Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp938482ybb; Fri, 3 Apr 2020 14:50:33 -0700 (PDT) X-Google-Smtp-Source: APiQypLBFDT5GzTUIlYkGk7/E27i1FfvipEiPIs9JShwBsy3dNZJx/jAEFYqy4vdpKdX6k+x0PVS X-Received: by 2002:a05:6830:1e93:: with SMTP id n19mr8671935otr.153.1585950633531; Fri, 03 Apr 2020 14:50:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585950633; cv=none; d=google.com; s=arc-20160816; b=S2MWD49rdmcWELWF29cNTIqAqTvfq9jcKnz7Z5das+NYXEtkcihcj5DyGAAjSBwuew lzvG3KAabGm9gBPNzC0APWCJq2a1Q7EH+nxRX+hCt98UVz0twao/RKVRnPQcASjCWymb vQ/7imK50NodlCkQx8vMrgUatl/qfivTTI6AwtN4rTiqyktKE8Gr3Nahss8HOyINCKr6 Tw/KdcRjsH5aO5jDXjWQIxJITFANWCYHUEYt/YkvQinobToYQVjhdMzg/XbY1uAhQvdx dTauiYnv/yUCp5d/5pJJ8CNa8Dl13Ho4OFn0J956mGhnJL5GW8VfTgAREudoVWtnOOBc Rylw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:references:in-reply-to:subject:cc:to:from; bh=xXeK0zl7GfBMIBY3haL/BUXZxH/i2NnArpxXstKGU2E=; b=jzkr3yKpC2EUj7yG6eHfJF5RzGVTBGr7ZYwmrZf5tdrKEvtAezryDKUeFucSKWOzcy Xl+GndTBR3B58xTolp3CzZXui9E03GdszwOApiqQdMSSyq7HCHcdbKb3RPHjUT/JI3zl uch7dPO2OiJEcpYOb6PHxRF048GAoSyn4xchWeotS1ijDX+hZemCOvb4s4IcrlNPhqlv vmrIzIup8gL+42YtrrFC7bsMAUqoMUSMjLD0wWMlhrdwDS4n1TzUYsbCLjuA/F4opxsV T6c7u9DNIMprZYPxpbYZi+K5hBNJiLMGi/9KX6UqXnN75jShwxWmxl0opoiDrI/7+XSc I4XQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c13si4218744oig.220.2020.04.03.14.50.20; Fri, 03 Apr 2020 14:50:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728102AbgDCVuA convert rfc822-to-8bit (ORCPT + 99 others); Fri, 3 Apr 2020 17:50:00 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:41071 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726460AbgDCVuA (ORCPT ); Fri, 3 Apr 2020 17:50:00 -0400 Received: from p5de0bf0b.dip0.t-ipconnect.de ([93.224.191.11] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1jKUC0-0004hE-F0; Fri, 03 Apr 2020 23:49:36 +0200 Received: by nanos.tec.linutronix.de (Postfix, from userid 1000) id BEA49103A01; Fri, 3 Apr 2020 23:49:35 +0200 (CEST) From: Thomas Gleixner To: Andy Lutomirski Cc: Peter Zijlstra , Jessica Yu , Rasmus Villemoes , LKML , x86@kernel.org, "Kenneth R. Crudup" , Paolo Bonzini , Fenghua Yu , Xiaoyao Li , Nadav Amit , Thomas Hellstrom , Sean Christopherson , Tony Luck , Steven Rostedt , Greg Kroah-Hartman , jannh@google.com, keescook@chromium.org, vbox-dev@virtualbox.org Subject: Re: [patch 1/2] x86,module: Detect VMX modules and disable Split-Lock-Detect In-Reply-To: <737F6739-9B8B-4C73-91D3-B873D5780F5E@amacapital.net> References: <87o8s8l7t3.fsf@nanos.tec.linutronix.de> <737F6739-9B8B-4C73-91D3-B873D5780F5E@amacapital.net> Date: Fri, 03 Apr 2020 23:49:35 +0200 Message-ID: <87a73skzo0.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8BIT X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Andy Lutomirski writes: >> On Apr 3, 2020, at 11:54 AM, Thomas Gleixner wrote: >> Peter Zijlstra writes: >> Enough vented, but that still does not solve the SLD problem in any >> sensible way. > > Could we unexport set_memory_x perhaps? And maybe try to make > virtualbox break in as many ways as possible? set_memory_x() is not exported anymore, but they found new ways of circumvention. set_memory_x() is only used on really old kernels. Thanks, tglx