summaryrefslogtreecommitdiffstats
path: root/src/vendorcode/google/chromeos
Commit message (Expand)AuthorAgeFilesLines
* acpi: Hide Chrome and coreboot specific devicesDavid Wu2018-08-281-0/+4
* cbtable: remove chromeos_acpi from cbtableJoel Kitching2018-08-221-0/+12
* cr50: Allow boards to disable powering off EC on cr50 updateDaisuke Nojiri2018-08-171-1/+2
* cbmem: rename vdat to chromeos_acpiJoel Kitching2018-08-142-17/+24
* intel/wifi: Add WGDS ACPI method for Geo Aware SARPratik Prajapati2018-07-131-24/+83
* security/tpm: Unify the coreboot TPM software stackPhilipp Deppenwiese2018-06-042-2/+2
* security/tpm: Change TPM naming for different layers.Philipp Deppenwiese2018-01-182-2/+2
* security/tpm: Move tpm TSS and TSPI layer to security sectionPhilipp Deppenwiese2018-01-182-3/+2
* cr50: Make EC clear AP_OFF before hibnernateDaisuke Nojiri2017-12-081-3/+4
* security/vboot: Guard google_chromeec_reboot by if clauseDaisuke Nojiri2017-12-041-1/+2
* security/vboot: Move vboot2 to security kconfig sectionPhilipp Deppenwiese2017-10-225-7/+7
* cr50_enable_update: Add printk before EC hibernateShelley Chen2017-10-201-0/+1
* Rename __attribute__((packed)) --> __packedStefan Reinauer2017-07-132-8/+11
* src/vendorcode: add IS_ENABLED() around Kconfig symbol referencesMartin Roth2017-07-082-4/+4
* cr50: check if the new image needs to be enabled and act on itVadim Bendebury2017-05-052-0/+72
* Kconfig: provide MAINBOARD_HAS_TPM_CR50 optionAaron Durbin2017-04-241-1/+1
* vboot: Move remaining features out of vendorcode/google/chromeosJulius Werner2017-03-283-315/+0
* chromeos / broadwell / jecht: Make save_chromeos_gpios() jecht-specificJulius Werner2017-03-282-7/+0
* vboot: Assume EC_SOFTWARE_SYNC and VIRTUAL_DEV_SWITCH by defaultJulius Werner2017-03-282-14/+11
* chromeos: Remove old MOCK_TPM referencesJulius Werner2017-03-281-6/+0
* vboot/tpm2: enable nvmem commits on cr50 when writing firmware secdataAaron Durbin2017-03-091-0/+4
* chromeos/elog: Filter developer mode entry on S3 resumeDuncan Laurie2017-03-081-2/+17
* Revert "chromeos: Fill in the firmware id (RO, RW A, RW B) FMAP sections"Patrick Georgi2017-01-241-14/+1
* google/chromeos: disable platform hierarchy on resume for TPM2Aaron Durbin2017-01-123-0/+60
* chromeos: fix build issues within sar.cRobbie Zhang2017-01-111-1/+3
* chromeos: Implement locating and decoding wifi sar data from VPDRobbie Zhang2017-01-093-0/+62
* vendorcode/google/chromeos: provide acpi phase enforcement pin macrosAaron Durbin2016-12-131-0/+10
* vendorcode/google/chromeos: zero out SHARED_DATA regionPatrick Georgi2016-12-131-0/+6
* vendorcode/google/chromeos: Fill in firmware ID regionsPatrick Georgi2016-12-132-2/+24
* google/chromeec: Add common infrastructure for boot-mode switchesFurquan Shaikh2016-11-181-1/+7
* vboot: Add new function for logging recovery mode switchesFurquan Shaikh2016-11-141-0/+5
* Kconfig: Update default hex values to start with 0xMartin Roth2016-10-021-1/+1
* drivers/elog: use region_device for NV storageAaron Durbin2016-08-191-1/+1
* vboot: Move TPM-related Kconfig selects from CHROMEOS to VBOOTJulius Werner2016-08-161-4/+0
* Kconfig: remove unused MULTIPLE_CBFS_INSTANCES optionAaron Durbin2016-08-151-1/+0
* chromeos: Make CHROMEOS_RAMOOPS_NON_ACPI a default for non-ACPI boardsJulius Werner2016-08-131-1/+1
* vendorcode/google/chromeos: remove unnecessary includes in elog.cAaron Durbin2016-08-081-4/+0
* Use VBOOT_SOURCE instead of hardcoding vboot pathPaul Kocialkowski2016-08-081-5/+5
* chromeos mainboards: remove chromeos.aslAaron Durbin2016-07-304-0/+122
* chromeos/gnvs: Clean up use of vboot handoffFurquan Shaikh2016-07-281-13/+4
* chromeos: Clean up elog handlingFurquan Shaikh2016-07-285-37/+34
* google/chromeos: Use vboot bootmode functions for elog add boot reasonFurquan Shaikh2016-07-281-14/+1
* bootmode: Get rid of CONFIG_BOOTMODE_STRAPSFurquan Shaikh2016-07-283-6/+5
* vboot: Separate vboot from chromeosFurquan Shaikh2016-07-2826-2747/+17
* Rename VB_SOURCE to VBOOT_SOURCE for increased clarityPaul Kocialkowski2016-07-271-1/+1
* google/chromeos: Add support for saving recovery reason across rebootFurquan Shaikh2016-07-254-0/+46
* google/chromeos: Add recovery module in vboot2Furquan Shaikh2016-07-253-0/+132
* vboot: Clean up vboot codeFurquan Shaikh2016-07-2511-108/+94
* chromeos: Fill in the firmware id (RO, RW A, RW B) FMAP sectionsPaul Kocialkowski2016-07-151-1/+14
* tpm2: implement locking firmware rollback counterVadim Bendebury2016-07-141-5/+10