aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMatt Fleming <matt@codeblueprint.co.uk>2016-09-16 10:12:47 -0400
committerMatt Fleming <matt@codeblueprint.co.uk>2016-09-20 10:43:31 -0400
commit92dc33501bfba74655dbf3ec63ea82d040fd6d58 (patch)
tree38187bc2a39d00331d2898ae7c2a204054ad68e7
parent5465fe0fc3316f7cdda66732a7986f4ebe76d949 (diff)
x86/efi: Round EFI memmap reservations to EFI_PAGE_SIZE
Mike Galbraith reported that his machine started rebooting during boot after, commit 8e80632fb23f ("efi/esrt: Use efi_mem_reserve() and avoid a kmalloc()") The ESRT table on his machine is 56 bytes and at no point in the efi_arch_mem_reserve() call path is that size rounded up to EFI_PAGE_SIZE, nor is the start address on an EFI_PAGE_SIZE boundary. Since the EFI memory map only deals with whole pages, inserting an EFI memory region with 56 bytes results in a new entry covering zero pages, and completely screws up the calculations for the old regions that were trimmed. Round all sizes upwards, and start addresses downwards, to the nearest EFI_PAGE_SIZE boundary. Additionally, efi_memmap_insert() expects the mem::range::end value to be one less than the end address for the region. Reported-by: Mike Galbraith <umgwanakikbuti@gmail.com> Reported-by: Mike Krinkin <krinkin.m.u@gmail.com> Tested-by: Mike Krinkin <krinkin.m.u@gmail.com> Cc: Peter Jones <pjones@redhat.com> Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org> Cc: Mark Rutland <mark.rutland@arm.com> Cc: Taku Izumi <izumi.taku@jp.fujitsu.com> Signed-off-by: Matt Fleming <matt@codeblueprint.co.uk>
-rw-r--r--arch/x86/platform/efi/quirks.c6
-rw-r--r--drivers/firmware/efi/memmap.c11
2 files changed, 16 insertions, 1 deletions
diff --git a/arch/x86/platform/efi/quirks.c b/arch/x86/platform/efi/quirks.c
index f14b7a9da24b..10aca63a50d7 100644
--- a/arch/x86/platform/efi/quirks.c
+++ b/arch/x86/platform/efi/quirks.c
@@ -201,8 +201,12 @@ void __init efi_arch_mem_reserve(phys_addr_t addr, u64 size)
201 return; 201 return;
202 } 202 }
203 203
204 size += addr % EFI_PAGE_SIZE;
205 size = round_up(size, EFI_PAGE_SIZE);
206 addr = round_down(addr, EFI_PAGE_SIZE);
207
204 mr.range.start = addr; 208 mr.range.start = addr;
205 mr.range.end = addr + size; 209 mr.range.end = addr + size - 1;
206 mr.attribute = md.attribute | EFI_MEMORY_RUNTIME; 210 mr.attribute = md.attribute | EFI_MEMORY_RUNTIME;
207 211
208 num_entries = efi_memmap_split_count(&md, &mr.range); 212 num_entries = efi_memmap_split_count(&md, &mr.range);
diff --git a/drivers/firmware/efi/memmap.c b/drivers/firmware/efi/memmap.c
index cd96086fd851..f03ddecd232b 100644
--- a/drivers/firmware/efi/memmap.c
+++ b/drivers/firmware/efi/memmap.c
@@ -225,6 +225,17 @@ void __init efi_memmap_insert(struct efi_memory_map *old_memmap, void *buf,
225 m_end = mem->range.end; 225 m_end = mem->range.end;
226 m_attr = mem->attribute; 226 m_attr = mem->attribute;
227 227
228 /*
229 * The EFI memory map deals with regions in EFI_PAGE_SIZE
230 * units. Ensure that the region described by 'mem' is aligned
231 * correctly.
232 */
233 if (!IS_ALIGNED(m_start, EFI_PAGE_SIZE) ||
234 !IS_ALIGNED(m_end + 1, EFI_PAGE_SIZE)) {
235 WARN_ON(1);
236 return;
237 }
238
228 for (old = old_memmap->map, new = buf; 239 for (old = old_memmap->map, new = buf;
229 old < old_memmap->map_end; 240 old < old_memmap->map_end;
230 old += old_memmap->desc_size, new += old_memmap->desc_size) { 241 old += old_memmap->desc_size, new += old_memmap->desc_size) {