blob: fc4bf57d6180453da005e944f530f73680a67678 [file] [log] [blame]
Arthur Heymans6d3682e2023-07-13 12:34:04 +02001config SOC_AMD_GENOA
2 bool
3
4if SOC_AMD_GENOA
5
6config SOC_SPECIFIC_OPTIONS
7 def_bool y
8 select ARCH_X86
9 select HAVE_EXP_X86_64_SUPPORT
Arthur Heymans6d3682e2023-07-13 12:34:04 +020010 select RESET_VECTOR_IN_RAM
11 select SOC_AMD_COMMON
12 select SOC_AMD_COMMON_BLOCK_ACPIMMIO
Arthur Heymans4da9d6b42023-07-13 14:19:09 +020013 select SOC_AMD_COMMON_BLOCK_AOAC
Varshit Pandya95d78d92023-10-04 19:30:21 +053014 select SOC_AMD_COMMON_BLOCK_BANKED_GPIOS
Arthur Heymans48167b12023-07-13 14:07:54 +020015 select SOC_AMD_COMMON_BLOCK_CPUFREQ_FAM17H_19H
Arthur Heymansc666a912023-07-13 14:34:10 +020016 select SOC_AMD_COMMON_BLOCK_HAS_ESPI
17 select SOC_AMD_COMMON_BLOCK_LPC
Arthur Heymans6d3682e2023-07-13 12:34:04 +020018 select SOC_AMD_COMMON_BLOCK_NONCAR
19 select SOC_AMD_COMMON_BLOCK_PCI_MMCONF
Varshit Pandyac0f19832023-10-04 19:26:21 +053020 select SOC_AMD_COMMON_BLOCK_SMI
Arthur Heymans48167b12023-07-13 14:07:54 +020021 select SOC_AMD_COMMON_BLOCK_TSC
Varshit Pandya970d7702023-10-06 18:14:02 +053022 select SOC_AMD_COMMON_BLOCK_UART
Arthur Heymansc666a912023-07-13 14:34:10 +020023 select SOC_AMD_COMMON_BLOCK_USE_ESPI
Arthur Heymanse4eba132023-07-13 14:02:42 +020024 select X86_CUSTOM_BOOTMEDIA
Arthur Heymans6d3682e2023-07-13 12:34:04 +020025
26config USE_EXP_X86_64_SUPPORT
27 default y
28
vbpandya87d8b8c2023-09-22 20:49:37 +053029config CHIPSET_DEVICETREE
30 string
31 default "soc/amd/genoa/chipset.cb"
32
Arthur Heymans6d3682e2023-07-13 12:34:04 +020033config EARLY_RESERVED_DRAM_BASE
34 hex
35 default 0x7000000
36 help
37 This variable defines the base address of the DRAM which is reserved
38 for usage by coreboot in early stages (i.e. before ramstage is up).
39 This memory gets reserved in BIOS tables to ensure that the OS does
40 not use it, thus preventing corruption of OS memory in case of S3
41 resume.
42
43config EARLYRAM_BSP_STACK_SIZE
44 hex
45 default 0x1000
46
Varshit Pandyaa7759582023-10-17 21:59:39 +053047config MAX_CPUS
48 int
49 default 384
50
Arthur Heymans6d3682e2023-07-13 12:34:04 +020051config PSP_APOB_DRAM_ADDRESS
52 hex
53 default 0x7001000
54 help
55 Location in DRAM where the PSP will copy the AGESA PSP Output
56 Block.
57
58config PSP_APOB_DRAM_SIZE
59 hex
60 default 0x20000
61
62config PRERAM_CBMEM_CONSOLE_SIZE
63 hex
64 default 0x1600
65 help
66 Increase this value if preram cbmem console is getting truncated
67
68config C_ENV_BOOTBLOCK_SIZE
69 hex
70 default 0x10000
71 help
72 Sets the size of the bootblock stage that should be loaded in DRAM.
73 This variable controls the DRAM allocation size in linker script
74 for bootblock stage.
75
76config ROMSTAGE_ADDR
77 hex
78 default 0x7040000
79 help
80 Sets the address in DRAM where romstage should be loaded.
81
82config ROMSTAGE_SIZE
83 hex
84 default 0x80000
85 help
86 Sets the size of DRAM allocation for romstage in linker script.
87
Arthur Heymans901f0402023-07-13 14:14:55 +020088config ECAM_MMCONF_BASE_ADDRESS
89 hex
90 default 0xE0000000
91
92config ECAM_MMCONF_BUS_NUMBER
93 int
94 default 256
95
Arthur Heymans8f1c7072023-07-13 12:52:49 +020096menu "PSP Configuration Options"
97
98config AMDFW_CONFIG_FILE
99 string
100 default "src/soc/amd/genoa/fw.cfg"
101
102config PSP_DISABLE_POSTCODES
103 bool "Disable PSP post codes"
104 help
105 Disables the output of port80 post codes from PSP.
106
107config PSP_INIT_ESPI
108 bool "Initialize eSPI in PSP Stage 2 Boot Loader"
109 help
110 Select to initialize the eSPI controller in the PSP Stage 2 Boot
111 Loader.
112
113config PSP_UNLOCK_SECURE_DEBUG
114 bool
115 default y
116
117config HAVE_PSP_WHITELIST_FILE
118 bool "Include a debug whitelist file in PSP build"
119 default n
120 help
121 Support secured unlock prior to reset using a whitelisted
122 serial number. This feature requires a signed whitelist image
123 and bootloader from AMD.
124
125 If unsure, answer 'n'
126
127config PSP_WHITELIST_FILE
128 string "Debug whitelist file path"
129 depends on HAVE_PSP_WHITELIST_FILE
130
Felix Held4ab1db82023-09-28 19:54:55 +0200131config PERFORM_SPL_FUSING
132 bool "Send SPL fuse command to PSP"
133 default n
134 help
135 Send the Security Patch Level (SPL) fusing command to the PSP in
136 order to update the minimum SPL version to be written to the SoC's
137 fuse bits. This will prevent using any embedded firmware components
138 with lower SPL version.
139
140 If unsure, answer 'n'
Arthur Heymans8f1c7072023-07-13 12:52:49 +0200141
142config SPL_TABLE_FILE
Felix Held4ab1db82023-09-28 19:54:55 +0200143 string "SPL table file override"
144 help
145 Provide a mainboard-specific Security Patch Level (SPL) table file
146 override. The SPL file is required to support PSP FW anti-rollback
147 and needs to be created by AMD. The default SPL file specified in the
148 SoC's fw.cfg is in the corresponding folder of the amd_blobs submodule
149 and applies to all boards that use the SoC without verstage on PSP.
150 In the verstage on PSP case, a different SPL file is specific as an
151 override via this Kconfig option.
Arthur Heymans8f1c7072023-07-13 12:52:49 +0200152
153config PSP_SOFTFUSE_BITS
154 string "PSP Soft Fuse bits to enable"
155 default ""
156 help
157 Space separated list of Soft Fuse bits to enable.
158 Bit 0: Enable secure debug (Set by PSP_UNLOCK_SECURE_DEBUG)
159 Bit 7: Disable PSP postcodes on Renoir and newer chips only
160 (Set by PSP_DISABLE_PORT80)
161 Bit 15: PSP debug output destination:
162 0=SoC MMIO UART, 1=IO port 0x3F8
163
164 See #57299 (NDA) for additional bit definitions.
165endmenu
166
167
168endif # SOC_AMD_GENOA