public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: Jagadeesh Ujja <jagadeesh.ujja@arm.com>
To: edk2-devel@lists.01.org
Subject: [RFC PATCH 0/9] Extend secure variable service to be usable from Standalone MM
Date: Wed, 31 Oct 2018 16:39:38 +0530	[thread overview]
Message-ID: <20181031110947.6305-1-jagadeesh.ujja@arm.com> (raw)

This RFC patch series extends the existing secure variable service support
for use with Standalone MM. This is applicable to paltforms that use
Standalone Management Mode to protect access to non-volatile memory (NOR
flash in case of these patches) used to store the secure EFI variables.

The first patch pulls in additional libraries from the staging branch of
StandaloneMmPkg into the edk2's StandaloneMmPkg. The existing secure
variable service implementation supports only the traditional MM mode
and so the rest of the patches extends the existing secure variable
service support to be useable with Standalone MM mode as well.

This patch series is being posted as an RFC to get feedback on the
approach taken in these patches.

Jagadeesh Ujja (9):
  StandaloneMmPkg: Pull in additonal libraries from staging branch
  ArmPlatformPkg/NorFlashDxe: allow reusability as a MM driver
  MdeModulePkg/FaultTolerantWriteDxe: allow reusability as a MM driver
  MdeModulePkg/Variable/RuntimeDxe: adapt for usability with MM Standalone
  MdeModulePkg/Variable/RuntimeDxe: adapt as a MM Standalone driver
  CryptoPkg/BaseCryptLib: Hack to get time in MM Standalone mode
  SecurityPkg/AuthVariableLib:allow reusability as MM_STANDALONE
  MdeModulePkg VarCheckLib: allow reusability as MM_STANDALONE
  CryptoPkg/BaseCryptLib: allow MM_STANDALONE drivers to use this library

 .../Drivers/NorFlashDxe/NorFlashBlockIoDxe.c       |   5 +-
 ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashDxe.c   | 116 ++-
 ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashDxe.h   |  15 +-
 .../Drivers/NorFlashDxe/NorFlashFvbDxe.c           |  26 +-
 .../Drivers/NorFlashDxe/NorFlashMmStandalone.inf   |  76 ++
 .../BaseCryptLib/BaseCryptLibMmStandalone.inf      | 106 +++
 .../Library/BaseCryptLib/SysCall/TimerWrapper.c    |  19 +-
 MdeModulePkg/Library/VarCheckLib/VarCheckLib.inf   |   5 +-
 .../FaultTolerantWriteMmStandalone.inf             | 100 +++
 .../FaultTolerantWriteDxe/FaultTolerantWriteSmm.c  |  72 +-
 .../FaultTolerantWriteDxe/UpdateWorkingBlock.c     |   8 +-
 .../Universal/Variable/RuntimeDxe/Variable.c       |  16 +-
 .../Universal/Variable/RuntimeDxe/Variable.h       |   8 +
 .../Variable/RuntimeDxe/VariableMmStandalone.inf   | 134 ++++
 .../Universal/Variable/RuntimeDxe/VariableSmm.c    |  73 +-
 .../Variable/RuntimeDxe/VariableSmmRuntimeDxe.c    |  20 +-
 .../Library/AuthVariableLib/AuthVariableLib.inf    |   5 +-
 .../StandaloneMmCoreHobLib.inf                     |   2 +-
 .../AArch64/StandaloneMmCoreHobLibInternal.c       |  64 ++
 .../StandaloneMmHobLib/StandaloneMmHobLib.c        | 655 ++++++++++++++++
 .../StandaloneMmHobLib/StandaloneMmHobLib.inf      |  48 ++
 .../StandaloneMmMemoryAllocationLib.c              | 824 +++++++++++++++++++++
 .../StandaloneMmMemoryAllocationLib.inf            |  45 ++
 .../StandaloneMmServicesTableLib.c                 |  40 +
 .../StandaloneMmServicesTableLib.inf               |  36 +
 25 files changed, 2470 insertions(+), 48 deletions(-)
 create mode 100644 ArmPlatformPkg/Drivers/NorFlashDxe/NorFlashMmStandalone.inf
 create mode 100644 CryptoPkg/Library/BaseCryptLib/BaseCryptLibMmStandalone.inf
 create mode 100644 MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteMmStandalone.inf
 create mode 100644 MdeModulePkg/Universal/Variable/RuntimeDxe/VariableMmStandalone.inf
 create mode 100644 StandaloneMmPkg/Library/StandaloneMmHobLib/AArch64/StandaloneMmCoreHobLibInternal.c
 create mode 100644 StandaloneMmPkg/Library/StandaloneMmHobLib/StandaloneMmHobLib.c
 create mode 100644 StandaloneMmPkg/Library/StandaloneMmHobLib/StandaloneMmHobLib.inf
 create mode 100644 StandaloneMmPkg/Library/StandaloneMmMemoryAllocationLib/StandaloneMmMemoryAllocationLib.c
 create mode 100644 StandaloneMmPkg/Library/StandaloneMmMemoryAllocationLib/StandaloneMmMemoryAllocationLib.inf
 create mode 100644 StandaloneMmPkg/Library/StandaloneMmServicesTableLib/StandaloneMmServicesTableLib.c
 create mode 100644 StandaloneMmPkg/Library/StandaloneMmServicesTableLib/StandaloneMmServicesTableLib.inf

-- 
1.9.1





             reply	other threads:[~2018-10-31 11:10 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-10-31 11:09 Jagadeesh Ujja [this message]
2018-10-31 11:09 ` [RFC PATCH 1/9] StandaloneMmPkg: Pull in additonal libraries from staging branch Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 2/9] ArmPlatformPkg/NorFlashDxe: allow reusability as a MM driver Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 3/9] MdeModulePkg/FaultTolerantWriteDxe: " Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 4/9] MdeModulePkg/Variable/RuntimeDxe: adapt for usability with MM Standalone Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 5/9] MdeModulePkg/Variable/RuntimeDxe: adapt as a MM Standalone driver Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 6/9] CryptoPkg/BaseCryptLib: Hack to get time in MM Standalone mode Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 7/9] SecurityPkg/AuthVariableLib:allow reusability as MM_STANDALONE Jagadeesh Ujja
2018-11-09  6:04   ` Zhang, Chao B
2018-10-31 11:09 ` [RFC PATCH 8/9] MdeModulePkg VarCheckLib: allow " Jagadeesh Ujja
2018-10-31 11:09 ` [RFC PATCH 9/9] CryptoPkg/BaseCryptLib: allow MM_STANDALONE drivers to use this library Jagadeesh Ujja
2018-10-31 13:58 ` [RFC PATCH 0/9] Extend secure variable service to be usable from Standalone MM Gao, Liming

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20181031110947.6305-1-jagadeesh.ujja@arm.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox