Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4776901yba; Tue, 30 Apr 2019 04:19:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqwpFrZSnYlNXt7sUXUULVQIG/eCZ+F/6t9SnlZdTh8c/XnLUXSn+PXHPhmLvDPEe+YTxhfF X-Received: by 2002:a65:6210:: with SMTP id d16mr64507233pgv.110.1556623160285; Tue, 30 Apr 2019 04:19:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556623160; cv=none; d=google.com; s=arc-20160816; b=PVlm8b0tR5f8Jt6OkJ8it/NmHyb3L0Z87Exckuw8rT8ajFIG8T57VNuiEYGmUStKWR Bs9nNYLmY8+h3DanRFyQPa/czNURdrV43jWpu3vyJvjZ2oGEYiWz8qj2Oor2iU/ar90y HhrpffcQCRyzVGNRF+QKG+vfdHZY8TqlilJKzxktQ3kXNigiKH/jlKZps9YyLpL2EHEn aHiUK5tWvsqca2VRNTEZ83YJ4WfRBxBhfCh3p0g46jWs+xTOD3rlJouay7S3TO62adM+ rH16Fm5jWKD2UvyOT8e14Kkf6yOQvO9qgGRz9Ngelg9LAq+YQLZgPnRhVIXoX3ioUOr4 fo2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=uRhMAJVp8Jl8AoYyG9XpRdSxLJQRVRBrPF6rBSqyTj8=; b=byVejDLRmp9ZPsRJ1VG4p1S7cMw9jW3J2VwKQYZ112rXdel0WmcQLRO06UUv7K4EYM q0OjOxoA7Ng+/HyhEAZFJzdTT13XIDgQrzk5TRi0YQUddF3dAZk9ygd4Lim5zp1UU9/W VHrq1PSgctPOhmx4qX8TX+4t6yS54pTEK2wTyBcRHBUrYBYXdiL1y0di0LULAqvUhrBe Td2srICF6P5yVFA13ZSOffyMVQ0ZQr7xljDJWLqjHerJEEmtKTJfu6yLUI0dXeoTc8PU bqUMS8nyz20F8A/HKpJgPTdcmf9CpJrGXnbIpTsHal8JO471PxDV9mY8MkioRwWYElZZ T36g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="UJu/qALr"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o70si37220727pfa.33.2019.04.30.04.19.02; Tue, 30 Apr 2019 04:19:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="UJu/qALr"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727512AbfD3LRt (ORCPT + 99 others); Tue, 30 Apr 2019 07:17:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:48960 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726648AbfD3LRt (ORCPT ); Tue, 30 Apr 2019 07:17:49 -0400 Received: from pobox.suse.cz (prg-ext-pat.suse.com [213.151.95.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2480D20835; Tue, 30 Apr 2019 11:17:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556623067; bh=PtfulNUaJLLywP5xlpcAi2iOzN+sMQGoYXae126xyEw=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=UJu/qALr2X37S4uSnhUW2YPTSJGbDsV0ehhgOoNB0/7P4D/qpnZCF8zNn7TkwcW4G Z9E0U4pz6pFJ3VyNAleHSgmj5LGoVQ3G7RyZzF1Hsc19X7p/SjB3s2JLrDCM3z+V+Y b/MfW1beOXMcCaxTcr5uW75TzV5lbwzhE6pt2AQU= Date: Tue, 30 Apr 2019 13:17:40 +0200 (CEST) From: Jiri Kosina To: Linus Torvalds cc: Sean Christopherson , Andrew Lutomirski , Steven Rostedt , Peter Zijlstra , Nicolai Stange , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , the arch/x86 maintainers , Josh Poimboeuf , Miroslav Benes , Petr Mladek , Joe Lawrence , Shuah Khan , Konrad Rzeszutek Wilk , Tim Chen , Sebastian Andrzej Siewior , Mimi Zohar , Juergen Gross , Nick Desaulniers , Nayna Jain , Masahiro Yamada , Joerg Roedel , Linux List Kernel Mailing , live-patching@vger.kernel.org, "open list:KERNEL SELFTEST FRAMEWORK" Subject: Re: [PATCH 3/4] x86/ftrace: make ftrace_int3_handler() not to skip fops invocation In-Reply-To: Message-ID: References: <20190429220814.GF31379@linux.intel.com> <20190430000846.GG31379@linux.intel.com> <20190430004504.GH31379@linux.intel.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 29 Apr 2019, Linus Torvalds wrote: > > > It's 486 based, but either way I suspect the answer is "yes". IIRC, > > > Knights Corner, a.k.a. Larrabee, also had funkiness around SMM and that > > > was based on P54C, though I'm struggling to recall exactly what the > > > Larrabee weirdness was. > > > > Aha! Found an ancient comment that explicitly states P5 does not block > > NMI/SMI in the STI shadow, while P6 does block NMI/SMI. > > Ok, so the STI shadow really wouldn't be reliable on those machines. Scary. > > Of course, the good news is that hopefully nobody has them any more, and > if they do, they presumably don't use fancy NMI profiling etc, so any > actual NMI's are probably relegated purely to largely rare and > effectively fatal errors anyway (ie memory parity errors). FWIW, if that thing has local apic (I have no idea, I've never seen Quark myself), then NMIs are used to trigger all-cpu backtrace as well. Which still can be done in situations where the kernel is then expected to continue running undisrupted (softlockup, sysrq, hung task detector, ...). Nothing to really worry about in the particular case of this HW perhaps, sure. -- Jiri Kosina SUSE Labs