You are right.

I propose to add Arm and X86 specific folder - just include PA calculation.
We can leave the generic function in common folder.

The final layout can be:
StandaloneMmPkg/Library/MmMemLib/MmMemLib.c
StandaloneMmPkg/Library/MmMemLib/MmMemLib.inf
StandaloneMmPkg/Library/MmMemLib/Arm/ArchSpecific.c
StandaloneMmPkg/Library/MmMemLib/AArch64/ArchSpecific.c 
StandaloneMmPkg/Library/MmMemLib/Ia32/ArchSpecific.c
StandaloneMmPkg/Library/MmMemLib/X64/ArchSpecific.c

Thank you
Yao Jiewen

> -----Original Message-----
> From: Achin Gupta [mailto:achin.gu...@arm.com]
> Sent: Wednesday, April 25, 2018 3:36 AM
> To: Yao, Jiewen <jiewen....@intel.com>
> Cc: Supreeth Venkatesh <supreeth.venkat...@arm.com>;
> ard.biesheu...@linaro.org; edk2-devel@lists.01.org; leif.lindh...@linaro.org;
> Gao, Liming <liming....@intel.com>; Kinney, Michael D
> <michael.d.kin...@intel.com>; n...@arm.com
> Subject: Re: [edk2] [PATCH v1 08/18] StandaloneMmPkg/MemLib: AARCH64
> Specific instance of memory check library.
> 
> Hi Jiewen,
> 
> On Mon, Apr 16, 2018 at 10:30:55PM +0000, Yao, Jiewen wrote:
> > Hi
> > I don't think this lib is generic, because it hardcode the physical address 
> > bits.
> >
> > PhysicalAddressBits = 36;
> >
> > For X86 CPU, we get it from CPUID. :-)
> >
> > As enhancement, we may put most common C-code logic (such as CopyMem,
> or memmap calculation) to StandaloneMmPkg/MemLib, and only include the
> PhysicalAddresBit calculation under StandaloneMmPkg/MemLib/Arm folder.
> >
> > As such, we know clearly on which one is ARM specific.
> 
> My point was that the hardocoded PA bits were not introduced to make this code
> work on Arm. This has been present in the StandaloneMmPkg from the outset. I
> guess for x86 you have moved on to getting this information from the
> CPUID. Afaics, this function is not be used on Arm platforms but Supreeth will
> double check. If that is the case then only the generic library will be 
> required
> minus this function.
> 
> cheers,
> Achin
> 
> >
> > Thank you
> > Yao Jiewen
> >
> > > -----Original Message-----
> > > From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of
> Achin
> > > Gupta
> > > Sent: Monday, April 16, 2018 11:13 PM
> > > To: Supreeth Venkatesh <supreeth.venkat...@arm.com>
> > > Cc: ard.biesheu...@linaro.org; edk2-devel@lists.01.org;
> > > leif.lindh...@linaro.org; Yao, Jiewen <jiewen....@intel.com>; Gao, Liming
> > > <liming....@intel.com>; Kinney, Michael D <michael.d.kin...@intel.com>;
> > > n...@arm.com
> > > Subject: Re: [edk2] [PATCH v1 08/18] StandaloneMmPkg/MemLib: AARCH64
> > > Specific instance of memory check library.
> > >
> > > Hi Supreeth,
> > >
> > > On Fri, Apr 06, 2018 at 03:42:13PM +0100, Supreeth Venkatesh wrote:
> > > > MM memory check library library implementation. This library consumes
> > > > MM_ACCESS_PROTOCOL to get MMRAM information. In order to use this
> > > > library instance, the platform should produce all MMRAM range via
> > > > MM_ACCESS_PROTOCOL, including the range for firmware (like MM Core
> > > > and MM driver) and/or specific dedicated hardware.
> > > >
> > > > This patch provides services for MM Memory Operation.
> > > > The management mode Mem Library provides function for checking if
> buffer
> > > > is outside MMRAM and valid. It also provides functions for copy data
> > > > from MMRAM to non-MMRAM, from non-MMRAM to MMRAM,
> > > > from non-MMRAM to non-MMRAM, or set data in non-MMRAM.
> > > >
> > > > Contributed-under: TianoCore Contribution Agreement 1.1
> > > > Signed-off-by: Achin Gupta <achin.gu...@arm.com>
> > > > Signed-off-by: Supreeth Venkatesh <supreeth.venkat...@arm.com>
> > > > ---
> > > >  StandaloneMmPkg/Include/Library/MemLib.h    | 140
> ++++++++++++++
> > > >  StandaloneMmPkg/Library/MemLib/Arm/MemLib.c | 276
> > > ++++++++++++++++++++++++++++
> > >
> > > Why is this Library Arm specific. Apart from cosmetics tweaks, it has not
> > > changed since it was originally contributed?
> > >
> > > cheers,
> > > Achin
> > >
> > > >  StandaloneMmPkg/Library/MemLib/MemLib.inf   |  47 +++++
> > > >  3 files changed, 463 insertions(+)
> > > >  create mode 100644 StandaloneMmPkg/Include/Library/MemLib.h
> > > >  create mode 100644 StandaloneMmPkg/Library/MemLib/Arm/MemLib.c
> > > >  create mode 100644 StandaloneMmPkg/Library/MemLib/MemLib.inf
> > > >
> > > > diff --git a/StandaloneMmPkg/Include/Library/MemLib.h
> > > b/StandaloneMmPkg/Include/Library/MemLib.h
> > > > new file mode 100644
> > > > index 0000000000..3264f10010
> > > > --- /dev/null
> > > > +++ b/StandaloneMmPkg/Include/Library/MemLib.h
> > > > @@ -0,0 +1,140 @@
> > > > +/** @file
> > > > +  Provides services for MM Memory Operation.
> > > > +
> > > > +  The MM Mem Library provides function for checking if buffer is 
> > > > outside
> > > MMRAM and valid.
> > > > +  It also provides functions for copy data from MMRAM to non-MMRAM,
> > > from non-MMRAM to MMRAM,
> > > > +  from non-MMRAM to non-MMRAM, or set data in non-MMRAM.
> > > > +
> > > > +  Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
> > > > +  Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.<BR>
> > > > +
> > > > +  This program and the accompanying materials
> > > > +  are licensed and made available under the terms and conditions of the
> BSD
> > > License
> > > > +  which accompanies this distribution.  The full text of the license 
> > > > may
> be
> > > found at
> > > > +  http://opensource.org/licenses/bsd-license.php
> > > > +
> > > > +  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS
> IS"
> > > BASIS,
> > > > +  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER
> > > EXPRESS OR IMPLIED.
> > > > +
> > > > +**/
> > > > +
> > > > +#ifndef _MM_MEM_LIB_H_
> > > > +#define _MM_MEM_LIB_H_
> > > > +
> > > > +/**
> > > > +  This function check if the buffer is valid per processor 
> > > > architecture and
> not
> > > overlap with MMRAM.
> > > > +
> > > > +  @param Buffer  The buffer start address to be checked.
> > > > +  @param Length  The buffer length to be checked.
> > > > +
> > > > +  @retval TRUE  This buffer is valid per processor architecture and not
> > > overlap with MMRAM.
> > > > +  @retval FALSE This buffer is not valid per processor architecture or
> overlap
> > > with MMRAM.
> > > > +**/
> > > > +BOOLEAN
> > > > +EFIAPI
> > > > +MmIsBufferOutsideMmValid (
> > > > +  IN EFI_PHYSICAL_ADDRESS  Buffer,
> > > > +  IN UINT64                Length
> > > > +  );
> > > > +
> > > > +/**
> > > > +  Copies a source buffer (non-MMRAM) to a destination buffer
> (MMRAM).
> > > > +
> > > > +  This function copies a source buffer (non-MMRAM) to a destination
> buffer
> > > (MMRAM).
> > > > +  It checks if source buffer is valid per processor architecture and 
> > > > not
> overlap
> > > with MMRAM.
> > > > +  If the check passes, it copies memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it return EFI_SECURITY_VIOLATION.
> > > > +  The implementation must be reentrant.
> > > > +
> > > > +  @param  DestinationBuffer   The pointer to the destination buffer of
> the
> > > memory copy.
> > > > +  @param  SourceBuffer        The pointer to the source buffer of
> the
> > > memory copy.
> > > > +  @param  Length              The number of bytes to copy from
> > > SourceBuffer to DestinationBuffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is copied.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmCopyMemToSmram (
> > > > +  OUT VOID       *DestinationBuffer,
> > > > +  IN CONST VOID  *SourceBuffer,
> > > > +  IN UINTN       Length
> > > > +  );
> > > > +
> > > > +/**
> > > > +  Copies a source buffer (MMRAM) to a destination buffer
> (NON-MMRAM).
> > > > +
> > > > +  This function copies a source buffer (non-MMRAM) to a destination
> buffer
> > > (MMRAM).
> > > > +  It checks if destination buffer is valid per processor architecture 
> > > > and not
> > > overlap with MMRAM.
> > > > +  If the check passes, it copies memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it returns EFI_SECURITY_VIOLATION.
> > > > +  The implementation must be reentrant.
> > > > +
> > > > +  @param  DestinationBuffer   The pointer to the destination buffer of
> the
> > > memory copy.
> > > > +  @param  SourceBuffer        The pointer to the source buffer of
> the
> > > memory copy.
> > > > +  @param  Length              The number of bytes to copy from
> > > SourceBuffer to DestinationBuffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is copied.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmCopyMemFromSmram (
> > > > +  OUT VOID       *DestinationBuffer,
> > > > +  IN CONST VOID  *SourceBuffer,
> > > > +  IN UINTN       Length
> > > > +  );
> > > > +
> > > > +/**
> > > > +  Copies a source buffer (NON-MMRAM) to a destination buffer
> > > (NON-MMRAM).
> > > > +
> > > > +  This function copies a source buffer (non-MMRAM) to a destination
> buffer
> > > (MMRAM).
> > > > +  It checks if source buffer and destination buffer are valid per 
> > > > processor
> > > architecture and not overlap with MMRAM.
> > > > +  If the check passes, it copies memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it returns EFI_SECURITY_VIOLATION.
> > > > +  The implementation must be reentrant, and it must handle the case
> where
> > > source buffer overlaps destination buffer.
> > > > +
> > > > +  @param  DestinationBuffer   The pointer to the destination buffer of
> the
> > > memory copy.
> > > > +  @param  SourceBuffer        The pointer to the source buffer of
> the
> > > memory copy.
> > > > +  @param  Length              The number of bytes to copy from
> > > SourceBuffer to DestinationBuffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is copied.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmCopyMem (
> > > > +  OUT VOID       *DestinationBuffer,
> > > > +  IN CONST VOID  *SourceBuffer,
> > > > +  IN UINTN       Length
> > > > +  );
> > > > +
> > > > +/**
> > > > +  Fills a target buffer (NON-MMRAM) with a byte value.
> > > > +
> > > > +  This function fills a target buffer (non-MMRAM) with a byte value.
> > > > +  It checks if target buffer is valid per processor architecture and 
> > > > not
> overlap
> > > with MMRAM.
> > > > +  If the check passes, it fills memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it returns EFI_SECURITY_VIOLATION.
> > > > +
> > > > +  @param  Buffer    The memory to set.
> > > > +  @param  Length    The number of bytes to set.
> > > > +  @param  Value     The value with which to fill Length bytes of
> Buffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The Buffer is invalid per processor
> > > architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is set.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmSetMem (
> > > > +  OUT VOID  *Buffer,
> > > > +  IN UINTN  Length,
> > > > +  IN UINT8  Value
> > > > +  );
> > > > +
> > > > +#endif
> > > > diff --git a/StandaloneMmPkg/Library/MemLib/Arm/MemLib.c
> > > b/StandaloneMmPkg/Library/MemLib/Arm/MemLib.c
> > > > new file mode 100644
> > > > index 0000000000..432a45698b
> > > > --- /dev/null
> > > > +++ b/StandaloneMmPkg/Library/MemLib/Arm/MemLib.c
> > > > @@ -0,0 +1,276 @@
> > > > +/** @file
> > > > +  Instance of MM memory check library.
> > > > +
> > > > +  MM memory check library library implementation. This library
> consumes
> > > MM_ACCESS_PROTOCOL
> > > > +  to get MMRAM information. In order to use this library instance, the
> > > platform should produce
> > > > +  all MMRAM range via MM_ACCESS_PROTOCOL, including the range for
> > > firmware (like MM Core
> > > > +  and MM driver) and/or specific dedicated hardware.
> > > > +
> > > > +  Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
> > > > +  Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.<BR>
> > > > +
> > > > +  This program and the accompanying materials
> > > > +  are licensed and made available under the terms and conditions of the
> BSD
> > > License
> > > > +  which accompanies this distribution.  The full text of the license 
> > > > may
> be
> > > found at
> > > > +  http://opensource.org/licenses/bsd-license.php
> > > > +
> > > > +  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS
> IS"
> > > BASIS,
> > > > +  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER
> > > EXPRESS OR IMPLIED.
> > > > +
> > > > +**/
> > > > +
> > > > +
> > > > +#include <PiMm.h>
> > > > +
> > > > +#include <Library/BaseLib.h>
> > > > +#include <Library/BaseMemoryLib.h>
> > > > +#include <Library/DebugLib.h>
> > > > +
> > > > +EFI_MMRAM_DESCRIPTOR *mMmMemLibInternalMmramRanges;
> > > > +UINTN                mMmMemLibInternalMmramCount;
> > > > +
> > > > +//
> > > > +// Maximum support address used to check input buffer
> > > > +//
> > > > +EFI_PHYSICAL_ADDRESS
> mMmMemLibInternalMaximumSupportAddress =
> > > 0;
> > > > +
> > > > +/**
> > > > +  Calculate and save the maximum support address.
> > > > +
> > > > +**/
> > > > +VOID
> > > > +MmMemLibInternalCalculateMaximumSupportAddress (
> > > > +  VOID
> > > > +  )
> > > > +{
> > > > +  UINT8        PhysicalAddressBits;
> > > > +
> > > > +  PhysicalAddressBits = 36;
> > > > +
> > > > +  //
> > > > +  // Save the maximum support address in one global variable
> > > > +  //
> > > > +  mMmMemLibInternalMaximumSupportAddress =
> > > (EFI_PHYSICAL_ADDRESS)(UINTN)(LShiftU64 (1, PhysicalAddressBits) - 1);
> > > > +  DEBUG ((DEBUG_INFO,
> "mMmMemLibInternalMaximumSupportAddress =
> > > 0x%lx\n", mMmMemLibInternalMaximumSupportAddress));
> > > > +}
> > > > +
> > > > +/**
> > > > +  This function check if the buffer is valid per processor 
> > > > architecture and
> not
> > > overlap with MMRAM.
> > > > +
> > > > +  @param Buffer  The buffer start address to be checked.
> > > > +  @param Length  The buffer length to be checked.
> > > > +
> > > > +  @retval TRUE  This buffer is valid per processor architecture and not
> > > overlap with MMRAM.
> > > > +  @retval FALSE This buffer is not valid per processor architecture or
> overlap
> > > with MMRAM.
> > > > +**/
> > > > +BOOLEAN
> > > > +EFIAPI
> > > > +MmIsBufferOutsideMmValid (
> > > > +  IN EFI_PHYSICAL_ADDRESS  Buffer,
> > > > +  IN UINT64                Length
> > > > +  )
> > > > +{
> > > > +  UINTN  Index;
> > > > +
> > > > +  //
> > > > +  // Check override.
> > > > +  // NOTE: (B:0->L:4G) is invalid for IA32, but 
> > > > (B:1->L:4G-1)/(B:4G-1->L:1)
> is
> > > valid.
> > > > +  //
> > > > +  if ((Length > mMmMemLibInternalMaximumSupportAddress) ||
> > > > +      (Buffer > mMmMemLibInternalMaximumSupportAddress) ||
> > > > +      ((Length != 0) && (Buffer >
> > > (mMmMemLibInternalMaximumSupportAddress - (Length - 1)))) ) {
> > > > +    //
> > > > +    // Overflow happen
> > > > +    //
> > > > +    DEBUG ((
> > > > +      DEBUG_ERROR,
> > > > +      "MmIsBufferOutsideMmValid: Overflow: Buffer (0x%lx) - Length
> > > (0x%lx), MaximumSupportAddress (0x%lx)\n",
> > > > +      Buffer,
> > > > +      Length,
> > > > +      mMmMemLibInternalMaximumSupportAddress
> > > > +      ));
> > > > +    return FALSE;
> > > > +  }
> > > > +
> > > > +  for (Index = 0; Index < mMmMemLibInternalMmramCount; Index ++) {
> > > > +    if (((Buffer >= mMmMemLibInternalMmramRanges[Index].CpuStart)
> &&
> > > (Buffer < mMmMemLibInternalMmramRanges[Index].CpuStart +
> > > mMmMemLibInternalMmramRanges[Index].PhysicalSize)) ||
> > > > +        ((mMmMemLibInternalMmramRanges[Index].CpuStart >=
> Buffer)
> > > && (mMmMemLibInternalMmramRanges[Index].CpuStart < Buffer +
> Length))) {
> > > > +      DEBUG ((
> > > > +        DEBUG_ERROR,
> > > > +        "MmIsBufferOutsideMmValid: Overlap: Buffer (0x%lx) - Length
> > > (0x%lx), ",
> > > > +        Buffer,
> > > > +        Length
> > > > +        ));
> > > > +      DEBUG ((
> > > > +        DEBUG_ERROR,
> > > > +        "CpuStart (0x%lx) - PhysicalSize (0x%lx)\n",
> > > > +        mMmMemLibInternalMmramRanges[Index].CpuStart,
> > > > +        mMmMemLibInternalMmramRanges[Index].PhysicalSize
> > > > +        ));
> > > > +      return FALSE;
> > > > +    }
> > > > +  }
> > > > +
> > > > +  return TRUE;
> > > > +}
> > > > +
> > > > +/**
> > > > +  Copies a source buffer (non-MMRAM) to a destination buffer
> (MMRAM).
> > > > +
> > > > +  This function copies a source buffer (non-MMRAM) to a destination
> buffer
> > > (MMRAM).
> > > > +  It checks if source buffer is valid per processor architecture and 
> > > > not
> overlap
> > > with MMRAM.
> > > > +  If the check passes, it copies memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it return EFI_SECURITY_VIOLATION.
> > > > +  The implementation must be reentrant.
> > > > +
> > > > +  @param  DestinationBuffer   The pointer to the destination buffer of
> the
> > > memory copy.
> > > > +  @param  SourceBuffer        The pointer to the source buffer of
> the
> > > memory copy.
> > > > +  @param  Length              The number of bytes to copy from
> > > SourceBuffer to DestinationBuffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is copied.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmCopyMemToMmram (
> > > > +  OUT VOID       *DestinationBuffer,
> > > > +  IN CONST VOID  *SourceBuffer,
> > > > +  IN UINTN       Length
> > > > +  )
> > > > +{
> > > > +  if (!MmIsBufferOutsideMmValid
> > > ((EFI_PHYSICAL_ADDRESS)(UINTN)SourceBuffer, Length)) {
> > > > +    DEBUG ((DEBUG_ERROR, "MmCopyMemToMmram: Security
> Violation:
> > > Source (0x%x), Length (0x%x)\n", SourceBuffer, Length));
> > > > +    return EFI_SECURITY_VIOLATION;
> > > > +  }
> > > > +  CopyMem (DestinationBuffer, SourceBuffer, Length);
> > > > +  return EFI_SUCCESS;
> > > > +}
> > > > +
> > > > +/**
> > > > +  Copies a source buffer (MMRAM) to a destination buffer
> (NON-MMRAM).
> > > > +
> > > > +  This function copies a source buffer (non-MMRAM) to a destination
> buffer
> > > (MMRAM).
> > > > +  It checks if destination buffer is valid per processor architecture 
> > > > and not
> > > overlap with MMRAM.
> > > > +  If the check passes, it copies memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it returns EFI_SECURITY_VIOLATION.
> > > > +  The implementation must be reentrant.
> > > > +
> > > > +  @param  DestinationBuffer   The pointer to the destination buffer of
> the
> > > memory copy.
> > > > +  @param  SourceBuffer        The pointer to the source buffer of
> the
> > > memory copy.
> > > > +  @param  Length              The number of bytes to copy from
> > > SourceBuffer to DestinationBuffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is copied.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmCopyMemFromMmram (
> > > > +  OUT VOID       *DestinationBuffer,
> > > > +  IN CONST VOID  *SourceBuffer,
> > > > +  IN UINTN       Length
> > > > +  )
> > > > +{
> > > > +  if (!MmIsBufferOutsideMmValid
> > > ((EFI_PHYSICAL_ADDRESS)(UINTN)DestinationBuffer, Length)) {
> > > > +    DEBUG ((DEBUG_ERROR, "MmCopyMemFromMmram: Security
> > > Violation: Destination (0x%x), Length (0x%x)\n", DestinationBuffer, 
> > > Length));
> > > > +    return EFI_SECURITY_VIOLATION;
> > > > +  }
> > > > +  CopyMem (DestinationBuffer, SourceBuffer, Length);
> > > > +  return EFI_SUCCESS;
> > > > +}
> > > > +
> > > > +/**
> > > > +  Copies a source buffer (NON-MMRAM) to a destination buffer
> > > (NON-MMRAM).
> > > > +
> > > > +  This function copies a source buffer (non-MMRAM) to a destination
> buffer
> > > (MMRAM).
> > > > +  It checks if source buffer and destination buffer are valid per 
> > > > processor
> > > architecture and not overlap with MMRAM.
> > > > +  If the check passes, it copies memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it returns EFI_SECURITY_VIOLATION.
> > > > +  The implementation must be reentrant, and it must handle the case
> where
> > > source buffer overlaps destination buffer.
> > > > +
> > > > +  @param  DestinationBuffer   The pointer to the destination buffer of
> the
> > > memory copy.
> > > > +  @param  SourceBuffer        The pointer to the source buffer of
> the
> > > memory copy.
> > > > +  @param  Length              The number of bytes to copy from
> > > SourceBuffer to DestinationBuffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The DesinationBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SECURITY_VIOLATION The SourceBuffer is invalid per
> > > processor architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is copied.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmCopyMem (
> > > > +  OUT VOID       *DestinationBuffer,
> > > > +  IN CONST VOID  *SourceBuffer,
> > > > +  IN UINTN       Length
> > > > +  )
> > > > +{
> > > > +  if (!MmIsBufferOutsideMmValid
> > > ((EFI_PHYSICAL_ADDRESS)(UINTN)DestinationBuffer, Length)) {
> > > > +    DEBUG ((DEBUG_ERROR, "MmCopyMem: Security Violation:
> Destination
> > > (0x%x), Length (0x%x)\n", DestinationBuffer, Length));
> > > > +    return EFI_SECURITY_VIOLATION;
> > > > +  }
> > > > +  if (!MmIsBufferOutsideMmValid
> > > ((EFI_PHYSICAL_ADDRESS)(UINTN)SourceBuffer, Length)) {
> > > > +    DEBUG ((DEBUG_ERROR, "MmCopyMem: Security Violation: Source
> > > (0x%x), Length (0x%x)\n", SourceBuffer, Length));
> > > > +    return EFI_SECURITY_VIOLATION;
> > > > +  }
> > > > +  CopyMem (DestinationBuffer, SourceBuffer, Length);
> > > > +  return EFI_SUCCESS;
> > > > +}
> > > > +
> > > > +/**
> > > > +  Fills a target buffer (NON-MMRAM) with a byte value.
> > > > +
> > > > +  This function fills a target buffer (non-MMRAM) with a byte value.
> > > > +  It checks if target buffer is valid per processor architecture and 
> > > > not
> overlap
> > > with MMRAM.
> > > > +  If the check passes, it fills memory and returns EFI_SUCCESS.
> > > > +  If the check fails, it returns EFI_SECURITY_VIOLATION.
> > > > +
> > > > +  @param  Buffer    The memory to set.
> > > > +  @param  Length    The number of bytes to set.
> > > > +  @param  Value     The value with which to fill Length bytes of
> Buffer.
> > > > +
> > > > +  @retval EFI_SECURITY_VIOLATION The Buffer is invalid per processor
> > > architecture or overlap with MMRAM.
> > > > +  @retval EFI_SUCCESS            Memory is set.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MmSetMem (
> > > > +  OUT VOID  *Buffer,
> > > > +  IN UINTN  Length,
> > > > +  IN UINT8  Value
> > > > +  )
> > > > +{
> > > > +  if (!MmIsBufferOutsideMmValid
> ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer,
> > > Length)) {
> > > > +    DEBUG ((DEBUG_ERROR, "MmSetMem: Security Violation: Source
> > > (0x%x), Length (0x%x)\n", Buffer, Length));
> > > > +    return EFI_SECURITY_VIOLATION;
> > > > +  }
> > > > +  SetMem (Buffer, Length, Value);
> > > > +  return EFI_SUCCESS;
> > > > +}
> > > > +
> > > > +/**
> > > > +  The constructor function initializes the Mm Mem library
> > > > +
> > > > +  @param  ImageHandle   The firmware allocated handle for the EFI
> > > image.
> > > > +  @param  SystemTable   A pointer to the EFI System Table.
> > > > +
> > > > +  @retval EFI_SUCCESS   The constructor always returns EFI_SUCCESS.
> > > > +
> > > > +**/
> > > > +EFI_STATUS
> > > > +EFIAPI
> > > > +MemLibConstructor (
> > > > +  IN EFI_HANDLE             ImageHandle,
> > > > +  IN EFI_MM_SYSTEM_TABLE    *MmSystemTable
> > > > +  )
> > > > +{
> > > > +
> > > > +  //
> > > > +  // Calculate and save maximum support address
> > > > +  //
> > > > +  MmMemLibInternalCalculateMaximumSupportAddress ();
> > > > +
> > > > +  return EFI_SUCCESS;
> > > > +}
> > > > diff --git a/StandaloneMmPkg/Library/MemLib/MemLib.inf
> > > b/StandaloneMmPkg/Library/MemLib/MemLib.inf
> > > > new file mode 100644
> > > > index 0000000000..52b7c06397
> > > > --- /dev/null
> > > > +++ b/StandaloneMmPkg/Library/MemLib/MemLib.inf
> > > > @@ -0,0 +1,47 @@
> > > > +## @file
> > > > +#  Instance of MM memory check library.
> > > > +#
> > > > +#  MM memory check library library implementation. This library
> consumes
> > > MM_ACCESS_PROTOCOL
> > > > +#  to get MMRAM information. In order to use this library instance, the
> > > platform should produce
> > > > +#  all MMRAM range via MM_ACCESS_PROTOCOL, including the range
> for
> > > firmware (like MM Core
> > > > +#  and MM driver) and/or specific dedicated hardware.
> > > > +#
> > > > +#  Copyright (c) 2015, Intel Corporation. All rights reserved.<BR>
> > > > +#  Copyright (c) 2016 - 2017, ARM Limited. All rights reserved.<BR>
> > > > +#
> > > > +#  This program and the accompanying materials
> > > > +#  are licensed and made available under the terms and conditions of 
> > > > the
> > > BSD License
> > > > +#  which accompanies this distribution.  The full text of the license 
> > > > may
> be
> > > found at
> > > > +#  http://opensource.org/licenses/bsd-license.php
> > > > +#
> > > > +#  THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS
> IS"
> > > BASIS,
> > > > +#  WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER
> > > EXPRESS OR IMPLIED.
> > > > +#
> > > > +##
> > > > +
> > > > +[Defines]
> > > > +  INF_VERSION                    = 0x0001001A
> > > > +  BASE_NAME                      = MemLib
> > > > +  FILE_GUID                      =
> > > EA355F14-6409-4716-829F-37B3BC7C7F26
> > > > +  MODULE_TYPE                    = MM_STANDALONE
> > > > +  VERSION_STRING                 = 1.0
> > > > +  PI_SPECIFICATION_VERSION       = 0x00010032
> > > > +  LIBRARY_CLASS                  = MemLib|MM_STANDALONE
> > > MM_CORE_STANDALONE
> > > > +  CONSTRUCTOR                    = MemLibConstructor
> > > > +
> > > > +#
> > > > +# The following information is for reference only and not required by 
> > > > the
> > > build tools.
> > > > +#
> > > > +#  VALID_ARCHITECTURES           = AARCH64
> > > > +#
> > > > +
> > > > +[Sources.AARCH64]
> > > > +  Arm/MemLib.c
> > > > +
> > > > +[Packages]
> > > > +  MdePkg/MdePkg.dec
> > > > +  StandaloneMmPkg/StandaloneMmPkg.dec
> > > > +
> > > > +[LibraryClasses]
> > > > +  BaseMemoryLib
> > > > +  DebugLib
> > > > --
> > > > 2.16.2
> > > >
> > > _______________________________________________
> > > edk2-devel mailing list
> > > edk2-devel@lists.01.org
> > > https://lists.01.org/mailman/listinfo/edk2-devel
_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to