From nobody Sun Feb 8 18:44:49 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+106836+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+106836+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1689119593; cv=none; d=zohomail.com; s=zohoarc; b=SggdiNuEMQJr5osNxI7RBX+DNdCjI9oCed6uJJU4KcBSWg+dAtD4NEZphjaYerkKXXe4B2B3XYPWcrrgrGTDqaAmvJ9NYEtzVR2L2hQ5At5WSQcSoap8QPQonjNzz85aqfohx3DX6w5GET6ysOOqvLu2EwZzLlM6gXr7PwGaDeI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1689119593; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=ZX1kpBvFdlWP+02toQLYzasgon+N2087SgR092XCmDM=; b=HRKbUDxN7QJNXhGrnP4xQL1AkzKiFUF41tQKhqzeCIOu0880jV2CbDoMPTmuIDzQua7BA5g6dmZ/x57th5begmEaI/auxFc0TbsNJvMI43dmkE9RKU92sRsl3rE1p71WTfQWK+T9wanchfMwm7eQOzpfQhCmcAHeXDc+j6diTQY= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+106836+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1689119593781988.3619479836053; Tue, 11 Jul 2023 16:53:13 -0700 (PDT) Return-Path: DKIM-Signature: a=rsa-sha256; bh=CdS7T4FBx6TmFx4oAlksddcFdMYVOSIOwaaiolexFDA=; c=relaxed/simple; d=groups.io; h=X-Received:X-Received:X-Received:X-Gm-Message-State:X-Google-Smtp-Source:X-Received:X-Received:From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:Precedence:List-Unsubscribe:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:Content-Transfer-Encoding; s=20140610; t=1689119593; v=1; b=IaYdgB/aR6m1aDt9LVO8c5fScCyCOgPJ+IkEuyCn0CeIzpW02JUDIBJPpryFEaGuug8n5rr8 5SFbL071TAqihtKYIZ2Q3Y6HdUsKvWdkiQtHolzJfatBumlKmhpAzrly0bgx0HFN8CnHeLjINzt XJHdiMvHzfsGYY9PoOjp9xw0= X-Received: by 127.0.0.2 with SMTP id LuOjYY1788612xgripXjurrU; Tue, 11 Jul 2023 16:53:13 -0700 X-Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web10.1860.1689119592206278394 for ; Tue, 11 Jul 2023 16:53:12 -0700 X-Received: by mail-pf1-f171.google.com with SMTP id d2e1a72fcca58-6726d5d92afso99114b3a.1 for ; Tue, 11 Jul 2023 16:53:12 -0700 (PDT) X-Gm-Message-State: 92Ajax0kTt0a5H3s2gU9xVcbx1787277AA= X-Google-Smtp-Source: APBJJlFfWPlqajWTTnWUjBdo3O6rWEP20olPlGD31oEbjsK0YurYaSrHBR3Y946CdbU+aHHg6WCVIw== X-Received: by 2002:a05:6a20:3c8d:b0:12c:8aa2:8b59 with SMTP id b13-20020a056a203c8d00b0012c8aa28b59mr302598pzj.28.1689119591615; Tue, 11 Jul 2023 16:53:11 -0700 (PDT) X-Received: from localhost.localdomain ([50.46.230.135]) by smtp.gmail.com with ESMTPSA id a13-20020a62e20d000000b00660d80087a8sm2232677pfi.187.2023.07.11.16.53.11 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 11 Jul 2023 16:53:11 -0700 (PDT) From: "Taylor Beebe" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Leif Lindholm , Sami Mujawar , Gerd Hoffmann Subject: [edk2-devel] [PATCH 14/14] MdeModulePkg: Delete Memory Protection PCDs Date: Tue, 11 Jul 2023 16:52:50 -0700 Message-ID: <1aaf5939a7b5cf6dabbacfd51b4caa08032d5d11.1689101263.git.t@taylorbeebe.com> In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,t@taylorbeebe.com Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1689119594037100052 Content-Type: text/plain; charset="utf-8" From: Taylor Beebe Now that references in the rest of the codebase have been updated to reference the memory protection HOB, delete the memory protection PCDs. Signed-off-by: Taylor Beebe Cc: Ard Biesheuvel Cc: Leif Lindholm Cc: Sami Mujawar Cc: Gerd Hoffmann --- ArmVirtPkg/ArmVirt.dsc.inc | 15 --------------- ArmVirtPkg/ArmVirtCloudHv.dsc | 5 ----- ArmVirtPkg/ArmVirtQemu.dsc | 5 ----- 3 files changed, 25 deletions(-) diff --git a/ArmVirtPkg/ArmVirt.dsc.inc b/ArmVirtPkg/ArmVirt.dsc.inc index 3174b19e51..e1eb189077 100644 --- a/ArmVirtPkg/ArmVirt.dsc.inc +++ b/ArmVirtPkg/ArmVirt.dsc.inc @@ -363,21 +363,6 @@ gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiLoaderCode|20 gEmbeddedTokenSpaceGuid.PcdMemoryTypeEfiLoaderData|0 =20 - # - # Enable strict image permissions for all images. (This applies - # only to images that were built with >=3D 4 KB section alignment.) - # - gEfiMdeModulePkgTokenSpaceGuid.PcdImageProtectionPolicy|0x3 - - # - # Enable NX memory protection for all non-code regions, including OEM an= d OS - # reserved ones, with the exception of LoaderData regions, of which OS l= oaders - # (i.e., GRUB) may assume that its contents are executable. - # - gEfiMdeModulePkgTokenSpaceGuid.PcdDxeNxMemoryProtectionPolicy|0xC0000000= 00007FD5 - - gEfiMdeModulePkgTokenSpaceGuid.PcdCpuStackGuard|TRUE - [Components.common] # # Ramdisk support diff --git a/ArmVirtPkg/ArmVirtCloudHv.dsc b/ArmVirtPkg/ArmVirtCloudHv.dsc index c975e139a2..c4c3e0da44 100644 --- a/ArmVirtPkg/ArmVirtCloudHv.dsc +++ b/ArmVirtPkg/ArmVirtCloudHv.dsc @@ -140,11 +140,6 @@ # gEmbeddedTokenSpaceGuid.PcdPrePiCpuIoSize|16 =20 - # - # Enable the non-executable DXE stack. (This gets set up by DxeIpl) - # - gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack|TRUE - !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE # override the default values from SecurityPkg to ensure images from all= sources are verified in secure boot gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04 diff --git a/ArmVirtPkg/ArmVirtQemu.dsc b/ArmVirtPkg/ArmVirtQemu.dsc index 1e0225951a..214e08b789 100644 --- a/ArmVirtPkg/ArmVirtQemu.dsc +++ b/ArmVirtPkg/ArmVirtQemu.dsc @@ -212,11 +212,6 @@ # gEmbeddedTokenSpaceGuid.PcdPrePiCpuIoSize|16 =20 - # - # Enable the non-executable DXE stack. (This gets set up by DxeIpl) - # - gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack|TRUE - !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE # override the default values from SecurityPkg to ensure images from all= sources are verified in secure boot gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04 --=20 2.41.0.windows.2 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#106836): https://edk2.groups.io/g/devel/message/106836 Mute This Topic: https://groups.io/mt/100090647/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-