public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Ma, Maurice" <maurice.ma@intel.com>
To: "Ni, Ray" <ray.ni@intel.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: "Dong, Guo" <guo.dong@intel.com>,
	"You, Benjamin" <benjamin.you@intel.com>
Subject: Re: [PATCH] UefiPayloadPkg/PayloadEntry: Inherit 4/5-level paging from bootloader
Date: Fri, 3 Dec 2021 03:43:53 +0000	[thread overview]
Message-ID: <CO1PR11MB49456E06F669840008FC6D19896A9@CO1PR11MB4945.namprd11.prod.outlook.com> (raw)
In-Reply-To: <20210806081626.802-1-ray.ni@intel.com>

Reviewed-by: Maurice Ma <maurice.ma@intel.com>


> -----Original Message-----
> From: Ni, Ray <ray.ni@intel.com>
> Sent: Friday, August 6, 2021 1:16
> To: devel@edk2.groups.io
> Cc: Dong, Guo <guo.dong@intel.com>; Ma, Maurice
> <maurice.ma@intel.com>; You, Benjamin <benjamin.you@intel.com>
> Subject: [PATCH] UefiPayloadPkg/PayloadEntry: Inherit 4/5-level paging from
> bootloader
> 
> The patch removes the dep on PcdUse5LevelPageTable.
> Now the payload inherits the 5-level paging setting from bootloader in IA-32e
> mode and uses 4-level paging in legacy protected mode.
> 
> This fix the potential issue when bootloader enables 5-level paging but 64bit
> payload sets 4-level page table to CR3 resulting CPU exception because
> PcdUse5LevelPageTable is FALSE.
> 
> Signed-off-by: Ray Ni <ray.ni@intel.com>
> Cc: Guo Dong <guo.dong@intel.com>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Maurice Ma <maurice.ma@intel.com>
> Cc: Benjamin You <benjamin.you@intel.com>
> ---
>  .../UefiPayloadEntry/UefiPayloadEntry.inf     |  1 -
>  .../UniversalPayloadEntry.inf                 |  1 -
>  .../UefiPayloadEntry/X64/VirtualMemory.c      | 38 ++++++++-----------
>  3 files changed, 16 insertions(+), 24 deletions(-)
> 
> diff --git a/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.inf
> b/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.inf
> index 8d42925fcd..9b6fab66a1 100644
> --- a/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.inf
> +++ b/UefiPayloadPkg/UefiPayloadEntry/UefiPayloadEntry.inf
> @@ -80,7 +80,6 @@
> 
> gEfiMdeModulePkgTokenSpaceGuid.PcdNullPointerDetectionPropertyMask
> ## CONSUMES
> gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask               ##
> CONSUMES   gEfiMdeModulePkgTokenSpaceGuid.PcdCpuStackGuard
> ## CONSUMES-
> gEfiMdeModulePkgTokenSpaceGuid.PcdUse5LevelPageTable                  ##
> SOMETIMES_CONSUMES
> gEfiMdeModulePkgTokenSpaceGuid.PcdGhcbBase                            ##
> CONSUMES   gEfiMdeModulePkgTokenSpaceGuid.PcdGhcbSize
> ## CONSUMES diff --git
> a/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.inf
> b/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.inf
> index 416a620598..aae62126e9 100644
> --- a/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.inf
> +++ b/UefiPayloadPkg/UefiPayloadEntry/UniversalPayloadEntry.inf
> @@ -85,7 +85,6 @@
> 
> gEfiMdeModulePkgTokenSpaceGuid.PcdNullPointerDetectionPropertyMask
> ## CONSUMES
> gEfiMdeModulePkgTokenSpaceGuid.PcdHeapGuardPropertyMask               ##
> CONSUMES   gEfiMdeModulePkgTokenSpaceGuid.PcdCpuStackGuard
> ## CONSUMES-
> gEfiMdeModulePkgTokenSpaceGuid.PcdUse5LevelPageTable                  ##
> SOMETIMES_CONSUMES
> gEfiMdeModulePkgTokenSpaceGuid.PcdGhcbBase                            ##
> CONSUMES   gEfiMdeModulePkgTokenSpaceGuid.PcdGhcbSize
> ## CONSUMES diff --git
> a/UefiPayloadPkg/UefiPayloadEntry/X64/VirtualMemory.c
> b/UefiPayloadPkg/UefiPayloadEntry/X64/VirtualMemory.c
> index a1c4ad6ff4..9daa46c12c 100644
> --- a/UefiPayloadPkg/UefiPayloadEntry/X64/VirtualMemory.c
> +++ b/UefiPayloadPkg/UefiPayloadEntry/X64/VirtualMemory.c
> @@ -15,7 +15,7 @@
>      2) IA-32 Intel(R) Architecture Software Developer's Manual Volume
> 2:Instruction Set Reference, Intel     3) IA-32 Intel(R) Architecture Software
> Developer's Manual Volume 3:System Programmer's Guide, Intel -Copyright
> (c) 2006 - 2020, Intel Corporation. All rights reserved.<BR>+Copyright (c) 2006
> - 2021, Intel Corporation. All rights reserved.<BR> Copyright (c) 2017, AMD
> Incorporated. All rights reserved.<BR>  SPDX-License-Identifier: BSD-2-
> Clause-Patent@@ -668,7 +668,6 @@ CreateIdentityMappingPageTables (
>    ) {   UINT32                                        RegEax;-
> CPUID_STRUCTURED_EXTENDED_FEATURE_FLAGS_ECX   EcxFlags;   UINT32
> RegEdx;   UINT8                                         PhysicalAddressBits;
> EFI_PHYSICAL_ADDRESS                          PageAddress;@@ -687,7 +686,7 @@
> CreateIdentityMappingPageTables (
>    UINTN                                         TotalPagesNum;   UINTN
> BigPageAddress;   VOID                                          *Hob;-  BOOLEAN
> Page5LevelSupport;+  BOOLEAN                                       Enable5LevelPaging;
> BOOLEAN                                       Page1GSupport;   PAGE_TABLE_1G_ENTRY
> *PageDirectory1GEntry;   UINT64                                        AddressEncMask;@@ -
> 730,18 +729,16 @@ CreateIdentityMappingPageTables (
>      }   } -  Page5LevelSupport = FALSE;-  if (PcdGetBool
> (PcdUse5LevelPageTable)) {-    AsmCpuidEx (-
> CPUID_STRUCTURED_EXTENDED_FEATURE_FLAGS,
> CPUID_STRUCTURED_EXTENDED_FEATURE_FLAGS_SUB_LEAF_INFO, NULL,-
> &EcxFlags.Uint32, NULL, NULL-      );-    if (EcxFlags.Bits.FiveLevelPage != 0) {-
> Page5LevelSupport = TRUE;-    }-  }+  //+  // Check CR4.LA57[bit12] to
> determin whether 5-Level Paging is enabled.+  // Because this code runs at
> both IA-32e (64bit) mode and legacy protected (32bit) mode,+  // below logic
> inherits the 5-level paging setting from bootloader in IA-32e mode+  // and
> uses 4-level paging in legacy protected mode.+  //+  Cr4.UintN = AsmReadCr4
> ();+  Enable5LevelPaging = (BOOLEAN) (Cr4.Bits.LA57 == 1); -  DEBUG
> ((DEBUG_INFO, "AddressBits=%u 5LevelPaging=%u 1GPage=%u\n",
> PhysicalAddressBits, Page5LevelSupport, Page1GSupport));+  DEBUG
> ((DEBUG_INFO, "PayloadEntry: AddressBits=%u 5LevelPaging=%u
> 1GPage=%u\n", PhysicalAddressBits, Enable5LevelPaging, Page1GSupport));
> //   // IA-32e paging translates 48-bit linear addresses to 52-bit physical
> addresses@@ -749,7 +746,7 @@ CreateIdentityMappingPageTables (
>    //  due to either unsupported by HW, or disabled by PCD.   //   ASSERT
> (PhysicalAddressBits <= 52);-  if (!Page5LevelSupport && PhysicalAddressBits >
> 48) {+  if (!Enable5LevelPaging && PhysicalAddressBits > 48)
> {     PhysicalAddressBits = 48;   } @@ -784,7 +781,7 @@
> CreateIdentityMappingPageTables (
>    //   // Substract the one page occupied by PML5 entries if 5-Level Paging is
> disabled.   //-  if (!Page5LevelSupport) {+  if (!Enable5LevelPaging)
> {     TotalPagesNum--;   } @@ -799,7 +796,7 @@
> CreateIdentityMappingPageTables (
>    // By architecture only one PageMapLevel4 exists - so lets allocate storage
> for it.   //   PageMap         = (VOID *) BigPageAddress;-  if (Page5LevelSupport)
> {+  if (Enable5LevelPaging) {     //     // By architecture only one
> PageMapLevel5 exists - so lets allocate storage for it.     //@@ -819,7 +816,7
> @@ CreateIdentityMappingPageTables (
>      PageMapLevel4Entry = (VOID *) BigPageAddress;     BigPageAddress    +=
> SIZE_4KB; -    if (Page5LevelSupport) {+    if (Enable5LevelPaging) {       //       //
> Make a PML5 Entry       //@@ -911,10 +908,7 @@
> CreateIdentityMappingPageTables (
>      ZeroMem (PageMapLevel4Entry, (512 - IndexOfPml4Entries) * sizeof
> (PAGE_MAP_AND_DIRECTORY_POINTER));   } -  if (Page5LevelSupport) {-
> Cr4.UintN = AsmReadCr4 ();-    Cr4.Bits.LA57 = 1;-    AsmWriteCr4
> (Cr4.UintN);+  if (Enable5LevelPaging) {     //     // For the PML5 entries we are
> not using fill in a null entry.     //--
> 2.32.0.windows.1


      parent reply	other threads:[~2021-12-03  3:44 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-08-06  8:16 [PATCH] UefiPayloadPkg/PayloadEntry: Inherit 4/5-level paging from bootloader Ni, Ray
2021-08-06 17:19 ` Guo Dong
2021-12-03  3:43 ` Ma, Maurice [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CO1PR11MB49456E06F669840008FC6D19896A9@CO1PR11MB4945.namprd11.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox