
#include <libbdk-hal/bdk-l2c.h>
#include <libdram/libdram-config.h>
+#include <soc/ecam.h>
+#include <device/pci_ops.h>
+#include <device/pci.h>
size_t sdram_size_mb(void)
{
return bdk_dram_get_size_mbytes(0);
}
+/* Enable RNG for DRAM init */
+static void rnm_init(void)
+{
+ u64 *bar = NULL;
+
+ #define BDK_RNM_CTL_STATUS 0
+ #define BDK_RNM_RANDOM 0x100000
+
+ /* Bus numbers are hardcoded in ASIC */
+#ifdef __SIMPLE_DEVICE__
+ pci_devfn_t dev = pci_locate_device_on_bus(0xa018177d, 2);
+ if (dev == PCI_DEV_INVALID) {
+ printk(BIOS_ERR, "RNG: Failed to find PCI device\n");
+ return;
+ }
+
+ bar = (u64 *)ecam0_get_bar_val(dev, 0);
+#endif
+ if (!bar) {
+ printk(BIOS_ERR, "RNG: Failed to get BAR0\n");
+ return;
+ }
+
+ printk(BIOS_DEBUG, "RNG: BAR0 at %p\n", bar);
+
+ u64 reg = read64(&bar[BDK_RNM_CTL_STATUS]);
+ /**
+ * Enables the output of the RNG.
+ * Entropy enable for random number generator.
+ */
+ reg |= 3;
+ write64(&bar[BDK_RNM_CTL_STATUS], reg);
+
+ /* Read back after enable so we know it is done. */
+ reg = read64(&bar[BDK_RNM_CTL_STATUS]);
+ /* Errata (RNM-22528) First consecutive reads to RNM_RANDOM return same
+ * value. Before using the random entropy, read RNM_RANDOM at least once
+ * and discard the data */
+ reg = read64(&bar[BDK_RNM_RANDOM]);
+ printk(BIOS_DEBUG, "RNG: RANDOM %llx\n", reg);
+ reg = read64(&bar[BDK_RNM_RANDOM]);
+ printk(BIOS_DEBUG, "RNG: RANDOM %llx\n", reg);
+}
+
/* based on bdk_boot_dram() */
void sdram_init(void)
{
printk(BIOS_DEBUG, "Initializing DRAM\n");
+ rnm_init();
+
/**
* FIXME: second arg is actually a desired frequency if set (the
* function usually obtains frequency via the config). That might
--
To view, visit https://review.coreboot.org/c/coreboot/+/31567
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I886f920e9941793fb76b56cc5a24a42e23b082e0
Gerrit-Change-Number: 31567
Gerrit-PatchSet: 1
Gerrit-Owner: Patrick Rudolph <patrick.rudolph(a)9elements.com>
Gerrit-MessageType: newchange