Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3056289ybi; Tue, 2 Jul 2019 01:16:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqzfcaK/KezUP3iIahrUGH9CYpcSeGgWXK+asNrcA9KxNCimapgjpTblIad4Ph0/mfc3FpWJ X-Received: by 2002:a63:5903:: with SMTP id n3mr24972697pgb.369.1562055387011; Tue, 02 Jul 2019 01:16:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562055387; cv=none; d=google.com; s=arc-20160816; b=a1yhIZoambepjGcaGGue3yW6zPQaXfKLEsBUWrrs4yGmb++KfAEW4keJR4Ior6875+ um6hj3wId3Y/glfJ9iNaGRoCmGgj3wEeOT0OGRCd45KFVQwhuKP+EYk6fVQr7FvJDfVh QE5qFui3BjULZ5c2l1vSbEHGgknlMZPUTc40LlR0XtZd8l6oacWuOdQFKoSn38TJepSd gGZnHMdrxD/7InvR8bK6cg7eamEgl5vgozAy6eiZnV+/7RODSXHXzcapDELxlrde2O49 JZEB9tbRGHhLEDgR70saoFNycWxShGH/I8yqF0tb63zCsasqS2wA3lbKiLbU/GUsrCn1 M5Ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Onmn4/x6f6yPJxGTWLbRyg1CYliUi6KAOjRu+cMJL94=; b=AzqInwWyw4DyH2LnvIAgjqzrqAqXTKdvd5A74e1gUoO0VgjCxuk97EY9aef2BIDawK K9bQUJwXfZngRKABQjXJfu1LHyjDEDpj/2w72SCAh8NB7UQl75CIvVBbg0Ao8hq05Y7l 1zLY8aKpp5Y3rqLKOeHqegqX78E8ek8E3DKgr9uSR7kJKl/bGxXNx8lpG/2qhQ6KqDJY 2anvSvEux5l6rHnpHIUR1vat4mf4TfsbgE1QYqHCHYOOvO7pjuRMHRTqrUXeOCc65zbA ehaKk6quhk4MwdLZ+lzQ7b4eJfwZ6uDj1ANJmSgDjZVwaCLji0ojiXWVsiXAjNiC11Cl LL0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RMHXHEyj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 123si9030374pgb.374.2019.07.02.01.16.12; Tue, 02 Jul 2019 01:16:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RMHXHEyj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727403AbfGBIFu (ORCPT + 99 others); Tue, 2 Jul 2019 04:05:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:52016 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727965AbfGBIFq (ORCPT ); Tue, 2 Jul 2019 04:05:46 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DB62F2183F; Tue, 2 Jul 2019 08:05:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562054745; bh=7RaYogAMaffMqsV7Hx9/3pdVa+O2RtBwSE/a+ve2qWw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RMHXHEyjl8DsKQeEREANlhGFKfx7LK+81Zysj0a4+ykLIlRtyDk0HwKZ4/v4o4i/3 8UeIT60MyaOLBdMbA4yGFP0kB4x8sSGDAqwxaSOsyRGRMUh1BAkeeP92jKhDZhQvHs P/xT9iVm3E0k/xVjrO0IzVUno2IVATLxpwWXqY24= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sasha Levin Subject: [PATCH 4.19 05/72] Revert "x86/uaccess, ftrace: Fix ftrace_likely_update() vs. SMAP" Date: Tue, 2 Jul 2019 10:01:06 +0200 Message-Id: <20190702080124.848495406@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190702080124.564652899@linuxfoundation.org> References: <20190702080124.564652899@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 1a3188d737ceb922166d8fe78a5fc4f89907e31b, which was upstream commit 4a6c91fbdef846ec7250b82f2eeeb87ac5f18cf9. On Tue, Jun 25, 2019 at 09:39:45AM +0200, Sebastian Andrzej Siewior wrote: >Please backport commit e74deb11931ff682b59d5b9d387f7115f689698e to >stable _or_ revert the backport of commit 4a6c91fbdef84 ("x86/uaccess, >ftrace: Fix ftrace_likely_update() vs. SMAP"). It uses >user_access_{save|restore}() which has been introduced in the following >commit. Signed-off-by: Sasha Levin --- kernel/trace/trace_branch.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/kernel/trace/trace_branch.c b/kernel/trace/trace_branch.c index 3ea65cdff30d..4ad967453b6f 100644 --- a/kernel/trace/trace_branch.c +++ b/kernel/trace/trace_branch.c @@ -205,8 +205,6 @@ void trace_likely_condition(struct ftrace_likely_data *f, int val, int expect) void ftrace_likely_update(struct ftrace_likely_data *f, int val, int expect, int is_constant) { - unsigned long flags = user_access_save(); - /* A constant is always correct */ if (is_constant) { f->constant++; @@ -225,8 +223,6 @@ void ftrace_likely_update(struct ftrace_likely_data *f, int val, f->data.correct++; else f->data.incorrect++; - - user_access_restore(flags); } EXPORT_SYMBOL(ftrace_likely_update); -- 2.20.1