Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1665251pxj; Wed, 19 May 2021 10:59:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyPbd9ncYbt693Hkfxido/AMuSRc0MYKKG1KujpHOh5lrGvHFk2rVnN5B4H1Iqgz+9gn2Cc X-Received: by 2002:a92:7d07:: with SMTP id y7mr251580ilc.68.1621447162458; Wed, 19 May 2021 10:59:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621447162; cv=none; d=google.com; s=arc-20160816; b=wBPcP9Dls+P7o2oE/sPaUJj1oSnuHsZn1Zs0cNdb/LFsG3hzdSi79L+WzObYpAYv1V YiagTOBLD+G0gSiY2GeEdv4qEOhts/mw1jJfywyo0r8YFVaq0vNxuJSlEi1/9JKmF6hm Kjq/UuBqBKoCvAYlW9am4VunsASd42jYrXmEx4n+tdPviRqxqXTD9IHAinlUHmli0uoQ iK+nns/J45+wzSn1LYuGGn+SwOd1ZRVX/zJx3jl6hGz6T0bynEXOFRniSJP1wNK1IS/M +4d0d3edSgRU223Lke6ydCJD1MB5XsZPQPjvfGd4HQPgGTChQIOwfxE5U0oId9YJ536T vkFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=PQTPttgbzMdo5S94bIQo3dmlU39qbnpZOkfwZLOniU0=; b=Q80ayS5QRfYwmoFfYfSdnqoKE+z+VkkbadKRc6ZCkS2HREKeTK42qiTbpm/wm4ob9n 56pbXLcpc8zSUBxfLQNhOS+BHZx/c1rmOQJBXNpPZoA8LmwLC4Z53CREY6LAGPgPtSsC v1lsNOlY2N4Kko79Ijb6vGOH2Ky+lLNLUt4LxdQq1JAvYW2ejWppRRIyZfcL+MGFJ1qo snZsIKQEiqd+OwnzyLQ146LzF0yj4x7PKZY6CBfNyvd2rvKpMpHoSEFXSLUBtqc7vGqS ZgLxTsKeR3GFgvul1AhleP3ngsaBv2GxOModrFATk4/cS3CI2dSd7kfRNEyzv8i6SxHE 3qPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m20si28200832ioy.69.2021.05.19.10.59.09; Wed, 19 May 2021 10:59:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1348789AbhERLlk (ORCPT + 99 others); Tue, 18 May 2021 07:41:40 -0400 Received: from mx2.suse.de ([195.135.220.15]:44636 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1348769AbhERLli (ORCPT ); Tue, 18 May 2021 07:41:38 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 27027AFF8; Tue, 18 May 2021 11:40:20 +0000 (UTC) Date: Tue, 18 May 2021 13:40:18 +0200 From: Joerg Roedel To: Greg KH Cc: linux-kernel@vger.kernel.org, stable-commits@vger.kernel.org Subject: Re: [PATCH stable-5.10,5.11,5.12] x86/boot/compressed/64: Check SEV encryption in the 32-bit boot-path Message-ID: References: <20210508032224.039CF613ED@mail.kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 18, 2021 at 01:39:02PM +0200, Joerg Roedel wrote: > [ Upstream commit fef81c86262879d4b1176ef51a834c15b805ebb9 ] > > Check whether the hypervisor reported the correct C-bit when running > as an SEV guest. Using a wrong C-bit position could be used to leak > sensitive data from the guest to the hypervisor. > > Signed-off-by: Joerg Roedel > Signed-off-by: Borislav Petkov > Link: https://lkml.kernel.org/r/20210312123824.306-8-joro@8bytes.org > --- > arch/x86/boot/compressed/head_64.S | 85 ++++++++++++++++++++++++++++++ > 1 file changed, 85 insertions(+) This is compile-tested now for 5.10, 5.11 and 5.12. With 5.12 I also did a boot-test using the 32-bit boot-path and verified it still works as expected. Regards, Joerg