[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ZQyzPncxg2HYzlQI@mattapan.m5p.com>
Date: Thu, 21 Sep 2023 14:18:54 -0700
From: Elliott Mitchell <ehem+xen@....com>
To: Borislav Petkov <bp@...en8.de>
Cc: "Luck, Tony" <tony.luck@...el.com>,
Yazen Ghannam <yazen.ghannam@....com>,
smita.koralahallichannabasappa@....com, linux-edac@...r.kernel.org,
linux-kernel@...r.kernel.org, x86@...nel.org,
xen-devel@...ts.xenproject.org, rric@...nel.org,
james.morse@....com
Subject: Re: [PATCH] Revert "EDAC/mce_amd: Do not load edac_mce_amd module on
guests"
On Fri, Sep 15, 2023 at 01:56:31PM +0200, Borislav Petkov wrote:
> On Thu, Sep 14, 2023 at 10:02:05AM -0700, Elliott Mitchell wrote:
> > Indeed. At what point is the lack of information and response long
> > enough to simply commit a revert due to those lacks?
>
> At no point.
>
> > Even with the commit message having been rewritten and the link to:
> > https://lkml.kernel.org/r/20210628172740.245689-1-Smita.KoralahalliChannabasappa@amd.com
> > added, this still reads as roughly:
> >
> > "A hypothetical bug on a hypothetivisor"
>
> If "Hypervisors likely do not expose the SMCA feature to the guest"
> doesn't explain to you what the problem is this commit is fixing, then
> I can't help you.
Problem is you were objecting to 'probable hypothetical "may"
formulations' in what I wrote, yet the original patch message overtly
uses that word.
In order for the first patch to be correct, it is insufficient for the
condition to be unlikely. Ideally it should be mathematically proven
impossible.
As such I was writing about known counter-examples from the real world.
Mainly at least one hypervisor (Xen) does tend to allow a particular VM
to access sensitive system registers. Also it is entirely possible some
hypervisor could proxy access to the registers and thus properly simulate
the events.
Not only that, but in fact this very strategy was already actively
deployed:
https://bugs.debian.org/810964
I'm less than 100% certain this successfully retrieves EDAC events on Xen
right now, so I had been taking a look at the situation only to find
767f4b620eda.
Perhaps everyone should consult with large-scale system administrators
when doing things which effect them?
--
(\___(\___(\______ --=> 8-) EHM <=-- ______/)___/)___/)
\BS ( | ehem+sigmsg@....com PGP 87145445 | ) /
\_CS\ | _____ -O #include <stddisclaimer.h> O- _____ | / _/
8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445
Powered by blists - more mailing lists