Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1766581ybt; Mon, 15 Jun 2020 08:53:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy6JruHh2ILZM5/0p7idcj07f4lwzThAoSqryJzb2Y83oa5+CdJJ/peuqu9PfpqXAnrDj5r X-Received: by 2002:a17:906:851:: with SMTP id f17mr25052397ejd.396.1592236437081; Mon, 15 Jun 2020 08:53:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592236437; cv=none; d=google.com; s=arc-20160816; b=swGiwvw2cC1l5OxupsdFxNK8UxITfeuEWlSnlEVAODQTTK0hfFvKB/4jJ4TPpwYNUX 1w00m17TyAVBK4GRwlmZlwkZMVxAwbzn5dQ9wEDkrCU+43vhPwKk4y+4+/OCOagPsUfr C07J6Ux0WAwKK/DgygKHwc4t2csACoY34CNGUvrSZIoIp+qYjPjx9IlHXQo0sYeNnTcC wu5FGf75j/uKE/JlT2W0FwT0asxXi9vJhXCOJ1slMS+1h2NycDDfD7Txbartl9Pvc7aU cchq1TNlP/ZczhvH8xfntrEkhRu10ZcjrjF+HBEyFejBaib6xkzDfFQia/VGu1FZbVr/ XrTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:ironport-sdr:ironport-sdr; bh=8EMYszlQOvPGACjGxE8N/9VdkD4sa7Q9EoTV2MTJn8M=; b=XQhCU08mP/8nInDlB1tM/RbgBSJutA5bI+xZRPoZA+MLqkcmGh0Z5hwoqjMG0P/Oub gSkQxrBeN5YtQ9ssF0VbCVA7D+eFYVTG65ZI3R72jJIs0qWZsmkmxsHJsfzE9mCzMeA4 tVtg/gNzJW0iDXGPNizcZuRltFNtNIOYfIZZOWaj96xKldU4EsPMrwbI8hUWsGdTTM3o g11N/FmBaEduEAMOovY8vltD2O85G/PhwgAwIbQYdIMqgitsEttR+BVFVc+OQOdH0GAd wfmQhwzRMJ7OnUMfH6I3cMySlwrRqUopmA8/SQmmpx//jvKik6lANp74DfgPS/hh2Xpe PZBQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u4si10060570ejx.88.2020.06.15.08.53.34; Mon, 15 Jun 2020 08:53:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730621AbgFOPs5 (ORCPT + 99 others); Mon, 15 Jun 2020 11:48:57 -0400 Received: from mga02.intel.com ([134.134.136.20]:37512 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730321AbgFOPsz (ORCPT ); Mon, 15 Jun 2020 11:48:55 -0400 IronPort-SDR: eAr1d9AGC9yutfqhM5WnDV6PF3kkPYr6UEYASkt/aoyKt3qW/5y6kWugwH2IVQdPOJpqLxs4G6 uCB0DC0rrjVQ== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Jun 2020 08:48:54 -0700 IronPort-SDR: gkkYVgcY8xV06BkKjnJOGSlBzFZYve2j2awE0FGSSUIvIj3XiwAj5QsvMoP3GPr1BbNqj0sBuD XicWuOj61BNg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,515,1583222400"; d="scan'208";a="382581571" Received: from romley-ivt3.sc.intel.com ([172.25.110.60]) by fmsmga001.fm.intel.com with ESMTP; 15 Jun 2020 08:48:54 -0700 Date: Mon, 15 Jun 2020 08:48:54 -0700 From: Fenghua Yu To: Peter Zijlstra Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , David Woodhouse , Lu Baolu , Frederic Barrat , Andrew Donnellan , Felix Kuehling , Joerg Roedel , Dave Hansen , Tony Luck , Ashok Raj , Jacob Jun Pan , Dave Jiang , Yu-cheng Yu , Sohil Mehta , Ravi V Shankar , linux-kernel , x86 , iommu@lists.linux-foundation.org, amd-gfx , linuxppc-dev Subject: Re: [PATCH v2 12/12] x86/traps: Fix up invalid PASID Message-ID: <20200615154854.GB13792@romley-ivt3.sc.intel.com> References: <1592008893-9388-1-git-send-email-fenghua.yu@intel.com> <1592008893-9388-13-git-send-email-fenghua.yu@intel.com> <20200615075649.GK2497@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200615075649.GK2497@hirez.programming.kicks-ass.net> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Peter, On Mon, Jun 15, 2020 at 09:56:49AM +0200, Peter Zijlstra wrote: > On Fri, Jun 12, 2020 at 05:41:33PM -0700, Fenghua Yu wrote: > > +/* > > + * Apply some heuristics to see if the #GP fault was caused by a thread > > + * that hasn't had the IA32_PASID MSR initialized. If it looks like that > > + * is the problem, try initializing the IA32_PASID MSR. If the heuristic > > + * guesses incorrectly, take one more #GP fault. > > How is that going to help? Aren't we then going to run this same > heuristic again and again and again? The heuristic always initializes the MSR with the per mm PASID IIF the mm has a valid PASID but the MSR doesn't have one. This heuristic usually happens only once on the first #GP in a thread. If the next #GP still comes in, the heuristic finds out the MSR already has a valid PASID and thus will not fixup the MSR any more. The fixup() returns "false" and lets others to handle the #GP. So the heuristic will be executed once (at most) and won't be executed again and again. > > > + */ > > +bool __fixup_pasid_exception(void) > > +{ > > + u64 pasid_msr; > > + unsigned int pasid; > > + > > + /* > > + * This function is called only when this #GP was triggered from user > > + * space. So the mm cannot be NULL. > > + */ > > + pasid = current->mm->pasid; > > + /* If the mm doesn't have a valid PASID, then can't help. */ > > + if (invalid_pasid(pasid)) > > + return false; > > + > > + /* > > + * Since IRQ is disabled now, the current task still owns the FPU on > > That's just weird and confusing. What you want to say is that you rely > on the exception disabling the interrupt. I checked SDM again. You are right. #GP can be interrupted by machine check or other interrupts. So I cannot assume the current task still owns the FPU. Instead of directly rdmsr() and wrmsr(), I will add helpers that can access either the MSR on the processor or the PASID state in the memory. > > > + * this CPU and the PASID MSR can be directly accessed. > > + * > > + * If the MSR has a valid PASID, the #GP must be for some other reason. > > + * > > + * If rdmsr() is really a performance issue, a TIF_ flag may be > > + * added to check if the thread has a valid PASID instead of rdmsr(). > > I don't understand any of this. Nobody except us writes to this MSR, we > should bloody well know what's in it. What gives? Patch 4 describes how to manage the MSR and patch 7 describes the format of the MSR (20-bit PASID value and bit 31 is valid bit). Are they sufficient to help? Or do you mean something else? > > + */ > > + rdmsrl(MSR_IA32_PASID, pasid_msr); > > + if (pasid_msr & MSR_IA32_PASID_VALID) > > + return false; > > + > > + /* Fix up the MSR if the MSR doesn't have a valid PASID. */ > > + wrmsrl(MSR_IA32_PASID, pasid | MSR_IA32_PASID_VALID); > > + > > + return true; > > +} > > -- > > 2.19.1 > > Thanks. -Fenghua