Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2123633ybb; Thu, 2 Apr 2020 13:37:41 -0700 (PDT) X-Google-Smtp-Source: APiQypJsRhIPl1uhRUp4XvLtUdG30ts9OOLnn0z0i7/8+eEzXB8epnLSob/xAsJZSLd4gDRrqvAj X-Received: by 2002:aca:4a55:: with SMTP id x82mr767416oia.28.1585859861365; Thu, 02 Apr 2020 13:37:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585859861; cv=none; d=google.com; s=arc-20160816; b=JrF78JLhkFJ0cGYGQrdNaoSg8bDx62eCLxjp5wsNVM57Gqm9rczWALANLApbDGzW2t U6qLGwYCfCZ2B2eS9KFBhmFmHX96WyB7qs0KkNzoX3qZ4X3MZKWfqnvaxNhYk7CT3fod A56suPGDz8HJjzGtDRQSoFRyQj++W0XZ0hvJskFBJatZb8s1i1KGH9SSH7ivhRrpj1Qr +Oj58MKR+AOrmcTtA0uuWrt9yCGcqDaK4AhT6zA30eywSveEzjxAJTumry9lqWweOvQK Xe379rjI6m1d48tzU8l0qIqPP5iarLqcol7kvYm6IXjBxtzGXEbrdNFWnSr8JUhdwsQf 9PiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=nwK208M0zL0bNEvpviyBOwrNXET0m5mTQAoaa34xz/E=; b=WP9CWAGVkwAIsmzJOQemRxkM6khTaojtpDv3GXt4sbVUMCZEZY+KDZKL8J4goBvc+V OSTHvrmfni3lCAny1dlYVvKd8siMVM7gtCiU/NLYNE6cT5cVzrZDAsmqebbFjt3JrW7b BhzJco5nFv4f1NNUE87WOVGxoWCsyG9rwqDHSj5YjZSR6U/t9XBXpApUi0CdYftMwSok 8wSETpGQITqv8PGzG5h493HLbNNXIX3peObZEy0SxVme9gvEIgMyKmvj/egfRCK5cPh2 Ml5xkTNHn8KMeVAzK3VpYQJwH2zHDN+MEX5tIT41gIpuSJsKFdWCmqRs3AwOoFSCFaC1 lsXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e14si3256018otf.226.2020.04.02.13.37.29; Thu, 02 Apr 2020 13:37:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389453AbgDBUXX (ORCPT + 99 others); Thu, 2 Apr 2020 16:23:23 -0400 Received: from mga04.intel.com ([192.55.52.120]:5932 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389346AbgDBUXW (ORCPT ); Thu, 2 Apr 2020 16:23:22 -0400 IronPort-SDR: 5nwEN14NT9HmGHE88iK6Ryl617VZ4KoUediYIXQSnajn+c/oEldRTqT5a7l4KEwREcfig/Ceqw pYbiK2m7744w== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2020 13:23:22 -0700 IronPort-SDR: n/l1aennqb4MnuHqZrcmZbZt1UqGcxHReyElOaCBGCVzw218WLfCFq/TSGZ0TJr5WM+Td7ECqr GhINnGPyCVbg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,336,1580803200"; d="scan'208";a="449771833" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.202]) by fmsmga005.fm.intel.com with ESMTP; 02 Apr 2020 13:23:21 -0700 Date: Thu, 2 Apr 2020 13:23:21 -0700 From: Sean Christopherson To: Peter Zijlstra Cc: Thomas Gleixner , Xiaoyao Li , LKML , x86@kernel.org, "Kenneth R. Crudup" , Paolo Bonzini , Jessica Yu , Fenghua Yu , Nadav Amit , Thomas Hellstrom , Tony Luck , Steven Rostedt Subject: Re: [patch v2 1/2] x86,module: Detect VMX modules and disable Split-Lock-Detect Message-ID: <20200402202321.GL13879@linux.intel.com> References: <20200402123258.895628824@linutronix.de> <20200402124205.242674296@linutronix.de> <20200402152340.GL20713@hirez.programming.kicks-ass.net> <725ca48f-8194-658e-0296-65d4368803b5@intel.com> <20200402162548.GH20730@hirez.programming.kicks-ass.net> <2d2140c4-712a-2f8d-cde7-b3e64c28b204@intel.com> <87pncpn650.fsf@nanos.tec.linutronix.de> <20200402175127.GJ13879@linux.intel.com> <20200402185148.GL20730@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200402185148.GL20730@hirez.programming.kicks-ass.net> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 02, 2020 at 08:51:48PM +0200, Peter Zijlstra wrote: > On Thu, Apr 02, 2020 at 10:51:28AM -0700, Sean Christopherson wrote: > > On Thu, Apr 02, 2020 at 07:34:35PM +0200, Thomas Gleixner wrote: > > > Aside of that I'm still against the attempt of proliferating crap, > > > i.e. disabling it because the host is triggering it and then exposing it > > > to guests. The above does not change my mind in any way. This proposal > > > is still wrong. > > > > Eh, I still think the "off in host, on in guest" is a legit scenario for > > debug/development/testing, but I agree that the added complexity doesn't > > justify the minimal benefits versus sld_warn. > > Off in host on in guest seems utterly insane to me. Why do you care > about that? For development/debug/testing. Ignoring the core-scope stupidity of split lock, the _functional_ behavior of the host kernel and guest kernel are completely separate. The host can generate split locks all it wants, but other than performance, its bad behavior has no impact on the guest. For example, all of the debug that was done to eliminate split locks in the kernel could have been done in a KVM guest, even though the host kernel would not have yet been split-lock free. It's somewhat of a moot point now that the kernel is split-lock free. But, if I encountered a split lock panic on my system, the first thing I would do (after rebooting) would be to fire up a VM to try and reproduce and debug the issue. Oftentimes it's significantly easier to "enable" a feature in KVM, i.e. expose a feature to the guest, than it is to actually enable it in the kernel. Enabling KVM first doesn't work if there are hard dependencies on kernel enabling, e.g. most things that have an XSAVE component, but for a lot of features it's a viable strategy to enable KVM first, and then do all testing and debug inside a KVM guest.