From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5A2B5C10F29 for ; Sun, 8 Mar 2020 08:09:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3191420848 for ; Sun, 8 Mar 2020 08:09:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583654955; bh=0L3JnpVh2/V/1uqvO5VAW63G8ir+cLFE9qbDxePw4yA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=e27OTnXmWvHyidT2sxc5RNvfWDr6q6kL5fyYppuF1SnFPkCvP+NiE1eDtnPQpoQ2u qpG4djluSh800eJ3pLa2OfMYT1dCIrXyOLqIPiRfMYPHZ4UOPFEC/lRLkSLcwUvtoX PZOpVIsik6QI3m0ENNDrc6kedd5+SzD6yuR3QXX4= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726270AbgCHIJL (ORCPT ); Sun, 8 Mar 2020 04:09:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:36128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725854AbgCHIJK (ORCPT ); Sun, 8 Mar 2020 04:09:10 -0400 Received: from e123331-lin.home (amontpellier-657-1-18-247.w109-210.abo.wanadoo.fr [109.210.65.247]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1545C20866; Sun, 8 Mar 2020 08:09:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583654950; bh=0L3JnpVh2/V/1uqvO5VAW63G8ir+cLFE9qbDxePw4yA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=tOUxJ/cieC/Cjpan6NQ85Ks5fNxFZKhpmDPL3yE4pNxfTJFkBQVbMIWOjnUmDthiq yg1ocfkLKppZk4KBfYYG5wH7Ewo4NSqu2asw6RdMZJE3Qlv6MPprpBMQCV3/b/244G 4PRYA8UDR+WKB9IAJuCPLk1Xtjcyzn0p5lOGrLJs= From: Ard Biesheuvel To: linux-efi@vger.kernel.org, Ingo Molnar , Thomas Gleixner Cc: Ard Biesheuvel , linux-kernel@vger.kernel.org, Arvind Sankar , Christoph Hellwig , David Hildenbrand , Davidlohr Bueso , Guenter Roeck , Heinrich Schuchardt , Jonathan Corbet , Lukas Bulwahn , Masahiro Yamada , Nikolai Merinov , Tom Lendacky , Vladis Dronov Subject: [PATCH 01/28] efi/x86: Add TPM related EFI tables to unencrypted mapping checks Date: Sun, 8 Mar 2020 09:08:32 +0100 Message-Id: <20200308080859.21568-2-ardb@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200308080859.21568-1-ardb@kernel.org> References: <20200308080859.21568-1-ardb@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tom Lendacky When booting with SME active, EFI tables must be mapped unencrypted since they were built by UEFI in unencrypted memory. Update the list of tables to be checked during early_memremap() processing to account for the EFI TPM tables. This fixes a bug where an EFI TPM log table has been created by UEFI, but it lives in memory that has been marked as usable rather than reserved. Cc: # v5.4+ Signed-off-by: Tom Lendacky Link: https://lore.kernel.org/r/4144cd813f113c20cdfa511cf59500a64e6015be.1582662842.git.thomas.lendacky@amd.com Signed-off-by: Ard Biesheuvel --- arch/x86/platform/efi/efi.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/platform/efi/efi.c b/arch/x86/platform/efi/efi.c index ebcec4bd273f..3ce695501681 100644 --- a/arch/x86/platform/efi/efi.c +++ b/arch/x86/platform/efi/efi.c @@ -88,6 +88,8 @@ static const unsigned long * const efi_tables[] = { #ifdef CONFIG_EFI_RCI2_TABLE &rci2_table_phys, #endif + &efi.tpm_log, + &efi.tpm_final_log, }; u64 efi_setup; /* efi setup_data physical address */ -- 2.17.1