Small patch, but I have several comments :) On 11/14/23 03:08, Zhiguang Liu wrote: > Currently, if BSP election is not enabled, will use Core0 as SMM BSP, > however, Core0 does not always have the highest performance core. > So, we can used NonSmm BSP as default BSP.
(1) Please consider mentioning in the commit message that the change from this patch will take effect in SmiRendezvous(). (2) Please put "UefiCpuPkg/PiSmmCpuDxeSmm: ..." in the subject. > > Cc: Ray Ni <ray...@intel.com> > Cc: Rahul Kumar <rahul1.ku...@intel.com> > Cc: Gerd Hoffmann <kra...@redhat.com> > Signed-off-by: Zhiguang Liu <zhiguang....@intel.com> > --- > UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c | 10 +++++ > UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c | 48 +++++++++++----------- > 2 files changed, 34 insertions(+), 24 deletions(-) > > diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c > b/UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c > index 25d058c5b9..a4f83bb122 100644 > --- a/UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c > +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c > @@ -29,6 +29,8 @@ MM_COMPLETION mSmmStartupThisApToken; > // > UINT32 *mPackageFirstThreadIndex = NULL; > > +extern EFI_MP_SERVICES_PROTOCOL *mMpServices; > + > /** > Performs an atomic compare exchange operation to get semaphore. > The compare exchange operation must be performed using > @@ -1953,6 +1955,14 @@ InitializeMpSyncData ( > // Enable BSP election by setting BspIndex to -1 > // > mSmmMpSyncData->BspIndex = (UINT32)-1; > + } else { > + // > + // Use NonSMM BSP as SMM BSP > + // > + ASSERT (mMpServices != NULL); > + if (mMpServices != NULL) { > + mMpServices->WhoAmI (mMpServices, (UINTN > *)&mSmmMpSyncData->BspIndex); > + } > } > > mSmmMpSyncData->EffectiveSyncMode = mCpuSmmSyncMode; (3) This branch cannot be tested on OVMF, due to commit 43df61878d94 ("OvmfPkg: enable SMM Monarch Election in PiSmmCpuDxeSmm", 2020-03-04). That's not a problem with the patch of course, just saying that I can't offer regression testing. (4) Not checking the return value of WhoAmI() is actually valid here. Per PI spec, WhoAmI() can only fail if we pass a null pointer for "ProcessorNumber" (and we don't do that here). Not sure about static analysis tools though. If they complain, we might want to cast the return value to (VOID) explicitly: (VOID)mMpServices->WhoAmI (...); Not needed unless those tools complain, of course. (5) Passing the following argument for the "ProcessorNumber" parameter (UINTN *)&mSmmMpSyncData->BspIndex is undefined behavior, for two reasons. First, "SMM_DISPATCHER_MP_SYNC_DATA.BspIndex" is volatile-qualified, but the access here (or more precisely, inside WhoAmI()) happens through an lvalue that doesn't necessarily have volatile-qualified type. That's UB. Second, "SMM_DISPATCHER_MP_SYNC_DATA.BspIndex" has type "(volatile) UINT32", but WhoAmI() writes an UINTN. On IA32, you're going to corrupt memory. Therefore you should to do this: UINTN DxeBspNumber; MpServices->WhoAmI (mMpServices, &DxeBspNumber); if (DxeBspNumber <= MAX_UINT32) { mSmmMpSyncData->BspIndex = (UINT32)DxeBspNumber; } In other words, use a local variable of the right type, and range check it. If the range check fails, then just fall back to the current behavior (leave BspIndex at zero). Otherwise, employ an explicit assignment, including casting. This will in particular keep "volatile" happy (and there can't be any overflow either, after the range check). One more comment below: > diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c > b/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c > index 1d022a7051..18c77c59e6 100644 > --- a/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c > +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c > @@ -128,7 +128,8 @@ SPIN_LOCK *mConfigSmmCodeAccessCheckLock = NULL; > EFI_SMRAM_DESCRIPTOR *mSmmCpuSmramRanges; > UINTN mSmmCpuSmramRangeCount; > > -UINT8 mPhysicalAddressBits; > +UINT8 mPhysicalAddressBits; > +EFI_MP_SERVICES_PROTOCOL *mMpServices; > > // > // Control register contents saved for SMM S3 resume state initialization. > @@ -603,26 +604,25 @@ PiCpuSmmEntry ( > IN EFI_SYSTEM_TABLE *SystemTable > ) > { > - EFI_STATUS Status; > - EFI_MP_SERVICES_PROTOCOL *MpServices; > - UINTN NumberOfEnabledProcessors; > - UINTN Index; > - VOID *Buffer; > - UINTN BufferPages; > - UINTN TileCodeSize; > - UINTN TileDataSize; > - UINTN TileSize; > - UINT8 *Stacks; > - VOID *Registration; > - UINT32 RegEax; > - UINT32 RegEbx; > - UINT32 RegEcx; > - UINT32 RegEdx; > - UINTN FamilyId; > - UINTN ModelId; > - UINT32 Cr3; > - EFI_HOB_GUID_TYPE *GuidHob; > - SMM_BASE_HOB_DATA *SmmBaseHobData; > + EFI_STATUS Status; > + UINTN NumberOfEnabledProcessors; > + UINTN Index; > + VOID *Buffer; > + UINTN BufferPages; > + UINTN TileCodeSize; > + UINTN TileDataSize; > + UINTN TileSize; > + UINT8 *Stacks; > + VOID *Registration; > + UINT32 RegEax; > + UINT32 RegEbx; > + UINT32 RegEcx; > + UINT32 RegEdx; > + UINTN FamilyId; > + UINTN ModelId; > + UINT32 Cr3; > + EFI_HOB_GUID_TYPE *GuidHob; > + SMM_BASE_HOB_DATA *SmmBaseHobData; > > GuidHob = NULL; > SmmBaseHobData = NULL; > @@ -656,13 +656,13 @@ PiCpuSmmEntry ( > // > // Get MP Services Protocol > // > - Status = SystemTable->BootServices->LocateProtocol > (&gEfiMpServiceProtocolGuid, NULL, (VOID **)&MpServices); > + Status = SystemTable->BootServices->LocateProtocol > (&gEfiMpServiceProtocolGuid, NULL, (VOID **)&mMpServices); > ASSERT_EFI_ERROR (Status); > > // > // Use MP Services Protocol to retrieve the number of processors and > number of enabled processors > // > - Status = MpServices->GetNumberOfProcessors (MpServices, &mNumberOfCpus, > &NumberOfEnabledProcessors); > + Status = mMpServices->GetNumberOfProcessors (mMpServices, &mNumberOfCpus, > &NumberOfEnabledProcessors); > ASSERT_EFI_ERROR (Status); > ASSERT (mNumberOfCpus <= PcdGet32 (PcdCpuMaxLogicalProcessorNumber)); > > @@ -945,7 +945,7 @@ PiCpuSmmEntry ( > gSmmCpuPrivate->Operation[Index] = SmmCpuNone; > > if (Index < mNumberOfCpus) { > - Status = MpServices->GetProcessorInfo (MpServices, Index | > CPU_V2_EXTENDED_TOPOLOGY, &gSmmCpuPrivate->ProcessorInfo[Index]); > + Status = mMpServices->GetProcessorInfo (mMpServices, Index | > CPU_V2_EXTENDED_TOPOLOGY, &gSmmCpuPrivate->ProcessorInfo[Index]); > ASSERT_EFI_ERROR (Status); > mCpuHotPlugData.ApicId[Index] = > gSmmCpuPrivate->ProcessorInfo[Index].ProcessorId; > (6) Turning the "MpServices" local variable of PiCpuSmmEntry() into a global variable is a bad idea. The global variable will live in SMRAM, so it is a waste of SMRAM, for starters. Second, it is a security risk. Any pointer that exists in SMRAM and points *outside* of SMRAM is a security risk. If, additionally, the pointer points at a DXE protocol (i.e., it is used for executing DXE code), then the risk increases. You don't actually *need* this pointer (MpServices) to outlive PiCpuSmmEntry(). PiCpuSmmEntry(), and functions invoked from PiCpuSmmEntry(), are permitted to consume DXE protocols, but once the entry point function returns, PiSmmCpuDxeSmm is not permitted to access DXE artifacts. Therefore allowing a DXE protocol's address to persist in PiSmmCpuDxeSmm after PiCpuSmmEntry() returns is just asking for trouble. ( Side comment: note that PiSmmCpuDxeSmm does not use UefiBootServicesTableLib! In other words, it does not use the "gBS" global variable. That is not random. It is intentional. It prevents you from accidentally invoking a UEFI Boot Service where you shouldn't. Accordingly, the entry point function looks up the MP Services Protocol like this: Status = SystemTable->BootServices->LocateProtocol (&gEfiMpServiceProtocolGuid, NULL, (VOID **)&MpServices); Explicit "SystemTable->BootServices" dereference, rather than "gBS" dereference. Importantly, SystemTable is a *parameter* of PiCpuSmmEntry(), so no other function in PiSmmCpuDxeSmm will have access to it, unless PiCpuSmmEntry() passes it on. ) So, this is our call chain: PiCpuSmmEntry() [UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.c] InitializeMpServiceData() [UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c] InitializeMpSyncData() [UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c] I suggest extending InitializeMpServiceData() and InitializeMpSyncData() to take MpServices. Thread MpServices from PiCpuSmmEntry() through InitializeMpServiceData() to InitializeMpSyncData(). That will clarify that InitializeMpSyncData() consumes MpServices only because it runs on the stack of PiCpuSmmEntry(). Thanks Laszlo -=-=-=-=-=-=-=-=-=-=-=- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#111210): https://edk2.groups.io/g/devel/message/111210 Mute This Topic: https://groups.io/mt/102576442/21656 Group Owner: devel+ow...@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/leave/9847357/21656/1706620634/xyzzy [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-