blob: 6a96277844576d8307c9ebf266f0360a18dd9150 [file] [log] [blame]
Kyösti Mälkki71216c92013-07-28 23:39:37 +03001config SOUTHBRIDGE_INTEL_COMMON
2 def_bool n
Patrick Rudolph45022ae2018-10-01 19:17:11 +02003 select SOUTHBRIDGE_INTEL_COMMON_RESET
4
5config SOUTHBRIDGE_INTEL_COMMON_RESET
6 bool
7 select HAVE_CF9_RESET
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +03008
Patrick Rudolph59de6c92015-12-26 08:33:16 +01009config SOUTHBRIDGE_INTEL_COMMON_GPIO
10 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030011
Arthur Heymans16fe7902017-04-12 17:01:31 +020012config SOUTHBRIDGE_INTEL_COMMON_SMBUS
13 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030014 select HAVE_DEBUG_SMBUS
15
Arthur Heymansbddef0d2017-09-25 12:21:07 +020016config SOUTHBRIDGE_INTEL_COMMON_SPI
17 def_bool n
18 select SPI_FLASH
19
Tobias Diedrich9d8be5a2017-12-13 23:25:32 +010020config SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
21 def_bool n
22
23config SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
24 def_bool n
25 select SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
26
Bill XIEd533b162017-08-22 16:26:22 +080027config HAVE_INTEL_CHIPSET_LOCKDOWN
28 def_bool n
29
Arthur Heymansa0508172018-01-25 11:30:22 +010030config SOUTHBRIDGE_INTEL_COMMON_SMM
31 def_bool n
Nico Huber9faae2b2018-11-14 00:00:35 +010032 select HAVE_POWER_STATE_AFTER_FAILURE
33 select HAVE_POWER_STATE_PREVIOUS_AFTER_FAILURE
Arthur Heymansa0508172018-01-25 11:30:22 +010034
Tristan Corrick167a5122018-10-31 02:28:32 +130035config SOUTHBRIDGE_INTEL_COMMON_ACPI_MADT
36 bool
37
Tristan Corrick63626b12018-11-30 22:53:50 +130038config SOUTHBRIDGE_INTEL_COMMON_FINALIZE
39 bool
40
Stefan Tauneref8b9572018-09-06 00:34:28 +020041config INTEL_DESCRIPTOR_MODE_CAPABLE
42 def_bool n
43 help
44 This config simply states that the platform is *capable* of running in
45 descriptor mode (when the descriptor in flash is valid).
46
Angel Ponsa52016c2018-09-11 13:49:45 +020047config INTEL_DESCRIPTOR_MODE_REQUIRED
48 def_bool y if INTEL_DESCRIPTOR_MODE_CAPABLE
49 help
50 This config states descriptor mode is *required* for the platform to
51 function properly, or to function at all.
52
Bill XIEd533b162017-08-22 16:26:22 +080053config INTEL_CHIPSET_LOCKDOWN
54 depends on HAVE_INTEL_CHIPSET_LOCKDOWN && HAVE_SMI_HANDLER && !CHROMEOS
55 #ChromeOS's payload seems to handle finalization on its on.
56 bool "Lock down chipset in coreboot"
57 default y
58 help
59 Some registers within host bridge on particular chipsets should be
60 locked down on each normal boot path (done by either coreboot or payload)
61 and S3 resume (always done by coreboot). Select this to let coreboot
62 to do this on normal boot path.
Tristan Corrick63626b12018-11-30 22:53:50 +130063
64if SOUTHBRIDGE_INTEL_COMMON_FINALIZE
65
66choice
67 prompt "Flash locking during chipset lockdown"
68 default LOCK_SPI_FLASH_NONE
69
70config LOCK_SPI_FLASH_NONE
71 bool "Don't lock flash sections"
72
73config LOCK_SPI_FLASH_RO
74 bool "Write-protect all flash sections"
75 help
76 Select this if you want to write-protect the whole firmware flash
77 chip. The locking will take place during the chipset lockdown, which
78 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
79 or has to be triggered later (e.g. by the payload or the OS).
80
81 NOTE: If you trigger the chipset lockdown unconditionally,
82 you won't be able to write to the flash chip using the
83 internal programmer any more.
84
85config LOCK_SPI_FLASH_NO_ACCESS
86 bool "Write-protect all flash sections and read-protect non-BIOS sections"
87 help
88 Select this if you want to protect the firmware flash against all
89 further accesses (with the exception of the memory mapped BIOS re-
90 gion which is always readable). The locking will take place during
91 the chipset lockdown, which is either triggered by coreboot (when
92 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
93 by the payload or the OS).
94
95 NOTE: If you trigger the chipset lockdown unconditionally,
96 you won't be able to write to the flash chip using the
97 internal programmer any more.
98
99endchoice
100
101endif