blob: ed2b9794c6ce69e67b25e8cf3b91511aa2f8b012 [file] [log] [blame]
Stefan Reinauer8e073822012-04-04 00:07:22 +02001##
2## This file is part of the coreboot project.
3##
4## Copyright (C) 2011 Google Inc.
5##
6## This program is free software; you can redistribute it and/or modify
7## it under the terms of the GNU General Public License as published by
8## the Free Software Foundation; version 2 of the License.
9##
10## This program is distributed in the hope that it will be useful,
11## but WITHOUT ANY WARRANTY; without even the implied warranty of
12## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13## GNU General Public License for more details.
14##
Stefan Reinauer8e073822012-04-04 00:07:22 +020015
16config SOUTHBRIDGE_INTEL_BD82X6X
17 bool
18
19config SOUTHBRIDGE_INTEL_C216
20 bool
21
22if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216
23
24config SOUTH_BRIDGE_OPTIONS # dummy
25 def_bool y
Aaron Durbin340898f2016-07-13 23:22:28 -050026 select ACPI_INTEL_HARDWARE_SLEEP_VALUES
Kyösti Mälkki71216c92013-07-28 23:39:37 +030027 select SOUTHBRIDGE_INTEL_COMMON
Tobias Diedrich7f5efd92017-12-14 00:29:01 +010028 select SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
Arthur Heymans16fe7902017-04-12 17:01:31 +020029 select SOUTHBRIDGE_INTEL_COMMON_SMBUS
Arthur Heymansbddef0d2017-09-25 12:21:07 +020030 select SOUTHBRIDGE_INTEL_COMMON_SPI
Stefan Reinauer8e073822012-04-04 00:07:22 +020031 select IOAPIC
32 select HAVE_HARD_RESET
Kyösti Mälkki545b30d2013-06-13 13:51:14 +030033 select HAVE_USBDEBUG_OPTIONS
Stefan Reinauer431a8162012-11-13 13:01:31 -080034 select HAVE_SMI_HANDLER
Stefan Reinauer8e073822012-04-04 00:07:22 +020035 select USE_WATCHDOG_ON_BOOT
36 select PCIEXP_ASPM
37 select PCIEXP_COMMON_CLOCK
Vladimir Serbinenko5b044ae2014-10-25 15:20:55 +020038 select COMMON_FADT
Alexander Couzens7bf47ee2015-04-16 02:00:21 +020039 select ACPI_SATA_GENERATOR
Martin Roth3fda3c22015-07-09 21:02:26 -060040 select HAVE_INTEL_FIRMWARE
Patrick Rudolphe8e66f42016-02-06 17:42:42 +010041 select SOUTHBRIDGE_INTEL_COMMON_GPIO
Aaron Durbin16246ea2016-08-05 21:23:37 -050042 select RTC
Bill XIEd533b162017-08-22 16:26:22 +080043 select HAVE_INTEL_CHIPSET_LOCKDOWN
Stefan Reinauer8e073822012-04-04 00:07:22 +020044
45config EHCI_BAR
46 hex
47 default 0xfef00000
48
Vladimir Serbinenko6a7aeb32014-01-05 11:37:32 +010049config DRAM_RESET_GATE_GPIO
50 int
51 default 60
52
Stefan Reinauer8e073822012-04-04 00:07:22 +020053config BOOTBLOCK_SOUTHBRIDGE_INIT
54 string
55 default "southbridge/intel/bd82x6x/bootblock.c"
56
57config SERIRQ_CONTINUOUS_MODE
58 bool
59 default n
60 help
61 If you set this option to y, the serial IRQ machine will be
62 operated in continuous mode.
63
Patrick Georgi9aeb6942012-10-05 21:54:38 +020064config HPET_MIN_TICKS
65 hex
66 default 0x80
67
Nico Hubera15cd662013-06-19 16:16:05 +020068config HAVE_IFD_BIN
Martin Roth3fda3c22015-07-09 21:02:26 -060069 def_bool y
Nico Hubera15cd662013-06-19 16:16:05 +020070
71config BUILD_WITH_FAKE_IFD
Martin Roth3fda3c22015-07-09 21:02:26 -060072 def_bool !HAVE_IFD_BIN
Stefan Reinauer7004b7c2012-10-31 17:30:13 -070073
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020074endif
75
76if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216 || SOUTHBRIDGE_INTEL_IBEXPEAK
77
78choice
Nico Huber2ac149d2017-09-01 23:28:14 +020079 prompt "Flash locking during chipset lockdown"
80 default LOCK_SPI_FLASH_NONE
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020081
Nico Huber2ac149d2017-09-01 23:28:14 +020082config LOCK_SPI_FLASH_NONE
83 bool "Don't lock flash sections"
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020084
Nico Huber2ac149d2017-09-01 23:28:14 +020085config LOCK_SPI_FLASH_RO
86 bool "Write-protect all flash sections"
Nico Huberd1fb5642013-07-01 16:02:36 +020087 help
Nico Huber2ac149d2017-09-01 23:28:14 +020088 Select this if you want to write-protect the whole firmware flash
89 chip. The locking will take place during the chipset lockdown, which
90 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
91 or has to be triggered later (e.g. by the payload or the OS).
Nico Huberd1fb5642013-07-01 16:02:36 +020092
Nico Huber2ac149d2017-09-01 23:28:14 +020093 NOTE: If you trigger the chipset lockdown unconditionally,
94 you won't be able to write to the flash chip using the
95 internal programmer any more.
96
97config LOCK_SPI_FLASH_NO_ACCESS
98 bool "Write-protect all flash sections and read-protect non-BIOS sections"
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020099 help
Nico Huber2ac149d2017-09-01 23:28:14 +0200100 Select this if you want to protect the firmware flash against all
101 further accesses (with the exception of the memory mapped BIOS re-
102 gion which is always readable). The locking will take place during
103 the chipset lockdown, which is either triggered by coreboot (when
104 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
105 by the payload or the OS).
106
107 NOTE: If you trigger the chipset lockdown unconditionally,
108 you won't be able to write to the flash chip using the
109 internal programmer any more.
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +0200110
111endchoice
112
Stefan Reinauer8e073822012-04-04 00:07:22 +0200113endif