Alexander Graf | ed980b8 | 2016-03-04 01:10:07 +0100 | [diff] [blame] | 1 | config EFI_LOADER |
Heinrich Schuchardt | 9363fd2 | 2019-05-11 10:27:58 +0200 | [diff] [blame] | 2 | bool "Support running UEFI applications" |
Heinrich Schuchardt | b20bb09 | 2019-11-17 10:44:16 +0100 | [diff] [blame] | 3 | depends on OF_LIBFDT && ( \ |
Heinrich Schuchardt | 38064ee | 2019-11-19 04:19:09 +0100 | [diff] [blame] | 4 | ARM && (SYS_CPU = arm1136 || \ |
| 5 | SYS_CPU = arm1176 || \ |
| 6 | SYS_CPU = armv7 || \ |
| 7 | SYS_CPU = armv8) || \ |
Heinrich Schuchardt | b20bb09 | 2019-11-17 10:44:16 +0100 | [diff] [blame] | 8 | X86 || RISCV || SANDBOX) |
Alexander Graf | 6698bb3 | 2018-01-24 14:54:21 +0100 | [diff] [blame] | 9 | # We need EFI_STUB_64BIT to be set on x86_64 with EFI_STUB |
| 10 | depends on !EFI_STUB || !X86_64 || EFI_STUB_64BIT |
| 11 | # We need EFI_STUB_32BIT to be set on x86_32 with EFI_STUB |
| 12 | depends on !EFI_STUB || !X86 || X86_64 || EFI_STUB_32BIT |
Heinrich Schuchardt | 6919619 | 2021-09-07 08:56:47 +0200 | [diff] [blame] | 13 | depends on BLK |
Simon Glass | c779e0d | 2021-09-24 18:30:17 -0600 | [diff] [blame] | 14 | depends on DM_ETH || !NET |
Simon Glass | e16c47f | 2021-11-03 21:09:07 -0600 | [diff] [blame] | 15 | depends on !EFI_APP |
Heinrich Schuchardt | b7cdecf | 2019-11-20 18:48:02 +0100 | [diff] [blame] | 16 | default y if !ARM || SYS_CPU = armv7 || SYS_CPU = armv8 |
Heinrich Schuchardt | d30924f | 2022-05-02 06:27:00 +0200 | [diff] [blame^] | 17 | select CHARSET |
AKASHI Takahiro | a9bf024 | 2022-04-19 10:05:12 +0900 | [diff] [blame] | 18 | select DM_EVENT |
| 19 | select EVENT_DYNAMIC |
Adam Ford | a451bc2 | 2018-02-06 12:14:28 -0600 | [diff] [blame] | 20 | select LIB_UUID |
AKASHI Takahiro | 7a06fd7 | 2022-04-19 10:01:56 +0900 | [diff] [blame] | 21 | imply PARTITION_UUIDS |
Adam Ford | 1811a92 | 2018-02-06 12:43:56 -0600 | [diff] [blame] | 22 | select HAVE_BLOCK_DEVICE |
Heinrich Schuchardt | dba5148 | 2019-01-22 21:35:23 +0100 | [diff] [blame] | 23 | select REGEX |
Heinrich Schuchardt | 93f6201 | 2020-03-21 20:45:50 +0100 | [diff] [blame] | 24 | imply FAT |
| 25 | imply FAT_WRITE |
Heinrich Schuchardt | 8876e1b | 2019-12-04 22:58:58 +0100 | [diff] [blame] | 26 | imply USB_KEYBOARD_FN_KEYS |
Heinrich Schuchardt | faadc04 | 2020-01-15 00:49:35 +0100 | [diff] [blame] | 27 | imply VIDEO_ANSI |
Alexander Graf | ed980b8 | 2016-03-04 01:10:07 +0100 | [diff] [blame] | 28 | help |
Heinrich Schuchardt | 9363fd2 | 2019-05-11 10:27:58 +0200 | [diff] [blame] | 29 | Select this option if you want to run UEFI applications (like GNU |
| 30 | GRUB or iPXE) on top of U-Boot. If this option is enabled, U-Boot |
| 31 | will expose the UEFI API to a loaded application, enabling it to |
| 32 | reuse U-Boot's device drivers. |
Alexander Graf | 51735ae | 2016-05-11 18:25:48 +0200 | [diff] [blame] | 33 | |
Heinrich Schuchardt | 5684c8d | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 34 | if EFI_LOADER |
Alexander Graf | 5fbb289 | 2019-02-11 15:24:00 +0100 | [diff] [blame] | 35 | |
Heinrich Schuchardt | ff2f532 | 2021-01-15 19:02:50 +0100 | [diff] [blame] | 36 | config CMD_BOOTEFI_BOOTMGR |
| 37 | bool "UEFI Boot Manager" |
| 38 | default y |
| 39 | help |
| 40 | Select this option if you want to select the UEFI binary to be booted |
| 41 | via UEFI variables Boot####, BootOrder, and BootNext. This enables the |
| 42 | 'bootefi bootmgr' command. |
| 43 | |
AKASHI Takahiro | c57c943 | 2020-10-29 13:47:45 +0900 | [diff] [blame] | 44 | config EFI_SETUP_EARLY |
| 45 | bool |
AKASHI Takahiro | a9bf024 | 2022-04-19 10:05:12 +0900 | [diff] [blame] | 46 | default y |
AKASHI Takahiro | c57c943 | 2020-10-29 13:47:45 +0900 | [diff] [blame] | 47 | |
Heinrich Schuchardt | be66b89 | 2020-07-14 19:18:33 +0200 | [diff] [blame] | 48 | choice |
| 49 | prompt "Store for non-volatile UEFI variables" |
| 50 | default EFI_VARIABLE_FILE_STORE |
| 51 | help |
| 52 | Select where non-volatile UEFI variables shall be stored. |
| 53 | |
Heinrich Schuchardt | 5f7dcf0 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 54 | config EFI_VARIABLE_FILE_STORE |
| 55 | bool "Store non-volatile UEFI variables as file" |
| 56 | depends on FAT_WRITE |
Heinrich Schuchardt | 5f7dcf0 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 57 | help |
Heinrich Schuchardt | be66b89 | 2020-07-14 19:18:33 +0200 | [diff] [blame] | 58 | Select this option if you want non-volatile UEFI variables to be |
| 59 | stored as file /ubootefi.var on the EFI system partition. |
| 60 | |
| 61 | config EFI_MM_COMM_TEE |
| 62 | bool "UEFI variables storage service via OP-TEE" |
| 63 | depends on OPTEE |
| 64 | help |
| 65 | If OP-TEE is present and running StandAloneMM, dispatch all UEFI |
| 66 | variable related operations to that. The application will verify, |
| 67 | authenticate and store the variables on an RPMB. |
| 68 | |
Tom Saeger | f2288a2 | 2022-03-22 15:21:10 -0600 | [diff] [blame] | 69 | config EFI_VARIABLE_NO_STORE |
| 70 | bool "Don't persist non-volatile UEFI variables" |
| 71 | help |
| 72 | If you choose this option, non-volatile variables cannot be persisted. |
| 73 | You could still provide non-volatile variables via |
| 74 | EFI_VARIABLES_PRESEED. |
| 75 | |
Heinrich Schuchardt | be66b89 | 2020-07-14 19:18:33 +0200 | [diff] [blame] | 76 | endchoice |
Heinrich Schuchardt | 5f7dcf0 | 2020-03-19 18:21:58 +0000 | [diff] [blame] | 77 | |
Heinrich Schuchardt | 7dda163 | 2020-07-14 21:25:28 +0200 | [diff] [blame] | 78 | config EFI_VARIABLES_PRESEED |
| 79 | bool "Initial values for UEFI variables" |
Tom Saeger | f2288a2 | 2022-03-22 15:21:10 -0600 | [diff] [blame] | 80 | depends on !EFI_MM_COMM_TEE |
Heinrich Schuchardt | 7dda163 | 2020-07-14 21:25:28 +0200 | [diff] [blame] | 81 | help |
| 82 | Include a file with the initial values for non-volatile UEFI variables |
| 83 | into the U-Boot binary. If this configuration option is set, changes |
| 84 | to authentication related variables (PK, KEK, db, dbx) are not |
| 85 | allowed. |
| 86 | |
| 87 | if EFI_VARIABLES_PRESEED |
| 88 | |
| 89 | config EFI_VAR_SEED_FILE |
| 90 | string "File with initial values of non-volatile UEFI variables" |
| 91 | default ubootefi.var |
| 92 | help |
| 93 | File with initial values of non-volatile UEFI variables. The file must |
| 94 | be in the same format as the storage in the EFI system partition. The |
| 95 | easiest way to create it is by setting the non-volatile variables in |
| 96 | U-Boot. If a relative file path is used, it is relative to the source |
| 97 | directory. |
| 98 | |
| 99 | endif |
| 100 | |
Heinrich Schuchardt | c0c21d6 | 2020-12-20 11:05:38 +0100 | [diff] [blame] | 101 | config EFI_VAR_BUF_SIZE |
| 102 | int "Memory size of the UEFI variable store" |
| 103 | default 16384 |
| 104 | range 4096 2147483647 |
| 105 | help |
| 106 | This defines the size in bytes of the memory area reserved for keeping |
| 107 | UEFI variables. |
| 108 | |
| 109 | When using StandAloneMM (CONFIG_EFI_MM_COMM_TEE=y) this value should |
| 110 | match the value of PcdFlashNvStorageVariableSize used to compile the |
| 111 | StandAloneMM module. |
| 112 | |
| 113 | Minimum 4096, default 16384. |
| 114 | |
Heinrich Schuchardt | 5ec48e3 | 2019-05-31 22:56:02 +0200 | [diff] [blame] | 115 | config EFI_GET_TIME |
| 116 | bool "GetTime() runtime service" |
| 117 | depends on DM_RTC |
| 118 | default y |
| 119 | help |
| 120 | Provide the GetTime() runtime service at boottime. This service |
| 121 | can be used by an EFI application to read the real time clock. |
| 122 | |
| 123 | config EFI_SET_TIME |
| 124 | bool "SetTime() runtime service" |
| 125 | depends on EFI_GET_TIME |
Heinrich Schuchardt | 31cadc3 | 2020-11-21 20:52:18 +0100 | [diff] [blame] | 126 | default y if ARCH_QEMU || SANDBOX |
Heinrich Schuchardt | 5ec48e3 | 2019-05-31 22:56:02 +0200 | [diff] [blame] | 127 | help |
| 128 | Provide the SetTime() runtime service at boottime. This service |
| 129 | can be used by an EFI application to adjust the real time clock. |
| 130 | |
AKASHI Takahiro | 2bc27ca | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 131 | config EFI_HAVE_CAPSULE_SUPPORT |
| 132 | bool |
| 133 | |
| 134 | config EFI_RUNTIME_UPDATE_CAPSULE |
| 135 | bool "UpdateCapsule() runtime service" |
AKASHI Takahiro | 2bc27ca | 2020-11-17 09:27:55 +0900 | [diff] [blame] | 136 | select EFI_HAVE_CAPSULE_SUPPORT |
| 137 | help |
| 138 | Select this option if you want to use UpdateCapsule and |
| 139 | QueryCapsuleCapabilities API's. |
| 140 | |
AKASHI Takahiro | c74cd8b | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 141 | config EFI_CAPSULE_ON_DISK |
| 142 | bool "Enable capsule-on-disk support" |
Masami Hiramatsu | 7660cfe | 2022-03-21 22:37:56 +0900 | [diff] [blame] | 143 | depends on SYSRESET |
AKASHI Takahiro | c74cd8b | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 144 | select EFI_HAVE_CAPSULE_SUPPORT |
AKASHI Takahiro | c74cd8b | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 145 | help |
| 146 | Select this option if you want to use capsule-on-disk feature, |
| 147 | that is, capsules can be fetched and executed from files |
| 148 | under a specific directory on UEFI system partition instead of |
| 149 | via UpdateCapsule API. |
| 150 | |
Ilias Apalodimas | 0fa5020 | 2021-06-29 07:55:51 +0300 | [diff] [blame] | 151 | config EFI_IGNORE_OSINDICATIONS |
| 152 | bool "Ignore OsIndications for CapsuleUpdate on-disk" |
| 153 | depends on EFI_CAPSULE_ON_DISK |
Ilias Apalodimas | 0fa5020 | 2021-06-29 07:55:51 +0300 | [diff] [blame] | 154 | help |
| 155 | There are boards where U-Boot does not support SetVariable at runtime. |
| 156 | Select this option if you want to use the capsule-on-disk feature |
| 157 | without setting the EFI_OS_INDICATIONS_FILE_CAPSULE_DELIVERY_SUPPORTED |
| 158 | flag in variable OsIndications. |
| 159 | |
AKASHI Takahiro | c74cd8b | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 160 | config EFI_CAPSULE_ON_DISK_EARLY |
| 161 | bool "Initiate capsule-on-disk at U-Boot boottime" |
| 162 | depends on EFI_CAPSULE_ON_DISK |
AKASHI Takahiro | c74cd8b | 2020-11-17 09:27:56 +0900 | [diff] [blame] | 163 | select EFI_SETUP_EARLY |
| 164 | help |
| 165 | Normally, without this option enabled, capsules will be |
| 166 | executed only at the first time of invoking one of efi command. |
| 167 | If this option is enabled, capsules will be enforced to be |
| 168 | executed as part of U-Boot initialisation so that they will |
| 169 | surely take place whatever is set to distro_bootcmd. |
| 170 | |
AKASHI Takahiro | bb7e71d | 2020-11-17 09:28:00 +0900 | [diff] [blame] | 171 | config EFI_CAPSULE_FIRMWARE |
| 172 | bool |
AKASHI Takahiro | bb7e71d | 2020-11-17 09:28:00 +0900 | [diff] [blame] | 173 | |
AKASHI Takahiro | 8d99026 | 2020-11-30 18:12:11 +0900 | [diff] [blame] | 174 | config EFI_CAPSULE_FIRMWARE_MANAGEMENT |
| 175 | bool "Capsule: Firmware Management Protocol" |
| 176 | depends on EFI_HAVE_CAPSULE_SUPPORT |
| 177 | default y |
| 178 | help |
| 179 | Select this option if you want to enable capsule-based |
| 180 | firmware update using Firmware Management Protocol. |
| 181 | |
Ilias Apalodimas | b891ff1 | 2021-06-22 17:38:52 +0300 | [diff] [blame] | 182 | config EFI_CAPSULE_FIRMWARE_FIT |
| 183 | bool "FMP driver for FIT images" |
| 184 | depends on FIT |
| 185 | depends on EFI_CAPSULE_FIRMWARE_MANAGEMENT |
| 186 | select UPDATE_FIT |
| 187 | select DFU |
Sughosh Ganu | a9e6f01 | 2022-04-15 11:29:37 +0530 | [diff] [blame] | 188 | select SET_DFU_ALT_INFO |
Ilias Apalodimas | b891ff1 | 2021-06-22 17:38:52 +0300 | [diff] [blame] | 189 | select EFI_CAPSULE_FIRMWARE |
| 190 | help |
| 191 | Select this option if you want to enable firmware management protocol |
| 192 | driver for FIT image |
| 193 | |
| 194 | config EFI_CAPSULE_FIRMWARE_RAW |
| 195 | bool "FMP driver for raw images" |
| 196 | depends on EFI_CAPSULE_FIRMWARE_MANAGEMENT |
| 197 | depends on SANDBOX || (!SANDBOX && !EFI_CAPSULE_FIRMWARE_FIT) |
| 198 | select DFU_WRITE_ALT |
| 199 | select DFU |
Sughosh Ganu | a9e6f01 | 2022-04-15 11:29:37 +0530 | [diff] [blame] | 200 | select SET_DFU_ALT_INFO |
Ilias Apalodimas | b891ff1 | 2021-06-22 17:38:52 +0300 | [diff] [blame] | 201 | select EFI_CAPSULE_FIRMWARE |
| 202 | help |
| 203 | Select this option if you want to enable firmware management protocol |
| 204 | driver for raw image |
| 205 | |
Sughosh Ganu | 04be98b | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 206 | config EFI_CAPSULE_AUTHENTICATE |
| 207 | bool "Update Capsule authentication" |
| 208 | depends on EFI_CAPSULE_FIRMWARE |
| 209 | depends on EFI_CAPSULE_ON_DISK |
| 210 | depends on EFI_CAPSULE_FIRMWARE_MANAGEMENT |
Alexandru Gagniuc | 464010b | 2021-05-24 14:28:57 -0500 | [diff] [blame] | 211 | select HASH |
Sughosh Ganu | 04be98b | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 212 | select SHA256 |
| 213 | select RSA |
| 214 | select RSA_VERIFY |
| 215 | select RSA_VERIFY_WITH_PKEY |
| 216 | select X509_CERTIFICATE_PARSER |
| 217 | select PKCS7_MESSAGE_PARSER |
| 218 | select PKCS7_VERIFY |
Sughosh Ganu | dd40cf6 | 2021-04-07 17:23:31 +0530 | [diff] [blame] | 219 | select IMAGE_SIGN_INFO |
Masahisa Kojima | f6081a8 | 2021-05-14 09:53:36 +0900 | [diff] [blame] | 220 | select EFI_SIGNATURE_SUPPORT |
Sughosh Ganu | 04be98b | 2020-12-30 19:27:09 +0530 | [diff] [blame] | 221 | help |
| 222 | Select this option if you want to enable capsule |
| 223 | authentication |
| 224 | |
Heinrich Schuchardt | 64b5ba4 | 2019-05-11 09:53:33 +0200 | [diff] [blame] | 225 | config EFI_DEVICE_PATH_TO_TEXT |
| 226 | bool "Device path to text protocol" |
| 227 | default y |
| 228 | help |
| 229 | The device path to text protocol converts device nodes and paths to |
| 230 | human readable strings. |
| 231 | |
Heinrich Schuchardt | 59593a5 | 2021-01-16 09:44:25 +0100 | [diff] [blame] | 232 | config EFI_DEVICE_PATH_UTIL |
| 233 | bool "Device path utilities protocol" |
| 234 | default y |
| 235 | help |
| 236 | The device path utilities protocol creates and manipulates device |
| 237 | paths and device nodes. It is required to run the EFI Shell. |
| 238 | |
Heinrich Schuchardt | 4cb07d8 | 2021-01-16 09:33:24 +0100 | [diff] [blame] | 239 | config EFI_DT_FIXUP |
| 240 | bool "Device tree fixup protocol" |
| 241 | depends on !GENERATE_ACPI_TABLE |
| 242 | default y |
| 243 | help |
| 244 | The EFI device-tree fix-up protocol provides a function to let the |
| 245 | firmware apply fix-ups. This may be used by boot loaders. |
| 246 | |
Alexander Graf | 5fbb289 | 2019-02-11 15:24:00 +0100 | [diff] [blame] | 247 | config EFI_LOADER_HII |
Heinrich Schuchardt | 5684c8d | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 248 | bool "HII protocols" |
Heinrich Schuchardt | 084f093 | 2019-04-07 23:58:50 +0200 | [diff] [blame] | 249 | default y |
Alexander Graf | 5fbb289 | 2019-02-11 15:24:00 +0100 | [diff] [blame] | 250 | help |
| 251 | The Human Interface Infrastructure is a complicated framework that |
| 252 | allows UEFI applications to draw fancy menus and hook strings using |
| 253 | a translation framework. |
| 254 | |
| 255 | U-Boot implements enough of its features to be able to run the UEFI |
Heinrich Schuchardt | 084f093 | 2019-04-07 23:58:50 +0200 | [diff] [blame] | 256 | Shell, but not more than that. |
Heinrich Schuchardt | 5684c8d | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 257 | |
Heinrich Schuchardt | 95ab381 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 258 | config EFI_UNICODE_COLLATION_PROTOCOL2 |
Heinrich Schuchardt | 3349973 | 2019-05-08 23:24:26 +0200 | [diff] [blame] | 259 | bool "Unicode collation protocol" |
| 260 | default y |
| 261 | help |
| 262 | The Unicode collation protocol is used for lexical comparisons. It is |
| 263 | required to run the UEFI shell. |
| 264 | |
Heinrich Schuchardt | 95ab381 | 2019-05-16 07:52:58 +0200 | [diff] [blame] | 265 | if EFI_UNICODE_COLLATION_PROTOCOL2 |
Heinrich Schuchardt | 3349973 | 2019-05-08 23:24:26 +0200 | [diff] [blame] | 266 | |
Heinrich Schuchardt | 5684c8d | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 267 | config EFI_UNICODE_CAPITALIZATION |
| 268 | bool "Support Unicode capitalization" |
| 269 | default y |
| 270 | help |
| 271 | Select this option to enable correct handling of the capitalization of |
| 272 | Unicode codepoints in the range 0x0000-0xffff. If this option is not |
| 273 | set, only the the correct handling of the letters of the codepage |
| 274 | used by the FAT file system is ensured. |
| 275 | |
Heinrich Schuchardt | 3349973 | 2019-05-08 23:24:26 +0200 | [diff] [blame] | 276 | endif |
| 277 | |
Heinrich Schuchardt | 5684c8d | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 278 | config EFI_LOADER_BOUNCE_BUFFER |
| 279 | bool "EFI Applications use bounce buffers for DMA operations" |
| 280 | depends on ARM64 |
Heinrich Schuchardt | 5684c8d | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 281 | help |
| 282 | Some hardware does not support DMA to full 64bit addresses. For this |
| 283 | hardware we can create a bounce buffer so that payloads don't have to |
| 284 | worry about platform details. |
| 285 | |
| 286 | config EFI_PLATFORM_LANG_CODES |
| 287 | string "Language codes supported by firmware" |
| 288 | default "en-US" |
| 289 | help |
| 290 | This value is used to initialize the PlatformLangCodes variable. Its |
| 291 | value is a semicolon (;) separated list of language codes in native |
| 292 | RFC 4646 format, e.g. "en-US;de-DE". The first language code is used |
| 293 | to initialize the PlatformLang variable. |
| 294 | |
Heinrich Schuchardt | 953661a | 2019-07-05 18:12:16 +0200 | [diff] [blame] | 295 | config EFI_HAVE_RUNTIME_RESET |
| 296 | # bool "Reset runtime service is available" |
| 297 | bool |
| 298 | default y |
Heinrich Schuchardt | 9c54729 | 2020-12-02 16:22:11 +0100 | [diff] [blame] | 299 | depends on ARCH_BCM283X || FSL_LAYERSCAPE || PSCI_RESET || \ |
| 300 | SANDBOX || SYSRESET_X86 |
Heinrich Schuchardt | 953661a | 2019-07-05 18:12:16 +0200 | [diff] [blame] | 301 | |
Heinrich Schuchardt | 6f3badb | 2019-07-22 22:04:36 +0200 | [diff] [blame] | 302 | config EFI_GRUB_ARM32_WORKAROUND |
| 303 | bool "Workaround for GRUB on 32bit ARM" |
Heinrich Schuchardt | 4bad14a | 2021-03-03 14:05:05 +0100 | [diff] [blame] | 304 | default n if ARCH_BCM283X || ARCH_SUNXI || ARCH_QEMU |
Heinrich Schuchardt | 6f3badb | 2019-07-22 22:04:36 +0200 | [diff] [blame] | 305 | default y |
| 306 | depends on ARM && !ARM64 |
| 307 | help |
| 308 | GRUB prior to version 2.04 requires U-Boot to disable caches. This |
| 309 | workaround currently is also needed on systems with caches that |
| 310 | cannot be managed via CP15. |
Sughosh Ganu | f552fa4 | 2019-12-29 00:01:05 +0530 | [diff] [blame] | 311 | |
| 312 | config EFI_RNG_PROTOCOL |
| 313 | bool "EFI_RNG_PROTOCOL support" |
| 314 | depends on DM_RNG |
Peter Robinson | bdf329e | 2020-04-01 11:15:01 +0100 | [diff] [blame] | 315 | default y |
Sughosh Ganu | f552fa4 | 2019-12-29 00:01:05 +0530 | [diff] [blame] | 316 | help |
Heinrich Schuchardt | 0e22885 | 2020-02-14 23:28:58 +0100 | [diff] [blame] | 317 | Provide a EFI_RNG_PROTOCOL implementation using the hardware random |
| 318 | number generator of the platform. |
Sughosh Ganu | f552fa4 | 2019-12-29 00:01:05 +0530 | [diff] [blame] | 319 | |
Ilias Apalodimas | c1c0210 | 2020-11-11 11:18:11 +0200 | [diff] [blame] | 320 | config EFI_TCG2_PROTOCOL |
| 321 | bool "EFI_TCG2_PROTOCOL support" |
Ilias Apalodimas | 48ee084 | 2021-05-11 14:40:58 +0300 | [diff] [blame] | 322 | default y |
Ilias Apalodimas | c1c0210 | 2020-11-11 11:18:11 +0200 | [diff] [blame] | 323 | depends on TPM_V2 |
Masahisa Kojima | 54bec17 | 2021-12-07 14:15:31 +0900 | [diff] [blame] | 324 | # Sandbox TPM currently fails on GetCapabilities needed for TCG2 |
| 325 | depends on !SANDBOX |
Ilias Apalodimas | 48ee084 | 2021-05-11 14:40:58 +0300 | [diff] [blame] | 326 | select SHA1 |
| 327 | select SHA256 |
Ilias Apalodimas | 48ee084 | 2021-05-11 14:40:58 +0300 | [diff] [blame] | 328 | select SHA384 |
| 329 | select SHA512 |
Masahisa Kojima | 163a0d7 | 2021-05-26 12:09:58 +0900 | [diff] [blame] | 330 | select HASH |
Masahisa Kojima | 3d49ee8 | 2021-10-26 17:27:24 +0900 | [diff] [blame] | 331 | select SMBIOS_PARSER |
Ilias Apalodimas | c1c0210 | 2020-11-11 11:18:11 +0200 | [diff] [blame] | 332 | help |
| 333 | Provide a EFI_TCG2_PROTOCOL implementation using the TPM hardware |
| 334 | of the platform. |
| 335 | |
Ilias Apalodimas | c8d0fd5 | 2020-11-30 11:47:40 +0200 | [diff] [blame] | 336 | config EFI_TCG2_PROTOCOL_EVENTLOG_SIZE |
| 337 | int "EFI_TCG2_PROTOCOL EventLog size" |
| 338 | depends on EFI_TCG2_PROTOCOL |
Masahisa Kojima | d934ed5 | 2021-07-14 22:00:01 +0900 | [diff] [blame] | 339 | default 65536 |
Ilias Apalodimas | c8d0fd5 | 2020-11-30 11:47:40 +0200 | [diff] [blame] | 340 | help |
| 341 | Define the size of the EventLog for EFI_TCG2_PROTOCOL. Note that |
| 342 | this is going to be allocated twice. One for the eventlog it self |
| 343 | and one for the configuration table that is required from the spec |
| 344 | |
Ilias Apalodimas | ec80b47 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 345 | config EFI_LOAD_FILE2_INITRD |
| 346 | bool "EFI_FILE_LOAD2_PROTOCOL for Linux initial ramdisk" |
Ilias Apalodimas | 53f6a5a | 2021-03-17 21:55:00 +0200 | [diff] [blame] | 347 | default y |
Ilias Apalodimas | ec80b47 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 348 | help |
Ilias Apalodimas | 53f6a5a | 2021-03-17 21:55:00 +0200 | [diff] [blame] | 349 | Linux v5.7 and later can make use of this option. If the boot option |
| 350 | selected by the UEFI boot manager specifies an existing file to be used |
| 351 | as initial RAM disk, a Linux specific Load File2 protocol will be |
| 352 | installed and Linux 5.7+ will ignore any initrd=<ramdisk> command line |
| 353 | argument. |
Ilias Apalodimas | ec80b47 | 2020-02-21 09:55:45 +0200 | [diff] [blame] | 354 | |
AKASHI Takahiro | 9bf09b5 | 2020-04-14 11:51:38 +0900 | [diff] [blame] | 355 | config EFI_SECURE_BOOT |
| 356 | bool "Enable EFI secure boot support" |
Simon Glass | 1eccbb1 | 2021-09-25 19:43:29 -0600 | [diff] [blame] | 357 | depends on EFI_LOADER && FIT_SIGNATURE |
Alexandru Gagniuc | 464010b | 2021-05-24 14:28:57 -0500 | [diff] [blame] | 358 | select HASH |
AKASHI Takahiro | 9bf09b5 | 2020-04-14 11:51:38 +0900 | [diff] [blame] | 359 | select SHA256 |
| 360 | select RSA |
| 361 | select RSA_VERIFY_WITH_PKEY |
| 362 | select IMAGE_SIGN_INFO |
| 363 | select ASYMMETRIC_KEY_TYPE |
| 364 | select ASYMMETRIC_PUBLIC_KEY_SUBTYPE |
| 365 | select X509_CERTIFICATE_PARSER |
| 366 | select PKCS7_MESSAGE_PARSER |
AKASHI Takahiro | 1115edd | 2020-07-21 19:35:22 +0900 | [diff] [blame] | 367 | select PKCS7_VERIFY |
Masahisa Kojima | f6081a8 | 2021-05-14 09:53:36 +0900 | [diff] [blame] | 368 | select EFI_SIGNATURE_SUPPORT |
AKASHI Takahiro | 9bf09b5 | 2020-04-14 11:51:38 +0900 | [diff] [blame] | 369 | help |
| 370 | Select this option to enable EFI secure boot support. |
| 371 | Once SecureBoot mode is enforced, any EFI binary can run only if |
| 372 | it is signed with a trusted key. To do that, you need to install, |
| 373 | at least, PK, KEK and db. |
| 374 | |
Masahisa Kojima | f6081a8 | 2021-05-14 09:53:36 +0900 | [diff] [blame] | 375 | config EFI_SIGNATURE_SUPPORT |
| 376 | bool |
| 377 | |
Jose Marinho | 64a8aae | 2021-03-02 17:26:38 +0000 | [diff] [blame] | 378 | config EFI_ESRT |
| 379 | bool "Enable the UEFI ESRT generation" |
| 380 | depends on EFI_CAPSULE_FIRMWARE_MANAGEMENT |
| 381 | default y |
| 382 | help |
| 383 | Enabling this option creates the ESRT UEFI system table. |
| 384 | |
Sunil V L | 1ccf871 | 2022-01-28 20:48:44 +0530 | [diff] [blame] | 385 | config EFI_RISCV_BOOT_PROTOCOL |
| 386 | bool "RISCV_EFI_BOOT_PROTOCOL support" |
| 387 | default y |
| 388 | depends on RISCV |
| 389 | help |
| 390 | The EFI_RISCV_BOOT_PROTOCOL is used to transfer the boot hart ID |
| 391 | to the next boot stage. It should be enabled as it is meant to |
| 392 | replace the transfer via the device-tree. The latter is not |
| 393 | possible on systems using ACPI. |
| 394 | |
Heinrich Schuchardt | 5684c8d | 2019-05-08 23:17:38 +0200 | [diff] [blame] | 395 | endif |