blob: 9a70bf24ec34817f5f1165b33452f94526410481 [file] [log] [blame]
Stefan Reinauer8e073822012-04-04 00:07:22 +02001##
2## This file is part of the coreboot project.
3##
4## Copyright (C) 2011 Google Inc.
5##
6## This program is free software; you can redistribute it and/or modify
7## it under the terms of the GNU General Public License as published by
8## the Free Software Foundation; version 2 of the License.
9##
10## This program is distributed in the hope that it will be useful,
11## but WITHOUT ANY WARRANTY; without even the implied warranty of
12## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13## GNU General Public License for more details.
14##
Stefan Reinauer8e073822012-04-04 00:07:22 +020015
16config SOUTHBRIDGE_INTEL_BD82X6X
17 bool
18
19config SOUTHBRIDGE_INTEL_C216
20 bool
21
22if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216
23
24config SOUTH_BRIDGE_OPTIONS # dummy
25 def_bool y
Aaron Durbin340898f2016-07-13 23:22:28 -050026 select ACPI_INTEL_HARDWARE_SLEEP_VALUES
Kyösti Mälkki71216c92013-07-28 23:39:37 +030027 select SOUTHBRIDGE_INTEL_COMMON
Tobias Diedrich7f5efd92017-12-14 00:29:01 +010028 select SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
Arthur Heymans16fe7902017-04-12 17:01:31 +020029 select SOUTHBRIDGE_INTEL_COMMON_SMBUS
Arthur Heymansbddef0d2017-09-25 12:21:07 +020030 select SOUTHBRIDGE_INTEL_COMMON_SPI
Stefan Reinauer8e073822012-04-04 00:07:22 +020031 select IOAPIC
32 select HAVE_HARD_RESET
Kyösti Mälkki545b30d2013-06-13 13:51:14 +030033 select HAVE_USBDEBUG_OPTIONS
Stefan Reinauer431a8162012-11-13 13:01:31 -080034 select HAVE_SMI_HANDLER
Stefan Reinauer8e073822012-04-04 00:07:22 +020035 select USE_WATCHDOG_ON_BOOT
36 select PCIEXP_ASPM
37 select PCIEXP_COMMON_CLOCK
Vladimir Serbinenko5b044ae2014-10-25 15:20:55 +020038 select COMMON_FADT
Alexander Couzens7bf47ee2015-04-16 02:00:21 +020039 select ACPI_SATA_GENERATOR
Martin Roth3fda3c22015-07-09 21:02:26 -060040 select HAVE_INTEL_FIRMWARE
Patrick Rudolphe8e66f42016-02-06 17:42:42 +010041 select SOUTHBRIDGE_INTEL_COMMON_GPIO
Aaron Durbin16246ea2016-08-05 21:23:37 -050042 select RTC
Bill XIEd533b162017-08-22 16:26:22 +080043 select HAVE_INTEL_CHIPSET_LOCKDOWN
Arthur Heymansa0508172018-01-25 11:30:22 +010044 select SOUTHBRIDGE_INTEL_COMMON_SMM
Stefan Reinauer8e073822012-04-04 00:07:22 +020045
46config EHCI_BAR
47 hex
48 default 0xfef00000
49
Vladimir Serbinenko6a7aeb32014-01-05 11:37:32 +010050config DRAM_RESET_GATE_GPIO
51 int
52 default 60
53
Stefan Reinauer8e073822012-04-04 00:07:22 +020054config BOOTBLOCK_SOUTHBRIDGE_INIT
55 string
56 default "southbridge/intel/bd82x6x/bootblock.c"
57
58config SERIRQ_CONTINUOUS_MODE
59 bool
60 default n
61 help
62 If you set this option to y, the serial IRQ machine will be
63 operated in continuous mode.
64
Patrick Georgi9aeb6942012-10-05 21:54:38 +020065config HPET_MIN_TICKS
66 hex
67 default 0x80
68
Nico Hubera15cd662013-06-19 16:16:05 +020069config HAVE_IFD_BIN
Martin Roth3fda3c22015-07-09 21:02:26 -060070 def_bool y
Nico Hubera15cd662013-06-19 16:16:05 +020071
72config BUILD_WITH_FAKE_IFD
Martin Roth3fda3c22015-07-09 21:02:26 -060073 def_bool !HAVE_IFD_BIN
Stefan Reinauer7004b7c2012-10-31 17:30:13 -070074
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020075endif
76
77if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216 || SOUTHBRIDGE_INTEL_IBEXPEAK
78
79choice
Nico Huber2ac149d2017-09-01 23:28:14 +020080 prompt "Flash locking during chipset lockdown"
81 default LOCK_SPI_FLASH_NONE
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020082
Nico Huber2ac149d2017-09-01 23:28:14 +020083config LOCK_SPI_FLASH_NONE
84 bool "Don't lock flash sections"
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +020085
Nico Huber2ac149d2017-09-01 23:28:14 +020086config LOCK_SPI_FLASH_RO
87 bool "Write-protect all flash sections"
Nico Huberd1fb5642013-07-01 16:02:36 +020088 help
Nico Huber2ac149d2017-09-01 23:28:14 +020089 Select this if you want to write-protect the whole firmware flash
90 chip. The locking will take place during the chipset lockdown, which
91 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
92 or has to be triggered later (e.g. by the payload or the OS).
Nico Huberd1fb5642013-07-01 16:02:36 +020093
Nico Huber2ac149d2017-09-01 23:28:14 +020094 NOTE: If you trigger the chipset lockdown unconditionally,
95 you won't be able to write to the flash chip using the
96 internal programmer any more.
97
98config LOCK_SPI_FLASH_NO_ACCESS
99 bool "Write-protect all flash sections and read-protect non-BIOS sections"
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +0200100 help
Nico Huber2ac149d2017-09-01 23:28:14 +0200101 Select this if you want to protect the firmware flash against all
102 further accesses (with the exception of the memory mapped BIOS re-
103 gion which is always readable). The locking will take place during
104 the chipset lockdown, which is either triggered by coreboot (when
105 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
106 by the payload or the OS).
107
108 NOTE: If you trigger the chipset lockdown unconditionally,
109 you won't be able to write to the flash chip using the
110 internal programmer any more.
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +0200111
112endchoice
113
Stefan Reinauer8e073822012-04-04 00:07:22 +0200114endif