public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Gerd Hoffmann" <kraxel@redhat.com>
To: Ard Biesheuvel <ardb@kernel.org>
Cc: Oliver Steffen <osteffen@redhat.com>,
	 edk2-devel-groups-io <devel@edk2.groups.io>,
	Ard Biesheuvel <ardb+tianocore@kernel.org>,
	 Daniel Schaefer <git@danielschaefer.me>,
	Eric Dong <eric.dong@intel.com>,
	 Leif Lindholm <quic_llindhol@quicinc.com>,
	Liming Gao <gaoliming@byosoft.com.cn>,
	 Michael D Kinney <michael.d.kinney@intel.com>,
	Rahul Kumar <rahul1.kumar@intel.com>, Ray Ni <ray.ni@intel.com>,
	 Sami Mujawar <sami.mujawar@arm.com>,
	Sunil V L <sunilvl@ventanamicro.com>,
	 Zhiguang Liu <zhiguang.liu@intel.com>,
	Taylor Beebe <t@taylorbeebe.com>,
	 Oliver Smith-Denny <osd@smith-denny.com>,
	Michael Kubacki <mikuback@linux.microsoft.com>
Subject: Re: [PATCH 1/1] ArmPkg: Add Pcd to disable EFI_MEMORY_ATTRIBUTE_PROTOCOL
Date: Tue, 20 Jun 2023 18:03:20 +0200	[thread overview]
Message-ID: <v54pf2wnethhj643uobs33bll4wbli2qgontscx37od3d6pwsz@n66ojub3tcj2> (raw)
In-Reply-To: <CAMj1kXFeWJuE93=dLwRNjQyRGXc0vUmd=yZ3aXMHQm-3zEk=Tg@mail.gmail.com>

On Tue, Jun 20, 2023 at 04:16:40PM +0300, Ard Biesheuvel wrote:
> On Tue, Jun 20, 2023, 12:33 Gerd Hoffmann <kraxel@redhat.com> wrote:
> 
> > On Mon, Jun 19, 2023 at 10:32:25PM +0200, Oliver Steffen wrote:
> > > Recent versions of shim (15.6 and 15.7) crash when the newly added
> > > EFI_MEMORY_ATTRIBUTE_PROTOCOL is provided by the firmware.  To allow
> > > existing installations to boot, provide a workaround in form of a Pcd
> > > that allows tuning it off at build time (defaults to 'enabled').
> >
> > Background:  We have untested + broken code for
> > EFI_MEMORY_ATTRIBUTE_PROTOCOL support in the listed shim releases.
> >
> > Now that firmware starts to actually provide that protocol the
> > time bomb explodes.
> 
> Fantastic.
> 
> This is kind of a big deal, really, and just turning it off for ArmVirtQemu
> does not help at all with the fact that these shim builds will crash on any
> platform that implements the protocol. (Including x86)

Sure.  This hits VM firmware first because we quickly rebase our builds
to new edk2 stable tags.  But yes, this is not limited to VMs and
likewise not limited to arm.

> Given that secure boot is kind of pointless on this particular platform
> anyway, maybe this is a good opportunity to make shim optional in the boot
> chain? I understand that this does not fix existing builds but shim proves
> to be such a problematic component that you really should not be using it
> if there is no need.

I'd love to ditch shim.efi, even with secure boot.  For VMs one can
just enroll the distro signing certificate to 'db' and be done with
it.

Unfortunately shim has a solid position being *the* entry point for
linux efi systems due to being the only piece of software carrying a
microsoft signature.  Especially on install media you can't really have
more than one (such as different binaries depending on whenever secure
boot is on or off).  For installed systems and cloud images shim also
creates/restores BootNNNN entries.

Additional problem is that shim is the piece of software which handles
sbat revocations, so even in case the distro cert is enrolled in 'db' so
the certificate handling implemented by shim is not needed I can't just
ignore shim.efi.

> As for the protocol, this has its own set of problems, and the bug in
> question can partly be blamed on the misdesigned api, which has separate
> set and clear methods. Not only does this force the implementation to
> traverse the page tables twice for the common case of switching between RO
> and XP or vice versa, it also means we lose any transactional properties of
> a RO <-> XP switch. I.e., if we could make it the implementation's
> responsibility to ensure that such a transformation either completes
> successfully, or otherwise, doesn't make any modifications at all, the risk
> of ending up in a limbo state is reduced significantly.
> 
> So maybe there is still opportunity for specifying a MemoryAttributes2
> protocol with a single method for set and clear? We could just drop the
> current one in that case.

Sounds reasonable to me.

> In any case, while i can see how this patch helps make all your ci status
> icons turn green again, it does so by papering over the underlying issue so
> I'm not a fan.

Yes.  It's not a solution, it's a workaround which we could use to turn
off EFI_MEMORY_ATTRIBUTE_PROTOCOL for a year or two, depending on how
quickly the shim / distro folks get their act together and updates
rolled out.

I'm not a fan either, but we need some temporary stopgap, and given that
others likely meet the very same problem too we figured sending it to
the list is a good idea, and here we are ;)

take care,
  Gerd


  parent reply	other threads:[~2023-06-20 16:06 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-06-19 20:32 [PATCH 1/1] ArmPkg: Add Pcd to disable EFI_MEMORY_ATTRIBUTE_PROTOCOL Oliver Steffen
2023-06-20  9:32 ` Gerd Hoffmann
2023-06-20 13:16   ` Ard Biesheuvel
2023-06-20 14:53     ` [edk2-devel] " Michael Kubacki
2023-06-20 16:03     ` Gerd Hoffmann [this message]
2023-06-20 17:06       ` Sean
2023-06-23 16:26         ` Ard Biesheuvel
2023-06-23 19:32           ` Sean
2023-10-05  6:31       ` Nhi Pham via groups.io
2023-10-05  8:23         ` Laszlo Ersek
2023-10-05 10:01           ` Gerd Hoffmann

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=v54pf2wnethhj643uobs33bll4wbli2qgontscx37od3d6pwsz@n66ojub3tcj2 \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox