public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Laszlo Ersek" <lersek@redhat.com>
To: "Wu, Jiaxin" <jiaxin.wu@intel.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>,
	"Gao, Liming" <gaoliming@byosoft.com.cn>,
	"Kinney, Michael D" <michael.d.kinney@intel.com>
Cc: "Dong, Eric" <eric.dong@intel.com>, "Ni, Ray" <ray.ni@intel.com>,
	"Zeng, Star" <star.zeng@intel.com>,
	Gerd Hoffmann <kraxel@redhat.com>,
	"Kumar, Rahul R" <rahul.r.kumar@intel.com>
Subject: Re: [edk2-devel] [PATCH v4] UefiCpuPkg/PiSmmCpuDxeSmm: Fix CP Exception when CET enable
Date: Tue, 7 Nov 2023 14:08:42 +0100	[thread overview]
Message-ID: <ec23e042-c4ee-4254-f5b9-7417499ef567@redhat.com> (raw)
In-Reply-To: <MN0PR11MB6158F9C450FDFF0105911A4BFEA9A@MN0PR11MB6158.namprd11.prod.outlook.com>

On 11/7/23 13:01, Wu, Jiaxin wrote:
> Hi Ray & Laszlo,
> 
> Any more comments to this?

It's in my review queue.

Laszlo



> 
> Thanks,
> Jiaxin
> 
>> -----Original Message-----
>> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of Wu,
>> Jiaxin
>> Sent: Tuesday, November 7, 2023 9:25 AM
>> To: devel@edk2.groups.io
>> Cc: Dong, Eric <eric.dong@intel.com>; Ni, Ray <ray.ni@intel.com>; Zeng, Star
>> <star.zeng@intel.com>; Gerd Hoffmann <kraxel@redhat.com>; Kumar, Rahul R
>> <rahul.r.kumar@intel.com>; Laszlo Ersek <lersek@redhat.com>
>> Subject: [edk2-devel] [PATCH v4] UefiCpuPkg/PiSmmCpuDxeSmm: Fix CP
>> Exception when CET enable
>>
>> Root cause:
>> 1. Before DisableReadonlyPageWriteProtect() is called, the return
>> address (#1) is pushed in shadow stack.
>> 2. CET is disabled.
>> 3. DisableReadonlyPageWriteProtect() returns to #1.
>> 4. Page table is modified.
>> 5. EnableReadonlyPageWriteProtect() is called, but the return
>> address (#2) is not pushed in shadow stack.
>> 6. CET is enabled.
>> 7. EnableReadonlyPageWriteProtect() returns to #2.
>> #CP exception happens because the actual return address (#2)
>> doesn't match the return address stored in shadow stack (#1).
>>
>> Analysis:
>> Shadow stack will stop update after CET disable (DisableCet() in
>> DisableReadOnlyPageWriteProtect), but normal smi stack will be
>> continue updated with the function called and return
>> (DisableReadOnlyPageWriteProtect & EnableReadOnlyPageWriteProtect),
>> thus leading stack mismatch after CET re-enabled (EnableCet() in
>> EnableReadOnlyPageWriteProtect).
>>
>> According SDM Vol 3, 6.15-Control Protection Exception:
>> Normal smi stack and shadow stack must be matched when CET enable,
>> otherwise CP Exception will happen, which is caused by a near RET
>> instruction.
>>
>> CET is disabled in DisableCet(), while can be enabled in
>> EnableCet(). This way won't cause the problem because they are
>> implemented in a way that return address of DisableCet() is
>> poped out from shadow stack (Incsspq performs a pop to increases
>> the shadow stack) and EnableCet() doesn't use "RET" but "JMP" to
>> return to caller. So calling EnableCet() and DisableCet() doesn't
>> have the same issue as calling DisableReadonlyPageWriteProtect()
>> and EnableReadonlyPageWriteProtect().
>>
>> With above root cause & analysis, define below 2 macros instead of
>> functions for WP & CET operation:
>> WRITE_UNPROTECT_RO_PAGES (Wp, Cet)
>> WRITE_PROTECT_RO_PAGES (Wp, Cet)
>> Because DisableCet() & EnableCet() must be in the same function
>> to avoid shadow stack and normal SMI stack mismatch.
>>
>> Note: WRITE_UNPROTECT_RO_PAGES () must be called pair with
>> WRITE_PROTECT_RO_PAGES () in same function.
>>
>> Cc: Eric Dong <eric.dong@intel.com>
>> Cc: Ray Ni <ray.ni@intel.com>
>> Cc: Zeng Star <star.zeng@intel.com>
>> Cc: Gerd Hoffmann <kraxel@redhat.com>
>> Cc: Rahul Kumar <rahul1.kumar@intel.com>
>> Cc: Laszlo Ersek <lersek@redhat.com>
>> Signed-off-by: Jiaxin Wu <jiaxin.wu@intel.com>
>> ---
>>  UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h         | 59
>> +++++++++++++----
>>  UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c | 73
>> +++++++++-------------
>>  UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c             |  7 ++-
>>  3 files changed, 81 insertions(+), 58 deletions(-)
>>
>> diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h
>> b/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h
>> index 654935dc76..20ada465c2 100644
>> --- a/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h
>> +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.h
>> @@ -1551,29 +1551,64 @@ VOID
>>  SmmWaitForApArrival (
>>    VOID
>>    );
>>
>>  /**
>> -  Disable Write Protect on pages marked as read-only if Cr0.Bits.WP is 1.
>> +  Write unprotect read-only pages if Cr0.Bits.WP is 1.
>> +
>> +  @param[out]  WriteProtect      If Cr0.Bits.WP is enabled.
>>
>> -  @param[out]  WpEnabled      If Cr0.WP is enabled.
>> -  @param[out]  CetEnabled     If CET is enabled.
>>  **/
>>  VOID
>> -DisableReadOnlyPageWriteProtect (
>> -  OUT BOOLEAN  *WpEnabled,
>> -  OUT BOOLEAN  *CetEnabled
>> +SmmWriteUnprotectReadOnlyPage (
>> +  OUT BOOLEAN  *WriteProtect
>>    );
>>
>>  /**
>> -  Enable Write Protect on pages marked as read-only.
>> +  Write protect read-only pages.
>> +
>> +  @param[in]  WriteProtect      If Cr0.Bits.WP should be enabled.
>>
>> -  @param[out]  WpEnabled      If Cr0.WP should be enabled.
>> -  @param[out]  CetEnabled     If CET should be enabled.
>>  **/
>>  VOID
>> -EnableReadOnlyPageWriteProtect (
>> -  BOOLEAN  WpEnabled,
>> -  BOOLEAN  CetEnabled
>> +SmmWriteProtectReadOnlyPage (
>> +  IN  BOOLEAN  WriteProtect
>>    );
>>
>> +///
>> +/// Define macros to encapsulate the write unprotect/protect
>> +/// read-only pages.
>> +/// Below pieces of logic are defined as macros and not functions
>> +/// because "CET" feature disable & enable must be in the same
>> +/// function to avoid shadow stack and normal SMI stack mismatch,
>> +/// thus WRITE_UNPROTECT_RO_PAGES () must be called pair with
>> +/// WRITE_PROTECT_RO_PAGES () in same function.
>> +///
>> +/// @param[in,out] Wp   A BOOLEAN variable local to the containing
>> +///                     function, carrying write protection status from
>> +///                     WRITE_UNPROTECT_RO_PAGES() to
>> +///                     WRITE_PROTECT_RO_PAGES().
>> +///
>> +/// @param[in,out] Cet  A BOOLEAN variable local to the containing
>> +///                     function, carrying control flow integrity
>> +///                     enforcement status from
>> +///                     WRITE_UNPROTECT_RO_PAGES() to
>> +///                     WRITE_PROTECT_RO_PAGES().
>> +///
>> +#define WRITE_UNPROTECT_RO_PAGES(Wp, Cet) \
>> +  do { \
>> +    Cet = ((AsmReadCr4 () & CR4_CET_ENABLE) != 0); \
>> +    if (Cet) { \
>> +      DisableCet (); \
>> +    } \
>> +    SmmWriteUnprotectReadOnlyPage (&Wp); \
>> +  } while (FALSE)
>> +
>> +#define WRITE_PROTECT_RO_PAGES(Wp, Cet) \
>> +  do { \
>> +    SmmWriteProtectReadOnlyPage (Wp); \
>> +    if (Cet) { \
>> +      EnableCet (); \
>> +    } \
>> +  } while (FALSE)
>> +
>>  #endif
>> diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
>> b/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
>> index 6f49866615..3d445df213 100644
>> --- a/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
>> +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/SmmCpuMemoryManagement.c
>> @@ -39,64 +39,47 @@ PAGE_TABLE_POOL  *mPageTablePool = NULL;
>>  // If memory used by SMM page table has been mareked as ReadOnly.
>>  //
>>  BOOLEAN  mIsReadOnlyPageTable = FALSE;
>>
>>  /**
>> -  Disable Write Protect on pages marked as read-only if Cr0.Bits.WP is 1.
>> +  Write unprotect read-only pages if Cr0.Bits.WP is 1.
>> +
>> +  @param[out]  WriteProtect      If Cr0.Bits.WP is enabled.
>>
>> -  @param[out]  WpEnabled      If Cr0.WP is enabled.
>> -  @param[out]  CetEnabled     If CET is enabled.
>>  **/
>>  VOID
>> -DisableReadOnlyPageWriteProtect (
>> -  OUT BOOLEAN  *WpEnabled,
>> -  OUT BOOLEAN  *CetEnabled
>> +SmmWriteUnprotectReadOnlyPage (
>> +  OUT BOOLEAN  *WriteProtect
>>    )
>>  {
>>    IA32_CR0  Cr0;
>>
>> -  *CetEnabled = ((AsmReadCr4 () & CR4_CET_ENABLE) != 0) ? TRUE : FALSE;
>> -  Cr0.UintN   = AsmReadCr0 ();
>> -  *WpEnabled  = (Cr0.Bits.WP != 0) ? TRUE : FALSE;
>> -  if (*WpEnabled) {
>> -    if (*CetEnabled) {
>> -      //
>> -      // CET must be disabled if WP is disabled. Disable CET before clearing
>> CR0.WP.
>> -      //
>> -      DisableCet ();
>> -    }
>> -
>> +  Cr0.UintN     = AsmReadCr0 ();
>> +  *WriteProtect = (Cr0.Bits.WP != 0);
>> +  if (*WriteProtect) {
>>      Cr0.Bits.WP = 0;
>>      AsmWriteCr0 (Cr0.UintN);
>>    }
>>  }
>>
>>  /**
>> -  Enable Write Protect on pages marked as read-only.
>> +  Write protect read-only pages.
>> +
>> +  @param[in]  WriteProtect      If Cr0.Bits.WP should be enabled.
>>
>> -  @param[out]  WpEnabled      If Cr0.WP should be enabled.
>> -  @param[out]  CetEnabled     If CET should be enabled.
>>  **/
>>  VOID
>> -EnableReadOnlyPageWriteProtect (
>> -  BOOLEAN  WpEnabled,
>> -  BOOLEAN  CetEnabled
>> +SmmWriteProtectReadOnlyPage (
>> +  IN  BOOLEAN  WriteProtect
>>    )
>>  {
>>    IA32_CR0  Cr0;
>>
>> -  if (WpEnabled) {
>> +  if (WriteProtect) {
>>      Cr0.UintN   = AsmReadCr0 ();
>>      Cr0.Bits.WP = 1;
>>      AsmWriteCr0 (Cr0.UintN);
>> -
>> -    if (CetEnabled) {
>> -      //
>> -      // re-enable CET.
>> -      //
>> -      EnableCet ();
>> -    }
>>    }
>>  }
>>
>>  /**
>>    Initialize a buffer pool for page table use only.
>> @@ -119,11 +102,11 @@ BOOLEAN
>>  InitializePageTablePool (
>>    IN UINTN  PoolPages
>>    )
>>  {
>>    VOID     *Buffer;
>> -  BOOLEAN  WpEnabled;
>> +  BOOLEAN  WriteProtect;
>>    BOOLEAN  CetEnabled;
>>
>>    //
>>    // Always reserve at least PAGE_TABLE_POOL_UNIT_PAGES, including one
>> page for
>>    // header.
>> @@ -157,13 +140,15 @@ InitializePageTablePool (
>>
>>    //
>>    // If page table memory has been marked as RO, mark the new pool pages as
>> read-only.
>>    //
>>    if (mIsReadOnlyPageTable) {
>> -    DisableReadOnlyPageWriteProtect (&WpEnabled, &CetEnabled);
>> +    WRITE_UNPROTECT_RO_PAGES (WriteProtect, CetEnabled);
>> +
>>      SmmSetMemoryAttributes ((EFI_PHYSICAL_ADDRESS)(UINTN)Buffer,
>> EFI_PAGES_TO_SIZE (PoolPages), EFI_MEMORY_RO);
>> -    EnableReadOnlyPageWriteProtect (WpEnabled, CetEnabled);
>> +
>> +    WRITE_PROTECT_RO_PAGES (WriteProtect, CetEnabled);
>>    }
>>
>>    return TRUE;
>>  }
>>
>> @@ -1009,11 +994,11 @@ SetMemMapAttributes (
>>    UINTN                                 PageTable;
>>    EFI_STATUS                            Status;
>>    IA32_MAP_ENTRY                        *Map;
>>    UINTN                                 Count;
>>    UINT64                                MemoryAttribute;
>> -  BOOLEAN                               WpEnabled;
>> +  BOOLEAN                               WriteProtect;
>>    BOOLEAN                               CetEnabled;
>>
>>    SmmGetSystemConfigurationTable
>> (&gEdkiiPiSmmMemoryAttributesTableGuid, (VOID
>> **)&MemoryAttributesTable);
>>    if (MemoryAttributesTable == NULL) {
>>      DEBUG ((DEBUG_INFO, "MemoryAttributesTable - NULL\n"));
>> @@ -1055,11 +1040,11 @@ SetMemMapAttributes (
>>      Status = PageTableParse (PageTable, mPagingMode, Map, &Count);
>>    }
>>
>>    ASSERT_RETURN_ERROR (Status);
>>
>> -  DisableReadOnlyPageWriteProtect (&WpEnabled, &CetEnabled);
>> +  WRITE_UNPROTECT_RO_PAGES (WriteProtect, CetEnabled);
>>
>>    MemoryMap = MemoryMapStart;
>>    for (Index = 0; Index < MemoryMapEntryCount; Index++) {
>>      DEBUG ((DEBUG_VERBOSE, "SetAttribute: Memory Entry - 0x%lx, 0x%x\n",
>> MemoryMap->PhysicalStart, MemoryMap->NumberOfPages));
>>      if (MemoryMap->Type == EfiRuntimeServicesCode) {
>> @@ -1085,11 +1070,12 @@ SetMemMapAttributes (
>>        );
>>
>>      MemoryMap = NEXT_MEMORY_DESCRIPTOR (MemoryMap,
>> DescriptorSize);
>>    }
>>
>> -  EnableReadOnlyPageWriteProtect (WpEnabled, CetEnabled);
>> +  WRITE_PROTECT_RO_PAGES (WriteProtect, CetEnabled);
>> +
>>    FreePool (Map);
>>
>>    PatchSmmSaveStateMap ();
>>    PatchGdtIdtMap ();
>>
>> @@ -1392,18 +1378,18 @@ SetUefiMemMapAttributes (
>>    EFI_STATUS             Status;
>>    EFI_MEMORY_DESCRIPTOR  *MemoryMap;
>>    UINTN                  MemoryMapEntryCount;
>>    UINTN                  Index;
>>    EFI_MEMORY_DESCRIPTOR  *Entry;
>> -  BOOLEAN                WpEnabled;
>> +  BOOLEAN                WriteProtect;
>>    BOOLEAN                CetEnabled;
>>
>>    PERF_FUNCTION_BEGIN ();
>>
>>    DEBUG ((DEBUG_INFO, "SetUefiMemMapAttributes\n"));
>>
>> -  DisableReadOnlyPageWriteProtect (&WpEnabled, &CetEnabled);
>> +  WRITE_UNPROTECT_RO_PAGES (WriteProtect, CetEnabled);
>>
>>    if (mUefiMemoryMap != NULL) {
>>      MemoryMapEntryCount = mUefiMemoryMapSize/mUefiDescriptorSize;
>>      MemoryMap           = mUefiMemoryMap;
>>      for (Index = 0; Index < MemoryMapEntryCount; Index++) {
>> @@ -1479,11 +1465,11 @@ SetUefiMemMapAttributes (
>>
>>        Entry = NEXT_MEMORY_DESCRIPTOR (Entry,
>> mUefiMemoryAttributesTable->DescriptorSize);
>>      }
>>    }
>>
>> -  EnableReadOnlyPageWriteProtect (WpEnabled, CetEnabled);
>> +  WRITE_PROTECT_RO_PAGES (WriteProtect, CetEnabled);
>>
>>    //
>>    // Do not free mUefiMemoryAttributesTable, it will be checked in
>> IsSmmCommBufferForbiddenAddress().
>>    //
>>
>> @@ -1870,11 +1856,11 @@ IfReadOnlyPageTableNeeded (
>>  VOID
>>  SetPageTableAttributes (
>>    VOID
>>    )
>>  {
>> -  BOOLEAN  WpEnabled;
>> +  BOOLEAN  WriteProtect;
>>    BOOLEAN  CetEnabled;
>>
>>    if (!IfReadOnlyPageTableNeeded ()) {
>>      return;
>>    }
>> @@ -1884,20 +1870,21 @@ SetPageTableAttributes (
>>
>>    //
>>    // Disable write protection, because we need mark page table to be write
>> protected.
>>    // We need *write* page table memory, to mark itself to be *read only*.
>>    //
>> -  DisableReadOnlyPageWriteProtect (&WpEnabled, &CetEnabled);
>> +  WRITE_UNPROTECT_RO_PAGES (WriteProtect, CetEnabled);
>>
>>    // Set memory used by page table as Read Only.
>>    DEBUG ((DEBUG_INFO, "Start...\n"));
>>    EnablePageTableProtection ();
>>
>>    //
>>    // Enable write protection, after page table attribute updated.
>>    //
>> -  EnableReadOnlyPageWriteProtect (TRUE, CetEnabled);
>> +  WRITE_PROTECT_RO_PAGES (TRUE, CetEnabled);
>> +
>>    mIsReadOnlyPageTable = TRUE;
>>
>>    //
>>    // Flush TLB after mark all page table pool as read only.
>>    //
>> diff --git a/UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c
>> b/UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c
>> index 7ac3c66f91..8142d3ceac 100644
>> --- a/UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c
>> +++ b/UefiCpuPkg/PiSmmCpuDxeSmm/SmmProfile.c
>> @@ -592,11 +592,11 @@ InitPaging (
>>    UINT64         Base;
>>    UINT64         Length;
>>    UINT64         Limit;
>>    UINT64         PreviousAddress;
>>    UINT64         MemoryAttrMask;
>> -  BOOLEAN        WpEnabled;
>> +  BOOLEAN        WriteProtect;
>>    BOOLEAN        CetEnabled;
>>
>>    PERF_FUNCTION_BEGIN ();
>>
>>    PageTable = AsmReadCr3 ();
>> @@ -604,11 +604,12 @@ InitPaging (
>>      Limit = BASE_4GB;
>>    } else {
>>      Limit = (IsRestrictedMemoryAccess ()) ? LShiftU64 (1,
>> mPhysicalAddressBits) : BASE_4GB;
>>    }
>>
>> -  DisableReadOnlyPageWriteProtect (&WpEnabled, &CetEnabled);
>> +  WRITE_UNPROTECT_RO_PAGES (WriteProtect, CetEnabled);
>> +
>>    //
>>    // [0, 4k] may be non-present.
>>    //
>>    PreviousAddress = ((PcdGet8 (PcdNullPointerDetectionPropertyMask) &
>> BIT1) != 0) ? BASE_4KB : 0;
>>
>> @@ -670,11 +671,11 @@ InitPaging (
>>      //
>>      Status = ConvertMemoryPageAttributes (PageTable, mPagingMode,
>> PreviousAddress, Limit - PreviousAddress, MemoryAttrMask, TRUE, NULL);
>>      ASSERT_RETURN_ERROR (Status);
>>    }
>>
>> -  EnableReadOnlyPageWriteProtect (WpEnabled, CetEnabled);
>> +  WRITE_PROTECT_RO_PAGES (WriteProtect, CetEnabled);
>>
>>    //
>>    // Flush TLB
>>    //
>>    CpuFlushTlb ();
>> --
>> 2.16.2.windows.1
>>
>>
>>
>> 
>>
> 



-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.
View/Reply Online (#110850): https://edk2.groups.io/g/devel/message/110850
Mute This Topic: https://groups.io/mt/102434876/7686176
Group Owner: devel+owner@edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/leave/12367111/7686176/1913456212/xyzzy [rebecca@openfw.io]
-=-=-=-=-=-=-=-=-=-=-=-



  reply	other threads:[~2023-11-07 13:08 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <179532CD4E894831.20624@groups.io>
2023-11-07 12:01 ` [edk2-devel] [PATCH v4] UefiCpuPkg/PiSmmCpuDxeSmm: Fix CP Exception when CET enable Wu, Jiaxin
2023-11-07 13:08   ` Laszlo Ersek [this message]
2023-11-07  1:24 Wu, Jiaxin
2023-11-07 18:56 ` Laszlo Ersek
2023-11-08  1:17   ` Wu, Jiaxin
2023-11-10  0:01   ` Wu, Jiaxin
2023-11-10  0:25     ` Michael D Kinney
2023-11-10  0:43       ` Wu, Jiaxin
2023-11-10  8:36         ` Ni, Ray
2023-11-09  3:45 ` Ni, Ray
2023-11-09  5:06 ` Dong, Eric

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ec23e042-c4ee-4254-f5b9-7417499ef567@redhat.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox