From nobody Thu Dec 18 19:31:19 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+105304+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+105304+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1685025072; cv=none; d=zohomail.com; s=zohoarc; b=XgkS9M61kCIPtreADm8y9FtUV1ntOomLSvidSgvtEAWkqpN5eg4a+Bls4iXKTIxTzO+F6focR2crYH9DZ2vPOL384+7cVGwZp5tnby0Xpx2aTkK/+D7AeQw58qK9BPP9dAePw30NTe8l2D0hmD68MaoR/geGaM9UtflxA/xvo8I= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1685025072; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=KvL2vSb5Jsbl9FV2nb5zoI5omM2bXi1NE2tq7KDyc3M=; b=O5l5mV0Nm++eo3v57hunffdVeCUYkElnlP0GaGsSwPJr9IBll0/uiXC6aqBXJZnfLIMXYMkerRMnMAq4Z1rsf3NgABB6h/WXrFB5M7bBsXhAM2xJvinOuSb+pG1cS08wmTA5sCmmWKuzeTK3uNxzMAHtucFFumZFNur89+LnTcM= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+105304+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1685025072098528.7036256648717; Thu, 25 May 2023 07:31:12 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id QIIMYY1788612xXLy1pbNsYI; Thu, 25 May 2023 07:31:11 -0700 X-Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by mx.groups.io with SMTP id smtpd.web11.13276.1685025071221832890 for ; Thu, 25 May 2023 07:31:11 -0700 X-Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id BC8B36463D; Thu, 25 May 2023 14:31:10 +0000 (UTC) X-Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9DA6DC433A0; Thu, 25 May 2023 14:31:07 +0000 (UTC) From: "Ard Biesheuvel" To: devel@edk2.groups.io Cc: Ard Biesheuvel , Ray Ni , Jiewen Yao , Gerd Hoffmann , Taylor Beebe , Oliver Smith-Denny , Dandan Bi , Liming Gao , "Kinney, Michael D" , Leif Lindholm , Sunil V L , Andrei Warkentin Subject: [edk2-devel] [RFC PATCH 04/10] OvmfPkg/RiscVVirt: Remove unimplemented NxForStack configuration Date: Thu, 25 May 2023 16:30:35 +0200 Message-Id: <20230525143041.1172989-5-ardb@kernel.org> In-Reply-To: <20230525143041.1172989-1-ardb@kernel.org> References: <20230525143041.1172989-1-ardb@kernel.org> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,ardb@kernel.org X-Gm-Message-State: eLZnEErrmJzibARg0s1IITCGx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1685025071; bh=uzcVPEib7VwyyjOLOd8UlO+NtMX29Enj09thmpFM0dA=; h=Cc:Date:From:Reply-To:Subject:To; b=tek0a//NkpUxP2DU8/3K8bb6hcVl8Cd3h8HsyLPDCggOx8CB4xGRZyoSHhmWE1TXmpe 04KRnHPj77t65QeytZ2/Hvju/GvCbQgISFbLPqpEH+HLmRARu2hBDyHxETGRFgjJfRceu 4hjK+3tJMIfsZJjk2hWFGMsOzq2Ggt4EJjk= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1685025073250100001 Content-Type: text/plain; charset="utf-8" The RISC-V version of the DXE IPL does not implement setting the stack NX, so before switching to an implementation that will ASSERT() on the missing support, drop the PCD setting that enables it. Signed-off-by: Ard Biesheuvel Reviewed-by: Sunil V L --- OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc | 6 ------ 1 file changed, 6 deletions(-) diff --git a/OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc b/OvmfPkg/RiscVVirt/RiscVV= irtQemu.dsc index 28d9af4d79b9cc35..414d186179fb16e8 100644 --- a/OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc +++ b/OvmfPkg/RiscVVirt/RiscVVirtQemu.dsc @@ -172,12 +172,6 @@ [PcdsFixedAtBuild.common] gEfiMdeModulePkgTokenSpaceGuid.PcdResetOnMemoryTypeInformationChange|FAL= SE gEfiMdeModulePkgTokenSpaceGuid.PcdBootManagerMenuFile|{ 0x21, 0xaa, 0x2c= , 0x46, 0x14, 0x76, 0x03, 0x45, 0x83, 0x6e, 0x8a, 0xb6, 0xf4, 0x66, 0x23, 0= x31 } =20 - - # - # Enable the non-executable DXE stack. (This gets set up by DxeIpl) - # - gEfiMdeModulePkgTokenSpaceGuid.PcdSetNxForStack|TRUE - !if $(SECURE_BOOT_ENABLE) =3D=3D TRUE # override the default values from SecurityPkg to ensure images from all= sources are verified in secure boot gEfiSecurityPkgTokenSpaceGuid.PcdOptionRomImageVerificationPolicy|0x04 --=20 2.39.2 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#105304): https://edk2.groups.io/g/devel/message/105304 Mute This Topic: https://groups.io/mt/99131182/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-