From nobody Mon Feb 9 00:50:09 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+93177+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93177+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1662438988; cv=none; d=zohomail.com; s=zohoarc; b=hCJ3kiR6Q71ZfqYSRqqEIWBnx4R9OlNtBBziAlp8UBxC32FRGNmIIPdH+Onxl2ks5bd7LJyGkO5psOj/UkD/ZeEr46jwa0O4ANFYg0IYa7LNBq0jg+JJzulvMeCQW5rG0IMM/JtFnqGEhWrtIUZnmze3t4lsebQByosd+Rj4hYM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1662438988; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=yT4F/o8xloNwhMRcUcwIx7Nej2zoswY3JHFQf5y1yKc=; b=PcRJCNhj6+quUtKOK+e4YgVksk4h8CYCD3VhpJHYvUGavx1/lYhvwul6ObhFTCI/4DA8w10HeS8J4dI7yoR8m0jkhnHs8B676hzl2zXa1uW7a1l8MWUM1jRKfIx85CZcUnd2vIWZ2mJqx0AJzFo1vMy9nFfD7EF60ICEfXPQzPc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93177+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1662438988249704.4559992011312; Mon, 5 Sep 2022 21:36:28 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id isUVYY1788612xaIKme9wbYu; Mon, 05 Sep 2022 21:36:27 -0700 X-Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by mx.groups.io with SMTP id smtpd.web12.303.1662438976985344787 for ; Mon, 05 Sep 2022 21:36:27 -0700 X-IronPort-AV: E=McAfee;i="6500,9779,10461"; a="296502117" X-IronPort-AV: E=Sophos;i="5.93,293,1654585200"; d="scan'208";a="296502117" X-Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Sep 2022 21:36:26 -0700 X-IronPort-AV: E=Sophos;i="5.93,293,1654585200"; d="scan'208";a="675517336" X-Received: from mxu9-mobl1.ccr.corp.intel.com ([10.238.4.118]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Sep 2022 21:36:25 -0700 From: "Min Xu" To: devel@edk2.groups.io Cc: Min M Xu , Erdem Aktas , James Bottomley , Jiewen Yao , Tom Lendacky , Gerd Hoffmann Subject: [edk2-devel] [PATCH V5 6/8] OvmfPkg/NvVarsFileLib: Shortcut ConnectNvVarsToFileSystem in secure-boot Date: Tue, 6 Sep 2022 12:35:58 +0800 Message-Id: In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,min.m.xu@intel.com X-Gm-Message-State: Hb8Bw7r0Ct2wGsie62f6Xzotx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1662438987; bh=CdqddfDUIl/ZXxu4+k/+2hYNjEGdK4Wp5wxUvhHX3cs=; h=Cc:Date:From:Reply-To:Subject:To; b=EfV/+v1gj3u0Wso9Un32zjfCUlDtG+B6HJqxf3CQ1rKD8tmUu4XMc4ijtRicPLKqgrz NLjdc+jgJMvBGJBxqNCVa69ooTgnTFNkRhHJFdTjM9VX7aj6UJrmNrzbAZe4mBY5myqyc HwkwuxzEeKSWj6fYBBykjvQQbH7JdDPAerA= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1662438989832100027 Content-Type: text/plain; charset="utf-8" From: Min M Xu OvmfPkg/Library/NvVarsFileLib allows loading variables into emulated varstore from a on-disk NvVars file. We can't allow that when secure boot is active. So check secure-boot feature and shortcut the ConnectNvVarsToFileSystem() function when sb is enabled. Cc: Erdem Aktas Cc: James Bottomley Cc: Jiewen Yao Cc: Tom Lendacky Cc: Gerd Hoffmann Suggested-by: Gerd Hoffmann Acked-by: Gerd Hoffmann Signed-off-by: Min Xu --- OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c b/OvmfPkg/Librar= y/NvVarsFileLib/NvVarsFileLib.c index 21b71524ea48..72289da35819 100644 --- a/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c +++ b/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c @@ -28,6 +28,12 @@ ConnectNvVarsToFileSystem ( IN EFI_HANDLE FsHandle ) { + #ifdef SECURE_BOOT_FEATURE_ENABLED + + return EFI_UNSUPPORTED; + + #else + EFI_STATUS Status; =20 // @@ -46,6 +52,7 @@ ConnectNvVarsToFileSystem ( } =20 return Status; + #endif } =20 /** --=20 2.29.2.windows.2 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#93177): https://edk2.groups.io/g/devel/message/93177 Mute This Topic: https://groups.io/mt/93494909/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-