public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Zeng, Star" <star.zeng@intel.com>
To: Ard Biesheuvel <ard.biesheuvel@linaro.org>, edk2-devel@lists.01.org
Cc: Hao Wu <hao.a.wu@intel.com>, Liming Gao <liming.gao@intel.com>,
	Michael D Kinney <michael.d.kinney@intel.com>,
	Laszlo Ersek <lersek@redhat.com>,
	star.zeng@intel.com
Subject: Re: [PATCH v2 05/17] MdeModulePkg/FaultTolerantWriteDxe: factor out boot service accesses
Date: Wed, 16 Jan 2019 11:29:20 +0800	[thread overview]
Message-ID: <8cbf777c-5f28-8c51-461b-cce2413f06a5@intel.com> (raw)
In-Reply-To: <20190114132758.24054-6-ard.biesheuvel@linaro.org>

Some minor comments.

With them handled, Reviewed-by: Star Zeng <star.zeng@intel.com>

Thanks,
Star

On 2019/1/14 21:27, Ard Biesheuvel wrote:
> In preparation of providing a standalone MM based FTW driver, move
> the existing SMM driver to the new MM services table, and factor out
> some pieces that are specific to the traditional driver, mainly
> related to the use of UEFI boot services, which are not accessible
> to standalone MM drivers.
> 
> Contributed-under: TianoCore Contribution Agreement 1.1
> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
> Regression-tested-by: Laszlo Ersek <lersek@redhat.com>
> ---
>   MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.inf         |   5 +-
>   MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWrite.h              |  23 ++++-
>   MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmmCommon.h     |  34 +++++++
>   MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.c           |  31 ++++++
>   MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteSmm.c           |  53 ++++------
>   MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteTraditionalMm.c | 106 ++++++++++++++++++++
>   MdeModulePkg/Universal/FaultTolerantWriteDxe/UpdateWorkingBlock.c              |  10 +-
>   7 files changed, 219 insertions(+), 43 deletions(-)
> 

[Trimmed]

>   
> +/**
> +  Entry point of the module
> +**/

The block should be matched with the MmFaultTolerantWriteInitialize 
implementation in FaultTolerantWriteSmm.c. But not 
SmmFaultTolerantWriteInitialize implementation in 
FaultTolerantWriteTraditionalMm.c

> +EFI_STATUS
> +MmFaultTolerantWriteInitialize (
> +  VOID
> +  );
> +
> +/**
> +  This function checks if the buffer is valid per processor architecture and
> +  does not overlap with SMRAM.
> +
> +  @param Buffer The buffer start address to be checked.
> +  @param Length The buffer length to be checked.
> +
> +  @retval TRUE  This buffer is valid per processor architecture and does not
> +                overlap with SMRAM.
> +  @retval FALSE This buffer is not valid per processor architecture or overlaps
> +                with SMRAM.
> +**/
> +BOOLEAN
> +FtwSmmIsBufferOutsideSmmValid (
> +  IN EFI_PHYSICAL_ADDRESS  Buffer,
> +  IN UINT64                Length
> +  );
> +
> +/**
> +  Notify the system that the SMM FTW driver is ready
> +**/
> +VOID
> +FtwNotifySmmReady (
> +  VOID
> +  );
> +
>   #endif
> diff --git a/MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.c b/MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.c
> index 094e40f9d86c..24e507104bbe 100644
> --- a/MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.c
> +++ b/MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteDxe.c
> @@ -51,6 +51,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.

[Trimmed]

>   
>   **/
>   EFI_STATUS
> -EFIAPI
> -SmmFaultTolerantWriteInitialize (
> -  IN EFI_HANDLE                           ImageHandle,
> -  IN EFI_SYSTEM_TABLE                     *SystemTable

The comments block should be also removed for these two parameters.

> +MmFaultTolerantWriteInitialize (
> +  VOID
>     )
>   {
>     EFI_STATUS                              Status;
> -  VOID                                    *SmmEndOfDxeRegistration;
> +  VOID                                    *MmEndOfDxeRegistration;
>   
>     //
>     // Allocate private data structure for SMM FTW protocol and do some initialization
> @@ -634,17 +623,17 @@ SmmFaultTolerantWriteInitialize (
>     //
>     // Register EFI_SMM_END_OF_DXE_PROTOCOL_GUID notify function.
>     //
> -  Status = gSmst->SmmRegisterProtocolNotify (
> -                    &gEfiSmmEndOfDxeProtocolGuid,
> -                    SmmEndOfDxeCallback,
> -                    &SmmEndOfDxeRegistration
> +  Status = gMmst->MmRegisterProtocolNotify (
> +                    &gEfiMmEndOfDxeProtocolGuid,
> +                    MmEndOfDxeCallback,
> +                    &MmEndOfDxeRegistration
>                       );
>     ASSERT_EFI_ERROR (Status);
>   
>     //
>     // Register FvbNotificationEvent () notify function.
>     //
> -  Status = gSmst->SmmRegisterProtocolNotify (
> +  Status = gMmst->MmRegisterProtocolNotify (
>                       &gEfiSmmFirmwareVolumeBlockProtocolGuid,
>                       FvbNotificationEvent,
>                       &mFvbRegistration
> diff --git a/MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteTraditionalMm.c b/MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteTraditionalMm.c
> new file mode 100644
> index 000000000000..78351199d3f1
> --- /dev/null
> +++ b/MdeModulePkg/Universal/FaultTolerantWriteDxe/FaultTolerantWriteTraditionalMm.c
> @@ -0,0 +1,106 @@

[Trimmed]

> +
> +/**
> +  Entry point of the module

The comments block should have description for the two parameters.


Thanks,
Star

> +**/
> +EFI_STATUS
> +EFIAPI
> +SmmFaultTolerantWriteInitialize (
> +  IN EFI_HANDLE            ImageHandle,
> +  IN EFI_SYSTEM_TABLE      *SystemTable
> +  )
> +{
> +  return MmFaultTolerantWriteInitialize ();
> +}
> diff --git a/MdeModulePkg/Universal/FaultTolerantWriteDxe/UpdateWorkingBlock.c b/MdeModulePkg/Universal/FaultTolerantWriteDxe/UpdateWorkingBlock.c
> index 50d3421b88bb..d09e9719cf05 100644
> --- a/MdeModulePkg/Universal/FaultTolerantWriteDxe/UpdateWorkingBlock.c
> +++ b/MdeModulePkg/Universal/FaultTolerantWriteDxe/UpdateWorkingBlock.c
> @@ -29,8 +29,6 @@ InitializeLocalWorkSpaceHeader (
>     VOID
>     )
>   {
> -  EFI_STATUS                              Status;
> -
>     //
>     // Check signature with gEdkiiWorkingBlockSignatureGuid.
>     //
> @@ -64,12 +62,8 @@ InitializeLocalWorkSpaceHeader (
>     //
>     // Calculate the Crc of woking block header
>     //
> -  Status = gBS->CalculateCrc32 (
> -                  &mWorkingBlockHeader,
> -                  sizeof (EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER),
> -                  &mWorkingBlockHeader.Crc
> -                  );
> -  ASSERT_EFI_ERROR (Status);
> +  mWorkingBlockHeader.Crc = FtwCalculateCrc32 (&mWorkingBlockHeader,
> +                              sizeof (EFI_FAULT_TOLERANT_WORKING_BLOCK_HEADER));
>   
>     mWorkingBlockHeader.WorkingBlockValid    = FTW_VALID_STATE;
>     mWorkingBlockHeader.WorkingBlockInvalid  = FTW_INVALID_STATE;
> 



  reply	other threads:[~2019-01-16  3:29 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-01-14 13:27 [PATCH v2 00/17] implement standalone MM versions of the variable runtime drivers Ard Biesheuvel
2019-01-14 13:27 ` [PATCH v2 01/17] MdeModulePkg/MdeModulePkg.dsc: add MmServicesTableLib resolution Ard Biesheuvel
2019-01-16  5:02   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 02/17] OvmfPkg: " Ard Biesheuvel
2019-01-14 16:40   ` Laszlo Ersek
2019-01-14 17:05     ` Ard Biesheuvel
2019-01-14 13:27 ` [PATCH v2 03/17] QuarkPlatformPkg: " Ard Biesheuvel
2019-01-16 15:14   ` Gao, Liming
2019-01-14 13:27 ` [PATCH v2 04/17] Vlv2TbltDevicePkg: " Ard Biesheuvel
2019-01-16 15:14   ` Gao, Liming
2019-01-16 17:44     ` Ard Biesheuvel
2019-01-16 19:00       ` Kinney, Michael D
2019-01-17  5:20       ` Qian, Yi
2019-01-14 13:27 ` [PATCH v2 05/17] MdeModulePkg/FaultTolerantWriteDxe: factor out boot service accesses Ard Biesheuvel
2019-01-16  3:29   ` Zeng, Star [this message]
2019-01-14 13:27 ` [PATCH v2 06/17] MdeModulePkg/FaultTolerantWriteDxe: implement standalone MM version Ard Biesheuvel
2019-01-16  3:32   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 07/17] MdeModulePkg/VariableRuntimeDxe: factor out boot service accesses Ard Biesheuvel
2019-01-16  4:57   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 08/17] MdeModulePkg/VariableRuntimeDxe: implement standalone MM version Ard Biesheuvel
2019-01-16  5:00   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 09/17] MdePkg: introduce standalone MM entry point library class Ard Biesheuvel
2019-01-16  6:32   ` Zeng, Star
2019-01-16 14:56     ` Gao, Liming
2019-01-16 14:57       ` Ard Biesheuvel
2019-01-14 13:27 ` [PATCH v2 10/17] MdePkg: introduce standalone MM entry point library implementation Ard Biesheuvel
2019-01-14 13:27 ` [PATCH v2 11/17] MdePkg: add MM_STANDALONE implementation of MmServicesTableLib Ard Biesheuvel
2019-01-14 13:27 ` [PATCH v2 12/17] MdeModulePkg: implement NULL instance of HobLib library class Ard Biesheuvel
2019-01-16  5:10   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 13/17] MdeModulePkg: implement NULL instance of MemoryAllocationLib " Ard Biesheuvel
2019-01-16  5:09   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 14/17] MdeModulePkg/MdeModulePkg/dsc: move DxeDebugSupportDxe to x86 only section Ard Biesheuvel
2019-01-16  5:27   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 15/17] MdeModulePkg/AuthVariableLibNull: add MM_STANDALONE support Ard Biesheuvel
2019-01-16  5:03   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 16/17] MdeModulePkg/VarCheckLib: " Ard Biesheuvel
2019-01-16  5:03   ` Zeng, Star
2019-01-14 13:27 ` [PATCH v2 17/17] MdeModulePkg/MdeModulePkg.dsc: add MM_STANDALONE FTW and variable modules Ard Biesheuvel
2019-01-16  5:04   ` Zeng, Star
2019-01-15  8:25 ` [PATCH v2 00/17] implement standalone MM versions of the variable runtime drivers Wang, Jian J
2019-01-16 19:28   ` Ard Biesheuvel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8cbf777c-5f28-8c51-461b-cce2413f06a5@intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox