Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp2235529ybb; Thu, 2 Apr 2020 16:10:47 -0700 (PDT) X-Google-Smtp-Source: APiQypILVLzrutNIybi66aR9hsVARFkI8tg4oZ1W1VWzwJMbD/P2bDrI8FC1gtG86MRdq7mbXMmB X-Received: by 2002:a9d:32b6:: with SMTP id u51mr4361321otb.268.1585869047772; Thu, 02 Apr 2020 16:10:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585869047; cv=none; d=google.com; s=arc-20160816; b=zQWsR2RvWV6w1HpeE2MQdBh65D1aZtkwXdNfbzYbYLbAQm6iUqRc0aJ4e4X7kraEEC XmFFR73Qdu1zvMnfgW5bqIwvswaN4gyEOXcCgmnPs/qsTDPkizh2kzS/n+knQDBEORsm V/3wYZvgHG9g3gv4T+j2+nUKfqn5KoB+efKwLlAfFZCddHn87EfoXQHcYjU8FNRqKX8w hAjNRYhLZPtogs/94vi2+bUgfUVWqeQ70LlZKICUrKtG384n0yTLLZD7zDO24eZXlOnN XX4TimDJPl3XNaZclVy2IeToTRYh6/8PH1gCbIXSAdSIRvKnTpa7Nvyede/FbRIDxGJh sipg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=8Uc4+d6EjZ2A9HM17tywwOGoKntdB9BYQ3fzxWPk1AI=; b=lSVdVBS2T52RGVzv1+QeZ1AgqljcljcGvCGGvlgfcOTWBqBmtwPeufvDNTJg2rsFIU oXJMW7hNm7QOdJEwx1U5rrGCQ4n/ZZ8GsNTk83BIG2sH6pCidR3T8qy9tuF1lm4eWsiB MEZOpzqBbwSQWgQsUVfQuTINGkbthI8NL0ZsUf6KfpNcHclTqc2sxHqgn2Ts2VOPn2Ub HTl4yVrE8xW4Ts8b8n7iQn9kOl0UHcYsuCEZWD5J3+rOrzH0nc9J+IPwxkUrsItydgKh uK/cQG2z99iCM+OTqgYe0ewBrdy0NuHQLFuLIdziYoBJO5EeJIlWib6YUzXsk1cNSf0R RrSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y110si2895954otb.71.2020.04.02.16.10.10; Thu, 02 Apr 2020 16:10:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390131AbgDBXIo (ORCPT + 99 others); Thu, 2 Apr 2020 19:08:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:56734 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732600AbgDBXIo (ORCPT ); Thu, 2 Apr 2020 19:08:44 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DF1092073B; Thu, 2 Apr 2020 23:08:41 +0000 (UTC) Date: Thu, 2 Apr 2020 19:08:39 -0400 From: Steven Rostedt To: Nadav Amit Cc: Thomas Gleixner , Sean Christopherson , x86 , "Kenneth R . Crudup" , Paolo Bonzini , Fenghua Yu , Xiaoyao Li , Thomas Hellstrom , Tony Luck , Peter Zijlstra , Jessica Yu , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , kvm , LKML , Doug Covelli Subject: Re: [PATCH 3/3] KVM: VMX: Extend VMX's #AC interceptor to handle split lock #AC in guest Message-ID: <20200402190839.00315012@gandalf.local.home> In-Reply-To: <08D90BEB-89F6-4D94-8C2E-A21E43646938@vmware.com> References: <20200402124205.334622628@linutronix.de> <20200402155554.27705-1-sean.j.christopherson@intel.com> <20200402155554.27705-4-sean.j.christopherson@intel.com> <87sghln6tr.fsf@nanos.tec.linutronix.de> <20200402174023.GI13879@linux.intel.com> <87h7y1mz2s.fsf@nanos.tec.linutronix.de> <20200402205109.GM13879@linux.intel.com> <87zhbtle15.fsf@nanos.tec.linutronix.de> <08D90BEB-89F6-4D94-8C2E-A21E43646938@vmware.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2 Apr 2020 22:40:03 +0000 Nadav Amit wrote: > > On Apr 2, 2020, at 3:27 PM, Thomas Gleixner wrote: > > > > As I just verified, it's possible to load the vmware module parallel > > to the KVM/VMX one. > > > > So either we deal with it in some way or just decide that SLD and HV > > modules which do not have the MOD_INFO(sld_safe) magic cannot be loaded > > when SLD is enabled on the host. I'm fine with the latter :) > > > > What a mess. > > [ +Doug ] > > Just to communicate the information that was given to me: we do intend to > fix the SLD issue in VMware and if needed to release a minor version that > addresses it. Having said that, there are other hypervisors, such as > virtualbox or jailhouse, which would have a similar issue. If we go the approach of not letting VM modules load if it doesn't have the sld_safe flag set, how is this different than a VM module not loading due to kabi breakage? If we prevent it from loading (and keeping from having to go into this inconsistent state that Thomas described), it would encourage people to get the latest modules, and the maintainers of said modules motivation to update them. -- Steve