]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
drop x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch from 4.14 and...
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 14 Dec 2021 09:10:17 +0000 (10:10 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 14 Dec 2021 09:10:17 +0000 (10:10 +0100)
queue-4.14/series
queue-4.14/x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch [deleted file]
queue-4.19/series
queue-4.19/x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch [deleted file]

index 006aa5efbbce91873ba88b2b732b9034cd5f0fef..0dcee3640de8e373938540e92eaa45895980682e 100644 (file)
@@ -18,7 +18,6 @@ alsa-pcm-oss-handle-missing-errors-in-snd_pcm_oss_change_params.patch
 tracefs-have-new-files-inherit-the-ownership-of-their-parent.patch
 can-pch_can-pch_can_rx_normal-fix-use-after-free.patch
 can-m_can-disable-and-ignore-elo-interrupt.patch
-x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch
 libata-add-horkage-for-asmedia-1092.patch
 wait-add-wake_up_pollfree.patch
 binder-use-wake_up_pollfree.patch
diff --git a/queue-4.14/x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch b/queue-4.14/x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch
deleted file mode 100644 (file)
index 42ac8b9..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-From 1ff2fc02862d52e18fd3daabcfe840ec27e920a8 Mon Sep 17 00:00:00 2001
-From: Tom Lendacky <thomas.lendacky@amd.com>
-Date: Wed, 20 Oct 2021 13:02:11 -0500
-Subject: x86/sme: Explicitly map new EFI memmap table as encrypted
-
-From: Tom Lendacky <thomas.lendacky@amd.com>
-
-commit 1ff2fc02862d52e18fd3daabcfe840ec27e920a8 upstream.
-
-Reserving memory using efi_mem_reserve() calls into the x86
-efi_arch_mem_reserve() function. This function will insert a new EFI
-memory descriptor into the EFI memory map representing the area of
-memory to be reserved and marking it as EFI runtime memory. As part
-of adding this new entry, a new EFI memory map is allocated and mapped.
-The mapping is where a problem can occur. This new memory map is mapped
-using early_memremap() and generally mapped encrypted, unless the new
-memory for the mapping happens to come from an area of memory that is
-marked as EFI_BOOT_SERVICES_DATA memory. In this case, the new memory will
-be mapped unencrypted. However, during replacement of the old memory map,
-efi_mem_type() is disabled, so the new memory map will now be long-term
-mapped encrypted (in efi.memmap), resulting in the map containing invalid
-data and causing the kernel boot to crash.
-
-Since it is known that the area will be mapped encrypted going forward,
-explicitly map the new memory map as encrypted using early_memremap_prot().
-
-Cc: <stable@vger.kernel.org> # 4.14.x
-Fixes: 8f716c9b5feb ("x86/mm: Add support to access boot related data in the clear")
-Link: https://lore.kernel.org/all/ebf1eb2940405438a09d51d121ec0d02c8755558.1634752931.git.thomas.lendacky@amd.com/
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-[ardb: incorporate Kconfig fix by Arnd]
-Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- arch/x86/Kconfig               |    1 +
- arch/x86/platform/efi/quirks.c |    3 ++-
- 2 files changed, 3 insertions(+), 1 deletion(-)
-
---- a/arch/x86/Kconfig
-+++ b/arch/x86/Kconfig
-@@ -1903,6 +1903,7 @@ config EFI
-       depends on ACPI
-       select UCS2_STRING
-       select EFI_RUNTIME_WRAPPERS
-+      select ARCH_USE_MEMREMAP_PROT
-       ---help---
-         This enables the kernel to use EFI runtime services that are
-         available (such as the EFI variable services).
---- a/arch/x86/platform/efi/quirks.c
-+++ b/arch/x86/platform/efi/quirks.c
-@@ -276,7 +276,8 @@ void __init efi_arch_mem_reserve(phys_ad
-               return;
-       }
--      new = early_memremap(new_phys, new_size);
-+      new = early_memremap_prot(new_phys, new_size,
-+                                pgprot_val(pgprot_encrypted(FIXMAP_PAGE_NORMAL)));
-       if (!new) {
-               pr_err("Failed to map new boot services memmap\n");
-               return;
index 4d62f38938e877702c1de87d47b5e5c82407f932..c9e00e570b48d1a61d9f870d6958097ac22cc9d7 100644 (file)
@@ -29,7 +29,6 @@ tracefs-have-new-files-inherit-the-ownership-of-their-parent.patch
 clk-qcom-regmap-mux-fix-parent-clock-lookup.patch
 can-pch_can-pch_can_rx_normal-fix-use-after-free.patch
 can-m_can-disable-and-ignore-elo-interrupt.patch
-x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch
 libata-add-horkage-for-asmedia-1092.patch
 wait-add-wake_up_pollfree.patch
 binder-use-wake_up_pollfree.patch
diff --git a/queue-4.19/x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch b/queue-4.19/x86-sme-explicitly-map-new-efi-memmap-table-as-encrypted.patch
deleted file mode 100644 (file)
index fde1e43..0000000
+++ /dev/null
@@ -1,60 +0,0 @@
-From 1ff2fc02862d52e18fd3daabcfe840ec27e920a8 Mon Sep 17 00:00:00 2001
-From: Tom Lendacky <thomas.lendacky@amd.com>
-Date: Wed, 20 Oct 2021 13:02:11 -0500
-Subject: x86/sme: Explicitly map new EFI memmap table as encrypted
-
-From: Tom Lendacky <thomas.lendacky@amd.com>
-
-commit 1ff2fc02862d52e18fd3daabcfe840ec27e920a8 upstream.
-
-Reserving memory using efi_mem_reserve() calls into the x86
-efi_arch_mem_reserve() function. This function will insert a new EFI
-memory descriptor into the EFI memory map representing the area of
-memory to be reserved and marking it as EFI runtime memory. As part
-of adding this new entry, a new EFI memory map is allocated and mapped.
-The mapping is where a problem can occur. This new memory map is mapped
-using early_memremap() and generally mapped encrypted, unless the new
-memory for the mapping happens to come from an area of memory that is
-marked as EFI_BOOT_SERVICES_DATA memory. In this case, the new memory will
-be mapped unencrypted. However, during replacement of the old memory map,
-efi_mem_type() is disabled, so the new memory map will now be long-term
-mapped encrypted (in efi.memmap), resulting in the map containing invalid
-data and causing the kernel boot to crash.
-
-Since it is known that the area will be mapped encrypted going forward,
-explicitly map the new memory map as encrypted using early_memremap_prot().
-
-Cc: <stable@vger.kernel.org> # 4.14.x
-Fixes: 8f716c9b5feb ("x86/mm: Add support to access boot related data in the clear")
-Link: https://lore.kernel.org/all/ebf1eb2940405438a09d51d121ec0d02c8755558.1634752931.git.thomas.lendacky@amd.com/
-Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
-[ardb: incorporate Kconfig fix by Arnd]
-Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
-Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----
- arch/x86/Kconfig               |    1 +
- arch/x86/platform/efi/quirks.c |    3 ++-
- 2 files changed, 3 insertions(+), 1 deletion(-)
-
---- a/arch/x86/Kconfig
-+++ b/arch/x86/Kconfig
-@@ -1953,6 +1953,7 @@ config EFI
-       depends on ACPI
-       select UCS2_STRING
-       select EFI_RUNTIME_WRAPPERS
-+      select ARCH_USE_MEMREMAP_PROT
-       ---help---
-         This enables the kernel to use EFI runtime services that are
-         available (such as the EFI variable services).
---- a/arch/x86/platform/efi/quirks.c
-+++ b/arch/x86/platform/efi/quirks.c
-@@ -278,7 +278,8 @@ void __init efi_arch_mem_reserve(phys_ad
-               return;
-       }
--      new = early_memremap(new_phys, new_size);
-+      new = early_memremap_prot(new_phys, new_size,
-+                                pgprot_val(pgprot_encrypted(FIXMAP_PAGE_NORMAL)));
-       if (!new) {
-               pr_err("Failed to map new boot services memmap\n");
-               return;