Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp151796imw; Wed, 13 Jul 2022 21:38:25 -0700 (PDT) X-Google-Smtp-Source: AGRyM1tF+MWnExg9mc7kemWmKZVAzin88fyVws9GcdFHdn9pvm3EoKE1m03PJhaQvbu9MflGuHiQ X-Received: by 2002:a17:907:75cc:b0:72b:4a96:69fe with SMTP id jl12-20020a17090775cc00b0072b4a9669femr6969761ejc.276.1657773505562; Wed, 13 Jul 2022 21:38:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657773505; cv=none; d=google.com; s=arc-20160816; b=JNA7PSuSJGHQThCUwNyxP3dY3DiHohMj/5vxx9Kj4cAm5zptt6v99ZLix32IBFyVIA Y/rkdzwoe+utLO8bYEKnyLx+u/XEy7m2KPMlQMgwcgHvK92HL+5AveUqr7BIC4dvFbOF SOk/1s9NGenvMijGKYy9yaEHSgoV8bIsWa2AjhojDYlX7OmWtgg9wBJ1YIBd2viYrkMz km5QBsR8BwIOErySYnUIeO0a6bczfQ8NvRaxZi8Iqr3KPSOQidkHZ8g9kffPFfVR/ymN uYz5gXKTUBMARZj+YyGPMhHyNMo5qF5U/qsQlVnJ38+BK5UTLYkOjt2gpcL5xePHojL1 TLyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=JMF1lecoS02pITYjDHmjOtuvpDhzyDpff2TEN643ME0=; b=kZkpsZIDJDodfsBuVM00EvBWkYqhJyI/w1A5iONUHXYl5ULf3kIRlyi9xrFJNeCaUr BvsuanXsJItpb99IFBitXdJ5B1qCPBMHC60z5J0/yxPsO67/F58ICqxZ+OdXR0obtLOB NpcMa7DKrDectqsL4TejPmLc+NkjyFmbwMJabPwwfnl3d7jM0jMM6xCXKiXlkvw+bKbg BAlh22tzzyhCAdOmIzVOICnCClibBcpg45MiwIXV5wKBmqvBz5NtbZFjGpXXNASWNpjy hkNKKYglbtOlxhUWKKaEU4p2rym8mawrm3Z9Wz8hjSlyrq8OqvZIHRPArTMyxrNrtMLn CMRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pZeFwsau; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z11-20020a05640235cb00b0043a4cff7e3csi978511edc.423.2022.07.13.21.38.00; Wed, 13 Jul 2022 21:38:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=pZeFwsau; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232557AbiGNEbx (ORCPT + 99 others); Thu, 14 Jul 2022 00:31:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235609AbiGNEbB (ORCPT ); Thu, 14 Jul 2022 00:31:01 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 13F17326FC; Wed, 13 Jul 2022 21:25:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8970461E51; Thu, 14 Jul 2022 04:25:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 73136C385A2; Thu, 14 Jul 2022 04:25:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1657772716; bh=GfEQxJNjjHPalvfvVNCj9R5BmsifevUz1PfOtOY//7E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pZeFwsauWXf1nKyRqjdtt9MoA7/Ryw2PbQ6C/8Nq3QCBH4cvd5Wh7hVtQs5ky4VPS cib4D+MonmxpPm5QIBf9zF5FCRYmVVQ2u1wHnG7LTory5b3m/996cY3xKmX4n2OZ0W zBuSz6+K84bHPjavlyhkH1fYxNzTVIWKmTnQys2euCWRyGBvdpSNsBYa+M4uPA6lTo 2Irq6sQczA1ZPyM24f3qo1eQTo/QIZO9fSCQIxOy/FZHfD+XJa0jrQH/4xNwf9w0Y/ qVtDZ5OKZj/bwUkqBqD8rd7tnuHpydBcaMkKU9XdzvhgK0Ay7rbzC7p0bVIcHczRpp SHT8I+8RHGNdQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Juergen Gross , Borislav Petkov , Sasha Levin , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, brijesh.singh@amd.com, ak@linux.intel.com, michael.roth@amd.com, marco@mebeim.net, thomas.lendacky@amd.com Subject: [PATCH AUTOSEL 5.15 20/28] x86: Clear .brk area at early boot Date: Thu, 14 Jul 2022 00:24:21 -0400 Message-Id: <20220714042429.281816-20-sashal@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220714042429.281816-1-sashal@kernel.org> References: <20220714042429.281816-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Juergen Gross [ Upstream commit 38fa5479b41376dc9d7f57e71c83514285a25ca0 ] The .brk section has the same properties as .bss: it is an alloc-only section and should be cleared before being used. Not doing so is especially a problem for Xen PV guests, as the hypervisor will validate page tables (check for writable page tables and hypervisor private bits) before accepting them to be used. Make sure .brk is initially zero by letting clear_bss() clear the brk area, too. Signed-off-by: Juergen Gross Signed-off-by: Borislav Petkov Link: https://lore.kernel.org/r/20220630071441.28576-3-jgross@suse.com Signed-off-by: Sasha Levin --- arch/x86/kernel/head64.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c index de01903c3735..5036104d5470 100644 --- a/arch/x86/kernel/head64.c +++ b/arch/x86/kernel/head64.c @@ -418,6 +418,8 @@ static void __init clear_bss(void) { memset(__bss_start, 0, (unsigned long) __bss_stop - (unsigned long) __bss_start); + memset(__brk_base, 0, + (unsigned long) __brk_limit - (unsigned long) __brk_base); } static unsigned long get_cmd_line_ptr(void) -- 2.35.1