diff options
author | Matt Fleming <matt@codeblueprint.co.uk> | 2016-09-16 10:12:47 -0400 |
---|---|---|
committer | Matt Fleming <matt@codeblueprint.co.uk> | 2016-09-20 10:43:31 -0400 |
commit | 92dc33501bfba74655dbf3ec63ea82d040fd6d58 (patch) | |
tree | 38187bc2a39d00331d2898ae7c2a204054ad68e7 | |
parent | 5465fe0fc3316f7cdda66732a7986f4ebe76d949 (diff) |
x86/efi: Round EFI memmap reservations to EFI_PAGE_SIZE
Mike Galbraith reported that his machine started rebooting during boot
after,
commit 8e80632fb23f ("efi/esrt: Use efi_mem_reserve() and avoid a kmalloc()")
The ESRT table on his machine is 56 bytes and at no point in the
efi_arch_mem_reserve() call path is that size rounded up to
EFI_PAGE_SIZE, nor is the start address on an EFI_PAGE_SIZE boundary.
Since the EFI memory map only deals with whole pages, inserting an EFI
memory region with 56 bytes results in a new entry covering zero
pages, and completely screws up the calculations for the old regions
that were trimmed.
Round all sizes upwards, and start addresses downwards, to the nearest
EFI_PAGE_SIZE boundary.
Additionally, efi_memmap_insert() expects the mem::range::end value to
be one less than the end address for the region.
Reported-by: Mike Galbraith <umgwanakikbuti@gmail.com>
Reported-by: Mike Krinkin <krinkin.m.u@gmail.com>
Tested-by: Mike Krinkin <krinkin.m.u@gmail.com>
Cc: Peter Jones <pjones@redhat.com>
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Taku Izumi <izumi.taku@jp.fujitsu.com>
Signed-off-by: Matt Fleming <matt@codeblueprint.co.uk>
-rw-r--r-- | arch/x86/platform/efi/quirks.c | 6 | ||||
-rw-r--r-- | drivers/firmware/efi/memmap.c | 11 |
2 files changed, 16 insertions, 1 deletions
diff --git a/arch/x86/platform/efi/quirks.c b/arch/x86/platform/efi/quirks.c index f14b7a9da24b..10aca63a50d7 100644 --- a/arch/x86/platform/efi/quirks.c +++ b/arch/x86/platform/efi/quirks.c | |||
@@ -201,8 +201,12 @@ void __init efi_arch_mem_reserve(phys_addr_t addr, u64 size) | |||
201 | return; | 201 | return; |
202 | } | 202 | } |
203 | 203 | ||
204 | size += addr % EFI_PAGE_SIZE; | ||
205 | size = round_up(size, EFI_PAGE_SIZE); | ||
206 | addr = round_down(addr, EFI_PAGE_SIZE); | ||
207 | |||
204 | mr.range.start = addr; | 208 | mr.range.start = addr; |
205 | mr.range.end = addr + size; | 209 | mr.range.end = addr + size - 1; |
206 | mr.attribute = md.attribute | EFI_MEMORY_RUNTIME; | 210 | mr.attribute = md.attribute | EFI_MEMORY_RUNTIME; |
207 | 211 | ||
208 | num_entries = efi_memmap_split_count(&md, &mr.range); | 212 | num_entries = efi_memmap_split_count(&md, &mr.range); |
diff --git a/drivers/firmware/efi/memmap.c b/drivers/firmware/efi/memmap.c index cd96086fd851..f03ddecd232b 100644 --- a/drivers/firmware/efi/memmap.c +++ b/drivers/firmware/efi/memmap.c | |||
@@ -225,6 +225,17 @@ void __init efi_memmap_insert(struct efi_memory_map *old_memmap, void *buf, | |||
225 | m_end = mem->range.end; | 225 | m_end = mem->range.end; |
226 | m_attr = mem->attribute; | 226 | m_attr = mem->attribute; |
227 | 227 | ||
228 | /* | ||
229 | * The EFI memory map deals with regions in EFI_PAGE_SIZE | ||
230 | * units. Ensure that the region described by 'mem' is aligned | ||
231 | * correctly. | ||
232 | */ | ||
233 | if (!IS_ALIGNED(m_start, EFI_PAGE_SIZE) || | ||
234 | !IS_ALIGNED(m_end + 1, EFI_PAGE_SIZE)) { | ||
235 | WARN_ON(1); | ||
236 | return; | ||
237 | } | ||
238 | |||
228 | for (old = old_memmap->map, new = buf; | 239 | for (old = old_memmap->map, new = buf; |
229 | old < old_memmap->map_end; | 240 | old < old_memmap->map_end; |
230 | old += old_memmap->desc_size, new += old_memmap->desc_size) { | 241 | old += old_memmap->desc_size, new += old_memmap->desc_size) { |