Kyösti Mälkki | 71216c9 | 2013-07-28 23:39:37 +0300 | [diff] [blame] | 1 | config SOUTHBRIDGE_INTEL_COMMON |
| 2 | def_bool n |
Patrick Rudolph | 45022ae | 2018-10-01 19:17:11 +0200 | [diff] [blame] | 3 | select SOUTHBRIDGE_INTEL_COMMON_RESET |
| 4 | |
| 5 | config SOUTHBRIDGE_INTEL_COMMON_RESET |
| 6 | bool |
| 7 | select HAVE_CF9_RESET |
Kyösti Mälkki | b5d998b | 2017-08-20 21:36:08 +0300 | [diff] [blame] | 8 | |
Patrick Rudolph | 59de6c9 | 2015-12-26 08:33:16 +0100 | [diff] [blame] | 9 | config SOUTHBRIDGE_INTEL_COMMON_GPIO |
| 10 | def_bool n |
Kyösti Mälkki | b5d998b | 2017-08-20 21:36:08 +0300 | [diff] [blame] | 11 | |
Arthur Heymans | 16fe790 | 2017-04-12 17:01:31 +0200 | [diff] [blame] | 12 | config SOUTHBRIDGE_INTEL_COMMON_SMBUS |
| 13 | def_bool n |
Kyösti Mälkki | b5d998b | 2017-08-20 21:36:08 +0300 | [diff] [blame] | 14 | select HAVE_DEBUG_SMBUS |
| 15 | |
Arthur Heymans | bddef0d | 2017-09-25 12:21:07 +0200 | [diff] [blame] | 16 | config SOUTHBRIDGE_INTEL_COMMON_SPI |
| 17 | def_bool n |
| 18 | select SPI_FLASH |
| 19 | |
Tobias Diedrich | 9d8be5a | 2017-12-13 23:25:32 +0100 | [diff] [blame] | 20 | config SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN |
| 21 | def_bool n |
| 22 | |
| 23 | config SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ |
| 24 | def_bool n |
| 25 | select SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN |
| 26 | |
Bill XIE | d533b16 | 2017-08-22 16:26:22 +0800 | [diff] [blame] | 27 | config HAVE_INTEL_CHIPSET_LOCKDOWN |
| 28 | def_bool n |
| 29 | |
Arthur Heymans | a050817 | 2018-01-25 11:30:22 +0100 | [diff] [blame] | 30 | config SOUTHBRIDGE_INTEL_COMMON_SMM |
| 31 | def_bool n |
| 32 | |
Tristan Corrick | 167a512 | 2018-10-31 02:28:32 +1300 | [diff] [blame] | 33 | config SOUTHBRIDGE_INTEL_COMMON_ACPI_MADT |
| 34 | bool |
| 35 | |
Tristan Corrick | 63626b1 | 2018-11-30 22:53:50 +1300 | [diff] [blame^] | 36 | config SOUTHBRIDGE_INTEL_COMMON_FINALIZE |
| 37 | bool |
| 38 | |
Stefan Tauner | ef8b957 | 2018-09-06 00:34:28 +0200 | [diff] [blame] | 39 | config INTEL_DESCRIPTOR_MODE_CAPABLE |
| 40 | def_bool n |
| 41 | help |
| 42 | This config simply states that the platform is *capable* of running in |
| 43 | descriptor mode (when the descriptor in flash is valid). |
| 44 | |
Angel Pons | a52016c | 2018-09-11 13:49:45 +0200 | [diff] [blame] | 45 | config INTEL_DESCRIPTOR_MODE_REQUIRED |
| 46 | def_bool y if INTEL_DESCRIPTOR_MODE_CAPABLE |
| 47 | help |
| 48 | This config states descriptor mode is *required* for the platform to |
| 49 | function properly, or to function at all. |
| 50 | |
Bill XIE | d533b16 | 2017-08-22 16:26:22 +0800 | [diff] [blame] | 51 | config INTEL_CHIPSET_LOCKDOWN |
| 52 | depends on HAVE_INTEL_CHIPSET_LOCKDOWN && HAVE_SMI_HANDLER && !CHROMEOS |
| 53 | #ChromeOS's payload seems to handle finalization on its on. |
| 54 | bool "Lock down chipset in coreboot" |
| 55 | default y |
| 56 | help |
| 57 | Some registers within host bridge on particular chipsets should be |
| 58 | locked down on each normal boot path (done by either coreboot or payload) |
| 59 | and S3 resume (always done by coreboot). Select this to let coreboot |
| 60 | to do this on normal boot path. |
Tristan Corrick | 63626b1 | 2018-11-30 22:53:50 +1300 | [diff] [blame^] | 61 | |
| 62 | if SOUTHBRIDGE_INTEL_COMMON_FINALIZE |
| 63 | |
| 64 | choice |
| 65 | prompt "Flash locking during chipset lockdown" |
| 66 | default LOCK_SPI_FLASH_NONE |
| 67 | |
| 68 | config LOCK_SPI_FLASH_NONE |
| 69 | bool "Don't lock flash sections" |
| 70 | |
| 71 | config LOCK_SPI_FLASH_RO |
| 72 | bool "Write-protect all flash sections" |
| 73 | help |
| 74 | Select this if you want to write-protect the whole firmware flash |
| 75 | chip. The locking will take place during the chipset lockdown, which |
| 76 | is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set) |
| 77 | or has to be triggered later (e.g. by the payload or the OS). |
| 78 | |
| 79 | NOTE: If you trigger the chipset lockdown unconditionally, |
| 80 | you won't be able to write to the flash chip using the |
| 81 | internal programmer any more. |
| 82 | |
| 83 | config LOCK_SPI_FLASH_NO_ACCESS |
| 84 | bool "Write-protect all flash sections and read-protect non-BIOS sections" |
| 85 | help |
| 86 | Select this if you want to protect the firmware flash against all |
| 87 | further accesses (with the exception of the memory mapped BIOS re- |
| 88 | gion which is always readable). The locking will take place during |
| 89 | the chipset lockdown, which is either triggered by coreboot (when |
| 90 | INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g. |
| 91 | by the payload or the OS). |
| 92 | |
| 93 | NOTE: If you trigger the chipset lockdown unconditionally, |
| 94 | you won't be able to write to the flash chip using the |
| 95 | internal programmer any more. |
| 96 | |
| 97 | endchoice |
| 98 | |
| 99 | endif |