diff options
author | Jack Rosenthal <jrosenth@chromium.org> | 2021-11-04 12:11:58 -0600 |
---|---|---|
committer | Commit Bot <commit-bot@chromium.org> | 2021-11-05 04:22:34 +0000 |
commit | 252457d4b21f46889eebad61d4c0a65331919cec (patch) | |
tree | 01856c4d31d710b20e85a74c8d7b5836e35c3b98 /board/zinger/board.c | |
parent | 08f5a1e6fc2c9467230444ac9b582dcf4d9f0068 (diff) | |
download | chrome-ec-stabilize-14526.84.B-ish.tar.gz |
ish: Trim down the release branchstabilize-wristpin-14469.59.B-ishstabilize-voshyr-14637.B-ishstabilize-quickfix-14695.187.B-ishstabilize-quickfix-14695.124.B-ishstabilize-quickfix-14526.91.B-ishstabilize-14695.85.B-ishstabilize-14695.107.B-ishstabilize-14682.B-ishstabilize-14633.B-ishstabilize-14616.B-ishstabilize-14589.B-ishstabilize-14588.98.B-ishstabilize-14588.14.B-ishstabilize-14588.123.B-ishstabilize-14536.B-ishstabilize-14532.B-ishstabilize-14528.B-ishstabilize-14526.89.B-ishstabilize-14526.84.B-ishstabilize-14526.73.B-ishstabilize-14526.67.B-ishstabilize-14526.57.B-ishstabilize-14498.B-ishstabilize-14496.B-ishstabilize-14477.B-ishstabilize-14469.9.B-ishstabilize-14469.8.B-ishstabilize-14469.58.B-ishstabilize-14469.41.B-ishstabilize-14442.B-ishstabilize-14438.B-ishstabilize-14411.B-ishstabilize-14396.B-ishstabilize-14395.B-ishstabilize-14388.62.B-ishstabilize-14388.61.B-ishstabilize-14388.52.B-ishstabilize-14385.B-ishstabilize-14345.B-ishstabilize-14336.B-ishstabilize-14333.B-ishrelease-R99-14469.B-ishrelease-R98-14388.B-ishrelease-R102-14695.B-ishrelease-R101-14588.B-ishrelease-R100-14526.B-ishfirmware-cherry-14454.B-ishfirmware-brya-14505.B-ishfirmware-brya-14505.71.B-ishfactory-kukui-14374.B-ishfactory-guybrush-14600.B-ishfactory-cherry-14455.B-ishfactory-brya-14517.B-ish
In the interest of making long-term branch maintenance incur as little
technical debt on us as possible, we should not maintain any files on
the branch we are not actually using.
This has the added effect of making it extremely clear when merging CLs
from the main branch when changes have the possibility to affect us.
The follow-on CL adds a convenience script to actually pull updates from
the main branch and generate a CL for the update.
BUG=b:204206272
BRANCH=ish
TEST=make BOARD=arcada_ish && make BOARD=drallion_ish
Signed-off-by: Jack Rosenthal <jrosenth@chromium.org>
Change-Id: I17e4694c38219b5a0823e0a3e55a28d1348f4b18
Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/ec/+/3262038
Reviewed-by: Jett Rink <jettrink@chromium.org>
Reviewed-by: Tom Hughes <tomhughes@chromium.org>
Diffstat (limited to 'board/zinger/board.c')
-rw-r--r-- | board/zinger/board.c | 106 |
1 files changed, 0 insertions, 106 deletions
diff --git a/board/zinger/board.c b/board/zinger/board.c deleted file mode 100644 index b3784fde33..0000000000 --- a/board/zinger/board.c +++ /dev/null @@ -1,106 +0,0 @@ -/* Copyright 2014 The Chromium OS Authors. All rights reserved. - * Use of this source code is governed by a BSD-style license that can be - * found in the LICENSE file. - */ -/* Tiny charger configuration */ - -#include "common.h" -#include "cros_version.h" -#include "debug_printf.h" -#include "ec_commands.h" -#include "registers.h" -#include "rsa.h" -#include "rwsig.h" -#include "sha256.h" -#include "system.h" -#include "task.h" -#include "usb_pd.h" -#include "util.h" - -/* Large 768-Byte buffer for RSA computation : could be re-use afterwards... */ -static uint32_t rsa_workbuf[3 * RSANUMWORDS]; - -extern void pd_rx_handler(void); - -/* RW firmware reset vector */ -static uint32_t * const rw_rst = - (uint32_t *)(CONFIG_PROGRAM_MEMORY_BASE+CONFIG_RW_MEM_OFF+4); - -/* External interrupt EXTINT7 for external comparator on PA7 */ -void pd_rx_interrupt(void) -{ - /* trigger reception handling */ - pd_rx_handler(); -} -DECLARE_IRQ(STM32_IRQ_EXTI4_15, pd_rx_interrupt, 1); - -static void jump_to_rw(void) -{ - void (*jump_rw_rst)(void) = (void *)*rw_rst; - - debug_printf("Jump to RW\n"); - /* Disable interrupts */ - asm volatile("cpsid i"); - /* Call RW firmware reset vector */ - jump_rw_rst(); -} - -int is_ro_mode(void) -{ - return (uint32_t)&jump_to_rw < (uint32_t)rw_rst; -} - -static int check_rw_valid(void *rw_hash) -{ - int good; - - /* Check if we have a RW firmware flashed */ - if (*rw_rst == 0xffffffff) - return 0; - - good = rsa_verify((const struct rsa_public_key *)CONFIG_RO_PUBKEY_ADDR, - (const uint8_t *)CONFIG_RW_SIG_ADDR, - rw_hash, rsa_workbuf); - if (!good) { - debug_printf("RSA FAILED\n"); - pd_log_event(PD_EVENT_ACC_RW_FAIL, 0, 0, NULL); - return 0; - } - - return 1; -} - -extern void pd_task(void *u); - -int main(void) -{ - void *rw_hash; - - hardware_init(); - debug_printf("%s started\n", - is_ro_mode() ? "RO" : "RW"); - - /* the RO partition protection is not enabled : do it */ - if (!flash_physical_is_permanently_protected()) - flash_physical_permanent_protect(); - - /* - * calculate the hash of the RW partition - * - * Also pre-cache it so we can answer Discover Identity VDM - * fast enough (in less than 30ms). - */ - rw_hash = flash_hash_rw(); - - /* Verify RW firmware and use it if valid */ - if (is_ro_mode() && check_rw_valid(rw_hash)) - jump_to_rw(); - - /* background loop for PD events */ - pd_task(NULL); - - debug_printf("EXIT!\n"); - /* we should never reach that point */ - system_reset(0); - return 0; -} |