Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1704118ybh; Tue, 14 Jul 2020 05:17:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwUPgSw9IY9ugKKvIszeTPlGhCHEWlH6rxddZfHS73X6LUpW2HQRBIgx6diueualwJB1M6R X-Received: by 2002:a05:6402:3138:: with SMTP id dd24mr4357040edb.118.1594729039490; Tue, 14 Jul 2020 05:17:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594729039; cv=none; d=google.com; s=arc-20160816; b=ghqbV021krvjqt6yNEu3rqpVstuNLeg7LO7n2uKGIlyVngB0HohTCYl9/dF8TcogU3 zvLkKySXRLDVAa8TNrHI8QXFzS+D1HKWQXg0mvwfsa5RWqebH522ilO94nFoXCNXO9bv /Qxv9M4K9iqrAKYs3kjnant/oFDeV678bO3Ekx4SClh2/XZiR7qGJzfaDJPHB0/0jDTi l2pkdn9oRBj3ZwXf1vVb+0cGeGvBrzWY1wfZnk4bwGGlptNivnn5WlyaGO19v2/H8lo0 rdYgk62Fg03/Vdu1Lmh6Mb87kom/lcfaCe/pPUvrYwkaKcv2befVbDcyp110AfyRDzvE Hd8g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=Fb30BDI1EyM7Wa62+tj+BSXm0sXHQo12Gp1oyobIZw8=; b=cxadJgRF5704acY0kb4hMB13puwvAREnjXzME3hj/fbzCdgKl/sMU7kyEya1oiSjtp +jMdhm/Mvdt0j7R7ibrvGcvVhpH6PyOKy3Fd5TKr8MThAd7vjUfhnqI6pT/zsEWkzdph uu4OO6JnOo+HQB1YrB49N0COEYUA6sVCuvUXWNvjJgNZXbztimoFdZgWKDrVKD6y2Oyz 4vHSElmNjgFAnSrn+RizSYX6C6JsnuYKl6m4aFIHn+HrdpipPPpxc7Sn3VP6fo8VyVh0 CkrVasfs/6czZ5qQ341XYwk9Al/RgB33WplDd/4ihQ7WLD5XELPdQRZESZkD49puIze8 8QxQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g6si11859969edl.330.2020.07.14.05.16.55; Tue, 14 Jul 2020 05:17:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728763AbgGNMP0 (ORCPT + 99 others); Tue, 14 Jul 2020 08:15:26 -0400 Received: from 8bytes.org ([81.169.241.247]:53376 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728310AbgGNMKx (ORCPT ); Tue, 14 Jul 2020 08:10:53 -0400 Received: from cap.home.8bytes.org (p5b006776.dip0.t-ipconnect.de [91.0.103.118]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (No client certificate requested) by theia.8bytes.org (Postfix) with ESMTPSA id 470F0E6D; Tue, 14 Jul 2020 14:10:51 +0200 (CEST) From: Joerg Roedel To: x86@kernel.org Cc: Joerg Roedel , Joerg Roedel , hpa@zytor.com, Andy Lutomirski , Dave Hansen , Peter Zijlstra , Jiri Slaby , Dan Williams , Tom Lendacky , Juergen Gross , Kees Cook , David Rientjes , Cfir Cohen , Erdem Aktas , Masami Hiramatsu , Mike Stunes , Sean Christopherson , Martin Radev , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: [PATCH v4 34/75] x86/head/64: Build k/head64.c with -fno-stack-protector Date: Tue, 14 Jul 2020 14:08:36 +0200 Message-Id: <20200714120917.11253-35-joro@8bytes.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200714120917.11253-1-joro@8bytes.org> References: <20200714120917.11253-1-joro@8bytes.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel The code inserted by the stack protector does not work in the early boot environment because it uses the GS segment, at least with memory encryption enabled. Make sure the early code is compiled without this feature enabled. Signed-off-by: Joerg Roedel --- arch/x86/kernel/Makefile | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile index e77261db2391..1b166b866059 100644 --- a/arch/x86/kernel/Makefile +++ b/arch/x86/kernel/Makefile @@ -39,6 +39,10 @@ ifdef CONFIG_FRAME_POINTER OBJECT_FILES_NON_STANDARD_ftrace_$(BITS).o := y endif +# make sure head64.c is built without stack protector +nostackp := $(call cc-option, -fno-stack-protector) +CFLAGS_head64.o := $(nostackp) + # If instrumentation of this dir is enabled, boot hangs during first second. # Probably could be more selective here, but note that files related to irqs, # boot, dumpstack/stacktrace, etc are either non-interesting or can lead to -- 2.27.0