coreboot/src/vendorcode
Karthikeyan Ramasubramanian 47b393a17d soc/amd/mendocino: Update FSP-S UPD to pass boot logo
A new FSP-S UPD is added to allow passing a buffer containing boot logo
in BMP format. Update the FSP-S UPD and add a SoC specific callback to
populate the UPD.

BUG=b:294055390
TEST=Build and boot to OS in Skyrim. Pass the BMP logo buffer through
the UPD to FSP-S. Ensure that the concerned driver in FSP-S handles the
buffer.

Change-Id: Ie522956b6dfe2400ef91d43c80f2adc6d52c8415
Signed-off-by: Karthikeyan Ramasubramanian <kramasub@google.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/78817
Reviewed-by: Matt DeVillier <matt.devillier@amd.corp-partner.google.com>
Reviewed-by: Eric Lai <ericllai@google.com>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
2023-11-02 13:26:23 +00:00
..
amd soc/amd/mendocino: Update FSP-S UPD to pass boot logo 2023-11-02 13:26:23 +00:00
cavium vendorcode/cavium: Use C99 flexible arrays 2023-08-08 16:01:08 +00:00
eltan treewide: convert to tpm_result_t 2023-09-28 16:54:37 +00:00
google treewide: convert to tpm_result_t 2023-09-28 16:54:37 +00:00
intel vc/intel/fsp/mtl: Add Psi[1-3]Threshold UPDs to FSP-M header file 2023-10-28 20:57:52 +00:00
mediatek vendorcode/mediatek/mt8195: Fix set but unused variables 2023-05-13 17:19:53 +00:00
siemens vc/siemens: Only add the include path for hwlib when needed 2023-08-26 21:13:50 +00:00
Makefile.inc soc/mediatek/mt8192: initialize DRAM using vendor reference code 2021-03-08 03:15:43 +00:00
README.md src/vendorcode: Add a README.md file 2022-10-20 14:52:41 +00:00

The files in the coreboot src/vendorcode subdirectory are supplied by various hardware and software vendors to support their platforms. While these directories and files are a part of the coreboot project, their licenses, coding styles, and maintenance may be significantly different than the rest of the coreboot codebase.

By contributing these directories and files to the coreboot codebase, the authors and copyright holders have agreed to the use and modification of these files by the coreboot community, however the final ownership and responsibility still remains with the company that contributed the files.

The ideal goal would be to properly integrate these files into coreboot proper. But such undertakings should be coordinated with the owners. Community modification should in general be limited to fixing issues and adding functionality.

Licenses for the files were determined by the copyright holder when the files were contributed. All files here must have an open source license compatible with coreboot's GPL v2.