From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=66.187.233.73; helo=mx1.redhat.com; envelope-from=lersek@redhat.com; receiver=edk2-devel@lists.01.org Received: from mx1.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id DB70F223C1798 for ; Tue, 20 Feb 2018 00:48:05 -0800 (PST) Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 55124EAEAB; Tue, 20 Feb 2018 08:54:01 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-120-24.rdu2.redhat.com [10.10.120.24]) by smtp.corp.redhat.com (Postfix) with ESMTP id 0932D2024CA6; Tue, 20 Feb 2018 08:53:59 +0000 (UTC) To: Andrew Fish Cc: Ard Biesheuvel , Ruiyu Ni , Mike Kinney , "edk2-devel@lists.01.org" , Liming Gao References: <20180209041635.320856-1-ruiyu.ni@intel.com> <20180209041635.320856-6-ruiyu.ni@intel.com> <9b3701e7-9dca-5f1f-8ce5-fbe8ab0f0ebe@redhat.com> <813EF154-1100-4151-A52D-2FD80D523B5E@apple.com> From: Laszlo Ersek Message-ID: <1c44e505-b0df-50f7-583a-7ba2ccd4f8c0@redhat.com> Date: Tue, 20 Feb 2018 09:53:58 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <813EF154-1100-4151-A52D-2FD80D523B5E@apple.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Tue, 20 Feb 2018 08:54:01 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Tue, 20 Feb 2018 08:54:01 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'lersek@redhat.com' RCPT:'' Subject: Re: [PATCH v2 05/10] MdeModulePkg/ResetSystemRuntimeDxe: Add more debug message X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Feb 2018 08:48:06 -0000 Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit On 02/20/18 00:30, Andrew Fish wrote: > > >> On Feb 19, 2018, at 11:23 AM, Laszlo Ersek wrote: >> >> On 02/19/18 19:59, Ard Biesheuvel wrote: >>> On 9 February 2018 at 04:16, Ruiyu Ni wrote: >>>> + DEBUG ((DEBUG_INFO, "DXE ResetSystem2: Reset call depth = %d.\n", mResetNotifyDepth)); >>>> + >>> >>> This DEBUG() print is breaking system reset from the Linux OS at >>> runtime in DEBUG builds. >>> >>> [ 4.223704] reboot: Restarting system >>> [ 4.224733] Unable to handle kernel paging request at virtual >>> address 09000018 >>> >>> This is the boottime MMIO address of the UART on the QEMU mach-virt >>> model, and no runtime mapping exists for it, resulting in the crash. >>> >>> Please ensure that DEBUG () is used with care in DXE_RUNTIME_DRIVER >>> modules. >> >> Not disagreeing, just asking: should we perhaps take care of this in >> a new DebugLib instance, specifically for DXE runtime drivers? >> >> "MdePkg/Library/UefiRuntimeLib" provides functions like >> EfiAtRuntime() and EfiGoneVirtual(). We couldn't use UefiRuntimeLib >> in DebugLib, because UefiRuntimeLib already depends on DebugLib (we >> can't introduce a circular dependency). But, we could reimplement >> EfiAtRuntime() manually, in order to silence all debug messages after >> ExitBootServices(). >> >> This would make sense also because after ExitBootServices(), the >> serial port is considered "owned" by the boot loader or the OS, and >> the firmware should likely not mess up whatever IO occurs there. >> >> I guess the two possible places to implement such runtime logic would >> be: >> >> - in a RuntimeDxe clone of BaseDebugLibSerialPort (i.e., commonly for >> all edk2 platforms), >> >> - in a RuntimeDxe clone of >> "ArmVirtPkg/Library/FdtPL011SerialPortLib/FdtPL011SerialPortLib.inf" >> (i.e., move the checking to the serial port lib level). >> >> (This is different from OVMF / x86, because (a) there the debug data >> are written to IO port 0x402, and the IO address space does not >> depend on paging, (b) largely, no boot loader or OS ever are aware of >> the QEMU debug port, it can be considered as owned by the firmware, >> always.) >> >> Just thinking out loud. >> > > Laszlo, > > From a Pedantic point of view an EFI Runtime Service can only use > hardware not exposed to OS as there is no clean way to share. There > are some scary wiggle words about the RTC that date all the way back > to EFI 1.1, and that is the only conformant exception. So that is > probably why we don't have a generic solution as it is kind of > dangerous. I think a DebugLib instance located at MdePkg/Library/DxeRuntimeDebugLibSerialPort could be general enough, since it would not share hardware with the OS -- it would stop runtime DXE drivers from making SerialPortLib calls. > For example what happens if the OS has a kernel debugger running on > that serial port and EFI Spews DEBUG prints, that would probably not > come out well. > > For things I've written I usually end up writing a macro that does > something like: > > if (!EfiAtRuntime ()) { > DEBUG ((DEBUG_ERROR, "Hello World!")); > } Right, so this supports Ard's original idea, namely that we should disable the DEBUGs in the client code, one way or another... > and > > if (!EfiAtRuntime ()) { > ASSERT (FALSE); > } ... On the other hand, I think only the debug message should be suppressed for ASSERTs; the exception or deadloop (whatever the assert disposition) should not be suppressed at runtime. If the firmware encounters a fatal unexpected error, it's better to hang the system (with the deadloop) or crash it (raise an exception and make the kernel panic) than silently corrupt more state and pretend everything's fine. So wrapping "ASSERT (Predicate)" with "if (!EfiAtRuntime ())" does not seem like the best solution to me. > Maybe it would possible to add a RUNTIME_DEBUG(), RUNTIME_ASSERT(), > etc. macros to the UefiRuntimeLib? > Makes me remember the story from back in the 1990's about and update > to the Windows Plug-N-Play subsystem to auto magically detect modems. > It worked great, and made it easier to get folks online (even if it > was very slow), but seems a software update managed to destroy a very > very expensive custom milling machine. It seems this milling machine > was connected to the serial port of the PC, and it was a very dumb > device as it interpreted data across the serial port as coordinates > and commands, and all the error checking was done on the PC. So these > random data on the serial line told the milling machine to attack its > self. A "winmodem" on steroids :) Thanks! Laszlo