Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 1 | config SOC_AMD_GENOA |
| 2 | bool |
| 3 | |
| 4 | if SOC_AMD_GENOA |
| 5 | |
| 6 | config SOC_SPECIFIC_OPTIONS |
| 7 | def_bool y |
| 8 | select ARCH_X86 |
| 9 | select HAVE_EXP_X86_64_SUPPORT |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 10 | select RESET_VECTOR_IN_RAM |
| 11 | select SOC_AMD_COMMON |
| 12 | select SOC_AMD_COMMON_BLOCK_ACPIMMIO |
Arthur Heymans | 4da9d6b4 | 2023-07-13 14:19:09 +0200 | [diff] [blame] | 13 | select SOC_AMD_COMMON_BLOCK_AOAC |
Varshit Pandya | 95d78d9 | 2023-10-04 19:30:21 +0530 | [diff] [blame] | 14 | select SOC_AMD_COMMON_BLOCK_BANKED_GPIOS |
Arthur Heymans | 48167b1 | 2023-07-13 14:07:54 +0200 | [diff] [blame] | 15 | select SOC_AMD_COMMON_BLOCK_CPUFREQ_FAM17H_19H |
Arthur Heymans | c666a91 | 2023-07-13 14:34:10 +0200 | [diff] [blame] | 16 | select SOC_AMD_COMMON_BLOCK_HAS_ESPI |
| 17 | select SOC_AMD_COMMON_BLOCK_LPC |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 18 | select SOC_AMD_COMMON_BLOCK_NONCAR |
| 19 | select SOC_AMD_COMMON_BLOCK_PCI_MMCONF |
Varshit Pandya | c0f1983 | 2023-10-04 19:26:21 +0530 | [diff] [blame] | 20 | select SOC_AMD_COMMON_BLOCK_SMI |
Arthur Heymans | 48167b1 | 2023-07-13 14:07:54 +0200 | [diff] [blame] | 21 | select SOC_AMD_COMMON_BLOCK_TSC |
Varshit Pandya | 970d770 | 2023-10-06 18:14:02 +0530 | [diff] [blame] | 22 | select SOC_AMD_COMMON_BLOCK_UART |
Arthur Heymans | c666a91 | 2023-07-13 14:34:10 +0200 | [diff] [blame] | 23 | select SOC_AMD_COMMON_BLOCK_USE_ESPI |
Arthur Heymans | e4eba13 | 2023-07-13 14:02:42 +0200 | [diff] [blame] | 24 | select X86_CUSTOM_BOOTMEDIA |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 25 | |
| 26 | config USE_EXP_X86_64_SUPPORT |
| 27 | default y |
| 28 | |
vbpandya | 87d8b8c | 2023-09-22 20:49:37 +0530 | [diff] [blame] | 29 | config CHIPSET_DEVICETREE |
| 30 | string |
| 31 | default "soc/amd/genoa/chipset.cb" |
| 32 | |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 33 | config EARLY_RESERVED_DRAM_BASE |
| 34 | hex |
| 35 | default 0x7000000 |
| 36 | help |
| 37 | This variable defines the base address of the DRAM which is reserved |
| 38 | for usage by coreboot in early stages (i.e. before ramstage is up). |
| 39 | This memory gets reserved in BIOS tables to ensure that the OS does |
| 40 | not use it, thus preventing corruption of OS memory in case of S3 |
| 41 | resume. |
| 42 | |
| 43 | config EARLYRAM_BSP_STACK_SIZE |
| 44 | hex |
| 45 | default 0x1000 |
| 46 | |
Varshit Pandya | a775958 | 2023-10-17 21:59:39 +0530 | [diff] [blame^] | 47 | config MAX_CPUS |
| 48 | int |
| 49 | default 384 |
| 50 | |
Arthur Heymans | 6d3682e | 2023-07-13 12:34:04 +0200 | [diff] [blame] | 51 | config PSP_APOB_DRAM_ADDRESS |
| 52 | hex |
| 53 | default 0x7001000 |
| 54 | help |
| 55 | Location in DRAM where the PSP will copy the AGESA PSP Output |
| 56 | Block. |
| 57 | |
| 58 | config PSP_APOB_DRAM_SIZE |
| 59 | hex |
| 60 | default 0x20000 |
| 61 | |
| 62 | config PRERAM_CBMEM_CONSOLE_SIZE |
| 63 | hex |
| 64 | default 0x1600 |
| 65 | help |
| 66 | Increase this value if preram cbmem console is getting truncated |
| 67 | |
| 68 | config C_ENV_BOOTBLOCK_SIZE |
| 69 | hex |
| 70 | default 0x10000 |
| 71 | help |
| 72 | Sets the size of the bootblock stage that should be loaded in DRAM. |
| 73 | This variable controls the DRAM allocation size in linker script |
| 74 | for bootblock stage. |
| 75 | |
| 76 | config ROMSTAGE_ADDR |
| 77 | hex |
| 78 | default 0x7040000 |
| 79 | help |
| 80 | Sets the address in DRAM where romstage should be loaded. |
| 81 | |
| 82 | config ROMSTAGE_SIZE |
| 83 | hex |
| 84 | default 0x80000 |
| 85 | help |
| 86 | Sets the size of DRAM allocation for romstage in linker script. |
| 87 | |
Arthur Heymans | 901f040 | 2023-07-13 14:14:55 +0200 | [diff] [blame] | 88 | config ECAM_MMCONF_BASE_ADDRESS |
| 89 | hex |
| 90 | default 0xE0000000 |
| 91 | |
| 92 | config ECAM_MMCONF_BUS_NUMBER |
| 93 | int |
| 94 | default 256 |
| 95 | |
Arthur Heymans | 8f1c707 | 2023-07-13 12:52:49 +0200 | [diff] [blame] | 96 | menu "PSP Configuration Options" |
| 97 | |
| 98 | config AMDFW_CONFIG_FILE |
| 99 | string |
| 100 | default "src/soc/amd/genoa/fw.cfg" |
| 101 | |
| 102 | config PSP_DISABLE_POSTCODES |
| 103 | bool "Disable PSP post codes" |
| 104 | help |
| 105 | Disables the output of port80 post codes from PSP. |
| 106 | |
| 107 | config PSP_INIT_ESPI |
| 108 | bool "Initialize eSPI in PSP Stage 2 Boot Loader" |
| 109 | help |
| 110 | Select to initialize the eSPI controller in the PSP Stage 2 Boot |
| 111 | Loader. |
| 112 | |
| 113 | config PSP_UNLOCK_SECURE_DEBUG |
| 114 | bool |
| 115 | default y |
| 116 | |
| 117 | config HAVE_PSP_WHITELIST_FILE |
| 118 | bool "Include a debug whitelist file in PSP build" |
| 119 | default n |
| 120 | help |
| 121 | Support secured unlock prior to reset using a whitelisted |
| 122 | serial number. This feature requires a signed whitelist image |
| 123 | and bootloader from AMD. |
| 124 | |
| 125 | If unsure, answer 'n' |
| 126 | |
| 127 | config PSP_WHITELIST_FILE |
| 128 | string "Debug whitelist file path" |
| 129 | depends on HAVE_PSP_WHITELIST_FILE |
| 130 | |
Felix Held | 4ab1db8 | 2023-09-28 19:54:55 +0200 | [diff] [blame] | 131 | config PERFORM_SPL_FUSING |
| 132 | bool "Send SPL fuse command to PSP" |
| 133 | default n |
| 134 | help |
| 135 | Send the Security Patch Level (SPL) fusing command to the PSP in |
| 136 | order to update the minimum SPL version to be written to the SoC's |
| 137 | fuse bits. This will prevent using any embedded firmware components |
| 138 | with lower SPL version. |
| 139 | |
| 140 | If unsure, answer 'n' |
Arthur Heymans | 8f1c707 | 2023-07-13 12:52:49 +0200 | [diff] [blame] | 141 | |
| 142 | config SPL_TABLE_FILE |
Felix Held | 4ab1db8 | 2023-09-28 19:54:55 +0200 | [diff] [blame] | 143 | string "SPL table file override" |
| 144 | help |
| 145 | Provide a mainboard-specific Security Patch Level (SPL) table file |
| 146 | override. The SPL file is required to support PSP FW anti-rollback |
| 147 | and needs to be created by AMD. The default SPL file specified in the |
| 148 | SoC's fw.cfg is in the corresponding folder of the amd_blobs submodule |
| 149 | and applies to all boards that use the SoC without verstage on PSP. |
| 150 | In the verstage on PSP case, a different SPL file is specific as an |
| 151 | override via this Kconfig option. |
Arthur Heymans | 8f1c707 | 2023-07-13 12:52:49 +0200 | [diff] [blame] | 152 | |
| 153 | config PSP_SOFTFUSE_BITS |
| 154 | string "PSP Soft Fuse bits to enable" |
| 155 | default "" |
| 156 | help |
| 157 | Space separated list of Soft Fuse bits to enable. |
| 158 | Bit 0: Enable secure debug (Set by PSP_UNLOCK_SECURE_DEBUG) |
| 159 | Bit 7: Disable PSP postcodes on Renoir and newer chips only |
| 160 | (Set by PSP_DISABLE_PORT80) |
| 161 | Bit 15: PSP debug output destination: |
| 162 | 0=SoC MMIO UART, 1=IO port 0x3F8 |
| 163 | |
| 164 | See #57299 (NDA) for additional bit definitions. |
| 165 | endmenu |
| 166 | |
| 167 | |
| 168 | endif # SOC_AMD_GENOA |