Kconfig: Refactoring of top-level Kconfig file
Some refactoring of the top-level Kconfig file which includes: * using "if" to remove numerous identical dependency tests * reordering config entries to group related ones * spelling and grammar fixes There should be no functional changes, only aesthetic ones. Signed-off-by: Robert P. J. Day <rpjday@crashcourse.ca>
This commit is contained in:
parent
8c36e99f21
commit
266aa86b04
1 changed files with 60 additions and 65 deletions
125
Kconfig
125
Kconfig
|
@ -127,7 +127,7 @@ config TOOLS_DEBUG
|
||||||
it is possible to set breakpoints on particular lines, single-step
|
it is possible to set breakpoints on particular lines, single-step
|
||||||
debug through the source code, etc.
|
debug through the source code, etc.
|
||||||
|
|
||||||
endif
|
endif # EXPERT
|
||||||
|
|
||||||
config PHYS_64BIT
|
config PHYS_64BIT
|
||||||
bool "64bit physical address support"
|
bool "64bit physical address support"
|
||||||
|
@ -143,35 +143,26 @@ menu "Boot images"
|
||||||
config FIT
|
config FIT
|
||||||
bool "Support Flattened Image Tree"
|
bool "Support Flattened Image Tree"
|
||||||
help
|
help
|
||||||
This option allows to boot the new uImage structrure,
|
This option allows you to boot the new uImage structure,
|
||||||
Flattened Image Tree. FIT is formally a FDT, which can include
|
Flattened Image Tree. FIT is formally a FDT, which can include
|
||||||
images of various types (kernel, FDT blob, ramdisk, etc.)
|
images of various types (kernel, FDT blob, ramdisk, etc.)
|
||||||
in a single blob. To boot this new uImage structure,
|
in a single blob. To boot this new uImage structure,
|
||||||
pass the address of the blob to the "bootm" command.
|
pass the address of the blob to the "bootm" command.
|
||||||
FIT is very flexible, supporting compression, multiple images,
|
FIT is very flexible, supporting compression, multiple images,
|
||||||
multiple configurations, verification through hashing and also
|
multiple configurations, verification through hashing and also
|
||||||
verified boot (secure boot using RSA). This option enables that
|
verified boot (secure boot using RSA).
|
||||||
feature.
|
|
||||||
|
|
||||||
config SPL_FIT
|
if FIT
|
||||||
bool "Support Flattened Image Tree within SPL"
|
|
||||||
depends on FIT
|
|
||||||
depends on SPL
|
|
||||||
|
|
||||||
config FIT_VERBOSE
|
|
||||||
bool "Display verbose messages on FIT boot"
|
|
||||||
depends on FIT
|
|
||||||
|
|
||||||
config FIT_SIGNATURE
|
config FIT_SIGNATURE
|
||||||
bool "Enable signature verification of FIT uImages"
|
bool "Enable signature verification of FIT uImages"
|
||||||
depends on FIT
|
|
||||||
depends on DM
|
depends on DM
|
||||||
select RSA
|
select RSA
|
||||||
help
|
help
|
||||||
This option enables signature verification of FIT uImages,
|
This option enables signature verification of FIT uImages,
|
||||||
using a hash signed and verified using RSA. If
|
using a hash signed and verified using RSA. If
|
||||||
CONFIG_SHA_PROG_HW_ACCEL is defined, i.e support for progressive
|
CONFIG_SHA_PROG_HW_ACCEL is defined, i.e support for progressive
|
||||||
hashing is available using hardware, then then RSA library will use
|
hashing is available using hardware, then the RSA library will use
|
||||||
it. See doc/uImage.FIT/signature.txt for more details.
|
it. See doc/uImage.FIT/signature.txt for more details.
|
||||||
|
|
||||||
WARNING: When relying on signed FIT images with a required signature
|
WARNING: When relying on signed FIT images with a required signature
|
||||||
|
@ -180,15 +171,16 @@ config FIT_SIGNATURE
|
||||||
format support in this case, enable it using
|
format support in this case, enable it using
|
||||||
CONFIG_IMAGE_FORMAT_LEGACY.
|
CONFIG_IMAGE_FORMAT_LEGACY.
|
||||||
|
|
||||||
config SPL_FIT_SIGNATURE
|
config FIT_VERBOSE
|
||||||
bool "Enable signature verification of FIT firmware within SPL"
|
bool "Show verbose messages when FIT images fail"
|
||||||
depends on SPL_FIT
|
help
|
||||||
depends on SPL_DM
|
Generally a system will have valid FIT images so debug messages
|
||||||
select SPL_RSA
|
are a waste of code space. If you are debugging your images then
|
||||||
|
you can enable this option to get more verbose information about
|
||||||
|
failures.
|
||||||
|
|
||||||
config FIT_BEST_MATCH
|
config FIT_BEST_MATCH
|
||||||
bool "Select the best match for the kernel device tree"
|
bool "Select the best match for the kernel device tree"
|
||||||
depends on FIT
|
|
||||||
help
|
help
|
||||||
When no configuration is explicitly selected, default to the
|
When no configuration is explicitly selected, default to the
|
||||||
one whose fdt's compatibility field best matches that of
|
one whose fdt's compatibility field best matches that of
|
||||||
|
@ -196,14 +188,55 @@ config FIT_BEST_MATCH
|
||||||
most specific compatibility entry of U-Boot's fdt's root node.
|
most specific compatibility entry of U-Boot's fdt's root node.
|
||||||
The order of entries in the configuration's fdt is ignored.
|
The order of entries in the configuration's fdt is ignored.
|
||||||
|
|
||||||
config FIT_VERBOSE
|
config FIT_IMAGE_POST_PROCESS
|
||||||
bool "Show verbose messages when FIT images fails"
|
bool "Enable post-processing of FIT artifacts after loading by U-Boot"
|
||||||
depends on FIT
|
depends on TI_SECURE_DEVICE
|
||||||
help
|
help
|
||||||
Generally a system will have valid FIT images so debug messages
|
Allows doing any sort of manipulation to blobs after they got extracted
|
||||||
are a waste of code space. If you are debugging your images then
|
from FIT images like stripping off headers or modifying the size of the
|
||||||
you can enable this option to get more verbose information about
|
blob, verification, authentication, decryption etc. in a platform or
|
||||||
failures.
|
board specific way. In order to use this feature a platform or board-
|
||||||
|
specific implementation of board_fit_image_post_process() must be
|
||||||
|
provided. Also, anything done during this post-processing step would
|
||||||
|
need to be comprehended in how the images were prepared before being
|
||||||
|
injected into the FIT creation (i.e. the blobs would have been pre-
|
||||||
|
processed before being added to the FIT image).
|
||||||
|
|
||||||
|
config SPL_FIT
|
||||||
|
bool "Support Flattened Image Tree within SPL"
|
||||||
|
depends on SPL
|
||||||
|
|
||||||
|
config SPL_FIT_SIGNATURE
|
||||||
|
bool "Enable signature verification of FIT firmware within SPL"
|
||||||
|
depends on SPL_FIT
|
||||||
|
depends on SPL_DM
|
||||||
|
select SPL_RSA
|
||||||
|
|
||||||
|
config SPL_LOAD_FIT
|
||||||
|
bool "Enable SPL loading U-Boot as a FIT"
|
||||||
|
help
|
||||||
|
Normally with the SPL framework a legacy image is generated as part
|
||||||
|
of the build. This contains U-Boot along with information as to
|
||||||
|
where it should be loaded. This option instead enables generation
|
||||||
|
of a FIT (Flat Image Tree) which provides more flexibility. In
|
||||||
|
particular it can handle selecting from multiple device tree
|
||||||
|
and passing the correct one to U-Boot.
|
||||||
|
|
||||||
|
config SPL_FIT_IMAGE_POST_PROCESS
|
||||||
|
bool "Enable post-processing of FIT artifacts after loading by the SPL"
|
||||||
|
depends on SPL_LOAD_FIT && TI_SECURE_DEVICE
|
||||||
|
help
|
||||||
|
Allows doing any sort of manipulation to blobs after they got extracted
|
||||||
|
from the U-Boot FIT image like stripping off headers or modifying the
|
||||||
|
size of the blob, verification, authentication, decryption etc. in a
|
||||||
|
platform or board specific way. In order to use this feature a platform
|
||||||
|
or board-specific implementation of board_fit_image_post_process() must
|
||||||
|
be provided. Also, anything done during this post-processing step would
|
||||||
|
need to be comprehended in how the images were prepared before being
|
||||||
|
injected into the FIT creation (i.e. the blobs would have been pre-
|
||||||
|
processed before being added to the FIT image).
|
||||||
|
|
||||||
|
endif # FIT
|
||||||
|
|
||||||
config OF_BOARD_SETUP
|
config OF_BOARD_SETUP
|
||||||
bool "Set up board-specific details in device tree before boot"
|
bool "Set up board-specific details in device tree before boot"
|
||||||
|
@ -256,44 +289,6 @@ config SYS_TEXT_BASE
|
||||||
help
|
help
|
||||||
TODO: Move CONFIG_SYS_TEXT_BASE for all the architecture
|
TODO: Move CONFIG_SYS_TEXT_BASE for all the architecture
|
||||||
|
|
||||||
config SPL_LOAD_FIT
|
|
||||||
bool "Enable SPL loading U-Boot as a FIT"
|
|
||||||
depends on FIT
|
|
||||||
help
|
|
||||||
Normally with the SPL framework a legacy image is generated as part
|
|
||||||
of the build. This contains U-Boot along with information as to
|
|
||||||
where it should be loaded. This option instead enables generation
|
|
||||||
of a FIT (Flat Image Tree) which provides more flexibility. In
|
|
||||||
particular it can handle selecting from multiple device tree
|
|
||||||
and passing the correct one to U-Boot.
|
|
||||||
|
|
||||||
config SPL_FIT_IMAGE_POST_PROCESS
|
|
||||||
bool "Enable post-processing of FIT artifacts after loading by the SPL"
|
|
||||||
depends on SPL_LOAD_FIT && TI_SECURE_DEVICE
|
|
||||||
help
|
|
||||||
Allows doing any sort of manipulation to blobs after they got extracted
|
|
||||||
from the U-Boot FIT image like stripping off headers or modifying the
|
|
||||||
size of the blob, verification, authentication, decryption etc. in a
|
|
||||||
platform or board specific way. In order to use this feature a platform
|
|
||||||
or board-specific implementation of board_fit_image_post_process() must
|
|
||||||
be provided. Also, anything done during this post-processing step would
|
|
||||||
need to be comprehended in how the images were prepared before being
|
|
||||||
injected into the FIT creation (i.e. the blobs would have been pre-
|
|
||||||
processed before being added to the FIT image).
|
|
||||||
|
|
||||||
config FIT_IMAGE_POST_PROCESS
|
|
||||||
bool "Enable post-processing of FIT artifacts after loading by U-Boot"
|
|
||||||
depends on FIT && TI_SECURE_DEVICE
|
|
||||||
help
|
|
||||||
Allows doing any sort of manipulation to blobs after they got extracted
|
|
||||||
from FIT images like stripping off headers or modifying the size of the
|
|
||||||
blob, verification, authentication, decryption etc. in a platform or
|
|
||||||
board specific way. In order to use this feature a platform or board-
|
|
||||||
specific implementation of board_fit_image_post_process() must be
|
|
||||||
provided. Also, anything done during this post-processing step would
|
|
||||||
need to be comprehended in how the images were prepared before being
|
|
||||||
injected into the FIT creation (i.e. the blobs would have been pre-
|
|
||||||
processed before being added to the FIT image).
|
|
||||||
|
|
||||||
config SYS_CLK_FREQ
|
config SYS_CLK_FREQ
|
||||||
depends on ARC || ARCH_SUNXI
|
depends on ARC || ARCH_SUNXI
|
||||||
|
|
Loading…
Reference in a new issue