From: "Ni, Ruiyu" <ruiyu.ni@Intel.com>
To: Laszlo Ersek <lersek@redhat.com>, Eric Dong <eric.dong@intel.com>,
edk2-devel@lists.01.org
Subject: Re: [Patch v3] UefiCpuPkg/S3Resume2Pei: disable paging before creating new page table.
Date: Tue, 9 Oct 2018 16:59:33 +0800 [thread overview]
Message-ID: <86397fca-fa57-470a-8ca0-31e9ad1204b2@Intel.com> (raw)
In-Reply-To: <8861ff1a-d42d-3778-a92f-44ae4039968b@redhat.com>
On 10/9/2018 4:25 PM, Laszlo Ersek wrote:
> On 10/09/18 08:01, Eric Dong wrote:
>> V3 changes:
>> No need to change inf file. Also update commit message to include regression info.
>>
>> V2 changes:
>> Only disable paging in 32 bit mode, no matter it is enable or not.
>>
>> V1 changes:
>> PEI Stack Guard needs to enable paging. This might cause #GP if code
>> trying to write CR3 register with PML4 page table while the processor
>> is enabled with PAE paging.
>>
>> Simply disabling paging before updating CR3 can solve this conflict.
>>
>> It's an regression caused by change: 0a0d5296e448fc350de1594c49b9c0deff7fad60
>>
>> BZ: https://bugzilla.tianocore.org/show_bug.cgi?id=1232
>>
>> Cc: Ruiyu Ni <ruiyu.ni@intel.com>
>> Cc: Laszlo Ersek <lersek@redhat.com>
>> Cc: Jian J Wang <jian.j.wang@intel.com>
>> Contributed-under: TianoCore Contribution Agreement 1.1
>> Signed-off-by:Eric Dong <eric.dong@intel.com>
>> ---
>> UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c | 8 ++++++++
>> 1 file changed, 8 insertions(+)
>>
>> diff --git a/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c b/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c
>> index f164c1713b..53ed76c6e6 100644
>> --- a/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c
>> +++ b/UefiCpuPkg/Universal/Acpi/S3Resume2Pei/S3Resume.c
>> @@ -1105,6 +1105,14 @@ S3RestoreConfig2 (
>> //
>> SetInterruptState (InterruptStatus);
>>
>> + if (sizeof(UINTN) == sizeof(UINT32)) {
>
> I think we usually insert a space character after the "sizeof" operator
> in such cases.
>
>> + //
>> + // Paging maybe enabled. If current mode is 32 bit mode and code try to
>> + // enable 64 bit mode page table, it will cause GP fault.
>> + // To avoid conflict configuration, disable paging first anyway.
>> + //
>> + AsmWriteCr0 (AsmReadCr0 () & (~BIT31));
>
> The bit-manipulation is valid, but only because this code is restricted
> to 32-bit mode, where UINTN is UINT32. For clarity, I think
> ~(UINTN)BIT31 would be better. (The AsmWriteCr0() and AsmReadCr0()
> BaseLib functions work with UINTN, but the type of BIT31 is UINT32.)
>
>> + }
>> AsmWriteCr3 ((UINTN)SmmS3ResumeState->SmmS3Cr3);
>>
>> //
>>
>
> So, my main point:
>
> Would it make sense to avoid a write to CR0 if paging is disabled? Such as:
>
> UINTN Cr0;
>
> if (sizeof (UINTN) == sizeof (UINT32)) {
> Cr0 = AsmReadCr0 ();
> if ((Cr0 & BIT31) != 0) {
> //
> // We're in 32-bit mode, with paging enabled. We can't set CR3 to
> // the 64-bit page tables without first disabling paging.
> //
> Cr0 &= ~(UINTN)BIT31;
> AsmWriteCr0 (Cr0);
> }
> }
>
> I haven't tested this patch yet, it's just that I'm generally concerned
> about CR *writes* under KVM that aren't absolutely necessary. OVMF does
> not enable the PEI Stack Guard, so in practice, disabling paging is not
> necessary (because it is never enabled anyway, for now). Therefore I
> would like to save the CR0 write, in the IA32X64 build of OVMF.
>
> Of course, I don't insist on the exact code example that I wrote above;
> it's just illustration.
>
> In summary, I suggest:
>
> - please consider making the CR0 write conditional on *both* being in
> 32-bit mode *and* BIT31 being set in CR0,
>
> - for clarity, please use ~(UINTN)BIT31 as mask (even though it makes no
> practical difference).
Actually we could use IA32_CR0 structure to avoid BIT31 usage.
>
> What do you think?
>
> Thanks!
> Laszlo
>
--
Thanks,
Ray
next prev parent reply other threads:[~2018-10-09 9:05 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-10-09 6:01 [Patch v3] UefiCpuPkg/S3Resume2Pei: disable paging before creating new page table Eric Dong
2018-10-09 7:48 ` Ni, Ruiyu
2018-10-09 8:25 ` Laszlo Ersek
2018-10-09 8:59 ` Ni, Ruiyu [this message]
2018-10-09 9:14 ` Laszlo Ersek
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=86397fca-fa57-470a-8ca0-31e9ad1204b2@Intel.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox