Alexander Graf | 67ee705 | 2016-03-04 01:10:07 +0100 | [diff] [blame] | 1 | config EFI_LOADER |
Heinrich Schuchardt | 96b236a | 2019-05-11 10:27:58 +0200 | [diff] [blame] | 2 | bool "Support running UEFI applications" |
Heinrich Schuchardt | 79cea67 | 2019-11-17 10:44:16 +0100 | [diff] [blame] | 3 | depends on OF_LIBFDT && ( \ |
Heinrich Schuchardt | 30c3a5f | 2019-11-19 04:19:09 +0100 | [diff] [blame] | 4 | ARM && (SYS_CPU = arm1136 || \ |
| 5 | SYS_CPU = arm1176 || \ |
| 6 | SYS_CPU = armv7 || \ |
| 7 | SYS_CPU = armv8) || \ |
Heinrich Schuchardt | 79cea67 | 2019-11-17 10:44:16 +0100 | [diff] [blame] | 8 | X86 || RISCV || SANDBOX) |
Alexander Graf | 5e24717 | 2018-01-24 14:54:21 +0100 | [diff] [blame] | 9 | # We need EFI_STUB_64BIT to be set on x86_64 with EFI_STUB |
| 10 | depends on !EFI_STUB || !X86_64 || EFI_STUB_64BIT |
| 11 | # We need EFI_STUB_32BIT to be set on x86_32 with EFI_STUB |
| 12 | depends on !EFI_STUB || !X86 || X86_64 || EFI_STUB_32BIT |
Heinrich Schuchardt | ac212dc | 2019-11-20 18:48:02 +0100 | [diff] [blame] | 13 | default y if !ARM || SYS_CPU = armv7 || SYS_CPU = armv8 |
Adam Ford | 70c8f05 | 2018-02-06 12:14:28 -0600 | [diff] [blame] | 14 | select LIB_UUID |
Adam Ford | b10ba90 | 2018-02-06 12:43:56 -0600 | [diff] [blame] | 15 | select HAVE_BLOCK_DEVICE |
Heinrich Schuchardt | 9e18bfa | 2019-01-22 21:35:23 +0100 | [diff] [blame] | 16 | select REGEX |
Heinrich Schuchardt | 35550cc | 2018-04-29 23:37:12 +0200 | [diff] [blame] | 17 | imply CFB_CONSOLE_ANSI |
Heinrich Schuchardt | 6c46aaa | 2020-03-21 20:45:50 +0100 | [diff] [blame] | 18 | imply FAT |
| 19 | imply FAT_WRITE |
Heinrich Schuchardt | 29db4c5 | 2019-12-04 22:58:58 +0100 | [diff] [blame] | 20 | imply USB_KEYBOARD_FN_KEYS |
Heinrich Schuchardt | 8a7514a | 2020-01-15 00:49:35 +0100 | [diff] [blame] | 21 | imply VIDEO_ANSI |
Alexander Graf | 67ee705 | 2016-03-04 01:10:07 +0100 | [diff] [blame] | 22 | help |
Heinrich Schuchardt | 96b236a | 2019-05-11 10:27:58 +0200 | [diff] [blame] | 23 | Select this option if you want to run UEFI applications (like GNU |
| 24 | GRUB or iPXE) on top of U-Boot. If this option is enabled, U-Boot |
| 25 | will expose the UEFI API to a loaded application, enabling it to |
| 26 | reuse U-Boot's device drivers. |
Alexander Graf | 7c00a3c | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 27 | |
Heinrich Schuchardt | 0cbab58 | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 28 | if EFI_LOADER |
| 29 | |
Heinrich Schuchardt | 41bc601 | 2020-07-14 19:18:33 +0200 | [diff] [blame] | 30 | choice |
| 31 | prompt "Store for non-volatile UEFI variables" |
| 32 | default EFI_VARIABLE_FILE_STORE |
| 33 | help |
| 34 | Select where non-volatile UEFI variables shall be stored. |
| 35 | |
Heinrich Schuchardt | 09a8d50 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 36 | config EFI_VARIABLE_FILE_STORE |
| 37 | bool "Store non-volatile UEFI variables as file" |
| 38 | depends on FAT_WRITE |
Heinrich Schuchardt | 41bc601 | 2020-07-14 19:18:33 +0200 | [diff] [blame] | 39 | help |
| 40 | Select this option if you want non-volatile UEFI variables to be |
| 41 | stored as file /ubootefi.var on the EFI system partition. |
| 42 | |
| 43 | config EFI_MM_COMM_TEE |
| 44 | bool "UEFI variables storage service via OP-TEE" |
| 45 | depends on OPTEE |
Heinrich Schuchardt | 09a8d50 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 46 | help |
Heinrich Schuchardt | 41bc601 | 2020-07-14 19:18:33 +0200 | [diff] [blame] | 47 | If OP-TEE is present and running StandAloneMM, dispatch all UEFI |
| 48 | variable related operations to that. The application will verify, |
| 49 | authenticate and store the variables on an RPMB. |
| 50 | |
| 51 | endchoice |
Heinrich Schuchardt | 09a8d50 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 52 | |
Heinrich Schuchardt | 4b7d5c1 | 2020-07-14 21:25:28 +0200 | [diff] [blame] | 53 | config EFI_VARIABLES_PRESEED |
| 54 | bool "Initial values for UEFI variables" |
| 55 | depends on EFI_VARIABLE_FILE_STORE |
| 56 | help |
| 57 | Include a file with the initial values for non-volatile UEFI variables |
| 58 | into the U-Boot binary. If this configuration option is set, changes |
| 59 | to authentication related variables (PK, KEK, db, dbx) are not |
| 60 | allowed. |
| 61 | |
| 62 | if EFI_VARIABLES_PRESEED |
| 63 | |
| 64 | config EFI_VAR_SEED_FILE |
| 65 | string "File with initial values of non-volatile UEFI variables" |
| 66 | default ubootefi.var |
| 67 | help |
| 68 | File with initial values of non-volatile UEFI variables. The file must |
| 69 | be in the same format as the storage in the EFI system partition. The |
| 70 | easiest way to create it is by setting the non-volatile variables in |
| 71 | U-Boot. If a relative file path is used, it is relative to the source |
| 72 | directory. |
| 73 | |
| 74 | endif |
| 75 | |
Heinrich Schuchardt | f2856ad | 2019-05-31 22:56:02 +0200 | [diff] [blame] | 76 | config EFI_GET_TIME |
| 77 | bool "GetTime() runtime service" |
| 78 | depends on DM_RTC |
| 79 | default y |
| 80 | help |
| 81 | Provide the GetTime() runtime service at boottime. This service |
| 82 | can be used by an EFI application to read the real time clock. |
| 83 | |
| 84 | config EFI_SET_TIME |
| 85 | bool "SetTime() runtime service" |
| 86 | depends on EFI_GET_TIME |
| 87 | default n |
| 88 | help |
| 89 | Provide the SetTime() runtime service at boottime. This service |
| 90 | can be used by an EFI application to adjust the real time clock. |
| 91 | |
Heinrich Schuchardt | 3db3591 | 2019-05-11 09:53:33 +0200 | [diff] [blame] | 92 | config EFI_DEVICE_PATH_TO_TEXT |
| 93 | bool "Device path to text protocol" |
| 94 | default y |
| 95 | help |
| 96 | The device path to text protocol converts device nodes and paths to |
| 97 | human readable strings. |
| 98 | |
Heinrich Schuchardt | 0cbab58 | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 99 | config EFI_LOADER_HII |
| 100 | bool "HII protocols" |
| 101 | default y |
| 102 | help |
| 103 | The Human Interface Infrastructure is a complicated framework that |
| 104 | allows UEFI applications to draw fancy menus and hook strings using |
| 105 | a translation framework. |
| 106 | |
| 107 | U-Boot implements enough of its features to be able to run the UEFI |
| 108 | Shell, but not more than that. |
| 109 | |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 110 | config EFI_UNICODE_COLLATION_PROTOCOL2 |
Heinrich Schuchardt | 532fec7 | 2019-05-08 23:24:26 +0200 | [diff] [blame] | 111 | bool "Unicode collation protocol" |
| 112 | default y |
| 113 | help |
| 114 | The Unicode collation protocol is used for lexical comparisons. It is |
| 115 | required to run the UEFI shell. |
| 116 | |
Heinrich Schuchardt | b325884 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 117 | if EFI_UNICODE_COLLATION_PROTOCOL2 |
Heinrich Schuchardt | 532fec7 | 2019-05-08 23:24:26 +0200 | [diff] [blame] | 118 | |
Heinrich Schuchardt | 58ddcd3 | 2018-09-04 19:34:56 +0200 | [diff] [blame] | 119 | config EFI_UNICODE_CAPITALIZATION |
| 120 | bool "Support Unicode capitalization" |
Heinrich Schuchardt | 58ddcd3 | 2018-09-04 19:34:56 +0200 | [diff] [blame] | 121 | default y |
| 122 | help |
| 123 | Select this option to enable correct handling of the capitalization of |
| 124 | Unicode codepoints in the range 0x0000-0xffff. If this option is not |
| 125 | set, only the the correct handling of the letters of the codepage |
| 126 | used by the FAT file system is ensured. |
| 127 | |
Heinrich Schuchardt | 18ed8cf | 2019-05-16 18:19:00 +0200 | [diff] [blame] | 128 | config EFI_UNICODE_COLLATION_PROTOCOL |
| 129 | bool "Deprecated version of the Unicode collation protocol" |
| 130 | default n |
| 131 | help |
| 132 | In EFI 1.10 a version of the Unicode collation protocol using ISO |
| 133 | 639-2 language codes existed. This protocol is not part of the UEFI |
| 134 | specification any longer. Unfortunately it is required to run the |
| 135 | UEFI Self Certification Test (SCT) II, version 2.6, 2017. |
| 136 | |
| 137 | Choose this option for testing only. It is bound to be removed. |
| 138 | |
Heinrich Schuchardt | 532fec7 | 2019-05-08 23:24:26 +0200 | [diff] [blame] | 139 | endif |
| 140 | |
Alexander Graf | 7c00a3c | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 141 | config EFI_LOADER_BOUNCE_BUFFER |
| 142 | bool "EFI Applications use bounce buffers for DMA operations" |
Heinrich Schuchardt | 0cbab58 | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 143 | depends on ARM64 |
Alexander Graf | 7c00a3c | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 144 | default n |
| 145 | help |
| 146 | Some hardware does not support DMA to full 64bit addresses. For this |
| 147 | hardware we can create a bounce buffer so that payloads don't have to |
| 148 | worry about platform details. |
Alexander Graf | 44be5da | 2019-02-11 15:24:00 +0100 | [diff] [blame] | 149 | |
Heinrich Schuchardt | 0cbab58 | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 150 | config EFI_PLATFORM_LANG_CODES |
| 151 | string "Language codes supported by firmware" |
| 152 | default "en-US" |
Alexander Graf | 44be5da | 2019-02-11 15:24:00 +0100 | [diff] [blame] | 153 | help |
Heinrich Schuchardt | 0cbab58 | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 154 | This value is used to initialize the PlatformLangCodes variable. Its |
| 155 | value is a semicolon (;) separated list of language codes in native |
| 156 | RFC 4646 format, e.g. "en-US;de-DE". The first language code is used |
| 157 | to initialize the PlatformLang variable. |
Alexander Graf | 44be5da | 2019-02-11 15:24:00 +0100 | [diff] [blame] | 158 | |
Heinrich Schuchardt | 05874fb | 2019-07-05 18:12:16 +0200 | [diff] [blame] | 159 | config EFI_HAVE_RUNTIME_RESET |
| 160 | # bool "Reset runtime service is available" |
| 161 | bool |
| 162 | default y |
| 163 | depends on ARCH_BCM283X || FSL_LAYERSCAPE || PSCI_RESET || SYSRESET_X86 |
| 164 | |
Heinrich Schuchardt | 149d5d4 | 2019-07-22 22:04:36 +0200 | [diff] [blame] | 165 | config EFI_GRUB_ARM32_WORKAROUND |
| 166 | bool "Workaround for GRUB on 32bit ARM" |
| 167 | default y |
| 168 | depends on ARM && !ARM64 |
| 169 | help |
| 170 | GRUB prior to version 2.04 requires U-Boot to disable caches. This |
| 171 | workaround currently is also needed on systems with caches that |
| 172 | cannot be managed via CP15. |
Sughosh Ganu | 7064a5d | 2019-12-29 00:01:05 +0530 | [diff] [blame] | 173 | |
| 174 | config EFI_RNG_PROTOCOL |
| 175 | bool "EFI_RNG_PROTOCOL support" |
| 176 | depends on DM_RNG |
Peter Robinson | fa49752 | 2020-04-01 11:15:01 +0100 | [diff] [blame] | 177 | default y |
Sughosh Ganu | 7064a5d | 2019-12-29 00:01:05 +0530 | [diff] [blame] | 178 | help |
Heinrich Schuchardt | 7bcc7fc | 2020-02-14 23:28:58 +0100 | [diff] [blame] | 179 | Provide a EFI_RNG_PROTOCOL implementation using the hardware random |
| 180 | number generator of the platform. |
Sughosh Ganu | 7064a5d | 2019-12-29 00:01:05 +0530 | [diff] [blame] | 181 | |
Ilias Apalodimas | 3510ba7 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 182 | config EFI_LOAD_FILE2_INITRD |
| 183 | bool "EFI_FILE_LOAD2_PROTOCOL for Linux initial ramdisk" |
| 184 | default n |
| 185 | help |
| 186 | Expose a EFI_FILE_LOAD2_PROTOCOL that the Linux UEFI stub can |
| 187 | use to load the initial ramdisk. Once this is enabled using |
| 188 | initrd=<ramdisk> will stop working. |
| 189 | |
| 190 | config EFI_INITRD_FILESPEC |
| 191 | string "initramfs path" |
| 192 | default "host 0:1 initrd" |
| 193 | depends on EFI_LOAD_FILE2_INITRD |
| 194 | help |
| 195 | Full path of the initramfs file, e.g. mmc 0:2 initramfs.cpio.gz. |
| 196 | |
AKASHI Takahiro | 1900a3b | 2020-04-14 11:51:38 +0900 | [diff] [blame] | 197 | config EFI_SECURE_BOOT |
| 198 | bool "Enable EFI secure boot support" |
| 199 | depends on EFI_LOADER |
| 200 | select SHA256 |
| 201 | select RSA |
| 202 | select RSA_VERIFY_WITH_PKEY |
| 203 | select IMAGE_SIGN_INFO |
| 204 | select ASYMMETRIC_KEY_TYPE |
| 205 | select ASYMMETRIC_PUBLIC_KEY_SUBTYPE |
| 206 | select X509_CERTIFICATE_PARSER |
| 207 | select PKCS7_MESSAGE_PARSER |
AKASHI Takahiro | 14afd06 | 2020-07-21 19:35:22 +0900 | [diff] [blame] | 208 | select PKCS7_VERIFY |
AKASHI Takahiro | 1900a3b | 2020-04-14 11:51:38 +0900 | [diff] [blame] | 209 | default n |
| 210 | help |
| 211 | Select this option to enable EFI secure boot support. |
| 212 | Once SecureBoot mode is enforced, any EFI binary can run only if |
| 213 | it is signed with a trusted key. To do that, you need to install, |
| 214 | at least, PK, KEK and db. |
| 215 | |
Heinrich Schuchardt | 0cbab58 | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 216 | endif |