hc
2023-12-11 d2ccde1c8e90d38cee87a1b0309ad2827f3fd30d
kernel/drivers/firmware/Kconfig
....@@ -1,28 +1,15 @@
1
+# SPDX-License-Identifier: GPL-2.0-only
12 #
23 # For a description of the syntax of this configuration file,
3
-# see Documentation/kbuild/kconfig-language.txt.
4
+# see Documentation/kbuild/kconfig-language.rst.
45 #
56
67 menu "Firmware Drivers"
78
8
-config ARM_PSCI_FW
9
- bool
10
-
11
-config ARM_PSCI_CHECKER
12
- bool "ARM PSCI checker"
13
- depends on ARM_PSCI_FW && HOTPLUG_CPU && CPU_IDLE && !TORTURE_TEST
14
- help
15
- Run the PSCI checker during startup. This checks that hotplug and
16
- suspend operations work correctly when using PSCI.
17
-
18
- The torture tests may interfere with the PSCI checker by turning CPUs
19
- on and off through hotplug, so for now torture tests and PSCI checker
20
- are mutually exclusive.
21
-
229 config ARM_SCMI_PROTOCOL
23
- bool "ARM System Control and Management Interface (SCMI) Message Protocol"
10
+ tristate "ARM System Control and Management Interface (SCMI) Message Protocol"
2411 depends on ARM || ARM64 || COMPILE_TEST
25
- depends on MAILBOX
12
+ depends on MAILBOX || HAVE_ARM_SMCCC_DISCOVERY
2613 help
2714 ARM System Control and Management Interface (SCMI) protocol is a
2815 set of operating system-independent software interfaces that are
....@@ -145,34 +132,6 @@
145132 See DIG64_HCDPv20_042804.pdf available from
146133 <http://www.dig64.org/specifications/>
147134
148
-config DELL_RBU
149
- tristate "BIOS update support for DELL systems via sysfs"
150
- depends on X86
151
- select FW_LOADER
152
- select FW_LOADER_USER_HELPER
153
- help
154
- Say m if you want to have the option of updating the BIOS for your
155
- DELL system. Note you need a Dell OpenManage or Dell Update package (DUP)
156
- supporting application to communicate with the BIOS regarding the new
157
- image for the image update to take effect.
158
- See <file:Documentation/dell_rbu.txt> for more details on the driver.
159
-
160
-config DCDBAS
161
- tristate "Dell Systems Management Base Driver"
162
- depends on X86
163
- help
164
- The Dell Systems Management Base Driver provides a sysfs interface
165
- for systems management software to perform System Management
166
- Interrupts (SMIs) and Host Control Actions (system power cycle or
167
- power off after OS shutdown) on certain Dell systems.
168
-
169
- See <file:Documentation/dcdbas.txt> for more details on the driver
170
- and the Dell systems on which Dell systems management software makes
171
- use of this driver.
172
-
173
- Say Y or M here to enable the driver for use by Dell systems
174
- management software such as Dell OpenManage.
175
-
176135 config DMIID
177136 bool "Export DMI identification via sysfs to userspace"
178137 depends on DMI
....@@ -227,7 +186,7 @@
227186
228187 config FW_CFG_SYSFS
229188 tristate "QEMU fw_cfg device support in sysfs"
230
- depends on SYSFS && (ARM || ARM64 || PPC_PMAC || SPARC || X86)
189
+ depends on SYSFS && (ARM || ARM64 || PARISC || PPC_PMAC || SPARC || X86)
231190 depends on HAS_IOPORT_MAP
232191 default n
233192 help
....@@ -245,19 +204,41 @@
245204 WARNING: Using incorrect parameters (base address in particular)
246205 may crash your system.
247206
207
+config INTEL_STRATIX10_SERVICE
208
+ tristate "Intel Stratix10 Service Layer"
209
+ depends on (ARCH_STRATIX10 || ARCH_AGILEX) && HAVE_ARM_SMCCC
210
+ default n
211
+ help
212
+ Intel Stratix10 service layer runs at privileged exception level,
213
+ interfaces with the service providers (FPGA manager is one of them)
214
+ and manages secure monitor call to communicate with secure monitor
215
+ software at secure monitor exception level.
216
+
217
+ Say Y here if you want Stratix10 service layer support.
218
+
219
+config INTEL_STRATIX10_RSU
220
+ tristate "Intel Stratix10 Remote System Update"
221
+ depends on INTEL_STRATIX10_SERVICE
222
+ help
223
+ The Intel Remote System Update (RSU) driver exposes interfaces
224
+ access through the Intel Service Layer to user space via sysfs
225
+ device attribute nodes. The RSU interfaces report/control some of
226
+ the optional RSU features of the Stratix 10 SoC FPGA.
227
+
228
+ The RSU provides a way for customers to update the boot
229
+ configuration of a Stratix 10 SoC device with significantly reduced
230
+ risk of corrupting the bitstream storage and bricking the system.
231
+
232
+ Enable RSU support if you are using an Intel SoC FPGA with the RSU
233
+ feature enabled and you want Linux user space control.
234
+
235
+ Say Y here if you want Intel RSU support.
236
+
248237 config QCOM_SCM
249
- bool
238
+ tristate "Qcom SCM driver"
250239 depends on ARM || ARM64
251240 depends on HAVE_ARM_SMCCC
252241 select RESET_CONTROLLER
253
-
254
-config QCOM_SCM_32
255
- def_bool y
256
- depends on QCOM_SCM && ARM
257
-
258
-config QCOM_SCM_64
259
- def_bool y
260
- depends on QCOM_SCM && ARM64
261242
262243 config QCOM_SCM_DOWNLOAD_MODE_DEFAULT
263244 bool "Qualcomm download mode enabled by default"
....@@ -292,13 +273,44 @@
292273 This protocol library is used by client drivers to use the features
293274 provided by the system controller.
294275
295
-config HAVE_ARM_SMCCC
296
- bool
276
+config TRUSTED_FOUNDATIONS
277
+ bool "Trusted Foundations secure monitor support"
278
+ depends on ARM && CPU_V7
279
+ help
280
+ Some devices (including most early Tegra-based consumer devices on
281
+ the market) are booted with the Trusted Foundations secure monitor
282
+ active, requiring some core operations to be performed by the secure
283
+ monitor instead of the kernel.
284
+
285
+ This option allows the kernel to invoke the secure monitor whenever
286
+ required on devices using Trusted Foundations. See the functions and
287
+ comments in linux/firmware/trusted_foundations.h or the device tree
288
+ bindings for "tlm,trusted-foundations" for details on how to use it.
289
+
290
+ Choose N if you don't know what this is about.
291
+
292
+config TURRIS_MOX_RWTM
293
+ tristate "Turris Mox rWTM secure firmware driver"
294
+ depends on ARCH_MVEBU || COMPILE_TEST
295
+ depends on HAS_DMA && OF
296
+ depends on MAILBOX
297
+ select HW_RANDOM
298
+ select ARMADA_37XX_RWTM_MBOX
299
+ help
300
+ This driver communicates with the firmware on the Cortex-M3 secure
301
+ processor of the Turris Mox router. Enable if you are building for
302
+ Turris Mox, and you will be able to read the device serial number and
303
+ other manufacturing data and also utilize the Entropy Bit Generator
304
+ for hardware random number generation.
297305
298306 source "drivers/firmware/broadcom/Kconfig"
299307 source "drivers/firmware/google/Kconfig"
300308 source "drivers/firmware/efi/Kconfig"
309
+source "drivers/firmware/imx/Kconfig"
301310 source "drivers/firmware/meson/Kconfig"
311
+source "drivers/firmware/psci/Kconfig"
312
+source "drivers/firmware/smccc/Kconfig"
302313 source "drivers/firmware/tegra/Kconfig"
314
+source "drivers/firmware/xilinx/Kconfig"
303315
304316 endmenu