[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5648b7de5b0a5d0dfef3785f9582b718678c6448.1770217260.git.thomas.lendacky@amd.com>
Date: Wed, 4 Feb 2026 09:01:00 -0600
From: Tom Lendacky <thomas.lendacky@....com>
To: <linux-kernel@...r.kernel.org>, <x86@...nel.org>
CC: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>,
Borislav Petkov <bp@...en8.de>, Dave Hansen <dave.hansen@...ux.intel.com>,
<stable@...r.kernel.org>, Ard Biesheuvel <ardb@...nel.org>, Kevin Hui
<kevinhui@...a.com>
Subject: [PATCH] x86/boot/sev: Move SEV decompressor variables into the .data section
As part of the work to remove the dependency on calling into the
decompressor code (startup_64()) for a UEFI boot, a call to rmpadjust()
was removed from sev_enable() in favor of checking the value of the
snp_vmpl variable. When booting through a non-UEFI path and calling
startup_64(), the call to sev_enable() is performed before the BSS section
is zeroed. With the removal of the rmpadjust() call and the corresponding
check of the return code, the snp_vmpl variable is checked. Since the
kernel is running at VMPL0, the snp_vmpl variable will not have been set
and should be the default value of 0. However, since the call occurs
before the BSS is zeroed, the snp_vmpl variable may not actually be zero,
which will cause the guest boot to fail.
Since the decompressor relocates itself, the BSS would need to be cleared
both before and after the relocation, but this would, in effect, cause all
of the changes to BSS variables before relocation to be lost after
relocation.
Instead, move the snp_vmpl variable into the .data section so that it is
initialized and the value made safe during relocation. As a pre-caution
against future changes, move other SEV-related decompressor variables into
the .data section, too.
Fixes: 68a501d7fd82 ("x86/boot: Drop redundant RMPADJUST in SEV SVSM presence check")
Cc: stable@...r.kernel.org
Cc: Ard Biesheuvel <ardb@...nel.org>
Tested-by: Kevin Hui <kevinhui@...a.com>
Signed-off-by: Tom Lendacky <thomas.lendacky@....com>
---
arch/x86/boot/compressed/sev.c | 8 ++++----
arch/x86/boot/startup/sev-shared.c | 2 +-
2 files changed, 5 insertions(+), 5 deletions(-)
diff --git a/arch/x86/boot/compressed/sev.c b/arch/x86/boot/compressed/sev.c
index c8c1464b3a56..46b54720d91d 100644
--- a/arch/x86/boot/compressed/sev.c
+++ b/arch/x86/boot/compressed/sev.c
@@ -28,17 +28,17 @@
#include "sev.h"
static struct ghcb boot_ghcb_page __aligned(PAGE_SIZE);
-struct ghcb *boot_ghcb;
+struct ghcb *boot_ghcb __section(".data");
#undef __init
#define __init
#define __BOOT_COMPRESSED
-u8 snp_vmpl;
-u16 ghcb_version;
+u8 snp_vmpl __section(".data");
+u16 ghcb_version __section(".data");
-u64 boot_svsm_caa_pa;
+u64 boot_svsm_caa_pa __section(".data");
/* Include code for early handlers */
#include "../../boot/startup/sev-shared.c"
diff --git a/arch/x86/boot/startup/sev-shared.c b/arch/x86/boot/startup/sev-shared.c
index a0fa8bb2b945..d9ac3a929d33 100644
--- a/arch/x86/boot/startup/sev-shared.c
+++ b/arch/x86/boot/startup/sev-shared.c
@@ -31,7 +31,7 @@ static u32 cpuid_std_range_max __ro_after_init;
static u32 cpuid_hyp_range_max __ro_after_init;
static u32 cpuid_ext_range_max __ro_after_init;
-bool sev_snp_needs_sfw;
+bool sev_snp_needs_sfw __section(".data");
void __noreturn
sev_es_terminate(unsigned int set, unsigned int reason)
base-commit: 659e9d68ebea99eb9010d4f5756a3853c04dd6ce
--
2.51.1
Powered by blists - more mailing lists