Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp4556340rdb; Fri, 15 Sep 2023 06:03:58 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHEr9+ooPTCY/ewmN3gKBvat4O267DVyWj3pZkW78u2w1owdOVn8v57HFROXTXuzm5j/X+Q X-Received: by 2002:a05:6a20:dd82:b0:137:30db:bc35 with SMTP id kw2-20020a056a20dd8200b0013730dbbc35mr1527735pzb.27.1694783038071; Fri, 15 Sep 2023 06:03:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694783038; cv=none; d=google.com; s=arc-20160816; b=FPZwa87kW7NcLEKCyQN2QpbEcZKfMd1wH3RfbAuNyVVIvsuE6A4D4vJZaN3rx9Ckxw 7y1WmifadNIbW4mll40k7IlIF0a3Ka5l3CylJ3DmWHtqkqUvjKYcDC4XclTiwl5amhbD 6Mvm7LOI9d0/Inte/34Acqxu90yYmCk31AwegPAoG3jGbAFA9IVHICfq24onvUALy7oG nex49UI000ktkUNT8OgJjUNRe58ia+frihR+D1nYNvStEl37gFkYDx3fF0wkDHO36pQy xaPPToYMZb0vz9RAN/B4wNT0wLhrOIf6na0fUtIW4iOz7aaZEY9aePfBT+7hd3Dx2AxE eZWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature:dkim-filter; bh=Dtj/ryT9PtzyNAYJFW0neqg88SKiucgUubfUdZkU8WU=; fh=aYjeJJEegKKwpcHmyrdRoeEqz3iUBdnN2LI7yn/QY/Q=; b=gM0GZLLDdS4iOQ57SHoizA76Vp1MzS0Rw7LSahG+Te8Po+YtSrcVWZLHjLRAP5X2Kq dlSgVcuapkarewdiENMCyBiELorYbMdm4df5AXlnjxqYp7GgpOuXD94KRpoUQPuyDBZV yrV3ZBJhtNndXcjV3mnS7av/pLmH9n4EbQPcyXbwT+T2TwaDktI4rH4cMr1mFEdEPLkI MqDtEVqmNcpW8kIiclxhpqgeEX20R/iavSXAPQUF7cPMxMFzsUEYQVCjuSR5vRsHYd3y OnFTuaA+x3pNkdDwzfO1Xf7xB8a6pYY56MLO/8WGCLmE9d1OK82h1lPOP4sr13ghQ4DA gJPQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b="Tl/KAqnp"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id s16-20020a656450000000b00574134c9ac9si3298030pgv.521.2023.09.15.06.03.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Sep 2023 06:03:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b="Tl/KAqnp"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 2F42D83DD69F; Fri, 15 Sep 2023 04:33:08 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234237AbjIOLdE (ORCPT + 99 others); Fri, 15 Sep 2023 07:33:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37768 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233213AbjIOLdE (ORCPT ); Fri, 15 Sep 2023 07:33:04 -0400 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5F81D1AB; Fri, 15 Sep 2023 04:32:59 -0700 (PDT) Received: by linux.microsoft.com (Postfix, from userid 1127) id B273B212BE71; Fri, 15 Sep 2023 04:32:58 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com B273B212BE71 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1694777578; bh=Dtj/ryT9PtzyNAYJFW0neqg88SKiucgUubfUdZkU8WU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Tl/KAqnpHbzC445uggyxkJDlewAN0SZy8jILuUKI9Tfcb+iGNUUMqGrZyVwD3w56K Q7XCtUBZmJ/KZaY0vpk7ZaTlHBRi0jMqf/0mRUWM9WeAxCmsYu/SgllWs1O7ZNOkMd SHipndaxshC+g22TcXN4EYCPMwSesCsUvtZBDoBQ= Date: Fri, 15 Sep 2023 04:32:58 -0700 From: Saurabh Singh Sengar To: Mathias Krause Cc: linux-hyperv@vger.kernel.org, "K. Y. Srinivasan" , Haiyang Zhang , Wei Liu , Dexuan Cui , linux-kernel@vger.kernel.org, stable@kernel.org Subject: Re: [PATCH] x86/hyperv/vtl: Replace real_mode_header only under Hyper-V Message-ID: <20230915113258.GA24381@linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net> References: <20230908102610.1039767-1-minipli@grsecurity.net> <20230908150224.GA3196@linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net> <20230913052714.GA29112@linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net> <92c52af3-085e-8467-88bf-da4fbc56eeaa@grsecurity.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <92c52af3-085e-8467-88bf-da4fbc56eeaa@grsecurity.net> User-Agent: Mutt/1.5.21 (2010-09-15) X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 15 Sep 2023 04:33:08 -0700 (PDT) On Fri, Sep 15, 2023 at 09:06:15AM +0200, Mathias Krause wrote: > On 13.09.23 07:27, Saurabh Singh Sengar wrote: > > On Mon, Sep 11, 2023 at 10:00:59AM +0200, Mathias Krause wrote: > >> On 08.09.23 17:02, Saurabh Singh Sengar wrote: > >>> On Fri, Sep 08, 2023 at 12:26:10PM +0200, Mathias Krause wrote: > >>>> Booting a CONFIG_HYPERV_VTL_MODE=y enabled kernel on bare metal or a > >>>> non-Hyper-V hypervisor leads to serve memory corruption as > >>> > >>> FWIW, CONFIG_HYPERV_VTL_MODE is not expected to be enabled for non VTL > >>> platforms. > > Well, if you want to prevent people from using it, make it depend on > BROKEN, because that's what it is. All the other hypervisor support in > the kernel (Xen, VMware, KVM, ACRN, Jailhouse, even plain Hyper-V) can > perfectly cope with getting booted on a different hypervisor or bare > metal. Why is Hyper-V's VTL mode such a special snow flake that it has > to cause random memory corruption and, in turn, crash the kernel with > spectacular (and undebugable) fireworks if it's not booted under Hyper-V? 'BROKEN' is certainly not the right choice here. If it is used on the correct platform as it is designed to be nothing is broken. The default option for CONFIG_HYPERV_VTL_MODE is set to 'N', there is sufficient documentation for it as well. I agree there can be cases where people can still end up enabling it, for that EXPERT is a reasonable solution. - Saurabh > > Thanks, > Mathias