efi_loader: configuration of variables store
The file based and the OP-TEE based UEFI variable store are mutually exclusive. Define them as choice options in Kconfig. Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
This commit is contained in:
		
							parent
							
								
									677da1c089
								
							
						
					
					
						commit
						be66b89da3
					
				|  | @ -27,13 +27,28 @@ config EFI_LOADER | ||||||
| 
 | 
 | ||||||
| if EFI_LOADER | if EFI_LOADER | ||||||
| 
 | 
 | ||||||
|  | choice | ||||||
|  | 	prompt "Store for non-volatile UEFI variables" | ||||||
|  | 	default EFI_VARIABLE_FILE_STORE | ||||||
|  | 	help | ||||||
|  | 	  Select where non-volatile UEFI variables shall be stored. | ||||||
|  | 
 | ||||||
| config EFI_VARIABLE_FILE_STORE | config EFI_VARIABLE_FILE_STORE | ||||||
| 	bool "Store non-volatile UEFI variables as file" | 	bool "Store non-volatile UEFI variables as file" | ||||||
| 	depends on FAT_WRITE | 	depends on FAT_WRITE | ||||||
| 	default y |  | ||||||
| 	help | 	help | ||||||
| 	  Select tis option if you want non-volatile UEFI variables to be stored | 	  Select this option if you want non-volatile UEFI variables to be | ||||||
| 	  as file /ubootefi.var on the EFI system partition. | 	  stored as file /ubootefi.var on the EFI system partition. | ||||||
|  | 
 | ||||||
|  | config EFI_MM_COMM_TEE | ||||||
|  | 	bool "UEFI variables storage service via OP-TEE" | ||||||
|  | 	depends on OPTEE | ||||||
|  | 	help | ||||||
|  | 	  If OP-TEE is present and running StandAloneMM, dispatch all UEFI | ||||||
|  | 	  variable related operations to that. The application will verify, | ||||||
|  | 	  authenticate and store the variables on an RPMB. | ||||||
|  | 
 | ||||||
|  | endchoice | ||||||
| 
 | 
 | ||||||
| config EFI_GET_TIME | config EFI_GET_TIME | ||||||
| 	bool "GetTime() runtime service" | 	bool "GetTime() runtime service" | ||||||
|  | @ -174,13 +189,4 @@ config EFI_SECURE_BOOT | ||||||
| 	  it is signed with a trusted key. To do that, you need to install, | 	  it is signed with a trusted key. To do that, you need to install, | ||||||
| 	  at least, PK, KEK and db. | 	  at least, PK, KEK and db. | ||||||
| 
 | 
 | ||||||
| config EFI_MM_COMM_TEE |  | ||||||
| 	bool "UEFI variables storage service via OP-TEE" |  | ||||||
| 	depends on OPTEE |  | ||||||
| 	default n |  | ||||||
| 	help |  | ||||||
| 	  If OP-TEE is present and running StandAloneMM, dispatch all UEFI variable |  | ||||||
| 	  related operations to that. The application will verify, authenticate and |  | ||||||
| 	  store the variables on an RPMB. |  | ||||||
| 
 |  | ||||||
| endif | endif | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue