Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 1 | # SPDX-License-Identifier: GPL-2.0-only |
| 2 | |
| 3 | # TODO: Evaluate what can be moved to a common directory |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 4 | # TODO: Update for Phoenix |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 5 | |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 6 | config SOC_AMD_PHOENIX |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 7 | bool |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 8 | select ACPI_SOC_NVS |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 9 | select ARCH_X86 |
| 10 | select BOOT_DEVICE_SUPPORTS_WRITES if BOOT_DEVICE_SPI_FLASH |
Fred Reitberger | 097f540 | 2023-02-24 13:27:13 -0500 | [diff] [blame] | 11 | select CACHE_MRC_SETTINGS |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 12 | select DRIVERS_USB_ACPI |
| 13 | select DRIVERS_USB_PCI_XHCI |
| 14 | select FSP_COMPRESS_FSP_M_LZMA if !ASYNC_FILE_LOADING |
| 15 | select FSP_COMPRESS_FSP_M_LZ4 if ASYNC_FILE_LOADING |
| 16 | select FSP_COMPRESS_FSP_S_LZ4 |
| 17 | select GENERIC_GPIO_LIB |
| 18 | select HAVE_ACPI_TABLES |
| 19 | select HAVE_CF9_RESET |
| 20 | select HAVE_EM100_SUPPORT |
| 21 | select HAVE_FSP_GOP |
| 22 | select HAVE_SMI_HANDLER |
| 23 | select IDT_IN_EVERY_STAGE |
| 24 | select PARALLEL_MP_AP_WORK |
| 25 | select PLATFORM_USES_FSP2_0 |
| 26 | select PROVIDES_ROM_SHARING |
| 27 | select PSP_SUPPORTS_EFS2_RELATIVE_ADDR if VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 28 | select PSP_VERSTAGE_CCP_DMA if VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 29 | select RESET_VECTOR_IN_RAM |
| 30 | select RTC |
| 31 | select SOC_AMD_COMMON |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 32 | select SOC_AMD_COMMON_BLOCK_ACP_GEN2 |
Martin Roth | 9c64c08 | 2022-10-18 17:54:52 -0600 | [diff] [blame] | 33 | select SOC_AMD_COMMON_BLOCK_ACPI # TODO: Check if this is still correct |
| 34 | select SOC_AMD_COMMON_BLOCK_ACPIMMIO # TODO: Check if this is still correct |
| 35 | select SOC_AMD_COMMON_BLOCK_ACPI_ALIB # TODO: Check if this is still correct |
Fred Reitberger | 559f3d4 | 2023-06-29 15:13:49 -0400 | [diff] [blame] | 36 | select SOC_AMD_COMMON_BLOCK_ACPI_CPPC |
Felix Held | 8ec90ac | 2023-03-07 00:31:41 +0100 | [diff] [blame] | 37 | select SOC_AMD_COMMON_BLOCK_ACPI_CPU_POWER_STATE |
Martin Roth | 9c64c08 | 2022-10-18 17:54:52 -0600 | [diff] [blame] | 38 | select SOC_AMD_COMMON_BLOCK_ACPI_GPIO # TODO: Check if this is still correct |
| 39 | select SOC_AMD_COMMON_BLOCK_ACPI_IVRS # TODO: Check if this is still correct |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 40 | select SOC_AMD_COMMON_BLOCK_AOAC |
Fred Reitberger | c53ab57 | 2023-07-17 08:31:45 -0400 | [diff] [blame] | 41 | select SOC_AMD_COMMON_BLOCK_APOB |
| 42 | select SOC_AMD_COMMON_BLOCK_APOB_HASH |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 43 | select SOC_AMD_COMMON_BLOCK_BANKED_GPIOS |
Felix Held | a63f859 | 2023-03-24 16:30:55 +0100 | [diff] [blame] | 44 | select SOC_AMD_COMMON_BLOCK_CPUFREQ_FAM17H_19H |
Fred Reitberger | 2890841 | 2022-11-01 10:49:16 -0400 | [diff] [blame] | 45 | select SOC_AMD_COMMON_BLOCK_DATA_FABRIC |
Felix Held | 268dadb | 2023-05-31 16:23:38 +0200 | [diff] [blame] | 46 | select SOC_AMD_COMMON_BLOCK_DATA_FABRIC_DOMAIN |
Fred Reitberger | 267edec | 2022-12-13 12:56:09 -0500 | [diff] [blame] | 47 | select SOC_AMD_COMMON_BLOCK_ESPI_EXTENDED_DECODE_RANGES |
Martin Roth | 9c64c08 | 2022-10-18 17:54:52 -0600 | [diff] [blame] | 48 | select SOC_AMD_COMMON_BLOCK_GRAPHICS # TODO: Check if this is still correct |
Fred Reitberger | 267edec | 2022-12-13 12:56:09 -0500 | [diff] [blame] | 49 | select SOC_AMD_COMMON_BLOCK_HAS_ESPI |
| 50 | select SOC_AMD_COMMON_BLOCK_HAS_ESPI_ALERT_ENABLE |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 51 | select SOC_AMD_COMMON_BLOCK_I2C |
| 52 | select SOC_AMD_COMMON_BLOCK_I23C_PAD_CTRL |
| 53 | select SOC_AMD_COMMON_BLOCK_IOMMU |
Fred Reitberger | 267edec | 2022-12-13 12:56:09 -0500 | [diff] [blame] | 54 | select SOC_AMD_COMMON_BLOCK_LPC |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 55 | select SOC_AMD_COMMON_BLOCK_MCAX |
| 56 | select SOC_AMD_COMMON_BLOCK_NONCAR |
Fred Reitberger | a6514e2 | 2022-12-07 08:39:55 -0500 | [diff] [blame] | 57 | select SOC_AMD_COMMON_BLOCK_PCI |
| 58 | select SOC_AMD_COMMON_BLOCK_PCI_MMCONF |
| 59 | select SOC_AMD_COMMON_BLOCK_PCIE_GPP_DRIVER |
| 60 | select SOC_AMD_COMMON_BLOCK_PCIE_CLK_REQ |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 61 | select SOC_AMD_COMMON_BLOCK_PM |
| 62 | select SOC_AMD_COMMON_BLOCK_PM_CHIPSET_STATE_SAVE |
Martin Roth | 9c64c08 | 2022-10-18 17:54:52 -0600 | [diff] [blame] | 63 | select SOC_AMD_COMMON_BLOCK_PSP_GEN2 # TODO: Check if this is still correct |
Martin Roth | 10c43a2 | 2023-02-02 17:21:37 -0700 | [diff] [blame] | 64 | select SOC_AMD_COMMON_BLOCK_RESET |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 65 | select SOC_AMD_COMMON_BLOCK_SMBUS |
| 66 | select SOC_AMD_COMMON_BLOCK_SMI |
Fred Reitberger | 267edec | 2022-12-13 12:56:09 -0500 | [diff] [blame] | 67 | select SOC_AMD_COMMON_BLOCK_SMM |
| 68 | select SOC_AMD_COMMON_BLOCK_SMU |
Felix Held | 65d822e | 2023-01-12 23:11:42 +0100 | [diff] [blame] | 69 | select SOC_AMD_COMMON_BLOCK_SMU_SX_ENTRY |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 70 | select SOC_AMD_COMMON_BLOCK_SPI |
Felix Held | 23a398e | 2023-03-23 23:44:03 +0100 | [diff] [blame] | 71 | select SOC_AMD_COMMON_BLOCK_SVI3 |
Felix Held | 60df7ca | 2023-03-24 20:33:15 +0100 | [diff] [blame] | 72 | select SOC_AMD_COMMON_BLOCK_TSC |
Fred Reitberger | 2dceb12 | 2022-11-04 14:37:34 -0400 | [diff] [blame] | 73 | select SOC_AMD_COMMON_BLOCK_UART |
| 74 | select SOC_AMD_COMMON_BLOCK_UCODE |
Jon Murphy | df2edde | 2023-04-06 17:15:14 -0600 | [diff] [blame] | 75 | select SOC_AMD_COMMON_BLOCK_XHCI |
Fred Reitberger | 559f3d4 | 2023-06-29 15:13:49 -0400 | [diff] [blame] | 76 | select SOC_AMD_COMMON_FSP_CCX_CPPC_HOB |
Konrad Adamczyk | ff786b5 | 2023-06-27 13:18:30 +0000 | [diff] [blame] | 77 | select SOC_AMD_COMMON_FSP_DMI_TABLES |
Martin Roth | 9c64c08 | 2022-10-18 17:54:52 -0600 | [diff] [blame] | 78 | select SOC_AMD_COMMON_FSP_PCI # TODO: Check if this is still correct |
Fred Reitberger | 010c408 | 2023-01-11 15:11:48 -0500 | [diff] [blame] | 79 | select SOC_AMD_COMMON_FSP_PRELOAD_FSPS |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 80 | select SSE2 |
| 81 | select UDK_2017_BINDING |
Martin Roth | bcb610a | 2022-10-29 13:31:54 -0600 | [diff] [blame] | 82 | select USE_DDR5 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 83 | select USE_FSP_NOTIFY_PHASE_POST_PCI_ENUM |
| 84 | select USE_FSP_NOTIFY_PHASE_READY_TO_BOOT |
| 85 | select USE_FSP_NOTIFY_PHASE_END_OF_FIRMWARE |
| 86 | select VBOOT_DEFINE_WIDEVINE_COUNTERS if VBOOT_STARTS_BEFORE_BOOTBLOCK |
Fred Reitberger | 5b9957b | 2023-06-29 15:15:26 -0400 | [diff] [blame] | 87 | select VBOOT_X86_SHA256_ACCELERATION if VBOOT |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 88 | select X86_AMD_FIXED_MTRRS |
| 89 | select X86_INIT_NEED_1_SIPI |
Elyes Haouas | 3cd06cc | 2023-01-05 07:42:24 +0100 | [diff] [blame] | 90 | help |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 91 | AMD Phoenix support |
Elyes Haouas | 3cd06cc | 2023-01-05 07:42:24 +0100 | [diff] [blame] | 92 | |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 93 | if SOC_AMD_PHOENIX |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 94 | |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 95 | config CHIPSET_DEVICETREE |
| 96 | string |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 97 | default "soc/amd/phoenix/chipset.cb" |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 98 | |
| 99 | config EARLY_RESERVED_DRAM_BASE |
| 100 | hex |
| 101 | default 0x2000000 |
| 102 | help |
| 103 | This variable defines the base address of the DRAM which is reserved |
| 104 | for usage by coreboot in early stages (i.e. before ramstage is up). |
| 105 | This memory gets reserved in BIOS tables to ensure that the OS does |
| 106 | not use it, thus preventing corruption of OS memory in case of S3 |
| 107 | resume. |
| 108 | |
| 109 | config EARLYRAM_BSP_STACK_SIZE |
| 110 | hex |
| 111 | default 0x1000 |
| 112 | |
| 113 | config PSP_APOB_DRAM_ADDRESS |
| 114 | hex |
| 115 | default 0x2001000 |
| 116 | help |
| 117 | Location in DRAM where the PSP will copy the AGESA PSP Output |
| 118 | Block. |
| 119 | |
| 120 | config PSP_APOB_DRAM_SIZE |
| 121 | hex |
Fred Reitberger | 4064677 | 2023-02-08 13:05:05 -0500 | [diff] [blame] | 122 | default 0x40000 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 123 | |
| 124 | config PSP_SHAREDMEM_BASE |
| 125 | hex |
Fred Reitberger | 4064677 | 2023-02-08 13:05:05 -0500 | [diff] [blame] | 126 | default 0x2041000 if VBOOT |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 127 | default 0x0 |
| 128 | help |
| 129 | This variable defines the base address in DRAM memory where PSP copies |
| 130 | the vboot workbuf. This is used in the linker script to have a static |
| 131 | allocation for the buffer as well as for adding relevant entries in |
| 132 | the BIOS directory table for the PSP. |
| 133 | |
| 134 | config PSP_SHAREDMEM_SIZE |
| 135 | hex |
| 136 | default 0x8000 if VBOOT |
| 137 | default 0x0 |
| 138 | help |
| 139 | Sets the maximum size for the PSP to pass the vboot workbuf and |
| 140 | any logs or timestamps back to coreboot. This will be copied |
| 141 | into main memory by the PSP and will be available when the x86 is |
| 142 | started. The workbuf's base depends on the address of the reset |
| 143 | vector. |
| 144 | |
| 145 | config PRE_X86_CBMEM_CONSOLE_SIZE |
| 146 | hex |
| 147 | default 0x1600 |
| 148 | help |
| 149 | Size of the CBMEM console used in PSP verstage. |
| 150 | |
| 151 | config PRERAM_CBMEM_CONSOLE_SIZE |
| 152 | hex |
| 153 | default 0x1600 |
| 154 | help |
| 155 | Increase this value if preram cbmem console is getting truncated |
| 156 | |
| 157 | config CBFS_MCACHE_SIZE |
| 158 | hex |
| 159 | default 0x2000 if VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 160 | |
| 161 | config C_ENV_BOOTBLOCK_SIZE |
| 162 | hex |
| 163 | default 0x10000 |
| 164 | help |
| 165 | Sets the size of the bootblock stage that should be loaded in DRAM. |
| 166 | This variable controls the DRAM allocation size in linker script |
| 167 | for bootblock stage. |
| 168 | |
| 169 | config ROMSTAGE_ADDR |
| 170 | hex |
Fred Reitberger | 4064677 | 2023-02-08 13:05:05 -0500 | [diff] [blame] | 171 | default 0x2060000 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 172 | help |
| 173 | Sets the address in DRAM where romstage should be loaded. |
| 174 | |
| 175 | config ROMSTAGE_SIZE |
| 176 | hex |
| 177 | default 0x80000 |
| 178 | help |
| 179 | Sets the size of DRAM allocation for romstage in linker script. |
| 180 | |
| 181 | config FSP_M_ADDR |
| 182 | hex |
Fred Reitberger | 4064677 | 2023-02-08 13:05:05 -0500 | [diff] [blame] | 183 | default 0x20E0000 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 184 | help |
| 185 | Sets the address in DRAM where FSP-M should be loaded. cbfstool |
| 186 | performs relocation of FSP-M to this address. |
| 187 | |
| 188 | config FSP_M_SIZE |
| 189 | hex |
| 190 | default 0xC0000 |
| 191 | help |
| 192 | Sets the size of DRAM allocation for FSP-M in linker script. |
| 193 | |
| 194 | config FSP_TEMP_RAM_SIZE |
| 195 | hex |
| 196 | default 0x40000 |
| 197 | help |
| 198 | The amount of coreboot-allocated heap and stack usage by the FSP. |
| 199 | |
| 200 | config VERSTAGE_ADDR |
| 201 | hex |
| 202 | depends on VBOOT_SEPARATE_VERSTAGE |
Fred Reitberger | 4064677 | 2023-02-08 13:05:05 -0500 | [diff] [blame] | 203 | default 0x21A0000 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 204 | help |
| 205 | Sets the address in DRAM where verstage should be loaded if running |
| 206 | as a separate stage on x86. |
| 207 | |
| 208 | config VERSTAGE_SIZE |
| 209 | hex |
| 210 | depends on VBOOT_SEPARATE_VERSTAGE |
| 211 | default 0x80000 |
| 212 | help |
| 213 | Sets the size of DRAM allocation for verstage in linker script if |
| 214 | running as a separate stage on x86. |
| 215 | |
| 216 | config ASYNC_FILE_LOADING |
| 217 | bool "Loads files from SPI asynchronously" |
| 218 | select COOP_MULTITASKING |
| 219 | select SOC_AMD_COMMON_BLOCK_LPC_SPI_DMA |
| 220 | select CBFS_PRELOAD |
| 221 | help |
| 222 | When enabled, the platform will use the LPC SPI DMA controller to |
| 223 | asynchronously load contents from the SPI ROM. This will improve |
| 224 | boot time because the CPUs can be performing useful work while the |
| 225 | SPI contents are being preloaded. |
| 226 | |
| 227 | config CBFS_CACHE_SIZE |
| 228 | hex |
| 229 | default 0x40000 if CBFS_PRELOAD |
| 230 | |
| 231 | config RO_REGION_ONLY |
| 232 | string |
| 233 | depends on VBOOT_SLOTS_RW_AB || VBOOT_SLOTS_RW_A |
| 234 | default "apu/amdfw" |
| 235 | |
| 236 | config ECAM_MMCONF_BASE_ADDRESS |
Ritul Guru | 75a073d | 2023-01-12 17:42:54 +0530 | [diff] [blame] | 237 | default 0xE0000000 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 238 | |
| 239 | config ECAM_MMCONF_BUS_NUMBER |
Ritul Guru | 75a073d | 2023-01-12 17:42:54 +0530 | [diff] [blame] | 240 | default 256 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 241 | |
| 242 | config MAX_CPUS |
| 243 | int |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 244 | default 16 |
| 245 | help |
| 246 | Maximum number of threads the platform can have. |
| 247 | |
Martin Roth | ab05964 | 2023-05-01 14:00:40 -0600 | [diff] [blame] | 248 | config VGA_BIOS_ID |
| 249 | string |
Felix Held | bc069ea | 2023-05-26 18:23:43 +0200 | [diff] [blame] | 250 | default "1002,15bf" |
Martin Roth | ab05964 | 2023-05-01 14:00:40 -0600 | [diff] [blame] | 251 | help |
| 252 | The default VGA BIOS PCI vendor/device ID should be set to the |
| 253 | result of the map_oprom_vendev() function in graphics.c. |
| 254 | |
Felix Held | d4440dd | 2023-05-26 18:25:33 +0200 | [diff] [blame] | 255 | # TODO: add VGA_BIOS_FILE default once the correct VBIOS binaries are available in amd_blobs |
Martin Roth | ab05964 | 2023-05-01 14:00:40 -0600 | [diff] [blame] | 256 | |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 257 | config CONSOLE_UART_BASE_ADDRESS |
| 258 | depends on CONSOLE_SERIAL && AMD_SOC_CONSOLE_UART |
| 259 | hex |
| 260 | default 0xfedc9000 if UART_FOR_CONSOLE = 0 |
| 261 | default 0xfedca000 if UART_FOR_CONSOLE = 1 |
| 262 | default 0xfedce000 if UART_FOR_CONSOLE = 2 |
| 263 | default 0xfedcf000 if UART_FOR_CONSOLE = 3 |
| 264 | default 0xfedd1000 if UART_FOR_CONSOLE = 4 |
| 265 | |
| 266 | config SMM_TSEG_SIZE |
| 267 | hex |
| 268 | default 0x800000 if HAVE_SMI_HANDLER |
| 269 | default 0x0 |
| 270 | |
| 271 | config SMM_RESERVED_SIZE |
| 272 | hex |
| 273 | default 0x180000 |
| 274 | |
| 275 | config SMM_MODULE_STACK_SIZE |
| 276 | hex |
| 277 | default 0x800 |
| 278 | |
| 279 | config ACPI_BERT |
| 280 | bool "Build ACPI BERT Table" |
| 281 | default y |
| 282 | depends on HAVE_ACPI_TABLES |
| 283 | help |
| 284 | Report Machine Check errors identified in POST to the OS in an |
| 285 | ACPI Boot Error Record Table. |
| 286 | |
| 287 | config ACPI_BERT_SIZE |
| 288 | hex |
| 289 | default 0x4000 if ACPI_BERT |
| 290 | default 0x0 |
| 291 | help |
| 292 | Specify the amount of DRAM reserved for gathering the data used to |
| 293 | generate the ACPI table. |
| 294 | |
| 295 | config DRIVERS_I2C_DESIGNWARE_CLOCK_MHZ |
| 296 | int |
| 297 | default 150 |
| 298 | |
| 299 | config DISABLE_SPI_FLASH_ROM_SHARING |
| 300 | def_bool n |
| 301 | help |
| 302 | Instruct the chipset to not honor the EGPIO67_SPI_ROM_REQ pin |
| 303 | which indicates a board level ROM transaction request. This |
| 304 | removes arbitration with board and assumes the chipset controls |
| 305 | the SPI flash bus entirely. |
| 306 | |
| 307 | config DISABLE_KEYBOARD_RESET_PIN |
| 308 | bool |
| 309 | help |
Martin Roth | 9ceac74 | 2023-02-08 14:26:02 -0700 | [diff] [blame] | 310 | Instruct the SoC to not to reset based on the state of GPIO_21, KBDRST_L. |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 311 | |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 312 | menu "PSP Configuration Options" |
| 313 | |
| 314 | config AMD_FWM_POSITION_INDEX |
Fred Reitberger | f14d208 | 2023-04-06 10:55:26 -0400 | [diff] [blame] | 315 | int |
| 316 | default 5 |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 317 | |
| 318 | comment "AMD Firmware Directory Table set to location for 512KB ROM" |
| 319 | depends on AMD_FWM_POSITION_INDEX = 0 |
| 320 | comment "AMD Firmware Directory Table set to location for 1MB ROM" |
| 321 | depends on AMD_FWM_POSITION_INDEX = 1 |
| 322 | comment "AMD Firmware Directory Table set to location for 2MB ROM" |
| 323 | depends on AMD_FWM_POSITION_INDEX = 2 |
| 324 | comment "AMD Firmware Directory Table set to location for 4MB ROM" |
| 325 | depends on AMD_FWM_POSITION_INDEX = 3 |
| 326 | comment "AMD Firmware Directory Table set to location for 8MB ROM" |
| 327 | depends on AMD_FWM_POSITION_INDEX = 4 |
| 328 | comment "AMD Firmware Directory Table set to location for 16MB ROM" |
| 329 | depends on AMD_FWM_POSITION_INDEX = 5 |
| 330 | |
| 331 | config AMDFW_CONFIG_FILE |
| 332 | string "AMD PSP Firmware config file" |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 333 | default "src/soc/amd/phoenix/fw.cfg" |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 334 | help |
| 335 | Specify the path/location of AMD PSP Firmware config file. |
| 336 | |
| 337 | config PSP_DISABLE_POSTCODES |
| 338 | bool "Disable PSP post codes" |
| 339 | help |
| 340 | Disables the output of port80 post codes from PSP. |
| 341 | |
| 342 | config PSP_POSTCODES_ON_ESPI |
| 343 | bool "Use eSPI bus for PSP post codes" |
| 344 | default y |
| 345 | depends on !PSP_DISABLE_POSTCODES |
| 346 | help |
| 347 | Select to send PSP port80 post codes on eSPI bus. |
| 348 | If not selected, PSP port80 codes will be sent on LPC bus. |
| 349 | |
| 350 | config PSP_LOAD_MP2_FW |
| 351 | bool |
| 352 | default n |
| 353 | help |
| 354 | Include the MP2 firmwares and configuration into the PSP build. |
| 355 | |
| 356 | If unsure, answer 'n' |
| 357 | |
| 358 | config PSP_UNLOCK_SECURE_DEBUG |
| 359 | bool "Unlock secure debug" |
| 360 | default y |
| 361 | help |
| 362 | Select this item to enable secure debug options in PSP. |
| 363 | |
| 364 | config HAVE_PSP_WHITELIST_FILE |
| 365 | bool "Include a debug whitelist file in PSP build" |
| 366 | default n |
| 367 | help |
| 368 | Support secured unlock prior to reset using a whitelisted |
| 369 | serial number. This feature requires a signed whitelist image |
| 370 | and bootloader from AMD. |
| 371 | |
| 372 | If unsure, answer 'n' |
| 373 | |
| 374 | config PSP_WHITELIST_FILE |
| 375 | string "Debug whitelist file path" |
| 376 | depends on HAVE_PSP_WHITELIST_FILE |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 377 | default "site-local/3rdparty/amd_blobs/phoenix/PSP/wtl-phx.sbin" |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 378 | |
| 379 | config HAVE_SPL_FILE |
| 380 | bool "Have a mainboard specific SPL table file" |
| 381 | default n |
| 382 | help |
| 383 | Have a mainboard specific Security Patch Level (SPL) table file. SPL file |
| 384 | is required to support PSP FW anti-rollback and needs to be created by AMD. |
| 385 | The default SPL file applies to all boards that use the concerned SoC and |
| 386 | is dropped under 3rdparty/blobs. The mainboard specific SPL file override |
| 387 | can be applied through SPL_TABLE_FILE config. |
| 388 | |
| 389 | If unsure, answer 'n' |
| 390 | |
| 391 | config SPL_TABLE_FILE |
| 392 | string "SPL table file" |
| 393 | depends on HAVE_SPL_FILE |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 394 | default "3rdparty/blobs/mainboard/\$(CONFIG_MAINBOARD_DIR)/TypeId0x55_SplTableBl_PHX.sbin" |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 395 | |
| 396 | config HAVE_SPL_RW_AB_FILE |
| 397 | bool "Have a separate mainboard-specific SPL file in RW A/B partitions" |
| 398 | default n |
| 399 | depends on HAVE_SPL_FILE |
| 400 | depends on VBOOT_SLOTS_RW_AB |
| 401 | help |
| 402 | Have separate mainboard-specific Security Patch Level (SPL) table |
| 403 | file for the RW A/B FMAP partitions. See the help text of |
| 404 | HAVE_SPL_FILE for a more detailed description. |
| 405 | |
| 406 | config SPL_RW_AB_TABLE_FILE |
| 407 | string "Separate SPL table file for RW A/B partitions" |
| 408 | depends on HAVE_SPL_RW_AB_FILE |
Martin Roth | 20646cd | 2023-01-04 21:27:06 -0700 | [diff] [blame] | 409 | default "3rdparty/blobs/mainboard/\$(CONFIG_MAINBOARD_DIR)/TypeId0x55_SplTableBl_PHX.sbin" |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 410 | |
| 411 | config PSP_SOFTFUSE_BITS |
| 412 | string "PSP Soft Fuse bits to enable" |
Fred Reitberger | 5c1c7b6 | 2023-05-12 12:53:52 -0400 | [diff] [blame] | 413 | default "36 28 6" |
Martin Roth | 1a3de8e | 2022-10-06 15:57:21 -0600 | [diff] [blame] | 414 | help |
| 415 | Space separated list of Soft Fuse bits to enable. |
| 416 | Bit 0: Enable secure debug (Set by PSP_UNLOCK_SECURE_DEBUG) |
| 417 | Bit 7: Disable PSP postcodes on Renoir and newer chips only |
| 418 | (Set by PSP_DISABLE_PORT80) |
| 419 | Bit 15: PSP debug output destination: |
| 420 | 0=SoC MMIO UART, 1=IO port 0x3F8 |
| 421 | Bit 29: Disable MP2 firmware loading (Set by PSP_LOAD_MP2_FW) |
| 422 | |
| 423 | See #55758 (NDA) for additional bit definitions. |
| 424 | |
| 425 | config PSP_VERSTAGE_FILE |
| 426 | string "Specify the PSP_verstage file path" |
| 427 | depends on VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 428 | default "\$(obj)/psp_verstage.bin" |
| 429 | help |
| 430 | Add psp_verstage file to the build & PSP Directory Table |
| 431 | |
| 432 | config PSP_VERSTAGE_SIGNING_TOKEN |
| 433 | string "Specify the PSP_verstage Signature Token file path" |
| 434 | depends on VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 435 | default "" |
| 436 | help |
| 437 | Add psp_verstage signature token to the build & PSP Directory Table |
| 438 | |
| 439 | endmenu |
| 440 | |
| 441 | config VBOOT |
| 442 | select VBOOT_VBNV_CMOS |
| 443 | select VBOOT_VBNV_CMOS_BACKUP_TO_FLASH |
| 444 | |
| 445 | config VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 446 | def_bool n |
| 447 | depends on VBOOT |
| 448 | select ARCH_VERSTAGE_ARMV7 |
| 449 | help |
| 450 | Runs verstage on the PSP. Only available on |
| 451 | certain ChromeOS branded parts from AMD. |
| 452 | |
| 453 | config VBOOT_HASH_BLOCK_SIZE |
| 454 | hex |
| 455 | default 0x9000 |
| 456 | depends on VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 457 | help |
| 458 | Because the bulk of the time in psp_verstage to hash the RO cbfs is |
| 459 | spent in the overhead of doing svc calls, increasing the hash block |
| 460 | size significantly cuts the verstage hashing time as seen below. |
| 461 | |
| 462 | 4k takes 180ms |
| 463 | 16k takes 44ms |
| 464 | 32k takes 33.7ms |
| 465 | 36k takes 32.5ms |
| 466 | There's actually still room for an even bigger stack, but we've |
| 467 | reached a point of diminishing returns. |
| 468 | |
| 469 | config CMOS_RECOVERY_BYTE |
| 470 | hex |
| 471 | default 0x51 |
| 472 | depends on VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 473 | help |
| 474 | If the workbuf is not passed from the PSP to coreboot, set the |
| 475 | recovery flag and reboot. The PSP will read this byte, mark the |
| 476 | recovery request in VBNV, and reset the system into recovery mode. |
| 477 | |
| 478 | This is the byte before the default first byte used by VBNV |
| 479 | (0x26 + 0x0E - 1) |
| 480 | |
| 481 | if VBOOT_SLOTS_RW_AB && VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 482 | |
| 483 | config RWA_REGION_ONLY |
| 484 | string |
| 485 | default "apu/amdfw_a" |
| 486 | help |
| 487 | Add a space-delimited list of filenames that should only be in the |
| 488 | RW-A section. |
| 489 | |
| 490 | config RWB_REGION_ONLY |
| 491 | string |
| 492 | default "apu/amdfw_b" |
| 493 | help |
| 494 | Add a space-delimited list of filenames that should only be in the |
| 495 | RW-B section. |
| 496 | |
| 497 | endif # VBOOT_SLOTS_RW_AB && VBOOT_STARTS_BEFORE_BOOTBLOCK |
| 498 | |
Fred Reitberger | d45402a | 2023-04-24 12:18:31 -0400 | [diff] [blame] | 499 | endif # SOC_AMD_PHOENIX |