public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Kinney, Michael D" <michael.d.kinney@intel.com>
To: Ard Biesheuvel <ard.biesheuvel@linaro.org>,
	"Yao, Jiewen" <jiewen.yao@intel.com>,
	"Kinney, Michael D" <michael.d.kinney@intel.com>
Cc: "edk2-devel@lists.01.org" <edk2-devel@lists.01.org>,
	"Tian, Feng" <feng.tian@intel.com>,
	"Zeng, Star" <star.zeng@intel.com>
Subject: Re: [PATCH 3/3] MdeModulePkg/DxeCore: Add UEFI image protection.
Date: Mon, 6 Feb 2017 17:52:55 +0000	[thread overview]
Message-ID: <E92EE9817A31E24EB0585FDF735412F5648B0157@ORSMSX113.amr.corp.intel.com> (raw)
In-Reply-To: <CAKv+Gu_sYOip5mNO0O+H9oqz0gBU9-Yj_g=WZNuzQZCA9ao7tQ@mail.gmail.com>

Jiewen,

Can we simplify the policy setting to 2 bits?  

One for FV images and one for non-FV images?

Thanks,

Mike


> -----Original Message-----
> From: Ard Biesheuvel [mailto:ard.biesheuvel@linaro.org]
> Sent: Monday, February 6, 2017 6:53 AM
> To: Yao, Jiewen <jiewen.yao@intel.com>
> Cc: Kinney, Michael D <michael.d.kinney@intel.com>; edk2-devel@lists.01.org; Tian,
> Feng <feng.tian@intel.com>; Zeng, Star <star.zeng@intel.com>
> Subject: Re: [edk2] [PATCH 3/3] MdeModulePkg/DxeCore: Add UEFI image protection.
> 
> On 6 February 2017 at 14:51, Yao, Jiewen <jiewen.yao@intel.com> wrote:
> > Hi Ard
> >
> > That is a good question.
> >
> >
> >
> > We (Intel) discussed this internally.
> >
> > We do not know if there is any need to make it configurable, so we start
> > from non-configurable, and see if there is any feedback from other one.
> >
> >
> >
> > Glad to hear your voice. We can define a policy like below: (I borrow some
> > definition from security pkg)
> >
> >
> >
> > [PcdsFixedAtBuild, PcdsPatchableInModule]
> >
> >   ## Set Image protection policy. The policy is bitwise.
> >
> >   #  If a bit is set, the image will be protected by DxeCore if it is
> > aligned.
> >
> >   #   The code section becomes read-only, and the data section becomes
> > non-executable.
> >
> >   #  If a bit is clear, the image will not be protected.<BR><BR>
> >
> >   #    BIT0       - Image from unknown device. <BR>
> >
> >   #    BIT1       - Image from firmware volume.<BR>
> >
> >   #    BIT2       - Image from OptionRom.<BR>
> >
> >   #    BIT3       - Image from removable media which includes CD-ROM,
> > Floppy, USB and network.<BR>
> >
> >   #    BIT4       - Image from fixed media device which includes hard
> > disk.<BR>
> >
> >   # @Prompt Set Image protection policy.
> >
> >   # @ValidRange 0x80000002 | 0x00000000 - 0x0000001F
> >
> >
> >
> gEfiMdeModulePkgTokenSpaceGuid.PcdImageProtectionPolicy|0x00000002|UINT32|0x30001047
> >
> >
> >
> > I will use 0x2 as default policy, to maximize the compatibility. And you can
> > set 0x1A or 0x1F for ARM. Is that OK?
> >
> 
> Yes, that would be perfect. Thanks!

      reply	other threads:[~2017-02-06 17:52 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-01-26  8:39 [PATCH 0/3] DXE Memory Protection Jiewen Yao
2017-01-26  8:39 ` [PATCH 1/3] UefiCpuPkg/CpuDxe: Add memory attribute setting Jiewen Yao
2017-02-03  8:51   ` Gao, Liming
2017-02-04  0:42     ` Yao, Jiewen
2017-02-06  3:27   ` Fan, Jeff
2017-02-06  3:58     ` Yao, Jiewen
2017-02-06  5:26       ` Fan, Jeff
2017-02-06  5:28         ` Yao, Jiewen
2017-01-26  8:39 ` [PATCH 2/3] ArmPkg/CpuDxe: Correct EFI_MEMORY_RO usage Jiewen Yao
2017-01-26 12:11   ` Leif Lindholm
2017-01-26 12:17     ` Yao, Jiewen
2017-01-26  8:39 ` [PATCH 3/3] MdeModulePkg/DxeCore: Add UEFI image protection Jiewen Yao
2017-02-03  8:39   ` Gao, Liming
2017-02-04  0:41     ` Yao, Jiewen
2017-02-04  3:39       ` Gao, Liming
2017-02-06  1:07         ` Tian, Feng
2017-02-06  1:39           ` Yao, Jiewen
2017-02-06 14:34   ` Ard Biesheuvel
2017-02-06 14:51     ` Yao, Jiewen
2017-02-06 14:52       ` Ard Biesheuvel
2017-02-06 17:52         ` Kinney, Michael D [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=E92EE9817A31E24EB0585FDF735412F5648B0157@ORSMSX113.amr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox