Attention is currently required from: ChiaLing, Paul Menzel, Ryan Lin, Subrata Banik, Sumeet R Pawnikar, Zhuohao Lee.
Reka Norman has posted comments on this change. ( https://review.coreboot.org/c/coreboot/+/75679?usp=email )
Change subject: soc/intel/jasperlake: Add per-SKU power limits
......................................................................
Patch Set 7:
(1 comment)
File src/mainboard/google/dedede/variants/blipper/overridetree.cb:
https://review.coreboot.org/c/coreboot/+/75679/comment/0c5fb02c_f333492a :
PS5, Line 62: register "power_limits_config" = "{
: .tdp_pl1_override = 6,
: .tdp_pl2_override = 20,
: }"
> Hi Reka, […]
I just want to make sure we're not changing the settings on existing dedede devices. Currently the baseboard doesn't set PL4, but with your change it will, so this affects all devices.
If I understand correctly, 60W is the default, so if coreboot doesn't set PL4 it will be set to 60W. Is that right? I just checked a random dedede device and that seems to be the case.
If so then I guess technically this would be fine, but I still think it's safer to keep the coreboot behaviour the same for exising devices, i.e. coreboot shouldn't set PL4.
How about in the baseboard devicetree we don't set PL4, and dibbi variants can override it?
--
To view, visit https://review.coreboot.org/c/coreboot/+/75679?usp=email
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Ic086e32a2692f4f5f9b661585b216fa207fc56fd
Gerrit-Change-Number: 75679
Gerrit-PatchSet: 7
Gerrit-Owner: ChiaLing <chia-ling.hou(a)intel.com>
Gerrit-Reviewer: Reka Norman <rekanorman(a)chromium.org>
Gerrit-Reviewer: Ryan Lin <ryan.lin(a)intel.com>
Gerrit-Reviewer: Subrata Banik <subratabanik(a)google.com>
Gerrit-Reviewer: Zhuohao Lee <zhuohao(a)google.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Paul Menzel <paulepanter(a)mailbox.org>
Gerrit-CC: Sumeet R Pawnikar <sumeet.r.pawnikar(a)intel.com>
Gerrit-Attention: Subrata Banik <subratabanik(a)google.com>
Gerrit-Attention: Paul Menzel <paulepanter(a)mailbox.org>
Gerrit-Attention: Sumeet R Pawnikar <sumeet.r.pawnikar(a)intel.com>
Gerrit-Attention: Ryan Lin <ryan.lin(a)intel.com>
Gerrit-Attention: ChiaLing <chia-ling.hou(a)intel.com>
Gerrit-Attention: Zhuohao Lee <zhuohao(a)google.com>
Gerrit-Comment-Date: Wed, 14 Jun 2023 01:31:49 +0000
Gerrit-HasComments: Yes
Gerrit-Has-Labels: No
Comment-In-Reply-To: Reka Norman <rekanorman(a)chromium.org>
Comment-In-Reply-To: ChiaLing <chia-ling.hou(a)intel.com>
Gerrit-MessageType: comment
Eric Lai has submitted this change. ( https://review.coreboot.org/c/coreboot/+/75700?usp=email )
Change subject: mb/google/myst: Update PCIE_RST_L drive
......................................................................
mb/google/myst: Update PCIE_RST_L drive
PCIE_RST_L is attached to a pull down, change the init to NC.
BUG=None
TEST=Boot to OS
Change-Id: I3f7a548a33eb18327139f033d7c0d6a1843f1639
Signed-off-by: Jon Murphy <jpmurphy(a)google.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/75700
Reviewed-by: Tim Van Patten <timvp(a)google.com>
Reviewed-by: Martin Roth <martin.roth(a)amd.corp-partner.google.com>
Tested-by: build bot (Jenkins) <no-reply(a)coreboot.org>
---
M src/mainboard/google/myst/variants/baseboard/gpio.c
1 file changed, 1 insertion(+), 1 deletion(-)
Approvals:
build bot (Jenkins): Verified
Martin Roth: Looks good to me, approved
Tim Van Patten: Looks good to me, approved
diff --git a/src/mainboard/google/myst/variants/baseboard/gpio.c b/src/mainboard/google/myst/variants/baseboard/gpio.c
index f97cc16..d6cbe1e 100644
--- a/src/mainboard/google/myst/variants/baseboard/gpio.c
+++ b/src/mainboard/google/myst/variants/baseboard/gpio.c
@@ -52,7 +52,7 @@
PAD_NC(GPIO_24),
/* GPIO_25-26: Not available */
/* SOC_PCIE_RST1_R_L */
- PAD_NFO(GPIO_27, PCIE_RST1_L, HIGH),
+ PAD_NC(GPIO_27),
/* GPIO_28: Not available */
/* SD_AUX_RST */
PAD_GPO(GPIO_29, LOW),
--
To view, visit https://review.coreboot.org/c/coreboot/+/75700?usp=email
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I3f7a548a33eb18327139f033d7c0d6a1843f1639
Gerrit-Change-Number: 75700
Gerrit-PatchSet: 7
Gerrit-Owner: Jon Murphy <jpmurphy(a)google.com>
Gerrit-Reviewer: Eric Lai <eric_lai(a)quanta.corp-partner.google.com>
Gerrit-Reviewer: Karthik Ramasubramanian <kramasub(a)google.com>
Gerrit-Reviewer: Martin Roth <martin.roth(a)amd.corp-partner.google.com>
Gerrit-Reviewer: Tim Van Patten <timvp(a)google.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-MessageType: merged
Felix Held has submitted this change. ( https://review.coreboot.org/c/coreboot/+/75766?usp=email )
Change subject: soc/amd/common/cpu/noncar/cpu: rename get_smee_reserved_address_bits
......................................................................
soc/amd/common/cpu/noncar/cpu: rename get_smee_reserved_address_bits
Rename get_smee_reserved_address_bits to get_sme_reserved_address_bits
since the feature is called secure memory encryption and the last 'e' in
SMEE bit in the SYSCFG MSR just stands for enable. The function will
return a valid number of reserved address bits no matter if this is
enabled or not, so drop the second 'e'.
Signed-off-by: Felix Held <felix-coreboot(a)felixheld.de>
Change-Id: I3795f7a861e39cb6c8209fee10191f233cbcd308
Reviewed-on: https://review.coreboot.org/c/coreboot/+/75766
Tested-by: build bot (Jenkins) <no-reply(a)coreboot.org>
Reviewed-by: Fred Reitberger <reitbergerfred(a)gmail.com>
---
M src/soc/amd/common/block/cpu/noncar/cpu.c
1 file changed, 2 insertions(+), 2 deletions(-)
Approvals:
build bot (Jenkins): Verified
Fred Reitberger: Looks good to me, approved
diff --git a/src/soc/amd/common/block/cpu/noncar/cpu.c b/src/soc/amd/common/block/cpu/noncar/cpu.c
index 891dece..eec593c 100644
--- a/src/soc/amd/common/block/cpu/noncar/cpu.c
+++ b/src/soc/amd/common/block/cpu/noncar/cpu.c
@@ -35,7 +35,7 @@
wrmsr(MSR_CSTATE_ADDRESS, cst_addr);
}
-static uint32_t get_smee_reserved_address_bits(void)
+static uint32_t get_sme_reserved_address_bits(void)
{
if (rdmsr(SYSCFG_MSR).raw & SYSCFG_MSR_SMEE)
return (cpuid_ebx(CPUID_EBX_MEM_ENCRYPT) &
@@ -47,5 +47,5 @@
uint32_t get_usable_physical_address_bits(void)
{
- return cpu_phys_address_size() - get_smee_reserved_address_bits();
+ return cpu_phys_address_size() - get_sme_reserved_address_bits();
}
--
To view, visit https://review.coreboot.org/c/coreboot/+/75766?usp=email
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I3795f7a861e39cb6c8209fee10191f233cbcd308
Gerrit-Change-Number: 75766
Gerrit-PatchSet: 2
Gerrit-Owner: Felix Held <felix-coreboot(a)felixheld.de>
Gerrit-Reviewer: Felix Held <felix-coreboot(a)felixheld.de>
Gerrit-Reviewer: Fred Reitberger <reitbergerfred(a)gmail.com>
Gerrit-Reviewer: Jason Glenesk <jason.glenesk(a)gmail.com>
Gerrit-Reviewer: Matt DeVillier <matt.devillier(a)amd.corp-partner.google.com>
Gerrit-Reviewer: Raul Rangel <rrangel(a)chromium.org>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-MessageType: merged
Attention is currently required from: Paul Menzel, Subrata Banik.
Pratikkumar V Prajapati has posted comments on this change. ( https://review.coreboot.org/c/coreboot/+/75625?usp=email )
Change subject: soc/intel/common: Introduce configs for TME exclusion range and new key generation
......................................................................
Patch Set 3:
(2 comments)
File src/soc/intel/common/block/cpu/Kconfig:
https://review.coreboot.org/c/coreboot/+/75625/comment/cb36177d_b5bb2397 :
PS3, Line 145: INTEL_TME_GEN_NEW_KEY_EACH_WARM_REBOOT
> INTEL_TME_UPDATE_KEY_ON_WARM_BOOT or INTEL_TME_GENERATE_KEY_ON_WARM_BOOT
renamed it, let me know.
https://review.coreboot.org/c/coreboot/+/75625/comment/16816686_c7cbb15f :
PS3, Line 155: INTEL_TME_EXCLUDE_CBMEM
> how about the below name knowing this is file for intel common code hence, dropping the intel here. […]
renamed it, let me know.
--
To view, visit https://review.coreboot.org/c/coreboot/+/75625?usp=email
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Id5008fee07b97faadc7dd585f445295425173782
Gerrit-Change-Number: 75625
Gerrit-PatchSet: 3
Gerrit-Owner: Pratikkumar V Prajapati <pratikkumar.v.prajapati(a)intel.com>
Gerrit-Reviewer: Subrata Banik <subratabanik(a)google.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Paul Menzel <paulepanter(a)mailbox.org>
Gerrit-Attention: Subrata Banik <subratabanik(a)google.com>
Gerrit-Attention: Paul Menzel <paulepanter(a)mailbox.org>
Gerrit-Comment-Date: Tue, 13 Jun 2023 22:06:18 +0000
Gerrit-HasComments: Yes
Gerrit-Has-Labels: No
Comment-In-Reply-To: Subrata Banik <subratabanik(a)google.com>
Gerrit-MessageType: comment
Attention is currently required from: Paul Menzel, Pratikkumar V Prajapati.
Hello Subrata Banik, build bot (Jenkins),
I'd like you to reexamine a change. Please visit
https://review.coreboot.org/c/coreboot/+/75625?usp=email
to look at the new patch set (#4).
The following approvals got outdated and were removed:
Verified+1 by build bot (Jenkins)
Change subject: soc/intel/common: Introduce configs for TME exclusion range and new key generation
......................................................................
soc/intel/common: Introduce configs for TME exclusion range and new key generation
Add following config options.
1. TME_GENERATE_NEW_KEY_ON_WARM_BOOT
Program Intel TME to generate a new key for each warm reboot. TME
always generates a new key on each cold reboot. With this option
enabled TME generates a new key even in warm reboot. Without this
option TME reuses the key for warm reboot.
2. TME_EXCLUDE_CBMEM_ENCRYPTION
Allows CBMEM to get excluded from being encrypted by Intel TME.
When TME is enabled it encrypts whole DRAM. TME provides option
to carve out a region of physical memory to get excluded from
encryption. With this config enabled, CBMEM does not get encrypted
by TME. If TME is not programmed to generate a new key in warm
reboot, exclusion range does not need be programmed due to the
fact that TME uses same key in warm reboot if
TME_GENERATE_NEW_KEY_ON_WARM_BOOT is not set. But if TME is
programmed to generate a new key in warm reboot, contents of the
CBMEM get encrypted with a new key in each warm reboot case and
that leads to loss of CBMEM data from previous warm boot. So
enabling this config allows CBMEM to get excluded from being
encrypted and can be accessed in warm reboot case also.
Bug=b:276120526
TEST=Able to build rex
Signed-off-by: Pratikkumar Prajapati <pratikkumar.v.prajapati(a)intel.com>
Change-Id: Id5008fee07b97faadc7dd585f445295425173782
---
M src/soc/intel/common/block/cpu/Kconfig
1 file changed, 29 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/25/75625/4
--
To view, visit https://review.coreboot.org/c/coreboot/+/75625?usp=email
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: Id5008fee07b97faadc7dd585f445295425173782
Gerrit-Change-Number: 75625
Gerrit-PatchSet: 4
Gerrit-Owner: Pratikkumar V Prajapati <pratikkumar.v.prajapati(a)intel.com>
Gerrit-Reviewer: Subrata Banik <subratabanik(a)google.com>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Paul Menzel <paulepanter(a)mailbox.org>
Gerrit-Attention: Paul Menzel <paulepanter(a)mailbox.org>
Gerrit-Attention: Pratikkumar V Prajapati <pratikkumar.v.prajapati(a)intel.com>
Gerrit-MessageType: newpatchset