[edk2-devel] [PATCH v2 0/2] UEFI memmap workaround for hiding page-access caps from OSes hides SP and CRYPTO caps too
Laszlo Ersek
lersek at redhat.com
Thu Sep 24 13:04:04 UTC 2020
On 09/24/20 12:21, Malgorzata Kukiello wrote:
> REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2982
>
> The workaround in the UEFI memmap construction, near the end of the
> function CoreGetMemoryMap() [MdeModulePkg/Core/Dxe/Mem/Page.c] should
> not clear the SP and CRYPTO bits, because OSes do (apparently) correctly
> interpret SP and CRYPTO as capabilities, and not as currently set
> attributes (upon which the OSes should set their page tables). For this
> reason, the SP and CRYPTO bits should be separated from the bitmask that
> we use for hiding the page-access attributes, in the workaround
>
> Signed-off-by: Malgorzata Kukiello <jacek.kukiello at intel.com>
> Cc: Michael D Kinney <michael.d.kinney at intel.com>
> Cc: Jian J Wang <jian.j.wang at intel.com>
> Cc: Hao A Wu <hao.a.wu at intel.com>
> Cc: Dandan Bi <dandan.bi at intel.com>
> Cc: Liming Gao <gaoliming at byosoft.com.cn>
> Cc: Zhiguang Liu <zhiguang.liu at intel.com>
> Cc: Oleksiy Yakovlev <oleksiyy at ami.com>
> Cc: Ard Biesheuvel (ARM address) <ard.biesheuvel at arm.com>
>
> MdeModulePkg/Core/Dxe/Mem/Page.c | 12 ++++++------
> MdePkg/Include/Uefi/UefiSpec.h | 3 ++-
> 2 files changed, 8 insertions(+), 7 deletions(-)
series
Reviewed-by: Laszlo Ersek <lersek at redhat.com>
-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#65569): https://edk2.groups.io/g/devel/message/65569
Mute This Topic: https://groups.io/mt/77056340/1813853
Group Owner: devel+owner at edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub [edk2-devel-archive at redhat.com]
-=-=-=-=-=-=-=-=-=-=-=-
More information about the edk2-devel-archive
mailing list