Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1387859imm; Fri, 22 Jun 2018 16:04:47 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKfk1S2elzqe0zEEpym3cMOaED68NQ34Oaf8B7+c7SmloRlbC7qEmfa+J8lHBM4FVMjJdm2 X-Received: by 2002:a62:8552:: with SMTP id u79-v6mr3593491pfd.201.1529708687394; Fri, 22 Jun 2018 16:04:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529708687; cv=none; d=google.com; s=arc-20160816; b=oOLXFa/usQBRd7eLVNST1C0AXODZzg5bmneqjZfbh3unD2A8LzP8RlSpa+jo/gUzJE ZMVG6qRS6GbEQNyidZUBX2F0VanPqIn3kw5cG52qH4Jarl8QHPJSmUspbDs6nhuL0APP TWv6wHzH3TPe+eSG30inc51VlqQpe8T5oH+d41qriZ1BvCYW5ZYH8Z3/McU4FQJAMj3L eLIv7Cka5jlEvpYm/AzaFkfBpOb+gRfEv9y1YuhqA7LGlVsKJEHUR21NlSMEyD+JsdKA 6A9uLdiN/jEhXIHOfpr/wmWw2LhiSLmioB5z9xV75sEWCEZJIkKD9ZiwUHv19gb5HlxX ZL0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=6OHqP5ZzzCxzYgwC1Y4DRLCXWDiRO1I3A3JdA2SLoNs=; b=txI6t7Y68aBQRh5bXfnA/dmRqRyv3ISw8VWeWZPpzSlQf30tktXVS/4SZna6PupRrW GbnUjogha1ynOksQiCBPg2Ye22fk9SvyksVGskpyvMzfp3xDAKa01beu/wpwMpbJAlyB cqR62Dx6ckmRCf5b5DzkNGL2VQgqiB3rBz1k9/i+ZVwpPX8G3njyyEE0RGsOW7woXHSI fOC1mesaTKfdAikrdbQouKsRGtng8XDgMoQzmDpnFM8+QTdMH3fbhUhvSDFiMCXxthRp npjaoWKUA8Flzs1mz8XBw3r/DG0inEm+rsV8ukr7sTLebG+SvVovzDZW7IG1tP5P9ETf LPSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z3-v6si8207379plb.228.2018.06.22.16.04.30; Fri, 22 Jun 2018 16:04:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754696AbeFVXDt (ORCPT + 99 others); Fri, 22 Jun 2018 19:03:49 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:42980 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754519AbeFVXDr (ORCPT ); Fri, 22 Jun 2018 19:03:47 -0400 Received: from p4fea482e.dip0.t-ipconnect.de ([79.234.72.46] helo=nanos.glx-home) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fWV5a-00058L-0o; Sat, 23 Jun 2018 01:03:34 +0200 Date: Sat, 23 Jun 2018 01:03:33 +0200 (CEST) From: Thomas Gleixner To: Fenghua Yu cc: Ingo Molnar , "H. Peter Anvin" , Ashok Raj , Dave Hansen , Rafael Wysocki , Tony Luck , Alan Cox , Ravi V Shankar , Arjan van de Ven , linux-kernel , x86 Subject: Re: [RFC PATCH 02/16] x86/split_lock: Handle #AC exception for split lock in kernel mode In-Reply-To: Message-ID: References: <1527435965-202085-1-git-send-email-fenghua.yu@intel.com> <1527435965-202085-3-git-send-email-fenghua.yu@intel.com> <20180622224154.GD18979@romley-ivt3.sc.intel.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 23 Jun 2018, Thomas Gleixner wrote: > On Fri, 22 Jun 2018, Fenghua Yu wrote: > > On Fri, Jun 22, 2018 at 01:59:44PM +0200, Thomas Gleixner wrote: > > > Aside of that the spec says: > > > > > > 31 Disable LOCK# assertion for split locked access. > > > > > > Can you pretty please make sure that this bit enforces #AC enable? If 31 is > > > ever set and such an access happens then the resulting havoc will takes > > > ages to decode. > > > > > > That bit is also mentioned in the SDM with ZERO explanation why it exists > > > in the first place and why anyone would ever enable it and without a big > > > fat warning about the possible consequences. Can this pretty please be > > > fixed? > > > > The bit 31 already exits on all processors. Hardware always sets its value > > as zero after power on. It has been legacy for 20 years. It was added for > > one customer 20 years ago. Now Intel hardware design team doesn't expect > > anyone to set the bit. > > Doesn't expect. ROTFL. > > That's the most stupiest excuse for not adding a big fat warning into the > SDM why this abomination should never be used at all. > > Aside of that does the Intel hardware design team expect that this one > customer is still depending on this nonsense and is therefore proliferating > it forever? Forgot to add that there are a lot of things nobody expects to be done, but especially BIOS/SMM people have a tendency to flip random bits as they see fit. Maybe not this one, but only for the reason that they did not notice it yet. Thanks, tglx