Received: by 10.223.176.46 with SMTP id f43csp857024wra; Fri, 19 Jan 2018 03:08:38 -0800 (PST) X-Google-Smtp-Source: ACJfBouIyXsseXTciTsX4996wUY0daW/9u6t9XIAQnBcmAFoLetDdmFSs3sYcitXy5XTeRyHr1Di X-Received: by 10.98.34.206 with SMTP id p75mr35062429pfj.235.1516360118751; Fri, 19 Jan 2018 03:08:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516360118; cv=none; d=google.com; s=arc-20160816; b=kKHWaRLJ4WlQlj9LCqtrJ7/+30MM6DoJklg699x1Xx8/KToneAtdOnYJSZrxuXGDon H8YUVL1534tY9KDI0BCZQCpWxzRo47uhH8nS6ueANm/9ZoIewycALEWeNo7dG4yYyZqT NWs5StZ3kDNRTiosHAIwT4oU42fYf6ezSKZR1AZL2a1Yy5CtqbXc/lHbN7tlHC5ZBa8P AMEC7rWA8CfsLgYxUHFLX8rp/Q//HZRomtMnawHCXmTI1INqByHQGC04S8h8TJMPx/AY D1+B4L5r/Ac9MeoHrmZFKThBbTM6D60ks0te+6F2s1Ia5U6NNGu0dp84oVCro3kKsn4p SfGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=c57bhMQunJQdic87v/FEKfj0rzV9ZdkZJJhYGyfyt10=; b=Rm1GDSAvj6hrDK6SZUBHQoaw+ay5/CLE1/xplCuD7ZkE7h0CR0dqRL9/9kIk7YuE5j gTqBpEYKWow2qrwkguSdD9KNJg9zhNHSe3ta/rQOcVdJfwpMGL6lUTglQSfNfEOqfeD3 tn26jQzxQBYMv8HPl+7y9Xhy4xtlSRD50Kq6kminGYLgnKpe1EGP3tmfG63PAGVz75CN Pul6UgS0rz38fC3cVjMvPobHNDOhMeXcB3cWMH/DnmXmRKdW3ajA0Zox98N4gY7cE5e7 i5YZ6VywxC63DSAZQakdAVPTXugiMB4eA+Nno79kPtiu8w+RKyfcAPecEHXRIXBfoOdt TuaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f25si3635887pge.163.2018.01.19.03.08.23; Fri, 19 Jan 2018 03:08:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755535AbeASLHu (ORCPT + 99 others); Fri, 19 Jan 2018 06:07:50 -0500 Received: from mx2.suse.de ([195.135.220.15]:48932 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755479AbeASLHh (ORCPT ); Fri, 19 Jan 2018 06:07:37 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 9F9C1ACFB; Fri, 19 Jan 2018 11:07:32 +0000 (UTC) Date: Fri, 19 Jan 2018 12:07:26 +0100 From: Joerg Roedel To: Pavel Machek Cc: Joerg Roedel , Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Linus Torvalds , Andy Lutomirski , Dave Hansen , Josh Poimboeuf , Juergen Gross , Peter Zijlstra , Borislav Petkov , Jiri Kosina , Boris Ostrovsky , Brian Gerst , David Laight , Denys Vlasenko , Eduardo Valentin , Greg KH , Will Deacon , aliguori@amazon.com, daniel.gruss@iaik.tugraz.at, hughd@google.com, keescook@google.com, Andrea Arcangeli , Waiman Long Subject: Re: [RFC PATCH 00/16] PTI support for x86-32 Message-ID: <20180119110726.odea3h3smcjyicnk@suse.de> References: <1516120619-1159-1-git-send-email-joro@8bytes.org> <20180119105527.GB29725@amd> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180119105527.GB29725@amd> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hey Pavel, On Fri, Jan 19, 2018 at 11:55:28AM +0100, Pavel Machek wrote: > Thanks for doing the work. > > I tried applying it on top of -next, and that did not succeed. Let me > try Linus tree... Thanks for your help with testing this patch-set, but I recommend to wait for the next version, as review already found a couple of bugs that might crash your system. For example there are NMI cases that might crash your machine because the NMI happens in kernel mode before the cr3 switch. VM86 mode is also definitly broken. I am about to fix that and will send a new version, if all goes well, at some point next week. Thanks, Joerg