public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Taylor Beebe" <taylor.d.beebe@gmail.com>
To: devel@edk2.groups.io
Cc: Jian J Wang <jian.j.wang@intel.com>,
	Liming Gao <gaoliming@byosoft.com.cn>
Subject: [edk2-devel] [PATCH v4 20/28] MdeModulePkg: Add Additional Profiles to SetMemoryProtectionsLib
Date: Tue, 19 Sep 2023 17:57:43 -0700	[thread overview]
Message-ID: <20230920005752.2041-21-taylor.d.beebe@gmail.com> (raw)
In-Reply-To: <20230920005752.2041-1-taylor.d.beebe@gmail.com>

Now that the EDK2 tree uses GetMemoryProtectionsLib to query
the platform memory protection settings, we can add additional
profiles to SetMemoryProtectionsLib to give plaforms more options
for setting memory protections.

Signed-off-by: Taylor Beebe <taylor.d.beebe@gmail.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Liming Gao <gaoliming@byosoft.com.cn>
---
 MdeModulePkg/Library/SetMemoryProtectionsLib/SetMemoryProtectionsLib.c | 417 +++++++++++++++++++-
 MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h                 |   7 +
 2 files changed, 422 insertions(+), 2 deletions(-)

diff --git a/MdeModulePkg/Library/SetMemoryProtectionsLib/SetMemoryProtectionsLib.c b/MdeModulePkg/Library/SetMemoryProtectionsLib/SetMemoryProtectionsLib.c
index 13032ec80fbf..5f054504b75e 100644
--- a/MdeModulePkg/Library/SetMemoryProtectionsLib/SetMemoryProtectionsLib.c
+++ b/MdeModulePkg/Library/SetMemoryProtectionsLib/SetMemoryProtectionsLib.c
@@ -28,6 +28,227 @@ typedef struct {
 // DXE PROFILE DEFINITIONS //
 /////////////////////////////
 
+//
+//  A memory profile with strict settings ideal for development scenarios.
+//
+#define DXE_MEMORY_PROTECTION_SETTINGS_DEBUG          \
+{                                                     \
+  DXE_MEMORY_PROTECTION_SIGNATURE,                    \
+  DXE_MEMORY_PROTECTION_SETTINGS_CURRENT_VERSION,     \
+  TRUE, /* Stack Guard */                             \
+  TRUE, /* Stack Execution Protection */              \
+  {     /* NULL Pointer Detection */                  \
+    .Enabled                                = TRUE,   \
+    .DisableEndOfDxe                        = FALSE,  \
+    .NonstopModeEnabled                     = TRUE    \
+  },                                                  \
+  { /* Image Protection */                            \
+    .ProtectImageFromUnknown                = TRUE,   \
+    .ProtectImageFromFv                     = TRUE    \
+  },                                                  \
+  { /* Execution Protection */                        \
+    .EnabledForType = {                               \
+      [EfiReservedMemoryType]               = TRUE,   \
+      [EfiLoaderCode]                       = FALSE,  \
+      [EfiLoaderData]                       = TRUE,   \
+      [EfiBootServicesCode]                 = FALSE,  \
+      [EfiBootServicesData]                 = TRUE,   \
+      [EfiRuntimeServicesCode]              = FALSE,  \
+      [EfiRuntimeServicesData]              = TRUE,   \
+      [EfiConventionalMemory]               = TRUE,   \
+      [EfiUnusableMemory]                   = TRUE,   \
+      [EfiACPIReclaimMemory]                = TRUE,   \
+      [EfiACPIMemoryNVS]                    = TRUE,   \
+      [EfiMemoryMappedIO]                   = TRUE,   \
+      [EfiMemoryMappedIOPortSpace]          = TRUE,   \
+      [EfiPalCode]                          = TRUE,   \
+      [EfiPersistentMemory]                 = FALSE,  \
+      [EfiUnacceptedMemoryType]             = TRUE,   \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]        = TRUE,   \
+      [OS_RESERVED_MPS_MEMORY_TYPE]         = TRUE    \
+    }                                                 \
+  },                                                  \
+  { /* Heap Guard */                                  \
+    .PageGuardEnabled                       = TRUE,   \
+    .PoolGuardEnabled                       = TRUE,   \
+    .FreedMemoryGuardEnabled                = FALSE,  \
+    .NonstopModeEnabled                     = TRUE,   \
+    .GuardAlignedToTail                     = TRUE    \
+  },                                                  \
+  { /* Pool Guard */                                  \
+    .EnabledForType = {                               \
+      [EfiReservedMemoryType]               = TRUE,   \
+      [EfiLoaderCode]                       = TRUE,   \
+      [EfiLoaderData]                       = TRUE,   \
+      [EfiBootServicesCode]                 = TRUE,   \
+      [EfiBootServicesData]                 = TRUE,   \
+      [EfiRuntimeServicesCode]              = TRUE,   \
+      [EfiRuntimeServicesData]              = TRUE,   \
+      [EfiConventionalMemory]               = FALSE,  \
+      [EfiUnusableMemory]                   = TRUE,   \
+      [EfiACPIReclaimMemory]                = TRUE,   \
+      [EfiACPIMemoryNVS]                    = TRUE,   \
+      [EfiMemoryMappedIO]                   = TRUE,   \
+      [EfiMemoryMappedIOPortSpace]          = TRUE,   \
+      [EfiPalCode]                          = TRUE,   \
+      [EfiPersistentMemory]                 = FALSE,  \
+      [EfiUnacceptedMemoryType]             = TRUE,   \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]        = TRUE,   \
+      [OS_RESERVED_MPS_MEMORY_TYPE]         = TRUE    \
+    }                                                 \
+  },                                                  \
+  { /* Page Guard */                                  \
+    .EnabledForType = {                               \
+      [EfiReservedMemoryType]               = TRUE,   \
+      [EfiLoaderCode]                       = TRUE,   \
+      [EfiLoaderData]                       = TRUE,   \
+      [EfiBootServicesCode]                 = TRUE,   \
+      [EfiBootServicesData]                 = TRUE,   \
+      [EfiRuntimeServicesCode]              = TRUE,   \
+      [EfiRuntimeServicesData]              = TRUE,   \
+      [EfiConventionalMemory]               = FALSE,  \
+      [EfiUnusableMemory]                   = TRUE,   \
+      [EfiACPIReclaimMemory]                = TRUE,   \
+      [EfiACPIMemoryNVS]                    = TRUE,   \
+      [EfiMemoryMappedIO]                   = TRUE,   \
+      [EfiMemoryMappedIOPortSpace]          = TRUE,   \
+      [EfiPalCode]                          = TRUE,   \
+      [EfiPersistentMemory]                 = FALSE,  \
+      [EfiUnacceptedMemoryType]             = TRUE,   \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]        = TRUE,   \
+      [OS_RESERVED_MPS_MEMORY_TYPE]         = TRUE    \
+    }                                                 \
+  }                                                   \
+}
+
+//
+//  A memory profile recommended for production. Compared to the debug
+//  settings, this profile removes the pool guards and uses page guards
+//  for fewer memory types.
+//
+#define DXE_MEMORY_PROTECTION_SETTINGS_PROD_MODE      \
+{                                                     \
+  DXE_MEMORY_PROTECTION_SIGNATURE,                    \
+  DXE_MEMORY_PROTECTION_SETTINGS_CURRENT_VERSION,     \
+  TRUE, /* Stack Guard */                             \
+  TRUE, /* Stack Execution Protection */              \
+  {     /* NULL Pointer Detection */                  \
+    .Enabled                                = TRUE,   \
+    .DisableEndOfDxe                        = FALSE,  \
+    .NonstopModeEnabled                     = FALSE   \
+  },                                                  \
+  { /* Image Protection */                            \
+    .ProtectImageFromUnknown                = FALSE,  \
+    .ProtectImageFromFv                     = TRUE    \
+  },                                                  \
+  { /* Execution Protection */                        \
+    .EnabledForType = {                               \
+      [EfiReservedMemoryType]               = TRUE,   \
+      [EfiLoaderCode]                       = FALSE,  \
+      [EfiLoaderData]                       = TRUE,   \
+      [EfiBootServicesCode]                 = FALSE,  \
+      [EfiBootServicesData]                 = TRUE,   \
+      [EfiRuntimeServicesCode]              = FALSE,  \
+      [EfiRuntimeServicesData]              = TRUE,   \
+      [EfiConventionalMemory]               = TRUE,   \
+      [EfiUnusableMemory]                   = TRUE,   \
+      [EfiACPIReclaimMemory]                = TRUE,   \
+      [EfiACPIMemoryNVS]                    = TRUE,   \
+      [EfiMemoryMappedIO]                   = TRUE,   \
+      [EfiMemoryMappedIOPortSpace]          = TRUE,   \
+      [EfiPalCode]                          = TRUE,   \
+      [EfiPersistentMemory]                 = FALSE,  \
+      [EfiUnacceptedMemoryType]             = TRUE,   \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]        = TRUE,   \
+      [OS_RESERVED_MPS_MEMORY_TYPE]         = TRUE    \
+    }                                                 \
+  },                                                  \
+  { /* Heap Guard */                                  \
+    .PageGuardEnabled                       = TRUE,   \
+    .PoolGuardEnabled                       = FALSE,  \
+    .FreedMemoryGuardEnabled                = FALSE,  \
+    .NonstopModeEnabled                     = FALSE,  \
+    .GuardAlignedToTail                     = TRUE    \
+  },                                                  \
+  { /* Pool Guard */                                  \
+    0                                                 \
+  },                                                  \
+  { /* Page Guard */                                  \
+    .EnabledForType = {                               \
+      [EfiReservedMemoryType]               = FALSE,  \
+      [EfiLoaderCode]                       = FALSE,  \
+      [EfiLoaderData]                       = FALSE,  \
+      [EfiBootServicesCode]                 = FALSE,  \
+      [EfiBootServicesData]                 = TRUE,   \
+      [EfiRuntimeServicesCode]              = FALSE,  \
+      [EfiRuntimeServicesData]              = TRUE,   \
+      [EfiConventionalMemory]               = FALSE,  \
+      [EfiUnusableMemory]                   = FALSE,  \
+      [EfiACPIReclaimMemory]                = FALSE,  \
+      [EfiACPIMemoryNVS]                    = FALSE,  \
+      [EfiMemoryMappedIO]                   = FALSE,  \
+      [EfiMemoryMappedIOPortSpace]          = FALSE,  \
+      [EfiPalCode]                          = FALSE,  \
+      [EfiPersistentMemory]                 = FALSE,  \
+      [EfiUnacceptedMemoryType]             = FALSE,  \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]        = FALSE,  \
+      [OS_RESERVED_MPS_MEMORY_TYPE]         = FALSE   \
+    }                                                 \
+  }                                                   \
+}
+
+//
+//  A memory profile which mirrors DXE_MEMORY_PROTECTION_SETTINGS_PROD_MODE
+//  but doesn't include page guards.
+//
+#define DXE_MEMORY_PROTECTION_SETTINGS_PROD_MODE_NO_PAGE_GUARDS   \
+{                                                                 \
+  DXE_MEMORY_PROTECTION_SIGNATURE,                                \
+  DXE_MEMORY_PROTECTION_SETTINGS_CURRENT_VERSION,                 \
+  TRUE, /* Stack Guard */                                         \
+  TRUE, /* Stack Execution Protection */                          \
+  {     /* NULL Pointer Detection */                              \
+    .Enabled                                = TRUE,               \
+    .DisableEndOfDxe                        = FALSE,              \
+    .NonstopModeEnabled                     = FALSE               \
+  },                                                              \
+  { /* Image Protection */                                        \
+    .ProtectImageFromUnknown                = FALSE,              \
+    .ProtectImageFromFv                     = TRUE                \
+  },                                                              \
+  { /* Execution Protection */                                    \
+    .EnabledForType = {                                           \
+      [EfiReservedMemoryType]               = TRUE,               \
+      [EfiLoaderCode]                       = FALSE,              \
+      [EfiLoaderData]                       = TRUE,               \
+      [EfiBootServicesCode]                 = FALSE,              \
+      [EfiBootServicesData]                 = TRUE,               \
+      [EfiRuntimeServicesCode]              = FALSE,              \
+      [EfiRuntimeServicesData]              = TRUE,               \
+      [EfiConventionalMemory]               = TRUE,               \
+      [EfiUnusableMemory]                   = TRUE,               \
+      [EfiACPIReclaimMemory]                = TRUE,               \
+      [EfiACPIMemoryNVS]                    = TRUE,               \
+      [EfiMemoryMappedIO]                   = TRUE,               \
+      [EfiMemoryMappedIOPortSpace]          = TRUE,               \
+      [EfiPalCode]                          = TRUE,               \
+      [EfiPersistentMemory]                 = FALSE,              \
+      [EfiUnacceptedMemoryType]             = TRUE,               \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]        = TRUE,               \
+      [OS_RESERVED_MPS_MEMORY_TYPE]         = TRUE                \
+    }                                                             \
+  },                                                              \
+  { /* Heap Guard */                                              \
+    0                                                             \
+  },                                                              \
+  { /* Pool Guard */                                              \
+    0                                                             \
+  },                                                              \
+  { /* Page Guard */                                              \
+    0                                                             \
+  }                                                               \
+}
+
 //
 //  A memory profile which uses the fixed at build PCDs defined in MdeModulePkg.dec
 //
@@ -121,10 +342,146 @@ typedef struct {
   }                                                                                                                                   \
 }
 
+//
+//  A memory profile which disables all DXE memory protection settings.
+//
+#define DXE_MEMORY_PROTECTION_SETTINGS_OFF            \
+{                                                     \
+  DXE_MEMORY_PROTECTION_SIGNATURE,                    \
+  DXE_MEMORY_PROTECTION_SETTINGS_CURRENT_VERSION,     \
+  FALSE, /* Stack Guard */                            \
+  FALSE, /* Stack Execution Protection */             \
+  {      /* NULL Pointer Detection */                 \
+    0                                                 \
+  },                                                  \
+  { /* Image Protection */                            \
+    0                                                 \
+  },                                                  \
+  { /* Execution Protection */                        \
+    0                                                 \
+  },                                                  \
+  { /* Heap Guard */                                  \
+    0                                                 \
+  },                                                  \
+  { /* Pool Guard */                                  \
+    0                                                 \
+  },                                                  \
+  { /* Page Guard */                                  \
+    0                                                 \
+  }                                                   \
+}
+
 ////////////////////////////
 // MM PROFILE DEFINITIONS //
 ////////////////////////////
 
+//
+//  A memory profile ideal for development scenarios.
+//
+#define MM_MEMORY_PROTECTION_SETTINGS_DEBUG        \
+{                                                  \
+  MM_MEMORY_PROTECTION_SIGNATURE,                  \
+  MM_MEMORY_PROTECTION_SETTINGS_CURRENT_VERSION,   \
+  { /* NULL Pointer Detection */                   \
+    .Enabled                             = TRUE,   \
+    .NonstopModeEnabled                  = TRUE    \
+  },                                               \
+  { /* Heap Guard */                               \
+    .PageGuardEnabled                    = TRUE,   \
+    .PoolGuardEnabled                    = TRUE,   \
+    .NonstopModeEnabled                  = TRUE,   \
+    .GuardAlignedToTail                  = TRUE    \
+  },                                               \
+  { /* Pool Guard */                               \
+    .EnabledForType = {                            \
+      [EfiReservedMemoryType]            = FALSE,  \
+      [EfiLoaderCode]                    = FALSE,  \
+      [EfiLoaderData]                    = FALSE,  \
+      [EfiBootServicesCode]              = FALSE,  \
+      [EfiBootServicesData]              = TRUE,   \
+      [EfiRuntimeServicesCode]           = FALSE,  \
+      [EfiRuntimeServicesData]           = TRUE,   \
+      [EfiConventionalMemory]            = FALSE,  \
+      [EfiUnusableMemory]                = FALSE,  \
+      [EfiACPIReclaimMemory]             = FALSE,  \
+      [EfiACPIMemoryNVS]                 = FALSE,  \
+      [EfiMemoryMappedIO]                = FALSE,  \
+      [EfiMemoryMappedIOPortSpace]       = FALSE,  \
+      [EfiPalCode]                       = FALSE,  \
+      [EfiPersistentMemory]              = FALSE,  \
+      [EfiUnacceptedMemoryType]          = FALSE,  \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]     = FALSE,  \
+      [OS_RESERVED_MPS_MEMORY_TYPE]      = FALSE   \
+    }                                              \
+  },                                               \
+  { /* Page Guard */                               \
+    .EnabledForType = {                            \
+      [EfiReservedMemoryType]            = FALSE,  \
+      [EfiLoaderCode]                    = FALSE,  \
+      [EfiLoaderData]                    = FALSE,  \
+      [EfiBootServicesCode]              = FALSE,  \
+      [EfiBootServicesData]              = TRUE,   \
+      [EfiRuntimeServicesCode]           = FALSE,  \
+      [EfiRuntimeServicesData]           = TRUE,   \
+      [EfiConventionalMemory]            = FALSE,  \
+      [EfiUnusableMemory]                = FALSE,  \
+      [EfiACPIReclaimMemory]             = FALSE,  \
+      [EfiACPIMemoryNVS]                 = FALSE,  \
+      [EfiMemoryMappedIO]                = FALSE,  \
+      [EfiMemoryMappedIOPortSpace]       = FALSE,  \
+      [EfiPalCode]                       = FALSE,  \
+      [EfiPersistentMemory]              = FALSE,  \
+      [EfiUnacceptedMemoryType]          = FALSE,  \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]     = FALSE,  \
+      [OS_RESERVED_MPS_MEMORY_TYPE]      = FALSE   \
+    }                                              \
+  }                                                \
+}
+
+//
+//  A memory profile ideal for production scenarios.
+//
+#define MM_MEMORY_PROTECTION_SETTINGS_PROD_MODE    \
+{                                                  \
+  MM_MEMORY_PROTECTION_SIGNATURE,                  \
+  MM_MEMORY_PROTECTION_SETTINGS_CURRENT_VERSION,   \
+  { /* NULL Pointer Detection */                   \
+    .Enabled                             = TRUE,   \
+    .NonstopModeEnabled                  = FALSE   \
+  },                                               \
+  { /* Heap Guard */                               \
+    .PageGuardEnabled                    = TRUE,   \
+    .PoolGuardEnabled                    = FALSE,  \
+    .NonstopModeEnabled                  = FALSE,  \
+    .GuardAlignedToTail                  = TRUE    \
+  },                                               \
+  { /* Pool Guard */                               \
+    0                                              \
+  },                                               \
+  { /* Page Guard */                               \
+    .EnabledForType = {                            \
+      [EfiReservedMemoryType]            = FALSE,  \
+      [EfiLoaderCode]                    = FALSE,  \
+      [EfiLoaderData]                    = FALSE,  \
+      [EfiBootServicesCode]              = FALSE,  \
+      [EfiBootServicesData]              = TRUE,   \
+      [EfiRuntimeServicesCode]           = FALSE,  \
+      [EfiRuntimeServicesData]           = TRUE,   \
+      [EfiConventionalMemory]            = FALSE,  \
+      [EfiUnusableMemory]                = FALSE,  \
+      [EfiACPIReclaimMemory]             = FALSE,  \
+      [EfiACPIMemoryNVS]                 = FALSE,  \
+      [EfiMemoryMappedIO]                = FALSE,  \
+      [EfiMemoryMappedIOPortSpace]       = FALSE,  \
+      [EfiPalCode]                       = FALSE,  \
+      [EfiPersistentMemory]              = FALSE,  \
+      [EfiUnacceptedMemoryType]          = FALSE,  \
+      [OEM_RESERVED_MPS_MEMORY_TYPE]     = FALSE,  \
+      [OS_RESERVED_MPS_MEMORY_TYPE]      = FALSE   \
+    }                                              \
+  }                                                \
+}
+
 //
 //  A memory profile which uses the fixed at build PCDs defined in MdeModulePkg.dec
 //
@@ -188,24 +545,80 @@ typedef struct {
   }                                                                                                                       \
 }
 
+//
+//  A memory profile which disables all MM memory protection settings.
+//
+#define MM_MEMORY_PROTECTION_SETTINGS_OFF           \
+{                                                   \
+  MM_MEMORY_PROTECTION_SIGNATURE,                   \
+  MM_MEMORY_PROTECTION_SETTINGS_CURRENT_VERSION,    \
+  { /* NULL Pointer Detection */                    \
+    0                                               \
+  },                                                \
+  { /* Heap Guard */                                \
+    0                                               \
+  },                                                \
+  { /* Pool Guard */                                \
+    0                                               \
+  },                                                \
+  { /* Page Guard */                                \
+    0                                               \
+  }                                                 \
+}
+
 ////////////////////////////
 // PROFILE CONFIGURATIONS //
 ////////////////////////////
 
 DXE_MEMORY_PROTECTION_PROFILES  DxeMemoryProtectionProfiles[DxeMemoryProtectionSettingsMax] = {
-  [DxeMemoryProtectionSettingsPcd] = {
+  [DxeMemoryProtectionSettingsDebug] =               {
+    .Name        = "Debug",
+    .Description = "Development profile ideal for debug scenarios",
+    .Settings    = DXE_MEMORY_PROTECTION_SETTINGS_DEBUG
+  },
+  [DxeMemoryProtectionSettingsRelease] =             {
+    .Name        = "Release",
+    .Description = "Release profile recommended for production scenarios",
+    .Settings    = DXE_MEMORY_PROTECTION_SETTINGS_PROD_MODE
+  },
+  [DxeMemoryProtectionSettingsReleaseNoPageGuards] = {
+    .Name        = "ReleaseNoPageGuards",
+    .Description = "Release profile without page guards recommended for performance sensitive production scenarios",
+    .Settings    = DXE_MEMORY_PROTECTION_SETTINGS_PROD_MODE_NO_PAGE_GUARDS
+  },
+  [DxeMemoryProtectionSettingsPcd] =                 {
     .Name        = "Pcd",
     .Description = "Memory protection settings from PCDs",
     .Settings    = DXE_MEMORY_PROTECTION_SETTINGS_PCD
   },
+  [DxeMemoryProtectionSettingsOff] =                 {
+    .Name        = "Off",
+    .Description = "Disables all memory protection settings",
+    .Settings    = DXE_MEMORY_PROTECTION_SETTINGS_OFF
+  }
 };
 
 MM_MEMORY_PROTECTION_PROFILES  MmMemoryProtectionProfiles[MmMemoryProtectionSettingsMax] = {
-  [MmMemoryProtectionSettingsPcd] = {
+  [MmMemoryProtectionSettingsDebug] =   {
+    .Name        = "Debug",
+    .Description = "Development profile ideal for debug scenarios",
+    .Settings    = MM_MEMORY_PROTECTION_SETTINGS_DEBUG
+  },
+  [MmMemoryProtectionSettingsRelease] = {
+    .Name        = "Release",
+    .Description = "Release profile recommended for production scenarios",
+    .Settings    = MM_MEMORY_PROTECTION_SETTINGS_PROD_MODE
+  },
+  [MmMemoryProtectionSettingsPcd] =     {
     .Name        = "Pcd",
     .Description = "Memory protection settings from PCDs",
     .Settings    = MM_MEMORY_PROTECTION_SETTINGS_PCD
   },
+  [MmMemoryProtectionSettingsOff] =     {
+    .Name        = "Off",
+    .Description = "Disables all memory protection settings",
+    .Settings    = MM_MEMORY_PROTECTION_SETTINGS_OFF
+  }
 };
 
 /////////////////////////////////////
diff --git a/MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h b/MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h
index 023c987c3c7e..f4665130b0b3 100644
--- a/MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h
+++ b/MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h
@@ -17,6 +17,10 @@ typedef struct {
 } DXE_MEMORY_PROTECTION_PROFILES;
 
 typedef enum {
+  DxeMemoryProtectionSettingsDebug = 0,
+  DxeMemoryProtectionSettingsRelease,
+  DxeMemoryProtectionSettingsReleaseNoPageGuards,
+  DxeMemoryProtectionSettingsOff,
   DxeMemoryProtectionSettingsPcd,
   DxeMemoryProtectionSettingsMax
 } DXE_MEMORY_PROTECTION_PROFILE_INDEX;
@@ -28,6 +32,9 @@ typedef struct {
 } MM_MEMORY_PROTECTION_PROFILES;
 
 typedef enum {
+  MmMemoryProtectionSettingsDebug = 0,
+  MmMemoryProtectionSettingsRelease,
+  MmMemoryProtectionSettingsOff,
   MmMemoryProtectionSettingsPcd,
   MmMemoryProtectionSettingsMax
 } MM_MEMORY_PROTECTION_PROFILE_INDEX;
-- 
2.42.0.windows.2



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#108882): https://edk2.groups.io/g/devel/message/108882
Mute This Topic: https://groups.io/mt/101469960/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [rebecca@openfw.io]
-=-=-=-=-=-=-=-=-=-=-=-



  parent reply	other threads:[~2023-09-20  0:58 UTC|newest]

Thread overview: 38+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-09-20  0:57 [edk2-devel] [PATCH v4 00/28] Implement Dynamic Memory Protection Settings Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 01/28] MdeModulePkg: Add DXE and MM Memory Protection Settings Definitions Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 02/28] MdeModulePkg: Define SetMemoryProtectionsLib and GetMemoryProtectionsLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 03/28] MdeModulePkg: Add NULL Instances for Get/SetMemoryProtectionsLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 04/28] MdeModulePkg: Implement SetMemoryProtectionsLib and GetMemoryProtectionsLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 05/28] MdeModulePkg: Copy PEI PCD Database Into New Buffer Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 06/28] MdeModulePkg: Apply Protections to the HOB List Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 07/28] MdeModulePkg: Check Print Level Before Dumping GCD Memory Map Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 08/28] UefiCpuPkg: Always Set Stack Guard in MpPei Init Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 09/28] ArmVirtPkg: Add Memory Protection Library Definitions to Platforms Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 10/28] OvmfPkg: " Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 11/28] OvmfPkg: Apply Memory Protections via SetMemoryProtectionsLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 12/28] OvmfPkg: Update PeilessStartupLib to use SetMemoryProtectionsLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 13/28] UefiPayloadPkg: Update DXE Handoff " Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 14/28] MdeModulePkg: " Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 15/28] ArmPkg: Use GetMemoryProtectionsLib instead of Memory Protection PCDs Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 16/28] EmulatorPkg: " Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 17/28] OvmfPkg: " Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 18/28] UefiCpuPkg: " Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 19/28] MdeModulePkg: " Taylor Beebe
2023-09-20  0:57 ` Taylor Beebe [this message]
2023-09-27  8:19   ` [edk2-devel] [PATCH v4 20/28] MdeModulePkg: Add Additional Profiles to SetMemoryProtectionsLib Gerd Hoffmann
2023-09-29 19:52     ` Taylor Beebe
2023-10-04  8:46       ` Gerd Hoffmann
2023-10-04 16:31         ` Taylor Beebe
2023-10-05  8:20           ` Laszlo Ersek
2023-10-05  9:29             ` Gerd Hoffmann
2023-10-05 10:23               ` Gerd Hoffmann
2023-10-05 12:57                 ` Laszlo Ersek
2023-10-08 20:26                   ` Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 21/28] OvmfPkg: Add QemuFwCfgParseString to QemuFwCfgSimpleParserLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 22/28] OvmfPkg: Add MemoryProtectionConfigLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 23/28] OvmfPkg: Enable Choosing Memory Protection Profile via QemuCfg Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 24/28] ArmVirtPkg: Apply Memory Protections via SetMemoryProtectionsLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 25/28] MdeModulePkg: Delete PCD Profile from SetMemoryProtectionsLib Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 26/28] OvmfPkg: Delete Memory Protection PCDs Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 27/28] ArmVirtPkg: " Taylor Beebe
2023-09-20  0:57 ` [edk2-devel] [PATCH v4 28/28] MdeModulePkg: " Taylor Beebe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20230920005752.2041-21-taylor.d.beebe@gmail.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox