blob: ba53f6842377f6dcba8bd8e4af62f6a09cbccef5 [file] [log] [blame]
Kyösti Mälkki71216c92013-07-28 23:39:37 +03001config SOUTHBRIDGE_INTEL_COMMON
2 def_bool n
Patrick Rudolph45022ae2018-10-01 19:17:11 +02003 select SOUTHBRIDGE_INTEL_COMMON_RESET
4
5config SOUTHBRIDGE_INTEL_COMMON_RESET
6 bool
7 select HAVE_CF9_RESET
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +03008
Patrick Rudolph59de6c92015-12-26 08:33:16 +01009config SOUTHBRIDGE_INTEL_COMMON_GPIO
10 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030011
Arthur Heymans16fe7902017-04-12 17:01:31 +020012config SOUTHBRIDGE_INTEL_COMMON_SMBUS
13 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030014 select HAVE_DEBUG_SMBUS
15
Arthur Heymansbddef0d2017-09-25 12:21:07 +020016config SOUTHBRIDGE_INTEL_COMMON_SPI
17 def_bool n
18 select SPI_FLASH
19
Tobias Diedrich9d8be5a2017-12-13 23:25:32 +010020config SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
21 def_bool n
22
23config SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
24 def_bool n
25 select SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
26
Bill XIEd533b162017-08-22 16:26:22 +080027config HAVE_INTEL_CHIPSET_LOCKDOWN
28 def_bool n
29
Arthur Heymansa0508172018-01-25 11:30:22 +010030config SOUTHBRIDGE_INTEL_COMMON_SMM
31 def_bool n
32
Tristan Corrick167a5122018-10-31 02:28:32 +130033config SOUTHBRIDGE_INTEL_COMMON_ACPI_MADT
34 bool
35
Tristan Corrick63626b12018-11-30 22:53:50 +130036config SOUTHBRIDGE_INTEL_COMMON_FINALIZE
37 bool
38
Stefan Tauneref8b9572018-09-06 00:34:28 +020039config INTEL_DESCRIPTOR_MODE_CAPABLE
40 def_bool n
41 help
42 This config simply states that the platform is *capable* of running in
43 descriptor mode (when the descriptor in flash is valid).
44
Angel Ponsa52016c2018-09-11 13:49:45 +020045config INTEL_DESCRIPTOR_MODE_REQUIRED
46 def_bool y if INTEL_DESCRIPTOR_MODE_CAPABLE
47 help
48 This config states descriptor mode is *required* for the platform to
49 function properly, or to function at all.
50
Bill XIEd533b162017-08-22 16:26:22 +080051config INTEL_CHIPSET_LOCKDOWN
52 depends on HAVE_INTEL_CHIPSET_LOCKDOWN && HAVE_SMI_HANDLER && !CHROMEOS
53 #ChromeOS's payload seems to handle finalization on its on.
54 bool "Lock down chipset in coreboot"
55 default y
56 help
57 Some registers within host bridge on particular chipsets should be
58 locked down on each normal boot path (done by either coreboot or payload)
59 and S3 resume (always done by coreboot). Select this to let coreboot
60 to do this on normal boot path.
Tristan Corrick63626b12018-11-30 22:53:50 +130061
62if SOUTHBRIDGE_INTEL_COMMON_FINALIZE
63
64choice
65 prompt "Flash locking during chipset lockdown"
66 default LOCK_SPI_FLASH_NONE
67
68config LOCK_SPI_FLASH_NONE
69 bool "Don't lock flash sections"
70
71config LOCK_SPI_FLASH_RO
72 bool "Write-protect all flash sections"
73 help
74 Select this if you want to write-protect the whole firmware flash
75 chip. The locking will take place during the chipset lockdown, which
76 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
77 or has to be triggered later (e.g. by the payload or the OS).
78
79 NOTE: If you trigger the chipset lockdown unconditionally,
80 you won't be able to write to the flash chip using the
81 internal programmer any more.
82
83config LOCK_SPI_FLASH_NO_ACCESS
84 bool "Write-protect all flash sections and read-protect non-BIOS sections"
85 help
86 Select this if you want to protect the firmware flash against all
87 further accesses (with the exception of the memory mapped BIOS re-
88 gion which is always readable). The locking will take place during
89 the chipset lockdown, which is either triggered by coreboot (when
90 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
91 by the payload or the OS).
92
93 NOTE: If you trigger the chipset lockdown unconditionally,
94 you won't be able to write to the flash chip using the
95 internal programmer any more.
96
97endchoice
98
99endif