Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3081406ybt; Mon, 29 Jun 2020 14:51:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwPEXTbD5R8txn5sMWaGbq36QUFC3uM93I4l4394mbQaGAoheJeFR6hBM9undo47p7ddw8N X-Received: by 2002:a17:906:74dc:: with SMTP id z28mr16256000ejl.402.1593467494686; Mon, 29 Jun 2020 14:51:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593467494; cv=none; d=google.com; s=arc-20160816; b=aNUdIQ8R8QtE/wVd+F+UpjZJXa/O1l1S4Y34ZxU+kLG2VfRS6DllUDmdSa+s+xTD2N NSg9aKwd8js5OR75GRJMxxhi33wrkOm81Onci4B09/i/xm8/bC7KIg9dDuvAOvk6u10T 3W2GWApOtFLgIhb8TNcsYKjHeYxqKxrXpNtcqNQG+juAjBnmzcLCzqaYvIH6Tp/Hc5zN FFkJ5XSGmbXdAQU2y3TPS1rUoYs8QG0UAwT27nmAZLVjh/VcNMM1BwEEiopRR5FGAz7W rY+F0/0Dxvs3xEaDfya5Rb92ykoFErxlous9nQeVuLiAuPemDDwmyjB8wMZLFy/7IBf2 BLxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=PcqgEKTsos/xffTDWtdx7uB2/L3+HdDKUifV3PmM+8k=; b=a5hunW3Gv3sf5IQtUqiend1BvV+d6m4ivppqLx/mKvS9QcN+FXaAnHcUwerqhfWzLL kvykGsk+6xGjZmf4izeTZ5OFyJhSlaowmn7ZZQmBdVC5heDXUzRoiTD74VzCYLGjw5bj x2/yJwjnZCVx8PwyK0O1zlqimuJX10k2ILWT1TOGzamKEKn69TXB76Moij/nL8DBpRw/ UjbzTH48fYa6BMnQE1uWKnOOflMj2Mfn1dVRszitqKVl/PfosLW1TSoG6Q2TKBJvxj7m N5DhoymT6eDjhPGZS4qh0DnWM2Vi+ATkfPLCK2scmsd5bDgNCgYpyAgE41r7XI3BuIAP DgxQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e1si526045ejf.3.2020.06.29.14.51.12; Mon, 29 Jun 2020 14:51:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404213AbgF2VuN (ORCPT + 99 others); Mon, 29 Jun 2020 17:50:13 -0400 Received: from mga12.intel.com ([192.55.52.136]:23956 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404115AbgF2Vt4 (ORCPT ); Mon, 29 Jun 2020 17:49:56 -0400 IronPort-SDR: V6lqV12aAH74JgUsFf4SpQB0zciaXKzj+WXZIa648OUc9LJ72UI9ocTuQPYJH/HmtQ6noFeMu6 UI+yoYe7A49Q== X-IronPort-AV: E=McAfee;i="6000,8403,9666"; a="125718592" X-IronPort-AV: E=Sophos;i="5.75,295,1589266800"; d="scan'208";a="125718592" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Jun 2020 14:49:56 -0700 IronPort-SDR: 78RHerYZoP3QP/al+zc+OsHhaZkObvuUJwM7sUcT8D9eygdH4F+OKnTEPJZ2uKtcbx3HMh+BZE jkLEswkdwuNg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,295,1589266800"; d="scan'208";a="264946140" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.152]) by fmsmga007.fm.intel.com with ESMTP; 29 Jun 2020 14:49:56 -0700 Date: Mon, 29 Jun 2020 14:49:56 -0700 From: Sean Christopherson To: Andy Lutomirski Cc: "David P. Reed" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , X86 ML , "H. Peter Anvin" , Allison Randal , Enrico Weigelt , Greg Kroah-Hartman , Kate Stewart , "Peter Zijlstra (Intel)" , Randy Dunlap , Martin Molnar , Andy Lutomirski , Alexandre Chartre , Jann Horn , Dave Hansen , LKML Subject: Re: [PATCH v2] Fix undefined operation VMXOFF during reboot and crash Message-ID: <20200629214956.GA12962@linux.intel.com> References: <1593464072.34968499@apps.rackspace.com> <0AFABBBA-18B7-4E2F-BCE7-D69889CC0F79@amacapital.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <0AFABBBA-18B7-4E2F-BCE7-D69889CC0F79@amacapital.net> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 29, 2020 at 02:22:45PM -0700, Andy Lutomirski wrote: > > > > On Jun 29, 2020, at 1:54 PM, David P. Reed wrote: > > > > Simple question for those on the To: and CC: list here. Should I > > abandon any hope of this patch being accepted? It's been a long time. > > > > The non-response after I acknowledged that this was discovered by when > > working on a personal, non-commercial research project - which is > > "out-of-tree" (apparently dirty words on LKML) has me thinking my > > contribution is unwanted. That's fine, I suppose. I can maintain this patch > > out-of-tree as well. I did incorporate all the helpful suggestions I > > received in this second patch, and given some encouragement, will happily > > submit a revised v3 if there is any likelihood of acceptance. I'm wary of > > doing more radical changes (like combining emergency and normal paths). > > > > Sorry about being slow and less actively encouraging than we should be. We > absolutely welcome personal contributions. The actual problem is that > everyone is worked and we’re all slow. Also, you may be hitting a corner case > in the process: is this a KVM patch or an x86 patch? It's an x86 patch as it's not KVM specific, e.g. this code also helps play nice with out of tree hypervisors. The code change is mostly good, but it needs to be split up as there are three separate fixes: 1. Handle #UD on VMXON due to a race. 2. Mark memory and flags as clobbered by VMXON. 3. Change emergency_vmx_disable_all() to not manually check cpu_vmx_enabled(). Yes, the changes are tiny, but if for example #3 introduces a bug then we don't have to revert #1 and #2. Or perhaps older kernels are only subject to the #1 and #2 and thus dumping all three changes into a single patch makes it all harder to backport. In other words, all the usual "one change per patch" reasons.