Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1470482pxa; Thu, 20 Aug 2020 12:07:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyeg9LgI8k1SpVU2RUbobouzdURSv4MNEhz5kE89me8CytLIG+KOqjm3S3lQ+trW8mXU9jx X-Received: by 2002:aa7:df15:: with SMTP id c21mr15449edy.334.1597950435550; Thu, 20 Aug 2020 12:07:15 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1597950435; cv=pass; d=google.com; s=arc-20160816; b=KSKqLeF3g1OBG8HvWFZ6GiUAY6bwBOW3+3YTGXpSoD/QqOhD/0d5kQEXjnKSWUvTnk foWHB73QYwoL8kZHznwvb3fXd3uIb0EOQL0FaT749mGR58SDLvS1YosrZal4q5D0gY+x LI1E4musTPBrz7yrFGUyTorCa8HsNBosp3KCHSzMRrp/XuyvqsGUAmEPUoFKZ7N6+aH1 WaMCaya63AUdLATJuIUctGUCzpqOL/pv787Rvqb2M+szJjUwxFFR8xNpmmUEjr8jfY/4 4j9BCUTQLJebjbhWI6vRsxrmGkyNrmNhrE7/kvLdLdz5GapkKHL/3zMzJPOyvn5woeTA wegg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:in-reply-to:user-agent:date:message-id:references :cc:to:from:subject:dkim-signature; bh=Xar6asnS+zcXajgEfcDSPCFK/4WWBEKpgdm1pVRqPL0=; b=fk4P833p3Nxs+FFg/vkUS9uBzEWuiNGy9iTEnAKO6Dl7WyzIHm1S7eC8P0AqaV1Zs9 fYVP8sShjQ/DDn6bepW/1Rgrr02QuOviV3F4XvySDDd4nMTDylkmhjCprHEFD6vMwXHQ QiedlkKQXHNkvzcuOwuD7f+WT2oHW3qiKIXW55VaqtynhDLUtHQ/vkBZTggSkdokz4vu +mmh9x0Ui4YL70O9isHkfEqVQ9KHQkf0g2P8rCwlkIQ7XBMhkCkA4cwvDIamXfCMZzJY +tn/oyvh6r3d/75ViN4dU4Wmo/GjWClxaEt8l9AfYaRmUYdHOCYyirM6TxxPxTWsUjt2 QxTQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=E1lE2T48; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h1si1729024ejb.4.2020.08.20.12.06.51; Thu, 20 Aug 2020 12:07:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amdcloud.onmicrosoft.com header.s=selector2-amdcloud-onmicrosoft-com header.b=E1lE2T48; arc=pass (i=1 spf=pass spfdomain=amd.com dkim=pass dkdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727997AbgHTTFY (ORCPT + 99 others); Thu, 20 Aug 2020 15:05:24 -0400 Received: from mail-eopbgr760047.outbound.protection.outlook.com ([40.107.76.47]:17734 "EHLO NAM02-CY1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727833AbgHTTFV (ORCPT ); Thu, 20 Aug 2020 15:05:21 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=blLa2R+W0qEUNUwHv5d9RZIHb1tsbtRN4sK3pae1BSz7eBT3QJQdW9hBcBGmOyl3hZT3LLZ7HoT4ViUBV/J+HPmEQKBbMN/IX9SDpbIlNe/Rj6VwyMhTp6hTwUQts4kdBQPK1hufkw9xTNCqXsed72SnZQgR9QlO6RBg5L4Nvg849JA1/jfP8bva5E9j4aXn3W6L3p/gLQxyDCrk9zMyR/tngx9O7up9xV3VHHFwQonAaI7Xinp8+/1A40tiJUOw1eA+cbe7a7Te1f6gfZrwJ5gYDo2nHXXBeRKOcu5O6D67jQfP+NsYFQb+fhZnKLhblsv3nTy8qkSE7aiUAomRxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Xar6asnS+zcXajgEfcDSPCFK/4WWBEKpgdm1pVRqPL0=; b=gbTIhYr4Q1uXNEKbH3+QzWwyLXErKm/GVlpXqBvK8oxWYEwEo8ayJL2/T8BYjVTTJQcbZ08XZjKCLADofxXMQP0A3sMH9Eqhhyv0uFz11BpMcpU8S1i7+6a/U7WrEsFvwptxw+c7XZriJxgN6iXbC8uT3nUmbKjWiG/aSdYuY/BbNfiILRe88PxmRW/01Z69g4BJCIwH1JrmQZbX02xd6tOQJyhugaNVAt8HrgTgBuxWuV6b8cIHcWsiIFY+sNsnUpuVmQA6e/8iEpDamd97Ro2s+86tH+5OlzWgG7UiVDPvBi+8n+t6aL140kHfKFZkI71FpymkINAxCB6VunnqQQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amdcloud.onmicrosoft.com; s=selector2-amdcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Xar6asnS+zcXajgEfcDSPCFK/4WWBEKpgdm1pVRqPL0=; b=E1lE2T48UgZUn0ycHrcYgbDUpWfV5/J2cv0evNCUG3iWBfZ0ZWc/wSIJzPTR0nRqK0sZyQL4nGUfUc2eAd3NCKs6s1Fe9qPKh4c6GMBui9s4hubyJ3drPH0nodht1iikedlDF2K6Ni6wHhNxzeLbK4JVD5a2MIOYYVBnbJVmYyU= Authentication-Results: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=amd.com; Received: from DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) by DM5PR12MB1259.namprd12.prod.outlook.com (2603:10b6:3:75::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3305.25; Thu, 20 Aug 2020 19:05:18 +0000 Received: from DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::299a:8ed2:23fc:6346]) by DM5PR12MB1355.namprd12.prod.outlook.com ([fe80::299a:8ed2:23fc:6346%3]) with mapi id 15.20.3305.026; Thu, 20 Aug 2020 19:05:18 +0000 Subject: Re: FSGSBASE causing panic on 5.9-rc1 From: Tom Lendacky To: Jim Mattson Cc: Andy Lutomirski , Sean Christopherson , Joerg Roedel , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Linux Kernel Mailing List , X86 ML , "Chang S. Bae" , Thomas Gleixner , Sasha Levin , Borislav Petkov , Peter Zijlstra , Ingo Molnar References: <39d57e4d-5db4-f536-6f5e-6b0414c0dccc@amd.com> <7dedb0ab-56a6-5d96-577b-21ab1ecdad24@amd.com> <20200820151049.GA26595@sjchrist-ice> <362f5a45-b808-25ad-b99b-449e05717c4a@amd.com> <45e16c5c-ce99-33da-99c8-ea52ef0945db@amd.com> <68478297-ff21-fa38-a37b-2e1e515fdc5e@amd.com> <50e7c7f6-d212-4e90-09b7-2c568087084e@amd.com> Message-ID: Date: Thu, 20 Aug 2020 14:05:16 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-ClientProxiedBy: SN4PR0201CA0062.namprd02.prod.outlook.com (2603:10b6:803:20::24) To DM5PR12MB1355.namprd12.prod.outlook.com (2603:10b6:3:6e::7) MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 Received: from 255.255.255.255 (255.255.255.255) by SN4PR0201CA0062.namprd02.prod.outlook.com (2603:10b6:803:20::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3305.25 via Frontend Transport; Thu, 20 Aug 2020 19:05:17 +0000 X-Originating-IP: [67.79.209.213] X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-HT: Tenant X-MS-Office365-Filtering-Correlation-Id: 97ddd89a-29a1-40f8-c178-08d8453bfa96 X-MS-TrafficTypeDiagnostic: DM5PR12MB1259: X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:6790; X-MS-Exchange-SenderADCheck: 1 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: g6a6iOMUzlF/yUBQ+IpazLm7+zAVPycH32r1qmezo7p2kibOW5SWP7ndZBmpxzcnvqESyxT8eVdpFgu9Q2YAwD7OatGeaEkOLybMLpntmeVlEuFM5CcWjyGheRdb+rWhX9MVBmW5JGb2Mf9AEodwzoys7yIo04iixzXPfgqEsw2jqR/Yu7awqpot0HH38chpYJGxFuT89upynQSGTqPsXd148oV+auhaavG3zSA5lZZjTLfAhKnNXpJX7hrFskRPWBg1aVHm86AdkXeMgiBXTmW8vdqCLYA2F33pt136OWoUtwZHUpmTTpL36bKEK+1+a65ETLaKFTgT5WUZ4Y0wMuZMMFfIJctRsSWGB2jV/KBs1GO5vc35dKpmwZKYr45KI4WiFwSqiUEwNSaBgqUWUttgdf1frBSsaJn3UAFme2o= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DM5PR12MB1355.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(396003)(136003)(366004)(346002)(376002)(39860400002)(36756003)(8936002)(956004)(2616005)(66946007)(31686004)(54906003)(66476007)(16576012)(66556008)(186003)(316002)(83380400001)(5660300002)(26005)(86362001)(7416002)(8676002)(31696002)(110011004)(53546011)(4326008)(6916009)(6486002)(52116002)(2906002)(478600001)(43740500002);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData: 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 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: 97ddd89a-29a1-40f8-c178-08d8453bfa96 X-MS-Exchange-CrossTenant-AuthSource: DM5PR12MB1355.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Aug 2020 19:05:18.4525 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ExxgQ3P9fUnzBPbMj60jA9tealnvlfoVany2WR6I1ukY2MD5NZxm6yj5P3r7h9209z1MWLmhzx9QeVQZeejmcQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1259 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 8/20/20 2:04 PM, Tom Lendacky wrote: > On 8/20/20 1:41 PM, Tom Lendacky wrote: >> On 8/20/20 1:39 PM, Jim Mattson wrote: >>> On Thu, Aug 20, 2020 at 11:38 AM Jim Mattson wrote: >>>> >>>> On Thu, Aug 20, 2020 at 11:34 AM Tom Lendacky >>>> wrote: >>>>> >>>>> >>>>> Bisecting with unsafe_fsgsbase identified: >>>>> >>>>> c82965f9e530 ("x86/entry/64: Handle FSGSBASE enabled paranoid >>>>> entry/exit") >>>>> >>>>> But I'm thinking that could be because it starts using GET_PERCPU_BASE, >>>>> which on Rome would use RDPID. So is SVM restoring TSC_AUX_MSR too late? >>>>> That would explain why I don't see the issue on Naples, which doesn't >>>>> support RDPID. >>>> >>>> It looks to me like SVM loads the guest TSC_AUX from vcpu_load to >>>> vcpu_put, with this comment: >>>> >>>> /* This assumes that the kernel never uses MSR_TSC_AUX */ >>>> if (static_cpu_has(X86_FEATURE_RDTSCP)) >>>>          wrmsrl(MSR_TSC_AUX, svm->tsc_aux); >>> >>> Correction: It never restores TSC_AUX, AFAICT. >> >> It does, it's in the host_save_user_msrs array. > > I added a quick hack to save TSC_AUX to a new variable in the SVM struct > and then restore it right after VMEXIT (just after where GS is restored in > svm_vcpu_enter_exit()) and my guest is no longer crashing. Sorry, I mean my host is no longer crashing. Thanks, Tom > > Thanks, > Tom > >> >> Thanks, >> Tom >> >>>