aboutsummaryrefslogtreecommitdiff
path: root/resources
diff options
context:
space:
mode:
author4 of 7 (Leah Rowe) info@minifree.org <info@minifree.org>2017-01-22 03:18:10 +0000
committer4 of 7 (Leah Rowe) info@minifree.org <info@minifree.org>2017-01-22 03:25:50 +0000
commitcab47f3178db195d797db89486dc56383c28aace (patch)
treee515305d51c8220dda5c74e3c91de876fa4931f5 /resources
parentbae4652b291d4310c9ff105a874c009b3cdbaedc (diff)
downloadlibrebootfr-cab47f3178db195d797db89486dc56383c28aace.tar.gz
librebootfr-cab47f3178db195d797db89486dc56383c28aace.zip
remove CrOS boards/utils from old build system (new build system has them)
Diffstat (limited to 'resources')
-rw-r--r--resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch30
-rw-r--r--resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch33
-rw-r--r--resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch29
-rw-r--r--resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch132
-rw-r--r--resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch34
-rw-r--r--resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch70
-rw-r--r--resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch30
-rw-r--r--resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch251
-rw-r--r--resources/libreboot/config/depthcharge/veyron_speedy/architecture1
-rw-r--r--resources/libreboot/config/depthcharge/veyron_speedy/cbrevision1
-rw-r--r--resources/libreboot/config/depthcharge/veyron_speedy/config528
-rw-r--r--resources/libreboot/config/depthcharge/veyron_speedy/vbootrevision1
-rwxr-xr-xresources/libreboot/install/depthcharge/cros-flash-replace96
-rw-r--r--resources/libreboot/install/depthcharge/veyron_speedy/layout.txt2
-rw-r--r--resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0001-util-xcompile-Detect-toolchains-with-bare-arm-prefix.patch26
-rw-r--r--resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0002-libpayload-use-32bit-access-when-accessing-4byte-wid.patch48
-rw-r--r--resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0003-rockchip-rk3288-UART-uses-32bit-wide-registers.patch31
-rw-r--r--resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0004-chromeos-Allow-disabling-vboot-firmware-verification.patch112
-rw-r--r--resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0001-firmware-Developer-mode-timeout-delay-shortening-dow.patch33
-rw-r--r--resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0002-firmware-Text-based-screen-display-in-priority.patch39
-rw-r--r--resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0003-firmware-NV-context-pointer-handoff-to-VbExDisplaySc.patch91
-rw-r--r--resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0004-firmware-Hold-key-combination-in-developer-mode.patch49
-rw-r--r--resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0005-firmware-Screen-blank-and-wait-at-disabled-USB-boot-.patch55
-rw-r--r--resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0006-firmware-Separate-screen-and-wait-at-device-informat.patch79
-rw-r--r--resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0007-firmware-Localization-keys-removal.patch53
-rwxr-xr-xresources/scripts/helpers/build/clean/depthcharge38
-rwxr-xr-xresources/scripts/helpers/build/config/dcmodify72
-rwxr-xr-xresources/scripts/helpers/build/config/dcreplace63
-rwxr-xr-xresources/scripts/helpers/build/config/dcupdate72
-rwxr-xr-xresources/scripts/helpers/build/release/src3
-rwxr-xr-xresources/scripts/helpers/build/roms/withdepthcharge207
-rwxr-xr-xresources/scripts/helpers/download/depthcharge75
32 files changed, 0 insertions, 2384 deletions
diff --git a/resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch b/resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch
deleted file mode 100644
index d99a574d..00000000
--- a/resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From 80e3428c2e50b5a6838d71a89007f610eda5e2dc Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 3 Aug 2015 14:39:42 +0200
-Subject: [PATCH 1/8] arm: armv7-a march abi flag for ARMv7 hardware
-
-Specifying the march is required to get depthcharge to build with e.g. the arm
-toolchain built by coreboot's crossgcc script. Without this flag, the toolchain
-will complain that some ARM mrc/mcr ASM instructions are not defined.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/arch/arm/build_vars | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/arch/arm/build_vars b/src/arch/arm/build_vars
-index b2fce32..455e370 100644
---- a/src/arch/arm/build_vars
-+++ b/src/arch/arm/build_vars
-@@ -17,7 +17,7 @@
-
- VB_FIRMWARE_ARCH=arm
- ifeq ($(CONFIG_ARCH_ARM_V7),y)
--ARCH_ABI_FLAGS += -mthumb
-+ARCH_ABI_FLAGS += -mthumb -march=armv7-a
- endif
-
- ifeq ($(CONFIG_ARCH_ARM_V8),y)
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch b/resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch
deleted file mode 100644
index 611be4ff..00000000
--- a/resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch
+++ /dev/null
@@ -1,33 +0,0 @@
-From f095d901afe02728fb0471d51e02553036cd2538 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 3 Aug 2015 14:49:34 +0200
-Subject: [PATCH 2/8] Coreboot image integration removal
-
-There is no need to integrate the built depthcharge binary inside a coreboot
-image right after building it, coreboot will handle this on its own.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/Makefile.inc | 6 ------
- 1 file changed, 6 deletions(-)
-
-diff --git a/src/Makefile.inc b/src/Makefile.inc
-index a73785b..564dd13 100644
---- a/src/Makefile.inc
-+++ b/src/Makefile.inc
-@@ -77,12 +77,6 @@ $(eval $(call declare_bin,$1,$2 $$$$(VB_LIB),$3))
-
- $1.payload: $1.elf
- @printf " PAYLOAD $$(subst $$(obj)/,,$$@)\n"
-- $$(Q)-rm -f $1.rom $1.bb
-- $$(Q)dd if=/dev/zero of=$1.bb bs=512 count=1
-- $$(Q)cbfstool $1.rom create -m $$(ARCH) -s 1024K -B $1.bb
-- $$(Q)cbfstool $1.rom add-payload -f $$< -n dc.elf -c lzma
-- $$(Q)cbfstool $1.rom extract -n dc.elf -f $$@
-- $$(Q)rm -f $1.rom $1.bb
-
- $(notdir $1)_unified: $1.bin $1.payload
- PHONY += $(notdir $1)_unified
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch b/resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch
deleted file mode 100644
index d4b6ae98..00000000
--- a/resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From dfdcd8c218215df4e1523bf6dd11270bc4f52605 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Sun, 9 Aug 2015 12:06:28 +0200
-Subject: [PATCH 3/8] DOTCONFIG location correction
-
-The configuration file doesn't have to be in src and HAVE_DOTCONFIG holds its
-current location.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- Makefile | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/Makefile b/Makefile
-index a1a9d33..13305cd 100644
---- a/Makefile
-+++ b/Makefile
-@@ -73,7 +73,7 @@ all: help
-
- else
-
--include $(src)/.config
-+include $(HAVE_DOTCONFIG)
-
- ifeq ($(CONFIG_ARCH_X86),y)
- ARCH = x86
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch b/resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch
deleted file mode 100644
index ed491a4c..00000000
--- a/resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch
+++ /dev/null
@@ -1,132 +0,0 @@
-From 0ec9edead1d9de5f913333e6aa77bcd3de83a617 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Sun, 9 Aug 2015 12:09:35 +0200
-Subject: [PATCH 4/8] Adaptation for a read-only boot path when no vboot
- handoff data is found
-
-When no vboot handoff data is found, this makes the unified depthcharge build
-attempt to follow the read-only boot path.
-
-vboot_select_firmware is called to grab the kernel key from the firmware header,
-but it won't actually jump to a RW version of depthcharge.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/image/Makefile.inc | 1 +
- src/image/startrw_stub.c | 34 ++++++++++++++++++++++++++++++++++
- src/vboot/main.c | 17 ++++++++++++++++-
- src/vboot/util/commonparams-unified.c | 11 +++++++++--
- 4 files changed, 60 insertions(+), 3 deletions(-)
- create mode 100644 src/image/startrw_stub.c
-
-diff --git a/src/image/Makefile.inc b/src/image/Makefile.inc
-index 95aeda1..4b74c11 100644
---- a/src/image/Makefile.inc
-+++ b/src/image/Makefile.inc
-@@ -18,6 +18,7 @@
- depthcharge-y += fmap.c
- depthcharge-y += index.c
- readonly-y += startrw.c
-+unified-y += startrw_stub.c
-
- trampoline-y += load_elf.c
-
-diff --git a/src/image/startrw_stub.c b/src/image/startrw_stub.c
-new file mode 100644
-index 0000000..8e40302
---- /dev/null
-+++ b/src/image/startrw_stub.c
-@@ -0,0 +1,34 @@
-+/*
-+ * Copyright 2012 Google Inc.
-+ *
-+ * See file CREDITS for list of people who contributed to this
-+ * project.
-+ *
-+ * This program is free software; you can redistribute it and/or
-+ * modify it under the terms of the GNU General Public License as
-+ * published by the Free Software Foundation; either version 2 of
-+ * the License, or (at your option) any later version.
-+ *
-+ * This program is distributed in the hope that it will be useful,
-+ * but without any warranty; without even the implied warranty of
-+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-+ * GNU General Public License for more details.
-+ *
-+ * You should have received a copy of the GNU General Public License
-+ * along with this program; if not, write to the Free Software
-+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-+ * MA 02111-1307 USA
-+ */
-+
-+#include <libpayload.h>
-+#include <lzma.h>
-+
-+#include "base/elf.h"
-+#include "image/enter_trampoline.h"
-+#include "image/startrw.h"
-+#include "image/symbols.h"
-+
-+int start_rw_firmware(const void *compressed_image, uint32_t size)
-+{
-+ return 0;
-+}
-diff --git a/src/vboot/main.c b/src/vboot/main.c
-index 7dc05f5..97a218d 100644
---- a/src/vboot/main.c
-+++ b/src/vboot/main.c
-@@ -82,6 +82,20 @@ static int vboot_init_handoff()
- return vboot_do_init_out_flags(vboot_handoff->init_params.out_flags);
- }
-
-+static int vboot_init_ro()
-+{
-+ // Set up the common param structure, clearing shared data.
-+ if (common_params_init(1))
-+ return 1;
-+
-+ // Initialize vboot.
-+ if (vboot_init())
-+ return 1;
-+
-+ // Select firmware.
-+ return vboot_select_firmware();
-+}
-+
- int main(void)
- {
- // Let the world know we're alive.
-@@ -108,7 +122,8 @@ int main(void)
-
- // Set up the common param structure, not clearing shared data.
- if (vboot_init_handoff())
-- halt();
-+ if (vboot_init_ro())
-+ halt();
-
- /* Fastboot is only entered in recovery path */
- if (vboot_in_recovery())
-diff --git a/src/vboot/util/commonparams-unified.c b/src/vboot/util/commonparams-unified.c
-index 10fcb93..575dcfd 100644
---- a/src/vboot/util/commonparams-unified.c
-+++ b/src/vboot/util/commonparams-unified.c
-@@ -28,7 +28,14 @@
- int find_common_params(void **blob, int *size)
- {
- struct vboot_handoff *vboot_handoff = lib_sysinfo.vboot_handoff;
-- *blob = &vboot_handoff->shared_data[0];
-- *size = ARRAY_SIZE(vboot_handoff->shared_data);
-+
-+ if (vboot_handoff != NULL) {
-+ *blob = &vboot_handoff->shared_data[0];
-+ *size = ARRAY_SIZE(vboot_handoff->shared_data);
-+ } else {
-+ *blob = shared_data_blob;
-+ *size = sizeof(shared_data_blob);
-+ }
-+
- return 0;
- }
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch b/resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch
deleted file mode 100644
index 8bc56a73..00000000
--- a/resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From 40668e8b5fb9a9e07a3b1ddf334bd4e12a38525f Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 18 Apr 2016 11:14:19 +0200
-Subject: [PATCH 5/8] vboot: Only initialize cparams once
-
-Calling common_params_init multiple times in a row results in emptying cparams
-each time, causing the GBB data to be lost as it is only read once (the first
-time).
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/util/commonparams.c | 6 ++++--
- 1 file changed, 4 insertions(+), 2 deletions(-)
-
-diff --git a/src/vboot/util/commonparams.c b/src/vboot/util/commonparams.c
-index 9f29473..3a71a8b 100644
---- a/src/vboot/util/commonparams.c
-+++ b/src/vboot/util/commonparams.c
-@@ -159,8 +159,10 @@ int is_cparams_initialized(void)
- int common_params_init(int clear_shared_data)
- {
- // Set up the common param structure.
-- memset(&cparams, 0, sizeof(cparams));
-- cparams_initialized = 1;
-+ if (!is_cparams_initialized()) {
-+ memset(&cparams, 0, sizeof(cparams));
-+ cparams_initialized = 1;
-+ }
-
- if (gbb_init())
- return 1;
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch b/resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch
deleted file mode 100644
index 7692ff2b..00000000
--- a/resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch
+++ /dev/null
@@ -1,70 +0,0 @@
-From 8acd4854603672dd1bc16900c9eb58dd5c8c342d Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 20:24:50 +0200
-Subject: [PATCH 6/8] Proper firmware index report for read-only boot path
-
-When booting from a read-only boot path, the active firmware to report is RO.
-This is detected with the lack of a vboot handoff pointer.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/crossystem/fdt.c | 2 +-
- src/vboot/firmware_id.c | 6 +++++-
- src/vboot/firmware_id.h | 1 +
- 3 files changed, 7 insertions(+), 2 deletions(-)
-
-diff --git a/src/vboot/crossystem/fdt.c b/src/vboot/crossystem/fdt.c
-index ca39dac..a79b192 100644
---- a/src/vboot/crossystem/fdt.c
-+++ b/src/vboot/crossystem/fdt.c
-@@ -73,7 +73,7 @@ static int install_crossystem_data(DeviceTreeFixup *fixup, DeviceTree *tree)
- nvstorage_flash_get_blob_size());
- }
-
-- int fw_index = vdat->firmware_index;
-+ int fw_index = get_active_fw_index(vdat);
- const char *fwid;
- int fwid_size;
-
-diff --git a/src/vboot/firmware_id.c b/src/vboot/firmware_id.c
-index 3662921..955bc84 100644
---- a/src/vboot/firmware_id.c
-+++ b/src/vboot/firmware_id.c
-@@ -36,6 +36,7 @@ static struct fwid {
- } fw_fmap_ops[] = {
- {VDAT_RW_A, "RW_FWID_A", NULL, 0, "RW A: ID NOT FOUND"},
- {VDAT_RW_B, "RW_FWID_B", NULL, 0, "RW B: ID NOT FOUND"},
-+ {VDAT_RO, "RO_FRID", NULL, 0, "RO: ID NOT FOUND"},
- {VDAT_RECOVERY, "RO_FRID", NULL, 0, "RO: ID NOT FOUND"},
- };
-
-@@ -130,10 +131,13 @@ static VbSharedDataHeader *get_vdat(void)
- return NULL;
- }
-
--static inline int get_active_fw_index(VbSharedDataHeader *vdat)
-+int get_active_fw_index(VbSharedDataHeader *vdat)
- {
- int fw_index = VDAT_UNKNOWN;
-
-+ if (lib_sysinfo.vboot_handoff == NULL)
-+ return VDAT_RO;
-+
- if (vdat)
- fw_index = vdat->firmware_index;
-
-diff --git a/src/vboot/firmware_id.h b/src/vboot/firmware_id.h
-index fb6f206..090e9d1 100644
---- a/src/vboot/firmware_id.h
-+++ b/src/vboot/firmware_id.h
-@@ -49,6 +49,7 @@ int get_rwb_fw_size(void);
- * Get firmware details for currently active fw type. It looks up vdat,
- * identifies fw_index and returns appropriate id and size for that index.
- */
-+int get_active_fw_index(VbSharedDataHeader *vdat);
- const char *get_active_fw_id(void);
- int get_active_fw_size(void);
-
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch b/resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch
deleted file mode 100644
index bfbe96b8..00000000
--- a/resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From ff08bf3966b3c299d6ead9707cc17a71ff9e50c7 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 20:30:14 +0200
-Subject: [PATCH 7/8] fdt: nonvolatile-context-storage report to mkbp for EC NV
- storage
-
-This allows old versions of crossystem to detect that it should use mosys to
-access NV storage in case it is stored on the EC.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/crossystem/fdt.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/vboot/crossystem/fdt.c b/src/vboot/crossystem/fdt.c
-index a79b192..0487513 100644
---- a/src/vboot/crossystem/fdt.c
-+++ b/src/vboot/crossystem/fdt.c
-@@ -56,7 +56,7 @@ static int install_crossystem_data(DeviceTreeFixup *fixup, DeviceTree *tree)
- dt_add_string_prop(node, "nonvolatile-context-storage","nvram");
- } else if (CONFIG_NV_STORAGE_CROS_EC) {
- dt_add_string_prop(node,
-- "nonvolatile-context-storage", "cros-ec");
-+ "nonvolatile-context-storage", "mkbp");
- } else if (CONFIG_NV_STORAGE_DISK) {
- dt_add_string_prop(node, "nonvolatile-context-storage", "disk");
- dt_add_u32_prop(node, "nonvolatile-context-lba",
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch b/resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch
deleted file mode 100644
index cacc3ecd..00000000
--- a/resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch
+++ /dev/null
@@ -1,251 +0,0 @@
-From 50a27cb948d3e944e3e466146b0d81939e8ce9a5 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Tue, 11 Aug 2015 11:22:54 +0200
-Subject: [PATCH 8/8] vboot: Display callbacks for developer and recovery mode
- screens
-
-We don't want to use bitmaps stored in GBB since they recommend the use of non-
-free software (Chrome OS), so this implements a text-based interface instead.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/callbacks/display.c | 200 ++++++++++++++++++++++++++++++++++++++----
- 1 file changed, 185 insertions(+), 15 deletions(-)
-
-diff --git a/src/vboot/callbacks/display.c b/src/vboot/callbacks/display.c
-index 183e278..ece9140 100644
---- a/src/vboot/callbacks/display.c
-+++ b/src/vboot/callbacks/display.c
-@@ -86,12 +86,19 @@ void print_on_center(const char *msg)
- print_string(msg);
- }
-
--VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale)
-+VbError_t VbExDisplayScreen(uint32_t screen_type, VbNvContext *vnc,
-+ uint32_t locale)
- {
-- const char *msg = NULL;
--
-- if (vboot_draw_screen(screen_type, locale) == CBGFX_SUCCESS)
-- return VBERROR_SUCCESS;
-+ unsigned int rows, cols;
-+ uint32_t default_boot = 0;
-+ uint32_t boot_signed_only = 0;
-+ uint32_t boot_usb = 0;
-+ uint32_t boot_legacy = 0;
-+ const char *fw_id;
-+ int fw_index;
-+ void *blob = NULL;
-+ int size = 0;
-+ char *msg;
-
- /*
- * Show the debug messages for development. It is a backup method
-@@ -103,31 +110,194 @@ VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale)
- video_console_clear();
- break;
- case VB_SCREEN_DEVELOPER_WARNING:
-- msg = "developer mode warning";
-+ video_console_clear();
-+ video_console_set_cursor(0, 0);
-+
-+ if (vnc != NULL) {
-+ VbNvGet(vnc, VBNV_DEV_BOOT_SIGNED_ONLY,
-+ &boot_signed_only);
-+
-+ VbNvGet(vnc, VBNV_DEV_BOOT_USB, &boot_usb);
-+ VbNvGet(vnc, VBNV_DEV_BOOT_LEGACY, &boot_legacy);
-+
-+ VbNvGet(vnc, VBNV_DEV_DEFAULT_BOOT, &default_boot);
-+ }
-+
-+ print_string(
-+ "Welcome to developer mode!\n\n"
-+ "Useful key combinations:\n"
-+ "- Ctrl + H: Hold developer mode\n"
-+ "- Ctrl + D: Boot from internal storage\n");
-+
-+ if (boot_usb)
-+ print_string("- Ctrl + U: Boot from external media\n");
-+
-+ if (boot_legacy)
-+ print_string("- Ctrl + L: Boot from legacy payload\n");
-+
-+ print_string(
-+ "- Ctrl + I: Show device information\n"
-+ "- Space: Disable developer mode\n\n"
-+ "This screen is shown for 3 seconds (if not held)."
-+ "\n\n");
-+
-+ if (vnc != NULL) {
-+ if (!boot_signed_only)
-+ print_string(
-+ "Warning: this device will boot kernels"
-+ " without verifying their signature!"
-+ "\n");
-+
-+ if (boot_usb)
-+ print_string(
-+ "Warning: this device will boot from "
-+ "external media!\n");
-+
-+ if (boot_legacy)
-+ print_string(
-+ "Warning: this device will boot legacy "
-+ "payloads!\n");
-+
-+ if (!boot_signed_only || boot_usb)
-+ print_string("\n");
-+
-+ print_string("Default boot medium: ");
-+
-+ switch (default_boot) {
-+ case VBNV_DEV_DEFAULT_BOOT_DISK:
-+ print_string("internal storage");
-+ break;
-+ case VBNV_DEV_DEFAULT_BOOT_USB:
-+ print_string("external media");
-+ break;
-+ case VBNV_DEV_DEFAULT_BOOT_LEGACY:
-+ print_string("legacy payload");
-+ break;
-+ default:
-+ print_string("unknown");
-+ break;
-+ }
-+
-+ print_string("\n");
-+ }
-+
-+ find_common_params(&blob, &size);
-+
-+ if (blob != NULL) {
-+ VbSharedDataHeader *vdat = (VbSharedDataHeader *) blob;
-+ fw_index = get_active_fw_index(vdat);
-+ fw_id = get_fw_id(fw_index);
-+
-+ if (fw_id == NULL)
-+ fw_id = "NOT FOUND";
-+
-+ print_string("Active firmware id: ");
-+ print_string(fw_id);
-+
-+ switch (fw_index) {
-+ case VDAT_RW_A:
-+ print_string(" (RW A)\n");
-+ break;
-+ case VDAT_RW_B:
-+ print_string(" (RW A)\n");
-+ break;
-+ case VDAT_RO:
-+ print_string(" (RO)\n");
-+ break;
-+ default:
-+ print_string(" (UNKNOWN)\n");
-+ break;
-+ }
-+ }
- break;
- case VB_SCREEN_DEVELOPER_EGG:
-- msg = "easter egg";
-+ video_console_clear();
-+ print_on_center("Free as in Freedom!");
- break;
- case VB_SCREEN_RECOVERY_REMOVE:
-- msg = "remove inserted devices";
-+ video_console_clear();
-+ print_on_center(
-+ "Please remove any external media before accessing "
-+ "recovery screen.");
- break;
- case VB_SCREEN_RECOVERY_INSERT:
-- msg = "insert recovery image";
-- break;
- case VB_SCREEN_RECOVERY_NO_GOOD:
-- msg = "insert image invalid";
-+ video_console_clear();
-+ print_string(
-+ "Welcome to recovery mode!\n\n"
-+ "Useful key combinations:\n"
-+ "- Ctrl + D: Enable developer mode (if possible)\n\n");
-+
-+ if (screen_type == VB_SCREEN_RECOVERY_NO_GOOD)
-+ print_on_center(
-+ "Invalid recovery media, please instert a "
-+ "valid one.");
-+ else
-+ print_on_center(
-+ "Please insert an external recovery media.");
-+ break;
-+ case VB_SCREEN_RECOVERY_TO_DEV:
-+ video_console_clear();
-+ video_get_rows_cols(&rows, &cols);
-+
-+ video_console_set_cursor(0, 0);
-+
-+ print_string(
-+ "Enabling developer mode will allow booting unsigned "
-+ "kernels and booting from external media (when enabled "
-+ "with crossystem).\n\n"
-+ "Developer mode can be disabled via the developer mode "
-+ "screen.");
-+
-+ msg = "Developer mode will be enabled.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2, rows / 2);
-+ print_string(msg);
-+
-+ msg = "Press enter to confirm or escape to go back.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2,
-+ rows / 2 + 2);
-+ print_string(msg);
-+ break;
-+ case VB_SCREEN_DEVELOPER_TO_NORM:
-+ video_console_clear();
-+ video_get_rows_cols(&rows, &cols);
-+
-+ video_console_set_cursor(0, 0);
-+
-+ print_string(
-+ "Disabling developer mode will restrict boot to signed "
-+ "kernels stored on internal memory only.\n\n"
-+ "Developer mode can be enabled again via the recovery "
-+ "mode screen.");
-+
-+ msg = "Developer mode will be disabled.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2, rows / 2);
-+ print_string(msg);
-+
-+ msg = "Press enter to confirm or escape to go back.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2,
-+ rows / 2 + 2);
-+ print_string(msg);
- break;
- case VB_SCREEN_WAIT:
-- msg = "wait for ec update";
-+ video_console_clear();
-+ print_on_center("Waiting for EC update...");
-+ break;
-+ case VB_SCREEN_TO_NORM_CONFIRMED:
-+ video_console_clear();
-+ print_on_center("Disabling developer mode.");
-+ break;
-+ case VB_SCREEN_OS_BROKEN:
-+ video_console_clear();
-+ print_on_center(
-+ "Something went wrong and the device cannot boot.\n"
-+ "Press Escape + Refresh + Power to access recovery.");
- break;
- default:
- printf("Not a valid screen type: %d.\n", screen_type);
- return VBERROR_INVALID_SCREEN_INDEX;
- }
-
-- if (msg)
-- print_on_center(msg);
--
- return VBERROR_SUCCESS;
- }
-
---
-2.8.0
-
diff --git a/resources/libreboot/config/depthcharge/veyron_speedy/architecture b/resources/libreboot/config/depthcharge/veyron_speedy/architecture
deleted file mode 100644
index fb05f39d..00000000
--- a/resources/libreboot/config/depthcharge/veyron_speedy/architecture
+++ /dev/null
@@ -1 +0,0 @@
-arm
diff --git a/resources/libreboot/config/depthcharge/veyron_speedy/cbrevision b/resources/libreboot/config/depthcharge/veyron_speedy/cbrevision
deleted file mode 100644
index 073d4138..00000000
--- a/resources/libreboot/config/depthcharge/veyron_speedy/cbrevision
+++ /dev/null
@@ -1 +0,0 @@
-1bf5e6409678d04fd15f9625460078853118521c
diff --git a/resources/libreboot/config/depthcharge/veyron_speedy/config b/resources/libreboot/config/depthcharge/veyron_speedy/config
deleted file mode 100644
index 8baf734f..00000000
--- a/resources/libreboot/config/depthcharge/veyron_speedy/config
+++ /dev/null
@@ -1,528 +0,0 @@
-#
-# Automatically generated file; DO NOT EDIT.
-# coreboot configuration
-#
-
-#
-# General setup
-#
-CONFIG_LOCALVERSION=""
-CONFIG_CBFS_PREFIX="fallback"
-CONFIG_COMMON_CBFS_SPI_WRAPPER=y
-CONFIG_MULTIPLE_CBFS_INSTANCES=y
-CONFIG_COMPILER_GCC=y
-# CONFIG_COMPILER_LLVM_CLANG is not set
-# CONFIG_ANY_TOOLCHAIN is not set
-# CONFIG_CCACHE is not set
-# CONFIG_FMD_GENPARSER is not set
-# CONFIG_SCONFIG_GENPARSER is not set
-CONFIG_UNCOMPRESSED_RAMSTAGE=y
-# CONFIG_COMPRESS_RAMSTAGE is not set
-CONFIG_INCLUDE_CONFIG_FILE=y
-CONFIG_EARLY_CBMEM_INIT=y
-CONFIG_COLLECT_TIMESTAMPS=y
-CONFIG_HAS_PRECBMEM_TIMESTAMP_REGION=y
-# CONFIG_USE_BLOBS is not set
-# CONFIG_COVERAGE is not set
-# CONFIG_RELOCATABLE_MODULES is not set
-# CONFIG_RELOCATABLE_RAMSTAGE is not set
-CONFIG_FLASHMAP_OFFSET=0x100000
-CONFIG_BOOTBLOCK_SIMPLE=y
-# CONFIG_BOOTBLOCK_NORMAL is not set
-# CONFIG_BOOTBLOCK_CUSTOM is not set
-CONFIG_BOOTBLOCK_SOURCE="bootblock_simple.c"
-CONFIG_C_ENVIRONMENT_BOOTBLOCK=y
-# CONFIG_UPDATE_IMAGE is not set
-CONFIG_GENERIC_GPIO_LIB=y
-CONFIG_BOARD_ID_AUTO=y
-CONFIG_RAM_CODE_SUPPORT=y
-# CONFIG_BOOTSPLASH_IMAGE is not set
-# CONFIG_ACPI_SATA_GENERATOR is not set
-
-#
-# Mainboard
-#
-# CONFIG_VENDOR_A_TREND is not set
-# CONFIG_VENDOR_AAEON is not set
-# CONFIG_VENDOR_ABIT is not set
-# CONFIG_VENDOR_ADLINK is not set
-# CONFIG_VENDOR_ADVANSUS is not set
-# CONFIG_VENDOR_AMD is not set
-# CONFIG_VENDOR_AOPEN is not set
-# CONFIG_VENDOR_APPLE is not set
-# CONFIG_VENDOR_ARTECGROUP is not set
-# CONFIG_VENDOR_ASROCK is not set
-# CONFIG_VENDOR_ASUS is not set
-# CONFIG_VENDOR_AVALUE is not set
-# CONFIG_VENDOR_AZZA is not set
-# CONFIG_VENDOR_BACHMANN is not set
-# CONFIG_VENDOR_BAP is not set
-# CONFIG_VENDOR_BCOM is not set
-# CONFIG_VENDOR_BIFFEROS is not set
-# CONFIG_VENDOR_BIOSTAR is not set
-# CONFIG_VENDOR_BROADCOM is not set
-# CONFIG_VENDOR_COMPAQ is not set
-# CONFIG_VENDOR_CUBIETECH is not set
-# CONFIG_VENDOR_DIGITALLOGIC is not set
-# CONFIG_VENDOR_DMP is not set
-# CONFIG_VENDOR_ECS is not set
-# CONFIG_VENDOR_EMULATION is not set
-# CONFIG_VENDOR_ESD is not set
-# CONFIG_VENDOR_GETAC is not set
-# CONFIG_VENDOR_GIGABYTE is not set
-# CONFIG_VENDOR_GIZMOSPHERE is not set
-CONFIG_VENDOR_GOOGLE=y
-# CONFIG_VENDOR_HP is not set
-# CONFIG_VENDOR_IBASE is not set
-# CONFIG_VENDOR_IEI is not set
-# CONFIG_VENDOR_INTEL is not set
-# CONFIG_VENDOR_IWAVE is not set
-# CONFIG_VENDOR_IWILL is not set
-# CONFIG_VENDOR_JETWAY is not set
-# CONFIG_VENDOR_KONTRON is not set
-# CONFIG_VENDOR_LANNER is not set
-# CONFIG_VENDOR_LENOVO is not set
-# CONFIG_VENDOR_LINUTOP is not set
-# CONFIG_VENDOR_LIPPERT is not set
-# CONFIG_VENDOR_MITAC is not set
-# CONFIG_VENDOR_MSI is not set
-# CONFIG_VENDOR_NEC is not set
-# CONFIG_VENDOR_NOKIA is not set
-# CONFIG_VENDOR_NVIDIA is not set
-# CONFIG_VENDOR_PACKARDBELL is not set
-# CONFIG_VENDOR_PCENGINES is not set
-# CONFIG_VENDOR_PURISM is not set
-# CONFIG_VENDOR_RCA is not set
-# CONFIG_VENDOR_RODA is not set
-# CONFIG_VENDOR_SAMSUNG is not set
-# CONFIG_VENDOR_SIEMENS is not set
-# CONFIG_VENDOR_SOYO is not set
-# CONFIG_VENDOR_SUNW is not set
-# CONFIG_VENDOR_SUPERMICRO is not set
-# CONFIG_VENDOR_TECHNEXION is not set
-# CONFIG_VENDOR_THOMSON is not set
-# CONFIG_VENDOR_TI is not set
-# CONFIG_VENDOR_TRAVERSE is not set
-# CONFIG_VENDOR_TYAN is not set
-# CONFIG_VENDOR_VIA is not set
-# CONFIG_VENDOR_WINENT is not set
-# CONFIG_VENDOR_WYSE is not set
-CONFIG_BOARD_SPECIFIC_OPTIONS=y
-CONFIG_MAINBOARD_DIR="google/veyron"
-CONFIG_MAINBOARD_PART_NUMBER="Veyron"
-CONFIG_MAINBOARD_VENDOR="Google"
-CONFIG_MAX_CPUS=1
-# CONFIG_ONBOARD_VGA_IS_PRIMARY is not set
-# CONFIG_VGA_BIOS is not set
-CONFIG_UDELAY_IO=y
-CONFIG_MAINBOARD_DO_NATIVE_VGA_INIT=y
-CONFIG_MAX_REBOOT_CNT=3
-CONFIG_UART_FOR_CONSOLE=0
-CONFIG_ID_SECTION_OFFSET=0x80
-CONFIG_CACHE_ROM_SIZE_OVERRIDE=0
-CONFIG_CBFS_SIZE=0x100000
-CONFIG_POST_DEVICE=y
-# CONFIG_BOARD_GOOGLE_AURON is not set
-# CONFIG_BOARD_GOOGLE_BOLT is not set
-# CONFIG_BOARD_GOOGLE_BUTTERFLY is not set
-# CONFIG_BOARD_GOOGLE_CHELL is not set
-# CONFIG_BOARD_GOOGLE_COSMOS is not set
-# CONFIG_BOARD_GOOGLE_CYAN is not set
-# CONFIG_BOARD_GOOGLE_DAISY is not set
-# CONFIG_BOARD_GOOGLE_FALCO is not set
-# CONFIG_BOARD_GOOGLE_FOSTER is not set
-# CONFIG_BOARD_GOOGLE_GLADOS is not set
-# CONFIG_BOARD_GOOGLE_GUADO is not set
-# CONFIG_BOARD_GOOGLE_JECHT is not set
-# CONFIG_BOARD_GOOGLE_LARS is not set
-# CONFIG_BOARD_GOOGLE_LINK is not set
-# CONFIG_BOARD_GOOGLE_NYAN is not set
-# CONFIG_BOARD_GOOGLE_NYAN_BIG is not set
-# CONFIG_BOARD_GOOGLE_NYAN_BLAZE is not set
-# CONFIG_BOARD_GOOGLE_OAK is not set
-# CONFIG_BOARD_GOOGLE_PANTHER is not set
-# CONFIG_BOARD_GOOGLE_PARROT is not set
-# CONFIG_BOARD_GOOGLE_PEACH_PIT is not set
-# CONFIG_BOARD_GOOGLE_PEPPY is not set
-# CONFIG_BOARD_GOOGLE_PURIN is not set
-# CONFIG_BOARD_GOOGLE_RAMBI is not set
-# CONFIG_BOARD_GOOGLE_RUSH is not set
-# CONFIG_BOARD_GOOGLE_RUSH_RYU is not set
-# CONFIG_BOARD_GOOGLE_SAMUS is not set
-# CONFIG_BOARD_GOOGLE_SLIPPY is not set
-# CONFIG_BOARD_GOOGLE_SMAUG is not set
-# CONFIG_BOARD_GOOGLE_STORM is not set
-# CONFIG_BOARD_GOOGLE_STOUT is not set
-# CONFIG_BOARD_GOOGLE_TIDUS is not set
-# CONFIG_BOARD_GOOGLE_URARA is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_GUS is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_JAQ is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_JERRY is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_MIGHTY is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_MINNIE is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_NICKY is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_PINKY is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_SHARK is not set
-CONFIG_BOARD_GOOGLE_VEYRON_SPEEDY=y
-# CONFIG_BOARD_GOOGLE_VEYRON_THEA is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_BRAIN is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_DANGER is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_EMILE is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_MICKEY is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_RIALTO is not set
-# CONFIG_BOARD_GOOGLE_VEYRON_ROMY is not set
-CONFIG_CHROMEOS=y
-CONFIG_BOOT_MEDIA_SPI_BUS=2
-CONFIG_DRIVER_TPM_I2C_BUS=0x1
-CONFIG_DRIVER_TPM_I2C_ADDR=0x20
-CONFIG_EC_GOOGLE_CHROMEEC_SPI_BUS=0
-CONFIG_CONSOLE_SERIAL_UART_ADDRESS=0xFF690000
-CONFIG_BOARD_GOOGLE_VEYRON=y
-CONFIG_EC_GOOGLE_CHROMEEC_SPI_WAKEUP_DELAY_US=100
-CONFIG_PMIC_BUS=0
-CONFIG_CPU_ADDR_BITS=36
-CONFIG_DEFAULT_CONSOLE_LOGLEVEL=8
-# CONFIG_NO_POST is not set
-CONFIG_BOARD_ROMSIZE_KB_4096=y
-# CONFIG_COREBOOT_ROMSIZE_KB_64 is not set
-# CONFIG_COREBOOT_ROMSIZE_KB_128 is not set
-# CONFIG_COREBOOT_ROMSIZE_KB_256 is not set
-# CONFIG_COREBOOT_ROMSIZE_KB_512 is not set
-# CONFIG_COREBOOT_ROMSIZE_KB_1024 is not set
-# CONFIG_COREBOOT_ROMSIZE_KB_2048 is not set
-CONFIG_COREBOOT_ROMSIZE_KB_4096=y
-# CONFIG_COREBOOT_ROMSIZE_KB_8192 is not set
-# CONFIG_COREBOOT_ROMSIZE_KB_12288 is not set
-# CONFIG_COREBOOT_ROMSIZE_KB_16384 is not set
-CONFIG_COREBOOT_ROMSIZE_KB=4096
-CONFIG_ROM_SIZE=0x400000
-CONFIG_FMDFILE="src/mainboard/$(CONFIG_MAINBOARD_DIR)/chromeos.fmd"
-CONFIG_SYSTEM_TYPE_LAPTOP=y
-# CONFIG_CBFS_AUTOGEN_ATTRIBUTES is not set
-
-#
-# Chipset
-#
-
-#
-# SoC
-#
-# CONFIG_SOC_BROADCOM_CYGNUS is not set
-CONFIG_TTYS0_BASE=0x3f8
-CONFIG_HEAP_SIZE=0x4000
-# CONFIG_SOC_MARVELL_BG4CD is not set
-# CONFIG_SOC_MEDIATEK_MT8173 is not set
-# CONFIG_SOC_NVIDIA_TEGRA124 is not set
-# CONFIG_SOC_NVIDIA_TEGRA132 is not set
-# CONFIG_SOC_NVIDIA_TEGRA210 is not set
-# CONFIG_SOC_QC_IPQ806X is not set
-CONFIG_SOC_ROCKCHIP_RK3288=y
-# CONFIG_VBOOT_VERIFY_FIRMWARE is not set
-# CONFIG_CPU_SAMSUNG_EXYNOS5250 is not set
-# CONFIG_CPU_SAMSUNG_EXYNOS5420 is not set
-# CONFIG_SOC_UCB_RISCV is not set
-
-#
-# CPU
-#
-# CONFIG_CPU_ALLWINNER_A10 is not set
-CONFIG_XIP_ROM_SIZE=0x10000
-CONFIG_NUM_IPI_STARTS=2
-# CONFIG_CPU_AMD_AGESA is not set
-# CONFIG_CPU_AMD_PI is not set
-# CONFIG_CPU_ARMLTD_CORTEX_A9 is not set
-# CONFIG_CPU_INTEL_FIRMWARE_INTERFACE_TABLE is not set
-# CONFIG_CPU_INTEL_TURBO_NOT_PACKAGE_SCOPED is not set
-# CONFIG_CPU_TI_AM335X is not set
-# CONFIG_PARALLEL_CPU_INIT is not set
-# CONFIG_UDELAY_LAPIC is not set
-# CONFIG_UDELAY_TSC is not set
-# CONFIG_UDELAY_TIMER2 is not set
-# CONFIG_TSC_CALIBRATE_WITH_IO is not set
-# CONFIG_TSC_SYNC_LFENCE is not set
-# CONFIG_TSC_SYNC_MFENCE is not set
-CONFIG_LOGICAL_CPUS=y
-# CONFIG_SMM_TSEG is not set
-# CONFIG_SMM_LAPIC_REMAP_MITIGATION is not set
-# CONFIG_SERIALIZED_SMM_INITIALIZATION is not set
-# CONFIG_X86_AMD_FIXED_MTRRS is not set
-# CONFIG_PLATFORM_USES_FSP1_0 is not set
-# CONFIG_PARALLEL_MP is not set
-# CONFIG_BACKUP_DEFAULT_SMM_REGION is not set
-# CONFIG_MIRROR_PAYLOAD_TO_RAM_BEFORE_LOADING is not set
-# CONFIG_SUPPORT_CPU_UCODE_IN_CBFS is not set
-# CONFIG_USES_MICROCODE_HEADER_FILES is not set
-
-#
-# Northbridge
-#
-# CONFIG_NORTHBRIDGE_AMD_AGESA is not set
-# CONFIG_AMD_NB_CIMX is not set
-# CONFIG_NORTHBRIDGE_AMD_CIMX_RD890 is not set
-CONFIG_VIDEO_MB=0
-# CONFIG_NORTHBRIDGE_AMD_PI is not set
-CONFIG_RAMBASE=0x100000
-CONFIG_HPET_ADDRESS=0xfed00000
-CONFIG_MAX_PIRQ_LINKS=4
-
-#
-# Southbridge
-#
-# CONFIG_AMD_SB_CIMX is not set
-# CONFIG_SOUTHBRIDGE_AMD_CIMX_SB800 is not set
-# CONFIG_SOUTHBRIDGE_AMD_CIMX_SB900 is not set
-# CONFIG_SOUTHBRIDGE_INTEL_COMMON is not set
-
-#
-# Super I/O
-#
-
-#
-# Embedded Controllers
-#
-CONFIG_EC_GOOGLE_CHROMEEC=y
-# CONFIG_EC_GOOGLE_CHROMEEC_I2C is not set
-# CONFIG_EC_GOOGLE_CHROMEEC_PD is not set
-CONFIG_EC_GOOGLE_CHROMEEC_SPI=y
-CONFIG_EC_GOOGLE_CHROMEEC_SPI_CHIP=0
-CONFIG_MAINBOARD_HAS_CHROMEOS=y
-
-#
-# ChromeOS
-#
-# CONFIG_CHROMEOS_VBNV_CMOS is not set
-CONFIG_CHROMEOS_VBNV_EC=y
-# CONFIG_CHROMEOS_VBNV_FLASH is not set
-CONFIG_CHROMEOS_RAMOOPS=y
-# CONFIG_CHROMEOS_RAMOOPS_NON_ACPI is not set
-CONFIG_CHROMEOS_RAMOOPS_RAM_START=0x00f00000
-CONFIG_CHROMEOS_RAMOOPS_RAM_SIZE=0x00100000
-CONFIG_EC_SOFTWARE_SYNC=y
-# CONFIG_VBOOT_EC_SLOW_UPDATE is not set
-CONFIG_VIRTUAL_DEV_SWITCH=y
-# CONFIG_NO_TPM_RESUME is not set
-# CONFIG_PHYSICAL_REC_SWITCH is not set
-# CONFIG_LID_SWITCH is not set
-# CONFIG_WIPEOUT_SUPPORTED is not set
-# CONFIG_HAVE_REGULATORY_DOMAIN is not set
-# CONFIG_UEFI_2_4_BINDING is not set
-CONFIG_ARCH_ARM=y
-CONFIG_ARCH_BOOTBLOCK_ARM=y
-CONFIG_ARCH_VERSTAGE_ARM=y
-CONFIG_ARCH_ROMSTAGE_ARM=y
-CONFIG_ARCH_RAMSTAGE_ARM=y
-# CONFIG_ARCH_BOOTBLOCK_ARMV4 is not set
-# CONFIG_ARCH_VERSTAGE_ARMV4 is not set
-# CONFIG_ARCH_ROMSTAGE_ARMV4 is not set
-# CONFIG_ARCH_RAMSTAGE_ARMV4 is not set
-CONFIG_ARCH_BOOTBLOCK_ARMV7=y
-CONFIG_ARCH_VERSTAGE_ARMV7=y
-CONFIG_ARCH_ROMSTAGE_ARMV7=y
-CONFIG_ARCH_RAMSTAGE_ARMV7=y
-# CONFIG_ARCH_BOOTBLOCK_ARMV7_M is not set
-# CONFIG_ARCH_VERSTAGE_ARMV7_M is not set
-# CONFIG_ARM_LPAE is not set
-# CONFIG_ARCH_ARM64 is not set
-# CONFIG_ARCH_BOOTBLOCK_ARM64 is not set
-# CONFIG_ARCH_VERSTAGE_ARM64 is not set
-# CONFIG_ARCH_ROMSTAGE_ARM64 is not set
-# CONFIG_ARCH_RAMSTAGE_ARM64 is not set
-# CONFIG_ARCH_BOOTBLOCK_ARMV8_64 is not set
-# CONFIG_ARCH_VERSTAGE_ARMV8_64 is not set
-# CONFIG_ARCH_ROMSTAGE_ARMV8_64 is not set
-# CONFIG_ARCH_RAMSTAGE_ARMV8_64 is not set
-# CONFIG_ARM64_A53_ERRATUM_843419 is not set
-# CONFIG_ARCH_MIPS is not set
-# CONFIG_ARCH_BOOTBLOCK_MIPS is not set
-# CONFIG_ARCH_VERSTAGE_MIPS is not set
-# CONFIG_ARCH_ROMSTAGE_MIPS is not set
-# CONFIG_ARCH_RAMSTAGE_MIPS is not set
-# CONFIG_ARCH_RISCV is not set
-# CONFIG_ARCH_BOOTBLOCK_RISCV is not set
-# CONFIG_ARCH_VERSTAGE_RISCV is not set
-# CONFIG_ARCH_ROMSTAGE_RISCV is not set
-# CONFIG_ARCH_RAMSTAGE_RISCV is not set
-# CONFIG_ARCH_X86 is not set
-# CONFIG_ARCH_BOOTBLOCK_X86_32 is not set
-# CONFIG_ARCH_VERSTAGE_X86_32 is not set
-# CONFIG_ARCH_ROMSTAGE_X86_32 is not set
-# CONFIG_ARCH_RAMSTAGE_X86_32 is not set
-# CONFIG_ARCH_BOOTBLOCK_X86_64 is not set
-# CONFIG_ARCH_VERSTAGE_X86_64 is not set
-# CONFIG_ARCH_ROMSTAGE_X86_64 is not set
-# CONFIG_ARCH_RAMSTAGE_X86_64 is not set
-# CONFIG_ROMCC is not set
-# CONFIG_LATE_CBMEM_INIT is not set
-# CONFIG_HAVE_CMOS_DEFAULT is not set
-CONFIG_IOAPIC_INTERRUPTS_ON_FSB=y
-# CONFIG_IOAPIC_INTERRUPTS_ON_APIC_SERIAL_BUS is not set
-# CONFIG_COMPILE_IN_DSDT is not set
-
-#
-# Devices
-#
-CONFIG_MAINBOARD_HAS_NATIVE_VGA_INIT=y
-CONFIG_NATIVE_VGA_INIT_USE_EDID=y
-# CONFIG_MAINBOARD_HAS_NATIVE_VGA_INIT_TEXTMODECFG is not set
-# CONFIG_MULTIPLE_VGA_ADAPTERS is not set
-# CONFIG_SMBUS_HAS_AUX_CHANNELS is not set
-# CONFIG_SPD_CACHE is not set
-# CONFIG_PCI is not set
-# CONFIG_PXE_ROM is not set
-# CONFIG_SOFTWARE_I2C is not set
-
-#
-# Display
-#
-
-#
-# Generic Drivers
-#
-# CONFIG_DRIVERS_AS3722_RTC is not set
-CONFIG_ELOG=y
-# CONFIG_ELOG_DEBUG is not set
-CONFIG_ELOG_FLASH_BASE=0
-CONFIG_ELOG_AREA_SIZE=0x1000
-# CONFIG_ELOG_CBMEM is not set
-# CONFIG_ELOG_BOOT_COUNT is not set
-# CONFIG_GIC is not set
-# CONFIG_SMBIOS_PROVIDED_BY_MOBO is not set
-# CONFIG_DRIVERS_I2C_RTD2132 is not set
-CONFIG_I2C_TPM=y
-# CONFIG_INTEL_DP is not set
-# CONFIG_INTEL_DDI is not set
-# CONFIG_INTEL_EDID is not set
-# CONFIG_INTEL_INT15 is not set
-# CONFIG_INTEL_GMA_ACPI is not set
-# CONFIG_DRIVER_INTEL_I210 is not set
-# CONFIG_IPMI_KCS is not set
-# CONFIG_DRIVERS_LENOVO_WACOM is not set
-# CONFIG_DRIVER_MAXIM_MAX77686 is not set
-# CONFIG_DRIVER_PARADE_PS8625 is not set
-# CONFIG_DRIVERS_RICOH_RCE822 is not set
-# CONFIG_DRIVERS_SIL_3114 is not set
-CONFIG_SPI_FLASH=y
-# CONFIG_SPI_ATOMIC_SEQUENCING is not set
-# CONFIG_SPI_FLASH_MEMORY_MAPPED is not set
-# CONFIG_SPI_FLASH_NO_FAST_READ is not set
-CONFIG_SPI_FLASH_GIGADEVICE=y
-CONFIG_SPI_FLASH_WINBOND=y
-# CONFIG_SPI_FLASH_FAST_READ_DUAL_OUTPUT_3B is not set
-# CONFIG_HAVE_SPI_CONSOLE_SUPPORT is not set
-# CONFIG_DRIVER_TI_TPS65090 is not set
-# CONFIG_DRIVERS_TI_TPS65913 is not set
-# CONFIG_DRIVERS_TI_TPS65913_RTC is not set
-CONFIG_DRIVERS_UART=y
-# CONFIG_NO_UART_ON_SUPERIO is not set
-# CONFIG_DRIVERS_UART_8250MEM is not set
-# CONFIG_DRIVERS_UART_8250MEM_32 is not set
-CONFIG_HAVE_UART_SPECIAL=y
-# CONFIG_DRIVERS_UART_PL011 is not set
-# CONFIG_HAVE_USBDEBUG is not set
-# CONFIG_HAVE_USBDEBUG_OPTIONS is not set
-# CONFIG_DRIVER_XPOWERS_AXP209 is not set
-CONFIG_RTC=y
-CONFIG_TPM=y
-CONFIG_STACK_SIZE=0x0
-# CONFIG_MMCONF_SUPPORT_DEFAULT is not set
-# CONFIG_MMCONF_SUPPORT is not set
-CONFIG_BOOTMODE_STRAPS=y
-
-#
-# Console
-#
-CONFIG_BOOTBLOCK_CONSOLE=y
-CONFIG_SQUELCH_EARLY_SMP=y
-CONFIG_CONSOLE_SERIAL=y
-
-#
-# device-specific UART
-#
-
-#
-# Serial port base address = 0x3f8
-#
-CONFIG_CONSOLE_SERIAL_115200=y
-# CONFIG_CONSOLE_SERIAL_57600 is not set
-# CONFIG_CONSOLE_SERIAL_38400 is not set
-# CONFIG_CONSOLE_SERIAL_19200 is not set
-# CONFIG_CONSOLE_SERIAL_9600 is not set
-CONFIG_TTYS0_BAUD=115200
-# CONFIG_SPKMODEM is not set
-# CONFIG_CONSOLE_NE2K is not set
-CONFIG_CONSOLE_CBMEM=y
-CONFIG_CONSOLE_CBMEM_BUFFER_SIZE=0x20000
-CONFIG_DEFAULT_CONSOLE_LOGLEVEL_8=y
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_7 is not set
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_6 is not set
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_5 is not set
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_4 is not set
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_3 is not set
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_2 is not set
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_1 is not set
-# CONFIG_DEFAULT_CONSOLE_LOGLEVEL_0 is not set
-# CONFIG_CONSOLE_POST is not set
-CONFIG_POST_DEVICE_NONE=y
-# CONFIG_POST_DEVICE_LPC is not set
-# CONFIG_POST_DEVICE_PCI_PCIE is not set
-# CONFIG_NO_EARLY_BOOTBLOCK_POSTCODES is not set
-# CONFIG_HAVE_ACPI_RESUME is not set
-CONFIG_HAVE_HARD_RESET=y
-# CONFIG_HAVE_ROMSTAGE_CONSOLE_SPINLOCK is not set
-# CONFIG_HAVE_ROMSTAGE_NVRAM_CBFS_SPINLOCK is not set
-# CONFIG_HAVE_ROMSTAGE_MICROCODE_CBFS_SPINLOCK is not set
-CONFIG_HAVE_MONOTONIC_TIMER=y
-CONFIG_GENERIC_UDELAY=y
-# CONFIG_TIMER_QUEUE is not set
-# CONFIG_HAVE_OPTION_TABLE is not set
-# CONFIG_PIRQ_ROUTE is not set
-# CONFIG_HAVE_SMI_HANDLER is not set
-# CONFIG_PCI_IO_CFG_EXT is not set
-# CONFIG_IOAPIC is not set
-# CONFIG_USE_WATCHDOG_ON_BOOT is not set
-# CONFIG_VGA is not set
-# CONFIG_GFXUMA is not set
-# CONFIG_COMMON_FADT is not set
-# CONFIG_ACPI_NHLT is not set
-
-#
-# System tables
-#
-# CONFIG_GENERATE_MP_TABLE is not set
-# CONFIG_GENERATE_PIRQ_TABLE is not set
-
-#
-# Payload
-#
-# CONFIG_PAYLOAD_NONE is not set
-CONFIG_PAYLOAD_ELF=y
-# CONFIG_PAYLOAD_FILO is not set
-# CONFIG_PAYLOAD_GRUB2 is not set
-# CONFIG_PAYLOAD_LINUX is not set
-# CONFIG_PAYLOAD_TIANOCORE is not set
-CONFIG_PAYLOAD_FILE="payload.elf"
-CONFIG_COMPRESSED_PAYLOAD_LZMA=y
-
-#
-# Debugging
-#
-# CONFIG_GDB_STUB is not set
-# CONFIG_FATAL_ASSERTS is not set
-# CONFIG_DEBUG_CBFS is not set
-# CONFIG_HAVE_DEBUG_RAM_SETUP is not set
-# CONFIG_HAVE_DEBUG_CAR is not set
-# CONFIG_HAVE_DEBUG_SMBUS is not set
-# CONFIG_DEBUG_MALLOC is not set
-# CONFIG_DEBUG_ACPI is not set
-# CONFIG_DEBUG_TPM is not set
-# CONFIG_DEBUG_SPI_FLASH is not set
-# CONFIG_TRACE is not set
-# CONFIG_ENABLE_APIC_EXT_ID is not set
-CONFIG_WARNINGS_ARE_ERRORS=y
-CONFIG_IASL_WARNINGS_ARE_ERRORS=y
-# CONFIG_POWER_BUTTON_DEFAULT_ENABLE is not set
-# CONFIG_POWER_BUTTON_DEFAULT_DISABLE is not set
-# CONFIG_POWER_BUTTON_FORCE_ENABLE is not set
-# CONFIG_POWER_BUTTON_FORCE_DISABLE is not set
-# CONFIG_POWER_BUTTON_IS_OPTIONAL is not set
-# CONFIG_REG_SCRIPT is not set
diff --git a/resources/libreboot/config/depthcharge/veyron_speedy/vbootrevision b/resources/libreboot/config/depthcharge/veyron_speedy/vbootrevision
deleted file mode 100644
index 7f14b36f..00000000
--- a/resources/libreboot/config/depthcharge/veyron_speedy/vbootrevision
+++ /dev/null
@@ -1 +0,0 @@
-933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7
diff --git a/resources/libreboot/install/depthcharge/cros-flash-replace b/resources/libreboot/install/depthcharge/cros-flash-replace
deleted file mode 100755
index 4ad3fabd..00000000
--- a/resources/libreboot/install/depthcharge/cros-flash-replace
+++ /dev/null
@@ -1,96 +0,0 @@
-#!/bin/bash
-
-# replace the requested parts in the flash image with separate parts images
-#
-# Copyright (C) 2015 Paul Kocialkowski <contact@paulk.fr>
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-[ "x${DEBUG+set}" = 'xset' ] && set -v
-
-regex="\([0-9a-fA-F]*\):\([0-9a-fA-F]*\)[[:space:]]*\(.*\)"
-block=256
-layout="layout.txt"
-flash=$1
-
-shift 1
-
-if [ ! -f "$flash" ]
-then
- echo "Usage: $0 [flash image] [image] ..."
- exit 1
-fi
-
-if [ ! -f "$layout" ]
-then
- echo "Missing layout file: $layout"
- exit 1
-fi
-
-flashsize=$( stat $flash -c "%s" )
-
-for image in $@; do
- range=$( grep "$image" "$layout" )
- name=$( echo "$range" | sed "s/$regex/\3/g" )
- file="$name.img"
-
- if [ -z "$range" ] || [ ! -f "$file" ]
- then
- echo "Invalid image name: $name"
- continue
- fi
-
- start=$( echo "$range" | sed "s/$regex/\1/g" )
- start=$( printf "%d\n" "0x$start" )
- stop=$( echo "$range" | sed "s/$regex/\2/g" )
- stop=$( printf "%d\n" "0x$stop" )
-
- size=$(( $stop - $start + 1 ))
- filesize=$( stat $file -c "%s" )
-
- if [ $size -ne $filesize ]
- then
- echo "Invalid file size: expected $size, read $filesize"
- continue
- fi
-
- if [ $size -gt $flashsize ]
- then
- echo "Image size too big for flash"
- continue
- fi
-
- printf "Replacing $image in $flash\n\n"
-
- if [ $start -gt 0 ]
- then
- dd if=$flash of=before.img bs=$block count=$(( $start / $block ))
- else
- touch before.img
- fi
-
- if [ $(( $stop + 1 )) -lt $flashsize ]
- then
- dd if=$flash of=after.img skip=$(( ($stop + 1) / $block )) bs=$block count=$(( ($flashsize - $stop - 1) / $block ))
- else
- touch after.img
- fi
-
- cat before.img $file after.img > $flash
-
- rm before.img after.img
-
- printf "\n"
-done
diff --git a/resources/libreboot/install/depthcharge/veyron_speedy/layout.txt b/resources/libreboot/install/depthcharge/veyron_speedy/layout.txt
deleted file mode 100644
index bf397b80..00000000
--- a/resources/libreboot/install/depthcharge/veyron_speedy/layout.txt
+++ /dev/null
@@ -1,2 +0,0 @@
-00000000:000fffff coreboot
-001eff00:001effff ro-frid
diff --git a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0001-util-xcompile-Detect-toolchains-with-bare-arm-prefix.patch b/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0001-util-xcompile-Detect-toolchains-with-bare-arm-prefix.patch
deleted file mode 100644
index 1e71ecfa..00000000
--- a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0001-util-xcompile-Detect-toolchains-with-bare-arm-prefix.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From 1a378294fa9afdc4d6d3b0e580ba78d33a62d044 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Tue, 19 Apr 2016 12:02:14 +0200
-Subject: [PATCH 1/4] util: xcompile: Detect toolchains with bare arm prefix
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- util/xcompile/xcompile | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/util/xcompile/xcompile b/util/xcompile/xcompile
-index b0199eb..1765183 100755
---- a/util/xcompile/xcompile
-+++ b/util/xcompile/xcompile
-@@ -290,7 +290,7 @@ SUPPORTED_ARCHITECTURES="arm arm64 mipsel riscv x64 x86 power8"
- arch_config_arm() {
- TARCH="arm"
- TBFDARCHS="littlearm"
-- TCLIST="armv7-a armv7a"
-+ TCLIST="armv7-a armv7a arm"
- TWIDTH="32"
- TSUPP="arm armv4 armv7 armv7_m"
- TABI="eabi"
---
-2.8.0
-
diff --git a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0002-libpayload-use-32bit-access-when-accessing-4byte-wid.patch b/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0002-libpayload-use-32bit-access-when-accessing-4byte-wid.patch
deleted file mode 100644
index b38cf561..00000000
--- a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0002-libpayload-use-32bit-access-when-accessing-4byte-wid.patch
+++ /dev/null
@@ -1,48 +0,0 @@
-From be5ba870e006e8e7fe0f1ace2952b540c3aec3d9 Mon Sep 17 00:00:00 2001
-From: Patrick Georgi <pgeorgi@chromium.org>
-Date: Mon, 8 Feb 2016 21:17:12 +0100
-Subject: [PATCH 2/4] libpayload: use 32bit access when accessing 4byte wide
- uart registers
-
-This fixes serial on rk3288.
-
-Change-Id: I3dbf3cc165e516ed7b0132332624f882c0c9b27f
-Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
-Reviewed-on: https://review.coreboot.org/13636
-Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
-Tested-by: build bot (Jenkins)
----
- payloads/libpayload/drivers/serial/8250.c | 10 ++++++++--
- 1 file changed, 8 insertions(+), 2 deletions(-)
-
-diff --git a/payloads/libpayload/drivers/serial/8250.c b/payloads/libpayload/drivers/serial/8250.c
-index 7fe9920..0386f23 100644
---- a/payloads/libpayload/drivers/serial/8250.c
-+++ b/payloads/libpayload/drivers/serial/8250.c
-@@ -46,7 +46,10 @@ static uint8_t serial_read_reg(int offset)
- return inb(IOBASE + offset);
- else
- #endif
-- return readb(MEMBASE + offset);
-+ if (lib_sysinfo.serial->regwidth == 4)
-+ return readl(MEMBASE + offset) & 0xff;
-+ else
-+ return readb(MEMBASE + offset);
- }
-
- static void serial_write_reg(uint8_t val, int offset)
-@@ -58,7 +61,10 @@ static void serial_write_reg(uint8_t val, int offset)
- outb(val, IOBASE + offset);
- else
- #endif
-- writeb(val, MEMBASE + offset);
-+ if (lib_sysinfo.serial->regwidth == 4)
-+ writel(val & 0xff, MEMBASE + offset);
-+ else
-+ writeb(val, MEMBASE + offset);
- }
-
- #if IS_ENABLED(CONFIG_LP_SERIAL_SET_SPEED)
---
-2.8.0
-
diff --git a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0003-rockchip-rk3288-UART-uses-32bit-wide-registers.patch b/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0003-rockchip-rk3288-UART-uses-32bit-wide-registers.patch
deleted file mode 100644
index 8a2d2533..00000000
--- a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0003-rockchip-rk3288-UART-uses-32bit-wide-registers.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-From 02bc24a863a9b580d5eb32b780296ff8a5c3d2c1 Mon Sep 17 00:00:00 2001
-From: Patrick Georgi <pgeorgi@chromium.org>
-Date: Mon, 8 Feb 2016 20:28:32 +0100
-Subject: [PATCH 3/4] rockchip/rk3288: UART uses 32bit wide registers
-
-Change-Id: I084eb4694a2aa8f66afc1f3148480608ac3ff02b
-Signed-off-by: Patrick Georgi <pgeorgi@chromium.org>
-Reviewed-on: https://review.coreboot.org/13635
-Reviewed-by: Stefan Reinauer <stefan.reinauer@coreboot.org>
-Tested-by: build bot (Jenkins)
-Reviewed-by: Paul Menzel <paulepanter@users.sourceforge.net>
----
- src/soc/rockchip/rk3288/uart.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/soc/rockchip/rk3288/uart.c b/src/soc/rockchip/rk3288/uart.c
-index 9847734..8576dc1 100644
---- a/src/soc/rockchip/rk3288/uart.c
-+++ b/src/soc/rockchip/rk3288/uart.c
-@@ -155,7 +155,7 @@ void uart_fill_lb(void *data)
- serial.type = LB_SERIAL_TYPE_MEMORY_MAPPED;
- serial.baseaddr = CONFIG_CONSOLE_SERIAL_UART_ADDRESS;
- serial.baud = default_baudrate();
-- serial.regwidth = 1;
-+ serial.regwidth = 4;
- lb_add_serial(&serial, data);
-
- lb_add_console(LB_TAG_CONSOLE_SERIAL8250MEM, data);
---
-2.8.0
-
diff --git a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0004-chromeos-Allow-disabling-vboot-firmware-verification.patch b/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0004-chromeos-Allow-disabling-vboot-firmware-verification.patch
deleted file mode 100644
index 1139490a..00000000
--- a/resources/libreboot/patch/coreboot/1bf5e6409678d04fd15f9625460078853118521c/depthcharge/veyron_speedy/0004-chromeos-Allow-disabling-vboot-firmware-verification.patch
+++ /dev/null
@@ -1,112 +0,0 @@
-From 1122f7a00ad7b9cab11a548ed2ba24536bfc194e Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Sun, 9 Aug 2015 10:23:38 +0200
-Subject: [PATCH 4/4] chromeos: Allow disabling vboot firmware verification
- when ChromeOS is enabled
-
-Some ChromeOS bindings might be wanted without using vboot verification, for
-instance to boot up depthcharge from the version of Coreboot installed in the
-write-protected part of the SPI flash (without jumping to a RW firmware).
-
-Vboot firmware verification is still selected by default when ChromeOS is
-enabled, but this allows more flexibility since vboot firmware verification is
-no longer a hard requirement for ChromeOS (that this particular use case still
-allows booting ChromeOS).
-
-In the future, it would make sense to have all the separate components that
-CONFIG_CHROMEOS enables have their own config options, so that they can be
-enabled separately.
-
-Change-Id: Ia4057a56838aa05dcf3cb250ae1a27fd91402ddb
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/lib/bootmode.c | 2 ++
- src/soc/rockchip/rk3288/Kconfig | 2 +-
- src/vendorcode/google/chromeos/Kconfig | 4 +---
- src/vendorcode/google/chromeos/vboot2/Kconfig | 4 ++++
- 4 files changed, 8 insertions(+), 4 deletions(-)
-
-diff --git a/src/lib/bootmode.c b/src/lib/bootmode.c
-index 15f7a5a..e4be29e 100644
---- a/src/lib/bootmode.c
-+++ b/src/lib/bootmode.c
-@@ -76,8 +76,10 @@ void gfx_set_init_done(int done)
- int display_init_required(void)
- {
- /* For Chrome OS always honor vboot_skip_display_init(). */
-+#if CONFIG_VBOOT_VERIFY_FIRMWARE
- if (IS_ENABLED(CONFIG_CHROMEOS))
- return !vboot_skip_display_init();
-+#endif
-
- /* By default always initialize display. */
- return 1;
-diff --git a/src/soc/rockchip/rk3288/Kconfig b/src/soc/rockchip/rk3288/Kconfig
-index 65e6dc3..7947514 100644
---- a/src/soc/rockchip/rk3288/Kconfig
-+++ b/src/soc/rockchip/rk3288/Kconfig
-@@ -31,7 +31,7 @@ config SOC_ROCKCHIP_RK3288
-
- if SOC_ROCKCHIP_RK3288
-
--config CHROMEOS
-+config VBOOT_VERIFY_FIRMWARE
- select VBOOT_STARTS_IN_BOOTBLOCK
- select SEPARATE_VERSTAGE
- select RETURN_FROM_VERSTAGE
-diff --git a/src/vendorcode/google/chromeos/Kconfig b/src/vendorcode/google/chromeos/Kconfig
-index d2a42a1..4068419 100644
---- a/src/vendorcode/google/chromeos/Kconfig
-+++ b/src/vendorcode/google/chromeos/Kconfig
-@@ -27,7 +27,6 @@ config CHROMEOS
- select BOOTMODE_STRAPS
- select ELOG if SPI_FLASH
- select COLLECT_TIMESTAMPS
-- select VBOOT_VERIFY_FIRMWARE
- select MULTIPLE_CBFS_INSTANCES
- help
- Enable ChromeOS specific features like the GPIO sub table in
-@@ -96,7 +95,6 @@ config CHROMEOS_RAMOOPS_RAM_SIZE
- config EC_SOFTWARE_SYNC
- bool "Enable EC software sync"
- default n
-- depends on VBOOT_VERIFY_FIRMWARE
- help
- EC software sync is a mechanism where the AP helps the EC verify its
- firmware similar to how vboot verifies the main system firmware. This
-@@ -120,12 +118,12 @@ config VBOOT_OPROM_MATTERS
- config VIRTUAL_DEV_SWITCH
- bool "Virtual developer switch support"
- default n
-- depends on VBOOT_VERIFY_FIRMWARE
- help
- Whether this platform has a virtual developer switch.
-
- config VBOOT_VERIFY_FIRMWARE
- bool "Verify firmware with vboot."
-+ default y if CHROMEOS
- default n
- depends on HAVE_HARD_RESET
- help
-diff --git a/src/vendorcode/google/chromeos/vboot2/Kconfig b/src/vendorcode/google/chromeos/vboot2/Kconfig
-index 7580d8d..141b636 100644
---- a/src/vendorcode/google/chromeos/vboot2/Kconfig
-+++ b/src/vendorcode/google/chromeos/vboot2/Kconfig
-@@ -12,6 +12,8 @@
- ## GNU General Public License for more details.
- ##
-
-+if VBOOT_VERIFY_FIRMWARE
-+
- config VBOOT_STARTS_IN_BOOTBLOCK
- bool "Vboot starts verifying in bootblock"
- default n
-@@ -78,3 +80,5 @@ config VBOOT_DYNAMIC_WORK_BUFFER
- ram to allocate the vboot work buffer. That means vboot verification
- is after memory init and requires main memory to back the work
- buffer.
-+
-+endif # VBOOT_VERIFY_FIRMWARE
---
-2.8.0
-
diff --git a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0001-firmware-Developer-mode-timeout-delay-shortening-dow.patch b/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0001-firmware-Developer-mode-timeout-delay-shortening-dow.patch
deleted file mode 100644
index 53fc563e..00000000
--- a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0001-firmware-Developer-mode-timeout-delay-shortening-dow.patch
+++ /dev/null
@@ -1,33 +0,0 @@
-From fe4c243dac0d308746c0103aa22b5e6f29dd494c Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 20:33:23 +0200
-Subject: [PATCH 1/7] firmware: Developer mode timeout delay shortening (down
- to 3 seconds)
-
-A timeout delay of 3 seconds, with no bip, is much more appreciable for users.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- firmware/lib/vboot_audio.c | 6 +-----
- 1 file changed, 1 insertion(+), 5 deletions(-)
-
-diff --git a/firmware/lib/vboot_audio.c b/firmware/lib/vboot_audio.c
-index 6071b0d..fd03bfd 100644
---- a/firmware/lib/vboot_audio.c
-+++ b/firmware/lib/vboot_audio.c
-@@ -30,11 +30,7 @@
- #define MAX_CUSTOM_DELAY 300000
-
- /* These are visible externally only to make testing easier */
--VbDevMusicNote default_notes_[] = { {20000, 0}, /* 20 seconds */
-- {250, 400}, /* two beeps */
-- {250, 0},
-- {250, 400},
-- {9250, 0} }; /* total 30 seconds */
-+VbDevMusicNote default_notes_[] = { {3000, 0} }; /* three seconds */
- uint32_t default_count_ = sizeof(default_notes_) / sizeof(VbDevMusicNote);
-
- VbDevMusicNote short_notes_[] = { {2000, 0} }; /* two seconds */
---
-2.8.0
-
diff --git a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0002-firmware-Text-based-screen-display-in-priority.patch b/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0002-firmware-Text-based-screen-display-in-priority.patch
deleted file mode 100644
index 669e6ded..00000000
--- a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0002-firmware-Text-based-screen-display-in-priority.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-From b3b529bec8f07557632510663a350f6d2abbe742 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 22:44:50 +0200
-Subject: [PATCH 2/7] firmware: Text-based screen display in priority
-
-This allows showing text-based screen displays before looking at the GBB bitmaps
-since those encourage the use of non-free software (Chrome OS) and don't display
-enough information to the user.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- firmware/lib/vboot_display.c | 9 ++++-----
- 1 file changed, 4 insertions(+), 5 deletions(-)
-
-diff --git a/firmware/lib/vboot_display.c b/firmware/lib/vboot_display.c
-index f2978fb..b95a1eb 100644
---- a/firmware/lib/vboot_display.c
-+++ b/firmware/lib/vboot_display.c
-@@ -339,13 +339,12 @@ static VbError_t VbDisplayScreenLegacy(VbCommonParams *cparams, uint32_t screen,
- /* Request the screen */
- disp_current_screen = screen;
-
-- /* Look in the GBB first */
-- if (VBERROR_SUCCESS == VbDisplayScreenFromGBB(cparams, screen,
-- vncptr, locale))
-+ /* Display default first */
-+ if (VBERROR_SUCCESS == VbExDisplayScreen(screen, locale))
- return VBERROR_SUCCESS;
-
-- /* If screen wasn't in the GBB bitmaps, fall back to a default */
-- return VbExDisplayScreen(screen, locale);
-+ /* If default doesn't have anything to show, fall back to GBB bitmaps */
-+ return VbDisplayScreenFromGBB(cparams, screen, vncptr, locale);
- }
-
- VbError_t VbDisplayScreen(VbCommonParams *cparams, uint32_t screen,
---
-2.8.0
-
diff --git a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0003-firmware-NV-context-pointer-handoff-to-VbExDisplaySc.patch b/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0003-firmware-NV-context-pointer-handoff-to-VbExDisplaySc.patch
deleted file mode 100644
index c82c546f..00000000
--- a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0003-firmware-NV-context-pointer-handoff-to-VbExDisplaySc.patch
+++ /dev/null
@@ -1,91 +0,0 @@
-From 948b65615a4e84baa5862633e13705d1f283f0db Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 22:46:43 +0200
-Subject: [PATCH 3/7] firmware: NV context pointer handoff to VbExDisplayScreen
-
-VbExDisplayScreen might need to display some information based on the NV context
-so it makes sense to pass that pointer along.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- firmware/include/vboot_api.h | 4 +++-
- firmware/lib/vboot_display.c | 4 ++--
- firmware/stub/vboot_api_stub.c | 3 ++-
- tests/vboot_api_devmode_tests.c | 3 ++-
- 4 files changed, 9 insertions(+), 5 deletions(-)
-
-diff --git a/firmware/include/vboot_api.h b/firmware/include/vboot_api.h
-index ddc8cc6..c98fca4 100644
---- a/firmware/include/vboot_api.h
-+++ b/firmware/include/vboot_api.h
-@@ -24,6 +24,7 @@
- #include <stdint.h>
- #include <stdlib.h>
-
-+#include "vboot_nvstorage.h"
- #include "gpt.h"
-
- /*****************************************************************************/
-@@ -771,7 +772,8 @@ VbError_t VbExDisplaySetDimension(uint32_t width, uint32_t height);
- * to be simple ASCII text such as "NO GOOD" or "INSERT"; these screens should
- * only be seen during development.
- */
--VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale);
-+VbError_t VbExDisplayScreen(uint32_t screen_type, VbNvContext *vnc,
-+ uint32_t locale);
-
- /**
- * Write an image to the display, with the upper left corner at the specified
-diff --git a/firmware/lib/vboot_display.c b/firmware/lib/vboot_display.c
-index b95a1eb..472ca91 100644
---- a/firmware/lib/vboot_display.c
-+++ b/firmware/lib/vboot_display.c
-@@ -340,7 +340,7 @@ static VbError_t VbDisplayScreenLegacy(VbCommonParams *cparams, uint32_t screen,
- disp_current_screen = screen;
-
- /* Display default first */
-- if (VBERROR_SUCCESS == VbExDisplayScreen(screen, locale))
-+ if (VBERROR_SUCCESS == VbExDisplayScreen(screen, vncptr, locale))
- return VBERROR_SUCCESS;
-
- /* If default doesn't have anything to show, fall back to GBB bitmaps */
-@@ -357,7 +357,7 @@ VbError_t VbDisplayScreen(VbCommonParams *cparams, uint32_t screen,
- VbNvGet(vncptr, VBNV_LOCALIZATION_INDEX, &locale);
-
- if (gbb->bmpfv_size == 0) {
-- VbError_t ret = VbExDisplayScreen(screen, locale);
-+ VbError_t ret = VbExDisplayScreen(screen, vncptr, locale);
-
- /* Keep track of the currently displayed screen */
- if (ret == VBERROR_SUCCESS)
-diff --git a/firmware/stub/vboot_api_stub.c b/firmware/stub/vboot_api_stub.c
-index 2299a03..9c86fc7 100644
---- a/firmware/stub/vboot_api_stub.c
-+++ b/firmware/stub/vboot_api_stub.c
-@@ -43,7 +43,8 @@ VbError_t VbExDisplaySetDimension(uint32_t width, uint32_t height)
- return VBERROR_SUCCESS;
- }
-
--VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale)
-+VbError_t VbExDisplayScreen(uint32_t screen_type, VbNvContext *vnc,
-+ uint32_t locale)
- {
- return VBERROR_SUCCESS;
- }
-diff --git a/tests/vboot_api_devmode_tests.c b/tests/vboot_api_devmode_tests.c
-index cd927a8..16abc6e 100644
---- a/tests/vboot_api_devmode_tests.c
-+++ b/tests/vboot_api_devmode_tests.c
-@@ -265,7 +265,8 @@ VbError_t VbExBeep(uint32_t msec, uint32_t frequency) {
- return beep_return;
- }
-
--VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale) {
-+VbError_t VbExDisplayScreen(uint32_t screen_type, VbNvContext *vnc,
-+ uint32_t locale) {
- switch(screen_type) {
- case VB_SCREEN_BLANK:
- VBDEBUG(("VbExDisplayScreen(BLANK)\n"));
---
-2.8.0
-
diff --git a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0004-firmware-Hold-key-combination-in-developer-mode.patch b/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0004-firmware-Hold-key-combination-in-developer-mode.patch
deleted file mode 100644
index 1a7db50d..00000000
--- a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0004-firmware-Hold-key-combination-in-developer-mode.patch
+++ /dev/null
@@ -1,49 +0,0 @@
-From 1c60b7224562b50a9aef90d533cdfd918dced867 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 22:59:50 +0200
-Subject: [PATCH 4/7] firmware: Hold key combination in developer mode
-
-This binds the Ctrl + H key combination to hold the developer mode screen.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- firmware/lib/vboot_api_kernel.c | 9 ++++++++-
- 1 file changed, 8 insertions(+), 1 deletion(-)
-
-diff --git a/firmware/lib/vboot_api_kernel.c b/firmware/lib/vboot_api_kernel.c
-index fff3056..5e784eb 100644
---- a/firmware/lib/vboot_api_kernel.c
-+++ b/firmware/lib/vboot_api_kernel.c
-@@ -292,6 +292,7 @@ VbError_t VbBootDeveloper(VbCommonParams *cparams, LoadKernelParams *p)
- uint32_t use_legacy = 0;
- uint32_t default_boot = 0;
- uint32_t ctrl_d_pressed = 0;
-+ uint32_t hold = 0;
-
- VbAudioContext *audio = 0;
-
-@@ -417,6 +418,12 @@ VbError_t VbBootDeveloper(VbCommonParams *cparams, LoadKernelParams *p)
- ctrl_d_pressed = 1;
- goto fallout;
- break;
-+ case 0x08:
-+ /* Ctrl+H = hold */
-+ VBDEBUG(("VbBootDeveloper() - "
-+ "hold developer mode screen\n"));
-+ hold = 1;
-+ break;
- case 0x0c:
- VBDEBUG(("VbBootDeveloper() - "
- "user pressed Ctrl+L; Try legacy boot\n"));
-@@ -467,7 +474,7 @@ VbError_t VbBootDeveloper(VbCommonParams *cparams, LoadKernelParams *p)
- VbCheckDisplayKey(cparams, key, &vnc);
- break;
- }
-- } while(VbAudioLooping(audio));
-+ } while(hold || VbAudioLooping(audio));
-
- fallout:
-
---
-2.8.0
-
diff --git a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0005-firmware-Screen-blank-and-wait-at-disabled-USB-boot-.patch b/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0005-firmware-Screen-blank-and-wait-at-disabled-USB-boot-.patch
deleted file mode 100644
index 152aee80..00000000
--- a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0005-firmware-Screen-blank-and-wait-at-disabled-USB-boot-.patch
+++ /dev/null
@@ -1,55 +0,0 @@
-From 5f41175ef44c71f2aa3e3bebd33a079c93f60a5f Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 23:13:49 +0200
-Subject: [PATCH 5/7] firmware: Screen blank and wait at disabled USB boot
- warning
-
-This blanks the screen before showing the disabled USB boot warning.
-It also waits for the user to press any key to come back to the developer mode
-screen.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- firmware/lib/vboot_api_kernel.c | 12 +++++++++++-
- 1 file changed, 11 insertions(+), 1 deletion(-)
-
-diff --git a/firmware/lib/vboot_api_kernel.c b/firmware/lib/vboot_api_kernel.c
-index 5e784eb..7d22c93 100644
---- a/firmware/lib/vboot_api_kernel.c
-+++ b/firmware/lib/vboot_api_kernel.c
-@@ -320,6 +320,7 @@ VbError_t VbBootDeveloper(VbCommonParams *cparams, LoadKernelParams *p)
- use_usb = 0;
- }
-
-+developer_mode_screen:
- /* Show the dev mode warning screen */
- VbDisplayScreen(cparams, VB_SCREEN_DEVELOPER_WARNING, 0, &vnc);
-
-@@ -442,14 +443,23 @@ VbError_t VbBootDeveloper(VbCommonParams *cparams, LoadKernelParams *p)
- if (!allow_usb) {
- VBDEBUG(("VbBootDeveloper() - "
- "USB booting is disabled\n"));
-+
-+ VbDisplayScreen(cparams, VB_SCREEN_BLANK, 1,
-+ &vnc);
-+
- VbExDisplayDebugInfo(
- "WARNING: Booting from external media "
- "(USB/SD) has not been enabled. Refer "
- "to the developer-mode documentation "
-- "for details.\n");
-+ "for details.\n\n"
-+ "Press any key to continue.\n\n");
- VbExBeep(120, 400);
- VbExSleepMs(120);
- VbExBeep(120, 400);
-+
-+ while (!VbExKeyboardRead()) ;
-+
-+ goto developer_mode_screen;
- } else {
- /*
- * Clear the screen to show we get the Ctrl+U
---
-2.8.0
-
diff --git a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0006-firmware-Separate-screen-and-wait-at-device-informat.patch b/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0006-firmware-Separate-screen-and-wait-at-device-informat.patch
deleted file mode 100644
index 52f77d16..00000000
--- a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0006-firmware-Separate-screen-and-wait-at-device-informat.patch
+++ /dev/null
@@ -1,79 +0,0 @@
-From 4be2a60b0ebb845c8f5043ef3f27b691a51df7c2 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 23:53:48 +0200
-Subject: [PATCH 6/7] firmware: Separate screen and wait at device information
- screen
-
-This blanks the screen (instead of redrawing it) at device information and
-waits for the user to press any key to come back to the developer mode screen.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- firmware/lib/vboot_api_kernel.c | 12 ++++++++++++
- firmware/lib/vboot_display.c | 13 ++++++++-----
- 2 files changed, 20 insertions(+), 5 deletions(-)
-
-diff --git a/firmware/lib/vboot_api_kernel.c b/firmware/lib/vboot_api_kernel.c
-index 7d22c93..4e6de18 100644
---- a/firmware/lib/vboot_api_kernel.c
-+++ b/firmware/lib/vboot_api_kernel.c
-@@ -425,6 +425,18 @@ developer_mode_screen:
- "hold developer mode screen\n"));
- hold = 1;
- break;
-+ case 0x09:
-+ /* Ctrl+I = device information */
-+ VBDEBUG(("VbBootDeveloper() - "
-+ "device info\n"));
-+
-+ hold = 1;
-+ VbDisplayDebugInfo(cparams, &vnc);
-+
-+ while (!VbExKeyboardRead()) ;
-+
-+ goto developer_mode_screen;
-+ break;
- case 0x0c:
- VBDEBUG(("VbBootDeveloper() - "
- "user pressed Ctrl+L; Try legacy boot\n"));
-diff --git a/firmware/lib/vboot_display.c b/firmware/lib/vboot_display.c
-index 472ca91..e092189 100644
---- a/firmware/lib/vboot_display.c
-+++ b/firmware/lib/vboot_display.c
-@@ -541,7 +541,7 @@ const char *RecoveryReasonString(uint8_t code)
- return "We have no idea what this means";
- }
-
--#define DEBUG_INFO_SIZE 512
-+#define DEBUG_INFO_SIZE 768
-
- VbError_t VbDisplayDebugInfo(VbCommonParams *cparams, VbNvContext *vncptr)
- {
-@@ -556,8 +556,8 @@ VbError_t VbDisplayDebugInfo(VbCommonParams *cparams, VbNvContext *vncptr)
- VbError_t ret;
- uint32_t i;
-
-- /* Redisplay current screen to overwrite any previous debug output */
-- VbDisplayScreen(cparams, disp_current_screen, 1, vncptr);
-+ /* Blank screen */
-+ VbDisplayScreen(cparams, VB_SCREEN_BLANK, 1, vncptr);
-
- /* Add hardware ID */
- VbRegionReadHWID(cparams, hwid, sizeof(hwid));
-@@ -666,8 +666,11 @@ VbError_t VbDisplayDebugInfo(VbCommonParams *cparams, VbNvContext *vncptr)
- used += StrnAppend(buf + used, sha1sum, DEBUG_INFO_SIZE - used);
- }
-
-- /* Make sure we finish with a newline */
-- used += StrnAppend(buf + used, "\n", DEBUG_INFO_SIZE - used);
-+ /* Make sure we finish with newlines */
-+ used += StrnAppend(buf + used, "\n\n", DEBUG_INFO_SIZE - used);
-+
-+ used += StrnAppend(buf + used, "Press any key to continue\n\n",
-+ DEBUG_INFO_SIZE - used);
-
- /* TODO: add more interesting data:
- * - Information on current disks */
---
-2.8.0
-
diff --git a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0007-firmware-Localization-keys-removal.patch b/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0007-firmware-Localization-keys-removal.patch
deleted file mode 100644
index 770f4c1a..00000000
--- a/resources/libreboot/patch/vboot/933c4e7aa4b873f0ad9cd4c348a1ea4f37f66aa7/depthcharge/veyron_speedy/0007-firmware-Localization-keys-removal.patch
+++ /dev/null
@@ -1,53 +0,0 @@
-From ed1da3f76c1c19f9e078d0a19bac06151d5988d6 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Tue, 11 Aug 2015 00:07:18 +0200
-Subject: [PATCH 7/7] firmware: Localization keys removal
-
-Since we're using a text-based interface, binding the arrow keys to localization
-changes has no effect and only makes the screen flicker.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- firmware/lib/vboot_api_kernel.c | 5 -----
- 1 file changed, 5 deletions(-)
-
-diff --git a/firmware/lib/vboot_api_kernel.c b/firmware/lib/vboot_api_kernel.c
-index 4e6de18..62efd0f 100644
---- a/firmware/lib/vboot_api_kernel.c
-+++ b/firmware/lib/vboot_api_kernel.c
-@@ -263,7 +263,6 @@ int VbUserConfirms(VbCommonParams *cparams, uint32_t confirm_flags)
- return 1;
- }
- }
-- VbCheckDisplayKey(cparams, key, &vnc);
- }
- VbExSleepMs(CONFIRM_KEY_DELAY);
- }
-@@ -493,7 +492,6 @@ developer_mode_screen:
- break;
- default:
- VBDEBUG(("VbBootDeveloper() - pressed key %d\n", key));
-- VbCheckDisplayKey(cparams, key, &vnc);
- break;
- }
- } while(hold || VbAudioLooping(audio));
-@@ -557,7 +555,6 @@ VbError_t VbBootRecovery(VbCommonParams *cparams, LoadKernelParams *p)
- VbDisplayScreen(cparams, VB_SCREEN_OS_BROKEN, 0, &vnc);
- VBDEBUG(("VbBootRecovery() waiting for manual recovery\n"));
- while (1) {
-- VbCheckDisplayKey(cparams, VbExKeyboardRead(), &vnc);
- if (VbWantShutdown(cparams->gbb->flags))
- return VBERROR_SHUTDOWN_REQUESTED;
- VbExSleepMs(REC_KEY_DELAY);
-@@ -655,8 +652,6 @@ VbError_t VbBootRecovery(VbCommonParams *cparams, LoadKernelParams *p)
- i = 4;
- break;
- }
-- } else {
-- VbCheckDisplayKey(cparams, key, &vnc);
- }
- if (VbWantShutdown(cparams->gbb->flags))
- return VBERROR_SHUTDOWN_REQUESTED;
---
-2.8.0
-
diff --git a/resources/scripts/helpers/build/clean/depthcharge b/resources/scripts/helpers/build/clean/depthcharge
deleted file mode 100755
index 9751d924..00000000
--- a/resources/scripts/helpers/build/clean/depthcharge
+++ /dev/null
@@ -1,38 +0,0 @@
-#!/bin/bash
-
-# helper script: clean the dependencies that were built in depthcharge
-#
-# Copyright (C) 2015 Paul Kocialkowski <contact@paulk.fr>
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-# This script assumes that the current working directory is the root
-# of libreboot_src or libreboot git
-
-[ "x${DEBUG+set}" = 'xset' ] && set -v
-set -u -e
-
-# clean depthcharge
-# --------------------------------------------------------
-
-cd "depthcharge/"
-
-printf "Cleaning the previous build of depthcharge\n"
-make distclean
-
-# done. go back to main directoy
-cd "../"
-
-printf "\n\n"
diff --git a/resources/scripts/helpers/build/config/dcmodify b/resources/scripts/helpers/build/config/dcmodify
deleted file mode 100755
index 81e8756e..00000000
--- a/resources/scripts/helpers/build/config/dcmodify
+++ /dev/null
@@ -1,72 +0,0 @@
-#!/bin/bash
-
-#
-# helper script: run "make menuconfig" on config(s) to modify them
-#
-# Copyright (C) 2014, 2015, 2016 Leah Rowe <info@minifree.org>
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-# This script assumes that the working directory is the root
-# of libreboot_src or git
-
-[ "x${DEBUG+set}" = 'xset' ] && set -v
-set -u -e
-
-payload="depthcharge"
-configpath="resources/libreboot/config/${payload}"
-
-hackconfig () {
- board="${1}"
- cbrevision="$(cat ${configpath}/${board}/cbrevision)"
- vbootrevision="$(cat ${configpath}/${board}/vbootrevision)"
-(
- cd "coreboot/${cbrevision}/${cbrevision}/"
- git checkout ${payload}_${board}
- (
- cd "3rdparty/vboot/"
- git checkout ${payload}_${board}
- )
-
- printf "Modifying config for %s (%s payload)\n" "${board}" "${payload}"
- sleep 2
-
- if [ ! -d "../../../${configpath}/${board}/" ]; then
- printf "build/config/dcmodify WARNING: config '%s' does not exist. Skipping.\n" "${board}"
- git checkout master
- (
- cd "3rdparty/vboot/"
- git checkout master
- )
- return
- fi
-
- mv "../../../${configpath}/${board}/config" ".config"
- make menuconfig
- mv ".config" "../../../${configpath}/${board}/config"
-
- git checkout master
- (
- cd "3rdparty/vboot/"
- git checkout master
- )
-)
-}
-
-if [ $# -lt 1 ]; then
- for config in ${configpath}/*; do hackconfig "${config##*/}"; done
-else
- for config in "${@}"; do hackconfig "${config}"; done
-fi
diff --git a/resources/scripts/helpers/build/config/dcreplace b/resources/scripts/helpers/build/config/dcreplace
deleted file mode 100755
index d3265ae2..00000000
--- a/resources/scripts/helpers/build/config/dcreplace
+++ /dev/null
@@ -1,63 +0,0 @@
-#!/bin/bash
-
-#
-# helper script: run "make menuconfig" on config(s) to replace them
-#
-# Copyright (C) 2014, 2015, 2016 Leah Rowe <info@minifree.org>
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-# This script assumes that the working directory is the root
-# of libreboot_src or git
-
-[ "x${DEBUG+set}" = 'xset' ] && set -v
-set -u -e
-
-payload="depthcharge"
-configpath="resources/libreboot/config/${payload}"
-
-hackconfig () {
- board="${1}"
- cbrevision="$(cat ${configpath}/${board}/cbrevision)"
- vbootrevision="$(cat ${configpath}/${board}/vbootrevision)"
-(
- cd "coreboot/${cbrevision}/${cbrevision}/"
- git checkout ${payload}_${board}
- (
- cd "3rdparty/vboot/"
- git checkout ${payload}_${board}
- )
-
- printf "Replacing or creating new config for %s (%s payload)\n" "${board}" "${payload}"
- sleep 2
-
- make menuconfig
-
- [ ! -d "../../../${configpath}/${board}/" ] && mkdir -p "../../../${configpath}/${board}/"
- mv ".config" "../../../${configpath}/${board}/config"
-
- git checkout master
- (
- cd "3rdparty/vboot/"
- git checkout master
- )
-)
-}
-
-if [ $# -lt 1 ]; then
- for config in ${configpath}/*; do hackconfig "${config##*/}"; done
-else
- for config in "${@}"; do hackconfig "${config}"; done
-fi
diff --git a/resources/scripts/helpers/build/config/dcupdate b/resources/scripts/helpers/build/config/dcupdate
deleted file mode 100755
index 8d45c9de..00000000
--- a/resources/scripts/helpers/build/config/dcupdate
+++ /dev/null
@@ -1,72 +0,0 @@
-#!/bin/bash
-
-#
-# helper script: run "make oldconfig" on all coreboot config files
-#
-# Copyright (C) 2014, 2015, 2016 Leah Rowe <info@minifree.org>
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-# This script assumes that the working directory is the root
-# of libreboot_src or git
-
-[ "x${DEBUG+set}" = 'xset' ] && set -v
-set -u -e
-
-payload="depthcharge"
-configpath="resources/libreboot/config/${payload}"
-
-hackconfig () {
- board="${1}"
- cbrevision="$(cat ${configpath}/${board}/cbrevision)"
- vbootrevision="$(cat ${configpath}/${board}/vbootrevision)"
-(
- cd "coreboot/${cbrevision}/${cbrevision}/"
- git checkout ${payload}_${board}
- (
- cd "3rdparty/vboot/"
- git checkout ${payload}_${board}
- )
-
- printf "Updating config for %s (%s payload)\n" "${board}" "${payload}"
- sleep 2
-
- if [ ! -d "../../../${configpath}/${board}/" ]; then
- printf "build/config/dcupdate WARNING: config '%s' does not exist. Skipping.\n" "${board}"
- git checkout master
- (
- cd "3rdparty/vboot/"
- git checkout master
- )
- return
- fi
-
- mv "../../../${configpath}/${board}/config" ".config"
- make oldconfig
- mv ".config" "../../../${configpath}/${board}/config"
-
- git checkout master
- (
- cd "3rdparty/vboot/"
- git checkout master
- )
-)
-}
-
-if [ $# -lt 1 ]; then
- for config in ${configpath}/*; do hackconfig "${config##*/}"; done
-else
- for config in "${@}"; do hackconfig "${config}"; done
-fi
diff --git a/resources/scripts/helpers/build/release/src b/resources/scripts/helpers/build/release/src
index 0fde6899..c33f9b4b 100755
--- a/resources/scripts/helpers/build/release/src
+++ b/resources/scripts/helpers/build/release/src
@@ -88,7 +88,6 @@ printf '\n'
rm -Rf "${distdir}/bucts/".git*
rm -Rf "${distdir}/flashrom/".git*
rm -Rf "${distdir}/grub/".git*
-rm -Rf "${distdir}/depthcharge/".git*
rm -Rf "${distdir}/seabios/".git*
rm -f "${distdir}"/*.vim
@@ -107,8 +106,6 @@ rm -Rf "${distdir}/resources/utilities/coreboot-libre/"
rm -f "${distdir}/download"
rm -Rf "${distdir}/resources/scripts/helpers/download/"
-# Other patches aren't needed in the release, either
-rm -Rf "${distdir}/resources/depthcharge/patch/"
rm -Rf "${distdir}/resources/grub/patch/"
rm -Rf "${distdir}/resources/memtest86plus/patch/"
diff --git a/resources/scripts/helpers/build/roms/withdepthcharge b/resources/scripts/helpers/build/roms/withdepthcharge
deleted file mode 100755
index 1df97a23..00000000
--- a/resources/scripts/helpers/build/roms/withdepthcharge
+++ /dev/null
@@ -1,207 +0,0 @@
-#!/bin/bash
-
-# helper script: build ROM images with depthcharge and put them in ./bin/
-#
-# Copyright (C) 2014, 2015, 2016 Leah Rowe <info@minifree.org>
-# Copyright (C) 2015 Paul Kocialkowski <contact@paulk.fr>
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-# This script assumes that the working directory is the
-# root of libreboot_src or libreboot git.
-
-[ "x${DEBUG+set}" = 'xset' ] && set -v
-set -u -e
-if [ -z ${NPROC+x} ]; then
- cores="$(nproc)"
-else
- case ${NPROC} in
- ''|*[!0-9]*)
- printf "value '%s' for NPROC is invalid. non-numeric. Exiting.\n" "${NPROC}"
- exit 1
- ;;
- esac
- cores="${NPROC}"
-fi
-
-printf "Building ROM images with the depthcharge payload\n"
-
-if [ ! -d "bin/" ]
-then
- mkdir "bin/"
-fi
-
-if [ -f "version" ]; then
- # _src release archive is being used
- version="$(cat "version")"
-else
- # git repo is being used
- version="$(git describe --tags HEAD)" # note: in libreboot, coreboot/.git doesn't exist, this uses libreboot .git
-fi
-
-# Build libpayload
-# ------------------------------------------------------------------------------
-
-buildlibpayload() {
- family="${1}"
- board="${2}"
- cbrevision="${3}"
- vbootrevision="${4}"
-
- (
- cd "coreboot/${cbrevision}/${cbrevision}/"
- git checkout depthcharge_${board}
-
- (
- cd "3rdparty/vboot/"
- git checkout depthcharge_${board}
- )
-
- cd "payloads/libpayload/"
-
- make distclean
- rm -Rf "install/"
-
- make KBUILD_DEFCONFIG="configs/config.$family" defconfig
- make -j${cores}
- make DESTDIR="install" install
-
- cd "../../"
- git checkout master
- cd "3rdparty/vboot/"
- git checkout master
- )
-}
-
-# Build depthcharge
-# ------------------------------------------------------------------------------
-
-builddepthcharge() {
- board="${1}"
- cbrevision="${2}"
- vbootrevision="${3}"
-
- (
- (
- cd "coreboot/${cbrevision}/${cbrevision}/"
- git checkout depthcharge_${board}
-
- cd "3rdparty/vboot/"
- git checkout depthcharge_${board}
- )
-
- cd "depthcharge/"
-
- make distclean
- rm -f "../coreboot/${cbrevision:?}/${cbrevision:?}/payload.elf"
-
- make BOARD="${board}" defconfig
- make BOARD="${board}" LIBPAYLOAD_DIR="$(pwd)/../coreboot/${cbrevision}/${cbrevision}/payloads/libpayload/install/libpayload" VB_SOURCE="$(pwd)/../coreboot/${cbrevision}/${cbrevision}/3rdparty/vboot" -j${cores} depthcharge_unified
-
- cp "build/depthcharge.elf" "../coreboot/${cbrevision}/${cbrevision}/payload.elf"
-
- cd "../coreboot/${cbrevision}/${cbrevision}/"
- git checkout master
-
- cd "3rdparty/vboot/"
- git checkout master
- )
-}
-
-# Build coreboot
-# ------------------------------------------------------------------------------
-
-buildcoreboot() {
- board="${1}"
- cbrevision="${2}"
- vbootrevision="${3}"
-
- (
- cd "coreboot/${cbrevision}/${cbrevision}"
- git checkout depthcharge_${board}
-
- (
- cd "3rdparty/vboot/"
- git checkout depthcharge_${board}
- )
-
- make distclean
- rm -f ".coreboot-version"
- rm -f *.img
-
- printf 'libreboot-%s' "${version}" > "ro-frid"
- printf 'libreboot-%s\n' "${version}" > ".coreboot-version" # needed for reproducible builds in coreboot
-
- make KBUILD_DEFCONFIG="$(pwd)/../../../resources/libreboot/config/depthcharge/${board}/config" defconfig
- make -j${cores}
-
- cbfs_size=$( grep CONFIG_CBFS_SIZE ".config" | sed "s/.*[[:space:]]*=[[:space:]]*//g" )
- cbfs_size=$( printf "%d\n" "${cbfs_size}" )
- cbfs_size=$(( $cbfs_size / 1024 ))
-
- dd if="build/coreboot.rom" of="coreboot.img" bs=1024 count="${cbfs_size}"
-
- objcopy -I binary -O binary --pad-to=0x100 --gap-fill=0x00 "ro-frid" "ro-frid.img"
-
- # prepare directory for new images
- rm -Rf "${board:?}/"
- mkdir "${board}/"
- # move the images into the newly created directory
- mv "coreboot.img" "${board}/"
- mv "ro-frid.img" "${board}/"
- # copy the scripts too
- cp "../../../resources/libreboot/install/depthcharge/cros-flash-replace" "${board}/"
- cp "../../../resources/libreboot/install/depthcharge/${board}/layout.txt" "${board}/"
- # delete the old images from ../bin
- rm -Rf "../../../bin/depthcharge/${board}/"
- # now put the new images in ./bin/depthcharge/
- [ ! -d "../../../bin/depthcharge/" ] && mkdir -p "../../../bin/depthcharge/"
- mv "${board}/" "../../../bin/depthcharge/"
-
- # clean this up
- rm -f "payload.elf"
- rm -f *.img
-
- git checkout master
-
- cd "3rdparty/vboot/"
- git checkout master
- )
-}
-
-# Build ROM images for supported boards
-buildrom() {
- board="${1}"
- cbrevision="$(cat resources/libreboot/config/depthcharge/${board}/cbrevision)"
- vbootrevision="$(cat resources/libreboot/config/depthcharge/${board}/vbootrevision)"
-
- if [ -f "resources/libreboot/config/depthcharge/${board}/config" ]; then
- family=$( echo ${board} |sed "s/_.*//g" )
-
- buildlibpayload "${family}" "${board}" "${cbrevision}" "${vbootrevision}"
- builddepthcharge "${board}" "${cbrevision}" "${vbootrevision}"
- buildcoreboot "${board}" "${cbrevision}" "${vbootrevision}"
- fi
-}
-
-if [ $# -gt 0 ]; then
- for board in "${@}"; do
- buildrom "${board}"
- done
-else
- for board in resources/libreboot/config/depthcharge/*; do
- buildrom "${board##*/}"
- done
-fi
diff --git a/resources/scripts/helpers/download/depthcharge b/resources/scripts/helpers/download/depthcharge
deleted file mode 100755
index 9827a346..00000000
--- a/resources/scripts/helpers/download/depthcharge
+++ /dev/null
@@ -1,75 +0,0 @@
-#!/bin/bash
-
-# helper script: downloads depthcharge and patches it
-#
-# Copyright (C) 2015 Paul Kocialkowski <contact@paulk.fr>
-#
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program. If not, see <http://www.gnu.org/licenses/>.
-#
-
-# This script assumes that the working directory is the
-# root of libreboot_src or libreboot git.
-
-[ "x${DEBUG+set}" = 'xset' ] && set -v
-set -u -e
-
-# Get depthcharge and patch it
-
-printf "Downloading depthcharge\n"
-
-rm -Rf "depthcharge/"
-
-# Get depthcharge
-# ------------------------------------------------------------------------------
-
-# download depthcharge from git
-git clone https://chromium.googlesource.com/chromiumos/platform/depthcharge
-
-# enter the tree to patch it
-cd "depthcharge/"
-
-# reset to the latest previously tested revision
-git reset --hard 065ba14bc56c9044247fef6337d8f9e9a3055820
-
-# Patch depthcharge
-# ------------------------------------------------------------------------------
-
-printf "arm: armv7-a march abi flag for ARMv7 hardware\n"
-git am "../resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch"
-
-printf "Coreboot image integration removal\n"
-git am "../resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch"
-
-printf "DOTCONFIG location correction\n"
-git am "../resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch"
-
-printf "Adaptation for a read-only boot path when no vboot handoff data is found\n"
-git am "../resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch"
-
-printf "vboot: Only initialize cparams once\n"
-git am "../resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch"
-
-printf "Proper firmware index report for read-only boot path\n"
-git am "../resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch"
-
-printf "fdt: nonvolatile-context-storage report to mkbp for EC NV storage\n"
-git am "../resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch"
-
-printf "vboot: Display callbacks for developer and recovery mode screens\n"
-git am "../resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch"
-
-# leave the tree
-cd "../"
-
-printf "\n\n"