Some platforms can have INTRUDER# asserted continuously. If it is routed to SMI, this can cause an SMI storm and prevent boot. Introduce SOC_INTEL_COMMON_BLOCK_SMM_TCO_INTRUDER_SMI_ENABLE to control whether INTRUDER# is routed to SMI, while keeping TCO SMIs available for other uses (e.g. SPI sync SMIs needed by BOOTMEDIA_SMM_BWP). TEST=build Change-Id: I33eb8ce3bee64c95a4d5a6f95a096577d55c742d Signed-off-by: Sean Rhodes <sean@starlabs.systems> Reviewed-on: https://review.coreboot.org/c/coreboot/+/91335 Reviewed-by: Matt DeVillier <matt.devillier@gmail.com> Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Angel Pons <th3fanbus@gmail.com> |
||
|---|---|---|
| .. | ||
| amd | ||
| cavium | ||
| example/min86 | ||
| ibm/power9 | ||
| intel | ||
| mediatek | ||
| nvidia | ||
| qualcomm | ||
| rockchip | ||
| samsung | ||
| sifive | ||
| ti | ||
| ucb/riscv | ||
| xilinx | ||