lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 27 Mar 2012 14:25:41 +0200
From:	Kay Sievers <kay@...y.org>
To:	Avi Kivity <avi@...hat.com>
Cc:	Josh Triplett <josh@...htriplett.org>,
	Marcelo Tosatti <mtosatti@...hat.com>,
	Thomas Gleixner <tglx@...utronix.de>,
	Ingo Molnar <mingo@...hat.com>,
	"H. Peter Anvin" <hpa@...or.com>, x86@...nel.org,
	kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] kvm-intel: Auto-load on CPUs with VMX.

On Wed, Mar 21, 2012 at 14:41, Avi Kivity <avi@...hat.com> wrote:
> On 03/21/2012 08:33 AM, Josh Triplett wrote:
>> Enable x86 feature-based autoloading for the kvm-intel module on CPUs
>> with X86_FEATURE_VMX.
>>
>> Signed-off-by: Josh Triplett <josh@...htriplett.org>
>> ---
>>
>> I've tested this and it works correctly.  I can also supply the obvious
>> equivalent patch for kvm-amd on AMD CPUs with SVM, but I don't have any
>> such CPUs to test that on.
>>
>
> On the one hand this makes sense and is consistent with how other
> modules are loaded.  On the other hand this will waste memory for
> non-virt users running on distro kernels (but distro kernels can
> override this new behaviour anyway).
>
> I'm inclined to apply, but will wait for more comments.

Today, we auto-load matching modules for everything we find. It seems
still the best compromise for the default behaviour to make things
work without special care or knowledge, especially for distribution
users.

People who care, can simply 'optimize' that with blacklisting the
aliases in the modprobe config. That way stuff does not get
auto-loaded, but can still be modprobed manually by the module name.

We used to load these modules with rather broken shell scripts, poking
around in /proc/cpuinfo during bootup, anyway. So this standard way of
using an alias is by far the better alternative to it, and I'm all for
doing that.

For what it's worth:
  Acked-By: Kay Sievers <kay@...y.org>

Thanks,
Kay
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ