blob: 4324694d480c70bc900d351cca784afeeb41d0f3 [file] [log] [blame]
Alexander Grafed980b82016-03-04 01:10:07 +01001config EFI_LOADER
Heinrich Schuchardt9363fd22019-05-11 10:27:58 +02002 bool "Support running UEFI applications"
Heinrich Schuchardtb20bb092019-11-17 10:44:16 +01003 depends on OF_LIBFDT && ( \
Heinrich Schuchardt38064ee2019-11-19 04:19:09 +01004 ARM && (SYS_CPU = arm1136 || \
5 SYS_CPU = arm1176 || \
6 SYS_CPU = armv7 || \
7 SYS_CPU = armv8) || \
Heinrich Schuchardtb20bb092019-11-17 10:44:16 +01008 X86 || RISCV || SANDBOX)
Alexander Graf6698bb32018-01-24 14:54:21 +01009 # We need EFI_STUB_64BIT to be set on x86_64 with EFI_STUB
10 depends on !EFI_STUB || !X86_64 || EFI_STUB_64BIT
11 # We need EFI_STUB_32BIT to be set on x86_32 with EFI_STUB
12 depends on !EFI_STUB || !X86 || X86_64 || EFI_STUB_32BIT
Heinrich Schuchardtb7cdecf2019-11-20 18:48:02 +010013 default y if !ARM || SYS_CPU = armv7 || SYS_CPU = armv8
Adam Forda451bc22018-02-06 12:14:28 -060014 select LIB_UUID
Adam Ford1811a922018-02-06 12:43:56 -060015 select HAVE_BLOCK_DEVICE
Heinrich Schuchardtdba51482019-01-22 21:35:23 +010016 select REGEX
Heinrich Schuchardt503e04f2018-04-29 23:37:12 +020017 imply CFB_CONSOLE_ANSI
Heinrich Schuchardt93f62012020-03-21 20:45:50 +010018 imply FAT
19 imply FAT_WRITE
Heinrich Schuchardt8876e1b2019-12-04 22:58:58 +010020 imply USB_KEYBOARD_FN_KEYS
Heinrich Schuchardtfaadc042020-01-15 00:49:35 +010021 imply VIDEO_ANSI
Alexander Grafed980b82016-03-04 01:10:07 +010022 help
Heinrich Schuchardt9363fd22019-05-11 10:27:58 +020023 Select this option if you want to run UEFI applications (like GNU
24 GRUB or iPXE) on top of U-Boot. If this option is enabled, U-Boot
25 will expose the UEFI API to a loaded application, enabling it to
26 reuse U-Boot's device drivers.
Alexander Graf51735ae2016-05-11 18:25:48 +020027
Heinrich Schuchardt5684c8d2019-05-08 23:17:38 +020028if EFI_LOADER
Alexander Graf5fbb2892019-02-11 15:24:00 +010029
Heinrich Schuchardt5f7dcf02020-03-19 18:21:58 +000030config EFI_VARIABLE_FILE_STORE
31 bool "Store non-volatile UEFI variables as file"
32 depends on FAT_WRITE
33 default y
34 help
35 Select tis option if you want non-volatile UEFI variables to be stored
36 as file /ubootefi.var on the EFI system partition.
37
Heinrich Schuchardt5ec48e32019-05-31 22:56:02 +020038config EFI_GET_TIME
39 bool "GetTime() runtime service"
40 depends on DM_RTC
41 default y
42 help
43 Provide the GetTime() runtime service at boottime. This service
44 can be used by an EFI application to read the real time clock.
45
46config EFI_SET_TIME
47 bool "SetTime() runtime service"
48 depends on EFI_GET_TIME
49 default n
50 help
51 Provide the SetTime() runtime service at boottime. This service
52 can be used by an EFI application to adjust the real time clock.
53
Heinrich Schuchardt64b5ba42019-05-11 09:53:33 +020054config EFI_DEVICE_PATH_TO_TEXT
55 bool "Device path to text protocol"
56 default y
57 help
58 The device path to text protocol converts device nodes and paths to
59 human readable strings.
60
Alexander Graf5fbb2892019-02-11 15:24:00 +010061config EFI_LOADER_HII
Heinrich Schuchardt5684c8d2019-05-08 23:17:38 +020062 bool "HII protocols"
Heinrich Schuchardt084f0932019-04-07 23:58:50 +020063 default y
Alexander Graf5fbb2892019-02-11 15:24:00 +010064 help
65 The Human Interface Infrastructure is a complicated framework that
66 allows UEFI applications to draw fancy menus and hook strings using
67 a translation framework.
68
69 U-Boot implements enough of its features to be able to run the UEFI
Heinrich Schuchardt084f0932019-04-07 23:58:50 +020070 Shell, but not more than that.
Heinrich Schuchardt5684c8d2019-05-08 23:17:38 +020071
Heinrich Schuchardt95ab3812019-05-16 07:52:58 +020072config EFI_UNICODE_COLLATION_PROTOCOL2
Heinrich Schuchardt33499732019-05-08 23:24:26 +020073 bool "Unicode collation protocol"
74 default y
75 help
76 The Unicode collation protocol is used for lexical comparisons. It is
77 required to run the UEFI shell.
78
Heinrich Schuchardt95ab3812019-05-16 07:52:58 +020079if EFI_UNICODE_COLLATION_PROTOCOL2
Heinrich Schuchardt33499732019-05-08 23:24:26 +020080
Heinrich Schuchardt5684c8d2019-05-08 23:17:38 +020081config EFI_UNICODE_CAPITALIZATION
82 bool "Support Unicode capitalization"
83 default y
84 help
85 Select this option to enable correct handling of the capitalization of
86 Unicode codepoints in the range 0x0000-0xffff. If this option is not
87 set, only the the correct handling of the letters of the codepage
88 used by the FAT file system is ensured.
89
Heinrich Schuchardtb1b782d2019-05-16 18:19:00 +020090config EFI_UNICODE_COLLATION_PROTOCOL
91 bool "Deprecated version of the Unicode collation protocol"
92 default n
93 help
94 In EFI 1.10 a version of the Unicode collation protocol using ISO
95 639-2 language codes existed. This protocol is not part of the UEFI
96 specification any longer. Unfortunately it is required to run the
97 UEFI Self Certification Test (SCT) II, version 2.6, 2017.
98
99 Choose this option for testing only. It is bound to be removed.
100
Heinrich Schuchardt33499732019-05-08 23:24:26 +0200101endif
102
Heinrich Schuchardt5684c8d2019-05-08 23:17:38 +0200103config EFI_LOADER_BOUNCE_BUFFER
104 bool "EFI Applications use bounce buffers for DMA operations"
105 depends on ARM64
106 default n
107 help
108 Some hardware does not support DMA to full 64bit addresses. For this
109 hardware we can create a bounce buffer so that payloads don't have to
110 worry about platform details.
111
112config EFI_PLATFORM_LANG_CODES
113 string "Language codes supported by firmware"
114 default "en-US"
115 help
116 This value is used to initialize the PlatformLangCodes variable. Its
117 value is a semicolon (;) separated list of language codes in native
118 RFC 4646 format, e.g. "en-US;de-DE". The first language code is used
119 to initialize the PlatformLang variable.
120
Heinrich Schuchardt953661a2019-07-05 18:12:16 +0200121config EFI_HAVE_RUNTIME_RESET
122 # bool "Reset runtime service is available"
123 bool
124 default y
125 depends on ARCH_BCM283X || FSL_LAYERSCAPE || PSCI_RESET || SYSRESET_X86
126
Heinrich Schuchardt6f3badb2019-07-22 22:04:36 +0200127config EFI_GRUB_ARM32_WORKAROUND
128 bool "Workaround for GRUB on 32bit ARM"
129 default y
130 depends on ARM && !ARM64
131 help
132 GRUB prior to version 2.04 requires U-Boot to disable caches. This
133 workaround currently is also needed on systems with caches that
134 cannot be managed via CP15.
Sughosh Ganuf552fa42019-12-29 00:01:05 +0530135
136config EFI_RNG_PROTOCOL
137 bool "EFI_RNG_PROTOCOL support"
138 depends on DM_RNG
Peter Robinsonbdf329e2020-04-01 11:15:01 +0100139 default y
Sughosh Ganuf552fa42019-12-29 00:01:05 +0530140 help
Heinrich Schuchardt0e228852020-02-14 23:28:58 +0100141 Provide a EFI_RNG_PROTOCOL implementation using the hardware random
142 number generator of the platform.
Sughosh Ganuf552fa42019-12-29 00:01:05 +0530143
Ilias Apalodimasec80b472020-02-21 09:55:45 +0200144config EFI_LOAD_FILE2_INITRD
145 bool "EFI_FILE_LOAD2_PROTOCOL for Linux initial ramdisk"
146 default n
147 help
148 Expose a EFI_FILE_LOAD2_PROTOCOL that the Linux UEFI stub can
149 use to load the initial ramdisk. Once this is enabled using
150 initrd=<ramdisk> will stop working.
151
152config EFI_INITRD_FILESPEC
153 string "initramfs path"
154 default "host 0:1 initrd"
155 depends on EFI_LOAD_FILE2_INITRD
156 help
157 Full path of the initramfs file, e.g. mmc 0:2 initramfs.cpio.gz.
158
AKASHI Takahiro9bf09b52020-04-14 11:51:38 +0900159config EFI_SECURE_BOOT
160 bool "Enable EFI secure boot support"
161 depends on EFI_LOADER
162 select SHA256
163 select RSA
164 select RSA_VERIFY_WITH_PKEY
165 select IMAGE_SIGN_INFO
166 select ASYMMETRIC_KEY_TYPE
167 select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
168 select X509_CERTIFICATE_PARSER
169 select PKCS7_MESSAGE_PARSER
170 default n
171 help
172 Select this option to enable EFI secure boot support.
173 Once SecureBoot mode is enforced, any EFI binary can run only if
174 it is signed with a trusted key. To do that, you need to install,
175 at least, PK, KEK and db.
176
Ilias Apalodimasf042e472020-05-17 22:25:44 +0300177config EFI_MM_COMM_TEE
178 bool "UEFI variables storage service via OP-TEE"
179 depends on OPTEE
180 default n
181 help
182 If OP-TEE is present and running StandAloneMM, dispatch all UEFI variable
183 related operations to that. The application will verify, authenticate and
184 store the variables on an RPMB.
185
Heinrich Schuchardt5684c8d2019-05-08 23:17:38 +0200186endif