Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2144660imm; Thu, 23 Aug 2018 15:09:19 -0700 (PDT) X-Google-Smtp-Source: AA+uWPykslANiawnVkW/wBbfzn9btcBPASVjr9DXcGZCtei1RD4c1Ktnfnoi/hUsRvJcRmlABr2d X-Received: by 2002:a17:902:6b4c:: with SMTP id g12-v6mr59912591plt.159.1535062159509; Thu, 23 Aug 2018 15:09:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535062159; cv=none; d=google.com; s=arc-20160816; b=fesyZTfWPU1rrxWQq25deffiy8/5PoCWZHHVs5YhFW7uOmqu6h+KfQrMrtZH4hSzYy qajvaaZWqsOyAedH37hoA4Mf5/A/H1KAa1i/aqyi66GsROo9In+DFygRunGqQq5oYl0s GYjoSCwg4zvenUYCeFnU+KziFBB1XCnN945O2g6zTXhxNT9yTLxmTs0+TQ4//qhWGC6t V/G+Rra13oUifyExVr+ILTUuGAGmHWEk1fBViSdF1POJYnZKsbTllPMFUK1vCYzv5pDR q0MhZs2kvjLcmRz1p4t6fMRyoE0XwsAkHJ4NFwjgvBhm9l4z6uLvJXvj9bwXUfKGn0wB e0Ig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=v6G5vXncxUSF8843qkfP2esdJ8UZ4LhxYQjU0rZ4hq4=; b=f7J/Sdfeg7eq4Cg/20nr+lmhjxTlqT976HuT4qNp0f+rE6PN59OERysb6VIiZK0aje pyamRgvG0d9Dieyivx1hdU1De4O3IkQ3SZfzY3HKQBDM96iI2JGjzWJoujhGe+xJjOLh P79Ncu/BkzAzLCHdeAX/UmYhV4mPchj4Ii1sd3KVKADkfuXu/7xzRxSqdFts8ZGsTMYT NyzrJ7TAKL8waXCSgTPu+AH3lYMl7G0i7jiebyGfC5WBnPT6Q58Q18Hwzc7qi10YG9xF F1BBmTBH6pw6RUi6PSrkSJ2m7y/PY5DjRzxTdFCG76Hj7a1/Y1mGAlopmh39PBGKtaCE LB7Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a18-v6si5647263pfn.317.2018.08.23.15.09.02; Thu, 23 Aug 2018 15:09:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728322AbeHXBjg (ORCPT + 99 others); Thu, 23 Aug 2018 21:39:36 -0400 Received: from mga03.intel.com ([134.134.136.65]:9133 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726803AbeHXBjg (ORCPT ); Thu, 23 Aug 2018 21:39:36 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Aug 2018 15:07:53 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.53,279,1531810800"; d="scan'208";a="256759959" Received: from tassilo.jf.intel.com (HELO tassilo.localdomain) ([10.7.201.126]) by fmsmga005.fm.intel.com with ESMTP; 23 Aug 2018 15:07:53 -0700 Received: by tassilo.localdomain (Postfix, from userid 1000) id 3429E301B8F; Thu, 23 Aug 2018 15:07:53 -0700 (PDT) Date: Thu, 23 Aug 2018 15:07:53 -0700 From: Andi Kleen To: Michal Hocko Cc: Vlastimil Babka , Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org, Linus Torvalds , Dave Hansen , stable@vger.kernel.org Subject: Re: [PATCH] x86/speculation/l1tf: suggest what to do on systems with too much RAM Message-ID: <20180823220753.GG12066@tassilo.jf.intel.com> References: <20180823134418.17008-1-vbabka@suse.cz> <20180823142812.7363-1-vbabka@suse.cz> <20180823154648.GD12066@tassilo.jf.intel.com> <20180823192547.GS29735@dhcp22.suse.cz> <20180823193833.GE12066@tassilo.jf.intel.com> <20180823200520.GW29735@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180823200520.GW29735@dhcp22.suse.cz> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Aug 23, 2018 at 10:05:20PM +0200, Michal Hocko wrote: > On Thu 23-08-18 12:38:33, Andi Kleen wrote: > > > There are people who care about L1TF mitigations. I am not going to > > > question their motivation. In any case a hint how to make the mitigation > > > active again sounds more useful than something that sounds as scary as > > > "you are vulnerable". > > > > FWIW an early version of these patches automatically limited the available > > memory, but Linus pointed out that people likely prefer their memory. > > Nobody is questioning that. The point is to give them a hint on how to > make the mitigation active again without going to call for help. The > message does tell them how to _enable_ it and point them to the > documentation on how to _decide_. On the message I guess there are two cases: - either it's very little memory that is lost like in the 32GB + memory hole case. In this case maybe it's better if we just limit automatically if the overlap is small enough (<2GB perhaps?) - Or it's a lot of memory then people are unlikely to want to lose their memory and I don't think we really need the message either. Also I checked the bug again and it looks like the reporter has an IvyBridge. There is actually a better solution for those (anything Nehalem and newer) because they internally have at least 44 bits in the cache, which is good enough for the mitigation. Just need a quirk to override the bit width in this case (will submit a patch) -Andi