diff options
author | erictian <erictian@6f19259b-4bc3-4df7-8a09-765794883524> | 2010-03-18 08:57:05 +0000 |
---|---|---|
committer | erictian <erictian@6f19259b-4bc3-4df7-8a09-765794883524> | 2010-03-18 08:57:05 +0000 |
commit | ff19726366cd5d5d922c7b1d304327e1600d04c5 (patch) | |
tree | bddc70d7d32eec8fad0c3a34d539bcb8973f152d /DuetPkg/FSVariable | |
parent | 2ae0d1205f97037bb2ac5228ddbe7256048d14cb (diff) | |
download | edk2-platforms-ff19726366cd5d5d922c7b1d304327e1600d04c5.tar.xz |
variable driver doesn't support EFI_AUTHENTICATED_WRITE_ACCESS. we use:
1. EFI_INVALID_PARAMETER as a return value of SetVariable() to indicate it does not support this feature.
2. EFI_NOT_FOUND will be a return value of QueryVariableInfo() to indicate it does not support this feature.
git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@10280 6f19259b-4bc3-4df7-8a09-765794883524
Diffstat (limited to 'DuetPkg/FSVariable')
-rw-r--r-- | DuetPkg/FSVariable/FSVariable.c | 15 |
1 files changed, 13 insertions, 2 deletions
diff --git a/DuetPkg/FSVariable/FSVariable.c b/DuetPkg/FSVariable/FSVariable.c index 2298e4e474..dab8c8913c 100644 --- a/DuetPkg/FSVariable/FSVariable.c +++ b/DuetPkg/FSVariable/FSVariable.c @@ -1293,6 +1293,13 @@ Returns: }
//
+ // Not support authenticated variable write yet.
+ //
+ if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {
+ return EFI_INVALID_PARAMETER;
+ }
+
+ //
// Make sure if runtime bit is set, boot service bit is set also
//
if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
@@ -1390,8 +1397,7 @@ Returns: // Make sure the Attributes combination is supported by the platform.
//
return EFI_UNSUPPORTED;
- }
- else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
+ } else if ((Attributes & (EFI_VARIABLE_RUNTIME_ACCESS | EFI_VARIABLE_BOOTSERVICE_ACCESS)) == EFI_VARIABLE_RUNTIME_ACCESS) {
//
// Make sure if runtime bit is set, boot service bit is set also.
//
@@ -1406,6 +1412,11 @@ Returns: // Make sure Hw Attribute is set with NV.
//
return EFI_INVALID_PARAMETER;
+ } else if ((Attributes & EFI_VARIABLE_AUTHENTICATED_WRITE_ACCESS) != 0) {
+ //
+ // Not support authentiated variable write yet.
+ //
+ return EFI_UNSUPPORTED;
}
VariableStoreHeader = (VARIABLE_STORE_HEADER *) mGlobal->VariableBase[
|