Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp415126ybb; Fri, 3 Apr 2020 05:17:16 -0700 (PDT) X-Google-Smtp-Source: APiQypIQBoYjzkrhS7hconD44WQLNVj3e/9z80YvUYU9Bg8NB8i231lLhk7tjrMEkgJsAXoDzNyH X-Received: by 2002:aca:4f57:: with SMTP id d84mr2555441oib.161.1585916236745; Fri, 03 Apr 2020 05:17:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585916236; cv=none; d=google.com; s=arc-20160816; b=OUVJpXtHQ87ZgucpFjF4R8syagjbUi03qlXLGl9s03kSPWXgGMyKGCCzxgrXc9yufd HWHv3/jGUKt79TITYPyDwxfGpxUxyhP6b+meE4nM2AH7wrM1OfCoeUmhdjfCf/i+OiHl JFKsmuJRChMAV6Mnl6NBPbUztIWFFHjfJMoU1sFa7k+xL0Jrpnz4CaFipWs1SdbQIyGN efzEI0zAFeuHOAkLBE10pLTXPzWJOAqj2QiIMvrfiqC2rYjGlJTL9gKRrlMMRewe9d+l ncKc0g1OF7qmxU7p1sq1+RylmfUOprSOXtFl7KFJH3WseUn4vWZy2MTRaNzXtVS5SEBS 8FyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=v0ngeROyZrMTz3gW1uAZBEbF1/wZow4hDO/A8PFzVKQ=; b=USNctN4IlxTWocSN3/CGofNIVf2eBvx9YzknDKJlUOd49GhiipxgL2xnWEQ8HmbV6w SE+Lkkarne8e0IkdgS7UBg1Qdf2ipFl7DizyiQvlrMABRYiR4r8VGl16PAA0ScQpwxc1 rfZoyp2uJRfR180DKu/XRRjY+/PHclOvIY+8YFPr0i+Oury5qy3kvBBhRdvRs2eaK7l7 MUJeE2izq/lGaOXX55+dCnwxntGneUybxtEO9h+3e22upGPE3s+CC3ZL2G4wgTf77i5/ AvZdgC0SeT4OoTLciSNtACB+EFU/+wWGrtFD1IlFKCXzHavHiqgArRA0LHMvcXC1gY1I oCMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i4si699118oiy.222.2020.04.03.05.17.03; Fri, 03 Apr 2020 05:17:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2403905AbgDCMQq (ORCPT + 99 others); Fri, 3 Apr 2020 08:16:46 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:40148 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403836AbgDCMQq (ORCPT ); Fri, 3 Apr 2020 08:16:46 -0400 Received: from p5de0bf0b.dip0.t-ipconnect.de ([93.224.191.11] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jKLF5-0005yc-FS; Fri, 03 Apr 2020 14:16:11 +0200 Received: by nanos.tec.linutronix.de (Postfix, from userid 1000) id C5CE3103A01; Fri, 3 Apr 2020 14:16:10 +0200 (CEST) From: Thomas Gleixner To: Jim Mattson , "Kenneth R. Crudup" Cc: Steven Rostedt , Nadav Amit , Sean Christopherson , x86 , Paolo Bonzini , Fenghua Yu , Xiaoyao Li , Thomas Hellstrom , Tony Luck , Peter Zijlstra , Jessica Yu , Vitaly Kuznetsov , Wanpeng Li , kvm , LKML , Doug Covelli Subject: Re: [PATCH 3/3] KVM: VMX: Extend VMX's #AC interceptor to handle split lock #AC in guest In-Reply-To: References: <20200402124205.334622628@linutronix.de> <20200402155554.27705-1-sean.j.christopherson@intel.com> <20200402155554.27705-4-sean.j.christopherson@intel.com> <87sghln6tr.fsf@nanos.tec.linutronix.de> <20200402174023.GI13879@linux.intel.com> <87h7y1mz2s.fsf@nanos.tec.linutronix.de> <20200402205109.GM13879@linux.intel.com> <87zhbtle15.fsf@nanos.tec.linutronix.de> <08D90BEB-89F6-4D94-8C2E-A21E43646938@vmware.com> <20200402190839.00315012@gandalf.local.home> Date: Fri, 03 Apr 2020 14:16:10 +0200 Message-ID: <87tv20lq7p.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Jim, Jim Mattson writes: > On Thu, Apr 2, 2020 at 4:16 PM Kenneth R. Crudup wrote: >> On Thu, 2 Apr 2020, Steven Rostedt wrote: >> >> > If we go the approach of not letting VM modules load if it doesn't have the >> > sld_safe flag set, how is this different than a VM module not loading due >> > to kabi breakage? >> >> Why not a compromise: if such a module is attempted to be loaded, print up >> a message saying something akin to "turn the parameter 'split_lock_detect' >> off" as we reject loading it- and if we see that we've booted with it off >> just splat a WARN_ON() if someone tries to load such modules? > > What modules are we talking about? I thought we were discussing L1 > hypervisors, which are just binary blobs. The only modules at the L0 > level are kvm and kvm_intel. Maybe in your world, but VmWare (which got this started), VirtualBox, Jailhouse and who knows what else _are_ L0 hypervisors. Otherwise we wouldn't have that conversation at all. Thanks, tglx