Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp629748imm; Fri, 22 Jun 2018 02:32:26 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIGqpeG/Mclpdlc9cAVDZhZGp0htXnt7stg+tulve6iu+gQyGQeKM8V+iKNtHSw289XhEb7 X-Received: by 2002:a62:3b5d:: with SMTP id i90-v6mr957487pfa.24.1529659946761; Fri, 22 Jun 2018 02:32:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529659946; cv=none; d=google.com; s=arc-20160816; b=S5VGnyx1PVwkWRZuSRZfMRQ3ArUyYv0lHhEt1R1vpehZAhKXkqk7nnYTog/7lc6znq u5cGe/jLLsQh+z2AXo3lWkaTqeJVHpsAB6RGi4CrZtqtLahQwLsr6CMqA0eQzjP6e+oa gwjNZY1diPrCz67FDISzNtXi9tGPWLCTskp54NUqCqIeTlxPTkzeiSVNC15kbtETHTje 0hVNuIV1cz7Kg/h+A3BtrX0R0JU8hIbhBNlctoQgJ5FLo/jeeU7Vn1CBLbej1PoYcN72 Sf+6iXU/0hp0u4SqXUMnriZ4fM37hse8B2hWJwzbXS4V8BHt8o7kNkc51DouIfHiZaIv z5qw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=IboL1eox4gFm7Q5pxng/mDI0oYDqHzEsugrsb+uqZo0=; b=h8AlunX4XuQI8m0h30J19+dMUn78tWYPu8yTVIyJS1FZJGf6Zgrtge7G+MB0FAEnAi VJVPE8SHsgVbr+3WwR8oOuPXWanI4QiydO7JqMM5MlrWMxp9No8dRVSphRG98h20qv1d tWGGxB7dBhhtJl/wcVbRtl1AxQebi/csf//7u2nZw18moo/mO7G8K2+WWo3egTAE7JwZ BBdfoo4LUaNxTaba+4AQ/ZXi/0jAXq3nyhPlh/UJT49Dg5r1p1TyIAWbSsx1UZZbOiOA eswsdCP73r4XfdFXXUN4mJw1qkUaH1j/sW731BvzpjN77EvLXSukFOQvfSTXKhEOzH+R YS4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e9-v6si5750476pgo.397.2018.06.22.02.32.08; Fri, 22 Jun 2018 02:32:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753272AbeFVJaj (ORCPT + 99 others); Fri, 22 Jun 2018 05:30:39 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:40986 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751285AbeFVJai (ORCPT ); Fri, 22 Jun 2018 05:30:38 -0400 Received: from hsi-kbw-5-158-153-52.hsi19.kabel-badenwuerttemberg.de ([5.158.153.52] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fWIOm-0002dd-Ee; Fri, 22 Jun 2018 11:30:32 +0200 Date: Fri, 22 Jun 2018 11:30:32 +0200 (CEST) From: Thomas Gleixner To: Fenghua Yu cc: Dave Hansen , Peter Zijlstra , Ingo Molnar , "H. Peter Anvin" , Ashok Raj , Rafael Wysocki , Tony Luck , Alan Cox , Ravi V Shankar , Arjan van de Ven , linux-kernel , x86 Subject: Re: [RFC PATCH 00/16] x86/split_lock: Enable #AC exception for split locked accesses In-Reply-To: <20180621224203.GA18979@romley-ivt3.sc.intel.com> Message-ID: References: <1527435965-202085-1-git-send-email-fenghua.yu@intel.com> <20180621193738.GA13636@worktop.programming.kicks-ass.net> <20180621201851.GC114883@romley-ivt3.sc.intel.com> <20180621220003.GD114883@romley-ivt3.sc.intel.com> <20180621220844.GB2494@hirez.programming.kicks-ass.net> <6fbff2df-96c9-db51-371b-a23d1a84d070@intel.com> <20180621224203.GA18979@romley-ivt3.sc.intel.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 21 Jun 2018, Fenghua Yu wrote: > On Thu, Jun 21, 2018 at 03:18:19PM -0700, Dave Hansen wrote: > > On 06/21/2018 03:08 PM, Peter Zijlstra wrote: > > > On Thu, Jun 21, 2018 at 03:00:03PM -0700, Fenghua Yu wrote: > > >> The control knob for kernel is to choose re-executing the faulting > > >> instruction (default) or kernel panic. Kernel panic may be useful in hard > > >> real time which has less tolerant to bad performance. > > > The kernel should never trigger this, ever. Any #AC is a plain bug and > > > should be fixed. So unconditional WARN+disable is suffient. > > > > It sounds like we need to start with that functionality and then if > > Fenghua wants to do more, we have add-on patches that can be evaluated > > by themselves. > > For split lock in kernel, by default, I just do warning, disable feature > in #AC handler, continue to execute the faulting instruction, and re-enable > #AC for split lock after a delay. This is the default behavior in the > current patches. That default behaviour is broken beyond repair. I'll explain that when replying to 2/N. Plus the broken design prevents #AC early usage which is completely wrong to begin with. Thanks, tglx