Message ID | 20171004212003.28296-13-thgarnie@google.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show
Return-Path: <xen-devel-bounces@lists.xen.org> Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id B919460586 for <patchwork-xen-devel@patchwork.kernel.org>; Wed, 4 Oct 2017 21:23:27 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A9C4E28C2C for <patchwork-xen-devel@patchwork.kernel.org>; Wed, 4 Oct 2017 21:23:27 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 9DADA28C2F; Wed, 4 Oct 2017 21:23:27 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=2.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, RCVD_IN_DNSWL_MED, RCVD_IN_SORBS_SPAM, T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 4802028C2C for <patchwork-xen-devel@patchwork.kernel.org>; Wed, 4 Oct 2017 21:23:27 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from <xen-devel-bounces@lists.xen.org>) id 1dzr6P-0002wO-8d; Wed, 04 Oct 2017 21:21:13 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from <thgarnie@google.com>) id 1dzr6N-0002tk-FX for xen-devel@lists.xenproject.org; Wed, 04 Oct 2017 21:21:11 +0000 Received: from [193.109.254.147] by server-3.bemta-6.messagelabs.com id 53/D1-03093-6C055D95; Wed, 04 Oct 2017 21:21:10 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrJIsWRWlGSWpSXmKPExsVyMfTAJt2jAVc jDR4f0Lf4vmUykwOjx+EPV1gCGKNYM/OS8isSWDN+fK4ueMNT8X/DZ8YGxuncXYxcHEICMxgl Hl2eygbisAi8YpFYdekNI4gjIdDPKjHp5iSmLkZOICdL4ua6w1B2msSUf4vZIewKiRvHT7GC2 EICShJbNyxlhhj7l1Hi9+UHjCAJNgEtiT0N85lAEiICs0Qkbr3uAdvHLHCGSeJ430mwdmEBF4 kNl/6DjWURUJU4/mMP2DpeAUuJO2cns0GsM5F4eOQaWD0nUPzIiTfMEKstJFrP3GeawCi4gJF hFaN6cWpRWWqRrqVeUlFmekZJbmJmjq6hgZlebmpxcWJ6ak5iUrFecn7uJkZg0DEAwQ7Gu5sC DjFKcjApifJu8r0aKcSXlJ9SmZFYnBFfVJqTWnyIUYaDQ0mClxMYxEKCRanpqRVpmTnA8IdJS 3DwKInw8oOkeYsLEnOLM9MhUqcYLTku3Ln0h4njwJ5bQLLj5t0/TEIsefl5qVLivE4gDQIgDR mleXDjYDF6iVFWSpiXEehAIZ6C1KLczBJU+VeM4hyMSsK8siBTeDLzSuC2vgI6iAnooDlNV0A OKklESEk1MIbUpZc0Zff4bvWWePn9YoBM/rLX19I6ufXefhb/k2h8er7kFvv7XCtbP+l+nFIy w6c0fnYR/zSd6MBndzKa9Hp0pgkL7visphO088eSpTeq37lx/FvSHfv6UO/pTpcZ706HPHG6q NH3OCEhVePkplvSqVv2/P9SeDijunHHY/6pefv0nV/fLFViKc5INNRiLipOBACQKjcOzAIAAA == X-Env-Sender: thgarnie@google.com X-Msg-Ref: server-8.tower-27.messagelabs.com!1507152068!109061371!1 X-Originating-IP: [209.85.192.178] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.45; banners=-,-,- X-VirusChecked: Checked Received: (qmail 53465 invoked from network); 4 Oct 2017 21:21:09 -0000 Received: from mail-pf0-f178.google.com (HELO mail-pf0-f178.google.com) (209.85.192.178) by server-8.tower-27.messagelabs.com with AES128-GCM-SHA256 encrypted SMTP; 4 Oct 2017 21:21:09 -0000 Received: by mail-pf0-f178.google.com with SMTP id n14so4998319pfh.8 for <xen-devel@lists.xenproject.org>; Wed, 04 Oct 2017 14:21:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=5umbMOlyCePbbR9sdmAfkJ4s8+iLpUm9XYg0uxqOLT4=; b=OjsFFQ7rHut+PRzjGzufehHD8sERsudmgEbW6ZJAG1SMiKWjHiHpRL8RVhR/sdOGAT AiAUXS4QTnMM89nRSFRYVu5WKfR7PB5EaWNFmwNMSUIt2/Fc4dSJnYmPWFSpqs7FThMT v+ZlHnO3uC+4V3nS3aUOIeoB5JjG2FyLqSdUn/Z1NbmP3DS1zfsZFyGSctESbGVVCtPZ ydNty8/9Ie29Ty6ciep2W/SfLz7CQpBv0TWmOgrZhNgNHpQOte1WMq4qXXTREpMGgzM3 Ce0EGjBSlaUlk+jiaca29DlEIXzFshyTOevdeV5ciTKJSHK1R7n+Lp9CAx174nUEGkOS xvBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=5umbMOlyCePbbR9sdmAfkJ4s8+iLpUm9XYg0uxqOLT4=; b=VnQ11aFYxCzFwx9geiG1tn5iNB3TRK1SJ4GQcOG+Q81qskFhPgJY84tD7IevQg1aIH b6EFg+Uh8aGZF22hDdtHWW1ag6dcr0K8YqjWmm2Nnw/qOQZCHZ7Ox2/BPPwoaCtQChGB UA4CtXzICt9AOo4/yEfFgLkbGKDheFjbpqUmATX8bD5Bkm6Npjsr/SXqYQD/O/BG8vRX iJ0WzHJmcJRJEaDBsWAX+xLM4YTod0T4YKTk6+uxSK6+KqF6uKuMrHTVbFYuh94m0gMw jHMOS0bbQMFxk1mm71klZlRFEOIyj2MZISmxQNVUBOAlNIuFBO6dZTlmJ3BcZr2Caz37 da0g== X-Gm-Message-State: AHPjjUhBL48q/cXWjqX1LgRiQHYVG3K9x3RBK/NWFtxC1Dk0M+61dnau 2GqOqBTtfiuD80oscKolkmquBg== X-Google-Smtp-Source: AOwi7QBLF36ymEhhXWE59gX4j4MryDXcOTRLQTuP+U9xDezgzhkK+50LMNAYAdDbgbL5tR7fCMgSwQ== X-Received: by 10.84.254.70 with SMTP id a6mr20684658pln.71.1507152066893; Wed, 04 Oct 2017 14:21:06 -0700 (PDT) Received: from skynet.sea.corp.google.com ([172.31.92.33]) by smtp.gmail.com with ESMTPSA id s68sm30204019pfd.72.2017.10.04.14.21.05 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 04 Oct 2017 14:21:05 -0700 (PDT) From: Thomas Garnier <thgarnie@google.com> To: Herbert Xu <herbert@gondor.apana.org.au>, "David S . Miller" <davem@davemloft.net>, Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>, "H . Peter Anvin" <hpa@zytor.com>, Peter Zijlstra <peterz@infradead.org>, Josh Poimboeuf <jpoimboe@redhat.com>, Thomas Garnier <thgarnie@google.com>, Arnd Bergmann <arnd@arndb.de>, Kees Cook <keescook@chromium.org>, Matthias Kaehlcke <mka@chromium.org>, Tom Lendacky <thomas.lendacky@amd.com>, Andy Lutomirski <luto@kernel.org>, "Kirill A . Shutemov" <kirill.shutemov@linux.intel.com>, Borislav Petkov <bp@suse.de>, "Rafael J . Wysocki" <rjw@rjwysocki.net>, Len Brown <len.brown@intel.com>, Pavel Machek <pavel@ucw.cz>, Juergen Gross <jgross@suse.com>, Chris Wright <chrisw@sous-sol.org>, Alok Kataria <akataria@vmware.com>, Rusty Russell <rusty@rustcorp.com.au>, Tejun Heo <tj@kernel.org>, Christoph Lameter <cl@linux.com>, Boris Ostrovsky <boris.ostrovsky@oracle.com>, Alexey Dobriyan <adobriyan@gmail.com>, Andrew Morton <akpm@linux-foundation.org>, Paul Gortmaker <paul.gortmaker@windriver.com>, Chris Metcalf <cmetcalf@mellanox.com>, "Paul E . McKenney" <paulmck@linux.vnet.ibm.com>, Nicolas Pitre <nicolas.pitre@linaro.org>, Borislav Petkov <bp@alien8.de>, "Luis R . Rodriguez" <mcgrof@kernel.org>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, Christopher Li <sparse@chrisli.org>, Steven Rostedt <rostedt@goodmis.org>, Jason Baron <jbaron@akamai.com>, Dou Liyang <douly.fnst@cn.fujitsu.com>, "Rafael J . Wysocki" <rafael.j.wysocki@intel.com>, Mika Westerberg <mika.westerberg@linux.intel.com>, Lukas Wunner <lukas@wunner.de>, Masahiro Yamada <yamada.masahiro@socionext.com>, Alexei Starovoitov <ast@kernel.org>, Daniel Borkmann <daniel@iogearbox.net>, Markus Trippelsdorf <markus@trippelsdorf.de>, Paolo Bonzini <pbonzini@redhat.com>, =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= <rkrcmar@redhat.com>, Joerg Roedel <joro@8bytes.org>, Rik van Riel <riel@redhat.com>, David Howells <dhowells@redhat.com>, Ard Biesheuvel <ard.biesheuvel@linaro.org>, Waiman Long <longman@redhat.com>, Kyle Huey <me@kylehuey.com>, Andrey Ryabinin <aryabinin@virtuozzo.com>, Jonathan Corbet <corbet@lwn.net>, Matthew Wilcox <mawilcox@microsoft.com>, Michal Hocko <mhocko@suse.com>, Peter Foley <pefoley2@pefoley.com>, Paul Bolle <pebolle@tiscali.nl>, Jiri Kosina <jkosina@suse.cz>, Rob Landley <rob@landley.net>, "H . J . Lu" <hjl.tools@gmail.com>, Baoquan He <bhe@redhat.com>, =?UTF-8?q?Jan=20H=20=2E=20Sch=C3=B6nherr?= <jschoenh@amazon.de>, Daniel Micay <danielmicay@gmail.com> Date: Wed, 4 Oct 2017 14:19:48 -0700 Message-Id: <20171004212003.28296-13-thgarnie@google.com> X-Mailer: git-send-email 2.14.2.920.gcf0c67979c-goog In-Reply-To: <20171004212003.28296-1-thgarnie@google.com> References: <20171004212003.28296-1-thgarnie@google.com> Cc: linux-arch@vger.kernel.org, kvm@vger.kernel.org, linux-pm@vger.kernel.org, x86@kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-sparse@vger.kernel.org, linux-crypto@vger.kernel.org, kernel-hardening@lists.openwall.com, xen-devel@lists.xenproject.org Subject: [Xen-devel] [RFC v3 12/27] x86/paravirt: Adapt assembly for PIE support X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion <xen-devel.lists.xen.org> List-Unsubscribe: <https://lists.xen.org/cgi-bin/mailman/options/xen-devel>, <mailto:xen-devel-request@lists.xen.org?subject=unsubscribe> List-Post: <mailto:xen-devel@lists.xen.org> List-Help: <mailto:xen-devel-request@lists.xen.org?subject=help> List-Subscribe: <https://lists.xen.org/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xen.org?subject=subscribe> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" <xen-devel-bounces@lists.xen.org> X-Virus-Scanned: ClamAV using ClamSMTP |
diff --git a/arch/x86/include/asm/paravirt_types.h b/arch/x86/include/asm/paravirt_types.h index 280d94c36dad..e6961f8a74aa 100644 --- a/arch/x86/include/asm/paravirt_types.h +++ b/arch/x86/include/asm/paravirt_types.h @@ -335,9 +335,17 @@ extern struct pv_lock_ops pv_lock_ops; #define PARAVIRT_PATCH(x) \ (offsetof(struct paravirt_patch_template, x) / sizeof(void *)) +#ifdef CONFIG_X86_PIE +#define paravirt_opptr_call "a" +#define paravirt_opptr_type "p" +#else +#define paravirt_opptr_call "c" +#define paravirt_opptr_type "i" +#endif + #define paravirt_type(op) \ [paravirt_typenum] "i" (PARAVIRT_PATCH(op)), \ - [paravirt_opptr] "i" (&(op)) + [paravirt_opptr] paravirt_opptr_type (&(op)) #define paravirt_clobber(clobber) \ [paravirt_clobber] "i" (clobber) @@ -391,7 +399,7 @@ int paravirt_disable_iospace(void); * offset into the paravirt_patch_template structure, and can therefore be * freely converted back into a structure offset. */ -#define PARAVIRT_CALL "call *%c[paravirt_opptr];" +#define PARAVIRT_CALL "call *%" paravirt_opptr_call "[paravirt_opptr];" /* * These macros are intended to wrap calls through one of the paravirt
if PIE is enabled, switch the paravirt assembly constraints to be compatible. The %c/i constrains generate smaller code so is kept by default. Position Independent Executable (PIE) support will allow to extended the KASLR randomization range below the -2G memory limit. Signed-off-by: Thomas Garnier <thgarnie@google.com> --- arch/x86/include/asm/paravirt_types.h | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-)