From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758218AbbA2VnS (ORCPT ); Thu, 29 Jan 2015 16:43:18 -0500 Received: from mga02.intel.com ([134.134.136.20]:31167 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751877AbbA2VnR (ORCPT ); Thu, 29 Jan 2015 16:43:17 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.09,488,1418112000"; d="scan'208";a="519861528" Message-ID: <54CAA973.4050401@linux.intel.com> Date: Thu, 29 Jan 2015 13:43:15 -0800 From: Dave Hansen User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: Oleg Nesterov CC: Rik van Riel , Suresh Siddha , Andy Lutomirski , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Fenghua Yu , the arch/x86 maintainers , linux-kernel Subject: Re: [PATCH 0/3]: x86, fpu: unlazy_fpu fixes/cleanups References: <54C2A245.4010307@redhat.com> <20150129210723.GA31584@redhat.com> <54CAA357.1070108@linux.intel.com> <20150129213346.GA32511@redhat.com> In-Reply-To: <20150129213346.GA32511@redhat.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/29/2015 01:33 PM, Oleg Nesterov wrote: > On 01/29, Dave Hansen wrote: >> >> On 01/29/2015 01:07 PM, Oleg Nesterov wrote: >>> On 01/23, Rik van Riel wrote: >>>>> Not only is this broken with my new code, but it looks like it may >>>>> be broken with the current code, too... >>> Lets (try to) fix unlazy_fpu/save_init_fpu at least. >>> >>> Dave, fpu_save_init() in do_bounds() and task_get_bounds_dir() looks >>> wrong too, shouldn't it use unlazy_fpu() ? See the changelog in 3/3. >> >> IIRC, the 'cpu_has_xsaveopt' on the CPUs that support will MPX will >> enable eagerfpu. > > unless eagerfpu=off? but this doesn't matter. Yeah, that's true. That would also explain why I haven't run in to this at all in testing. Ugh, fpu_save_init() says it isn't preempt safe anyway, so we shouldn't be using it. I'll send a fix.