Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp2305877rdb; Thu, 21 Sep 2023 14:54:42 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHQSlqRRgo2RlW9DhCtSRfyle41iYsk0+oSSyPHL2NwSClOXoDqFcB+5QAAJlEZisSoijTc X-Received: by 2002:a05:6a21:498a:b0:15d:5f9a:3921 with SMTP id ax10-20020a056a21498a00b0015d5f9a3921mr2590211pzc.27.1695333282621; Thu, 21 Sep 2023 14:54:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695333282; cv=none; d=google.com; s=arc-20160816; b=FiuEzwLXNXeSGzcnxrY8BL5Acj3hS9Flerc7qafbp8JnBS9YPMMxtDByWBA90W42Tw caia4tw9MfeQCiz2SKMdZxyeIoGSVFXmQydURevxAtfBQUB0w6TCnRJ8FESEi13wNyAx VG3DAsJVHaG1Lpf01mbVLpTyc+N+bjLroa5rHehuj1AryFkFhlh42HLkPeXts6+H/b9M QuHI08RLEJIE6in6Nu/2V2B9agVzcVb1nTLJhXWZhvYWK779LPNc9JOKxQijQ7FM3yAL m9nUeI25gCq6QUqDePZ8fL8/SDluVylGehlybfiDFFq4FmgVNW3W7MJ8iP3oOhimyN6/ PcbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=W4bsSG198RE8VYJ538hZh769anHmI3vPkm1O9Bh+Qc4=; fh=z21qQDdJKkLDBlxcnjcg0hniT0rXImXqo6gcyxH2IPc=; b=BshTMXDaAw4f3bsYNbRTqEBgE23fug7UmbYdCIgt7HQTajGxLJ3lGTBsB+hsGf18g/ ygVQi8CWoP2rRzM4MpErAmjYDxrXdd0MXTJtSJUB40IwCEm/le4HpJ6qhJMQbItlSaVS LNtUdoifaAY5C/LKATkVG+oyAd8I1jlO17MORoeD8vv/vrV2pJ4BagS9F+KuiiovlN78 pBN6vCjZV8IUqXbFGiagpiJ1ggO2KoRf5a+qliHp76jiMudqUzhNDOmqn+aZ5Pfhzjnu tM5MluGNr/9cJE1l/sA2CxxCrsjgzwT4u1xihGqBxJw7k9YUU8PBYNd2c3phgbRvJraJ JjhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id q3-20020a170902a3c300b001bf1005924csi2178763plb.321.2023.09.21.14.54.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Sep 2023 14:54:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id C2B218086500; Thu, 21 Sep 2023 14:42:06 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231437AbjIUVmF (ORCPT + 99 others); Thu, 21 Sep 2023 17:42:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51512 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230020AbjIUVlw (ORCPT ); Thu, 21 Sep 2023 17:41:52 -0400 Received: from mailhost.m5p.com (mailhost.m5p.com [74.104.188.4]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3D3DA4F918 for ; Thu, 21 Sep 2023 14:19:45 -0700 (PDT) Received: from m5p.com (mailhost.m5p.com [IPv6:2001:470:1f07:15ff:0:0:0:f7]) by mailhost.m5p.com (8.17.1/8.15.2) with ESMTPS id 38LLItlr073396 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Thu, 21 Sep 2023 17:19:01 -0400 (EDT) (envelope-from ehem@m5p.com) Received: (from ehem@localhost) by m5p.com (8.17.1/8.15.2/Submit) id 38LLIsqq073395; Thu, 21 Sep 2023 14:18:54 -0700 (PDT) (envelope-from ehem) Date: Thu, 21 Sep 2023 14:18:54 -0700 From: Elliott Mitchell To: Borislav Petkov Cc: "Luck, Tony" , Yazen Ghannam , smita.koralahallichannabasappa@amd.com, linux-edac@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org, xen-devel@lists.xenproject.org, rric@kernel.org, james.morse@arm.com Subject: Re: [PATCH] Revert "EDAC/mce_amd: Do not load edac_mce_amd module on guests" Message-ID: References: <20210628172740.245689-1-Smita.KoralahalliChannabasappa@amd.com> <20230908035911.GAZPqcD/EjfKZ0ISrZ@fat_crate.local> <20230915115631.GAZQRGb0vCmEnUcaZI@fat_crate.local> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230915115631.GAZQRGb0vCmEnUcaZI@fat_crate.local> X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Thu, 21 Sep 2023 14:42:07 -0700 (PDT) On Fri, Sep 15, 2023 at 01:56:31PM +0200, Borislav Petkov wrote: > On Thu, Sep 14, 2023 at 10:02:05AM -0700, Elliott Mitchell wrote: > > Indeed. At what point is the lack of information and response long > > enough to simply commit a revert due to those lacks? > > At no point. > > > Even with the commit message having been rewritten and the link to: > > https://lkml.kernel.org/r/20210628172740.245689-1-Smita.KoralahalliChannabasappa@amd.com > > added, this still reads as roughly: > > > > "A hypothetical bug on a hypothetivisor" > > If "Hypervisors likely do not expose the SMCA feature to the guest" > doesn't explain to you what the problem is this commit is fixing, then > I can't help you. Problem is you were objecting to 'probable hypothetical "may" formulations' in what I wrote, yet the original patch message overtly uses that word. In order for the first patch to be correct, it is insufficient for the condition to be unlikely. Ideally it should be mathematically proven impossible. As such I was writing about known counter-examples from the real world. Mainly at least one hypervisor (Xen) does tend to allow a particular VM to access sensitive system registers. Also it is entirely possible some hypervisor could proxy access to the registers and thus properly simulate the events. Not only that, but in fact this very strategy was already actively deployed: https://bugs.debian.org/810964 I'm less than 100% certain this successfully retrieves EDAC events on Xen right now, so I had been taking a look at the situation only to find 767f4b620eda. Perhaps everyone should consult with large-scale system administrators when doing things which effect them? -- (\___(\___(\______ --=> 8-) EHM <=-- ______/)___/)___/) \BS ( | ehem+sigmsg@m5p.com PGP 87145445 | ) / \_CS\ | _____ -O #include O- _____ | / _/ 8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445