blob: dfd89755ec266aaef1af706d397b3e69f4ca10ae [file] [log] [blame]
Kyösti Mälkki71216c92013-07-28 23:39:37 +03001config SOUTHBRIDGE_INTEL_COMMON
2 def_bool n
Patrick Rudolph45022ae2018-10-01 19:17:11 +02003 select SOUTHBRIDGE_INTEL_COMMON_RESET
4
5config SOUTHBRIDGE_INTEL_COMMON_RESET
6 bool
7 select HAVE_CF9_RESET
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +03008
Patrick Rudolph1ae592b2019-03-24 14:41:45 +01009config SOUTHBRIDGE_INTEL_COMMON_PMCLIB
10 def_bool n
11 depends on SOUTHBRIDGE_INTEL_COMMON
12
Patrick Rudolph59de6c92015-12-26 08:33:16 +010013config SOUTHBRIDGE_INTEL_COMMON_GPIO
14 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030015
Arthur Heymans16fe7902017-04-12 17:01:31 +020016config SOUTHBRIDGE_INTEL_COMMON_SMBUS
17 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030018 select HAVE_DEBUG_SMBUS
19
Arthur Heymansbddef0d2017-09-25 12:21:07 +020020config SOUTHBRIDGE_INTEL_COMMON_SPI
21 def_bool n
22 select SPI_FLASH
Arthur Heymans4c804252018-12-03 01:28:18 +010023 select BOOT_DEVICE_SUPPORTS_WRITES
Arthur Heymansbddef0d2017-09-25 12:21:07 +020024
Tobias Diedrich9d8be5a2017-12-13 23:25:32 +010025config SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
26 def_bool n
27
28config SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
29 def_bool n
30 select SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
31
Bill XIEd533b162017-08-22 16:26:22 +080032config HAVE_INTEL_CHIPSET_LOCKDOWN
33 def_bool n
34
Arthur Heymansa0508172018-01-25 11:30:22 +010035config SOUTHBRIDGE_INTEL_COMMON_SMM
36 def_bool n
Nico Huber9faae2b2018-11-14 00:00:35 +010037 select HAVE_POWER_STATE_AFTER_FAILURE
38 select HAVE_POWER_STATE_PREVIOUS_AFTER_FAILURE
Arthur Heymansa0508172018-01-25 11:30:22 +010039
Tristan Corrick167a5122018-10-31 02:28:32 +130040config SOUTHBRIDGE_INTEL_COMMON_ACPI_MADT
41 bool
42
Tristan Corrick63626b12018-11-30 22:53:50 +130043config SOUTHBRIDGE_INTEL_COMMON_FINALIZE
44 bool
45
Stefan Tauneref8b9572018-09-06 00:34:28 +020046config INTEL_DESCRIPTOR_MODE_CAPABLE
47 def_bool n
48 help
49 This config simply states that the platform is *capable* of running in
50 descriptor mode (when the descriptor in flash is valid).
51
Angel Ponsa52016c2018-09-11 13:49:45 +020052config INTEL_DESCRIPTOR_MODE_REQUIRED
53 def_bool y if INTEL_DESCRIPTOR_MODE_CAPABLE
54 help
55 This config states descriptor mode is *required* for the platform to
56 function properly, or to function at all.
57
Bill XIEd533b162017-08-22 16:26:22 +080058config INTEL_CHIPSET_LOCKDOWN
59 depends on HAVE_INTEL_CHIPSET_LOCKDOWN && HAVE_SMI_HANDLER && !CHROMEOS
60 #ChromeOS's payload seems to handle finalization on its on.
61 bool "Lock down chipset in coreboot"
62 default y
63 help
64 Some registers within host bridge on particular chipsets should be
65 locked down on each normal boot path (done by either coreboot or payload)
66 and S3 resume (always done by coreboot). Select this to let coreboot
67 to do this on normal boot path.
Tristan Corrick63626b12018-11-30 22:53:50 +130068
Elyes HAOUAS551a7592019-05-01 16:56:36 +020069config SOUTHBRIDGE_INTEL_COMMON_WATCHDOG
70 bool
71 depends on SOUTHBRIDGE_INTEL_COMMON
72
Tristan Corrick63626b12018-11-30 22:53:50 +130073if SOUTHBRIDGE_INTEL_COMMON_FINALIZE
74
75choice
76 prompt "Flash locking during chipset lockdown"
77 default LOCK_SPI_FLASH_NONE
78
79config LOCK_SPI_FLASH_NONE
80 bool "Don't lock flash sections"
81
82config LOCK_SPI_FLASH_RO
83 bool "Write-protect all flash sections"
84 help
85 Select this if you want to write-protect the whole firmware flash
86 chip. The locking will take place during the chipset lockdown, which
87 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
88 or has to be triggered later (e.g. by the payload or the OS).
89
90 NOTE: If you trigger the chipset lockdown unconditionally,
91 you won't be able to write to the flash chip using the
92 internal programmer any more.
93
94config LOCK_SPI_FLASH_NO_ACCESS
95 bool "Write-protect all flash sections and read-protect non-BIOS sections"
96 help
97 Select this if you want to protect the firmware flash against all
98 further accesses (with the exception of the memory mapped BIOS re-
99 gion which is always readable). The locking will take place during
100 the chipset lockdown, which is either triggered by coreboot (when
101 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
102 by the payload or the OS).
103
104 NOTE: If you trigger the chipset lockdown unconditionally,
105 you won't be able to write to the flash chip using the
106 internal programmer any more.
107
108endchoice
109
110endif