blob: 568d8ba6e0b07280e98d34b62be09afbb0735418 [file] [log] [blame]
Felix Helddc2d3562020-12-02 14:38:53 +01001# SPDX-License-Identifier: GPL-2.0-only
2
3config SOC_AMD_CEZANNE
4 bool
5 help
6 AMD Cezanne support
7
8if SOC_AMD_CEZANNE
9
10config SOC_SPECIFIC_OPTIONS
11 def_bool y
Raul E Rangel24d024a2021-02-12 16:07:43 -070012 select ACPI_SOC_NVS
Felix Helddc2d3562020-12-02 14:38:53 +010013 select ARCH_BOOTBLOCK_X86_32
Kangheui Won66c5f252021-04-20 17:30:29 +100014 select ARCH_VERSTAGE_X86_32 if !VBOOT_STARTS_BEFORE_BOOTBLOCK
Felix Helddc2d3562020-12-02 14:38:53 +010015 select ARCH_ROMSTAGE_X86_32
16 select ARCH_RAMSTAGE_X86_32
Raul E Rangel54616622021-02-05 17:29:12 -070017 select BOOT_DEVICE_SUPPORTS_WRITES if BOOT_DEVICE_SPI_FLASH
Mathew Kingc519bff2021-03-04 08:26:51 -070018 select DRIVERS_USB_ACPI
Zheng Bao7b13e4e2021-03-16 16:13:56 +080019 select DRIVERS_I2C_DESIGNWARE
Mathew Kingc519bff2021-03-04 08:26:51 -070020 select DRIVERS_USB_PCI_XHCI
Felix Heldc9634992021-01-26 21:35:39 +010021 select FSP_COMPRESS_FSP_M_LZMA
22 select FSP_COMPRESS_FSP_S_LZMA
Raul E Rangele925af22021-03-30 16:32:20 -060023 select GENERIC_GPIO_LIB
Felix Held86024952021-02-03 23:44:28 +010024 select HAVE_ACPI_TABLES
Felix Held44f41532020-12-09 02:01:16 +010025 select HAVE_CF9_RESET
Felix Held227c6492021-03-22 14:44:58 +010026 select HAVE_EM100_SUPPORT
Nikolai Vyssotski0671d732021-03-11 19:12:38 -060027 select HAVE_FSP_GOP
Felix Heldee2a3652021-02-09 23:43:17 +010028 select HAVE_SMI_HANDLER
Felix Heldcb977342021-01-19 20:36:38 +010029 select IDT_IN_EVERY_STAGE
Felix Held4be064a2020-12-08 17:21:04 +010030 select IOAPIC
Felix Held7aacdd12021-02-10 23:27:47 +010031 select PARALLEL_MP_AP_WORK
Felix Held8d0a6092021-01-14 01:40:50 +010032 select PLATFORM_USES_FSP2_0
Raul E Rangel95b3dc32021-03-24 16:53:37 -060033 select PROVIDES_ROM_SHARING
Felix Helddc2d3562020-12-02 14:38:53 +010034 select RESET_VECTOR_IN_RAM
Felix Held7cd81b92021-02-11 14:58:08 +010035 select RTC
Felix Helddc2d3562020-12-02 14:38:53 +010036 select SOC_AMD_COMMON
Karthikeyan Ramasubramanianfbb027e2021-04-23 11:48:06 -060037 select SOC_AMD_COMMON_BLOCK_ACP
Felix Heldbb4bee852021-02-10 16:53:53 +010038 select SOC_AMD_COMMON_BLOCK_ACPI
Felix Held64de2c12020-12-05 20:53:59 +010039 select SOC_AMD_COMMON_BLOCK_ACPIMMIO
Felix Helddd882f32021-05-12 01:23:50 +020040 select SOC_AMD_COMMON_BLOCK_ACPI_ALIB
Eric Lai65b0afe2021-04-09 11:50:48 +080041 select SOC_AMD_COMMON_BLOCK_ACPI_GPIO
Felix Held62ef88f2020-12-08 23:18:19 +010042 select SOC_AMD_COMMON_BLOCK_AOAC
Felix Held9a6bc072021-03-05 00:14:08 +010043 select SOC_AMD_COMMON_BLOCK_APOB
Felix Held07462ef2020-12-11 15:55:45 +010044 select SOC_AMD_COMMON_BLOCK_BANKED_GPIOS
Felix Heldea32c522021-02-13 01:42:44 +010045 select SOC_AMD_COMMON_BLOCK_DATA_FABRIC
Nikolai Vyssotski0671d732021-03-11 19:12:38 -060046 select SOC_AMD_COMMON_BLOCK_GRAPHICS
Felix Held28e23532021-02-24 20:52:08 +010047 select SOC_AMD_COMMON_BLOCK_HAS_ESPI
Zheng Baob0f00ed2021-03-16 15:28:49 +080048 select SOC_AMD_COMMON_BLOCK_I2C
Zheng Bao3da55692021-01-26 18:30:18 +080049 select SOC_AMD_COMMON_BLOCK_LPC
Felix Helddc2d3562020-12-02 14:38:53 +010050 select SOC_AMD_COMMON_BLOCK_NONCAR
Raul E Rangela6529e72021-02-09 14:38:36 -070051 select SOC_AMD_COMMON_BLOCK_PCI
Felix Helddc2d3562020-12-02 14:38:53 +010052 select SOC_AMD_COMMON_BLOCK_PCI_MMCONF
Raul E Rangele4f83172021-05-10 14:49:55 -060053 select SOC_AMD_COMMON_BLOCK_PCIE_GPP_DRIVER
Karthikeyan Ramasubramanianf62bbc82021-03-30 15:19:12 -060054 select SOC_AMD_COMMON_BLOCK_PM
Martin Roth31f7a722021-03-23 14:53:58 -060055 select SOC_AMD_COMMON_BLOCK_PM_CHIPSET_STATE_SAVE
Felix Held338d6702021-01-29 23:13:56 +010056 select SOC_AMD_COMMON_BLOCK_PSP_GEN2
Felix Held4be064a2020-12-08 17:21:04 +010057 select SOC_AMD_COMMON_BLOCK_SMBUS
Zheng Bao02a5ddd2020-12-15 22:16:51 +080058 select SOC_AMD_COMMON_BLOCK_SMI
Felix Heldbc134812021-02-10 02:26:10 +010059 select SOC_AMD_COMMON_BLOCK_SMM
Felix Held7f3f52d2021-03-03 18:56:41 +010060 select SOC_AMD_COMMON_BLOCK_SMU
Raul E Rangel54616622021-02-05 17:29:12 -070061 select SOC_AMD_COMMON_BLOCK_SPI
Felix Held65783fb2020-12-04 17:38:46 +010062 select SOC_AMD_COMMON_BLOCK_TSC_FAM17H_19H
Felix Held8a3d4d52021-01-13 03:06:21 +010063 select SOC_AMD_COMMON_BLOCK_UART
Raul E Rangel35dc4b02021-02-12 16:04:27 -070064 select SOC_AMD_COMMON_BLOCK_UCODE
Raul E Rangelfd7ed872021-05-04 15:42:09 -060065 select SOC_AMD_COMMON_FSP_PCI
Felix Heldcc975c52021-01-23 00:18:08 +010066 select SSE2
Felix Held8d0a6092021-01-14 01:40:50 +010067 select UDK_2017_BINDING
Felix Heldf09221c2021-01-22 23:50:54 +010068 select X86_AMD_FIXED_MTRRS
Felix Held7aacdd12021-02-10 23:27:47 +010069 select X86_AMD_INIT_SIPI
Felix Helddc2d3562020-12-02 14:38:53 +010070
Raul E Rangel35dc4b02021-02-12 16:04:27 -070071config SOC_AMD_COMMON_BLOCK_UCODE_SIZE
72 default 5568
73
Furquan Shaikh696f4ea2021-01-08 11:48:52 -080074config CHIPSET_DEVICETREE
75 string
76 default "soc/amd/cezanne/chipset.cb"
77
Felix Helddc2d3562020-12-02 14:38:53 +010078config EARLY_RESERVED_DRAM_BASE
79 hex
80 default 0x2000000
81 help
82 This variable defines the base address of the DRAM which is reserved
83 for usage by coreboot in early stages (i.e. before ramstage is up).
84 This memory gets reserved in BIOS tables to ensure that the OS does
85 not use it, thus preventing corruption of OS memory in case of S3
86 resume.
87
88config EARLYRAM_BSP_STACK_SIZE
89 hex
90 default 0x1000
91
92config PSP_APOB_DRAM_ADDRESS
93 hex
94 default 0x2001000
95 help
96 Location in DRAM where the PSP will copy the AGESA PSP Output
97 Block.
98
Kangheui Won66c5f252021-04-20 17:30:29 +100099config PSP_SHAREDMEM_BASE
100 hex
101 default 0x2011000 if VBOOT
102 default 0x0
103 help
104 This variable defines the base address in DRAM memory where PSP copies
105 the vboot workbuf. This is used in the linker script to have a static
106 allocation for the buffer as well as for adding relevant entries in
107 the BIOS directory table for the PSP.
108
109config PSP_SHAREDMEM_SIZE
110 hex
111 default 0x8000 if VBOOT
112 default 0x0
113 help
114 Sets the maximum size for the PSP to pass the vboot workbuf and
115 any logs or timestamps back to coreboot. This will be copied
116 into main memory by the PSP and will be available when the x86 is
117 started. The workbuf's base depends on the address of the reset
118 vector.
119
Felix Helddc2d3562020-12-02 14:38:53 +0100120config PRERAM_CBMEM_CONSOLE_SIZE
121 hex
122 default 0x1600
123 help
124 Increase this value if preram cbmem console is getting truncated
125
Kangheui Won4020aa72021-05-20 09:56:39 +1000126config CBFS_MCACHE_SIZE
127 hex
128 default 0x2000 if VBOOT_STARTS_BEFORE_BOOTBLOCK
129
Felix Helddc2d3562020-12-02 14:38:53 +0100130config C_ENV_BOOTBLOCK_SIZE
131 hex
132 default 0x10000
133 help
134 Sets the size of the bootblock stage that should be loaded in DRAM.
135 This variable controls the DRAM allocation size in linker script
136 for bootblock stage.
137
Felix Helddc2d3562020-12-02 14:38:53 +0100138config ROMSTAGE_ADDR
139 hex
140 default 0x2040000
141 help
142 Sets the address in DRAM where romstage should be loaded.
143
144config ROMSTAGE_SIZE
145 hex
146 default 0x80000
147 help
148 Sets the size of DRAM allocation for romstage in linker script.
149
150config FSP_M_ADDR
151 hex
152 default 0x20C0000
153 help
154 Sets the address in DRAM where FSP-M should be loaded. cbfstool
155 performs relocation of FSP-M to this address.
156
157config FSP_M_SIZE
158 hex
159 default 0x80000
160 help
161 Sets the size of DRAM allocation for FSP-M in linker script.
162
Felix Held8d0a6092021-01-14 01:40:50 +0100163config FSP_TEMP_RAM_SIZE
164 hex
165 default 0x40000
166 help
167 The amount of coreboot-allocated heap and stack usage by the FSP.
168
Raul E Rangel72616b32021-02-05 16:48:42 -0700169config VERSTAGE_ADDR
170 hex
171 depends on VBOOT_SEPARATE_VERSTAGE
172 default 0x2140000
173 help
174 Sets the address in DRAM where verstage should be loaded if running
175 as a separate stage on x86.
176
177config VERSTAGE_SIZE
178 hex
179 depends on VBOOT_SEPARATE_VERSTAGE
180 default 0x80000
181 help
182 Sets the size of DRAM allocation for verstage in linker script if
183 running as a separate stage on x86.
184
Felix Helddc2d3562020-12-02 14:38:53 +0100185config RAMBASE
186 hex
187 default 0x10000000
188
Raul E Rangel72616b32021-02-05 16:48:42 -0700189config RO_REGION_ONLY
190 string
191 depends on VBOOT_SLOTS_RW_AB || VBOOT_SLOTS_RW_A
192 default "apu/amdfw"
193
Felix Helddc2d3562020-12-02 14:38:53 +0100194config CPU_ADDR_BITS
195 int
196 default 48
197
198config MMCONF_BASE_ADDRESS
Felix Helddc2d3562020-12-02 14:38:53 +0100199 default 0xF8000000
200
201config MMCONF_BUS_NUMBER
Felix Helddc2d3562020-12-02 14:38:53 +0100202 default 64
203
Felix Held88615622021-01-19 23:51:45 +0100204config MAX_CPUS
205 int
206 default 16
Felix Heldb77387f2021-04-23 22:16:04 +0200207 help
208 Maximum number of threads the platform can have.
Felix Held88615622021-01-19 23:51:45 +0100209
Felix Held8a3d4d52021-01-13 03:06:21 +0100210config CONSOLE_UART_BASE_ADDRESS
211 depends on CONSOLE_SERIAL && AMD_SOC_CONSOLE_UART
212 hex
213 default 0xfedc9000 if UART_FOR_CONSOLE = 0
214 default 0xfedca000 if UART_FOR_CONSOLE = 1
215
Felix Heldee2a3652021-02-09 23:43:17 +0100216config SMM_TSEG_SIZE
217 hex
Felix Helde22eef72021-02-10 22:22:07 +0100218 default 0x800000 if HAVE_SMI_HANDLER
Felix Heldee2a3652021-02-09 23:43:17 +0100219 default 0x0
220
221config SMM_RESERVED_SIZE
222 hex
223 default 0x180000
224
225config SMM_MODULE_STACK_SIZE
226 hex
227 default 0x800
228
Felix Held90b07012021-04-15 20:23:56 +0200229config ACPI_BERT
230 bool "Build ACPI BERT Table"
231 default y
232 depends on HAVE_ACPI_TABLES
233 help
234 Report Machine Check errors identified in POST to the OS in an
235 ACPI Boot Error Record Table.
236
237config ACPI_BERT_SIZE
238 hex
239 default 0x4000 if ACPI_BERT
240 default 0x0
241 help
242 Specify the amount of DRAM reserved for gathering the data used to
243 generate the ACPI table.
244
Zheng Bao7b13e4e2021-03-16 16:13:56 +0800245config DRIVERS_I2C_DESIGNWARE_CLOCK_MHZ
246 int
247 default 150
248
Raul E Rangel95b3dc32021-03-24 16:53:37 -0600249config DISABLE_SPI_FLASH_ROM_SHARING
250 def_bool n
251 help
252 Instruct the chipset to not honor the EGPIO67_SPI_ROM_REQ pin
253 which indicates a board level ROM transaction request. This
254 removes arbitration with board and assumes the chipset controls
255 the SPI flash bus entirely.
256
Felix Held27b295b2021-03-25 01:20:41 +0100257config DISABLE_KEYBOARD_RESET_PIN
258 bool
259 help
260 Instruct the SoC to not use the state of GPIO_129 as keyboard reset
261 signal. When this pin is used as GPIO and the keyboard reset
262 functionality isn't disabled, configuring it as an output and driving
263 it as 0 will cause a reset.
264
Jason Glenesk79542fa2021-03-10 03:50:57 -0800265config ACPI_SSDT_PSD_INDEPENDENT
266 bool "Allow core p-state independent transitions"
267 default y
268 help
269 AMD recommends the ACPI _PSD object to be configured to cause
270 cores to transition between p-states independently. A vendor may
271 choose to generate _PSD object to allow cores to transition together.
272
Zheng Baof51738d2021-01-20 16:43:52 +0800273menu "PSP Configuration Options"
274
275config AMD_FWM_POSITION_INDEX
276 int "Firmware Directory Table location (0 to 5)"
277 range 0 5
278 default 0 if BOARD_ROMSIZE_KB_512
279 default 1 if BOARD_ROMSIZE_KB_1024
280 default 2 if BOARD_ROMSIZE_KB_2048
281 default 3 if BOARD_ROMSIZE_KB_4096
282 default 4 if BOARD_ROMSIZE_KB_8192
283 default 5 if BOARD_ROMSIZE_KB_16384
284 help
285 Typically this is calculated by the ROM size, but there may
286 be situations where you want to put the firmware directory
287 table in a different location.
288 0: 512 KB - 0xFFFA0000
289 1: 1 MB - 0xFFF20000
290 2: 2 MB - 0xFFE20000
291 3: 4 MB - 0xFFC20000
292 4: 8 MB - 0xFF820000
293 5: 16 MB - 0xFF020000
294
295comment "AMD Firmware Directory Table set to location for 512KB ROM"
296 depends on AMD_FWM_POSITION_INDEX = 0
297comment "AMD Firmware Directory Table set to location for 1MB ROM"
298 depends on AMD_FWM_POSITION_INDEX = 1
299comment "AMD Firmware Directory Table set to location for 2MB ROM"
300 depends on AMD_FWM_POSITION_INDEX = 2
301comment "AMD Firmware Directory Table set to location for 4MB ROM"
302 depends on AMD_FWM_POSITION_INDEX = 3
303comment "AMD Firmware Directory Table set to location for 8MB ROM"
304 depends on AMD_FWM_POSITION_INDEX = 4
305comment "AMD Firmware Directory Table set to location for 16MB ROM"
306 depends on AMD_FWM_POSITION_INDEX = 5
307
308config AMDFW_CONFIG_FILE
309 string
310 default "src/soc/amd/cezanne/fw.cfg"
311
Rob Barnese09b6812021-04-15 17:21:19 -0600312config PSP_DISABLE_POSTCODES
313 bool "Disable PSP post codes"
314 help
315 Disables the output of port80 post codes from PSP.
316
317config PSP_POSTCODES_ON_ESPI
318 bool "Use eSPI bus for PSP post codes"
319 default y
320 depends on !PSP_DISABLE_POSTCODES
321 help
322 Select to send PSP port80 post codes on eSPI bus.
323 If not selected, PSP port80 codes will be sent on LPC bus.
324
Zheng Baof51738d2021-01-20 16:43:52 +0800325config PSP_LOAD_MP2_FW
326 bool
327 default n
328 help
329 Include the MP2 firmwares and configuration into the PSP build.
330
331 If unsure, answer 'n'
332
Zheng Baof51738d2021-01-20 16:43:52 +0800333config PSP_UNLOCK_SECURE_DEBUG
334 bool "Unlock secure debug"
335 default y
336 help
337 Select this item to enable secure debug options in PSP.
338
Raul E Rangel97b8b172021-02-24 16:59:32 -0700339config HAVE_PSP_WHITELIST_FILE
340 bool "Include a debug whitelist file in PSP build"
341 default n
342 help
343 Support secured unlock prior to reset using a whitelisted
344 serial number. This feature requires a signed whitelist image
345 and bootloader from AMD.
346
347 If unsure, answer 'n'
348
349config PSP_WHITELIST_FILE
350 string "Debug whitelist file path"
351 depends on HAVE_PSP_WHITELIST_FILE
352 default "3rdparty/amd_blobs/cezanne/PSP/wtl-czn.sbin"
353
Martin Rothfdad5ad2021-04-16 11:36:01 -0600354config PSP_SOFTFUSE_BITS
355 string "PSP Soft Fuse bits to enable"
356 default "28 6"
357 help
358 Space separated list of Soft Fuse bits to enable.
359 Bit 0: Enable secure debug (Set by PSP_UNLOCK_SECURE_DEBUG)
360 Bit 7: Disable PSP postcodes on Renoir and newer chips only
361 (Set by PSP_DISABLE_PORT80)
362 Bit 15: PSP post code destination: 0=LPC 1=eSPI
363 (Set by PSP_INITIALIZE_ESPI)
364 Bit 29: Disable MP2 firmware loading (Set by PSP_LOAD_MP2_FW)
365
366 See #55758 (NDA) for additional bit definitions.
367
Kangheui Won66c5f252021-04-20 17:30:29 +1000368config PSP_VERSTAGE_FILE
369 string "Specify the PSP_verstage file path"
370 depends on VBOOT_STARTS_BEFORE_BOOTBLOCK
371 default "$(obj)/psp_verstage.bin"
372 help
373 Add psp_verstage file to the build & PSP Directory Table
374
375config PSP_VERSTAGE_SIGNING_TOKEN
376 string "Specify the PSP_verstage Signature Token file path"
377 depends on VBOOT_STARTS_BEFORE_BOOTBLOCK
378 default ""
379 help
380 Add psp_verstage signature token to the build & PSP Directory Table
381
Zheng Baof51738d2021-01-20 16:43:52 +0800382endmenu
383
Raul E Rangel06d1e4d2021-04-09 14:42:06 -0600384config VBOOT
385 select VBOOT_VBNV_CMOS
386 select VBOOT_VBNV_CMOS_BACKUP_TO_FLASH
387
Kangheui Won66c5f252021-04-20 17:30:29 +1000388config VBOOT_STARTS_BEFORE_BOOTBLOCK
389 def_bool n
390 depends on VBOOT
391 select ARCH_VERSTAGE_ARMV7
392 help
393 Runs verstage on the PSP. Only available on
394 certain Chrome OS branded parts from AMD.
395
396config VBOOT_HASH_BLOCK_SIZE
397 hex
398 default 0x9000
399 depends on VBOOT_STARTS_BEFORE_BOOTBLOCK
400 help
401 Because the bulk of the time in psp_verstage to hash the RO cbfs is
402 spent in the overhead of doing svc calls, increasing the hash block
403 size significantly cuts the verstage hashing time as seen below.
404
405 4k takes 180ms
406 16k takes 44ms
407 32k takes 33.7ms
408 36k takes 32.5ms
409 There's actually still room for an even bigger stack, but we've
410 reached a point of diminishing returns.
411
412config CMOS_RECOVERY_BYTE
413 hex
414 default 0x51
415 depends on VBOOT_STARTS_BEFORE_BOOTBLOCK
416 help
417 If the workbuf is not passed from the PSP to coreboot, set the
418 recovery flag and reboot. The PSP will read this byte, mark the
419 recovery request in VBNV, and reset the system into recovery mode.
420
421 This is the byte before the default first byte used by VBNV
422 (0x26 + 0x0E - 1)
423
Kangheui Won1b2eeb12021-05-06 13:09:12 +1000424if VBOOT_SLOTS_RW_AB && VBOOT_STARTS_BEFORE_BOOTBLOCK
425
426config RWA_REGION_ONLY
427 string
428 default "apu/amdfw_a"
429 help
430 Add a space-delimited list of filenames that should only be in the
431 RW-A section.
432
433config RWB_REGION_ONLY
434 string
435 default "apu/amdfw_b"
436 help
437 Add a space-delimited list of filenames that should only be in the
438 RW-B section.
439
440endif # VBOOT_SLOTS_RW_AB && VBOOT_STARTS_BEFORE_BOOTBLOCK
441
Felix Helddc2d3562020-12-02 14:38:53 +0100442endif # SOC_AMD_CEZANNE