diff options
author | Demi Marie Obenour <demi@invisiblethingslab.com> | 2023-01-19 22:03:56 +0300 |
---|---|---|
committer | Ard Biesheuvel <ardb@kernel.org> | 2023-01-22 12:14:15 +0300 |
commit | ab03e91e60ce457a90e6aa2c97ca2fa139b73f55 (patch) | |
tree | ab0cbfd47accecefac4e738d1b51545729415405 /drivers/xen | |
parent | 2cf9e278efeff8f8bbb9580e2d6760e19795e310 (diff) | |
download | linux-ab03e91e60ce457a90e6aa2c97ca2fa139b73f55.tar.xz |
efi: memmap: Disregard bogus entries instead of returning them
The ESRT code currently contains two consistency checks on the memory
descriptor it obtains, but one of them is both incomplete and can only
trigger on invalid descriptors.
So let's drop these checks, and instead disregard descriptors entirely
if the start address is misaligned, or if the number of pages reaches
to or beyond the end of the address space. Note that the memory map as
a whole could still be inconsistent: multiple entries might cover the
same area, or the address could be outside of the addressable PA space,
but validating that goes beyond the scope of these helpers. Also note
that since the physical address space is never 64-bits wide, a
descriptor that includes the last page of memory is not valid. This is
fortunate, since it means that a valid physical address will never be an
error pointer and that the length of a memory descriptor in bytes will
fit in a 64-bit unsigned integer.
Co-developed-by: Ard Biesheuvel <ardb@kernel.org>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Signed-off-by: Demi Marie Obenour <demi@invisiblethingslab.com>
Tested-by: Marek Marczykowski-Górecki <marmarek@invisiblethingslab.com>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Diffstat (limited to 'drivers/xen')
0 files changed, 0 insertions, 0 deletions