Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp939653pxp; Wed, 16 Mar 2022 22:01:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwVcvowItHhJMLBM2renIaTIv6FQfFcqVYP1l0nVk1LEXhZBfJBsY6k0qusEMGoV5yYYIwQ X-Received: by 2002:a17:90b:164c:b0:1c6:3581:4b40 with SMTP id il12-20020a17090b164c00b001c635814b40mr13357729pjb.114.1647493293770; Wed, 16 Mar 2022 22:01:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647493293; cv=none; d=google.com; s=arc-20160816; b=Pp6DejbkR/qv/dd8cC39B4G8IMGsYJKdZPqZiuLRd9ld8HGH0cWuYBK+/MuTVCht/A tNQwFAJuVIHShtXsd8LAzbW54Q6v90uBuuTxVMHECDAAifXOVoOiP5Z1UXplGP8Qa2wZ 3LBTXqCdmbYCKlg1JKgltPI9IsJf60oiVnAe9sLMLQYys/ZrIqbjWYN05VDhndLcwDRY 7KZb++CjOkl8srofvUHqMyS522FVxq76D/7NYHi10ux/RDPCXocTqON0bvWLsmzc5z86 y78a/HalVw8mMQUxWBPRpH7FYejSjfDbCQJ1dgCLiVPDlyrehgYQzF1dvKt90gPlJe2n bweA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FeAKWL0EgPZmEn/53Ca1R9wObBfC2hEjC+JMF2rbmkE=; b=ueeeKYJzrWzANTSH6DOjrUJUQPRa98P59BTfBHyIlPscqmRH0kQfwpd1R8FLycLIZR mkFJ4oeAxNlHnapbcCUIoSaT+bcRU5JADQSVMe5Xjr8MvYcHuUJjm+r0nM3wr6u4uJc4 jcQCztWzhKJULN0Zyre47JV+6DsnfnF0lJZBI9ccqCR27VMwr34JBbs+Nq2+9i0+NeH0 3eDi9hTBGvhcY4qNpDBFn8rxHQUsW4j/pxB0ZxlhuGkEzK6a6PM4Nbws69RP0D4yfgHH Zk4U2Mhy6OaATN9vbIL0IC6jG7YXh+EKOjKs3I/9uYoxRm7VD0jaoy7h1JboC4ibljGk XqvA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IBDTF68M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id w25-20020a634919000000b003816043ef25si970515pga.282.2022.03.16.22.01.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Mar 2022 22:01:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=IBDTF68M; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5ACA5193B7D; Wed, 16 Mar 2022 21:15:41 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240650AbiCNMHS (ORCPT + 99 others); Mon, 14 Mar 2022 08:07:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35316 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240708AbiCNMG7 (ORCPT ); Mon, 14 Mar 2022 08:06:59 -0400 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0FD332018A; Mon, 14 Mar 2022 05:03:15 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 27E7FCE1265; Mon, 14 Mar 2022 12:03:14 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id EBC4DC340E9; Mon, 14 Mar 2022 12:03:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1647259392; bh=KJ76qdj+9s1wslnc9jYS35+T7a9INtf5aJ7Icsm/uo4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IBDTF68M3p1xT5Lv7GdCbJlI45c4W5qAurJnDRvWKdQSrROJYO+0qHTYVPgGfwUgr lL3eYpgMZ98JiWuU4e9XSQocCyBnHl94jvQgc9QuHlmyrLgXYKbTqZ5AJAcyOlFQ4r /PAJD2yXPlsTFLwSh1O3TO9jV2BZoYuo8YqsYs2c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ross Philipson , Borislav Petkov , Daniel Kiper Subject: [PATCH 5.10 67/71] x86/boot: Add setup_indirect support in early_memremap_is_setup_data() Date: Mon, 14 Mar 2022 12:54:00 +0100 Message-Id: <20220314112739.814638150@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220314112737.929694832@linuxfoundation.org> References: <20220314112737.929694832@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ross Philipson commit 445c1470b6ef96440e7cfc42dfc160f5004fd149 upstream. The x86 boot documentation describes the setup_indirect structures and how they are used. Only one of the two functions in ioremap.c that needed to be modified to be aware of the introduction of setup_indirect functionality was updated. Adds comparable support to the other function where it was missing. Fixes: b3c72fc9a78e ("x86/boot: Introduce setup_indirect") Signed-off-by: Ross Philipson Signed-off-by: Borislav Petkov Reviewed-by: Daniel Kiper Cc: Link: https://lore.kernel.org/r/1645668456-22036-3-git-send-email-ross.philipson@oracle.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/mm/ioremap.c | 33 +++++++++++++++++++++++++++++++-- 1 file changed, 31 insertions(+), 2 deletions(-) --- a/arch/x86/mm/ioremap.c +++ b/arch/x86/mm/ioremap.c @@ -694,22 +694,51 @@ static bool memremap_is_setup_data(resou static bool __init early_memremap_is_setup_data(resource_size_t phys_addr, unsigned long size) { + struct setup_indirect *indirect; struct setup_data *data; u64 paddr, paddr_next; paddr = boot_params.hdr.setup_data; while (paddr) { - unsigned int len; + unsigned int len, size; if (phys_addr == paddr) return true; data = early_memremap_decrypted(paddr, sizeof(*data)); + if (!data) { + pr_warn("failed to early memremap setup_data entry\n"); + return false; + } + + size = sizeof(*data); paddr_next = data->next; len = data->len; - early_memunmap(data, sizeof(*data)); + if ((phys_addr > paddr) && (phys_addr < (paddr + len))) { + early_memunmap(data, sizeof(*data)); + return true; + } + + if (data->type == SETUP_INDIRECT) { + size += len; + early_memunmap(data, sizeof(*data)); + data = early_memremap_decrypted(paddr, size); + if (!data) { + pr_warn("failed to early memremap indirect setup_data\n"); + return false; + } + + indirect = (struct setup_indirect *)data->data; + + if (indirect->type != SETUP_INDIRECT) { + paddr = indirect->addr; + len = indirect->len; + } + } + + early_memunmap(data, size); if ((phys_addr > paddr) && (phys_addr < (paddr + len))) return true;