From: Jan Beulich Subject: x86: re-run exception-from-stub recovery selftests with CET-SS enabled On the BSP, shadow stacks are enabled only relatively late in the booting process. They in particular aren't active yet when initcalls are run. Keep the testing there, but invoke that testing a 2nd time when shadow stacks are active, to make sure we won't regress that case after addressing XSA-451. While touching this code, switch the guard from NDEBUG to CONFIG_DEBUG, such that IS_ENABLED() can validly be used at the new call site. Signed-off-by: Jan Beulich Acked-by: Andrew Cooper --- a/xen/arch/x86/extable.c +++ b/xen/arch/x86/extable.c @@ -144,10 +144,11 @@ search_exception_table(const struct cpu_ return 0; } -#ifndef NDEBUG +#ifdef CONFIG_DEBUG +#include #include -static int __init cf_check stub_selftest(void) +int __init cf_check stub_selftest(void) { static const struct { uint8_t opc[8]; @@ -171,7 +172,8 @@ static int __init cf_check stub_selftest unsigned int i; bool fail = false; - printk("Running stub recovery selftests...\n"); + printk("%s stub recovery selftests...\n", + system_state < SYS_STATE_active ? "Running" : "Re-running"); for ( i = 0; i < ARRAY_SIZE(tests); ++i ) { --- a/xen/arch/x86/include/asm/setup.h +++ b/xen/arch/x86/include/asm/setup.h @@ -38,6 +38,8 @@ void *bootstrap_map(const module_t *mod) int remove_xen_ranges(struct rangeset *r); +int cf_check stub_selftest(void); + extern uint8_t kbd_shift_flags; #ifdef NDEBUG --- a/xen/arch/x86/setup.c +++ b/xen/arch/x86/setup.c @@ -740,6 +740,10 @@ static void noreturn init_done(void) system_state = SYS_STATE_active; + /* Re-run stub recovery self-tests with CET-SS active. */ + if ( IS_ENABLED(CONFIG_DEBUG) && cpu_has_xen_shstk ) + stub_selftest(); + domain_unpause_by_systemcontroller(dom0); /* MUST be done prior to removing .init data. */