src/: Replace GPL boilerplate with SPDX headers
Used commands:
perl -i -p0e 's|\/\*[\s*]*.*is free software[:;][\s*]*you[\s*]*can[\s*]*redistribute[\s*]*it[\s*]*and\/or[\s*]*modify[\s*]*it[\s*]*under[\s*]*the[\s*]*terms[\s*]*of[\s*]*the[\s*]*GNU[\s*]*General[\s*]*Public[\s*]*License[\s*]*as[\s*]*published[\s*]*by[\s*]*the[\s*]*Free[\s*]*Software[\s*]*Foundation[;,][\s*]*version[\s*]*2[\s*]*of[\s*]*the[\s*]*License.[\s*]*This[\s*]*program[\s*]*is[\s*]*distributed[\s*]*in[\s*]*the[\s*]*hope[\s*]*that[\s*]*it[\s*]*will[\s*]*be[\s*]*useful,[\s*]*but[\s*]*WITHOUT[\s*]*ANY[\s*]*WARRANTY;[\s*]*without[\s*]*even[\s*]*the[\s*]*implied[\s*]*warranty[\s*]*of[\s*]*MERCHANTABILITY[\s*]*or[\s*]*FITNESS[\s*]*FOR[\s*]*A[\s*]*PARTICULAR[\s*]*PURPOSE.[\s*]*See[\s*]*the[\s*]*GNU[\s*]*General[\s*]*Public[\s*]*License[\s*]*for[\s*]*more[\s*]*details.[\s*]*\*\/|/* SPDX-License-Identifier: GPL-2.0-only */|' $(cat filelist)
perl -i -p0e 's|\/\*[\s*]*.*is[\s*]*free[\s*]*software[:;][\s*]*you[\s*]*can[\s*]*redistribute[\s*]*it[\s*]*and/or[\s*]*modify[\s*]*it[\s*]*under[\s*]*the[\s*]*terms[\s*]*of[\s*]*the[\s*]*GNU[\s*]*General[\s*]*Public[\s*]*License[\s*]*as[\s*]*published[\s*]*by[\s*]*the[\s*]*Free[\s*]*Software[\s*]*Foundation[;,][\s*]*either[\s*]*version[\s*]*2[\s*]*of[\s*]*the[\s*]*License,[\s*]*or[\s*]*.at[\s*]*your[\s*]*option.[\s*]*any[\s*]*later[\s*]*version.[\s*]*This[\s*]*program[\s*]*is[\s*]*distributed[\s*]*in[\s*]*the[\s*]*hope[\s*]*that[\s*]*it[\s*]*will[\s*]*be[\s*]*useful,[\s*]*but[\s*]*WITHOUT[\s*]*ANY[\s*]*WARRANTY;[\s*]*without[\s*]*even[\s*]*the[\s*]*implied[\s*]*warranty[\s*]*of[\s*]*MERCHANTABILITY[\s*]*or[\s*]*FITNESS[\s*]*FOR[\s*]*A[\s*]*PARTICULAR[\s*]*PURPOSE.[\s*]*See[\s*]*the[\s*]*GNU[\s*]*General[\s*]*Public[\s*]*License[\s*]*for[\s*]*more[\s*]*details.[\s*]*\*\/|/* SPDX-License-Identifier: GPL-2.0-or-later */|' $(cat filelist)
perl -i -p0e 's|\/\*[\s*]*.*is[\s*#]*free[\s*#]*software[;:,][\s*#]*you[\s*#]*can[\s*#]*redistribute[\s*#]*it[\s*#]*and/or[\s*#]*modify[\s*#]*it[\s*#]*under[\s*#]*the[\s*#]*terms[\s*#]*of[\s*#]*the[\s*#]*GNU[\s*#]*General[\s*#]*Public[\s*#]*License[\s*#]*as[\s*#]*published[\s*#]*by[\s*#]*the[\s*#]*Free[\s*#]*Software[\s*#]*Foundation[;:,][\s*#]*either[\s*#]*version[\s*#]*3[\s*#]*of[\s*#]*the[\s*#]*License[;:,][\s*#]*or[\s*#]*.at[\s*#]*your[\s*#]*option.[\s*#]*any[\s*#]*later[\s*#]*version.[\s*#]*This[\s*#]*program[\s*#]*is[\s*#]*distributed[\s*#]*in[\s*#]*the[\s*#]*hope[\s*#]*that[\s*#]*it[\s*#]*will[\s*#]*be[\s*#]*useful[;:,][\s*#]*but[\s*#]*WITHOUT[\s*#]*ANY[\s*#]*WARRANTY[;:,][\s*#]*without[\s*#]*even[\s*#]*the[\s*#]*implied[\s*#]*warranty[\s*#]*of[\s*#]*MERCHANTABILITY[\s*#]*or[\s*#]*FITNESS[\s*#]*FOR[\s*#]*A[\s*#]*PARTICULAR[\s*#]*PURPOSE.[\s*#]*See[\s*#]*the[\s*#]*GNU[\s*#]*General[\s*#]*Public[\s*#]*License[\s*#]*for[\s*#]*more[\s*#]*details.[\s*]*\*\/|/* SPDX-License-Identifier: GPL-3.0-or-later */|' $(cat filelist)
perl -i -p0e 's|(\#\#*)[\w]*.*is free software[:;][\#\s]*you[\#\s]*can[\#\s]*redistribute[\#\s]*it[\#\s]*and\/or[\#\s]*modify[\#\s]*it[\s\#]*under[\s \#]*the[\s\#]*terms[\s\#]*of[\s\#]*the[\s\#]*GNU[\s\#]*General[\s\#]*Public[\s\#]*License[\s\#]*as[\s\#]*published[\s\#]*by[\s\#]*the[\s\#]*Free[\s\#]*Software[\s\#]*Foundation[;,][\s\#]*version[\s\#]*2[\s\#]*of[\s\#]*the[\s\#]*License.*[\s\#]*This[\s\#]*program[\s\#]*is[\s\#]*distributed[\s\#]*in[\s\#]*the[\s\#]*hope[\s\#]*that[\s\#]*it[\s\#]*will[\#\s]*be[\#\s]*useful,[\#\s]*but[\#\s]*WITHOUT[\#\s]*ANY[\#\s]*WARRANTY;[\#\s]*without[\#\s]*even[\#\s]*the[\#\s]*implied[\#\s]*warranty[\#\s]*of[\#\s]*MERCHANTABILITY[\#\s]*or[\#\s]*FITNESS[\#\s]*FOR[\#\s]*A[\#\s]*PARTICULAR[\#\s]*PURPOSE.[\#\s]*See[\#\s]*the[\#\s]*GNU[\#\s]*General[\#\s]*Public[\#\s]*License[\#\s]*for[\#\s]*more[\#\s]*details.\s(#* *\n)*|\1 SPDX-License-Identifier: GPL-2.0-only\n\n|' $(cat filelist)
perl -i -p0e 's|(\#\#*)[\w*]*.*is free software[:;][\s*]*you[\s*]*can[\s*]*redistribute[\s*]*it[\s*]*and\/or[\s*]*modify[\s*]*it[\s*]*under[\s*]*the[\s*]*terms[\s*]*of[\s*]*the[\s*]*GNU[\s*]*General[\s*]*Public[\s*]*License[\s*]*as[\s*]*published[\s*]*by[\s*]*the[\s*]*Free[\s*]*Software[\s*]*Foundation[;,][\s*]*version[\s*]*2[\s*]*of[\s*]*the[\s*]*License.[\s*]*This[\s*]*program[\s*]*is[\s*]*distributed[\s*]*in[\s*]*the[\s*]*hope[\s*]*that[\s*]*it[\s*]*will[\s*]*be[\s*]*useful,[\s*]*but[\s*]*WITHOUT[\s*]*ANY[\s*]*WARRANTY;[\s*]*without[\s*]*even[\s*]*the[\s*]*implied[\s*]*warranty[\s*]*of[\s*]*MERCHANTABILITY[\s*]*or[\s*]*FITNESS[\s*]*FOR[\s*]*A[\s*]*PARTICULAR[\s*]*PURPOSE.[\s*]*See[\s*]*the[\s*]*GNU[\s*]*General[\s*]*Public[\s*]*License[\s*]*for[\s*]*more[\s*]*details.\s(#* *\n)*|\1 SPDX-License-Identifier: GPL-2.0-only\n\n|' $(cat filelist)
Change-Id: Ia01908544f4b92a2e06ea621eca548e582728280
Signed-off-by: Patrick Georgi <pgeorgi@google.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/41178
Reviewed-by: HAOUAS Elyes <ehaouas@noos.fr>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
2020-05-08 22:50:46 +02:00
|
|
|
## SPDX-License-Identifier: GPL-2.0-only
|
2016-01-26 19:06:42 +01:00
|
|
|
|
|
|
|
if BOARD_INTEL_GALILEO
|
|
|
|
|
|
|
|
config BOARD_SPECIFIC_OPTIONS
|
|
|
|
def_bool y
|
|
|
|
select BOARD_ROMSIZE_KB_8192
|
2016-05-30 23:02:49 +02:00
|
|
|
select ENABLE_BUILTIN_HSUART1
|
2016-02-21 02:53:54 +01:00
|
|
|
select HAVE_ACPI_TABLES
|
2016-01-26 19:06:42 +01:00
|
|
|
select SOC_INTEL_QUARK
|
2018-02-27 19:40:52 +01:00
|
|
|
select MAINBOARD_HAS_I2C_TPM_ATMEL
|
|
|
|
select MAINBOARD_HAS_TPM2
|
2019-01-16 02:57:30 +01:00
|
|
|
select UDK_2015_BINDING
|
|
|
|
|
2016-01-26 19:06:42 +01:00
|
|
|
|
|
|
|
config MAINBOARD_DIR
|
|
|
|
string
|
2019-11-22 20:58:58 +01:00
|
|
|
default "intel/galileo"
|
2016-01-26 19:06:42 +01:00
|
|
|
|
|
|
|
config MAINBOARD_PART_NUMBER
|
|
|
|
string
|
|
|
|
default "Galileo"
|
|
|
|
|
2016-05-15 22:52:36 +02:00
|
|
|
config GALILEO_GEN2
|
|
|
|
bool "Board generation: GEN1 (n) or GEN2 (y)"
|
|
|
|
default y
|
|
|
|
help
|
|
|
|
The coreboot binary will configure only one generation of the Galileo
|
|
|
|
board since coreboot can not determine the board generation at
|
|
|
|
runtime. Select which generation of the Galileo that coreboot
|
|
|
|
should initialize.
|
|
|
|
|
2016-09-28 23:10:06 +02:00
|
|
|
choice
|
|
|
|
prompt "FSP binary type"
|
|
|
|
default FSP_BUILD_TYPE_DEBUG
|
|
|
|
|
|
|
|
config FSP_BUILD_TYPE_DEBUG
|
|
|
|
bool "Debug"
|
|
|
|
help
|
|
|
|
Use the debug version of FSP
|
|
|
|
config FSP_BUILD_TYPE_RELEASE
|
|
|
|
bool "Release"
|
|
|
|
help
|
|
|
|
Use the release version of FSP
|
|
|
|
|
|
|
|
endchoice
|
|
|
|
|
|
|
|
config FSP_BUILD_TYPE
|
|
|
|
string
|
|
|
|
default "DEBUG" if FSP_BUILD_TYPE_DEBUG
|
|
|
|
default "RELEASE" if FSP_BUILD_TYPE_RELEASE
|
|
|
|
|
|
|
|
choice
|
|
|
|
prompt "FSP type"
|
2019-01-16 02:57:30 +01:00
|
|
|
default FSP_TYPE_2_0_PEI
|
2016-09-28 23:10:06 +02:00
|
|
|
|
|
|
|
config FSP_TYPE_2_0
|
|
|
|
bool "MemInit subroutine"
|
|
|
|
help
|
|
|
|
FSP 2.0 implemented as subroutines, no EDK-II cores
|
|
|
|
config FSP_TYPE_2_0_PEI
|
|
|
|
bool "SEC + PEI Core + MemInit PEIM"
|
|
|
|
help
|
|
|
|
FSP 2.0 implemented using SEC and PEI core
|
|
|
|
|
|
|
|
endchoice
|
|
|
|
|
|
|
|
config FSP_TYPE
|
|
|
|
string
|
|
|
|
default "Fsp2_0" if FSP_TYPE_2_0
|
|
|
|
default "Fsp2_0Pei" if FSP_TYPE_2_0_PEI
|
|
|
|
|
|
|
|
config FSP_DEBUG_ALL
|
|
|
|
bool "Enable all FSP debug support"
|
|
|
|
default y
|
|
|
|
# Enable display and verification for coreboot build tests
|
|
|
|
select DISPLAY_HOBS
|
|
|
|
select DISPLAY_MTRRS
|
|
|
|
select DISPLAY_UPD_DATA
|
2019-01-16 02:57:30 +01:00
|
|
|
select DISPLAY_ESRAM_LAYOUT
|
|
|
|
select DISPLAY_FSP_CALLS_AND_STATUS
|
|
|
|
select DISPLAY_FSP_HEADER
|
|
|
|
select VERIFY_HOBS
|
2016-09-28 23:10:06 +02:00
|
|
|
help
|
|
|
|
Turn on debug support to display HOBS, MTRRS, SMM_MEMORY_MAP, UPD_DATA
|
|
|
|
also turn on FSP 2.0 debug support for ESRAM_LAYOUT,
|
|
|
|
FSP_CALLS_AND_STATUS, FSP_HEADER, POSTCAR_CONSOLE and VERIFY_HOBS
|
2016-05-28 23:58:57 +02:00
|
|
|
|
2017-01-04 17:34:01 +01:00
|
|
|
config VBOOT_WITH_CRYPTO_SHIELD
|
|
|
|
bool "Verified boot using the Crypto Shield board"
|
|
|
|
default n
|
|
|
|
select COLLECT_TIMESTAMPS
|
2017-02-14 02:53:29 +01:00
|
|
|
select VBOOT_SEPARATE_VERSTAGE
|
2017-01-04 17:34:01 +01:00
|
|
|
select VBOOT
|
|
|
|
select VBOOT_STARTS_IN_BOOTBLOCK
|
|
|
|
select VBOOT_VBNV_CMOS
|
|
|
|
help
|
|
|
|
Perform a verified boot using the TPM on the Crypto Shield board.
|
|
|
|
|
|
|
|
config DRIVER_TPM_I2C_ADDR
|
|
|
|
hex "Address of the I2C TPM chip"
|
|
|
|
depends on VBOOT_WITH_CRYPTO_SHIELD
|
|
|
|
default 0x29
|
|
|
|
help
|
|
|
|
I2C address of the TPM chip on the Crypto Shield board.
|
|
|
|
|
|
|
|
config FMDFILE
|
|
|
|
string "FMAP description file in fmd format"
|
|
|
|
depends on VBOOT
|
2020-06-17 21:06:53 +02:00
|
|
|
default "src/mainboard/\$(CONFIG_MAINBOARD_DIR)/vboot.fmd"
|
2017-01-04 17:34:01 +01:00
|
|
|
help
|
|
|
|
The build system creates a default FMAP from ROM_SIZE and CBFS_SIZE,
|
|
|
|
but in some cases more complex setups are required.
|
|
|
|
|
|
|
|
When an FMD descriptionn file is specified, the build system uses it
|
|
|
|
instead of creating a default FMAP file.
|
|
|
|
|
2017-04-07 21:07:46 +02:00
|
|
|
config ENABLE_SD_TESTING
|
|
|
|
bool "Enable SD card testing"
|
|
|
|
default y
|
2017-05-09 01:56:03 +02:00
|
|
|
select COMMONLIB_STORAGE_SD
|
2017-04-07 21:07:46 +02:00
|
|
|
select SDHC_DEBUG
|
|
|
|
select STORAGE_LOG
|
|
|
|
select STORAGE_TEST
|
|
|
|
|
2016-01-26 19:06:42 +01:00
|
|
|
endif # BOARD_INTEL_QUARK
|