Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3993930ybz; Mon, 20 Apr 2020 13:25:42 -0700 (PDT) X-Google-Smtp-Source: APiQypIbIfolyjwMRqnOq6SPhwezSeQHNrJ7yvb8/XLpdZty5a73Al03VN35FUnRL9lajchEv6co X-Received: by 2002:a17:906:7804:: with SMTP id u4mr18287050ejm.328.1587414341813; Mon, 20 Apr 2020 13:25:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587414341; cv=none; d=google.com; s=arc-20160816; b=TlFicJBBxuN7ezC/YZpZRWCSqP3fDbLejOpDgMDWhsCnDsW7Mmrx8+GrfLMj6iTeXD vhZ+r7bDJnHl/JOSTHm1UrEuhyJ3M7Rrd/Qtnsq6icLd7vcr32zg8conjjtqXYrGGqAo l1hfqHFGLAOl02ZHwWSVq2CBJNzHo7zZePZzFT4/JWMXrUywTZ2iNYS9zgzPbflEMpk9 4RKOMaax4QH8LTdOB6T5vyjU7dAO4SP6Rr5mHE7d+L19LVsDq+dx1nQx0Qa63q8C8bvm yjCShTqJUn4JMxp5s+7Yo3VCbRlS2gHkBJ7czrzZHKcwmq3hpi0MfOYS/hxstuQBJ9Pt noFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :ironport-sdr:ironport-sdr; bh=W+l1PZ4QJjsqgmsxmFrquMj1o5jdYIxVgKWro8eefsA=; b=sK5SKyZCCX3X8lmClBPhCDHzbxNLtCT7EyCOpHVnRYN3nY/a8klAhexbGaEpbEjsz0 nal0X2n+3exq1AKeHXzo6Pc00IgNFoOcTht2CVUndNqPkz7O8gcjjx+psWHQcIeJP5k/ +WKPfMAY00M0O+yZIX2n8s8YV96PaqdJ7yLz7Y3tep6MjNKx1Hgp+VKtsMPHvqtqVxj6 +SkwlHp48eiFnvEUEgl0kUrMUSZp5eGlIpNB9Ai8SDm7kgpM74U54HLWjnM8/x0qsg7z quk7EsZb6gVSnSdcjfXhJId/ovRDCgWTkE/Y59X5GhbUv7liKGJs0ZP5rqFu1utgf+J9 94oQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u4si181438ejb.432.2020.04.20.13.25.18; Mon, 20 Apr 2020 13:25:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726623AbgDTUXg (ORCPT + 99 others); Mon, 20 Apr 2020 16:23:36 -0400 Received: from mga07.intel.com ([134.134.136.100]:47233 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725897AbgDTUXf (ORCPT ); Mon, 20 Apr 2020 16:23:35 -0400 IronPort-SDR: vlQ6p71zo0Bt3ERSVm9sWXDE92Ia/VM+onRrdWRMOcAD9MV1arrMGWQeFTUPOaKWkQ6RIGnFbB LjF8+KubFQUw== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Apr 2020 13:23:34 -0700 IronPort-SDR: dwbx/a0msG2TP6vaKuk6gKGzkILRzrBv45iy3zonm01WA2AXycd2VV41ZeD6i223Je/0lLuoIA PjXGlNLibkjw== X-IronPort-AV: E=Sophos;i="5.72,407,1580803200"; d="scan'208";a="456502146" Received: from agluck-desk2.sc.intel.com (HELO agluck-desk2.amr.corp.intel.com) ([10.3.52.68]) by fmsmga006-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Apr 2020 13:23:34 -0700 Date: Mon, 20 Apr 2020 13:23:32 -0700 From: "Luck, Tony" To: Linus Torvalds Cc: Dan Williams , Andy Lutomirski , Thomas Gleixner , Ingo Molnar , X86 ML , stable , Borislav Petkov , "H. Peter Anvin" , Peter Zijlstra , Erwin Tsaur , Linux Kernel Mailing List , linux-nvdimm Subject: Re: [PATCH] x86/memcpy: Introduce memcpy_mcsafe_fast Message-ID: <20200420202332.GA30160@agluck-desk2.amr.corp.intel.com> References: <67FF611B-D10E-4BAF-92EE-684C83C9107E@amacapital.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 20, 2020 at 01:07:09PM -0700, Linus Torvalds wrote: > On Mon, Apr 20, 2020 at 12:29 PM Dan Williams wrote: > > > > I didn't consider asynchronous to be > > better because that means there is a gap between when the data > > corruption is detected and when it might escape the system that some > > external agent could trust the result and start acting on before the > > asynchronous signal is delivered. > > The thing is, absolutely nobody cares whether you start acting on the > wrong data or not. I think they do. If the result of the wrong data has already been sent out the network before you process the signal, then you will need far smarter application software than has ever been written to hunt it down and stop the spread of the bogus result. Stopping dead on the instruction before it consumes the data means you can "recover" by killing just one process, or just one VMM guest. I'm in total agreement the machine check (especially broadcast) was a bad choice for how to "stop on a dime". But I can't see how you could possibly decide what to do if you let thousands of instructions retire based on a bad data value before you even know that it happened. -Tony