Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2538172imu; Thu, 29 Nov 2018 06:34:48 -0800 (PST) X-Google-Smtp-Source: AFSGD/UKZb1ibxLYnmx87L97AnZrEwBYnSf08pJtGGzIse0rMcuVGX9EKP8c1NDAkDzsSk62Y3YC X-Received: by 2002:a17:902:4025:: with SMTP id b34mr1710005pld.181.1543502088636; Thu, 29 Nov 2018 06:34:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543502088; cv=none; d=google.com; s=arc-20160816; b=RYc629kKZv0TWWzFOlyB/utiGdDJwsI9JULkIWQn6wRZfmbhh5w0DqqSRjJILXaqvo lTXgpoSlKyHUzJqY7FfPavpnhlhKA1VAsPrNAthVwd1jmwUnwtVd0jqOW3qrcK2h3sqB IgydLRSOsvL/kqLiCLouyQUlGlCuRMakwW8bDjU8M15ljXq3MRWZjT2ClWgA13CFf5GJ Vrmv3/2Lw8O2Zo56IIZRP1iq2HIxTCoeCIuPDh37cg7qiJqIThBRLhPNs6hvvG/gTXb7 ryvJjuppZAdBdqG0TuSfgiex4ai6KFCuslYm6rHQohNfZ2Y9V4A8FnPmy7GuOeH/rPi2 vicQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=b9Ezmi8ARSS3M7K6Bz50Z1PGkRoBYn1j6SD9Vr+6Y48=; b=xyVvpSasgzNG7i6kKix2W+ifhE8JUPNUJwYijYCnTw4tk9wOcYimDIQxho8DLDoTzE VGAZ4i6dbNORRfAz1BK6efACRpxEfRNKJmwMvpYSdFL387JMVJtOk5nb9XjPwRsPAMaC Mvi3Lwg8Jk2VZukzrQjwGyPAoGyM8ITLAp4mWIzVIZ9TRhRAMvigubFrhjid38eF6C4I sRNwDVK/2B3A6Gb3iIIOvTxKZvTvDU/lzagHNe5F+vEiFVKDxoNwtpFP5OurN22LEyNx INhqyPUciPHFmXHz44/rFszKZf/V1tX1J6PnRbk/NTE+prW+orO7VZsChjsB4v6VEtMz 91gA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JWsIMz6B; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k13si2116632pgb.343.2018.11.29.06.34.33; Thu, 29 Nov 2018 06:34:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JWsIMz6B; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389562AbeK3BiR (ORCPT + 99 others); Thu, 29 Nov 2018 20:38:17 -0500 Received: from mail.kernel.org ([198.145.29.99]:41714 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389553AbeK3BiQ (ORCPT ); Thu, 29 Nov 2018 20:38:16 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3538F2146F; Thu, 29 Nov 2018 14:32:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543501962; bh=iERJZl8erxsoOb5QrADOcWxsjUhv/ZYYLUNX68IO/MA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JWsIMz6BZNUM8QlEX6BzvNx6yNkbsRzftCp0V51gGcMSSh3QjinGqWDIZqB11Wl1y bOHQVbXRNvJ+PGGN8tMOSGbUHXjCOV4C04sM+4s9+7E2gyu/ne7jQ3ZtlH4BreZRFI /V+x3TAvTHu/SfkhXMlZ7wpOi3NIG2kEC6xfA6DM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ard Biesheuvel , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , linux-efi@vger.kernel.org, Ingo Molnar , Sasha Levin Subject: [PATCH 4.19 094/110] efi/arm: Revert deferred unmap of early memmap mapping Date: Thu, 29 Nov 2018 15:13:05 +0100 Message-Id: <20181129135925.049500254@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181129135921.231283053@linuxfoundation.org> References: <20181129135921.231283053@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 33412b8673135b18ea42beb7f5117ed0091798b6 ] Commit: 3ea86495aef2 ("efi/arm: preserve early mapping of UEFI memory map longer for BGRT") deferred the unmap of the early mapping of the UEFI memory map to accommodate the ACPI BGRT code, which looks up the memory type that backs the BGRT table to validate it against the requirements of the UEFI spec. Unfortunately, this causes problems on ARM, which does not permit early mappings to persist after paging_init() is called, resulting in a WARN() splat. Since we don't support the BGRT table on ARM anway, let's revert ARM to the old behaviour, which is to take down the early mapping at the end of efi_init(). Signed-off-by: Ard Biesheuvel Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: linux-efi@vger.kernel.org Fixes: 3ea86495aef2 ("efi/arm: preserve early mapping of UEFI memory ...") Link: http://lkml.kernel.org/r/20181114175544.12860-3-ard.biesheuvel@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin --- drivers/firmware/efi/arm-init.c | 4 ++++ drivers/firmware/efi/arm-runtime.c | 2 +- drivers/firmware/efi/memmap.c | 3 +++ 3 files changed, 8 insertions(+), 1 deletion(-) diff --git a/drivers/firmware/efi/arm-init.c b/drivers/firmware/efi/arm-init.c index 388a929baf95..1a6a77df8a5e 100644 --- a/drivers/firmware/efi/arm-init.c +++ b/drivers/firmware/efi/arm-init.c @@ -265,6 +265,10 @@ void __init efi_init(void) (params.mmap & ~PAGE_MASK))); init_screen_info(); + + /* ARM does not permit early mappings to persist across paging_init() */ + if (IS_ENABLED(CONFIG_ARM)) + efi_memmap_unmap(); } static int __init register_gop_device(void) diff --git a/drivers/firmware/efi/arm-runtime.c b/drivers/firmware/efi/arm-runtime.c index 922cfb813109..a00934d263c5 100644 --- a/drivers/firmware/efi/arm-runtime.c +++ b/drivers/firmware/efi/arm-runtime.c @@ -110,7 +110,7 @@ static int __init arm_enable_runtime_services(void) { u64 mapsize; - if (!efi_enabled(EFI_BOOT) || !efi_enabled(EFI_MEMMAP)) { + if (!efi_enabled(EFI_BOOT)) { pr_info("EFI services will not be available.\n"); return 0; } diff --git a/drivers/firmware/efi/memmap.c b/drivers/firmware/efi/memmap.c index 5fc70520e04c..1907db2b38d8 100644 --- a/drivers/firmware/efi/memmap.c +++ b/drivers/firmware/efi/memmap.c @@ -118,6 +118,9 @@ int __init efi_memmap_init_early(struct efi_memory_map_data *data) void __init efi_memmap_unmap(void) { + if (!efi_enabled(EFI_MEMMAP)) + return; + if (!efi.memmap.late) { unsigned long size; -- 2.17.1