|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen staging] x86/CET: Fix build following c/s 43b98e7190
commit b586a81b7a90d424b54275c79e759b0294aa2fb6
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
AuthorDate: Sat May 30 01:41:26 2020 +0100
Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CommitDate: Sat May 30 01:56:01 2020 +0100
x86/CET: Fix build following c/s 43b98e7190
OSSTest reports:
x86_64.S: Assembler messages:
x86_64.S:57: Error: no such instruction: `setssbsy'
/home/osstest/build.150510.build-amd64/xen/xen/Rules.mk:183: recipe for
target 'head.o' failed
make[4]: Leaving directory
'/home/osstest/build.150510.build-amd64/xen/xen/arch/x86/boot'
make[4]: *** [head.o] Error 1
All use of CET instructions, even those inside alternative blocks, needs to
be
behind CONFIG_XEN_SHSTK, as it indicates suitable toolchain support.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
xen/arch/x86/boot/x86_64.S | 3 ++-
xen/arch/x86/setup.c | 2 +-
xen/arch/x86/x86_64/compat/entry.S | 2 ++
xen/arch/x86/x86_64/entry.S | 8 ++++++++
4 files changed, 13 insertions(+), 2 deletions(-)
diff --git a/xen/arch/x86/boot/x86_64.S b/xen/arch/x86/boot/x86_64.S
index 551acd9e94..d61048c583 100644
--- a/xen/arch/x86/boot/x86_64.S
+++ b/xen/arch/x86/boot/x86_64.S
@@ -31,7 +31,7 @@ ENTRY(__high_start)
jz .L_bsp
/* APs. Set up shadow stacks before entering C. */
-
+#ifdef CONFIG_XEN_SHSTK
testl $cpufeat_mask(X86_FEATURE_XEN_SHSTK), \
CPUINFO_FEATURE_OFFSET(X86_FEATURE_XEN_SHSTK) +
boot_cpu_data(%rip)
je .L_ap_shstk_done
@@ -55,6 +55,7 @@ ENTRY(__high_start)
mov $XEN_MINIMAL_CR4 | X86_CR4_CET, %ecx
mov %rcx, %cr4
setssbsy
+#endif
.L_ap_shstk_done:
call start_secondary
diff --git a/xen/arch/x86/setup.c b/xen/arch/x86/setup.c
index 665274674d..2aa1cd50b8 100644
--- a/xen/arch/x86/setup.c
+++ b/xen/arch/x86/setup.c
@@ -664,7 +664,7 @@ static void __init noreturn reinit_bsp_stack(void)
stack_base[0] = stack;
memguard_guard_stack(stack);
- if ( cpu_has_xen_shstk )
+ if ( IS_ENABLED(CONFIG_XEN_SHSTK) && cpu_has_xen_shstk )
{
wrmsrl(MSR_PL0_SSP,
(unsigned long)stack + (PRIMARY_SHSTK_SLOT + 1) * PAGE_SIZE -
8);
diff --git a/xen/arch/x86/x86_64/compat/entry.S
b/xen/arch/x86/x86_64/compat/entry.S
index 2ca81341a4..c3e62f8734 100644
--- a/xen/arch/x86/x86_64/compat/entry.S
+++ b/xen/arch/x86/x86_64/compat/entry.S
@@ -198,7 +198,9 @@ ENTRY(cr4_pv32_restore)
/* See lstar_enter for entry register state. */
ENTRY(cstar_enter)
+#ifdef CONFIG_XEN_SHSTK
ALTERNATIVE "", "setssbsy", X86_FEATURE_XEN_SHSTK
+#endif
/* sti could live here when we don't switch page tables below. */
CR4_PV32_RESTORE
movq 8(%rsp),%rax /* Restore %rax. */
diff --git a/xen/arch/x86/x86_64/entry.S b/xen/arch/x86/x86_64/entry.S
index 6470266d2f..8b57a00040 100644
--- a/xen/arch/x86/x86_64/entry.S
+++ b/xen/arch/x86/x86_64/entry.S
@@ -193,12 +193,14 @@ restore_all_guest:
cmpl $1,%ecx
ja .Lrestore_rcx_iret_exit_to_guest
+#ifdef CONFIG_XEN_SHSTK
/* Clear the supervisor shadow stack token busy bit. */
.macro rag_clrssbsy
rdsspq %rcx
clrssbsy (%rcx)
.endm
ALTERNATIVE "", rag_clrssbsy, X86_FEATURE_XEN_SHSTK
+#endif
movq 8(%rsp), %rcx # RIP
cmpw $FLAT_USER_CS32,16(%rsp)# CS
@@ -235,7 +237,9 @@ iret_exit_to_guest:
* %ss must be saved into the space left by the trampoline.
*/
ENTRY(lstar_enter)
+#ifdef CONFIG_XEN_SHSTK
ALTERNATIVE "", "setssbsy", X86_FEATURE_XEN_SHSTK
+#endif
/* sti could live here when we don't switch page tables below. */
movq 8(%rsp),%rax /* Restore %rax. */
movq $FLAT_KERNEL_SS,8(%rsp)
@@ -269,7 +273,9 @@ ENTRY(lstar_enter)
jmp test_all_events
ENTRY(sysenter_entry)
+#ifdef CONFIG_XEN_SHSTK
ALTERNATIVE "", "setssbsy", X86_FEATURE_XEN_SHSTK
+#endif
/* sti could live here when we don't switch page tables below. */
pushq $FLAT_USER_SS
pushq $0
@@ -889,6 +895,7 @@ handle_ist_exception:
movq %rdi,%rsp
rep movsq
+#ifdef CONFIG_XEN_SHSTK
/* Switch Shadow Stacks */
.macro ist_switch_shstk
rdsspq %rdi
@@ -909,6 +916,7 @@ handle_ist_exception:
setssbsy
.endm
ALTERNATIVE "", ist_switch_shstk, X86_FEATURE_XEN_SHSTK
+#endif
1:
#else
ASSERT_CONTEXT_IS_XEN
--
generated by git-patchbot for /home/xen/git/xen.git#staging
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |