From ff19726366cd5d5d922c7b1d304327e1600d04c5 Mon Sep 17 00:00:00 2001 From: erictian Date: Thu, 18 Mar 2010 08:57:05 +0000 Subject: variable driver doesn't support EFI_AUTHENTICATED_WRITE_ACCESS. we use: 1. EFI_INVALID_PARAMETER as a return value of SetVariable() to indicate it does not support this feature. 2. EFI_NOT_FOUND will be a return value of QueryVariableInfo() to indicate it does not support this feature. git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@10280 6f19259b-4bc3-4df7-8a09-765794883524 --- DuetPkg/FSVariable/FSVariable.c | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-) (limited to 'DuetPkg') diff --git a/DuetPkg/FSVariable/FSVariable.c b/DuetPkg/FSVariable/FSVariable.c index 2298e4e474..dab8c8913c 100644 --- a/DuetPkg/FSVariable/FSVariable.c +++ b/DuetPkg/FSVariable/FSVariable.c @@ -1292,6 +1292,13 @@ Returns: return EFI_INVALID_PARAMETER; } + // + // Not support authenticated variable write yet. + // + if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) { + return EFI_INVALID_PARAMETER; + } + // // Make sure if runtime bit is set, boot service bit is set also // @@ -1390,8 +1397,7 @@ Returns: // Make sure the Attributes combination is supported by the platform. // return EFI_UNSUPPORTED; - } - else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) { + } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) { // // Make sure if runtime bit is set, boot service bit is set also. // @@ -1406,6 +1412,11 @@ Returns: // Make sure Hw Attribute is set with NV. // return EFI_INVALID_PARAMETER; + } else if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) { + // + // Not support authentiated variable write yet. + // + return EFI_UNSUPPORTED; } VariableStoreHeader = (VARIABLE_STORE_HEADER *) mGlobal->VariableBase[ -- cgit v1.2.3