@@ -123,22 +123,6 @@ config EFI_VARIABLE_FILE_STORE
123123 Select this option if you want non-volatile UEFI variables to be
124124 stored as file /ubootefi.var on the EFI system partition.
125125
126- config EFI_RT_VOLATILE_STORE
127- bool "Allow variable runtime services in volatile storage (e.g RAM)"
128- depends on EFI_VARIABLE_FILE_STORE
129- help
130- When EFI variables are stored on file we don't allow SetVariableRT,
131- since the OS doesn't know how to write that file. At the same time
132- we copy runtime variables in DRAM and support GetVariableRT
133-
134- Enable this option to allow SetVariableRT on the RAM backend of
135- the EFI variable storage. The OS will be responsible for syncing
136- the RAM contents to the file, otherwise any changes made during
137- runtime won't persist reboots.
138- Authenticated variables are not supported. Note that this will
139- violate the EFI spec since writing auth variables will return
140- EFI_INVALID_PARAMETER
141-
142126config EFI_MM_COMM_TEE
143127 bool "UEFI variables storage service via the trusted world"
144128 depends on OPTEE
@@ -157,6 +141,31 @@ config EFI_MM_COMM_TEE
157141 MM buffer. The data is copied by u-boot to the shared buffer before issuing
158142 the door bell event.
159143
144+ config EFI_VARIABLE_NO_STORE
145+ bool "Don't persist non-volatile UEFI variables"
146+ help
147+ If you choose this option, non-volatile variables cannot be persisted.
148+ You could still provide non-volatile variables via
149+ EFI_VARIABLES_PRESEED.
150+
151+ endchoice
152+
153+ config EFI_RT_VOLATILE_STORE
154+ bool "Allow variable runtime services in volatile storage (e.g RAM)"
155+ depends on EFI_VARIABLE_FILE_STORE
156+ help
157+ When EFI variables are stored on file we don't allow SetVariableRT,
158+ since the OS doesn't know how to write that file. At the same time
159+ we copy runtime variables in DRAM and support GetVariableRT
160+
161+ Enable this option to allow SetVariableRT on the RAM backend of
162+ the EFI variable storage. The OS will be responsible for syncing
163+ the RAM contents to the file, otherwise any changes made during
164+ runtime won't persist reboots.
165+ Authenticated variables are not supported. Note that this will
166+ violate the EFI spec since writing auth variables will return
167+ EFI_INVALID_PARAMETER
168+
160169config FFA_SHARED_MM_BUF_SIZE
161170 int "Memory size of the shared MM communication buffer"
162171 depends on EFI_MM_COMM_TEE && ARM_FFA_TRANSPORT
@@ -184,15 +193,6 @@ config FFA_SHARED_MM_BUF_ADDR
184193 the MM SP in secure world.
185194 It is assumed that the MM SP knows the address of the shared MM communication buffer.
186195
187- config EFI_VARIABLE_NO_STORE
188- bool "Don't persist non-volatile UEFI variables"
189- help
190- If you choose this option, non-volatile variables cannot be persisted.
191- You could still provide non-volatile variables via
192- EFI_VARIABLES_PRESEED.
193-
194- endchoice
195-
196196config EFI_VARIABLES_PRESEED
197197 bool "Initial values for UEFI variables"
198198 depends on !COMPILE_TEST
0 commit comments