From: "Laszlo Ersek" <lersek@redhat.com>
To: devel@edk2.groups.io, taylor.d.beebe@gmail.com
Cc: Jian J Wang <jian.j.wang@intel.com>,
Liming Gao <gaoliming@byosoft.com.cn>
Subject: Re: [edk2-devel] [PATCH v5 02/28] MdeModulePkg: Define SetMemoryProtectionsLib and GetMemoryProtectionsLib
Date: Mon, 9 Oct 2023 09:52:14 +0200 [thread overview]
Message-ID: <492e83cb-248e-9169-cca1-5f1f8158cffb@redhat.com> (raw)
In-Reply-To: <20231009000742.1792-3-taylor.d.beebe@gmail.com>
On 10/9/23 02:07, Taylor Beebe wrote:
> SetMemoryProtectionsLib is a PEIM which allows platforms to
> apply memory protection settings to the current boot.
>
> GetMemoryProtectionsLib has DXE and MM implementations to allow
> platforms to query the current memory protection settings via a
> global variable populated by the library Implementations.
>
> The global variable is a union of the MM and DXE settings. the
> DXE struct is only valid in a DXE module and the MM struct is
> only valid in an SMM or Stanalone MM module.
>
> Signed-off-by: Taylor Beebe <taylor.d.beebe@gmail.com>
> Cc: Jian J Wang <jian.j.wang@intel.com>
> Cc: Liming Gao <gaoliming@byosoft.com.cn>
> ---
> MdeModulePkg/Include/Library/GetMemoryProtectionsLib.h | 83 +++++++++++
> MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h | 152 ++++++++++++++++++++
> MdeModulePkg/MdeModulePkg.dec | 8 ++
> 3 files changed, 243 insertions(+)
>
> diff --git a/MdeModulePkg/Include/Library/GetMemoryProtectionsLib.h b/MdeModulePkg/Include/Library/GetMemoryProtectionsLib.h
> new file mode 100644
> index 000000000000..c8f7084e9c80
> --- /dev/null
> +++ b/MdeModulePkg/Include/Library/GetMemoryProtectionsLib.h
> @@ -0,0 +1,83 @@
> +/** @file
> +Library for accessing the platform memory protection settings.
> +
> +Copyright (c) Microsoft Corporation.
> +SPDX-License-Identifier: BSD-2-Clause-Patent
> +
> +**/
> +
> +#ifndef GET_MEMORY_PROTECTION_SETTINGS_LIB_H_
> +#define GET_MEMORY_PROTECTION_SETTINGS_LIB_H_
> +
> +#include <Library/BaseMemoryLib.h>
> +#include <Guid/MemoryProtectionSettings.h>
> +
> +#pragma pack(1)
> +
> +typedef union {
> + DXE_MEMORY_PROTECTION_SETTINGS Dxe;
> + MM_MEMORY_PROTECTION_SETTINGS Mm;
> +} MEMORY_PROTECTION_SETTINGS_UNION;
> +
> +#pragma pack()
> +
> +// The global used to access current Memory Protection Settings
> +extern MEMORY_PROTECTION_SETTINGS_UNION gMps;
> +
> +#define MPS_IS_DXE_SIGNATURE_VALID (gMps.Dxe.Signature == DXE_MEMORY_PROTECTION_SIGNATURE)
> +#define MPS_IS_MM_SIGNATURE_VALID (gMps.Mm.Signature == MM_MEMORY_PROTECTION_SIGNATURE)
> +
> +#define IS_DXE_PAGE_GUARD_ACTIVE (MPS_IS_DXE_SIGNATURE_VALID && \
> + !IsZeroBuffer (&gMps.Dxe.PageGuard.EnabledForType, MPS_MEMORY_TYPE_BUFFER_SIZE) && \
> + gMps.Dxe.HeapGuard.PageGuardEnabled)
> +
> +#define IS_DXE_POOL_GUARD_ACTIVE (MPS_IS_DXE_SIGNATURE_VALID && \
> + !IsZeroBuffer (&gMps.Dxe.PoolGuard.EnabledForType, MPS_MEMORY_TYPE_BUFFER_SIZE) && \
> + gMps.Dxe.HeapGuard.PoolGuardEnabled)
> +
> +#define IS_DXE_EXECUTION_PROTECTION_ACTIVE (MPS_IS_DXE_SIGNATURE_VALID && \
> + !IsZeroBuffer (&gMps.Dxe.ExecutionProtection.EnabledForType, MPS_MEMORY_TYPE_BUFFER_SIZE))
> +
> +#define IS_DXE_IMAGE_PROTECTION_ACTIVE (MPS_IS_DXE_SIGNATURE_VALID && \
> + (gMps.Dxe.ImageProtection.ProtectImageFromFv || \
> + gMps.Dxe.ImageProtection.ProtectImageFromUnknown))
> +
> +#define IS_DXE_MEMORY_PROTECTION_ACTIVE (MPS_IS_DXE_SIGNATURE_VALID && \
> + (IS_DXE_PAGE_GUARD_ACTIVE || \
> + IS_DXE_POOL_GUARD_ACTIVE || \
> + IS_DXE_EXECUTION_PROTECTION_ACTIVE || \
> + IS_DXE_IMAGE_PROTECTION_ACTIVE || \
> + gMps.Dxe.CpuStackGuardEnabled || \
> + gMps.Dxe.StackExecutionProtectionEnabled || \
> + gMps.Dxe.NullPointerDetection.Enabled || \
> + gMps.Dxe.HeapGuard.FreedMemoryGuardEnabled))
> +
> +#define IS_MM_PAGE_GUARD_ACTIVE (MPS_IS_MM_SIGNATURE_VALID && \
> + gMps.Mm.HeapGuard.PageGuardEnabled && \
> + !IsZeroBuffer (&gMps.Mm.PageGuard.EnabledForType, MPS_MEMORY_TYPE_BUFFER_SIZE))
> +
> +#define IS_MM_POOL_GUARD_ACTIVE (MPS_IS_MM_SIGNATURE_VALID && \
> + gMps.Mm.HeapGuard.PoolGuardEnabled && \
> + !IsZeroBuffer (&gMps.Mm.PoolGuard.EnabledForType, MPS_MEMORY_TYPE_BUFFER_SIZE))
> +
> +#define IS_MM_MEMORY_PROTECTION_ACTIVE (MPS_IS_MM_SIGNATURE_VALID && \
> + (IS_MM_PAGE_GUARD_ACTIVE || \
> + IS_MM_POOL_GUARD_ACTIVE || \
> + gMps.Mm.NullPointerDetection.Enabled));
> +
> +/**
> + Populates gMps global. This function is invoked by the library constructor and only needs to be
> + called if library contructors have not yet been invoked.
> +
> + @retval EFI_SUCCESS gMps global was populated.
> + @retval EFI_NOT_FOUND The gMemoryProtectionSettingsGuid HOB was not found.
> + @retval EFI_ABORTED The version number of the DXE or MM memory protection settings was invalid.
> + @retval EFI_UNSUPPORTED NULL implementation called.
> +**/
> +EFI_STATUS
> +EFIAPI
> +PopulateMpsGlobal (
> + VOID
> + );
> +
> +#endif
> diff --git a/MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h b/MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h
> new file mode 100644
> index 000000000000..023c987c3c7e
> --- /dev/null
> +++ b/MdeModulePkg/Include/Library/SetMemoryProtectionsLib.h
> @@ -0,0 +1,152 @@
> +/** @file
> +Library for creating the MM and DXE memory protection HOB entries.
> +
> +Copyright (c) Microsoft Corporation.
> +SPDX-License-Identifier: BSD-2-Clause-Patent
> +**/
> +
> +#ifndef SET_MEMORY_PROTECTION_SETTINGS_LIB_H_
> +#define SET_MEMORY_PROTECTION_SETTINGS_LIB_H_
> +
> +#include <Guid/MemoryProtectionSettings.h>
> +
> +typedef struct {
> + CHAR8 *Name;
> + CHAR8 *Description;
> + DXE_MEMORY_PROTECTION_SETTINGS Settings;
> +} DXE_MEMORY_PROTECTION_PROFILES;
> +
> +typedef enum {
> + DxeMemoryProtectionSettingsPcd,
> + DxeMemoryProtectionSettingsMax
> +} DXE_MEMORY_PROTECTION_PROFILE_INDEX;
> +
> +typedef struct {
> + CHAR8 *Name;
> + CHAR8 *Description;
> + MM_MEMORY_PROTECTION_SETTINGS Settings;
> +} MM_MEMORY_PROTECTION_PROFILES;
> +
> +typedef enum {
> + MmMemoryProtectionSettingsPcd,
> + MmMemoryProtectionSettingsMax
> +} MM_MEMORY_PROTECTION_PROFILE_INDEX;
> +
> +extern DXE_MEMORY_PROTECTION_PROFILES DxeMemoryProtectionProfiles[DxeMemoryProtectionSettingsMax];
> +extern MM_MEMORY_PROTECTION_PROFILES MmMemoryProtectionProfiles[MmMemoryProtectionSettingsMax];
These names aren't right; global variable names minimally need to start
with "m" (for "module"), or if the thing they refer to is
firmware-global, they should start with "g".
Compare: "gBS", from
"MdePkg/Include/Library/UefiBootServicesTableLib.h". Each module using
UefiBootServicesTableLib will have a copy of that pointer, but it will
point to the same thing.
Laszlo
> +
> +/**
> + Prevent further changes to the memory protection settings via this
> + library API.
> +
> + @retval EFI_SUCCESS The memory protection settings are locked.
> + @retval EFI_ABORTED Unable to get/create the memory protection settings.
> + @retval EFI_UNSUPPORTED NULL implementation called.
> +**/
> +EFI_STATUS
> +EFIAPI
> +LockMemoryProtectionSettings (
> + VOID
> + );
> +
> +/**
> + Sets the DXE memory protection settings. If DxeMps is NULL, the settings will be set based
> + on ProfileIndex.
> +
> + @param[in] DxeMps Pointer to the memory protection settings to publish. If NULL, the
> + settings will be created based on ProfileIndex.
> + @param[in] ProfileIndex The index of the memory protection profile to use if DxeMps is NULL.
> +
> + @retval EFI_SUCCESS The memory protection HOB was successfully created.
> + @retval EFI_INVALID_PARAMETER The ProfileIndex was invalid or the version number of the
> + input DxeMps was not equal to the version currently present
> + in the settings.
> + @retval EFI_ABORTED Unable to get/create the memory protection settings.
> + @retval EFI_ACCESS_DENIED The memory protection settings are locked.
> + @retval EFI_UNSUPPORTED NULL implementation called.
> +**/
> +EFI_STATUS
> +EFIAPI
> +SetDxeMemoryProtectionSettings (
> + IN DXE_MEMORY_PROTECTION_SETTINGS *DxeMps OPTIONAL,
> + IN DXE_MEMORY_PROTECTION_PROFILE_INDEX ProfileIndex
> + );
> +
> +/**
> + Sets the MM memory protection HOB entry. If MmMps is NULL, the settings will be set based
> + on ProfileIndex.
> +
> + @param[in] MmMps Pointer to the memory protection settings to publish. If NULL, the
> + settings will be created based on ProfileIndex.
> + @param[in] ProfileIndex The index of the memory protection profile to use if MmMps is NULL.
> +
> + @retval EFI_SUCCESS The memory protection HOB was successfully created.
> + @retval EFI_OUT_OF_RESOURCES There was insufficient memory to create the HOB.
> + @retval EFI_INVALID_PARAMETER The ProfileIndex was invalid or the version number of the
> + input MmMps was not equal to the version currently present
> + in the settings.
> + @retval EFI_ABORTED Unable to get/create the memory protection settings.
> + @retval EFI_ACCESS_DENIED The memory protection settings are locked.
> + @retval EFI_UNSUPPORTED NULL implementation called.
> +**/
> +EFI_STATUS
> +EFIAPI
> +SetMmMemoryProtectionSettings (
> + IN MM_MEMORY_PROTECTION_SETTINGS *MmMps OPTIONAL,
> + IN MM_MEMORY_PROTECTION_PROFILE_INDEX ProfileIndex
> + );
> +
> +/**
> + Copies the current memory protection settings into the input buffer.
> +
> + NOTE: The returned settings may not be the final settings used by the
> + platform on this boot. Unless LockMemoryProtectionSettings() has
> + been called, settings may be modified by drivers until DXE handoff.
> +
> + @param[out] Mps The memory protection settings pointer to populate.
> +
> + @retval EFI_SUCCESS The memory protection settings were copied
> + into the input buffer.
> + @retval EFI_INVALID_PARAMETER Mps was NULL.
> + @retval EFI_ABORTED Unable to get/create the memory protection settings.
> + @retval EFI_UNSUPPORTED NULL implementation called.
> +**/
> +EFI_STATUS
> +EFIAPI
> +GetCurrentMemoryProtectionSettings (
> + OUT MEMORY_PROTECTION_SETTINGS *Mps
> + );
> +
> +/**
> + Returns TRUE any form of DXE memory protection is currently active.
> +
> + NOTE: The returned value may reflect the final settings used by the
> + platform on this boot. Unless LockMemoryProtectionSettings() has
> + been called, settings may be modified by drivers until DXE handoff.
> +
> + @retval TRUE DXE Memory protection is active.
> + @retval FALSE DXE Memory protection is not active.
> +**/
> +BOOLEAN
> +EFIAPI
> +IsDxeMemoryProtectionActive (
> + VOID
> + );
> +
> +/**
> + Returns TRUE any form of MM memory protection is currently active.
> +
> + NOTE: The returned value may reflect the final settings used by the
> + platform on this boot. Unless LockMemoryProtectionSettings() has
> + been called, settings may be modified by drivers until DXE handoff.
> +
> + @retval TRUE MM Memory protection is active.
> + @retval FALSE MM Memory protection is not active.
> +**/
> +BOOLEAN
> +EFIAPI
> +IsMmMemoryProtectionActive (
> + VOID
> + );
> +
> +#endif
> diff --git a/MdeModulePkg/MdeModulePkg.dec b/MdeModulePkg/MdeModulePkg.dec
> index 5e1a0388bed3..6ad0902a1bff 100644
> --- a/MdeModulePkg/MdeModulePkg.dec
> +++ b/MdeModulePkg/MdeModulePkg.dec
> @@ -164,6 +164,14 @@ [LibraryClasses]
> #
> VariableFlashInfoLib|Include/Library/VariableFlashInfoLib.h
>
> + ## @libraryclass Provides a global for consuming memory protection settings
> + #
> + GetMemoryProtectionsLib|Include/Library/GetMemoryProtectionsLib.h
> +
> + ## @libraryclass Library for creating the memory protection settings HOB
> + #
> + SetMemoryProtectionsLib|Include/Library/SetMemoryProtectionsLib.h
> +
> [Guids]
> ## MdeModule package token space guid
> # Include/Guid/MdeModulePkgTokenSpace.h
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#109442): https://edk2.groups.io/g/devel/message/109442
Mute This Topic: https://groups.io/mt/101843342/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/xyzzy [rebecca@openfw.io]
-=-=-=-=-=-=-=-=-=-=-=-
next prev parent reply other threads:[~2023-10-09 7:52 UTC|newest]
Thread overview: 51+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-09 0:07 [edk2-devel] [PATCH v5 00/28] Implement Dynamic Memory Protection Settings Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 01/28] MdeModulePkg: Add DXE and MM Memory Protection Settings Definitions Taylor Beebe
2023-11-03 5:52 ` Ni, Ray
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 02/28] MdeModulePkg: Define SetMemoryProtectionsLib and GetMemoryProtectionsLib Taylor Beebe
2023-10-09 7:52 ` Laszlo Ersek [this message]
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 03/28] MdeModulePkg: Add NULL Instances for Get/SetMemoryProtectionsLib Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 04/28] MdeModulePkg: Implement SetMemoryProtectionsLib and GetMemoryProtectionsLib Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 05/28] MdeModulePkg: Copy PEI PCD Database Into New Buffer Taylor Beebe
2023-10-09 6:47 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 06/28] MdeModulePkg: Apply Protections to the HOB List Taylor Beebe
2023-10-09 6:54 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 07/28] MdeModulePkg: Check Print Level Before Dumping GCD Memory Map Taylor Beebe
2023-10-09 7:10 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 08/28] UefiCpuPkg: Always Set Stack Guard in MpPei Init Taylor Beebe
2023-10-09 7:28 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 09/28] ArmVirtPkg: Add Memory Protection Library Definitions to Platforms Taylor Beebe
2023-10-09 7:30 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 10/28] OvmfPkg: " Taylor Beebe
2023-10-09 7:47 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 11/28] OvmfPkg: Apply Memory Protections via SetMemoryProtectionsLib Taylor Beebe
2023-10-09 8:19 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 12/28] OvmfPkg: Update PeilessStartupLib to use SetMemoryProtectionsLib Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 13/28] UefiPayloadPkg: Update DXE Handoff " Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 14/28] MdeModulePkg: " Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 15/28] ArmPkg: Use GetMemoryProtectionsLib instead of Memory Protection PCDs Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 16/28] EmulatorPkg: " Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 17/28] OvmfPkg: " Taylor Beebe
2023-10-09 8:29 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 18/28] UefiCpuPkg: " Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 19/28] MdeModulePkg: " Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 20/28] MdeModulePkg: Add Additional Profiles to SetMemoryProtectionsLib Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 21/28] OvmfPkg: Add QemuFwCfgParseString to QemuFwCfgSimpleParserLib Taylor Beebe
2023-10-09 8:40 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 22/28] OvmfPkg: Add MemoryProtectionConfigLib Taylor Beebe
2023-10-09 9:17 ` Laszlo Ersek
2023-10-09 9:22 ` Laszlo Ersek
2023-10-09 9:34 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 23/28] OvmfPkg: Enable Choosing Memory Protection Profile via QemuCfg Taylor Beebe
2023-10-09 9:53 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 24/28] ArmVirtPkg: Apply Memory Protections via SetMemoryProtectionsLib Taylor Beebe
2023-10-09 10:00 ` Laszlo Ersek
2023-10-10 11:48 ` Gerd Hoffmann
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 25/28] MdeModulePkg: Delete PCD Profile from SetMemoryProtectionsLib Taylor Beebe
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 26/28] OvmfPkg: Delete Memory Protection PCDs Taylor Beebe
2023-10-09 10:02 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 27/28] ArmVirtPkg: " Taylor Beebe
2023-10-09 10:02 ` Laszlo Ersek
2023-10-09 0:07 ` [edk2-devel] [PATCH v5 28/28] MdeModulePkg: " Taylor Beebe
2023-10-09 10:03 ` Laszlo Ersek
2023-10-09 14:47 ` Taylor Beebe
2023-10-09 10:16 ` [edk2-devel] [PATCH v5 00/28] Implement Dynamic Memory Protection Settings Yao, Jiewen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=492e83cb-248e-9169-cca1-5f1f8158cffb@redhat.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox