Hi Andrew
You raised a good point.

I have seen a system reset when the below 1MiB address is access before memory 
initialization. I think NULL pointer access before MRC should never happen in a 
production BIOS.

The debug ability is a big problem. Fully agree.

I think we may extend that topic to separate PEI to pre-mem and post-mem by 
using different strategy.

I will file a bugzillar to record this.

Thank you
Yao Jiewen


From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Andrew 
Fish
Sent: Thursday, August 31, 2017 12:27 AM
To: Yao, Jiewen <jiewen....@intel.com>
Cc: edk2-devel@lists.01.org
Subject: Re: [edk2] [PATCH 0/2] Implement NULL pointer detection feature


> On Aug 30, 2017, at 7:55 AM, Yao, Jiewen 
> <jiewen....@intel.com<mailto:jiewen....@intel.com>> wrote:
>
> Hi Brian
> Good feedback.
> Comment in line.
>
> From: Johnson, Brian (EXL - Eagan) [mailto:brian.john...@hpe.com]
> Sent: Tuesday, August 29, 2017 11:17 PM
> To: Yao, Jiewen <jiewen....@intel.com<mailto:jiewen....@intel.com>>; Wang, 
> Jian J <jian.j.w...@intel.com<mailto:jian.j.w...@intel.com>>; 
> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org>
> Subject: RE: [edk2] [PATCH 0/2] Implement NULL pointer detection feature
>
> Thank you for implementing this feature!  It is very  helpful for catching 
> pointer-related problems.  We have used a similar scheme on our systems for 
> years, and caught several important bugs.  Some comments:
>
> * It's possible to implement similar protections in PEI (IA32) by modifying 
> the GDT descriptors.
> [Jiewen] Enabling PEI is interesting.
> Since we are working on DXE and SMM as our first priority, can we treat the 
> PEI enabling as a separate task?
> If you can help to create a patch for PEI and submit, that will be even 
> better.
>

Jiewen,

This is slightly off topic but I've noticed in early PEI the issue on some x86 
chipsets is not that a NULL pointer reference is bad, but any reference to an 
address space that is not decoded will triple bus fault the processor and that 
is really hard to debug. If the GDT trick could be used to cause an exception 
that drops into the debugger vs. a triple bus fault that would be a real win 
for debugging. While the memory ranges would be platform specific it would be 
awesome to have some plumbing in the edk2 to make this easier to implement.

Thanks,

Andrew Fish

>
>
> * For flexibility, I'd like NULL pointer protection to be controlled 
> independently in PEI, DXE, and SMM, using separate PCDs.
> [Jiewen] I think we can existing example on using one PCD to control all 
> phase or using one PCD to control different phase.
> For example, we use below PCD to control all phases, PEI/DXE/SMM
>  ## The mask is used to control PerformanceLib behavior.<BR><BR>
>  #  BIT0 - Enable Performance Measurement.<BR>
>  # @Prompt Performance Measurement Property.
>  # @Expression  0x80000002 | 
> (gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask & 0xFE) == 0
>  gEfiMdePkgTokenSpaceGuid.PcdPerformanceLibraryPropertyMask|0|UINT8|0x00000009
>
> And we use below PCD to control different phase, DXE/SMM
>  ## The mask is used to control memory profile behavior.<BR><BR>
>  #  BIT0 - Enable UEFI memory profile.<BR>
>  #  BIT1 - Enable SMRAM profile.<BR>
>  #  BIT7 - Disable recording at the start.<BR>
>  # @Prompt Memory Profile Property.
>  # @Expression  0x80000002 | 
> (gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfilePropertyMask & 0x7C) == 0
>  
> gEfiMdeModulePkgTokenSpaceGuid.PcdMemoryProfilePropertyMask|0x0|UINT8|0x30001041
>
> In order to make the code consistent with the existing PCD, I am thinking to 
> use one PCD named PcdNullPointerDetectionPropertyMask
>  #  BIT0 - Enable NULL pointer detection for UEFI.<BR>
>  #  BIT1 - Enable NULL pointer detection for SMM.<BR>
>  #  BIT2 - Enable NULL pointer detection for PEI.<BR>
>  #  BIT7 - Disable NULL pointer detection after EndOfDxe.<BR>
>
> I am not so worried about pre-memory initialization PEI phase, because page 0 
> is always invalid.
> For post-memory initialization PEI phase, we can modify the page table in 
> memory, and dynamic PCD can be used at that time.
>
>
> * We have seen various option ROMs and OS boot loaders which have NULL 
> pointer issues, but are outside of our control.  It is useful to enable NULL 
> pointer protection during as much of the boot as possible, but disable it 
> before running these other executables.  So I'd suggest adding another PCD, 
> perhaps PcdNullPointerDetectionPostDxe, to control NULL pointer protection 
> late in boot.  If PcdNullPointerDetection != PcdNullPointerDetectionPostDxe, 
> install an end-of-DXE event (gEfiEndOfDxeEventGroupGuid) which changes the 
> protection of page 0 using a call to EFI_CPU_ARCH_PROTOCOL. 
> SetMemoryAttributes(CpuArch, 0, EFI_PAGE_SIZE, 0).
> [Jiewen] Good point for the compatibility consideration.
> Another thing is that CSM module may need access address 0. We have 2 choices:
> 1) CSM32 can call CpuArch->SetMemoryAttribute() to enable page 0, access page 
> 0, then disable page 0.
> 2) CSM32 can call CpuArch->SetMemoryAttribute() to enable page 0 at the 
> beginning, and always keep it enabled.
> Any though on that?
>
>
> So ideally I'd like to have 4 PCDs:
>
> PcdNullPointerDetectionPei
> PcdNullPointerDetectionDxe
> PcdNullPointerDetectionSmm
> PcdNullPointerDetectionPostDxe
>
> Thanks,
> Brian Johnson
> HPE
>
> -----Original Message-----
> From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Yao, 
> Jiewen
> Sent: Sunday, August 27, 2017 10:39 PM
> To: Wang, Jian J 
> <jian.j.w...@intel.com<mailto:jian.j.w...@intel.com<mailto:jian.j.w...@intel.com%3cmailto:jian.j.w...@intel.com>>>;
>  
> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org>>
> Subject: Re: [edk2] [PATCH 0/2] Implement NULL pointer detection feature
>
> Comment in line.
>
> From: Wang, Jian J
> Sent: Monday, August 28, 2017 11:24 AM
> To: Yao, Jiewen 
> <jiewen....@intel.com<mailto:jiewen....@intel.com<mailto:jiewen....@intel.com%3cmailto:jiewen....@intel.com>>>;
>  
> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org>>
> Subject: RE: [edk2] [PATCH 0/2] Implement NULL pointer detection feature
>
>
> 1)      I think this feature should be 'FALSE' by default. I forgot to reset 
> its default value. This feature makes use of page mechanism to detect NULL 
> pointer. So any ARCH doesn't support paging in EDK-II can't use it. Currently 
> validated platform includes VLV2 and Denlow. Let me know if all platform must 
> be validated or not.
>
> [Jiewen] Yes, I am OK to set to be FALSE to provide best compatibility.
> I suggest we validate all open source IA platforms, such as Quark, and OVMF 
> with TRUE.
>
>
> 2)      It's hard to make it a dynamic feature because we need to setup page 
> table for physical address 0-4095 in advance. If there's no memory alloc/free 
> action after enabling this feature, there's no chance to make those change in 
> page table. Then the usage of feature will be limited in such case.
>
> [Jiewen] Dynamic means the initial value is dynamic. I am not saying we need 
> modify the page table.
>
> An implementation could be:
> A platform can set this PCD in PEI phase based upon a setup variable to 
> choose CSM enable or disable.
>
> The IPL sets page table based upon this PCD value. The DXE Core cannot 
> consume PCD directly, because it might be dynamic. But we can pass the 
> information from IPL via HOB. All the DXE module just checks the value based 
> upon HOB.
>
>
>
>
> From: Yao, Jiewen
> Sent: Monday, August 28, 2017 11:10 AM
> To: Wang, Jian J 
> <jian.j.w...@intel.com<mailto:jian.j.w...@intel.com<mailto:jian.j.w...@intel.com%3cmailto:jian.j.w...@intel.com<mailto:jian.j.w...@intel.com%3cmailto:jian.j.w...@intel.com%3cmailto:jian.j.w...@intel.com%3cmailto:jian.j.w...@intel.com>>>>;
>  
> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org>>>
> Subject: RE: [edk2] [PATCH 0/2] Implement NULL pointer detection feature
>
> Thank you  to enable this feature.
>
> I have 2 comments, after a very quick review.
>
>
> 1)      I notice it is enabled by default 
> "gEfiMdeModulePkgTokenSpaceGuid.PcdNullPointerDetection|TRUE".
>
> Would you please provide the information on how many open source platforms 
> are validated?
> Such as, IA platform (VLV2, Quark), emu platform (OVMF, NT32)?
> Or do we need validate any ARM platform?
>
>
>
> 2)      I am thinking about CSM platform. Do you think we can make it 
> dynamic, as such, a platform may set the validate based upon CSM 
> enable/disable?
>
>
> Or if we need update the CSM module to patch the page table automatically? 
> Once this is feature is ON.
>
>
> Thank you
> Yao Jiewen
>
>
>> -----Original Message-----
>> From: edk2-devel [mailto:edk2-devel-boun...@lists.01.org] On Behalf Of Wang,
>> Jian J
>> Sent: Monday, August 28, 2017 10:51 AM
>> To: 
>> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org>>>
>> Subject: [edk2] [PATCH 0/2] Implement NULL pointer detection feature
>>
>> This patch is the implementation of NULL pointer detection feature,
>> which is one of the small features of Special Pool.
>>
>> Wang, Jian J (2):
>>  Implement NULL pointer detection for EDK-II Core
>>  Implement NULL pointer detection for EDK-II SMM Core and driver
>>
>> MdeModulePkg/Core/Dxe/DxeMain.inf                |  3 ++-
>> MdeModulePkg/Core/Dxe/Mem/Page.c                 |  5 +++--
>> MdeModulePkg/Core/DxeIplPeim/DxeIpl.inf          |  1 +
>> MdeModulePkg/Core/DxeIplPeim/Ia32/DxeLoadFunc.c  |  6 ++++--
>> MdeModulePkg/Core/DxeIplPeim/X64/VirtualMemory.c | 26
>> ++++++++++++++++--------
>> MdeModulePkg/MdeModulePkg.dec                    |  7 +++++++
>> UefiCpuPkg/PiSmmCpuDxeSmm/Ia32/PageTbl.c         | 12 +++++++++++
>> UefiCpuPkg/PiSmmCpuDxeSmm/MpService.c            | 25
>> ++++++++++++++++++++++-
>> UefiCpuPkg/PiSmmCpuDxeSmm/PiSmmCpuDxeSmm.inf     |  1 +
>> UefiCpuPkg/PiSmmCpuDxeSmm/X64/PageTbl.c          | 12 +++++++++++
>> 10 files changed, 84 insertions(+), 14 deletions(-)
>>
>> --
>> 2.11.0.windows.1
>>
>> _______________________________________________
>> edk2-devel mailing list
>> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org>>>
>> https://lists.01.org/mailman/listinfo/edk2-devel
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org%3cmailto:edk2-devel@lists.01.org>>
> https://lists.01.org/mailman/listinfo/edk2-devel
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org>
> https://lists.01.org/mailman/listinfo/edk2-devel

_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org<mailto:edk2-devel@lists.01.org>
https://lists.01.org/mailman/listinfo/edk2-devel
_______________________________________________
edk2-devel mailing list
edk2-devel@lists.01.org
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to