Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4276361yba; Mon, 29 Apr 2019 17:11:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqzYglyukZvbKo6IvoSThVwAtZ76LGAr2ztaz+4NgkJ+z2n+0fbmxToEj0pvdHhXuOIX9WDJ X-Received: by 2002:aa7:83ce:: with SMTP id j14mr15034839pfn.57.1556583067733; Mon, 29 Apr 2019 17:11:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556583067; cv=none; d=google.com; s=arc-20160816; b=0JsO2fVs8PTwPUbewlJYFZ8gw/NQmq6ZDGtK25ZmRO/LI/Ezybcur5fjZkeqkx1X6v 4lvLUnFF4gwCtna+owU/pRC29p5O3rCss9roYoDkvROQPjL4BlsCxWUkQer1n+hWT9mW Zvw2clizrqgrockJwrtjcMorGjVLhbkZ1TKepOu03o0Pzs7HvGkt1xQwvsYOrXyFS5FT lw8TGCJuqRkFyQwsk0pTq+pGKoRjS8oQfr1ymAWxyiUZjXzbxkKKQfcAOHXWi4JHrBrL tUFE3xwgrAw4Z1ehS+fPhlHkgKQTVVjicF6TYdTdc2ro3OL218iV8UPK2XpsCbm+Tcmk 5qhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=1+rw2CpiHds5C+lqLYegXozJzhIml8J8BWBvfFCH21s=; b=xIqZ5RuzU3CdfzXg2dtUcLG9Y0fV6pM1OgmB90PJHFvupOYW+DCSeDT1v9t4ueNPbl l86DRMDNqW2GtuKs46Ww6U5L+Dyyy68QI9hcv4nhlqMKiFJhB5B3bxWFa0rkBzhSK6AI YAZxlUOBEbzWBTIJrGoWvTD2CwCQMD0nTwEs2j9lk5W+lAvKTZdm4rTeswZ8U7ciYZea PUCwaSl6S1QMMqXHc6BivfsOod+gWY9TVn91xQoWh/Uax2tDDZizKxsX7jWEZK3Vlbwt xZGQHSPdKS77+s38S1th2sCOJX3kgi2h3PgDqffIKCyzES1oKHn6YIVQw7Vb+4VZNx1K HoUw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g4si36467028plb.168.2019.04.29.17.10.51; Mon, 29 Apr 2019 17:11:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729323AbfD3AIs (ORCPT + 99 others); Mon, 29 Apr 2019 20:08:48 -0400 Received: from mga11.intel.com ([192.55.52.93]:63094 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728844AbfD3AIs (ORCPT ); Mon, 29 Apr 2019 20:08:48 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Apr 2019 17:08:47 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,411,1549958400"; d="scan'208";a="166213404" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.181]) by fmsmga004.fm.intel.com with ESMTP; 29 Apr 2019 17:08:46 -0700 Date: Mon, 29 Apr 2019 17:08:46 -0700 From: Sean Christopherson To: Linus Torvalds Cc: Andrew Lutomirski , Steven Rostedt , Peter Zijlstra , Nicolai Stange , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , the arch/x86 maintainers , Josh Poimboeuf , Jiri Kosina , Miroslav Benes , Petr Mladek , Joe Lawrence , Shuah Khan , Konrad Rzeszutek Wilk , Tim Chen , Sebastian Andrzej Siewior , Mimi Zohar , Juergen Gross , Nick Desaulniers , Nayna Jain , Masahiro Yamada , Joerg Roedel , Linux List Kernel Mailing , live-patching@vger.kernel.org, "open list:KERNEL SELFTEST FRAMEWORK" Subject: Re: [PATCH 3/4] x86/ftrace: make ftrace_int3_handler() not to skip fops invocation Message-ID: <20190430000846.GG31379@linux.intel.com> References: <20190428133826.3e142cfd@oasis.local.home> <20190429220814.GF31379@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 29, 2019 at 03:22:09PM -0700, Linus Torvalds wrote: > On Mon, Apr 29, 2019 at 3:08 PM Sean Christopherson > wrote: > > > > FWIW, Lakemont (Quark) doesn't block NMI/SMI in the STI shadow, but I'm > > not sure that counters the "horrible errata" statement ;-). SMI+RSM saves > > and restores STI blocking in that case, but AFAICT NMI has no such > > protection and will effectively break the shadow on its IRET. > > Ugh. I can't say I care deeply about Quark (ie never seemed to go > anywhere), but it's odd. I thought it was based on a Pentium core (or > i486+?). Are you saying those didn't do it either? It's 486 based, but either way I suspect the answer is "yes". IIRC, Knights Corner, a.k.a. Larrabee, also had funkiness around SMM and that was based on P54C, though I'm struggling to recall exactly what the Larrabee weirdness was. > I have this dim memory about talking about this with some (AMD?) > engineer, and having an alternative approach for the sti shadow wrt > NMI - basically not checking interrupts in the instruction you return > to with 'iret'. I don't think it was even conditional on the "iret > from NMI", I think it was basically any iret also did the sti shadow > thing. > > But I can find no actual paper to back that up, so this may be me just > making sh*t up. If Intel CPUs ever did anything like that on IRET it's long gone. > > KVM is generally ok with respect to STI blocking, but ancient versions > > didn't migrate STI blocking and there's currently a hole where > > single-stepping a guest (from host userspace) could drop STI_BLOCKING > > if a different VM-Exit occurs between the single-step #DB VM-Exit and the > > instruction in the shadow. Though "don't do that" may be a reasonable > > answer in that case. > > I thought the sti shadow blocked the single-step exception too? I know > "mov->ss" does block debug interrupts too. {MOV,POP}SS blocks #DBs, STI does not. > Or are you saying that it's some "single step by emulation" that just > miss setting the STI_BLOCKING flag? This is the case I was talking about for KVM. KVM supports single-stepping the guest from userpace and uses EFLAGS.TF to do so (since it works on both Intel and AMD). VMX has a consistency check that fails VM-Entry if STI_BLOCKING=1, EFLAGS.TF==1, IA32_DEBUGCTL.BTF=0 and there isn't a pending single-step #DB, and so KVM clears STI_BLOCKING immediately before entering the guest when single-stepping the guest. If a VM-Exit occurs immediately after VM-Entry, e.g. due to hardware interrupt, then KVM will see STI_BLOCKING=0 when processing guest events in its run loop and will inject any pending interrupts. I *think* the KVM behavior can be fixed, e.g. I'm not entirely sure why KVM takes this approach instead of setting PENDING_DBG.BS, but that's probably a moot point.