coreboot/src/vendorcode
Anil Kumar 90e835db2d vc/google/chromeos: Move RAMOOPS region creation to BS_DEV_INIT_CHIPS
RAMOOPS memory region was being overwritten by coreboot bmp_load_logo()
function. The CBMEM_ID_FSP_LOGO region created during bmp_load_logo()
was overlapping with RAMOOPS space created earlier. This resulted in
memory corruption of RAMOOPS buffer.

To prevent this, the RAMOOPS region allocation is moved to
BS_DEV_INIT_CHIPS phase from earlier BS_WRITE_TABLES phase of boot.

BUG=b:332910298
TEST=build and boot coreboot image on google/rex HW. Check RAMOOPS
CBMEM region creation using cbmem -l command

Signed-off-by: Anil Kumar <anil.kumar.k@intel.com>
Change-Id: Ibae06362cd80eacb16f6cf0eed8c9aa1fbfb2535
Reviewed-on: https://review.coreboot.org/c/coreboot/+/82042
Reviewed-by: Subrata Banik <subratabanik@google.com>
Reviewed-by: Eran Mitrani <mitrani@google.com>
Reviewed-by: Jamie Ryu <jamie.m.ryu@intel.com>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Julius Werner <jwerner@chromium.org>
2024-04-25 20:56:25 +00:00
..
amd vc/amd/opensil/stub/ramstage: add acpi_add_opensil_tables stub 2024-04-22 18:36:56 +00:00
cavium vendorcode/cavium: Use unsigned integers in struct bitfields 2024-03-21 11:23:24 +00:00
eltan security/tpm: resolve conflicts in TSS implementations 2024-03-28 15:16:19 +00:00
google vc/google/chromeos: Move RAMOOPS region creation to BS_DEV_INIT_CHIPS 2024-04-25 20:56:25 +00:00
intel vc/intel/fsp: Refactor FSP header inclusion for EDK2 compatibility 2024-04-04 06:29:20 +00:00
mediatek vendorcode: Rename Makefiles from .inc to .mk 2024-01-24 08:34:46 +00:00
siemens vendorcode: Rename Makefiles from .inc to .mk 2024-01-24 08:34:46 +00:00
wuffs lib/jpeg: Replace decoder with Wuffs' implementation 2023-12-13 16:17:34 +00:00
Makefile.mk vendorcode: Rename Makefiles from .inc to .mk 2024-01-24 08:34:46 +00:00
README.md src/vendorcode: Add a README.md file 2022-10-20 14:52:41 +00:00

The files in the coreboot src/vendorcode subdirectory are supplied by various hardware and software vendors to support their platforms. While these directories and files are a part of the coreboot project, their licenses, coding styles, and maintenance may be significantly different than the rest of the coreboot codebase.

By contributing these directories and files to the coreboot codebase, the authors and copyright holders have agreed to the use and modification of these files by the coreboot community, however the final ownership and responsibility still remains with the company that contributed the files.

The ideal goal would be to properly integrate these files into coreboot proper. But such undertakings should be coordinated with the owners. Community modification should in general be limited to fixing issues and adding functionality.

Licenses for the files were determined by the copyright holder when the files were contributed. All files here must have an open source license compatible with coreboot's GPL v2.