Martin Roth (martinroth(a)google.com) just uploaded a new patch set to gerrit, which you can find at http://review.coreboot.org/12422
-gerrit
commit dadfbfd7a5c87cfee9e38ebb4d29a2eff08f6346
Author: Martin Roth <martinroth(a)google.com>
Date: Thu Nov 12 14:02:42 2015 -0700
x86: Add Kconfig to disable early bootblock postcodes
The Intel cave creek chipset needs to have port 80 routing configured
before any post codes can be sent to port 80h. Sending post codes out
before the routing is done will hang the system.
This patch allows us to disable the first couple of post codes that go
out before the routing can be configured.
Change-Id: I9bf41669ec32744f87a1ed2de011d31c72ea38da
Signed-off-by: Martin Roth <martinroth(a)google.com>
---
src/console/Kconfig | 9 +++++++++
src/cpu/x86/16bit/entry16.inc | 3 ++-
src/cpu/x86/32bit/entry32.inc | 2 ++
src/southbridge/intel/fsp_i89xx/Kconfig | 1 +
4 files changed, 14 insertions(+), 1 deletion(-)
diff --git a/src/console/Kconfig b/src/console/Kconfig
index a2f893a..6776922 100644
--- a/src/console/Kconfig
+++ b/src/console/Kconfig
@@ -350,4 +350,13 @@ config POST_IO_PORT
depending on the presence of coprocessors/microcontrollers or if the
platform does not support IO in the conventional x86 manner.
+config NO_EARLY_BOOTBLOCK_POSTCODES
+ def_bool n
+ help
+ Some chipsets require that the routing for the port 80h post
+ code port be configured before port 80h post codes are sent out.
+ This can be done in the boot block, but there are a couple of
+ post codes that go out before the chipset's bootblock initialization
+ can happen. This option suppresses those post codes.
+
endmenu
diff --git a/src/cpu/x86/16bit/entry16.inc b/src/cpu/x86/16bit/entry16.inc
index 4dad1e5..0480ee6 100644
--- a/src/cpu/x86/16bit/entry16.inc
+++ b/src/cpu/x86/16bit/entry16.inc
@@ -36,8 +36,9 @@ _start:
cli
/* Save the BIST result */
movl %eax, %ebp
-
+#if ! IS_ENABLED(CONFIG_NO_EARLY_BOOTBLOCK_POSTCODES)
post_code(POST_RESET_VECTOR_CORRECT)
+#endif
/* IMMEDIATELY invalidate the translation lookaside buffer (TLB) before
* executing any further code. Even though paging is disabled we
diff --git a/src/cpu/x86/32bit/entry32.inc b/src/cpu/x86/32bit/entry32.inc
index 5c3072e..7f6af53 100644
--- a/src/cpu/x86/32bit/entry32.inc
+++ b/src/cpu/x86/32bit/entry32.inc
@@ -56,7 +56,9 @@ __protected_start:
/* Save the BIST value */
movl %eax, %ebp
+#if ! IS_ENABLED(CONFIG_NO_EARLY_BOOTBLOCK_POSTCODES)
post_code(POST_ENTER_PROTECTED_MODE)
+#endif
movw $ROM_DATA_SEG, %ax
movw %ax, %ds
diff --git a/src/southbridge/intel/fsp_i89xx/Kconfig b/src/southbridge/intel/fsp_i89xx/Kconfig
index d1426d6..9d195d2 100644
--- a/src/southbridge/intel/fsp_i89xx/Kconfig
+++ b/src/southbridge/intel/fsp_i89xx/Kconfig
@@ -34,6 +34,7 @@ config SOUTH_BRIDGE_OPTIONS # dummy
select SPI_FLASH
select COMMON_FADT
select HAVE_INTEL_FIRMWARE
+ select NO_EARLY_BOOTBLOCK_POSTCODES
config EHCI_BAR
hex