blob: 31039b68b414ee28a3cdfe30cda12fbf826ba08f [file] [log] [blame]
Kyösti Mälkki71216c92013-07-28 23:39:37 +03001config SOUTHBRIDGE_INTEL_COMMON
2 def_bool n
Patrick Rudolph45022ae2018-10-01 19:17:11 +02003 select SOUTHBRIDGE_INTEL_COMMON_RESET
4
5config SOUTHBRIDGE_INTEL_COMMON_RESET
6 bool
7 select HAVE_CF9_RESET
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +03008
Patrick Rudolph1ae592b2019-03-24 14:41:45 +01009config SOUTHBRIDGE_INTEL_COMMON_PMCLIB
10 def_bool n
11 depends on SOUTHBRIDGE_INTEL_COMMON
12
Patrick Rudolph59de6c92015-12-26 08:33:16 +010013config SOUTHBRIDGE_INTEL_COMMON_GPIO
14 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030015
Arthur Heymans16fe7902017-04-12 17:01:31 +020016config SOUTHBRIDGE_INTEL_COMMON_SMBUS
17 def_bool n
Kyösti Mälkkib5d998b2017-08-20 21:36:08 +030018 select HAVE_DEBUG_SMBUS
19
Arthur Heymansbddef0d2017-09-25 12:21:07 +020020config SOUTHBRIDGE_INTEL_COMMON_SPI
21 def_bool n
22 select SPI_FLASH
Arthur Heymans4c804252018-12-03 01:28:18 +010023 select BOOT_DEVICE_SUPPORTS_WRITES
Arthur Heymansbddef0d2017-09-25 12:21:07 +020024
Tobias Diedrich9d8be5a2017-12-13 23:25:32 +010025config SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
26 def_bool n
27
28config SOUTHBRIDGE_INTEL_COMMON_RCBA_PIRQ
29 def_bool n
30 select SOUTHBRIDGE_INTEL_COMMON_PIRQ_ACPI_GEN
31
Bill XIEd533b162017-08-22 16:26:22 +080032config HAVE_INTEL_CHIPSET_LOCKDOWN
33 def_bool n
34
Arthur Heymansa0508172018-01-25 11:30:22 +010035config SOUTHBRIDGE_INTEL_COMMON_SMM
36 def_bool n
Nico Huber9faae2b2018-11-14 00:00:35 +010037 select HAVE_POWER_STATE_AFTER_FAILURE
38 select HAVE_POWER_STATE_PREVIOUS_AFTER_FAILURE
Arthur Heymansa0508172018-01-25 11:30:22 +010039
Tristan Corrick167a5122018-10-31 02:28:32 +130040config SOUTHBRIDGE_INTEL_COMMON_ACPI_MADT
41 bool
42
Tristan Corrick63626b12018-11-30 22:53:50 +130043config SOUTHBRIDGE_INTEL_COMMON_FINALIZE
44 bool
45
Stefan Tauneref8b9572018-09-06 00:34:28 +020046config INTEL_DESCRIPTOR_MODE_CAPABLE
47 def_bool n
48 help
49 This config simply states that the platform is *capable* of running in
50 descriptor mode (when the descriptor in flash is valid).
51
Angel Ponsa52016c2018-09-11 13:49:45 +020052config INTEL_DESCRIPTOR_MODE_REQUIRED
53 def_bool y if INTEL_DESCRIPTOR_MODE_CAPABLE
54 help
55 This config states descriptor mode is *required* for the platform to
56 function properly, or to function at all.
57
Mathew Kingd8b150f2019-08-09 10:55:37 -060058config VALIDATE_INTEL_DESCRIPTOR
59 depends on INTEL_DESCRIPTOR_MODE_CAPABLE
60 bool "Validate Intel firmware descriptor"
61 default n
62 help
63 This config enables validating the Intel firmware descriptor against the
64 fmap layout. If the firmware descriptor layout does not match the fmap
65 then the bootimage cannot be built.
66
Bill XIEd533b162017-08-22 16:26:22 +080067config INTEL_CHIPSET_LOCKDOWN
68 depends on HAVE_INTEL_CHIPSET_LOCKDOWN && HAVE_SMI_HANDLER && !CHROMEOS
69 #ChromeOS's payload seems to handle finalization on its on.
70 bool "Lock down chipset in coreboot"
71 default y
72 help
73 Some registers within host bridge on particular chipsets should be
74 locked down on each normal boot path (done by either coreboot or payload)
75 and S3 resume (always done by coreboot). Select this to let coreboot
76 to do this on normal boot path.
Tristan Corrick63626b12018-11-30 22:53:50 +130077
Elyes HAOUAS551a7592019-05-01 16:56:36 +020078config SOUTHBRIDGE_INTEL_COMMON_WATCHDOG
79 bool
80 depends on SOUTHBRIDGE_INTEL_COMMON
81
Tristan Corrick63626b12018-11-30 22:53:50 +130082if SOUTHBRIDGE_INTEL_COMMON_FINALIZE
83
84choice
85 prompt "Flash locking during chipset lockdown"
86 default LOCK_SPI_FLASH_NONE
87
88config LOCK_SPI_FLASH_NONE
89 bool "Don't lock flash sections"
90
91config LOCK_SPI_FLASH_RO
92 bool "Write-protect all flash sections"
93 help
94 Select this if you want to write-protect the whole firmware flash
95 chip. The locking will take place during the chipset lockdown, which
96 is either triggered by coreboot (when INTEL_CHIPSET_LOCKDOWN is set)
97 or has to be triggered later (e.g. by the payload or the OS).
98
99 NOTE: If you trigger the chipset lockdown unconditionally,
100 you won't be able to write to the flash chip using the
101 internal programmer any more.
102
103config LOCK_SPI_FLASH_NO_ACCESS
104 bool "Write-protect all flash sections and read-protect non-BIOS sections"
105 help
106 Select this if you want to protect the firmware flash against all
107 further accesses (with the exception of the memory mapped BIOS re-
108 gion which is always readable). The locking will take place during
109 the chipset lockdown, which is either triggered by coreboot (when
110 INTEL_CHIPSET_LOCKDOWN is set) or has to be triggered later (e.g.
111 by the payload or the OS).
112
113 NOTE: If you trigger the chipset lockdown unconditionally,
114 you won't be able to write to the flash chip using the
115 internal programmer any more.
116
117endchoice
118
119endif