Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp1476115pxu; Thu, 8 Oct 2020 12:24:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyl0nR19RF0u32ORw3fKIxnltU9jWCLI1rFscGw28fzb393U7dQLTRwfyyxc3FvFvN6lae8 X-Received: by 2002:a17:906:53d6:: with SMTP id p22mr10252529ejo.517.1602185070003; Thu, 08 Oct 2020 12:24:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602185069; cv=none; d=google.com; s=arc-20160816; b=cKECkkL+p+Sm6SAO31CTjM0RpqbnUTiOrjU1VZjjBCFzic6Ei+eSZFx7pIndwcV5Pp NUUMaLP84YK2Uqo4JM5Y9Vc6G0lolmzSj3GRh295udQG9G0osGyoNQeYA048J5tiiaix nvLuZSKFtgv5ZE8+CPE6Pg0IcKI90yZCX9LrC5m9miW8J9fPVC8ElZa0NE1jtqFq2Aj6 wkLFQNqF2yDd5bisPNvMDd+QnQ3DHqNfAN+iHpJXQMlTkaJXN5/r4N+uzP7i0DbAj6SV T6PIFvBLESMTajaTjPPD0ubTmD7P4XXCyqEp76nKAQGNxjlgjyG3PIdo2kBUQGLfbRQK 1pkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=VWZPrk2HAzOluyH/d6XXY+zNuc54KSPlwvPVs4xhysM=; b=N9AuOp7Nkru3egLD459LzwBkFrXVFYTMOBlwEVXerwHBjrt9HrIuOEcuz0yPnw/HBG N3B+XfS8jamgZffZDhVfK8VlKSPS8soNd1Fwlz7aFb6xsxYXc/BHQBrlo9ZDYBfr6YVG Qp8SV8OsSg705DNTeqHefAXLTZR979jJa//3H6EGiPcgkPturaVEm+0rynsFrjHjyxHF vZ1Axf9R95YHNQR2x248Jiu79hBnXL3CeDC2qiHUDFicaoRY9nc7vJgquKIsL6fiNW63 PTp5D0z0VzD5i8xVeyhdzL8So31mjNTRLTa0fEs8RMh7mAZE0x6jKknqGpPlPFV6xu+4 TDZw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qn3si4476755ejb.655.2020.10.08.12.24.06; Thu, 08 Oct 2020 12:24:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729866AbgJHTQn (ORCPT + 99 others); Thu, 8 Oct 2020 15:16:43 -0400 Received: from mail-qv1-f66.google.com ([209.85.219.66]:42339 "EHLO mail-qv1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728487AbgJHTQb (ORCPT ); Thu, 8 Oct 2020 15:16:31 -0400 Received: by mail-qv1-f66.google.com with SMTP id 13so3609191qvc.9 for ; Thu, 08 Oct 2020 12:16:30 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=VWZPrk2HAzOluyH/d6XXY+zNuc54KSPlwvPVs4xhysM=; b=AUAfPQ2poBXfrtmeTkm/Yqs0djhLbk9831eGwB0OR7ydZJZwtAnTMGRMLcJw+3k8g3 uW5ohXc6g9WW+0gsSYGyL68N0bp8BskrONIpJdfVjsNO6IeMdoy2ldK4AOeAXRoMKp11 xYr8wrlalBuCj24+/RQxez5wNCrjjA0nLnaZwifStfg7qVu8zD8uLxR9ZsZp+d7g7IHc qE+4h+iYBxRfMVgqeeqj6wNRli7c4Nbl70eS0JURwLfXX9OPoMsbdDfRbgCSX15m8FZB L6Q4VidFR6KMrh95LloLA0OXjgluLV0k+HjKZSayfO4A50GkvISULA5mmh2e5d/tDQtS DlmA== X-Gm-Message-State: AOAM530PHQWY7byb2savho2CKXvY+J9ZN00ZJNH9MR6N/u/sLoCFrp38 PT4v4+U/GG2tX4pBzKJ5qmU= X-Received: by 2002:a0c:e054:: with SMTP id y20mr9822120qvk.30.1602184590083; Thu, 08 Oct 2020 12:16:30 -0700 (PDT) Received: from rani.riverdale.lan ([2001:470:1f07:5f3::b55f]) by smtp.gmail.com with ESMTPSA id z37sm4726759qtz.67.2020.10.08.12.16.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 08 Oct 2020 12:16:29 -0700 (PDT) From: Arvind Sankar To: x86@kernel.org, Joerg Roedel , Borislav Petkov Cc: linux-kernel@vger.kernel.org Subject: [PATCH v2 5/5] x86/head/64: Disable stack protection for head$(BITS).o Date: Thu, 8 Oct 2020 15:16:23 -0400 Message-Id: <20201008191623.2881677-6-nivedita@alum.mit.edu> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20201008191623.2881677-1-nivedita@alum.mit.edu> References: <20201008191623.2881677-1-nivedita@alum.mit.edu> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 64-bit, the startup_64_setup_env() function added in 866b556efa12 ("x86/head/64: Install startup GDT") has stack protection enabled because of set_bringup_idt_handler(). At this point, %gs is not yet initialized, and this doesn't cause a crash only because the #PF handler from the decompressor stub is still installed and handles the page fault. Disable stack protection for the whole file, and do it on 32-bit as well to avoid surprises. Signed-off-by: Arvind Sankar --- arch/x86/kernel/Makefile | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile index 04ceea8f4a89..68608bd892c0 100644 --- a/arch/x86/kernel/Makefile +++ b/arch/x86/kernel/Makefile @@ -47,6 +47,8 @@ endif # non-deterministic coverage. KCOV_INSTRUMENT := n +CFLAGS_head$(BITS).o += -fno-stack-protector + CFLAGS_irq.o := -I $(srctree)/$(src)/../include/asm/trace obj-y := process_$(BITS).o signal.o -- 2.26.2