[SRU][Yakkety][Zesty][PATCH 1/1] UBUNTU: SAUCE: x86/efi: Always map first physical page into EFI pagetables

Joseph Salisbury joseph.salisbury at canonical.com
Fri Feb 3 16:41:08 UTC 2017


On 02/03/2017 11:36 AM, Joseph Salisbury wrote:
> From: Jiri Kosina <jkosina at suse.cz>
>
> BugLink: http://bugs.launchpad.net/bugs/1659340
>
> Commit 129766708 ("x86/efi: Only map RAM into EFI page tables if in
> mixed-mode") stopped creating 1:1 mapping for all RAM in case of running
> in native 64bit mode.
>
> It turns out though that there are 64bit EFI implementations in the wild
> (this particular problem has been reported on Lenovo Yoga 710-11IKB) which
> still make use of first physical page for their own private use even
> though they explicitly mark it EFI_CONVENTIONAL_MEMORY in the memory map.
>
> In case there is no mapping for this particular frame in EFI pagetables,
> as soon as firmware tries to make use of it, triple fault occurs and the
> system reboots (in case of Yoga 710-11IKB this is very early during boot).
>
> Fix that by always mapping the first page of physical memory into EFI
> pagetables. We're on a safe side, as trim_bios_range() will reserve the
> first page and isolate it away from memory allocators anyway.
>
> Note: just reverting 129766708 is not enough on v4.9-rc1+ to fix the
> regression on affected hardware, as commit ab72a27da ("x86/efi:
> Consolidate region mapping logic") later made the first physical frame not
> to be mapped anyway.
>
> Reported-by: Hanka Pavlikova <hanka at ucw.cz>
> Signed-off-by: Jiri Kosina <jkosina at suse.cz>
> Cc: stable at kernel.org # v4.8+
> Cc: Waiman Long <waiman.long at hpe.com>
> Cc: Borislav Petkov <bp at suse.de>
> Cc: Laura Abbott <labbott at redhat.com>
> Cc: Vojtech Pavlik <vojtech at ucw.cz>
> Cc: Borislav Petkov <bp at alien8.de>
> Cc: Ard Biesheuvel <ard.biesheuvel at linaro.org>
> Fixes: 129766708 ("x86/efi: Only map RAM into EFI page tables if in mixed-mode")
> Signed-off-by: Matt Fleming <matt at codeblueprint.co.uk>
> Signed-off-by: Joseph Salisbury <joseph.salisbury at canonical.com>
>
> ---
>  arch/x86/platform/efi/efi_64.c | 16 ++++++++++++++++
>  1 file changed, 16 insertions(+)
>
> diff --git a/arch/x86/platform/efi/efi_64.c b/arch/x86/platform/efi/efi_64.c
> index 8dd3784..5be3868 100644
> --- a/arch/x86/platform/efi/efi_64.c
> +++ b/arch/x86/platform/efi/efi_64.c
> @@ -240,6 +240,22 @@ int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages)
>  	efi_scratch.use_pgd = true;
>  
>  	/*
> +	 * Certain firmware versions are way too sentimential and still believe
> +	 * they are exclusive and unquestionable owners of first physical page
> +	 * even though they explicitly mark it as EFI_CONVENTIONAL_MEMORY
> +	 * (but then write-access it later during SetVirtualAddressMap()).
> +	 *
> +	 * Create 1:1 mapping for this page to avoid triple faults during early
> +	 * boot with such firmware. We're on a safe side, as trim_bios_range()
> +	 * will reserve the first page and isolate it away from memory
> +	 * allocators anyway.
> +	 */
> +	if (kernel_map_pages_in_pgd(pgd, 0x0, 0x0, 1, _PAGE_RW)) {
> +		pr_err("Failed to create 1:1 mapping of first page\n");
> +		return 1;
> +	}
> +
> +	/*
>  	 * When making calls to the firmware everything needs to be 1:1
>  	 * mapped and addressable with 32-bit pointers. Map the kernel
>  	 * text and allocate a new stack because we can't rely on the

And I noticed the patch is now in mainline literally 5 minutes after I
send this SRU request:

https://lkml.org/lkml/2017/2/3/372





More information about the kernel-team mailing list