Skip to content

Commit a0fe8ce

Browse files
michalsimekxypron
authored andcommitted
efi_loader: Cleanup UEFI Variables menu selection
There are 3 options listed between choice/endchoice FILE/TEE/NO_STORE. There is no reason to add other config with dependencies between choice/endchoice because they can never be selected because they depends on only that 3 options which can be selected. That's why move additional configuration with dependency below choice section. Signed-off-by: Michal Simek <[email protected]>
1 parent c9aad6d commit a0fe8ce

1 file changed

Lines changed: 25 additions & 25 deletions

File tree

lib/efi_loader/Kconfig

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -123,22 +123,6 @@ config EFI_VARIABLE_FILE_STORE
123123
Select this option if you want non-volatile UEFI variables to be
124124
stored as file /ubootefi.var on the EFI system partition.
125125

126-
config EFI_RT_VOLATILE_STORE
127-
bool "Allow variable runtime services in volatile storage (e.g RAM)"
128-
depends on EFI_VARIABLE_FILE_STORE
129-
help
130-
When EFI variables are stored on file we don't allow SetVariableRT,
131-
since the OS doesn't know how to write that file. At the same time
132-
we copy runtime variables in DRAM and support GetVariableRT
133-
134-
Enable this option to allow SetVariableRT on the RAM backend of
135-
the EFI variable storage. The OS will be responsible for syncing
136-
the RAM contents to the file, otherwise any changes made during
137-
runtime won't persist reboots.
138-
Authenticated variables are not supported. Note that this will
139-
violate the EFI spec since writing auth variables will return
140-
EFI_INVALID_PARAMETER
141-
142126
config EFI_MM_COMM_TEE
143127
bool "UEFI variables storage service via the trusted world"
144128
depends on OPTEE
@@ -157,6 +141,31 @@ config EFI_MM_COMM_TEE
157141
MM buffer. The data is copied by u-boot to the shared buffer before issuing
158142
the door bell event.
159143

144+
config EFI_VARIABLE_NO_STORE
145+
bool "Don't persist non-volatile UEFI variables"
146+
help
147+
If you choose this option, non-volatile variables cannot be persisted.
148+
You could still provide non-volatile variables via
149+
EFI_VARIABLES_PRESEED.
150+
151+
endchoice
152+
153+
config EFI_RT_VOLATILE_STORE
154+
bool "Allow variable runtime services in volatile storage (e.g RAM)"
155+
depends on EFI_VARIABLE_FILE_STORE
156+
help
157+
When EFI variables are stored on file we don't allow SetVariableRT,
158+
since the OS doesn't know how to write that file. At the same time
159+
we copy runtime variables in DRAM and support GetVariableRT
160+
161+
Enable this option to allow SetVariableRT on the RAM backend of
162+
the EFI variable storage. The OS will be responsible for syncing
163+
the RAM contents to the file, otherwise any changes made during
164+
runtime won't persist reboots.
165+
Authenticated variables are not supported. Note that this will
166+
violate the EFI spec since writing auth variables will return
167+
EFI_INVALID_PARAMETER
168+
160169
config FFA_SHARED_MM_BUF_SIZE
161170
int "Memory size of the shared MM communication buffer"
162171
depends on EFI_MM_COMM_TEE && ARM_FFA_TRANSPORT
@@ -184,15 +193,6 @@ config FFA_SHARED_MM_BUF_ADDR
184193
the MM SP in secure world.
185194
It is assumed that the MM SP knows the address of the shared MM communication buffer.
186195

187-
config EFI_VARIABLE_NO_STORE
188-
bool "Don't persist non-volatile UEFI variables"
189-
help
190-
If you choose this option, non-volatile variables cannot be persisted.
191-
You could still provide non-volatile variables via
192-
EFI_VARIABLES_PRESEED.
193-
194-
endchoice
195-
196196
config EFI_VARIABLES_PRESEED
197197
bool "Initial values for UEFI variables"
198198
depends on !COMPILE_TEST

0 commit comments

Comments
 (0)