In case PcdBootRestrictToFirmware is set disable
loading EFI variables from NvVars file.

Signed-off-by: Gerd Hoffmann <kra...@redhat.com>
---
 OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.inf | 1 +
 OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c   | 3 ++-
 2 files changed, 3 insertions(+), 1 deletion(-)

diff --git a/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.inf 
b/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.inf
index f152c5504661..9ae40ffe4373 100644
--- a/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.inf
+++ b/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.inf
@@ -49,6 +49,7 @@ [Protocols]
 
 [Pcd]
   gUefiOvmfPkgTokenSpaceGuid.PcdSecureBootSupported
+  gUefiOvmfPkgTokenSpaceGuid.PcdBootRestrictToFirmware
 
 [Guids]
   gEfiFileInfoGuid
diff --git a/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c 
b/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c
index d4139b911528..8fc54e58a789 100644
--- a/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c
+++ b/OvmfPkg/Library/NvVarsFileLib/NvVarsFileLib.c
@@ -30,7 +30,8 @@ ConnectNvVarsToFileSystem (
 {
   EFI_STATUS  Status;
 
-  if (FeaturePcdGet (PcdSecureBootSupported)) {
+  if (FeaturePcdGet (PcdSecureBootSupported) ||
+      FeaturePcdGet (PcdBootRestrictToFirmware)) {
     return EFI_UNSUPPORTED;
   }
 
-- 
2.40.1



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#104098): https://edk2.groups.io/g/devel/message/104098
Mute This Topic: https://groups.io/mt/98699874/21656
Group Owner: devel+ow...@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-


Reply via email to