Skip to content

Commit 74e9db2

Browse files
jsetjevathpela
authored andcommitted
SbatLevel_Variable.txt: clarify where and how revocation data is tracked
Comments to clarify that revocations should only be recorded in SbatLevel_Variable.txt and not in any other header files. Signed-off-by: Jan Setje-Eilers <Jan.SetjeEilers@oracle.com>
1 parent 257d49a commit 74e9db2

File tree

1 file changed

+12
-3
lines changed

1 file changed

+12
-3
lines changed

SbatLevel_Variable.txt

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,15 @@
1-
In order to apply SBAT based revocations on systems that will never
2-
run shim, code running in boot services context needs to set the
3-
following variable:
1+
This file is the single source for SbatLevel revocations the format
2+
follows the variable payload and should not have any leading or
3+
trailing whitespace on the same line.
4+
5+
Short descriptions of the revocations as well as CVE assignments (when
6+
available) should be provided when an entry is added.
7+
8+
On systems that run shim, shim will manage these revocations. Sytems
9+
that never run shim, primarily Windows, but this applies to any OS
10+
that supports UEFI Secure Boot under the UEFI CA without shim can
11+
apply SBAT based revocations by setting the following variable
12+
from code running in boot services context.
413

514
Name: SbatLevel
615
Attributes: (EFI_VARIABLE_NON_VOLATILE | EFI_VARIABLE_BOOTSERVICE_ACCESS)

0 commit comments

Comments
 (0)