Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp213955ybl; Tue, 7 Jan 2020 17:30:56 -0800 (PST) X-Google-Smtp-Source: APXvYqyL+5vhEjODyvCriXbBpmEqs3ERp5cOqerhzGLKv54zPqJSTvKEJqbP/cjeg0fNH7jzX+He X-Received: by 2002:a54:4086:: with SMTP id i6mr1161648oii.65.1578447056754; Tue, 07 Jan 2020 17:30:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578447056; cv=none; d=google.com; s=arc-20160816; b=UWWU8Y9SiNKwvuB/SbZgK0qf2l/ri42GWC41RUS/DHtn2gYBV/EDWVvbrus5DyDk+p 0K5Bg2+VSbUkx+qymDpA5+hH41g9ZJbH7ZT2oqiitY+siJ7Zbbc6SwvDbx47eWjlsZIS qhSeYgt+OPzBjVAizD9zukpRhBN1NHYVz0zZd5gfj09hExa6mZQU8EjEls5aqFYAncKb lCzjlcLJwuVHITUK0ubQCsas1NWvXIJ3Df2yVhSRqLAudF6w7aOrmaVrdetmTFtApppy azWrU8Aw0bCPRXFsAA/IdGotexgHIpRDNsgoO2xa1t3KgLeigKzuurtWwV1wnvZV+pQ8 GNcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:cc; bh=eMNCNn4cHWiB+S4LUlZgkiYygD2r0Y7lwHkuQCT2pv4=; b=NuaU1j5tcbv3RxGmMZ/QYeYlkLi39Imdq+kjI/AKOvTi54wP+brgjU/LT9NJ4BfpRP gMzIJnwYjPqWzzIBuv1P85QMYZ109hF2YnWpl6jF1uBd5D9nwUEy1Kx3sYhHPfSLtnCz iw1U/Xhrj/7RoUdZMXOnmaQX/xfs1TUcfaIJ2/tLUzbMpoz4fo8wxw8H117DBJRHlIhp MVgsDxF4gA7eh428HrMEdU1XLdrY4WQK+G7A9W/JMsld0O4Y+Usv2nk2x5vdyWQrHb98 0rFC81P8aRDBZ2btfrR/d6vXMWAKQVM+jFaBTGR2yIB63gvuBenZe+BNPLUlnzQFc17e X7Rw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i12si936887oik.171.2020.01.07.17.30.44; Tue, 07 Jan 2020 17:30:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726617AbgAHB2x (ORCPT + 99 others); Tue, 7 Jan 2020 20:28:53 -0500 Received: from mga01.intel.com ([192.55.52.88]:33604 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726462AbgAHB2x (ORCPT ); Tue, 7 Jan 2020 20:28:53 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Jan 2020 17:28:52 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,408,1571727600"; d="scan'208";a="246195130" Received: from allen-box.sh.intel.com (HELO [10.239.159.136]) ([10.239.159.136]) by fmsmga004.fm.intel.com with ESMTP; 07 Jan 2020 17:28:50 -0800 Cc: baolu.lu@linux.intel.com, iommu@lists.linux-foundation.org, x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 2/2] iommu/vt-d: skip invalid RMRR entries To: Barret Rhoden , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , David Woodhouse , Joerg Roedel , Yian Chen , Sohil Mehta References: <20200107191610.178185-1-brho@google.com> <20200107191610.178185-3-brho@google.com> From: Lu Baolu Message-ID: Date: Wed, 8 Jan 2020 09:27:36 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20200107191610.178185-3-brho@google.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 1/8/20 3:16 AM, Barret Rhoden via iommu wrote: > The VT-d docs specify requirements for the RMRR entries base and end > (called 'Limit' in the docs) addresses. > > This commit will cause the DMAR processing to skip any RMRR entries that > do not meet these requirements and mark the firmware as tainted, since > the firmware is giving us junk. > > Signed-off-by: Barret Rhoden > --- > drivers/iommu/intel-iommu.c | 14 +++++++++++++- > 1 file changed, 13 insertions(+), 1 deletion(-) > > diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c > index a8bb458845bc..32c3c6338a3d 100644 > --- a/drivers/iommu/intel-iommu.c > +++ b/drivers/iommu/intel-iommu.c > @@ -4315,13 +4315,25 @@ static void __init init_iommu_pm_ops(void) > static inline void init_iommu_pm_ops(void) {} > #endif /* CONFIG_PM */ > > +static int rmrr_validity_check(struct acpi_dmar_reserved_memory *rmrr) > +{ > + if ((rmrr->base_address & PAGE_MASK) || > + (rmrr->end_address <= rmrr->base_address) || > + ((rmrr->end_address - rmrr->base_address + 1) & PAGE_MASK)) { > + pr_err(FW_BUG "Broken RMRR base: %#018Lx end: %#018Lx\n", > + rmrr->base_address, rmrr->end_address); Since you will WARN_TAINT below, do you still want an error message here? > + return -EINVAL; > + } > + return 0; > +} > + > int __init dmar_parse_one_rmrr(struct acpi_dmar_header *header, void *arg) > { > struct acpi_dmar_reserved_memory *rmrr; > struct dmar_rmrr_unit *rmrru; > > rmrr = (struct acpi_dmar_reserved_memory *)header; > - if (arch_rmrr_sanity_check(rmrr)) { > + if (rmrr_validity_check(rmrr) || arch_rmrr_sanity_check(rmrr)) { > WARN_TAINT(1, TAINT_FIRMWARE_WORKAROUND, > "Your BIOS is broken; bad RMRR [%#018Lx-%#018Lx]\n" > "BIOS vendor: %s; Ver: %s; Product Version: %s\n", > Best regards, baolu