From: Jagadeesh Ujja <jagadeesh.ujja@arm.com>
To: edk2-devel@lists.01.org
Subject: [RFC PATCH 0/9] Extend secure variable service to be usable from Standalone MM
Date: Wed, 31 Oct 2018 16:39:38 +0530 [thread overview]
Message-ID: <20181031110947.6305-1-jagadeesh.ujja@arm.com> (raw)
This RFC patch series extends the existing secure variable service support
for use with Standalone MM. This is applicable to paltforms that use
Standalone Management Mode to protect access to non-volatile memory (NOR
flash in case of these patches) used to store the secure EFI variables.
The first patch pulls in additional libraries from the staging branch of
StandaloneMmPkg into the edk2's StandaloneMmPkg. The existing secure
variable service implementation supports only the traditional MM mode
and so the rest of the patches extends the existing secure variable
service support to be useable with Standalone MM mode as well.
This patch series is being posted as an RFC to get feedback on the
approach taken in these patches.
Jagadeesh Ujja (9):
StandaloneMmPkg: Pull in additonal libraries from staging branch
ArmPlatformPkg/NorFlashDxe: allow reusability as a MM driver
MdeModulePkg/FaultTolerantWriteDxe: allow reusability as a MM driver
MdeModulePkg/Variable/RuntimeDxe: adapt for usability with MM Standalone
MdeModulePkg/Variable/RuntimeDxe: adapt as a MM Standalone driver
CryptoPkg/BaseCryptLib: Hack to get time in MM Standalone mode
SecurityPkg/AuthVariableLib:allow reusability as MM_STANDALONE
MdeModulePkg VarCheckLib: allow reusability as MM_STANDALONE
CryptoPkg/BaseCryptLib: allow MM_STANDALONE drivers to use this library
.../Drivers/NorFlashDxe/NorFlashBlockIoDxe.c | 5 +-
ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashDxe.c | 116 ++-
ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashDxe.h | 15 +-
.../Drivers/NorFlashDxe/NorFlashFvbDxe.c | 26 +-
.../Drivers/NorFlashDxe/NorFlashMmStandalone.inf | 76 ++
.../BaseCryptLib/BaseCryptLibMmStandalone.inf | 106 +++
.../Library/BaseCryptLib/SysCall/TimerWrapper.c | 19 +-
MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf | 5 +-
.../FaultTolerantWriteMmStandalone.inf | 100 +++
.../FaultTolerantWriteDxe/FaultTolerantWriteSmm.c | 72 +-
.../FaultTolerantWriteDxe/UpdateWorkingBlock.c | 8 +-
.../Universal/Variable/RuntimeDxe/Variable.c | 16 +-
.../Universal/Variable/RuntimeDxe/Variable.h | 8 +
.../Variable/RuntimeDxe/VariableMmStandalone.inf | 134 ++++
.../Universal/Variable/RuntimeDxe/VariableSmm.c | 73 +-
.../Variable/RuntimeDxe/VariableSmmRuntimeDxe.c | 20 +-
.../Library/AuthVariableLib/AuthVariableLib.inf | 5 +-
.../StandaloneMmCoreHobLib.inf | 2 +-
.../AArch64/StandaloneMmCoreHobLibInternal.c | 64 ++
.../StandaloneMmHobLib/StandaloneMmHobLib.c | 655 ++++++++++++++++
.../StandaloneMmHobLib/StandaloneMmHobLib.inf | 48 ++
.../StandaloneMmMemoryAllocationLib.c | 824 +++++++++++++++++++++
.../StandaloneMmMemoryAllocationLib.inf | 45 ++
.../StandaloneMmServicesTableLib.c | 40 +
.../StandaloneMmServicesTableLib.inf | 36 +
25 files changed, 2470 insertions(+), 48 deletions(-)
create mode 100644 ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashMmStandalone.inf
create mode 100644 CryptoPkg/Library/BaseCryptLib/BaseCryptLibMmStandalone.inf
create mode 100644 MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteMmStandalone.inf
create mode 100644 MdeModulePkg/Universal/Variable/RuntimeDxe/VariableMmStandalone.inf
create mode 100644 StandaloneMmPkg/Library/StandaloneMmHobLib/AArch64/StandaloneMmCoreHobLibInternal.c
create mode 100644 StandaloneMmPkg/Library/StandaloneMmHobLib/StandaloneMmHobLib.c
create mode 100644 StandaloneMmPkg/Library/StandaloneMmHobLib/StandaloneMmHobLib.inf
create mode 100644 StandaloneMmPkg/Library/StandaloneMmMemoryAllocationLib/StandaloneMmMemoryAllocationLib.c
create mode 100644 StandaloneMmPkg/Library/StandaloneMmMemoryAllocationLib/StandaloneMmMemoryAllocationLib.inf
create mode 100644 StandaloneMmPkg/Library/StandaloneMmServicesTableLib/StandaloneMmServicesTableLib.c
create mode 100644 StandaloneMmPkg/Library/StandaloneMmServicesTableLib/StandaloneMmServicesTableLib.inf
--
1.9.1
next reply other threads:[~2018-10-31 11:10 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-10-31 11:09 Jagadeesh Ujja [this message]
2018-10-31 11:09 ` [RFC PATCH 1/9] StandaloneMmPkg: Pull in additonal libraries from staging branch Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 2/9] ArmPlatformPkg/NorFlashDxe: allow reusability as a MM driver Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 3/9] MdeModulePkg/FaultTolerantWriteDxe: " Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 4/9] MdeModulePkg/Variable/RuntimeDxe: adapt for usability with MM Standalone Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 5/9] MdeModulePkg/Variable/RuntimeDxe: adapt as a MM Standalone driver Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 6/9] CryptoPkg/BaseCryptLib: Hack to get time in MM Standalone mode Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 7/9] SecurityPkg/AuthVariableLib:allow reusability as MM_STANDALONE Jagadeesh Ujja
2018-11-09 6:04 ` Zhang, Chao B
2018-10-31 11:09 ` [RFC PATCH 8/9] MdeModulePkg VarCheckLib: allow " Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 9/9] CryptoPkg/BaseCryptLib: allow MM_STANDALONE drivers to use this library Jagadeesh Ujja
2018-10-31 13:58 ` [RFC PATCH 0/9] Extend secure variable service to be usable from Standalone MM Gao, Liming
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20181031110947.6305-1-jagadeesh.ujja@arm.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox