From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756260AbcARSjt (ORCPT ); Mon, 18 Jan 2016 13:39:49 -0500 Received: from mx2.suse.de ([195.135.220.15]:51145 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755902AbcARSjp (ORCPT ); Mon, 18 Jan 2016 13:39:45 -0500 Date: Mon, 18 Jan 2016 19:39:21 +0100 From: Borislav Petkov To: Andy Lutomirski Cc: Brian Gerst , the arch/x86 maintainers , Linux Kernel Mailing List , Ingo Molnar , "H. Peter Anvin" , Denys Vlasenko , Linus Torvalds Subject: Re: [PATCH] x86: static_cpu_has_safe: discard dynamic check after init Message-ID: <20160118183921.GH12651@pd.tnic> References: <1452972124-7380-1-git-send-email-brgerst@gmail.com> <20160116193658.GC32085@pd.tnic> <20160117103337.GC8549@pd.tnic> <20160118181457.GG12651@pd.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 18, 2016 at 10:29:24AM -0800, Andy Lutomirski wrote: > I think that, if we can make static_cpu_has be unconditionally safe as > a result Problem with this is the additional .altinstructions entry for X86_FEATURE_ALWAYS. And sometimes you don't really need to use the _safe variant when you know you're safe. > and get rid of warn_pre_alternatives, That's off by default, behind CONFIG_X86_DEBUG_STATIC_CPU_HAS. -- Regards/Gruss, Boris. SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg) --