x86/cet: Check CPU_FEATURE_ACTIVE when CET is disabled
authorH.J. Lu <hjl.tools@gmail.com>
Fri, 10 Mar 2023 21:18:10 +0000 (13:18 -0800)
committerH.J. Lu <hjl.tools@gmail.com>
Tue, 19 Dec 2023 14:57:32 +0000 (06:57 -0800)
Verify that CPU_FEATURE_ACTIVE (SHSTK) works properly when CET is
disabled.

sysdeps/x86/Makefile
sysdeps/x86/tst-cet-legacy-10a-static.c [new file with mode: 0644]
sysdeps/x86/tst-cet-legacy-10a.c [new file with mode: 0644]

index a41598a..23f3ac1 100644 (file)
@@ -156,10 +156,13 @@ tests += \
   tst-cet-legacy-9-static \
   tst-cet-legacy-10 \
   tst-cet-legacy-10-static \
+  tst-cet-legacy-10a \
+  tst-cet-legacy-10a-static \
 # tests
 tests-static += \
   tst-cet-legacy-9-static \
   tst-cet-legacy-10-static \
+  tst-cet-legacy-10a-static \
 # tests-static
 tst-cet-legacy-1a-ARGS = -- $(host-test-program-cmd)
 
@@ -226,6 +229,8 @@ CFLAGS-tst-cet-legacy-mod-6c.c += -fcf-protection
 CFLAGS-tst-cet-legacy-7.c += -fcf-protection=none
 CFLAGS-tst-cet-legacy-10.c += -mshstk
 CFLAGS-tst-cet-legacy-10-static.c += -mshstk
+CFLAGS-tst-cet-legacy-10a.c += -fcf-protection=none
+CFLAGS-tst-cet-legacy-10a-static.c += -fcf-protection=none
 
 CFLAGS-tst-shstk-legacy-1a.c += -fcf-protection=none
 CFLAGS-tst-shstk-legacy-1a-static.c += -fcf-protection=none
diff --git a/sysdeps/x86/tst-cet-legacy-10a-static.c b/sysdeps/x86/tst-cet-legacy-10a-static.c
new file mode 100644 (file)
index 0000000..05073a5
--- /dev/null
@@ -0,0 +1,2 @@
+#pragma GCC target ("shstk")
+#include "tst-cet-legacy-10.c"
diff --git a/sysdeps/x86/tst-cet-legacy-10a.c b/sysdeps/x86/tst-cet-legacy-10a.c
new file mode 100644 (file)
index 0000000..05073a5
--- /dev/null
@@ -0,0 +1,2 @@
+#pragma GCC target ("shstk")
+#include "tst-cet-legacy-10.c"