lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon,  7 Dec 2015 10:39:38 +0100
From:	Borislav Petkov <bp@...en8.de>
To:	Ingo Molnar <mingo@...nel.org>
Cc:	LKML <linux-kernel@...r.kernel.org>
Subject: [PATCH 0/4] x86/cpufeature: Cleanup, p1

From: Borislav Petkov <bp@...e.de>

Hi,

this is the first and the easiest part of the cleanup - getting rid of
the unused and seldomly used cpu_has_xx uglies. Future work will get rid
of the remaining ones but they need more careful inspection first.

The last patch helps with tinyconfig and slims it down by ~1.5K,
according to 0day numbers:

i386-tinyconfig vmlinux size:

+-------+------+------+-----+---------------------------------------------------------------------------------+
| TOTAL | TEXT | DATA | BSS |                                                                                 |
+-------+------+------+-----+---------------------------------------------------------------------------------+
| -1512 | -352 |    0 |   0 | df63d2e25f80 x86/cpu: Provide a config option to disable static_cpu_has         |
|    +5 |    0 |    0 |   0 | 8b9e9097bf18 Merge remote-tracking branch 'tip/x86/cleanups' into cpufeature-v3 |
| -1507 | -352 |    0 |   0 | ALL COMMITS                                                                     |
+-------+------+------+-----+---------------------------------------------------------------------------------+

Stuff is ontop of tip/x86/cleanups because it needs

  ed29210cd6a6 ("x86: Remove unused function cpu_has_ht_siblings()")


Thanks.

Borislav Petkov (4):
  x86/cpufeature: Move some of the scattered feature bits to x86_capability
  x86/cpufeature: Cleanup get_cpu_cap()
  x86/cpufeature: Remove unused and seldomly used cpu_has_xx macros
  x86/cpu: Provide a config option to disable static_cpu_has

 arch/x86/Kconfig                            |  11 +++
 arch/x86/crypto/chacha20_glue.c             |   2 +-
 arch/x86/crypto/crc32c-intel_glue.c         |   2 +-
 arch/x86/include/asm/cmpxchg_32.h           |   2 +-
 arch/x86/include/asm/cmpxchg_64.h           |   2 +-
 arch/x86/include/asm/cpufeature.h           | 115 ++++++++++++++--------------
 arch/x86/include/asm/xor_32.h               |   2 +-
 arch/x86/kernel/cpu/amd.c                   |   4 +-
 arch/x86/kernel/cpu/centaur.c               |   2 +-
 arch/x86/kernel/cpu/common.c                |  52 +++++++------
 arch/x86/kernel/cpu/intel.c                 |   3 +-
 arch/x86/kernel/cpu/intel_cacheinfo.c       |   6 +-
 arch/x86/kernel/cpu/mtrr/generic.c          |   2 +-
 arch/x86/kernel/cpu/mtrr/main.c             |   2 +-
 arch/x86/kernel/cpu/perf_event_amd.c        |   4 +-
 arch/x86/kernel/cpu/perf_event_amd_uncore.c |  11 +--
 arch/x86/kernel/cpu/scattered.c             |  20 -----
 arch/x86/kernel/cpu/transmeta.c             |   4 +-
 arch/x86/kernel/fpu/init.c                  |   4 +-
 arch/x86/kernel/hw_breakpoint.c             |   6 +-
 arch/x86/kernel/smpboot.c                   |   2 +-
 arch/x86/kernel/vm86_32.c                   |   4 +-
 arch/x86/mm/setup_nx.c                      |   4 +-
 drivers/char/hw_random/via-rng.c            |   5 +-
 drivers/crypto/padlock-aes.c                |   2 +-
 drivers/crypto/padlock-sha.c                |   2 +-
 drivers/iommu/intel_irq_remapping.c         |   2 +-
 fs/btrfs/disk-io.c                          |   2 +-
 28 files changed, 141 insertions(+), 138 deletions(-)

-- 
2.3.5

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ