Received: by 10.223.176.5 with SMTP id f5csp2829156wra; Mon, 5 Feb 2018 10:32:34 -0800 (PST) X-Google-Smtp-Source: AH8x2267hRNe333UGSR1T3MuC/3CnRndOMnVSPJHI87xfZAQCvW3V6b43YSEcRPnNskkP9hqdurm X-Received: by 10.101.75.137 with SMTP id t9mr3030306pgq.232.1517855553977; Mon, 05 Feb 2018 10:32:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517855553; cv=none; d=google.com; s=arc-20160816; b=dzcS+dkmy7zkvAgdIeky7w/eGQy4zp+hUN5+CzoC48ra/9TPbNMUhMWJH/+Oe93HJf 9HbPniV2BFV9fCadcXMBYmeXfONen+ZuFMteLs3tXjRCR6qsOoOlbYdfzE6P2JGK7lKy /yDV3B9/bsa6NXKK4m0wXnpgA8FedRzm7WSoYCughXStxK4+q/n5t3tmS94+B3ZU9YKJ m0w8FrXumuMPh6a55qn+RXsyJGZDCJxOsh+Mmpjv4/YVnhtfh+rgf6UXjUU54AQ7nMqg svxGNP7BUKzbjikJ+0D5hnwzNLXokal//SeEZzQwld67p6i7aOc6MwtbXJuqleZrl6PU oC1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=yk2kxveVC5VPYXKiTGvKtNVw4IchiKvK6ZBmOYkZY/s=; b=zRWbrGg/LozIWZMycQJa76TMb2O1uRwN6+eks/Twce6LQCaRJSUCMJgKQ5bXsFn3Bv /L7itjHNwr9UtM6dT16AektZJLkPJ7JT7CmwlDfiHz6I/hxMCgeDINBVy6suQn0vJiJt erSRFImQEcJSTnNkN3MNvef2mV00BWiIR2vkMZuubSoYCHJyIGGE6SzfUN7VSAx/jk/3 MLvWTmgxCxdu+GJYtZ+EhhijqhGhyVAwRINBhZeOQSdc67dM6p1M71HEAYUcKF4S4CJw CgpmXWBIfj5eBtElfWk3B2O+HgmWnpRQCmHUDMC6RGLe3olNAZGd0CJ6ooSq3XIHtdTZ T29g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r16si61895pgn.732.2018.02.05.10.32.19; Mon, 05 Feb 2018 10:32:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754113AbeBESbT (ORCPT + 99 others); Mon, 5 Feb 2018 13:31:19 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:52922 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753822AbeBESZz (ORCPT ); Mon, 5 Feb 2018 13:25:55 -0500 Received: from localhost (unknown [104.132.1.108]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id B7C361148; Mon, 5 Feb 2018 18:25:34 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Josh Poimboeuf , Thomas Gleixner , Juergen Gross , Andrea Arcangeli , Peter Zijlstra , Andi Kleen , Ashok Raj , Jun Nakajima , Tim Chen , Rusty Russell , Dave Hansen , Asit Mallick , Andy Lutomirski , Linus Torvalds , Jason Baron , Paolo Bonzini , Alok Kataria , Arjan Van De Ven , David Woodhouse , Dan Williams Subject: [PATCH 4.15 47/60] x86/paravirt: Remove noreplace-paravirt cmdline option Date: Mon, 5 Feb 2018 10:23:20 -0800 Message-Id: <20180205182215.914784049@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180205182213.902626065@linuxfoundation.org> References: <20180205182213.902626065@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Josh Poimboeuf jpoimboe@redhat.com commit 12c69f1e94c89d40696e83804dd2f0965b5250cd The 'noreplace-paravirt' option disables paravirt patching, leaving the original pv indirect calls in place. That's highly incompatible with retpolines, unless we want to uglify paravirt even further and convert the paravirt calls to retpolines. As far as I can tell, the option doesn't seem to be useful for much other than introducing surprising corner cases and making the kernel vulnerable to Spectre v2. It was probably a debug option from the early paravirt days. So just remove it. Signed-off-by: Josh Poimboeuf Signed-off-by: Thomas Gleixner Reviewed-by: Juergen Gross Cc: Andrea Arcangeli Cc: Peter Zijlstra Cc: Andi Kleen Cc: Ashok Raj Cc: Greg KH Cc: Jun Nakajima Cc: Tim Chen Cc: Rusty Russell Cc: Dave Hansen Cc: Asit Mallick Cc: Andy Lutomirski Cc: Linus Torvalds Cc: Jason Baron Cc: Paolo Bonzini Cc: Alok Kataria Cc: Arjan Van De Ven Cc: David Woodhouse Cc: Dan Williams Link: https://lkml.kernel.org/r/20180131041333.2x6blhxirc2kclrq@treble Signed-off-by: Greg Kroah-Hartman --- Documentation/admin-guide/kernel-parameters.txt | 2 -- arch/x86/kernel/alternative.c | 14 -------------- 2 files changed, 16 deletions(-) --- a/Documentation/admin-guide/kernel-parameters.txt +++ b/Documentation/admin-guide/kernel-parameters.txt @@ -2742,8 +2742,6 @@ norandmaps Don't use address space randomization. Equivalent to echo 0 > /proc/sys/kernel/randomize_va_space - noreplace-paravirt [X86,IA-64,PV_OPS] Don't patch paravirt_ops - noreplace-smp [X86-32,SMP] Don't replace SMP instructions with UP alternatives --- a/arch/x86/kernel/alternative.c +++ b/arch/x86/kernel/alternative.c @@ -46,17 +46,6 @@ static int __init setup_noreplace_smp(ch } __setup("noreplace-smp", setup_noreplace_smp); -#ifdef CONFIG_PARAVIRT -static int __initdata_or_module noreplace_paravirt = 0; - -static int __init setup_noreplace_paravirt(char *str) -{ - noreplace_paravirt = 1; - return 1; -} -__setup("noreplace-paravirt", setup_noreplace_paravirt); -#endif - #define DPRINTK(fmt, args...) \ do { \ if (debug_alternative) \ @@ -599,9 +588,6 @@ void __init_or_module apply_paravirt(str struct paravirt_patch_site *p; char insnbuf[MAX_PATCH_LEN]; - if (noreplace_paravirt) - return; - for (p = start; p < end; p++) { unsigned int used;