Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2956465imu; Mon, 19 Nov 2018 08:35:55 -0800 (PST) X-Google-Smtp-Source: AJdET5fWIeKc4Uq32P5utunOa/qnMmEFlAeyZurG2yOkXzMfJrZM/IsdTLtuYYrTJUDAF7PpgM9Y X-Received: by 2002:a17:902:850c:: with SMTP id bj12mr22543507plb.46.1542645355435; Mon, 19 Nov 2018 08:35:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542645355; cv=none; d=google.com; s=arc-20160816; b=LVA1IM+WRv//Ha6yTxj7lqhOONfsTPGvSpBgxvo19Yk9nRIeG7FCWgRmAKThMwQpIS WGkKSOprF7vHWHRBs751hiZi/DjDM7TojR1Yn3e2ACqOUNPoQC5/LxWZMao06eVyLdSz mMaxRpLtOhAJeZDgzKfaxn9mURzgMemf9mhGn4aOxRIrVs6PkyHl4g6EdIvUx4hvnKvP sqWeD9Cc7xBHYH0xdKJC1GzTYZqEVV6j4PCelb36tyJx6/U01OAeXNXFrFFt8FTODhHE qBd11sjq68EcaPmHGNxdbnZMuN4al6aixN4idArvUAOZ/mdU6YiKRiMKlwzBWmH4zI8j n6Lw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zkDwWUTweSOe6sDU0cc+pm6XQJ9I8mshdsmBXxMqVR0=; b=nR5pcRH75AorY7+vp1B4eUrGqaMxifAJlBK6s4VPLuXe/NYhjTNXwIc69vhSbZn0Ei X3OH0WvbjpwepE6+fksWDmZi5KU76wY9tINBqdp86OLLAnx6r9ovdem5GGWKxfc7QGDR Ux9XQ+a0iUv1Si0FtJiytAmh1lZtXJzt7WKi+GXFD4JG+EIDXvWeBQMF+nsSU1E9pxdg +Ar/ac4YaLwhmiW+ws6pQhS8QtiCjmfVA2DNsEONEyP8kXRGHZt37feOo/mLwwjs6aVd 6aoLW3CMYbZGP+lYqO2tqv+TAPopaWW1dhzNLUz5bsyql/uaqH2UT+uBwP1k6Ut9zOGx XiWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W4tNNWWK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l11si38470578pgb.545.2018.11.19.08.35.32; Mon, 19 Nov 2018 08:35:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=W4tNNWWK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731306AbeKTC6O (ORCPT + 99 others); Mon, 19 Nov 2018 21:58:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:57206 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729995AbeKTC6N (ORCPT ); Mon, 19 Nov 2018 21:58:13 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 11004208E4; Mon, 19 Nov 2018 16:34:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542645244; bh=7dsM07+k+/O+QvQ51YMplyUuRu7GVbPkob81n9LlwG8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=W4tNNWWKvB+9tpiTrlYKr8wAk3o1MkxEmwCoFSUd59CskSCO6K9gwCcRvkS2O8R2I 7fE5r+MUERjQw0+0x2ddrCpb0ywia/QqEoKDRammaY9cubumJU3w+HN6osncpWjgAW LXUbrA74wE/hlD7Qxasf9yYvdsPAMRXLuDBDsR0w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Robert Elliott , Vishal Verma , Borislav Petkov , Arnd Bergmann , Dan Williams , Dave Jiang , "H. Peter Anvin" , Ingo Molnar , Len Brown , linux-acpi@vger.kernel.org, linux-edac , linux-nvdimm@lists.01.org, Qiuxu Zhuo , "Rafael J. Wysocki" , Ross Zwisler , Thomas Gleixner , Tony Luck , x86-ml , Yazen Ghannam Subject: [PATCH 4.19 091/205] acpi/nfit, x86/mce: Validate a MCEs address before using it Date: Mon, 19 Nov 2018 17:26:38 +0100 Message-Id: <20181119162632.213681486@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162616.586062722@linuxfoundation.org> References: <20181119162616.586062722@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Vishal Verma commit e8a308e5f47e545e0d41d0686c00f5f5217c5f61 upstream. The NFIT machine check handler uses the physical address from the mce structure, and compares it against information in the ACPI NFIT table to determine whether that location lies on an NVDIMM. The mce->addr field however may not always be valid, and this is indicated by the MCI_STATUS_ADDRV bit in the status field. Export mce_usable_address() which already performs validation for the address, and use it in the NFIT handler. Fixes: 6839a6d96f4e ("nfit: do an ARS scrub on hitting a latent media error") Reported-by: Robert Elliott Signed-off-by: Vishal Verma Signed-off-by: Borislav Petkov CC: Arnd Bergmann Cc: Dan Williams CC: Dave Jiang CC: elliott@hpe.com CC: "H. Peter Anvin" CC: Ingo Molnar CC: Len Brown CC: linux-acpi@vger.kernel.org CC: linux-edac CC: linux-nvdimm@lists.01.org CC: Qiuxu Zhuo CC: "Rafael J. Wysocki" CC: Ross Zwisler CC: stable CC: Thomas Gleixner CC: Tony Luck CC: x86-ml CC: Yazen Ghannam Link: http://lkml.kernel.org/r/20181026003729.8420-2-vishal.l.verma@intel.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/mce.h | 1 + arch/x86/kernel/cpu/mcheck/mce.c | 3 ++- drivers/acpi/nfit/mce.c | 4 ++++ 3 files changed, 7 insertions(+), 1 deletion(-) --- a/arch/x86/include/asm/mce.h +++ b/arch/x86/include/asm/mce.h @@ -217,6 +217,7 @@ static inline int umc_normaddr_to_sysadd int mce_available(struct cpuinfo_x86 *c); bool mce_is_memory_error(struct mce *m); bool mce_is_correctable(struct mce *m); +int mce_usable_address(struct mce *m); DECLARE_PER_CPU(unsigned, mce_exception_count); DECLARE_PER_CPU(unsigned, mce_poll_count); --- a/arch/x86/kernel/cpu/mcheck/mce.c +++ b/arch/x86/kernel/cpu/mcheck/mce.c @@ -485,7 +485,7 @@ static void mce_report_event(struct pt_r * be somewhat complicated (e.g. segment offset would require an instruction * parser). So only support physical addresses up to page granuality for now. */ -static int mce_usable_address(struct mce *m) +int mce_usable_address(struct mce *m) { if (!(m->status & MCI_STATUS_ADDRV)) return 0; @@ -505,6 +505,7 @@ static int mce_usable_address(struct mce return 1; } +EXPORT_SYMBOL_GPL(mce_usable_address); bool mce_is_memory_error(struct mce *m) { --- a/drivers/acpi/nfit/mce.c +++ b/drivers/acpi/nfit/mce.c @@ -29,6 +29,10 @@ static int nfit_handle_mce(struct notifi if (!mce_is_memory_error(mce) || mce_is_correctable(mce)) return NOTIFY_DONE; + /* Verify the address reported in the MCE is valid. */ + if (!mce_usable_address(mce)) + return NOTIFY_DONE; + /* * mce->addr contains the physical addr accessed that caused the * machine check. We need to walk through the list of NFITs, and see