Received: by 10.213.65.68 with SMTP id h4csp1288884imn; Wed, 14 Mar 2018 15:47:37 -0700 (PDT) X-Google-Smtp-Source: AG47ELtRnOhA2M21CepgcDhvWBCOiXp798rJIVFBDhs7eLRE03r4PQOYnIFff1t6sogFJkpzHG7p X-Received: by 2002:a17:902:d694:: with SMTP id v20-v6mr5592062ply.34.1521067657882; Wed, 14 Mar 2018 15:47:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521067657; cv=none; d=google.com; s=arc-20160816; b=NkoiVFC821zo/LyZbgYg8yRObd+mmd3ou7bGuZLUkZjSE5034GIxAV0t9ePTY5Becl OeSQ6xtsntY24FvsfRkfkZf/iXJLDt9sMXthQwvAIp2D2jUlK/3ddmVmXUk/g6de8YtL B/LMVUndT3bEJGQdsgxNpUn4P4adOSPXFcSosqH4OuTde6Up5LVPw18Ce7a4IoPeEHKb 7RAFm262dgDd/5rbcytJiDQhFwO0gJAAyojTtu/SbVV1HEShfXLBG+Uc7Ewi3L0tG29B KtoWZs/7XiNhEoHjGijqR3nJr8dBrnGRvMyHXoXJhzxqD5QalPui3w9jw1dss1Kwih9a jY9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=S3wLZ4EiSfS8lDd0Bx4SaJ/RmF89ZLjxoilFR0a6LvA=; b=o9zn8ekEbExE9TROgtj3ReAjdQJcoXn9C2REYnxVcVlMTiYY/G27vMTDw0i1SDEJ6f qnqaflEH6SfTuLfpnrJRXItQhaDzMNiOt3cmzdvNBMldozIcc5Cha7KWpRWy/a2M3h68 lj8F3EljQ0z3A1a+Q5hIbU1seJJ8qpf7VvIpeqCiN/0GY3IpuOeCHq/6mSBBcnqrSNUy TqMm/5D+l6RghO/2DK9P4XHhnVQWvyKNvTl098GHW5lIcAMmauie5+YbZ66E1gOgHJsz tFIL4lupXnNXp8N1AqvAgCsdPjarPSQ3pMteGBfO66xlgP36j36tUrwOM9ZTDDO/Bsfd e/cw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=frG16uBA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e127si2480034pgc.170.2018.03.14.15.47.22; Wed, 14 Mar 2018 15:47:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=frG16uBA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751543AbeCNWqR (ORCPT + 99 others); Wed, 14 Mar 2018 18:46:17 -0400 Received: from aserp2130.oracle.com ([141.146.126.79]:44592 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751131AbeCNWqQ (ORCPT ); Wed, 14 Mar 2018 18:46:16 -0400 Received: from pps.filterd (aserp2130.oracle.com [127.0.0.1]) by aserp2130.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w2EMjjtk020551; Wed, 14 Mar 2018 22:45:45 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=S3wLZ4EiSfS8lDd0Bx4SaJ/RmF89ZLjxoilFR0a6LvA=; b=frG16uBAvCrTxi441Uoy36G6wKtgEepCUmf08LEZZRtCsIjFgiFtvVVyC/eIa6b+KDpG Kfu+BAbcIN//zqizKMaPHsMgzwYyAhGB2BQv05UhBtkNAqDw5DfwCtlGBELNyM6g3du2 IAcXjb9ixVTQqjQnHT930x4sZmppkDYVG6yvOeohQW7KNYEBlIDFMCvM7b3hdIxDCb9e lgu4e7N1QMMfQxVwCza+W/rkAPHLw2rmTB5CBJbK9ke6xrDv8UuoN3Ctqb4td/yRs06w XT8WCo4ejX3A0EBfmCTrZnSFUnJtZPDilPZ3hMq9+44+M+gByC4Xho54Kzmmt2Zh0FWX Yw== Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by aserp2130.oracle.com with ESMTP id 2gqctar02y-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 14 Mar 2018 22:45:45 +0000 Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userv0021.oracle.com (8.14.4/8.14.4) with ESMTP id w2EMjixW005077 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 14 Mar 2018 22:45:44 GMT Received: from abhmp0001.oracle.com (abhmp0001.oracle.com [141.146.116.7]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w2EMjgZJ008002; Wed, 14 Mar 2018 22:45:43 GMT Received: from dhcp-burlington7-2nd-B-east-10-152-55-162.usdhcp.oraclecorp.com (/10.152.32.65) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 14 Mar 2018 22:45:42 +0000 Subject: Re: [PATCH] [v3] xen: remove pre-xen3 fallback handlers To: Arnd Bergmann , Juergen Gross Cc: David Laight , Andrew Cooper , xen-devel , Dan Carpenter , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, David Woodhouse , Stefano Stabellini , linux-kernel@vger.kernel.org, Jan Beulich References: <20180313210652.3484599-1-arnd@arndb.de> From: Boris Ostrovsky Message-ID: <7c25f7f5-1b54-695e-be5f-6d06d4e89bfa@oracle.com> Date: Wed, 14 Mar 2018 18:47:13 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180313210652.3484599-1-arnd@arndb.de> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8832 signatures=668690 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1803140241 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/13/2018 05:06 PM, Arnd Bergmann wrote: > The legacy hypercall handlers were originally added with > a comment explaining that "copying the argument structures in > HYPERVISOR_event_channel_op() and HYPERVISOR_physdev_op() into the local > variable is sufficiently safe" and only made sure to not write > past the end of the argument structure, the checks in linux/string.h > disagree with that, when link-time optimizations are used: > > In function 'memcpy', > inlined from 'pirq_query_unmask' at drivers/xen/fallback.c:53:2, > inlined from '__startup_pirq' at drivers/xen/events/events_base.c:529:2, > inlined from 'restore_pirqs' at drivers/xen/events/events_base.c:1439:3, > inlined from 'xen_irq_resume' at drivers/xen/events/events_base.c:1581:2: > include/linux/string.h:350:3: error: call to '__read_overflow2' declared with attribute error: detected read beyond size of object passed as 2nd parameter > __read_overflow2(); > ^ > > Further research turned out that only Xen 3.0.2 or earlier required the > fallback at all, while all versions in use today don't need it. > As far as I can tell, it is not even possible to run a mainline kernel > on those old Xen releases, at the time when they were in use, only > a patched kernel was supported anyway. > > Fixes: cf47a83fb06e ("xen/hypercall: fix hypercall fallback code for very old hypervisors") > Signed-off-by: Arnd Bergmann > --- > [v2] use a table lookup instead of a switch/case statement, after > multiple suggestions. > [v3] remove that file completely (+Jan who added this file originally) Reviewed-by: Boris Ostrovsky