public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Zeng, Star" <star.zeng@intel.com>
To: Laszlo Ersek <lersek@redhat.com>,
	"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Cc: "Yao, Jiewen" <jiewen.yao@intel.com>,
	"Dong, Eric" <eric.dong@intel.com>,
	 "Ni, Ruiyu" <ruiyu.ni@intel.com>,
	"Wang, Jian J" <jian.j.wang@intel.com>,
	 "Zeng, Star" <star.zeng@intel.com>
Subject: Re: [PATCH] UefiCpuPkg PiSmmCpuDxeSmm: SMM profile and static paging mutual exclusion
Date: Fri, 8 Dec 2017 01:03:24 +0000	[thread overview]
Message-ID: <0C09AFA07DD0434D9E2A0C6AEB0483103B9C10D8@shsmsx102.ccr.corp.intel.com> (raw)
In-Reply-To: <d6ad2fc9-d709-98f1-9b2b-1a4a518ba046@redhat.com>

Thanks and the RB to Laszlo and Eric.
And  I agree and will handle them when pushing the patch. :)


Thanks,
Star
-----Original Message-----
From: Laszlo Ersek [mailto:lersek@redhat.com] 
Sent: Thursday, December 7, 2017 7:32 PM
To: Zeng, Star <star.zeng@intel.com>; edk2-devel@lists.01.org
Cc: Yao, Jiewen <jiewen.yao@intel.com>; Dong, Eric <eric.dong@intel.com>; Ni, Ruiyu <ruiyu.ni@intel.com>; Wang, Jian J <jian.j.wang@intel.com>
Subject: Re: [PATCH] UefiCpuPkg PiSmmCpuDxeSmm: SMM profile and static paging mutual exclusion

Hi Star,

On 12/07/17 11:47, Star Zeng wrote:
> SMM profile and static paging could not enabled at the same time, this 
> patch is add check and comments to make sure it.
> 
> Similar comments are also added for the case of static paging and heap 
> guard for SMM.
> 
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Cc: Eric Dong <eric.dong@intel.com>
> Cc: Ruiyu Ni <ruiyu.ni@intel.com>
> Cc: Jian J Wang <jian.j.wang@intel.com>
> Cc: Laszlo Ersek <lersek@redhat.com>
> Contributed-under: TianoCore Contribution Agreement 1.1
> Signed-off-by: Star Zeng <star.zeng@intel.com>
> ---
>  UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c |  9 +++++++++  
> UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c  | 13 ++++++++++---
>  UefiCpuPkg/UefiCpuPkg.dec                |  6 +++++-
>  UefiCpuPkg/UefiCpuPkg.uni                | 10 ++++++++--
>  4 files changed, 32 insertions(+), 6 deletions(-)
> 
> diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c 
> b/UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c
> index 6e1ffe7c6287..939ac25a506c 100644
> --- a/UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c
> +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c
> @@ -205,6 +205,15 @@ SetPageTableAttributes (
>    //      BIT3: SMM pool guard enabled
>    //
>    if ((PcdGet8 (PcdHeapGuardPropertyMask) & (BIT3 | BIT2)) != 0) {
> +    DEBUG ((DEBUG_INFO, "Don't mark page table as read-only as heap guard is enabled\n"));
> +    return ;
> +  }
> +
> +  //
> +  // Don't mark page table as read-only if SMM profile is enabled.
> +  //
> +  if (FeaturePcdGet (PcdCpuSmmProfileEnable)) {
> +    DEBUG ((DEBUG_INFO, "Don't mark page table as read-only as SMM 
> + profile is enabled\n"));
>      return ;
>    }
>  
> diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c 
> b/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c
> index 6478c6c3e355..0fe944fc18cc 100644
> --- a/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c
> +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c
> @@ -919,17 +919,24 @@ SetPageTableAttributes (
>    //
>    // Don't do this if
>    //  - no static page table; or
> -  //  - SMM heap guard feature enabled
> +  //  - SMM heap guard feature enabled; or
>    //      BIT2: SMM page guard enabled
>    //      BIT3: SMM pool guard enabled
> +  //  - SMM profile feature enabled
>    //
>    if (!mCpuSmmStaticPageTable ||
> -      (PcdGet8 (PcdHeapGuardPropertyMask) & (BIT3 | BIT2)) != 0) {
> +      ((PcdGet8 (PcdHeapGuardPropertyMask) & (BIT3 | BIT2)) != 0) ||
> +      FeaturePcdGet (PcdCpuSmmProfileEnable)) {
>      //
> -    // Static paging and heap guard should not be enabled at the same time.
> +    // Static paging and heap guard could not be enabled at the same time.
>      //
>      ASSERT (!(mCpuSmmStaticPageTable &&
>                (PcdGet8 (PcdHeapGuardPropertyMask) & (BIT3 | BIT2)) != 
> 0));
> +
> +    //
> +    // Static paging and SMM profile could not be enabled at the same time.
> +    //
> +    ASSERT (!(mCpuSmmStaticPageTable && FeaturePcdGet 
> + (PcdCpuSmmProfileEnable)));
>      return ;
>    }
>  
> diff --git a/UefiCpuPkg/UefiCpuPkg.dec b/UefiCpuPkg/UefiCpuPkg.dec 
> index d2965ba14c2d..36205ab63796 100644
> --- a/UefiCpuPkg/UefiCpuPkg.dec
> +++ b/UefiCpuPkg/UefiCpuPkg.dec
> @@ -84,6 +84,7 @@ [Protocols]
>  [PcdsFeatureFlag]
>    ## Indicates if SMM Profile will be enabled.
>    #  If enabled, instruction executions in and data accesses to memory outside of SMRAM will be logged.
> +  #  It could not be enabled at the same time with SMM profile feature (PcdCpuSmmStaticPageTable).
>    #  This PCD is only for validation purpose. It should be set to false in production.<BR><BR>
>    #   TRUE  - SMM Profile will be enabled.<BR>
>    #   FALSE - SMM Profile will be disabled.<BR>
> @@ -225,8 +226,11 @@ [PcdsFixedAtBuild, PcdsPatchableInModule, PcdsDynamic, PcdsDynamicEx]
>    gUefiCpuPkgTokenSpaceGuid.PcdCpuApTargetCstate|0|UINT8|0x00000007
>  
>    ## Indicates if SMM uses static page table.
> -  #  If enabled, SMM will not use on-demand paging. SMM will build 
> static page table for all memory.<BR><BR>
> +  #  If enabled, SMM will not use on-demand paging. SMM will build static page table for all memory.
>    #  This flag only impacts X64 build, because SMM alway builds static page table for IA32.
> +  #  It could not be enabled at the same time with SMM profile feature (PcdCpuSmmProfileEnable).
> +  #  It could not be enabled also at the same time with heap guard 
> + feature for SMM  #  (PcdHeapGuardPropertyMask in 
> + MdeModulePkg).<BR><BR>
>    #   TRUE  - SMM uses static page table for all memory.<BR>
>    #   FALSE - SMM uses static page table for below 4G memory and use on-demand paging for above 4G memory.<BR>
>    # @Prompt Use static page table for all memory in SMM.
> diff --git a/UefiCpuPkg/UefiCpuPkg.uni b/UefiCpuPkg/UefiCpuPkg.uni 
> index 9472b185e46e..013d2870a682 100644
> --- a/UefiCpuPkg/UefiCpuPkg.uni
> +++ b/UefiCpuPkg/UefiCpuPkg.uni
> @@ -53,7 +53,10 @@
>  
>  #string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuSmmProfileEnable_PROMPT  #language en-US "Enable SMM Profile"
>  
> -#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuSmmProfileEnable_HELP  #language en-US "Indicates if SMM Profile will be enabled. If enabled, instruction executions in and data accesses to memory outside of SMRAM will be logged. This PCD is only for validation purpose. It should be set to false in production.<BR><BR>\n"
> +#string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuSmmProfileEnable_HELP  #language en-US "Indicates if SMM Profile will be enabled.\n"
> +                                                                                   "If enabled, instruction executions in and data accesses to memory outside of SMRAM will be logged.\n"
> +                                                                                   "It could not be enabled at the same time with SMM profile feature (PcdCpuSmmStaticPageTable).\n"
> +                                                                                   "This PCD is only for validation purpose. It should be set to false in production.<BR><BR>\n"
>                                                                                     "TRUE  - SMM Profile will be enabled.<BR>\n"
>                                                                                     "FALSE - SMM Profile will be disabled.<BR>"
>  
> @@ -150,8 +153,11 @@
>  #string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuSmmStaticPageTable_PROMPT  #language en-US "Use static page table for all memory in SMM."
>  
>  #string STR_gUefiCpuPkgTokenSpaceGuid_PcdCpuSmmStaticPageTable_HELP  #language en-US "Indicates if SMM uses static page table.\n"
> -                                                                                     "If enabled, SMM will not use on-demand paging. SMM will build static page table for all memory.<BR><BR>\n"
> +                                                                                     "If enabled, SMM will not use on-demand paging. SMM will build static page table for all memory.\n"
>                                                                                       "This flag only impacts X64 build, because SMM alway builds static page table for IA32.\n"
> +                                                                                     "It could not be enabled at the same time with SMM profile feature (PcdCpuSmmProfileEnable).\n"
> +                                                                                     "It could not be enabled also at the same time with heap guard feature for SMM\n"
> +                                                                                     "(PcdHeapGuardPropertyMask in MdeModulePkg).<BR><BR>\n"
>                                                                                       "TRUE  - SMM uses static page table for all memory.<BR>\n"
>                                                                                       "FALSE - SMM uses static page table for below 4G memory and use on-demand paging for above 4G memory.<BR>"
>  
> 

This patch looks good to me; in particular I checked that PcdCpuSmmProfileEnable==FALSE does not lead to any observable changes in the code execution.

I notice two typos however:

(1) In PcdCpuSmmProfileEnable_HELP, we should not say:

"It could not be enabled at the same time with SMM profile feature (PcdCpuSmmStaticPageTable)"

We should say:

"It could not be enabled at the same time with SMM static page table feature (PcdCpuSmmStaticPageTable)"


(2) The same typo is present a bit higher up in the patch, in the DEC file, in the documentation of PcdCpuSmmProfileEnable.


With those two typos fixed:

Reviewed-by: Laszlo Ersek <lersek@redhat.com>

Thanks!
Laszlo

      reply	other threads:[~2017-12-08  0:58 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-12-07 10:47 [PATCH] UefiCpuPkg PiSmmCpuDxeSmm: SMM profile and static paging mutual exclusion Star Zeng
2017-12-07 11:02 ` Dong, Eric
2017-12-07 11:32 ` Laszlo Ersek
2017-12-08  1:03   ` Zeng, Star [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=0C09AFA07DD0434D9E2A0C6AEB0483103B9C10D8@shsmsx102.ccr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox