intel/skylake: During RO mode after FSP reset CB lose original state

CB used to clear recovery status towards romstage end after FSP
memory init. Later inside FSP silicon init due to HSIO CRC mismatch
it will request for an additional reset.On next boot system resume
in dev mode rather than recovery because lost its original state
due to FSP silicon init reset.

Hence an additional 1 reset require to identify original state.
With this patch, we will get future platform reset info during romstage
and restore back recovery request flag so, in next boot CB can maintain
its original status and avoid 1 extra reboot.

BUG=chrome-os-partner:43517
BRANCH=none
TEST= build and booted Kunimitsu and tested RO mode

Change-Id: Ibf86ff2b140cd9ad259eb39987d78177535cd975
Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
Original-Commit-Id: 40ddc21a97b318510116b7d5c4314380778a40f7
Original-Change-Id: Ia52835f87ef580317e91931aee5dd0119dea8111
Original-Signed-off-by: Subrata Banik <subrata.banik@intel.com>
Original-Reviewed-on: https://chromium-review.googlesource.com/302257
Original-Reviewed-by: Aaron Durbin <adurbin@chromium.org>
Reviewed-on: https://review.coreboot.org/12975
Tested-by: build bot (Jenkins)
Reviewed-by: Martin Roth <martinroth@google.com>
This commit is contained in:
Subrata Banik 2015-09-28 15:12:08 +05:30 committed by Martin Roth
parent e28846a0e8
commit df13c31ed6
6 changed files with 97 additions and 0 deletions

View File

@ -37,6 +37,7 @@ ramstage-y += cpu_info.c
ramstage-y += elog.c ramstage-y += elog.c
ramstage-y += finalize.c ramstage-y += finalize.c
ramstage-y += flash_controller.c ramstage-y += flash_controller.c
ramstage-$(CONFIG_VBOOT_VERIFY_FIRMWARE) += fsp_reset.c
ramstage-y += gpio.c ramstage-y += gpio.c
ramstage-y += igd.c ramstage-y += igd.c
ramstage-y += lpc.c ramstage-y += lpc.c

View File

@ -0,0 +1,62 @@
/*
* This file is part of the coreboot project.
*
* Copyright (C) 2015 Intel Corporation.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; version 2 of the License.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*/
#include <bootstate.h>
#include <vendorcode/google/chromeos/vboot_handoff.h>
static int is_recovery; /* flag to identify recovery mode */
/*
* coreboot used to clear recovery status towards romstage end after FSP
* memory init. Later inside FSP silicon init due to HSIO CRC mismatch
* or other silicon related programming may request for an additional
* reset. Thus on the next boot the system resumed in normal mode rather than
* recovery because it lost its original state due to FSP silicon init reset.
* Hence it needs an addition reset to get into old state and continue
* booting into recovery mode. This function will set recovery reason
* during Silicon init, in case of recovery mode booting,
* so, system will not lose its original context.
*/
static void set_recovery_request(void *unused)
{
is_recovery = recovery_mode_enabled();
/*
* Set recovery flag during Recovery Mode Silicon Init
* & store recovery request into VBNV
*/
if (is_recovery)
set_recovery_mode_into_vbnv(vboot_recovery_reason());
}
static void clear_recovery_request(void *unused)
{
/*
* Done with Silicon Init, it's safe to clear
* reset request now with assumption that no reset occurs hereafter
* so we will not miss original data.
*/
if (is_recovery)
set_recovery_mode_into_vbnv(0);
}
/*
* On Recovery Path Set Recovery Request during early RAMSTAGE
* before initiated Silicon Init
*/
BOOT_STATE_INIT_ENTRY(BS_PRE_DEVICE, BS_ON_ENTRY, set_recovery_request, NULL);
/*
* On Recovery Path Clear Recovery Request during early RAMSTAGE
* end of Silicon Init
*/
BOOT_STATE_INIT_ENTRY(BS_DEV_INIT_CHIPS, BS_ON_EXIT, clear_recovery_request, NULL);

View File

@ -29,6 +29,7 @@ void save_chromeos_gpios(void);
/* functions implemented in vbnv.c: */ /* functions implemented in vbnv.c: */
int get_recovery_mode_from_vbnv(void); int get_recovery_mode_from_vbnv(void);
void set_recovery_mode_into_vbnv(int recovery_reason);
int vboot_wants_oprom(void); int vboot_wants_oprom(void);
void read_vbnv(uint8_t *vbnv_copy); void read_vbnv(uint8_t *vbnv_copy);

View File

@ -104,6 +104,22 @@ static void vbnv_setup(void)
car_set_var(vbnv_initialized, 1); car_set_var(vbnv_initialized, 1);
} }
void set_recovery_mode_into_vbnv(int recovery_reason)
{
uint8_t vbnv_copy[CONFIG_VBNV_SIZE];
uint8_t crc_val;
read_vbnv(vbnv_copy);
vbnv_copy[RECOVERY_OFFSET] = recovery_reason;
crc_val = crc8(vbnv_copy, CRC_OFFSET);
vbnv_copy[CRC_OFFSET] = crc_val;
save_vbnv(vbnv_copy);
}
int get_recovery_mode_from_vbnv(void) int get_recovery_mode_from_vbnv(void)
{ {
if (!is_vbnv_initialized()) if (!is_vbnv_initialized())

View File

@ -77,6 +77,21 @@ int vboot_enable_recovery(void)
return vboot_handoff_flag(VB_INIT_OUT_ENABLE_RECOVERY); return vboot_handoff_flag(VB_INIT_OUT_ENABLE_RECOVERY);
} }
int vboot_recovery_reason(void)
{
struct vboot_handoff *vbho;
VbSharedDataHeader *sd;
vbho = cbmem_find(CBMEM_ID_VBOOT_HANDOFF);
if (vbho == NULL)
return 0;
sd = (VbSharedDataHeader *)vbho->shared_data;
return sd->recovery_reason;
}
void vboot_reboot(void) void vboot_reboot(void)
{ {
if (IS_ENABLED(CONFIG_CONSOLE_CBMEM_DUMP_TO_UART)) if (IS_ENABLED(CONFIG_CONSOLE_CBMEM_DUMP_TO_UART))

View File

@ -42,6 +42,8 @@ int vboot_skip_display_init(void);
int vboot_enable_recovery(void); int vboot_enable_recovery(void);
int vboot_enable_developer(void); int vboot_enable_developer(void);
int vboot_recovery_reason(void);
void vboot_reboot(void); void vboot_reboot(void);
/* Main logic for verified boot. verstage() is the stage entry point /* Main logic for verified boot. verstage() is the stage entry point