Sean Rhodes has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/61549 )
Change subject: soc/intel: Allow limiting writes to SMM via CMOS ......................................................................
soc/intel: Allow limiting writes to SMM via CMOS
Allow using CMOS setting of "smm_bwp" to limit writes, in addition to the Kconfig option.
Signed-off-by: Sean Rhodes sean@starlabs.systems Change-Id: Ibd1078a843258b737fe55a491e2b0b285fcabb03 --- M src/soc/intel/common/pch/lockdown/lockdown.c 1 file changed, 1 insertion(+), 1 deletion(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/49/61549/1
diff --git a/src/soc/intel/common/pch/lockdown/lockdown.c b/src/soc/intel/common/pch/lockdown/lockdown.c index 5ab0611..167dd02 100644 --- a/src/soc/intel/common/pch/lockdown/lockdown.c +++ b/src/soc/intel/common/pch/lockdown/lockdown.c @@ -66,7 +66,7 @@ fast_spi_set_bios_interface_lock_down();
/* Only allow writes in SMM */ - if (CONFIG(BOOTMEDIA_SMM_BWP)) { + if (CONFIG(BOOTMEDIA_SMM_BWP) || get_uint_option("smm_bwp", UINT_MAX)) { fast_spi_set_eiss(); fast_spi_enable_wp(); }