From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.1 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_PASS,T_DKIMWL_WL_HIGH,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 081E6C433F5 for ; Mon, 3 Sep 2018 22:59:48 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 9F57B20870 for ; Mon, 3 Sep 2018 22:59:47 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="ifyk71us" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 9F57B20870 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727049AbeIDDWE (ORCPT ); Mon, 3 Sep 2018 23:22:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:32772 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726047AbeIDDWE (ORCPT ); Mon, 3 Sep 2018 23:22:04 -0400 Received: from localhost (c-71-202-137-17.hsd1.ca.comcast.net [71.202.137.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0B66C20862; Mon, 3 Sep 2018 22:59:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1536015585; bh=IGDLh+j1Mhi83y0uJgq7fVnCkr1/yJqvHVhUSJxuLzw=; h=From:To:Cc:Subject:Date:From; b=ifyk71usDxWMHL2ZH2i4WjCGAQV/cjoD2kD9T/DQeTuxqi8seqy8WSDLK2fqatlE8 j4DOKHX0RKIO83r3jhiQrV1RDxXx0HzIS9CfZncJVplL4GnriniHfqxgOjpyMVzazH 1Z/aqlKikQ/JNZX/tOhuZLrR8GXWZLSQ3/jdNVgk= From: Andy Lutomirski To: x86@kernel.org Cc: Borislav Petkov , LKML , Dave Hansen , Adrian Hunter , Alexander Shishkin , Arnaldo Carvalho de Melo , Linus Torvalds , Josh Poimboeuf , Joerg Roedel , Jiri Olsa , Andi Kleen , Peter Zijlstra , Andy Lutomirski Subject: [PATCH v2 0/3] x86/pti: Get rid of entry trampolines and add some docs Date: Mon, 3 Sep 2018 15:59:41 -0700 Message-Id: X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This gets rid of entry trampolines. It's more or less the same as the RFC version, except that I rebased it to v4.19-rc1 due to massive conflicts with some perf changes. I have *not* reverted all of the perf support for entry trampolines -- I leave that to the perf crew, if needed. Changes from v1: Get rid of the rsp_scratch macro Andy Lutomirski (3): x86/entry/64: Document idtentry x86/entry/64: Use the TSS sp2 slot for SYSCALL/SYSRET scratch space x86/pti/64: Remove the SYSCALL64 entry trampoline arch/x86/entry/entry_64.S | 116 ++++++++++---------------- arch/x86/include/asm/cpu_entry_area.h | 2 - arch/x86/include/asm/processor.h | 6 ++ arch/x86/include/asm/sections.h | 1 - arch/x86/kernel/asm-offsets.c | 5 +- arch/x86/kernel/cpu/common.c | 11 +-- arch/x86/kernel/kprobes/core.c | 10 +-- arch/x86/kernel/process_64.c | 2 - arch/x86/kernel/traps.c | 4 + arch/x86/kernel/vmlinux.lds.S | 10 --- arch/x86/mm/cpu_entry_area.c | 36 -------- arch/x86/mm/pti.c | 33 +++++++- arch/x86/xen/xen-asm_64.S | 8 +- 13 files changed, 95 insertions(+), 149 deletions(-) -- 2.17.1