On 07/19/18 11:07, Wang, Jian J wrote:
> Hi Laszlo,
> 
> Do you have more comments? Or can you give a r-b?

Struggling with my workload, will try to come back to this soon.

Thanks
Laszlo

>> -----Original Message-----
>> From: Wang, Jian J
>> Sent: Wednesday, July 18, 2018 10:36 AM
>> To: Laszlo Ersek <ler...@redhat.com>; edk2-devel@lists.01.org
>> Cc: Dong, Eric <eric.d...@intel.com>; Yao, Jiewen <jiewen....@intel.com>;
>> Zeng, Star <star.z...@intel.com>
>> Subject: RE: [PATCH] UefiCpuPkg/CpuDxe: fix incorrect check of SMM mode
>>
>> Hi Laszlo,
>>
>>
>> Regards,
>> Jian
>>
>>
>>> -----Original Message-----
>>> From: Laszlo Ersek [mailto:ler...@redhat.com]
>>> Sent: Tuesday, July 17, 2018 10:37 PM
>>> To: Wang, Jian J <jian.j.w...@intel.com>; edk2-devel@lists.01.org
>>> Cc: Dong, Eric <eric.d...@intel.com>; Yao, Jiewen <jiewen....@intel.com>;
>>> Zeng, Star <star.z...@intel.com>
>>> Subject: Re: [PATCH] UefiCpuPkg/CpuDxe: fix incorrect check of SMM mode
>>>
>>> On 07/13/18 07:53, Jian J Wang wrote:
>>>> Current IsInSmm() method makes use of gEfiSmmBase2ProtocolGuid.InSmm()
>>> to
>>>> check if current processor is in SMM mode or not. But this is not correct
>>>> because gEfiSmmBase2ProtocolGuid.InSmm() can only detect if the caller is
>>>> running in SMRAM or from SMM driver. It cannot guarantee if the caller is
>>>> running in SMM mode.
>>>
>>> Wow. This is the exact difference which I asked about, in my question
>>> (9b), and I was assured that InSmm() actually determined whether we were
>>> executing in Management Mode (meaning the processor operating mode).
>>>
>>> http://mid.mail-
>>>
>> archive.com/0c09afa07dd0434d9e2a0c6aeb0483103bb55...@shsmsx102.cc
>>> r.corp.intel.com
>>>
>>> (Scroll down in that message to see my original question (9b).)
>>>
>>> So why doesn't Star's explanation, from the original thread, apply
>>> ultimately?
>>>
>>
>> We did many tests for this and didn't found any issue. So I took a risk. (I 
>> thought
>> a very precise check of SMM mode is hard and time consuming.)
>>
>>>> Because SMM mode will load its own page table, adding
>>>> an extra check of saved DXE page table base address against current CR3
>>>> register value can help to get the correct answer for sure (in SMM mode or
>>>> not in SMM mode).
>>>
>>> So, apparently, the PI spec offers no standard way for a platform module
>>> to determine whether it runs in Management Mode, despite protocol member
>>> being called "InSmm". Do we need a PI spec ECR for introducing the
>>> needed facility?
>>>
>>> Alternatively, the PI spec might already intend to specify that, but the
>>> edk2 implementation doesn't do what the PI spec requires.
>>>
>>> Which one is the case?
>>>
>>
>> The implementation conforms to the spec. It's my misunderstanding. But it's
>> true
>> that there's no specific protocol API to determine if it's in SMM mode or 
>> not.
>>
>>>>
>>>> This is an issue caused by check-in at
>>>>
>>>>   d106cf71eabaacff63c14626a4a87346b93074dd
>>>
>>> I disagree; I think the issue was introduced in commit 2a1408d1d739
>>> ("UefiCpuPkg/CpuDxe: allow accessing (DXE) page table in SMM mode",
>>> 2018-06-19).
>>>
>>
>> You're right. Thanks for pointing this out.
>>
>>>
>>> How did you encounter / find this issue?
>>>
>>
>> I didn't find it. The issue came to me. In other words, I think it's random 
>> and hard
>> to reproduce it. Maybe a subtle change in boot sequence will hide it away.
>>
>>>>
>>>> Cc: Eric Dong <eric.d...@intel.com>
>>>> Cc: Laszlo Ersek <ler...@redhat.com>
>>>> Cc: Jiewen Yao <jiewen....@intel.com>
>>>> Cc: Star Zeng <star.z...@intel.com>
>>>> Contributed-under: TianoCore Contribution Agreement 1.1
>>>> Signed-off-by: Jian J Wang <jian.j.w...@intel.com>
>>>> ---
>>>>  UefiCpuPkg/CpuDxe/CpuPageTable.c | 9 ++++++++-
>>>>  1 file changed, 8 insertions(+), 1 deletion(-)
>>>>
>>>> diff --git a/UefiCpuPkg/CpuDxe/CpuPageTable.c
>>> b/UefiCpuPkg/CpuDxe/CpuPageTable.c
>>>> index 850eed60e7..df021798c0 100644
>>>> --- a/UefiCpuPkg/CpuDxe/CpuPageTable.c
>>>> +++ b/UefiCpuPkg/CpuDxe/CpuPageTable.c
>>>> @@ -136,7 +136,14 @@ IsInSmm (
>>>>      mSmmBase2->InSmm (mSmmBase2, &InSmm);
>>>>    }
>>>>
>>>> -  return InSmm;
>>>> +  //
>>>> +  // mSmmBase2->InSmm() can only detect if the caller is running in SMRAM
>>>> +  // or from SMM driver. It cannot tell if the caller is running in SMM 
>>>> mode.
>>>> +  // Check page table base address to guarantee that because SMM mode
>>> willl
>>>> +  // load its own page table.
>>>> +  //
>>>> +  return (InSmm &&
>>>> +          mPagingContext.ContextData.X64.PageTableBase !=
>>> (UINT64)AsmReadCr3());
>>>>  }
>>>>
>>>>  /**
>>>>
>>>
>>> Shouldn't we consider Ia32.PageTableBase when that's appropriate? From
>>> "UefiCpuPkg/CpuDxe/CpuPageTable.h":
>>>
>>> typedef struct {
>>>   UINT32  PageTableBase;
>>>   UINT32  Reserved;
>>>   UINT32  Attributes;
>>> } PAGE_TABLE_LIB_PAGING_CONTEXT_IA32;
>>>
>>> typedef struct {
>>>   UINT64  PageTableBase;
>>>   UINT32  Attributes;
>>> } PAGE_TABLE_LIB_PAGING_CONTEXT_X64;
>>>
>>> typedef union {
>>>   PAGE_TABLE_LIB_PAGING_CONTEXT_IA32  Ia32;
>>>   PAGE_TABLE_LIB_PAGING_CONTEXT_X64   X64;
>>> } PAGE_TABLE_LIB_PAGING_CONTEXT_DATA;
>>>
>>> The Ia32/X64 structure types are not packed, and even if they were, I
>>> wouldn't think we should rely on "Reserved" being zero.
>>>
>>
>> mPagingContext is zero-ed at each update in GetCurrentPagingContext().
>> I think it should be no problem to use X64.
>>
>>>
>>> All in all, I think that determining whether the processor is operating
>>> in Management Mode (regardless of where in RAM the processor is
>>> executing code from) is a core functionality that should be offered as a
>>> central service, not just an internal CpuDxe function. I think we need
>>> either a PI spec addition, or at least an EDKII extension protocol. It's
>>> obvious that the InSmm() behavior is unclear to developers! (Me
>>> included, of course.)
>>>
>>
>> I agree.
>>
>>> Thanks,
>>> Laszlo

_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to