blob: 8a832aa4cf93751c60ce844f7a55070b5a921579 [file] [log] [blame]
Stefan Reinauer8e073822012-04-04 00:07:22 +02001##
2## This file is part of the coreboot project.
3##
4## Copyright (C) 2011 Google Inc.
5##
6## This program is free software; you can redistribute it and/or modify
7## it under the terms of the GNU General Public License as published by
8## the Free Software Foundation; version 2 of the License.
9##
10## This program is distributed in the hope that it will be useful,
11## but WITHOUT ANY WARRANTY; without even the implied warranty of
12## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13## GNU General Public License for more details.
14##
15## You should have received a copy of the GNU General Public License
16## along with this program; if not, write to the Free Software
Paul Menzela46a7122013-02-23 18:37:27 +010017## Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
Stefan Reinauer8e073822012-04-04 00:07:22 +020018##
19
20config SOUTHBRIDGE_INTEL_BD82X6X
21 bool
22
23config SOUTHBRIDGE_INTEL_C216
24 bool
25
26if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216
27
28config SOUTH_BRIDGE_OPTIONS # dummy
29 def_bool y
Kyösti Mälkki71216c92013-07-28 23:39:37 +030030 select SOUTHBRIDGE_INTEL_COMMON
Stefan Reinauer8e073822012-04-04 00:07:22 +020031 select IOAPIC
32 select HAVE_HARD_RESET
Kyösti Mälkki545b30d2013-06-13 13:51:14 +030033 select HAVE_USBDEBUG_OPTIONS
Stefan Reinauer431a8162012-11-13 13:01:31 -080034 select HAVE_SMI_HANDLER
Stefan Reinauer8e073822012-04-04 00:07:22 +020035 select USE_WATCHDOG_ON_BOOT
36 select PCIEXP_ASPM
37 select PCIEXP_COMMON_CLOCK
Stefan Reinauer1c56d9b2012-05-10 11:27:32 -070038 select SPI_FLASH
Vladimir Serbinenko35c0f432014-09-02 22:25:36 +020039 select PER_DEVICE_ACPI_TABLES
Vladimir Serbinenko5b044ae2014-10-25 15:20:55 +020040 select COMMON_FADT
Stefan Reinauer8e073822012-04-04 00:07:22 +020041
42config EHCI_BAR
43 hex
44 default 0xfef00000
45
Vladimir Serbinenko6a7aeb32014-01-05 11:37:32 +010046config DRAM_RESET_GATE_GPIO
47 int
48 default 60
49
Stefan Reinauer8e073822012-04-04 00:07:22 +020050config BOOTBLOCK_SOUTHBRIDGE_INIT
51 string
52 default "southbridge/intel/bd82x6x/bootblock.c"
53
54config SERIRQ_CONTINUOUS_MODE
55 bool
56 default n
57 help
58 If you set this option to y, the serial IRQ machine will be
59 operated in continuous mode.
60
Patrick Georgi9aeb6942012-10-05 21:54:38 +020061config HPET_MIN_TICKS
62 hex
63 default 0x80
64
Nico Hubera15cd662013-06-19 16:16:05 +020065config HAVE_IFD_BIN
66 bool
67 default y
68
69config BUILD_WITH_FAKE_IFD
70 bool "Build with a fake IFD"
71 default y if !HAVE_IFD_BIN
72 help
73 If you don't have an Intel Firmware Descriptor (ifd.bin) for your
74 board, you can select this option and coreboot will build without it.
75 Though, the resulting coreboot.rom will not contain all parts required
76 to get coreboot running on your board. You can however write only the
77 BIOS section to your board's flash ROM and keep the other sections
78 untouched. Unfortunately the current version of flashrom doesn't
79 support this yet. But there is a patch pending [1].
80
81 WARNING: Never write a complete coreboot.rom to your flash ROM if it
Martin Roth595e7772015-04-26 18:53:26 -060082 was built with a fake IFD. It just won't work.
Nico Hubera15cd662013-06-19 16:16:05 +020083
Martin Roth595e7772015-04-26 18:53:26 -060084 [1] http://www.flashrom.org/pipermail/flashrom/2013-June/011083.html
Nico Hubera15cd662013-06-19 16:16:05 +020085
86config IFD_BIOS_SECTION
87 depends on BUILD_WITH_FAKE_IFD
88 string
89 default ""
90
91config IFD_ME_SECTION
92 depends on BUILD_WITH_FAKE_IFD
93 string
94 default ""
95
96config IFD_GBE_SECTION
97 depends on BUILD_WITH_FAKE_IFD
98 string
99 default ""
100
101config IFD_PLATFORM_SECTION
102 depends on BUILD_WITH_FAKE_IFD
103 string
104 default ""
105
106config IFD_BIN_PATH
107 string "Path to intel firmware descriptor"
108 depends on !BUILD_WITH_FAKE_IFD
Patrick Georgi26e24cc2015-05-05 22:27:25 +0200109 default "3rdparty/blobs/mainboard/$(MAINBOARDDIR)/descriptor.bin"
Nico Hubera15cd662013-06-19 16:16:05 +0200110
Nico Huberea6d6e8c2013-05-14 15:14:08 +0200111config HAVE_GBE_BIN
112 bool "Add gigabit ethernet firmware"
113 default n
114 help
115 The integrated gigabit ethernet controller needs a firmware file.
116 Select this if you are going to use the PCH integrated controller
117 and have the firmware.
118
119config GBE_BIN_PATH
120 string "Path to gigabit ethernet firmware"
121 depends on HAVE_GBE_BIN
Patrick Georgi26e24cc2015-05-05 22:27:25 +0200122 default "3rdparty/blobs/mainboard/$(MAINBOARDDIR)/gbe.bin"
Nico Huberea6d6e8c2013-05-14 15:14:08 +0200123
Nico Huber99fd30e2013-06-19 15:57:34 +0200124config HAVE_ME_BIN
125 bool "Add Intel Management Engine firmware"
126 default y
127 help
128 The Intel processor in the selected system requires a special firmware
129 for an integrated controller called Management Engine (ME). The ME
Patrick Georgi26e24cc2015-05-05 22:27:25 +0200130 firmware might be provided in coreboot's 3rdparty/blobs repository. If
Nico Huber99fd30e2013-06-19 15:57:34 +0200131 not and if you don't have the firmware elsewhere, you can still
132 build coreboot without it. In this case however, you'll have to make
133 sure that you don't overwrite your ME firmware on your flash ROM.
134
Patrick Georgi3cc151e2013-06-13 15:07:02 +0200135config ME_BIN_PATH
136 string "Path to management engine firmware"
Nico Huber99fd30e2013-06-19 15:57:34 +0200137 depends on HAVE_ME_BIN
Patrick Georgi26e24cc2015-05-05 22:27:25 +0200138 default "3rdparty/blobs/mainboard/$(MAINBOARDDIR)/me.bin"
Patrick Georgi3cc151e2013-06-13 15:07:02 +0200139
Stefan Reinauer7004b7c2012-10-31 17:30:13 -0700140config LOCK_MANAGEMENT_ENGINE
141 bool "Lock Management Engine section"
Nico Hubera15cd662013-06-19 16:16:05 +0200142 depends on !BUILD_WITH_FAKE_IFD
Stefan Reinauer7004b7c2012-10-31 17:30:13 -0700143 default n
144 help
145 The Intel Management Engine supports preventing write accesses
146 from the host to the Management Engine section in the firmware
147 descriptor. If the ME section is locked, it can only be overwritten
148 with an external SPI flash programmer. You will want this if you
149 want to increase security of your ROM image once you are sure
150 that the ME firmware is no longer going to change.
151
152 If unsure, say N.
153
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +0200154endif
155
156if SOUTHBRIDGE_INTEL_BD82X6X || SOUTHBRIDGE_INTEL_C216 || SOUTHBRIDGE_INTEL_IBEXPEAK
157
158choice
159 prompt "Flash ROM locking on S3 resume"
160 default LOCK_SPI_ON_RESUME_NONE
161
162config LOCK_SPI_ON_RESUME_NONE
163 bool "Don't lock ROM sections on S3 resume"
164
165config LOCK_SPI_ON_RESUME_RO
Nico Huberd1fb5642013-07-01 16:02:36 +0200166 bool "Lock all flash ROM sections on S3 resume"
Nico Huberd1fb5642013-07-01 16:02:36 +0200167 help
168 If the flash ROM shall be protected against write accesses from the
169 operating system (OS), the locking procedure has to be repeated after
170 each resume from S3. Select this if you never want to update the flash
171 ROM from within your OS. Notice: Even with this option, the write lock
172 has still to be enabled on the normal boot path (e.g. by the payload).
173
Vladimir Serbinenkod3b194e2015-05-12 12:39:53 +0200174config LOCK_SPI_ON_RESUME_NO_ACCESS
175 bool "Lock and disable reads all flash ROM sections on S3 resume"
176 help
177 If the flash ROM shall be protected against all accesses from the
178 operating system (OS), the locking procedure has to be repeated after
179 each resume from S3. Select this if you never want to update the flash
180 ROM from within your OS. Notice: Even with this option, the lock
181 has still to be enabled on the normal boot path (e.g. by the payload).
182
183endchoice
184
Stefan Reinauer8e073822012-04-04 00:07:22 +0200185endif