Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5524627yba; Mon, 13 May 2019 12:22:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqz1ZWKl8T0lCZdXUkWDz64+zeIj/+IJz8l6GIehhQJ6sQA5+M7EuuXguZsPPgi+Zqb8hmuF X-Received: by 2002:a65:480c:: with SMTP id h12mr32779666pgs.266.1557775374549; Mon, 13 May 2019 12:22:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557775374; cv=none; d=google.com; s=arc-20160816; b=Oy02/43P7fQfLtkz79Sl9+xIYhN1Bolexo/DssFjtBYR13CyoD6JYl5Ot9a2m7TvMP F7gr6QKncvEjH+k8R4vTSJq/R/o1QbpLbEHOjIe3Xm9Zb4bmr0kpf0qi39uVBYoFndbm SLg6ACHLxOOnxMgC9HVFw95VWsezTZzFp3L8Skio6r/tUteZjrrpQNzDpVOvaSDy3HIe aNJUjjN+BGirfxDLDQpN7l+bmbovZM/UqUZC3EoCuMr44pjLCjRIJop9+/0GlyVoKfim yyMnGpPOtAX3SWYLSBo+3CCaHMWq90e6OSs3tF3FAqBC7HYw3jcYhcpN70oAXDioep39 qhrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=CX+WwNrHxbi6+vKJH849ujFTw6wRLqJatbYNgyEeksI=; b=V8gUjWTmgAzN3vwglG0NYK361LVXmMyqg4XXqwLagFRctNJUQ75j+F7hPYLZntl1Lm NflV2+nnBRCxsToTP8GeSYPzsM3xGmR/oMSyPw3N+78UEASYyJJYPf42rUVUAHmloUE6 zhfwz0x+PUKqO0GoSvOgalCCgJTmGw6A5AZTMQljs89Y3gfbqB7DDxmrz69Lj0nhpD93 s9UKhQVRx1Q/OCf3QxPxgL0SbJN5JHzk/BY6VgfmeJWCLyNa22CU+Ah4l8whLjwdj3DN PM3EMeuSIkHmg0WE+f3fiICetVCH8YU5g37rO1YpJ/echU5rV+zOEwTRyIegnL2GN+Qz eF+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mImlR6Is; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16si19385591plm.65.2019.05.13.12.22.36; Mon, 13 May 2019 12:22:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mImlR6Is; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728905AbfEMPqg (ORCPT + 99 others); Mon, 13 May 2019 11:46:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:34156 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726814AbfEMPqg (ORCPT ); Mon, 13 May 2019 11:46:36 -0400 Received: from mail-wm1-f50.google.com (mail-wm1-f50.google.com [209.85.128.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 79B692147A for ; Mon, 13 May 2019 15:46:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557762395; bh=OcS05eqt08syOJc9XJ+Dq4To3jKF7QcT29fpWx88obU=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=mImlR6Is3TMf8fni+IDHdVAZsE7/1M0GTnfOaMuLRGfn1j1/BDu3RGxid6M+0vEiu TFTwQ6jlT+YHrBRxipQ8awjHA/fJy38yEvFDnls8nlN4k82xHuQ7q8V28aXBH0UBQe sppUfQgNAihbuliOSVH+T+E061V8MR3QzVezRa2w= Received: by mail-wm1-f50.google.com with SMTP id 198so14357617wme.3 for ; Mon, 13 May 2019 08:46:35 -0700 (PDT) X-Gm-Message-State: APjAAAWcxwKKE9IUNqmeXVJxgo8SkpVyyPGvzVf8afbfATaeKkKYORwy m0MJ1vXtUzgv/k6FT/uTpGn9sXnDUQwQNGvbcCzYnA== X-Received: by 2002:a1c:eb18:: with SMTP id j24mr16973110wmh.32.1557762394127; Mon, 13 May 2019 08:46:34 -0700 (PDT) MIME-Version: 1.0 References: <1557758315-12667-1-git-send-email-alexandre.chartre@oracle.com> <1557758315-12667-3-git-send-email-alexandre.chartre@oracle.com> In-Reply-To: <1557758315-12667-3-git-send-email-alexandre.chartre@oracle.com> From: Andy Lutomirski Date: Mon, 13 May 2019 08:46:22 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC KVM 02/27] KVM: x86: Introduce address_space_isolation module parameter To: Alexandre Chartre Cc: Paolo Bonzini , Radim Krcmar , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Dave Hansen , Andrew Lutomirski , Peter Zijlstra , kvm list , X86 ML , Linux-MM , LKML , Konrad Rzeszutek Wilk , jan.setjeeilers@oracle.com, Liran Alon , Jonathan Adams Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 13, 2019 at 7:39 AM Alexandre Chartre wrote: > > From: Liran Alon > > Add the address_space_isolation parameter to the kvm module. > > When set to true, KVM #VMExit handlers run in isolated address space > which maps only KVM required code and per-VM information instead of > entire kernel address space. Does the *entry* also get isolated? If not, it seems less useful for side-channel mitigation.