blob: 95300b008c5dfb325dfa4072f5ed4d2127d7ce1e [file] [log] [blame]
Simon Glassb45b1632020-09-10 20:21:13 -06001menu "Boot options"
2
3menu "Boot images"
4
Tom Rini793921e2024-04-18 08:29:35 -06005config ANDROID_BOOT_IMAGE
6 bool "Android Boot Images"
7 default y if FASTBOOT
8 help
9 This enables support for booting images which use the Android
10 image format header.
11
12config TIMESTAMP
13 bool "Show image date and time when displaying image information"
14 default y if CMD_DATE
15 help
16 When CONFIG_TIMESTAMP is selected, the timestamp (date and time) of
17 an image is printed by image commands like bootm or iminfo. This
18 is shown as 'Timestamp: xxx' and 'Created: xxx'. If this option is
19 enabled, then U-Boot requires FITs to have a timestamp. If a FIT is
20 loaded that does not, the message 'Wrong FIT format: no timestamp'
21 is shown.
22
23config BUTTON_CMD
24 bool "Support for running a command if a button is held during boot"
25 depends on CMDLINE
26 depends on BUTTON
27 help
28 For many embedded devices it's useful to enter a special flashing mode
29 such as fastboot mode when a button is held during boot. This option
30 allows arbitrary commands to be assigned to specific buttons. These will
31 be run after "preboot" if the button is held. Configuration is done via
32 the environment variables "button_cmd_N_name" and "button_cmd_N" where n is
33 the button number (starting from 0). e.g:
34
35 "button_cmd_0_name=vol_down"
36 "button_cmd_0=fastboot usb 0"
37
Simon Glasse9a089a2023-09-14 10:55:49 -060038menuconfig FIT
39 bool "Flattened Image Tree (FIT)"
Alexandru Gagniuc650b7862021-09-02 19:54:21 -050040 select HASH
Simon Glassb45b1632020-09-10 20:21:13 -060041 select MD5
42 select SHA1
Alexandru Gagniuc8d310ef2021-09-02 19:54:17 -050043 imply SHA256
Simon Glassb45b1632020-09-10 20:21:13 -060044 help
45 This option allows you to boot the new uImage structure,
46 Flattened Image Tree. FIT is formally a FDT, which can include
47 images of various types (kernel, FDT blob, ramdisk, etc.)
48 in a single blob. To boot this new uImage structure,
49 pass the address of the blob to the "bootm" command.
50 FIT is very flexible, supporting compression, multiple images,
51 multiple configurations, verification through hashing and also
52 verified boot (secure boot using RSA).
53
Simon Glasse9a089a2023-09-14 10:55:49 -060054if FIT
Simon Glass65831d92021-12-18 11:27:50 -070055
Simon Glassb45b1632020-09-10 20:21:13 -060056config FIT_EXTERNAL_OFFSET
57 hex "FIT external data offset"
58 default 0x0
59 help
60 This specifies a data offset in fit image.
61 The offset is from data payload offset to the beginning of
62 fit image header. When specifies a offset, specific data
63 could be put in the hole between data payload and fit image
64 header, such as CSF data on i.MX platform.
65
Simon Glass244705b2021-02-15 17:08:10 -070066config FIT_FULL_CHECK
67 bool "Do a full check of the FIT before using it"
68 default y
69 help
70 Enable this do a full check of the FIT to make sure it is valid. This
71 helps to protect against carefully crafted FITs which take advantage
72 of bugs or omissions in the code. This includes a bad structure,
73 multiple root nodes and the like.
74
Simon Glassb45b1632020-09-10 20:21:13 -060075config FIT_SIGNATURE
76 bool "Enable signature verification of FIT uImages"
Simon Glasse9a089a2023-09-14 10:55:49 -060077 depends on DM
Simon Glassb45b1632020-09-10 20:21:13 -060078 select HASH
Alexandru Gagniuc1f2e2312021-07-29 11:47:18 -050079 imply RSA
80 imply RSA_VERIFY
Simon Glassb45b1632020-09-10 20:21:13 -060081 select IMAGE_SIGN_INFO
Simon Glass244705b2021-02-15 17:08:10 -070082 select FIT_FULL_CHECK
Simon Glassb45b1632020-09-10 20:21:13 -060083 help
84 This option enables signature verification of FIT uImages,
85 using a hash signed and verified using RSA. If
86 CONFIG_SHA_PROG_HW_ACCEL is defined, i.e support for progressive
87 hashing is available using hardware, then the RSA library will use
Heinrich Schuchardtb72eb352024-06-18 08:23:17 +020088 it. See doc/usage/fit/signature.rst for more details.
Simon Glassb45b1632020-09-10 20:21:13 -060089
90 WARNING: When relying on signed FIT images with a required signature
91 check the legacy image format is disabled by default, so that
92 unsigned images cannot be loaded. If a board needs the legacy image
93 format support in this case, enable it using
94 CONFIG_LEGACY_IMAGE_FORMAT.
95
96config FIT_SIGNATURE_MAX_SIZE
97 hex "Max size of signed FIT structures"
98 depends on FIT_SIGNATURE
99 default 0x10000000
100 help
101 This option sets a max size in bytes for verified FIT uImages.
102 A sane value of 256MB protects corrupted DTB structures from overlapping
103 device memory. Assure this size does not extend past expected storage
104 space.
105
Simon Glass66b00c82021-07-14 17:05:31 -0500106config FIT_RSASSA_PSS
Simon Glassb45b1632020-09-10 20:21:13 -0600107 bool "Support rsassa-pss signature scheme of FIT image contents"
108 depends on FIT_SIGNATURE
Simon Glassb45b1632020-09-10 20:21:13 -0600109 help
110 Enable this to support the pss padding algorithm as described
111 in the rfc8017 (https://tools.ietf.org/html/rfc8017).
112
113config FIT_CIPHER
114 bool "Enable ciphering data in a FIT uImages"
Simon Glasse9a089a2023-09-14 10:55:49 -0600115 depends on DM
Simon Glassb45b1632020-09-10 20:21:13 -0600116 select AES
117 help
118 Enable the feature of data ciphering/unciphering in the tool mkimage
119 and in the u-boot support of the FIT image.
120
121config FIT_VERBOSE
122 bool "Show verbose messages when FIT images fail"
123 help
124 Generally a system will have valid FIT images so debug messages
125 are a waste of code space. If you are debugging your images then
126 you can enable this option to get more verbose information about
127 failures.
128
129config FIT_BEST_MATCH
130 bool "Select the best match for the kernel device tree"
131 help
132 When no configuration is explicitly selected, default to the
133 one whose fdt's compatibility field best matches that of
134 U-Boot itself. A match is considered "best" if it matches the
135 most specific compatibility entry of U-Boot's fdt's root node.
136 The order of entries in the configuration's fdt is ignored.
137
138config FIT_IMAGE_POST_PROCESS
139 bool "Enable post-processing of FIT artifacts after loading by U-Boot"
Manorit Chawdhryf65cdf72023-07-14 11:22:40 +0530140 depends on SOCFPGA_SECURE_VAB_AUTH
Simon Glassb45b1632020-09-10 20:21:13 -0600141 help
142 Allows doing any sort of manipulation to blobs after they got extracted
143 from FIT images like stripping off headers or modifying the size of the
144 blob, verification, authentication, decryption etc. in a platform or
145 board specific way. In order to use this feature a platform or board-
146 specific implementation of board_fit_image_post_process() must be
147 provided. Also, anything done during this post-processing step would
148 need to be comprehended in how the images were prepared before being
149 injected into the FIT creation (i.e. the blobs would have been pre-
150 processed before being added to the FIT image).
151
Ravik Hasija11dac412021-01-27 14:01:48 -0800152config FIT_PRINT
Anand Moon6c368f42024-06-23 23:10:21 +0530153 bool "Support FIT printing"
154 default y
155 help
156 Support printing the content of the fitImage in a verbose manner.
Ravik Hasija11dac412021-01-27 14:01:48 -0800157
Simon Glassb45b1632020-09-10 20:21:13 -0600158config SPL_FIT
159 bool "Support Flattened Image Tree within SPL"
Simon Glass2289ca92023-09-14 10:55:52 -0600160 depends on SPL
Alexandru Gagniuc650b7862021-09-02 19:54:21 -0500161 select SPL_HASH
Simon Glassb45b1632020-09-10 20:21:13 -0600162 select SPL_OF_LIBFDT
163
164config SPL_FIT_PRINT
165 bool "Support FIT printing within SPL"
166 depends on SPL_FIT
167 help
168 Support printing the content of the fitImage in a verbose manner in SPL.
169
Simon Glass244705b2021-02-15 17:08:10 -0700170config SPL_FIT_FULL_CHECK
171 bool "Do a full check of the FIT before using it"
Tom Rini0f3d1de2022-12-04 10:14:20 -0500172 depends on SPL_FIT
Simon Glass244705b2021-02-15 17:08:10 -0700173 help
174 Enable this do a full check of the FIT to make sure it is valid. This
175 helps to protect against carefully crafted FITs which take advantage
176 of bugs or omissions in the code. This includes a bad structure,
177 multiple root nodes and the like.
178
Simon Glassb45b1632020-09-10 20:21:13 -0600179config SPL_FIT_SIGNATURE
180 bool "Enable signature verification of FIT firmware within SPL"
181 depends on SPL_DM
Klaus Heinrich Kiwiae5073f2021-02-09 15:41:54 -0300182 depends on SPL_LOAD_FIT || SPL_LOAD_FIT_FULL
Klaus Heinrich Kiwic9796e62021-02-09 15:41:53 -0300183 select FIT_SIGNATURE
Simon Glassb45b1632020-09-10 20:21:13 -0600184 select SPL_FIT
Simon Glassa8437ce2021-07-10 21:14:25 -0600185 select SPL_CRYPTO
Alexandru Gagniuc97464ff2021-09-02 19:54:19 -0500186 select SPL_HASH
Alexandru Gagniuc1f2e2312021-07-29 11:47:18 -0500187 imply SPL_RSA
188 imply SPL_RSA_VERIFY
Simon Glassb45b1632020-09-10 20:21:13 -0600189 select SPL_IMAGE_SIGN_INFO
Simon Glass244705b2021-02-15 17:08:10 -0700190 select SPL_FIT_FULL_CHECK
Simon Glassb45b1632020-09-10 20:21:13 -0600191
Simon Glassc0cabbc2021-09-25 19:43:39 -0600192config SPL_FIT_SIGNATURE_MAX_SIZE
193 hex "Max size of signed FIT structures in SPL"
194 depends on SPL_FIT_SIGNATURE
195 default 0x10000000
196 help
197 This option sets a max size in bytes for verified FIT uImages.
198 A sane value of 256MB protects corrupted DTB structures from overlapping
199 device memory. Assure this size does not extend past expected storage
200 space.
201
Philippe Reynes47f3eb22021-10-15 11:35:03 +0200202config SPL_FIT_RSASSA_PSS
203 bool "Support rsassa-pss signature scheme of FIT image contents in SPL"
204 depends on SPL_FIT_SIGNATURE
205 help
206 Enable this to support the pss padding algorithm as described
207 in the rfc8017 (https://tools.ietf.org/html/rfc8017) in SPL.
208
Simon Glassb45b1632020-09-10 20:21:13 -0600209config SPL_LOAD_FIT
210 bool "Enable SPL loading U-Boot as a FIT (basic fitImage features)"
Simon Glass2289ca92023-09-14 10:55:52 -0600211 depends on SPL
Simon Glassb45b1632020-09-10 20:21:13 -0600212 select SPL_FIT
213 help
214 Normally with the SPL framework a legacy image is generated as part
215 of the build. This contains U-Boot along with information as to
216 where it should be loaded. This option instead enables generation
217 of a FIT (Flat Image Tree) which provides more flexibility. In
218 particular it can handle selecting from multiple device tree
219 and passing the correct one to U-Boot.
220
Alexandru Gagniuc064c9c22021-03-29 12:05:15 -0500221 This path has the following limitations:
222
Bin Meng91cdcb92021-05-10 20:23:29 +0800223 1. "loadables" images, other than FDTs, which do not have a "load"
Alexandru Gagniuc064c9c22021-03-29 12:05:15 -0500224 property will not be loaded. This limitation also applies to FPGA
225 images with the correct "compatible" string.
Heinrich Schuchardtb72eb352024-06-18 08:23:17 +0200226 2. For FPGA images, the supported "compatible" list may be found in
227 https://fitspec.osfw.foundation/.
Alexandru Gagniuc064c9c22021-03-29 12:05:15 -0500228 3. FDTs are only loaded for images with an "os" property of "u-boot".
229 "linux" images are also supported with Falcon boot mode.
230
Simon Glassb45b1632020-09-10 20:21:13 -0600231config SPL_LOAD_FIT_ADDRESS
232 hex "load address of fit image"
Simon Glassdfcedda2023-09-14 10:55:51 -0600233 depends on SPL_LOAD_FIT
Simon Glassb45b1632020-09-10 20:21:13 -0600234 default 0x0
235 help
236 Specify the load address of the fit image that will be loaded
237 by SPL.
238
239config SPL_LOAD_FIT_APPLY_OVERLAY
240 bool "Enable SPL applying DT overlays from FIT"
241 depends on SPL_LOAD_FIT
242 select OF_LIBFDT_OVERLAY
243 help
Hugo Villeneuve5c1c6cc2023-04-24 16:51:12 -0400244 The device tree is loaded from the FIT image. Allow the SPL to
Simon Glassb45b1632020-09-10 20:21:13 -0600245 also load device-tree overlays from the FIT image an apply them
246 over the device tree.
247
248config SPL_LOAD_FIT_APPLY_OVERLAY_BUF_SZ
249 depends on SPL_LOAD_FIT_APPLY_OVERLAY
250 default 0x10000
251 hex "size of temporary buffer used to load the overlays"
252 help
253 The size of the area where the overlays will be loaded and
254 uncompress. Must be at least as large as biggest overlay
255 (uncompressed)
256
257config SPL_LOAD_FIT_FULL
258 bool "Enable SPL loading U-Boot as a FIT (full fitImage features)"
259 select SPL_FIT
260 help
261 Normally with the SPL framework a legacy image is generated as part
262 of the build. This contains U-Boot along with information as to
263 where it should be loaded. This option instead enables generation
264 of a FIT (Flat Image Tree) which provides more flexibility. In
265 particular it can handle selecting from multiple device tree
266 and passing the correct one to U-Boot.
267
268config SPL_FIT_IMAGE_POST_PROCESS
269 bool "Enable post-processing of FIT artifacts after loading by the SPL"
270 depends on SPL_LOAD_FIT
Andrew Davis4ba9e6e2022-05-04 15:52:28 -0500271 default y if TI_SECURE_DEVICE
Simon Glassb45b1632020-09-10 20:21:13 -0600272 help
273 Allows doing any sort of manipulation to blobs after they got extracted
274 from the U-Boot FIT image like stripping off headers or modifying the
275 size of the blob, verification, authentication, decryption etc. in a
276 platform or board specific way. In order to use this feature a platform
277 or board-specific implementation of board_fit_image_post_process() must
278 be provided. Also, anything done during this post-processing step would
279 need to be comprehended in how the images were prepared before being
280 injected into the FIT creation (i.e. the blobs would have been pre-
281 processed before being added to the FIT image).
282
283config SPL_FIT_SOURCE
284 string ".its source file for U-Boot FIT image"
285 depends on SPL_FIT
286 help
287 Specifies a (platform specific) FIT source file to generate the
288 U-Boot FIT image. This could specify further image to load and/or
289 execute.
290
291config USE_SPL_FIT_GENERATOR
292 bool "Use a script to generate the .its script"
Tom Rini0f3d1de2022-12-04 10:14:20 -0500293 depends on SPL_FIT
Simon Glassbd7694f2023-01-07 14:07:19 -0700294 default y if SPL_FIT && ARCH_ZYNQMP
Simon Glassb45b1632020-09-10 20:21:13 -0600295
296config SPL_FIT_GENERATOR
297 string ".its file generator script for U-Boot FIT image"
298 depends on USE_SPL_FIT_GENERATOR
Simon Glassb45b1632020-09-10 20:21:13 -0600299 default "arch/arm/mach-zynqmp/mkimage_fit_atf.sh" if SPL_LOAD_FIT && ARCH_ZYNQMP
Simon Glassb45b1632020-09-10 20:21:13 -0600300 help
301 Specifies a (platform specific) script file to generate the FIT
302 source file used to build the U-Boot FIT image file. This gets
303 passed a list of supported device tree file stub names to
304 include in the generated image.
305
Simon Glassbc993e52022-10-20 18:23:13 -0600306if VPL
307
308config VPL_FIT
309 bool "Support Flattened Image Tree within VPL"
310 depends on VPL
311 default y
312 select VPL_HASH
313 select VPL_OF_LIBFDT
314
315config VPL_FIT_PRINT
316 bool "Support FIT printing within VPL"
317 depends on VPL_FIT
318 default y
319 help
320 Support printing the content of the fitImage in a verbose manner in VPL.
321
322config VPL_FIT_FULL_CHECK
323 bool "Do a full check of the FIT before using it"
324 default y
325 help
326 Enable this do a full check of the FIT to make sure it is valid. This
327 helps to protect against carefully crafted FITs which take advantage
328 of bugs or omissions in the code. This includes a bad structure,
329 multiple root nodes and the like.
330
331config VPL_FIT_SIGNATURE
332 bool "Enable signature verification of FIT firmware within VPL"
333 depends on VPL_DM
Simon Glassbc993e52022-10-20 18:23:13 -0600334 default y
335 select FIT_SIGNATURE
336 select VPL_FIT
337 select VPL_CRYPTO
338 select VPL_HASH
339 imply VPL_RSA
340 imply VPL_RSA_VERIFY
341 select VPL_IMAGE_SIGN_INFO
342 select VPL_FIT_FULL_CHECK
343
344config VPL_FIT_SIGNATURE_MAX_SIZE
345 hex "Max size of signed FIT structures in VPL"
346 depends on VPL_FIT_SIGNATURE
347 default 0x10000000
348 help
349 This option sets a max size in bytes for verified FIT uImages.
350 A sane value of 256MB protects corrupted DTB structures from overlapping
351 device memory. Assure this size does not extend past expected storage
352 space.
353
354endif # VPL
355
Simon Glass2289ca92023-09-14 10:55:52 -0600356endif # FIT
357
John Keeping9b60a172022-07-28 11:19:15 +0100358config PXE_UTILS
359 bool
360 select MENU
361 help
362 Utilities for parsing PXE file formats.
363
Tom Rini984bfdc2023-10-26 14:31:24 -0400364config BOOT_DEFAULTS_FEATURES
365 bool
366 select SUPPORT_RAW_INITRD
367 select ENV_VARS_UBOOT_CONFIG
368 imply USB_STORAGE
369 imply EFI_PARTITION
370 imply ISO_PARTITION
371
372config BOOT_DEFAULTS_CMDS
373 bool
Simon Glass054d0182023-03-24 16:58:13 -0400374 imply USE_BOOTCOMMAND
375 select CMD_ENV_EXISTS
376 select CMD_EXT2
377 select CMD_EXT4
378 select CMD_FAT
379 select CMD_FS_GENERIC
380 select CMD_PART if PARTITIONS
381 select CMD_DHCP if CMD_NET
382 select CMD_PING if CMD_NET
383 select CMD_PXE if CMD_NET
Simon Glass054d0182023-03-24 16:58:13 -0400384 select CMD_BOOTI if ARM64
385 select CMD_BOOTZ if ARM && !ARM64
386 imply CMD_MII if NET
Tom Rini984bfdc2023-10-26 14:31:24 -0400387
388config BOOT_DEFAULTS
389 bool # Common defaults for standard boot and distroboot
390 select BOOT_DEFAULTS_FEATURES
391 select BOOT_DEFAULTS_CMDS if CMDLINE
Simon Glass054d0182023-03-24 16:58:13 -0400392 help
393 These are not required but are commonly needed to support a good
394 selection of booting methods. Enable this to improve the capability
395 of U-Boot to boot various images. Currently much functionality is
396 tied to enabling the command that exercises it.
397
Simon Glass6cfb0022023-09-14 10:55:53 -0600398menuconfig BOOTSTD
399 bool "Standard boot"
Simon Glass08ad13e2022-04-24 23:31:06 -0600400 default y
401 depends on DM && OF_CONTROL && BLK
402 help
403 U-Boot supports a standard way of locating something to boot,
404 typically an Operating System such as Linux, provided by a distro such
405 as Arch Linux or Debian. Enable this to support iterating through
406 available bootdevs and using bootmeths to find bootflows suitable for
407 booting.
408
409 Standard boot is not a standard way of booting, just a framework
410 within U-Boot for supporting all the different ways that exist.
411
412 Terminology:
413
414 - bootdev - a device which can hold a distro (e.g. MMC)
415 - bootmeth - a method to scan a bootdev to find bootflows (owned by
416 U-Boot)
417 - bootflow - a description of how to boot (owned by the distro)
418
Simon Glass6cfb0022023-09-14 10:55:53 -0600419if BOOTSTD
420
Simon Glassbc993e52022-10-20 18:23:13 -0600421config SPL_BOOTSTD
Simon Glass4aa874f2023-02-22 09:33:58 -0700422 bool "Standard boot support in SPL"
Simon Glassbc993e52022-10-20 18:23:13 -0600423 depends on SPL && SPL_DM && SPL_OF_CONTROL && SPL_BLK
424 default y if VPL
425 help
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200426 This enables standard boot in SPL. This is needed so that VBE
Simon Glassbc993e52022-10-20 18:23:13 -0600427 (Verified Boot for Embedded) can be used, since it depends on standard
428 boot. It is enabled by default since the main purpose of VPL is to
429 handle the firmware part of VBE.
430
431config VPL_BOOTSTD
432 bool "Standard boot support in VPL"
433 depends on VPL && VPL_DM && VPL_OF_CONTROL && VPL_BLK
434 default y
435 help
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200436 This enables standard boot in SPL. This is needed so that VBE
Simon Glassbc993e52022-10-20 18:23:13 -0600437 (Verified Boot for Embedded) can be used, since it depends on standard
438 boot. It is enabled by default since the main purpose of VPL is to
439 handle the firmware part of VBE.
440
Simon Glass78c79dd2023-02-22 14:06:23 -0700441config BOOTSTD_FULL
442 bool "Enhanced features for standard boot"
443 default y if SANDBOX
Shantur Rathore19b54342023-12-23 06:51:59 +0000444 imply BOOTSTD_DEFAULTS
Simon Glass78c79dd2023-02-22 14:06:23 -0700445 help
446 This enables various useful features for standard boot, which are not
447 essential for operation:
448
449 - bootdev, bootmeth commands
450 - extra features in the bootflow command
451 - support for selecting the ordering of bootmeths ("bootmeth order")
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200452 - support for selecting the ordering of bootdevs using the Device Tree
Simon Glass78c79dd2023-02-22 14:06:23 -0700453 as well as the "boot_targets" environment variable
454
Simon Glass2e5161eb2023-01-28 15:00:21 -0700455config BOOTSTD_DEFAULTS
456 bool "Select some common defaults for standard boot"
457 depends on BOOTSTD
Simon Glass054d0182023-03-24 16:58:13 -0400458 select BOOT_DEFAULTS
Simon Glassdb92e782023-05-10 16:34:47 -0600459 select BOOTMETH_DISTRO
Simon Glass2e5161eb2023-01-28 15:00:21 -0700460 help
461 These are not required but are commonly needed to support a good
462 selection of booting methods. Enable this to improve the capability
463 of U-Boot to boot various images.
464
Simon Glassbe661cb2022-04-24 23:31:27 -0600465config BOOTSTD_BOOTCOMMAND
466 bool "Use bootstd to boot"
467 default y if !DISTRO_DEFAULTS
468 help
469 Enable this to select a default boot-command suitable for booting
470 with standard boot. This can be overridden by the board if needed,
471 but the default command should be enough for most boards which use
472 standard boot.
473
474 For now this is only selected if distro boot is NOT used, since
475 standard boot does not support all of the features of distro boot
476 yet.
477
Simon Glass92368522023-11-18 14:05:19 -0700478config BOOTSTD_PROG
479 bool "Use programmatic boot"
480 depends on !CMDLINE
481 default y
482 help
483 Enable this to provide a board_run_command() function which can boot
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200484 a system without using commands. If the boot fails, then U-Boot will
Simon Glass92368522023-11-18 14:05:19 -0700485 panic.
486
487 Note: This currently has many limitations and is not a useful booting
488 solution. Future work will eventually make this a viable option.
489
Simon Glass4f8633d2022-07-30 15:52:21 -0600490config BOOTMETH_GLOBAL
491 bool
492 help
493 Add support for global bootmeths. This feature is used by VBE and
494 EFI bootmgr, since they take full control over which bootdevs are
495 selected to boot.
496
Simon Glassd74e62a2023-07-12 09:04:45 -0600497config BOOTMETH_CROS
498 bool "Bootdev support for Chromium OS"
Simon Glass18700262023-07-30 11:17:02 -0600499 depends on X86 || ARM || SANDBOX
500 default y if !ARM
Simon Glassd7d3a972023-08-24 13:55:45 -0600501 select EFI_PARTITION
502 select PARTITION_TYPE_GUID
503 select PARTITION_UUIDS
Simon Glassd74e62a2023-07-12 09:04:45 -0600504 help
505 Enables support for booting Chromium OS using bootdevs. This uses the
506 kernel A slot and obtains the kernel command line from the parameters
507 provided there.
508
509 Note that only x86 devices are supported at present.
510
Simon Glassb71d7f72023-05-10 16:34:46 -0600511config BOOTMETH_EXTLINUX
512 bool "Bootdev support for extlinux boot"
John Keeping9b60a172022-07-28 11:19:15 +0100513 select PXE_UTILS
Simon Glassad8ec372022-04-24 23:31:13 -0600514 default y
515 help
Simon Glassb71d7f72023-05-10 16:34:46 -0600516 Enables support for extlinux boot using bootdevs. This makes the
Simon Glassad8ec372022-04-24 23:31:13 -0600517 bootdevs look for a 'extlinux/extlinux.conf' on each filesystem
518 they scan.
519
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200520 The specification for this file is here:
Simon Glassb71d7f72023-05-10 16:34:46 -0600521
522 https://uapi-group.org/specifications/specs/boot_loader_specification/
523
Simon Glassad8ec372022-04-24 23:31:13 -0600524 This provides a way to try out standard boot on an existing boot flow.
525
Simon Glassb71d7f72023-05-10 16:34:46 -0600526config BOOTMETH_EXTLINUX_PXE
527 bool "Bootdev support for extlinux boot over network"
Simon Glass83144612022-04-24 23:31:16 -0600528 depends on CMD_PXE && CMD_NET && DM_ETH
529 default y
530 help
Simon Glassb71d7f72023-05-10 16:34:46 -0600531 Enables support for extlinux boot using bootdevs. This makes the
Simon Glass83144612022-04-24 23:31:16 -0600532 bootdevs look for a 'extlinux/extlinux.conf' on the tftp server.
533
Simon Glassb71d7f72023-05-10 16:34:46 -0600534 The specification for this file is here:
535
536 https://uapi-group.org/specifications/specs/boot_loader_specification/
537
Simon Glass83144612022-04-24 23:31:16 -0600538 This provides a way to try out standard boot on an existing boot flow.
539
Simon Glass66f62552022-04-24 23:31:17 -0600540config BOOTMETH_EFILOADER
541 bool "Bootdev support for EFI boot"
AKASHI Takahiro9b08b9a2024-01-17 13:39:41 +0900542 depends on EFI_BINARY_EXEC
Simon Glass66f62552022-04-24 23:31:17 -0600543 default y
544 help
545 Enables support for EFI boot using bootdevs. This makes the
546 bootdevs look for a 'boot<arch>.efi' on each filesystem
547 they scan. The resulting file is booted after enabling U-Boot's
548 EFI loader support.
549
550 The <arch> depends on the architecture of the board:
551
552 aa64 - aarch64 (ARM 64-bit)
553 arm - ARM 32-bit
554 ia32 - x86 32-bit
555 x64 - x86 64-bit
556 riscv32 - RISC-V 32-bit
557 riscv64 - RISC-V 64-bit
558
559 This provides a way to try out standard boot on an existing boot flow.
560
Heinrich Schuchardt72bca1a2024-04-03 20:05:17 +0200561config BOOTMETH_EFI_BOOTMGR
562 bool "Bootdev support for EFI boot manager"
563 depends on EFI_BOOTMGR
564 select BOOTMETH_GLOBAL
565 default y
566 help
567 Enable booting via the UEFI boot manager. Based on the EFI variables
568 the EFI binary to be launched is determined. To set the EFI variables
569 use the eficonfig command.
570
Simon Glass0a9f4262022-07-30 15:52:32 -0600571config BOOTMETH_VBE
572 bool "Bootdev support for Verified Boot for Embedded"
573 depends on FIT
574 default y
575 select BOOTMETH_GLOBAL
Tom Rini7d3684a2023-01-16 15:46:49 -0500576 select EVENT
Simon Glass0a9f4262022-07-30 15:52:32 -0600577 help
578 Enables support for VBE boot. This is a standard boot method which
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200579 supports selection of various firmware components, selection of an OS to
Simon Glass0a9f4262022-07-30 15:52:32 -0600580 boot as well as updating these using fwupd.
581
Simon Glassdb92e782023-05-10 16:34:47 -0600582config BOOTMETH_DISTRO
583 bool # Options needed to boot any distro
Tom Rini9bf470a2023-10-26 14:31:27 -0400584 select BOOTMETH_SCRIPT if CMDLINE # E.g. Armbian uses scripts
Simon Glassdb92e782023-05-10 16:34:47 -0600585 select BOOTMETH_EXTLINUX # E.g. Debian uses these
586 select BOOTMETH_EXTLINUX_PXE if CMD_PXE && CMD_NET && DM_ETH
AKASHI Takahiro9b08b9a2024-01-17 13:39:41 +0900587 select BOOTMETH_EFILOADER if EFI_BINARY_EXEC # E.g. Ubuntu uses this
Simon Glassdb92e782023-05-10 16:34:47 -0600588
Simon Glassbc993e52022-10-20 18:23:13 -0600589config SPL_BOOTMETH_VBE
590 bool "Bootdev support for Verified Boot for Embedded (SPL)"
591 depends on SPL && FIT
Tom Rini7d3684a2023-01-16 15:46:49 -0500592 select EVENT
Simon Glassbc993e52022-10-20 18:23:13 -0600593 default y if VPL
594 help
595 Enables support for VBE boot. This is a standard boot method which
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200596 supports selection of various firmware components, selection of an OS to
Simon Glassbc993e52022-10-20 18:23:13 -0600597 boot as well as updating these using fwupd.
598
599config VPL_BOOTMETH_VBE
600 bool "Bootdev support for Verified Boot for Embedded (VPL)"
601 depends on VPL && FIT
Tom Rini7d3684a2023-01-16 15:46:49 -0500602 select EVENT
Simon Glassbc993e52022-10-20 18:23:13 -0600603 default y
604 help
605 Enables support for VBE boot. This is a standard boot method which
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200606 supports selection of various firmware components, selection of an OS to
Simon Glassbc993e52022-10-20 18:23:13 -0600607 boot as well as updating these using fwupd.
608
Simon Glassd0af04c2022-07-30 15:52:33 -0600609if BOOTMETH_VBE
610
Simon Glass513eeed2023-02-22 09:33:52 -0700611config BOOTMETH_VBE_REQUEST
612 bool "Support for serving VBE OS requests"
613 default y
614 help
615 Enables support for looking that the requests made by the
616 Operating System being booted. These requests result in additions to
617 the device tree /chosen node, added during the device tree fixup
618 phase.
619
620config SPL_BOOTMETH_VBE_REQUEST
621 bool "Support for serving VBE OS requests (SPL)"
622 depends on SPL
623 help
624 Enables support for looking that the requests made by the
625 Operating System being booted. These requests result in additions to
626 the device tree /chosen node, added during the device tree fixup
627 phase.
628
629 This is only useful if you are booting an OS direct from SPL.
630
Simon Glassd0af04c2022-07-30 15:52:33 -0600631config BOOTMETH_VBE_SIMPLE
632 bool "Bootdev support for VBE 'simple' method"
633 default y
634 help
635 Enables support for VBE 'simple' boot. This allows updating a single
636 firmware image in boot media such as MMC. It does not support any sort
637 of rollback, recovery or A/B boot.
638
Simon Glassbc993e52022-10-20 18:23:13 -0600639config BOOTMETH_VBE_SIMPLE_OS
640 bool "Bootdev support for VBE 'simple' method OS phase"
641 default y
642 help
643 Enables support for the OS parts of VBE 'simple' boot. This includes
644 fixing up the device tree with the required VBE information, ready
645 for booting into the OS. This option is only enabled for U-Boot
646 proper, since it is the phase where device tree fixups happen.
647
648config SPL_BOOTMETH_VBE_SIMPLE
649 bool "Bootdev support for VBE 'simple' method (SPL)"
650 depends on SPL
651 default y if VPL
652 help
653 Enables support for VBE 'simple' boot. This allows updating a single
654 firmware image in boot media such as MMC. It does not support any sort
655 of rollback, recovery or A/B boot.
656
657config VPL_BOOTMETH_VBE_SIMPLE
658 bool "Bootdev support for VBE 'simple' method (VPL)"
659 depends on VPL
660 default y
661 help
662 Enables support for VBE 'simple' boot. This allows updating a single
663 firmware image in boot media such as MMC. It does not support any sort
664 of rollback, recovery or A/B boot.
665
666config SPL_BOOTMETH_VBE_SIMPLE_FW
667 bool "Bootdev support for VBE 'simple' method firmware phase (SPL)"
668 depends on VPL
669 default y
670 help
671 Enables support for the firmware parts of VBE 'simple' boot. This
672 includes an SPL loader which locates the correct U-Boot to boot into.
673 This option should really only be enabled for VPL, since it is the
674 phase where the SPL + U-Boot decision should be made. But for now,
675 SPL does its own FIT-configuration selection.
676
677config VPL_BOOTMETH_VBE_SIMPLE_FW
678 bool "Bootdev support for VBE 'simple' method firmware phase (VPL)"
679 depends on VPL
680 default y
681 help
682 Enables support for the firmware parts of VBE 'simple' boot. This
683 includes an SPL loader which locates the correct SPL to boot into.
684 This option enabled for VPL, since it is the phase where the SPL
685 decision is made.
686
Simon Glassd0af04c2022-07-30 15:52:33 -0600687endif # BOOTMETH_VBE
688
Simon Glassd8adbe92023-01-06 08:52:36 -0600689config EXPO
690 bool "Support for expos - groups of scenes displaying a UI"
Simon Glass389a4582023-01-28 15:00:18 -0700691 depends on VIDEO
Simon Glassd8adbe92023-01-06 08:52:36 -0600692 default y if BOOTMETH_VBE
693 help
694 An expo is a way of presenting and collecting information from the
695 user. It consists of a collection of 'scenes' of which only one is
696 presented at a time. An expo is typically used to show a boot menu
697 and allow settings to be changed.
698
699 The expo can be presented in graphics form using a vidconsole, or in
700 text form on a serial console.
701
Simon Glass423994e2022-04-24 23:31:20 -0600702config BOOTMETH_SANDBOX
703 def_bool y
704 depends on SANDBOX
705 help
706 This is a sandbox bootmeth driver used for testing. It always returns
707 -ENOTSUPP when attempting to boot.
708
Simon Glass7e03e742022-04-24 23:31:22 -0600709config BOOTMETH_SCRIPT
710 bool "Bootdev support for U-Boot scripts"
711 default y if BOOTSTD_FULL
Tom Rini9bf470a2023-10-26 14:31:27 -0400712 depends on CMDLINE
Simon Glassb4b7ebe2023-05-05 20:03:05 -0600713 select HUSH_PARSER
Simon Glass7e03e742022-04-24 23:31:22 -0600714 help
715 Enables support for booting a distro via a U-Boot script. This makes
716 the bootdevs look for a 'boot/boot.scr' file which can be used to
717 boot the distro.
718
719 This provides a way to try out standard boot on an existing boot flow.
720 It is not enabled by default to save space.
721
Simon Glass6cfb0022023-09-14 10:55:53 -0600722endif # BOOTSTD
Simon Glassad8ec372022-04-24 23:31:13 -0600723
Simon Glassb45b1632020-09-10 20:21:13 -0600724config LEGACY_IMAGE_FORMAT
725 bool "Enable support for the legacy image format"
Andrew Davis98a22d02022-05-04 15:52:27 -0500726 default y if !FIT_SIGNATURE && !TI_SECURE_DEVICE
Simon Glassb45b1632020-09-10 20:21:13 -0600727 help
728 This option enables the legacy image format. It is enabled by
729 default for backward compatibility, unless FIT_SIGNATURE is
730 set where it is disabled so that unsigned images cannot be
731 loaded. If a board needs the legacy image format support in this
732 case, enable it here.
733
Eddie James32401ba2023-10-24 10:43:50 -0500734config MEASURED_BOOT
735 bool "Measure boot images and configuration when booting without EFI"
736 depends on HASH && TPM_V2
Ilias Apalodimas1e665f92024-06-23 14:48:18 +0300737 select SHA1
738 select SHA256
739 select SHA384
740 select SHA512
Eddie James32401ba2023-10-24 10:43:50 -0500741 help
742 This option enables measurement of the boot process when booting
743 without UEFI . Measurement involves creating cryptographic hashes
744 of the binary images that are booting and storing them in the TPM.
745 In addition, a log of these hashes is stored in memory for the OS
746 to verify the booted images and configuration. Enable this if the
747 OS has configured some memory area for the event log and you intend
748 to use some attestation tools on your system.
749
750if MEASURED_BOOT
751 config MEASURE_DEVICETREE
752 bool "Measure the devicetree image"
753 default y if MEASURED_BOOT
754 help
Quentin Schulzc0a7ae02024-06-12 16:58:47 +0200755 On some platforms, the Device Tree is not static as it may contain
Eddie James32401ba2023-10-24 10:43:50 -0500756 random MAC addresses or other such data that changes each boot.
757 Therefore, it should not be measured into the TPM. In that case,
758 disable the measurement here.
759
760 config MEASURE_IGNORE_LOG
761 bool "Ignore the existing event log"
Eddie James32401ba2023-10-24 10:43:50 -0500762 help
763 On platforms that use an event log memory region that persists
764 through system resets and are the first stage bootloader, then
765 this option should be enabled to ignore any existing data in the
766 event log memory region.
767endif # MEASURED_BOOT
768
Tom Riniec8d1602023-10-26 14:31:25 -0400769config SYS_BOOTM_LEN
770 hex "Maximum size of a decompresed OS image"
Tom Rini793921e2024-04-18 08:29:35 -0600771 depends on CMD_BOOTM || CMD_BOOTI || CMD_BOOTZ || \
Tom Riniec8d1602023-10-26 14:31:25 -0400772 LEGACY_IMAGE_FORMAT || SPL_LEGACY_IMAGE_FORMAT
773 default 0x4000000 if PPC || ARM64
774 default 0x1000000 if X86 || ARCH_MX6 || ARCH_MX7
775 default 0x800000
776 help
777 This is the maximum size of the buffer that is used to decompress the OS
778 image in to if attempting to boot a compressed image.
779
Simon Glassf11d6132020-09-10 20:21:19 -0600780config SUPPORT_RAW_INITRD
781 bool "Enable raw initrd images"
782 help
783 Note, defining the SUPPORT_RAW_INITRD allows user to supply
784 kernel with raw initrd images. The syntax is slightly different, the
785 address of the initrd must be augmented by it's size, in the following
786 format: "<initrd address>:<initrd size>".
787
Simon Glassd81f07f2020-11-04 09:57:35 -0700788config CHROMEOS
789 bool "Support booting Chrome OS"
790 help
791 Chrome OS requires U-Boot to set up a table indicating the boot mode
792 (e.g. Developer mode) and a few other things. Enable this if you are
793 booting on a Chromebook to avoid getting an error about an invalid
794 firmware ID.
795
796config CHROMEOS_VBOOT
797 bool "Support Chrome OS verified boot"
798 help
799 This is intended to enable the full Chrome OS verified boot support
800 in U-Boot. It is not actually implemented in the U-Boot source code
801 at present, so this option is always set to 'n'. It allows
802 distinguishing between booting Chrome OS in a basic way (developer
803 mode) and a full boot.
804
Tom Rinieb4f2de2022-06-25 11:02:44 -0400805config SYS_RAMBOOT
806 bool
807
Tom Rini9ff815a2021-08-24 23:11:49 -0400808config RAMBOOT_PBL
809 bool "Freescale PBL(pre-boot loader) image format support"
Tom Rinieb4f2de2022-06-25 11:02:44 -0400810 select SYS_RAMBOOT if PPC
Tom Rini9ff815a2021-08-24 23:11:49 -0400811 help
812 Some SoCs use PBL to load RCW and/or pre-initialization instructions.
813 For more details refer to doc/README.pblimage
814
Tom Rini886e6e32022-03-23 17:20:03 -0400815choice
Tom Rini489f4022022-12-28 10:52:51 -0500816 prompt "Freescale PBL (or predecessor) load location"
Tom Rini886e6e32022-03-23 17:20:03 -0400817 depends on RAMBOOT_PBL || ((TARGET_P1010RDB_PA || TARGET_P1010RDB_PB \
818 || TARGET_P1020RDB_PC || TARGET_P1020RDB_PD || TARGET_P2020RDB) \
Pali Rohár6763ff82024-06-06 18:33:26 +0200819 && !CMD_NAND) || (TARGET_TURRIS_1X && SYS_MPC85XX_NO_RESETVEC)
Tom Rini886e6e32022-03-23 17:20:03 -0400820
821config SDCARD
Tom Rini489f4022022-12-28 10:52:51 -0500822 bool "Freescale PBL (or similar) is found on SD card"
Tom Rini886e6e32022-03-23 17:20:03 -0400823
824config SPIFLASH
Tom Rini489f4022022-12-28 10:52:51 -0500825 bool "Freescale PBL (or similar) is found on SPI flash"
826
827config NO_PBL
828 bool "Freescale PBL (or similar) is not used in this case"
Tom Rini886e6e32022-03-23 17:20:03 -0400829
830endchoice
831
Tom Rini5989fd42022-06-20 08:07:42 -0400832config FSL_FIXED_MMC_LOCATION
833 bool "PBL MMC is at a fixed location"
834 depends on SDCARD && !RAMBOOT_PBL
835
836config ESDHC_HC_BLK_ADDR
837 def_bool y
838 depends on FSL_FIXED_MMC_LOCATION && (ARCH_BSC9131 || ARCH_BSC9132 || ARCH_P1010)
839 help
840 In High Capacity SD Cards (> 2 GBytes), the 32-bit source address and
841 code length of these soc specify the memory address in block address
842 format. Block length is fixed to 512 bytes as per the SD High
843 Capacity specification.
844
Tom Rini9ff815a2021-08-24 23:11:49 -0400845config SYS_FSL_PBL_PBI
846 string "PBI(pre-boot instructions) commands for the PBL image"
847 depends on RAMBOOT_PBL
848 help
849 PBI commands can be used to configure SoC before it starts the execution.
850 Please refer doc/README.pblimage for more details.
851
852config SYS_FSL_PBL_RCW
853 string "Aadditional RCW (Power on reset configuration) for the PBL image"
854 depends on RAMBOOT_PBL
855 help
856 Enables addition of RCW (Power on reset configuration) in built image.
857 Please refer doc/README.pblimage for more details.
858
Tom Rini94b4fec2022-06-25 11:02:46 -0400859config SYS_BOOT_RAMDISK_HIGH
860 depends on CMD_BOOTM || CMD_BOOTI || CMD_BOOTZ
861 depends on !(NIOS2 || SANDBOX || SH || XTENSA)
862 def_bool y
Simon Glass65edcd32023-03-24 16:58:12 -0400863 select LMB
Tom Rini94b4fec2022-06-25 11:02:46 -0400864 help
865 Enable initrd_high functionality. If defined then the initrd_high
866 feature is enabled and the boot* ramdisk subcommand is enabled.
867
Simon Glassb45b1632020-09-10 20:21:13 -0600868endmenu # Boot images
869
Simon Glassf111bf72023-03-24 16:58:11 -0400870config DISTRO_DEFAULTS
Simon Glasse27d7df2023-09-14 10:55:55 -0600871 bool "(deprecated) Script-based booting of Linux distributions"
Tom Rini045245b2023-10-26 14:31:23 -0400872 select CMDLINE
Simon Glass054d0182023-03-24 16:58:13 -0400873 select BOOT_DEFAULTS
Simon Glassf111bf72023-03-24 16:58:11 -0400874 select AUTO_COMPLETE
875 select CMDLINE_EDITING
Simon Glassf111bf72023-03-24 16:58:11 -0400876 select CMD_SYSBOOT
Simon Glassf111bf72023-03-24 16:58:11 -0400877 select HUSH_PARSER
Simon Glassf111bf72023-03-24 16:58:11 -0400878 select SYS_LONGHELP
Simon Glassf111bf72023-03-24 16:58:11 -0400879 help
Simon Glasse27d7df2023-09-14 10:55:55 -0600880 Note: These scripts have been replaced by Standard Boot. Do not use
881 them on new boards. See 'Migrating from distro_boot' at
882 doc/develop/bootstd.rst
883
Simon Glassf111bf72023-03-24 16:58:11 -0400884 Select this to enable various options and commands which are suitable
885 for building u-boot for booting general purpose Linux distributions.
886
Simon Glassd02ddcf2020-09-10 20:21:14 -0600887menu "Boot timing"
888
889config BOOTSTAGE
890 bool "Boot timing and reporting"
891 help
892 Enable recording of boot time while booting. To use it, insert
893 calls to bootstage_mark() with a suitable BOOTSTAGE_ID from
894 bootstage.h. Only a single entry is recorded for each ID. You can
895 give the entry a name with bootstage_mark_name(). You can also
896 record elapsed time in a particular stage using bootstage_start()
897 before starting and bootstage_accum() when finished. Bootstage will
898 add up all the accumulated time and report it.
899
900 Normally, IDs are defined in bootstage.h but a small number of
901 additional 'user' IDs can be used by passing BOOTSTAGE_ID_ALLOC
902 as the ID.
903
904 Calls to show_boot_progress() will also result in log entries but
905 these will not have names.
906
907config SPL_BOOTSTAGE
908 bool "Boot timing and reported in SPL"
Tom Rini0a83cc22022-06-10 23:03:09 -0400909 depends on BOOTSTAGE && SPL
Simon Glassd02ddcf2020-09-10 20:21:14 -0600910 help
911 Enable recording of boot time in SPL. To make this visible to U-Boot
912 proper, enable BOOTSTAGE_STASH as well. This will stash the timing
913 information when SPL finishes and load it when U-Boot proper starts
914 up.
915
916config TPL_BOOTSTAGE
917 bool "Boot timing and reported in TPL"
Tom Rini36a4ca02022-06-08 08:24:39 -0400918 depends on BOOTSTAGE && TPL
Simon Glassd02ddcf2020-09-10 20:21:14 -0600919 help
920 Enable recording of boot time in SPL. To make this visible to U-Boot
921 proper, enable BOOTSTAGE_STASH as well. This will stash the timing
922 information when TPL finishes and load it when U-Boot proper starts
923 up.
924
925config BOOTSTAGE_REPORT
926 bool "Display a detailed boot timing report before booting the OS"
927 depends on BOOTSTAGE
928 help
929 Enable output of a boot time report just before the OS is booted.
930 This shows how long it took U-Boot to go through each stage of the
931 boot process. The report looks something like this:
932
933 Timer summary in microseconds:
934 Mark Elapsed Stage
935 0 0 reset
936 3,575,678 3,575,678 board_init_f start
937 3,575,695 17 arch_cpu_init A9
938 3,575,777 82 arch_cpu_init done
939 3,659,598 83,821 board_init_r start
940 3,910,375 250,777 main_loop
941 29,916,167 26,005,792 bootm_start
942 30,361,327 445,160 start_kernel
943
944config BOOTSTAGE_RECORD_COUNT
945 int "Number of boot stage records to store"
Simon Glass051ddfb2021-02-03 06:00:49 -0700946 depends on BOOTSTAGE
Simon Glassd02ddcf2020-09-10 20:21:14 -0600947 default 30
948 help
949 This is the size of the bootstage record list and is the maximum
950 number of bootstage records that can be recorded.
951
952config SPL_BOOTSTAGE_RECORD_COUNT
953 int "Number of boot stage records to store for SPL"
Simon Glass051ddfb2021-02-03 06:00:49 -0700954 depends on SPL_BOOTSTAGE
Simon Glassd02ddcf2020-09-10 20:21:14 -0600955 default 5
956 help
957 This is the size of the bootstage record list and is the maximum
958 number of bootstage records that can be recorded.
959
960config TPL_BOOTSTAGE_RECORD_COUNT
961 int "Number of boot stage records to store for TPL"
Simon Glass051ddfb2021-02-03 06:00:49 -0700962 depends on TPL_BOOTSTAGE
Simon Glassd02ddcf2020-09-10 20:21:14 -0600963 default 5
964 help
965 This is the size of the bootstage record list and is the maximum
966 number of bootstage records that can be recorded.
967
968config BOOTSTAGE_FDT
969 bool "Store boot timing information in the OS device tree"
970 depends on BOOTSTAGE
971 help
972 Stash the bootstage information in the FDT. A root 'bootstage'
973 node is created with each bootstage id as a child. Each child
974 has a 'name' property and either 'mark' containing the
975 mark time in microseconds, or 'accum' containing the
976 accumulated time for that bootstage id in microseconds.
977 For example:
978
979 bootstage {
980 154 {
981 name = "board_init_f";
982 mark = <3575678>;
983 };
984 170 {
985 name = "lcd";
986 accum = <33482>;
987 };
988 };
989
990 Code in the Linux kernel can find this in /proc/devicetree.
991
992config BOOTSTAGE_STASH
993 bool "Stash the boot timing information in memory before booting OS"
994 depends on BOOTSTAGE
995 help
996 Some OSes do not support device tree. Bootstage can instead write
997 the boot timing information in a binary format at a given address.
998 This happens through a call to bootstage_stash(), typically in
999 the CPU's cleanup_before_linux() function. You can use the
1000 'bootstage stash' and 'bootstage unstash' commands to do this on
1001 the command line.
1002
1003config BOOTSTAGE_STASH_ADDR
1004 hex "Address to stash boot timing information"
Tom Rinif18679c2023-08-02 11:09:43 -04001005 default 0x0
Simon Glassd02ddcf2020-09-10 20:21:14 -06001006 help
1007 Provide an address which will not be overwritten by the OS when it
1008 starts, so that it can read this information when ready.
1009
1010config BOOTSTAGE_STASH_SIZE
1011 hex "Size of boot timing stash region"
1012 default 0x1000
1013 help
1014 This should be large enough to hold the bootstage stash. A value of
1015 4096 (4KiB) is normally plenty.
1016
1017config SHOW_BOOT_PROGRESS
1018 bool "Show boot progress in a board-specific manner"
1019 help
1020 Defining this option allows to add some board-specific code (calling
1021 a user-provided function show_boot_progress(int) that enables you to
1022 show the system's boot progress on some display (for example, some
1023 LEDs) on your board. At the moment, the following checkpoints are
1024 implemented:
1025
1026 Legacy uImage format:
1027
1028 Arg Where When
1029 1 common/cmd_bootm.c before attempting to boot an image
1030 -1 common/cmd_bootm.c Image header has bad magic number
1031 2 common/cmd_bootm.c Image header has correct magic number
1032 -2 common/cmd_bootm.c Image header has bad checksum
1033 3 common/cmd_bootm.c Image header has correct checksum
1034 -3 common/cmd_bootm.c Image data has bad checksum
1035 4 common/cmd_bootm.c Image data has correct checksum
1036 -4 common/cmd_bootm.c Image is for unsupported architecture
1037 5 common/cmd_bootm.c Architecture check OK
1038 -5 common/cmd_bootm.c Wrong Image Type (not kernel, multi)
1039 6 common/cmd_bootm.c Image Type check OK
1040 -6 common/cmd_bootm.c gunzip uncompression error
1041 -7 common/cmd_bootm.c Unimplemented compression type
1042 7 common/cmd_bootm.c Uncompression OK
1043 8 common/cmd_bootm.c No uncompress/copy overwrite error
1044 -9 common/cmd_bootm.c Unsupported OS (not Linux, BSD, VxWorks, QNX)
1045
1046 9 common/image.c Start initial ramdisk verification
1047 -10 common/image.c Ramdisk header has bad magic number
1048 -11 common/image.c Ramdisk header has bad checksum
1049 10 common/image.c Ramdisk header is OK
1050 -12 common/image.c Ramdisk data has bad checksum
1051 11 common/image.c Ramdisk data has correct checksum
1052 12 common/image.c Ramdisk verification complete, start loading
1053 -13 common/image.c Wrong Image Type (not PPC Linux ramdisk)
1054 13 common/image.c Start multifile image verification
1055 14 common/image.c No initial ramdisk, no multifile, continue.
1056
1057 15 arch/<arch>/lib/bootm.c All preparation done, transferring control to OS
1058
1059 -30 arch/powerpc/lib/board.c Fatal error, hang the system
1060 -31 post/post.c POST test failed, detected by post_output_backlog()
1061 -32 post/post.c POST test failed, detected by post_run_single()
1062
1063 34 common/cmd_doc.c before loading a Image from a DOC device
1064 -35 common/cmd_doc.c Bad usage of "doc" command
1065 35 common/cmd_doc.c correct usage of "doc" command
1066 -36 common/cmd_doc.c No boot device
1067 36 common/cmd_doc.c correct boot device
1068 -37 common/cmd_doc.c Unknown Chip ID on boot device
1069 37 common/cmd_doc.c correct chip ID found, device available
1070 -38 common/cmd_doc.c Read Error on boot device
1071 38 common/cmd_doc.c reading Image header from DOC device OK
1072 -39 common/cmd_doc.c Image header has bad magic number
1073 39 common/cmd_doc.c Image header has correct magic number
1074 -40 common/cmd_doc.c Error reading Image from DOC device
1075 40 common/cmd_doc.c Image header has correct magic number
1076 41 common/cmd_ide.c before loading a Image from a IDE device
1077 -42 common/cmd_ide.c Bad usage of "ide" command
1078 42 common/cmd_ide.c correct usage of "ide" command
1079 -43 common/cmd_ide.c No boot device
1080 43 common/cmd_ide.c boot device found
1081 -44 common/cmd_ide.c Device not available
1082 44 common/cmd_ide.c Device available
1083 -45 common/cmd_ide.c wrong partition selected
1084 45 common/cmd_ide.c partition selected
1085 -46 common/cmd_ide.c Unknown partition table
1086 46 common/cmd_ide.c valid partition table found
1087 -47 common/cmd_ide.c Invalid partition type
1088 47 common/cmd_ide.c correct partition type
1089 -48 common/cmd_ide.c Error reading Image Header on boot device
1090 48 common/cmd_ide.c reading Image Header from IDE device OK
1091 -49 common/cmd_ide.c Image header has bad magic number
1092 49 common/cmd_ide.c Image header has correct magic number
1093 -50 common/cmd_ide.c Image header has bad checksum
1094 50 common/cmd_ide.c Image header has correct checksum
1095 -51 common/cmd_ide.c Error reading Image from IDE device
1096 51 common/cmd_ide.c reading Image from IDE device OK
1097 52 common/cmd_nand.c before loading a Image from a NAND device
1098 -53 common/cmd_nand.c Bad usage of "nand" command
1099 53 common/cmd_nand.c correct usage of "nand" command
1100 -54 common/cmd_nand.c No boot device
1101 54 common/cmd_nand.c boot device found
1102 -55 common/cmd_nand.c Unknown Chip ID on boot device
1103 55 common/cmd_nand.c correct chip ID found, device available
1104 -56 common/cmd_nand.c Error reading Image Header on boot device
1105 56 common/cmd_nand.c reading Image Header from NAND device OK
1106 -57 common/cmd_nand.c Image header has bad magic number
1107 57 common/cmd_nand.c Image header has correct magic number
1108 -58 common/cmd_nand.c Error reading Image from NAND device
1109 58 common/cmd_nand.c reading Image from NAND device OK
1110
1111 -60 common/env_common.c Environment has a bad CRC, using default
1112
1113 64 net/eth.c starting with Ethernet configuration.
1114 -64 net/eth.c no Ethernet found.
1115 65 net/eth.c Ethernet found.
1116
1117 -80 common/cmd_net.c usage wrong
1118 80 common/cmd_net.c before calling net_loop()
1119 -81 common/cmd_net.c some error in net_loop() occurred
1120 81 common/cmd_net.c net_loop() back without error
1121 -82 common/cmd_net.c size == 0 (File with size 0 loaded)
1122 82 common/cmd_net.c trying automatic boot
1123 83 common/cmd_net.c running "source" command
1124 -83 common/cmd_net.c some error in automatic boot or "source" command
1125 84 common/cmd_net.c end without errors
1126
1127 FIT uImage format:
1128
1129 Arg Where When
1130 100 common/cmd_bootm.c Kernel FIT Image has correct format
1131 -100 common/cmd_bootm.c Kernel FIT Image has incorrect format
1132 101 common/cmd_bootm.c No Kernel subimage unit name, using configuration
1133 -101 common/cmd_bootm.c Can't get configuration for kernel subimage
1134 102 common/cmd_bootm.c Kernel unit name specified
1135 -103 common/cmd_bootm.c Can't get kernel subimage node offset
1136 103 common/cmd_bootm.c Found configuration node
1137 104 common/cmd_bootm.c Got kernel subimage node offset
1138 -104 common/cmd_bootm.c Kernel subimage hash verification failed
1139 105 common/cmd_bootm.c Kernel subimage hash verification OK
1140 -105 common/cmd_bootm.c Kernel subimage is for unsupported architecture
1141 106 common/cmd_bootm.c Architecture check OK
1142 -106 common/cmd_bootm.c Kernel subimage has wrong type
1143 107 common/cmd_bootm.c Kernel subimage type OK
1144 -107 common/cmd_bootm.c Can't get kernel subimage data/size
1145 108 common/cmd_bootm.c Got kernel subimage data/size
1146 -108 common/cmd_bootm.c Wrong image type (not legacy, FIT)
1147 -109 common/cmd_bootm.c Can't get kernel subimage type
1148 -110 common/cmd_bootm.c Can't get kernel subimage comp
1149 -111 common/cmd_bootm.c Can't get kernel subimage os
1150 -112 common/cmd_bootm.c Can't get kernel subimage load address
1151 -113 common/cmd_bootm.c Image uncompress/copy overwrite error
1152
1153 120 common/image.c Start initial ramdisk verification
1154 -120 common/image.c Ramdisk FIT image has incorrect format
1155 121 common/image.c Ramdisk FIT image has correct format
1156 122 common/image.c No ramdisk subimage unit name, using configuration
1157 -122 common/image.c Can't get configuration for ramdisk subimage
1158 123 common/image.c Ramdisk unit name specified
1159 -124 common/image.c Can't get ramdisk subimage node offset
1160 125 common/image.c Got ramdisk subimage node offset
1161 -125 common/image.c Ramdisk subimage hash verification failed
1162 126 common/image.c Ramdisk subimage hash verification OK
1163 -126 common/image.c Ramdisk subimage for unsupported architecture
1164 127 common/image.c Architecture check OK
1165 -127 common/image.c Can't get ramdisk subimage data/size
1166 128 common/image.c Got ramdisk subimage data/size
1167 129 common/image.c Can't get ramdisk load address
1168 -129 common/image.c Got ramdisk load address
1169
1170 -130 common/cmd_doc.c Incorrect FIT image format
1171 131 common/cmd_doc.c FIT image format OK
1172
1173 -140 common/cmd_ide.c Incorrect FIT image format
1174 141 common/cmd_ide.c FIT image format OK
1175
1176 -150 common/cmd_nand.c Incorrect FIT image format
1177 151 common/cmd_nand.c FIT image format OK
1178
Marek Vasut98154342021-10-23 03:06:03 +02001179config SPL_SHOW_BOOT_PROGRESS
Jan Kiszka5780edb2021-11-03 15:09:36 +01001180 bool "Show boot progress in a board-specific manner in SPL"
Marek Vasut98154342021-10-23 03:06:03 +02001181 depends on SPL
1182 help
1183 Defining this option allows to add some board-specific code (calling
1184 a user-provided function show_boot_progress(int) that enables you to
1185 show the system's boot progress on some display (for example, some
1186 LEDs) on your board. For details see SHOW_BOOT_PROGRESS.
1187
Simon Glassd02ddcf2020-09-10 20:21:14 -06001188endmenu
1189
Simon Glasseebed782020-09-10 20:21:15 -06001190menu "Boot media"
1191
1192config NOR_BOOT
1193 bool "Support for booting from NOR flash"
1194 depends on NOR
1195 help
1196 Enabling this will make a U-Boot binary that is capable of being
1197 booted via NOR. In this case we will enable certain pinmux early
1198 as the ROM only partially sets up pinmux. We also default to using
1199 NOR for environment.
1200
1201config NAND_BOOT
1202 bool "Support for booting from NAND flash"
Simon Glasseebed782020-09-10 20:21:15 -06001203 imply MTD_RAW_NAND
1204 help
1205 Enabling this will make a U-Boot binary that is capable of being
1206 booted via NAND flash. This is not a must, some SoCs need this,
1207 some not.
1208
1209config ONENAND_BOOT
1210 bool "Support for booting from ONENAND"
Simon Glasseebed782020-09-10 20:21:15 -06001211 imply MTD_RAW_NAND
1212 help
1213 Enabling this will make a U-Boot binary that is capable of being
1214 booted via ONENAND. This is not a must, some SoCs need this,
1215 some not.
1216
1217config QSPI_BOOT
1218 bool "Support for booting from QSPI flash"
Simon Glasseebed782020-09-10 20:21:15 -06001219 help
1220 Enabling this will make a U-Boot binary that is capable of being
1221 booted via QSPI flash. This is not a must, some SoCs need this,
1222 some not.
1223
1224config SATA_BOOT
1225 bool "Support for booting from SATA"
Simon Glasseebed782020-09-10 20:21:15 -06001226 help
1227 Enabling this will make a U-Boot binary that is capable of being
1228 booted via SATA. This is not a must, some SoCs need this,
1229 some not.
1230
1231config SD_BOOT
1232 bool "Support for booting from SD/EMMC"
Simon Glasseebed782020-09-10 20:21:15 -06001233 help
1234 Enabling this will make a U-Boot binary that is capable of being
1235 booted via SD/EMMC. This is not a must, some SoCs need this,
1236 some not.
1237
Tom Rinia43bf4e2021-12-11 14:55:50 -05001238config SD_BOOT_QSPI
1239 bool "Support for booting from SD/EMMC and enable QSPI"
1240 help
1241 Enabling this will make a U-Boot binary that is capable of being
1242 booted via SD/EMMC while enabling QSPI on the platform as well. This
1243 is not a must, some SoCs need this, some not.
1244
Simon Glasseebed782020-09-10 20:21:15 -06001245config SPI_BOOT
1246 bool "Support for booting from SPI flash"
Simon Glasseebed782020-09-10 20:21:15 -06001247 help
1248 Enabling this will make a U-Boot binary that is capable of being
1249 booted via SPI flash. This is not a must, some SoCs need this,
1250 some not.
1251
1252endmenu
1253
Simon Glasse9d54d72020-09-10 20:21:16 -06001254menu "Autoboot options"
1255
1256config AUTOBOOT
1257 bool "Autoboot"
Simon Glass7dee9dc2023-10-26 14:31:22 -04001258 depends on CMDLINE
Simon Glasse9d54d72020-09-10 20:21:16 -06001259 default y
1260 help
1261 This enables the autoboot. See doc/README.autoboot for detail.
1262
Simon Glass7dee9dc2023-10-26 14:31:22 -04001263if AUTOBOOT
1264
Simon Glass1b6cbaa2020-09-10 20:21:17 -06001265config BOOTDELAY
1266 int "delay in seconds before automatically booting"
1267 default 2
Simon Glass1b6cbaa2020-09-10 20:21:17 -06001268 help
1269 Delay before automatically running bootcmd;
1270 set to 0 to autoboot with no delay, but you can stop it by key input.
1271 set to -1 to disable autoboot.
1272 set to -2 to autoboot with no delay and not check for abort
1273
1274 If this value is >= 0 then it is also used for the default delay
1275 before starting the default entry in bootmenu. If it is < 0 then
1276 a default value of 10s is used.
1277
1278 See doc/README.autoboot for details.
1279
Simon Glasse9d54d72020-09-10 20:21:16 -06001280config AUTOBOOT_KEYED
1281 bool "Stop autobooting via specific input key / string"
Simon Glasse9d54d72020-09-10 20:21:16 -06001282 help
1283 This option enables stopping (aborting) of the automatic
1284 boot feature only by issuing a specific input key or
1285 string. If not enabled, any input key will abort the
1286 U-Boot automatic booting process and bring the device
1287 to the U-Boot prompt for user input.
1288
Simon Glass7dee9dc2023-10-26 14:31:22 -04001289if AUTOBOOT_KEYED
1290
Steffen Jaeckeldfc97322021-07-08 15:57:38 +02001291config AUTOBOOT_FLUSH_STDIN
1292 bool "Enable flushing stdin before starting to read the password"
Simon Glass7dee9dc2023-10-26 14:31:22 -04001293 depends on !SANDBOX
Steffen Jaeckeldfc97322021-07-08 15:57:38 +02001294 help
1295 When this option is enabled stdin buffer will be flushed before
1296 starting to read the password.
1297 This can't be enabled for the sandbox as flushing stdin would
1298 break the autoboot unit tests.
1299
Simon Glasse9d54d72020-09-10 20:21:16 -06001300config AUTOBOOT_PROMPT
1301 string "Autoboot stop prompt"
Simon Glasse9d54d72020-09-10 20:21:16 -06001302 default "Autoboot in %d seconds\\n"
1303 help
1304 This string is displayed before the boot delay selected by
1305 CONFIG_BOOTDELAY starts. If it is not defined there is no
1306 output indicating that autoboot is in progress.
1307
1308 Note that this define is used as the (only) argument to a
1309 printf() call, so it may contain '%' format specifications,
Quentin Schulzc0a7ae02024-06-12 16:58:47 +02001310 provided that it also includes, separated by commas exactly
Simon Glasse9d54d72020-09-10 20:21:16 -06001311 like in a printf statement, the required arguments. It is
1312 the responsibility of the user to select only such arguments
1313 that are valid in the given context.
1314
1315config AUTOBOOT_ENCRYPTION
1316 bool "Enable encryption in autoboot stopping"
Simon Glasse9d54d72020-09-10 20:21:16 -06001317 help
1318 This option allows a string to be entered into U-Boot to stop the
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +02001319 autoboot.
1320 The behavior depends whether CONFIG_CRYPT_PW from lib is enabled
1321 or not.
1322 In case CONFIG_CRYPT_PW is enabled, the string will be forwarded
1323 to the crypt-based functionality and be compared against the
1324 string in the environment variable 'bootstopkeycrypt'.
1325 In case CONFIG_CRYPT_PW is disabled the string itself is hashed
1326 and compared against the hash in the environment variable
1327 'bootstopkeysha256'.
1328 If it matches in either case then boot stops and
1329 a command-line prompt is presented.
Simon Glasse9d54d72020-09-10 20:21:16 -06001330 This provides a way to ship a secure production device which can also
1331 be accessed at the U-Boot command line.
1332
Steffen Jaeckel28be70d2021-07-08 15:57:39 +02001333config AUTOBOOT_SHA256_FALLBACK
1334 bool "Allow fallback from crypt-hashed password to sha256"
1335 depends on AUTOBOOT_ENCRYPTION && CRYPT_PW
1336 help
1337 This option adds support to fall back from crypt-hashed
1338 passwords to checking a SHA256 hashed password in case the
1339 'bootstopusesha256' environment variable is set to 'true'.
1340
Simon Glasse9d54d72020-09-10 20:21:16 -06001341config AUTOBOOT_DELAY_STR
1342 string "Delay autobooting via specific input key / string"
Simon Glass7dee9dc2023-10-26 14:31:22 -04001343 depends on !AUTOBOOT_ENCRYPTION
Simon Glasse9d54d72020-09-10 20:21:16 -06001344 help
1345 This option delays the automatic boot feature by issuing
1346 a specific input key or string. If CONFIG_AUTOBOOT_DELAY_STR
1347 or the environment variable "bootdelaykey" is specified
1348 and this string is received from console input before
1349 autoboot starts booting, U-Boot gives a command prompt. The
1350 U-Boot prompt will time out if CONFIG_BOOT_RETRY_TIME is
1351 used, otherwise it never times out.
1352
1353config AUTOBOOT_STOP_STR
1354 string "Stop autobooting via specific input key / string"
Simon Glass7dee9dc2023-10-26 14:31:22 -04001355 depends on !AUTOBOOT_ENCRYPTION
Simon Glasse9d54d72020-09-10 20:21:16 -06001356 help
1357 This option enables stopping (aborting) of the automatic
1358 boot feature only by issuing a specific input key or
1359 string. If CONFIG_AUTOBOOT_STOP_STR or the environment
1360 variable "bootstopkey" is specified and this string is
1361 received from console input before autoboot starts booting,
1362 U-Boot gives a command prompt. The U-Boot prompt never
1363 times out, even if CONFIG_BOOT_RETRY_TIME is used.
1364
1365config AUTOBOOT_KEYED_CTRLC
1366 bool "Enable Ctrl-C autoboot interruption"
Simon Glass7dee9dc2023-10-26 14:31:22 -04001367 depends on !AUTOBOOT_ENCRYPTION
Simon Glasse9d54d72020-09-10 20:21:16 -06001368 help
1369 This option allows for the boot sequence to be interrupted
1370 by ctrl-c, in addition to the "bootdelaykey" and "bootstopkey".
1371 Setting this variable provides an escape sequence from the
1372 limited "password" strings.
1373
Steffen Jaeckel792a13f2021-07-08 15:57:37 +02001374config AUTOBOOT_NEVER_TIMEOUT
1375 bool "Make the password entry never time-out"
Simon Glass7dee9dc2023-10-26 14:31:22 -04001376 depends on AUTOBOOT_ENCRYPTION && CRYPT_PW
Steffen Jaeckel792a13f2021-07-08 15:57:37 +02001377 help
1378 This option removes the timeout from the password entry
1379 when the user first presses the <Enter> key before entering
1380 any other character.
1381
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +02001382config AUTOBOOT_STOP_STR_ENABLE
1383 bool "Enable fixed string to stop autobooting"
Simon Glass7dee9dc2023-10-26 14:31:22 -04001384 depends on AUTOBOOT_ENCRYPTION
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +02001385 help
1386 This option enables the feature to add a fixed stop
1387 string that is defined at compile time.
1388 In every case it will be tried to load the stop
1389 string from the environment.
1390 In case this is enabled and there is no stop string
1391 in the environment, this will be used as default value.
1392
1393config AUTOBOOT_STOP_STR_CRYPT
1394 string "Stop autobooting via crypt-hashed password"
1395 depends on AUTOBOOT_STOP_STR_ENABLE && CRYPT_PW
1396 help
1397 This option adds the feature to only stop the autobooting,
1398 and therefore boot into the U-Boot prompt, when the input
1399 string / password matches a values that is hashed via
1400 one of the supported crypt-style password hashing options
1401 and saved in the environment variable "bootstopkeycrypt".
1402
Simon Glasse9d54d72020-09-10 20:21:16 -06001403config AUTOBOOT_STOP_STR_SHA256
Steffen Jaeckele1788f92021-07-08 15:57:40 +02001404 string "Stop autobooting via SHA256 hashed password"
Steffen Jaeckel6aa6bfb2021-07-08 15:57:35 +02001405 depends on AUTOBOOT_STOP_STR_ENABLE
Simon Glasse9d54d72020-09-10 20:21:16 -06001406 help
1407 This option adds the feature to only stop the autobooting,
1408 and therefore boot into the U-Boot prompt, when the input
Quentin Schulzc0a7ae02024-06-12 16:58:47 +02001409 string / password matches a values that is encrypted via
Joel Peshkin8b7bf532020-11-21 17:18:59 -08001410 a SHA256 hash and saved in the environment variable
1411 "bootstopkeysha256". If the value in that variable
1412 includes a ":", the portion prior to the ":" will be treated
1413 as a salt value.
Simon Glasse9d54d72020-09-10 20:21:16 -06001414
Simon Glass7dee9dc2023-10-26 14:31:22 -04001415endif # AUTOBOOT_KEYED
1416
1417if !AUTOBOOT_KEYED
1418
Simon Glasse9d54d72020-09-10 20:21:16 -06001419config AUTOBOOT_USE_MENUKEY
1420 bool "Allow a specify key to run a menu from the environment"
Simon Glasse9d54d72020-09-10 20:21:16 -06001421 help
1422 If a specific key is pressed to stop autoboot, then the commands in
1423 the environment variable 'menucmd' are executed before boot starts.
1424
1425config AUTOBOOT_MENUKEY
1426 int "ASCII value of boot key to show a menu"
1427 default 0
1428 depends on AUTOBOOT_USE_MENUKEY
1429 help
1430 If this key is pressed to stop autoboot, then the commands in the
1431 environment variable 'menucmd' will be executed before boot starts.
1432 For example, 33 means "!" in ASCII, so pressing ! at boot would take
1433 this action.
1434
Simon Glass7dee9dc2023-10-26 14:31:22 -04001435endif
1436
1437endif # AUTOBOOT
1438
Simon Glasse9d54d72020-09-10 20:21:16 -06001439config AUTOBOOT_MENU_SHOW
1440 bool "Show a menu on boot"
1441 depends on CMD_BOOTMENU
1442 help
1443 This enables the boot menu, controlled by environment variables
1444 defined by the board. The menu starts after running the 'preboot'
1445 environmnent variable (if enabled) and before handling the boot delay.
Peter Robinson16e0b8f2023-08-18 15:54:10 +01001446 See doc/usage/cmd/bootmenu.rst for more details.
Simon Glasse9d54d72020-09-10 20:21:16 -06001447
Masahisa Kojima97cbcc42022-05-26 19:09:38 +09001448config BOOTMENU_DISABLE_UBOOT_CONSOLE
1449 bool "Disallow bootmenu to enter the U-Boot console"
1450 depends on AUTOBOOT_MENU_SHOW
1451 help
1452 If this option is enabled, user can not enter the U-Boot console from
1453 bootmenu. It increases the system security.
1454
Tom Rinia45a3ef2022-03-11 09:12:04 -05001455config BOOT_RETRY
1456 bool "Boot retry feature"
1457 help
1458 Allow for having the U-Boot command prompt time out and attempt
1459 to boot again. If the environment variable "bootretry" is found then
1460 its value is used, otherwise the retry timeout is
1461 CONFIG_BOOT_RETRY_TIME. CONFIG_BOOT_RETRY_MIN is optional and
1462 defaults to CONFIG_BOOT_RETRY_TIME. All times are in seconds.
1463
1464config BOOT_RETRY_TIME
1465 int "Timeout in seconds before attempting to boot again"
1466 depends on BOOT_RETRY
1467 help
1468 Time in seconds before the U-Boot prompt will timeout and boot will
1469 be attempted again.
1470
1471config BOOT_RETRY_MIN
1472 int "Minimum timeout in seconds for 'bootretry'"
1473 depends on BOOT_RETRY
1474 default BOOT_RETRY_TIME
1475 help
1476 The minimum time in seconds that "bootretry" can be set to.
1477
1478config RESET_TO_RETRY
1479 bool "Reset the board to retry autoboot"
1480 depends on BOOT_RETRY
1481 help
1482 After the countdown timed out, the board will be reset to restart
1483 again.
1484
Simon Glasse9d54d72020-09-10 20:21:16 -06001485endmenu
1486
Philippe Reynesd28484e2022-03-28 22:56:59 +02001487menu "Image support"
1488
1489config IMAGE_PRE_LOAD
1490 bool "Image pre-load support"
1491 help
1492 Enable an image pre-load stage in the SPL.
1493 This pre-load stage allows to do some manipulation
1494 or check (for example signature check) on an image
1495 before launching it.
1496
1497config SPL_IMAGE_PRE_LOAD
1498 bool "Image pre-load support within SPL"
1499 depends on SPL && IMAGE_PRE_LOAD
1500 help
1501 Enable an image pre-load stage in the SPL.
1502 This pre-load stage allows to do some manipulation
1503 or check (for example signature check) on an image
1504 before launching it.
1505
1506config IMAGE_PRE_LOAD_SIG
1507 bool "Image pre-load signature support"
1508 depends on IMAGE_PRE_LOAD
1509 select FIT_SIGNATURE
1510 select RSA
1511 select RSA_VERIFY_WITH_PKEY
1512 help
1513 Enable signature check support in the pre-load stage.
1514 For this feature a very simple header is added before
1515 the image with few fields:
1516 - a magic
1517 - the image size
1518 - the signature
1519 All other information (header size, type of signature,
1520 ...) are provided in the node /image/pre-load/sig of
1521 u-boot.
1522
1523config SPL_IMAGE_PRE_LOAD_SIG
1524 bool "Image pre-load signature support witin SPL"
1525 depends on SPL_IMAGE_PRE_LOAD && IMAGE_PRE_LOAD_SIG
1526 select SPL_FIT_SIGNATURE
1527 select SPL_RSA
1528 select SPL_RSA_VERIFY_WITH_PKEY
1529 help
1530 Enable signature check support in the pre-load stage in the SPL.
1531 For this feature a very simple header is added before
1532 the image with few fields:
1533 - a magic
1534 - the image size
1535 - the signature
1536 All other information (header size, type of signature,
1537 ...) are provided in the node /image/pre-load/sig of
1538 u-boot.
1539
1540endmenu
1541
Simon Glass27367192023-09-14 10:55:46 -06001542if OF_LIBFDT
1543
1544menu "Devicetree fixup"
1545
Matthias Schiffere908fec2023-12-11 12:03:17 +01001546config OF_ENV_SETUP
1547 bool "Run a command from environment to set up device tree before boot"
1548 depends on CMD_FDT
1549 help
1550 This causes U-Boot to run a command from the environment variable
1551 fdt_fixup before booting into the operating system, which can use the
1552 fdt command to modify the device tree. The device tree is then passed
1553 to the OS.
1554
Simon Glass48e6d3d2023-09-14 10:55:47 -06001555config OF_BOARD_SETUP
1556 bool "Set up board-specific details in device tree before boot"
1557 help
1558 This causes U-Boot to call ft_board_setup() before booting into
1559 the Operating System. This function can set up various
1560 board-specific information in the device tree for use by the OS.
1561 The device tree is then passed to the OS.
1562
1563config OF_SYSTEM_SETUP
1564 bool "Set up system-specific details in device tree before boot"
1565 help
1566 This causes U-Boot to call ft_system_setup() before booting into
1567 the Operating System. This function can set up various
1568 system-specific information in the device tree for use by the OS.
1569 The device tree is then passed to the OS.
1570
1571config OF_STDOUT_VIA_ALIAS
1572 bool "Update the device-tree stdout alias from U-Boot"
1573 help
1574 This uses U-Boot's serial alias from the aliases node to update
1575 the device tree passed to the OS. The "linux,stdout-path" property
1576 in the chosen node is set to point to the correct serial node.
1577 This option currently references CONFIG_CONS_INDEX, which is
1578 incorrect when used with device tree as this option does not
1579 exist / should not be used.
1580
Simon Glassb7b7f162023-09-14 10:55:57 -06001581config FDT_FIXUP_PARTITIONS
Simon Glass1a5bcc12023-09-14 10:55:58 -06001582 bool "Overwrite MTD partitions in DTS through defined in 'mtdparts'"
Simon Glassb7b7f162023-09-14 10:55:57 -06001583 help
1584 Allow overwriting defined partitions in the device tree blob
1585 using partition info defined in the 'mtdparts' environment
1586 variable.
1587
Simon Glass27367192023-09-14 10:55:46 -06001588config FDT_SIMPLEFB
1589 bool "FDT tools for simplefb support"
1590 help
1591 Enable the fdt tools to manage the simple fb nodes in device tree.
1592 These functions can be used by board to indicate to the OS
1593 the presence of the simple frame buffer with associated reserved
1594 memory
1595
Simon Glass624c0e52023-09-14 10:55:59 -06001596config ARCH_FIXUP_FDT_MEMORY
1597 bool "Enable arch_fixup_memory_banks() call"
1598 default y
1599 help
1600 Enable FDT memory map syncup before OS boot. This feature can be
1601 used for booting OS with different memory setup where the part of
1602 the memory location should be used for different purpose.
1603
Simon Glass27367192023-09-14 10:55:46 -06001604endmenu
1605
1606endif # OF_LIBFDT
1607
Simon Glass5e958642020-09-10 20:21:18 -06001608config USE_BOOTARGS
1609 bool "Enable boot arguments"
1610 help
1611 Provide boot arguments to bootm command. Boot arguments are specified
1612 in CONFIG_BOOTARGS option. Enable this option to be able to specify
1613 CONFIG_BOOTARGS string. If this option is disabled, CONFIG_BOOTARGS
1614 will be undefined and won't take any space in U-Boot image.
1615
1616config BOOTARGS
1617 string "Boot arguments"
1618 depends on USE_BOOTARGS && !USE_DEFAULT_ENV_FILE
1619 help
1620 This can be used to pass arguments to the bootm command. The value of
1621 CONFIG_BOOTARGS goes into the environment value "bootargs". Note that
1622 this value will also override the "chosen" node in FDT blob.
1623
Simon Glass529e2082020-11-05 10:33:48 -07001624config BOOTARGS_SUBST
1625 bool "Support substituting strings in boot arguments"
1626 help
1627 This allows substituting string values in the boot arguments. These
1628 are applied after the commandline has been built.
1629
1630 One use for this is to insert the root-disk UUID into the command
1631 line where bootargs contains "root=${uuid}"
1632
1633 setenv bootargs "console= root=${uuid}"
1634 # Set the 'uuid' environment variable
1635 part uuid mmc 2:2 uuid
1636
1637 # Command-line substitution will put the real uuid into the
1638 # kernel command line
1639 bootm
1640
Simon Glass5e958642020-09-10 20:21:18 -06001641config USE_BOOTCOMMAND
1642 bool "Enable a default value for bootcmd"
Tom Rinidc3bf2d2023-10-26 14:31:28 -04001643 depends on CMDLINE
Simon Glass5e958642020-09-10 20:21:18 -06001644 help
1645 Provide a default value for the bootcmd entry in the environment. If
1646 autoboot is enabled this is what will be run automatically. Enable
1647 this option to be able to specify CONFIG_BOOTCOMMAND as a string. If
1648 this option is disabled, CONFIG_BOOTCOMMAND will be undefined and
1649 won't take any space in U-Boot image.
1650
1651config BOOTCOMMAND
1652 string "bootcmd value"
1653 depends on USE_BOOTCOMMAND && !USE_DEFAULT_ENV_FILE
Simon Glass2d5a8e12023-05-06 08:27:09 -06001654 default "bootflow scan -lb" if BOOTSTD_DEFAULTS && CMD_BOOTFLOW_FULL
1655 default "bootflow scan" if BOOTSTD_DEFAULTS && !CMD_BOOTFLOW_FULL
Simon Glassbe661cb2022-04-24 23:31:27 -06001656 default "run distro_bootcmd" if !BOOTSTD_BOOTCOMMAND && DISTRO_DEFAULTS
Simon Glass5e958642020-09-10 20:21:18 -06001657 help
1658 This is the string of commands that will be used as bootcmd and if
1659 AUTOBOOT is set, automatically run.
1660
1661config USE_PREBOOT
1662 bool "Enable preboot"
Tom Rinidc3bf2d2023-10-26 14:31:28 -04001663 depends on CMDLINE
Simon Glass5e958642020-09-10 20:21:18 -06001664 help
1665 When this option is enabled, the existence of the environment
1666 variable "preboot" will be checked immediately before starting the
1667 CONFIG_BOOTDELAY countdown and/or running the auto-boot command resp.
1668 entering interactive mode.
1669
1670 This feature is especially useful when "preboot" is automatically
1671 generated or modified. For example, the boot code can modify the
1672 "preboot" when a user holds down a certain combination of keys.
1673
1674config PREBOOT
1675 string "preboot default value"
1676 depends on USE_PREBOOT && !USE_DEFAULT_ENV_FILE
Patrick Delaunaybb15d402020-10-12 09:47:50 +02001677 default "usb start" if USB_KEYBOARD
Simon Glass5e958642020-09-10 20:21:18 -06001678 default ""
1679 help
1680 This is the default of "preboot" environment variable.
1681
Pali Rohár39c43c32022-07-10 13:42:55 +02001682config PREBOOT_DEFINED
1683 bool
1684 default y if PREBOOT != ""
1685
Simon Glassc10ddfd2020-09-10 20:21:20 -06001686config DEFAULT_FDT_FILE
1687 string "Default fdt file"
1688 help
1689 This option is used to set the default fdt file to boot OS.
1690
Dzmitry Sankouskia3463062022-02-22 21:49:52 +03001691config SAVE_PREV_BL_FDT_ADDR
1692 depends on ARM
1693 bool "Saves fdt address, passed by the previous bootloader, to env var"
1694 help
1695 When u-boot is used as a chain-loaded bootloader (replacing OS kernel),
1696 enable this option to save fdt address, passed by the
1697 previous bootloader for future use.
1698 Address is saved to `prevbl_fdt_addr` environment variable.
1699
1700 If no fdt was provided by previous bootloader, no env variables
1701 will be created.
1702
1703config SAVE_PREV_BL_INITRAMFS_START_ADDR
1704 depends on ARM
1705 bool "Saves initramfs address, passed by the previous bootloader, to env var"
1706 help
1707 When u-boot is used as a chain-loaded bootloader(replacing OS kernel),
1708 enable this option to save initramfs address, passed by the
1709 previous bootloader for future use.
1710 Address is saved to `prevbl_initrd_start_addr` environment variable.
1711
1712 If no initramfs was provided by previous bootloader, no env variables
1713 will be created.
1714
Simon Glassc8925112023-06-01 10:23:02 -06001715menu "Configuration editor"
1716
1717config CEDIT
1718 bool "Configuration editor"
Heinrich Schuchardtef97f7c2023-12-16 16:38:36 +01001719 depends on EXPO
Simon Glassc8925112023-06-01 10:23:02 -06001720 help
1721 Provides a way to deal with board configuration and present it to
1722 the user for adjustment.
1723
1724 This is intended to provide both graphical and text-based user
1725 interfaces, but only graphical is support at present.
1726
1727endmenu # Configuration editor
1728
Simon Glassb45b1632020-09-10 20:21:13 -06001729endmenu # Booting