From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754992AbaKLCGv (ORCPT ); Tue, 11 Nov 2014 21:06:51 -0500 Received: from mail-wi0-f176.google.com ([209.85.212.176]:46922 "EHLO mail-wi0-f176.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754275AbaKLCGt (ORCPT ); Tue, 11 Nov 2014 21:06:49 -0500 MIME-Version: 1.0 In-Reply-To: <3908561D78D1C84285E8C5FCA982C28F3292A157@ORSMSX114.amr.corp.intel.com> References: <20141111213628.GP31490@pd.tnic> <20141111223316.GQ31490@pd.tnic> <20141111230926.GR31490@pd.tnic> <3908561D78D1C84285E8C5FCA982C28F3292A03B@ORSMSX114.amr.corp.intel.com> <3908561D78D1C84285E8C5FCA982C28F3292A157@ORSMSX114.amr.corp.intel.com> Date: Tue, 11 Nov 2014 18:06:48 -0800 X-Google-Sender-Auth: 6m9ZEsNTv2ej7jhaS59fJFb8EWw Message-ID: Subject: Re: [RFC PATCH] x86, entry: Switch stacks on a paranoid entry from userspace From: Tony Luck To: Andy Lutomirski Cc: Borislav Petkov , X86 ML , "linux-kernel@vger.kernel.org" , Peter Zijlstra , Oleg Nesterov , Andi Kleen Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Innocent bystanders have RIPV=1, EIPV=0 in MCG_STATUS ... so they > are quite easy to spot. Bother ... except for the SRAO cases where *everyone* is an innocent bystander - but someone should go look for the error and queue up a page offline event. Perhaps for this we'd do the self-ipi trick and then scan the banks to look for SRAO signatures to process as well as clearing MCIP -Tony