Felix Held | d123f8d | 2023-12-15 10:57:30 +0100 | [diff] [blame] | 1 | config SOC_AMD_GENOA_POC |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 2 | bool |
| 3 | |
Felix Held | d123f8d | 2023-12-15 10:57:30 +0100 | [diff] [blame] | 4 | if SOC_AMD_GENOA_POC |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 5 | |
| 6 | config SOC_SPECIFIC_OPTIONS |
| 7 | def_bool y |
Felix Held | d1065a3 | 2023-12-12 19:36:55 +0100 | [diff] [blame] | 8 | select ACPI_SOC_NVS |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 9 | select ARCH_X86 |
Varshit Pandya | 0f666f7 | 2023-12-18 23:07:21 +0530 | [diff] [blame] | 10 | select DEFAULT_X2APIC |
Felix Held | d1065a3 | 2023-12-12 19:36:55 +0100 | [diff] [blame] | 11 | select HAVE_ACPI_TABLES |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 12 | select HAVE_EXP_X86_64_SUPPORT |
Arthur Heymans | 2e2f166 | 2023-07-14 22:58:49 +0200 | [diff] [blame] | 13 | select HAVE_SMI_HANDLER |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 14 | select RESET_VECTOR_IN_RAM |
| 15 | select SOC_AMD_COMMON |
Arthur Heymans | 2e2f166 | 2023-07-14 22:58:49 +0200 | [diff] [blame] | 16 | select SOC_AMD_COMMON_BLOCK_ACPI |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 17 | select SOC_AMD_COMMON_BLOCK_ACPIMMIO |
Felix Held | d1065a3 | 2023-12-12 19:36:55 +0100 | [diff] [blame] | 18 | select SOC_AMD_COMMON_BLOCK_ACPI_CPU_POWER_STATE |
Felix Held | b499c1f | 2023-12-12 20:39:38 +0100 | [diff] [blame] | 19 | select SOC_AMD_COMMON_BLOCK_ACPI_IVRS |
Felix Held | aab8a22 | 2024-01-08 23:30:38 +0100 | [diff] [blame] | 20 | select SOC_AMD_COMMON_BLOCK_ACPI_MADT |
Arthur Heymans | 4da9d6b4 | 2023-07-13 14:19:09 +0200 | [diff] [blame] | 21 | select SOC_AMD_COMMON_BLOCK_AOAC |
Varshit Pandya | 95d78d9 | 2023-10-04 19:30:21 +0530 | [diff] [blame] | 22 | select SOC_AMD_COMMON_BLOCK_BANKED_GPIOS |
Arthur Heymans | 48167b1 | 2023-07-13 14:07:54 +0200 | [diff] [blame] | 23 | select SOC_AMD_COMMON_BLOCK_CPUFREQ_FAM17H_19H |
Felix Held | 926887c | 2023-10-13 21:19:53 +0200 | [diff] [blame] | 24 | select SOC_AMD_COMMON_BLOCK_DATA_FABRIC |
| 25 | select SOC_AMD_COMMON_BLOCK_DATA_FABRIC_DOMAIN |
| 26 | select SOC_AMD_COMMON_BLOCK_DATA_FABRIC_MULTI_PCI_SEGMENT |
| 27 | select SOC_AMD_COMMON_BLOCK_DATA_FABRIC_EXTENDED_MMIO |
Arthur Heymans | c666a91 | 2023-07-13 14:34:10 +0200 | [diff] [blame] | 28 | select SOC_AMD_COMMON_BLOCK_HAS_ESPI |
Felix Held | d26f5a1 | 2023-11-20 16:31:31 +0100 | [diff] [blame] | 29 | select SOC_AMD_COMMON_BLOCK_I2C |
Arthur Heymans | c5122f9 | 2023-07-14 23:27:31 +0200 | [diff] [blame] | 30 | select SOC_AMD_COMMON_BLOCK_IOMMU |
Arthur Heymans | c666a91 | 2023-07-13 14:34:10 +0200 | [diff] [blame] | 31 | select SOC_AMD_COMMON_BLOCK_LPC |
Arthur Heymans | 447e279 | 2023-07-14 23:05:46 +0200 | [diff] [blame] | 32 | select SOC_AMD_COMMON_BLOCK_MCAX |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 33 | select SOC_AMD_COMMON_BLOCK_NONCAR |
Felix Held | 80434a6 | 2023-12-13 23:11:45 +0100 | [diff] [blame] | 34 | select SOC_AMD_COMMON_BLOCK_PCI |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 35 | select SOC_AMD_COMMON_BLOCK_PCI_MMCONF |
Felix Held | 0f209b5 | 2023-10-26 14:27:57 +0200 | [diff] [blame] | 36 | select SOC_AMD_COMMON_BLOCK_PSP_GEN2 |
Felix Held | 51d1f30 | 2023-10-04 21:10:36 +0200 | [diff] [blame] | 37 | select SOC_AMD_COMMON_BLOCK_PSP_SPL |
Varshit Pandya | c0f1983 | 2023-10-04 19:26:21 +0530 | [diff] [blame] | 38 | select SOC_AMD_COMMON_BLOCK_SMI |
Arthur Heymans | 2e2f166 | 2023-07-14 22:58:49 +0200 | [diff] [blame] | 39 | select SOC_AMD_COMMON_BLOCK_SMM |
Varshit Pandya | 0a2d2a9 | 2023-10-16 17:26:35 +0530 | [diff] [blame] | 40 | select SOC_AMD_COMMON_BLOCK_SMU |
| 41 | select SOC_AMD_COMMON_BLOCK_SMU_SX_ENTRY |
Felix Held | d1065a3 | 2023-12-12 19:36:55 +0100 | [diff] [blame] | 42 | select SOC_AMD_COMMON_BLOCK_SVI3 |
Arthur Heymans | 48167b1 | 2023-07-13 14:07:54 +0200 | [diff] [blame] | 43 | select SOC_AMD_COMMON_BLOCK_TSC |
Varshit Pandya | 970d770 | 2023-10-06 18:14:02 +0530 | [diff] [blame] | 44 | select SOC_AMD_COMMON_BLOCK_UART |
Arthur Heymans | 5ee1d23 | 2023-07-14 23:16:22 +0200 | [diff] [blame] | 45 | select SOC_AMD_COMMON_BLOCK_UCODE |
Arthur Heymans | c666a91 | 2023-07-13 14:34:10 +0200 | [diff] [blame] | 46 | select SOC_AMD_COMMON_BLOCK_USE_ESPI |
Martin Roth | 50a3d6f | 2023-10-25 16:17:16 -0600 | [diff] [blame] | 47 | select SOC_AMD_OPENSIL |
Felix Held | 9314bb6 | 2023-12-15 11:15:26 +0100 | [diff] [blame] | 48 | select SOC_AMD_OPENSIL_GENOA_POC |
Arthur Heymans | e4eba13 | 2023-07-13 14:02:42 +0200 | [diff] [blame] | 49 | select X86_CUSTOM_BOOTMEDIA |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 50 | |
| 51 | config USE_EXP_X86_64_SUPPORT |
| 52 | default y |
| 53 | |
vbpandya | 87d8b8c | 2023-09-22 20:49:37 +0530 | [diff] [blame] | 54 | config CHIPSET_DEVICETREE |
| 55 | string |
Felix Held | d123f8d | 2023-12-15 10:57:30 +0100 | [diff] [blame] | 56 | default "soc/amd/genoa_poc/chipset.cb" |
vbpandya | 87d8b8c | 2023-09-22 20:49:37 +0530 | [diff] [blame] | 57 | |
Felix Held | d26f5a1 | 2023-11-20 16:31:31 +0100 | [diff] [blame] | 58 | config DRIVERS_I2C_DESIGNWARE_CLOCK_MHZ |
| 59 | int |
| 60 | default 150 |
| 61 | |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 62 | config EARLY_RESERVED_DRAM_BASE |
| 63 | hex |
| 64 | default 0x7000000 |
| 65 | help |
| 66 | This variable defines the base address of the DRAM which is reserved |
| 67 | for usage by coreboot in early stages (i.e. before ramstage is up). |
| 68 | This memory gets reserved in BIOS tables to ensure that the OS does |
| 69 | not use it, thus preventing corruption of OS memory in case of S3 |
| 70 | resume. |
| 71 | |
| 72 | config EARLYRAM_BSP_STACK_SIZE |
| 73 | hex |
| 74 | default 0x1000 |
| 75 | |
Varshit Pandya | a775958 | 2023-10-17 21:59:39 +0530 | [diff] [blame] | 76 | config MAX_CPUS |
| 77 | int |
| 78 | default 384 |
| 79 | |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 80 | config PSP_APOB_DRAM_ADDRESS |
| 81 | hex |
| 82 | default 0x7001000 |
| 83 | help |
| 84 | Location in DRAM where the PSP will copy the AGESA PSP Output |
| 85 | Block. |
| 86 | |
| 87 | config PSP_APOB_DRAM_SIZE |
| 88 | hex |
| 89 | default 0x20000 |
| 90 | |
| 91 | config PRERAM_CBMEM_CONSOLE_SIZE |
| 92 | hex |
| 93 | default 0x1600 |
| 94 | help |
| 95 | Increase this value if preram cbmem console is getting truncated |
| 96 | |
| 97 | config C_ENV_BOOTBLOCK_SIZE |
| 98 | hex |
| 99 | default 0x10000 |
| 100 | help |
| 101 | Sets the size of the bootblock stage that should be loaded in DRAM. |
| 102 | This variable controls the DRAM allocation size in linker script |
| 103 | for bootblock stage. |
| 104 | |
| 105 | config ROMSTAGE_ADDR |
| 106 | hex |
| 107 | default 0x7040000 |
| 108 | help |
| 109 | Sets the address in DRAM where romstage should be loaded. |
| 110 | |
| 111 | config ROMSTAGE_SIZE |
| 112 | hex |
| 113 | default 0x80000 |
| 114 | help |
| 115 | Sets the size of DRAM allocation for romstage in linker script. |
| 116 | |
Arthur Heymans | 901f040 | 2023-07-13 14:14:55 +0200 | [diff] [blame] | 117 | config ECAM_MMCONF_BASE_ADDRESS |
| 118 | hex |
| 119 | default 0xE0000000 |
| 120 | |
| 121 | config ECAM_MMCONF_BUS_NUMBER |
| 122 | int |
| 123 | default 256 |
| 124 | |
Arthur Heymans | 8f1c707 | 2023-07-13 12:52:49 +0200 | [diff] [blame] | 125 | menu "PSP Configuration Options" |
| 126 | |
| 127 | config AMDFW_CONFIG_FILE |
| 128 | string |
Felix Held | d123f8d | 2023-12-15 10:57:30 +0100 | [diff] [blame] | 129 | default "src/soc/amd/genoa_poc/fw.cfg" |
Arthur Heymans | 8f1c707 | 2023-07-13 12:52:49 +0200 | [diff] [blame] | 130 | |
| 131 | config PSP_DISABLE_POSTCODES |
| 132 | bool "Disable PSP post codes" |
| 133 | help |
| 134 | Disables the output of port80 post codes from PSP. |
| 135 | |
| 136 | config PSP_INIT_ESPI |
| 137 | bool "Initialize eSPI in PSP Stage 2 Boot Loader" |
| 138 | help |
| 139 | Select to initialize the eSPI controller in the PSP Stage 2 Boot |
| 140 | Loader. |
| 141 | |
| 142 | config PSP_UNLOCK_SECURE_DEBUG |
| 143 | bool |
| 144 | default y |
| 145 | |
| 146 | config HAVE_PSP_WHITELIST_FILE |
| 147 | bool "Include a debug whitelist file in PSP build" |
| 148 | default n |
| 149 | help |
| 150 | Support secured unlock prior to reset using a whitelisted |
| 151 | serial number. This feature requires a signed whitelist image |
| 152 | and bootloader from AMD. |
| 153 | |
| 154 | If unsure, answer 'n' |
| 155 | |
| 156 | config PSP_WHITELIST_FILE |
| 157 | string "Debug whitelist file path" |
| 158 | depends on HAVE_PSP_WHITELIST_FILE |
| 159 | |
Arthur Heymans | 8f1c707 | 2023-07-13 12:52:49 +0200 | [diff] [blame] | 160 | config PSP_SOFTFUSE_BITS |
| 161 | string "PSP Soft Fuse bits to enable" |
| 162 | default "" |
| 163 | help |
| 164 | Space separated list of Soft Fuse bits to enable. |
| 165 | Bit 0: Enable secure debug (Set by PSP_UNLOCK_SECURE_DEBUG) |
| 166 | Bit 7: Disable PSP postcodes on Renoir and newer chips only |
| 167 | (Set by PSP_DISABLE_PORT80) |
| 168 | Bit 15: PSP debug output destination: |
| 169 | 0=SoC MMIO UART, 1=IO port 0x3F8 |
| 170 | |
| 171 | See #57299 (NDA) for additional bit definitions. |
| 172 | endmenu |
| 173 | |
Felix Held | 88da16b | 2023-12-04 18:46:38 +0100 | [diff] [blame] | 174 | config CONSOLE_UART_BASE_ADDRESS |
| 175 | depends on CONSOLE_SERIAL && AMD_SOC_CONSOLE_UART |
| 176 | hex |
| 177 | default 0xfedc9000 if UART_FOR_CONSOLE = 0 |
| 178 | default 0xfedca000 if UART_FOR_CONSOLE = 1 |
| 179 | default 0xfedce000 if UART_FOR_CONSOLE = 2 |
| 180 | |
Arthur Heymans | 2e2f166 | 2023-07-14 22:58:49 +0200 | [diff] [blame] | 181 | config SMM_TSEG_SIZE |
| 182 | hex |
| 183 | default 0x800000 |
Arthur Heymans | 8f1c707 | 2023-07-13 12:52:49 +0200 | [diff] [blame] | 184 | |
Varshit Pandya | 2edcd93 | 2023-11-02 19:21:01 +0530 | [diff] [blame] | 185 | #TODO: Check if the value of HEAP_SIZE is optimal |
| 186 | config HEAP_SIZE |
| 187 | hex |
| 188 | default 0x200000 |
| 189 | |
Felix Held | d1065a3 | 2023-12-12 19:36:55 +0100 | [diff] [blame] | 190 | config ACPI_SSDT_PSD_INDEPENDENT |
| 191 | bool "Allow core p-state independent transitions" |
| 192 | default y |
| 193 | help |
| 194 | AMD recommends the ACPI _PSD object to be configured to cause |
| 195 | cores to transition between p-states independently. A vendor may |
| 196 | choose to generate _PSD object to allow cores to transition together. |
| 197 | |
Arthur Heymans | b2ea2f2 | 2023-07-15 00:28:31 +0200 | [diff] [blame] | 198 | config ACPI_BERT |
| 199 | bool "Build ACPI BERT Table" |
| 200 | default y |
| 201 | depends on HAVE_ACPI_TABLES |
| 202 | help |
| 203 | Report Machine Check errors identified in POST to the OS in an |
| 204 | ACPI Boot Error Record Table. |
| 205 | |
| 206 | config ACPI_BERT_SIZE |
| 207 | hex |
| 208 | default 0x4000 if ACPI_BERT |
| 209 | default 0x0 |
| 210 | help |
| 211 | Specify the amount of DRAM reserved for gathering the data used to |
| 212 | generate the ACPI table. |
| 213 | |
Felix Held | d123f8d | 2023-12-15 10:57:30 +0100 | [diff] [blame] | 214 | endif # SOC_AMD_GENOA_POC |