From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web11.13276.1685025071221832890 for ; Thu, 25 May 2023 07:31:11 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IGwGTQyb; spf=pass (domain: kernel.org, ip: 139.178.84.217, mailfrom: ardb@kernel.org) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id BC8B36463D; Thu, 25 May 2023 14:31:10 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9DA6DC433A0; Thu, 25 May 2023 14:31:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1685025070; bh=NJO6EOimgsmrtIzsFbDSnVw9j0vf7zRVy27OPb7H9Dg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IGwGTQybPfNvq4yiAam9GRTKXrlz4zHSMKLi5Ot7FV20SxxG2acuHXYFLv8gpKZAA Kh1xfDZ/iHDN9t1XAMtAwTMLuPUxo+qFAz6EAOlkuRd/ziDsYvLerPafOwInhFtdo8 0zVHYCjdCk/p1v/BCYKGxxatmzqRx5Gk9wgwi2MmBoBFaCQqULKfkSZX7DkVYVZMpl rpmJ9g1QrG7qF9/xytYzw8b3LsDYUYjL5DIp0HANGW5Z0oyS4od7fOvF5GI3ct0COX RWDzOYAKN1Z+Dru4JH0oby2EiqddW5W1S3DvxlETj9/Xm/gSoQMfGv7htpBIFUBEgt qjAvth4e0hT/A== From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Ray Ni , Jiewen Yao , Gerd Hoffmann , Taylor Beebe , Oliver Smith-Denny , Dandan Bi , Liming Gao , "Kinney, Michael D" , Leif Lindholm , Sunil V L , Andrei Warkentin Subject: [RFC PATCH 04/10] OvmfPkg/RiscVVirt: Remove unimplemented NxForStack configuration Date: Thu, 25 May 2023 16:30:35 +0200 Message-Id: <20230525143041.1172989-5-ardb@kernel.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230525143041.1172989-1-ardb@kernel.org> References: <20230525143041.1172989-1-ardb@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable The RISC-V version of the DXE IPL does not implement setting the stack NX, so before switching to an implementation that will ASSERT() on the missing support, drop the PCD setting that enables it. Signed-off-by: Ard Biesheuvel --- OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc | 6 ------ 1 file changed, 6 deletions(-) diff --git a/OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc b/OvmfPkg/RiscVVirt/RiscVV= irtQemu.dsc index 28d9af4d79b9cc35..414d186179fb16e8 100644 --- a/OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc +++ b/OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc @@ -172,12 +172,6 @@ [PcdsFixedAtBuild.common] gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|FAL= SE=0D gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0x21, 0xaa, 0x2c= , 0x46, 0x14, 0x76, 0x03, 0x45, 0x83, 0x6e, 0x8a, 0xb6, 0xf4, 0x66, 0x23, 0= x31 }=0D =0D -=0D - #=0D - # Enable the non-executable DXE stack. (This gets set up by DxeIpl)=0D - #=0D - gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack|TRUE=0D -=0D !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE=0D # override the default values from SecurityPkg to ensure images from all= sources are verified in secure boot=0D gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04=0D --=20 2.39.2