Received: by 10.213.65.68 with SMTP id h4csp1508935imn; Thu, 15 Mar 2018 01:25:48 -0700 (PDT) X-Google-Smtp-Source: AG47ELsMkchBo5r0XxsqWPyunrcke/u20OuYBBRFm8x1UtDQfDgYbQx4WwkoKz9lnVyua4WeunBT X-Received: by 10.99.97.149 with SMTP id v143mr6089061pgb.319.1521102348762; Thu, 15 Mar 2018 01:25:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521102348; cv=none; d=google.com; s=arc-20160816; b=YPZKQETS9PuI8bds8VWAW9zaL1qq3IlGGCGKaJanViwFXlYZGwHu4wCSePHvZFPgWM UcN3uMtedacFnrDfCcW0SBlzdxK1J0l2Kkf/5bJP32DwAqoW4aex6NXd9+rWD28U9E4u SPIfNpI79hrlQDMfYhTbimwofgQXXml+W0MW9nSvRhoPM64qY3RRXNpJqjt52iOW6GRS nWBif3REdrtiYbwJJu7pp3LPKxicLGS3aO+Qf6OLOU00hSV2SQcV96bSsU7cz18outXL +onUTksZjM8R2no5TRSc3Rr9uItpDTi1yrHThoO7rtnD0FyARtw4c+U27vQWFIMSlKJ0 FBaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:mime-version:in-reply-to:references :subject:cc:to:from:date:message-id:arc-authentication-results; bh=4xJAKOchPZGU/4mm9NfN8cvmXQitplG9cFxRp3HJji8=; b=DOwI3P7WHgCLAA2/qNoKCU8EI8UaG66wTIGweqviiVoclqZhauWBYv+JlXHaCyUocz QQ2egfqXCNmCnP8IF9A1+s37UdgxuwYyZL8Sv1kxBfGJojxD+mCCsLKgjZiDOOL2TE9H 8DxQ32SfeKp2io3mG+ae6KZ4qAhW1Fj9PJMP8yrEe/+aJxcf8bQH33H5gDd+6TWgAcjN +OHp55sFHzt0Tp8EzbMf+9zNExrQ1bE8njjF8SgjiwKq822lNUM9DswRTU7JhIViE2lp 7Bgqn1gVk4KIggKbuNlQMjJsMMhkoscOQLJfLCc3JoCN/1o6ZzXqCqCSoULiGnpOYWgt JQAQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m11-v6si3650509pln.350.2018.03.15.01.25.33; Thu, 15 Mar 2018 01:25:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751532AbeCOIYe convert rfc822-to-8bit (ORCPT + 99 others); Thu, 15 Mar 2018 04:24:34 -0400 Received: from prv-mh.provo.novell.com ([137.65.248.74]:43888 "EHLO prv-mh.provo.novell.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750722AbeCOIYc (ORCPT ); Thu, 15 Mar 2018 04:24:32 -0400 Received: from INET-PRV-MTA by prv-mh.provo.novell.com with Novell_GroupWise; Thu, 15 Mar 2018 02:24:31 -0600 Message-Id: <5AAA3BCB02000078001B1F1B@prv-mh.provo.novell.com> X-Mailer: Novell GroupWise Internet Agent 18.0.0 Date: Thu, 15 Mar 2018 02:24:27 -0600 From: "Jan Beulich" To: "Boris Ostrovsky" Cc: "David Laight" , "David Woodhouse" , "Arnd Bergmann" , "Andrew Cooper" , "Stefano Stabellini" , , "Thomas Gleixner" , "xen-devel" , "Dan Carpenter" , "Ingo Molnar" , "Juergen Gross" , , "H. Peter Anvin" Subject: Re: [PATCH] [v3] xen: remove pre-xen3 fallback handlers References: <20180313210652.3484599-1-arnd@arndb.de> <7c25f7f5-1b54-695e-be5f-6d06d4e89bfa@oracle.com> In-Reply-To: <7c25f7f5-1b54-695e-be5f-6d06d4e89bfa@oracle.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8BIT Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >>> On 14.03.18 at 23:47, wrote: > On 03/13/2018 05:06 PM, Arnd Bergmann wrote: >> The legacy hypercall handlers were originally added with >> a comment explaining that "copying the argument structures in >> HYPERVISOR_event_channel_op() and HYPERVISOR_physdev_op() into the local >> variable is sufficiently safe" and only made sure to not write >> past the end of the argument structure, the checks in linux/string.h >> disagree with that, when link-time optimizations are used: >> >> In function 'memcpy', >> inlined from 'pirq_query_unmask' at drivers/xen/fallback.c:53:2, >> inlined from '__startup_pirq' at drivers/xen/events/events_base.c:529:2, >> inlined from 'restore_pirqs' at drivers/xen/events/events_base.c:1439:3, >> inlined from 'xen_irq_resume' at drivers/xen/events/events_base.c:1581:2: >> include/linux/string.h:350:3: error: call to '__read_overflow2' declared with attribute error: detected read beyond size of object passed as 2nd parameter >> __read_overflow2(); >> ^ >> >> Further research turned out that only Xen 3.0.2 or earlier required the >> fallback at all, while all versions in use today don't need it. >> As far as I can tell, it is not even possible to run a mainline kernel >> on those old Xen releases, at the time when they were in use, only >> a patched kernel was supported anyway. >> >> Fixes: cf47a83fb06e ("xen/hypercall: fix hypercall fallback code for very old hypervisors") >> Signed-off-by: Arnd Bergmann >> --- >> [v2] use a table lookup instead of a switch/case statement, after >> multiple suggestions. >> [v3] remove that file completely > > (+Jan who added this file originally) Well, if everyone thinks backwards compatibility to those very old hypervisors is not relevant anymore, then I'm not going to object. It's really a matter of the consuming distros to know how far back they want/need to guarantee compatibility. Jan