Received: by 10.223.176.5 with SMTP id f5csp2668610wra; Thu, 1 Feb 2018 04:16:59 -0800 (PST) X-Google-Smtp-Source: AH8x227OesJ65XB4zym7MSMCKT/U+OPrvNEsA0/m3XuMtPaTRd9VWzVCBhtxGzZeGerQPOU5bOIY X-Received: by 10.101.81.197 with SMTP id i5mr29273407pgq.220.1517487418902; Thu, 01 Feb 2018 04:16:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517487418; cv=none; d=google.com; s=arc-20160816; b=WS66QstHbgmSvusdEUIf9Jnxn55oL0SPqIKCmpWl+bFt5B636wWHMZoQO3YknkruO5 YBZW/OvjUmLH5tYLvvwaKtElAKnYMaAGiSWw6hvN/pSb7aCWgceE1lAF5pROJiMGTBUO fcEmX+yWoyq5f/Y4cQKSXWkOLYdpmfTrHVmZJESkui2j+Mye+pj+eruiloWsNTcC9Yls grUCjNTq80ALY1ZsJQCWCKHNPZaf++26KbzArWF8rINEtHcL30PumvzHiY/c1k2LhDr3 3igN/+qD1641wdOM1oAUh88/i58qBJomi6m1u1W/WMh9VBSD0vVRQFvZSh/Dii4VmSs4 H7vA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=1bDfXvbrmkkcPVrOyNqklmDrV5/kUBiauoDA1CpEVoc=; b=OMXoXulZuAsoR8PyMd9hIvCKv7WkxfEti3fPvsY/ZibxGGUsLHde9bv4QvtkmmdZmq D5foa6vWta2V8h9Yfy3131SRsS2kJO2yo0toY7kbcIpc2voV51fhWDuyDsVQEcEsR0k3 d2o6yE9ZlpV23kya798KCHjyYPFe2EaNMI7aA1uZYqxYt8AHLAw2IIZFoDWzGVPMY3ZJ ht+y4ejP0GNPULN5qqyUpjeagRhIf6zXmwuALaYmgSgj7/38puAkoBXmVqezvAY9M6Kn jPLh5Gocib2zw8TYifgClXnvZxDSv49iWqEn9WzXQH/InmFRPvoXuAQwa7vb/cjM/bH+ YWqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 12si806411pfh.0.2018.02.01.04.16.44; Thu, 01 Feb 2018 04:16:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752382AbeBAMQG (ORCPT + 99 others); Thu, 1 Feb 2018 07:16:06 -0500 Received: from mx2.suse.de ([195.135.220.15]:32971 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751949AbeBAMQF (ORCPT ); Thu, 1 Feb 2018 07:16:05 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 2A09CAAC8; Thu, 1 Feb 2018 12:16:04 +0000 (UTC) From: Juergen Gross To: linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org Cc: boris.ostrovsky@oracle.com, Juergen Gross , stable@vger.kernel.org Subject: [PATCH] x86/xen: init %gs very early to avoid page faults with stack protector Date: Thu, 1 Feb 2018 13:16:01 +0100 Message-Id: <20180201121601.1268-1-jgross@suse.com> X-Mailer: git-send-email 2.13.6 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When running as Xen pv guest %gs is initialized some time after C code is started. Depending on stack protector usage this might be too late, resulting in page faults. So setup %gs and MSR_GS_BASE in assembly code already. Cc: stable@vger.kernel.org Signed-off-by: Juergen Gross --- arch/x86/xen/xen-head.S | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/arch/x86/xen/xen-head.S b/arch/x86/xen/xen-head.S index 497cc55a0c16..b47d87076efb 100644 --- a/arch/x86/xen/xen-head.S +++ b/arch/x86/xen/xen-head.S @@ -9,7 +9,9 @@ #include #include +#include #include +#include #include #include @@ -35,6 +37,18 @@ ENTRY(startup_xen) mov %_ASM_SI, xen_start_info mov $init_thread_union+THREAD_SIZE, %_ASM_SP + /* Set up %gs. + * + * The base of %gs always points to the bottom of the irqstack + * union. If the stack protector canary is enabled, it is + * located at %gs:40. Note that, on SMP, the boot cpu uses + * init data section till per cpu areas are set up. + */ + movl $MSR_GS_BASE,%ecx + movq $INIT_PER_CPU_VAR(irq_stack_union),%rax + cdq + wrmsr + jmp xen_start_kernel END(startup_xen) __FINIT -- 2.13.6