Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752796AbcD3Akr (ORCPT ); Fri, 29 Apr 2016 20:40:47 -0400 Received: from mga14.intel.com ([192.55.52.115]:29703 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750800AbcD3Akq (ORCPT ); Fri, 29 Apr 2016 20:40:46 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.24,553,1455004800"; d="scan'208";a="94596919" Subject: Re: [PATCH v4 10/10] x86/xsaves: Re-enable XSAVES To: Yu-cheng Yu References: <5723C4CF.3050209@linux.intel.com> <20160429231252.GA15765@test-lenovo> Cc: x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , linux-kernel@vger.kernel.org, Andy Lutomirski , Borislav Petkov , Sai Praneeth Prakhya , "Ravi V. Shankar" , Fenghua Yu From: Dave Hansen Message-ID: <5723FF0C.2020905@linux.intel.com> Date: Fri, 29 Apr 2016 17:40:44 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 MIME-Version: 1.0 In-Reply-To: <20160429231252.GA15765@test-lenovo> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1274 Lines: 26 On 04/29/2016 04:12 PM, Yu-cheng Yu wrote: > On Fri, Apr 29, 2016 at 01:32:15PM -0700, Dave Hansen wrote: >> The reason I haven't acked this patch is that I want to be _sure_ that >> we've audited all of the call paths that access the XSAVE buffer to >> ensure that they can all either handle the XSAVES format *or* don't care >> for whatever reason. >> >> Could you share the steps that you've taken to assure yourself that all >> of the call paths are handled and we don't have more bugs? > > We tested for signal, ptrace, context switch, avx, and mpx. We also run > these tests with your audit patch to detect any format mis-match. > That said, I cannot be sure there are no more bugs. As you said, we want > to get this feature tested in the field and find potential issues early. That's better than what we had before, but it relies entirely on testing coverage and runtime checks. Is it too much to ask that you also take a look and audit all the places the XSAVE buffer is accessed in the kernel and ensure that they either have code to handle standard vs. compacted/supervisor or don't care for some reason? I did such an audit once upon a time, but I think it would be a good exercise to repeat both by a second set of eyes and because some time has passed.