From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-14.6 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,INCLUDES_PATCH,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F842C433E0 for ; Sat, 13 Feb 2021 19:20:58 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 3319664E43 for ; Sat, 13 Feb 2021 19:20:58 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229818AbhBMTUh (ORCPT ); Sat, 13 Feb 2021 14:20:37 -0500 Received: from mail.kernel.org ([198.145.29.99]:49014 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229665AbhBMTU1 (ORCPT ); Sat, 13 Feb 2021 14:20:27 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id F330364DCF; Sat, 13 Feb 2021 19:19:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1613243987; bh=pZBO4rvpEitfkDSjUhW3j10U+pt1UxIvnooDAWdRuzs=; h=From:To:Cc:Subject:Date:From; b=U2oBxlAwzHS/2pvENZ/dcSEcSpcu38NhLg5wiI2TIOg9q6BRGSaTSI97rTu0vs3DC z9AQSJuHpASYQbV5lUkVkf0l6U76ctrBCAZNWivEhOjktvOfTUpRPaOLuXSNOvoIwj Zn16sf/YN4C40MWslyvXzmxCf45A05v/+NDxH9SC9PyDu37PN2PQ+oe40PER0FUedC PfaKec2Xh564jwgqqgk0aczgGqWPft95F+o01Idk0kI39NcjU9fKbxyzraHVMrGNG5 gHR1NzLIK0gpeUaw3E3vwnefOOcDpGU16qqvQT0S4KeTem2azUkAcHRpRSVuOLk4Kz b0ha58pYX8dNg== From: Andy Lutomirski To: x86@kernel.org Cc: LKML , Sedat Dilek , Nick Desaulniers , Sean Christopherson , Brian Gerst , Joerg Roedel , Andy Lutomirski Subject: [PATCH v2 0/2] Clean up x86_32 stackprotector Date: Sat, 13 Feb 2021 11:19:43 -0800 Message-Id: X-Mailer: git-send-email 2.29.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org x86_32 stackprotector is a maintenance nightmare. Clean it up. This disables stackprotector on x86_32 on GCC 8.1 and on all clang versions. Some clang people are cc'd. Changes from v1: - Changelog fixes. - Comment fixes (mostly from Sean). - Fix the !SMP case. Andy Lutomirski (2): x86/stackprotector/32: Make the canary into a regular percpu variable x86/entry/32: Remove leftover macros after stackprotector cleanups arch/x86/Kconfig | 7 +- arch/x86/Makefile | 8 ++ arch/x86/entry/entry_32.S | 95 +---------------------- arch/x86/include/asm/processor.h | 15 +--- arch/x86/include/asm/ptrace.h | 5 +- arch/x86/include/asm/segment.h | 30 ++----- arch/x86/include/asm/stackprotector.h | 79 ++++--------------- arch/x86/include/asm/suspend_32.h | 6 +- arch/x86/kernel/asm-offsets_32.c | 5 -- arch/x86/kernel/cpu/common.c | 5 +- arch/x86/kernel/doublefault_32.c | 4 +- arch/x86/kernel/head_32.S | 18 +---- arch/x86/kernel/setup_percpu.c | 1 - arch/x86/kernel/tls.c | 8 +- arch/x86/kvm/svm/svm.c | 10 +-- arch/x86/lib/insn-eval.c | 4 - arch/x86/platform/pvh/head.S | 14 ---- arch/x86/power/cpu.c | 6 +- arch/x86/xen/enlighten_pv.c | 1 - scripts/gcc-x86_32-has-stack-protector.sh | 6 +- 20 files changed, 62 insertions(+), 265 deletions(-) -- 2.29.2