blob: d906ea7f258ccf99d36c66010bca7dabf7fe0a54 [file] [log] [blame]
Stefan Reinauer8e073822012-04-04 00:07:22 +02001##
2## This file is part of the coreboot project.
3##
4## Copyright (C) 2011 Google Inc.
5##
6## This program is free software; you can redistribute it and/or modify
7## it under the terms of the GNU General Public License as published by
8## the Free Software Foundation; version 2 of the License.
9##
10## This program is distributed in the hope that it will be useful,
11## but WITHOUT ANY WARRANTY; without even the implied warranty of
12## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13## GNU General Public License for more details.
14##
Stefan Reinauer8e073822012-04-04 00:07:22 +020015
16config SOUTHBRIDGE_INTEL_BD82X6X
17 bool
18
19config SOUTHBRIDGE_INTEL_C216
20 bool
21
22if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216
23
24config SOUTH_BRIDGE_OPTIONS # dummy
25 def_bool y
Aaron Durbin340898f2016-07-13 23:22:28 -050026 select ACPI_INTEL_HARDWARE_SLEEP_VALUES
Kyösti Mälkki71216c92013-07-28 23:39:37 +030027 select SOUTHBRIDGE_INTEL_COMMON
Tobias Diedrich7f5efd92017-12-14 00:29:01 +010028 select SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
Arthur Heymans16fe7902017-04-12 17:01:31 +020029 select SOUTHBRIDGE_INTEL_COMMON_SMBUS
Arthur Heymansbddef0d2017-09-25 12:21:07 +020030 select SOUTHBRIDGE_INTEL_COMMON_SPI
Stefan Reinauer8e073822012-04-04 00:07:22 +020031 select IOAPIC
Kyösti Mälkki545b30d2013-06-13 13:51:14 +030032 select HAVE_USBDEBUG_OPTIONS
Stefan Reinauer431a8162012-11-13 13:01:31 -080033 select HAVE_SMI_HANDLER
Stefan Reinauer8e073822012-04-04 00:07:22 +020034 select USE_WATCHDOG_ON_BOOT
35 select PCIEXP_ASPM
36 select PCIEXP_COMMON_CLOCK
Vladimir Serbinenko5b044ae2014-10-25 15:20:55 +020037 select COMMON_FADT
Alexander Couzens7bf47ee2015-04-16 02:00:21 +020038 select ACPI_SATA_GENERATOR
Stefan Tauneref8b9572018-09-06 00:34:28 +020039 select INTEL_DESCRIPTOR_MODE_CAPABLE
Patrick Rudolphe8e66f42016-02-06 17:42:42 +010040 select SOUTHBRIDGE_INTEL_COMMON_GPIO
Aaron Durbin16246ea2016-08-05 21:23:37 -050041 select RTC
Bill XIEd533b162017-08-22 16:26:22 +080042 select HAVE_INTEL_CHIPSET_LOCKDOWN
Arthur Heymansa0508172018-01-25 11:30:22 +010043 select SOUTHBRIDGE_INTEL_COMMON_SMM
Tristan Corrick167a5122018-10-31 02:28:32 +130044 select SOUTHBRIDGE_INTEL_COMMON_ACPI_MADT
Stefan Reinauer8e073822012-04-04 00:07:22 +020045
46config EHCI_BAR
47 hex
48 default 0xfef00000
49
Vladimir Serbinenko6a7aeb32014-01-05 11:37:32 +010050config DRAM_RESET_GATE_GPIO
51 int
52 default 60
53
Stefan Reinauer8e073822012-04-04 00:07:22 +020054config BOOTBLOCK_SOUTHBRIDGE_INIT
55 string
56 default "southbridge/intel/bd82x6x/bootblock.c"
57
58config SERIRQ_CONTINUOUS_MODE
59 bool
60 default n
61 help
62 If you set this option to y, the serial IRQ machine will be
63 operated in continuous mode.
64
Patrick Georgi9aeb6942012-10-05 21:54:38 +020065config HPET_MIN_TICKS
66 hex
67 default 0x80
68
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020069endif
70
71if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216 || SOUTHBRIDGE_INTEL_IBEXPEAK
72
73choice
Nico Huber2ac149d2017-09-01 23:28:14 +020074 prompt "Flash locking during chipset lockdown"
75 default LOCK_SPI_FLASH_NONE
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020076
Nico Huber2ac149d2017-09-01 23:28:14 +020077config LOCK_SPI_FLASH_NONE
78 bool "Don't lock flash sections"
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020079
Nico Huber2ac149d2017-09-01 23:28:14 +020080config LOCK_SPI_FLASH_RO
81 bool "Write-protect all flash sections"
Nico Huberd1fb5642013-07-01 16:02:36 +020082 help
Nico Huber2ac149d2017-09-01 23:28:14 +020083 Select this if you want to write-protect the whole firmware flash
84 chip. The locking will take place during the chipset lockdown, which
85 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
86 or has to be triggered later (e.g. by the payload or the OS).
Nico Huberd1fb5642013-07-01 16:02:36 +020087
Nico Huber2ac149d2017-09-01 23:28:14 +020088 NOTE: If you trigger the chipset lockdown unconditionally,
89 you won't be able to write to the flash chip using the
90 internal programmer any more.
91
92config LOCK_SPI_FLASH_NO_ACCESS
93 bool "Write-protect all flash sections and read-protect non-BIOS sections"
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020094 help
Nico Huber2ac149d2017-09-01 23:28:14 +020095 Select this if you want to protect the firmware flash against all
96 further accesses (with the exception of the memory mapped BIOS re-
97 gion which is always readable). The locking will take place during
98 the chipset lockdown, which is either triggered by coreboot (when
99 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
100 by the payload or the OS).
101
102 NOTE: If you trigger the chipset lockdown unconditionally,
103 you won't be able to write to the flash chip using the
104 internal programmer any more.
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +0200105
106endchoice
107
Stefan Reinauer8e073822012-04-04 00:07:22 +0200108endif