From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=192.55.52.88; helo=mga01.intel.com; envelope-from=star.zeng@intel.com; receiver=edk2-devel@lists.01.org Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 2882F208AE35F for ; Thu, 21 Feb 2019 01:33:37 -0800 (PST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Feb 2019 01:33:37 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,394,1544515200"; d="scan'208";a="145319294" Received: from shzintpr01.sh.intel.com (HELO [10.253.24.26]) ([10.239.4.80]) by fmsmga002.fm.intel.com with ESMTP; 21 Feb 2019 01:33:35 -0800 To: Ard Biesheuvel , Laszlo Ersek Cc: "edk2-devel@lists.01.org" , "Gao, Liming" , "Yao, Jiewen" , "Zhang, Chao B" , "Kinney, Michael D" , star.zeng@intel.com References: <1550570820-29379-1-git-send-email-jagadeesh.ujja@arm.com> <615a9ac8-1ca9-94e1-a473-b251dae57460@redhat.com> From: "Zeng, Star" Message-ID: Date: Thu, 21 Feb 2019 17:33:05 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.5.0 MIME-Version: 1.0 In-Reply-To: Subject: Re: [PATCH] MdeModulePkg/VariableSmmRuntimeDxe: Refactor locating Variable Arch Protocol X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Feb 2019 09:33:38 -0000 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit On 2019/2/21 17:11, Ard Biesheuvel wrote: > On Thu, 21 Feb 2019 at 10:04, Laszlo Ersek wrote: >> >> On 02/20/19 13:23, Ard Biesheuvel wrote: >>> On Wed, 20 Feb 2019 at 06:53, Jagadeesh Ujja wrote: >>>> >>>> hi Ard, >>>> On Tue, Feb 19, 2019 at 6:55 PM Ard Biesheuvel >>>> wrote: >>>>> >>>>> Hello Jagadeesh, >>>>> >>>>> On Tue, 19 Feb 2019 at 11:47, Jagadeesh Ujja wrote: >>>>>> >>>>>> In preparation for providing a standalone MM based non-secure variable >>>>>> runtime driver, factor out some portions that are specific to the >>>>>> traditional driver, mainly related to locating variable arch protocol >>>>>> and variable write arch protocol, which are not required to be located >>>>>> when using standalone MM based secure variable implementation. >>>>>> >>>>> >>>>> While i think this change is correct from a technical perspective, I >>>>> don't think this is the right approach. >>>>> >>>> these changes are mandatory, this is one of the possible solution. >>>> >>>>> It was a deliberate decision to expose the MM services in a way that >>>>> only the producer of the communication protocol is aware of the >>>>> implementation details, i.e., whether it is backed by tradtional MM or >>>>> standalone MM. >>>>> >>>> can you please provide more details on how "exposing the MM services" >>>> will help to resolve the issue here. if this helps, definitely i will use that. >>>> >>> >>> Let me rephrase this for the benefit of the MdeModulePkg maintainers, >>> and ask them their opinion. >>> >>> Currently, the DXE runtime driver that produces the architectural >>> varstore protocols that are based on communication with MM components >>> living elsewhere, rely on the EFI protocol database for sequencing. >>> I.e., after dispatch, they wait for certain protocols to be installed >>> into the DXE protocol database by the SMM drivers before proceeding to >>> install the variable arch protocols. >>> >>> This does not work for standalone MM, since it has no access to the >>> DXE protocol database, nor is it needed, since it may be assumed that >>> the MM execution context is fully configured by the time the DXE phase >>> starts. >>> >>> Jagadeesh's proposal is to factor this out, and create two different >>> .INFs to build the same DXE runtime driver in two different ways. This >>> defeats the purpose of having an abstract MM communication protocol, >>> so it is something I would like to avoid. On the other hand, is it not >>> obvious how to parameterize this requirement in another way. >>> >>> For the moment, I could live with putting this into a library, and >>> leave it up to the platform to ensure the combination of the library >>> resolution with the driver that produces the MM communicate protocol >>> is a sane one. >>> >>> Any thoughts? >> >> I think I'm missing the gist of the library approach; still, would it be >> possible for affected platforms (i.e. those that depend on standalone >> MM) to procude the necessary DXE protocols (for unblocking the variable >> runtime driver) in a platform DXE driver? >> > > Yes, that is the other option: we could create a library that > unconditionally produces those protocols and hook it into the MM > communication driver via NULL library class resolution. > I am not familiar with standalone MM, either ARM. So may have no much valuable opinion. For this case, standalone MM could not install DXE protocols into DXE protocol database to notify the wrapper (VariableSmmRuntimeDxe), so need another way to install the DXE protocols, right? Could standalone MM assume the MM handler for variable is ready when MM communication driver runs? If yes, a NULL library instance should work (as a stub to install the DXE protocols in its constructor). :) Thanks, Star