Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2556020ybt; Fri, 3 Jul 2020 12:03:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzlHiVMdphaP/OQ3UXqjj0dV++bSUlYDp4Ld7F3K6nW+hessXTIoMZkvJ9P3Nx6ZffA2Ub4 X-Received: by 2002:a17:906:54a:: with SMTP id k10mr32305712eja.480.1593803009926; Fri, 03 Jul 2020 12:03:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593803009; cv=none; d=google.com; s=arc-20160816; b=AEJJnq+bWDIgWxOaYlm8Rqtb6wNyxCZkNzIXAUcHpuIxC+UI8x/6QfESRKp8gymVPh WdZwLKUv9k9a9VDnigym9baAqTCjZxDFfp5iU0uB/laNuWIB72k9ccvI3YX6aj4ReavT Mpu/DkHi52IWABMOLFiab0FnT521ENxnN1ApQ3noaHpI9m40gCOcsU6kFB3a1Xh3vrnS KUl8jfwbk1rYN6UbOxaSOLLyznXGQjp8GqarWJH1sSkJpF1cqS4AOZpUNf007zS16gu6 e5YXoiM/yx8gd7gW1+V/2+aOuy6l/Kp6xrv5xUiZNmfCe06sAe89UqLeZI//ohgzRM+9 PoOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:ironport-sdr :dkim-signature; bh=zuwnfSzVG7Wf96+jFOASFpGmF+iiO1E1xRCuKHnbXlM=; b=S0YZwwbHRkq9EUshYU1PCWA+DGq2iiHM4R7e5az2k91Cfr48usLo4lQfHf2DnVAg3W 9aR4AcZZGCXNY5xLstHUFP8HepoqEtN2VGIkjrNocafLgiaIXKBWh/Fah68TpoRE5T9B gbI2UgWsPKVr+GpNzQvbb3DoFsfMgDa+RLdiHC3074VtXHpSYp/K4xBhgRrr5NVBiuCe HWXD0AOCig97bGX7CGzxg5b1BllKvtJRUW2fr/pcqu/V2Jg0wfSE7IqkBAOQPuOu/R+B m0mCmzReNOZxh6R01IAdD2p7b5v3pKxFuv2LGyTgBpwbPSs/CtiYhgJrWNMGtGhx41Cz b8ag== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@citrix.com header.s=securemail header.b="T/+0z1AQ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=citrix.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e13si9096968ejc.215.2020.07.03.12.03.07; Fri, 03 Jul 2020 12:03:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@citrix.com header.s=securemail header.b="T/+0z1AQ"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=citrix.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726310AbgGCTAj (ORCPT + 99 others); Fri, 3 Jul 2020 15:00:39 -0400 Received: from esa3.hc3370-68.iphmx.com ([216.71.145.155]:21222 "EHLO esa3.hc3370-68.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726147AbgGCTAj (ORCPT ); Fri, 3 Jul 2020 15:00:39 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1593802839; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to:content-transfer-encoding; bh=Tix1KqcnGSpTs/4i5cgNqmCJm4LTps81dPDADxlsRVo=; b=T/+0z1AQYJdkjezMHqCPBWIjqFBSQYp8qM1ldxte7TdUUjfUllBtiXoB fuIBWzLjTC7tHx4jFxgOoem05cb5q6Zm8qO4BfJbE8sl7UGBJ4VeilZy1 3dGrGQQXcD0U4yOi1r5ZtxoMaKF5SoS8PICfMsl51/dxUJkyXHyImEQX9 s=; Authentication-Results: esa3.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none IronPort-SDR: 5WTuxR1voOIMGz0oLmdUfxkYHROzepZ+qF33kK2R2c6IQ1B1tr1zWHfj5qvsyiP9y5+RaSkdW+ tKLciEDOcWDjO0YuOTv5lbFwMLrsukaJ1P4Njz8+Z4Yj/4fiqnqxHTLbYeVp7XXsEvHxtG0oCl oy64kpifYfaxKe7rhOOskFUzW+c45w1L4s3cM7ivr9bCFFB0xh8ekXbj9y0tjnMbvXJwdpMhee K6whlj8Kbilhf71H9pMDDJoFRF1CyhdSqjzSVTB2GNRgqB7MpMCTj2kJwfroxK+Tzw8K+H8YRc AXY= X-SBRS: 2.7 X-MesageID: 21573706 X-Ironport-Server: esa3.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.75,308,1589256000"; d="scan'208";a="21573706" Subject: Re: [PATCH entry v2 5/6] x86/ldt: Disable 16-bit segments on Xen PV To: Andy Lutomirski , CC: Juergen Gross , LKML References: <92b2975459dfe5929ecf34c3896ad920bd9e3f2d.1593795633.git.luto@kernel.org> From: Andrew Cooper Message-ID: <87fc68cf-540a-85e1-4dde-80cb3e82c3a5@citrix.com> Date: Fri, 3 Jul 2020 20:00:34 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.8.0 MIME-Version: 1.0 In-Reply-To: <92b2975459dfe5929ecf34c3896ad920bd9e3f2d.1593795633.git.luto@kernel.org> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Content-Language: en-GB X-ClientProxiedBy: AMSPEX02CAS02.citrite.net (10.69.22.113) To AMSPEX02CL02.citrite.net (10.69.22.126) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/07/2020 18:02, Andy Lutomirski wrote: > Xen PV doesn't implement ESPFIX64, so they don't work right. Disable > them. Also print a warning the first time anyone tries to use a > 16-bit segment on a Xen PV guest that would otherwise allow it > to help people diagnose this change in behavior. > > This gets us closer to having all x86 selftests pass on Xen PV. Do we know exactly how much virtual address space ESPFIX64 takes up? Are people going to scream in horror if Linux needs to donate some virtual address space back to Xen to get this working?  Linux's current hypervisor range (8TB, 16 pagetable slots) really isn't enough for some systems these days. ~Andrew