From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751579AbcAMXXF (ORCPT ); Wed, 13 Jan 2016 18:23:05 -0500 Received: from mail-wm0-f68.google.com ([74.125.82.68]:36563 "EHLO mail-wm0-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751107AbcAMXXA (ORCPT ); Wed, 13 Jan 2016 18:23:00 -0500 MIME-Version: 1.0 In-Reply-To: <20160111104425.GA29448@gmail.com> References: <19f6403f2b04d3448ed2ac958e656645d8b6e70c.1452297867.git.tony.luck@intel.com> <20160110112635.GC22896@pd.tnic> <20160111104425.GA29448@gmail.com> Date: Wed, 13 Jan 2016 15:22:58 -0800 Message-ID: Subject: Re: [PATCH v8 3/3] x86, mce: Add __mcsafe_copy() From: Tony Luck To: Ingo Molnar Cc: Borislav Petkov , Dan Williams , Andy Lutomirski , linux-nvdimm , "linux-kernel@vger.kernel.org" , Andrew Morton , Robert , "linux-mm@kvack.org" , X86 ML Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jan 11, 2016 at 2:44 AM, Ingo Molnar wrote: > So such a synthetic CPUID bit would definitely be useful. > > Also, knowing whether a memcpy function is recoverable or not, should not be > delegated to callers: there should be the regular memcpy APIs, plus new APIs that > do everything they can to provide recoverable memory copies. Whether it's achieved > via flag checking, a function pointer or code patching is an implementation detail > that's not visible to drivers making use of the new facility. > > I'd go for the simplest, most robust solution initially, also perhaps with boot > time messages to make sure users know which variant is used and now. Are there some examples of synthetic CPUID bits? I grepped around and found a handful of places making ad hoc decisions based on sub-strings of x86_model_id[] ... but didn't find any systematic approach. -Tony