From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=104.47.2.76; helo=eur01-db5-obe.outbound.protection.outlook.com; envelope-from=achin.gupta@arm.com; receiver=edk2-devel@lists.01.org Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0076.outbound.protection.outlook.com [104.47.2.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 6C8F02265A330 for ; Wed, 11 Apr 2018 06:59:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=e6hgxs9M9CZDGae1iHPWWAhjYFXiG6bbnva/Q6pl1l0=; b=FcJOfKNkR9Oo9I3umNYt8F0fXX3N220GVH6BHSfHwbLK1G6v5u6jak0c1YnOby4kkb5U2YShWLVcGPPny4c19HibpvJZQo4nBetW3LYYPufTsA3CvDe5ZNdF3CboGblKF640IoQpwwzoIiAXTacewhS1gl31ZjH0SzVXEtmc3YI= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Achin.Gupta@arm.com; Received: from e104320-lin (217.140.96.140) by DB7PR08MB2987.eurprd08.prod.outlook.com (2603:10a6:5:1c::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.653.12; Wed, 11 Apr 2018 13:58:56 +0000 Date: Wed, 11 Apr 2018 15:00:21 +0100 From: Achin Gupta To: Supreeth Venkatesh Cc: edk2-devel@lists.01.org, michael.d.kinney@intel.com, liming.gao@intel.com, jiewen.yao@intel.com, leif.lindholm@linaro.org, ard.biesheuvel@linaro.org, nd@arm.com Message-ID: <20180411140020.GE663@e104320-lin> References: <20180406144223.10931-1-supreeth.venkatesh@arm.com> <20180406144223.10931-3-supreeth.venkatesh@arm.com> MIME-Version: 1.0 In-Reply-To: <20180406144223.10931-3-supreeth.venkatesh@arm.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-Originating-IP: [217.140.96.140] X-ClientProxiedBy: AM3PR07CA0141.eurprd07.prod.outlook.com (2603:10a6:207:8::27) To DB7PR08MB2987.eurprd08.prod.outlook.com (2603:10a6:5:1c::25) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(48565401081)(2017052603328)(7153060)(7193020); SRVR:DB7PR08MB2987; X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 3:T2r83w26lyHps2yS4Bkk/DluDexGQ+8OytaQFaNVK4beLea/oc4ZCY3OAmX/4cAlZUUj0zYwPlZ/D1k6OailGLL1NOiFbvPY9qv4ExjVxxABI6p0UiCGWf6IpLJo3tdCs/5UC7mPXBMDRoiOPXi0/GaAw9QqdLUnwKrOkpzD+GzoQrKyB71zcftCrf+yFL8cPC5YkbGnOT45Y1WgJqbPkds9NwqEUjriQGz5qN5RysJSg3aR6Pe7jYVkcCw2bhx0; 25:Pnwdf15e3Yt49s587QTZVSlOXKd4YGQnacqbiTC1anKbkjbdNgQjCmmciTM7g9WFssrWnHhHyIQTpCq663DYUY5+YUV3+5GqEtGh0U94Sl2l1ab5Tpoqo3C8UPZz/oiYYaCu6+qlbExXwyw/f3K6rGXdkc5UH/lPA9L0l+0ut5O2psxSRXgNzNFDu1iPlQhFxY6OrrXzp3tdJ9ktrkP2BuricHR2rr4yEeuMINtQ/AdJmW3PjtmV2SaT5nJNWYbGQtHnigrZ5I4x2lW+W9BIpAS7hbskcict4dUnQhFgb/JnE6ecC3w/7uxH82DLWe3fBvwyKeiY5Ke6RBdwxXOCFw==; 31:7ZR3bQuFcC7H0rDUeiEoRf6jvAFn4rfA0bqUDvdtdaGhBpJpVhdHpZly/Dhyv2w0sai3QYq6bmnlE2/9D+YRfd6NkUoDuSqEL5gPOAxZqgcWYJ4zBldGz3upf+TfIaEjccf0e2Qb9l74SaQ3FVk0+HzZYZ1IB/US53ED+klWVh7FMGVH70s1IBO0wMXCen3s84orX4+5kUk2eH4jXu/2ZMmZxJqsKCSzcqNLKIxBcCg= X-MS-TrafficTypeDiagnostic: DB7PR08MB2987: NoDisclaimer: True X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 20:9512izT9kqojCFfttq7Yr5AGCA3FltyUZpo+Da5L8o1GdgebDnukhukizo+7O8I2TIS/vlbZhEbYkV6G0QUG9ns7e/8SkoG42xkTthjjNotZyZXFuELjuYv6kUxlXm7wQC+XCwwK9KLv6u1DK5JWm8pPgeHZ3s5Gjt///LGL2qo=; 4:H4eivO7jc7fGR6elYP/oNTZCP1ezwu0oRwZ/5sk61z4W/HYxHOeVVqiIdymPeyIwBRbeJDJ1GsN0zj5xZbCxQW9HjyqRnhfCspeX+StDAHiZL8H7isSCZUzSFKdSxf7+dhCfnenQwm5dnvUlOXl6zfGNk9KZyaF1Q8T6951BJ6KqTIQFuInqMuH1i9URGL1Ua5hZVEDZd3V5bLo4zjglW4zdvP9HxQP/Ec5+1jHjcKs3MYYjN9ThNR4N0sJVBDDe50MZUp3RA6tDDO+8KQSmlERJlKud17TI77x5PCCyeBraGgfwkeLv5C1hnNuHKL6FPzAA+H7/wjF9TKIbjX7LhU2gkyNbDvu3Cypr6GLAVNI= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(180628864354917)(17755550239193); X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(3002001)(93006095)(93001095)(3231221)(944501327)(52105095)(6055026)(6041310)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123560045)(20161123562045)(6072148)(201708071742011); SRVR:DB7PR08MB2987; BCL:0; PCL:0; RULEID:; SRVR:DB7PR08MB2987; X-Forefront-PRVS: 0639027A9E X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(376002)(39380400002)(396003)(346002)(366004)(39860400002)(189003)(199004)(33656002)(6496006)(53376002)(72206003)(23726003)(966005)(16799955002)(6862004)(7736002)(33896004)(11346002)(316002)(105586002)(15188155005)(446003)(76176011)(26005)(53936002)(16586007)(476003)(956004)(486006)(25786009)(5660300001)(50466002)(97736004)(6306002)(68736007)(386003)(2906002)(9686003)(47776003)(6636002)(59450400001)(52116002)(86362001)(55016002)(229853002)(6246003)(106356001)(8676002)(16526019)(81166006)(4326008)(478600001)(81156014)(8936002)(33716001)(6116002)(58126008)(6666003)(1076002)(3846002)(305945005)(66066001)(18370500001)(107986001)(19627235001); DIR:OUT; SFP:1101; SCL:1; SRVR:DB7PR08MB2987; H:e104320-lin; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: arm.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; DB7PR08MB2987; 23:tk7IH3+tkQEK0ki60q+VIaJuEVKQa/nVp86DT1Y7z?= =?us-ascii?Q?qChJiQDWHz0jNqDKN1CvN+VG7RUHC6DH2JsW4hOvh974z8MdS+T3C2ZcZHEo?= =?us-ascii?Q?HcXNGLEc9ya4VEo9vjncOxgJ9AhNdmXIdxWjizVLdVIrg3bhq3lExq9NWAcY?= =?us-ascii?Q?bh87YTvJ+Bw0d1JZdV2Dwlhn+QKdxQmrbNbPbjLJu1Mur5elIl2e0TW+6S1p?= =?us-ascii?Q?1iEBXrVHUXLww9yshvBTZJ0LdiKt0B3npoxChKSHSQbH5Xm2VM7VqZn0MpPa?= =?us-ascii?Q?72hjwHOGR1lEZvJ+jhqT2UHleuINYZMWk1sVbBUI6X8NzOWjoUpdM77HwydC?= =?us-ascii?Q?pHo38maSYSDqpnlv3GstTlRHaomSHK9c+dVhEn749ePHgSrvgT0dPI9bOU1X?= =?us-ascii?Q?HH1eaLVIiBjRU/Jot0K0xtjG2gnIoFeMq8vzap8ZFdLg3JjISg4WqzMAfQsi?= =?us-ascii?Q?K9x0PdAHRSYVaav0FlYAhB3jOIUCpF1vZE+qN6feLC0ufEFy/TmzHaDa/Vih?= =?us-ascii?Q?tZQqyVTGtmP8kHCv47II5vr1ODd1Li3oGG0xSg0iEfz0YwgIanC1AIlTxOGh?= =?us-ascii?Q?Pd6OtqATEvbSz+zUjTKs53g25z1RPozOw+d91m/Bse4Rm023VIDjUFVh7MMM?= =?us-ascii?Q?p1UENmiDdy2jUozR3mQgMasa39oJ0YTtugSjH8KaC7e+Q6J4yZURsg4+DxCY?= =?us-ascii?Q?PfhItdN9CFfXeX08Co7dnRqgO+XsbU+Ip71RGOabSoUprRTsIBrQsXEk7w2O?= =?us-ascii?Q?tJSPVa3aUCnLo9FMoRSGfUI8+t3eRXPf/8Aef2mxngC+CHlJBQJ0rd6Z8Y28?= =?us-ascii?Q?AQrK87Dr0ichGBUFeuPWNICxLcmUNtGx4LC2lQpWWIAgWctBEp3f5MMywzyt?= =?us-ascii?Q?wkYVBsw2RS6ZiMr6DrHzPWvqM9TqVC9pAnLG4EJTr48gdauYeg/7Z3pAKgW+?= =?us-ascii?Q?Xf8VehPJxquNZ14baiwnVNp9LWehD6Rfmbc999vnynGBbsEkNcJODChJGlrX?= =?us-ascii?Q?L22RL0ZZF3QbbV1twaX8OpHGNwkkFpuZFVyRNbK5ltEnHvqspbqwsKUwuhDf?= =?us-ascii?Q?xObhvV1g4es86ddeu6FZfHZF54UE5Gy6fXdQVHp11mE2pJ2Admzf8rWfUU+6?= =?us-ascii?Q?voLphUYD6rOIYhhEFQr/VATFiKHZLC2fPretYT/Eo3JbT9v3cH1qRBPPG9TP?= =?us-ascii?Q?LJeXaoEOthc1EmH2w1UrZmz1PxoysY8/woHC1X+bsNgSJihralwy9WNcdIPr?= =?us-ascii?Q?ZgfW24p5bD199TIJnx3kSF5q58ioxFip8k88/nt0SUdbtMVHIe+BGOsEHR8w?= =?us-ascii?Q?M0CT4in+/XXlrcx4sAB1D/dj+9nLA6Y3cPwg8kTz2g6QIjG5wlvzZ+omTmhw?= =?us-ascii?Q?+eQNn7KUyKuBUBXLImQj0ozQrheNhhvjqVNUjPwMbU24U8nYcf/LMMbAa/OA?= =?us-ascii?Q?xfYVLe8o19xCqM19q89DOS8S0GHgnALZVQMvhFyX6hpvqxM2Ymipniu8YNIX?= =?us-ascii?Q?YU2QjrXILowaw=3D=3D?= X-Microsoft-Antispam-Message-Info: qhW8IRNDkUKULc2tjMmNEpcmZKbl3sBLQRhp0c/jKbGhzlYeQn8jf8C51qe/Z/emlDSjE5qxX9HwyR1rqteg7PkYltZkA0YLRb9IZ3DAaoxrGvX+fc9pOdAtd14YnwsoVzHJLE1YIwogEO5MRleNprHYPEm7NtglrvsIia9X/OO0ZwNaoD6q4BBxFKHqNnfp X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 6:+Fum1C6MAWxbBkPzyHL9sL4GmtY4CKEClSRbRFVzW4JtNuNx8N4TAJ/KQlf3nqw8KpTJyaZFnp27C5vcBwgdUA4k5cXYMoPnyC9mCPBOdLbE8vuLFfamXymHLJbs1gTuOfTHAxOunyUxQVC9u8Ym1FEvjILe1YGtHNHkiKDqPwISe3cC4XlasWaoCNL4XABRMSfwXDmUUAOeK80MOnsJ8yucwJdSFvv92J0myHH9Ze+JEmcwIsei+Kq06Ra/LnYN75IhalWGEnINvb8rsGUO4RCU85sOuZQSSPW3x4y90VvQ/FSlG34O6FfqL1o3Pkg8x8np7aOAggxV9wM9Vo5+f4XoF0X3z5u/UjfH+yScygRAGf0DjrdWLHhHXukrqqPS1pSZ3wkhc8z8xgLCH0aRRb6w3ctWmyc/bVKBLOXgmWxzTJf/9qfuhF6Vqc0ZPoS03sRtRw42eGqMrdETwM5DKA==; 5:m9jEV+DeKDGiMhIL0E3llFuc5LMQD10UNooyr9fyJElRJ6qBJwhlC0rZ7Ulx+TKAeYqQzwCb6YlVoWTFqbMbs+zfjjjdbpksYwErN8hP+galYD+jtXirdIbLirJJlw/nHiewl5rOenrI3wwPANs+QK0lsQpEhXzaKn7rHqZ/WqU=; 24:p7fJetkeQVZ0jSmUYY5HaWkwMrB2500I9Lvow+h/0x80/TyHZ3aVb3hdExKr0M5VC9tRchjBQ2Qc2sOfmCPKNX6hqenPVdJfVQs6V+zmGVE= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1; DB7PR08MB2987; 7:HuAWmbDNdQUYRNRZ5mzvqY0cvcDG2BZUHm3l356oyXYLx3PggeVgtp5K6NhKwtGRUsOxjak/HO5gKjD4VSlmH/YnpvI8HtFAojMZyOAcz5Yjc05xZe2pH3T5jtF7CDjb3tOt08oKzc2KpgRxW8kHVMk77R+1Iu1YHOWqZswOcZArc0NePNlM0O9DA2YE6XsziOFQ79A/CvxNhUNLs6L3S7pGcxaWjKrjnks/h2osKN5YL40+Da+xzDKuFdQm34II X-MS-Office365-Filtering-Correlation-Id: 7806eec6-b358-4436-15b6-08d59fb45e5b X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Apr 2018 13:58:56.4219 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7806eec6-b358-4436-15b6-08d59fb45e5b X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB2987 Subject: Re: [PATCH v1 02/18] ArmPkg/Drivers: Add EFI_MM_COMMUNICATION_PROTOCOL DXE driver. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 11 Apr 2018 13:59:05 -0000 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Supreeth, CIL. On Fri, Apr 06, 2018 at 03:42:07PM +0100, Supreeth Venkatesh wrote: > PI v1.5 Specification Volume 4 defines Management Mode Core Interface > and defines EFI_MM_COMMUNICATION_PROTOCOL. This protocol provides a > means of communicating between drivers outside of MM and MMI > handlers inside of MM. > > This patch implements the EFI_MM_COMMUNICATION_PROTOCOL DXE runtime > driver for AARCH64 platforms. It uses SMCs allocated from the standard > SMC range defined in DEN0060A_ARM_MM_Interface_Specification.pdf > to communicate with the standalone MM environment in the secure world. > > This patch also adds the MM Communication driver (.inf) file to > define entry point for this driver and other compile > related information the driver needs. > > Contributed-under: TianoCore Contribution Agreement 1.1 > Signed-off-by: Achin Gupta > Signed-off-by: Supreeth Venkatesh > --- > .../Drivers/MmCommunicationDxe/MmCommunication.c | 339 +++++++++++++++++++++ > .../Drivers/MmCommunicationDxe/MmCommunication.inf | 50 +++ > 2 files changed, 389 insertions(+) > create mode 100644 ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c > create mode 100644 ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.inf > > diff --git a/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c b/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c > new file mode 100644 > index 0000000000..e801c1c601 > --- /dev/null > +++ b/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.c > @@ -0,0 +1,339 @@ > +/** @file > + > + Copyright (c) 2016-2017, ARM Limited. All rights reserved. > + > + This program and the accompanying materials > + are licensed and made available under the terms and conditions of the BSD License > + which accompanies this distribution. The full text of the license may be found at > + http://opensource.org/licenses/bsd-license.php > + > + THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, > + WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. > + > +**/ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +#include > + > +#include > + > +// > +// Address, Length of the pre-allocated buffer for communication with the secure > +// world. > +// > +STATIC ARM_MEMORY_REGION_DESCRIPTOR mNsCommBuffMemRegion; > + > +// Notification event when virtual address map is set. > +STATIC EFI_EVENT mSetVirtualAddressMapEvent; > + > +// > +// Handle to install the MM Communication Protocol > +// > +STATIC EFI_HANDLE mMmCommunicateHandle; > + > +/** > + Communicates with a registered handler. > + > + This function provides an interface to send and receive messages to the > + Standalone MM environment on behalf of UEFI services. This function is part > + of the MM Communication Protocol that may be called in physical mode prior to > + SetVirtualAddressMap() and in virtual mode after SetVirtualAddressMap(). > + > + @param[in] This The EFI_MM_COMMUNICATION_PROTOCOL > + instance. > + @param[in, out] CommBuffer A pointer to the buffer to convey > + into MMRAM. > + @param[in, out] CommSize The size of the data buffer being > + passed in. This is optional. > + > + @retval EFI_SUCCESS The message was successfully posted. > + @retval EFI_INVALID_PARAMETER The CommBuffer was NULL. > + @retval EFI_BAD_BUFFER_SIZE The buffer size is incorrect for the MM > + implementation. If this error is > + returned, the MessageLength field in > + the CommBuffer header or the integer > + pointed by CommSize are updated to reflect > + the maximum payload size the > + implementation can accommodate. > + @retval EFI_ACCESS_DENIED The CommunicateBuffer parameter > + or CommSize parameter, if not omitted, > + are in address range that cannot be > + accessed by the MM environment > +**/ > +STATIC > +EFI_STATUS > +EFIAPI > +MmCommunicationCommunicate ( > + IN CONST EFI_MM_COMMUNICATION_PROTOCOL *This, > + IN OUT VOID *CommBuffer, > + IN OUT UINTN *CommSize OPTIONAL > + ) > +{ > + EFI_MM_COMMUNICATE_HEADER *CommunicateHeader; > + ARM_SMC_ARGS CommunicateSmcArgs; > + EFI_STATUS Status; > + UINTN BufferSize; > + > + CommunicateHeader = CommBuffer; > + Status = EFI_ACCESS_DENIED; > + BufferSize = 0; > + > + ZeroMem (&CommunicateSmcArgs, sizeof (ARM_SMC_ARGS)); > + > + // > + // Check parameters > + // > + if (CommBuffer == NULL) { > + return EFI_INVALID_PARAMETER; > + } > + > + // If the length of the CommBuffer is 0 then return the expected length. > + if (CommSize) { > + if (*CommSize == 0) { > + *CommSize = mNsCommBuffMemRegion.Length; > + return EFI_BAD_BUFFER_SIZE; > + } > + // > + // CommSize must hold HeaderGuid and MessageLength > + // > + if (*CommSize < sizeof (EFI_MM_COMMUNICATE_HEADER)) { > + return EFI_INVALID_PARAMETER; > + } The check looks inadequate as it does not cater for the MessageLength specified in the EFI_MM_COMMUNICATE_HEADER i.e it will ensure there is at least a EFI_MM_COMMUNICATE_HEADER but will not ensure that the message is included as well. Nit: It would be better if the parameters are checked before Status and CommunicateSmcArgs are updated above. > + BufferSize = *CommSize; > + } else { > + BufferSize = CommunicateHeader->MessageLength + > + sizeof (CommunicateHeader->HeaderGuid) + > + sizeof (CommunicateHeader->MessageLength); > + } > + > + // > + // If the buffer size is 0 or greater than what can be tolerated by the MM > + // environment then return the expected size. > + // > + if ((BufferSize == 0) || > + (BufferSize > mNsCommBuffMemRegion.Length)) { > + CommunicateHeader->MessageLength = mNsCommBuffMemRegion.Length - > + sizeof (CommunicateHeader->HeaderGuid) - > + sizeof (CommunicateHeader->MessageLength); > + return EFI_BAD_BUFFER_SIZE; > + } The 'if' condition works as expected to return the maximum buffer size if 'CommSize' is NULL. When 'CommSize' is used and the 'BufferSize' (derived from 'CommSize') is greater than what can be tolerated, then it is 'CommSize' that must be updated as per the PI spec. but the 'if'condition will still update the MessageLength. > + > + // SMC Function ID > + CommunicateSmcArgs.Arg0 = ARM_SMC_ID_MM_COMMUNICATE_AARCH64; > + > + // Reserved for Future. Must be Zero. > + CommunicateSmcArgs.Arg1 = 0; > + > + if (mNsCommBuffMemRegion.VirtualBase) { > + CopyMem ((VOID *)mNsCommBuffMemRegion.VirtualBase, CommBuffer, BufferSize); > + } else { > + return EFI_ACCESS_DENIED; > + } VirtualBase was set to PhysicalBase in MmCommunicationInitialize(). Is there any reason why it would be unset here apart from a corruption of mNsCommBuffMemRegion structure? If not, then this is a panic condition. It is not the caller's fault and returning EFI_ACCESS_DENIED does not really help. > + > + // For the SMC64 version, this parameter is a 64-bit Physical Address (PA) > + // or Intermediate Physical Address (IPA). > + // For the SMC32 version, this parameter is a 32-bit PA or IPA. > + CommunicateSmcArgs.Arg2 = (UINTN)mNsCommBuffMemRegion.PhysicalBase; > + > + // comm_size_address is a PA or an IPA that holds the size of the > + // communication buffer being passed in. This parameter is optional > + // and can be omitted by passing a zero. > + // ARM does not recommend using it since this might require the > + // implementation to create a separate memory mapping for the parameter. > + // ARM recommends storing the buffer size in the buffer itself. > + CommunicateSmcArgs.Arg3 = 0; > + > + // Call the Standalone MM environment. > + ArmCallSmc (&CommunicateSmcArgs); > + > + switch (CommunicateSmcArgs.Arg0) { > + case ARM_SMC_MM_RET_SUCCESS: > + // On exit, the size of data being returned is inferred from > + // CommSize or MessageLength + Header. > + CopyMem (CommBuffer, > + (const VOID *)mNsCommBuffMemRegion.VirtualBase, > + BufferSize); Umm! I vaguely remember we had a chat about this but this does not seem right. The PI spec. does not help by being vague about how data should be copied out and its length reported. However, here is my take. If CommSize is used, then it must be updated by the handler with the size of the data returned, zero otherwise. This is as far as the PI spec. goes in this regard. Even though the spec. does not say this, if CommSize is not used then, MessageLength in the EFI_MM_COMMUNICATE_HEADER must be updated. This also means that the handler has to preserve the EFI_MM_COMMUNICATE_HEADER in the CommBuffer in the return path (again something the PI spec. does not say). In the SMC ABI, CommSize maps to comm_size_address. We do not use this. So we must rely on the MessageLength on the way back. Using BufferSize does not seem right to me. We are screwed if the input size is not equal to the output size. It is better to retrieve this information from the MessageLength as the comment says. > + Status = EFI_SUCCESS; > + break; > + > + case ARM_SMC_MM_RET_NOT_SUPPORTED: NOT_SUPPORTED means that MM_COMMUNICATE is not implemented which must not be the case if we are here. MmCommunicationInitialize() must call MM_VERSION to check this. In fact, the MM interface specification should be updated to remove NOT_SUPPORTED for MM_COMMUNICATE if MM_VERSION is implemented. Can you panic() if this is returned? > + case ARM_SMC_MM_RET_INVALID_PARAMS: > + Status = EFI_INVALID_PARAMETER; > + break; > + > + case ARM_SMC_MM_RET_DENIED: > + Status = EFI_ACCESS_DENIED; > + break; > + > + case ARM_SMC_MM_RET_NO_MEMORY: > + // Unexpected error since the CommSize was checked for zero length > + // prior to issuing the SMC > + default: > + Status = EFI_ACCESS_DENIED; > + ASSERT (0); > + } > + > + return Status; > +} > + > +// > +// MM Communication Protocol instance > +// > +EFI_MM_COMMUNICATION_PROTOCOL mMmCommunication = { > + MmCommunicationCommunicate > +}; > + > +/** > + Notification callback on SetVirtualAddressMap event. > + > + This function notifies the MM communication protocol interface on > + SetVirtualAddressMap event and converts pointers used in this driver > + from physical to virtual address. > + > + @param Event SetVirtualAddressMap event. > + @param Context A context when the SetVirtualAddressMap triggered. > + > + @retval EFI_SUCCESS The function executed successfully. > + @retval Other Some error occurred when executing this function. > + > +**/ > +STATIC > +VOID > +EFIAPI > +NotifySetVirtualAddressMap ( > + IN EFI_EVENT Event, > + IN VOID *Context > + ) > +{ > + EFI_STATUS Status; > + > + Status = gRT->ConvertPointer (EFI_OPTIONAL_PTR, > + (VOID **)&mNsCommBuffMemRegion.VirtualBase > + ); > + if (EFI_ERROR (Status)) { > + DEBUG ((DEBUG_ERROR, "NotifySetVirtualAddressMap():" > + " Unable to convert MM runtime pointer. Status:0x%r\n", Status)); > + } > + > +} > + > +/** > + The Entry Point for MM Communication > + > + This function installs the MM communication protocol interface and finds out > + what type of buffer management will be required prior to invoking the > + communication SMC. > + > + @param ImageHandle The firmware allocated handle for the EFI image. > + @param SystemTable A pointer to the EFI System Table. > + > + @retval EFI_SUCCESS The entry point is executed successfully. > + @retval Other Some error occurred when executing this entry point. > + > +**/ > +EFI_STATUS > +EFIAPI > +MmCommunicationInitialize ( > + IN EFI_HANDLE ImageHandle, > + IN EFI_SYSTEM_TABLE *SystemTable > + ) > +{ > + EFI_STATUS Status; > + > + mNsCommBuffMemRegion.PhysicalBase = PcdGet64 (PcdMmBufferBase); > + // During boot , Virtual and Physical are same > + mNsCommBuffMemRegion.VirtualBase = mNsCommBuffMemRegion.PhysicalBase; > + mNsCommBuffMemRegion.Length = PcdGet64 (PcdMmBufferSize); > + > + if (mNsCommBuffMemRegion.PhysicalBase == 0) { > + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " > + "Invalid MM Buffer Base Address.\n")); > + goto ReturnErrorStatus; > + } > + We need to call MM_VERSION to check whether there is a StandaloneMm imp. in the Secure world or not. > + if (mNsCommBuffMemRegion.Length == 0) { > + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " > + "Maximum Buffer Size is zero.\n")); > + goto ReturnErrorStatus; > + } > + > + Status = gDS->AddMemorySpace (EfiGcdMemoryTypeSystemMemory, > + mNsCommBuffMemRegion.PhysicalBase, > + mNsCommBuffMemRegion.Length, > + EFI_MEMORY_WB | > + EFI_MEMORY_XP | > + EFI_MEMORY_RUNTIME); > + if (EFI_ERROR (Status)) { > + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " > + "Failed to add MM-NS Buffer Memory Space\n")); > + goto ReturnErrorStatus; > + } > + > + Status = gDS->SetMemorySpaceAttributes(mNsCommBuffMemRegion.PhysicalBase, > + mNsCommBuffMemRegion.Length, > + EFI_MEMORY_WB | EFI_MEMORY_XP); > + if (EFI_ERROR (Status)) { > + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " > + "Failed to set MM-NS Buffer Memory attributes\n")); > + goto CleanAddedMemorySpace; > + } > + > + Status = gBS->AllocatePages (AllocateAddress, > + EfiRuntimeServicesData, > + EFI_SIZE_TO_PAGES (mNsCommBuffMemRegion.Length), > + &mNsCommBuffMemRegion.PhysicalBase); > + if (EFI_ERROR (Status)) { > + DEBUG ((DEBUG_ERROR, "MmCommunicateInitialize: " > + "Failed to allocate MM-NS Buffer Memory Space\n")); > + goto CleanAddedMemorySpace; > + } > + > + // Install the communication protocol > + Status = gBS->InstallProtocolInterface (&mMmCommunicateHandle, > + &gEfiMmCommunicationProtocolGuid, > + EFI_NATIVE_INTERFACE, > + &mMmCommunication); > + if (EFI_ERROR(Status)) { > + DEBUG ((DEBUG_ERROR, "MmCommunicationInitialize: " > + "Failed to install MM communication protocol\n")); > + goto CleanAllocatedPages; > + } > + > + // Register notification callback when virtual address is associated > + // with the physical address. > + // Create a Set Virtual Address Map event. > + // > + Status = gBS->CreateEvent (EVT_SIGNAL_VIRTUAL_ADDRESS_CHANGE, // Type > + TPL_NOTIFY, // NotifyTpl > + NotifySetVirtualAddressMap, // NotifyFunction > + NULL, // NotifyContext > + &mSetVirtualAddressMapEvent // Event > + ); > + if (Status == EFI_SUCCESS) { > + return Status; > + } > + > + gBS->UninstallProtocolInterface(mMmCommunicateHandle, > + &gEfiMmCommunicationProtocolGuid, > + &mMmCommunication); > + > +CleanAllocatedPages: > + gBS->FreePages (mNsCommBuffMemRegion.PhysicalBase, > + EFI_SIZE_TO_PAGES (mNsCommBuffMemRegion.Length)); > + > +CleanAddedMemorySpace: > + gDS->RemoveMemorySpace (mNsCommBuffMemRegion.PhysicalBase, > + mNsCommBuffMemRegion.Length); > + > +ReturnErrorStatus: > + return EFI_INVALID_PARAMETER; > +} > diff --git a/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.inf b/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.inf > new file mode 100644 > index 0000000000..344d55f333 > --- /dev/null > +++ b/ArmPkg/Drivers/MmCommunicationDxe/MmCommunication.inf > @@ -0,0 +1,50 @@ > +#/** @file > +# > +# DXE MM Communicate driver > +# > +# Copyright (c) 2016 - 2017, ARM Limited. All rights reserved. > +# > +# This program and the accompanying materials > +# are licensed and made available under the terms and conditions of the BSD License > +# which accompanies this distribution. The full text of the license may be found at > +# http://opensource.org/licenses/bsd-license.php > +# > +# THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, > +# WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. > +# > +#**/ > + > +[Defines] > + INF_VERSION = 0x0001001A > + BASE_NAME = ArmMmCommunication > + FILE_GUID = 09EE81D3-F15E-43F4-85B4-CB9873DA5D6B > + MODULE_TYPE = DXE_RUNTIME_DRIVER > + VERSION_STRING = 1.0 > + > + ENTRY_POINT = MmCommunicationInitialize > + > +[Sources.Common] > + MmCommunication.c Since this is a AArch64 only driver. Should it not be under Sources.Common.AArch64? Cheers, Achin > + > +[Packages] > + ArmPkg/ArmPkg.dec > + MdePkg/MdePkg.dec > + > +[LibraryClasses] > + ArmLib > + ArmSmcLib > + BaseMemoryLib > + DebugLib > + DxeServicesTableLib > + HobLib > + UefiDriverEntryPoint > + > +[Protocols] > + gEfiMmCommunicationProtocolGuid ## PRODUCES > + > +[Pcd.common] > + gArmTokenSpaceGuid.PcdMmBufferBase > + gArmTokenSpaceGuid.PcdMmBufferSize > + > +[Depex] > + AFTER gArmGicDxeFileGuid > -- > 2.16.2 >