Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932089AbdHQWKC (ORCPT ); Thu, 17 Aug 2017 18:10:02 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:45994 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754017AbdHQWJo (ORCPT ); Thu, 17 Aug 2017 18:09:44 -0400 Date: Thu, 17 Aug 2017 15:09:42 -0700 From: Andrew Morton To: "Luck, Tony" Cc: Borislav Petkov , Dave Hansen , Naoya Horiguchi , "Elliott, Robert (Persistent Memory)" , x86@kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH-resend] mm/hwpoison: Clear PRESENT bit for kernel 1:1 mappings of poison pages Message-Id: <20170817150942.017f87537b6cbb48e9cfc082@linux-foundation.org> In-Reply-To: <20170816171803.28342-1-tony.luck@intel.com> References: <20170816171803.28342-1-tony.luck@intel.com> X-Mailer: Sylpheed 3.4.1 (GTK+ 2.24.23; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1121 Lines: 25 On Wed, 16 Aug 2017 10:18:03 -0700 "Luck, Tony" wrote: > Speculative processor accesses may reference any memory that has a > valid page table entry. While a speculative access won't generate > a machine check, it will log the error in a machine check bank. That > could cause escalation of a subsequent error since the overflow bit > will be then set in the machine check bank status register. > > Code has to be double-plus-tricky to avoid mentioning the 1:1 virtual > address of the page we want to map out otherwise we may trigger the > very problem we are trying to avoid. We use a non-canonical address > that passes through the usual Linux table walking code to get to the > same "pte". > > Thanks to Dave Hansen for reviewing several iterations of this. It's unclear (to lil ole me) what the end-user-visible effects of this are. Could we please have a description of that? So a) people can understand your decision to cc:stable and b) people whose kernels are misbehaving can use your description to decide whether your patch might fix the issue their users are reporting. Thanks.