lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 19 Feb 2015 17:49:07 -0800 From: Linus Torvalds <torvalds@...ux-foundation.org> To: "Kirill A. Shutemov" <kirill@...temov.name> Cc: David Vrabel <david.vrabel@...rix.com>, Mel Gorman <mgorman@...e.de>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "Xen-devel@...ts.xen.org" <Xen-devel@...ts.xen.org> Subject: Re: NUMA_BALANCING and Xen PV guest regression in 3.20-rc0 On Thu, Feb 19, 2015 at 5:05 PM, Kirill A. Shutemov <kirill@...temov.name> wrote: > > I'm feeling I miss very basic background on how Xen works, but why does it > set _PAGE_GLOBAL on userspace entries? It sounds strange to me. It is definitely strange. I'm guessing that it's some ancient Xen hack for the early Intel virtualization that used to have absolutely horrendous vmenter/exit costs, including very much the TLB overhead. \ These days, Intel has address space identifiers, and doesn't flush the whole TLB on VM entry/exit, so it's probably pointless to play games with the global bit. I get the feeling that a lot of Xen stuff is that kind of "legacy hacks" that should just be cleaned up, but nobody has the energy or the interest. There was the whole odd crazy SHARED_KERNEL_PMD hackery too. Linus -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists