Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp5645915img; Wed, 27 Mar 2019 12:21:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqzfDUjaZN/sEalmozcbg/4qwYTuKnrV+YnMguL+8m3Q5gQvJNxo8DtWD3JuWqFHgSCupAlL X-Received: by 2002:a65:5b47:: with SMTP id y7mr36077562pgr.449.1553714475755; Wed, 27 Mar 2019 12:21:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553714475; cv=none; d=google.com; s=arc-20160816; b=jJgxJM+7V3VMyybOREGtK+73c/ZpLiIteVZpvs6VNFsKFRsWSDG6Z+lc4IrFufW9tT KKAnMc+CWda4/vWDmtDd8/dDI0MNMrl7uds1m1s3Q3zIwl81gQ7BZgtLLXw98fp6BXlO XCTMMJKevKqk22bKPKKt7yticCqbpRlD5Xuk3qgJG/nfruzVJyuOGGe/1LSr/r24jkkm TziiNEAzwrSaTkR2cBbcIpfUc0CZmY/J34NRaeTkTz2yE1rPcuhJatICUZClHaD1hUo2 dTzdkPx4UZHAcGUP+YVe7Uk0fTrBXyQbmEHHmN+dKB/BFLjexmPq4925qHFv4soK3SXv Apzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=4jYJib06+GTWCjtnRdL4m/co+tPOe2zv1x3WQKEoqJE=; b=XRTh4I6+2+qUyAFsDrvHQ6cnWamh3eX6jCwwlYsqfG1zLuuCRsOz3LgSmrzyTAZdHl foGjSmjOCE+uh3vHTZ7jcZD2Tf7HhIXeziOsC9HhXUVuRzgjSv5VIW9H5ODPfizO4A3G yh3T9URD2OYNv5T0+YRwO3FbLTz2tnlCgjeREhWKyZDwGOg+MWgHmVebx0ZbV7zmee6J ZqE3G+kSBriWRPQKcZK1qOnjJO9hCQESbQsHuuFcMtbv7pcMqbvmrmHaKLNH0z7QRY+O iO3PH/72vLJC6ExGYd/kXiFvyjHx39KGGuOsuGCTPrTk0EzKwKszj+T24g9N2SzuHw0O inQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qM2DKh30; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b5si19330496plx.64.2019.03.27.12.21.00; Wed, 27 Mar 2019 12:21:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qM2DKh30; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388612AbfC0TTN (ORCPT + 99 others); Wed, 27 Mar 2019 15:19:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:49866 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387775AbfC0SH4 (ORCPT ); Wed, 27 Mar 2019 14:07:56 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C3B0E217D9; Wed, 27 Mar 2019 18:07:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553710075; bh=KIaSZbyVU7oeCQc+8FkgNKioQ7h8nz580PI1iesjiK4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qM2DKh30iWRyNUD3B/5NmKmQPZQDS547n+4iJGzSsCyDfyxlulKwGrRhc9NCq/3Qu qn8L/Dn45LPS6fP5fqzZwyuto79jL8EOuL8T5rnjb48ywSGWUF0CIMfwqIR+gMNF6D LpK9PnDRozBDrBURVYRl6p/rjdWW7SHgUpxx+ywg= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Ard Biesheuvel , AKASHI Takahiro , Alexander Graf , Bjorn Andersson , Borislav Petkov , Heinrich Schuchardt , Jeffrey Hugo , Lee Jones , Leif Lindholm , Linus Torvalds , Matt Fleming , Peter Jones , Peter Zijlstra , Thomas Gleixner , linux-efi@vger.kernel.org, Ingo Molnar , Sasha Levin Subject: [PATCH AUTOSEL 5.0 186/262] efi/memattr: Don't bail on zero VA if it equals the region's PA Date: Wed, 27 Mar 2019 14:00:41 -0400 Message-Id: <20190327180158.10245-186-sashal@kernel.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190327180158.10245-1-sashal@kernel.org> References: <20190327180158.10245-1-sashal@kernel.org> MIME-Version: 1.0 X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ard Biesheuvel [ Upstream commit 5de0fef0230f3c8d75cff450a71740a7bf2db866 ] The EFI memory attributes code cross-references the EFI memory map with the more granular EFI memory attributes table to ensure that they are in sync before applying the strict permissions to the regions it describes. Since we always install virtual mappings for the EFI runtime regions to which these strict permissions apply, we currently perform a sanity check on the EFI memory descriptor, and ensure that the EFI_MEMORY_RUNTIME bit is set, and that the virtual address has been assigned. However, in cases where a runtime region exists at physical address 0x0, and the virtual mapping equals the physical mapping, e.g., when running in mixed mode on x86, we encounter a memory descriptor with the runtime attribute and virtual address 0x0, and incorrectly draw the conclusion that a runtime region exists for which no virtual mapping was installed, and give up altogether. The consequence of this is that firmware mappings retain their read-write-execute permissions, making the system more vulnerable to attacks. So let's only bail if the virtual address of 0x0 has been assigned to a physical region that does not reside at address 0x0. Signed-off-by: Ard Biesheuvel Acked-by: Sai Praneeth Prakhya Cc: AKASHI Takahiro Cc: Alexander Graf Cc: Bjorn Andersson Cc: Borislav Petkov Cc: Heinrich Schuchardt Cc: Jeffrey Hugo Cc: Lee Jones Cc: Leif Lindholm Cc: Linus Torvalds Cc: Matt Fleming Cc: Peter Jones Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: linux-efi@vger.kernel.org Fixes: 10f0d2f577053 ("efi: Implement generic support for the Memory ...") Link: http://lkml.kernel.org/r/20190202094119.13230-4-ard.biesheuvel@linaro.org Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin --- drivers/firmware/efi/memattr.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/firmware/efi/memattr.c b/drivers/firmware/efi/memattr.c index 8986757eafaf..aac972b056d9 100644 --- a/drivers/firmware/efi/memattr.c +++ b/drivers/firmware/efi/memattr.c @@ -94,7 +94,7 @@ static bool entry_is_valid(const efi_memory_desc_t *in, efi_memory_desc_t *out) if (!(md->attribute & EFI_MEMORY_RUNTIME)) continue; - if (md->virt_addr == 0) { + if (md->virt_addr == 0 && md->phys_addr != 0) { /* no virtual mapping has been installed by the stub */ break; } -- 2.19.1