kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Sean Christopherson <seanjc@google.com>
To: Kai Huang <kai.huang@intel.com>
Cc: Rongqing Li <lirongqing@baidu.com>,
	"tglx@linutronix.de" <tglx@linutronix.de>,
	"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
	"pbonzini@redhat.com" <pbonzini@redhat.com>,
	"mingo@redhat.com" <mingo@redhat.com>,
	"x86@kernel.org" <x86@kernel.org>, "bp@alien8.de" <bp@alien8.de>,
	"dave.hansen@linux.intel.com" <dave.hansen@linux.intel.com>
Subject: Re: [PATCH] KVM: x86/mmu: Don't create kvm-nx-lpage-re kthread if not itlb_multihit
Date: Thu, 23 Mar 2023 15:40:43 -0700	[thread overview]
Message-ID: <ZBzU6pa7eOgVf0Kf@google.com> (raw)
In-Reply-To: <48616deee4861976f7960f60caf59cbe37a85f1e.camel@intel.com>

On Thu, Mar 23, 2023, Huang, Kai wrote:
> On Thu, 2023-03-23 at 07:20 -0700, Sean Christopherson wrote:
> > On Thu, Mar 23, 2023, lirongqing@baidu.com wrote:
> > > From: Li RongQing <lirongqing@baidu.com>
> > > 
> > > if CPU has not X86_BUG_ITLB_MULTIHIT bug, kvm-nx-lpage-re kthread
> > > is not needed to create
> > 
> > Unless userspace forces the mitigation to be enabled, which can be done while KVM
> > is running. �
> > 
> 
> Wondering why does userspace want to force the mitigation to be enabled if CPU
> doesn't have such bug?

It's definitely useful for testing, but the real motivation is so that the
mitgation can be enabled without a kernel reboot (or reloading KVM), i.e. without
having to drain VMs off the host, if it turns out that the host CPU actually is
vulnerable.  I.e. to guard against "Nope, not vulnerable!  Oh, wait, just kidding!".

  reply	other threads:[~2023-03-23 22:40 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-03-23  7:18 [PATCH] KVM: x86/mmu: Don't create kvm-nx-lpage-re kthread if not itlb_multihit lirongqing
2023-03-23 14:20 ` Sean Christopherson
2023-03-23 22:32   ` Huang, Kai
2023-03-23 22:40     ` Sean Christopherson [this message]
2023-03-23 23:16       ` Huang, Kai
2023-03-30  8:18   ` Li,Rongqing
2023-03-30 19:19     ` Sean Christopherson
2023-05-02  2:07 ` Robert Hoo
2023-05-05 12:42   ` zhuangel570
2023-05-05 17:44     ` Sean Christopherson
2023-05-06  7:12       ` zhuangel570
2023-05-06 14:59         ` Robert Hoo
2023-05-06 15:30           ` zhuangel570
2023-05-06 14:49       ` Robert Hoo
2023-05-07  1:18         ` Robert Hoo
2023-05-05 17:56   ` Jim Mattson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=ZBzU6pa7eOgVf0Kf@google.com \
    --to=seanjc@google.com \
    --cc=bp@alien8.de \
    --cc=dave.hansen@linux.intel.com \
    --cc=kai.huang@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=lirongqing@baidu.com \
    --cc=mingo@redhat.com \
    --cc=pbonzini@redhat.com \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).