Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4355500pxj; Tue, 8 Jun 2021 12:16:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzTjQWrjItC4Ap19UULBaXGE2ahHhe4NyiYLB/v95OTbq3dvURtIlhKx/HfnpWRFAiKqnJW X-Received: by 2002:aa7:c3ce:: with SMTP id l14mr27065932edr.99.1623179763587; Tue, 08 Jun 2021 12:16:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623179763; cv=none; d=google.com; s=arc-20160816; b=S8OEL4HmCfHeYTCiRGpOMSEG3kFvk4Md2+g/N2QBSXSoIIPaR8HX3f0DrLOWsFAWat s4RS1jYMkUhFIkJ6BNlrEqPjgnlbO6rglzfw3NpVC82qoR918xJgfckAFQw285j3T4MJ in6QenjMs88BBcU1mm0TJmo8Odadrncxtoox7XoXr1mGWCHcbyHKtWNlh69m+wvbAJpg EeWaYu6zQJvw6qc9u15O1V5jrSkmk3Lm6UbBDkHqtyxeezW6+gsGqZY6eNU5IyKnwZKC yX/LkqwmhhQpH3MpBBIisWxz0LiRxUuUxRRQwhNDgRUi8Evw3cP2cioYq5iXIYeZtiSc 2TDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=udpFMYhM19gR/JO6jxROXeUypyj4TkaQ/RF2wt6myIY=; b=qcJz6MNl+cAygAZ71DAYNmSbni/KTh5ohL+sza4bOj90ZTIaBO/66iDQNXLkb1DE7o kBCPcMIUin+M9v4LaxTUWgOcsPsiPJa1pP7cUQihRYcXYjbVn5b/8NNaDQQ2mUt5RiVE 7rCX3BEE4TUjuym+BrDRnCF5Q1Z4PPeyupl8WztNz+QbmvHCWoPMcniqbk3kXOql35V1 Y4c2w4fup6EZ5KeHLHU5vzBFFzNhmqk2VaCafyIkaKFAFVhtbFUmAl6bTw1Jh07S+fLj T5FALjakhxcI+apsu02K5OFR8tXqAPYpjleGCfblVe8BBTWxRb9rreTOrKLSbkBKlqsg IKYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=b2Beh2+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g12si441663edw.596.2021.06.08.12.15.40; Tue, 08 Jun 2021 12:16:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=b2Beh2+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236105AbhFHTNx (ORCPT + 99 others); Tue, 8 Jun 2021 15:13:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:39704 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236782AbhFHTDW (ORCPT ); Tue, 8 Jun 2021 15:03:22 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C211861922; Tue, 8 Jun 2021 18:45:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623177934; bh=FxkRkH0E9G2XWpm2+AFFrGDy/r8ng+80Ved7jl4n/NY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=b2Beh2+L+27vdVjNph0qSjT/P1vm6lDjoV0DTTzQL2Ns5UF9DSMubY4HeFH/0odHJ cyDGH57TyL0WLRsu9xGHujqr5CkAzqooXstn0XZ7iuAKrOTFSgZXgEjUSPyHmNwFew xQLe5DkRJkI3kA/iEMySPBDPcVaHTjsjtAZXIpZ4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Heiner Kallweit , Ard Biesheuvel , Sasha Levin Subject: [PATCH 5.12 008/161] efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared Date: Tue, 8 Jun 2021 20:25:38 +0200 Message-Id: <20210608175945.751884703@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210608175945.476074951@linuxfoundation.org> References: <20210608175945.476074951@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Heiner Kallweit [ Upstream commit 45add3cc99feaaf57d4b6f01d52d532c16a1caee ] UEFI spec 2.9, p.108, table 4-1 lists the scenario that both attributes are cleared with the description "No memory access protection is possible for Entry". So we can have valid entries where both attributes are cleared, so remove the check. Signed-off-by: Heiner Kallweit Fixes: 10f0d2f577053 ("efi: Implement generic support for the Memory Attributes table") Signed-off-by: Ard Biesheuvel Signed-off-by: Sasha Levin --- drivers/firmware/efi/memattr.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/drivers/firmware/efi/memattr.c b/drivers/firmware/efi/memattr.c index 5737cb0fcd44..0a9aba5f9cef 100644 --- a/drivers/firmware/efi/memattr.c +++ b/drivers/firmware/efi/memattr.c @@ -67,11 +67,6 @@ static bool entry_is_valid(const efi_memory_desc_t *in, efi_memory_desc_t *out) return false; } - if (!(in->attribute & (EFI_MEMORY_RO | EFI_MEMORY_XP))) { - pr_warn("Entry attributes invalid: RO and XP bits both cleared\n"); - return false; - } - if (PAGE_SIZE > EFI_PAGE_SIZE && (!PAGE_ALIGNED(in->phys_addr) || !PAGE_ALIGNED(in->num_pages << EFI_PAGE_SHIFT))) { -- 2.30.2