Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2156769ybb; Thu, 2 Apr 2020 14:22:08 -0700 (PDT) X-Google-Smtp-Source: APiQypIFimWBQ/c9HLQzsUd+3jJ50RJzWjvxo/t6g7zj2LwtLNm9ozGFyDYMTcpNoM1YvwmwpVYq X-Received: by 2002:a05:6830:d2:: with SMTP id x18mr4104306oto.273.1585862528713; Thu, 02 Apr 2020 14:22:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585862528; cv=none; d=google.com; s=arc-20160816; b=E3Hy1QL4eWTR+ImPc5JTAg+5cNc/ftUnRuGOqWLslWal856741vJCKFv3Buen2ZVc1 KYt11bvyUDHE804mSI9gARKN8Hort/dQtXjp2icywOtzX6WUW7nXwyhLh/s5nuIy75b2 hjzIlyt2PdrRxi3ybC2hu3Zu5ue8VtZip1jnE+ajtubo2EpyYDcvqiyojSDm2p0rqZQt uY9x8jwtWdFqWswYAe2mGIgPG3de3yXOcuJFd75vJih7MHeM0ZAAMJA3ty3Y+1y8tIdK TueLUsz3zVmmACnce/4980BLr51de3ClSqV4LG3SsNm3yWYCVgzJu5hDTDUeKDhKjIF2 C0Tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=G4MxCmYD5kvfEXwgRsQMJ4CEEIYRBts6DeJTHJzmi8E=; b=iXBSgZLt4pb4obSCZZVo6Owi625Gy7PrViy8108NVzzOaDROgEEgM/genqdPJFe1RR oJQNhtA5La2PpUltFeTfI8IE+1TlhV4uFF9LTvT2Y/ghI1I2xiee8MZbtfW7HtpuEnt3 pYbqO7QHvQFmyU8J6rtcTTnr+i431GSH40r7qohUd+wsfjXupuTKVob8k1L1W9VwLzP6 xukNQSeoHMECPGnEUUro5P73wHQDtstXkXGH7tTTP+gdCHMEN1kdywljKWKpSNloaeg9 rFXdVsX5voMAKc4P/h4zefGxXVR0BIa9DAgZ6DA7f6rLR6WE1BICjTsCKF1I3iYvvLr1 oViw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c22si2783973oib.266.2020.04.02.14.21.56; Thu, 02 Apr 2020 14:22:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389349AbgDBVQu (ORCPT + 99 others); Thu, 2 Apr 2020 17:16:50 -0400 Received: from mga12.intel.com ([192.55.52.136]:62658 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727412AbgDBVQu (ORCPT ); Thu, 2 Apr 2020 17:16:50 -0400 IronPort-SDR: 8JhihgL0nwZweKa0iE+aAnKtfYC0eOgbQDhNp4/U+LIektiY3UwZrd5Kis1xCoKEAdSYIh/55E 6m+E7PgpBXjg== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Apr 2020 14:16:49 -0700 IronPort-SDR: 4oGjkw+e1C/BxtLl7UO1+lAjcnIVLe5TjIZotoXcPJLEMEGgfv3cEBvADdLI28yPLyqovB3Hns YSRdw6ziWYPA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,336,1580803200"; d="scan'208";a="423292223" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.202]) by orsmga005.jf.intel.com with ESMTP; 02 Apr 2020 14:16:49 -0700 Date: Thu, 2 Apr 2020 14:16:49 -0700 From: Sean Christopherson To: Thomas Gleixner Cc: Peter Zijlstra , Xiaoyao Li , LKML , x86@kernel.org, "Kenneth R. Crudup" , Paolo Bonzini , Jessica Yu , Fenghua Yu , Nadav Amit , Thomas Hellstrom , Tony Luck , Steven Rostedt Subject: Re: [patch v2 1/2] x86,module: Detect VMX modules and disable Split-Lock-Detect Message-ID: <20200402211649.GA31023@linux.intel.com> References: <20200402124205.242674296@linutronix.de> <20200402152340.GL20713@hirez.programming.kicks-ass.net> <725ca48f-8194-658e-0296-65d4368803b5@intel.com> <20200402162548.GH20730@hirez.programming.kicks-ass.net> <2d2140c4-712a-2f8d-cde7-b3e64c28b204@intel.com> <87pncpn650.fsf@nanos.tec.linutronix.de> <20200402175127.GJ13879@linux.intel.com> <20200402185148.GL20730@hirez.programming.kicks-ass.net> <20200402202321.GL13879@linux.intel.com> <87blo9mwfu.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87blo9mwfu.fsf@nanos.tec.linutronix.de> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 02, 2020 at 11:04:05PM +0200, Thomas Gleixner wrote: > Sean Christopherson writes: > > On Thu, Apr 02, 2020 at 08:51:48PM +0200, Peter Zijlstra wrote: > >> On Thu, Apr 02, 2020 at 10:51:28AM -0700, Sean Christopherson wrote: > >> > On Thu, Apr 02, 2020 at 07:34:35PM +0200, Thomas Gleixner wrote: > >> > > Aside of that I'm still against the attempt of proliferating crap, > >> > > i.e. disabling it because the host is triggering it and then exposing it > >> > > to guests. The above does not change my mind in any way. This proposal > >> > > is still wrong. > >> > > >> > Eh, I still think the "off in host, on in guest" is a legit scenario for > >> > debug/development/testing, but I agree that the added complexity doesn't > >> > justify the minimal benefits versus sld_warn. > >> > >> Off in host on in guest seems utterly insane to me. Why do you care > >> about that? > > > > For development/debug/testing. Ignoring the core-scope stupidity of split > > lock, the _functional_ behavior of the host kernel and guest kernel are > > completely separate. The host can generate split locks all it wants, but > > other than performance, its bad behavior has no impact on the guest. > > > > For example, all of the debug that was done to eliminate split locks in the > > kernel could have been done in a KVM guest, even though the host kernel > > would not have yet been split-lock free. > > > > It's somewhat of a moot point now that the kernel is split-lock free. But, > > if I encountered a split lock panic on my system, the first thing I would > > do (after rebooting) would be to fire up a VM to try and reproduce and > > debug the issue. > > > > Oftentimes it's significantly easier to "enable" a feature in KVM, i.e. > > expose a feature to the guest, than it is to actually enable it in the > > kernel. Enabling KVM first doesn't work if there are hard dependencies on > > kernel enabling, e.g. most things that have an XSAVE component, but for a > > lot of features it's a viable strategy to enable KVM first, and then do all > > testing and debug inside a KVM guest. > > I can see that aspect, but there were pretty clear messages in one of > the other threads: > > "It's not about whether or not host is clean. It's for the cases that > users just don't want it enabled on host, to not break the > applications or drivers that do have split lock issue." > > "My thought is for CSPs that they might not turn on SLD on their > product environment. Any split lock in kernel or drivers may break > their service for tenants." > > which I back then called out as proliferating crap and ensuring that > this stuff never gets fixed. Or more likely, gets fixed, just not in upstream :-) > I still call it out as exactly that and you know as well as I do that > this is the reality. > > For people like you who actually want to debug stuff in a guest, the > extra 10 lines of hack on top of the other 1000 lines of hacks you > already have are not really something which justifies to give hardware > and OS/application vendors the easy way out to avoid fixing their broken > crap. Ya, I see where you're coming from. As above, I agree that having a "KVM only" mode does more harm than good.