public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "duntan" <dun.tan@intel.com>
To: "Ni, Ray" <ray.ni@intel.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: "Dong, Eric" <eric.dong@intel.com>,
	"Kumar, Rahul R" <rahul.r.kumar@intel.com>
Subject: Re: [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm:Fix PF issue caused by smm page table code
Date: Tue, 3 Jan 2023 03:31:38 +0000	[thread overview]
Message-ID: <BN9PR11MB54830CDD63BC06E7EA22A05AE5F49@BN9PR11MB5483.namprd11.prod.outlook.com> (raw)
In-Reply-To: <MN6PR11MB82444A56A470C7E6B03ABA598CF49@MN6PR11MB8244.namprd11.prod.outlook.com>

Ray,
Thanks for the comments. Will send V2 patch soon.

Thanks,
Dun

-----Original Message-----
From: Ni, Ray <ray.ni@intel.com> 
Sent: Tuesday, January 3, 2023 11:23 AM
To: Tan, Dun <dun.tan@intel.com>; devel@edk2.groups.io
Cc: Dong, Eric <eric.dong@intel.com>; Kumar, Rahul R <rahul.r.kumar@intel.com>
Subject: RE: [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm:Fix PF issue caused by smm page table code

Dun,
CET should be disabled before clearing CR0.WP.

> -----Original Message-----
> From: Tan, Dun <dun.tan@intel.com>
> Sent: Tuesday, January 3, 2023 10:57 AM
> To: devel@edk2.groups.io
> Cc: Dong, Eric <eric.dong@intel.com>; Ni, Ray <ray.ni@intel.com>; 
> Kumar, Rahul R <rahul.r.kumar@intel.com>
> Subject: [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm:Fix PF issue caused by smm 
> page table code
> 
> When setting new page table pool to RO, only disable/enable WP when 
> Cr0.WP has been set to 1 to fix potential PF caused by b822be1a20
> (UefiCpuPkg/PiSmmCpuDxeSmm: Introduce page table pool mechanism).
> With previous code, if someone want to modify the page table and 
> Cr0.WP has been cleared before modify page table, Cr0.WP may be set to 
> 1 again since new pool may be generated during this process Then PF 
> fault may happens.
> 
> Signed-off-by: Dun Tan <dun.tan@intel.com>
> Cc: Eric Dong <eric.dong@intel.com>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Rahul Kumar <rahul1.kumar@intel.com>
> ---
>  UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c | 40 
> ++++++++++++++++++++++++++++------------
>  1 file changed, 28 insertions(+), 12 deletions(-)
> 
> diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
> b/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
> index 4bb23f6920..c385f12d9c 100644
> --- a/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
> +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
> @@ -67,8 +67,10 @@ InitializePageTablePool (
>    IN UINTN  PoolPages
>    )
>  {
> -  VOID     *Buffer;
> -  BOOLEAN  CetEnabled;
> +  VOID      *Buffer;
> +  BOOLEAN   CetEnabled;
> +  BOOLEAN   WpEnabled;
> +  IA32_CR0  Cr0;
> 
>    //
>    // Always reserve at least PAGE_TABLE_POOL_UNIT_PAGES, including 
> one page for @@ -106,21 +108,35 @@ InitializePageTablePool (
>    //
>    if (mIsReadOnlyPageTable) {
>      CetEnabled = ((AsmReadCr4 () & CR4_CET_ENABLE) != 0) ? TRUE : FALSE;
> -    if (CetEnabled) {
> +    Cr0.UintN  = AsmReadCr0 ();
> +    WpEnabled  = (Cr0.Bits.WP != 0) ? TRUE : FALSE;
> +    if (WpEnabled) {
>        //
> -      // CET must be disabled if WP is disabled.
> +      // Only disable/enable WP when Cr0.Bits.WP has been set to 1.
>        //
> -      DisableCet ();
> +      Cr0.Bits.WP = 0;
> +      AsmWriteCr0 (Cr0.UintN);
> +
> +      if (CetEnabled) {
> +        //
> +        // CET must be disabled if WP is disabled.
> +        //
> +        DisableCet ();
> +      }
>      }
> 
> -    AsmWriteCr0 (AsmReadCr0 () & ~CR0_WP);
>      SmmSetMemoryAttributes ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer, 
> EFI_PAGES_TO_SIZE (PoolPages), EFI_MEMORY_RO);
> -    AsmWriteCr0 (AsmReadCr0 () | CR0_WP);
> -    if (CetEnabled) {
> -      //
> -      // re-enable CET.
> -      //
> -      EnableCet ();
> +    if (WpEnabled) {
> +      Cr0.UintN   = AsmReadCr0 ();
> +      Cr0.Bits.WP = 1;
> +      AsmWriteCr0 (Cr0.UintN);
> +
> +      if (CetEnabled) {
> +        //
> +        // re-enable CET.
> +        //
> +        EnableCet ();
> +      }
>      }
>    }
> 
> --
> 2.31.1.windows.1


      reply	other threads:[~2023-01-03  3:31 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-01-03  2:56 [PATCH] UefiCpuPkg/PiSmmCpuDxeSmm:Fix PF issue caused by smm page table code duntan
2023-01-03  3:22 ` Ni, Ray
2023-01-03  3:31   ` duntan [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=BN9PR11MB54830CDD63BC06E7EA22A05AE5F49@BN9PR11MB5483.namprd11.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox