Sugnan Prabhu S has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/45297 )
Change subject: ec/google/chromeec: add support to get SSFC from CBI EEPROM
......................................................................
ec/google/chromeec: add support to get SSFC from CBI EEPROM
This change adds a support function to get the SSFC data from CBI.
Change-Id: I52e2edc5b7fa6b5f82e88119355c99ff063a9a22
Signed-off-by: Sugnan Prabhu S <sugnan.prabhu.s(a)intel.com>
---
M src/ec/google/chromeec/ec.c
M src/ec/google/chromeec/ec.h
M src/ec/google/chromeec/ec_commands.h
3 files changed, 7 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/97/45297/1
diff --git a/src/ec/google/chromeec/ec.c b/src/ec/google/chromeec/ec.c
index 40285dc..d3c4209 100644
--- a/src/ec/google/chromeec/ec.c
+++ b/src/ec/google/chromeec/ec.c
@@ -856,6 +856,11 @@
return cbi_get_uint32(version, CBI_TAG_BOARD_VERSION);
}
+int google_chromeec_cbi_get_ssfc(uint32_t *ssfc)
+{
+ return cbi_get_uint32(ssfc, CBI_TAG_SSFC);
+}
+
static int cbi_get_string(char *buf, size_t bufsize, uint32_t tag)
{
struct ec_params_get_cbi params = {
diff --git a/src/ec/google/chromeec/ec.h b/src/ec/google/chromeec/ec.h
index 9d4e588..de63648 100644
--- a/src/ec/google/chromeec/ec.h
+++ b/src/ec/google/chromeec/ec.h
@@ -80,6 +80,7 @@
/* version may be stored in CBI as a smaller integer width, but the EC code
handles it correctly. */
int google_chromeec_cbi_get_board_version(uint32_t *version);
+int google_chromeec_cbi_get_ssfc(uint32_t *ssfc);
#define CROS_SKU_UNKNOWN 0xFFFFFFFF
#define CROS_SKU_UNPROVISIONED 0x7FFFFFFF
diff --git a/src/ec/google/chromeec/ec_commands.h b/src/ec/google/chromeec/ec_commands.h
index 62761a2..86204b8 100644
--- a/src/ec/google/chromeec/ec_commands.h
+++ b/src/ec/google/chromeec/ec_commands.h
@@ -5727,6 +5727,7 @@
CBI_TAG_MODEL_ID = 5, /* uint32_t or smaller */
CBI_TAG_FW_CONFIG = 6, /* uint32_t bit field */
CBI_TAG_PCB_SUPPLIER = 7, /* uint32_t or smaller */
+ CBI_TAG_SSFC = 8, /* uint32_t or smaller */
CBI_TAG_COUNT,
};
--
To view, visit https://review.coreboot.org/c/coreboot/+/45297
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I52e2edc5b7fa6b5f82e88119355c99ff063a9a22
Gerrit-Change-Number: 45297
Gerrit-PatchSet: 1
Gerrit-Owner: Sugnan Prabhu S <sugnan.prabhu.s(a)intel.com>
Gerrit-MessageType: newchange
Name of user not set #1002789 has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/44005 )
Change subject: drivers/generic/cbfs-serial: Update driver to read UUID from CBFS
......................................................................
drivers/generic/cbfs-serial: Update driver to read UUID from CBFS
Modify the existing cbfs-serial driver to also read the UUID from
a text file in CBFS, just as a serial number is done today. When
driver is selected and a system_uuid exists in the CBFS the UUID
is read from the file and populated in the SMBIOS table. Note
that in order to work there must be no newline character at the
end of the file, this is also true of the serial_number.
Tested on a Google Tricky (Dell 3010 Chromebox).
Change-Id: I140a61670cec1318c095e18815c6bc7c1bf78cd6
Signed-off-by: Chris Morgan <macromorgan(a)hotmail.com>
---
M src/drivers/generic/cbfs-serial/Kconfig
M src/drivers/generic/cbfs-serial/cbfs-serial.c
2 files changed, 34 insertions(+), 3 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/05/44005/1
diff --git a/src/drivers/generic/cbfs-serial/Kconfig b/src/drivers/generic/cbfs-serial/Kconfig
index 209c242..d0cce14 100644
--- a/src/drivers/generic/cbfs-serial/Kconfig
+++ b/src/drivers/generic/cbfs-serial/Kconfig
@@ -2,5 +2,8 @@
bool "Serial number in CBFS"
default n
help
- Enable this option to read the board serial number from a
- text file located in CBFS.
+ Enable this option to read the board serial number or
+ system UUID from a text file located in CBFS. The text
+ file should be named serial_number or system_uuid
+ respectively and include only the serial number or
+ UUID (with dashes) with no newline characters.
diff --git a/src/drivers/generic/cbfs-serial/cbfs-serial.c b/src/drivers/generic/cbfs-serial/cbfs-serial.c
index 2e3e37d..6ee3c26 100644
--- a/src/drivers/generic/cbfs-serial/cbfs-serial.c
+++ b/src/drivers/generic/cbfs-serial/cbfs-serial.c
@@ -4,9 +4,10 @@
#include <device/device.h>
#include <smbios.h>
#include <string.h>
-
+#include <uuid.h>
#define MAX_SERIAL_LENGTH 0x100
+#define UUID_LENGTH 0x128
const char *smbios_mainboard_serial_number(void)
{
@@ -37,3 +38,30 @@
return serial_number;
}
+
+void smbios_system_set_uuid(u8 *uuid)
+{
+ static char system_uuid[UUID_LENGTH + 1] = {0};
+ struct cbfsf file;
+
+ if (system_uuid[0] != 0)
+ parse_uuid(uuid, system_uuid);
+
+ if (cbfs_boot_locate(&file, "system_uuid", NULL) == 0) {
+ struct region_device cbfs_region;
+ size_t uuid_len;
+
+ cbfs_file_data(&cbfs_region, &file);
+
+ uuid_len = region_device_sz(&cbfs_region);
+ if (uuid_len <= UUID_LENGTH) {
+ if (rdev_readat(&cbfs_region, system_uuid, 0,
+ uuid_len) == uuid_len) {
+ system_uuid[uuid_len] = 0;
+ parse_uuid(uuid, system_uuid);
+ }
+ }
+ }
+
+ parse_uuid(uuid, system_uuid);
+}
--
To view, visit https://review.coreboot.org/c/coreboot/+/44005
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I140a61670cec1318c095e18815c6bc7c1bf78cd6
Gerrit-Change-Number: 44005
Gerrit-PatchSet: 1
Gerrit-Owner: Name of user not set #1002789
Gerrit-MessageType: newchange
Jamie Ryu has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/46647 )
Change subject: [WIP] soc/intel/tigerlake: Configure top swap based on microcode version
......................................................................
[WIP] soc/intel/tigerlake: Configure top swap based on microcode version
In case of FIT based FW update feature is enabled, check that the
microcode has been loaded via FIT, if not, then disable top-swap so
that RO microcode is loaded on the next boot.
This is to make sure that the system always boots up with a microcode
loaded via FIT.
BUG=b:149547271
TEST=Build and boot volteer2 to OS
Signed-off-by: Jamie Ryu <jamie.m.ryu(a)intel.com>
Change-Id: I25febfd946d5a82b92ba626e487eb183a0bd6286
---
M src/soc/intel/tigerlake/bootblock/report_platform.c
1 file changed, 16 insertions(+), 1 deletion(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/47/46647/1
diff --git a/src/soc/intel/tigerlake/bootblock/report_platform.c b/src/soc/intel/tigerlake/bootblock/report_platform.c
index 03d65a4..1662ba5 100644
--- a/src/soc/intel/tigerlake/bootblock/report_platform.c
+++ b/src/soc/intel/tigerlake/bootblock/report_platform.c
@@ -18,6 +18,9 @@
#include <soc/pch.h>
#include <soc/pci_devs.h>
#include <string.h>
+#include <intelblocks/rtc.h>
+#include <reset.h>
+#include <halt.h>
static struct {
u32 cpuid;
@@ -106,6 +109,7 @@
static const char *const mode[] = {"NOT ", ""};
const char *cpu_type = "Unknown";
u32 p[13];
+ u32 microcode_ver;
index = 0x80000000;
cpuidr = cpuid(index);
@@ -137,9 +141,20 @@
}
}
+ microcode_ver = get_current_microcode_rev();
printk(BIOS_DEBUG, "CPU: %s\n", cpu_name);
printk(BIOS_DEBUG, "CPU: ID %x, %s, ucode: %08x\n",
- cpu_id, cpu_type, get_current_microcode_rev());
+ cpu_id, cpu_type, microcode_ver);
+
+ if(microcode_ver == 0x0) {
+ printk(BIOS_DEBUG, "CPU: ucode is not loaded, Disable top swap\n");
+ if (CONFIG(INTEL_TOP_SWAP_MULTI_FIT_UCODE_UPDATE)) {
+ configure_rtc_buc_top_swap(TS_DISABLE);
+ printk(BIOS_DEBUG, "CPU: Booting with top swap disabled\n");
+ do_board_reset();
+ halt();
+ }
+ }
cpu_feature_flag = cpu_get_feature_flags_ecx();
aes = (cpu_feature_flag & CPUID_AES) ? 1 : 0;
--
To view, visit https://review.coreboot.org/c/coreboot/+/46647
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I25febfd946d5a82b92ba626e487eb183a0bd6286
Gerrit-Change-Number: 46647
Gerrit-PatchSet: 1
Gerrit-Owner: Jamie Ryu <jamie.m.ryu(a)intel.com>
Gerrit-MessageType: newchange
Hello Aaron Durbin,
I'd like you to do a code review. Please visit
https://review.coreboot.org/c/coreboot/+/46483
to review the following change.
Change subject: program_loading: Split source rdev and loaded memory region concepts
......................................................................
program_loading: Split source rdev and loaded memory region concepts
In the current struct prog API, prog_rdev() can refer to either the
program binary on the storage media or the loaded program in memory,
depending on at what time it was called. This context-dependent double
meaning is a bit confusing, and it also makes it impossible to define
the memory area the program should be loaded into before actually
loading it (which will become necessary with the new stage header
format). Therefore this patch splits the two so that the rdev will
always only refer to the program binary on storage, and a new start
pointer and size variable will represent the program in memory.
Signed-off-by: Julius Werner <jwerner(a)chromium.org>
Change-Id: If7c0f1c5698fa0c326e23c553ea0fe928b25d202
---
M src/drivers/intel/fsp2_0/silicon_init.c
M src/drivers/intel/fsp2_0/util.c
M src/include/program_loading.h
M src/soc/amd/common/block/pi/refcode_loader.c
4 files changed, 29 insertions(+), 23 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/83/46483/1
diff --git a/src/drivers/intel/fsp2_0/silicon_init.c b/src/drivers/intel/fsp2_0/silicon_init.c
index 0b6540e..3c745d4 100644
--- a/src/drivers/intel/fsp2_0/silicon_init.c
+++ b/src/drivers/intel/fsp2_0/silicon_init.c
@@ -200,7 +200,10 @@
if (s3wake && !CONFIG(NO_STAGE_CACHE)) {
printk(BIOS_DEBUG, "Loading FSPS from stage_cache\n");
stage_cache_load_stage(STAGE_REFCODE, fsps);
- if (fsp_validate_component(&fsps_hdr, prog_rdev(fsps)) != CB_SUCCESS)
+
+ struct region_device mem_rdev;
+ prog_chain_mem_rdev(fsps, &mem_rdev);
+ if (fsp_validate_component(&fsps_hdr, &mem_rdev) != CB_SUCCESS)
die("On resume fsps header is invalid\n");
load_done = 1;
return;
diff --git a/src/drivers/intel/fsp2_0/util.c b/src/drivers/intel/fsp2_0/util.c
index acc3f4b..62bcc5c 100644
--- a/src/drivers/intel/fsp2_0/util.c
+++ b/src/drivers/intel/fsp2_0/util.c
@@ -177,7 +177,7 @@
uint32_t compression_algo;
size_t output_size;
void *dest;
- struct region_device source_rdev;
+ struct region_device source_rdev, mem_rdev;
struct prog *fsp_prog = &fspld->fsp_prog;
if (fspld->get_destination == NULL)
@@ -198,7 +198,8 @@
prog_set_area(fsp_prog, dest, output_size);
- if (fsp_validate_component(hdr, prog_rdev(fsp_prog)) != CB_SUCCESS) {
+ prog_chain_mem_rdev(fsp_prog, &mem_rdev);
+ if (fsp_validate_component(hdr, &mem_rdev) != CB_SUCCESS) {
printk(BIOS_ERR, "Invalid FSP header after load!\n");
return CB_ERR;
}
diff --git a/src/include/program_loading.h b/src/include/program_loading.h
index e5a2931..e26792e 100644
--- a/src/include/program_loading.h
+++ b/src/include/program_loading.h
@@ -2,6 +2,7 @@
#ifndef PROGRAM_LOADING_H
#define PROGRAM_LOADING_H
+#include <assert.h>
#include <bootmem.h>
#include <commonlib/region.h>
#include <types.h>
@@ -39,18 +40,14 @@
/* Representation of a program. */
struct prog {
- /* The region_device is the source of program content to load. After
- * loading program it represents the memory region of the stages and
- * payload. For architectures that use a bounce buffer
- * then it would represent the bounce buffer. */
enum prog_type type;
uint32_t cbfs_type;
const char *name;
- struct region_device rdev;
- /* Entry to program with optional argument. It's up to the architecture
- * to decide if argument is passed. */
- void (*entry)(void *);
- void *arg;
+ struct region_device load_rdev; /* Source for loading (e.g. flash). */
+ void *start; /* Program start in memory after loading. */
+ size_t size; /* Program size in memory (including BSS). */
+ void (*entry)(void *); /* Function pointer to entry point. */
+ void *arg; /* Optional argument (only valid for some archs). */
};
#define PROG_INIT(type_, name_) \
@@ -76,19 +73,19 @@
static inline struct region_device *prog_rdev(struct prog *prog)
{
- return &prog->rdev;
+ return &prog->load_rdev;
}
-/* Only valid for loaded programs. */
static inline size_t prog_size(const struct prog *prog)
{
- return region_device_sz(&prog->rdev);
+ assert(prog->size);
+ return prog->size;
}
-/* Only valid for loaded programs. */
static inline void *prog_start(const struct prog *prog)
{
- return rdev_mmap_full(&prog->rdev);
+ assert(prog->size);
+ return prog->start;
}
static inline void *prog_entry(const struct prog *prog)
@@ -104,15 +101,19 @@
/* region_device representing the 32-bit flat address space. */
extern const struct mem_region_device addrspace_32bit;
-static inline void prog_memory_init(struct prog *prog, uintptr_t ptr,
- size_t size)
+/* Can be used to get an rdev representation of program area in memory. */
+static inline void prog_chain_mem_rdev(const struct prog *prog,
+ struct region_device *rdev_out)
{
- rdev_chain(&prog->rdev, &addrspace_32bit.rdev, ptr, size);
+ assert(prog->size);
+ rdev_chain(rdev_out, &addrspace_32bit.rdev,
+ (uintptr_t)prog->start, prog->size);
}
static inline void prog_set_area(struct prog *prog, void *start, size_t size)
{
- prog_memory_init(prog, (uintptr_t)start, size);
+ prog->start = start;
+ prog->size = size;
}
static inline void prog_set_entry(struct prog *prog, void *e, void *arg)
diff --git a/src/soc/amd/common/block/pi/refcode_loader.c b/src/soc/amd/common/block/pi/refcode_loader.c
index 2fdbe83..bedd847 100644
--- a/src/soc/amd/common/block/pi/refcode_loader.c
+++ b/src/soc/amd/common/block/pi/refcode_loader.c
@@ -65,8 +65,9 @@
}
}
- return rdev_chain(rdev, prog_rdev(&prog), 0,
- region_device_sz(prog_rdev(&prog)));
+ prog_chain_mem_rdev(&prog, rdev);
+
+ return 0;
}
static int agesa_locate_stage_file(const char *name, struct region_device *rdev)
--
To view, visit https://review.coreboot.org/c/coreboot/+/46483
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: If7c0f1c5698fa0c326e23c553ea0fe928b25d202
Gerrit-Change-Number: 46483
Gerrit-PatchSet: 1
Gerrit-Owner: Julius Werner <jwerner(a)chromium.org>
Gerrit-Reviewer: Aaron Durbin <adurbin(a)chromium.org>
Gerrit-Reviewer: Andrey Petrov <andrey.petrov(a)gmail.com>
Gerrit-Reviewer: Patrick Rudolph <siro(a)das-labor.org>
Gerrit-MessageType: newchange
Julius Werner has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/47823 )
Change subject: cbfstool: Move alignment/baseaddress handling into cbfs_add_component()
......................................................................
cbfstool: Move alignment/baseaddress handling into cbfs_add_component()
The --alignment flag is currently only handled by cbfstool add, but
there seems little reason to not handle it for all file-adding commands
(the help text actually mentions it for add-stage as well but it doesn't
currently work there). This patch moves the related code (and the
related baseaddress handling) into cbfs_add_component(). As a nice side
effect this allows us to rearrange cbfs_add_component() such that we can
conclusively determine whether we need a hash attribute before trying to
align the file, allowing that code to correctly infer the final header
size even when a hash attribute was implicitly added (for an image built
with CBFS verification enabled).
Signed-off-by: Julius Werner <jwerner(a)chromium.org>
Change-Id: Idc6d68b2c7f30e5d136433adb3aec5a87053f992
---
M util/cbfstool/cbfstool.c
1 file changed, 37 insertions(+), 47 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/23/47823/1
diff --git a/util/cbfstool/cbfstool.c b/util/cbfstool/cbfstool.c
index 878db22..68c2c22 100644
--- a/util/cbfstool/cbfstool.c
+++ b/util/cbfstool/cbfstool.c
@@ -301,7 +301,7 @@
return convert_to_from_absolute_top_aligned(region, offset);
}
-static int do_cbfs_locate(int32_t *cbfs_addr, size_t metadata_size,
+static int do_cbfs_locate(uint32_t *cbfs_addr, size_t metadata_size,
size_t data_size)
{
if (!param.filename) {
@@ -363,7 +363,7 @@
int32_t address = cbfs_locate_entry(&image, data_size, param.pagesize,
param.alignment, metadata_size);
- if (address == -1) {
+ if (address < 0) {
ERROR("'%s' can't fit in CBFS for page-size %#x, align %#x.\n",
param.name, param.pagesize, param.alignment);
return 1;
@@ -616,11 +616,16 @@
static int cbfs_add_component(const char *filename,
const char *name,
uint32_t type,
- uint32_t offset,
uint32_t headeroffset,
convert_buffer_t convert)
{
size_t len_align = 0;
+ uint32_t offset = param.baseaddress_assigned ? param.baseaddress : 0;
+
+ if (param.alignment && param.baseaddress_assigned) {
+ ERROR("Cannot specify both alignment and base address\n");
+ return 1;
+ }
if (!filename) {
ERROR("You need to specify -f/--filename.\n");
@@ -652,22 +657,9 @@
return 1;
}
- /*
- * Check if Intel CPU topswap is specified this will require a
- * second bootblock to be added.
- */
- if (type == CBFS_TYPE_BOOTBLOCK && param.topswap_size)
- if (add_topswap_bootblock(&buffer, &offset))
- return 1;
-
struct cbfs_file *header =
cbfs_create_file_header(type, buffer.size, name);
- if (convert && convert(&buffer, &offset, header) != 0) {
- ERROR("Failed to parse file '%s'.\n", filename);
- goto error;
- }
-
/* Bootblock and CBFS header should never have file hashes. When adding
the bootblock it is important that we *don't* look up the metadata
hash yet (before it is added) or we'll cache an outdated result. */
@@ -683,12 +675,31 @@
goto error;
}
}
+ }
- if (param.hash != VB2_HASH_INVALID &&
- cbfs_add_file_hash(header, &buffer, param.hash) == -1) {
- ERROR("couldn't add hash for '%s'\n", name);
+ /* This needs to run after potentially updating param.hash above. */
+ if (param.alignment)
+ if (do_cbfs_locate(&offset, 0, 0))
goto error;
- }
+
+ /*
+ * Check if Intel CPU topswap is specified this will require a
+ * second bootblock to be added.
+ */
+ if (type == CBFS_TYPE_BOOTBLOCK && param.topswap_size)
+ if (add_topswap_bootblock(&buffer, &offset))
+ goto error;
+
+ if (convert && convert(&buffer, &offset, header) != 0) {
+ ERROR("Failed to parse file '%s'.\n", filename);
+ goto error;
+ }
+
+ /* This needs to run after convert(). */
+ if (param.hash != VB2_HASH_INVALID &&
+ cbfs_add_file_hash(header, &buffer, param.hash) == -1) {
+ ERROR("couldn't add hash for '%s'\n", name);
+ goto error;
}
if (param.autogen_attr) {
@@ -700,7 +711,7 @@
CBFS_FILE_ATTR_TAG_POSITION,
sizeof(struct cbfs_file_attr_position));
if (attrs == NULL)
- return -1;
+ goto error;
attrs->position = htonl(offset);
}
/* Add alignment attribute if used */
@@ -711,7 +722,7 @@
CBFS_FILE_ATTR_TAG_ALIGNMENT,
sizeof(struct cbfs_file_attr_align));
if (attrs == NULL)
- return -1;
+ goto error;
attrs->alignment = htonl(param.alignment);
}
}
@@ -722,7 +733,7 @@
CBFS_FILE_ATTR_TAG_IBB,
sizeof(struct cbfs_file_attribute));
if (attrs == NULL)
- return -1;
+ goto error;
/* For Intel TXT minimum align is 16 */
len_align = 16;
}
@@ -736,7 +747,7 @@
header, CBFS_FILE_ATTR_TAG_PADDING,
size);
if (attr == NULL)
- return -1;
+ goto error;
}
if (IS_TOP_ALIGNED_ADDRESS(offset))
@@ -892,7 +903,7 @@
return -1;
if (param.stage_xip) {
- int32_t address;
+ uint32_t address;
size_t data_size;
if (elf_program_file_size(buffer, &data_size) < 0) {
@@ -1027,16 +1038,7 @@
static int cbfs_add(void)
{
- int32_t address;
- convert_buffer_t convert;
- uint32_t local_baseaddress = param.baseaddress;
-
- if (param.alignment && param.baseaddress) {
- ERROR("Cannot specify both alignment and base address\n");
- return 1;
- }
-
- convert = cbfstool_convert_raw;
+ convert_buffer_t convert = cbfstool_convert_raw;
/* Set the alignment to 4KiB minimum for FSP blobs when no base address
* is provided so that relocation can occur. */
@@ -1049,18 +1051,9 @@
return 1;
}
- if (param.alignment) {
- /* CBFS compression file attribute is unconditionally added. */
- size_t metadata_sz = sizeof(struct cbfs_file_attr_compression);
- if (do_cbfs_locate(&address, metadata_sz, 0))
- return 1;
- local_baseaddress = address;
- }
-
return cbfs_add_component(param.filename,
param.name,
param.type,
- local_baseaddress,
param.headeroffset,
convert);
}
@@ -1082,7 +1075,6 @@
return cbfs_add_component(param.filename,
param.name,
CBFS_TYPE_STAGE,
- param.baseaddress,
param.headeroffset,
cbfstool_convert_mkstage);
}
@@ -1092,7 +1084,6 @@
return cbfs_add_component(param.filename,
param.name,
CBFS_TYPE_SELF,
- param.baseaddress,
param.headeroffset,
cbfstool_convert_mkpayload);
}
@@ -1112,7 +1103,6 @@
return cbfs_add_component(param.filename,
param.name,
CBFS_TYPE_SELF,
- param.baseaddress,
param.headeroffset,
cbfstool_convert_mkflatpayload);
}
--
To view, visit https://review.coreboot.org/c/coreboot/+/47823
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Idc6d68b2c7f30e5d136433adb3aec5a87053f992
Gerrit-Change-Number: 47823
Gerrit-PatchSet: 1
Gerrit-Owner: Julius Werner <jwerner(a)chromium.org>
Gerrit-MessageType: newchange