Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp3849134pxb; Sat, 13 Feb 2021 11:21:23 -0800 (PST) X-Google-Smtp-Source: ABdhPJzrWjSOCqRq+3LIvg7vcOPYFJamuJHQd16wvFsnvbNVeLjnq+FxNRSROyKAFbEUHN0X3asD X-Received: by 2002:a17:906:69c2:: with SMTP id g2mr8340519ejs.249.1613244083431; Sat, 13 Feb 2021 11:21:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613244083; cv=none; d=google.com; s=arc-20160816; b=e1Gjy4qqVW5cPIRxzoOrfm1YhUS7Y2iacNlvzXKW0LABQJH0l+QYfIBL9FGRfQQP5C v1OyL7DnTj41e636IV2vj6hjiFXWFjtIUSpsKXxbVUC9NxzH13f/wYZvwoGoRfRekfG2 UoWkGRPsYLuo/2lFXP9etl21kMHb6ssOJddXd7NiOmv1IMNZkor7noPvORTTVewO7tKT 4bvvND5p1l6b8ff8lfpws6Rux7hugl7JmE2tW5KWF8J9QXS2NRDFkKKFg46EdHVyZoZe MxEqJlsEFRE2oF4rnMGbr6rHGpSICE8WwxFttEAUokKuQxuR1dhveSVOGGsr215PNCLc AGZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=bP/0uIChfuYvrI5VuoTa5ppoe5aA5DmezOxV2X6XUB0=; b=rq3+7HCiPOVkDQX3X25kEDzL1EmJyUKarV5TqtyIpZwDIwTNWRLOO7RWs+S5sW3vcJ p0fKBsE5qaoobesuXz6wDqaKp03r43vQaYQ4NTqE4i9JPXUjlYYcMaE8FlxDLo/wI9I0 qLyJsMoCV+lJYHcWr2PkxIMo3Gr2d4atMChbnQogr1oE4xklHzcCtfOLzSQBECihrY4U qT9NqQQ0ypQhbPuNs0k6+ocYMo0M3f28bC6G8UVhmny7RkXBxfN25T/B2rgjrSgoKEZi /rEXXRdGSnCqTa5AsAoyvXw1FhjZbGgFnACQudmOAQGV6+88v6efw0dcDdJFD3cTanWb 4SOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=U2oBxlAw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o19si9255457edz.565.2021.02.13.11.21.00; Sat, 13 Feb 2021 11:21:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=U2oBxlAw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229742AbhBMTUd (ORCPT + 99 others); Sat, 13 Feb 2021 14:20:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:49014 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229665AbhBMTU1 (ORCPT ); Sat, 13 Feb 2021 14:20:27 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id F330364DCF; Sat, 13 Feb 2021 19:19:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1613243987; bh=pZBO4rvpEitfkDSjUhW3j10U+pt1UxIvnooDAWdRuzs=; h=From:To:Cc:Subject:Date:From; b=U2oBxlAwzHS/2pvENZ/dcSEcSpcu38NhLg5wiI2TIOg9q6BRGSaTSI97rTu0vs3DC z9AQSJuHpASYQbV5lUkVkf0l6U76ctrBCAZNWivEhOjktvOfTUpRPaOLuXSNOvoIwj Zn16sf/YN4C40MWslyvXzmxCf45A05v/+NDxH9SC9PyDu37PN2PQ+oe40PER0FUedC PfaKec2Xh564jwgqqgk0aczgGqWPft95F+o01Idk0kI39NcjU9fKbxyzraHVMrGNG5 gHR1NzLIK0gpeUaw3E3vwnefOOcDpGU16qqvQT0S4KeTem2azUkAcHRpRSVuOLk4Kz b0ha58pYX8dNg== From: Andy Lutomirski To: x86@kernel.org Cc: LKML , Sedat Dilek , Nick Desaulniers , Sean Christopherson , Brian Gerst , Joerg Roedel , Andy Lutomirski Subject: [PATCH v2 0/2] Clean up x86_32 stackprotector Date: Sat, 13 Feb 2021 11:19:43 -0800 Message-Id: X-Mailer: git-send-email 2.29.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org x86_32 stackprotector is a maintenance nightmare. Clean it up. This disables stackprotector on x86_32 on GCC 8.1 and on all clang versions. Some clang people are cc'd. Changes from v1: - Changelog fixes. - Comment fixes (mostly from Sean). - Fix the !SMP case. Andy Lutomirski (2): x86/stackprotector/32: Make the canary into a regular percpu variable x86/entry/32: Remove leftover macros after stackprotector cleanups arch/x86/Kconfig | 7 +- arch/x86/Makefile | 8 ++ arch/x86/entry/entry_32.S | 95 +---------------------- arch/x86/include/asm/processor.h | 15 +--- arch/x86/include/asm/ptrace.h | 5 +- arch/x86/include/asm/segment.h | 30 ++----- arch/x86/include/asm/stackprotector.h | 79 ++++--------------- arch/x86/include/asm/suspend_32.h | 6 +- arch/x86/kernel/asm-offsets_32.c | 5 -- arch/x86/kernel/cpu/common.c | 5 +- arch/x86/kernel/doublefault_32.c | 4 +- arch/x86/kernel/head_32.S | 18 +---- arch/x86/kernel/setup_percpu.c | 1 - arch/x86/kernel/tls.c | 8 +- arch/x86/kvm/svm/svm.c | 10 +-- arch/x86/lib/insn-eval.c | 4 - arch/x86/platform/pvh/head.S | 14 ---- arch/x86/power/cpu.c | 6 +- arch/x86/xen/enlighten_pv.c | 1 - scripts/gcc-x86_32-has-stack-protector.sh | 6 +- 20 files changed, 62 insertions(+), 265 deletions(-) -- 2.29.2