blob: 2d960d6b476c4d9d323fb894a962f98d7e533e91 [file] [log] [blame]
config SOC_INTEL_COMMON_BLOCK_SMM
bool
help
Intel Processor common SMM support
config SOC_INTEL_COMMON_BLOCK_SMM_IO_TRAP
bool
help
Intel Processor trap flag if it is supported
config SOC_INTEL_COMMON_BLOCK_SMM_LOCK_GPIO_PADS
bool
help
Enable locking of security-sensitive SoC and mainboard GPIOs.
An SoC may provide a list of gpios to lock, and the mainboard
may also provide a list of gpios to lock.
config SOC_INTEL_COMMON_BLOCK_SMM_ESPI_DISABLE
bool
default n
help
Disable eSPI SMI source to prevent the embedded controller
from asserting SMI while in firmware.
config SOC_INTEL_COMMON_BLOCK_SMM_TCO_ENABLE
bool "Enable TCO SMI"
default n
help
Enable TCO SMI source to e.g. handle case instrusion.
config SOC_INTEL_COMMON_BLOCK_SMM_S5_DELAY_MS
int
default 100 if CHROMEOS
default 0
help
Time in milliseconds that SLP_SMI for S5 waits for before
enabling sleep. This is required to avoid any race between
SLP_SMI and PWRBTN SMI.
config HECI_DISABLE_USING_SMM
bool
depends on SOC_INTEL_COMMON_BLOCK_SMM
default n
help
HECI disable using SMM. Select this option to make HECI disable
using SMM mode, independent of dedicated UPD to perform HECI disable.