blob: 777e408e24381e525dffa3d36ddba574d325a95d [file] [log] [blame]
Simon Glasscf298162020-09-10 20:21:13 -06001menu "Boot options"
2
3menu "Boot images"
4
Simon Glass12a7ea02023-09-14 10:55:49 -06005menuconfig FIT
6 bool "Flattened Image Tree (FIT)"
Alexandru Gagniuc92055e12021-09-02 19:54:21 -05007 select HASH
Simon Glasscf298162020-09-10 20:21:13 -06008 select MD5
9 select SHA1
Alexandru Gagniuceb5171d2021-09-02 19:54:17 -050010 imply SHA256
Simon Glasscf298162020-09-10 20:21:13 -060011 help
12 This option allows you to boot the new uImage structure,
13 Flattened Image Tree. FIT is formally a FDT, which can include
14 images of various types (kernel, FDT blob, ramdisk, etc.)
15 in a single blob. To boot this new uImage structure,
16 pass the address of the blob to the "bootm" command.
17 FIT is very flexible, supporting compression, multiple images,
18 multiple configurations, verification through hashing and also
19 verified boot (secure boot using RSA).
20
Simon Glass12a7ea02023-09-14 10:55:49 -060021if FIT
Simon Glassd6b318d2021-12-18 11:27:50 -070022
Simon Glasscf298162020-09-10 20:21:13 -060023config FIT_EXTERNAL_OFFSET
24 hex "FIT external data offset"
25 default 0x0
26 help
27 This specifies a data offset in fit image.
28 The offset is from data payload offset to the beginning of
29 fit image header. When specifies a offset, specific data
30 could be put in the hole between data payload and fit image
31 header, such as CSF data on i.MX platform.
32
Simon Glass6f3c2d82021-02-15 17:08:10 -070033config FIT_FULL_CHECK
34 bool "Do a full check of the FIT before using it"
35 default y
36 help
37 Enable this do a full check of the FIT to make sure it is valid. This
38 helps to protect against carefully crafted FITs which take advantage
39 of bugs or omissions in the code. This includes a bad structure,
40 multiple root nodes and the like.
41
Simon Glasscf298162020-09-10 20:21:13 -060042config FIT_SIGNATURE
43 bool "Enable signature verification of FIT uImages"
Simon Glass12a7ea02023-09-14 10:55:49 -060044 depends on DM
Simon Glasscf298162020-09-10 20:21:13 -060045 select HASH
Alexandru Gagniuc61416fe2021-07-29 11:47:18 -050046 imply RSA
47 imply RSA_VERIFY
Simon Glasscf298162020-09-10 20:21:13 -060048 select IMAGE_SIGN_INFO
Simon Glass6f3c2d82021-02-15 17:08:10 -070049 select FIT_FULL_CHECK
Simon Glasscf298162020-09-10 20:21:13 -060050 help
51 This option enables signature verification of FIT uImages,
52 using a hash signed and verified using RSA. If
53 CONFIG_SHA_PROG_HW_ACCEL is defined, i.e support for progressive
54 hashing is available using hardware, then the RSA library will use
55 it. See doc/uImage.FIT/signature.txt for more details.
56
57 WARNING: When relying on signed FIT images with a required signature
58 check the legacy image format is disabled by default, so that
59 unsigned images cannot be loaded. If a board needs the legacy image
60 format support in this case, enable it using
61 CONFIG_LEGACY_IMAGE_FORMAT.
62
63config FIT_SIGNATURE_MAX_SIZE
64 hex "Max size of signed FIT structures"
65 depends on FIT_SIGNATURE
66 default 0x10000000
67 help
68 This option sets a max size in bytes for verified FIT uImages.
69 A sane value of 256MB protects corrupted DTB structures from overlapping
70 device memory. Assure this size does not extend past expected storage
71 space.
72
Simon Glassad74aed2021-07-14 17:05:31 -050073config FIT_RSASSA_PSS
Simon Glasscf298162020-09-10 20:21:13 -060074 bool "Support rsassa-pss signature scheme of FIT image contents"
75 depends on FIT_SIGNATURE
Simon Glasscf298162020-09-10 20:21:13 -060076 help
77 Enable this to support the pss padding algorithm as described
78 in the rfc8017 (https://tools.ietf.org/html/rfc8017).
79
80config FIT_CIPHER
81 bool "Enable ciphering data in a FIT uImages"
Simon Glass12a7ea02023-09-14 10:55:49 -060082 depends on DM
Simon Glasscf298162020-09-10 20:21:13 -060083 select AES
84 help
85 Enable the feature of data ciphering/unciphering in the tool mkimage
86 and in the u-boot support of the FIT image.
87
88config FIT_VERBOSE
89 bool "Show verbose messages when FIT images fail"
90 help
91 Generally a system will have valid FIT images so debug messages
92 are a waste of code space. If you are debugging your images then
93 you can enable this option to get more verbose information about
94 failures.
95
96config FIT_BEST_MATCH
97 bool "Select the best match for the kernel device tree"
98 help
99 When no configuration is explicitly selected, default to the
100 one whose fdt's compatibility field best matches that of
101 U-Boot itself. A match is considered "best" if it matches the
102 most specific compatibility entry of U-Boot's fdt's root node.
103 The order of entries in the configuration's fdt is ignored.
104
105config FIT_IMAGE_POST_PROCESS
106 bool "Enable post-processing of FIT artifacts after loading by U-Boot"
Manorit Chawdhry86fab112023-07-14 11:22:40 +0530107 depends on SOCFPGA_SECURE_VAB_AUTH
Simon Glasscf298162020-09-10 20:21:13 -0600108 help
109 Allows doing any sort of manipulation to blobs after they got extracted
110 from FIT images like stripping off headers or modifying the size of the
111 blob, verification, authentication, decryption etc. in a platform or
112 board specific way. In order to use this feature a platform or board-
113 specific implementation of board_fit_image_post_process() must be
114 provided. Also, anything done during this post-processing step would
115 need to be comprehended in how the images were prepared before being
116 injected into the FIT creation (i.e. the blobs would have been pre-
117 processed before being added to the FIT image).
118
Ravik Hasija7a018822021-01-27 14:01:48 -0800119config FIT_PRINT
120 bool "Support FIT printing"
121 default y
122 help
123 Support printing the content of the fitImage in a verbose manner.
124
Simon Glasscf298162020-09-10 20:21:13 -0600125config SPL_FIT
126 bool "Support Flattened Image Tree within SPL"
Simon Glass4d8ea262023-09-14 10:55:52 -0600127 depends on SPL
Alexandru Gagniuc92055e12021-09-02 19:54:21 -0500128 select SPL_HASH
Simon Glasscf298162020-09-10 20:21:13 -0600129 select SPL_OF_LIBFDT
130
131config SPL_FIT_PRINT
132 bool "Support FIT printing within SPL"
133 depends on SPL_FIT
134 help
135 Support printing the content of the fitImage in a verbose manner in SPL.
136
Simon Glass6f3c2d82021-02-15 17:08:10 -0700137config SPL_FIT_FULL_CHECK
138 bool "Do a full check of the FIT before using it"
Tom Rini90c78882022-12-04 10:14:20 -0500139 depends on SPL_FIT
Simon Glass6f3c2d82021-02-15 17:08:10 -0700140 help
141 Enable this do a full check of the FIT to make sure it is valid. This
142 helps to protect against carefully crafted FITs which take advantage
143 of bugs or omissions in the code. This includes a bad structure,
144 multiple root nodes and the like.
145
Simon Glasscf298162020-09-10 20:21:13 -0600146config SPL_FIT_SIGNATURE
147 bool "Enable signature verification of FIT firmware within SPL"
148 depends on SPL_DM
Klaus Heinrich Kiwibdb7f262021-02-09 15:41:54 -0300149 depends on SPL_LOAD_FIT || SPL_LOAD_FIT_FULL
Klaus Heinrich Kiwi6ce28132021-02-09 15:41:53 -0300150 select FIT_SIGNATURE
Simon Glasscf298162020-09-10 20:21:13 -0600151 select SPL_FIT
Simon Glass0c6bdbb2021-07-10 21:14:25 -0600152 select SPL_CRYPTO
Alexandru Gagniuc07212092021-09-02 19:54:19 -0500153 select SPL_HASH
Alexandru Gagniuc61416fe2021-07-29 11:47:18 -0500154 imply SPL_RSA
155 imply SPL_RSA_VERIFY
Simon Glasscf298162020-09-10 20:21:13 -0600156 select SPL_IMAGE_SIGN_INFO
Simon Glass6f3c2d82021-02-15 17:08:10 -0700157 select SPL_FIT_FULL_CHECK
Simon Glasscf298162020-09-10 20:21:13 -0600158
Simon Glassb53541f2021-09-25 19:43:39 -0600159config SPL_FIT_SIGNATURE_MAX_SIZE
160 hex "Max size of signed FIT structures in SPL"
161 depends on SPL_FIT_SIGNATURE
162 default 0x10000000
163 help
164 This option sets a max size in bytes for verified FIT uImages.
165 A sane value of 256MB protects corrupted DTB structures from overlapping
166 device memory. Assure this size does not extend past expected storage
167 space.
168
Philippe Reynes5d39c932021-10-15 11:35:03 +0200169config SPL_FIT_RSASSA_PSS
170 bool "Support rsassa-pss signature scheme of FIT image contents in SPL"
171 depends on SPL_FIT_SIGNATURE
172 help
173 Enable this to support the pss padding algorithm as described
174 in the rfc8017 (https://tools.ietf.org/html/rfc8017) in SPL.
175
Simon Glasscf298162020-09-10 20:21:13 -0600176config SPL_LOAD_FIT
177 bool "Enable SPL loading U-Boot as a FIT (basic fitImage features)"
Simon Glass4d8ea262023-09-14 10:55:52 -0600178 depends on SPL
Simon Glasscf298162020-09-10 20:21:13 -0600179 select SPL_FIT
180 help
181 Normally with the SPL framework a legacy image is generated as part
182 of the build. This contains U-Boot along with information as to
183 where it should be loaded. This option instead enables generation
184 of a FIT (Flat Image Tree) which provides more flexibility. In
185 particular it can handle selecting from multiple device tree
186 and passing the correct one to U-Boot.
187
Alexandru Gagniucdf51ae72021-03-29 12:05:15 -0500188 This path has the following limitations:
189
Bin Meng6e847f62021-05-10 20:23:29 +0800190 1. "loadables" images, other than FDTs, which do not have a "load"
Alexandru Gagniucdf51ae72021-03-29 12:05:15 -0500191 property will not be loaded. This limitation also applies to FPGA
192 images with the correct "compatible" string.
Oleksandr Suvorova3a1afb2022-07-22 17:16:13 +0300193 2. For FPGA images, the supported "compatible" list is in the
194 doc/uImage.FIT/source_file_format.txt.
Alexandru Gagniucdf51ae72021-03-29 12:05:15 -0500195 3. FDTs are only loaded for images with an "os" property of "u-boot".
196 "linux" images are also supported with Falcon boot mode.
197
Simon Glasscf298162020-09-10 20:21:13 -0600198config SPL_LOAD_FIT_ADDRESS
199 hex "load address of fit image"
Simon Glass815f8d32023-09-14 10:55:51 -0600200 depends on SPL_LOAD_FIT
Simon Glasscf298162020-09-10 20:21:13 -0600201 default 0x0
202 help
203 Specify the load address of the fit image that will be loaded
204 by SPL.
205
206config SPL_LOAD_FIT_APPLY_OVERLAY
207 bool "Enable SPL applying DT overlays from FIT"
208 depends on SPL_LOAD_FIT
209 select OF_LIBFDT_OVERLAY
210 help
Hugo Villeneuveb4230372023-04-24 16:51:12 -0400211 The device tree is loaded from the FIT image. Allow the SPL to
Simon Glasscf298162020-09-10 20:21:13 -0600212 also load device-tree overlays from the FIT image an apply them
213 over the device tree.
214
215config SPL_LOAD_FIT_APPLY_OVERLAY_BUF_SZ
216 depends on SPL_LOAD_FIT_APPLY_OVERLAY
217 default 0x10000
218 hex "size of temporary buffer used to load the overlays"
219 help
220 The size of the area where the overlays will be loaded and
221 uncompress. Must be at least as large as biggest overlay
222 (uncompressed)
223
224config SPL_LOAD_FIT_FULL
225 bool "Enable SPL loading U-Boot as a FIT (full fitImage features)"
226 select SPL_FIT
227 help
228 Normally with the SPL framework a legacy image is generated as part
229 of the build. This contains U-Boot along with information as to
230 where it should be loaded. This option instead enables generation
231 of a FIT (Flat Image Tree) which provides more flexibility. In
232 particular it can handle selecting from multiple device tree
233 and passing the correct one to U-Boot.
234
235config SPL_FIT_IMAGE_POST_PROCESS
236 bool "Enable post-processing of FIT artifacts after loading by the SPL"
237 depends on SPL_LOAD_FIT
Andrew Davis042e87e2022-05-04 15:52:28 -0500238 default y if TI_SECURE_DEVICE
Simon Glasscf298162020-09-10 20:21:13 -0600239 help
240 Allows doing any sort of manipulation to blobs after they got extracted
241 from the U-Boot FIT image like stripping off headers or modifying the
242 size of the blob, verification, authentication, decryption etc. in a
243 platform or board specific way. In order to use this feature a platform
244 or board-specific implementation of board_fit_image_post_process() must
245 be provided. Also, anything done during this post-processing step would
246 need to be comprehended in how the images were prepared before being
247 injected into the FIT creation (i.e. the blobs would have been pre-
248 processed before being added to the FIT image).
249
250config SPL_FIT_SOURCE
251 string ".its source file for U-Boot FIT image"
252 depends on SPL_FIT
253 help
254 Specifies a (platform specific) FIT source file to generate the
255 U-Boot FIT image. This could specify further image to load and/or
256 execute.
257
258config USE_SPL_FIT_GENERATOR
259 bool "Use a script to generate the .its script"
Tom Rini90c78882022-12-04 10:14:20 -0500260 depends on SPL_FIT
Simon Glass31f35e82023-01-07 14:07:19 -0700261 default y if SPL_FIT && ARCH_ZYNQMP
Simon Glasscf298162020-09-10 20:21:13 -0600262
263config SPL_FIT_GENERATOR
264 string ".its file generator script for U-Boot FIT image"
265 depends on USE_SPL_FIT_GENERATOR
Simon Glasscf298162020-09-10 20:21:13 -0600266 default "arch/arm/mach-zynqmp/mkimage_fit_atf.sh" if SPL_LOAD_FIT && ARCH_ZYNQMP
Simon Glasscf298162020-09-10 20:21:13 -0600267 help
268 Specifies a (platform specific) script file to generate the FIT
269 source file used to build the U-Boot FIT image file. This gets
270 passed a list of supported device tree file stub names to
271 include in the generated image.
272
Simon Glass42184562022-10-20 18:23:13 -0600273if VPL
274
275config VPL_FIT
276 bool "Support Flattened Image Tree within VPL"
277 depends on VPL
278 default y
279 select VPL_HASH
280 select VPL_OF_LIBFDT
281
282config VPL_FIT_PRINT
283 bool "Support FIT printing within VPL"
284 depends on VPL_FIT
285 default y
286 help
287 Support printing the content of the fitImage in a verbose manner in VPL.
288
289config VPL_FIT_FULL_CHECK
290 bool "Do a full check of the FIT before using it"
291 default y
292 help
293 Enable this do a full check of the FIT to make sure it is valid. This
294 helps to protect against carefully crafted FITs which take advantage
295 of bugs or omissions in the code. This includes a bad structure,
296 multiple root nodes and the like.
297
298config VPL_FIT_SIGNATURE
299 bool "Enable signature verification of FIT firmware within VPL"
300 depends on VPL_DM
Simon Glass42184562022-10-20 18:23:13 -0600301 default y
302 select FIT_SIGNATURE
303 select VPL_FIT
304 select VPL_CRYPTO
305 select VPL_HASH
306 imply VPL_RSA
307 imply VPL_RSA_VERIFY
308 select VPL_IMAGE_SIGN_INFO
309 select VPL_FIT_FULL_CHECK
310
311config VPL_FIT_SIGNATURE_MAX_SIZE
312 hex "Max size of signed FIT structures in VPL"
313 depends on VPL_FIT_SIGNATURE
314 default 0x10000000
315 help
316 This option sets a max size in bytes for verified FIT uImages.
317 A sane value of 256MB protects corrupted DTB structures from overlapping
318 device memory. Assure this size does not extend past expected storage
319 space.
320
321endif # VPL
322
Simon Glass4d8ea262023-09-14 10:55:52 -0600323endif # FIT
324
John Keepingbe43a352022-07-28 11:19:15 +0100325config PXE_UTILS
326 bool
327 select MENU
328 help
329 Utilities for parsing PXE file formats.
330
Tom Rini2180a452023-10-26 14:31:24 -0400331config BOOT_DEFAULTS_FEATURES
332 bool
333 select SUPPORT_RAW_INITRD
334 select ENV_VARS_UBOOT_CONFIG
335 imply USB_STORAGE
336 imply EFI_PARTITION
337 imply ISO_PARTITION
338
339config BOOT_DEFAULTS_CMDS
340 bool
Simon Glassa0c739c2023-03-24 16:58:13 -0400341 imply USE_BOOTCOMMAND
342 select CMD_ENV_EXISTS
343 select CMD_EXT2
344 select CMD_EXT4
345 select CMD_FAT
346 select CMD_FS_GENERIC
347 select CMD_PART if PARTITIONS
348 select CMD_DHCP if CMD_NET
349 select CMD_PING if CMD_NET
350 select CMD_PXE if CMD_NET
Simon Glassa0c739c2023-03-24 16:58:13 -0400351 select CMD_BOOTI if ARM64
352 select CMD_BOOTZ if ARM && !ARM64
353 imply CMD_MII if NET
Tom Rini2180a452023-10-26 14:31:24 -0400354
355config BOOT_DEFAULTS
356 bool # Common defaults for standard boot and distroboot
357 select BOOT_DEFAULTS_FEATURES
358 select BOOT_DEFAULTS_CMDS if CMDLINE
Simon Glassa0c739c2023-03-24 16:58:13 -0400359 help
360 These are not required but are commonly needed to support a good
361 selection of booting methods. Enable this to improve the capability
362 of U-Boot to boot various images. Currently much functionality is
363 tied to enabling the command that exercises it.
364
Simon Glass4a8fcb62023-09-14 10:55:53 -0600365menuconfig BOOTSTD
366 bool "Standard boot"
Simon Glassef5e3892022-04-24 23:31:06 -0600367 default y
368 depends on DM && OF_CONTROL && BLK
369 help
370 U-Boot supports a standard way of locating something to boot,
371 typically an Operating System such as Linux, provided by a distro such
372 as Arch Linux or Debian. Enable this to support iterating through
373 available bootdevs and using bootmeths to find bootflows suitable for
374 booting.
375
376 Standard boot is not a standard way of booting, just a framework
377 within U-Boot for supporting all the different ways that exist.
378
379 Terminology:
380
381 - bootdev - a device which can hold a distro (e.g. MMC)
382 - bootmeth - a method to scan a bootdev to find bootflows (owned by
383 U-Boot)
384 - bootflow - a description of how to boot (owned by the distro)
385
Simon Glass4a8fcb62023-09-14 10:55:53 -0600386if BOOTSTD
387
Simon Glass42184562022-10-20 18:23:13 -0600388config SPL_BOOTSTD
Simon Glass1c419582023-02-22 09:33:58 -0700389 bool "Standard boot support in SPL"
Simon Glass42184562022-10-20 18:23:13 -0600390 depends on SPL && SPL_DM && SPL_OF_CONTROL && SPL_BLK
391 default y if VPL
392 help
393 This enables standard boot in SPL. This is neeeded so that VBE
394 (Verified Boot for Embedded) can be used, since it depends on standard
395 boot. It is enabled by default since the main purpose of VPL is to
396 handle the firmware part of VBE.
397
398config VPL_BOOTSTD
399 bool "Standard boot support in VPL"
400 depends on VPL && VPL_DM && VPL_OF_CONTROL && VPL_BLK
401 default y
402 help
403 This enables standard boot in SPL. This is neeeded so that VBE
404 (Verified Boot for Embedded) can be used, since it depends on standard
405 boot. It is enabled by default since the main purpose of VPL is to
406 handle the firmware part of VBE.
407
Simon Glassbcb1d262023-02-22 14:06:23 -0700408config BOOTSTD_FULL
409 bool "Enhanced features for standard boot"
410 default y if SANDBOX
Shantur Rathorefea3efb2023-12-23 06:51:59 +0000411 imply BOOTSTD_DEFAULTS
Simon Glassbcb1d262023-02-22 14:06:23 -0700412 help
413 This enables various useful features for standard boot, which are not
414 essential for operation:
415
416 - bootdev, bootmeth commands
417 - extra features in the bootflow command
418 - support for selecting the ordering of bootmeths ("bootmeth order")
419 - support for selecting the ordering of bootdevs using the devicetree
420 as well as the "boot_targets" environment variable
421
Simon Glass22353fa2023-01-28 15:00:21 -0700422config BOOTSTD_DEFAULTS
423 bool "Select some common defaults for standard boot"
424 depends on BOOTSTD
Simon Glassa0c739c2023-03-24 16:58:13 -0400425 select BOOT_DEFAULTS
Simon Glassfba0e732023-05-10 16:34:47 -0600426 select BOOTMETH_DISTRO
Simon Glass22353fa2023-01-28 15:00:21 -0700427 help
428 These are not required but are commonly needed to support a good
429 selection of booting methods. Enable this to improve the capability
430 of U-Boot to boot various images.
431
Simon Glassa91492b2022-04-24 23:31:27 -0600432config BOOTSTD_BOOTCOMMAND
433 bool "Use bootstd to boot"
434 default y if !DISTRO_DEFAULTS
435 help
436 Enable this to select a default boot-command suitable for booting
437 with standard boot. This can be overridden by the board if needed,
438 but the default command should be enough for most boards which use
439 standard boot.
440
441 For now this is only selected if distro boot is NOT used, since
442 standard boot does not support all of the features of distro boot
443 yet.
444
Simon Glass1047b532023-11-18 14:05:19 -0700445config BOOTSTD_PROG
446 bool "Use programmatic boot"
447 depends on !CMDLINE
448 default y
449 help
450 Enable this to provide a board_run_command() function which can boot
451 a systen without using commands. If the boot fails, then U-Boot will
452 panic.
453
454 Note: This currently has many limitations and is not a useful booting
455 solution. Future work will eventually make this a viable option.
456
Simon Glassbc06aa02022-07-30 15:52:21 -0600457config BOOTMETH_GLOBAL
458 bool
459 help
460 Add support for global bootmeths. This feature is used by VBE and
461 EFI bootmgr, since they take full control over which bootdevs are
462 selected to boot.
463
Simon Glassc88d67d2023-07-12 09:04:45 -0600464config BOOTMETH_CROS
465 bool "Bootdev support for Chromium OS"
Simon Glassdaffb0b2023-07-30 11:17:02 -0600466 depends on X86 || ARM || SANDBOX
467 default y if !ARM
Simon Glass71f634b2023-08-24 13:55:45 -0600468 select EFI_PARTITION
469 select PARTITION_TYPE_GUID
470 select PARTITION_UUIDS
Simon Glassc88d67d2023-07-12 09:04:45 -0600471 help
472 Enables support for booting Chromium OS using bootdevs. This uses the
473 kernel A slot and obtains the kernel command line from the parameters
474 provided there.
475
476 Note that only x86 devices are supported at present.
477
Simon Glass79f66352023-05-10 16:34:46 -0600478config BOOTMETH_EXTLINUX
479 bool "Bootdev support for extlinux boot"
John Keepingbe43a352022-07-28 11:19:15 +0100480 select PXE_UTILS
Simon Glass31aefaf2022-04-24 23:31:13 -0600481 default y
482 help
Simon Glass79f66352023-05-10 16:34:46 -0600483 Enables support for extlinux boot using bootdevs. This makes the
Simon Glass31aefaf2022-04-24 23:31:13 -0600484 bootdevs look for a 'extlinux/extlinux.conf' on each filesystem
485 they scan.
486
Simon Glass79f66352023-05-10 16:34:46 -0600487 The specification for this filed is here:
488
489 https://uapi-group.org/specifications/specs/boot_loader_specification/
490
Simon Glass31aefaf2022-04-24 23:31:13 -0600491 This provides a way to try out standard boot on an existing boot flow.
492
Simon Glass79f66352023-05-10 16:34:46 -0600493config BOOTMETH_EXTLINUX_PXE
494 bool "Bootdev support for extlinux boot over network"
Simon Glassdab2c282022-04-24 23:31:16 -0600495 depends on CMD_PXE && CMD_NET && DM_ETH
496 default y
497 help
Simon Glass79f66352023-05-10 16:34:46 -0600498 Enables support for extlinux boot using bootdevs. This makes the
Simon Glassdab2c282022-04-24 23:31:16 -0600499 bootdevs look for a 'extlinux/extlinux.conf' on the tftp server.
500
Simon Glass79f66352023-05-10 16:34:46 -0600501 The specification for this file is here:
502
503 https://uapi-group.org/specifications/specs/boot_loader_specification/
504
Simon Glassdab2c282022-04-24 23:31:16 -0600505 This provides a way to try out standard boot on an existing boot flow.
506
Simon Glassacfa9bd2022-04-24 23:31:17 -0600507config BOOTMETH_EFILOADER
508 bool "Bootdev support for EFI boot"
AKASHI Takahiro64228202024-01-17 13:39:41 +0900509 depends on EFI_BINARY_EXEC
Simon Glassacfa9bd2022-04-24 23:31:17 -0600510 default y
511 help
512 Enables support for EFI boot using bootdevs. This makes the
513 bootdevs look for a 'boot<arch>.efi' on each filesystem
514 they scan. The resulting file is booted after enabling U-Boot's
515 EFI loader support.
516
517 The <arch> depends on the architecture of the board:
518
519 aa64 - aarch64 (ARM 64-bit)
520 arm - ARM 32-bit
521 ia32 - x86 32-bit
522 x64 - x86 64-bit
523 riscv32 - RISC-V 32-bit
524 riscv64 - RISC-V 64-bit
525
526 This provides a way to try out standard boot on an existing boot flow.
527
Heinrich Schuchardt8f319292024-04-03 20:05:17 +0200528config BOOTMETH_EFI_BOOTMGR
529 bool "Bootdev support for EFI boot manager"
530 depends on EFI_BOOTMGR
531 select BOOTMETH_GLOBAL
532 default y
533 help
534 Enable booting via the UEFI boot manager. Based on the EFI variables
535 the EFI binary to be launched is determined. To set the EFI variables
536 use the eficonfig command.
537
Simon Glass4c7418f2022-07-30 15:52:32 -0600538config BOOTMETH_VBE
539 bool "Bootdev support for Verified Boot for Embedded"
540 depends on FIT
541 default y
542 select BOOTMETH_GLOBAL
Tom Rini448e2b62023-01-16 15:46:49 -0500543 select EVENT
Simon Glass4c7418f2022-07-30 15:52:32 -0600544 help
545 Enables support for VBE boot. This is a standard boot method which
546 supports selection of various firmware components, seleciton of an OS to
547 boot as well as updating these using fwupd.
548
Simon Glassfba0e732023-05-10 16:34:47 -0600549config BOOTMETH_DISTRO
550 bool # Options needed to boot any distro
Tom Rini558787f2023-10-26 14:31:27 -0400551 select BOOTMETH_SCRIPT if CMDLINE # E.g. Armbian uses scripts
Simon Glassfba0e732023-05-10 16:34:47 -0600552 select BOOTMETH_EXTLINUX # E.g. Debian uses these
553 select BOOTMETH_EXTLINUX_PXE if CMD_PXE && CMD_NET && DM_ETH
AKASHI Takahiro64228202024-01-17 13:39:41 +0900554 select BOOTMETH_EFILOADER if EFI_BINARY_EXEC # E.g. Ubuntu uses this
Simon Glassfba0e732023-05-10 16:34:47 -0600555
Simon Glass42184562022-10-20 18:23:13 -0600556config SPL_BOOTMETH_VBE
557 bool "Bootdev support for Verified Boot for Embedded (SPL)"
558 depends on SPL && FIT
Tom Rini448e2b62023-01-16 15:46:49 -0500559 select EVENT
Simon Glass42184562022-10-20 18:23:13 -0600560 default y if VPL
561 help
562 Enables support for VBE boot. This is a standard boot method which
563 supports selection of various firmware components, seleciton of an OS to
564 boot as well as updating these using fwupd.
565
566config VPL_BOOTMETH_VBE
567 bool "Bootdev support for Verified Boot for Embedded (VPL)"
568 depends on VPL && FIT
Tom Rini448e2b62023-01-16 15:46:49 -0500569 select EVENT
Simon Glass42184562022-10-20 18:23:13 -0600570 default y
571 help
572 Enables support for VBE boot. This is a standard boot method which
573 supports selection of various firmware components, seleciton of an OS to
574 boot as well as updating these using fwupd.
575
Simon Glasscb47e212022-07-30 15:52:33 -0600576if BOOTMETH_VBE
577
Simon Glassda900e52023-02-22 09:33:52 -0700578config BOOTMETH_VBE_REQUEST
579 bool "Support for serving VBE OS requests"
580 default y
581 help
582 Enables support for looking that the requests made by the
583 Operating System being booted. These requests result in additions to
584 the device tree /chosen node, added during the device tree fixup
585 phase.
586
587config SPL_BOOTMETH_VBE_REQUEST
588 bool "Support for serving VBE OS requests (SPL)"
589 depends on SPL
590 help
591 Enables support for looking that the requests made by the
592 Operating System being booted. These requests result in additions to
593 the device tree /chosen node, added during the device tree fixup
594 phase.
595
596 This is only useful if you are booting an OS direct from SPL.
597
Simon Glasscb47e212022-07-30 15:52:33 -0600598config BOOTMETH_VBE_SIMPLE
599 bool "Bootdev support for VBE 'simple' method"
600 default y
601 help
602 Enables support for VBE 'simple' boot. This allows updating a single
603 firmware image in boot media such as MMC. It does not support any sort
604 of rollback, recovery or A/B boot.
605
Simon Glass42184562022-10-20 18:23:13 -0600606config BOOTMETH_VBE_SIMPLE_OS
607 bool "Bootdev support for VBE 'simple' method OS phase"
608 default y
609 help
610 Enables support for the OS parts of VBE 'simple' boot. This includes
611 fixing up the device tree with the required VBE information, ready
612 for booting into the OS. This option is only enabled for U-Boot
613 proper, since it is the phase where device tree fixups happen.
614
615config SPL_BOOTMETH_VBE_SIMPLE
616 bool "Bootdev support for VBE 'simple' method (SPL)"
617 depends on SPL
618 default y if VPL
619 help
620 Enables support for VBE 'simple' boot. This allows updating a single
621 firmware image in boot media such as MMC. It does not support any sort
622 of rollback, recovery or A/B boot.
623
624config VPL_BOOTMETH_VBE_SIMPLE
625 bool "Bootdev support for VBE 'simple' method (VPL)"
626 depends on VPL
627 default y
628 help
629 Enables support for VBE 'simple' boot. This allows updating a single
630 firmware image in boot media such as MMC. It does not support any sort
631 of rollback, recovery or A/B boot.
632
633config SPL_BOOTMETH_VBE_SIMPLE_FW
634 bool "Bootdev support for VBE 'simple' method firmware phase (SPL)"
635 depends on VPL
636 default y
637 help
638 Enables support for the firmware parts of VBE 'simple' boot. This
639 includes an SPL loader which locates the correct U-Boot to boot into.
640 This option should really only be enabled for VPL, since it is the
641 phase where the SPL + U-Boot decision should be made. But for now,
642 SPL does its own FIT-configuration selection.
643
644config VPL_BOOTMETH_VBE_SIMPLE_FW
645 bool "Bootdev support for VBE 'simple' method firmware phase (VPL)"
646 depends on VPL
647 default y
648 help
649 Enables support for the firmware parts of VBE 'simple' boot. This
650 includes an SPL loader which locates the correct SPL to boot into.
651 This option enabled for VPL, since it is the phase where the SPL
652 decision is made.
653
Simon Glasscb47e212022-07-30 15:52:33 -0600654endif # BOOTMETH_VBE
655
Simon Glass87c6f8a2023-01-06 08:52:36 -0600656config EXPO
657 bool "Support for expos - groups of scenes displaying a UI"
Simon Glass0041b1c2023-01-28 15:00:18 -0700658 depends on VIDEO
Simon Glass87c6f8a2023-01-06 08:52:36 -0600659 default y if BOOTMETH_VBE
660 help
661 An expo is a way of presenting and collecting information from the
662 user. It consists of a collection of 'scenes' of which only one is
663 presented at a time. An expo is typically used to show a boot menu
664 and allow settings to be changed.
665
666 The expo can be presented in graphics form using a vidconsole, or in
667 text form on a serial console.
668
Simon Glass126947b2022-04-24 23:31:20 -0600669config BOOTMETH_SANDBOX
670 def_bool y
671 depends on SANDBOX
672 help
673 This is a sandbox bootmeth driver used for testing. It always returns
674 -ENOTSUPP when attempting to boot.
675
Simon Glassd9409242022-04-24 23:31:22 -0600676config BOOTMETH_SCRIPT
677 bool "Bootdev support for U-Boot scripts"
678 default y if BOOTSTD_FULL
Tom Rini558787f2023-10-26 14:31:27 -0400679 depends on CMDLINE
Simon Glassab16a3d2023-05-05 20:03:05 -0600680 select HUSH_PARSER
Simon Glassd9409242022-04-24 23:31:22 -0600681 help
682 Enables support for booting a distro via a U-Boot script. This makes
683 the bootdevs look for a 'boot/boot.scr' file which can be used to
684 boot the distro.
685
686 This provides a way to try out standard boot on an existing boot flow.
687 It is not enabled by default to save space.
688
Simon Glass4a8fcb62023-09-14 10:55:53 -0600689endif # BOOTSTD
Simon Glass31aefaf2022-04-24 23:31:13 -0600690
Simon Glass6e558e32023-12-14 21:19:00 -0700691config BOOTM
692 bool "Support booting an application image from memory"
693 default y
694 help
695 This is the main boot implementation in U-Boot, supporting a wide
696 variety of features including FIT and legacy-image boot, kernel and
697 FDT selection, setting up of the command line for the OS and many
698 other features.
699
700 This option should normally be enabled. It is used to implement the
701 'bootm' command.
702
Simon Glassb34c8282023-12-14 21:19:01 -0700703config BOOTM_LINUX
704 bool "Support booting Linux OS images"
705 depends on BOOTM || CMD_BOOTZ || CMD_BOOTI
706 default y
707 help
708 Support booting the Linux kernel directly via a command such as bootm
709 or booti or bootz.
710
711config BOOTM_NETBSD
712 bool "Support booting NetBSD (non-EFI) loader images"
713 depends on BOOTM
714 default y
715 help
716 Support booting NetBSD via the bootm command.
717
718config BOOTM_OPENRTOS
719 bool "Support booting OPENRTOS / FreeRTOS images"
720 depends on BOOTM
721 help
722 Support booting OPENRTOS / FreeRTOS via the bootm command.
723
724config BOOTM_OSE
725 bool "Support booting Enea OSE images"
726 depends on (ARM && (ARM64 || CPU_V7A || CPU_V7R) || SANDBOX || PPC || X86)
727 depends on BOOTM
728 help
729 Support booting Enea OSE images via the bootm command.
730
731config BOOTM_PLAN9
732 bool "Support booting Plan9 OS images"
733 depends on BOOTM
734 default y
735 help
736 Support booting Plan9 images via the bootm command.
737
738config BOOTM_RTEMS
739 bool "Support booting RTEMS OS images"
740 depends on BOOTM
741 default y
742 help
743 Support booting RTEMS images via the bootm command.
744
745config BOOTM_VXWORKS
746 bool "Support booting VxWorks OS images"
747 depends on BOOTM
748 default y
749 help
750 Support booting VxWorks images via the bootm command.
751
Simon Glass52b3c472023-12-14 21:18:59 -0700752config ANDROID_BOOT_IMAGE
753 bool "Android Boot Images"
754 default y if FASTBOOT
755 help
756 This enables support for booting images which use the Android
757 image format header.
758
759config TIMESTAMP
760 bool "Show image date and time when displaying image information"
761 default y if CMD_DATE
762 help
763 When CONFIG_TIMESTAMP is selected, the timestamp (date and time) of
764 an image is printed by image commands like bootm or iminfo. This
765 is shown as 'Timestamp: xxx' and 'Created: xxx'. If this option is
766 enabled, then U-Boot requires FITs to have a timestamp. If a FIT is
767 loaded that does not, the message 'Wrong FIT format: no timestamp'
768 is shown.
769
Tom Rini777c2842024-04-10 17:06:27 -0600770config BUTTON_CMD
771 bool "Support for running a command if a button is held during boot"
772 depends on CMDLINE
773 depends on BUTTON
774 help
775 For many embedded devices it's useful to enter a special flashing mode
776 such as fastboot mode when a button is held during boot. This option
777 allows arbitrary commands to be assigned to specific buttons. These will
778 be run after "preboot" if the button is held. Configuration is done via
779 the environment variables "button_cmd_N_name" and "button_cmd_N" where n is
780 the button number (starting from 0). e.g:
781
782 "button_cmd_0_name=vol_down"
783 "button_cmd_0=fastboot usb 0"
784
Simon Glasscf298162020-09-10 20:21:13 -0600785config LEGACY_IMAGE_FORMAT
786 bool "Enable support for the legacy image format"
Andrew Davis52dc3342022-05-04 15:52:27 -0500787 default y if !FIT_SIGNATURE && !TI_SECURE_DEVICE
Simon Glasscf298162020-09-10 20:21:13 -0600788 help
789 This option enables the legacy image format. It is enabled by
790 default for backward compatibility, unless FIT_SIGNATURE is
791 set where it is disabled so that unsigned images cannot be
792 loaded. If a board needs the legacy image format support in this
793 case, enable it here.
794
Eddie Jamesdec166d2023-10-24 10:43:50 -0500795config MEASURED_BOOT
796 bool "Measure boot images and configuration when booting without EFI"
797 depends on HASH && TPM_V2
798 help
799 This option enables measurement of the boot process when booting
800 without UEFI . Measurement involves creating cryptographic hashes
801 of the binary images that are booting and storing them in the TPM.
802 In addition, a log of these hashes is stored in memory for the OS
803 to verify the booted images and configuration. Enable this if the
804 OS has configured some memory area for the event log and you intend
805 to use some attestation tools on your system.
806
807if MEASURED_BOOT
808 config MEASURE_DEVICETREE
809 bool "Measure the devicetree image"
810 default y if MEASURED_BOOT
811 help
812 On some platforms, the devicetree is not static as it may contain
813 random MAC addresses or other such data that changes each boot.
814 Therefore, it should not be measured into the TPM. In that case,
815 disable the measurement here.
816
817 config MEASURE_IGNORE_LOG
818 bool "Ignore the existing event log"
819 default n
820 help
821 On platforms that use an event log memory region that persists
822 through system resets and are the first stage bootloader, then
823 this option should be enabled to ignore any existing data in the
824 event log memory region.
825endif # MEASURED_BOOT
826
Tom Rini9d298c92023-10-26 14:31:25 -0400827config SYS_BOOTM_LEN
828 hex "Maximum size of a decompresed OS image"
Simon Glass6d47fd32023-12-14 21:19:03 -0700829 depends on BOOTM || CMD_BOOTI || CMD_BOOTZ || \
Tom Rini9d298c92023-10-26 14:31:25 -0400830 LEGACY_IMAGE_FORMAT || SPL_LEGACY_IMAGE_FORMAT
831 default 0x4000000 if PPC || ARM64
832 default 0x1000000 if X86 || ARCH_MX6 || ARCH_MX7
833 default 0x800000
834 help
835 This is the maximum size of the buffer that is used to decompress the OS
836 image in to if attempting to boot a compressed image.
837
Simon Glassaefa34f2020-09-10 20:21:19 -0600838config SUPPORT_RAW_INITRD
839 bool "Enable raw initrd images"
840 help
841 Note, defining the SUPPORT_RAW_INITRD allows user to supply
842 kernel with raw initrd images. The syntax is slightly different, the
843 address of the initrd must be augmented by it's size, in the following
844 format: "<initrd address>:<initrd size>".
845
Simon Glass96d0aa92020-11-04 09:57:35 -0700846config CHROMEOS
847 bool "Support booting Chrome OS"
848 help
849 Chrome OS requires U-Boot to set up a table indicating the boot mode
850 (e.g. Developer mode) and a few other things. Enable this if you are
851 booting on a Chromebook to avoid getting an error about an invalid
852 firmware ID.
853
854config CHROMEOS_VBOOT
855 bool "Support Chrome OS verified boot"
856 help
857 This is intended to enable the full Chrome OS verified boot support
858 in U-Boot. It is not actually implemented in the U-Boot source code
859 at present, so this option is always set to 'n'. It allows
860 distinguishing between booting Chrome OS in a basic way (developer
861 mode) and a full boot.
862
Tom Rini5a446182022-06-25 11:02:44 -0400863config SYS_RAMBOOT
864 bool
865
Tom Rinid8ef01e2021-08-24 23:11:49 -0400866config RAMBOOT_PBL
867 bool "Freescale PBL(pre-boot loader) image format support"
Tom Rini5a446182022-06-25 11:02:44 -0400868 select SYS_RAMBOOT if PPC
Tom Rinid8ef01e2021-08-24 23:11:49 -0400869 help
870 Some SoCs use PBL to load RCW and/or pre-initialization instructions.
871 For more details refer to doc/README.pblimage
872
Tom Rinid433c742022-03-23 17:20:03 -0400873choice
Tom Riniec9efcf2022-12-28 10:52:51 -0500874 prompt "Freescale PBL (or predecessor) load location"
Tom Rinid433c742022-03-23 17:20:03 -0400875 depends on RAMBOOT_PBL || ((TARGET_P1010RDB_PA || TARGET_P1010RDB_PB \
876 || TARGET_P1020RDB_PC || TARGET_P1020RDB_PD || TARGET_P2020RDB) \
877 && !CMD_NAND)
878
879config SDCARD
Tom Riniec9efcf2022-12-28 10:52:51 -0500880 bool "Freescale PBL (or similar) is found on SD card"
Tom Rinid433c742022-03-23 17:20:03 -0400881
882config SPIFLASH
Tom Riniec9efcf2022-12-28 10:52:51 -0500883 bool "Freescale PBL (or similar) is found on SPI flash"
884
885config NO_PBL
886 bool "Freescale PBL (or similar) is not used in this case"
Tom Rinid433c742022-03-23 17:20:03 -0400887
888endchoice
889
Tom Rinid8e84612022-06-20 08:07:42 -0400890config FSL_FIXED_MMC_LOCATION
891 bool "PBL MMC is at a fixed location"
892 depends on SDCARD && !RAMBOOT_PBL
893
894config ESDHC_HC_BLK_ADDR
895 def_bool y
896 depends on FSL_FIXED_MMC_LOCATION && (ARCH_BSC9131 || ARCH_BSC9132 || ARCH_P1010)
897 help
898 In High Capacity SD Cards (> 2 GBytes), the 32-bit source address and
899 code length of these soc specify the memory address in block address
900 format. Block length is fixed to 512 bytes as per the SD High
901 Capacity specification.
902
Tom Rinid8ef01e2021-08-24 23:11:49 -0400903config SYS_FSL_PBL_PBI
904 string "PBI(pre-boot instructions) commands for the PBL image"
905 depends on RAMBOOT_PBL
906 help
907 PBI commands can be used to configure SoC before it starts the execution.
908 Please refer doc/README.pblimage for more details.
909
910config SYS_FSL_PBL_RCW
911 string "Aadditional RCW (Power on reset configuration) for the PBL image"
912 depends on RAMBOOT_PBL
913 help
914 Enables addition of RCW (Power on reset configuration) in built image.
915 Please refer doc/README.pblimage for more details.
916
Tom Rinibb20a102022-06-25 11:02:46 -0400917config SYS_BOOT_RAMDISK_HIGH
918 depends on CMD_BOOTM || CMD_BOOTI || CMD_BOOTZ
919 depends on !(NIOS2 || SANDBOX || SH || XTENSA)
920 def_bool y
Simon Glassfebb9852023-03-24 16:58:12 -0400921 select LMB
Tom Rinibb20a102022-06-25 11:02:46 -0400922 help
923 Enable initrd_high functionality. If defined then the initrd_high
924 feature is enabled and the boot* ramdisk subcommand is enabled.
925
Simon Glasscf298162020-09-10 20:21:13 -0600926endmenu # Boot images
927
Simon Glassc9d4abe2023-03-24 16:58:11 -0400928config DISTRO_DEFAULTS
Simon Glass3b58de42023-09-14 10:55:55 -0600929 bool "(deprecated) Script-based booting of Linux distributions"
Tom Rinifc97d932023-10-26 14:31:23 -0400930 select CMDLINE
Simon Glassa0c739c2023-03-24 16:58:13 -0400931 select BOOT_DEFAULTS
Simon Glassc9d4abe2023-03-24 16:58:11 -0400932 select AUTO_COMPLETE
933 select CMDLINE_EDITING
Simon Glassc9d4abe2023-03-24 16:58:11 -0400934 select CMD_SYSBOOT
Simon Glassc9d4abe2023-03-24 16:58:11 -0400935 select HUSH_PARSER
Simon Glassc9d4abe2023-03-24 16:58:11 -0400936 select SYS_LONGHELP
Simon Glassc9d4abe2023-03-24 16:58:11 -0400937 help
Simon Glass3b58de42023-09-14 10:55:55 -0600938 Note: These scripts have been replaced by Standard Boot. Do not use
939 them on new boards. See 'Migrating from distro_boot' at
940 doc/develop/bootstd.rst
941
Simon Glassc9d4abe2023-03-24 16:58:11 -0400942 Select this to enable various options and commands which are suitable
943 for building u-boot for booting general purpose Linux distributions.
944
Simon Glass75e65cc2020-09-10 20:21:14 -0600945menu "Boot timing"
946
947config BOOTSTAGE
948 bool "Boot timing and reporting"
949 help
950 Enable recording of boot time while booting. To use it, insert
951 calls to bootstage_mark() with a suitable BOOTSTAGE_ID from
952 bootstage.h. Only a single entry is recorded for each ID. You can
953 give the entry a name with bootstage_mark_name(). You can also
954 record elapsed time in a particular stage using bootstage_start()
955 before starting and bootstage_accum() when finished. Bootstage will
956 add up all the accumulated time and report it.
957
958 Normally, IDs are defined in bootstage.h but a small number of
959 additional 'user' IDs can be used by passing BOOTSTAGE_ID_ALLOC
960 as the ID.
961
962 Calls to show_boot_progress() will also result in log entries but
963 these will not have names.
964
965config SPL_BOOTSTAGE
966 bool "Boot timing and reported in SPL"
Tom Rinib3401992022-06-10 23:03:09 -0400967 depends on BOOTSTAGE && SPL
Simon Glass75e65cc2020-09-10 20:21:14 -0600968 help
969 Enable recording of boot time in SPL. To make this visible to U-Boot
970 proper, enable BOOTSTAGE_STASH as well. This will stash the timing
971 information when SPL finishes and load it when U-Boot proper starts
972 up.
973
974config TPL_BOOTSTAGE
975 bool "Boot timing and reported in TPL"
Tom Rini8bea4bf2022-06-08 08:24:39 -0400976 depends on BOOTSTAGE && TPL
Simon Glass75e65cc2020-09-10 20:21:14 -0600977 help
978 Enable recording of boot time in SPL. To make this visible to U-Boot
979 proper, enable BOOTSTAGE_STASH as well. This will stash the timing
980 information when TPL finishes and load it when U-Boot proper starts
981 up.
982
983config BOOTSTAGE_REPORT
984 bool "Display a detailed boot timing report before booting the OS"
985 depends on BOOTSTAGE
986 help
987 Enable output of a boot time report just before the OS is booted.
988 This shows how long it took U-Boot to go through each stage of the
989 boot process. The report looks something like this:
990
991 Timer summary in microseconds:
992 Mark Elapsed Stage
993 0 0 reset
994 3,575,678 3,575,678 board_init_f start
995 3,575,695 17 arch_cpu_init A9
996 3,575,777 82 arch_cpu_init done
997 3,659,598 83,821 board_init_r start
998 3,910,375 250,777 main_loop
999 29,916,167 26,005,792 bootm_start
1000 30,361,327 445,160 start_kernel
1001
1002config BOOTSTAGE_RECORD_COUNT
1003 int "Number of boot stage records to store"
Simon Glass939b04e2021-02-03 06:00:49 -07001004 depends on BOOTSTAGE
Simon Glass75e65cc2020-09-10 20:21:14 -06001005 default 30
1006 help
1007 This is the size of the bootstage record list and is the maximum
1008 number of bootstage records that can be recorded.
1009
1010config SPL_BOOTSTAGE_RECORD_COUNT
1011 int "Number of boot stage records to store for SPL"
Simon Glass939b04e2021-02-03 06:00:49 -07001012 depends on SPL_BOOTSTAGE
Simon Glass75e65cc2020-09-10 20:21:14 -06001013 default 5
1014 help
1015 This is the size of the bootstage record list and is the maximum
1016 number of bootstage records that can be recorded.
1017
1018config TPL_BOOTSTAGE_RECORD_COUNT
1019 int "Number of boot stage records to store for TPL"
Simon Glass939b04e2021-02-03 06:00:49 -07001020 depends on TPL_BOOTSTAGE
Simon Glass75e65cc2020-09-10 20:21:14 -06001021 default 5
1022 help
1023 This is the size of the bootstage record list and is the maximum
1024 number of bootstage records that can be recorded.
1025
1026config BOOTSTAGE_FDT
1027 bool "Store boot timing information in the OS device tree"
1028 depends on BOOTSTAGE
1029 help
1030 Stash the bootstage information in the FDT. A root 'bootstage'
1031 node is created with each bootstage id as a child. Each child
1032 has a 'name' property and either 'mark' containing the
1033 mark time in microseconds, or 'accum' containing the
1034 accumulated time for that bootstage id in microseconds.
1035 For example:
1036
1037 bootstage {
1038 154 {
1039 name = "board_init_f";
1040 mark = <3575678>;
1041 };
1042 170 {
1043 name = "lcd";
1044 accum = <33482>;
1045 };
1046 };
1047
1048 Code in the Linux kernel can find this in /proc/devicetree.
1049
1050config BOOTSTAGE_STASH
1051 bool "Stash the boot timing information in memory before booting OS"
1052 depends on BOOTSTAGE
1053 help
1054 Some OSes do not support device tree. Bootstage can instead write
1055 the boot timing information in a binary format at a given address.
1056 This happens through a call to bootstage_stash(), typically in
1057 the CPU's cleanup_before_linux() function. You can use the
1058 'bootstage stash' and 'bootstage unstash' commands to do this on
1059 the command line.
1060
1061config BOOTSTAGE_STASH_ADDR
1062 hex "Address to stash boot timing information"
Tom Rinia077ac12023-08-02 11:09:43 -04001063 default 0x0
Simon Glass75e65cc2020-09-10 20:21:14 -06001064 help
1065 Provide an address which will not be overwritten by the OS when it
1066 starts, so that it can read this information when ready.
1067
1068config BOOTSTAGE_STASH_SIZE
1069 hex "Size of boot timing stash region"
1070 default 0x1000
1071 help
1072 This should be large enough to hold the bootstage stash. A value of
1073 4096 (4KiB) is normally plenty.
1074
1075config SHOW_BOOT_PROGRESS
1076 bool "Show boot progress in a board-specific manner"
1077 help
1078 Defining this option allows to add some board-specific code (calling
1079 a user-provided function show_boot_progress(int) that enables you to
1080 show the system's boot progress on some display (for example, some
1081 LEDs) on your board. At the moment, the following checkpoints are
1082 implemented:
1083
1084 Legacy uImage format:
1085
1086 Arg Where When
1087 1 common/cmd_bootm.c before attempting to boot an image
1088 -1 common/cmd_bootm.c Image header has bad magic number
1089 2 common/cmd_bootm.c Image header has correct magic number
1090 -2 common/cmd_bootm.c Image header has bad checksum
1091 3 common/cmd_bootm.c Image header has correct checksum
1092 -3 common/cmd_bootm.c Image data has bad checksum
1093 4 common/cmd_bootm.c Image data has correct checksum
1094 -4 common/cmd_bootm.c Image is for unsupported architecture
1095 5 common/cmd_bootm.c Architecture check OK
1096 -5 common/cmd_bootm.c Wrong Image Type (not kernel, multi)
1097 6 common/cmd_bootm.c Image Type check OK
1098 -6 common/cmd_bootm.c gunzip uncompression error
1099 -7 common/cmd_bootm.c Unimplemented compression type
1100 7 common/cmd_bootm.c Uncompression OK
1101 8 common/cmd_bootm.c No uncompress/copy overwrite error
1102 -9 common/cmd_bootm.c Unsupported OS (not Linux, BSD, VxWorks, QNX)
1103
1104 9 common/image.c Start initial ramdisk verification
1105 -10 common/image.c Ramdisk header has bad magic number
1106 -11 common/image.c Ramdisk header has bad checksum
1107 10 common/image.c Ramdisk header is OK
1108 -12 common/image.c Ramdisk data has bad checksum
1109 11 common/image.c Ramdisk data has correct checksum
1110 12 common/image.c Ramdisk verification complete, start loading
1111 -13 common/image.c Wrong Image Type (not PPC Linux ramdisk)
1112 13 common/image.c Start multifile image verification
1113 14 common/image.c No initial ramdisk, no multifile, continue.
1114
1115 15 arch/<arch>/lib/bootm.c All preparation done, transferring control to OS
1116
1117 -30 arch/powerpc/lib/board.c Fatal error, hang the system
1118 -31 post/post.c POST test failed, detected by post_output_backlog()
1119 -32 post/post.c POST test failed, detected by post_run_single()
1120
1121 34 common/cmd_doc.c before loading a Image from a DOC device
1122 -35 common/cmd_doc.c Bad usage of "doc" command
1123 35 common/cmd_doc.c correct usage of "doc" command
1124 -36 common/cmd_doc.c No boot device
1125 36 common/cmd_doc.c correct boot device
1126 -37 common/cmd_doc.c Unknown Chip ID on boot device
1127 37 common/cmd_doc.c correct chip ID found, device available
1128 -38 common/cmd_doc.c Read Error on boot device
1129 38 common/cmd_doc.c reading Image header from DOC device OK
1130 -39 common/cmd_doc.c Image header has bad magic number
1131 39 common/cmd_doc.c Image header has correct magic number
1132 -40 common/cmd_doc.c Error reading Image from DOC device
1133 40 common/cmd_doc.c Image header has correct magic number
1134 41 common/cmd_ide.c before loading a Image from a IDE device
1135 -42 common/cmd_ide.c Bad usage of "ide" command
1136 42 common/cmd_ide.c correct usage of "ide" command
1137 -43 common/cmd_ide.c No boot device
1138 43 common/cmd_ide.c boot device found
1139 -44 common/cmd_ide.c Device not available
1140 44 common/cmd_ide.c Device available
1141 -45 common/cmd_ide.c wrong partition selected
1142 45 common/cmd_ide.c partition selected
1143 -46 common/cmd_ide.c Unknown partition table
1144 46 common/cmd_ide.c valid partition table found
1145 -47 common/cmd_ide.c Invalid partition type
1146 47 common/cmd_ide.c correct partition type
1147 -48 common/cmd_ide.c Error reading Image Header on boot device
1148 48 common/cmd_ide.c reading Image Header from IDE device OK
1149 -49 common/cmd_ide.c Image header has bad magic number
1150 49 common/cmd_ide.c Image header has correct magic number
1151 -50 common/cmd_ide.c Image header has bad checksum
1152 50 common/cmd_ide.c Image header has correct checksum
1153 -51 common/cmd_ide.c Error reading Image from IDE device
1154 51 common/cmd_ide.c reading Image from IDE device OK
1155 52 common/cmd_nand.c before loading a Image from a NAND device
1156 -53 common/cmd_nand.c Bad usage of "nand" command
1157 53 common/cmd_nand.c correct usage of "nand" command
1158 -54 common/cmd_nand.c No boot device
1159 54 common/cmd_nand.c boot device found
1160 -55 common/cmd_nand.c Unknown Chip ID on boot device
1161 55 common/cmd_nand.c correct chip ID found, device available
1162 -56 common/cmd_nand.c Error reading Image Header on boot device
1163 56 common/cmd_nand.c reading Image Header from NAND device OK
1164 -57 common/cmd_nand.c Image header has bad magic number
1165 57 common/cmd_nand.c Image header has correct magic number
1166 -58 common/cmd_nand.c Error reading Image from NAND device
1167 58 common/cmd_nand.c reading Image from NAND device OK
1168
1169 -60 common/env_common.c Environment has a bad CRC, using default
1170
1171 64 net/eth.c starting with Ethernet configuration.
1172 -64 net/eth.c no Ethernet found.
1173 65 net/eth.c Ethernet found.
1174
1175 -80 common/cmd_net.c usage wrong
1176 80 common/cmd_net.c before calling net_loop()
1177 -81 common/cmd_net.c some error in net_loop() occurred
1178 81 common/cmd_net.c net_loop() back without error
1179 -82 common/cmd_net.c size == 0 (File with size 0 loaded)
1180 82 common/cmd_net.c trying automatic boot
1181 83 common/cmd_net.c running "source" command
1182 -83 common/cmd_net.c some error in automatic boot or "source" command
1183 84 common/cmd_net.c end without errors
1184
1185 FIT uImage format:
1186
1187 Arg Where When
1188 100 common/cmd_bootm.c Kernel FIT Image has correct format
1189 -100 common/cmd_bootm.c Kernel FIT Image has incorrect format
1190 101 common/cmd_bootm.c No Kernel subimage unit name, using configuration
1191 -101 common/cmd_bootm.c Can't get configuration for kernel subimage
1192 102 common/cmd_bootm.c Kernel unit name specified
1193 -103 common/cmd_bootm.c Can't get kernel subimage node offset
1194 103 common/cmd_bootm.c Found configuration node
1195 104 common/cmd_bootm.c Got kernel subimage node offset
1196 -104 common/cmd_bootm.c Kernel subimage hash verification failed
1197 105 common/cmd_bootm.c Kernel subimage hash verification OK
1198 -105 common/cmd_bootm.c Kernel subimage is for unsupported architecture
1199 106 common/cmd_bootm.c Architecture check OK
1200 -106 common/cmd_bootm.c Kernel subimage has wrong type
1201 107 common/cmd_bootm.c Kernel subimage type OK
1202 -107 common/cmd_bootm.c Can't get kernel subimage data/size
1203 108 common/cmd_bootm.c Got kernel subimage data/size
1204 -108 common/cmd_bootm.c Wrong image type (not legacy, FIT)
1205 -109 common/cmd_bootm.c Can't get kernel subimage type
1206 -110 common/cmd_bootm.c Can't get kernel subimage comp
1207 -111 common/cmd_bootm.c Can't get kernel subimage os
1208 -112 common/cmd_bootm.c Can't get kernel subimage load address
1209 -113 common/cmd_bootm.c Image uncompress/copy overwrite error
1210
1211 120 common/image.c Start initial ramdisk verification
1212 -120 common/image.c Ramdisk FIT image has incorrect format
1213 121 common/image.c Ramdisk FIT image has correct format
1214 122 common/image.c No ramdisk subimage unit name, using configuration
1215 -122 common/image.c Can't get configuration for ramdisk subimage
1216 123 common/image.c Ramdisk unit name specified
1217 -124 common/image.c Can't get ramdisk subimage node offset
1218 125 common/image.c Got ramdisk subimage node offset
1219 -125 common/image.c Ramdisk subimage hash verification failed
1220 126 common/image.c Ramdisk subimage hash verification OK
1221 -126 common/image.c Ramdisk subimage for unsupported architecture
1222 127 common/image.c Architecture check OK
1223 -127 common/image.c Can't get ramdisk subimage data/size
1224 128 common/image.c Got ramdisk subimage data/size
1225 129 common/image.c Can't get ramdisk load address
1226 -129 common/image.c Got ramdisk load address
1227
1228 -130 common/cmd_doc.c Incorrect FIT image format
1229 131 common/cmd_doc.c FIT image format OK
1230
1231 -140 common/cmd_ide.c Incorrect FIT image format
1232 141 common/cmd_ide.c FIT image format OK
1233
1234 -150 common/cmd_nand.c Incorrect FIT image format
1235 151 common/cmd_nand.c FIT image format OK
1236
Marek Vasutb55881d2021-10-23 03:06:03 +02001237config SPL_SHOW_BOOT_PROGRESS
Jan Kiszkac1df3d52021-11-03 15:09:36 +01001238 bool "Show boot progress in a board-specific manner in SPL"
Marek Vasutb55881d2021-10-23 03:06:03 +02001239 depends on SPL
1240 help
1241 Defining this option allows to add some board-specific code (calling
1242 a user-provided function show_boot_progress(int) that enables you to
1243 show the system's boot progress on some display (for example, some
1244 LEDs) on your board. For details see SHOW_BOOT_PROGRESS.
1245
Simon Glass75e65cc2020-09-10 20:21:14 -06001246endmenu
1247
Simon Glass7b6baa32020-09-10 20:21:15 -06001248menu "Boot media"
1249
1250config NOR_BOOT
1251 bool "Support for booting from NOR flash"
1252 depends on NOR
1253 help
1254 Enabling this will make a U-Boot binary that is capable of being
1255 booted via NOR. In this case we will enable certain pinmux early
1256 as the ROM only partially sets up pinmux. We also default to using
1257 NOR for environment.
1258
1259config NAND_BOOT
1260 bool "Support for booting from NAND flash"
Simon Glass7b6baa32020-09-10 20:21:15 -06001261 imply MTD_RAW_NAND
1262 help
1263 Enabling this will make a U-Boot binary that is capable of being
1264 booted via NAND flash. This is not a must, some SoCs need this,
1265 some not.
1266
1267config ONENAND_BOOT
1268 bool "Support for booting from ONENAND"
Simon Glass7b6baa32020-09-10 20:21:15 -06001269 imply MTD_RAW_NAND
1270 help
1271 Enabling this will make a U-Boot binary that is capable of being
1272 booted via ONENAND. This is not a must, some SoCs need this,
1273 some not.
1274
1275config QSPI_BOOT
1276 bool "Support for booting from QSPI flash"
Simon Glass7b6baa32020-09-10 20:21:15 -06001277 help
1278 Enabling this will make a U-Boot binary that is capable of being
1279 booted via QSPI flash. This is not a must, some SoCs need this,
1280 some not.
1281
1282config SATA_BOOT
1283 bool "Support for booting from SATA"
Simon Glass7b6baa32020-09-10 20:21:15 -06001284 help
1285 Enabling this will make a U-Boot binary that is capable of being
1286 booted via SATA. This is not a must, some SoCs need this,
1287 some not.
1288
1289config SD_BOOT
1290 bool "Support for booting from SD/EMMC"
Simon Glass7b6baa32020-09-10 20:21:15 -06001291 help
1292 Enabling this will make a U-Boot binary that is capable of being
1293 booted via SD/EMMC. This is not a must, some SoCs need this,
1294 some not.
1295
Tom Rini66e0e2b2021-12-11 14:55:50 -05001296config SD_BOOT_QSPI
1297 bool "Support for booting from SD/EMMC and enable QSPI"
1298 help
1299 Enabling this will make a U-Boot binary that is capable of being
1300 booted via SD/EMMC while enabling QSPI on the platform as well. This
1301 is not a must, some SoCs need this, some not.
1302
Simon Glass7b6baa32020-09-10 20:21:15 -06001303config SPI_BOOT
1304 bool "Support for booting from SPI flash"
Simon Glass7b6baa32020-09-10 20:21:15 -06001305 help
1306 Enabling this will make a U-Boot binary that is capable of being
1307 booted via SPI flash. This is not a must, some SoCs need this,
1308 some not.
1309
1310endmenu
1311
Simon Glass98eed0d2020-09-10 20:21:16 -06001312menu "Autoboot options"
1313
1314config AUTOBOOT
1315 bool "Autoboot"
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001316 depends on CMDLINE
Simon Glass98eed0d2020-09-10 20:21:16 -06001317 default y
1318 help
1319 This enables the autoboot. See doc/README.autoboot for detail.
1320
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001321if AUTOBOOT
1322
Simon Glass95fd4f32020-09-10 20:21:17 -06001323config BOOTDELAY
1324 int "delay in seconds before automatically booting"
1325 default 2
Simon Glass95fd4f32020-09-10 20:21:17 -06001326 help
1327 Delay before automatically running bootcmd;
1328 set to 0 to autoboot with no delay, but you can stop it by key input.
1329 set to -1 to disable autoboot.
1330 set to -2 to autoboot with no delay and not check for abort
1331
1332 If this value is >= 0 then it is also used for the default delay
1333 before starting the default entry in bootmenu. If it is < 0 then
1334 a default value of 10s is used.
1335
1336 See doc/README.autoboot for details.
1337
Simon Glass98eed0d2020-09-10 20:21:16 -06001338config AUTOBOOT_KEYED
1339 bool "Stop autobooting via specific input key / string"
Simon Glass98eed0d2020-09-10 20:21:16 -06001340 help
1341 This option enables stopping (aborting) of the automatic
1342 boot feature only by issuing a specific input key or
1343 string. If not enabled, any input key will abort the
1344 U-Boot automatic booting process and bring the device
1345 to the U-Boot prompt for user input.
1346
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001347if AUTOBOOT_KEYED
1348
Steffen Jaeckeld199c3a2021-07-08 15:57:38 +02001349config AUTOBOOT_FLUSH_STDIN
1350 bool "Enable flushing stdin before starting to read the password"
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001351 depends on !SANDBOX
Steffen Jaeckeld199c3a2021-07-08 15:57:38 +02001352 help
1353 When this option is enabled stdin buffer will be flushed before
1354 starting to read the password.
1355 This can't be enabled for the sandbox as flushing stdin would
1356 break the autoboot unit tests.
1357
Simon Glass98eed0d2020-09-10 20:21:16 -06001358config AUTOBOOT_PROMPT
1359 string "Autoboot stop prompt"
Simon Glass98eed0d2020-09-10 20:21:16 -06001360 default "Autoboot in %d seconds\\n"
1361 help
1362 This string is displayed before the boot delay selected by
1363 CONFIG_BOOTDELAY starts. If it is not defined there is no
1364 output indicating that autoboot is in progress.
1365
1366 Note that this define is used as the (only) argument to a
1367 printf() call, so it may contain '%' format specifications,
1368 provided that it also includes, sepearated by commas exactly
1369 like in a printf statement, the required arguments. It is
1370 the responsibility of the user to select only such arguments
1371 that are valid in the given context.
1372
1373config AUTOBOOT_ENCRYPTION
1374 bool "Enable encryption in autoboot stopping"
Simon Glass98eed0d2020-09-10 20:21:16 -06001375 help
1376 This option allows a string to be entered into U-Boot to stop the
Steffen Jaeckel1a4a7782021-07-08 15:57:35 +02001377 autoboot.
1378 The behavior depends whether CONFIG_CRYPT_PW from lib is enabled
1379 or not.
1380 In case CONFIG_CRYPT_PW is enabled, the string will be forwarded
1381 to the crypt-based functionality and be compared against the
1382 string in the environment variable 'bootstopkeycrypt'.
1383 In case CONFIG_CRYPT_PW is disabled the string itself is hashed
1384 and compared against the hash in the environment variable
1385 'bootstopkeysha256'.
1386 If it matches in either case then boot stops and
1387 a command-line prompt is presented.
Simon Glass98eed0d2020-09-10 20:21:16 -06001388 This provides a way to ship a secure production device which can also
1389 be accessed at the U-Boot command line.
1390
Steffen Jaeckel33198742021-07-08 15:57:39 +02001391config AUTOBOOT_SHA256_FALLBACK
1392 bool "Allow fallback from crypt-hashed password to sha256"
1393 depends on AUTOBOOT_ENCRYPTION && CRYPT_PW
1394 help
1395 This option adds support to fall back from crypt-hashed
1396 passwords to checking a SHA256 hashed password in case the
1397 'bootstopusesha256' environment variable is set to 'true'.
1398
Simon Glass98eed0d2020-09-10 20:21:16 -06001399config AUTOBOOT_DELAY_STR
1400 string "Delay autobooting via specific input key / string"
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001401 depends on !AUTOBOOT_ENCRYPTION
Simon Glass98eed0d2020-09-10 20:21:16 -06001402 help
1403 This option delays the automatic boot feature by issuing
1404 a specific input key or string. If CONFIG_AUTOBOOT_DELAY_STR
1405 or the environment variable "bootdelaykey" is specified
1406 and this string is received from console input before
1407 autoboot starts booting, U-Boot gives a command prompt. The
1408 U-Boot prompt will time out if CONFIG_BOOT_RETRY_TIME is
1409 used, otherwise it never times out.
1410
1411config AUTOBOOT_STOP_STR
1412 string "Stop autobooting via specific input key / string"
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001413 depends on !AUTOBOOT_ENCRYPTION
Simon Glass98eed0d2020-09-10 20:21:16 -06001414 help
1415 This option enables stopping (aborting) of the automatic
1416 boot feature only by issuing a specific input key or
1417 string. If CONFIG_AUTOBOOT_STOP_STR or the environment
1418 variable "bootstopkey" is specified and this string is
1419 received from console input before autoboot starts booting,
1420 U-Boot gives a command prompt. The U-Boot prompt never
1421 times out, even if CONFIG_BOOT_RETRY_TIME is used.
1422
1423config AUTOBOOT_KEYED_CTRLC
1424 bool "Enable Ctrl-C autoboot interruption"
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001425 depends on !AUTOBOOT_ENCRYPTION
Simon Glass98eed0d2020-09-10 20:21:16 -06001426 help
1427 This option allows for the boot sequence to be interrupted
1428 by ctrl-c, in addition to the "bootdelaykey" and "bootstopkey".
1429 Setting this variable provides an escape sequence from the
1430 limited "password" strings.
1431
Steffen Jaeckel6c0ce6d2021-07-08 15:57:37 +02001432config AUTOBOOT_NEVER_TIMEOUT
1433 bool "Make the password entry never time-out"
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001434 depends on AUTOBOOT_ENCRYPTION && CRYPT_PW
Steffen Jaeckel6c0ce6d2021-07-08 15:57:37 +02001435 help
1436 This option removes the timeout from the password entry
1437 when the user first presses the <Enter> key before entering
1438 any other character.
1439
Steffen Jaeckel1a4a7782021-07-08 15:57:35 +02001440config AUTOBOOT_STOP_STR_ENABLE
1441 bool "Enable fixed string to stop autobooting"
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001442 depends on AUTOBOOT_ENCRYPTION
Steffen Jaeckel1a4a7782021-07-08 15:57:35 +02001443 help
1444 This option enables the feature to add a fixed stop
1445 string that is defined at compile time.
1446 In every case it will be tried to load the stop
1447 string from the environment.
1448 In case this is enabled and there is no stop string
1449 in the environment, this will be used as default value.
1450
1451config AUTOBOOT_STOP_STR_CRYPT
1452 string "Stop autobooting via crypt-hashed password"
1453 depends on AUTOBOOT_STOP_STR_ENABLE && CRYPT_PW
1454 help
1455 This option adds the feature to only stop the autobooting,
1456 and therefore boot into the U-Boot prompt, when the input
1457 string / password matches a values that is hashed via
1458 one of the supported crypt-style password hashing options
1459 and saved in the environment variable "bootstopkeycrypt".
1460
Simon Glass98eed0d2020-09-10 20:21:16 -06001461config AUTOBOOT_STOP_STR_SHA256
Steffen Jaeckel25c8b9f2021-07-08 15:57:40 +02001462 string "Stop autobooting via SHA256 hashed password"
Steffen Jaeckel1a4a7782021-07-08 15:57:35 +02001463 depends on AUTOBOOT_STOP_STR_ENABLE
Simon Glass98eed0d2020-09-10 20:21:16 -06001464 help
1465 This option adds the feature to only stop the autobooting,
1466 and therefore boot into the U-Boot prompt, when the input
1467 string / password matches a values that is encypted via
Joel Peshkin652b5042020-11-21 17:18:59 -08001468 a SHA256 hash and saved in the environment variable
1469 "bootstopkeysha256". If the value in that variable
1470 includes a ":", the portion prior to the ":" will be treated
1471 as a salt value.
Simon Glass98eed0d2020-09-10 20:21:16 -06001472
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001473endif # AUTOBOOT_KEYED
1474
1475if !AUTOBOOT_KEYED
1476
Simon Glass98eed0d2020-09-10 20:21:16 -06001477config AUTOBOOT_USE_MENUKEY
1478 bool "Allow a specify key to run a menu from the environment"
Simon Glass98eed0d2020-09-10 20:21:16 -06001479 help
1480 If a specific key is pressed to stop autoboot, then the commands in
1481 the environment variable 'menucmd' are executed before boot starts.
1482
1483config AUTOBOOT_MENUKEY
1484 int "ASCII value of boot key to show a menu"
1485 default 0
1486 depends on AUTOBOOT_USE_MENUKEY
1487 help
1488 If this key is pressed to stop autoboot, then the commands in the
1489 environment variable 'menucmd' will be executed before boot starts.
1490 For example, 33 means "!" in ASCII, so pressing ! at boot would take
1491 this action.
1492
Simon Glass5bcfc7a2023-10-26 14:31:22 -04001493endif
1494
1495endif # AUTOBOOT
1496
Simon Glass98eed0d2020-09-10 20:21:16 -06001497config AUTOBOOT_MENU_SHOW
1498 bool "Show a menu on boot"
1499 depends on CMD_BOOTMENU
1500 help
1501 This enables the boot menu, controlled by environment variables
1502 defined by the board. The menu starts after running the 'preboot'
1503 environmnent variable (if enabled) and before handling the boot delay.
Peter Robinsond1670622023-08-18 15:54:10 +01001504 See doc/usage/cmd/bootmenu.rst for more details.
Simon Glass98eed0d2020-09-10 20:21:16 -06001505
Masahisa Kojima83f73632022-05-26 19:09:38 +09001506config BOOTMENU_DISABLE_UBOOT_CONSOLE
1507 bool "Disallow bootmenu to enter the U-Boot console"
1508 depends on AUTOBOOT_MENU_SHOW
1509 help
1510 If this option is enabled, user can not enter the U-Boot console from
1511 bootmenu. It increases the system security.
1512
Tom Rini69c8a812022-03-11 09:12:04 -05001513config BOOT_RETRY
1514 bool "Boot retry feature"
1515 help
1516 Allow for having the U-Boot command prompt time out and attempt
1517 to boot again. If the environment variable "bootretry" is found then
1518 its value is used, otherwise the retry timeout is
1519 CONFIG_BOOT_RETRY_TIME. CONFIG_BOOT_RETRY_MIN is optional and
1520 defaults to CONFIG_BOOT_RETRY_TIME. All times are in seconds.
1521
1522config BOOT_RETRY_TIME
1523 int "Timeout in seconds before attempting to boot again"
1524 depends on BOOT_RETRY
1525 help
1526 Time in seconds before the U-Boot prompt will timeout and boot will
1527 be attempted again.
1528
1529config BOOT_RETRY_MIN
1530 int "Minimum timeout in seconds for 'bootretry'"
1531 depends on BOOT_RETRY
1532 default BOOT_RETRY_TIME
1533 help
1534 The minimum time in seconds that "bootretry" can be set to.
1535
1536config RESET_TO_RETRY
1537 bool "Reset the board to retry autoboot"
1538 depends on BOOT_RETRY
1539 help
1540 After the countdown timed out, the board will be reset to restart
1541 again.
1542
Simon Glass98eed0d2020-09-10 20:21:16 -06001543endmenu
1544
Philippe Reynes98220742022-03-28 22:56:59 +02001545menu "Image support"
1546
1547config IMAGE_PRE_LOAD
1548 bool "Image pre-load support"
1549 help
1550 Enable an image pre-load stage in the SPL.
1551 This pre-load stage allows to do some manipulation
1552 or check (for example signature check) on an image
1553 before launching it.
1554
1555config SPL_IMAGE_PRE_LOAD
1556 bool "Image pre-load support within SPL"
1557 depends on SPL && IMAGE_PRE_LOAD
1558 help
1559 Enable an image pre-load stage in the SPL.
1560 This pre-load stage allows to do some manipulation
1561 or check (for example signature check) on an image
1562 before launching it.
1563
1564config IMAGE_PRE_LOAD_SIG
1565 bool "Image pre-load signature support"
1566 depends on IMAGE_PRE_LOAD
1567 select FIT_SIGNATURE
1568 select RSA
1569 select RSA_VERIFY_WITH_PKEY
1570 help
1571 Enable signature check support in the pre-load stage.
1572 For this feature a very simple header is added before
1573 the image with few fields:
1574 - a magic
1575 - the image size
1576 - the signature
1577 All other information (header size, type of signature,
1578 ...) are provided in the node /image/pre-load/sig of
1579 u-boot.
1580
1581config SPL_IMAGE_PRE_LOAD_SIG
1582 bool "Image pre-load signature support witin SPL"
1583 depends on SPL_IMAGE_PRE_LOAD && IMAGE_PRE_LOAD_SIG
1584 select SPL_FIT_SIGNATURE
1585 select SPL_RSA
1586 select SPL_RSA_VERIFY_WITH_PKEY
1587 help
1588 Enable signature check support in the pre-load stage in the SPL.
1589 For this feature a very simple header is added before
1590 the image with few fields:
1591 - a magic
1592 - the image size
1593 - the signature
1594 All other information (header size, type of signature,
1595 ...) are provided in the node /image/pre-load/sig of
1596 u-boot.
1597
1598endmenu
1599
Simon Glassddc5f9b2023-09-14 10:55:46 -06001600if OF_LIBFDT
1601
1602menu "Devicetree fixup"
1603
Matthias Schiffere91d6602023-12-11 12:03:17 +01001604config OF_ENV_SETUP
1605 bool "Run a command from environment to set up device tree before boot"
1606 depends on CMD_FDT
1607 help
1608 This causes U-Boot to run a command from the environment variable
1609 fdt_fixup before booting into the operating system, which can use the
1610 fdt command to modify the device tree. The device tree is then passed
1611 to the OS.
1612
Simon Glass96095e12023-09-14 10:55:47 -06001613config OF_BOARD_SETUP
1614 bool "Set up board-specific details in device tree before boot"
1615 help
1616 This causes U-Boot to call ft_board_setup() before booting into
1617 the Operating System. This function can set up various
1618 board-specific information in the device tree for use by the OS.
1619 The device tree is then passed to the OS.
1620
1621config OF_SYSTEM_SETUP
1622 bool "Set up system-specific details in device tree before boot"
1623 help
1624 This causes U-Boot to call ft_system_setup() before booting into
1625 the Operating System. This function can set up various
1626 system-specific information in the device tree for use by the OS.
1627 The device tree is then passed to the OS.
1628
1629config OF_STDOUT_VIA_ALIAS
1630 bool "Update the device-tree stdout alias from U-Boot"
1631 help
1632 This uses U-Boot's serial alias from the aliases node to update
1633 the device tree passed to the OS. The "linux,stdout-path" property
1634 in the chosen node is set to point to the correct serial node.
1635 This option currently references CONFIG_CONS_INDEX, which is
1636 incorrect when used with device tree as this option does not
1637 exist / should not be used.
1638
Simon Glass040a6042023-09-14 10:55:57 -06001639config FDT_FIXUP_PARTITIONS
Simon Glass400a6a32023-09-14 10:55:58 -06001640 bool "Overwrite MTD partitions in DTS through defined in 'mtdparts'"
Simon Glass040a6042023-09-14 10:55:57 -06001641 help
1642 Allow overwriting defined partitions in the device tree blob
1643 using partition info defined in the 'mtdparts' environment
1644 variable.
1645
Simon Glassddc5f9b2023-09-14 10:55:46 -06001646config FDT_SIMPLEFB
1647 bool "FDT tools for simplefb support"
1648 help
1649 Enable the fdt tools to manage the simple fb nodes in device tree.
1650 These functions can be used by board to indicate to the OS
1651 the presence of the simple frame buffer with associated reserved
1652 memory
1653
Simon Glassc0e5b0e2023-09-14 10:55:59 -06001654config ARCH_FIXUP_FDT_MEMORY
1655 bool "Enable arch_fixup_memory_banks() call"
1656 default y
1657 help
1658 Enable FDT memory map syncup before OS boot. This feature can be
1659 used for booting OS with different memory setup where the part of
1660 the memory location should be used for different purpose.
1661
Simon Glassddc5f9b2023-09-14 10:55:46 -06001662endmenu
1663
1664endif # OF_LIBFDT
1665
Simon Glassfe5db252020-09-10 20:21:18 -06001666config USE_BOOTARGS
1667 bool "Enable boot arguments"
1668 help
1669 Provide boot arguments to bootm command. Boot arguments are specified
1670 in CONFIG_BOOTARGS option. Enable this option to be able to specify
1671 CONFIG_BOOTARGS string. If this option is disabled, CONFIG_BOOTARGS
1672 will be undefined and won't take any space in U-Boot image.
1673
1674config BOOTARGS
1675 string "Boot arguments"
1676 depends on USE_BOOTARGS && !USE_DEFAULT_ENV_FILE
1677 help
1678 This can be used to pass arguments to the bootm command. The value of
1679 CONFIG_BOOTARGS goes into the environment value "bootargs". Note that
1680 this value will also override the "chosen" node in FDT blob.
1681
Simon Glass51bb3382020-11-05 10:33:48 -07001682config BOOTARGS_SUBST
1683 bool "Support substituting strings in boot arguments"
1684 help
1685 This allows substituting string values in the boot arguments. These
1686 are applied after the commandline has been built.
1687
1688 One use for this is to insert the root-disk UUID into the command
1689 line where bootargs contains "root=${uuid}"
1690
1691 setenv bootargs "console= root=${uuid}"
1692 # Set the 'uuid' environment variable
1693 part uuid mmc 2:2 uuid
1694
1695 # Command-line substitution will put the real uuid into the
1696 # kernel command line
1697 bootm
1698
Simon Glassfe5db252020-09-10 20:21:18 -06001699config USE_BOOTCOMMAND
1700 bool "Enable a default value for bootcmd"
Tom Rinidbdb4b32023-10-26 14:31:28 -04001701 depends on CMDLINE
Simon Glassfe5db252020-09-10 20:21:18 -06001702 help
1703 Provide a default value for the bootcmd entry in the environment. If
1704 autoboot is enabled this is what will be run automatically. Enable
1705 this option to be able to specify CONFIG_BOOTCOMMAND as a string. If
1706 this option is disabled, CONFIG_BOOTCOMMAND will be undefined and
1707 won't take any space in U-Boot image.
1708
1709config BOOTCOMMAND
1710 string "bootcmd value"
1711 depends on USE_BOOTCOMMAND && !USE_DEFAULT_ENV_FILE
Simon Glassd8d40bc2023-05-06 08:27:09 -06001712 default "bootflow scan -lb" if BOOTSTD_DEFAULTS && CMD_BOOTFLOW_FULL
1713 default "bootflow scan" if BOOTSTD_DEFAULTS && !CMD_BOOTFLOW_FULL
Simon Glassa91492b2022-04-24 23:31:27 -06001714 default "run distro_bootcmd" if !BOOTSTD_BOOTCOMMAND && DISTRO_DEFAULTS
Simon Glassfe5db252020-09-10 20:21:18 -06001715 help
1716 This is the string of commands that will be used as bootcmd and if
1717 AUTOBOOT is set, automatically run.
1718
1719config USE_PREBOOT
1720 bool "Enable preboot"
Tom Rinidbdb4b32023-10-26 14:31:28 -04001721 depends on CMDLINE
Simon Glassfe5db252020-09-10 20:21:18 -06001722 help
1723 When this option is enabled, the existence of the environment
1724 variable "preboot" will be checked immediately before starting the
1725 CONFIG_BOOTDELAY countdown and/or running the auto-boot command resp.
1726 entering interactive mode.
1727
1728 This feature is especially useful when "preboot" is automatically
1729 generated or modified. For example, the boot code can modify the
1730 "preboot" when a user holds down a certain combination of keys.
1731
1732config PREBOOT
1733 string "preboot default value"
1734 depends on USE_PREBOOT && !USE_DEFAULT_ENV_FILE
Patrick Delaunay87459da2020-10-12 09:47:50 +02001735 default "usb start" if USB_KEYBOARD
Simon Glassfe5db252020-09-10 20:21:18 -06001736 default ""
1737 help
1738 This is the default of "preboot" environment variable.
1739
Pali Rohár2827c2f2022-07-10 13:42:55 +02001740config PREBOOT_DEFINED
1741 bool
1742 default y if PREBOOT != ""
1743
Simon Glass832876a2020-09-10 20:21:20 -06001744config DEFAULT_FDT_FILE
1745 string "Default fdt file"
1746 help
1747 This option is used to set the default fdt file to boot OS.
1748
Dzmitry Sankouski12a3e1a2022-02-22 21:49:52 +03001749config SAVE_PREV_BL_FDT_ADDR
1750 depends on ARM
1751 bool "Saves fdt address, passed by the previous bootloader, to env var"
1752 help
1753 When u-boot is used as a chain-loaded bootloader (replacing OS kernel),
1754 enable this option to save fdt address, passed by the
1755 previous bootloader for future use.
1756 Address is saved to `prevbl_fdt_addr` environment variable.
1757
1758 If no fdt was provided by previous bootloader, no env variables
1759 will be created.
1760
1761config SAVE_PREV_BL_INITRAMFS_START_ADDR
1762 depends on ARM
1763 bool "Saves initramfs address, passed by the previous bootloader, to env var"
1764 help
1765 When u-boot is used as a chain-loaded bootloader(replacing OS kernel),
1766 enable this option to save initramfs address, passed by the
1767 previous bootloader for future use.
1768 Address is saved to `prevbl_initrd_start_addr` environment variable.
1769
1770 If no initramfs was provided by previous bootloader, no env variables
1771 will be created.
1772
Simon Glassa0874dc2023-06-01 10:23:02 -06001773menu "Configuration editor"
1774
1775config CEDIT
1776 bool "Configuration editor"
Heinrich Schuchardt64c67b62023-12-16 16:38:36 +01001777 depends on EXPO
Simon Glassa0874dc2023-06-01 10:23:02 -06001778 help
1779 Provides a way to deal with board configuration and present it to
1780 the user for adjustment.
1781
1782 This is intended to provide both graphical and text-based user
1783 interfaces, but only graphical is support at present.
1784
1785endmenu # Configuration editor
1786
Simon Glasscf298162020-09-10 20:21:13 -06001787endmenu # Booting