Thomas Gleixner | ec8f24b | 2019-05-19 13:07:45 +0100 | [diff] [blame] | 1 | # SPDX-License-Identifier: GPL-2.0-only |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2 | # |
| 3 | # For a description of the syntax of this configuration file, |
Mauro Carvalho Chehab | cd238ef | 2019-06-12 14:52:48 -0300 | [diff] [blame] | 4 | # see Documentation/kbuild/kconfig-language.rst. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 5 | # |
| 6 | |
| 7 | menu "Firmware Drivers" |
| 8 | |
Sudeep Holla | aa4f886 | 2017-03-28 11:36:07 +0100 | [diff] [blame] | 9 | config ARM_SCMI_PROTOCOL |
Sudeep Holla | 66d90f6 | 2020-09-07 12:09:23 +0100 | [diff] [blame] | 10 | tristate "ARM System Control and Management Interface (SCMI) Message Protocol" |
Sudeep Holla | aa4f886 | 2017-03-28 11:36:07 +0100 | [diff] [blame] | 11 | depends on ARM || ARM64 || COMPILE_TEST |
| 12 | depends on MAILBOX |
| 13 | help |
| 14 | ARM System Control and Management Interface (SCMI) protocol is a |
| 15 | set of operating system-independent software interfaces that are |
| 16 | used in system management. SCMI is extensible and currently provides |
| 17 | interfaces for: Discovery and self-description of the interfaces |
| 18 | it supports, Power domain management which is the ability to place |
| 19 | a given device or domain into the various power-saving states that |
| 20 | it supports, Performance management which is the ability to control |
| 21 | the performance of a domain that is composed of compute engines |
| 22 | such as application processors and other accelerators, Clock |
| 23 | management which is the ability to set and inquire rates on platform |
| 24 | managed clocks and Sensor management which is the ability to read |
| 25 | sensor data, and be notified of sensor value. |
| 26 | |
| 27 | This protocol library provides interface for all the client drivers |
| 28 | making use of the features offered by the SCMI. |
| 29 | |
Sudeep Holla | 898216c | 2017-06-14 13:48:26 +0100 | [diff] [blame] | 30 | config ARM_SCMI_POWER_DOMAIN |
| 31 | tristate "SCMI power domain driver" |
| 32 | depends on ARM_SCMI_PROTOCOL || (COMPILE_TEST && OF) |
| 33 | default y |
| 34 | select PM_GENERIC_DOMAINS if PM |
| 35 | help |
| 36 | This enables support for the SCMI power domains which can be |
| 37 | enabled or disabled via the SCP firmware |
| 38 | |
| 39 | This driver can also be built as a module. If so, the module |
| 40 | will be called scmi_pm_domain. Note this may needed early in boot |
| 41 | before rootfs may be available. |
| 42 | |
Sudeep Holla | 8cb7cf5 | 2015-03-30 10:59:52 +0100 | [diff] [blame] | 43 | config ARM_SCPI_PROTOCOL |
| 44 | tristate "ARM System Control and Power Interface (SCPI) Message Protocol" |
Jean Delvare | 92f3e6e | 2017-01-30 09:52:01 +0100 | [diff] [blame] | 45 | depends on ARM || ARM64 || COMPILE_TEST |
Sudeep Holla | 8f1498c | 2016-06-05 18:23:21 +0100 | [diff] [blame] | 46 | depends on MAILBOX |
Sudeep Holla | 8cb7cf5 | 2015-03-30 10:59:52 +0100 | [diff] [blame] | 47 | help |
| 48 | System Control and Power Interface (SCPI) Message Protocol is |
| 49 | defined for the purpose of communication between the Application |
| 50 | Cores(AP) and the System Control Processor(SCP). The MHU peripheral |
| 51 | provides a mechanism for inter-processor communication between SCP |
| 52 | and AP. |
| 53 | |
| 54 | SCP controls most of the power managament on the Application |
| 55 | Processors. It offers control and management of: the core/cluster |
| 56 | power states, various power domain DVFS including the core/cluster, |
| 57 | certain system clocks configuration, thermal sensors and many |
| 58 | others. |
| 59 | |
| 60 | This protocol library provides interface for all the client drivers |
| 61 | making use of the features offered by the SCP. |
| 62 | |
Sudeep Holla | 8bec433 | 2016-06-02 16:34:03 +0100 | [diff] [blame] | 63 | config ARM_SCPI_POWER_DOMAIN |
| 64 | tristate "SCPI power domain driver" |
Arnd Bergmann | e517dfe | 2016-07-06 14:49:46 +0200 | [diff] [blame] | 65 | depends on ARM_SCPI_PROTOCOL || (COMPILE_TEST && OF) |
Sudeep Holla | 8bec433 | 2016-06-02 16:34:03 +0100 | [diff] [blame] | 66 | default y |
| 67 | select PM_GENERIC_DOMAINS if PM |
Sudeep Holla | 8bec433 | 2016-06-02 16:34:03 +0100 | [diff] [blame] | 68 | help |
| 69 | This enables support for the SCPI power domains which can be |
| 70 | enabled or disabled via the SCP firmware |
| 71 | |
James Morse | ad6eb31 | 2018-01-08 15:38:09 +0000 | [diff] [blame] | 72 | config ARM_SDE_INTERFACE |
| 73 | bool "ARM Software Delegated Exception Interface (SDEI)" |
| 74 | depends on ARM64 |
| 75 | help |
| 76 | The Software Delegated Exception Interface (SDEI) is an ARM |
| 77 | standard for registering callbacks from the platform firmware |
| 78 | into the OS. This is typically used to implement RAS notifications. |
| 79 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 80 | config EDD |
Chris Wedgwood | 5d18639 | 2006-06-25 05:47:46 -0700 | [diff] [blame] | 81 | tristate "BIOS Enhanced Disk Drive calls determine boot disk" |
Mike Frysinger | 9b6e3e4 | 2009-12-14 18:01:16 -0800 | [diff] [blame] | 82 | depends on X86 |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 83 | help |
| 84 | Say Y or M here if you want to enable BIOS Enhanced Disk Drive |
| 85 | Services real mode BIOS calls to determine which disk |
| 86 | BIOS tries boot from. This information is then exported via sysfs. |
| 87 | |
| 88 | This option is experimental and is known to fail to boot on some |
| 89 | obscure configurations. Most disk controller BIOS vendors do |
| 90 | not yet implement this feature. |
| 91 | |
Tim Gardner | 8c4dd60 | 2008-04-29 01:02:45 -0700 | [diff] [blame] | 92 | config EDD_OFF |
| 93 | bool "Sets default behavior for EDD detection to off" |
| 94 | depends on EDD |
| 95 | default n |
| 96 | help |
| 97 | Say Y if you want EDD disabled by default, even though it is compiled into the |
| 98 | kernel. Say N if you want EDD enabled by default. EDD can be dynamically set |
| 99 | using the kernel parameter 'edd={on|skipmbr|off}'. |
| 100 | |
Bernhard Walle | 69ac9cd | 2008-06-27 13:12:54 +0200 | [diff] [blame] | 101 | config FIRMWARE_MEMMAP |
David Rientjes | 6a108a1 | 2011-01-20 14:44:16 -0800 | [diff] [blame] | 102 | bool "Add firmware-provided memory map to sysfs" if EXPERT |
Mike Frysinger | 9b6e3e4 | 2009-12-14 18:01:16 -0800 | [diff] [blame] | 103 | default X86 |
Bernhard Walle | 69ac9cd | 2008-06-27 13:12:54 +0200 | [diff] [blame] | 104 | help |
| 105 | Add the firmware-provided (unmodified) memory map to /sys/firmware/memmap. |
| 106 | That memory map is used for example by kexec to set up parameter area |
| 107 | for the next kernel, but can also be used for debugging purposes. |
| 108 | |
| 109 | See also Documentation/ABI/testing/sysfs-firmware-memmap. |
| 110 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 111 | config EFI_PCDP |
| 112 | bool "Console device selection via EFI PCDP or HCDP table" |
| 113 | depends on ACPI && EFI && IA64 |
| 114 | default y if IA64 |
| 115 | help |
| 116 | If your firmware supplies the PCDP table, and you want to |
| 117 | automatically use the primary console device it describes |
| 118 | as the Linux console, say Y here. |
| 119 | |
| 120 | If your firmware supplies the HCDP table, and you want to |
| 121 | use the first serial port it describes as the Linux console, |
| 122 | say Y here. If your EFI ConOut path contains only a UART |
| 123 | device, it will become the console automatically. Otherwise, |
| 124 | you must specify the "console=hcdp" kernel boot argument. |
| 125 | |
| 126 | Neither the PCDP nor the HCDP affects naming of serial devices, |
| 127 | so a serial console may be /dev/ttyS0, /dev/ttyS1, etc, depending |
| 128 | on how the driver discovers devices. |
| 129 | |
| 130 | You must also enable the appropriate drivers (serial, VGA, etc.) |
| 131 | |
Justin P. Mattock | 631dd1a | 2010-10-18 11:03:14 +0200 | [diff] [blame] | 132 | See DIG64_HCDPv20_042804.pdf available from |
| 133 | <http://www.dig64.org/specifications/> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 134 | |
Lennart Poettering | 4f5c791 | 2007-05-08 22:07:02 +0200 | [diff] [blame] | 135 | config DMIID |
| 136 | bool "Export DMI identification via sysfs to userspace" |
| 137 | depends on DMI |
| 138 | default y |
| 139 | help |
| 140 | Say Y here if you want to query SMBIOS/DMI system identification |
| 141 | information from userspace through /sys/class/dmi/id/ or if you want |
| 142 | DMI-based module auto-loading. |
| 143 | |
Mike Waychison | 948af1f | 2011-02-22 17:53:21 -0800 | [diff] [blame] | 144 | config DMI_SYSFS |
| 145 | tristate "DMI table support in sysfs" |
| 146 | depends on SYSFS && DMI |
| 147 | default n |
| 148 | help |
| 149 | Say Y or M here to enable the exporting of the raw DMI table |
| 150 | data via sysfs. This is useful for consuming the data without |
| 151 | requiring any access to /dev/mem at all. Tables are found |
| 152 | under /sys/firmware/dmi when this option is enabled and |
| 153 | loaded. |
| 154 | |
Ard Biesheuvel | cf07440 | 2014-01-23 15:54:39 -0800 | [diff] [blame] | 155 | config DMI_SCAN_MACHINE_NON_EFI_FALLBACK |
| 156 | bool |
| 157 | |
Konrad Rzeszutek | 138fe4e | 2008-04-09 19:50:41 -0700 | [diff] [blame] | 158 | config ISCSI_IBFT_FIND |
| 159 | bool "iSCSI Boot Firmware Table Attributes" |
Thomas Tai | 94bccc3 | 2019-07-18 18:37:34 +0000 | [diff] [blame] | 160 | depends on X86 && ISCSI_IBFT |
Konrad Rzeszutek | 138fe4e | 2008-04-09 19:50:41 -0700 | [diff] [blame] | 161 | default n |
| 162 | help |
| 163 | This option enables the kernel to find the region of memory |
| 164 | in which the ISCSI Boot Firmware Table (iBFT) resides. This |
| 165 | is necessary for iSCSI Boot Firmware Table Attributes module to work |
| 166 | properly. |
| 167 | |
| 168 | config ISCSI_IBFT |
| 169 | tristate "iSCSI Boot Firmware Table Attributes module" |
Mike Christie | b33a84a | 2010-04-12 18:06:18 +0000 | [diff] [blame] | 170 | select ISCSI_BOOT_SYSFS |
Thomas Tai | 94bccc3 | 2019-07-18 18:37:34 +0000 | [diff] [blame] | 171 | select ISCSI_IBFT_FIND if X86 |
| 172 | depends on ACPI && SCSI && SCSI_LOWLEVEL |
Konrad Rzeszutek | 138fe4e | 2008-04-09 19:50:41 -0700 | [diff] [blame] | 173 | default n |
| 174 | help |
| 175 | This option enables support for detection and exposing of iSCSI |
| 176 | Boot Firmware Table (iBFT) via sysfs to userspace. If you wish to |
| 177 | detect iSCSI boot parameters dynamically during system boot, say Y. |
| 178 | Otherwise, say N. |
| 179 | |
Eric Anholt | 4e3d606 | 2015-02-26 10:08:06 +0000 | [diff] [blame] | 180 | config RASPBERRYPI_FIRMWARE |
Nicolas Saenz Julienne | 83a06a1 | 2020-06-29 18:18:42 +0200 | [diff] [blame] | 181 | tristate "Raspberry Pi Firmware Driver" |
Eric Anholt | 4e3d606 | 2015-02-26 10:08:06 +0000 | [diff] [blame] | 182 | depends on BCM2835_MBOX |
| 183 | help |
| 184 | This option enables support for communicating with the firmware on the |
| 185 | Raspberry Pi. |
| 186 | |
Gabriel Somlo | 75f3e8e | 2016-01-28 09:23:11 -0500 | [diff] [blame] | 187 | config FW_CFG_SYSFS |
| 188 | tristate "QEMU fw_cfg device support in sysfs" |
Helge Deller | 6b69871 | 2020-08-29 10:00:40 +0200 | [diff] [blame] | 189 | depends on SYSFS && (ARM || ARM64 || PARISC || PPC_PMAC || SPARC || X86) |
Arnd Bergmann | 28c09ec | 2016-02-11 15:23:51 +0100 | [diff] [blame] | 190 | depends on HAS_IOPORT_MAP |
Gabriel Somlo | 75f3e8e | 2016-01-28 09:23:11 -0500 | [diff] [blame] | 191 | default n |
| 192 | help |
| 193 | Say Y or M here to enable the exporting of the QEMU firmware |
| 194 | configuration (fw_cfg) file entries via sysfs. Entries are |
| 195 | found under /sys/firmware/fw_cfg when this option is enabled |
| 196 | and loaded. |
| 197 | |
| 198 | config FW_CFG_SYSFS_CMDLINE |
| 199 | bool "QEMU fw_cfg device parameter parsing" |
| 200 | depends on FW_CFG_SYSFS |
| 201 | help |
| 202 | Allow the qemu_fw_cfg device to be initialized via the kernel |
| 203 | command line or using a module parameter. |
| 204 | WARNING: Using incorrect parameters (base address in particular) |
| 205 | may crash your system. |
| 206 | |
Richard Gong | 7ca5ce8 | 2018-11-13 12:14:01 -0600 | [diff] [blame] | 207 | config INTEL_STRATIX10_SERVICE |
| 208 | tristate "Intel Stratix10 Service Layer" |
Richard Gong | 231d901 | 2020-03-05 11:12:26 -0600 | [diff] [blame] | 209 | depends on (ARCH_STRATIX10 || ARCH_AGILEX) && HAVE_ARM_SMCCC |
Richard Gong | 7ca5ce8 | 2018-11-13 12:14:01 -0600 | [diff] [blame] | 210 | default n |
| 211 | help |
| 212 | Intel Stratix10 service layer runs at privileged exception level, |
| 213 | interfaces with the service providers (FPGA manager is one of them) |
| 214 | and manages secure monitor call to communicate with secure monitor |
| 215 | software at secure monitor exception level. |
| 216 | |
| 217 | Say Y here if you want Stratix10 service layer support. |
| 218 | |
Richard Gong | 4526ebb | 2019-09-03 08:18:19 -0500 | [diff] [blame] | 219 | config INTEL_STRATIX10_RSU |
| 220 | tristate "Intel Stratix10 Remote System Update" |
| 221 | depends on INTEL_STRATIX10_SERVICE |
| 222 | help |
| 223 | The Intel Remote System Update (RSU) driver exposes interfaces |
| 224 | access through the Intel Service Layer to user space via sysfs |
| 225 | device attribute nodes. The RSU interfaces report/control some of |
| 226 | the optional RSU features of the Stratix 10 SoC FPGA. |
| 227 | |
| 228 | The RSU provides a way for customers to update the boot |
| 229 | configuration of a Stratix 10 SoC device with significantly reduced |
| 230 | risk of corrupting the bitstream storage and bricking the system. |
| 231 | |
| 232 | Enable RSU support if you are using an Intel SoC FPGA with the RSU |
| 233 | feature enabled and you want Linux user space control. |
| 234 | |
| 235 | Say Y here if you want Intel RSU support. |
| 236 | |
Kumar Gala | 916f743d | 2015-02-26 15:49:09 -0600 | [diff] [blame] | 237 | config QCOM_SCM |
| 238 | bool |
| 239 | depends on ARM || ARM64 |
Bjorn Andersson | dd4fe5b | 2016-06-17 10:40:43 -0700 | [diff] [blame] | 240 | select RESET_CONTROLLER |
Kumar Gala | 916f743d | 2015-02-26 15:49:09 -0600 | [diff] [blame] | 241 | |
Bjorn Andersson | 8c1b7dc | 2017-08-14 15:46:18 -0700 | [diff] [blame] | 242 | config QCOM_SCM_DOWNLOAD_MODE_DEFAULT |
| 243 | bool "Qualcomm download mode enabled by default" |
| 244 | depends on QCOM_SCM |
| 245 | help |
| 246 | A device with "download mode" enabled will upon an unexpected |
| 247 | warm-restart enter a special debug mode that allows the user to |
| 248 | "download" memory content over USB for offline postmortem analysis. |
| 249 | The feature can be enabled/disabled on the kernel command line. |
| 250 | |
| 251 | Say Y here to enable "download mode" by default. |
| 252 | |
Nishanth Menon | aa27678 | 2016-10-18 18:08:34 -0500 | [diff] [blame] | 253 | config TI_SCI_PROTOCOL |
| 254 | tristate "TI System Control Interface (TISCI) Message Protocol" |
| 255 | depends on TI_MESSAGE_MANAGER |
| 256 | help |
| 257 | TI System Control Interface (TISCI) Message Protocol is used to manage |
| 258 | compute systems such as ARM, DSP etc with the system controller in |
| 259 | complex System on Chip(SoC) such as those found on certain keystone |
| 260 | generation SoC from TI. |
| 261 | |
| 262 | System controller provides various facilities including power |
| 263 | management function support. |
| 264 | |
| 265 | This protocol library is used by client drivers to use the features |
| 266 | provided by the system controller. |
| 267 | |
Thierry Reding | 4cb5d9e | 2019-04-10 10:47:28 +0200 | [diff] [blame] | 268 | config TRUSTED_FOUNDATIONS |
| 269 | bool "Trusted Foundations secure monitor support" |
Arnd Bergmann | cad47b3 | 2019-06-17 14:33:23 +0200 | [diff] [blame] | 270 | depends on ARM && CPU_V7 |
Thierry Reding | 4cb5d9e | 2019-04-10 10:47:28 +0200 | [diff] [blame] | 271 | help |
| 272 | Some devices (including most early Tegra-based consumer devices on |
| 273 | the market) are booted with the Trusted Foundations secure monitor |
| 274 | active, requiring some core operations to be performed by the secure |
| 275 | monitor instead of the kernel. |
| 276 | |
| 277 | This option allows the kernel to invoke the secure monitor whenever |
| 278 | required on devices using Trusted Foundations. See the functions and |
| 279 | comments in linux/firmware/trusted_foundations.h or the device tree |
| 280 | bindings for "tlm,trusted-foundations" for details on how to use it. |
| 281 | |
| 282 | Choose N if you don't know what this is about. |
| 283 | |
Marek Behún | 389711b | 2019-08-22 03:43:17 +0200 | [diff] [blame] | 284 | config TURRIS_MOX_RWTM |
| 285 | tristate "Turris Mox rWTM secure firmware driver" |
| 286 | depends on ARCH_MVEBU || COMPILE_TEST |
| 287 | depends on HAS_DMA && OF |
| 288 | depends on MAILBOX |
| 289 | select HW_RANDOM |
| 290 | select ARMADA_37XX_RWTM_MBOX |
| 291 | help |
| 292 | This driver communicates with the firmware on the Cortex-M3 secure |
| 293 | processor of the Turris Mox router. Enable if you are building for |
| 294 | Turris Mox, and you will be able to read the device serial number and |
| 295 | other manufacturing data and also utilize the Entropy Bit Generator |
| 296 | for hardware random number generation. |
| 297 | |
Rafał Miłecki | f6e734a | 2015-06-10 23:05:08 +0200 | [diff] [blame] | 298 | source "drivers/firmware/broadcom/Kconfig" |
Mike Waychison | 74c5b31 | 2011-04-29 17:39:19 -0700 | [diff] [blame] | 299 | source "drivers/firmware/google/Kconfig" |
Matt Fleming | 0485177 | 2013-02-08 15:48:51 +0000 | [diff] [blame] | 300 | source "drivers/firmware/efi/Kconfig" |
Dong Aisheng | edbee09 | 2018-10-07 21:04:42 +0800 | [diff] [blame] | 301 | source "drivers/firmware/imx/Kconfig" |
Carlo Caione | 2c4ddb2 | 2016-08-27 15:43:43 +0200 | [diff] [blame] | 302 | source "drivers/firmware/meson/Kconfig" |
Sudeep Holla | e5bfb21 | 2020-05-18 10:12:16 +0100 | [diff] [blame] | 303 | source "drivers/firmware/psci/Kconfig" |
| 304 | source "drivers/firmware/smccc/Kconfig" |
Thierry Reding | ca791d7 | 2016-08-19 19:05:04 +0200 | [diff] [blame] | 305 | source "drivers/firmware/tegra/Kconfig" |
Rajan Vaja | 7658267 | 2018-09-12 12:38:36 -0700 | [diff] [blame] | 306 | source "drivers/firmware/xilinx/Kconfig" |
Mike Waychison | 74c5b31 | 2011-04-29 17:39:19 -0700 | [diff] [blame] | 307 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 308 | endmenu |