[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] Revert "EDAC/mce_amd: Do not load edac_mce_amd module on guests"
On Fri, Sep 15, 2023 at 01:56:31PM +0200, Borislav Petkov wrote: > On Thu, Sep 14, 2023 at 10:02:05AM -0700, Elliott Mitchell wrote: > > Indeed. At what point is the lack of information and response long > > enough to simply commit a revert due to those lacks? > > At no point. > > > Even with the commit message having been rewritten and the link to: > > https://lkml.kernel.org/r/20210628172740.245689-1-Smita.KoralahalliChannabasappa@xxxxxxx > > added, this still reads as roughly: > > > > "A hypothetical bug on a hypothetivisor" > > If "Hypervisors likely do not expose the SMCA feature to the guest" > doesn't explain to you what the problem is this commit is fixing, then > I can't help you. Problem is you were objecting to 'probable hypothetical "may" formulations' in what I wrote, yet the original patch message overtly uses that word. In order for the first patch to be correct, it is insufficient for the condition to be unlikely. Ideally it should be mathematically proven impossible. As such I was writing about known counter-examples from the real world. Mainly at least one hypervisor (Xen) does tend to allow a particular VM to access sensitive system registers. Also it is entirely possible some hypervisor could proxy access to the registers and thus properly simulate the events. Not only that, but in fact this very strategy was already actively deployed: https://bugs.debian.org/810964 I'm less than 100% certain this successfully retrieves EDAC events on Xen right now, so I had been taking a look at the situation only to find 767f4b620eda. Perhaps everyone should consult with large-scale system administrators when doing things which effect them? -- (\___(\___(\______ --=> 8-) EHM <=-- ______/)___/)___/) \BS ( | ehem+sigmsg@xxxxxxx PGP 87145445 | ) / \_CS\ | _____ -O #include <stddisclaimer.h> O- _____ | / _/ 8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |