blob: d1b6bf6024a78b9a8c01f83df41a610dca938607 [file] [log] [blame]
Patrick Rudolph45022ae2018-10-01 19:17:11 +02001config SOUTHBRIDGE_INTEL_COMMON_RESET
Arthur Heymans23a6c792019-10-13 22:36:04 +02002 def_bool n
Patrick Rudolph45022ae2018-10-01 19:17:11 +02003 select HAVE_CF9_RESET
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +03004
Arthur Heymans074730c2019-06-04 14:05:53 +02005config SOUTHBRIDGE_INTEL_COMMON_RTC
6 def_bool n
Arthur Heymans074730c2019-06-04 14:05:53 +02007
Patrick Rudolph1ae592b2019-03-24 14:41:45 +01008config SOUTHBRIDGE_INTEL_COMMON_PMCLIB
9 def_bool n
Arthur Heymansb8bda112019-06-04 13:57:47 +020010 depends on SOUTHBRIDGE_INTEL_COMMON_PMBASE
11
12config SOUTHBRIDGE_INTEL_COMMON_PMBASE
13 def_bool n
Patrick Rudolph1ae592b2019-03-24 14:41:45 +010014
Patrick Rudolph59de6c92015-12-26 08:33:16 +010015config SOUTHBRIDGE_INTEL_COMMON_GPIO
16 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030017
Arthur Heymans16fe7902017-04-12 17:01:31 +020018config SOUTHBRIDGE_INTEL_COMMON_SMBUS
19 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030020 select HAVE_DEBUG_SMBUS
21
Arthur Heymansbddef0d2017-09-25 12:21:07 +020022config SOUTHBRIDGE_INTEL_COMMON_SPI
23 def_bool n
24 select SPI_FLASH
Arthur Heymans4c804252018-12-03 01:28:18 +010025 select BOOT_DEVICE_SUPPORTS_WRITES
Arthur Heymansbddef0d2017-09-25 12:21:07 +020026
Arthur Heymans47a66032019-10-25 23:43:14 +020027config SOUTHBRIDGE_INTEL_COMMON_SPI_ICH7
28 def_bool n
29 select SOUTHBRIDGE_INTEL_COMMON_SPI
30
31config SOUTHBRIDGE_INTEL_COMMON_SPI_ICH9
32 def_bool n
33 select SOUTHBRIDGE_INTEL_COMMON_SPI
34
35config SOUTHBRIDGE_INTEL_COMMON_SPI_SILVERMONT
36 def_bool n
37 select SOUTHBRIDGE_INTEL_COMMON_SPI
38
Tobias Diedrich9d8be5a2017-12-13 23:25:32 +010039config SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
40 def_bool n
41
42config SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
43 def_bool n
44 select SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
45
Bill XIEd533b162017-08-22 16:26:22 +080046config HAVE_INTEL_CHIPSET_LOCKDOWN
47 def_bool n
48
Arthur Heymansa0508172018-01-25 11:30:22 +010049config SOUTHBRIDGE_INTEL_COMMON_SMM
50 def_bool n
Nico Huber9faae2b2018-11-14 00:00:35 +010051 select HAVE_POWER_STATE_AFTER_FAILURE
52 select HAVE_POWER_STATE_PREVIOUS_AFTER_FAILURE
Arthur Heymansb8bda112019-06-04 13:57:47 +020053 select SOUTHBRIDGE_INTEL_COMMON_PMBASE
Arthur Heymansa0508172018-01-25 11:30:22 +010054
Tristan Corrick167a5122018-10-31 02:28:32 +130055config SOUTHBRIDGE_INTEL_COMMON_ACPI_MADT
56 bool
57
Tristan Corrick63626b12018-11-30 22:53:50 +130058config SOUTHBRIDGE_INTEL_COMMON_FINALIZE
59 bool
60
Arthur Heymans3457df12019-11-16 10:04:41 +010061config SOUTHBRIDGE_INTEL_COMMON_USB_DEBUG
62 def_bool n
63 select HAVE_USBDEBUG
64
Stefan Tauneref8b9572018-09-06 00:34:28 +020065config INTEL_DESCRIPTOR_MODE_CAPABLE
66 def_bool n
67 help
68 This config simply states that the platform is *capable* of running in
69 descriptor mode (when the descriptor in flash is valid).
70
Angel Ponsa52016c2018-09-11 13:49:45 +020071config INTEL_DESCRIPTOR_MODE_REQUIRED
72 def_bool y if INTEL_DESCRIPTOR_MODE_CAPABLE
73 help
74 This config states descriptor mode is *required* for the platform to
75 function properly, or to function at all.
76
Mathew Kingd8b150f2019-08-09 10:55:37 -060077config VALIDATE_INTEL_DESCRIPTOR
78 depends on INTEL_DESCRIPTOR_MODE_CAPABLE
79 bool "Validate Intel firmware descriptor"
80 default n
81 help
82 This config enables validating the Intel firmware descriptor against the
83 fmap layout. If the firmware descriptor layout does not match the fmap
84 then the bootimage cannot be built.
85
Bill XIEd533b162017-08-22 16:26:22 +080086config INTEL_CHIPSET_LOCKDOWN
87 depends on HAVE_INTEL_CHIPSET_LOCKDOWN && HAVE_SMI_HANDLER && !CHROMEOS
88 #ChromeOS's payload seems to handle finalization on its on.
89 bool "Lock down chipset in coreboot"
90 default y
91 help
92 Some registers within host bridge on particular chipsets should be
93 locked down on each normal boot path (done by either coreboot or payload)
94 and S3 resume (always done by coreboot). Select this to let coreboot
95 to do this on normal boot path.
Tristan Corrick63626b12018-11-30 22:53:50 +130096
Elyes HAOUAS551a7592019-05-01 16:56:36 +020097config SOUTHBRIDGE_INTEL_COMMON_WATCHDOG
98 bool
Arthur Heymansb8bda112019-06-04 13:57:47 +020099 depends on SOUTHBRIDGE_INTEL_COMMON_PMBASE
Elyes HAOUAS551a7592019-05-01 16:56:36 +0200100
Tristan Corrick63626b12018-11-30 22:53:50 +1300101if SOUTHBRIDGE_INTEL_COMMON_FINALIZE
102
103choice
104 prompt "Flash locking during chipset lockdown"
105 default LOCK_SPI_FLASH_NONE
106
107config LOCK_SPI_FLASH_NONE
108 bool "Don't lock flash sections"
109
110config LOCK_SPI_FLASH_RO
111 bool "Write-protect all flash sections"
112 help
113 Select this if you want to write-protect the whole firmware flash
114 chip. The locking will take place during the chipset lockdown, which
115 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
116 or has to be triggered later (e.g. by the payload or the OS).
117
118 NOTE: If you trigger the chipset lockdown unconditionally,
119 you won't be able to write to the flash chip using the
120 internal programmer any more.
121
122config LOCK_SPI_FLASH_NO_ACCESS
123 bool "Write-protect all flash sections and read-protect non-BIOS sections"
124 help
125 Select this if you want to protect the firmware flash against all
126 further accesses (with the exception of the memory mapped BIOS re-
127 gion which is always readable). The locking will take place during
128 the chipset lockdown, which is either triggered by coreboot (when
129 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
130 by the payload or the OS).
131
132 NOTE: If you trigger the chipset lockdown unconditionally,
133 you won't be able to write to the flash chip using the
134 internal programmer any more.
135
136endchoice
137
138endif