summaryrefslogtreecommitdiff
path: root/src/arch/x86/bootblock.ld
diff options
context:
space:
mode:
authorBill XIE <persmule@hardenedlinux.org>2021-03-20 21:06:11 +0800
committerNico Huber <nico.h@gmx.de>2021-12-21 18:13:45 +0000
commitf0215b4cae32be8ddee3435941988d5efd84dad6 (patch)
tree56c0c988b2356b8f8a66f7e8664860847fb80816 /src/arch/x86/bootblock.ld
parenta4dddfc3a3a48727ebcec727a0b1fd87eb4c14ad (diff)
arch/x86: Init firmware pointer for EC SMSC KBC1098/KBC1126 at build time
According to util/kbc1126/README.md, for these ECs to work, the address and size of their two firmware should be written to $s-0x100` (`$s` means the image size, done with kbc1126_ec_insert), which means that every existing section (especially those used to store code) should not overlap this address, otherwise the bootblock will get damaged when inserting firmwares of the EC. In this commit, ecfw_ptr is a structure initialized at build time according to CONFIG_KBC1126_FW1_OFFSET and CONFIG_KBC1126_FW2_OFFSET (to do so, they should be redefined as hex), and linked to CONFIG_ECFW_PTR_ADDR within bootblock, so kbc1126_ec_insert is not needed at build time any more. Test passed on Elitebook Folio 9470m. Signed-off-by: Bill XIE <persmule@hardenedlinux.org> Change-Id: I4f0de0c4d7283e630242fbe84a46e0547783c49e Reviewed-on: https://review.coreboot.org/c/coreboot/+/51671 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Nico Huber <nico.h@gmx.de>
Diffstat (limited to 'src/arch/x86/bootblock.ld')
-rw-r--r--src/arch/x86/bootblock.ld9
1 files changed, 8 insertions, 1 deletions
diff --git a/src/arch/x86/bootblock.ld b/src/arch/x86/bootblock.ld
index 4ab2275998..0b908bbec6 100644
--- a/src/arch/x86/bootblock.ld
+++ b/src/arch/x86/bootblock.ld
@@ -31,7 +31,7 @@ SECTIONS {
*/
PROGRAM_SZ = SIZEOF(.text) + 512;
- . = MIN(_ID_SECTION, _FIT_POINTER) - EARLYASM_SZ;
+ . = MIN(_ECFW_PTR, MIN(_ID_SECTION, _FIT_POINTER)) - EARLYASM_SZ;
. = CONFIG(SIPI_VECTOR_IN_ROM) ? ALIGN(4096) : ALIGN(16);
BOOTBLOCK_TOP = .;
.init (.) : {
@@ -56,6 +56,13 @@ SECTIONS {
_ID_SECTION_END = SIZEOF(.fit_pointer) && SIZEOF(.id) > 0x28 ? 0xffffff80 : _X86_RESET_VECTOR;
_ID_SECTION = _ID_SECTION_END - SIZEOF(.id);
+ . = _ECFW_PTR;
+ .ecfw_ptr (.): {
+ ASSERT((SIZEOF(.ecfw_ptr) == CONFIG_ECFW_PTR_SIZE), "Size of ecfw_ptr is incorrect");
+ KEEP(*(.ecfw_ptr));
+ }
+ _ECFW_PTR = SIZEOF(.ecfw_ptr) ? CONFIG_ECFW_PTR_ADDR : _X86_RESET_VECTOR;
+
. = _FIT_POINTER;
.fit_pointer (.): {
KEEP(*(.fit_pointer));