summaryrefslogtreecommitdiff
path: root/MdePkg
diff options
context:
space:
mode:
authorYao, Jiewen <jiewen.yao@intel.com>2016-01-19 13:17:10 +0000
committerjyao1 <jyao1@Edk2>2016-01-19 13:17:10 +0000
commit31a9d3b419accbbc5463c71221b3b30a46f9ee73 (patch)
treedbe8d895ea8e6fbaec2c01b4228410ae66d7037d /MdePkg
parent4cb7bade0abdbbd4658ee2343c82ae050018e635 (diff)
downloadedk2-31a9d3b419accbbc5463c71221b3b30a46f9ee73.zip
edk2-31a9d3b419accbbc5463c71221b3b30a46f9ee73.tar.gz
edk2-31a9d3b419accbbc5463c71221b3b30a46f9ee73.tar.bz2
MdePkg: Update MorLock comment to latest doc.
Microsoft updated secure MOR lock document with version 2. So we update comment here. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: "Yao, Jiewen" <jiewen.yao@intel.com> Reviewed: "Zhang, Chao B" <chao.b.zhang@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@19687 6f19259b-4bc3-4df7-8a09-765794883524
Diffstat (limited to 'MdePkg')
-rw-r--r--MdePkg/Include/IndustryStandard/MemoryOverwriteRequestControlLock.h16
1 files changed, 8 insertions, 8 deletions
diff --git a/MdePkg/Include/IndustryStandard/MemoryOverwriteRequestControlLock.h b/MdePkg/Include/IndustryStandard/MemoryOverwriteRequestControlLock.h
index 771306b..8a34731 100644
--- a/MdePkg/Include/IndustryStandard/MemoryOverwriteRequestControlLock.h
+++ b/MdePkg/Include/IndustryStandard/MemoryOverwriteRequestControlLock.h
@@ -3,7 +3,7 @@
Microsoft Secure MOR implementation.
https://msdn.microsoft.com/en-us/library/windows/hardware/mt270973(v=vs.85).aspx
- Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
+ Copyright (c) 2015 - 2016, Intel Corporation. All rights reserved.<BR>
This program and the accompanying materials
are licensed and made available under the terms and conditions of the BSD License
which accompanies this distribution. The full text of the license may be found at
@@ -28,14 +28,14 @@
// VendorGuid: {BB983CCF-151D-40E1-A07B-4A17BE168292}
// Name: MemoryOverwriteRequestControlLock
// Attributes: NV+BS+RT
-// Size: 0x1 byte
+// GetVariable value in Data parameter: 0x0 (unlocked); 0x1 (locked without key); 0x2 (locked with key)
+// SetVariable value in Data parameter: 0x0 (unlocked); 0x1 (locked);
+// Revision 2 additionally accepts an 8-byte value that represents a shared secret key.
//
-// The BIOS initializes MemoryOverwriteRequestControlLock to a value of 0x00
-// before BDS (BOOT#### processing). When the OS loader calls SetVariable by
-// specifying 0x01, the access mode for both MemoryOverwriteRequestControlLock
-// and MemoryOverwriteRequestControl is changed to read-only. If any other
-// value is specified in the SetVariable call, it fails with the
-// EFI_INVALID_PARAMETER error code.
+
+//
+// Note: Setting MemoryOverwriteRequestControlLock does not commit to flash (just changes the internal lock state).
+// Getting the variable returns the internal state and never exposes the key.
//
extern EFI_GUID gEfiMemoryOverwriteRequestControlLockGuid;