Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp2607795lqp; Mon, 25 Mar 2024 04:23:22 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUaHy5SdR9pKljbTvRivV9229TfIvgL36CBsM0oqkFq5A/GUFxfMcD652u9n6kUD2m05uHOtM0drkCHNiINeCGsahSOfSd/LRnst424eA== X-Google-Smtp-Source: AGHT+IERXKHsxjljryhPzj2Cb0Pnnc1CcTOq5g5D9GaSbK2sTb8UhqExNL8JtZ3gbLcoq3vzlVTe X-Received: by 2002:ac8:7f44:0:b0:431:5135:6707 with SMTP id g4-20020ac87f44000000b0043151356707mr3674108qtk.40.1711365802251; Mon, 25 Mar 2024 04:23:22 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711365802; cv=pass; d=google.com; s=arc-20160816; b=UaKqDPDcCBqxSEz6t6Cf2WIgvcV8pCVSccAyYYSJwsPF0aq6gf3cSGIJCaqot48oK2 zFT1Tk/KflQI1Ncd5/1khCVk78hidtqBVIBQKvNX8CuEfvYhk+T0pE1tc50LgBtu3gzU YOZGDhe6qcnp5piY0R5OFeGejUSBg0XpMR3H3daM/wKUW0TAjpbwCzTA1XaGiB6LgW1g HtQ/z9x9Qk1mwNruNGydvohKxlbJpS7apAHo4Qe+9ntTD1qITLMlOMlf+arlvAsPFMv5 aIVPgIz7XWqAxXGn8jch+SF9hzcSu4r5DSfy4QDIpEknDuIKjv/C8a9R9qSSpqbxqTmO rybQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=vzCWYklJgpcLSDsngARW6J62ukRLRxI/j6v6Uvln+B0=; fh=YXWSN/A5vUlFtKuow0lW0LY8qh75c1gTTkNTORX4klY=; b=rhUpfom4dTn/Bx/XjvSylAot7HM0MFvolCBKojBbgYwEn5JRsHWFw8JpCPh636EqnR T4InrfSTN34a+XxKEde0B3MLA1kWGsmbvz57cOamyj84i9E3Vev+QWTQLBOE8i7Wf8VV GesxpdvIOYphxBJdZegzYydGMzEKP+h6+Cm6BEHnSq0dk0alEQPQxd5ouhSkpmrzAXId KmfoKVDPe4cAzF0voQDYzbrweBAhfeijH3WvSC3GZdJ7+N1BVQ3TleiTSbeT3GqImr6y Tutcf8NNQfaPWRSOJbhYDgD1lGkcB6wLyy5rU70lYkhnGgMYHcXz/z8hgZiOACWaShgN 4cVw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="b6Q/VYCg"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-115586-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-115586-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id c9-20020ac87dc9000000b004315fa939d3si739724qte.264.2024.03.25.04.23.22 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Mar 2024 04:23:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-115586-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="b6Q/VYCg"; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-115586-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-115586-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id F36081C34779 for ; Mon, 25 Mar 2024 11:23:21 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F3630342D55; Mon, 25 Mar 2024 02:44:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="b6Q/VYCg" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 82E571F4170; Sun, 24 Mar 2024 22:59:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321150; cv=none; b=aGhY38dtH75H1DOJsgGfWZrcCkTkU3UwPSo86EPCEyA6xGhV1MaccpqqEgjwD3+JO3zciez7MVtbcDx3qZhqIqRhffzcObtICbekl2CFpEabG7tFpkLzxCdlkj0gP4zcpaI30C9jOMsvXRdduGUuTVJMhVX9d1EJs8o64rJR++c= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321150; c=relaxed/simple; bh=B1d+cpeaseJ9PKr34K6i49gWQpYLzfuoLU2uD9m2fMs=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=WPNNi++iUbW0cVameaoftMLXNK3TIHDKv7E3/npJcKCOrE7pCDNfvvcjUUvYYpF5HjZjvMMDZ9pmIYk3tRqbSRRHo/CxElyHSkrhT+bYTtEqBFdA6dxFEjV3dpLm0ZRcMqLerun/beQRj5L57gk8Q1C1cu4ihLN8hVXgP8sKvU8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=b6Q/VYCg; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id D630AC433F1; Sun, 24 Mar 2024 22:59:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711321150; bh=B1d+cpeaseJ9PKr34K6i49gWQpYLzfuoLU2uD9m2fMs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=b6Q/VYCgOjssQ66ZtsX1vuMUFJ8mKgunAjf5u6IhTFj5BcAzF3GFZyBWb6EYOglXY 2tZ9gZFvwaaFoJsJurHgzT5xdKMt1luCrK1U5jSxBWZhTIl+AP9uVGUdd54d2UMGyQ KAnlbSd+HQWNsVPXZllbR45muFLG9B4nFnyv835kTGusFguBQCW6AwNWNBCM7i/m1J iZ4ko17LLmYi3MD96QnNX+MVGFu7qzZgY5zDqHYxo/qkGQmfCS7pZO5VolaCLvTHCT 8DTnmtz2CpBWdKA6kIgZuxu3KSg2SukKys5v5uKYf6cOsva4biHBPYt7N82Tvrjig2 FhGFYNdgIkPMA== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Ard Biesheuvel , Sasha Levin Subject: [PATCH 6.7 712/713] x86/efistub: Don't clear BSS twice in mixed mode Date: Sun, 24 Mar 2024 18:47:18 -0400 Message-ID: <20240324224720.1345309-713-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240324224720.1345309-1-sashal@kernel.org> References: <20240324224720.1345309-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit From: Ard Biesheuvel [ Upstream commit df7ecce842b846a04d087ba85fdb79a90e26a1b0 ] Clearing BSS should only be done once, at the very beginning. efi_pe_entry() is the entrypoint from the firmware, which may not clear BSS and so it is done explicitly. However, efi_pe_entry() is also used as an entrypoint by the mixed mode startup code, in which case BSS will already have been cleared, and doing it again at this point will corrupt global variables holding the firmware's GDT/IDT and segment selectors. So make the memset() conditional on whether the EFI stub is running in native mode. Fixes: b3810c5a2cc4a666 ("x86/efistub: Clear decompressor BSS in native EFI entrypoint") Signed-off-by: Ard Biesheuvel Signed-off-by: Sasha Levin --- drivers/firmware/efi/libstub/x86-stub.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/firmware/efi/libstub/x86-stub.c b/drivers/firmware/efi/libstub/x86-stub.c index 681f576ec02a0..c9857ee3880c2 100644 --- a/drivers/firmware/efi/libstub/x86-stub.c +++ b/drivers/firmware/efi/libstub/x86-stub.c @@ -467,7 +467,8 @@ efi_status_t __efiapi efi_pe_entry(efi_handle_t handle, efi_status_t status; char *cmdline_ptr; - memset(_bss, 0, _ebss - _bss); + if (efi_is_native()) + memset(_bss, 0, _ebss - _bss); efi_system_table = sys_table_arg; -- 2.43.0