From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0729.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe48::729]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 7CCB51A1E30 for ; Mon, 10 Oct 2016 13:11:08 -0700 (PDT) Received: from AT5PR84MB0291.NAMPRD84.PROD.OUTLOOK.COM (10.162.138.25) by AT5PR84MB0289.NAMPRD84.PROD.OUTLOOK.COM (10.162.138.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.659.11; Mon, 10 Oct 2016 20:11:07 +0000 Received: from AT5PR84MB0291.NAMPRD84.PROD.OUTLOOK.COM ([10.162.138.25]) by AT5PR84MB0291.NAMPRD84.PROD.OUTLOOK.COM ([10.162.138.25]) with mapi id 15.01.0659.020; Mon, 10 Oct 2016 20:11:07 +0000 From: "Cohen, Eugene" To: "Kinney, Michael D" , "Gao, Liming" , Laszlo Ersek , "edk2-devel@lists.01.org" , "Yao, Jiewen" , "Andrew Fish (afish@apple.com)" Thread-Topic: [edk2] RFC: ProtocolLib for cross DXE and SMM Protocol and Handle Services Thread-Index: AdIbIt8zDF4zYVg0Qm6BbTDEpt2HcgAA5RyAAARYvtAAAp28gAAI576gAZpdBoAATn70sAABT7uAAACv6eAAA1eMgAAEjzQA Date: Mon, 10 Oct 2016 20:11:07 +0000 Message-ID: References: <9877647c-b348-2a36-9ac0-b520a82260d1@redhat.com> <654a587b-8f79-51ef-8ba9-a29779de46c9@redhat.com> <4A89E2EF3DFEDB4C8BFDE51014F606A14B4820B6@shsmsx102.ccr.corp.intel.com> In-Reply-To: Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=eugene@hp.com; x-originating-ip: [15.65.252.13] x-ms-office365-filtering-correlation-id: 56c69051-afed-4bb1-e72f-08d3f1499214 x-microsoft-exchange-diagnostics: 1; AT5PR84MB0289; 6:dgRKNYwTB8Uk9ZzqFVxhcJ17Gq8Gl2dTVNcEseeY2qZEd4z0XleJwuHk2d8JDv44sRFLv/HRsTtzSXGezLDw0CtHtJM8tZ0V6u4lHD85p/M+6t3xihTYH/b+2Gto2F3pX1MIHGtpHiGEwddrGnWq89+a5HGJqghY7dLfQxN1kySFEe59QAuEANjVsi1fG67E4miQwT+bjH8ZGFc/OBJRFdJiCRgdYIR82oGUAj6F+EHPBzgxdSJ7nQWjzGOWBfflKa9vg5LJhOlIULd4mMjZ4KpSINBEnrDuL5SpZ5FVyZWyYHIx03HPYOjhq3okd26X; 5:fJCQFMPf3SLNTyEYX7TwdmAsyuf9s/1QwFxHtYnhZyx6hgLGr8fV4bwgk0leqBUrRh4NcUjAokqbH5lXqd4xd0Xo6gDDbPQoM7g/uYfxsM+0CwlA42FTpFqjz7LRhYBH/XFJXnzv1gE+96lXsSRk4g==; 24:hRoixIeS1ktiGbdcpHzJ2k2rJm6+AxoxTJjhkjGCHR7ZrA0TKsKAXXz8dAcLjN9cyi2PzoLzUNkAH6EkCEbcKfwHb2YVJlhl7VXRISyz5KU=; 7:NetCrmUGRkxt2/OeDDOzyO6++Wgy5/7LqXjclsMRyKPS+PmnNaJGWSW7PkpxNratNdWp1f567I5sAR0ELa6Cm/dVGMcEUkNGahd6Yo0daUQrA90qITIWdDAKIl2Emm4/MTNL1tG/D3mrasmYQeRW61wpOK1C/x4Om//WVwYX4c5NaHQcJkbq3XaOLBcl+FLPzdVgIirz3RWRL2XSR/3tMspkYG6VEt7/RtodZAXB2frKgaCZmAteCTiKrrZJ44CbI4MB7UgdEjwZ4CYmyp/aP2m0QwkVPS+OnL/3TeIMy+tz5Fd6RX8oH7UqBD3+PT7cmBV15czVKITFvW5KAjk7nLdcEVYjQt3X8kxXZD3puW4= x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:AT5PR84MB0289; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(192374486261705); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040176)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001); SRVR:AT5PR84MB0289; BCL:0; PCL:0; RULEID:; SRVR:AT5PR84MB0289; x-forefront-prvs: 0091C8F1EB x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(7916002)(199003)(6602003)(189002)(76176999)(77096005)(50986999)(54356999)(74316002)(101416001)(2900100001)(305945005)(7736002)(7846002)(8936002)(8666005)(3280700002)(3660700001)(81166006)(8676002)(10400500002)(81156014)(68736007)(9686002)(93886004)(122556002)(92566002)(33656002)(97736004)(189998001)(107886002)(5001770100001)(87936001)(5002640100001)(99286002)(102836003)(106356001)(2906002)(6116002)(3846002)(7696004)(5660300001)(66066001)(105586002)(86362001)(586003)(2950100002)(11100500001)(7059030)(491001); DIR:OUT; SFP:1102; SCL:1; SRVR:AT5PR84MB0289; H:AT5PR84MB0291.NAMPRD84.PROD.OUTLOOK.COM; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; received-spf: None (protection.outlook.com: hp.com does not designate permitted sender hosts) spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM MIME-Version: 1.0 X-OriginatorOrg: hp.com X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Oct 2016 20:11:07.3160 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: ca7981a2-785a-463d-b82a-3db87dfc3ce6 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AT5PR84MB0289 Subject: Re: RFC: ProtocolLib for cross DXE and SMM Protocol and Handle Services X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Oct 2016 20:11:08 -0000 Content-Language: en-US Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable Mike, =20 > Can you provide examples in EDK II today where the same GUID Value > and Structure definition > are used in both the UEFI Handle Database and the SMM Handle > Database. The example exists in our internal code right now. We have two platform fa= milies: one with SMM and one without. We have a library, originally develo= ped as a DXE library, that use a protocol to determine a secure boot policy= setting. This library is linked against our variable driver. In our non-= SMM system the variable driver runs as a Runtime DXE component and the poli= cy protocol referenced is published in the Boot Services protocol DB. In o= ur SMM system the variable driver runs in SMM and the policy protocol is pu= blished in the SMM protocol DB. The protocol is identical and uses the sam= e GUID. So in this scenario we don't install the protocol simultaneously i= n both environments, rather we have different platforms where the protocol = resides on one side or the other. Since this protocol is really simple (it= 's not using events, TPL or depending on UEFI boot services stuff) it works= well for this model. =20 > I am aware of cases where an SMM Driver looks for protocols in the > DXE Handle database, > but I don't think your proposed lib would cover that case. Correct - in our usage we are trying to discourage the cross-pollination of= SMM and DXE in this way since security minded people get nervous when SMM = executes outside of the secure sandbox. Thanks, Eugene